| /* |
| * Copyright (C) 2017 The Android Open Source Project |
| * |
| * Licensed under the Apache License, Version 2.0 (the "License"); |
| * you may not use this file except in compliance with the License. |
| * You may obtain a copy of the License at |
| * |
| * http://www.apache.org/licenses/LICENSE-2.0 |
| * |
| * Unless required by applicable law or agreed to in writing, software |
| * distributed under the License is distributed on an "AS IS" BASIS, |
| * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| * See the License for the specific language governing permissions and |
| * limitations under the License. |
| */ |
| |
| package com.android.server.locksettings; |
| |
| import static com.android.internal.widget.LockPatternUtils.EscrowTokenStateChangeCallback; |
| |
| import android.annotation.NonNull; |
| import android.annotation.Nullable; |
| import android.content.Context; |
| import android.content.pm.UserInfo; |
| import android.hardware.weaver.V1_0.IWeaver; |
| import android.hardware.weaver.V1_0.WeaverConfig; |
| import android.hardware.weaver.V1_0.WeaverReadResponse; |
| import android.hardware.weaver.V1_0.WeaverReadStatus; |
| import android.hardware.weaver.V1_0.WeaverStatus; |
| import android.os.RemoteException; |
| import android.os.UserManager; |
| import android.security.GateKeeper; |
| import android.security.Scrypt; |
| import android.service.gatekeeper.GateKeeperResponse; |
| import android.service.gatekeeper.IGateKeeperService; |
| import android.util.ArrayMap; |
| import android.util.Log; |
| import android.util.Slog; |
| |
| import com.android.internal.annotations.VisibleForTesting; |
| import com.android.internal.util.ArrayUtils; |
| import com.android.internal.widget.ICheckCredentialProgressCallback; |
| import com.android.internal.widget.LockPatternUtils; |
| import com.android.internal.widget.LockscreenCredential; |
| import com.android.internal.widget.VerifyCredentialResponse; |
| import com.android.server.locksettings.LockSettingsStorage.PersistentData; |
| |
| import libcore.util.HexEncoding; |
| |
| import java.nio.ByteBuffer; |
| import java.security.NoSuchAlgorithmException; |
| import java.security.SecureRandom; |
| import java.util.ArrayList; |
| import java.util.Arrays; |
| import java.util.Collections; |
| import java.util.HashSet; |
| import java.util.List; |
| import java.util.Map; |
| import java.util.NoSuchElementException; |
| import java.util.Set; |
| |
| |
| /** |
| * A class that maintains the wrapping of synthetic password by user credentials or escrow tokens. |
| * It's (mostly) a pure storage for synthetic passwords, providing APIs to creating and destroying |
| * synthetic password blobs which are wrapped by user credentials or escrow tokens. |
| * |
| * Here is the assumptions it makes: |
| * Each user has one single synthetic password at any time. |
| * The SP has an associated password handle, which binds to the SID for that user. The password |
| * handle is persisted by SyntheticPasswordManager internally. |
| * If the user credential is null, it's treated as if the credential is DEFAULT_PASSWORD |
| * |
| * Information persisted on disk: |
| * for each user (stored under DEFAULT_HANDLE): |
| * SP_HANDLE_NAME: GateKeeper password handle of synthetic password. Only available if user |
| * credential exists, cleared when user clears their credential. |
| * SP_E0_NAME, SP_P1_NAME: Secret to derive synthetic password when combined with escrow |
| * tokens. Destroyed when escrow support is turned off for the given user. |
| * |
| * for each SP blob under the user (stored under the corresponding handle): |
| * SP_BLOB_NAME: The encrypted synthetic password. Always exists. |
| * PASSWORD_DATA_NAME: Metadata about user credential. Only exists for password based SP. |
| * SECDISCARDABLE_NAME: Part of the necessary ingredient to decrypt SP_BLOB_NAME for the |
| * purpose of secure deletion. Exists if this is a non-weaver SP |
| * (both password and token based), or it's a token-based SP under weaver. |
| * WEAVER_SLOT: Metadata about the weaver slot used. Only exists if this is a SP under weaver. |
| * |
| * |
| */ |
| public class SyntheticPasswordManager { |
| private static final String SP_BLOB_NAME = "spblob"; |
| private static final String SP_E0_NAME = "e0"; |
| private static final String SP_P1_NAME = "p1"; |
| private static final String SP_HANDLE_NAME = "handle"; |
| private static final String SECDISCARDABLE_NAME = "secdis"; |
| private static final int SECDISCARDABLE_LENGTH = 16 * 1024; |
| private static final String PASSWORD_DATA_NAME = "pwd"; |
| private static final String WEAVER_SLOT_NAME = "weaver"; |
| |
| public static final long DEFAULT_HANDLE = 0L; |
| private static final byte[] DEFAULT_PASSWORD = "default-password".getBytes(); |
| |
| private static final byte WEAVER_VERSION = 1; |
| private static final int INVALID_WEAVER_SLOT = -1; |
| |
| private static final byte SYNTHETIC_PASSWORD_VERSION_V1 = 1; |
| private static final byte SYNTHETIC_PASSWORD_VERSION_V2 = 2; |
| private static final byte SYNTHETIC_PASSWORD_VERSION_V3 = 3; |
| private static final byte SYNTHETIC_PASSWORD_PASSWORD_BASED = 0; |
| private static final byte SYNTHETIC_PASSWORD_TOKEN_BASED = 1; |
| |
| // 256-bit synthetic password |
| private static final byte SYNTHETIC_PASSWORD_LENGTH = 256 / 8; |
| |
| private static final int PASSWORD_SCRYPT_N = 11; |
| private static final int PASSWORD_SCRYPT_R = 3; |
| private static final int PASSWORD_SCRYPT_P = 1; |
| private static final int PASSWORD_SALT_LENGTH = 16; |
| private static final int PASSWORD_TOKEN_LENGTH = 32; |
| private static final String TAG = "SyntheticPasswordManager"; |
| |
| private static final byte[] PERSONALISATION_SECDISCARDABLE = "secdiscardable-transform".getBytes(); |
| private static final byte[] PERSONALIZATION_KEY_STORE_PASSWORD = "keystore-password".getBytes(); |
| private static final byte[] PERSONALIZATION_USER_GK_AUTH = "user-gk-authentication".getBytes(); |
| private static final byte[] PERSONALIZATION_SP_GK_AUTH = "sp-gk-authentication".getBytes(); |
| private static final byte[] PERSONALIZATION_FBE_KEY = "fbe-key".getBytes(); |
| private static final byte[] PERSONALIZATION_AUTHSECRET_KEY = "authsecret-hal".getBytes(); |
| private static final byte[] PERSONALIZATION_SP_SPLIT = "sp-split".getBytes(); |
