Blame src/evmctl.c

Packit c6d22b
/*
Packit c6d22b
 * ima-evm-utils - IMA/EVM support utilities
Packit c6d22b
 *
Packit c6d22b
 * Copyright (C) 2011 Nokia Corporation
Packit c6d22b
 * Copyright (C) 2011,2012,2013 Intel Corporation
Packit c6d22b
 * Copyright (C) 2013,2014 Samsung Electronics
Packit c6d22b
 *
Packit c6d22b
 * Authors:
Packit c6d22b
 * Dmitry Kasatkin <dmitry.kasatkin@nokia.com>
Packit c6d22b
 *                 <dmitry.kasatkin@intel.com>
Packit c6d22b
 *                 <d.kasatkin@samsung.com>
Packit c6d22b
 *
Packit c6d22b
 * This program is free software; you can redistribute it and/or
Packit c6d22b
 * modify it under the terms of the GNU General Public License
Packit c6d22b
 * version 2 as published by the Free Software Foundation.
Packit c6d22b
 *
Packit c6d22b
 * This program is distributed in the hope that it will be useful,
Packit c6d22b
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
Packit c6d22b
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
Packit c6d22b
 * GNU General Public License for more details.
Packit c6d22b
 *
Packit c6d22b
 * You should have received a copy of the GNU General Public License
Packit c6d22b
 * along with this program.  If not, see <http://www.gnu.org/licenses/>.
Packit c6d22b
 *
Packit c6d22b
 * As a special exception, the copyright holders give permission to link the
Packit c6d22b
 * code of portions of this program with the OpenSSL library under certain
Packit c6d22b
 * conditions as described in each individual source file and distribute
Packit c6d22b
 * linked combinations including the program with the OpenSSL library. You
Packit c6d22b
 * must comply with the GNU General Public License in all respects
Packit c6d22b
 * for all of the code used other than as permitted herein. If you modify
Packit c6d22b
 * file(s) with this exception, you may extend this exception to your
Packit c6d22b
 * version of the file(s), but you are not obligated to do so. If you do not
Packit c6d22b
 * wish to do so, delete this exception statement from your version. If you
Packit c6d22b
 * delete this exception statement from all source files in the program,
Packit c6d22b
 * then also delete it in the license file.
Packit c6d22b
 *
Packit c6d22b
 * File: evmctl.c
Packit c6d22b
 *	 IMA/EVM control program
Packit c6d22b
 */
Packit c6d22b
Packit c6d22b
#include <sys/types.h>
Packit c6d22b
#include <sys/param.h>
Packit c6d22b
#include <sys/stat.h>
Packit c6d22b
#include <sys/ioctl.h>
Packit c6d22b
#include <fcntl.h>
Packit c6d22b
#include <unistd.h>
Packit c6d22b
#include <stdlib.h>
Packit c6d22b
#include <stdio.h>
Packit c6d22b
#include <stdint.h>
Packit c6d22b
#include <string.h>
Packit c6d22b
#include <dirent.h>
Packit c6d22b
#include <attr/xattr.h>
Packit c6d22b
#include <linux/xattr.h>
Packit c6d22b
#include <getopt.h>
Packit c6d22b
#include <keyutils.h>
Packit c6d22b
#include <ctype.h>
Packit c6d22b
#include <termios.h>
Packit c6d22b
Packit c6d22b
#include <openssl/sha.h>
Packit c6d22b
#include <openssl/pem.h>
Packit c6d22b
#include <openssl/hmac.h>
Packit c6d22b
#include <openssl/err.h>
Packit c6d22b
#include <openssl/rsa.h>
Packit c6d22b
Packit c6d22b
#define USE_FPRINTF
Packit c6d22b
Packit c6d22b
#include "imaevm.h"
Packit c6d22b
Packit c6d22b
static char *evm_default_xattrs[] = {
Packit c6d22b
	XATTR_NAME_SELINUX,
Packit c6d22b
	XATTR_NAME_SMACK,
Packit c6d22b
	XATTR_NAME_IMA,
Packit c6d22b
	XATTR_NAME_CAPS,
Packit c6d22b
	NULL
Packit c6d22b
};
Packit c6d22b
Packit c6d22b
static char *evm_extra_smack_xattrs[] = {
Packit c6d22b
	XATTR_NAME_SELINUX,
Packit c6d22b
	XATTR_NAME_SMACK,
Packit c6d22b
	XATTR_NAME_SMACKEXEC,
Packit c6d22b
	XATTR_NAME_SMACKTRANSMUTE,
Packit c6d22b
	XATTR_NAME_SMACKMMAP,
Packit c6d22b
	XATTR_NAME_IMA,
Packit c6d22b
	XATTR_NAME_CAPS,
Packit c6d22b
	NULL
Packit c6d22b
};
Packit c6d22b
Packit c6d22b
static char **evm_config_xattrnames = evm_default_xattrs;
Packit c6d22b
Packit c6d22b
struct command {
Packit c6d22b
	char *name;
Packit c6d22b
	int (*func)(struct command *cmd);
Packit c6d22b
	int cmd;
Packit c6d22b
	char *arg;
Packit c6d22b
	char *msg;		/* extra info message */
Packit c6d22b
};
Packit c6d22b
Packit c6d22b
static int g_argc;
Packit c6d22b
static char **g_argv;
Packit c6d22b
static int xattr = 1;
Packit c6d22b
static bool check_xattr;
Packit c6d22b
static int sigdump;
Packit c6d22b
static int digest;
Packit c6d22b
static int digsig;
Packit c6d22b
static int sigfile;
Packit c6d22b
static char *uuid_str;
Packit c6d22b
static char *ino_str;
Packit c6d22b
static char *uid_str;
Packit c6d22b
static char *gid_str;
Packit c6d22b
static char *mode_str;
Packit c6d22b
static char *generation_str;
Packit c6d22b
static char *caps_str;
Packit c6d22b
static char *ima_str;
Packit c6d22b
static char *selinux_str;
Packit c6d22b
static char *search_type;
Packit c6d22b
static int measurement_list;
Packit c6d22b
static int recursive;
Packit c6d22b
static int msize;
Packit c6d22b
static dev_t fs_dev;
Packit c6d22b
static bool evm_immutable;
Packit c6d22b
static bool evm_portable;
Packit c6d22b
Packit c6d22b
#define HMAC_FLAG_NO_UUID	0x0001
Packit c6d22b
#define HMAC_FLAG_CAPS_SET	0x0002
Packit c6d22b
Packit c6d22b
static unsigned long hmac_flags;
Packit c6d22b
Packit c6d22b
typedef int (*find_cb_t)(const char *path);
Packit c6d22b
static int find(const char *path, int dts, find_cb_t func);
Packit c6d22b
Packit c6d22b
#define REG_MASK	(1 << DT_REG)
Packit c6d22b
#define DIR_MASK	(1 << DT_DIR)
Packit c6d22b
#define LNK_MASK	(1 << DT_LNK)
Packit c6d22b
#define CHR_MASK	(1 << DT_CHR)
Packit c6d22b
#define BLK_MASK	(1 << DT_BLK)
Packit c6d22b
Packit c6d22b
struct command cmds[];
Packit c6d22b
static void print_usage(struct command *cmd);
Packit c6d22b
Packit c6d22b
static int bin2file(const char *file, const char *ext, const unsigned char *data, int len)
Packit c6d22b
{
Packit c6d22b
	FILE *fp;
Packit c6d22b
	char name[strlen(file) + (ext ? strlen(ext) : 0) + 2];
Packit c6d22b
	int err;
Packit c6d22b
Packit c6d22b
	if (ext)
Packit c6d22b
		sprintf(name, "%s.%s", file, ext);
Packit c6d22b
	else
Packit c6d22b
		sprintf(name, "%s", file);
Packit c6d22b
Packit c6d22b
	log_info("Writing to %s\n", name);
Packit c6d22b
Packit c6d22b
	fp = fopen(name, "w");
Packit c6d22b
	if (!fp) {
Packit c6d22b
		log_err("Failed to open: %s\n", name);
Packit c6d22b
		return -1;
Packit c6d22b
	}
Packit c6d22b
	err = fwrite(data, len, 1, fp);
Packit c6d22b
	fclose(fp);
Packit c6d22b
	return err;
Packit c6d22b
}
Packit c6d22b
Packit c6d22b
static unsigned char *file2bin(const char *file, const char *ext, int *size)
Packit c6d22b
{
Packit c6d22b
	FILE *fp;
Packit c6d22b
	int len;
Packit c6d22b
	unsigned char *data;
Packit c6d22b
	char name[strlen(file) + (ext ? strlen(ext) : 0) + 2];
Packit c6d22b
Packit c6d22b
	if (ext)
Packit c6d22b
		sprintf(name, "%s.%s", file, ext);
Packit c6d22b
	else
Packit c6d22b
		sprintf(name, "%s", file);
Packit c6d22b
Packit c6d22b
	log_info("Reading to %s\n", name);
Packit c6d22b
Packit c6d22b
	len = get_filesize(name);
Packit c6d22b
	fp = fopen(name, "r");
Packit c6d22b
	if (!fp) {
Packit c6d22b
		log_err("Failed to open: %s\n", name);
Packit c6d22b
		return NULL;
Packit c6d22b
	}
Packit c6d22b
	data = malloc(len);
Packit c6d22b
	if (!fread(data, len, 1, fp))
Packit c6d22b
		len = 0;
Packit c6d22b
	fclose(fp);
Packit c6d22b
Packit c6d22b
	*size = len;
Packit c6d22b
	return data;
Packit c6d22b
}
Packit c6d22b
Packit c6d22b
static int find_xattr(const char *list, int list_size, const char *xattr)
Packit c6d22b
{
Packit c6d22b
	int len;
Packit c6d22b
Packit c6d22b
	for (; list_size > 0; len++, list_size -= len, list += len) {
Packit c6d22b
		len = strlen(list);
Packit c6d22b
		if (!strcmp(list, xattr))
Packit c6d22b
			return 1;
Packit c6d22b
	}
Packit c6d22b
	return 0;
Packit c6d22b
}
Packit c6d22b
Packit c6d22b
static int hex_to_bin(char ch)
Packit c6d22b
{
Packit c6d22b
	if ((ch >= '0') && (ch <= '9'))
Packit c6d22b
		return ch - '0';
Packit c6d22b
	ch = tolower(ch);
Packit c6d22b
	if ((ch >= 'a') && (ch <= 'f'))
Packit c6d22b
		return ch - 'a' + 10;
Packit c6d22b
	return -1;
Packit c6d22b
}
Packit c6d22b
Packit c6d22b
static int hex2bin(void *dst, const char *src, size_t count)
Packit c6d22b
{
Packit c6d22b
	int hi, lo;
Packit c6d22b
Packit c6d22b
	while (count--) {
Packit c6d22b
		if (*src == ' ')
Packit c6d22b
			src++;
Packit c6d22b
Packit c6d22b
		hi = hex_to_bin(*src++);
Packit c6d22b
		lo = hex_to_bin(*src++);
Packit c6d22b
Packit c6d22b
		if ((hi < 0) || (lo < 0))
Packit c6d22b
			return -1;
Packit c6d22b
Packit c6d22b
		*(uint8_t *)dst++ = (hi << 4) | lo;
Packit c6d22b
	}
Packit c6d22b
	return 0;
Packit c6d22b
}
Packit c6d22b
Packit c6d22b
#define hex_asc_lo(x)   hex_asc[((x) & 0x0f)]
Packit c6d22b
#define hex_asc_hi(x)   hex_asc[((x) & 0xf0) >> 4]
Packit c6d22b
Packit c6d22b
const char hex_asc[] = "0123456789abcdef";
