1use aes_gcm_siv::aead::{Aead as _, Payload};
6use aes_gcm_siv::{Aes128GcmSiv, Key, KeyInit as _, Nonce};
7use anyhow::Error;
8use crypt_policy::{unseal_sources, KeyConsumer, Policy};
9use fidl::endpoints::{create_request_stream, ClientEnd};
10use fidl_fuchsia_fxfs::CryptRequest;
11use futures::{FutureExt, TryStreamExt};
12use hkdf::Hkdf;
13use std::future::Future;
14use std::pin::pin;
15use uuid::Uuid;
16use zerocopy::{FromBytes, Immutable, IntoBytes, KnownLayout};
17
18#[repr(C, packed)]
19#[derive(Clone, Copy, Debug, FromBytes, Immutable, IntoBytes, KnownLayout)]
20struct ZxcryptHeader {
21 magic: u128,
22 guid: [u8; 16],
23 version: u32,
24}
25
26const ZXCRYPT_MAGIC: u128 = 0x74707972_63787a80_e7116db3_00f8e85f;
27const ZXCRYPT_VERSION: u32 = 0x01000000;
28
29async fn unwrap_zxcrypt_key(policy: Policy, wrapped_key: &[u8]) -> Result<Vec<u8>, zx::Status> {
30 if wrapped_key.len() != 132 {
31 return Err(zx::Status::INVALID_ARGS);
32 }
33
34 let sources = unseal_sources(policy);
35
36 let (header, _) = ZxcryptHeader::read_from_prefix(wrapped_key).unwrap();
37
38 for source in sources {
39 let key = source.get_key(KeyConsumer::Zxcrypt).await.map_err(|_| zx::Status::INTERNAL)?;
40 let hk = Hkdf::<sha2::Sha256>::new(Some(&header.guid), &key);
41 let mut wrap_key = [0; 16];
42 let mut wrap_iv = [0; 12];
43 hk.expand("wrap key 0".as_bytes(), &mut wrap_key).unwrap();
44 hk.expand("wrap iv 0".as_bytes(), &mut wrap_iv).unwrap();
45
46 let header_size = std::mem::size_of::<ZxcryptHeader>();
47
48 if let Ok(unwrapped) = Aes128GcmSiv::new(Key::<Aes128GcmSiv>::from_slice(&wrap_key))
49 .decrypt(
50 &Nonce::from_slice(&wrap_iv),
51 Payload { msg: &wrapped_key[header_size..], aad: &wrapped_key[..header_size] },
52 )
53 {
54 return Ok(unwrapped);
55 }
56 }
57 log::warn!("Failed to unwrap zxcrypt key!");
58 Err(zx::Status::IO_DATA_INTEGRITY)
59}
60
61async fn create_zxcrypt_key(policy: Policy) -> Result<([u8; 16], Vec<u8>, Vec<u8>), zx::Status> {
62 let sources = unseal_sources(policy);
63
64 let header = ZxcryptHeader {
65 magic: ZXCRYPT_MAGIC,
66 guid: *Uuid::new_v4().as_bytes(),
67 version: ZXCRYPT_VERSION,
68 };
69
70 let mut unwrapped_key = vec![0; 80];
71 zx::cprng_draw(&mut unwrapped_key);
72
73 if let Some(source) = sources.first() {
74 let key = source.get_key(KeyConsumer::Zxcrypt).await.map_err(|_| zx::Status::INTERNAL)?;
75 let hk = Hkdf::<sha2::Sha256>::new(Some(&header.guid), &key);
76 let mut wrap_key = [0; 16];
77 let mut wrap_iv = [0; 12];
78 hk.expand("wrap key 0".as_bytes(), &mut wrap_key).unwrap();
79 hk.expand("wrap iv 0".as_bytes(), &mut wrap_iv).unwrap();
80
81 let wrapped = Aes128GcmSiv::new(Key::<Aes128GcmSiv>::from_slice(&wrap_key))
82 .encrypt(
83 &Nonce::from_slice(&wrap_iv),
84 Payload { msg: &unwrapped_key, aad: &header.as_bytes() },
85 )
86 .unwrap();
87
88 let mut header_and_key = header.as_bytes().to_vec();
89 header_and_key.extend(wrapped);
90
91 Ok(([0; 16], header_and_key, unwrapped_key))
92 } else {
93 log::warn!("No keys sources to create zxcrypt key");
94 Err(zx::Status::INTERNAL)
95 }
96}
97
98pub async fn run_crypt_service(
99 policy: Policy,
100 mut stream: fidl_fuchsia_fxfs::CryptRequestStream,
101) -> Result<(), Error> {
102 while let Some(request) = stream.try_next().await? {
103 match request {
104 CryptRequest::CreateKey { responder, .. } => responder.send(
105 create_zxcrypt_key(policy)
106 .await
107 .as_ref()
108 .map(|(id, w, u)| (id, &w[..], &u[..]))
