2
0

secret_common.c 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404
  1. /*
  2. * QEMU crypto secret support
  3. *
  4. * Copyright (c) 2015 Red Hat, Inc.
  5. *
  6. * This library is free software; you can redistribute it and/or
  7. * modify it under the terms of the GNU Lesser General Public
  8. * License as published by the Free Software Foundation; either
  9. * version 2.1 of the License, or (at your option) any later version.
  10. *
  11. * This library is distributed in the hope that it will be useful,
  12. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  13. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
  14. * Lesser General Public License for more details.
  15. *
  16. * You should have received a copy of the GNU Lesser General Public
  17. * License along with this library; if not, see <http://www.gnu.org/licenses/>.
  18. *
  19. */
  20. #include "qemu/osdep.h"
  21. #include "crypto/secret_common.h"
  22. #include "crypto/cipher.h"
  23. #include "qapi/error.h"
  24. #include "qom/object_interfaces.h"
  25. #include "qemu/base64.h"
  26. #include "qemu/module.h"
  27. #include "trace.h"
  28. static void qcrypto_secret_decrypt(QCryptoSecretCommon *secret,
  29. const uint8_t *input,
  30. size_t inputlen,
  31. uint8_t **output,
  32. size_t *outputlen,
  33. Error **errp)
  34. {
  35. g_autofree uint8_t *iv = NULL;
  36. g_autofree uint8_t *key = NULL;
  37. g_autofree uint8_t *ciphertext = NULL;
  38. size_t keylen, ciphertextlen, ivlen;
  39. g_autoptr(QCryptoCipher) aes = NULL;
  40. g_autofree uint8_t *plaintext = NULL;
  41. *output = NULL;
  42. *outputlen = 0;
  43. if (qcrypto_secret_lookup(secret->keyid,
  44. &key, &keylen,
  45. errp) < 0) {
  46. return;
  47. }
  48. if (keylen != 32) {
  49. error_setg(errp, "Key should be 32 bytes in length");
  50. return;
  51. }
  52. if (!secret->iv) {
  53. error_setg(errp, "IV is required to decrypt secret");
  54. return;
  55. }
  56. iv = qbase64_decode(secret->iv, -1, &ivlen, errp);
  57. if (!iv) {
  58. return;
  59. }
  60. if (ivlen != 16) {
  61. error_setg(errp, "IV should be 16 bytes in length not %zu",
  62. ivlen);
  63. return;
  64. }
  65. aes = qcrypto_cipher_new(QCRYPTO_CIPHER_ALG_AES_256,
  66. QCRYPTO_CIPHER_MODE_CBC,
  67. key, keylen,
  68. errp);
  69. if (!aes) {
  70. return;
  71. }
  72. if (qcrypto_cipher_setiv(aes, iv, ivlen, errp) < 0) {
  73. return;
  74. }
  75. if (secret->format == QCRYPTO_SECRET_FORMAT_BASE64) {
  76. ciphertext = qbase64_decode((const gchar *)input,
  77. inputlen,
  78. &ciphertextlen,
  79. errp);
  80. if (!ciphertext) {
  81. return;
  82. }
  83. plaintext = g_new0(uint8_t, ciphertextlen + 1);
  84. } else {
  85. ciphertextlen = inputlen;
  86. plaintext = g_new0(uint8_t, inputlen + 1);
  87. }
  88. if (qcrypto_cipher_decrypt(aes,
  89. ciphertext ? ciphertext : input,
  90. plaintext,
  91. ciphertextlen,
  92. errp) < 0) {
  93. return;
  94. }
  95. if (plaintext[ciphertextlen - 1] > 16 ||
  96. plaintext[ciphertextlen - 1] > ciphertextlen) {
  97. error_setg(errp, "Incorrect number of padding bytes (%d) "
  98. "found on decrypted data",
  99. (int)plaintext[ciphertextlen - 1]);
  100. return;
  101. }
  102. /*
  103. * Even though plaintext may contain arbitrary NUL
  104. * ensure it is explicitly NUL terminated.
