137 lines
		
	
	
		
			5.0 KiB
		
	
	
	
		
			C++
		
	
	
	
			
		
		
	
	
			137 lines
		
	
	
		
			5.0 KiB
		
	
	
	
		
			C++
		
	
	
	
| /*
 | |
|  * Copyright (C) 2021 The Android Open Source Project
 | |
|  *
 | |
|  * Licensed under the Apache License, Version 2.0 (the "License");
 | |
|  * you may not use this file except in compliance with the License.
 | |
|  * You may obtain a copy of the License at
 | |
|  *
 | |
|  *      http://www.apache.org/licenses/LICENSE-2.0
 | |
|  *
 | |
|  * Unless required by applicable law or agreed to in writing, software
 | |
|  * distributed under the License is distributed on an "AS IS" BASIS,
 | |
|  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | |
|  * See the License for the specific language governing permissions and
 | |
|  * limitations under the License.
 | |
|  */
 | |
| 
 | |
| #include "AndroidRemotelyProvisionedComponentDevice.h"
 | |
| 
 | |
| #include <assert.h>
 | |
| #include <variant>
 | |
| 
 | |
| #include <cppbor.h>
 | |
| #include <cppbor_parse.h>
 | |
| 
 | |
| #include <KeyMintUtils.h>
 | |
| #include <keymaster/cppcose/cppcose.h>
 | |
| #include <keymaster/keymaster_configuration.h>
 | |
| 
 | |
| #include <openssl/bn.h>
 | |
| #include <openssl/ec.h>
 | |
| #include <openssl/rand.h>
 | |
| #include <openssl/x509.h>
 | |
| 
 | |
| namespace aidl::android::hardware::security::keymint {
 | |
| 
 | |
| using keymaster::GenerateCsrRequest;
 | |
| using keymaster::GenerateCsrResponse;
 | |
| using keymaster::GenerateRkpKeyRequest;
 | |
| using keymaster::GenerateRkpKeyResponse;
 | |
| using keymaster::KeymasterBlob;
 | |
| using ::std::string;
 | |
| using ::std::unique_ptr;
 | |
| using ::std::vector;
 | |
| using bytevec = ::std::vector<uint8_t>;
 | |
| 
 | |
| namespace {
 | |
| 
 | |
| constexpr auto STATUS_FAILED = IRemotelyProvisionedComponent::STATUS_FAILED;
 | |
| 
 | |
| struct AStatusDeleter {
 | |
|     void operator()(AStatus* p) { AStatus_delete(p); }
 | |
| };
 | |
| 
 | |
| class Status {
 | |
|   public:
 | |
|     Status() : status_(AStatus_newOk()) {}
 | |
|     Status(int32_t errCode, const std::string& errMsg)
 | |
|         : status_(AStatus_fromServiceSpecificErrorWithMessage(errCode, errMsg.c_str())) {}
 | |
|     explicit Status(const std::string& errMsg)
 | |
|         : status_(AStatus_fromServiceSpecificErrorWithMessage(STATUS_FAILED, errMsg.c_str())) {}
 | |
|     explicit Status(AStatus* status) : status_(status ? status : AStatus_newOk()) {}
 | |
| 
 | |
|     Status(Status&&) = default;
 | |
|     Status(const Status&) = delete;
 | |
| 
 | |
|     operator ::ndk::ScopedAStatus() && {  // NOLINT(google-explicit-constructor)
 | |
|         return ndk::ScopedAStatus(status_.release());
 | |
|     }
 | |
| 
 | |
|     bool isOk() const { return AStatus_isOk(status_.get()); }
 | |
| 
 | |
|     const char* getMessage() const { return AStatus_getMessage(status_.get()); }
 | |
| 
 | |
|   private:
 | |
|     std::unique_ptr<AStatus, AStatusDeleter> status_;
 | |
| };
 | |
| 
 | |
| }  // namespace
 | |
| 
 | |
