xref: /aosp_15_r20/system/security/keystore2/src/legacy_blob.rs (revision e1997b9af69e3155ead6e072d106a0077849ffba)
1*e1997b9aSAndroid Build Coastguard Worker // Copyright 2020, The Android Open Source Project
2*e1997b9aSAndroid Build Coastguard Worker //
3*e1997b9aSAndroid Build Coastguard Worker // Licensed under the Apache License, Version 2.0 (the "License");
4*e1997b9aSAndroid Build Coastguard Worker // you may not use this file except in compliance with the License.
5*e1997b9aSAndroid Build Coastguard Worker // You may obtain a copy of the License at
6*e1997b9aSAndroid Build Coastguard Worker //
7*e1997b9aSAndroid Build Coastguard Worker //     http://www.apache.org/licenses/LICENSE-2.0
8*e1997b9aSAndroid Build Coastguard Worker //
9*e1997b9aSAndroid Build Coastguard Worker // Unless required by applicable law or agreed to in writing, software
10*e1997b9aSAndroid Build Coastguard Worker // distributed under the License is distributed on an "AS IS" BASIS,
11*e1997b9aSAndroid Build Coastguard Worker // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12*e1997b9aSAndroid Build Coastguard Worker // See the License for the specific language governing permissions and
13*e1997b9aSAndroid Build Coastguard Worker // limitations under the License.
14*e1997b9aSAndroid Build Coastguard Worker 
15*e1997b9aSAndroid Build Coastguard Worker //! This module implements methods to load legacy keystore key blob files.
16*e1997b9aSAndroid Build Coastguard Worker 
17*e1997b9aSAndroid Build Coastguard Worker use crate::ks_err;
18*e1997b9aSAndroid Build Coastguard Worker use crate::{
19*e1997b9aSAndroid Build Coastguard Worker     error::{Error as KsError, ResponseCode},
20*e1997b9aSAndroid Build Coastguard Worker     key_parameter::{KeyParameter, KeyParameterValue},
21*e1997b9aSAndroid Build Coastguard Worker     utils::uid_to_android_user,
22*e1997b9aSAndroid Build Coastguard Worker     utils::AesGcm,
23*e1997b9aSAndroid Build Coastguard Worker };
24*e1997b9aSAndroid Build Coastguard Worker use android_hardware_security_keymint::aidl::android::hardware::security::keymint::{
25*e1997b9aSAndroid Build Coastguard Worker     SecurityLevel::SecurityLevel, Tag::Tag, TagType::TagType,
26*e1997b9aSAndroid Build Coastguard Worker };
27*e1997b9aSAndroid Build Coastguard Worker use anyhow::{Context, Result};
28*e1997b9aSAndroid Build Coastguard Worker use keystore2_crypto::{aes_gcm_decrypt, Password, ZVec};
29*e1997b9aSAndroid Build Coastguard Worker use std::collections::{HashMap, HashSet};
30*e1997b9aSAndroid Build Coastguard Worker use std::sync::Arc;
31*e1997b9aSAndroid Build Coastguard Worker use std::{convert::TryInto, fs::File, path::Path, path::PathBuf};
32*e1997b9aSAndroid Build Coastguard Worker use std::{
33*e1997b9aSAndroid Build Coastguard Worker     fs,
34*e1997b9aSAndroid Build Coastguard Worker     io::{ErrorKind, Read, Result as IoResult},
35*e1997b9aSAndroid Build Coastguard Worker };
36*e1997b9aSAndroid Build Coastguard Worker 
37*e1997b9aSAndroid Build Coastguard Worker const SUPPORTED_LEGACY_BLOB_VERSION: u8 = 3;
38*e1997b9aSAndroid Build Coastguard Worker 
39*e1997b9aSAndroid Build Coastguard Worker #[cfg(test)]
40*e1997b9aSAndroid Build Coastguard Worker mod tests;
41*e1997b9aSAndroid Build Coastguard Worker 
42*e1997b9aSAndroid Build Coastguard Worker mod flags {
43*e1997b9aSAndroid Build Coastguard Worker     /// This flag is deprecated. It is here to support keys that have been written with this flag
44*e1997b9aSAndroid Build Coastguard Worker     /// set, but we don't create any new keys with this flag.
45*e1997b9aSAndroid Build Coastguard Worker     pub const ENCRYPTED: u8 = 1 << 0;
46*e1997b9aSAndroid Build Coastguard Worker     /// This flag is deprecated. It indicates that the blob was generated and thus owned by a
47*e1997b9aSAndroid Build Coastguard Worker     /// software fallback Keymaster implementation. Keymaster 1.0 was the last Keymaster version
48*e1997b9aSAndroid Build Coastguard Worker     /// that could be accompanied by a software fallback. With the removal of Keymaster 1.0
49*e1997b9aSAndroid Build Coastguard Worker     /// support, this flag is obsolete.
50*e1997b9aSAndroid Build Coastguard Worker     pub const FALLBACK: u8 = 1 << 1;
51*e1997b9aSAndroid Build Coastguard Worker     /// KEYSTORE_FLAG_SUPER_ENCRYPTED is for blobs that are already encrypted by KM but have
52*e1997b9aSAndroid Build Coastguard Worker     /// an additional layer of password-based encryption applied. The same encryption scheme is used
53*e1997b9aSAndroid Build Coastguard Worker     /// as KEYSTORE_FLAG_ENCRYPTED. The latter is deprecated.
54*e1997b9aSAndroid Build Coastguard Worker     pub const SUPER_ENCRYPTED: u8 = 1 << 2;
55*e1997b9aSAndroid Build Coastguard Worker     /// KEYSTORE_FLAG_CRITICAL_TO_DEVICE_ENCRYPTION is for blobs that are part of device encryption
56*e1997b9aSAndroid Build Coastguard Worker     /// flow so it receives special treatment from keystore. For example this blob will not be super
57*e1997b9aSAndroid Build Coastguard Worker     /// encrypted, and it will be stored separately under a unique UID instead. This flag should
58*e1997b9aSAndroid Build Coastguard Worker     /// only be available to system uid.
59*e1997b9aSAndroid Build Coastguard Worker     pub const CRITICAL_TO_DEVICE_ENCRYPTION: u8 = 1 << 3;
60*e1997b9aSAndroid Build Coastguard Worker     /// The blob is associated with the security level Strongbox as opposed to TEE.
61*e1997b9aSAndroid Build Coastguard Worker     pub const STRONGBOX: u8 = 1 << 4;
62*e1997b9aSAndroid Build Coastguard Worker }
63*e1997b9aSAndroid Build Coastguard Worker 
64*e1997b9aSAndroid Build Coastguard Worker /// Lagacy key blob types.
65*e1997b9aSAndroid Build Coastguard Worker mod blob_types {
66*e1997b9aSAndroid Build Coastguard Worker     /// A generic blob used for non sensitive unstructured blobs.
67*e1997b9aSAndroid Build Coastguard Worker     pub const GENERIC: u8 = 1;
68*e1997b9aSAndroid Build Coastguard Worker     /// This key is a super encryption key encrypted with AES128
69*e1997b9aSAndroid Build Coastguard Worker     /// and a password derived key.
70*e1997b9aSAndroid Build Coastguard Worker     pub const SUPER_KEY: u8 = 2;
71*e1997b9aSAndroid Build Coastguard Worker     // Used to be the KEY_PAIR type.
72*e1997b9aSAndroid Build Coastguard Worker     const _RESERVED: u8 = 3;
73*e1997b9aSAndroid Build Coastguard Worker     /// A KM key blob.
74*e1997b9aSAndroid Build Coastguard Worker     pub const KM_BLOB: u8 = 4;
75*e1997b9aSAndroid Build Coastguard Worker     /// A legacy key characteristics file. This has only a single list of Authorizations.
76*e1997b9aSAndroid Build Coastguard Worker     pub const KEY_CHARACTERISTICS: u8 = 5;
77*e1997b9aSAndroid Build Coastguard Worker     /// A key characteristics cache has both a hardware enforced and a software enforced list
78*e1997b9aSAndroid Build Coastguard Worker     /// of authorizations.
79*e1997b9aSAndroid Build Coastguard Worker     pub const KEY_CHARACTERISTICS_CACHE: u8 = 6;
80*e1997b9aSAndroid Build Coastguard Worker     /// Like SUPER_KEY but encrypted with AES256.
81*e1997b9aSAndroid Build Coastguard Worker     pub const SUPER_KEY_AES256: u8 = 7;
82*e1997b9aSAndroid Build Coastguard Worker }
83*e1997b9aSAndroid Build Coastguard Worker 
84*e1997b9aSAndroid Build Coastguard Worker /// Error codes specific to the legacy blob module.
85*e1997b9aSAndroid Build Coastguard Worker #[derive(thiserror::Error, Debug, Eq, PartialEq)]
86*e1997b9aSAndroid Build Coastguard Worker pub enum Error {
87*e1997b9aSAndroid Build Coastguard Worker     /// Returned by the legacy blob module functions if an input stream
88*e1997b9aSAndroid Build Coastguard Worker     /// did not have enough bytes to read.
89*e1997b9aSAndroid Build Coastguard Worker     #[error("Input stream had insufficient bytes to read.")]
90*e1997b9aSAndroid Build Coastguard Worker     BadLen,
91*e1997b9aSAndroid Build Coastguard Worker     /// This error code is returned by `Blob::decode_alias` if it encounters
92*e1997b9aSAndroid Build Coastguard Worker     /// an invalid alias filename encoding.
93*e1997b9aSAndroid Build Coastguard Worker     #[error("Invalid alias filename encoding.")]
94*e1997b9aSAndroid Build Coastguard Worker     BadEncoding,
95*e1997b9aSAndroid Build Coastguard Worker     /// A component of the requested entry other than the KM key blob itself
96*e1997b9aSAndroid Build Coastguard Worker     /// was encrypted and no super key was provided.
97*e1997b9aSAndroid Build Coastguard Worker     #[error("Locked entry component.")]
98*e1997b9aSAndroid Build Coastguard Worker     LockedComponent,
99*e1997b9aSAndroid Build Coastguard Worker     /// The uids presented to move_keystore_entry belonged to different
100*e1997b9aSAndroid Build Coastguard Worker     /// Android users.
101*e1997b9aSAndroid Build Coastguard Worker     #[error("Cannot move keys across Android users.")]
102*e1997b9aSAndroid Build Coastguard Worker     AndroidUserMismatch,
103*e1997b9aSAndroid Build Coastguard Worker }
104*e1997b9aSAndroid Build Coastguard Worker 
105*e1997b9aSAndroid Build Coastguard Worker /// The blob payload, optionally with all information required to decrypt it.
106*e1997b9aSAndroid Build Coastguard Worker #[derive(Debug, Eq, PartialEq)]
107*e1997b9aSAndroid Build Coastguard Worker pub enum BlobValue {
108*e1997b9aSAndroid Build Coastguard Worker     /// A generic blob used for non sensitive unstructured blobs.
109*e1997b9aSAndroid Build Coastguard Worker     Generic(Vec<u8>),
110*e1997b9aSAndroid Build Coastguard Worker     /// A legacy key characteristics file. This has only a single list of Authorizations.
111*e1997b9aSAndroid Build Coastguard Worker     Characteristics(Vec<u8>),
112*e1997b9aSAndroid Build Coastguard Worker     /// A legacy key characteristics file. This has only a single list of Authorizations.
113*e1997b9aSAndroid Build Coastguard Worker     /// Additionally, this characteristics file was encrypted with the user's super key.
114*e1997b9aSAndroid Build Coastguard Worker     EncryptedCharacteristics {
115*e1997b9aSAndroid Build Coastguard Worker         /// Initialization vector.
116*e1997b9aSAndroid Build Coastguard Worker         iv: Vec<u8>,
117*e1997b9aSAndroid Build Coastguard Worker         /// Aead tag for integrity verification.
118*e1997b9aSAndroid Build Coastguard Worker         tag: Vec<u8>,
119*e1997b9aSAndroid Build Coastguard Worker         /// Ciphertext.
120*e1997b9aSAndroid Build Coastguard Worker         data: Vec<u8>,
121*e1997b9aSAndroid Build Coastguard Worker     },
122*e1997b9aSAndroid Build Coastguard Worker     /// A key characteristics cache has both a hardware enforced and a software enforced list
123*e1997b9aSAndroid Build Coastguard Worker     /// of authorizations.
124*e1997b9aSAndroid Build Coastguard Worker     CharacteristicsCache(Vec<u8>),
125*e1997b9aSAndroid Build Coastguard Worker     /// A password encrypted blob. Includes the initialization vector, the aead tag, the
126*e1997b9aSAndroid Build Coastguard Worker     /// ciphertext data, a salt, and a key size. The latter two are used for key derivation.
127*e1997b9aSAndroid Build Coastguard Worker     PwEncrypted {
128*e1997b9aSAndroid Build Coastguard Worker         /// Initialization vector.
129*e1997b9aSAndroid Build Coastguard Worker         iv: Vec<u8>,
130*e1997b9aSAndroid Build Coastguard Worker         /// Aead tag for integrity verification.
131*e1997b9aSAndroid Build Coastguard Worker         tag: Vec<u8>,
132*e1997b9aSAndroid Build Coastguard Worker         /// Ciphertext.
133*e1997b9aSAndroid Build Coastguard Worker         data: Vec<u8>,
134*e1997b9aSAndroid Build Coastguard Worker         /// Salt for key derivation.
135*e1997b9aSAndroid Build Coastguard Worker         salt: Vec<u8>,
136*e1997b9aSAndroid Build Coastguard Worker         /// Key sise for key derivation. This selects between AES128 GCM and AES256 GCM.
137*e1997b9aSAndroid Build Coastguard Worker         key_size: usize,
138*e1997b9aSAndroid Build Coastguard Worker     },
139*e1997b9aSAndroid Build Coastguard Worker     /// An encrypted blob. Includes the initialization vector, the aead tag, and the
140*e1997b9aSAndroid Build Coastguard Worker     /// ciphertext data. The key can be selected from context, i.e., the owner of the key
141*e1997b9aSAndroid Build Coastguard Worker     /// blob.
142*e1997b9aSAndroid Build Coastguard Worker     Encrypted {
143*e1997b9aSAndroid Build Coastguard Worker         /// Initialization vector.
144*e1997b9aSAndroid Build Coastguard Worker         iv: Vec<u8>,
145*e1997b9aSAndroid Build Coastguard Worker         /// Aead tag for integrity verification.
146*e1997b9aSAndroid Build Coastguard Worker         tag: Vec<u8>,
147*e1997b9aSAndroid Build Coastguard Worker         /// Ciphertext.
148*e1997b9aSAndroid Build Coastguard Worker         data: Vec<u8>,
149*e1997b9aSAndroid Build Coastguard Worker     },
150*e1997b9aSAndroid Build Coastguard Worker     /// An encrypted blob. Includes the initialization vector, the aead tag, and the
151*e1997b9aSAndroid Build Coastguard Worker     /// ciphertext data. The key can be selected from context, i.e., the owner of the key
152*e1997b9aSAndroid Build Coastguard Worker     /// blob. This is a special case for generic encrypted blobs as opposed to key blobs.
153*e1997b9aSAndroid Build Coastguard Worker     EncryptedGeneric {
154*e1997b9aSAndroid Build Coastguard Worker         /// Initialization vector.
155*e1997b9aSAndroid Build Coastguard Worker         iv: Vec<u8>,
156*e1997b9aSAndroid Build Coastguard Worker         /// Aead tag for integrity verification.
157*e1997b9aSAndroid Build Coastguard Worker         tag: Vec<u8>,
158*e1997b9aSAndroid Build Coastguard Worker         /// Ciphertext.
159*e1997b9aSAndroid Build Coastguard Worker         data: Vec<u8>,
160*e1997b9aSAndroid Build Coastguard Worker     },
161*e1997b9aSAndroid Build Coastguard Worker     /// Holds the plaintext key blob either after unwrapping an encrypted blob or when the
162*e1997b9aSAndroid Build Coastguard Worker     /// blob was stored in "plaintext" on disk. The "plaintext" of a key blob is not actual
163*e1997b9aSAndroid Build Coastguard Worker     /// plaintext because all KeyMint blobs are encrypted with a device bound key. The key
164*e1997b9aSAndroid Build Coastguard Worker     /// blob in this Variant is decrypted only with respect to any extra layer of encryption
165*e1997b9aSAndroid Build Coastguard Worker     /// that Keystore added.
166*e1997b9aSAndroid Build Coastguard Worker     Decrypted(ZVec),
167*e1997b9aSAndroid Build Coastguard Worker }
168*e1997b9aSAndroid Build Coastguard Worker 
169*e1997b9aSAndroid Build Coastguard Worker /// Keystore used two different key characteristics file formats in the past.
170*e1997b9aSAndroid Build Coastguard Worker /// The key characteristics cache which superseded the characteristics file.
171*e1997b9aSAndroid Build Coastguard Worker /// The latter stored only one list of key parameters, while the former stored
172*e1997b9aSAndroid Build Coastguard Worker /// a hardware enforced and a software enforced list. This Enum indicates which
173*e1997b9aSAndroid Build Coastguard Worker /// type was read from the file system.
174*e1997b9aSAndroid Build Coastguard Worker #[derive(Debug, Clone, Eq, PartialEq, Ord, PartialOrd)]
175*e1997b9aSAndroid Build Coastguard Worker pub enum LegacyKeyCharacteristics {
176*e1997b9aSAndroid Build Coastguard Worker     /// A characteristics cache was read.
177*e1997b9aSAndroid Build Coastguard Worker     Cache(Vec<KeyParameter>),
178*e1997b9aSAndroid Build Coastguard Worker     /// A characteristics file was read.
179*e1997b9aSAndroid Build Coastguard Worker     File(Vec<KeyParameter>),
180*e1997b9aSAndroid Build Coastguard Worker }
181*e1997b9aSAndroid Build Coastguard Worker 
182*e1997b9aSAndroid Build Coastguard Worker /// Represents a loaded legacy key blob file.
183*e1997b9aSAndroid Build Coastguard Worker #[derive(Debug, Eq, PartialEq)]
184*e1997b9aSAndroid Build Coastguard Worker pub struct Blob {
185*e1997b9aSAndroid Build Coastguard Worker     flags: u8,
186*e1997b9aSAndroid Build Coastguard Worker     value: BlobValue,
187*e1997b9aSAndroid Build Coastguard Worker }
188*e1997b9aSAndroid Build Coastguard Worker 
189*e1997b9aSAndroid Build Coastguard Worker /// This object represents a path that holds a legacy Keystore blob database.
190*e1997b9aSAndroid Build Coastguard Worker pub struct LegacyBlobLoader {
191*e1997b9aSAndroid Build Coastguard Worker     path: PathBuf,
192*e1997b9aSAndroid Build Coastguard Worker }
193*e1997b9aSAndroid Build Coastguard Worker 
read_bool(stream: &mut dyn Read) -> Result<bool>194*e1997b9aSAndroid Build Coastguard Worker fn read_bool(stream: &mut dyn Read) -> Result<bool> {
195*e1997b9aSAndroid Build Coastguard Worker     const SIZE: usize = std::mem::size_of::<bool>();
196*e1997b9aSAndroid Build Coastguard Worker     let mut buffer: [u8; SIZE] = [0; SIZE];
197*e1997b9aSAndroid Build Coastguard Worker     stream.read_exact(&mut buffer).map(|_| buffer[0] != 0).context("In read_ne_bool.")
198*e1997b9aSAndroid Build Coastguard Worker }
199*e1997b9aSAndroid Build Coastguard Worker 
read_ne_u32(stream: &mut dyn Read) -> Result<u32>200*e1997b9aSAndroid Build Coastguard Worker fn read_ne_u32(stream: &mut dyn Read) -> Result<u32> {
201*e1997b9aSAndroid Build Coastguard Worker     const SIZE: usize = std::mem::size_of::<u32>();
202*e1997b9aSAndroid Build Coastguard Worker     let mut buffer: [u8; SIZE] = [0; SIZE];
203*e1997b9aSAndroid Build Coastguard Worker     stream.read_exact(&mut buffer).map(|_| u32::from_ne_bytes(buffer)).context("In read_ne_u32.")
204*e1997b9aSAndroid Build Coastguard Worker }
205*e1997b9aSAndroid Build Coastguard Worker 
read_ne_i32(stream: &mut dyn Read) -> Result<i32>206*e1997b9aSAndroid Build Coastguard Worker fn read_ne_i32(stream: &mut dyn Read) -> Result<i32> {
207*e1997b9aSAndroid Build Coastguard Worker     const SIZE: usize = std::mem::size_of::<i32>();
208*e1997b9aSAndroid Build Coastguard Worker     let mut buffer: [u8; SIZE] = [0; SIZE];
209*e1997b9aSAndroid Build Coastguard Worker     stream.read_exact(&mut buffer).map(|_| i32::from_ne_bytes(buffer)).context("In read_ne_i32.")
