/* * Copyright (C) 2016 The Android Open Source Project * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ #include #include #include #include #include #include #include #include #include #include #include #include #include static RSA* load_key(const char* path) { std::string content; if (!android::base::ReadFileToString(path, &content) || content.size() < ANDROID_PUBKEY_ENCODED_SIZE) { fprintf(stderr, "Failed to load key from %s\n", path); return nullptr; } RSA* key = nullptr; if (!android_pubkey_decode(reinterpret_cast(content.c_str()), ANDROID_PUBKEY_ENCODED_SIZE, &key)) { fprintf(stderr, "Failed to parse key!\n"); return nullptr; } return key; } static int verify_table(const char* key_path, const uint8_t* signature, size_t signature_size, const char* table, uint32_t table_length) { // Hash the table uint8_t hash_buf[SHA256_DIGEST_LENGTH]; SHA256(const_cast(reinterpret_cast(table)), table_length, hash_buf); // Now get the public key from the keyfile std::unique_ptr key(load_key(key_path), RSA_free); if (!key) { fprintf(stderr, "Couldn't load verity keys\n"); return -1; } // Verify the result if (!RSA_verify(NID_sha256, hash_buf, sizeof(hash_buf), signature, signature_size, key.get())) { fprintf(stderr, "Couldn't verify table\n"); return -1; } return 0; } int main(int argc, char* argv[]) { if (argc != 4 || strcmp(argv[2], "-mincrypt") != 0) { printf("Usage: %s -mincrypt \n" " image the image file (raw or sparse image) to be verified\n" " verity_key the verity key in mincrypt format (/verity_key on device)\n", argv[0]); return 2; } // Get the raw image. android::base::unique_fd fd(open(argv[1], O_RDONLY)); if (fd == -1) { fprintf(stderr, "failed to open %s: %s\n", argv[1], strerror(errno)); return 1; } struct sparse_file* file = sparse_file_import_auto(fd, false, false); if (file == nullptr) { fprintf(stderr, "failed to read file %s\n", argv[1]); return 1; } TemporaryFile tf; if (sparse_file_write(file, tf.fd, false, false, false) < 0) { fprintf(stderr, "failed to write output file\n"); return 1; } sparse_file_destroy(file); // Verify. fec::io input(tf.path); if (!input) { return 1; } fec_verity_metadata verity; if (!input.get_verity_metadata(verity)) { fprintf(stderr, "failed to get verity metadata\n"); return 1; } int ret = verify_table(argv[3], verity.signature, sizeof(verity.signature), verity.table, verity.table_length); printf("%s\n", ret == 0 ? "VERIFIED" : "FAILED"); return ret; }