• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 /*
2  * Copyright 2018 The Android Open Source Project
3  *
4  * Licensed under the Apache License, Version 2.0 (the "License");
5  * you may not use this file except in compliance with the License.
6  * You may obtain a copy of the License at
7  *
8  *      http://www.apache.org/licenses/LICENSE-2.0
9  *
10  * Unless required by applicable law or agreed to in writing, software
11  * distributed under the License is distributed on an "AS IS" BASIS,
12  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13  * See the License for the specific language governing permissions and
14  * limitations under the License.
15  */
16 
17 #include "remote_keymaster.h"
18 
19 #include <android-base/logging.h>
20 #include <keymaster/android_keymaster_messages.h>
21 #include <keymaster/keymaster_configuration.h>
22 
23 namespace keymaster {
24 
RemoteKeymaster(cuttlefish::KeymasterChannel * channel)25 RemoteKeymaster::RemoteKeymaster(cuttlefish::KeymasterChannel* channel)
26     : channel_(channel) {}
27 
~RemoteKeymaster()28 RemoteKeymaster::~RemoteKeymaster() {
29 }
30 
ForwardCommand(AndroidKeymasterCommand command,const Serializable & req,KeymasterResponse * rsp)31 void RemoteKeymaster::ForwardCommand(AndroidKeymasterCommand command, const Serializable& req,
32                                      KeymasterResponse* rsp) {
33     if (!channel_->SendRequest(command, req)) {
34         LOG(ERROR) << "Failed to send keymaster message: " << command;
35         rsp->error = KM_ERROR_UNKNOWN_ERROR;
36         return;
37     }
38     auto response = channel_->ReceiveMessage();
39     if (!response) {
40         LOG(ERROR) << "Failed to receive keymaster response: " << command;
41         rsp->error = KM_ERROR_UNKNOWN_ERROR;
42         return;
43     }
44     const uint8_t* buffer = response->payload;
45     const uint8_t* buffer_end = response->payload + response->payload_size;
46     if (!rsp->Deserialize(&buffer, buffer_end)) {
47         LOG(ERROR) << "Failed to deserialize keymaster response: " << command;
48         rsp->error = KM_ERROR_UNKNOWN_ERROR;
49         return;
50     }
51 }
52 
Initialize()53 bool RemoteKeymaster::Initialize() {
54     // We don't need to bother with GetVersion, because CF HAL and remote sides are always compiled
55     // together, so will never disagree about message versions.
56     ConfigureRequest req(message_version());
57     req.os_version = GetOsVersion();
58     req.os_patchlevel = GetOsPatchlevel();
59 
60     ConfigureResponse rsp(message_version());
61     Configure(req, &rsp);
62 
63     if (rsp.error != KM_ERROR_OK) {
64         LOG(ERROR) << "Failed to configure keymaster: " << rsp.error;
65         return false;
66     }
67 
68     return true;
69 }
70 
GetVersion(const GetVersionRequest & request,GetVersionResponse * response)71 void RemoteKeymaster::GetVersion(const GetVersionRequest& request, GetVersionResponse* response) {
72     ForwardCommand(GET_VERSION, request, response);
73 }
74 
SupportedAlgorithms(const SupportedAlgorithmsRequest & request,SupportedAlgorithmsResponse * response)75 void RemoteKeymaster::SupportedAlgorithms(const SupportedAlgorithmsRequest& request,
76                                           SupportedAlgorithmsResponse* response) {
77     ForwardCommand(GET_SUPPORTED_ALGORITHMS, request, response);
78 }
79 
SupportedBlockModes(const SupportedBlockModesRequest & request,SupportedBlockModesResponse * response)80 void RemoteKeymaster::SupportedBlockModes(const SupportedBlockModesRequest& request,
81                                           SupportedBlockModesResponse* response) {
82     ForwardCommand(GET_SUPPORTED_BLOCK_MODES, request, response);
83 }
84 
SupportedPaddingModes(const SupportedPaddingModesRequest & request,SupportedPaddingModesResponse * response)85 void RemoteKeymaster::SupportedPaddingModes(const SupportedPaddingModesRequest& request,
