From patchwork Tue Jun 7 14:21:09 2016 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Tudor Ambarus X-Patchwork-Id: 9161477 X-Patchwork-Delegate: herbert@gondor.apana.org.au Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork.web.codeaurora.org (Postfix) with ESMTP id 28ECC60572 for ; Tue, 7 Jun 2016 14:21:28 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 1802725404 for ; Tue, 7 Jun 2016 14:21:28 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id 0BEDB2656B; Tue, 7 Jun 2016 14:21:28 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-6.9 required=2.0 tests=BAYES_00,RCVD_IN_DNSWL_HI autolearn=ham version=3.3.1 Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id C593E25404 for ; Tue, 7 Jun 2016 14:21:26 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754585AbcFGOVZ (ORCPT ); Tue, 7 Jun 2016 10:21:25 -0400 Received: from mail-bn1bon0093.outbound.protection.outlook.com ([157.56.111.93]:64760 "EHLO na01-bn1-obe.outbound.protection.outlook.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1754501AbcFGOVY (ORCPT ); Tue, 7 Jun 2016 10:21:24 -0400 Received: from DM2PR03CA0036.namprd03.prod.outlook.com (10.141.96.35) by BN3PR03MB2369.namprd03.prod.outlook.com (10.166.74.152) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384) id 15.1.511.8; Tue, 7 Jun 2016 14:21:20 +0000 Received: from BN1AFFO11FD021.protection.gbl (2a01:111:f400:7c10::154) by DM2PR03CA0036.outlook.office365.com (2a01:111:e400:2428::35) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384) id 15.1.511.8 via Frontend Transport; Tue, 7 Jun 2016 14:21:21 +0000 Authentication-Results: spf=fail (sender IP is 192.88.158.2) smtp.mailfrom=nxp.com; nxp.com; dkim=none (message not signed) header.d=none; nxp.com; dmarc=none action=none header.from=nxp.com; nxp.com; dkim=none (message not signed) header.d=none; Received-SPF: Fail (protection.outlook.com: domain of nxp.com does not designate 192.88.158.2 as permitted sender) receiver=protection.outlook.com; client-ip=192.88.158.2; helo=az84smr01.freescale.net; Received: from az84smr01.freescale.net (192.88.158.2) by BN1AFFO11FD021.mail.protection.outlook.com (10.58.52.81) with Microsoft SMTP Server (TLS) id 15.1.497.8 via Frontend Transport; Tue, 7 Jun 2016 14:21:20 +0000 Received: from enigma.ea.freescale.net (enigma.ea.freescale.net [10.171.77.120]) by az84smr01.freescale.net (8.14.3/8.14.0) with ESMTP id u57ELHCo002441; Tue, 7 Jun 2016 07:21:18 -0700 From: Tudor Ambarus To: CC: , Tudor Ambarus Subject: [PATCH v3] crypto: rsa - return raw integers for the ASN.1 parser Date: Tue, 7 Jun 2016 17:21:09 +0300 Message-ID: <1465309269-2214-1-git-send-email-tudor-dan.ambarus@nxp.com> X-Mailer: git-send-email 1.8.3.1 X-EOPAttributedMessage: 0 X-Matching-Connectors: 