summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorJason Wessel <jason.wessel@windriver.com>2019-08-13 14:50:45 -0700
committerJia Zhang <zhang.jia@linux.alibaba.com>2019-11-08 13:27:23 +0800
commitc0b514f1aca78a84891c3202e3417a8fe98c6ad5 (patch)
tree8fd661366b1c7e4e8b2471f355ec3024eb500984
parent01f67e4c7e4cb33acfa5a7a0c3d634cb6489278a (diff)
downloadmeta-secure-core-c0b514f1aca78a84891c3202e3417a8fe98c6ad5.tar.gz
create-user-key-store.sh: Update for OSTree and ease of use
The create-user-key-store.sh was changed in a number ways to improve the usability with other layers that will consume the key services provided by meta-secure-core. New features: * A safety check was added that keys can only be written to a fresh empty directory. * The script can be run non-iteractively or interactively for the ease of use. * gpg 1.x support and gpg 2.x support work with the passphrases * A keys.conf is generated to allow a single line to be written into the local.conf with all the keys. An interactive session looks like: ================================== ./create-user-key-store.sh -d /tmp/test KEYS_DIR: /tmp/test Enter RPM/OSTree GPG keyname (use dashes instead of spaces) [default: PKG-SecureCore]: PKG-Sample-Man Enter RPM/OSTree GPG e-mail address [default: SecureCore@foo.com]: sample.man@sample.com Enter RPM/OSTREE GPG comment [default: Signing Key]: Sample Signing Key Using boot loader gpg name: BOOT-Sample-Man Using boot loader gpg email: sample.man@sample.com Using boot loader gpg comment: Sample Signing Key Press control-c now if and use -bn -bm -bc arguments if you want different values other than listed above Enter RPM/OSTREE passphrase: abc1234 Enter IMA passphrase: 1234pass Enter boot loader GPG passphrase: bootup Enter boot loader locked configuration password(e.g. grub pw): root MASTER_KEYS_DIR = "/tmp/test" IMA_KEYS_DIR = "${MASTER_KEYS_DIR}/ima_keys" IMA_EVM_KEY_DIR = "${MASTER_KEYS_DIR}/ima_keys" RPM_KEYS_DIR = "${MASTER_KEYS_DIR}/rpm_keys" BOOT_KEYS_DIR = "${MASTER_KEYS_DIR}/boot_keys" MOK_SB_KEYS_DIR = "${MASTER_KEYS_DIR}/mok_sb_keys" SYSTEM_TRUSTED_KEYS_DIR = "${MASTER_KEYS_DIR}/system_trusted_keys" UEFI_SB_KEYS_DIR = "${MASTER_KEYS_DIR}/uefi_sb_keys" GRUB_PUB_KEY = "${MASTER_KEYS_DIR}/boot_keys/boot_pub_key" GRUB_PW_FILE = "${MASTER_KEYS_DIR}/boot_keys/boot_cfg_pw" OSTREE_GPGDIR = "${MASTER_KEYS_DIR}/rpm_keys" RPM_GPG_NAME = "PKG-Sample-Man" RPM_GPG_PASSPHRASE = "abc1234" RPM_FSK_PASSWORD = "1234pass" BOOT_GPG_NAME = "BOOT-Sample-Man" BOOT_GPG_PASSPHRASE = "bootup" OSTREE_GPGID = "PKG-Sample-Man" OSTREE_GPG_PASSPHRASE = "abc1234" OSTREE_GRUB_PW_FILE = "${GRUB_PW_FILE}" [ Issue: LINUXEXEC-2450 ] Signed-off-by: Jason Wessel <jason.wessel@windriver.com>
