2
0

secret_common.c 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403
  1. /*
  2. * QEMU crypto secret support
  3. *
  4. * Copyright (c) 2015 Red Hat, Inc.
  5. *
  6. * This library is free software; you can redistribute it and/or
  7. * modify it under the terms of the GNU Lesser General Public
  8. * License as published by the Free Software Foundation; either
  9. * version 2.1 of the License, or (at your option) any later version.
  10. *
  11. * This library is distributed in the hope that it will be useful,
  12. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  13. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
  14. * Lesser General Public License for more details.
  15. *
  16. * You should have received a copy of the GNU Lesser General Public
  17. * License along with this library; if not, see <http://www.gnu.org/licenses/>.
  18. *
  19. */
  20. #include "qemu/osdep.h"
  21. #include "crypto/secret_common.h"
  22. #include "crypto/cipher.h"
  23. #include "qapi/error.h"
  24. #include "qom/object_interfaces.h"
  25. #include "qemu/base64.h"
  26. #include "qemu/module.h"
  27. #include "trace.h"
  28. static void qcrypto_secret_decrypt(QCryptoSecretCommon *secret,
  29. const uint8_t *input,
  30. size_t inputlen,
  31. uint8_t **output,
  32. size_t *outputlen,
  33. Error **errp)
  34. {
  35. g_autofree uint8_t *iv = NULL;
  36. g_autofree uint8_t *key = NULL;
  37. g_autofree uint8_t *ciphertext = NULL;
  38. size_t keylen, ciphertextlen, ivlen;
  39. g_autoptr(QCryptoCipher) aes = NULL;
  40. g_autofree uint8_t *plaintext = NULL;
  41. *output = NULL;
  42. *outputlen = 0;
  43. if (qcrypto_secret_lookup(secret->keyid,
  44. &key, &keylen,
  45. errp) < 0) {
  46. return;
  47. }
  48. if (keylen != 32) {
  49. error_setg(errp, "Key should be 32 bytes in length");
  50. return;
  51. }
  52. if (!secret->iv) {
  53. error_setg(errp, "IV is required to decrypt secret");
  54. return;
  55. }
  56. iv = qbase64_decode(secret->iv, -1, &ivlen, errp);
  57. if (!iv) {
  58. return;
  59. }
  60. if (ivlen != 16) {
  61. error_setg(errp, "IV should be 16 bytes in length not %zu",
  62. ivlen);
  63. return;
  64. }
  65. aes = qcrypto_cipher_new(QCRYPTO_CIPHER_ALG_AES_256,
  66. QCRYPTO_CIPHER_MODE_CBC,
  67. key, keylen,
  68. errp);
  69. if (!aes) {
  70. return;
  71. }
  72. if (qcrypto_cipher_setiv(aes, iv, ivlen, errp) < 0) {
  73. return;
  74. }
  75. if (secret->format == QCRYPTO_SECRET_FORMAT_BASE64) {
  76. ciphertext = qbase64_decode((const gchar *)input,
  77. inputlen,
  78. &ciphertextlen,
  79. errp);
  80. if (!ciphertext) {
  81. return;
  82. }
  83. plaintext = g_new0(uint8_t, ciphertextlen + 1);
  84. } else {
  85. ciphertextlen = inputlen;
  86. plaintext = g_new0(uint8_t, inputlen + 1);
  87. }
  88. if (qcrypto_cipher_decrypt(aes,
  89. ciphertext ? ciphertext : input,
  90. plaintext,
  91. ciphertextlen,
  92. errp) < 0) {
  93. return;
  94. }
  95. if (plaintext[ciphertextlen - 1] > 16 ||
  96. plaintext[ciphertextlen - 1] > ciphertextlen) {
  97. error_setg(errp, "Incorrect number of padding bytes (%d) "
  98. "found on decrypted data",
  99. (int)plaintext[ciphertextlen - 1]);
  100. return;
  101. }
  102. /*
  103. * Even though plaintext may contain arbitrary NUL
  104. * ensure it is explicitly NUL terminated.
