Re: [PATCH] X.509: Support parse long form of length octets in Authority Key Identifier

2013-02-14 Thread joeyli
Hi David, 

First, thanks for your review and comments!

於 三,2013-02-13 於 13:47 +,David Howells 提到:
> Lee, Chun-Yi  wrote:
> 
> > Signed-off-by: Lee, Chun-Yi 
> 
> Without the comma, please.
> 
> > +   /* Short Form length */
> > +   if (vlen <= 127) {
> > +
> > +   if (v[1] != vlen - 2 ||
> 
> There's an unnecessary blank line there.  I would also move the comment inside
> the if-body.

I will move the comment to if-body, thanks!

> 
> > +   int sub = v[1] - 0x80;
> 
> I recommend you use an unsigned int or size_t variable.

Yes, using size_t is better, will change it.

> 
> Also, you should use ASN1_INDEFINITE_LENGTH rather than writing 0x80 and 127.

Thanks, will change it.

> 
> > +   v += 4;
> > +   key_len = v[3];
> 
> Are you sure that is correct?  You altered v before doing v[3].  I would stick
> with key_len = vlen - 4.

Sorry for my stupid mistake!

It causes by I changed the key_len's value assignment from before check
length of vlen to after, the reason is just want source code "looks
better".

I will fix it, appreciate for your correction!

> 
> > +   /* calculate the length from subsequent octet */
> 
> "... octets".
> 

I will fix the typo, thanks!

> > +   seq_len |= v[2 + i];
> 
> Add 2 to v before entering the loop.

Thanks for your suggestion, it's a better style, I will change it.

> 
> > +   /* check vlen should not less then length of keyid */
> 
> vlen should be exactly equal to key id, shouldn't it?  Leastways, that's what
> you're checking...

hm... no, the value of vlen should be equal or bigger then the length of
key id, because the AuthorityKeyIdentifier SEQUENCE may also includes
authorityCertIssuer and authorityCertSerialNumber but not just
keyIdentifier. So, it's possible:

 a. vlen = length of keyIdentifier  (short form)
 b. vlen = length of authorityCertIssuer + length of authorityCertSerialNumber 
(long form)
 c. vlen = length of keyIdentifier + length of authorityCertIssuer + length of 
authorityCertSerialNumber (long form)

But, you are right, the first element in AuthorityKeyIdentifier SEQUENCE
maybe is not keyIdentifier, the authorityCertIssuer is also possible the
first element when there have no keyIdentifier.

I will direct remove the comment for avoid the confusing.

> 
> > +   v += (4 + sub);
> > +   key_len = v[3 + sub];
> 
> Again, this doesn't look right.  Besides, you should be able to work out
> key_len from vlen, subtracting the metadata size.
> 
> David
> 

Sorry for my stupid mistake again, I will fix it!


Thanks a lot!
Joey Lee

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/


Re: [PATCH] X.509: Support parse long form of length octets in Authority Key Identifier

2013-02-14 Thread joeyli
Hi David, 

First, thanks for your review and comments!

於 三,2013-02-13 於 13:47 +,David Howells 提到:
 Lee, Chun-Yi joeyli.ker...@gmail.com wrote:
 
  Signed-off-by: Lee, Chun-Yi j...@suse.com
 
 Without the comma, please.
 
  +   /* Short Form length */
  +   if (vlen = 127) {
  +
  +   if (v[1] != vlen - 2 ||
 
 There's an unnecessary blank line there.  I would also move the comment inside
 the if-body.

I will move the comment to if-body, thanks!

 
  +   int sub = v[1] - 0x80;
 
 I recommend you use an unsigned int or size_t variable.

Yes, using size_t is better, will change it.

 
 Also, you should use ASN1_INDEFINITE_LENGTH rather than writing 0x80 and 127.

Thanks, will change it.

 
  +   v += 4;
  +   key_len = v[3];
 
 Are you sure that is correct?  You altered v before doing v[3].  I would stick
 with key_len = vlen - 4.

