blob: 9b08761c95c37f604960002b6bf31e1653f1f6cf [file] [log] [blame]
Brian Carlstrom3e6251d2011-04-11 09:05:06 -07001/*
2 * Copyright (C) 2011 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17package com.android.keychain;
18
Brian Carlstrom65e649e2011-06-24 02:13:28 -070019import android.app.Activity;
20import android.app.AlertDialog;
21import android.app.Dialog;
22import android.app.PendingIntent;
23import android.content.DialogInterface;
Brian Carlstrom3e6251d2011-04-11 09:05:06 -070024import android.content.Intent;
Brian Carlstrom65e649e2011-06-24 02:13:28 -070025import android.content.pm.PackageManager;
26import android.content.res.Resources;
27import android.os.AsyncTask;
Brian Carlstrom3e6251d2011-04-11 09:05:06 -070028import android.os.Bundle;
Brian Carlstrombb04f702011-05-24 21:54:51 -070029import android.os.RemoteException;
Brian Carlstrom3e6251d2011-04-11 09:05:06 -070030import android.security.Credentials;
Brian Carlstromf5b50a42011-06-09 16:05:09 -070031import android.security.IKeyChainAliasCallback;
Brian Carlstrombb04f702011-05-24 21:54:51 -070032import android.security.KeyChain;
Brian Carlstrom3e6251d2011-04-11 09:05:06 -070033import android.security.KeyStore;
Brian Carlstrom65e649e2011-06-24 02:13:28 -070034import android.view.LayoutInflater;
Brian Carlstrom3e6251d2011-04-11 09:05:06 -070035import android.view.View;
Brian Carlstrom65e649e2011-06-24 02:13:28 -070036import android.view.ViewGroup;
37import android.widget.BaseAdapter;
38import android.widget.Button;
Brian Carlstrom3e6251d2011-04-11 09:05:06 -070039import android.widget.ListView;
Brian Carlstrom65e649e2011-06-24 02:13:28 -070040import android.widget.RadioButton;
41import android.widget.TextView;
42import com.android.org.bouncycastle.asn1.x509.X509Name;
43import java.io.ByteArrayInputStream;
44import java.io.InputStream;
45import java.security.cert.CertificateException;
46import java.security.cert.CertificateFactory;
47import java.security.cert.X509Certificate;
48import java.util.ArrayList;
49import java.util.Arrays;
50import java.util.Collections;
51import java.util.List;
52import javax.security.auth.x500.X500Principal;
Brian Carlstrom3e6251d2011-04-11 09:05:06 -070053
Brian Carlstrom65e649e2011-06-24 02:13:28 -070054public class KeyChainActivity extends Activity {
Brian Carlstrom3e6251d2011-04-11 09:05:06 -070055
56 private static final String TAG = "KeyChainActivity";
57
58 private static String KEY_STATE = "state";
59
60 private static final int REQUEST_UNLOCK = 1;
61
62 private static enum State { INITIAL, UNLOCK_REQUESTED };
63
64 private State mState;
65
Brian Carlstrom65e649e2011-06-24 02:13:28 -070066 // beware that some of these KeyStore operations such as saw and
67 // get do file I/O in the remote keystore process and while they
68 // do not cause StrictMode violations, they logically should not
69 // be done on the UI thread.
Brian Carlstrom3e6251d2011-04-11 09:05:06 -070070 private KeyStore mKeyStore = KeyStore.getInstance();
71
Brian Carlstrom65e649e2011-06-24 02:13:28 -070072 // the KeyStore.state operation is safe to do on the UI thread, it
73 // does not do a file operation.
Brian Carlstrom3e6251d2011-04-11 09:05:06 -070074 private boolean isKeyStoreUnlocked() {
Brian Carlstrome3b33902011-05-31 01:06:20 -070075 return mKeyStore.state() == KeyStore.State.UNLOCKED;
Brian Carlstrom3e6251d2011-04-11 09:05:06 -070076 }
77
78 @Override public void onCreate(Bundle savedState) {
79 super.onCreate(savedState);
80 if (savedState == null) {
81 mState = State.INITIAL;
82 } else {
83 mState = (State) savedState.getSerializable(KEY_STATE);
84 if (mState == null) {
85 mState = State.INITIAL;
86 }
87 }
88 }
89
90 @Override public void onResume() {
91 super.onResume();
92
93 // see if KeyStore has been unlocked, if not start activity to do so
94 switch (mState) {
95 case INITIAL:
96 if (!isKeyStoreUnlocked()) {
97 mState = State.UNLOCK_REQUESTED;
98 this.startActivityForResult(new Intent(Credentials.UNLOCK_ACTION),
99 REQUEST_UNLOCK);
100 // Note that Credentials.unlock will start an
101 // Activity and we will be paused but then resumed
102 // when the unlock Activity completes and our
103 // onActivityResult is called with REQUEST_UNLOCK
104 return;
105 }
Brian Carlstrom91940e72011-06-28 20:37:31 -0700106 showCertChooserDialog();
Brian Carlstrom3e6251d2011-04-11 09:05:06 -0700107 return;
108 case UNLOCK_REQUESTED:
109 // we've already asked, but have not heard back, probably just rotated.
