blob: e84fb371170c88064c3baf835914c1d184b18920 [file] [log] [blame]
Shawn Willden6507c272016-01-05 22:51:48 -07001/*
2 * Copyright (C) 2009 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17//#define LOG_NDEBUG 0
18#define LOG_TAG "keystore"
19
Shawn Willden814a6e72016-03-15 08:37:29 -060020#include <keymaster/keymaster_configuration.h>
Shawn Willden6507c272016-01-05 22:51:48 -070021#include <keymaster/soft_keymaster_device.h>
22#include <keymaster/soft_keymaster_logger.h>
23
24#include <binder/IPCThreadState.h>
25#include <binder/IServiceManager.h>
26
27#include <cutils/log.h>
28
29#include "entropy.h"
30#include "key_store_service.h"
31#include "keystore.h"
32#include "permissions.h"
33
34/* KeyStore is a secured storage for key-value pairs. In this implementation,
35 * each file stores one key-value pair. Keys are encoded in file names, and
36 * values are encrypted with checksums. The encryption key is protected by a
37 * user-defined password. To keep things simple, buffers are always larger than
38 * the maximum space we needed, so boundary checks on buffers are omitted. */
39
Shawn Willden814a6e72016-03-15 08:37:29 -060040using keymaster::AuthorizationSet;
41using keymaster::AuthorizationSetBuilder;
Shawn Willden6507c272016-01-05 22:51:48 -070042using keymaster::SoftKeymasterDevice;
43
Shawn Willden814a6e72016-03-15 08:37:29 -060044static int configure_keymaster_devices(keymaster2_device_t* main, keymaster2_device_t* fallback) {
45 keymaster_error_t error = keymaster::ConfigureDevice(main);
46 if (error != KM_ERROR_OK) {
47 return -1;
48 }
49
50 error = keymaster::ConfigureDevice(fallback);
51 if (error != KM_ERROR_OK) {
52 return -1;
53 }
54
55 return 0;
56}
57
Shawn Willden715d0232016-01-21 00:45:13 -070058static int keymaster0_device_initialize(const hw_module_t* mod, keymaster2_device_t** dev) {
Shawn Willden6507c272016-01-05 22:51:48 -070059 assert(mod->module_api_version < KEYMASTER_MODULE_API_VERSION_1_0);
60 ALOGI("Found keymaster0 module %s, version %x", mod->name, mod->module_api_version);
61
62 UniquePtr<SoftKeymasterDevice> soft_keymaster(new SoftKeymasterDevice);
63 keymaster0_device_t* km0_device = NULL;
64 keymaster_error_t error = KM_ERROR_OK;
65
66 int rc = keymaster0_open(mod, &km0_device);
67 if (rc) {
68 ALOGE("Error opening keystore keymaster0 device.");
69 goto err;
70 }
71
72 if (km0_device->flags & KEYMASTER_SOFTWARE_ONLY) {
73 ALOGI("Keymaster0 module is software-only. Using SoftKeymasterDevice instead.");
74 km0_device->common.close(&km0_device->common);
75 km0_device = NULL;
76 // SoftKeymasterDevice will be deleted by keymaster_device_release()
Shawn Willden715d0232016-01-21 00:45:13 -070077 *dev = soft_keymaster.release()->keymaster2_device();
Shawn Willden6507c272016-01-05 22:51:48 -070078 return 0;
79 }
80
Shawn Willden715d0232016-01-21 00:45:13 -070081 ALOGD("Wrapping keymaster0 module %s with SoftKeymasterDevice", mod->name);
Shawn Willden6507c272016-01-05 22:51:48 -070082 error = soft_keymaster->SetHardwareDevice(km0_device);
83 km0_device = NULL; // SoftKeymasterDevice has taken ownership.
