Mimi Zohar | 3323eec9 | 2009-02-04 09:06:58 -0500 | [diff] [blame] | 1 | /* |
| 2 | * Copyright (C) 2005,2006,2007,2008 IBM Corporation |
| 3 | * |
| 4 | * Authors: |
| 5 | * Mimi Zohar <zohar@us.ibm.com> |
| 6 | * Kylene Hall <kjhall@us.ibm.com> |
| 7 | * |
| 8 | * This program is free software; you can redistribute it and/or modify |
| 9 | * it under the terms of the GNU General Public License as published by |
| 10 | * the Free Software Foundation, version 2 of the License. |
| 11 | * |
| 12 | * File: ima_crypto.c |
| 13 | * Calculates md5/sha1 file hash, template hash, boot-aggreate hash |
| 14 | */ |
| 15 | |
| 16 | #include <linux/kernel.h> |
| 17 | #include <linux/file.h> |
| 18 | #include <linux/crypto.h> |
| 19 | #include <linux/scatterlist.h> |
| 20 | #include <linux/err.h> |
Tejun Heo | 5a0e3ad | 2010-03-24 17:04:11 +0900 | [diff] [blame] | 21 | #include <linux/slab.h> |
Dmitry Kasatkin | 76bb28f | 2012-06-08 10:42:30 +0300 | [diff] [blame] | 22 | #include <crypto/hash.h> |
Dmitry Kasatkin | c7c8bb2 | 2013-04-25 10:43:56 +0300 | [diff] [blame] | 23 | #include <crypto/hash_info.h> |
Mimi Zohar | 3323eec9 | 2009-02-04 09:06:58 -0500 | [diff] [blame] | 24 | #include "ima.h" |
| 25 | |
Dmitry Kasatkin | 76bb28f | 2012-06-08 10:42:30 +0300 | [diff] [blame] | 26 | static struct crypto_shash *ima_shash_tfm; |
Mimi Zohar | 3323eec9 | 2009-02-04 09:06:58 -0500 | [diff] [blame] | 27 | |
Dmitry Kasatkin | 76bb28f | 2012-06-08 10:42:30 +0300 | [diff] [blame] | 28 | int ima_init_crypto(void) |
| 29 | { |
| 30 | long rc; |
| 31 | |
Dmitry Kasatkin | c7c8bb2 | 2013-04-25 10:43:56 +0300 | [diff] [blame] | 32 | ima_shash_tfm = crypto_alloc_shash(hash_algo_name[ima_hash_algo], 0, 0); |
Dmitry Kasatkin | 76bb28f | 2012-06-08 10:42:30 +0300 | [diff] [blame] | 33 | if (IS_ERR(ima_shash_tfm)) { |
| 34 | rc = PTR_ERR(ima_shash_tfm); |
Dmitry Kasatkin | c7c8bb2 | 2013-04-25 10:43:56 +0300 | [diff] [blame] | 35 | pr_err("Can not allocate %s (reason: %ld)\n", |
| 36 | hash_algo_name[ima_hash_algo], rc); |
Mimi Zohar | 3323eec9 | 2009-02-04 09:06:58 -0500 | [diff] [blame] | 37 | return rc; |
| 38 | } |
Dmitry Kasatkin | 76bb28f | 2012-06-08 10:42:30 +0300 | [diff] [blame] | 39 | return 0; |
Mimi Zohar | 3323eec9 | 2009-02-04 09:06:58 -0500 | [diff] [blame] | 40 | } |
| 41 | |
Dmitry Kasatkin | 723326b | 2013-07-04 17:40:01 +0300 | [diff] [blame] | 42 | static struct crypto_shash *ima_alloc_tfm(enum hash_algo algo) |
| 43 | { |
| 44 | struct crypto_shash *tfm = ima_shash_tfm; |
