1 # SPDX-License-Identifier: GPL-2.0 1 # SPDX-License-Identifier: GPL-2.0 2 # 2 # 3 # Makefile for the linux kernel signature chec 3 # Makefile for the linux kernel signature checking certificates. 4 # 4 # 5 5 6 obj-$(CONFIG_SYSTEM_TRUSTED_KEYRING) += system 6 obj-$(CONFIG_SYSTEM_TRUSTED_KEYRING) += system_keyring.o system_certificates.o 7 obj-$(CONFIG_SYSTEM_BLACKLIST_KEYRING) += blac 7 obj-$(CONFIG_SYSTEM_BLACKLIST_KEYRING) += blacklist.o blacklist_hashes.o 8 obj-$(CONFIG_SYSTEM_REVOCATION_LIST) += revoca 8 obj-$(CONFIG_SYSTEM_REVOCATION_LIST) += revocation_certificates.o 9 9 10 $(obj)/blacklist_hashes.o: $(obj)/blacklist_ha 10 $(obj)/blacklist_hashes.o: $(obj)/blacklist_hash_list 11 CFLAGS_blacklist_hashes.o := -I $(obj) 11 CFLAGS_blacklist_hashes.o := -I $(obj) 12 12 13 quiet_cmd_check_and_copy_blacklist_hash_list = 13 quiet_cmd_check_and_copy_blacklist_hash_list = GEN $@ 14 cmd_check_and_copy_blacklist_hash_list = 14 cmd_check_and_copy_blacklist_hash_list = \ 15 $(if $(CONFIG_SYSTEM_BLACKLIST_HASH_LI 15 $(if $(CONFIG_SYSTEM_BLACKLIST_HASH_LIST), \ 16 $(AWK) -f $(src)/check-blacklist-hashe 16 $(AWK) -f $(src)/check-blacklist-hashes.awk $(CONFIG_SYSTEM_BLACKLIST_HASH_LIST) >&2; \ 17 { cat $(CONFIG_SYSTEM_BLACKLIST_HASH_L 17 { cat $(CONFIG_SYSTEM_BLACKLIST_HASH_LIST); echo $(comma) NULL; } > $@, \ 18 echo NULL > $@) 18 echo NULL > $@) 19 19 20 $(obj)/blacklist_hash_list: $(CONFIG_SYSTEM_BL 20 $(obj)/blacklist_hash_list: $(CONFIG_SYSTEM_BLACKLIST_HASH_LIST) FORCE 21 $(call if_changed,check_and_copy_black 21 $(call if_changed,check_and_copy_blacklist_hash_list) 22 22 23 targets += blacklist_hash_list 23 targets += blacklist_hash_list 24 24 25 quiet_cmd_extract_certs = CERT $@ 25 quiet_cmd_extract_certs = CERT $@ 26 cmd_extract_certs = $(obj)/extract-cert 26 cmd_extract_certs = $(obj)/extract-cert "$(extract-cert-in)" $@ 27 extract-cert-in = $(filter-out $(obj)/extract- 27 extract-cert-in = $(filter-out $(obj)/extract-cert, $(real-prereqs)) 28 28 29 $(obj)/system_certificates.o: $(obj)/x509_cert 29 $(obj)/system_certificates.o: $(obj)/x509_certificate_list 30 30 31 $(obj)/x509_certificate_list: $(CONFIG_SYSTEM_ 31 $(obj)/x509_certificate_list: $(CONFIG_SYSTEM_TRUSTED_KEYS) $(obj)/extract-cert FORCE 32 $(call if_changed,extract_certs) 32 $(call if_changed,extract_certs) 33 33 34 targets += x509_certificate_list 34 targets += x509_certificate_list 35 35 36 # If module signing is requested, say by allye 36 # If module signing is requested, say by allyesconfig, but a key has not been 37 # supplied, then one will need to be generated 37 # supplied, then one will need to be generated to make sure the build does not 38 # fail and that the kernel may be used afterwa 38 # fail and that the kernel may be used afterwards. 39 # 39 # 40 # We do it this way rather than having a boole 40 # We do it this way rather than having a boolean option for enabling an 41 # external private key, because 'make randconf 41 # external private key, because 'make randconfig' might enable such a 42 # boolean option and we unfortunately can't ma 42 # boolean option and we unfortunately can't make it depend on !RANDCONFIG. 