162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0-or-later
262306a36Sopenharmony_ci/* Public-key operation keyctls
362306a36Sopenharmony_ci *
462306a36Sopenharmony_ci * Copyright (C) 2016 Red Hat, Inc. All Rights Reserved.
562306a36Sopenharmony_ci * Written by David Howells (dhowells@redhat.com)
662306a36Sopenharmony_ci */
762306a36Sopenharmony_ci
862306a36Sopenharmony_ci#include <linux/slab.h>
962306a36Sopenharmony_ci#include <linux/err.h>
1062306a36Sopenharmony_ci#include <linux/key.h>
1162306a36Sopenharmony_ci#include <linux/keyctl.h>
1262306a36Sopenharmony_ci#include <linux/parser.h>
1362306a36Sopenharmony_ci#include <linux/uaccess.h>
1462306a36Sopenharmony_ci#include <keys/user-type.h>
1562306a36Sopenharmony_ci#include "internal.h"
1662306a36Sopenharmony_ci
1762306a36Sopenharmony_cistatic void keyctl_pkey_params_free(struct kernel_pkey_params *params)
1862306a36Sopenharmony_ci{
1962306a36Sopenharmony_ci	kfree(params->info);
2062306a36Sopenharmony_ci	key_put(params->key);
2162306a36Sopenharmony_ci}
2262306a36Sopenharmony_ci
2362306a36Sopenharmony_cienum {
2462306a36Sopenharmony_ci	Opt_err,
2562306a36Sopenharmony_ci	Opt_enc,		/* "enc=<encoding>" eg. "enc=oaep" */
2662306a36Sopenharmony_ci	Opt_hash,		/* "hash=<digest-name>" eg. "hash=sha1" */
2762306a36Sopenharmony_ci};
2862306a36Sopenharmony_ci
2962306a36Sopenharmony_cistatic const match_table_t param_keys = {
3062306a36Sopenharmony_ci	{ Opt_enc,	"enc=%s" },
3162306a36Sopenharmony_ci	{ Opt_hash,	"hash=%s" },
3262306a36Sopenharmony_ci	{ Opt_err,	NULL }
3362306a36Sopenharmony_ci};
3462306a36Sopenharmony_ci
3562306a36Sopenharmony_ci/*
3662306a36Sopenharmony_ci * Parse the information string which consists of key=val pairs.
3762306a36Sopenharmony_ci */
3862306a36Sopenharmony_cistatic int keyctl_pkey_params_parse(struct kernel_pkey_params *params)
3962306a36Sopenharmony_ci{
4062306a36Sopenharmony_ci	unsigned long token_mask = 0;
4162306a36Sopenharmony_ci	substring_t args[MAX_OPT_ARGS];
4262306a36Sopenharmony_ci	char *c = params->info, *p, *q;
4362306a36Sopenharmony_ci	int token;
4462306a36Sopenharmony_ci
4562306a36Sopenharmony_ci	while ((p = strsep(&c, " \t"))) {
4662306a36Sopenharmony_ci		if (*p == '\0' || *p == ' ' || *p == '\t')
4762306a36Sopenharmony_ci			continue;
4862306a36Sopenharmony_ci		token = match_token(p, param_keys, args);
4962306a36Sopenharmony_ci		if (token == Opt_err)
5062306a36Sopenharmony_ci			return -EINVAL;
5162306a36Sopenharmony_ci		if (__test_and_set_bit(token, &token_mask))
5262306a36Sopenharmony_ci			return -EINVAL;
5362306a36Sopenharmony_ci		q = args[0].from;
5462306a36Sopenharmony_ci		if (!q[0])
5562306a36Sopenharmony_ci			return -EINVAL;
5662306a36Sopenharmony_ci
5762306a36Sopenharmony_ci		switch (token) {
5862306a36Sopenharmony_ci		case Opt_enc:
5962306a36Sopenharmony_ci			params->encoding = q;
6062306a36Sopenharmony_ci			break;
6162306a36Sopenharmony_ci
6262306a36Sopenharmony_ci		case Opt_hash:
6362306a36Sopenharmony_ci			params->hash_algo = q;
6462306a36Sopenharmony_ci			break;
6562306a36Sopenharmony_ci
6662306a36Sopenharmony_ci		default:
6762306a36Sopenharmony_ci			return -EINVAL;
6862306a36Sopenharmony_ci		}
6962306a36Sopenharmony_ci	}
7062306a36Sopenharmony_ci
7162306a36Sopenharmony_ci	return 0;
7262306a36Sopenharmony_ci}
7362306a36Sopenharmony_ci
7462306a36Sopenharmony_ci/*
7562306a36Sopenharmony_ci * Interpret parameters.  Callers must always call the free function
7662306a36Sopenharmony_ci * on params, even if an error is returned.