Packit c6d22b
Packit c6d22b
/* this is faster than fprintf - makes sense? */
Packit c6d22b
static void bin2hex(uint8_t *buf, size_t buflen, FILE *stream)
Packit c6d22b
{
Packit c6d22b
	char asciihex[2];
Packit c6d22b
Packit c6d22b
	for (; buflen--; buf++) {
Packit c6d22b
		asciihex[0] = hex_asc_hi(*buf);
Packit c6d22b
		asciihex[1] = hex_asc_lo(*buf);
Packit c6d22b
		fwrite(asciihex, 2, 1, stream);
Packit c6d22b
	}
Packit c6d22b
}
Packit c6d22b
Packit c6d22b
static int pack_uuid(const char *uuid_str, char *uuid)
Packit c6d22b
{
Packit c6d22b
	int i;
Packit c6d22b
	char *to = uuid;
Packit c6d22b
Packit c6d22b
	for (i = 0; i < 16; ++i) {
Packit c6d22b
		if (!uuid_str[0] || !uuid_str[1]) {
Packit c6d22b
			log_err("wrong UUID format\n");
Packit c6d22b
			return -1;
Packit c6d22b
		}
Packit c6d22b
		*to++ = (hex_to_bin(*uuid_str) << 4) |
Packit c6d22b
			(hex_to_bin(*(uuid_str + 1)));
Packit c6d22b
		uuid_str += 2;
Packit c6d22b
		switch (i) {
Packit c6d22b
		case 3:
Packit c6d22b
		case 5:
Packit c6d22b
		case 7:
Packit c6d22b
		case 9:
Packit c6d22b
			if (*uuid_str != '-') {
Packit c6d22b
				log_err("wrong UUID format\n");
Packit c6d22b
				return -1;
Packit c6d22b
			}
Packit c6d22b
			uuid_str++;
Packit c6d22b
			continue;
Packit c6d22b
		}
Packit c6d22b
	}
Packit c6d22b
	log_info("uuid: ");
Packit c6d22b
	log_dump(uuid, 16);
Packit c6d22b
	return 0;
Packit c6d22b
}
Packit c6d22b
Packit c6d22b
static int get_uuid(struct stat *st, char *uuid)
Packit c6d22b
{
Packit c6d22b
	uint32_t dev;
Packit c6d22b
	unsigned minor, major;
Packit c6d22b
	char path[PATH_MAX], _uuid[37];
Packit c6d22b
	FILE *fp;
Packit c6d22b
	size_t len;
Packit c6d22b
Packit c6d22b
	if (uuid_str)
Packit c6d22b
		return pack_uuid(uuid_str, uuid);
Packit c6d22b
Packit c6d22b
	dev = st->st_dev;
Packit c6d22b
	major = (dev & 0xfff00) >> 8;
Packit c6d22b
	minor = (dev & 0xff) | ((dev >> 12) & 0xfff00);
Packit c6d22b
Packit c6d22b
	log_debug("dev: %u:%u\n", major, minor);
Packit c6d22b
	sprintf(path, "blkid -s UUID -o value /dev/block/%u:%u", major, minor);
Packit c6d22b
Packit c6d22b
	fp = popen(path, "r");
Packit c6d22b
	if (!fp)
Packit c6d22b
		goto err;
Packit c6d22b
Packit c6d22b
	len = fread(_uuid, 1, sizeof(_uuid), fp);
Packit c6d22b
	pclose(fp);
Packit c6d22b
	if (len != sizeof(_uuid))
Packit c6d22b
		goto err;
Packit c6d22b
Packit c6d22b
	return pack_uuid(_uuid, uuid);
Packit c6d22b
err:
Packit c6d22b
	log_err("Failed to read UUID. Root access might require.\n");
Packit c6d22b
	return -1;
Packit c6d22b
}
Packit c6d22b
Packit c6d22b
static int calc_evm_hash(const char *file, unsigned char *hash)
Packit c6d22b
{
Packit c6d22b
	struct stat st;
Packit c6d22b
	int err;
Packit c6d22b
	uint32_t generation = 0;
Packit c6d22b
	EVP_MD_CTX *pctx;
Packit c6d22b
	unsigned int mdlen;
Packit c6d22b
	char **xattrname;
Packit c6d22b
	char xattr_value[1024];
Packit c6d22b
	char list[1024];
Packit c6d22b
	ssize_t list_size;
Packit c6d22b
	char uuid[16];
Packit c6d22b
	struct h_misc_64 hmac_misc;
Packit c6d22b
	int hmac_size;
Packit c6d22b
#if OPENSSL_VERSION_NUMBER < 0x10100000
Packit c6d22b
	EVP_MD_CTX ctx;
Packit c6d22b
	pctx = &ctx;
Packit c6d22b
#else
Packit c6d22b
	pctx = EVP_MD_CTX_new();
Packit c6d22b
#endif
Packit c6d22b
Packit c6d22b
	if (lstat(file, &st)) {
Packit c6d22b
		log_err("Failed to stat: %s\n", file);
Packit c6d22b
		return -1;
Packit c6d22b
	}
Packit c6d22b
Packit c6d22b
	if (generation_str)
Packit c6d22b
		generation = strtoul(generation_str, NULL, 10);
Packit c6d22b
	if (ino_str)
Packit c6d22b
		st.st_ino = strtoul(ino_str, NULL, 10);
Packit c6d22b
	if (uid_str)
Packit c6d22b
		st.st_uid = strtoul(uid_str, NULL, 10);
Packit c6d22b
	if (gid_str)
Packit c6d22b
		st.st_gid = strtoul(gid_str, NULL, 10);
Packit c6d22b
	if (mode_str)
Packit c6d22b
		st.st_mode = strtoul(mode_str, NULL, 10);
Packit c6d22b
Packit c6d22b
	if (!evm_immutable) {
Packit c6d22b
		if ((S_ISREG(st.st_mode) || S_ISDIR(st.st_mode)) && !generation_str) {
Packit c6d22b
			/* we cannot at the momement to get generation of
Packit c6d22b
			   special files kernel API does not support it */
Packit c6d22b
			int fd = open(file, 0);
Packit c6d22b
Packit c6d22b
			if (fd < 0) {
Packit c6d22b
				log_err("Failed to open: %s\n", file);
Packit c6d22b
				return -1;
Packit c6d22b
			}
Packit c6d22b
			if (ioctl(fd, FS_IOC_GETVERSION, &generation)) {
Packit c6d22b
				log_err("ioctl() failed\n");
Packit c6d22b
				close(fd);
Packit c6d22b
				return -1;
Packit c6d22b
			}
Packit c6d22b
			close(fd);
Packit c6d22b
		}
Packit c6d22b
		log_info("generation: %u\n", generation);
Packit c6d22b
	}
Packit c6d22b
Packit c6d22b
	list_size = llistxattr(file, list, sizeof(list));
Packit c6d22b
	if (list_size < 0) {
Packit c6d22b
		log_err("llistxattr() failed\n");
Packit c6d22b
		return -1;
Packit c6d22b
	}
Packit c6d22b
Packit c6d22b
	err = EVP_DigestInit(pctx, EVP_sha1());
Packit c6d22b
	if (!err) {
Packit c6d22b
		log_err("EVP_DigestInit() failed\n");
Packit c6d22b
		return 1;
Packit c6d22b
	}
Packit c6d22b
Packit c6d22b
	for (xattrname = evm_config_xattrnames; *xattrname != NULL; xattrname++) {
Packit c6d22b
		if (!strcmp(*xattrname, XATTR_NAME_SELINUX) && selinux_str) {
Packit c6d22b
			strcpy(xattr_value, selinux_str);
Packit c6d22b
			err = strlen(selinux_str) + 1;
Packit c6d22b
		} else if (!strcmp(*xattrname, XATTR_NAME_IMA) && ima_str) {
Packit c6d22b
			hex2bin(xattr_value, ima_str, strlen(ima_str) / 2);
Packit c6d22b
			err = strlen(ima_str) / 2;
Packit c6d22b
		} else if (!strcmp(*xattrname, XATTR_NAME_CAPS) && (hmac_flags & HMAC_FLAG_CAPS_SET)) {
Packit c6d22b
			if (!caps_str)
Packit c6d22b
				continue;
Packit c6d22b
			strcpy(xattr_value, caps_str);
Packit c6d22b
			err = strlen(caps_str);
Packit c6d22b
		} else {
Packit c6d22b
			err = lgetxattr(file, *xattrname, xattr_value, sizeof(xattr_value));
Packit c6d22b
			if (err < 0) {
Packit c6d22b
				log_info("no xattr: %s\n", *xattrname);
Packit c6d22b
				continue;
Packit c6d22b
			}
Packit c6d22b
			if (!find_xattr(list, list_size, *xattrname)) {
Packit c6d22b
				log_info("skipping xattr: %s\n", *xattrname);
Packit c6d22b
				continue;
Packit c6d22b
			}
Packit c6d22b
		}
Packit c6d22b
		/*log_debug("name: %s, value: %s, size: %d\n", *xattrname, xattr_value, err);*/
Packit c6d22b
		log_info("name: %s, size: %d\n", *xattrname, err);
Packit c6d22b
		log_debug_dump(xattr_value, err);
Packit c6d22b
		err = EVP_DigestUpdate(pctx, xattr_value, err);
Packit c6d22b
		if (!err) {
Packit c6d22b
			log_err("EVP_DigestUpdate() failed\n");
Packit c6d22b
			return 1;
Packit c6d22b
		}
Packit c6d22b
	}
Packit c6d22b
Packit c6d22b
	memset(&hmac_misc, 0, sizeof(hmac_misc));
Packit c6d22b
Packit c6d22b
	if (evm_immutable) {
Packit c6d22b
		struct h_misc_digsig *hmac = (struct h_misc_digsig *)&hmac_misc;
Packit c6d22b
Packit c6d22b
		hmac_size = sizeof(*hmac);
Packit c6d22b
		hmac->uid = st.st_uid;
Packit c6d22b
		hmac->gid = st.st_gid;
Packit c6d22b
		hmac->mode = st.st_mode;
Packit c6d22b
	} else if (msize == 0) {
Packit c6d22b
		struct h_misc *hmac = (struct h_misc *)&hmac_misc;
Packit c6d22b
Packit c6d22b
		hmac_size = sizeof(*hmac);
Packit c6d22b
		if (!evm_portable) {
Packit c6d22b
			hmac->ino = st.st_ino;
Packit c6d22b
			hmac->generation = generation;
Packit c6d22b
		}
Packit c6d22b
		hmac->uid = st.st_uid;
Packit c6d22b
		hmac->gid = st.st_gid;
Packit c6d22b
		hmac->mode = st.st_mode;
Packit c6d22b
	} else if (msize == 64) {
Packit c6d22b
		struct h_misc_64 *hmac = (struct h_misc_64 *)&hmac_misc;
Packit c6d22b
Packit c6d22b
		hmac_size = sizeof(*hmac);
Packit c6d22b
		if (!evm_portable) {
Packit c6d22b
			hmac->ino = st.st_ino;
Packit c6d22b
			hmac->generation = generation;
Packit c6d22b
		}
Packit c6d22b
		hmac->uid = st.st_uid;
Packit c6d22b
		hmac->gid = st.st_gid;
Packit c6d22b
		hmac->mode = st.st_mode;
Packit c6d22b
	} else {
Packit c6d22b
		struct h_misc_32 *hmac = (struct h_misc_32 *)&hmac_misc;
Packit c6d22b
Packit c6d22b
		hmac_size = sizeof(*hmac);
Packit c6d22b
		if (!evm_portable) {
Packit c6d22b
			hmac->ino = st.st_ino;
Packit c6d22b
			hmac->generation = generation;
Packit c6d22b
		}
Packit c6d22b
		hmac->uid = st.st_uid;
Packit c6d22b
		hmac->gid = st.st_gid;
Packit c6d22b
		hmac->mode = st.st_mode;
Packit c6d22b
	}
Packit c6d22b
Packit c6d22b
	log_debug("hmac_misc (%d): ", hmac_size);
Packit c6d22b
	log_debug_dump(&hmac_misc, hmac_size);
Packit c6d22b
Packit c6d22b
	err = EVP_DigestUpdate(pctx, &hmac_misc, hmac_size);
Packit c6d22b
	if (!err) {
Packit c6d22b
		log_err("EVP_DigestUpdate() failed\n");
Packit c6d22b
		return 1;
Packit c6d22b
	}
Packit c6d22b
Packit c6d22b
	if (!evm_immutable && !evm_portable &&
Packit c6d22b
	    !(hmac_flags & HMAC_FLAG_NO_UUID)) {
Packit c6d22b
		err = get_uuid(&st, uuid);
Packit c6d22b
		if (err)
Packit c6d22b
			return -1;
