2024-09-10 14:30:25 +00:00
|
|
|
// SPDX-License-Identifier: GPL-2.0+
|
|
|
|
/*
|
|
|
|
* ECDSA X9.62 signature encoding
|
|
|
|
*
|
|
|
|
* Copyright (c) 2021 IBM Corporation
|
|
|
|
* Copyright (c) 2024 Intel Corporation
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <linux/asn1_decoder.h>
|
|
|
|
#include <linux/err.h>
|
|
|
|
#include <linux/module.h>
|
|
|
|
#include <crypto/algapi.h>
|
|
|
|
#include <crypto/sig.h>
|
|
|
|
#include <crypto/internal/ecc.h>
|
|
|
|
#include <crypto/internal/sig.h>
|
|
|
|
|
|
|
|
#include "ecdsasignature.asn1.h"
|
|
|
|
|
|
|
|
struct ecdsa_x962_ctx {
|
|
|
|
struct crypto_sig *child;
|
|
|
|
};
|
|
|
|
|
|
|
|
struct ecdsa_x962_signature_ctx {
|
|
|
|
struct ecdsa_raw_sig sig;
|
|
|
|
unsigned int ndigits;
|
|
|
|
};
|
|
|
|
|
|
|
|
/* Get the r and s components of a signature from the X.509 certificate. */
|
|
|
|
static int ecdsa_get_signature_rs(u64 *dest, size_t hdrlen, unsigned char tag,
|
|
|
|
const void *value, size_t vlen,
|
|
|
|
unsigned int ndigits)
|
|
|
|
{
|
|
|
|
size_t bufsize = ndigits * sizeof(u64);
|
|
|
|
const char *d = value;
|
|
|
|
|
|
|
|
if (!value || !vlen || vlen > bufsize + 1)
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* vlen may be 1 byte larger than bufsize due to a leading zero byte
|
|
|
|
* (necessary if the most significant bit of the integer is set).
|
|
|
|
*/
|
|
|
|
if (vlen > bufsize) {
|
|
|
|
/* skip over leading zeros that make 'value' a positive int */
|
|
|
|
if (*d == 0) {
|
|
|
|
vlen -= 1;
|
|
|
|
d++;
|
|
|
|
} else {
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
ecc_digits_from_bytes(d, vlen, dest, ndigits);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
int ecdsa_get_signature_r(void *context, size_t hdrlen, unsigned char tag,
|
|
|
|
const void *value, size_t vlen)
|
|
|
|
{
|
|
|
|
struct ecdsa_x962_signature_ctx *sig_ctx = context;
|
|
|
|
|
|
|
|
return ecdsa_get_signature_rs(sig_ctx->sig.r, hdrlen, tag, value, vlen,
|
|
|
|
sig_ctx->ndigits);
|
|
|
|
}
|
|
|
|
|
|
|
|
int ecdsa_get_signature_s(void *context, size_t hdrlen, unsigned char tag,
|
|
|
|
const void *value, size_t vlen)
|
|
|
|
{
|
|
|
|
struct ecdsa_x962_signature_ctx *sig_ctx = context;
|
|
|
|
|
|
|
|
return ecdsa_get_signature_rs(sig_ctx->sig.s, hdrlen, tag, value, vlen,
|
|
|
|
sig_ctx->ndigits);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int ecdsa_x962_verify(struct crypto_sig *tfm,
|
|
|
|
const void *src, unsigned int slen,
|
|
|
|
const void *digest, unsigned int dlen)
|
|
|
|
{
|
|
|
|
struct ecdsa_x962_ctx *ctx = crypto_sig_ctx(tfm);
|
|
|
|
struct ecdsa_x962_signature_ctx sig_ctx;
|
|
|
|
int err;
|
|
|
|
|
