summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
-rw-r--r--meta-signing-key/classes/user-key-store.bbclass28
-rw-r--r--meta-signing-key/conf/layer.conf6
-rw-r--r--meta-signing-key/files/secondary_trusted_keys/secondary_trusted_key.crt (renamed from meta-signing-key/files/extra_system_trusted_keys/extra_system_trusted_key.crt)0
-rw-r--r--meta-signing-key/files/secondary_trusted_keys/secondary_trusted_key.key (renamed from meta-signing-key/files/extra_system_trusted_keys/extra_system_trusted_key.key)0
-rw-r--r--meta-signing-key/recipes-support/key-store/key-store_0.1.bb32
-rwxr-xr-xmeta-signing-key/scripts/create-user-key-store.sh12
6 files changed, 39 insertions, 39 deletions
diff --git a/meta-signing-key/classes/user-key-store.bbclass b/meta-signing-key/classes/user-key-store.bbclass
index 03e1b2c..a0cecab 100644
--- a/meta-signing-key/classes/user-key-store.bbclass
+++ b/meta-signing-key/classes/user-key-store.bbclass
@@ -12,7 +12,7 @@ MOK_SB = '${@bb.utils.contains("DISTRO_FEATURES", "efi-secure-boot", "1", "0", d
12MODSIGN = '${@bb.utils.contains("DISTRO_FEATURES", "modsign", "1", "0", d)}' 12MODSIGN = '${@bb.utils.contains("DISTRO_FEATURES", "modsign", "1", "0", d)}'
13IMA = '${@bb.utils.contains("DISTRO_FEATURES", "ima", "1", "0", d)}' 13IMA = '${@bb.utils.contains("DISTRO_FEATURES", "ima", "1", "0", d)}'
14SYSTEM_TRUSTED = '${@"1" if d.getVar("IMA", True) or d.getVar("MODSIGN", True) else "0"}' 14SYSTEM_TRUSTED = '${@"1" if d.getVar("IMA", True) or d.getVar("MODSIGN", True) else "0"}'
15EXTRA_SYSTEM_TRUSTED = '${@"1" if d.getVar("SYSTEM_TRUSTED", True) else "0"}' 15SECONDARY_TRUSTED = '${@"1" if d.getVar("SYSTEM_TRUSTED", True) else "0"}'
16RPM = '1' 16RPM = '1'
17 17
18def vprint(str, d): 18def vprint(str, d):
@@ -26,9 +26,9 @@ def uks_system_trusted_keys_dir(d):
26 set_keys_dir('SYSTEM_TRUSTED', d) 26 set_keys_dir('SYSTEM_TRUSTED', d)
27 return d.getVar('SYSTEM_TRUSTED_KEYS_DIR', True) + '/' 27 return d.getVar('SYSTEM_TRUSTED_KEYS_DIR', True) + '/'
28 28
29def uks_extra_system_trusted_keys_dir(d): 29def uks_secondary_trusted_keys_dir(d):
30 set_keys_dir('EXTRA_SYSTEM_TRUSTED', d) 30 set_keys_dir('SECONDARY_TRUSTED', d)
31 return d.getVar('EXTRA_SYSTEM_TRUSTED_KEYS_DIR', True) + '/' 31 return d.getVar('SECONDARY_TRUSTED_KEYS_DIR', True) + '/'
32 32
33def uks_modsign_keys_dir(d): 33def uks_modsign_keys_dir(d):
34 set_keys_dir('MODSIGN', d) 34 set_keys_dir('MODSIGN', d)
