~ [ source navigation ] ~ [ diff markup ] ~ [ identifier search ] ~

TOMOYO Linux Cross Reference
Linux/certs/Makefile

Version: ~ [ linux-6.11.5 ] ~ [ linux-6.10.14 ] ~ [ linux-6.9.12 ] ~ [ linux-6.8.12 ] ~ [ linux-6.7.12 ] ~ [ linux-6.6.58 ] ~ [ linux-6.5.13 ] ~ [ linux-6.4.16 ] ~ [ linux-6.3.13 ] ~ [ linux-6.2.16 ] ~ [ linux-6.1.114 ] ~ [ linux-6.0.19 ] ~ [ linux-5.19.17 ] ~ [ linux-5.18.19 ] ~ [ linux-5.17.15 ] ~ [ linux-5.16.20 ] ~ [ linux-5.15.169 ] ~ [ linux-5.14.21 ] ~ [ linux-5.13.19 ] ~ [ linux-5.12.19 ] ~ [ linux-5.11.22 ] ~ [ linux-5.10.228 ] ~ [ linux-5.9.16 ] ~ [ linux-5.8.18 ] ~ [ linux-5.7.19 ] ~ [ linux-5.6.19 ] ~ [ linux-5.5.19 ] ~ [ linux-5.4.284 ] ~ [ linux-5.3.18 ] ~ [ linux-5.2.21 ] ~ [ linux-5.1.21 ] ~ [ linux-5.0.21 ] ~ [ linux-4.20.17 ] ~ [ linux-4.19.322 ] ~ [ linux-4.18.20 ] ~ [ linux-4.17.19 ] ~ [ linux-4.16.18 ] ~ [ linux-4.15.18 ] ~ [ linux-4.14.336 ] ~ [ linux-4.13.16 ] ~ [ linux-4.12.14 ] ~ [ linux-4.11.12 ] ~ [ linux-4.10.17 ] ~ [ linux-4.9.337 ] ~ [ linux-4.4.302 ] ~ [ linux-3.10.108 ] ~ [ linux-2.6.32.71 ] ~ [ linux-2.6.0 ] ~ [ linux-2.4.37.11 ] ~ [ unix-v6-master ] ~ [ ccs-tools-1.8.9 ] ~ [ policy-sample ] ~
Architecture: ~ [ i386 ] ~ [ alpha ] ~ [ m68k ] ~ [ mips ] ~ [ ppc ] ~ [ sparc ] ~ [ sparc64 ] ~

Diff markup

Differences between /certs/Makefile (Version linux-6.11.5) and /certs/Makefile (Version linux-5.13.19)


