Add authsecret AIDL interface am: 112fab25fc

Original change: https://android-review.googlesource.com/c/platform/hardware/interfaces/+/1541184

MUST ONLY BE SUBMITTED BY AUTOMERGER

Change-Id: I5c0be14b8e5717fead50aae2a4b692784e849104
This commit is contained in:
ChengYou Ho 2021-01-12 08:22:52 +00:00 committed by Automerger Merge Worker
commit 916efe6bf4
12 changed files with 372 additions and 0 deletions

View file

@ -0,0 +1,16 @@
aidl_interface {
name: "android.hardware.authsecret",
vendor_available: true,
srcs: ["android/hardware/authsecret/*.aidl"],
stability: "vintf",
backend: {
java: {
platform_apis: true,
},
ndk: {
vndk: {
enabled: true,
},
},
},
}

View file

@ -0,0 +1,23 @@
///////////////////////////////////////////////////////////////////////////////
// THIS FILE IS IMMUTABLE. DO NOT EDIT IN ANY CASE. //
///////////////////////////////////////////////////////////////////////////////
// This file is a snapshot of an AIDL file. Do not edit it manually. There are
// two cases:
// 1). this is a frozen version file - do not edit this in any case.
// 2). this is a 'current' file. If you make a backwards compatible change to
// the interface (from the latest frozen version), the build system will
// prompt you to update this file with `m <name>-update-api`.
//
// You must not make a backward incompatible change to any AIDL file built
// with the aidl_interface module type with versions property set. The module
// type is used to build AIDL files in a way that they can be used across
// independently updatable components of the system. If a device is shipped
// with such a backward incompatible change, it has a high risk of breaking
// later when a module using the interface is updated, e.g., Mainline modules.
package android.hardware.authsecret;
@VintfStability
interface IAuthSecret {
oneway void setPrimaryUserCredential(in byte[] secret);
}

View file

@ -0,0 +1,47 @@
/*
* Copyright 2020 The Android Open Source Project
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package android.hardware.authsecret;
/**
* This security HAL allows vendor components to be cryptographically tied to
* the primary user's credential. For example, security hardware can require
* proof that the credential is known before applying updates.
*
*/
@VintfStability
interface IAuthSecret {
/**
* When the primary user is unlocked, this method is passed a secret to
* prove that is has been successfully unlocked. The primary user can either
* be unlocked by a person entering their credential or by another party
* using an escrow token e.g. a device administrator.
*
* The first time this is called, the secret must be used to provision state
* that depends on the primary user's secret. The same secret must be passed
* on each call until the next factory reset.
*
* Upon factory reset, any dependence on the secret must be removed as that
* secret is now lost and must never be derived again. A new secret must be
* created for the new primary user which must be used to newly provision
* state the first time this method is called after factory reset.
*
* The secret must be at least 16 bytes, or the secret must be dropped.
*
* @param secret blob derived from the primary user's credential.
*/
oneway void setPrimaryUserCredential(in byte[] secret);
}

View file

@ -0,0 +1,32 @@
//
// Copyright (C) 2020 The Android Open Source Project
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
//
cc_binary {
name: "android.hardware.authsecret-service.example",
relative_install_path: "hw",
init_rc: ["android.hardware.authsecret-service.example.rc"],
vintf_fragments: ["android.hardware.authsecret-service.example.xml"],
vendor: true,
srcs: [
"service.cpp",
"AuthSecret.cpp",
],
shared_libs: [
"android.hardware.authsecret-ndk_platform",
"libbase",
"libbinder_ndk",
],
}

View file

@ -0,0 +1,33 @@
/*
* Copyright (C) 2018 The Android Open Source Project
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include "AuthSecret.h"
namespace aidl {
namespace android {
namespace hardware {
namespace authsecret {
// Methods from ::android::hardware::authsecret::IAuthSecret follow.
::ndk::ScopedAStatus AuthSecret::setPrimaryUserCredential(const std::vector<uint8_t>& in_secret) {
(void)in_secret;
return ::ndk::ScopedAStatus::ok();
}
} // namespace authsecret
} // namespace hardware
} // namespace android
} // aidl

View file

@ -0,0 +1,37 @@
/*
* Copyright (C) 2020 The Android Open Source Project
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#pragma once
#include <aidl/android/hardware/authsecret/BnAuthSecret.h>
namespace aidl {
namespace android {
namespace hardware {
namespace authsecret {
struct AuthSecret : public BnAuthSecret {
AuthSecret() = default;
// Methods from ::android::hardware::authsecret::IAuthSecret follow.
::ndk::ScopedAStatus setPrimaryUserCredential(const std::vector<uint8_t>& in_secret) override;
};
} // namespace authsecret
} // namespace hardware
} // namespace android
} // aidl

View file

@ -0,0 +1,4 @@
service vendor.authsecret_default /vendor/bin/hw/android.hardware.authsecret-service.example
class hal
user hsm
group hsm

View file

@ -0,0 +1,10 @@
<manifest version="1.0" type="device">
<hal format="aidl">
<name>android.hardware.authsecret</name>
<version>1</version>
<interface>
<name>IAuthSecret</name>
<instance>default</instance>
</interface>
</hal>
</manifest>

