Roberto Pereira | 2426197 | 2018-07-30 14:54:58 -0700 | [diff] [blame] | 1 | /* |
| 2 | * Copyright 2018 The Android Open Source Project |
| 3 | * |
| 4 | * Licensed under the Apache License, Version 2.0 (the "License"); |
| 5 | * you may not use this file except in compliance with the License. |
| 6 | * You may obtain a copy of the License at |
| 7 | * |
| 8 | * http://www.apache.org/licenses/LICENSE-2.0 |
| 9 | * |
| 10 | * Unless required by applicable law or agreed to in writing, software |
| 11 | * distributed under the License is distributed on an "AS IS" BASIS, |
| 12 | * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 13 | * See the License for the specific language governing permissions and |
| 14 | * limitations under the License. |
| 15 | */ |
| 16 | |
Shawn Willden | fed81d8 | 2021-04-22 13:32:56 -0600 | [diff] [blame] | 17 | #define LOG_TAG "trusty_keymaster_hal" |
| 18 | #include <android-base/logging.h> |
| 19 | |
Roberto Pereira | 2426197 | 2018-07-30 14:54:58 -0700 | [diff] [blame] | 20 | #include <keymaster/android_keymaster_messages.h> |
| 21 | #include <keymaster/keymaster_configuration.h> |
| 22 | #include <trusty_keymaster/TrustyKeymaster.h> |
| 23 | #include <trusty_keymaster/ipc/trusty_keymaster_ipc.h> |
| 24 | |
| 25 | namespace keymaster { |
| 26 | |
Shawn Willden | fed81d8 | 2021-04-22 13:32:56 -0600 | [diff] [blame] | 27 | int TrustyKeymaster::Initialize(KmVersion version) { |
Roberto Pereira | 2426197 | 2018-07-30 14:54:58 -0700 | [diff] [blame] | 28 | int err; |
| 29 | |
Shawn Willden | fed81d8 | 2021-04-22 13:32:56 -0600 | [diff] [blame] | 30 | LOG(INFO) << "Initializing TrustyKeymaster as KmVersion: " << (int)version; |
| 31 | |
Roberto Pereira | 2426197 | 2018-07-30 14:54:58 -0700 | [diff] [blame] | 32 | err = trusty_keymaster_connect(); |
| 33 | if (err) { |
Shawn Willden | fed81d8 | 2021-04-22 13:32:56 -0600 | [diff] [blame] | 34 | LOG(ERROR) << "Failed to connect to trusty keymaster (1st try)" << err; |
Roberto Pereira | 2426197 | 2018-07-30 14:54:58 -0700 | [diff] [blame] | 35 | return err; |
| 36 | } |
| 37 | |
Shawn Willden | 9323f41 | 2021-01-06 19:15:29 +0000 | [diff] [blame] | 38 | // Try GetVersion2 first. |
| 39 | GetVersion2Request versionReq; |
Shawn Willden | fed81d8 | 2021-04-22 13:32:56 -0600 | [diff] [blame] | 40 | versionReq.max_message_version = MessageVersion(version); |
Shawn Willden | 9323f41 | 2021-01-06 19:15:29 +0000 | [diff] [blame] | 41 | GetVersion2Response versionRsp = GetVersion2(versionReq); |
| 42 | if (versionRsp.error != KM_ERROR_OK) { |
Shawn Willden | fed81d8 | 2021-04-22 13:32:56 -0600 | [diff] [blame] | 43 | LOG(WARNING) << "TA appears not to support GetVersion2, falling back (err = " |
| 44 | << versionRsp.error << ")"; |
Shawn Willden | 9323f41 | 2021-01-06 19:15:29 +0000 | [diff] [blame] | 45 | |
Matthew Maurer | c4abbe6 | 2021-01-20 13:19:13 -0800 | [diff] [blame] | 46 | err = trusty_keymaster_connect(); |
| 47 | if (err) { |
