blob: b4af4ebc5be284d7f2665a5266be6a5bf267a683 [file] [log] [blame]
Dmitry Kasatkin8607c502011-10-05 11:54:46 +03001/*
2 * Copyright (C) 2011 Intel Corporation
3 *
4 * Author:
5 * Dmitry Kasatkin <dmitry.kasatkin@intel.com>
6 *
7 * This program is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU General Public License as published by
9 * the Free Software Foundation, version 2 of the License.
10 *
11 */
12
13#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
14
15#include <linux/err.h>
16#include <linux/rbtree.h>
17#include <linux/key-type.h>
18#include <linux/digsig.h>
19
20#include "integrity.h"
21
22static struct key *keyring[INTEGRITY_KEYRING_MAX];
23
24static const char *keyring_name[INTEGRITY_KEYRING_MAX] = {
25 "_evm",
26 "_module",
27 "_ima",
28};
29
30int integrity_digsig_verify(const unsigned int id, const char *sig, int siglen,
Dmitry Kasatkin089bc8e2013-10-10 15:56:13 +090031 const char *digest, int digestlen)
Dmitry Kasatkin8607c502011-10-05 11:54:46 +030032{
33 if (id >= INTEGRITY_KEYRING_MAX)
34 return -EINVAL;
35
36 if (!keyring[id]) {
37 keyring[id] =
38 request_key(&key_type_keyring, keyring_name[id], NULL);
39 if (IS_ERR(keyring[id])) {
40 int err = PTR_ERR(keyring[id]);
41 pr_err("no %s keyring: %d\n", keyring_name[id], err);
42 keyring[id] = NULL;
43 return err;
44 }
45 }
46
Dmitry Kasatkinb1aaab22013-10-10 16:12:03 +090047 switch (sig[1]) {
Dmitry Kasatkine0751252013-02-07 00:12:08 +020048 case 1:
Dmitry Kasatkinb1aaab22013-10-10 16:12:03 +090049 /* v1 API expect signature without xattr type */
50 return digsig_verify(keyring[id], sig + 1, siglen - 1,
Dmitry Kasatkine0751252013-02-07 00:12:08 +020051 digest, digestlen);
52 case 2:
53 return asymmetric_verify(keyring[id], sig, siglen,
54 digest, digestlen);
55 }
56
57 return -EOPNOTSUPP;
Dmitry Kasatkin8607c502011-10-05 11:54:46 +030058}