xref: /OK3568_Linux_fs/external/recovery/encryptedfs_provisioning.c (revision 4882a59341e53eb6f0b4789bf948001014eff981)
1*4882a593Smuzhiyun /*
2*4882a593Smuzhiyun  * Copyright (C) 2009 The Android Open Source Project
3*4882a593Smuzhiyun  *
4*4882a593Smuzhiyun  * Licensed under the Apache License, Version 2.0 (the "License");
5*4882a593Smuzhiyun  * you may not use this file except in compliance with the License.
6*4882a593Smuzhiyun  * You may obtain a copy of the License at
7*4882a593Smuzhiyun  *
8*4882a593Smuzhiyun  *      http://www.apache.org/licenses/LICENSE-2.0
9*4882a593Smuzhiyun  *
10*4882a593Smuzhiyun  * Unless required by applicable law or agreed to in writing, software
11*4882a593Smuzhiyun  * distributed under the License is distributed on an "AS IS" BASIS,
12*4882a593Smuzhiyun  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13*4882a593Smuzhiyun  * See the License for the specific language governing permissions and
14*4882a593Smuzhiyun  * limitations under the License.
15*4882a593Smuzhiyun  */
16*4882a593Smuzhiyun 
17*4882a593Smuzhiyun #include <stdio.h>
18*4882a593Smuzhiyun #include <stdlib.h>
19*4882a593Smuzhiyun #include <string.h>
20*4882a593Smuzhiyun #include <sys/mount.h>
21*4882a593Smuzhiyun #include <sys/stat.h>
22*4882a593Smuzhiyun #include <sys/types.h>
23*4882a593Smuzhiyun #include <unistd.h>
24*4882a593Smuzhiyun 
25*4882a593Smuzhiyun #include "encryptedfs_provisioning.h"
26*4882a593Smuzhiyun #include "cutils/misc.h"
27*4882a593Smuzhiyun #include "cutils/properties.h"
28*4882a593Smuzhiyun #include "common.h"
29*4882a593Smuzhiyun #include "mtdutils/mtdutils.h"
30*4882a593Smuzhiyun #include "mtdutils/mounts.h"
31*4882a593Smuzhiyun #include "roots.h"
32*4882a593Smuzhiyun 
33*4882a593Smuzhiyun const char* encrypted_fs_enabled_property      = "persist.security.secfs.enabled";
34*4882a593Smuzhiyun const char* encrypted_fs_property_dir          = "/data/property/";
35*4882a593Smuzhiyun const char* encrypted_fs_system_dir            = "/data/system/";
36*4882a593Smuzhiyun const char* encrypted_fs_key_file_name         = "/data/fs_key.dat";
37*4882a593Smuzhiyun const char* encrypted_fs_salt_file_name        = "/data/hash_salt.dat";
38*4882a593Smuzhiyun const char* encrypted_fs_hash_file_src_name    = "/data/system/password.key";
39*4882a593Smuzhiyun const char* encrypted_fs_hash_file_dst_name    = "/data/hash.dat";
40*4882a593Smuzhiyun const char* encrypted_fs_entropy_file_src_name = "/data/system/entropy.dat";
41*4882a593Smuzhiyun const char* encrypted_fs_entropy_file_dst_name = "/data/ported_entropy.dat";
42*4882a593Smuzhiyun 
get_property_file_name(char * buffer,const char * property_name)43*4882a593Smuzhiyun void get_property_file_name(char *buffer, const char *property_name)
44*4882a593Smuzhiyun {
45*4882a593Smuzhiyun     sprintf(buffer, "%s%s", encrypted_fs_property_dir, property_name);
46*4882a593Smuzhiyun }
47*4882a593Smuzhiyun 
get_binary_file_contents(char * buffer,int buf_size,const char * file_name,int * out_size)48*4882a593Smuzhiyun int get_binary_file_contents(char *buffer, int buf_size, const char *file_name, int *out_size)
49*4882a593Smuzhiyun {
50*4882a593Smuzhiyun     FILE *in_file;
51*4882a593Smuzhiyun     int read_bytes;
52*4882a593Smuzhiyun 
53*4882a593Smuzhiyun     in_file = fopen(file_name, "r");
54*4882a593Smuzhiyun     if (in_file == NULL) {
55*4882a593Smuzhiyun         LOGE("Secure FS: error accessing key file.");
