xref: /openbmc/phosphor-net-ipmid/command/rakp34.cpp (revision 83029cb8ede836420e3c4d13e20968b661b6a2e4)
150fb50a9STom Joseph #include "rakp34.hpp"
250fb50a9STom Joseph 
350fb50a9STom Joseph #include <algorithm>
450fb50a9STom Joseph #include <cstring>
550fb50a9STom Joseph #include <iostream>
650fb50a9STom Joseph 
750fb50a9STom Joseph #include "comm_module.hpp"
850fb50a9STom Joseph #include "endian.hpp"
950fb50a9STom Joseph #include "guid.hpp"
1050fb50a9STom Joseph #include "main.hpp"
1150fb50a9STom Joseph 
1250fb50a9STom Joseph namespace command
1350fb50a9STom Joseph {
1450fb50a9STom Joseph 
15ef02fb3dSTom Joseph void applyIntegrityAlgo(const uint32_t bmcSessionID)
16ef02fb3dSTom Joseph {
17ef02fb3dSTom Joseph     auto session = (std::get<session::Manager&>(singletonPool).getSession(
18ef02fb3dSTom Joseph             bmcSessionID)).lock();
19ef02fb3dSTom Joseph 
20ef02fb3dSTom Joseph     auto authAlgo = session->getAuthAlgo();
21ef02fb3dSTom Joseph 
22ef02fb3dSTom Joseph     switch (authAlgo->intAlgo)
23ef02fb3dSTom Joseph     {
24ef02fb3dSTom Joseph         case cipher::integrity::Algorithms::HMAC_SHA1_96:
25ef02fb3dSTom Joseph         {
26ef02fb3dSTom Joseph             session->setIntegrityAlgo(
27ef02fb3dSTom Joseph                     std::make_unique<cipher::integrity::AlgoSHA1>(
28ef02fb3dSTom Joseph                         authAlgo->sessionIntegrityKey));
29ef02fb3dSTom Joseph             break;
30ef02fb3dSTom Joseph         }
31ef02fb3dSTom Joseph         default:
32ef02fb3dSTom Joseph             break;
33ef02fb3dSTom Joseph     }
34ef02fb3dSTom Joseph }
35ef02fb3dSTom Joseph 
364c766eb1STom Joseph void applyCryptAlgo(const uint32_t bmcSessionID)
374c766eb1STom Joseph {
384c766eb1STom Joseph     auto session = (std::get<session::Manager&>(singletonPool).getSession(
394c766eb1STom Joseph             bmcSessionID)).lock();
404c766eb1STom Joseph 
414c766eb1STom Joseph     auto authAlgo = session->getAuthAlgo();
424c766eb1STom Joseph 
434c766eb1STom Joseph     switch (authAlgo->cryptAlgo)
444c766eb1STom Joseph     {
454c766eb1STom Joseph         case cipher::crypt::Algorithms::AES_CBC_128:
464c766eb1STom Joseph         {
474c766eb1STom Joseph             session->setCryptAlgo(std::make_unique<cipher::crypt::AlgoAES128>(
484c766eb1STom Joseph                                  authAlgo->sessionIntegrityKey));
494c766eb1STom Joseph             break;
504c766eb1STom Joseph         }
514c766eb1STom Joseph         default:
524c766eb1STom Joseph             break;
534c766eb1STom Joseph     }
544c766eb1STom Joseph }
554c766eb1STom Joseph 
5618a45e9dSTom Joseph std::vector<uint8_t> RAKP34(const std::vector<uint8_t>& inPayload,
5750fb50a9STom Joseph                             const message::Handler& handler)
5850fb50a9STom Joseph {
5950fb50a9STom Joseph     std::cout << ">> RAKP34\n";
6050fb50a9STom Joseph 
6150fb50a9STom Joseph     std::vector<uint8_t> outPayload(sizeof(RAKP4response));
6218a45e9dSTom Joseph     auto request = reinterpret_cast<const RAKP3request*>(inPayload.data());
6350fb50a9STom Joseph     auto response = reinterpret_cast<RAKP4response*>(outPayload.data());
6450fb50a9STom Joseph 
6550fb50a9STom Joseph     // Check if the RAKP3 Payload Length is as expected
6650fb50a9STom Joseph     if(inPayload.size() != sizeof(RAKP3request))
6750fb50a9STom Joseph     {
6850fb50a9STom Joseph         std::cerr << "RAKP34: Invalid RAKP3 request\n";
6950fb50a9STom Joseph         response->rmcpStatusCode =
7050fb50a9STom Joseph             static_cast<uint8_t>(RAKP_ReturnCode::INVALID_INTEGRITY_VALUE);
