xref: /openbmc/linux/security/keys/big_key.c (revision 13100a72f40f5748a04017e0ab3df4cf27c809ef)
1ab3c3587SDavid Howells /* Large capacity key type
2ab3c3587SDavid Howells  *
3ab3c3587SDavid Howells  * Copyright (C) 2013 Red Hat, Inc. All Rights Reserved.
4ab3c3587SDavid Howells  * Written by David Howells (dhowells@redhat.com)
5ab3c3587SDavid Howells  *
6ab3c3587SDavid Howells  * This program is free software; you can redistribute it and/or
7ab3c3587SDavid Howells  * modify it under the terms of the GNU General Public Licence
8ab3c3587SDavid Howells  * as published by the Free Software Foundation; either version
9ab3c3587SDavid Howells  * 2 of the Licence, or (at your option) any later version.
10ab3c3587SDavid Howells  */
11ab3c3587SDavid Howells 
12ab3c3587SDavid Howells #include <linux/init.h>
13ab3c3587SDavid Howells #include <linux/seq_file.h>
14ab3c3587SDavid Howells #include <linux/file.h>
15ab3c3587SDavid Howells #include <linux/shmem_fs.h>
16ab3c3587SDavid Howells #include <linux/err.h>
17*13100a72SKirill Marinushkin #include <linux/scatterlist.h>
18ab3c3587SDavid Howells #include <keys/user-type.h>
19ab3c3587SDavid Howells #include <keys/big_key-type.h>
20*13100a72SKirill Marinushkin #include <crypto/rng.h>
21ab3c3587SDavid Howells 
22ab3c3587SDavid Howells /*
23146aa8b1SDavid Howells  * Layout of key payload words.
24146aa8b1SDavid Howells  */
25146aa8b1SDavid Howells enum {
26146aa8b1SDavid Howells 	big_key_data,
27146aa8b1SDavid Howells 	big_key_path,
28146aa8b1SDavid Howells 	big_key_path_2nd_part,
29146aa8b1SDavid Howells 	big_key_len,
30146aa8b1SDavid Howells };
31146aa8b1SDavid Howells 
32146aa8b1SDavid Howells /*
33*13100a72SKirill Marinushkin  * Crypto operation with big_key data
34*13100a72SKirill Marinushkin  */
35*13100a72SKirill Marinushkin enum big_key_op {
36*13100a72SKirill Marinushkin 	BIG_KEY_ENC,
37*13100a72SKirill Marinushkin 	BIG_KEY_DEC,
38*13100a72SKirill Marinushkin };
39*13100a72SKirill Marinushkin 
40*13100a72SKirill Marinushkin /*
41ab3c3587SDavid Howells  * If the data is under this limit, there's no point creating a shm file to
42ab3c3587SDavid Howells  * hold it as the permanently resident metadata for the shmem fs will be at
43ab3c3587SDavid Howells  * least as large as the data.
44ab3c3587SDavid Howells  */
45ab3c3587SDavid Howells #define BIG_KEY_FILE_THRESHOLD (sizeof(struct inode) + sizeof(struct dentry))
46ab3c3587SDavid Howells 
47ab3c3587SDavid Howells /*
48*13100a72SKirill Marinushkin  * Key size for big_key data encryption
49*13100a72SKirill Marinushkin  */
50*13100a72SKirill Marinushkin #define ENC_KEY_SIZE	16
51*13100a72SKirill Marinushkin 
52*13100a72SKirill Marinushkin /*
53ab3c3587SDavid Howells  * big_key defined keys take an arbitrary string as the description and an
54ab3c3587SDavid Howells  * arbitrary blob of data as the payload
55ab3c3587SDavid Howells  */
56ab3c3587SDavid Howells struct key_type key_type_big_key = {
57ab3c3587SDavid Howells 	.name			= "big_key",
58002edaf7SDavid Howells 	.preparse		= big_key_preparse,
59002edaf7SDavid Howells 	.free_preparse		= big_key_free_preparse,
60002edaf7SDavid Howells 	.instantiate		= generic_key_instantiate,
61ab3c3587SDavid Howells 	.revoke			= big_key_revoke,
62ab3c3587SDavid Howells 	.destroy		= big_key_destroy,
63ab3c3587SDavid Howells 	.describe		= big_key_describe,
64ab3c3587SDavid Howells 	.read			= big_key_read,
65ab3c3587SDavid Howells };
66ab3c3587SDavid Howells 
67ab3c3587SDavid Howells /*
68*13100a72SKirill Marinushkin  * Crypto names for big_key data encryption
69*13100a72SKirill Marinushkin  */
70*13100a72SKirill Marinushkin static const char big_key_rng_name[] = "stdrng";
