All Downloads are FREE. Search and download functionalities are using the official Maven repository.

src.com.android.server.backup.encryption.CryptoSettings Maven / Gradle / Ivy

/*
 * Copyright (C) 2019 The Android Open Source Project
 *
 * Licensed under the Apache License, Version 2.0 (the "License");
 * you may not use this file except in compliance with the License.
 * You may obtain a copy of the License at
 *
 *      http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS,
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 * See the License for the specific language governing permissions and
 * limitations under the License.
 */

package com.android.server.backup.encryption;

import static com.android.internal.util.Preconditions.checkState;

import android.content.Context;
import android.content.SharedPreferences;
import android.content.SharedPreferences.Editor;
import android.security.keystore.recovery.InternalRecoveryServiceException;
import android.security.keystore.recovery.RecoveryController;
import android.util.Slog;

import com.android.internal.annotations.VisibleForTesting;

import java.security.KeyStoreException;
import java.util.Objects;
import java.util.Optional;
import java.util.concurrent.TimeUnit;

/**
 * State about encrypted backups that needs to be remembered.
 */
public class CryptoSettings {

    private static final String TAG = "CryptoSettings";

    private static final String SHARED_PREFERENCES_NAME = "crypto_settings";

    private static final String KEY_IS_INITIALIZED = "isInitialized";
    private static final String KEY_ACTIVE_SECONDARY_ALIAS = "activeSecondary";
    private static final String KEY_NEXT_SECONDARY_ALIAS = "nextSecondary";
    private static final String SECONDARY_KEY_LAST_ROTATED_AT = "secondaryKeyLastRotatedAt";
    private static final String[] SETTINGS_FOR_BACKUP = {
        KEY_IS_INITIALIZED,
        KEY_ACTIVE_SECONDARY_ALIAS,
        KEY_NEXT_SECONDARY_ALIAS,
        SECONDARY_KEY_LAST_ROTATED_AT
    };

    private static final long DEFAULT_SECONDARY_KEY_ROTATION_PERIOD =
            TimeUnit.MILLISECONDS.convert(31, TimeUnit.DAYS);

    private static final String KEY_ANCESTRAL_SECONDARY_KEY_VERSION =
            "ancestral_secondary_key_version";

    private final SharedPreferences mSharedPreferences;
    private final Context mContext;

    /**
     * A new instance.
     *
     * @param context For looking up the {@link SharedPreferences}, for storing state.
     * @return The instance.
     */
    public static CryptoSettings getInstance(Context context) {
        // We need single process mode because CryptoSettings may be used from several processes
        // simultaneously.
        SharedPreferences sharedPreferences =
                context.getSharedPreferences(SHARED_PREFERENCES_NAME, Context.MODE_PRIVATE);
        return new CryptoSettings(sharedPreferences, context);
    }

    /**
     * A new instance using {@link SharedPreferences} in the default mode.
     *
     * 

