2dba6e3cb0
AuthenticationSignatureGenerator
247 lines
10 KiB
Java
247 lines
10 KiB
Java
/*
|
|
* Copyright (C) 2017 Christian Hagau <ach@hagau.se>
|
|
*
|
|
* This program is free software: you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation, either version 3 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
package org.sufficientlysecure.keychain.ssh;
|
|
|
|
import android.content.Context;
|
|
import android.support.annotation.NonNull;
|
|
import org.bouncycastle.openpgp.AuthenticationSignatureGenerator;
|
|
import org.bouncycastle.openpgp.PGPException;
|
|
import org.bouncycastle.openpgp.operator.jcajce.NfcSyncPGPContentSignerBuilder;
|
|
import org.sufficientlysecure.keychain.operations.BaseOperation;
|
|
import org.sufficientlysecure.keychain.operations.results.OperationResult.LogType;
|
|
import org.sufficientlysecure.keychain.operations.results.OperationResult.OperationLog;
|
|
import org.sufficientlysecure.keychain.pgp.CanonicalizedSecretKey;
|
|
import org.sufficientlysecure.keychain.pgp.CanonicalizedSecretKeyRing;
|
|
import org.sufficientlysecure.keychain.pgp.PassphraseCacheInterface;
|
|
import org.sufficientlysecure.keychain.pgp.exception.PgpGeneralException;
|
|
import org.sufficientlysecure.keychain.pgp.exception.PgpKeyNotFoundException;
|
|
import org.sufficientlysecure.keychain.provider.KeyRepository;
|
|
import org.sufficientlysecure.keychain.service.input.CryptoInputParcel;
|
|
import org.sufficientlysecure.keychain.service.input.RequiredInputParcel;
|
|
import org.sufficientlysecure.keychain.util.Log;
|
|
import org.sufficientlysecure.keychain.util.Passphrase;
|
|
|
|
import java.util.Collection;
|
|
|
|
/**
|
|
* This class supports a single, low-level, authentication operation.
|
|
* <p/>
|
|
* The operation of this class takes a AuthenticationParcel
|
|
* as input, and signs the included challenge as parametrized in the
|
|
* AuthenticationData object. It returns its status
|
|
* and a possible signature as a AuthenticationResult.
|
|
* <p/>
|
|
*
|
|
* @see AuthenticationParcel
|
|
*/
|
|
public class AuthenticationOperation extends BaseOperation<AuthenticationParcel> {
|
|
|
|
private static final String TAG = "AuthenticationOperation";
|
|
|
|
public AuthenticationOperation(Context context, KeyRepository keyRepository) {
|
|
super(context, keyRepository, null);
|
|
}
|
|
|
|
@NonNull
|
|
@Override
|
|
public AuthenticationResult execute(AuthenticationParcel input,
|
|
CryptoInputParcel cryptoInput) {
|
|
return executeInternal(input.getAuthenticationData(), cryptoInput, input);
|
|
}
|
|
|
|
@NonNull
|
|
public AuthenticationResult execute(AuthenticationData data,
|
|
CryptoInputParcel cryptoInput,
|
|
AuthenticationParcel authenticationParcel) {
|
|
return executeInternal(data, cryptoInput, authenticationParcel);
|
|
}
|
|
|
|
/**
|
|
* Signs challenge based on given parameters
|
|
*/
|
|
private AuthenticationResult executeInternal(AuthenticationData data,
|
|
CryptoInputParcel cryptoInput,
|
|
AuthenticationParcel authenticationParcel) {
|
|
int indent = 0;
|
|
OperationLog log = new OperationLog();
|
|
|
|
log.add(LogType.MSG_AUTH, indent);