131097828809631833; (91ab9b29-cfa4-454e-5278-08d120cd25b8); () X-Forefront-Antispam-Report: CIP:192.88.158.2; IPV:NLI; CTRY:US; EFV:NLI; SFV:NSPM; SFS:(10009020)(6009001)(2980300002)(1109001)(1110001)(339900001)(199003)(189002)(36756003)(50226002)(5003940100001)(8936002)(48376002)(5008740100001)(85426001)(8676002)(50466002)(105606002)(77096005)(47776003)(68736007)(104016004)(2906002)(189998001)(4326007)(110136002)(50986999)(106466001)(586003)(6806005)(33646002)(19580395003)(69596002)(19580405001)(8666004)(81166006)(81156014)(2351001)(87936001)(86362001)(229853001)(92566002)(97736004)(7059030)(4720700001); DIR:OUT; SFP:1101; SCL:1; SRVR:BN3PR03MB2369; H:az84smr01.freescale.net; FPR:; SPF:Fail; PTR:InfoDomainNonexistent; A:1; MX:1; LANG:en; X-Microsoft-Exchange-Diagnostics: 1; BN1AFFO11FD021; 1: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 MIME-Version: 1.0 X-MS-Office365-Filtering-Correlation-Id: 71247d46-3a42-40dd-dd61-08d38edeff69 X-Microsoft-Exchange-Diagnostics: 1; BN3PR03MB2369; 2:XPAQwbOuOlqdClSbHoV7DfRR/GkmeiRxjfgli+EvE0ngSWrysZmRWC3IKai3f9XbPsRSN2op6fxPYzNzBxAHKs44V+C4CN+pRYoGr5KKKfiKoWWk09LuU0g5+HX5K5vb6BgdvndfQQ6+i9X/zRcpzS98Yvp26zmVERdsdgbl+XLuoOlRe+aZpE5BrQVLGC1v; 3:+513DU8JQhnpibIf3OBwVQM7nNjRwlvUgoENe+LXSq6PBnshxKvpKnvWrEp0PZgQz6J5ZiNUQSwh0Hs/WyHWxz6tW+WznNvCVmjsm4WgVJ1GLYzm3turXofDVf1FRhtvx0gEV5wgJY6CjfJ2Rwb70xHE2tUjj14lGZUDPR2hbUhoWivivap88G+bOuioHejCKE8hPpMkSsWyzVC8AbipJf4RSkC1Fw2RsZBuI7zLJqc= X-Microsoft-Antispam: UriScan:;BCL:0;PCL:0;RULEID:;SRVR:BN3PR03MB2369; X-Microsoft-Exchange-Diagnostics: 1; BN3PR03MB2369; 25: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 X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:(185117386973197); X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(601004)(2401047)(8121501046)(13023025)(13024025)(13018025)(13015025)(13017025)(5005006)(3002001)(10201501046)(6055026); SRVR:BN3PR03MB2369; BCL:0; PCL:0; RULEID:(400006); SRVR:BN3PR03MB2369; X-Microsoft-Exchange-Diagnostics: 1; BN3PR03MB2369; 4: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 X-Forefront-PRVS: 09669DB681 X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; BN3PR03MB2369; 23:cCSHtd5/BQ6Ji3RLHheiYojyCfyPbNVC2giEyoAws?= =?us-ascii?Q?ycFQ7zoSCi9+STbXDxpuRC2LSzH+lMjjzMwz3iCMJRsIjSyVEOQ8SH0kLMG7?= =?us-ascii?Q?+I25GGh64VI46kBStDnQGBR0n7ey15YNzH/Cb+Anf5qi96xMZtedmSU3iDEv?= =?us-ascii?Q?CgyRcIEW+2yH/Ix0CNB5T9IHgoW9/m8M9y7ZAsP9B7MV0xLLWUnDpCQ9joOH?= =?us-ascii?Q?BLM01PsT7qfEtGkc90Gutxsd70ezQXnYIFDxB+Ba1SOE6Ki2VK9VuYCcvnAB?= =?us-ascii?Q?AjG1J/e7UvyijP3/0ljUCYTxp7fggOZ1IV9TyVI/v2BVAgsZ1yjqWT6GCPYG?= =?us-ascii?Q?Rudn/Vz0T5zyLgwpsN3ItyPBujosP9gOGFz2ojV410NlkSRxQ4BDAlgfxLRS?= =?us-ascii?Q?ivRRPrYsgMmnoKFFj9rA/vaq6tKZntYwgvYrNZzmODtlyXHc6BU4xtqaNdw8?= =?us-ascii?Q?mx5ocGss1gp23CoRblolvqSdVCRYXA5fKbA1+RHEHM0Hqki5EBarDqtmSGA9?