This will not work across multiple processes but will work in tests. */ @VisibleForTesting public static CryptoSettings getInstanceForTesting(Context context) { SharedPreferences sharedPreferences = context.getSharedPreferences(SHARED_PREFERENCES_NAME, Context.MODE_PRIVATE); return new CryptoSettings(sharedPreferences, context); } private CryptoSettings(SharedPreferences sharedPreferences, Context context) { mSharedPreferences = Objects.requireNonNull(sharedPreferences); mContext = Objects.requireNonNull(context); } /** * The alias of the current active secondary key. This should be used to retrieve the key from * AndroidKeyStore. */ public Optional getActiveSecondaryKeyAlias() { return getStringInSharedPrefs(KEY_ACTIVE_SECONDARY_ALIAS); } /** * The alias of the secondary key to which the client is rotating. The rotation is not * immediate, which is why this setting is needed. Once the next key is created, it can take up * to 72 hours potentially (or longer if the user has no network) for the next key to be synced * with the keystore. Only after that has happened does the client attempt to re-wrap all * tertiary keys and commit the rotation. */ public Optional getNextSecondaryKeyAlias() { return getStringInSharedPrefs(KEY_NEXT_SECONDARY_ALIAS); } /** * If the settings have been initialized. */ public boolean getIsInitialized() { return mSharedPreferences.getBoolean(KEY_IS_INITIALIZED, false); } /** * Sets the alias of the currently active secondary key. * * @param activeAlias The alias, as in AndroidKeyStore. * @throws IllegalArgumentException if the alias is not in the user's keystore. */ public void setActiveSecondaryKeyAlias(String activeAlias) throws IllegalArgumentException { assertIsValidAlias(activeAlias); mSharedPreferences.edit().putString(KEY_ACTIVE_SECONDARY_ALIAS, activeAlias).apply(); } /** * Sets the alias of the secondary key to which the client is rotating. * * @param nextAlias The alias, as in AndroidKeyStore. * @throws KeyStoreException if unable to check whether alias is valid in the keystore. * @throws IllegalArgumentException if the alias is not in the user's keystore. */ public void setNextSecondaryAlias(String nextAlias) throws IllegalArgumentException { assertIsValidAlias(nextAlias); mSharedPreferences.edit().putString(KEY_NEXT_SECONDARY_ALIAS, nextAlias).apply(); } /** * Unsets the alias of the key to which the client is rotating. This is generally performed once * a rotation is complete. */ public void removeNextSecondaryKeyAlias() { mSharedPreferences.edit().remove(KEY_NEXT_SECONDARY_ALIAS).apply(); } /** * Sets the timestamp of when the secondary key was last rotated. * * @param timestamp The timestamp to set. */ public void setSecondaryLastRotated(long timestamp) { mSharedPreferences.edit().putLong(SECONDARY_KEY_LAST_ROTATED_AT, timestamp).apply(); } /** * Returns a timestamp of when the secondary key was last rotated. * * @return The timestamp. */ public Optional getSecondaryLastRotated() { if (!mSharedPreferences.contains(SECONDARY_KEY_LAST_ROTATED_AT)) { return Optional.empty(); } return Optional.of(mSharedPreferences.getLong(SECONDARY_KEY_LAST_ROTATED_AT, -1)); } /** * Sets the settings to have been initialized. (Otherwise loading should try to initialize * again.) */ private void setIsInitialized() { mSharedPreferences.edit().putBoolean(KEY_IS_INITIALIZED, true).apply(); } /** * Initializes with the given key alias. * * @param alias The secondary key alias to be set as active. * @throws IllegalArgumentException if the alias does not reference a valid key. * @throws IllegalStateException if attempting to initialize an already initialized settings. */ public void initializeWithKeyAlias(String alias) throws IllegalArgumentException { checkState( !getIsInitialized(), "Attempting to initialize an already initialized settings."); setActiveSecondaryKeyAlias(alias); setIsInitialized(); } /** Returns the secondary key version of the encrypted backup set to restore from (if set). */ public Optional getAncestralSecondaryKeyVersion() { return Optional.ofNullable( mSharedPreferences.getString(KEY_ANCESTRAL_SECONDARY_KEY_VERSION, null)); } /** Sets the secondary key version of the encrypted backup set to restore from. */ public void setAncestralSecondaryKeyVersion(String ancestralSecondaryKeyVersion) { mSharedPreferences .edit() .putString(KEY_ANCESTRAL_SECONDARY_KEY_VERSION, ancestralSecondaryKeyVersion) .apply(); } /** The number of milliseconds between secondary key rotation */ public long backupSecondaryKeyRotationIntervalMs() { return DEFAULT_SECONDARY_KEY_ROTATION_PERIOD; } /** Deletes all crypto settings related to backup (as opposed to restore). */ public void clearAllSettingsForBackup() { Editor sharedPrefsEditor = mSharedPreferences.edit(); for (String backupSettingKey : SETTINGS_FOR_BACKUP) { sharedPrefsEditor.remove(backupSettingKey); } sharedPrefsEditor.apply(); Slog.d(TAG, "Cleared crypto settings for backup"); } /** * Throws {@link IllegalArgumentException} if the alias does not refer to a key that is in * the {@link RecoveryController}. */ private void assertIsValidAlias(String alias) throws IllegalArgumentException { try { if (!RecoveryController.getInstance(mContext).getAliases().contains(alias)) { throw new IllegalArgumentException(alias + " is not in RecoveryController"); } } catch (InternalRecoveryServiceException e) { throw new IllegalArgumentException("Problem accessing recovery service", e); } } private Optional getStringInSharedPrefs(String key) { return Optional.ofNullable(mSharedPreferences.getString(key, null)); } }





© 2015 - 2025 Weber Informatics LLC | Privacy Policy