OLD | NEW |
1 /* Copyright (c) 2010 The Chromium OS Authors. All rights reserved. | 1 /* Copyright (c) 2010 The Chromium OS Authors. All rights reserved. |
2 * Use of this source code is governed by a BSD-style license that can be | 2 * Use of this source code is governed by a BSD-style license that can be |
3 * found in the LICENSE file. | 3 * found in the LICENSE file. |
4 * | 4 * |
5 * Verified boot kernel utility | 5 * Verified boot kernel utility |
6 */ | 6 */ |
7 | 7 |
8 #include <errno.h> | 8 #include <errno.h> |
9 #include <getopt.h> | 9 #include <getopt.h> |
10 #include <inttypes.h> /* For PRIu64 */ | 10 #include <inttypes.h> /* For PRIu64 */ |
(...skipping 25 matching lines...) Expand all Loading... |
36 OPT_OLDBLOB, | 36 OPT_OLDBLOB, |
37 OPT_KEYBLOCK, | 37 OPT_KEYBLOCK, |
38 OPT_SIGNPUBKEY, | 38 OPT_SIGNPUBKEY, |
39 OPT_SIGNPRIVATE, | 39 OPT_SIGNPRIVATE, |
40 OPT_VERSION, | 40 OPT_VERSION, |
41 OPT_VMLINUZ, | 41 OPT_VMLINUZ, |
42 OPT_BOOTLOADER, | 42 OPT_BOOTLOADER, |
43 OPT_CONFIG, | 43 OPT_CONFIG, |
44 OPT_VBLOCKONLY, | 44 OPT_VBLOCKONLY, |
45 OPT_PAD, | 45 OPT_PAD, |
| 46 OPT_VERBOSE, |
46 }; | 47 }; |
47 | 48 |
48 static struct option long_opts[] = { | 49 static struct option long_opts[] = { |
49 {"pack", 1, 0, OPT_MODE_PACK }, | 50 {"pack", 1, 0, OPT_MODE_PACK }, |
50 {"repack", 1, 0, OPT_MODE_REPACK }, | 51 {"repack", 1, 0, OPT_MODE_REPACK }, |
51 {"verify", 1, 0, OPT_MODE_VERIFY }, | 52 {"verify", 1, 0, OPT_MODE_VERIFY }, |
52 {"oldblob", 1, 0, OPT_OLDBLOB }, | 53 {"oldblob", 1, 0, OPT_OLDBLOB }, |
53 {"keyblock", 1, 0, OPT_KEYBLOCK }, | 54 {"keyblock", 1, 0, OPT_KEYBLOCK }, |
54 {"signpubkey", 1, 0, OPT_SIGNPUBKEY }, | 55 {"signpubkey", 1, 0, OPT_SIGNPUBKEY }, |
55 {"signprivate", 1, 0, OPT_SIGNPRIVATE }, | 56 {"signprivate", 1, 0, OPT_SIGNPRIVATE }, |
56 {"version", 1, 0, OPT_VERSION }, | 57 {"version", 1, 0, OPT_VERSION }, |
57 {"vmlinuz", 1, 0, OPT_VMLINUZ }, | 58 {"vmlinuz", 1, 0, OPT_VMLINUZ }, |
58 {"bootloader", 1, 0, OPT_BOOTLOADER }, | 59 {"bootloader", 1, 0, OPT_BOOTLOADER }, |
59 {"config", 1, 0, OPT_CONFIG }, | 60 {"config", 1, 0, OPT_CONFIG }, |
60 {"vblockonly", 0, 0, OPT_VBLOCKONLY }, | 61 {"vblockonly", 0, 0, OPT_VBLOCKONLY }, |
61 {"pad", 1, 0, OPT_PAD }, | 62 {"pad", 1, 0, OPT_PAD }, |
| 63 {"verbose", 0, 0, OPT_VERBOSE }, |
62 {"debug", 0, &opt_debug, 1 }, | 64 {"debug", 0, &opt_debug, 1 }, |
63 {NULL, 0, 0, 0} | 65 {NULL, 0, 0, 0} |
64 }; | 66 }; |
65 | 67 |
66 | 68 |
67 /* Print help and return error */ | 69 /* Print help and return error */ |
68 static int PrintHelp(char *progname) { | 70 static int PrintHelp(char *progname) { |
69 fprintf(stderr, | 71 fprintf(stderr, |
70 "This program creates, signs, and verifies the kernel blob\n"); | 72 "This program creates, signs, and verifies the kernel blob\n"); |
71 fprintf(stderr, | 73 fprintf(stderr, |
72 "\n" | 74 "\n" |
73 "Usage: %s --pack <file> [PARAMETERS]\n" | 75 "Usage: %s --pack <file> [PARAMETERS]\n" |
74 "\n" | 76 "\n" |
75 " Required parameters:\n" | 77 " Required parameters:\n" |
76 " --keyblock <file> Key block in .keyblock format\n" | 78 " --keyblock <file> Key block in .keyblock format\n" |
77 " --signprivate <file> Signing private key in .pem format\n" | 79 " --signprivate <file> Signing private key in .pem format\n" |
78 " --version <number> Kernel version\n" | 80 " --version <number> Kernel version\n" |
79 " --vmlinuz <file> Linux kernel bzImage file\n" | 81 " --vmlinuz <file> Linux kernel bzImage file\n" |
80 " --bootloader <file> Bootloader stub\n" | 82 " --bootloader <file> Bootloader stub\n" |
81 " --config <file> Config file\n" | 83 " --config <file> Command line file\n" |
82 "\n" | 84 "\n" |
83 " Optional:\n" | 85 " Optional:\n" |
84 " --pad <number> Verification padding size in bytes\n" | 86 " --pad <number> Verification padding size in bytes\n" |
85 " --vblockonly Emit just the verification blob\n", | 87 " --vblockonly Emit just the verification blob\n", |
86 progname); | 88 progname); |
87 fprintf(stderr, | 89 fprintf(stderr, |
88 "\nOR\n\n" | 90 "\nOR\n\n" |
89 "Usage: %s --repack <file> [PARAMETERS]\n" | 91 "Usage: %s --repack <file> [PARAMETERS]\n" |
