184 lines
5.7 KiB
Diff
184 lines
5.7 KiB
Diff
From bf460c8e2001ec1227ce5a9ecf44d24782d43871 Mon Sep 17 00:00:00 2001
|
|
From: Roberto Sassu <roberto.sassu@huawei.com>
|
|
Date: Thu, 21 Jan 2021 08:16:34 +0800
|
|
Subject: [PATCH] add save command to support digest list building
|
|
|
|
This patch adds save command to support IMA digest list.
|
|
|
|
Signed-off-by: Tianxing Zhang <benjamin93@163.com>
|
|
Signed-off-by: zhoushuiqing <zhoushuiqing2@huawei.com>
|
|
---
|
|
src/evmctl.c | 65 +++++++++++++++++++++++++++++++++++++++++++++++-----
|
|
1 file changed, 59 insertions(+), 6 deletions(-)
|
|
|
|
diff --git a/src/evmctl.c b/src/evmctl.c
|
|
index 6d2bb67..70d07a5 100644
|
|
--- a/src/evmctl.c
|
|
+++ b/src/evmctl.c
|
|
@@ -121,6 +121,7 @@ static int sigdump;
|
|
static int digest;
|
|
static int digsig;
|
|
static int sigfile;
|
|
+static int datafile;
|
|
static char *uuid_str;
|
|
static char *ino_str;
|
|
static char *uid_str;
|
|
@@ -173,7 +174,8 @@ static unsigned npcrfile;
|
|
#define log_errno_reset(level, fmt, args...) \
|
|
{do_log(level, fmt " (errno: %s)\n", ##args, strerror(errno)); errno = 0; }
|
|
|
|
-static int bin2file(const char *file, const char *ext, const unsigned char *data, int len)
|
|
+static int _bin2file(const char *file, const char *ext,
|
|
+ const unsigned char *data, int len, const char *mode)
|
|
{
|
|
FILE *fp;
|
|
char name[strlen(file) + (ext ? strlen(ext) : 0) + 2];
|
|
@@ -186,7 +188,7 @@ static int bin2file(const char *file, const char *ext, const unsigned char *data
|
|
|
|
log_info("Writing to %s\n", name);
|
|
|
|
- fp = fopen(name, "w");
|
|
+ fp = fopen(name, mode);
|
|
if (!fp) {
|
|
log_err("Failed to open: %s\n", name);
|
|
return -1;
|
|
@@ -196,6 +198,18 @@ static int bin2file(const char *file, const char *ext, const unsigned char *data
|
|
return err;
|
|
}
|
|
|
|
+static int bin2file(const char *file, const char *ext,
|
|
+ const unsigned char *data, int len)
|
|
+{
|
|
+ return _bin2file(file, ext, data, len, "w");
|
|
+}
|
|
+
|
|
+static int bin2file_append(const char *file, const char *ext,
|
|
+ const unsigned char *data, int len)
|
|
+{
|
|
+ return _bin2file(file, ext, data, len, "a");
|
|
+}
|
|
+
|
|
static unsigned char *file2bin(const char *file, const char *ext, int *size)
|
|
{
|
|
FILE *fp;
|
|
@@ -365,6 +379,9 @@ static int calc_evm_hash(const char *file, unsigned char *hash)
|
|
return -1;
|
|
}
|
|
|
|
+ if (datafile)
|
|
+ bin2file(file, "data", NULL, 0);
|
|
+
|
|
if (generation_str)
|
|
generation = strtoul(generation_str, NULL, 10);
|
|
if (ino_str)
|
|
@@ -376,7 +393,7 @@ static int calc_evm_hash(const char *file, unsigned char *hash)
|
|
if (mode_str)
|
|
st.st_mode = strtoul(mode_str, NULL, 10);
|
|
|
|
- if (!evm_immutable) {
|
|
+ if (!evm_immutable && !evm_portable) {
|
|
if (S_ISREG(st.st_mode) && !generation_str) {
|
|
int fd = open(file, 0);
|
|
|
|
@@ -478,7 +495,11 @@ static int calc_evm_hash(const char *file, unsigned char *hash)
|
|
log_info("name: %s, size: %d\n",
|
|
use_xattr_ima ? xattr_ima : *xattrname, err);
|
|
log_debug_dump(xattr_value, err);
|
|
- err = EVP_DigestUpdate(pctx, xattr_value, err);
|
|
+ if (datafile)
|
|