Sorry for my stupid mistake!

It causes by I changed the key_len's value assignment from before check
length of vlen to after, the reason is just want source code looks
better.

I will fix it, appreciate for your correction!

 
  +   /* calculate the length from subsequent octet */
 
 ... octets.
 

I will fix the typo, thanks!

  +   seq_len |= v[2 + i];
 
 Add 2 to v before entering the loop.

Thanks for your suggestion, it's a better style, I will change it.

 
  +   /* check vlen should not less then length of keyid */
 
 vlen should be exactly equal to key id, shouldn't it?  Leastways, that's what
 you're checking...

hm... no, the value of vlen should be equal or bigger then the length of
key id, because the AuthorityKeyIdentifier SEQUENCE may also includes
authorityCertIssuer and authorityCertSerialNumber but not just
keyIdentifier. So, it's possible:

 a. vlen = length of keyIdentifier  (short form)
 b. vlen = length of authorityCertIssuer + length of authorityCertSerialNumber 
(long form)
 c. vlen = length of keyIdentifier + length of authorityCertIssuer + length of 
authorityCertSerialNumber (long form)

But, you are right, the first element in AuthorityKeyIdentifier SEQUENCE
maybe is not keyIdentifier, the authorityCertIssuer is also possible the
first element when there have no keyIdentifier.

I will direct remove the comment for avoid the confusing.

 
  +   v += (4 + sub);
  +   key_len = v[3 + sub];
 
 Again, this doesn't look right.  Besides, you should be able to work out
 key_len from vlen, subtracting the metadata size.
 
 David
 

Sorry for my stupid mistake again, I will fix it!


Thanks a lot!
Joey Lee

--
To unsubscribe from this list: send the line unsubscribe linux-kernel in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/


Re: [PATCH] X.509: Support parse long form of length octets in Authority Key Identifier

2013-02-13 Thread David Howells
Lee, Chun-Yi  wrote:

> Signed-off-by: Lee, Chun-Yi 

Without the comma, please.

> + /* Short Form length */
> + if (vlen <= 127) {
> +
> + if (v[1] != vlen - 2 ||

There's an unnecessary blank line there.  I would also move the comment inside
the if-body.

> + int sub = v[1] - 0x80;

I recommend you use an unsigned int or size_t variable.

Also, you should use ASN1_INDEFINITE_LENGTH rather than writing 0x80 and 127.

> + v += 4;
> + key_len = v[3];

Are you sure that is correct?  You altered v before doing v[3].  I would stick
with key_len = vlen - 4.

> + /* calculate the length from subsequent octet */

"... octets".

> + seq_len |= v[2 + i];

Add 2 to v before entering the loop.

> + /* check vlen should not less then length of keyid */

vlen should be exactly equal to key id, shouldn't it?  Leastways, that's what
you're checking...

> + v += (4 + sub);
> + key_len = v[3 + sub];

Again, this doesn't look right.  Besides, you should be able to work out
key_len from vlen, subtracting the metadata size.

David
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/


Re: [PATCH] X.509: Support parse long form of length octets in Authority Key Identifier

2013-02-13 Thread David Howells
Lee, Chun-Yi joeyli.ker...@gmail.com wrote:

 Signed-off-by: Lee, Chun-Yi j...@suse.com

Without the comma, please.

 + /* Short Form length */
 + if (vlen = 127) {
 +
 + if (v[1] != vlen - 2 ||

There's an unnecessary blank line there.  I would also move the comment inside
the if-body.

 + int sub = v[1] - 0x80;

I recommend you use an unsigned int or size_t variable.

Also, you should use ASN1_INDEFINITE_LENGTH rather than writing 0x80 and 127.

 + v += 4;
 + key_len = v[3];

Are you sure that is correct?  You altered v before doing v[3].  I would stick
with key_len = vlen - 4.

 + /* calculate the length from subsequent octet */

... octets.