Shawn Willden | fed81d8 | 2021-04-22 13:32:56 -0600 | [diff] [blame] | 48 | LOG(FATAL) << "Failed to connect to trusty keymaster (2nd try) " << err; |
Matthew Maurer | c4abbe6 | 2021-01-20 13:19:13 -0800 | [diff] [blame] | 49 | return err; |
| 50 | } |
| 51 | |
Shawn Willden | 9323f41 | 2021-01-06 19:15:29 +0000 | [diff] [blame] | 52 | GetVersionRequest versionReq; |
| 53 | GetVersionResponse versionRsp; |
| 54 | GetVersion(versionReq, &versionRsp); |
| 55 | if (versionRsp.error != KM_ERROR_OK) { |
Shawn Willden | fed81d8 | 2021-04-22 13:32:56 -0600 | [diff] [blame] | 56 | LOG(FATAL) << "Failed to get TA version " << versionRsp.error; |
Shawn Willden | 9323f41 | 2021-01-06 19:15:29 +0000 | [diff] [blame] | 57 | return -1; |
| 58 | } else { |
| 59 | keymaster_error_t error; |
| 60 | message_version_ = NegotiateMessageVersion(versionRsp, &error); |
| 61 | if (error != KM_ERROR_OK) { |
Shawn Willden | fed81d8 | 2021-04-22 13:32:56 -0600 | [diff] [blame] | 62 | LOG(FATAL) << "Failed to negotiate message version " << error; |
Shawn Willden | 9323f41 | 2021-01-06 19:15:29 +0000 | [diff] [blame] | 63 | return -1; |
| 64 | } |
| 65 | } |
| 66 | } else { |
| 67 | message_version_ = NegotiateMessageVersion(versionReq, versionRsp); |
| 68 | } |
| 69 | |
| 70 | ConfigureRequest req(message_version()); |
Roberto Pereira | 2426197 | 2018-07-30 14:54:58 -0700 | [diff] [blame] | 71 | req.os_version = GetOsVersion(); |
| 72 | req.os_patchlevel = GetOsPatchlevel(); |
| 73 | |
Shawn Willden | 9323f41 | 2021-01-06 19:15:29 +0000 | [diff] [blame] | 74 | ConfigureResponse rsp(message_version()); |
Roberto Pereira | 2426197 | 2018-07-30 14:54:58 -0700 | [diff] [blame] | 75 | Configure(req, &rsp); |
| 76 | |
| 77 | if (rsp.error != KM_ERROR_OK) { |
Shawn Willden | fed81d8 | 2021-04-22 13:32:56 -0600 | [diff] [blame] | 78 | LOG(FATAL) << "Failed to configure keymaster " << rsp.error; |
Roberto Pereira | 2426197 | 2018-07-30 14:54:58 -0700 | [diff] [blame] | 79 | return -1; |
| 80 | } |
| 81 | |
David Drysdale | e7697d7 | 2021-07-13 12:17:17 +0100 | [diff] [blame] | 82 | // Set the vendor patchlevel to value retrieved from system property (which |
| 83 | // requires SELinux permission). |
| 84 | ConfigureVendorPatchlevelRequest vendor_req(message_version()); |
| 85 | vendor_req.vendor_patchlevel = GetVendorPatchlevel(); |
| 86 | ConfigureVendorPatchlevelResponse vendor_rsp = ConfigureVendorPatchlevel(vendor_req); |
| 87 | if (vendor_rsp.error != KM_ERROR_OK) { |
| 88 | LOG(ERROR) << "Failed to configure keymaster vendor patchlevel: " << vendor_rsp.error; |
| 89 | // Don't fail if this message isn't understood. |
| 90 | } |
| 91 | |
Roberto Pereira | 2426197 | 2018-07-30 14:54:58 -0700 | [diff] [blame] | 92 | return 0; |
| 93 | } |
| 94 | |
| 95 | TrustyKeymaster::TrustyKeymaster() {} |
| 96 | |
| 97 | TrustyKeymaster::~TrustyKeymaster() { |
| 98 | trusty_keymaster_disconnect(); |
| 99 | } |
| 100 | |
Shawn Willden | 9323f41 | 2021-01-06 19:15:29 +0000 | [diff] [blame] | 101 | static void ForwardCommand(enum keymaster_command command, const KeymasterMessage& req, |