  105. */
  106. ciphertextlen -= plaintext[ciphertextlen - 1];
  107. plaintext[ciphertextlen] = '\0';
  108. *output = g_steal_pointer(&plaintext);
  109. *outputlen = ciphertextlen;
  110. }
  111. static void qcrypto_secret_decode(const uint8_t *input,
  112. size_t inputlen,
  113. uint8_t **output,
  114. size_t *outputlen,
  115. Error **errp)
  116. {
  117. *output = qbase64_decode((const gchar *)input,
  118. inputlen,
  119. outputlen,
  120. errp);
  121. }
  122. static void
  123. qcrypto_secret_complete(UserCreatable *uc, Error **errp)
  124. {
  125. QCryptoSecretCommon *secret = QCRYPTO_SECRET_COMMON(uc);
  126. QCryptoSecretCommonClass *sec_class
  127. = QCRYPTO_SECRET_COMMON_GET_CLASS(uc);
  128. Error *local_err = NULL;
  129. uint8_t *input = NULL;
  130. size_t inputlen = 0;
  131. uint8_t *output = NULL;
  132. size_t outputlen = 0;
  133. if (sec_class->load_data) {
  134. sec_class->load_data(secret, &input, &inputlen, &local_err);
  135. if (local_err) {
  136. error_propagate(errp, local_err);
  137. return;
  138. }
  139. } else {
  140. error_setg(errp, "%s provides no 'load_data' method'",
  141. object_get_typename(OBJECT(uc)));
  142. return;
  143. }
  144. if (secret->keyid) {
  145. qcrypto_secret_decrypt(secret, input, inputlen,
  146. &output, &outputlen, &local_err);
  147. g_free(input);
  148. if (local_err) {
  149. error_propagate(errp, local_err);
  150. return;
  151. }
  152. input = output;
  153. inputlen = outputlen;
  154. } else {
  155. if (secret->format == QCRYPTO_SECRET_FORMAT_BASE64) {
  156. qcrypto_secret_decode(input, inputlen,
  157. &output, &outputlen, &local_err);
  158. g_free(input);
  159. if (local_err) {
  160. error_propagate(errp, local_err);
  161. return;
  162. }
  163. input = output;
  164. inputlen = outputlen;
  165. }
  166. }
  167. secret->rawdata = input;
  168. secret->rawlen = inputlen;
  169. }
  170. static bool
  171. qcrypto_secret_prop_get_loaded(Object *obj,
  172. Error **errp G_GNUC_UNUSED)
  173. {
  174. QCryptoSecretCommon *secret = QCRYPTO_SECRET_COMMON(obj);
  175. return secret->rawdata != NULL;
  176. }
  177. static void
  178. qcrypto_secret_prop_set_format(Object *obj,
  179. int value,
  180. Error **errp G_GNUC_UNUSED)
  181. {
  182. QCryptoSecretCommon *creds = QCRYPTO_SECRET_COMMON(obj);
  183. creds->format = value;
  184. }
  185. static int
  186. qcrypto_secret_prop_get_format(Object *obj,
  187. Error **errp G_GNUC_UNUSED)
  188. {
  189. QCryptoSecretCommon *creds = QCRYPTO_SECRET_COMMON(obj);
  190. return creds->format;
  191. }
  192. static void
  193. qcrypto_secret_prop_set_iv(Object *obj,
  194. const char *value,
  195. Error **errp)
  196. {
  197. QCryptoSecretCommon *secret = QCRYPTO_SECRET_COMMON(obj);
  198. g_free(secret->iv);
  199. secret->iv = g_strdup(value);
  200. }
  201. static char *
  202. qcrypto_secret_prop_get_iv(Object *obj,
  203. Error **errp)
  204. {
  205. QCryptoSecretCommon *secret = QCRYPTO_SECRET_COMMON(obj);
  206. return g_strdup(secret->iv);
  207. }
  208. static void
  209. qcrypto_secret_prop_set_keyid(Object *obj,
  210. const char *value,
  211. Error **errp)
  212. {
  213. QCryptoSecretCommon *secret = QCRYPTO_SECRET_COMMON(obj);
  214. g_free(secret->keyid);
  215. secret->keyid = g_strdup(value);
  216. }
  217. static char *
  218. qcrypto_secret_prop_get_keyid(Object *obj,
  219. Error **errp)
  220. {
  221. QCryptoSecretCommon *secret = QCRYPTO_SECRET_COMMON(obj);
