• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 /*
2  * Copyright 2015, The Android Open Source Project
3  *
4  * Licensed under the Apache License, Version 2.0 (the "License");
5  * you may not use this file except in compliance with the License.
6  * You may obtain a copy of the License at
7  *
8  *     http://www.apache.org/licenses/LICENSE-2.0
9  *
10  * Unless required by applicable law or agreed to in writing, software
11  * distributed under the License is distributed on an "AS IS" BASIS,
12  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13  * See the License for the specific language governing permissions and
14  * limitations under the License.
15 */
16 
17 #define LOG_TAG "GateKeeperService"
18 #include <utils/Log.h>
19 
20 #include "IGateKeeperService.h"
21 
22 namespace android {
23 
24 const android::String16 IGateKeeperService::descriptor("android.service.gatekeeper.IGateKeeperService");
getInterfaceDescriptor() const25 const android::String16& IGateKeeperService::getInterfaceDescriptor() const {
26     return IGateKeeperService::descriptor;
27 }
28 
onTransact(uint32_t code,const Parcel & data,Parcel * reply,uint32_t flags)29 status_t BnGateKeeperService::onTransact(
30     uint32_t code, const Parcel& data, Parcel* reply, uint32_t flags) {
31     switch(code) {
32         case ENROLL: {
33             CHECK_INTERFACE(IGateKeeperService, data, reply);
34             uint32_t uid = data.readInt32();
35 
36             ssize_t currentPasswordHandleSize = data.readInt32();
37             const uint8_t *currentPasswordHandle =
38                     static_cast<const uint8_t *>(data.readInplace(currentPasswordHandleSize));
39             if (!currentPasswordHandle) currentPasswordHandleSize = 0;
40 
41             ssize_t currentPasswordSize = data.readInt32();
42             const uint8_t *currentPassword =
43                     static_cast<const uint8_t *>(data.readInplace(currentPasswordSize));
44             if (!currentPassword) currentPasswordSize = 0;
45 
46             ssize_t desiredPasswordSize = data.readInt32();
47             const uint8_t *desiredPassword =
48                     static_cast<const uint8_t *>(data.readInplace(desiredPasswordSize));
49             if (!desiredPassword) desiredPasswordSize = 0;
50 
51             uint8_t *out = NULL;
52             uint32_t outSize = 0;
53             int ret = enroll(uid, currentPasswordHandle, currentPasswordHandleSize,
54                     currentPassword, currentPasswordSize, desiredPassword,
55                     desiredPasswordSize, &out, &outSize);
56 
57             reply->writeNoException();
58             reply->writeInt32(1);
59             if (ret == 0 && outSize > 0 && out != NULL) {
60                 reply->writeInt32(GATEKEEPER_RESPONSE_OK);
61                 reply->writeInt32(0);
62                 reply->writeInt32(outSize);
63                 reply->writeInt32(outSize);
64                 void *buf = reply->writeInplace(outSize);
65                 memcpy(buf, out, outSize);
66                 delete[] out;
67             } else if (ret > 0) {
68                 reply->writeInt32(GATEKEEPER_RESPONSE_RETRY);
69                 reply->writeInt32(ret);
70             } else {
71                 reply->writeInt32(GATEKEEPER_RESPONSE_ERROR);
72             }
73             return NO_ERROR;
74         }
75         case VERIFY: {
76             CHECK_INTERFACE(IGateKeeperService, data, reply);
77             uint32_t uid = data.readInt32();
78             ssize_t currentPasswordHandleSize = data.readInt32();
79             const uint8_t *currentPasswordHandle =
80                     static_cast<const uint8_t *>(data.readInplace(currentPasswordHandleSize));
81             if (!currentPasswordHandle) currentPasswordHandleSize = 0;
82 
83             ssize_t currentPasswordSize = data.readInt32();
84             const uint8_t *currentPassword =
85                 static_cast<const uint8_t *>(data.readInplace(currentPasswordSize));
