160 lines
5.2 KiB
C++
160 lines
5.2 KiB
C++
//
|
|
// Copyright (C) 2020 The Android Open Source Project
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
#include "host/commands/secure_env/json_serializable.h"
|
|
|
|
#include <fstream>
|
|
|
|
#include <android-base/logging.h>
|
|
#include <keymaster/serializable.h>
|
|
|
|
#include "host/commands/secure_env/encrypted_serializable.h"
|
|
#include "host/commands/secure_env/hmac_serializable.h"
|
|
#include "host/commands/secure_env/primary_key_builder.h"
|
|
|
|
namespace cuttlefish {
|
|
|
|
static constexpr char kUniqueKey[] = "JsonSerializable";
|
|
|
|
class JsonSerializable : public keymaster::Serializable {
|
|
public:
|
|
JsonSerializable(Json::Value& json);
|
|
|
|
size_t SerializedSize() const override;
|
|
|
|
uint8_t* Serialize(uint8_t* buf, const uint8_t* end) const override;
|
|
|
|
bool Deserialize(const uint8_t** buf_ptr, const uint8_t* buf_end) override;
|
|
private:
|
|
Json::Value& json_;
|
|
};
|
|
|
|
JsonSerializable::JsonSerializable(Json::Value& json) : json_(json) {}
|
|
|
|
size_t JsonSerializable::SerializedSize() const {
|
|
Json::StreamWriterBuilder factory;
|
|
auto serialized = Json::writeString(factory, json_);
|
|
return serialized.size() + sizeof(uint32_t);
|
|
}
|
|
|
|
uint8_t* JsonSerializable::Serialize(uint8_t* buf, const uint8_t* end) const {
|
|
Json::StreamWriterBuilder factory;
|
|
auto serialized = Json::writeString(factory, json_);
|
|
if (end - buf < serialized.size() + sizeof(uint32_t)) {
|
|
LOG(ERROR) << "Not enough space to serialize json";
|
|
return buf;
|
|
}
|
|
return keymaster::append_size_and_data_to_buf(
|
|
buf, end, serialized.data(), serialized.size());
|
|
}
|
|
|
|
bool JsonSerializable::Deserialize(
|
|
const uint8_t** buf_ptr, const uint8_t* buf_end) {
|
|
size_t size;
|
|
keymaster::UniquePtr<uint8_t[]> json_bytes;
|
|
bool success = keymaster::copy_size_and_data_from_buf(
|
|
buf_ptr, buf_end, &size, &json_bytes);
|
|
if (!success) {
|
|
LOG(ERROR) << "Failed to deserialize json bytes";
|
|
return false;
|
|
}
|
|
auto doc_begin = reinterpret_cast<const char*>(json_bytes.get());
|
|
auto doc_end = doc_begin + size;
|
|
Json::CharReaderBuilder builder;
|
|
std::unique_ptr<Json::CharReader> reader(builder.newCharReader());
|
|
std::string errorMessage;
|
|
if (!reader->parse(doc_begin, doc_end, &json_, &errorMessage)) {
|
|
LOG(ERROR) << "Failed to parse json: " << errorMessage;
|
|
return false;
|
|
}
|
|
return true;
|
|
}
|
|
|
|
bool WriteProtectedJsonToFile(
|
|
TpmResourceManager& resource_manager,
|
|
const std::string& filename,
|
|
Json::Value json) {
|
|
JsonSerializable sensitive_material(json);
|
|
auto parent_key_fn = ParentKeyCreator(kUniqueKey);
|
|
EncryptedSerializable encryption(
|
|
resource_manager, parent_key_fn, sensitive_material);
|
|
auto signing_key_fn = SigningKeyCreator(kUniqueKey);
|
|
HmacSerializable sign_check(resource_manager, signing_key_fn,
|
|
TPM2_SHA256_DIGEST_SIZE, &encryption,
|
|
/*aad=*/nullptr);
|
|
|
|
auto size = sign_check.SerializedSize();
|
|
LOG(INFO) << "size : " << size;
|
|
std::vector<uint8_t> data(size + 1);
|
|
uint8_t* buf = data.data();
|
|
uint8_t* buf_end = buf + data.size();
|
|
buf = sign_check.Serialize(buf, buf_end);
|
|
if (buf != (buf_end - 1)) {
|
|
LOG(ERROR) << "Serialized size did not match up with actual usage.";
|
|
return false;
|
|
}
|
|
|
|
std::ofstream file_stream(filename, std::ios::trunc | std::ios::binary);
|
|
file_stream.write(reinterpret_cast<char*>(data.data()), data.size() - 1);
|
|
if (!file_stream) {
|
|
LOG(ERROR) << "Failed to save data to " << filename;
|
|
return false;
|
|
}
|
|
return true;
|
|
}
|
|
|
|
Json::Value ReadProtectedJsonFromFile(
|
|
TpmResourceManager& resource_manager, const std::string& filename) {
|
|
std::ifstream file_stream(filename, std::ios::binary | std::ios::ate);
|
|
std::streamsize size = file_stream.tellg();
|
|
file_stream.seekg(0, std::ios::beg);
|
|
|
|
if (size <= 0) {
|
|
LOG(VERBOSE) << "File " << filename << " was empty.";
|
|
return {};
|
|
}
|
|
|
|
std::vector<char> buffer(size);
|
|
if (!file_stream.read(buffer.data(), size)) {
|
|
LOG(ERROR) << "Unable to read from " << filename;
|
|
return {};
|
|
}
|
|
if (!file_stream) {
|
|
LOG(ERROR) << "Unable to read from " << filename;
|
|
return {};
|
|
}
|
|
|
|
Json::Value json;
|
|
JsonSerializable sensitive_material(json);
|
|
auto parent_key_fn = ParentKeyCreator(kUniqueKey);
|
|
EncryptedSerializable encryption(
|
|
resource_manager, parent_key_fn, sensitive_material);
|
|
auto signing_key_fn = SigningKeyCreator(kUniqueKey);
|
|
HmacSerializable sign_check(resource_manager, signing_key_fn,
|
|
TPM2_SHA256_DIGEST_SIZE, &encryption,
|
|
/*aad=*/nullptr);
|
|
|
|
auto buf = reinterpret_cast<const uint8_t*>(buffer.data());
|
|
auto buf_end = buf + buffer.size();
|
|
if (!sign_check.Deserialize(&buf, buf_end)) {
|
|
LOG(ERROR) << "Failed to deserialize json data from " << filename;
|
|
return {};
|
|
}
|
|
|
|
return json;
|
|
}
|
|
|
|
} // namespace cuttlefish
|