@@ -173,10 +173,10 @@ def check_system_trusted_keys(d):
173 vprint("%s.crt is unavailable" % _, d) 173 vprint("%s.crt is unavailable" % _, d)
174 return False 174 return False
175 175
176def check_extra_system_trusted_keys(d): 176def check_secondary_trusted_keys(d):
177 dir = uks_extra_system_trusted_keys_dir(d) 177 dir = uks_secondary_trusted_keys_dir(d)
178 178
179 _ = 'extra_system_trusted_key' 179 _ = 'secondary_trusted_key'
180 if not os.path.exists(dir + _ + '.key'): 180 if not os.path.exists(dir + _ + '.key'):
181 vprint("%s.key is unavailable" % _, d) 181 vprint("%s.key is unavailable" % _, d)
182 return False 182 return False
@@ -379,13 +379,13 @@ deploy_system_trusted_keys() {
379 fi 379 fi
380} 380}
381 381
382deploy_extra_system_trusted_keys() { 382deploy_secondary_trusted_keys() {
383 local deploy_dir="${DEPLOY_KEYS_DIR}/extra_system_trusted_keys" 383 local deploy_dir="${DEPLOY_KEYS_DIR}/secondary_trusted_keys"
384 384
385 if [ x"${EXTRA_SYSTEM_TRUSTED_KEYS_DIR}" != x"$deploy_dir" ]; then 385 if [ x"${SECONDARY_TRUSTED_KEYS_DIR}" != x"$deploy_dir" ]; then
386 install -d "$deploy_dir" 386 install -d "$deploy_dir"
387 387
388 cp -af "${EXTRA_SYSTEM_TRUSTED_KEYS_DIR}"/* "$deploy_dir" 388 cp -af "${SECONDARY_TRUSTED_KEYS_DIR}"/* "$deploy_dir"
389 fi 389 fi
390} 390}
391 391
@@ -413,8 +413,8 @@ def sanity_check_user_keys(name, may_exit, d):
413 _ = check_ima_user_keys(d) 413 _ = check_ima_user_keys(d)
414 elif name == 'SYSTEM_TRUSTED': 414 elif name == 'SYSTEM_TRUSTED':
415 _ = check_system_trusted_keys(d) 415 _ = check_system_trusted_keys(d)
416 elif name == 'EXTRA_SYSTEM_TRUSTED': 416 elif name == 'SECONDARY_TRUSTED':
417 _ = check_extra_system_trusted_keys(d) 417 _ = check_secondary_trusted_keys(d)
418 elif name == 'MODSIGN': 418 elif name == 'MODSIGN':
419 _ = check_modsign_keys(d) 419 _ = check_modsign_keys(d)
420 elif name == 'RPM': 420 elif name == 'RPM':
@@ -440,7 +440,7 @@ def set_keys_dir(name, d):
440 d.setVar(name + '_KEYS_DIR', d.getVar('DEPLOY_DIR_IMAGE', True) + '/user-keys/' + name.lower() + '_keys') 440 d.setVar(name + '_KEYS_DIR', d.getVar('DEPLOY_DIR_IMAGE', True) + '/user-keys/' + name.lower() + '_keys')
441 441
442python check_deploy_keys() { 442python check_deploy_keys() {
443 for _ in ('UEFI_SB', 'MOK_SB', 'IMA', 'SYSTEM_TRUSTED', 'EXTRA_SYSTEM_TRUSTED', 'MODSIGN', 'RPM'): 443 for _ in ('UEFI_SB', 'MOK_SB', 'IMA', 'SYSTEM_TRUSTED', 'SECONDARY_TRUSTED', 'MODSIGN', 'RPM'):