= =?us-ascii?Q?kR6v+65LTPp3YaNuTxtrRLaQzRDb74zccVH60HI8dPH0hQ4b2bwj2JyAuEgG?= =?us-ascii?Q?PavLItnSa4jYHCC4eQLOmvjPIeLDtP5u/8AtiTx3jgwWAWXk4vhLo2IkZj6u?= =?us-ascii?Q?wjdexHDQm5eQfYoA6fabrOgFXe3/gfpCEx6QjYyobmhToLO19ZjDHuvaD67g?= =?us-ascii?Q?zYzL3xmMpkX0LaHTjkYFMcvLPSvEfnFT9B5Bq6qXvBqukZ3zVvgOS/YrfN4f?= =?us-ascii?Q?VACov27rLPWCOvLUHttWe/axbFmc2CMsoje59PMAn3hiCKDynMh3TLDp5xez?= =?us-ascii?Q?lxLV0SQMMtVxplIgqVmhzwkvknFwZ6Jc390IIXrv/eXOvOeKSXQPwhi8ezQ0?= =?us-ascii?Q?css6OJuxSwx2LYFQY15foF8/JHIf72oRlt68Pr/QxnlkJr2idTQFITMPBirw?= =?us-ascii?Q?o280CpHcDkutIMgRFomj0B64y1oLVUAbNU0hRs/dpAHSQQpMZ1xI804CeX0s?= =?us-ascii?Q?8jebmyD91DxSPOgsZyYAwkgSd3Ypz/gumtgT7dHHzhmqFFpwf2mduvFvvoqx?= =?us-ascii?Q?h3bzKMAuJsoR718G7RoPGWUS/r25PmGQlijRNTRK5VRaNVaBl5d5RPRTz+sT?= =?us-ascii?Q?kr+9Pp1R2Y=3D?= X-Microsoft-Exchange-Diagnostics: 1; BN3PR03MB2369; 5:DyftzSFPrJ3guoZ4xKuCUCtLzd/wIeY+9mHHBZJ7ylsyO1Ya9L6D0PycCkfeVuV91EmW4APrvBc/FOS7OMMsIGJyqEtEzG7LPiqenCtjO0Jnev+9AtU/1OqgHSRX1bAfLu3qPT7eZD7kDELZFAXb0Gf8kkjWY4NYKbbvcGi94JM=; 24:yItESfAZSZP6agCykp0+wsIfz2yjqcGTsXYjIlPsDG0asR2gC4/z9PuqGnKZ2/7263arf3zjykEHqBRKBwaX82LG2KIQNyEdS/OhgnH2NDc=; 7:UL8V8nPW08OGr3z5dYOEobpr395zHr1+CduRhbgc1nJYaFl2a55wogrJSgxeTy9lAocXHr2obzXsj6WErsm+N7L//MC2HZ5+V9FthSYJ9ZxUhe8CVrpsswQPt8pltUenXkLrRl2vyWjl2RX2Mc4EqVc5MlWx/YLAFTBMALefojyPo6CSpno7TTdozo+hHLRl0FAUf7txT/NVEK06fMseG49f+PdnG1wKlIKXGsYGNKM= SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-MS-Exchange-CrossTenant-OriginalArrivalTime: 07 Jun 2016 14:21:20.5887 (UTC) X-MS-Exchange-CrossTenant-Id: 5afe0b00-7697-4969-b663-5eab37d5f47e X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=5afe0b00-7697-4969-b663-5eab37d5f47e; Ip=[192.88.158.2]; Helo=[az84smr01.freescale.net] X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN3PR03MB2369 Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org X-Virus-Scanned: ClamAV using ClamSMTP Return the raw key with no other processing so that the caller can copy it or MPI parse it, etc. The scope is to have only one ANS.1 parser for all RSA implementations. Update the RSA software implementation so that it does the MPI conversion on top. Signed-off-by: Tudor Ambarus --- crypto/rsa.c | 119 ++++++++++++++++++++++++++------------- crypto/rsa_helper.c | 128 +++++++++++++++++++++--------------------- include/crypto/internal/rsa.h | 22 ++++++-- 3 files changed, 161 insertions(+), 108 deletions(-) diff --git a/crypto/rsa.c b/crypto/rsa.c index 77d737f..ea78d61 100644 --- a/crypto/rsa.c +++ b/crypto/rsa.c @@ -14,12 +14,24 @@ #include #include #include +#include + +struct rsa_mpi_key { + MPI n; + MPI e; + MPI d; +}; + +struct rsa_ctx { + struct rsa_key key; + struct rsa_mpi_key mpi_key; +}; /* * RSAEP function [RFC3447 sec 5.1.1] * c = m^e mod n; */ -static int _rsa_enc(const struct rsa_key *key, MPI