blob: 6b09d78e4fffbeb34099bc6d1fcb9284ad43cad7 [file] [log] [blame]
/*
* Copyright (C) 2011 The Android Open Source Project
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package com.android.keychain;
import android.annotation.NonNull;
import android.annotation.Nullable;
import android.app.ActivityManager;
import android.app.AlertDialog;
import android.app.PendingIntent;
import android.app.admin.DevicePolicyEventLogger;
import android.app.admin.DevicePolicyManager;
import android.app.admin.IDevicePolicyManager;
import android.content.Context;
import android.content.DialogInterface;
import android.content.Intent;
import android.content.pm.PackageManager;
import android.content.pm.UserInfo;
import android.content.res.Resources;
import android.net.Uri;
import android.os.AsyncTask;
import android.os.Bundle;
import android.os.Handler;
import android.os.IBinder;
import android.os.Looper;
import android.os.RemoteException;
import android.os.ServiceManager;
import android.os.UserManager;
import android.security.IKeyChainAliasCallback;
import android.security.KeyChain;
import android.stats.devicepolicy.DevicePolicyEnums;
import android.util.Log;
import android.view.LayoutInflater;
import android.view.View;
import android.view.ViewGroup;
import android.widget.AdapterView;
import android.widget.BaseAdapter;
import android.widget.ListView;
import android.widget.RadioButton;
import android.widget.TextView;
import androidx.appcompat.app.AppCompatActivity;
import com.android.internal.annotations.VisibleForTesting;
import com.android.keychain.internal.KeyInfoProvider;
import com.google.android.material.snackbar.Snackbar;
import org.bouncycastle.asn1.x509.X509Name;
import java.io.IOException;
import java.security.KeyStore;
import java.security.KeyStoreException;
import java.security.NoSuchAlgorithmException;
import java.security.cert.Certificate;
import java.security.cert.CertificateException;
import java.security.cert.X509Certificate;
import java.util.ArrayList;
import java.util.Arrays;
import java.util.Collections;
import java.util.Enumeration;
import java.util.List;
import java.util.concurrent.ExecutionException;
import java.util.concurrent.ExecutorService;
import java.util.concurrent.Executors;
import java.util.stream.Collectors;
import javax.security.auth.x500.X500Principal;
import static android.view.WindowManager.LayoutParams.SYSTEM_FLAG_HIDE_NON_SYSTEM_OVERLAY_WINDOWS;
public class KeyChainActivity extends AppCompatActivity {
private static final String TAG = "KeyChain";
// The amount of time to delay showing a snackbar. If the alias is received before the snackbar
// is shown, the activity will finish. If the certificate selection dialog is shown before the
// snackbar, no snackbar will be shown.
private static final long SNACKBAR_DELAY_TIME = 2000;
// The minimum amount of time to display a snackbar while loading certificates.
private static final long SNACKBAR_MIN_TIME = 1000;
private int mSenderUid;
private String mSenderPackageName;
// beware that some of these KeyStore operations such as saw and
// get do file I/O in the remote keystore process and while they
// do not cause StrictMode violations, they logically should not
// be done on the UI thread.
private final KeyStore mKeyStore = getKeyStore();
private static KeyStore getKeyStore() {
try {
final KeyStore keystore = KeyStore.getInstance("AndroidKeyStore");
keystore.load(null);
return keystore;
} catch (KeyStoreException | IOException | NoSuchAlgorithmException
| CertificateException e) {
Log.e(TAG, "Error opening AndroidKeyStore.", e);
throw new RuntimeException("Error opening AndroidKeyStore.", e);
}
}
// A snackbar to show the user while the KeyChain Activity is loading the certificates.
private Snackbar mSnackbar;
// A remote service may call {@link android.security.KeyChain#choosePrivateKeyAlias} multiple
// times, which will result in multiple intents being sent to KeyChainActivity. The time of the
// first received intent is recorded in order to ensure the snackbar is displayed for a
// minimum amount of time after receiving the first intent.
private long mFirstIntentReceivedTimeMillis = 0L;
private ExecutorService executor = Executors.newSingleThreadExecutor();
private Handler handler = new Handler(Looper.getMainLooper());
private final Runnable mFinishActivity = KeyChainActivity.this::finish;
private final Runnable mShowSnackBar = this::showSnackBar;
@Override
protected void onCreate(Bundle savedState) {
super.onCreate(savedState);
setContentView(R.layout.keychain_activity);
getWindow().addSystemFlags(SYSTEM_FLAG_HIDE_NON_SYSTEM_OVERLAY_WINDOWS);
}
/**
* Returns the package name which the activity with {@code activityToken} is launched from.
