| Martijn Coenen | ba1c9dc | 2021-02-04 13:18:29 +0100 | [diff] [blame] | 1 | /* |
| 2 | * Copyright (C) 2021 The Android Open Source Project |
| 3 | * |
| 4 | * Licensed under the Apache License, Version 2.0 (the "License"); |
| 5 | * you may not use this file except in compliance with the License. |
| 6 | * You may obtain a copy of the License at |
| 7 | * |
| 8 | * http://www.apache.org/licenses/LICENSE-2.0 |
| 9 | * |
| 10 | * Unless required by applicable law or agreed to in writing, software |
| 11 | * distributed under the License is distributed on an "AS IS" BASIS, |
| 12 | * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 13 | * See the License for the specific language governing permissions and |
| 14 | * limitations under the License. |
| 15 | */ |
| 16 | |
| 17 | #include <string> |
| 18 | |
| 19 | #include <android-base/file.h> |
| 20 | #include <android-base/logging.h> |
| 21 | #include <binder/IServiceManager.h> |
| 22 | |
| 23 | #include <fcntl.h> |
| 24 | #include <sys/stat.h> |
| 25 | #include <sys/types.h> |
| 26 | |
| 27 | #include "CertUtils.h" |
| 28 | #include "KeyConstants.h" |
| 29 | #include "KeystoreKey.h" |
| 30 | |
| 31 | using android::defaultServiceManager; |
| 32 | using android::IServiceManager; |
| 33 | using android::sp; |
| 34 | using android::String16; |
| 35 | |
| 36 | using android::hardware::security::keymint::Algorithm; |
| 37 | using android::hardware::security::keymint::Digest; |
| 38 | using android::hardware::security::keymint::KeyParameter; |
| 39 | using android::hardware::security::keymint::KeyParameterValue; |
| 40 | using android::hardware::security::keymint::KeyPurpose; |
| 41 | using android::hardware::security::keymint::PaddingMode; |
| 42 | using android::hardware::security::keymint::SecurityLevel; |
| 43 | using android::hardware::security::keymint::Tag; |
| 44 | |
| 45 | using android::system::keystore2::CreateOperationResponse; |
| 46 | using android::system::keystore2::Domain; |
| 47 | using android::system::keystore2::KeyDescriptor; |
| 48 | using android::system::keystore2::KeyEntryResponse; |
| 49 | using android::system::keystore2::KeyMetadata; |
| 50 | |
| 51 | using android::base::Error; |
| 52 | using android::base::Result; |
| 53 | |
| 54 | using android::base::unique_fd; |
| 55 | |
| Martijn Coenen | 22da052 | 2021-03-09 10:52:30 +0100 | [diff] [blame^] | 56 | // Keystore boot level that the odsign key uses |
| 57 | static const int kOdsignBootLevel = 30; |
| 58 | |
| Martijn Coenen | ba1c9dc | 2021-02-04 13:18:29 +0100 | [diff] [blame] | 59 | static KeyDescriptor getKeyDescriptor() { |
| 60 | // AIDL parcelable objects don't have constructor |
| 61 | static KeyDescriptor descriptor; |
| 62 | static std::once_flag flag; |
| 63 | std::call_once(flag, [&]() { |
| 64 | descriptor.domain = Domain::SELINUX; |
| 65 | descriptor.alias = String16("ondevice-signing"); |
| 66 | descriptor.nspace = 101; // odsign_key |
| 67 | }); |
| 68 | |
| 69 | return descriptor; |
| 70 | } |
| 71 | |
| 72 | KeystoreKey::KeystoreKey() {} |
| 73 | |
| 74 | Result<KeyMetadata> KeystoreKey::createNewKey(const KeyDescriptor& descriptor) { |
| 75 | std::vector<KeyParameter> params; |
| 76 | |
| 77 | KeyParameter algo; |
| 78 | algo.tag = Tag::ALGORITHM; |
