1b4d0d230SThomas Gleixner /* SPDX-License-Identifier: GPL-2.0-or-later */
2e68503bdSDavid Howells /* Signature verification
3e68503bdSDavid Howells *
4e68503bdSDavid Howells * Copyright (C) 2014 Red Hat, Inc. All Rights Reserved.
5e68503bdSDavid Howells * Written by David Howells (dhowells@redhat.com)
6e68503bdSDavid Howells */
7e68503bdSDavid Howells
8e68503bdSDavid Howells #ifndef _LINUX_VERIFICATION_H
9e68503bdSDavid Howells #define _LINUX_VERIFICATION_H
10e68503bdSDavid Howells
11*93a2477bSHerbert Xu #include <linux/errno.h>
12f14602caSMickaël Salaün #include <linux/types.h>
13f14602caSMickaël Salaün
14e68503bdSDavid Howells /*
15817aef26SYannik Sembritzki * Indicate that both builtin trusted keys and secondary trusted keys
16817aef26SYannik Sembritzki * should be used.
17817aef26SYannik Sembritzki */
18817aef26SYannik Sembritzki #define VERIFY_USE_SECONDARY_KEYRING ((struct key *)1UL)
19278311e4SKairui Song #define VERIFY_USE_PLATFORM_KEYRING ((struct key *)2UL)
20817aef26SYannik Sembritzki
system_keyring_id_check(u64 id)21f3cf4134SRoberto Sassu static inline int system_keyring_id_check(u64 id)
22f3cf4134SRoberto Sassu {
23f3cf4134SRoberto Sassu if (id > (unsigned long)VERIFY_USE_PLATFORM_KEYRING)
24f3cf4134SRoberto Sassu return -EINVAL;
25f3cf4134SRoberto Sassu
26f3cf4134SRoberto Sassu return 0;
27f3cf4134SRoberto Sassu }
28f3cf4134SRoberto Sassu
29817aef26SYannik Sembritzki /*
30e68503bdSDavid Howells * The use to which an asymmetric key is being put.
31e68503bdSDavid Howells */
32e68503bdSDavid Howells enum key_being_used_for {
33e68503bdSDavid Howells VERIFYING_MODULE_SIGNATURE,
34e68503bdSDavid Howells VERIFYING_FIRMWARE_SIGNATURE,
35e68503bdSDavid Howells VERIFYING_KEXEC_PE_SIGNATURE,
36e68503bdSDavid Howells VERIFYING_KEY_SIGNATURE,
37e68503bdSDavid Howells VERIFYING_KEY_SELF_SIGNATURE,
38e68503bdSDavid Howells VERIFYING_UNSPECIFIED_SIGNATURE,
39e68503bdSDavid Howells NR__KEY_BEING_USED_FOR
40e68503bdSDavid Howells };
41e68503bdSDavid Howells extern const char *const key_being_used_for[NR__KEY_BEING_USED_FOR];
42e68503bdSDavid Howells
43e68503bdSDavid Howells #ifdef CONFIG_SYSTEM_DATA_VERIFICATION
44e68503bdSDavid Howells
45e68503bdSDavid Howells struct key;
462a7bf671SThiago Jung Bauermann struct pkcs7_message;
47e68503bdSDavid Howells
48e68503bdSDavid Howells extern int verify_pkcs7_signature(const void *data, size_t len,
49e68503bdSDavid Howells const void *raw_pkcs7, size_t pkcs7_len,
50e68503bdSDavid Howells struct key *trusted_keys,
51e68503bdSDavid Howells enum key_being_used_for usage,
52e68503bdSDavid Howells int (*view_content)(void *ctx,
53e68503bdSDavid Howells const void *data, size_t len,
54e68503bdSDavid Howells size_t asn1hdrlen),
55e68503bdSDavid Howells void *ctx);
562a7bf671SThiago Jung Bauermann extern int verify_pkcs7_message_sig(const void *data, size_t len,
572a7bf671SThiago Jung Bauermann struct pkcs7_message *pkcs7,
582a7bf671SThiago Jung Bauermann struct key *trusted_keys,
592a7bf671SThiago Jung Bauermann enum key_being_used_for usage,
602a7bf671SThiago Jung Bauermann int (*view_content)(void *ctx,
612a7bf671SThiago Jung Bauermann const void *data,
622a7bf671SThiago Jung Bauermann size_t len,
632a7bf671SThiago Jung Bauermann size_t asn1hdrlen),
642a7bf671SThiago Jung Bauermann void *ctx);
65e68503bdSDavid Howells
66e68503bdSDavid Howells #ifdef CONFIG_SIGNED_PE_FILE_VERIFICATION
67e68503bdSDavid Howells extern int verify_pefile_signature(const void *pebuf, unsigned pelen,
68e68503bdSDavid Howells struct key *trusted_keys,
69e68503bdSDavid Howells enum key_being_used_for usage);
70e68503bdSDavid Howells #endif
71e68503bdSDavid Howells
72e68503bdSDavid Howells #endif /* CONFIG_SYSTEM_DATA_VERIFICATION */
73e68503bdSDavid Howells #endif /* _LINUX_VERIFY_PEFILE_H */
74