  1 # SPDX-License-Identifier: GPL-2.0                  1 # SPDX-License-Identifier: GPL-2.0
  2 #                                                   2 #
  3 # Makefile for the linux kernel signature chec      3 # Makefile for the linux kernel signature checking certificates.
  4 #                                                   4 #
  5                                                     5 
  6 obj-$(CONFIG_SYSTEM_TRUSTED_KEYRING) += system !!   6 obj-$(CONFIG_SYSTEM_TRUSTED_KEYRING) += system_keyring.o system_certificates.o common.o
  7 obj-$(CONFIG_SYSTEM_BLACKLIST_KEYRING) += blac !!   7 obj-$(CONFIG_SYSTEM_BLACKLIST_KEYRING) += blacklist.o common.o
  8 obj-$(CONFIG_SYSTEM_REVOCATION_LIST) += revoca      8 obj-$(CONFIG_SYSTEM_REVOCATION_LIST) += revocation_certificates.o
                                                   >>   9 ifneq ($(CONFIG_SYSTEM_BLACKLIST_HASH_LIST),"")
                                                   >>  10 obj-$(CONFIG_SYSTEM_BLACKLIST_KEYRING) += blacklist_hashes.o
                                                   >>  11 else
                                                   >>  12 obj-$(CONFIG_SYSTEM_BLACKLIST_KEYRING) += blacklist_nohashes.o
                                                   >>  13 endif
  9                                                    14 
 10 $(obj)/blacklist_hashes.o: $(obj)/blacklist_ha !!  15 ifeq ($(CONFIG_SYSTEM_TRUSTED_KEYRING),y)
 11 CFLAGS_blacklist_hashes.o := -I $(obj)         << 
 12                                                    16 
 13 quiet_cmd_check_and_copy_blacklist_hash_list = !!  17 $(eval $(call config_filename,SYSTEM_TRUSTED_KEYS))
 14       cmd_check_and_copy_blacklist_hash_list = << 
 15         $(if $(CONFIG_SYSTEM_BLACKLIST_HASH_LI << 
 16         $(AWK) -f $(src)/check-blacklist-hashe << 
 17         { cat $(CONFIG_SYSTEM_BLACKLIST_HASH_L << 
 18         echo NULL > $@)                        << 
 19                                                << 
 20 $(obj)/blacklist_hash_list: $(CONFIG_SYSTEM_BL << 
 21         $(call if_changed,check_and_copy_black << 
 22                                                << 
 23 targets += blacklist_hash_list                 << 
 24                                                << 
 25 quiet_cmd_extract_certs  = CERT    $@          << 
 26       cmd_extract_certs  = $(obj)/extract-cert << 
 27 extract-cert-in = $(filter-out $(obj)/extract- << 
 28                                                    18 
                                                   >>  19 # GCC doesn't include .incbin files in -MD generated dependencies (PR#66871)
 29 $(obj)/system_certificates.o: $(obj)/x509_cert     20 $(obj)/system_certificates.o: $(obj)/x509_certificate_list
 30                                                    21 
 31 $(obj)/x509_certificate_list: $(CONFIG_SYSTEM_ !!  22 # Cope with signing_key.x509 existing in $(srctree) not $(objtree)
 32         $(call if_changed,extract_certs)       !!  23 AFLAGS_system_certificates.o := -I$(srctree)
                                                   >>  24 
                                                   >>  25 quiet_cmd_extract_certs  = EXTRACT_CERTS   $(patsubst "%",%,$(2))
                                                   >>  26       cmd_extract_certs  = scripts/extract-cert $(2) $@
 33                                                    27 
 34 targets += x509_certificate_list                   28 targets += x509_certificate_list
                                                   >>  29 $(obj)/x509_certificate_list: scripts/extract-cert $(SYSTEM_TRUSTED_KEYS_SRCPREFIX)$(SYSTEM_TRUSTED_KEYS_FILENAME) FORCE
                                                   >>  30         $(call if_changed,extract_certs,$(SYSTEM_TRUSTED_KEYS_SRCPREFIX)$(CONFIG_SYSTEM_TRUSTED_KEYS))
                                                   >>  31 endif # CONFIG_SYSTEM_TRUSTED_KEYRING
                                                   >>  32 
                                                   >>  33 clean-files := x509_certificate_list .x509.list x509_revocation_list
                                                   >>  34 
                                                   >>  35 ifeq ($(CONFIG_MODULE_SIG),y)
                                                   >>  36         SIGN_KEY = y
                                                   >>  37 endif
                                                   >>  38 
                                                   >>  39 ifeq ($(CONFIG_IMA_APPRAISE_MODSIG),y)
                                                   >>  40 ifeq ($(CONFIG_MODULES),y)
                                                   >>  41         SIGN_KEY = y
                                                   >>  42 endif
                                                   >>  43 endif
 35                                                    44 
                                                   >>  45 ifdef SIGN_KEY
                                                   >>  46 ###############################################################################
