1 /*
2 * Copyright 2018 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17 #include "remote_keymaster.h"
18
19 #include <android-base/logging.h>
20 #include <keymaster/android_keymaster_messages.h>
21 #include <keymaster/keymaster_configuration.h>
22
23 namespace keymaster {
24
RemoteKeymaster(cuttlefish::KeymasterChannel * channel)25 RemoteKeymaster::RemoteKeymaster(cuttlefish::KeymasterChannel* channel)
26 : channel_(channel) {}
27
~RemoteKeymaster()28 RemoteKeymaster::~RemoteKeymaster() {
29 }
30
ForwardCommand(AndroidKeymasterCommand command,const Serializable & req,KeymasterResponse * rsp)31 void RemoteKeymaster::ForwardCommand(AndroidKeymasterCommand command, const Serializable& req,
32 KeymasterResponse* rsp) {
33 if (!channel_->SendRequest(command, req)) {
34 LOG(ERROR) << "Failed to send keymaster message: " << command;
35 rsp->error = KM_ERROR_UNKNOWN_ERROR;
36 return;
37 }
38 auto response = channel_->ReceiveMessage();
39 if (!response) {
40 LOG(ERROR) << "Failed to receive keymaster response: " << command;
41 rsp->error = KM_ERROR_UNKNOWN_ERROR;
42 return;
43 }
44 const uint8_t* buffer = response->payload;
45 const uint8_t* buffer_end = response->payload + response->payload_size;
46 if (!rsp->Deserialize(&buffer, buffer_end)) {
47 LOG(ERROR) << "Failed to deserialize keymaster response: " << command;
48 rsp->error = KM_ERROR_UNKNOWN_ERROR;
49 return;
50 }
51 }
52
Initialize()53 bool RemoteKeymaster::Initialize() {
54 // We don't need to bother with GetVersion, because CF HAL and remote sides are always compiled
55 // together, so will never disagree about message versions.
56 ConfigureRequest req(message_version());
57 req.os_version = GetOsVersion();
58 req.os_patchlevel = GetOsPatchlevel();
59
60 ConfigureResponse rsp(message_version());
61 Configure(req, &rsp);
62
63 if (rsp.error != KM_ERROR_OK) {
64 LOG(ERROR) << "Failed to configure keymaster: " << rsp.error;
65 return false;
66 }
67
68 return true;
69 }
70
GetVersion(const GetVersionRequest & request,GetVersionResponse * response)71 void RemoteKeymaster::GetVersion(const GetVersionRequest& request, GetVersionResponse* response) {
72 ForwardCommand(GET_VERSION, request, response);
73 }
74
SupportedAlgorithms(const SupportedAlgorithmsRequest & request,SupportedAlgorithmsResponse * response)75 void RemoteKeymaster::SupportedAlgorithms(const SupportedAlgorithmsRequest& request,
76 SupportedAlgorithmsResponse* response) {
77 ForwardCommand(GET_SUPPORTED_ALGORITHMS, request, response);
78 }
79
SupportedBlockModes(const SupportedBlockModesRequest & request,SupportedBlockModesResponse * response)80 void RemoteKeymaster::SupportedBlockModes(const SupportedBlockModesRequest& request,
81 SupportedBlockModesResponse* response) {
82 ForwardCommand(GET_SUPPORTED_BLOCK_MODES, request, response);
83 }
84
SupportedPaddingModes(const SupportedPaddingModesRequest & request,SupportedPaddingModesResponse * response)85 void RemoteKeymaster::SupportedPaddingModes(const SupportedPaddingModesRequest& request,
86 SupportedPaddingModesResponse* response) {
87 ForwardCommand(GET_SUPPORTED_PADDING_MODES, request, response);
88 }
89
SupportedDigests(const SupportedDigestsRequest & request,SupportedDigestsResponse * response)90 void RemoteKeymaster::SupportedDigests(const SupportedDigestsRequest& request,
91 SupportedDigestsResponse* response) {
92 ForwardCommand(GET_SUPPORTED_DIGESTS, request, response);
93 }
94
SupportedImportFormats(const SupportedImportFormatsRequest & request,SupportedImportFormatsResponse * response)95 void RemoteKeymaster::SupportedImportFormats(const SupportedImportFormatsRequest& request,
96 SupportedImportFormatsResponse* response) {
97 ForwardCommand(GET_SUPPORTED_IMPORT_FORMATS, request, response);
98 }
99
SupportedExportFormats(const SupportedExportFormatsRequest & request,SupportedExportFormatsResponse * response)100 void RemoteKeymaster::SupportedExportFormats(const SupportedExportFormatsRequest& request,
101 SupportedExportFormatsResponse* response) {
102 ForwardCommand(GET_SUPPORTED_EXPORT_FORMATS, request, response);
103 }
104
AddRngEntropy(const AddEntropyRequest & request,AddEntropyResponse * response)105 void RemoteKeymaster::AddRngEntropy(const AddEntropyRequest& request,
106 AddEntropyResponse* response) {
107 ForwardCommand(ADD_RNG_ENTROPY, request, response);
108 }
109
Configure(const ConfigureRequest & request,ConfigureResponse * response)110 void RemoteKeymaster::Configure(const ConfigureRequest& request, ConfigureResponse* response) {
111 ForwardCommand(CONFIGURE, request, response);
112 }
113
GenerateKey(const GenerateKeyRequest & request,GenerateKeyResponse * response)114 void RemoteKeymaster::GenerateKey(const GenerateKeyRequest& request,
115 GenerateKeyResponse* response) {
116 GenerateKeyRequest datedRequest(request.message_version);
117 datedRequest.key_description = request.key_description;
118
119 if (!request.key_description.Contains(TAG_CREATION_DATETIME)) {
