This CL addresses the comments from API Council about Android KeyStore KeyPairGeneratorSpec, KeyGeneratorSpec and KeyStoreParameter: 1. These abstractions should not take or hold references to Context. 2. The Builders of these abstractions should take all mandatory parameters in their constructors rather than expose them as setters -- only optional paratemers should be exposed via setters. These comments cannot be addressed without deprecation in the already launched KeyPairGeneratorSpec and KeyStoreParameter. Instead of deprecating just the getContext methods and Builder constructors, this CL goes for the nuclear option of deprecating KeyPairGeneratorSpec and KeyStoreParameter as a whole and exposing all of the AndroidKeyStore API in the new package android.security.keystore. This enables this CL to correct all of the accrued design issues with KeyPairGeneratorSpec (e.g., naming of certificate-related methods) and KeyStoreParameter. This also makes the transition to API Level M more clear for existing users of the AndroidKeyStore API. These users will only have to deal with the new always-mandatory parameters (e.g., purposes) and sometimes-mandatory (e.g., digests, block modes, paddings) if they switch to the new API. Prior to this CL they would've had to deal with this if they invoked any of the new methods of KeyPairGeneratorSpec or KeyStoreParameter introduced in API Level M. This CL rips out all the new API introduced into KeyPairGeneratorSpec and KeyStoreParameter classes for Android M, thus reverting these classes to the API launched in L MR1. This is because the new API is now in android.security.keystore.KeyGenParameterSpec and KeyProtection respectively. Bug: 21039983 Change-Id: I59672b3c6ef7bc25c40aa85f1c47d9d8a05d627c
876 lines
35 KiB
Java
876 lines
35 KiB
Java
/*
|
|
* Copyright (C) 2012 The Android Open Source Project
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*/
|
|
|
|
package android.security;
|
|
|
|
import com.android.org.conscrypt.OpenSSLEngine;
|
|
import com.android.org.conscrypt.OpenSSLKeyHolder;
|
|
|
|
import libcore.util.EmptyArray;
|
|
|
|
import android.security.keymaster.KeyCharacteristics;
|
|
import android.security.keymaster.KeymasterArguments;
|
|
import android.security.keymaster.KeymasterDefs;
|
|
import android.security.keystore.KeyProperties;
|
|
import android.security.keystore.KeyProtection;
|
|
import android.util.Log;
|
|
|
|
import java.io.ByteArrayInputStream;
|
|
import java.io.IOException;
|
|
import java.io.InputStream;
|
|
import java.io.OutputStream;
|
|
import java.security.InvalidKeyException;
|
|
import java.security.Key;
|
|
import java.security.KeyStore.Entry;
|
|
import java.security.KeyStore.PrivateKeyEntry;
|
|
import java.security.KeyStore.ProtectionParameter;
|
|
import java.security.KeyStore;
|
|
import java.security.KeyStore.SecretKeyEntry;
|
|
import java.security.KeyStoreException;
|
|
import java.security.KeyStoreSpi;
|
|
import java.security.NoSuchAlgorithmException;
|
|
import java.security.PrivateKey;
|
|
import java.security.UnrecoverableKeyException;
|
|
import java.security.cert.Certificate;
|
|
import java.security.cert.CertificateEncodingException;
|
|
import java.security.cert.CertificateException;
|
|
import java.security.cert.CertificateFactory;
|
|
import java.security.cert.X509Certificate;
|
|
import java.util.ArrayList;
|
|
import java.util.Arrays;
|
|
import java.util.Collection;
|
|
import java.util.Collections;
|
|
import java.util.Date;
|
|
import java.util.Enumeration;
|
|
import java.util.HashSet;
|
|
import java.util.Iterator;
|
|
import java.util.List;
|
|
import java.util.Set;
|
|
|
|
import javax.crypto.SecretKey;
|
|
|
|
/**
|
|
* A java.security.KeyStore interface for the Android KeyStore. An instance of
|
|
* it can be created via the {@link java.security.KeyStore#getInstance(String)
|
|
* KeyStore.getInstance("AndroidKeyStore")} interface. This returns a
|
|
* java.security.KeyStore backed by this "AndroidKeyStore" implementation.
|
|
* <p>
|
|
* This is built on top of Android's keystore daemon. The convention of alias
|
|
* use is:
|
|
* <p>
|
|
* PrivateKeyEntry will have a Credentials.USER_PRIVATE_KEY as the private key,
|
|
* Credentials.USER_CERTIFICATE as the first certificate in the chain (the one
|
|
* that corresponds to the private key), and then a Credentials.CA_CERTIFICATE
|
|
* entry which will have the rest of the chain concatenated in BER format.
|
|
* <p>
|
|
* TrustedCertificateEntry will just have a Credentials.CA_CERTIFICATE entry
|
|
* with a single certificate.