| 45 | int rc; |
| 46 | |
| 47 | if (algo != ima_hash_algo && algo < HASH_ALGO__LAST) { |
| 48 | tfm = crypto_alloc_shash(hash_algo_name[algo], 0, 0); |
| 49 | if (IS_ERR(tfm)) { |
| 50 | rc = PTR_ERR(tfm); |
| 51 | pr_err("Can not allocate %s (reason: %d)\n", |
| 52 | hash_algo_name[algo], rc); |
| 53 | } |
| 54 | } |
| 55 | return tfm; |
| 56 | } |
| 57 | |
| 58 | static void ima_free_tfm(struct crypto_shash *tfm) |
| 59 | { |
| 60 | if (tfm != ima_shash_tfm) |
| 61 | crypto_free_shash(tfm); |
| 62 | } |
| 63 | |
Mimi Zohar | 3323eec9 | 2009-02-04 09:06:58 -0500 | [diff] [blame] | 64 | /* |
| 65 | * Calculate the MD5/SHA1 file digest |
| 66 | */ |
Dmitry Kasatkin | c7c8bb2 | 2013-04-25 10:43:56 +0300 | [diff] [blame] | 67 | static int ima_calc_file_hash_tfm(struct file *file, |
| 68 | struct ima_digest_data *hash, |
| 69 | struct crypto_shash *tfm) |
Mimi Zohar | 3323eec9 | 2009-02-04 09:06:58 -0500 | [diff] [blame] | 70 | { |
Mimi Zohar | 16bfa38 | 2009-08-21 14:32:49 -0400 | [diff] [blame] | 71 | loff_t i_size, offset = 0; |
Mimi Zohar | 3323eec9 | 2009-02-04 09:06:58 -0500 | [diff] [blame] | 72 | char *rbuf; |
Mimi Zohar | 2fe5d6d | 2012-02-13 10:15:05 -0500 | [diff] [blame] | 73 | int rc, read = 0; |
Dmitry Kasatkin | 76bb28f | 2012-06-08 10:42:30 +0300 | [diff] [blame] | 74 | struct { |
| 75 | struct shash_desc shash; |
Dmitry Kasatkin | c7c8bb2 | 2013-04-25 10:43:56 +0300 | [diff] [blame] | 76 | char ctx[crypto_shash_descsize(tfm)]; |
Dmitry Kasatkin | 76bb28f | 2012-06-08 10:42:30 +0300 | [diff] [blame] | 77 | } desc; |
Mimi Zohar | 3323eec9 | 2009-02-04 09:06:58 -0500 | [diff] [blame] | 78 | |
Dmitry Kasatkin | c7c8bb2 | 2013-04-25 10:43:56 +0300 | [diff] [blame] | 79 | desc.shash.tfm = tfm; |
Dmitry Kasatkin | 76bb28f | 2012-06-08 10:42:30 +0300 | [diff] [blame] | 80 | desc.shash.flags = 0; |
| 81 | |
Dmitry Kasatkin | 723326b | 2013-07-04 17:40:01 +0300 | [diff] [blame] | 82 | hash->length = crypto_shash_digestsize(tfm); |
| 83 | |
Dmitry Kasatkin | 76bb28f | 2012-06-08 10:42:30 +0300 | [diff] [blame] | 84 | rc = crypto_shash_init(&desc.shash); |
Mimi Zohar | 3323eec9 | 2009-02-04 09:06:58 -0500 | [diff] [blame] | 85 | if (rc != 0) |
| 86 | return rc; |
| 87 | |
| 88 | rbuf = kzalloc(PAGE_SIZE, GFP_KERNEL); |
| 89 | if (!rbuf) { |
| 90 | rc = -ENOMEM; |
| 91 | goto out; |
| 92 | } |
Mimi Zohar | 2fe5d6d | 2012-02-13 10:15:05 -0500 | [diff] [blame] | 93 | if (!(file->f_mode & FMODE_READ)) { |
| 94 | file->f_mode |= FMODE_READ; |
| 95 | read = 1; |
| 96 | } |
