2013-05-28 09:10:36 -04:00
|
|
|
/*
|
2013-05-28 16:48:42 -04:00
|
|
|
* Copyright (C) 2013 Dominik Schürmann <dominik@dominikschuermann.de>
|
2013-05-28 09:10:36 -04:00
|
|
|
*
|
2013-09-06 10:17:01 -04:00
|
|
|
* This program is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU General Public License as published by
|
|
|
|
* the Free Software Foundation, either version 3 of the License, or
|
|
|
|
* (at your option) any later version.
|
2013-05-28 09:10:36 -04:00
|
|
|
*
|
2013-09-06 10:17:01 -04:00
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU General Public License for more details.
|
2013-05-28 09:10:36 -04:00
|
|
|
*
|
2013-09-06 10:17:01 -04:00
|
|
|
* You should have received a copy of the GNU General Public License
|
|
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
2013-05-28 09:10:36 -04:00
|
|
|
*/
|
|
|
|
|
2013-07-01 17:23:53 -04:00
|
|
|
package org.sufficientlysecure.keychain.remote_api;
|
2013-05-28 09:10:36 -04:00
|
|
|
|
|
|
|
import java.io.ByteArrayInputStream;
|
|
|
|
import java.io.ByteArrayOutputStream;
|
|
|
|
import java.io.InputStream;
|
|
|
|
import java.io.OutputStream;
|
2013-06-17 09:52:09 -04:00
|
|
|
import java.util.ArrayList;
|
|
|
|
import java.util.concurrent.ArrayBlockingQueue;
|
|
|
|
import java.util.concurrent.TimeUnit;
|
2013-09-09 06:59:53 -04:00
|
|
|
import java.util.regex.Matcher;
|
2013-05-29 09:58:50 -04:00
|
|
|
|
|
|
|
import org.openintents.crypto.CryptoError;
|
|
|
|
import org.openintents.crypto.CryptoSignatureResult;
|
2013-09-08 10:08:36 -04:00
|
|
|
import org.openintents.crypto.ICryptoCallback;
|
|
|
|
import org.openintents.crypto.ICryptoService;
|
2013-05-28 09:10:36 -04:00
|
|
|
import org.sufficientlysecure.keychain.Constants;
|
|
|
|
import org.sufficientlysecure.keychain.Id;
|
|
|
|
import org.sufficientlysecure.keychain.R;
|
2013-09-08 10:08:36 -04:00
|
|
|
import org.sufficientlysecure.keychain.helper.PgpMain;
|
2013-09-08 12:21:04 -04:00
|
|
|
import org.sufficientlysecure.keychain.helper.Preferences;
|
2013-09-06 07:48:27 -04:00
|
|
|
import org.sufficientlysecure.keychain.provider.KeychainContract;
|
2013-06-17 09:52:09 -04:00
|
|
|
import org.sufficientlysecure.keychain.provider.ProviderHelper;
|
2013-05-28 09:10:36 -04:00
|
|
|
import org.sufficientlysecure.keychain.service.KeychainIntentService;
|
|
|
|
import org.sufficientlysecure.keychain.service.PassphraseCacheService;
|
2013-09-08 10:08:36 -04:00
|
|
|
import org.sufficientlysecure.keychain.util.InputData;
|
|
|
|
import org.sufficientlysecure.keychain.util.Log;
|
2013-06-17 09:52:09 -04:00
|
|
|
import org.sufficientlysecure.keychain.util.PausableThreadPoolExecutor;
|
2013-05-28 09:10:36 -04:00
|
|
|
|
|
|
|
import android.app.Service;
|
|
|
|
import android.content.Context;
|
|
|
|
import android.content.Intent;
|
2013-09-06 12:36:16 -04:00
|
|
|
import android.database.Cursor;
|
2013-09-06 07:48:27 -04:00
|
|
|
import android.net.Uri;
|
2013-06-17 09:52:09 -04:00
|
|
|
import android.os.Binder;
|
2013-05-28 09:10:36 -04:00
|
|
|
import android.os.Bundle;
|
2013-09-08 16:52:38 -04:00
|
|
|
import android.os.Handler;
|
2013-05-28 09:10:36 -04:00
|
|
|
import android.os.IBinder;
|
2013-09-08 16:52:38 -04:00
|
|
|
import android.os.Message;
|
|
|
|
import android.os.Messenger;
|
2013-05-28 09:10:36 -04:00
|
|
|
import android.os.RemoteException;
|
|
|
|
|
|
|
|
public class CryptoService extends Service {
|
|
|
|
Context mContext;
|
|
|
|
|
2013-09-08 16:52:38 -04:00
|
|
|
final ArrayBlockingQueue<Runnable> mPoolQueue = new ArrayBlockingQueue<Runnable>(100);
|
2013-09-08 13:24:47 -04:00
|
|
|
// TODO: Are these parameters okay?
