mirror of
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
synced 2024-12-28 08:45:51 +00:00
b04163863c
Alternatively to the X9.62 encoding of ecdsa signatures, which uses ASN.1 and is already supported by the kernel, there's another common encoding called P1363. It stores r and s as the concatenation of two big endian, unsigned integers. The name originates from IEEE P1363. Add a P1363 template in support of the forthcoming SPDM library (Security Protocol and Data Model) for PCI device authentication. P1363 is prescribed by SPDM 1.2.1 margin no 44: "For ECDSA signatures, excluding SM2, in SPDM, the signature shall be the concatenation of r and s. The size of r shall be the size of the selected curve. Likewise, the size of s shall be the size of the selected curve. See BaseAsymAlgo in NEGOTIATE_ALGORITHMS for the size of r and s. The byte order for r and s shall be in big endian order. When placing ECDSA signatures into an SPDM signature field, r shall come first followed by s." Link: https://www.dmtf.org/sites/default/files/standards/documents/DSP0274_1.2.1.pdf Signed-off-by: Lukas Wunner <lukas@wunner.de> Reviewed-by: Jonathan Cameron <Jonathan.Cameron@huawei.com> Reviewed-by: Stefan Berger <stefanb@linux.ibm.com> Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
160 lines
3.8 KiB
C
160 lines
3.8 KiB
C
// SPDX-License-Identifier: GPL-2.0
|
|
/*
|
|
* ECDSA P1363 signature encoding
|
|
*
|
|
* Copyright (c) 2024 Intel Corporation
|
|
*/
|
|
|
|
#include <linux/err.h>
|
|
#include <linux/module.h>
|
|
#include <crypto/algapi.h>
|
|
#include <crypto/sig.h>
|
|
#include <crypto/internal/ecc.h>
|
|
#include <crypto/internal/sig.h>
|
|
|
|
struct ecdsa_p1363_ctx {
|
|
struct crypto_sig *child;
|
|
};
|
|
|
|
static int ecdsa_p1363_verify(struct crypto_sig *tfm,
|
|
const void *src, unsigned int slen,
|
|
const void *digest, unsigned int dlen)
|
|
{
|
|
struct ecdsa_p1363_ctx *ctx = crypto_sig_ctx(tfm);
|
|
unsigned int keylen = crypto_sig_keysize(ctx->child);
|
|
unsigned int ndigits = DIV_ROUND_UP(keylen, sizeof(u64));
|
|
struct ecdsa_raw_sig sig;
|
|
|
|
if (slen != 2 * keylen)
|
|
return -EINVAL;
|
|
|
|
ecc_digits_from_bytes(src, keylen, sig.r, ndigits);
|
|
ecc_digits_from_bytes(src + keylen, keylen, sig.s, ndigits);
|
|
|
|
return crypto_sig_verify(ctx->child, &sig, sizeof(sig), digest, dlen);
|
|
}
|
|
|
|
static unsigned int ecdsa_p1363_key_size(struct crypto_sig *tfm)
|
|
{
|
|
struct ecdsa_p1363_ctx *ctx = crypto_sig_ctx(tfm);
|
|
|
|
return crypto_sig_keysize(ctx->child);
|
|
}
|
|
|
|
static unsigned int ecdsa_p1363_max_size(struct crypto_sig *tfm)
|
|
{
|
|
struct ecdsa_p1363_ctx *ctx = crypto_sig_ctx(tfm);
|
|
|
|
return 2 * crypto_sig_keysize(ctx->child);
|
|
}
|
|
|
|
static unsigned int ecdsa_p1363_digest_size(struct crypto_sig *tfm)
|
|
{
|
|
