blob: 4ecf92e06c8d59562746ada51f9c6d9404028cb2 [file] [log] [blame]
David Zeuthenab3e5652019-10-28 13:32:48 -04001/*
2 * Copyright (c) 2019, The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17#ifndef SYSTEM_SECURITY_CREDENTIAL_H_
18#define SYSTEM_SECURITY_CREDENTIAL_H_
19
20#include <string>
21#include <vector>
22
23#include <android/security/identity/BnCredential.h>
24
David Zeuthena6f9fba2020-02-11 22:08:27 -050025#include <android/hardware/identity/IIdentityCredentialStore.h>
David Zeuthenab3e5652019-10-28 13:32:48 -040026
27#include "CredentialData.h"
28
29namespace android {
30namespace security {
31namespace identity {
32
33using ::android::sp;
34using ::android::binder::Status;
35using ::std::string;
36using ::std::vector;
37
David Zeuthena6f9fba2020-02-11 22:08:27 -050038using ::android::hardware::identity::CipherSuite;
David Zeuthen472e6c82020-10-16 11:50:13 -040039using ::android::hardware::identity::HardwareInformation;
David Zeuthena6f9fba2020-02-11 22:08:27 -050040using ::android::hardware::identity::IIdentityCredential;
41using ::android::hardware::identity::IIdentityCredentialStore;
David Zeuthen045a2c82021-09-11 13:52:17 -040042using ::android::hardware::identity::IPresentationSession;
David Zeuthene2a78a42020-04-27 13:34:38 -040043using ::android::hardware::identity::RequestDataItem;
44using ::android::hardware::identity::RequestNamespace;
David Zeuthenab3e5652019-10-28 13:32:48 -040045
46class Credential : public BnCredential {
47 public:
David Zeuthen472e6c82020-10-16 11:50:13 -040048 Credential(CipherSuite cipherSuite, const string& dataPath, const string& credentialName,
49 uid_t callingUid, HardwareInformation hwInfo,
David Zeuthen045a2c82021-09-11 13:52:17 -040050 sp<IIdentityCredentialStore> halStoreBinder,
51 sp<IPresentationSession> halSessionBinder, int halApiVersion);
David Zeuthenab3e5652019-10-28 13:32:48 -040052 ~Credential();
53
David Zeuthen472e6c82020-10-16 11:50:13 -040054 Status ensureOrReplaceHalBinder();
David Zeuthen27407a52021-03-04 16:32:43 -050055 void writableCredentialPersonalized();
David Zeuthenab3e5652019-10-28 13:32:48 -040056
57 // ICredential overrides
58 Status createEphemeralKeyPair(vector<uint8_t>* _aidl_return) override;
59
60 Status setReaderEphemeralPublicKey(const vector<uint8_t>& publicKey) override;
61
62 Status deleteCredential(vector<uint8_t>* _aidl_return) override;
63
David Zeuthen472e6c82020-10-16 11:50:13 -040064 Status deleteWithChallenge(const vector<uint8_t>& challenge,
65 vector<uint8_t>* _aidl_return) override;
66
67 Status proveOwnership(const vector<uint8_t>& challenge, vector<uint8_t>* _aidl_return) override;
68
David Zeuthenab3e5652019-10-28 13:32:48 -040069 Status getCredentialKeyCertificateChain(vector<uint8_t>* _aidl_return) override;
70
David Zeuthen472e6c82020-10-16 11:50:13 -040071 Status selectAuthKey(bool allowUsingExhaustedKeys, bool allowUsingExpiredKeys,
David Zeuthen045a2c82021-09-11 13:52:17 -040072 bool incrementUsageCount, int64_t* _aidl_return) override;
David Zeuthenab3e5652019-10-28 13:32:48 -040073
74 Status getEntries(const vector<uint8_t>& requestMessage,