|
|
|
|
PausableThreadPoolExecutor mThreadPool = new PausableThreadPoolExecutor(2, 4, 10,
|
2013-06-17 09:52:09 -04:00
|
|
|
TimeUnit.SECONDS, mPoolQueue);
|
|
|
|
|
2013-09-08 13:24:47 -04:00
|
|
|
final Object userInputLock = new Object();
|
|
|
|
|
2013-09-09 13:38:13 -04:00
|
|
|
private class MyBaseCallback implements Handler.Callback {
|
|
|
|
public static final int OKAY = 1;
|
|
|
|
public static final int CANCEL = 0;
|
|
|
|
|
|
|
|
@Override
|
|
|
|
public boolean handleMessage(Message msg) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|
|
|
|
|
2013-05-28 09:10:36 -04:00
|
|
|
@Override
|
|
|
|
public void onCreate() {
|
|
|
|
super.onCreate();
|
|
|
|
mContext = this;
|
2013-05-28 16:48:42 -04:00
|
|
|
Log.d(Constants.TAG, "CryptoService, onCreate()");
|
2013-05-28 09:10:36 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
@Override
|
|
|
|
public void onDestroy() {
|
|
|
|
super.onDestroy();
|
2013-05-28 16:48:42 -04:00
|
|
|
Log.d(Constants.TAG, "CryptoService, onDestroy()");
|
2013-05-28 09:10:36 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
@Override
|
|
|
|
public IBinder onBind(Intent intent) {
|
2013-09-08 16:52:38 -04:00
|
|
|
return mBinder;
|
2013-05-28 09:10:36 -04:00
|
|
|
}
|
|
|
|
|
2013-09-06 07:48:27 -04:00
|
|
|
private String getCachedPassphrase(long keyId) {
|
|
|
|
String passphrase = PassphraseCacheService.getCachedPassphrase(mContext, keyId);
|
|
|
|
|
|
|
|
if (passphrase == null) {
|
|
|
|
Log.d(Constants.TAG, "No passphrase! Activity required!");
|
|
|
|
|
|
|
|
// start passphrase dialog
|
|
|
|
Bundle extras = new Bundle();
|
|
|
|
extras.putLong(CryptoServiceActivity.EXTRA_SECRET_KEY_ID, keyId);
|
2013-09-08 12:21:04 -04:00
|
|
|
|
2013-09-08 16:52:38 -04:00
|
|
|
PassphraseActivityCallback callback = new PassphraseActivityCallback();
|
|
|
|
Messenger messenger = new Messenger(new Handler(getMainLooper(), callback));
|
|
|
|
|
|
|
|
pauseQueueAndStartServiceActivity(CryptoServiceActivity.ACTION_CACHE_PASSPHRASE,
|
|
|
|
messenger, extras);
|
|
|
|
|
|
|
|
if (callback.isSuccess()) {
|
|
|
|
Log.d(Constants.TAG, "New passphrase entered!");
|
|
|
|
|
|
|
|
// get again after it was entered
|
|
|
|
passphrase = PassphraseCacheService.getCachedPassphrase(mContext, keyId);
|
|
|
|
} else {
|
|
|
|
Log.d(Constants.TAG, "Passphrase dialog canceled!");
|
|
|
|
|
2013-09-08 17:08:30 -04:00
|
|
|
return null;
|
2013-09-08 16:52:38 -04:00
|
|
|
}
|
|
|
|
|
2013-09-06 07:48:27 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
return passphrase;
|
|
|
|
}
|
|
|
|
|
2013-09-09 13:38:13 -04:00
|
|
|
public class PassphraseActivityCallback extends MyBaseCallback {
|
2013-09-08 16:52:38 -04:00
|
|
|
|
2013-09-08 17:08:30 -04:00
|
|
|
private boolean success = false;
|
2013-09-08 16:52:38 -04:00
|
|
|
|
|
|
|
public boolean isSuccess() {
|
|
|
|
return success;
|
|
|
|
}
|
|
|
|
|
|
|
|
@Override
|
|
|
|
public boolean handleMessage(Message msg) {
|
2013-09-09 13:38:13 -04:00
|
|
|
if (msg.arg1 == OKAY) {
|
2013-09-08 16:52:38 -04:00
|
|
|
success = true;
|
|
|
|
} else {
|
|
|
|
success = false;
|
|
|
|
}
|
|
|
|
|
|
|
|
// resume
|
|
|
|
synchronized (userInputLock) {
|
|
|
|
userInputLock.notifyAll();
|
|
|
|
}
|
|
|
|
mThreadPool.resume();
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2013-09-06 12:54:55 -04:00
|
|
|
/**
|
|
|
|
* Search database for key ids based on emails.
|
|
|
|
*
|
|
|
|
* @param encryptionUserIds
|
|
|
|
* @return
|
|
|
|
*/
|
2013-09-08 11:04:33 -04:00
|
|
|
private long[] getKeyIdsFromEmails(String[] encryptionUserIds, long ownKeyId) {
|
2013-09-06 12:54:55 -04:00
|
|
|
// find key ids to given emails in database
|
|
|
|
ArrayList<Long> keyIds = new ArrayList<Long>();
|
2013-09-09 13:38:13 -04:00
|
|
|
|
|
|
|
boolean missingUserIdsCheck = false;
|
|
|
|
boolean dublicateUserIdsCheck = false;
|
|
|
|
ArrayList<String> missingUserIds = new ArrayList<String>();
|
|
|
|
ArrayList<String> dublicateUserIds = new ArrayList<String>();
|
|
|
|
|
2013-09-06 12:54:55 -04:00
|
|
|
for (String email : encryptionUserIds) {
|
|
|
|
Uri uri = KeychainContract.KeyRings.buildPublicKeyRingsByEmailsUri(email);
|
|
|
|
Cursor cur = getContentResolver().query(uri, null, null, null, null);
|
|
|
|
if (cur.moveToFirst()) {
|
|
|
|
long id = cur.getLong(cur.getColumnIndex(KeychainContract.KeyRings.MASTER_KEY_ID));
|
|
|
|
keyIds.add(id);
|
|
|
|
} else {
|
2013-09-09 13:38:13 -04:00
|
|
|
missingUserIdsCheck = true;
|
|
|
|
missingUserIds.add(email);
|
2013-09-06 12:54:55 -04:00
|
|
|
Log.d(Constants.TAG, "user id missing");
|
|
|
|
}
|
|
|
|
if (cur.moveToNext()) {
|
2013-09-09 13:38:13 -04:00
|
|
|
dublicateUserIdsCheck = true;
|
|
|
|
dublicateUserIds.add(email);
|
2013-09-06 12:54:55 -04:00
|
|
|
Log.d(Constants.TAG, "more than one user id with the same email");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-09-08 11:04:33 -04:00
|
|
|
// also encrypt to our self (so that we can decrypt it later!)
