| #!/bin/bash |
| # SPDX-License-Identifier: GPL-2.0 |
| |
| set -e |
| set -u |
| set -o pipefail |
| |
| VERBOSE="${SELFTESTS_VERBOSE:=0}" |
| LOG_FILE="$(mktemp /tmp/verify_sig_setup.log.XXXXXX)" |
| |
| x509_genkey_content="\ |
| [ req ] |
| default_bits = 2048 |
| distinguished_name = req_distinguished_name |
| prompt = no |
| string_mask = utf8only |
| x509_extensions = myexts |
| |
| [ req_distinguished_name ] |
| CN = eBPF Signature Verification Testing Key |
| |
| [ myexts ] |
| basicConstraints=critical,CA:FALSE |
| keyUsage=digitalSignature |
| subjectKeyIdentifier=hash |
| authorityKeyIdentifier=keyid |
| " |
| |
| usage() |
| { |
| echo "Usage: $0 <setup|cleanup <existing_tmp_dir>" |
| exit 1 |
| } |
| |
| setup() |
| { |
| local tmp_dir="$1" |
| |
| echo "${x509_genkey_content}" > ${tmp_dir}/x509.genkey |
| |
| openssl req -new -nodes -utf8 -sha256 -days 36500 \ |
| -batch -x509 -config ${tmp_dir}/x509.genkey \ |
| -outform PEM -out ${tmp_dir}/signing_key.pem \ |
| -keyout ${tmp_dir}/signing_key.pem 2>&1 |
| |
| openssl x509 -in ${tmp_dir}/signing_key.pem -out \ |
| ${tmp_dir}/signing_key.der -outform der |
| |
| key_id=$(cat ${tmp_dir}/signing_key.der | keyctl padd asymmetric ebpf_testing_key @s) |
| |
| keyring_id=$(keyctl newring ebpf_testing_keyring @s) |
| keyctl link $key_id $keyring_id |
| } |
| |
| cleanup() { |
| local tmp_dir="$1" |
| |
| keyctl unlink $(keyctl search @s asymmetric ebpf_testing_key) @s |
| keyctl unlink $(keyctl search @s keyring ebpf_testing_keyring) @s |
| rm -rf ${tmp_dir} |
| } |
| |
| fsverity_create_sign_file() { |
| local tmp_dir="$1" |
| |
| data_file=${tmp_dir}/data-file |
| sig_file=${tmp_dir}/sig-file |
| dd if=/dev/urandom of=$data_file bs=1 count=12345 2> /dev/null |
| fsverity sign --key ${tmp_dir}/signing_key.pem $data_file $sig_file |
| |
| # We do not want to enable fsverity on $data_file yet. Try whether |
| # the file system support fsverity on a different file. |
| touch ${tmp_dir}/tmp-file |
| fsverity enable ${tmp_dir}/tmp-file |
| } |
| |
| fsverity_enable_file() { |
| local tmp_dir="$1" |
| |
| data_file=${tmp_dir}/data-file |
| fsverity enable $data_file |
| } |
| |
| catch() |
| { |
| local exit_code="$1" |
| local log_file="$2" |
| |
| if [[ "${exit_code}" -ne 0 ]]; then |
| cat "${log_file}" >&3 |
| fi |
| |
| rm -f "${log_file}" |
| exit ${exit_code} |
| } |
| |
| main() |
| { |
| [[ $# -ne 2 ]] && usage |
| |
| local action="$1" |
| local tmp_dir="$2" |
| |
| [[ ! -d "${tmp_dir}" ]] && echo "Directory ${tmp_dir} doesn't exist" && exit 1 |
| |
| if [[ "${action}" == "setup" ]]; then |
| setup "${tmp_dir}" |
| elif [[ "${action}" == "cleanup" ]]; then |
| cleanup "${tmp_dir}" |
| elif [[ "${action}" == "fsverity-create-sign" ]]; then |
| fsverity_create_sign_file "${tmp_dir}" |
| elif [[ "${action}" == "fsverity-enable" ]]; then |
| fsverity_enable_file "${tmp_dir}" |
| else |
| echo "Unknown action: ${action}" |
| exit 1 |
| fi |
| } |
| |
| trap 'catch "$?" "${LOG_FILE}"' EXIT |
| |
| if [[ "${VERBOSE}" -eq 0 ]]; then |
| # Save the stderr to 3 so that we can output back to |
| # it incase of an error. |
| exec 3>&2 1>"${LOG_FILE}" 2>&1 |
| fi |
| |
| main "$@" |
| rm -f "${LOG_FILE}" |