blob: 872c6698067cdc64a91fb36b5558d689750fffe5 [file] [log] [blame]
Mimi Zohar3323eec92009-02-04 09:06:58 -05001/*
2 * Copyright (C) 2005,2006,2007,2008 IBM Corporation
3 *
4 * Authors:
5 * Mimi Zohar <zohar@us.ibm.com>
6 * Kylene Hall <kjhall@us.ibm.com>
7 *
8 * This program is free software; you can redistribute it and/or modify
9 * it under the terms of the GNU General Public License as published by
10 * the Free Software Foundation, version 2 of the License.
11 *
12 * File: ima_crypto.c
13 * Calculates md5/sha1 file hash, template hash, boot-aggreate hash
14 */
15
16#include <linux/kernel.h>
17#include <linux/file.h>
18#include <linux/crypto.h>
19#include <linux/scatterlist.h>
20#include <linux/err.h>
Tejun Heo5a0e3ad2010-03-24 17:04:11 +090021#include <linux/slab.h>
Dmitry Kasatkin76bb28f2012-06-08 10:42:30 +030022#include <crypto/hash.h>
Dmitry Kasatkinc7c8bb22013-04-25 10:43:56 +030023#include <crypto/hash_info.h>
Mimi Zohar3323eec92009-02-04 09:06:58 -050024#include "ima.h"
25
Dmitry Kasatkin76bb28f2012-06-08 10:42:30 +030026static struct crypto_shash *ima_shash_tfm;
Mimi Zohar3323eec92009-02-04 09:06:58 -050027
Dmitry Kasatkin76bb28f2012-06-08 10:42:30 +030028int ima_init_crypto(void)
29{
30 long rc;
31
Dmitry Kasatkinc7c8bb22013-04-25 10:43:56 +030032 ima_shash_tfm = crypto_alloc_shash(hash_algo_name[ima_hash_algo], 0, 0);
Dmitry Kasatkin76bb28f2012-06-08 10:42:30 +030033 if (IS_ERR(ima_shash_tfm)) {
34 rc = PTR_ERR(ima_shash_tfm);
Dmitry Kasatkinc7c8bb22013-04-25 10:43:56 +030035 pr_err("Can not allocate %s (reason: %ld)\n",
36 hash_algo_name[ima_hash_algo], rc);
Mimi Zohar3323eec92009-02-04 09:06:58 -050037 return rc;
38 }
Dmitry Kasatkin76bb28f2012-06-08 10:42:30 +030039 return 0;
Mimi Zohar3323eec92009-02-04 09:06:58 -050040}
41
42/*
43 * Calculate the MD5/SHA1 file digest
44 */
Dmitry Kasatkinc7c8bb22013-04-25 10:43:56 +030045static int ima_calc_file_hash_tfm(struct file *file,
46 struct ima_digest_data *hash,
47 struct crypto_shash *tfm)
Mimi Zohar3323eec92009-02-04 09:06:58 -050048{
Mimi Zohar16bfa382009-08-21 14:32:49 -040049 loff_t i_size, offset = 0;
Mimi Zohar3323eec92009-02-04 09:06:58 -050050 char *rbuf;
Mimi Zohar2fe5d6d2012-02-13 10:15:05 -050051 int rc, read = 0;
Dmitry Kasatkin76bb28f2012-06-08 10:42:30 +030052 struct {
53 struct shash_desc shash;
Dmitry Kasatkinc7c8bb22013-04-25 10:43:56 +030054 char ctx[crypto_shash_descsize(tfm)];
Dmitry Kasatkin76bb28f2012-06-08 10:42:30 +030055 } desc;
Mimi Zohar3323eec92009-02-04 09:06:58 -050056
Dmitry Kasatkinc7c8bb22013-04-25 10:43:56 +030057 desc.shash.tfm = tfm;
Dmitry Kasatkin76bb28f2012-06-08 10:42:30 +030058 desc.shash.flags = 0;
59
60 rc = crypto_shash_init(&desc.shash);
Mimi Zohar3323eec92009-02-04 09:06:58 -050061 if (rc != 0)
62 return rc;
63
64 rbuf = kzalloc(PAGE_SIZE, GFP_KERNEL);
65 if (!rbuf) {
66 rc = -ENOMEM;
67 goto out;
68 }
Mimi Zohar2fe5d6d2012-02-13 10:15:05 -050069 if (!(file->f_mode & FMODE_READ)) {
70 file->f_mode |= FMODE_READ;
71 read = 1;
72 }
Al Viro496ad9a2013-01-23 17:07:38 -050073 i_size = i_size_read(file_inode(file));
Mimi Zohar3323eec92009-02-04 09:06:58 -050074 while (offset < i_size) {
75 int rbuf_len;
76
77 rbuf_len = kernel_read(file, offset, rbuf, PAGE_SIZE);
78 if (rbuf_len < 0) {
79 rc = rbuf_len;
80 break;
81 }
Mimi Zohar16bfa382009-08-21 14:32:49 -040082 if (rbuf_len == 0)
83 break;
Mimi Zohar3323eec92009-02-04 09:06:58 -050084 offset += rbuf_len;
Mimi Zohar3323eec92009-02-04 09:06:58 -050085
Dmitry Kasatkin76bb28f2012-06-08 10:42:30 +030086 rc = crypto_shash_update(&desc.shash, rbuf, rbuf_len);
Mimi Zohar3323eec92009-02-04 09:06:58 -050087 if (rc)
88 break;
89 }
90 kfree(rbuf);