444 if d.getVar(_, True) != "1": 444 if d.getVar(_, True) != "1":
445 continue 445 continue
446 446
diff --git a/meta-signing-key/conf/layer.conf b/meta-signing-key/conf/layer.conf
index 939f71a..e067f6b 100644
--- a/meta-signing-key/conf/layer.conf
+++ b/meta-signing-key/conf/layer.conf
@@ -17,7 +17,7 @@ SIGNING_MODEL ??= "sample"
17SAMPLE_MOK_SB_KEYS_DIR = "${LAYERDIR}/files/mok_sb_keys" 17SAMPLE_MOK_SB_KEYS_DIR = "${LAYERDIR}/files/mok_sb_keys"
18SAMPLE_UEFI_SB_KEYS_DIR = "${LAYERDIR}/files/uefi_sb_keys" 18SAMPLE_UEFI_SB_KEYS_DIR = "${LAYERDIR}/files/uefi_sb_keys"
19SAMPLE_SYSTEM_TRUSTED_KEYS_DIR = "${LAYERDIR}/files/system_trusted_keys" 19SAMPLE_SYSTEM_TRUSTED_KEYS_DIR = "${LAYERDIR}/files/system_trusted_keys"
20SAMPLE_EXTRA_SYSTEM_TRUSTED_KEYS_DIR = "${LAYERDIR}/files/extra_system_trusted_keys" 20SAMPLE_SECONDARY_TRUSTED_KEYS_DIR = "${LAYERDIR}/files/secondary_trusted_keys"
21SAMPLE_MODSIGN_KEYS_DIR = "${LAYERDIR}/files/modsign_keys" 21SAMPLE_MODSIGN_KEYS_DIR = "${LAYERDIR}/files/modsign_keys"
22SAMPLE_IMA_KEYS_DIR = "${LAYERDIR}/files/ima_keys" 22SAMPLE_IMA_KEYS_DIR = "${LAYERDIR}/files/ima_keys"
23SAMPLE_RPM_KEYS_DIR = "${LAYERDIR}/files/rpm_keys" 23SAMPLE_RPM_KEYS_DIR = "${LAYERDIR}/files/rpm_keys"
@@ -33,7 +33,7 @@ EV_CERT ??= "${LAYERDIR}/files/mok_sb_keys/wosign_ev_cert.crt"
33MOK_SB_KEYS_DIR ??= "${SAMPLE_MOK_SB_KEYS_DIR}" 33MOK_SB_KEYS_DIR ??= "${SAMPLE_MOK_SB_KEYS_DIR}"
34UEFI_SB_KEYS_DIR ??= "${SAMPLE_UEFI_SB_KEYS_DIR}" 34UEFI_SB_KEYS_DIR ??= "${SAMPLE_UEFI_SB_KEYS_DIR}"
35SYSTEM_TRUSTED_KEYS_DIR ??= "${SAMPLE_SYSTEM_TRUSTED_KEYS_DIR}" 35SYSTEM_TRUSTED_KEYS_DIR ??= "${SAMPLE_SYSTEM_TRUSTED_KEYS_DIR}"
36EXTRA_SYSTEM_TRUSTED_KEYS_DIR ??= "${SAMPLE_EXTRA_SYSTEM_TRUSTED_KEYS_DIR}" 36SECONDARY_TRUSTED_KEYS_DIR ??= "${SAMPLE_SECONDARY_TRUSTED_KEYS_DIR}"
37MODSIGN_KEYS_DIR ??= "${SAMPLE_MODSIGN_KEYS_DIR}" 37MODSIGN_KEYS_DIR ??= "${SAMPLE_MODSIGN_KEYS_DIR}"
38IMA_KEYS_DIR ??= "${SAMPLE_IMA_KEYS_DIR}" 38IMA_KEYS_DIR ??= "${SAMPLE_IMA_KEYS_DIR}"
39RPM_KEYS_DIR ??= "${SAMPLE_RPM_KEYS_DIR}" 39RPM_KEYS_DIR ??= "${SAMPLE_RPM_KEYS_DIR}"
@@ -50,7 +50,7 @@ RPM_GPG_PASSPHRASE ?= "SecureCore"
50 50
51BB_HASHBASE_WHITELIST_append += "\ 51BB_HASHBASE_WHITELIST_append += "\
52 SYSTEM_TRUSTED_KEYS_DIR \ 52 SYSTEM_TRUSTED_KEYS_DIR \
53 EXTRA_SYSTEM_TRUSTED_KEYS_DIR \ 53 SECONDARY_TRUSTED_KEYS_DIR \
54 MODSIGN_KEYS_DIR \ 54 MODSIGN_KEYS_DIR \