7762306a36Sopenharmony_ci */
7862306a36Sopenharmony_cistatic int keyctl_pkey_params_get(key_serial_t id,
7962306a36Sopenharmony_ci				  const char __user *_info,
8062306a36Sopenharmony_ci				  struct kernel_pkey_params *params)
8162306a36Sopenharmony_ci{
8262306a36Sopenharmony_ci	key_ref_t key_ref;
8362306a36Sopenharmony_ci	void *p;
8462306a36Sopenharmony_ci	int ret;
8562306a36Sopenharmony_ci
8662306a36Sopenharmony_ci	memset(params, 0, sizeof(*params));
8762306a36Sopenharmony_ci	params->encoding = "raw";
8862306a36Sopenharmony_ci
8962306a36Sopenharmony_ci	p = strndup_user(_info, PAGE_SIZE);
9062306a36Sopenharmony_ci	if (IS_ERR(p))
9162306a36Sopenharmony_ci		return PTR_ERR(p);
9262306a36Sopenharmony_ci	params->info = p;
9362306a36Sopenharmony_ci
9462306a36Sopenharmony_ci	ret = keyctl_pkey_params_parse(params);
9562306a36Sopenharmony_ci	if (ret < 0)
9662306a36Sopenharmony_ci		return ret;
9762306a36Sopenharmony_ci
9862306a36Sopenharmony_ci	key_ref = lookup_user_key(id, 0, KEY_NEED_SEARCH);
9962306a36Sopenharmony_ci	if (IS_ERR(key_ref))
10062306a36Sopenharmony_ci		return PTR_ERR(key_ref);
10162306a36Sopenharmony_ci	params->key = key_ref_to_ptr(key_ref);
10262306a36Sopenharmony_ci
10362306a36Sopenharmony_ci	if (!params->key->type->asym_query)
10462306a36Sopenharmony_ci		return -EOPNOTSUPP;
10562306a36Sopenharmony_ci
10662306a36Sopenharmony_ci	return 0;
10762306a36Sopenharmony_ci}
10862306a36Sopenharmony_ci
10962306a36Sopenharmony_ci/*
11062306a36Sopenharmony_ci * Get parameters from userspace.  Callers must always call the free function
11162306a36Sopenharmony_ci * on params, even if an error is returned.
11262306a36Sopenharmony_ci */
11362306a36Sopenharmony_cistatic int keyctl_pkey_params_get_2(const struct keyctl_pkey_params __user *_params,
11462306a36Sopenharmony_ci				    const char __user *_info,
11562306a36Sopenharmony_ci				    int op,
11662306a36Sopenharmony_ci				    struct kernel_pkey_params *params)
11762306a36Sopenharmony_ci{
11862306a36Sopenharmony_ci	struct keyctl_pkey_params uparams;
11962306a36Sopenharmony_ci	struct kernel_pkey_query info;
12062306a36Sopenharmony_ci	int ret;
12162306a36Sopenharmony_ci
12262306a36Sopenharmony_ci	memset(params, 0, sizeof(*params));
12362306a36Sopenharmony_ci	params->encoding = "raw";
12462306a36Sopenharmony_ci
12562306a36Sopenharmony_ci	if (copy_from_user(&uparams, _params, sizeof(uparams)) != 0)
12662306a36Sopenharmony_ci		return -EFAULT;
12762306a36Sopenharmony_ci
12862306a36Sopenharmony_ci	ret = keyctl_pkey_params_get(uparams.key_id, _info, params);
12962306a36Sopenharmony_ci	if (ret < 0)
13062306a36Sopenharmony_ci		return ret;
13162306a36Sopenharmony_ci
13262306a36Sopenharmony_ci	ret = params->key->type->asym_query(params, &info);
13362306a36Sopenharmony_ci	if (ret < 0)
13462306a36Sopenharmony_ci		return ret;
13562306a36Sopenharmony_ci
13662306a36Sopenharmony_ci	switch (op) {
13762306a36Sopenharmony_ci	case KEYCTL_PKEY_ENCRYPT:
