Received: by 2002:ac0:bc90:0:0:0:0:0 with SMTP id a16csp4431480img; Tue, 26 Mar 2019 09:15:33 -0700 (PDT) X-Google-Smtp-Source: APXvYqwPZIyIP58ZUS8jfyYD+ANHghaPBJyOKZnARdiM2Db96kNfDvmdCiA6xO+RS8GIs56OUroC X-Received: by 2002:a63:d5f:: with SMTP id 31mr29487167pgn.274.1553616933401; Tue, 26 Mar 2019 09:15:33 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1553616933; cv=none; d=google.com; s=arc-20160816; b=zdDpYpwD/hr672GxIJbokGAj5keRXr3tk7vgqkzRR+eLXvbmgKt0a0gNm5hhICx4cN 8ioDSnBaWV+7JYNjS05UZzPQ1QrgzBGcxIPPomOf1PYz95keYPClPPxIFqcctrDmOZpI Q5fEhW8XYHvdbwmZx9giRXVxnBKIk7T4f7UkFuC+DiUDgYsd2eM/dHRS3ULuleRkV0Uf AyY7bi77mhD/dZDrGDGuOaeY7dcbosFkYeafthyFbOz6PUr+1JykGPbWfmFhZBPbzgkg 4rUHL1ckg4Y4R/PR7yv6ljRa3JPrTf/gow6X5X3MOEAa86FOL+4A6BrdHnhzV83tW/gc kH0Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:to:subject:dkim-signature; bh=rFvBXRm8WNqPtkRNcJevgn2xUqxaLWFWWjeD/B7vNEg=; b=XBknIwWJIOGFAK/6yIGIsfnzM0EvMYc52kB8llXMdEQrJcqSoRtY9hlGs0/gQa1VUg i9EfT9dlcboIZ/TuA+fXj1SJU5PVVr5oL0Qyv9tnVu/iqMN6+I8LBcbaIMhbDuxdD86x dcXGzgk1Kg1DXN4K4jC7qLyh3yf/gB1yrQjN09GjCrv5bDXF4uWXhhAxxj8DBlh13S+P WSvVSMAHN68uFBcg4fHtcL5wZ16nLEhacbodZbV6hAeRoMcybI5brvhDU4nhed36z7ak owfqsi4LReH21gpmUbtvJQLwz16rrAkRFgyLbuMtxQ2+0uCawWtgC/MC8/vtW953R/Ui D4wQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=KdhTapfN; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id c10si9418922plo.216.2019.03.26.09.15.17; Tue, 26 Mar 2019 09:15:33 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=KdhTapfN; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732041AbfCZQOl (ORCPT + 99 others); Tue, 26 Mar 2019 12:14:41 -0400 Received: from mail-it1-f194.google.com ([209.85.166.194]:55349 "EHLO mail-it1-f194.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726175AbfCZQOl (ORCPT ); Tue, 26 Mar 2019 12:14:41 -0400 Received: by mail-it1-f194.google.com with SMTP id z126so20451234itd.5; Tue, 26 Mar 2019 09:14:40 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=subject:to:references:from:message-id:date:user-agent:mime-version :in-reply-to:content-language:content-transfer-encoding; bh=rFvBXRm8WNqPtkRNcJevgn2xUqxaLWFWWjeD/B7vNEg=; b=KdhTapfNMHGa3J4SsWfoesRU8ipCQdxcbDflanC1iTlHTuE+p1WGcBAwI7FrX1P7Li fUr7eqjC3+G0flYrlhxj5LjBAMuZK3aUg/KC/7Gsqv5gMOSOFq+BDbBIX9AUVsHoDtJo wPOiuWhfTYAzvLv8TTXJNvLFCUntyNn7G+/abu3FJFbffXgFN/xS4KWgROLYjmfbp9U6 Or2UIbTW8kbUAQzUdYYNp6pIUOJt6tul/Jq47ZOQsIRCXhTopzABnuQbLeKE9hbavp3+ 7dgrMMVsui5gUP2U3ViIPU47ykPYPxgMji5nE6sZhxVGBoQjadXdcL7P1eRYhHPOcUbi E0GQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=rFvBXRm8WNqPtkRNcJevgn2xUqxaLWFWWjeD/B7vNEg=; b=DlWNIGlKUsq443IBxT2/5Pmm06l4YVUsNavdQ1ZK1oELdQqpaDXgIT2FwlxKWLXRZU q8NVNb295DbciMq8W/vvv68aE6vrRhoQHNMzdjzLogrGYZUjyVUFjxnREzRcpjKRXtQ/ nWsYjnSAMP1nBjQrotbS2d6PHaUesGkPYfG9FKkC1X/yDBta/nEJB1jzGQNRCP6hg1Zk tLJ45vHCEIqjPOj1rWRdyAhPDsDQRHAiMXu2CNc38voQ8u8bIBzSQWV2CW/dagOo07H5 DbvWCzmD05iagQGzcY1zjPLC3Tmg69Ulqk74Gi8Np1qIFbSZsm04d5kyS6oe1nAHTy7H W6Pg== X-Gm-Message-State: APjAAAWzJ5sc/QZX+763+uhGwMVZnWQEif9+omYlfGHVRgMyq7kCUTKx v0T6+Nv5Dn6SvvbrMlT4/1PNFVQq X-Received: by 2002:a24:2e0a:: with SMTP id i10mr860313ita.162.1553616879920; Tue, 26 Mar 2019 09:14:39 -0700 (PDT) Received: from [192.168.1.249] (cpe-70-114-247-242.austin.res.rr.com. [70.114.247.242]) by smtp.googlemail.com with ESMTPSA id u197sm7563003itb.9.2019.03.26.09.14.38 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Tue, 26 Mar 2019 09:14:38 -0700 (PDT) Subject: Re: [PATCH v8 05/10] X.509: parse public key parameters from x509 for akcipher To: Vitaly Chikunov , Herbert Xu , David Howells , Mimi Zohar , Dmitry Kasatkin , linux-integrity@vger.kernel.org, keyrings@vger.kernel.org, linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org References: <20190326125842.24110-1-vt@altlinux.org> <20190326125842.24110-6-vt@altlinux.org> From: Denis Kenzior Message-ID: Date: Tue, 26 Mar 2019 11:14:37 -0500 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.3.0 MIME-Version: 1.0 In-Reply-To: <20190326125842.24110-6-vt@altlinux.org> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Vitaly, On 03/26/2019 07:58 AM, Vitaly Chikunov wrote: > Some public key algorithms (like EC-DSA) keep in parameters field > important data such as digest and curve OIDs (possibly more for > different EC-DSA variants). Thus, just setting a public key (as > for RSA) is not enough. > > Append parameters into the key stream for akcipher_set_{pub,priv}_key. > Appended data is: (u32) algo OID, (u32) parameters length, parameters > data. > > This does not affect current akcipher API nor RSA ciphers (they could > ignore it). Idea of appending parameters to the key stream is by Herbert > Xu. > > Cc: David Howells > Cc: keyrings@vger.kernel.org > Signed-off-by: Vitaly Chikunov > --- > crypto/asymmetric_keys/asym_tpm.c | 43 ++++++++++++++++-- > crypto/asymmetric_keys/public_key.c | 72 ++++++++++++++++++++++++------- > crypto/asymmetric_keys/x509.asn1 | 2 +- > crypto/asymmetric_keys/x509_cert_parser.c | 31 +++++++++++++ > crypto/testmgr.c | 24 +++++++++-- > crypto/testmgr.h | 5 +++ > include/crypto/akcipher.h | 18 ++++---- > include/crypto/public_key.h | 4 ++ > 8 files changed, 168 insertions(+), 31 deletions(-) > > diff --git a/crypto/asymmetric_keys/asym_tpm.c b/crypto/asymmetric_keys/asym_tpm.c > index 402fc34ca044..d95d7ec50e5a 100644 > --- a/crypto/asymmetric_keys/asym_tpm.c > +++ b/crypto/asymmetric_keys/asym_tpm.c > @@ -395,6 +395,12 @@ static int determine_akcipher(const char *encoding, const char *hash_algo, > return -ENOPKG; > } > > +static u8 *tpm_pack_u32(u8 *dst, u32 val) > +{ > + memcpy(dst, &val, sizeof(val)); > + return dst + sizeof(val); > +} > + > /* > * Query information about a key. > */ > @@ -407,6 +413,7 @@ static int tpm_key_query(const struct kernel_pkey_params *params, > struct crypto_akcipher *tfm; > uint8_t der_pub_key[PUB_KEY_BUF_SIZE]; > uint32_t der_pub_key_len; > + u8 *pkey, *ptr; > int len; > > /* TPM only works on private keys, public keys still done in software */ > @@ -421,7 +428,16 @@ static int tpm_key_query(const struct kernel_pkey_params *params, > der_pub_key_len = derive_pub_key(tk->pub_key, tk->pub_key_len, > der_pub_key); > > - ret = crypto_akcipher_set_pub_key(tfm, der_pub_key, der_pub_key_len); > + pkey = kmalloc(der_pub_key_len + sizeof(u32) * 2, GFP_KERNEL); > + if (!pkey) > + goto