| /* |
| * Copyright (C) 2012 The Android Open Source Project |
| * |
| * Licensed under the Apache License, Version 2.0 (the "License"); |
| * you may not use this file except in compliance with the License. |
| * You may obtain a copy of the License at |
| * |
| * http://www.apache.org/licenses/LICENSE-2.0 |
| * |
| * Unless required by applicable law or agreed to in writing, software |
| * distributed under the License is distributed on an "AS IS" BASIS, |
| * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| * See the License for the specific language governing permissions and |
| * limitations under the License. |
| */ |
| |
| #include <stdio.h> |
| #include <string.h> |
| #include <resolv.h> |
| #include <cutils/list.h> |
| #include <cutils/sockets.h> |
| |
| #include "sysdeps.h" |
| #include "adb.h" |
| #include "adb_auth.h" |
| #include "fdevent.h" |
| #include "mincrypt/rsa.h" |
| |
| #define TRACE_TAG TRACE_AUTH |
| |
| |
| struct adb_public_key { |
| struct listnode node; |
| RSAPublicKey key; |
| }; |
| |
| static struct listnode key_list; |
| |
| static char *key_paths[] = { |
| "/adb_keys", |
| "/data/misc/adb/adb_keys", |
| NULL |
| }; |
| |
| static fdevent listener_fde; |
| static int framework_fd = -1; |
| |
| |
| static void read_keys(const char *file, struct listnode *list) |
| { |
| struct adb_public_key *key; |
| FILE *f; |
| char buf[MAX_PAYLOAD]; |
| char *sep; |
| int ret; |
| |
| f = fopen(file, "r"); |
| if (!f) { |
| D("Can't open '%s'\n", file); |
| return; |
| } |
| |
| while (fgets(buf, sizeof(buf), f)) { |
| /* Allocate 4 extra bytes to decode the base64 data in-place */ |
| key = calloc(1, sizeof(*key) + 4); |
| if (!key) { |
| D("Can't malloc key\n"); |
| break; |
| } |
| |
| sep = strpbrk(buf, " \t"); |
| if (sep) |
| *sep = '\0'; |
| |
| ret = __b64_pton(buf, (u_char *)&key->key, sizeof(key->key) + 4); |
| if (ret != sizeof(key->key)) { |
| D("%s: Invalid base64 data ret=%d\n", file, ret); |
| free(key); |
| continue; |
| } |
| |
| if (key->key.len != RSANUMWORDS) { |
| D("%s: Invalid key len %d\n", file, key->key.len); |
| free(key); |
| continue; |
| } |
| |
| list_add_tail(list, &key->node); |
| } |
| |
| fclose(f); |
| } |
| |
| static void free_keys(struct listnode *list) |
| { |
| struct listnode *item; |
| |
| while (!list_empty(list)) { |
| item = list_head(list); |
| list_remove(item); |
| free(node_to_item(item, struct adb_public_key, node)); |
| } |
| } |
| |
| void adb_auth_reload_keys(void) |
| { |
| char *path; |
| char **paths = key_paths; |
| struct stat buf; |
| |
| free_keys(&key_list); |
| |
| while ((path = *paths++)) { |
| if (!stat(path, &buf)) { |
| D("Loading keys from '%s'\n", path); |
| read_keys(path, &key_list); |
| } |
| } |
| } |
| |
| int adb_auth_generate_token(void *token, size_t token_size) |
| { |
| FILE *f; |
| int ret; |
| |
| f = fopen("/dev/urandom", "r"); |
| if (!f) |
| return 0; |
| |
| ret = fread(token, token_size, 1, f); |
| |
| fclose(f); |
| return ret * token_size; |
| } |
| |
| int adb_auth_verify(void *token, void *sig, int siglen) |
| { |
| struct listnode *item; |
| struct adb_public_key *key; |
| int ret; |
| |
| if (siglen != RSANUMBYTES) |
| return 0; |
| |
| list_for_each(item, &key_list) { |
| key = node_to_item(item, struct adb_public_key, node); |
| ret = RSA_verify(&key->key, sig, siglen, token); |
| if (ret) |
| return 1; |
| } |
| |
| return 0; |
| } |
| |
| static void adb_auth_event(int fd, unsigned events, void *data) |
| { |
| atransport *t = data; |
| char response[2]; |
| int ret; |
| |
| if (events & FDE_READ) { |
| ret = unix_read(fd, response, sizeof(response)); |
| if (ret < 0) { |
| D("Disconnect"); |
| fdevent_remove(&t->auth_fde); |
| framework_fd = -1; |
| } |
| else if (ret == 2 && response[0] == 'O' && response[1] == 'K') { |
| adb_auth_reload_keys(); |
| adb_auth_verified(t); |
| } |
| } |
| } |
| |
| void adb_auth_confirm_key(unsigned char *key, size_t len, atransport *t) |
| { |
| char msg[MAX_PAYLOAD]; |
| int ret; |
| |
| if (framework_fd < 0) { |
| D("Client not connected\n"); |
| return; |
| } |
| |
| if (key[len - 1] != '\0') { |
| D("Key must be a null-terminated string\n"); |
| return; |
| } |
| |
| ret = snprintf(msg, sizeof(msg), "PK%s", key); |
| if (ret >= (signed)sizeof(msg)) { |
| D("Key too long. ret=%d", ret); |
| return; |
| } |
| D("Sending '%s'\n", msg); |
| |
| ret = unix_write(framework_fd, msg, ret); |
| if (ret < 0) { |
| D("Failed to write PK, errno=%d\n", errno); |
| return; |
| } |
| |
| fdevent_install(&t->auth_fde, framework_fd, adb_auth_event, t); |
| fdevent_add(&t->auth_fde, FDE_READ); |
| } |
| |
| static void adb_auth_listener(int fd, unsigned events, void *data) |
| { |
| struct sockaddr addr; |
| socklen_t alen; |
| int s; |
| |
| alen = sizeof(addr); |
| |
| s = adb_socket_accept(fd, &addr, &alen); |
| if (s < 0) { |
| D("Failed to accept: errno=%d\n", errno); |
| return; |
| } |
| |
| framework_fd = s; |
| } |
| |
| void adb_auth_init(void) |
| { |
| int fd, ret; |
| |
| list_init(&key_list); |
| adb_auth_reload_keys(); |
| |
| fd = android_get_control_socket("adbd"); |
| if (fd < 0) { |
| D("Failed to get adbd socket\n"); |
| return; |
| } |
| |
| ret = listen(fd, 4); |
| if (ret < 0) { |
| D("Failed to listen on '%d'\n", fd); |
| return; |
| } |
| |
| fdevent_install(&listener_fde, fd, adb_auth_listener, NULL); |
| fdevent_add(&listener_fde, FDE_READ); |
| } |