• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 /*
2  * Copyright (C) 2011 The Android Open Source Project
3  *
4  * Licensed under the Apache License, Version 2.0 (the "License");
5  * you may not use this file except in compliance with the License.
6  * You may obtain a copy of the License at
7  *
8  *      http://www.apache.org/licenses/LICENSE-2.0
9  *
10  * Unless required by applicable law or agreed to in writing, software
11  * distributed under the License is distributed on an "AS IS" BASIS,
12  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13  * See the License for the specific language governing permissions and
14  * limitations under the License.
15  */
16 
17 package com.android.nfc;
18 
19 import java.io.File;
20 import java.io.FileDescriptor;
21 import java.io.FileNotFoundException;
22 import java.io.FileReader;
23 import java.io.IOException;
24 import java.io.PrintWriter;
25 import java.util.ArrayList;
26 import java.util.HashMap;
27 
28 import org.xmlpull.v1.XmlPullParser;
29 import org.xmlpull.v1.XmlPullParserException;
30 import org.xmlpull.v1.XmlPullParserFactory;
31 
32 import android.content.Context;
33 import android.content.pm.ApplicationInfo;
34 import android.content.pm.PackageInfo;
35 import android.content.pm.PackageManager;
36 import android.content.pm.Signature;
37 import android.content.pm.PackageManager.NameNotFoundException;
38 import android.os.Environment;
39 import android.util.Log;
40 
41 public class NfceeAccessControl {
42     static final String TAG = "NfceeAccess";
43     static final boolean DBG = true;
44 
45     public static final String NFCEE_ACCESS_PATH = "/etc/nfcee_access.xml";
46 
47     /**
48      * Map of signatures to valid packages names, as read from nfcee_access.xml.
49      * An empty list of package names indicates that any package
50      * with this signature is allowed.
51      */
52     final HashMap<Signature, String[]> mNfceeAccess;  // contents final after onCreate()
53 
54     /**
55      * Map from UID to NFCEE access, used as a cache.
56      * Note: if a UID contains multiple packages they must all be
57      * signed with the same certificate so in effect UID == certificate
58      * used to sign the package.
59      */
60     final HashMap<Integer, Boolean> mUidCache;  // contents guarded by this
61 
62     final Context mContext;
63     final boolean mDebugPrintSignature;
64 
NfceeAccessControl(Context context)65     NfceeAccessControl(Context context) {
66         mContext = context;
67         mNfceeAccess = new HashMap<Signature, String[]>();
68         mUidCache = new HashMap<Integer, Boolean>();
69         mDebugPrintSignature = parseNfceeAccess();
70     }
71 
72     /**
73      * Check if the {uid, pkg} combination may use NFCEE.
74      * Also verify with package manager that this {uid, pkg} combination
75      * is valid if it is not cached.
76      */
check(int uid, String pkg)77     public boolean check(int uid, String pkg) {
78         synchronized (this) {
79             Boolean cached = mUidCache.get(uid);
80             if (cached != null) {
81                 return cached;
82             }
83 
84             boolean access = false;
85 
86             // Ensure the claimed package is present in the calling UID
87             PackageManager pm = mContext.getPackageManager();
88             String[] pkgs = pm.getPackagesForUid(uid);
89             for (String uidPkg : pkgs) {
90                 if (uidPkg.equals(pkg)) {
91                     // Ensure the package has access permissions
92                     if (checkPackageNfceeAccess(pkg)) {
93                         access = true;
94                     }
95                     break;
96                 }
97             }
98 
99             mUidCache.put(uid, access);
100             return access;
101         }
102     }
103 
104     /**
105      * Check if the given ApplicationInfo may use the NFCEE.
106      * Assumes ApplicationInfo came from package manager,
107      * so no need to confirm {uid, pkg} is valid.
108      */
check(ApplicationInfo info)109     public boolean check(ApplicationInfo info) {
110         synchronized (this) {
111             Boolean access = mUidCache.get(info.uid);
112             if (access == null) {
113                 access = checkPackageNfceeAccess(info.packageName);
114                 mUidCache.put(info.uid, access);
115             }
116             return access;
117         }
118     }
119 
invalidateCache()120     public void invalidateCache() {
121         synchronized (this) {
122             mUidCache.clear();
123         }
124     }
125 
126     /**
127      * Check with package manager if the pkg may use NFCEE.
128      * Does not use cache.
129      */
checkPackageNfceeAccess(String pkg)130     boolean checkPackageNfceeAccess(String pkg) {
131         PackageManager pm = mContext.getPackageManager();
132         try {
133             PackageInfo info = pm.getPackageInfo(pkg, PackageManager.GET_SIGNATURES);
134             if (info.signatures == null) {
135                 return false;
136             }
137 
138             for (Signature s : info.signatures){
139                 if (s == null) {
140                     continue;
141                 }
142                 String[] packages = mNfceeAccess.get(s);
143                 if (packages == null) {
144                     continue;
145                 }
146                 if (packages.length == 0) {
147                     // wildcard access
148                     if (DBG) Log.d(TAG, "Granted NFCEE access to " + pkg + " (wildcard)");
149                     return true;
150                 }
151                 for (String p : packages) {
152                     if (pkg.equals(p)) {
153                         // explicit package access
154                         if (DBG) Log.d(TAG, "Granted access to " + pkg + " (explicit)");
155                         return true;
156                     }
157                 }
158             }
159 
160             if (mDebugPrintSignature) {
161                 Log.w(TAG, "denied NFCEE access for " + pkg + " with signature:");
162                 for (Signature s : info.signatures) {
163                     if (s != null) {
164                         Log.w(TAG, s.toCharsString());
165                     }
166                 }
167             }
168         } catch (NameNotFoundException e) {
169             // ignore
170         }
171         return false;
172     }
173 
174     /**
175      * Parse nfcee_access.xml, populate mNfceeAccess
176      * Policy is to ignore unexpected XML elements and continue processing,
177      * except for obvious errors within a <signer> group since they might cause
178      * package names to by ignored and therefore wildcard access granted
179      * by mistake. Those errors invalidate the entire <signer> group.
