forked from mirrors/linux
		
	 f3cf4134c5
			
		
	
	
		f3cf4134c5
		
	
	
	
	
		
			
			Add the bpf_lookup_user_key(), bpf_lookup_system_key() and bpf_key_put() kfuncs, to respectively search a key with a given key handle serial number and flags, obtain a key from a pre-determined ID defined in include/linux/verification.h, and cleanup. Introduce system_keyring_id_check() to validate the keyring ID parameter of bpf_lookup_system_key(). Signed-off-by: Roberto Sassu <roberto.sassu@huawei.com> Acked-by: Kumar Kartikeya Dwivedi <memxor@gmail.com> Acked-by: Song Liu <song@kernel.org> Link: https://lore.kernel.org/r/20220920075951.929132-8-roberto.sassu@huaweicloud.com Signed-off-by: Alexei Starovoitov <ast@kernel.org>
		
			
				
	
	
		
			72 lines
		
	
	
	
		
			1.9 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			72 lines
		
	
	
	
		
			1.9 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
| /* SPDX-License-Identifier: GPL-2.0-or-later */
 | |
| /* Signature verification
 | |
|  *
 | |
|  * Copyright (C) 2014 Red Hat, Inc. All Rights Reserved.
 | |
|  * Written by David Howells (dhowells@redhat.com)
 | |
|  */
 | |
| 
 | |
| #ifndef _LINUX_VERIFICATION_H
 | |
| #define _LINUX_VERIFICATION_H
 | |
| 
 | |
| #include <linux/types.h>
 | |
| 
 | |
| /*
 | |
|  * Indicate that both builtin trusted keys and secondary trusted keys
 | |
|  * should be used.
 | |
|  */
 | |
| #define VERIFY_USE_SECONDARY_KEYRING ((struct key *)1UL)
 | |
| #define VERIFY_USE_PLATFORM_KEYRING  ((struct key *)2UL)
 | |
| 
 | |
| static inline int system_keyring_id_check(u64 id)
 | |
| {
 | |
| 	if (id > (unsigned long)VERIFY_USE_PLATFORM_KEYRING)
 | |
| 		return -EINVAL;
 | |
| 
 | |
| 	return 0;
 | |
| }
 | |
| 
 | |
| /*
 | |
|  * The use to which an asymmetric key is being put.
 | |
|  */
 | |
| enum key_being_used_for {
 | |
| 	VERIFYING_MODULE_SIGNATURE,
 | |
| 	VERIFYING_FIRMWARE_SIGNATURE,
 | |
| 	VERIFYING_KEXEC_PE_SIGNATURE,
 | |
| 	VERIFYING_KEY_SIGNATURE,
 | |
| 	VERIFYING_KEY_SELF_SIGNATURE,
 | |
| 	VERIFYING_UNSPECIFIED_SIGNATURE,
 | |
| 	NR__KEY_BEING_USED_FOR
 | |
| };
 | |
| extern const char *const key_being_used_for[NR__KEY_BEING_USED_FOR];
 | |
| 
 | |
| #ifdef CONFIG_SYSTEM_DATA_VERIFICATION
 | |
| 
 | |
| struct key;
 | |
| struct pkcs7_message;
 | |
| 
 | |
| extern int verify_pkcs7_signature(const void *data, size_t len,
 | |
| 				  const void *raw_pkcs7, size_t pkcs7_len,
 | |
| 				  struct key *trusted_keys,
 | |
| 				  enum key_being_used_for usage,
 | |
| 				  int (*view_content)(void *ctx,
 | |
| 						      const void *data, size_t len,
 | |
| 						      size_t asn1hdrlen),
 | |
| 				  void *ctx);
 | |
| extern int verify_pkcs7_message_sig(const void *data, size_t len,
 | |
| 				    struct pkcs7_message *pkcs7,
 | |
| 				    struct key *trusted_keys,
 | |
| 				    enum key_being_used_for usage,
 | |
| 				    int (*view_content)(void *ctx,
 | |
| 							const void *data,
 | |
| 							size_t len,
 | |
| 							size_t asn1hdrlen),
 | |
| 				    void *ctx);
 | |
| 
 | |
| #ifdef CONFIG_SIGNED_PE_FILE_VERIFICATION
 | |
| extern int verify_pefile_signature(const void *pebuf, unsigned pelen,
 | |
| 				   struct key *trusted_keys,
 | |
| 				   enum key_being_used_for usage);
 | |
| #endif
 | |
| 
 | |
| #endif /* CONFIG_SYSTEM_DATA_VERIFICATION */
 | |
| #endif /* _LINUX_VERIFY_PEFILE_H */
 |