Packit c6d22b
Packit c6d22b
		err = EVP_DigestUpdate(pctx, (const unsigned char *)uuid, sizeof(uuid));
Packit c6d22b
		if (!err) {
Packit c6d22b
			log_err("EVP_DigestUpdate() failed\n");
Packit c6d22b
			return 1;
Packit c6d22b
		}
Packit c6d22b
	}
Packit c6d22b
Packit c6d22b
	err = EVP_DigestFinal(pctx, hash, &mdlen);
Packit c6d22b
	if (!err) {
Packit c6d22b
		log_err("EVP_DigestFinal() failed\n");
Packit c6d22b
		return 1;
Packit c6d22b
	}
Packit c6d22b
Packit c6d22b
	return mdlen;
Packit c6d22b
}
Packit c6d22b
Packit c6d22b
static int sign_evm(const char *file, const char *key)
Packit c6d22b
{
Packit c6d22b
	unsigned char hash[20];
Packit c6d22b
	unsigned char sig[1024];
Packit c6d22b
	int len, err;
Packit c6d22b
Packit c6d22b
	len = calc_evm_hash(file, hash);
Packit c6d22b
	if (len <= 1)
Packit c6d22b
		return len;
Packit c6d22b
Packit c6d22b
	len = sign_hash("sha1", hash, len, key, NULL, sig + 1);
Packit c6d22b
	if (len <= 1)
Packit c6d22b
		return len;
Packit c6d22b
Packit c6d22b
	/* add header */
Packit c6d22b
	len++;
Packit c6d22b
	if (evm_portable)
Packit c6d22b
		sig[0] = EVM_XATTR_PORTABLE_DIGSIG;
Packit c6d22b
	else
Packit c6d22b
		sig[0] = EVM_IMA_XATTR_DIGSIG;
Packit c6d22b
Packit c6d22b
	if (evm_immutable)
Packit c6d22b
		sig[1] = 3; /* immutable signature version */
Packit c6d22b
Packit c6d22b
	if (sigdump || params.verbose >= LOG_INFO)
Packit c6d22b
		dump(sig, len);
Packit c6d22b
Packit c6d22b
	if (xattr) {
Packit c6d22b
		err = lsetxattr(file, "security.evm", sig, len, 0);
Packit c6d22b
		if (err < 0) {
Packit c6d22b
			log_err("setxattr failed: %s\n", file);
Packit c6d22b
			return err;
Packit c6d22b
		}
Packit c6d22b
	}
Packit c6d22b
Packit c6d22b
	return 0;
Packit c6d22b
}
Packit c6d22b
Packit c6d22b
static int hash_ima(const char *file)
Packit c6d22b
{
Packit c6d22b
	unsigned char hash[66]; /* MAX hash size + 2 */
Packit c6d22b
	int len, err, offset;
Packit c6d22b
	int algo = get_hash_algo(params.hash_algo);
Packit c6d22b
Packit c6d22b
	if (algo > PKEY_HASH_SHA1) {
Packit c6d22b
		hash[0] = IMA_XATTR_DIGEST_NG;
Packit c6d22b
		hash[1] = algo;
Packit c6d22b
		offset = 2;
Packit c6d22b
	} else {
Packit c6d22b
		hash[0] = IMA_XATTR_DIGEST;
Packit c6d22b
		offset = 1;
Packit c6d22b
	}
Packit c6d22b
Packit c6d22b
	len = ima_calc_hash(file, hash + offset);
Packit c6d22b
	if (len <= 1)
Packit c6d22b
		return len;
Packit c6d22b
Packit c6d22b
	len += offset;
Packit c6d22b
Packit c6d22b
	if (params.verbose >= LOG_INFO)
Packit c6d22b
		log_info("hash: ");
Packit c6d22b
Packit c6d22b
	if (sigdump || params.verbose >= LOG_INFO)
Packit c6d22b
		dump(hash, len);
Packit c6d22b
Packit c6d22b
	if (xattr) {
Packit c6d22b
		err = lsetxattr(file, "security.ima", hash, len, 0);
Packit c6d22b
		if (err < 0) {
Packit c6d22b
			log_err("setxattr failed: %s\n", file);
Packit c6d22b
			return err;
Packit c6d22b
		}
Packit c6d22b
	}
Packit c6d22b
Packit c6d22b
	return 0;
Packit c6d22b
}
Packit c6d22b
Packit c6d22b
static int sign_ima(const char *file, const char *key)
Packit c6d22b
{
Packit c6d22b
	unsigned char hash[64];
Packit c6d22b
	unsigned char sig[1024];
Packit c6d22b
	int len, err;
Packit c6d22b
Packit c6d22b
	len = ima_calc_hash(file, hash);
Packit c6d22b
	if (len <= 1)
Packit c6d22b
		return len;
Packit c6d22b
Packit c6d22b
	len = sign_hash(params.hash_algo, hash, len, key, NULL, sig + 1);
Packit c6d22b
	if (len <= 1)
Packit c6d22b
		return len;
Packit c6d22b
Packit c6d22b
	/* add header */
Packit c6d22b
	len++;
Packit c6d22b
	sig[0] = EVM_IMA_XATTR_DIGSIG;
Packit c6d22b
Packit c6d22b
	if (sigdump || params.verbose >= LOG_INFO)
Packit c6d22b
		dump(sig, len);
Packit c6d22b
Packit c6d22b
	if (sigfile)
Packit c6d22b
		bin2file(file, "sig", sig, len);
Packit c6d22b
Packit c6d22b
	if (xattr) {
Packit c6d22b
		err = lsetxattr(file, "security.ima", sig, len, 0);
Packit c6d22b
		if (err < 0) {
Packit c6d22b
			log_err("setxattr failed: %s\n", file);
Packit c6d22b
			return err;
Packit c6d22b
		}
Packit c6d22b
	}
Packit c6d22b
Packit c6d22b
	return 0;
Packit c6d22b
}
Packit c6d22b
Packit c6d22b
static int get_file_type(const char *path, const char *search_type)
Packit c6d22b
{
Packit c6d22b
	int err, dts = 0, i;
Packit c6d22b
	struct stat st;
Packit c6d22b
Packit c6d22b
	for (i = 0; search_type[i]; i++) {
Packit c6d22b
		switch (search_type[i]) {
Packit c6d22b
		case 'f':
Packit c6d22b
			dts |= REG_MASK; break;
Packit c6d22b
		case 'd':
Packit c6d22b
			dts |= DIR_MASK; break;
Packit c6d22b
		case 's':
Packit c6d22b
			dts |= BLK_MASK | CHR_MASK | LNK_MASK; break;
Packit c6d22b
		case 'x':
Packit c6d22b
			check_xattr = true; break;
Packit c6d22b
		case 'm':
Packit c6d22b
			/* stay within the same filesystem*/
Packit c6d22b
			err = lstat(path, &st);
Packit c6d22b
			if (err < 0) {
Packit c6d22b
				log_err("Failed to stat: %s\n", path);
Packit c6d22b
				return err;
Packit c6d22b
			}
Packit c6d22b
			fs_dev = st.st_dev; /* filesystem to start from */
Packit c6d22b
			break;
Packit c6d22b
		}
Packit c6d22b
	}
Packit c6d22b
Packit c6d22b
	return dts;
Packit c6d22b
}
Packit c6d22b
Packit c6d22b
static int do_cmd(struct command *cmd, find_cb_t func)
Packit c6d22b
{
Packit c6d22b
	char *path = g_argv[optind++];
Packit c6d22b
	int err, dts = REG_MASK; /* only regular files by default */
Packit c6d22b
Packit c6d22b
	if (!path) {
Packit c6d22b
		log_err("Parameters missing\n");
Packit c6d22b
		print_usage(cmd);
Packit c6d22b
		return -1;
Packit c6d22b
	}
Packit c6d22b
Packit c6d22b
	if (recursive) {
Packit c6d22b
		if (search_type) {
Packit c6d22b
			dts = get_file_type(path, search_type);
Packit c6d22b
			if (dts < 0)
Packit c6d22b
				return dts;
Packit c6d22b
		}
Packit c6d22b
		err = find(path, dts, func);
Packit c6d22b
	} else {
Packit c6d22b
		err = func(path);
Packit c6d22b
	}
Packit c6d22b
Packit c6d22b
	return err;
Packit c6d22b
}
Packit c6d22b
Packit c6d22b
static int cmd_hash_ima(struct command *cmd)
Packit c6d22b
{
Packit c6d22b
	return do_cmd(cmd, hash_ima);
Packit c6d22b
}
Packit c6d22b
Packit c6d22b
static int sign_ima_file(const char *file)
Packit c6d22b
{
Packit c6d22b
	const char *key;
Packit c6d22b
Packit c6d22b
	key = params.keyfile ? : "/etc/keys/privkey_evm.pem";
Packit c6d22b
Packit c6d22b
	return sign_ima(file, key);
Packit c6d22b
}
Packit c6d22b
Packit c6d22b
static int cmd_sign_ima(struct command *cmd)
Packit c6d22b
{
Packit c6d22b
	return do_cmd(cmd, sign_ima_file);
Packit c6d22b
}
Packit c6d22b
Packit c6d22b
static int cmd_sign_hash(struct command *cmd)
Packit c6d22b
{
Packit c6d22b
	const char *key;
Packit c6d22b
	char *token, *line = NULL;
Packit c6d22b
	int hashlen = 0;
Packit c6d22b
	size_t line_len;
Packit c6d22b
	ssize_t len;
Packit c6d22b
	unsigned char hash[64];
Packit c6d22b
	unsigned char sig[1024] = "\x03";
Packit c6d22b
	int siglen;
Packit c6d22b
Packit c6d22b
	key = params.keyfile ? : "/etc/keys/privkey_evm.pem";
Packit c6d22b
Packit c6d22b
	/* support reading hash (eg. output of shasum) */
Packit c6d22b
	while ((len = getline(&line, &line_len, stdin)) > 0) {
Packit c6d22b
		/* remove end of line */
Packit c6d22b
		if (line[len - 1] == '\n')
Packit c6d22b
			line[--len] = '\0';
Packit c6d22b
Packit c6d22b
		/* find the end of the hash */
Packit c6d22b
		token = strpbrk(line, ", \t");
Packit c6d22b
		hashlen = token ? token - line : strlen(line);
Packit c6d22b
Packit c6d22b
		hex2bin(hash, line, hashlen);
Packit c6d22b
		siglen = sign_hash(params.hash_algo, hash, hashlen/2,
Packit c6d22b
				 key, NULL, sig + 1);
Packit c6d22b
		if (siglen <= 1)
Packit c6d22b
			return siglen;
Packit c6d22b
Packit c6d22b
		fwrite(line, len, 1, stdout);
Packit c6d22b
		fprintf(stdout, " ");
Packit c6d22b
		bin2hex(sig, siglen + 1, stdout);
Packit c6d22b
		fprintf(stdout, "\n");
Packit c6d22b
	}
Packit c6d22b
Packit c6d22b
	if (!hashlen) {
Packit c6d22b
		log_err("Parameters missing\n");
Packit c6d22b
		print_usage(cmd);
Packit c6d22b
		return -1;
Packit c6d22b
	}
Packit c6d22b
Packit c6d22b
	return 0;
Packit c6d22b
}
Packit c6d22b
Packit c6d22b
static int sign_evm_path(const char *file)
Packit c6d22b
{
Packit c6d22b
	const char *key;
Packit c6d22b
	int err;
Packit c6d22b
Packit c6d22b
	key = params.keyfile ? : "/etc/keys/privkey_evm.pem";
Packit c6d22b
Packit c6d22b
	if (digsig) {
Packit c6d22b
		err = sign_ima(file, key);
Packit c6d22b
		if (err)
Packit c6d22b
			return err;
Packit c6d22b
	}
Packit c6d22b
Packit c6d22b
	if (digest) {
Packit c6d22b
		err = hash_ima(file);
Packit c6d22b
		if (err)
Packit c6d22b
			return err;
Packit c6d22b
	}
Packit c6d22b
Packit c6d22b
	return sign_evm(file, key);
Packit c6d22b
}
Packit c6d22b
Packit c6d22b
static int cmd_sign_evm(struct command *cmd)
Packit c6d22b
{
Packit c6d22b
	return do_cmd(cmd, sign_evm_path);
Packit c6d22b
}
Packit c6d22b
Packit c6d22b
static int verify_evm(const char *file)
Packit c6d22b
{
Packit c6d22b
