162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0-or-later 262306a36Sopenharmony_ci/* Public-key operation keyctls 362306a36Sopenharmony_ci * 462306a36Sopenharmony_ci * Copyright (C) 2016 Red Hat, Inc. All Rights Reserved. 562306a36Sopenharmony_ci * Written by David Howells (dhowells@redhat.com) 662306a36Sopenharmony_ci */ 762306a36Sopenharmony_ci 862306a36Sopenharmony_ci#include <linux/slab.h> 962306a36Sopenharmony_ci#include <linux/err.h> 1062306a36Sopenharmony_ci#include <linux/key.h> 1162306a36Sopenharmony_ci#include <linux/keyctl.h> 1262306a36Sopenharmony_ci#include <linux/parser.h> 1362306a36Sopenharmony_ci#include <linux/uaccess.h> 1462306a36Sopenharmony_ci#include <keys/user-type.h> 1562306a36Sopenharmony_ci#include "internal.h" 1662306a36Sopenharmony_ci 1762306a36Sopenharmony_cistatic void keyctl_pkey_params_free(struct kernel_pkey_params *params) 1862306a36Sopenharmony_ci{ 1962306a36Sopenharmony_ci kfree(params->info); 2062306a36Sopenharmony_ci key_put(params->key); 2162306a36Sopenharmony_ci} 2262306a36Sopenharmony_ci 2362306a36Sopenharmony_cienum { 2462306a36Sopenharmony_ci Opt_err, 2562306a36Sopenharmony_ci Opt_enc, /* "enc=<encoding>" eg. "enc=oaep" */ 2662306a36Sopenharmony_ci Opt_hash, /* "hash=<digest-name>" eg. "hash=sha1" */ 2762306a36Sopenharmony_ci}; 2862306a36Sopenharmony_ci 2962306a36Sopenharmony_cistatic const match_table_t param_keys = { 3062306a36Sopenharmony_ci { Opt_enc, "enc=%s" }, 3162306a36Sopenharmony_ci { Opt_hash, "hash=%s" }, 3262306a36Sopenharmony_ci { Opt_err, NULL } 3362306a36Sopenharmony_ci}; 3462306a36Sopenharmony_ci 3562306a36Sopenharmony_ci/* 3662306a36Sopenharmony_ci * Parse the information string which consists of key=val pairs. 3762306a36Sopenharmony_ci */ 3862306a36Sopenharmony_cistatic int keyctl_pkey_params_parse(struct kernel_pkey_params *params) 3962306a36Sopenharmony_ci{ 4062306a36Sopenharmony_ci unsigned long token_mask = 0; 4162306a36Sopenharmony_ci substring_t args[MAX_OPT_ARGS]; 4262306a36Sopenharmony_ci char *c = params->info, *p, *q; 4362306a36Sopenharmony_ci int token; 4462306a36Sopenharmony_ci 4562306a36Sopenharmony_ci while ((p = strsep(&c, " \t"))) { 4662306a36Sopenharmony_ci if (*p == '\0' || *p == ' ' || *p == '\t') 4762306a36Sopenharmony_ci continue; 4862306a36Sopenharmony_ci token = match_token(p, param_keys, args); 4962306a36Sopenharmony_ci if (token == Opt_err) 5062306a36Sopenharmony_ci return -EINVAL; 5162306a36Sopenharmony_ci if (__test_and_set_bit(token, &token_mask)) 5262306a36Sopenharmony_ci return -EINVAL; 5362306a36Sopenharmony_ci q = args[0].from; 5462306a36Sopenharmony_ci if (!q[0]) 5562306a36Sopenharmony_ci return -EINVAL; 5662306a36Sopenharmony_ci 5762306a36Sopenharmony_ci switch (token) { 5862306a36Sopenharmony_ci case Opt_enc: 5962306a36Sopenharmony_ci params->encoding = q; 6062306a36Sopenharmony_ci break; 6162306a36Sopenharmony_ci 6262306a36Sopenharmony_ci case Opt_hash: 6362306a36Sopenharmony_ci params->hash_algo = q; 6462306a36Sopenharmony_ci break; 6562306a36Sopenharmony_ci 6662306a36Sopenharmony_ci default: 6762306a36Sopenharmony_ci return -EINVAL; 6862306a36Sopenharmony_ci } 6962306a36Sopenharmony_ci } 7062306a36Sopenharmony_ci 7162306a36Sopenharmony_ci return 0; 7262306a36Sopenharmony_ci} 7362306a36Sopenharmony_ci 7462306a36Sopenharmony_ci/* 7562306a36Sopenharmony_ci * Interpret parameters. Callers must always call the free function 7662306a36Sopenharmony_ci * on params, even if an error is returned. 