forked from Qortal/Brooklyn
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
186 lines
4.0 KiB
186 lines
4.0 KiB
// SPDX-License-Identifier: GPL-2.0-or-later |
|
/* |
|
* RSA key extract helper |
|
* |
|
* Copyright (c) 2015, Intel Corporation |
|
* Authors: Tadeusz Struk <[email protected]> |
|
*/ |
|
#include <linux/kernel.h> |
|
#include <linux/export.h> |
|
#include <linux/err.h> |
|
#include <linux/fips.h> |
|
#include <crypto/internal/rsa.h> |
|
#include "rsapubkey.asn1.h" |
|
#include "rsaprivkey.asn1.h" |
|
|
|
int rsa_get_n(void *context, size_t hdrlen, unsigned char tag, |
|
const void *value, size_t vlen) |
|
{ |
|
struct rsa_key *key = context; |
|
const u8 *ptr = value; |
|
size_t n_sz = vlen; |
|
|
|
/* invalid key provided */ |
|
if (!value || !vlen) |
|
return -EINVAL; |
|
|
|
if (fips_enabled) { |
|
while (n_sz && !*ptr) { |
|
ptr++; |
|
n_sz--; |
|
} |
|
|
|
/* In FIPS mode only allow key size 2K and higher */ |
|
if (n_sz < 256) { |
|
pr_err("RSA: key size not allowed in FIPS mode\n"); |
|
return -EINVAL; |
|
} |
|
} |
|
|
|
key->n = value; |
|
key->n_sz = vlen; |
|
|
|
return 0; |
|
} |
|
|
|
int rsa_get_e(void *context, size_t hdrlen, unsigned char tag, |
|
const void *value, size_t vlen) |
|
{ |
|
struct rsa_key *key = context; |
|
|
|
/* invalid key provided */ |
|
if (!value || !key->n_sz || !vlen || vlen > key->n_sz) |
|
return -EINVAL; |
|
|
|
key->e = value; |
|
key->e_sz = vlen; |
|
|
|
return 0; |
|
} |
|
|
|
int rsa_get_d(void *context, size_t hdrlen, unsigned char tag, |
|
const void *value, size_t vlen) |
|
{ |
|
struct rsa_key *key = context; |
|
|
|
/* invalid key provided */ |
|
if (!value || !key->n_sz || !vlen || vlen > key->n_sz) |
|
return -EINVAL; |
|
|
|
key->d = value; |
|
key->d_sz = vlen; |
|
|
|
return 0; |
|
} |
|
|
|
int rsa_get_p(void *context, size_t hdrlen, unsigned char tag, |
|
const void *value, size_t vlen) |
|
{ |
|
struct rsa_key *key = context; |
|
|
|
/* invalid key provided */ |
|
if (!value || !vlen || vlen > key->n_sz) |
|
return -EINVAL; |
|
|
|
key->p = value; |
|
key->p_sz = vlen; |
|
|
|
return 0; |
|
} |
|
|
|
int rsa_get_q(void *context, size_t hdrlen, unsigned char tag, |
|
const void *value, size_t vlen) |
|
{ |
|
struct rsa_key *key = context; |
|
|
|
/* invalid key provided */ |
|
if (!value || !vlen || vlen > key->n_sz) |
|
return -EINVAL; |
|
|
|
key->q = value; |
|
key->q_sz = vlen; |
|
|
|
return 0; |
|
} |
|
|
|
int rsa_get_dp(void *context, size_t hdrlen, unsigned char tag, |
|
const void *value, size_t vlen) |
|
{ |
|
struct rsa_key *key = context; |
|
|
|
/* invalid key provided */ |
|
if (!value || !vlen || vlen > key->n_sz) |
|
return -EINVAL; |
|
|
|
key->dp = value; |
|
key->dp_sz = vlen; |
|
|
|
return 0; |
|
} |
|
|
|
int rsa_get_dq(void *context, size_t hdrlen, unsigned char tag, |
|
const void *value, size_t vlen) |
|
{ |
|
struct rsa_key *key = context; |
|
|
|
/* invalid key provided */ |
|
if (!value || !vlen || vlen > key->n_sz) |
|
return -EINVAL; |
|
|
|
key->dq = value; |
|
key->dq_sz = vlen; |
|
|
|
return 0; |
|
} |
|
|
|
int rsa_get_qinv(void *context, size_t hdrlen, unsigned char tag, |
|
const void *value, size_t vlen) |
|
{ |
|
struct rsa_key *key = context; |
|
|
|
/* invalid key provided */ |
|
if (!value || !vlen || vlen > key->n_sz) |
|
return -EINVAL; |
|
|
|
key->qinv = value; |
|
key->qinv_sz = vlen; |
|
|
|
return 0; |
|
} |
|
|
|
/** |
|
* rsa_parse_pub_key() - decodes the BER encoded buffer and stores in the |
|
* provided struct rsa_key, pointers to the raw key as is, |
|
* so that the caller can copy it or MPI parse it, etc. |
|
* |
|
* @rsa_key: struct rsa_key key representation |
|
* @key: key in BER format |
|
* @key_len: length of key |
|
* |
|
* Return: 0 on success or error code in case of error |
|
*/ |
|
int rsa_parse_pub_key(struct rsa_key *rsa_key, const void *key, |
|
unsigned int key_len) |
|
{ |
|
return asn1_ber_decoder(&rsapubkey_decoder, rsa_key, key, key_len); |
|
} |
|
EXPORT_SYMBOL_GPL(rsa_parse_pub_key); |
|
|
|
/** |
|
* rsa_parse_priv_key() - decodes the BER encoded buffer and stores in the |
|
* provided struct rsa_key, pointers to the raw key |
|
* as is, so that the caller can copy it or MPI parse it, |
|
* etc. |
|
* |
|
* @rsa_key: struct rsa_key key representation |
|
* @key: key in BER format |
|
* @key_len: length of key |
|
* |
|
* Return: 0 on success or error code in case of error |
|
*/ |
|
int rsa_parse_priv_key(struct rsa_key *rsa_key, const void *key, |
|
unsigned int key_len) |
|
{ |
|
return asn1_ber_decoder(&rsaprivkey_decoder, rsa_key, key, key_len); |
|
} |
|
EXPORT_SYMBOL_GPL(rsa_parse_priv_key);
|
|
|