-rwxr-xr-xmeta-signing-key/scripts/create-user-key-store.sh377
1 files changed, 306 insertions, 71 deletions
diff --git a/meta-signing-key/scripts/create-user-key-store.sh b/meta-signing-key/scripts/create-user-key-store.sh
index eea52df..7d224fc 100755
--- a/meta-signing-key/scripts/create-user-key-store.sh
+++ b/meta-signing-key/scripts/create-user-key-store.sh
@@ -7,6 +7,20 @@ ROOT_DIR="`cd "$_D" && pwd`"
7KEYS_DIR="$ROOT_DIR/user-keys" 7KEYS_DIR="$ROOT_DIR/user-keys"
8GPG_KEYNAME= 8GPG_KEYNAME=
9GPG_EMAIL= 9GPG_EMAIL=
10GPG_COMMENT=
11BOOT_GPG_KEYNAME=
12BOOT_GPG_EMAIL=
13BOOT_GPG_COMMENT=
14EMPTY_PW=0
15GPG_PASS=
16GPG_BIN=${GPG_BIN=gpg}
17IMA_PASS=
18gpg_key_name="PKG-SecureCore"
19gpg_email="SecureCore@foo.com"
20gpg_comment="Signing Key"
21boot_gpg_key_name="BOOT-SecureCore"
22boot_gpg_email="SecureCore@foo.com"
23boot_gpg_comment="Bootloader Signing Key"
10 24
11function show_help() 25function show_help()
12{ 26{
@@ -14,6 +28,7 @@ function show_help()
14$1 - creation tool for user key store 28$1 - creation tool for user key store
15 29
16(C)Copyright 2017, Jia Zhang <lans.zhang2008@gmail.com> 30(C)Copyright 2017, Jia Zhang <lans.zhang2008@gmail.com>
31(C)Copyright 2019, Jason Wessel <jason.wessel@windriver.com> Wind River Systems, Inc.
17 32
18Usage: $1 options... 33Usage: $1 options...
19 34
@@ -21,21 +36,37 @@ Options:
21 -d <dir> 36 -d <dir>
22 Set the path to save the generated user keys. 37 Set the path to save the generated user keys.
23 Default: `pwd`/user-keys 38 Default: `pwd`/user-keys
24 39 -c <gpg key comment>
40 Set the RPM/OStree gpg's key name
41 Default: $gpg_comment
25 -n <gpg key name> 42 -n <gpg key name>
26 Set the gpg's key name 43 Set the RPM/OStree gpg's key name
27 Default: SecureCore 44 Default: $gpg_key_name
28 45 -m <gpg key owner's email address>
29 -m <gpg key ower's email address> 46 Set the RPM/OStree owner's email address of the gpg key
30 Set the ower's email address of the gpg key 47 Default: $gpg_email
31 Default: SecureCore@foo.com 48 -rp <OSTree/RPM GPG passphrase>
32 49 -bgp <Boot Loader GPG passphrase>
33 -h|--help 50 -bp <Boot loader config password>
34 Show this help information. 51 -ip <IMA passphrase>
52 -h|--help Show this help information.