13862306a36Sopenharmony_ci		if (uparams.in_len  > info.max_dec_size ||
13962306a36Sopenharmony_ci		    uparams.out_len > info.max_enc_size)
14062306a36Sopenharmony_ci			return -EINVAL;
14162306a36Sopenharmony_ci		break;
14262306a36Sopenharmony_ci	case KEYCTL_PKEY_DECRYPT:
14362306a36Sopenharmony_ci		if (uparams.in_len  > info.max_enc_size ||
14462306a36Sopenharmony_ci		    uparams.out_len > info.max_dec_size)
14562306a36Sopenharmony_ci			return -EINVAL;
14662306a36Sopenharmony_ci		break;
14762306a36Sopenharmony_ci	case KEYCTL_PKEY_SIGN:
14862306a36Sopenharmony_ci		if (uparams.in_len  > info.max_data_size ||
14962306a36Sopenharmony_ci		    uparams.out_len > info.max_sig_size)
15062306a36Sopenharmony_ci			return -EINVAL;
15162306a36Sopenharmony_ci		break;
15262306a36Sopenharmony_ci	case KEYCTL_PKEY_VERIFY:
15362306a36Sopenharmony_ci		if (uparams.in_len  > info.max_data_size ||
15462306a36Sopenharmony_ci		    uparams.in2_len > info.max_sig_size)
15562306a36Sopenharmony_ci			return -EINVAL;
15662306a36Sopenharmony_ci		break;
15762306a36Sopenharmony_ci	default:
15862306a36Sopenharmony_ci		BUG();
15962306a36Sopenharmony_ci	}
16062306a36Sopenharmony_ci
16162306a36Sopenharmony_ci	params->in_len  = uparams.in_len;
16262306a36Sopenharmony_ci	params->out_len = uparams.out_len; /* Note: same as in2_len */
16362306a36Sopenharmony_ci	return 0;
16462306a36Sopenharmony_ci}
16562306a36Sopenharmony_ci
16662306a36Sopenharmony_ci/*
16762306a36Sopenharmony_ci * Query information about an asymmetric key.
16862306a36Sopenharmony_ci */
16962306a36Sopenharmony_cilong keyctl_pkey_query(key_serial_t id,
17062306a36Sopenharmony_ci		       const char __user *_info,
17162306a36Sopenharmony_ci		       struct keyctl_pkey_query __user *_res)
17262306a36Sopenharmony_ci{
17362306a36Sopenharmony_ci	struct kernel_pkey_params params;
17462306a36Sopenharmony_ci	struct kernel_pkey_query res;
17562306a36Sopenharmony_ci	long ret;
17662306a36Sopenharmony_ci
17762306a36Sopenharmony_ci	ret = keyctl_pkey_params_get(id, _info, &params);
17862306a36Sopenharmony_ci	if (ret < 0)
17962306a36Sopenharmony_ci		goto error;
18062306a36Sopenharmony_ci
18162306a36Sopenharmony_ci	ret = params.key->type->asym_query(&params, &res);
18262306a36Sopenharmony_ci	if (ret < 0)
18362306a36Sopenharmony_ci		goto error;
18462306a36Sopenharmony_ci
18562306a36Sopenharmony_ci	ret = -EFAULT;
18662306a36Sopenharmony_ci	if (copy_to_user(_res, &res, sizeof(res)) == 0 &&
18762306a36Sopenharmony_ci	    clear_user(_res->__spare, sizeof(_res->__spare)) == 0)
18862306a36Sopenharmony_ci		ret = 0;
18962306a36Sopenharmony_ci
19062306a36Sopenharmony_cierror:
19162306a36Sopenharmony_ci	keyctl_pkey_params_free(&params);
19262306a36Sopenharmony_ci	return ret;
19362306a36Sopenharmony_ci}
19462306a36Sopenharmony_ci
19562306a36Sopenharmony_ci/*
19662306a36Sopenharmony_ci * Encrypt/decrypt/sign
19762306a36Sopenharmony_ci *
19862306a36Sopenharmony_ci * Encrypt data, decrypt data or sign data using a public key.
