Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 1 | // Copyright 2020, The Android Open Source Project |
| 2 | // |
| 3 | // Licensed under the Apache License, Version 2.0 (the "License"); |
| 4 | // you may not use this file except in compliance with the License. |
| 5 | // You may obtain a copy of the License at |
| 6 | // |
| 7 | // http://www.apache.org/licenses/LICENSE-2.0 |
| 8 | // |
| 9 | // Unless required by applicable law or agreed to in writing, software |
| 10 | // distributed under the License is distributed on an "AS IS" BASIS, |
| 11 | // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 12 | // See the License for the specific language governing permissions and |
| 13 | // limitations under the License. |
| 14 | |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 15 | //! This module implements methods to load legacy keystore key blob files. |
| 16 | |
Shaquille Johnson | 9da2e1c | 2022-09-19 12:39:01 +0000 | [diff] [blame] | 17 | use crate::ks_err; |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 18 | use crate::{ |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 19 | error::{Error as KsError, ResponseCode}, |
| 20 | key_parameter::{KeyParameter, KeyParameterValue}, |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 21 | utils::uid_to_android_user, |
Janis Danisevskis | f84d0b0 | 2022-01-26 14:11:14 -0800 | [diff] [blame] | 22 | utils::AesGcm, |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 23 | }; |
| 24 | use android_hardware_security_keymint::aidl::android::hardware::security::keymint::{ |
| 25 | SecurityLevel::SecurityLevel, Tag::Tag, TagType::TagType, |
| 26 | }; |
| 27 | use anyhow::{Context, Result}; |
Paul Crowley | f61fee7 | 2021-03-17 14:38:44 -0700 | [diff] [blame] | 28 | use keystore2_crypto::{aes_gcm_decrypt, Password, ZVec}; |
Janis Danisevskis | eed6984 | 2021-02-18 20:04:10 -0800 | [diff] [blame] | 29 | use std::collections::{HashMap, HashSet}; |
Janis Danisevskis | f84d0b0 | 2022-01-26 14:11:14 -0800 | [diff] [blame] | 30 | use std::sync::Arc; |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 31 | use std::{convert::TryInto, fs::File, path::Path, path::PathBuf}; |
Hasini Gunasinghe | 3ed5da7 | 2021-02-04 15:18:54 +0000 | [diff] [blame] | 32 | use std::{ |
| 33 | fs, |
| 34 | io::{ErrorKind, Read, Result as IoResult}, |
| 35 | }; |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 36 | |
| 37 | const SUPPORTED_LEGACY_BLOB_VERSION: u8 = 3; |
| 38 | |
| 39 | mod flags { |
| 40 | /// This flag is deprecated. It is here to support keys that have been written with this flag |
| 41 | /// set, but we don't create any new keys with this flag. |
| 42 | pub const ENCRYPTED: u8 = 1 << 0; |
| 43 | /// This flag is deprecated. It indicates that the blob was generated and thus owned by a |
| 44 | /// software fallback Keymaster implementation. Keymaster 1.0 was the last Keymaster version |
| 45 | /// that could be accompanied by a software fallback. With the removal of Keymaster 1.0 |
| 46 | /// support, this flag is obsolete. |
| 47 | pub const FALLBACK: u8 = 1 << 1; |
| 48 | /// KEYSTORE_FLAG_SUPER_ENCRYPTED is for blobs that are already encrypted by KM but have |
| 49 | /// an additional layer of password-based encryption applied. The same encryption scheme is used |
| 50 | /// as KEYSTORE_FLAG_ENCRYPTED. The latter is deprecated. |
| 51 | pub const SUPER_ENCRYPTED: u8 = 1 << 2; |
| 52 | /// KEYSTORE_FLAG_CRITICAL_TO_DEVICE_ENCRYPTION is for blobs that are part of device encryption |
| 53 | /// flow so it receives special treatment from keystore. For example this blob will not be super |
| 54 | /// encrypted, and it will be stored separately under a unique UID instead. This flag should |
| 55 | /// only be available to system uid. |
| 56 | pub const CRITICAL_TO_DEVICE_ENCRYPTION: u8 = 1 << 3; |
| 57 | /// The blob is associated with the security level Strongbox as opposed to TEE. |
| 58 | pub const STRONGBOX: u8 = 1 << 4; |
| 59 | } |
| 60 | |
| 61 | /// Lagacy key blob types. |
| 62 | mod blob_types { |
| 63 | /// A generic blob used for non sensitive unstructured blobs. |
| 64 | pub const GENERIC: u8 = 1; |
| 65 | /// This key is a super encryption key encrypted with AES128 |
| 66 | /// and a password derived key. |
| 67 | pub const SUPER_KEY: u8 = 2; |
| 68 | // Used to be the KEY_PAIR type. |
| 69 | const _RESERVED: u8 = 3; |
| 70 | /// A KM key blob. |
| 71 | pub const KM_BLOB: u8 = 4; |
| 72 | /// A legacy key characteristics file. This has only a single list of Authorizations. |
| 73 | pub const KEY_CHARACTERISTICS: u8 = 5; |
| 74 | /// A key characteristics cache has both a hardware enforced and a software enforced list |
| 75 | /// of authorizations. |
| 76 | pub const KEY_CHARACTERISTICS_CACHE: u8 = 6; |
| 77 | /// Like SUPER_KEY but encrypted with AES256. |
| 78 | pub const SUPER_KEY_AES256: u8 = 7; |
| 79 | } |
| 80 | |
| 81 | /// Error codes specific to the legacy blob module. |
| 82 | #[derive(thiserror::Error, Debug, Eq, PartialEq)] |
| 83 | pub enum Error { |
| 84 | /// Returned by the legacy blob module functions if an input stream |
| 85 | /// did not have enough bytes to read. |
| 86 | #[error("Input stream had insufficient bytes to read.")] |
| 87 | BadLen, |
| 88 | /// This error code is returned by `Blob::decode_alias` if it encounters |
| 89 | /// an invalid alias filename encoding. |
| 90 | #[error("Invalid alias filename encoding.")] |
| 91 | BadEncoding, |
Janis Danisevskis | f84d0b0 | 2022-01-26 14:11:14 -0800 | [diff] [blame] | 92 | /// A component of the requested entry other than the KM key blob itself |
| 93 | /// was encrypted and no super key was provided. |
| 94 | #[error("Locked entry component.")] |
| 95 | LockedComponent, |
| 96 | /// The uids presented to move_keystore_entry belonged to different |
| 97 | /// Android users. |
| 98 | #[error("Cannot move keys across Android users.")] |
| 99 | AndroidUserMismatch, |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 100 | } |
| 101 | |
| 102 | /// The blob payload, optionally with all information required to decrypt it. |
| 103 | #[derive(Debug, Eq, PartialEq)] |
| 104 | pub enum BlobValue { |
| 105 | /// A generic blob used for non sensitive unstructured blobs. |
| 106 | Generic(Vec<u8>), |
| 107 | /// A legacy key characteristics file. This has only a single list of Authorizations. |
| 108 | Characteristics(Vec<u8>), |
Janis Danisevskis | f84d0b0 | 2022-01-26 14:11:14 -0800 | [diff] [blame] | 109 | /// A legacy key characteristics file. This has only a single list of Authorizations. |
| 110 | /// Additionally, this characteristics file was encrypted with the user's super key. |
| 111 | EncryptedCharacteristics { |
| 112 | /// Initialization vector. |
| 113 | iv: Vec<u8>, |
| 114 | /// Aead tag for integrity verification. |
| 115 | tag: Vec<u8>, |
| 116 | /// Ciphertext. |
| 117 | data: Vec<u8>, |
| 118 | }, |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 119 | /// A key characteristics cache has both a hardware enforced and a software enforced list |
| 120 | /// of authorizations. |
| 121 | CharacteristicsCache(Vec<u8>), |
| 122 | /// A password encrypted blob. Includes the initialization vector, the aead tag, the |
| 123 | /// ciphertext data, a salt, and a key size. The latter two are used for key derivation. |
| 124 | PwEncrypted { |
| 125 | /// Initialization vector. |
| 126 | iv: Vec<u8>, |
| 127 | /// Aead tag for integrity verification. |
| 128 | tag: Vec<u8>, |
| 129 | /// Ciphertext. |
| 130 | data: Vec<u8>, |
| 131 | /// Salt for key derivation. |
| 132 | salt: Vec<u8>, |
| 133 | /// Key sise for key derivation. This selects between AES128 GCM and AES256 GCM. |
| 134 | key_size: usize, |
| 135 | }, |
| 136 | /// An encrypted blob. Includes the initialization vector, the aead tag, and the |
| 137 | /// ciphertext data. The key can be selected from context, i.e., the owner of the key |
| 138 | /// blob. |
| 139 | Encrypted { |
| 140 | /// Initialization vector. |
| 141 | iv: Vec<u8>, |
| 142 | /// Aead tag for integrity verification. |
| 143 | tag: Vec<u8>, |
| 144 | /// Ciphertext. |
| 145 | data: Vec<u8>, |
| 146 | }, |
Janis Danisevskis | f84d0b0 | 2022-01-26 14:11:14 -0800 | [diff] [blame] | 147 | /// An encrypted blob. Includes the initialization vector, the aead tag, and the |
| 148 | /// ciphertext data. The key can be selected from context, i.e., the owner of the key |
| 149 | /// blob. This is a special case for generic encrypted blobs as opposed to key blobs. |
| 150 | EncryptedGeneric { |
| 151 | /// Initialization vector. |
| 152 | iv: Vec<u8>, |
| 153 | /// Aead tag for integrity verification. |
| 154 | tag: Vec<u8>, |
| 155 | /// Ciphertext. |
| 156 | data: Vec<u8>, |
| 157 | }, |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 158 | /// Holds the plaintext key blob either after unwrapping an encrypted blob or when the |
| 159 | /// blob was stored in "plaintext" on disk. The "plaintext" of a key blob is not actual |
| 160 | /// plaintext because all KeyMint blobs are encrypted with a device bound key. The key |
| 161 | /// blob in this Variant is decrypted only with respect to any extra layer of encryption |
| 162 | /// that Keystore added. |
| 163 | Decrypted(ZVec), |
| 164 | } |
| 165 | |
Janis Danisevskis | f84d0b0 | 2022-01-26 14:11:14 -0800 | [diff] [blame] | 166 | /// Keystore used two different key characteristics file formats in the past. |
| 167 | /// The key characteristics cache which superseded the characteristics file. |
| 168 | /// The latter stored only one list of key parameters, while the former stored |
| 169 | /// a hardware enforced and a software enforced list. This Enum indicates which |
| 170 | /// type was read from the file system. |
| 171 | #[derive(Debug, Clone, Eq, PartialEq, Ord, PartialOrd)] |
| 172 | pub enum LegacyKeyCharacteristics { |
| 173 | /// A characteristics cache was read. |
| 174 | Cache(Vec<KeyParameter>), |
| 175 | /// A characteristics file was read. |
| 176 | File(Vec<KeyParameter>), |
| 177 | } |
| 178 | |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 179 | /// Represents a loaded legacy key blob file. |
| 180 | #[derive(Debug, Eq, PartialEq)] |
| 181 | pub struct Blob { |
| 182 | flags: u8, |
| 183 | value: BlobValue, |
| 184 | } |
| 185 | |
| 186 | /// This object represents a path that holds a legacy Keystore blob database. |
| 187 | pub struct LegacyBlobLoader { |
| 188 | path: PathBuf, |
| 189 | } |
| 190 | |
| 191 | fn read_bool(stream: &mut dyn Read) -> Result<bool> { |
| 192 | const SIZE: usize = std::mem::size_of::<bool>(); |
| 193 | let mut buffer: [u8; SIZE] = [0; SIZE]; |
| 194 | stream.read_exact(&mut buffer).map(|_| buffer[0] != 0).context("In read_ne_bool.") |
| 195 | } |
| 196 | |
| 197 | fn read_ne_u32(stream: &mut dyn Read) -> Result<u32> { |
| 198 | const SIZE: usize = std::mem::size_of::<u32>(); |
| 199 | let mut buffer: [u8; SIZE] = [0; SIZE]; |
| 200 | stream.read_exact(&mut buffer).map(|_| u32::from_ne_bytes(buffer)).context("In read_ne_u32.") |
| 201 | } |
| 202 | |
| 203 | fn read_ne_i32(stream: &mut dyn Read) -> Result<i32> { |
| 204 | const SIZE: usize = std::mem::size_of::<i32>(); |
| 205 | let mut buffer: [u8; SIZE] = [0; SIZE]; |
| 206 | stream.read_exact(&mut buffer).map(|_| i32::from_ne_bytes(buffer)).context("In read_ne_i32.") |
| 207 | } |
| 208 | |
| 209 | fn read_ne_i64(stream: &mut dyn Read) -> Result<i64> { |
| 210 | const SIZE: usize = std::mem::size_of::<i64>(); |
| 211 | let mut buffer: [u8; SIZE] = [0; SIZE]; |
| 212 | stream.read_exact(&mut buffer).map(|_| i64::from_ne_bytes(buffer)).context("In read_ne_i64.") |
| 213 | } |
| 214 | |
| 215 | impl Blob { |
Janis Danisevskis | f84d0b0 | 2022-01-26 14:11:14 -0800 | [diff] [blame] | 216 | /// Creates a new blob from flags and value. |
| 217 | pub fn new(flags: u8, value: BlobValue) -> Self { |
| 218 | Self { flags, value } |
| 219 | } |
| 220 | |
| 221 | /// Return the raw flags of this Blob. |
| 222 | pub fn get_flags(&self) -> u8 { |
| 223 | self.flags |
| 224 | } |
| 225 | |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 226 | /// This blob was generated with a fallback software KM device. |
| 227 | pub fn is_fallback(&self) -> bool { |
| 228 | self.flags & flags::FALLBACK != 0 |
| 229 | } |
| 230 | |
| 231 | /// This blob is encrypted and needs to be decrypted with the user specific master key |
| 232 | /// before use. |
| 233 | pub fn is_encrypted(&self) -> bool { |
| 234 | self.flags & (flags::SUPER_ENCRYPTED | flags::ENCRYPTED) != 0 |
| 235 | } |
| 236 | |
| 237 | /// This blob is critical to device encryption. It cannot be encrypted with the super key |
| 238 | /// because it is itself part of the key derivation process for the key encrypting the |
| 239 | /// super key. |
| 240 | pub fn is_critical_to_device_encryption(&self) -> bool { |
| 241 | self.flags & flags::CRITICAL_TO_DEVICE_ENCRYPTION != 0 |
| 242 | } |
| 243 | |
| 244 | /// This blob is associated with the Strongbox security level. |
| 245 | pub fn is_strongbox(&self) -> bool { |
| 246 | self.flags & flags::STRONGBOX != 0 |
| 247 | } |
| 248 | |
| 249 | /// Returns the payload data of this blob file. |
| 250 | pub fn value(&self) -> &BlobValue { |
| 251 | &self.value |
| 252 | } |
| 253 | |
| 254 | /// Consume this blob structure and extract the payload. |
| 255 | pub fn take_value(self) -> BlobValue { |
| 256 | self.value |
| 257 | } |
| 258 | } |
| 259 | |
| 260 | impl LegacyBlobLoader { |
Paul Crowley | 9a7f5a5 | 2021-04-23 16:12:08 -0700 | [diff] [blame] | 261 | const IV_SIZE: usize = keystore2_crypto::LEGACY_IV_LENGTH; |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 262 | const GCM_TAG_LENGTH: usize = keystore2_crypto::TAG_LENGTH; |
| 263 | const SALT_SIZE: usize = keystore2_crypto::SALT_LENGTH; |
| 264 | |
| 265 | // The common header has the following structure: |
| 266 | // version (1 Byte) |
| 267 | // blob_type (1 Byte) |
| 268 | // flags (1 Byte) |
Janis Danisevskis | f84d0b0 | 2022-01-26 14:11:14 -0800 | [diff] [blame] | 269 | // info (1 Byte) Size of an info field appended to the blob. |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 270 | // initialization_vector (16 Bytes) |
Janis Danisevskis | 87dbe00 | 2021-03-24 14:06:58 -0700 | [diff] [blame] | 271 | // integrity (MD5 digest or gcm tag) (16 Bytes) |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 272 | // length (4 Bytes) |
Janis Danisevskis | f84d0b0 | 2022-01-26 14:11:14 -0800 | [diff] [blame] | 273 | // |
| 274 | // The info field is used to store the salt for password encrypted blobs. |
| 275 | // The beginning of the info field can be computed from the file length |
| 276 | // and the info byte from the header: <file length> - <info> bytes. |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 277 | const COMMON_HEADER_SIZE: usize = 4 + Self::IV_SIZE + Self::GCM_TAG_LENGTH + 4; |
