286 lines
11 KiB
C++
286 lines
11 KiB
C++
/*
|
|
* Copyright (C) 2015 The Android Open Source Project
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*/
|
|
|
|
#ifndef KEYSTORE_BLOB_H_
|
|
#define KEYSTORE_BLOB_H_
|
|
|
|
#include <stdint.h>
|
|
|
|
#include <openssl/aes.h>
|
|
#include <openssl/md5.h>
|
|
|
|
#include <condition_variable>
|
|
#include <functional>
|
|
#include <keystore/keymaster_types.h>
|
|
#include <keystore/keystore.h>
|
|
#include <list>
|
|
#include <mutex>
|
|
#include <set>
|
|
#include <sstream>
|
|
#include <vector>
|
|
|
|
constexpr size_t kValueSize = 32768;
|
|
constexpr size_t kAesKeySize = 128 / 8;
|
|
constexpr size_t kGcmTagLength = 128 / 8;
|
|
constexpr size_t kGcmIvLength = 96 / 8;
|
|
constexpr size_t kAes128KeySizeBytes = 128 / 8;
|
|
constexpr size_t kAes256KeySizeBytes = 256 / 8;
|
|
|
|
/* Here is the file format. There are two parts in blob.value, the secret and
|
|
* the description. The secret is stored in ciphertext, and its original size
|
|
* can be found in blob.length. The description is stored after the secret in
|
|
* plaintext, and its size is specified in blob.info. The total size of the two
|
|
* parts must be no more than kValueSize bytes. The first field is the version,
|
|
* the second is the blob's type, and the third byte is flags. Fields other
|
|
* than blob.info, blob.length, and blob.value are modified by encryptBlob()
|
|
* and decryptBlob(). Thus they should not be accessed from outside. */
|
|
|
|
struct __attribute__((packed)) blobv3 {
|
|
uint8_t version;
|
|
uint8_t type;
|
|
uint8_t flags;
|
|
uint8_t info;
|
|
uint8_t initialization_vector[AES_BLOCK_SIZE]; // Only 96 bits is used, rest is zeroed.
|
|
uint8_t aead_tag[kGcmTagLength];
|
|
int32_t length; // in network byte order, only for backward compatibility
|
|
uint8_t value[kValueSize + AES_BLOCK_SIZE];
|
|
};
|
|
|
|
struct __attribute__((packed)) blobv2 {
|
|
uint8_t version;
|
|
uint8_t type;
|
|
uint8_t flags;
|
|
uint8_t info;
|
|
uint8_t vector[AES_BLOCK_SIZE];
|
|
uint8_t encrypted[0]; // Marks offset to encrypted data.
|
|
uint8_t digest[MD5_DIGEST_LENGTH];
|
|
uint8_t digested[0]; // Marks offset to digested data.
|
|
int32_t length; // in network byte order
|
|
uint8_t value[kValueSize + AES_BLOCK_SIZE];
|
|
};
|
|
|
|
static_assert(sizeof(blobv3) == sizeof(blobv2) &&
|
|
offsetof(blobv3, initialization_vector) == offsetof(blobv2, vector) &&
|
|
offsetof(blobv3, aead_tag) == offsetof(blobv2, digest) &&
|
|
offsetof(blobv3, aead_tag) == offsetof(blobv2, encrypted) &&
|
|
offsetof(blobv3, length) == offsetof(blobv2, length) &&
|
|
offsetof(blobv3, value) == offsetof(blobv2, value),
|
|
"Oops. Blob layout changed.");
|
|
|
|
static const uint8_t CURRENT_BLOB_VERSION = 3;
|
|
|
|
typedef enum {
|
|
TYPE_ANY = 0, // meta type that matches anything
|
|
TYPE_GENERIC = 1,
|
|
TYPE_MASTER_KEY = 2,
|
|
TYPE_KEY_PAIR = 3,
|
|
TYPE_KEYMASTER_10 = 4,
|
|
TYPE_KEY_CHARACTERISTICS = 5,
|
|
TYPE_KEY_CHARACTERISTICS_CACHE = 6,
|
|
TYPE_MASTER_KEY_AES256 = 7,
|
|
} BlobType;
|
|
|
|
class LockedKeyBlobEntry;
|
|
|
|
/**
|
|
* The Blob represents the content of a KeyBlobEntry.
|
|
*
|
|
* BEWARE: It is only save to call any member function of a Blob b if bool(b) yields true.
|
|
* Exceptions are putKeyCharacteristics(), the assignment operators and operator bool.
