blob: 3e3ff6eaeee9e55d68336c2066414797c86024b5 [file] [log] [blame]
Shawn Willden489dfe12015-03-17 10:13:27 -06001/*
2 * Copyright (C) 2015 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17#include <memory>
18#include <vector>
19
Janis Danisevskisc7a9fa22016-10-13 18:43:45 +010020#include <keystore/authorization_set.h>
Shawn Willden489dfe12015-03-17 10:13:27 -060021
Shawn Willden6507c272016-01-05 22:51:48 -070022#ifndef KEYSTORE_AUTH_TOKEN_TABLE_H_
23#define KEYSTORE_AUTH_TOKEN_TABLE_H_
Shawn Willden489dfe12015-03-17 10:13:27 -060024
Janis Danisevskisc7a9fa22016-10-13 18:43:45 +010025namespace keystore {
26
Shawn Willdend3ed3a22017-03-28 00:39:16 +000027using android::hardware::keymaster::V3_0::HardwareAuthToken;
Shawn Willden489dfe12015-03-17 10:13:27 -060028
29namespace test {
30class AuthTokenTableTest;
31} // namespace test
32
33time_t clock_gettime_raw();
34
35/**
36 * AuthTokenTable manages a set of received authorization tokens and can provide the appropriate
37 * token for authorizing a key operation.
38 *
39 * To keep the table from growing without bound, superseded entries are removed when possible, and
40 * least recently used entries are automatically pruned when when the table exceeds a size limit,
41 * which is expected to be relatively small, since the implementation uses a linear search.
42 */
43class AuthTokenTable {
44 public:
Chih-Hung Hsiehd7791be2016-07-12 11:58:02 -070045 explicit AuthTokenTable(size_t max_entries = 32, time_t (*clock_function)() = clock_gettime_raw)
Janis Danisevskisc7a9fa22016-10-13 18:43:45 +010046 : max_entries_(max_entries), last_off_body_(clock_function()),
47 clock_function_(clock_function) {}
Shawn Willden489dfe12015-03-17 10:13:27 -060048
49 enum Error {
50 OK,
51 AUTH_NOT_REQUIRED = -1,
52 AUTH_TOKEN_EXPIRED = -2, // Found a matching token, but it's too old.
53 AUTH_TOKEN_WRONG_SID = -3, // Found a token with the right challenge, but wrong SID. This
54 // most likely indicates that the authenticator was updated
55 // (e.g. new fingerprint enrolled).
56 OP_HANDLE_REQUIRED = -4, // The key requires auth per use but op_handle was zero.
57 AUTH_TOKEN_NOT_FOUND = -5,
58 };
59
60 /**
Shawn Willdend3ed3a22017-03-28 00:39:16 +000061 * Add an authorization token to the table. The table takes ownership of the argument.
Shawn Willden489dfe12015-03-17 10:13:27 -060062 */
Janis Danisevskis8f737ad2017-11-21 12:30:15 -080063 void AddAuthenticationToken(std::unique_ptr<const HardwareAuthToken>&& auth_token);
Shawn Willden489dfe12015-03-17 10:13:27 -060064
65 /**
66 * Find an authorization token that authorizes the operation specified by \p operation_handle on
67 * a key with the characteristics specified in \p key_info.
68 *
69 * This method is O(n * m), where n is the number of KM_TAG_USER_SECURE_ID entries in key_info
70 * and m is the number of entries in the table. It could be made better, but n and m should
71 * always be small.
72 *
73 * The table retains ownership of the returned object.
74 */
Janis Danisevskisc7a9fa22016-10-13 18:43:45 +010075 Error FindAuthorization(const AuthorizationSet& key_info, KeyPurpose purpose,
Shawn Willdend3ed3a22017-03-28 00:39:16 +000076 uint64_t op_handle, const HardwareAuthToken** found);
Shawn Willden489dfe12015-03-17 10:13:27 -060077
78 /**
Shawn Willden489dfe12015-03-17 10:13:27 -060079 * Mark operation completed. This allows tokens associated with the specified operation to be
80 * superseded by new tokens.
81 */
Janis Danisevskisc7a9fa22016-10-13 18:43:45 +010082 void MarkCompleted(const uint64_t op_handle);
Shawn Willden489dfe12015-03-17 10:13:27 -060083
Tucker Sylvestro0ab28b72016-08-05 18:02:47 -040084 /**
85 * Update the last_off_body_ timestamp so that tokens which remain authorized only so long as
86 * the device stays on body can be revoked.