| 278 | |
| 279 | const VERSION_OFFSET: usize = 0; |
| 280 | const TYPE_OFFSET: usize = 1; |
| 281 | const FLAGS_OFFSET: usize = 2; |
| 282 | const SALT_SIZE_OFFSET: usize = 3; |
| 283 | const LENGTH_OFFSET: usize = 4 + Self::IV_SIZE + Self::GCM_TAG_LENGTH; |
| 284 | const IV_OFFSET: usize = 4; |
| 285 | const AEAD_TAG_OFFSET: usize = Self::IV_OFFSET + Self::IV_SIZE; |
Paul Crowley | d5653e5 | 2021-03-25 09:46:31 -0700 | [diff] [blame] | 286 | const _DIGEST_OFFSET: usize = Self::IV_OFFSET + Self::IV_SIZE; |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 287 | |
| 288 | /// Construct a new LegacyBlobLoader with a root path of `path` relative to which it will |
| 289 | /// expect legacy key blob files. |
| 290 | pub fn new(path: &Path) -> Self { |
| 291 | Self { path: path.to_owned() } |
| 292 | } |
Hasini Gunasinghe | 3ed5da7 | 2021-02-04 15:18:54 +0000 | [diff] [blame] | 293 | |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 294 | /// Encodes an alias string as ascii character sequence in the range |
| 295 | /// ['+' .. '.'] and ['0' .. '~']. |
| 296 | /// Bytes with values in the range ['0' .. '~'] are represented as they are. |
| 297 | /// All other bytes are split into two characters as follows: |
| 298 | /// |
| 299 | /// msb a a | b b b b b b |
| 300 | /// |
| 301 | /// The most significant bits (a) are encoded: |
| 302 | /// a a character |
| 303 | /// 0 0 '+' |
| 304 | /// 0 1 ',' |
| 305 | /// 1 0 '-' |
| 306 | /// 1 1 '.' |
| 307 | /// |
| 308 | /// The 6 lower bits are represented with the range ['0' .. 'o']: |
| 309 | /// b(hex) character |
| 310 | /// 0x00 '0' |
| 311 | /// ... |
| 312 | /// 0x3F 'o' |
| 313 | /// |
| 314 | /// The function cannot fail because we have a representation for each |
| 315 | /// of the 256 possible values of each byte. |
| 316 | pub fn encode_alias(name: &str) -> String { |
| 317 | let mut acc = String::new(); |
| 318 | for c in name.bytes() { |
| 319 | match c { |
| 320 | b'0'..=b'~' => { |
| 321 | acc.push(c as char); |
| 322 | } |
| 323 | c => { |
Charisee | 03e0084 | 2023-01-25 01:41:23 +0000 | [diff] [blame] | 324 | acc.push((b'+' + (c >> 6)) as char); |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 325 | acc.push((b'0' + (c & 0x3F)) as char); |
| 326 | } |
| 327 | }; |
| 328 | } |
| 329 | acc |
| 330 | } |
| 331 | |
| 332 | /// This function reverses the encoding described in `encode_alias`. |
| 333 | /// This function can fail, because not all possible character |
| 334 | /// sequences are valid code points. And even if the encoding is valid, |
| 335 | /// the result may not be a valid UTF-8 sequence. |
| 336 | pub fn decode_alias(name: &str) -> Result<String> { |
| 337 | let mut multi: Option<u8> = None; |
| 338 | let mut s = Vec::<u8>::new(); |
| 339 | for c in name.bytes() { |
| 340 | multi = match (c, multi) { |
| 341 | // m is set, we are processing the second part of a multi byte sequence |
| 342 | (b'0'..=b'o', Some(m)) => { |
| 343 | s.push(m | (c - b'0')); |
| 344 | None |
| 345 | } |
| 346 | (b'+'..=b'.', None) => Some((c - b'+') << 6), |
| 347 | (b'0'..=b'~', None) => { |
| 348 | s.push(c); |
| 349 | None |
| 350 | } |
| 351 | _ => { |
Shaquille Johnson | 9da2e1c | 2022-09-19 12:39:01 +0000 | [diff] [blame] | 352 | return Err(Error::BadEncoding).context(ks_err!("could not decode filename.")); |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 353 | } |
| 354 | }; |
| 355 | } |
| 356 | if multi.is_some() { |
Shaquille Johnson | 9da2e1c | 2022-09-19 12:39:01 +0000 | [diff] [blame] | 357 | return Err(Error::BadEncoding).context(ks_err!("could not decode filename.")); |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 358 | } |
| 359 | |
Shaquille Johnson | 9da2e1c | 2022-09-19 12:39:01 +0000 | [diff] [blame] | 360 | String::from_utf8(s).context(ks_err!("encoded alias was not valid UTF-8.")) |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 361 | } |
| 362 | |
| 363 | fn new_from_stream(stream: &mut dyn Read) -> Result<Blob> { |
| 364 | let mut buffer = Vec::new(); |
Shaquille Johnson | 9da2e1c | 2022-09-19 12:39:01 +0000 | [diff] [blame] | 365 | stream.read_to_end(&mut buffer).context(ks_err!())?; |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 366 | |
| 367 | if buffer.len() < Self::COMMON_HEADER_SIZE { |
Shaquille Johnson | 9da2e1c | 2022-09-19 12:39:01 +0000 | [diff] [blame] | 368 | return Err(Error::BadLen).context(ks_err!())?; |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 369 | } |
| 370 | |
| 371 | let version: u8 = buffer[Self::VERSION_OFFSET]; |
| 372 | |
| 373 | let flags: u8 = buffer[Self::FLAGS_OFFSET]; |
| 374 | let blob_type: u8 = buffer[Self::TYPE_OFFSET]; |
| 375 | let is_encrypted = flags & (flags::ENCRYPTED | flags::SUPER_ENCRYPTED) != 0; |
| 376 | let salt = match buffer[Self::SALT_SIZE_OFFSET] as usize { |
| 377 | Self::SALT_SIZE => Some(&buffer[buffer.len() - Self::SALT_SIZE..buffer.len()]), |
| 378 | _ => None, |
| 379 | }; |
| 380 | |
| 381 | if version != SUPPORTED_LEGACY_BLOB_VERSION { |
| 382 | return Err(KsError::Rc(ResponseCode::VALUE_CORRUPTED)) |
Shaquille Johnson | 9da2e1c | 2022-09-19 12:39:01 +0000 | [diff] [blame] | 383 | .context(ks_err!("Unknown blob version: {}.", version)); |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 384 | } |
| 385 | |
| 386 | let length = u32::from_be_bytes( |
| 387 | buffer[Self::LENGTH_OFFSET..Self::LENGTH_OFFSET + 4].try_into().unwrap(), |
| 388 | ) as usize; |
| 389 | if buffer.len() < Self::COMMON_HEADER_SIZE + length { |
Shaquille Johnson | 9da2e1c | 2022-09-19 12:39:01 +0000 | [diff] [blame] | 390 | return Err(Error::BadLen).context(ks_err!( |
| 391 | "Expected: {} got: {}.", |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 392 | Self::COMMON_HEADER_SIZE + length, |
| 393 | buffer.len() |
| 394 | )); |
| 395 | } |
| 396 | let value = &buffer[Self::COMMON_HEADER_SIZE..Self::COMMON_HEADER_SIZE + length]; |
| 397 | let iv = &buffer[Self::IV_OFFSET..Self::IV_OFFSET + Self::IV_SIZE]; |
| 398 | let tag = &buffer[Self::AEAD_TAG_OFFSET..Self::AEAD_TAG_OFFSET + Self::GCM_TAG_LENGTH]; |
| 399 | |
| 400 | match (blob_type, is_encrypted, salt) { |
Janis Danisevskis | f84d0b0 | 2022-01-26 14:11:14 -0800 | [diff] [blame] | 401 | (blob_types::GENERIC, false, _) => { |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 402 | Ok(Blob { flags, value: BlobValue::Generic(value.to_vec()) }) |
| 403 | } |
Janis Danisevskis | f84d0b0 | 2022-01-26 14:11:14 -0800 | [diff] [blame] | 404 | (blob_types::GENERIC, true, _) => Ok(Blob { |
| 405 | flags, |
| 406 | value: BlobValue::EncryptedGeneric { |
| 407 | iv: iv.to_vec(), |
| 408 | tag: tag.to_vec(), |
| 409 | data: value.to_vec(), |
| 410 | }, |
| 411 | }), |
| 412 | (blob_types::KEY_CHARACTERISTICS, false, _) => { |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 413 | Ok(Blob { flags, value: BlobValue::Characteristics(value.to_vec()) }) |
| 414 | } |
Janis Danisevskis | f84d0b0 | 2022-01-26 14:11:14 -0800 | [diff] [blame] | 415 | (blob_types::KEY_CHARACTERISTICS, true, _) => Ok(Blob { |
| 416 | flags, |
| 417 | value: BlobValue::EncryptedCharacteristics { |
| 418 | iv: iv.to_vec(), |
| 419 | tag: tag.to_vec(), |
| 420 | data: value.to_vec(), |
| 421 | }, |
| 422 | }), |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 423 | (blob_types::KEY_CHARACTERISTICS_CACHE, _, _) => { |
| 424 | Ok(Blob { flags, value: BlobValue::CharacteristicsCache(value.to_vec()) }) |
| 425 | } |
| 426 | (blob_types::SUPER_KEY, _, Some(salt)) => Ok(Blob { |
| 427 | flags, |
| 428 | value: BlobValue::PwEncrypted { |
| 429 | iv: iv.to_vec(), |
| 430 | tag: tag.to_vec(), |
| 431 | data: value.to_vec(), |
| 432 | key_size: keystore2_crypto::AES_128_KEY_LENGTH, |
| 433 | salt: salt.to_vec(), |
| 434 | }, |
| 435 | }), |
| 436 | (blob_types::SUPER_KEY_AES256, _, Some(salt)) => Ok(Blob { |
| 437 | flags, |
| 438 | value: BlobValue::PwEncrypted { |
| 439 | iv: iv.to_vec(), |
| 440 | tag: tag.to_vec(), |
| 441 | data: value.to_vec(), |
| 442 | key_size: keystore2_crypto::AES_256_KEY_LENGTH, |
| 443 | salt: salt.to_vec(), |
| 444 | }, |
| 445 | }), |
| 446 | (blob_types::KM_BLOB, true, _) => Ok(Blob { |
| 447 | flags, |
| 448 | value: BlobValue::Encrypted { |
| 449 | iv: iv.to_vec(), |
| 450 | tag: tag.to_vec(), |
| 451 | data: value.to_vec(), |
| 452 | }, |
| 453 | }), |
| 454 | (blob_types::KM_BLOB, false, _) => Ok(Blob { |
| 455 | flags, |
| 456 | value: BlobValue::Decrypted(value.try_into().context("In new_from_stream.")?), |
| 457 | }), |
| 458 | (blob_types::SUPER_KEY, _, None) | (blob_types::SUPER_KEY_AES256, _, None) => { |
| 459 | Err(KsError::Rc(ResponseCode::VALUE_CORRUPTED)) |
Shaquille Johnson | 9da2e1c | 2022-09-19 12:39:01 +0000 | [diff] [blame] | 460 | .context(ks_err!("Super key without salt for key derivation.")) |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 461 | } |
Shaquille Johnson | 9da2e1c | 2022-09-19 12:39:01 +0000 | [diff] [blame] | 462 | _ => Err(KsError::Rc(ResponseCode::VALUE_CORRUPTED)).context(ks_err!( |
| 463 | "Unknown blob type. {} {}", |
| 464 | blob_type, |
| 465 | is_encrypted |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 466 | )), |
| 467 | } |
| 468 | } |
| 469 | |
| 470 | /// Parses a legacy key blob file read from `stream`. A `decrypt` closure |
| 471 | /// must be supplied, that is primed with the appropriate key. |
| 472 | /// The callback takes the following arguments: |
| 473 | /// * ciphertext: &[u8] - The to-be-deciphered message. |
| 474 | /// * iv: &[u8] - The initialization vector. |
| 475 | /// * tag: Option<&[u8]> - AEAD tag if AES GCM is selected. |
| 476 | /// * salt: Option<&[u8]> - An optional salt. Used for password key derivation. |
| 477 | /// * key_size: Option<usize> - An optional key size. Used for pw key derivation. |
| 478 | /// |
| 479 | /// If no super key is available, the callback must return |
| 480 | /// `Err(KsError::Rc(ResponseCode::LOCKED))`. The callback is only called |
| 481 | /// if the to-be-read blob is encrypted. |
| 482 | pub fn new_from_stream_decrypt_with<F>(mut stream: impl Read, decrypt: F) -> Result<Blob> |
| 483 | where |
| 484 | F: FnOnce(&[u8], &[u8], &[u8], Option<&[u8]>, Option<usize>) -> Result<ZVec>, |
| 485 | { |
Shaquille Johnson | 9da2e1c | 2022-09-19 12:39:01 +0000 | [diff] [blame] | 486 | let blob = Self::new_from_stream(&mut stream).context(ks_err!())?; |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 487 | |
| 488 | match blob.value() { |
| 489 | BlobValue::Encrypted { iv, tag, data } => Ok(Blob { |
| 490 | flags: blob.flags, |
Shaquille Johnson | 9da2e1c | 2022-09-19 12:39:01 +0000 | [diff] [blame] | 491 | value: BlobValue::Decrypted(decrypt(data, iv, tag, None, None).context(ks_err!())?), |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 492 | }), |
| 493 | BlobValue::PwEncrypted { iv, tag, data, salt, key_size } => Ok(Blob { |
| 494 | flags: blob.flags, |
| 495 | value: BlobValue::Decrypted( |
Shaquille Johnson | 9da2e1c | 2022-09-19 12:39:01 +0000 | [diff] [blame] | 496 | decrypt(data, iv, tag, Some(salt), Some(*key_size)).context(ks_err!())?, |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 497 | ), |
| 498 | }), |
Janis Danisevskis | f84d0b0 | 2022-01-26 14:11:14 -0800 | [diff] [blame] | 499 | BlobValue::EncryptedGeneric { iv, tag, data } => Ok(Blob { |
| 500 | flags: blob.flags, |
| 501 | value: BlobValue::Generic( |
Shaquille Johnson | 9da2e1c | 2022-09-19 12:39:01 +0000 | [diff] [blame] | 502 | decrypt(data, iv, tag, None, None).context(ks_err!())?[..].to_vec(), |
Janis Danisevskis | f84d0b0 | 2022-01-26 14:11:14 -0800 | [diff] [blame] | 503 | ), |
| 504 | }), |
| 505 | |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 506 | _ => Ok(blob), |
| 507 | } |
| 508 | } |
| 509 | |
| 510 | fn tag_type(tag: Tag) -> TagType { |
| 511 | TagType((tag.0 as u32 & 0xFF000000u32) as i32) |
| 512 | } |
| 513 | |
| 514 | /// Read legacy key parameter file content. |
| 515 | /// Depending on the file type a key characteristics file stores one (TYPE_KEY_CHARACTERISTICS) |
| 516 | /// or two (TYPE_KEY_CHARACTERISTICS_CACHE) key parameter lists. The format of the list is as |
| 517 | /// follows: |
| 518 | /// |
| 519 | /// +------------------------------+ |
| 520 | /// | 32 bit indirect_size | |
| 521 | /// +------------------------------+ |
| 522 | /// | indirect_size bytes of data | This is where the blob data is stored |
| 523 | /// +------------------------------+ |
| 524 | /// | 32 bit element_count | Number of key parameter entries. |
| 525 | /// | 32 bit elements_size | Total bytes used by entries. |
| 526 | /// +------------------------------+ |
| 527 | /// | elements_size bytes of data | This is where the elements are stored. |
| 528 | /// +------------------------------+ |
| 529 | /// |
| 530 | /// Elements have a 32 bit header holding the tag with a tag type encoded in the |
| 531 | /// four most significant bits (see android/hardware/secruity/keymint/TagType.aidl). |
| 532 | /// The header is immediately followed by the payload. The payload size depends on |
| 533 | /// the encoded tag type in the header: |
| 534 | /// BOOLEAN : 1 byte |
| 535 | /// ENUM, ENUM_REP, UINT, UINT_REP : 4 bytes |
| 536 | /// ULONG, ULONG_REP, DATETIME : 8 bytes |
| 537 | /// BLOB, BIGNUM : 8 bytes see below. |
| 538 | /// |
| 539 | /// Bignum and blob payload format: |
| 540 | /// +------------------------+ |
| 541 | /// | 32 bit blob_length | Length of the indirect payload in bytes. |
| 542 | /// | 32 bit indirect_offset | Offset from the beginning of the indirect section. |
| 543 | /// +------------------------+ |
| 544 | pub fn read_key_parameters(stream: &mut &[u8]) -> Result<Vec<KeyParameterValue>> { |
Shaquille Johnson | 9da2e1c | 2022-09-19 12:39:01 +0000 | [diff] [blame] | 545 | let indirect_size = read_ne_u32(stream).context(ks_err!("While reading indirect size."))?; |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 546 | |
| 547 | let indirect_buffer = stream |
| 548 | .get(0..indirect_size as usize) |
| 549 | .ok_or(KsError::Rc(ResponseCode::VALUE_CORRUPTED)) |
Shaquille Johnson | 9da2e1c | 2022-09-19 12:39:01 +0000 | [diff] [blame] | 550 | .context(ks_err!("While reading indirect buffer."))?; |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 551 | |
| 552 | // update the stream position. |
| 553 | *stream = &stream[indirect_size as usize..]; |
| 554 | |
Shaquille Johnson | 9da2e1c | 2022-09-19 12:39:01 +0000 | [diff] [blame] | 555 | let element_count = read_ne_u32(stream).context(ks_err!("While reading element count."))?; |
| 556 | let element_size = read_ne_u32(stream).context(ks_err!("While reading element size."))?; |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 557 | |
Matthew Maurer | b77a28d | 2021-05-07 16:08:20 -0700 | [diff] [blame] | 558 | let mut element_stream = stream |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 559 | .get(0..element_size as usize) |