|
|
*/
|
|
class Blob {
|
|
friend LockedKeyBlobEntry;
|
|
|
|
public:
|
|
Blob(const uint8_t* value, size_t valueLength, const uint8_t* info, uint8_t infoLength,
|
|
BlobType type);
|
|
explicit Blob(blobv3 b);
|
|
Blob();
|
|
Blob(const Blob& rhs);
|
|
Blob(Blob&& rhs);
|
|
|
|
~Blob() {
|
|
if (mBlob) *mBlob = {};
|
|
}
|
|
|
|
Blob& operator=(const Blob& rhs);
|
|
Blob& operator=(Blob&& rhs);
|
|
explicit operator bool() const { return bool(mBlob); }
|
|
|
|
const uint8_t* getValue() const { return mBlob->value; }
|
|
|
|
int32_t getLength() const { return mBlob->length; }
|
|
|
|
const uint8_t* getInfo() const { return mBlob->value + mBlob->length; }
|
|
uint8_t getInfoLength() const { return mBlob->info; }
|
|
|
|
uint8_t getVersion() const { return mBlob->version; }
|
|
|
|
bool isEncrypted() const;
|
|
void setEncrypted(bool encrypted);
|
|
|
|
bool isSuperEncrypted() const;
|
|
void setSuperEncrypted(bool superEncrypted);
|
|
|
|
bool isCriticalToDeviceEncryption() const;
|
|
void setCriticalToDeviceEncryption(bool critical);
|
|
|
|
bool isFallback() const { return mBlob->flags & KEYSTORE_FLAG_FALLBACK; }
|
|
void setFallback(bool fallback);
|
|
|
|
void setVersion(uint8_t version) { mBlob->version = version; }
|
|
BlobType getType() const { return BlobType(mBlob->type); }
|
|
void setType(BlobType type) { mBlob->type = uint8_t(type); }
|
|
|
|
keystore::SecurityLevel getSecurityLevel() const;
|
|
void setSecurityLevel(keystore::SecurityLevel);
|
|
|
|
std::tuple<bool, keystore::AuthorizationSet, keystore::AuthorizationSet>
|
|
getKeyCharacteristics() const;
|
|
|
|
bool putKeyCharacteristics(const keystore::AuthorizationSet& hwEnforced,
|
|
const keystore::AuthorizationSet& swEnforced);
|
|
|
|
private:
|
|
std::unique_ptr<blobv3> mBlob;
|
|
|
|
ResponseCode readBlob(const std::string& filename, const std::vector<uint8_t>& aes_key,
|
|
State state);
|
|
};
|
|
|
|
/**
|
|
* A KeyBlobEntry represents a full qualified key blob as known by Keystore. The key blob
|
|
* is given by the uid of the owning app and the alias used by the app to refer to this key.
|
|
* The user_dir_ is technically implied by the uid, but computation of the user directory is
|
|
* done in the user state database. Which is why we also cache it here.
|
|
*
|
|
* The KeyBlobEntry knows the location of the key blob files (which may include a characteristics
|
|
* cache file) but does not allow read or write access to the content. It also does not imply
|
|
* the existence of the files.
|
|
*
|
|
* KeyBlobEntry abstracts, to some extent, from the the file system based storage of key blobs.
|
|
* An evolution of KeyBlobEntry may be used for key blob storage based on a back end other than
|
|
* file system, e.g., SQL database or other.
|
|
*
|
|
* For access to the key blob content the programmer has to acquire a LockedKeyBlobEntry (see
|
|
* below).
|
|
*/
|
|
class KeyBlobEntry {
|
|
private:
|
|
std::string alias_;
|
|
std::string user_dir_;
|
|
uid_t uid_;
|
|
bool masterkey_;
|
|
|
|
public:
|
|
KeyBlobEntry(std::string alias, std::string user_dir, uid_t uid, bool masterkey = false)
|
|
: alias_(std::move(alias)), user_dir_(std::move(user_dir)), uid_(uid),
|
|
masterkey_(masterkey) {}
|
|
|
|
std::string getKeyBlobBaseName() const;
|
|
std::string getKeyBlobPath() const;
|
|
|
|
std::string getCharacteristicsBlobBaseName() const;
|
|
std::string getCharacteristicsBlobPath() const;
|
|
|
|
bool hasKeyBlob() const;
|
|
bool hasCharacteristicsBlob() const;
|
|
|
|
bool operator<(const KeyBlobEntry& rhs) const {
|
|
return std::tie(uid_, alias_, user_dir_) < std::tie(rhs.uid_, rhs.alias_, rhs.user_dir_);
|
|
}
|
|
bool operator==(const KeyBlobEntry& rhs) const {
|
|
return std::tie(uid_, alias_, user_dir_) == std::tie(rhs.uid_, rhs.alias_, rhs.user_dir_);
|
|
}
|
|
bool operator!=(const KeyBlobEntry& rhs) const { return !(*this == rhs); }
|
|
|
|
inline const std::string& alias() const { return alias_; }
|
|
inline const std::string& user_dir() const { return user_dir_; }
|
|
inline uid_t uid() const { return uid_; }
|
|
};
|
|
|
|
/**
|
|
* The LockedKeyBlobEntry is a proxy object to KeyBlobEntry that expresses exclusive ownership
|
|
* of a KeyBlobEntry. LockedKeyBlobEntries can be acquired by calling
|
|
* LockedKeyBlobEntry::get() or LockedKeyBlobEntry::list().
