blob: 067c242b1e152d013f746424ceebd417112154a7 [file] [log] [blame]
David Howellsa9681bf2012-09-21 23:24:55 +01001/* Asymmetric public-key algorithm definitions
2 *
3 * See Documentation/crypto/asymmetric-keys.txt
4 *
5 * Copyright (C) 2012 Red Hat, Inc. All Rights Reserved.
6 * Written by David Howells (dhowells@redhat.com)
7 *
8 * This program is free software; you can redistribute it and/or
9 * modify it under the terms of the GNU General Public Licence
10 * as published by the Free Software Foundation; either version
11 * 2 of the Licence, or (at your option) any later version.
12 */
13
14#ifndef _LINUX_PUBLIC_KEY_H
15#define _LINUX_PUBLIC_KEY_H
16
17#include <linux/mpi.h>
David Howells46963b72014-09-16 17:36:13 +010018#include <keys/asymmetric-type.h>
Dmitry Kasatkin3fe78ca2013-05-06 15:58:15 +030019#include <crypto/hash_info.h>
David Howellsa9681bf2012-09-21 23:24:55 +010020
21enum pkey_algo {
22 PKEY_ALGO_DSA,
23 PKEY_ALGO_RSA,
24 PKEY_ALGO__LAST
25};
26
David Howells9abc4e62013-08-30 16:15:10 +010027extern const char *const pkey_algo_name[PKEY_ALGO__LAST];
David Howells206ce592013-08-30 16:15:18 +010028extern const struct public_key_algorithm *pkey_algo[PKEY_ALGO__LAST];
David Howellsa9681bf2012-09-21 23:24:55 +010029
Dmitry Kasatkin3fe78ca2013-05-06 15:58:15 +030030/* asymmetric key implementation supports only up to SHA224 */
31#define PKEY_HASH__LAST (HASH_ALGO_SHA224 + 1)
David Howellsa9681bf2012-09-21 23:24:55 +010032
33enum pkey_id_type {
34 PKEY_ID_PGP, /* OpenPGP generated key ID */
35 PKEY_ID_X509, /* X.509 arbitrary subjectKeyIdentifier */
David Howellsbc1c3732015-07-20 21:16:27 +010036 PKEY_ID_PKCS7, /* Signature in PKCS#7 message */
David Howellsa9681bf2012-09-21 23:24:55 +010037 PKEY_ID_TYPE__LAST
38};
39
David Howells9abc4e62013-08-30 16:15:10 +010040extern const char *const pkey_id_type_name[PKEY_ID_TYPE__LAST];
David Howellsa9681bf2012-09-21 23:24:55 +010041
42/*
David Howells99db4432015-08-05 15:22:27 +010043 * The use to which an asymmetric key is being put.
44 */
45enum key_being_used_for {
46 VERIFYING_MODULE_SIGNATURE,
47 VERIFYING_FIRMWARE_SIGNATURE,
48 VERIFYING_KEXEC_PE_SIGNATURE,
49 VERIFYING_KEY_SIGNATURE,
50 VERIFYING_KEY_SELF_SIGNATURE,
51 VERIFYING_UNSPECIFIED_SIGNATURE,
52 NR__KEY_BEING_USED_FOR
53};
54extern const char *const key_being_used_for[NR__KEY_BEING_USED_FOR];
55
56/*
David Howellsa9681bf2012-09-21 23:24:55 +010057 * Cryptographic data for the public-key subtype of the asymmetric key type.
58 *
59 * Note that this may include private part of the key as well as the public
60 * part.
61 */
62struct public_key {
63 const struct public_key_algorithm *algo;
64 u8 capabilities;
65#define PKEY_CAN_ENCRYPT 0x01
66#define PKEY_CAN_DECRYPT 0x02
67#define PKEY_CAN_SIGN 0x04
68#define PKEY_CAN_VERIFY 0x08
David Howells67f7d60b2013-08-30 16:15:24 +010069 enum pkey_algo pkey_algo : 8;
David Howellsa9681bf2012-09-21 23:24:55 +010070 enum pkey_id_type id_type : 8;
71 union {
72 MPI mpi[5];
73 struct {
74 MPI p; /* DSA prime */
75 MPI q; /* DSA group order */
76 MPI g; /* DSA group generator */
77 MPI y; /* DSA public-key value = g^x mod p */
78 MPI x; /* DSA secret exponent (if present) */
79 } dsa;
80 struct {
81 MPI n; /* RSA public modulus */
82 MPI e; /* RSA public encryption exponent */
83 MPI d; /* RSA secret encryption exponent (if present) */
84 MPI p; /* RSA secret prime (if present) */
85 MPI q; /* RSA secret prime (if present) */
86 } rsa;
87 };
88};
89
90extern void public_key_destroy(void *payload);
91
92/*
93 * Public key cryptography signature data
94 */
95struct public_key_signature {
96 u8 *digest;
97 u8 digest_size; /* Number of bytes in digest */
98 u8 nr_mpi; /* Occupancy of mpi[] */
David Howells15738012013-08-30 16:15:37 +010099 enum pkey_algo pkey_algo : 8;
Dmitry Kasatkin3fe78ca2013-05-06 15:58:15 +0300100 enum hash_algo pkey_hash_algo : 8;
David Howellsa9681bf2012-09-21 23:24:55 +0100101 union {
102 MPI mpi[2];
103 struct {
104 MPI s; /* m^d mod n */
105 } rsa;
106 struct {
107 MPI r;
108 MPI s;
109 } dsa;
110 };
111};
112
David Howells4ae71c12012-09-21 23:25:04 +0100113struct key;
114extern int verify_signature(const struct key *key,
115 const struct public_key_signature *sig);
116
David Howells46963b72014-09-16 17:36:13 +0100117struct asymmetric_key_id;
David Howells5ce43ad2014-07-28 14:11:32 +0100118extern struct key *x509_request_asymmetric_key(struct key *keyring,
David Howells4573b642015-07-20 21:16:26 +0100119 const struct asymmetric_key_id *id,
120 const struct asymmetric_key_id *skid,
Dmitry Kasatkinf1b731d2014-10-06 15:21:05 +0100121 bool partial);
David Howells5ce43ad2014-07-28 14:11:32 +0100122
David Howellsa9681bf2012-09-21 23:24:55 +0100123#endif /* _LINUX_PUBLIC_KEY_H */