On Mon, Jan 5, 2026 at 3:22 PM David Howells <[email protected]> wrote:
>
> Add a supplementary information parameter to the asymmetric key signature
> verification API, in particular crypto_sig_verify() and sig_alg::verify.
> This takes the form of a printable string containing of key=val elements.
>
> This is needed as some algorithms require additional metadata
> (e.g. RSASSA-PSS) and this extra metadata is included in the X.509
> certificates and PKCS#7 messages.  Furthermore, keyctl(KEYCTL_PKEY_VERIFY)
> already allows for this to be passed to the kernel, as do the _SIGN,
> _ENCRYPT and _DECRYPT keyctls.
>
> Signed-off-by: David Howells <[email protected]>
> cc: Herbert Xu <[email protected]>
> cc: "David S. Miller" <[email protected]>
> cc: Lukas Wunner <[email protected]>
> cc: Ignat Korchagin <[email protected]>
> cc: [email protected]
> cc: [email protected]
> ---
>  crypto/asymmetric_keys/asymmetric_type.c | 1 +
>  crypto/asymmetric_keys/public_key.c      | 2 +-
>  crypto/asymmetric_keys/signature.c       | 1 +
>  crypto/ecdsa-p1363.c                     | 5 +++--
>  crypto/ecdsa-x962.c                      | 5 +++--
>  crypto/ecdsa.c                           | 3 ++-
>  crypto/ecrdsa.c                          | 3 ++-
>  crypto/mldsa.c                           | 3 ++-
>  crypto/rsassa-pkcs1.c                    | 3 ++-
>  crypto/sig.c                             | 3 ++-
>  include/crypto/public_key.h              | 1 +
>  include/crypto/sig.h                     | 9 ++++++---
>  12 files changed, 26 insertions(+), 13 deletions(-)
>
> diff --git a/crypto/asymmetric_keys/asymmetric_type.c 
> b/crypto/asymmetric_keys/asymmetric_type.c
> index 348966ea2175..dad4f0edfa25 100644
> --- a/crypto/asymmetric_keys/asymmetric_type.c
> +++ b/crypto/asymmetric_keys/asymmetric_type.c
> @@ -596,6 +596,7 @@ static int asymmetric_key_verify_signature(struct 
> kernel_pkey_params *params,
>                 .digest_size    = params->in_len,
>                 .encoding       = params->encoding,
>                 .hash_algo      = params->hash_algo,
> +               .info           = params->info,
>                 .digest         = (void *)in,
>                 .s              = (void *)in2,
>         };
> diff --git a/crypto/asymmetric_keys/public_key.c 
> b/crypto/asymmetric_keys/public_key.c
> index ed6b4b5ae4ef..61dc4f626620 100644
> --- a/crypto/asymmetric_keys/public_key.c
> +++ b/crypto/asymmetric_keys/public_key.c
> @@ -433,7 +433,7 @@ int public_key_verify_signature(const struct public_key 
> *pkey,
>                 goto error_free_key;
>
>         ret = crypto_sig_verify(tfm, sig->s, sig->s_size,
> -                               sig->digest, sig->digest_size);
> +                               sig->digest, sig->digest_size, sig->info);
>
>  error_free_key:
>         kfree_sensitive(key);
> diff --git a/crypto/asymmetric_keys/signature.c 
> b/crypto/asymmetric_keys/signature.c
> index 041d04b5c953..26c0c0112ac4 100644
> --- a/crypto/asymmetric_keys/signature.c
> +++ b/crypto/asymmetric_keys/signature.c
> @@ -29,6 +29,7 @@ void public_key_signature_free(struct public_key_signature 
> *sig)
>                         kfree(sig->auth_ids[i]);
>                 kfree(sig->s);
>                 kfree(sig->digest);
> +               kfree(sig->info);
>                 kfree(sig);
>         }
>  }
> diff --git a/crypto/ecdsa-p1363.c b/crypto/ecdsa-p1363.c
> index e0c55c64711c..fa987dba1213 100644
> --- a/crypto/ecdsa-p1363.c
> +++ b/crypto/ecdsa-p1363.c
> @@ -18,7 +18,8 @@ struct ecdsa_p1363_ctx {
>
>  static int ecdsa_p1363_verify(struct crypto_sig *tfm,