|
|
*
|
|
* LockedKeyBlobEntries are movable but not copyable. By convention they can only
|
|
* be taken by the dispatcher thread of keystore, but not by any keymaster worker thread.
|
|
* The dispatcher thread may transfer ownership of a locked entry to a keymaster worker thread.
|
|
*
|
|
* Locked entries are tracked on the stack or as members of movable functor objects passed to the
|
|
* keymaster worker request queues. Locks are relinquished as the locked entry gets destroyed, e.g.,
|
|
* when it goes out of scope or when the owning request functor gets destroyed.
|
|
*
|
|
* LockedKeyBlobEntry::list(), which must only be called by the dispatcher, blocks until all
|
|
* LockedKeyBlobEntries have been destroyed. Thereby list acts as a fence to make sure it gets a
|
|
* consistent view of the key blob database. Under the assumption that keymaster worker requests
|
|
* cannot run or block indefinitely and cannot grab new locked entries, progress is guaranteed.
|
|
* It then grabs locked entries in accordance with the given filter rule.
|
|
*
|
|
* LockedKeyBlobEntry allow access to the proxied KeyBlobEntry interface through the operator->.
|
|
* They add additional functionality to access and modify the key blob's content on disk.
|
|
* LockedKeyBlobEntry ensures atomic operations on the persistently stored key blobs on a per
|
|
* entry granularity.
|
|
*/
|
|
class LockedKeyBlobEntry {
|
|
private:
|
|
static std::set<KeyBlobEntry> locked_blobs_;
|
|
static std::mutex locked_blobs_mutex_;
|
|
static std::condition_variable locked_blobs_mutex_cond_var_;
|
|
|
|
const KeyBlobEntry* entry_;
|
|
// NOLINTNEXTLINE(google-explicit-constructor)
|
|
LockedKeyBlobEntry(const KeyBlobEntry& entry) : entry_(&entry) {}
|
|
|
|
static void put(const KeyBlobEntry& entry);
|
|
LockedKeyBlobEntry(const LockedKeyBlobEntry&) = delete;
|
|
LockedKeyBlobEntry& operator=(const LockedKeyBlobEntry&) = delete;
|
|
|
|
public:
|
|
LockedKeyBlobEntry() : entry_(nullptr){};
|
|
~LockedKeyBlobEntry();
|
|
LockedKeyBlobEntry(LockedKeyBlobEntry&& rhs) : entry_(rhs.entry_) { rhs.entry_ = nullptr; }
|
|
LockedKeyBlobEntry& operator=(LockedKeyBlobEntry&& rhs) {
|
|
// as dummy goes out of scope it relinquishes the lock on this
|
|
LockedKeyBlobEntry dummy(std::move(*this));
|
|
entry_ = rhs.entry_;
|
|
rhs.entry_ = nullptr;
|
|
return *this;
|
|
}
|
|
static LockedKeyBlobEntry get(KeyBlobEntry entry);
|
|
static std::tuple<ResponseCode, std::list<LockedKeyBlobEntry>>
|
|
list(const std::string& user_dir,
|
|
std::function<bool(uid_t, const std::string&)> filter =
|
|
[](uid_t, const std::string&) -> bool { return true; });
|
|
|
|
ResponseCode writeBlobs(Blob keyBlob, Blob characteristicsBlob,
|
|
const std::vector<uint8_t>& aes_key, State state) const;
|
|
std::tuple<ResponseCode, Blob, Blob> readBlobs(const std::vector<uint8_t>& aes_key,
|
|
State state) const;
|
|
ResponseCode deleteBlobs() const;
|
|
|
|
inline explicit operator bool() const { return entry_ != nullptr; }
|
|
inline const KeyBlobEntry& operator*() const { return *entry_; }
|
|
inline const KeyBlobEntry* operator->() const { return entry_; }
|
|
};
|
|
|
|
// Visible for testing
|
|
std::string encodeKeyName(const std::string& keyName);
|
|
std::string decodeKeyName(const std::string& encodedName);
|
|
|
|
#endif // KEYSTORE_BLOB_H_
|