86                                             SupportedPaddingModesResponse* response) {
87     ForwardCommand(GET_SUPPORTED_PADDING_MODES, request, response);
88 }
89 
SupportedDigests(const SupportedDigestsRequest & request,SupportedDigestsResponse * response)90 void RemoteKeymaster::SupportedDigests(const SupportedDigestsRequest& request,
91                                        SupportedDigestsResponse* response) {
92     ForwardCommand(GET_SUPPORTED_DIGESTS, request, response);
93 }
94 
SupportedImportFormats(const SupportedImportFormatsRequest & request,SupportedImportFormatsResponse * response)95 void RemoteKeymaster::SupportedImportFormats(const SupportedImportFormatsRequest& request,
96                                              SupportedImportFormatsResponse* response) {
97     ForwardCommand(GET_SUPPORTED_IMPORT_FORMATS, request, response);
98 }
99 
SupportedExportFormats(const SupportedExportFormatsRequest & request,SupportedExportFormatsResponse * response)100 void RemoteKeymaster::SupportedExportFormats(const SupportedExportFormatsRequest& request,
101                                              SupportedExportFormatsResponse* response) {
102     ForwardCommand(GET_SUPPORTED_EXPORT_FORMATS, request, response);
103 }
104 
AddRngEntropy(const AddEntropyRequest & request,AddEntropyResponse * response)105 void RemoteKeymaster::AddRngEntropy(const AddEntropyRequest& request,
106                                     AddEntropyResponse* response) {
107     ForwardCommand(ADD_RNG_ENTROPY, request, response);
108 }
109 
Configure(const ConfigureRequest & request,ConfigureResponse * response)110 void RemoteKeymaster::Configure(const ConfigureRequest& request, ConfigureResponse* response) {
111     ForwardCommand(CONFIGURE, request, response);
112 }
113 
GenerateKey(const GenerateKeyRequest & request,GenerateKeyResponse * response)114 void RemoteKeymaster::GenerateKey(const GenerateKeyRequest& request,
115                                   GenerateKeyResponse* response) {
116     GenerateKeyRequest datedRequest(request.message_version);
117     datedRequest.key_description = request.key_description;
118 
119     if (!request.key_description.Contains(TAG_CREATION_DATETIME)) {
120         datedRequest.key_description.push_back(TAG_CREATION_DATETIME, java_time(time(NULL)));
121     }
122 
123     ForwardCommand(GENERATE_KEY, datedRequest, response);
124 }
125 
GetKeyCharacteristics(const GetKeyCharacteristicsRequest & request,GetKeyCharacteristicsResponse * response)126 void RemoteKeymaster::GetKeyCharacteristics(const GetKeyCharacteristicsRequest& request,
127                                             GetKeyCharacteristicsResponse* response) {
128     ForwardCommand(GET_KEY_CHARACTERISTICS, request, response);
129 }
130 
ImportKey(const ImportKeyRequest & request,ImportKeyResponse * response)131 void RemoteKeymaster::ImportKey(const ImportKeyRequest& request, ImportKeyResponse* response) {
132     ForwardCommand(IMPORT_KEY, request, response);
133 }
134 
ImportWrappedKey(const ImportWrappedKeyRequest & request,ImportWrappedKeyResponse * response)135 void RemoteKeymaster::ImportWrappedKey(const ImportWrappedKeyRequest& request,
136                                        ImportWrappedKeyResponse* response) {
137     ForwardCommand(IMPORT_WRAPPED_KEY, request, response);
138 }
139 
ExportKey(const ExportKeyRequest & request,ExportKeyResponse * response)140 void RemoteKeymaster::ExportKey(const ExportKeyRequest& request, ExportKeyResponse* response) {
141     ForwardCommand(EXPORT_KEY, request, response);
142 }
143 
AttestKey(const AttestKeyRequest & request,AttestKeyResponse * response)144 void RemoteKeymaster::AttestKey(const AttestKeyRequest& request, AttestKeyResponse* response) {
145     ForwardCommand(ATTEST_KEY, request, response);
