blob: 1a68fb3c9dd2836a13b721470bfb1797c95f3c38 [file] [log] [blame]
Geremy Condrab6310842012-08-23 22:00:15 -07001/*
2 * Copyright (C) 2012 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17package com.android.server.updates;
18
19import android.content.BroadcastReceiver;
20import android.content.ContentResolver;
21import android.content.Context;
22import android.content.Intent;
23import android.provider.Settings;
Geremy Condrab6310842012-08-23 22:00:15 -070024import android.util.Base64;
Geremy Condra7c65e392012-09-11 16:57:17 -070025import android.util.EventLog;
Geremy Condrab6310842012-08-23 22:00:15 -070026import android.util.Slog;
27
Geremy Condra7c65e392012-09-11 16:57:17 -070028import com.android.server.EventLogTags;
29
Geremy Condrab6310842012-08-23 22:00:15 -070030import java.io.ByteArrayInputStream;
31import java.io.File;
Geremy Condrab6310842012-08-23 22:00:15 -070032import java.io.FileOutputStream;
33import java.io.InputStream;
34import java.io.IOException;
Geremy Condrab6310842012-08-23 22:00:15 -070035import java.security.cert.CertificateException;
36import java.security.cert.CertificateFactory;
37import java.security.cert.X509Certificate;
38import java.security.MessageDigest;
39import java.security.NoSuchAlgorithmException;
40import java.security.Signature;
Geremy Condrab6310842012-08-23 22:00:15 -070041
42import libcore.io.IoUtils;
43
44public class ConfigUpdateInstallReceiver extends BroadcastReceiver {
45
46 private static final String TAG = "ConfigUpdateInstallReceiver";
47
48 private static final String EXTRA_CONTENT_PATH = "CONTENT_PATH";
49 private static final String EXTRA_REQUIRED_HASH = "REQUIRED_HASH";
50 private static final String EXTRA_SIGNATURE = "SIGNATURE";
51 private static final String EXTRA_VERSION_NUMBER = "VERSION";
52
53 private static final String UPDATE_CERTIFICATE_KEY = "config_update_certificate";
54
Geremy Condraa2dffda2013-04-06 14:01:40 -070055 protected final File updateDir;
56 protected final File updateContent;
57 protected final File updateVersion;
Geremy Condrab6310842012-08-23 22:00:15 -070058
59 public ConfigUpdateInstallReceiver(String updateDir, String updateContentPath,
60 String updateMetadataPath, String updateVersionPath) {
61 this.updateDir = new File(updateDir);
62 this.updateContent = new File(updateDir, updateContentPath);
63 File updateMetadataDir = new File(updateDir, updateMetadataPath);
64 this.updateVersion = new File(updateMetadataDir, updateVersionPath);
65 }
66
67 @Override
68 public void onReceive(final Context context, final Intent intent) {
69 new Thread() {
70 @Override
71 public void run() {
72 try {
73 // get the certificate from Settings.Secure
74 X509Certificate cert = getCert(context.getContentResolver());
75 // get the content path from the extras
Geremy Condraad462d22013-01-30 11:19:54 -080076 byte[] altContent = getAltContent(intent);
Geremy Condrab6310842012-08-23 22:00:15 -070077 // get the version from the extras
78 int altVersion = getVersionFromIntent(intent);
79 // get the previous value from the extras
80 String altRequiredHash = getRequiredHashFromIntent(intent);
81 // get the signature from the extras
82 String altSig = getSignatureFromIntent(intent);
83 // get the version currently being used
84 int currentVersion = getCurrentVersion();
85 // get the hash of the currently used value
86 String currentHash = getCurrentHash(getCurrentContent());
87 if (!verifyVersion(currentVersion, altVersion)) {
Geremy Condra0967a9e2012-09-19 21:22:42 -070088 Slog.i(TAG, "Not installing, new version is <= current version");
Geremy Condrab6310842012-08-23 22:00:15 -070089 } else if (!verifyPreviousHash(currentHash, altRequiredHash)) {
Geremy Condrabeb9d5392012-09-17 13:29:56 -070090 EventLog.writeEvent(EventLogTags.CONFIG_INSTALL_FAILED,
91 "Current hash did not match required value");
