[PATCH] KEYS: revert requiring signature "encoding"
Mimi Zohar
zohar at linux.ibm.com
Fri Nov 9 14:14:35 UTC 2018
On Fri, 2018-11-09 at 13:16 +0000, David Howells wrote:
> Mimi Zohar <zohar at linux.ibm.com> wrote:
>
> > Attempting to verify IMA signatures fail causing the system to hang.
>
> Can you say why?
On systems with IMA-appraisal enabled with a policy requiring file
signatures, the "good" signature values are stored on the filesystem
as extended attributes (security.ima). Signature verification failure
would normally be limited to just a particular file (eg. executable),
but during boot signature verification failure could result in a
system hang.
Removing existing signature formats breaks existing systems. This
patch adds support for RSA signatures without an explicit "pkcs1" sig-
>encoding.
>
> > Fixes: commit 82f94f24475c ("KEYS: Provide software public key query
> > function [ver #2]")
>
> Btw, no word "commit" after Fixes:.
Ok.
Looking the patch over again, do you prefer the duplicate call or
defining a local variable and using the ternary conditional operator
("?:") like this:
bool rsa = false;
if (!(sig->encoding) && strcmp(pkey->pkey_algo, "rsa") == 0)
rsa = true;
ret = software_key_determine_akcipher(rsa ? "pkcs1" : sig->encoding,
sig->hash_algo,
pkey, alg_name);
Mimi
More information about the Linux-security-module-archive
mailing list