| private static final byte[] PERSONALIZATION_PASSWORD_HASH = "pw-hash".getBytes(); |
| private static final byte[] PERSONALIZATION_E0 = "e0-encryption".getBytes(); |
| private static final byte[] PERSONALISATION_WEAVER_PASSWORD = "weaver-pwd".getBytes(); |
| private static final byte[] PERSONALISATION_WEAVER_KEY = "weaver-key".getBytes(); |
| private static final byte[] PERSONALISATION_WEAVER_TOKEN = "weaver-token".getBytes(); |
| private static final byte[] PERSONALISATION_CONTEXT = |
| "android-synthetic-password-personalization-context".getBytes(); |
| |
| static class AuthenticationResult { |
| public AuthenticationToken authToken; |
| public VerifyCredentialResponse gkResponse; |
| } |
| |
| static class AuthenticationToken { |
| private final byte mVersion; |
| /* |
| * Here is the relationship between all three fields: |
| * P0 and P1 are two randomly-generated blocks. P1 is stored on disk but P0 is not. |
| * syntheticPassword = hash(P0 || P1) |
| * E0 = P0 encrypted under syntheticPassword, stored on disk. |
| */ |
| private @Nullable byte[] E0; |
| private @Nullable byte[] P1; |
| private @NonNull String syntheticPassword; |
| |
| AuthenticationToken(byte version) { |
| mVersion = version; |
| } |
| |
| private byte[] derivePassword(byte[] personalization) { |
| if (mVersion == SYNTHETIC_PASSWORD_VERSION_V3) { |
| return (new SP800Derive(syntheticPassword.getBytes())) |
| .withContext(personalization, PERSONALISATION_CONTEXT); |
| } else { |
| return SyntheticPasswordCrypto.personalisedHash(personalization, |
| syntheticPassword.getBytes()); |
| } |
| } |
| |
| public byte[] deriveKeyStorePassword() { |
| return bytesToHex(derivePassword(PERSONALIZATION_KEY_STORE_PASSWORD)); |
| } |
| |
| public byte[] deriveGkPassword() { |
| return derivePassword(PERSONALIZATION_SP_GK_AUTH); |
| } |
| |
| public byte[] deriveDiskEncryptionKey() { |
| return derivePassword(PERSONALIZATION_FBE_KEY); |
| } |
| |
| public byte[] deriveVendorAuthSecret() { |
| return derivePassword(PERSONALIZATION_AUTHSECRET_KEY); |
| } |
| |
| public byte[] derivePasswordHashFactor() { |
| return derivePassword(PERSONALIZATION_PASSWORD_HASH); |
| } |
| |
| private void initialize(byte[] P0, byte[] P1) { |
| this.P1 = P1; |
| this.syntheticPassword = String.valueOf(HexEncoding.encode( |
| SyntheticPasswordCrypto.personalisedHash( |
| PERSONALIZATION_SP_SPLIT, P0, P1))); |
| this.E0 = SyntheticPasswordCrypto.encrypt(this.syntheticPassword.getBytes(), |
| PERSONALIZATION_E0, P0); |
| } |
| |
| public void recreate(byte[] secret) { |
| initialize(secret, this.P1); |
| } |
| |
| protected static AuthenticationToken create() { |
| AuthenticationToken result = new AuthenticationToken(SYNTHETIC_PASSWORD_VERSION_V3); |
| result.initialize(secureRandom(SYNTHETIC_PASSWORD_LENGTH), |
| secureRandom(SYNTHETIC_PASSWORD_LENGTH)); |
| return result; |
| } |
| |
| public byte[] computeP0() { |
| if (E0 == null) { |
| return null; |
| } |
| return SyntheticPasswordCrypto.decrypt(syntheticPassword.getBytes(), PERSONALIZATION_E0, |
| E0); |
| } |
| } |
| |
| static class PasswordData { |
| byte scryptN; |
| byte scryptR; |
| byte scryptP; |
| public int credentialType; |
| byte[] salt; |
| // For GateKeeper-based credential, this is the password handle returned by GK, |
| // for weaver-based credential, this is empty. |
| public byte[] passwordHandle; |
| |
| public static PasswordData create(int passwordType) { |
| PasswordData result = new PasswordData(); |
| result.scryptN = PASSWORD_SCRYPT_N; |
| result.scryptR = PASSWORD_SCRYPT_R; |
| result.scryptP = PASSWORD_SCRYPT_P; |
| result.credentialType = passwordType; |
| result.salt = secureRandom(PASSWORD_SALT_LENGTH); |
| return result; |
| } |
| |
| public static PasswordData fromBytes(byte[] data) { |
| PasswordData result = new PasswordData(); |
| ByteBuffer buffer = ByteBuffer.allocate(data.length); |
| buffer.put(data, 0, data.length); |
| buffer.flip(); |
| result.credentialType = buffer.getInt(); |
| result.scryptN = buffer.get(); |
| result.scryptR = buffer.get(); |
| result.scryptP = buffer.get(); |
| int saltLen = buffer.getInt(); |
| result.salt = new byte[saltLen]; |
| buffer.get(result.salt); |
| int handleLen = buffer.getInt(); |
| if (handleLen > 0) { |
| result.passwordHandle = new byte[handleLen]; |
| buffer.get(result.passwordHandle); |
| } else { |
| result.passwordHandle = null; |
| } |
| return result; |
| } |
| |
| public byte[] toBytes() { |
| |
| ByteBuffer buffer = ByteBuffer.allocate(Integer.BYTES + 3 * Byte.BYTES |
| + Integer.BYTES + salt.length + Integer.BYTES + |
| (passwordHandle != null ? passwordHandle.length : 0)); |
| buffer.putInt(credentialType); |
| buffer.put(scryptN); |
| buffer.put(scryptR); |
| buffer.put(scryptP); |
| buffer.putInt(salt.length); |
| buffer.put(salt); |
| if (passwordHandle != null && passwordHandle.length > 0) { |
| buffer.putInt(passwordHandle.length); |
| buffer.put(passwordHandle); |
| } else { |
| buffer.putInt(0); |
| } |
| return buffer.array(); |
| } |
| } |
| |
| static class TokenData { |
| byte[] secdiscardableOnDisk; |
| byte[] weaverSecret; |
| byte[] aggregatedSecret; |
| EscrowTokenStateChangeCallback mCallback; |
| } |
| |
| private final Context mContext; |
| private LockSettingsStorage mStorage; |
| private IWeaver mWeaver; |
| private WeaverConfig mWeaverConfig; |
| private PasswordSlotManager mPasswordSlotManager; |
| |
| private final UserManager mUserManager; |
| |
| public SyntheticPasswordManager(Context context, LockSettingsStorage storage, |
| UserManager userManager, PasswordSlotManager passwordSlotManager) { |
| mContext = context; |
| mStorage = storage; |
| mUserManager = userManager; |
| mPasswordSlotManager = passwordSlotManager; |
| } |
| |
| @VisibleForTesting |
| protected IWeaver getWeaverService() throws RemoteException { |
| try { |
| return IWeaver.getService(); |
| } catch (NoSuchElementException e) { |
| Slog.i(TAG, "Device does not support weaver"); |
| return null; |
| } |
| } |
| |
| public synchronized void initWeaverService() { |
| if (mWeaver != null) { |
| return; |
| } |
| try { |
| mWeaverConfig = null; |
| mWeaver = getWeaverService(); |
| if (mWeaver != null) { |
| mWeaver.getConfig((int status, WeaverConfig config) -> { |
| if (status == WeaverStatus.OK && config.slots > 0) { |
| mWeaverConfig = config; |
| } else { |
