|  | /* | 
|  | * Copyright (C) 2012 The Android Open Source Project | 
|  | * | 
|  | * Licensed under the Apache License, Version 2.0 (the "License"); | 
|  | * you may not use this file except in compliance with the License. | 
|  | * You may obtain a copy of the License at | 
|  | * | 
|  | *      http://www.apache.org/licenses/LICENSE-2.0 | 
|  | * | 
|  | * Unless required by applicable law or agreed to in writing, software | 
|  | * distributed under the License is distributed on an "AS IS" BASIS, | 
|  | * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | 
|  | * See the License for the specific language governing permissions and | 
|  | * limitations under the License. | 
|  | */ | 
|  |  | 
|  | #include <stdio.h> | 
|  | #include <string.h> | 
|  | #include <resolv.h> | 
|  | #include <cutils/list.h> | 
|  | #include <cutils/sockets.h> | 
|  |  | 
|  | #include "sysdeps.h" | 
|  | #include "adb.h" | 
|  | #include "adb_auth.h" | 
|  | #include "fdevent.h" | 
|  | #include "mincrypt/rsa.h" | 
|  | #include "mincrypt/sha.h" | 
|  |  | 
|  | #define TRACE_TAG TRACE_AUTH | 
|  |  | 
|  | #ifdef __GLIBC__ | 
|  | #ifdef b64_pton | 
|  | #undef b64_pton | 
|  | #endif | 
|  | #endif | 
|  |  | 
|  | struct adb_public_key { | 
|  | struct listnode node; | 
|  | RSAPublicKey key; | 
|  | }; | 
|  |  | 
|  | static char *key_paths[] = { | 
|  | "/adb_keys", | 
|  | "/data/misc/adb/adb_keys", | 
|  | NULL | 
|  | }; | 
|  |  | 
|  | static fdevent listener_fde; | 
|  | static int framework_fd = -1; | 
|  |  | 
|  | static void usb_disconnected(void* unused, atransport* t); | 
|  | static struct adisconnect usb_disconnect = { usb_disconnected, 0, 0, 0 }; | 
|  | static atransport* usb_transport; | 
|  | static bool needs_retry = false; | 
|  |  | 
|  | static void read_keys(const char *file, struct listnode *list) | 
|  | { | 
|  | struct adb_public_key *key; | 
|  | FILE *f; | 
|  | char buf[MAX_PAYLOAD]; | 
|  | char *sep; | 
|  | int ret; | 
|  |  | 
|  | f = fopen(file, "re"); | 
|  | if (!f) { | 
|  | D("Can't open '%s'\n", file); | 
|  | return; | 
|  | } | 
|  |  | 
|  | while (fgets(buf, sizeof(buf), f)) { | 
|  | /* Allocate 4 extra bytes to decode the base64 data in-place */ | 
|  | key = calloc(1, sizeof(*key) + 4); | 
|  | if (!key) { | 
|  | D("Can't malloc key\n"); | 
|  | break; | 
|  | } | 
|  |  | 
|  | sep = strpbrk(buf, " \t"); | 
|  | if (sep) | 
|  | *sep = '\0'; | 
|  |  | 
|  | ret = b64_pton(buf, (u_char *)&key->key, sizeof(key->key) + 4); | 
|  | if (ret != sizeof(key->key)) { | 
|  | D("%s: Invalid base64 data ret=%d\n", file, ret); | 
|  | free(key); | 
|  | continue; | 
|  | } | 
|  |  | 
|  | if (key->key.len != RSANUMWORDS) { | 
|  | D("%s: Invalid key len %d\n", file, key->key.len); | 
|  | free(key); | 
|  | continue; | 
|  | } | 
|  |  | 
|  | list_add_tail(list, &key->node); | 
|  | } | 
|  |  | 
|  | fclose(f); | 
|  | } | 
|  |  | 
|  | static void free_keys(struct listnode *list) | 
|  | { | 
|  | struct listnode *item; | 
|  |  | 
|  | while (!list_empty(list)) { | 
|  | item = list_head(list); | 
|  | list_remove(item); | 
|  | free(node_to_item(item, struct adb_public_key, node)); | 
|  | } | 
|  | } | 
|  |  | 
|  | static void load_keys(struct listnode *list) | 
|  | { | 
|  | char *path; | 
|  | char **paths = key_paths; | 
|  | struct stat buf; | 
|  |  | 
|  | list_init(list); | 
|  |  | 
|  | while ((path = *paths++)) { | 
|  | if (!stat(path, &buf)) { | 
|  | D("Loading keys from '%s'\n", path); | 
|  | read_keys(path, list); | 
|  | } | 
|  | } | 
|  | } | 
|  |  | 
|  | int adb_auth_generate_token(void *token, size_t token_size) | 
|  | { | 
|  | FILE *f; | 
|  | int ret; | 
|  |  | 
|  | f = fopen("/dev/urandom", "re"); | 