|
|
*
|
|
* @hide
|
|
*/
|
|
public class AndroidKeyStore extends KeyStoreSpi {
|
|
public static final String NAME = "AndroidKeyStore";
|
|
|
|
private android.security.KeyStore mKeyStore;
|
|
|
|
@Override
|
|
public Key engineGetKey(String alias, char[] password) throws NoSuchAlgorithmException,
|
|
UnrecoverableKeyException {
|
|
if (isPrivateKeyEntry(alias)) {
|
|
final OpenSSLEngine engine = OpenSSLEngine.getInstance("keystore");
|
|
try {
|
|
return engine.getPrivateKeyById(Credentials.USER_PRIVATE_KEY + alias);
|
|
} catch (InvalidKeyException e) {
|
|
UnrecoverableKeyException t = new UnrecoverableKeyException("Can't get key");
|
|
t.initCause(e);
|
|
throw t;
|
|
}
|
|
} else if (isSecretKeyEntry(alias)) {
|
|
KeyCharacteristics keyCharacteristics = new KeyCharacteristics();
|
|
String keyAliasInKeystore = Credentials.USER_SECRET_KEY + alias;
|
|
int errorCode = mKeyStore.getKeyCharacteristics(
|
|
keyAliasInKeystore, null, null, keyCharacteristics);
|
|
if ((errorCode != KeymasterDefs.KM_ERROR_OK)
|
|
&& (errorCode != android.security.KeyStore.NO_ERROR)) {
|
|
throw (UnrecoverableKeyException)
|
|
new UnrecoverableKeyException("Failed to load information about key")
|
|
.initCause(mKeyStore.getInvalidKeyException(alias, errorCode));
|
|
}
|
|
|
|
int keymasterAlgorithm =
|
|
keyCharacteristics.hwEnforced.getInt(KeymasterDefs.KM_TAG_ALGORITHM, -1);
|
|
if (keymasterAlgorithm == -1) {
|
|
keymasterAlgorithm =
|
|
keyCharacteristics.swEnforced.getInt(KeymasterDefs.KM_TAG_ALGORITHM, -1);
|
|
}
|
|
if (keymasterAlgorithm == -1) {
|
|
throw new UnrecoverableKeyException("Key algorithm unknown");
|
|
}
|
|
|
|
List<Integer> keymasterDigests =
|
|
keyCharacteristics.getInts(KeymasterDefs.KM_TAG_DIGEST);
|
|
int keymasterDigest;
|
|
if (keymasterDigests.isEmpty()) {
|
|
keymasterDigest = -1;
|
|
} else {
|
|
// More than one digest can be permitted for this key. Use the first one to form the
|
|
// JCA key algorithm name.
|
|
keymasterDigest = keymasterDigests.get(0);
|
|
}
|
|
|
|
@KeyProperties.KeyAlgorithmEnum String keyAlgorithmString;
|
|
try {
|
|
keyAlgorithmString = KeyProperties.KeyAlgorithm.fromKeymasterSecretKeyAlgorithm(
|
|
keymasterAlgorithm, keymasterDigest);
|
|
} catch (IllegalArgumentException e) {
|
|
throw (UnrecoverableKeyException)
|
|
new UnrecoverableKeyException("Unsupported secret key type").initCause(e);
|
|
}
|
|
|
|
return new KeyStoreSecretKey(keyAliasInKeystore, keyAlgorithmString);
|
|
}
|
|
|
|
return null;
|
|
}
|
|
|
|
@Override
|
|
public Certificate[] engineGetCertificateChain(String alias) {
|
|
if (alias == null) {
|
|
throw new NullPointerException("alias == null");
|
|
}
|
|
|
|
final X509Certificate leaf = (X509Certificate) engineGetCertificate(alias);
|
|
if (leaf == null) {
|
|
return null;
|
|
}
|
|
|
|
final Certificate[] caList;
|
|
|
|
final byte[] caBytes = mKeyStore.get(Credentials.CA_CERTIFICATE + alias);
|
|
if (caBytes != null) {
|
|
final Collection<X509Certificate> caChain = toCertificates(caBytes);
|
|
|
|
caList = new Certificate[caChain.size() + 1];
|
|
|
|
final Iterator<X509Certificate> it = caChain.iterator();
|
|
int i = 1;
|
|
while (it.hasNext()) {
|
|
caList[i++] = it.next();
|
|
}
|
|
} else {
|
|
caList = new Certificate[1];
|
|
}
|
|
|
|
caList[0] = leaf;
|
|
|
|
return caList;
|
|
}
|
|
|
|
@Override
|
|
public Certificate engineGetCertificate(String alias) {
|
|
if (alias == null) {
|
|
throw new NullPointerException("alias == null");
|
|
}
|
|
|
|
byte[] certificate = mKeyStore.get(Credentials.USER_CERTIFICATE + alias);
|
|
if (certificate != null) {
|
|
return toCertificate(certificate);
|
|
}
|
|
|
|
certificate = mKeyStore.get(Credentials.CA_CERTIFICATE + alias);
|
|
if (certificate != null) {
|
|
return toCertificate(certificate);
|
|
}
|
|
|
|
return null;
|
|
}
|
|
|
|
private static X509Certificate toCertificate(byte[] bytes) {
|
|
try {
|
|