55 IMA_KEYS_DIR \ 55 IMA_KEYS_DIR \
56 RPM_KEYS_DIR \ 56 RPM_KEYS_DIR \
diff --git a/meta-signing-key/files/extra_system_trusted_keys/extra_system_trusted_key.crt b/meta-signing-key/files/secondary_trusted_keys/secondary_trusted_key.crt
index b7c3493..b7c3493 100644
--- a/meta-signing-key/files/extra_system_trusted_keys/extra_system_trusted_key.crt
+++ b/meta-signing-key/files/secondary_trusted_keys/secondary_trusted_key.crt
diff --git a/meta-signing-key/files/extra_system_trusted_keys/extra_system_trusted_key.key b/meta-signing-key/files/secondary_trusted_keys/secondary_trusted_key.key
index 0bf56cf..0bf56cf 100644
--- a/meta-signing-key/files/extra_system_trusted_keys/extra_system_trusted_key.key
+++ b/meta-signing-key/files/secondary_trusted_keys/secondary_trusted_key.key
diff --git a/meta-signing-key/recipes-support/key-store/key-store_0.1.bb b/meta-signing-key/recipes-support/key-store/key-store_0.1.bb
index 8dd9637..66691cc 100644
--- a/meta-signing-key/recipes-support/key-store/key-store_0.1.bb
+++ b/meta-signing-key/recipes-support/key-store/key-store_0.1.bb
@@ -17,8 +17,8 @@ RPM_KEY_DIR = "${sysconfdir}/pki/rpm-gpg"
17# For ${PN}-system-trusted-privkey 17# For ${PN}-system-trusted-privkey
18SYSTEM_PRIV_KEY = "${KEY_DIR}/system_trusted_key.key" 18SYSTEM_PRIV_KEY = "${KEY_DIR}/system_trusted_key.key"
19 19
20# For ${PN}-extra-system-trusted-privkey 20# For ${PN}-secondary-trusted-privkey
21EXTRA_SYSTEM_PRIV_KEY = "${KEY_DIR}/extra_system_trusted_key.key" 21SECONDARY_TRUSTED_PRIV_KEY = "${KEY_DIR}/secondary_trusted_key.key"
22 22
23# For ${PN}-modsign-privkey 23# For ${PN}-modsign-privkey
24MODSIGN_PRIV_KEY = "${KEY_DIR}/modsign_key.key" 24MODSIGN_PRIV_KEY = "${KEY_DIR}/modsign_key.key"
@@ -29,8 +29,8 @@ IMA_PRIV_KEY = "${KEY_DIR}/privkey_evm.crt"
29# For ${PN}-system-trusted-cert 29# For ${PN}-system-trusted-cert
30SYSTEM_CERT = "${KEY_DIR}/system_trusted_key.crt" 30SYSTEM_CERT = "${KEY_DIR}/system_trusted_key.crt"
31 31
32# For ${PN}-extra-system-trusted-cert 32# For ${PN}-secondary-trusted-cert
33EXTRA_SYSTEM_CERT = "${KEY_DIR}/extra_system_trusted_key.crt" 33SECONDARY_TRUSTED_CERT = "${KEY_DIR}/secondary_trusted_key.crt"
34 34
35# For ${PN}-modsign-cert 35# For ${PN}-modsign-cert
36MODSIGN_CERT = "${KEY_DIR}/modsign_key.crt" 36MODSIGN_CERT = "${KEY_DIR}/modsign_key.crt"
@@ -47,10 +47,10 @@ python () {
