| Janis Danisevskis | ff3d7f4 | 2018-10-08 07:15:09 -0700 | [diff] [blame] | 1 | /* | 
 | 2 | ** | 
 | 3 | ** Copyright 2018, The Android Open Source Project | 
 | 4 | ** | 
 | 5 | ** Licensed under the Apache License, Version 2.0 (the "License"); | 
 | 6 | ** you may not use this file except in compliance with the License. | 
 | 7 | ** You may obtain a copy of the License at | 
 | 8 | ** | 
 | 9 | **     http://www.apache.org/licenses/LICENSE-2.0 | 
 | 10 | ** | 
 | 11 | ** Unless required by applicable law or agreed to in writing, software | 
 | 12 | ** distributed under the License is distributed on an "AS IS" BASIS, | 
 | 13 | ** WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | 
 | 14 | ** See the License for the specific language governing permissions and | 
 | 15 | ** limitations under the License. | 
 | 16 | */ | 
 | 17 |  | 
 | 18 | #ifndef KEYSTORE_KEYMASTER_WORKER_H_ | 
 | 19 | #define KEYSTORE_KEYMASTER_WORKER_H_ | 
 | 20 |  | 
 | 21 | #include <condition_variable> | 
 | 22 | #include <functional> | 
 | 23 | #include <keymasterV4_0/Keymaster.h> | 
 | 24 | #include <memory> | 
 | 25 | #include <mutex> | 
 | 26 | #include <optional> | 
 | 27 | #include <queue> | 
 | 28 | #include <thread> | 
 | 29 | #include <tuple> | 
 | 30 |  | 
 | 31 | #include <keystore/ExportResult.h> | 
 | 32 | #include <keystore/KeyCharacteristics.h> | 
 | 33 | #include <keystore/KeymasterBlob.h> | 
 | 34 | #include <keystore/OperationResult.h> | 
 | 35 | #include <keystore/keystore_return_types.h> | 
 | 36 |  | 
 | 37 | #include "blob.h" | 
 | 38 | #include "operation.h" | 
 | 39 |  | 
 | 40 | namespace keystore { | 
 | 41 |  | 
 | 42 | using android::sp; | 
 | 43 | using ::android::hardware::hidl_vec; | 
 | 44 | using ::android::hardware::Return; | 
 | 45 | using ::android::hardware::Void; | 
 | 46 | using android::hardware::keymaster::V4_0::ErrorCode; | 
 | 47 | using android::hardware::keymaster::V4_0::HardwareAuthToken; | 
 | 48 | using android::hardware::keymaster::V4_0::HmacSharingParameters; | 
 | 49 | using android::hardware::keymaster::V4_0::KeyCharacteristics; | 
 | 50 | using android::hardware::keymaster::V4_0::KeyFormat; | 
 | 51 | using android::hardware::keymaster::V4_0::KeyParameter; | 
 | 52 | using android::hardware::keymaster::V4_0::KeyPurpose; | 
 | 53 | using android::hardware::keymaster::V4_0::VerificationToken; | 
 | 54 | using android::hardware::keymaster::V4_0::support::Keymaster; | 
 | 55 | // using KeystoreCharacteristics = ::android::security::keymaster::KeyCharacteristics; | 
 | 56 | using ::android::security::keymaster::KeymasterBlob; | 
 | 57 |  | 
 | 58 | class KeyStore; | 
 | 59 |  | 
 | 60 | class Worker { | 
 | 61 |  | 
 | 62 |     /* | 
 | 63 |      * NonCopyableFunction works similar to std::function in that it wraps callable objects and | 
 | 64 |      * erases their type. The rationale for using a custom class instead of | 
 | 65 |      * std::function is that std::function requires the wrapped object to be copy contructible. | 
 | 66 |      * NonCopyableFunction is itself not copyable and never attempts to copy the wrapped object. | 
 | 67 |      * TODO use similar optimization as std::function to remove the extra make_unique allocation. | 
 | 68 |      */ | 
 | 69 |     template <typename Fn> class NonCopyableFunction; | 
 | 70 |  | 
 | 71 |     template <typename Ret, typename... Args> class NonCopyableFunction<Ret(Args...)> { | 
 | 72 |  | 
 | 73 |         class NonCopyableFunctionBase { | 
 | 74 |           public: | 
 | 75 |             NonCopyableFunctionBase() = default; | 
