blob: eadb0d131961397059867f758913afe73bd83471 [file] [log] [blame] [edit]
/*
* Copyright (C) 2017 The Android Open Source Project
*
* Permission is hereby granted, free of charge, to any person
* obtaining a copy of this software and associated documentation
* files (the "Software"), to deal in the Software without
* restriction, including without limitation the rights to use, copy,
* modify, merge, publish, distribute, sublicense, and/or sell copies
* of the Software, and to permit persons to whom the Software is
* furnished to do so, subject to the following conditions:
*
* The above copyright notice and this permission notice shall be
* included in all copies or substantial portions of the Software.
*
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
* EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
* MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
* NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS
* BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN
* ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
* CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
* SOFTWARE.
*/
#ifndef TRUSTY_KEYMASTER_H_
#define TRUSTY_KEYMASTER_H_
#include <trusty/sysdeps.h>
#include <trusty/trusty_ipc.h>
#include <interface/keymaster/keymaster.h>
/*
* Initialize Keymaster TIPC client. Returns one of trusty_err.
*
* @dev: initialized with trusty_ipc_dev_create
*/
int km_tipc_init(struct trusty_ipc_dev *dev);
/*
* Shutdown Keymaster TIPC client.
*
* @dev: initialized with trusty_ipc_dev_create
*/
void km_tipc_shutdown(struct trusty_ipc_dev *dev);
/*
* Set Keymaster boot parameters. Returns one of trusty_err.
*
* @os_version: OS version from Android image header
* @os_patchlevel: OS patch level from Android image header
* @verified_boot_state: one of keymaster_verified_boot_t
* @device_locked: nonzero if device is locked
* @verified_boot_key_hash: hash of key used to verify Android image
* @verified_boot_key_hash_size: size of verified_boot_key_hash
* @verified_boot_hash: cumulative hash of all images verified thus far.
* May be NULL if not computed.
* @verified_boot_hash_size: size of verified_boot_hash
*/
int trusty_set_boot_params(uint32_t os_version, uint32_t os_patchlevel,
keymaster_verified_boot_t verified_boot_state,
bool device_locked,
const uint8_t *verified_boot_key_hash,
uint32_t verified_boot_key_hash_size,
const uint8_t *verified_boot_hash,
uint32_t verified_boot_hash_size);
/*
* Set Keymaster attestation key. Returns one of trusty_err.
*
* @key: buffer containing key
* @key_size: size of key in bytes
* @algorithm: one of KM_ALGORITHM_RSA or KM_ALGORITHM_EC
*/
int trusty_set_attestation_key(const uint8_t *key, uint32_t key_size,
keymaster_algorithm_t algorithm);
/*
* Append certificate to Keymaster attestation certificate chain. Returns
* one of trusty_err.
*
* @cert: buffer containing certificate
* @cert_size: size of certificate in bytes
* @algorithm: one of KM_ALGORITHM_RSA or KM_ALGORITHM_EC
*/
int trusty_append_attestation_cert_chain(const uint8_t *cert,
uint32_t cert_size,
keymaster_algorithm_t algorithm);
/*
* Reads a CA Request from Keymaster. On success allocates a new CA Request
* message at |*ca_request_p|, and the caller takes ownership. Returns one
* of trusty_err.
*
* @operation_start: Operation Start message
* @operation_start_size: size of operation_start
* @ca_request_p: location of newly allocated CA Request message
* @ca_request_size_p: location of size of the CA Request message
*/
int trusty_atap_get_ca_request(const uint8_t *operation_start,
uint32_t operation_start_size,
uint8_t** ca_request_p,
uint32_t* ca_request_size_p);
/*
* Sends the CA Response to Keymaster. Returns one of trusty_err.
*
* @ca_response: CA Response message
* @ca_response_size: size of ca_response
*/
int trusty_atap_set_ca_response(const uint8_t *ca_response,
uint32_t ca_response_size);
/*
* Reads the UUID from the certificate of the last provisioned attestation
* credentials as a c-string into |*uuid_p|. Caller takes ownership of
* |*uuid_p|. Returns one of trusty_err.
*
* @uuid_p: location of newly allocated UUID c-string
*/
int trusty_atap_read_uuid_str(char **uuid_p);
/*
* SetProductId is only called once to set the secure product id. Caller should
* read the product id from permanent attributes structure and set the product
* id while fusing the permanent attributes.
*
* @product_id: The product id to be set.
* @size: The size of the product id.
*/
int trusty_set_product_id(const uint8_t *product_id, uint32_t size);
#endif /* TRUSTY_KEYMASTER_H_ */