| Slog.e(TAG, "Failed to get weaver config, status " + status |
| + " slots: " + config.slots); |
| mWeaver = null; |
| } |
| }); |
| mPasswordSlotManager.refreshActiveSlots(getUsedWeaverSlots()); |
| } |
| } catch (RemoteException e) { |
| Slog.e(TAG, "Failed to get weaver service", e); |
| } |
| } |
| |
| private synchronized boolean isWeaverAvailable() { |
| if (mWeaver == null) { |
| //Re-initializing weaver in case there was a transient error preventing access to it. |
| initWeaverService(); |
| } |
| return mWeaver != null && mWeaverConfig.slots > 0; |
| } |
| |
| /** |
| * Enroll the given key value pair into the specified weaver slot. if the given key is null, |
| * a default all-zero key is used. If the value is not specified, a fresh random secret is |
| * generated as the value. |
| * |
| * @return the value stored in the weaver slot, or null if the operation fails |
| */ |
| private byte[] weaverEnroll(int slot, byte[] key, @Nullable byte[] value) { |
| if (slot == INVALID_WEAVER_SLOT || slot >= mWeaverConfig.slots) { |
| throw new IllegalArgumentException("Invalid slot for weaver"); |
| } |
| if (key == null) { |
| key = new byte[mWeaverConfig.keySize]; |
| } else if (key.length != mWeaverConfig.keySize) { |
| throw new IllegalArgumentException("Invalid key size for weaver"); |
| } |
| if (value == null) { |
| value = secureRandom(mWeaverConfig.valueSize); |
| } |
| try { |
| int writeStatus = mWeaver.write(slot, toByteArrayList(key), toByteArrayList(value)); |
| if (writeStatus != WeaverStatus.OK) { |
| Log.e(TAG, "weaver write failed, slot: " + slot + " status: " + writeStatus); |
| return null; |
| } |
| } catch (RemoteException e) { |
| Log.e(TAG, "weaver write failed", e); |
| return null; |
| } |
| return value; |
| } |
| |
| /** |
| * Verify the supplied key against a weaver slot, returning a response indicating whether |
| * the verification is successful, throttled or failed. If successful, the bound secret |
| * is also returned. |
| */ |
| private VerifyCredentialResponse weaverVerify(int slot, byte[] key) { |
| if (slot == INVALID_WEAVER_SLOT || slot >= mWeaverConfig.slots) { |
| throw new IllegalArgumentException("Invalid slot for weaver"); |
| } |
| if (key == null) { |
| key = new byte[mWeaverConfig.keySize]; |
| } else if (key.length != mWeaverConfig.keySize) { |
| throw new IllegalArgumentException("Invalid key size for weaver"); |
| } |
| final VerifyCredentialResponse[] response = new VerifyCredentialResponse[1]; |
| try { |
| mWeaver.read(slot, toByteArrayList(key), |
| (int status, WeaverReadResponse readResponse) -> { |
| switch (status) { |
| case WeaverReadStatus.OK: |
| response[0] = new VerifyCredentialResponse( |
| fromByteArrayList(readResponse.value)); |
| break; |
| case WeaverReadStatus.THROTTLE: |
| response[0] = new VerifyCredentialResponse(readResponse.timeout); |
| Log.e(TAG, "weaver read failed (THROTTLE), slot: " + slot); |
| break; |
| case WeaverReadStatus.INCORRECT_KEY: |
| if (readResponse.timeout == 0) { |
| response[0] = VerifyCredentialResponse.ERROR; |
| Log.e(TAG, "weaver read failed (INCORRECT_KEY), slot: " + slot); |
| } else { |
| response[0] = new VerifyCredentialResponse(readResponse.timeout); |
| Log.e(TAG, "weaver read failed (INCORRECT_KEY/THROTTLE), slot: " |
| + slot); |
| } |
| break; |
| case WeaverReadStatus.FAILED: |
| response[0] = VerifyCredentialResponse.ERROR; |
| Log.e(TAG, "weaver read failed (FAILED), slot: " + slot); |
| break; |
| default: |
| response[0] = VerifyCredentialResponse.ERROR; |
| Log.e(TAG, "weaver read unknown status " + status + ", slot: " + slot); |
| break; |
| } |
| }); |
| } catch (RemoteException e) { |
| response[0] = VerifyCredentialResponse.ERROR; |
| Log.e(TAG, "weaver read failed, slot: " + slot, e); |
| } |
| return response[0]; |
| } |
| |
| public void removeUser(int userId) { |
| for (long handle : mStorage.listSyntheticPasswordHandlesForUser(SP_BLOB_NAME, userId)) { |
| destroyWeaverSlot(handle, userId); |
| destroySPBlobKey(getHandleName(handle)); |
| } |
| } |
| |
| int getCredentialType(long handle, int userId) { |
| byte[] passwordData = loadState(PASSWORD_DATA_NAME, handle, userId); |
| if (passwordData == null) { |
| Log.w(TAG, "getCredentialType: encountered empty password data for user " + userId); |
| return LockPatternUtils.CREDENTIAL_TYPE_NONE; |
| } |
| return PasswordData.fromBytes(passwordData).credentialType; |
| } |
| |
| static int getFrpCredentialType(byte[] payload) { |
| if (payload == null) { |
| return LockPatternUtils.CREDENTIAL_TYPE_NONE; |
| } |
| return PasswordData.fromBytes(payload).credentialType; |
| } |
| |
| /** |
| * Initializing a new Authentication token, possibly from an existing credential and hash. |
| * |
| * The authentication token would bear a randomly-generated synthetic password. |
| * |
| * This method has the side effect of rebinding the SID of the given user to the |
| * newly-generated SP. |
| * |
| * If the existing credential hash is non-null, the existing SID mill be migrated so |
| * the synthetic password in the authentication token will produce the same SID |
| * (the corresponding synthetic password handle is persisted by SyntheticPasswordManager |
| * in a per-user data storage.) |
| * |
| * If the existing credential hash is null, it means the given user should have no SID so |
| * SyntheticPasswordManager will nuke any SP handle previously persisted. In this case, |
| * the supplied credential parameter is also ignored. |
| * |
| * Also saves the escrow information necessary to re-generate the synthetic password under |
| * an escrow scheme. This information can be removed with {@link #destroyEscrowData} if |
| * password escrow should be disabled completely on the given user. |
| * |
| */ |
| public AuthenticationToken newSyntheticPasswordAndSid(IGateKeeperService gatekeeper, |
| byte[] hash, LockscreenCredential credential, int userId) { |
| AuthenticationToken result = AuthenticationToken.create(); |
| GateKeeperResponse response; |
| if (hash != null) { |
| try { |
| response = gatekeeper.enroll(userId, hash, credential.getCredential(), |
| result.deriveGkPassword()); |
| } catch (RemoteException e) { |
| throw new IllegalStateException("Failed to enroll credential duing SP init", e); |
| } |
| if (response.getResponseCode() != GateKeeperResponse.RESPONSE_OK) { |