c, MPI m) +static int _rsa_enc(const struct rsa_mpi_key *key, MPI c, MPI m) { /* (1) Validate 0 <= m < n */ if (mpi_cmp_ui(m, 0) < 0 || mpi_cmp(m, key->n) >= 0) @@ -33,7 +45,7 @@ static int _rsa_enc(const struct rsa_key *key, MPI c, MPI m) * RSADP function [RFC3447 sec 5.1.2] * m = c^d mod n; */ -static int _rsa_dec(const struct rsa_key *key, MPI m, MPI c) +static int _rsa_dec(const struct rsa_mpi_key *key, MPI m, MPI c) { /* (1) Validate 0 <= c < n */ if (mpi_cmp_ui(c, 0) < 0 || mpi_cmp(c, key->n) >= 0) @@ -47,7 +59,7 @@ static int _rsa_dec(const struct rsa_key *key, MPI m, MPI c) * RSASP1 function [RFC3447 sec 5.2.1] * s = m^d mod n */ -static int _rsa_sign(const struct rsa_key *key, MPI s, MPI m) +static int _rsa_sign(const struct rsa_mpi_key *key, MPI s, MPI m) { /* (1) Validate 0 <= m < n */ if (mpi_cmp_ui(m, 0) < 0 || mpi_cmp(m, key->n) >= 0) @@ -61,7 +73,7 @@ static int _rsa_sign(const struct rsa_key *key, MPI s, MPI m) * RSAVP1 function [RFC3447 sec 5.2.2] * m = s^e mod n; */ -static int _rsa_verify(const struct rsa_key *key, MPI m, MPI s) +static int _rsa_verify(const struct rsa_mpi_key *key, MPI m, MPI s) { /* (1) Validate 0 <= s < n */ if (mpi_cmp_ui(s, 0) < 0 || mpi_cmp(s, key->n) >= 0) @@ -71,15 +83,17 @@ static int _rsa_verify(const struct rsa_key *key, MPI m, MPI s) return mpi_powm(m, s, key->e, key->n); } -static inline struct rsa_key *rsa_get_key(struct crypto_akcipher *tfm) +static inline struct rsa_mpi_key *rsa_get_key(struct crypto_akcipher *tfm) { - return akcipher_tfm_ctx(tfm); + struct rsa_ctx *ctx = akcipher_tfm_ctx(tfm); + + return &ctx->mpi_key; } static int rsa_enc(struct akcipher_request *req) { struct crypto_akcipher *tfm = crypto_akcipher_reqtfm(req); - const struct rsa_key *pkey = rsa_get_key(tfm); + const struct rsa_mpi_key *pkey = rsa_get_key(tfm); MPI m, c = mpi_alloc(0); int ret = 0; int sign; @@ -118,7 +132,7 @@ err_free_c: static int rsa_dec(struct akcipher_request *req) { struct crypto_akcipher *tfm = crypto_akcipher_reqtfm(req); - const struct rsa_key *pkey = rsa_get_key(tfm); + const struct rsa_mpi_key *pkey = rsa_get_key(tfm); MPI c, m = mpi_alloc(0); int ret = 0; int sign; @@ -156,7 +170,7 @@ err_free_m: static int rsa_sign(struct akcipher_request *req) { struct crypto_akcipher *tfm = crypto_akcipher_reqtfm(req); - const struct rsa_key *pkey = rsa_get_key(tfm); + const struct rsa_mpi_key *pkey = rsa_get_key(tfm); MPI m, s = mpi_alloc(0); int ret = 0; int sign; @@ -195,7 +209,7 @@ err_free_s: static int rsa_verify(struct akcipher_request *req) { struct crypto_akcipher *tfm = crypto_akcipher_reqtfm(req); - const struct rsa_key *pkey = rsa_get_key(tfm); + const struct rsa_mpi_key *pkey = rsa_get_key(tfm); MPI s, m = mpi_alloc(0); int ret = 0; int sign; @@ -233,67 +247,94 @@ err_free_m: return ret; } -static int rsa_check_key_length(unsigned int len) +static void rsa_free_mpi_key(struct rsa_mpi_key *key) { - switch (len) { - case 512: - case 1024: - case 1536: - case 2048: - case 3072: - case 4096: - return 0; - } - - return -EINVAL; + mpi_free(key->d); + mpi_free(key->e); + mpi_free(key->n); + key->d = NULL; + key->e = NULL; + key->n = NULL; } static int rsa_set_pub_key(struct crypto_akcipher *tfm, const void *key, unsigned int keylen) { - struct rsa_key *pkey = akcipher_tfm_ctx(tfm); + struct rsa_ctx *ctx = akcipher_tfm_ctx(tfm); + struct rsa_key *pkey = &ctx->key; + struct rsa_mpi_key *mpi_key = &ctx->mpi_key; int ret; + /* Free the old MPI key if any */ + rsa_free_mpi_key(mpi_key); + ret = rsa_parse_pub_key(pkey, key, keylen); if (ret) return ret; - if (rsa_check_key_length(mpi_get_size(pkey->n) << 3)) { - rsa_free_key(pkey); - ret = -EINVAL; - } - return ret; + mpi_key->e = mpi_read_raw_data(pkey->e, pkey->e_sz); + if (!mpi_key->e) + goto err; + + mpi_key->n = mpi_read_raw_data(pkey->n, pkey->n_sz); + if (!mpi_key->n) + goto err; + + return 0; + +err: + rsa_free_mpi_key(mpi_key); + return -ENOMEM; } static int rsa_set_priv_key(struct crypto_akcipher *tfm, const void *key, unsigned int keylen) { - struct rsa_key *pkey = akcipher_tfm_ctx(tfm); + struct rsa_ctx *ctx = akcipher_tfm_ctx(tfm); + struct rsa_key *pkey = &ctx->key; + struct rsa_mpi_key *mpi_key = &ctx->mpi_key; int ret; + /* Free the old MPI key if any */ + rsa_free_mpi_key(mpi_key); + ret = rsa_parse_priv_key(pkey, key, keylen); if (ret) return ret; - if (rsa_check_key_length(mpi_get_size(pkey->n) << 3)) { - rsa_free_key(pkey); - ret = -EINVAL; - } - return ret; + mpi_key->d = mpi_read_raw_data(pkey->d, pkey->n_sz); + if (!mpi_key->d) + goto err; + + mpi_key->e = mpi_read_raw_data(pkey->e, pkey->e_sz); + if (!mpi_key->e) + goto err; + + mpi_key->n = mpi_read_raw_data(pkey->n, pkey->n_sz); + if (!mpi_key->n) + goto err; + + return 0; + +err: + rsa_free_mpi_key(mpi_key); + return -ENOMEM; } static int rsa_max_size(struct crypto_akcipher *tfm) { - struct rsa_key *pkey = akcipher_tfm_ctx(tfm); + struct rsa_ctx *ctx = akcipher_tfm_ctx(tfm); + struct rsa_key *pkey = &ctx->key; - return pkey->n ? mpi_get_size(pkey->n) : -EINVAL; + return pkey->n ? pkey->n_sz : -EINVAL; } static void rsa_exit_tfm(struct crypto_akcipher *tfm) { - struct rsa_key *pkey = akcipher_tfm_ctx(tfm); + struct rsa_ctx *ctx = akcipher_tfm_ctx(tfm); + struct rsa_mpi_key *mpi_key = &ctx->mpi_key; - rsa_free_key(pkey); + rsa_free_mpi_key(mpi_key); } static struct akcipher_alg rsa = { @@ -310,7 +351,7 @@ static struct akcipher_alg rsa = { .cra_driver_name = "rsa-generic", .cra_priority = 100, .cra_module = THIS_MODULE, - .cra_ctxsize = sizeof(struct rsa_key), + .cra_ctxsize = sizeof(struct