xref: /aosp_15_r20/system/extras/verity/verity_verifier.cpp (revision 288bf5226967eb3dac5cce6c939ccc2a7f2b4fe5)
1*288bf522SAndroid Build Coastguard Worker /*
2*288bf522SAndroid Build Coastguard Worker  * Copyright (C) 2016 The Android Open Source Project
3*288bf522SAndroid Build Coastguard Worker  *
4*288bf522SAndroid Build Coastguard Worker  * Licensed under the Apache License, Version 2.0 (the "License");
5*288bf522SAndroid Build Coastguard Worker  * you may not use this file except in compliance with the License.
6*288bf522SAndroid Build Coastguard Worker  * You may obtain a copy of the License at
7*288bf522SAndroid Build Coastguard Worker  *
8*288bf522SAndroid Build Coastguard Worker  *      http://www.apache.org/licenses/LICENSE-2.0
9*288bf522SAndroid Build Coastguard Worker  *
10*288bf522SAndroid Build Coastguard Worker  * Unless required by applicable law or agreed to in writing, software
11*288bf522SAndroid Build Coastguard Worker  * distributed under the License is distributed on an "AS IS" BASIS,
12*288bf522SAndroid Build Coastguard Worker  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13*288bf522SAndroid Build Coastguard Worker  * See the License for the specific language governing permissions and
14*288bf522SAndroid Build Coastguard Worker  * limitations under the License.
15*288bf522SAndroid Build Coastguard Worker  */
16*288bf522SAndroid Build Coastguard Worker 
17*288bf522SAndroid Build Coastguard Worker #include <errno.h>
18*288bf522SAndroid Build Coastguard Worker #include <stdio.h>
19*288bf522SAndroid Build Coastguard Worker #include <stdlib.h>
20*288bf522SAndroid Build Coastguard Worker 
21*288bf522SAndroid Build Coastguard Worker #include <memory>
22*288bf522SAndroid Build Coastguard Worker #include <string>
23*288bf522SAndroid Build Coastguard Worker 
24*288bf522SAndroid Build Coastguard Worker #include <android-base/file.h>
25*288bf522SAndroid Build Coastguard Worker #include <android-base/unique_fd.h>
26*288bf522SAndroid Build Coastguard Worker #include <crypto_utils/android_pubkey.h>
27*288bf522SAndroid Build Coastguard Worker #include <fec/io.h>
28*288bf522SAndroid Build Coastguard Worker #include <openssl/obj_mac.h>
29*288bf522SAndroid Build Coastguard Worker #include <openssl/rsa.h>
30*288bf522SAndroid Build Coastguard Worker #include <openssl/sha.h>
31*288bf522SAndroid Build Coastguard Worker #include <sparse/sparse.h>
32*288bf522SAndroid Build Coastguard Worker 
load_key(const char * path)33*288bf522SAndroid Build Coastguard Worker static RSA* load_key(const char* path) {
34*288bf522SAndroid Build Coastguard Worker   std::string content;
35*288bf522SAndroid Build Coastguard Worker   if (!android::base::ReadFileToString(path, &content) ||
36*288bf522SAndroid Build Coastguard Worker       content.size() < ANDROID_PUBKEY_ENCODED_SIZE) {
37*288bf522SAndroid Build Coastguard Worker     fprintf(stderr, "Failed to load key from %s\n", path);
38*288bf522SAndroid Build Coastguard Worker     return nullptr;
39*288bf522SAndroid Build Coastguard Worker   }
40*288bf522SAndroid Build Coastguard Worker 
41*288bf522SAndroid Build Coastguard Worker   RSA* key = nullptr;
42*288bf522SAndroid Build Coastguard Worker   if (!android_pubkey_decode(reinterpret_cast<const uint8_t*>(content.c_str()),
43*288bf522SAndroid Build Coastguard Worker                              ANDROID_PUBKEY_ENCODED_SIZE, &key)) {
44*288bf522SAndroid Build Coastguard Worker     fprintf(stderr, "Failed to parse key!\n");
45*288bf522SAndroid Build Coastguard Worker     return nullptr;
46*288bf522SAndroid Build Coastguard Worker   }
47*288bf522SAndroid Build Coastguard Worker 
48*288bf522SAndroid Build Coastguard Worker   return key;
49*288bf522SAndroid Build Coastguard Worker }
50*288bf522SAndroid Build Coastguard Worker 
verify_table(const char * key_path,const uint8_t * signature,size_t signature_size,const char * table,uint32_t table_length)51*288bf522SAndroid Build Coastguard Worker static int verify_table(const char* key_path, const uint8_t* signature, size_t signature_size,
52*288bf522SAndroid Build Coastguard Worker                         const char* table, uint32_t table_length) {
53*288bf522SAndroid Build Coastguard Worker   // Hash the table
54*288bf522SAndroid Build Coastguard Worker   uint8_t hash_buf[SHA256_DIGEST_LENGTH];
55*288bf522SAndroid Build Coastguard Worker   SHA256(const_cast<uint8_t*>(reinterpret_cast<const uint8_t*>(table)), table_length, hash_buf);
56*288bf522SAndroid Build Coastguard Worker 
