245 lines
10 KiB
C
245 lines
10 KiB
C
|
/*
|
||
|
* Copyright 2020, The Android Open Source Project
|
||
|
*
|
||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||
|
* you may not use this file except in compliance with the License.
|
||
|
* You may obtain a copy of the License at
|
||
|
*
|
||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||
|
*
|
||
|
* Unless required by applicable law or agreed to in writing, software
|
||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||
|
* See the License for the specific language governing permissions and
|
||
|
* limitations under the License.
|
||
|
*/
|
||
|
|
||
|
#ifndef ANDROID_HARDWARE_IDENTITY_FAKESECUREHARDWAREPROXY_H
|
||
|
#define ANDROID_HARDWARE_IDENTITY_FAKESECUREHARDWAREPROXY_H
|
||
|
|
||
|
#include <libeic/libeic.h>
|
||
|
|
||
|
#include "SecureHardwareProxy.h"
|
||
|
|
||
|
namespace android::hardware::identity {
|
||
|
|
||
|
// This implementation uses libEmbeddedIC in-process.
|
||
|
//
|
||
|
class FakeSecureHardwareProvisioningProxy : public SecureHardwareProvisioningProxy {
|
||
|
public:
|
||
|
FakeSecureHardwareProvisioningProxy() = default;
|
||
|
virtual ~FakeSecureHardwareProvisioningProxy();
|
||
|
|
||
|
bool initialize(bool testCredential) override;
|
||
|
|
||
|
bool initializeForUpdate(bool testCredential, const string& docType,
|
||
|
const vector<uint8_t>& encryptedCredentialKeys) override;
|
||
|
|
||
|
bool shutdown() override;
|
||
|
|
||
|
optional<uint32_t> getId() override;
|
||
|
|
||
|
// Returns public key certificate.
|
||
|
optional<vector<uint8_t>> createCredentialKey(const vector<uint8_t>& challenge,
|
||
|
const vector<uint8_t>& applicationId) override;
|
||
|
|
||
|
optional<vector<uint8_t>> createCredentialKeyUsingRkp(
|
||
|
const vector<uint8_t>& challenge, const vector<uint8_t>& applicationId,
|
||
|
const vector<uint8_t>& attestationKeyBlob,
|
||
|
const vector<uint8_t>& attestationKeyCert) override;
|
||
|
|
||
|
bool startPersonalization(int accessControlProfileCount, const vector<int>& entryCounts,
|
||
|
const string& docType,
|
||
|
size_t expectedProofOfProvisioningSize) override;
|
||
|
|
||
|
// Returns MAC (28 bytes).
|
||
|
optional<vector<uint8_t>> addAccessControlProfile(int id,
|
||
|
const vector<uint8_t>& readerCertificate,
|
||
|
bool userAuthenticationRequired,
|
||
|
uint64_t timeoutMillis,
|
||
|
uint64_t secureUserId) override;
|
||
|
|
||
|
bool beginAddEntry(const vector<int>& accessControlProfileIds, const string& nameSpace,
|
||
|
const string& name, uint64_t entrySize) override;
|
||
|
|
||
|
// Returns encryptedContent.
|
||
|
optional<vector<uint8_t>> addEntryValue(const vector<int>& accessControlProfileIds,
|
||
|
const string& nameSpace, const string& name,
|
||
|
const vector<uint8_t>& content) override;
|
||
|
|
||
|
// Returns signatureOfToBeSigned (EIC_ECDSA_P256_SIGNATURE_SIZE bytes).
|
||
|
optional<vector<uint8_t>> finishAddingEntries() override;
|
||
|
|
||
|
// Returns encryptedCredentialKeys (80 bytes).
|
||
|
optional<vector<uint8_t>> finishGetCredentialData(const string& docType) override;
|
||
|
|
||
|
protected:
|
||
|
// See docs for id_.
|
||
|
//
|
||
|
bool validateId(const string& callerName);
|
||
|
|
||
|
// We use a singleton libeic object, shared by all proxy instances. This is to
|
||
|
// properly simulate a situation where libeic is used on constrained hardware
|
||
|
// with only enough RAM for a single instance of the libeic object.