	unsigned char hash[20];
Packit c6d22b
	unsigned char sig[1024];
Packit c6d22b
	int len;
Packit c6d22b
Packit c6d22b
	len = calc_evm_hash(file, hash);
Packit c6d22b
	if (len <= 1)
Packit c6d22b
		return len;
Packit c6d22b
Packit c6d22b
	len = lgetxattr(file, "security.evm", sig, sizeof(sig));
Packit c6d22b
	if (len < 0) {
Packit c6d22b
		log_err("getxattr failed: %s\n", file);
Packit c6d22b
		return len;
Packit c6d22b
	}
Packit c6d22b
Packit c6d22b
	if (sig[0] != 0x03) {
Packit c6d22b
		log_err("security.evm has no signature\n");
Packit c6d22b
		return -1;
Packit c6d22b
	}
Packit c6d22b
Packit c6d22b
	return verify_hash(file, hash, sizeof(hash), sig + 1, len - 1);
Packit c6d22b
}
Packit c6d22b
Packit c6d22b
static int cmd_verify_evm(struct command *cmd)
Packit c6d22b
{
Packit c6d22b
	char *file = g_argv[optind++];
Packit c6d22b
	int err;
Packit c6d22b
Packit c6d22b
	if (!file) {
Packit c6d22b
		log_err("Parameters missing\n");
Packit c6d22b
		print_usage(cmd);
Packit c6d22b
		return -1;
Packit c6d22b
	}
Packit c6d22b
Packit c6d22b
	err = verify_evm(file);
Packit c6d22b
	if (!err && params.verbose >= LOG_INFO)
Packit c6d22b
		log_info("%s: verification is OK\n", file);
Packit c6d22b
	return err;
Packit c6d22b
}
Packit c6d22b
Packit c6d22b
static int verify_ima(const char *file)
Packit c6d22b
{
Packit c6d22b
	unsigned char sig[1024];
Packit c6d22b
	int len;
Packit c6d22b
Packit c6d22b
	if (sigfile) {
Packit c6d22b
		void *tmp = file2bin(file, "sig", &len;;
Packit c6d22b
Packit c6d22b
		memcpy(sig, tmp, len);
Packit c6d22b
		free(tmp);
Packit c6d22b
	} else {
Packit c6d22b
		len = lgetxattr(file, "security.ima", sig, sizeof(sig));
Packit c6d22b
		if (len < 0) {
Packit c6d22b
			log_err("getxattr failed: %s\n", file);
Packit c6d22b
			return len;
Packit c6d22b
		}
Packit c6d22b
	}
Packit c6d22b
Packit c6d22b
	return ima_verify_signature(file, sig, len, NULL, 0);
Packit c6d22b
}
Packit c6d22b
Packit c6d22b
static int cmd_verify_ima(struct command *cmd)
Packit c6d22b
{
Packit c6d22b
	char *file = g_argv[optind++];
Packit c6d22b
	int err;
Packit c6d22b
Packit c6d22b
	errno = 0;
Packit c6d22b
	if (!file) {
Packit c6d22b
		log_err("Parameters missing\n");
Packit c6d22b
		print_usage(cmd);
Packit c6d22b
		return -1;
Packit c6d22b
	}
Packit c6d22b
Packit c6d22b
	err = verify_ima(file);
Packit c6d22b
	if (!err && params.verbose >= LOG_INFO)
Packit c6d22b
		log_info("%s: verification is OK\n", file);
Packit c6d22b
	return err;
Packit c6d22b
}
Packit c6d22b
Packit c6d22b
static int cmd_convert(struct command *cmd)
Packit c6d22b
{
Packit c6d22b
	char *inkey;
Packit c6d22b
	unsigned char _pub[1024], *pub = _pub;
Packit c6d22b
	int len, err = 0;
Packit c6d22b
	char name[20];
Packit c6d22b
	uint8_t keyid[8];
Packit c6d22b
	RSA *key;
Packit c6d22b
Packit c6d22b
	params.x509 = 0;
Packit c6d22b
Packit c6d22b
	inkey = g_argv[optind++];
Packit c6d22b
	if (!inkey) {
Packit c6d22b
		inkey = params.x509 ? "/etc/keys/x509_evm.der" :
Packit c6d22b
				      "/etc/keys/pubkey_evm.pem";
Packit c6d22b
	}
Packit c6d22b
Packit c6d22b
	key = read_pub_key(inkey, params.x509);
Packit c6d22b
	if (!key)
Packit c6d22b
		return 1;
Packit c6d22b
Packit c6d22b
	len = key2bin(key, pub);
Packit c6d22b
	calc_keyid_v1(keyid, name, pub, len);
Packit c6d22b
Packit c6d22b
	bin2file(inkey, "bin", pub, len);
Packit c6d22b
	bin2file(inkey, "keyid", (const unsigned char *)name, strlen(name));
Packit c6d22b
Packit c6d22b
	RSA_free(key);
Packit c6d22b
	return err;
Packit c6d22b
}
Packit c6d22b
Packit c6d22b
static int cmd_import(struct command *cmd)
Packit c6d22b
{
Packit c6d22b
	char *inkey, *ring = NULL;
Packit c6d22b
	unsigned char _pub[1024], *pub = _pub;
Packit c6d22b
	int id, len, err = 0;
Packit c6d22b
	char name[20];
Packit c6d22b
	uint8_t keyid[8];
Packit c6d22b
	RSA *key;
Packit c6d22b
Packit c6d22b
	inkey = g_argv[optind++];
Packit c6d22b
	if (!inkey) {
Packit c6d22b
		inkey = params.x509 ? "/etc/keys/x509_evm.der" :
Packit c6d22b
				      "/etc/keys/pubkey_evm.pem";
Packit c6d22b
	} else
Packit c6d22b
		ring = g_argv[optind++];
Packit c6d22b
Packit c6d22b
	id = KEY_SPEC_USER_KEYRING; /* default keyring */
Packit c6d22b
Packit c6d22b
	if (ring) {
Packit c6d22b
		if (ring[0] != '@') {
Packit c6d22b
			int base = 10;
Packit c6d22b
Packit c6d22b
			if (ring[0] == '0' && ring[1] == 'x')
Packit c6d22b
				base = 16;
Packit c6d22b
			id = strtoul(ring, NULL, base);
Packit c6d22b
		} else {
Packit c6d22b
			if (strcmp(ring, "@t") == 0)
Packit c6d22b
				id = -1;
Packit c6d22b
			else if (strcmp(ring, "@p") == 0)
Packit c6d22b
				id = -2;
Packit c6d22b
			else if (strcmp(ring, "@s") == 0)
Packit c6d22b
				id = -3;
Packit c6d22b
			else if (strcmp(ring, "@u") == 0)
Packit c6d22b
				id = -4;
Packit c6d22b
			else if (strcmp(ring, "@us") == 0)
Packit c6d22b
				id = -5;
Packit c6d22b
			else if (strcmp(ring, "@g") == 0)
Packit c6d22b
				id = -6;
Packit c6d22b
		}
Packit c6d22b
	}
Packit c6d22b
Packit c6d22b
	key = read_pub_key(inkey, params.x509);
Packit c6d22b
	if (!key)
Packit c6d22b
		return 1;
Packit c6d22b
Packit c6d22b
	if (params.x509) {
Packit c6d22b
		pub = file2bin(inkey, NULL, &len;;
Packit c6d22b
		if (!pub)
Packit c6d22b
			goto out;
Packit c6d22b
		calc_keyid_v2((uint32_t *)keyid, name, key);
Packit c6d22b
	} else {
Packit c6d22b
		len = key2bin(key, pub);
Packit c6d22b
		calc_keyid_v1(keyid, name, pub, len);
Packit c6d22b
	}
Packit c6d22b
Packit c6d22b
	log_info("Importing public key %s from file %s into keyring %d\n", name, inkey, id);
Packit c6d22b
Packit c6d22b
	id = add_key(params.x509 ? "asymmetric" : "user", params.x509 ? NULL : name, pub, len, id);
Packit c6d22b
	if (id < 0) {
Packit c6d22b
		log_err("add_key failed\n");
Packit c6d22b
		err = id;
Packit c6d22b
	} else {
Packit c6d22b
		log_info("keyid: %d\n", id);
Packit c6d22b
		printf("%d\n", id);
Packit c6d22b
	}
Packit c6d22b
	if (params.x509)
Packit c6d22b
		free(pub);
Packit c6d22b
out:
Packit c6d22b
	RSA_free(key);
Packit c6d22b
	return err;
Packit c6d22b
}
Packit c6d22b
Packit c6d22b
static int setxattr_ima(const char *file, char *sig_file)
Packit c6d22b
{
Packit c6d22b
	unsigned char *sig;
Packit c6d22b
	int len, err;
Packit c6d22b
Packit c6d22b
	if (sig_file)
Packit c6d22b
		sig = file2bin(sig_file, NULL, &len;;
Packit c6d22b
	else
Packit c6d22b
		sig = file2bin(file, "sig", &len;;
Packit c6d22b
	if (!sig)
Packit c6d22b
		return 0;
Packit c6d22b
Packit c6d22b
	err = lsetxattr(file, "security.ima", sig, len, 0);
Packit c6d22b
	if (err < 0)
Packit c6d22b
		log_err("setxattr failed: %s\n", file);
Packit c6d22b
	free(sig);
Packit c6d22b
	return err;
Packit c6d22b
}
Packit c6d22b
Packit c6d22b
static int cmd_setxattr_ima(struct command *cmd)
Packit c6d22b
{
Packit c6d22b
	char *file, *sig = NULL;
Packit c6d22b
Packit c6d22b
	if (sigfile)
Packit c6d22b
		sig = g_argv[optind++];
Packit c6d22b
	file =  g_argv[optind++];
Packit c6d22b
Packit c6d22b
	if (!file) {
Packit c6d22b
		log_err("Parameters missing\n");
Packit c6d22b
		print_usage(cmd);
Packit c6d22b
		return -1;
Packit c6d22b
	}
Packit c6d22b
Packit c6d22b
	return setxattr_ima(file, sig);
Packit c6d22b
}
Packit c6d22b
Packit c6d22b
#define MAX_KEY_SIZE 128
Packit c6d22b
Packit c6d22b
static int calc_evm_hmac(const char *file, const char *keyfile, unsigned char *hash)
Packit c6d22b
{
Packit c6d22b
	struct stat st;
Packit c6d22b
	int err = -1;
Packit c6d22b
	uint32_t generation = 0;
Packit c6d22b
	HMAC_CTX *pctx;
Packit c6d22b
	unsigned int mdlen;
Packit c6d22b
	char **xattrname;
Packit c6d22b
	unsigned char xattr_value[1024];
Packit c6d22b
	unsigned char *key;
Packit c6d22b
	int keylen;
Packit c6d22b
	unsigned char evmkey[MAX_KEY_SIZE];
Packit c6d22b
	char list[1024];
Packit c6d22b
	ssize_t list_size;
Packit c6d22b
	struct h_misc_64 hmac_misc;
Packit c6d22b
	int hmac_size;
Packit c6d22b
#if OPENSSL_VERSION_NUMBER < 0x10100000
Packit c6d22b
	HMAC_CTX ctx;
Packit c6d22b
	pctx = &ctx;
Packit c6d22b
#else
Packit c6d22b
	pctx = HMAC_CTX_new();
Packit c6d22b
#endif
Packit c6d22b
Packit c6d22b
	key = file2bin(keyfile, NULL, &keylen);
Packit c6d22b
	if (!key) {
Packit c6d22b
		log_err("Failed to read a key: %s\n", keyfile);
Packit c6d22b
		return -1;
Packit c6d22b
	}
Packit c6d22b
Packit c6d22b
	if (keylen > sizeof(evmkey)) {
Packit c6d22b
		log_err("key is too long: %d\n", keylen);
Packit c6d22b
		goto out;
Packit c6d22b
	}
Packit c6d22b
Packit c6d22b
	/* EVM key is 128 bytes */
Packit c6d22b
	memcpy(evmkey, key, keylen);
Packit c6d22b
	memset(evmkey + keylen, 0, sizeof(evmkey) - keylen);
Packit c6d22b
Packit c6d22b
	if (lstat(file, &st)) {
Packit c6d22b
		log_err("Failed to stat: %s\n", file);
Packit c6d22b
		goto out;
Packit c6d22b
	}
Packit c6d22b
Packit c6d22b
	if (S_ISREG(st.st_mode) || S_ISDIR(st.st_mode)) {
Packit c6d22b
		/* we cannot at the momement to get generation of special files..