*/
@Nullable
private static String getCallingAppPackageName(IBinder activityToken) {
String pkg = null;
try {
pkg = ActivityManager.getService().getLaunchedFromPackage(activityToken);
} catch (RemoteException e) {
Log.v(TAG, "Could not talk to activity manager.", e);
}
return pkg;
}
@Override
public void onResume() {
super.onResume();
final IBinder activityToken = getActivityToken();
mSenderPackageName = getCallingAppPackageName(activityToken);
if (mSenderPackageName == null) {
//if no sender, bail, we need to identify the app to the user securely.
finish(null);
return;
}
try {
mSenderUid = getPackageManager().getPackageInfo(
mSenderPackageName, 0).applicationInfo.uid;
} catch (PackageManager.NameNotFoundException e) {
// if unable to find the sender package info bail,
// we need to identify the app to the user securely.
finish(null);
return;
}
chooseCertificate();
}
@Override
protected void onNewIntent(Intent intent) {
super.onNewIntent(intent);
handler.removeCallbacks(mFinishActivity);
}
private void showSnackBar() {
mFirstIntentReceivedTimeMillis = System.currentTimeMillis();
mSnackbar = Snackbar.make(findViewById(R.id.container),
String.format(getResources().getString(R.string.loading_certs_message),
getApplicationLabel()), Snackbar.LENGTH_INDEFINITE);
mSnackbar.show();
}
private void finishSnackBar() {
if (mSnackbar != null) {
mSnackbar.dismiss();
mSnackbar = null;
} else {
handler.removeCallbacks(mShowSnackBar);
}
}
private void chooseCertificate() {
// Start loading the set of certs to choose from now- if device policy doesn't return an
// alias, having aliases loading already will save some time waiting for UI to start.
KeyInfoProvider keyInfoProvider = new KeyInfoProvider() {
public boolean isUserSelectable(String alias) {
try (KeyChain.KeyChainConnection connection =
KeyChain.bind(KeyChainActivity.this)) {
return connection.getService().isUserSelectable(alias);
}
catch (InterruptedException ignored) {
Log.e(TAG, "interrupted while checking if key is user-selectable", ignored);
Thread.currentThread().interrupt();
return false;
} catch (Exception ignored) {
Log.e(TAG, "error while checking if key is user-selectable", ignored);
return false;
}
}
};
Log.i(TAG, String.format("Requested by app uid %d to provide a private key alias",
mSenderUid));
String[] keyTypes = getIntent().getStringArrayExtra(KeyChain.EXTRA_KEY_TYPES);
if (keyTypes == null) {
keyTypes = new String[]{};
}
Log.i(TAG, String.format("Key types specified: %s", Arrays.toString(keyTypes)));
ArrayList<byte[]> issuers = (ArrayList<byte[]>) getIntent().getSerializableExtra(
KeyChain.EXTRA_ISSUERS);
if (issuers == null) {
issuers = new ArrayList<byte[]>();
} else {
Log.i(TAG, "Issuers specified, will be listed later.");
}
final AliasLoader loader = new AliasLoader(mKeyStore, this, keyInfoProvider,
new CertificateParametersFilter(mKeyStore, keyTypes, issuers));
loader.execute();
final IKeyChainAliasCallback.Stub callback = new IKeyChainAliasCallback.Stub() {
@Override public void alias(String alias) {
Log.i(TAG, String.format("Alias provided by device policy client: %s", alias));
// Use policy-suggested alias if provided or abort further actions if alias is
// KeyChain.KEY_ALIAS_SELECTION_DENIED
if (alias != null) {
finishWithAliasFromPolicy(alias);
return;
}
// No suggested alias - instead finish loading and show UI to pick one
final CertificateAdapter certAdapter;
try {
certAdapter = loader.get();
} catch (InterruptedException | ExecutionException e) {
Log.e(TAG, "Loading certificate aliases interrupted", e);
finish(null);
return;
}
/*
* If there are no keys for the user to choose from, do not display
* the dialog. This is in line with what other operating systems do.
