1 #include "config.h" 2 3 #include "image_verify.hpp" 4 5 #include "version.hpp" 6 7 #include <fcntl.h> 8 #include <openssl/err.h> 9 #include <sys/stat.h> 10 11 #include <phosphor-logging/elog-errors.hpp> 12 #include <phosphor-logging/elog.hpp> 13 #include <phosphor-logging/log.hpp> 14 #include <xyz/openbmc_project/Common/error.hpp> 15 16 #include <fstream> 17 #include <set> 18 19 namespace openpower 20 { 21 namespace software 22 { 23 namespace image 24 { 25 26 using namespace phosphor::logging; 27 using namespace openpower::software::updater; 28 using InternalFailure = 29 sdbusplus::xyz::openbmc_project::Common::Error::InternalFailure; 30 31 constexpr auto keyTypeTag = "KeyType"; 32 constexpr auto hashFunctionTag = "HashType"; 33 34 Signature::Signature(const std::filesystem::path& imageDirPath, 35 const std::string& pnorFileName, 36 const std::filesystem::path& signedConfPath) : 37 imageDirPath(imageDirPath), 38 pnorFileName(pnorFileName), signedConfPath(signedConfPath) 39 { 40 std::filesystem::path file(imageDirPath / MANIFEST_FILE); 41 42 auto keyValues = 43 Version::getValue(file, {{keyTypeTag, " "}, {hashFunctionTag, " "}}); 44 keyType = keyValues.at(keyTypeTag); 45 hashType = keyValues.at(hashFunctionTag); 46 } 47 48 AvailableKeyTypes Signature::getAvailableKeyTypesFromSystem() const 49 { 50 AvailableKeyTypes keyTypes{}; 51 52 // Find the path of all the files 53 if (!std::filesystem::is_directory(signedConfPath)) 54 { 55 log<level::ERR>("Signed configuration path not found in the system"); 56 elog<InternalFailure>(); 57 } 58 59 // Look for all the hash and public key file names get the key value 60 // For example: 61 // /etc/activationdata/OpenPOWER/publickey 62 // /etc/activationdata/OpenPOWER/hashfunc 63 // /etc/activationdata/GA/publickey 64 // /etc/activationdata/GA/hashfunc 65 // Set will have OpenPOWER, GA 66 67 for (const auto& p : 68 std::filesystem::recursive_directory_iterator(signedConfPath)) 69 { 70 if ((p.path().filename() == HASH_FILE_NAME) || 71 (p.path().filename() == PUBLICKEY_FILE_NAME)) 72 { 73 // extract the key types 74 // /etc/activationdata/GA/ -> get GA from the path 75 auto key = p.path().parent_path(); 76 keyTypes.insert(key.filename()); 77 } 78 } 79 80 return keyTypes; 81 } 82 83 inline KeyHashPathPair Signature::getKeyHashFileNames(const Key_t& key) const 84 { 85 std::filesystem::path hashpath(signedConfPath / key / HASH_FILE_NAME); 86 std::filesystem::path keyPath(signedConfPath / key / PUBLICKEY_FILE_NAME); 87 88 return std::make_pair(std::move(hashpath), std::move(keyPath)); 89 } 90 91 bool Signature::verify() 92 { 93 try 94 { 95 // Verify the MANIFEST and publickey file using available 96 // public keys and hash on the system. 97 if (false == systemLevelVerify()) 98 { 99 log<level::ERR>("System level Signature Validation failed"); 100 return false; 101 } 102 103 // image specific publickey file name. 104 std::filesystem::path publicKeyFile(imageDirPath / PUBLICKEY_FILE_NAME); 105 106 // Validate the PNOR image file. 107 // Build Image File name 108 std::filesystem::path file(imageDirPath); 109 file /= pnorFileName; 110 111 // Build Signature File name 112 std::string fileName = file.filename(); 113 std::filesystem::path sigFile(imageDirPath); 114 sigFile /= fileName + SIGNATURE_FILE_EXT; 115 116 // Verify the signature. 117 auto valid = verifyFile(file, sigFile, publicKeyFile, hashType); 118 if (valid == false) 119 { 120 log<level::ERR>("Image file Signature Validation failed", 121 entry("IMAGE=%s", pnorFileName.c_str())); 122 return false; 123 } 124 125 log<level::DEBUG>("Successfully completed Signature vaildation."); 126 127 return true; 128 } 129 catch (const InternalFailure& e) 130 { 131 return false; 132 } 133 catch (const std::exception& e) 134 { 135 log<level::ERR>(e.what()); 136 return false; 137 } 138 } 139 140 bool Signature::systemLevelVerify() 141 { 142 // Get available key types from the system. 143 auto keyTypes = getAvailableKeyTypesFromSystem(); 144 if (keyTypes.empty()) 145 { 146 log<level::ERR>("Missing Signature configuration data in system"); 147 elog<InternalFailure>(); 148 } 149 150 // Build publickey and its signature file name. 151 std::filesystem::path pkeyFile(imageDirPath / PUBLICKEY_FILE_NAME); 152 std::filesystem::path pkeyFileSig(pkeyFile); 153 pkeyFileSig.replace_extension(SIGNATURE_FILE_EXT); 154 155 // Build manifest and its signature file name. 156 std::filesystem::path manifestFile(imageDirPath / MANIFEST_FILE); 157 std::filesystem::path manifestFileSig(manifestFile); 158 manifestFileSig.replace_extension(SIGNATURE_FILE_EXT); 159 160 auto valid = false; 161 162 // Verify the file signature with available key types 163 // public keys and hash function. 