ce223a5c6f
Bug: 235265072 Test: VtsHalRemotelyProvisionedComponentTargetTest Change-Id: If0ea94710d0d0e18020a0a4b9c05ef915bbf61fa
299 lines
11 KiB
C++
299 lines
11 KiB
C++
/*
|
|
* Copyright 2018 The Android Open Source Project
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*/
|
|
|
|
#define LOG_TAG "trusty_keymaster_hal"
|
|
#include <android-base/logging.h>
|
|
|
|
#include <keymaster/android_keymaster_messages.h>
|
|
#include <keymaster/keymaster_configuration.h>
|
|
#include <trusty_keymaster/TrustyKeymaster.h>
|
|
#include <trusty_keymaster/ipc/trusty_keymaster_ipc.h>
|
|
|
|
namespace keymaster {
|
|
|
|
int TrustyKeymaster::Initialize(KmVersion version) {
|
|
int err;
|
|
|
|
LOG(INFO) << "Initializing TrustyKeymaster as KmVersion: " << (int)version;
|
|
|
|
err = trusty_keymaster_connect();
|
|
if (err) {
|
|
LOG(ERROR) << "Failed to connect to trusty keymaster (1st try)" << err;
|
|
return err;
|
|
}
|
|
|
|
// Try GetVersion2 first.
|
|
GetVersion2Request versionReq;
|
|
versionReq.max_message_version = MessageVersion(version);
|
|
GetVersion2Response versionRsp = GetVersion2(versionReq);
|
|
if (versionRsp.error != KM_ERROR_OK) {
|
|
LOG(WARNING) << "TA appears not to support GetVersion2, falling back (err = "
|
|
<< versionRsp.error << ")";
|
|
|
|
err = trusty_keymaster_connect();
|
|
if (err) {
|
|
LOG(FATAL) << "Failed to connect to trusty keymaster (2nd try) " << err;
|
|
return err;
|
|
}
|
|
|
|
GetVersionRequest versionReq;
|
|
GetVersionResponse versionRsp;
|
|
GetVersion(versionReq, &versionRsp);
|
|
if (versionRsp.error != KM_ERROR_OK) {
|
|
LOG(FATAL) << "Failed to get TA version " << versionRsp.error;
|
|
return -1;
|
|
} else {
|
|
keymaster_error_t error;
|
|
message_version_ = NegotiateMessageVersion(versionRsp, &error);
|
|
if (error != KM_ERROR_OK) {
|
|
LOG(FATAL) << "Failed to negotiate message version " << error;
|
|
return -1;
|
|
}
|
|
}
|
|
} else {
|
|
message_version_ = NegotiateMessageVersion(versionReq, versionRsp);
|
|
}
|
|
|
|
ConfigureRequest req(message_version());
|
|
req.os_version = GetOsVersion();
|
|
req.os_patchlevel = GetOsPatchlevel();
|
|
|
|
ConfigureResponse rsp(message_version());
|
|
Configure(req, &rsp);
|
|
|
|
if (rsp.error != KM_ERROR_OK) {
|
|
LOG(FATAL) << "Failed to configure keymaster " << rsp.error;
|
|
return -1;
|
|
}
|
|
|
|
// Set the vendor patchlevel to value retrieved from system property (which
|
|
// requires SELinux permission).
|
|
ConfigureVendorPatchlevelRequest vendor_req(message_version());
|
|
vendor_req.vendor_patchlevel = GetVendorPatchlevel();
|
|
ConfigureVendorPatchlevelResponse vendor_rsp = ConfigureVendorPatchlevel(vendor_req);
|
|
if (vendor_rsp.error != KM_ERROR_OK) {
|
|
LOG(ERROR) << "Failed to configure keymaster vendor patchlevel: " << vendor_rsp.error;
|
|
// Don't fail if this message isn't understood.