87 */
88 void onDeviceOffBody();
89
Chad Brubakerbbc76482015-04-16 15:16:44 -070090 void Clear();
91
Shawn Willden489dfe12015-03-17 10:13:27 -060092 size_t size() { return entries_.size(); }
93
94 private:
95 friend class AuthTokenTableTest;
96
97 class Entry {
98 public:
Janis Danisevskis8f737ad2017-11-21 12:30:15 -080099 Entry(std::unique_ptr<const HardwareAuthToken>&& token, time_t current_time);
Shawn Willden489dfe12015-03-17 10:13:27 -0600100 Entry(Entry&& entry) { *this = std::move(entry); }
101
102 void operator=(Entry&& rhs) {
103 token_ = std::move(rhs.token_);
104 time_received_ = rhs.time_received_;
105 last_use_ = rhs.last_use_;
106 operation_completed_ = rhs.operation_completed_;
107 }
108
109 bool operator<(const Entry& rhs) const { return last_use_ < rhs.last_use_; }
110
111 void UpdateLastUse(time_t time);
112
113 bool Supersedes(const Entry& entry) const;
Janis Danisevskisc7a9fa22016-10-13 18:43:45 +0100114 bool SatisfiesAuth(const std::vector<uint64_t>& sids, HardwareAuthenticatorType auth_type);
Shawn Willden489dfe12015-03-17 10:13:27 -0600115
Rubin Xubfb01d92017-10-23 17:04:25 +0100116 bool is_newer_than(const Entry* entry) const {
Janis Danisevskisc7a9fa22016-10-13 18:43:45 +0100117 if (!entry) return true;
Rubin Xubfb01d92017-10-23 17:04:25 +0100118 uint64_t ts = timestamp_host_order();
119 uint64_t other_ts = entry->timestamp_host_order();
120 // Normally comparing timestamp_host_order alone is sufficient, but here is an
121 // additional hack to compare time_received value for some devices where their auth
122 // tokens contain fixed timestamp (due to the a stuck secure RTC on them)
123 return (ts > other_ts) ||
124 ((ts == other_ts) && (time_received_ > entry->time_received_));
Shawn Willden489dfe12015-03-17 10:13:27 -0600125 }
126
127 void mark_completed() { operation_completed_ = true; }
128
Janis Danisevskis8f737ad2017-11-21 12:30:15 -0800129 const HardwareAuthToken& token() { return *token_.get(); }
Shawn Willden489dfe12015-03-17 10:13:27 -0600130 time_t time_received() const { return time_received_; }
131 bool completed() const { return operation_completed_; }
Rubin Xuce99f582017-10-12 10:50:11 +0100132 uint64_t timestamp_host_order() const;
Shawn Willdend3ed3a22017-03-28 00:39:16 +0000133 HardwareAuthenticatorType authenticator_type() const;
Shawn Willden489dfe12015-03-17 10:13:27 -0600134
135 private:
Shawn Willdend3ed3a22017-03-28 00:39:16 +0000136 std::unique_ptr<const HardwareAuthToken> token_;
Shawn Willden489dfe12015-03-17 10:13:27 -0600137 time_t time_received_;
138 time_t last_use_;
139 bool operation_completed_;
140 };
141
142 Error FindAuthPerOpAuthorization(const std::vector<uint64_t>& sids,
Janis Danisevskisc7a9fa22016-10-13 18:43:45 +0100143 HardwareAuthenticatorType auth_type, uint64_t op_handle,
Shawn Willdend3ed3a22017-03-28 00:39:16 +0000144 const HardwareAuthToken** found);
Shawn Willden489dfe12015-03-17 10:13:27 -0600145 Error FindTimedAuthorization(const std::vector<uint64_t>& sids,
Janis Danisevskisc7a9fa22016-10-13 18:43:45 +0100146 HardwareAuthenticatorType auth_type,
Shawn Willdend3ed3a22017-03-28 00:39:16 +0000147 const AuthorizationSet& key_info, const HardwareAuthToken** found);
Shawn Willden489dfe12015-03-17 10:13:27 -0600148 void ExtractSids(const AuthorizationSet& key_info, std::vector<uint64_t>* sids);
149 void RemoveEntriesSupersededBy(const Entry& entry);
150 bool IsSupersededBySomeEntry(const Entry& entry);
151
152 std::vector<Entry> entries_;
153 size_t max_entries_;
Tucker Sylvestro0ab28b72016-08-05 18:02:47 -0400154 time_t last_off_body_;
Shawn Willden489dfe12015-03-17 10:13:27 -0600155 time_t (*clock_function_)();
156};
157
158} // namespace keymaster
159
Shawn Willden6507c272016-01-05 22:51:48 -0700160#endif // KEYSTORE_AUTH_TOKEN_TABLE_H_