53Overides:
54 -bc <gpg key comment>
55 Force set the gpg key comment for the boot loader
56 -bn <gpg key name>
57 Force set the gpg key name for the boot loader
58 -bm <gpg key owner's email address>
59 Force set the gpg email address for the boot loader
35 60
36EOF 61EOF
37} 62}
38 63
64print_fatal() {
65 printf "\033[1;35m"
66 echo "$@"
67 printf "\033[0m"
68 exit 1
69}
39print_critical() { 70print_critical() {
40 printf "\033[1;35m" 71 printf "\033[1;35m"
41 echo "$@" 72 echo "$@"
@@ -72,19 +103,42 @@ while [ $# -gt 0 ]; do
72 -d) 103 -d)
73 shift && KEYS_DIR="$1" 104 shift && KEYS_DIR="$1"
74 ;; 105 ;;
106 -c)
107 shift && GPG_COMMENT="$1"
108 ;;
109 -bc)
110 shift && BOOT_GPG_COMMENT="$1"
111 ;;
75 -n) 112 -n)
76 shift && GPG_KEYNAME="$1" 113 shift && GPG_KEYNAME="$1"
77 ;; 114 ;;
115 -bn)
116 shift && BOOT_GPG_KEYNAME="$1"
117 ;;
78 -m) 118 -m)
79 shift && GPG_EMAIL="$1" 119 shift && GPG_EMAIL="$1"
80 ;; 120 ;;
121 -bm)
122 shift && BOOT_GPG_EMAIL="$1"
123 ;;
124 -rp)
125 shift && GPG_PASS="$1"
126 ;;
127 -bgp)
128 shift && BOOT_GPG_PASS="$1"
129 ;;
130 -bp)
131 shift && BOOT_PASS="$1"
132 ;;
133 -ip)
134 shift && IMA_PASS="$1"
135 ;;
81 -h|--help) 136 -h|--help)
82 show_help `basename $0` 137 show_help `basename $0`
83 exit 0 138 exit 0
84 ;; 139 ;;
85 *) 140 *)
86 echo "Unsupported option $opt" 141 print_fatal "Unsupported option $opt"
87 exit 1
88 ;; 142 ;;
89 esac 143 esac
90 shift 144 shift
@@ -97,6 +151,7 @@ MOK_SB_KEYS_DIR="$KEYS_DIR/mok_sb_keys"
97SYSTEM_KEYS_DIR="$KEYS_DIR/system_trusted_keys" 151SYSTEM_KEYS_DIR="$KEYS_DIR/system_trusted_keys"
98IMA_KEYS_DIR="$KEYS_DIR/ima_keys" 152IMA_KEYS_DIR="$KEYS_DIR/ima_keys"
99RPM_KEYS_DIR="$KEYS_DIR/rpm_keys" 153RPM_KEYS_DIR="$KEYS_DIR/rpm_keys"
154BOOT_KEYS_DIR="$KEYS_DIR/boot_keys"
100MODSIGN_KEYS_DIR="$KEYS_DIR/modsign_keys" 155MODSIGN_KEYS_DIR="$KEYS_DIR/modsign_keys"
101SECONDARY_TRUSTED_KEYS_DIR="$KEYS_DIR/secondary_trusted_keys" 156SECONDARY_TRUSTED_KEYS_DIR="$KEYS_DIR/secondary_trusted_keys"
102 157
@@ -121,22 +176,39 @@ ca_sign() {
121 -sha256 -nodes -days 3650 \ 176 -sha256 -nodes -days 3650 \
122 -subj "$subject" \ 177 -subj "$subject" \
123 -keyout "$key_dir/$key_name.key" \ 178 -keyout "$key_dir/$key_name.key" \
124 -out "$key_dir/$key_name.crt" 179 -out "$key_dir/$key_name.crt" \
180 || print_fatal "openssl failure"
125 else 181 else
126 if [ -z "$encrypted" ]; then 182 if [ -z "$encrypted" ]; then
127 openssl req -new -newkey rsa:2048 \ 183 openssl req -new -newkey rsa:2048 \
128 -sha256 -nodes \ 184 -sha256 -nodes \
129 -subj "$subject" \ 185 -subj "$subject" \
130 -keyout "$key_dir/$key_name.key" \ 186 -keyout "$key_dir/$key_name.key" \
131 -out "$key_dir/$key_name.csr" 187 -out "$key_dir/$key_name.csr" \
188 || print_fatal "openssl failure"
132 else 189 else
133 # Prompt user to type the password 190 # Prompt user to type the password
134 openssl genrsa -des3 -out "$key_dir/$key_name.key" 2048 191 if [ "$IMA_PASS" = "" ] ; then
192 openssl genrsa -des3 -out "$key_dir/$key_name.key" 2048 \
193 || print_fatal "openssl failure"
194
195 openssl req -new -sha256 \
196 -subj "$subject" \
197 -key "$key_dir/$key_name.key" \
198 -out "$key_dir/$key_name.csr" \
199 || print_fatal "openssl failure"