 + seq_len |= v[2 + i];

Add 2 to v before entering the loop.

 + /* check vlen should not less then length of keyid */

vlen should be exactly equal to key id, shouldn't it?  Leastways, that's what
you're checking...

 + v += (4 + sub);
 + key_len = v[3 + sub];

Again, this doesn't look right.  Besides, you should be able to work out
key_len from vlen, subtracting the metadata size.

David
--
To unsubscribe from this list: send the line unsubscribe linux-kernel in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/


Re: [PATCH] X.509: Support parse long form of length octets in Authority Key Identifier

2013-02-05 Thread joeyli
於 三,2013-02-06 於 13:08 +0800,Lee, Chun-Yi 提到:
> Per X.509 spec in 4.2.1.1 section, the structure of Authority Key
> Identifier Exception is:
^^ Extension

Sorry for my typo, I will send patch again.

Thanks
Joey Lee

> 
>AuthorityKeyIdentifier ::= SEQUENCE {
>   keyIdentifier [0] KeyIdentifier   OPTIONAL,
>   authorityCertIssuer   [1] GeneralNamesOPTIONAL,
>   authorityCertSerialNumber [2] CertificateSerialNumber OPTIONAL  }
> 
>KeyIdentifier ::= OCTET STRING
> 
> When a certificate also provides
> authorityCertIssuer and authorityCertSerialNumber then the length of
> AuthorityKeyIdentifier SEQUENCE is likely to long form format.
> e.g.
>The example certificate demos/tunala/A-server.pem in openssl source:
> 
> X509v3 Authority Key Identifier:
> keyid:49:FB:45:72:12:C4:CC:E1:45:A1:D3:08:9E:95:C4:2C:6D:55:3F:17
> DirName:/C=NZ/L=Wellington/O=Really Irresponsible Authorisation Authority 
> (RIAA)/OU=Cert-stamping/CN=Jackov al-Trades/emailAddress=none@fake.domain
> serial:00
> 
> Current parsing rule of OID_authorityKeyIdentifier only take care the
> short form format, it causes load certificate to modsign_keyring fail:
> 
> [   12.061147] X.509: Extension: 47
> [   12.075121] MODSIGN: Problem loading in-kernel X.509 certificate (-74)
> 
> So, this patch add the parsing rule for support long form format against
> Authority Key Identifier.
> 
> Cc: David Howells 
> Cc: Rusty Russell 
> Cc: Josh Boyer 
> Cc: Randy Dunlap 
> Cc: Herbert Xu 
> Cc: "David S. Miller" 
> Signed-off-by: Lee, Chun-Yi 
> ---
>  crypto/asymmetric_keys/x509_cert_parser.c |   56 
>  1 files changed, 48 insertions(+), 8 deletions(-)
> 
> diff --git a/crypto/asymmetric_keys/x509_cert_parser.c 
> b/crypto/asymmetric_keys/x509_cert_parser.c
> index 7fabc4c..7f6a152 100644
> --- a/crypto/asymmetric_keys/x509_cert_parser.c
> +++ b/crypto/asymmetric_keys/x509_cert_parser.c
> @@ -373,6 +373,9 @@ int rsa_extract_mpi(void *context, size_t hdrlen,
>   return 0;
>  }
>  
> +/* The keyIdentifier in AuthorityKeyIdentifier SEQUENCE is tag(CONT,PRIM,0) 
> */
> +#define SEQ_TAG_KEYID (ASN1_CONT << 6)
> +
>  /*
>   * Process certificate extensions that are used to qualify the certificate.
>   */
> @@ -407,21 +410,58 @@ int x509_process_extension(void *context, size_t hdrlen,
>   }
>  
>   if (ctx->last_oid == OID_authorityKeyIdentifier) {
> + size_t key_len;
> +
>   /* Get hold of the CA key fingerprint */
>   if (vlen < 5)
>   return -EBADMSG;
> - if (v[0] != (ASN1_SEQ | (ASN1_CONS << 5)) ||
> - v[1] != vlen - 2 ||
> - v[2] != (ASN1_CONT << 6) ||
> - v[3] != vlen - 4)
> +
> + /* Authority Key Identifier must be a Constructed SEQUENCE */
> + if (v[0] != (ASN1_SEQ | (ASN1_CONS << 5)))
>   return -EBADMSG;
> - v += 4;
> - vlen -= 4;
>  
> - f = kmalloc(vlen * 2 + 1, GFP_KERNEL);
> + /* Authority Key Identifier is not indefinite length */
> + if (unlikely(vlen == ASN1_INDEFINITE_LENGTH))
> + return -EBADMSG;
> +
> + /* Short Form length */
> + if (vlen <= 127) {
> +
> + if (v[1] != vlen - 2 ||
> + v[2] != SEQ_TAG_KEYID ||
> + v[3] != vlen - 4)
> + return -EBADMSG;
> +
> + v += 4;
> + key_len = v[3];
> + } else {
> + /* Long Form length */
> + size_t seq_len = 0;
> + int sub = v[1] - 0x80;
> +
> + if (sub > 2)
> + return -EBADMSG;
> +
> + /* calculate the length from subsequent octet */
> + for (i = 0; i < sub; i++) {
> + seq_len <<= 8;
> + seq_len |= v[2 + i];
> + }
> +
> + /* check vlen should not less then length of keyid */
> + if (seq_len != vlen - 2 - sub ||
> + v[2 + sub] != SEQ_TAG_KEYID ||
> + v[3 + sub] > vlen - 4 - sub)
> + return -EBADMSG;
> +
> + v += (4 + sub);
> + key_len = v[3 + sub];
> + }
> +
> + f = kmalloc(key_len * 2 + 1, GFP_KERNEL);
>   if (!f)
>   return -ENOMEM;
> - for (i = 0; i < vlen; i++)
> + for (i = 0; i < key_len; i++)
>   sprintf(f + i * 2, "%02x", v[i]);
>   pr_debug("authority   %s\n", f);
>   ctx->cert->authority = f;