| Log.w(TAG, "Fail to migrate SID, assuming no SID, user " + userId); |
| clearSidForUser(userId); |
| } else { |
| saveSyntheticPasswordHandle(response.getPayload(), userId); |
| } |
| } else { |
| clearSidForUser(userId); |
| } |
| saveEscrowData(result, userId); |
| return result; |
| } |
| |
| /** |
| * Enroll a new password handle and SID for the given synthetic password and persist it on disk. |
| * Used when adding password to previously-unsecured devices. |
| */ |
| public void newSidForUser(IGateKeeperService gatekeeper, AuthenticationToken authToken, |
| int userId) { |
| GateKeeperResponse response; |
| try { |
| response = gatekeeper.enroll(userId, null, null, authToken.deriveGkPassword()); |
| } catch (RemoteException e) { |
| throw new IllegalStateException("Failed to create new SID for user", e); |
| } |
| if (response.getResponseCode() != GateKeeperResponse.RESPONSE_OK) { |
| Log.e(TAG, "Fail to create new SID for user " + userId); |
| return; |
| } |
| saveSyntheticPasswordHandle(response.getPayload(), userId); |
| } |
| |
| // Nuke the SP handle (and as a result, its SID) for the given user. |
| public void clearSidForUser(int userId) { |
| destroyState(SP_HANDLE_NAME, DEFAULT_HANDLE, userId); |
| } |
| |
| public boolean hasSidForUser(int userId) { |
| return hasState(SP_HANDLE_NAME, DEFAULT_HANDLE, userId); |
| } |
| |
| // if null, it means there is no SID associated with the user |
| // This can happen if the user is migrated to SP but currently |
| // do not have a lockscreen password. |
| private byte[] loadSyntheticPasswordHandle(int userId) { |
| return loadState(SP_HANDLE_NAME, DEFAULT_HANDLE, userId); |
| } |
| |
| private void saveSyntheticPasswordHandle(byte[] spHandle, int userId) { |
| saveState(SP_HANDLE_NAME, spHandle, DEFAULT_HANDLE, userId); |
| } |
| |
| private boolean loadEscrowData(AuthenticationToken authToken, int userId) { |
| authToken.E0 = loadState(SP_E0_NAME, DEFAULT_HANDLE, userId); |
| authToken.P1 = loadState(SP_P1_NAME, DEFAULT_HANDLE, userId); |
| return authToken.E0 != null && authToken.P1 != null; |
| } |
| |
| private void saveEscrowData(AuthenticationToken authToken, int userId) { |
| saveState(SP_E0_NAME, authToken.E0, DEFAULT_HANDLE, userId); |
| saveState(SP_P1_NAME, authToken.P1, DEFAULT_HANDLE, userId); |
| } |
| |
| public boolean hasEscrowData(int userId) { |
| return hasState(SP_E0_NAME, DEFAULT_HANDLE, userId) |
| && hasState(SP_P1_NAME, DEFAULT_HANDLE, userId); |
| } |
| |
| public void destroyEscrowData(int userId) { |
| destroyState(SP_E0_NAME, DEFAULT_HANDLE, userId); |
| destroyState(SP_P1_NAME, DEFAULT_HANDLE, userId); |
| } |
| |
| private int loadWeaverSlot(long handle, int userId) { |
| final int LENGTH = Byte.BYTES + Integer.BYTES; |
| byte[] data = loadState(WEAVER_SLOT_NAME, handle, userId); |
| if (data == null || data.length != LENGTH) { |
| return INVALID_WEAVER_SLOT; |
| } |
| ByteBuffer buffer = ByteBuffer.allocate(LENGTH); |
| buffer.put(data, 0, data.length); |
| buffer.flip(); |
| if (buffer.get() != WEAVER_VERSION) { |
| Log.e(TAG, "Invalid weaver slot version of handle " + handle); |
| return INVALID_WEAVER_SLOT; |
| } |
| return buffer.getInt(); |
| } |
| |
| private void saveWeaverSlot(int slot, long handle, int userId) { |
| ByteBuffer buffer = ByteBuffer.allocate(Byte.BYTES + Integer.BYTES); |
| buffer.put(WEAVER_VERSION); |
| buffer.putInt(slot); |
| saveState(WEAVER_SLOT_NAME, buffer.array(), handle, userId); |
| } |
| |
| private void destroyWeaverSlot(long handle, int userId) { |
| int slot = loadWeaverSlot(handle, userId); |
| destroyState(WEAVER_SLOT_NAME, handle, userId); |
| if (slot != INVALID_WEAVER_SLOT) { |
| Set<Integer> usedSlots = getUsedWeaverSlots(); |
| if (!usedSlots.contains(slot)) { |
| Log.i(TAG, "Destroy weaver slot " + slot + " for user " + userId); |
| weaverEnroll(slot, null, null); |
| mPasswordSlotManager.markSlotDeleted(slot); |
| } else { |
| Log.w(TAG, "Skip destroying reused weaver slot " + slot + " for user " + userId); |
| } |
| } |
| } |
| |
| /** |
| * Return the set of weaver slots that are currently in use by all users on the device. |
| * <p> |
| * <em>Note:</em> Users who are in the process of being deleted are not tracked here |
| * (due to them being marked as partial in UserManager so not visible from |
| * {@link UserManager#getUsers}). As a result their weaver slots will not be considered |
| * taken and can be reused by new users. Care should be taken when cleaning up the |
| * deleted user in {@link #removeUser}, to prevent a reused slot from being erased |
| * unintentionally. |
| */ |
| private Set<Integer> getUsedWeaverSlots() { |
| Map<Integer, List<Long>> slotHandles = mStorage.listSyntheticPasswordHandlesForAllUsers( |
| WEAVER_SLOT_NAME); |
| HashSet<Integer> slots = new HashSet<>(); |
| for (Map.Entry<Integer, List<Long>> entry : slotHandles.entrySet()) { |
| for (Long handle : entry.getValue()) { |
| int slot = loadWeaverSlot(handle, entry.getKey()); |
| slots.add(slot); |
| } |
| } |
| return slots; |
| } |
| |
| private int getNextAvailableWeaverSlot() { |
| Set<Integer> usedSlots = getUsedWeaverSlots(); |
| usedSlots.addAll(mPasswordSlotManager.getUsedSlots()); |
| for (int i = 0; i < mWeaverConfig.slots; i++) { |
| if (!usedSlots.contains(i)) { |
| return i; |
| } |
| } |
| throw new IllegalStateException("Run out of weaver slots."); |
| } |
| |
| /** |
| * Create a new password based SP blob based on the supplied authentication token, such that |
| * a future successful authentication with unwrapPasswordBasedSyntheticPassword() would result |
| * in the same authentication token. |
| * |
| * This method only creates SP blob wrapping around the given synthetic password and does not |
| * handle logic around SID or SP handle. The caller should separately ensure that the user's SID |
| * is consistent with the device state by calling other APIs in this class. |
| * |
| * @see #newSidForUser |
| * @see #clearSidForUser |
| * @return a new password handle for the wrapped SP blob |
| * @throw IllegalStateException if creation fails. |
| */ |
| public long createPasswordBasedSyntheticPassword(IGateKeeperService gatekeeper, |
| LockscreenCredential credential, AuthenticationToken authToken, int userId) { |
| long handle = generateHandle(); |
| PasswordData pwd = PasswordData.create(credential.getType()); |