                                                   >>  47 #
 36 # If module signing is requested, say by allye     48 # If module signing is requested, say by allyesconfig, but a key has not been
 37 # supplied, then one will need to be generated     49 # supplied, then one will need to be generated to make sure the build does not
 38 # fail and that the kernel may be used afterwa     50 # fail and that the kernel may be used afterwards.
 39 #                                                  51 #
                                                   >>  52 ###############################################################################
                                                   >>  53 ifndef CONFIG_MODULE_SIG_HASH
                                                   >>  54 $(error Could not determine digest type to use from kernel config)
                                                   >>  55 endif
                                                   >>  56 
                                                   >>  57 redirect_openssl        = 2>&1
                                                   >>  58 quiet_redirect_openssl  = 2>&1
                                                   >>  59 silent_redirect_openssl = 2>/dev/null
                                                   >>  60 openssl_available       = $(shell openssl help 2>/dev/null && echo yes)
                                                   >>  61 
 40 # We do it this way rather than having a boole     62 # We do it this way rather than having a boolean option for enabling an
 41 # external private key, because 'make randconf     63 # external private key, because 'make randconfig' might enable such a
 42 # boolean option and we unfortunately can't ma     64 # boolean option and we unfortunately can't make it depend on !RANDCONFIG.
 43 ifeq ($(CONFIG_MODULE_SIG_KEY),certs/signing_k !!  65 ifeq ($(CONFIG_MODULE_SIG_KEY),"certs/signing_key.pem")
 44                                                    66 
 45 keytype-$(CONFIG_MODULE_SIG_KEY_TYPE_ECDSA) := !!  67 ifeq ($(openssl_available),yes)
                                                   >>  68 X509TEXT=$(shell openssl x509 -in "certs/signing_key.pem" -text 2>/dev/null)
 46                                                    69 
 47 quiet_cmd_gen_key = GENKEY  $@                 !!  70 $(if $(findstring rsaEncryption,$(X509TEXT)),,$(shell rm -f "certs/signing_key.pem"))
 48       cmd_gen_key = openssl req -new -nodes -u !!  71 endif
 49                 -batch -x509 -config $< \      << 
 50                 -outform PEM -out $@ -keyout $ << 
 51                                                << 
 52 $(obj)/signing_key.pem: $(obj)/x509.genkey FOR << 
 53         $(call if_changed,gen_key)             << 
 54                                                << 
 55 targets += signing_key.pem                     << 
 56                                                    72 
 57 quiet_cmd_copy_x509_config = COPY    $@        !!  73 $(obj)/signing_key.pem: $(obj)/x509.genkey
 58       cmd_copy_x509_config = cat $(src)/defaul !!  74         @$(kecho) "###"
                                                   >>  75         @$(kecho) "### Now generating an X.509 key pair to be used for signing modules."
                                                   >>  76         @$(kecho) "###"
                                                   >>  77         @$(kecho) "### If this takes a long time, you might wish to run rngd in the"
                                                   >>  78         @$(kecho) "### background to keep the supply of entropy topped up.  It"
                                                   >>  79         @$(kecho) "### needs to be run as root, and uses a hardware random"
                                                   >>  80         @$(kecho) "### number generator if one is available."
                                                   >>  81         @$(kecho) "###"
                                                   >>  82         $(Q)openssl req -new -nodes -utf8 -$(CONFIG_MODULE_SIG_HASH) -days 36500 \
                                                   >>  83                 -batch -x509 -config $(obj)/x509.genkey \
                                                   >>  84                 -outform PEM -out $(obj)/signing_key.pem \
                                                   >>  85                 -keyout $(obj)/signing_key.pem \
                                                   >>  86                 $($(quiet)redirect_openssl)
                                                   >>  87         @$(kecho) "###"
                                                   >>  88         @$(kecho) "### Key pair generated."
                                                   >>  89         @$(kecho) "###"
 59                                                    90 
 60 # You can provide your own config file. If not << 
 61 $(obj)/x509.genkey:                                91 $(obj)/x509.genkey:
 62         $(call cmd,copy_x509_config)           !!  92         @$(kecho) Generating X.509 key generation config
