blob: 0906fea22a86755546cb7ac83987eb62c55f6e98 [file] [log] [blame]
David Zeuthenab3e5652019-10-28 13:32:48 -04001/*
2 * Copyright (c) 2019, The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17#ifndef SYSTEM_SECURITY_CREDENTIAL_H_
18#define SYSTEM_SECURITY_CREDENTIAL_H_
19
20#include <string>
21#include <vector>
22
23#include <android/security/identity/BnCredential.h>
24
David Zeuthena6f9fba2020-02-11 22:08:27 -050025#include <android/hardware/identity/IIdentityCredentialStore.h>
David Zeuthenab3e5652019-10-28 13:32:48 -040026
27#include "CredentialData.h"
28
29namespace android {
30namespace security {
31namespace identity {
32
33using ::android::sp;
34using ::android::binder::Status;
35using ::std::string;
36using ::std::vector;
37
David Zeuthena6f9fba2020-02-11 22:08:27 -050038using ::android::hardware::identity::CipherSuite;
David Zeuthen472e6c82020-10-16 11:50:13 -040039using ::android::hardware::identity::HardwareInformation;
David Zeuthena6f9fba2020-02-11 22:08:27 -050040using ::android::hardware::identity::IIdentityCredential;
41using ::android::hardware::identity::IIdentityCredentialStore;
David Zeuthen045a2c82021-09-11 13:52:17 -040042using ::android::hardware::identity::IPresentationSession;
David Zeuthene2a78a42020-04-27 13:34:38 -040043using ::android::hardware::identity::RequestDataItem;
44using ::android::hardware::identity::RequestNamespace;
David Zeuthenab3e5652019-10-28 13:32:48 -040045
46class Credential : public BnCredential {
47 public:
David Zeuthen472e6c82020-10-16 11:50:13 -040048 Credential(CipherSuite cipherSuite, const string& dataPath, const string& credentialName,
49 uid_t callingUid, HardwareInformation hwInfo,
David Zeuthen045a2c82021-09-11 13:52:17 -040050 sp<IIdentityCredentialStore> halStoreBinder,
51 sp<IPresentationSession> halSessionBinder, int halApiVersion);
David Zeuthenab3e5652019-10-28 13:32:48 -040052 ~Credential();
53
David Zeuthen472e6c82020-10-16 11:50:13 -040054 Status ensureOrReplaceHalBinder();
David Zeuthen27407a52021-03-04 16:32:43 -050055 void writableCredentialPersonalized();
David Zeuthenab3e5652019-10-28 13:32:48 -040056
57 // ICredential overrides
58 Status createEphemeralKeyPair(vector<uint8_t>* _aidl_return) override;
59
60 Status setReaderEphemeralPublicKey(const vector<uint8_t>& publicKey) override;
61
62 Status deleteCredential(vector<uint8_t>* _aidl_return) override;
63
David Zeuthen472e6c82020-10-16 11:50:13 -040064 Status deleteWithChallenge(const vector<uint8_t>& challenge,
65 vector<uint8_t>* _aidl_return) override;
66
67 Status proveOwnership(const vector<uint8_t>& challenge, vector<uint8_t>* _aidl_return) override;
68
David Zeuthenab3e5652019-10-28 13:32:48 -040069 Status getCredentialKeyCertificateChain(vector<uint8_t>* _aidl_return) override;
70
David Zeuthen472e6c82020-10-16 11:50:13 -040071 Status selectAuthKey(bool allowUsingExhaustedKeys, bool allowUsingExpiredKeys,
David Zeuthen045a2c82021-09-11 13:52:17 -040072 bool incrementUsageCount, int64_t* _aidl_return) override;
David Zeuthenab3e5652019-10-28 13:32:48 -040073
74 Status getEntries(const vector<uint8_t>& requestMessage,
75 const vector<RequestNamespaceParcel>& requestNamespaces,
76 const vector<uint8_t>& sessionTranscript,
77 const vector<uint8_t>& readerSignature, bool allowUsingExhaustedKeys,
David Zeuthen045a2c82021-09-11 13:52:17 -040078 bool allowUsingExpiredKeys, bool incrementUsageCount,
79 GetEntriesResultParcel* _aidl_return) override;
David Zeuthenab3e5652019-10-28 13:32:48 -040080
81 Status setAvailableAuthenticationKeys(int32_t keyCount, int32_t maxUsesPerKey) override;
82 Status getAuthKeysNeedingCertification(vector<AuthKeyParcel>* _aidl_return) override;
83 Status storeStaticAuthenticationData(const AuthKeyParcel& authenticationKey,
84 const vector<uint8_t>& staticAuthData) override;
David Zeuthen472e6c82020-10-16 11:50:13 -040085 Status
86 storeStaticAuthenticationDataWithExpiration(const AuthKeyParcel& authenticationKey,
87 int64_t expirationDateMillisSinceEpoch,
88 const vector<uint8_t>& staticAuthData) override;
David Zeuthenab3e5652019-10-28 13:32:48 -040089 Status getAuthenticationDataUsageCount(vector<int32_t>* _aidl_return) override;
90
David Zeuthen472e6c82020-10-16 11:50:13 -040091 Status update(sp<IWritableCredential>* _aidl_return) override;
92
David Zeuthenab3e5652019-10-28 13:32:48 -040093 private:
David Zeuthena6f9fba2020-02-11 22:08:27 -050094 CipherSuite cipherSuite_;
David Zeuthenab3e5652019-10-28 13:32:48 -040095 string dataPath_;
96 string credentialName_;
David Zeuthen472e6c82020-10-16 11:50:13 -040097 uid_t callingUid_;
98 HardwareInformation hwInfo_;
99 sp<IIdentityCredentialStore> halStoreBinder_;
David Zeuthen045a2c82021-09-11 13:52:17 -0400100 sp<IPresentationSession> halSessionBinder_;
David Zeuthenab3e5652019-10-28 13:32:48 -0400101
David Zeuthenab3e5652019-10-28 13:32:48 -0400102 uint64_t selectedChallenge_ = 0;
103
David Zeuthenab3e5652019-10-28 13:32:48 -0400104 sp<IIdentityCredential> halBinder_;
David Zeuthen472e6c82020-10-16 11:50:13 -0400105 int halApiVersion_;
David Zeuthene2a78a42020-04-27 13:34:38 -0400106
David Zeuthen045a2c82021-09-11 13:52:17 -0400107 // This is used to cache the selected AuthKey to ensure the same AuthKey is used across
108 // multiple getEntries() calls.
109 //
110 bool selectedAuthKey_ = false;
111 vector<uint8_t> selectedAuthKeySigningKeyBlob_;
112 vector<uint8_t> selectedAuthKeyStaticAuthData_;
113
David Zeuthen27407a52021-03-04 16:32:43 -0500114 bool ensureChallenge();
115
David Zeuthene2a78a42020-04-27 13:34:38 -0400116 ssize_t
117 calcExpectedDeviceNameSpacesSize(const vector<uint8_t>& requestMessage,
118 const vector<RequestNamespaceParcel>& requestNamespaces,
119 uint32_t authorizedAcps);
David Zeuthenab3e5652019-10-28 13:32:48 -0400120};
121
122} // namespace identity
123} // namespace security
124} // namespace android
125
126#endif // SYSTEM_SECURITY_IDENTITY_CREDENTIAL_H_