86             if (!currentPassword) currentPasswordSize = 0;
87 
88             bool request_reenroll = false;
89             int ret = verify(uid, (uint8_t *) currentPasswordHandle,
90                     currentPasswordHandleSize, (uint8_t *) currentPassword, currentPasswordSize,
91                     &request_reenroll);
92 
93             reply->writeNoException();
94             reply->writeInt32(1);
95             if (ret == 0) {
96                 reply->writeInt32(GATEKEEPER_RESPONSE_OK);
97                 reply->writeInt32(request_reenroll ? 1 : 0);
98                 reply->writeInt32(0); // no payload returned from this call
99             } else if (ret > 0) {
100                 reply->writeInt32(GATEKEEPER_RESPONSE_RETRY);
101                 reply->writeInt32(ret);
102             } else {
103                 reply->writeInt32(GATEKEEPER_RESPONSE_ERROR);
104             }
105             return NO_ERROR;
106         }
107         case VERIFY_CHALLENGE: {
108             CHECK_INTERFACE(IGateKeeperService, data, reply);
109             uint32_t uid = data.readInt32();
110             uint64_t challenge = data.readInt64();
111             ssize_t currentPasswordHandleSize = data.readInt32();
112             const uint8_t *currentPasswordHandle =
113                     static_cast<const uint8_t *>(data.readInplace(currentPasswordHandleSize));
114             if (!currentPasswordHandle) currentPasswordHandleSize = 0;
115 
116             ssize_t currentPasswordSize = data.readInt32();
117             const uint8_t *currentPassword =
118                 static_cast<const uint8_t *>(data.readInplace(currentPasswordSize));
119             if (!currentPassword) currentPasswordSize = 0;
120 
121 
122             uint8_t *out = NULL;
123             uint32_t outSize = 0;
124             bool request_reenroll = false;
125             int ret = verifyChallenge(uid, challenge, (uint8_t *) currentPasswordHandle,
126                     currentPasswordHandleSize, (uint8_t *) currentPassword, currentPasswordSize,
127                     &out, &outSize, &request_reenroll);
128             reply->writeNoException();
129             reply->writeInt32(1);
130             if (ret == 0 && outSize > 0 && out != NULL) {
131                 reply->writeInt32(GATEKEEPER_RESPONSE_OK);
132                 reply->writeInt32(request_reenroll ? 1 : 0);
133                 reply->writeInt32(outSize);
134                 reply->writeInt32(outSize);
135                 void *buf = reply->writeInplace(outSize);
136                 memcpy(buf, out, outSize);
137                 delete[] out;
138             } else if (ret > 0) {
139                 reply->writeInt32(GATEKEEPER_RESPONSE_RETRY);
140                 reply->writeInt32(ret);
141             } else {
142                 reply->writeInt32(GATEKEEPER_RESPONSE_ERROR);
143             }
144             return NO_ERROR;
145         }
146         case GET_SECURE_USER_ID: {
147             CHECK_INTERFACE(IGateKeeperService, data, reply);
148             uint32_t uid = data.readInt32();
149             uint64_t sid = getSecureUserId(uid);
150             reply->writeNoException();
151             reply->writeInt64(sid);
152             return NO_ERROR;
153         }
154         case CLEAR_SECURE_USER_ID: {
155             CHECK_INTERFACE(IGateKeeperService, data, reply);
156             uint32_t uid = data.readInt32();
157             clearSecureUserId(uid);
158             reply->writeNoException();
159             return NO_ERROR;
160         }
161         case REPORT_DEVICE_SETUP_COMPLETE: {
162             CHECK_INTERFACE(IGateKeeperService, data, reply);
163             reportDeviceSetupComplete();
164             reply->writeNoException();
165             return NO_ERROR;
166         }
167         default:
168             return BBinder::onTransact(code, data, reply, flags);
169     }
170 };
171 
172 
173 }; // namespace android
174