blob: 951b57f6aaac7276aa233cb934beb2e89d9a7041 [file] [log] [blame]
Alice Wangfb46ee12022-09-30 13:08:52 +00001/*
2 * Copyright (C) 2022 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17#pragma once
18
Andrew Scull102067a2022-10-07 00:34:40 +000019#include <stdbool.h>
20#include <stddef.h>
Alan Stokes88805d52022-12-16 16:07:33 +000021#include <stdint.h>
Alan Stokese0945ad2022-11-24 13:29:57 +000022#include <stdnoreturn.h>
Alan Stokesd4ea5a82022-11-10 12:17:42 +000023#include <sys/cdefs.h>
Andrew Scull102067a2022-10-07 00:34:40 +000024
Alan Stokes52d3c722022-10-04 17:27:13 +010025#include "vm_main.h"
26
Alan Stokesd4ea5a82022-11-10 12:17:42 +000027__BEGIN_DECLS
Alice Wangfb46ee12022-09-30 13:08:52 +000028
Alice Wang2be64f32022-10-13 14:37:35 +000029struct AIBinder;
30typedef struct AIBinder AIBinder;
31
Andrew Sculld64ae7d2022-10-05 17:41:43 +000032/**
Alice Wang4e3015d2023-10-10 09:35:37 +000033 * Introduced in API 35.
34 * Remote attestation result if the attestation succeeds.
35 */
36struct AVmAttestationResult;
37
38/**
39 * Introduced in API 35.
40 * Remote attestation status types returned from remote attestation functions.
41 */
42typedef enum attestation_status_t : int32_t {
43 /** The remote attestation completes successfully. */
44 ATTESTATION_OK = 0,
45
Alice Wang4e3015d2023-10-10 09:35:37 +000046 /** The challenge size is not between 0 and 64. */
47 ATTESTATION_ERROR_INVALID_CHALLENGE = -10001,
Alice Wang677a5b82023-11-09 08:21:59 +000048
49 /** Failed to attest the VM. Please retry at a later time. */
50 ATTESTATION_ERROR_ATTESTATION_FAILED = -10002,
51
52 /** Remote attestation is not supported in the current environment. */
53 ATTESTATION_ERROR_UNSUPPORTED = -10003,
Alice Wang4e3015d2023-10-10 09:35:37 +000054} attestation_status_t;
55
56/**
Andrew Sculld64ae7d2022-10-05 17:41:43 +000057 * Notifies the host that the payload is ready.
Andrew Scull655e98e2022-10-10 22:24:58 +000058 *
Alan Stokes65bbb912022-11-23 09:39:34 +000059 * If the host app has set a `VirtualMachineCallback` for the VM, its
60 * `onPayloadReady` method will be called.
61 *
62 * Note that subsequent calls to this function after the first have no effect;
63 * `onPayloadReady` is never called more than once.
Andrew Sculld64ae7d2022-10-05 17:41:43 +000064 */
Alan Stokes65bbb912022-11-23 09:39:34 +000065void AVmPayload_notifyPayloadReady(void);
Alice Wangfb46ee12022-09-30 13:08:52 +000066
Andrew Sculld64ae7d2022-10-05 17:41:43 +000067/**
Alice Wang2be64f32022-10-13 14:37:35 +000068 * Runs a binder RPC server, serving the supplied binder service implementation on the given vsock
69 * port.
70 *
71 * If and when the server is ready for connections (it is listening on the port), `on_ready` is
72 * called to allow appropriate action to be taken - e.g. to notify clients that they may now
73 * attempt to connect with `AVmPayload_notifyPayloadReady`.
74 *
Alan Stokese0945ad2022-11-24 13:29:57 +000075 * Note that this function does not return. The calling thread joins the binder
76 * thread pool to handle incoming messages.
Alice Wang2be64f32022-10-13 14:37:35 +000077 *
78 * \param service the service to bind to the given port.
79 * \param port vsock port.
Alan Stokes88805d52022-12-16 16:07:33 +000080 * \param on_ready the callback to execute once the server is ready for connections. If not null the
81 * callback will be called at most once.
82 * \param param parameter to be passed to the `on_ready` callback.
Alice Wang2be64f32022-10-13 14:37:35 +000083 */
Alan Stokes88805d52022-12-16 16:07:33 +000084noreturn void AVmPayload_runVsockRpcServer(AIBinder* _Nonnull service, uint32_t port,
85 void (*_Nullable on_ready)(void* _Nullable param),
86 void* _Nullable param);
Alice Wang2be64f32022-10-13 14:37:35 +000087
88/**
Alan Stokes6979b5f2023-01-04 15:41:39 +000089 * Returns all or part of a 32-byte secret that is bound to this unique VM
90 * instance and the supplied identifier. The secret can be used e.g. as an
91 * encryption key.