--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in

Re: [PATCH] X.509: Support parse long form of length octets in Authority Key Identifier

2013-02-05 Thread joeyli
於 三,2013-02-06 於 13:08 +0800,Lee, Chun-Yi 提到:
 Per X.509 spec in 4.2.1.1 section, the structure of Authority Key
 Identifier Exception is:
^^ Extension

Sorry for my typo, I will send patch again.

Thanks
Joey Lee

 
AuthorityKeyIdentifier ::= SEQUENCE {
   keyIdentifier [0] KeyIdentifier   OPTIONAL,
   authorityCertIssuer   [1] GeneralNamesOPTIONAL,
   authorityCertSerialNumber [2] CertificateSerialNumber OPTIONAL  }
 
KeyIdentifier ::= OCTET STRING
 
 When a certificate also provides
 authorityCertIssuer and authorityCertSerialNumber then the length of
 AuthorityKeyIdentifier SEQUENCE is likely to long form format.
 e.g.
The example certificate demos/tunala/A-server.pem in openssl source:
 
 X509v3 Authority Key Identifier:
 keyid:49:FB:45:72:12:C4:CC:E1:45:A1:D3:08:9E:95:C4:2C:6D:55:3F:17
 DirName:/C=NZ/L=Wellington/O=Really Irresponsible Authorisation Authority 
 (RIAA)/OU=Cert-stamping/CN=Jackov al-Trades/emailAddress=none@fake.domain
 serial:00
 
 Current parsing rule of OID_authorityKeyIdentifier only take care the
 short form format, it causes load certificate to modsign_keyring fail:
 
 [   12.061147] X.509: Extension: 47
 [   12.075121] MODSIGN: Problem loading in-kernel X.509 certificate (-74)
 
 So, this patch add the parsing rule for support long form format against
 Authority Key Identifier.
 