| 560 | .ok_or(KsError::Rc(ResponseCode::VALUE_CORRUPTED)) |
Shaquille Johnson | 9da2e1c | 2022-09-19 12:39:01 +0000 | [diff] [blame] | 561 | .context(ks_err!("While reading elements buffer."))?; |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 562 | |
| 563 | // update the stream position. |
| 564 | *stream = &stream[element_size as usize..]; |
| 565 | |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 566 | let mut params: Vec<KeyParameterValue> = Vec::new(); |
| 567 | for _ in 0..element_count { |
Shaquille Johnson | 9da2e1c | 2022-09-19 12:39:01 +0000 | [diff] [blame] | 568 | let tag = Tag(read_ne_i32(&mut element_stream).context(ks_err!())?); |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 569 | let param = match Self::tag_type(tag) { |
| 570 | TagType::ENUM | TagType::ENUM_REP | TagType::UINT | TagType::UINT_REP => { |
| 571 | KeyParameterValue::new_from_tag_primitive_pair( |
| 572 | tag, |
| 573 | read_ne_i32(&mut element_stream).context("While reading integer.")?, |
| 574 | ) |
| 575 | .context("Trying to construct integer/enum KeyParameterValue.") |
| 576 | } |
| 577 | TagType::ULONG | TagType::ULONG_REP | TagType::DATE => { |
| 578 | KeyParameterValue::new_from_tag_primitive_pair( |
| 579 | tag, |
| 580 | read_ne_i64(&mut element_stream).context("While reading long integer.")?, |
| 581 | ) |
| 582 | .context("Trying to construct long KeyParameterValue.") |
| 583 | } |
| 584 | TagType::BOOL => { |
| 585 | if read_bool(&mut element_stream).context("While reading long integer.")? { |
| 586 | KeyParameterValue::new_from_tag_primitive_pair(tag, 1) |
| 587 | .context("Trying to construct boolean KeyParameterValue.") |
| 588 | } else { |
| 589 | Err(anyhow::anyhow!("Invalid.")) |
| 590 | } |
| 591 | } |
| 592 | TagType::BYTES | TagType::BIGNUM => { |
| 593 | let blob_size = read_ne_u32(&mut element_stream) |
| 594 | .context("While reading blob size.")? |
| 595 | as usize; |
| 596 | let indirect_offset = read_ne_u32(&mut element_stream) |
| 597 | .context("While reading indirect offset.")? |
| 598 | as usize; |
| 599 | KeyParameterValue::new_from_tag_primitive_pair( |
| 600 | tag, |
| 601 | indirect_buffer |
| 602 | .get(indirect_offset..indirect_offset + blob_size) |
| 603 | .context("While reading blob value.")? |
| 604 | .to_vec(), |
| 605 | ) |
| 606 | .context("Trying to construct blob KeyParameterValue.") |
| 607 | } |
| 608 | TagType::INVALID => Err(anyhow::anyhow!("Invalid.")), |
| 609 | _ => { |
| 610 | return Err(KsError::Rc(ResponseCode::VALUE_CORRUPTED)) |
Shaquille Johnson | 9da2e1c | 2022-09-19 12:39:01 +0000 | [diff] [blame] | 611 | .context(ks_err!("Encountered bogus tag type.")); |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 612 | } |
| 613 | }; |
| 614 | if let Ok(p) = param { |
| 615 | params.push(p); |
| 616 | } |
| 617 | } |
| 618 | |
| 619 | Ok(params) |
| 620 | } |
| 621 | |
Janis Danisevskis | f84d0b0 | 2022-01-26 14:11:14 -0800 | [diff] [blame] | 622 | /// This function takes a Blob and an optional AesGcm. Plain text blob variants are |
| 623 | /// passed through as is. If a super key is given an attempt is made to decrypt the |
| 624 | /// blob thereby mapping BlobValue variants as follows: |
| 625 | /// BlobValue::Encrypted => BlobValue::Decrypted |
| 626 | /// BlobValue::EncryptedGeneric => BlobValue::Generic |
| 627 | /// BlobValue::EncryptedCharacteristics => BlobValue::Characteristics |
| 628 | /// If now super key is given or BlobValue::PwEncrypted is encountered, |
| 629 | /// Err(Error::LockedComponent) is returned. |
| 630 | fn decrypt_if_required(super_key: &Option<Arc<dyn AesGcm>>, blob: Blob) -> Result<Blob> { |
| 631 | match blob { |
| 632 | Blob { value: BlobValue::Generic(_), .. } |
| 633 | | Blob { value: BlobValue::Characteristics(_), .. } |
| 634 | | Blob { value: BlobValue::CharacteristicsCache(_), .. } |
| 635 | | Blob { value: BlobValue::Decrypted(_), .. } => Ok(blob), |
| 636 | Blob { value: BlobValue::EncryptedCharacteristics { iv, tag, data }, flags } |
| 637 | if super_key.is_some() => |
| 638 | { |
| 639 | Ok(Blob { |
| 640 | value: BlobValue::Characteristics( |
Shaquille Johnson | 9da2e1c | 2022-09-19 12:39:01 +0000 | [diff] [blame] | 641 | super_key |
| 642 | .as_ref() |
| 643 | .unwrap() |
| 644 | .decrypt(&data, &iv, &tag) |
| 645 | .context(ks_err!("Failed to decrypt EncryptedCharacteristics"))?[..] |
Janis Danisevskis | f84d0b0 | 2022-01-26 14:11:14 -0800 | [diff] [blame] | 646 | .to_vec(), |
| 647 | ), |
| 648 | flags, |
| 649 | }) |
| 650 | } |
| 651 | Blob { value: BlobValue::Encrypted { iv, tag, data }, flags } |
| 652 | if super_key.is_some() => |
| 653 | { |
| 654 | Ok(Blob { |
| 655 | value: BlobValue::Decrypted( |
| 656 | super_key |
| 657 | .as_ref() |
| 658 | .unwrap() |
| 659 | .decrypt(&data, &iv, &tag) |
Shaquille Johnson | 9da2e1c | 2022-09-19 12:39:01 +0000 | [diff] [blame] | 660 | .context(ks_err!("Failed to decrypt Encrypted"))?, |
Janis Danisevskis | f84d0b0 | 2022-01-26 14:11:14 -0800 | [diff] [blame] | 661 | ), |
| 662 | flags, |
| 663 | }) |
| 664 | } |
| 665 | Blob { value: BlobValue::EncryptedGeneric { iv, tag, data }, flags } |
| 666 | if super_key.is_some() => |
| 667 | { |
| 668 | Ok(Blob { |
| 669 | value: BlobValue::Generic( |
| 670 | super_key |
| 671 | .as_ref() |
| 672 | .unwrap() |
| 673 | .decrypt(&data, &iv, &tag) |
Shaquille Johnson | 9da2e1c | 2022-09-19 12:39:01 +0000 | [diff] [blame] | 674 | .context(ks_err!("Failed to decrypt Encrypted"))?[..] |
Janis Danisevskis | f84d0b0 | 2022-01-26 14:11:14 -0800 | [diff] [blame] | 675 | .to_vec(), |
| 676 | ), |
| 677 | flags, |
| 678 | }) |
| 679 | } |
| 680 | // This arm catches all encrypted cases where super key is not present or cannot |
| 681 | // decrypt the blob, the latter being BlobValue::PwEncrypted. |
| 682 | _ => Err(Error::LockedComponent) |
Shaquille Johnson | 9da2e1c | 2022-09-19 12:39:01 +0000 | [diff] [blame] | 683 | .context(ks_err!("Encountered encrypted blob without super key.")), |
Janis Danisevskis | f84d0b0 | 2022-01-26 14:11:14 -0800 | [diff] [blame] | 684 | } |
| 685 | } |
| 686 | |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 687 | fn read_characteristics_file( |
| 688 | &self, |
| 689 | uid: u32, |
| 690 | prefix: &str, |
| 691 | alias: &str, |
| 692 | hw_sec_level: SecurityLevel, |
Janis Danisevskis | f84d0b0 | 2022-01-26 14:11:14 -0800 | [diff] [blame] | 693 | super_key: &Option<Arc<dyn AesGcm>>, |
| 694 | ) -> Result<LegacyKeyCharacteristics> { |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 695 | let blob = Self::read_generic_blob(&self.make_chr_filename(uid, alias, prefix)) |
Shaquille Johnson | 9da2e1c | 2022-09-19 12:39:01 +0000 | [diff] [blame] | 696 | .context(ks_err!())?; |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 697 | |
| 698 | let blob = match blob { |
Janis Danisevskis | f84d0b0 | 2022-01-26 14:11:14 -0800 | [diff] [blame] | 699 | None => return Ok(LegacyKeyCharacteristics::Cache(Vec::new())), |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 700 | Some(blob) => blob, |
| 701 | }; |
| 702 | |
Janis Danisevskis | f84d0b0 | 2022-01-26 14:11:14 -0800 | [diff] [blame] | 703 | let blob = Self::decrypt_if_required(super_key, blob) |
Shaquille Johnson | 9da2e1c | 2022-09-19 12:39:01 +0000 | [diff] [blame] | 704 | .context(ks_err!("Trying to decrypt blob."))?; |
Janis Danisevskis | f84d0b0 | 2022-01-26 14:11:14 -0800 | [diff] [blame] | 705 | |
| 706 | let (mut stream, is_cache) = match blob.value() { |
| 707 | BlobValue::Characteristics(data) => (&data[..], false), |
| 708 | BlobValue::CharacteristicsCache(data) => (&data[..], true), |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 709 | _ => { |
Shaquille Johnson | 9da2e1c | 2022-09-19 12:39:01 +0000 | [diff] [blame] | 710 | return Err(KsError::Rc(ResponseCode::VALUE_CORRUPTED)) |
| 711 | .context(ks_err!("Characteristics file does not hold key characteristics.")); |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 712 | } |
| 713 | }; |
| 714 | |
| 715 | let hw_list = match blob.value() { |
| 716 | // The characteristics cache file has two lists and the first is |
| 717 | // the hardware enforced list. |
| 718 | BlobValue::CharacteristicsCache(_) => Some( |
| 719 | Self::read_key_parameters(&mut stream) |
Shaquille Johnson | 9da2e1c | 2022-09-19 12:39:01 +0000 | [diff] [blame] | 720 | .context(ks_err!())? |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 721 | .into_iter() |
| 722 | .map(|value| KeyParameter::new(value, hw_sec_level)), |
| 723 | ), |
| 724 | _ => None, |
| 725 | }; |
| 726 | |
| 727 | let sw_list = Self::read_key_parameters(&mut stream) |
Shaquille Johnson | 9da2e1c | 2022-09-19 12:39:01 +0000 | [diff] [blame] | 728 | .context(ks_err!())? |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 729 | .into_iter() |
Hasini Gunasinghe | 3ed5da7 | 2021-02-04 15:18:54 +0000 | [diff] [blame] | 730 | .map(|value| KeyParameter::new(value, SecurityLevel::KEYSTORE)); |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 731 | |
Janis Danisevskis | f84d0b0 | 2022-01-26 14:11:14 -0800 | [diff] [blame] | 732 | let params: Vec<KeyParameter> = hw_list.into_iter().flatten().chain(sw_list).collect(); |
| 733 | if is_cache { |
| 734 | Ok(LegacyKeyCharacteristics::Cache(params)) |
| 735 | } else { |
| 736 | Ok(LegacyKeyCharacteristics::File(params)) |
| 737 | } |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 738 | } |
| 739 | |
| 740 | // This is a list of known prefixes that the Keystore 1.0 SPI used to use. |
| 741 | // * USRPKEY was used for private and secret key material, i.e., KM blobs. |
| 742 | // * USRSKEY was used for secret key material, i.e., KM blobs, before Android P. |
| 743 | // * CACERT was used for key chains or free standing public certificates. |
| 744 | // * USRCERT was used for public certificates of USRPKEY entries. But KeyChain also |
| 745 | // used this for user installed certificates without private key material. |
| 746 | |
Janis Danisevskis | 3eb829d | 2021-06-14 14:18:20 -0700 | [diff] [blame] | 747 | const KNOWN_KEYSTORE_PREFIXES: &'static [&'static str] = |
| 748 | &["USRPKEY_", "USRSKEY_", "USRCERT_", "CACERT_"]; |
| 749 | |
| 750 | fn is_keystore_alias(encoded_alias: &str) -> bool { |
| 751 | // We can check the encoded alias because the prefixes we are interested |
| 752 | // in are all in the printable range that don't get mangled. |
| 753 | Self::KNOWN_KEYSTORE_PREFIXES.iter().any(|prefix| encoded_alias.starts_with(prefix)) |
| 754 | } |
| 755 | |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 756 | fn read_km_blob_file(&self, uid: u32, alias: &str) -> Result<Option<(Blob, String)>> { |
Hasini Gunasinghe | 3ed5da7 | 2021-02-04 15:18:54 +0000 | [diff] [blame] | 757 | let mut iter = ["USRPKEY", "USRSKEY"].iter(); |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 758 | |
| 759 | let (blob, prefix) = loop { |
| 760 | if let Some(prefix) = iter.next() { |
| 761 | if let Some(blob) = |
| 762 | Self::read_generic_blob(&self.make_blob_filename(uid, alias, prefix)) |
| 763 | .context("In read_km_blob_file.")? |
| 764 | { |
| 765 | break (blob, prefix); |
| 766 | } |
| 767 | } else { |
| 768 | return Ok(None); |
| 769 | } |
| 770 | }; |
| 771 | |
| 772 | Ok(Some((blob, prefix.to_string()))) |
| 773 | } |
| 774 | |
| 775 | fn read_generic_blob(path: &Path) -> Result<Option<Blob>> { |
Hasini Gunasinghe | 3ed5da7 | 2021-02-04 15:18:54 +0000 | [diff] [blame] | 776 | let mut file = match Self::with_retry_interrupted(|| File::open(path)) { |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 777 | Ok(file) => file, |
| 778 | Err(e) => match e.kind() { |
| 779 | ErrorKind::NotFound => return Ok(None), |
Shaquille Johnson | 9da2e1c | 2022-09-19 12:39:01 +0000 | [diff] [blame] | 780 | _ => return Err(e).context(ks_err!()), |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 781 | }, |
| 782 | }; |
| 783 | |
Shaquille Johnson | 9da2e1c | 2022-09-19 12:39:01 +0000 | [diff] [blame] | 784 | Ok(Some(Self::new_from_stream(&mut file).context(ks_err!())?)) |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 785 | } |
| 786 | |
Janis Danisevskis | f84d0b0 | 2022-01-26 14:11:14 -0800 | [diff] [blame] | 787 | fn read_generic_blob_decrypt_with<F>(path: &Path, decrypt: F) -> Result<Option<Blob>> |
| 788 | where |
| 789 | F: FnOnce(&[u8], &[u8], &[u8], Option<&[u8]>, Option<usize>) -> Result<ZVec>, |
| 790 | { |
| 791 | let mut file = match Self::with_retry_interrupted(|| File::open(path)) { |
| 792 | Ok(file) => file, |
| 793 | Err(e) => match e.kind() { |
| 794 | ErrorKind::NotFound => return Ok(None), |
Shaquille Johnson | 9da2e1c | 2022-09-19 12:39:01 +0000 | [diff] [blame] | 795 | _ => return Err(e).context(ks_err!()), |
Janis Danisevskis | f84d0b0 | 2022-01-26 14:11:14 -0800 | [diff] [blame] | 796 | }, |
| 797 | }; |
| 798 | |
Shaquille Johnson | 9da2e1c | 2022-09-19 12:39:01 +0000 | [diff] [blame] | 799 | Ok(Some(Self::new_from_stream_decrypt_with(&mut file, decrypt).context(ks_err!())?)) |
Janis Danisevskis | f84d0b0 | 2022-01-26 14:11:14 -0800 | [diff] [blame] | 800 | } |
| 801 | |
Janis Danisevskis | 3eb829d | 2021-06-14 14:18:20 -0700 | [diff] [blame] | 802 | /// Read a legacy keystore entry blob. |
Janis Danisevskis | f84d0b0 | 2022-01-26 14:11:14 -0800 | [diff] [blame] | 803 | pub fn read_legacy_keystore_entry<F>( |
| 804 | &self, |
| 805 | uid: u32, |
| 806 | alias: &str, |
| 807 | decrypt: F, |
| 808 | ) -> Result<Option<Vec<u8>>> |
| 809 | where |
| 810 | F: FnOnce(&[u8], &[u8], &[u8], Option<&[u8]>, Option<usize>) -> Result<ZVec>, |
| 811 | { |
Janis Danisevskis | 3eb829d | 2021-06-14 14:18:20 -0700 | [diff] [blame] | 812 | let path = match self.make_legacy_keystore_entry_filename(uid, alias) { |
Janis Danisevskis | 0689107 | 2021-02-11 10:28:17 -0800 | [diff] [blame] | 813 | Some(path) => path, |
| 814 | None => return Ok(None), |
| 815 | }; |
| 816 | |
Janis Danisevskis | f84d0b0 | 2022-01-26 14:11:14 -0800 | [diff] [blame] | 817 | let blob = Self::read_generic_blob_decrypt_with(&path, decrypt) |
Shaquille Johnson | 9da2e1c | 2022-09-19 12:39:01 +0000 | [diff] [blame] | 818 | .context(ks_err!("Failed to read blob."))?; |
Janis Danisevskis | 0689107 | 2021-02-11 10:28:17 -0800 | [diff] [blame] | 819 | |
| 820 | Ok(blob.and_then(|blob| match blob.value { |
| 821 | BlobValue::Generic(blob) => Some(blob), |
| 822 | _ => { |
Janis Danisevskis | 3eb829d | 2021-06-14 14:18:20 -0700 | [diff] [blame] | 823 | log::info!("Unexpected legacy keystore entry blob type. Ignoring"); |
Janis Danisevskis | 0689107 | 2021-02-11 10:28:17 -0800 | [diff] [blame] | 824 | None |
| 825 | } |
| 826 | })) |
| 827 | } |
| 828 | |
Janis Danisevskis | 3eb829d | 2021-06-14 14:18:20 -0700 | [diff] [blame] | 829 | /// Remove a legacy keystore entry by the name alias with owner uid. |