7150fb50a9STom Joseph         return outPayload;
7250fb50a9STom Joseph     }
7350fb50a9STom Joseph 
7450fb50a9STom Joseph     // Session ID zero is reserved for Session Setup
7550fb50a9STom Joseph     if(endian::from_ipmi(request->managedSystemSessionID) ==
7650fb50a9STom Joseph                          session::SESSION_ZERO)
7750fb50a9STom Joseph     {
7850fb50a9STom Joseph         std::cerr << "RAKP34: BMC invalid Session ID\n";
7950fb50a9STom Joseph         response->rmcpStatusCode =
8050fb50a9STom Joseph             static_cast<uint8_t>(RAKP_ReturnCode::INVALID_SESSION_ID);
8150fb50a9STom Joseph         return outPayload;
8250fb50a9STom Joseph     }
8350fb50a9STom Joseph 
8450fb50a9STom Joseph     std::shared_ptr<session::Session> session;
8550fb50a9STom Joseph     try
8650fb50a9STom Joseph     {
8750fb50a9STom Joseph         session = (std::get<session::Manager&>(singletonPool).getSession(
8850fb50a9STom Joseph             endian::from_ipmi(request->managedSystemSessionID))).lock();
8950fb50a9STom Joseph     }
9050fb50a9STom Joseph     catch (std::exception& e)
9150fb50a9STom Joseph     {
9250fb50a9STom Joseph         std::cerr << e.what() << "\n";
9350fb50a9STom Joseph         response->rmcpStatusCode =
9450fb50a9STom Joseph             static_cast<uint8_t>(RAKP_ReturnCode::INVALID_SESSION_ID);
9550fb50a9STom Joseph         return outPayload;
9650fb50a9STom Joseph     }
9750fb50a9STom Joseph 
9850fb50a9STom Joseph     session->updateLastTransactionTime();
9950fb50a9STom Joseph 
10050fb50a9STom Joseph     auto authAlgo = session->getAuthAlgo();
10150fb50a9STom Joseph     /*
10250fb50a9STom Joseph      * Key Authentication Code - RAKP 3
10350fb50a9STom Joseph      *
10450fb50a9STom Joseph      * 1) Managed System Random Number - 16 bytes
10550fb50a9STom Joseph      * 2) Remote Console Session ID - 4 bytes
10650fb50a9STom Joseph      * 3) Session Privilege Level - 1 byte
10750fb50a9STom Joseph      * 4) User Name Length Byte - 1 byte (0 for 'null' username)
10850fb50a9STom Joseph      * 5) User Name - variable (absent for 'null' username)
10950fb50a9STom Joseph      */
11050fb50a9STom Joseph 
11150fb50a9STom Joseph     // Remote Console Session ID
11250fb50a9STom Joseph     auto rcSessionID = endian::to_ipmi(session->getRCSessionID());
11350fb50a9STom Joseph 
11450fb50a9STom Joseph     // Session Privilege Level
11550fb50a9STom Joseph     auto sessPrivLevel = static_cast<uint8_t>(session->curPrivLevel);
11650fb50a9STom Joseph 
11750fb50a9STom Joseph     // User Name Length Byte
11850fb50a9STom Joseph     uint8_t userLength = 0;
11950fb50a9STom Joseph 
12050fb50a9STom Joseph     std::vector<uint8_t> input;
12150fb50a9STom Joseph     input.resize(cipher::rakp_auth::BMC_RANDOM_NUMBER_LEN +
12250fb50a9STom Joseph                  sizeof(rcSessionID) + sizeof(sessPrivLevel) +
12350fb50a9STom Joseph                  sizeof(userLength));
12450fb50a9STom Joseph 
12550fb50a9STom Joseph     auto iter = input.begin();
12650fb50a9STom Joseph 
12750fb50a9STom Joseph     // Managed System Random Number
12850fb50a9STom Joseph     std::copy(authAlgo->bmcRandomNum.begin(), authAlgo->bmcRandomNum.end(),
12950fb50a9STom Joseph               iter);
13050fb50a9STom Joseph     std::advance(iter, cipher::rakp_auth::BMC_RANDOM_NUMBER_LEN);
13150fb50a9STom Joseph 
13250fb50a9STom Joseph     // Remote Console Session ID
13350fb50a9STom Joseph     std::copy_n(reinterpret_cast<uint8_t*>(&rcSessionID), sizeof(rcSessionID),
13450fb50a9STom Joseph                 iter);
13550fb50a9STom Joseph     std::advance(iter, sizeof(rcSessionID));
13650fb50a9STom Joseph 