Packit c6d22b
		 * kernel API does not support it */
Packit c6d22b
		int fd = open(file, 0);
Packit c6d22b
Packit c6d22b
		if (fd < 0) {
Packit c6d22b
			log_err("Failed to open %s\n", file);
Packit c6d22b
			goto out;
Packit c6d22b
		}
Packit c6d22b
		if (ioctl(fd, FS_IOC_GETVERSION, &generation)) {
Packit c6d22b
			log_err("ioctl() failed\n");
Packit c6d22b
			close(fd);
Packit c6d22b
			goto out;
Packit c6d22b
		}
Packit c6d22b
		close(fd);
Packit c6d22b
	}
Packit c6d22b
Packit c6d22b
	log_info("generation: %u\n", generation);
Packit c6d22b
Packit c6d22b
	list_size = llistxattr(file, list, sizeof(list));
Packit c6d22b
	if (list_size <= 0) {
Packit c6d22b
		log_err("llistxattr() failed: %s\n", file);
Packit c6d22b
		goto out;
Packit c6d22b
	}
Packit c6d22b
Packit c6d22b
	err = !HMAC_Init_ex(pctx, evmkey, sizeof(evmkey), EVP_sha1(), NULL);
Packit c6d22b
	if (err) {
Packit c6d22b
		log_err("HMAC_Init() failed\n");
Packit c6d22b
		goto out;
Packit c6d22b
	}
Packit c6d22b
Packit c6d22b
	for (xattrname = evm_config_xattrnames; *xattrname != NULL; xattrname++) {
Packit c6d22b
		err = lgetxattr(file, *xattrname, xattr_value, sizeof(xattr_value));
Packit c6d22b
		if (err < 0) {
Packit c6d22b
			log_info("no xattr: %s\n", *xattrname);
Packit c6d22b
			continue;
Packit c6d22b
		}
Packit c6d22b
		if (!find_xattr(list, list_size, *xattrname)) {
Packit c6d22b
			log_info("skipping xattr: %s\n", *xattrname);
Packit c6d22b
			continue;
Packit c6d22b
		}
Packit c6d22b
		/*log_debug("name: %s, value: %s, size: %d\n", *xattrname, xattr_value, err);*/
Packit c6d22b
		log_info("name: %s, size: %d\n", *xattrname, err);
Packit c6d22b
		log_debug_dump(xattr_value, err);
Packit c6d22b
		err = !HMAC_Update(pctx, xattr_value, err);
Packit c6d22b
		if (err) {
Packit c6d22b
			log_err("HMAC_Update() failed\n");
Packit c6d22b
			goto out_ctx_cleanup;
Packit c6d22b
		}
Packit c6d22b
	}
Packit c6d22b
Packit c6d22b
	memset(&hmac_misc, 0, sizeof(hmac_misc));
Packit c6d22b
Packit c6d22b
	if (msize == 0) {
Packit c6d22b
		struct h_misc *hmac = (struct h_misc *)&hmac_misc;
Packit c6d22b
Packit c6d22b
		hmac_size = sizeof(*hmac);
Packit c6d22b
		hmac->ino = st.st_ino;
Packit c6d22b
		hmac->generation = generation;
Packit c6d22b
		hmac->uid = st.st_uid;
Packit c6d22b
		hmac->gid = st.st_gid;
Packit c6d22b
		hmac->mode = st.st_mode;
Packit c6d22b
	} else if (msize == 64) {
Packit c6d22b
		struct h_misc_64 *hmac = (struct h_misc_64 *)&hmac_misc;
Packit c6d22b
Packit c6d22b
		hmac_size = sizeof(*hmac);
Packit c6d22b
		hmac->ino = st.st_ino;
Packit c6d22b
		hmac->generation = generation;
Packit c6d22b
		hmac->uid = st.st_uid;
Packit c6d22b
		hmac->gid = st.st_gid;
Packit c6d22b
		hmac->mode = st.st_mode;
Packit c6d22b
	} else {
Packit c6d22b
		struct h_misc_32 *hmac = (struct h_misc_32 *)&hmac_misc;
Packit c6d22b
Packit c6d22b
		hmac_size = sizeof(*hmac);
Packit c6d22b
		hmac->ino = st.st_ino;
Packit c6d22b
		hmac->generation = generation;
Packit c6d22b
		hmac->uid = st.st_uid;
Packit c6d22b
		hmac->gid = st.st_gid;
Packit c6d22b
		hmac->mode = st.st_mode;
Packit c6d22b
	}
Packit c6d22b
Packit c6d22b
	log_debug("hmac_misc (%d): ", hmac_size);
Packit c6d22b
	log_debug_dump(&hmac_misc, hmac_size);
Packit c6d22b
Packit c6d22b
	err = !HMAC_Update(pctx, (const unsigned char *)&hmac_misc, hmac_size);
Packit c6d22b
	if (err) {
Packit c6d22b
		log_err("HMAC_Update() failed\n");
Packit c6d22b
		goto out_ctx_cleanup;
Packit c6d22b
	}
Packit c6d22b
	err = !HMAC_Final(pctx, hash, &mdlen);
Packit c6d22b
	if (err)
Packit c6d22b
		log_err("HMAC_Final() failed\n");
Packit c6d22b
out_ctx_cleanup:
Packit c6d22b
#if OPENSSL_VERSION_NUMBER < 0x10100000
Packit c6d22b
	HMAC_CTX_cleanup(pctx);
Packit c6d22b
#else
Packit c6d22b
	HMAC_CTX_free(pctx);
Packit c6d22b
#endif
Packit c6d22b
out:
Packit c6d22b
	free(key);
Packit c6d22b
	return err ?: mdlen;
Packit c6d22b
}
Packit c6d22b
Packit c6d22b
static int hmac_evm(const char *file, const char *key)
Packit c6d22b
{
Packit c6d22b
	unsigned char hash[20];
Packit c6d22b
	unsigned char sig[1024];
Packit c6d22b
	int len, err;
Packit c6d22b
Packit c6d22b
	len = calc_evm_hmac(file, key, hash);
Packit c6d22b
	if (len <= 1)
Packit c6d22b
		return len;
Packit c6d22b
Packit c6d22b
	log_info("hmac: ");
Packit c6d22b
	log_dump(hash, len);
Packit c6d22b
	memcpy(sig + 1, hash, len);
Packit c6d22b
Packit c6d22b
	if (xattr) {
Packit c6d22b
		sig[0] = EVM_XATTR_HMAC;
Packit c6d22b
		err = lsetxattr(file, "security.evm", sig, len + 1, 0);
Packit c6d22b
		if (err < 0) {
Packit c6d22b
			log_err("setxattr failed: %s\n", file);
Packit c6d22b
			return err;
Packit c6d22b
		}
Packit c6d22b
	}
Packit c6d22b
Packit c6d22b
	return 0;
Packit c6d22b
}
Packit c6d22b
Packit c6d22b
static int cmd_hmac_evm(struct command *cmd)
Packit c6d22b
{
Packit c6d22b
	const char *key, *file = g_argv[optind++];
Packit c6d22b
	int err;
Packit c6d22b
Packit c6d22b
	if (!file) {
Packit c6d22b
		log_err("Parameters missing\n");
Packit c6d22b
		print_usage(cmd);
Packit c6d22b
		return -1;
Packit c6d22b
	}
Packit c6d22b
Packit c6d22b
	key = params.keyfile ? : "/etc/keys/privkey_evm.pem";
Packit c6d22b
Packit c6d22b
	if (digsig) {
Packit c6d22b
		err = sign_ima(file, key);
Packit c6d22b
		if (err)
Packit c6d22b
			return err;
Packit c6d22b
	}
Packit c6d22b
Packit c6d22b
	if (digest) {
Packit c6d22b
		err = hash_ima(file);
Packit c6d22b
		if (err)
Packit c6d22b
			return err;
Packit c6d22b
	}
Packit c6d22b
Packit c6d22b
	return hmac_evm(file, "/etc/keys/evm-key-plain");
Packit c6d22b
}
Packit c6d22b
Packit c6d22b
static int ima_fix(const char *path)
Packit c6d22b
{
Packit c6d22b
	int fd, size, len, ima = 0, evm = 0;
Packit c6d22b
	char buf[1024], *list = buf;
Packit c6d22b
Packit c6d22b
	log_info("%s\n", path);
Packit c6d22b
Packit c6d22b
	if (check_xattr) {
Packit c6d22b
		/* re-measuring takes a time
Packit c6d22b
		 * in some cases we can skip labeling if xattrs exists
Packit c6d22b
		 */
Packit c6d22b
		size = llistxattr(path, list, sizeof(buf));
Packit c6d22b
		if (size < 0) {
Packit c6d22b
			log_errno("Failed to read xattrs (llistxattr): %s\n", path);
Packit c6d22b
			return -1;
Packit c6d22b
		}
Packit c6d22b
		for (; size > 0; len++, size -= len, list += len) {
Packit c6d22b
			len = strlen(list);
Packit c6d22b
			if (!strcmp(list, "security.ima"))
Packit c6d22b
				ima = 1;
Packit c6d22b
			else if (!strcmp(list, "security.evm"))
Packit c6d22b
				evm = 1;
Packit c6d22b
		}
Packit c6d22b
		if (ima && evm)
Packit c6d22b
			return 0;
Packit c6d22b
	}
Packit c6d22b
Packit c6d22b
	fd = open(path, O_RDONLY);
Packit c6d22b
	if (fd < 0) {
Packit c6d22b
		log_errno("Failed to open file: %s", path);
Packit c6d22b
		return -1;
Packit c6d22b
	}
Packit c6d22b
Packit c6d22b
	close(fd);
Packit c6d22b
Packit c6d22b
	return 0;
Packit c6d22b
}
Packit c6d22b
Packit c6d22b
static int find(const char *path, int dts, find_cb_t func)
Packit c6d22b
{
Packit c6d22b
	struct dirent *de;
Packit c6d22b
	DIR *dir;
Packit c6d22b
Packit c6d22b
	if (fs_dev) {
Packit c6d22b
		struct stat st;
Packit c6d22b
		int err = lstat(path, &st);
Packit c6d22b
Packit c6d22b
		if (err < 0) {
Packit c6d22b
			log_err("Failed to stat: %s\n", path);
Packit c6d22b
			return err;
Packit c6d22b
		}
Packit c6d22b
		if (st.st_dev != fs_dev)
Packit c6d22b
			return 0;
Packit c6d22b
	}
Packit c6d22b
Packit c6d22b
	dir = opendir(path);
Packit c6d22b
	if (!dir) {
Packit c6d22b
		log_err("Failed to open directory %s\n", path);
Packit c6d22b
		return -1;
Packit c6d22b
	}
Packit c6d22b
Packit c6d22b
	if (fchdir(dirfd(dir))) {
Packit c6d22b
		log_err("Failed to chdir %s\n", path);
Packit c6d22b
		return -1;
Packit c6d22b
	}
Packit c6d22b
Packit c6d22b
	while ((de = readdir(dir))) {
Packit c6d22b
		if (!strcmp(de->d_name, "..") || !strcmp(de->d_name, "."))