| 79 | algo.value = KeyParameterValue::make<KeyParameterValue::algorithm>(Algorithm::RSA); |
| 80 | params.push_back(algo); |
| 81 | |
| 82 | KeyParameter key_size; |
| 83 | key_size.tag = Tag::KEY_SIZE; |
| 84 | key_size.value = KeyParameterValue::make<KeyParameterValue::integer>(kRsaKeySize); |
| 85 | params.push_back(key_size); |
| 86 | |
| 87 | KeyParameter digest; |
| 88 | digest.tag = Tag::DIGEST; |
| 89 | digest.value = KeyParameterValue::make<KeyParameterValue::digest>(Digest::SHA_2_256); |
| 90 | params.push_back(digest); |
| 91 | |
| 92 | KeyParameter padding; |
| 93 | padding.tag = Tag::PADDING; |
| 94 | padding.value = |
| 95 | KeyParameterValue::make<KeyParameterValue::paddingMode>(PaddingMode::RSA_PKCS1_1_5_SIGN); |
| 96 | params.push_back(padding); |
| 97 | |
| 98 | KeyParameter exponent; |
| 99 | exponent.tag = Tag::RSA_PUBLIC_EXPONENT; |
| 100 | exponent.value = KeyParameterValue::make<KeyParameterValue::longInteger>(kRsaKeyExponent); |
| 101 | params.push_back(exponent); |
| 102 | |
| 103 | KeyParameter purpose; |
| 104 | purpose.tag = Tag::PURPOSE; |
| 105 | purpose.value = KeyParameterValue::make<KeyParameterValue::keyPurpose>(KeyPurpose::SIGN); |
| 106 | params.push_back(purpose); |
| 107 | |
| 108 | KeyParameter auth; |
| 109 | auth.tag = Tag::NO_AUTH_REQUIRED; |
| 110 | auth.value = KeyParameterValue::make<KeyParameterValue::boolValue>(true); |
| 111 | params.push_back(auth); |
| 112 | |
| Martijn Coenen | 22da052 | 2021-03-09 10:52:30 +0100 | [diff] [blame^] | 113 | KeyParameter boot_level; |
| 114 | boot_level.tag = Tag::MAX_BOOT_LEVEL; |
| 115 | boot_level.value = KeyParameterValue::make<KeyParameterValue::integer>(kOdsignBootLevel); |
| 116 | params.push_back(boot_level); |
| 117 | |
| Martijn Coenen | ba1c9dc | 2021-02-04 13:18:29 +0100 | [diff] [blame] | 118 | KeyMetadata metadata; |
| 119 | auto status = mSecurityLevel->generateKey(descriptor, {}, params, 0, {}, &metadata); |
| 120 | if (!status.isOk()) { |
| 121 | return Error() << "Failed to create new key"; |
| 122 | } |
| 123 | |
| 124 | return metadata; |
| 125 | } |
| 126 | |
| 127 | bool KeystoreKey::initialize() { |
| 128 | sp<IServiceManager> sm = defaultServiceManager(); |
| 129 | if (sm == nullptr) { |
| 130 | return false; |
| 131 | } |
| 132 | auto service = sm->getService(String16("android.system.keystore2")); |
| 133 | if (service == nullptr) { |
| 134 | return false; |
| 135 | } |
| 136 | mService = interface_cast<android::system::keystore2::IKeystoreService>(service); |
| 137 | if (mService == nullptr) { |
| 138 | return false; |
| 139 | } |
| 140 | |
| 141 | auto status = mService->getSecurityLevel(SecurityLevel::STRONGBOX, &mSecurityLevel); |
| 142 | if (!status.isOk()) { |
| 143 | // TODO fallback to TEE |
| 144 | return false; |
| 145 | } |
| 146 | |
| 147 | auto descriptor = getKeyDescriptor(); |
| 148 | // See if we can fetch an existing key |
| 149 | KeyEntryResponse keyEntryResponse; |
| 150 | LOG(INFO) << "Trying to retrieve existing keystore key..."; |
| 151 | status = mService->getKeyEntry(descriptor, &keyEntryResponse); |
| 152 | if (!status.isOk()) { |
| 153 | LOG(INFO) << "Existing keystore key not found, creating new key"; |
| 154 | auto newKeyStatus = createNewKey(descriptor); |
