Kenny Root 735de3b38a Hash keys with MD5; track IBinders not IInterface
Using a plaintext password doesn't work unless it's a certain length, so
just hash the plaintext password with MD5 to make it the right length
for the twofish encryption.

Tracking the IInterface doesn't make much sense since it's different
each time, so track the IBinder instead. That way we can unlinkToDeath
the binder when the last thing it's holding onto goes away.

Change-Id: Id828d25b4d74f27e9d8b4bfb3909c964469cc473
2010-09-30 17:25:05 -07:00

273 lines
7.0 KiB
Bash
Executable File

#!/bin/bash
#
# Copyright (C) 2010 The Android Open Source Project
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
#
# mkobb.sh - Creates OBB files on Linux machines
# Directory where we should temporarily mount the OBB loopback to copy files
MOUNTDIR=/tmp
# Presets. Changing these will probably break your OBB on the device
CRYPTO=twofish
FS=vfat
MKFS=mkfs.vfat
LOSETUP=losetup
BLOCK_SIZE=512
SLOP=512 # Amount of filesystem slop in ${BLOCK_SIZE} blocks
find_binaries() {
MKFSBIN=`which ${MKFS}`
LOSETUPBIN=`which ${LOSETUP}`
MOUNTBIN=`which mount`
UMOUNTBIN=`which umount`
DDBIN=`which dd`
RSYNCBIN=`which rsync`
}
check_prereqs() {
if [ "`uname -s`x" != "Linuxx" ]; then \
echo "ERROR: This script only works on Linux!"
exit 1
fi
if ! egrep -q "^cryptoloop " /proc/modules; then \
echo "ERROR: Could not find cryptoloop in the kernel."
echo "Perhaps you need to: modprobe cryptoloop"
exit 1
fi
if ! egrep -q "name\s*:\s*${CRYPTO}$" /proc/crypto; then \
echo "ERROR: Could not find crypto \`${CRYPTO}' in the kernel."
echo "Perhaps you need to: modprobe ${CRYPTO}"
exit 1
fi
if ! egrep -q "^\s*${FS}$" /proc/filesystems; then \
echo "ERROR: Could not find filesystem \`${FS}' in the kernel."
echo "Perhaps you need to: modprobe ${FS}"
exit 1
fi
if [ "${MKFSBIN}x" = "x" ]; then \
echo "ERROR: Could not find ${MKFS} in your path!"
exit 1
elif [ ! -x "${MKFSBIN}" ]; then \
echo "ERROR: ${MKFSBIN} is not executable!"
exit 1
fi
if [ "${LOSETUPBIN}x" = "x" ]; then \
echo "ERROR: Could not find ${LOSETUP} in your path!"
exit 1
elif [ ! -x "${LOSETUPBIN}" ]; then \
echo "ERROR: ${LOSETUPBIN} is not executable!"
exit 1
fi
}
cleanup() {
if [ "${loopdev}x" != "x" ]; then \
${LOSETUPBIN} -d ${loopdev}
fi
}
hidden_prompt() {
unset output
prompt="$1"
outvar="$2"
while read -s -n 1 -p "$prompt" c; do \
if [ "x$c" = "x" ]; then \
break
fi
prompt='*'
output="${output}${c}"
done
echo
eval $outvar="$output"
unset output
}
read_key() {
hidden_prompt " Encryption key: " key
if [ "${key}x" = "x" ]; then \
echo "ERROR: An empty key is not allowed!"
exit 1
fi
hidden_prompt "Encryption key (again): " key2
if [ "${key}x" != "${key2}x" ]; then \
echo "ERROR: Encryption keys do not match!"
exit 1
fi
}
onexit() {
if [ "x${temp_mount}" != "x" ]; then \
${UMOUNTBIN} ${temp_mount}
rmdir ${temp_mount}
fi
if [ "x${loop_dev}" != "x" ]; then \
if [ ${use_crypto} -eq 1 ]; then \
dmsetup remove -f ${loop_dev}
${LOSETUPBIN} -d ${old_loop_dev}
else \
${LOSETUPBIN} -d ${loop_dev}
fi
fi
if [ "x${tempfile}" != "x" -a -f "${tempfile}" ]; then \
rm -f ${tempfile}
fi
if [ "x${keyfile}" != "x" -a -f "${keyfile}" ]; then \
rm -f ${keyfile}