*/
if (!certAdapter.hasKeysToChoose()) {
Log.i(TAG, "No keys to choose from");
finish(null);
return;
}
runOnUiThread(() -> {
finishSnackBar();
displayCertChooserDialog(certAdapter);
});
}
};
// Show a snackbar to the user to indicate long-running task.
if (mSnackbar == null) {
handler.postDelayed(mShowSnackBar, SNACKBAR_DELAY_TIME);
}
Uri uri = getIntent().getParcelableExtra(KeyChain.EXTRA_URI);
String alias = getIntent().getStringExtra(KeyChain.EXTRA_ALIAS);
if (isManagedDevice()) {
// Give a profile or device owner the chance to intercept the request, if a private key
// access listener is registered with the DevicePolicyManagerService.
IDevicePolicyManager devicePolicyManager = IDevicePolicyManager.Stub.asInterface(
ServiceManager.getService(Context.DEVICE_POLICY_SERVICE));
try {
devicePolicyManager.choosePrivateKeyAlias(mSenderUid, uri, alias, callback);
} catch (RemoteException e) {
Log.e(TAG, "Unable to request alias from DevicePolicyManager", e);
// Proceed without a suggested alias.
try {
callback.alias(null);
} catch (RemoteException shouldNeverHappen) {
finish(null);
}
}
} else {
// If the device is unmanaged, check whether the credential management app has provided
// an alias for the given uri and calling package name.
getAliasFromCredentialManagementApp(uri, callback);
}
}
private boolean isManagedDevice() {
DevicePolicyManager devicePolicyManager = getSystemService(DevicePolicyManager.class);
return devicePolicyManager.getDeviceOwner() != null
|| devicePolicyManager.getProfileOwner() != null
|| hasManagedProfile();
}
private boolean hasManagedProfile() {
UserManager userManager = getSystemService(UserManager.class);
for (final UserInfo userInfo : userManager.getProfiles(getUserId())) {
if (userInfo.isManagedProfile()) {
return true;
}
}
return false;
}
private void getAliasFromCredentialManagementApp(Uri uri,
IKeyChainAliasCallback.Stub callback) {
executor.execute(() -> {
try (KeyChain.KeyChainConnection keyChainConnection = KeyChain.bind(this)) {
String chosenAlias = null;
if (keyChainConnection.getService().hasCredentialManagementApp()) {
Log.i(TAG, "There is a credential management app on the device. "
+ "Looking for an alias in the policy.");
chosenAlias = keyChainConnection.getService()
.getPredefinedAliasForPackageAndUri(mSenderPackageName, uri);
if (chosenAlias != null) {
keyChainConnection.getService().setGrant(mSenderUid, chosenAlias, true);
Log.w(TAG, String.format("Selected alias %s from the "
+ "credential management app's policy", chosenAlias));
DevicePolicyEventLogger
.createEvent(DevicePolicyEnums
.CREDENTIAL_MANAGEMENT_APP_CREDENTIAL_FOUND_IN_POLICY)
.write();
} else {
Log.i(TAG, "No alias provided from the credential management app");
}
}
callback.alias(chosenAlias);
} catch (InterruptedException | RemoteException e) {
Log.e(TAG, "Unable to request find predefined alias from credential "
+ "management app policy");
// Proceed without a suggested alias.
