Java程序  |  208行  |  6.91 KB

/*
 * Copyright (C) 2014 The Android Open Source Project
 *
 * Licensed under the Apache License, Version 2.0 (the "License");
 * you may not use this file except in compliance with the License.
 * You may obtain a copy of the License at
 *
 *      http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS,
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 * See the License for the specific language governing permissions and
 * limitations under the License.
 */

package com.android.verity;

import java.io.IOException;
import java.security.PrivateKey;
import java.security.PublicKey;
import java.security.Security;
import java.security.Signature;
import java.security.cert.X509Certificate;
import java.util.Enumeration;
import org.bouncycastle.asn1.ASN1Encodable;
import org.bouncycastle.asn1.ASN1EncodableVector;
import org.bouncycastle.asn1.ASN1InputStream;
import org.bouncycastle.asn1.ASN1Integer;
import org.bouncycastle.asn1.ASN1Object;
import org.bouncycastle.asn1.ASN1Primitive;
import org.bouncycastle.asn1.ASN1Sequence;
import org.bouncycastle.asn1.DEROctetString;
import org.bouncycastle.asn1.DERPrintableString;
import org.bouncycastle.asn1.DERSequence;
import org.bouncycastle.asn1.pkcs.PKCSObjectIdentifiers;
import org.bouncycastle.asn1.pkcs.RSAPublicKey;
import org.bouncycastle.asn1.util.ASN1Dump;
import org.bouncycastle.asn1.x509.AlgorithmIdentifier;
import org.bouncycastle.jce.provider.BouncyCastleProvider;

/**
 * AndroidVerifiedBootKeystore DEFINITIONS ::=
 * BEGIN
 *     FormatVersion ::= INTEGER
 *     KeyBag ::= SEQUENCE {
 *         Key  ::= SEQUENCE {
 *             AlgorithmIdentifier  ::=  SEQUENCE {
 *                 algorithm OBJECT IDENTIFIER,
 *                 parameters ANY DEFINED BY algorithm OPTIONAL
 *             }
 *             KeyMaterial ::= RSAPublicKey
 *         }
 *     }
 *     Signature ::= AndroidVerifiedBootSignature
 * END
 */

class BootKey extends ASN1Object
{
    private AlgorithmIdentifier algorithmIdentifier;
    private RSAPublicKey keyMaterial;

    public BootKey(PublicKey key) throws Exception {
        java.security.interfaces.RSAPublicKey k =
                (java.security.interfaces.RSAPublicKey) key;
        this.keyMaterial = new RSAPublicKey(
                k.getModulus(),
                k.getPublicExponent());
        this.algorithmIdentifier = Utils.getSignatureAlgorithmIdentifier(key);
    }

    public ASN1Primitive toASN1Primitive() {
        ASN1EncodableVector v = new ASN1EncodableVector();
        v.add(algorithmIdentifier);
        v.add(keyMaterial);
        return new DERSequence(v);
    }

    public void dump() throws Exception {
        System.out.println(ASN1Dump.dumpAsString(toASN1Primitive()));
    }
}

class BootKeystore extends ASN1Object
{
    private ASN1Integer             formatVersion;
    private ASN1EncodableVector     keyBag;
    private BootSignature           signature;
    private X509Certificate         certificate;

    private static final int FORMAT_VERSION = 0;

    public BootKeystore() {
        this.formatVersion = new ASN1Integer(FORMAT_VERSION);
        this.keyBag = new ASN1EncodableVector();
    }

    public void addPublicKey(byte[] der) throws Exception {
        PublicKey pubkey = Utils.loadDERPublicKey(der);
        BootKey k = new BootKey(pubkey);
        keyBag.add(k);
    }

    public void setCertificate(X509Certificate cert) {
        certificate = cert;
    }

    public byte[] getInnerKeystore() throws Exception {
        ASN1EncodableVector v = new ASN1EncodableVector();
        v.add(formatVersion);
        v.add(new DERSequence(keyBag));
        return new DERSequence(v).getEncoded();
    }

    public ASN1Primitive toASN1Primitive() {
        ASN1EncodableVector v = new ASN1EncodableVector();
        v.add(formatVersion);
        v.add(new DERSequence(keyBag));
        v.add(signature);
        return new DERSequence(v);
    }

    public void parse(byte[] input) throws Exception {
        ASN1InputStream stream = new ASN1InputStream(input);
        ASN1Sequence sequence = (ASN1Sequence) stream.readObject();

        formatVersion = (ASN1Integer) sequence.getObjectAt(0);
        if (formatVersion.getValue().intValue() != FORMAT_VERSION) {
            throw new IllegalArgumentException("Unsupported format version");
        }

        ASN1Sequence keys = (ASN1Sequence) sequence.getObjectAt(1);
        Enumeration e = keys.getObjects();
        while (e.hasMoreElements()) {
            keyBag.add((ASN1Encodable) e.nextElement());
        }

        ASN1Object sig = sequence.getObjectAt(2).toASN1Primitive();
        signature = new BootSignature(sig.getEncoded());
    }

    public boolean verify() throws Exception {
        byte[] innerKeystore = getInnerKeystore();
        return Utils.verify(signature.getPublicKey(), innerKeystore,
                signature.getSignature(), signature.getAlgorithmIdentifier());
    }

    public void sign(PrivateKey privateKey) throws Exception {
        byte[] innerKeystore = getInnerKeystore();
        byte[] rawSignature = Utils.sign(privateKey, innerKeystore);
        signature = new BootSignature("keystore", innerKeystore.length);
        signature.setCertificate(certificate);
        signature.setSignature(rawSignature,
                Utils.getSignatureAlgorithmIdentifier(privateKey));
    }

    public void dump() throws Exception {
        System.out.println(ASN1Dump.dumpAsString(toASN1Primitive()));
    }

    private static void usage() {
        System.err.println("usage: KeystoreSigner <privatekey.pk8> " +
                "<certificate.x509.pem> <outfile> <publickey0.der> " +
                "... <publickeyN-1.der> | -verify <keystore>");
        System.exit(1);
    }

    public static void main(String[] args) throws Exception {
        if (args.length < 2) {
            usage();
            return;
        }

        Security.addProvider(new BouncyCastleProvider());
        BootKeystore ks = new BootKeystore();

        if ("-verify".equals(args[0])) {
            ks.parse(Utils.read(args[1]));

            try {
                if (ks.verify()) {
                    System.err.println("Signature is VALID");
                    System.exit(0);
                } else {
                    System.err.println("Signature is INVALID");
                }
            } catch (Exception e) {
                e.printStackTrace(System.err);
            }
            System.exit(1);
        } else {
            String privkeyFname = args[0];
            String certFname = args[1];
            String outfileFname = args[2];

            ks.setCertificate(Utils.loadPEMCertificate(certFname));

            for (int i = 3; i < args.length; i++) {
                ks.addPublicKey(Utils.read(args[i]));
            }

            ks.sign(Utils.loadDERPrivateKeyFromFile(privkeyFname));
            Utils.write(ks.getEncoded(), outfileFname);
        }
    }
}