71*13100a72SKirill Marinushkin static const char big_key_alg_name[] = "ecb(aes)";
72*13100a72SKirill Marinushkin 
73*13100a72SKirill Marinushkin /*
74*13100a72SKirill Marinushkin  * Crypto algorithms for big_key data encryption
75*13100a72SKirill Marinushkin  */
76*13100a72SKirill Marinushkin static struct crypto_rng *big_key_rng;
77*13100a72SKirill Marinushkin static struct crypto_blkcipher *big_key_blkcipher;
78*13100a72SKirill Marinushkin 
79*13100a72SKirill Marinushkin /*
80*13100a72SKirill Marinushkin  * Generate random key to encrypt big_key data
81*13100a72SKirill Marinushkin  */
82*13100a72SKirill Marinushkin static inline int big_key_gen_enckey(u8 *key)
83*13100a72SKirill Marinushkin {
84*13100a72SKirill Marinushkin 	return crypto_rng_get_bytes(big_key_rng, key, ENC_KEY_SIZE);
85*13100a72SKirill Marinushkin }
86*13100a72SKirill Marinushkin 
87*13100a72SKirill Marinushkin /*
88*13100a72SKirill Marinushkin  * Encrypt/decrypt big_key data
89*13100a72SKirill Marinushkin  */
90*13100a72SKirill Marinushkin static int big_key_crypt(enum big_key_op op, u8 *data, size_t datalen, u8 *key)
91*13100a72SKirill Marinushkin {
92*13100a72SKirill Marinushkin 	int ret = -EINVAL;
93*13100a72SKirill Marinushkin 	struct scatterlist sgio;
94*13100a72SKirill Marinushkin 	struct blkcipher_desc desc;
95*13100a72SKirill Marinushkin 
96*13100a72SKirill Marinushkin 	if (crypto_blkcipher_setkey(big_key_blkcipher, key, ENC_KEY_SIZE)) {
97*13100a72SKirill Marinushkin 		ret = -EAGAIN;
98*13100a72SKirill Marinushkin 		goto error;
99*13100a72SKirill Marinushkin 	}
100*13100a72SKirill Marinushkin 
101*13100a72SKirill Marinushkin 	desc.flags = 0;
102*13100a72SKirill Marinushkin 	desc.tfm = big_key_blkcipher;
103*13100a72SKirill Marinushkin 
104*13100a72SKirill Marinushkin 	sg_init_one(&sgio, data, datalen);
105*13100a72SKirill Marinushkin 
106*13100a72SKirill Marinushkin 	if (op == BIG_KEY_ENC)
107*13100a72SKirill Marinushkin 		ret = crypto_blkcipher_encrypt(&desc, &sgio, &sgio, datalen);
108*13100a72SKirill Marinushkin 	else
109*13100a72SKirill Marinushkin 		ret = crypto_blkcipher_decrypt(&desc, &sgio, &sgio, datalen);
110*13100a72SKirill Marinushkin 
111*13100a72SKirill Marinushkin error:
112*13100a72SKirill Marinushkin 	return ret;
113*13100a72SKirill Marinushkin }
114*13100a72SKirill Marinushkin 
115*13100a72SKirill Marinushkin /*
116002edaf7SDavid Howells  * Preparse a big key
117ab3c3587SDavid Howells  */
118002edaf7SDavid Howells int big_key_preparse(struct key_preparsed_payload *prep)
119ab3c3587SDavid Howells {
120146aa8b1SDavid Howells 	struct path *path = (struct path *)&prep->payload.data[big_key_path];
121ab3c3587SDavid Howells 	struct file *file;
122*13100a72SKirill Marinushkin 	u8 *enckey;
123*13100a72SKirill Marinushkin 	u8 *data = NULL;
124ab3c3587SDavid Howells 	ssize_t written;
125ab3c3587SDavid Howells 	size_t datalen = prep->datalen;
126ab3c3587SDavid Howells 	int ret;
127ab3c3587SDavid Howells 
128ab3c3587SDavid Howells 	ret = -EINVAL;
129ab3c3587SDavid Howells 	if (datalen <= 0 || datalen > 1024 * 1024 || !prep->data)
130ab3c3587SDavid Howells 		goto error;
131ab3c3587SDavid Howells 
132ab3c3587SDavid Howells 	/* Set an arbitrary quota */
133002edaf7SDavid Howells 	prep->quotalen = 16;
134ab3c3587SDavid Howells 
135146aa8b1SDavid Howells 	prep->payload.data[big_key_len] = (void *)(unsigned long)datalen;
136ab3c3587SDavid Howells 
137ab3c3587SDavid Howells 	if (datalen > BIG_KEY_FILE_THRESHOLD) {
138ab3c3587SDavid Howells 		/* Create a shmem file to store the data in.  This will permit the data
139ab3c3587SDavid Howells 		 * to be swapped out if needed.
