/* * Copyright (C) 2021 The Android Open Source Project * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ #include #include #include #include #include #include #include #include #include #include #include "KeyMintUtils.h" #include "android/binder_auto_utils.h" #include "remote_remotely_provisioned_component.h" namespace aidl::android::hardware::security::keymint { namespace { using namespace cppcose; using namespace keymaster; using ::aidl::android::hardware::security::keymint::km_utils::kmBlob2vector; using ::ndk::ScopedAStatus; // Error codes from the provisioning stack are negated. ndk::ScopedAStatus toKeymasterError(const KeymasterResponse& response) { auto error = static_cast(-static_cast(response.error)); return ::aidl::android::hardware::security::keymint::km_utils:: kmError2ScopedAStatus(error); } } // namespace RemoteRemotelyProvisionedComponent::RemoteRemotelyProvisionedComponent( keymaster::RemoteKeymaster& impl) : impl_(impl) {} ScopedAStatus RemoteRemotelyProvisionedComponent::getHardwareInfo( RpcHardwareInfo* info) { info->versionNumber = 2; info->rpcAuthorName = "Google"; info->supportedEekCurve = RpcHardwareInfo::CURVE_25519; info->uniqueId = "remote keymint"; return ScopedAStatus::ok(); } ScopedAStatus RemoteRemotelyProvisionedComponent::generateEcdsaP256KeyPair( bool testMode, MacedPublicKey* macedPublicKey, std::vector* privateKeyHandle) { GenerateRkpKeyRequest request(impl_.message_version()); request.test_mode = testMode; GenerateRkpKeyResponse response(impl_.message_version()); impl_.GenerateRkpKey(request, &response); if (response.error != KM_ERROR_OK) { return toKeymasterError(response); } macedPublicKey->macedKey = km_utils::kmBlob2vector(response.maced_public_key); *privateKeyHandle = km_utils::kmBlob2vector(response.key_blob); return ScopedAStatus::ok(); } ScopedAStatus RemoteRemotelyProvisionedComponent::generateCertificateRequest( bool testMode, const std::vector& keysToSign, const std::vector& endpointEncCertChain, const std::vector& challenge, DeviceInfo* deviceInfo, ProtectedData* protectedData, std::vector* keysToSignMac) { GenerateCsrRequest request(impl_.message_version()); request.test_mode = testMode; request.num_keys = keysToSign.size(); request.keys_to_sign_array = new KeymasterBlob[keysToSign.size()]; for (size_t i = 0; i < keysToSign.size(); i++) { request.SetKeyToSign(i, keysToSign[i].macedKey.data(), keysToSign[i].macedKey.size()); } request.SetEndpointEncCertChain(endpointEncCertChain.data(), endpointEncCertChain.size()); request.SetChallenge(challenge.data(), challenge.size()); GenerateCsrResponse response(impl_.message_version()); impl_.GenerateCsr(request, &response); if (response.error != KM_ERROR_OK) { return toKeymasterError(response); } deviceInfo->deviceInfo = km_utils::kmBlob2vector(response.device_info_blob); protectedData->protectedData = km_utils::kmBlob2vector(response.protected_data_blob); *keysToSignMac = km_utils::kmBlob2vector(response.keys_to_sign_mac); return ScopedAStatus::ok(); } } // namespace aidl::android::hardware::security::keymint