| /* |
| * Copyright 2018 The Android Open Source Project |
| * |
| * Licensed under the Apache License, Version 2.0 (the "License"); |
| * you may not use this file except in compliance with the License. |
| * You may obtain a copy of the License at |
| * |
| * http://www.apache.org/licenses/LICENSE-2.0 |
| * |
| * Unless required by applicable law or agreed to in writing, software |
| * distributed under the License is distributed on an "AS IS" BASIS, |
| * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| * See the License for the specific language governing permissions and |
| * limitations under the License. |
| */ |
| |
| #include <cutils/log.h> |
| #include <keymaster/android_keymaster_messages.h> |
| #include <keymaster/keymaster_configuration.h> |
| #include <trusty_keymaster/TrustyKeymaster.h> |
| #include <trusty_keymaster/ipc/trusty_keymaster_ipc.h> |
| |
| namespace keymaster { |
| |
| int TrustyKeymaster::Initialize() { |
| int err; |
| |
| err = trusty_keymaster_connect(); |
| if (err) { |
| ALOGE("Failed to connect to trusty keymaster %d", err); |
| return err; |
| } |
| |
| ConfigureRequest req; |
| req.os_version = GetOsVersion(); |
| req.os_patchlevel = GetOsPatchlevel(); |
| |
| ConfigureResponse rsp; |
| Configure(req, &rsp); |
| |
| if (rsp.error != KM_ERROR_OK) { |
| ALOGE("Failed to configure keymaster %d", rsp.error); |
| return -1; |
| } |
| |
| return 0; |
| } |
| |
| TrustyKeymaster::TrustyKeymaster() {} |
| |
| TrustyKeymaster::~TrustyKeymaster() { |
| trusty_keymaster_disconnect(); |
| } |
| |
| static void ForwardCommand(enum keymaster_command command, const Serializable& req, |
| KeymasterResponse* rsp) { |
| keymaster_error_t err; |
| err = trusty_keymaster_send(command, req, rsp); |
| if (err != KM_ERROR_OK) { |
| ALOGE("Failed to send cmd %d err: %d", command, err); |
| rsp->error = err; |
| } |
| } |
| |
| void TrustyKeymaster::GetVersion(const GetVersionRequest& request, GetVersionResponse* response) { |
| ForwardCommand(KM_GET_VERSION, request, response); |
| } |
| |
| void TrustyKeymaster::SupportedAlgorithms(const SupportedAlgorithmsRequest& request, |
| SupportedAlgorithmsResponse* response) { |
| ForwardCommand(KM_GET_SUPPORTED_ALGORITHMS, request, response); |
| } |
| |
| void TrustyKeymaster::SupportedBlockModes(const SupportedBlockModesRequest& request, |
| SupportedBlockModesResponse* response) { |
| ForwardCommand(KM_GET_SUPPORTED_BLOCK_MODES, request, response); |
| } |
| |
| void TrustyKeymaster::SupportedPaddingModes(const SupportedPaddingModesRequest& request, |
| SupportedPaddingModesResponse* response) { |
| ForwardCommand(KM_GET_SUPPORTED_PADDING_MODES, request, response); |
| } |
| |
| void TrustyKeymaster::SupportedDigests(const SupportedDigestsRequest& request, |
| SupportedDigestsResponse* response) { |
| ForwardCommand(KM_GET_SUPPORTED_DIGESTS, request, response); |
| } |
| |
| void TrustyKeymaster::SupportedImportFormats(const SupportedImportFormatsRequest& request, |
| SupportedImportFormatsResponse* response) { |
| ForwardCommand(KM_GET_SUPPORTED_IMPORT_FORMATS, request, response); |
| } |
| |
| void TrustyKeymaster::SupportedExportFormats(const SupportedExportFormatsRequest& request, |
| SupportedExportFormatsResponse* response) { |
| ForwardCommand(KM_GET_SUPPORTED_EXPORT_FORMATS, request, response); |
| } |
| |
| void TrustyKeymaster::AddRngEntropy(const AddEntropyRequest& request, |
| AddEntropyResponse* response) { |
| ForwardCommand(KM_ADD_RNG_ENTROPY, request, response); |
| } |
| |
| void TrustyKeymaster::Configure(const ConfigureRequest& request, ConfigureResponse* response) { |