 63                                                !!  93         @echo  >$@ "[ req ]"
                                                   >>  94         @echo >>$@ "default_bits = 4096"
                                                   >>  95         @echo >>$@ "distinguished_name = req_distinguished_name"
                                                   >>  96         @echo >>$@ "prompt = no"
                                                   >>  97         @echo >>$@ "string_mask = utf8only"
                                                   >>  98         @echo >>$@ "x509_extensions = myexts"
                                                   >>  99         @echo >>$@
                                                   >> 100         @echo >>$@ "[ req_distinguished_name ]"
                                                   >> 101         @echo >>$@ "#O = Unspecified company"
                                                   >> 102         @echo >>$@ "CN = Build time autogenerated kernel key"
                                                   >> 103         @echo >>$@ "#emailAddress = unspecified.user@unspecified.company"
                                                   >> 104         @echo >>$@
                                                   >> 105         @echo >>$@ "[ myexts ]"
                                                   >> 106         @echo >>$@ "basicConstraints=critical,CA:FALSE"
                                                   >> 107         @echo >>$@ "keyUsage=digitalSignature"
                                                   >> 108         @echo >>$@ "subjectKeyIdentifier=hash"
                                                   >> 109         @echo >>$@ "authorityKeyIdentifier=keyid"
 64 endif # CONFIG_MODULE_SIG_KEY                     110 endif # CONFIG_MODULE_SIG_KEY
 65                                                   111 
 66 $(obj)/system_certificates.o: $(obj)/signing_k !! 112 $(eval $(call config_filename,MODULE_SIG_KEY))
 67                                                   113 
 68 PKCS11_URI := $(filter pkcs11:%, $(CONFIG_MODU !! 114 # If CONFIG_MODULE_SIG_KEY isn't a PKCS#11 URI, depend on it
 69 ifdef PKCS11_URI                               !! 115 ifeq ($(patsubst pkcs11:%,%,$(firstword $(MODULE_SIG_KEY_FILENAME))),$(firstword $(MODULE_SIG_KEY_FILENAME)))
 70 $(obj)/signing_key.x509: extract-cert-in := $( !! 116 X509_DEP := $(MODULE_SIG_KEY_SRCPREFIX)$(MODULE_SIG_KEY_FILENAME)
 71 endif                                             117 endif
 72                                                   118 
 73 $(obj)/signing_key.x509: $(filter-out $(PKCS11 !! 119 # GCC PR#66871 again.
 74         $(call if_changed,extract_certs)       !! 120 $(obj)/system_certificates.o: $(obj)/signing_key.x509
 75                                                   121 
 76 targets += signing_key.x509                       122 targets += signing_key.x509
                                                   >> 123 $(obj)/signing_key.x509: scripts/extract-cert $(X509_DEP) FORCE
                                                   >> 124         $(call if_changed,extract_certs,$(MODULE_SIG_KEY_SRCPREFIX)$(CONFIG_MODULE_SIG_KEY))
                                                   >> 125 endif # CONFIG_MODULE_SIG
 77                                                   126 
 78 $(obj)/revocation_certificates.o: $(obj)/x509_ !! 127 ifeq ($(CONFIG_SYSTEM_REVOCATION_LIST),y)
 79                                                   128 
 80 $(obj)/x509_revocation_list: $(CONFIG_SYSTEM_R !! 129 $(eval $(call config_filename,SYSTEM_REVOCATION_KEYS))
 81         $(call if_changed,extract_certs)       << 
 82                                                   130 
 83 targets += x509_revocation_list                !! 131 $(obj)/revocation_certificates.o: $(obj)/x509_revocation_list
 84                                                   132 
 85 hostprogs := extract-cert                      !! 133 quiet_cmd_extract_certs  = EXTRACT_CERTS   $(patsubst "%",%,$(2))
                                                   >> 134       cmd_extract_certs  = scripts/extract-cert $(2) $@
 86                                                   135 
 87 HOSTCFLAGS_extract-cert.o = $(shell $(HOSTPKG_ !! 136 targets += x509_revocation_list
 88 HOSTLDLIBS_extract-cert = $(shell $(HOSTPKG_CO !! 137 $(obj)/x509_revocation_list: scripts/extract-cert $(SYSTEM_REVOCATION_KEYS_SRCPREFIX)$(SYSTEM_REVOCATION_KEYS_FILENAME) FORCE
                                                   >> 138         $(call if_changed,extract_certs,$(SYSTEM_REVOCATION_KEYS_SRCPREFIX)$(CONFIG_SYSTEM_REVOCATION_KEYS))
                                                   >> 139 endif
                                                      

~ [ source navigation ] ~ [ diff markup ] ~ [ identifier search ] ~

kernel.org | git.kernel.org | LWN.net | Project Home | SVN repository | Mail admin

Linux® is a registered trademark of Linus Torvalds in the United States and other countries.
TOMOYO® is a registered trademark of NTT DATA CORPORATION.

sflogo.php