blob: 23e04334c7f98bb22511e5364bf41286997e68d1 [file] [log] [blame]
Roberto Pereira24261972018-07-30 14:54:58 -07001/*
2 * Copyright 2018 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17#include <cutils/log.h>
18#include <keymaster/android_keymaster_messages.h>
19#include <keymaster/keymaster_configuration.h>
20#include <trusty_keymaster/TrustyKeymaster.h>
21#include <trusty_keymaster/ipc/trusty_keymaster_ipc.h>
22
23namespace keymaster {
24
25int TrustyKeymaster::Initialize() {
26 int err;
27
28 err = trusty_keymaster_connect();
29 if (err) {
30 ALOGE("Failed to connect to trusty keymaster %d", err);
31 return err;
32 }
33
Shawn Willden9323f412021-01-06 19:15:29 +000034 // Try GetVersion2 first.
35 GetVersion2Request versionReq;
36 GetVersion2Response versionRsp = GetVersion2(versionReq);
37 if (versionRsp.error != KM_ERROR_OK) {
38 ALOGW("TA appears not to support GetVersion2, falling back (err = %d)", versionRsp.error);
39
Matthew Maurerc4abbe62021-01-20 13:19:13 -080040 err = trusty_keymaster_connect();
41 if (err) {
42 ALOGE("Failed to connect to trusty keymaster %d", err);
43 return err;
44 }
45
Shawn Willden9323f412021-01-06 19:15:29 +000046 GetVersionRequest versionReq;
47 GetVersionResponse versionRsp;
48 GetVersion(versionReq, &versionRsp);
49 if (versionRsp.error != KM_ERROR_OK) {
50 ALOGE("Failed to get TA version %d", versionRsp.error);
51 return -1;
52 } else {
53 keymaster_error_t error;
54 message_version_ = NegotiateMessageVersion(versionRsp, &error);
55 if (error != KM_ERROR_OK) {
56 ALOGE("Failed to negotiate message version %d", error);
57 return -1;
58 }
59 }
60 } else {
61 message_version_ = NegotiateMessageVersion(versionReq, versionRsp);
62 }
63
64 ConfigureRequest req(message_version());
Roberto Pereira24261972018-07-30 14:54:58 -070065 req.os_version = GetOsVersion();
66 req.os_patchlevel = GetOsPatchlevel();
67
Shawn Willden9323f412021-01-06 19:15:29 +000068 ConfigureResponse rsp(message_version());
Roberto Pereira24261972018-07-30 14:54:58 -070069 Configure(req, &rsp);
70
71 if (rsp.error != KM_ERROR_OK) {
72 ALOGE("Failed to configure keymaster %d", rsp.error);
73 return -1;
74 }
75
76 return 0;
77}
78
79TrustyKeymaster::TrustyKeymaster() {}
80
81TrustyKeymaster::~TrustyKeymaster() {
82 trusty_keymaster_disconnect();
83}
84
Shawn Willden9323f412021-01-06 19:15:29 +000085static void ForwardCommand(enum keymaster_command command, const KeymasterMessage& req,
Roberto Pereira24261972018-07-30 14:54:58 -070086 KeymasterResponse* rsp) {
87 keymaster_error_t err;
88 err = trusty_keymaster_send(command, req, rsp);
89 if (err != KM_ERROR_OK) {
90 ALOGE("Failed to send cmd %d err: %d", command, err);
91 rsp->error = err;
92 }
93}
94
95void TrustyKeymaster::GetVersion(const GetVersionRequest& request, GetVersionResponse* response) {
96 ForwardCommand(KM_GET_VERSION, request, response);
97}
98
99void TrustyKeymaster::SupportedAlgorithms(const SupportedAlgorithmsRequest& request,
100 SupportedAlgorithmsResponse* response) {
101 ForwardCommand(KM_GET_SUPPORTED_ALGORITHMS, request, response);
102}
103
104void TrustyKeymaster::SupportedBlockModes(const SupportedBlockModesRequest& request,
105 SupportedBlockModesResponse* response) {
106 ForwardCommand(KM_GET_SUPPORTED_BLOCK_MODES, request, response);
107}
108
109void TrustyKeymaster::SupportedPaddingModes(const SupportedPaddingModesRequest& request,
110 SupportedPaddingModesResponse* response) {
111 ForwardCommand(KM_GET_SUPPORTED_PADDING_MODES, request, response);
112}
113
114void TrustyKeymaster::SupportedDigests(const SupportedDigestsRequest& request,
115 SupportedDigestsResponse* response) {
116 ForwardCommand(KM_GET_SUPPORTED_DIGESTS, request, response);
117}
118
119void TrustyKeymaster::SupportedImportFormats(const SupportedImportFormatsRequest& request,
120 SupportedImportFormatsResponse* response) {
121 ForwardCommand(KM_GET_SUPPORTED_IMPORT_FORMATS, request, response);
122}
123
124void TrustyKeymaster::SupportedExportFormats(const SupportedExportFormatsRequest& request,
125 SupportedExportFormatsResponse* response) {
126 ForwardCommand(KM_GET_SUPPORTED_EXPORT_FORMATS, request, response);
127}
128
129void TrustyKeymaster::AddRngEntropy(const AddEntropyRequest& request,
130 AddEntropyResponse* response) {
131 ForwardCommand(KM_ADD_RNG_ENTROPY, request, response);
132}
133
134void TrustyKeymaster::Configure(const ConfigureRequest& request, ConfigureResponse* response) {