Geremy Condrab6310842012-08-23 22:00:15 -070092 } else if (!verifySignature(altContent, altVersion, altRequiredHash, altSig,
93 cert)) {
Geremy Condrabeb9d5392012-09-17 13:29:56 -070094 EventLog.writeEvent(EventLogTags.CONFIG_INSTALL_FAILED,
95 "Signature did not verify");
Geremy Condrab6310842012-08-23 22:00:15 -070096 } else {
97 // install the new content
98 Slog.i(TAG, "Found new update, installing...");
99 install(altContent, altVersion);
100 Slog.i(TAG, "Installation successful");
Geremy Condra4e7f7e82013-03-26 21:09:01 -0700101 postInstall(context, intent);
Geremy Condrab6310842012-08-23 22:00:15 -0700102 }
103 } catch (Exception e) {
104 Slog.e(TAG, "Could not update content!", e);
Geremy Condrabeb9d5392012-09-17 13:29:56 -0700105 // keep the error message <= 100 chars
106 String errMsg = e.toString();
107 if (errMsg.length() > 100) {
108 errMsg = errMsg.substring(0, 99);
109 }
110 EventLog.writeEvent(EventLogTags.CONFIG_INSTALL_FAILED, errMsg);
Geremy Condrab6310842012-08-23 22:00:15 -0700111 }
112 }
113 }.start();
114 }
115
116 private X509Certificate getCert(ContentResolver cr) {
117 // get the cert from settings
118 String cert = Settings.Secure.getString(cr, UPDATE_CERTIFICATE_KEY);
119 // convert it into a real certificate
120 try {
121 byte[] derCert = Base64.decode(cert.getBytes(), Base64.DEFAULT);
122 InputStream istream = new ByteArrayInputStream(derCert);
123 CertificateFactory cf = CertificateFactory.getInstance("X.509");
124 return (X509Certificate) cf.generateCertificate(istream);
125 } catch (CertificateException e) {
Robert Greenwaltc6fa2372012-09-24 13:57:16 -0700126 throw new IllegalStateException("Got malformed certificate from settings, ignoring");
Geremy Condrab6310842012-08-23 22:00:15 -0700127 }
128 }
129
130 private String getContentFromIntent(Intent i) {
131 String extraValue = i.getStringExtra(EXTRA_CONTENT_PATH);
132 if (extraValue == null) {
133 throw new IllegalStateException("Missing required content path, ignoring.");
134 }
135 return extraValue;
136 }
137
138 private int getVersionFromIntent(Intent i) throws NumberFormatException {
139 String extraValue = i.getStringExtra(EXTRA_VERSION_NUMBER);
140 if (extraValue == null) {
141 throw new IllegalStateException("Missing required version number, ignoring.");
142 }
143 return Integer.parseInt(extraValue.trim());
144 }
145
146 private String getRequiredHashFromIntent(Intent i) {
147 String extraValue = i.getStringExtra(EXTRA_REQUIRED_HASH);
148 if (extraValue == null) {
149 throw new IllegalStateException("Missing required previous hash, ignoring.");
150 }
151 return extraValue.trim();
152 }
153
154 private String getSignatureFromIntent(Intent i) {
155 String extraValue = i.getStringExtra(EXTRA_SIGNATURE);
156 if (extraValue == null) {
157 throw new IllegalStateException("Missing required signature, ignoring.");
158 }
159 return extraValue.trim();
160 }
161
162 private int getCurrentVersion() throws NumberFormatException {
163 try {
164 String strVersion = IoUtils.readFileAsString(updateVersion.getCanonicalPath()).trim();
165 return Integer.parseInt(strVersion);
166 } catch (IOException e) {
Robert Greenwaltc6fa2372012-09-24 13:57:16 -0700167 Slog.i(TAG, "Couldn't find current metadata, assuming first update");
Geremy Condrab6310842012-08-23 22:00:15 -0700168 return 0;
169 }
170 }
171
Geremy Condraad462d22013-01-30 11:19:54 -0800172 private byte[] getAltContent(Intent i) throws IOException {
173 return IoUtils.readFileAsByteArray(getContentFromIntent(i));
Geremy Condrab6310842012-08-23 22:00:15 -0700174 }
175
Geremy Condraad462d22013-01-30 11:19:54 -0800176 private byte[] getCurrentContent() {
Geremy Condrab6310842012-08-23 22:00:15 -0700177 try {
Geremy Condraad462d22013-01-30 11:19:54 -0800178 return IoUtils.readFileAsByteArray(updateContent.getCanonicalPath());
Geremy Condrab6310842012-08-23 22:00:15 -0700179 } catch (IOException e) {
