blob: a936809426c94177a4f44f7801152a67b6b69df9 [file] [log] [blame]
/*
* Copyright (C) 2015 The Android Open Source Project
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include <assert.h>
#include <lk/list.h> // for containerof
#include <stdlib.h>
#include <string.h>
#include <uapi/err.h>
#include <interface/storage/storage.h>
#include <lib/hwkey/hwkey.h>
#include "ipc.h"
#include "rpmb.h"
#include "session.h"
#define SS_ERR(args...) fprintf(stderr, "ss: " args)
static void proxy_disconnect(struct ipc_channel_context* ctx);
static struct storage_session* proxy_context_to_session(
struct ipc_channel_context* context) {
assert(context != NULL);
struct storage_session* session =
containerof(context, struct storage_session, proxy_ctx);
assert(session->magic == STORAGE_SESSION_MAGIC);
return session;
}
static int get_storage_encryption_key(hwkey_session_t session,
uint8_t* key,
uint32_t key_size) {
static const struct key storage_key_derivation_data = {
.byte = {
0xbc, 0x10, 0x6c, 0x9e, 0xc1, 0xa4, 0x71, 0x04,
0x83, 0xab, 0x03, 0x4b, 0x75, 0x8a, 0xb3, 0x5e,
0xfb, 0xe5, 0x43, 0x6c, 0xe6, 0x74, 0xb7, 0xfc,
0xee, 0x20, 0xad, 0xae, 0xfb, 0x34, 0xab, 0xd3,
}};
if (key_size != sizeof(storage_key_derivation_data.byte)) {
return ERR_BAD_LEN;
}
uint32_t kdf_version = HWKEY_KDF_VERSION_1;
int rc = hwkey_derive(session, &kdf_version,
storage_key_derivation_data.byte, key, key_size);
if (rc < 0) {
SS_ERR("%s: failed to get key: %d\n", __func__, rc);
return rc;
}
return NO_ERROR;
}
#if !WITH_HKDF_RPMB_KEY
static int get_rpmb_auth_key(hwkey_session_t session,
uint8_t* key,
uint32_t key_size) {
const char* storage_auth_key_id = "com.android.trusty.storage_auth.rpmb";
int rc = hwkey_get_keyslot_data(session, storage_auth_key_id, key,
&key_size);
if (rc < 0) {
SS_ERR("%s: failed to get key: %d\n", __func__, rc);
return rc;
}
return NO_ERROR;
}
#endif
struct ipc_channel_context* proxy_connect(struct ipc_port_context* parent_ctx,
const uuid_t* peer_uuid,
handle_t chan_handle) {
struct rpmb_key* rpmb_key_ptr = NULL;
int rc;
struct storage_session* session = calloc(1, sizeof(*session));
if (session == NULL) {
SS_ERR("%s: out of memory\n", __func__);
goto err_alloc_session;
}
session->magic = STORAGE_SESSION_MAGIC;
rc = hwkey_open();
if (rc < 0) {
SS_ERR("%s: hwkey init failed: %d\n", __func__, rc);
goto err_hwkey_open;
}
hwkey_session_t hwkey_session = (hwkey_session_t)rc;
/* Generate encryption key */
rc = get_storage_encryption_key(hwkey_session, session->key.byte,
sizeof(session->key));
if (rc < 0) {
SS_ERR("%s: can't get storage key: (%d) \n", __func__, rc);
goto err_get_storage_key;
}
/* Init RPMB key */
#if !WITH_HKDF_RPMB_KEY
struct rpmb_key rpmb_key;
rc = get_rpmb_auth_key(hwkey_session, rpmb_key.byte, sizeof(rpmb_key.byte));
if (rc < 0) {
SS_ERR("%s: can't get storage auth key: (%d)\n", __func__, rc);
goto err_get_rpmb_key;
}
rpmb_key_ptr = &rpmb_key;
#endif
rc = block_device_tipc_init(&session->block_device, chan_handle,
&session->key, rpmb_key_ptr, hwkey_session);
if (rc < 0) {
SS_ERR("%s: block_device_tipc_init failed (%d)\n", __func__, rc);
goto err_init_block_device;
}
session->proxy_ctx.ops.on_disconnect = proxy_disconnect;
hwkey_close(hwkey_session);
return &session->proxy_ctx;
err_init_block_device:
#if !WITH_HKDF_RPMB_KEY
err_get_rpmb_key:
#endif
err_get_storage_key:
hwkey_close(hwkey_session);
err_hwkey_open:
free(session);
err_alloc_session:
return NULL;
}
void proxy_disconnect(struct ipc_channel_context* ctx) {
struct storage_session* session = proxy_context_to_session(ctx);
block_device_tipc_uninit(&session->block_device);
free(session);
}