blob: 3beee3976ed5327f13f64b2afb4497a7e963ed4d [file] [log] [blame]
David Howells4ae71c12012-09-21 23:25:04 +01001/* Signature verification with an asymmetric key
2 *
3 * See Documentation/security/asymmetric-keys.txt
4 *
5 * Copyright (C) 2012 Red Hat, Inc. All Rights Reserved.
6 * Written by David Howells (dhowells@redhat.com)
7 *
8 * This program is free software; you can redistribute it and/or
9 * modify it under the terms of the GNU General Public Licence
10 * as published by the Free Software Foundation; either version
11 * 2 of the Licence, or (at your option) any later version.
12 */
13
David Howellsc3ce6df2014-09-02 13:52:15 +010014#define pr_fmt(fmt) "SIG: "fmt
David Howells4ae71c12012-09-21 23:25:04 +010015#include <keys/asymmetric-subtype.h>
Paul Gortmaker1f6a9ab2015-12-09 15:05:28 -050016#include <linux/export.h>
David Howells4ae71c12012-09-21 23:25:04 +010017#include <linux/err.h>
David Howells3b764562016-04-06 16:13:33 +010018#include <linux/slab.h>
David Howells4ae71c12012-09-21 23:25:04 +010019#include <crypto/public_key.h>
20#include "asymmetric_keys.h"
21
David Howells3b764562016-04-06 16:13:33 +010022/*
23 * Destroy a public key signature.
24 */
25void public_key_signature_free(struct public_key_signature *sig)
26{
27 if (sig) {
28 kfree(sig->s);
29 kfree(sig->digest);
30 kfree(sig);
31 }
32}
33EXPORT_SYMBOL_GPL(public_key_signature_free);
34
David Howells4ae71c12012-09-21 23:25:04 +010035/**
36 * verify_signature - Initiate the use of an asymmetric key to verify a signature
37 * @key: The asymmetric key to verify against
38 * @sig: The signature to check
39 *
40 * Returns 0 if successful or else an error.
41 */
42int verify_signature(const struct key *key,
43 const struct public_key_signature *sig)
44{
45 const struct asymmetric_key_subtype *subtype;
46 int ret;
47
48 pr_devel("==>%s()\n", __func__);
49
50 if (key->type != &key_type_asymmetric)
51 return -EINVAL;
52 subtype = asymmetric_key_subtype(key);
53 if (!subtype ||
David Howells146aa8b2015-10-21 14:04:48 +010054 !key->payload.data[0])
David Howells4ae71c12012-09-21 23:25:04 +010055 return -EINVAL;
56 if (!subtype->verify_signature)
57 return -ENOTSUPP;
58
59 ret = subtype->verify_signature(key, sig);
60
61 pr_devel("<==%s() = %d\n", __func__, ret);
62 return ret;
63}
64EXPORT_SYMBOL_GPL(verify_signature);