180      */
parseNfceeAccess()181     boolean parseNfceeAccess() {
182         File file = new File(Environment.getRootDirectory(), NFCEE_ACCESS_PATH);
183         FileReader reader = null;
184         boolean debug = false;
185         try {
186             reader = new FileReader(file);
187             XmlPullParserFactory factory = XmlPullParserFactory.newInstance();
188             XmlPullParser parser = factory.newPullParser();
189             parser.setInput(reader);
190 
191             int event;
192             ArrayList<String> packages = new ArrayList<String>();
193             Signature signature = null;
194             parser.setFeature(XmlPullParser.FEATURE_PROCESS_NAMESPACES, false);
195             while (true) {
196                 event = parser.next();
197                 String tag = parser.getName();
198                 if (event == XmlPullParser.START_TAG && "signer".equals(tag)) {
199                     signature = null;
200                     packages.clear();
201                     for (int i = 0; i < parser.getAttributeCount(); i++) {
202                         if ("android:signature".equals(parser.getAttributeName(i))) {
203                             signature = new Signature(parser.getAttributeValue(i));
204                             break;
205                         }
206                     }
207                     if (signature == null) {
208                         Log.w(TAG, "signer tag is missing android:signature attribute, igorning");
209                         continue;
210                     }
211                     if (mNfceeAccess.containsKey(signature)) {
212                         Log.w(TAG, "duplicate signature, ignoring");
213                         signature = null;
214                         continue;
215                     }
216                 } else if (event == XmlPullParser.END_TAG && "signer".equals(tag)) {
217                     if (signature == null) {
218                         Log.w(TAG, "mis-matched signer tag");
219                         continue;
220                     }
221                     mNfceeAccess.put(signature, packages.toArray(new String[0]));
222                     packages.clear();
223                 } else if (event == XmlPullParser.START_TAG && "package".equals(tag)) {
224                     if (signature == null) {
225                         Log.w(TAG, "ignoring unnested packge tag");
226                         continue;
227                     }
228                     String name = null;
229                     for (int i = 0; i < parser.getAttributeCount(); i++) {
230                         if ("android:name".equals(parser.getAttributeName(i))) {
231                             name = parser.getAttributeValue(i);
232                             break;
233                         }
234                     }
235                     if (name == null) {
236                         Log.w(TAG, "package missing android:name, ignoring signer group");
237                         signature = null;  // invalidate signer
238                         continue;
239                     }
240                     // check for duplicate package names
241                     if (packages.contains(name)) {
242                         Log.w(TAG, "duplicate package name in signer group, ignoring");
243                         continue;
244                     }
245                     packages.add(name);
246                 } else if (event == XmlPullParser.START_TAG && "debug".equals(tag)) {
247                     debug = true;
248                 } else if (event == XmlPullParser.END_DOCUMENT) {
249                     break;
250                 }
251             }
252         } catch (XmlPullParserException e) {
253             Log.w(TAG, "failed to load NFCEE access list", e);
254             mNfceeAccess.clear();  // invalidate entire access list
255         } catch (FileNotFoundException e) {
256             Log.w(TAG, "could not find " + NFCEE_ACCESS_PATH + ", no NFCEE access allowed");
257         } catch (IOException e) {
258             Log.e(TAG, "Failed to load NFCEE access list", e);
259             mNfceeAccess.clear();  // invalidate entire access list
260         } finally {
261             if (reader != null) {
262                 try {
263                     reader.close();
264                 } catch (IOException e2)  { }
265             }
266         }
267         Log.i(TAG, "read " + mNfceeAccess.size() + " signature(s) for NFCEE access");
268         return debug;
269     }
270 
dump(FileDescriptor fd, PrintWriter pw, String[] args)271     public void dump(FileDescriptor fd, PrintWriter pw, String[] args) {
272         pw.println("mNfceeAccess=");
273         for (Signature s : mNfceeAccess.keySet()) {
274             pw.printf("\t%s [", s.toCharsString());
275             String[] ps = mNfceeAccess.get(s);
276             for (String p : ps) {
277                 pw.printf("%s, ", p);
278             }
279             pw.println("]");
280         }
281         synchronized (this) {
282             pw.println("mNfceeUidCache=");
283             for (Integer uid : mUidCache.keySet()) {
284                 Boolean b = mUidCache.get(uid);
285                 pw.printf("\t%d %s\n", uid, b);
286             }
287         }
288     }
289 }
290