2016-01-21 21:26:12 +01:00
|
|
|
/*
|
|
|
|
* Copyright (C) 2016 The Android Open Source Project
|
|
|
|
*
|
|
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
* you may not use this file except in compliance with the License.
|
|
|
|
* You may obtain a copy of the License at
|
|
|
|
*
|
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
*
|
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
* See the License for the specific language governing permissions and
|
|
|
|
* limitations under the License.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#ifndef ANDROID_VOLD_KEYSTORAGE_H
|
|
|
|
#define ANDROID_VOLD_KEYSTORAGE_H
|
|
|
|
|
2017-08-01 18:15:53 +02:00
|
|
|
#include "KeyBuffer.h"
|
|
|
|
|
2016-01-21 21:26:12 +01:00
|
|
|
#include <string>
|
|
|
|
|
|
|
|
namespace android {
|
|
|
|
namespace vold {
|
|
|
|
|
2016-02-08 16:55:41 +01:00
|
|
|
// Represents the information needed to decrypt a disk encryption key.
|
|
|
|
// If "token" is nonempty, it is passed in as a required Gatekeeper auth token.
|
2017-01-05 07:32:40 +01:00
|
|
|
// If "token" and "secret" are nonempty, "secret" is appended to the application-specific
|
2016-02-08 16:55:41 +01:00
|
|
|
// binary needed to unlock.
|
2017-01-05 07:32:40 +01:00
|
|
|
// If only "secret" is nonempty, it is used to decrypt in a non-Keymaster process.
|
2016-02-08 16:55:41 +01:00
|
|
|
class KeyAuthentication {
|
2016-03-09 18:31:37 +01:00
|
|
|
public:
|
2018-12-18 20:10:31 +01:00
|
|
|
KeyAuthentication(const std::string& t, const std::string& s) : token{t}, secret{s} {};
|
2017-01-05 07:32:40 +01:00
|
|
|
|
|
|
|
bool usesKeymaster() const { return !token.empty() || secret.empty(); };
|
|
|
|
|
2016-02-08 16:55:41 +01:00
|
|
|
const std::string token;
|
|
|
|
const std::string secret;
|
|
|
|
};
|
|
|
|
|
|
|
|
extern const KeyAuthentication kEmptyAuthentication;
|
|
|
|
|
2016-06-02 20:01:19 +02:00
|
|
|
// Checks if path "path" exists.
|
|
|
|
bool pathExists(const std::string& path);
|
|
|
|
|
2017-10-26 20:16:39 +02:00
|
|
|
bool createSecdiscardable(const std::string& path, std::string* hash);
|
|
|
|
bool readSecdiscardable(const std::string& path, std::string* hash);
|
|
|
|
|
2016-01-21 21:26:12 +01:00
|
|
|
// Create a directory at the named path, and store "key" in it,
|
|
|
|
// in such a way that it can only be retrieved via Keymaster and
|
|
|
|
// can be securely deleted.
|
|
|
|
// It's safe to move/rename the directory after creation.
|
2017-08-01 18:15:53 +02:00
|
|
|
bool storeKey(const std::string& dir, const KeyAuthentication& auth, const KeyBuffer& key);
|
2016-01-21 21:26:12 +01:00
|
|
|
|
2016-06-02 20:01:19 +02:00
|
|
|
// Create a directory at the named path, and store "key" in it as storeKey
|
|
|
|
// This version creates the key in "tmp_path" then atomically renames "tmp_path"
|
|
|
|
// to "key_path" thereby ensuring that the key is either stored entirely or
|
|
|
|
// not at all.
|
|
|
|
bool storeKeyAtomically(const std::string& key_path, const std::string& tmp_path,
|
2017-08-01 18:15:53 +02:00
|
|
|
const KeyAuthentication& auth, const KeyBuffer& key);
|
2016-06-02 20:01:19 +02:00
|
|
|
|
2016-01-21 21:26:12 +01:00
|
|
|
// Retrieve the key from the named directory.
|
KeyUtil: don't use keepOld=true for system DE and volume keys
Commit 77df7f207dce / http://aosp/1217657 ("Refactor to use
EncryptionPolicy everywhere we used to use raw_ref") unintentionally
made fscrypt_initialize_systemwide_keys() start specifying keepOld=true
(via default parameter value) when retrieving the system DE key, and
likewise for read_or_create_volkey() and volume keys.