91 if (!rc)
Dmitry Kasatkinc7c8bb22013-04-25 10:43:56 +030092 rc = crypto_shash_final(&desc.shash, hash->digest);
Mimi Zohar2fe5d6d2012-02-13 10:15:05 -050093 if (read)
94 file->f_mode &= ~FMODE_READ;
Mimi Zohar3323eec92009-02-04 09:06:58 -050095out:
Mimi Zohar3323eec92009-02-04 09:06:58 -050096 return rc;
97}
98
Dmitry Kasatkinc7c8bb22013-04-25 10:43:56 +030099int ima_calc_file_hash(struct file *file, struct ima_digest_data *hash)
100{
101 struct crypto_shash *tfm = ima_shash_tfm;
102 int rc;
103
104 if (hash->algo != ima_hash_algo && hash->algo < HASH_ALGO__LAST) {
105 tfm = crypto_alloc_shash(hash_algo_name[hash->algo], 0, 0);
106 if (IS_ERR(tfm)) {
107 rc = PTR_ERR(tfm);
108 pr_err("Can not allocate %s (reason: %d)\n",
109 hash_algo_name[hash->algo], rc);
110 return rc;
111 }
112 }
113
114 hash->length = crypto_shash_digestsize(tfm);
115
116 rc = ima_calc_file_hash_tfm(file, hash, tfm);
117
118 if (tfm != ima_shash_tfm)
119 crypto_free_shash(tfm);
120
121 return rc;
122}
123
Mimi Zohar3323eec92009-02-04 09:06:58 -0500124/*
Dmitry Kasatkin50af5542012-05-14 14:13:56 +0300125 * Calculate the hash of a given buffer
Mimi Zohar3323eec92009-02-04 09:06:58 -0500126 */
Dmitry Kasatkinc7c8bb22013-04-25 10:43:56 +0300127int ima_calc_buffer_hash(const void *buf, int len, struct ima_digest_data *hash)
Mimi Zohar3323eec92009-02-04 09:06:58 -0500128{
Dmitry Kasatkin76bb28f2012-06-08 10:42:30 +0300129 struct {
130 struct shash_desc shash;
131 char ctx[crypto_shash_descsize(ima_shash_tfm)];
132 } desc;
Mimi Zohar3323eec92009-02-04 09:06:58 -0500133
Dmitry Kasatkin76bb28f2012-06-08 10:42:30 +0300134 desc.shash.tfm = ima_shash_tfm;
135 desc.shash.flags = 0;
Mimi Zohar3323eec92009-02-04 09:06:58 -0500136
Dmitry Kasatkinc7c8bb22013-04-25 10:43:56 +0300137 /* this function uses default algo */
138 hash->algo = ima_hash_algo;
139 hash->length = crypto_shash_digestsize(ima_shash_tfm);
140
141 return crypto_shash_digest(&desc.shash, buf, len, hash->digest);
Mimi Zohar3323eec92009-02-04 09:06:58 -0500142}
143
Eric Paris932995f2009-05-21 15:43:32 -0400144static void __init ima_pcrread(int idx, u8 *pcr)
Mimi Zohar3323eec92009-02-04 09:06:58 -0500145{
146 if (!ima_used_chip)
147 return;
148
149 if (tpm_pcr_read(TPM_ANY_NUM, idx, pcr) != 0)
Eric Pariseb8dae92010-04-22 10:49:36 -0400150 pr_err("IMA: Error Communicating to TPM chip\n");
Mimi Zohar3323eec92009-02-04 09:06:58 -0500151}
152
153/*
154 * Calculate the boot aggregate hash
155 */
Eric Paris932995f2009-05-21 15:43:32 -0400156int __init ima_calc_boot_aggregate(char *digest)
Mimi Zohar3323eec92009-02-04 09:06:58 -0500157{
Mimi Zohar140d8022013-03-11 20:29:47 -0400158 u8 pcr_i[TPM_DIGEST_SIZE];
Mimi Zohar3323eec92009-02-04 09:06:58 -0500159 int rc, i;
Dmitry Kasatkin76bb28f2012-06-08 10:42:30 +0300160 struct {
161 struct shash_desc shash;
162 char ctx[crypto_shash_descsize(ima_shash_tfm)];
163 } desc;
Mimi Zohar3323eec92009-02-04 09:06:58 -0500164
Dmitry Kasatkin76bb28f2012-06-08 10:42:30 +0300165 desc.shash.tfm = ima_shash_tfm;
166 desc.shash.flags = 0;
167
168 rc = crypto_shash_init(&desc.shash);
Mimi Zohar3323eec92009-02-04 09:06:58 -0500169 if (rc != 0)
170 return rc;
171
172 /* cumulative sha1 over tpm registers 0-7 */
173 for (i = TPM_PCR0; i < TPM_PCR8; i++) {
174 ima_pcrread(i, pcr_i);
175 /* now accumulate with current aggregate */
Mimi Zohar140d8022013-03-11 20:29:47 -0400176 rc = crypto_shash_update(&desc.shash, pcr_i, TPM_DIGEST_SIZE);
Mimi Zohar3323eec92009-02-04 09:06:58 -0500177 }
178 if (!rc)
Dmitry Kasatkin76bb28f2012-06-08 10:42:30 +0300179 crypto_shash_final(&desc.shash, digest);
Mimi Zohar3323eec92009-02-04 09:06:58 -0500180 return rc;
181}