75 const vector<RequestNamespaceParcel>& requestNamespaces,
76 const vector<uint8_t>& sessionTranscript,
77 const vector<uint8_t>& readerSignature, bool allowUsingExhaustedKeys,
David Zeuthen045a2c82021-09-11 13:52:17 -040078 bool allowUsingExpiredKeys, bool incrementUsageCount,
79 GetEntriesResultParcel* _aidl_return) override;
David Zeuthenab3e5652019-10-28 13:32:48 -040080
David Zeuthenc239db42022-11-14 15:22:24 -050081 Status setAvailableAuthenticationKeys(int32_t keyCount, int32_t maxUsesPerKey,
82 int64_t minValidTimeMillis) override;
David Zeuthenab3e5652019-10-28 13:32:48 -040083 Status getAuthKeysNeedingCertification(vector<AuthKeyParcel>* _aidl_return) override;
84 Status storeStaticAuthenticationData(const AuthKeyParcel& authenticationKey,
85 const vector<uint8_t>& staticAuthData) override;
David Zeuthen472e6c82020-10-16 11:50:13 -040086 Status
87 storeStaticAuthenticationDataWithExpiration(const AuthKeyParcel& authenticationKey,
88 int64_t expirationDateMillisSinceEpoch,
89 const vector<uint8_t>& staticAuthData) override;
David Zeuthenab3e5652019-10-28 13:32:48 -040090 Status getAuthenticationDataUsageCount(vector<int32_t>* _aidl_return) override;
David Zeuthenc239db42022-11-14 15:22:24 -050091 Status getAuthenticationDataExpirations(vector<int64_t>* _aidl_return) override;
David Zeuthenab3e5652019-10-28 13:32:48 -040092
David Zeuthen472e6c82020-10-16 11:50:13 -040093 Status update(sp<IWritableCredential>* _aidl_return) override;
94
David Zeuthenab3e5652019-10-28 13:32:48 -040095 private:
David Zeuthena6f9fba2020-02-11 22:08:27 -050096 CipherSuite cipherSuite_;
David Zeuthenab3e5652019-10-28 13:32:48 -040097 string dataPath_;
98 string credentialName_;
David Zeuthen472e6c82020-10-16 11:50:13 -040099 uid_t callingUid_;
100 HardwareInformation hwInfo_;
101 sp<IIdentityCredentialStore> halStoreBinder_;
David Zeuthen045a2c82021-09-11 13:52:17 -0400102 sp<IPresentationSession> halSessionBinder_;
David Zeuthenab3e5652019-10-28 13:32:48 -0400103
David Zeuthenab3e5652019-10-28 13:32:48 -0400104 uint64_t selectedChallenge_ = 0;
105
David Zeuthenab3e5652019-10-28 13:32:48 -0400106 sp<IIdentityCredential> halBinder_;
David Zeuthen472e6c82020-10-16 11:50:13 -0400107 int halApiVersion_;
David Zeuthene2a78a42020-04-27 13:34:38 -0400108
David Zeuthen045a2c82021-09-11 13:52:17 -0400109 // This is used to cache the selected AuthKey to ensure the same AuthKey is used across
110 // multiple getEntries() calls.
111 //
112 bool selectedAuthKey_ = false;
113 vector<uint8_t> selectedAuthKeySigningKeyBlob_;
114 vector<uint8_t> selectedAuthKeyStaticAuthData_;
115
David Zeuthen27407a52021-03-04 16:32:43 -0500116 bool ensureChallenge();
117
David Zeuthene2a78a42020-04-27 13:34:38 -0400118 ssize_t
119 calcExpectedDeviceNameSpacesSize(const vector<uint8_t>& requestMessage,
120 const vector<RequestNamespaceParcel>& requestNamespaces,
121 uint32_t authorizedAcps);
David Zeuthenab3e5652019-10-28 13:32:48 -0400122};
123
124} // namespace identity
125} // namespace security
126} // namespace android
127
128#endif // SYSTEM_SECURITY_IDENTITY_CREDENTIAL_H_