210*e1997b9aSAndroid Build Coastguard Worker }
211*e1997b9aSAndroid Build Coastguard Worker 
read_ne_i64(stream: &mut dyn Read) -> Result<i64>212*e1997b9aSAndroid Build Coastguard Worker fn read_ne_i64(stream: &mut dyn Read) -> Result<i64> {
213*e1997b9aSAndroid Build Coastguard Worker     const SIZE: usize = std::mem::size_of::<i64>();
214*e1997b9aSAndroid Build Coastguard Worker     let mut buffer: [u8; SIZE] = [0; SIZE];
215*e1997b9aSAndroid Build Coastguard Worker     stream.read_exact(&mut buffer).map(|_| i64::from_ne_bytes(buffer)).context("In read_ne_i64.")
216*e1997b9aSAndroid Build Coastguard Worker }
217*e1997b9aSAndroid Build Coastguard Worker 
218*e1997b9aSAndroid Build Coastguard Worker impl Blob {
219*e1997b9aSAndroid Build Coastguard Worker     /// Creates a new blob from flags and value.
new(flags: u8, value: BlobValue) -> Self220*e1997b9aSAndroid Build Coastguard Worker     pub fn new(flags: u8, value: BlobValue) -> Self {
221*e1997b9aSAndroid Build Coastguard Worker         Self { flags, value }
222*e1997b9aSAndroid Build Coastguard Worker     }
223*e1997b9aSAndroid Build Coastguard Worker 
224*e1997b9aSAndroid Build Coastguard Worker     /// Return the raw flags of this Blob.
get_flags(&self) -> u8225*e1997b9aSAndroid Build Coastguard Worker     pub fn get_flags(&self) -> u8 {
226*e1997b9aSAndroid Build Coastguard Worker         self.flags
227*e1997b9aSAndroid Build Coastguard Worker     }
228*e1997b9aSAndroid Build Coastguard Worker 
229*e1997b9aSAndroid Build Coastguard Worker     /// This blob was generated with a fallback software KM device.
is_fallback(&self) -> bool230*e1997b9aSAndroid Build Coastguard Worker     pub fn is_fallback(&self) -> bool {
231*e1997b9aSAndroid Build Coastguard Worker         self.flags & flags::FALLBACK != 0
232*e1997b9aSAndroid Build Coastguard Worker     }
233*e1997b9aSAndroid Build Coastguard Worker 
234*e1997b9aSAndroid Build Coastguard Worker     /// This blob is encrypted and needs to be decrypted with the user specific master key
235*e1997b9aSAndroid Build Coastguard Worker     /// before use.
is_encrypted(&self) -> bool236*e1997b9aSAndroid Build Coastguard Worker     pub fn is_encrypted(&self) -> bool {
237*e1997b9aSAndroid Build Coastguard Worker         self.flags & (flags::SUPER_ENCRYPTED | flags::ENCRYPTED) != 0
238*e1997b9aSAndroid Build Coastguard Worker     }
239*e1997b9aSAndroid Build Coastguard Worker 
240*e1997b9aSAndroid Build Coastguard Worker     /// This blob is critical to device encryption. It cannot be encrypted with the super key
241*e1997b9aSAndroid Build Coastguard Worker     /// because it is itself part of the key derivation process for the key encrypting the
242*e1997b9aSAndroid Build Coastguard Worker     /// super key.
is_critical_to_device_encryption(&self) -> bool243*e1997b9aSAndroid Build Coastguard Worker     pub fn is_critical_to_device_encryption(&self) -> bool {
244*e1997b9aSAndroid Build Coastguard Worker         self.flags & flags::CRITICAL_TO_DEVICE_ENCRYPTION != 0
245*e1997b9aSAndroid Build Coastguard Worker     }
246*e1997b9aSAndroid Build Coastguard Worker 
247*e1997b9aSAndroid Build Coastguard Worker     /// This blob is associated with the Strongbox security level.
is_strongbox(&self) -> bool248*e1997b9aSAndroid Build Coastguard Worker     pub fn is_strongbox(&self) -> bool {
249*e1997b9aSAndroid Build Coastguard Worker         self.flags & flags::STRONGBOX != 0
250*e1997b9aSAndroid Build Coastguard Worker     }
251*e1997b9aSAndroid Build Coastguard Worker 
252*e1997b9aSAndroid Build Coastguard Worker     /// Returns the payload data of this blob file.
value(&self) -> &BlobValue253*e1997b9aSAndroid Build Coastguard Worker     pub fn value(&self) -> &BlobValue {
254*e1997b9aSAndroid Build Coastguard Worker         &self.value
255*e1997b9aSAndroid Build Coastguard Worker     }
256*e1997b9aSAndroid Build Coastguard Worker 
257*e1997b9aSAndroid Build Coastguard Worker     /// Consume this blob structure and extract the payload.
take_value(self) -> BlobValue258*e1997b9aSAndroid Build Coastguard Worker     pub fn take_value(self) -> BlobValue {
259*e1997b9aSAndroid Build Coastguard Worker         self.value
260*e1997b9aSAndroid Build Coastguard Worker     }
261*e1997b9aSAndroid Build Coastguard Worker }
262*e1997b9aSAndroid Build Coastguard Worker 
263*e1997b9aSAndroid Build Coastguard Worker impl LegacyBlobLoader {
264*e1997b9aSAndroid Build Coastguard Worker     const IV_SIZE: usize = keystore2_crypto::LEGACY_IV_LENGTH;
265*e1997b9aSAndroid Build Coastguard Worker     const GCM_TAG_LENGTH: usize = keystore2_crypto::TAG_LENGTH;
266*e1997b9aSAndroid Build Coastguard Worker     const SALT_SIZE: usize = keystore2_crypto::SALT_LENGTH;
267*e1997b9aSAndroid Build Coastguard Worker 
268*e1997b9aSAndroid Build Coastguard Worker     // The common header has the following structure:
269*e1997b9aSAndroid Build Coastguard Worker     // version (1 Byte)
270*e1997b9aSAndroid Build Coastguard Worker     // blob_type (1 Byte)
271*e1997b9aSAndroid Build Coastguard Worker     // flags (1 Byte)
272*e1997b9aSAndroid Build Coastguard Worker     // info (1 Byte) Size of an info field appended to the blob.
273*e1997b9aSAndroid Build Coastguard Worker     // initialization_vector (16 Bytes)
274*e1997b9aSAndroid Build Coastguard Worker     // integrity (MD5 digest or gcm tag) (16 Bytes)
275*e1997b9aSAndroid Build Coastguard Worker     // length (4 Bytes)
276*e1997b9aSAndroid Build Coastguard Worker     //
277*e1997b9aSAndroid Build Coastguard Worker     // The info field is used to store the salt for password encrypted blobs.
278*e1997b9aSAndroid Build Coastguard Worker     // The beginning of the info field can be computed from the file length
279*e1997b9aSAndroid Build Coastguard Worker     // and the info byte from the header: <file length> - <info> bytes.
280*e1997b9aSAndroid Build Coastguard Worker     const COMMON_HEADER_SIZE: usize = 4 + Self::IV_SIZE + Self::GCM_TAG_LENGTH + 4;
281*e1997b9aSAndroid Build Coastguard Worker 
282*e1997b9aSAndroid Build Coastguard Worker     const VERSION_OFFSET: usize = 0;
283*e1997b9aSAndroid Build Coastguard Worker     const TYPE_OFFSET: usize = 1;
284*e1997b9aSAndroid Build Coastguard Worker     const FLAGS_OFFSET: usize = 2;
285*e1997b9aSAndroid Build Coastguard Worker     const SALT_SIZE_OFFSET: usize = 3;
286*e1997b9aSAndroid Build Coastguard Worker     const LENGTH_OFFSET: usize = 4 + Self::IV_SIZE + Self::GCM_TAG_LENGTH;
287*e1997b9aSAndroid Build Coastguard Worker     const IV_OFFSET: usize = 4;
288*e1997b9aSAndroid Build Coastguard Worker     const AEAD_TAG_OFFSET: usize = Self::IV_OFFSET + Self::IV_SIZE;
289*e1997b9aSAndroid Build Coastguard Worker     const _DIGEST_OFFSET: usize = Self::IV_OFFSET + Self::IV_SIZE;
290*e1997b9aSAndroid Build Coastguard Worker 
291*e1997b9aSAndroid Build Coastguard Worker     /// Construct a new LegacyBlobLoader with a root path of `path` relative to which it will
292*e1997b9aSAndroid Build Coastguard Worker     /// expect legacy key blob files.
new(path: &Path) -> Self293*e1997b9aSAndroid Build Coastguard Worker     pub fn new(path: &Path) -> Self {
294*e1997b9aSAndroid Build Coastguard Worker         Self { path: path.to_owned() }
295*e1997b9aSAndroid Build Coastguard Worker     }
296*e1997b9aSAndroid Build Coastguard Worker 
297*e1997b9aSAndroid Build Coastguard Worker     /// Encodes an alias string as ascii character sequence in the range
298*e1997b9aSAndroid Build Coastguard Worker     /// ['+' .. '.'] and ['0' .. '~'].
299*e1997b9aSAndroid Build Coastguard Worker     /// Bytes with values in the range ['0' .. '~'] are represented as they are.
300*e1997b9aSAndroid Build Coastguard Worker     /// All other bytes are split into two characters as follows:
301*e1997b9aSAndroid Build Coastguard Worker     ///
302*e1997b9aSAndroid Build Coastguard Worker     ///      msb a a | b b b b b b
303*e1997b9aSAndroid Build Coastguard Worker     ///
304*e1997b9aSAndroid Build Coastguard Worker     /// The most significant bits (a) are encoded:
305*e1997b9aSAndroid Build Coastguard Worker     ///   a a  character
306*e1997b9aSAndroid Build Coastguard Worker     ///   0 0     '+'
307*e1997b9aSAndroid Build Coastguard Worker     ///   0 1     ','
308*e1997b9aSAndroid Build Coastguard Worker     ///   1 0     '-'
309*e1997b9aSAndroid Build Coastguard Worker     ///   1 1     '.'
310*e1997b9aSAndroid Build Coastguard Worker     ///
311*e1997b9aSAndroid Build Coastguard Worker     /// The 6 lower bits are represented with the range ['0' .. 'o']:
312*e1997b9aSAndroid Build Coastguard Worker     ///   b(hex)  character
313*e1997b9aSAndroid Build Coastguard Worker     ///   0x00     '0'
314*e1997b9aSAndroid Build Coastguard Worker     ///       ...
315*e1997b9aSAndroid Build Coastguard Worker     ///   0x3F     'o'
316*e1997b9aSAndroid Build Coastguard Worker     ///
317*e1997b9aSAndroid Build Coastguard Worker     /// The function cannot fail because we have a representation for each
318*e1997b9aSAndroid Build Coastguard Worker     /// of the 256 possible values of each byte.
encode_alias(name: &str) -> String319*e1997b9aSAndroid Build Coastguard Worker     pub fn encode_alias(name: &str) -> String {
320*e1997b9aSAndroid Build Coastguard Worker         let mut acc = String::new();
321*e1997b9aSAndroid Build Coastguard Worker         for c in name.bytes() {
322*e1997b9aSAndroid Build Coastguard Worker             match c {
323*e1997b9aSAndroid Build Coastguard Worker                 b'0'..=b'~' => {
324*e1997b9aSAndroid Build Coastguard Worker                     acc.push(c as char);
325*e1997b9aSAndroid Build Coastguard Worker                 }
326*e1997b9aSAndroid Build Coastguard Worker                 c => {
327*e1997b9aSAndroid Build Coastguard Worker                     acc.push((b'+' + (c >> 6)) as char);
328*e1997b9aSAndroid Build Coastguard Worker                     acc.push((b'0' + (c & 0x3F)) as char);
329*e1997b9aSAndroid Build Coastguard Worker                 }
330*e1997b9aSAndroid Build Coastguard Worker             };
331*e1997b9aSAndroid Build Coastguard Worker         }
332*e1997b9aSAndroid Build Coastguard Worker         acc
333*e1997b9aSAndroid Build Coastguard Worker     }
334*e1997b9aSAndroid Build Coastguard Worker 
335*e1997b9aSAndroid Build Coastguard Worker     /// This function reverses the encoding described in `encode_alias`.
336*e1997b9aSAndroid Build Coastguard Worker     /// This function can fail, because not all possible character
337*e1997b9aSAndroid Build Coastguard Worker     /// sequences are valid code points. And even if the encoding is valid,
338*e1997b9aSAndroid Build Coastguard Worker     /// the result may not be a valid UTF-8 sequence.
decode_alias(name: &str) -> Result<String>339*e1997b9aSAndroid Build Coastguard Worker     pub fn decode_alias(name: &str) -> Result<String> {
340*e1997b9aSAndroid Build Coastguard Worker         let mut multi: Option<u8> = None;
341*e1997b9aSAndroid Build Coastguard Worker         let mut s = Vec::<u8>::new();
342*e1997b9aSAndroid Build Coastguard Worker         for c in name.bytes() {
343*e1997b9aSAndroid Build Coastguard Worker             multi = match (c, multi) {
344*e1997b9aSAndroid Build Coastguard Worker                 // m is set, we are processing the second part of a multi byte sequence
345*e1997b9aSAndroid Build Coastguard Worker                 (b'0'..=b'o', Some(m)) => {
346*e1997b9aSAndroid Build Coastguard Worker                     s.push(m | (c - b'0'));
347*e1997b9aSAndroid Build Coastguard Worker                     None
348*e1997b9aSAndroid Build Coastguard Worker                 }
349*e1997b9aSAndroid Build Coastguard Worker                 (b'+'..=b'.', None) => Some((c - b'+') << 6),
350*e1997b9aSAndroid Build Coastguard Worker                 (b'0'..=b'~', None) => {
351*e1997b9aSAndroid Build Coastguard Worker                     s.push(c);
352*e1997b9aSAndroid Build Coastguard Worker                     None
353*e1997b9aSAndroid Build Coastguard Worker                 }
354*e1997b9aSAndroid Build Coastguard Worker                 _ => {
355*e1997b9aSAndroid Build Coastguard Worker                     return Err(Error::BadEncoding).context(ks_err!("could not decode filename."));
356*e1997b9aSAndroid Build Coastguard Worker                 }
357*e1997b9aSAndroid Build Coastguard Worker             };
358*e1997b9aSAndroid Build Coastguard Worker         }
359*e1997b9aSAndroid Build Coastguard Worker         if multi.is_some() {
360*e1997b9aSAndroid Build Coastguard Worker             return Err(Error::BadEncoding).context(ks_err!("could not decode filename."));
361*e1997b9aSAndroid Build Coastguard Worker         }
362*e1997b9aSAndroid Build Coastguard Worker 
363*e1997b9aSAndroid Build Coastguard Worker         String::from_utf8(s).context(ks_err!("encoded alias was not valid UTF-8."))
364*e1997b9aSAndroid Build Coastguard Worker     }
365*e1997b9aSAndroid Build Coastguard Worker 
new_from_stream(stream: &mut dyn Read) -> Result<Blob>366*e1997b9aSAndroid Build Coastguard Worker     fn new_from_stream(stream: &mut dyn Read) -> Result<Blob> {
367*e1997b9aSAndroid Build Coastguard Worker         let mut buffer = Vec::new();
368*e1997b9aSAndroid Build Coastguard Worker         stream.read_to_end(&mut buffer).context(ks_err!())?;
369*e1997b9aSAndroid Build Coastguard Worker 
370*e1997b9aSAndroid Build Coastguard Worker         if buffer.len() < Self::COMMON_HEADER_SIZE {
371*e1997b9aSAndroid Build Coastguard Worker             return Err(Error::BadLen).context(ks_err!())?;
372*e1997b9aSAndroid Build Coastguard Worker         }
373*e1997b9aSAndroid Build Coastguard Worker 
374*e1997b9aSAndroid Build Coastguard Worker         let version: u8 = buffer[Self::VERSION_OFFSET];
375*e1997b9aSAndroid Build Coastguard Worker 
376*e1997b9aSAndroid Build Coastguard Worker         let flags: u8 = buffer[Self::FLAGS_OFFSET];
377*e1997b9aSAndroid Build Coastguard Worker         let blob_type: u8 = buffer[Self::TYPE_OFFSET];
378*e1997b9aSAndroid Build Coastguard Worker         let is_encrypted = flags & (flags::ENCRYPTED | flags::SUPER_ENCRYPTED) != 0;
379*e1997b9aSAndroid Build Coastguard Worker         let salt = match buffer[Self::SALT_SIZE_OFFSET] as usize {
380*e1997b9aSAndroid Build Coastguard Worker             Self::SALT_SIZE => Some(&buffer[buffer.len() - Self::SALT_SIZE..buffer.len()]),
381*e1997b9aSAndroid Build Coastguard Worker             _ => None,
382*e1997b9aSAndroid Build Coastguard Worker         };
383*e1997b9aSAndroid Build Coastguard Worker 
384*e1997b9aSAndroid Build Coastguard Worker         if version != SUPPORTED_LEGACY_BLOB_VERSION {
385*e1997b9aSAndroid Build Coastguard Worker             return Err(KsError::Rc(ResponseCode::VALUE_CORRUPTED))
386*e1997b9aSAndroid Build Coastguard Worker                 .context(ks_err!("Unknown blob version: {}.", version));
387*e1997b9aSAndroid Build Coastguard Worker         }
388*e1997b9aSAndroid Build Coastguard Worker 
389*e1997b9aSAndroid Build Coastguard Worker         let length = u32::from_be_bytes(
390*e1997b9aSAndroid Build Coastguard Worker             buffer[Self::LENGTH_OFFSET..Self::LENGTH_OFFSET + 4].try_into().unwrap(),
391*e1997b9aSAndroid Build Coastguard Worker         ) as usize;
392*e1997b9aSAndroid Build Coastguard Worker         if buffer.len() < Self::COMMON_HEADER_SIZE + length {
393*e1997b9aSAndroid Build Coastguard Worker             return Err(Error::BadLen).context(ks_err!(
394*e1997b9aSAndroid Build Coastguard Worker                 "Expected: {} got: {}.",
395*e1997b9aSAndroid Build Coastguard Worker                 Self::COMMON_HEADER_SIZE + length,
396*e1997b9aSAndroid Build Coastguard Worker                 buffer.len()
397*e1997b9aSAndroid Build Coastguard Worker             ));
398*e1997b9aSAndroid Build Coastguard Worker         }
399*e1997b9aSAndroid Build Coastguard Worker         let value = &buffer[Self::COMMON_HEADER_SIZE..Self::COMMON_HEADER_SIZE + length];
400*e1997b9aSAndroid Build Coastguard Worker         let iv = &buffer[Self::IV_OFFSET..Self::IV_OFFSET + Self::IV_SIZE];
401*e1997b9aSAndroid Build Coastguard Worker         let tag = &buffer[Self::AEAD_TAG_OFFSET..Self::AEAD_TAG_OFFSET + Self::GCM_TAG_LENGTH];
402*e1997b9aSAndroid Build Coastguard Worker 
403*e1997b9aSAndroid Build Coastguard Worker         match (blob_type, is_encrypted, salt) {
404*e1997b9aSAndroid Build Coastguard Worker             (blob_types::GENERIC, false, _) => {
405*e1997b9aSAndroid Build Coastguard Worker                 Ok(Blob { flags, value: BlobValue::Generic(value.to_vec()) })
406*e1997b9aSAndroid Build Coastguard Worker             }
407*e1997b9aSAndroid Build Coastguard Worker             (blob_types::GENERIC, true, _) => Ok(Blob {
408*e1997b9aSAndroid Build Coastguard Worker                 flags,
409*e1997b9aSAndroid Build Coastguard Worker                 value: BlobValue::EncryptedGeneric {
410*e1997b9aSAndroid Build Coastguard Worker                     iv: iv.to_vec(),
411*e1997b9aSAndroid Build Coastguard Worker                     tag: tag.to_vec(),
412*e1997b9aSAndroid Build Coastguard Worker                     data: value.to_vec(),
413*e1997b9aSAndroid Build Coastguard Worker                 },
414*e1997b9aSAndroid Build Coastguard Worker             }),
415*e1997b9aSAndroid Build Coastguard Worker             (blob_types::KEY_CHARACTERISTICS, false, _) => {
416*e1997b9aSAndroid Build Coastguard Worker                 Ok(Blob { flags, value: BlobValue::Characteristics(value.to_vec()) })
417*e1997b9aSAndroid Build Coastguard Worker             }
418*e1997b9aSAndroid Build Coastguard Worker             (blob_types::KEY_CHARACTERISTICS, true, _) => Ok(Blob {
419*e1997b9aSAndroid Build Coastguard Worker                 flags,
420*e1997b9aSAndroid Build Coastguard Worker                 value: BlobValue::EncryptedCharacteristics {
421*e1997b9aSAndroid Build Coastguard Worker                     iv: iv.to_vec(),
422*e1997b9aSAndroid Build Coastguard Worker                     tag: tag.to_vec(),
423*e1997b9aSAndroid Build Coastguard Worker                     data: value.to_vec(),
424*e1997b9aSAndroid Build Coastguard Worker                 },
425*e1997b9aSAndroid Build Coastguard Worker             }),
426*e1997b9aSAndroid Build Coastguard Worker             (blob_types::KEY_CHARACTERISTICS_CACHE, _, _) => {
427*e1997b9aSAndroid Build Coastguard Worker                 Ok(Blob { flags, value: BlobValue::CharacteristicsCache(value.to_vec()) })
428*e1997b9aSAndroid Build Coastguard Worker             }
429*e1997b9aSAndroid Build Coastguard Worker             (blob_types::SUPER_KEY, _, Some(salt)) => Ok(Blob {
430*e1997b9aSAndroid Build Coastguard Worker                 flags,
431*e1997b9aSAndroid Build Coastguard Worker                 value: BlobValue::PwEncrypted {
432*e1997b9aSAndroid Build Coastguard Worker                     iv: iv.to_vec(),
433*e1997b9aSAndroid Build Coastguard Worker                     tag: tag.to_vec(),
434*e1997b9aSAndroid Build Coastguard Worker                     data: value.to_vec(),
435*e1997b9aSAndroid Build Coastguard Worker                     key_size: keystore2_crypto::AES_128_KEY_LENGTH,
436*e1997b9aSAndroid Build Coastguard Worker                     salt: salt.to_vec(),
437*e1997b9aSAndroid Build Coastguard Worker                 },
438*e1997b9aSAndroid Build Coastguard Worker             }),
439*e1997b9aSAndroid Build Coastguard Worker             (blob_types::SUPER_KEY_AES256, _, Some(salt)) => Ok(Blob {
440*e1997b9aSAndroid Build Coastguard Worker                 flags,
441*e1997b9aSAndroid Build Coastguard Worker                 value: BlobValue::PwEncrypted {
442*e1997b9aSAndroid Build Coastguard Worker                     iv: iv.to_vec(),
443*e1997b9aSAndroid Build Coastguard Worker                     tag: tag.to_vec(),
444*e1997b9aSAndroid Build Coastguard Worker                     data: value.to_vec(),
445*e1997b9aSAndroid Build Coastguard Worker                     key_size: keystore2_crypto::AES_256_KEY_LENGTH,
446*e1997b9aSAndroid Build Coastguard Worker                     salt: salt.to_vec(),
447*e1997b9aSAndroid Build Coastguard Worker                 },
448*e1997b9aSAndroid Build Coastguard Worker             }),
449*e1997b9aSAndroid Build Coastguard Worker             (blob_types::KM_BLOB, true, _) => Ok(Blob {
450*e1997b9aSAndroid Build Coastguard Worker                 flags,
451*e1997b9aSAndroid Build Coastguard Worker                 value: BlobValue::Encrypted {
452*e1997b9aSAndroid Build Coastguard Worker                     iv: iv.to_vec(),
453*e1997b9aSAndroid Build Coastguard Worker                     tag: tag.to_vec(),
454*e1997b9aSAndroid Build Coastguard Worker                     data: value.to_vec(),
455*e1997b9aSAndroid Build Coastguard Worker                 },
456*e1997b9aSAndroid Build Coastguard Worker             }),
457*e1997b9aSAndroid Build Coastguard Worker             (blob_types::KM_BLOB, false, _) => Ok(Blob {
458*e1997b9aSAndroid Build Coastguard Worker                 flags,
459*e1997b9aSAndroid Build Coastguard Worker                 value: BlobValue::Decrypted(value.try_into().context("In new_from_stream.")?),
460*e1997b9aSAndroid Build Coastguard Worker             }),
461*e1997b9aSAndroid Build Coastguard Worker             (blob_types::SUPER_KEY, _, None) | (blob_types::SUPER_KEY_AES256, _, None) => {
462*e1997b9aSAndroid Build Coastguard Worker                 Err(KsError::Rc(ResponseCode::VALUE_CORRUPTED))
463*e1997b9aSAndroid Build Coastguard Worker                     .context(ks_err!("Super key without salt for key derivation."))
