blob: 3a4b5129dac5adb17e21ca35afe88415d68db212 [file] [log] [blame]
Shawn Willden8ae41b52019-10-28 12:54:16 -06001/*
2 **
3 ** Copyright 2019, The Android Open Source Project
4 **
5 ** Licensed under the Apache License, Version 2.0 (the "License");
6 ** you may not use this file except in compliance with the License.
7 ** You may obtain a copy of the License at
8 **
9 ** http://www.apache.org/licenses/LICENSE-2.0
10 **
11 ** Unless required by applicable law or agreed to in writing, software
12 ** distributed under the License is distributed on an "AS IS" BASIS,
13 ** WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14 ** See the License for the specific language governing permissions and
15 ** limitations under the License.
16 */
17
18#ifndef HIDL_android_hardware_keymaster_V4_1_AndroidKeymaster4Device_H_
19#define HIDL_android_hardware_keymaster_V4_1_AndroidKeymaster4Device_H_
20
21#include <android/hardware/keymaster/4.1/IKeymasterDevice.h>
22#include <android/hardware/keymaster/4.1/types.h>
23#include <hidl/Status.h>
24
25#include "AndroidKeymaster4Device.h"
26
27namespace keymaster {
28class AndroidKeymaster;
29class KeymasterContext;
30
31namespace V4_1 {
32
33using ::android::hardware::hidl_vec;
34using ::android::hardware::Return;
35using ::android::hardware::Void;
36
37using ::android::hardware::keymaster::V4_0::ErrorCode;
38using ::android::hardware::keymaster::V4_0::HardwareAuthenticatorType;
39using ::android::hardware::keymaster::V4_0::HardwareAuthToken;
40using ::android::hardware::keymaster::V4_0::HmacSharingParameters;
41using ::android::hardware::keymaster::V4_0::KeyCharacteristics;
42using ::android::hardware::keymaster::V4_0::KeyFormat;
43using ::android::hardware::keymaster::V4_0::KeyParameter;
44using ::android::hardware::keymaster::V4_0::KeyPurpose;
45using ::android::hardware::keymaster::V4_0::OperationHandle;
46using ::android::hardware::keymaster::V4_0::SecurityLevel;
47using ::android::hardware::keymaster::V4_0::VerificationToken;
48using ::android::hardware::keymaster::V4_1::IKeymasterDevice;
Shawn Willden8ae41b52019-10-28 12:54:16 -060049using ::android::hardware::keymaster::V4_1::Tag;
50
Shawn Willden320aed22020-01-15 14:49:15 -070051using V41ErrorCode = ::android::hardware::keymaster::V4_1::ErrorCode;
52
Shawn Willden9a3792e2021-04-08 09:38:14 -060053inline V41ErrorCode convert(ErrorCode error_code) {
Shawn Willden320aed22020-01-15 14:49:15 -070054 return static_cast<V41ErrorCode>(error_code);
55}
56
Shawn Willden9a3792e2021-04-08 09:38:14 -060057inline ErrorCode convert(V41ErrorCode error_code) {
Shawn Willden320aed22020-01-15 14:49:15 -070058 return static_cast<ErrorCode>(error_code);
59}
60
Shawn Willden8ae41b52019-10-28 12:54:16 -060061class AndroidKeymaster41Device : public IKeymasterDevice, public V4_0::ng::AndroidKeymaster4Device {
62 using super = V4_0::ng::AndroidKeymaster4Device;
63
64 public:
Shawn Willden6daf9842020-11-19 10:11:47 -070065 explicit AndroidKeymaster41Device(SecurityLevel securityLevel)
66 : super(KmVersion::KEYMASTER_4_1, securityLevel) {}
Shawn Willden8ae41b52019-10-28 12:54:16 -060067 virtual ~AndroidKeymaster41Device() {}
68
Shawn Willden320aed22020-01-15 14:49:15 -070069 Return<V41ErrorCode> deviceLocked(bool /* passwordOnly */,
Shawn Willdenda495752020-01-15 17:46:30 -070070 const VerificationToken& /* verificationToken */) override;
71 Return<V41ErrorCode> earlyBootEnded() override;
Shawn Willden8ae41b52019-10-28 12:54:16 -060072
Shawn Willden8ae41b52019-10-28 12:54:16 -060073 Return<void> getHardwareInfo(super::getHardwareInfo_cb _hidl_cb) override {
74 return super::getHardwareInfo(_hidl_cb);
75 }
76
77 Return<void> getHmacSharingParameters(super::getHmacSharingParameters_cb _hidl_cb) override {
78 return super::getHmacSharingParameters(_hidl_cb);
79 }
80
81 Return<void> computeSharedHmac(const hidl_vec<HmacSharingParameters>& params,
82 super::computeSharedHmac_cb _hidl_cb) override {
83 return super::computeSharedHmac(params, _hidl_cb);
84 }
85
86 Return<void> verifyAuthorization(uint64_t challenge,