final CertificateFactory certFactory = CertificateFactory.getInstance("X.509");
|
|
return (X509Certificate) certFactory
|
|
.generateCertificate(new ByteArrayInputStream(bytes));
|
|
} catch (CertificateException e) {
|
|
Log.w(NAME, "Couldn't parse certificate in keystore", e);
|
|
return null;
|
|
}
|
|
}
|
|
|
|
@SuppressWarnings("unchecked")
|
|
private static Collection<X509Certificate> toCertificates(byte[] bytes) {
|
|
try {
|
|
final CertificateFactory certFactory = CertificateFactory.getInstance("X.509");
|
|
return (Collection<X509Certificate>) certFactory
|
|
.generateCertificates(new ByteArrayInputStream(bytes));
|
|
} catch (CertificateException e) {
|
|
Log.w(NAME, "Couldn't parse certificates in keystore", e);
|
|
return new ArrayList<X509Certificate>();
|
|
}
|
|
}
|
|
|
|
private Date getModificationDate(String alias) {
|
|
final long epochMillis = mKeyStore.getmtime(alias);
|
|
if (epochMillis == -1L) {
|
|
return null;
|
|
}
|
|
|
|
return new Date(epochMillis);
|
|
}
|
|
|
|
@Override
|
|
public Date engineGetCreationDate(String alias) {
|
|
if (alias == null) {
|
|
throw new NullPointerException("alias == null");
|
|
}
|
|
|
|
Date d = getModificationDate(Credentials.USER_PRIVATE_KEY + alias);
|
|
if (d != null) {
|
|
return d;
|
|
}
|
|
|
|
d = getModificationDate(Credentials.USER_SECRET_KEY + alias);
|
|
if (d != null) {
|
|
return d;
|
|
}
|
|
|
|
d = getModificationDate(Credentials.USER_CERTIFICATE + alias);
|
|
if (d != null) {
|
|
return d;
|
|
}
|
|
|
|
return getModificationDate(Credentials.CA_CERTIFICATE + alias);
|
|
}
|
|
|
|
@Override
|
|
public void engineSetKeyEntry(String alias, Key key, char[] password, Certificate[] chain)
|
|
throws KeyStoreException {
|
|
if ((password != null) && (password.length > 0)) {
|
|
throw new KeyStoreException("entries cannot be protected with passwords");
|
|
}
|
|
|
|
if (key instanceof PrivateKey) {
|
|
setPrivateKeyEntry(alias, (PrivateKey) key, chain, null);
|
|
} else if (key instanceof SecretKey) {
|
|
setSecretKeyEntry(alias, (SecretKey) key, null);
|
|
} else {
|
|
throw new KeyStoreException("Only PrivateKey and SecretKey are supported");
|
|
}
|
|
}
|
|
|
|
private void setPrivateKeyEntry(String alias, PrivateKey key, Certificate[] chain,
|
|
java.security.KeyStore.ProtectionParameter param) throws KeyStoreException {
|
|
KeyProtection spec;
|
|
if (param instanceof KeyStoreParameter) {
|
|
KeyStoreParameter legacySpec = (KeyStoreParameter) param;
|
|
try {
|
|
String keyAlgorithm = key.getAlgorithm();
|
|
KeyProtection.Builder specBuilder;
|
|
if (KeyProperties.KEY_ALGORITHM_EC.equalsIgnoreCase(keyAlgorithm)) {
|
|
specBuilder =
|
|
new KeyProtection.Builder(
|
|
KeyProperties.PURPOSE_SIGN | KeyProperties.PURPOSE_VERIFY);
|
|
specBuilder.setDigests(
|
|
KeyProperties.DIGEST_NONE,
|
|
KeyProperties.DIGEST_MD5,
|
|
KeyProperties.DIGEST_SHA1,
|
|
KeyProperties.DIGEST_SHA224,
|
|
KeyProperties.DIGEST_SHA256,
|
|
KeyProperties.DIGEST_SHA384,
|
|
KeyProperties.DIGEST_SHA512);
|
|
} else if (KeyProperties.KEY_ALGORITHM_RSA.equalsIgnoreCase(keyAlgorithm)) {
|
|
specBuilder =
|
|
new KeyProtection.Builder(
|
|
KeyProperties.PURPOSE_ENCRYPT
|
|
| KeyProperties.PURPOSE_DECRYPT
|
|
| KeyProperties.PURPOSE_SIGN
|
|
| KeyProperties.PURPOSE_VERIFY);
|
|
specBuilder.setDigests(
|
|
KeyProperties.DIGEST_NONE,
|
|
KeyProperties.DIGEST_MD5,
|
|
KeyProperties.DIGEST_SHA1,
|
|
KeyProperties.DIGEST_SHA224,
|
|
KeyProperties.DIGEST_SHA256,
|
|
KeyProperties.DIGEST_SHA384,
|
|
KeyProperties.DIGEST_SHA512);
|
|
specBuilder.setSignaturePaddings(
|
|
KeyProperties.SIGNATURE_PADDING_RSA_PKCS1);
|
|
specBuilder.setBlockModes(KeyProperties.BLOCK_MODE_ECB);
|
|
specBuilder.setEncryptionPaddings(
|
|
KeyProperties.ENCRYPTION_PADDING_NONE,
|
|
KeyProperties.ENCRYPTION_PADDING_RSA_PKCS1);
|
|
// Disable randomized encryption requirement to support encryption padding NONE
|
|
// above.