 | 76 |             virtual ~NonCopyableFunctionBase() {} | 
 | 77 |             virtual Ret operator()(Args... args) = 0; | 
 | 78 |             NonCopyableFunctionBase(const NonCopyableFunctionBase&) = delete; | 
 | 79 |             NonCopyableFunctionBase& operator=(const NonCopyableFunctionBase&) = delete; | 
 | 80 |         }; | 
 | 81 |  | 
 | 82 |         template <typename Fn> | 
 | 83 |         class NonCopyableFunctionTypeEraser : public NonCopyableFunctionBase { | 
 | 84 |           private: | 
 | 85 |             Fn f_; | 
 | 86 |  | 
 | 87 |           public: | 
 | 88 |             NonCopyableFunctionTypeEraser() = default; | 
 | 89 |             explicit NonCopyableFunctionTypeEraser(Fn f) : f_(std::move(f)) {} | 
 | 90 |             Ret operator()(Args... args) override { return f_(std::move(args)...); } | 
 | 91 |         }; | 
 | 92 |  | 
 | 93 |       private: | 
 | 94 |         std::unique_ptr<NonCopyableFunctionBase> f_; | 
 | 95 |  | 
 | 96 |       public: | 
 | 97 |         NonCopyableFunction() = default; | 
| Chih-Hung Hsieh | 4fa39ef | 2019-01-04 13:34:17 -0800 | [diff] [blame] | 98 |         // NOLINTNEXTLINE(google-explicit-constructor) | 
| Janis Danisevskis | ff3d7f4 | 2018-10-08 07:15:09 -0700 | [diff] [blame] | 99 |         template <typename F> NonCopyableFunction(F f) { | 
 | 100 |             f_ = std::make_unique<NonCopyableFunctionTypeEraser<F>>(std::move(f)); | 
 | 101 |         } | 
 | 102 |         NonCopyableFunction(NonCopyableFunction&& other) = default; | 
 | 103 |         NonCopyableFunction& operator=(NonCopyableFunction&& other) = default; | 
 | 104 |         NonCopyableFunction(const NonCopyableFunction& other) = delete; | 
 | 105 |         NonCopyableFunction& operator=(const NonCopyableFunction& other) = delete; | 
 | 106 |  | 
 | 107 |         Ret operator()(Args... args) { | 
 | 108 |             if (f_) return (*f_)(std::move(args)...); | 
 | 109 |         } | 
 | 110 |     }; | 
 | 111 |  | 
 | 112 |     using WorkerTask = NonCopyableFunction<void()>; | 
 | 113 |  | 
 | 114 |     std::queue<WorkerTask> pending_requests_; | 
 | 115 |     std::mutex pending_requests_mutex_; | 
 | 116 |     std::condition_variable pending_requests_cond_var_; | 
| Janis Danisevskis | ff3d7f4 | 2018-10-08 07:15:09 -0700 | [diff] [blame] | 117 |     bool running_ = false; | 
| Janis Danisevskis | c2f1f72 | 2019-08-16 14:54:55 -0700 | [diff] [blame] | 118 |     bool terminate_ = false; | 
| Janis Danisevskis | ff3d7f4 | 2018-10-08 07:15:09 -0700 | [diff] [blame] | 119 |  | 
 | 120 |   public: | 
 | 121 |     Worker(); | 
 | 122 |     ~Worker(); | 
 | 123 |     void addRequest(WorkerTask request); | 
 | 124 | }; | 
 | 125 |  | 
 | 126 | template <typename... Args> struct MakeKeymasterWorkerCB; | 
 | 127 |  | 
 | 128 | template <typename ErrorType, typename... Args> | 
 | 129 | struct MakeKeymasterWorkerCB<ErrorType, std::function<void(Args...)>> { | 
 | 130 |     using type = std::function<void(ErrorType, std::tuple<std::decay_t<Args>...>&&)>; | 
 | 131 | }; | 
 | 132 |  | 
 | 133 | template <typename ErrorType> struct MakeKeymasterWorkerCB<ErrorType> { | 
 | 134 |     using type = std::function<void(ErrorType)>; | 
 | 135 | }; | 
 | 136 |  | 
 | 137 | template <typename... Args> | 
 | 138 | using MakeKeymasterWorkerCB_t = typename MakeKeymasterWorkerCB<Args...>::type; | 
 | 139 |  | 
 | 140 | class KeymasterWorker : protected Worker { | 
 | 141 |   private: | 
 | 142 |     sp<Keymaster> keymasterDevice_; | 
 | 143 |     OperationMap operationMap_; | 
 | 144 |     KeyStore* keyStore_; | 
 | 145 |  | 
