summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorDmitry Eremin-Solenikov <dmitry_eremin-solenikov@mentor.com>2019-09-16 14:06:06 +0300
committerDmitry Eremin-Solenikov <dmitry_eremin-solenikov@mentor.com>2019-09-16 14:06:06 +0300
commit51b2da4a417aef67618c1471f5df1854b89a740d (patch)
tree382178290c3219effdd750173f577eb7e42adc16
parent0cea6e869fe9b1597042b2febaa60c85710ba306 (diff)
downloadmeta-secure-core-51b2da4a417aef67618c1471f5df1854b89a740d.tar.gz
key-store: drop private keys packages
Having a private key package might allow one to pull it into rootfs which is really, really bad. So drop all private key packages. Signed-off-by: Dmitry Eremin-Solenikov <dmitry_eremin-solenikov@mentor.com>
-rw-r--r--meta-signing-key/recipes-support/key-store/key-store_0.1.bb54
1 files changed, 0 insertions, 54 deletions
diff --git a/meta-signing-key/recipes-support/key-store/key-store_0.1.bb b/meta-signing-key/recipes-support/key-store/key-store_0.1.bb
index d83b79c..9dc7cae 100644
--- a/meta-signing-key/recipes-support/key-store/key-store_0.1.bb
+++ b/meta-signing-key/recipes-support/key-store/key-store_0.1.bb
@@ -14,18 +14,6 @@ KEY_DIR = "${sysconfdir}/keys"
14# For RPM verification 14# For RPM verification
15RPM_KEY_DIR = "${sysconfdir}/pki/rpm-gpg" 15RPM_KEY_DIR = "${sysconfdir}/pki/rpm-gpg"
16 16
17# For ${PN}-system-trusted-privkey
18SYSTEM_PRIV_KEY = "${KEY_DIR}/system_trusted_key.key"
19
20# For ${PN}-secondary-trusted-privkey
21SECONDARY_TRUSTED_PRIV_KEY = "${KEY_DIR}/secondary_trusted_key.key"
22
23# For ${PN}-modsign-privkey
24MODSIGN_PRIV_KEY = "${KEY_DIR}/modsign_key.key"
25
26# For ${PN}-ima-privkey
27IMA_PRIV_KEY = "${KEY_DIR}/x509_ima.key"
28
29# For ${PN}-system-trusted-cert 17# For ${PN}-system-trusted-cert
30SYSTEM_CERT = "${KEY_DIR}/system_trusted_key.crt" 18SYSTEM_CERT = "${KEY_DIR}/system_trusted_key.crt"
31 19
@@ -43,26 +31,6 @@ python () {
43 if not (uks_signing_model(d) in "sample", "user"): 31 if not (uks_signing_model(d) in "sample", "user"):
44 return 32 return
45 33
46 pn = d.getVar('PN', True) + '-system-trusted-privkey'
47 d.setVar('PACKAGES_prepend', pn + ' ')
48 d.setVar('FILES_' + pn, d.getVar('SYSTEM_PRIV_KEY', True))
49 d.setVar('CONFFILES_' + pn, d.getVar('SYSTEM_PRIV_KEY', True))
50
51 pn = d.getVar('PN', True) + '-secondary-trusted-privkey'
52 d.setVar('PACKAGES_prepend', pn + ' ')
53 d.setVar('FILES_' + pn, d.getVar('SECONDARY_TRUSTED_PRIV_KEY', True))
54 d.setVar('CONFFILES_' + pn, d.getVar('SECONDARY_TRUSTED_PRIV_KEY', True))
55
56 pn = d.getVar('PN', True) + '-modsign-privkey'
57 d.setVar('PACKAGES_prepend', pn + ' ')
58 d.setVar('FILES_' + pn, d.getVar('MODSIGN_PRIV_KEY', True))
59 d.setVar('CONFFILES_' + pn, d.getVar('MODSIGN_PRIV_KEY', True))
60
61 pn = d.getVar('PN', True) + '-ima-privkey'
62 d.setVar('PACKAGES_prepend', pn + ' ')
63 d.setVar('FILES_' + pn, d.getVar('IMA_PRIV_KEY', True))
64 d.setVar('CONFFILES_' + pn, d.getVar('IMA_PRIV_KEY', True))
