KEYS: asymmetric: Fix ECDSA use via keyctl uapi
authorDenis Kenzior <denkenz@gmail.com>
Fri, 26 Aug 2022 14:51:19 +0000 (09:51 -0500)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Fri, 10 Mar 2023 08:32:45 +0000 (09:32 +0100)
commitc77d664ab8e39086cd4ecffa8fd00651cf553ad0
tree5a18eb15ca5eeea7029a0a5c6b473f5466bfbff4
parent2fb6b7006d2392595831b1f072e2fbc31e98b40e
KEYS: asymmetric: Fix ECDSA use via keyctl uapi

[ Upstream commit 10de7b54293995368c52d9aa153f3e7a359f04a1 ]

When support for ECDSA keys was added, constraints for data & signature
sizes were never updated.  This makes it impossible to use such keys via
keyctl API from userspace.

Update constraint on max_data_size to 64 bytes in order to support
SHA512-based signatures. Also update the signature length constraints
per ECDSA signature encoding described in RFC 5480.

Fixes: 299f561a6693 ("x509: Add support for parsing x509 certs with ECDSA keys")
Signed-off-by: Denis Kenzior <denkenz@gmail.com>
Reviewed-by: Stefan Berger <stefanb@linux.ibm.com>
Reviewed-by: Jarkko Sakkinen <jarkko@kernel.org>
Signed-off-by: Jarkko Sakkinen <jarkko@kernel.org>
Signed-off-by: Sasha Levin <sashal@kernel.org>
crypto/asymmetric_keys/public_key.c