|
|
|
|
keyIds.add(ownKeyId);
|
2013-09-06 12:54:55 -04:00
|
|
|
|
2013-09-08 16:52:38 -04:00
|
|
|
// convert to long[]
|
2013-09-08 11:04:33 -04:00
|
|
|
long[] keyIdsArray = new long[keyIds.size()];
|
|
|
|
for (int i = 0; i < keyIdsArray.length; i++) {
|
|
|
|
keyIdsArray[i] = keyIds.get(i);
|
|
|
|
}
|
|
|
|
|
2013-09-09 13:38:13 -04:00
|
|
|
if (missingUserIdsCheck || dublicateUserIdsCheck) {
|
2013-09-08 16:52:38 -04:00
|
|
|
SelectPubKeysActivityCallback callback = new SelectPubKeysActivityCallback();
|
|
|
|
Messenger messenger = new Messenger(new Handler(getMainLooper(), callback));
|
|
|
|
|
2013-09-08 11:04:33 -04:00
|
|
|
Bundle extras = new Bundle();
|
|
|
|
extras.putLongArray(CryptoServiceActivity.EXTRA_SELECTED_MASTER_KEY_IDS, keyIdsArray);
|
2013-09-09 13:38:13 -04:00
|
|
|
extras.putStringArrayList(CryptoServiceActivity.EXTRA_MISSING_USER_IDS, missingUserIds);
|
|
|
|
extras.putStringArrayList(CryptoServiceActivity.EXTRA_DUBLICATE_USER_IDS,
|
|
|
|
dublicateUserIds);
|
|
|
|
|
2013-09-08 16:52:38 -04:00
|
|
|
pauseQueueAndStartServiceActivity(CryptoServiceActivity.ACTION_SELECT_PUB_KEYS,
|
|
|
|
messenger, extras);
|
|
|
|
|
2013-09-09 13:46:18 -04:00
|
|
|
if (callback.isSuccess()) {
|
2013-09-08 16:52:38 -04:00
|
|
|
Log.d(Constants.TAG, "New selection of pub keys!");
|
|
|
|
keyIdsArray = callback.getPubKeyIds();
|
|
|
|
} else {
|
|
|
|
Log.d(Constants.TAG, "Pub key selection canceled!");
|
2013-09-09 13:46:18 -04:00
|
|
|
return null;
|
2013-09-08 16:52:38 -04:00
|
|
|
}
|
2013-09-08 11:04:33 -04:00
|
|
|
}
|
|
|
|
|
2013-09-09 13:46:18 -04:00
|
|
|
if (keyIdsArray.length == 0) {
|
|
|
|
return null;
|
|
|
|
}
|
2013-09-08 11:04:33 -04:00
|
|
|
return keyIdsArray;
|
2013-09-06 12:54:55 -04:00
|
|
|
}
|
|
|
|
|
2013-09-09 13:38:13 -04:00
|
|
|
public class SelectPubKeysActivityCallback extends MyBaseCallback {
|
2013-09-08 16:52:38 -04:00
|
|
|
public static final String PUB_KEY_IDS = "pub_key_ids";
|
|
|
|
|
2013-09-09 13:46:18 -04:00
|
|
|
private boolean success = false;
|
2013-09-08 16:52:38 -04:00
|
|
|
private long[] pubKeyIds;
|
|
|
|
|
2013-09-09 13:46:18 -04:00
|
|
|
public boolean isSuccess() {
|
|
|
|
return success;
|
2013-09-08 16:52:38 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
public long[] getPubKeyIds() {
|
|
|
|
return pubKeyIds;
|
|
|
|
}
|
|
|
|
|
|
|
|
@Override
|
|
|
|
public boolean handleMessage(Message msg) {
|
|
|
|
if (msg.arg1 == OKAY) {
|
2013-09-09 13:46:18 -04:00
|
|
|
success = true;
|
2013-09-08 16:52:38 -04:00
|
|
|
pubKeyIds = msg.getData().getLongArray(PUB_KEY_IDS);
|
|
|
|
} else {
|
2013-09-09 13:46:18 -04:00
|
|
|
success = false;
|
2013-09-08 16:52:38 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
// resume
|
|
|
|
synchronized (userInputLock) {
|
|
|
|
userInputLock.notifyAll();
|
|
|
|
}
|
|
|
|
mThreadPool.resume();
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2013-09-06 12:54:55 -04:00
|
|
|
private synchronized void encryptAndSignSafe(byte[] inputBytes, String[] encryptionUserIds,
|
2013-09-09 06:59:53 -04:00
|
|
|
boolean asciiArmor, ICryptoCallback callback, AppSettings appSettings, boolean sign)
|
|
|
|
throws RemoteException {
|
2013-06-17 13:51:41 -04:00
|
|
|
try {
|
|
|
|
// build InputData and write into OutputStream
|
|
|
|
InputStream inputStream = new ByteArrayInputStream(inputBytes);
|
|
|
|
long inputLength = inputBytes.length;
|
|
|
|
InputData inputData = new InputData(inputStream, inputLength);
|
|
|
|
|
2013-09-06 07:48:27 -04:00
|
|
|
OutputStream outputStream = new ByteArrayOutputStream();
|
|
|
|
|
2013-09-08 11:04:33 -04:00
|
|
|
long[] keyIds = getKeyIdsFromEmails(encryptionUserIds, appSettings.getKeyId());
|
2013-09-09 13:46:18 -04:00
|
|
|
if (keyIds == null) {
|
|
|
|
callback.onError(new CryptoError(CryptoError.ID_NO_USER_IDS, "No user ids!"));
|
|
|
|
return;
|
|
|
|
}
|
2013-09-06 07:48:27 -04:00
|
|
|
|
2013-09-06 12:54:55 -04:00
|
|
|
if (sign) {
|
2013-09-08 12:21:04 -04:00
|
|
|
String passphrase = getCachedPassphrase(appSettings.getKeyId());
|
