1*4882a593Smuzhiyun // SPDX-License-Identifier: GPL-2.0+
2*4882a593Smuzhiyun /*
3*4882a593Smuzhiyun * IMA support for appraising module-style appended signatures.
4*4882a593Smuzhiyun *
5*4882a593Smuzhiyun * Copyright (C) 2019 IBM Corporation
6*4882a593Smuzhiyun *
7*4882a593Smuzhiyun * Author:
8*4882a593Smuzhiyun * Thiago Jung Bauermann <bauerman@linux.ibm.com>
9*4882a593Smuzhiyun */
10*4882a593Smuzhiyun
11*4882a593Smuzhiyun #include <linux/types.h>
12*4882a593Smuzhiyun #include <linux/module_signature.h>
13*4882a593Smuzhiyun #include <keys/asymmetric-type.h>
14*4882a593Smuzhiyun #include <crypto/pkcs7.h>
15*4882a593Smuzhiyun
16*4882a593Smuzhiyun #include "ima.h"
17*4882a593Smuzhiyun
18*4882a593Smuzhiyun struct modsig {
19*4882a593Smuzhiyun struct pkcs7_message *pkcs7_msg;
20*4882a593Smuzhiyun
21*4882a593Smuzhiyun enum hash_algo hash_algo;
22*4882a593Smuzhiyun
23*4882a593Smuzhiyun /* This digest will go in the 'd-modsig' field of the IMA template. */
24*4882a593Smuzhiyun const u8 *digest;
25*4882a593Smuzhiyun u32 digest_size;
26*4882a593Smuzhiyun
27*4882a593Smuzhiyun /*
28*4882a593Smuzhiyun * This is what will go to the measurement list if the template requires
29*4882a593Smuzhiyun * storing the signature.
30*4882a593Smuzhiyun */
31*4882a593Smuzhiyun int raw_pkcs7_len;
32*4882a593Smuzhiyun u8 raw_pkcs7[];
33*4882a593Smuzhiyun };
34*4882a593Smuzhiyun
35*4882a593Smuzhiyun /*
36*4882a593Smuzhiyun * ima_read_modsig - Read modsig from buf.
37*4882a593Smuzhiyun *
38*4882a593Smuzhiyun * Return: 0 on success, error code otherwise.
39*4882a593Smuzhiyun */
ima_read_modsig(enum ima_hooks func,const void * buf,loff_t buf_len,struct modsig ** modsig)40*4882a593Smuzhiyun int ima_read_modsig(enum ima_hooks func, const void *buf, loff_t buf_len,
41*4882a593Smuzhiyun struct modsig **modsig)
42*4882a593Smuzhiyun {
43*4882a593Smuzhiyun const size_t marker_len = strlen(MODULE_SIG_STRING);
44*4882a593Smuzhiyun const struct module_signature *sig;
45*4882a593Smuzhiyun struct modsig *hdr;
46*4882a593Smuzhiyun size_t sig_len;
47*4882a593Smuzhiyun const void *p;
48*4882a593Smuzhiyun int rc;
49*4882a593Smuzhiyun
50*4882a593Smuzhiyun if (buf_len <= marker_len + sizeof(*sig))
51*4882a593Smuzhiyun return -ENOENT;
52*4882a593Smuzhiyun
53*4882a593Smuzhiyun p = buf + buf_len - marker_len;
54*4882a593Smuzhiyun if (memcmp(p, MODULE_SIG_STRING, marker_len))
55*4882a593Smuzhiyun return -ENOENT;
56*4882a593Smuzhiyun
57*4882a593Smuzhiyun buf_len -= marker_len;
58*4882a593Smuzhiyun sig = (const struct module_signature *)(p - sizeof(*sig));
59*4882a593Smuzhiyun
60*4882a593Smuzhiyun rc = mod_check_sig(sig, buf_len, func_tokens[func]);
61*4882a593Smuzhiyun if (rc)
62*4882a593Smuzhiyun return rc;
63*4882a593Smuzhiyun
64*4882a593Smuzhiyun sig_len = be32_to_cpu(sig->sig_len);
65*4882a593Smuzhiyun buf_len -= sig_len + sizeof(*sig);
66*4882a593Smuzhiyun
67*4882a593Smuzhiyun /* Allocate sig_len additional bytes to hold the raw PKCS#7 data. */
68*4882a593Smuzhiyun hdr = kzalloc(sizeof(*hdr) + sig_len, GFP_KERNEL);
69*4882a593Smuzhiyun if (!hdr)
70*4882a593Smuzhiyun return -ENOMEM;
71*4882a593Smuzhiyun
72*4882a593Smuzhiyun hdr->pkcs7_msg = pkcs7_parse_message(buf + buf_len, sig_len);
73*4882a593Smuzhiyun if (IS_ERR(hdr->pkcs7_msg)) {
74*4882a593Smuzhiyun rc = PTR_ERR(hdr->pkcs7_msg);
75*4882a593Smuzhiyun kfree(hdr);
76*4882a593Smuzhiyun return rc;
77*4882a593Smuzhiyun }
78*4882a593Smuzhiyun
79*4882a593Smuzhiyun memcpy(hdr->raw_pkcs7, buf + buf_len, sig_len);
80*4882a593Smuzhiyun hdr->raw_pkcs7_len = sig_len;
81*4882a593Smuzhiyun
82*4882a593Smuzhiyun /* We don't know the hash algorithm yet. */
83*4882a593Smuzhiyun hdr->hash_algo = HASH_ALGO__LAST;
84*4882a593Smuzhiyun
85*4882a593Smuzhiyun *modsig = hdr;
86*4882a593Smuzhiyun
87*4882a593Smuzhiyun return 0;
88*4882a593Smuzhiyun }
89*4882a593Smuzhiyun
90*4882a593Smuzhiyun /**
91*4882a593Smuzhiyun * ima_collect_modsig - Calculate the file hash without the appended signature.