90 "\n" | 92 "\n" |
91 " Required parameters:\n" | 93 " Required parameters (of --keyblock and --config at least " |
| 94 "one is required):\n" |
92 " --keyblock <file> Key block in .keyblock format\n" | 95 " --keyblock <file> Key block in .keyblock format\n" |
93 " --signprivate <file> Signing private key in .pem format\n" | 96 " --signprivate <file> Signing private key in .pem format\n" |
94 " --oldblob <file> Previously packed kernel blob\n" | 97 " --oldblob <file> Previously packed kernel blob\n" |
| 98 " --config <file> New command line file\n" |
95 "\n" | 99 "\n" |
96 " Optional:\n" | 100 " Optional:\n" |
97 " --pad <number> Verification padding size in bytes\n" | 101 " --pad <number> Verification padding size in bytes\n" |
98 " --vblockonly Emit just the verification blob\n", | 102 " --vblockonly Emit just the verification blob\n", |
99 progname); | 103 progname); |
100 fprintf(stderr, | 104 fprintf(stderr, |
101 "\nOR\n\n" | 105 "\nOR\n\n" |
102 "Usage: %s --verify <file> [PARAMETERS]\n" | 106 "Usage: %s --verify <file> [PARAMETERS]\n" |
103 "\n" | 107 "\n" |
104 " Required parameters:\n" | 108 " Required parameters:\n" |
105 " --signpubkey <file> Signing public key in .vbpubk format\n" | 109 " --signpubkey <file> Signing public key in .vbpubk format\n" |
| 110 "\n" |
| 111 " Optional:\n" |
| 112 " --verbose Print a more detailed report\n" |
106 "\n", | 113 "\n", |
107 progname); | 114 progname); |
108 return 1; | 115 return 1; |
109 } | 116 } |
110 | 117 |
111 static void Debug(const char *format, ...) { | 118 static void Debug(const char *format, ...) { |
112 if (!opt_debug) | 119 if (!opt_debug) |
113 return; | 120 return; |
114 | 121 |
115 va_list ap; | 122 va_list ap; |
(...skipping 38 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
154 | 161 |
155 | 162 |
156 typedef struct blob_s { | 163 typedef struct blob_s { |
157 /* Stuff needed by VbKernelPreambleHeader */ | 164 /* Stuff needed by VbKernelPreambleHeader */ |
158 uint64_t kernel_version; | 165 uint64_t kernel_version; |
159 uint64_t bootloader_address; | 166 uint64_t bootloader_address; |
160 uint64_t bootloader_size; | 167 uint64_t bootloader_size; |
161 /* Raw kernel blob data */ | 168 /* Raw kernel blob data */ |
162 uint64_t blob_size; | 169 uint64_t blob_size; |
163 uint8_t *blob; | 170 uint8_t *blob; |
| 171 |
| 172 /* these fields are not always initialized */ |
| 173 VbKernelPreambleHeader* preamble; |
| 174 VbKeyBlockHeader* key_block; |
| 175 uint8_t *buf; |
| 176 |
164 } blob_t; | 177 } blob_t; |
165 | 178 |
| 179 /* Given a blob return the location of the kernel command line buffer. */ |
| 180 static char* BpCmdLineLocation(blob_t *bp) |
| 181 { |
| 182 return (char*)(bp->blob + bp->bootloader_address - CROS_32BIT_ENTRY_ADDR - |
| 183 CROS_CONFIG_SIZE - CROS_PARAMS_SIZE); |
| 184 } |
166 | 185 |
167 static void FreeBlob(blob_t *bp) { | 186 static void FreeBlob(blob_t *bp) { |
168 if (bp) { | 187 if (bp) { |
169 if (bp->blob) | 188 if (bp->blob) |
170 Free(bp->blob); | 189 Free(bp->blob); |
| 190 if (bp->buf) |
| 191 Free(bp->buf); |
171 Free(bp); | 192 Free(bp); |
172 } | 193 } |
173 } | 194 } |
174 | 195 |
| 196 /* |
| 197 * Read the kernel command line from a file. Get rid of \n characters along |
| 198 * the way and verify that the line fits into a 4K buffer. |
| 199 * |
| 200 * Return the buffer contaning the line on success (and set the line length |
| 201 * using the passed in parameter), or NULL in case something goes wrong. |
| 202 */ |
| 203 static uint8_t* ReadConfigFile(const char* config_file, uint64_t* config_size) |
| 204 { |
| 205 uint8_t* config_buf; |
| 206 int ii; |
| 207 |
| 208 config_buf = ReadFile(config_file, config_size); |
| 209 Debug(" config file size=0x%" PRIx64 "\n", *config_size); |
| 210 if (CROS_CONFIG_SIZE <= *config_size) { /* need room for trailing '\0' */ |
| 211 error("Config file %s is too large (>= %d bytes)\n", |
| 212 config_file, CROS_CONFIG_SIZE); |
| 213 return NULL; |
| 214 } |
| 215 |
| 216 /* Replace newlines with spaces */ |
| 217 for (ii = 0; ii < *config_size; ii++) { |
| 218 if ('\n' == config_buf[ii]) { |