View file

@ -0,0 +1,35 @@
/*
* Copyright (C) 2020 The Android Open Source Project
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include <android-base/logging.h>
#include <android/binder_manager.h>
#include <android/binder_process.h>
#include "AuthSecret.h"
using ::aidl::android::hardware::authsecret::AuthSecret;
int main() {
ABinderProcess_setThreadPoolMaxThreadCount(0);
std::shared_ptr<AuthSecret> authsecret = ndk::SharedRefBase::make<AuthSecret>();
const std::string instance = std::string() + AuthSecret::descriptor + "/default";
binder_status_t status = AServiceManager_addService(authsecret->asBinder().get(), instance.c_str());
CHECK(status == STATUS_OK);
ABinderProcess_joinThreadPool();
return -1; // Should never be reached
}

View file

@ -0,0 +1,31 @@
//
// Copyright (C) 2018 The Android Open Source Project
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
//
cc_test {
name: "VtsHalAuthSecretTargetTest",
defaults: [
"VtsHalTargetTestDefaults",
"use_libaidlvintf_gtest_helper_static",
],
srcs: ["VtsHalAuthSecretTargetTest.cpp"],
static_libs: ["android.hardware.authsecret-ndk_platform"],
shared_libs: ["libbinder_ndk"],
test_suites: [
"general-tests",
"vts",
],
require_root: true,
}

View file

@ -0,0 +1,96 @@
/*
* Copyright (C) 2020 The Android Open Source Project
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include <aidl/Gtest.h>
#include <aidl/Vintf.h>
#include <aidl/android/hardware/authsecret/IAuthSecret.h>
#include <android/binder_manager.h>
#include <android/binder_process.h>
using ::aidl::android::hardware::authsecret::IAuthSecret;
using ::ndk::SpAIBinder;
/**
* There is no expected behaviour that can be tested so these tests check the
* HAL doesn't crash with different execution orders.
*/
class AuthSecretAidlTest : public testing::TestWithParam<std::string> {
public:
virtual void SetUp() override {
authsecret = IAuthSecret::fromBinder(
SpAIBinder(AServiceManager_waitForService(GetParam().c_str())));
ASSERT_NE(authsecret, nullptr);
// Notify LSS to generate PIN code '1234' and corresponding secret.
(void)system("cmd lock_settings set-pin 1234");
// All tests must enroll the correct secret first as this cannot be changed
// without a factory reset and the order of tests could change.
authsecret->setPrimaryUserCredential(CORRECT_SECRET);
}
static void TearDownTestSuite() {
// clean up PIN code after testing
(void)system("cmd lock_settings clear --old 1234");
}
std::shared_ptr<IAuthSecret> authsecret;
std::vector<uint8_t> CORRECT_SECRET{61, 93, 124, 240, 5, 0, 7, 201, 9, 129, 11, 12, 0, 14, 0, 16};
std::vector<uint8_t> WRONG_SECRET{1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16};
};
/* Provision the primary user with a secret. */
TEST_P(AuthSecretAidlTest, provisionPrimaryUserCredential) {
// Secret provisioned by SetUp()
}
/* Provision the primary user with a secret and pass the secret again. */
TEST_P(AuthSecretAidlTest, provisionPrimaryUserCredentialAndPassAgain) {
// Secret provisioned by SetUp()
authsecret->setPrimaryUserCredential(CORRECT_SECRET);
}
/* Provision the primary user with a secret and pass the secret again repeatedly. */
TEST_P(AuthSecretAidlTest, provisionPrimaryUserCredentialAndPassAgainMultipleTimes) {
// Secret provisioned by SetUp()
constexpr int N = 5;
for (int i = 0; i < N; ++i) {
authsecret->setPrimaryUserCredential(CORRECT_SECRET);
}
}
/* Provision the primary user with a secret and then pass the wrong secret. This
* should never happen and is an framework bug if it does. As the secret is
* wrong, the HAL implementation may not be able to function correctly but it
* should fail gracefully. */
TEST_P(AuthSecretAidlTest, provisionPrimaryUserCredentialAndWrongSecret) {
// Secret provisioned by SetUp()
authsecret->setPrimaryUserCredential(WRONG_SECRET);
}
GTEST_ALLOW_UNINSTANTIATED_PARAMETERIZED_TEST(AuthSecretAidlTest);
INSTANTIATE_TEST_SUITE_P(
PerInstance, AuthSecretAidlTest,
testing::ValuesIn(android::getAidlHalInstanceNames(IAuthSecret::descriptor)),
android::PrintInstanceNameToString);
int main(int argc, char** argv) {
::testing::InitGoogleTest(&argc, argv);
ABinderProcess_setThreadPoolMaxThreadCount(1);
ABinderProcess_startThreadPool();
return RUN_ALL_TESTS();
}

View file

@ -27,6 +27,14 @@
<instance>default</instance>
</interface>
</hal>
<hal format="aidl" optional="true">
<name>android.hardware.authsecret</name>
<version>1</version>
<interface>
<name>IAuthSecret</name>
<instance>default</instance>
</interface>
</hal>
<hal format="hidl" optional="true">
<name>android.hardware.authsecret</name>
<version>1.0</version>