7762306a36Sopenharmony_ci */ 7862306a36Sopenharmony_cistatic int keyctl_pkey_params_get(key_serial_t id, 7962306a36Sopenharmony_ci const char __user *_info, 8062306a36Sopenharmony_ci struct kernel_pkey_params *params) 8162306a36Sopenharmony_ci{ 8262306a36Sopenharmony_ci key_ref_t key_ref; 8362306a36Sopenharmony_ci void *p; 8462306a36Sopenharmony_ci int ret; 8562306a36Sopenharmony_ci 8662306a36Sopenharmony_ci memset(params, 0, sizeof(*params)); 8762306a36Sopenharmony_ci params->encoding = "raw"; 8862306a36Sopenharmony_ci 8962306a36Sopenharmony_ci p = strndup_user(_info, PAGE_SIZE); 9062306a36Sopenharmony_ci if (IS_ERR(p)) 9162306a36Sopenharmony_ci return PTR_ERR(p); 9262306a36Sopenharmony_ci params->info = p; 9362306a36Sopenharmony_ci 9462306a36Sopenharmony_ci ret = keyctl_pkey_params_parse(params); 9562306a36Sopenharmony_ci if (ret < 0) 9662306a36Sopenharmony_ci return ret; 9762306a36Sopenharmony_ci 9862306a36Sopenharmony_ci key_ref = lookup_user_key(id, 0, KEY_NEED_SEARCH); 9962306a36Sopenharmony_ci if (IS_ERR(key_ref)) 10062306a36Sopenharmony_ci return PTR_ERR(key_ref); 10162306a36Sopenharmony_ci params->key = key_ref_to_ptr(key_ref); 10262306a36Sopenharmony_ci 10362306a36Sopenharmony_ci if (!params->key->type->asym_query) 10462306a36Sopenharmony_ci return -EOPNOTSUPP; 10562306a36Sopenharmony_ci 10662306a36Sopenharmony_ci return 0; 10762306a36Sopenharmony_ci} 10862306a36Sopenharmony_ci 10962306a36Sopenharmony_ci/* 11062306a36Sopenharmony_ci * Get parameters from userspace. Callers must always call the free function 11162306a36Sopenharmony_ci * on params, even if an error is returned. 11262306a36Sopenharmony_ci */ 11362306a36Sopenharmony_cistatic int keyctl_pkey_params_get_2(const struct keyctl_pkey_params __user *_params, 11462306a36Sopenharmony_ci const char __user *_info, 11562306a36Sopenharmony_ci int op, 11662306a36Sopenharmony_ci struct kernel_pkey_params *params) 11762306a36Sopenharmony_ci{ 11862306a36Sopenharmony_ci struct keyctl_pkey_params uparams; 11962306a36Sopenharmony_ci struct kernel_pkey_query info; 12062306a36Sopenharmony_ci int ret; 12162306a36Sopenharmony_ci 12262306a36Sopenharmony_ci memset(params, 0, sizeof(*params)); 12362306a36Sopenharmony_ci params->encoding = "raw"; 12462306a36Sopenharmony_ci 12562306a36Sopenharmony_ci if (copy_from_user(&uparams, _params, sizeof(uparams)) != 0) 12662306a36Sopenharmony_ci return -EFAULT; 12762306a36Sopenharmony_ci 12862306a36Sopenharmony_ci ret = keyctl_pkey_params_get(uparams.key_id, _info, params); 12962306a36Sopenharmony_ci if (ret < 0) 13062306a36Sopenharmony_ci return ret; 13162306a36Sopenharmony_ci 13262306a36Sopenharmony_ci ret = params->key->type->asym_query(params, &info); 13362306a36Sopenharmony_ci