120 datedRequest.key_description.push_back(TAG_CREATION_DATETIME, java_time(time(NULL)));
121 }
122
123 ForwardCommand(GENERATE_KEY, datedRequest, response);
124 }
125
GetKeyCharacteristics(const GetKeyCharacteristicsRequest & request,GetKeyCharacteristicsResponse * response)126 void RemoteKeymaster::GetKeyCharacteristics(const GetKeyCharacteristicsRequest& request,
127 GetKeyCharacteristicsResponse* response) {
128 ForwardCommand(GET_KEY_CHARACTERISTICS, request, response);
129 }
130
ImportKey(const ImportKeyRequest & request,ImportKeyResponse * response)131 void RemoteKeymaster::ImportKey(const ImportKeyRequest& request, ImportKeyResponse* response) {
132 ForwardCommand(IMPORT_KEY, request, response);
133 }
134
ImportWrappedKey(const ImportWrappedKeyRequest & request,ImportWrappedKeyResponse * response)135 void RemoteKeymaster::ImportWrappedKey(const ImportWrappedKeyRequest& request,
136 ImportWrappedKeyResponse* response) {
137 ForwardCommand(IMPORT_WRAPPED_KEY, request, response);
138 }
139
ExportKey(const ExportKeyRequest & request,ExportKeyResponse * response)140 void RemoteKeymaster::ExportKey(const ExportKeyRequest& request, ExportKeyResponse* response) {
141 ForwardCommand(EXPORT_KEY, request, response);
142 }
143
AttestKey(const AttestKeyRequest & request,AttestKeyResponse * response)144 void RemoteKeymaster::AttestKey(const AttestKeyRequest& request, AttestKeyResponse* response) {
145 ForwardCommand(ATTEST_KEY, request, response);
146 }
147
UpgradeKey(const UpgradeKeyRequest & request,UpgradeKeyResponse * response)148 void RemoteKeymaster::UpgradeKey(const UpgradeKeyRequest& request, UpgradeKeyResponse* response) {
149 ForwardCommand(UPGRADE_KEY, request, response);
150 }
151
DeleteKey(const DeleteKeyRequest & request,DeleteKeyResponse * response)152 void RemoteKeymaster::DeleteKey(const DeleteKeyRequest& request, DeleteKeyResponse* response) {
153 ForwardCommand(DELETE_KEY, request, response);
154 }
155
DeleteAllKeys(const DeleteAllKeysRequest & request,DeleteAllKeysResponse * response)156 void RemoteKeymaster::DeleteAllKeys(const DeleteAllKeysRequest& request,
157 DeleteAllKeysResponse* response) {
158 ForwardCommand(DELETE_ALL_KEYS, request, response);
159 }
160
BeginOperation(const BeginOperationRequest & request,BeginOperationResponse * response)161 void RemoteKeymaster::BeginOperation(const BeginOperationRequest& request,
162 BeginOperationResponse* response) {
163 ForwardCommand(BEGIN_OPERATION, request, response);
164 }
165
UpdateOperation(const UpdateOperationRequest & request,UpdateOperationResponse * response)166 void RemoteKeymaster::UpdateOperation(const UpdateOperationRequest& request,
167 UpdateOperationResponse* response) {
168 ForwardCommand(UPDATE_OPERATION, request, response);
169 }
170
FinishOperation(const FinishOperationRequest & request,FinishOperationResponse * response)171 void RemoteKeymaster::FinishOperation(const FinishOperationRequest& request,
172 FinishOperationResponse* response) {
173 ForwardCommand(FINISH_OPERATION, request, response);
174 }
175
AbortOperation(const AbortOperationRequest & request,AbortOperationResponse * response)176 void RemoteKeymaster::AbortOperation(const AbortOperationRequest& request,
177 AbortOperationResponse* response) {
178 ForwardCommand(ABORT_OPERATION, request, response);
179 }
180
GetHmacSharingParameters()181 GetHmacSharingParametersResponse RemoteKeymaster::GetHmacSharingParameters() {
182 // Unused empty buffer to allow ForwardCommand to have something to serialize
183 Buffer request;
184 GetHmacSharingParametersResponse response(message_version());
185 ForwardCommand(GET_HMAC_SHARING_PARAMETERS, request, &response);
186 return response;
187 }
188
ComputeSharedHmac(const ComputeSharedHmacRequest & request)189 ComputeSharedHmacResponse RemoteKeymaster::ComputeSharedHmac(
190 const ComputeSharedHmacRequest& request) {
191 ComputeSharedHmacResponse response(message_version());
192 ForwardCommand(COMPUTE_SHARED_HMAC, request, &response);
193 return response;
194 }
195
VerifyAuthorization(const VerifyAuthorizationRequest & request)196 VerifyAuthorizationResponse RemoteKeymaster::VerifyAuthorization(
197 const VerifyAuthorizationRequest& request) {
198 VerifyAuthorizationResponse response(message_version());
199 ForwardCommand(VERIFY_AUTHORIZATION, request, &response);
200 return response;
201 }
202
DeviceLocked(const DeviceLockedRequest & request)203 DeviceLockedResponse RemoteKeymaster::DeviceLocked(
204 const DeviceLockedRequest& request) {
205 DeviceLockedResponse response(message_version());
206 ForwardCommand(DEVICE_LOCKED, request, &response);
207 return response;
208 }
209
EarlyBootEnded()210 EarlyBootEndedResponse RemoteKeymaster::EarlyBootEnded() {
211 // Unused empty buffer to allow ForwardCommand to have something to serialize
212 Buffer request;
213 EarlyBootEndedResponse response(message_version());
214 ForwardCommand(EARLY_BOOT_ENDED, request, &response);
215 return response;
216 }
217
218 } // namespace keymaster
219