110 // wait to hear back via onActivityResult
111 return;
112 default:
113 throw new AssertionError();
114 }
115 }
116
Brian Carlstrom91940e72011-06-28 20:37:31 -0700117 private void showCertChooserDialog() {
118 new AliasLoader().execute();
119 }
120
Brian Carlstrom65e649e2011-06-24 02:13:28 -0700121 private class AliasLoader extends AsyncTask<Void, Void, CertificateAdapter> {
122 @Override protected CertificateAdapter doInBackground(Void... params) {
123 String[] aliasArray = mKeyStore.saw(Credentials.USER_PRIVATE_KEY);
124 List<String> aliasList = ((aliasArray == null)
125 ? Collections.<String>emptyList()
126 : Arrays.asList(aliasArray));
127 Collections.sort(aliasList);
128 return new CertificateAdapter(aliasList);
Brian Carlstrom3e6251d2011-04-11 09:05:06 -0700129 }
Brian Carlstrom91940e72011-06-28 20:37:31 -0700130 @Override protected void onPostExecute(CertificateAdapter adapter) {
131 displayCertChooserDialog(adapter);
Brian Carlstrom65e649e2011-06-24 02:13:28 -0700132 }
133 }
Brian Carlstrom3e6251d2011-04-11 09:05:06 -0700134
Brian Carlstrom91940e72011-06-28 20:37:31 -0700135 private void displayCertChooserDialog(final CertificateAdapter adapter) {
Brian Carlstrom65e649e2011-06-24 02:13:28 -0700136 AlertDialog.Builder builder = new AlertDialog.Builder(this);
Brian Carlstromdf172302011-06-26 17:13:54 -0700137
Brian Carlstrom4bf9e1a2011-06-28 21:45:31 -0700138 TextView contextView = (TextView) View.inflate(this, R.layout.cert_chooser_header, null);
139 View footer = View.inflate(this, R.layout.cert_chooser_footer, null);
140
141 final ListView lv = (ListView) View.inflate(this, R.layout.cert_chooser, null);
Brian Carlstrom5dd41f62011-06-29 18:51:34 -0700142 lv.addHeaderView(contextView, null, false);
143 lv.addFooterView(footer, null, false);
Brian Carlstrom4bf9e1a2011-06-28 21:45:31 -0700144 lv.setAdapter(adapter);
145 builder.setView(lv);
Brian Carlstromdf172302011-06-26 17:13:54 -0700146
Brian Carlstrom91940e72011-06-28 20:37:31 -0700147 boolean empty = adapter.mAliases.isEmpty();
Brian Carlstromdf172302011-06-26 17:13:54 -0700148 int negativeLabel = empty ? android.R.string.cancel : R.string.deny_button;
149 builder.setNegativeButton(negativeLabel, new DialogInterface.OnClickListener() {
Brian Carlstrom65e649e2011-06-24 02:13:28 -0700150 @Override public void onClick(DialogInterface dialog, int id) {
151 dialog.cancel(); // will cause OnDismissListener to be called
Brian Carlstrom3e6251d2011-04-11 09:05:06 -0700152 }
153 });
Brian Carlstrom65e649e2011-06-24 02:13:28 -0700154
Brian Carlstrom65e649e2011-06-24 02:13:28 -0700155 String title;
Brian Carlstromdf172302011-06-26 17:13:54 -0700156 Resources res = getResources();
157 if (empty) {
Brian Carlstrom65e649e2011-06-24 02:13:28 -0700158 title = res.getString(R.string.title_no_certs);
159 } else {
160 title = res.getString(R.string.title_select_cert);
Brian Carlstrom65e649e2011-06-24 02:13:28 -0700161 String alias = getIntent().getStringExtra(KeyChain.EXTRA_ALIAS);
162 if (alias != null) {
Brian Carlstrom62316552011-07-10 12:26:12 -0700163 // if alias was requested, set it if found
Brian Carlstrom5dd41f62011-06-29 18:51:34 -0700164 int adapterPosition = adapter.mAliases.indexOf(alias);
165 if (adapterPosition != -1) {
166 int listViewPosition = adapterPosition+1;
167 lv.setItemChecked(listViewPosition, true);
Brian Carlstrom65e649e2011-06-24 02:13:28 -0700168 }
Brian Carlstrom62316552011-07-10 12:26:12 -0700169 } else if (adapter.mAliases.size() == 1) {
170 // if only one choice, preselect it
171 int adapterPosition = 0;
172 int listViewPosition = adapterPosition+1;
