[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <12e2743cfe0c05c613a622ea52a126f48368b896.camel@linux.ibm.com>
Date: Mon, 23 Dec 2024 19:17:02 -0500
From: Mimi Zohar <zohar@...ux.ibm.com>
To: Eric Snowberg <eric.snowberg@...cle.com>,
linux-security-module@...r.kernel.org
Cc: dhowells@...hat.com, dwmw2@...radead.org, herbert@...dor.apana.org.au,
davem@...emloft.net, ardb@...nel.org, jarkko@...nel.org,
paul@...l-moore.com, jmorris@...ei.org, serge@...lyn.com,
roberto.sassu@...wei.com, dmitry.kasatkin@...il.com, mic@...ikod.net,
casey@...aufler-ca.com, stefanb@...ux.ibm.com, ebiggers@...nel.org,
rdunlap@...radead.org, linux-kernel@...r.kernel.org,
keyrings@...r.kernel.org, linux-crypto@...r.kernel.org,
linux-efi@...r.kernel.org, linux-integrity@...r.kernel.org
Subject: Re: [RFC PATCH v3 04/13] keys: Add new verification type
(VERIFYING_CLAVIS_SIGNATURE)
On Thu, 2024-10-17 at 09:55 -0600, Eric Snowberg wrote:
> Add a new verification type called VERIFYING_CLAVIS_SIGNATURE. This new
> usage will be used for validating keys added to the new clavis LSM keyring.
> This will be introduced in a follow-on patch.
>
> Signed-off-by: Eric Snowberg <eric.snowberg@...cle.com>
> ---
> crypto/asymmetric_keys/asymmetric_type.c | 1 +
> crypto/asymmetric_keys/pkcs7_verify.c | 1 +
> include/linux/verification.h | 2 ++
> 3 files changed, 4 insertions(+)
>
> diff --git a/crypto/asymmetric_keys/asymmetric_type.c b/crypto/asymmetric_keys/asymmetric_type.c
> index 43af5fa510c0..d7bf95c77f4a 100644
> --- a/crypto/asymmetric_keys/asymmetric_type.c
> +++ b/crypto/asymmetric_keys/asymmetric_type.c
> @@ -25,6 +25,7 @@ const char *const key_being_used_for[NR__KEY_BEING_USED_FOR] = {
> [VERIFYING_KEY_SIGNATURE] = "key sig",
> [VERIFYING_KEY_SELF_SIGNATURE] = "key self sig",
> [VERIFYING_UNSPECIFIED_SIGNATURE] = "unspec sig",
> + [VERIFYING_CLAVIS_SIGNATURE] = "clavis sig",
> };
> EXPORT_SYMBOL_GPL(key_being_used_for);
>
> diff --git a/crypto/asymmetric_keys/pkcs7_verify.c b/crypto/asymmetric_keys/pkcs7_verify.c
> index f0d4ff3c20a8..1dc80e68ce96 100644
> --- a/crypto/asymmetric_keys/pkcs7_verify.c
> +++ b/crypto/asymmetric_keys/pkcs7_verify.c
> @@ -428,6 +428,7 @@ int pkcs7_verify(struct pkcs7_message *pkcs7,
> }
> /* Authattr presence checked in parser */
> break;
> + case VERIFYING_CLAVIS_SIGNATURE:
Add "fallthrough;"
https://www.kernel.org/doc/html/v5.7/process/deprecated.html?highlight=fallthrough#implicit-switch-case-fall-through
> case VERIFYING_UNSPECIFIED_SIGNATURE:
> if (pkcs7->data_type != OID_data) {
> pr_warn("Invalid unspecified sig (not pkcs7-data)\n");
> diff --git a/include/linux/verification.h b/include/linux/verification.h
> index cb2d47f28091..02d2d70e2324 100644
> --- a/include/linux/verification.h
> +++ b/include/linux/verification.h
> @@ -36,6 +36,8 @@ enum key_being_used_for {
> VERIFYING_KEY_SIGNATURE,
> VERIFYING_KEY_SELF_SIGNATURE,
> VERIFYING_UNSPECIFIED_SIGNATURE,
> + /* Add new entries above, keep VERIFYING_CLAVIS_SIGNATURE at the end. */
> + VERIFYING_CLAVIS_SIGNATURE,
> NR__KEY_BEING_USED_FOR
> };
> extern const char *const key_being_used_for[NR__KEY_BEING_USED_FOR];
Powered by blists - more mailing lists