This includes the locking we need to be able to re-load the keys at runtime. We should rename "adb_auth_client.cpp" to "adb_auth_adbd.cpp" or "adbd_auth.cpp" in a later change. Change-Id: I9e1d5b6b7d0497d6f6e5d9c4fb660118cdff05a8 Test: "adb devices" works against a non-AOSP device with $ADB_VENDOR_KEYS set, says "unauthorized" without. Bug: http://b/29273531
283 lines
7.7 KiB
C++
283 lines
7.7 KiB
C++
/*
|
|
* Copyright (C) 2012 The Android Open Source Project
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*/
|
|
|
|
#define TRACE_TAG AUTH
|
|
|
|
#include "adb_auth.h"
|
|
#include "adb.h"
|
|
#include "adb_utils.h"
|
|
#include "sysdeps.h"
|
|
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
|
|
#include <mutex>
|
|
|
|
#include <android-base/errors.h>
|
|
#include <android-base/file.h>
|
|
#include <android-base/stringprintf.h>
|
|
#include <android-base/strings.h>
|
|
#include <crypto_utils/android_pubkey.h>
|
|
#include <openssl/base64.h>
|
|
#include <openssl/evp.h>
|
|
#include <openssl/objects.h>
|
|
#include <openssl/pem.h>
|
|
#include <openssl/rsa.h>
|
|
#include <openssl/sha.h>
|
|
|
|
#include "sysdeps/mutex.h"
|
|
|
|
static std::mutex& g_key_list_mutex = *new std::mutex;
|
|
static std::deque<RSA*>& g_key_list = *new std::deque<RSA*>;
|
|
|
|
static std::string get_user_info() {
|
|
LOG(INFO) << "get_user_info...";
|
|
|
|
std::string hostname;
|
|
if (getenv("HOSTNAME")) hostname = getenv("HOSTNAME");
|
|
#if !defined(_WIN32)
|
|
char buf[64];
|
|
if (hostname.empty() && gethostname(buf, sizeof(buf)) != -1) hostname = buf;
|
|
#endif
|
|
if (hostname.empty()) hostname = "unknown";
|
|
|
|
std::string username;
|
|
if (getenv("LOGNAME")) username = getenv("LOGNAME");
|
|
#if !defined _WIN32 && !defined ADB_HOST_ON_TARGET
|
|
if (username.empty() && getlogin()) username = getlogin();
|
|
#endif
|
|
if (username.empty()) hostname = "unknown";
|
|
|
|
return " " + username + "@" + hostname;
|
|
}
|
|
|
|
static bool write_public_keyfile(RSA* private_key, const std::string& private_key_path) {
|
|
LOG(INFO) << "write_public_keyfile...";
|
|
|
|
uint8_t binary_key_data[ANDROID_PUBKEY_ENCODED_SIZE];
|
|
if (!android_pubkey_encode(private_key, binary_key_data, sizeof(binary_key_data))) {
|
|
LOG(ERROR) << "Failed to convert to public key";
|
|
return false;
|
|
}
|
|
|
|
size_t base64_key_length;
|
|
if (!EVP_EncodedLength(&base64_key_length, sizeof(binary_key_data))) {
|
|
LOG(ERROR) << "Public key too large to base64 encode";
|
|
return false;
|
|
}
|
|
|
|
std::string content;
|
|
content.resize(base64_key_length);
|
|
base64_key_length = EVP_EncodeBlock(reinterpret_cast<uint8_t*>(&content[0]), binary_key_data,
|
|
sizeof(binary_key_data));
|
|
|
|
content += get_user_info();
|
|
|
|
std::string path(private_key_path + ".pub");
|
|
if (!android::base::WriteStringToFile(content, path)) {
|
|
PLOG(ERROR) << "Failed to write public key to '" << path << "'";
|
|
return false;
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
static int generate_key(const std::string& file) {
|
|
LOG(INFO) << "generate_key(" << file << ")...";
|
|
|
|
mode_t old_mask;
|
|
FILE *f = NULL;
|
|
int ret = 0;
|
|
|
|
EVP_PKEY* pkey = EVP_PKEY_new();
|
|
BIGNUM* exponent = BN_new();
|
|
RSA* rsa = RSA_new();
|
|
if (!pkey || !exponent || !rsa) {
|
|
LOG(ERROR) << "Failed to allocate key";
|
|
goto out;
|
|
}
|
|
|
|
BN_set_word(exponent, RSA_F4);
|
|
RSA_generate_key_ex(rsa, 2048, exponent, NULL);
|
|
EVP_PKEY_set1_RSA(pkey, rsa);
|
|
|
|
old_mask = umask(077);
|
|
|
|
f = fopen(file.c_str(), "w");
|
|
if (!f) {
|
|
PLOG(ERROR) << "Failed to open " << file;
|
|
umask(old_mask);
|
|
goto out;
|
|
}
|
|
|
|
umask(old_mask);
|
|
|
|
if (!PEM_write_PrivateKey(f, pkey, NULL, NULL, 0, NULL, NULL)) {
|
|
D("Failed to write key");
|
|
goto out;
|
|
}
|
|
|
|
if (!write_public_keyfile(rsa, file)) {
|
|
D("Failed to write public key");
|
|
goto out;
|
|
}
|
|
|
|
ret = 1;