57*288bf522SAndroid Build Coastguard Worker   // Now get the public key from the keyfile
58*288bf522SAndroid Build Coastguard Worker   std::unique_ptr<RSA, decltype(&RSA_free)> key(load_key(key_path), RSA_free);
59*288bf522SAndroid Build Coastguard Worker   if (!key) {
60*288bf522SAndroid Build Coastguard Worker     fprintf(stderr, "Couldn't load verity keys\n");
61*288bf522SAndroid Build Coastguard Worker     return -1;
62*288bf522SAndroid Build Coastguard Worker   }
63*288bf522SAndroid Build Coastguard Worker 
64*288bf522SAndroid Build Coastguard Worker   // Verify the result
65*288bf522SAndroid Build Coastguard Worker   if (!RSA_verify(NID_sha256, hash_buf, sizeof(hash_buf), signature, signature_size, key.get())) {
66*288bf522SAndroid Build Coastguard Worker     fprintf(stderr, "Couldn't verify table\n");
67*288bf522SAndroid Build Coastguard Worker     return -1;
68*288bf522SAndroid Build Coastguard Worker   }
69*288bf522SAndroid Build Coastguard Worker 
70*288bf522SAndroid Build Coastguard Worker   return 0;
71*288bf522SAndroid Build Coastguard Worker }
72*288bf522SAndroid Build Coastguard Worker 
main(int argc,char * argv[])73*288bf522SAndroid Build Coastguard Worker int main(int argc, char* argv[]) {
74*288bf522SAndroid Build Coastguard Worker   if (argc != 4 || strcmp(argv[2], "-mincrypt") != 0) {
75*288bf522SAndroid Build Coastguard Worker     printf("Usage: %s <image> -mincrypt <verity_key>\n"
76*288bf522SAndroid Build Coastguard Worker            "  image       the image file (raw or sparse image) to be verified\n"
77*288bf522SAndroid Build Coastguard Worker            "  verity_key  the verity key in mincrypt format (/verity_key on device)\n", argv[0]);
78*288bf522SAndroid Build Coastguard Worker     return 2;
79*288bf522SAndroid Build Coastguard Worker   }
80*288bf522SAndroid Build Coastguard Worker 
81*288bf522SAndroid Build Coastguard Worker   // Get the raw image.
82*288bf522SAndroid Build Coastguard Worker   android::base::unique_fd fd(open(argv[1], O_RDONLY));
83*288bf522SAndroid Build Coastguard Worker   if (fd == -1) {
84*288bf522SAndroid Build Coastguard Worker     fprintf(stderr, "failed to open %s: %s\n", argv[1], strerror(errno));
85*288bf522SAndroid Build Coastguard Worker     return 1;
86*288bf522SAndroid Build Coastguard Worker   }
87*288bf522SAndroid Build Coastguard Worker 
88*288bf522SAndroid Build Coastguard Worker   struct sparse_file* file = sparse_file_import_auto(fd, false, false);
89*288bf522SAndroid Build Coastguard Worker   if (file == nullptr) {
90*288bf522SAndroid Build Coastguard Worker     fprintf(stderr, "failed to read file %s\n", argv[1]);
91*288bf522SAndroid Build Coastguard Worker     return 1;
92*288bf522SAndroid Build Coastguard Worker   }
93*288bf522SAndroid Build Coastguard Worker 
94*288bf522SAndroid Build Coastguard Worker   TemporaryFile tf;
95*288bf522SAndroid Build Coastguard Worker   if (sparse_file_write(file, tf.fd, false, false, false) < 0) {
96*288bf522SAndroid Build Coastguard Worker     fprintf(stderr, "failed to write output file\n");
97*288bf522SAndroid Build Coastguard Worker     return 1;
98*288bf522SAndroid Build Coastguard Worker   }
99*288bf522SAndroid Build Coastguard Worker   sparse_file_destroy(file);
100*288bf522SAndroid Build Coastguard Worker 
101*288bf522SAndroid Build Coastguard Worker   // Verify.
102*288bf522SAndroid Build Coastguard Worker   fec::io input(tf.path);
103*288bf522SAndroid Build Coastguard Worker   if (!input) {
104*288bf522SAndroid Build Coastguard Worker     return 1;
105*288bf522SAndroid Build Coastguard Worker   }
106*288bf522SAndroid Build Coastguard Worker 
107*288bf522SAndroid Build Coastguard Worker   fec_verity_metadata verity;
108*288bf522SAndroid Build Coastguard Worker   if (!input.get_verity_metadata(verity)) {
109*288bf522SAndroid Build Coastguard Worker     fprintf(stderr, "failed to get verity metadata\n");
110*288bf522SAndroid Build Coastguard Worker     return 1;
111*288bf522SAndroid Build Coastguard Worker   }
112*288bf522SAndroid Build Coastguard Worker 
113*288bf522SAndroid Build Coastguard Worker   int ret = verify_table(argv[3], verity.signature, sizeof(verity.signature),
114*288bf522SAndroid Build Coastguard Worker                          verity.table, verity.table_length);
115*288bf522SAndroid Build Coastguard Worker   printf("%s\n", ret == 0 ? "VERIFIED" : "FAILED");
116*288bf522SAndroid Build Coastguard Worker   return ret;
117*288bf522SAndroid Build Coastguard Worker }
118