Packit c6d22b
			continue;
Packit c6d22b
		log_debug("path: %s, type: %u\n", de->d_name, de->d_type);
Packit c6d22b
		if (de->d_type == DT_DIR)
Packit c6d22b
			find(de->d_name, dts, func);
Packit c6d22b
		else if (dts & (1 << de->d_type))
Packit c6d22b
			func(de->d_name);
Packit c6d22b
	}
Packit c6d22b
Packit c6d22b
	if (chdir("..")) {
Packit c6d22b
		log_err("Failed to chdir: %s\n", path);
Packit c6d22b
		return -1;
Packit c6d22b
	}
Packit c6d22b
Packit c6d22b
	if (dts & DIR_MASK)
Packit c6d22b
		func(path);
Packit c6d22b
Packit c6d22b
	closedir(dir);
Packit c6d22b
Packit c6d22b
	return 0;
Packit c6d22b
}
Packit c6d22b
Packit c6d22b
static int cmd_ima_fix(struct command *cmd)
Packit c6d22b
{
Packit c6d22b
	return do_cmd(cmd, ima_fix);
Packit c6d22b
}
Packit c6d22b
Packit c6d22b
static int ima_clear(const char *path)
Packit c6d22b
{
Packit c6d22b
	log_info("%s\n", path);
Packit c6d22b
	lremovexattr(path, "security.ima");
Packit c6d22b
	lremovexattr(path, "security.evm");
Packit c6d22b
Packit c6d22b
	return 0;
Packit c6d22b
}
Packit c6d22b
Packit c6d22b
static int cmd_ima_clear(struct command *cmd)
Packit c6d22b
{
Packit c6d22b
	return do_cmd(cmd, ima_clear);
Packit c6d22b
}
Packit c6d22b
Packit c6d22b
static char *pcrs = "/sys/class/tpm/tpm0/device/pcrs";  /* Kernels >= 4.0 */
Packit c6d22b
static char *misc_pcrs = "/sys/class/misc/tpm0/device/pcrs";
Packit c6d22b
Packit c6d22b
static int tpm_pcr_read(int idx, uint8_t *pcr, int len)
Packit c6d22b
{
Packit c6d22b
	FILE *fp;
Packit c6d22b
	char *p, pcr_str[7], buf[70]; /* length of the TPM string */
Packit c6d22b
	int result = -1;
Packit c6d22b
Packit c6d22b
	sprintf(pcr_str, "PCR-%d", idx);
Packit c6d22b
Packit c6d22b
	fp = fopen(pcrs, "r");
Packit c6d22b
	if (!fp)
Packit c6d22b
		fp = fopen(misc_pcrs, "r");
Packit c6d22b
Packit c6d22b
	if (!fp) {
Packit c6d22b
		log_err("Unable to open %s or %s\n", pcrs, misc_pcrs);
Packit c6d22b
		return -1;
Packit c6d22b
	}
Packit c6d22b
Packit c6d22b
	for (;;) {
Packit c6d22b
		p = fgets(buf, sizeof(buf), fp);
Packit c6d22b
		if (!p)
Packit c6d22b
			break;
Packit c6d22b
		if (!strncmp(p, pcr_str, 6)) {
Packit c6d22b
			hex2bin(pcr, p + 7, len);
Packit c6d22b
			result = 0;
Packit c6d22b
			break;
Packit c6d22b
		}
Packit c6d22b
	}
Packit c6d22b
	fclose(fp);
Packit c6d22b
	return result;
Packit c6d22b
}
Packit c6d22b
Packit c6d22b
#define TCG_EVENT_NAME_LEN_MAX	255
Packit c6d22b
Packit c6d22b
struct template_entry {
Packit c6d22b
	struct {
Packit c6d22b
		uint32_t pcr;
Packit c6d22b
		uint8_t digest[SHA_DIGEST_LENGTH];
Packit c6d22b
		uint32_t name_len;
Packit c6d22b
	} header  __packed;
Packit c6d22b
	char name[TCG_EVENT_NAME_LEN_MAX + 1];
Packit c6d22b
	int template_len;
Packit c6d22b
	uint8_t *template;
Packit c6d22b
	int template_buf_len;
Packit c6d22b
};
Packit c6d22b
Packit c6d22b
static uint8_t zero[SHA_DIGEST_LENGTH];
Packit c6d22b
static uint8_t fox[SHA_DIGEST_LENGTH];
Packit c6d22b
Packit c6d22b
int validate = 1;
Packit c6d22b
Packit c6d22b
void ima_extend_pcr(uint8_t *pcr, uint8_t *digest, int length)
Packit c6d22b
{
Packit c6d22b
	SHA_CTX ctx;
Packit c6d22b
Packit c6d22b
	SHA1_Init(&ctx;;
Packit c6d22b
	SHA1_Update(&ctx, pcr, length);
Packit c6d22b
	if (validate && !memcmp(digest, zero, length))
Packit c6d22b
		SHA1_Update(&ctx, fox, length);
Packit c6d22b
	else
Packit c6d22b
		SHA1_Update(&ctx, digest, length);
Packit c6d22b
	SHA1_Final(pcr, &ctx;;
Packit c6d22b
}
Packit c6d22b
Packit c6d22b
static int ima_verify_template_hash(struct template_entry *entry)
Packit c6d22b
{
Packit c6d22b
	uint8_t digest[SHA_DIGEST_LENGTH];
Packit c6d22b
Packit c6d22b
	if (!memcmp(zero, entry->header.digest, sizeof(zero)))
Packit c6d22b
		return 0;
Packit c6d22b
Packit c6d22b
	SHA1(entry->template, entry->template_len, digest);
Packit c6d22b
Packit c6d22b
	if (memcmp(digest, entry->header.digest, sizeof(digest))) {
Packit c6d22b
		log_err("template hash error\n");
Packit c6d22b
		return 1;
Packit c6d22b
	}
Packit c6d22b
Packit c6d22b
	return 0;
Packit c6d22b
}
Packit c6d22b
Packit c6d22b
void ima_show(struct template_entry *entry)
Packit c6d22b
{
Packit c6d22b
	log_debug("ima, digest: ");
Packit c6d22b
	log_debug_dump(entry->header.digest, sizeof(entry->header.digest));
Packit c6d22b
}
Packit c6d22b
Packit c6d22b
void ima_ng_show(struct template_entry *entry)
Packit c6d22b
{
Packit c6d22b
	uint8_t *fieldp = entry->template;
Packit c6d22b
	uint32_t field_len;
Packit c6d22b
	int total_len = entry->template_len, digest_len, len, sig_len;
Packit c6d22b
	uint8_t *digest, *sig = NULL;
Packit c6d22b
	char *algo, *path;
Packit c6d22b
	int err;
Packit c6d22b
Packit c6d22b
	/* get binary digest */
Packit c6d22b
	field_len = *(uint32_t *)fieldp;
Packit c6d22b
	fieldp += sizeof(field_len);
Packit c6d22b
	total_len -= sizeof(field_len);
Packit c6d22b
Packit c6d22b
	algo = (char *)fieldp;
Packit c6d22b
	len = strlen(algo) + 1;
Packit c6d22b
	digest_len = field_len - len;
Packit c6d22b
	digest = fieldp + len;
Packit c6d22b
Packit c6d22b
	/* move to next field */
Packit c6d22b
	fieldp += field_len;
Packit c6d22b
	total_len -= field_len;
Packit c6d22b
Packit c6d22b
	/* get path */
Packit c6d22b
	field_len = *(uint32_t *)fieldp;
Packit c6d22b
	fieldp += sizeof(field_len);
Packit c6d22b
	total_len -= sizeof(field_len);
Packit c6d22b
Packit c6d22b
	path = (char *)fieldp;
Packit c6d22b
Packit c6d22b
	/* move to next field */
Packit c6d22b
	fieldp += field_len;
Packit c6d22b
	total_len -= field_len;
Packit c6d22b
Packit c6d22b
	if (!strcmp(entry->name, "ima-sig")) {
Packit c6d22b
		/* get signature */
Packit c6d22b
		field_len = *(uint32_t *)fieldp;
Packit c6d22b
		fieldp += sizeof(field_len);
Packit c6d22b
		total_len -= sizeof(field_len);
Packit c6d22b
Packit c6d22b
		if (field_len) {
Packit c6d22b
			sig = fieldp;
Packit c6d22b
			sig_len = field_len;
Packit c6d22b
Packit c6d22b
			/* move to next field */
Packit c6d22b
			fieldp += field_len;
Packit c6d22b
			total_len -= field_len;
Packit c6d22b
		}
Packit c6d22b
	}
Packit c6d22b
Packit c6d22b
	/* ascii_runtime_measurements */
Packit c6d22b
	if (params.verbose > LOG_INFO) {
Packit c6d22b
		log_info("%d ", entry->header.pcr);
Packit c6d22b
		log_dump_n(entry->header.digest, sizeof(entry->header.digest));
Packit c6d22b
		log_info(" %s %s", entry->name, algo);
Packit c6d22b
		log_dump_n(digest, digest_len);
Packit c6d22b
		log_info(" %s", path);
Packit c6d22b
	}
Packit c6d22b
Packit c6d22b
	if (sig) {
Packit c6d22b
		if (params.verbose > LOG_INFO) {
Packit c6d22b
			log_info(" ");
Packit c6d22b
			log_dump(sig, sig_len);
Packit c6d22b
		}
Packit c6d22b
		if (measurement_list)
Packit c6d22b
			err = ima_verify_signature(path, sig, sig_len,
Packit c6d22b
						   digest, digest_len);
Packit c6d22b
		else
Packit c6d22b
			err = ima_verify_signature(path, sig, sig_len, NULL, 0);
Packit c6d22b
		if (!err && params.verbose > LOG_INFO)
Packit c6d22b
			log_info("%s: verification is OK\n", path);
Packit c6d22b
	} else {
Packit c6d22b
		if (params.verbose > LOG_INFO)
Packit c6d22b
			log_info("\n");
Packit c6d22b
	}
Packit c6d22b
Packit c6d22b
	if (total_len)
Packit c6d22b
		log_err("Remain unprocessed data: %d\n", total_len);
Packit c6d22b
}
Packit c6d22b
Packit c6d22b
static int ima_measurement(const char *file)
Packit c6d22b
{
Packit c6d22b
	uint8_t pcr[NUM_PCRS][SHA_DIGEST_LENGTH] = {{0}};
Packit c6d22b
	uint8_t hwpcr[SHA_DIGEST_LENGTH];
Packit c6d22b
	struct template_entry entry = { .template = 0 };
Packit c6d22b
	FILE *fp;
Packit c6d22b
	int err = -1;
Packit c6d22b
	bool verify_failed = false;
Packit c6d22b
	int i;
Packit c6d22b
Packit c6d22b
	errno = 0;
Packit c6d22b
	memset(zero, 0, SHA_DIGEST_LENGTH);
Packit c6d22b
	memset(fox, 0xff, SHA_DIGEST_LENGTH);
Packit c6d22b
Packit c6d22b
	log_debug("Initial PCR value: ");
Packit c6d22b
	log_debug_dump(pcr, sizeof(pcr));
Packit c6d22b
Packit c6d22b
	fp = fopen(file, "rb");
Packit c6d22b
	if (!fp) {
Packit c6d22b
