1 Star 0 Fork 1

mysnapcore/mysnapd

forked from tupelo-shen/mysnapd 
加入 Gitee
与超过 1200万 开发者一起发现、参与优秀开源项目,私有仓库也完全免费 :)
免费加入
文件
克隆/下载
fde-setup.go 5.82 KB
一键复制 编辑 原始数据 按行查看 历史
tupelo-shen 提交于 2022-11-09 21:58 . fix: tests fixes commit
package main
import (
"bytes"
"encoding/base64"
"encoding/json"
"fmt"
"io"
"io/ioutil"
"os"
"os/exec"
"path/filepath"
"time"
"gitee.com/mysnapcore/mysnapd/osutil"
)
// This is a very insecure crypto just for demonstration purposes.
// Please delete it you use this for real.
func xor13(bs []byte) []byte {
out := make([]byte, len(bs))
for i := range bs {
out[i] = bs[i] ^ 0x13
}
return out
}
// Note that this does not import the snapd structs to ensure we don't
// accidentally break something in the contract and miss that we broke
// it because we use the internal thing "externally" here
type fdeSetupJSON struct {
Op string `json:"op"`
Key []byte `json:"key,omitempty"`
}
type fdeSetupResultJSON struct {
// XXX call this encrypted-key if possible?
EncryptedKey []byte `json:"sealed-key"`
Handle []byte `json:"handle"`
}
// Note that in real implementations this would be something like an
// internal handle for the crypto hardware and generated in "initial-setup"
// for each key
var testKeyHandle = []byte(`{"some":"json-handle"}`)
var (
// used in tests
osStdin = io.Reader(os.Stdin)
osStdout = io.Writer(os.Stdout)
)
// Note that this can be removed when using the hook as an example for
// how to implement your own hook, the below Base64 is here so that
// we can test that strict base64 is used.
//
// This is the same as fdeSetupJSON, but is more strict in that it decodes Key
// as a string, which _must_ be a base64 encoded version of the same []byte Key
// we have above, the handler below validates this as a test
type fdeSetupJSONStrictBase64 struct {
Key string `json:"key,omitempty"`
}
func runFdeSetup() error {
output, err := exec.Command("snapctl", "fde-setup-request").CombinedOutput()
if err != nil {
return fmt.Errorf("cannot run snapctl fde-setup-request: %v", osutil.OutputErr(output, err))
}
var js fdeSetupJSON
if err := json.Unmarshal(output, &js); err != nil {
return err
}
var jsStrict fdeSetupJSONStrictBase64
if err := json.Unmarshal(output, &jsStrict); err != nil {
return err
}
// verify that the two de-coding mechanisms agree on the key, manually
// decoding the base64 string in the stricter case
decodedBase64Key, err := base64.StdEncoding.DecodeString(jsStrict.Key)
if err != nil {
return fmt.Errorf("fde-setup-request is not valid base64: %v", err)
}
if !bytes.Equal(decodedBase64Key, js.Key) {
return fmt.Errorf("fde-setup-request key is not strictly the same base64 decoded as binary decoded")
}
var fdeSetupResult []byte
switch js.Op {
case "features":
// no special features supported by this hook
fdeSetupResult = []byte(`{"features":[]}`)
case "initial-setup":
// "seal" using a really bad crypto algorithm
res := fdeSetupResultJSON{
EncryptedKey: xor13(js.Key),
Handle: testKeyHandle,
}
fdeSetupResult, err = json.Marshal(res)
if err != nil {
return err
}
default:
return fmt.Errorf("unsupported op %q", js.Op)
}
cmd := exec.Command("snapctl", "fde-setup-result")
// simulate a secboot v1 encrypted key
cmd.Stdin = bytes.NewBuffer(fdeSetupResult)
output, err = cmd.CombinedOutput()
if err != nil {
return fmt.Errorf("cannot run snapctl fde-setup-result for op %q: %v", js.Op, osutil.OutputErr(output, err))
}
return nil
}
type fdeRevealJSON struct {
Op string `json:"op"`
SealedKey []byte `json:"sealed-key"`
Handle []byte `json:"handle"`
}
type fdeRevealJSONStrict struct {
SealedKey string `json:"sealed-key"`
Handle string `json:"handle"`
}
type fdeRevealKeyResultJSON struct {
Key []byte `json:"key"`
}
func runFdeRevealKey() error {
var js fdeRevealJSON
var jsStrict fdeRevealJSONStrict
b, err := ioutil.ReadAll(osStdin)
if err != nil {
return err
}
if err := json.Unmarshal(b, &js); err != nil {
return err
}
if err := json.Unmarshal(b, &jsStrict); err != nil {
return err
}
// verify that the two de-coding mechanisms agree on the key, manually
// decoding the base64 string in the stricter case
decodedBase64Key, err := base64.StdEncoding.DecodeString(jsStrict.SealedKey)
if err != nil {
return fmt.Errorf("fde-reveal-key key input is not valid base64: %v", err)
}
if !bytes.Equal(decodedBase64Key, js.SealedKey) {
return fmt.Errorf("fde-reveal-key key input is not strictly the same base64 decoded as binary decoded")
}
decodedBase64Handle, err := base64.StdEncoding.DecodeString(jsStrict.Handle)
if err != nil {
return fmt.Errorf("fde-reveal-key handle input is not valid base64: %v", err)
}
if !bytes.Equal(decodedBase64Handle, js.Handle) {
return fmt.Errorf("fde-reveal-key handle input is not strictly the same base64 decoded as binary decoded")
}
switch js.Op {
case "reveal":
// check that the handle created in initial-setup is passed
// back to reveal correctly.
if string(js.Handle) != string(testKeyHandle) {
return fmt.Errorf(`fde-reveal-key expected handle %q but got %q`, testKeyHandle, js.Handle)
}
// "decrypt" key
var res fdeRevealKeyResultJSON
res.Key = xor13(js.SealedKey)
if err := json.NewEncoder(osStdout).Encode(res); err != nil {
return err
}
case "lock":
// NOTE: when using this file as an example code for
// implementing a real world, production grade FDE
// hook, the lock operation must be implemented here
// to block decryption operations. This example does
// nothing.
default:
return fmt.Errorf(`unsupported operation %q`, js.Op)
}
return nil
}
func main() {
var err error
// XXX: workaround systemd bug
// https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1921145
time.Sleep(1 * time.Second)
switch filepath.Base(os.Args[0]) {
case "fde-setup":
// run as regular hook
err = runFdeSetup()
case "fde-reveal-key":
// run from initrd
err = runFdeRevealKey()
default:
err = fmt.Errorf("binary needs to be called as fde-setup or fde-reveal-key")
}
if err != nil {
fmt.Fprintf(os.Stderr, "error: %v\n", err)
os.Exit(1)
}
}
马建仓 AI 助手
尝试更多
代码解读
代码找茬
代码优化
Go
1
https://gitee.com/mysnapcore/mysnapd.git
git@gitee.com:mysnapcore/mysnapd.git
mysnapcore
mysnapd
mysnapd
v0.0.1

搜索帮助

0d507c66 1850385 C8b1a773 1850385