13750fb50a9STom Joseph     // Session Privilege Level
13850fb50a9STom Joseph     std::copy_n(reinterpret_cast<uint8_t*>(&sessPrivLevel),
13950fb50a9STom Joseph                 sizeof(sessPrivLevel), iter);
14050fb50a9STom Joseph     std::advance(iter, sizeof(sessPrivLevel));
14150fb50a9STom Joseph 
14250fb50a9STom Joseph     // User Name Length Byte
14350fb50a9STom Joseph     std::copy_n(&userLength, sizeof(userLength), iter);
14450fb50a9STom Joseph 
14550fb50a9STom Joseph     // Generate Key Exchange Authentication Code - RAKP2
14650fb50a9STom Joseph     auto output = authAlgo->generateHMAC(input);
14750fb50a9STom Joseph 
14850fb50a9STom Joseph     if (std::memcmp(output.data(), request->keyExchangeAuthCode,
14950fb50a9STom Joseph                     output.size()))
15050fb50a9STom Joseph     {
15150fb50a9STom Joseph         std::cerr << "Mismatch in HMAC sent by remote console\n";
15250fb50a9STom Joseph 
15350fb50a9STom Joseph         response->messageTag = request->messageTag;
15450fb50a9STom Joseph         response->rmcpStatusCode = static_cast<uint8_t>
15550fb50a9STom Joseph                                    (RAKP_ReturnCode::INVALID_INTEGRITY_VALUE);
15650fb50a9STom Joseph         response->reserved = 0;
15750fb50a9STom Joseph         response->remoteConsoleSessionID = rcSessionID;
15850fb50a9STom Joseph 
15950fb50a9STom Joseph         //close the session
16050fb50a9STom Joseph         std::get<session::Manager&>(singletonPool).stopSession(
16150fb50a9STom Joseph             session->getBMCSessionID());
16250fb50a9STom Joseph 
16350fb50a9STom Joseph         return outPayload;
16450fb50a9STom Joseph     }
16550fb50a9STom Joseph 
16650fb50a9STom Joseph     /*
16750fb50a9STom Joseph      * Session Integrity Key
16850fb50a9STom Joseph      *
16950fb50a9STom Joseph      * 1) Remote Console Random Number - 16 bytes
17050fb50a9STom Joseph      * 2) Managed System Random Number - 16 bytes
17150fb50a9STom Joseph      * 3) Session Privilege Level - 1 byte
17250fb50a9STom Joseph      * 4) User Name Length Byte - 1 byte (0 for 'null' username)
17350fb50a9STom Joseph      * 5) User Name - variable (absent for 'null' username)
17450fb50a9STom Joseph      */
17550fb50a9STom Joseph 
17650fb50a9STom Joseph     input.clear();
17750fb50a9STom Joseph 
17850fb50a9STom Joseph     input.resize(cipher::rakp_auth::REMOTE_CONSOLE_RANDOM_NUMBER_LEN +
17950fb50a9STom Joseph                  cipher::rakp_auth::BMC_RANDOM_NUMBER_LEN +
18050fb50a9STom Joseph                  sizeof(sessPrivLevel) + sizeof(userLength));
18150fb50a9STom Joseph     iter = input.begin();
18250fb50a9STom Joseph 
18350fb50a9STom Joseph     // Remote Console Random Number
18450fb50a9STom Joseph     std::copy(authAlgo->rcRandomNum.begin(), authAlgo->rcRandomNum.end(),
18550fb50a9STom Joseph               iter);
18650fb50a9STom Joseph     std::advance(iter, cipher::rakp_auth::REMOTE_CONSOLE_RANDOM_NUMBER_LEN);
18750fb50a9STom Joseph 
18850fb50a9STom Joseph     // Managed Console Random Number
18950fb50a9STom Joseph     std::copy(authAlgo->bmcRandomNum.begin(), authAlgo->bmcRandomNum.end(),
19050fb50a9STom Joseph               iter);
19150fb50a9STom Joseph     std::advance(iter, cipher::rakp_auth::BMC_RANDOM_NUMBER_LEN);
19250fb50a9STom Joseph 
19350fb50a9STom Joseph     // Session Privilege Level
19450fb50a9STom Joseph     std::copy_n(reinterpret_cast<uint8_t*>(&sessPrivLevel),
19550fb50a9STom Joseph                 sizeof(sessPrivLevel), iter);
19650fb50a9STom Joseph     std::advance(iter, sizeof(sessPrivLevel));
19750fb50a9STom Joseph 
19850fb50a9STom Joseph     // User Name Length Byte