if (ret < 0) 13462306a36Sopenharmony_ci return ret; 13562306a36Sopenharmony_ci 13662306a36Sopenharmony_ci switch (op) { 13762306a36Sopenharmony_ci case KEYCTL_PKEY_ENCRYPT: 13862306a36Sopenharmony_ci if (uparams.in_len > info.max_dec_size || 13962306a36Sopenharmony_ci uparams.out_len > info.max_enc_size) 14062306a36Sopenharmony_ci return -EINVAL; 14162306a36Sopenharmony_ci break; 14262306a36Sopenharmony_ci case KEYCTL_PKEY_DECRYPT: 14362306a36Sopenharmony_ci if (uparams.in_len > info.max_enc_size || 14462306a36Sopenharmony_ci uparams.out_len > info.max_dec_size) 14562306a36Sopenharmony_ci return -EINVAL; 14662306a36Sopenharmony_ci break; 14762306a36Sopenharmony_ci case KEYCTL_PKEY_SIGN: 14862306a36Sopenharmony_ci if (uparams.in_len > info.max_data_size || 14962306a36Sopenharmony_ci uparams.out_len > info.max_sig_size) 15062306a36Sopenharmony_ci return -EINVAL; 15162306a36Sopenharmony_ci break; 15262306a36Sopenharmony_ci case KEYCTL_PKEY_VERIFY: 15362306a36Sopenharmony_ci if (uparams.in_len > info.max_data_size || 15462306a36Sopenharmony_ci uparams.in2_len > info.max_sig_size) 15562306a36Sopenharmony_ci return -EINVAL; 15662306a36Sopenharmony_ci break; 15762306a36Sopenharmony_ci default: 15862306a36Sopenharmony_ci BUG(); 15962306a36Sopenharmony_ci } 16062306a36Sopenharmony_ci 16162306a36Sopenharmony_ci params->in_len = uparams.in_len; 16262306a36Sopenharmony_ci params->out_len = uparams.out_len; /* Note: same as in2_len */ 16362306a36Sopenharmony_ci return 0; 16462306a36Sopenharmony_ci} 16562306a36Sopenharmony_ci 16662306a36Sopenharmony_ci/* 16762306a36Sopenharmony_ci * Query information about an asymmetric key. 16862306a36Sopenharmony_ci */ 16962306a36Sopenharmony_cilong keyctl_pkey_query(key_serial_t id, 17062306a36Sopenharmony_ci const char __user *_info, 17162306a36Sopenharmony_ci struct keyctl_pkey_query __user *_res) 17262306a36Sopenharmony_ci{ 17362306a36Sopenharmony_ci struct kernel_pkey_params params; 17462306a36Sopenharmony_ci struct kernel_pkey_query res; 17562306a36Sopenharmony_ci long ret; 17662306a36Sopenharmony_ci 17762306a36Sopenharmony_ci ret = keyctl_pkey_params_get(id, _info, ¶ms); 17862306a36Sopenharmony_ci if (ret < 0) 17962306a36Sopenharmony_ci goto error; 18062306a36Sopenharmony_ci 18162306a36Sopenharmony_ci ret = params.key->type->asym_query(¶ms, &res); 18262306a36Sopenharmony_ci if (ret < 0) 18362306a36Sopenharmony_ci goto error; 18462306a36Sopenharmony_ci 18562306a36Sopenharmony_ci ret = -EFAULT; 18662306a36Sopenharmony_ci if (copy_to_user(_res, &res, sizeof(res)) == 0 && 18762306a36Sopenharmony_ci clear_user(_res->__spare, sizeof(_res->__spare)) == 0) 18862306a36Sopenharmony_ci ret = 0; 18962306a36Sopenharmony_ci 19062306a36Sopenharmony_cierror: 19162306a36Sopenharmony_ci keyctl_pkey_params_free(¶ms); 19262306a36Sopenharmony_ci return ret; 19362306a36Sopenharmony_ci} 19462306a36Sopenharmony_ci 19562306a36Sopenharmony_ci/* 19662306a36Sopenharmony_ci * Encrypt/decrypt/sign 19762306a36Sopenharmony_ci * 19862306a36Sopenharmony_ci * Encrypt data, decrypt data or sign data using a public key. 