Janis Danisevskis | f84d0b0 | 2022-01-26 14:11:14 -0800 | [diff] [blame] | 830 | pub fn remove_legacy_keystore_entry(&self, uid: u32, alias: &str) -> Result<bool> { |
Janis Danisevskis | 3eb829d | 2021-06-14 14:18:20 -0700 | [diff] [blame] | 831 | let path = match self.make_legacy_keystore_entry_filename(uid, alias) { |
Janis Danisevskis | 0689107 | 2021-02-11 10:28:17 -0800 | [diff] [blame] | 832 | Some(path) => path, |
Janis Danisevskis | f84d0b0 | 2022-01-26 14:11:14 -0800 | [diff] [blame] | 833 | None => return Ok(false), |
Janis Danisevskis | 0689107 | 2021-02-11 10:28:17 -0800 | [diff] [blame] | 834 | }; |
| 835 | |
| 836 | if let Err(e) = Self::with_retry_interrupted(|| fs::remove_file(path.as_path())) { |
| 837 | match e.kind() { |
Janis Danisevskis | f84d0b0 | 2022-01-26 14:11:14 -0800 | [diff] [blame] | 838 | ErrorKind::NotFound => return Ok(false), |
Shaquille Johnson | 9da2e1c | 2022-09-19 12:39:01 +0000 | [diff] [blame] | 839 | _ => return Err(e).context(ks_err!()), |
Janis Danisevskis | 0689107 | 2021-02-11 10:28:17 -0800 | [diff] [blame] | 840 | } |
| 841 | } |
| 842 | |
| 843 | let user_id = uid_to_android_user(uid); |
| 844 | self.remove_user_dir_if_empty(user_id) |
Shaquille Johnson | 9da2e1c | 2022-09-19 12:39:01 +0000 | [diff] [blame] | 845 | .context(ks_err!("Trying to remove empty user dir."))?; |
Janis Danisevskis | f84d0b0 | 2022-01-26 14:11:14 -0800 | [diff] [blame] | 846 | Ok(true) |
Janis Danisevskis | 0689107 | 2021-02-11 10:28:17 -0800 | [diff] [blame] | 847 | } |
| 848 | |
Janis Danisevskis | 3eb829d | 2021-06-14 14:18:20 -0700 | [diff] [blame] | 849 | /// List all entries belonging to the given uid. |
Janis Danisevskis | 5898d15 | 2021-06-15 08:23:46 -0700 | [diff] [blame] | 850 | pub fn list_legacy_keystore_entries_for_uid(&self, uid: u32) -> Result<Vec<String>> { |
Janis Danisevskis | 0689107 | 2021-02-11 10:28:17 -0800 | [diff] [blame] | 851 | let mut path = self.path.clone(); |
| 852 | let user_id = uid_to_android_user(uid); |
| 853 | path.push(format!("user_{}", user_id)); |
| 854 | let uid_str = uid.to_string(); |
Janis Danisevskis | 13f0915 | 2021-04-19 09:55:15 -0700 | [diff] [blame] | 855 | let dir = match Self::with_retry_interrupted(|| fs::read_dir(path.as_path())) { |
| 856 | Ok(dir) => dir, |
| 857 | Err(e) => match e.kind() { |
| 858 | ErrorKind::NotFound => return Ok(Default::default()), |
| 859 | _ => { |
Shaquille Johnson | 9da2e1c | 2022-09-19 12:39:01 +0000 | [diff] [blame] | 860 | return Err(e) |
| 861 | .context(ks_err!("Failed to open legacy blob database: {:?}", path)); |
Janis Danisevskis | 13f0915 | 2021-04-19 09:55:15 -0700 | [diff] [blame] | 862 | } |
| 863 | }, |
| 864 | }; |
Janis Danisevskis | 0689107 | 2021-02-11 10:28:17 -0800 | [diff] [blame] | 865 | let mut result: Vec<String> = Vec::new(); |
| 866 | for entry in dir { |
Shaquille Johnson | 9da2e1c | 2022-09-19 12:39:01 +0000 | [diff] [blame] | 867 | let file_name = entry.context(ks_err!("Trying to access dir entry"))?.file_name(); |
Janis Danisevskis | 0689107 | 2021-02-11 10:28:17 -0800 | [diff] [blame] | 868 | if let Some(f) = file_name.to_str() { |
| 869 | let encoded_alias = &f[uid_str.len() + 1..]; |
Janis Danisevskis | 3eb829d | 2021-06-14 14:18:20 -0700 | [diff] [blame] | 870 | if f.starts_with(&uid_str) && !Self::is_keystore_alias(encoded_alias) { |
Shaquille Johnson | 9da2e1c | 2022-09-19 12:39:01 +0000 | [diff] [blame] | 871 | result.push( |
| 872 | Self::decode_alias(encoded_alias) |
| 873 | .context(ks_err!("Trying to decode alias."))?, |
| 874 | ) |
Janis Danisevskis | 0689107 | 2021-02-11 10:28:17 -0800 | [diff] [blame] | 875 | } |
| 876 | } |
| 877 | } |
| 878 | Ok(result) |
| 879 | } |
| 880 | |
Janis Danisevskis | 5898d15 | 2021-06-15 08:23:46 -0700 | [diff] [blame] | 881 | fn extract_legacy_alias(encoded_alias: &str) -> Option<String> { |
| 882 | if !Self::is_keystore_alias(encoded_alias) { |
| 883 | Self::decode_alias(encoded_alias).ok() |
| 884 | } else { |
| 885 | None |
| 886 | } |
| 887 | } |
| 888 | |
| 889 | /// Lists all keystore entries belonging to the given user. Returns a map of UIDs |
| 890 | /// to sets of decoded aliases. Only returns entries that do not begin with |
| 891 | /// KNOWN_KEYSTORE_PREFIXES. |
| 892 | pub fn list_legacy_keystore_entries_for_user( |
| 893 | &self, |
| 894 | user_id: u32, |
| 895 | ) -> Result<HashMap<u32, HashSet<String>>> { |
Shaquille Johnson | 9da2e1c | 2022-09-19 12:39:01 +0000 | [diff] [blame] | 896 | let user_entries = self.list_user(user_id).context(ks_err!("Trying to list user."))?; |
Janis Danisevskis | 5898d15 | 2021-06-15 08:23:46 -0700 | [diff] [blame] | 897 | |
| 898 | let result = |
| 899 | user_entries.into_iter().fold(HashMap::<u32, HashSet<String>>::new(), |mut acc, v| { |
| 900 | if let Some(sep_pos) = v.find('_') { |
| 901 | if let Ok(uid) = v[0..sep_pos].parse::<u32>() { |
| 902 | if let Some(alias) = Self::extract_legacy_alias(&v[sep_pos + 1..]) { |
| 903 | let entry = acc.entry(uid).or_default(); |
| 904 | entry.insert(alias); |
| 905 | } |
| 906 | } |
| 907 | } |
| 908 | acc |
| 909 | }); |
| 910 | Ok(result) |
| 911 | } |
| 912 | |
Janis Danisevskis | 3eb829d | 2021-06-14 14:18:20 -0700 | [diff] [blame] | 913 | /// This function constructs the legacy blob file name which has the form: |
| 914 | /// user_<android user id>/<uid>_<alias>. Legacy blob file names must not use |
| 915 | /// known keystore prefixes. |
| 916 | fn make_legacy_keystore_entry_filename(&self, uid: u32, alias: &str) -> Option<PathBuf> { |
| 917 | // Legacy entries must not use known keystore prefixes. |
| 918 | if Self::is_keystore_alias(alias) { |
| 919 | log::warn!( |
| 920 | "Known keystore prefixes cannot be used with legacy keystore -> ignoring request." |
| 921 | ); |
Janis Danisevskis | 0689107 | 2021-02-11 10:28:17 -0800 | [diff] [blame] | 922 | return None; |
| 923 | } |
| 924 | |
| 925 | let mut path = self.path.clone(); |
| 926 | let user_id = uid_to_android_user(uid); |
| 927 | let encoded_alias = Self::encode_alias(alias); |
| 928 | path.push(format!("user_{}", user_id)); |
| 929 | path.push(format!("{}_{}", uid, encoded_alias)); |
| 930 | Some(path) |
| 931 | } |
| 932 | |
| 933 | /// This function constructs the blob file name which has the form: |
| 934 | /// user_<android user id>/<uid>_<prefix>_<alias>. |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 935 | fn make_blob_filename(&self, uid: u32, alias: &str, prefix: &str) -> PathBuf { |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 936 | let user_id = uid_to_android_user(uid); |
| 937 | let encoded_alias = Self::encode_alias(&format!("{}_{}", prefix, alias)); |
Hasini Gunasinghe | 3ed5da7 | 2021-02-04 15:18:54 +0000 | [diff] [blame] | 938 | let mut path = self.make_user_path_name(user_id); |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 939 | path.push(format!("{}_{}", uid, encoded_alias)); |
| 940 | path |
| 941 | } |
| 942 | |
| 943 | /// This function constructs the characteristics file name which has the form: |
Hasini Gunasinghe | 3ed5da7 | 2021-02-04 15:18:54 +0000 | [diff] [blame] | 944 | /// user_<android user id>/.<uid>_chr_<prefix>_<alias>. |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 945 | fn make_chr_filename(&self, uid: u32, alias: &str, prefix: &str) -> PathBuf { |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 946 | let user_id = uid_to_android_user(uid); |
| 947 | let encoded_alias = Self::encode_alias(&format!("{}_{}", prefix, alias)); |
Hasini Gunasinghe | 3ed5da7 | 2021-02-04 15:18:54 +0000 | [diff] [blame] | 948 | let mut path = self.make_user_path_name(user_id); |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 949 | path.push(format!(".{}_chr_{}", uid, encoded_alias)); |
| 950 | path |
| 951 | } |
| 952 | |
Hasini Gunasinghe | 3ed5da7 | 2021-02-04 15:18:54 +0000 | [diff] [blame] | 953 | fn make_super_key_filename(&self, user_id: u32) -> PathBuf { |
| 954 | let mut path = self.make_user_path_name(user_id); |
| 955 | path.push(".masterkey"); |
| 956 | path |
| 957 | } |
| 958 | |
| 959 | fn make_user_path_name(&self, user_id: u32) -> PathBuf { |
| 960 | let mut path = self.path.clone(); |
| 961 | path.push(&format!("user_{}", user_id)); |
| 962 | path |
| 963 | } |
| 964 | |
| 965 | /// Returns if the legacy blob database is empty, i.e., there are no entries matching "user_*" |
| 966 | /// in the database dir. |
| 967 | pub fn is_empty(&self) -> Result<bool> { |
| 968 | let dir = Self::with_retry_interrupted(|| fs::read_dir(self.path.as_path())) |
Shaquille Johnson | 9da2e1c | 2022-09-19 12:39:01 +0000 | [diff] [blame] | 969 | .context(ks_err!("Failed to open legacy blob database."))?; |
Hasini Gunasinghe | 3ed5da7 | 2021-02-04 15:18:54 +0000 | [diff] [blame] | 970 | for entry in dir { |
Shaquille Johnson | 9da2e1c | 2022-09-19 12:39:01 +0000 | [diff] [blame] | 971 | if (*entry.context(ks_err!("Trying to access dir entry"))?.file_name()) |
Hasini Gunasinghe | 3ed5da7 | 2021-02-04 15:18:54 +0000 | [diff] [blame] | 972 | .to_str() |
| 973 | .map_or(false, |f| f.starts_with("user_")) |
| 974 | { |
| 975 | return Ok(false); |
| 976 | } |
| 977 | } |
| 978 | Ok(true) |
| 979 | } |
| 980 | |
| 981 | /// Returns if the legacy blob database is empty for a given user, i.e., there are no entries |
| 982 | /// matching "user_*" in the database dir. |
| 983 | pub fn is_empty_user(&self, user_id: u32) -> Result<bool> { |
| 984 | let mut user_path = self.path.clone(); |
| 985 | user_path.push(format!("user_{}", user_id)); |
| 986 | if !user_path.as_path().is_dir() { |
| 987 | return Ok(true); |
| 988 | } |
| 989 | Ok(Self::with_retry_interrupted(|| user_path.read_dir()) |
Shaquille Johnson | 9da2e1c | 2022-09-19 12:39:01 +0000 | [diff] [blame] | 990 | .context(ks_err!("Failed to open legacy user dir."))? |
Hasini Gunasinghe | 3ed5da7 | 2021-02-04 15:18:54 +0000 | [diff] [blame] | 991 | .next() |
| 992 | .is_none()) |
| 993 | } |
| 994 | |
Janis Danisevskis | 5898d15 | 2021-06-15 08:23:46 -0700 | [diff] [blame] | 995 | fn extract_keystore_alias(encoded_alias: &str) -> Option<String> { |
Hasini Gunasinghe | 3ed5da7 | 2021-02-04 15:18:54 +0000 | [diff] [blame] | 996 | // We can check the encoded alias because the prefixes we are interested |
| 997 | // in are all in the printable range that don't get mangled. |
Janis Danisevskis | 5898d15 | 2021-06-15 08:23:46 -0700 | [diff] [blame] | 998 | for prefix in Self::KNOWN_KEYSTORE_PREFIXES { |
Hasini Gunasinghe | 3ed5da7 | 2021-02-04 15:18:54 +0000 | [diff] [blame] | 999 | if let Some(alias) = encoded_alias.strip_prefix(prefix) { |
Chris Wailes | d5aaaef | 2021-07-27 16:04:33 -0700 | [diff] [blame] | 1000 | return Self::decode_alias(alias).ok(); |
Hasini Gunasinghe | 3ed5da7 | 2021-02-04 15:18:54 +0000 | [diff] [blame] | 1001 | } |
| 1002 | } |
| 1003 | None |
| 1004 | } |
| 1005 | |
| 1006 | /// List all entries for a given user. The strings are unchanged file names, i.e., |
| 1007 | /// encoded with UID prefix. |
| 1008 | fn list_user(&self, user_id: u32) -> Result<Vec<String>> { |
| 1009 | let path = self.make_user_path_name(user_id); |
Janis Danisevskis | 7df9dbf | 2021-04-12 16:04:42 -0700 | [diff] [blame] | 1010 | let dir = match Self::with_retry_interrupted(|| fs::read_dir(path.as_path())) { |
| 1011 | Ok(dir) => dir, |
| 1012 | Err(e) => match e.kind() { |
| 1013 | ErrorKind::NotFound => return Ok(Default::default()), |
| 1014 | _ => { |
Shaquille Johnson | 9da2e1c | 2022-09-19 12:39:01 +0000 | [diff] [blame] | 1015 | return Err(e) |
| 1016 | .context(ks_err!("Failed to open legacy blob database. {:?}", path)); |
Janis Danisevskis | 7df9dbf | 2021-04-12 16:04:42 -0700 | [diff] [blame] | 1017 | } |
| 1018 | }, |
| 1019 | }; |
Hasini Gunasinghe | 3ed5da7 | 2021-02-04 15:18:54 +0000 | [diff] [blame] | 1020 | let mut result: Vec<String> = Vec::new(); |
| 1021 | for entry in dir { |
Shaquille Johnson | 9da2e1c | 2022-09-19 12:39:01 +0000 | [diff] [blame] | 1022 | let file_name = entry.context(ks_err!("Trying to access dir entry"))?.file_name(); |
Hasini Gunasinghe | 3ed5da7 | 2021-02-04 15:18:54 +0000 | [diff] [blame] | 1023 | if let Some(f) = file_name.to_str() { |
| 1024 | result.push(f.to_string()) |
| 1025 | } |
| 1026 | } |
| 1027 | Ok(result) |
| 1028 | } |
| 1029 | |
Janis Danisevskis | eed6984 | 2021-02-18 20:04:10 -0800 | [diff] [blame] | 1030 | /// List all keystore entries belonging to the given user. Returns a map of UIDs |
| 1031 | /// to sets of decoded aliases. |
| 1032 | pub fn list_keystore_entries_for_user( |
| 1033 | &self, |
| 1034 | user_id: u32, |
| 1035 | ) -> Result<HashMap<u32, HashSet<String>>> { |
Shaquille Johnson | 9da2e1c | 2022-09-19 12:39:01 +0000 | [diff] [blame] | 1036 | let user_entries = self.list_user(user_id).context(ks_err!("Trying to list user."))?; |
Janis Danisevskis | eed6984 | 2021-02-18 20:04:10 -0800 | [diff] [blame] | 1037 | |
| 1038 | let result = |
| 1039 | user_entries.into_iter().fold(HashMap::<u32, HashSet<String>>::new(), |mut acc, v| { |
| 1040 | if let Some(sep_pos) = v.find('_') { |
| 1041 | if let Ok(uid) = v[0..sep_pos].parse::<u32>() { |
Janis Danisevskis | 5898d15 | 2021-06-15 08:23:46 -0700 | [diff] [blame] | 1042 | if let Some(alias) = Self::extract_keystore_alias(&v[sep_pos + 1..]) { |
Janis Danisevskis | eed6984 | 2021-02-18 20:04:10 -0800 | [diff] [blame] | 1043 | let entry = acc.entry(uid).or_default(); |
| 1044 | entry.insert(alias); |
| 1045 | } |
| 1046 | } |
| 1047 | } |
| 1048 | acc |
| 1049 | }); |
| 1050 | Ok(result) |
| 1051 | } |
| 1052 | |
Hasini Gunasinghe | 3ed5da7 | 2021-02-04 15:18:54 +0000 | [diff] [blame] | 1053 | /// List all keystore entries belonging to the given uid. |
| 1054 | pub fn list_keystore_entries_for_uid(&self, uid: u32) -> Result<Vec<String>> { |
| 1055 | let user_id = uid_to_android_user(uid); |
| 1056 | |
Shaquille Johnson | 9da2e1c | 2022-09-19 12:39:01 +0000 | [diff] [blame] | 1057 | let user_entries = self.list_user(user_id).context(ks_err!("Trying to list user."))?; |
Hasini Gunasinghe | 3ed5da7 | 2021-02-04 15:18:54 +0000 | [diff] [blame] | 1058 | |
| 1059 | let uid_str = format!("{}_", uid); |
| 1060 | |
| 1061 | let mut result: Vec<String> = user_entries |
| 1062 | .into_iter() |
| 1063 | .filter_map(|v| { |
| 1064 | if !v.starts_with(&uid_str) { |
| 1065 | return None; |
| 1066 | } |
| 1067 | let encoded_alias = &v[uid_str.len()..]; |
Janis Danisevskis | 5898d15 | 2021-06-15 08:23:46 -0700 | [diff] [blame] | 1068 | Self::extract_keystore_alias(encoded_alias) |
Hasini Gunasinghe | 3ed5da7 | 2021-02-04 15:18:54 +0000 | [diff] [blame] | 1069 | }) |
| 1070 | .collect(); |
| 1071 | |
| 1072 | result.sort_unstable(); |
| 1073 | result.dedup(); |
| 1074 | Ok(result) |
| 1075 | } |
| 1076 | |
| 1077 | fn with_retry_interrupted<F, T>(f: F) -> IoResult<T> |
| 1078 | where |
| 1079 | F: Fn() -> IoResult<T>, |
| 1080 | { |
| 1081 | loop { |
| 1082 | match f() { |
