David Howells | a9681bf | 2012-09-21 23:24:55 +0100 | [diff] [blame] | 1 | /* Asymmetric public-key algorithm definitions |
| 2 | * |
| 3 | * See Documentation/crypto/asymmetric-keys.txt |
| 4 | * |
| 5 | * Copyright (C) 2012 Red Hat, Inc. All Rights Reserved. |
| 6 | * Written by David Howells (dhowells@redhat.com) |
| 7 | * |
| 8 | * This program is free software; you can redistribute it and/or |
| 9 | * modify it under the terms of the GNU General Public Licence |
| 10 | * as published by the Free Software Foundation; either version |
| 11 | * 2 of the Licence, or (at your option) any later version. |
| 12 | */ |
| 13 | |
| 14 | #ifndef _LINUX_PUBLIC_KEY_H |
| 15 | #define _LINUX_PUBLIC_KEY_H |
| 16 | |
| 17 | #include <linux/mpi.h> |
David Howells | 46963b7 | 2014-09-16 17:36:13 +0100 | [diff] [blame] | 18 | #include <keys/asymmetric-type.h> |
Dmitry Kasatkin | 3fe78ca | 2013-05-06 15:58:15 +0300 | [diff] [blame] | 19 | #include <crypto/hash_info.h> |
David Howells | a9681bf | 2012-09-21 23:24:55 +0100 | [diff] [blame] | 20 | |
| 21 | enum pkey_algo { |
| 22 | PKEY_ALGO_DSA, |
| 23 | PKEY_ALGO_RSA, |
| 24 | PKEY_ALGO__LAST |
| 25 | }; |
| 26 | |
David Howells | 9abc4e6 | 2013-08-30 16:15:10 +0100 | [diff] [blame] | 27 | extern const char *const pkey_algo_name[PKEY_ALGO__LAST]; |
David Howells | 206ce59 | 2013-08-30 16:15:18 +0100 | [diff] [blame] | 28 | extern const struct public_key_algorithm *pkey_algo[PKEY_ALGO__LAST]; |
David Howells | a9681bf | 2012-09-21 23:24:55 +0100 | [diff] [blame] | 29 | |
Dmitry Kasatkin | 3fe78ca | 2013-05-06 15:58:15 +0300 | [diff] [blame] | 30 | /* asymmetric key implementation supports only up to SHA224 */ |
| 31 | #define PKEY_HASH__LAST (HASH_ALGO_SHA224 + 1) |
David Howells | a9681bf | 2012-09-21 23:24:55 +0100 | [diff] [blame] | 32 | |
| 33 | enum pkey_id_type { |
| 34 | PKEY_ID_PGP, /* OpenPGP generated key ID */ |
| 35 | PKEY_ID_X509, /* X.509 arbitrary subjectKeyIdentifier */ |
David Howells | bc1c373 | 2015-07-20 21:16:27 +0100 | [diff] [blame] | 36 | PKEY_ID_PKCS7, /* Signature in PKCS#7 message */ |
David Howells | a9681bf | 2012-09-21 23:24:55 +0100 | [diff] [blame] | 37 | PKEY_ID_TYPE__LAST |
| 38 | }; |
| 39 | |
David Howells | 9abc4e6 | 2013-08-30 16:15:10 +0100 | [diff] [blame] | 40 | extern const char *const pkey_id_type_name[PKEY_ID_TYPE__LAST]; |
David Howells | a9681bf | 2012-09-21 23:24:55 +0100 | [diff] [blame] | 41 | |
| 42 | /* |
David Howells | 99db443 | 2015-08-05 15:22:27 +0100 | [diff] [blame] | 43 | * The use to which an asymmetric key is being put. |
| 44 | */ |
| 45 | enum key_being_used_for { |
| 46 | VERIFYING_MODULE_SIGNATURE, |
| 47 | VERIFYING_FIRMWARE_SIGNATURE, |
| 48 | VERIFYING_KEXEC_PE_SIGNATURE, |
| 49 | VERIFYING_KEY_SIGNATURE, |
| 50 | VERIFYING_KEY_SELF_SIGNATURE, |
| 51 | VERIFYING_UNSPECIFIED_SIGNATURE, |
| 52 | NR__KEY_BEING_USED_FOR |
| 53 | }; |
| 54 | extern const char *const key_being_used_for[NR__KEY_BEING_USED_FOR]; |
| 55 | |
| 56 | /* |