2013-09-08 17:08:30 -04:00
|
|
|
if (passphrase == null) {
|
2013-09-09 13:55:35 -04:00
|
|
|
callback.onError(new CryptoError(CryptoError.ID_NO_OR_WRONG_PASSPHRASE,
|
2013-09-08 17:08:30 -04:00
|
|
|
"No or wrong passphrase!"));
|
|
|
|
return;
|
|
|
|
}
|
2013-09-08 12:21:04 -04:00
|
|
|
|
2013-09-09 06:59:53 -04:00
|
|
|
PgpMain.encryptAndSign(mContext, null, inputData, outputStream, asciiArmor,
|
|
|
|
appSettings.getCompression(), keyIds, null,
|
2013-09-06 12:54:55 -04:00
|
|
|
appSettings.getEncryptionAlgorithm(), appSettings.getKeyId(),
|
|
|
|
appSettings.getHashAlgorithm(), true, passphrase);
|
|
|
|
} else {
|
2013-09-09 06:59:53 -04:00
|
|
|
PgpMain.encryptAndSign(mContext, null, inputData, outputStream, asciiArmor,
|
|
|
|
appSettings.getCompression(), keyIds, null,
|
2013-09-06 12:54:55 -04:00
|
|
|
appSettings.getEncryptionAlgorithm(), Id.key.none,
|
|
|
|
appSettings.getHashAlgorithm(), true, null);
|
|
|
|
}
|
2013-06-17 13:51:41 -04:00
|
|
|
|
2013-09-06 07:48:27 -04:00
|
|
|
outputStream.close();
|
2013-06-17 13:51:41 -04:00
|
|
|
|
2013-09-06 07:48:27 -04:00
|
|
|
byte[] outputBytes = ((ByteArrayOutputStream) outputStream).toByteArray();
|
2013-06-17 13:51:41 -04:00
|
|
|
|
2013-09-06 07:48:27 -04:00
|
|
|
// return over handler on client side
|
|
|
|
callback.onSuccess(outputBytes, null);
|
2013-06-17 13:51:41 -04:00
|
|
|
} catch (Exception e) {
|
|
|
|
Log.e(Constants.TAG, "KeychainService, Exception!", e);
|
|
|
|
|
|
|
|
try {
|
|
|
|
callback.onError(new CryptoError(0, e.getMessage()));
|
|
|
|
} catch (Exception t) {
|
|
|
|
Log.e(Constants.TAG, "Error returning exception to client", t);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-09-09 06:59:53 -04:00
|
|
|
// TODO: asciiArmor?!
|
2013-09-06 12:54:55 -04:00
|
|
|
private void signSafe(byte[] inputBytes, ICryptoCallback callback, AppSettings appSettings)
|
2013-05-28 16:48:42 -04:00
|
|
|
throws RemoteException {
|
2013-09-08 12:21:04 -04:00
|
|
|
try {
|
|
|
|
Log.d(Constants.TAG, "current therad id: " + Thread.currentThread().getId());
|
|
|
|
|
|
|
|
// build InputData and write into OutputStream
|
|
|
|
InputStream inputStream = new ByteArrayInputStream(inputBytes);
|
|
|
|
long inputLength = inputBytes.length;
|
|
|
|
InputData inputData = new InputData(inputStream, inputLength);
|
|
|
|
|
|
|
|
OutputStream outputStream = new ByteArrayOutputStream();
|
|
|
|
|
|
|
|
String passphrase = getCachedPassphrase(appSettings.getKeyId());
|
2013-09-08 17:08:30 -04:00
|
|
|
if (passphrase == null) {
|
2013-09-09 13:55:35 -04:00
|
|
|
callback.onError(new CryptoError(CryptoError.ID_NO_OR_WRONG_PASSPHRASE,
|
2013-09-08 17:08:30 -04:00
|
|
|
"No or wrong passphrase!"));
|
|
|
|
return;
|
|
|
|
}
|
2013-09-08 12:21:04 -04:00
|
|
|
|
|
|
|
PgpMain.signText(this, null, inputData, outputStream, appSettings.getKeyId(),
|
|
|
|
passphrase, appSettings.getHashAlgorithm(), Preferences.getPreferences(this)
|
|
|
|
.getForceV3Signatures());
|
|
|
|
|
|
|
|
outputStream.close();
|
|
|
|
|
|
|
|
byte[] outputBytes = ((ByteArrayOutputStream) outputStream).toByteArray();
|
|
|
|
|
|
|
|
// return over handler on client side
|
|
|
|
callback.onSuccess(outputBytes, null);
|
|
|
|
} catch (Exception e) {
|
|
|
|
Log.e(Constants.TAG, "KeychainService, Exception!", e);
|
|
|
|
|
|
|
|
try {
|
|
|
|
callback.onError(new CryptoError(0, e.getMessage()));
|
|
|
|
} catch (Exception t) {
|
|
|
|
Log.e(Constants.TAG, "Error returning exception to client", t);
|
|
|
|
}
|
|
|
|
}
|
2013-09-06 12:36:16 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
private synchronized void decryptAndVerifySafe(byte[] inputBytes, ICryptoCallback callback,
|
|
|
|
AppSettings appSettings) throws RemoteException {
|
2013-05-28 09:10:36 -04:00
|
|
|
try {
|
2013-09-09 16:38:09 -04:00
|
|
|
// TODO: this is not really needed
|
|
|
|
// checked if it is text with BEGIN and END tags
|
2013-09-09 06:59:53 -04:00
|
|
|
String message = new String(inputBytes);
|
|
|
|
Log.d(Constants.TAG, "in: " + message);
|
|
|
|
boolean signedOnly = false;
|
2013-09-09 16:38:09 -04:00
