Shawn Willden | 8ae41b5 | 2019-10-28 12:54:16 -0600 | [diff] [blame] | 1 | /* |
| 2 | ** |
| 3 | ** Copyright 2019, The Android Open Source Project |
| 4 | ** |
| 5 | ** Licensed under the Apache License, Version 2.0 (the "License"); |
| 6 | ** you may not use this file except in compliance with the License. |
| 7 | ** You may obtain a copy of the License at |
| 8 | ** |
| 9 | ** http://www.apache.org/licenses/LICENSE-2.0 |
| 10 | ** |
| 11 | ** Unless required by applicable law or agreed to in writing, software |
| 12 | ** distributed under the License is distributed on an "AS IS" BASIS, |
| 13 | ** WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 14 | ** See the License for the specific language governing permissions and |
| 15 | ** limitations under the License. |
| 16 | */ |
| 17 | |
| 18 | #ifndef HIDL_android_hardware_keymaster_V4_1_AndroidKeymaster4Device_H_ |
| 19 | #define HIDL_android_hardware_keymaster_V4_1_AndroidKeymaster4Device_H_ |
| 20 | |
| 21 | #include <android/hardware/keymaster/4.1/IKeymasterDevice.h> |
| 22 | #include <android/hardware/keymaster/4.1/types.h> |
| 23 | #include <hidl/Status.h> |
| 24 | |
| 25 | #include "AndroidKeymaster4Device.h" |
| 26 | |
| 27 | namespace keymaster { |
| 28 | class AndroidKeymaster; |
| 29 | class KeymasterContext; |
| 30 | |
| 31 | namespace V4_1 { |
| 32 | |
| 33 | using ::android::hardware::hidl_vec; |
| 34 | using ::android::hardware::Return; |
| 35 | using ::android::hardware::Void; |
| 36 | |
| 37 | using ::android::hardware::keymaster::V4_0::ErrorCode; |
| 38 | using ::android::hardware::keymaster::V4_0::HardwareAuthenticatorType; |
| 39 | using ::android::hardware::keymaster::V4_0::HardwareAuthToken; |
| 40 | using ::android::hardware::keymaster::V4_0::HmacSharingParameters; |
| 41 | using ::android::hardware::keymaster::V4_0::KeyCharacteristics; |
| 42 | using ::android::hardware::keymaster::V4_0::KeyFormat; |
| 43 | using ::android::hardware::keymaster::V4_0::KeyParameter; |
| 44 | using ::android::hardware::keymaster::V4_0::KeyPurpose; |
| 45 | using ::android::hardware::keymaster::V4_0::OperationHandle; |
| 46 | using ::android::hardware::keymaster::V4_0::SecurityLevel; |
| 47 | using ::android::hardware::keymaster::V4_0::VerificationToken; |
| 48 | using ::android::hardware::keymaster::V4_1::IKeymasterDevice; |
Shawn Willden | 8ae41b5 | 2019-10-28 12:54:16 -0600 | [diff] [blame] | 49 | using ::android::hardware::keymaster::V4_1::Tag; |
| 50 | |
Shawn Willden | 320aed2 | 2020-01-15 14:49:15 -0700 | [diff] [blame] | 51 | using V41ErrorCode = ::android::hardware::keymaster::V4_1::ErrorCode; |
| 52 | |
Shawn Willden | 9a3792e | 2021-04-08 09:38:14 -0600 | [diff] [blame] | 53 | inline V41ErrorCode convert(ErrorCode error_code) { |
Shawn Willden | 320aed2 | 2020-01-15 14:49:15 -0700 | [diff] [blame] | 54 | return static_cast<V41ErrorCode>(error_code); |
| 55 | } |
| 56 | |
Shawn Willden | 9a3792e | 2021-04-08 09:38:14 -0600 | [diff] [blame] | 57 | inline ErrorCode convert(V41ErrorCode error_code) { |
Shawn Willden | 320aed2 | 2020-01-15 14:49:15 -0700 | [diff] [blame] | 58 | return static_cast<ErrorCode>(error_code); |
| 59 | } |
