Loading...
1/* SPDX-License-Identifier: GPL-2.0-only */
2/*
3 * Copyright (C) 2005-2010 IBM Corporation
4 *
5 * Authors:
6 * Mimi Zohar <zohar@us.ibm.com>
7 * Kylene Hall <kjhall@us.ibm.com>
8 *
9 * File: evm.h
10 */
11
12#ifndef __INTEGRITY_EVM_H
13#define __INTEGRITY_EVM_H
14
15#include <linux/xattr.h>
16#include <linux/security.h>
17
18#include "../integrity.h"
19
20#define EVM_INIT_HMAC 0x0001
21#define EVM_INIT_X509 0x0002
22#define EVM_ALLOW_METADATA_WRITES 0x0004
23#define EVM_SETUP_COMPLETE 0x80000000 /* userland has signaled key load */
24
25#define EVM_KEY_MASK (EVM_INIT_HMAC | EVM_INIT_X509)
26#define EVM_INIT_MASK (EVM_INIT_HMAC | EVM_INIT_X509 | EVM_SETUP_COMPLETE | \
27 EVM_ALLOW_METADATA_WRITES)
28
29struct xattr_list {
30 struct list_head list;
31 char *name;
32};
33
34extern int evm_initialized;
35
36#define EVM_ATTR_FSUUID 0x0001
37
38extern int evm_hmac_attrs;
39
40extern struct crypto_shash *hmac_tfm;
41extern struct crypto_shash *hash_tfm;
42
43/* List of EVM protected security xattrs */
44extern struct list_head evm_config_xattrnames;
45
46struct evm_digest {
47 struct ima_digest_data hdr;
48 char digest[IMA_MAX_DIGEST_SIZE];
49} __packed;
50
51int evm_init_key(void);
52int evm_update_evmxattr(struct dentry *dentry,
53 const char *req_xattr_name,
54 const char *req_xattr_value,
55 size_t req_xattr_value_len);
56int evm_calc_hmac(struct dentry *dentry, const char *req_xattr_name,
57 const char *req_xattr_value,
58 size_t req_xattr_value_len, struct evm_digest *data);
59int evm_calc_hash(struct dentry *dentry, const char *req_xattr_name,
60 const char *req_xattr_value,
61 size_t req_xattr_value_len, char type,
62 struct evm_digest *data);
63int evm_init_hmac(struct inode *inode, const struct xattr *xattr,
64 char *hmac_val);
65int evm_init_secfs(void);
66
67#endif
1/* SPDX-License-Identifier: GPL-2.0-only */
2/*
3 * Copyright (C) 2005-2010 IBM Corporation
4 *
5 * Authors:
6 * Mimi Zohar <zohar@us.ibm.com>
7 * Kylene Hall <kjhall@us.ibm.com>
8 *
9 * File: evm.h
10 */
11
12#ifndef __INTEGRITY_EVM_H
13#define __INTEGRITY_EVM_H
14
15#include <linux/xattr.h>
16#include <linux/security.h>
17
18#include "../integrity.h"
19
20#define EVM_INIT_HMAC 0x0001
21#define EVM_INIT_X509 0x0002
22#define EVM_ALLOW_METADATA_WRITES 0x0004
23#define EVM_SETUP_COMPLETE 0x80000000 /* userland has signaled key load */
24
25#define EVM_KEY_MASK (EVM_INIT_HMAC | EVM_INIT_X509)
26#define EVM_INIT_MASK (EVM_INIT_HMAC | EVM_INIT_X509 | EVM_SETUP_COMPLETE | \
27 EVM_ALLOW_METADATA_WRITES)
28
29struct xattr_list {
30 struct list_head list;
31 char *name;
32 bool enabled;
33};
34
35extern int evm_initialized;
36
37#define EVM_ATTR_FSUUID 0x0001
38
39extern int evm_hmac_attrs;
40
41extern struct crypto_shash *hmac_tfm;
42extern struct crypto_shash *hash_tfm;
43
44/* List of EVM protected security xattrs */
45extern struct list_head evm_config_xattrnames;
46
47struct evm_digest {
48 struct ima_digest_data hdr;
49 char digest[IMA_MAX_DIGEST_SIZE];
50} __packed;
51
52int evm_init_key(void);
53int evm_update_evmxattr(struct dentry *dentry,
54 const char *req_xattr_name,
55 const char *req_xattr_value,
56 size_t req_xattr_value_len);
57int evm_calc_hmac(struct dentry *dentry, const char *req_xattr_name,
58 const char *req_xattr_value,
59 size_t req_xattr_value_len, struct evm_digest *data);
60int evm_calc_hash(struct dentry *dentry, const char *req_xattr_name,
61 const char *req_xattr_value,
62 size_t req_xattr_value_len, char type,
63 struct evm_digest *data);
64int evm_init_hmac(struct inode *inode, const struct xattr *xattr,
65 char *hmac_val);
66int evm_init_secfs(void);
67
68#endif