|
|
|
Matcher matcher = PgpMain.PGP_MESSAGE.matcher(message);
|
2013-09-09 06:59:53 -04:00
|
|
|
if (matcher.matches()) {
|
2013-09-09 16:38:09 -04:00
|
|
|
Log.d(Constants.TAG, "PGP_MESSAGE matched");
|
|
|
|
message = matcher.group(1);
|
|
|
|
// replace non breakable spaces
|
|
|
|
message = message.replaceAll("\\xa0", " ");
|
|
|
|
|
|
|
|
// overwrite inputBytes
|
|
|
|
inputBytes = message.getBytes();
|
|
|
|
} else {
|
|
|
|
matcher = PgpMain.PGP_SIGNED_MESSAGE.matcher(message);
|
|
|
|
if (matcher.matches()) {
|
|
|
|
signedOnly = true;
|
|
|
|
Log.d(Constants.TAG, "PGP_SIGNED_MESSAGE matched");
|
|
|
|
message = matcher.group(1);
|
|
|
|
// replace non breakable spaces
|
|
|
|
message = message.replaceAll("\\xa0", " ");
|
|
|
|
|
|
|
|
// overwrite inputBytes
|
|
|
|
inputBytes = message.getBytes();
|
|
|
|
} else {
|
|
|
|
Log.d(Constants.TAG, "Nothing matched! Binary?");
|
|
|
|
}
|
2013-09-09 06:59:53 -04:00
|
|
|
}
|
2013-09-09 16:38:09 -04:00
|
|
|
// END TODO
|
|
|
|
|
|
|
|
Log.d(Constants.TAG, "in: " + new String(inputBytes));
|
2013-05-28 09:10:36 -04:00
|
|
|
|
2013-09-06 07:48:27 -04:00
|
|
|
// TODO: This allows to decrypt messages with ALL secret keys, not only the one for the
|
|
|
|
// app, Fix this?
|
2013-09-09 06:59:53 -04:00
|
|
|
// long secretKeyId = PgpMain.getDecryptionKeyId(mContext, inputStream);
|
|
|
|
// if (secretKeyId == Id.key.none) {
|
|
|
|
// throw new PgpMain.PgpGeneralException(getString(R.string.error_noSecretKeyFound));
|
|
|
|
// }
|
2013-06-17 09:52:09 -04:00
|
|
|
|
2013-09-09 16:38:09 -04:00
|
|
|
String passphrase = null;
|
2013-09-09 06:59:53 -04:00
|
|
|
boolean assumeSymmetricEncryption = false;
|
2013-09-09 16:38:09 -04:00
|
|
|
if (!signedOnly) {
|
|
|
|
// BEGIN Get key
|
|
|
|
// TODO: this input stream is consumed after PgpMain.getDecryptionKeyId()... do it
|
|
|
|
// better!
|
|
|
|
InputStream inputStream2 = new ByteArrayInputStream(inputBytes);
|
|
|
|
|
|
|
|
// TODO: duplicates functions from DecryptActivity!
|
|
|
|
// TODO: we need activity to input symmetric passphrase
|
|
|
|
long secretKeyId;
|
|
|
|
try {
|
|
|
|
if (inputStream2.markSupported()) {
|
|
|
|
inputStream2.mark(200); // should probably set this to the max size of two
|
|
|
|
// pgpF
|
|
|
|
// objects, if it even needs to be anything other
|
|
|
|
// than
|
|
|
|
// 0.
|
|
|
|
}
|
|
|
|
secretKeyId = PgpMain.getDecryptionKeyId(this, inputStream2);
|
|
|
|
if (secretKeyId == Id.key.none) {
|
|
|
|
throw new PgpMain.PgpGeneralException(
|
|
|
|
getString(R.string.error_noSecretKeyFound));
|
|
|
|
}
|
|
|
|
assumeSymmetricEncryption = false;
|
|
|
|
} catch (PgpMain.NoAsymmetricEncryptionException e) {
|
|
|
|
if (inputStream2.markSupported()) {
|
|
|
|
inputStream2.reset();
|
|
|
|
}
|
|
|
|
secretKeyId = Id.key.symmetric;
|
|
|
|
if (!PgpMain.hasSymmetricEncryption(this, inputStream2)) {
|
|
|
|
throw new PgpMain.PgpGeneralException(
|
|
|
|
getString(R.string.error_noKnownEncryptionFound));
|
|
|
|
}
|
|
|
|
assumeSymmetricEncryption = true;
|
2013-09-09 06:59:53 -04:00
|
|
|
}
|
2013-09-09 16:38:09 -04:00
|
|
|
|
|
|
|
Log.d(Constants.TAG, "secretKeyId " + secretKeyId);
|
|
|
|
|
|
|
|
passphrase = getCachedPassphrase(secretKeyId);
|
|
|
|
if (passphrase == null) {
|
|
|
|
callback.onError(new CryptoError(CryptoError.ID_NO_OR_WRONG_PASSPHRASE,
|
|
|
|
"No or wrong passphrase!"));
|
|
|
|
return;
|
2013-09-09 06:59:53 -04:00
|
|
|
}
|
|
|
|
}
|
2013-05-28 09:10:36 -04:00
|
|
|
|
2013-09-09 16:38:09 -04:00
|
|
|
// build InputData and write into OutputStream
|
|
|
|
InputStream inputStream = new ByteArrayInputStream(inputBytes);
|
|
|
|
long inputLength = inputBytes.length;
|
|
|
|
InputData inputData = new InputData(inputStream, inputLength);
|
2013-05-28 09:10:36 -04:00
|
|
|
|
2013-09-09 16:38:09 -04:00
|
|
|
OutputStream outputStream = new ByteArrayOutputStream();
|
2013-05-28 09:10:36 -04:00
|
|
|
|
2013-09-09 06:59:53 -04:00
|
|
|
Bundle outputBundle;
|
|
|
|
if (signedOnly) {
|
|
|
|
// TODO: download missing keys from keyserver?