173 lv.setItemChecked(listViewPosition, true);
Brian Carlstrom65e649e2011-06-24 02:13:28 -0700174 }
175
176 builder.setPositiveButton(R.string.allow_button, new DialogInterface.OnClickListener() {
177 @Override public void onClick(DialogInterface dialog, int id) {
Brian Carlstrom5dd41f62011-06-29 18:51:34 -0700178 int listViewPosition = lv.getCheckedItemPosition();
179 int adapterPosition = listViewPosition-1;
180 String alias = ((adapterPosition >= 0)
181 ? adapter.getItem(adapterPosition)
Brian Carlstrom65e649e2011-06-24 02:13:28 -0700182 : null);
183 finish(alias);
184 }
185 });
Brian Carlstrom65e649e2011-06-24 02:13:28 -0700186 }
187 builder.setTitle(title);
Brian Carlstrom91940e72011-06-28 20:37:31 -0700188 final Dialog dialog = builder.create();
Brian Carlstrom65e649e2011-06-24 02:13:28 -0700189
190 PendingIntent sender = getIntent().getParcelableExtra(KeyChain.EXTRA_SENDER);
191 if (sender == null) {
192 // if no sender, bail, we need to identify the app to the user securely.
193 finish(null);
194 }
195
196 // getTargetPackage guarantees that the returned string is
197 // supplied by the system, so that an application can not
198 // spoof its package.
199 String pkg = sender.getIntentSender().getTargetPackage();
200 PackageManager pm = getPackageManager();
201 CharSequence applicationLabel;
202 try {
203 applicationLabel = pm.getApplicationLabel(pm.getApplicationInfo(pkg, 0)).toString();
204 } catch (PackageManager.NameNotFoundException e) {
205 applicationLabel = pkg;
206 }
207 String appMessage = String.format(res.getString(R.string.requesting_application),
208 applicationLabel);
209
210 String contextMessage = appMessage;
211 String host = getIntent().getStringExtra(KeyChain.EXTRA_HOST);
212 if (host != null) {
213 String hostString = host;
214 int port = getIntent().getIntExtra(KeyChain.EXTRA_PORT, -1);
215 if (port != -1) {
216 hostString += ":" + port;
217 }
218 String hostMessage = String.format(res.getString(R.string.requesting_server),
219 hostString);
220 if (contextMessage == null) {
221 contextMessage = hostMessage;
222 } else {
223 contextMessage += " " + hostMessage;
224 }
225 }
Brian Carlstrom65e649e2011-06-24 02:13:28 -0700226 contextView.setText(contextMessage);
Brian Carlstrom65e649e2011-06-24 02:13:28 -0700227
228 String installMessage = String.format(res.getString(R.string.install_new_cert_message),
229 Credentials.EXTENSION_PFX, Credentials.EXTENSION_P12);
Brian Carlstrom5dd41f62011-06-29 18:51:34 -0700230 TextView installText = (TextView) footer.findViewById(R.id.cert_chooser_install_message);
231 installText.setText(installMessage);
Brian Carlstrom65e649e2011-06-24 02:13:28 -0700232
Brian Carlstrom4bf9e1a2011-06-28 21:45:31 -0700233 Button installButton = (Button) footer.findViewById(R.id.cert_chooser_install_button);
Brian Carlstrom65e649e2011-06-24 02:13:28 -0700234 installButton.setOnClickListener(new View.OnClickListener() {
235 @Override public void onClick(View v) {
236 // remove dialog so that we will recreate with
237 // possibly new content after install returns
Brian Carlstrom91940e72011-06-28 20:37:31 -0700238 dialog.dismiss();
Brian Carlstrom65e649e2011-06-24 02:13:28 -0700239 Credentials.getInstance().install(KeyChainActivity.this);
240 }
241 });
242
Brian Carlstrom65e649e2011-06-24 02:13:28 -0700243 dialog.setOnCancelListener(new DialogInterface.OnCancelListener() {
244 @Override public void onCancel(DialogInterface dialog) {
245 finish(null);
246 }
247 });
Brian Carlstrom91940e72011-06-28 20:37:31 -0700248 dialog.show();
Brian Carlstrom65e649e2011-06-24 02:13:28 -0700249 }