| ForwardCommand(KM_CONFIGURE, request, response); |
| } |
| |
| void TrustyKeymaster::GenerateKey(const GenerateKeyRequest& request, |
| GenerateKeyResponse* response) { |
| GenerateKeyRequest datedRequest(request.message_version); |
| datedRequest.key_description = request.key_description; |
| |
| if (!request.key_description.Contains(TAG_CREATION_DATETIME)) { |
| datedRequest.key_description.push_back(TAG_CREATION_DATETIME, java_time(time(NULL))); |
| } |
| |
| ForwardCommand(KM_GENERATE_KEY, datedRequest, response); |
| } |
| |
| void TrustyKeymaster::GetKeyCharacteristics(const GetKeyCharacteristicsRequest& request, |
| GetKeyCharacteristicsResponse* response) { |
| ForwardCommand(KM_GET_KEY_CHARACTERISTICS, request, response); |
| } |
| |
| void TrustyKeymaster::ImportKey(const ImportKeyRequest& request, ImportKeyResponse* response) { |
| ForwardCommand(KM_IMPORT_KEY, request, response); |
| } |
| |
| void TrustyKeymaster::ImportWrappedKey(const ImportWrappedKeyRequest& request, |
| ImportWrappedKeyResponse* response) { |
| ForwardCommand(KM_IMPORT_WRAPPED_KEY, request, response); |
| } |
| |
| void TrustyKeymaster::ExportKey(const ExportKeyRequest& request, ExportKeyResponse* response) { |
| ForwardCommand(KM_EXPORT_KEY, request, response); |
| } |
| |
| void TrustyKeymaster::AttestKey(const AttestKeyRequest& request, AttestKeyResponse* response) { |
| ForwardCommand(KM_ATTEST_KEY, request, response); |
| } |
| |
| void TrustyKeymaster::UpgradeKey(const UpgradeKeyRequest& request, UpgradeKeyResponse* response) { |
| ForwardCommand(KM_UPGRADE_KEY, request, response); |
| } |
| |
| void TrustyKeymaster::DeleteKey(const DeleteKeyRequest& request, DeleteKeyResponse* response) { |
| ForwardCommand(KM_DELETE_KEY, request, response); |
| } |
| |
| void TrustyKeymaster::DeleteAllKeys(const DeleteAllKeysRequest& request, |
| DeleteAllKeysResponse* response) { |
| ForwardCommand(KM_DELETE_ALL_KEYS, request, response); |
| } |
| |
| void TrustyKeymaster::BeginOperation(const BeginOperationRequest& request, |
| BeginOperationResponse* response) { |
| ForwardCommand(KM_BEGIN_OPERATION, request, response); |
| } |
| |
| void TrustyKeymaster::UpdateOperation(const UpdateOperationRequest& request, |
| UpdateOperationResponse* response) { |
| ForwardCommand(KM_UPDATE_OPERATION, request, response); |
| } |
| |
| void TrustyKeymaster::FinishOperation(const FinishOperationRequest& request, |
| FinishOperationResponse* response) { |
| ForwardCommand(KM_FINISH_OPERATION, request, response); |
| } |
| |
| void TrustyKeymaster::AbortOperation(const AbortOperationRequest& request, |
| AbortOperationResponse* response) { |
| ForwardCommand(KM_ABORT_OPERATION, request, response); |
| } |
| |
| GetHmacSharingParametersResponse TrustyKeymaster::GetHmacSharingParameters() { |
| // Dummy empty buffer to allow ForwardCommand to have something to serialize |
| Buffer request; |
| GetHmacSharingParametersResponse response; |
| ForwardCommand(KM_GET_HMAC_SHARING_PARAMETERS, request, &response); |
| return response; |
| } |
| |
| ComputeSharedHmacResponse TrustyKeymaster::ComputeSharedHmac( |
| const ComputeSharedHmacRequest& request) { |
| ComputeSharedHmacResponse response; |
| ForwardCommand(KM_COMPUTE_SHARED_HMAC, request, &response); |
| return response; |
| } |
| |
| VerifyAuthorizationResponse TrustyKeymaster::VerifyAuthorization( |
| const VerifyAuthorizationRequest& request) { |
| VerifyAuthorizationResponse response; |
| ForwardCommand(KM_VERIFY_AUTHORIZATION, request, &response); |
| return response; |
| } |
| |
| } // namespace keymaster |