| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139 |
- /* SPDX-License-Identifier: GPL-2.0-or-later */
- /*
- * Public Key Signature Algorithm
- *
- * Copyright (c) 2023 Herbert Xu <herbert@gondor.apana.org.au>
- */
- #include <crypto/akcipher.h>
- #include <crypto/internal/sig.h>
- #include <linux/cryptouser.h>
- #include <linux/kernel.h>
- #include <linux/module.h>
- #include <linux/scatterlist.h>
- #include <linux/seq_file.h>
- #include <linux/string.h>
- #include <net/netlink.h>
- #include "internal.h"
- #define CRYPTO_ALG_TYPE_SIG_MASK 0x0000000e
- static const struct crypto_type crypto_sig_type;
- static int crypto_sig_init_tfm(struct crypto_tfm *tfm)
- {
- if (tfm->__crt_alg->cra_type != &crypto_sig_type)
- return crypto_init_akcipher_ops_sig(tfm);
- return 0;
- }
- static void __maybe_unused crypto_sig_show(struct seq_file *m,
- struct crypto_alg *alg)
- {
- seq_puts(m, "type : sig\n");
- }
- static int __maybe_unused crypto_sig_report(struct sk_buff *skb,
- struct crypto_alg *alg)
- {
- struct crypto_report_akcipher rsig = {};
- strscpy(rsig.type, "sig", sizeof(rsig.type));
- return nla_put(skb, CRYPTOCFGA_REPORT_AKCIPHER, sizeof(rsig), &rsig);
- }
- static const struct crypto_type crypto_sig_type = {
- .extsize = crypto_alg_extsize,
- .init_tfm = crypto_sig_init_tfm,
- #ifdef CONFIG_PROC_FS
- .show = crypto_sig_show,
- #endif
- #if IS_ENABLED(CONFIG_CRYPTO_USER)
- .report = crypto_sig_report,
- #endif
- .maskclear = ~CRYPTO_ALG_TYPE_MASK,
- .maskset = CRYPTO_ALG_TYPE_SIG_MASK,
- .type = CRYPTO_ALG_TYPE_SIG,
- .tfmsize = offsetof(struct crypto_sig, base),
- };
- struct crypto_sig *crypto_alloc_sig(const char *alg_name, u32 type, u32 mask)
- {
- return crypto_alloc_tfm(alg_name, &crypto_sig_type, type, mask);
- }
- EXPORT_SYMBOL_GPL(crypto_alloc_sig);
- int crypto_sig_maxsize(struct crypto_sig *tfm)
- {
- struct crypto_akcipher **ctx = crypto_sig_ctx(tfm);
- return crypto_akcipher_maxsize(*ctx);
- }
- EXPORT_SYMBOL_GPL(crypto_sig_maxsize);
- int crypto_sig_sign(struct crypto_sig *tfm,
- const void *src, unsigned int slen,
- void *dst, unsigned int dlen)
- {
- struct crypto_akcipher **ctx = crypto_sig_ctx(tfm);
- struct crypto_akcipher_sync_data data = {
- .tfm = *ctx,
- .src = src,
- .dst = dst,
- .slen = slen,
- .dlen = dlen,
- };
- return crypto_akcipher_sync_prep(&data) ?:
- crypto_akcipher_sync_post(&data,
- crypto_akcipher_sign(data.req));
- }
- EXPORT_SYMBOL_GPL(crypto_sig_sign);
- int crypto_sig_verify(struct crypto_sig *tfm,
- const void *src, unsigned int slen,
- const void *digest, unsigned int dlen)
- {
- struct crypto_akcipher **ctx = crypto_sig_ctx(tfm);
- struct crypto_akcipher_sync_data data = {
- .tfm = *ctx,
- .src = src,
- .slen = slen,
- .dlen = dlen,
- };
- int err;
- err = crypto_akcipher_sync_prep(&data);
- if (err)
- return err;
- memcpy(data.buf + slen, digest, dlen);
- return crypto_akcipher_sync_post(&data,
- crypto_akcipher_verify(data.req));
- }
- EXPORT_SYMBOL_GPL(crypto_sig_verify);
- int crypto_sig_set_pubkey(struct crypto_sig *tfm,
- const void *key, unsigned int keylen)
- {
- struct crypto_akcipher **ctx = crypto_sig_ctx(tfm);
- return crypto_akcipher_set_pub_key(*ctx, key, keylen);
- }
- EXPORT_SYMBOL_GPL(crypto_sig_set_pubkey);
- int crypto_sig_set_privkey(struct crypto_sig *tfm,
- const void *key, unsigned int keylen)
- {
- struct crypto_akcipher **ctx = crypto_sig_ctx(tfm);
- return crypto_akcipher_set_priv_key(*ctx, key, keylen);
- }
- EXPORT_SYMBOL_GPL(crypto_sig_set_privkey);
- MODULE_LICENSE("GPL");
- MODULE_DESCRIPTION("Public Key Signature Algorithms");
|