David Howells | a9681bf | 2012-09-21 23:24:55 +0100 | [diff] [blame] | 57 | * Cryptographic data for the public-key subtype of the asymmetric key type. |
| 58 | * |
| 59 | * Note that this may include private part of the key as well as the public |
| 60 | * part. |
| 61 | */ |
| 62 | struct public_key { |
| 63 | const struct public_key_algorithm *algo; |
| 64 | u8 capabilities; |
| 65 | #define PKEY_CAN_ENCRYPT 0x01 |
| 66 | #define PKEY_CAN_DECRYPT 0x02 |
| 67 | #define PKEY_CAN_SIGN 0x04 |
| 68 | #define PKEY_CAN_VERIFY 0x08 |
David Howells | 67f7d60b | 2013-08-30 16:15:24 +0100 | [diff] [blame] | 69 | enum pkey_algo pkey_algo : 8; |
David Howells | a9681bf | 2012-09-21 23:24:55 +0100 | [diff] [blame] | 70 | enum pkey_id_type id_type : 8; |
| 71 | union { |
| 72 | MPI mpi[5]; |
| 73 | struct { |
| 74 | MPI p; /* DSA prime */ |
| 75 | MPI q; /* DSA group order */ |
| 76 | MPI g; /* DSA group generator */ |
| 77 | MPI y; /* DSA public-key value = g^x mod p */ |
| 78 | MPI x; /* DSA secret exponent (if present) */ |
| 79 | } dsa; |
| 80 | struct { |
| 81 | MPI n; /* RSA public modulus */ |
| 82 | MPI e; /* RSA public encryption exponent */ |
| 83 | MPI d; /* RSA secret encryption exponent (if present) */ |
| 84 | MPI p; /* RSA secret prime (if present) */ |
| 85 | MPI q; /* RSA secret prime (if present) */ |
| 86 | } rsa; |
| 87 | }; |
| 88 | }; |
| 89 | |
| 90 | extern void public_key_destroy(void *payload); |
| 91 | |
| 92 | /* |
| 93 | * Public key cryptography signature data |
| 94 | */ |
| 95 | struct public_key_signature { |
| 96 | u8 *digest; |
| 97 | u8 digest_size; /* Number of bytes in digest */ |
| 98 | u8 nr_mpi; /* Occupancy of mpi[] */ |
David Howells | 1573801 | 2013-08-30 16:15:37 +0100 | [diff] [blame] | 99 | enum pkey_algo pkey_algo : 8; |
Dmitry Kasatkin | 3fe78ca | 2013-05-06 15:58:15 +0300 | [diff] [blame] | 100 | enum hash_algo pkey_hash_algo : 8; |
David Howells | a9681bf | 2012-09-21 23:24:55 +0100 | [diff] [blame] | 101 | union { |
| 102 | MPI mpi[2]; |
| 103 | struct { |
| 104 | MPI s; /* m^d mod n */ |
| 105 | } rsa; |
| 106 | struct { |
| 107 | MPI r; |
| 108 | MPI s; |
| 109 | } dsa; |
| 110 | }; |
| 111 | }; |
| 112 | |
David Howells | 4ae71c1 | 2012-09-21 23:25:04 +0100 | [diff] [blame] | 113 | struct key; |
| 114 | extern int verify_signature(const struct key *key, |
| 115 | const struct public_key_signature *sig); |
| 116 | |
David Howells | 46963b7 | 2014-09-16 17:36:13 +0100 | [diff] [blame] | 117 | struct asymmetric_key_id; |
David Howells | 5ce43ad | 2014-07-28 14:11:32 +0100 | [diff] [blame] | 118 | extern struct key *x509_request_asymmetric_key(struct key *keyring, |
David Howells | 4573b64 | 2015-07-20 21:16:26 +0100 | [diff] [blame] | 119 | const struct asymmetric_key_id *id, |
| 120 | const struct asymmetric_key_id *skid, |
Dmitry Kasatkin | f1b731d | 2014-10-06 15:21:05 +0100 | [diff] [blame] | 121 | bool partial); |
David Howells | 5ce43ad | 2014-07-28 14:11:32 +0100 | [diff] [blame] | 122 | |
David Howells | a9681bf | 2012-09-21 23:24:55 +0100 | [diff] [blame] | 123 | #endif /* _LINUX_PUBLIC_KEY_H */ |