19962306a36Sopenharmony_ci *
20062306a36Sopenharmony_ci * _info is a string of supplementary information in key=val format.  For
20162306a36Sopenharmony_ci * instance, it might contain:
20262306a36Sopenharmony_ci *
20362306a36Sopenharmony_ci *	"enc=pkcs1 hash=sha256"
20462306a36Sopenharmony_ci *
20562306a36Sopenharmony_ci * where enc= specifies the encoding and hash= selects the OID to go in that
20662306a36Sopenharmony_ci * particular encoding if required.  If enc= isn't supplied, it's assumed that
20762306a36Sopenharmony_ci * the caller is supplying raw values.
20862306a36Sopenharmony_ci *
20962306a36Sopenharmony_ci * If successful, the amount of data written into the output buffer is
21062306a36Sopenharmony_ci * returned.
21162306a36Sopenharmony_ci */
21262306a36Sopenharmony_cilong keyctl_pkey_e_d_s(int op,
21362306a36Sopenharmony_ci		       const struct keyctl_pkey_params __user *_params,
21462306a36Sopenharmony_ci		       const char __user *_info,
21562306a36Sopenharmony_ci		       const void __user *_in,
21662306a36Sopenharmony_ci		       void __user *_out)
21762306a36Sopenharmony_ci{
21862306a36Sopenharmony_ci	struct kernel_pkey_params params;
21962306a36Sopenharmony_ci	void *in, *out;
22062306a36Sopenharmony_ci	long ret;
22162306a36Sopenharmony_ci
22262306a36Sopenharmony_ci	ret = keyctl_pkey_params_get_2(_params, _info, op, &params);
22362306a36Sopenharmony_ci	if (ret < 0)
22462306a36Sopenharmony_ci		goto error_params;
22562306a36Sopenharmony_ci
22662306a36Sopenharmony_ci	ret = -EOPNOTSUPP;
22762306a36Sopenharmony_ci	if (!params.key->type->asym_eds_op)
22862306a36Sopenharmony_ci		goto error_params;
22962306a36Sopenharmony_ci
23062306a36Sopenharmony_ci	switch (op) {
23162306a36Sopenharmony_ci	case KEYCTL_PKEY_ENCRYPT:
23262306a36Sopenharmony_ci		params.op = kernel_pkey_encrypt;
23362306a36Sopenharmony_ci		break;
23462306a36Sopenharmony_ci	case KEYCTL_PKEY_DECRYPT:
23562306a36Sopenharmony_ci		params.op = kernel_pkey_decrypt;
23662306a36Sopenharmony_ci		break;
23762306a36Sopenharmony_ci	case KEYCTL_PKEY_SIGN:
23862306a36Sopenharmony_ci		params.op = kernel_pkey_sign;
23962306a36Sopenharmony_ci		break;
24062306a36Sopenharmony_ci	default:
24162306a36Sopenharmony_ci		BUG();
24262306a36Sopenharmony_ci	}
24362306a36Sopenharmony_ci
24462306a36Sopenharmony_ci	in = memdup_user(_in, params.in_len);
24562306a36Sopenharmony_ci	if (IS_ERR(in)) {
24662306a36Sopenharmony_ci		ret = PTR_ERR(in);
24762306a36Sopenharmony_ci		goto error_params;
24862306a36Sopenharmony_ci	}
24962306a36Sopenharmony_ci
25062306a36Sopenharmony_ci	ret = -ENOMEM;
25162306a36Sopenharmony_ci	out = kmalloc(params.out_len, GFP_KERNEL);
25262306a36Sopenharmony_ci	if (!out)
25362306a36Sopenharmony_ci		goto error_in;
25462306a36Sopenharmony_ci
25562306a36Sopenharmony_ci	ret = params.key->type->asym_eds_op(&params, in, out);
25662306a36Sopenharmony_ci	if (ret < 0)
25762306a36Sopenharmony_ci		goto error_out;
25862306a36Sopenharmony_ci
25962306a36Sopenharmony_ci	if (copy_to_user(_out, out, ret) != 0)
26062306a36Sopenharmony_ci		ret = -EFAULT;
26162306a36Sopenharmony_ci
26262306a36Sopenharmony_cierror_out:
26362306a36Sopenharmony_ci	kfree(out);
26462306a36Sopenharmony_cierror_in:
26562306a36Sopenharmony_ci	kfree(in);
26662306a36Sopenharmony_cierror_params:
26762306a36Sopenharmony_ci	keyctl_pkey_params_free(&params);
26862306a36Sopenharmony_ci	return ret;
26962306a36Sopenharmony_ci}
27062306a36Sopenharmony_ci
27162306a36Sopenharmony_ci/*
27262306a36Sopenharmony_ci * Verify a signature.
