summaryrefslogtreecommitdiffstats
path: root/crypto/asymmetric_keys/x509_cert_parser.c
diff options
context:
space:
mode:
authorDmitry Kasatkin2014-10-06 17:52:12 +0200
committerDavid Howells2014-10-06 17:56:08 +0200
commit8dd609805b87923a700a2fad646390a58013cdb9 (patch)
treec6f4d35bfbcf6a905054e3448bf54bd3e5f92189 /crypto/asymmetric_keys/x509_cert_parser.c
parentKEYS: Restore partial ID matching functionality for asymmetric keys (diff)
downloadkernel-qcow2-linux-8dd609805b87923a700a2fad646390a58013cdb9.tar.gz
kernel-qcow2-linux-8dd609805b87923a700a2fad646390a58013cdb9.tar.xz
kernel-qcow2-linux-8dd609805b87923a700a2fad646390a58013cdb9.zip
KEYS: use swapped SKID for performing partial matching
Earlier KEYS code used pure subject key identifiers (fingerprint) for searching keys. Latest merged code removed that and broke compatibility with integrity subsytem signatures and original format of module signatures. This patch returns back partial matching on SKID. Reported-by: Dmitry Kasatkin <d.kasatkin@samsung.com> Signed-off-by: Dmitry Kasatkin <d.kasatkin@samsung.com> Signed-off-by: David Howells <dhowells@redhat.com>
Diffstat (limited to 'crypto/asymmetric_keys/x509_cert_parser.c')
-rw-r--r--crypto/asymmetric_keys/x509_cert_parser.c12
1 files changed, 6 insertions, 6 deletions
diff --git a/crypto/asymmetric_keys/x509_cert_parser.c b/crypto/asymmetric_keys/x509_cert_parser.c
index 393706f33fa5..a668d90302d3 100644
--- a/crypto/asymmetric_keys/x509_cert_parser.c
+++ b/crypto/asymmetric_keys/x509_cert_parser.c
@@ -437,9 +437,9 @@ int x509_process_extension(void *context, size_t hdrlen,
ctx->cert->raw_skid_size = vlen;
ctx->cert->raw_skid = v;
- kid = asymmetric_key_generate_id(v, vlen,
- ctx->cert->raw_subject,
- ctx->cert->raw_subject_size);
+ kid = asymmetric_key_generate_id(ctx->cert->raw_subject,
+ ctx->cert->raw_subject_size,
+ v, vlen);
if (IS_ERR(kid))
return PTR_ERR(kid);
ctx->cert->skid = kid;
@@ -493,9 +493,9 @@ int x509_process_extension(void *context, size_t hdrlen,
v += (sub + 2);
}
- kid = asymmetric_key_generate_id(v, vlen,
- ctx->cert->raw_issuer,
- ctx->cert->raw_issuer_size);
+ kid = asymmetric_key_generate_id(ctx->cert->raw_issuer,
+ ctx->cert->raw_issuer_size,
+ v, vlen);
if (IS_ERR(kid))
return PTR_ERR(kid);
pr_debug("authkeyid %*phN\n", kid->len, kid->data);