|
@@ -16,7 +16,9 @@
|
|
|
#include <linux/export.h>
|
|
|
#include <linux/err.h>
|
|
|
#include <linux/slab.h>
|
|
|
+#include <linux/keyctl.h>
|
|
|
#include <crypto/public_key.h>
|
|
|
+#include <keys/user-type.h>
|
|
|
#include "asymmetric_keys.h"
|
|
|
|
|
|
/*
|
|
@@ -36,6 +38,99 @@ void public_key_signature_free(struct public_key_signature *sig)
|
|
|
}
|
|
|
EXPORT_SYMBOL_GPL(public_key_signature_free);
|
|
|
|
|
|
+/**
|
|
|
+ * query_asymmetric_key - Get information about an aymmetric key.
|
|
|
+ * @params: Various parameters.
|
|
|
+ * @info: Where to put the information.
|
|
|
+ */
|
|
|
+int query_asymmetric_key(const struct kernel_pkey_params *params,
|
|
|
+ struct kernel_pkey_query *info)
|
|
|
+{
|
|
|
+ const struct asymmetric_key_subtype *subtype;
|
|
|
+ struct key *key = params->key;
|
|
|
+ int ret;
|
|
|
+
|
|
|
+ pr_devel("==>%s()\n", __func__);
|
|
|
+
|
|
|
+ if (key->type != &key_type_asymmetric)
|
|
|
+ return -EINVAL;
|
|
|
+ subtype = asymmetric_key_subtype(key);
|
|
|
+ if (!subtype ||
|
|
|
+ !key->payload.data[0])
|
|
|
+ return -EINVAL;
|
|
|
+ if (!subtype->query)
|
|
|
+ return -ENOTSUPP;
|
|
|
+
|
|
|
+ ret = subtype->query(params, info);
|
|
|
+
|
|
|
+ pr_devel("<==%s() = %d\n", __func__, ret);
|
|
|
+ return ret;
|
|
|
+}
|
|
|
+EXPORT_SYMBOL_GPL(query_asymmetric_key);
|
|
|
+
|
|
|
+/**
|
|
|
+ * encrypt_blob - Encrypt data using an asymmetric key
|
|
|
+ * @params: Various parameters
|
|
|
+ * @data: Data blob to be encrypted, length params->data_len
|
|
|
+ * @enc: Encrypted data buffer, length params->enc_len
|
|
|
+ *
|
|
|
+ * Encrypt the specified data blob using the private key specified by
|
|
|
+ * params->key. The encrypted data is wrapped in an encoding if
|
|
|
+ * params->encoding is specified (eg. "pkcs1").
|
|
|
+ *
|
|
|
+ * Returns the length of the data placed in the encrypted data buffer or an
|
|
|
+ * error.
|
|
|
+ */
|
|
|
+int encrypt_blob(struct kernel_pkey_params *params,
|
|
|
+ const void *data, void *enc)
|
|
|
+{
|
|
|
+ params->op = kernel_pkey_encrypt;
|
|
|
+ return asymmetric_key_eds_op(params, data, enc);
|
|
|
+}
|
|
|
+EXPORT_SYMBOL_GPL(encrypt_blob);
|
|
|
+
|
|
|
+/**
|
|
|
+ * decrypt_blob - Decrypt data using an asymmetric key
|
|
|
+ * @params: Various parameters
|
|
|
+ * @enc: Encrypted data to be decrypted, length params->enc_len
|
|
|
+ * @data: Decrypted data buffer, length params->data_len
|
|
|
+ *
|
|
|
+ * Decrypt the specified data blob using the private key specified by
|
|
|
+ * params->key. The decrypted data is wrapped in an encoding if
|
|
|
+ * params->encoding is specified (eg. "pkcs1").
|
|
|
+ *
|
|
|
+ * Returns the length of the data placed in the decrypted data buffer or an
|
|
|
+ * error.
|
|
|
+ */
|
|
|
+int decrypt_blob(struct kernel_pkey_params *params,
|
|
|
+ const void *enc, void *data)
|
|
|
+{
|
|
|
+ params->op = kernel_pkey_decrypt;
|
|
|
+ return asymmetric_key_eds_op(params, enc, data);
|
|
|
+}
|
|
|
+EXPORT_SYMBOL_GPL(decrypt_blob);
|
|
|
+
|
|
|
+/**
|
|
|
+ * create_signature - Sign some data using an asymmetric key
|
|
|
+ * @params: Various parameters
|
|
|
+ * @data: Data blob to be signed, length params->data_len
|
|
|
+ * @enc: Signature buffer, length params->enc_len
|
|
|
+ *
|
|
|
+ * Sign the specified data blob using the private key specified by params->key.
|
|
|
+ * The signature is wrapped in an encoding if params->encoding is specified
|
|
|
+ * (eg. "pkcs1"). If the encoding needs to know the digest type, this can be
|
|
|
+ * passed through params->hash_algo (eg. "sha1").
|
|
|
+ *
|
|
|
+ * Returns the length of the data placed in the signature buffer or an error.
|
|
|
+ */
|
|
|
+int create_signature(struct kernel_pkey_params *params,
|
|
|
+ const void *data, void *enc)
|
|
|
+{
|
|
|
+ params->op = kernel_pkey_sign;
|
|
|
+ return asymmetric_key_eds_op(params, data, enc);
|
|
|
+}
|
|
|
+EXPORT_SYMBOL_GPL(create_signature);
|
|
|
+
|
|
|
/**
|
|
|
* verify_signature - Initiate the use of an asymmetric key to verify a signature
|
|
|
* @key: The asymmetric key to verify against
|