KEYS: asymmetric: Fix ECDSA use via keyctl uapi
authorDenis Kenzior <denkenz@gmail.com>
Fri, 26 Aug 2022 14:51:19 +0000 (09:51 -0500)
committerJarkko Sakkinen <jarkko@kernel.org>
Mon, 13 Feb 2023 08:11:20 +0000 (10:11 +0200)
commit10de7b54293995368c52d9aa153f3e7a359f04a1
treeb93a672b3acc4afe73d3990378efe17a46ebe543
parentc95e8f6fd157b45ef0685c221931561e943e82da
KEYS: asymmetric: Fix ECDSA use via keyctl uapi

When support for ECDSA keys was added, constraints for data & signature
sizes were never updated.  This makes it impossible to use such keys via
keyctl API from userspace.

Update constraint on max_data_size to 64 bytes in order to support
SHA512-based signatures. Also update the signature length constraints
per ECDSA signature encoding described in RFC 5480.

Fixes: 299f561a6693 ("x509: Add support for parsing x509 certs with ECDSA keys")
Signed-off-by: Denis Kenzior <denkenz@gmail.com>
Reviewed-by: Stefan Berger <stefanb@linux.ibm.com>
Reviewed-by: Jarkko Sakkinen <jarkko@kernel.org>
Signed-off-by: Jarkko Sakkinen <jarkko@kernel.org>
crypto/asymmetric_keys/public_key.c