|
|
|
|
outputBundle = PgpMain.verifyText(this, null, inputData, outputStream, false);
|
|
|
|
} else {
|
|
|
|
// TODO: assume symmetric: callback to enter symmetric pass
|
|
|
|
outputBundle = PgpMain.decryptAndVerify(this, null, inputData, outputStream,
|
2013-09-09 16:38:09 -04:00
|
|
|
passphrase, assumeSymmetricEncryption);
|
2013-09-09 06:59:53 -04:00
|
|
|
}
|
2013-05-28 09:10:36 -04:00
|
|
|
|
|
|
|
outputStream.close();
|
|
|
|
|
|
|
|
byte[] outputBytes = ((ByteArrayOutputStream) outputStream).toByteArray();
|
|
|
|
|
|
|
|
// get signature informations from bundle
|
|
|
|
boolean signature = outputBundle.getBoolean(KeychainIntentService.RESULT_SIGNATURE);
|
|
|
|
long signatureKeyId = outputBundle
|
|
|
|
.getLong(KeychainIntentService.RESULT_SIGNATURE_KEY_ID);
|
|
|
|
String signatureUserId = outputBundle
|
|
|
|
.getString(KeychainIntentService.RESULT_SIGNATURE_USER_ID);
|
|
|
|
boolean signatureSuccess = outputBundle
|
|
|
|
.getBoolean(KeychainIntentService.RESULT_SIGNATURE_SUCCESS);
|
|
|
|
boolean signatureUnknown = outputBundle
|
|
|
|
.getBoolean(KeychainIntentService.RESULT_SIGNATURE_UNKNOWN);
|
|
|
|
|
2013-09-09 06:59:53 -04:00
|
|
|
CryptoSignatureResult sigResult = null;
|
|
|
|
if (signature) {
|
|
|
|
sigResult = new CryptoSignatureResult(signatureUserId, signature, signatureSuccess,
|
|
|
|
signatureUnknown);
|
|
|
|
}
|
2013-05-28 09:10:36 -04:00
|
|
|
|
2013-05-28 16:48:42 -04:00
|
|
|
// return over handler on client side
|
2013-07-01 17:19:53 -04:00
|
|
|
callback.onSuccess(outputBytes, sigResult);
|
2013-05-28 09:10:36 -04:00
|
|
|
} catch (Exception e) {
|
|
|
|
Log.e(Constants.TAG, "KeychainService, Exception!", e);
|
|
|
|
|
|
|
|
try {
|
2013-05-28 16:48:42 -04:00
|
|
|
callback.onError(new CryptoError(0, e.getMessage()));
|
2013-05-28 09:10:36 -04:00
|
|
|
} catch (Exception t) {
|
|
|
|
Log.e(Constants.TAG, "Error returning exception to client", t);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
private final ICryptoService.Stub mBinder = new ICryptoService.Stub() {
|
|
|
|
|
|
|
|
@Override
|
2013-06-17 13:51:41 -04:00
|
|
|
public void encrypt(final byte[] inputBytes, final String[] encryptionUserIds,
|
2013-09-09 06:59:53 -04:00
|
|
|
final boolean asciiArmor, final ICryptoCallback callback) throws RemoteException {
|
2013-05-28 09:10:36 -04:00
|
|
|
|
2013-09-06 07:48:27 -04:00
|
|
|
final AppSettings settings = getAppSettings();
|
|
|
|
|
2013-06-17 13:51:41 -04:00
|
|
|
Runnable r = new Runnable() {
|
|
|
|
|
|
|
|
@Override
|
|
|
|
public void run() {
|
|
|
|
try {
|
2013-09-09 06:59:53 -04:00
|
|
|
encryptAndSignSafe(inputBytes, encryptionUserIds, asciiArmor, callback,
|
|
|
|
settings, false);
|
2013-06-17 13:51:41 -04:00
|
|
|
} catch (RemoteException e) {
|
|
|
|
Log.e(Constants.TAG, "CryptoService", e);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
checkAndEnqueue(r);
|
2013-05-28 09:10:36 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
@Override
|
2013-09-06 12:36:16 -04:00
|
|
|
public void encryptAndSign(final byte[] inputBytes, final String[] encryptionUserIds,
|
2013-09-09 06:59:53 -04:00
|
|
|
final boolean asciiArmor, final ICryptoCallback callback) throws RemoteException {
|
2013-09-06 12:36:16 -04:00
|
|
|
|
|
|
|
final AppSettings settings = getAppSettings();
|
|
|
|
|
|
|
|
Runnable r = new Runnable() {
|
|
|
|
|
|
|
|
@Override
|
|
|
|
public void run() {
|
|
|
|
try {
|
2013-09-09 06:59:53 -04:00
|
|
|
encryptAndSignSafe(inputBytes, encryptionUserIds, asciiArmor, callback,
|
|
|
|
settings, true);
|
2013-09-06 12:36:16 -04:00
|
|
|
} catch (RemoteException e) {
|
|
|
|
Log.e(Constants.TAG, "CryptoService", e);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
checkAndEnqueue(r);
|
2013-05-28 09:10:36 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
@Override
|
2013-09-09 06:59:53 -04:00
