summaryrefslogtreecommitdiff
Diffstat
-rw-r--r--Android.mk20
-rw-r--r--GKPModule.cpp (renamed from module.cpp)26
-rw-r--r--soft/SoftGateKeeper.h182
-rw-r--r--soft/SoftGateKeeperDevice.cpp (copied from trusty_gatekeeper.cpp)147
-rw-r--r--soft/SoftGateKeeperDevice.h93
-rw-r--r--trusty/gatekeeper_ipc.h (renamed from gatekeeper_ipc.h)0
-rw-r--r--trusty/trusty_gatekeeper.cpp (renamed from trusty_gatekeeper.cpp)0
-rw-r--r--trusty/trusty_gatekeeper.h (renamed from trusty_gatekeeper.h)0
-rw-r--r--trusty/trusty_gatekeeper_ipc.c (renamed from trusty_gatekeeper_ipc.c)0
-rw-r--r--trusty/trusty_gatekeeper_ipc.h (renamed from trusty_gatekeeper_ipc.h)0
10 files changed, 354 insertions, 114 deletions
diff --git a/soft/SoftGateKeeperDevice.cpp b/soft/SoftGateKeeperDevice.cpp
new file mode 100644
index 0000000..ea52688
--- a/dev/null
+++ b/soft/SoftGateKeeperDevice.cpp
@@ -0,0 +1,175 @@
+/*
+ * Copyright (C) 2015 The Android Open Source Project
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+
+#include <assert.h>
+#include <errno.h>
+#include <stdio.h>
+#include "SoftGateKeeper.h"
+#include "SoftGateKeeperDevice.h"
+
+namespace android {
+
+SoftGateKeeperDevice::SoftGateKeeperDevice(const hw_module_t *module) {
+ assert(reinterpret_cast<gatekeeper_device_t *>(this) == &deviceSoft);
+ assert(reinterpret_cast<hw_device_t *>(this) == &(deviceSoft.common));
+
+ memset(&deviceSoft, 0, sizeof(deviceSoft));
+ deviceSoft.common.tag = HARDWARE_DEVICE_TAG;
+ deviceSoft.common.version = 1;
+ deviceSoft.common.module = const_cast<hw_module_t *>(module);
+ deviceSoft.common.close = close_device;
+
+ deviceSoft.enroll = enroll;
+ deviceSoft.verify = verify;
+ deviceSoft.delete_user = nullptr;
+ deviceSoft.delete_all_users = nullptr;
+
+ implSoft.reset(new SoftGateKeeper());
+}
+
+int SoftGateKeeperDevice::close_device(hw_device_t* dev) {
+ delete reinterpret_cast<SoftGateKeeperDevice *>(dev);
+ return 0;
+}
+
+SoftGateKeeperDevice::~SoftGateKeeperDevice() {
+
+}
+
+hw_device_t* SoftGateKeeperDevice::sw_device() {
+ return &deviceSoft.common;
+}
+
+int SoftGateKeeperDevice::Enroll(uint32_t uid,
+ const uint8_t *current_password_handle, uint32_t current_password_handle_length,
+ const uint8_t *current_password, uint32_t current_password_length,
+ const uint8_t *desired_password, uint32_t desired_password_length,
+ uint8_t **enrolled_password_handle, uint32_t *enrolled_password_handle_length) {
+
+ SizedBuffer desired_password_buffer(desired_password_length);
+ memcpy(desired_password_buffer.buffer.get(), desired_password, desired_password_length);
+
+ SizedBuffer current_password_handle_buffer(current_password_handle_length);
+ if (current_password_handle) {
+ memcpy(current_password_handle_buffer.buffer.get(), current_password_handle,
+ current_password_handle_length);
+ }
+
+ SizedBuffer current_password_buffer(current_password_length);
+ if (current_password) {
+ memcpy(current_password_buffer.buffer.get(), current_password, current_password_length);
+ }
+
+ EnrollRequest request(uid, &current_password_handle_buffer, &desired_password_buffer,
+ &current_password_buffer);
+ EnrollResponse response;
+
+ implSoft->Enroll(request, &response);
+
+ if (response.error == ERROR_RETRY) {
+ return response.retry_timeout;
+ } else if (response.error != ERROR_NONE) {
+ return -EINVAL;
+ }
+
+ *enrolled_password_handle = response.enrolled_password_handle.buffer.release();