200 else
201 openssl genrsa -des3 -passout "pass:$IMA_PASS" \
202 -out "$key_dir/$key_name.key" 2048 \
203 || print_fatal "openssl failure"
204
205 openssl req -new -sha256 -passin "pass:$IMA_PASS" \
206 -subj "$subject" \
207 -key "$key_dir/$key_name.key" \
208 -out "$key_dir/$key_name.csr" \
209 || print_fatal "openssl failure"
210 fi
135 211
136 openssl req -new -sha256 \
137 -subj "$subject" \
138 -key "$key_dir/$key_name.key" \
139 -out "$key_dir/$key_name.csr"
140 fi 212 fi
141 213
142 local ca_cert="$ca_key_dir/$ca_key_name.crt" 214 local ca_cert="$ca_key_dir/$ca_key_name.crt"
@@ -153,7 +225,8 @@ ca_sign() {
153 -CAkey "$ca_key_dir/$ca_key_name.key" \ 225 -CAkey "$ca_key_dir/$ca_key_name.key" \
154 -set_serial 1 -days 3650 \ 226 -set_serial 1 -days 3650 \
155 -extfile "$ROOT_DIR/openssl.cnf" -extensions v3_req \ 227 -extfile "$ROOT_DIR/openssl.cnf" -extensions v3_req \
156 -out "$key_dir/$key_name.crt" 228 -out "$key_dir/$key_name.crt" \
229 || print_fatal "openssl failure"
157 230
158 rm -f "$key_dir/$key_name.csr" 231 rm -f "$key_dir/$key_name.csr"
159 fi 232 fi
@@ -222,69 +295,74 @@ create_ima_user_key() {
222 rm -f "$key_dir/x509_ima.crt" 295 rm -f "$key_dir/x509_ima.crt"
223} 296}
224 297
225create_rpm_user_key() { 298create_boot_pw_key() {
226 local gpg_ver=`gpg --version | head -1 | awk '{ print $3 }' | awk -F. '{ print $1 }'` 299 local bootprog=`which grub-mkpasswd-pbkdf2`
227 local key_dir="$RPM_KEYS_DIR" 300 if [ "$bootprog" = "" ] ; then
228 301 print_fatal "ERROR could not locate \"grub-mkpasswd-pbkdf2\" please install it or set the path to the host native sysroot"
229 [ ! -d "$key_dir" ] && mkdir -m 0700 -p "$key_dir" 302 fi
230 303 (echo "$BOOT_PASS"; echo "$BOOT_PASS") | $bootprog > $BOOT_KEYS_DIR/boot_cfg_pw.tmp
231 local gpg_key_name="SecureCore" 304 if [ $? != 0 ] ; then
232 local gpg_email="SecureCore@foo.com" 305 print_fatal "ERROR failed to run grub-mkpasswd-mpkdf2 to generate password"
233 306 fi
234 if [ ! -z $GPG_KEYNAME ]; then 307 cat $BOOT_KEYS_DIR/boot_cfg_pw.tmp |grep grub.pbkdf2 |sed -e 's/.*grub.pbkdf2/grub.pbkdf2/' > $BOOT_KEYS_DIR/boot_cfg_pw
235 gpg_key_name=$GPG_KEYNAME 308 rm -f $BOOT_KEYS_DIR/boot_cfg_pw.tmp
236 fi
237
238 if [ ! -z $GPG_EMAIL ]; then
239 gpg_email=$GPG_EMAIL
240 fi
241 309
242 local priv_key="$key_dir/RPM-GPG-PRIVKEY-$gpg_key_name" 310}
243 local pub_key="$key_dir/RPM-GPG-KEY-$gpg_key_name"
244 311
245 if [ "$gpg_ver" == "2" ]; then 312create_gpg_user_key() {
246 gpg --homedir "$key_dir" --quick-generate-key --batch \ 313 local gpg_ver=`$GPG_BIN --version | head -1 | awk '{ print $3 }' | awk -F. '{ print $1 }'`
247 "$gpg_key_name" default default never 314 local key_dir="$1"
248 315
249 gpg --homedir "$key_dir" --export --armor "$gpg_key_name" > "$pub_key" 316 [ ! -d "$key_dir" ] && mkdir -m 0700 -p "$key_dir"
250 317
251 gpg --homedir "$key_dir" --export-secret-keys --armor "$gpg_key_name" > "$priv_key" 318 local priv_key="$key_dir/$2-GPG-PRIVKEY-$3"
319 local pub_key="$key_dir/$2-GPG-KEY-$3"
320 local name_real="$3"
321 local USE_PW="Passphrase: $4"
322 local pw="$4"
323 local comment="$5"
324 local email="$6"
252 325
253 cd "$key_dir" 326 if [ "$gpg_ver" != "1" -a "$gpg_ver" != "2" ]; then