140ab3c3587SDavid Howells 		 *
141*13100a72SKirill Marinushkin 		 * File content is stored encrypted with randomly generated key.
142ab3c3587SDavid Howells 		 */
143*13100a72SKirill Marinushkin 		size_t enclen = ALIGN(datalen, crypto_blkcipher_blocksize(big_key_blkcipher));
144*13100a72SKirill Marinushkin 
145*13100a72SKirill Marinushkin 		/* prepare aligned data to encrypt */
146*13100a72SKirill Marinushkin 		data = kmalloc(enclen, GFP_KERNEL);
147*13100a72SKirill Marinushkin 		if (!data)
148*13100a72SKirill Marinushkin 			return -ENOMEM;
149*13100a72SKirill Marinushkin 
150*13100a72SKirill Marinushkin 		memcpy(data, prep->data, datalen);
151*13100a72SKirill Marinushkin 		memset(data + datalen, 0x00, enclen - datalen);
152*13100a72SKirill Marinushkin 
153*13100a72SKirill Marinushkin 		/* generate random key */
154*13100a72SKirill Marinushkin 		enckey = kmalloc(ENC_KEY_SIZE, GFP_KERNEL);
155*13100a72SKirill Marinushkin 		if (!enckey) {
156*13100a72SKirill Marinushkin 			ret = -ENOMEM;
157002edaf7SDavid Howells 			goto error;
158d2b86970SWei Yongjun 		}
159ab3c3587SDavid Howells 
160*13100a72SKirill Marinushkin 		ret = big_key_gen_enckey(enckey);
161*13100a72SKirill Marinushkin 		if (ret)
162*13100a72SKirill Marinushkin 			goto err_enckey;
163*13100a72SKirill Marinushkin 
164*13100a72SKirill Marinushkin 		/* encrypt aligned data */
165*13100a72SKirill Marinushkin 		ret = big_key_crypt(BIG_KEY_ENC, data, enclen, enckey);
166*13100a72SKirill Marinushkin 		if (ret)
167*13100a72SKirill Marinushkin 			goto err_enckey;
168*13100a72SKirill Marinushkin 
169*13100a72SKirill Marinushkin 		/* save aligned data to file */
170*13100a72SKirill Marinushkin 		file = shmem_kernel_file_setup("", enclen, 0);
171*13100a72SKirill Marinushkin 		if (IS_ERR(file)) {
172*13100a72SKirill Marinushkin 			ret = PTR_ERR(file);
173*13100a72SKirill Marinushkin 			goto err_enckey;
174*13100a72SKirill Marinushkin 		}
175*13100a72SKirill Marinushkin 
176*13100a72SKirill Marinushkin 		written = kernel_write(file, data, enclen, 0);
177*13100a72SKirill Marinushkin 		if (written != enclen) {
17897826c82SDavid Howells 			ret = written;
179ab3c3587SDavid Howells 			if (written >= 0)
180ab3c3587SDavid Howells 				ret = -ENOMEM;
181ab3c3587SDavid Howells 			goto err_fput;
182ab3c3587SDavid Howells 		}
183ab3c3587SDavid Howells 
184ab3c3587SDavid Howells 		/* Pin the mount and dentry to the key so that we can open it again
185ab3c3587SDavid Howells 		 * later
186ab3c3587SDavid Howells 		 */
187*13100a72SKirill Marinushkin 		prep->payload.data[big_key_data] = enckey;
188ab3c3587SDavid Howells 		*path = file->f_path;
189ab3c3587SDavid Howells 		path_get(path);
190ab3c3587SDavid Howells 		fput(file);
191*13100a72SKirill Marinushkin 		kfree(data);
192ab3c3587SDavid Howells 	} else {
193ab3c3587SDavid Howells 		/* Just store the data in a buffer */
194ab3c3587SDavid Howells 		void *data = kmalloc(datalen, GFP_KERNEL);
195*13100a72SKirill Marinushkin 
196002edaf7SDavid Howells 		if (!data)
