blob: a02e0791cf15c7add98bd922ebcc08cd3db0f725 [file] [log] [blame]
Mimi Zohar3323eec2009-02-04 09:06:58 -05001/*
2 * Copyright (C) 2005,2006,2007,2008 IBM Corporation
3 *
4 * Authors:
5 * Mimi Zohar <zohar@us.ibm.com>
6 * Kylene Hall <kjhall@us.ibm.com>
7 *
8 * This program is free software; you can redistribute it and/or modify
9 * it under the terms of the GNU General Public License as published by
10 * the Free Software Foundation, version 2 of the License.
11 *
12 * File: ima_crypto.c
13 * Calculates md5/sha1 file hash, template hash, boot-aggreate hash
14 */
15
16#include <linux/kernel.h>
17#include <linux/file.h>
18#include <linux/crypto.h>
19#include <linux/scatterlist.h>
20#include <linux/err.h>
Tejun Heo5a0e3ad2010-03-24 17:04:11 +090021#include <linux/slab.h>
Dmitry Kasatkin76bb28f2012-06-08 10:42:30 +030022#include <crypto/hash.h>
Mimi Zohar3323eec2009-02-04 09:06:58 -050023#include "ima.h"
24
Dmitry Kasatkin76bb28f2012-06-08 10:42:30 +030025static struct crypto_shash *ima_shash_tfm;
Mimi Zohar3323eec2009-02-04 09:06:58 -050026
Dmitry Kasatkin76bb28f2012-06-08 10:42:30 +030027int ima_init_crypto(void)
28{
29 long rc;
30
31 ima_shash_tfm = crypto_alloc_shash(ima_hash, 0, 0);
32 if (IS_ERR(ima_shash_tfm)) {
33 rc = PTR_ERR(ima_shash_tfm);
34 pr_err("Can not allocate %s (reason: %ld)\n", ima_hash, rc);
Mimi Zohar3323eec2009-02-04 09:06:58 -050035 return rc;
36 }
Dmitry Kasatkin76bb28f2012-06-08 10:42:30 +030037 return 0;
Mimi Zohar3323eec2009-02-04 09:06:58 -050038}
39
40/*
41 * Calculate the MD5/SHA1 file digest
42 */
Dmitry Kasatkin50af5542012-05-14 14:13:56 +030043int ima_calc_file_hash(struct file *file, char *digest)
Mimi Zohar3323eec2009-02-04 09:06:58 -050044{
Mimi Zohar16bfa382009-08-21 14:32:49 -040045 loff_t i_size, offset = 0;
Mimi Zohar3323eec2009-02-04 09:06:58 -050046 char *rbuf;
Mimi Zohar2fe5d6d2012-02-13 10:15:05 -050047 int rc, read = 0;
Dmitry Kasatkin76bb28f2012-06-08 10:42:30 +030048 struct {
49 struct shash_desc shash;
50 char ctx[crypto_shash_descsize(ima_shash_tfm)];
51 } desc;
Mimi Zohar3323eec2009-02-04 09:06:58 -050052
Dmitry Kasatkin76bb28f2012-06-08 10:42:30 +030053 desc.shash.tfm = ima_shash_tfm;
54 desc.shash.flags = 0;
55
56 rc = crypto_shash_init(&desc.shash);
Mimi Zohar3323eec2009-02-04 09:06:58 -050057 if (rc != 0)
58 return rc;
59
60 rbuf = kzalloc(PAGE_SIZE, GFP_KERNEL);
61 if (!rbuf) {
62 rc = -ENOMEM;
63 goto out;
64 }
Mimi Zohar2fe5d6d2012-02-13 10:15:05 -050065 if (!(file->f_mode & FMODE_READ)) {
66 file->f_mode |= FMODE_READ;
67 read = 1;
68 }
Al Viro496ad9a2013-01-23 17:07:38 -050069 i_size = i_size_read(file_inode(file));
Mimi Zohar3323eec2009-02-04 09:06:58 -050070 while (offset < i_size) {
71 int rbuf_len;
72
73 rbuf_len = kernel_read(file, offset, rbuf, PAGE_SIZE);
74 if (rbuf_len < 0) {
75 rc = rbuf_len;
76 break;
77 }
Mimi Zohar16bfa382009-08-21 14:32:49 -040078 if (rbuf_len == 0)
79 break;
Mimi Zohar3323eec2009-02-04 09:06:58 -050080 offset += rbuf_len;