| 1083 | Ok(v) => return Ok(v), |
| 1084 | Err(e) => match e.kind() { |
| 1085 | ErrorKind::Interrupted => continue, |
| 1086 | _ => return Err(e), |
| 1087 | }, |
| 1088 | } |
| 1089 | } |
| 1090 | } |
| 1091 | |
| 1092 | /// Deletes a keystore entry. Also removes the user_<uid> directory on the |
| 1093 | /// last migration. |
| 1094 | pub fn remove_keystore_entry(&self, uid: u32, alias: &str) -> Result<bool> { |
| 1095 | let mut something_was_deleted = false; |
| 1096 | let prefixes = ["USRPKEY", "USRSKEY"]; |
| 1097 | for prefix in &prefixes { |
| 1098 | let path = self.make_blob_filename(uid, alias, prefix); |
| 1099 | if let Err(e) = Self::with_retry_interrupted(|| fs::remove_file(path.as_path())) { |
| 1100 | match e.kind() { |
| 1101 | // Only a subset of keys are expected. |
| 1102 | ErrorKind::NotFound => continue, |
| 1103 | // Log error but ignore. |
| 1104 | _ => log::error!("Error while deleting key blob entries. {:?}", e), |
| 1105 | } |
| 1106 | } |
| 1107 | let path = self.make_chr_filename(uid, alias, prefix); |
| 1108 | if let Err(e) = Self::with_retry_interrupted(|| fs::remove_file(path.as_path())) { |
| 1109 | match e.kind() { |
| 1110 | ErrorKind::NotFound => { |
| 1111 | log::info!("No characteristics file found for legacy key blob.") |
| 1112 | } |
| 1113 | // Log error but ignore. |
| 1114 | _ => log::error!("Error while deleting key blob entries. {:?}", e), |
| 1115 | } |
| 1116 | } |
| 1117 | something_was_deleted = true; |
| 1118 | // Only one of USRPKEY and USRSKEY can be present. So we can end the loop |
| 1119 | // if we reach this point. |
| 1120 | break; |
| 1121 | } |
| 1122 | |
| 1123 | let prefixes = ["USRCERT", "CACERT"]; |
| 1124 | for prefix in &prefixes { |
| 1125 | let path = self.make_blob_filename(uid, alias, prefix); |
| 1126 | if let Err(e) = Self::with_retry_interrupted(|| fs::remove_file(path.as_path())) { |
| 1127 | match e.kind() { |
| 1128 | // USRCERT and CACERT are optional either or both may or may not be present. |
| 1129 | ErrorKind::NotFound => continue, |
| 1130 | // Log error but ignore. |
| 1131 | _ => log::error!("Error while deleting key blob entries. {:?}", e), |
| 1132 | } |
| 1133 | something_was_deleted = true; |
| 1134 | } |
| 1135 | } |
| 1136 | |
| 1137 | if something_was_deleted { |
| 1138 | let user_id = uid_to_android_user(uid); |
Janis Danisevskis | 0689107 | 2021-02-11 10:28:17 -0800 | [diff] [blame] | 1139 | self.remove_user_dir_if_empty(user_id) |
Shaquille Johnson | 9da2e1c | 2022-09-19 12:39:01 +0000 | [diff] [blame] | 1140 | .context(ks_err!("Trying to remove empty user dir."))?; |
Hasini Gunasinghe | 3ed5da7 | 2021-02-04 15:18:54 +0000 | [diff] [blame] | 1141 | } |
| 1142 | |
| 1143 | Ok(something_was_deleted) |
| 1144 | } |
| 1145 | |
Janis Danisevskis | f84d0b0 | 2022-01-26 14:11:14 -0800 | [diff] [blame] | 1146 | /// This function moves a keystore file if it exists. It constructs the source and destination |
| 1147 | /// file name using the make_filename function with the arguments uid, alias, and prefix. |
| 1148 | /// The function overwrites existing destination files silently. If the source does not exist, |
| 1149 | /// this function has no side effect and returns successfully. |
| 1150 | fn move_keystore_file_if_exists<F>( |
| 1151 | src_uid: u32, |
| 1152 | dest_uid: u32, |
| 1153 | src_alias: &str, |
| 1154 | dest_alias: &str, |
| 1155 | prefix: &str, |
| 1156 | make_filename: F, |
| 1157 | ) -> Result<()> |
| 1158 | where |
| 1159 | F: Fn(u32, &str, &str) -> PathBuf, |
| 1160 | { |
| 1161 | let src_path = make_filename(src_uid, src_alias, prefix); |
| 1162 | let dest_path = make_filename(dest_uid, dest_alias, prefix); |
| 1163 | match Self::with_retry_interrupted(|| fs::rename(&src_path, &dest_path)) { |
| 1164 | Err(e) if e.kind() == ErrorKind::NotFound => Ok(()), |
Shaquille Johnson | 9da2e1c | 2022-09-19 12:39:01 +0000 | [diff] [blame] | 1165 | r => r.context(ks_err!("Trying to rename.")), |
Janis Danisevskis | f84d0b0 | 2022-01-26 14:11:14 -0800 | [diff] [blame] | 1166 | } |
| 1167 | } |
| 1168 | |
| 1169 | /// Moves a keystore entry from one uid to another. The uids must have the same android user |
| 1170 | /// component. Moves across android users are not permitted. |
| 1171 | pub fn move_keystore_entry( |
| 1172 | &self, |
| 1173 | src_uid: u32, |
| 1174 | dest_uid: u32, |
| 1175 | src_alias: &str, |
| 1176 | dest_alias: &str, |
| 1177 | ) -> Result<()> { |
| 1178 | if src_uid == dest_uid { |
| 1179 | // Nothing to do in the trivial case. |
| 1180 | return Ok(()); |
| 1181 | } |
| 1182 | |
| 1183 | if uid_to_android_user(src_uid) != uid_to_android_user(dest_uid) { |
Shaquille Johnson | 9da2e1c | 2022-09-19 12:39:01 +0000 | [diff] [blame] | 1184 | return Err(Error::AndroidUserMismatch).context(ks_err!()); |
Janis Danisevskis | f84d0b0 | 2022-01-26 14:11:14 -0800 | [diff] [blame] | 1185 | } |
| 1186 | |
| 1187 | let prefixes = ["USRPKEY", "USRSKEY", "USRCERT", "CACERT"]; |
| 1188 | for prefix in prefixes { |
| 1189 | Self::move_keystore_file_if_exists( |
| 1190 | src_uid, |
| 1191 | dest_uid, |
| 1192 | src_alias, |
| 1193 | dest_alias, |
| 1194 | prefix, |
| 1195 | |uid, alias, prefix| self.make_blob_filename(uid, alias, prefix), |
| 1196 | ) |
Shaquille Johnson | 9da2e1c | 2022-09-19 12:39:01 +0000 | [diff] [blame] | 1197 | .with_context(|| ks_err!("Trying to move blob file with prefix: \"{}\"", prefix))?; |
Janis Danisevskis | f84d0b0 | 2022-01-26 14:11:14 -0800 | [diff] [blame] | 1198 | } |
| 1199 | |
| 1200 | let prefixes = ["USRPKEY", "USRSKEY"]; |
| 1201 | |
| 1202 | for prefix in prefixes { |
| 1203 | Self::move_keystore_file_if_exists( |
| 1204 | src_uid, |
| 1205 | dest_uid, |
| 1206 | src_alias, |
| 1207 | dest_alias, |
| 1208 | prefix, |
| 1209 | |uid, alias, prefix| self.make_chr_filename(uid, alias, prefix), |
| 1210 | ) |
| 1211 | .with_context(|| { |
Shaquille Johnson | 9da2e1c | 2022-09-19 12:39:01 +0000 | [diff] [blame] | 1212 | ks_err!( |
| 1213 | "Trying to move characteristics file with \ |
Janis Danisevskis | f84d0b0 | 2022-01-26 14:11:14 -0800 | [diff] [blame] | 1214 | prefix: \"{}\"", |
| 1215 | prefix |
| 1216 | ) |
| 1217 | })?; |
| 1218 | } |
| 1219 | |
| 1220 | Ok(()) |
| 1221 | } |
| 1222 | |
Janis Danisevskis | 0689107 | 2021-02-11 10:28:17 -0800 | [diff] [blame] | 1223 | fn remove_user_dir_if_empty(&self, user_id: u32) -> Result<()> { |
Shaquille Johnson | 9da2e1c | 2022-09-19 12:39:01 +0000 | [diff] [blame] | 1224 | if self.is_empty_user(user_id).context(ks_err!("Trying to check for empty user dir."))? { |
Janis Danisevskis | 0689107 | 2021-02-11 10:28:17 -0800 | [diff] [blame] | 1225 | let user_path = self.make_user_path_name(user_id); |
| 1226 | Self::with_retry_interrupted(|| fs::remove_dir(user_path.as_path())).ok(); |
| 1227 | } |
| 1228 | Ok(()) |
| 1229 | } |
| 1230 | |
Hasini Gunasinghe | 3ed5da7 | 2021-02-04 15:18:54 +0000 | [diff] [blame] | 1231 | /// Load a legacy key blob entry by uid and alias. |
| 1232 | pub fn load_by_uid_alias( |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 1233 | &self, |
| 1234 | uid: u32, |
| 1235 | alias: &str, |
Janis Danisevskis | f84d0b0 | 2022-01-26 14:11:14 -0800 | [diff] [blame] | 1236 | super_key: &Option<Arc<dyn AesGcm>>, |
| 1237 | ) -> Result<(Option<(Blob, LegacyKeyCharacteristics)>, Option<Vec<u8>>, Option<Vec<u8>>)> { |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 1238 | let km_blob = self.read_km_blob_file(uid, alias).context("In load_by_uid_alias.")?; |
| 1239 | |
| 1240 | let km_blob = match km_blob { |
| 1241 | Some((km_blob, prefix)) => { |
Shaquille Johnson | 9da2e1c | 2022-09-19 12:39:01 +0000 | [diff] [blame] | 1242 | let km_blob = match km_blob { |
| 1243 | Blob { flags: _, value: BlobValue::Decrypted(_) } |
| 1244 | | Blob { flags: _, value: BlobValue::Encrypted { .. } } => km_blob, |
| 1245 | _ => { |
| 1246 | return Err(KsError::Rc(ResponseCode::VALUE_CORRUPTED)) |
| 1247 | .context(ks_err!("Found wrong blob type in legacy key blob file.")) |
| 1248 | } |
| 1249 | }; |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 1250 | |
| 1251 | let hw_sec_level = match km_blob.is_strongbox() { |
| 1252 | true => SecurityLevel::STRONGBOX, |
| 1253 | false => SecurityLevel::TRUSTED_ENVIRONMENT, |
| 1254 | }; |
| 1255 | let key_parameters = self |
Janis Danisevskis | f84d0b0 | 2022-01-26 14:11:14 -0800 | [diff] [blame] | 1256 | .read_characteristics_file(uid, &prefix, alias, hw_sec_level, super_key) |
Shaquille Johnson | 9da2e1c | 2022-09-19 12:39:01 +0000 | [diff] [blame] | 1257 | .context(ks_err!())?; |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 1258 | Some((km_blob, key_parameters)) |
| 1259 | } |
| 1260 | None => None, |
| 1261 | }; |
| 1262 | |
Janis Danisevskis | f84d0b0 | 2022-01-26 14:11:14 -0800 | [diff] [blame] | 1263 | let user_cert_blob = |
| 1264 | Self::read_generic_blob(&self.make_blob_filename(uid, alias, "USRCERT")) |
Shaquille Johnson | 9da2e1c | 2022-09-19 12:39:01 +0000 | [diff] [blame] | 1265 | .context(ks_err!("While loading user cert."))?; |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 1266 | |
Janis Danisevskis | f84d0b0 | 2022-01-26 14:11:14 -0800 | [diff] [blame] | 1267 | let user_cert = if let Some(blob) = user_cert_blob { |
| 1268 | let blob = Self::decrypt_if_required(super_key, blob) |
Shaquille Johnson | 9da2e1c | 2022-09-19 12:39:01 +0000 | [diff] [blame] | 1269 | .context(ks_err!("While decrypting user cert."))?; |
Janis Danisevskis | f84d0b0 | 2022-01-26 14:11:14 -0800 | [diff] [blame] | 1270 | |
| 1271 | if let Blob { value: BlobValue::Generic(data), .. } = blob { |
| 1272 | Some(data) |
| 1273 | } else { |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 1274 | return Err(KsError::Rc(ResponseCode::VALUE_CORRUPTED)) |
Shaquille Johnson | 9da2e1c | 2022-09-19 12:39:01 +0000 | [diff] [blame] | 1275 | .context(ks_err!("Found unexpected blob type in USRCERT file")); |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 1276 | } |
Janis Danisevskis | f84d0b0 | 2022-01-26 14:11:14 -0800 | [diff] [blame] | 1277 | } else { |
| 1278 | None |
| 1279 | }; |
| 1280 | |
| 1281 | let ca_cert_blob = Self::read_generic_blob(&self.make_blob_filename(uid, alias, "CACERT")) |
Shaquille Johnson | 9da2e1c | 2022-09-19 12:39:01 +0000 | [diff] [blame] | 1282 | .context(ks_err!("While loading ca cert."))?; |
Janis Danisevskis | f84d0b0 | 2022-01-26 14:11:14 -0800 | [diff] [blame] | 1283 | |
| 1284 | let ca_cert = if let Some(blob) = ca_cert_blob { |
| 1285 | let blob = Self::decrypt_if_required(super_key, blob) |
Shaquille Johnson | 9da2e1c | 2022-09-19 12:39:01 +0000 | [diff] [blame] | 1286 | .context(ks_err!("While decrypting ca cert."))?; |
Janis Danisevskis | f84d0b0 | 2022-01-26 14:11:14 -0800 | [diff] [blame] | 1287 | |
| 1288 | if let Blob { value: BlobValue::Generic(data), .. } = blob { |
| 1289 | Some(data) |
| 1290 | } else { |
| 1291 | return Err(KsError::Rc(ResponseCode::VALUE_CORRUPTED)) |
Shaquille Johnson | 9da2e1c | 2022-09-19 12:39:01 +0000 | [diff] [blame] | 1292 | .context(ks_err!("Found unexpected blob type in CACERT file")); |
Janis Danisevskis | f84d0b0 | 2022-01-26 14:11:14 -0800 | [diff] [blame] | 1293 | } |
| 1294 | } else { |
| 1295 | None |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 1296 | }; |
| 1297 | |
Hasini Gunasinghe | 3ed5da7 | 2021-02-04 15:18:54 +0000 | [diff] [blame] | 1298 | Ok((km_blob, user_cert, ca_cert)) |
| 1299 | } |
| 1300 | |
| 1301 | /// Returns true if the given user has a super key. |
| 1302 | pub fn has_super_key(&self, user_id: u32) -> bool { |
| 1303 | self.make_super_key_filename(user_id).is_file() |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 1304 | } |
| 1305 | |
| 1306 | /// Load and decrypt legacy super key blob. |
Paul Crowley | f61fee7 | 2021-03-17 14:38:44 -0700 | [diff] [blame] | 1307 | pub fn load_super_key(&self, user_id: u32, pw: &Password) -> Result<Option<ZVec>> { |
Hasini Gunasinghe | 3ed5da7 | 2021-02-04 15:18:54 +0000 | [diff] [blame] | 1308 | let path = self.make_super_key_filename(user_id); |
Shaquille Johnson | 9da2e1c | 2022-09-19 12:39:01 +0000 | [diff] [blame] | 1309 | let blob = Self::read_generic_blob(&path).context(ks_err!("While loading super key."))?; |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 1310 | |
| 1311 | let blob = match blob { |
| 1312 | Some(blob) => match blob { |
Janis Danisevskis | 87dbe00 | 2021-03-24 14:06:58 -0700 | [diff] [blame] | 1313 | Blob { flags, value: BlobValue::PwEncrypted { iv, tag, data, salt, key_size } } => { |
| 1314 | if (flags & flags::ENCRYPTED) != 0 { |
| 1315 | let key = pw |
Eric Biggers | d68e691 | 2024-01-17 03:54:11 +0000 | [diff] [blame^] | 1316 | .derive_key_pbkdf2(&salt, key_size) |
Shaquille Johnson | 9da2e1c | 2022-09-19 12:39:01 +0000 | [diff] [blame] | 1317 | .context(ks_err!("Failed to derive key from password."))?; |
| 1318 | let blob = aes_gcm_decrypt(&data, &iv, &tag, &key) |
| 1319 | .context(ks_err!("while trying to decrypt legacy super key blob."))?; |
Janis Danisevskis | 87dbe00 | 2021-03-24 14:06:58 -0700 | [diff] [blame] | 1320 | Some(blob) |
| 1321 | } else { |
| 1322 | // In 2019 we had some unencrypted super keys due to b/141955555. |
Shaquille Johnson | 9da2e1c | 2022-09-19 12:39:01 +0000 | [diff] [blame] | 1323 | Some(data.try_into().context(ks_err!("Trying to convert key into ZVec"))?) |
Janis Danisevskis | 87dbe00 | 2021-03-24 14:06:58 -0700 | [diff] [blame] | 1324 | } |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 1325 | } |
| 1326 | _ => { |
Shaquille Johnson | 9da2e1c | 2022-09-19 12:39:01 +0000 | [diff] [blame] | 1327 | return Err(KsError::Rc(ResponseCode::VALUE_CORRUPTED)) |
| 1328 | .context(ks_err!("Found wrong blob type in legacy super key blob file.")); |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 1329 | } |
| 1330 | }, |
| 1331 | None => None, |
| 1332 | }; |
| 1333 | |
| 1334 | Ok(blob) |
| 1335 | } |
Hasini Gunasinghe | 3ed5da7 | 2021-02-04 15:18:54 +0000 | [diff] [blame] | 1336 | |
| 1337 | /// Removes the super key for the given user from the legacy database. |
| 1338 | /// If this was the last entry in the user's database, this function removes |
| 1339 | /// the user_<uid> directory as well. |
| 1340 | pub fn remove_super_key(&self, user_id: u32) { |
| 1341 | let path = self.make_super_key_filename(user_id); |
| 1342 | Self::with_retry_interrupted(|| fs::remove_file(path.as_path())).ok(); |
| 1343 | if self.is_empty_user(user_id).ok().unwrap_or(false) { |
| 1344 | let path = self.make_user_path_name(user_id); |
| 1345 | Self::with_retry_interrupted(|| fs::remove_dir(path.as_path())).ok(); |
| 1346 | } |
| 1347 | } |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 1348 | } |
| 1349 | |
Rajesh Nyamagoud | 69a8505 | 2022-02-17 16:47:55 +0000 | [diff] [blame] | 1350 | /// This module implements utility apis for creating legacy blob files. |