|
||
|
//
|
||
|
static EicProvisioning ctx_;
|
||
|
|
||
|
// On the HAL side we keep track of the ID that was assigned to the libeic object
|
||
|
// created in secure hardware. For every call into libeic we validate that this
|
||
|
// identifier matches what is on the secure side. This is what the validateId()
|
||
|
// method does.
|
||
|
//
|
||
|
uint32_t id_ = 0;
|
||
|
};
|
||
|
|
||
|
// This implementation uses libEmbeddedIC in-process.
|
||
|
//
|
||
|
class FakeSecureHardwareSessionProxy : public SecureHardwareSessionProxy {
|
||
|
public:
|
||
|
FakeSecureHardwareSessionProxy() = default;
|
||
|
virtual ~FakeSecureHardwareSessionProxy();
|
||
|
|
||
|
bool initialize() override;
|
||
|
|
||
|
bool shutdown() override;
|
||
|
|
||
|
optional<uint32_t> getId() override;
|
||
|
|
||
|
optional<uint64_t> getAuthChallenge() override;
|
||
|
|
||
|
// Returns private key
|
||
|
optional<vector<uint8_t>> getEphemeralKeyPair() override;
|
||
|
|
||
|
bool setReaderEphemeralPublicKey(const vector<uint8_t>& readerEphemeralPublicKey) override;
|
||
|
|
||
|
bool setSessionTranscript(const vector<uint8_t>& sessionTranscript) override;
|
||
|
|
||
|
protected:
|
||
|
// See docs for id_.
|
||
|
//
|
||
|
bool validateId(const string& callerName);
|
||
|
|
||
|
// We use a singleton libeic object, shared by all proxy instances. This is to
|
||
|
// properly simulate a situation where libeic is used on constrained hardware
|
||
|
// with only enough RAM for a single instance of the libeic object.
|
||
|
//
|
||
|
static EicSession ctx_;
|
||
|
|
||
|
// On the HAL side we keep track of the ID that was assigned to the libeic object
|
||
|
// created in secure hardware. For every call into libeic we validate that this
|
||
|
// identifier matches what is on the secure side. This is what the validateId()
|
||
|
// method does.
|
||
|
//
|
||
|
uint32_t id_ = 0;
|
||
|
};
|
||
|
|
||
|
// This implementation uses libEmbeddedIC in-process.
|
||
|
//
|
||
|
class FakeSecureHardwarePresentationProxy : public SecureHardwarePresentationProxy {
|
||
|
public:
|
||
|
FakeSecureHardwarePresentationProxy() = default;
|
||
|
virtual ~FakeSecureHardwarePresentationProxy();
|
||
|
|
||
|
bool initialize(uint32_t sessionId, bool testCredential, const string& docType,
|
||
|
const vector<uint8_t>& encryptedCredentialKeys) override;
|
||
|
|
||
|
bool shutdown() override;
|
||
|
|
||
|
optional<uint32_t> getId() override;
|
||
|
|
||
|
// Returns publicKeyCert (1st component) and signingKeyBlob (2nd component)
|
||
|
optional<pair<vector<uint8_t>, vector<uint8_t>>> generateSigningKeyPair(const string& docType,
|
||
|
time_t now) override;
|
||
|
|
||
|
// Returns private key
|
||
|
optional<vector<uint8_t>> createEphemeralKeyPair() override;
|
||
|
|
||
|
optional<uint64_t> createAuthChallenge() override;
|
||
|
|
||
|
bool startRetrieveEntries() override;
|
||
|
|
||
|
bool setAuthToken(uint64_t challenge, uint64_t secureUserId, uint64_t authenticatorId,
|
||
|
int hardwareAuthenticatorType, uint64_t timeStamp, const vector<uint8_t>& mac,
|
||
|
uint64_t verificationTokenChallenge, uint64_t verificationTokenTimestamp,
|
||
|
int verificationTokenSecurityLevel,
|
||
|
const vector<uint8_t>& verificationTokenMac) override;
|
||
|
|
||
|
