blob: 31657636b409da31ac6004b598b8884292dc2efc [file] [log] [blame]
Janis Danisevskisff3d7f42018-10-08 07:15:09 -07001/*
2**
3** Copyright 2018, The Android Open Source Project
4**
5** Licensed under the Apache License, Version 2.0 (the "License");
6** you may not use this file except in compliance with the License.
7** You may obtain a copy of the License at
8**
9** http://www.apache.org/licenses/LICENSE-2.0
10**
11** Unless required by applicable law or agreed to in writing, software
12** distributed under the License is distributed on an "AS IS" BASIS,
13** WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14** See the License for the specific language governing permissions and
15** limitations under the License.
16*/
17
18#ifndef KEYSTORE_KEYMASTER_WORKER_H_
19#define KEYSTORE_KEYMASTER_WORKER_H_
20
21#include <condition_variable>
22#include <functional>
23#include <keymasterV4_0/Keymaster.h>
24#include <memory>
25#include <mutex>
26#include <optional>
27#include <queue>
28#include <thread>
29#include <tuple>
30
31#include <keystore/ExportResult.h>
32#include <keystore/KeyCharacteristics.h>
33#include <keystore/KeymasterBlob.h>
34#include <keystore/OperationResult.h>
35#include <keystore/keystore_return_types.h>
36
37#include "blob.h"
38#include "operation.h"
39
40namespace keystore {
41
42using android::sp;
43using ::android::hardware::hidl_vec;
44using ::android::hardware::Return;
45using ::android::hardware::Void;
46using android::hardware::keymaster::V4_0::ErrorCode;
47using android::hardware::keymaster::V4_0::HardwareAuthToken;
48using android::hardware::keymaster::V4_0::HmacSharingParameters;
49using android::hardware::keymaster::V4_0::KeyCharacteristics;
50using android::hardware::keymaster::V4_0::KeyFormat;
51using android::hardware::keymaster::V4_0::KeyParameter;
52using android::hardware::keymaster::V4_0::KeyPurpose;
53using android::hardware::keymaster::V4_0::VerificationToken;
54using android::hardware::keymaster::V4_0::support::Keymaster;
55// using KeystoreCharacteristics = ::android::security::keymaster::KeyCharacteristics;
56using ::android::security::keymaster::KeymasterBlob;
57
58class KeyStore;
59
60class Worker {
61
62 /*
63 * NonCopyableFunction works similar to std::function in that it wraps callable objects and
64 * erases their type. The rationale for using a custom class instead of
65 * std::function is that std::function requires the wrapped object to be copy contructible.
66 * NonCopyableFunction is itself not copyable and never attempts to copy the wrapped object.
67 * TODO use similar optimization as std::function to remove the extra make_unique allocation.
68 */
69 template <typename Fn> class NonCopyableFunction;
70
71 template <typename Ret, typename... Args> class NonCopyableFunction<Ret(Args...)> {
72
73 class NonCopyableFunctionBase {
74 public:
75 NonCopyableFunctionBase() = default;
76 virtual ~NonCopyableFunctionBase() {}
77 virtual Ret operator()(Args... args) = 0;
78 NonCopyableFunctionBase(const NonCopyableFunctionBase&) = delete;
79 NonCopyableFunctionBase& operator=(const NonCopyableFunctionBase&) = delete;
80 };
81
82 template <typename Fn>
83 class NonCopyableFunctionTypeEraser : public NonCopyableFunctionBase {
84 private:
85 Fn f_;
86
87 public:
88 NonCopyableFunctionTypeEraser() = default;
89 explicit NonCopyableFunctionTypeEraser(Fn f) : f_(std::move(f)) {}
90 Ret operator()(Args... args) override { return f_(std::move(args)...); }
91 };
92
93 private:
94 std::unique_ptr<NonCopyableFunctionBase> f_;
95
96 public:
97 NonCopyableFunction() = default;
Chih-Hung Hsieh4fa39ef2019-01-04 13:34:17 -080098 // NOLINTNEXTLINE(google-explicit-constructor)
Janis Danisevskisff3d7f42018-10-08 07:15:09 -070099 template <typename F> NonCopyableFunction(F f) {
100 f_ = std::make_unique<NonCopyableFunctionTypeEraser<F>>(std::move(f));
101 }