|
|
|
public void sign(final byte[] inputBytes, boolean asciiArmor, final ICryptoCallback callback)
|
2013-05-28 09:10:36 -04:00
|
|
|
throws RemoteException {
|
2013-09-06 12:54:55 -04:00
|
|
|
final AppSettings settings = getAppSettings();
|
|
|
|
|
|
|
|
Runnable r = new Runnable() {
|
|
|
|
|
|
|
|
@Override
|
|
|
|
public void run() {
|
|
|
|
try {
|
|
|
|
signSafe(inputBytes, callback, settings);
|
|
|
|
} catch (RemoteException e) {
|
|
|
|
Log.e(Constants.TAG, "CryptoService", e);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
checkAndEnqueue(r);
|
2013-05-28 09:10:36 -04:00
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
@Override
|
2013-06-17 09:52:09 -04:00
|
|
|
public void decryptAndVerify(final byte[] inputBytes, final ICryptoCallback callback)
|
2013-05-28 09:10:36 -04:00
|
|
|
throws RemoteException {
|
2013-06-17 09:52:09 -04:00
|
|
|
|
2013-09-06 12:36:16 -04:00
|
|
|
final AppSettings settings = getAppSettings();
|
|
|
|
|
2013-06-17 09:52:09 -04:00
|
|
|
Runnable r = new Runnable() {
|
|
|
|
|
|
|
|
@Override
|
|
|
|
public void run() {
|
|
|
|
try {
|
2013-09-06 12:36:16 -04:00
|
|
|
decryptAndVerifySafe(inputBytes, callback, settings);
|
2013-06-17 09:52:09 -04:00
|
|
|
} catch (RemoteException e) {
|
|
|
|
Log.e(Constants.TAG, "CryptoService", e);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
checkAndEnqueue(r);
|
2013-05-28 09:10:36 -04:00
|
|
|
}
|
|
|
|
|
2013-06-17 09:52:09 -04:00
|
|
|
};
|
|
|
|
|
|
|
|
private void checkAndEnqueue(Runnable r) {
|
2013-09-06 05:55:08 -04:00
|
|
|
if (isCallerAllowed(false)) {
|
2013-06-17 09:52:09 -04:00
|
|
|
mThreadPool.execute(r);
|
|
|
|
|
|
|
|
Log.d(Constants.TAG, "Enqueued runnable…");
|
|
|
|
} else {
|
2013-06-17 10:59:27 -04:00
|
|
|
String[] callingPackages = getPackageManager()
|
|
|
|
.getPackagesForUid(Binder.getCallingUid());
|
|
|
|
|
|
|
|
Log.e(Constants.TAG, "Not allowed to use service! Starting activity for registration!");
|
|
|
|
Bundle extras = new Bundle();
|
|
|
|
// TODO: currently simply uses first entry
|
2013-09-06 05:55:08 -04:00
|
|
|
extras.putString(CryptoServiceActivity.EXTRA_PACKAGE_NAME, callingPackages[0]);
|
2013-06-17 10:59:27 -04:00
|
|
|
|
2013-09-08 16:52:38 -04:00
|
|
|
RegisterActivityCallback callback = new RegisterActivityCallback();
|
|
|
|
Messenger messenger = new Messenger(new Handler(getMainLooper(), callback));
|
|
|
|
|
|
|
|
pauseQueueAndStartServiceActivity(CryptoServiceActivity.ACTION_REGISTER, messenger,
|
|
|
|
extras);
|
|
|
|
|
|
|
|
if (callback.isAllowed()) {
|
|
|
|
mThreadPool.execute(r);
|
2013-09-09 13:38:13 -04:00
|
|
|
Log.d(Constants.TAG, "Enqueued runnable…");
|
2013-09-08 16:52:38 -04:00
|
|
|
} else {
|
|
|
|
Log.d(Constants.TAG, "User disallowed app!");
|
|
|
|
}
|
2013-06-17 09:52:09 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-09-09 13:38:13 -04:00
|
|
|
public class RegisterActivityCallback extends MyBaseCallback {
|
2013-09-08 16:52:38 -04:00
|
|
|
public static final String PACKAGE_NAME = "package_name";
|
|
|
|
|
2013-09-08 17:08:30 -04:00
|
|
|
private boolean allowed = false;
|
2013-09-08 16:52:38 -04:00
|
|
|
private String packageName;
|
|
|
|
|
|
|
|
public boolean isAllowed() {
|
|
|
|
return allowed;
|
|
|
|
}
|
|
|
|
|
|
|
|
public String getPackageName() {
|
|
|
|
return packageName;
|
|
|
|
}
|
|
|
|
|
|
|
|
@Override
|
|
|
|
public boolean handleMessage(Message msg) {
|
2013-09-09 13:38:13 -04:00
|
|
|
if (msg.arg1 == OKAY) {
|
2013-09-08 16:52:38 -04:00
|
|
|
allowed = true;
|
|
|
|
packageName = msg.getData().getString(PACKAGE_NAME);
|
|
|
|
|
|
|
|
// resume threads
|
|
|
|
if (isPackageAllowed(packageName, false)) {
|
|
|
|
synchronized (userInputLock) {
|
|
|
|
userInputLock.notifyAll();
|
|
|
|
}
|
|
|
|
mThreadPool.resume();
|
|
|
|
} else {
|
|
|
|
// Should not happen!