|
|
|
|
out:
|
|
if (f) fclose(f);
|
|
EVP_PKEY_free(pkey);
|
|
RSA_free(rsa);
|
|
BN_free(exponent);
|
|
return ret;
|
|
}
|
|
|
|
static bool read_key(const std::string& file) {
|
|
LOG(INFO) << "read_key '" << file << "'...";
|
|
|
|
std::unique_ptr<FILE, decltype(&fclose)> fp(fopen(file.c_str(), "r"), fclose);
|
|
if (!fp) {
|
|
PLOG(ERROR) << "Failed to open '" << file << "'";
|
|
return false;
|
|
}
|
|
|
|
RSA* key = RSA_new();
|
|
if (!PEM_read_RSAPrivateKey(fp.get(), &key, nullptr, nullptr)) {
|
|
LOG(ERROR) << "Failed to read key";
|
|
RSA_free(key);
|
|
return false;
|
|
}
|
|
|
|
g_key_list.push_back(key);
|
|
return true;
|
|
}
|
|
|
|
static std::string get_user_key_path() {
|
|
const std::string home = adb_get_homedir_path(true);
|
|
LOG(DEBUG) << "adb_get_homedir_path returned '" << home << "'";
|
|
|
|
const std::string android_dir = android::base::StringPrintf("%s%c.android", home.c_str(),
|
|
OS_PATH_SEPARATOR);
|
|
|
|
struct stat buf;
|
|
if (stat(android_dir.c_str(), &buf) == -1) {
|
|
if (adb_mkdir(android_dir.c_str(), 0750) == -1) {
|
|
PLOG(ERROR) << "Cannot mkdir '" << android_dir << "'";
|
|
return "";
|
|
}
|
|
}
|
|
|
|
return android_dir + OS_PATH_SEPARATOR + "adbkey";
|
|
}
|
|
|
|
static bool get_user_key() {
|
|
std::string path = get_user_key_path();
|
|
if (path.empty()) {
|
|
PLOG(ERROR) << "Error getting user key filename";
|
|
return false;
|
|
}
|
|
|
|
struct stat buf;
|
|
if (stat(path.c_str(), &buf) == -1) {
|
|
LOG(INFO) << "User key '" << path << "' does not exist...";
|
|
if (!generate_key(path)) {
|
|
LOG(ERROR) << "Failed to generate new key";
|
|
return false;
|
|
}
|
|
}
|
|
|
|
return read_key(path);
|
|
}
|
|
|
|
static void get_vendor_keys() {
|
|
const char* adb_keys_path = getenv("ADB_VENDOR_KEYS");
|
|
if (adb_keys_path == nullptr) {
|
|
return;
|
|
}
|
|
|
|
for (const auto& path : android::base::Split(adb_keys_path, ENV_PATH_SEPARATOR_STR)) {
|
|
if (!read_key(path.c_str())) {
|
|
PLOG(ERROR) << "Failed to read '" << path << "'";
|
|
}
|
|
}
|
|
}
|
|
|
|
std::deque<RSA*> adb_auth_get_private_keys() {
|
|
std::deque<RSA*> result;
|
|
|
|
// Copy all the currently known keys, increasing their reference count so they're
|
|
// usable until both we and the caller have freed our pointers.
|
|
std::lock_guard<std::mutex> lock(g_key_list_mutex);
|
|
for (const auto& key : g_key_list) {
|
|
RSA_up_ref(key); // Since we're handing out another pointer to this key...
|
|
result.push_back(key);
|
|
}
|
|
|
|
// Add a sentinel to the list. Our caller uses this to mean "out of private keys,
|
|
// but try using the public key" (the empty deque could otherwise mean this _or_
|
|
// that this function hasn't been called yet to request the keys).
|
|
result.push_back(nullptr);
|
|
|
|
return result;
|
|
}
|
|
|
|
int adb_auth_sign(RSA* key, const unsigned char* token, size_t token_size, unsigned char* sig) {
|
|
if (token_size != TOKEN_SIZE) {
|
|
D("Unexpected token size %zd", token_size);
|
|
return 0;
|
|
}
|
|
|
|
unsigned int len;
|
|
if (!RSA_sign(NID_sha1, token, token_size, sig, &len, key)) {
|
|
return 0;
|
|
}
|
|
|
|
D("adb_auth_sign len=%d", len);
|
|
return (int)len;
|
|
}
|
|
|
|
std::string adb_auth_get_userkey() {
|
|
std::string path = get_user_key_path();
|
|
if (path.empty()) {
|
|
PLOG(ERROR) << "Error getting user key filename";
|
|
return "";
|
|
}
|
|
path += ".pub";
|
|
|
|
std::string content;
|
|
if (!android::base::ReadFileToString(path, &content)) {
|
|
PLOG(ERROR) << "Can't load '" << path << "'";
|
|
return "";
|
|
}
|
|
return content;
|
|
}
|
|
|
|
int adb_auth_keygen(const char* filename) {
|
|
return (generate_key(filename) == 0);
|
|
}
|
|
|
|
void adb_auth_init() {
|
|
LOG(INFO) << "adb_auth_init...";
|
|
|
|
if (!get_user_key()) {
|
|
LOG(ERROR) << "Failed to get user key";
|
|
return;
|
|
}
|
|
|
|
std::lock_guard<std::mutex> lock(g_key_list_mutex);
|
|
get_vendor_keys();
|
|
}
|