bea3f9c345
Introduce the "adb keygen" command.
Usage: adb keygen <filename>
This command creates an adb public/private key pair in a user
specified file. This can be used to create new adb keys, or rotate
existing keys.
Modify adb's key generation routines to use the HOSTNAME/LOGNAME
environment variables if available. This allows someone to override
the username/hostname embedded within the adb public key file if
desired. Fallback to the old mechanisms if those environment
variables aren't available.
Bug: 18342715
Change-Id: Ibccee6088d4609aa05ad6687d3a1d8a8689d3e8a
(cherry picked from commit af782b9f2a
)
Change-Id: Ic76ffc9412171dddc879af0bbf6e20fbe1a8f057
55 lines
1.9 KiB
C
55 lines
1.9 KiB
C
/*
|
|
* Copyright (C) 2012 The Android Open Source Project
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*/
|
|
|
|
#ifndef __ADB_AUTH_H
|
|
#define __ADB_AUTH_H
|
|
|
|
void adb_auth_init(void);
|
|
int adb_auth_keygen(const char* filename);
|
|
void adb_auth_verified(atransport *t);
|
|
|
|
void send_auth_request(atransport *t);
|
|
|
|
/* AUTH packets first argument */
|
|
/* Request */
|
|
#define ADB_AUTH_TOKEN 1
|
|
/* Response */
|
|
#define ADB_AUTH_SIGNATURE 2
|
|
#define ADB_AUTH_RSAPUBLICKEY 3
|
|
|
|
#if ADB_HOST
|
|
|
|
int adb_auth_sign(void *key, void *token, size_t token_size, void *sig);
|
|
void *adb_auth_nextkey(void *current);
|
|
int adb_auth_get_userkey(unsigned char *data, size_t len);
|
|
|
|
static inline int adb_auth_generate_token(void *token, size_t token_size) { return 0; }
|
|
static inline int adb_auth_verify(void *token, void *sig, int siglen) { return 0; }
|
|
static inline void adb_auth_confirm_key(unsigned char *data, size_t len, atransport *t) { }
|
|
|
|
#else // !ADB_HOST
|
|
|
|
static inline int adb_auth_sign(void* key, void *token, size_t token_size, void *sig) { return 0; }
|
|
static inline void *adb_auth_nextkey(void *current) { return NULL; }
|
|
static inline int adb_auth_get_userkey(unsigned char *data, size_t len) { return 0; }
|
|
|
|
int adb_auth_generate_token(void *token, size_t token_size);
|
|
int adb_auth_verify(void *token, void *sig, int siglen);
|
|
void adb_auth_confirm_key(unsigned char *data, size_t len, atransport *t);
|
|
|
|
#endif // ADB_HOST
|
|
|
|
#endif // __ADB_AUTH_H
|