19962306a36Sopenharmony_ci * 20062306a36Sopenharmony_ci * _info is a string of supplementary information in key=val format. For 20162306a36Sopenharmony_ci * instance, it might contain: 20262306a36Sopenharmony_ci * 20362306a36Sopenharmony_ci * "enc=pkcs1 hash=sha256" 20462306a36Sopenharmony_ci * 20562306a36Sopenharmony_ci * where enc= specifies the encoding and hash= selects the OID to go in that 20662306a36Sopenharmony_ci * particular encoding if required. If enc= isn't supplied, it's assumed that 20762306a36Sopenharmony_ci * the caller is supplying raw values. 20862306a36Sopenharmony_ci * 20962306a36Sopenharmony_ci * If successful, the amount of data written into the output buffer is 21062306a36Sopenharmony_ci * returned. 21162306a36Sopenharmony_ci */ 21262306a36Sopenharmony_cilong keyctl_pkey_e_d_s(int op, 21362306a36Sopenharmony_ci const struct keyctl_pkey_params __user *_params, 21462306a36Sopenharmony_ci const char __user *_info, 21562306a36Sopenharmony_ci const void __user *_in, 21662306a36Sopenharmony_ci void __user *_out) 21762306a36Sopenharmony_ci{ 21862306a36Sopenharmony_ci struct kernel_pkey_params params; 21962306a36Sopenharmony_ci void *in, *out; 22062306a36Sopenharmony_ci long ret; 22162306a36Sopenharmony_ci 22262306a36Sopenharmony_ci ret = keyctl_pkey_params_get_2(_params, _info, op, ¶ms); 22362306a36Sopenharmony_ci if (ret < 0) 22462306a36Sopenharmony_ci goto error_params; 22562306a36Sopenharmony_ci 22662306a36Sopenharmony_ci ret = -EOPNOTSUPP; 22762306a36Sopenharmony_ci if (!params.key->type->asym_eds_op) 22862306a36Sopenharmony_ci goto error_params; 22962306a36Sopenharmony_ci 23062306a36Sopenharmony_ci switch (op) { 23162306a36Sopenharmony_ci case KEYCTL_PKEY_ENCRYPT: 23262306a36Sopenharmony_ci params.op = kernel_pkey_encrypt; 23362306a36Sopenharmony_ci break; 23462306a36Sopenharmony_ci case KEYCTL_PKEY_DECRYPT: 23562306a36Sopenharmony_ci params.op = kernel_pkey_decrypt; 23662306a36Sopenharmony_ci break; 23762306a36Sopenharmony_ci case KEYCTL_PKEY_SIGN: 23862306a36Sopenharmony_ci params.op = kernel_pkey_sign; 23962306a36Sopenharmony_ci break; 24062306a36Sopenharmony_ci default: 24162306a36Sopenharmony_ci BUG(); 24262306a36Sopenharmony_ci } 24362306a36Sopenharmony_ci 24462306a36Sopenharmony_ci in = memdup_user(_in, params.in_len); 24562306a36Sopenharmony_ci if (IS_ERR(in)) { 24662306a36Sopenharmony_ci ret = PTR_ERR(in); 24762306a36Sopenharmony_ci goto error_params; 24862306a36Sopenharmony_ci } 24962306a36Sopenharmony_ci 25062306a36Sopenharmony_ci ret = -ENOMEM; 25162306a36Sopenharmony_ci out = kmalloc(params.out_len, GFP_KERNEL); 25262306a36Sopenharmony_ci if (!out) 25362306a36Sopenharmony_ci goto error_in; 25462306a36Sopenharmony_ci 25562306a36Sopenharmony_ci ret = params.key->type->asym_eds_op(¶ms, in, out); 25662306a36Sopenharmony_ci if (ret < 0) 25762306a36Sopenharmony_ci goto error_out; 25862306a36Sopenharmony_ci 25962306a36Sopenharmony_ci if (copy_to_user(_out, out, ret) != 0) 26062306a36Sopenharmony_ci ret = -EFAULT; 26162306a36Sopenharmony_ci 26262306a36Sopenharmony_cierror_out: 26362306a36Sopenharmony_ci kfree(out); 26462306a36Sopenharmony_cierror_in: 26562306a36Sopenharmony_ci kfree(in); 26662306a36Sopenharmony_cierror_params: 26762306a36Sopenharmony_ci keyctl_pkey_params_free(¶ms); 26862306a36Sopenharmony_ci return ret; 26962306a36Sopenharmony_ci} 27062306a36Sopenharmony_ci 27162306a36Sopenharmony_ci/* 27262306a36Sopenharmony_ci * Verify a signature. 