aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorAndreas Steffen <andreas.steffen@strongswan.org>2016-12-19 19:23:00 -0500
committerLinus Torvalds <torvalds@linux-foundation.org>2016-12-20 12:48:46 -0500
commit98e1d55d033eed2a474924c94fc2051ab20de402 (patch)
tree64b94932516d90ef67653c8dc5a1dbebd9a679bb
parentd68a6fe9fccfd00589c61df672b449d66ba3183f (diff)
ima: platform-independent hash value
For remote attestion it is important for the ima measurement values to be platform-independent. Therefore integer fields to be hashed must be converted to canonical format. Link: http://lkml.kernel.org/r/1480554346-29071-11-git-send-email-zohar@linux.vnet.ibm.com Signed-off-by: Andreas Steffen <andreas.steffen@strongswan.org> Signed-off-by: Mimi Zohar <zohar@linux.vnet.ibm.com> Cc: Thiago Jung Bauermann <bauerman@linux.vnet.ibm.com> Cc: "Eric W. Biederman" <ebiederm@xmission.com> Cc: Dmitry Kasatkin <dmitry.kasatkin@gmail.com> Cc: Josh Sklar <sklar@linux.vnet.ibm.com> Cc: Dave Young <dyoung@redhat.com> Cc: Vivek Goyal <vgoyal@redhat.com> Cc: Baoquan He <bhe@redhat.com> Cc: Michael Ellerman <mpe@ellerman.id.au> Cc: Benjamin Herrenschmidt <benh@kernel.crashing.org> Cc: Paul Mackerras <paulus@samba.org> Cc: Stewart Smith <stewart@linux.vnet.ibm.com> Signed-off-by: Andrew Morton <akpm@linux-foundation.org> Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
-rw-r--r--security/integrity/ima/ima_crypto.c6
1 files changed, 4 insertions, 2 deletions
diff --git a/security/integrity/ima/ima_crypto.c b/security/integrity/ima/ima_crypto.c
index 38f2ed830dd6..802d5d20f36f 100644
--- a/security/integrity/ima/ima_crypto.c
+++ b/security/integrity/ima/ima_crypto.c
@@ -477,11 +477,13 @@ static int ima_calc_field_array_hash_tfm(struct ima_field_data *field_data,
477 u8 buffer[IMA_EVENT_NAME_LEN_MAX + 1] = { 0 }; 477 u8 buffer[IMA_EVENT_NAME_LEN_MAX + 1] = { 0 };
478 u8 *data_to_hash = field_data[i].data; 478 u8 *data_to_hash = field_data[i].data;
479 u32 datalen = field_data[i].len; 479 u32 datalen = field_data[i].len;
480 u32 datalen_to_hash =
481 !ima_canonical_fmt ? datalen : cpu_to_le32(datalen);
480 482
481 if (strcmp(td->name, IMA_TEMPLATE_IMA_NAME) != 0) { 483 if (strcmp(td->name, IMA_TEMPLATE_IMA_NAME) != 0) {
482 rc = crypto_shash_update(shash, 484 rc = crypto_shash_update(shash,
483 (const u8 *) &field_data[i].len, 485 (const u8 *) &datalen_to_hash,
484 sizeof(field_data[i].len)); 486 sizeof(datalen_to_hash));
485 if (rc) 487 if (rc)
486 break; 488 break;
487 } else if (strcmp(td->fields[i]->field_id, "n") == 0) { 489 } else if (strcmp(td->fields[i]->field_id, "n") == 0) {