2024-09-10 14:30:26 +00:00
|
|
|
sig_ctx.ndigits = DIV_ROUND_UP(crypto_sig_keysize(ctx->child),
|
2024-09-10 14:30:25 +00:00
|
|
|
sizeof(u64));
|
|
|
|
|
|
|
|
err = asn1_ber_decoder(&ecdsasignature_decoder, &sig_ctx, src, slen);
|
|
|
|
if (err < 0)
|
|
|
|
return err;
|
|
|
|
|
|
|
|
return crypto_sig_verify(ctx->child, &sig_ctx.sig, sizeof(sig_ctx.sig),
|
|
|
|
digest, dlen);
|
|
|
|
}
|
|
|
|
|
2024-09-10 14:30:26 +00:00
|
|
|
static unsigned int ecdsa_x962_key_size(struct crypto_sig *tfm)
|
2024-09-10 14:30:25 +00:00
|
|
|
{
|
|
|
|
struct ecdsa_x962_ctx *ctx = crypto_sig_ctx(tfm);
|
|
|
|
|
2024-09-10 14:30:26 +00:00
|
|
|
return crypto_sig_keysize(ctx->child);
|
2024-09-10 14:30:25 +00:00
|
|
|
}
|
|
|
|
|
2024-09-10 14:30:27 +00:00
|
|
|
static unsigned int ecdsa_x962_max_size(struct crypto_sig *tfm)
|
|
|
|
{
|
|
|
|
struct ecdsa_x962_ctx *ctx = crypto_sig_ctx(tfm);
|
|
|
|
struct sig_alg *alg = crypto_sig_alg(ctx->child);
|
|
|
|
int slen = crypto_sig_keysize(ctx->child);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Verify takes ECDSA-Sig-Value (described in RFC 5480) as input,
|
|
|
|
* which is actually 2 'key_size'-bit integers encoded in ASN.1.
|
|
|
|
* Account for the ASN.1 encoding overhead here.
|
|
|
|
*
|
|
|
|
* NIST P192/256/384 may prepend a '0' to a coordinate to indicate
|
|
|
|
* a positive integer. NIST P521 never needs it.
|
|
|
|
*/
|
|
|
|
if (strcmp(alg->base.cra_name, "ecdsa-nist-p521") != 0)
|
|
|
|
slen += 1;
|
|
|
|
|
|
|
|
/* Length of encoding the x & y coordinates */
|
|
|
|
slen = 2 * (slen + 2);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* If coordinate encoding takes at least 128 bytes then an
|
|
|
|
* additional byte for length encoding is needed.
|
|
|
|
*/
|
|
|
|
return 1 + (slen >= 128) + 1 + slen;
|
|
|
|
}
|
|
|
|
|
|
|
|
static unsigned int ecdsa_x962_digest_size(struct crypto_sig *tfm)
|
|
|
|
{
|
|
|
|
struct ecdsa_x962_ctx *ctx = crypto_sig_ctx(tfm);
|
|
|
|
|
|
|
|
return crypto_sig_digestsize(ctx->child);
|
|
|
|
}
|
|
|
|
|
2024-09-10 14:30:25 +00:00
|
|
|
static int ecdsa_x962_set_pub_key(struct crypto_sig *tfm,
|
|
|
|
const void *key, unsigned int keylen)
|
|
|
|
{
|
|
|
|
struct ecdsa_x962_ctx *ctx = crypto_sig_ctx(tfm);
|
|
|
|
|
|
|
|
return crypto_sig_set_pubkey(ctx->child, key, keylen);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int ecdsa_x962_init_tfm(struct crypto_sig *tfm)
|
|
|
|
{
|
|
|
|
struct sig_instance *inst = sig_alg_instance(tfm);
|
|
|
|
struct crypto_sig_spawn *spawn = sig_instance_ctx(inst);
|
|
|
|
struct ecdsa_x962_ctx *ctx = crypto_sig_ctx(tfm);
|
|
|
|
struct crypto_sig *child_tfm;
|
|
|
|
|
|
|
|
child_tfm = crypto_spawn_sig(spawn);
