1*8617a60dSAndroid Build Coastguard Worker /* Copyright 2014 The ChromiumOS Authors
2*8617a60dSAndroid Build Coastguard Worker * Use of this source code is governed by a BSD-style license that can be
3*8617a60dSAndroid Build Coastguard Worker * found in the LICENSE file.
4*8617a60dSAndroid Build Coastguard Worker *
5*8617a60dSAndroid Build Coastguard Worker * Key unpacking functions
6*8617a60dSAndroid Build Coastguard Worker */
7*8617a60dSAndroid Build Coastguard Worker
8*8617a60dSAndroid Build Coastguard Worker #include "2common.h"
9*8617a60dSAndroid Build Coastguard Worker #include "2packed_key.h"
10*8617a60dSAndroid Build Coastguard Worker #include "2rsa.h"
11*8617a60dSAndroid Build Coastguard Worker #include "2sysincludes.h"
12*8617a60dSAndroid Build Coastguard Worker
13*8617a60dSAndroid Build Coastguard Worker test_mockable
vb2_unpack_key_buffer(struct vb2_public_key * key,const uint8_t * buf,uint32_t size)14*8617a60dSAndroid Build Coastguard Worker vb2_error_t vb2_unpack_key_buffer(struct vb2_public_key *key,
15*8617a60dSAndroid Build Coastguard Worker const uint8_t *buf, uint32_t size)
16*8617a60dSAndroid Build Coastguard Worker {
17*8617a60dSAndroid Build Coastguard Worker const struct vb2_packed_key *packed_key =
18*8617a60dSAndroid Build Coastguard Worker (const struct vb2_packed_key *)buf;
19*8617a60dSAndroid Build Coastguard Worker const uint32_t *buf32;
20*8617a60dSAndroid Build Coastguard Worker uint32_t expected_key_size;
21*8617a60dSAndroid Build Coastguard Worker
22*8617a60dSAndroid Build Coastguard Worker /* Make sure passed buffer is big enough for the packed key */
23*8617a60dSAndroid Build Coastguard Worker VB2_TRY(vb2_verify_packed_key_inside(buf, size, packed_key));
24*8617a60dSAndroid Build Coastguard Worker
25*8617a60dSAndroid Build Coastguard Worker /* Unpack key algorithm */
26*8617a60dSAndroid Build Coastguard Worker key->sig_alg = vb2_crypto_to_signature(packed_key->algorithm);
27*8617a60dSAndroid Build Coastguard Worker if (key->sig_alg == VB2_SIG_INVALID) {
28*8617a60dSAndroid Build Coastguard Worker VB2_DEBUG("Unsupported signature algorithm.\n");
29*8617a60dSAndroid Build Coastguard Worker return VB2_ERROR_UNPACK_KEY_SIG_ALGORITHM;
30*8617a60dSAndroid Build Coastguard Worker }
31*8617a60dSAndroid Build Coastguard Worker
32*8617a60dSAndroid Build Coastguard Worker key->hash_alg = vb2_crypto_to_hash(packed_key->algorithm);
33*8617a60dSAndroid Build Coastguard Worker if (key->hash_alg == VB2_HASH_INVALID) {
34*8617a60dSAndroid Build Coastguard Worker VB2_DEBUG("Unsupported hash algorithm.\n");
35*8617a60dSAndroid Build Coastguard Worker return VB2_ERROR_UNPACK_KEY_HASH_ALGORITHM;
36*8617a60dSAndroid Build Coastguard Worker }
37*8617a60dSAndroid Build Coastguard Worker
38*8617a60dSAndroid Build Coastguard Worker expected_key_size = vb2_packed_key_size(key->sig_alg);
39*8617a60dSAndroid Build Coastguard Worker if (!expected_key_size || expected_key_size != packed_key->key_size) {
40*8617a60dSAndroid Build Coastguard Worker VB2_DEBUG("Wrong key size for algorithm\n");
41*8617a60dSAndroid Build Coastguard Worker return VB2_ERROR_UNPACK_KEY_SIZE;
42*8617a60dSAndroid Build Coastguard Worker }
43*8617a60dSAndroid Build Coastguard Worker
44*8617a60dSAndroid Build Coastguard Worker /* Make sure source buffer is 32-bit aligned */
45*8617a60dSAndroid Build Coastguard Worker buf32 = (const uint32_t *)vb2_packed_key_data(packed_key);
46*8617a60dSAndroid Build Coastguard Worker if (!vb2_aligned(buf32, sizeof(uint32_t)))
47*8617a60dSAndroid Build Coastguard Worker return VB2_ERROR_UNPACK_KEY_ALIGN;
48*8617a60dSAndroid Build Coastguard Worker
49*8617a60dSAndroid Build Coastguard Worker /* Validity check key array size */
50*8617a60dSAndroid Build Coastguard Worker key->arrsize = buf32[0];
51*8617a60dSAndroid Build Coastguard Worker if ((uint64_t)key->arrsize * sizeof(uint32_t) != vb2_rsa_sig_size(key->sig_alg))
52*8617a60dSAndroid Build Coastguard Worker return VB2_ERROR_UNPACK_KEY_ARRAY_SIZE;
53*8617a60dSAndroid Build Coastguard Worker
54*8617a60dSAndroid Build Coastguard Worker key->n0inv = buf32[1];
55*8617a60dSAndroid Build Coastguard Worker
56*8617a60dSAndroid Build Coastguard Worker /* Arrays point inside the key data */
57*8617a60dSAndroid Build Coastguard Worker key->n = buf32 + 2;
58*8617a60dSAndroid Build Coastguard Worker key->rr = buf32 + 2 + key->arrsize;
59*8617a60dSAndroid Build Coastguard Worker
60*8617a60dSAndroid Build Coastguard Worker /* disable hwcrypto for RSA by default */
61*8617a60dSAndroid Build Coastguard Worker key->allow_hwcrypto = 0;
62*8617a60dSAndroid Build Coastguard Worker
63*8617a60dSAndroid Build Coastguard Worker #ifdef __COVERITY__
64*8617a60dSAndroid Build Coastguard Worker __coverity_tainted_data_sanitize__(key);
65*8617a60dSAndroid Build Coastguard Worker __coverity_tainted_data_sanitize__(buf);
66*8617a60dSAndroid Build Coastguard Worker #endif
67*8617a60dSAndroid Build Coastguard Worker return VB2_SUCCESS;
68*8617a60dSAndroid Build Coastguard Worker }
69*8617a60dSAndroid Build Coastguard Worker
vb2_unpack_key(struct vb2_public_key * key,const struct vb2_packed_key * packed_key)70*8617a60dSAndroid Build Coastguard Worker vb2_error_t vb2_unpack_key(struct vb2_public_key *key,
71*8617a60dSAndroid Build Coastguard Worker const struct vb2_packed_key *packed_key)
72*8617a60dSAndroid Build Coastguard Worker {
73*8617a60dSAndroid Build Coastguard Worker if (!packed_key)
74*8617a60dSAndroid Build Coastguard Worker return VB2_ERROR_UNPACK_KEY_BUFFER;
75*8617a60dSAndroid Build Coastguard Worker
76*8617a60dSAndroid Build Coastguard Worker return vb2_unpack_key_buffer(key,
77*8617a60dSAndroid Build Coastguard Worker (const uint8_t *)packed_key,
78*8617a60dSAndroid Build Coastguard Worker packed_key->key_offset +
79*8617a60dSAndroid Build Coastguard Worker packed_key->key_size);
80*8617a60dSAndroid Build Coastguard Worker }
81