| 1351 | #[cfg(feature = "keystore2_blob_test_utils")] |
| 1352 | pub mod test_utils { |
Janis Danisevskis | f84d0b0 | 2022-01-26 14:11:14 -0800 | [diff] [blame] | 1353 | #![allow(dead_code)] |
Rajesh Nyamagoud | 69a8505 | 2022-02-17 16:47:55 +0000 | [diff] [blame] | 1354 | |
| 1355 | /// test vectors for legacy key blobs |
| 1356 | pub mod legacy_blob_test_vectors; |
| 1357 | |
Janis Danisevskis | f84d0b0 | 2022-01-26 14:11:14 -0800 | [diff] [blame] | 1358 | use crate::legacy_blob::blob_types::{ |
| 1359 | GENERIC, KEY_CHARACTERISTICS, KEY_CHARACTERISTICS_CACHE, KM_BLOB, SUPER_KEY, |
| 1360 | SUPER_KEY_AES256, |
| 1361 | }; |
Rajesh Nyamagoud | 69a8505 | 2022-02-17 16:47:55 +0000 | [diff] [blame] | 1362 | use crate::legacy_blob::*; |
Janis Danisevskis | f84d0b0 | 2022-01-26 14:11:14 -0800 | [diff] [blame] | 1363 | use anyhow::{anyhow, Result}; |
Rajesh Nyamagoud | 69a8505 | 2022-02-17 16:47:55 +0000 | [diff] [blame] | 1364 | use keystore2_crypto::{aes_gcm_decrypt, aes_gcm_encrypt}; |
Janis Danisevskis | f84d0b0 | 2022-01-26 14:11:14 -0800 | [diff] [blame] | 1365 | use std::convert::TryInto; |
| 1366 | use std::fs::OpenOptions; |
| 1367 | use std::io::Write; |
Janis Danisevskis | f84d0b0 | 2022-01-26 14:11:14 -0800 | [diff] [blame] | 1368 | |
| 1369 | /// This function takes a blob and synchronizes the encrypted/super encrypted flags |
| 1370 | /// with the blob type for the pairs Generic/EncryptedGeneric, |
| 1371 | /// Characteristics/EncryptedCharacteristics and Encrypted/Decrypted. |
| 1372 | /// E.g. if a non encrypted enum variant is encountered with flags::SUPER_ENCRYPTED |
| 1373 | /// or flags::ENCRYPTED is set, the payload is encrypted and the corresponding |
| 1374 | /// encrypted variant is returned, and vice versa. All other variants remain untouched |
| 1375 | /// even if flags and BlobValue variant are inconsistent. |
Rajesh Nyamagoud | 69a8505 | 2022-02-17 16:47:55 +0000 | [diff] [blame] | 1376 | pub fn prepare_blob(blob: Blob, key: &[u8]) -> Result<Blob> { |
Janis Danisevskis | f84d0b0 | 2022-01-26 14:11:14 -0800 | [diff] [blame] | 1377 | match blob { |
| 1378 | Blob { value: BlobValue::Generic(data), flags } if blob.is_encrypted() => { |
| 1379 | let (ciphertext, iv, tag) = aes_gcm_encrypt(&data, key).unwrap(); |
| 1380 | Ok(Blob { value: BlobValue::EncryptedGeneric { data: ciphertext, iv, tag }, flags }) |
| 1381 | } |
| 1382 | Blob { value: BlobValue::Characteristics(data), flags } if blob.is_encrypted() => { |
| 1383 | let (ciphertext, iv, tag) = aes_gcm_encrypt(&data, key).unwrap(); |
| 1384 | Ok(Blob { |
| 1385 | value: BlobValue::EncryptedCharacteristics { data: ciphertext, iv, tag }, |
| 1386 | flags, |
| 1387 | }) |
| 1388 | } |
| 1389 | Blob { value: BlobValue::Decrypted(data), flags } if blob.is_encrypted() => { |
| 1390 | let (ciphertext, iv, tag) = aes_gcm_encrypt(&data, key).unwrap(); |
| 1391 | Ok(Blob { value: BlobValue::Encrypted { data: ciphertext, iv, tag }, flags }) |
| 1392 | } |
| 1393 | Blob { value: BlobValue::EncryptedGeneric { data, iv, tag }, flags } |
| 1394 | if !blob.is_encrypted() => |
| 1395 | { |
| 1396 | let plaintext = aes_gcm_decrypt(&data, &iv, &tag, key).unwrap(); |
| 1397 | Ok(Blob { value: BlobValue::Generic(plaintext[..].to_vec()), flags }) |
| 1398 | } |
| 1399 | Blob { value: BlobValue::EncryptedCharacteristics { data, iv, tag }, flags } |
| 1400 | if !blob.is_encrypted() => |
| 1401 | { |
| 1402 | let plaintext = aes_gcm_decrypt(&data, &iv, &tag, key).unwrap(); |
| 1403 | Ok(Blob { value: BlobValue::Characteristics(plaintext[..].to_vec()), flags }) |
| 1404 | } |
| 1405 | Blob { value: BlobValue::Encrypted { data, iv, tag }, flags } |
| 1406 | if !blob.is_encrypted() => |
| 1407 | { |
| 1408 | let plaintext = aes_gcm_decrypt(&data, &iv, &tag, key).unwrap(); |
| 1409 | Ok(Blob { value: BlobValue::Decrypted(plaintext), flags }) |
| 1410 | } |
| 1411 | _ => Ok(blob), |
| 1412 | } |
| 1413 | } |
| 1414 | |
Rajesh Nyamagoud | 69a8505 | 2022-02-17 16:47:55 +0000 | [diff] [blame] | 1415 | /// Legacy blob header structure. |
| 1416 | pub struct LegacyBlobHeader { |
Janis Danisevskis | f84d0b0 | 2022-01-26 14:11:14 -0800 | [diff] [blame] | 1417 | version: u8, |
| 1418 | blob_type: u8, |
| 1419 | flags: u8, |
| 1420 | info: u8, |
| 1421 | iv: [u8; 12], |
| 1422 | tag: [u8; 16], |
| 1423 | blob_size: u32, |
| 1424 | } |
| 1425 | |
| 1426 | /// This function takes a Blob and writes it to out as a legacy blob file |
| 1427 | /// version 3. Note that the flags field and the values field may be |
| 1428 | /// inconsistent and could be sanitized by this function. It is intentionally |
| 1429 | /// not done to enable tests to construct malformed blobs. |
Rajesh Nyamagoud | 69a8505 | 2022-02-17 16:47:55 +0000 | [diff] [blame] | 1430 | pub fn write_legacy_blob(out: &mut dyn Write, blob: Blob) -> Result<usize> { |
Janis Danisevskis | f84d0b0 | 2022-01-26 14:11:14 -0800 | [diff] [blame] | 1431 | let (header, data, salt) = match blob { |
| 1432 | Blob { value: BlobValue::Generic(data), flags } => ( |
| 1433 | LegacyBlobHeader { |
| 1434 | version: 3, |
| 1435 | blob_type: GENERIC, |
| 1436 | flags, |
| 1437 | info: 0, |
| 1438 | iv: [0u8; 12], |
| 1439 | tag: [0u8; 16], |
| 1440 | blob_size: data.len() as u32, |
| 1441 | }, |
| 1442 | data, |
| 1443 | None, |
| 1444 | ), |
| 1445 | Blob { value: BlobValue::Characteristics(data), flags } => ( |
| 1446 | LegacyBlobHeader { |
| 1447 | version: 3, |
| 1448 | blob_type: KEY_CHARACTERISTICS, |
| 1449 | flags, |
| 1450 | info: 0, |
| 1451 | iv: [0u8; 12], |
| 1452 | tag: [0u8; 16], |
| 1453 | blob_size: data.len() as u32, |
| 1454 | }, |
| 1455 | data, |
| 1456 | None, |
| 1457 | ), |
| 1458 | Blob { value: BlobValue::CharacteristicsCache(data), flags } => ( |
| 1459 | LegacyBlobHeader { |
| 1460 | version: 3, |
| 1461 | blob_type: KEY_CHARACTERISTICS_CACHE, |
| 1462 | flags, |
| 1463 | info: 0, |
| 1464 | iv: [0u8; 12], |
| 1465 | tag: [0u8; 16], |
| 1466 | blob_size: data.len() as u32, |
| 1467 | }, |
| 1468 | data, |
| 1469 | None, |
| 1470 | ), |
| 1471 | Blob { value: BlobValue::PwEncrypted { iv, tag, data, salt, key_size }, flags } => ( |
| 1472 | LegacyBlobHeader { |
| 1473 | version: 3, |
| 1474 | blob_type: if key_size == keystore2_crypto::AES_128_KEY_LENGTH { |
| 1475 | SUPER_KEY |
| 1476 | } else { |
| 1477 | SUPER_KEY_AES256 |
| 1478 | }, |
| 1479 | flags, |
| 1480 | info: 0, |
| 1481 | iv: iv.try_into().unwrap(), |
| 1482 | tag: tag[..].try_into().unwrap(), |
| 1483 | blob_size: data.len() as u32, |
| 1484 | }, |
| 1485 | data, |
| 1486 | Some(salt), |
| 1487 | ), |
| 1488 | Blob { value: BlobValue::Encrypted { iv, tag, data }, flags } => ( |
| 1489 | LegacyBlobHeader { |
| 1490 | version: 3, |
| 1491 | blob_type: KM_BLOB, |
| 1492 | flags, |
| 1493 | info: 0, |
| 1494 | iv: iv.try_into().unwrap(), |
| 1495 | tag: tag[..].try_into().unwrap(), |
| 1496 | blob_size: data.len() as u32, |
| 1497 | }, |
| 1498 | data, |
| 1499 | None, |
| 1500 | ), |
| 1501 | Blob { value: BlobValue::EncryptedGeneric { iv, tag, data }, flags } => ( |
| 1502 | LegacyBlobHeader { |
| 1503 | version: 3, |
| 1504 | blob_type: GENERIC, |
| 1505 | flags, |
| 1506 | info: 0, |
| 1507 | iv: iv.try_into().unwrap(), |
| 1508 | tag: tag[..].try_into().unwrap(), |
| 1509 | blob_size: data.len() as u32, |
| 1510 | }, |
| 1511 | data, |
| 1512 | None, |
| 1513 | ), |
| 1514 | Blob { value: BlobValue::EncryptedCharacteristics { iv, tag, data }, flags } => ( |
| 1515 | LegacyBlobHeader { |
| 1516 | version: 3, |
| 1517 | blob_type: KEY_CHARACTERISTICS, |
| 1518 | flags, |
| 1519 | info: 0, |
| 1520 | iv: iv.try_into().unwrap(), |
| 1521 | tag: tag[..].try_into().unwrap(), |
| 1522 | blob_size: data.len() as u32, |
| 1523 | }, |
| 1524 | data, |
| 1525 | None, |
| 1526 | ), |
| 1527 | Blob { value: BlobValue::Decrypted(data), flags } => ( |
| 1528 | LegacyBlobHeader { |
| 1529 | version: 3, |
| 1530 | blob_type: KM_BLOB, |
| 1531 | flags, |
| 1532 | info: 0, |
| 1533 | iv: [0u8; 12], |
| 1534 | tag: [0u8; 16], |
| 1535 | blob_size: data.len() as u32, |
| 1536 | }, |
| 1537 | data[..].to_vec(), |
| 1538 | None, |
| 1539 | ), |
| 1540 | }; |
| 1541 | write_legacy_blob_helper(out, &header, &data, salt.as_deref()) |
| 1542 | } |
| 1543 | |
Rajesh Nyamagoud | 69a8505 | 2022-02-17 16:47:55 +0000 | [diff] [blame] | 1544 | /// This function takes LegacyBlobHeader, blob payload and writes it to out as a legacy blob file |
| 1545 | /// version 3. |
| 1546 | pub fn write_legacy_blob_helper( |
Janis Danisevskis | f84d0b0 | 2022-01-26 14:11:14 -0800 | [diff] [blame] | 1547 | out: &mut dyn Write, |
| 1548 | header: &LegacyBlobHeader, |
| 1549 | data: &[u8], |
| 1550 | info: Option<&[u8]>, |
| 1551 | ) -> Result<usize> { |
| 1552 | if 1 != out.write(&[header.version])? { |
| 1553 | return Err(anyhow!("Unexpected size while writing version.")); |
| 1554 | } |
| 1555 | if 1 != out.write(&[header.blob_type])? { |
| 1556 | return Err(anyhow!("Unexpected size while writing blob_type.")); |
| 1557 | } |
| 1558 | if 1 != out.write(&[header.flags])? { |
| 1559 | return Err(anyhow!("Unexpected size while writing flags.")); |
| 1560 | } |
| 1561 | if 1 != out.write(&[header.info])? { |
| 1562 | return Err(anyhow!("Unexpected size while writing info.")); |
| 1563 | } |
| 1564 | if 12 != out.write(&header.iv)? { |
| 1565 | return Err(anyhow!("Unexpected size while writing iv.")); |
| 1566 | } |
| 1567 | if 4 != out.write(&[0u8; 4])? { |
| 1568 | return Err(anyhow!("Unexpected size while writing last 4 bytes of iv.")); |
| 1569 | } |
| 1570 | if 16 != out.write(&header.tag)? { |
| 1571 | return Err(anyhow!("Unexpected size while writing tag.")); |
| 1572 | } |
| 1573 | if 4 != out.write(&header.blob_size.to_be_bytes())? { |
| 1574 | return Err(anyhow!("Unexpected size while writing blob size.")); |
| 1575 | } |
| 1576 | if data.len() != out.write(data)? { |
| 1577 | return Err(anyhow!("Unexpected size while writing blob.")); |
| 1578 | } |
| 1579 | if let Some(info) = info { |
| 1580 | if info.len() != out.write(info)? { |
| 1581 | return Err(anyhow!("Unexpected size while writing inof.")); |
| 1582 | } |
| 1583 | } |
| 1584 | Ok(40 + data.len() + info.map(|v| v.len()).unwrap_or(0)) |
| 1585 | } |
| 1586 | |
Rajesh Nyamagoud | 69a8505 | 2022-02-17 16:47:55 +0000 | [diff] [blame] | 1587 | /// Create encrypted characteristics file using given key. |
| 1588 | pub fn make_encrypted_characteristics_file<P: AsRef<Path>>( |
| 1589 | path: P, |
| 1590 | key: &[u8], |
| 1591 | data: &[u8], |
| 1592 | ) -> Result<()> { |
| 1593 | let mut file = OpenOptions::new().write(true).create_new(true).open(path).unwrap(); |
| 1594 | let blob = |
| 1595 | Blob { value: BlobValue::Characteristics(data.to_vec()), flags: flags::ENCRYPTED }; |
| 1596 | let blob = prepare_blob(blob, key).unwrap(); |
| 1597 | write_legacy_blob(&mut file, blob).unwrap(); |
| 1598 | Ok(()) |
| 1599 | } |
| 1600 | |
| 1601 | /// Create encrypted user certificate file using given key. |
| 1602 | pub fn make_encrypted_usr_cert_file<P: AsRef<Path>>( |
| 1603 | path: P, |
| 1604 | key: &[u8], |
| 1605 | data: &[u8], |
| 1606 | ) -> Result<()> { |
| 1607 | let mut file = OpenOptions::new().write(true).create_new(true).open(path).unwrap(); |
| 1608 | let blob = Blob { value: BlobValue::Generic(data.to_vec()), flags: flags::ENCRYPTED }; |
| 1609 | let blob = prepare_blob(blob, key).unwrap(); |
| 1610 | write_legacy_blob(&mut file, blob).unwrap(); |
| 1611 | Ok(()) |
| 1612 | } |
| 1613 | |
| 1614 | /// Create encrypted CA certificate file using given key. |
| 1615 | pub fn make_encrypted_ca_cert_file<P: AsRef<Path>>( |
| 1616 | path: P, |
| 1617 | key: &[u8], |
| 1618 | data: &[u8], |
| 1619 | ) -> Result<()> { |
| 1620 | let mut file = OpenOptions::new().write(true).create_new(true).open(path).unwrap(); |
| 1621 | let blob = Blob { value: BlobValue::Generic(data.to_vec()), flags: flags::ENCRYPTED }; |
| 1622 | let blob = prepare_blob(blob, key).unwrap(); |
| 1623 | write_legacy_blob(&mut file, blob).unwrap(); |
| 1624 | Ok(()) |
| 1625 | } |
| 1626 | |
| 1627 | /// Create encrypted user key file using given key. |
| 1628 | pub fn make_encrypted_key_file<P: AsRef<Path>>(path: P, key: &[u8], data: &[u8]) -> Result<()> { |
Janis Danisevskis | f84d0b0 | 2022-01-26 14:11:14 -0800 | [diff] [blame] | 1629 | let mut file = OpenOptions::new().write(true).create_new(true).open(path).unwrap(); |
| 1630 | let blob = Blob { |
Rajesh Nyamagoud | 69a8505 | 2022-02-17 16:47:55 +0000 | [diff] [blame] | 1631 | value: BlobValue::Decrypted(ZVec::try_from(data).unwrap()), |
Janis Danisevskis | f84d0b0 | 2022-01-26 14:11:14 -0800 | [diff] [blame] | 1632 | flags: flags::ENCRYPTED, |
| 1633 | }; |
| 1634 | let blob = prepare_blob(blob, key).unwrap(); |
| 1635 | write_legacy_blob(&mut file, blob).unwrap(); |
| 1636 | Ok(()) |
| 1637 | } |
| 1638 | |
Rajesh Nyamagoud | 69a8505 | 2022-02-17 16:47:55 +0000 | [diff] [blame] | 1639 | /// Create user or ca cert blob file. |
| 1640 | pub fn make_cert_blob_file<P: AsRef<Path>>(path: P, data: &[u8]) -> Result<()> { |
Janis Danisevskis | f84d0b0 | 2022-01-26 14:11:14 -0800 | [diff] [blame] | 1641 | let mut file = OpenOptions::new().write(true).create_new(true).open(path).unwrap(); |
Rajesh Nyamagoud | 69a8505 | 2022-02-17 16:47:55 +0000 | [diff] [blame] | 1642 | let blob = Blob { value: BlobValue::Generic(data.to_vec()), flags: 0 }; |
| 1643 | let blob = prepare_blob(blob, &[]).unwrap(); |
Janis Danisevskis | f84d0b0 | 2022-01-26 14:11:14 -0800 | [diff] [blame] | 1644 | write_legacy_blob(&mut file, blob).unwrap(); |
| 1645 | Ok(()) |
| 1646 | } |
Rajesh Nyamagoud | 69a8505 | 2022-02-17 16:47:55 +0000 | [diff] [blame] | 1647 | } |
Janis Danisevskis | f84d0b0 | 2022-01-26 14:11:14 -0800 | [diff] [blame] | 1648 | |
Rajesh Nyamagoud | 69a8505 | 2022-02-17 16:47:55 +0000 | [diff] [blame] | 1649 | #[cfg(test)] |
| 1650 | mod test { |
| 1651 | #![allow(dead_code)] |
| 1652 | use super::*; |
| 1653 | use crate::legacy_blob::test_utils::legacy_blob_test_vectors::*; |
| 1654 | use crate::legacy_blob::test_utils::*; |
| 1655 | use anyhow::{anyhow, Result}; |
| 1656 | use keystore2_crypto::aes_gcm_decrypt; |
| 1657 | use keystore2_test_utils::TempDir; |
| 1658 | use rand::Rng; |
| 1659 | use std::convert::TryInto; |
| 1660 | use std::ops::Deref; |
| 1661 | use std::string::FromUtf8Error; |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 1662 | |
| 1663 | #[test] |
| 1664 | fn decode_encode_alias_test() { |
| 1665 | static ALIAS: &str = "#({}test[])😗"; |
| 1666 | static ENCODED_ALIAS: &str = "+S+X{}test[]+Y.`-O-H-G"; |
| 1667 | // Second multi byte out of range ------v |
| 1668 | static ENCODED_ALIAS_ERROR1: &str = "+S+{}test[]+Y"; |
| 1669 | // Incomplete multi byte ------------------------v |
| 1670 | static ENCODED_ALIAS_ERROR2: &str = "+S+X{}test[]+"; |
| 1671 | // Our encoding: ".`-O-H-G" |