try {
callback.alias(null);
} catch (RemoteException shouldNeverHappen) {
finish(null);
} finally {
DevicePolicyEventLogger
.createEvent(DevicePolicyEnums
.CREDENTIAL_MANAGEMENT_APP_POLICY_LOOKUP_FAILED)
.write();
}
}
});
}
@VisibleForTesting
public static class CertificateParametersFilter {
private final KeyStore mKeyStore;
private final List<String> mKeyTypes;
private final List<X500Principal> mIssuers;
public CertificateParametersFilter(KeyStore keyStore,
@NonNull String[] keyTypes, @NonNull ArrayList<byte[]> issuers) {
mKeyStore = keyStore;
mKeyTypes = Arrays.asList(keyTypes);
mIssuers = new ArrayList<X500Principal>();
for (byte[] issuer : issuers) {
try {
X500Principal issuerPrincipal = new X500Principal(issuer);
Log.i(TAG, "Added issuer: " + issuerPrincipal.getName());
mIssuers.add(new X500Principal(issuer));
} catch (IllegalArgumentException e) {
Log.w(TAG, "Skipping invalid issuer", e);
}
}
}
public boolean shouldPresentCertificate(String alias) {
X509Certificate cert = loadCertificate(mKeyStore, alias);
// If there's no certificate associated with the alias, skip.
if (cert == null) {
Log.i(TAG, String.format("No certificate associated with alias %s", alias));
return false;
}
List<X509Certificate> certChain = new ArrayList(loadCertificateChain(mKeyStore, alias));
Log.i(TAG, String.format("Inspecting certificate %s aliased with %s, chain length %d",
cert.getSubjectDN().getName(), alias, certChain.size()));
// If the caller has provided a list of key types to restrict the certificates
// offered for selection, skip this alias if the key algorithm is not in that
// list.
// Note that the end entity (leaf) certificate's public key has to be compatible
// with the specified key algorithm, not any one of the chain (see RFC5246
// section 7.4.6)
String keyAlgorithm = cert.getPublicKey().getAlgorithm();
Log.i(TAG, String.format("Certificate key algorithm: %s", keyAlgorithm));
if (!mKeyTypes.isEmpty() && !mKeyTypes.contains(keyAlgorithm)) {
return false;
}
// If the caller has provided a list of issuers to restrict the certificates
// offered for selection, skip this alias if none of the issuers in the client
// certificate chain is in that list.
List<X500Principal> chainIssuers = new ArrayList();
chainIssuers.add(cert.getIssuerX500Principal());
for (X509Certificate intermediate : certChain) {
X500Principal subject = intermediate.getSubjectX500Principal();
Log.i(TAG, String.format("Subject of intermediate in client certificate chain: %s",
subject.getName()));
// Collect the subjects of all the intermediates, as the RFC specifies that
// "one of the certificates in the certificate chain SHOULD be issued by one of
// the listed CAs."
chainIssuers.add(subject);
}
if (!mIssuers.isEmpty()) {
for (X500Principal issuer : chainIssuers) {
if (mIssuers.contains(issuer)) {
Log.i(TAG, String.format("Requested issuer found: %s", issuer));
return true;
}
}
return false;
}
return true;
}
}
@VisibleForTesting
static class AliasLoader extends AsyncTask<Void, Void, CertificateAdapter> {
private final KeyStore mKeyStore;
private final Context mContext;
private final KeyInfoProvider mInfoProvider;
private final CertificateParametersFilter mCertificateFilter;
public AliasLoader(KeyStore keyStore, Context context,
KeyInfoProvider infoProvider, CertificateParametersFilter certificateFilter) {
mKeyStore = keyStore;
mContext = context;
mInfoProvider = infoProvider;
mCertificateFilter = certificateFilter;
}
@Override protected CertificateAdapter doInBackground(Void... params) {
final List<String> rawAliasList = new ArrayList<>();
try {
final Enumeration<String> aliases = mKeyStore.aliases();
while (aliases.hasMoreElements()) {
final String alias = aliases.nextElement();
if (mKeyStore.isKeyEntry(alias)) {
rawAliasList.add(alias);
}
}
} catch (KeyStoreException e) {
Log.e(TAG, "Error while loading entries from keystore. "
+ "List may be empty or incomplete.");
}
return new CertificateAdapter(mKeyStore, mContext,
rawAliasList.stream().filter(mInfoProvider::isUserSelectable)
.filter(mCertificateFilter::shouldPresentCertificate)
.sorted().collect(Collectors.toList()));
}
}
private void displayCertChooserDialog(final CertificateAdapter adapter) {
if (adapter.mAliases.isEmpty()) {
Log.w(TAG, "Should not be asked to display the cert chooser without aliases.");
finish(null);
return;
}
AlertDialog.Builder builder = new AlertDialog.Builder(this);
builder.setNegativeButton(R.string.deny_button, new DialogInterface.OnClickListener() {
@Override public void onClick(DialogInterface dialog, int id) {
dialog.cancel(); // will cause OnDismissListener to be called
}
});
int selectedItem = -1;
Resources res = getResources();
String alias = getIntent().getStringExtra(KeyChain.EXTRA_ALIAS);
if (alias != null) {
// if alias was requested, set it if found
int adapterPosition = adapter.mAliases.indexOf(alias);
if (adapterPosition != -1) {
// increase by 1 to account for item 0 being the header.