464*e1997b9aSAndroid Build Coastguard Worker             }
465*e1997b9aSAndroid Build Coastguard Worker             _ => Err(KsError::Rc(ResponseCode::VALUE_CORRUPTED)).context(ks_err!(
466*e1997b9aSAndroid Build Coastguard Worker                 "Unknown blob type. {} {}",
467*e1997b9aSAndroid Build Coastguard Worker                 blob_type,
468*e1997b9aSAndroid Build Coastguard Worker                 is_encrypted
469*e1997b9aSAndroid Build Coastguard Worker             )),
470*e1997b9aSAndroid Build Coastguard Worker         }
471*e1997b9aSAndroid Build Coastguard Worker     }
472*e1997b9aSAndroid Build Coastguard Worker 
473*e1997b9aSAndroid Build Coastguard Worker     /// Parses a legacy key blob file read from `stream`. A `decrypt` closure
474*e1997b9aSAndroid Build Coastguard Worker     /// must be supplied, that is primed with the appropriate key.
475*e1997b9aSAndroid Build Coastguard Worker     /// The callback takes the following arguments:
476*e1997b9aSAndroid Build Coastguard Worker     ///  * ciphertext: &[u8] - The to-be-deciphered message.
477*e1997b9aSAndroid Build Coastguard Worker     ///  * iv: &[u8] - The initialization vector.
478*e1997b9aSAndroid Build Coastguard Worker     ///  * tag: Option<&[u8]> - AEAD tag if AES GCM is selected.
479*e1997b9aSAndroid Build Coastguard Worker     ///  * salt: Option<&[u8]> - An optional salt. Used for password key derivation.
480*e1997b9aSAndroid Build Coastguard Worker     ///  * key_size: Option<usize> - An optional key size. Used for pw key derivation.
481*e1997b9aSAndroid Build Coastguard Worker     ///
482*e1997b9aSAndroid Build Coastguard Worker     /// If no super key is available, the callback must return
483*e1997b9aSAndroid Build Coastguard Worker     /// `Err(KsError::Rc(ResponseCode::LOCKED))`. The callback is only called
484*e1997b9aSAndroid Build Coastguard Worker     /// if the to-be-read blob is encrypted.
new_from_stream_decrypt_with<F>(mut stream: impl Read, decrypt: F) -> Result<Blob> where F: FnOnce(&[u8], &[u8], &[u8], Option<&[u8]>, Option<usize>) -> Result<ZVec>,485*e1997b9aSAndroid Build Coastguard Worker     pub fn new_from_stream_decrypt_with<F>(mut stream: impl Read, decrypt: F) -> Result<Blob>
486*e1997b9aSAndroid Build Coastguard Worker     where
487*e1997b9aSAndroid Build Coastguard Worker         F: FnOnce(&[u8], &[u8], &[u8], Option<&[u8]>, Option<usize>) -> Result<ZVec>,
488*e1997b9aSAndroid Build Coastguard Worker     {
489*e1997b9aSAndroid Build Coastguard Worker         let blob = Self::new_from_stream(&mut stream).context(ks_err!())?;
490*e1997b9aSAndroid Build Coastguard Worker 
491*e1997b9aSAndroid Build Coastguard Worker         match blob.value() {
492*e1997b9aSAndroid Build Coastguard Worker             BlobValue::Encrypted { iv, tag, data } => Ok(Blob {
493*e1997b9aSAndroid Build Coastguard Worker                 flags: blob.flags,
494*e1997b9aSAndroid Build Coastguard Worker                 value: BlobValue::Decrypted(decrypt(data, iv, tag, None, None).context(ks_err!())?),
495*e1997b9aSAndroid Build Coastguard Worker             }),
496*e1997b9aSAndroid Build Coastguard Worker             BlobValue::PwEncrypted { iv, tag, data, salt, key_size } => Ok(Blob {
497*e1997b9aSAndroid Build Coastguard Worker                 flags: blob.flags,
498*e1997b9aSAndroid Build Coastguard Worker                 value: BlobValue::Decrypted(
499*e1997b9aSAndroid Build Coastguard Worker                     decrypt(data, iv, tag, Some(salt), Some(*key_size)).context(ks_err!())?,
500*e1997b9aSAndroid Build Coastguard Worker                 ),
501*e1997b9aSAndroid Build Coastguard Worker             }),
502*e1997b9aSAndroid Build Coastguard Worker             BlobValue::EncryptedGeneric { iv, tag, data } => Ok(Blob {
503*e1997b9aSAndroid Build Coastguard Worker                 flags: blob.flags,
504*e1997b9aSAndroid Build Coastguard Worker                 value: BlobValue::Generic(
505*e1997b9aSAndroid Build Coastguard Worker                     decrypt(data, iv, tag, None, None).context(ks_err!())?[..].to_vec(),
506*e1997b9aSAndroid Build Coastguard Worker                 ),
507*e1997b9aSAndroid Build Coastguard Worker             }),
508*e1997b9aSAndroid Build Coastguard Worker 
509*e1997b9aSAndroid Build Coastguard Worker             _ => Ok(blob),
510*e1997b9aSAndroid Build Coastguard Worker         }
511*e1997b9aSAndroid Build Coastguard Worker     }
512*e1997b9aSAndroid Build Coastguard Worker 
tag_type(tag: Tag) -> TagType513*e1997b9aSAndroid Build Coastguard Worker     fn tag_type(tag: Tag) -> TagType {
514*e1997b9aSAndroid Build Coastguard Worker         TagType((tag.0 as u32 & 0xFF000000u32) as i32)
515*e1997b9aSAndroid Build Coastguard Worker     }
516*e1997b9aSAndroid Build Coastguard Worker 
517*e1997b9aSAndroid Build Coastguard Worker     /// Read legacy key parameter file content.
518*e1997b9aSAndroid Build Coastguard Worker     /// Depending on the file type a key characteristics file stores one (TYPE_KEY_CHARACTERISTICS)
519*e1997b9aSAndroid Build Coastguard Worker     /// or two (TYPE_KEY_CHARACTERISTICS_CACHE) key parameter lists. The format of the list is as
520*e1997b9aSAndroid Build Coastguard Worker     /// follows:
521*e1997b9aSAndroid Build Coastguard Worker     ///
522*e1997b9aSAndroid Build Coastguard Worker     /// +------------------------------+
523*e1997b9aSAndroid Build Coastguard Worker     /// | 32 bit indirect_size         |
524*e1997b9aSAndroid Build Coastguard Worker     /// +------------------------------+
525*e1997b9aSAndroid Build Coastguard Worker     /// | indirect_size bytes of data  |     This is where the blob data is stored
526*e1997b9aSAndroid Build Coastguard Worker     /// +------------------------------+
527*e1997b9aSAndroid Build Coastguard Worker     /// | 32 bit element_count         |     Number of key parameter entries.
528*e1997b9aSAndroid Build Coastguard Worker     /// | 32 bit elements_size         |     Total bytes used by entries.
529*e1997b9aSAndroid Build Coastguard Worker     /// +------------------------------+
530*e1997b9aSAndroid Build Coastguard Worker     /// | elements_size bytes of data  |     This is where the elements are stored.
531*e1997b9aSAndroid Build Coastguard Worker     /// +------------------------------+
532*e1997b9aSAndroid Build Coastguard Worker     ///
533*e1997b9aSAndroid Build Coastguard Worker     /// Elements have a 32 bit header holding the tag with a tag type encoded in the
534*e1997b9aSAndroid Build Coastguard Worker     /// four most significant bits (see android/hardware/secruity/keymint/TagType.aidl).
535*e1997b9aSAndroid Build Coastguard Worker     /// The header is immediately followed by the payload. The payload size depends on
536*e1997b9aSAndroid Build Coastguard Worker     /// the encoded tag type in the header:
537*e1997b9aSAndroid Build Coastguard Worker     ///      BOOLEAN                          :    1 byte
538*e1997b9aSAndroid Build Coastguard Worker     ///      ENUM, ENUM_REP, UINT, UINT_REP   :    4 bytes
539*e1997b9aSAndroid Build Coastguard Worker     ///      ULONG, ULONG_REP, DATETIME       :    8 bytes
540*e1997b9aSAndroid Build Coastguard Worker     ///      BLOB, BIGNUM                     :    8 bytes see below.
541*e1997b9aSAndroid Build Coastguard Worker     ///
542*e1997b9aSAndroid Build Coastguard Worker     /// Bignum and blob payload format:
543*e1997b9aSAndroid Build Coastguard Worker     /// +------------------------+
544*e1997b9aSAndroid Build Coastguard Worker     /// | 32 bit blob_length     |    Length of the indirect payload in bytes.
545*e1997b9aSAndroid Build Coastguard Worker     /// | 32 bit indirect_offset |    Offset from the beginning of the indirect section.
546*e1997b9aSAndroid Build Coastguard Worker     /// +------------------------+
read_key_parameters(stream: &mut &[u8]) -> Result<Vec<KeyParameterValue>>547*e1997b9aSAndroid Build Coastguard Worker     pub fn read_key_parameters(stream: &mut &[u8]) -> Result<Vec<KeyParameterValue>> {
548*e1997b9aSAndroid Build Coastguard Worker         let indirect_size = read_ne_u32(stream).context(ks_err!("While reading indirect size."))?;
549*e1997b9aSAndroid Build Coastguard Worker 
550*e1997b9aSAndroid Build Coastguard Worker         let indirect_buffer = stream
551*e1997b9aSAndroid Build Coastguard Worker             .get(0..indirect_size as usize)
552*e1997b9aSAndroid Build Coastguard Worker             .ok_or(KsError::Rc(ResponseCode::VALUE_CORRUPTED))
553*e1997b9aSAndroid Build Coastguard Worker             .context(ks_err!("While reading indirect buffer."))?;
554*e1997b9aSAndroid Build Coastguard Worker 
555*e1997b9aSAndroid Build Coastguard Worker         // update the stream position.
556*e1997b9aSAndroid Build Coastguard Worker         *stream = &stream[indirect_size as usize..];
557*e1997b9aSAndroid Build Coastguard Worker 
558*e1997b9aSAndroid Build Coastguard Worker         let element_count = read_ne_u32(stream).context(ks_err!("While reading element count."))?;
559*e1997b9aSAndroid Build Coastguard Worker         let element_size = read_ne_u32(stream).context(ks_err!("While reading element size."))?;
560*e1997b9aSAndroid Build Coastguard Worker 
561*e1997b9aSAndroid Build Coastguard Worker         let mut element_stream = stream
562*e1997b9aSAndroid Build Coastguard Worker             .get(0..element_size as usize)
563*e1997b9aSAndroid Build Coastguard Worker             .ok_or(KsError::Rc(ResponseCode::VALUE_CORRUPTED))
564*e1997b9aSAndroid Build Coastguard Worker             .context(ks_err!("While reading elements buffer."))?;
565*e1997b9aSAndroid Build Coastguard Worker 
566*e1997b9aSAndroid Build Coastguard Worker         // update the stream position.
567*e1997b9aSAndroid Build Coastguard Worker         *stream = &stream[element_size as usize..];
568*e1997b9aSAndroid Build Coastguard Worker 
569*e1997b9aSAndroid Build Coastguard Worker         let mut params: Vec<KeyParameterValue> = Vec::new();
570*e1997b9aSAndroid Build Coastguard Worker         for _ in 0..element_count {
571*e1997b9aSAndroid Build Coastguard Worker             let tag = Tag(read_ne_i32(&mut element_stream).context(ks_err!())?);
572*e1997b9aSAndroid Build Coastguard Worker             let param = match Self::tag_type(tag) {
573*e1997b9aSAndroid Build Coastguard Worker                 TagType::ENUM | TagType::ENUM_REP | TagType::UINT | TagType::UINT_REP => {
574*e1997b9aSAndroid Build Coastguard Worker                     KeyParameterValue::new_from_tag_primitive_pair(
575*e1997b9aSAndroid Build Coastguard Worker                         tag,
576*e1997b9aSAndroid Build Coastguard Worker                         read_ne_i32(&mut element_stream).context("While reading integer.")?,
577*e1997b9aSAndroid Build Coastguard Worker                     )
578*e1997b9aSAndroid Build Coastguard Worker                     .context("Trying to construct integer/enum KeyParameterValue.")
579*e1997b9aSAndroid Build Coastguard Worker                 }
580*e1997b9aSAndroid Build Coastguard Worker                 TagType::ULONG | TagType::ULONG_REP | TagType::DATE => {
581*e1997b9aSAndroid Build Coastguard Worker                     KeyParameterValue::new_from_tag_primitive_pair(
582*e1997b9aSAndroid Build Coastguard Worker                         tag,
583*e1997b9aSAndroid Build Coastguard Worker                         read_ne_i64(&mut element_stream).context("While reading long integer.")?,
584*e1997b9aSAndroid Build Coastguard Worker                     )
585*e1997b9aSAndroid Build Coastguard Worker                     .context("Trying to construct long KeyParameterValue.")
586*e1997b9aSAndroid Build Coastguard Worker                 }
587*e1997b9aSAndroid Build Coastguard Worker                 TagType::BOOL => {
588*e1997b9aSAndroid Build Coastguard Worker                     if read_bool(&mut element_stream).context("While reading long integer.")? {
589*e1997b9aSAndroid Build Coastguard Worker                         KeyParameterValue::new_from_tag_primitive_pair(tag, 1)
590*e1997b9aSAndroid Build Coastguard Worker                             .context("Trying to construct boolean KeyParameterValue.")
591*e1997b9aSAndroid Build Coastguard Worker                     } else {
592*e1997b9aSAndroid Build Coastguard Worker                         Err(anyhow::anyhow!("Invalid."))
593*e1997b9aSAndroid Build Coastguard Worker                     }
594*e1997b9aSAndroid Build Coastguard Worker                 }
595*e1997b9aSAndroid Build Coastguard Worker                 TagType::BYTES | TagType::BIGNUM => {
596*e1997b9aSAndroid Build Coastguard Worker                     let blob_size = read_ne_u32(&mut element_stream)
597*e1997b9aSAndroid Build Coastguard Worker                         .context("While reading blob size.")?
598*e1997b9aSAndroid Build Coastguard Worker                         as usize;
599*e1997b9aSAndroid Build Coastguard Worker                     let indirect_offset = read_ne_u32(&mut element_stream)
600*e1997b9aSAndroid Build Coastguard Worker                         .context("While reading indirect offset.")?
601*e1997b9aSAndroid Build Coastguard Worker                         as usize;
602*e1997b9aSAndroid Build Coastguard Worker                     KeyParameterValue::new_from_tag_primitive_pair(
603*e1997b9aSAndroid Build Coastguard Worker                         tag,
604*e1997b9aSAndroid Build Coastguard Worker                         indirect_buffer
605*e1997b9aSAndroid Build Coastguard Worker                             .get(indirect_offset..indirect_offset + blob_size)
606*e1997b9aSAndroid Build Coastguard Worker                             .context("While reading blob value.")?
607*e1997b9aSAndroid Build Coastguard Worker                             .to_vec(),
608*e1997b9aSAndroid Build Coastguard Worker                     )
609*e1997b9aSAndroid Build Coastguard Worker                     .context("Trying to construct blob KeyParameterValue.")