|
|
specBuilder.setRandomizedEncryptionRequired(false);
|
|
} else {
|
|
throw new KeyStoreException("Unsupported key algorithm: " + keyAlgorithm);
|
|
}
|
|
specBuilder.setEncryptionAtRestRequired(legacySpec.isEncryptionRequired());
|
|
specBuilder.setUserAuthenticationRequired(false);
|
|
|
|
spec = specBuilder.build();
|
|
} catch (NullPointerException | IllegalArgumentException e) {
|
|
throw new KeyStoreException("Unsupported protection parameter", e);
|
|
}
|
|
} else if (param instanceof KeyProtection) {
|
|
spec = (KeyProtection) param;
|
|
} else if (param != null) {
|
|
throw new KeyStoreException(
|
|
"Unsupported protection parameter class:" + param.getClass().getName()
|
|
+ ". Supported: " + KeyStoreParameter.class.getName() + ", "
|
|
+ KeyProtection.class.getName());
|
|
} else {
|
|
spec = null;
|
|
}
|
|
|
|
byte[] keyBytes = null;
|
|
|
|
final String pkeyAlias;
|
|
if (key instanceof OpenSSLKeyHolder) {
|
|
pkeyAlias = ((OpenSSLKeyHolder) key).getOpenSSLKey().getAlias();
|
|
} else {
|
|
pkeyAlias = null;
|
|
}
|
|
|
|
final boolean shouldReplacePrivateKey;
|
|
if (pkeyAlias != null && pkeyAlias.startsWith(Credentials.USER_PRIVATE_KEY)) {
|
|
final String keySubalias = pkeyAlias.substring(Credentials.USER_PRIVATE_KEY.length());
|
|
if (!alias.equals(keySubalias)) {
|
|
throw new KeyStoreException("Can only replace keys with same alias: " + alias
|
|
+ " != " + keySubalias);
|
|
}
|
|
|
|
shouldReplacePrivateKey = false;
|
|
} else {
|
|
// Make sure the PrivateKey format is the one we support.
|
|
final String keyFormat = key.getFormat();
|
|
if ((keyFormat == null) || (!"PKCS#8".equals(keyFormat))) {
|
|
throw new KeyStoreException(
|
|
"Only PrivateKeys that can be encoded into PKCS#8 are supported");
|
|
}
|
|
|
|
// Make sure we can actually encode the key.
|
|
keyBytes = key.getEncoded();
|
|
if (keyBytes == null) {
|
|
throw new KeyStoreException("PrivateKey has no encoding");
|
|
}
|
|
|
|
shouldReplacePrivateKey = true;
|
|
}
|
|
|
|
// Make sure the chain exists since this is a PrivateKey
|
|
if ((chain == null) || (chain.length == 0)) {
|
|
throw new KeyStoreException("Must supply at least one Certificate with PrivateKey");
|
|
}
|
|
|
|
// Do chain type checking.
|
|
X509Certificate[] x509chain = new X509Certificate[chain.length];
|
|
for (int i = 0; i < chain.length; i++) {
|
|
if (!"X.509".equals(chain[i].getType())) {
|
|
throw new KeyStoreException("Certificates must be in X.509 format: invalid cert #"
|
|
+ i);
|
|
}
|
|
|
|
if (!(chain[i] instanceof X509Certificate)) {
|
|
throw new KeyStoreException("Certificates must be in X.509 format: invalid cert #"
|
|
+ i);
|
|
}
|
|
|
|
x509chain[i] = (X509Certificate) chain[i];
|
|
}
|
|
|
|
final byte[] userCertBytes;
|
|
try {
|
|
userCertBytes = x509chain[0].getEncoded();
|
|
} catch (CertificateEncodingException e) {
|
|
throw new KeyStoreException("Couldn't encode certificate #1", e);
|
|
}
|
|
|
|
/*
|
|
* If we have a chain, store it in the CA certificate slot for this
|
|
* alias as concatenated DER-encoded certificates. These can be
|
|
* deserialized by {@link CertificateFactory#generateCertificates}.
|
|
*/
|
|
final byte[] chainBytes;
|
|
if (chain.length > 1) {
|
|
/*
|
|
* The chain is passed in as {user_cert, ca_cert_1, ca_cert_2, ...}
|
|
* so we only need the certificates starting at index 1.
|
|
*/
|
|
final byte[][] certsBytes = new byte[x509chain.length - 1][];
|
|
int totalCertLength = 0;
|
|
for (int i = 0; i < certsBytes.length; i++) {
|
|
try {
|
|
certsBytes[i] = x509chain[i + 1].getEncoded();
|
|
totalCertLength += certsBytes[i].length;
|
|
} catch (CertificateEncodingException e) {
|
|
throw new KeyStoreException("Can't encode Certificate #" + i, e);
|
|
}
|
|
}
|
|
|
|
/*
|
|
* Serialize this into one byte array so we can later call
|
|
* CertificateFactory#generateCertificates to recover them.