197002edaf7SDavid Howells 			return -ENOMEM;
198ab3c3587SDavid Howells 
199146aa8b1SDavid Howells 		prep->payload.data[big_key_data] = data;
200146aa8b1SDavid Howells 		memcpy(data, prep->data, prep->datalen);
201ab3c3587SDavid Howells 	}
202ab3c3587SDavid Howells 	return 0;
203ab3c3587SDavid Howells 
204ab3c3587SDavid Howells err_fput:
205ab3c3587SDavid Howells 	fput(file);
206*13100a72SKirill Marinushkin err_enckey:
207*13100a72SKirill Marinushkin 	kfree(enckey);
208ab3c3587SDavid Howells error:
209*13100a72SKirill Marinushkin 	kfree(data);
210ab3c3587SDavid Howells 	return ret;
211ab3c3587SDavid Howells }
212ab3c3587SDavid Howells 
213ab3c3587SDavid Howells /*
214002edaf7SDavid Howells  * Clear preparsement.
215002edaf7SDavid Howells  */
216002edaf7SDavid Howells void big_key_free_preparse(struct key_preparsed_payload *prep)
217002edaf7SDavid Howells {
218002edaf7SDavid Howells 	if (prep->datalen > BIG_KEY_FILE_THRESHOLD) {
219146aa8b1SDavid Howells 		struct path *path = (struct path *)&prep->payload.data[big_key_path];
220*13100a72SKirill Marinushkin 
221002edaf7SDavid Howells 		path_put(path);
222002edaf7SDavid Howells 	}
223*13100a72SKirill Marinushkin 	kfree(prep->payload.data[big_key_data]);
224002edaf7SDavid Howells }
225002edaf7SDavid Howells 
226002edaf7SDavid Howells /*
227ab3c3587SDavid Howells  * dispose of the links from a revoked keyring
228ab3c3587SDavid Howells  * - called with the key sem write-locked
229ab3c3587SDavid Howells  */
230ab3c3587SDavid Howells void big_key_revoke(struct key *key)
231ab3c3587SDavid Howells {
232146aa8b1SDavid Howells 	struct path *path = (struct path *)&key->payload.data[big_key_path];
233ab3c3587SDavid Howells 
234ab3c3587SDavid Howells 	/* clear the quota */
235ab3c3587SDavid Howells 	key_payload_reserve(key, 0);
236146aa8b1SDavid Howells 	if (key_is_instantiated(key) &&
237146aa8b1SDavid Howells 	    (size_t)key->payload.data[big_key_len] > BIG_KEY_FILE_THRESHOLD)
238ab3c3587SDavid Howells 		vfs_truncate(path, 0);
239ab3c3587SDavid Howells }
240ab3c3587SDavid Howells 
241ab3c3587SDavid Howells /*
242ab3c3587SDavid Howells  * dispose of the data dangling from the corpse of a big_key key
243ab3c3587SDavid Howells  */
244ab3c3587SDavid Howells void big_key_destroy(struct key *key)
245ab3c3587SDavid Howells {
246146aa8b1SDavid Howells 	size_t datalen = (size_t)key->payload.data[big_key_len];
247146aa8b1SDavid Howells 
248*13100a72SKirill Marinushkin 	if (datalen > BIG_KEY_FILE_THRESHOLD) {
249146aa8b1SDavid Howells 		struct path *path = (struct path *)&key->payload.data[big_key_path];
250*13100a72SKirill Marinushkin 
251ab3c3587SDavid Howells 		path_put(path);
252ab3c3587SDavid Howells 		path->mnt = NULL;
253ab3c3587SDavid Howells 		path->dentry = NULL;
254*13100a72SKirill Marinushkin 	}
255146aa8b1SDavid Howells 	kfree(key->payload.data[big_key_data]);
256146aa8b1SDavid Howells 	key->payload.data[big_key_data] = NULL;
257ab3c3587SDavid Howells }
258ab3c3587SDavid Howells 
259ab3c3587SDavid Howells /*