610*e1997b9aSAndroid Build Coastguard Worker                 }
611*e1997b9aSAndroid Build Coastguard Worker                 TagType::INVALID => Err(anyhow::anyhow!("Invalid.")),
612*e1997b9aSAndroid Build Coastguard Worker                 _ => {
613*e1997b9aSAndroid Build Coastguard Worker                     return Err(KsError::Rc(ResponseCode::VALUE_CORRUPTED))
614*e1997b9aSAndroid Build Coastguard Worker                         .context(ks_err!("Encountered bogus tag type."));
615*e1997b9aSAndroid Build Coastguard Worker                 }
616*e1997b9aSAndroid Build Coastguard Worker             };
617*e1997b9aSAndroid Build Coastguard Worker             if let Ok(p) = param {
618*e1997b9aSAndroid Build Coastguard Worker                 params.push(p);
619*e1997b9aSAndroid Build Coastguard Worker             }
620*e1997b9aSAndroid Build Coastguard Worker         }
621*e1997b9aSAndroid Build Coastguard Worker 
622*e1997b9aSAndroid Build Coastguard Worker         Ok(params)
623*e1997b9aSAndroid Build Coastguard Worker     }
624*e1997b9aSAndroid Build Coastguard Worker 
625*e1997b9aSAndroid Build Coastguard Worker     /// This function takes a Blob and an optional AesGcm. Plain text blob variants are
626*e1997b9aSAndroid Build Coastguard Worker     /// passed through as is. If a super key is given an attempt is made to decrypt the
627*e1997b9aSAndroid Build Coastguard Worker     /// blob thereby mapping BlobValue variants as follows:
628*e1997b9aSAndroid Build Coastguard Worker     /// BlobValue::Encrypted => BlobValue::Decrypted
629*e1997b9aSAndroid Build Coastguard Worker     /// BlobValue::EncryptedGeneric => BlobValue::Generic
630*e1997b9aSAndroid Build Coastguard Worker     /// BlobValue::EncryptedCharacteristics => BlobValue::Characteristics
631*e1997b9aSAndroid Build Coastguard Worker     /// If now super key is given or BlobValue::PwEncrypted is encountered,
632*e1997b9aSAndroid Build Coastguard Worker     /// Err(Error::LockedComponent) is returned.
decrypt_if_required(super_key: &Option<Arc<dyn AesGcm>>, blob: Blob) -> Result<Blob>633*e1997b9aSAndroid Build Coastguard Worker     fn decrypt_if_required(super_key: &Option<Arc<dyn AesGcm>>, blob: Blob) -> Result<Blob> {
634*e1997b9aSAndroid Build Coastguard Worker         match blob {
635*e1997b9aSAndroid Build Coastguard Worker             Blob { value: BlobValue::Generic(_), .. }
636*e1997b9aSAndroid Build Coastguard Worker             | Blob { value: BlobValue::Characteristics(_), .. }
637*e1997b9aSAndroid Build Coastguard Worker             | Blob { value: BlobValue::CharacteristicsCache(_), .. }
638*e1997b9aSAndroid Build Coastguard Worker             | Blob { value: BlobValue::Decrypted(_), .. } => Ok(blob),
639*e1997b9aSAndroid Build Coastguard Worker             Blob { value: BlobValue::EncryptedCharacteristics { iv, tag, data }, flags }
640*e1997b9aSAndroid Build Coastguard Worker                 if super_key.is_some() =>
641*e1997b9aSAndroid Build Coastguard Worker             {
642*e1997b9aSAndroid Build Coastguard Worker                 Ok(Blob {
643*e1997b9aSAndroid Build Coastguard Worker                     value: BlobValue::Characteristics(
644*e1997b9aSAndroid Build Coastguard Worker                         super_key
645*e1997b9aSAndroid Build Coastguard Worker                             .as_ref()
646*e1997b9aSAndroid Build Coastguard Worker                             .unwrap()
647*e1997b9aSAndroid Build Coastguard Worker                             .decrypt(&data, &iv, &tag)
648*e1997b9aSAndroid Build Coastguard Worker                             .context(ks_err!("Failed to decrypt EncryptedCharacteristics"))?[..]
649*e1997b9aSAndroid Build Coastguard Worker                             .to_vec(),
650*e1997b9aSAndroid Build Coastguard Worker                     ),
651*e1997b9aSAndroid Build Coastguard Worker                     flags,
652*e1997b9aSAndroid Build Coastguard Worker                 })
653*e1997b9aSAndroid Build Coastguard Worker             }
654*e1997b9aSAndroid Build Coastguard Worker             Blob { value: BlobValue::Encrypted { iv, tag, data }, flags }
655*e1997b9aSAndroid Build Coastguard Worker                 if super_key.is_some() =>
656*e1997b9aSAndroid Build Coastguard Worker             {
657*e1997b9aSAndroid Build Coastguard Worker                 Ok(Blob {
658*e1997b9aSAndroid Build Coastguard Worker                     value: BlobValue::Decrypted(
659*e1997b9aSAndroid Build Coastguard Worker                         super_key
660*e1997b9aSAndroid Build Coastguard Worker                             .as_ref()
661*e1997b9aSAndroid Build Coastguard Worker                             .unwrap()
662*e1997b9aSAndroid Build Coastguard Worker                             .decrypt(&data, &iv, &tag)
663*e1997b9aSAndroid Build Coastguard Worker                             .context(ks_err!("Failed to decrypt Encrypted"))?,
664*e1997b9aSAndroid Build Coastguard Worker                     ),
665*e1997b9aSAndroid Build Coastguard Worker                     flags,
666*e1997b9aSAndroid Build Coastguard Worker                 })
667*e1997b9aSAndroid Build Coastguard Worker             }
668*e1997b9aSAndroid Build Coastguard Worker             Blob { value: BlobValue::EncryptedGeneric { iv, tag, data }, flags }
669*e1997b9aSAndroid Build Coastguard Worker                 if super_key.is_some() =>
670*e1997b9aSAndroid Build Coastguard Worker             {
671*e1997b9aSAndroid Build Coastguard Worker                 Ok(Blob {
672*e1997b9aSAndroid Build Coastguard Worker                     value: BlobValue::Generic(
673*e1997b9aSAndroid Build Coastguard Worker                         super_key
674*e1997b9aSAndroid Build Coastguard Worker                             .as_ref()
675*e1997b9aSAndroid Build Coastguard Worker                             .unwrap()
676*e1997b9aSAndroid Build Coastguard Worker                             .decrypt(&data, &iv, &tag)
677*e1997b9aSAndroid Build Coastguard Worker                             .context(ks_err!("Failed to decrypt Encrypted"))?[..]
678*e1997b9aSAndroid Build Coastguard Worker                             .to_vec(),
679*e1997b9aSAndroid Build Coastguard Worker                     ),
680*e1997b9aSAndroid Build Coastguard Worker                     flags,
681*e1997b9aSAndroid Build Coastguard Worker                 })
682*e1997b9aSAndroid Build Coastguard Worker             }
683*e1997b9aSAndroid Build Coastguard Worker             // This arm catches all encrypted cases where super key is not present or cannot
684*e1997b9aSAndroid Build Coastguard Worker             // decrypt the blob, the latter being BlobValue::PwEncrypted.
685*e1997b9aSAndroid Build Coastguard Worker             _ => Err(Error::LockedComponent)
686*e1997b9aSAndroid Build Coastguard Worker                 .context(ks_err!("Encountered encrypted blob without super key.")),
687*e1997b9aSAndroid Build Coastguard Worker         }
688*e1997b9aSAndroid Build Coastguard Worker     }
689*e1997b9aSAndroid Build Coastguard Worker 
read_characteristics_file( &self, uid: u32, prefix: &str, alias: &str, hw_sec_level: SecurityLevel, super_key: &Option<Arc<dyn AesGcm>>, ) -> Result<LegacyKeyCharacteristics>690*e1997b9aSAndroid Build Coastguard Worker     fn read_characteristics_file(
691*e1997b9aSAndroid Build Coastguard Worker         &self,
692*e1997b9aSAndroid Build Coastguard Worker         uid: u32,
693*e1997b9aSAndroid Build Coastguard Worker         prefix: &str,
694*e1997b9aSAndroid Build Coastguard Worker         alias: &str,
695*e1997b9aSAndroid Build Coastguard Worker         hw_sec_level: SecurityLevel,
696*e1997b9aSAndroid Build Coastguard Worker         super_key: &Option<Arc<dyn AesGcm>>,
697*e1997b9aSAndroid Build Coastguard Worker     ) -> Result<LegacyKeyCharacteristics> {
698*e1997b9aSAndroid Build Coastguard Worker         let blob = Self::read_generic_blob(&self.make_chr_filename(uid, alias, prefix))
699*e1997b9aSAndroid Build Coastguard Worker             .context(ks_err!())?;
700*e1997b9aSAndroid Build Coastguard Worker 
701*e1997b9aSAndroid Build Coastguard Worker         let blob = match blob {
702*e1997b9aSAndroid Build Coastguard Worker             None => return Ok(LegacyKeyCharacteristics::Cache(Vec::new())),
703*e1997b9aSAndroid Build Coastguard Worker             Some(blob) => blob,
704*e1997b9aSAndroid Build Coastguard Worker         };
705*e1997b9aSAndroid Build Coastguard Worker 
706*e1997b9aSAndroid Build Coastguard Worker         let blob = Self::decrypt_if_required(super_key, blob)
707*e1997b9aSAndroid Build Coastguard Worker             .context(ks_err!("Trying to decrypt blob."))?;
708*e1997b9aSAndroid Build Coastguard Worker 
709*e1997b9aSAndroid Build Coastguard Worker         let (mut stream, is_cache) = match blob.value() {
710*e1997b9aSAndroid Build Coastguard Worker             BlobValue::Characteristics(data) => (&data[..], false),
711*e1997b9aSAndroid Build Coastguard Worker             BlobValue::CharacteristicsCache(data) => (&data[..], true),
712*e1997b9aSAndroid Build Coastguard Worker             _ => {
713*e1997b9aSAndroid Build Coastguard Worker                 return Err(KsError::Rc(ResponseCode::VALUE_CORRUPTED))
714*e1997b9aSAndroid Build Coastguard Worker                     .context(ks_err!("Characteristics file does not hold key characteristics."));
715*e1997b9aSAndroid Build Coastguard Worker             }
716*e1997b9aSAndroid Build Coastguard Worker         };
717*e1997b9aSAndroid Build Coastguard Worker 
718*e1997b9aSAndroid Build Coastguard Worker         let hw_list = match blob.value() {
719*e1997b9aSAndroid Build Coastguard Worker             // The characteristics cache file has two lists and the first is
720*e1997b9aSAndroid Build Coastguard Worker             // the hardware enforced list.
721*e1997b9aSAndroid Build Coastguard Worker             BlobValue::CharacteristicsCache(_) => Some(
722*e1997b9aSAndroid Build Coastguard Worker                 Self::read_key_parameters(&mut stream)
723*e1997b9aSAndroid Build Coastguard Worker                     .context(ks_err!())?
724*e1997b9aSAndroid Build Coastguard Worker                     .into_iter()
725*e1997b9aSAndroid Build Coastguard Worker                     .map(|value| KeyParameter::new(value, hw_sec_level)),
726*e1997b9aSAndroid Build Coastguard Worker             ),
727*e1997b9aSAndroid Build Coastguard Worker             _ => None,
728*e1997b9aSAndroid Build Coastguard Worker         };
729*e1997b9aSAndroid Build Coastguard Worker 
730*e1997b9aSAndroid Build Coastguard Worker         let sw_list = Self::read_key_parameters(&mut stream)
731*e1997b9aSAndroid Build Coastguard Worker             .context(ks_err!())?
732*e1997b9aSAndroid Build Coastguard Worker             .into_iter()
733*e1997b9aSAndroid Build Coastguard Worker             .map(|value| KeyParameter::new(value, SecurityLevel::KEYSTORE));
734*e1997b9aSAndroid Build Coastguard Worker 
735*e1997b9aSAndroid Build Coastguard Worker         let params: Vec<KeyParameter> = hw_list.into_iter().flatten().chain(sw_list).collect();
736*e1997b9aSAndroid Build Coastguard Worker         if is_cache {
737*e1997b9aSAndroid Build Coastguard Worker             Ok(LegacyKeyCharacteristics::Cache(params))
738*e1997b9aSAndroid Build Coastguard Worker         } else {
739*e1997b9aSAndroid Build Coastguard Worker             Ok(LegacyKeyCharacteristics::File(params))
740*e1997b9aSAndroid Build Coastguard Worker         }
741*e1997b9aSAndroid Build Coastguard Worker     }
742*e1997b9aSAndroid Build Coastguard Worker 
743*e1997b9aSAndroid Build Coastguard Worker     // This is a list of known prefixes that the Keystore 1.0 SPI used to use.
744*e1997b9aSAndroid Build Coastguard Worker     //  * USRPKEY was used for private and secret key material, i.e., KM blobs.
745*e1997b9aSAndroid Build Coastguard Worker     //  * USRSKEY was used for secret key material, i.e., KM blobs, before Android P.
746*e1997b9aSAndroid Build Coastguard Worker     //  * CACERT  was used for key chains or free standing public certificates.
747*e1997b9aSAndroid Build Coastguard Worker     //  * USRCERT was used for public certificates of USRPKEY entries. But KeyChain also
748*e1997b9aSAndroid Build Coastguard Worker     //            used this for user installed certificates without private key material.
749*e1997b9aSAndroid Build Coastguard Worker 
750*e1997b9aSAndroid Build Coastguard Worker     const KNOWN_KEYSTORE_PREFIXES: &'static [&'static str] =
751*e1997b9aSAndroid Build Coastguard Worker         &["USRPKEY_", "USRSKEY_", "USRCERT_", "CACERT_"];
752*e1997b9aSAndroid Build Coastguard Worker 
is_keystore_alias(encoded_alias: &str) -> bool753*e1997b9aSAndroid Build Coastguard Worker     fn is_keystore_alias(encoded_alias: &str) -> bool {
754*e1997b9aSAndroid Build Coastguard Worker         // We can check the encoded alias because the prefixes we are interested
755*e1997b9aSAndroid Build Coastguard Worker         // in are all in the printable range that don't get mangled.
756*e1997b9aSAndroid Build Coastguard Worker         Self::KNOWN_KEYSTORE_PREFIXES.iter().any(|prefix| encoded_alias.starts_with(prefix))
757*e1997b9aSAndroid Build Coastguard Worker     }
758*e1997b9aSAndroid Build Coastguard Worker 
read_km_blob_file(&self, uid: u32, alias: &str) -> Result<Option<(Blob, String)>>759*e1997b9aSAndroid Build Coastguard Worker     fn read_km_blob_file(&self, uid: u32, alias: &str) -> Result<Option<(Blob, String)>> {
760*e1997b9aSAndroid Build Coastguard Worker         let mut iter = ["USRPKEY", "USRSKEY"].iter();
761*e1997b9aSAndroid Build Coastguard Worker 
762*e1997b9aSAndroid Build Coastguard Worker         let (blob, prefix) = loop {
763*e1997b9aSAndroid Build Coastguard Worker             if let Some(prefix) = iter.next() {
764*e1997b9aSAndroid Build Coastguard Worker                 if let Some(blob) =
765*e1997b9aSAndroid Build Coastguard Worker                     Self::read_generic_blob(&self.make_blob_filename(uid, alias, prefix))
766*e1997b9aSAndroid Build Coastguard Worker                         .context("In read_km_blob_file.")?
767*e1997b9aSAndroid Build Coastguard Worker                 {
768*e1997b9aSAndroid Build Coastguard Worker                     break (blob, prefix);
769*e1997b9aSAndroid Build Coastguard Worker                 }
770*e1997b9aSAndroid Build Coastguard Worker             } else {
771*e1997b9aSAndroid Build Coastguard Worker                 return Ok(None);
772*e1997b9aSAndroid Build Coastguard Worker             }
773*e1997b9aSAndroid Build Coastguard Worker         };
774*e1997b9aSAndroid Build Coastguard Worker 
775*e1997b9aSAndroid Build Coastguard Worker         Ok(Some((blob, prefix.to_string())))
776*e1997b9aSAndroid Build Coastguard Worker     }
777*e1997b9aSAndroid Build Coastguard Worker 
read_generic_blob(path: &Path) -> Result<Option<Blob>>778*e1997b9aSAndroid Build Coastguard Worker     fn read_generic_blob(path: &Path) -> Result<Option<Blob>> {
779*e1997b9aSAndroid Build Coastguard Worker         let mut file = match Self::with_retry_interrupted(|| File::open(path)) {
780*e1997b9aSAndroid Build Coastguard Worker             Ok(file) => file,
781*e1997b9aSAndroid Build Coastguard Worker             Err(e) => match e.kind() {
782*e1997b9aSAndroid Build Coastguard Worker                 ErrorKind::NotFound => return Ok(None),
783*e1997b9aSAndroid Build Coastguard Worker                 _ => return Err(e).context(ks_err!()),
784*e1997b9aSAndroid Build Coastguard Worker             },
785*e1997b9aSAndroid Build Coastguard Worker         };
786*e1997b9aSAndroid Build Coastguard Worker 
787*e1997b9aSAndroid Build Coastguard Worker         Ok(Some(Self::new_from_stream(&mut file).context(ks_err!())?))
788*e1997b9aSAndroid Build Coastguard Worker     }
789*e1997b9aSAndroid Build Coastguard Worker 
read_generic_blob_decrypt_with<F>(path: &Path, decrypt: F) -> Result<Option<Blob>> where F: FnOnce(&[u8], &[u8], &[u8], Option<&[u8]>, Option<usize>) -> Result<ZVec>,790*e1997b9aSAndroid Build Coastguard Worker     fn read_generic_blob_decrypt_with<F>(path: &Path, decrypt: F) -> Result<Option<Blob>>
791*e1997b9aSAndroid Build Coastguard Worker     where
792*e1997b9aSAndroid Build Coastguard Worker         F: FnOnce(&[u8], &[u8], &[u8], Option<&[u8]>, Option<usize>) -> Result<ZVec>,
793*e1997b9aSAndroid Build Coastguard Worker     {
794*e1997b9aSAndroid Build Coastguard Worker         let mut file = match Self::with_retry_interrupted(|| File::open(path)) {
795*e1997b9aSAndroid Build Coastguard Worker             Ok(file) => file,
796*e1997b9aSAndroid Build Coastguard Worker             Err(e) => match e.kind() {
797*e1997b9aSAndroid Build Coastguard Worker                 ErrorKind::NotFound => return Ok(None),
798*e1997b9aSAndroid Build Coastguard Worker                 _ => return Err(e).context(ks_err!()),
799*e1997b9aSAndroid Build Coastguard Worker             },
800*e1997b9aSAndroid Build Coastguard Worker         };
801*e1997b9aSAndroid Build Coastguard Worker 
802*e1997b9aSAndroid Build Coastguard Worker         Ok(Some(Self::new_from_stream_decrypt_with(&mut file, decrypt).context(ks_err!())?))