Roberto Pereira | 2426197 | 2018-07-30 14:54:58 -0700 | [diff] [blame] | 102 | KeymasterResponse* rsp) { |
| 103 | keymaster_error_t err; |
| 104 | err = trusty_keymaster_send(command, req, rsp); |
| 105 | if (err != KM_ERROR_OK) { |
Shawn Willden | fed81d8 | 2021-04-22 13:32:56 -0600 | [diff] [blame] | 106 | LOG(ERROR) << "Cmd " << command << " returned error: " << err; |
Roberto Pereira | 2426197 | 2018-07-30 14:54:58 -0700 | [diff] [blame] | 107 | rsp->error = err; |
| 108 | } |
| 109 | } |
| 110 | |
| 111 | void TrustyKeymaster::GetVersion(const GetVersionRequest& request, GetVersionResponse* response) { |
| 112 | ForwardCommand(KM_GET_VERSION, request, response); |
| 113 | } |
| 114 | |
Jim Blackler | fc6e3d3 | 2021-10-11 13:38:59 +0000 | [diff] [blame] | 115 | void TrustyKeymaster::SupportedAlgorithms(const SupportedAlgorithmsRequest& request, |
| 116 | SupportedAlgorithmsResponse* response) { |
| 117 | ForwardCommand(KM_GET_SUPPORTED_ALGORITHMS, request, response); |
| 118 | } |
| 119 | |
| 120 | void TrustyKeymaster::SupportedBlockModes(const SupportedBlockModesRequest& request, |
| 121 | SupportedBlockModesResponse* response) { |
| 122 | ForwardCommand(KM_GET_SUPPORTED_BLOCK_MODES, request, response); |
| 123 | } |
| 124 | |
| 125 | void TrustyKeymaster::SupportedPaddingModes(const SupportedPaddingModesRequest& request, |
| 126 | SupportedPaddingModesResponse* response) { |
| 127 | ForwardCommand(KM_GET_SUPPORTED_PADDING_MODES, request, response); |
| 128 | } |
| 129 | |
| 130 | void TrustyKeymaster::SupportedDigests(const SupportedDigestsRequest& request, |
| 131 | SupportedDigestsResponse* response) { |
| 132 | ForwardCommand(KM_GET_SUPPORTED_DIGESTS, request, response); |
| 133 | } |
| 134 | |
| 135 | void TrustyKeymaster::SupportedImportFormats(const SupportedImportFormatsRequest& request, |
| 136 | SupportedImportFormatsResponse* response) { |
| 137 | ForwardCommand(KM_GET_SUPPORTED_IMPORT_FORMATS, request, response); |
| 138 | } |
| 139 | |
| 140 | void TrustyKeymaster::SupportedExportFormats(const SupportedExportFormatsRequest& request, |
| 141 | SupportedExportFormatsResponse* response) { |
| 142 | ForwardCommand(KM_GET_SUPPORTED_EXPORT_FORMATS, request, response); |
| 143 | } |
| 144 | |
Roberto Pereira | 2426197 | 2018-07-30 14:54:58 -0700 | [diff] [blame] | 145 | void TrustyKeymaster::AddRngEntropy(const AddEntropyRequest& request, |
| 146 | AddEntropyResponse* response) { |
| 147 | ForwardCommand(KM_ADD_RNG_ENTROPY, request, response); |
| 148 | } |
| 149 | |
| 150 | void TrustyKeymaster::Configure(const ConfigureRequest& request, ConfigureResponse* response) { |
| 151 | ForwardCommand(KM_CONFIGURE, request, response); |
| 152 | } |
| 153 | |
| 154 | void TrustyKeymaster::GenerateKey(const GenerateKeyRequest& request, |
| 155 | GenerateKeyResponse* response) { |
Shawn Willden | fed81d8 | 2021-04-22 13:32:56 -0600 | [diff] [blame] | 156 | if (message_version_ < 4) { |
