mirror of
https://github.com/Dasharo/systemd.git
synced 2026-03-06 15:02:31 -08:00
cryptenroll, homectl: deduplicate generation of LUKS2 volume keys
This commit is contained in:
@@ -6,7 +6,6 @@
|
||||
#include "memory-util.h"
|
||||
#include "openssl-util.h"
|
||||
#include "pkcs11-util.h"
|
||||
#include "random-util.h"
|
||||
|
||||
int enroll_pkcs11(
|
||||
struct crypt_device *cd,
|
||||
@@ -18,12 +17,11 @@ int enroll_pkcs11(
|
||||
_cleanup_(erase_and_freep) char *base64_encoded = NULL;
|
||||
_cleanup_(json_variant_unrefp) JsonVariant *v = NULL;
|
||||
_cleanup_free_ char *keyslot_as_string = NULL;
|
||||
size_t decrypted_key_size, encrypted_key_size;
|
||||
_cleanup_free_ void *encrypted_key = NULL;
|
||||
size_t decrypted_key_size, saved_key_size;
|
||||
_cleanup_free_ void *saved_key = NULL;
|
||||
_cleanup_(X509_freep) X509 *cert = NULL;
|
||||
ssize_t base64_encoded_size;
|
||||
const char *node;
|
||||
EVP_PKEY *pkey;
|
||||
int keyslot, r;
|
||||
|
||||
assert_se(cd);
|
||||
@@ -37,27 +35,9 @@ int enroll_pkcs11(
|
||||
if (r < 0)
|
||||
return r;
|
||||
|
||||
pkey = X509_get0_pubkey(cert);
|
||||
if (!pkey)
|
||||
return log_error_errno(SYNTHETIC_ERRNO(EIO), "Failed to extract public key from X.509 certificate.");
|
||||
|
||||
r = rsa_pkey_to_suitable_key_size(pkey, &decrypted_key_size);
|
||||
r = x509_generate_volume_keys(cert, &decrypted_key, &decrypted_key_size, &saved_key, &saved_key_size);
|
||||
if (r < 0)
|
||||
return log_error_errno(r, "Failed to determine RSA public key size.");
|
||||
|
||||
log_debug("Generating %zu bytes random key.", decrypted_key_size);
|
||||
|
||||
decrypted_key = malloc(decrypted_key_size);
|
||||
if (!decrypted_key)
|
||||
return log_oom();
|
||||
|
||||
r = crypto_random_bytes(decrypted_key, decrypted_key_size);
|
||||
if (r < 0)
|
||||
return log_error_errno(r, "Failed to generate random key: %m");
|
||||
|
||||
r = rsa_encrypt_bytes(pkey, decrypted_key, decrypted_key_size, &encrypted_key, &encrypted_key_size);
|
||||
if (r < 0)
|
||||
return log_error_errno(r, "Failed to encrypt key: %m");
|
||||
return log_error_errno(r, "Failed to generate volume keys: %m");
|
||||
|
||||
/* Let's base64 encode the key to use, for compat with homed (and it's easier to type it in by
|
||||
* keyboard, if that might ever end up being necessary.) */
|
||||
@@ -87,7 +67,7 @@ int enroll_pkcs11(
|
||||
JSON_BUILD_PAIR("type", JSON_BUILD_CONST_STRING("systemd-pkcs11")),
|
||||
JSON_BUILD_PAIR("keyslots", JSON_BUILD_ARRAY(JSON_BUILD_STRING(keyslot_as_string))),
|
||||
JSON_BUILD_PAIR("pkcs11-uri", JSON_BUILD_STRING(uri)),
|
||||
JSON_BUILD_PAIR("pkcs11-key", JSON_BUILD_BASE64(encrypted_key, encrypted_key_size))));
|
||||
JSON_BUILD_PAIR("pkcs11-key", JSON_BUILD_BASE64(saved_key, saved_key_size))));
|
||||
if (r < 0)
|
||||
return log_error_errno(r, "Failed to prepare PKCS#11 JSON token object: %m");
|
||||
|
||||
|
||||
@@ -8,7 +8,6 @@
|
||||
#include "memory-util.h"
|
||||
#include "openssl-util.h"