92 *
93 * Every VM has a secret that is derived from a device-specific value known to
94 * the hypervisor, the code that runs in the VM and its non-modifiable
95 * configuration; it is not made available to the host OS.
96 *
97 * This function performs a further derivation from the VM secret and the
98 * supplied identifier. As long as the VM identity doesn't change the same value
99 * will be returned for the same identifier, even if the VM is stopped &
100 * restarted or the device rebooted.
101 *
102 * If multiple secrets are required for different purposes, a different
103 * identifier should be used for each. The identifiers otherwise are arbitrary
104 * byte sequences and do not need to be kept secret; typically they are
105 * hardcoded in the calling code.
Andrew Scull102067a2022-10-07 00:34:40 +0000106 *
107 * \param identifier identifier of the secret to return.
108 * \param identifier_size size of the secret identifier.
109 * \param secret pointer to size bytes where the secret is written.
Alan Stokes65bbb912022-11-23 09:39:34 +0000110 * \param size number of bytes of the secret to get, <= 32.
Andrew Scull102067a2022-10-07 00:34:40 +0000111 */
Alan Stokes88805d52022-12-16 16:07:33 +0000112void AVmPayload_getVmInstanceSecret(const void* _Nonnull identifier, size_t identifier_size,
113 void* _Nonnull secret, size_t size);
Andrew Scull102067a2022-10-07 00:34:40 +0000114
115/**
Alice Wang6bbb6da2022-10-26 12:44:06 +0000116 * Gets the path to the APK contents. It is a directory, under which are
117 * the unzipped contents of the APK containing the payload, all read-only
118 * but accessible to the payload.
119 *
120 * \return the path to the APK contents. The returned string should not be
121 * deleted or freed by the application. The string remains valid for the
122 * lifetime of the VM.
123 */
Alan Stokes88805d52022-12-16 16:07:33 +0000124const char* _Nonnull AVmPayload_getApkContentsPath(void);
Alice Wang6bbb6da2022-10-26 12:44:06 +0000125
Alan Stokes78d24702022-11-21 15:28:31 +0000126/**
127 * Gets the path to the encrypted persistent storage for the VM, if any. This is
128 * a directory under which any files or directories created will be stored on
129 * behalf of the VM by the host app. All data is encrypted using a key known
130 * only to the VM, so the host cannot decrypt it, but may delete it.
131 *
Alan Stokes159d3d62023-09-07 16:24:20 +0100132 * \return the path to the encrypted storage directory, or NULL if no encrypted
133 * storage was requested in the VM configuration. If non-null the returned
134 * string should not be deleted or freed by the application and remains valid
135 * for the lifetime of the VM.
Alan Stokes78d24702022-11-21 15:28:31 +0000136 */
Alan Stokes88805d52022-12-16 16:07:33 +0000137const char* _Nullable AVmPayload_getEncryptedStoragePath(void);
Alan Stokes78d24702022-11-21 15:28:31 +0000138
Alice Wang4e3015d2023-10-10 09:35:37 +0000139/**
140 * Requests the remote attestation of the client VM.
141 *
142 * The challenge will be included in the certificate chain in the attestation result,
143 * serving as proof of the freshness of the result.
144 *
145 * \param challenge A pointer to the challenge buffer.
146 * \param challenge_size size of the challenge. The maximum supported challenge size is
147 * 64 bytes. The status ATTESTATION_ERROR_INVALID_CHALLENGE will be returned if
148 * an invalid challenge is passed.
149 * \param result The remote attestation result will be filled here if the attestation
150 * succeeds. The result remains valid until it is freed with
151 * `AVmPayload_freeAttestationResult`.
152 *
153 * \return ATTESTATION_OK upon successful attestation.
154 */
155attestation_status_t AVmPayload_requestAttestation(
156 const void* _Nonnull challenge, size_t challenge_size,
157 struct AVmAttestationResult* _Nullable* _Nonnull result) __INTRODUCED_IN(__ANDROID_API_V__);
158
159/**
160 * Converts the return value from `AVmPayload_requestAttestation` to a text string
161 * representing the status code.
162 *
163 * \return a constant string value representing the status code. The string should not
164 * be deleted or freed by the application and remains valid for the lifetime of the VM.
165 */
166const char* _Nonnull AVmAttestationResult_resultToString(attestation_status_t status)
167 __INTRODUCED_IN(__ANDROID_API_V__);
168
169/**
170 * Frees all the data owned by the provided attestation result, including the result itself.
