You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
108 lines
4.3 KiB
108 lines
4.3 KiB
/*
|
|
* Copyright (C) 2015 The Android Open Source Project
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*/
|
|
|
|
#ifndef KEYSTORE_KEYSTORE_KEYMASTER_ENFORCEMENT_H_
|
|
#define KEYSTORE_KEYSTORE_KEYMASTER_ENFORCEMENT_H_
|
|
|
|
#include <time.h>
|
|
|
|
#include "keymaster_enforcement.h"
|
|
|
|
namespace keystore {
|
|
/**
|
|
* This is a specialization of the KeymasterEnforcement class to be used by Keystore to enforce
|
|
* keymaster requirements on all key operation.
|
|
*/
|
|
class KeystoreKeymasterEnforcement : public KeymasterEnforcement {
|
|
public:
|
|
KeystoreKeymasterEnforcement() : KeymasterEnforcement(64, 64) {}
|
|
|
|
uint32_t get_current_time() const override {
|
|
struct timespec tp;
|
|
int err = clock_gettime(CLOCK_MONOTONIC, &tp);
|
|
if (err || tp.tv_sec < 0)
|
|
return 0;
|
|
return static_cast<uint32_t>(tp.tv_sec);
|
|
}
|
|
|
|
bool activation_date_valid(uint64_t activation_date) const override {
|
|
time_t now = time(nullptr);
|
|
if (now == static_cast<time_t>(-1)) {
|
|
// Failed to obtain current time -- fail safe: activation_date hasn't yet occurred.
|
|
return false;
|
|
} else if (now < 0) {
|
|
// Current time is prior to start of the epoch -- activation_date hasn't yet occurred.
|
|
return false;
|
|
}
|
|
|
|
// time(NULL) returns seconds since epoch and "loses" milliseconds information. We thus add
|
|
// 999 ms to now_date to avoid a situation where an activation_date of up to 999ms in the
|
|
// past may still be considered to still be in the future. This can be removed once
|
|
// time(NULL) is replaced by a millisecond-precise source of time.
|
|
uint64_t now_date = static_cast<uint64_t>(now) * 1000 + 999;
|
|
return now_date >= activation_date;
|
|
}
|
|
|
|
bool expiration_date_passed(uint64_t expiration_date) const override {
|
|
time_t now = time(nullptr);
|
|
if (now == static_cast<time_t>(-1)) {
|
|
// Failed to obtain current time -- fail safe: expiration_date has passed.
|
|
return true;
|
|
} else if (now < 0) {
|
|
// Current time is prior to start of the epoch: expiration_date hasn't yet occurred.
|
|
return false;
|
|
}
|
|
|
|
// time(NULL) returns seconds since epoch and "loses" milliseconds information. As a result,
|
|
// expiration_date of up to 999 ms in the past may still be considered in the future. This
|
|
// is OK.
|
|
uint64_t now_date = static_cast<uint64_t>(now) * 1000;
|
|
return now_date > expiration_date;
|
|
}
|
|
|
|
bool auth_token_timed_out(const HardwareAuthToken&, uint32_t) const {
|
|
// Assume the token has not timed out, because AuthTokenTable would not have returned it if
|
|
// the timeout were past. Secure hardware will also check timeouts if it supports them.
|
|
return false;
|
|
}
|
|
|
|
bool ValidateTokenSignature(const HardwareAuthToken&) const override {
|
|
// Non-secure world cannot validate token signatures because it doesn't have access to the
|
|
// signing key. Assume the token is good.
|
|
return true;
|
|
}
|
|
|
|
bool is_device_locked(int32_t userId) const override {
|
|
std::lock_guard<std::mutex> lock(is_device_locked_for_user_map_lock_);
|
|
// If we haven't had a set call for this user yet, assume the device is locked.
|
|
if (mIsDeviceLockedForUser.count(userId) == 0) return true;
|
|
return mIsDeviceLockedForUser.find(userId)->second;
|
|
}
|
|
|
|
void set_device_locked(bool isLocked, int32_t userId) {
|
|
std::lock_guard<std::mutex> lock(is_device_locked_for_user_map_lock_);
|
|
mIsDeviceLockedForUser[userId] = isLocked;
|
|
}
|
|
|
|
private:
|
|
mutable std::mutex is_device_locked_for_user_map_lock_;
|
|
std::map<int32_t, bool> mIsDeviceLockedForUser;
|
|
};
|
|
|
|
} // namespace keystore
|
|
|
|
#endif // KEYSTORE_KEYSTORE_KEYMASTER_ENFORCEMENT_H_
|