27362306a36Sopenharmony_ci * 27462306a36Sopenharmony_ci * Verify a public key signature using the given key, or if not given, search 27562306a36Sopenharmony_ci * for a matching key. 27662306a36Sopenharmony_ci * 27762306a36Sopenharmony_ci * _info is a string of supplementary information in key=val format. For 27862306a36Sopenharmony_ci * instance, it might contain: 27962306a36Sopenharmony_ci * 28062306a36Sopenharmony_ci * "enc=pkcs1 hash=sha256" 28162306a36Sopenharmony_ci * 28262306a36Sopenharmony_ci * where enc= specifies the signature blob encoding and hash= selects the OID 28362306a36Sopenharmony_ci * to go in that particular encoding. If enc= isn't supplied, it's assumed 28462306a36Sopenharmony_ci * that the caller is supplying raw values. 28562306a36Sopenharmony_ci * 28662306a36Sopenharmony_ci * If successful, 0 is returned. 28762306a36Sopenharmony_ci */ 28862306a36Sopenharmony_cilong keyctl_pkey_verify(const struct keyctl_pkey_params __user *_params, 28962306a36Sopenharmony_ci const char __user *_info, 29062306a36Sopenharmony_ci const void __user *_in, 29162306a36Sopenharmony_ci const void __user *_in2) 29262306a36Sopenharmony_ci{ 29362306a36Sopenharmony_ci struct kernel_pkey_params params; 29462306a36Sopenharmony_ci void *in, *in2; 29562306a36Sopenharmony_ci long ret; 29662306a36Sopenharmony_ci 29762306a36Sopenharmony_ci ret = keyctl_pkey_params_get_2(_params, _info, KEYCTL_PKEY_VERIFY, 29862306a36Sopenharmony_ci ¶ms); 29962306a36Sopenharmony_ci if (ret < 0) 30062306a36Sopenharmony_ci goto error_params; 30162306a36Sopenharmony_ci 30262306a36Sopenharmony_ci ret = -EOPNOTSUPP; 30362306a36Sopenharmony_ci if (!params.key->type->asym_verify_signature) 30462306a36Sopenharmony_ci goto error_params; 30562306a36Sopenharmony_ci 30662306a36Sopenharmony_ci in = memdup_user(_in, params.in_len); 30762306a36Sopenharmony_ci if (IS_ERR(in)) { 30862306a36Sopenharmony_ci ret = PTR_ERR(in); 30962306a36Sopenharmony_ci goto error_params; 31062306a36Sopenharmony_ci } 31162306a36Sopenharmony_ci 31262306a36Sopenharmony_ci in2 = memdup_user(_in2, params.in2_len); 31362306a36Sopenharmony_ci if (IS_ERR(in2)) { 31462306a36Sopenharmony_ci ret = PTR_ERR(in2); 31562306a36Sopenharmony_ci goto error_in; 31662306a36Sopenharmony_ci } 31762306a36Sopenharmony_ci 31862306a36Sopenharmony_ci params.op = kernel_pkey_verify; 31962306a36Sopenharmony_ci ret = params.key->type->asym_verify_signature(¶ms, in, in2); 32062306a36Sopenharmony_ci 32162306a36Sopenharmony_ci kfree(in2); 32262306a36Sopenharmony_cierror_in: 32362306a36Sopenharmony_ci kfree(in); 32462306a36Sopenharmony_cierror_params: 32562306a36Sopenharmony_ci keyctl_pkey_params_free(¶ms); 32662306a36Sopenharmony_ci return ret; 32762306a36Sopenharmony_ci} 328