102 NonCopyableFunction(NonCopyableFunction&& other) = default;
103 NonCopyableFunction& operator=(NonCopyableFunction&& other) = default;
104 NonCopyableFunction(const NonCopyableFunction& other) = delete;
105 NonCopyableFunction& operator=(const NonCopyableFunction& other) = delete;
106
107 Ret operator()(Args... args) {
108 if (f_) return (*f_)(std::move(args)...);
109 }
110 };
111
112 using WorkerTask = NonCopyableFunction<void()>;
113
114 std::queue<WorkerTask> pending_requests_;
115 std::mutex pending_requests_mutex_;
116 std::condition_variable pending_requests_cond_var_;
Janis Danisevskisff3d7f42018-10-08 07:15:09 -0700117 bool running_ = false;
Janis Danisevskisc2f1f722019-08-16 14:54:55 -0700118 bool terminate_ = false;
Janis Danisevskisff3d7f42018-10-08 07:15:09 -0700119
120 public:
121 Worker();
122 ~Worker();
123 void addRequest(WorkerTask request);
124};
125
126template <typename... Args> struct MakeKeymasterWorkerCB;
127
128template <typename ErrorType, typename... Args>
129struct MakeKeymasterWorkerCB<ErrorType, std::function<void(Args...)>> {
130 using type = std::function<void(ErrorType, std::tuple<std::decay_t<Args>...>&&)>;
131};
132
133template <typename ErrorType> struct MakeKeymasterWorkerCB<ErrorType> {
134 using type = std::function<void(ErrorType)>;
135};
136
137template <typename... Args>
138using MakeKeymasterWorkerCB_t = typename MakeKeymasterWorkerCB<Args...>::type;
139
140class KeymasterWorker : protected Worker {
141 private:
142 sp<Keymaster> keymasterDevice_;
143 OperationMap operationMap_;
144 KeyStore* keyStore_;
145
146 template <typename KMFn, typename ErrorType, typename... Args, size_t... I>
147 void unwrap_tuple(KMFn kmfn, std::function<void(ErrorType)> cb,
148 const std::tuple<Args...>& tuple, std::index_sequence<I...>) {
149 cb(((*keymasterDevice_).*kmfn)(std::get<I>(tuple)...));
150 }
151
152 template <typename KMFn, typename ErrorType, typename... ReturnTypes, typename... Args,
153 size_t... I>
154 void unwrap_tuple(KMFn kmfn, std::function<void(ErrorType, std::tuple<ReturnTypes...>&&)> cb,
155 const std::tuple<Args...>& tuple, std::index_sequence<I...>) {
156 std::tuple<ReturnTypes...> returnValue;
157 auto result = ((*keymasterDevice_).*kmfn)(
158 std::get<I>(tuple)...,
159 [&returnValue](const ReturnTypes&... args) { returnValue = std::make_tuple(args...); });
160 cb(std::move(result), std::move(returnValue));
161 }
162
163 template <typename KMFn, typename ErrorType, typename... Args>
164 void addRequest(KMFn kmfn, std::function<void(ErrorType)> cb, Args&&... args) {
165 Worker::addRequest([this, kmfn, cb = std::move(cb),
166 tuple = std::make_tuple(std::forward<Args>(args)...)]() {
167 unwrap_tuple(kmfn, std::move(cb), tuple, std::index_sequence_for<Args...>{});
168 });
169 }
170
171 template <typename KMFn, typename ErrorType, typename... ReturnTypes, typename... Args>
172 void addRequest(KMFn kmfn, std::function<void(ErrorType, std::tuple<ReturnTypes...>&&)> cb,
173 Args&&... args) {
174 Worker::addRequest([this, kmfn, cb = std::move(cb),
175 tuple = std::make_tuple(std::forward<Args>(args)...)]() {
176 unwrap_tuple(kmfn, std::move(cb), tuple, std::index_sequence_for<Args...>{});
177 });
178 }
Janis Danisevskis6a0d9982019-04-30 15:43:59 -0700179
180 void deleteOldKeyOnUpgrade(const LockedKeyBlobEntry& blobfile, Blob keyBlob);
Janis Danisevskisff3d7f42018-10-08 07:15:09 -0700181 std::tuple<KeyStoreServiceReturnCode, Blob>
182 upgradeKeyBlob(const LockedKeyBlobEntry& lockedEntry, const AuthorizationSet& params);
183 std::tuple<KeyStoreServiceReturnCode, KeyCharacteristics, Blob, Blob>
184 createKeyCharacteristicsCache(const LockedKeyBlobEntry& lockedEntry,
185 const hidl_vec<uint8_t>& clientId,
186 const hidl_vec<uint8_t>& appData, Blob keyBlob, Blob charBlob);
187
188 /**
189 * Get the auth token for this operation from the auth token table.