| 219 config_buf[ii] = ' '; |
| 220 } |
| 221 } |
| 222 return config_buf; |
| 223 } |
| 224 |
175 /* Create a blob from its components */ | 225 /* Create a blob from its components */ |
176 static blob_t *NewBlob(uint64_t version, | 226 static blob_t *NewBlob(uint64_t version, |
177 const char* vmlinuz, | 227 const char* vmlinuz, |
178 const char* bootloader_file, | 228 const char* bootloader_file, |
179 const char* config_file) { | 229 const char* config_file) { |
180 blob_t *bp; | 230 blob_t *bp; |
181 struct linux_kernel_header *lh = 0; | 231 struct linux_kernel_header *lh = 0; |
182 struct linux_kernel_params *params = 0; | 232 struct linux_kernel_params *params = 0; |
183 uint8_t* config_buf; | 233 uint8_t* config_buf; |
184 uint64_t config_size; | 234 uint64_t config_size; |
185 uint8_t* bootloader_buf; | 235 uint8_t* bootloader_buf; |
186 uint64_t bootloader_size; | 236 uint64_t bootloader_size; |
187 uint8_t* kernel_buf; | 237 uint8_t* kernel_buf; |
188 uint64_t kernel_size; | 238 uint64_t kernel_size; |
189 uint64_t kernel32_start = 0; | 239 uint64_t kernel32_start = 0; |
190 uint64_t kernel32_size = 0; | 240 uint64_t kernel32_size = 0; |
191 uint32_t cmdline_addr; | 241 uint32_t cmdline_addr; |
192 uint8_t* blob = NULL; | 242 uint8_t* blob = NULL; |
193 uint64_t now = 0; | 243 uint64_t now = 0; |
194 uint64_t i; | |
195 | 244 |
196 if (!vmlinuz || !bootloader_file || !config_file) { | 245 if (!vmlinuz || !bootloader_file || !config_file) { |
197 error("Must specify all input files\n"); | 246 error("Must specify all input files\n"); |
198 return 0; | 247 return 0; |
199 } | 248 } |
200 | 249 |
201 bp = (blob_t *)Malloc(sizeof(blob_t)); | 250 bp = (blob_t *)Malloc(sizeof(blob_t)); |
202 if (!bp) { | 251 if (!bp) { |
203 error("Couldn't allocate bytes for blob_t.\n"); | 252 error("Couldn't allocate bytes for blob_t.\n"); |
204 return 0; | 253 return 0; |
205 } | 254 } |
| 255 |
| 256 Memset(bp, 0, sizeof(*bp)); |
206 bp->kernel_version = version; | 257 bp->kernel_version = version; |
207 | 258 |
208 /* Read the config file */ | 259 /* Read the config file */ |
209 Debug("Reading %s\n", config_file); | 260 Debug("Reading %s\n", config_file); |
210 config_buf = ReadFile(config_file, &config_size); | 261 config_buf = ReadConfigFile(config_file, &config_size); |
211 if (!config_buf) | 262 if (!config_buf) |
212 return 0; | 263 return 0; |
213 Debug(" config file size=0x%" PRIx64 "\n", config_size); | |
214 if (CROS_CONFIG_SIZE <= config_size) { /* need room for trailing '\0' */ | |
215 error("Config file %s is too large (>= %d bytes)\n", | |
216 config_file, CROS_CONFIG_SIZE); | |
217 return 0; | |
218 } | |
219 /* Replace newlines with spaces */ | |
220 for (i = 0; i < config_size; i++) | |
221 if ('\n' == config_buf[i]) | |
222 config_buf[i] = ' '; | |
223 | 264 |
224 /* Read the bootloader */ | 265 /* Read the bootloader */ |
225 Debug("Reading %s\n", bootloader_file); | 266 Debug("Reading %s\n", bootloader_file); |
226 bootloader_buf = ReadFile(bootloader_file, &bootloader_size); | 267 bootloader_buf = ReadFile(bootloader_file, &bootloader_size); |
227 if (!bootloader_buf) | 268 if (!bootloader_buf) |
228 return 0; | 269 return 0; |
229 Debug(" bootloader file size=0x%" PRIx64 "\n", bootloader_size); | 270 Debug(" bootloader file size=0x%" PRIx64 "\n", bootloader_size); |
230 | 271 |
231 /* Read the kernel */ | 272 /* Read the kernel */ |
232 Debug("Reading %s\n", vmlinuz); | 273 Debug("Reading %s\n", vmlinuz); |
(...skipping 79 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
312 Free(config_buf); | 353 Free(config_buf); |
313 Free(bootloader_buf); | 354 Free(bootloader_buf); |
314 | 355 |
315 /* Success */ | 356 /* Success */ |
316 return bp; | 357 return bp; |
317 } | 358 } |
318 | 359 |
319 | 360 |
320 /* Pull the blob_t stuff out of a prepacked kernel blob file */ | 361 /* Pull the blob_t stuff out of a prepacked kernel blob file */ |
321 static blob_t *OldBlob(const char* filename) { | 362 static blob_t *OldBlob(const char* filename) { |
322 FILE* fp; | 363 FILE* fp = NULL; |
323 blob_t *bp; | 364 blob_t *bp = NULL; |
324 struct stat statbuf; | 365 struct stat statbuf; |