92*4882a593Smuzhiyun *
93*4882a593Smuzhiyun * Since the modsig is part of the file contents, the hash used in its signature
94*4882a593Smuzhiyun * isn't the same one ordinarily calculated by IMA. Therefore PKCS7 code
95*4882a593Smuzhiyun * calculates a separate one for signature verification.
96*4882a593Smuzhiyun */
ima_collect_modsig(struct modsig * modsig,const void * buf,loff_t size)97*4882a593Smuzhiyun void ima_collect_modsig(struct modsig *modsig, const void *buf, loff_t size)
98*4882a593Smuzhiyun {
99*4882a593Smuzhiyun int rc;
100*4882a593Smuzhiyun
101*4882a593Smuzhiyun /*
102*4882a593Smuzhiyun * Provide the file contents (minus the appended sig) so that the PKCS7
103*4882a593Smuzhiyun * code can calculate the file hash.
104*4882a593Smuzhiyun */
105*4882a593Smuzhiyun size -= modsig->raw_pkcs7_len + strlen(MODULE_SIG_STRING) +
106*4882a593Smuzhiyun sizeof(struct module_signature);
107*4882a593Smuzhiyun rc = pkcs7_supply_detached_data(modsig->pkcs7_msg, buf, size);
108*4882a593Smuzhiyun if (rc)
109*4882a593Smuzhiyun return;
110*4882a593Smuzhiyun
111*4882a593Smuzhiyun /* Ask the PKCS7 code to calculate the file hash. */
112*4882a593Smuzhiyun rc = pkcs7_get_digest(modsig->pkcs7_msg, &modsig->digest,
113*4882a593Smuzhiyun &modsig->digest_size, &modsig->hash_algo);
114*4882a593Smuzhiyun }
115*4882a593Smuzhiyun
ima_modsig_verify(struct key * keyring,const struct modsig * modsig)116*4882a593Smuzhiyun int ima_modsig_verify(struct key *keyring, const struct modsig *modsig)
117*4882a593Smuzhiyun {
118*4882a593Smuzhiyun return verify_pkcs7_message_sig(NULL, 0, modsig->pkcs7_msg, keyring,
119*4882a593Smuzhiyun VERIFYING_MODULE_SIGNATURE, NULL, NULL);
120*4882a593Smuzhiyun }
121*4882a593Smuzhiyun
ima_get_modsig_digest(const struct modsig * modsig,enum hash_algo * algo,const u8 ** digest,u32 * digest_size)122*4882a593Smuzhiyun int ima_get_modsig_digest(const struct modsig *modsig, enum hash_algo *algo,
123*4882a593Smuzhiyun const u8 **digest, u32 *digest_size)
124*4882a593Smuzhiyun {
125*4882a593Smuzhiyun *algo = modsig->hash_algo;
126*4882a593Smuzhiyun *digest = modsig->digest;
127*4882a593Smuzhiyun *digest_size = modsig->digest_size;
128*4882a593Smuzhiyun
129*4882a593Smuzhiyun return 0;
130*4882a593Smuzhiyun }
131*4882a593Smuzhiyun
ima_get_raw_modsig(const struct modsig * modsig,const void ** data,u32 * data_len)132*4882a593Smuzhiyun int ima_get_raw_modsig(const struct modsig *modsig, const void **data,
133*4882a593Smuzhiyun u32 *data_len)
134*4882a593Smuzhiyun {
135*4882a593Smuzhiyun *data = &modsig->raw_pkcs7;
136*4882a593Smuzhiyun *data_len = modsig->raw_pkcs7_len;
137*4882a593Smuzhiyun
138*4882a593Smuzhiyun return 0;
139*4882a593Smuzhiyun }
140*4882a593Smuzhiyun
ima_free_modsig(struct modsig * modsig)141*4882a593Smuzhiyun void ima_free_modsig(struct modsig *modsig)
142*4882a593Smuzhiyun {
143*4882a593Smuzhiyun if (!modsig)
144*4882a593Smuzhiyun return;
145*4882a593Smuzhiyun
146*4882a593Smuzhiyun pkcs7_free_message(modsig->pkcs7_msg);
147*4882a593Smuzhiyun kfree(modsig);
148*4882a593Smuzhiyun }
149