  105. */
  106. ciphertextlen -= plaintext[ciphertextlen - 1];
  107. plaintext[ciphertextlen] = '\0';
  108. *output = g_steal_pointer(&plaintext);
  109. *outputlen = ciphertextlen;
  110. }
  111. static void qcrypto_secret_decode(const uint8_t *input,
  112. size_t inputlen,
  113. uint8_t **output,
  114. size_t *outputlen,
  115. Error **errp)
  116. {
  117. *output = qbase64_decode((const gchar *)input,
  118. inputlen,
  119. outputlen,
  120. errp);
  121. }
  122. static void
  123. qcrypto_secret_prop_set_loaded(Object *obj,
  124. bool value,
  125. Error **errp)
  126. {
  127. QCryptoSecretCommon *secret = QCRYPTO_SECRET_COMMON(obj);
  128. QCryptoSecretCommonClass *sec_class
  129. = QCRYPTO_SECRET_COMMON_GET_CLASS(obj);
  130. if (value) {
  131. Error *local_err = NULL;
  132. uint8_t *input = NULL;
  133. size_t inputlen = 0;
  134. uint8_t *output = NULL;
  135. size_t outputlen = 0;
  136. if (sec_class->load_data) {
  137. sec_class->load_data(secret, &input, &inputlen, &local_err);
  138. if (local_err) {
  139. error_propagate(errp, local_err);
  140. return;
  141. }
  142. } else {
  143. error_setg(errp, "%s provides no 'load_data' method'",
  144. object_get_typename(obj));
  145. return;
  146. }
  147. if (secret->keyid) {
  148. qcrypto_secret_decrypt(secret, input, inputlen,
  149. &output, &outputlen, &local_err);
  150. g_free(input);
  151. if (local_err) {
  152. error_propagate(errp, local_err);
  153. return;
  154. }
  155. input = output;
  156. inputlen = outputlen;
  157. } else {
  158. if (secret->format == QCRYPTO_SECRET_FORMAT_BASE64) {
  159. qcrypto_secret_decode(input, inputlen,
  160. &output, &outputlen, &local_err);
  161. g_free(input);
  162. if (local_err) {
  163. error_propagate(errp, local_err);
  164. return;
  165. }
  166. input = output;
  167. inputlen = outputlen;
  168. }
  169. }
  170. secret->rawdata = input;
  171. secret->rawlen = inputlen;
  172. } else {
  173. g_free(secret->rawdata);
  174. secret->rawlen = 0;
  175. }
  176. }
  177. static bool
  178. qcrypto_secret_prop_get_loaded(Object *obj,
  179. Error **errp G_GNUC_UNUSED)
  180. {
  181. QCryptoSecretCommon *secret = QCRYPTO_SECRET_COMMON(obj);
  182. return secret->rawdata != NULL;
  183. }
  184. static void
  185. qcrypto_secret_prop_set_format(Object *obj,
  186. int value,
  187. Error **errp G_GNUC_UNUSED)
  188. {
  189. QCryptoSecretCommon *creds = QCRYPTO_SECRET_COMMON(obj);
  190. creds->format = value;
  191. }
  192. static int
  193. qcrypto_secret_prop_get_format(Object *obj,
  194. Error **errp G_GNUC_UNUSED)
  195. {
  196. QCryptoSecretCommon *creds = QCRYPTO_SECRET_COMMON(obj);
  197. return creds->format;
  198. }
  199. static void
  200. qcrypto_secret_prop_set_iv(Object *obj,
  201. const char *value,
  202. Error **errp)
  203. {
  204. QCryptoSecretCommon *secret = QCRYPTO_SECRET_COMMON(obj);
  205. g_free(secret->iv);
  206. secret->iv = g_strdup(value);
  207. }
  208. static char *
  209. qcrypto_secret_prop_get_iv(Object *obj,
  210. Error **errp)
  211. {
  212. QCryptoSecretCommon *secret = QCRYPTO_SECRET_COMMON(obj);
  213. return g_strdup(secret->iv);
  214. }
  215. static void
  216. qcrypto_secret_prop_set_keyid(Object *obj,
  217. const char *value,
  218. Error **errp)
  219. {
  220. QCryptoSecretCommon *secret = QCRYPTO_SECRET_COMMON(obj);
  221. g_free(secret->keyid);
  222. secret->keyid = g_strdup(value);
  223. }
  224. static char *
