|  | /* Asymmetric public-key algorithm definitions | 
|  | * | 
|  | * See Documentation/crypto/asymmetric-keys.txt | 
|  | * | 
|  | * Copyright (C) 2012 Red Hat, Inc. All Rights Reserved. | 
|  | * Written by David Howells (dhowells@redhat.com) | 
|  | * | 
|  | * This program is free software; you can redistribute it and/or | 
|  | * modify it under the terms of the GNU General Public Licence | 
|  | * as published by the Free Software Foundation; either version | 
|  | * 2 of the Licence, or (at your option) any later version. | 
|  | */ | 
|  |  | 
|  | #ifndef _LINUX_PUBLIC_KEY_H | 
|  | #define _LINUX_PUBLIC_KEY_H | 
|  |  | 
|  | #include <linux/mpi.h> | 
|  | #include <crypto/hash_info.h> | 
|  |  | 
|  | enum pkey_algo { | 
|  | PKEY_ALGO_DSA, | 
|  | PKEY_ALGO_RSA, | 
|  | PKEY_ALGO__LAST | 
|  | }; | 
|  |  | 
|  | extern const char *const pkey_algo_name[PKEY_ALGO__LAST]; | 
|  | extern const struct public_key_algorithm *pkey_algo[PKEY_ALGO__LAST]; | 
|  |  | 
|  | /* asymmetric key implementation supports only up to SHA224 */ | 
|  | #define PKEY_HASH__LAST		(HASH_ALGO_SHA224 + 1) | 
|  |  | 
|  | enum pkey_id_type { | 
|  | PKEY_ID_PGP,		/* OpenPGP generated key ID */ | 
|  | PKEY_ID_X509,		/* X.509 arbitrary subjectKeyIdentifier */ | 
|  | PKEY_ID_PKCS7,		/* Signature in PKCS#7 message */ | 
|  | PKEY_ID_TYPE__LAST | 
|  | }; | 
|  |  | 
|  | extern const char *const pkey_id_type_name[PKEY_ID_TYPE__LAST]; | 
|  |  | 
|  | /* | 
|  | * The use to which an asymmetric key is being put. | 
|  | */ | 
|  | enum key_being_used_for { | 
|  | VERIFYING_MODULE_SIGNATURE, | 
|  | VERIFYING_FIRMWARE_SIGNATURE, | 
|  | VERIFYING_KEXEC_PE_SIGNATURE, | 
|  | VERIFYING_KEY_SIGNATURE, | 
|  | VERIFYING_KEY_SELF_SIGNATURE, | 
|  | VERIFYING_UNSPECIFIED_SIGNATURE, | 
|  | NR__KEY_BEING_USED_FOR | 
|  | }; | 
|  | extern const char *const key_being_used_for[NR__KEY_BEING_USED_FOR]; | 
|  |  | 
|  | /* | 
|  | * Cryptographic data for the public-key subtype of the asymmetric key type. | 
|  | * | 
|  | * Note that this may include private part of the key as well as the public | 
|  | * part. | 
|  | */ | 
|  | struct public_key { | 
|  | const struct public_key_algorithm *algo; | 
|  | u8	capabilities; | 
|  | #define PKEY_CAN_ENCRYPT	0x01 | 
|  | #define PKEY_CAN_DECRYPT	0x02 | 
|  | #define PKEY_CAN_SIGN		0x04 | 
|  | #define PKEY_CAN_VERIFY		0x08 | 
|  | enum pkey_algo pkey_algo : 8; | 
|  | enum pkey_id_type id_type : 8; | 
|  | union { | 
|  | MPI	mpi[5]; | 
|  | struct { | 
|  | MPI	p;	/* DSA prime */ | 
|  | MPI	q;	/* DSA group order */ | 
|  | MPI	g;	/* DSA group generator */ | 
|  | MPI	y;	/* DSA public-key value = g^x mod p */ | 
|  | MPI	x;	/* DSA secret exponent (if present) */ | 
|  | } dsa; | 
|  | struct { | 
|  | MPI	n;	/* RSA public modulus */ | 
|  | MPI	e;	/* RSA public encryption exponent */ | 
|  | MPI	d;	/* RSA secret encryption exponent (if present) */ | 
|  | MPI	p;	/* RSA secret prime (if present) */ | 
|  | MPI	q;	/* RSA secret prime (if present) */ | 
|  | } rsa; | 
|  | }; | 
|  | }; | 
|  |  | 
|  | extern void public_key_destroy(void *payload); | 
|  |  | 
|  | /* | 
|  | * Public key cryptography signature data | 
|  | */ | 
|  | struct public_key_signature { | 
|  | u8 *digest; | 
|  | u8 digest_size;			/* Number of bytes in digest */ | 
|  | u8 nr_mpi;			/* Occupancy of mpi[] */ | 
|  | enum pkey_algo pkey_algo : 8; | 
|  | enum hash_algo pkey_hash_algo : 8; | 
|  | union { | 
|  | MPI mpi[2]; | 
|  | struct { | 
|  | MPI s;		/* m^d mod n */ | 
|  | } rsa; | 
|  | struct { | 
|  | MPI r; | 
|  | MPI s; | 
|  | } dsa; | 
|  | }; | 
|  | }; | 
|  |  | 
|  | struct key; | 
|  | extern int verify_signature(const struct key *key, | 
|  | const struct public_key_signature *sig); | 
|  |  | 
|  | struct asymmetric_key_id; | 
|  | extern struct key *x509_request_asymmetric_key(struct key *keyring, | 
|  | const struct asymmetric_key_id *id, | 
|  | const struct asymmetric_key_id *skid, | 
|  | bool partial); | 
|  |  | 
|  | #endif /* _LINUX_PUBLIC_KEY_H */ |