27362306a36Sopenharmony_ci *
27462306a36Sopenharmony_ci * Verify a public key signature using the given key, or if not given, search
27562306a36Sopenharmony_ci * for a matching key.
27662306a36Sopenharmony_ci *
27762306a36Sopenharmony_ci * _info is a string of supplementary information in key=val format.  For
27862306a36Sopenharmony_ci * instance, it might contain:
27962306a36Sopenharmony_ci *
28062306a36Sopenharmony_ci *	"enc=pkcs1 hash=sha256"
28162306a36Sopenharmony_ci *
28262306a36Sopenharmony_ci * where enc= specifies the signature blob encoding and hash= selects the OID
28362306a36Sopenharmony_ci * to go in that particular encoding.  If enc= isn't supplied, it's assumed
28462306a36Sopenharmony_ci * that the caller is supplying raw values.
28562306a36Sopenharmony_ci *
28662306a36Sopenharmony_ci * If successful, 0 is returned.
28762306a36Sopenharmony_ci */
28862306a36Sopenharmony_cilong keyctl_pkey_verify(const struct keyctl_pkey_params __user *_params,
28962306a36Sopenharmony_ci			const char __user *_info,
29062306a36Sopenharmony_ci			const void __user *_in,
29162306a36Sopenharmony_ci			const void __user *_in2)
29262306a36Sopenharmony_ci{
29362306a36Sopenharmony_ci	struct kernel_pkey_params params;
29462306a36Sopenharmony_ci	void *in, *in2;
29562306a36Sopenharmony_ci	long ret;
29662306a36Sopenharmony_ci
29762306a36Sopenharmony_ci	ret = keyctl_pkey_params_get_2(_params, _info, KEYCTL_PKEY_VERIFY,
29862306a36Sopenharmony_ci				       &params);
29962306a36Sopenharmony_ci	if (ret < 0)
30062306a36Sopenharmony_ci		goto error_params;
30162306a36Sopenharmony_ci
30262306a36Sopenharmony_ci	ret = -EOPNOTSUPP;
30362306a36Sopenharmony_ci	if (!params.key->type->asym_verify_signature)
30462306a36Sopenharmony_ci		goto error_params;
30562306a36Sopenharmony_ci
30662306a36Sopenharmony_ci	in = memdup_user(_in, params.in_len);
30762306a36Sopenharmony_ci	if (IS_ERR(in)) {
30862306a36Sopenharmony_ci		ret = PTR_ERR(in);
30962306a36Sopenharmony_ci		goto error_params;
31062306a36Sopenharmony_ci	}
31162306a36Sopenharmony_ci
31262306a36Sopenharmony_ci	in2 = memdup_user(_in2, params.in2_len);
31362306a36Sopenharmony_ci	if (IS_ERR(in2)) {
31462306a36Sopenharmony_ci		ret = PTR_ERR(in2);
31562306a36Sopenharmony_ci		goto error_in;
31662306a36Sopenharmony_ci	}
31762306a36Sopenharmony_ci
31862306a36Sopenharmony_ci	params.op = kernel_pkey_verify;
31962306a36Sopenharmony_ci	ret = params.key->type->asym_verify_signature(&params, in, in2);
32062306a36Sopenharmony_ci
32162306a36Sopenharmony_ci	kfree(in2);
32262306a36Sopenharmony_cierror_in:
32362306a36Sopenharmony_ci	kfree(in);
32462306a36Sopenharmony_cierror_params:
32562306a36Sopenharmony_ci	keyctl_pkey_params_free(&params);
32662306a36Sopenharmony_ci	return ret;
32762306a36Sopenharmony_ci}
328