|
|
|
|
Log.e(Constants.TAG, "Should not happen! Emergency shutdown!");
|
|
|
|
mThreadPool.shutdownNow();
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
allowed = false;
|
|
|
|
|
|
|
|
synchronized (userInputLock) {
|
|
|
|
userInputLock.notifyAll();
|
|
|
|
}
|
|
|
|
mThreadPool.resume();
|
|
|
|
}
|
2013-09-09 13:38:13 -04:00
|
|
|
return true;
|
2013-09-08 16:52:38 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
}
|
|
|
|
|
2013-06-17 09:52:09 -04:00
|
|
|
/**
|
|
|
|
* Checks if process that binds to this service (i.e. the package name corresponding to the
|
|
|
|
* process) is in the list of allowed package names.
|
|
|
|
*
|
2013-09-06 05:55:08 -04:00
|
|
|
* @param allowOnlySelf
|
|
|
|
* allow only Keychain app itself
|
2013-06-17 09:52:09 -04:00
|
|
|
* @return true if process is allowed to use this service
|
|
|
|
*/
|
2013-09-06 05:55:08 -04:00
|
|
|
private boolean isCallerAllowed(boolean allowOnlySelf) {
|
2013-06-17 09:52:09 -04:00
|
|
|
String[] callingPackages = getPackageManager().getPackagesForUid(Binder.getCallingUid());
|
|
|
|
|
|
|
|
// is calling package allowed to use this service?
|
|
|
|
for (int i = 0; i < callingPackages.length; i++) {
|
|
|
|
String currentPkg = callingPackages[i];
|
|
|
|
|
2013-09-06 05:55:08 -04:00
|
|
|
if (isPackageAllowed(currentPkg, allowOnlySelf)) {
|
2013-06-17 09:52:09 -04:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
}
|
2013-06-17 10:59:27 -04:00
|
|
|
|
2013-06-17 09:52:09 -04:00
|
|
|
Log.d(Constants.TAG, "Caller is NOT allowed!");
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2013-09-06 07:48:27 -04:00
|
|
|
private AppSettings getAppSettings() {
|
|
|
|
String[] callingPackages = getPackageManager().getPackagesForUid(Binder.getCallingUid());
|
|
|
|
|
|
|
|
// is calling package allowed to use this service?
|
|
|
|
for (int i = 0; i < callingPackages.length; i++) {
|
|
|
|
String currentPkg = callingPackages[i];
|
|
|
|
|
|
|
|
Uri uri = KeychainContract.ApiApps.buildByPackageNameUri(currentPkg);
|
|
|
|
|
|
|
|
AppSettings settings = ProviderHelper.getApiAppSettings(this, uri);
|
|
|
|
|
|
|
|
return settings;
|
|
|
|
}
|
|
|
|
|
|
|
|
return null;
|
|
|
|
}
|
|
|
|
|
2013-09-06 05:55:08 -04:00
|
|
|
/**
|
|
|
|
* Checks if packageName is a registered app for the API.
|
|
|
|
*
|
|
|
|
* @param packageName
|
|
|
|
* @param allowOnlySelf
|
|
|
|
* allow only Keychain app itself
|
|
|
|
* @return
|
|
|
|
*/
|
|
|
|
private boolean isPackageAllowed(String packageName, boolean allowOnlySelf) {
|
2013-06-17 10:59:27 -04:00
|
|
|
Log.d(Constants.TAG, "packageName: " + packageName);
|
|
|
|
|
2013-09-06 05:55:08 -04:00
|
|
|
ArrayList<String> allowedPkgs = ProviderHelper.getRegisteredApiApps(mContext);
|
2013-06-17 13:51:41 -04:00
|
|
|
Log.d(Constants.TAG, "allowed: " + allowedPkgs);
|
|
|
|
|
2013-06-17 10:59:27 -04:00
|
|
|
// check if package is allowed to use our service
|
2013-09-06 05:55:08 -04:00
|
|
|
if (allowedPkgs.contains(packageName) && (!allowOnlySelf)) {
|
2013-06-17 10:59:27 -04:00
|
|
|
Log.d(Constants.TAG, "Package is allowed! packageName: " + packageName);
|
|
|
|
|
|
|
|
return true;
|
|
|
|
} else if (Constants.PACKAGE_NAME.equals(packageName)) {
|
|
|
|
Log.d(Constants.TAG, "Package is OpenPGP Keychain! -> allowed!");
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2013-09-08 16:52:38 -04:00
|
|
|
private void pauseQueueAndStartServiceActivity(String action, Messenger messenger, Bundle extras) {
|
|
|
|
synchronized (userInputLock) {
|
|
|
|
mThreadPool.pause();
|
|
|
|
|
|
|
|
Log.d(Constants.TAG, "starting activity...");
|
|
|
|
Intent intent = new Intent(getBaseContext(), CryptoServiceActivity.class);
|
|
|
|
intent.addFlags(Intent.FLAG_ACTIVITY_NEW_TASK);
|
|
|
|
intent.setAction(action);
|
2013-06-17 09:52:09 -04:00
|
|
|
|
2013-09-08 16:52:38 -04:00
|
|
|
extras.putParcelable(CryptoServiceActivity.EXTRA_MESSENGER, messenger);
|
2013-06-17 09:52:09 -04:00
|
|
|
intent.putExtras(extras);
|
2013-05-28 09:10:36 -04:00
|
|
|
|
2013-09-09 09:19:16 -04:00
|
|
|
startActivity(intent);
|
2013-09-08 16:52:38 -04:00
|
|
|
|
|
|
|
// lock current thread for user input
|
2013-09-08 13:24:47 -04:00
|
|
|
try {
|
|
|
|
userInputLock.wait();
|
|
|
|
} catch (InterruptedException e) {
|
|
|
|
Log.e(Constants.TAG, "CryptoService", e);
|
|
|
|
}
|
|
|
|
}
|
2013-09-08 16:52:38 -04:00
|
|
|
|
2013-09-08 13:24:47 -04:00
|
|
|
}
|
2013-05-28 09:10:36 -04:00
|
|
|
}
|