blob: 0698e40c168ba1efe7a56400482705ae474343d1 [file] [log] [blame]
Alice Wang9c40eca2023-02-03 13:10:24 +00001// Copyright 2023, The Android Open Source Project
2//
3// Licensed under the Apache License, Version 2.0 (the "License");
4// you may not use this file except in compliance with the License.
5// You may obtain a copy of the License at
6//
7// http://www.apache.org/licenses/LICENSE-2.0
8//
9// Unless required by applicable law or agreed to in writing, software
10// distributed under the License is distributed on an "AS IS" BASIS,
11// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12// See the License for the specific language governing permissions and
13// limitations under the License.
14
15//! This module mirrors the content in open-dice/include/dice/android/bcc.h
16
Alice Wang1a933a82023-02-14 11:02:51 +000017use crate::dice::{Cdi, CdiValues, InputValues, CDI_SIZE};
18use crate::error::{check_result, DiceError, Result};
Alice Wang9c40eca2023-02-03 13:10:24 +000019use open_dice_bcc_bindgen::{
Alice Wang1a933a82023-02-14 11:02:51 +000020 BccConfigValues, BccFormatConfigDescriptor, BccHandoverMainFlow, BccHandoverParse, BccMainFlow,
Alice Wang9b2c38e2023-02-14 08:53:31 +000021 BCC_INPUT_COMPONENT_NAME, BCC_INPUT_COMPONENT_VERSION, BCC_INPUT_RESETTABLE,
Alice Wang9c40eca2023-02-03 13:10:24 +000022};
23use std::{ffi::CStr, ptr};
24
25/// Formats a configuration descriptor following the BCC's specification.
26/// See https://cs.android.com/android/platform/superproject/+/master:hardware/interfaces/security/rkp/aidl/android/hardware/security/keymint/ProtectedData.aidl
27pub fn bcc_format_config_descriptor(
28 name: Option<&CStr>,
29 version: Option<u64>,
30 resettable: bool,
31 buffer: &mut [u8],
32) -> Result<usize> {
33 let mut inputs = 0;
34 if name.is_some() {
35 inputs |= BCC_INPUT_COMPONENT_NAME;
36 }
37 if version.is_some() {
38 inputs |= BCC_INPUT_COMPONENT_VERSION;
39 }
40 if resettable {
41 inputs |= BCC_INPUT_RESETTABLE;
42 }
43
44 let values = BccConfigValues {
45 inputs,
46 component_name: name.map_or(ptr::null(), |p| p.as_ptr()),
47 component_version: version.unwrap_or(0),
48 };
49
50 let mut buffer_size = 0;
51 // SAFETY: The function writes to the buffer, within the given bounds, and only reads the
52 // input values. It writes its result to buffer_size.
53 check_result(unsafe {
54 BccFormatConfigDescriptor(&values, buffer.len(), buffer.as_mut_ptr(), &mut buffer_size)
55 })?;
56 Ok(buffer_size)
57}
Alice Wangf4bd1c62023-02-08 08:38:44 +000058
59/// Executes the main BCC flow.
60///
61/// Given a full set of input values along with the current BCC and CDI values,
62/// computes the next CDI values and matching updated BCC.
63pub fn bcc_main_flow(
64 current_cdi_attest: &Cdi,
65 current_cdi_seal: &Cdi,
66 current_bcc: &[u8],
67 input_values: &InputValues,
68 next_cdi_values: &mut CdiValues,
69 next_bcc: &mut [u8],
70) -> Result<usize> {
71 let mut next_bcc_size = 0;
72 // SAFETY: `BccMainFlow` only reads the current `bcc` and CDI values and writes
73 // to `next_bcc` and next CDI values within its bounds. It also reads
74 // `input_values` as a constant input and doesn't store any pointer.
75 // The first argument can be null and is not used in the current implementation.
76 check_result(unsafe {
77 BccMainFlow(
78 ptr::null_mut(), // context
79 current_cdi_attest.as_ptr(),
80 current_cdi_seal.as_ptr(),
81 current_bcc.as_ptr(),
82 current_bcc.len(),
83 input_values.as_ptr(),
84 next_bcc.len(),
85 next_bcc.as_mut_ptr(),
86 &mut next_bcc_size,
87 next_cdi_values.cdi_attest.as_mut_ptr(),
88 next_cdi_values.cdi_seal.as_mut_ptr(),
89 )
90 })?;
91 Ok(next_bcc_size)
92}
Alice Wang9b2c38e2023-02-14 08:53:31 +000093
94/// Executes the main BCC handover flow.
