2015-01-29 19:53:19 +01:00
|
|
|
/*
|
|
|
|
* Copyright (C) 2015 The Android Open Source Project
|
|
|
|
*
|
|
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
* you may not use this file except in compliance with the License.
|
|
|
|
* You may obtain a copy of the License at
|
|
|
|
*
|
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
*
|
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
* See the License for the specific language governing permissions and
|
|
|
|
* limitations under the License.
|
|
|
|
*/
|
|
|
|
|
2015-03-20 02:58:58 +01:00
|
|
|
#ifndef ANDROID_HARDWARE_GATEKEEPER_H
|
|
|
|
#define ANDROID_HARDWARE_GATEKEEPER_H
|
2015-01-29 19:53:19 +01:00
|
|
|
|
|
|
|
#include <sys/cdefs.h>
|
|
|
|
#include <sys/types.h>
|
|
|
|
#include <hardware/hardware.h>
|
|
|
|
|
|
|
|
__BEGIN_DECLS
|
|
|
|
|
2015-03-20 02:58:58 +01:00
|
|
|
#define GATEKEEPER_HARDWARE_MODULE_ID "gatekeeper"
|
2015-01-29 19:53:19 +01:00
|
|
|
|
2015-03-20 02:58:58 +01:00
|
|
|
#define GATEKEEPER_MODULE_API_VERSION_0_1 HARDWARE_MODULE_API_VERSION(0, 1)
|
2015-01-29 19:53:19 +01:00
|
|
|
|
2015-03-20 02:58:58 +01:00
|
|
|
#define HARDWARE_GATEKEEPER "gatekeeper"
|
2015-01-29 19:53:19 +01:00
|
|
|
|
2015-03-20 02:58:58 +01:00
|
|
|
struct gatekeeper_module {
|
2015-01-29 19:53:19 +01:00
|
|
|
/**
|
2015-03-20 02:58:58 +01:00
|
|
|
* Comon methods of the gatekeeper module. This *must* be the first member of
|
|
|
|
* gatekeeper_module as users of this structure will cast a hw_module_t to
|
|
|
|
* a gatekeeper_module pointer in the appropriate context.
|
2015-01-29 19:53:19 +01:00
|
|
|
*/
|
|
|
|
hw_module_t common;
|
|
|
|
};
|
|
|
|
|
2015-03-20 02:58:58 +01:00
|
|
|
struct gatekeeper_device {
|
2015-01-29 19:53:19 +01:00
|
|
|
/**
|
2015-03-20 02:58:58 +01:00
|
|
|
* Common methods of the gatekeeper device. As above, this must be the first
|
2015-01-29 19:53:19 +01:00
|
|
|
* member of keymaster_device.
|
|
|
|
*/
|
|
|
|
hw_device_t common;
|
|
|
|
|
|
|
|
/**
|
2015-03-19 16:40:41 +01:00
|
|
|
* Enrolls desired_password, which should be derived from a user selected pin or password,
|
2015-01-29 19:53:19 +01:00
|
|
|
* with the authentication factor private key used only for enrolling authentication
|
|
|
|
* factor data.
|
|
|
|
*
|
2015-03-19 16:40:41 +01:00
|
|
|
* If there was already a password enrolled, it should be provided in
|
|
|
|
* current_password_handle, along with the current password in current_password
|
|
|
|
* that should validate against current_password_handle.
|
|
|
|
*
|
2015-03-31 01:51:50 +02:00
|
|
|
* Parameters:
|
|
|
|
* - dev: pointer to gatekeeper_device acquired via calls to gatekeeper_open
|
|
|
|
* - uid: the Android user identifier
|
|
|
|
*
|
|
|
|
* - current_password_handle: the currently enrolled password handle the user
|
|
|
|
* wants to replace. May be null if there's no currently enrolled password.
|
|
|
|
* - current_password_handle_length: the length in bytes of the buffer pointed
|
|
|
|
* at by current_password_handle. Must be 0 if current_password_handle is NULL.
|
|
|
|
*
|
|
|
|
* - current_password: the user's current password in plain text. If presented,
|
|
|
|
* it MUST verify against current_password_handle.