| 60 | |
Shawn Willden | 8ae41b5 | 2019-10-28 12:54:16 -0600 | [diff] [blame] | 61 | class AndroidKeymaster41Device : public IKeymasterDevice, public V4_0::ng::AndroidKeymaster4Device { |
| 62 | using super = V4_0::ng::AndroidKeymaster4Device; |
| 63 | |
| 64 | public: |
Shawn Willden | 6daf984 | 2020-11-19 10:11:47 -0700 | [diff] [blame] | 65 | explicit AndroidKeymaster41Device(SecurityLevel securityLevel) |
| 66 | : super(KmVersion::KEYMASTER_4_1, securityLevel) {} |
Shawn Willden | 8ae41b5 | 2019-10-28 12:54:16 -0600 | [diff] [blame] | 67 | virtual ~AndroidKeymaster41Device() {} |
| 68 | |
Shawn Willden | 320aed2 | 2020-01-15 14:49:15 -0700 | [diff] [blame] | 69 | Return<V41ErrorCode> deviceLocked(bool /* passwordOnly */, |
Shawn Willden | da49575 | 2020-01-15 17:46:30 -0700 | [diff] [blame] | 70 | const VerificationToken& /* verificationToken */) override; |
| 71 | Return<V41ErrorCode> earlyBootEnded() override; |
Shawn Willden | 8ae41b5 | 2019-10-28 12:54:16 -0600 | [diff] [blame] | 72 | |
Shawn Willden | 8ae41b5 | 2019-10-28 12:54:16 -0600 | [diff] [blame] | 73 | Return<void> getHardwareInfo(super::getHardwareInfo_cb _hidl_cb) override { |
| 74 | return super::getHardwareInfo(_hidl_cb); |
| 75 | } |
| 76 | |
| 77 | Return<void> getHmacSharingParameters(super::getHmacSharingParameters_cb _hidl_cb) override { |
| 78 | return super::getHmacSharingParameters(_hidl_cb); |
| 79 | } |
| 80 | |
| 81 | Return<void> computeSharedHmac(const hidl_vec<HmacSharingParameters>& params, |
| 82 | super::computeSharedHmac_cb _hidl_cb) override { |
| 83 | return super::computeSharedHmac(params, _hidl_cb); |
| 84 | } |
| 85 | |
| 86 | Return<void> verifyAuthorization(uint64_t challenge, |
| 87 | const hidl_vec<KeyParameter>& parametersToVerify, |
| 88 | const HardwareAuthToken& authToken, |
| 89 | super::verifyAuthorization_cb _hidl_cb) override { |
| 90 | return super::verifyAuthorization(challenge, parametersToVerify, authToken, _hidl_cb); |
| 91 | } |
| 92 | |
| 93 | Return<ErrorCode> addRngEntropy(const hidl_vec<uint8_t>& data) override { |
| 94 | return super::addRngEntropy(data); |
| 95 | } |
| 96 | |
| 97 | Return<void> generateKey(const hidl_vec<KeyParameter>& keyParams, |
| 98 | super::generateKey_cb _hidl_cb) override { |
| 99 | return super::generateKey(keyParams, _hidl_cb); |
| 100 | } |
| 101 | |
| 102 | Return<void> getKeyCharacteristics(const hidl_vec<uint8_t>& keyBlob, |
| 103 | const hidl_vec<uint8_t>& clientId, |
| 104 | const hidl_vec<uint8_t>& appData, |
| 105 | super::getKeyCharacteristics_cb _hidl_cb) override { |
| 106 | return super::getKeyCharacteristics(keyBlob, clientId, appData, _hidl_cb); |
| 107 | } |
| 108 | |
| 109 | Return<void> importKey(const hidl_vec<KeyParameter>& params, KeyFormat keyFormat, |
| 110 | const hidl_vec<uint8_t>& keyData, |
| 111 | super::importKey_cb _hidl_cb) override { |
| 112 | return super::importKey(params, keyFormat, keyData, _hidl_cb); |
| 113 | } |
| 114 | |
| 115 | Return<void> importWrappedKey(const hidl_vec<uint8_t>& wrappedKeyData, |
| 116 | const hidl_vec<uint8_t>& wrappingKeyBlob, |
| 117 | const hidl_vec<uint8_t>& maskingKey, |