95///
96/// A BCC handover combines the BCC and CDIs in a single CBOR object.
97/// This function takes the current boot stage's BCC handover bundle and produces a
98/// bundle for the next stage.
99pub fn bcc_handover_main_flow(
100 current_bcc_handover: &[u8],
101 input_values: &InputValues,
102 next_bcc_handover: &mut [u8],
103) -> Result<usize> {
104 let mut next_bcc_handover_size = 0;
105 // SAFETY - The function only reads `current_bcc_handover` and writes to `next_bcc_handover`
106 // within its bounds,
107 // It also reads `input_values` as a constant input and doesn't store any pointer.
108 // The first argument can be null and is not used in the current implementation.
109 check_result(unsafe {
110 BccHandoverMainFlow(
111 ptr::null_mut(), // context
112 current_bcc_handover.as_ptr(),
113 current_bcc_handover.len(),
114 input_values.as_ptr(),
115 next_bcc_handover.len(),
116 next_bcc_handover.as_mut_ptr(),
117 &mut next_bcc_handover_size,
118 )
119 })?;
120
121 Ok(next_bcc_handover_size)
122}
Alice Wang1a933a82023-02-14 11:02:51 +0000123
124/// A BCC handover combines the BCC and CDIs in a single CBOR object.
125/// This struct is used as return of the function `bcc_handover_parse`, its lifetime is tied
126/// to the lifetime of the raw BCC handover slice.
127pub struct BccHandover<'a> {
128 /// Attestation CDI.
129 pub cdi_attest: &'a Cdi,
130 /// Sealing CDI.
131 pub cdi_seal: &'a Cdi,
132 /// Boot Certificate Chain.
133 pub bcc: Option<&'a [u8]>,
134}
135
136/// A BCC handover combines the BCC and CDIs in a single CBOR object.
137/// This function parses the `bcc_handover` to extracts the BCC and CDIs.
138/// The lifetime of the returned `BccHandover` is tied to the given `bcc_handover` slice.
139pub fn bcc_handover_parse(bcc_handover: &[u8]) -> Result<BccHandover> {
140 let mut cdi_attest: *const u8 = ptr::null();
141 let mut cdi_seal: *const u8 = ptr::null();
142 let mut bcc: *const u8 = ptr::null();
143 let mut bcc_size = 0;
144 // SAFETY: The `bcc_handover` is only read and never stored and the returned pointers should all
145 // point within the address range of the `bcc_handover` or be NULL.
146 check_result(unsafe {
147 BccHandoverParse(
148 bcc_handover.as_ptr(),
149 bcc_handover.len(),
150 &mut cdi_attest,
151 &mut cdi_seal,
152 &mut bcc,
153 &mut bcc_size,
154 )
155 })?;
156 let cdi_attest = sub_slice(bcc_handover, cdi_attest, CDI_SIZE)?;
157 let cdi_seal = sub_slice(bcc_handover, cdi_seal, CDI_SIZE)?;
158 let bcc = sub_slice(bcc_handover, bcc, bcc_size).ok();
159 Ok(BccHandover {
160 cdi_attest: cdi_attest.try_into().map_err(|_| DiceError::PlatformError)?,
161 cdi_seal: cdi_seal.try_into().map_err(|_| DiceError::PlatformError)?,
162 bcc,
163 })
164}
165
166/// Gets a slice the `addr` points to and of length `len`.
167/// The slice should be contained in the buffer.
168fn sub_slice(buffer: &[u8], addr: *const u8, len: usize) -> Result<&[u8]> {
169 if addr.is_null() || !buffer.as_ptr_range().contains(&addr) {
170 return Err(DiceError::PlatformError);
171 }
172 // SAFETY: This is safe because addr is not null and is within the range of the buffer.
173 let start: usize = unsafe {
174 addr.offset_from(buffer.as_ptr()).try_into().map_err(|_| DiceError::PlatformError)?
175 };
176 let end = start.checked_add(len).ok_or(DiceError::PlatformError)?;
177 buffer.get(start..end).ok_or(DiceError::PlatformError)
178}