blob: a76f3cc00a9e3a888d550ed5014c22dfe9a1ab12 [file] [log] [blame]
David Zeuthenab3e5652019-10-28 13:32:48 -04001/*
2 * Copyright (c) 2019, The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17#ifndef SYSTEM_SECURITY_CREDENTIAL_H_
18#define SYSTEM_SECURITY_CREDENTIAL_H_
19
20#include <string>
21#include <vector>
22
23#include <android/security/identity/BnCredential.h>
24
David Zeuthena6f9fba2020-02-11 22:08:27 -050025#include <android/hardware/identity/IIdentityCredentialStore.h>
David Zeuthenab3e5652019-10-28 13:32:48 -040026
27#include "CredentialData.h"
28
29namespace android {
30namespace security {
31namespace identity {
32
33using ::android::sp;
34using ::android::binder::Status;
35using ::std::string;
36using ::std::vector;
37
David Zeuthena6f9fba2020-02-11 22:08:27 -050038using ::android::hardware::identity::CipherSuite;
David Zeuthen472e6c82020-10-16 11:50:13 -040039using ::android::hardware::identity::HardwareInformation;
David Zeuthena6f9fba2020-02-11 22:08:27 -050040using ::android::hardware::identity::IIdentityCredential;
41using ::android::hardware::identity::IIdentityCredentialStore;
David Zeuthene2a78a42020-04-27 13:34:38 -040042using ::android::hardware::identity::RequestDataItem;
43using ::android::hardware::identity::RequestNamespace;
David Zeuthenab3e5652019-10-28 13:32:48 -040044
45class Credential : public BnCredential {
46 public:
David Zeuthen472e6c82020-10-16 11:50:13 -040047 Credential(CipherSuite cipherSuite, const string& dataPath, const string& credentialName,
48 uid_t callingUid, HardwareInformation hwInfo,
49 sp<IIdentityCredentialStore> halStoreBinder, int halApiVersion);
David Zeuthenab3e5652019-10-28 13:32:48 -040050 ~Credential();
51
David Zeuthen472e6c82020-10-16 11:50:13 -040052 Status ensureOrReplaceHalBinder();
David Zeuthen27407a52021-03-04 16:32:43 -050053 void writableCredentialPersonalized();
David Zeuthenab3e5652019-10-28 13:32:48 -040054
55 // ICredential overrides
56 Status createEphemeralKeyPair(vector<uint8_t>* _aidl_return) override;
57
58 Status setReaderEphemeralPublicKey(const vector<uint8_t>& publicKey) override;
59
60 Status deleteCredential(vector<uint8_t>* _aidl_return) override;
61
David Zeuthen472e6c82020-10-16 11:50:13 -040062 Status deleteWithChallenge(const vector<uint8_t>& challenge,
63 vector<uint8_t>* _aidl_return) override;
64
65 Status proveOwnership(const vector<uint8_t>& challenge, vector<uint8_t>* _aidl_return) override;
66
David Zeuthenab3e5652019-10-28 13:32:48 -040067 Status getCredentialKeyCertificateChain(vector<uint8_t>* _aidl_return) override;
68
David Zeuthen472e6c82020-10-16 11:50:13 -040069 Status selectAuthKey(bool allowUsingExhaustedKeys, bool allowUsingExpiredKeys,
70 int64_t* _aidl_return) override;
David Zeuthenab3e5652019-10-28 13:32:48 -040071
72 Status getEntries(const vector<uint8_t>& requestMessage,
73 const vector<RequestNamespaceParcel>& requestNamespaces,
74 const vector<uint8_t>& sessionTranscript,
75 const vector<uint8_t>& readerSignature, bool allowUsingExhaustedKeys,
David Zeuthen472e6c82020-10-16 11:50:13 -040076 bool allowUsingExpiredKeys, GetEntriesResultParcel* _aidl_return) override;
David Zeuthenab3e5652019-10-28 13:32:48 -040077
78 Status setAvailableAuthenticationKeys(int32_t keyCount, int32_t maxUsesPerKey) override;
79 Status getAuthKeysNeedingCertification(vector<AuthKeyParcel>* _aidl_return) override;
80 Status storeStaticAuthenticationData(const AuthKeyParcel& authenticationKey,
81 const vector<uint8_t>& staticAuthData) override;
David Zeuthen472e6c82020-10-16 11:50:13 -040082 Status
83 storeStaticAuthenticationDataWithExpiration(const AuthKeyParcel& authenticationKey,
84 int64_t expirationDateMillisSinceEpoch,
85 const vector<uint8_t>& staticAuthData) override;
David Zeuthenab3e5652019-10-28 13:32:48 -040086 Status getAuthenticationDataUsageCount(vector<int32_t>* _aidl_return) override;
87
David Zeuthen472e6c82020-10-16 11:50:13 -040088 Status update(sp<IWritableCredential>* _aidl_return) override;
89
David Zeuthenab3e5652019-10-28 13:32:48 -040090 private:
David Zeuthena6f9fba2020-02-11 22:08:27 -050091 CipherSuite cipherSuite_;
David Zeuthenab3e5652019-10-28 13:32:48 -040092 string dataPath_;
93 string credentialName_;
David Zeuthen472e6c82020-10-16 11:50:13 -040094 uid_t callingUid_;
95 HardwareInformation hwInfo_;
96 sp<IIdentityCredentialStore> halStoreBinder_;
David Zeuthenab3e5652019-10-28 13:32:48 -040097
David Zeuthenab3e5652019-10-28 13:32:48 -040098 uint64_t selectedChallenge_ = 0;
99
David Zeuthenab3e5652019-10-28 13:32:48 -0400100 sp<IIdentityCredential> halBinder_;
David Zeuthen472e6c82020-10-16 11:50:13 -0400101 int halApiVersion_;
David Zeuthene2a78a42020-04-27 13:34:38 -0400102
David Zeuthen27407a52021-03-04 16:32:43 -0500103 bool ensureChallenge();
104
David Zeuthene2a78a42020-04-27 13:34:38 -0400105 ssize_t
106 calcExpectedDeviceNameSpacesSize(const vector<uint8_t>& requestMessage,
107 const vector<RequestNamespaceParcel>& requestNamespaces,
108 uint32_t authorizedAcps);
David Zeuthenab3e5652019-10-28 13:32:48 -0400109};
110
111} // namespace identity
112} // namespace security
113} // namespace android
114
115#endif // SYSTEM_SECURITY_IDENTITY_CREDENTIAL_H_