|
||||
#include "pkcs11-util.h"
|
||||
#include "random-util.h"
|
||||
#include "strv.h"
|
||||
|
||||
static int add_pkcs11_encrypted_key(
|
||||
@@ -158,11 +157,10 @@ static int acquire_pkcs11_certificate(
|
||||
}
|
||||
|
||||
int identity_add_pkcs11_key_data(JsonVariant **v, const char *uri) {
|
||||
_cleanup_(erase_and_freep) void *decrypted_key = NULL, *encrypted_key = NULL;
|
||||
_cleanup_(erase_and_freep) void *decrypted_key = NULL, *saved_key = NULL;
|
||||
_cleanup_(erase_and_freep) char *pin = NULL;
|
||||
size_t decrypted_key_size, encrypted_key_size;
|
||||
size_t decrypted_key_size, saved_key_size;
|
||||
_cleanup_(X509_freep) X509 *cert = NULL;
|
||||
EVP_PKEY *pkey;
|
||||
int r;
|
||||
|
||||
assert(v);
|
||||
@@ -171,27 +169,9 @@ int identity_add_pkcs11_key_data(JsonVariant **v, const char *uri) {
|
||||
if (r < 0)
|
||||
return r;
|
||||
|
||||
pkey = X509_get0_pubkey(cert);
|
||||
if (!pkey)
|
||||
return log_error_errno(SYNTHETIC_ERRNO(EIO), "Failed to extract public key from X.509 certificate.");
|
||||
|
||||
r = rsa_pkey_to_suitable_key_size(pkey, &decrypted_key_size);
|
||||
r = x509_generate_volume_keys(cert, &decrypted_key, &decrypted_key_size, &saved_key, &saved_key_size);
|
||||
if (r < 0)
|
||||
return log_error_errno(r, "Failed to extract RSA key size from X509 certificate.");
|
||||
|
||||
log_debug("Generating %zu bytes random key.", decrypted_key_size);
|
||||
|
||||
decrypted_key = malloc(decrypted_key_size);
|
||||
if (!decrypted_key)
|
||||
return log_oom();
|
||||
|
||||
r = crypto_random_bytes(decrypted_key, decrypted_key_size);
|
||||
if (r < 0)
|
||||
return log_error_errno(r, "Failed to generate random key: %m");
|
||||
|
||||
r = rsa_encrypt_bytes(pkey, decrypted_key, decrypted_key_size, &encrypted_key, &encrypted_key_size);
|
||||
if (r < 0)
|
||||
return log_error_errno(r, "Failed to encrypt key: %m");
|
||||
return log_error_errno(r, "Failed to generate volume keys: %m");
|
||||
|
||||
/* Add the token URI to the public part of the record. */
|
||||
r = add_pkcs11_token_uri(v, uri);
|
||||
@@ -202,7 +182,7 @@ int identity_add_pkcs11_key_data(JsonVariant **v, const char *uri) {
|
||||
r = add_pkcs11_encrypted_key(
|
||||
v,
|
||||
uri,
|
||||
encrypted_key, encrypted_key_size,
|
||||
saved_key, saved_key_size,
|
||||
decrypted_key, decrypted_key_size);
|
||||
if (r < 0)
|
||||
return r;
|
||||
|
||||
@@ -4,6 +4,7 @@
|
||||
#include "fd-util.h"
|
||||
#include "hexdecoct.h"
|
||||
#include "openssl-util.h"
|
||||
#include "random-util.h"
|
||||
#include "string-util.h"
|
||||
|
||||
#if HAVE_OPENSSL
|
||||
@@ -1128,6 +1129,78 @@ int string_hashsum(
|
||||
return 0;
|
||||
}
|
||||
# endif
|
||||
|
||||
static int rsa_pkey_generate_volume_keys(
|
||||
EVP_PKEY *pkey,
|
||||
void **ret_decrypted_key,
|
||||
size_t *ret_decrypted_key_size,
|
||||
void **ret_saved_key,
|
||||
size_t *ret_saved_key_size) {
|
||||
|
||||
_cleanup_(erase_and_freep) void *decrypted_key = NULL;
|
||||