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
TrustyKeymaster::TrustyKeymaster() {}
|
|
|
|
TrustyKeymaster::~TrustyKeymaster() {
|
|
trusty_keymaster_disconnect();
|
|
}
|
|
|
|
static void ForwardCommand(enum keymaster_command command, const KeymasterMessage& req,
|
|
KeymasterResponse* rsp) {
|
|
keymaster_error_t err;
|
|
err = trusty_keymaster_send(command, req, rsp);
|
|
if (err != KM_ERROR_OK) {
|
|
LOG(ERROR) << "Cmd " << command << " returned error: " << err;
|
|
rsp->error = err;
|
|
}
|
|
}
|
|
|
|
void TrustyKeymaster::GetVersion(const GetVersionRequest& request, GetVersionResponse* response) {
|
|
ForwardCommand(KM_GET_VERSION, request, response);
|
|
}
|
|
|
|
void TrustyKeymaster::SupportedAlgorithms(const SupportedAlgorithmsRequest& request,
|
|
SupportedAlgorithmsResponse* response) {
|
|
ForwardCommand(KM_GET_SUPPORTED_ALGORITHMS, request, response);
|
|
}
|
|
|
|
void TrustyKeymaster::SupportedBlockModes(const SupportedBlockModesRequest& request,
|
|
SupportedBlockModesResponse* response) {
|
|
ForwardCommand(KM_GET_SUPPORTED_BLOCK_MODES, request, response);
|
|
}
|
|
|
|
void TrustyKeymaster::SupportedPaddingModes(const SupportedPaddingModesRequest& request,
|
|
SupportedPaddingModesResponse* response) {
|
|
ForwardCommand(KM_GET_SUPPORTED_PADDING_MODES, request, response);
|
|
}
|
|
|
|
void TrustyKeymaster::SupportedDigests(const SupportedDigestsRequest& request,
|
|
SupportedDigestsResponse* response) {
|
|
ForwardCommand(KM_GET_SUPPORTED_DIGESTS, request, response);
|
|
}
|
|
|
|
void TrustyKeymaster::SupportedImportFormats(const SupportedImportFormatsRequest& request,
|
|
SupportedImportFormatsResponse* response) {
|
|
ForwardCommand(KM_GET_SUPPORTED_IMPORT_FORMATS, request, response);
|
|
}
|
|
|
|
void TrustyKeymaster::SupportedExportFormats(const SupportedExportFormatsRequest& request,
|
|
SupportedExportFormatsResponse* response) {
|
|
ForwardCommand(KM_GET_SUPPORTED_EXPORT_FORMATS, request, response);
|
|
}
|
|
|
|
void TrustyKeymaster::AddRngEntropy(const AddEntropyRequest& request,
|
|
AddEntropyResponse* response) {
|
|
ForwardCommand(KM_ADD_RNG_ENTROPY, request, response);
|
|
}
|
|
|
|
void TrustyKeymaster::Configure(const ConfigureRequest& request, ConfigureResponse* response) {
|
|
ForwardCommand(KM_CONFIGURE, request, response);
|
|
}
|
|
|
|
void TrustyKeymaster::GenerateKey(const GenerateKeyRequest& request,
|
|
GenerateKeyResponse* response) {
|
|
if (message_version_ < 4) {
|
|
// Pre-KeyMint we need to add TAG_CREATION_DATETIME if not provided by the caller.
|
|
GenerateKeyRequest datedRequest(request.message_version);
|
|
datedRequest.key_description = request.key_description;
|
|
|
|
if (!request.key_description.Contains(TAG_CREATION_DATETIME)) {
|
|
datedRequest.key_description.push_back(TAG_CREATION_DATETIME, java_time(time(NULL)));
|
|
}
|
|
|
|
ForwardCommand(KM_GENERATE_KEY, datedRequest, response);
|
|
} else {
|
|
ForwardCommand(KM_GENERATE_KEY, request, response);
|
|
}
|
|
}
|
|
|
|
void TrustyKeymaster::GenerateRkpKey(const GenerateRkpKeyRequest& request,
|
|
GenerateRkpKeyResponse* response) {
|
|
ForwardCommand(KM_GENERATE_RKP_KEY, request, response);
|
|
}
|
|
|
|
void TrustyKeymaster::GenerateCsr(const GenerateCsrRequest& request,
|
|
GenerateCsrResponse* response) {
|
|
ForwardCommand(KM_GENERATE_CSR, request, response);
|
|
}
|
|
|
|
void TrustyKeymaster::GenerateCsrV2(const GenerateCsrV2Request& request,
|
|
GenerateCsrV2Response* response) {
|
|
ForwardCommand(KM_GENERATE_CSR_V2, request, response);
|
|
}
|
|
|
|
void TrustyKeymaster::GetKeyCharacteristics(const GetKeyCharacteristicsRequest& request,
|
|
GetKeyCharacteristicsResponse* response) {
|
|
ForwardCommand(KM_GET_KEY_CHARACTERISTICS, request, response);
|
|
}
|
|
|
|
void TrustyKeymaster::ImportKey(const ImportKeyRequest& request, ImportKeyResponse* response) {
|
|
ForwardCommand(KM_IMPORT_KEY, request, response);
|
|
}
|
|
|
|
void TrustyKeymaster::ImportWrappedKey(const ImportWrappedKeyRequest& request,
|
|
ImportWrappedKeyResponse* response) {