|
|
indent += 1;
|
|
|
|
Log.d(TAG, data.toString());
|
|
|
|
long opTime;
|
|
long startTime = System.currentTimeMillis();
|
|
|
|
byte[] signature;
|
|
|
|
byte[] challenge = authenticationParcel.getChallenge();
|
|
|
|
int hashAlgorithm = data.getHashAlgorithm();
|
|
|
|
long authMasterKeyId = data.getAuthenticationMasterKeyId();
|
|
Long authSubKeyId = data.getAuthenticationSubKeyId();
|
|
if (authSubKeyId == null) {
|
|
try { // Get the key id of the authentication key belonging to the master key id
|
|
authSubKeyId = mKeyRepository.getCachedPublicKeyRing(authMasterKeyId).getSecretAuthenticationId();
|
|
} catch (PgpKeyNotFoundException e) {
|
|
log.add(LogType.MSG_AUTH_ERROR_KEY_AUTH, indent);
|
|
return new AuthenticationResult(AuthenticationResult.RESULT_ERROR, log);
|
|
}
|
|
}
|
|
|
|
// Get keyring with the authentication key
|
|
CanonicalizedSecretKeyRing authKeyRing;
|
|
try {
|
|
authKeyRing = mKeyRepository.getCanonicalizedSecretKeyRing(authMasterKeyId);
|
|
} catch (KeyRepository.NotFoundException e) {
|
|
log.add(LogType.MSG_AUTH_ERROR_KEY_AUTH, indent);
|
|
return new AuthenticationResult(AuthenticationResult.RESULT_ERROR, log);
|
|
}
|
|
|
|
CanonicalizedSecretKey authKey = authKeyRing.getSecretKey(authSubKeyId);
|
|
|
|
// Make sure the client is allowed to access this key
|
|
Collection<Long> allowedAuthenticationKeyIds = data.getAllowedAuthenticationKeyIds();
|
|
if (allowedAuthenticationKeyIds != null && !allowedAuthenticationKeyIds.contains(authMasterKeyId)) {
|
|
// this key is in our db, but NOT allowed!
|
|
log.add(LogType.MSG_AUTH_ERROR_KEY_NOT_ALLOWED, indent + 1);
|
|
return new AuthenticationResult(AuthenticationResult.RESULT_KEY_DISALLOWED, log);
|
|
}
|
|
|
|
// Make sure key is not expired or revoked
|
|
if (authKeyRing.isExpired() || authKeyRing.isRevoked()
|
|
|| authKey.isExpired() || authKey.isRevoked()) {
|
|
log.add(LogType.MSG_AUTH_ERROR_REVOKED_OR_EXPIRED, indent);
|
|
return new AuthenticationResult(AuthenticationResult.RESULT_ERROR, log);
|
|
}
|
|
|
|
// Make sure the selected key is allowed to authenticate
|
|
if (!authKey.canAuthenticate()) {
|
|
log.add(LogType.MSG_AUTH_ERROR_KEY_AUTH, indent);
|
|
return new AuthenticationResult(AuthenticationResult.RESULT_ERROR, log);
|
|
}
|
|
|
|
CanonicalizedSecretKey.SecretKeyType secretKeyType;
|
|
try {
|
|
secretKeyType = mKeyRepository
|
|
.getCachedPublicKeyRing(authMasterKeyId)
|
|
.getSecretKeyType(authSubKeyId);
|
|
} catch (KeyRepository.NotFoundException e) {
|
|
log.add(LogType.MSG_AUTH_ERROR_KEY_AUTH, indent);
|
|
return new AuthenticationResult(AuthenticationResult.RESULT_ERROR, log);
|
|
}
|
|
|
|
switch (secretKeyType) {
|
|
case DIVERT_TO_CARD:
|
|
case PASSPHRASE_EMPTY: {
|
|
boolean isUnlocked;
|
|
try {
|
|
isUnlocked = authKey.unlock(new Passphrase());
|
|
} catch (PgpGeneralException e) {
|
|
log.add(LogType.MSG_AUTH_ERROR_UNLOCK, indent);
|
|
return new AuthenticationResult(AuthenticationResult.RESULT_ERROR, log);
|
|
}
|
|
|
|
if (!isUnlocked) {
|
|
throw new AssertionError(
|
|
"PASSPHRASE_EMPTY/DIVERT_TO_CARD keyphrase not unlocked with empty passphrase."