325 VbKeyBlockHeader* key_block; | 366 VbKeyBlockHeader* key_block; |
326 VbKernelPreambleHeader* preamble; | 367 VbKernelPreambleHeader* preamble; |
327 uint64_t now = 0; | 368 uint64_t now = 0; |
328 uint8_t buf[DEFAULT_PADDING]; | 369 uint8_t* buf = NULL; |
| 370 int ret_error = 1; |
329 | 371 |
330 if (!filename) { | 372 if (!filename) { |
331 error("Must specify prepacked blob to read\n"); | 373 error("Must specify prepacked blob to read\n"); |
332 return 0; | 374 return 0; |
333 } | 375 } |
334 | 376 |
335 if (0 != stat(filename, &statbuf)) { | 377 if (0 != stat(filename, &statbuf)) { |
336 error("unable to stat %s: %s\n", filename, strerror(errno)); | 378 error("unable to stat %s: %s\n", filename, strerror(errno)); |
337 return 0; | 379 return 0; |
338 } | 380 } |
339 | 381 |
340 Debug("%s size is 0x%" PRIx64 "\n", filename, statbuf.st_size); | 382 Debug("%s size is 0x%" PRIx64 "\n", filename, statbuf.st_size); |
341 if (statbuf.st_size < DEFAULT_PADDING) { | 383 if (statbuf.st_size < DEFAULT_PADDING) { |
342 error("%s is too small to be a valid kernel blob\n"); | 384 error("%s is too small to be a valid kernel blob\n"); |
343 return 0; | 385 return 0; |
344 } | 386 } |
345 | 387 |
346 Debug("Reading %s\n", filename); | 388 Debug("Reading %s\n", filename); |
347 fp = fopen(filename, "rb"); | 389 fp = fopen(filename, "rb"); |
348 if (!fp) { | 390 if (!fp) { |
349 error("Unable to open file %s: %s\n", filename, strerror(errno)); | 391 error("Unable to open file %s: %s\n", filename, strerror(errno)); |
350 return 0; | 392 return 0; |
351 } | 393 } |
352 | 394 |
353 if (1 != fread(buf, sizeof(buf), 1, fp)) { | 395 buf = Malloc(DEFAULT_PADDING); |
| 396 if (!buf) { |
| 397 error("Unable to allocate padding\n"); |
| 398 goto unwind_oldblob; |
| 399 } |
| 400 |
| 401 if (1 != fread(buf, DEFAULT_PADDING, 1, fp)) { |
354 error("Unable to read header from %s: %s\n", filename, strerror(errno)); | 402 error("Unable to read header from %s: %s\n", filename, strerror(errno)); |
355 fclose(fp); | 403 goto unwind_oldblob; |
356 return 0; | |
357 } | 404 } |
358 | 405 |
359 /* Skip the key block */ | 406 /* Skip the key block */ |
360 key_block = (VbKeyBlockHeader*)buf; | 407 key_block = (VbKeyBlockHeader*)buf; |
361 Debug("Keyblock is 0x%" PRIx64 " bytes\n", key_block->key_block_size); | 408 Debug("Keyblock is 0x%" PRIx64 " bytes\n", key_block->key_block_size); |
362 now += key_block->key_block_size; | 409 now += key_block->key_block_size; |
363 if (now > statbuf.st_size) { | 410 if (now > statbuf.st_size) { |
364 error("key_block_size advances past the end of the blob\n"); | 411 error("key_block_size advances past the end of the blob\n"); |
365 return 0; | 412 goto unwind_oldblob; |
366 } | 413 } |
367 | 414 |
368 /* Skip the preamble */ | 415 /* Skip the preamble */ |
369 preamble = (VbKernelPreambleHeader*)(buf + now); | 416 preamble = (VbKernelPreambleHeader*)(buf + now); |
370 Debug("Preamble is 0x%" PRIx64 " bytes\n", preamble->preamble_size); | 417 Debug("Preamble is 0x%" PRIx64 " bytes\n", preamble->preamble_size); |
371 now += preamble->preamble_size; | 418 now += preamble->preamble_size; |
372 if (now > statbuf.st_size) { | 419 if (now > statbuf.st_size) { |
373 error("preamble_size advances past the end of the blob\n"); | 420 error("preamble_size advances past the end of the blob\n"); |
374 return 0; | 421 goto unwind_oldblob; |
375 } | 422 } |
376 | 423 |
377 /* Go find the kernel blob */ | 424 /* Go find the kernel blob */ |
378 Debug("kernel blob is at offset 0x%" PRIx64 "\n", now); | 425 Debug("kernel blob is at offset 0x%" PRIx64 "\n", now); |
379 if (0 != fseek(fp, now, SEEK_SET)) { | 426 if (0 != fseek(fp, now, SEEK_SET)) { |
380 error("Unable to seek to 0x%" PRIx64 " in %s: %s\n", now, filename, | 427 error("Unable to seek to 0x%" PRIx64 " in %s: %s\n", now, filename, |
381 strerror(errno)); | 428 strerror(errno)); |
382 fclose(fp); | 429 goto unwind_oldblob; |
383 return 0; | |
384 } | 430 } |
385 | 431 |
386 /* Remember what we've got */ | 432 /* Remember what we've got */ |
387 bp = (blob_t *)Malloc(sizeof(blob_t)); | 433 bp = (blob_t *)Malloc(sizeof(blob_t)); |