|
|
*/
|
|
chainBytes = new byte[totalCertLength];
|
|
int outputOffset = 0;
|
|
for (int i = 0; i < certsBytes.length; i++) {
|
|
final int certLength = certsBytes[i].length;
|
|
System.arraycopy(certsBytes[i], 0, chainBytes, outputOffset, certLength);
|
|
outputOffset += certLength;
|
|
certsBytes[i] = null;
|
|
}
|
|
} else {
|
|
chainBytes = null;
|
|
}
|
|
|
|
/*
|
|
* Make sure we clear out all the appropriate types before trying to
|
|
* write.
|
|
*/
|
|
if (shouldReplacePrivateKey) {
|
|
Credentials.deleteAllTypesForAlias(mKeyStore, alias);
|
|
} else {
|
|
Credentials.deleteCertificateTypesForAlias(mKeyStore, alias);
|
|
Credentials.deleteSecretKeyTypeForAlias(mKeyStore, alias);
|
|
}
|
|
|
|
final int flags = (spec == null) ? 0 : spec.getFlags();
|
|
|
|
if (shouldReplacePrivateKey
|
|
&& !mKeyStore.importKey(Credentials.USER_PRIVATE_KEY + alias, keyBytes,
|
|
android.security.KeyStore.UID_SELF, flags)) {
|
|
Credentials.deleteAllTypesForAlias(mKeyStore, alias);
|
|
throw new KeyStoreException("Couldn't put private key in keystore");
|
|
} else if (!mKeyStore.put(Credentials.USER_CERTIFICATE + alias, userCertBytes,
|
|
android.security.KeyStore.UID_SELF, flags)) {
|
|
Credentials.deleteAllTypesForAlias(mKeyStore, alias);
|
|
throw new KeyStoreException("Couldn't put certificate #1 in keystore");
|
|
} else if (chainBytes != null
|
|
&& !mKeyStore.put(Credentials.CA_CERTIFICATE + alias, chainBytes,
|
|
android.security.KeyStore.UID_SELF, flags)) {
|
|
Credentials.deleteAllTypesForAlias(mKeyStore, alias);
|
|
throw new KeyStoreException("Couldn't put certificate chain in keystore");
|
|
}
|
|
}
|
|
|
|
private void setSecretKeyEntry(String entryAlias, SecretKey key,
|
|
java.security.KeyStore.ProtectionParameter param)
|
|
throws KeyStoreException {
|
|
if ((param != null) && (!(param instanceof KeyProtection))) {
|
|
throw new KeyStoreException(
|
|
"Unsupported protection parameter class: " + param.getClass().getName()
|
|
+ ". Supported: " + KeyProtection.class.getName());
|
|
}
|
|
KeyProtection params = (KeyProtection) param;
|
|
|
|
if (key instanceof KeyStoreSecretKey) {
|
|
// KeyStore-backed secret key. It cannot be duplicated into another entry and cannot
|
|
// overwrite its own entry.
|
|
String keyAliasInKeystore = ((KeyStoreSecretKey) key).getAlias();
|
|
if (keyAliasInKeystore == null) {
|
|
throw new KeyStoreException("KeyStore-backed secret key does not have an alias");
|
|
}
|
|
if (!keyAliasInKeystore.startsWith(Credentials.USER_SECRET_KEY)) {
|
|
throw new KeyStoreException("KeyStore-backed secret key has invalid alias: "
|
|
+ keyAliasInKeystore);
|
|
}
|
|
String keyEntryAlias =
|
|
keyAliasInKeystore.substring(Credentials.USER_SECRET_KEY.length());
|
|
if (!entryAlias.equals(keyEntryAlias)) {
|
|
throw new KeyStoreException("Can only replace KeyStore-backed keys with same"
|
|
+ " alias: " + entryAlias + " != " + keyEntryAlias);
|
|
}
|
|
// This is the entry where this key is already stored. No need to do anything.
|
|
if (params != null) {
|
|
throw new KeyStoreException("Modifying KeyStore-backed key using protection"
|
|
+ " parameters not supported");
|
|
}
|
|
return;
|
|
}
|
|
|
|
if (params == null) {
|
|
throw new KeyStoreException(
|
|
"Protection parameters must be specified when importing a symmetric key");
|
|
}
|
|
|
|
// Not a KeyStore-backed secret key -- import its key material into keystore.
|
|
String keyExportFormat = key.getFormat();
|
|
if (keyExportFormat == null) {
|
|
throw new KeyStoreException(
|
|
"Only secret keys that export their key material are supported");
|
|
} else if (!"RAW".equals(keyExportFormat)) {
|
|
throw new KeyStoreException(
|
|
"Unsupported secret key material export format: " + keyExportFormat);
|
|
}
|
|
byte[] keyMaterial = key.getEncoded();
|
|
if (keyMaterial == null) {
|
|
throw new KeyStoreException("Key did not export its key material despite supporting"
|
|
+ " RAW format export");
|
|
}
|
|
|
|
String keyAlgorithmString = key.getAlgorithm();
|
|
int keymasterAlgorithm;
|
|
int keymasterDigest;
|
|
try {
|
|
keymasterAlgorithm =
|
|
KeyProperties.KeyAlgorithm.toKeymasterSecretKeyAlgorithm(keyAlgorithmString);
|
|
keymasterDigest = KeyProperties.KeyAlgorithm.toKeymasterDigest(keyAlgorithmString);
|
|
} catch (IllegalArgumentException e) {
|
|
throw new KeyStoreException("Unsupported secret key algorithm: " + keyAlgorithmString);
|
|
}
|
|
|
|
KeymasterArguments args = new KeymasterArguments();
|
|
args.addInt(KeymasterDefs.KM_TAG_ALGORITHM, keymasterAlgorithm);
|
|
|
|
int[] keymasterDigests;
|
|
if (params.isDigestsSpecified()) {
|
|
// Digest(s) specified in parameters
|
|
keymasterDigests = KeyProperties.Digest.allToKeymaster(params.getDigests());
|
|
if (keymasterDigest != -1) {
|
|
// Digest also specified in the JCA key algorithm name.