Mimi Zohar3323eec2009-02-04 09:06:58 -050081
Dmitry Kasatkin76bb28f2012-06-08 10:42:30 +030082 rc = crypto_shash_update(&desc.shash, rbuf, rbuf_len);
Mimi Zohar3323eec2009-02-04 09:06:58 -050083 if (rc)
84 break;
85 }
86 kfree(rbuf);
87 if (!rc)
Dmitry Kasatkin76bb28f2012-06-08 10:42:30 +030088 rc = crypto_shash_final(&desc.shash, digest);
Mimi Zohar2fe5d6d2012-02-13 10:15:05 -050089 if (read)
90 file->f_mode &= ~FMODE_READ;
Mimi Zohar3323eec2009-02-04 09:06:58 -050091out:
Mimi Zohar3323eec2009-02-04 09:06:58 -050092 return rc;
93}
94
95/*
Dmitry Kasatkin50af5542012-05-14 14:13:56 +030096 * Calculate the hash of a given buffer
Mimi Zohar3323eec2009-02-04 09:06:58 -050097 */
Dmitry Kasatkin50af5542012-05-14 14:13:56 +030098int ima_calc_buffer_hash(const void *data, int len, char *digest)
Mimi Zohar3323eec2009-02-04 09:06:58 -050099{
Dmitry Kasatkin76bb28f2012-06-08 10:42:30 +0300100 struct {
101 struct shash_desc shash;
102 char ctx[crypto_shash_descsize(ima_shash_tfm)];
103 } desc;
Mimi Zohar3323eec2009-02-04 09:06:58 -0500104
Dmitry Kasatkin76bb28f2012-06-08 10:42:30 +0300105 desc.shash.tfm = ima_shash_tfm;
106 desc.shash.flags = 0;
Mimi Zohar3323eec2009-02-04 09:06:58 -0500107
Dmitry Kasatkin50af5542012-05-14 14:13:56 +0300108 return crypto_shash_digest(&desc.shash, data, len, digest);
Mimi Zohar3323eec2009-02-04 09:06:58 -0500109}
110
Eric Paris932995f2009-05-21 15:43:32 -0400111static void __init ima_pcrread(int idx, u8 *pcr)
Mimi Zohar3323eec2009-02-04 09:06:58 -0500112{
113 if (!ima_used_chip)
114 return;
115
116 if (tpm_pcr_read(TPM_ANY_NUM, idx, pcr) != 0)
Eric Pariseb8dae92010-04-22 10:49:36 -0400117 pr_err("IMA: Error Communicating to TPM chip\n");
Mimi Zohar3323eec2009-02-04 09:06:58 -0500118}
119
120/*
121 * Calculate the boot aggregate hash
122 */
Eric Paris932995f2009-05-21 15:43:32 -0400123int __init ima_calc_boot_aggregate(char *digest)
Mimi Zohar3323eec2009-02-04 09:06:58 -0500124{
Mimi Zohar3323eec2009-02-04 09:06:58 -0500125 u8 pcr_i[IMA_DIGEST_SIZE];
126 int rc, i;
Dmitry Kasatkin76bb28f2012-06-08 10:42:30 +0300127 struct {
128 struct shash_desc shash;
129 char ctx[crypto_shash_descsize(ima_shash_tfm)];
130 } desc;
Mimi Zohar3323eec2009-02-04 09:06:58 -0500131
Dmitry Kasatkin76bb28f2012-06-08 10:42:30 +0300132 desc.shash.tfm = ima_shash_tfm;
133 desc.shash.flags = 0;
134
135 rc = crypto_shash_init(&desc.shash);
Mimi Zohar3323eec2009-02-04 09:06:58 -0500136 if (rc != 0)
137 return rc;
138
139 /* cumulative sha1 over tpm registers 0-7 */
140 for (i = TPM_PCR0; i < TPM_PCR8; i++) {
141 ima_pcrread(i, pcr_i);
142 /* now accumulate with current aggregate */
Dmitry Kasatkin76bb28f2012-06-08 10:42:30 +0300143 rc = crypto_shash_update(&desc.shash, pcr_i, IMA_DIGEST_SIZE);
Mimi Zohar3323eec2009-02-04 09:06:58 -0500144 }
145 if (!rc)
Dmitry Kasatkin76bb28f2012-06-08 10:42:30 +0300146 crypto_shash_final(&desc.shash, digest);
Mimi Zohar3323eec2009-02-04 09:06:58 -0500147 return rc;
148}