Robert Greenwaltc6fa2372012-09-24 13:57:16 -0700180 Slog.i(TAG, "Failed to read current content, assuming first update!");
Geremy Condrab6310842012-08-23 22:00:15 -0700181 return null;
182 }
183 }
184
Geremy Condraad462d22013-01-30 11:19:54 -0800185 private static String getCurrentHash(byte[] content) {
Geremy Condrab6310842012-08-23 22:00:15 -0700186 if (content == null) {
187 return "0";
188 }
189 try {
190 MessageDigest dgst = MessageDigest.getInstance("SHA512");
Geremy Condraad462d22013-01-30 11:19:54 -0800191 byte[] fingerprint = dgst.digest(content);
Geremy Condrab6310842012-08-23 22:00:15 -0700192 return IntegralToString.bytesToHexString(fingerprint, false);
193 } catch (NoSuchAlgorithmException e) {
194 throw new AssertionError(e);
195 }
196 }
197
198 private boolean verifyVersion(int current, int alternative) {
199 return (current < alternative);
200 }
201
202 private boolean verifyPreviousHash(String current, String required) {
203 // this is an optional value- if the required field is NONE then we ignore it
204 if (required.equals("NONE")) {
205 return true;
206 }
207 // otherwise, verify that we match correctly
208 return current.equals(required);
209 }
210
Geremy Condraad462d22013-01-30 11:19:54 -0800211 private boolean verifySignature(byte[] content, int version, String requiredPrevious,
Geremy Condrab6310842012-08-23 22:00:15 -0700212 String signature, X509Certificate cert) throws Exception {
213 Signature signer = Signature.getInstance("SHA512withRSA");
214 signer.initVerify(cert);
Geremy Condraad462d22013-01-30 11:19:54 -0800215 signer.update(content);
Geremy Condrab6310842012-08-23 22:00:15 -0700216 signer.update(Long.toString(version).getBytes());
217 signer.update(requiredPrevious.getBytes());
218 return signer.verify(Base64.decode(signature.getBytes(), Base64.DEFAULT));
219 }
220
Geremy Condraa2dffda2013-04-06 14:01:40 -0700221 protected void writeUpdate(File dir, File file, byte[] content) throws IOException {
Geremy Condrab6310842012-08-23 22:00:15 -0700222 FileOutputStream out = null;
223 File tmp = null;
224 try {
Geremy Condra755b8772012-09-11 01:11:02 -0700225 // create the parents for the destination file
226 File parent = file.getParentFile();
227 parent.mkdirs();
228 // check that they were created correctly
229 if (!parent.exists()) {
230 throw new IOException("Failed to create directory " + parent.getCanonicalPath());
231 }
Geremy Condra9765f942013-04-04 17:48:09 -0700232 // create the temporary file
233 tmp = File.createTempFile("journal", "", dir);
Geremy Condrab6310842012-08-23 22:00:15 -0700234 // mark tmp -rw-r--r--
235 tmp.setReadable(true, false);
236 // write to it
237 out = new FileOutputStream(tmp);
Geremy Condraad462d22013-01-30 11:19:54 -0800238 out.write(content);
Geremy Condrab6310842012-08-23 22:00:15 -0700239 // sync to disk
Geremy Condra755b8772012-09-11 01:11:02 -0700240 out.getFD().sync();
Geremy Condrab6310842012-08-23 22:00:15 -0700241 // atomic rename
Geremy Condra755b8772012-09-11 01:11:02 -0700242 if (!tmp.renameTo(file)) {
243 throw new IOException("Failed to atomically rename " + file.getCanonicalPath());
244 }
Geremy Condrab6310842012-08-23 22:00:15 -0700245 } finally {
246 if (tmp != null) {
247 tmp.delete();
248 }
249 IoUtils.closeQuietly(out);
250 }
251 }
252
Geremy Condra78a4c712013-01-30 11:20:26 -0800253 protected void install(byte[] content, int version) throws IOException {
Geremy Condrab6310842012-08-23 22:00:15 -0700254 writeUpdate(updateDir, updateContent, content);
Geremy Condraad462d22013-01-30 11:19:54 -0800255 writeUpdate(updateDir, updateVersion, Long.toString(version).getBytes());
Geremy Condrab6310842012-08-23 22:00:15 -0700256 }
Geremy Condra4e7f7e82013-03-26 21:09:01 -0700257
258 protected void postInstall(Context context, Intent intent) {
259 }
Geremy Condrab6310842012-08-23 22:00:15 -0700260}