| 118 | const hidl_vec<KeyParameter>& unwrappingParams, |
| 119 | uint64_t passwordSid, uint64_t biometricSid, |
| 120 | super::importWrappedKey_cb _hidl_cb) override { |
| 121 | return super::importWrappedKey(wrappedKeyData, wrappingKeyBlob, maskingKey, |
| 122 | unwrappingParams, passwordSid, biometricSid, _hidl_cb); |
| 123 | } |
| 124 | |
| 125 | Return<void> exportKey(KeyFormat exportFormat, const hidl_vec<uint8_t>& keyBlob, |
| 126 | const hidl_vec<uint8_t>& clientId, const hidl_vec<uint8_t>& appData, |
| 127 | super::exportKey_cb _hidl_cb) override { |
| 128 | return super::exportKey(exportFormat, keyBlob, clientId, appData, _hidl_cb); |
| 129 | } |
| 130 | |
| 131 | Return<void> attestKey(const hidl_vec<uint8_t>& keyToAttest, |
| 132 | const hidl_vec<KeyParameter>& attestParams, |
| 133 | super::attestKey_cb _hidl_cb) override { |
| 134 | return super::attestKey(keyToAttest, attestParams, _hidl_cb); |
| 135 | } |
| 136 | |
| 137 | Return<void> upgradeKey(const hidl_vec<uint8_t>& keyBlobToUpgrade, |
| 138 | const hidl_vec<KeyParameter>& upgradeParams, |
| 139 | super::upgradeKey_cb _hidl_cb) override { |
| 140 | return super::upgradeKey(keyBlobToUpgrade, upgradeParams, _hidl_cb); |
| 141 | } |
| 142 | |
| 143 | Return<ErrorCode> deleteKey(const hidl_vec<uint8_t>& keyBlob) override { |
| 144 | return super::deleteKey(keyBlob); |
| 145 | } |
| 146 | |
| 147 | Return<ErrorCode> deleteAllKeys() override { return super::deleteAllKeys(); } |
| 148 | |
| 149 | Return<ErrorCode> destroyAttestationIds() override { return super::destroyAttestationIds(); } |
| 150 | |
| 151 | Return<void> begin(KeyPurpose purpose, const hidl_vec<uint8_t>& key, |
| 152 | const hidl_vec<KeyParameter>& inParams, const HardwareAuthToken& authToken, |
| 153 | super::begin_cb _hidl_cb) override { |
| 154 | return super::begin(purpose, key, inParams, authToken, _hidl_cb); |
| 155 | } |
| 156 | |
| 157 | Return<void> update(uint64_t operationHandle, const hidl_vec<KeyParameter>& inParams, |
| 158 | const hidl_vec<uint8_t>& input, const HardwareAuthToken& authToken, |
| 159 | const VerificationToken& verificationToken, |
| 160 | super::update_cb _hidl_cb) override { |
| 161 | return super::update(operationHandle, inParams, input, authToken, verificationToken, |
| 162 | _hidl_cb); |
| 163 | } |
| 164 | |
| 165 | Return<void> finish(uint64_t operationHandle, const hidl_vec<KeyParameter>& inParams, |
| 166 | const hidl_vec<uint8_t>& input, const hidl_vec<uint8_t>& signature, |
| 167 | const HardwareAuthToken& authToken, |
| 168 | const VerificationToken& verificationToken, |
| 169 | super::finish_cb _hidl_cb) override { |
| 170 | return super::finish(operationHandle, inParams, input, signature, authToken, |
| 171 | verificationToken, _hidl_cb); |
| 172 | } |
| 173 | |
| 174 | Return<ErrorCode> abort(uint64_t operationHandle) override { |
| 175 | return super::abort(operationHandle); |
| 176 | } |
| 177 | }; |
| 178 | |
| 179 | IKeymasterDevice* CreateKeymasterDevice(SecurityLevel securityLevel); |
| 180 | |
| 181 | } // namespace V4_1 |
| 182 | } // namespace keymaster |
| 183 | |
| 184 | #endif // HIDL_android_hardware_keymaster_V4_1_AndroidKeymaster4Device_H_ |