Blame view
security/integrity/digsig.c
2.73 KB
8607c5014
|
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 |
/* * Copyright (C) 2011 Intel Corporation * * Author: * Dmitry Kasatkin <dmitry.kasatkin@intel.com> * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation, version 2 of the License. * */ #define pr_fmt(fmt) KBUILD_MODNAME ": " fmt #include <linux/err.h> |
7d2ce2320
|
16 |
#include <linux/sched.h> |
65d543b23
|
17 |
#include <linux/slab.h> |
7d2ce2320
|
18 |
#include <linux/cred.h> |
8607c5014
|
19 20 21 22 23 24 25 26 27 28 |
#include <linux/key-type.h> #include <linux/digsig.h> #include "integrity.h" static struct key *keyring[INTEGRITY_KEYRING_MAX]; static const char *keyring_name[INTEGRITY_KEYRING_MAX] = { "_evm", "_module", |
7d2ce2320
|
29 |
#ifndef CONFIG_IMA_TRUSTED_KEYRING |
8607c5014
|
30 |
"_ima", |
7d2ce2320
|
31 32 33 |
#else ".ima", #endif |
8607c5014
|
34 35 36 |
}; int integrity_digsig_verify(const unsigned int id, const char *sig, int siglen, |
089bc8e95
|
37 |
const char *digest, int digestlen) |
8607c5014
|
38 39 40 41 42 43 |
{ if (id >= INTEGRITY_KEYRING_MAX) return -EINVAL; if (!keyring[id]) { keyring[id] = |
34ef7bd38
|
44 |
request_key(&key_type_keyring, keyring_name[id], NULL); |
8607c5014
|
45 46 47 48 49 50 51 52 |
if (IS_ERR(keyring[id])) { int err = PTR_ERR(keyring[id]); pr_err("no %s keyring: %d ", keyring_name[id], err); keyring[id] = NULL; return err; } } |
b1aaab22e
|
53 |
switch (sig[1]) { |
e0751257a
|
54 |
case 1: |
b1aaab22e
|
55 56 |
/* v1 API expect signature without xattr type */ return digsig_verify(keyring[id], sig + 1, siglen - 1, |
e0751257a
|
57 58 59 60 61 62 63 |
digest, digestlen); case 2: return asymmetric_verify(keyring[id], sig, siglen, digest, digestlen); } return -EOPNOTSUPP; |
8607c5014
|
64 |
} |
7d2ce2320
|
65 |
|
d16a8585d
|
66 |
int __init integrity_init_keyring(const unsigned int id) |
7d2ce2320
|
67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 |
{ const struct cred *cred = current_cred(); int err = 0; keyring[id] = keyring_alloc(keyring_name[id], KUIDT_INIT(0), KGIDT_INIT(0), cred, ((KEY_POS_ALL & ~KEY_POS_SETATTR) | KEY_USR_VIEW | KEY_USR_READ | KEY_USR_WRITE | KEY_USR_SEARCH), KEY_ALLOC_NOT_IN_QUOTA, NULL); if (!IS_ERR(keyring[id])) set_bit(KEY_FLAG_TRUSTED_ONLY, &keyring[id]->flags); else { err = PTR_ERR(keyring[id]); pr_info("Can't allocate %s keyring (%d) ", keyring_name[id], err); keyring[id] = NULL; } return err; } |
65d543b23
|
88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 |
int __init integrity_load_x509(const unsigned int id, char *path) { key_ref_t key; char *data; int rc; if (!keyring[id]) return -EINVAL; rc = integrity_read_file(path, &data); if (rc < 0) return rc; key = key_create_or_update(make_key_ref(keyring[id], 1), "asymmetric", NULL, data, rc, ((KEY_POS_ALL & ~KEY_POS_SETATTR) | KEY_USR_VIEW | KEY_USR_READ), KEY_ALLOC_NOT_IN_QUOTA | KEY_ALLOC_TRUSTED); if (IS_ERR(key)) { rc = PTR_ERR(key); pr_err("Problem loading X.509 certificate (%d): %s ", rc, path); } else { pr_notice("Loaded X.509 cert '%s': %s ", key_ref_to_ptr(key)->description, path); key_ref_put(key); } kfree(data); return 0; } |