| 1672 | // is UTF-8: 0xF0 0x9F 0x98 0x97 |
| 1673 | // is UNICODE: U+1F617 |
| 1674 | // is 😗 |
| 1675 | // But +H below is a valid encoding for 0x18 making this sequence invalid UTF-8. |
| 1676 | static ENCODED_ALIAS_ERROR_UTF8: &str = ".`-O+H-G"; |
| 1677 | |
| 1678 | assert_eq!(ENCODED_ALIAS, &LegacyBlobLoader::encode_alias(ALIAS)); |
| 1679 | assert_eq!(ALIAS, &LegacyBlobLoader::decode_alias(ENCODED_ALIAS).unwrap()); |
| 1680 | assert_eq!( |
| 1681 | Some(&Error::BadEncoding), |
| 1682 | LegacyBlobLoader::decode_alias(ENCODED_ALIAS_ERROR1) |
| 1683 | .unwrap_err() |
| 1684 | .root_cause() |
| 1685 | .downcast_ref::<Error>() |
| 1686 | ); |
| 1687 | assert_eq!( |
| 1688 | Some(&Error::BadEncoding), |
| 1689 | LegacyBlobLoader::decode_alias(ENCODED_ALIAS_ERROR2) |
| 1690 | .unwrap_err() |
| 1691 | .root_cause() |
| 1692 | .downcast_ref::<Error>() |
| 1693 | ); |
| 1694 | assert!(LegacyBlobLoader::decode_alias(ENCODED_ALIAS_ERROR_UTF8) |
| 1695 | .unwrap_err() |
| 1696 | .root_cause() |
| 1697 | .downcast_ref::<FromUtf8Error>() |
| 1698 | .is_some()); |
| 1699 | |
| 1700 | for _i in 0..100 { |
| 1701 | // Any valid UTF-8 string should be en- and decoded without loss. |
| 1702 | let alias_str = rand::thread_rng().gen::<[char; 20]>().iter().collect::<String>(); |
| 1703 | let random_alias = alias_str.as_bytes(); |
| 1704 | let encoded = LegacyBlobLoader::encode_alias(&alias_str); |
| 1705 | let decoded = match LegacyBlobLoader::decode_alias(&encoded) { |
| 1706 | Ok(d) => d, |
Jeff Vander Stoep | 46bbc61 | 2021-04-09 08:55:21 +0200 | [diff] [blame] | 1707 | Err(_) => panic!("random_alias: {:x?}\nencoded {}", random_alias, encoded), |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 1708 | }; |
| 1709 | assert_eq!(random_alias.to_vec(), decoded.bytes().collect::<Vec<u8>>()); |
| 1710 | } |
| 1711 | } |
| 1712 | |
| 1713 | #[test] |
| 1714 | fn read_golden_key_blob_test() -> anyhow::Result<()> { |
| 1715 | let blob = LegacyBlobLoader::new_from_stream_decrypt_with(&mut &*BLOB, |_, _, _, _, _| { |
| 1716 | Err(anyhow!("should not be called")) |
Janis Danisevskis | f84d0b0 | 2022-01-26 14:11:14 -0800 | [diff] [blame] | 1717 | }) |
| 1718 | .unwrap(); |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 1719 | assert!(!blob.is_encrypted()); |
| 1720 | assert!(!blob.is_fallback()); |
| 1721 | assert!(!blob.is_strongbox()); |
| 1722 | assert!(!blob.is_critical_to_device_encryption()); |
| 1723 | assert_eq!(blob.value(), &BlobValue::Generic([0xde, 0xed, 0xbe, 0xef].to_vec())); |
| 1724 | |
| 1725 | let blob = LegacyBlobLoader::new_from_stream_decrypt_with( |
| 1726 | &mut &*REAL_LEGACY_BLOB, |
| 1727 | |_, _, _, _, _| Err(anyhow!("should not be called")), |
Janis Danisevskis | f84d0b0 | 2022-01-26 14:11:14 -0800 | [diff] [blame] | 1728 | ) |
| 1729 | .unwrap(); |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 1730 | assert!(!blob.is_encrypted()); |
| 1731 | assert!(!blob.is_fallback()); |
| 1732 | assert!(!blob.is_strongbox()); |
| 1733 | assert!(!blob.is_critical_to_device_encryption()); |
| 1734 | assert_eq!( |
| 1735 | blob.value(), |
| 1736 | &BlobValue::Decrypted(REAL_LEGACY_BLOB_PAYLOAD.try_into().unwrap()) |
| 1737 | ); |
| 1738 | Ok(()) |
| 1739 | } |
| 1740 | |
| 1741 | #[test] |
| 1742 | fn read_aes_gcm_encrypted_key_blob_test() { |
| 1743 | let blob = LegacyBlobLoader::new_from_stream_decrypt_with( |
| 1744 | &mut &*AES_GCM_ENCRYPTED_BLOB, |
| 1745 | |d, iv, tag, salt, key_size| { |
| 1746 | assert_eq!(salt, None); |
| 1747 | assert_eq!(key_size, None); |
| 1748 | assert_eq!( |
| 1749 | iv, |
| 1750 | &[ |
| 1751 | 0xbd, 0xdb, 0x8d, 0x69, 0x72, 0x56, 0xf0, 0xf5, 0xa4, 0x02, 0x88, 0x7f, |
| 1752 | 0x00, 0x00, 0x00, 0x00, |
| 1753 | ] |
| 1754 | ); |
| 1755 | assert_eq!( |
| 1756 | tag, |
| 1757 | &[ |
| 1758 | 0x50, 0xd9, 0x97, 0x95, 0x37, 0x6e, 0x28, 0x6a, 0x28, 0x9d, 0x51, 0xb9, |
| 1759 | 0xb9, 0xe0, 0x0b, 0xc3 |
| 1760 | ][..] |
| 1761 | ); |
| 1762 | aes_gcm_decrypt(d, iv, tag, AES_KEY).context("Trying to decrypt blob.") |
| 1763 | }, |
| 1764 | ) |
| 1765 | .unwrap(); |
| 1766 | assert!(blob.is_encrypted()); |
| 1767 | assert!(!blob.is_fallback()); |
| 1768 | assert!(!blob.is_strongbox()); |
| 1769 | assert!(!blob.is_critical_to_device_encryption()); |
| 1770 | |
| 1771 | assert_eq!(blob.value(), &BlobValue::Decrypted(DECRYPTED_PAYLOAD.try_into().unwrap())); |
| 1772 | } |
| 1773 | |
| 1774 | #[test] |
| 1775 | fn read_golden_key_blob_too_short_test() { |
| 1776 | let error = |
| 1777 | LegacyBlobLoader::new_from_stream_decrypt_with(&mut &BLOB[0..15], |_, _, _, _, _| { |
| 1778 | Err(anyhow!("should not be called")) |
| 1779 | }) |
| 1780 | .unwrap_err(); |
| 1781 | assert_eq!(Some(&Error::BadLen), error.root_cause().downcast_ref::<Error>()); |
| 1782 | } |
| 1783 | |
| 1784 | #[test] |
Hasini Gunasinghe | 3ed5da7 | 2021-02-04 15:18:54 +0000 | [diff] [blame] | 1785 | fn test_is_empty() { |
| 1786 | let temp_dir = TempDir::new("test_is_empty").expect("Failed to create temp dir."); |
| 1787 | let legacy_blob_loader = LegacyBlobLoader::new(temp_dir.path()); |
| 1788 | |
| 1789 | assert!(legacy_blob_loader.is_empty().expect("Should succeed and be empty.")); |
| 1790 | |
| 1791 | let _db = crate::database::KeystoreDB::new(temp_dir.path(), None) |
| 1792 | .expect("Failed to open database."); |
| 1793 | |
| 1794 | assert!(legacy_blob_loader.is_empty().expect("Should succeed and still be empty.")); |
| 1795 | |
| 1796 | std::fs::create_dir(&*temp_dir.build().push("user_0")).expect("Failed to create user_0."); |
| 1797 | |
| 1798 | assert!(!legacy_blob_loader.is_empty().expect("Should succeed but not be empty.")); |
| 1799 | |
| 1800 | std::fs::create_dir(&*temp_dir.build().push("user_10")).expect("Failed to create user_10."); |
| 1801 | |
| 1802 | assert!(!legacy_blob_loader.is_empty().expect("Should succeed but still not be empty.")); |
| 1803 | |
| 1804 | std::fs::remove_dir_all(&*temp_dir.build().push("user_0")) |
| 1805 | .expect("Failed to remove user_0."); |
| 1806 | |
| 1807 | assert!(!legacy_blob_loader.is_empty().expect("Should succeed but still not be empty.")); |
| 1808 | |
| 1809 | std::fs::remove_dir_all(&*temp_dir.build().push("user_10")) |
| 1810 | .expect("Failed to remove user_10."); |
| 1811 | |
| 1812 | assert!(legacy_blob_loader.is_empty().expect("Should succeed and be empty again.")); |
| 1813 | } |
| 1814 | |
| 1815 | #[test] |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 1816 | fn test_legacy_blobs() -> anyhow::Result<()> { |
Janis Danisevskis | f84d0b0 | 2022-01-26 14:11:14 -0800 | [diff] [blame] | 1817 | let temp_dir = TempDir::new("legacy_blob_test").unwrap(); |
| 1818 | std::fs::create_dir(&*temp_dir.build().push("user_0")).unwrap(); |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 1819 | |
Janis Danisevskis | f84d0b0 | 2022-01-26 14:11:14 -0800 | [diff] [blame] | 1820 | std::fs::write(&*temp_dir.build().push("user_0").push(".masterkey"), SUPERKEY).unwrap(); |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 1821 | |
| 1822 | std::fs::write( |
| 1823 | &*temp_dir.build().push("user_0").push("10223_USRPKEY_authbound"), |
| 1824 | USRPKEY_AUTHBOUND, |
Janis Danisevskis | f84d0b0 | 2022-01-26 14:11:14 -0800 | [diff] [blame] | 1825 | ) |
| 1826 | .unwrap(); |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 1827 | std::fs::write( |
| 1828 | &*temp_dir.build().push("user_0").push(".10223_chr_USRPKEY_authbound"), |
| 1829 | USRPKEY_AUTHBOUND_CHR, |
Janis Danisevskis | f84d0b0 | 2022-01-26 14:11:14 -0800 | [diff] [blame] | 1830 | ) |
| 1831 | .unwrap(); |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 1832 | std::fs::write( |
| 1833 | &*temp_dir.build().push("user_0").push("10223_USRCERT_authbound"), |
| 1834 | USRCERT_AUTHBOUND, |
Janis Danisevskis | f84d0b0 | 2022-01-26 14:11:14 -0800 | [diff] [blame] | 1835 | ) |
| 1836 | .unwrap(); |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 1837 | std::fs::write( |
| 1838 | &*temp_dir.build().push("user_0").push("10223_CACERT_authbound"), |
| 1839 | CACERT_AUTHBOUND, |
Janis Danisevskis | f84d0b0 | 2022-01-26 14:11:14 -0800 | [diff] [blame] | 1840 | ) |
| 1841 | .unwrap(); |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 1842 | |
| 1843 | std::fs::write( |
| 1844 | &*temp_dir.build().push("user_0").push("10223_USRPKEY_non_authbound"), |
| 1845 | USRPKEY_NON_AUTHBOUND, |
Janis Danisevskis | f84d0b0 | 2022-01-26 14:11:14 -0800 | [diff] [blame] | 1846 | ) |
| 1847 | .unwrap(); |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 1848 | std::fs::write( |
| 1849 | &*temp_dir.build().push("user_0").push(".10223_chr_USRPKEY_non_authbound"), |
| 1850 | USRPKEY_NON_AUTHBOUND_CHR, |
Janis Danisevskis | f84d0b0 | 2022-01-26 14:11:14 -0800 | [diff] [blame] | 1851 | ) |
| 1852 | .unwrap(); |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 1853 | std::fs::write( |
| 1854 | &*temp_dir.build().push("user_0").push("10223_USRCERT_non_authbound"), |
| 1855 | USRCERT_NON_AUTHBOUND, |
Janis Danisevskis | f84d0b0 | 2022-01-26 14:11:14 -0800 | [diff] [blame] | 1856 | ) |
| 1857 | .unwrap(); |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 1858 | std::fs::write( |
| 1859 | &*temp_dir.build().push("user_0").push("10223_CACERT_non_authbound"), |
| 1860 | CACERT_NON_AUTHBOUND, |
Janis Danisevskis | f84d0b0 | 2022-01-26 14:11:14 -0800 | [diff] [blame] | 1861 | ) |
| 1862 | .unwrap(); |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 1863 | |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 1864 | let legacy_blob_loader = LegacyBlobLoader::new(temp_dir.path()); |
| 1865 | |
Janis Danisevskis | f84d0b0 | 2022-01-26 14:11:14 -0800 | [diff] [blame] | 1866 | if let (Some((Blob { flags, value }, _params)), Some(cert), Some(chain)) = |
| 1867 | legacy_blob_loader.load_by_uid_alias(10223, "authbound", &None)? |
| 1868 | { |
| 1869 | assert_eq!(flags, 4); |
| 1870 | assert_eq!( |
| 1871 | value, |
| 1872 | BlobValue::Encrypted { |
| 1873 | data: USRPKEY_AUTHBOUND_ENC_PAYLOAD.to_vec(), |
| 1874 | iv: USRPKEY_AUTHBOUND_IV.to_vec(), |
| 1875 | tag: USRPKEY_AUTHBOUND_TAG.to_vec() |
| 1876 | } |
| 1877 | ); |
| 1878 | assert_eq!(&cert[..], LOADED_CERT_AUTHBOUND); |
| 1879 | assert_eq!(&chain[..], LOADED_CACERT_AUTHBOUND); |
| 1880 | } else { |
| 1881 | panic!(""); |
| 1882 | } |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 1883 | |
Hasini Gunasinghe | 3ed5da7 | 2021-02-04 15:18:54 +0000 | [diff] [blame] | 1884 | if let (Some((Blob { flags, value: _ }, _params)), Some(cert), Some(chain)) = |
Janis Danisevskis | f84d0b0 | 2022-01-26 14:11:14 -0800 | [diff] [blame] | 1885 | legacy_blob_loader.load_by_uid_alias(10223, "authbound", &None)? |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 1886 | { |
| 1887 | assert_eq!(flags, 4); |
Hasini Gunasinghe | 3ed5da7 | 2021-02-04 15:18:54 +0000 | [diff] [blame] | 1888 | //assert_eq!(value, BlobValue::Encrypted(..)); |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 1889 | assert_eq!(&cert[..], LOADED_CERT_AUTHBOUND); |
| 1890 | assert_eq!(&chain[..], LOADED_CACERT_AUTHBOUND); |
| 1891 | } else { |
| 1892 | panic!(""); |
| 1893 | } |
Hasini Gunasinghe | 3ed5da7 | 2021-02-04 15:18:54 +0000 | [diff] [blame] | 1894 | if let (Some((Blob { flags, value }, _params)), Some(cert), Some(chain)) = |
Janis Danisevskis | f84d0b0 | 2022-01-26 14:11:14 -0800 | [diff] [blame] | 1895 | legacy_blob_loader.load_by_uid_alias(10223, "non_authbound", &None)? |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 1896 | { |
| 1897 | assert_eq!(flags, 0); |
| 1898 | assert_eq!(value, BlobValue::Decrypted(LOADED_USRPKEY_NON_AUTHBOUND.try_into()?)); |
| 1899 | assert_eq!(&cert[..], LOADED_CERT_NON_AUTHBOUND); |
| 1900 | assert_eq!(&chain[..], LOADED_CACERT_NON_AUTHBOUND); |
| 1901 | } else { |
| 1902 | panic!(""); |
| 1903 | } |
| 1904 | |
Hasini Gunasinghe | 3ed5da7 | 2021-02-04 15:18:54 +0000 | [diff] [blame] | 1905 | legacy_blob_loader.remove_keystore_entry(10223, "authbound").expect("This should succeed."); |
| 1906 | legacy_blob_loader |
| 1907 | .remove_keystore_entry(10223, "non_authbound") |
| 1908 | .expect("This should succeed."); |
| 1909 | |
| 1910 | assert_eq!( |
| 1911 | (None, None, None), |
Janis Danisevskis | f84d0b0 | 2022-01-26 14:11:14 -0800 | [diff] [blame] | 1912 | legacy_blob_loader.load_by_uid_alias(10223, "authbound", &None)? |
Hasini Gunasinghe | 3ed5da7 | 2021-02-04 15:18:54 +0000 | [diff] [blame] | 1913 | ); |
| 1914 | assert_eq!( |
| 1915 | (None, None, None), |
Janis Danisevskis | f84d0b0 | 2022-01-26 14:11:14 -0800 | [diff] [blame] | 1916 | legacy_blob_loader.load_by_uid_alias(10223, "non_authbound", &None)? |
Hasini Gunasinghe | 3ed5da7 | 2021-02-04 15:18:54 +0000 | [diff] [blame] | 1917 | ); |
| 1918 | |
| 1919 | // The database should not be empty due to the super key. |
| 1920 | assert!(!legacy_blob_loader.is_empty()?); |
| 1921 | assert!(!legacy_blob_loader.is_empty_user(0)?); |
| 1922 | |
| 1923 | // The database should be considered empty for user 1. |
| 1924 | assert!(legacy_blob_loader.is_empty_user(1)?); |
| 1925 | |
| 1926 | legacy_blob_loader.remove_super_key(0); |
| 1927 | |
| 1928 | // Now it should be empty. |
| 1929 | assert!(legacy_blob_loader.is_empty_user(0)?); |
| 1930 | assert!(legacy_blob_loader.is_empty()?); |
| 1931 | |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 1932 | Ok(()) |
| 1933 | } |
Janis Danisevskis | 7df9dbf | 2021-04-12 16:04:42 -0700 | [diff] [blame] | 1934 | |
Janis Danisevskis | f84d0b0 | 2022-01-26 14:11:14 -0800 | [diff] [blame] | 1935 | struct TestKey(ZVec); |
| 1936 | |
| 1937 | impl crate::utils::AesGcmKey for TestKey { |
| 1938 | fn key(&self) -> &[u8] { |
| 1939 | &self.0 |
| 1940 | } |
| 1941 | } |
| 1942 | |
| 1943 | impl Deref for TestKey { |
| 1944 | type Target = [u8]; |
| 1945 | fn deref(&self) -> &Self::Target { |
| 1946 | &self.0 |
| 1947 | } |
| 1948 | } |
| 1949 | |
| 1950 | #[test] |
| 1951 | fn test_with_encrypted_characteristics() -> anyhow::Result<()> { |
| 1952 | let temp_dir = TempDir::new("test_with_encrypted_characteristics").unwrap(); |
| 1953 | std::fs::create_dir(&*temp_dir.build().push("user_0")).unwrap(); |
| 1954 | |
| 1955 | let pw: Password = PASSWORD.into(); |
Eric Biggers | d68e691 | 2024-01-17 03:54:11 +0000 | [diff] [blame^] | 1956 | let pw_key = TestKey(pw.derive_key_pbkdf2(SUPERKEY_SALT, 32).unwrap()); |
Janis Danisevskis | f84d0b0 | 2022-01-26 14:11:14 -0800 | [diff] [blame] | 1957 | let super_key = |
| 1958 | Arc::new(TestKey(pw_key.decrypt(SUPERKEY_PAYLOAD, SUPERKEY_IV, SUPERKEY_TAG).unwrap())); |
| 1959 | |
| 1960 | std::fs::write(&*temp_dir.build().push("user_0").push(".masterkey"), SUPERKEY).unwrap(); |
| 1961 | |
| 1962 | std::fs::write( |
| 1963 | &*temp_dir.build().push("user_0").push("10223_USRPKEY_authbound"), |
| 1964 | USRPKEY_AUTHBOUND, |
| 1965 | ) |
| 1966 | .unwrap(); |
| 1967 | make_encrypted_characteristics_file( |