65
66 pn = d.getVar('PN', True) + '-rpm-pubkey' 34 pn = d.getVar('PN', True) + '-rpm-pubkey'
67 d.setVar('PACKAGES_prepend', pn + ' ') 35 d.setVar('PACKAGES_prepend', pn + ' ')
68 d.setVar('FILES_' + pn, d.getVar('RPM_KEY_DIR', True) + '/RPM-GPG-KEY-' + d.getVar('RPM_GPG_NAME', True)) 36 d.setVar('FILES_' + pn, d.getVar('RPM_KEY_DIR', True) + '/RPM-GPG-KEY-' + d.getVar('RPM_GPG_NAME', True))
@@ -93,36 +61,18 @@ do_install() {
93 key_dir="${@uks_system_trusted_keys_dir(d)}" 61 key_dir="${@uks_system_trusted_keys_dir(d)}"
94 install -m 0644 "$key_dir/system_trusted_key.crt" "${D}${SYSTEM_CERT}" 62 install -m 0644 "$key_dir/system_trusted_key.crt" "${D}${SYSTEM_CERT}"
95 63
96 if [ "${@uks_signing_model(d)}" = "sample" -o "${@uks_signing_model(d)}" = "user" ]; then
97 install -m 0400 "$key_dir/system_trusted_key.key" "${D}${SYSTEM_PRIV_KEY}"
98 fi
99
100 key_dir="${@uks_secondary_trusted_keys_dir(d)}" 64 key_dir="${@uks_secondary_trusted_keys_dir(d)}"
101 install -m 0644 "$key_dir/secondary_trusted_key.crt" \ 65 install -m 0644 "$key_dir/secondary_trusted_key.crt" \
102 "${D}${SECONDARY_TRUSTED_CERT}" 66 "${D}${SECONDARY_TRUSTED_CERT}"
103 openssl x509 -inform PEM -outform DER -in "${D}${SECONDARY_TRUSTED_CERT}" \ 67 openssl x509 -inform PEM -outform DER -in "${D}${SECONDARY_TRUSTED_CERT}" \
104 -out "${D}${SECONDARY_TRUSTED_DER_ENC_CERT}" 68 -out "${D}${SECONDARY_TRUSTED_DER_ENC_CERT}"
105 69
106 if [ "${@uks_signing_model(d)}" = "sample" -o "${@uks_signing_model(d)}" = "user" ]; then
107 install -m 0400 "$key_dir/secondary_trusted_key.key" \
108 "${D}${SECONDARY_TRUSTED_PRIV_KEY}"
109 fi
110
111 key_dir="${@uks_modsign_keys_dir(d)}" 70 key_dir="${@uks_modsign_keys_dir(d)}"
112 install -m 0644 "$key_dir/modsign_key.crt" \ 71 install -m 0644 "$key_dir/modsign_key.crt" \
113 "${D}${MODSIGN_CERT}" 72 "${D}${MODSIGN_CERT}"
114 73
115 if [ "${@uks_signing_model(d)}" = "sample" -o "${@uks_signing_model(d)}" = "user" ]; then
116 install -m 0400 "$key_dir/modsign_key.key" \
117 "${D}${MODSIGN_PRIV_KEY}"
118 fi
119
120 key_dir="${@uks_ima_keys_dir(d)}" 74 key_dir="${@uks_ima_keys_dir(d)}"
121 install -m 0644 "$key_dir/x509_ima.der" "${D}${IMA_CERT}" 75 install -m 0644 "$key_dir/x509_ima.der" "${D}${IMA_CERT}"
122
123 if [ "${@uks_signing_model(d)}" = "sample" -o "${@uks_signing_model(d)}" = "user" ]; then
124 install -m 0400 "$key_dir/x509_ima.key" "${D}${IMA_PRIV_KEY}"
125 fi
126} 76}
127 77
128do_install[prefuncs] += "check_deploy_keys" 78do_install[prefuncs] += "check_deploy_keys"
@@ -158,10 +108,6 @@ PACKAGES = "\
158 108
159# Note any private key is not available if user key signing model used. 109# Note any private key is not available if user key signing model used.
160PACKAGES_DYNAMIC = "\ 110PACKAGES_DYNAMIC = "\
161 ${PN}-system-trusted-privkey \
162 ${PN}-secondary-trusted-privkey \
163 ${PN}-modsign-privkey \
164 ${PN}-ima-privkey \
165 ${PN}-rpm-pubkey \ 111 ${PN}-rpm-pubkey \
166" 112"
167 113