		log_err("Failed to open measurement file: %s\n", file);
Packit c6d22b
		return -1;
Packit c6d22b
	}
Packit c6d22b
Packit c6d22b
	/* Support multiple public keys */
Packit c6d22b
	if (params.keyfile)
Packit c6d22b
		init_public_keys(params.keyfile);
Packit c6d22b
Packit c6d22b
	while (fread(&entry.header, sizeof(entry.header), 1, fp)) {
Packit c6d22b
		ima_extend_pcr(pcr[entry.header.pcr], entry.header.digest,
Packit c6d22b
			       SHA_DIGEST_LENGTH);
Packit c6d22b
Packit c6d22b
		if (!fread(entry.name, entry.header.name_len, 1, fp)) {
Packit c6d22b
			log_err("Unable to read template name\n");
Packit c6d22b
			goto out;
Packit c6d22b
		}
Packit c6d22b
Packit c6d22b
		entry.name[entry.header.name_len] = '\0';
Packit c6d22b
Packit c6d22b
		if (!fread(&entry.template_len, sizeof(entry.template_len), 1, fp)) {
Packit c6d22b
			log_err("Unable to read template length\n");
Packit c6d22b
			goto out;
Packit c6d22b
		}
Packit c6d22b
Packit c6d22b
		if (entry.template_buf_len < entry.template_len) {
Packit c6d22b
			free(entry.template);
Packit c6d22b
			entry.template_buf_len = entry.template_len;
Packit c6d22b
			entry.template = malloc(entry.template_len);
Packit c6d22b
		}
Packit c6d22b
Packit c6d22b
		if (!fread(entry.template, entry.template_len, 1, fp)) {
Packit c6d22b
			log_err("Unable to read template\n");
Packit c6d22b
			goto out;
Packit c6d22b
		}
Packit c6d22b
Packit c6d22b
		if (validate)
Packit c6d22b
			ima_verify_template_hash(&entry);
Packit c6d22b
Packit c6d22b
		if (!strcmp(entry.name, "ima"))
Packit c6d22b
			ima_show(&entry);
Packit c6d22b
		else
Packit c6d22b
			ima_ng_show(&entry);
Packit c6d22b
	}
Packit c6d22b
Packit c6d22b
Packit c6d22b
	for (i = 0; i < NUM_PCRS; i++) {
Packit c6d22b
		if (memcmp(pcr[i], zero, SHA_DIGEST_LENGTH) == 0)
Packit c6d22b
			continue;
Packit c6d22b
Packit c6d22b
		log_info("PCRAgg %.2d: ", i);
Packit c6d22b
		log_dump(pcr[i], SHA_DIGEST_LENGTH);
Packit c6d22b
Packit c6d22b
		tpm_pcr_read(i, hwpcr, sizeof(hwpcr));
Packit c6d22b
		log_info("HW PCR-%d: ", i);
Packit c6d22b
		log_dump(hwpcr, sizeof(hwpcr));
Packit c6d22b
Packit c6d22b
		if (memcmp(pcr[i], hwpcr, sizeof(SHA_DIGEST_LENGTH)) != 0) {
Packit c6d22b
			log_err("PCRAgg %d does not match HW PCR-%d\n", i, i);
Packit c6d22b
Packit c6d22b
			verify_failed = true;
Packit c6d22b
		}
Packit c6d22b
	}
Packit c6d22b
Packit c6d22b
	if (!verify_failed)
Packit c6d22b
		err = 0;
Packit c6d22b
out:
Packit c6d22b
	fclose(fp);
Packit c6d22b
	return err;
Packit c6d22b
}
Packit c6d22b
Packit c6d22b
static int cmd_ima_measurement(struct command *cmd)
Packit c6d22b
{
Packit c6d22b
	char *file = g_argv[optind++];
Packit c6d22b
Packit c6d22b
	if (!file) {
Packit c6d22b
		log_err("Parameters missing\n");
Packit c6d22b
		print_usage(cmd);
Packit c6d22b
		return -1;
Packit c6d22b
	}
Packit c6d22b
Packit c6d22b
	return ima_measurement(file);
Packit c6d22b
}
Packit c6d22b
Packit c6d22b
static void print_usage(struct command *cmd)
Packit c6d22b
{
Packit c6d22b
	printf("usage: %s %s\n", cmd->name, cmd->arg ? cmd->arg : "");
Packit c6d22b
}
Packit c6d22b
Packit c6d22b
static void print_full_usage(struct command *cmd)
Packit c6d22b
{
Packit c6d22b
	if (cmd->name)
Packit c6d22b
		printf("usage: %s %s\n", cmd->name, cmd->arg ? cmd->arg : "");
Packit c6d22b
	if (cmd->msg)
Packit c6d22b
		printf("%s", cmd->msg);
Packit c6d22b
}
Packit c6d22b
Packit c6d22b
static int print_command_usage(struct command *cmds, char *command)
Packit c6d22b
{
Packit c6d22b
	struct command *cmd;
Packit c6d22b
Packit c6d22b
	for (cmd = cmds; cmd->name; cmd++) {
Packit c6d22b
		if (strcmp(cmd->name, command) == 0) {
Packit c6d22b
			print_full_usage(cmd);
Packit c6d22b
			return 0;
Packit c6d22b
		}
Packit c6d22b
	}
Packit c6d22b
	printf("invalid command: %s\n", command);
Packit c6d22b
	return -1;
Packit c6d22b
}
Packit c6d22b
Packit c6d22b
static void print_all_usage(struct command *cmds)
Packit c6d22b
{
Packit c6d22b
	struct command *cmd;
Packit c6d22b
Packit c6d22b
	printf("commands:\n");
Packit c6d22b
Packit c6d22b
	for (cmd = cmds; cmd->name; cmd++) {
Packit c6d22b
		if (cmd->arg)
Packit c6d22b
			printf(" %s %s\n", cmd->name, cmd->arg);
Packit c6d22b
		else if (cmd->msg)
Packit c6d22b
			printf(" %s", cmd->msg);
Packit c6d22b
	}
Packit c6d22b
}
Packit c6d22b
Packit c6d22b
static int call_command(struct command *cmds, char *command)
Packit c6d22b
{
Packit c6d22b
	struct command *cmd;
Packit c6d22b
Packit c6d22b
	for (cmd = cmds; cmd->name; cmd++) {
Packit c6d22b
		if (strcasecmp(cmd->name, command) == 0)
Packit c6d22b
			return cmd->func(cmd);
Packit c6d22b
	}
Packit c6d22b
	printf("Invalid command: %s\n", command);
Packit c6d22b
	return -1;
Packit c6d22b
}
Packit c6d22b
Packit c6d22b
static int cmd_help(struct command *cmd)
Packit c6d22b
{
Packit c6d22b
	if (!g_argv[optind]) {
Packit c6d22b
		print_usage(cmd);
Packit c6d22b
		return 0;
Packit c6d22b
	} else
Packit c6d22b
		return print_command_usage(cmds, g_argv[optind]);
Packit c6d22b
}
Packit c6d22b
Packit c6d22b
static void usage(void)
Packit c6d22b
{
Packit c6d22b
	printf("Usage: evmctl [-v] <command> [OPTIONS]\n");
Packit c6d22b
Packit c6d22b
	print_all_usage(cmds);
Packit c6d22b
Packit c6d22b
	printf(
Packit c6d22b
		"\n"
Packit c6d22b
		"  -a, --hashalgo     sha1 (default), sha224, sha256, sha384, sha512\n"
Packit c6d22b
		"  -s, --imasig       make IMA signature\n"
Packit c6d22b
		"  -d, --imahash      make IMA hash\n"
Packit c6d22b
		"  -f, --sigfile      store IMA signature in .sig file instead of xattr\n"
Packit c6d22b
		"      --rsa          use RSA key type and signing scheme v1\n"
Packit c6d22b
		"  -k, --key          path to signing key (default: /etc/keys/{privkey,pubkey}_evm.pem)\n"
Packit c6d22b
		"  -o, --portable     generate portable EVM signatures\n"
Packit c6d22b
		"  -p, --pass         password for encrypted signing key\n"
Packit c6d22b
		"  -r, --recursive    recurse into directories (sign)\n"
Packit c6d22b
		"  -t, --type         file types to fix 'fdsxm' (f: file, d: directory, s: block/char/symlink)\n"
Packit c6d22b
		"                     x - skip fixing if both ima and evm xattrs exist (use with caution)\n"
Packit c6d22b
		"                     m - stay on the same filesystem (like 'find -xdev')\n"
Packit c6d22b
		"  -n                 print result to stdout instead of setting xattr\n"
Packit c6d22b
		"  -u, --uuid         use custom FS UUID for EVM (unspecified: from FS, empty: do not use)\n"
Packit c6d22b
		"      --smack        use extra SMACK xattrs for EVM\n"
Packit c6d22b
		"      --m32          force EVM hmac/signature for 32 bit target system\n"
Packit c6d22b
		"      --m64          force EVM hmac/signature for 64 bit target system\n"
Packit c6d22b
		"      --ino          use custom inode for EVM\n"
Packit c6d22b
		"      --uid          use custom UID for EVM\n"
Packit c6d22b
		"      --gid          use custom GID for EVM\n"
Packit c6d22b
		"      --mode         use custom Mode for EVM\n"
Packit c6d22b
		"      --generation   use custom Generation for EVM(unspecified: from FS, empty: use 0)\n"
Packit c6d22b
		"      --ima          use custom IMA signature for EVM\n"
Packit c6d22b
		"      --selinux      use custom Selinux label for EVM\n"
Packit c6d22b
		"      --caps         use custom Capabilities for EVM(unspecified: from FS, empty: do not use)\n"
Packit c6d22b
		"      --list         measurement list verification\n"
Packit c6d22b
		"  -v                 increase verbosity level\n"
Packit c6d22b
		"  -h, --help         display this help and exit\n"
Packit c6d22b
		"\n");
Packit c6d22b
}
Packit c6d22b
Packit c6d22b
struct command cmds[] = {
Packit c6d22b
	{"--version", NULL, 0, ""},
Packit c6d22b
	{"help", cmd_help, 0, "<command>"},
Packit c6d22b
	{"import", cmd_import, 0, "[--rsa] pubkey keyring", "Import public key into the keyring.\n"},
Packit c6d22b
	{"convert", cmd_convert, 0, "key", "convert public key into the keyring.\n"},
Packit c6d22b