| 1968 | &*temp_dir.build().push("user_0").push(".10223_chr_USRPKEY_authbound"), |
| 1969 | &super_key, |
Rajesh Nyamagoud | 69a8505 | 2022-02-17 16:47:55 +0000 | [diff] [blame] | 1970 | KEY_PARAMETERS, |
Janis Danisevskis | f84d0b0 | 2022-01-26 14:11:14 -0800 | [diff] [blame] | 1971 | ) |
| 1972 | .unwrap(); |
| 1973 | std::fs::write( |
| 1974 | &*temp_dir.build().push("user_0").push("10223_USRCERT_authbound"), |
| 1975 | USRCERT_AUTHBOUND, |
| 1976 | ) |
| 1977 | .unwrap(); |
| 1978 | std::fs::write( |
| 1979 | &*temp_dir.build().push("user_0").push("10223_CACERT_authbound"), |
| 1980 | CACERT_AUTHBOUND, |
| 1981 | ) |
| 1982 | .unwrap(); |
| 1983 | |
| 1984 | let legacy_blob_loader = LegacyBlobLoader::new(temp_dir.path()); |
| 1985 | |
| 1986 | assert_eq!( |
| 1987 | legacy_blob_loader |
| 1988 | .load_by_uid_alias(10223, "authbound", &None) |
| 1989 | .unwrap_err() |
| 1990 | .root_cause() |
| 1991 | .downcast_ref::<Error>(), |
| 1992 | Some(&Error::LockedComponent) |
| 1993 | ); |
| 1994 | |
| 1995 | assert_eq!( |
| 1996 | legacy_blob_loader.load_by_uid_alias(10223, "authbound", &Some(super_key)).unwrap(), |
| 1997 | ( |
| 1998 | Some(( |
| 1999 | Blob { |
| 2000 | flags: 4, |
| 2001 | value: BlobValue::Encrypted { |
| 2002 | data: USRPKEY_AUTHBOUND_ENC_PAYLOAD.to_vec(), |
| 2003 | iv: USRPKEY_AUTHBOUND_IV.to_vec(), |
| 2004 | tag: USRPKEY_AUTHBOUND_TAG.to_vec() |
| 2005 | } |
| 2006 | }, |
| 2007 | structured_test_params() |
| 2008 | )), |
| 2009 | Some(LOADED_CERT_AUTHBOUND.to_vec()), |
| 2010 | Some(LOADED_CACERT_AUTHBOUND.to_vec()) |
| 2011 | ) |
| 2012 | ); |
| 2013 | |
| 2014 | legacy_blob_loader.remove_keystore_entry(10223, "authbound").expect("This should succeed."); |
| 2015 | |
| 2016 | assert_eq!( |
| 2017 | (None, None, None), |
| 2018 | legacy_blob_loader.load_by_uid_alias(10223, "authbound", &None).unwrap() |
| 2019 | ); |
| 2020 | |
| 2021 | // The database should not be empty due to the super key. |
| 2022 | assert!(!legacy_blob_loader.is_empty().unwrap()); |
| 2023 | assert!(!legacy_blob_loader.is_empty_user(0).unwrap()); |
| 2024 | |
| 2025 | // The database should be considered empty for user 1. |
| 2026 | assert!(legacy_blob_loader.is_empty_user(1).unwrap()); |
| 2027 | |
| 2028 | legacy_blob_loader.remove_super_key(0); |
| 2029 | |
| 2030 | // Now it should be empty. |
| 2031 | assert!(legacy_blob_loader.is_empty_user(0).unwrap()); |
| 2032 | assert!(legacy_blob_loader.is_empty().unwrap()); |
| 2033 | |
| 2034 | Ok(()) |
| 2035 | } |
| 2036 | |
| 2037 | #[test] |
| 2038 | fn test_with_encrypted_certificates() -> anyhow::Result<()> { |
| 2039 | let temp_dir = TempDir::new("test_with_encrypted_certificates").unwrap(); |
| 2040 | std::fs::create_dir(&*temp_dir.build().push("user_0")).unwrap(); |
| 2041 | |
| 2042 | let pw: Password = PASSWORD.into(); |
Eric Biggers | d68e691 | 2024-01-17 03:54:11 +0000 | [diff] [blame^] | 2043 | let pw_key = TestKey(pw.derive_key_pbkdf2(SUPERKEY_SALT, 32).unwrap()); |
Janis Danisevskis | f84d0b0 | 2022-01-26 14:11:14 -0800 | [diff] [blame] | 2044 | let super_key = |
| 2045 | Arc::new(TestKey(pw_key.decrypt(SUPERKEY_PAYLOAD, SUPERKEY_IV, SUPERKEY_TAG).unwrap())); |
| 2046 | |
| 2047 | std::fs::write(&*temp_dir.build().push("user_0").push(".masterkey"), SUPERKEY).unwrap(); |
| 2048 | |
| 2049 | std::fs::write( |
| 2050 | &*temp_dir.build().push("user_0").push("10223_USRPKEY_authbound"), |
| 2051 | USRPKEY_AUTHBOUND, |
| 2052 | ) |
| 2053 | .unwrap(); |
| 2054 | std::fs::write( |
| 2055 | &*temp_dir.build().push("user_0").push(".10223_chr_USRPKEY_authbound"), |
| 2056 | USRPKEY_AUTHBOUND_CHR, |
| 2057 | ) |
| 2058 | .unwrap(); |
| 2059 | make_encrypted_usr_cert_file( |
| 2060 | &*temp_dir.build().push("user_0").push("10223_USRCERT_authbound"), |
| 2061 | &super_key, |
Rajesh Nyamagoud | 69a8505 | 2022-02-17 16:47:55 +0000 | [diff] [blame] | 2062 | LOADED_CERT_AUTHBOUND, |
Janis Danisevskis | f84d0b0 | 2022-01-26 14:11:14 -0800 | [diff] [blame] | 2063 | ) |
| 2064 | .unwrap(); |
| 2065 | make_encrypted_ca_cert_file( |
| 2066 | &*temp_dir.build().push("user_0").push("10223_CACERT_authbound"), |
| 2067 | &super_key, |
Rajesh Nyamagoud | 69a8505 | 2022-02-17 16:47:55 +0000 | [diff] [blame] | 2068 | LOADED_CACERT_AUTHBOUND, |
Janis Danisevskis | f84d0b0 | 2022-01-26 14:11:14 -0800 | [diff] [blame] | 2069 | ) |
| 2070 | .unwrap(); |
| 2071 | |
| 2072 | let legacy_blob_loader = LegacyBlobLoader::new(temp_dir.path()); |
| 2073 | |
| 2074 | assert_eq!( |
| 2075 | legacy_blob_loader |
| 2076 | .load_by_uid_alias(10223, "authbound", &None) |
| 2077 | .unwrap_err() |
| 2078 | .root_cause() |
| 2079 | .downcast_ref::<Error>(), |
| 2080 | Some(&Error::LockedComponent) |
| 2081 | ); |
| 2082 | |
| 2083 | assert_eq!( |
| 2084 | legacy_blob_loader.load_by_uid_alias(10223, "authbound", &Some(super_key)).unwrap(), |
| 2085 | ( |
| 2086 | Some(( |
| 2087 | Blob { |
| 2088 | flags: 4, |
| 2089 | value: BlobValue::Encrypted { |
| 2090 | data: USRPKEY_AUTHBOUND_ENC_PAYLOAD.to_vec(), |
| 2091 | iv: USRPKEY_AUTHBOUND_IV.to_vec(), |
| 2092 | tag: USRPKEY_AUTHBOUND_TAG.to_vec() |
| 2093 | } |
| 2094 | }, |
| 2095 | structured_test_params_cache() |
| 2096 | )), |
| 2097 | Some(LOADED_CERT_AUTHBOUND.to_vec()), |
| 2098 | Some(LOADED_CACERT_AUTHBOUND.to_vec()) |
| 2099 | ) |
| 2100 | ); |
| 2101 | |
| 2102 | legacy_blob_loader.remove_keystore_entry(10223, "authbound").expect("This should succeed."); |
| 2103 | |
| 2104 | assert_eq!( |
| 2105 | (None, None, None), |
| 2106 | legacy_blob_loader.load_by_uid_alias(10223, "authbound", &None).unwrap() |
| 2107 | ); |
| 2108 | |
| 2109 | // The database should not be empty due to the super key. |
| 2110 | assert!(!legacy_blob_loader.is_empty().unwrap()); |
| 2111 | assert!(!legacy_blob_loader.is_empty_user(0).unwrap()); |
| 2112 | |
| 2113 | // The database should be considered empty for user 1. |
| 2114 | assert!(legacy_blob_loader.is_empty_user(1).unwrap()); |
| 2115 | |
| 2116 | legacy_blob_loader.remove_super_key(0); |
| 2117 | |
| 2118 | // Now it should be empty. |
| 2119 | assert!(legacy_blob_loader.is_empty_user(0).unwrap()); |
| 2120 | assert!(legacy_blob_loader.is_empty().unwrap()); |
| 2121 | |
| 2122 | Ok(()) |
| 2123 | } |
| 2124 | |
| 2125 | #[test] |
| 2126 | fn test_in_place_key_migration() -> anyhow::Result<()> { |
| 2127 | let temp_dir = TempDir::new("test_in_place_key_migration").unwrap(); |
| 2128 | std::fs::create_dir(&*temp_dir.build().push("user_0")).unwrap(); |
| 2129 | |
| 2130 | let pw: Password = PASSWORD.into(); |
Eric Biggers | d68e691 | 2024-01-17 03:54:11 +0000 | [diff] [blame^] | 2131 | let pw_key = TestKey(pw.derive_key_pbkdf2(SUPERKEY_SALT, 32).unwrap()); |
Janis Danisevskis | f84d0b0 | 2022-01-26 14:11:14 -0800 | [diff] [blame] | 2132 | let super_key = |
| 2133 | Arc::new(TestKey(pw_key.decrypt(SUPERKEY_PAYLOAD, SUPERKEY_IV, SUPERKEY_TAG).unwrap())); |
| 2134 | |
| 2135 | std::fs::write(&*temp_dir.build().push("user_0").push(".masterkey"), SUPERKEY).unwrap(); |
| 2136 | |
| 2137 | std::fs::write( |
| 2138 | &*temp_dir.build().push("user_0").push("10223_USRPKEY_authbound"), |
| 2139 | USRPKEY_AUTHBOUND, |
| 2140 | ) |
| 2141 | .unwrap(); |
| 2142 | std::fs::write( |
| 2143 | &*temp_dir.build().push("user_0").push(".10223_chr_USRPKEY_authbound"), |
| 2144 | USRPKEY_AUTHBOUND_CHR, |
| 2145 | ) |
| 2146 | .unwrap(); |
| 2147 | make_encrypted_usr_cert_file( |
| 2148 | &*temp_dir.build().push("user_0").push("10223_USRCERT_authbound"), |
| 2149 | &super_key, |
Rajesh Nyamagoud | 69a8505 | 2022-02-17 16:47:55 +0000 | [diff] [blame] | 2150 | LOADED_CERT_AUTHBOUND, |
Janis Danisevskis | f84d0b0 | 2022-01-26 14:11:14 -0800 | [diff] [blame] | 2151 | ) |
| 2152 | .unwrap(); |
| 2153 | make_encrypted_ca_cert_file( |
| 2154 | &*temp_dir.build().push("user_0").push("10223_CACERT_authbound"), |
| 2155 | &super_key, |
Rajesh Nyamagoud | 69a8505 | 2022-02-17 16:47:55 +0000 | [diff] [blame] | 2156 | LOADED_CACERT_AUTHBOUND, |
Janis Danisevskis | f84d0b0 | 2022-01-26 14:11:14 -0800 | [diff] [blame] | 2157 | ) |
| 2158 | .unwrap(); |
| 2159 | |
| 2160 | let legacy_blob_loader = LegacyBlobLoader::new(temp_dir.path()); |
| 2161 | |
| 2162 | assert_eq!( |
| 2163 | legacy_blob_loader |
| 2164 | .load_by_uid_alias(10223, "authbound", &None) |
| 2165 | .unwrap_err() |
| 2166 | .root_cause() |
| 2167 | .downcast_ref::<Error>(), |
| 2168 | Some(&Error::LockedComponent) |
| 2169 | ); |
| 2170 | |
| 2171 | let super_key: Option<Arc<dyn AesGcm>> = Some(super_key); |
| 2172 | |
| 2173 | assert_eq!( |
| 2174 | legacy_blob_loader.load_by_uid_alias(10223, "authbound", &super_key).unwrap(), |
| 2175 | ( |
| 2176 | Some(( |
| 2177 | Blob { |
| 2178 | flags: 4, |
| 2179 | value: BlobValue::Encrypted { |
| 2180 | data: USRPKEY_AUTHBOUND_ENC_PAYLOAD.to_vec(), |
| 2181 | iv: USRPKEY_AUTHBOUND_IV.to_vec(), |
| 2182 | tag: USRPKEY_AUTHBOUND_TAG.to_vec() |
| 2183 | } |
| 2184 | }, |
| 2185 | structured_test_params_cache() |
| 2186 | )), |
| 2187 | Some(LOADED_CERT_AUTHBOUND.to_vec()), |
| 2188 | Some(LOADED_CACERT_AUTHBOUND.to_vec()) |
| 2189 | ) |
| 2190 | ); |
| 2191 | |
| 2192 | legacy_blob_loader.move_keystore_entry(10223, 10224, "authbound", "boundauth").unwrap(); |
| 2193 | |
| 2194 | assert_eq!( |
| 2195 | legacy_blob_loader |
| 2196 | .load_by_uid_alias(10224, "boundauth", &None) |
| 2197 | .unwrap_err() |
| 2198 | .root_cause() |
| 2199 | .downcast_ref::<Error>(), |
| 2200 | Some(&Error::LockedComponent) |
| 2201 | ); |
| 2202 | |
| 2203 | assert_eq!( |
| 2204 | legacy_blob_loader.load_by_uid_alias(10224, "boundauth", &super_key).unwrap(), |
| 2205 | ( |
| 2206 | Some(( |
| 2207 | Blob { |
| 2208 | flags: 4, |
| 2209 | value: BlobValue::Encrypted { |
| 2210 | data: USRPKEY_AUTHBOUND_ENC_PAYLOAD.to_vec(), |
| 2211 | iv: USRPKEY_AUTHBOUND_IV.to_vec(), |
| 2212 | tag: USRPKEY_AUTHBOUND_TAG.to_vec() |
| 2213 | } |
| 2214 | }, |
| 2215 | structured_test_params_cache() |
| 2216 | )), |
| 2217 | Some(LOADED_CERT_AUTHBOUND.to_vec()), |
| 2218 | Some(LOADED_CACERT_AUTHBOUND.to_vec()) |
| 2219 | ) |
| 2220 | ); |
| 2221 | |
| 2222 | legacy_blob_loader.remove_keystore_entry(10224, "boundauth").expect("This should succeed."); |
| 2223 | |
| 2224 | assert_eq!( |
| 2225 | (None, None, None), |
| 2226 | legacy_blob_loader.load_by_uid_alias(10224, "boundauth", &None).unwrap() |
| 2227 | ); |
| 2228 | |
| 2229 | // The database should not be empty due to the super key. |
| 2230 | assert!(!legacy_blob_loader.is_empty().unwrap()); |
| 2231 | assert!(!legacy_blob_loader.is_empty_user(0).unwrap()); |
| 2232 | |
| 2233 | // The database should be considered empty for user 1. |
| 2234 | assert!(legacy_blob_loader.is_empty_user(1).unwrap()); |
| 2235 | |
| 2236 | legacy_blob_loader.remove_super_key(0); |
| 2237 | |
| 2238 | // Now it should be empty. |
| 2239 | assert!(legacy_blob_loader.is_empty_user(0).unwrap()); |
| 2240 | assert!(legacy_blob_loader.is_empty().unwrap()); |
| 2241 | |
| 2242 | Ok(()) |
| 2243 | } |
| 2244 | |
Janis Danisevskis | 7df9dbf | 2021-04-12 16:04:42 -0700 | [diff] [blame] | 2245 | #[test] |
| 2246 | fn list_non_existing_user() -> Result<()> { |
Janis Danisevskis | f84d0b0 | 2022-01-26 14:11:14 -0800 | [diff] [blame] | 2247 | let temp_dir = TempDir::new("list_non_existing_user").unwrap(); |
Janis Danisevskis | 7df9dbf | 2021-04-12 16:04:42 -0700 | [diff] [blame] | 2248 | let legacy_blob_loader = LegacyBlobLoader::new(temp_dir.path()); |
| 2249 | |
| 2250 | assert!(legacy_blob_loader.list_user(20)?.is_empty()); |
| 2251 | |
| 2252 | Ok(()) |
| 2253 | } |
Janis Danisevskis | 13f0915 | 2021-04-19 09:55:15 -0700 | [diff] [blame] | 2254 | |
| 2255 | #[test] |
Janis Danisevskis | 3eb829d | 2021-06-14 14:18:20 -0700 | [diff] [blame] | 2256 | fn list_legacy_keystore_entries_on_non_existing_user() -> Result<()> { |
Janis Danisevskis | f84d0b0 | 2022-01-26 14:11:14 -0800 | [diff] [blame] | 2257 | let temp_dir = TempDir::new("list_legacy_keystore_entries_on_non_existing_user").unwrap(); |
Janis Danisevskis | 13f0915 | 2021-04-19 09:55:15 -0700 | [diff] [blame] | 2258 | let legacy_blob_loader = LegacyBlobLoader::new(temp_dir.path()); |
| 2259 | |
Janis Danisevskis | 5898d15 | 2021-06-15 08:23:46 -0700 | [diff] [blame] | 2260 | assert!(legacy_blob_loader.list_legacy_keystore_entries_for_user(20)?.is_empty()); |
Janis Danisevskis | 13f0915 | 2021-04-19 09:55:15 -0700 | [diff] [blame] | 2261 | |
| 2262 | Ok(()) |
| 2263 | } |
Janis Danisevskis | f84d0b0 | 2022-01-26 14:11:14 -0800 | [diff] [blame] | 2264 | |
| 2265 | #[test] |
| 2266 | fn test_move_keystore_entry() { |
| 2267 | let temp_dir = TempDir::new("test_move_keystore_entry").unwrap(); |
| 2268 | std::fs::create_dir(&*temp_dir.build().push("user_0")).unwrap(); |
| 2269 | |
| 2270 | const SOME_CONTENT: &[u8] = b"some content"; |
| 2271 | const ANOTHER_CONTENT: &[u8] = b"another content"; |
| 2272 | const SOME_FILENAME: &str = "some_file"; |
| 2273 | const ANOTHER_FILENAME: &str = "another_file"; |
| 2274 | |
| 2275 | std::fs::write(&*temp_dir.build().push("user_0").push(SOME_FILENAME), SOME_CONTENT) |
| 2276 | .unwrap(); |
| 2277 | |
| 2278 | std::fs::write(&*temp_dir.build().push("user_0").push(ANOTHER_FILENAME), ANOTHER_CONTENT) |
| 2279 | .unwrap(); |
| 2280 | |
| 2281 | // Non existent source id silently ignored. |
| 2282 | assert!(LegacyBlobLoader::move_keystore_file_if_exists( |
| 2283 | 1, |
| 2284 | 2, |
| 2285 | "non_existent", |
| 2286 | ANOTHER_FILENAME, |
| 2287 | "ignored", |
| 2288 | |_, alias, _| temp_dir.build().push("user_0").push(alias).to_path_buf() |
| 2289 | ) |
| 2290 | .is_ok()); |
| 2291 | |
| 2292 | // Content of another_file has not changed. |
| 2293 | let another_content = |
| 2294 | std::fs::read(&*temp_dir.build().push("user_0").push(ANOTHER_FILENAME)).unwrap(); |
| 2295 | assert_eq!(&another_content, ANOTHER_CONTENT); |
| 2296 | |
| 2297 | // Check that some_file still exists. |
| 2298 | assert!(temp_dir.build().push("user_0").push(SOME_FILENAME).exists()); |
| 2299 | // Existing target files are silently overwritten. |
| 2300 | |
| 2301 | assert!(LegacyBlobLoader::move_keystore_file_if_exists( |
| 2302 | 1, |
| 2303 | 2, |
| 2304 | SOME_FILENAME, |
| 2305 | ANOTHER_FILENAME, |
| 2306 | "ignored", |
| 2307 | |_, alias, _| temp_dir.build().push("user_0").push(alias).to_path_buf() |
| 2308 | ) |
| 2309 | .is_ok()); |
| 2310 | |
| 2311 | // Content of another_file is now "some content". |
| 2312 | let another_content = |
| 2313 | std::fs::read(&*temp_dir.build().push("user_0").push(ANOTHER_FILENAME)).unwrap(); |
| 2314 | assert_eq!(&another_content, SOME_CONTENT); |
| 2315 | |
| 2316 | // Check that some_file no longer exists. |
| 2317 | assert!(!temp_dir.build().push("user_0").push(SOME_FILENAME).exists()); |
| 2318 | } |
Janis Danisevskis | a51ccbc | 2020-11-25 21:04:24 -0800 | [diff] [blame] | 2319 | } |