84 if (error != KM_ERROR_OK) {
85 ALOGE("Got error %d from SetHardwareDevice", error);
86 rc = error;
87 goto err;
88 }
89
Shawn Willden715d0232016-01-21 00:45:13 -070090 // SoftKeymasterDevice will be deleted by keymaster_device_release()
91 *dev = soft_keymaster.release()->keymaster2_device();
Shawn Willden6507c272016-01-05 22:51:48 -070092 return 0;
93
94err:
95 if (km0_device)
96 km0_device->common.close(&km0_device->common);
97 *dev = NULL;
98 return rc;
99}
100
Shawn Willden715d0232016-01-21 00:45:13 -0700101static int keymaster1_device_initialize(const hw_module_t* mod, keymaster2_device_t** dev) {
Shawn Willden6507c272016-01-05 22:51:48 -0700102 assert(mod->module_api_version >= KEYMASTER_MODULE_API_VERSION_1_0);
103 ALOGI("Found keymaster1 module %s, version %x", mod->name, mod->module_api_version);
104
105 UniquePtr<SoftKeymasterDevice> soft_keymaster(new SoftKeymasterDevice);
Shawn Willden715d0232016-01-21 00:45:13 -0700106 keymaster1_device_t* km1_device = nullptr;
Shawn Willden6507c272016-01-05 22:51:48 -0700107 keymaster_error_t error = KM_ERROR_OK;
108
109 int rc = keymaster1_open(mod, &km1_device);
110 if (rc) {
111 ALOGE("Error %d opening keystore keymaster1 device", rc);
112 goto err;
113 }
114
Shawn Willden715d0232016-01-21 00:45:13 -0700115 ALOGD("Wrapping keymaster1 module %s with SofKeymasterDevice", mod->name);
Shawn Willden6507c272016-01-05 22:51:48 -0700116 error = soft_keymaster->SetHardwareDevice(km1_device);
Shawn Willden715d0232016-01-21 00:45:13 -0700117 km1_device = nullptr; // SoftKeymasterDevice has taken ownership.
Shawn Willden6507c272016-01-05 22:51:48 -0700118 if (error != KM_ERROR_OK) {
119 ALOGE("Got error %d from SetHardwareDevice", error);
120 rc = error;
121 goto err;
122 }
123
Shawn Willden715d0232016-01-21 00:45:13 -0700124 // SoftKeymasterDevice will be deleted by keymaster_device_release()
125 *dev = soft_keymaster.release()->keymaster2_device();
126 return 0;
Shawn Willden6507c272016-01-05 22:51:48 -0700127
128err:
129 if (km1_device)
130 km1_device->common.close(&km1_device->common);
131 *dev = NULL;
132 return rc;
133}
134
Shawn Willden715d0232016-01-21 00:45:13 -0700135static int keymaster2_device_initialize(const hw_module_t* mod, keymaster2_device_t** dev) {
136 assert(mod->module_api_version >= KEYMASTER_MODULE_API_VERSION_2_0);
137 ALOGI("Found keymaster2 module %s, version %x", mod->name, mod->module_api_version);
138
139 UniquePtr<SoftKeymasterDevice> soft_keymaster(new SoftKeymasterDevice);
140 keymaster2_device_t* km2_device = nullptr;
141
142 int rc = keymaster2_open(mod, &km2_device);
143 if (rc) {
144 ALOGE("Error %d opening keystore keymaster2 device", rc);
145 goto err;
146 }
147
148 *dev = km2_device;
149 return 0;
150
151err:
152 if (km2_device)
153 km2_device->common.close(&km2_device->common);
154 *dev = nullptr;
155 return rc;
156}
157
158static int keymaster_device_initialize(keymaster2_device_t** dev) {
Shawn Willden6507c272016-01-05 22:51:48 -0700159 const hw_module_t* mod;
160
161 int rc = hw_get_module_by_class(KEYSTORE_HARDWARE_MODULE_ID, NULL, &mod);
162 if (rc) {
163 ALOGI("Could not find any keystore module, using software-only implementation.");
164 // SoftKeymasterDevice will be deleted by keymaster_device_release()
Shawn Willden715d0232016-01-21 00:45:13 -0700165 *dev = (new SoftKeymasterDevice)->keymaster2_device();
Shawn Willden6507c272016-01-05 22:51:48 -0700166 return 0;
167 }
168
169 if (mod->module_api_version < KEYMASTER_MODULE_API_VERSION_1_0) {
170 return keymaster0_device_initialize(mod, dev);
Shawn Willden715d0232016-01-21 00:45:13 -0700171 } else if (mod->module_api_version == KEYMASTER_MODULE_API_VERSION_1_0) {
Shawn Willden6507c272016-01-05 22:51:48 -0700172 return keymaster1_device_initialize(mod, dev);
Shawn Willden715d0232016-01-21 00:45:13 -0700173 } else {
174 return keymaster2_device_initialize(mod, dev);
Shawn Willden6507c272016-01-05 22:51:48 -0700175 }
176}
177
178// softkeymaster_logger appears not to be used in keystore, but it installs itself as the
179// logger used by SoftKeymasterDevice.