|
|
if (!com.android.internal.util.ArrayUtils.contains(
|
|
keymasterDigests, keymasterDigest)) {
|
|
throw new KeyStoreException("Key digest mismatch"
|
|
+ ". Key: " + keyAlgorithmString
|
|
+ ", parameter spec: " + Arrays.asList(params.getDigests()));
|
|
}
|
|
// When the key is read back from keystore we reconstruct the JCA key algorithm
|
|
// name from the KM_TAG_ALGORITHM and the first KM_TAG_DIGEST. Thus we need to
|
|
// ensure that the digest reflected in the JCA key algorithm name is the first
|
|
// KM_TAG_DIGEST tag.
|
|
if (keymasterDigests[0] != keymasterDigest) {
|
|
// The first digest is not the one implied by the JCA key algorithm name.
|
|
// Swap the implied digest with the first one.
|
|
for (int i = 0; i < keymasterDigests.length; i++) {
|
|
if (keymasterDigests[i] == keymasterDigest) {
|
|
keymasterDigests[i] = keymasterDigests[0];
|
|
keymasterDigests[0] = keymasterDigest;
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
} else {
|
|
// No digest specified in parameters
|
|
if (keymasterDigest != -1) {
|
|
// Digest specified in the JCA key algorithm name.
|
|
keymasterDigests = new int[] {keymasterDigest};
|
|
} else {
|
|
keymasterDigests = EmptyArray.INT;
|
|
}
|
|
}
|
|
args.addInts(KeymasterDefs.KM_TAG_DIGEST, keymasterDigests);
|
|
if (keymasterAlgorithm == KeymasterDefs.KM_ALGORITHM_HMAC) {
|
|
if (keymasterDigests.length == 0) {
|
|
throw new KeyStoreException("At least one digest algorithm must be specified"
|
|
+ " for key algorithm " + keyAlgorithmString);
|
|
}
|
|
}
|
|
|
|
@KeyProperties.PurposeEnum int purposes = params.getPurposes();
|
|
int[] keymasterBlockModes =
|
|
KeyProperties.BlockMode.allToKeymaster(params.getBlockModes());
|
|
if (((purposes & KeyProperties.PURPOSE_ENCRYPT) != 0)
|
|
&& (params.isRandomizedEncryptionRequired())) {
|
|
for (int keymasterBlockMode : keymasterBlockModes) {
|
|
if (!KeymasterUtils.isKeymasterBlockModeIndCpaCompatible(keymasterBlockMode)) {
|
|
throw new KeyStoreException(
|
|
"Randomized encryption (IND-CPA) required but may be violated by block"
|
|
+ " mode: "
|
|
+ KeyProperties.BlockMode.fromKeymaster(keymasterBlockMode)
|
|
+ ". See KeyProtection documentation.");
|
|
}
|
|
}
|
|
}
|
|
for (int keymasterPurpose : KeyProperties.Purpose.allToKeymaster(purposes)) {
|
|
args.addInt(KeymasterDefs.KM_TAG_PURPOSE, keymasterPurpose);
|
|
}
|
|
args.addInts(KeymasterDefs.KM_TAG_BLOCK_MODE, keymasterBlockModes);
|
|
if (params.getSignaturePaddings().length > 0) {
|
|
throw new KeyStoreException("Signature paddings not supported for symmetric keys");
|
|
}
|
|
int[] keymasterPaddings = KeyProperties.EncryptionPadding.allToKeymaster(
|
|
params.getEncryptionPaddings());
|
|
args.addInts(KeymasterDefs.KM_TAG_PADDING, keymasterPaddings);
|
|
KeymasterUtils.addUserAuthArgs(args,
|
|
params.isUserAuthenticationRequired(),
|
|
params.getUserAuthenticationValidityDurationSeconds());
|
|
args.addDate(KeymasterDefs.KM_TAG_ACTIVE_DATETIME,
|
|
(params.getKeyValidityStart() != null)
|
|
? params.getKeyValidityStart() : new Date(0));
|
|
args.addDate(KeymasterDefs.KM_TAG_ORIGINATION_EXPIRE_DATETIME,
|
|
(params.getKeyValidityForOriginationEnd() != null)
|
|
? params.getKeyValidityForOriginationEnd() : new Date(Long.MAX_VALUE));
|
|
args.addDate(KeymasterDefs.KM_TAG_USAGE_EXPIRE_DATETIME,
|
|
(params.getKeyValidityForConsumptionEnd() != null)
|
|
? params.getKeyValidityForConsumptionEnd() : new Date(Long.MAX_VALUE));
|
|
|
|
// TODO: Remove this once keymaster does not require us to specify the size of imported key.
