blob: 11b7ba1709041864868a6ca2b05680a20b5fb3f9 [file] [log] [blame]
David Howells4ae71c12012-09-21 23:25:04 +01001/* Signature verification with an asymmetric key
2 *
3 * See Documentation/security/asymmetric-keys.txt
4 *
5 * Copyright (C) 2012 Red Hat, Inc. All Rights Reserved.
6 * Written by David Howells (dhowells@redhat.com)
7 *
8 * This program is free software; you can redistribute it and/or
9 * modify it under the terms of the GNU General Public Licence
10 * as published by the Free Software Foundation; either version
11 * 2 of the Licence, or (at your option) any later version.
12 */
13
David Howellsc3ce6df2014-09-02 13:52:15 +010014#define pr_fmt(fmt) "SIG: "fmt
David Howells4ae71c12012-09-21 23:25:04 +010015#include <keys/asymmetric-subtype.h>
Paul Gortmaker1f6a9ab2015-12-09 15:05:28 -050016#include <linux/export.h>
David Howells4ae71c12012-09-21 23:25:04 +010017#include <linux/err.h>
David Howells3b764562016-04-06 16:13:33 +010018#include <linux/slab.h>
David Howells4ae71c12012-09-21 23:25:04 +010019#include <crypto/public_key.h>
20#include "asymmetric_keys.h"
21
David Howells3b764562016-04-06 16:13:33 +010022/*
23 * Destroy a public key signature.
24 */
25void public_key_signature_free(struct public_key_signature *sig)
26{
David Howellsa022ec02016-04-06 16:13:33 +010027 int i;
28
David Howells3b764562016-04-06 16:13:33 +010029 if (sig) {
David Howellsa022ec02016-04-06 16:13:33 +010030 for (i = 0; i < ARRAY_SIZE(sig->auth_ids); i++)
31 kfree(sig->auth_ids[i]);
David Howells3b764562016-04-06 16:13:33 +010032 kfree(sig->s);
33 kfree(sig->digest);
34 kfree(sig);
35 }
36}
37EXPORT_SYMBOL_GPL(public_key_signature_free);
38
David Howells4ae71c12012-09-21 23:25:04 +010039/**
40 * verify_signature - Initiate the use of an asymmetric key to verify a signature
41 * @key: The asymmetric key to verify against
42 * @sig: The signature to check
43 *
44 * Returns 0 if successful or else an error.
45 */
46int verify_signature(const struct key *key,
47 const struct public_key_signature *sig)
48{
49 const struct asymmetric_key_subtype *subtype;
50 int ret;
51
52 pr_devel("==>%s()\n", __func__);
53
54 if (key->type != &key_type_asymmetric)
55 return -EINVAL;
56 subtype = asymmetric_key_subtype(key);
57 if (!subtype ||
David Howells146aa8b2015-10-21 14:04:48 +010058 !key->payload.data[0])
David Howells4ae71c12012-09-21 23:25:04 +010059 return -EINVAL;
60 if (!subtype->verify_signature)
61 return -ENOTSUPP;
62
63 ret = subtype->verify_signature(key, sig);
64
65 pr_devel("<==%s() = %d\n", __func__, ret);
66 return ret;
67}
68EXPORT_SYMBOL_GPL(verify_signature);