You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
118 lines
3.5 KiB
118 lines
3.5 KiB
7 months ago
|
/*
|
||
|
* Copyright (C) 2016 The Android Open Source Project
|
||
|
*
|
||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||
|
* you may not use this file except in compliance with the License.
|
||
|
* You may obtain a copy of the License at
|
||
|
*
|
||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||
|
*
|
||
|
* Unless required by applicable law or agreed to in writing, software
|
||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||
|
* See the License for the specific language governing permissions and
|
||
|
* limitations under the License.
|
||
|
*/
|
||
|
|
||
|
#include <errno.h>
|
||
|
#include <stdio.h>
|
||
|
#include <stdlib.h>
|
||
|
|
||
|
#include <memory>
|
||
|
#include <string>
|
||
|
|
||
|
#include <android-base/file.h>
|
||
|
#include <android-base/unique_fd.h>
|
||
|
#include <crypto_utils/android_pubkey.h>
|
||
|
#include <fec/io.h>
|
||
|
#include <openssl/obj_mac.h>
|
||
|
#include <openssl/rsa.h>
|
||
|
#include <openssl/sha.h>
|
||
|
#include <sparse/sparse.h>
|
||
|
|
||
|
static RSA* load_key(const char* path) {
|
||
|
std::string content;
|
||
|
if (!android::base::ReadFileToString(path, &content) ||
|
||
|
content.size() < ANDROID_PUBKEY_ENCODED_SIZE) {
|
||
|
fprintf(stderr, "Failed to load key from %s\n", path);
|
||
|
return nullptr;
|
||
|
}
|
||
|
|
||
|
RSA* key = nullptr;
|
||
|
if (!android_pubkey_decode(reinterpret_cast<const uint8_t*>(content.c_str()),
|
||
|
ANDROID_PUBKEY_ENCODED_SIZE, &key)) {
|
||
|
fprintf(stderr, "Failed to parse key!\n");
|
||
|
return nullptr;
|
||
|
}
|
||
|
|
||
|
return key;
|
||
|
}
|
||
|
|
||
|
static int verify_table(const char* key_path, const uint8_t* signature, size_t signature_size,
|
||
|
const char* table, uint32_t table_length) {
|
||
|
// Hash the table
|
||
|
uint8_t hash_buf[SHA256_DIGEST_LENGTH];
|
||
|
SHA256(const_cast<uint8_t*>(reinterpret_cast<const uint8_t*>(table)), table_length, hash_buf);
|
||
|
|
||
|
// Now get the public key from the keyfile
|
||
|
std::unique_ptr<RSA, decltype(&RSA_free)> key(load_key(key_path), RSA_free);
|
||
|
if (!key) {
|
||
|
fprintf(stderr, "Couldn't load verity keys\n");
|
||
|
return -1;
|
||
|
}
|
||
|
|
||
|
// Verify the result
|
||
|
if (!RSA_verify(NID_sha256, hash_buf, sizeof(hash_buf), signature, signature_size, key.get())) {
|
||
|
fprintf(stderr, "Couldn't verify table\n");
|
||
|
return -1;
|
||
|
}
|
||
|
|
||
|
return 0;
|
||
|
}
|
||
|
|
||
|
int main(int argc, char* argv[]) {
|
||
|
if (argc != 4 || strcmp(argv[2], "-mincrypt") != 0) {
|
||
|
printf("Usage: %s <image> -mincrypt <verity_key>\n"
|
||
|
" image the image file (raw or sparse image) to be verified\n"
|
||
|
" verity_key the verity key in mincrypt format (/verity_key on device)\n", argv[0]);
|
||
|
return 2;
|
||
|
}
|
||
|
|
||
|
// Get the raw image.
|
||
|
android::base::unique_fd fd(open(argv[1], O_RDONLY));
|
||
|
if (fd == -1) {
|
||
|
fprintf(stderr, "failed to open %s: %s\n", argv[1], strerror(errno));
|
||
|
return 1;
|
||
|
}
|
||
|
|
||
|
struct sparse_file* file = sparse_file_import_auto(fd, false, false);
|
||
|
if (file == nullptr) {
|
||
|
fprintf(stderr, "failed to read file %s\n", argv[1]);
|
||
|
return 1;
|
||
|
}
|
||
|
|
||
|
TemporaryFile tf;
|
||
|
if (sparse_file_write(file, tf.fd, false, false, false) < 0) {
|
||
|
fprintf(stderr, "failed to write output file\n");
|
||
|
return 1;
|
||
|
}
|
||
|
sparse_file_destroy(file);
|
||
|
|
||
|
// Verify.
|
||
|
fec::io input(tf.path);
|
||
|
if (!input) {
|
||
|
return 1;
|
||
|
}
|
||
|
|
||
|
fec_verity_metadata verity;
|
||
|
if (!input.get_verity_metadata(verity)) {
|
||
|
fprintf(stderr, "failed to get verity metadata\n");
|
||
|
return 1;
|
||
|
}
|
||
|
|
||
|
int ret = verify_table(argv[3], verity.signature, sizeof(verity.signature),
|
||
|
verity.table, verity.table_length);
|
||
|
printf("%s\n", ret == 0 ? "VERIFIED" : "FAILED");
|
||
|
return ret;
|
||
|
}
|