|
|
|
|
if (IS_ERR(child_tfm))
|
|
|
|
return PTR_ERR(child_tfm);
|
|
|
|
|
|
|
|
ctx->child = child_tfm;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void ecdsa_x962_exit_tfm(struct crypto_sig *tfm)
|
|
|
|
{
|
|
|
|
struct ecdsa_x962_ctx *ctx = crypto_sig_ctx(tfm);
|
|
|
|
|
|
|
|
crypto_free_sig(ctx->child);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void ecdsa_x962_free(struct sig_instance *inst)
|
|
|
|
{
|
|
|
|
struct crypto_sig_spawn *spawn = sig_instance_ctx(inst);
|
|
|
|
|
|
|
|
crypto_drop_sig(spawn);
|
|
|
|
kfree(inst);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int ecdsa_x962_create(struct crypto_template *tmpl, struct rtattr **tb)
|
|
|
|
{
|
|
|
|
struct crypto_sig_spawn *spawn;
|
|
|
|
struct sig_instance *inst;
|
|
|
|
struct sig_alg *ecdsa_alg;
|
|
|
|
u32 mask;
|
|
|
|
int err;
|
|
|
|
|
|
|
|
err = crypto_check_attr_type(tb, CRYPTO_ALG_TYPE_SIG, &mask);
|
|
|
|
if (err)
|
|
|
|
return err;
|
|
|
|
|
|
|
|
inst = kzalloc(sizeof(*inst) + sizeof(*spawn), GFP_KERNEL);
|
|
|
|
if (!inst)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
spawn = sig_instance_ctx(inst);
|
|
|
|
|
|
|
|
err = crypto_grab_sig(spawn, sig_crypto_instance(inst),
|
|
|
|
crypto_attr_alg_name(tb[1]), 0, mask);
|
|
|
|
if (err)
|
|
|
|
goto err_free_inst;
|
|
|
|
|
|
|
|
ecdsa_alg = crypto_spawn_sig_alg(spawn);
|
|
|
|
|
|
|
|
err = -EINVAL;
|
|
|
|
if (strncmp(ecdsa_alg->base.cra_name, "ecdsa", 5) != 0)
|
|
|
|
goto err_free_inst;
|
|
|
|
|
|
|
|
err = crypto_inst_setname(sig_crypto_instance(inst), tmpl->name,
|
|
|
|
&ecdsa_alg->base);
|
|
|
|
if (err)
|
|
|
|
goto err_free_inst;
|
|
|
|
|
|
|
|
inst->alg.base.cra_priority = ecdsa_alg->base.cra_priority;
|
|
|
|
inst->alg.base.cra_ctxsize = sizeof(struct ecdsa_x962_ctx);
|
|
|
|
|
|
|
|
inst->alg.init = ecdsa_x962_init_tfm;
|
|
|
|
inst->alg.exit = ecdsa_x962_exit_tfm;
|
|
|
|
|
|
|
|
inst->alg.verify = ecdsa_x962_verify;
|
2024-09-10 14:30:26 +00:00
|
|
|
inst->alg.key_size = ecdsa_x962_key_size;
|
2024-09-10 14:30:27 +00:00
|
|
|
inst->alg.max_size = ecdsa_x962_max_size;
|
|
|
|
inst->alg.digest_size = ecdsa_x962_digest_size;
|
2024-09-10 14:30:25 +00:00
|
|
|
inst->alg.set_pub_key = ecdsa_x962_set_pub_key;
|
|
|
|
|
|
|
|
inst->free = ecdsa_x962_free;
|
|
|
|
|
|
|
|
err = sig_register_instance(tmpl, inst);
|
|
|
|
if (err) {
|
|
|
|
err_free_inst:
|
|
|
|
ecdsa_x962_free(inst);
|
|
|
|
}
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
struct crypto_template ecdsa_x962_tmpl = {
|
|
|
|
.name = "x962",
|
|
|
|
.create = ecdsa_x962_create,
|
|
|
|
.module = THIS_MODULE,
|
|
|
|
};
|
|
|
|
|
|
|
|
MODULE_ALIAS_CRYPTO("x962");
|