 | 146 |     template <typename KMFn, typename ErrorType, typename... Args, size_t... I> | 
 | 147 |     void unwrap_tuple(KMFn kmfn, std::function<void(ErrorType)> cb, | 
 | 148 |                       const std::tuple<Args...>& tuple, std::index_sequence<I...>) { | 
 | 149 |         cb(((*keymasterDevice_).*kmfn)(std::get<I>(tuple)...)); | 
 | 150 |     } | 
 | 151 |  | 
 | 152 |     template <typename KMFn, typename ErrorType, typename... ReturnTypes, typename... Args, | 
 | 153 |               size_t... I> | 
 | 154 |     void unwrap_tuple(KMFn kmfn, std::function<void(ErrorType, std::tuple<ReturnTypes...>&&)> cb, | 
 | 155 |                       const std::tuple<Args...>& tuple, std::index_sequence<I...>) { | 
 | 156 |         std::tuple<ReturnTypes...> returnValue; | 
 | 157 |         auto result = ((*keymasterDevice_).*kmfn)( | 
 | 158 |             std::get<I>(tuple)..., | 
 | 159 |             [&returnValue](const ReturnTypes&... args) { returnValue = std::make_tuple(args...); }); | 
 | 160 |         cb(std::move(result), std::move(returnValue)); | 
 | 161 |     } | 
 | 162 |  | 
 | 163 |     template <typename KMFn, typename ErrorType, typename... Args> | 
 | 164 |     void addRequest(KMFn kmfn, std::function<void(ErrorType)> cb, Args&&... args) { | 
 | 165 |         Worker::addRequest([this, kmfn, cb = std::move(cb), | 
 | 166 |                             tuple = std::make_tuple(std::forward<Args>(args)...)]() { | 
 | 167 |             unwrap_tuple(kmfn, std::move(cb), tuple, std::index_sequence_for<Args...>{}); | 
 | 168 |         }); | 
 | 169 |     } | 
 | 170 |  | 
 | 171 |     template <typename KMFn, typename ErrorType, typename... ReturnTypes, typename... Args> | 
 | 172 |     void addRequest(KMFn kmfn, std::function<void(ErrorType, std::tuple<ReturnTypes...>&&)> cb, | 
 | 173 |                     Args&&... args) { | 
 | 174 |         Worker::addRequest([this, kmfn, cb = std::move(cb), | 
 | 175 |                             tuple = std::make_tuple(std::forward<Args>(args)...)]() { | 
 | 176 |             unwrap_tuple(kmfn, std::move(cb), tuple, std::index_sequence_for<Args...>{}); | 
 | 177 |         }); | 
 | 178 |     } | 
| Janis Danisevskis | 6a0d998 | 2019-04-30 15:43:59 -0700 | [diff] [blame] | 179 |  | 
 | 180 |     void deleteOldKeyOnUpgrade(const LockedKeyBlobEntry& blobfile, Blob keyBlob); | 
| Janis Danisevskis | ff3d7f4 | 2018-10-08 07:15:09 -0700 | [diff] [blame] | 181 |     std::tuple<KeyStoreServiceReturnCode, Blob> | 
 | 182 |     upgradeKeyBlob(const LockedKeyBlobEntry& lockedEntry, const AuthorizationSet& params); | 
 | 183 |     std::tuple<KeyStoreServiceReturnCode, KeyCharacteristics, Blob, Blob> | 
 | 184 |     createKeyCharacteristicsCache(const LockedKeyBlobEntry& lockedEntry, | 
 | 185 |                                   const hidl_vec<uint8_t>& clientId, | 
 | 186 |                                   const hidl_vec<uint8_t>& appData, Blob keyBlob, Blob charBlob); | 
 | 187 |  | 
 | 188 |     /** | 
 | 189 |      * Get the auth token for this operation from the auth token table. | 
 | 190 |      * | 
 | 191 |      * Returns NO_ERROR if the auth token was found or none was required.  If not needed, the | 
 | 192 |      *             token will be empty (which keymaster interprets as no auth token). | 
 | 193 |      *         OP_AUTH_NEEDED if it is a per op authorization, no authorization token exists for | 
 | 194 |      *             that operation and  failOnTokenMissing is false. | 
 | 195 |      *         KM_ERROR_KEY_USER_NOT_AUTHENTICATED if there is no valid auth token for the operation | 