  225. qcrypto_secret_prop_get_keyid(Object *obj,
  226. Error **errp)
  227. {
  228. QCryptoSecretCommon *secret = QCRYPTO_SECRET_COMMON(obj);
  229. return g_strdup(secret->keyid);
  230. }
  231. static void
  232. qcrypto_secret_finalize(Object *obj)
  233. {
  234. QCryptoSecretCommon *secret = QCRYPTO_SECRET_COMMON(obj);
  235. g_free(secret->iv);
  236. g_free(secret->keyid);
  237. g_free(secret->rawdata);
  238. }
  239. static void
  240. qcrypto_secret_class_init(ObjectClass *oc, void *data)
  241. {
  242. object_class_property_add_bool(oc, "loaded",
  243. qcrypto_secret_prop_get_loaded,
  244. qcrypto_secret_prop_set_loaded);
  245. object_class_property_add_enum(oc, "format",
  246. "QCryptoSecretFormat",
  247. &QCryptoSecretFormat_lookup,
  248. qcrypto_secret_prop_get_format,
  249. qcrypto_secret_prop_set_format);
  250. object_class_property_add_str(oc, "keyid",
  251. qcrypto_secret_prop_get_keyid,
  252. qcrypto_secret_prop_set_keyid);
  253. object_class_property_add_str(oc, "iv",
  254. qcrypto_secret_prop_get_iv,
  255. qcrypto_secret_prop_set_iv);
  256. }
  257. int qcrypto_secret_lookup(const char *secretid,
  258. uint8_t **data,
  259. size_t *datalen,
  260. Error **errp)
  261. {
  262. Object *obj;
  263. QCryptoSecretCommon *secret;
  264. obj = object_resolve_path_component(
  265. object_get_objects_root(), secretid);
  266. if (!obj) {
  267. error_setg(errp, "No secret with id '%s'", secretid);
  268. return -1;
  269. }
  270. secret = (QCryptoSecretCommon *)
  271. object_dynamic_cast(obj,
  272. TYPE_QCRYPTO_SECRET_COMMON);
  273. if (!secret) {
  274. error_setg(errp, "Object with id '%s' is not a secret",
  275. secretid);
  276. return -1;
  277. }
  278. if (!secret->rawdata) {
  279. error_setg(errp, "Secret with id '%s' has no data",
  280. secretid);
  281. return -1;
  282. }
  283. *data = g_new0(uint8_t, secret->rawlen + 1);
  284. memcpy(*data, secret->rawdata, secret->rawlen);
  285. (*data)[secret->rawlen] = '\0';
  286. *datalen = secret->rawlen;
  287. return 0;
  288. }
  289. char *qcrypto_secret_lookup_as_utf8(const char *secretid,
  290. Error **errp)
  291. {
  292. uint8_t *data;
  293. size_t datalen;
  294. if (qcrypto_secret_lookup(secretid,
  295. &data,
  296. &datalen,
  297. errp) < 0) {
  298. return NULL;
  299. }
  300. if (!g_utf8_validate((const gchar *)data, datalen, NULL)) {
  301. error_setg(errp,
  302. "Data from secret %s is not valid UTF-8",
  303. secretid);
  304. g_free(data);
  305. return NULL;
  306. }
  307. return (char *)data;
  308. }
  309. char *qcrypto_secret_lookup_as_base64(const char *secretid,
  310. Error **errp)
  311. {
  312. uint8_t *data;
  313. size_t datalen;
  314. char *ret;
  315. if (qcrypto_secret_lookup(secretid,
  316. &data,
  317. &datalen,
  318. errp) < 0) {
  319. return NULL;
  320. }
  321. ret = g_base64_encode(data, datalen);
  322. g_free(data);
  323. return ret;
  324. }
  325. static const TypeInfo qcrypto_secret_info = {
  326. .parent = TYPE_OBJECT,
  327. .name = TYPE_QCRYPTO_SECRET_COMMON,
  328. .instance_size = sizeof(QCryptoSecretCommon),
  329. .instance_finalize = qcrypto_secret_finalize,
  330. .class_size = sizeof(QCryptoSecretCommonClass),
  331. .class_init = qcrypto_secret_class_init,
  332. .abstract = true,
  333. };
  334. static void
  335. qcrypto_secret_register_types(void)
  336. {
  337. type_register_static(&qcrypto_secret_info);
  338. }
  339. type_init(qcrypto_secret_register_types);