Home
last modified time | relevance | path

Searched refs:modsig (Results 1 – 11 of 11) sorted by relevance

/linux-5.19.10/security/integrity/ima/
Dima_modsig.c18 struct modsig { struct
41 struct modsig **modsig) in ima_read_modsig() argument
45 struct modsig *hdr; in ima_read_modsig()
85 *modsig = hdr; in ima_read_modsig()
97 void ima_collect_modsig(struct modsig *modsig, const void *buf, loff_t size) in ima_collect_modsig() argument
105 size -= modsig->raw_pkcs7_len + strlen(MODULE_SIG_STRING) + in ima_collect_modsig()
107 rc = pkcs7_supply_detached_data(modsig->pkcs7_msg, buf, size); in ima_collect_modsig()
112 rc = pkcs7_get_digest(modsig->pkcs7_msg, &modsig->digest, in ima_collect_modsig()
113 &modsig->digest_size, &modsig->hash_algo); in ima_collect_modsig()
116 int ima_modsig_verify(struct key *keyring, const struct modsig *modsig) in ima_modsig_verify() argument
[all …]
Dima.h68 const struct modsig *modsig; member
230 struct modsig;
265 enum hash_algo algo, struct modsig *modsig);
269 int xattr_len, const struct modsig *modsig, int pcr,
315 const struct modsig *modsig, int pcr);
320 int xattr_len, const struct modsig *modsig);
333 const struct modsig *modsig, int pcr) in ima_check_blacklist() argument
344 const struct modsig *modsig) in ima_appraise_measurement() argument
384 struct modsig **modsig);
385 void ima_collect_modsig(struct modsig *modsig, const void *buf, loff_t size);
[all …]
Dima_api.c242 enum hash_algo algo, struct modsig *modsig) in ima_collect_measurement() argument
258 if (modsig) in ima_collect_measurement()
259 ima_collect_modsig(modsig, buf, size); in ima_collect_measurement()
342 int xattr_len, const struct modsig *modsig, int pcr, in ima_store_measurement() argument
355 .modsig = modsig }; in ima_store_measurement()
364 if (iint->measured_pcrs & (0x1 << pcr) && !modsig) in ima_store_measurement()
Dima_appraise.c415 static int modsig_verify(enum ima_hooks func, const struct modsig *modsig, in modsig_verify() argument
420 rc = integrity_modsig_verify(INTEGRITY_KEYRING_IMA, modsig); in modsig_verify()
424 modsig); in modsig_verify()
444 const struct modsig *modsig, int pcr) in ima_check_blacklist() argument
454 if (iint->flags & IMA_MODSIG_ALLOWED && modsig) { in ima_check_blacklist()
455 ima_get_modsig_digest(modsig, &hash_algo, &digest, &digestsize); in ima_check_blacklist()
479 int xattr_len, const struct modsig *modsig) in ima_appraise_measurement() argument
487 bool try_modsig = iint->flags & IMA_MODSIG_ALLOWED && modsig; in ima_appraise_measurement()
554 rc = modsig_verify(func, modsig, &status, &cause); in ima_appraise_measurement()
Dima_main.c214 struct modsig *modsig = NULL; in process_measurement() local
327 rc = ima_read_modsig(func, buf, size, &modsig); in process_measurement()
337 rc = ima_collect_measurement(iint, file, buf, size, hash_algo, modsig); in process_measurement()
346 xattr_value, xattr_len, modsig, pcr, in process_measurement()
349 rc = ima_check_blacklist(iint, modsig, pcr); in process_measurement()
354 xattr_len, modsig); in process_measurement()
382 ima_free_modsig(modsig); in process_measurement()
Dima_template_lib.c456 if (!event_data->modsig) in ima_eventdigest_modsig_init()
467 rc = ima_get_modsig_digest(event_data->modsig, &hash_algo, in ima_eventdigest_modsig_init()
573 if (!event_data->modsig) in ima_eventmodsig_init()
580 rc = ima_get_raw_modsig(event_data->modsig, &data, &data_len); in ima_eventmodsig_init()
DKconfig248 The modsig keyword can be used in the IMA policy to allow a hook
/linux-5.19.10/security/integrity/
Dintegrity.h192 struct modsig;
198 int integrity_modsig_verify(unsigned int id, const struct modsig *modsig);
214 const struct modsig *modsig) in integrity_modsig_verify() argument
245 int ima_modsig_verify(struct key *keyring, const struct modsig *modsig);
248 const struct modsig *modsig) in ima_modsig_verify() argument
Ddigsig.c87 int integrity_modsig_verify(const unsigned int id, const struct modsig *modsig) in integrity_modsig_verify() argument
95 return ima_modsig_verify(keyring, modsig); in integrity_modsig_verify()
/linux-5.19.10/Documentation/security/
DIMA-templates.rst72 - 'd-modsig': the digest of the event without the appended modsig;
76 - 'modsig' the appended file signature;
96 - "ima-modsig": its format is ``d-ng|n-ng|sig|d-modsig|modsig``;
/linux-5.19.10/Documentation/ABI/testing/
Dima_policy51 appraise_type:= [imasig] | [imasig|modsig] | [sigv3]
54 where 'modsig' is an appended signature,
146 Example of appraise rule allowing modsig appended signatures:
148 appraise func=KEXEC_KERNEL_CHECK appraise_type=imasig|modsig