19950fb50a9STom Joseph     std::copy_n(&userLength, sizeof(userLength), iter);
20050fb50a9STom Joseph 
20150fb50a9STom Joseph     // Generate Session Integrity Key
20250fb50a9STom Joseph     auto sikOutput = authAlgo->generateHMAC(input);
20350fb50a9STom Joseph 
20450fb50a9STom Joseph     // Update the SIK in the Authentication Algo Interface
20550fb50a9STom Joseph     authAlgo->sessionIntegrityKey.insert(authAlgo->sessionIntegrityKey.begin(),
20650fb50a9STom Joseph                                          sikOutput.begin(), sikOutput.end());
20750fb50a9STom Joseph 
20850fb50a9STom Joseph     /*
20950fb50a9STom Joseph      * Integrity Check Value
21050fb50a9STom Joseph      *
21150fb50a9STom Joseph      * 1) Remote Console Random Number - 16 bytes
21250fb50a9STom Joseph      * 2) Managed System Session ID - 4 bytes
21350fb50a9STom Joseph      * 3) Managed System GUID - 16 bytes
21450fb50a9STom Joseph      */
21550fb50a9STom Joseph 
21650fb50a9STom Joseph     // Get Managed System Session ID
21750fb50a9STom Joseph     auto bmcSessionID = endian::to_ipmi(session->getBMCSessionID());
21850fb50a9STom Joseph 
21950fb50a9STom Joseph     input.clear();
22050fb50a9STom Joseph 
22150fb50a9STom Joseph     input.resize(cipher::rakp_auth::REMOTE_CONSOLE_RANDOM_NUMBER_LEN +
22250fb50a9STom Joseph                  sizeof(bmcSessionID) + BMC_GUID_LEN);
22350fb50a9STom Joseph     iter = input.begin();
22450fb50a9STom Joseph 
22550fb50a9STom Joseph     // Remote Console Random Number
22650fb50a9STom Joseph     std::copy(authAlgo->rcRandomNum.begin(), authAlgo->rcRandomNum.end(),
22750fb50a9STom Joseph               iter);
22850fb50a9STom Joseph     std::advance(iter, cipher::rakp_auth::REMOTE_CONSOLE_RANDOM_NUMBER_LEN);
22950fb50a9STom Joseph 
23050fb50a9STom Joseph     // Managed System Session ID
23150fb50a9STom Joseph     std::copy_n(reinterpret_cast<uint8_t*>(&bmcSessionID), sizeof(bmcSessionID),
23250fb50a9STom Joseph                 iter);
23350fb50a9STom Joseph     std::advance(iter, sizeof(bmcSessionID));
23450fb50a9STom Joseph 
23550fb50a9STom Joseph     // Managed System GUID
236*83029cb8STom Joseph     std::copy_n(cache::guid.data(), cache::guid.size(), iter);
23750fb50a9STom Joseph 
23850fb50a9STom Joseph     // Integrity Check Value
23950fb50a9STom Joseph     auto icv = authAlgo->generateICV(input);
24050fb50a9STom Joseph 
24150fb50a9STom Joseph     outPayload.resize(sizeof(RAKP4response));
24250fb50a9STom Joseph 
24350fb50a9STom Joseph     response->messageTag = request->messageTag;
24450fb50a9STom Joseph     response->rmcpStatusCode = static_cast<uint8_t>(RAKP_ReturnCode::NO_ERROR);
24550fb50a9STom Joseph     response->reserved = 0;
24650fb50a9STom Joseph     response->remoteConsoleSessionID = rcSessionID;
24750fb50a9STom Joseph 
24850fb50a9STom Joseph     // Insert the HMAC output into the payload
24950fb50a9STom Joseph     outPayload.insert(outPayload.end(), icv.begin(), icv.end());
25050fb50a9STom Joseph 
251ef02fb3dSTom Joseph     // Set the Integrity Algorithm
252ef02fb3dSTom Joseph     applyIntegrityAlgo(session->getBMCSessionID());
253818d0701STom Joseph 
2544c766eb1STom Joseph     // Set the Confidentiality Algorithm
2554c766eb1STom Joseph     applyCryptAlgo(session->getBMCSessionID());
2564c766eb1STom Joseph 
25750fb50a9STom Joseph     session->state = session::State::ACTIVE;
25850fb50a9STom Joseph 
25950fb50a9STom Joseph     std::cout << "<< RAKP34\n";
26050fb50a9STom Joseph     return outPayload;
26150fb50a9STom Joseph }
26250fb50a9STom Joseph 
26350fb50a9STom Joseph } // namespace command
264