>                               const void *src, unsigned int slen,
> -                             const void *digest, unsigned int dlen)
> +                             const void *digest, unsigned int dlen,
> +                             const char *info)
>  {
>         struct ecdsa_p1363_ctx *ctx = crypto_sig_ctx(tfm);
>         unsigned int keylen = 
> DIV_ROUND_UP_POW2(crypto_sig_keysize(ctx->child),
> @@ -32,7 +33,7 @@ static int ecdsa_p1363_verify(struct crypto_sig *tfm,
>         ecc_digits_from_bytes(src, keylen, sig.r, ndigits);
>         ecc_digits_from_bytes(src + keylen, keylen, sig.s, ndigits);
>
> -       return crypto_sig_verify(ctx->child, &sig, sizeof(sig), digest, dlen);
> +       return crypto_sig_verify(ctx->child, &sig, sizeof(sig), digest, dlen, 
> info);
>  }
>
>  static unsigned int ecdsa_p1363_key_size(struct crypto_sig *tfm)
> diff --git a/crypto/ecdsa-x962.c b/crypto/ecdsa-x962.c
> index ee71594d10a0..5d7f1078989c 100644
> --- a/crypto/ecdsa-x962.c
> +++ b/crypto/ecdsa-x962.c
> @@ -75,7 +75,8 @@ int ecdsa_get_signature_s(void *context, size_t hdrlen, 
> unsigned char tag,
>
>  static int ecdsa_x962_verify(struct crypto_sig *tfm,
>                              const void *src, unsigned int slen,
> -                            const void *digest, unsigned int dlen)
> +                            const void *digest, unsigned int dlen,
> +                            const char *info)
>  {
>         struct ecdsa_x962_ctx *ctx = crypto_sig_ctx(tfm);
>         struct ecdsa_x962_signature_ctx sig_ctx;
> @@ -89,7 +90,7 @@ static int ecdsa_x962_verify(struct crypto_sig *tfm,
>                 return err;
>
>         return crypto_sig_verify(ctx->child, &sig_ctx.sig, 
> sizeof(sig_ctx.sig),
> -                                digest, dlen);
> +                                digest, dlen, info);
>  }
>
>  static unsigned int ecdsa_x962_key_size(struct crypto_sig *tfm)
> diff --git a/crypto/ecdsa.c b/crypto/ecdsa.c
> index ce8e4364842f..144fd6b9168b 100644
> --- a/crypto/ecdsa.c
> +++ b/crypto/ecdsa.c
> @@ -65,7 +65,8 @@ static int _ecdsa_verify(struct ecc_ctx *ctx, const u64 
> *hash, const u64 *r, con
>   */
>  static int ecdsa_verify(struct crypto_sig *tfm,
>                         const void *src, unsigned int slen,
> -                       const void *digest, unsigned int dlen)
> +                       const void *digest, unsigned int dlen,
> +                       const char *info)
>  {
>         struct ecc_ctx *ctx = crypto_sig_ctx(tfm);
>         size_t bufsize = ctx->curve->g.ndigits * sizeof(u64);
> diff --git a/crypto/ecrdsa.c b/crypto/ecrdsa.c
> index 2c0602f0cd40..59f2d5bb3be4 100644
> --- a/crypto/ecrdsa.c
> +++ b/crypto/ecrdsa.c
> @@ -69,7 +69,8 @@ static const struct ecc_curve *get_curve_by_oid(enum OID 
> oid)
>
>  static int ecrdsa_verify(struct crypto_sig *tfm,
>                          const void *src, unsigned int slen,
> -                        const void *digest, unsigned int dlen)
> +                        const void *digest, unsigned int dlen,
> +                        const char *info)
>  {
>         struct ecrdsa_ctx *ctx = crypto_sig_ctx(tfm);
>         unsigned int ndigits = dlen / sizeof(u64);
> diff --git a/crypto/mldsa.c b/crypto/mldsa.c
> index 2146c774b5ca..ba071d030ab0 100644
> --- a/crypto/mldsa.c
> +++ b/crypto/mldsa.c
> @@ -25,7 +25,8 @@ static int crypto_mldsa_sign(struct crypto_sig *tfm,
>
>  static int crypto_mldsa_verify(struct crypto_sig *tfm,
>                                const void *sig, unsigned int sig_len,
> -                              const void *msg, unsigned int msg_len)
> +                              const void *msg, unsigned int msg_len,