254 rm -rf openpgp-revocs.d private-keys-v1.d pubring.kbx* \ 327 print_fatal "ERROR: GPG Version 1 or 2 are required for key generation and signing"
255 trustdb.gpg 328 fi
256 cd - 329 cat >"$key_dir/gen_keyring" <<EOF
257 else
258 cat >"$key_dir/gen_rpm_keyring" <<EOF
259Key-Type: RSA 330Key-Type: RSA
260Key-Length: 2048 331Key-Length: 4096
261Name-Real: $gpg_key_name 332Name-Real: $name_real
262Name-Comment: RPM Signing Certificate 333Name-Comment: $comment
263Name-Email: $gpg_email 334Name-Email: $email
264Expire-Date: 0 335Expire-Date: 0
265%pubring $pub_key.pub 336$USE_PW
266%secring $priv_key.sec
267%commit 337%commit
268%echo RPM keyring $gpg_key_name created 338%echo keyring $name_real created
269EOF 339EOF
270 340
271 gpg --batch --gen-key "$key_dir/gen_rpm_keyring" 341 pinentry=""
272 342 if [ "$gpg_ver" = "2" ] ; then
273 gpg="gpg --no-default-keyring --secret-keyring \ 343 pinentry="--pinentry-mode=loopback"
274 $priv_key.sec --keyring $pub_key.pub" 344 echo "allow-loopback-pinentry" > $key_dir/gpg-agent.conf
275 345 gpg-connect-agent --homedir "$key_dir" reloadagent /bye
276 $gpg --list-secret-keys 346 fi
347 $GPG_BIN --homedir "$key_dir" --batch --yes --gen-key "$key_dir/gen_keyring"
348 if [ $? != 0 ] ; then
349 print_fatal "Error with keyring generation"
350 fi
277 351
278 print_error "Please type passwd to modify the passphrase, and type quit to exit" 352 $GPG_BIN --homedir "$key_dir" -k
279 353
280 $gpg --edit-key "$gpg_key_name" 354 $GPG_BIN --homedir "$key_dir" --export --armor "$name_real" > "$pub_key" || print_fatal "gpg export failed"
355 if [ "$2" = "BOOT" ] ; then
356 $GPG_BIN --homedir "$key_dir" --export "$name_real" > "$key_dir/boot_pub_key" || print_fatal "gpg export failed"
357 fi
281 358
282 $gpg --export --armor "$gpg_key_name" > "$pub_key" 359 $GPG_BIN --homedir "$key_dir" --export-secret-keys $pinentry --passphrase "$pw" --armor "$3" > "$priv_key" || print_fatal "gpg export failed"
283 $gpg --export-secret-keys --armor "$gpg_key_name" > "$priv_key"
284 360
285 rm -f "$key_dir/gen_rpm_keyring" 361 rm -f "$key_dir/gen_keyring"
286 rm -f "$priv_key.sec" "$pub_key.pub" 362 cd "$key_dir"
287 fi 363 rm -rf openpgp-revocs.d private-keys-v1.d pubring.kbx* \
364 trustdb.gpg* random_seed pubring.gpg* secring.gpg* gpg-agent.conf
365 cd -
288} 366}
289 367
290create_user_keys() { 368create_user_keys() {
@@ -306,9 +384,166 @@ create_user_keys() {
306 echo "Creating the user key for IMA appraisal" 384 echo "Creating the user key for IMA appraisal"
307 create_ima_user_key 385 create_ima_user_key
308 386
309 echo "Creating the user key for RPM" 387 echo "Creating the gpg key for RPM/OSTree"
310 create_rpm_user_key 388 create_gpg_user_key "$RPM_KEYS_DIR" RPM "$gpg_key_name" "$GPG_PASS" "$gpg_comment" "$gpg_email"
389
390 echo "Creating the gpg key for boot loader"
391 create_gpg_user_key "$BOOT_KEYS_DIR" BOOT "$boot_gpg_key_name" "$BOOT_GPG_PASS" "$boot_gpg_comment" "$boot_gpg_email"
392
393 echo "Creating the password salt for boot"
394 create_boot_pw_key
311} 395}
312 396
397if [ -d "$KEYS_DIR" ] ; then
398 print_fatal "ERROR: $KEYS_DIR already exists, please remove it, to allow for the creation of new keys."