|
|
ForwardCommand(KM_IMPORT_WRAPPED_KEY, request, response);
|
|
}
|
|
|
|
void TrustyKeymaster::ExportKey(const ExportKeyRequest& request, ExportKeyResponse* response) {
|
|
ForwardCommand(KM_EXPORT_KEY, request, response);
|
|
}
|
|
|
|
void TrustyKeymaster::AttestKey(const AttestKeyRequest& request, AttestKeyResponse* response) {
|
|
ForwardCommand(KM_ATTEST_KEY, request, response);
|
|
}
|
|
|
|
void TrustyKeymaster::UpgradeKey(const UpgradeKeyRequest& request, UpgradeKeyResponse* response) {
|
|
ForwardCommand(KM_UPGRADE_KEY, request, response);
|
|
}
|
|
|
|
void TrustyKeymaster::DeleteKey(const DeleteKeyRequest& request, DeleteKeyResponse* response) {
|
|
ForwardCommand(KM_DELETE_KEY, request, response);
|
|
}
|
|
|
|
void TrustyKeymaster::DeleteAllKeys(const DeleteAllKeysRequest& request,
|
|
DeleteAllKeysResponse* response) {
|
|
ForwardCommand(KM_DELETE_ALL_KEYS, request, response);
|
|
}
|
|
|
|
void TrustyKeymaster::BeginOperation(const BeginOperationRequest& request,
|
|
BeginOperationResponse* response) {
|
|
ForwardCommand(KM_BEGIN_OPERATION, request, response);
|
|
}
|
|
|
|
void TrustyKeymaster::UpdateOperation(const UpdateOperationRequest& request,
|
|
UpdateOperationResponse* response) {
|
|
ForwardCommand(KM_UPDATE_OPERATION, request, response);
|
|
}
|
|
|
|
void TrustyKeymaster::FinishOperation(const FinishOperationRequest& request,
|
|
FinishOperationResponse* response) {
|
|
ForwardCommand(KM_FINISH_OPERATION, request, response);
|
|
}
|
|
|
|
void TrustyKeymaster::AbortOperation(const AbortOperationRequest& request,
|
|
AbortOperationResponse* response) {
|
|
ForwardCommand(KM_ABORT_OPERATION, request, response);
|
|
}
|
|
|
|
GetHmacSharingParametersResponse TrustyKeymaster::GetHmacSharingParameters() {
|
|
GetHmacSharingParametersRequest request(message_version());
|
|
GetHmacSharingParametersResponse response(message_version());
|
|
ForwardCommand(KM_GET_HMAC_SHARING_PARAMETERS, request, &response);
|
|
return response;
|
|
}
|
|
|
|
ComputeSharedHmacResponse TrustyKeymaster::ComputeSharedHmac(
|
|
const ComputeSharedHmacRequest& request) {
|
|
ComputeSharedHmacResponse response(message_version());
|
|
ForwardCommand(KM_COMPUTE_SHARED_HMAC, request, &response);
|
|
return response;
|
|
}
|
|
|
|
VerifyAuthorizationResponse TrustyKeymaster::VerifyAuthorization(
|
|
const VerifyAuthorizationRequest& request) {
|
|
VerifyAuthorizationResponse response(message_version());
|
|
ForwardCommand(KM_VERIFY_AUTHORIZATION, request, &response);
|
|
return response;
|
|
}
|
|
|
|
GetVersion2Response TrustyKeymaster::GetVersion2(const GetVersion2Request& request) {
|
|
GetVersion2Response response(message_version());
|
|
ForwardCommand(KM_GET_VERSION_2, request, &response);
|
|
return response;
|
|
}
|
|
|
|
EarlyBootEndedResponse TrustyKeymaster::EarlyBootEnded() {
|
|
EarlyBootEndedResponse response(message_version());
|
|
ForwardCommand(KM_EARLY_BOOT_ENDED, EarlyBootEndedRequest(message_version()), &response);
|
|
return response;
|
|
}
|
|
|
|
DeviceLockedResponse TrustyKeymaster::DeviceLocked(const DeviceLockedRequest& request) {
|
|
DeviceLockedResponse response(message_version());
|
|
ForwardCommand(KM_DEVICE_LOCKED, request, &response);
|
|
return response;
|
|
}
|
|
|
|
ConfigureVendorPatchlevelResponse TrustyKeymaster::ConfigureVendorPatchlevel(
|
|
const ConfigureVendorPatchlevelRequest& request) {
|
|
ConfigureVendorPatchlevelResponse response(message_version());
|
|
ForwardCommand(KM_CONFIGURE_VENDOR_PATCHLEVEL, request, &response);
|
|
return response;
|
|
}
|
|
|
|
GetRootOfTrustResponse TrustyKeymaster::GetRootOfTrust(const GetRootOfTrustRequest& request) {
|
|
GetRootOfTrustResponse response(message_version());
|
|
ForwardCommand(KM_GET_ROOT_OF_TRUST, request, &response);
|
|
return response;
|
|
}
|
|
|
|
GetHwInfoResponse TrustyKeymaster::GetHwInfo() {
|
|
GetHwInfoResponse response(message_version());
|
|
ForwardCommand(KM_GET_HW_INFO, GetHwInfoRequest(message_version()), &response);
|
|
return response;
|
|
}
|
|
|
|
} // namespace keymaster
|