388 if (!bp) { | 434 if (!bp) { |
389 error("Couldn't allocate bytes for blob_t.\n"); | 435 error("Couldn't allocate bytes for blob_t.\n"); |
390 fclose(fp); | 436 goto unwind_oldblob; |
391 return 0; | |
392 } | 437 } |
393 | 438 |
| 439 bp->buf = buf; |
| 440 bp->key_block = key_block; |
| 441 bp->preamble = preamble; |
| 442 |
394 bp->kernel_version = preamble->kernel_version; | 443 bp->kernel_version = preamble->kernel_version; |
395 bp->bootloader_address = preamble->bootloader_address; | 444 bp->bootloader_address = preamble->bootloader_address; |
396 bp->bootloader_size = preamble->bootloader_size; | 445 bp->bootloader_size = preamble->bootloader_size; |
397 bp->blob_size = preamble->body_signature.data_size; | 446 bp->blob_size = preamble->body_signature.data_size; |
398 | 447 |
399 Debug(" kernel_version = %d\n", bp->kernel_version); | 448 Debug(" kernel_version = %d\n", bp->kernel_version); |
400 Debug(" bootloader_address = 0x%" PRIx64 "\n", bp->bootloader_address); | 449 Debug(" bootloader_address = 0x%" PRIx64 "\n", bp->bootloader_address); |
401 Debug(" bootloader_size = 0x%" PRIx64 "\n", bp->bootloader_size); | 450 Debug(" bootloader_size = 0x%" PRIx64 "\n", bp->bootloader_size); |
402 Debug(" blob_size = 0x%" PRIx64 "\n", bp->blob_size); | 451 Debug(" blob_size = 0x%" PRIx64 "\n", bp->blob_size); |
403 | 452 |
404 bp->blob = (uint8_t *)Malloc(bp->blob_size); | 453 bp->blob = (uint8_t *)Malloc(bp->blob_size); |
405 if (!bp->blob) { | 454 if (!bp->blob) { |
406 error("Couldn't allocate 0x%" PRIx64 " bytes for blob_t.\n", bp->blob_size); | 455 error("Couldn't allocate 0x%" PRIx64 " bytes for blob_t.\n", bp->blob_size); |
407 fclose(fp); | 456 goto unwind_oldblob; |
408 Free(bp); | |
409 return 0; | |
410 } | 457 } |
411 | 458 |
412 /* read it in */ | 459 /* read it in */ |
413 if (1 != fread(bp->blob, bp->blob_size, 1, fp)) { | 460 if (1 != fread(bp->blob, bp->blob_size, 1, fp)) { |
414 error("Unable to read kernel blob from %s: %s\n", filename, strerror(errno))
; | 461 error("Unable to read kernel blob from %s: %s\n", filename, strerror(errno))
; |
415 fclose(fp); | 462 goto unwind_oldblob; |
416 Free(bp); | |
417 return 0; | |
418 } | 463 } |
419 | 464 |
| 465 ret_error = 0; |
| 466 |
420 /* done */ | 467 /* done */ |
| 468 unwind_oldblob: |
421 fclose(fp); | 469 fclose(fp); |
422 | 470 if (ret_error) { |
| 471 if (bp) { |
| 472 FreeBlob(bp); |
| 473 bp = NULL; |
| 474 } else if (buf) { |
| 475 Free(buf); |
| 476 } |
| 477 } |
423 return bp; | 478 return bp; |
424 } | 479 } |
425 | 480 |
426 | 481 |
427 /* Pack a .kernel */ | 482 /* Pack a .kernel */ |
428 static int Pack(const char* outfile, const char* keyblock_file, | 483 static int Pack(const char* outfile, const char* keyblock_file, |
429 const char* signprivate, blob_t *bp, uint64_t pad, | 484 const char* signprivate, blob_t *bp, uint64_t pad, |
430 int vblockonly) { | 485 int vblockonly) { |
431 VbPrivateKey* signing_key; | 486 VbPrivateKey* signing_key; |
432 VbSignature* body_sig; | 487 VbSignature* body_sig; |
433 VbKernelPreambleHeader* preamble; | 488 VbKernelPreambleHeader* preamble; |
434 VbKeyBlockHeader* key_block; | 489 VbKeyBlockHeader* key_block; |
435 uint64_t key_block_size; | 490 uint64_t key_block_size; |
436 FILE* f; | 491 FILE* f; |
437 uint64_t i; | 492 uint64_t i; |
438 | 493 |
439 if (!outfile) { | 494 if (!outfile) { |
440 error("Must specify output filename\n"); | 495 error("Must specify output filename\n"); |
441 return 1; | 496 return 1; |
442 } | 497 } |
443 if (!keyblock_file || !signprivate) { | 498 if ((!keyblock_file && !bp->key_block) || !signprivate) { |
444 error("Must specify all keys\n"); | 499 error("Must specify all keys\n"); |
445 return 1; | 500 return 1; |
446 } | 501 } |
447 if (!bp) { | 502 if (!bp) { |
448 error("Refusing to pack invalid kernel blob\n"); | 503 error("Refusing to pack invalid kernel blob\n"); |
449 return 1; | 504 return 1; |
450 } | 505 } |
451 | 506 |
452 /* Read the key block and private key */ | 507 /* Get the key block and read the private key. */ |