selectedItem = adapterPosition + 1;
}
} else if (adapter.mAliases.size() == 1) {
// if only one choice, preselect it
selectedItem = 1;
}
builder.setPositiveButton(R.string.allow_button, new DialogInterface.OnClickListener() {
@Override public void onClick(DialogInterface dialog, int id) {
if (dialog instanceof AlertDialog) {
ListView lv = ((AlertDialog) dialog).getListView();
int listViewPosition = lv.getCheckedItemPosition();
int adapterPosition = listViewPosition-1;
String alias = ((adapterPosition >= 0)
? adapter.getItem(adapterPosition)
: null);
Log.i(TAG, String.format("User chose: %s", alias));
finish(alias);
} else {
Log.wtf(TAG, "Expected AlertDialog, got " + dialog, new Exception());
finish(null);
}
}
});
builder.setTitle(res.getString(R.string.title_select_cert));
builder.setSingleChoiceItems(adapter, selectedItem, null);
final AlertDialog dialog = builder.create();
// Show text above the list to explain what the certificate will be used for.
TextView contextView = (TextView) View.inflate(
this, R.layout.cert_chooser_header, null);
final ListView lv = dialog.getListView();
lv.addHeaderView(contextView, null, false);
lv.setOnItemClickListener(new AdapterView.OnItemClickListener() {
public void onItemClick(AdapterView<?> parent, View view, int position, long id) {
if (position == 0) {
// Header. Just text; ignore clicks.
return;
} else {
dialog.getButton(DialogInterface.BUTTON_POSITIVE).setEnabled(true);
lv.setItemChecked(position, true);
adapter.notifyDataSetChanged();
}
}
});
String contextMessage = String.format(res.getString(R.string.requesting_application),
getApplicationLabel());
Uri uri = getIntent().getParcelableExtra(KeyChain.EXTRA_URI);
if (uri != null) {
String hostMessage = String.format(res.getString(R.string.requesting_server),
Uri.encode(uri.getAuthority(), "$,;:@&=+"));
if (contextMessage == null) {
contextMessage = hostMessage;
} else {
contextMessage += " " + hostMessage;
}
}
contextView.setText(contextMessage);
if (selectedItem == -1) {
dialog.setOnShowListener(new DialogInterface.OnShowListener() {
@Override
public void onShow(DialogInterface dialogInterface) {
dialog.getButton(DialogInterface.BUTTON_POSITIVE).setEnabled(false);
}
});
}
dialog.setOnCancelListener(new DialogInterface.OnCancelListener() {
@Override public void onCancel(DialogInterface dialog) {
finish(null);
}
});
dialog.create();
// Prevents screen overlay attack.
