summaryrefslogtreecommitdiff
path: root/futility/ryu_root_header.c
diff options
context:
space:
mode:
Diffstat (limited to 'futility/ryu_root_header.c')
-rw-r--r--futility/ryu_root_header.c165
1 files changed, 165 insertions, 0 deletions
diff --git a/futility/ryu_root_header.c b/futility/ryu_root_header.c
new file mode 100644
index 00000000..a88f34c2
--- /dev/null
+++ b/futility/ryu_root_header.c
@@ -0,0 +1,165 @@
+/*
+ * Copyright 2015 The Chromium OS Authors. All rights reserved.
+ * Use of this source code is governed by a BSD-style license that can be
+ * found in the LICENSE file.
+ */
+#include <errno.h>
+#include <getopt.h>
+#include <inttypes.h>
+#include <stddef.h>
+#include <stdint.h>
+#include <stdio.h>
+#include <stdlib.h>
+#include <string.h>
+#include <sys/stat.h>
+#include <sys/types.h>
+#include <unistd.h>
+
+#include "2struct.h"
+#include "cryptolib.h"
+#include "futility.h"
+#include "gbb_header.h"
+
+#define SEARCH_STRIDE 4
+
+/**
+ * Check if the pointer contains the magic string. We need to use a
+ * case-swapped version, so that the actual magic string doesn't appear in the
+ * code, to avoid falsely finding it when searching for the struct.
+ */
+static int is_magic(const void *ptr)
+{
+ const char magic_inv[RYU_ROOT_KEY_HASH_MAGIC_SIZE] =
+ RYU_ROOT_KEY_HASH_MAGIC_INVCASE;
+ const char *magic = ptr;
+ int i;
+
+ for (i = 0; i < RYU_ROOT_KEY_HASH_MAGIC_SIZE; i++) {
+ if (magic[i] != (magic_inv[i] ^ 0x20))
+ return 0;
+ }
+
+ return 1;
+}
+
+static int valid_ryu_root_header(struct vb2_ryu_root_key_hash *hash,
+ size_t size)
+{
+ if (!is_magic(hash->magic))
+ return 0; /* Wrong magic */
+
+ if (hash->header_version_major != RYU_ROOT_KEY_HASH_VERSION_MAJOR)
+ return 0; /* Version we can't parse */
+
+ if (hash->struct_size < EXPECTED_VB2_RYU_ROOT_KEY_HASH_SIZE)
+ return 0; /* Header too small */
+
+ if (hash->struct_size > size)
+ return 0; /* Claimed size doesn't fit in buffer */
+
+ return 1;
+}
+
+/**
+ * Find the root key hash struct and return it or NULL if error.
+ */
+static struct vb2_ryu_root_key_hash *find_ryu_root_header(uint8_t *ptr,
+ size_t size)
+{
+ size_t i;
+ struct vb2_ryu_root_key_hash *tmp, *hash = NULL;
+ int count = 0;
+
+ /* Look for the ryu root key hash header */
+ for (i = 0; i <= size - SEARCH_STRIDE; i += SEARCH_STRIDE) {
+ if (!is_magic(ptr + i))
+ continue;
+
+ /* Found something. See if it's any good. */
+ tmp = (struct vb2_ryu_root_key_hash *) (ptr + i);
+ if (valid_ryu_root_header(tmp, size - i))
+ if (!count++)
+ hash = tmp;
+ }
+
+ switch (count) {
+ case 0:
+ return NULL;
+ case 1:
+ return hash;
+ default:
+ fprintf(stderr,
+ "WARNING: multiple ryu root hash headers found\n");
+ /* But hey, it's only a warning. Use the first one. */
+ return hash;
+ }
+}
+
+static void calculate_root_key_hash(uint8_t *digest, size_t digest_size,
+ const GoogleBinaryBlockHeader *gbb)
+{
+ const uint8_t *gbb_base = (const uint8_t *)gbb;
+
+ internal_SHA256(gbb_base + gbb->rootkey_offset,
+ gbb->rootkey_size,
+ digest);
+}
+
+int fill_ryu_root_header(uint8_t *ptr, size_t size,
+ const GoogleBinaryBlockHeader *gbb)
+{
+ struct vb2_ryu_root_key_hash *hash;
+
+ /*
+ * Find the ryu root header. If not found, nothing we can do, but
+ * that's ok because most images don't have the header.
+ */
+ hash = find_ryu_root_header(ptr, size);
+ if (!hash)
+ return 0;
+
+ /* Update the hash stored in the header based on the root key */
+ calculate_root_key_hash(hash->root_key_hash_digest,
+ sizeof(hash->root_key_hash_digest),
+ gbb);
+
+ printf(" - calculate ryu root hash: success\n");
+ return 0;
+}
+
+int verify_ryu_root_header(uint8_t *ptr, size_t size,
+ const GoogleBinaryBlockHeader *gbb)
+{
+ uint8_t digest[SHA256_DIGEST_SIZE] = {0};
+
+ struct vb2_ryu_root_key_hash *hash;
+
+ /*
+ * Find the ryu root header. If not found, nothing we can do, but
+ * that's ok because most images don't have the header.
+ */
+ hash = find_ryu_root_header(ptr, size);
+ if (!hash) {
+ printf(" - ryu root hash not found\n");
+ return 0;
+ }
+
+ /* Check for all 0's, which means hash hasn't been set */
+ if (0 == memcmp(digest, hash->root_key_hash_digest,
+ SHA256_DIGEST_SIZE)) {
+ printf(" - ryu root hash is unset\n");
+ return 0;
+ }
+
+ /* Update the hash stored in the header based on the root key */
+ calculate_root_key_hash(digest, sizeof(digest), gbb);
+
+ if (0 == memcmp(digest, hash->root_key_hash_digest,
+ SHA256_DIGEST_SIZE)) {
+ printf(" - ryu root hash verified\n");
+ return 0;
+ } else {
+ printf(" - ryu root hash does not verify\n");
+ return -1;
+ }
+}