> +                              const char *info)
>  {
>         const struct crypto_mldsa_ctx *ctx = crypto_sig_ctx(tfm);
>
> diff --git a/crypto/rsassa-pkcs1.c b/crypto/rsassa-pkcs1.c
> index 94fa5e9600e7..6283050e609a 100644
> --- a/crypto/rsassa-pkcs1.c
> +++ b/crypto/rsassa-pkcs1.c
> @@ -215,7 +215,8 @@ static int rsassa_pkcs1_sign(struct crypto_sig *tfm,
>
>  static int rsassa_pkcs1_verify(struct crypto_sig *tfm,
>                                const void *src, unsigned int slen,
> -                              const void *digest, unsigned int dlen)
> +                              const void *digest, unsigned int dlen,
> +                              const char *info)
>  {
>         struct sig_instance *inst = sig_alg_instance(tfm);
>         struct rsassa_pkcs1_inst_ctx *ictx = sig_instance_ctx(inst);
> diff --git a/crypto/sig.c b/crypto/sig.c
> index beba745b6405..c56fea3a53ae 100644
> --- a/crypto/sig.c
> +++ b/crypto/sig.c
> @@ -92,7 +92,8 @@ static int sig_default_sign(struct crypto_sig *tfm,
>
>  static int sig_default_verify(struct crypto_sig *tfm,
>                               const void *src, unsigned int slen,
> -                             const void *dst, unsigned int dlen)
> +                             const void *dst, unsigned int dlen,
> +                             const char *info)
>  {
>         return -ENOSYS;
>  }
> diff --git a/include/crypto/public_key.h b/include/crypto/public_key.h
> index e4ec8003a3a4..1e9a1e4e9916 100644
> --- a/include/crypto/public_key.h
> +++ b/include/crypto/public_key.h
> @@ -47,6 +47,7 @@ struct public_key_signature {
>         u32 s_size;             /* Number of bytes in signature */
>         u32 digest_size;        /* Number of bytes in digest */
>         bool algo_does_hash;    /* Public key algo does its own hashing */
> +       char *info;             /* Supplementary parameters */
>         const char *pkey_algo;
>         const char *hash_algo;
>         const char *encoding;
> diff --git a/include/crypto/sig.h b/include/crypto/sig.h
> index fa6dafafab3f..885fa6487780 100644
> --- a/include/crypto/sig.h
> +++ b/include/crypto/sig.h
> @@ -56,7 +56,8 @@ struct sig_alg {
>                     void *dst, unsigned int dlen);
>         int (*verify)(struct crypto_sig *tfm,
>                       const void *src, unsigned int slen,
> -                     const void *digest, unsigned int dlen);
> +                     const void *digest, unsigned int dlen,
> +                     const char *info);
>         int (*set_pub_key)(struct crypto_sig *tfm,
>                            const void *key, unsigned int keylen);
>         int (*set_priv_key)(struct crypto_sig *tfm,
> @@ -209,16 +210,18 @@ static inline int crypto_sig_sign(struct crypto_sig 
> *tfm,
>   * @slen:      source length
>   * @digest:    digest
>   * @dlen:      digest length
> + * @info:      Additional parameters as a set of k=v
>   *
>   * Return: zero on verification success; error code in case of error.
>   */
>  static inline int crypto_sig_verify(struct crypto_sig *tfm,
>                                     const void *src, unsigned int slen,
> -                                   const void *digest, unsigned int dlen)
> +                                   const void *digest, unsigned int dlen,
> +                                   const char *info)
>  {
>         struct sig_alg *alg = crypto_sig_alg(tfm);
>
> -       return alg->verify(tfm, src, slen, digest, dlen);
> +       return alg->verify(tfm, src, slen, digest, dlen, info);
>  }
>
>  /**
>

Reviewed-by: Ignat Korchagin <[email protected]>

Reply via email to