43 ifeq ($(CONFIG_MODULE_SIG_KEY),certs/signing_k 43 ifeq ($(CONFIG_MODULE_SIG_KEY),certs/signing_key.pem) 44 44 45 keytype-$(CONFIG_MODULE_SIG_KEY_TYPE_ECDSA) := 45 keytype-$(CONFIG_MODULE_SIG_KEY_TYPE_ECDSA) := -newkey ec -pkeyopt ec_paramgen_curve:secp384r1 46 46 47 quiet_cmd_gen_key = GENKEY $@ 47 quiet_cmd_gen_key = GENKEY $@ 48 cmd_gen_key = openssl req -new -nodes -u 48 cmd_gen_key = openssl req -new -nodes -utf8 -$(CONFIG_MODULE_SIG_HASH) -days 36500 \ 49 -batch -x509 -config $< \ 49 -batch -x509 -config $< \ 50 -outform PEM -out $@ -keyout $ 50 -outform PEM -out $@ -keyout $@ $(keytype-y) 2>&1 51 51 52 $(obj)/signing_key.pem: $(obj)/x509.genkey FOR 52 $(obj)/signing_key.pem: $(obj)/x509.genkey FORCE 53 $(call if_changed,gen_key) 53 $(call if_changed,gen_key) 54 54 55 targets += signing_key.pem 55 targets += signing_key.pem 56 56 57 quiet_cmd_copy_x509_config = COPY $@ 57 quiet_cmd_copy_x509_config = COPY $@ 58 cmd_copy_x509_config = cat $(src)/defaul 58 cmd_copy_x509_config = cat $(src)/default_x509.genkey > $@ 59 59 60 # You can provide your own config file. If not 60 # You can provide your own config file. If not present, copy the default one. 61 $(obj)/x509.genkey: 61 $(obj)/x509.genkey: 62 $(call cmd,copy_x509_config) 62 $(call cmd,copy_x509_config) 63 63 64 endif # CONFIG_MODULE_SIG_KEY 64 endif # CONFIG_MODULE_SIG_KEY 65 65 66 $(obj)/system_certificates.o: $(obj)/signing_k 66 $(obj)/system_certificates.o: $(obj)/signing_key.x509 67 67 68 PKCS11_URI := $(filter pkcs11:%, $(CONFIG_MODU 68 PKCS11_URI := $(filter pkcs11:%, $(CONFIG_MODULE_SIG_KEY)) 69 ifdef PKCS11_URI 69 ifdef PKCS11_URI 70 $(obj)/signing_key.x509: extract-cert-in := $( 70 $(obj)/signing_key.x509: extract-cert-in := $(PKCS11_URI) 71 endif 71 endif 72 72 73 $(obj)/signing_key.x509: $(filter-out $(PKCS11 73 $(obj)/signing_key.x509: $(filter-out $(PKCS11_URI),$(CONFIG_MODULE_SIG_KEY)) $(obj)/extract-cert FORCE 74 $(call if_changed,extract_certs) 74 $(call if_changed,extract_certs) 75 75 76 targets += signing_key.x509 76 targets += signing_key.x509 77 77 78 $(obj)/revocation_certificates.o: $(obj)/x509_ 78 $(obj)/revocation_certificates.o: $(obj)/x509_revocation_list 79 79 80 $(obj)/x509_revocation_list: $(CONFIG_SYSTEM_R 80 $(obj)/x509_revocation_list: $(CONFIG_SYSTEM_REVOCATION_KEYS) $(obj)/extract-cert FORCE 81 $(call if_changed,extract_certs) 81 $(call if_changed,extract_certs) 82 82 83 targets += x509_revocation_list 83 targets += x509_revocation_list 84 84 85 hostprogs := extract-cert 85 hostprogs := extract-cert 86 86 87 HOSTCFLAGS_extract-cert.o = $(shell $(HOSTPKG_ !! 87 HOSTCFLAGS_extract-cert.o = $(shell $(HOSTPKG_CONFIG) --cflags libcrypto 2> /dev/null) 88 HOSTLDLIBS_extract-cert = $(shell $(HOSTPKG_CO 88 HOSTLDLIBS_extract-cert = $(shell $(HOSTPKG_CONFIG) --libs libcrypto 2> /dev/null || echo -lcrypto)
Linux® is a registered trademark of Linus Torvalds in the United States and other countries.
TOMOYO® is a registered trademark of NTT DATA CORPORATION.