190 *
191 * Returns NO_ERROR if the auth token was found or none was required. If not needed, the
192 * token will be empty (which keymaster interprets as no auth token).
193 * OP_AUTH_NEEDED if it is a per op authorization, no authorization token exists for
194 * that operation and failOnTokenMissing is false.
195 * KM_ERROR_KEY_USER_NOT_AUTHENTICATED if there is no valid auth token for the operation
196 */
197 std::pair<KeyStoreServiceReturnCode, HardwareAuthToken>
198 getAuthToken(const KeyCharacteristics& characteristics, uint64_t handle, KeyPurpose purpose,
199 bool failOnTokenMissing = true);
200
201 KeyStoreServiceReturnCode abort(const sp<IBinder>& token);
202
203 bool pruneOperation();
204
205 KeyStoreServiceReturnCode getOperationAuthTokenIfNeeded(std::shared_ptr<Operation> op);
206
207 void appendConfirmationTokenIfNeeded(const KeyCharacteristics& keyCharacteristics,
208 hidl_vec<KeyParameter>* params);
209
210 public:
211 KeymasterWorker(sp<Keymaster> keymasterDevice, KeyStore* keyStore);
212
Janis Danisevskis37896102019-03-14 17:15:06 -0700213 void logIfKeymasterVendorError(ErrorCode ec) const;
214
Janis Danisevskisff3d7f42018-10-08 07:15:09 -0700215 using worker_begin_cb = std::function<void(::android::security::keymaster::OperationResult)>;
216 void begin(LockedKeyBlobEntry, sp<IBinder> appToken, Blob keyBlob, Blob charBlob,
217 bool pruneable, KeyPurpose purpose, AuthorizationSet opParams,
218 hidl_vec<uint8_t> entropy, worker_begin_cb worker_cb);
219
220 using update_cb = std::function<void(::android::security::keymaster::OperationResult)>;
221 void update(sp<IBinder> token, AuthorizationSet params, hidl_vec<uint8_t> data,
222 update_cb _hidl_cb);
223
224 using finish_cb = std::function<void(::android::security::keymaster::OperationResult)>;
225 void finish(sp<IBinder> token, AuthorizationSet params, hidl_vec<uint8_t> input,
226 hidl_vec<uint8_t> signature, hidl_vec<uint8_t> entorpy, finish_cb worker_cb);
227
228 using abort_cb = std::function<void(KeyStoreServiceReturnCode)>;
229 void abort(sp<IBinder> token, abort_cb _hidl_cb);
230
231 using getHardwareInfo_cb = MakeKeymasterWorkerCB_t<Return<void>, Keymaster::getHardwareInfo_cb>;
232 void getHardwareInfo(getHardwareInfo_cb _hidl_cb);
233
234 using getHmacSharingParameters_cb =
235 MakeKeymasterWorkerCB_t<Return<void>, Keymaster::getHmacSharingParameters_cb>;
236 void getHmacSharingParameters(getHmacSharingParameters_cb _hidl_cb);
237
238 using computeSharedHmac_cb =
239 MakeKeymasterWorkerCB_t<Return<void>, Keymaster::computeSharedHmac_cb>;
240 void computeSharedHmac(hidl_vec<HmacSharingParameters> params, computeSharedHmac_cb _hidl_cb);
241
242 using verifyAuthorization_cb =
243 std::function<void(KeyStoreServiceReturnCode ec, HardwareAuthToken, VerificationToken)>;
244 void verifyAuthorization(uint64_t challenge, hidl_vec<KeyParameter> params,
245 HardwareAuthToken token, verifyAuthorization_cb _hidl_cb);
246
