| /* Asymmetric public-key algorithm definitions |
| * |
| * See Documentation/crypto/asymmetric-keys.txt |
| * |
| * Copyright (C) 2012 Red Hat, Inc. All Rights Reserved. |
| * Written by David Howells (dhowells@redhat.com) |
| * |
| * This program is free software; you can redistribute it and/or |
| * modify it under the terms of the GNU General Public Licence |
| * as published by the Free Software Foundation; either version |
| * 2 of the Licence, or (at your option) any later version. |
| */ |
| |
| #ifndef _LINUX_PUBLIC_KEY_H |
| #define _LINUX_PUBLIC_KEY_H |
| |
| #include <linux/mpi.h> |
| #include <keys/asymmetric-type.h> |
| #include <crypto/hash_info.h> |
| |
| enum pkey_algo { |
| PKEY_ALGO_DSA, |
| PKEY_ALGO_RSA, |
| PKEY_ALGO__LAST |
| }; |
| |
| extern const char *const pkey_algo_name[PKEY_ALGO__LAST]; |
| extern const struct public_key_algorithm *pkey_algo[PKEY_ALGO__LAST]; |
| |
| /* asymmetric key implementation supports only up to SHA224 */ |
| #define PKEY_HASH__LAST (HASH_ALGO_SHA224 + 1) |
| |
| enum pkey_id_type { |
| PKEY_ID_PGP, /* OpenPGP generated key ID */ |
| PKEY_ID_X509, /* X.509 arbitrary subjectKeyIdentifier */ |
| PKEY_ID_PKCS7, /* Signature in PKCS#7 message */ |
| PKEY_ID_TYPE__LAST |
| }; |
| |
| extern const char *const pkey_id_type_name[PKEY_ID_TYPE__LAST]; |
| |
| /* |
| * The use to which an asymmetric key is being put. |
| */ |
| enum key_being_used_for { |
| VERIFYING_MODULE_SIGNATURE, |
| VERIFYING_FIRMWARE_SIGNATURE, |
| VERIFYING_KEXEC_PE_SIGNATURE, |
| VERIFYING_KEY_SIGNATURE, |
| VERIFYING_KEY_SELF_SIGNATURE, |
| VERIFYING_UNSPECIFIED_SIGNATURE, |
| NR__KEY_BEING_USED_FOR |
| }; |
| extern const char *const key_being_used_for[NR__KEY_BEING_USED_FOR]; |
| |
| /* |
| * Cryptographic data for the public-key subtype of the asymmetric key type. |
| * |
| * Note that this may include private part of the key as well as the public |
| * part. |
| */ |
| struct public_key { |
| const struct public_key_algorithm *algo; |
| u8 capabilities; |
| #define PKEY_CAN_ENCRYPT 0x01 |
| #define PKEY_CAN_DECRYPT 0x02 |
| #define PKEY_CAN_SIGN 0x04 |
| #define PKEY_CAN_VERIFY 0x08 |
| enum pkey_algo pkey_algo : 8; |
| enum pkey_id_type id_type : 8; |
| union { |
| MPI mpi[5]; |
| struct { |
| MPI p; /* DSA prime */ |
| MPI q; /* DSA group order */ |
| MPI g; /* DSA group generator */ |
| MPI y; /* DSA public-key value = g^x mod p */ |
| MPI x; /* DSA secret exponent (if present) */ |
| } dsa; |
| struct { |
| MPI n; /* RSA public modulus */ |
| MPI e; /* RSA public encryption exponent */ |
| MPI d; /* RSA secret encryption exponent (if present) */ |
| MPI p; /* RSA secret prime (if present) */ |
| MPI q; /* RSA secret prime (if present) */ |
| } rsa; |
| }; |
| }; |
| |
| extern void public_key_destroy(void *payload); |
| |
| /* |
| * Public key cryptography signature data |
| */ |
| struct public_key_signature { |
| u8 *digest; |
| u8 digest_size; /* Number of bytes in digest */ |
| u8 nr_mpi; /* Occupancy of mpi[] */ |
| enum pkey_algo pkey_algo : 8; |
| enum hash_algo pkey_hash_algo : 8; |
| union { |
| MPI mpi[2]; |
| struct { |
| MPI s; /* m^d mod n */ |
| } rsa; |
| struct { |
| MPI r; |
| MPI s; |
| } dsa; |
| }; |
| }; |
| |
| struct key; |
| extern int verify_signature(const struct key *key, |
| const struct public_key_signature *sig); |
| |
| struct asymmetric_key_id; |
| extern struct key *x509_request_asymmetric_key(struct key *keyring, |
| const struct asymmetric_key_id *id, |
| const struct asymmetric_key_id *skid, |
| bool partial); |
| |
| #endif /* _LINUX_PUBLIC_KEY_H */ |