56*4882a593Smuzhiyun         return ENCRYPTED_FS_ERROR;
57*4882a593Smuzhiyun     }
58*4882a593Smuzhiyun 
59*4882a593Smuzhiyun     read_bytes = fread(buffer, 1, buf_size, in_file);
60*4882a593Smuzhiyun     if (out_size == NULL) {
61*4882a593Smuzhiyun         if (read_bytes != buf_size) {
62*4882a593Smuzhiyun             // Error or unexpected data
63*4882a593Smuzhiyun             fclose(in_file);
64*4882a593Smuzhiyun             LOGE("Secure FS: error reading conmplete key.");
65*4882a593Smuzhiyun             return ENCRYPTED_FS_ERROR;
66*4882a593Smuzhiyun         }
67*4882a593Smuzhiyun     } else {
68*4882a593Smuzhiyun         *out_size = read_bytes;
69*4882a593Smuzhiyun     }
70*4882a593Smuzhiyun     fclose(in_file);
71*4882a593Smuzhiyun     return ENCRYPTED_FS_OK;
72*4882a593Smuzhiyun }
73*4882a593Smuzhiyun 
set_binary_file_contents(char * buffer,int buf_size,const char * file_name)74*4882a593Smuzhiyun int set_binary_file_contents(char *buffer, int buf_size, const char *file_name)
75*4882a593Smuzhiyun {
76*4882a593Smuzhiyun     FILE *out_file;
77*4882a593Smuzhiyun     int write_bytes;
78*4882a593Smuzhiyun 
79*4882a593Smuzhiyun     out_file = fopen(file_name, "w");
80*4882a593Smuzhiyun     if (out_file == NULL) {
81*4882a593Smuzhiyun         LOGE("Secure FS: error setting up key file.");
82*4882a593Smuzhiyun         return ENCRYPTED_FS_ERROR;
83*4882a593Smuzhiyun     }
84*4882a593Smuzhiyun 
85*4882a593Smuzhiyun     write_bytes = fwrite(buffer, 1, buf_size, out_file);
86*4882a593Smuzhiyun     if (write_bytes != buf_size) {
87*4882a593Smuzhiyun         // Error or unexpected data
88*4882a593Smuzhiyun         fclose(out_file);
89*4882a593Smuzhiyun         LOGE("Secure FS: error reading conmplete key.");
90*4882a593Smuzhiyun         return ENCRYPTED_FS_ERROR;
91*4882a593Smuzhiyun     }
92*4882a593Smuzhiyun 
93*4882a593Smuzhiyun     fclose(out_file);
94*4882a593Smuzhiyun     return ENCRYPTED_FS_OK;
95*4882a593Smuzhiyun }
96*4882a593Smuzhiyun 
get_text_file_contents(char * buffer,int buf_size,char * file_name)97*4882a593Smuzhiyun int get_text_file_contents(char *buffer, int buf_size, char *file_name)
98*4882a593Smuzhiyun {
99*4882a593Smuzhiyun     FILE *in_file;
100*4882a593Smuzhiyun     char *read_data;
101*4882a593Smuzhiyun 
102*4882a593Smuzhiyun     in_file = fopen(file_name, "r");
103*4882a593Smuzhiyun     if (in_file == NULL) {
104*4882a593Smuzhiyun         LOGE("Secure FS: error accessing properties.");
105*4882a593Smuzhiyun         return ENCRYPTED_FS_ERROR;
106*4882a593Smuzhiyun     }
107*4882a593Smuzhiyun 
108*4882a593Smuzhiyun     read_data = fgets(buffer, buf_size, in_file);
109*4882a593Smuzhiyun     if (read_data == NULL) {
110*4882a593Smuzhiyun         // Error or unexpected data
111*4882a593Smuzhiyun         fclose(in_file);
112*4882a593Smuzhiyun         LOGE("Secure FS: error accessing properties.");
113*4882a593Smuzhiyun         return ENCRYPTED_FS_ERROR;
114*4882a593Smuzhiyun     }
115*4882a593Smuzhiyun 
116*4882a593Smuzhiyun     fclose(in_file);
117*4882a593Smuzhiyun     return ENCRYPTED_FS_OK;
118*4882a593Smuzhiyun }
119*4882a593Smuzhiyun 
set_text_file_contents(char * buffer,char * file_name)120*4882a593Smuzhiyun int set_text_file_contents(char *buffer, char *file_name)
121*4882a593Smuzhiyun {
122*4882a593Smuzhiyun     FILE *out_file;
123*4882a593Smuzhiyun     int result;
124*4882a593Smuzhiyun 
125*4882a593Smuzhiyun     out_file = fopen(file_name, "w");