180static keymaster::SoftKeymasterLogger softkeymaster_logger;
181
Shawn Willden715d0232016-01-21 00:45:13 -0700182static int fallback_keymaster_device_initialize(keymaster2_device_t** dev) {
183 *dev = (new SoftKeymasterDevice)->keymaster2_device();
Shawn Willden6507c272016-01-05 22:51:48 -0700184 // SoftKeymasterDevice will be deleted by keymaster_device_release()
185 return 0;
186}
187
Shawn Willden715d0232016-01-21 00:45:13 -0700188static void keymaster_device_release(keymaster2_device_t* dev) {
Shawn Willden6507c272016-01-05 22:51:48 -0700189 dev->common.close(&dev->common);
190}
191
192int main(int argc, char* argv[]) {
193 if (argc < 2) {
194 ALOGE("A directory must be specified!");
195 return 1;
196 }
197 if (chdir(argv[1]) == -1) {
198 ALOGE("chdir: %s: %s", argv[1], strerror(errno));
199 return 1;
200 }
201
202 Entropy entropy;
203 if (!entropy.open()) {
204 return 1;
205 }
206
Shawn Willden715d0232016-01-21 00:45:13 -0700207 keymaster2_device_t* dev;
Shawn Willden6507c272016-01-05 22:51:48 -0700208 if (keymaster_device_initialize(&dev)) {
209 ALOGE("keystore keymaster could not be initialized; exiting");
210 return 1;
211 }
212
Shawn Willden715d0232016-01-21 00:45:13 -0700213 keymaster2_device_t* fallback;
Shawn Willden6507c272016-01-05 22:51:48 -0700214 if (fallback_keymaster_device_initialize(&fallback)) {
215 ALOGE("software keymaster could not be initialized; exiting");
216 return 1;
217 }
218
Shawn Willden814a6e72016-03-15 08:37:29 -0600219 if (configure_keymaster_devices(dev, fallback)) {
220 ALOGE("Keymaster devices could not be configured; exiting");
221 return 1;
222 }
223
Shawn Willden6507c272016-01-05 22:51:48 -0700224 if (configure_selinux() == -1) {
225 return -1;
226 }
227
228 KeyStore keyStore(&entropy, dev, fallback);
229 keyStore.initialize();
230 android::sp<android::IServiceManager> sm = android::defaultServiceManager();
231 android::sp<android::KeyStoreService> service = new android::KeyStoreService(&keyStore);
232 android::status_t ret = sm->addService(android::String16("android.security.keystore"), service);
233 if (ret != android::OK) {
234 ALOGE("Couldn't register binder service!");
235 return -1;
236 }
237
238 /*
239 * We're the only thread in existence, so we're just going to process
240 * Binder transaction as a single-threaded program.
241 */
242 android::IPCThreadState::self()->joinThreadPool();
243
244 keymaster_device_release(dev);
245 return 1;
246}