| /* | 
 |  * Copyright (C) 2019 The Android Open Source Project | 
 |  * | 
 |  * Licensed under the Apache License, Version 2.0 (the "License"); | 
 |  * you may not use this file except in compliance with the License. | 
 |  * You may obtain a copy of the License at | 
 |  * | 
 |  *      http://www.apache.org/licenses/LICENSE-2.0 | 
 |  * | 
 |  * Unless required by applicable law or agreed to in writing, software | 
 |  * distributed under the License is distributed on an "AS IS" BASIS, | 
 |  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | 
 |  * See the License for the specific language governing permissions and | 
 |  * limitations under the License. | 
 |  */ | 
 |  | 
 | /* | 
 |  * A tool loads keys to keyring. | 
 |  */ | 
 |  | 
 | #include <dirent.h> | 
 | #include <errno.h> | 
 | #include <sys/types.h> | 
 | #include <unistd.h> | 
 |  | 
 | #include <fstream> | 
 | #include <iostream> | 
 | #include <iterator> | 
 | #include <sstream> | 
 | #include <string> | 
 | #include <vector> | 
 |  | 
 | #include <android-base/file.h> | 
 | #include <android-base/logging.h> | 
 | #include <android-base/properties.h> | 
 | #include <android-base/strings.h> | 
 | #include <keyutils.h> | 
 |  | 
 | static constexpr int kMaxCertSize = 4096; | 
 |  | 
 | // Add all the certs from directory path to keyring with keyring_id. Returns the number of keys | 
 | // added. | 
 | int AddKeys(const std::string& path, const key_serial_t keyring_id, const std::string& keyring_desc, | 
 |             int start_index) { | 
 |   std::unique_ptr<DIR, int (*)(DIR*)> dir(opendir(path.c_str()), closedir); | 
 |   if (!dir) { | 
 |     PLOG(WARNING) << "Failed to open directory " << path; | 
 |     return 0; | 
 |   } | 
 |   int keys_added = 0; | 
 |   struct dirent* dp; | 
 |   while ((dp = readdir(dir.get())) != NULL) { | 
 |     if (dp->d_type != DT_REG) { | 
 |       continue; | 
 |     } | 
 |     std::string cert_path = path + "/" + dp->d_name; | 
 |     std::string cert_buf; | 
 |     if (!android::base::ReadFileToString(cert_path, &cert_buf, false /* follow_symlinks */)) { | 
 |       LOG(ERROR) << "Failed to read " << cert_path; | 
 |       continue; | 
 |     } | 
 |  | 
 |     if (cert_buf.size() > kMaxCertSize) { | 
 |       LOG(ERROR) << "Certficate size too large: " << cert_path; | 
 |       continue; | 
 |     } | 
 |  | 
 |     // Add key to keyring. | 
 |     int key_desc_index = keys_added + start_index; | 
 |     std::string key_desc = keyring_desc + "-key" + std::to_string(key_desc_index); | 
 |     key_serial_t key = | 
 |         add_key("asymmetric", key_desc.c_str(), &cert_buf[0], cert_buf.size(), keyring_id); | 
 |     if (key < 0) { | 
 |       PLOG(ERROR) << "Failed to add key to keyring: " << cert_path; | 
 |       continue; | 
 |     } | 
 |     keys_added++; | 
 |   } | 
 |   return keys_added; | 
 | } | 
 |  | 
 | std::vector<std::string> SplitBySpace(const std::string& s) { | 
 |   std::istringstream iss(s); | 
 |   return std::vector<std::string>{std::istream_iterator<std::string>{iss}, | 
 |                                   std::istream_iterator<std::string>{}}; | 
 | } | 
 |  | 
 | // Find the keyring id. Because request_key(2) syscall is not available or the key is | 