 | 196 |      */ | 
 | 197 |     std::pair<KeyStoreServiceReturnCode, HardwareAuthToken> | 
 | 198 |     getAuthToken(const KeyCharacteristics& characteristics, uint64_t handle, KeyPurpose purpose, | 
 | 199 |                  bool failOnTokenMissing = true); | 
 | 200 |  | 
 | 201 |     KeyStoreServiceReturnCode abort(const sp<IBinder>& token); | 
 | 202 |  | 
 | 203 |     bool pruneOperation(); | 
 | 204 |  | 
 | 205 |     KeyStoreServiceReturnCode getOperationAuthTokenIfNeeded(std::shared_ptr<Operation> op); | 
 | 206 |  | 
 | 207 |     void appendConfirmationTokenIfNeeded(const KeyCharacteristics& keyCharacteristics, | 
 | 208 |                                          hidl_vec<KeyParameter>* params); | 
 | 209 |  | 
 | 210 |   public: | 
 | 211 |     KeymasterWorker(sp<Keymaster> keymasterDevice, KeyStore* keyStore); | 
 | 212 |  | 
| Janis Danisevskis | 3789610 | 2019-03-14 17:15:06 -0700 | [diff] [blame] | 213 |     void logIfKeymasterVendorError(ErrorCode ec) const; | 
 | 214 |  | 
| Janis Danisevskis | ff3d7f4 | 2018-10-08 07:15:09 -0700 | [diff] [blame] | 215 |     using worker_begin_cb = std::function<void(::android::security::keymaster::OperationResult)>; | 
 | 216 |     void begin(LockedKeyBlobEntry, sp<IBinder> appToken, Blob keyBlob, Blob charBlob, | 
 | 217 |                bool pruneable, KeyPurpose purpose, AuthorizationSet opParams, | 
 | 218 |                hidl_vec<uint8_t> entropy, worker_begin_cb worker_cb); | 
 | 219 |  | 
 | 220 |     using update_cb = std::function<void(::android::security::keymaster::OperationResult)>; | 
 | 221 |     void update(sp<IBinder> token, AuthorizationSet params, hidl_vec<uint8_t> data, | 
 | 222 |                 update_cb _hidl_cb); | 
 | 223 |  | 
 | 224 |     using finish_cb = std::function<void(::android::security::keymaster::OperationResult)>; | 
 | 225 |     void finish(sp<IBinder> token, AuthorizationSet params, hidl_vec<uint8_t> input, | 
 | 226 |                 hidl_vec<uint8_t> signature, hidl_vec<uint8_t> entorpy, finish_cb worker_cb); | 
 | 227 |  | 
 | 228 |     using abort_cb = std::function<void(KeyStoreServiceReturnCode)>; | 
 | 229 |     void abort(sp<IBinder> token, abort_cb _hidl_cb); | 
 | 230 |  | 
 | 231 |     using getHardwareInfo_cb = MakeKeymasterWorkerCB_t<Return<void>, Keymaster::getHardwareInfo_cb>; | 
 | 232 |     void getHardwareInfo(getHardwareInfo_cb _hidl_cb); | 
 | 233 |  | 
 | 234 |     using getHmacSharingParameters_cb = | 
 | 235 |         MakeKeymasterWorkerCB_t<Return<void>, Keymaster::getHmacSharingParameters_cb>; | 
 | 236 |     void getHmacSharingParameters(getHmacSharingParameters_cb _hidl_cb); | 
 | 237 |  | 
 | 238 |     using computeSharedHmac_cb = | 
 | 239 |         MakeKeymasterWorkerCB_t<Return<void>, Keymaster::computeSharedHmac_cb>; | 
 | 240 |     void computeSharedHmac(hidl_vec<HmacSharingParameters> params, computeSharedHmac_cb _hidl_cb); | 
 | 241 |  | 
 | 242 |     using verifyAuthorization_cb = | 
 | 243 |         std::function<void(KeyStoreServiceReturnCode ec, HardwareAuthToken, VerificationToken)>; | 
 | 244 |     void verifyAuthorization(uint64_t challenge, hidl_vec<KeyParameter> params, | 
 | 245 |                              HardwareAuthToken token, verifyAuthorization_cb _hidl_cb); | 
 | 246 |  | 
 | 247 |     using addRngEntropy_cb = MakeKeymasterWorkerCB_t<Return<ErrorCode>>; | 
 | 248 |     void addRngEntropy(hidl_vec<uint8_t> data, addRngEntropy_cb _hidl_cb); | 
 | 249 |  | 
 | 250 |     using generateKey_cb = std::function<void( | 