803*e1997b9aSAndroid Build Coastguard Worker     }
804*e1997b9aSAndroid Build Coastguard Worker 
805*e1997b9aSAndroid Build Coastguard Worker     /// Read a legacy keystore entry blob.
read_legacy_keystore_entry<F>( &self, uid: u32, alias: &str, decrypt: F, ) -> Result<Option<Vec<u8>>> where F: FnOnce(&[u8], &[u8], &[u8], Option<&[u8]>, Option<usize>) -> Result<ZVec>,806*e1997b9aSAndroid Build Coastguard Worker     pub fn read_legacy_keystore_entry<F>(
807*e1997b9aSAndroid Build Coastguard Worker         &self,
808*e1997b9aSAndroid Build Coastguard Worker         uid: u32,
809*e1997b9aSAndroid Build Coastguard Worker         alias: &str,
810*e1997b9aSAndroid Build Coastguard Worker         decrypt: F,
811*e1997b9aSAndroid Build Coastguard Worker     ) -> Result<Option<Vec<u8>>>
812*e1997b9aSAndroid Build Coastguard Worker     where
813*e1997b9aSAndroid Build Coastguard Worker         F: FnOnce(&[u8], &[u8], &[u8], Option<&[u8]>, Option<usize>) -> Result<ZVec>,
814*e1997b9aSAndroid Build Coastguard Worker     {
815*e1997b9aSAndroid Build Coastguard Worker         let path = match self.make_legacy_keystore_entry_filename(uid, alias) {
816*e1997b9aSAndroid Build Coastguard Worker             Some(path) => path,
817*e1997b9aSAndroid Build Coastguard Worker             None => return Ok(None),
818*e1997b9aSAndroid Build Coastguard Worker         };
819*e1997b9aSAndroid Build Coastguard Worker 
820*e1997b9aSAndroid Build Coastguard Worker         let blob = Self::read_generic_blob_decrypt_with(&path, decrypt)
821*e1997b9aSAndroid Build Coastguard Worker             .context(ks_err!("Failed to read blob."))?;
822*e1997b9aSAndroid Build Coastguard Worker 
823*e1997b9aSAndroid Build Coastguard Worker         Ok(blob.and_then(|blob| match blob.value {
824*e1997b9aSAndroid Build Coastguard Worker             BlobValue::Generic(blob) => Some(blob),
825*e1997b9aSAndroid Build Coastguard Worker             _ => {
826*e1997b9aSAndroid Build Coastguard Worker                 log::info!("Unexpected legacy keystore entry blob type. Ignoring");
827*e1997b9aSAndroid Build Coastguard Worker                 None
828*e1997b9aSAndroid Build Coastguard Worker             }
829*e1997b9aSAndroid Build Coastguard Worker         }))
830*e1997b9aSAndroid Build Coastguard Worker     }
831*e1997b9aSAndroid Build Coastguard Worker 
832*e1997b9aSAndroid Build Coastguard Worker     /// Remove a legacy keystore entry by the name alias with owner uid.
remove_legacy_keystore_entry(&self, uid: u32, alias: &str) -> Result<bool>833*e1997b9aSAndroid Build Coastguard Worker     pub fn remove_legacy_keystore_entry(&self, uid: u32, alias: &str) -> Result<bool> {
834*e1997b9aSAndroid Build Coastguard Worker         let path = match self.make_legacy_keystore_entry_filename(uid, alias) {
835*e1997b9aSAndroid Build Coastguard Worker             Some(path) => path,
836*e1997b9aSAndroid Build Coastguard Worker             None => return Ok(false),
837*e1997b9aSAndroid Build Coastguard Worker         };
838*e1997b9aSAndroid Build Coastguard Worker 
839*e1997b9aSAndroid Build Coastguard Worker         if let Err(e) = Self::with_retry_interrupted(|| fs::remove_file(path.as_path())) {
840*e1997b9aSAndroid Build Coastguard Worker             match e.kind() {
841*e1997b9aSAndroid Build Coastguard Worker                 ErrorKind::NotFound => return Ok(false),
842*e1997b9aSAndroid Build Coastguard Worker                 _ => return Err(e).context(ks_err!()),
843*e1997b9aSAndroid Build Coastguard Worker             }
844*e1997b9aSAndroid Build Coastguard Worker         }
845*e1997b9aSAndroid Build Coastguard Worker 
846*e1997b9aSAndroid Build Coastguard Worker         let user_id = uid_to_android_user(uid);
847*e1997b9aSAndroid Build Coastguard Worker         self.remove_user_dir_if_empty(user_id)
848*e1997b9aSAndroid Build Coastguard Worker             .context(ks_err!("Trying to remove empty user dir."))?;
849*e1997b9aSAndroid Build Coastguard Worker         Ok(true)
850*e1997b9aSAndroid Build Coastguard Worker     }
851*e1997b9aSAndroid Build Coastguard Worker 
852*e1997b9aSAndroid Build Coastguard Worker     /// List all entries belonging to the given uid.
list_legacy_keystore_entries_for_uid(&self, uid: u32) -> Result<Vec<String>>853*e1997b9aSAndroid Build Coastguard Worker     pub fn list_legacy_keystore_entries_for_uid(&self, uid: u32) -> Result<Vec<String>> {
854*e1997b9aSAndroid Build Coastguard Worker         let mut path = self.path.clone();
855*e1997b9aSAndroid Build Coastguard Worker         let user_id = uid_to_android_user(uid);
856*e1997b9aSAndroid Build Coastguard Worker         path.push(format!("user_{}", user_id));
857*e1997b9aSAndroid Build Coastguard Worker         let uid_str = uid.to_string();
858*e1997b9aSAndroid Build Coastguard Worker         let dir = match Self::with_retry_interrupted(|| fs::read_dir(path.as_path())) {
859*e1997b9aSAndroid Build Coastguard Worker             Ok(dir) => dir,
860*e1997b9aSAndroid Build Coastguard Worker             Err(e) => match e.kind() {
861*e1997b9aSAndroid Build Coastguard Worker                 ErrorKind::NotFound => return Ok(Default::default()),
862*e1997b9aSAndroid Build Coastguard Worker                 _ => {
863*e1997b9aSAndroid Build Coastguard Worker                     return Err(e)
864*e1997b9aSAndroid Build Coastguard Worker                         .context(ks_err!("Failed to open legacy blob database: {:?}", path));
865*e1997b9aSAndroid Build Coastguard Worker                 }
866*e1997b9aSAndroid Build Coastguard Worker             },
867*e1997b9aSAndroid Build Coastguard Worker         };
868*e1997b9aSAndroid Build Coastguard Worker         let mut result: Vec<String> = Vec::new();
869*e1997b9aSAndroid Build Coastguard Worker         for entry in dir {
870*e1997b9aSAndroid Build Coastguard Worker             let file_name = entry.context(ks_err!("Trying to access dir entry"))?.file_name();
871*e1997b9aSAndroid Build Coastguard Worker             if let Some(f) = file_name.to_str() {
872*e1997b9aSAndroid Build Coastguard Worker                 let encoded_alias = &f[uid_str.len() + 1..];
873*e1997b9aSAndroid Build Coastguard Worker                 if f.starts_with(&uid_str) && !Self::is_keystore_alias(encoded_alias) {
874*e1997b9aSAndroid Build Coastguard Worker                     result.push(
875*e1997b9aSAndroid Build Coastguard Worker                         Self::decode_alias(encoded_alias)
876*e1997b9aSAndroid Build Coastguard Worker                             .context(ks_err!("Trying to decode alias."))?,
877*e1997b9aSAndroid Build Coastguard Worker                     )
878*e1997b9aSAndroid Build Coastguard Worker                 }
879*e1997b9aSAndroid Build Coastguard Worker             }
880*e1997b9aSAndroid Build Coastguard Worker         }
881*e1997b9aSAndroid Build Coastguard Worker         Ok(result)
882*e1997b9aSAndroid Build Coastguard Worker     }
883*e1997b9aSAndroid Build Coastguard Worker 
extract_legacy_alias(encoded_alias: &str) -> Option<String>884*e1997b9aSAndroid Build Coastguard Worker     fn extract_legacy_alias(encoded_alias: &str) -> Option<String> {
885*e1997b9aSAndroid Build Coastguard Worker         if !Self::is_keystore_alias(encoded_alias) {
886*e1997b9aSAndroid Build Coastguard Worker             Self::decode_alias(encoded_alias).ok()
887*e1997b9aSAndroid Build Coastguard Worker         } else {
888*e1997b9aSAndroid Build Coastguard Worker             None
889*e1997b9aSAndroid Build Coastguard Worker         }
890*e1997b9aSAndroid Build Coastguard Worker     }
891*e1997b9aSAndroid Build Coastguard Worker 
892*e1997b9aSAndroid Build Coastguard Worker     /// Lists all keystore entries belonging to the given user. Returns a map of UIDs
893*e1997b9aSAndroid Build Coastguard Worker     /// to sets of decoded aliases. Only returns entries that do not begin with
894*e1997b9aSAndroid Build Coastguard Worker     /// KNOWN_KEYSTORE_PREFIXES.
list_legacy_keystore_entries_for_user( &self, user_id: u32, ) -> Result<HashMap<u32, HashSet<String>>>895*e1997b9aSAndroid Build Coastguard Worker     pub fn list_legacy_keystore_entries_for_user(
896*e1997b9aSAndroid Build Coastguard Worker         &self,
897*e1997b9aSAndroid Build Coastguard Worker         user_id: u32,
898*e1997b9aSAndroid Build Coastguard Worker     ) -> Result<HashMap<u32, HashSet<String>>> {
899*e1997b9aSAndroid Build Coastguard Worker         let user_entries = self.list_user(user_id).context(ks_err!("Trying to list user."))?;
900*e1997b9aSAndroid Build Coastguard Worker 
901*e1997b9aSAndroid Build Coastguard Worker         let result =
902*e1997b9aSAndroid Build Coastguard Worker             user_entries.into_iter().fold(HashMap::<u32, HashSet<String>>::new(), |mut acc, v| {
903*e1997b9aSAndroid Build Coastguard Worker                 if let Some(sep_pos) = v.find('_') {
904*e1997b9aSAndroid Build Coastguard Worker                     if let Ok(uid) = v[0..sep_pos].parse::<u32>() {
905*e1997b9aSAndroid Build Coastguard Worker                         if let Some(alias) = Self::extract_legacy_alias(&v[sep_pos + 1..]) {
906*e1997b9aSAndroid Build Coastguard Worker                             let entry = acc.entry(uid).or_default();
907*e1997b9aSAndroid Build Coastguard Worker                             entry.insert(alias);
908*e1997b9aSAndroid Build Coastguard Worker                         }
909*e1997b9aSAndroid Build Coastguard Worker                     }
910*e1997b9aSAndroid Build Coastguard Worker                 }
911*e1997b9aSAndroid Build Coastguard Worker                 acc
912*e1997b9aSAndroid Build Coastguard Worker             });
913*e1997b9aSAndroid Build Coastguard Worker         Ok(result)
914*e1997b9aSAndroid Build Coastguard Worker     }
915*e1997b9aSAndroid Build Coastguard Worker 
916*e1997b9aSAndroid Build Coastguard Worker     /// This function constructs the legacy blob file name which has the form:
917*e1997b9aSAndroid Build Coastguard Worker     /// user_<android user id>/<uid>_<alias>. Legacy blob file names must not use
918*e1997b9aSAndroid Build Coastguard Worker     /// known keystore prefixes.
make_legacy_keystore_entry_filename(&self, uid: u32, alias: &str) -> Option<PathBuf>919*e1997b9aSAndroid Build Coastguard Worker     fn make_legacy_keystore_entry_filename(&self, uid: u32, alias: &str) -> Option<PathBuf> {
920*e1997b9aSAndroid Build Coastguard Worker         // Legacy entries must not use known keystore prefixes.
921*e1997b9aSAndroid Build Coastguard Worker         if Self::is_keystore_alias(alias) {
922*e1997b9aSAndroid Build Coastguard Worker             log::warn!(
923*e1997b9aSAndroid Build Coastguard Worker                 "Known keystore prefixes cannot be used with legacy keystore -> ignoring request."
924*e1997b9aSAndroid Build Coastguard Worker             );
925*e1997b9aSAndroid Build Coastguard Worker             return None;
926*e1997b9aSAndroid Build Coastguard Worker         }
927*e1997b9aSAndroid Build Coastguard Worker 
928*e1997b9aSAndroid Build Coastguard Worker         let mut path = self.path.clone();
929*e1997b9aSAndroid Build Coastguard Worker         let user_id = uid_to_android_user(uid);
930*e1997b9aSAndroid Build Coastguard Worker         let encoded_alias = Self::encode_alias(alias);
931*e1997b9aSAndroid Build Coastguard Worker         path.push(format!("user_{}", user_id));
932*e1997b9aSAndroid Build Coastguard Worker         path.push(format!("{}_{}", uid, encoded_alias));
933*e1997b9aSAndroid Build Coastguard Worker         Some(path)
934*e1997b9aSAndroid Build Coastguard Worker     }
935*e1997b9aSAndroid Build Coastguard Worker 
936*e1997b9aSAndroid Build Coastguard Worker     /// This function constructs the blob file name which has the form:
937*e1997b9aSAndroid Build Coastguard Worker     /// user_<android user id>/<uid>_<prefix>_<alias>.
make_blob_filename(&self, uid: u32, alias: &str, prefix: &str) -> PathBuf938*e1997b9aSAndroid Build Coastguard Worker     fn make_blob_filename(&self, uid: u32, alias: &str, prefix: &str) -> PathBuf {
939*e1997b9aSAndroid Build Coastguard Worker         let user_id = uid_to_android_user(uid);
940*e1997b9aSAndroid Build Coastguard Worker         let encoded_alias = Self::encode_alias(&format!("{}_{}", prefix, alias));
941*e1997b9aSAndroid Build Coastguard Worker         let mut path = self.make_user_path_name(user_id);
942*e1997b9aSAndroid Build Coastguard Worker         path.push(format!("{}_{}", uid, encoded_alias));
943*e1997b9aSAndroid Build Coastguard Worker         path
944*e1997b9aSAndroid Build Coastguard Worker     }
945*e1997b9aSAndroid Build Coastguard Worker 
946*e1997b9aSAndroid Build Coastguard Worker     /// This function constructs the characteristics file name which has the form:
947*e1997b9aSAndroid Build Coastguard Worker     /// user_<android user id>/.<uid>_chr_<prefix>_<alias>.
make_chr_filename(&self, uid: u32, alias: &str, prefix: &str) -> PathBuf948*e1997b9aSAndroid Build Coastguard Worker     fn make_chr_filename(&self, uid: u32, alias: &str, prefix: &str) -> PathBuf {
949*e1997b9aSAndroid Build Coastguard Worker         let user_id = uid_to_android_user(uid);
950*e1997b9aSAndroid Build Coastguard Worker         let encoded_alias = Self::encode_alias(&format!("{}_{}", prefix, alias));
951*e1997b9aSAndroid Build Coastguard Worker         let mut path = self.make_user_path_name(user_id);
952*e1997b9aSAndroid Build Coastguard Worker         path.push(format!(".{}_chr_{}", uid, encoded_alias));
953*e1997b9aSAndroid Build Coastguard Worker         path
954*e1997b9aSAndroid Build Coastguard Worker     }
955*e1997b9aSAndroid Build Coastguard Worker 
make_super_key_filename(&self, user_id: u32) -> PathBuf956*e1997b9aSAndroid Build Coastguard Worker     fn make_super_key_filename(&self, user_id: u32) -> PathBuf {
957*e1997b9aSAndroid Build Coastguard Worker         let mut path = self.make_user_path_name(user_id);
958*e1997b9aSAndroid Build Coastguard Worker         path.push(".masterkey");
959*e1997b9aSAndroid Build Coastguard Worker         path
960*e1997b9aSAndroid Build Coastguard Worker     }
961*e1997b9aSAndroid Build Coastguard Worker 
make_user_path_name(&self, user_id: u32) -> PathBuf962*e1997b9aSAndroid Build Coastguard Worker     fn make_user_path_name(&self, user_id: u32) -> PathBuf {
963*e1997b9aSAndroid Build Coastguard Worker         let mut path = self.path.clone();
964*e1997b9aSAndroid Build Coastguard Worker         path.push(format!("user_{}", user_id));
965*e1997b9aSAndroid Build Coastguard Worker         path
966*e1997b9aSAndroid Build Coastguard Worker     }
967*e1997b9aSAndroid Build Coastguard Worker 
968*e1997b9aSAndroid Build Coastguard Worker     /// Returns if the legacy blob database is empty, i.e., there are no entries matching "user_*"
969*e1997b9aSAndroid Build Coastguard Worker     /// in the database dir.
is_empty(&self) -> Result<bool>970*e1997b9aSAndroid Build Coastguard Worker     pub fn is_empty(&self) -> Result<bool> {
971*e1997b9aSAndroid Build Coastguard Worker         let dir = Self::with_retry_interrupted(|| fs::read_dir(self.path.as_path()))
972*e1997b9aSAndroid Build Coastguard Worker             .context(ks_err!("Failed to open legacy blob database."))?;
973*e1997b9aSAndroid Build Coastguard Worker         for entry in dir {
974*e1997b9aSAndroid Build Coastguard Worker             if (*entry.context(ks_err!("Trying to access dir entry"))?.file_name())
975*e1997b9aSAndroid Build Coastguard Worker                 .to_str()
976*e1997b9aSAndroid Build Coastguard Worker                 .map_or(false, |f| f.starts_with("user_"))
977*e1997b9aSAndroid Build Coastguard Worker             {
978*e1997b9aSAndroid Build Coastguard Worker                 return Ok(false);
979*e1997b9aSAndroid Build Coastguard Worker             }
980*e1997b9aSAndroid Build Coastguard Worker         }
981*e1997b9aSAndroid Build Coastguard Worker         Ok(true)
982*e1997b9aSAndroid Build Coastguard Worker     }
983*e1997b9aSAndroid Build Coastguard Worker 
984*e1997b9aSAndroid Build Coastguard Worker     /// Returns if the legacy blob database is empty for a given user, i.e., there are no entries
985*e1997b9aSAndroid Build Coastguard Worker     /// matching "user_*" in the database dir.
is_empty_user(&self, user_id: u32) -> Result<bool>986*e1997b9aSAndroid Build Coastguard Worker     pub fn is_empty_user(&self, user_id: u32) -> Result<bool> {
987*e1997b9aSAndroid Build Coastguard Worker         let mut user_path = self.path.clone();
988*e1997b9aSAndroid Build Coastguard Worker         user_path.push(format!("user_{}", user_id));
989*e1997b9aSAndroid Build Coastguard Worker         if !user_path.as_path().is_dir() {
990*e1997b9aSAndroid Build Coastguard Worker             return Ok(true);
991*e1997b9aSAndroid Build Coastguard Worker         }
992*e1997b9aSAndroid Build Coastguard Worker         Ok(Self::with_retry_interrupted(|| user_path.read_dir())
993*e1997b9aSAndroid Build Coastguard Worker             .context(ks_err!("Failed to open legacy user dir."))?
994*e1997b9aSAndroid Build Coastguard Worker             .next()
995*e1997b9aSAndroid Build Coastguard Worker             .is_none())
996*e1997b9aSAndroid Build Coastguard Worker     }
997*e1997b9aSAndroid Build Coastguard Worker 
extract_keystore_alias(encoded_alias: &str) -> Option<String>998*e1997b9aSAndroid Build Coastguard Worker     fn extract_keystore_alias(encoded_alias: &str) -> Option<String> {
999*e1997b9aSAndroid Build Coastguard Worker         // We can check the encoded alias because the prefixes we are interested
1000*e1997b9aSAndroid Build Coastguard Worker         // in are all in the printable range that don't get mangled.
