@@ -45,13 +45,13 @@ int fsverity_verify_signature(const struct fsverity_info *vi,
struct fsverity_formatted_digest *d;
int err;
- if (sig_size == 0) {
- if (fsverity_require_signatures) {
- fsverity_err(inode,
- "require_signatures=1, rejecting unsigned file!");
- return -EPERM;
- }
+ if (!fsverity_require_signatures)
return 0;
+
+ if (sig_size == 0) {
+ fsverity_err(inode,
+ "require_signatures=1, rejecting unsigned file!");
+ return -EPERM;
}
d = kzalloc(sizeof(*d) + hash_alg->digest_size, GFP_KERNEL);
Currently, fsverity verifies the signature, if supplied, regardless of whether signature verification is requested or not. Completely disable signature verification, if not requested, so that other users of fsverity can do their own verification without relying on the fsverity-specific verification to work. Signed-off-by: Roberto Sassu <roberto.sassu@huawei.com> --- fs/verity/signature.c | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-)