fi
echo "Fatal error."
exit 1
}
usage() {
echo "mkobb.sh -- Create OBB files for use on Android"
echo ""
echo " -c Use an encrypted OBB; must specify key"
echo " -d <directory> Use <directory> as input for OBB files"
echo " -k <key> Use <key> to encrypt OBB file"
echo " -K Prompt for key to encrypt OBB file"
echo " -o <filename> Write OBB file out to <filename>"
echo " -v Verbose mode"
echo " -h Help; this usage screen"
}
find_binaries
check_prereqs
use_crypto=0
args=`getopt -o cd:hk:Ko:v -- "$@"`
eval set -- "$args"
while true; do \
case "$1" in
-c) use_crypto=1; shift;;
-d) directory=$2; shift 2;;
-h) usage; exit 1;;
-k) key=$2; shift 2;;
-K) prompt_key=1; shift;;
-v) verbose=1; shift;;
-o) filename=$2; shift 2;;
--) shift; break;;
*) echo "ERROR: Invalid argument in option parsing! Cannot recover. Ever."; exit 1;;
esac
done
if [ "${directory}x" = "x" -o ! -d "${directory}" ]; then \
echo "ERROR: Must specify valid input directory"
echo ""
usage
exit 1;
fi
if [ "${filename}x" = "x" ]; then \
echo "ERROR: Must specify filename"
echo ""
usage
exit 1;
fi
if [ ${use_crypto} -eq 1 -a "${key}x" = "x" -a 0${prompt_key} -eq 0 ]; then \
echo "ERROR: Crypto desired, but no key supplied or requested to prompt for."
exit 1
fi
if [ 0${prompt_key} -eq 1 ]; then \
read_key
fi
outdir=`dirname ${filename}`
if [ ! -d "${outdir}" ]; then \
echo "ERROR: Output directory does not exist: ${outdir}"
exit 1
fi
# Make sure we clean up any stuff we create from here on during error conditions
trap onexit ERR
tempfile=$(tempfile -d ${outdir}) || ( echo "ERROR: couldn't create temporary file in ${outdir}"; exit 1 )
block_count=`du -s --apparent-size --block-size=512 ${directory} | awk '{ print $1; }'`
if [ $? -ne 0 ]; then \
echo "ERROR: Couldn't read size of input directory ${directory}"
exit 1
fi
echo "Creating temporary file..."
${DDBIN} if=/dev/zero of=${tempfile} bs=${BLOCK_SIZE} count=$((${block_count} + ${SLOP})) > /dev/null 2>&1
if [ $? -ne 0 ]; then \
echo "ERROR: creating temporary file: $?"
fi
loop_dev=$(${LOSETUPBIN} -f) || ( echo "ERROR: losetup wouldn't tell us the next unused device"; exit 1 )
${LOSETUPBIN} ${loop_dev} ${tempfile} || ( echo "ERROR: couldn't create loopback device"; exit 1 )
if [ ${use_crypto} -eq 1 ]; then \
hashed_key=`echo -n "${key}" | md5sum | awk '{ print $1 }'`
unique_dm_name=`basename ${tempfile}`
echo "0 `blockdev --getsize ${loop_dev}` crypt ${CRYPTO} ${hashed_key} 0 ${loop_dev} 0" | dmsetup create ${unique_dm_name}
old_loop_dev=${loop_dev}
loop_dev=/dev/mapper/${unique_dm_name}
fi
#
# Create the filesystem
#
echo ""
${MKFSBIN} -I ${loop_dev}
echo ""
#
# Make the temporary mount point and mount it
#
temp_mount="${MOUNTDIR}/${RANDOM}"
mkdir ${temp_mount}
${MOUNTBIN} -t ${FS} -o loop ${loop_dev} ${temp_mount}
#
# rsync the files!
#
echo "Copying files:"
${RSYNCBIN} -av --no-owner --no-group ${directory}/ ${temp_mount}/
echo ""
echo "Successfully created \`${filename}'"
#
# Undo all the temporaries
#
umount ${temp_mount}
rmdir ${temp_mount}
if [ ${use_crypto} -eq 1 ]; then \
dmsetup remove -f ${loop_dev}
${LOSETUPBIN} -d ${old_loop_dev}
else \
${LOSETUPBIN} -d ${loop_dev}
fi
mv ${tempfile} ${filename}
trap - ERR
exit 0