 Cc: David Howells dhowe...@redhat.com
 Cc: Rusty Russell ru...@rustcorp.com.au
 Cc: Josh Boyer jwbo...@redhat.com
 Cc: Randy Dunlap rdun...@xenotime.net
 Cc: Herbert Xu herb...@gondor.apana.org.au
 Cc: David S. Miller da...@davemloft.net
 Signed-off-by: Lee, Chun-Yi j...@suse.com
 ---
  crypto/asymmetric_keys/x509_cert_parser.c |   56 
  1 files changed, 48 insertions(+), 8 deletions(-)
 
 diff --git a/crypto/asymmetric_keys/x509_cert_parser.c 
 b/crypto/asymmetric_keys/x509_cert_parser.c
 index 7fabc4c..7f6a152 100644
 --- a/crypto/asymmetric_keys/x509_cert_parser.c
 +++ b/crypto/asymmetric_keys/x509_cert_parser.c
 @@ -373,6 +373,9 @@ int rsa_extract_mpi(void *context, size_t hdrlen,
   return 0;
  }
  
 +/* The keyIdentifier in AuthorityKeyIdentifier SEQUENCE is tag(CONT,PRIM,0) 
 */
 +#define SEQ_TAG_KEYID (ASN1_CONT  6)
 +
  /*
   * Process certificate extensions that are used to qualify the certificate.
   */
 @@ -407,21 +410,58 @@ int x509_process_extension(void *context, size_t hdrlen,
   }
  
   if (ctx-last_oid == OID_authorityKeyIdentifier) {
 + size_t key_len;
 +
   /* Get hold of the CA key fingerprint */
   if (vlen  5)
   return -EBADMSG;
 - if (v[0] != (ASN1_SEQ | (ASN1_CONS  5)) ||
 - v[1] != vlen - 2 ||
 - v[2] != (ASN1_CONT  6) ||
 - v[3] != vlen - 4)
 +
 + /* Authority Key Identifier must be a Constructed SEQUENCE */
 + if (v[0] != (ASN1_SEQ | (ASN1_CONS  5)))
   return -EBADMSG;
 - v += 4;
 - vlen -= 4;
  
 - f = kmalloc(vlen * 2 + 1, GFP_KERNEL);
 + /* Authority Key Identifier is not indefinite length */
 + if (unlikely(vlen == ASN1_INDEFINITE_LENGTH))
 + return -EBADMSG;
 +
 + /* Short Form length */
 + if (vlen = 127) {
 +
 + if (v[1] != vlen - 2 ||
 + v[2] != SEQ_TAG_KEYID ||
 + v[3] != vlen - 4)
 + return -EBADMSG;
 +
 + v += 4;
 + key_len = v[3];
 + } else {
 + /* Long Form length */
 + size_t seq_len = 0;
 + int sub = v[1] - 0x80;
 +
 + if (sub  2)
 + return -EBADMSG;
 +
 + /* calculate the length from subsequent octet */
 + for (i = 0; i  sub; i++) {
 + seq_len = 8;
 + seq_len |= v[2 + i];
 + }
 +
 + /* check vlen should not less then length of keyid */
 + if (seq_len != vlen - 2 - sub ||
 + v[2 + sub] != SEQ_TAG_KEYID ||
 + v[3 + sub]  vlen - 4 - sub)
 + return -EBADMSG;
 +
 + v += (4 + sub);
 + key_len = v[3 + sub];
 + }
 +
 + f = kmalloc(key_len * 2 + 1, GFP_KERNEL);
   if (!f)
   return -ENOMEM;
 - for (i = 0; i  vlen; i++)
 + for (i = 0; i  key_len; i++)
   sprintf(f + i * 2, %02x, v[i]);
   pr_debug(authority   %s\n, f);
   ctx-cert-authority = f;


--
To unsubscribe from this list: send the line unsubscribe linux-kernel in
the body of a