blob: 04eee1cf97b8b8bde9585bc1f50924f65575732e [file] [log] [blame]
// Copyright 2018 The Chromium OS Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "cryptohome/sign_in_hash_tree.h"
#include <fcntl.h>
#include <utility>
#include <base/files/file_util.h>
#include <brillo/secure_blob.h>
#include "cryptohome/cryptolib.h"
#include "hash_tree_leaf_data.pb.h" // NOLINT(build/include)
namespace {
const char kHashCacheFileName[] = "hashcache";
}
namespace cryptohome {
SignInHashTree::SignInHashTree(uint32_t leaf_length,
uint8_t bits_per_level,
base::FilePath basedir)
: leaf_length_(leaf_length),
fan_out_(1 << bits_per_level),
bits_per_level_(bits_per_level),
p_(new Platform()),
plt_(p_.get(), basedir) {
// leaf_length_ should be divisible by bits_per_level_.
CHECK(!(leaf_length_ % bits_per_level_));
// TODO(pmalani): This should not happen on cryptohomed restart.
plt_.InitOnBoot();
// The number of entries in the hash tree can be given by the geometric
// series: For a height H, the number of entries in the hash tree can be given
// by the relation:
// num_entries(H) = num_entries(H-1) + fan_out^(H-1)
//
// This can be collapsed into the closed form expression:
// num_entries(H) = (fan_out^(H + 1) - 1) / (fan_out - 1)
uint32_t height = leaf_length_ / bits_per_level_;
uint32_t num_entries =
((1 << (bits_per_level_ * (height + 1))) - 1) / (fan_out_ - 1);
// Ensure a hash cache file of the right size exists, so that we can mmap it
// correctly later.
base::FilePath hash_cache_file = basedir.Append(kHashCacheFileName);
auto hash_cache_fd = std::make_unique<base::ScopedFD>(open(
hash_cache_file.value().c_str(), O_CREAT | O_RDWR, S_IRUSR | S_IWUSR));
CHECK(hash_cache_fd->is_valid());
CHECK(!ftruncate(hash_cache_fd->get(), num_entries * 32));
hash_cache_fd.reset();
CHECK(hash_cache_.Initialize(hash_cache_file,
base::MemoryMappedFile::READ_WRITE));
hash_cache_array_ = reinterpret_cast<uint8_t(*)[32]>(hash_cache_.data());
}
SignInHashTree::~SignInHashTree() {}
std::vector<SignInHashTree::Label> SignInHashTree::GetAuxiliaryLabels(
const Label& leaf_label) {
std::vector<Label> aux_labels;
Label cur_label = leaf_label;
while (!cur_label.is_root()) {
Label parent = cur_label.GetParent();
for (uint64_t i = 0; i < fan_out_; i++) {
Label child = parent.Extend(i);
if (child != cur_label) {
aux_labels.push_back(child);
}
}
cur_label = parent;
}
return aux_labels;
}
void SignInHashTree::GenerateAndStoreHashCache() {
// First, call a GetLabel() on each leaf node and update
// the corresponding |hash_cache_| indices.
for (uint64_t i = 0; i < (1 << leaf_length_); i++) {
std::vector<uint8_t> hmac, cred_metadata;
Label label(i, leaf_length_, bits_per_level_);
if (!GetLabelData(label, &hmac, &cred_metadata)) {
LOG(ERROR) << "Error getting leaf HMAC, can't regenerate HashCache.";
return;
}
memcpy(hash_cache_array_[label.cache_index()], hmac.data(), 32);
}
// Then, calculate all the inner label hashes.
CalculateHash(Label(0, 0, bits_per_level_));
}
bool SignInHashTree::StoreLabel(const Label& label,
const std::vector<uint8_t>& hmac,
const std::vector<uint8_t>& cred_metadata) {
if (IsLeafLabel(label)) {
// Place the data in a protobuf and then write out to storage.