260ab3c3587SDavid Howells  * describe the big_key key
261ab3c3587SDavid Howells  */
262ab3c3587SDavid Howells void big_key_describe(const struct key *key, struct seq_file *m)
263ab3c3587SDavid Howells {
264146aa8b1SDavid Howells 	size_t datalen = (size_t)key->payload.data[big_key_len];
265ab3c3587SDavid Howells 
266ab3c3587SDavid Howells 	seq_puts(m, key->description);
267ab3c3587SDavid Howells 
268ab3c3587SDavid Howells 	if (key_is_instantiated(key))
269146aa8b1SDavid Howells 		seq_printf(m, ": %zu [%s]",
270ab3c3587SDavid Howells 			   datalen,
271ab3c3587SDavid Howells 			   datalen > BIG_KEY_FILE_THRESHOLD ? "file" : "buff");
272ab3c3587SDavid Howells }
273ab3c3587SDavid Howells 
274ab3c3587SDavid Howells /*
275ab3c3587SDavid Howells  * read the key data
276ab3c3587SDavid Howells  * - the key's semaphore is read-locked
277ab3c3587SDavid Howells  */
278ab3c3587SDavid Howells long big_key_read(const struct key *key, char __user *buffer, size_t buflen)
279ab3c3587SDavid Howells {
280146aa8b1SDavid Howells 	size_t datalen = (size_t)key->payload.data[big_key_len];
281ab3c3587SDavid Howells 	long ret;
282ab3c3587SDavid Howells 
283ab3c3587SDavid Howells 	if (!buffer || buflen < datalen)
284ab3c3587SDavid Howells 		return datalen;
285ab3c3587SDavid Howells 
286ab3c3587SDavid Howells 	if (datalen > BIG_KEY_FILE_THRESHOLD) {
287146aa8b1SDavid Howells 		struct path *path = (struct path *)&key->payload.data[big_key_path];
288ab3c3587SDavid Howells 		struct file *file;
289*13100a72SKirill Marinushkin 		u8 *data;
290*13100a72SKirill Marinushkin 		u8 *enckey = (u8 *)key->payload.data[big_key_data];
291*13100a72SKirill Marinushkin 		size_t enclen = ALIGN(datalen, crypto_blkcipher_blocksize(big_key_blkcipher));
292*13100a72SKirill Marinushkin 
293*13100a72SKirill Marinushkin 		data = kmalloc(enclen, GFP_KERNEL);
294*13100a72SKirill Marinushkin 		if (!data)
295*13100a72SKirill Marinushkin 			return -ENOMEM;
296ab3c3587SDavid Howells 
297ab3c3587SDavid Howells 		file = dentry_open(path, O_RDONLY, current_cred());
298*13100a72SKirill Marinushkin 		if (IS_ERR(file)) {
299*13100a72SKirill Marinushkin 			ret = PTR_ERR(file);
300*13100a72SKirill Marinushkin 			goto error;
301*13100a72SKirill Marinushkin 		}
302ab3c3587SDavid Howells 
303*13100a72SKirill Marinushkin 		/* read file to kernel and decrypt */
304*13100a72SKirill Marinushkin 		ret = kernel_read(file, 0, data, enclen);
305*13100a72SKirill Marinushkin 		if (ret >= 0 && ret != enclen) {
306ab3c3587SDavid Howells 			ret = -EIO;
307*13100a72SKirill Marinushkin 			goto err_fput;
308*13100a72SKirill Marinushkin 		}
309*13100a72SKirill Marinushkin 
310*13100a72SKirill Marinushkin 		ret = big_key_crypt(BIG_KEY_DEC, data, enclen, enckey);
311*13100a72SKirill Marinushkin 		if (ret)
312*13100a72SKirill Marinushkin 			goto err_fput;
313*13100a72SKirill Marinushkin 
314*13100a72SKirill Marinushkin 		ret = datalen;
315*13100a72SKirill Marinushkin 
316*13100a72SKirill Marinushkin 		/* copy decrypted data to user */
