Protect file footer from concurrent access
[platform/core/security/ode.git] / server / key-server.cpp
1 /*
2  *  Copyright (c) 2015-2017 Samsung Electronics Co., Ltd All Rights Reserved
3  *
4  *  Licensed under the Apache License, Version 2.0 (the "License");
5  *  you may not use this file except in compliance with the License.
6  *  You may obtain a copy of the License at
7  *
8  *      http://www.apache.org/licenses/LICENSE-2.0
9  *
10  *  Unless required by applicable law or agreed to in writing, software
11  *  distributed under the License is distributed on an "AS IS" BASIS,
12  *  WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13  *  See the License for the specific language governing permissions and
14  *  limitations under the License
15  */
16
17 #include <stdlib.h>
18
19 #include <string>
20 #include <algorithm>
21 #include <map>
22 #include <utility>
23 #include <sstream>
24 #include <iomanip>
25
26 #include "key-server.h"
27 #include "file-footer.h"
28 #include "logger.h"
29 #include "misc.h"
30 #include "rmi/common.h"
31 #include "key-manager/encrypted-key.h"
32 #include "key-manager/key-generator.h"
33 #include "upgrade-support.h"
34
35 namespace ode {
36
37 namespace {
38
39 const char *PRIVILEGE_PLATFORM = "http://tizen.org/privilege/internal/default/platform";
40
41 const std::map<int, size_t> KEY_SIZE = {
42         { Key::DEFAULT_256BIT, 32 },
43         { Key::DEFAULT_512BIT, 64 }
44 };
45
46 } // anonymous namespace
47
48 KeyServer::KeyServer(ServerContext& srv) :
49         server(srv)
50 {
51         server.expose(this, "",                                 (int)(KeyServer::isInitialized)(std::string));
52         server.expose(this, PRIVILEGE_PLATFORM, (int)(KeyServer::init)(std::string, std::string, int));
53         server.expose(this, PRIVILEGE_PLATFORM, (int)(KeyServer::remove)(std::string, std::string));
54         server.expose(this, PRIVILEGE_PLATFORM, (int)(KeyServer::changePassword)(std::string, std::string, std::string));
55         server.expose(this, PRIVILEGE_PLATFORM, (int)(KeyServer::verifyPassword)(std::string, std::string));
56         server.expose(this, PRIVILEGE_PLATFORM, (int)(KeyServer::storeMasterKey)(std::string, std::string));
57         server.expose(this, PRIVILEGE_PLATFORM, (int)(KeyServer::removeMasterKey)(std::string));
58 }
59
60 KeyServer::~KeyServer()
61 {
62 }
63
64 int KeyServer::isInitialized(const std::string& dev)
65 {
66         if (dev.empty())
67                 return error::InvalidParameter;
68
69         return FileFooter::exist(dev) ? error::None : error::NoSuchFile;
70 }
71
72 int KeyServer::init(const std::string& dev,
73                                         const std::string& password,
74                                         int params)
75 {
76         BinaryData dummy;
77         return initAndGet(dev, password, params, dummy);
78 }
79
80 int KeyServer::initAndGet(const std::string& dev,
81                                                   const std::string& password,
82                                                   int params,
83                                                   BinaryData& masterKey)
84 {
85         if (dev.empty() || password.empty() || KEY_SIZE.find(params) == KEY_SIZE.end())
86                 return error::InvalidParameter;
87
88         masterKey = KeyGenerator::RNG(KEY_SIZE.at(params));
89
90         EncryptedKey ek(masterKey, password);
91
92         std::lock_guard<std::mutex> lock(footerLock);
93         FileFooter::write(dev, ek.serialize());
94
95         return error::None;
96 }
97
98 int KeyServer::remove(const std::string& dev, const std::string& password)
99 {
100         if (dev.empty() || password.empty())
101                 return error::InvalidParameter;
102
103         std::lock_guard<std::mutex> lock(footerLock);
104         BinaryData key;
105         int ret = internalGet(dev, password, key);
106         if (ret != error::None)
107                 return ret;
108
109         FileFooter::clear(dev);
110         return error::None;
111 }
112
113 int KeyServer::changePassword(const std::string& dev,
114                                                           const std::string& curPassword,
115                                                           const std::string& newPassword)
116 {
117         if (dev.empty() || curPassword.empty() || newPassword.empty())
118                 return error::InvalidParameter;
119
120         std::lock_guard<std::mutex> lock(footerLock);
121         if (!FileFooter::exist(dev)) {
122                 ERROR(SINK, "Given device has no master key.");
123                 return error::NoSuchFile;
124         }
125
126         EncryptedKey ek(FileFooter::read(dev));
127
128         auto key = ek.decrypt(curPassword);
129         if (key.empty()) {
130                 ERROR(SINK, "Wrong password passed.");
131                 return error::WrongPassword;
132         }
133
134         ek.encrypt(key, newPassword);
135
136         FileFooter::write(dev, ek.serialize());
137         return error::None;
138 }
139
140 int KeyServer::verifyPassword(const std::string& dev,
141                                                           const std::string& password)
142 {
143         if (dev.empty() || password.empty())
144                 return error::InvalidParameter;
145
146         BinaryData dummy;
147         std::lock_guard<std::mutex> lock(footerLock);
148         return internalGet(dev, password, dummy);
149 }
150
151 int KeyServer::get(const std::string& dev,
152                                    const std::string& password,
153                                    BinaryData& masterKey) const
154 {
155         if (dev.empty() || password.empty())
156                 return error::InvalidParameter;
157
158         std::lock_guard<std::mutex> lock(footerLock);
159         return internalGet(dev, password, masterKey);
160 }
161
162 void KeyServer::removePassword(const std::string& dev)
163 {
164         if (dev.empty())
165                 return;
166
167         std::lock_guard<std::mutex> lock(footerLock);
168         FileFooter::clear(dev);
169 }
170
171 int KeyServer::storeMasterKey(const std::string& dev,
172                                                           const std::string& password)
173 {
174         if (dev.empty() || password.empty())
175                 return error::InvalidParameter;
176
177         std::unique_lock<std::mutex> lock(footerLock);
178         BinaryData masterKey;
179         int ret = internalGet(dev, password, masterKey);
180         if (ret != error::None)
181                 return ret;
182
183         lock.unlock();
184
185         try {
186                 UpgradeSupport::storeMasterKey(dev, masterKey);
187         } catch (const runtime::Exception& e) {
188                 ERROR(SINK, e.what());
189                 return error::Unknown;
190         }
191         return error::None;
192 }
193
194 int KeyServer::removeMasterKey(const std::string& dev)
195 {
196         if (dev.empty())
197                 return error::InvalidParameter;
198
199         try {
200                 UpgradeSupport::removeMasterKey(dev);
201         } catch (const runtime::Exception& e) {
202                 ERROR(SINK, e.what());
203                 return error::Unknown;
204         }
205         return error::None;
206 }
207
208 int KeyServer::internalGet(const std::string& dev,
209                                                    const std::string& password,
210                                                    BinaryData& key) const
211 {
212         if (!FileFooter::exist(dev)) {
213                 ERROR(SINK, "Given device has no master key.");
214                 return error::NoSuchFile;
215         }
216
217         EncryptedKey ek(FileFooter::read(dev));
218
219         key = ek.decrypt(password);
220         if (key.empty()) {
221                 ERROR(SINK, "Wrong password passed.");
222                 return error::WrongPassword;
223         }
224         return error::None;
225 }
226
227 } // namespace ode