87 const hidl_vec<KeyParameter>& parametersToVerify,
88 const HardwareAuthToken& authToken,
89 super::verifyAuthorization_cb _hidl_cb) override {
90 return super::verifyAuthorization(challenge, parametersToVerify, authToken, _hidl_cb);
91 }
92
93 Return<ErrorCode> addRngEntropy(const hidl_vec<uint8_t>& data) override {
94 return super::addRngEntropy(data);
95 }
96
97 Return<void> generateKey(const hidl_vec<KeyParameter>& keyParams,
98 super::generateKey_cb _hidl_cb) override {
99 return super::generateKey(keyParams, _hidl_cb);
100 }
101
102 Return<void> getKeyCharacteristics(const hidl_vec<uint8_t>& keyBlob,
103 const hidl_vec<uint8_t>& clientId,
104 const hidl_vec<uint8_t>& appData,
105 super::getKeyCharacteristics_cb _hidl_cb) override {
106 return super::getKeyCharacteristics(keyBlob, clientId, appData, _hidl_cb);
107 }
108
109 Return<void> importKey(const hidl_vec<KeyParameter>& params, KeyFormat keyFormat,
110 const hidl_vec<uint8_t>& keyData,
111 super::importKey_cb _hidl_cb) override {
112 return super::importKey(params, keyFormat, keyData, _hidl_cb);
113 }
114
115 Return<void> importWrappedKey(const hidl_vec<uint8_t>& wrappedKeyData,
116 const hidl_vec<uint8_t>& wrappingKeyBlob,
117 const hidl_vec<uint8_t>& maskingKey,
118 const hidl_vec<KeyParameter>& unwrappingParams,
119 uint64_t passwordSid, uint64_t biometricSid,
120 super::importWrappedKey_cb _hidl_cb) override {
121 return super::importWrappedKey(wrappedKeyData, wrappingKeyBlob, maskingKey,
122 unwrappingParams, passwordSid, biometricSid, _hidl_cb);
123 }
124
125 Return<void> exportKey(KeyFormat exportFormat, const hidl_vec<uint8_t>& keyBlob,
126 const hidl_vec<uint8_t>& clientId, const hidl_vec<uint8_t>& appData,
127 super::exportKey_cb _hidl_cb) override {
128 return super::exportKey(exportFormat, keyBlob, clientId, appData, _hidl_cb);
129 }
130
131 Return<void> attestKey(const hidl_vec<uint8_t>& keyToAttest,
132 const hidl_vec<KeyParameter>& attestParams,
133 super::attestKey_cb _hidl_cb) override {
134 return super::attestKey(keyToAttest, attestParams, _hidl_cb);
135 }
136
137 Return<void> upgradeKey(const hidl_vec<uint8_t>& keyBlobToUpgrade,
138 const hidl_vec<KeyParameter>& upgradeParams,
139 super::upgradeKey_cb _hidl_cb) override {
140 return super::upgradeKey(keyBlobToUpgrade, upgradeParams, _hidl_cb);
141 }
142
143 Return<ErrorCode> deleteKey(const hidl_vec<uint8_t>& keyBlob) override {
144 return super::deleteKey(keyBlob);
145 }
146
147 Return<ErrorCode> deleteAllKeys() override { return super::deleteAllKeys(); }
148
149 Return<ErrorCode> destroyAttestationIds() override { return super::destroyAttestationIds(); }
150
151 Return<void> begin(KeyPurpose purpose, const hidl_vec<uint8_t>& key,
152 const hidl_vec<KeyParameter>& inParams, const HardwareAuthToken& authToken,
153 super::begin_cb _hidl_cb) override {
154 return super::begin(purpose, key, inParams, authToken, _hidl_cb);
155 }
156
157 Return<void> update(uint64_t operationHandle, const hidl_vec<KeyParameter>& inParams,
158 const hidl_vec<uint8_t>& input, const HardwareAuthToken& authToken,
159 const VerificationToken& verificationToken,
160 super::update_cb _hidl_cb) override {
161 return super::update(operationHandle, inParams, input, authToken, verificationToken,
162 _hidl_cb);
163 }
164
165 Return<void> finish(uint64_t operationHandle, const hidl_vec<KeyParameter>& inParams,
166 const hidl_vec<uint8_t>& input, const hidl_vec<uint8_t>& signature,
167 const HardwareAuthToken& authToken,
168 const VerificationToken& verificationToken,
169 super::finish_cb _hidl_cb) override {
170 return super::finish(operationHandle, inParams, input, signature, authToken,
171 verificationToken, _hidl_cb);
172 }
173
174 Return<ErrorCode> abort(uint64_t operationHandle) override {
175 return super::abort(operationHandle);
176 }
177};
178
179IKeymasterDevice* CreateKeymasterDevice(SecurityLevel securityLevel);
180
181} // namespace V4_1
182} // namespace keymaster
183
184#endif // HIDL_android_hardware_keymaster_V4_1_AndroidKeymaster4Device_H_