247 using addRngEntropy_cb = MakeKeymasterWorkerCB_t<Return<ErrorCode>>;
248 void addRngEntropy(hidl_vec<uint8_t> data, addRngEntropy_cb _hidl_cb);
249
250 using generateKey_cb = std::function<void(
251 KeyStoreServiceReturnCode, ::android::hardware::keymaster::V4_0::KeyCharacteristics)>;
252 void generateKey(LockedKeyBlobEntry, hidl_vec<KeyParameter> keyParams,
253 hidl_vec<uint8_t> entropy, int flags, generateKey_cb _hidl_cb);
254
255 using generateKey2_cb = MakeKeymasterWorkerCB_t<Return<void>, Keymaster::generateKey_cb>;
256 void generateKey(hidl_vec<KeyParameter> keyParams, generateKey2_cb _hidl_cb);
257
258 using getKeyCharacteristics_cb = std::function<void(
259 KeyStoreServiceReturnCode, ::android::hardware::keymaster::V4_0::KeyCharacteristics)>;
260 void getKeyCharacteristics(LockedKeyBlobEntry lockedEntry, hidl_vec<uint8_t> clientId,
261 hidl_vec<uint8_t> appData, Blob keyBlob, Blob charBlob,
262 getKeyCharacteristics_cb _hidl_cb);
263
264 using importKey_cb = std::function<void(
265 KeyStoreServiceReturnCode, ::android::hardware::keymaster::V4_0::KeyCharacteristics)>;
266 void importKey(LockedKeyBlobEntry lockedEntry, hidl_vec<KeyParameter> params,
267 KeyFormat keyFormat, hidl_vec<uint8_t> keyData, int flags,
268 importKey_cb _hidl_cb);
269
270 using importWrappedKey_cb = std::function<void(
271 KeyStoreServiceReturnCode, ::android::hardware::keymaster::V4_0::KeyCharacteristics)>;
272 void importWrappedKey(LockedKeyBlobEntry wrappingLockedEntry,
273 LockedKeyBlobEntry wrapppedLockedEntry, hidl_vec<uint8_t> wrappedKeyData,
274 hidl_vec<uint8_t> maskingKey, hidl_vec<KeyParameter> unwrappingParams,
275 Blob wrappingBlob, Blob wrappingCharBlob, uint64_t passwordSid,
276 uint64_t biometricSid, importWrappedKey_cb worker_cb);
277
278 using exportKey_cb = std::function<void(::android::security::keymaster::ExportResult)>;
279 void exportKey(LockedKeyBlobEntry lockedEntry, KeyFormat exportFormat,
280 hidl_vec<uint8_t> clientId, hidl_vec<uint8_t> appData, Blob keyBlob,
281 Blob charBlob, exportKey_cb _hidl_cb);
282
283 using attestKey_cb = MakeKeymasterWorkerCB_t<Return<void>, Keymaster::attestKey_cb>;
284 void attestKey(hidl_vec<uint8_t> keyToAttest, hidl_vec<KeyParameter> attestParams,
285 attestKey_cb _hidl_cb);
286
Janis Danisevskisff3d7f42018-10-08 07:15:09 -0700287 using deleteKey_cb = MakeKeymasterWorkerCB_t<Return<ErrorCode>>;
288 void deleteKey(hidl_vec<uint8_t> keyBlob, deleteKey_cb _hidl_cb);
289
Janis Danisevskisff3d7f42018-10-08 07:15:09 -0700290 using begin_cb = MakeKeymasterWorkerCB_t<Return<void>, Keymaster::begin_cb>;
291 void begin(KeyPurpose purpose, hidl_vec<uint8_t> key, hidl_vec<KeyParameter> inParams,
292 HardwareAuthToken authToken, begin_cb _hidl_cb);
293
294 void binderDied(android::wp<IBinder> who);
295
296 const Keymaster::VersionResult& halVersion() { return keymasterDevice_->halVersion(); }
297};
298
299} // namespace keystore
300
301#endif // KEYSTORE_KEYMASTER_WORKER_H_