164 // For any internal failure during the key/hash pair specific 165 // validation, should continue the validation with next 166 // available Key/hash pair. 167 for (const auto& keyType : keyTypes) 168 { 169 auto keyHashPair = getKeyHashFileNames(keyType); 170 auto keyValues = Version::getValue(keyHashPair.first, 171 {{hashFunctionTag, " "}}); 172 auto hashFunc = keyValues.at(hashFunctionTag); 173 174 try 175 { 176 // Verify manifest file signature 177 valid = verifyFile(manifestFile, manifestFileSig, 178 keyHashPair.second, hashFunc); 179 if (valid) 180 { 181 // Verify publickey file signature. 182 valid = verifyFile(pkeyFile, pkeyFileSig, keyHashPair.second, 183 hashFunc); 184 if (valid) 185 { 186 break; 187 } 188 } 189 } 190 catch (const InternalFailure& e) 191 { 192 valid = false; 193 } 194 } 195 return valid; 196 } 197 198 bool Signature::verifyFile(const std::filesystem::path& file, 199 const std::filesystem::path& sigFile, 200 const std::filesystem::path& publicKey, 201 const std::string& hashFunc) 202 { 203 // Check existence of the files in the system. 204 if (!(std::filesystem::exists(file) && std::filesystem::exists(sigFile))) 205 { 206 log<level::ERR>("Failed to find the Data or signature file.", 207 entry("FILE=%s", file.c_str())); 208 elog<InternalFailure>(); 209 } 210 211 // Create RSA. 212 auto publicRSA = createPublicRSA(publicKey); 213 if (!publicRSA) 214 { 215 log<level::ERR>("Failed to create RSA", 216 entry("FILE=%s", publicKey.c_str())); 217 elog<InternalFailure>(); 218 } 219 220 // Initializes a digest context. 221 EVP_MD_CTX_Ptr rsaVerifyCtx(EVP_MD_CTX_new(), ::EVP_MD_CTX_free); 222 223 // Adds all digest algorithms to the internal table 224 OpenSSL_add_all_digests(); 225 226 // Create Hash structure. 227 auto hashStruct = EVP_get_digestbyname(hashFunc.c_str()); 228 if (!hashStruct) 229 { 230 log<level::ERR>("EVP_get_digestbynam: Unknown message digest", 231 entry("HASH=%s", hashFunc.c_str())); 232 elog<InternalFailure>(); 233 } 234 235 auto result = EVP_DigestVerifyInit(rsaVerifyCtx.get(), nullptr, hashStruct, 236 nullptr, publicRSA.get()); 237 238 if (result <= 0) 239 { 240 log<level::ERR>("Error occurred during EVP_DigestVerifyInit", 241 entry("ERRCODE=%lu", ERR_get_error())); 242 elog<InternalFailure>(); 243 } 244 245 // Hash the data file and update the verification context 246 auto size = std::filesystem::file_size(file); 247 auto dataPtr = mapFile(file, size); 248 249 result = EVP_DigestVerifyUpdate(rsaVerifyCtx.get(), dataPtr(), size); 250 if (result <= 0) 251 { 252 log<level::ERR>("Error occurred during EVP_DigestVerifyUpdate", 253 entry("ERRCODE=%lu", ERR_get_error())); 254 elog<InternalFailure>(); 255 } 256 257 // Verify the data with signature. 258 size = std::filesystem::file_size(sigFile); 259 auto signature = mapFile(sigFile, size); 260 261 result = EVP_DigestVerifyFinal( 262 rsaVerifyCtx.get(), reinterpret_cast<unsigned char*>(signature()), 263 size); 264 265 // Check the verification result. 266 if (result < 0) 267 { 268 log<level::ERR>("Error occurred during EVP_DigestVerifyFinal", 269 entry("ERRCODE=%lu", ERR_get_error())); 270 elog<InternalFailure>(); 271 } 272 273 if (result == 0) 274 { 275 log<level::ERR>("EVP_DigestVerifyFinal:Signature validation failed", 276 entry("PATH=%s", sigFile.c_str())); 277 return false; 278 } 279 return true; 280 } 281 282 inline EVP_PKEY_Ptr 283 Signature::createPublicRSA(const std::filesystem::path& publicKey) 284 { 285 auto size = std::filesystem::file_size(publicKey); 286 287 // Read public key file 288 auto data = mapFile(publicKey, size); 289 290 BIO_MEM_Ptr keyBio(BIO_new_mem_buf(data(), -1), &::BIO_free); 291 if (keyBio.get() == nullptr) 292 { 293 log<level::ERR>("Failed to create new BIO Memory buffer"); 294 elog<InternalFailure>(); 295 } 296 297 return {PEM_read_bio_PUBKEY(keyBio.get(), nullptr, nullptr, nullptr), 298 &::EVP_PKEY_free}; 299 } 300 301 CustomMap Signature::mapFile(const std::filesystem::path& path, size_t size) 302 { 303 CustomFd fd(open(path.c_str(), O_RDONLY)); 304 305 return CustomMap(mmap(nullptr, size, PROT_READ, MAP_PRIVATE, fd(), 0), 306 size); 307 } 308 309 } // namespace image 310 } // namespace software 311 } // namespace openpower 312