| byte[] pwdToken = computePasswordToken(credential, pwd); |
| final long sid; |
| final byte[] applicationId; |
| |
| if (isWeaverAvailable()) { |
| // Weaver based user password |
| int weaverSlot = getNextAvailableWeaverSlot(); |
| Log.i(TAG, "Weaver enroll password to slot " + weaverSlot + " for user " + userId); |
| byte[] weaverSecret = weaverEnroll(weaverSlot, passwordTokenToWeaverKey(pwdToken), |
| null); |
| if (weaverSecret == null) { |
| throw new IllegalStateException( |
| "Fail to enroll user password under weaver " + userId); |
| } |
| saveWeaverSlot(weaverSlot, handle, userId); |
| mPasswordSlotManager.markSlotInUse(weaverSlot); |
| // No need to pass in quality since the credential type already encodes sufficient info |
| synchronizeWeaverFrpPassword(pwd, 0, userId, weaverSlot); |
| |
| pwd.passwordHandle = null; |
| sid = GateKeeper.INVALID_SECURE_USER_ID; |
| applicationId = transformUnderWeaverSecret(pwdToken, weaverSecret); |
| } else { |
| // In case GK enrollment leaves persistent state around (in RPMB), this will nuke them |
| // to prevent them from accumulating and causing problems. |
| try { |
| gatekeeper.clearSecureUserId(fakeUid(userId)); |
| } catch (RemoteException ignore) { |
| Log.w(TAG, "Failed to clear SID from gatekeeper"); |
| } |
| // GateKeeper based user password |
| GateKeeperResponse response; |
| try { |
| response = gatekeeper.enroll(fakeUid(userId), null, null, |
| passwordTokenToGkInput(pwdToken)); |
| } catch (RemoteException e) { |
| throw new IllegalStateException("Failed to enroll password for new SP blob", e); |
| } |
| if (response.getResponseCode() != GateKeeperResponse.RESPONSE_OK) { |
| throw new IllegalStateException( |
| "Fail to enroll user password when creating SP for user " + userId); |
| } |
| pwd.passwordHandle = response.getPayload(); |
| sid = sidFromPasswordHandle(pwd.passwordHandle); |
| applicationId = transformUnderSecdiscardable(pwdToken, |
| createSecdiscardable(handle, userId)); |
| // No need to pass in quality since the credential type already encodes sufficient info |
| synchronizeFrpPassword(pwd, 0, userId); |
| } |
| saveState(PASSWORD_DATA_NAME, pwd.toBytes(), handle, userId); |
| |
| createSyntheticPasswordBlob(handle, SYNTHETIC_PASSWORD_PASSWORD_BASED, authToken, |
| applicationId, sid, userId); |
| return handle; |
| } |
| |
| public VerifyCredentialResponse verifyFrpCredential(IGateKeeperService gatekeeper, |
| LockscreenCredential userCredential, |
| ICheckCredentialProgressCallback progressCallback) { |
| PersistentData persistentData = mStorage.readPersistentDataBlock(); |
| if (persistentData.type == PersistentData.TYPE_SP) { |
| PasswordData pwd = PasswordData.fromBytes(persistentData.payload); |
| byte[] pwdToken = computePasswordToken(userCredential, pwd); |
| |
| GateKeeperResponse response; |
| try { |
| response = gatekeeper.verifyChallenge(fakeUid(persistentData.userId), |
| 0 /* challenge */, pwd.passwordHandle, passwordTokenToGkInput(pwdToken)); |
| } catch (RemoteException e) { |
| Log.e(TAG, "FRP verifyChallenge failed", e); |
| return VerifyCredentialResponse.ERROR; |
| } |
| return VerifyCredentialResponse.fromGateKeeperResponse(response); |
| } else if (persistentData.type == PersistentData.TYPE_SP_WEAVER) { |
| PasswordData pwd = PasswordData.fromBytes(persistentData.payload); |
| byte[] pwdToken = computePasswordToken(userCredential, pwd); |
| int weaverSlot = persistentData.userId; |
| |
| return weaverVerify(weaverSlot, passwordTokenToWeaverKey(pwdToken)).stripPayload(); |
| } else { |
| Log.e(TAG, "persistentData.type must be TYPE_SP or TYPE_SP_WEAVER, but is " |
| + persistentData.type); |
| return VerifyCredentialResponse.ERROR; |
| } |
| } |
| |
| |
| public void migrateFrpPasswordLocked(long handle, UserInfo userInfo, int requestedQuality) { |
| if (mStorage.getPersistentDataBlockManager() != null |
| && LockPatternUtils.userOwnsFrpCredential(mContext, userInfo)) { |
| PasswordData pwd = PasswordData.fromBytes(loadState(PASSWORD_DATA_NAME, handle, |
| userInfo.id)); |
| if (pwd.credentialType != LockPatternUtils.CREDENTIAL_TYPE_NONE) { |
| int weaverSlot = loadWeaverSlot(handle, userInfo.id); |
| if (weaverSlot != INVALID_WEAVER_SLOT) { |
| synchronizeWeaverFrpPassword(pwd, requestedQuality, userInfo.id, weaverSlot); |
| } else { |
| synchronizeFrpPassword(pwd, requestedQuality, userInfo.id); |
| } |
| } |
| } |
| } |
| |
| private void synchronizeFrpPassword(PasswordData pwd, |
| int requestedQuality, int userId) { |
| if (mStorage.getPersistentDataBlockManager() != null |
| && LockPatternUtils.userOwnsFrpCredential(mContext, |
| mUserManager.getUserInfo(userId))) { |
| if (pwd.credentialType != LockPatternUtils.CREDENTIAL_TYPE_NONE) { |
| mStorage.writePersistentDataBlock(PersistentData.TYPE_SP, userId, requestedQuality, |
| pwd.toBytes()); |
| } else { |
| mStorage.writePersistentDataBlock(PersistentData.TYPE_NONE, userId, 0, null); |
| } |
| } |
| } |
| |
| private void synchronizeWeaverFrpPassword(PasswordData pwd, int requestedQuality, int userId, |
| int weaverSlot) { |
| if (mStorage.getPersistentDataBlockManager() != null |
| && LockPatternUtils.userOwnsFrpCredential(mContext, |
| mUserManager.getUserInfo(userId))) { |
| if (pwd.credentialType != LockPatternUtils.CREDENTIAL_TYPE_NONE) { |
| mStorage.writePersistentDataBlock(PersistentData.TYPE_SP_WEAVER, weaverSlot, |
| requestedQuality, pwd.toBytes()); |
| } else { |
| mStorage.writePersistentDataBlock(PersistentData.TYPE_NONE, 0, 0, null); |
| } |
| } |
| } |
| |
| private ArrayMap<Integer, ArrayMap<Long, TokenData>> tokenMap = new ArrayMap<>(); |
| |
| /** |
| * Create a token based Synthetic password for the given user. |
| * @return the handle of the token |
| */ |
| public long createTokenBasedSyntheticPassword(byte[] token, int userId, |
| @Nullable EscrowTokenStateChangeCallback changeCallback) { |
| long handle = generateHandle(); |
| if (!tokenMap.containsKey(userId)) { |
| tokenMap.put(userId, new ArrayMap<>()); |
| } |
| TokenData tokenData = new TokenData(); |
| final byte[] secdiscardable = secureRandom(SECDISCARDABLE_LENGTH); |
| if (isWeaverAvailable()) { |
| tokenData.weaverSecret = secureRandom(mWeaverConfig.valueSize); |
| tokenData.secdiscardableOnDisk = SyntheticPasswordCrypto.encrypt(tokenData.weaverSecret, |