	{"sign", cmd_sign_evm, 0, "[-r] [--imahash | --imasig ] [--key key] [--pass [password] file", "Sign file metadata.\n"},
Packit c6d22b
	{"verify", cmd_verify_evm, 0, "file", "Verify EVM signature (for debugging).\n"},
Packit c6d22b
	{"ima_sign", cmd_sign_ima, 0, "[--sigfile] [--key key] [--pass [password] file", "Make file content signature.\n"},
Packit c6d22b
	{"ima_verify", cmd_verify_ima, 0, "file", "Verify IMA signature (for debugging).\n"},
Packit c6d22b
	{"ima_setxattr", cmd_setxattr_ima, 0, "[--sigfile file]", "Set IMA signature from sigfile\n"},
Packit c6d22b
	{"ima_hash", cmd_hash_ima, 0, "file", "Make file content hash.\n"},
Packit c6d22b
	{"ima_measurement", cmd_ima_measurement, 0, "file", "Verify measurement list (experimental).\n"},
Packit c6d22b
	{"ima_fix", cmd_ima_fix, 0, "[-t fdsxm] path", "Recursively fix IMA/EVM xattrs in fix mode.\n"},
Packit c6d22b
	{"ima_clear", cmd_ima_clear, 0, "[-t fdsxm] path", "Recursively remove IMA/EVM xattrs.\n"},
Packit c6d22b
	{"sign_hash", cmd_sign_hash, 0, "[--key key] [--pass [password]", "Sign hashes from shaXsum output.\n"},
Packit c6d22b
#ifdef DEBUG
Packit c6d22b
	{"hmac", cmd_hmac_evm, 0, "[--imahash | --imasig ] file", "Sign file metadata with HMAC using symmetric key (for testing purpose).\n"},
Packit c6d22b
#endif
Packit c6d22b
	{0, 0, 0, NULL}
Packit c6d22b
};
Packit c6d22b
Packit c6d22b
static struct option opts[] = {
Packit c6d22b
	{"help", 0, 0, 'h'},
Packit c6d22b
	{"imasig", 0, 0, 's'},
Packit c6d22b
	{"imahash", 0, 0, 'd'},
Packit c6d22b
	{"hashalgo", 1, 0, 'a'},
Packit c6d22b
	{"pass", 2, 0, 'p'},
Packit c6d22b
	{"sigfile", 0, 0, 'f'},
Packit c6d22b
	{"uuid", 2, 0, 'u'},
Packit c6d22b
	{"rsa", 0, 0, '1'},
Packit c6d22b
	{"key", 1, 0, 'k'},
Packit c6d22b
	{"type", 1, 0, 't'},
Packit c6d22b
	{"recursive", 0, 0, 'r'},
Packit c6d22b
	{"m32", 0, 0, '3'},
Packit c6d22b
	{"m64", 0, 0, '6'},
Packit c6d22b
	{"portable", 0, 0, 'o'},
Packit c6d22b
	{"smack", 0, 0, 128},
Packit c6d22b
	{"version", 0, 0, 129},
Packit c6d22b
	{"inode", 1, 0, 130},
Packit c6d22b
	{"uid", 1, 0, 131},
Packit c6d22b
	{"gid", 1, 0, 132},
Packit c6d22b
	{"mode", 1, 0, 133},
Packit c6d22b
	{"generation", 1, 0, 134},
Packit c6d22b
	{"ima", 1, 0, 135},
Packit c6d22b
	{"selinux", 1, 0, 136},
Packit c6d22b
	{"caps", 2, 0, 137},
Packit c6d22b
	{"list", 0, 0, 138},
Packit c6d22b
	{}
Packit c6d22b
Packit c6d22b
};
Packit c6d22b
Packit c6d22b
static char *get_password(void)
Packit c6d22b
{
Packit c6d22b
	struct termios flags, tmp_flags;
Packit c6d22b
	char *password, *pwd;
Packit c6d22b
	int passlen = 64;
Packit c6d22b
Packit c6d22b
	password = malloc(passlen);
Packit c6d22b
	if (!password) {
Packit c6d22b
		perror("malloc");
Packit c6d22b
		return NULL;
Packit c6d22b
	}
Packit c6d22b
Packit c6d22b
	tcgetattr(fileno(stdin), &flags);
Packit c6d22b
	tmp_flags = flags;
Packit c6d22b
	tmp_flags.c_lflag &= ~ECHO;
Packit c6d22b
	tmp_flags.c_lflag |= ECHONL;
Packit c6d22b
Packit c6d22b
	if (tcsetattr(fileno(stdin), TCSANOW, &tmp_flags) != 0) {
Packit c6d22b
		perror("tcsetattr");
Packit Service 6773fb
		return NULL;
Packit c6d22b
	}
Packit c6d22b
Packit c6d22b
	printf("PEM password: ");
Packit c6d22b
	pwd = fgets(password, passlen, stdin);
Packit c6d22b
Packit c6d22b
	/* restore terminal */
Packit c6d22b
	if (tcsetattr(fileno(stdin), TCSANOW, &flags) != 0) {
Packit c6d22b
		perror("tcsetattr");
Packit Service 6773fb
		return NULL;
Packit c6d22b
	}
Packit c6d22b
Packit c6d22b
	return pwd;
Packit c6d22b
}
Packit c6d22b
Packit c6d22b
int main(int argc, char *argv[])
Packit c6d22b
{
Packit c6d22b
	int err = 0, c, lind;
Packit c6d22b
Packit c6d22b
	g_argv = argv;
Packit c6d22b
	g_argc = argc;
Packit c6d22b
Packit c6d22b
	while (1) {
Packit c6d22b
		c = getopt_long(argc, argv, "hvnsda:op::fu::k:t:ri", opts, &lind);
Packit c6d22b
		if (c == -1)
Packit c6d22b
			break;
Packit c6d22b
Packit c6d22b
		switch (c) {
Packit c6d22b
		case 'h':
Packit c6d22b
			usage();
Packit c6d22b
			exit(0);
Packit c6d22b
			break;
Packit c6d22b
		case 'v':
Packit c6d22b
			params.verbose++;
Packit c6d22b
			break;
Packit c6d22b
		case 'd':
Packit c6d22b
			digest = 1;
Packit c6d22b
			break;
Packit c6d22b
		case 's':
Packit c6d22b
			digsig = 1;
Packit c6d22b
			break;
Packit c6d22b
		case 'n':
Packit c6d22b
			/* do not set Extended Attributes... just print signature */
Packit c6d22b
			xattr = 0;
Packit c6d22b
			sigdump = 1;
Packit c6d22b
			break;
Packit c6d22b
		case 'a':
Packit c6d22b
			params.hash_algo = optarg;
Packit c6d22b
			break;
Packit c6d22b
		case 'p':
Packit c6d22b
			if (optarg)
Packit c6d22b
				params.keypass = optarg;
Packit c6d22b
			else
Packit c6d22b
				params.keypass = get_password();
Packit c6d22b
			break;
Packit c6d22b
		case 'f':
Packit c6d22b
			sigfile = 1;
Packit c6d22b
			break;
Packit c6d22b
		case 'u':
Packit c6d22b
			uuid_str = optarg;
Packit c6d22b
			if (!uuid_str)
Packit c6d22b
				hmac_flags |= HMAC_FLAG_NO_UUID;
Packit c6d22b
			break;
Packit c6d22b
		case '1':
Packit c6d22b
			params.x509 = 0;
Packit c6d22b
			break;
Packit c6d22b
		case 'k':
Packit c6d22b
			params.keyfile = optarg;
Packit c6d22b
			break;
Packit c6d22b
		case 'i':
Packit c6d22b
			if (evm_portable)
Packit c6d22b
				log_err("Portable and immutable options are exclusive, ignoring immutable option.");
Packit c6d22b
			else
Packit c6d22b
				evm_immutable = true;
Packit c6d22b
			break;
Packit c6d22b
		case 'o':
Packit c6d22b
			if (evm_immutable)
Packit c6d22b
				log_err("Portable and immutable options are exclusive, ignoring portable option.");
Packit c6d22b
			else
Packit c6d22b
				evm_portable = true;
Packit c6d22b
			break;
Packit c6d22b
		case 't':
Packit c6d22b
			search_type = optarg;
Packit c6d22b
			break;
Packit c6d22b
		case 'r':
Packit c6d22b
			recursive = 1;
Packit c6d22b
			break;
Packit c6d22b
		case '3':
Packit c6d22b
			msize = 32;
Packit c6d22b
			break;
Packit c6d22b
		case '6':
Packit c6d22b
			msize = 64;
Packit c6d22b
			break;
Packit c6d22b
		case 128:
Packit c6d22b
			evm_config_xattrnames = evm_extra_smack_xattrs;
Packit c6d22b
			break;
Packit c6d22b
		case 129:
Packit c6d22b
			printf("evmctl %s\n", VERSION);
Packit c6d22b
			exit(0);
Packit c6d22b
			break;
Packit c6d22b
		case 130:
Packit c6d22b
			ino_str = optarg;
Packit c6d22b
			break;
Packit c6d22b
		case 131:
Packit c6d22b
			uid_str = optarg;
Packit c6d22b
			break;
Packit c6d22b
		case 132:
Packit c6d22b
			gid_str = optarg;
Packit c6d22b
			break;
Packit c6d22b
		case 133:
Packit c6d22b
			mode_str = optarg;
Packit c6d22b
			break;
Packit c6d22b
		case 134:
Packit c6d22b
			generation_str = optarg;
Packit c6d22b
			break;
Packit c6d22b
		case 135:
Packit c6d22b
			ima_str = optarg;
Packit c6d22b
			break;
Packit c6d22b
		case 136:
Packit c6d22b
			selinux_str = optarg;
Packit c6d22b
			break;
Packit c6d22b
		case 137:
Packit c6d22b
			caps_str = optarg;
Packit c6d22b
			hmac_flags |= HMAC_FLAG_CAPS_SET;
Packit c6d22b
			break;
Packit c6d22b
		case 138:
Packit c6d22b
			measurement_list = 1;
Packit c6d22b
			break;
Packit c6d22b
		case '?':
Packit c6d22b
			exit(1);
Packit c6d22b
			break;
Packit c6d22b
		default:
Packit c6d22b
			log_err("getopt() returned: %d (%c)\n", c, c);
Packit c6d22b
		}
Packit c6d22b
	}
Packit c6d22b
Packit c6d22b
	if (argv[optind] == NULL)
Packit c6d22b
		usage();
Packit c6d22b
	else
Packit c6d22b
		err = call_command(cmds, argv[optind++]);
Packit c6d22b
Packit c6d22b
	if (err) {
Packit c6d22b
		unsigned long error;
Packit c6d22b
Packit c6d22b
		if (errno)
Packit c6d22b
			log_err("errno: %s (%d)\n", strerror(errno), errno);
Packit c6d22b
		for (;;) {
Packit c6d22b
			error = ERR_get_error();
Packit c6d22b
			if (!error)
Packit c6d22b
				break;
Packit c6d22b
			log_err("%s\n", ERR_error_string(error, NULL));
Packit c6d22b
		}
Packit c6d22b
	}
Packit c6d22b
Packit c6d22b
	ERR_free_strings();
Packit c6d22b
	EVP_cleanup();
Packit c6d22b
	BIO_free(NULL);
Packit c6d22b
	return err;
Packit c6d22b
}