1001*e1997b9aSAndroid Build Coastguard Worker         for prefix in Self::KNOWN_KEYSTORE_PREFIXES {
1002*e1997b9aSAndroid Build Coastguard Worker             if let Some(alias) = encoded_alias.strip_prefix(prefix) {
1003*e1997b9aSAndroid Build Coastguard Worker                 return Self::decode_alias(alias).ok();
1004*e1997b9aSAndroid Build Coastguard Worker             }
1005*e1997b9aSAndroid Build Coastguard Worker         }
1006*e1997b9aSAndroid Build Coastguard Worker         None
1007*e1997b9aSAndroid Build Coastguard Worker     }
1008*e1997b9aSAndroid Build Coastguard Worker 
1009*e1997b9aSAndroid Build Coastguard Worker     /// List all entries for a given user. The strings are unchanged file names, i.e.,
1010*e1997b9aSAndroid Build Coastguard Worker     /// encoded with UID prefix.
list_user(&self, user_id: u32) -> Result<Vec<String>>1011*e1997b9aSAndroid Build Coastguard Worker     fn list_user(&self, user_id: u32) -> Result<Vec<String>> {
1012*e1997b9aSAndroid Build Coastguard Worker         let path = self.make_user_path_name(user_id);
1013*e1997b9aSAndroid Build Coastguard Worker         let dir = match Self::with_retry_interrupted(|| fs::read_dir(path.as_path())) {
1014*e1997b9aSAndroid Build Coastguard Worker             Ok(dir) => dir,
1015*e1997b9aSAndroid Build Coastguard Worker             Err(e) => match e.kind() {
1016*e1997b9aSAndroid Build Coastguard Worker                 ErrorKind::NotFound => return Ok(Default::default()),
1017*e1997b9aSAndroid Build Coastguard Worker                 _ => {
1018*e1997b9aSAndroid Build Coastguard Worker                     return Err(e)
1019*e1997b9aSAndroid Build Coastguard Worker                         .context(ks_err!("Failed to open legacy blob database. {:?}", path));
1020*e1997b9aSAndroid Build Coastguard Worker                 }
1021*e1997b9aSAndroid Build Coastguard Worker             },
1022*e1997b9aSAndroid Build Coastguard Worker         };
1023*e1997b9aSAndroid Build Coastguard Worker         let mut result: Vec<String> = Vec::new();
1024*e1997b9aSAndroid Build Coastguard Worker         for entry in dir {
1025*e1997b9aSAndroid Build Coastguard Worker             let file_name = entry.context(ks_err!("Trying to access dir entry"))?.file_name();
1026*e1997b9aSAndroid Build Coastguard Worker             if let Some(f) = file_name.to_str() {
1027*e1997b9aSAndroid Build Coastguard Worker                 result.push(f.to_string())
1028*e1997b9aSAndroid Build Coastguard Worker             }
1029*e1997b9aSAndroid Build Coastguard Worker         }
1030*e1997b9aSAndroid Build Coastguard Worker         Ok(result)
1031*e1997b9aSAndroid Build Coastguard Worker     }
1032*e1997b9aSAndroid Build Coastguard Worker 
1033*e1997b9aSAndroid Build Coastguard Worker     /// List all keystore entries belonging to the given user. Returns a map of UIDs
1034*e1997b9aSAndroid Build Coastguard Worker     /// to sets of decoded aliases.
list_keystore_entries_for_user( &self, user_id: u32, ) -> Result<HashMap<u32, HashSet<String>>>1035*e1997b9aSAndroid Build Coastguard Worker     pub fn list_keystore_entries_for_user(
1036*e1997b9aSAndroid Build Coastguard Worker         &self,
1037*e1997b9aSAndroid Build Coastguard Worker         user_id: u32,
1038*e1997b9aSAndroid Build Coastguard Worker     ) -> Result<HashMap<u32, HashSet<String>>> {
1039*e1997b9aSAndroid Build Coastguard Worker         let user_entries = self.list_user(user_id).context(ks_err!("Trying to list user."))?;
1040*e1997b9aSAndroid Build Coastguard Worker 
1041*e1997b9aSAndroid Build Coastguard Worker         let result =
1042*e1997b9aSAndroid Build Coastguard Worker             user_entries.into_iter().fold(HashMap::<u32, HashSet<String>>::new(), |mut acc, v| {
1043*e1997b9aSAndroid Build Coastguard Worker                 if let Some(sep_pos) = v.find('_') {
1044*e1997b9aSAndroid Build Coastguard Worker                     if let Ok(uid) = v[0..sep_pos].parse::<u32>() {
1045*e1997b9aSAndroid Build Coastguard Worker                         if let Some(alias) = Self::extract_keystore_alias(&v[sep_pos + 1..]) {
1046*e1997b9aSAndroid Build Coastguard Worker                             let entry = acc.entry(uid).or_default();
1047*e1997b9aSAndroid Build Coastguard Worker                             entry.insert(alias);
1048*e1997b9aSAndroid Build Coastguard Worker                         }
1049*e1997b9aSAndroid Build Coastguard Worker                     }
1050*e1997b9aSAndroid Build Coastguard Worker                 }
1051*e1997b9aSAndroid Build Coastguard Worker                 acc
1052*e1997b9aSAndroid Build Coastguard Worker             });
1053*e1997b9aSAndroid Build Coastguard Worker         Ok(result)
1054*e1997b9aSAndroid Build Coastguard Worker     }
1055*e1997b9aSAndroid Build Coastguard Worker 
1056*e1997b9aSAndroid Build Coastguard Worker     /// List all keystore entries belonging to the given uid.
list_keystore_entries_for_uid(&self, uid: u32) -> Result<Vec<String>>1057*e1997b9aSAndroid Build Coastguard Worker     pub fn list_keystore_entries_for_uid(&self, uid: u32) -> Result<Vec<String>> {
1058*e1997b9aSAndroid Build Coastguard Worker         let user_id = uid_to_android_user(uid);
1059*e1997b9aSAndroid Build Coastguard Worker 
1060*e1997b9aSAndroid Build Coastguard Worker         let user_entries = self.list_user(user_id).context(ks_err!("Trying to list user."))?;
1061*e1997b9aSAndroid Build Coastguard Worker 
1062*e1997b9aSAndroid Build Coastguard Worker         let uid_str = format!("{}_", uid);
1063*e1997b9aSAndroid Build Coastguard Worker 
1064*e1997b9aSAndroid Build Coastguard Worker         let mut result: Vec<String> = user_entries
1065*e1997b9aSAndroid Build Coastguard Worker             .into_iter()
1066*e1997b9aSAndroid Build Coastguard Worker             .filter_map(|v| {
1067*e1997b9aSAndroid Build Coastguard Worker                 if !v.starts_with(&uid_str) {
1068*e1997b9aSAndroid Build Coastguard Worker                     return None;
1069*e1997b9aSAndroid Build Coastguard Worker                 }
1070*e1997b9aSAndroid Build Coastguard Worker                 let encoded_alias = &v[uid_str.len()..];
1071*e1997b9aSAndroid Build Coastguard Worker                 Self::extract_keystore_alias(encoded_alias)
1072*e1997b9aSAndroid Build Coastguard Worker             })
1073*e1997b9aSAndroid Build Coastguard Worker             .collect();
1074*e1997b9aSAndroid Build Coastguard Worker 
1075*e1997b9aSAndroid Build Coastguard Worker         result.sort_unstable();
1076*e1997b9aSAndroid Build Coastguard Worker         result.dedup();
1077*e1997b9aSAndroid Build Coastguard Worker         Ok(result)
1078*e1997b9aSAndroid Build Coastguard Worker     }
1079*e1997b9aSAndroid Build Coastguard Worker 
with_retry_interrupted<F, T>(f: F) -> IoResult<T> where F: Fn() -> IoResult<T>,1080*e1997b9aSAndroid Build Coastguard Worker     fn with_retry_interrupted<F, T>(f: F) -> IoResult<T>
1081*e1997b9aSAndroid Build Coastguard Worker     where
1082*e1997b9aSAndroid Build Coastguard Worker         F: Fn() -> IoResult<T>,
1083*e1997b9aSAndroid Build Coastguard Worker     {
1084*e1997b9aSAndroid Build Coastguard Worker         loop {
1085*e1997b9aSAndroid Build Coastguard Worker             match f() {
1086*e1997b9aSAndroid Build Coastguard Worker                 Ok(v) => return Ok(v),
1087*e1997b9aSAndroid Build Coastguard Worker                 Err(e) => match e.kind() {
1088*e1997b9aSAndroid Build Coastguard Worker                     ErrorKind::Interrupted => continue,
1089*e1997b9aSAndroid Build Coastguard Worker                     _ => return Err(e),
1090*e1997b9aSAndroid Build Coastguard Worker                 },
1091*e1997b9aSAndroid Build Coastguard Worker             }
1092*e1997b9aSAndroid Build Coastguard Worker         }
1093*e1997b9aSAndroid Build Coastguard Worker     }
1094*e1997b9aSAndroid Build Coastguard Worker 
1095*e1997b9aSAndroid Build Coastguard Worker     /// Deletes a keystore entry. Also removes the user_<uid> directory on the
1096*e1997b9aSAndroid Build Coastguard Worker     /// last migration.
remove_keystore_entry(&self, uid: u32, alias: &str) -> Result<bool>1097*e1997b9aSAndroid Build Coastguard Worker     pub fn remove_keystore_entry(&self, uid: u32, alias: &str) -> Result<bool> {
1098*e1997b9aSAndroid Build Coastguard Worker         let mut something_was_deleted = false;
1099*e1997b9aSAndroid Build Coastguard Worker         let prefixes = ["USRPKEY", "USRSKEY"];
1100*e1997b9aSAndroid Build Coastguard Worker         for prefix in &prefixes {
1101*e1997b9aSAndroid Build Coastguard Worker             let path = self.make_blob_filename(uid, alias, prefix);
1102*e1997b9aSAndroid Build Coastguard Worker             if let Err(e) = Self::with_retry_interrupted(|| fs::remove_file(path.as_path())) {
1103*e1997b9aSAndroid Build Coastguard Worker                 match e.kind() {
1104*e1997b9aSAndroid Build Coastguard Worker                     // Only a subset of keys are expected.
1105*e1997b9aSAndroid Build Coastguard Worker                     ErrorKind::NotFound => continue,
1106*e1997b9aSAndroid Build Coastguard Worker                     // Log error but ignore.
1107*e1997b9aSAndroid Build Coastguard Worker                     _ => log::error!("Error while deleting key blob entries. {:?}", e),
1108*e1997b9aSAndroid Build Coastguard Worker                 }
1109*e1997b9aSAndroid Build Coastguard Worker             }
1110*e1997b9aSAndroid Build Coastguard Worker             let path = self.make_chr_filename(uid, alias, prefix);
1111*e1997b9aSAndroid Build Coastguard Worker             if let Err(e) = Self::with_retry_interrupted(|| fs::remove_file(path.as_path())) {
1112*e1997b9aSAndroid Build Coastguard Worker                 match e.kind() {
1113*e1997b9aSAndroid Build Coastguard Worker                     ErrorKind::NotFound => {
1114*e1997b9aSAndroid Build Coastguard Worker                         log::info!("No characteristics file found for legacy key blob.")
1115*e1997b9aSAndroid Build Coastguard Worker                     }
1116*e1997b9aSAndroid Build Coastguard Worker                     // Log error but ignore.
1117*e1997b9aSAndroid Build Coastguard Worker                     _ => log::error!("Error while deleting key blob entries. {:?}", e),
1118*e1997b9aSAndroid Build Coastguard Worker                 }
1119*e1997b9aSAndroid Build Coastguard Worker             }
1120*e1997b9aSAndroid Build Coastguard Worker             something_was_deleted = true;
1121*e1997b9aSAndroid Build Coastguard Worker             // Only one of USRPKEY and USRSKEY can be present. So we can end the loop
1122*e1997b9aSAndroid Build Coastguard Worker             // if we reach this point.
1123*e1997b9aSAndroid Build Coastguard Worker             break;
1124*e1997b9aSAndroid Build Coastguard Worker         }
1125*e1997b9aSAndroid Build Coastguard Worker 
1126*e1997b9aSAndroid Build Coastguard Worker         let prefixes = ["USRCERT", "CACERT"];
1127*e1997b9aSAndroid Build Coastguard Worker         for prefix in &prefixes {
1128*e1997b9aSAndroid Build Coastguard Worker             let path = self.make_blob_filename(uid, alias, prefix);
1129*e1997b9aSAndroid Build Coastguard Worker             if let Err(e) = Self::with_retry_interrupted(|| fs::remove_file(path.as_path())) {
1130*e1997b9aSAndroid Build Coastguard Worker                 match e.kind() {
1131*e1997b9aSAndroid Build Coastguard Worker                     // USRCERT and CACERT are optional either or both may or may not be present.
1132*e1997b9aSAndroid Build Coastguard Worker                     ErrorKind::NotFound => continue,
1133*e1997b9aSAndroid Build Coastguard Worker                     // Log error but ignore.
1134*e1997b9aSAndroid Build Coastguard Worker                     _ => log::error!("Error while deleting key blob entries. {:?}", e),
1135*e1997b9aSAndroid Build Coastguard Worker                 }
1136*e1997b9aSAndroid Build Coastguard Worker                 something_was_deleted = true;
1137*e1997b9aSAndroid Build Coastguard Worker             }
1138*e1997b9aSAndroid Build Coastguard Worker         }
1139*e1997b9aSAndroid Build Coastguard Worker 
1140*e1997b9aSAndroid Build Coastguard Worker         if something_was_deleted {
1141*e1997b9aSAndroid Build Coastguard Worker             let user_id = uid_to_android_user(uid);
1142*e1997b9aSAndroid Build Coastguard Worker             self.remove_user_dir_if_empty(user_id)
1143*e1997b9aSAndroid Build Coastguard Worker                 .context(ks_err!("Trying to remove empty user dir."))?;
1144*e1997b9aSAndroid Build Coastguard Worker         }
1145*e1997b9aSAndroid Build Coastguard Worker 
1146*e1997b9aSAndroid Build Coastguard Worker         Ok(something_was_deleted)
1147*e1997b9aSAndroid Build Coastguard Worker     }
1148*e1997b9aSAndroid Build Coastguard Worker 
1149*e1997b9aSAndroid Build Coastguard Worker     /// This function moves a keystore file if it exists. It constructs the source and destination
1150*e1997b9aSAndroid Build Coastguard Worker     /// file name using the make_filename function with the arguments uid, alias, and prefix.
1151*e1997b9aSAndroid Build Coastguard Worker     /// The function overwrites existing destination files silently. If the source does not exist,
1152*e1997b9aSAndroid Build Coastguard Worker     /// this function has no side effect and returns successfully.
move_keystore_file_if_exists<F>( src_uid: u32, dest_uid: u32, src_alias: &str, dest_alias: &str, prefix: &str, make_filename: F, ) -> Result<()> where F: Fn(u32, &str, &str) -> PathBuf,1153*e1997b9aSAndroid Build Coastguard Worker     fn move_keystore_file_if_exists<F>(
1154*e1997b9aSAndroid Build Coastguard Worker         src_uid: u32,
1155*e1997b9aSAndroid Build Coastguard Worker         dest_uid: u32,
1156*e1997b9aSAndroid Build Coastguard Worker         src_alias: &str,
1157*e1997b9aSAndroid Build Coastguard Worker         dest_alias: &str,
1158*e1997b9aSAndroid Build Coastguard Worker         prefix: &str,
1159*e1997b9aSAndroid Build Coastguard Worker         make_filename: F,
1160*e1997b9aSAndroid Build Coastguard Worker     ) -> Result<()>
1161*e1997b9aSAndroid Build Coastguard Worker     where
1162*e1997b9aSAndroid Build Coastguard Worker         F: Fn(u32, &str, &str) -> PathBuf,
1163*e1997b9aSAndroid Build Coastguard Worker     {
1164*e1997b9aSAndroid Build Coastguard Worker         let src_path = make_filename(src_uid, src_alias, prefix);
1165*e1997b9aSAndroid Build Coastguard Worker         let dest_path = make_filename(dest_uid, dest_alias, prefix);
1166*e1997b9aSAndroid Build Coastguard Worker         match Self::with_retry_interrupted(|| fs::rename(&src_path, &dest_path)) {
1167*e1997b9aSAndroid Build Coastguard Worker             Err(e) if e.kind() == ErrorKind::NotFound => Ok(()),
1168*e1997b9aSAndroid Build Coastguard Worker             r => r.context(ks_err!("Trying to rename.")),
1169*e1997b9aSAndroid Build Coastguard Worker         }
1170*e1997b9aSAndroid Build Coastguard Worker     }
1171*e1997b9aSAndroid Build Coastguard Worker 
1172*e1997b9aSAndroid Build Coastguard Worker     /// Moves a keystore entry from one uid to another. The uids must have the same android user
1173*e1997b9aSAndroid Build Coastguard Worker     /// component. Moves across android users are not permitted.
move_keystore_entry( &self, src_uid: u32, dest_uid: u32, src_alias: &str, dest_alias: &str, ) -> Result<()>1174*e1997b9aSAndroid Build Coastguard Worker     pub fn move_keystore_entry(
1175*e1997b9aSAndroid Build Coastguard Worker         &self,
1176*e1997b9aSAndroid Build Coastguard Worker         src_uid: u32,
1177*e1997b9aSAndroid Build Coastguard Worker         dest_uid: u32,
1178*e1997b9aSAndroid Build Coastguard Worker         src_alias: &str,
1179*e1997b9aSAndroid Build Coastguard Worker         dest_alias: &str,
1180*e1997b9aSAndroid Build Coastguard Worker     ) -> Result<()> {
1181*e1997b9aSAndroid Build Coastguard Worker         if src_uid == dest_uid {
1182*e1997b9aSAndroid Build Coastguard Worker             // Nothing to do in the trivial case.
1183*e1997b9aSAndroid Build Coastguard Worker             return Ok(());
1184*e1997b9aSAndroid Build Coastguard Worker         }
1185*e1997b9aSAndroid Build Coastguard Worker 
1186*e1997b9aSAndroid Build Coastguard Worker         if uid_to_android_user(src_uid) != uid_to_android_user(dest_uid) {
1187*e1997b9aSAndroid Build Coastguard Worker             return Err(Error::AndroidUserMismatch).context(ks_err!());
1188*e1997b9aSAndroid Build Coastguard Worker         }
1189*e1997b9aSAndroid Build Coastguard Worker 
1190*e1997b9aSAndroid Build Coastguard Worker         let prefixes = ["USRPKEY", "USRSKEY", "USRCERT", "CACERT"];
1191*e1997b9aSAndroid Build Coastguard Worker         for prefix in prefixes {
1192*e1997b9aSAndroid Build Coastguard Worker             Self::move_keystore_file_if_exists(
1193*e1997b9aSAndroid Build Coastguard Worker                 src_uid,
1194*e1997b9aSAndroid Build Coastguard Worker                 dest_uid,
1195*e1997b9aSAndroid Build Coastguard Worker                 src_alias,
1196*e1997b9aSAndroid Build Coastguard Worker                 dest_alias,
1197*e1997b9aSAndroid Build Coastguard Worker                 prefix,
1198*e1997b9aSAndroid Build Coastguard Worker                 |uid, alias, prefix| self.make_blob_filename(uid, alias, prefix),
1199*e1997b9aSAndroid Build Coastguard Worker             )
1200*e1997b9aSAndroid Build Coastguard Worker             .with_context(|| ks_err!("Trying to move blob file with prefix: \"{}\"", prefix))?;
1201*e1997b9aSAndroid Build Coastguard Worker         }
1202*e1997b9aSAndroid Build Coastguard Worker 
1203*e1997b9aSAndroid Build Coastguard Worker         let prefixes = ["USRPKEY", "USRSKEY"];
1204*e1997b9aSAndroid Build Coastguard Worker 
1205*e1997b9aSAndroid Build Coastguard Worker         for prefix in prefixes {
1206*e1997b9aSAndroid Build Coastguard Worker             Self::move_keystore_file_if_exists(
1207*e1997b9aSAndroid Build Coastguard Worker                 src_uid,
1208*e1997b9aSAndroid Build Coastguard Worker                 dest_uid,
1209*e1997b9aSAndroid Build Coastguard Worker                 src_alias,
1210*e1997b9aSAndroid Build Coastguard Worker                 dest_alias,
1211*e1997b9aSAndroid Build Coastguard Worker                 prefix,
1212*e1997b9aSAndroid Build Coastguard Worker                 |uid, alias, prefix| self.make_chr_filename(uid, alias, prefix),
1213*e1997b9aSAndroid Build Coastguard Worker             )
1214*e1997b9aSAndroid Build Coastguard Worker             .with_context(|| {
1215*e1997b9aSAndroid Build Coastguard Worker                 ks_err!(
1216*e1997b9aSAndroid Build Coastguard Worker                     "Trying to move characteristics file with \
1217*e1997b9aSAndroid Build Coastguard Worker                      prefix: \"{}\"",
1218*e1997b9aSAndroid Build Coastguard Worker                     prefix
1219*e1997b9aSAndroid Build Coastguard Worker                 )
1220*e1997b9aSAndroid Build Coastguard Worker             })?;
1221*e1997b9aSAndroid Build Coastguard Worker         }
1222*e1997b9aSAndroid Build Coastguard Worker 
1223*e1997b9aSAndroid Build Coastguard Worker         Ok(())
1224*e1997b9aSAndroid Build Coastguard Worker     }
1225*e1997b9aSAndroid Build Coastguard Worker 
remove_user_dir_if_empty(&self, user_id: u32) -> Result<()>1226*e1997b9aSAndroid Build Coastguard Worker     fn remove_user_dir_if_empty(&self, user_id: u32) -> Result<()> {
1227*e1997b9aSAndroid Build Coastguard Worker         if self.is_empty_user(user_id).context(ks_err!("Trying to check for empty user dir."))? {
1228*e1997b9aSAndroid Build Coastguard Worker             let user_path = self.make_user_path_name(user_id);
1229*e1997b9aSAndroid Build Coastguard Worker             Self::with_retry_interrupted(|| fs::remove_dir(user_path.as_path())).ok();
1230*e1997b9aSAndroid Build Coastguard Worker         }
1231*e1997b9aSAndroid Build Coastguard Worker         Ok(())
1232*e1997b9aSAndroid Build Coastguard Worker     }
1233*e1997b9aSAndroid Build Coastguard Worker 
1234*e1997b9aSAndroid Build Coastguard Worker     /// Load a legacy key blob entry by uid and alias.
load_by_uid_alias( &self, uid: u32, alias: &str, super_key: &Option<Arc<dyn AesGcm>>, ) -> Result<(Option<(Blob, LegacyKeyCharacteristics)>, Option<Vec<u8>>, Option<Vec<u8>>)>1235*e1997b9aSAndroid Build Coastguard Worker     pub fn load_by_uid_alias(
1236*e1997b9aSAndroid Build Coastguard Worker         &self,
1237*e1997b9aSAndroid Build Coastguard Worker         uid: u32,
1238*e1997b9aSAndroid Build Coastguard Worker         alias: &str,
1239*e1997b9aSAndroid Build Coastguard Worker         super_key: &Option<Arc<dyn AesGcm>>,
1240*e1997b9aSAndroid Build Coastguard Worker     ) -> Result<(Option<(Blob, LegacyKeyCharacteristics)>, Option<Vec<u8>>, Option<Vec<u8>>)> {
1241*e1997b9aSAndroid Build Coastguard Worker         let km_blob = self.read_km_blob_file(uid, alias).context("In load_by_uid_alias.")?;
1242*e1997b9aSAndroid Build Coastguard Worker 
1243*e1997b9aSAndroid Build Coastguard Worker         let km_blob = match km_blob {
1244*e1997b9aSAndroid Build Coastguard Worker             Some((km_blob, prefix)) => {
1245*e1997b9aSAndroid Build Coastguard Worker                 let km_blob = match km_blob {
1246*e1997b9aSAndroid Build Coastguard Worker                     Blob { flags: _, value: BlobValue::Decrypted(_) }
1247*e1997b9aSAndroid Build Coastguard Worker                     | Blob { flags: _, value: BlobValue::Encrypted { .. } } => km_blob,
1248*e1997b9aSAndroid Build Coastguard Worker                     _ => {
1249*e1997b9aSAndroid Build Coastguard Worker                         return Err(KsError::Rc(ResponseCode::VALUE_CORRUPTED))
1250*e1997b9aSAndroid Build Coastguard Worker                             .context(ks_err!("Found wrong blob type in legacy key blob file."))