| PERSONALISATION_WEAVER_TOKEN, secdiscardable); |
| } else { |
| tokenData.secdiscardableOnDisk = secdiscardable; |
| tokenData.weaverSecret = null; |
| } |
| tokenData.aggregatedSecret = transformUnderSecdiscardable(token, secdiscardable); |
| tokenData.mCallback = changeCallback; |
| |
| tokenMap.get(userId).put(handle, tokenData); |
| return handle; |
| } |
| |
| public Set<Long> getPendingTokensForUser(int userId) { |
| if (!tokenMap.containsKey(userId)) { |
| return Collections.emptySet(); |
| } |
| return tokenMap.get(userId).keySet(); |
| } |
| |
| public boolean removePendingToken(long handle, int userId) { |
| if (!tokenMap.containsKey(userId)) { |
| return false; |
| } |
| return tokenMap.get(userId).remove(handle) != null; |
| } |
| |
| public boolean activateTokenBasedSyntheticPassword(long handle, AuthenticationToken authToken, |
| int userId) { |
| if (!tokenMap.containsKey(userId)) { |
| return false; |
| } |
| TokenData tokenData = tokenMap.get(userId).get(handle); |
| if (tokenData == null) { |
| return false; |
| } |
| if (!loadEscrowData(authToken, userId)) { |
| Log.w(TAG, "User is not escrowable"); |
| return false; |
| } |
| if (isWeaverAvailable()) { |
| int slot = getNextAvailableWeaverSlot(); |
| Log.i(TAG, "Weaver enroll token to slot " + slot + " for user " + userId); |
| if (weaverEnroll(slot, null, tokenData.weaverSecret) == null) { |
| Log.e(TAG, "Failed to enroll weaver secret when activating token"); |
| return false; |
| } |
| saveWeaverSlot(slot, handle, userId); |
| mPasswordSlotManager.markSlotInUse(slot); |
| } |
| saveSecdiscardable(handle, tokenData.secdiscardableOnDisk, userId); |
| createSyntheticPasswordBlob(handle, SYNTHETIC_PASSWORD_TOKEN_BASED, authToken, |
| tokenData.aggregatedSecret, 0L, userId); |
| tokenMap.get(userId).remove(handle); |
| if (tokenData.mCallback != null) { |
| tokenData.mCallback.onEscrowTokenActivated(handle, userId); |
| } |
| return true; |
| } |
| |
| private void createSyntheticPasswordBlob(long handle, byte type, AuthenticationToken authToken, |
| byte[] applicationId, long sid, int userId) { |
| final byte[] secret; |
| if (type == SYNTHETIC_PASSWORD_TOKEN_BASED) { |
| secret = authToken.computeP0(); |
| } else { |
| secret = authToken.syntheticPassword.getBytes(); |
| } |
| byte[] content = createSPBlob(getHandleName(handle), secret, applicationId, sid); |
| byte[] blob = new byte[content.length + 1 + 1]; |
| /* |
| * We can upgrade from v1 to v2 because that's just a change in the way that |
| * the SP is stored. However, we can't upgrade to v3 because that is a change |
| * in the way that passwords are derived from the SP. |
| */ |
| if (authToken.mVersion == SYNTHETIC_PASSWORD_VERSION_V3) { |
| blob[0] = SYNTHETIC_PASSWORD_VERSION_V3; |
| } else { |
| blob[0] = SYNTHETIC_PASSWORD_VERSION_V2; |
| } |
| blob[1] = type; |
| System.arraycopy(content, 0, blob, 2, content.length); |
| saveState(SP_BLOB_NAME, blob, handle, userId); |
| } |
| |
| /** |
| * Decrypt a synthetic password by supplying the user credential and corresponding password |
| * blob handle generated previously. If the decryption is successful, initiate a GateKeeper |
| * verification to referesh the SID & Auth token maintained by the system. |
| */ |
| public AuthenticationResult unwrapPasswordBasedSyntheticPassword(IGateKeeperService gatekeeper, |
| long handle, @NonNull LockscreenCredential credential, int userId, |
| ICheckCredentialProgressCallback progressCallback) { |
| AuthenticationResult result = new AuthenticationResult(); |
| PasswordData pwd = PasswordData.fromBytes(loadState(PASSWORD_DATA_NAME, handle, userId)); |
| |
| if (!credential.checkAgainstStoredType(pwd.credentialType)) { |
| Slog.e(TAG, String.format("Credential type mismatch: expected %d actual %d", |
| pwd.credentialType, credential.getType())); |
| result.gkResponse = VerifyCredentialResponse.ERROR; |
| return result; |
| } |
| |
| byte[] pwdToken = computePasswordToken(credential, pwd); |
| |
| final byte[] applicationId; |
| final long sid; |
| int weaverSlot = loadWeaverSlot(handle, userId); |
| if (weaverSlot != INVALID_WEAVER_SLOT) { |
| // Weaver based user password |
| if (!isWeaverAvailable()) { |
| Log.e(TAG, "No weaver service to unwrap password based SP"); |
| result.gkResponse = VerifyCredentialResponse.ERROR; |
| return result; |
| } |
| result.gkResponse = weaverVerify(weaverSlot, passwordTokenToWeaverKey(pwdToken)); |
| if (result.gkResponse.getResponseCode() != VerifyCredentialResponse.RESPONSE_OK) { |
| return result; |
| } |
| sid = GateKeeper.INVALID_SECURE_USER_ID; |
| applicationId = transformUnderWeaverSecret(pwdToken, result.gkResponse.getPayload()); |
| } else { |
| byte[] gkPwdToken = passwordTokenToGkInput(pwdToken); |
| GateKeeperResponse response; |
| try { |
| response = gatekeeper.verifyChallenge(fakeUid(userId), 0L, |
| pwd.passwordHandle, gkPwdToken); |
| } catch (RemoteException e) { |
| Log.e(TAG, "gatekeeper verify failed", e); |
| result.gkResponse = VerifyCredentialResponse.ERROR; |
| return result; |
| } |
| int responseCode = response.getResponseCode(); |
| if (responseCode == GateKeeperResponse.RESPONSE_OK) { |
| result.gkResponse = VerifyCredentialResponse.OK; |
| if (response.getShouldReEnroll()) { |
| GateKeeperResponse reenrollResponse; |
| try { |
| reenrollResponse = gatekeeper.enroll(fakeUid(userId), |
| pwd.passwordHandle, gkPwdToken, gkPwdToken); |
| } catch (RemoteException e) { |
| Log.w(TAG, "Fail to invoke gatekeeper.enroll", e); |
| reenrollResponse = GateKeeperResponse.ERROR; |
| // continue the flow anyway |
| } |
| if (reenrollResponse.getResponseCode() == GateKeeperResponse.RESPONSE_OK) { |
| pwd.passwordHandle = reenrollResponse.getPayload(); |
| // Use the reenrollment opportunity to update credential type |
| // (getting rid of CREDENTIAL_TYPE_PASSWORD_OR_PIN) |
| pwd.credentialType = credential.getType(); |
| saveState(PASSWORD_DATA_NAME, pwd.toBytes(), handle, userId); |
| synchronizeFrpPassword(pwd, 0, userId); |
| } else { |
| Log.w(TAG, "Fail to re-enroll user password for user " + userId); |
| // continue the flow anyway |
| } |
| } |
| } else if (responseCode == GateKeeperResponse.RESPONSE_RETRY) { |
| result.gkResponse = new VerifyCredentialResponse(response.getTimeout()); |
| return result; |
| } else { |
| result.gkResponse = VerifyCredentialResponse.ERROR; |