|
|
+ " This is a programming error!");
|
|
}
|
|
break;
|
|
}
|
|
|
|
case PASSPHRASE: {
|
|
Passphrase localPassphrase = cryptoInput.getPassphrase();
|
|
if (localPassphrase == null) {
|
|
try {
|
|
localPassphrase = getCachedPassphrase(authMasterKeyId, authKey.getKeyId());
|
|
} catch (PassphraseCacheInterface.NoSecretKeyException ignored) {
|
|
}
|
|
}
|
|
if (localPassphrase == null) {
|
|
log.add(LogType.MSG_AUTH_PENDING_PASSPHRASE, indent + 1);
|
|
return new AuthenticationResult(log,
|
|
RequiredInputParcel.createRequiredAuthenticationPassphrase(
|
|
authMasterKeyId, authKey.getKeyId()),
|
|
cryptoInput);
|
|
}
|
|
|
|
boolean isUnlocked;
|
|
try {
|
|
isUnlocked = authKey.unlock(localPassphrase);
|
|
} catch (PgpGeneralException e) {
|
|
log.add(LogType.MSG_AUTH_ERROR_UNLOCK, indent);
|
|
return new AuthenticationResult(AuthenticationResult.RESULT_ERROR, log);
|
|
}
|
|
if (!isUnlocked) {
|
|
log.add(LogType.MSG_AUTH_ERROR_BAD_PASSPHRASE, indent);
|
|
return new AuthenticationResult(AuthenticationResult.RESULT_ERROR, log);
|
|
}
|
|
break;
|
|
}
|
|
|
|
case GNU_DUMMY: {
|
|
log.add(LogType.MSG_AUTH_ERROR_UNLOCK, indent);
|
|
return new AuthenticationResult(AuthenticationResult.RESULT_ERROR, log);
|
|
}
|
|
default: {
|
|
throw new AssertionError("Unhandled SecretKeyType! (should not happen)");
|
|
}
|
|
|
|
}
|
|
|
|
AuthenticationSignatureGenerator signatureGenerator;
|
|
try {
|
|
signatureGenerator = authKey.getAuthenticationSignatureGenerator(
|
|
hashAlgorithm, cryptoInput.getCryptoData());
|
|
} catch (PgpGeneralException e) {
|
|
log.add(LogType.MSG_AUTH_ERROR_NFC, indent);
|
|
return new AuthenticationResult(AuthenticationResult.RESULT_ERROR, log);
|
|
}
|
|
|
|
signatureGenerator.update(challenge, 0, challenge.length);
|
|
|
|
try {
|
|
signature = signatureGenerator.getSignature();
|
|
} catch (NfcSyncPGPContentSignerBuilder.NfcInteractionNeeded e) {
|
|
// this secret key diverts to a OpenPGP card, thus requires user interaction
|
|
log.add(LogType.MSG_AUTH_PENDING_NFC, indent);
|
|
return new AuthenticationResult(log, RequiredInputParcel.createSecurityTokenAuthenticationOperation(
|
|
authKey.getRing().getMasterKeyId(), authKey.getKeyId(),
|
|
e.hashToSign, e.hashAlgo), cryptoInput);
|
|
} catch (PGPException e) {
|
|
log.add(LogType.MSG_AUTH_ERROR_SIG, indent);
|
|
return new AuthenticationResult(AuthenticationResult.RESULT_ERROR, log);
|
|
}
|
|
|
|
opTime = System.currentTimeMillis() - startTime;
|
|
Log.d(TAG, "Authentication operation duration : " + String.format("%.2f", opTime / 1000.0) + "s");
|
|
|
|
log.add(LogType.MSG_AUTH_OK, indent);
|
|
AuthenticationResult result = new AuthenticationResult(AuthenticationResult.RESULT_OK, log);
|
|
|
|
result.setSignature(signature);
|
|
result.mOperationTime = opTime;
|
|
|
|
return result;
|
|
}
|
|
|
|
|
|
}
|