error_free_tfm; > + memcpy(pkey, der_pub_key, der_pub_key_len); > + ptr = pkey + der_pub_key_len; > + /* Set dummy parameters to satisfy set_pub_key ABI. */ > + ptr = tpm_pack_u32(ptr, 0); /* algo */ > + ptr = tpm_pack_u32(ptr, 0); /* parameter length */ > + Why not do all of this inside derive_pub_key? The only reason for that function is to take a TPM-blob formatted public key and convert it to ASN.1 format understood by crypto_akcipher_set_pub_key. So if you're changing the format, might as well update that function. > + ret = crypto_akcipher_set_pub_key(tfm, pkey, der_pub_key_len); > if (ret < 0) > goto error_free_tfm; > > @@ -440,6 +456,7 @@ static int tpm_key_query(const struct kernel_pkey_params *params, > > ret = 0; > error_free_tfm: > + kfree(pkey); > crypto_free_akcipher(tfm); > pr_devel("<==%s() = %d\n", __func__, ret); > return ret; > @@ -460,6 +477,7 @@ static int tpm_key_encrypt(struct tpm_key *tk, > struct scatterlist in_sg, out_sg; > uint8_t der_pub_key[PUB_KEY_BUF_SIZE]; > uint32_t der_pub_key_len; > + u8 *pkey, *ptr; > int ret; > > pr_devel("==>%s()\n", __func__); > @@ -475,7 +493,15 @@ static int tpm_key_encrypt(struct tpm_key *tk, > der_pub_key_len = derive_pub_key(tk->pub_key, tk->pub_key_len, > der_pub_key); > > - ret = crypto_akcipher_set_pub_key(tfm, der_pub_key, der_pub_key_len); > + pkey = kmalloc(der_pub_key_len + sizeof(u32) * 2, GFP_KERNEL); > + if (!pkey) > + goto error_free_tfm; > + memcpy(pkey, der_pub_key, der_pub_key_len); > + ptr = pkey + der_pub_key_len; > + ptr = tpm_pack_u32(ptr, 0); /* algo */ > + ptr = tpm_pack_u32(ptr, 0); /* parameter length */ > + Same comment as above > + ret = crypto_akcipher_set_pub_key(tfm, pkey, der_pub_key_len); > if (ret < 0) > goto error_free_tfm; > > @@ -500,6 +526,7 @@ static int tpm_key_encrypt(struct tpm_key *tk, > > akcipher_request_free(req); > error_free_tfm: > + kfree(pkey); > crypto_free_akcipher(tfm); > pr_devel("<==%s() = %d\n", __func__, ret); > return ret; > @@ -748,6 +775,7 @@ static int tpm_key_verify_signature(const struct key *key, > char alg_name[CRYPTO_MAX_ALG_NAME]; > uint8_t der_pub_key[PUB_KEY_BUF_SIZE]; > uint32_t der_pub_key_len; > + u8 *pkey, *ptr; > int ret; > > pr_devel("==>%s()\n", __func__); > @@ -770,7 +798,15 @@ static int tpm_key_verify_signature(const struct key *key, > der_pub_key_len = derive_pub_key(tk->pub_key, tk->pub_key_len, > der_pub_key); > > - ret = crypto_akcipher_set_pub_key(tfm, der_pub_key, der_pub_key_len); > + pkey = kmalloc(der_pub_key_len + sizeof(u32) * 2, GFP_KERNEL); > + if (!pkey) > + goto error_free_tfm; > + memcpy(pkey, der_pub_key, der_pub_key_len); > + ptr = pkey + der_pub_key_len; > + ptr = tpm_pack_u32(ptr, 0); /* algo */ > + ptr = tpm_pack_u32(ptr, 0); /* parameter length */ > + And here > + ret = crypto_akcipher_set_pub_key(tfm, pkey, der_pub_key_len); > if (ret < 0) > goto error_free_tfm; > > @@ -792,6 +828,7 @@ static int tpm_key_verify_signature(const struct key *key, > > akcipher_request_free(req); > error_free_tfm: > + kfree(pkey); > crypto_free_akcipher(tfm); > pr_devel("<==%s() = %d\n", __func__, ret); > if (WARN_ON_ONCE(ret > 0)) Regards, -Denis