dialog.getButton(DialogInterface.BUTTON_POSITIVE).setFilterTouchesWhenObscured(true);
dialog.show();
}
private String getApplicationLabel() {
PackageManager pm = getPackageManager();
try {
return pm.getApplicationLabel(pm.getApplicationInfo(mSenderPackageName, 0)).toString();
} catch (PackageManager.NameNotFoundException e) {
return mSenderPackageName;
}
}
@VisibleForTesting
static class CertificateAdapter extends BaseAdapter {
private final List<String> mAliases;
private final List<String> mSubjects = new ArrayList<String>();
private final KeyStore mKeyStore;
private final Context mContext;
private CertificateAdapter(KeyStore keyStore, Context context, List<String> aliases) {
mAliases = aliases;
mSubjects.addAll(Collections.nCopies(aliases.size(), (String) null));
mKeyStore = keyStore;
mContext = context;
}
@Override public int getCount() {
return mAliases.size();
}
@Override public String getItem(int adapterPosition) {
return mAliases.get(adapterPosition);
}
@Override public long getItemId(int adapterPosition) {
return adapterPosition;
}
@Override public View getView(final int adapterPosition, View view, ViewGroup parent) {
ViewHolder holder;
if (view == null) {
LayoutInflater inflater = LayoutInflater.from(mContext);
view = inflater.inflate(R.layout.cert_item, parent, false);
holder = new ViewHolder();
holder.mAliasTextView = (TextView) view.findViewById(R.id.cert_item_alias);
holder.mSubjectTextView = (TextView) view.findViewById(R.id.cert_item_subject);
holder.mRadioButton = (RadioButton) view.findViewById(R.id.cert_item_selected);
view.setTag(holder);
} else {
holder = (ViewHolder) view.getTag();
}
String alias = mAliases.get(adapterPosition);
holder.mAliasTextView.setText(alias);
String subject = mSubjects.get(adapterPosition);
if (subject == null) {
new CertLoader(adapterPosition, holder.mSubjectTextView).execute();
} else {
holder.mSubjectTextView.setText(subject);
}
ListView lv = (ListView)parent;
int listViewCheckedItemPosition = lv.getCheckedItemPosition();
int adapterCheckedItemPosition = listViewCheckedItemPosition-1;
holder.mRadioButton.setChecked(adapterPosition == adapterCheckedItemPosition);
return view;
}
/**
* Returns true if there are keys to choose from.
*/
public boolean hasKeysToChoose() {
return !mAliases.isEmpty();
}
private class CertLoader extends AsyncTask<Void, Void, String> {
private final int mAdapterPosition;
private final TextView mSubjectView;
private CertLoader(int adapterPosition, TextView subjectView) {
mAdapterPosition = adapterPosition;
mSubjectView = subjectView;
}
@Override protected String doInBackground(Void... params) {
String alias = mAliases.get(mAdapterPosition);
X509Certificate cert = loadCertificate(mKeyStore, alias);
if (cert == null) {
return null;
}
// bouncycastle can handle the emailAddress OID of 1.2.840.113549.1.9.1
X500Principal subjectPrincipal = cert.getSubjectX500Principal();
X509Name subjectName = X509Name.getInstance(subjectPrincipal.getEncoded());
return subjectName.toString(true, X509Name.DefaultSymbols);
}
@Override protected void onPostExecute(String subjectString) {
mSubjects.set(mAdapterPosition, subjectString);
mSubjectView.setText(subjectString);
}
}
}
private static class ViewHolder {
TextView mAliasTextView;
TextView mSubjectTextView;
RadioButton mRadioButton;
}
private void finish(String alias) {
finish(alias, false);
}
private void finishWithAliasFromPolicy(String alias) {
finish(alias, true);
}
private void finish(String alias, boolean isAliasFromPolicy) {
if (alias == null || alias.equals(KeyChain.KEY_ALIAS_SELECTION_DENIED)) {
alias = null;
setResult(RESULT_CANCELED);
} else {
Intent result = new Intent();
result.putExtra(Intent.EXTRA_TEXT, alias);
setResult(RESULT_OK, result);
}
IKeyChainAliasCallback keyChainAliasResponse
= IKeyChainAliasCallback.Stub.asInterface(
getIntent().getIBinderExtra(KeyChain.EXTRA_RESPONSE));
if (keyChainAliasResponse != null) {
new ResponseSender(keyChainAliasResponse, alias, isAliasFromPolicy).execute();
return;
}
finishActivity();
}
private class ResponseSender extends AsyncTask<Void, Void, Void> {
private IKeyChainAliasCallback mKeyChainAliasResponse;
private String mAlias;
private boolean mFromPolicy;
private ResponseSender(IKeyChainAliasCallback keyChainAliasResponse, String alias,
boolean isFromPolicy) {
mKeyChainAliasResponse = keyChainAliasResponse;
mAlias = alias;
mFromPolicy = isFromPolicy;
}
@Override protected Void doInBackground(Void... unused) {
if (mAlias == null) {
respondWithAlias(null);
return null;
}
try (KeyChain.KeyChainConnection connection = KeyChain.bind(KeyChainActivity.this)) {
// This is a safety check to make sure an alias was not somehow chosen by
// the user but is not user-selectable.