As a result, if the associated Keymaster key needs to be upgraded, the
upgraded key blob gets written to "keymaster_key_blob_upgraded", but it
doesn't replace the original "keymaster_key_blob", nor is the original
key deleted from Keymaster. This happens at every boot, eventually
resulting in the RPMB partition in Keymaster becoming full.
Only the metadata encryption key ever needs keepOld=true, since it's the
only key that isn't stored in /data, and the purpose of keepOld=true is
to allow a key that isn't stored in /data to be committed or rolled back
when a userdata checkpoint is committed or rolled back.
So, fix this bug by removing the default value of keepOld, and
specifying false everywhere except the metadata encryption key.
Note that when an affected device gets this fix, it will finally upgrade
its system DE key correctly. However, this fix doesn't free up space in
Keymaster that was consumed by this bug.
Test: On bramble:
- Flashed rvc-d1-dev build, with wiping userdata
- Flashed a newer build, without wiping userdata
- Log expectedly shows key upgrades:
$ adb logcat | grep 'Upgrading key'
D vold : Upgrading key: /metadata/vold/metadata_encryption/key
D vold : Upgrading key: /data/unencrypted/key
D vold : Upgrading key: /data/misc/vold/user_keys/de/0
D vold : Upgrading key: /data/misc/vold/user_keys/ce/0/current
- Rebooted
- Log unexpectedly shows the system DE key being upgraded again:
$ adb logcat | grep 'Upgrading key'
D vold : Upgrading key: /data/unencrypted/key
- "keymaster_key_blob_upgraded" unexpectedly still exists:
$ adb shell find /data /metadata -name keymaster_key_blob_upgraded
/data/unencrypted/key/keymaster_key_blob_upgraded
- Applied this fix and flashed, without wiping userdata
- Log shows system DE key being upgraded (expected because due to the
bug, the upgraded key didn't replace the original one before)
$ adb logcat | grep 'Upgrading key'
D vold : Upgrading key: /data/unencrypted/key
- "keymaster_key_blob_upgraded" expectedly no longer exists
$ adb shell find /data /metadata -name keymaster_key_blob_upgraded
- Rebooted
- Log expectedly doesn't show any more key upgrades
$ adb logcat | grep 'Upgrading key'
Bug: 171944521
Bug: 172019387
Change-Id: I42d3f5fbe32cb2ec229f4b614cfb271412a3ed29
2020-10-29 20:59:28 +01:00
|
|
|
//
|
|
|
|
// If the key is wrapped by a Keymaster key that requires an upgrade, then that
|
|
|
|
// Keymaster key is upgraded. If |keepOld| is false, then the upgraded
|
|
|
|
// Keymaster key replaces the original one. As part of this, the original is
|
|
|
|
// deleted from Keymaster; however, if a user data checkpoint is active, this
|
|
|
|
// part is delayed until the checkpoint is committed.
|
|
|
|
//
|
|
|
|
// If instead |keepOld| is true, then the upgraded key doesn't actually replace
|
|
|
|
// the original one. This is needed *only* if |dir| isn't located in /data and
|
|
|
|
// a user data checkpoint is active. In this case the caller must handle
|
|
|
|
// replacing the original key if the checkpoint is committed, and deleting the
|
|
|
|
// upgraded key if the checkpoint is rolled back.
|
2018-12-14 10:08:10 +01:00
|
|
|
bool retrieveKey(const std::string& dir, const KeyAuthentication& auth, KeyBuffer* key,
|
KeyUtil: don't use keepOld=true for system DE and volume keys
Commit 77df7f207dce / http://aosp/1217657 ("Refactor to use
EncryptionPolicy everywhere we used to use raw_ref") unintentionally
made fscrypt_initialize_systemwide_keys() start specifying keepOld=true
(via default parameter value) when retrieving the system DE key, and
likewise for read_or_create_volkey() and volume keys.