146 }
147 
UpgradeKey(const UpgradeKeyRequest & request,UpgradeKeyResponse * response)148 void RemoteKeymaster::UpgradeKey(const UpgradeKeyRequest& request, UpgradeKeyResponse* response) {
149     ForwardCommand(UPGRADE_KEY, request, response);
150 }
151 
DeleteKey(const DeleteKeyRequest & request,DeleteKeyResponse * response)152 void RemoteKeymaster::DeleteKey(const DeleteKeyRequest& request, DeleteKeyResponse* response) {
153     ForwardCommand(DELETE_KEY, request, response);
154 }
155 
DeleteAllKeys(const DeleteAllKeysRequest & request,DeleteAllKeysResponse * response)156 void RemoteKeymaster::DeleteAllKeys(const DeleteAllKeysRequest& request,
157                                     DeleteAllKeysResponse* response) {
158     ForwardCommand(DELETE_ALL_KEYS, request, response);
159 }
160 
BeginOperation(const BeginOperationRequest & request,BeginOperationResponse * response)161 void RemoteKeymaster::BeginOperation(const BeginOperationRequest& request,
162                                      BeginOperationResponse* response) {
163     ForwardCommand(BEGIN_OPERATION, request, response);
164 }
165 
UpdateOperation(const UpdateOperationRequest & request,UpdateOperationResponse * response)166 void RemoteKeymaster::UpdateOperation(const UpdateOperationRequest& request,
167                                       UpdateOperationResponse* response) {
168     ForwardCommand(UPDATE_OPERATION, request, response);
169 }
170 
FinishOperation(const FinishOperationRequest & request,FinishOperationResponse * response)171 void RemoteKeymaster::FinishOperation(const FinishOperationRequest& request,
172                                       FinishOperationResponse* response) {
173     ForwardCommand(FINISH_OPERATION, request, response);
174 }
175 
AbortOperation(const AbortOperationRequest & request,AbortOperationResponse * response)176 void RemoteKeymaster::AbortOperation(const AbortOperationRequest& request,
177                                      AbortOperationResponse* response) {
178     ForwardCommand(ABORT_OPERATION, request, response);
179 }
180 
GetHmacSharingParameters()181 GetHmacSharingParametersResponse RemoteKeymaster::GetHmacSharingParameters() {
182     // Unused empty buffer to allow ForwardCommand to have something to serialize
183     Buffer request;
184     GetHmacSharingParametersResponse response(message_version());
185     ForwardCommand(GET_HMAC_SHARING_PARAMETERS, request, &response);
186     return response;
187 }
188 
ComputeSharedHmac(const ComputeSharedHmacRequest & request)189 ComputeSharedHmacResponse RemoteKeymaster::ComputeSharedHmac(
190         const ComputeSharedHmacRequest& request) {
191     ComputeSharedHmacResponse response(message_version());
192     ForwardCommand(COMPUTE_SHARED_HMAC, request, &response);
193     return response;
194 }
195 
VerifyAuthorization(const VerifyAuthorizationRequest & request)196 VerifyAuthorizationResponse RemoteKeymaster::VerifyAuthorization(
197         const VerifyAuthorizationRequest& request) {
198     VerifyAuthorizationResponse response(message_version());
199     ForwardCommand(VERIFY_AUTHORIZATION, request, &response);
200     return response;
201 }
202 
DeviceLocked(const DeviceLockedRequest & request)203 DeviceLockedResponse RemoteKeymaster::DeviceLocked(
204         const DeviceLockedRequest& request) {
205     DeviceLockedResponse response(message_version());
206     ForwardCommand(DEVICE_LOCKED, request, &response);
207     return response;
208 }
209 
EarlyBootEnded()210 EarlyBootEndedResponse RemoteKeymaster::EarlyBootEnded() {
211     // Unused empty buffer to allow ForwardCommand to have something to serialize
212     Buffer request;
213     EarlyBootEndedResponse response(message_version());
214     ForwardCommand(EARLY_BOOT_ENDED, request, &response);
215     return response;
216 }
217 
218 }  // namespace keymaster
219