| 155 | if (!newKeyStatus.ok()) { |
| 156 | LOG(ERROR) << "Failed to create new key"; |
| 157 | return false; |
| 158 | } |
| 159 | mKeyMetadata = *newKeyStatus; |
| 160 | } else { |
| 161 | mKeyMetadata = keyEntryResponse.metadata; |
| 162 | } |
| 163 | |
| 164 | LOG(ERROR) << "Initialized Keystore key."; |
| 165 | return true; |
| 166 | } |
| 167 | |
| 168 | Result<SigningKey*> KeystoreKey::getInstance() { |
| 169 | static KeystoreKey keystoreKey; |
| 170 | |
| 171 | if (!keystoreKey.initialize()) { |
| 172 | return Error() << "Failed to initialize keystore key."; |
| 173 | } else { |
| 174 | return &keystoreKey; |
| 175 | } |
| 176 | } |
| 177 | |
| 178 | static std::vector<KeyParameter> getSignOpParameters() { |
| 179 | std::vector<KeyParameter> opParameters; |
| 180 | |
| 181 | KeyParameter algo; |
| 182 | algo.tag = Tag::ALGORITHM; |
| 183 | algo.value = KeyParameterValue::make<KeyParameterValue::algorithm>(Algorithm::RSA); |
| 184 | opParameters.push_back(algo); |
| 185 | |
| 186 | KeyParameter digest; |
| 187 | digest.tag = Tag::DIGEST; |
| 188 | digest.value = KeyParameterValue::make<KeyParameterValue::digest>(Digest::SHA_2_256); |
| 189 | opParameters.push_back(digest); |
| 190 | |
| 191 | KeyParameter padding; |
| 192 | padding.tag = Tag::PADDING; |
| 193 | padding.value = |
| 194 | KeyParameterValue::make<KeyParameterValue::paddingMode>(PaddingMode::RSA_PKCS1_1_5_SIGN); |
| 195 | opParameters.push_back(padding); |
| 196 | |
| 197 | KeyParameter purpose; |
| 198 | purpose.tag = Tag::PURPOSE; |
| 199 | purpose.value = KeyParameterValue::make<KeyParameterValue::keyPurpose>(KeyPurpose::SIGN); |
| 200 | opParameters.push_back(purpose); |
| 201 | |
| 202 | return opParameters; |
| 203 | } |
| 204 | |
| 205 | Result<std::string> KeystoreKey::sign(const std::string& message) const { |
| 206 | static auto opParameters = getSignOpParameters(); |
| 207 | |
| 208 | CreateOperationResponse opResponse; |
| 209 | |
| 210 | auto status = |
| 211 | mSecurityLevel->createOperation(getKeyDescriptor(), opParameters, false, &opResponse); |
| 212 | if (!status.isOk()) { |
| 213 | return Error() << "Failed to create keystore signing operation: " |
| 214 | << status.serviceSpecificErrorCode(); |
| 215 | } |
| 216 | auto operation = opResponse.iOperation; |
| 217 | |
| 218 | std::optional<std::vector<uint8_t>> out; |
| 219 | status = operation->update({message.begin(), message.end()}, &out); |
| 220 | if (!status.isOk()) { |
| 221 | return Error() << "Failed to call keystore update operation."; |
| 222 | } |
| 223 | |
| 224 | std::optional<std::vector<uint8_t>> signature; |
| 225 | status = operation->finish({}, {}, &signature); |
| 226 | if (!status.isOk()) { |
| 227 | return Error() << "Failed to call keystore finish operation."; |
| 228 | } |
| 229 | |
| 230 | if (!signature.has_value()) { |
| 231 | return Error() << "Didn't receive a signature from keystore finish operation."; |
| 232 | } |
| 233 | |
| 234 | std::string result{signature.value().begin(), signature.value().end()}; |
| 235 | |
| 236 | return result; |
| 237 | } |
| 238 | |
| 239 | Result<std::vector<uint8_t>> KeystoreKey::getPublicKey() const { |
| 240 | return extractPublicKeyFromX509(mKeyMetadata.certificate.value()); |
| 241 | } |