|  | if (!f) | 
|  | return 0; | 
|  |  | 
|  | ret = fread(token, token_size, 1, f); | 
|  |  | 
|  | fclose(f); | 
|  | return ret * token_size; | 
|  | } | 
|  |  | 
|  | int adb_auth_verify(void *token, void *sig, int siglen) | 
|  | { | 
|  | struct listnode *item; | 
|  | struct adb_public_key *key; | 
|  | struct listnode key_list; | 
|  | int ret = 0; | 
|  |  | 
|  | if (siglen != RSANUMBYTES) | 
|  | return 0; | 
|  |  | 
|  | load_keys(&key_list); | 
|  |  | 
|  | list_for_each(item, &key_list) { | 
|  | key = node_to_item(item, struct adb_public_key, node); | 
|  | ret = RSA_verify(&key->key, sig, siglen, token, SHA_DIGEST_SIZE); | 
|  | if (ret) | 
|  | break; | 
|  | } | 
|  |  | 
|  | free_keys(&key_list); | 
|  |  | 
|  | return ret; | 
|  | } | 
|  |  | 
|  | static void usb_disconnected(void* unused, atransport* t) | 
|  | { | 
|  | D("USB disconnect\n"); | 
|  | remove_transport_disconnect(usb_transport, &usb_disconnect); | 
|  | usb_transport = NULL; | 
|  | needs_retry = false; | 
|  | } | 
|  |  | 
|  | static void adb_auth_event(int fd, unsigned events, void *data) | 
|  | { | 
|  | char response[2]; | 
|  | int ret; | 
|  |  | 
|  | if (events & FDE_READ) { | 
|  | ret = unix_read(fd, response, sizeof(response)); | 
|  | if (ret <= 0) { | 
|  | D("Framework disconnect\n"); | 
|  | if (usb_transport) | 
|  | fdevent_remove(&usb_transport->auth_fde); | 
|  | framework_fd = -1; | 
|  | } | 
|  | else if (ret == 2 && response[0] == 'O' && response[1] == 'K') { | 
|  | if (usb_transport) | 
|  | adb_auth_verified(usb_transport); | 
|  | } | 
|  | } | 
|  | } | 
|  |  | 
|  | void adb_auth_confirm_key(unsigned char *key, size_t len, atransport *t) | 
|  | { | 
|  | char msg[MAX_PAYLOAD]; | 
|  | int ret; | 
|  |  | 
|  | if (!usb_transport) { | 
|  | usb_transport = t; | 
|  | add_transport_disconnect(t, &usb_disconnect); | 
|  | } | 
|  |  | 
|  | if (framework_fd < 0) { | 
|  | D("Client not connected\n"); | 
|  | needs_retry = true; | 
|  | return; | 
|  | } | 
|  |  | 
|  | if (key[len - 1] != '\0') { | 
|  | D("Key must be a null-terminated string\n"); | 
|  | return; | 
|  | } | 
|  |  | 
|  | ret = snprintf(msg, sizeof(msg), "PK%s", key); | 
|  | if (ret >= (signed)sizeof(msg)) { | 
|  | D("Key too long. ret=%d", ret); | 
|  | return; | 
|  | } | 
|  | D("Sending '%s'\n", msg); | 
|  |  | 
|  | ret = unix_write(framework_fd, msg, ret); | 
|  | if (ret < 0) { | 
|  | D("Failed to write PK, errno=%d\n", errno); | 
|  | return; | 
|  | } | 
|  |  | 
|  | fdevent_install(&t->auth_fde, framework_fd, adb_auth_event, t); | 
|  | fdevent_add(&t->auth_fde, FDE_READ); | 
|  | } | 
|  |  | 
|  | static void adb_auth_listener(int fd, unsigned events, void *data) | 
|  | { | 
|  | struct sockaddr addr; | 
|  | socklen_t alen; | 
|  | int s; | 
|  |  | 
|  | alen = sizeof(addr); | 
|  |  | 
|  | s = adb_socket_accept(fd, &addr, &alen); | 
|  | if (s < 0) { | 
|  | D("Failed to accept: errno=%d\n", errno); | 
|  | return; | 
|  | } | 
|  |  | 
|  | framework_fd = s; | 
|  |  | 
|  | if (needs_retry) { | 
|  | needs_retry = false; | 
|  | send_auth_request(usb_transport); | 
|  | } | 
|  | } | 
|  |  | 
|  | void adb_auth_init(void) | 
|  | { | 
|  | int fd, ret; | 
|  |  | 
|  | fd = android_get_control_socket("adbd"); | 
|  | if (fd < 0) { | 
|  | D("Failed to get adbd socket\n"); | 
|  | printf("Failed to get adbd socket\n"); | 
|  | return; | 
|  | } | 
|  | fcntl(fd, F_SETFD, FD_CLOEXEC); | 
|  |  | 
|  | ret = listen(fd, 4); | 
|  | if (ret < 0) { | 
|  | D("Failed to listen on '%d'\n", fd); | 
|  | return; | 
|  | } | 
|  |  | 
|  | fdevent_install(&listener_fde, fd, adb_auth_listener, NULL); | 
|  | fdevent_add(&listener_fde, FDE_READ); | 
|  | } |