1bf823ce75
be32113307
Change-Id: I55ddbddd0bc317f1f077a63b0275c4d55fd9c76f
127 lines
5.7 KiB
C++
127 lines
5.7 KiB
C++
/*
|
|
* Copyright 2019, The Android Open Source Project
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*/
|
|
|
|
#define LOG_TAG "IdentityCredentialStore"
|
|
|
|
#include <android-base/logging.h>
|
|
#include <android/binder_manager.h>
|
|
|
|
#include "IdentityCredential.h"
|
|
#include "IdentityCredentialStore.h"
|
|
#include "PresentationSession.h"
|
|
#include "WritableIdentityCredential.h"
|
|
|
|
namespace aidl::android::hardware::identity {
|
|
|
|
using ::aidl::android::hardware::security::keymint::IRemotelyProvisionedComponent;
|
|
|
|
IdentityCredentialStore::IdentityCredentialStore(sp<SecureHardwareProxyFactory> hwProxyFactory,
|
|
optional<string> remotelyProvisionedComponent)
|
|
: hwProxyFactory_(hwProxyFactory),
|
|
remotelyProvisionedComponentName_(remotelyProvisionedComponent) {
|
|
hardwareInformation_.credentialStoreName = "Identity Credential Reference Implementation";
|
|
hardwareInformation_.credentialStoreAuthorName = "Google";
|
|
hardwareInformation_.dataChunkSize = kGcmChunkSize;
|
|
hardwareInformation_.isDirectAccess = false;
|
|
hardwareInformation_.supportedDocTypes = {};
|
|
hardwareInformation_.isRemoteKeyProvisioningSupported =
|
|
remotelyProvisionedComponentName_.has_value();
|
|
}
|
|
|
|
ndk::ScopedAStatus IdentityCredentialStore::getHardwareInformation(
|
|
HardwareInformation* hardwareInformation) {
|
|
*hardwareInformation = hardwareInformation_;
|
|
return ndk::ScopedAStatus::ok();
|
|
}
|
|
|
|
ndk::ScopedAStatus IdentityCredentialStore::createCredential(
|
|
const string& docType, bool testCredential,
|
|
shared_ptr<IWritableIdentityCredential>* outWritableCredential) {
|
|
sp<SecureHardwareProvisioningProxy> hwProxy = hwProxyFactory_->createProvisioningProxy();
|
|
shared_ptr<WritableIdentityCredential> wc =
|
|
ndk::SharedRefBase::make<WritableIdentityCredential>(hwProxy, docType, testCredential,
|
|
hardwareInformation_);
|
|
if (!wc->initialize()) {
|
|
return ndk::ScopedAStatus(AStatus_fromServiceSpecificErrorWithMessage(
|
|
IIdentityCredentialStore::STATUS_FAILED,
|
|
"Error initializing WritableIdentityCredential"));
|
|
}
|
|
*outWritableCredential = wc;
|
|
return ndk::ScopedAStatus::ok();
|
|
}
|
|
|
|
ndk::ScopedAStatus IdentityCredentialStore::getCredential(
|
|
CipherSuite cipherSuite, const vector<uint8_t>& credentialData,
|
|
shared_ptr<IIdentityCredential>* outCredential) {
|
|
// We only support CIPHERSUITE_ECDHE_HKDF_ECDSA_WITH_AES_256_GCM_SHA256 right now.
|
|
if (cipherSuite != CipherSuite::CIPHERSUITE_ECDHE_HKDF_ECDSA_WITH_AES_256_GCM_SHA256) {
|
|
return ndk::ScopedAStatus(AStatus_fromServiceSpecificErrorWithMessage(
|
|
IIdentityCredentialStore::STATUS_CIPHER_SUITE_NOT_SUPPORTED,
|
|
"Unsupported cipher suite"));
|
|
}
|
|
|
|
shared_ptr<IdentityCredential> credential = ndk::SharedRefBase::make<IdentityCredential>(
|
|
hwProxyFactory_, credentialData, nullptr /* session */, hardwareInformation_);
|
|
auto ret = credential->initialize();
|
|
if (ret != IIdentityCredentialStore::STATUS_OK) {
|
|
return ndk::ScopedAStatus(AStatus_fromServiceSpecificErrorWithMessage(
|
|
int(ret), "Error initializing IdentityCredential"));
|
|
}
|
|
*outCredential = credential;
|
|
return ndk::ScopedAStatus::ok();
|
|
}
|
|
|
|
ndk::ScopedAStatus IdentityCredentialStore::createPresentationSession(
|
|
CipherSuite cipherSuite, shared_ptr<IPresentationSession>* outSession) {
|
|
// We only support CIPHERSUITE_ECDHE_HKDF_ECDSA_WITH_AES_256_GCM_SHA256 right now.
|
|
if (cipherSuite != CipherSuite::CIPHERSUITE_ECDHE_HKDF_ECDSA_WITH_AES_256_GCM_SHA256) {
|
|
return ndk::ScopedAStatus(AStatus_fromServiceSpecificErrorWithMessage(
|
|
IIdentityCredentialStore::STATUS_CIPHER_SUITE_NOT_SUPPORTED,
|
|
"Unsupported cipher suite"));
|
|
}
|
|
|
|
sp<SecureHardwareSessionProxy> hwProxy = hwProxyFactory_->createSessionProxy();
|
|
shared_ptr<PresentationSession> session = ndk::SharedRefBase::make<PresentationSession>(
|
|
hwProxyFactory_, hwProxy, hardwareInformation_);
|
|
auto ret = session->initialize();
|
|
if (ret != IIdentityCredentialStore::STATUS_OK) {
|
|
return ndk::ScopedAStatus(AStatus_fromServiceSpecificErrorWithMessage(
|
|
int(ret), "Error initializing PresentationSession"));
|
|
}
|
|
*outSession = session;
|
|
return ndk::ScopedAStatus::ok();
|
|
}
|
|
|
|
ndk::ScopedAStatus IdentityCredentialStore::getRemotelyProvisionedComponent(
|
|
shared_ptr<IRemotelyProvisionedComponent>* outRemotelyProvisionedComponent) {
|
|
if (!remotelyProvisionedComponentName_) {
|
|
return ndk::ScopedAStatus(AStatus_fromExceptionCodeWithMessage(
|
|
EX_UNSUPPORTED_OPERATION, "Remote key provisioning is not supported"));
|
|
}
|
|
|
|
ndk::SpAIBinder binder(
|
|
AServiceManager_waitForService(remotelyProvisionedComponentName_->c_str()));
|
|
if (binder.get() == nullptr) {
|
|
return ndk::ScopedAStatus(AStatus_fromServiceSpecificErrorWithMessage(
|
|
IIdentityCredentialStore::STATUS_FAILED,
|
|
"Unable to get remotely provisioned component"));
|
|
}
|
|
|
|
*outRemotelyProvisionedComponent = IRemotelyProvisionedComponent::fromBinder(binder);
|
|
return ndk::ScopedAStatus::ok();
|
|
}
|
|
|
|
} // namespace aidl::android::hardware::identity
|