Al Viro | 496ad9a | 2013-01-23 17:07:38 -0500 | [diff] [blame] | 97 | i_size = i_size_read(file_inode(file)); |
Mimi Zohar | 3323eec9 | 2009-02-04 09:06:58 -0500 | [diff] [blame] | 98 | while (offset < i_size) { |
| 99 | int rbuf_len; |
| 100 | |
| 101 | rbuf_len = kernel_read(file, offset, rbuf, PAGE_SIZE); |
| 102 | if (rbuf_len < 0) { |
| 103 | rc = rbuf_len; |
| 104 | break; |
| 105 | } |
Mimi Zohar | 16bfa38 | 2009-08-21 14:32:49 -0400 | [diff] [blame] | 106 | if (rbuf_len == 0) |
| 107 | break; |
Mimi Zohar | 3323eec9 | 2009-02-04 09:06:58 -0500 | [diff] [blame] | 108 | offset += rbuf_len; |
Mimi Zohar | 3323eec9 | 2009-02-04 09:06:58 -0500 | [diff] [blame] | 109 | |
Dmitry Kasatkin | 76bb28f | 2012-06-08 10:42:30 +0300 | [diff] [blame] | 110 | rc = crypto_shash_update(&desc.shash, rbuf, rbuf_len); |
Mimi Zohar | 3323eec9 | 2009-02-04 09:06:58 -0500 | [diff] [blame] | 111 | if (rc) |
| 112 | break; |
| 113 | } |
| 114 | kfree(rbuf); |
| 115 | if (!rc) |
Dmitry Kasatkin | c7c8bb2 | 2013-04-25 10:43:56 +0300 | [diff] [blame] | 116 | rc = crypto_shash_final(&desc.shash, hash->digest); |
Mimi Zohar | 2fe5d6d | 2012-02-13 10:15:05 -0500 | [diff] [blame] | 117 | if (read) |
| 118 | file->f_mode &= ~FMODE_READ; |
Mimi Zohar | 3323eec9 | 2009-02-04 09:06:58 -0500 | [diff] [blame] | 119 | out: |
Mimi Zohar | 3323eec9 | 2009-02-04 09:06:58 -0500 | [diff] [blame] | 120 | return rc; |
| 121 | } |
| 122 | |
Dmitry Kasatkin | c7c8bb2 | 2013-04-25 10:43:56 +0300 | [diff] [blame] | 123 | int ima_calc_file_hash(struct file *file, struct ima_digest_data *hash) |
| 124 | { |
Dmitry Kasatkin | 723326b | 2013-07-04 17:40:01 +0300 | [diff] [blame] | 125 | struct crypto_shash *tfm; |
Dmitry Kasatkin | c7c8bb2 | 2013-04-25 10:43:56 +0300 | [diff] [blame] | 126 | int rc; |
| 127 | |
Dmitry Kasatkin | 723326b | 2013-07-04 17:40:01 +0300 | [diff] [blame] | 128 | tfm = ima_alloc_tfm(hash->algo); |
| 129 | if (IS_ERR(tfm)) |
| 130 | return PTR_ERR(tfm); |
Dmitry Kasatkin | c7c8bb2 | 2013-04-25 10:43:56 +0300 | [diff] [blame] | 131 | |
| 132 | rc = ima_calc_file_hash_tfm(file, hash, tfm); |
| 133 | |
Dmitry Kasatkin | 723326b | 2013-07-04 17:40:01 +0300 | [diff] [blame] | 134 | ima_free_tfm(tfm); |
Dmitry Kasatkin | c7c8bb2 | 2013-04-25 10:43:56 +0300 | [diff] [blame] | 135 | |
| 136 | return rc; |
| 137 | } |
| 138 | |
Mimi Zohar | 3323eec9 | 2009-02-04 09:06:58 -0500 | [diff] [blame] | 139 | /* |
Dmitry Kasatkin | 50af554 | 2012-05-14 14:13:56 +0300 | [diff] [blame] | 140 | * Calculate the hash of a given buffer |