1251*e1997b9aSAndroid Build Coastguard Worker                     }
1252*e1997b9aSAndroid Build Coastguard Worker                 };
1253*e1997b9aSAndroid Build Coastguard Worker 
1254*e1997b9aSAndroid Build Coastguard Worker                 let hw_sec_level = match km_blob.is_strongbox() {
1255*e1997b9aSAndroid Build Coastguard Worker                     true => SecurityLevel::STRONGBOX,
1256*e1997b9aSAndroid Build Coastguard Worker                     false => SecurityLevel::TRUSTED_ENVIRONMENT,
1257*e1997b9aSAndroid Build Coastguard Worker                 };
1258*e1997b9aSAndroid Build Coastguard Worker                 let key_parameters = self
1259*e1997b9aSAndroid Build Coastguard Worker                     .read_characteristics_file(uid, &prefix, alias, hw_sec_level, super_key)
1260*e1997b9aSAndroid Build Coastguard Worker                     .context(ks_err!())?;
1261*e1997b9aSAndroid Build Coastguard Worker                 Some((km_blob, key_parameters))
1262*e1997b9aSAndroid Build Coastguard Worker             }
1263*e1997b9aSAndroid Build Coastguard Worker             None => None,
1264*e1997b9aSAndroid Build Coastguard Worker         };
1265*e1997b9aSAndroid Build Coastguard Worker 
1266*e1997b9aSAndroid Build Coastguard Worker         let user_cert_blob =
1267*e1997b9aSAndroid Build Coastguard Worker             Self::read_generic_blob(&self.make_blob_filename(uid, alias, "USRCERT"))
1268*e1997b9aSAndroid Build Coastguard Worker                 .context(ks_err!("While loading user cert."))?;
1269*e1997b9aSAndroid Build Coastguard Worker 
1270*e1997b9aSAndroid Build Coastguard Worker         let user_cert = if let Some(blob) = user_cert_blob {
1271*e1997b9aSAndroid Build Coastguard Worker             let blob = Self::decrypt_if_required(super_key, blob)
1272*e1997b9aSAndroid Build Coastguard Worker                 .context(ks_err!("While decrypting user cert."))?;
1273*e1997b9aSAndroid Build Coastguard Worker 
1274*e1997b9aSAndroid Build Coastguard Worker             if let Blob { value: BlobValue::Generic(data), .. } = blob {
1275*e1997b9aSAndroid Build Coastguard Worker                 Some(data)
1276*e1997b9aSAndroid Build Coastguard Worker             } else {
1277*e1997b9aSAndroid Build Coastguard Worker                 return Err(KsError::Rc(ResponseCode::VALUE_CORRUPTED))
1278*e1997b9aSAndroid Build Coastguard Worker                     .context(ks_err!("Found unexpected blob type in USRCERT file"));
1279*e1997b9aSAndroid Build Coastguard Worker             }
1280*e1997b9aSAndroid Build Coastguard Worker         } else {
1281*e1997b9aSAndroid Build Coastguard Worker             None
1282*e1997b9aSAndroid Build Coastguard Worker         };
1283*e1997b9aSAndroid Build Coastguard Worker 
1284*e1997b9aSAndroid Build Coastguard Worker         let ca_cert_blob = Self::read_generic_blob(&self.make_blob_filename(uid, alias, "CACERT"))
1285*e1997b9aSAndroid Build Coastguard Worker             .context(ks_err!("While loading ca cert."))?;
1286*e1997b9aSAndroid Build Coastguard Worker 
1287*e1997b9aSAndroid Build Coastguard Worker         let ca_cert = if let Some(blob) = ca_cert_blob {
1288*e1997b9aSAndroid Build Coastguard Worker             let blob = Self::decrypt_if_required(super_key, blob)
1289*e1997b9aSAndroid Build Coastguard Worker                 .context(ks_err!("While decrypting ca cert."))?;
1290*e1997b9aSAndroid Build Coastguard Worker 
1291*e1997b9aSAndroid Build Coastguard Worker             if let Blob { value: BlobValue::Generic(data), .. } = blob {
1292*e1997b9aSAndroid Build Coastguard Worker                 Some(data)
1293*e1997b9aSAndroid Build Coastguard Worker             } else {
1294*e1997b9aSAndroid Build Coastguard Worker                 return Err(KsError::Rc(ResponseCode::VALUE_CORRUPTED))
1295*e1997b9aSAndroid Build Coastguard Worker                     .context(ks_err!("Found unexpected blob type in CACERT file"));
1296*e1997b9aSAndroid Build Coastguard Worker             }
1297*e1997b9aSAndroid Build Coastguard Worker         } else {
1298*e1997b9aSAndroid Build Coastguard Worker             None
1299*e1997b9aSAndroid Build Coastguard Worker         };
1300*e1997b9aSAndroid Build Coastguard Worker 
1301*e1997b9aSAndroid Build Coastguard Worker         Ok((km_blob, user_cert, ca_cert))
1302*e1997b9aSAndroid Build Coastguard Worker     }
1303*e1997b9aSAndroid Build Coastguard Worker 
1304*e1997b9aSAndroid Build Coastguard Worker     /// Returns true if the given user has a super key.
has_super_key(&self, user_id: u32) -> bool1305*e1997b9aSAndroid Build Coastguard Worker     pub fn has_super_key(&self, user_id: u32) -> bool {
1306*e1997b9aSAndroid Build Coastguard Worker         self.make_super_key_filename(user_id).is_file()
1307*e1997b9aSAndroid Build Coastguard Worker     }
1308*e1997b9aSAndroid Build Coastguard Worker 
1309*e1997b9aSAndroid Build Coastguard Worker     /// Load and decrypt legacy super key blob.
load_super_key(&self, user_id: u32, pw: &Password) -> Result<Option<ZVec>>1310*e1997b9aSAndroid Build Coastguard Worker     pub fn load_super_key(&self, user_id: u32, pw: &Password) -> Result<Option<ZVec>> {
1311*e1997b9aSAndroid Build Coastguard Worker         let path = self.make_super_key_filename(user_id);
1312*e1997b9aSAndroid Build Coastguard Worker         let blob = Self::read_generic_blob(&path).context(ks_err!("While loading super key."))?;
1313*e1997b9aSAndroid Build Coastguard Worker 
1314*e1997b9aSAndroid Build Coastguard Worker         let blob = match blob {
1315*e1997b9aSAndroid Build Coastguard Worker             Some(blob) => match blob {
1316*e1997b9aSAndroid Build Coastguard Worker                 Blob { flags, value: BlobValue::PwEncrypted { iv, tag, data, salt, key_size } } => {
1317*e1997b9aSAndroid Build Coastguard Worker                     if (flags & flags::ENCRYPTED) != 0 {
1318*e1997b9aSAndroid Build Coastguard Worker                         let key = pw
1319*e1997b9aSAndroid Build Coastguard Worker                             .derive_key_pbkdf2(&salt, key_size)
1320*e1997b9aSAndroid Build Coastguard Worker                             .context(ks_err!("Failed to derive key from password."))?;
1321*e1997b9aSAndroid Build Coastguard Worker                         let blob = aes_gcm_decrypt(&data, &iv, &tag, &key)
1322*e1997b9aSAndroid Build Coastguard Worker                             .context(ks_err!("while trying to decrypt legacy super key blob."))?;
1323*e1997b9aSAndroid Build Coastguard Worker                         Some(blob)
1324*e1997b9aSAndroid Build Coastguard Worker                     } else {
1325*e1997b9aSAndroid Build Coastguard Worker                         // In 2019 we had some unencrypted super keys due to b/141955555.
1326*e1997b9aSAndroid Build Coastguard Worker                         Some(data.try_into().context(ks_err!("Trying to convert key into ZVec"))?)
1327*e1997b9aSAndroid Build Coastguard Worker                     }
1328*e1997b9aSAndroid Build Coastguard Worker                 }
1329*e1997b9aSAndroid Build Coastguard Worker                 _ => {
1330*e1997b9aSAndroid Build Coastguard Worker                     return Err(KsError::Rc(ResponseCode::VALUE_CORRUPTED))
1331*e1997b9aSAndroid Build Coastguard Worker                         .context(ks_err!("Found wrong blob type in legacy super key blob file."));
1332*e1997b9aSAndroid Build Coastguard Worker                 }
1333*e1997b9aSAndroid Build Coastguard Worker             },
1334*e1997b9aSAndroid Build Coastguard Worker             None => None,
1335*e1997b9aSAndroid Build Coastguard Worker         };
1336*e1997b9aSAndroid Build Coastguard Worker 
1337*e1997b9aSAndroid Build Coastguard Worker         Ok(blob)
1338*e1997b9aSAndroid Build Coastguard Worker     }
1339*e1997b9aSAndroid Build Coastguard Worker 
1340*e1997b9aSAndroid Build Coastguard Worker     /// Removes the super key for the given user from the legacy database.
1341*e1997b9aSAndroid Build Coastguard Worker     /// If this was the last entry in the user's database, this function removes
1342*e1997b9aSAndroid Build Coastguard Worker     /// the user_<uid> directory as well.
remove_super_key(&self, user_id: u32)1343*e1997b9aSAndroid Build Coastguard Worker     pub fn remove_super_key(&self, user_id: u32) {
1344*e1997b9aSAndroid Build Coastguard Worker         let path = self.make_super_key_filename(user_id);
1345*e1997b9aSAndroid Build Coastguard Worker         Self::with_retry_interrupted(|| fs::remove_file(path.as_path())).ok();
1346*e1997b9aSAndroid Build Coastguard Worker         if self.is_empty_user(user_id).ok().unwrap_or(false) {
1347*e1997b9aSAndroid Build Coastguard Worker             let path = self.make_user_path_name(user_id);
1348*e1997b9aSAndroid Build Coastguard Worker             Self::with_retry_interrupted(|| fs::remove_dir(path.as_path())).ok();
1349*e1997b9aSAndroid Build Coastguard Worker         }
1350*e1997b9aSAndroid Build Coastguard Worker     }
1351*e1997b9aSAndroid Build Coastguard Worker }
1352*e1997b9aSAndroid Build Coastguard Worker 
1353*e1997b9aSAndroid Build Coastguard Worker /// This module implements utility apis for creating legacy blob files.
1354*e1997b9aSAndroid Build Coastguard Worker #[cfg(feature = "keystore2_blob_test_utils")]
1355*e1997b9aSAndroid Build Coastguard Worker pub mod test_utils {
1356*e1997b9aSAndroid Build Coastguard Worker     #![allow(dead_code)]
1357*e1997b9aSAndroid Build Coastguard Worker 
1358*e1997b9aSAndroid Build Coastguard Worker     /// test vectors for legacy key blobs
1359*e1997b9aSAndroid Build Coastguard Worker     pub mod legacy_blob_test_vectors;
1360*e1997b9aSAndroid Build Coastguard Worker 
1361*e1997b9aSAndroid Build Coastguard Worker     use crate::legacy_blob::blob_types::{
1362*e1997b9aSAndroid Build Coastguard Worker         GENERIC, KEY_CHARACTERISTICS, KEY_CHARACTERISTICS_CACHE, KM_BLOB, SUPER_KEY,
1363*e1997b9aSAndroid Build Coastguard Worker         SUPER_KEY_AES256,
1364*e1997b9aSAndroid Build Coastguard Worker     };
1365*e1997b9aSAndroid Build Coastguard Worker     use crate::legacy_blob::*;
1366*e1997b9aSAndroid Build Coastguard Worker     use anyhow::{anyhow, Result};
1367*e1997b9aSAndroid Build Coastguard Worker     use keystore2_crypto::{aes_gcm_decrypt, aes_gcm_encrypt};
1368*e1997b9aSAndroid Build Coastguard Worker     use std::convert::TryInto;
1369*e1997b9aSAndroid Build Coastguard Worker     use std::fs::OpenOptions;
1370*e1997b9aSAndroid Build Coastguard Worker     use std::io::Write;
1371*e1997b9aSAndroid Build Coastguard Worker 
1372*e1997b9aSAndroid Build Coastguard Worker     /// This function takes a blob and synchronizes the encrypted/super encrypted flags
1373*e1997b9aSAndroid Build Coastguard Worker     /// with the blob type for the pairs Generic/EncryptedGeneric,
1374*e1997b9aSAndroid Build Coastguard Worker     /// Characteristics/EncryptedCharacteristics and Encrypted/Decrypted.
1375*e1997b9aSAndroid Build Coastguard Worker     /// E.g. if a non encrypted enum variant is encountered with flags::SUPER_ENCRYPTED
1376*e1997b9aSAndroid Build Coastguard Worker     /// or flags::ENCRYPTED is set, the payload is encrypted and the corresponding
1377*e1997b9aSAndroid Build Coastguard Worker     /// encrypted variant is returned, and vice versa. All other variants remain untouched
1378*e1997b9aSAndroid Build Coastguard Worker     /// even if flags and BlobValue variant are inconsistent.
prepare_blob(blob: Blob, key: &[u8]) -> Result<Blob>1379*e1997b9aSAndroid Build Coastguard Worker     pub fn prepare_blob(blob: Blob, key: &[u8]) -> Result<Blob> {
1380*e1997b9aSAndroid Build Coastguard Worker         match blob {
1381*e1997b9aSAndroid Build Coastguard Worker             Blob { value: BlobValue::Generic(data), flags } if blob.is_encrypted() => {
1382*e1997b9aSAndroid Build Coastguard Worker                 let (ciphertext, iv, tag) = aes_gcm_encrypt(&data, key).unwrap();
1383*e1997b9aSAndroid Build Coastguard Worker                 Ok(Blob { value: BlobValue::EncryptedGeneric { data: ciphertext, iv, tag }, flags })
1384*e1997b9aSAndroid Build Coastguard Worker             }
1385*e1997b9aSAndroid Build Coastguard Worker             Blob { value: BlobValue::Characteristics(data), flags } if blob.is_encrypted() => {
1386*e1997b9aSAndroid Build Coastguard Worker                 let (ciphertext, iv, tag) = aes_gcm_encrypt(&data, key).unwrap();
1387*e1997b9aSAndroid Build Coastguard Worker                 Ok(Blob {
1388*e1997b9aSAndroid Build Coastguard Worker                     value: BlobValue::EncryptedCharacteristics { data: ciphertext, iv, tag },
1389*e1997b9aSAndroid Build Coastguard Worker                     flags,
1390*e1997b9aSAndroid Build Coastguard Worker                 })
1391*e1997b9aSAndroid Build Coastguard Worker             }
1392*e1997b9aSAndroid Build Coastguard Worker             Blob { value: BlobValue::Decrypted(data), flags } if blob.is_encrypted() => {
1393*e1997b9aSAndroid Build Coastguard Worker                 let (ciphertext, iv, tag) = aes_gcm_encrypt(&data, key).unwrap();
1394*e1997b9aSAndroid Build Coastguard Worker                 Ok(Blob { value: BlobValue::Encrypted { data: ciphertext, iv, tag }, flags })
1395*e1997b9aSAndroid Build Coastguard Worker             }
1396*e1997b9aSAndroid Build Coastguard Worker             Blob { value: BlobValue::EncryptedGeneric { data, iv, tag }, flags }
1397*e1997b9aSAndroid Build Coastguard Worker                 if !blob.is_encrypted() =>
1398*e1997b9aSAndroid Build Coastguard Worker             {
1399*e1997b9aSAndroid Build Coastguard Worker                 let plaintext = aes_gcm_decrypt(&data, &iv, &tag, key).unwrap();
1400*e1997b9aSAndroid Build Coastguard Worker                 Ok(Blob { value: BlobValue::Generic(plaintext[..].to_vec()), flags })
1401*e1997b9aSAndroid Build Coastguard Worker             }
1402*e1997b9aSAndroid Build Coastguard Worker             Blob { value: BlobValue::EncryptedCharacteristics { data, iv, tag }, flags }
1403*e1997b9aSAndroid Build Coastguard Worker                 if !blob.is_encrypted() =>
1404*e1997b9aSAndroid Build Coastguard Worker             {
1405*e1997b9aSAndroid Build Coastguard Worker                 let plaintext = aes_gcm_decrypt(&data, &iv, &tag, key).unwrap();
1406*e1997b9aSAndroid Build Coastguard Worker                 Ok(Blob { value: BlobValue::Characteristics(plaintext[..].to_vec()), flags })
1407*e1997b9aSAndroid Build Coastguard Worker             }
1408*e1997b9aSAndroid Build Coastguard Worker             Blob { value: BlobValue::Encrypted { data, iv, tag }, flags }
1409*e1997b9aSAndroid Build Coastguard Worker                 if !blob.is_encrypted() =>
1410*e1997b9aSAndroid Build Coastguard Worker             {
1411*e1997b9aSAndroid Build Coastguard Worker                 let plaintext = aes_gcm_decrypt(&data, &iv, &tag, key).unwrap();
1412*e1997b9aSAndroid Build Coastguard Worker                 Ok(Blob { value: BlobValue::Decrypted(plaintext), flags })
1413*e1997b9aSAndroid Build Coastguard Worker             }
1414*e1997b9aSAndroid Build Coastguard Worker             _ => Ok(blob),
1415*e1997b9aSAndroid Build Coastguard Worker         }
1416*e1997b9aSAndroid Build Coastguard Worker     }
1417*e1997b9aSAndroid Build Coastguard Worker 
1418*e1997b9aSAndroid Build Coastguard Worker     /// Legacy blob header structure.