rsa_ctx), }, }; diff --git a/crypto/rsa_helper.c b/crypto/rsa_helper.c index d226f48..f0677b7 100644 --- a/crypto/rsa_helper.c +++ b/crypto/rsa_helper.c @@ -18,24 +18,50 @@ #include "rsapubkey-asn1.h" #include "rsaprivkey-asn1.h" +static int rsa_check_key_length(unsigned int len) +{ + switch (len) { + case 512: + case 1024: + case 1536: + case 2048: + case 3072: + case 4096: + return 0; + } + + return -EINVAL; +} + int rsa_get_n(void *context, size_t hdrlen, unsigned char tag, const void *value, size_t vlen) { struct rsa_key *key = context; + const u8 *ptr = value; + int ret; - key->n = mpi_read_raw_data(value, vlen); + while (!*ptr && vlen) { + ptr++; + vlen--; + } - if (!key->n) - return -ENOMEM; + /* invalid key provided */ + if (!ptr) + return -EINVAL; /* In FIPS mode only allow key size 2K & 3K */ - if (fips_enabled && (mpi_get_size(key->n) != 256 && - mpi_get_size(key->n) != 384)) { + if (fips_enabled && (vlen != 256 && vlen != 384)) { pr_err("RSA: key size not allowed in FIPS mode\n"); - mpi_free(key->n); - key->n = NULL; return -EINVAL; } + /* invalid key size provided */ + ret = rsa_check_key_length(vlen << 3); + if (ret) + return ret; + + key->n = ptr; + key->n_sz = vlen; + return 0; } @@ -43,11 +69,19 @@ int rsa_get_e(void *context, size_t hdrlen, unsigned char tag, const void *value, size_t vlen) { struct rsa_key *key = context; + const u8 *ptr = value; + + while (!*ptr && vlen) { + ptr++; + vlen--; + } - key->e = mpi_read_raw_data(value, vlen); + /* invalid key provided */ + if (!ptr || !key->n_sz || !vlen || vlen > key->n_sz) + return -EINVAL; - if (!key->e) - return -ENOMEM; + key->e = ptr; + key->e_sz = vlen; return 0; } @@ -56,47 +90,33 @@ int rsa_get_d(void *context, size_t hdrlen, unsigned char tag, const void *value, size_t vlen) { struct rsa_key *key = context; + const u8 *ptr = value; - key->d = mpi_read_raw_data(value, vlen); + while (!*ptr && vlen) { + ptr++; + vlen--; + } - if (!key->d) - return -ENOMEM; + /* invalid key provided */ + if (!ptr || !key->n_sz || !vlen || vlen > key->n_sz) + return -EINVAL; /* In FIPS mode only allow key size 2K & 3K */ - if (fips_enabled && (mpi_get_size(key->d) != 256 && - mpi_get_size(key->d) != 384)) { + if (fips_enabled && (vlen != 256 && vlen != 384)) { pr_err("RSA: key size not allowed in FIPS mode\n"); - mpi_free(key->d); - key->d = NULL; return -EINVAL; } - return 0; -} -static void free_mpis(struct rsa_key *key) -{ - mpi_free(key->n); - mpi_free(key->e); - mpi_free(key->d); - key->n = NULL; - key->e = NULL; - key->d = NULL; -} + key->d = ptr; + key->d_sz = vlen; -/** - * rsa_free_key() - frees rsa key allocated by rsa_parse_key() - * - * @rsa_key: struct rsa_key key representation - */ -void rsa_free_key(struct rsa_key *key) -{ - free_mpis(key); + return 