126*4882a593Smuzhiyun     if (out_file == NULL) {
127*4882a593Smuzhiyun         LOGE("Secure FS: error setting up properties.");
128*4882a593Smuzhiyun         return ENCRYPTED_FS_ERROR;
129*4882a593Smuzhiyun     }
130*4882a593Smuzhiyun 
131*4882a593Smuzhiyun     result = fputs(buffer, out_file);
132*4882a593Smuzhiyun     if (result != 0) {
133*4882a593Smuzhiyun         // Error or unexpected data
134*4882a593Smuzhiyun         fclose(out_file);
135*4882a593Smuzhiyun         LOGE("Secure FS: error setting up properties.");
136*4882a593Smuzhiyun         return ENCRYPTED_FS_ERROR;
137*4882a593Smuzhiyun     }
138*4882a593Smuzhiyun 
139*4882a593Smuzhiyun     fflush(out_file);
140*4882a593Smuzhiyun     fclose(out_file);
141*4882a593Smuzhiyun     return ENCRYPTED_FS_OK;
142*4882a593Smuzhiyun }
143*4882a593Smuzhiyun 
read_encrypted_fs_boolean_property(const char * prop_name,int * value)144*4882a593Smuzhiyun int read_encrypted_fs_boolean_property(const char *prop_name, int *value)
145*4882a593Smuzhiyun {
146*4882a593Smuzhiyun     char prop_file_name[PROPERTY_KEY_MAX + 32];
147*4882a593Smuzhiyun     char prop_value[PROPERTY_VALUE_MAX];
148*4882a593Smuzhiyun     int result;
149*4882a593Smuzhiyun 
150*4882a593Smuzhiyun     get_property_file_name(prop_file_name, prop_name);
151*4882a593Smuzhiyun     result = get_text_file_contents(prop_value, PROPERTY_VALUE_MAX, prop_file_name);
152*4882a593Smuzhiyun 
153*4882a593Smuzhiyun     if (result < 0) {
154*4882a593Smuzhiyun         return result;
155*4882a593Smuzhiyun     }
156*4882a593Smuzhiyun 
157*4882a593Smuzhiyun     if (strncmp(prop_value, "1", 1) == 0) {
158*4882a593Smuzhiyun         *value = 1;
159*4882a593Smuzhiyun     } else if (strncmp(prop_value, "0", 1) == 0) {
160*4882a593Smuzhiyun         *value = 0;
161*4882a593Smuzhiyun     } else {
162*4882a593Smuzhiyun         LOGE("Secure FS: error accessing properties.");
163*4882a593Smuzhiyun         return ENCRYPTED_FS_ERROR;
164*4882a593Smuzhiyun     }
165*4882a593Smuzhiyun 
166*4882a593Smuzhiyun     return ENCRYPTED_FS_OK;
167*4882a593Smuzhiyun }
168*4882a593Smuzhiyun 
write_encrypted_fs_boolean_property(const char * prop_name,int value)169*4882a593Smuzhiyun int write_encrypted_fs_boolean_property(const char *prop_name, int value)
170*4882a593Smuzhiyun {
171*4882a593Smuzhiyun     char prop_file_name[PROPERTY_KEY_MAX + 32];
172*4882a593Smuzhiyun     char prop_value[PROPERTY_VALUE_MAX];
173*4882a593Smuzhiyun     int result;
174*4882a593Smuzhiyun 
175*4882a593Smuzhiyun     get_property_file_name(prop_file_name, prop_name);
176*4882a593Smuzhiyun 
177*4882a593Smuzhiyun     // Create the directory if needed
178*4882a593Smuzhiyun     mkdir(encrypted_fs_property_dir, 0755);
179*4882a593Smuzhiyun     if (value == 1) {
180*4882a593Smuzhiyun         result = set_text_file_contents("1", prop_file_name);
181*4882a593Smuzhiyun     } else if (value == 0) {
182*4882a593Smuzhiyun         result = set_text_file_contents("0", prop_file_name);
183*4882a593Smuzhiyun     } else {
184*4882a593Smuzhiyun         return ENCRYPTED_FS_ERROR;
185*4882a593Smuzhiyun     }
186*4882a593Smuzhiyun     if (result < 0) {
187*4882a593Smuzhiyun         return result;
188*4882a593Smuzhiyun     }
189*4882a593Smuzhiyun 
190*4882a593Smuzhiyun     return ENCRYPTED_FS_OK;
191*4882a593Smuzhiyun }
192*4882a593Smuzhiyun 
read_encrypted_fs_info(encrypted_fs_info * encrypted_fs_data)193*4882a593Smuzhiyun int read_encrypted_fs_info(encrypted_fs_info *encrypted_fs_data)