| return result; |
| } |
| sid = sidFromPasswordHandle(pwd.passwordHandle); |
| applicationId = transformUnderSecdiscardable(pwdToken, |
| loadSecdiscardable(handle, userId)); |
| } |
| // Supplied credential passes first stage weaver/gatekeeper check so it should be correct. |
| // Notify the callback so the keyguard UI can proceed immediately. |
| if (progressCallback != null) { |
| try { |
| progressCallback.onCredentialVerified(); |
| } catch (RemoteException e) { |
| Log.w(TAG, "progressCallback throws exception", e); |
| } |
| } |
| result.authToken = unwrapSyntheticPasswordBlob(handle, SYNTHETIC_PASSWORD_PASSWORD_BASED, |
| applicationId, sid, userId); |
| |
| // Perform verifyChallenge to refresh auth tokens for GK if user password exists. |
| result.gkResponse = verifyChallenge(gatekeeper, result.authToken, 0L, userId); |
| return result; |
| } |
| |
| /** |
| * Decrypt a synthetic password by supplying an escrow token and corresponding token |
| * blob handle generated previously. If the decryption is successful, initiate a GateKeeper |
| * verification to referesh the SID & Auth token maintained by the system. |
| */ |
| public @NonNull AuthenticationResult unwrapTokenBasedSyntheticPassword( |
| IGateKeeperService gatekeeper, long handle, byte[] token, int userId) { |
| AuthenticationResult result = new AuthenticationResult(); |
| byte[] secdiscardable = loadSecdiscardable(handle, userId); |
| int slotId = loadWeaverSlot(handle, userId); |
| if (slotId != INVALID_WEAVER_SLOT) { |
| if (!isWeaverAvailable()) { |
| Log.e(TAG, "No weaver service to unwrap token based SP"); |
| result.gkResponse = VerifyCredentialResponse.ERROR; |
| return result; |
| } |
| VerifyCredentialResponse response = weaverVerify(slotId, null); |
| if (response.getResponseCode() != VerifyCredentialResponse.RESPONSE_OK || |
| response.getPayload() == null) { |
| Log.e(TAG, "Failed to retrieve weaver secret when unwrapping token"); |
| result.gkResponse = VerifyCredentialResponse.ERROR; |
| return result; |
| } |
| secdiscardable = SyntheticPasswordCrypto.decrypt(response.getPayload(), |
| PERSONALISATION_WEAVER_TOKEN, secdiscardable); |
| } |
| byte[] applicationId = transformUnderSecdiscardable(token, secdiscardable); |
| result.authToken = unwrapSyntheticPasswordBlob(handle, SYNTHETIC_PASSWORD_TOKEN_BASED, |
| applicationId, 0L, userId); |
| if (result.authToken != null) { |
| result.gkResponse = verifyChallenge(gatekeeper, result.authToken, 0L, userId); |
| if (result.gkResponse == null) { |
| // The user currently has no password. return OK with null payload so null |
| // is propagated to unlockUser() |
| result.gkResponse = VerifyCredentialResponse.OK; |
| } |
| } else { |
| result.gkResponse = VerifyCredentialResponse.ERROR; |
| } |
| return result; |
| } |
| |
| private AuthenticationToken unwrapSyntheticPasswordBlob(long handle, byte type, |
| byte[] applicationId, long sid, int userId) { |
| byte[] blob = loadState(SP_BLOB_NAME, handle, userId); |
| if (blob == null) { |
| return null; |
| } |
| final byte version = blob[0]; |
| if (version != SYNTHETIC_PASSWORD_VERSION_V3 |
| && version != SYNTHETIC_PASSWORD_VERSION_V2 |
| && version != SYNTHETIC_PASSWORD_VERSION_V1) { |
| throw new IllegalArgumentException("Unknown blob version"); |
| } |
| if (blob[1] != type) { |
| throw new IllegalArgumentException("Invalid blob type"); |
| } |
| final byte[] secret; |
| if (version == SYNTHETIC_PASSWORD_VERSION_V1) { |
| secret = SyntheticPasswordCrypto.decryptBlobV1(getHandleName(handle), |
| Arrays.copyOfRange(blob, 2, blob.length), applicationId); |
| } else { |
| secret = decryptSPBlob(getHandleName(handle), |
| Arrays.copyOfRange(blob, 2, blob.length), applicationId); |
| } |
| if (secret == null) { |
| Log.e(TAG, "Fail to decrypt SP for user " + userId); |
| return null; |
| } |
| AuthenticationToken result = new AuthenticationToken(version); |
| if (type == SYNTHETIC_PASSWORD_TOKEN_BASED) { |
| if (!loadEscrowData(result, userId)) { |
| Log.e(TAG, "User is not escrowable: " + userId); |
| return null; |
| } |
| result.recreate(secret); |
| } else { |
| result.syntheticPassword = new String(secret); |
| } |
| if (version == SYNTHETIC_PASSWORD_VERSION_V1) { |
| Log.i(TAG, "Upgrade v1 SP blob for user " + userId + ", type = " + type); |
| createSyntheticPasswordBlob(handle, type, result, applicationId, sid, userId); |
| } |
| return result; |
| } |
| |
| /** |
| * performs GK verifyChallenge and returns auth token, re-enrolling SP password handle |
| * if required. |
| * |
| * Normally performing verifyChallenge with an AuthenticationToken should always return |
| * RESPONSE_OK, since user authentication failures are detected earlier when trying to |
| * decrypt SP. |
| */ |
| public @Nullable VerifyCredentialResponse verifyChallenge(IGateKeeperService gatekeeper, |
| @NonNull AuthenticationToken auth, long challenge, int userId) { |
| byte[] spHandle = loadSyntheticPasswordHandle(userId); |
| if (spHandle == null) { |
| // There is no password handle associated with the given user, i.e. the user is not |
| // secured by lockscreen and has no SID, so just return here; |
| return null; |
| } |
| GateKeeperResponse response; |
| try { |
| response = gatekeeper.verifyChallenge(userId, challenge, |
| spHandle, auth.deriveGkPassword()); |
| } catch (RemoteException e) { |
| Log.e(TAG, "Fail to verify with gatekeeper " + userId, e); |
| return VerifyCredentialResponse.ERROR; |
| } |
| int responseCode = response.getResponseCode(); |
| if (responseCode == GateKeeperResponse.RESPONSE_OK) { |
| VerifyCredentialResponse result = new VerifyCredentialResponse(response.getPayload()); |
| if (response.getShouldReEnroll()) { |
| try { |
| response = gatekeeper.enroll(userId, spHandle, spHandle, |
| auth.deriveGkPassword()); |
| } catch (RemoteException e) { |
| Log.e(TAG, "Failed to invoke gatekeeper.enroll", e); |
| response = GateKeeperResponse.ERROR; |
| } |
| if (response.getResponseCode() == GateKeeperResponse.RESPONSE_OK) { |
| spHandle = response.getPayload(); |
| saveSyntheticPasswordHandle(spHandle, userId); |
| // Call self again to re-verify with updated handle |
| return verifyChallenge(gatekeeper, auth, challenge, userId); |
| } else { |
| // Fall through, return result from the previous verification attempt. |