 | // kernel keyring, the id is looked up from /proc/keys. The keyring description may contain other | 
 | // information in the descritption section depending on the key type, only the first word in the | 
 | // keyring description is used for searching. | 
 | bool GetKeyringId(const std::string& keyring_desc, key_serial_t* keyring_id) { | 
 |   if (!keyring_id) { | 
 |     LOG(ERROR) << "keyring_id is null"; | 
 |     return false; | 
 |   } | 
 |  | 
 |   // Only keys allowed by SELinux rules will be shown here. | 
 |   std::ifstream proc_keys_file("/proc/keys"); | 
 |   if (!proc_keys_file.is_open()) { | 
 |     PLOG(ERROR) << "Failed to open /proc/keys"; | 
 |     return false; | 
 |   } | 
 |  | 
 |   std::string line; | 
 |   while (getline(proc_keys_file, line)) { | 
 |     std::vector<std::string> tokens = SplitBySpace(line); | 
 |     if (tokens.size() < 9) { | 
 |       continue; | 
 |     } | 
 |     std::string key_id = tokens[0]; | 
 |     std::string key_type = tokens[7]; | 
 |     // The key description may contain space. | 
 |     std::string key_desc_prefix = tokens[8]; | 
 |     // The prefix has a ":" at the end | 
 |     std::string key_desc_pattern = keyring_desc + ":"; | 
 |     if (key_type != "keyring" || key_desc_prefix != key_desc_pattern) { | 
 |       continue; | 
 |     } | 
 |     *keyring_id = std::stoi(key_id, nullptr, 16); | 
 |     return true; | 
 |   } | 
 |   return false; | 
 | } | 
 |  | 
 | static void Usage(int exit_code) { | 
 |   fprintf(stderr, "usage: mini-keyctl -c PATHS -s DESCRIPTION\n"); | 
 |   fprintf(stderr, "\n"); | 
 |   fprintf(stderr, "-c, --cert_dirs     the certificate locations, separated by comma\n"); | 
 |   fprintf(stderr, "-k, --keyring       the keyring description\n"); | 
 |   _exit(exit_code); | 
 | } | 
 |  | 
 | int main(int argc, char** argv) { | 
 |   if (argc < 5) Usage(1); | 
 |  | 
 |   std::string arg_cert_dirs; | 
 |   std::string arg_keyring_desc; | 
 |  | 
 |   for (int i = 1; i < argc; i++) { | 
 |     std::string option = argv[i]; | 
 |     if (option == "-c" || option == "--cert_dirs") { | 
 |       if (i + 1 < argc) arg_cert_dirs = argv[++i]; | 
 |     } else if (option == "-k" || option == "--keyring") { | 
 |       if (i + 1 < argc) arg_keyring_desc = argv[++i]; | 
 |     } | 
 |   } | 
 |  | 
 |   if (arg_cert_dirs.empty() || arg_keyring_desc.empty()) { | 
 |     LOG(ERROR) << "Missing cert_dirs or keyring desc"; | 
 |     Usage(1); | 
 |   } | 
 |  | 
 |   // Get the keyring id | 
 |   key_serial_t key_ring_id; | 
 |   if (!GetKeyringId(arg_keyring_desc, &key_ring_id)) { | 
 |     PLOG(ERROR) << "Can't find keyring with " << arg_keyring_desc; | 
 |     return 1; | 
 |   } | 
 |  | 
 |   std::vector<std::string> cert_dirs = android::base::Split(arg_cert_dirs, ","); | 
 |   int start_index = 0; | 
 |   for (const auto& cert_dir : cert_dirs) { | 
 |     int keys_added = AddKeys(cert_dir, key_ring_id, arg_keyring_desc, start_index); | 
 |     start_index += keys_added; | 
 |   } | 
 |  | 
 |   // Prevent new keys to be added. | 
 |   if (!android::base::GetBoolProperty("ro.debuggable", false) && | 
 |       keyctl_restrict_keyring(key_ring_id, nullptr, nullptr) < 0) { | 
 |     PLOG(ERROR) << "Failed to restrict key ring " << arg_keyring_desc; | 
 |     return 1; | 
 |   } | 
 |  | 
 |   return 0; | 
 | } |