+ err = bin2file_append(file, "data",
|
|
+ (const unsigned char *)xattr_value, err);
|
|
+ else
|
|
+ err = EVP_DigestUpdate(pctx, xattr_value, err);
|
|
if (!err) {
|
|
log_err("EVP_DigestUpdate() failed\n");
|
|
goto out;
|
|
@@ -532,7 +553,11 @@ static int calc_evm_hash(const char *file, unsigned char *hash)
|
|
log_debug("hmac_misc (%d): ", hmac_size);
|
|
log_debug_dump(&hmac_misc, hmac_size);
|
|
|
|
- err = EVP_DigestUpdate(pctx, &hmac_misc, hmac_size);
|
|
+ if (datafile)
|
|
+ err = bin2file_append(file, "data",
|
|
+ (const unsigned char *)&hmac_misc, hmac_size);
|
|
+ else
|
|
+ err = EVP_DigestUpdate(pctx, &hmac_misc, hmac_size);
|
|
if (!err) {
|
|
log_err("EVP_DigestUpdate() failed\n");
|
|
goto out;
|
|
@@ -593,6 +618,9 @@ static int sign_evm(const char *file, const char *key)
|
|
if (sigdump || imaevm_params.verbose >= LOG_INFO)
|
|
imaevm_hexdump(sig, len);
|
|
|
|
+ if (sigfile)
|
|
+ bin2file(file, "sig", sig, len);
|
|
+
|
|
if (xattr) {
|
|
err = lsetxattr(file, xattr_evm, sig, len, 0);
|
|
if (err < 0) {
|
|
@@ -605,6 +633,21 @@ static int sign_evm(const char *file, const char *key)
|
|
return 0;
|
|
}
|
|
|
|
+static int save_evm(const char *file)
|
|
+{
|
|
+ unsigned char hash[MAX_DIGEST_SIZE];
|
|
+ int len;
|
|
+
|
|
+ datafile = 1;
|
|
+
|
|
+ len = calc_evm_hash(file, hash);
|
|
+ if (len <= 1)
|
|
+ return len;
|
|
+ assert(len <= sizeof(hash));
|
|
+
|
|
+ return 0;
|
|
+}
|
|
+
|
|
static int hash_ima(const char *file)
|
|
{
|
|
unsigned char hash[MAX_DIGEST_SIZE + 2]; /* +2 byte xattr header */
|
|
@@ -717,7 +760,7 @@ static int get_file_type(const char *path, const char *search_type)
|
|
|
|
static int do_cmd(struct command *cmd, find_cb_t func)
|
|
{
|
|
- char *path = g_argv[optind++];
|
|
+ char *path = g_argv[optind++], *path_ptr;
|
|
int err, dts = REG_MASK; /* only regular files by default */
|
|
|
|
if (!path) {
|
|
@@ -726,6 +769,10 @@ static int do_cmd(struct command *cmd, find_cb_t func)
|
|
return -1;
|
|
}
|
|
|
|
+ path_ptr = path + strlen(path) - 1;
|
|
+ if (*path_ptr == '/')
|
|
+ *path_ptr = '\0';
|
|
+
|
|
if (recursive) {
|
|
if (search_type) {
|
|
dts = get_file_type(path, search_type);
|
|
@@ -905,6 +952,11 @@ static int cmd_sign_evm(struct command *cmd)
|
|
return do_cmd(cmd, sign_evm_path);
|
|
}
|
|
|
|
+static int cmd_save_evm(struct command *cmd)
|
|
+{
|
|
+ return do_cmd(cmd, save_evm);
|
|
+}
|
|
+
|
|
static int verify_evm(const char *file)
|
|
{
|
|
unsigned char hash[MAX_DIGEST_SIZE];
|
|
@@ -2874,6 +2926,7 @@ struct command cmds[] = {
|
|
{"import", cmd_import, 0, "pubkey keyring", "Import public key into the keyring.\n"},
|
|
#endif
|
|
{"sign", cmd_sign_evm, 0, "[-r] [--imahash | --imasig ] [--key key] [--pass[=<password>]] file", "Sign file metadata.\n"},
|
|
+ {"save", cmd_save_evm, 0, "[-r] [--imahash | --imasig ] file", "Save file metadata.\n"},
|
|
{"verify", cmd_verify_evm, 0, "file", "Verify EVM signature (for debugging).\n"},
|
|
{"ima_sign", cmd_sign_ima, 0, "[--sigfile] [--key key] [--pass[=<password>]] file", "Make file content signature.\n"},
|
|
{"ima_verify", cmd_verify_ima, 0, "file", "Verify IMA signature (for debugging).\n"},
|
|
--
|
|
2.33.0
|
|
|