| 157 | // Pre-KeyMint we need to add TAG_CREATION_DATETIME if not provided by the caller. |
| 158 | GenerateKeyRequest datedRequest(request.message_version); |
| 159 | datedRequest.key_description = request.key_description; |
Roberto Pereira | 2426197 | 2018-07-30 14:54:58 -0700 | [diff] [blame] | 160 | |
Shawn Willden | fed81d8 | 2021-04-22 13:32:56 -0600 | [diff] [blame] | 161 | if (!request.key_description.Contains(TAG_CREATION_DATETIME)) { |
| 162 | datedRequest.key_description.push_back(TAG_CREATION_DATETIME, java_time(time(NULL))); |
| 163 | } |
| 164 | |
| 165 | ForwardCommand(KM_GENERATE_KEY, datedRequest, response); |
| 166 | } else { |
| 167 | ForwardCommand(KM_GENERATE_KEY, request, response); |
Roberto Pereira | 2426197 | 2018-07-30 14:54:58 -0700 | [diff] [blame] | 168 | } |
Roberto Pereira | 2426197 | 2018-07-30 14:54:58 -0700 | [diff] [blame] | 169 | } |
| 170 | |
Max Bires | 95b5b04 | 2021-06-09 17:40:54 -0700 | [diff] [blame] | 171 | void TrustyKeymaster::GenerateRkpKey(const GenerateRkpKeyRequest& request, |
| 172 | GenerateRkpKeyResponse* response) { |
| 173 | ForwardCommand(KM_GENERATE_RKP_KEY, request, response); |
| 174 | } |
| 175 | |
| 176 | void TrustyKeymaster::GenerateCsr(const GenerateCsrRequest& request, |
| 177 | GenerateCsrResponse* response) { |
| 178 | ForwardCommand(KM_GENERATE_CSR, request, response); |
| 179 | } |
| 180 | |
Tri Vo | ce223a5 | 2022-10-01 18:46:50 -0700 | [diff] [blame] | 181 | void TrustyKeymaster::GenerateCsrV2(const GenerateCsrV2Request& request, |
| 182 | GenerateCsrV2Response* response) { |
| 183 | ForwardCommand(KM_GENERATE_CSR_V2, request, response); |
| 184 | } |
| 185 | |
Roberto Pereira | 2426197 | 2018-07-30 14:54:58 -0700 | [diff] [blame] | 186 | void TrustyKeymaster::GetKeyCharacteristics(const GetKeyCharacteristicsRequest& request, |
| 187 | GetKeyCharacteristicsResponse* response) { |
| 188 | ForwardCommand(KM_GET_KEY_CHARACTERISTICS, request, response); |
| 189 | } |
| 190 | |
| 191 | void TrustyKeymaster::ImportKey(const ImportKeyRequest& request, ImportKeyResponse* response) { |
| 192 | ForwardCommand(KM_IMPORT_KEY, request, response); |
| 193 | } |
| 194 | |
| 195 | void TrustyKeymaster::ImportWrappedKey(const ImportWrappedKeyRequest& request, |
| 196 | ImportWrappedKeyResponse* response) { |
| 197 | ForwardCommand(KM_IMPORT_WRAPPED_KEY, request, response); |
| 198 | } |
| 199 | |
| 200 | void TrustyKeymaster::ExportKey(const ExportKeyRequest& request, ExportKeyResponse* response) { |
| 201 | ForwardCommand(KM_EXPORT_KEY, request, response); |
| 202 | } |
| 203 | |
| 204 | void TrustyKeymaster::AttestKey(const AttestKeyRequest& request, AttestKeyResponse* response) { |
| 205 | ForwardCommand(KM_ATTEST_KEY, request, response); |
| 206 | } |
| 207 | |
| 208 | void TrustyKeymaster::UpgradeKey(const UpgradeKeyRequest& request, UpgradeKeyResponse* response) { |
| 209 | ForwardCommand(KM_UPGRADE_KEY, request, response); |
| 210 | } |
| 211 | |
| 212 | void TrustyKeymaster::DeleteKey(const DeleteKeyRequest& request, DeleteKeyResponse* response) { |