250
251 private class CertificateAdapter extends BaseAdapter {
252 private final List<String> mAliases;
253 private final List<String> mSubjects = new ArrayList<String>();
254 private CertificateAdapter(List<String> aliases) {
255 mAliases = aliases;
256 mSubjects.addAll(Collections.nCopies(aliases.size(), (String) null));
257 }
258 @Override public int getCount() {
259 return mAliases.size();
260 }
Brian Carlstrom5dd41f62011-06-29 18:51:34 -0700261 @Override public String getItem(int adapterPosition) {
262 return mAliases.get(adapterPosition);
Brian Carlstrom65e649e2011-06-24 02:13:28 -0700263 }
Brian Carlstrom5dd41f62011-06-29 18:51:34 -0700264 @Override public long getItemId(int adapterPosition) {
265 return adapterPosition;
Brian Carlstrom65e649e2011-06-24 02:13:28 -0700266 }
Brian Carlstrom5dd41f62011-06-29 18:51:34 -0700267 @Override public View getView(final int adapterPosition, View view, ViewGroup parent) {
Brian Carlstrom65e649e2011-06-24 02:13:28 -0700268 ViewHolder holder;
269 if (view == null) {
270 LayoutInflater inflater = LayoutInflater.from(KeyChainActivity.this);
271 view = inflater.inflate(R.layout.cert_item, parent, false);
272 holder = new ViewHolder();
273 holder.mAliasTextView = (TextView) view.findViewById(R.id.cert_item_alias);
274 holder.mSubjectTextView = (TextView) view.findViewById(R.id.cert_item_subject);
275 holder.mRadioButton = (RadioButton) view.findViewById(R.id.cert_item_selected);
276 view.setTag(holder);
277 } else {
278 holder = (ViewHolder) view.getTag();
279 }
280
Brian Carlstrom5dd41f62011-06-29 18:51:34 -0700281 String alias = mAliases.get(adapterPosition);
Brian Carlstrom65e649e2011-06-24 02:13:28 -0700282
283 holder.mAliasTextView.setText(alias);
284
Brian Carlstrom5dd41f62011-06-29 18:51:34 -0700285 String subject = mSubjects.get(adapterPosition);
Brian Carlstrom65e649e2011-06-24 02:13:28 -0700286 if (subject == null) {
Brian Carlstrom5dd41f62011-06-29 18:51:34 -0700287 new CertLoader(adapterPosition, holder.mSubjectTextView).execute();
Brian Carlstrom65e649e2011-06-24 02:13:28 -0700288 } else {
289 holder.mSubjectTextView.setText(subject);
290 }
291
292 ListView lv = (ListView)parent;
Brian Carlstrom5dd41f62011-06-29 18:51:34 -0700293 int listViewCheckedItemPosition = lv.getCheckedItemPosition();
294 int adapterCheckedItemPosition = listViewCheckedItemPosition-1;
295 holder.mRadioButton.setChecked(adapterPosition == adapterCheckedItemPosition);
Brian Carlstrom65e649e2011-06-24 02:13:28 -0700296 return view;
297 }
298
299 private class CertLoader extends AsyncTask<Void, Void, String> {
Brian Carlstrom5dd41f62011-06-29 18:51:34 -0700300 private final int mAdapterPosition;
Brian Carlstrom65e649e2011-06-24 02:13:28 -0700301 private final TextView mSubjectView;
Brian Carlstrom5dd41f62011-06-29 18:51:34 -0700302 private CertLoader(int adapterPosition, TextView subjectView) {
303 mAdapterPosition = adapterPosition;
Brian Carlstrom65e649e2011-06-24 02:13:28 -0700304 mSubjectView = subjectView;
305 }
306 @Override protected String doInBackground(Void... params) {
Brian Carlstrom5dd41f62011-06-29 18:51:34 -0700307 String alias = mAliases.get(mAdapterPosition);
Brian Carlstrom65e649e2011-06-24 02:13:28 -0700308 byte[] bytes = mKeyStore.get(Credentials.USER_CERTIFICATE + alias);
309 if (bytes == null) {
310 return null;
311 }
312 InputStream in = new ByteArrayInputStream(bytes);
313 X509Certificate cert;
314 try {
315 CertificateFactory cf = CertificateFactory.getInstance("X.509");
316 cert = (X509Certificate)cf.generateCertificate(in);
317 } catch (CertificateException ignored) {