47 d.setVar('FILES_' + pn, d.getVar('SYSTEM_PRIV_KEY', True)) 47 d.setVar('FILES_' + pn, d.getVar('SYSTEM_PRIV_KEY', True))
48 d.setVar('CONFFILES_' + pn, d.getVar('SYSTEM_PRIV_KEY', True)) 48 d.setVar('CONFFILES_' + pn, d.getVar('SYSTEM_PRIV_KEY', True))
49 49
50 pn = d.getVar('PN', True) + '-extra-system-trusted-privkey' 50 pn = d.getVar('PN', True) + '-secondary-trusted-privkey'
51 d.setVar('PACKAGES_prepend', pn + ' ') 51 d.setVar('PACKAGES_prepend', pn + ' ')
52 d.setVar('FILES_' + pn, d.getVar('EXTRA_SYSTEM_PRIV_KEY', True)) 52 d.setVar('FILES_' + pn, d.getVar('SECONDARY_TRUSTED_PRIV_KEY', True))
53 d.setVar('CONFFILES_' + pn, d.getVar('EXTRA_SYSTEM_PRIV_KEY', True)) 53 d.setVar('CONFFILES_' + pn, d.getVar('SECONDARY_TRUSTED_PRIV_KEY', True))
54 54
55 pn = d.getVar('PN', True) + '-modsign-privkey' 55 pn = d.getVar('PN', True) + '-modsign-privkey'
56 d.setVar('PACKAGES_prepend', pn + ' ') 56 d.setVar('PACKAGES_prepend', pn + ' ')
@@ -96,13 +96,13 @@ do_install() {
96 install -m 0400 "$key_dir/system_trusted_key.key" "${D}${SYSTEM_PRIV_KEY}" 96 install -m 0400 "$key_dir/system_trusted_key.key" "${D}${SYSTEM_PRIV_KEY}"
97 fi 97 fi
98 98
99 key_dir="${@uks_extra_system_trusted_keys_dir(d)}" 99 key_dir="${@uks_secondary_trusted_keys_dir(d)}"
100 install -m 0644 "$key_dir/extra_system_trusted_key.crt" \ 100 install -m 0644 "$key_dir/secondary_trusted_key.crt" \
101 "${D}${EXTRA_SYSTEM_CERT}" 101 "${D}${SECONDARY_TRUSTED_CERT}"
102 102
103 if [ "${@uks_signing_model(d)}" = "sample" -o "${@uks_signing_model(d)}" = "user" ]; then 103 if [ "${@uks_signing_model(d)}" = "sample" -o "${@uks_signing_model(d)}" = "user" ]; then
104 install -m 0400 "$key_dir/extra_system_trusted_key.key" \ 104 install -m 0400 "$key_dir/secondary_trusted_key.key" \
105 "${D}${EXTRA_SYSTEM_PRIV_KEY}" 105 "${D}${SECONDARY_TRUSTED_PRIV_KEY}"
106 fi 106 fi
107 107
108 key_dir="${@uks_modsign_keys_dir(d)}" 108 key_dir="${@uks_modsign_keys_dir(d)}"
@@ -150,7 +150,7 @@ pkg_postinst_${PN}-rpm-pubkey() {
150 150
151PACKAGES = "\ 151PACKAGES = "\
152 ${PN}-system-trusted-cert \ 152 ${PN}-system-trusted-cert \
153 ${PN}-extra-system-trusted-cert \ 153 ${PN}-secondary-trusted-cert \
154 ${PN}-modsign-cert \ 154 ${PN}-modsign-cert \
155 ${PN}-ima-cert \ 155 ${PN}-ima-cert \
156" 156"
@@ -158,7 +158,7 @@ PACKAGES = "\
158# Note any private key is not available if user key signing model used. 158# Note any private key is not available if user key signing model used.