|
|
args.addInt(KeymasterDefs.KM_TAG_KEY_SIZE, keyMaterial.length * 8);
|
|
|
|
if (((purposes & KeyProperties.PURPOSE_ENCRYPT) != 0)
|
|
&& (!params.isRandomizedEncryptionRequired())) {
|
|
// Permit caller-provided IV when encrypting with this key
|
|
args.addBoolean(KeymasterDefs.KM_TAG_CALLER_NONCE);
|
|
}
|
|
|
|
Credentials.deleteAllTypesForAlias(mKeyStore, entryAlias);
|
|
String keyAliasInKeystore = Credentials.USER_SECRET_KEY + entryAlias;
|
|
int errorCode = mKeyStore.importKey(
|
|
keyAliasInKeystore,
|
|
args,
|
|
KeymasterDefs.KM_KEY_FORMAT_RAW,
|
|
keyMaterial,
|
|
params.getFlags(),
|
|
new KeyCharacteristics());
|
|
if (errorCode != android.security.KeyStore.NO_ERROR) {
|
|
throw new KeyStoreException("Failed to import secret key. Keystore error code: "
|
|
+ errorCode);
|
|
}
|
|
}
|
|
|
|
@Override
|
|
public void engineSetKeyEntry(String alias, byte[] userKey, Certificate[] chain)
|
|
throws KeyStoreException {
|
|
throw new KeyStoreException("Operation not supported because key encoding is unknown");
|
|
}
|
|
|
|
@Override
|
|
public void engineSetCertificateEntry(String alias, Certificate cert) throws KeyStoreException {
|
|
if (isKeyEntry(alias)) {
|
|
throw new KeyStoreException("Entry exists and is not a trusted certificate");
|
|
}
|
|
|
|
// We can't set something to null.
|
|
if (cert == null) {
|
|
throw new NullPointerException("cert == null");
|
|
}
|
|
|
|
final byte[] encoded;
|
|
try {
|
|
encoded = cert.getEncoded();
|
|
} catch (CertificateEncodingException e) {
|
|
throw new KeyStoreException(e);
|
|
}
|
|
|
|
if (!mKeyStore.put(Credentials.CA_CERTIFICATE + alias, encoded,
|
|
android.security.KeyStore.UID_SELF, android.security.KeyStore.FLAG_NONE)) {
|
|
throw new KeyStoreException("Couldn't insert certificate; is KeyStore initialized?");
|
|
}
|
|
}
|
|
|
|
@Override
|
|
public void engineDeleteEntry(String alias) throws KeyStoreException {
|
|
if (!isKeyEntry(alias) && !isCertificateEntry(alias)) {
|
|
return;
|
|
}
|
|
|
|
if (!Credentials.deleteAllTypesForAlias(mKeyStore, alias)) {
|
|
throw new KeyStoreException("No such entry " + alias);
|
|
}
|
|
}
|
|
|
|
private Set<String> getUniqueAliases() {
|
|
final String[] rawAliases = mKeyStore.saw("");
|
|
if (rawAliases == null) {
|
|
return new HashSet<String>();
|
|
}
|
|
|
|
final Set<String> aliases = new HashSet<String>(rawAliases.length);
|
|
for (String alias : rawAliases) {
|
|
final int idx = alias.indexOf('_');
|
|
if ((idx == -1) || (alias.length() <= idx)) {
|
|
Log.e(NAME, "invalid alias: " + alias);
|
|
continue;
|
|
}
|
|
|
|
aliases.add(new String(alias.substring(idx + 1)));
|
|
}
|
|
|
|
return aliases;
|
|
}
|
|
|
|
@Override
|
|
public Enumeration<String> engineAliases() {
|
|
return Collections.enumeration(getUniqueAliases());
|
|
}
|
|
|
|
@Override
|
|
public boolean engineContainsAlias(String alias) {
|
|
if (alias == null) {
|
|
throw new NullPointerException("alias == null");
|
|
}
|
|
|
|
return mKeyStore.contains(Credentials.USER_PRIVATE_KEY + alias)
|
|
|| mKeyStore.contains(Credentials.USER_SECRET_KEY + alias)
|
|
|| mKeyStore.contains(Credentials.USER_CERTIFICATE + alias)
|
|
|| mKeyStore.contains(Credentials.CA_CERTIFICATE + alias);
|
|
}
|
|
|
|
@Override
|
|
public int engineSize() {
|
|
return getUniqueAliases().size();
|
|
}
|
|
|
|
@Override
|
|
public boolean engineIsKeyEntry(String alias) {
|
|
return isKeyEntry(alias);
|
|
}
|
|
|
|
private boolean isKeyEntry(String alias) {
|
|
return isPrivateKeyEntry(alias) || isSecretKeyEntry(alias);
|
|
}
|
|
|
|
private boolean isPrivateKeyEntry(String alias) {
|
|
if (alias == null) {
|
|
throw new NullPointerException("alias == null");
|
|
}
|
|
|
|
return mKeyStore.contains(Credentials.USER_PRIVATE_KEY + alias);
|
|
}
|
|
|
|
private boolean isSecretKeyEntry(String alias) {
|
|
if (alias == null) {
|
|
throw new NullPointerException("alias == null");
|
|
}
|
|
|
|
return mKeyStore.contains(Credentials.USER_SECRET_KEY + alias);
|
|
}
|
|
|
|
private boolean isCertificateEntry(String alias) {
|
|
if (alias == null) {
|
|
throw new NullPointerException("alias == null");
|
|
}
|
|
|
|
return mKeyStore.contains(Credentials.CA_CERTIFICATE + alias);
|
|
}
|
|
|
|
@Override
|
|
public boolean engineIsCertificateEntry(String alias) {
|
|
return !isKeyEntry(alias) && isCertificateEntry(alias);
|
|
}
|
|
|
|
@Override
|
|
public String engineGetCertificateAlias(Certificate cert) {
|
|
if (cert == null) {
|
|
return null;
|
|
}
|
|
|
|
final Set<String> nonCaEntries = new HashSet<String>();
|
|
|
|
/*
|
|
* First scan the PrivateKeyEntry types. The KeyStoreSpi documentation
|
|
* says to only compare the first certificate in the chain which is
|
|
* equivalent to the USER_CERTIFICATE prefix for the Android keystore
|
|
* convention.