135 ForwardCommand(KM_CONFIGURE, request, response);
136}
137
138void TrustyKeymaster::GenerateKey(const GenerateKeyRequest& request,
139 GenerateKeyResponse* response) {
140 GenerateKeyRequest datedRequest(request.message_version);
141 datedRequest.key_description = request.key_description;
142
143 if (!request.key_description.Contains(TAG_CREATION_DATETIME)) {
144 datedRequest.key_description.push_back(TAG_CREATION_DATETIME, java_time(time(NULL)));
145 }
146
147 ForwardCommand(KM_GENERATE_KEY, datedRequest, response);
148}
149
150void TrustyKeymaster::GetKeyCharacteristics(const GetKeyCharacteristicsRequest& request,
151 GetKeyCharacteristicsResponse* response) {
152 ForwardCommand(KM_GET_KEY_CHARACTERISTICS, request, response);
153}
154
155void TrustyKeymaster::ImportKey(const ImportKeyRequest& request, ImportKeyResponse* response) {
156 ForwardCommand(KM_IMPORT_KEY, request, response);
157}
158
159void TrustyKeymaster::ImportWrappedKey(const ImportWrappedKeyRequest& request,
160 ImportWrappedKeyResponse* response) {
161 ForwardCommand(KM_IMPORT_WRAPPED_KEY, request, response);
162}
163
164void TrustyKeymaster::ExportKey(const ExportKeyRequest& request, ExportKeyResponse* response) {
165 ForwardCommand(KM_EXPORT_KEY, request, response);
166}
167
168void TrustyKeymaster::AttestKey(const AttestKeyRequest& request, AttestKeyResponse* response) {
169 ForwardCommand(KM_ATTEST_KEY, request, response);
170}
171
172void TrustyKeymaster::UpgradeKey(const UpgradeKeyRequest& request, UpgradeKeyResponse* response) {
173 ForwardCommand(KM_UPGRADE_KEY, request, response);
174}
175
176void TrustyKeymaster::DeleteKey(const DeleteKeyRequest& request, DeleteKeyResponse* response) {
177 ForwardCommand(KM_DELETE_KEY, request, response);
178}
179
180void TrustyKeymaster::DeleteAllKeys(const DeleteAllKeysRequest& request,
181 DeleteAllKeysResponse* response) {
182 ForwardCommand(KM_DELETE_ALL_KEYS, request, response);
183}
184
185void TrustyKeymaster::BeginOperation(const BeginOperationRequest& request,
186 BeginOperationResponse* response) {
187 ForwardCommand(KM_BEGIN_OPERATION, request, response);
188}
189
190void TrustyKeymaster::UpdateOperation(const UpdateOperationRequest& request,
191 UpdateOperationResponse* response) {
192 ForwardCommand(KM_UPDATE_OPERATION, request, response);
193}
194
195void TrustyKeymaster::FinishOperation(const FinishOperationRequest& request,
196 FinishOperationResponse* response) {
197 ForwardCommand(KM_FINISH_OPERATION, request, response);
198}
199
200void TrustyKeymaster::AbortOperation(const AbortOperationRequest& request,
201 AbortOperationResponse* response) {
202 ForwardCommand(KM_ABORT_OPERATION, request, response);
203}
204
Roberto Pereira24261972018-07-30 14:54:58 -0700205GetHmacSharingParametersResponse TrustyKeymaster::GetHmacSharingParameters() {
Shawn Willden9323f412021-01-06 19:15:29 +0000206 GetHmacSharingParametersRequest request(message_version());
207 GetHmacSharingParametersResponse response(message_version());
Matthew Maurerb321b412019-03-18 13:59:28 -0700208 ForwardCommand(KM_GET_HMAC_SHARING_PARAMETERS, request, &response);
Roberto Pereira24261972018-07-30 14:54:58 -0700209 return response;
210}
211
212ComputeSharedHmacResponse TrustyKeymaster::ComputeSharedHmac(
Matthew Maurerb321b412019-03-18 13:59:28 -0700213 const ComputeSharedHmacRequest& request) {
Shawn Willden9323f412021-01-06 19:15:29 +0000214 ComputeSharedHmacResponse response(message_version());
Matthew Maurerb321b412019-03-18 13:59:28 -0700215 ForwardCommand(KM_COMPUTE_SHARED_HMAC, request, &response);
Roberto Pereira24261972018-07-30 14:54:58 -0700216 return response;
217}
218
219VerifyAuthorizationResponse TrustyKeymaster::VerifyAuthorization(
Matthew Maurerb321b412019-03-18 13:59:28 -0700220 const VerifyAuthorizationRequest& request) {
Shawn Willden9323f412021-01-06 19:15:29 +0000221 VerifyAuthorizationResponse response(message_version());
Matthew Maurerb321b412019-03-18 13:59:28 -0700222 ForwardCommand(KM_VERIFY_AUTHORIZATION, request, &response);
Roberto Pereira24261972018-07-30 14:54:58 -0700223 return response;
224}
225
Shawn Willden9323f412021-01-06 19:15:29 +0000226GetVersion2Response TrustyKeymaster::GetVersion2(const GetVersion2Request& request) {
227 GetVersion2Response response(message_version());
228 ForwardCommand(KM_GET_VERSION_2, request, &response);
229 return response;
230}
231
Roberto Pereira24261972018-07-30 14:54:58 -0700232} // namespace keymaster