453 key_block = (VbKeyBlockHeader*)ReadFile(keyblock_file, &key_block_size); | 508 if (keyblock_file) { |
454 if (!key_block) { | 509 key_block = (VbKeyBlockHeader*)ReadFile(keyblock_file, &key_block_size); |
455 error("Error reading key block.\n"); | 510 if (!key_block) { |
456 return 1; | 511 error("Error reading key block.\n"); |
| 512 return 1; |
| 513 } |
| 514 } else { |
| 515 key_block = bp->key_block; |
| 516 key_block_size = key_block->key_block_size; |
457 } | 517 } |
| 518 |
458 if (pad < key_block->key_block_size) { | 519 if (pad < key_block->key_block_size) { |
459 error("Pad too small\n"); | 520 error("Pad too small\n"); |
460 return 1; | 521 return 1; |
461 } | 522 } |
462 | 523 |
463 signing_key = PrivateKeyRead(signprivate); | 524 signing_key = PrivateKeyRead(signprivate); |
464 if (!signing_key) { | 525 if (!signing_key) { |
465 error("Error reading signing key.\n"); | 526 error("Error reading signing key.\n"); |
466 return 1; | 527 return 1; |
467 } | 528 } |
(...skipping 46 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
514 return 1; | 575 return 1; |
515 } | 576 } |
516 } | 577 } |
517 | 578 |
518 fclose(f); | 579 fclose(f); |
519 | 580 |
520 /* Success */ | 581 /* Success */ |
521 return 0; | 582 return 0; |
522 } | 583 } |
523 | 584 |
| 585 /* |
| 586 * Replace kernel command line in a blob representing a kernel. |
| 587 */ |
| 588 static int ReplaceConfig(blob_t* bp, const char* config_file) |
| 589 { |
| 590 uint8_t* new_conf; |
| 591 uint64_t config_size; |
524 | 592 |
525 static int Verify(const char* infile, const char* signpubkey) { | 593 if (!config_file) { |
| 594 return 0; |
| 595 } |
| 596 |
| 597 new_conf = ReadConfigFile(config_file, &config_size); |
| 598 if (!new_conf) { |
| 599 return 1; |
| 600 } |
| 601 |
| 602 /* fill the config buffer with zeros */ |
| 603 Memset(BpCmdLineLocation(bp), 0, CROS_CONFIG_SIZE); |
| 604 Memcpy(BpCmdLineLocation(bp), new_conf, config_size); |
| 605 Free(new_conf); |
| 606 return 0; |
| 607 } |
| 608 |
| 609 static int Verify(const char* infile, const char* signpubkey, int verbose) { |
526 | 610 |
527 VbKeyBlockHeader* key_block; | 611 VbKeyBlockHeader* key_block; |
528 VbKernelPreambleHeader* preamble; | 612 VbKernelPreambleHeader* preamble; |
529 VbPublicKey* data_key; | 613 VbPublicKey* data_key; |
530 VbPublicKey* sign_key; | 614 VbPublicKey* sign_key; |
531 RSAPublicKey* rsa; | 615 RSAPublicKey* rsa; |
532 uint8_t* blob; | 616 blob_t* bp; |
533 uint64_t blob_size; | 617 uint64_t now; |
534 uint64_t now = 0; | 618 int rv = 1; |
535 | 619 |
536 if (!infile || !signpubkey) { | 620 if (!infile || !signpubkey) { |
537 error("Must specify filename and signpubkey\n"); | 621 error("Must specify filename and signpubkey\n"); |
538 return 1; | 622 return 1; |
539 } | 623 } |
540 | 624 |
541 /* Read public signing key */ | 625 /* Read public signing key */ |
542 sign_key = PublicKeyRead(signpubkey); | 626 sign_key = PublicKeyRead(signpubkey); |
543 if (!sign_key) { | 627 if (!sign_key) { |
544 error("Error reading signpubkey.\n"); | 628 error("Error reading signpubkey.\n"); |
545 return 1; | 629 return 1; |
546 } | 630 } |
547 | 631 |
548 /* Read blob */ | 632 /* Read blob */ |
549 blob = ReadFile(infile, &blob_size); | 633 bp = OldBlob(infile); |
550 if (!blob) { | 634 if (!bp) { |
551 error("Error reading input file\n"); | 635 error("Error reading input file\n"); |
552 return 1; | 636 return 1; |
553 } | 637 } |
554 | 638 |
555 /* Verify key block */ | 639 /* Verify key block */ |
556 key_block = (VbKeyBlockHeader*)blob; | 640 key_block = bp->key_block; |
557 if (0 != KeyBlockVerify(key_block, blob_size, sign_key)) { | 641 if (0 != KeyBlockVerify(key_block, bp->blob_size, sign_key)) { |
558 error("Error verifying key block.\n"); | 642 error("Error verifying key block.\n"); |
559 return 1; | 643 goto verify_exit; |
560 } | 644 } |
561 Free(sign_key); | 645 now = key_block->key_block_size; |
562 now += key_block->key_block_size; | |
563 | 646 |
564 printf("Key block:\n"); | 647 printf("Key block:\n"); |
565 data_key = &key_block->data_key; | 648 data_key = &key_block->data_key; |
