1 #include "config.h" 2 3 #include "image_verify.hpp" 4 5 #include "version.hpp" 6 7 #include <fcntl.h> 8 #include <openssl/err.h> 9 #include <sys/stat.h> 10 11 #include <phosphor-logging/elog-errors.hpp> 12 #include <phosphor-logging/elog.hpp> 13 #include <phosphor-logging/log.hpp> 14 #include <xyz/openbmc_project/Common/error.hpp> 15 16 #include <fstream> 17 #include <set> 18 19 namespace openpower 20 { 21 namespace software 22 { 23 namespace image 24 { 25 26 using namespace phosphor::logging; 27 using namespace openpower::software::updater; 28 using InternalFailure = 29 sdbusplus::xyz::openbmc_project::Common::Error::InternalFailure; 30 31 constexpr auto keyTypeTag = "KeyType"; 32 constexpr auto hashFunctionTag = "HashType"; 33 34 Signature::Signature(const std::filesystem::path& imageDirPath, 35 const std::string& pnorFileName, 36 const std::filesystem::path& signedConfPath) : 37 imageDirPath(imageDirPath), 38 pnorFileName(pnorFileName), signedConfPath(signedConfPath) 39 { 40 std::filesystem::path file(imageDirPath / MANIFEST_FILE); 41 42 auto keyValues = 43 Version::getValue(file, {{keyTypeTag, " "}, {hashFunctionTag, " "}}); 44 keyType = keyValues.at(keyTypeTag); 45 hashType = keyValues.at(hashFunctionTag); 46 } 47 48 AvailableKeyTypes Signature::getAvailableKeyTypesFromSystem() const 49 { 50 AvailableKeyTypes keyTypes{}; 51 52 // Find the path of all the files 53 if (!std::filesystem::is_directory(signedConfPath)) 54 { 55 log<level::ERR>("Signed configuration path not found in the system"); 56 elog<InternalFailure>(); 57 } 58 59 // Look for all the hash and public key file names get the key value 60 // For example: 61 // /etc/activationdata/OpenPOWER/publickey 62 // /etc/activationdata/OpenPOWER/hashfunc 63 // /etc/activationdata/GA/publickey 64 // /etc/activationdata/GA/hashfunc 65 // Set will have OpenPOWER, GA 66 67 for (const auto& p : 68 std::filesystem::recursive_directory_iterator(signedConfPath)) 69 { 70 if ((p.path().filename() == HASH_FILE_NAME) || 71 (p.path().filename() == PUBLICKEY_FILE_NAME)) 72 { 73 // extract the key types 74 // /etc/activationdata/GA/ -> get GA from the path 75 auto key = p.path().parent_path(); 76 keyTypes.insert(key.filename()); 77 } 78 } 79 80 return keyTypes; 81 } 82 83 inline KeyHashPathPair Signature::getKeyHashFileNames(const Key_t& key) const 84 { 85 std::filesystem::path hashpath(signedConfPath / key / HASH_FILE_NAME); 86 std::filesystem::path keyPath(signedConfPath / key / PUBLICKEY_FILE_NAME); 87 88 return std::make_pair(std::move(hashpath), std::move(keyPath)); 89 } 90 91 bool Signature::verify() 92 { 93 try 94 { 95 // Verify the MANIFEST and publickey file using available 96 // public keys and hash on the system. 97 if (false == systemLevelVerify()) 98 { 99 log<level::ERR>("System level Signature Validation failed"); 100 return false; 101 } 102 103 // image specific publickey file name. 104 std::filesystem::path publicKeyFile(imageDirPath / PUBLICKEY_FILE_NAME); 105 106 // Validate the PNOR image file. 107 // Build Image File name 108 std::filesystem::path file(imageDirPath); 109 file /= pnorFileName; 110 111 // Build Signature File name 112 std::string fileName = file.filename(); 113 std::filesystem::path sigFile(imageDirPath); 114 sigFile /= fileName + SIGNATURE_FILE_EXT; 115 116 // Verify the signature. 117 auto valid = verifyFile(file, sigFile, publicKeyFile, hashType); 118 if (valid == false) 119 { 120 log<level::ERR>("Image file Signature Validation failed", 121 entry("IMAGE=%s", pnorFileName.c_str())); 122 return false; 123 } 124 125 log<level::DEBUG>("Successfully completed Signature vaildation."); 126 127 return true; 128 } 129 catch (const InternalFailure& e) 130 { 131 return false; 132 } 133 catch (const std::exception& e) 134 { 135 log<level::ERR>(e.what()); 136 return false; 137 } 138 } 139 140 bool Signature::systemLevelVerify() 141 { 142 // Get available key types from the system. 143 auto keyTypes = getAvailableKeyTypesFromSystem(); 144 if (keyTypes.empty()) 145 { 146 log<level::ERR>("Missing Signature configuration data in system"); 147 elog<InternalFailure>(); 148 } 149 150 // Build publickey and its signature file name. 151 std::filesystem::path pkeyFile(imageDirPath / PUBLICKEY_FILE_NAME); 152 std::filesystem::path pkeyFileSig(pkeyFile); 153 pkeyFileSig.replace_extension(SIGNATURE_FILE_EXT); 154 155 // Build manifest and its signature file name. 156 std::filesystem::path manifestFile(imageDirPath / MANIFEST_FILE); 157 std::filesystem::path manifestFileSig(manifestFile); 158 manifestFileSig.replace_extension(SIGNATURE_FILE_EXT); 159 160 auto valid = false; 161 162 // Verify the file signature with available key types 163 // public keys and hash function. 