171 *
172 * Callers should ensure to invoke this API only once on a valid attestation result
173 * returned by `AVmPayload_requestAttestation` to avoid undefined behavior.
174 *
175 * \param result A pointer to the attestation result.
176 */
177void AVmAttestationResult_free(struct AVmAttestationResult* _Nullable result)
178 __INTRODUCED_IN(__ANDROID_API_V__);
179
180/**
181 * Reads the DER-encoded ECPrivateKey structure specified in [RFC 5915 s3] for the
182 * EC P-256 private key from the provided attestation result.
183 *
184 * \param result A pointer to the attestation result filled in
185 * `AVmPayload_requestAttestation` when the attestation succeeds.
186 * \param data A pointer to the memory where the private key will be written
187 * (can be null if size is 0).
188 * \param size The maximum number of bytes that can be written to the data buffer.
189 * If `size` is smaller than the total size of the private key, the key data will be
190 * truncated to this `size`.
191 *
192 * \return The total size of the private key.
193 *
194 * [RFC 5915 s3]: https://datatracker.ietf.org/doc/html/rfc5915#section-3
195 */
196size_t AVmAttestationResult_getPrivateKey(const struct AVmAttestationResult* _Nonnull result,
197 void* _Nullable data, size_t size)
198 __INTRODUCED_IN(__ANDROID_API_V__);
199
200/**
201 * Signs the given message using ECDSA P-256, the message is first hashed with SHA-256 and
202 * then it is signed with the attested EC P-256 private key in the attestation result.
203 *
204 * \param result A pointer to the attestation result filled in
205 * `AVmPayload_requestAttestation` when the attestation succeeds.
206 * \param message A pointer to the message buffer.
207 * \param message_size size of the message.
208 * \param data A pointer to the memory where the signature will be written
209 * (can be null if size is 0). The signature is a DER-encoded ECDSASignature structure
210 * detailed in the [RFC 6979].
211 * \param size The maximum number of bytes that can be written to the data buffer.
212 * If `size` is smaller than the total size of the signature, the signature will be
213 * truncated to this `size`.
214 *
215 * \return The total size of the signature.
216 *
217 * [RFC 6979]: https://datatracker.ietf.org/doc/html/rfc6979
218 */
219size_t AVmAttestationResult_sign(const struct AVmAttestationResult* _Nonnull result,
220 const void* _Nonnull message, size_t message_size,
221 void* _Nullable data, size_t size)
222 __INTRODUCED_IN(__ANDROID_API_V__);
223
224/**
225 * Gets the number of certificates in the certificate chain.
226 *
227 * The certificate chain consists of a sequence of DER-encoded X.509 certificates that form
228 * the attestation key's certificate chain. It starts with a root certificate and ends with a
229 * leaf certificate covering the attested public key.
230 *
231 * \param result A pointer to the attestation result obtained from `AVmPayload_requestAttestation`
232 * when the attestation succeeds.
233 *
234 * \return The number of certificates in the certificate chain.
235 */
236size_t AVmAttestationResult_getCertificateCount(const struct AVmAttestationResult* _Nonnull result)
237 __INTRODUCED_IN(__ANDROID_API_V__);
238
239/**
240 * Retrieves the certificate at the given `index` from the certificate chain in the provided
241 * attestation result.
242 *
243 * The certificate chain consists of a sequence of DER-encoded X.509 certificates that form
244 * the attestation key's certificate chain. It starts with a root certificate and ends with a
245 * leaf certificate covering the attested public key.
246 *
247 * \param result A pointer to the attestation result obtained from `AVmPayload_requestAttestation`
248 * when the attestation succeeds.
249 * \param index Index of the certificate to retrieve. The `index` must be within the range of
250 * [0, number of certificates). The number of certificates can be obtained with
251 * `AVmAttestationResult_getCertificateCount`.
252 * \param data A pointer to the memory where the certificate will be written
253 * (can be null if size is 0).
254 * \param size The maximum number of bytes that can be written to the data buffer. If `size`
255 * is smaller than the total size of the certificate, the certificate will be
256 * truncated to this `size`.
257 *
258 * \return The total size of the certificate at the given `index`.
259 */
260size_t AVmAttestationResult_getCertificateAt(const struct AVmAttestationResult* _Nonnull result,
261 size_t index, void* _Nullable data, size_t size)
262 __INTRODUCED_IN(__ANDROID_API_V__);
263
Alan Stokesd4ea5a82022-11-10 12:17:42 +0000264__END_DECLS