|
|
*/
|
|
final String[] certAliases = mKeyStore.saw(Credentials.USER_CERTIFICATE);
|
|
if (certAliases != null) {
|
|
for (String alias : certAliases) {
|
|
final byte[] certBytes = mKeyStore.get(Credentials.USER_CERTIFICATE + alias);
|
|
if (certBytes == null) {
|
|
continue;
|
|
}
|
|
|
|
final Certificate c = toCertificate(certBytes);
|
|
nonCaEntries.add(alias);
|
|
|
|
if (cert.equals(c)) {
|
|
return alias;
|
|
}
|
|
}
|
|
}
|
|
|
|
/*
|
|
* Look at all the TrustedCertificateEntry types. Skip all the
|
|
* PrivateKeyEntry we looked at above.
|
|
*/
|
|
final String[] caAliases = mKeyStore.saw(Credentials.CA_CERTIFICATE);
|
|
if (certAliases != null) {
|
|
for (String alias : caAliases) {
|
|
if (nonCaEntries.contains(alias)) {
|
|
continue;
|
|
}
|
|
|
|
final byte[] certBytes = mKeyStore.get(Credentials.CA_CERTIFICATE + alias);
|
|
if (certBytes == null) {
|
|
continue;
|
|
}
|
|
|
|
final Certificate c =
|
|
toCertificate(mKeyStore.get(Credentials.CA_CERTIFICATE + alias));
|
|
if (cert.equals(c)) {
|
|
return alias;
|
|
}
|
|
}
|
|
}
|
|
|
|
return null;
|
|
}
|
|
|
|
@Override
|
|
public void engineStore(OutputStream stream, char[] password) throws IOException,
|
|
NoSuchAlgorithmException, CertificateException {
|
|
throw new UnsupportedOperationException("Can not serialize AndroidKeyStore to OutputStream");
|
|
}
|
|
|
|
@Override
|
|
public void engineLoad(InputStream stream, char[] password) throws IOException,
|
|
NoSuchAlgorithmException, CertificateException {
|
|
if (stream != null) {
|
|
throw new IllegalArgumentException("InputStream not supported");
|
|
}
|
|
|
|
if (password != null) {
|
|
throw new IllegalArgumentException("password not supported");
|
|
}
|
|
|
|
// Unfortunate name collision.
|
|
mKeyStore = android.security.KeyStore.getInstance();
|
|
}
|
|
|
|
@Override
|
|
public void engineSetEntry(String alias, Entry entry, ProtectionParameter param)
|
|
throws KeyStoreException {
|
|
if (entry == null) {
|
|
throw new KeyStoreException("entry == null");
|
|
}
|
|
|
|
if (engineContainsAlias(alias)) {
|
|
engineDeleteEntry(alias);
|
|
}
|
|
|
|
if (entry instanceof KeyStore.TrustedCertificateEntry) {
|
|
KeyStore.TrustedCertificateEntry trE = (KeyStore.TrustedCertificateEntry) entry;
|
|
engineSetCertificateEntry(alias, trE.getTrustedCertificate());
|
|
return;
|
|
}
|
|
|
|
if (entry instanceof PrivateKeyEntry) {
|
|
PrivateKeyEntry prE = (PrivateKeyEntry) entry;
|
|
setPrivateKeyEntry(alias, prE.getPrivateKey(), prE.getCertificateChain(), param);
|
|
} else if (entry instanceof SecretKeyEntry) {
|
|
SecretKeyEntry secE = (SecretKeyEntry) entry;
|
|
setSecretKeyEntry(alias, secE.getSecretKey(), param);
|
|
} else {
|
|
throw new KeyStoreException(
|
|
"Entry must be a PrivateKeyEntry, SecretKeyEntry or TrustedCertificateEntry"
|
|
+ "; was " + entry);
|
|
}
|
|
}
|
|
|
|
}
|