318 return null;
319 }
320 // bouncycastle can handle the emailAddress OID of 1.2.840.113549.1.9.1
321 X500Principal subjectPrincipal = cert.getSubjectX500Principal();
322 X509Name subjectName = X509Name.getInstance(subjectPrincipal.getEncoded());
323 String subjectString = subjectName.toString(true, X509Name.DefaultSymbols);
324 return subjectString;
325 }
326 @Override protected void onPostExecute(String subjectString) {
Brian Carlstrom5dd41f62011-06-29 18:51:34 -0700327 mSubjects.set(mAdapterPosition, subjectString);
Brian Carlstrom65e649e2011-06-24 02:13:28 -0700328 mSubjectView.setText(subjectString);
329 }
330 }
331 }
332
333 private static class ViewHolder {
334 TextView mAliasTextView;
335 TextView mSubjectTextView;
336 RadioButton mRadioButton;
Brian Carlstrom3e6251d2011-04-11 09:05:06 -0700337 }
338
339 @Override protected void onActivityResult(int requestCode, int resultCode, Intent data) {
340 switch (requestCode) {
341 case REQUEST_UNLOCK:
342 if (isKeyStoreUnlocked()) {
Brian Carlstrom91940e72011-06-28 20:37:31 -0700343 showCertChooserDialog();
Brian Carlstrom3e6251d2011-04-11 09:05:06 -0700344 } else {
345 // user must have canceled unlock, give up
Brian Carlstrombb04f702011-05-24 21:54:51 -0700346 finish(null);
Brian Carlstrom3e6251d2011-04-11 09:05:06 -0700347 }
348 return;
349 default:
350 throw new AssertionError();
351 }
352 }
353
Brian Carlstrombb04f702011-05-24 21:54:51 -0700354 private void finish(String alias) {
355 if (alias == null) {
356 setResult(RESULT_CANCELED);
357 } else {
358 Intent result = new Intent();
359 result.putExtra(Intent.EXTRA_TEXT, alias);
360 setResult(RESULT_OK, result);
361 }
Brian Carlstromf5b50a42011-06-09 16:05:09 -0700362 IKeyChainAliasCallback keyChainAliasResponse
363 = IKeyChainAliasCallback.Stub.asInterface(
Brian Carlstrombb04f702011-05-24 21:54:51 -0700364 getIntent().getIBinderExtra(KeyChain.EXTRA_RESPONSE));
365 if (keyChainAliasResponse != null) {
Brian Carlstrom7d9aa752011-07-07 11:52:27 -0700366 new ResponseSender(keyChainAliasResponse, alias).execute();
367 return;
368 }
369 finish();
370 }
371
372 private class ResponseSender extends AsyncTask<Void, Void, Void> {
373 private IKeyChainAliasCallback mKeyChainAliasResponse;
374 private String mAlias;
375 private ResponseSender(IKeyChainAliasCallback keyChainAliasResponse, String alias) {
376 mKeyChainAliasResponse = keyChainAliasResponse;
377 mAlias = alias;
378 }
379 @Override protected Void doInBackground(Void... unused) {
Brian Carlstrombb04f702011-05-24 21:54:51 -0700380 try {
Brian Carlstrom7d9aa752011-07-07 11:52:27 -0700381 mKeyChainAliasResponse.alias(mAlias);
Brian Carlstrom2a858832011-05-26 09:30:26 -0700382 } catch (Exception ignored) {
383 // don't just catch RemoteException, caller could
384 // throw back a RuntimeException across processes
385 // which we should protect against.
Brian Carlstrombb04f702011-05-24 21:54:51 -0700386 }
Brian Carlstrom7d9aa752011-07-07 11:52:27 -0700387 return null;
Brian Carlstrombb04f702011-05-24 21:54:51 -0700388 }
Brian Carlstrom7d9aa752011-07-07 11:52:27 -0700389 @Override protected void onPostExecute(Void unused) {
390 finish();
391 }
Brian Carlstrombb04f702011-05-24 21:54:51 -0700392 }
393
Brian Carlstrom9e606df2011-06-07 12:03:08 -0700394 @Override public void onBackPressed() {
395 finish(null);
396 }
397
Brian Carlstrom3e6251d2011-04-11 09:05:06 -0700398 @Override protected void onSaveInstanceState(Bundle savedState) {
399 super.onSaveInstanceState(savedState);
400 if (mState != State.INITIAL) {
401 savedState.putSerializable(KEY_STATE, mState);
402 }
403 }
404}