| 213 | ForwardCommand(KM_DELETE_KEY, request, response); |
| 214 | } |
| 215 | |
| 216 | void TrustyKeymaster::DeleteAllKeys(const DeleteAllKeysRequest& request, |
| 217 | DeleteAllKeysResponse* response) { |
| 218 | ForwardCommand(KM_DELETE_ALL_KEYS, request, response); |
| 219 | } |
| 220 | |
David Drysdale | cedcb4c | 2023-08-09 11:32:48 +0100 | [diff] [blame] | 221 | void TrustyKeymaster::DestroyAttestationIds(const DestroyAttestationIdsRequest& request, |
| 222 | DestroyAttestationIdsResponse* response) { |
| 223 | ForwardCommand(KM_DESTROY_ATTESTATION_IDS, request, response); |
| 224 | } |
| 225 | |
Roberto Pereira | 2426197 | 2018-07-30 14:54:58 -0700 | [diff] [blame] | 226 | void TrustyKeymaster::BeginOperation(const BeginOperationRequest& request, |
| 227 | BeginOperationResponse* response) { |
| 228 | ForwardCommand(KM_BEGIN_OPERATION, request, response); |
| 229 | } |
| 230 | |
| 231 | void TrustyKeymaster::UpdateOperation(const UpdateOperationRequest& request, |
| 232 | UpdateOperationResponse* response) { |
| 233 | ForwardCommand(KM_UPDATE_OPERATION, request, response); |
| 234 | } |
| 235 | |
| 236 | void TrustyKeymaster::FinishOperation(const FinishOperationRequest& request, |
| 237 | FinishOperationResponse* response) { |
| 238 | ForwardCommand(KM_FINISH_OPERATION, request, response); |
| 239 | } |
| 240 | |
| 241 | void TrustyKeymaster::AbortOperation(const AbortOperationRequest& request, |
| 242 | AbortOperationResponse* response) { |
| 243 | ForwardCommand(KM_ABORT_OPERATION, request, response); |
| 244 | } |
| 245 | |
Roberto Pereira | 2426197 | 2018-07-30 14:54:58 -0700 | [diff] [blame] | 246 | GetHmacSharingParametersResponse TrustyKeymaster::GetHmacSharingParameters() { |
Shawn Willden | 9323f41 | 2021-01-06 19:15:29 +0000 | [diff] [blame] | 247 | GetHmacSharingParametersRequest request(message_version()); |
| 248 | GetHmacSharingParametersResponse response(message_version()); |
Matthew Maurer | b321b41 | 2019-03-18 13:59:28 -0700 | [diff] [blame] | 249 | ForwardCommand(KM_GET_HMAC_SHARING_PARAMETERS, request, &response); |
Roberto Pereira | 2426197 | 2018-07-30 14:54:58 -0700 | [diff] [blame] | 250 | return response; |
| 251 | } |
| 252 | |
| 253 | ComputeSharedHmacResponse TrustyKeymaster::ComputeSharedHmac( |
Matthew Maurer | b321b41 | 2019-03-18 13:59:28 -0700 | [diff] [blame] | 254 | const ComputeSharedHmacRequest& request) { |
Shawn Willden | 9323f41 | 2021-01-06 19:15:29 +0000 | [diff] [blame] | 255 | ComputeSharedHmacResponse response(message_version()); |
Matthew Maurer | b321b41 | 2019-03-18 13:59:28 -0700 | [diff] [blame] | 256 | ForwardCommand(KM_COMPUTE_SHARED_HMAC, request, &response); |
Roberto Pereira | 2426197 | 2018-07-30 14:54:58 -0700 | [diff] [blame] | 257 | return response; |
| 258 | } |
| 259 | |
| 260 | VerifyAuthorizationResponse TrustyKeymaster::VerifyAuthorization( |
Matthew Maurer | b321b41 | 2019-03-18 13:59:28 -0700 | [diff] [blame] | 261 | const VerifyAuthorizationRequest& request) { |
