]>
git.proxmox.com Git - mirror_ubuntu-bionic-kernel.git/blob - crypto/asymmetric_keys/pkcs7_key_type.c
1 /* Testing module to load key from trusted PKCS#7 message
3 * Copyright (C) 2014 Red Hat, Inc. All Rights Reserved.
4 * Written by David Howells (dhowells@redhat.com)
6 * This program is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU General Public Licence
8 * as published by the Free Software Foundation; either version
9 * 2 of the Licence, or (at your option) any later version.
12 #define pr_fmt(fmt) "PKCS7key: "fmt
13 #include <linux/key.h>
14 #include <linux/err.h>
15 #include <linux/module.h>
16 #include <linux/key-type.h>
17 #include <keys/asymmetric-type.h>
18 #include <crypto/pkcs7.h>
19 #include <keys/user-type.h>
20 #include <keys/system_keyring.h>
21 #include "pkcs7_parser.h"
23 MODULE_LICENSE("GPL");
24 MODULE_DESCRIPTION("PKCS#7 testing key type");
26 static unsigned pkcs7_usage
;
27 module_param_named(usage
, pkcs7_usage
, uint
, S_IWUSR
| S_IRUGO
);
28 MODULE_PARM_DESC(pkcs7_usage
,
29 "Usage to specify when verifying the PKCS#7 message");
32 * Preparse a PKCS#7 wrapped and validated data blob.
34 static int pkcs7_preparse(struct key_preparsed_payload
*prep
)
36 enum key_being_used_for usage
= pkcs7_usage
;
37 struct pkcs7_message
*pkcs7
;
38 const void *data
, *saved_prep_data
;
39 size_t datalen
, saved_prep_datalen
;
45 if (usage
>= NR__KEY_BEING_USED_FOR
) {
46 pr_err("Invalid usage type %d\n", usage
);
50 saved_prep_data
= prep
->data
;
51 saved_prep_datalen
= prep
->datalen
;
52 pkcs7
= pkcs7_parse_message(saved_prep_data
, saved_prep_datalen
);
58 ret
= pkcs7_verify(pkcs7
, usage
);
62 ret
= pkcs7_validate_trust(pkcs7
, system_trusted_keyring
, &trusted
);
66 pr_warn("PKCS#7 message doesn't chain back to a trusted key\n");
68 ret
= pkcs7_get_content_data(pkcs7
, &data
, &datalen
, false);
73 prep
->datalen
= datalen
;
74 ret
= user_preparse(prep
);
75 prep
->data
= saved_prep_data
;
76 prep
->datalen
= saved_prep_datalen
;
79 pkcs7_free_message(pkcs7
);
86 * user defined keys take an arbitrary string as the description and an
87 * arbitrary blob of data as the payload
89 static struct key_type key_type_pkcs7
= {
91 .preparse
= pkcs7_preparse
,
92 .free_preparse
= user_free_preparse
,
93 .instantiate
= generic_key_instantiate
,
94 .revoke
= user_revoke
,
95 .destroy
= user_destroy
,
96 .describe
= user_describe
,
103 static int __init
pkcs7_key_init(void)
105 return register_key_type(&key_type_pkcs7
);
108 static void __exit
pkcs7_key_cleanup(void)
110 unregister_key_type(&key_type_pkcs7
);
113 module_init(pkcs7_key_init
);
114 module_exit(pkcs7_key_cleanup
);