+ *enrolled_password_handle_length = response.enrolled_password_handle.length;
+ return 0;
+}
+
+int SoftGateKeeperDevice::Verify(uint32_t uid,
+ uint64_t challenge, const uint8_t *enrolled_password_handle,
+ uint32_t enrolled_password_handle_length, const uint8_t *provided_password,
+ uint32_t provided_password_length, uint8_t **auth_token, uint32_t *auth_token_length,
+ bool *request_reenroll) {
+
+ SizedBuffer password_handle_buffer(enrolled_password_handle_length);
+ memcpy(password_handle_buffer.buffer.get(), enrolled_password_handle,
+ enrolled_password_handle_length);
+ SizedBuffer provided_password_buffer(provided_password_length);
+ memcpy(provided_password_buffer.buffer.get(), provided_password, provided_password_length);
+
+ VerifyRequest request(uid, challenge, &password_handle_buffer, &provided_password_buffer);
+ VerifyResponse response;
+
+ implSoft->Verify(request, &response);
+
+ if (response.error == ERROR_RETRY) {
+ return response.retry_timeout;
+ } else if (response.error != ERROR_NONE) {
+ return -EINVAL;
+ }
+
+ if (auth_token != NULL && auth_token_length != NULL) {
+ *auth_token = response.auth_token.buffer.release();
+ *auth_token_length = response.auth_token.length;
+ }
+
+ if (request_reenroll != NULL) {
+ *request_reenroll = response.request_reenroll;
+ }
+
+ return 0;
+}
+
+static inline SoftGateKeeperDevice *convert_device(const gatekeeper_device *dev) {
+ return reinterpret_cast<SoftGateKeeperDevice *>(const_cast<gatekeeper_device *>(dev));
+}
+
+/* static */
+int SoftGateKeeperDevice::enroll(const struct gatekeeper_device *dev, uint32_t uid,
+ const uint8_t *current_password_handle, uint32_t current_password_handle_length,
+ const uint8_t *current_password, uint32_t current_password_length,
+ const uint8_t *desired_password, uint32_t desired_password_length,
+ uint8_t **enrolled_password_handle, uint32_t *enrolled_password_handle_length) {
+
+ if (dev == NULL ||
+ enrolled_password_handle == NULL || enrolled_password_handle_length == NULL ||
+ desired_password == NULL || desired_password_length == 0)
+ return -EINVAL;
+
+ // Current password and current password handle go together
+ if (current_password_handle == NULL || current_password_handle_length == 0 ||
+ current_password == NULL || current_password_length == 0) {
+ current_password_handle = NULL;
+ current_password_handle_length = 0;
+ current_password = NULL;
+ current_password_length = 0;
+ }
+
+ return convert_device(dev)->Enroll(uid, current_password_handle, current_password_handle_length,
+ current_password, current_password_length, desired_password, desired_password_length,
+ enrolled_password_handle, enrolled_password_handle_length);
+
+}
+
+/* static */
+int SoftGateKeeperDevice::verify(const struct gatekeeper_device *dev, uint32_t uid,
+ uint64_t challenge, const uint8_t *enrolled_password_handle,
+ uint32_t enrolled_password_handle_length, const uint8_t *provided_password,
+ uint32_t provided_password_length, uint8_t **auth_token, uint32_t *auth_token_length,
+ bool *request_reenroll) {
+
+ if (dev == NULL || enrolled_password_handle == NULL ||
+ provided_password == NULL) {
+ return -EINVAL;
+ }
+
+ return convert_device(dev)->Verify(uid, challenge, enrolled_password_handle,
+ enrolled_password_handle_length, provided_password, provided_password_length,
+ auth_token, auth_token_length, request_reenroll);
+}
+} // namespace android