|
|
|
|
* - current_password_length: the size in bytes of the buffer pointed at by
|
|
|
|
* current_password. Must be 0 if the current_password is NULL.
|
|
|
|
*
|
|
|
|
* - desired_password: the new password the user wishes to enroll in plain-text.
|
|
|
|
* Cannot be NULL.
|
|
|
|
* - desired_password_length: the length in bytes of the buffer pointed at by
|
|
|
|
* desired_password.
|
|
|
|
*
|
|
|
|
* - enrolled_password_handle: on success, a buffer will be allocated with the
|
|
|
|
* new password handle referencing the password provided in desired_password.
|
|
|
|
* This buffer can be used on subsequent calls to enroll or verify.
|
2015-05-21 20:11:57 +02:00
|
|
|
* The caller is responsible for deallocating this buffer via a call to delete[]
|
2015-03-31 01:51:50 +02:00
|
|
|
* - enrolled_password_handle_length: pointer to the length in bytes of the buffer allocated
|
|
|
|
* by this function and pointed to by *enrolled_password_handle_length.
|
|
|
|
*
|
2015-05-14 22:08:15 +02:00
|
|
|
* Returns:
|
|
|
|
* - 0 on success
|
|
|
|
* - An error code < 0 on failure, or
|
|
|
|
* - A timeout value T > 0 if the call should not be re-attempted until T milliseconds
|
|
|
|
* have elapsed.
|
|
|
|
*
|
2015-01-29 19:53:19 +01:00
|
|
|
* On error, enrolled_password_handle will not be allocated.
|
|
|
|
*/
|
2015-03-20 02:58:58 +01:00
|
|
|
int (*enroll)(const struct gatekeeper_device *dev, uint32_t uid,
|
2015-03-31 01:51:50 +02:00
|
|
|
const uint8_t *current_password_handle, uint32_t current_password_handle_length,
|
|
|
|
const uint8_t *current_password, uint32_t current_password_length,
|
|
|
|
const uint8_t *desired_password, uint32_t desired_password_length,
|
|
|
|
uint8_t **enrolled_password_handle, uint32_t *enrolled_password_handle_length);
|
2015-01-29 19:53:19 +01:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Verifies provided_password matches enrolled_password_handle.
|
|
|
|
*
|
|
|
|
* Implementations of this module may retain the result of this call
|
|
|
|
* to attest to the recency of authentication.
|
|
|
|
*
|
2015-03-19 16:40:41 +01:00
|
|
|
* On success, writes the address of a verification token to auth_token,
|
2015-01-29 19:53:19 +01:00
|
|
|
* usable to attest password verification to other trusted services. Clients
|
|
|
|
* may pass NULL for this value.
|
|
|
|
*
|
2015-03-31 01:51:50 +02:00
|
|
|
* Parameters:
|
|
|
|
* - dev: pointer to gatekeeper_device acquired via calls to gatekeeper_open
|
|
|
|
* - uid: the Android user identifier
|
|
|
|
*
|
2015-04-10 04:17:40 +02:00
|
|
|
* - challenge: An optional challenge to authenticate against, or 0. Used when a separate
|
|
|
|
* authenticator requests password verification, or for transactional
|
|
|
|
* password authentication.
|
|
|
|
*
|
2015-03-31 01:51:50 +02:00
|
|
|
* - enrolled_password_handle: the currently enrolled password handle that the
|
|
|
|
* user wishes to verify against.
|
|
|
|
* - enrolled_password_handle_length: the length in bytes of the buffer pointed
|
|
|
|
* to by enrolled_password_handle
|
|
|
|
*
|
|
|
|
* - provided_password: the plaintext password to be verified against the
|
|
|
|
* enrolled_password_handle
|
|
|
|
* - provided_password_length: the length in bytes of the buffer pointed to by
|
|
|
|
* provided_password
|
|
|
|
*
|
|
|
|
* - auth_token: on success, a buffer containing the authentication token
|
|
|
|
* resulting from this verification is assigned to *auth_token. The caller
|
2015-05-21 20:11:57 +02:00
|
|
|
* is responsible for deallocating this memory via a call to delete[]
|
2015-03-31 01:51:50 +02:00
|
|
|
* - auth_token_length: on success, the length in bytes of the authentication
|
|
|
|
* token assigned to *auth_token will be assigned to *auth_token_length
|
|
|
|
*
|
2015-05-21 20:11:57 +02:00
|
|
|
* - request_reenroll: a request to the upper layers to re-enroll the verified
|
|
|
|
* password due to a version change. Not set if verification fails.