Mimi Zohar | 3323eec9 | 2009-02-04 09:06:58 -0500 | [diff] [blame] | 141 | */ |
Dmitry Kasatkin | ea59399 | 2013-06-07 12:16:24 +0200 | [diff] [blame] | 142 | static int ima_calc_buffer_hash_tfm(const void *buf, int len, |
| 143 | struct ima_digest_data *hash, |
| 144 | struct crypto_shash *tfm) |
Mimi Zohar | 3323eec9 | 2009-02-04 09:06:58 -0500 | [diff] [blame] | 145 | { |
Dmitry Kasatkin | 76bb28f | 2012-06-08 10:42:30 +0300 | [diff] [blame] | 146 | struct { |
| 147 | struct shash_desc shash; |
Dmitry Kasatkin | ea59399 | 2013-06-07 12:16:24 +0200 | [diff] [blame] | 148 | char ctx[crypto_shash_descsize(tfm)]; |
Dmitry Kasatkin | 76bb28f | 2012-06-08 10:42:30 +0300 | [diff] [blame] | 149 | } desc; |
Mimi Zohar | 3323eec9 | 2009-02-04 09:06:58 -0500 | [diff] [blame] | 150 | |
Dmitry Kasatkin | ea59399 | 2013-06-07 12:16:24 +0200 | [diff] [blame] | 151 | desc.shash.tfm = tfm; |
Dmitry Kasatkin | 76bb28f | 2012-06-08 10:42:30 +0300 | [diff] [blame] | 152 | desc.shash.flags = 0; |
Mimi Zohar | 3323eec9 | 2009-02-04 09:06:58 -0500 | [diff] [blame] | 153 | |
Dmitry Kasatkin | ea59399 | 2013-06-07 12:16:24 +0200 | [diff] [blame] | 154 | hash->length = crypto_shash_digestsize(tfm); |
Dmitry Kasatkin | c7c8bb2 | 2013-04-25 10:43:56 +0300 | [diff] [blame] | 155 | |
| 156 | return crypto_shash_digest(&desc.shash, buf, len, hash->digest); |
Mimi Zohar | 3323eec9 | 2009-02-04 09:06:58 -0500 | [diff] [blame] | 157 | } |
| 158 | |
Dmitry Kasatkin | ea59399 | 2013-06-07 12:16:24 +0200 | [diff] [blame] | 159 | int ima_calc_buffer_hash(const void *buf, int len, struct ima_digest_data *hash) |
| 160 | { |
| 161 | struct crypto_shash *tfm; |
| 162 | int rc; |
| 163 | |
| 164 | tfm = ima_alloc_tfm(hash->algo); |
| 165 | if (IS_ERR(tfm)) |
| 166 | return PTR_ERR(tfm); |
| 167 | |
| 168 | rc = ima_calc_buffer_hash_tfm(buf, len, hash, tfm); |
| 169 | |
| 170 | ima_free_tfm(tfm); |
| 171 | |
| 172 | return rc; |
| 173 | } |
| 174 | |
Eric Paris | 932995f | 2009-05-21 15:43:32 -0400 | [diff] [blame] | 175 | static void __init ima_pcrread(int idx, u8 *pcr) |
Mimi Zohar | 3323eec9 | 2009-02-04 09:06:58 -0500 | [diff] [blame] | 176 | { |
| 177 | if (!ima_used_chip) |
| 178 | return; |
| 179 | |
| 180 | if (tpm_pcr_read(TPM_ANY_NUM, idx, pcr) != 0) |
Eric Paris | eb8dae9 | 2010-04-22 10:49:36 -0400 | [diff] [blame] | 181 | pr_err("IMA: Error Communicating to TPM chip\n"); |
Mimi Zohar | 3323eec9 | 2009-02-04 09:06:58 -0500 | [diff] [blame] | 182 | } |
| 183 | |