  222. return g_strdup(secret->keyid);
  223. }
  224. static void
  225. qcrypto_secret_finalize(Object *obj)
  226. {
  227. QCryptoSecretCommon *secret = QCRYPTO_SECRET_COMMON(obj);
  228. g_free(secret->iv);
  229. g_free(secret->keyid);
  230. g_free(secret->rawdata);
  231. }
  232. static void
  233. qcrypto_secret_class_init(ObjectClass *oc, void *data)
  234. {
  235. UserCreatableClass *ucc = USER_CREATABLE_CLASS(oc);
  236. ucc->complete = qcrypto_secret_complete;
  237. object_class_property_add_bool(oc, "loaded",
  238. qcrypto_secret_prop_get_loaded,
  239. NULL);
  240. object_class_property_add_enum(oc, "format",
  241. "QCryptoSecretFormat",
  242. &QCryptoSecretFormat_lookup,
  243. qcrypto_secret_prop_get_format,
  244. qcrypto_secret_prop_set_format);
  245. object_class_property_add_str(oc, "keyid",
  246. qcrypto_secret_prop_get_keyid,
  247. qcrypto_secret_prop_set_keyid);
  248. object_class_property_add_str(oc, "iv",
  249. qcrypto_secret_prop_get_iv,
  250. qcrypto_secret_prop_set_iv);
  251. }
  252. int qcrypto_secret_lookup(const char *secretid,
  253. uint8_t **data,
  254. size_t *datalen,
  255. Error **errp)
  256. {
  257. Object *obj;
  258. QCryptoSecretCommon *secret;
  259. obj = object_resolve_path_component(
  260. object_get_objects_root(), secretid);
  261. if (!obj) {
  262. error_setg(errp, "No secret with id '%s'", secretid);
  263. return -1;
  264. }
  265. secret = (QCryptoSecretCommon *)
  266. object_dynamic_cast(obj,
  267. TYPE_QCRYPTO_SECRET_COMMON);
  268. if (!secret) {
  269. error_setg(errp, "Object with id '%s' is not a secret",
  270. secretid);
  271. return -1;
  272. }
  273. if (!secret->rawdata) {
  274. error_setg(errp, "Secret with id '%s' has no data",
  275. secretid);
  276. return -1;
  277. }
  278. *data = g_new0(uint8_t, secret->rawlen + 1);
  279. memcpy(*data, secret->rawdata, secret->rawlen);
  280. (*data)[secret->rawlen] = '\0';
  281. *datalen = secret->rawlen;
  282. return 0;
  283. }
  284. char *qcrypto_secret_lookup_as_utf8(const char *secretid,
  285. Error **errp)
  286. {
  287. uint8_t *data;
  288. size_t datalen;
  289. if (qcrypto_secret_lookup(secretid,
  290. &data,
  291. &datalen,
  292. errp) < 0) {
  293. return NULL;
  294. }
  295. if (!g_utf8_validate((const gchar *)data, datalen, NULL)) {
  296. error_setg(errp,
  297. "Data from secret %s is not valid UTF-8",
  298. secretid);
  299. g_free(data);
  300. return NULL;
  301. }
  302. return (char *)data;
  303. }
  304. char *qcrypto_secret_lookup_as_base64(const char *secretid,
  305. Error **errp)
  306. {
  307. uint8_t *data;
  308. size_t datalen;
  309. char *ret;
  310. if (qcrypto_secret_lookup(secretid,
  311. &data,
  312. &datalen,
  313. errp) < 0) {
  314. return NULL;
  315. }
  316. ret = g_base64_encode(data, datalen);
  317. g_free(data);
  318. return ret;
  319. }
  320. static const TypeInfo qcrypto_secret_info = {
  321. .parent = TYPE_OBJECT,
  322. .name = TYPE_QCRYPTO_SECRET_COMMON,
  323. .instance_size = sizeof(QCryptoSecretCommon),
  324. .instance_finalize = qcrypto_secret_finalize,
  325. .class_size = sizeof(QCryptoSecretCommonClass),
  326. .class_init = qcrypto_secret_class_init,
  327. .abstract = true,
  328. .interfaces = (InterfaceInfo[]) {
  329. { TYPE_USER_CREATABLE },
  330. { }
  331. }
  332. };
  333. static void
  334. qcrypto_secret_register_types(void)
  335. {
  336. type_register_static(&qcrypto_secret_info);
  337. }
  338. type_init(qcrypto_secret_register_types);