_cleanup_free_ void *saved_key = NULL;
|
||||
size_t decrypted_key_size, saved_key_size;
|
||||
int r;
|
||||
|
||||
r = rsa_pkey_to_suitable_key_size(pkey, &decrypted_key_size);
|
||||
if (r < 0)
|
||||
return log_debug_errno(r, "Failed to determine RSA public key size.");
|
||||
|
||||
log_debug("Generating %zu bytes random key.", decrypted_key_size);
|
||||
|
||||
decrypted_key = malloc(decrypted_key_size);
|
||||
if (!decrypted_key)
|
||||
return log_oom_debug();
|
||||
|
||||
r = crypto_random_bytes(decrypted_key, decrypted_key_size);
|
||||
if (r < 0)
|
||||
return log_debug_errno(r, "Failed to generate random key: %m");
|
||||
|
||||
r = rsa_encrypt_bytes(pkey, decrypted_key, decrypted_key_size, &saved_key, &saved_key_size);
|
||||
if (r < 0)
|
||||
return log_debug_errno(r, "Failed to encrypt random key: %m");
|
||||
|
||||
*ret_decrypted_key = TAKE_PTR(decrypted_key);
|
||||
*ret_decrypted_key_size = decrypted_key_size;
|
||||
*ret_saved_key = TAKE_PTR(saved_key);
|
||||
*ret_saved_key_size = saved_key_size;
|
||||
return 0;
|
||||
}
|
||||
|
||||
int x509_generate_volume_keys(
|
||||
X509 *cert,
|
||||
void **ret_decrypted_key,
|
||||
size_t *ret_decrypted_key_size,
|
||||
void **ret_saved_key,
|
||||
size_t *ret_saved_key_size) {
|
||||
|
||||
assert(cert);
|
||||
assert(ret_decrypted_key);
|
||||
assert(ret_decrypted_key_size);
|
||||
assert(ret_saved_key);
|
||||
assert(ret_saved_key_size);
|
||||
|
||||
EVP_PKEY *pkey = X509_get0_pubkey(cert);
|
||||
if (!pkey)
|
||||
return log_openssl_errors("Failed to extract public key from X.509 certificate.");
|
||||
|
||||
#if OPENSSL_VERSION_MAJOR >= 3
|
||||
int type = EVP_PKEY_get_base_id(pkey);
|
||||
#else
|
||||
int type = EVP_PKEY_base_id(pkey);
|
||||
#endif
|
||||
switch (type) {
|
||||
|
||||
case EVP_PKEY_RSA:
|
||||
return rsa_pkey_generate_volume_keys(pkey, ret_decrypted_key, ret_decrypted_key_size, ret_saved_key, ret_saved_key_size);
|
||||
|
||||
case NID_undef:
|
||||
return log_debug_errno(SYNTHETIC_ERRNO(EINVAL), "Failed to determine a type of public key");
|
||||
|
||||
default:
|
||||
return log_debug_errno(SYNTHETIC_ERRNO(EOPNOTSUPP), "Unsupported public key type: %s", OBJ_nid2sn(type));
|
||||
}
|
||||
}
|
||||
#endif
|
||||
|
||||
int x509_fingerprint(X509 *cert, uint8_t buffer[static SHA256_DIGEST_SIZE]) {
|
||||
|
||||
@@ -108,6 +108,8 @@ int ecc_pkey_new(int curve_id, EVP_PKEY **ret);
|
||||
|
||||
int ecc_ecdh(const EVP_PKEY *private_pkey, const EVP_PKEY *peer_pkey, void **ret_shared_secret, size_t *ret_shared_secret_size);
|
||||
|
||||
int x509_generate_volume_keys(X509 *cert, void **ret_decrypted_key, size_t *ret_decrypted_key_size, void **ret_saved_key, size_t *ret_saved_key_size);
|
||||
|
||||
int pubkey_fingerprint(EVP_PKEY *pk, const EVP_MD *md, void **ret, size_t *ret_size);
|
||||
|
||||
int digest_and_sign(const EVP_MD *md, EVP_PKEY *privkey, const void *data, size_t size, void **ret, size_t *ret_size);
|
||||
|
||||
Reference in New Issue
Block a user