0; } -EXPORT_SYMBOL_GPL(rsa_free_key); /** - * rsa_parse_pub_key() - extracts an rsa public key from BER encoded buffer - * and stores it in the provided struct rsa_key + * rsa_parse_pub_key() - decodes the BER encoded buffer and stores in the + * provided struct rsa_key, pointers to the raw key as is, + * so that the caller can copy it or MPI parse it, etc. * * @rsa_key: struct rsa_key key representation * @key: key in BER format @@ -107,23 +127,15 @@ EXPORT_SYMBOL_GPL(rsa_free_key); int rsa_parse_pub_key(struct rsa_key *rsa_key, const void *key, unsigned int key_len) { - int ret; - - free_mpis(rsa_key); - ret = asn1_ber_decoder(&rsapubkey_decoder, rsa_key, key, key_len); - if (ret < 0) - goto error; - - return 0; -error: - free_mpis(rsa_key); - return ret; + return asn1_ber_decoder(&rsapubkey_decoder, rsa_key, key, key_len); } EXPORT_SYMBOL_GPL(rsa_parse_pub_key); /** - * rsa_parse_pub_key() - extracts an rsa private key from BER encoded buffer - * and stores it in the provided struct rsa_key + * rsa_parse_priv_key() - decodes the BER encoded buffer and stores in the + * provided struct rsa_key, pointers to the raw key + * as is, so that the caller can copy it or MPI parse it, + * etc. * * @rsa_key: struct rsa_key key representation * @key: key in BER format @@ -134,16 +146,6 @@ EXPORT_SYMBOL_GPL(rsa_parse_pub_key); int rsa_parse_priv_key(struct rsa_key *rsa_key, const void *key, unsigned int key_len) { - int ret; - - free_mpis(rsa_key); - ret = asn1_ber_decoder(&rsaprivkey_decoder, rsa_key, key, key_len); - if (ret < 0) - goto error; - - return 0; -error: - free_mpis(rsa_key); - return ret; + return asn1_ber_decoder(&rsaprivkey_decoder, rsa_key, key, key_len); } EXPORT_SYMBOL_GPL(rsa_parse_priv_key); diff --git a/include/crypto/internal/rsa.h b/include/crypto/internal/rsa.h index c7585bd..d6c042a 100644 --- a/include/crypto/internal/rsa.h +++ b/include/crypto/internal/rsa.h @@ -12,12 +12,24 @@ */ #ifndef _RSA_HELPER_ #define _RSA_HELPER_ -#include +#include +/** + * rsa_key - RSA key structure + * @n : RSA modulus raw byte stream + * @e : RSA public exponent raw byte stream + * @d : RSA private exponent raw byte stream + * @n_sz : length in bytes of RSA modulus n + * @e_sz : length in bytes of RSA public exponent + * @d_sz : length in bytes of RSA private exponent + */ struct rsa_key { - MPI n; - MPI e; - MPI d; + const u8 *n; + const u8 *e; + const u8 *d; + size_t n_sz; + size_t e_sz; + size_t d_sz; }; int rsa_parse_pub_key(struct rsa_key *rsa_key, const void *key, @@ -26,7 +38,5 @@ int rsa_parse_pub_key(struct rsa_key *rsa_key, const void *key, int rsa_parse_priv_key(struct rsa_key *rsa_key, const void *key, unsigned int key_len); -void rsa_free_key(struct rsa_key *rsa_key); - extern struct crypto_template rsa_pkcs1pad_tmpl; #endif