566 printf(" Size: 0x%" PRIx64 "\n", key_block->key_block_size); | 649 printf(" Size: 0x%" PRIx64 "\n", key_block->key_block_size); |
567 printf(" Data key algorithm: %" PRIu64 " %s\n", data_key->algorithm, | 650 printf(" Data key algorithm: %" PRIu64 " %s\n", data_key->algorithm, |
568 (data_key->algorithm < kNumAlgorithms ? | 651 (data_key->algorithm < kNumAlgorithms ? |
569 algo_strings[data_key->algorithm] : "(invalid)")); | 652 algo_strings[data_key->algorithm] : "(invalid)")); |
570 printf(" Data key version: %" PRIu64 "\n", data_key->key_version); | 653 printf(" Data key version: %" PRIu64 "\n", data_key->key_version); |
571 printf(" Flags: %" PRIu64 "\n", key_block->key_block_flags); | 654 printf(" Flags: %" PRIu64 "\n", key_block->key_block_flags); |
572 | 655 |
573 rsa = PublicKeyToRSA(&key_block->data_key); | 656 rsa = PublicKeyToRSA(&key_block->data_key); |
574 if (!rsa) { | 657 if (!rsa) { |
575 error("Error parsing data key.\n"); | 658 error("Error parsing data key.\n"); |
576 return 1; | 659 goto verify_exit; |
577 } | 660 } |
578 | 661 |
579 /* Verify preamble */ | 662 /* Verify preamble */ |
580 preamble = (VbKernelPreambleHeader*)(blob + now); | 663 preamble = bp->preamble; |
581 if (0 != VerifyKernelPreamble2(preamble, blob_size - now, rsa)) { | 664 if (0 != VerifyKernelPreamble2( |
| 665 preamble, bp->blob_size - key_block->key_block_size, rsa)) { |
582 error("Error verifying preamble.\n"); | 666 error("Error verifying preamble.\n"); |
583 return 1; | 667 goto verify_exit; |
584 } | 668 } |
585 now += preamble->preamble_size; | 669 now += preamble->preamble_size; |
586 | 670 |
587 printf("Preamble:\n"); | 671 printf("Preamble:\n"); |
588 printf(" Size: 0x%" PRIx64 "\n", preamble->preamble_size); | 672 printf(" Size: 0x%" PRIx64 "\n", preamble->preamble_size); |
589 printf(" Header version: %" PRIu32 ".%" PRIu32"\n", | 673 printf(" Header version: %" PRIu32 ".%" PRIu32"\n", |
590 preamble->header_version_major, preamble->header_version_minor); | 674 preamble->header_version_major, preamble->header_version_minor); |
591 printf(" Kernel version: %" PRIu64 "\n", preamble->kernel_version); | 675 printf(" Kernel version: %" PRIu64 "\n", preamble->kernel_version); |
592 printf(" Body load address: 0x%" PRIx64 "\n", preamble->body_load_address); | 676 printf(" Body load address: 0x%" PRIx64 "\n", preamble->body_load_address); |
593 printf(" Body size: 0x%" PRIx64 "\n", | 677 printf(" Body size: 0x%" PRIx64 "\n", |
594 preamble->body_signature.data_size); | 678 preamble->body_signature.data_size); |
595 printf(" Bootloader address: 0x%" PRIx64 "\n", preamble->bootloader_address)
; | 679 printf(" Bootloader address: 0x%" PRIx64 "\n", preamble->bootloader_address)
; |
596 printf(" Bootloader size: 0x%" PRIx64 "\n", preamble->bootloader_size); | 680 printf(" Bootloader size: 0x%" PRIx64 "\n", preamble->bootloader_size); |
597 | 681 |
598 /* Verify body */ | 682 /* Verify body */ |
599 if (0 != VerifyData(blob + now, &preamble->body_signature, rsa)) { | 683 if (0 != VerifyData(bp->blob, &preamble->body_signature, rsa)) { |
600 error("Error verifying kernel body.\n"); | 684 error("Error verifying kernel body.\n"); |
601 return 1; | 685 goto verify_exit; |
602 } | 686 } |
603 printf("Body verification succeeded.\n"); | 687 printf("Body verification succeeded.\n"); |
604 return 0; | 688 |
| 689 rv = 0; |
| 690 |
| 691 if (!verbose) { |
| 692 goto verify_exit; |
| 693 } |
| 694 |
| 695 printf("Config:\n%s\n", BpCmdLineLocation(bp)); |
| 696 |
| 697 verify_exit: |
| 698 FreeBlob(bp); |
| 699 return rv; |
605 } | 700 } |
606 | 701 |
607 | 702 |
608 int main(int argc, char* argv[]) { | 703 int main(int argc, char* argv[]) { |
609 char* filename = NULL; | 704 char* filename = NULL; |
610 char* oldfile = NULL; | 705 char* oldfile = NULL; |
611 char* key_block_file = NULL; | 706 char* key_block_file = NULL; |
612 char* signpubkey = NULL; | 707 char* signpubkey = NULL; |
613 char* signprivate = NULL; | 708 char* signprivate = NULL; |
614 uint64_t version = 0; | 709 uint64_t version = 0; |
615 char* vmlinuz = NULL; | 710 char* vmlinuz = NULL; |
616 char* bootloader = NULL; | 711 char* bootloader = NULL; |
