diff mbox series

[RFC,17/19] tools/vhost-user-rpmb: add key persistence

Message ID 20200925125147.26943-18-alex.bennee@linaro.org
State New
Headers show
Series vhost-user-rpmb (Replay Protected Memory Block) | expand

Commit Message

Alex Bennée Sept. 25, 2020, 12:51 p.m. UTC
Add support for persisting the key in --key-path. By default it will
accept the program-key command and store the key in the key file. If
you pass --key-set then the key is deemed to be programmed and can't
be re-programmed. Obviously you will need some other mechanism to let
the guest know what the key is so it can do other operations.

Signed-off-by: Alex Bennée <alex.bennee@linaro.org>
---
 tools/vhost-user-rpmb/main.c | 37 ++++++++++++++++++++++++++++++++++++
 1 file changed, 37 insertions(+)
diff mbox series

Patch

diff --git a/tools/vhost-user-rpmb/main.c b/tools/vhost-user-rpmb/main.c
index 49d4e00b24a9..34607ad19429 100644
--- a/tools/vhost-user-rpmb/main.c
+++ b/tools/vhost-user-rpmb/main.c
@@ -38,15 +38,19 @@ 
 
 static gchar *socket_path;
 static char *flash_path;
+static char *key_path;
 static gint socket_fd = -1;
 static gboolean print_cap;
 static gboolean verbose;
 static gboolean debug;
+static gboolean key_set;
 
 static GOptionEntry options[] =
 {
     { "socket-path", 0, 0, G_OPTION_ARG_FILENAME, &socket_path, "Location of vhost-user Unix domain socket, incompatible with --fd", "PATH" },
     { "flash-path", 0, 0, G_OPTION_ARG_FILENAME, &flash_path, "Location of raw flash image file", "PATH" },
+    { "key-path", 0, 0, G_OPTION_ARG_FILENAME, &key_path, "Location of persistent keyfile", "KEY"},
+    { "key-set", 0, 0, G_OPTION_ARG_NONE, &key_set, "Is the key already programmed", NULL},
     { "fd", 0, 0, G_OPTION_ARG_INT, &socket_fd, "Specify the file-descriptor of the backend, incompatible with --socket-path", "FD" },
     { "print-capabilities", 0, 0, G_OPTION_ARG_NONE, &print_cap, "Output to stdout the backend capabilities in JSON format and exit", NULL},
     { "verbose", 'v', 0, G_OPTION_ARG_NONE, &verbose, "Be more verbose in output", NULL},
@@ -296,8 +300,18 @@  static void vrpmb_handle_program_key(VuDev *dev, struct virtio_rpmb_frame *frame
     } else {
         r->key = g_memdup(&frame->key_mac[0], RPMB_KEY_MAC_SIZE);
         r->last_result = VIRTIO_RPMB_RES_OK;
+        if (key_path) {
+            GError *err = NULL;
+            if (!g_file_set_contents(key_path, (char *) r->key,
+                                     RPMB_KEY_MAC_SIZE, &err)) {
+                g_warning("%s: unable to persist key data to %s: %s",
+                          __func__, key_path, err->message);
+                g_error_free(err);
+            }
+        }
     }
 
+
     g_info("%s: req_resp = %x, result = %x", __func__,
            r->last_reqresp, r->last_result);
     return;
@@ -709,6 +723,25 @@  static bool vrpmb_load_flash_image(VuRpmb *r, char *img_path)
     return true;
 }
 
+static void vrpmb_set_key(VuRpmb *r, char *key_path)
+{
+    GError *err = NULL;
+    gsize length;
+
+    if (!g_file_get_contents(key_path, (char **) &r->key, &length, &err)) {
+        g_print("Unable to read %s: %s", key_path, err->message);
+        exit(1);
+    }
+    if (length < RPMB_KEY_MAC_SIZE) {
+        g_print("key file to small %ld < %d", length, RPMB_KEY_MAC_SIZE);
+        exit(1);
+    } else if (length > RPMB_KEY_MAC_SIZE) {
+        /* being too big isn't fatal, we just ignore the excess */
+        g_warning("%ld bytes of %s ignore (file too big)",
+                  length - RPMB_KEY_MAC_SIZE, key_path);
+    }
+}
+
 static void vrpmb_destroy(VuRpmb *r)
 {
     vug_deinit(&r->dev);
@@ -760,6 +793,10 @@  int main(int argc, char *argv[])
         vrpmb_load_flash_image(&rpmb, flash_path);
     }
 
+    if (key_path && key_set) {
+        vrpmb_set_key(&rpmb, key_path);
+    }
+
     if (!socket_path && socket_fd < 0) {
         g_printerr("Please specify either --fd or --socket-path\n");
         exit(EXIT_FAILURE);