summaryrefslogtreecommitdiffstats
path: root/crypto/asymmetric_keys
diff options
context:
space:
mode:
authorDavid Howells <dhowells@redhat.com>2016-04-06 11:13:34 -0400
committerDavid Howells <dhowells@redhat.com>2016-04-06 11:13:34 -0400
commitad3043fda39db0361d9601685356db4512e914be (patch)
tree3c3d8c2db36424117fca5561d27b170fd83e44bf /crypto/asymmetric_keys
parent6c2dc5ae4ab719a61d19e8cef082226410b04ff8 (diff)
X.509: Fix self-signed determination
There's a bug in the code determining whether a certificate is self-signed or not: if they have neither AKID nor SKID then we just assume that the cert is self-signed, which may not be true. Fix this by checking that the raw subject name matches the raw issuer name and that the public key algorithm for the key and signature are both the same in addition to requiring that the AKID bits match. Signed-off-by: David Howells <dhowells@redhat.com>
Diffstat (limited to 'crypto/asymmetric_keys')
-rw-r--r--crypto/asymmetric_keys/x509_public_key.c9
1 files changed, 9 insertions, 0 deletions
diff --git a/crypto/asymmetric_keys/x509_public_key.c b/crypto/asymmetric_keys/x509_public_key.c
index 752d8d5b48fa..fc77a2bd70ba 100644
--- a/crypto/asymmetric_keys/x509_public_key.c
+++ b/crypto/asymmetric_keys/x509_public_key.c
@@ -230,6 +230,11 @@ int x509_check_for_self_signed(struct x509_certificate *cert)
230 230
231 pr_devel("==>%s()\n", __func__); 231 pr_devel("==>%s()\n", __func__);
232 232
233 if (cert->raw_subject_size != cert->raw_issuer_size ||
234 memcmp(cert->raw_subject, cert->raw_issuer,
235 cert->raw_issuer_size) != 0)
236 goto not_self_signed;
237
233 if (cert->sig->auth_ids[0] || cert->sig->auth_ids[1]) { 238 if (cert->sig->auth_ids[0] || cert->sig->auth_ids[1]) {
234 /* If the AKID is present it may have one or two parts. If 239 /* If the AKID is present it may have one or two parts. If
235 * both are supplied, both must match. 240 * both are supplied, both must match.
@@ -246,6 +251,10 @@ int x509_check_for_self_signed(struct x509_certificate *cert)
246 goto out; 251 goto out;
247 } 252 }
248 253
254 ret = -EKEYREJECTED;
255 if (cert->pub->pkey_algo != cert->sig->pkey_algo)
256 goto out;
257
249 ret = public_key_verify_signature(cert->pub, cert->sig); 258 ret = public_key_verify_signature(cert->pub, cert->sig);
250 if (ret < 0) { 259 if (ret < 0) {
251 if (ret == -ENOPKG) { 260 if (ret == -ENOPKG) {