617 char* config_file = NULL; | 712 char* config_file = NULL; |
618 int vblockonly = 0; | 713 int vblockonly = 0; |
| 714 int verbose = 0; |
619 uint64_t pad = DEFAULT_PADDING; | 715 uint64_t pad = DEFAULT_PADDING; |
620 int mode = 0; | 716 int mode = 0; |
621 int parse_error = 0; | 717 int parse_error = 0; |
622 char* e; | 718 char* e; |
623 int i,r; | 719 int i,r; |
624 blob_t *bp; | 720 blob_t *bp; |
625 | 721 |
626 | 722 |
627 char *progname = strrchr(argv[0], '/'); | 723 char *progname = strrchr(argv[0], '/'); |
628 if (progname) | 724 if (progname) |
629 progname++; | 725 progname++; |
630 else | 726 else |
631 progname = argv[0]; | 727 progname = argv[0]; |
632 | 728 |
633 while ((i = getopt_long(argc, argv, ":", long_opts, NULL)) != -1) { | 729 while (((i = getopt_long(argc, argv, ":", long_opts, NULL)) != -1) && |
| 730 !parse_error) { |
634 switch (i) { | 731 switch (i) { |
| 732 default: |
635 case '?': | 733 case '?': |
636 /* Unhandled option */ | 734 /* Unhandled option */ |
637 parse_error = 1; | 735 parse_error = 1; |
638 break; | 736 break; |
639 | 737 |
640 case OPT_MODE_PACK: | 738 case OPT_MODE_PACK: |
641 case OPT_MODE_REPACK: | 739 case OPT_MODE_REPACK: |
642 case OPT_MODE_VERIFY: | 740 case OPT_MODE_VERIFY: |
| 741 if (mode && (mode != i)) { |
| 742 fprintf(stderr, "Only single mode can be specified\n"); |
| 743 parse_error = 1; |
| 744 break; |
| 745 } |
643 mode = i; | 746 mode = i; |
644 filename = optarg; | 747 filename = optarg; |
645 break; | 748 break; |
646 | 749 |
647 case OPT_OLDBLOB: | 750 case OPT_OLDBLOB: |
648 oldfile = optarg; | 751 oldfile = optarg; |
649 break; | 752 break; |
650 | 753 |
651 case OPT_KEYBLOCK: | 754 case OPT_KEYBLOCK: |
652 key_block_file = optarg; | 755 key_block_file = optarg; |
(...skipping 31 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
684 } | 787 } |
685 break; | 788 break; |
686 | 789 |
687 case OPT_PAD: | 790 case OPT_PAD: |
688 pad = strtoul(optarg, &e, 0); | 791 pad = strtoul(optarg, &e, 0); |
689 if (!*optarg || (e && *e)) { | 792 if (!*optarg || (e && *e)) { |
690 fprintf(stderr, "Invalid --pad\n"); | 793 fprintf(stderr, "Invalid --pad\n"); |
691 parse_error = 1; | 794 parse_error = 1; |
692 } | 795 } |
693 break; | 796 break; |
| 797 |
| 798 case OPT_VERBOSE: |
| 799 verbose = 1; |
| 800 break; |
694 } | 801 } |
695 } | 802 } |
696 | 803 |
697 if (parse_error) | 804 if (parse_error) |
698 return PrintHelp(progname); | 805 return PrintHelp(progname); |
699 | 806 |
700 switch(mode) { | 807 switch(mode) { |
701 case OPT_MODE_PACK: | 808 case OPT_MODE_PACK: |
702 bp = NewBlob(version, vmlinuz, bootloader, config_file); | 809 bp = NewBlob(version, vmlinuz, bootloader, config_file); |
703 if (!bp) | 810 if (!bp) |
704 return 1; | 811 return 1; |
705 r = Pack(filename, key_block_file, signprivate, bp, pad, vblockonly); | 812 r = Pack(filename, key_block_file, signprivate, bp, pad, vblockonly); |
706 FreeBlob(bp); | 813 FreeBlob(bp); |
707 return r; | 814 return r; |
708 | 815 |
709 case OPT_MODE_REPACK: | 816 case OPT_MODE_REPACK: |
| 817 if (!config_file && !key_block_file) { |
| 818 fprintf(stderr, |
| 819 "You must supply at least one of --config and --keyblock\n"); |
| 820 return 1; |
| 821 } |
| 822 |
710 bp = OldBlob(oldfile); | 823 bp = OldBlob(oldfile); |
711 if (!bp) | 824 if (!bp) |
712 return 1; | 825 return 1; |
713 r = Pack(filename, key_block_file, signprivate, bp, pad, vblockonly); | 826 r = ReplaceConfig(bp, config_file); |
| 827 if (!r) { |
| 828 r = Pack(filename, key_block_file, signprivate, bp, pad, vblockonly); |
| 829 } |
714 FreeBlob(bp); | 830 FreeBlob(bp); |
715 return r; | 831 return r; |
716 | 832 |
717 case OPT_MODE_VERIFY: | 833 case OPT_MODE_VERIFY: |
718 return Verify(filename, signpubkey); | 834 return Verify(filename, signpubkey, verbose); |
719 | 835 |
720 default: | 836 default: |
721 fprintf(stderr, | 837 fprintf(stderr, |
722 "You must specify a mode: --pack, --repack or --verify\n"); | 838 "You must specify a mode: --pack, --repack or --verify\n"); |
723 return PrintHelp(progname); | 839 return PrintHelp(progname); |
724 } | 840 } |
725 } | 841 } |
OLD | NEW |