1419*e1997b9aSAndroid Build Coastguard Worker     pub struct LegacyBlobHeader {
1420*e1997b9aSAndroid Build Coastguard Worker         version: u8,
1421*e1997b9aSAndroid Build Coastguard Worker         blob_type: u8,
1422*e1997b9aSAndroid Build Coastguard Worker         flags: u8,
1423*e1997b9aSAndroid Build Coastguard Worker         info: u8,
1424*e1997b9aSAndroid Build Coastguard Worker         iv: [u8; 12],
1425*e1997b9aSAndroid Build Coastguard Worker         tag: [u8; 16],
1426*e1997b9aSAndroid Build Coastguard Worker         blob_size: u32,
1427*e1997b9aSAndroid Build Coastguard Worker     }
1428*e1997b9aSAndroid Build Coastguard Worker 
1429*e1997b9aSAndroid Build Coastguard Worker     /// This function takes a Blob and writes it to out as a legacy blob file
1430*e1997b9aSAndroid Build Coastguard Worker     /// version 3. Note that the flags field and the values field may be
1431*e1997b9aSAndroid Build Coastguard Worker     /// inconsistent and could be sanitized by this function. It is intentionally
1432*e1997b9aSAndroid Build Coastguard Worker     /// not done to enable tests to construct malformed blobs.
write_legacy_blob(out: &mut dyn Write, blob: Blob) -> Result<usize>1433*e1997b9aSAndroid Build Coastguard Worker     pub fn write_legacy_blob(out: &mut dyn Write, blob: Blob) -> Result<usize> {
1434*e1997b9aSAndroid Build Coastguard Worker         let (header, data, salt) = match blob {
1435*e1997b9aSAndroid Build Coastguard Worker             Blob { value: BlobValue::Generic(data), flags } => (
1436*e1997b9aSAndroid Build Coastguard Worker                 LegacyBlobHeader {
1437*e1997b9aSAndroid Build Coastguard Worker                     version: 3,
1438*e1997b9aSAndroid Build Coastguard Worker                     blob_type: GENERIC,
1439*e1997b9aSAndroid Build Coastguard Worker                     flags,
1440*e1997b9aSAndroid Build Coastguard Worker                     info: 0,
1441*e1997b9aSAndroid Build Coastguard Worker                     iv: [0u8; 12],
1442*e1997b9aSAndroid Build Coastguard Worker                     tag: [0u8; 16],
1443*e1997b9aSAndroid Build Coastguard Worker                     blob_size: data.len() as u32,
1444*e1997b9aSAndroid Build Coastguard Worker                 },
1445*e1997b9aSAndroid Build Coastguard Worker                 data,
1446*e1997b9aSAndroid Build Coastguard Worker                 None,
1447*e1997b9aSAndroid Build Coastguard Worker             ),
1448*e1997b9aSAndroid Build Coastguard Worker             Blob { value: BlobValue::Characteristics(data), flags } => (
1449*e1997b9aSAndroid Build Coastguard Worker                 LegacyBlobHeader {
1450*e1997b9aSAndroid Build Coastguard Worker                     version: 3,
1451*e1997b9aSAndroid Build Coastguard Worker                     blob_type: KEY_CHARACTERISTICS,
1452*e1997b9aSAndroid Build Coastguard Worker                     flags,
1453*e1997b9aSAndroid Build Coastguard Worker                     info: 0,
1454*e1997b9aSAndroid Build Coastguard Worker                     iv: [0u8; 12],
1455*e1997b9aSAndroid Build Coastguard Worker                     tag: [0u8; 16],
1456*e1997b9aSAndroid Build Coastguard Worker                     blob_size: data.len() as u32,
1457*e1997b9aSAndroid Build Coastguard Worker                 },
1458*e1997b9aSAndroid Build Coastguard Worker                 data,
1459*e1997b9aSAndroid Build Coastguard Worker                 None,
1460*e1997b9aSAndroid Build Coastguard Worker             ),
1461*e1997b9aSAndroid Build Coastguard Worker             Blob { value: BlobValue::CharacteristicsCache(data), flags } => (
1462*e1997b9aSAndroid Build Coastguard Worker                 LegacyBlobHeader {
1463*e1997b9aSAndroid Build Coastguard Worker                     version: 3,
1464*e1997b9aSAndroid Build Coastguard Worker                     blob_type: KEY_CHARACTERISTICS_CACHE,
1465*e1997b9aSAndroid Build Coastguard Worker                     flags,
1466*e1997b9aSAndroid Build Coastguard Worker                     info: 0,
1467*e1997b9aSAndroid Build Coastguard Worker                     iv: [0u8; 12],
1468*e1997b9aSAndroid Build Coastguard Worker                     tag: [0u8; 16],
1469*e1997b9aSAndroid Build Coastguard Worker                     blob_size: data.len() as u32,
1470*e1997b9aSAndroid Build Coastguard Worker                 },
1471*e1997b9aSAndroid Build Coastguard Worker                 data,
1472*e1997b9aSAndroid Build Coastguard Worker                 None,
1473*e1997b9aSAndroid Build Coastguard Worker             ),
1474*e1997b9aSAndroid Build Coastguard Worker             Blob { value: BlobValue::PwEncrypted { iv, tag, data, salt, key_size }, flags } => (
1475*e1997b9aSAndroid Build Coastguard Worker                 LegacyBlobHeader {
1476*e1997b9aSAndroid Build Coastguard Worker                     version: 3,
1477*e1997b9aSAndroid Build Coastguard Worker                     blob_type: if key_size == keystore2_crypto::AES_128_KEY_LENGTH {
1478*e1997b9aSAndroid Build Coastguard Worker                         SUPER_KEY
1479*e1997b9aSAndroid Build Coastguard Worker                     } else {
1480*e1997b9aSAndroid Build Coastguard Worker                         SUPER_KEY_AES256
1481*e1997b9aSAndroid Build Coastguard Worker                     },
1482*e1997b9aSAndroid Build Coastguard Worker                     flags,
1483*e1997b9aSAndroid Build Coastguard Worker                     info: 0,
1484*e1997b9aSAndroid Build Coastguard Worker                     iv: iv.try_into().unwrap(),
1485*e1997b9aSAndroid Build Coastguard Worker                     tag: tag[..].try_into().unwrap(),
1486*e1997b9aSAndroid Build Coastguard Worker                     blob_size: data.len() as u32,
1487*e1997b9aSAndroid Build Coastguard Worker                 },
1488*e1997b9aSAndroid Build Coastguard Worker                 data,
1489*e1997b9aSAndroid Build Coastguard Worker                 Some(salt),
1490*e1997b9aSAndroid Build Coastguard Worker             ),
1491*e1997b9aSAndroid Build Coastguard Worker             Blob { value: BlobValue::Encrypted { iv, tag, data }, flags } => (
1492*e1997b9aSAndroid Build Coastguard Worker                 LegacyBlobHeader {
1493*e1997b9aSAndroid Build Coastguard Worker                     version: 3,
1494*e1997b9aSAndroid Build Coastguard Worker                     blob_type: KM_BLOB,
1495*e1997b9aSAndroid Build Coastguard Worker                     flags,
1496*e1997b9aSAndroid Build Coastguard Worker                     info: 0,
1497*e1997b9aSAndroid Build Coastguard Worker                     iv: iv.try_into().unwrap(),
1498*e1997b9aSAndroid Build Coastguard Worker                     tag: tag[..].try_into().unwrap(),
1499*e1997b9aSAndroid Build Coastguard Worker                     blob_size: data.len() as u32,
1500*e1997b9aSAndroid Build Coastguard Worker                 },
1501*e1997b9aSAndroid Build Coastguard Worker                 data,
1502*e1997b9aSAndroid Build Coastguard Worker                 None,
1503*e1997b9aSAndroid Build Coastguard Worker             ),
1504*e1997b9aSAndroid Build Coastguard Worker             Blob { value: BlobValue::EncryptedGeneric { iv, tag, data }, flags } => (
1505*e1997b9aSAndroid Build Coastguard Worker                 LegacyBlobHeader {
1506*e1997b9aSAndroid Build Coastguard Worker                     version: 3,
1507*e1997b9aSAndroid Build Coastguard Worker                     blob_type: GENERIC,
1508*e1997b9aSAndroid Build Coastguard Worker                     flags,
1509*e1997b9aSAndroid Build Coastguard Worker                     info: 0,
1510*e1997b9aSAndroid Build Coastguard Worker                     iv: iv.try_into().unwrap(),
1511*e1997b9aSAndroid Build Coastguard Worker                     tag: tag[..].try_into().unwrap(),
1512*e1997b9aSAndroid Build Coastguard Worker                     blob_size: data.len() as u32,
1513*e1997b9aSAndroid Build Coastguard Worker                 },
1514*e1997b9aSAndroid Build Coastguard Worker                 data,
1515*e1997b9aSAndroid Build Coastguard Worker                 None,
1516*e1997b9aSAndroid Build Coastguard Worker             ),
1517*e1997b9aSAndroid Build Coastguard Worker             Blob { value: BlobValue::EncryptedCharacteristics { iv, tag, data }, flags } => (
1518*e1997b9aSAndroid Build Coastguard Worker                 LegacyBlobHeader {
1519*e1997b9aSAndroid Build Coastguard Worker                     version: 3,
1520*e1997b9aSAndroid Build Coastguard Worker                     blob_type: KEY_CHARACTERISTICS,
1521*e1997b9aSAndroid Build Coastguard Worker                     flags,
1522*e1997b9aSAndroid Build Coastguard Worker                     info: 0,
1523*e1997b9aSAndroid Build Coastguard Worker                     iv: iv.try_into().unwrap(),
1524*e1997b9aSAndroid Build Coastguard Worker                     tag: tag[..].try_into().unwrap(),
1525*e1997b9aSAndroid Build Coastguard Worker                     blob_size: data.len() as u32,
1526*e1997b9aSAndroid Build Coastguard Worker                 },
1527*e1997b9aSAndroid Build Coastguard Worker                 data,
1528*e1997b9aSAndroid Build Coastguard Worker                 None,
1529*e1997b9aSAndroid Build Coastguard Worker             ),
1530*e1997b9aSAndroid Build Coastguard Worker             Blob { value: BlobValue::Decrypted(data), flags } => (
1531*e1997b9aSAndroid Build Coastguard Worker                 LegacyBlobHeader {
1532*e1997b9aSAndroid Build Coastguard Worker                     version: 3,
1533*e1997b9aSAndroid Build Coastguard Worker                     blob_type: KM_BLOB,
1534*e1997b9aSAndroid Build Coastguard Worker                     flags,
1535*e1997b9aSAndroid Build Coastguard Worker                     info: 0,
1536*e1997b9aSAndroid Build Coastguard Worker                     iv: [0u8; 12],
1537*e1997b9aSAndroid Build Coastguard Worker                     tag: [0u8; 16],
1538*e1997b9aSAndroid Build Coastguard Worker                     blob_size: data.len() as u32,
1539*e1997b9aSAndroid Build Coastguard Worker                 },
1540*e1997b9aSAndroid Build Coastguard Worker                 data[..].to_vec(),
1541*e1997b9aSAndroid Build Coastguard Worker                 None,
1542*e1997b9aSAndroid Build Coastguard Worker             ),
1543*e1997b9aSAndroid Build Coastguard Worker         };
1544*e1997b9aSAndroid Build Coastguard Worker         write_legacy_blob_helper(out, &header, &data, salt.as_deref())
1545*e1997b9aSAndroid Build Coastguard Worker     }
1546*e1997b9aSAndroid Build Coastguard Worker 
1547*e1997b9aSAndroid Build Coastguard Worker     /// This function takes LegacyBlobHeader, blob payload and writes it to out as a legacy blob file
1548*e1997b9aSAndroid Build Coastguard Worker     /// version 3.
write_legacy_blob_helper( out: &mut dyn Write, header: &LegacyBlobHeader, data: &[u8], info: Option<&[u8]>, ) -> Result<usize>1549*e1997b9aSAndroid Build Coastguard Worker     pub fn write_legacy_blob_helper(
1550*e1997b9aSAndroid Build Coastguard Worker         out: &mut dyn Write,
1551*e1997b9aSAndroid Build Coastguard Worker         header: &LegacyBlobHeader,
1552*e1997b9aSAndroid Build Coastguard Worker         data: &[u8],
1553*e1997b9aSAndroid Build Coastguard Worker         info: Option<&[u8]>,
1554*e1997b9aSAndroid Build Coastguard Worker     ) -> Result<usize> {
1555*e1997b9aSAndroid Build Coastguard Worker         if 1 != out.write(&[header.version])? {
1556*e1997b9aSAndroid Build Coastguard Worker             return Err(anyhow!("Unexpected size while writing version."));
1557*e1997b9aSAndroid Build Coastguard Worker         }
1558*e1997b9aSAndroid Build Coastguard Worker         if 1 != out.write(&[header.blob_type])? {
1559*e1997b9aSAndroid Build Coastguard Worker             return Err(anyhow!("Unexpected size while writing blob_type."));
1560*e1997b9aSAndroid Build Coastguard Worker         }
1561*e1997b9aSAndroid Build Coastguard Worker         if 1 != out.write(&[header.flags])? {
1562*e1997b9aSAndroid Build Coastguard Worker             return Err(anyhow!("Unexpected size while writing flags."));
1563*e1997b9aSAndroid Build Coastguard Worker         }
1564*e1997b9aSAndroid Build Coastguard Worker         if 1 != out.write(&[header.info])? {
1565*e1997b9aSAndroid Build Coastguard Worker             return Err(anyhow!("Unexpected size while writing info."));
1566*e1997b9aSAndroid Build Coastguard Worker         }
1567*e1997b9aSAndroid Build Coastguard Worker         if 12 != out.write(&header.iv)? {
1568*e1997b9aSAndroid Build Coastguard Worker             return Err(anyhow!("Unexpected size while writing iv."));
1569*e1997b9aSAndroid Build Coastguard Worker         }
1570*e1997b9aSAndroid Build Coastguard Worker         if 4 != out.write(&[0u8; 4])? {
1571*e1997b9aSAndroid Build Coastguard Worker             return Err(anyhow!("Unexpected size while writing last 4 bytes of iv."));
1572*e1997b9aSAndroid Build Coastguard Worker         }
1573*e1997b9aSAndroid Build Coastguard Worker         if 16 != out.write(&header.tag)? {
1574*e1997b9aSAndroid Build Coastguard Worker             return Err(anyhow!("Unexpected size while writing tag."));
1575*e1997b9aSAndroid Build Coastguard Worker         }
1576*e1997b9aSAndroid Build Coastguard Worker         if 4 != out.write(&header.blob_size.to_be_bytes())? {
1577*e1997b9aSAndroid Build Coastguard Worker             return Err(anyhow!("Unexpected size while writing blob size."));
1578*e1997b9aSAndroid Build Coastguard Worker         }
1579*e1997b9aSAndroid Build Coastguard Worker         if data.len() != out.write(data)? {
1580*e1997b9aSAndroid Build Coastguard Worker             return Err(anyhow!("Unexpected size while writing blob."));
1581*e1997b9aSAndroid Build Coastguard Worker         }
1582*e1997b9aSAndroid Build Coastguard Worker         if let Some(info) = info {
1583*e1997b9aSAndroid Build Coastguard Worker             if info.len() != out.write(info)? {
1584*e1997b9aSAndroid Build Coastguard Worker                 return Err(anyhow!("Unexpected size while writing inof."));
1585*e1997b9aSAndroid Build Coastguard Worker             }
1586*e1997b9aSAndroid Build Coastguard Worker         }
1587*e1997b9aSAndroid Build Coastguard Worker         Ok(40 + data.len() + info.map(|v| v.len()).unwrap_or(0))
1588*e1997b9aSAndroid Build Coastguard Worker     }
1589*e1997b9aSAndroid Build Coastguard Worker 
1590*e1997b9aSAndroid Build Coastguard Worker     /// Create encrypted characteristics file using given key.
make_encrypted_characteristics_file<P: AsRef<Path>>( path: P, key: &[u8], data: &[u8], ) -> Result<()>1591*e1997b9aSAndroid Build Coastguard Worker     pub fn make_encrypted_characteristics_file<P: AsRef<Path>>(
1592*e1997b9aSAndroid Build Coastguard Worker         path: P,
1593*e1997b9aSAndroid Build Coastguard Worker         key: &[u8],
1594*e1997b9aSAndroid Build Coastguard Worker         data: &[u8],
1595*e1997b9aSAndroid Build Coastguard Worker     ) -> Result<()> {
1596*e1997b9aSAndroid Build Coastguard Worker         let mut file = OpenOptions::new().write(true).create_new(true).open(path).unwrap();
1597*e1997b9aSAndroid Build Coastguard Worker         let blob =
1598*e1997b9aSAndroid Build Coastguard Worker             Blob { value: BlobValue::Characteristics(data.to_vec()), flags: flags::ENCRYPTED };
1599*e1997b9aSAndroid Build Coastguard Worker         let blob = prepare_blob(blob, key).unwrap();
1600*e1997b9aSAndroid Build Coastguard Worker         write_legacy_blob(&mut file, blob).unwrap();
1601*e1997b9aSAndroid Build Coastguard Worker         Ok(())
1602*e1997b9aSAndroid Build Coastguard Worker     }
1603*e1997b9aSAndroid Build Coastguard Worker 
1604*e1997b9aSAndroid Build Coastguard Worker     /// Create encrypted user certificate file using given key.
make_encrypted_usr_cert_file<P: AsRef<Path>>( path: P, key: &[u8], data: &[u8], ) -> Result<()>1605*e1997b9aSAndroid Build Coastguard Worker     pub fn make_encrypted_usr_cert_file<P: AsRef<Path>>(
1606*e1997b9aSAndroid Build Coastguard Worker         path: P,
1607*e1997b9aSAndroid Build Coastguard Worker         key: &[u8],
1608*e1997b9aSAndroid Build Coastguard Worker         data: &[u8],
1609*e1997b9aSAndroid Build Coastguard Worker     ) -> Result<()> {
1610*e1997b9aSAndroid Build Coastguard Worker         let mut file = OpenOptions::new().write(true).create_new(true).open(path).unwrap();
1611*e1997b9aSAndroid Build Coastguard Worker         let blob = Blob { value: BlobValue::Generic(data.to_vec()), flags: flags::ENCRYPTED };
1612*e1997b9aSAndroid Build Coastguard Worker         let blob = prepare_blob(blob, key).unwrap();
1613*e1997b9aSAndroid Build Coastguard Worker         write_legacy_blob(&mut file, blob).unwrap();
1614*e1997b9aSAndroid Build Coastguard Worker         Ok(())
1615*e1997b9aSAndroid Build Coastguard Worker     }
1616*e1997b9aSAndroid Build Coastguard Worker 
1617*e1997b9aSAndroid Build Coastguard Worker     /// Create encrypted CA certificate file using given key.
make_encrypted_ca_cert_file<P: AsRef<Path>>( path: P, key: &[u8], data: &[u8], ) -> Result<()>1618*e1997b9aSAndroid Build Coastguard Worker     pub fn make_encrypted_ca_cert_file<P: AsRef<Path>>(
1619*e1997b9aSAndroid Build Coastguard Worker         path: P,
1620*e1997b9aSAndroid Build Coastguard Worker         key: &[u8],
1621*e1997b9aSAndroid Build Coastguard Worker         data: &[u8],
1622*e1997b9aSAndroid Build Coastguard Worker     ) -> Result<()> {
1623*e1997b9aSAndroid Build Coastguard Worker         let mut file = OpenOptions::new().write(true).create_new(true).open(path).unwrap();
1624*e1997b9aSAndroid Build Coastguard Worker         let blob = Blob { value: BlobValue::Generic(data.to_vec()), flags: flags::ENCRYPTED };
1625*e1997b9aSAndroid Build Coastguard Worker         let blob = prepare_blob(blob, key).unwrap();
1626*e1997b9aSAndroid Build Coastguard Worker         write_legacy_blob(&mut file, blob).unwrap();
1627*e1997b9aSAndroid Build Coastguard Worker         Ok(())
1628*e1997b9aSAndroid Build Coastguard Worker     }
1629*e1997b9aSAndroid Build Coastguard Worker 
1630*e1997b9aSAndroid Build Coastguard Worker     /// Create encrypted user key file using given key.
make_encrypted_key_file<P: AsRef<Path>>(path: P, key: &[u8], data: &[u8]) -> Result<()>1631*e1997b9aSAndroid Build Coastguard Worker     pub fn make_encrypted_key_file<P: AsRef<Path>>(path: P, key: &[u8], data: &[u8]) -> Result<()> {
1632*e1997b9aSAndroid Build Coastguard Worker         let mut file = OpenOptions::new().write(true).create_new(true).open(path).unwrap();
1633*e1997b9aSAndroid Build Coastguard Worker         let blob = Blob {
1634*e1997b9aSAndroid Build Coastguard Worker             value: BlobValue::Decrypted(ZVec::try_from(data).unwrap()),
1635*e1997b9aSAndroid Build Coastguard Worker             flags: flags::ENCRYPTED,
1636*e1997b9aSAndroid Build Coastguard Worker         };
1637*e1997b9aSAndroid Build Coastguard Worker         let blob = prepare_blob(blob, key).unwrap();
1638*e1997b9aSAndroid Build Coastguard Worker         write_legacy_blob(&mut file, blob).unwrap();
1639*e1997b9aSAndroid Build Coastguard Worker         Ok(())
1640*e1997b9aSAndroid Build Coastguard Worker     }
1641*e1997b9aSAndroid Build Coastguard Worker 
1642*e1997b9aSAndroid Build Coastguard Worker     /// Create user or ca cert blob file.
make_cert_blob_file<P: AsRef<Path>>(path: P, data: &[u8]) -> Result<()>1643*e1997b9aSAndroid Build Coastguard Worker     pub fn make_cert_blob_file<P: AsRef<Path>>(path: P, data: &[u8]) -> Result<()> {
1644*e1997b9aSAndroid Build Coastguard Worker         let mut file = OpenOptions::new().write(true).create_new(true).open(path).unwrap();
1645*e1997b9aSAndroid Build Coastguard Worker         let blob = Blob { value: BlobValue::Generic(data.to_vec()), flags: 0 };
1646*e1997b9aSAndroid Build Coastguard Worker         let blob = prepare_blob(blob, &[]).unwrap();
1647*e1997b9aSAndroid Build Coastguard Worker         write_legacy_blob(&mut file, blob).unwrap();
1648*e1997b9aSAndroid Build Coastguard Worker         Ok(())
1649*e1997b9aSAndroid Build Coastguard Worker     }
1650*e1997b9aSAndroid Build Coastguard Worker }
1651