399fi
400
401if [ ! -z "$GPG_KEYNAME" ]; then
402 gpg_key_name="$GPG_KEYNAME"
403else
404 echo -n "Enter RPM/OSTree GPG keyname (use dashes instead of spaces) [default: $gpg_key_name]: "
405 read val
406 if [ ! -z "$val" ] ; then
407 gpg_key_name=$val
408 fi
409fi
410
411if [ ! -z "$GPG_EMAIL" ]; then
412 gpg_email=$GPG_EMAIL
413else
414 echo -n "Enter RPM/OSTree GPG e-mail address [default: $gpg_email]: "
415 read val
416 if [ ! -z "$val" ] ; then
417 gpg_email=$val
418 fi
419fi
420
421if [ ! -z "$GPG_COMMENT" ]; then
422 gpg_comment=$GPG_COMMENT
423else
424 echo -n "Enter RPM/OSTREE GPG comment [default: $gpg_comment]: "
425 read val
426 if [ ! -z "$val" ] ; then
427 gpg_comment=$val
428 fi
429fi
430
431boot_gpg_key_name="BOOT-${gpg_key_name#PKG-}"
432boot_gpg_email="$gpg_email"
433boot_gpg_comment="$gpg_comment"
434if [ ! -z "$BOOT_GPG_KEYNAME" ]; then
435 boot_gpg_key_name="$BOOT_GPG_KEYNAME"
436fi
437if [ ! -z "$BOOT_GPG_EMAIL" ]; then
438 boot_gpg_email=$BOOT_GPG_EMAIL
439fi
440if [ ! -z "$BOOT_GPG_COMMENT" ]; then
441 boot_gpg_comment=$BOOT_GPG_COMMENT
442fi
443
444echo " Using boot loader gpg name: $boot_gpg_key_name"
445echo " Using boot loader gpg email: $boot_gpg_email"
446echo " Using boot loader gpg comment: $boot_gpg_comment"
447echo " Press control-c now if and use -bn -bm -bc arguments if you want"
448echo " different values other than listed above"
449
450# Sanity checks on values so far
451
452if [ "$boot_gpg_key_name" = "$gpg_key_name" ] ; then
453 echo "==================================="
454 echo " RPM_GPG_NAME = \"$gpg_key_name\""
455 echo " BOOT_GPG_NAME = \"$boot_gpg_key_name\""
456 print_fatal "ERROR: The gpg key names must be unique"
457fi
458if [ "$boot_gpg_key_name" != "${boot_gpg_key_name/$gpg_key_name/}" ] ; then
459 echo "==================================="
460 echo " RPM_GPG_NAME = \"$gpg_key_name\""
461 echo " BOOT_GPG_NAME = \"$boot_gpg_key_name\""
462 print_fatal "ERROR: The RPM/OSTree gpg key name cannot be a subset of the boot loader gpg key name"
463fi
464if [ "$gpg_key_name" != "${gpg_key_name/$boot_gpg_key_name/}" ] ; then
465 echo "==================================="
466 echo " RPM_GPG_NAME = \"$gpg_key_name\""
467 echo " BOOT_GPG_NAME = \"$boot_gpg_key_name\""