// However, if the alias was selected by the Device Owner / Profile Owner
// (by implementing DeviceAdminReceiver), then there's no need to check
// this.
if (!mFromPolicy && (!connection.getService().isUserSelectable(mAlias))) {
Log.w(TAG, String.format("Alias %s not user-selectable.", mAlias));
respondWithAlias(null);
return null;
}
connection.getService().setGrant(mSenderUid, mAlias, true);
respondWithAlias(mAlias);
} catch (InterruptedException ignored) {
Thread.currentThread().interrupt();
Log.d(TAG, "interrupted while granting access", ignored);
respondWithAlias(null);
} catch (IllegalArgumentException ignored) {
Log.d(TAG, "attempt to set grant on a non-existent alias", ignored);
respondWithAlias(null);
} catch (Exception | AssertionError ignored) {
// Catchall so we always call mKeyChainAliasResponse.
// AssertionError is thrown in case of failure to connect to the service.
Log.e(TAG, "error while granting access", ignored);
respondWithAlias(null);
}
return null;
}
private void respondWithAlias(String alias) {
try {
mKeyChainAliasResponse.alias(alias);
} catch (Exception e) {
// don't just catch RemoteException, caller could
// throw back a RuntimeException across processes
// which we should protect against.
Log.e(TAG, "Error while returning alias", e);
}
}
@Override protected void onPostExecute(Void unused) {
finishActivity();
}
}
private void finishActivity() {
long timeElapsedSinceFirstIntent =
System.currentTimeMillis() - mFirstIntentReceivedTimeMillis;
if (mFirstIntentReceivedTimeMillis == 0L
|| timeElapsedSinceFirstIntent > SNACKBAR_MIN_TIME) {
finishSnackBar();
finish();
} else {
long remainingTimeToShowSnackBar = SNACKBAR_MIN_TIME - timeElapsedSinceFirstIntent;
handler.postDelayed(mFinishActivity, remainingTimeToShowSnackBar);
}
}
@Override public void onBackPressed() {
finish(null);
}
private static X509Certificate loadCertificate(KeyStore keyStore, String alias) {
final Certificate cert;
try {
if (keyStore.isCertificateEntry(alias)) {
return null;
}
cert = keyStore.getCertificate(alias);
} catch (KeyStoreException e) {
Log.e(TAG, String.format("Error trying to retrieve certificate for \"%s\".", alias), e);
return null;
}
if (cert != null) {
if (cert instanceof X509Certificate) {
return (X509Certificate) cert;
} else {
Log.w(TAG, String.format("Certificate associated with alias \"%s\" is not X509.",
alias));
}
}
return null;
}
private static List<X509Certificate> loadCertificateChain(KeyStore keyStore,
String alias) {
final Certificate[] certs;
final boolean isCertificateEntry;
try {
isCertificateEntry = keyStore.isCertificateEntry(alias);
certs = keyStore.getCertificateChain(alias);
} catch (KeyStoreException e) {
Log.e(TAG, String.format("Error trying to retrieve certificate chain for \"%s\".",
alias), e);
return Collections.emptyList();
}
final List<X509Certificate> result = new ArrayList<>();
// If this is a certificate entry we return the single certificate. Otherwise we trim the
// leaf and return only the rest of the chain.
for (int i = isCertificateEntry ? 0 : 1; i < certs.length; ++i) {
if (certs[i] instanceof X509Certificate) {
result.add((X509Certificate) certs[i]);
} else {
Log.w(TAG,"A certificate in the chain of alias \""
+ alias + "\" is not X509.");
return Collections.emptyList();
}
}
return result;
}
}