109 .map_err(|s| s.into_raw()),
110 )?,
111 CryptRequest::CreateKeyWithId { responder, .. } => {
112 responder.send(Err(zx::Status::BAD_PATH.into_raw()))?
113 }
114 CryptRequest::UnwrapKey { responder, key, .. } => responder.send(
115 unwrap_zxcrypt_key(policy, &key)
116 .await
117 .as_ref()
118 .map(|u| &u[..])
119 .map_err(|s| s.into_raw()),
120 )?,
121 }
122 }
123 Ok::<(), Error>(())
124}
125
126pub async fn with_crypt_service<R, Fut: Future<Output = Result<R, Error>>>(
129 policy: Policy,
130 f: impl FnOnce(ClientEnd<fidl_fuchsia_fxfs::CryptMarker>) -> Fut,
131) -> Result<R, Error> {
132 let (crypt, stream) = create_request_stream::<fidl_fuchsia_fxfs::CryptMarker>();
133 let mut crypt_service = pin!(async { run_crypt_service(policy, stream).await }.fuse());
134 let mut fut = pin!(f(crypt).fuse());
135
136 loop {
137 futures::select! {
138 _ = crypt_service => {}
139 result = fut => return result,
140 }
141 }
142}
143
144#[cfg(test)]
145mod tests {
146 use super::{with_crypt_service, ZxcryptHeader, ZXCRYPT_MAGIC, ZXCRYPT_VERSION};
147 use crypt_policy::Policy;
148 use zerocopy::FromBytes;
149
150 fn entropy(data: &[u8]) -> f64 {
151 let mut frequencies = [0; 256];
152 for b in data {
153 frequencies[*b as usize] += 1;
154 }
155 -frequencies
156 .into_iter()
157 .map(|f| {
158 if f > 0 {
159 let p = f as f64 / data.len() as f64;
160 p * p.log2()
161 } else {
162 0.0
163 }
164 })
165 .sum::<f64>()
166 / (data.len() as f64).log2()
167 }
168
169 #[fuchsia::test]
170 async fn test_keys() {
171 with_crypt_service(Policy::Null, |crypt| async {
172 let crypt = crypt.into_proxy();
173 let (_, key, unwrapped_key) = crypt
174 .create_key(0, fidl_fuchsia_fxfs::KeyPurpose::Data)
175 .await
176 .unwrap()
177 .expect("create_key failed");
178
179 assert!(entropy(&unwrapped_key) > 0.5);
181
182 let (header, _) = ZxcryptHeader::read_from_prefix(&key).unwrap();
184
185 let magic = header.magic;
186 assert_eq!(magic, ZXCRYPT_MAGIC);
187 assert!(entropy(&header.guid) > 0.5);
188 let version = header.version;
189 assert_eq!(version, ZXCRYPT_VERSION);
190
191 let wrapping_key_id_0 = [0; 16];
193 let unwrapped_key2 = crypt
194 .unwrap_key(&wrapping_key_id_0, 0, &key)
195 .await
196 .unwrap()
197 .expect("unwrap_key failed");
198
199 assert_eq!(unwrapped_key, unwrapped_key2);
200 Ok(())
201 })
202 .await
203 .unwrap();
204 }
205}