159PACKAGES_DYNAMIC = "\ 159PACKAGES_DYNAMIC = "\
160 ${PN}-system-trusted-privkey \ 160 ${PN}-system-trusted-privkey \
161 ${PN}-extra-system-trusted-privkey \ 161 ${PN}-secondary-trusted-privkey \
162 ${PN}-modsign-privkey \ 162 ${PN}-modsign-privkey \
163 ${PN}-ima-privkey \ 163 ${PN}-ima-privkey \
164 ${PN}-rpm-pubkey \ 164 ${PN}-rpm-pubkey \
@@ -167,8 +167,8 @@ PACKAGES_DYNAMIC = "\
167FILES_${PN}-system-trusted-cert = "${SYSTEM_CERT}" 167FILES_${PN}-system-trusted-cert = "${SYSTEM_CERT}"
168CONFFILES_${PN}-system-trusted-cert = "${SYSTEM_CERT}" 168CONFFILES_${PN}-system-trusted-cert = "${SYSTEM_CERT}"
169 169
170FILES_${PN}-extra-system-trusted-cert = "${EXTRA_SYSTEM_CERT}" 170FILES_${PN}-secondary-trusted-cert = "${SECONDARY_TRUSTED_CERT}"
171CONFFILES_${PN}-extra-system-trusted-cert = "${EXTRA_SYSTEM_CERT}" 171CONFFILES_${PN}-secondary-trusted-cert = "${SECONDARY_TRUSTED_CERT}"
172 172
173FILES_${PN}-modsign-cert = "${MODSIGN_CERT}" 173FILES_${PN}-modsign-cert = "${MODSIGN_CERT}"
174CONFFILES_${PN}-modsign-cert = "${MODSIGN_CERT}" 174CONFFILES_${PN}-modsign-cert = "${MODSIGN_CERT}"
diff --git a/meta-signing-key/scripts/create-user-key-store.sh b/meta-signing-key/scripts/create-user-key-store.sh
index ddcd31a..eea52df 100755
--- a/meta-signing-key/scripts/create-user-key-store.sh
+++ b/meta-signing-key/scripts/create-user-key-store.sh
@@ -98,7 +98,7 @@ SYSTEM_KEYS_DIR="$KEYS_DIR/system_trusted_keys"
98IMA_KEYS_DIR="$KEYS_DIR/ima_keys" 98IMA_KEYS_DIR="$KEYS_DIR/ima_keys"
99RPM_KEYS_DIR="$KEYS_DIR/rpm_keys" 99RPM_KEYS_DIR="$KEYS_DIR/rpm_keys"
100MODSIGN_KEYS_DIR="$KEYS_DIR/modsign_keys" 100MODSIGN_KEYS_DIR="$KEYS_DIR/modsign_keys"
101EXTRA_SYSTEM_KEYS_DIR="$KEYS_DIR/extra_system_trusted_keys" 101SECONDARY_TRUSTED_KEYS_DIR="$KEYS_DIR/secondary_trusted_keys"
102 102
103pem2der() { 103pem2der() {
104 local src="$1" 104 local src="$1"
@@ -201,12 +201,12 @@ create_modsign_user_key() {
201 "/CN=MODSIGN Certificate/" 201 "/CN=MODSIGN Certificate/"
202} 202}
203 203
204create_extra_system_user_key() { 204create_secondary_user_key() {
205 local key_dir="$EXTRA_SYSTEM_KEYS_DIR" 205 local key_dir="$SECONDARY_TRUSTED_KEYS_DIR"
206 206
207 [ ! -d "$key_dir" ] && mkdir -p "$key_dir" 207 [ ! -d "$key_dir" ] && mkdir -p "$key_dir"
208 208
209 ca_sign "$key_dir" extra_system_trusted_key "$SYSTEM_KEYS_DIR" system_trusted_key \ 209 ca_sign "$key_dir" secondary_trusted_key "$SYSTEM_KEYS_DIR" system_trusted_key \
210 "/CN=Extra System Trusted Certificate/" 210 "/CN=Extra System Trusted Certificate/"
211} 211}
212 212
@@ -297,8 +297,8 @@ create_user_keys() {
297 echo "Creating the user key for system" 297 echo "Creating the user key for system"
298 create_system_user_key 298 create_system_user_key
299 299
300 echo "Creating the user key for system extra" 300 echo "Creating the user key for system secondary trust"
301 create_extra_system_user_key 301 create_secondary_user_key
302 302
303 echo "Creating the user key for modsign" 303 echo "Creating the user key for modsign"
304 create_modsign_user_key 304 create_modsign_user_key