xref: /openbmc/linux/include/linux/verification.h (revision 93a2477b)
1b4d0d230SThomas Gleixner /* SPDX-License-Identifier: GPL-2.0-or-later */
2e68503bdSDavid Howells /* Signature verification
3e68503bdSDavid Howells  *
4e68503bdSDavid Howells  * Copyright (C) 2014 Red Hat, Inc. All Rights Reserved.
5e68503bdSDavid Howells  * Written by David Howells (dhowells@redhat.com)
6e68503bdSDavid Howells  */
7e68503bdSDavid Howells 
8e68503bdSDavid Howells #ifndef _LINUX_VERIFICATION_H
9e68503bdSDavid Howells #define _LINUX_VERIFICATION_H
10e68503bdSDavid Howells 
11*93a2477bSHerbert Xu #include <linux/errno.h>
12f14602caSMickaël Salaün #include <linux/types.h>
13f14602caSMickaël Salaün 
14e68503bdSDavid Howells /*
15817aef26SYannik Sembritzki  * Indicate that both builtin trusted keys and secondary trusted keys
16817aef26SYannik Sembritzki  * should be used.
17817aef26SYannik Sembritzki  */
18817aef26SYannik Sembritzki #define VERIFY_USE_SECONDARY_KEYRING ((struct key *)1UL)
19278311e4SKairui Song #define VERIFY_USE_PLATFORM_KEYRING  ((struct key *)2UL)
20817aef26SYannik Sembritzki 
system_keyring_id_check(u64 id)21f3cf4134SRoberto Sassu static inline int system_keyring_id_check(u64 id)
22f3cf4134SRoberto Sassu {
23f3cf4134SRoberto Sassu 	if (id > (unsigned long)VERIFY_USE_PLATFORM_KEYRING)
24f3cf4134SRoberto Sassu 		return -EINVAL;
25f3cf4134SRoberto Sassu 
26f3cf4134SRoberto Sassu 	return 0;
27f3cf4134SRoberto Sassu }
28f3cf4134SRoberto Sassu 
29817aef26SYannik Sembritzki /*
30e68503bdSDavid Howells  * The use to which an asymmetric key is being put.
31e68503bdSDavid Howells  */
32e68503bdSDavid Howells enum key_being_used_for {
33e68503bdSDavid Howells 	VERIFYING_MODULE_SIGNATURE,
34e68503bdSDavid Howells 	VERIFYING_FIRMWARE_SIGNATURE,
35e68503bdSDavid Howells 	VERIFYING_KEXEC_PE_SIGNATURE,
36e68503bdSDavid Howells 	VERIFYING_KEY_SIGNATURE,
37e68503bdSDavid Howells 	VERIFYING_KEY_SELF_SIGNATURE,
38e68503bdSDavid Howells 	VERIFYING_UNSPECIFIED_SIGNATURE,
39e68503bdSDavid Howells 	NR__KEY_BEING_USED_FOR
40e68503bdSDavid Howells };
41e68503bdSDavid Howells extern const char *const key_being_used_for[NR__KEY_BEING_USED_FOR];
42e68503bdSDavid Howells 
43e68503bdSDavid Howells #ifdef CONFIG_SYSTEM_DATA_VERIFICATION
44e68503bdSDavid Howells 
45e68503bdSDavid Howells struct key;
462a7bf671SThiago Jung Bauermann struct pkcs7_message;
47e68503bdSDavid Howells 
48e68503bdSDavid Howells extern int verify_pkcs7_signature(const void *data, size_t len,
49e68503bdSDavid Howells 				  const void *raw_pkcs7, size_t pkcs7_len,
50e68503bdSDavid Howells 				  struct key *trusted_keys,
51e68503bdSDavid Howells 				  enum key_being_used_for usage,
52e68503bdSDavid Howells 				  int (*view_content)(void *ctx,
53e68503bdSDavid Howells 						      const void *data, size_t len,
54e68503bdSDavid Howells 						      size_t asn1hdrlen),
55e68503bdSDavid Howells 				  void *ctx);
562a7bf671SThiago Jung Bauermann extern int verify_pkcs7_message_sig(const void *data, size_t len,
572a7bf671SThiago Jung Bauermann 				    struct pkcs7_message *pkcs7,
582a7bf671SThiago Jung Bauermann 				    struct key *trusted_keys,
592a7bf671SThiago Jung Bauermann 				    enum key_being_used_for usage,
602a7bf671SThiago Jung Bauermann 				    int (*view_content)(void *ctx,
612a7bf671SThiago Jung Bauermann 							const void *data,
622a7bf671SThiago Jung Bauermann 							size_t len,
632a7bf671SThiago Jung Bauermann 							size_t asn1hdrlen),
642a7bf671SThiago Jung Bauermann 				    void *ctx);
65e68503bdSDavid Howells 
66e68503bdSDavid Howells #ifdef CONFIG_SIGNED_PE_FILE_VERIFICATION
67e68503bdSDavid Howells extern int verify_pefile_signature(const void *pebuf, unsigned pelen,
68e68503bdSDavid Howells 				   struct key *trusted_keys,
69e68503bdSDavid Howells 				   enum key_being_used_for usage);
70e68503bdSDavid Howells #endif
71e68503bdSDavid Howells 
72e68503bdSDavid Howells #endif /* CONFIG_SYSTEM_DATA_VERIFICATION */
73e68503bdSDavid Howells #endif /* _LINUX_VERIFY_PEFILE_H */
74