journal-authenticate.c revision 671e021c92c835c6c701dc61463149d05b6f31af
/*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
/***
This file is part of systemd.
Copyright 2012 Lennart Poettering
under the terms of the GNU Lesser General Public License as published by
the Free Software Foundation; either version 2.1 of the License, or
(at your option) any later version.
systemd is distributed in the hope that it will be useful, but
WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
Lesser General Public License for more details.
You should have received a copy of the GNU Lesser General Public License
along with systemd; If not, see <http://www.gnu.org/licenses/>.
***/
#include <fcntl.h>
#include "journal-def.h"
#include "journal-file.h"
#include "journal-authenticate.h"
#include "fsprg.h"
uint64_t r;
assert(f);
return r;
}
int journal_file_append_tag(JournalFile *f) {
Object *o;
uint64_t p;
int r;
assert(f);
if (!f->seal)
return 0;
if (!f->hmac_running)
return 0;
if (r < 0)
return r;
log_debug("Writing tag %llu for epoch %llu\n",
(unsigned long long) FSPRG_GetEpoch(f->fsprg_state));
/* Add the tag object itself, so that we can protect its
* header. This will exclude the actual hash value in it */
r = journal_file_hmac_put_object(f, OBJECT_TAG, p);
if (r < 0)
return r;
/* Get the HMAC tag and store it in the object */
f->hmac_running = false;
return 0;
}
int journal_file_hmac_start(JournalFile *f) {
assert(f);
if (!f->seal)
return 0;
if (f->hmac_running)
return 0;
/* Prepare HMAC for next cycle */
gcry_md_reset(f->hmac);
f->hmac_running = true;
return 0;
}
uint64_t t;
assert(f);
if (f->fss_start_usec == 0 ||
f->fss_interval_usec == 0)
return -ENOTSUP;
if (realtime < f->fss_start_usec)
return -ESTALE;
t = realtime - f->fss_start_usec;
t = t / f->fss_interval_usec;
*epoch = t;
return 0;
}
int r;
assert(f);
if (!f->seal)
return 0;
if (r < 0)
return r;
return -ESTALE;
}
int r;
assert(f);
if (!f->seal)
return 0;
if (r < 0)
return r;
log_debug("Evolving FSPRG key from epoch %llu to %llu.", (unsigned long long) epoch, (unsigned long long) goal);
for (;;) {
return -ESTALE;
return 0;
FSPRG_Evolve(f->fsprg_state);
}
}
void *msk;
assert(f);
if (!f->seal)
return 0;
assert(f->fsprg_seed);
if (f->fsprg_state) {
/* Cheaper... */
return 0;
FSPRG_Evolve(f->fsprg_state);
return 0;
}
} else {
if (!f->fsprg_state)
return -ENOMEM;
}
return 0;
}
int r;
assert(f);
if (!f->seal)
return 0;
if (realtime <= 0)
r = journal_file_fsprg_need_evolve(f, realtime);
if (r <= 0)
return 0;
r = journal_file_append_tag(f);
if (r < 0)
return r;
r = journal_file_fsprg_evolve(f, realtime);
if (r < 0)
return r;
return 0;
}
int r;
Object *o;
assert(f);
if (!f->seal)
return 0;
r = journal_file_hmac_start(f);
if (r < 0)
return r;
r = journal_file_move_to_object(f, type, p, &o);
if (r < 0)
return r;
case OBJECT_DATA:
/* All but hash and payload are mutable */
break;
case OBJECT_ENTRY:
/* All */
break;
case OBJECT_FIELD_HASH_TABLE:
case OBJECT_DATA_HASH_TABLE:
case OBJECT_ENTRY_ARRAY:
/* Nothing: everything is mutable */
break;
case OBJECT_TAG:
/* All but the tag itself */
break;
default:
return -EINVAL;
}
return 0;
}
int journal_file_hmac_put_header(JournalFile *f) {
int r;
assert(f);
if (!f->seal)
return 0;
r = journal_file_hmac_start(f);
if (r < 0)
return r;
/* All but state+reserved, boot_id, arena_size,
* tail_object_offset, n_objects, n_entries,
* tail_entry_seqnum, head_entry_seqnum, entry_array_offset,
* head_entry_realtime, tail_entry_realtime,
* tail_entry_monotonic, n_data, n_fields, n_tags,
* n_entry_arrays. */
gcry_md_write(f->hmac, f->header->signature, offsetof(Header, state) - offsetof(Header, signature));
gcry_md_write(f->hmac, &f->header->seqnum_id, offsetof(Header, arena_size) - offsetof(Header, seqnum_id));
gcry_md_write(f->hmac, &f->header->data_hash_table_offset, offsetof(Header, tail_object_offset) - offsetof(Header, data_hash_table_offset));
return 0;
}
int journal_file_fss_load(JournalFile *f) {
int r, fd = -1;
char *p = NULL;
assert(f);
if (!f->seal)
return 0;
r = sd_id128_get_machine(&machine);
if (r < 0)
return r;
SD_ID128_FORMAT_VAL(machine)) < 0)
return -ENOMEM;
if (fd < 0) {
log_error("Failed to open %s: %m", p);
r = -errno;
goto finish;
}
r = -errno;
goto finish;
}
r = -ENODATA;
goto finish;
}
if (m == MAP_FAILED) {
m = NULL;
r = -errno;
goto finish;
}
r = -EBADMSG;
goto finish;
}
if (m->incompatible_flags != 0) {
r = -EPROTONOSUPPORT;
goto finish;
}
r = -EBADMSG;
goto finish;
}
r = -EBADMSG;
goto finish;
}
r = -ENODATA;
goto finish;
}
r = -EHOSTDOWN;
goto finish;
}
if (le64toh(m->start_usec) <= 0 ||
le64toh(m->interval_usec) <= 0) {
r = -EBADMSG;
goto finish;
}
if (f->fss_file == MAP_FAILED) {
r = -errno;
goto finish;
}
r = 0;
if (m)
if (fd >= 0)
free(p);
return r;
}
static void initialize_libgcrypt(void) {
const char *p;
return;
p = gcry_check_version("1.4.5");
assert(p);
}
int journal_file_hmac_setup(JournalFile *f) {
gcry_error_t e;
if (!f->seal)
return 0;
if (e != 0)
return -ENOTSUP;
return 0;
}
int journal_file_append_first_tag(JournalFile *f) {
int r;
uint64_t p;
if (!f->seal)
return 0;
log_debug("Calculating first tag...");
r = journal_file_hmac_put_header(f);
if (r < 0)
return r;
return -EINVAL;
r = journal_file_hmac_put_object(f, OBJECT_FIELD_HASH_TABLE, p);
if (r < 0)
return r;
return -EINVAL;
r = journal_file_hmac_put_object(f, OBJECT_DATA_HASH_TABLE, p);
if (r < 0)
return r;
r = journal_file_append_tag(f);
if (r < 0)
return r;
return 0;
}
const char *k;
int r;
if (!seed)
return -ENOMEM;
k = key;
for (c = 0; c < seed_size; c++) {
int x, y;
while (*k == '-')
k++;
x = unhexchar(*k);
if (x < 0) {
return -EINVAL;
}
k++;
y = unhexchar(*k);
if (y < 0) {
return -EINVAL;
}
k++;
}
if (*k != '/') {
return -EINVAL;
}
k++;
if (r != 2) {
return -EINVAL;
}
f->fsprg_seed = seed;
f->fsprg_seed_size = seed_size;
f->fss_interval_usec = interval;
return 0;
}
assert(f);
assert(u);
if (!f->seal)
return false;
return true;
}