bool pushReaderCert(const vector<uint8_t>& certX509) override;
|
||
|
|
||
|
optional<bool> validateAccessControlProfile(int id, const vector<uint8_t>& readerCertificate,
|
||
|
bool userAuthenticationRequired, int timeoutMillis,
|
||
|
uint64_t secureUserId,
|
||
|
const vector<uint8_t>& mac) override;
|
||
|
|
||
|
bool validateRequestMessage(const vector<uint8_t>& sessionTranscript,
|
||
|
const vector<uint8_t>& requestMessage, int coseSignAlg,
|
||
|
const vector<uint8_t>& readerSignatureOfToBeSigned) override;
|
||
|
|
||
|
bool calcMacKey(const vector<uint8_t>& sessionTranscript,
|
||
|
const vector<uint8_t>& readerEphemeralPublicKey,
|
||
|
const vector<uint8_t>& signingKeyBlob, const string& docType,
|
||
|
unsigned int numNamespacesWithValues,
|
||
|
size_t expectedProofOfProvisioningSize) override;
|
||
|
|
||
|
AccessCheckResult startRetrieveEntryValue(
|
||
|
const string& nameSpace, const string& name, unsigned int newNamespaceNumEntries,
|
||
|
int32_t entrySize, const vector<int32_t>& accessControlProfileIds) override;
|
||
|
|
||
|
optional<vector<uint8_t>> retrieveEntryValue(
|
||
|
const vector<uint8_t>& encryptedContent, const string& nameSpace, const string& name,
|
||
|
const vector<int32_t>& accessControlProfileIds) override;
|
||
|
|
||
|
optional<vector<uint8_t>> finishRetrieval() override;
|
||
|
|
||
|
optional<vector<uint8_t>> deleteCredential(const string& docType,
|
||
|
const vector<uint8_t>& challenge,
|
||
|
bool includeChallenge,
|
||
|
size_t proofOfDeletionCborSize) override;
|
||
|
|
||
|
optional<vector<uint8_t>> proveOwnership(const string& docType, bool testCredential,
|
||
|
const vector<uint8_t>& challenge,
|
||
|
size_t proofOfOwnershipCborSize) override;
|
||
|
|
||
|
protected:
|
||
|
// See docs for id_.
|
||
|
//
|
||
|
bool validateId(const string& callerName);
|
||
|
|
||
|
// We use a singleton libeic object, shared by all proxy instances. This is to
|
||
|
// properly simulate a situation where libeic is used on constrained hardware
|
||
|
// with only enough RAM for a single instance of the libeic object.
|
||
|
//
|
||
|
static EicPresentation ctx_;
|
||
|
|
||
|
// On the HAL side we keep track of the ID that was assigned to the libeic object
|
||
|
// created in secure hardware. For every call into libeic we validate that this
|
||
|
// identifier matches what is on the secure side. This is what the validateId()
|
||
|
// method does.
|
||
|
//
|
||
|
uint32_t id_ = 0;
|
||
|
};
|
||
|
|
||
|
// Factory implementation.
|
||
|
//
|
||
|
class FakeSecureHardwareProxyFactory : public SecureHardwareProxyFactory {
|
||
|
public:
|
||
|
FakeSecureHardwareProxyFactory() {}
|
||
|
virtual ~FakeSecureHardwareProxyFactory() {}
|
||
|
|
||
|
sp<SecureHardwareProvisioningProxy> createProvisioningProxy() override {
|
||
|
return new FakeSecureHardwareProvisioningProxy();
|
||
|
}
|
||
|
|
||
|
sp<SecureHardwareSessionProxy> createSessionProxy() override {
|
||
|
return new FakeSecureHardwareSessionProxy();
|
||
|
}
|
||
|
|
||
|
sp<SecureHardwarePresentationProxy> createPresentationProxy() override {
|
||
|
return new FakeSecureHardwarePresentationProxy();
|
||
|
}
|
||
|
};
|
||
|
|
||
|
} // namespace android::hardware::identity
|
||
|
|
||
|
#endif // ANDROID_HARDWARE_IDENTITY_FAKESECUREHARDWAREPROXY_H
|