468 print_fatal "ERROR: The boot loader gpg key name cannot be a subset of the RPM/OSTREE gpg key name"
469fi
470
471# Passwor section next
472if [ -z $GPG_PASS ]; then
473 while [ 1 ] ; do
474 echo -n "Enter RPM/OSTREE passphrase: "
475 read val
476 if [ ! -z "$val" ] ; then
477 GPG_PASS=$val
478 break
479 fi
480 done
481fi
482if [ -z $IMA_PASS ]; then
483 while [ 1 ] ; do
484 echo -n "Enter IMA passphrase: "
485 read val
486 if [ ! -z "$val" ] ; then
487 IMA_PASS=$val
488 break
489 fi
490 done
491fi
492if [ -z $BOOT_GPG_PASS ]; then
493 while [ 1 ] ; do
494 echo -n "Enter boot loader GPG passphrase: "
495 read val
496 if [ ! -z "$val" ] ; then
497 BOOT_GPG_PASS=$val
498 break
499 fi
500 done
501fi
502if [ -z $BOOT_PASS ]; then
503 while [ 1 ] ; do
504 echo -n "Enter boot loader locked configuration password(e.g. grub pw): "
505 read val
506 if [ ! -z "$val" ] ; then
507 BOOT_PASS=$val
508 break
509 fi
510 done
511fi
512
313create_user_keys 513create_user_keys
314 514
515cat <<EOF>$KEYS_DIR/keys.conf
516MASTER_KEYS_DIR = "$(readlink -f $KEYS_DIR)"
517
518IMA_KEYS_DIR = "\${MASTER_KEYS_DIR}/ima_keys"
519IMA_EVM_KEY_DIR = "\${MASTER_KEYS_DIR}/ima_keys"
520RPM_KEYS_DIR = "\${MASTER_KEYS_DIR}/rpm_keys"
521BOOT_KEYS_DIR = "\${MASTER_KEYS_DIR}/boot_keys"
522MOK_SB_KEYS_DIR = "\${MASTER_KEYS_DIR}/mok_sb_keys"
523SYSTEM_TRUSTED_KEYS_DIR = "\${MASTER_KEYS_DIR}/system_trusted_keys"
524UEFI_SB_KEYS_DIR = "\${MASTER_KEYS_DIR}/uefi_sb_keys"
525GRUB_PUB_KEY = "\${MASTER_KEYS_DIR}/boot_keys/boot_pub_key"
526GRUB_PW_FILE = "\${MASTER_KEYS_DIR}/boot_keys/boot_cfg_pw"
527OSTREE_GPGDIR = "\${MASTER_KEYS_DIR}/rpm_keys"
528
529RPM_GPG_NAME = "$gpg_key_name"
530RPM_GPG_PASSPHRASE = "$GPG_PASS"
531RPM_FSK_PASSWORD = "$IMA_PASS"
532BOOT_GPG_NAME = "$boot_gpg_key_name"
533BOOT_GPG_PASSPHRASE = "$BOOT_GPG_PASS"
534OSTREE_GPGID = "$gpg_key_name"
535OSTREE_GPG_PASSPHRASE = "$GPG_PASS"
536OSTREE_GRUB_PW_FILE = "\${GRUB_PW_FILE}"
537EOF
538
539cat<<EOF
540## The following variables need to be entered into your local.conf
541## in order to use the new signing keys:
542
543$(cat $KEYS_DIR/keys.conf)
544
545## Please save the values above to your local.conf
546## Or copy and uncomment the following line:
547# require $(readlink -f $KEYS_DIR/keys.conf)
548EOF
549