HashTreeLeafData leaf_data;
leaf_data.set_mac(hmac.data(), hmac.size());
leaf_data.set_credential_metadata(cred_metadata.data(),
cred_metadata.size());
std::vector<uint8_t> merged_blob(leaf_data.ByteSize());
if (!leaf_data.SerializeToArray(merged_blob.data(), merged_blob.size())) {
LOG(ERROR) << "Couldn't serialize leaf data, label: " << label.value();
return false;
}
if (plt_.StoreValue(label.value(), merged_blob) != PLT_SUCCESS) {
LOG(ERROR) << "Couldn't store label: " << label.value() << " in PLT.";
return false;
}
}
memcpy(hash_cache_array_[label.cache_index()], hmac.data(), 32);
UpdateHashCacheLabelPath(label);
return true;
}
bool SignInHashTree::RemoveLabel(const Label& label) {
// Update the PLT if |label| is a leaf node.
if (!IsLeafLabel(label)) {
LOG(ERROR) << "Label provided is not for leaf node: " << label.value();
return false;
}
if (plt_.RemoveKey(label.value()) != PLT_SUCCESS) {
LOG(ERROR) << "Couldn't remove label: " << label.value() << " in PLT.";
return false;
}
std::vector<uint8_t> hmac(32, 0);
memcpy(hash_cache_array_[label.cache_index()], hmac.data(), 32);
UpdateHashCacheLabelPath(label);
return true;
}
bool SignInHashTree::GetLabelData(const Label& label,
std::vector<uint8_t>* hmac,
std::vector<uint8_t>* cred_metadata) {
// If it is a leaf node, just get all the data from the PLT directly.
if (IsLeafLabel(label)) {
std::vector<uint8_t> merged_blob;
PLTError ret_val = plt_.GetValue(label.value(), &merged_blob);
if (ret_val == PLT_KEY_NOT_FOUND) {
// Return an all-zero HMAC.
hmac->assign(32, 0);
return true;
}
if (ret_val != PLT_SUCCESS) {
LOG(WARNING) << "Couldn't get key: " << label.value() << " in PLT.";
return false;
}
HashTreeLeafData leaf_data;
if (!leaf_data.ParseFromArray(merged_blob.data(), merged_blob.size())) {
LOG(INFO) << "Couldn't deserialize leaf data, label: " << label.value();
return false;
}
hmac->assign(leaf_data.mac().begin(), leaf_data.mac().end());
cred_metadata->assign(leaf_data.credential_metadata().begin(),
leaf_data.credential_metadata().end());
} else {
// If it is a inner leaf, get the value from the HashCache file.
hmac->assign(hash_cache_array_[label.cache_index()],
hash_cache_array_[label.cache_index()] + 32);
}
return true;
}
SignInHashTree::Label SignInHashTree::GetFreeLabel() {
// Iterate through all the leaf nodes in the PLT and see if any key is valid.
//
// TODO(pmalani): This approach will lead to the labels bunching near
// the start of the label namespace. This may be problematic when an
// out-of-sync situation that only affects the first child of the root would
// cause the entire tree to always go out of sync. Try to evenly space out the
// distribution of labels.
for (uint64_t i = 0; i < (1 << leaf_length_); i++) {
if (!plt_.KeyExists(i)) {
return Label(i, leaf_length_, bits_per_level_);
}
}
return Label();
}
std::vector<uint8_t> SignInHashTree::CalculateHash(const Label& label) {
std::vector<uint8_t> ret_val;
if (IsLeafLabel(label)) {
ret_val.assign(hash_cache_array_[label.cache_index()],
hash_cache_array_[label.cache_index()] + 32);
return ret_val;
}
// Join all the child hashes / HMACs together, and hash the result.
std::vector<uint8_t> input_buffer;
for (uint64_t i = 0; i < fan_out_; i++) {
Label child_label = label.Extend(i);
std::vector<uint8_t> child_hash = CalculateHash(child_label);
input_buffer.insert(input_buffer.end(), child_hash.begin(),
child_hash.end());
}
brillo::SecureBlob result_hash = CryptoLib::Sha256(input_buffer);
ret_val.assign(result_hash.begin(), result_hash.end());
// Update the hash cache with the new value.
memcpy(hash_cache_array_[label.cache_index()], ret_val.data(), 32);
return ret_val;
}
void SignInHashTree::UpdateHashCacheLabelPath(const Label& label) {
Label cur_label = label;
while (!cur_label.is_root()) {
Label parent = cur_label.GetParent();
std::vector<uint8_t> input_buffer;
for (uint64_t i = 0; i < fan_out_; i++) {
Label child_label = parent.Extend(i);
input_buffer.insert(input_buffer.end(),
hash_cache_array_[child_label.cache_index()],
hash_cache_array_[child_label.cache_index()] + 32);
}
brillo::SecureBlob result_hash = CryptoLib::Sha256(input_buffer);
memcpy(hash_cache_array_[parent.cache_index()], result_hash.data(), 32);
cur_label = parent;
}
}
} // namespace cryptohome