|
|
|
|
*
|
2015-05-14 22:08:15 +02:00
|
|
|
* Returns:
|
|
|
|
* - 0 on success
|
|
|
|
* - An error code < 0 on failure, or
|
|
|
|
* - A timeout value T > 0 if the call should not be re-attempted until T milliseconds
|
|
|
|
* have elapsed.
|
2015-03-31 01:51:50 +02:00
|
|
|
* On error, auth token will not be allocated
|
2015-01-29 19:53:19 +01:00
|
|
|
*/
|
2015-04-10 04:17:40 +02:00
|
|
|
int (*verify)(const struct gatekeeper_device *dev, uint32_t uid, uint64_t challenge,
|
2015-03-31 01:51:50 +02:00
|
|
|
const uint8_t *enrolled_password_handle, uint32_t enrolled_password_handle_length,
|
|
|
|
const uint8_t *provided_password, uint32_t provided_password_length,
|
2015-05-21 20:11:57 +02:00
|
|
|
uint8_t **auth_token, uint32_t *auth_token_length, bool *request_reenroll);
|
2015-01-29 19:53:19 +01:00
|
|
|
|
2015-06-23 02:47:18 +02:00
|
|
|
/*
|
|
|
|
* Deletes the enrolled_password_handle associated wth the uid. Once deleted
|
|
|
|
* the user cannot be verified anymore.
|
|
|
|
* This function is optional and should be set to NULL if it is not implemented.
|
|
|
|
*
|
|
|
|
* Parameters
|
|
|
|
* - dev: pointer to gatekeeper_device acquired via calls to gatekeeper_open
|
|
|
|
* - uid: the Android user identifier
|
|
|
|
*
|
|
|
|
* Returns:
|
|
|
|
* - 0 on success
|
|
|
|
* - An error code < 0 on failure
|
|
|
|
*/
|
|
|
|
int (*delete_user)(const struct gatekeeper_device *dev, uint32_t uid);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Deletes all the enrolled_password_handles for all uid's. Once called,
|
|
|
|
* no users will be enrolled on the device.
|
|
|
|
* This function is optional and should be set to NULL if it is not implemented.
|
|
|
|
*
|
|
|
|
* Parameters
|
|
|
|
* - dev: pointer to gatekeeper_device acquired via calls to gatekeeper_open
|
|
|
|
*
|
|
|
|
* Returns:
|
|
|
|
* - 0 on success
|
|
|
|
* - An error code < 0 on failure
|
|
|
|
*/
|
|
|
|
int (*delete_all_users)(const struct gatekeeper_device *dev);
|
2015-01-29 19:53:19 +01:00
|
|
|
};
|
2015-06-23 02:47:18 +02:00
|
|
|
|
2015-03-20 02:58:58 +01:00
|
|
|
typedef struct gatekeeper_device gatekeeper_device_t;
|
2015-01-29 19:53:19 +01:00
|
|
|
|
2015-03-20 02:58:58 +01:00
|
|
|
static inline int gatekeeper_open(const struct hw_module_t *module,
|
|
|
|
gatekeeper_device_t **device) {
|
|
|
|
return module->methods->open(module, HARDWARE_GATEKEEPER,
|
2015-01-29 19:53:19 +01:00
|
|
|
(struct hw_device_t **) device);
|
|
|
|
}
|
|
|
|
|
2015-03-20 02:58:58 +01:00
|
|
|
static inline int gatekeeper_close(gatekeeper_device_t *device) {
|
2015-01-29 19:53:19 +01:00
|
|
|
return device->common.close(&device->common);
|
|
|
|
}
|
|
|
|
|
|
|
|
__END_DECLS
|
|
|
|
|
2015-03-20 02:58:58 +01:00
|
|
|
#endif // ANDROID_HARDWARE_GATEKEEPER_H
|