164 // For any internal failure during the key/hash pair specific 165 // validation, should continue the validation with next 166 // available Key/hash pair. 167 for (const auto& keyType : keyTypes) 168 { 169 auto keyHashPair = getKeyHashFileNames(keyType); 170 auto keyValues = 171 Version::getValue(keyHashPair.first, {{hashFunctionTag, " "}}); 172 auto hashFunc = keyValues.at(hashFunctionTag); 173 174 try 175 { 176 // Verify manifest file signature 177 valid = verifyFile(manifestFile, manifestFileSig, 178 keyHashPair.second, hashFunc); 179 if (valid) 180 { 181 // Verify publickey file signature. 182 valid = verifyFile(pkeyFile, pkeyFileSig, keyHashPair.second, 183 hashFunc); 184 if (valid) 185 { 186 break; 187 } 188 } 189 } 190 catch (const InternalFailure& e) 191 { 192 valid = false; 193 } 194 } 195 return valid; 196 } 197 198 bool Signature::verifyFile(const std::filesystem::path& file, 199 const std::filesystem::path& sigFile, 200 const std::filesystem::path& publicKey, 201 const std::string& hashFunc) 202 { 203 204 // Check existence of the files in the system. 205 if (!(std::filesystem::exists(file) && std::filesystem::exists(sigFile))) 206 { 207 log<level::ERR>("Failed to find the Data or signature file.", 208 entry("FILE=%s", file.c_str())); 209 elog<InternalFailure>(); 210 } 211 212 // Create RSA. 213 auto publicRSA = createPublicRSA(publicKey); 214 if (!publicRSA) 215 { 216 log<level::ERR>("Failed to create RSA", 217 entry("FILE=%s", publicKey.c_str())); 218 elog<InternalFailure>(); 219 } 220 221 // Initializes a digest context. 222 EVP_MD_CTX_Ptr rsaVerifyCtx(EVP_MD_CTX_new(), ::EVP_MD_CTX_free); 223 224 // Adds all digest algorithms to the internal table 225 OpenSSL_add_all_digests(); 226 227 // Create Hash structure. 228 auto hashStruct = EVP_get_digestbyname(hashFunc.c_str()); 229 if (!hashStruct) 230 { 231 log<level::ERR>("EVP_get_digestbynam: Unknown message digest", 232 entry("HASH=%s", hashFunc.c_str())); 233 elog<InternalFailure>(); 234 } 235 236 auto result = EVP_DigestVerifyInit(rsaVerifyCtx.get(), nullptr, hashStruct, 237 nullptr, publicRSA.get()); 238 239 if (result <= 0) 240 { 241 log<level::ERR>("Error occurred during EVP_DigestVerifyInit", 242 entry("ERRCODE=%lu", ERR_get_error())); 243 elog<InternalFailure>(); 244 } 245 246 // Hash the data file and update the verification context 247 auto size = std::filesystem::file_size(file); 248 auto dataPtr = mapFile(file, size); 249 250 result = EVP_DigestVerifyUpdate(rsaVerifyCtx.get(), dataPtr(), size); 251 if (result <= 0) 252 { 253 log<level::ERR>("Error occurred during EVP_DigestVerifyUpdate", 254 entry("ERRCODE=%lu", ERR_get_error())); 255 elog<InternalFailure>(); 256 } 257 258 // Verify the data with signature. 259 size = std::filesystem::file_size(sigFile); 260 auto signature = mapFile(sigFile, size); 261 262 result = EVP_DigestVerifyFinal( 263 rsaVerifyCtx.get(), reinterpret_cast<unsigned char*>(signature()), 264 size); 265 266 // Check the verification result. 267 if (result < 0) 268 { 269 log<level::ERR>("Error occurred during EVP_DigestVerifyFinal", 270 entry("ERRCODE=%lu", ERR_get_error())); 271 elog<InternalFailure>(); 272 } 273 274 if (result == 0) 275 { 276 log<level::ERR>("EVP_DigestVerifyFinal:Signature validation failed", 277 entry("PATH=%s", sigFile.c_str())); 278 return false; 279 } 280 return true; 281 } 282 283 inline EVP_PKEY_Ptr 284 Signature::createPublicRSA(const std::filesystem::path& publicKey) 285 { 286 auto size = std::filesystem::file_size(publicKey); 287 288 // Read public key file 289 auto data = mapFile(publicKey, size); 290 291 BIO_MEM_Ptr keyBio(BIO_new_mem_buf(data(), -1), &::BIO_free); 292 if (keyBio.get() == nullptr) 293 { 294 log<level::ERR>("Failed to create new BIO Memory buffer"); 295 elog<InternalFailure>(); 296 } 297 298 return {PEM_read_bio_PUBKEY(keyBio.get(), nullptr, nullptr, nullptr), 299 &::EVP_PKEY_free}; 300 } 301 302 CustomMap Signature::mapFile(const std::filesystem::path& path, size_t size) 303 { 304 305 CustomFd fd(open(path.c_str(), O_RDONLY)); 306 307 return CustomMap(mmap(nullptr, size, PROT_READ, MAP_PRIVATE, fd(), 0), 308 size); 309 } 310 311 } // namespace image 312 } // namespace software 313 } // namespace openpower 314