| 184 | /* |
| 185 | * Calculate the boot aggregate hash |
| 186 | */ |
Dmitry Kasatkin | 09ef543 | 2013-06-07 12:16:25 +0200 | [diff] [blame] | 187 | static int __init ima_calc_boot_aggregate_tfm(char *digest, |
| 188 | struct crypto_shash *tfm) |
Mimi Zohar | 3323eec9 | 2009-02-04 09:06:58 -0500 | [diff] [blame] | 189 | { |
Mimi Zohar | 140d802 | 2013-03-11 20:29:47 -0400 | [diff] [blame] | 190 | u8 pcr_i[TPM_DIGEST_SIZE]; |
Mimi Zohar | 3323eec9 | 2009-02-04 09:06:58 -0500 | [diff] [blame] | 191 | int rc, i; |
Dmitry Kasatkin | 76bb28f | 2012-06-08 10:42:30 +0300 | [diff] [blame] | 192 | struct { |
| 193 | struct shash_desc shash; |
Dmitry Kasatkin | 09ef543 | 2013-06-07 12:16:25 +0200 | [diff] [blame] | 194 | char ctx[crypto_shash_descsize(tfm)]; |
Dmitry Kasatkin | 76bb28f | 2012-06-08 10:42:30 +0300 | [diff] [blame] | 195 | } desc; |
Mimi Zohar | 3323eec9 | 2009-02-04 09:06:58 -0500 | [diff] [blame] | 196 | |
Dmitry Kasatkin | 09ef543 | 2013-06-07 12:16:25 +0200 | [diff] [blame] | 197 | desc.shash.tfm = tfm; |
Dmitry Kasatkin | 76bb28f | 2012-06-08 10:42:30 +0300 | [diff] [blame] | 198 | desc.shash.flags = 0; |
| 199 | |
| 200 | rc = crypto_shash_init(&desc.shash); |
Mimi Zohar | 3323eec9 | 2009-02-04 09:06:58 -0500 | [diff] [blame] | 201 | if (rc != 0) |
| 202 | return rc; |
| 203 | |
| 204 | /* cumulative sha1 over tpm registers 0-7 */ |
| 205 | for (i = TPM_PCR0; i < TPM_PCR8; i++) { |
| 206 | ima_pcrread(i, pcr_i); |
| 207 | /* now accumulate with current aggregate */ |
Mimi Zohar | 140d802 | 2013-03-11 20:29:47 -0400 | [diff] [blame] | 208 | rc = crypto_shash_update(&desc.shash, pcr_i, TPM_DIGEST_SIZE); |
Mimi Zohar | 3323eec9 | 2009-02-04 09:06:58 -0500 | [diff] [blame] | 209 | } |
| 210 | if (!rc) |
Dmitry Kasatkin | 76bb28f | 2012-06-08 10:42:30 +0300 | [diff] [blame] | 211 | crypto_shash_final(&desc.shash, digest); |
Mimi Zohar | 3323eec9 | 2009-02-04 09:06:58 -0500 | [diff] [blame] | 212 | return rc; |
| 213 | } |
Dmitry Kasatkin | 09ef543 | 2013-06-07 12:16:25 +0200 | [diff] [blame] | 214 | |
| 215 | int __init ima_calc_boot_aggregate(struct ima_digest_data *hash) |
| 216 | { |
| 217 | struct crypto_shash *tfm; |
| 218 | int rc; |
| 219 | |
| 220 | tfm = ima_alloc_tfm(hash->algo); |
| 221 | if (IS_ERR(tfm)) |
| 222 | return PTR_ERR(tfm); |
| 223 | |
| 224 | hash->length = crypto_shash_digestsize(tfm); |
| 225 | rc = ima_calc_boot_aggregate_tfm(hash->digest, tfm); |
| 226 | |
| 227 | ima_free_tfm(tfm); |
| 228 | |
| 229 | return rc; |
| 230 | } |