1 # SPDX-License-Identifier: GPL-2.0 1 # SPDX-License-Identifier: GPL-2.0 2 # 2 # 3 # Makefile for the linux kernel signature chec 3 # Makefile for the linux kernel signature checking certificates. 4 # 4 # 5 5 6 obj-$(CONFIG_SYSTEM_TRUSTED_KEYRING) += system 6 obj-$(CONFIG_SYSTEM_TRUSTED_KEYRING) += system_keyring.o system_certificates.o 7 obj-$(CONFIG_SYSTEM_BLACKLIST_KEYRING) += blac !! 7 obj-$(CONFIG_SYSTEM_BLACKLIST_KEYRING) += blacklist.o 8 obj-$(CONFIG_SYSTEM_REVOCATION_LIST) += revoca 8 obj-$(CONFIG_SYSTEM_REVOCATION_LIST) += revocation_certificates.o >> 9 ifneq ($(CONFIG_SYSTEM_BLACKLIST_HASH_LIST),) 9 10 10 $(obj)/blacklist_hashes.o: $(obj)/blacklist_ha 11 $(obj)/blacklist_hashes.o: $(obj)/blacklist_hash_list 11 CFLAGS_blacklist_hashes.o := -I $(obj) 12 CFLAGS_blacklist_hashes.o := -I $(obj) 12 13 13 quiet_cmd_check_and_copy_blacklist_hash_list = 14 quiet_cmd_check_and_copy_blacklist_hash_list = GEN $@ 14 cmd_check_and_copy_blacklist_hash_list = 15 cmd_check_and_copy_blacklist_hash_list = \ 15 $(if $(CONFIG_SYSTEM_BLACKLIST_HASH_LI !! 16 $(AWK) -f $(srctree)/scripts/check-blacklist-hashes.awk $(CONFIG_SYSTEM_BLACKLIST_HASH_LIST) >&2; \ 16 $(AWK) -f $(src)/check-blacklist-hashe !! 17 cat $(CONFIG_SYSTEM_BLACKLIST_HASH_LIST) > $@ 17 { cat $(CONFIG_SYSTEM_BLACKLIST_HASH_L << 18 echo NULL > $@) << 19 18 20 $(obj)/blacklist_hash_list: $(CONFIG_SYSTEM_BL 19 $(obj)/blacklist_hash_list: $(CONFIG_SYSTEM_BLACKLIST_HASH_LIST) FORCE 21 $(call if_changed,check_and_copy_black 20 $(call if_changed,check_and_copy_blacklist_hash_list) 22 !! 21 obj-$(CONFIG_SYSTEM_BLACKLIST_KEYRING) += blacklist_hashes.o >> 22 else >> 23 obj-$(CONFIG_SYSTEM_BLACKLIST_KEYRING) += blacklist_nohashes.o >> 24 endif 23 targets += blacklist_hash_list 25 targets += blacklist_hash_list 24 26 25 quiet_cmd_extract_certs = CERT $@ 27 quiet_cmd_extract_certs = CERT $@ 26 cmd_extract_certs = $(obj)/extract-cert !! 28 cmd_extract_certs = $(obj)/extract-cert $(extract-cert-in) $@ 27 extract-cert-in = $(filter-out $(obj)/extract- !! 29 extract-cert-in = $(or $(filter-out $(obj)/extract-cert, $(real-prereqs)),"") 28 30 29 $(obj)/system_certificates.o: $(obj)/x509_cert 31 $(obj)/system_certificates.o: $(obj)/x509_certificate_list 30 32 31 $(obj)/x509_certificate_list: $(CONFIG_SYSTEM_ 33 $(obj)/x509_certificate_list: $(CONFIG_SYSTEM_TRUSTED_KEYS) $(obj)/extract-cert FORCE 32 $(call if_changed,extract_certs) 34 $(call if_changed,extract_certs) 33 35 34 targets += x509_certificate_list 36 targets += x509_certificate_list 35 37 36 # If module signing is requested, say by allye 38 # If module signing is requested, say by allyesconfig, but a key has not been 37 # supplied, then one will need to be generated 39 # supplied, then one will need to be generated to make sure the build does not 38 # fail and that the kernel may be used afterwa 40 # fail and that the kernel may be used afterwards. 39 # 41 # 40 # We do it this way rather than having a boole 42 # We do it this way rather than having a boolean option for enabling an 41 # external private key, because 'make randconf 43 # external private key, because 'make randconfig' might enable such a 42 # boolean option and we unfortunately can't ma 44 # boolean option and we unfortunately can't make it depend on !RANDCONFIG. 