 | 251 |         KeyStoreServiceReturnCode, ::android::hardware::keymaster::V4_0::KeyCharacteristics)>; | 
 | 252 |     void generateKey(LockedKeyBlobEntry, hidl_vec<KeyParameter> keyParams, | 
 | 253 |                      hidl_vec<uint8_t> entropy, int flags, generateKey_cb _hidl_cb); | 
 | 254 |  | 
 | 255 |     using generateKey2_cb = MakeKeymasterWorkerCB_t<Return<void>, Keymaster::generateKey_cb>; | 
 | 256 |     void generateKey(hidl_vec<KeyParameter> keyParams, generateKey2_cb _hidl_cb); | 
 | 257 |  | 
 | 258 |     using getKeyCharacteristics_cb = std::function<void( | 
 | 259 |         KeyStoreServiceReturnCode, ::android::hardware::keymaster::V4_0::KeyCharacteristics)>; | 
 | 260 |     void getKeyCharacteristics(LockedKeyBlobEntry lockedEntry, hidl_vec<uint8_t> clientId, | 
 | 261 |                                hidl_vec<uint8_t> appData, Blob keyBlob, Blob charBlob, | 
 | 262 |                                getKeyCharacteristics_cb _hidl_cb); | 
 | 263 |  | 
 | 264 |     using importKey_cb = std::function<void( | 
 | 265 |         KeyStoreServiceReturnCode, ::android::hardware::keymaster::V4_0::KeyCharacteristics)>; | 
 | 266 |     void importKey(LockedKeyBlobEntry lockedEntry, hidl_vec<KeyParameter> params, | 
 | 267 |                    KeyFormat keyFormat, hidl_vec<uint8_t> keyData, int flags, | 
 | 268 |                    importKey_cb _hidl_cb); | 
 | 269 |  | 
 | 270 |     using importWrappedKey_cb = std::function<void( | 
 | 271 |         KeyStoreServiceReturnCode, ::android::hardware::keymaster::V4_0::KeyCharacteristics)>; | 
 | 272 |     void importWrappedKey(LockedKeyBlobEntry wrappingLockedEntry, | 
 | 273 |                           LockedKeyBlobEntry wrapppedLockedEntry, hidl_vec<uint8_t> wrappedKeyData, | 
 | 274 |                           hidl_vec<uint8_t> maskingKey, hidl_vec<KeyParameter> unwrappingParams, | 
 | 275 |                           Blob wrappingBlob, Blob wrappingCharBlob, uint64_t passwordSid, | 
 | 276 |                           uint64_t biometricSid, importWrappedKey_cb worker_cb); | 
 | 277 |  | 
 | 278 |     using exportKey_cb = std::function<void(::android::security::keymaster::ExportResult)>; | 
 | 279 |     void exportKey(LockedKeyBlobEntry lockedEntry, KeyFormat exportFormat, | 
 | 280 |                    hidl_vec<uint8_t> clientId, hidl_vec<uint8_t> appData, Blob keyBlob, | 
 | 281 |                    Blob charBlob, exportKey_cb _hidl_cb); | 
 | 282 |  | 
 | 283 |     using attestKey_cb = MakeKeymasterWorkerCB_t<Return<void>, Keymaster::attestKey_cb>; | 
 | 284 |     void attestKey(hidl_vec<uint8_t> keyToAttest, hidl_vec<KeyParameter> attestParams, | 
 | 285 |                    attestKey_cb _hidl_cb); | 
 | 286 |  | 
| Janis Danisevskis | ff3d7f4 | 2018-10-08 07:15:09 -0700 | [diff] [blame] | 287 |     using deleteKey_cb = MakeKeymasterWorkerCB_t<Return<ErrorCode>>; | 
 | 288 |     void deleteKey(hidl_vec<uint8_t> keyBlob, deleteKey_cb _hidl_cb); | 
 | 289 |  | 
| Janis Danisevskis | ff3d7f4 | 2018-10-08 07:15:09 -0700 | [diff] [blame] | 290 |     using begin_cb = MakeKeymasterWorkerCB_t<Return<void>, Keymaster::begin_cb>; | 
 | 291 |     void begin(KeyPurpose purpose, hidl_vec<uint8_t> key, hidl_vec<KeyParameter> inParams, | 
 | 292 |                HardwareAuthToken authToken, begin_cb _hidl_cb); | 
 | 293 |  | 
 | 294 |     void binderDied(android::wp<IBinder> who); | 
 | 295 |  | 
 | 296 |     const Keymaster::VersionResult& halVersion() { return keymasterDevice_->halVersion(); } | 
 | 297 | }; | 
 | 298 |  | 
 | 299 | }  // namespace keystore | 
 | 300 |  | 
 | 301 | #endif  // KEYSTORE_KEYMASTER_WORKER_H_ |