/* * Copyright (C) 2012 The Android Open Source Project * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ #define TRACE_TAG AUTH #include "sysdeps.h" #include "adb_auth.h" #include "adb_utils.h" #include #include #include #include "adb.h" #include #include #include #include #include #include #include #include #include #include #include #include #define ANDROID_PATH ".android" #define ADB_KEY_FILE "adbkey" struct adb_private_key { struct listnode node; RSA *rsa; }; static struct listnode key_list; static std::string get_user_info() { std::string hostname; if (getenv("HOSTNAME")) hostname = getenv("HOSTNAME"); #if !defined(_WIN32) char buf[64]; if (hostname.empty() && gethostname(buf, sizeof(buf)) != -1) hostname = buf; #endif if (hostname.empty()) hostname = "unknown"; std::string username; if (getenv("LOGNAME")) username = getenv("LOGNAME"); #if !defined _WIN32 && !defined ADB_HOST_ON_TARGET if (username.empty() && getlogin()) username = getlogin(); #endif if (username.empty()) hostname = "unknown"; return " " + username + "@" + hostname; } static bool write_public_keyfile(RSA* private_key, const std::string& private_key_path) { uint8_t binary_key_data[ANDROID_PUBKEY_ENCODED_SIZE]; if (!android_pubkey_encode(private_key, binary_key_data, sizeof(binary_key_data))) { LOG(ERROR) << "Failed to convert to public key"; return false; } size_t base64_key_length; if (!EVP_EncodedLength(&base64_key_length, sizeof(binary_key_data))) { LOG(ERROR) << "Public key too large to base64 encode"; return false; } std::string content; content.resize(base64_key_length); base64_key_length = EVP_EncodeBlock(reinterpret_cast(&content[0]), binary_key_data, sizeof(binary_key_data)); content += get_user_info(); std::string path(private_key_path + ".pub"); if (!android::base::WriteStringToFile(content, path)) { PLOG(ERROR) << "Failed to write public key to '" << path << "'"; return false; } return true; } static int generate_key(const char *file) { EVP_PKEY* pkey = EVP_PKEY_new(); BIGNUM* exponent = BN_new(); RSA* rsa = RSA_new(); mode_t old_mask; FILE *f = NULL; int ret = 0; D("generate_key '%s'", file); if (!pkey || !exponent || !rsa) { D("Failed to allocate key"); goto out; } BN_set_word(exponent, RSA_F4); RSA_generate_key_ex(rsa, 2048, exponent, NULL); EVP_PKEY_set1_RSA(pkey, rsa); old_mask = umask(077); f = fopen(file, "w"); if (!f) { D("Failed to open '%s'", file); umask(old_mask); goto out; } umask(old_mask); if (!PEM_write_PrivateKey(f, pkey, NULL, NULL, 0, NULL, NULL)) { D("Failed to write key"); goto out; } if (!write_public_keyfile(rsa, file)) { D("Failed to write public key"); goto out; } ret = 1; out: if (f) fclose(f); EVP_PKEY_free(pkey); RSA_free(rsa); BN_free(exponent); return ret; } static int read_key(const char *file, struct listnode *list) { D("read_key '%s'", file); FILE* fp = fopen(file, "r"); if (!fp) { D("Failed to open '%s': %s", file, strerror(errno)); return 0; } adb_private_key* key = new adb_private_key; key->rsa = RSA_new(); if (!PEM_read_RSAPrivateKey(fp, &key->rsa, NULL, NULL)) { D("Failed to read key"); fclose(fp); RSA_free(key->rsa); delete key; return 0; } fclose(fp); list_add_tail(list, &key->node); return 1; } static int get_user_keyfilepath(char *filename, size_t len) { const std::string home = adb_get_homedir_path(true); D("home '%s'", home.c_str()); const std::string android_dir = android::base::StringPrintf("%s%c%s", home.c_str(), OS_PATH_SEPARATOR, ANDROID_PATH); struct stat buf; if (stat(android_dir.c_str(), &buf)) { if (adb_mkdir(android_dir.c_str(), 0750) < 0) { D("Cannot mkdir '%s'", android_dir.c_str()); return -1; } } return snprintf(filename, len, "%s%c%s", android_dir.c_str(), OS_PATH_SEPARATOR, ADB_KEY_FILE); } static int get_user_key(struct listnode *list) { struct stat buf; char path[PATH_MAX]; int ret; ret = get_user_keyfilepath(path, sizeof(path)); if (ret < 0 || ret >= (signed)sizeof(path)) { D("Error getting user key filename"); return 0; } D("user key '%s'", path); if (stat(path, &buf) == -1) { if (!generate_key(path)) { D("Failed to generate new key"); return 0; } } return read_key(path, list); } static void get_vendor_keys(struct listnode* key_list) { const char* adb_keys_path = getenv("ADB_VENDOR_KEYS"); if (adb_keys_path == nullptr) { return; } for (const auto& path : android::base::Split(adb_keys_path, ENV_PATH_SEPARATOR_STR)) { if (!read_key(path.c_str(), key_list)) { D("Failed to read '%s'", path.c_str()); } } } int adb_auth_sign(void *node, const unsigned char* token, size_t token_size, unsigned char* sig) { unsigned int len; struct adb_private_key *key = node_to_item(node, struct adb_private_key, node); if (token_size != TOKEN_SIZE) { D("Unexpected token size %zd", token_size); return 0; } if (!RSA_sign(NID_sha1, token, token_size, sig, &len, key->rsa)) { return 0; } D("adb_auth_sign len=%d", len); return (int)len; } void *adb_auth_nextkey(void *current) { struct listnode *item; if (list_empty(&key_list)) return NULL; if (!current) return list_head(&key_list); list_for_each(item, &key_list) { if (item == current) { /* current is the last item, we tried all the keys */ if (item->next == &key_list) return NULL; return item->next; } } return NULL; } std::string adb_auth_get_userkey() { char path[PATH_MAX]; int ret = get_user_keyfilepath(path, sizeof(path) - 4); if (ret < 0 || ret >= (signed)(sizeof(path) - 4)) { D("Error getting user key filename"); return ""; } strcat(path, ".pub"); std::string content; if (!android::base::ReadFileToString(path, &content)) { D("Can't load '%s'", path); return ""; } return content; } int adb_auth_keygen(const char* filename) { return (generate_key(filename) == 0); } void adb_auth_init(void) { int ret; D("adb_auth_init"); list_init(&key_list); ret = get_user_key(&key_list); if (!ret) { D("Failed to get user key"); return; } get_vendor_keys(&key_list); }