xref: /linux/security/integrity/evm/evm.h (revision b77e0ce62d63a761ffb7f7245a215a49f5921c2f)
1 /* SPDX-License-Identifier: GPL-2.0-only */
2 /*
3  * Copyright (C) 2005-2010 IBM Corporation
4  *
5  * Authors:
6  * Mimi Zohar <zohar@us.ibm.com>
7  * Kylene Hall <kjhall@us.ibm.com>
8  *
9  * File: evm.h
10  */
11 
12 #ifndef __INTEGRITY_EVM_H
13 #define __INTEGRITY_EVM_H
14 
15 #include <linux/xattr.h>
16 #include <linux/security.h>
17 
18 #include "../integrity.h"
19 
20 #define EVM_INIT_HMAC	0x0001
21 #define EVM_INIT_X509	0x0002
22 #define EVM_ALLOW_METADATA_WRITES	0x0004
23 #define EVM_SETUP_COMPLETE 0x80000000 /* userland has signaled key load */
24 
25 #define EVM_KEY_MASK (EVM_INIT_HMAC | EVM_INIT_X509)
26 #define EVM_INIT_MASK (EVM_INIT_HMAC | EVM_INIT_X509 | EVM_SETUP_COMPLETE | \
27 		       EVM_ALLOW_METADATA_WRITES)
28 
29 struct xattr_list {
30 	struct list_head list;
31 	char *name;
32 };
33 
34 extern int evm_initialized;
35 
36 #define EVM_ATTR_FSUUID		0x0001
37 
38 extern int evm_hmac_attrs;
39 
40 extern struct crypto_shash *hmac_tfm;
41 extern struct crypto_shash *hash_tfm;
42 
43 /* List of EVM protected security xattrs */
44 extern struct list_head evm_config_xattrnames;
45 
46 struct evm_digest {
47 	struct ima_digest_data hdr;
48 	char digest[IMA_MAX_DIGEST_SIZE];
49 } __packed;
50 
51 int evm_init_key(void);
52 int evm_update_evmxattr(struct dentry *dentry,
53 			const char *req_xattr_name,
54 			const char *req_xattr_value,
55 			size_t req_xattr_value_len);
56 int evm_calc_hmac(struct dentry *dentry, const char *req_xattr_name,
57 		  const char *req_xattr_value,
58 		  size_t req_xattr_value_len, struct evm_digest *data);
59 int evm_calc_hash(struct dentry *dentry, const char *req_xattr_name,
60 		  const char *req_xattr_value,
61 		  size_t req_xattr_value_len, char type,
62 		  struct evm_digest *data);
63 int evm_init_hmac(struct inode *inode, const struct xattr *xattr,
64 		  char *hmac_val);
65 int evm_init_secfs(void);
66 
67 #endif
68