| Log.w(TAG, "Fail to re-enroll SP handle for user " + userId); |
| } |
| } |
| return result; |
| } else if (responseCode == GateKeeperResponse.RESPONSE_RETRY) { |
| return new VerifyCredentialResponse(response.getTimeout()); |
| } else { |
| return VerifyCredentialResponse.ERROR; |
| } |
| } |
| |
| public boolean existsHandle(long handle, int userId) { |
| return hasState(SP_BLOB_NAME, handle, userId); |
| } |
| |
| public void destroyTokenBasedSyntheticPassword(long handle, int userId) { |
| destroySyntheticPassword(handle, userId); |
| destroyState(SECDISCARDABLE_NAME, handle, userId); |
| } |
| |
| public void destroyPasswordBasedSyntheticPassword(long handle, int userId) { |
| destroySyntheticPassword(handle, userId); |
| destroyState(SECDISCARDABLE_NAME, handle, userId); |
| destroyState(PASSWORD_DATA_NAME, handle, userId); |
| } |
| |
| private void destroySyntheticPassword(long handle, int userId) { |
| destroyState(SP_BLOB_NAME, handle, userId); |
| destroySPBlobKey(getHandleName(handle)); |
| if (hasState(WEAVER_SLOT_NAME, handle, userId)) { |
| destroyWeaverSlot(handle, userId); |
| } |
| } |
| |
| private byte[] transformUnderWeaverSecret(byte[] data, byte[] secret) { |
| byte[] weaverSecret = SyntheticPasswordCrypto.personalisedHash( |
| PERSONALISATION_WEAVER_PASSWORD, secret); |
| byte[] result = new byte[data.length + weaverSecret.length]; |
| System.arraycopy(data, 0, result, 0, data.length); |
| System.arraycopy(weaverSecret, 0, result, data.length, weaverSecret.length); |
| return result; |
| } |
| |
| private byte[] transformUnderSecdiscardable(byte[] data, byte[] rawSecdiscardable) { |
| byte[] secdiscardable = SyntheticPasswordCrypto.personalisedHash( |
| PERSONALISATION_SECDISCARDABLE, rawSecdiscardable); |
| byte[] result = new byte[data.length + secdiscardable.length]; |
| System.arraycopy(data, 0, result, 0, data.length); |
| System.arraycopy(secdiscardable, 0, result, data.length, secdiscardable.length); |
| return result; |
| } |
| |
| private byte[] createSecdiscardable(long handle, int userId) { |
| byte[] data = secureRandom(SECDISCARDABLE_LENGTH); |
| saveSecdiscardable(handle, data, userId); |
| return data; |
| } |
| |
| private void saveSecdiscardable(long handle, byte[] secdiscardable, int userId) { |
| saveState(SECDISCARDABLE_NAME, secdiscardable, handle, userId); |
| } |
| |
| private byte[] loadSecdiscardable(long handle, int userId) { |
| return loadState(SECDISCARDABLE_NAME, handle, userId); |
| } |
| |
| private boolean hasState(String stateName, long handle, int userId) { |
| return !ArrayUtils.isEmpty(loadState(stateName, handle, userId)); |
| } |
| |
| private byte[] loadState(String stateName, long handle, int userId) { |
| return mStorage.readSyntheticPasswordState(userId, handle, stateName); |
| } |
| |
| private void saveState(String stateName, byte[] data, long handle, int userId) { |
| mStorage.writeSyntheticPasswordState(userId, handle, stateName, data); |
| } |
| |
| private void destroyState(String stateName, long handle, int userId) { |
| mStorage.deleteSyntheticPasswordState(userId, handle, stateName); |
| } |
| |
| protected byte[] decryptSPBlob(String blobKeyName, byte[] blob, byte[] applicationId) { |
| return SyntheticPasswordCrypto.decryptBlob(blobKeyName, blob, applicationId); |
| } |
| |
| protected byte[] createSPBlob(String blobKeyName, byte[] data, byte[] applicationId, long sid) { |
| return SyntheticPasswordCrypto.createBlob(blobKeyName, data, applicationId, sid); |
| } |
| |
| protected void destroySPBlobKey(String keyAlias) { |
| SyntheticPasswordCrypto.destroyBlobKey(keyAlias); |
| } |
| |
| public static long generateHandle() { |
| SecureRandom rng = new SecureRandom(); |
| long result; |
| do { |
| result = rng.nextLong(); |
| } while (result == DEFAULT_HANDLE); |
| return result; |
| } |
| |
| private int fakeUid(int uid) { |
| return 100000 + uid; |
| } |
| |
| protected static byte[] secureRandom(int length) { |
| try { |
| return SecureRandom.getInstance("SHA1PRNG").generateSeed(length); |
| } catch (NoSuchAlgorithmException e) { |
| e.printStackTrace(); |
| return null; |
| } |
| } |
| |
| private String getHandleName(long handle) { |
| return String.format("%s%x", LockPatternUtils.SYNTHETIC_PASSWORD_KEY_PREFIX, handle); |
| } |
| |
| private byte[] computePasswordToken(LockscreenCredential credential, PasswordData data) { |
| final byte[] password = credential.isNone() ? DEFAULT_PASSWORD : credential.getCredential(); |
| return scrypt(password, data.salt, 1 << data.scryptN, 1 << data.scryptR, 1 << data.scryptP, |
| PASSWORD_TOKEN_LENGTH); |
| } |
| |
| private byte[] passwordTokenToGkInput(byte[] token) { |
| return SyntheticPasswordCrypto.personalisedHash(PERSONALIZATION_USER_GK_AUTH, token); |
| } |
| |
| private byte[] passwordTokenToWeaverKey(byte[] token) { |
| byte[] key = SyntheticPasswordCrypto.personalisedHash(PERSONALISATION_WEAVER_KEY, token); |
| if (key.length < mWeaverConfig.keySize) { |
| throw new IllegalArgumentException("weaver key length too small"); |
| } |
| return Arrays.copyOf(key, mWeaverConfig.keySize); |
| } |
| |
| protected long sidFromPasswordHandle(byte[] handle) { |
| return nativeSidFromPasswordHandle(handle); |
| } |
| |
| protected byte[] scrypt(byte[] password, byte[] salt, int n, int r, int p, int outLen) { |
| return new Scrypt().scrypt(password, salt, n, r, p, outLen); |
| } |
| |
| native long nativeSidFromPasswordHandle(byte[] handle); |
| |
| protected static ArrayList<Byte> toByteArrayList(byte[] data) { |
| ArrayList<Byte> result = new ArrayList<Byte>(data.length); |
| for (int i = 0; i < data.length; i++) { |
| result.add(data[i]); |
| } |
| return result; |
| } |
| |
| protected static byte[] fromByteArrayList(ArrayList<Byte> data) { |
| byte[] result = new byte[data.size()]; |
| for (int i = 0; i < data.size(); i++) { |
| result[i] = data.get(i); |
| } |
| return result; |
| } |
| |
| protected static final byte[] HEX_ARRAY = "0123456789ABCDEF".getBytes(); |
| private static byte[] bytesToHex(byte[] bytes) { |
| if (bytes == null) { |
| return "null".getBytes(); |
| } |
| byte[] hexBytes = new byte[bytes.length * 2]; |
| for ( int j = 0; j < bytes.length; j++ ) { |
| int v = bytes[j] & 0xFF; |
| hexBytes[j * 2] = HEX_ARRAY[v >>> 4]; |
| hexBytes[j * 2 + 1] = HEX_ARRAY[v & 0x0F]; |
| } |
| return hexBytes; |
| } |
| } |