317*13100a72SKirill Marinushkin 		if (copy_to_user(buffer, data, datalen) != 0)
318*13100a72SKirill Marinushkin 			ret = -EFAULT;
319*13100a72SKirill Marinushkin 
320*13100a72SKirill Marinushkin err_fput:
321*13100a72SKirill Marinushkin 		fput(file);
322*13100a72SKirill Marinushkin error:
323*13100a72SKirill Marinushkin 		kfree(data);
324ab3c3587SDavid Howells 	} else {
325ab3c3587SDavid Howells 		ret = datalen;
326146aa8b1SDavid Howells 		if (copy_to_user(buffer, key->payload.data[big_key_data],
327146aa8b1SDavid Howells 				 datalen) != 0)
328ab3c3587SDavid Howells 			ret = -EFAULT;
329ab3c3587SDavid Howells 	}
330ab3c3587SDavid Howells 
331ab3c3587SDavid Howells 	return ret;
332ab3c3587SDavid Howells }
333ab3c3587SDavid Howells 
334*13100a72SKirill Marinushkin /*
335*13100a72SKirill Marinushkin  * Register key type
336*13100a72SKirill Marinushkin  */
337ab3c3587SDavid Howells static int __init big_key_init(void)
338ab3c3587SDavid Howells {
339ab3c3587SDavid Howells 	return register_key_type(&key_type_big_key);
340ab3c3587SDavid Howells }
341*13100a72SKirill Marinushkin 
342*13100a72SKirill Marinushkin /*
343*13100a72SKirill Marinushkin  * Initialize big_key crypto and RNG algorithms
344*13100a72SKirill Marinushkin  */
345*13100a72SKirill Marinushkin static int __init big_key_crypto_init(void)
346*13100a72SKirill Marinushkin {
347*13100a72SKirill Marinushkin 	int ret = -EINVAL;
348*13100a72SKirill Marinushkin 
349*13100a72SKirill Marinushkin 	/* init RNG */
350*13100a72SKirill Marinushkin 	big_key_rng = crypto_alloc_rng(big_key_rng_name, 0, 0);
351*13100a72SKirill Marinushkin 	if (IS_ERR(big_key_rng)) {
352*13100a72SKirill Marinushkin 		big_key_rng = NULL;
353*13100a72SKirill Marinushkin 		return -EFAULT;
354*13100a72SKirill Marinushkin 	}
355*13100a72SKirill Marinushkin 
356*13100a72SKirill Marinushkin 	/* seed RNG */
357*13100a72SKirill Marinushkin 	ret = crypto_rng_reset(big_key_rng, NULL, crypto_rng_seedsize(big_key_rng));
358*13100a72SKirill Marinushkin 	if (ret)
359*13100a72SKirill Marinushkin 		goto error;
360*13100a72SKirill Marinushkin 
361*13100a72SKirill Marinushkin 	/* init block cipher */
362*13100a72SKirill Marinushkin 	big_key_blkcipher = crypto_alloc_blkcipher(big_key_alg_name, 0, 0);
363*13100a72SKirill Marinushkin 	if (IS_ERR(big_key_blkcipher)) {
364*13100a72SKirill Marinushkin 		big_key_blkcipher = NULL;
365*13100a72SKirill Marinushkin 		ret = -EFAULT;
366*13100a72SKirill Marinushkin 		goto error;
367*13100a72SKirill Marinushkin 	}
368*13100a72SKirill Marinushkin 
369*13100a72SKirill Marinushkin 	return 0;
370*13100a72SKirill Marinushkin 
371*13100a72SKirill Marinushkin error:
372*13100a72SKirill Marinushkin 	crypto_free_rng(big_key_rng);
373*13100a72SKirill Marinushkin 	big_key_rng = NULL;
374*13100a72SKirill Marinushkin 	return ret;
375*13100a72SKirill Marinushkin }
376*13100a72SKirill Marinushkin 
377a1f2bdf3SPaul Gortmaker device_initcall(big_key_init);
378*13100a72SKirill Marinushkin late_initcall(big_key_crypto_init);
379