| AndroidRemotelyProvisionedComponentDevice::AndroidRemotelyProvisionedComponentDevice(
 | |
|     const std::shared_ptr<AndroidKeyMintDevice>& keymint) {
 | |
|     impl_ = keymint->getKeymasterImpl();
 | |
| }
 | |
| 
 | |
| ScopedAStatus AndroidRemotelyProvisionedComponentDevice::getHardwareInfo(RpcHardwareInfo* info) {
 | |
|     info->versionNumber = 2;
 | |
|     info->rpcAuthorName = "Google";
 | |
|     info->supportedEekCurve = RpcHardwareInfo::CURVE_25519;
 | |
|     info->uniqueId = "default keymint";
 | |
|     return ScopedAStatus::ok();
 | |
| }
 | |
| 
 | |
| ScopedAStatus AndroidRemotelyProvisionedComponentDevice::generateEcdsaP256KeyPair(
 | |
|     bool testMode, MacedPublicKey* macedPublicKey, bytevec* privateKeyHandle) {
 | |
|     GenerateRkpKeyRequest request(impl_->message_version());
 | |
|     request.test_mode = testMode;
 | |
|     GenerateRkpKeyResponse response(impl_->message_version());
 | |
|     impl_->GenerateRkpKey(request, &response);
 | |
|     if (response.error != KM_ERROR_OK) {
 | |
|         return Status(-static_cast<int32_t>(response.error), "Failure in key generation.");
 | |
|     }
 | |
| 
 | |
|     macedPublicKey->macedKey = km_utils::kmBlob2vector(response.maced_public_key);
 | |
|     *privateKeyHandle = km_utils::kmBlob2vector(response.key_blob);
 | |
|     return ScopedAStatus::ok();
 | |
| }
 | |
| 
 | |
| ScopedAStatus AndroidRemotelyProvisionedComponentDevice::generateCertificateRequest(
 | |
|     bool testMode, const vector<MacedPublicKey>& keysToSign, const bytevec& endpointEncCertChain,
 | |
|     const bytevec& challenge, DeviceInfo* deviceInfo, ProtectedData* protectedData,
 | |
|     bytevec* keysToSignMac) {
 | |
|     GenerateCsrRequest request(impl_->message_version());
 | |
|     request.test_mode = testMode;
 | |
|     request.num_keys = keysToSign.size();
 | |
|     request.keys_to_sign_array = new (std::nothrow) KeymasterBlob[keysToSign.size()];
 | |
|     if (request.keys_to_sign_array == nullptr) {
 | |
|         return km_utils::kmError2ScopedAStatus(KM_ERROR_MEMORY_ALLOCATION_FAILED);
 | |
|     }
 | |
|     for (size_t i = 0; i < keysToSign.size(); i++) {
 | |
|         request.SetKeyToSign(i, keysToSign[i].macedKey.data(), keysToSign[i].macedKey.size());
 | |
|     }
 | |
|     request.SetEndpointEncCertChain(endpointEncCertChain.data(), endpointEncCertChain.size());
 | |
|     request.SetChallenge(challenge.data(), challenge.size());
 | |
|     GenerateCsrResponse response(impl_->message_version());
 | |
|     impl_->GenerateCsr(request, &response);
 | |
| 
 | |
|     if (response.error != KM_ERROR_OK) {
 | |
|         return Status(-static_cast<int32_t>(response.error), "Failure in CSR Generation.");
 | |
|     }
 | |
|     deviceInfo->deviceInfo = km_utils::kmBlob2vector(response.device_info_blob);
 | |
|     protectedData->protectedData = km_utils::kmBlob2vector(response.protected_data_blob);
 | |
|     *keysToSignMac = km_utils::kmBlob2vector(response.keys_to_sign_mac);
 | |
|     return ScopedAStatus::ok();
 | |
| }
 | |
| 
 | |
| }  // namespace aidl::android::hardware::security::keymint
 |