194*4882a593Smuzhiyun {
195*4882a593Smuzhiyun     int result;
196*4882a593Smuzhiyun     int value;
197*4882a593Smuzhiyun     result = ensure_path_mounted("/data");
198*4882a593Smuzhiyun     if (result != 0) {
199*4882a593Smuzhiyun         LOGE("Secure FS: error mounting userdata partition.");
200*4882a593Smuzhiyun         return ENCRYPTED_FS_ERROR;
201*4882a593Smuzhiyun     }
202*4882a593Smuzhiyun 
203*4882a593Smuzhiyun     // Read the pre-generated encrypted FS key, password hash and salt.
204*4882a593Smuzhiyun     result = get_binary_file_contents(encrypted_fs_data->key, ENCRYPTED_FS_KEY_SIZE,
205*4882a593Smuzhiyun                                       encrypted_fs_key_file_name, NULL);
206*4882a593Smuzhiyun     if (result != 0) {
207*4882a593Smuzhiyun         LOGE("Secure FS: error reading generated file system key.");
208*4882a593Smuzhiyun         return ENCRYPTED_FS_ERROR;
209*4882a593Smuzhiyun     }
210*4882a593Smuzhiyun 
211*4882a593Smuzhiyun     result = get_binary_file_contents(encrypted_fs_data->salt, ENCRYPTED_FS_SALT_SIZE,
212*4882a593Smuzhiyun                                       encrypted_fs_salt_file_name, &(encrypted_fs_data->salt_length));
213*4882a593Smuzhiyun     if (result != 0) {
214*4882a593Smuzhiyun         LOGE("Secure FS: error reading file system salt.");
215*4882a593Smuzhiyun         return ENCRYPTED_FS_ERROR;
216*4882a593Smuzhiyun     }
217*4882a593Smuzhiyun 
218*4882a593Smuzhiyun     result = get_binary_file_contents(encrypted_fs_data->hash, ENCRYPTED_FS_MAX_HASH_SIZE,
219*4882a593Smuzhiyun                                       encrypted_fs_hash_file_src_name, &(encrypted_fs_data->hash_length));
220*4882a593Smuzhiyun     if (result != 0) {
221*4882a593Smuzhiyun         LOGE("Secure FS: error reading password hash.");
222*4882a593Smuzhiyun         return ENCRYPTED_FS_ERROR;
223*4882a593Smuzhiyun     }
224*4882a593Smuzhiyun 
225*4882a593Smuzhiyun     result = get_binary_file_contents(encrypted_fs_data->entropy, ENTROPY_MAX_SIZE,
226*4882a593Smuzhiyun                                       encrypted_fs_entropy_file_src_name, &(encrypted_fs_data->entropy_length));
227*4882a593Smuzhiyun     if (result != 0) {
228*4882a593Smuzhiyun         LOGE("Secure FS: error reading ported entropy.");
229*4882a593Smuzhiyun         return ENCRYPTED_FS_ERROR;
230*4882a593Smuzhiyun     }
231*4882a593Smuzhiyun 
232*4882a593Smuzhiyun     result = ensure_path_unmounted("/data");
233*4882a593Smuzhiyun     if (result != 0) {
234*4882a593Smuzhiyun         LOGE("Secure FS: error unmounting data partition.");
235*4882a593Smuzhiyun         return ENCRYPTED_FS_ERROR;
236*4882a593Smuzhiyun     }
237*4882a593Smuzhiyun 
238*4882a593Smuzhiyun     return ENCRYPTED_FS_OK;
239*4882a593Smuzhiyun }
240*4882a593Smuzhiyun 
restore_encrypted_fs_info(encrypted_fs_info * encrypted_fs_data)241*4882a593Smuzhiyun int restore_encrypted_fs_info(encrypted_fs_info *encrypted_fs_data)
242*4882a593Smuzhiyun {
243*4882a593Smuzhiyun     int result;
244*4882a593Smuzhiyun     result = ensure_path_mounted("/data");
245*4882a593Smuzhiyun     if (result != 0) {
246*4882a593Smuzhiyun         LOGE("Secure FS: error mounting userdata partition.");
247*4882a593Smuzhiyun         return ENCRYPTED_FS_ERROR;
248*4882a593Smuzhiyun     }
249*4882a593Smuzhiyun 
250*4882a593Smuzhiyun     // Write the pre-generated secure FS key, password hash and salt.