struct ecdsa_p1363_ctx *ctx = crypto_sig_ctx(tfm);
|
|
|
|
return crypto_sig_digestsize(ctx->child);
|
|
}
|
|
|
|
static int ecdsa_p1363_set_pub_key(struct crypto_sig *tfm,
|
|
const void *key, unsigned int keylen)
|
|
{
|
|
struct ecdsa_p1363_ctx *ctx = crypto_sig_ctx(tfm);
|
|
|
|
return crypto_sig_set_pubkey(ctx->child, key, keylen);
|
|
}
|
|
|
|
static int ecdsa_p1363_init_tfm(struct crypto_sig *tfm)
|
|
{
|
|
struct sig_instance *inst = sig_alg_instance(tfm);
|
|
struct crypto_sig_spawn *spawn = sig_instance_ctx(inst);
|
|
struct ecdsa_p1363_ctx *ctx = crypto_sig_ctx(tfm);
|
|
struct crypto_sig *child_tfm;
|
|
|
|
child_tfm = crypto_spawn_sig(spawn);
|
|
if (IS_ERR(child_tfm))
|
|
return PTR_ERR(child_tfm);
|
|
|
|
ctx->child = child_tfm;
|
|
|
|
return 0;
|
|
}
|
|
|
|
static void ecdsa_p1363_exit_tfm(struct crypto_sig *tfm)
|
|
{
|
|
struct ecdsa_p1363_ctx *ctx = crypto_sig_ctx(tfm);
|
|
|
|
crypto_free_sig(ctx->child);
|
|
}
|
|
|
|
static void ecdsa_p1363_free(struct sig_instance *inst)
|
|
{
|
|
struct crypto_sig_spawn *spawn = sig_instance_ctx(inst);
|
|
|
|
crypto_drop_sig(spawn);
|
|
kfree(inst);
|
|
}
|
|
|
|
static int ecdsa_p1363_create(struct crypto_template *tmpl, struct rtattr **tb)
|
|
{
|
|
struct crypto_sig_spawn *spawn;
|
|
struct sig_instance *inst;
|
|
struct sig_alg *ecdsa_alg;
|
|
u32 mask;
|
|
int err;
|
|
|
|
err = crypto_check_attr_type(tb, CRYPTO_ALG_TYPE_SIG, &mask);
|
|
if (err)
|
|
return err;
|
|
|
|
inst = kzalloc(sizeof(*inst) + sizeof(*spawn), GFP_KERNEL);
|
|
if (!inst)
|
|
return -ENOMEM;
|
|
|
|
spawn = sig_instance_ctx(inst);
|
|
|
|
err = crypto_grab_sig(spawn, sig_crypto_instance(inst),
|
|
crypto_attr_alg_name(tb[1]), 0, mask);
|
|
if (err)
|
|
goto err_free_inst;
|
|
|
|
ecdsa_alg = crypto_spawn_sig_alg(spawn);
|
|
|
|
err = -EINVAL;
|
|
if (strncmp(ecdsa_alg->base.cra_name, "ecdsa", 5) != 0)
|
|
goto err_free_inst;
|
|
|
|
err = crypto_inst_setname(sig_crypto_instance(inst), tmpl->name,
|
|
&ecdsa_alg->base);
|
|
if (err)
|
|
goto err_free_inst;
|
|
|
|
inst->alg.base.cra_priority = ecdsa_alg->base.cra_priority;
|
|
inst->alg.base.cra_ctxsize = sizeof(struct ecdsa_p1363_ctx);
|
|
|
|
inst->alg.init = ecdsa_p1363_init_tfm;
|
|
inst->alg.exit = ecdsa_p1363_exit_tfm;
|
|
|
|
inst->alg.verify = ecdsa_p1363_verify;
|
|
inst->alg.key_size = ecdsa_p1363_key_size;
|
|
inst->alg.max_size = ecdsa_p1363_max_size;
|
|
inst->alg.digest_size = ecdsa_p1363_digest_size;
|
|
inst->alg.set_pub_key = ecdsa_p1363_set_pub_key;
|
|
|
|
inst->free = ecdsa_p1363_free;
|
|
|
|
err = sig_register_instance(tmpl, inst);
|
|
if (err) {
|
|
err_free_inst:
|
|
ecdsa_p1363_free(inst);
|
|
}
|
|
return err;
|
|
}
|
|
|
|
struct crypto_template ecdsa_p1363_tmpl = {
|
|
.name = "p1363",
|
|
.create = ecdsa_p1363_create,
|
|
.module = THIS_MODULE,
|
|
};
|
|
|
|
MODULE_ALIAS_CRYPTO("p1363");
|