Shawn Willden | 9323f41 | 2021-01-06 19:15:29 +0000 | [diff] [blame] | 262 | VerifyAuthorizationResponse response(message_version()); |
Matthew Maurer | b321b41 | 2019-03-18 13:59:28 -0700 | [diff] [blame] | 263 | ForwardCommand(KM_VERIFY_AUTHORIZATION, request, &response); |
Roberto Pereira | 2426197 | 2018-07-30 14:54:58 -0700 | [diff] [blame] | 264 | return response; |
| 265 | } |
| 266 | |
Shawn Willden | 9323f41 | 2021-01-06 19:15:29 +0000 | [diff] [blame] | 267 | GetVersion2Response TrustyKeymaster::GetVersion2(const GetVersion2Request& request) { |
| 268 | GetVersion2Response response(message_version()); |
| 269 | ForwardCommand(KM_GET_VERSION_2, request, &response); |
| 270 | return response; |
| 271 | } |
| 272 | |
Shawn Willden | fed81d8 | 2021-04-22 13:32:56 -0600 | [diff] [blame] | 273 | EarlyBootEndedResponse TrustyKeymaster::EarlyBootEnded() { |
| 274 | EarlyBootEndedResponse response(message_version()); |
| 275 | ForwardCommand(KM_EARLY_BOOT_ENDED, EarlyBootEndedRequest(message_version()), &response); |
| 276 | return response; |
| 277 | } |
| 278 | |
| 279 | DeviceLockedResponse TrustyKeymaster::DeviceLocked(const DeviceLockedRequest& request) { |
| 280 | DeviceLockedResponse response(message_version()); |
| 281 | ForwardCommand(KM_DEVICE_LOCKED, request, &response); |
| 282 | return response; |
| 283 | } |
| 284 | |
David Drysdale | e7697d7 | 2021-07-13 12:17:17 +0100 | [diff] [blame] | 285 | ConfigureVendorPatchlevelResponse TrustyKeymaster::ConfigureVendorPatchlevel( |
| 286 | const ConfigureVendorPatchlevelRequest& request) { |
| 287 | ConfigureVendorPatchlevelResponse response(message_version()); |
| 288 | ForwardCommand(KM_CONFIGURE_VENDOR_PATCHLEVEL, request, &response); |
| 289 | return response; |
| 290 | } |
| 291 | |
Shawn Willden | 396bc3f | 2022-06-07 13:17:48 -0600 | [diff] [blame] | 292 | GetRootOfTrustResponse TrustyKeymaster::GetRootOfTrust(const GetRootOfTrustRequest& request) { |
| 293 | GetRootOfTrustResponse response(message_version()); |
| 294 | ForwardCommand(KM_GET_ROOT_OF_TRUST, request, &response); |
| 295 | return response; |
| 296 | } |
| 297 | |
David Drysdale | 487584d | 2024-11-25 12:38:54 +0000 | [diff] [blame] | 298 | SetAdditionalAttestationInfoResponse TrustyKeymaster::SetAdditionalAttestationInfo( |
| 299 | const SetAdditionalAttestationInfoRequest& request) { |
| 300 | SetAdditionalAttestationInfoResponse response(message_version()); |
| 301 | ForwardCommand(KM_SET_ADDITIONAL_ATTESTATION_INFO, request, &response); |
| 302 | return response; |
| 303 | } |
| 304 | |
Tri Vo | 025b7f3 | 2022-10-11 17:37:45 -0700 | [diff] [blame] | 305 | GetHwInfoResponse TrustyKeymaster::GetHwInfo() { |
| 306 | GetHwInfoResponse response(message_version()); |
| 307 | ForwardCommand(KM_GET_HW_INFO, GetHwInfoRequest(message_version()), &response); |
| 308 | return response; |
| 309 | } |
| 310 | |
Roberto Pereira | 2426197 | 2018-07-30 14:54:58 -0700 | [diff] [blame] | 311 | } // namespace keymaster |