251*4882a593Smuzhiyun     result = set_binary_file_contents(encrypted_fs_data->key, ENCRYPTED_FS_KEY_SIZE,
252*4882a593Smuzhiyun                                       encrypted_fs_key_file_name);
253*4882a593Smuzhiyun     if (result != 0) {
254*4882a593Smuzhiyun         LOGE("Secure FS: error writing generated file system key.");
255*4882a593Smuzhiyun         return ENCRYPTED_FS_ERROR;
256*4882a593Smuzhiyun     }
257*4882a593Smuzhiyun 
258*4882a593Smuzhiyun     result = set_binary_file_contents(encrypted_fs_data->salt, encrypted_fs_data->salt_length,
259*4882a593Smuzhiyun                                       encrypted_fs_salt_file_name);
260*4882a593Smuzhiyun     if (result != 0) {
261*4882a593Smuzhiyun         LOGE("Secure FS: error writing file system salt.");
262*4882a593Smuzhiyun         return ENCRYPTED_FS_ERROR;
263*4882a593Smuzhiyun     }
264*4882a593Smuzhiyun 
265*4882a593Smuzhiyun     result = set_binary_file_contents(encrypted_fs_data->hash, encrypted_fs_data->hash_length,
266*4882a593Smuzhiyun                                       encrypted_fs_hash_file_dst_name);
267*4882a593Smuzhiyun     if (result != 0) {
268*4882a593Smuzhiyun         LOGE("Secure FS: error writing password hash.");
269*4882a593Smuzhiyun         return ENCRYPTED_FS_ERROR;
270*4882a593Smuzhiyun     }
271*4882a593Smuzhiyun 
272*4882a593Smuzhiyun     result = set_binary_file_contents(encrypted_fs_data->entropy, encrypted_fs_data->entropy_length,
273*4882a593Smuzhiyun                                       encrypted_fs_entropy_file_dst_name);
274*4882a593Smuzhiyun     if (result != 0) {
275*4882a593Smuzhiyun         LOGE("Secure FS: error writing ported entropy.");
276*4882a593Smuzhiyun         return ENCRYPTED_FS_ERROR;
277*4882a593Smuzhiyun     }
278*4882a593Smuzhiyun 
279*4882a593Smuzhiyun     // Set the secure FS properties to their respective values
280*4882a593Smuzhiyun     result = write_encrypted_fs_boolean_property(encrypted_fs_enabled_property, encrypted_fs_data->mode);
281*4882a593Smuzhiyun     if (result != 0) {
282*4882a593Smuzhiyun         return result;
283*4882a593Smuzhiyun     }
284*4882a593Smuzhiyun 
285*4882a593Smuzhiyun     result = ensure_path_unmounted("/data");
286*4882a593Smuzhiyun     if (result != 0) {
287*4882a593Smuzhiyun         LOGE("Secure FS: error unmounting data partition.");
288*4882a593Smuzhiyun         return ENCRYPTED_FS_ERROR;
289*4882a593Smuzhiyun     }
290*4882a593Smuzhiyun 
291*4882a593Smuzhiyun     return ENCRYPTED_FS_OK;
292*4882a593Smuzhiyun }
293