As a result, if the associated Keymaster key needs to be upgraded, the
upgraded key blob gets written to "keymaster_key_blob_upgraded", but it
doesn't replace the original "keymaster_key_blob", nor is the original
key deleted from Keymaster. This happens at every boot, eventually
resulting in the RPMB partition in Keymaster becoming full.
Only the metadata encryption key ever needs keepOld=true, since it's the
only key that isn't stored in /data, and the purpose of keepOld=true is
to allow a key that isn't stored in /data to be committed or rolled back
when a userdata checkpoint is committed or rolled back.
So, fix this bug by removing the default value of keepOld, and
specifying false everywhere except the metadata encryption key.
Note that when an affected device gets this fix, it will finally upgrade
its system DE key correctly. However, this fix doesn't free up space in
Keymaster that was consumed by this bug.
Test: On bramble:
- Flashed rvc-d1-dev build, with wiping userdata
- Flashed a newer build, without wiping userdata
- Log expectedly shows key upgrades:
$ adb logcat | grep 'Upgrading key'
D vold : Upgrading key: /metadata/vold/metadata_encryption/key
D vold : Upgrading key: /data/unencrypted/key
D vold : Upgrading key: /data/misc/vold/user_keys/de/0
D vold : Upgrading key: /data/misc/vold/user_keys/ce/0/current
- Rebooted
- Log unexpectedly shows the system DE key being upgraded again:
$ adb logcat | grep 'Upgrading key'
D vold : Upgrading key: /data/unencrypted/key
- "keymaster_key_blob_upgraded" unexpectedly still exists:
$ adb shell find /data /metadata -name keymaster_key_blob_upgraded
/data/unencrypted/key/keymaster_key_blob_upgraded
- Applied this fix and flashed, without wiping userdata
- Log shows system DE key being upgraded (expected because due to the
bug, the upgraded key didn't replace the original one before)
$ adb logcat | grep 'Upgrading key'
D vold : Upgrading key: /data/unencrypted/key
- "keymaster_key_blob_upgraded" expectedly no longer exists
$ adb shell find /data /metadata -name keymaster_key_blob_upgraded
- Rebooted
- Log expectedly doesn't show any more key upgrades
$ adb logcat | grep 'Upgrading key'
Bug: 171944521
Bug: 172019387
Change-Id: I42d3f5fbe32cb2ec229f4b614cfb271412a3ed29
2020-10-29 20:59:28 +01:00
|
|
|
bool keepOld);
|
2016-01-21 21:26:12 +01:00
|
|
|
|
|
|
|
// Securely destroy the key stored in the named directory and delete the directory.
|
2016-03-09 18:31:37 +01:00
|
|
|
bool destroyKey(const std::string& dir);
|
2016-01-21 21:26:12 +01:00
|
|
|
|
2017-04-27 21:43:10 +02:00
|
|
|
bool runSecdiscardSingle(const std::string& file);
|
2020-02-03 22:06:45 +01:00
|
|
|
|
|
|
|
// Generate wrapped storage key using keymaster. Uses STORAGE_KEY tag in keymaster.
|
|
|
|
bool generateWrappedStorageKey(KeyBuffer* key);
|
|
|
|
// Export the per-boot boot wrapped storage key using keymaster.
|
|
|
|
bool exportWrappedStorageKey(const KeyBuffer& kmKey, KeyBuffer* key);
|
2016-01-21 21:26:12 +01:00
|
|
|
} // namespace vold
|
|
|
|
} // namespace android
|
|
|
|
|
|
|
|
#endif
|