43 ifeq ($(CONFIG_MODULE_SIG_KEY),certs/signing_k 45 ifeq ($(CONFIG_MODULE_SIG_KEY),certs/signing_key.pem) 44 46 45 keytype-$(CONFIG_MODULE_SIG_KEY_TYPE_ECDSA) := 47 keytype-$(CONFIG_MODULE_SIG_KEY_TYPE_ECDSA) := -newkey ec -pkeyopt ec_paramgen_curve:secp384r1 46 48 47 quiet_cmd_gen_key = GENKEY $@ 49 quiet_cmd_gen_key = GENKEY $@ 48 cmd_gen_key = openssl req -new -nodes -u 50 cmd_gen_key = openssl req -new -nodes -utf8 -$(CONFIG_MODULE_SIG_HASH) -days 36500 \ 49 -batch -x509 -config $< \ 51 -batch -x509 -config $< \ 50 -outform PEM -out $@ -keyout $ 52 -outform PEM -out $@ -keyout $@ $(keytype-y) 2>&1 51 53 52 $(obj)/signing_key.pem: $(obj)/x509.genkey FOR 54 $(obj)/signing_key.pem: $(obj)/x509.genkey FORCE 53 $(call if_changed,gen_key) 55 $(call if_changed,gen_key) 54 56 55 targets += signing_key.pem 57 targets += signing_key.pem 56 58 57 quiet_cmd_copy_x509_config = COPY $@ 59 quiet_cmd_copy_x509_config = COPY $@ 58 cmd_copy_x509_config = cat $(src)/defaul !! 60 cmd_copy_x509_config = cat $(srctree)/$(src)/default_x509.genkey > $@ 59 61 60 # You can provide your own config file. If not 62 # You can provide your own config file. If not present, copy the default one. 61 $(obj)/x509.genkey: 63 $(obj)/x509.genkey: 62 $(call cmd,copy_x509_config) 64 $(call cmd,copy_x509_config) 63 65 64 endif # CONFIG_MODULE_SIG_KEY 66 endif # CONFIG_MODULE_SIG_KEY 65 67 66 $(obj)/system_certificates.o: $(obj)/signing_k 68 $(obj)/system_certificates.o: $(obj)/signing_key.x509 67 69 68 PKCS11_URI := $(filter pkcs11:%, $(CONFIG_MODU 70 PKCS11_URI := $(filter pkcs11:%, $(CONFIG_MODULE_SIG_KEY)) 69 ifdef PKCS11_URI 71 ifdef PKCS11_URI 70 $(obj)/signing_key.x509: extract-cert-in := $( 72 $(obj)/signing_key.x509: extract-cert-in := $(PKCS11_URI) 71 endif 73 endif 72 74 73 $(obj)/signing_key.x509: $(filter-out $(PKCS11 75 $(obj)/signing_key.x509: $(filter-out $(PKCS11_URI),$(CONFIG_MODULE_SIG_KEY)) $(obj)/extract-cert FORCE 74 $(call if_changed,extract_certs) 76 $(call if_changed,extract_certs) 75 77 76 targets += signing_key.x509 78 targets += signing_key.x509 77 79 78 $(obj)/revocation_certificates.o: $(obj)/x509_ 80 $(obj)/revocation_certificates.o: $(obj)/x509_revocation_list 79 81 80 $(obj)/x509_revocation_list: $(CONFIG_SYSTEM_R 82 $(obj)/x509_revocation_list: $(CONFIG_SYSTEM_REVOCATION_KEYS) $(obj)/extract-cert FORCE 81 $(call if_changed,extract_certs) 83 $(call if_changed,extract_certs) 82 84 83 targets += x509_revocation_list 85 targets += x509_revocation_list 84 86 85 hostprogs := extract-cert 87 hostprogs := extract-cert 86 88 87 HOSTCFLAGS_extract-cert.o = $(shell $(HOSTPKG_ !! 89 HOSTCFLAGS_extract-cert.o = $(shell $(HOSTPKG_CONFIG) --cflags libcrypto 2> /dev/null) 88 HOSTLDLIBS_extract-cert = $(shell $(HOSTPKG_CO 90 HOSTLDLIBS_extract-cert = $(shell $(HOSTPKG_CONFIG) --libs libcrypto 2> /dev/null || echo -lcrypto)
Linux® is a registered trademark of Linus Torvalds in the United States and other countries.
TOMOYO® is a registered trademark of NTT DATA CORPORATION.