1use fuchsia_async::TimeoutExt as _;
6use futures::{TryFutureExt as _, TryStreamExt as _};
7use std::ffi::{CStr, CString};
8
9const DERIVED_KEY_SIZE: usize = 16;
11const KEY_INFO_SIZE: usize = 32;
12
13#[derive(Copy, Clone, Debug)]
14pub enum TaKeysafeCommand {
15 GetUserDataStorageKey = 8,
16 RotateHardwareDerivedKey = 9,
17}
18
19#[derive(Debug, thiserror::Error)]
21pub enum Error {
22 #[error("tee command {0:?} failed: {1}")]
23 TeeCommand(TaKeysafeCommand, u32),
24 #[error("tee command {0:?} failed: not supported")]
25 TeeCommandNotSupported(TaKeysafeCommand),
26 #[error(
27 "tee command {:?} failed: buffer with hardcoded size {} bytes was too small",
28 .0,
29 DERIVED_KEY_SIZE,
30 )]
31 TeeCommandBufferTooSmall(TaKeysafeCommand),
32 #[error("failed to open dev directory")]
33 DevDirectoryOpen(#[from] fuchsia_fs::node::OpenError),
34 #[error("timeout waiting for tee device")]
35 TeeDeviceWaitTimeout,
36 #[error("failure waiting for tee device")]
37 TeeDeviceWaitFailure(#[from] anyhow::Error),
38}
39
40pub struct KeyInfo {
42 info: [u8; KEY_INFO_SIZE],
43}
44
45impl KeyInfo {
46 pub fn new(info: impl ToString) -> Self {
48 Self::new_bytes(info.to_string().as_bytes())
49 }
50
51 pub fn new_zxcrypt() -> Self {
53 Self::new_bytes("zxcrypt".as_bytes())
54 }
55
56 fn new_bytes(info_bytes: &[u8]) -> Self {
57 let mut info = [0; KEY_INFO_SIZE];
58 info[..info_bytes.len()].copy_from_slice(info_bytes);
61 Self { info }
62 }
63}
64
65fn call_command(
66 device: Option<&CStr>,
67 op: &mut tee::TeecOperation,
68 id: TaKeysafeCommand,
69) -> Result<(), Error> {
70 match device {
71 Some(dev) => tee::call_command_on_device(dev, op, id as u32),
72 None => tee::call_command(op, id as u32),
73 }
74 .map_err(|e| match e {
75 tee::TEEC_ERROR_NOT_SUPPORTED => Error::TeeCommandNotSupported(id),
76 tee::TEEC_ERROR_SHORT_BUFFER => Error::TeeCommandBufferTooSmall(id),
77 e => Error::TeeCommand(id, e),
78 })
79}
80
81fn get_key_from_tee_device(device: Option<&CStr>, info: KeyInfo) -> Result<Vec<u8>, Error> {
82 let mut key_buf = [0u8; DERIVED_KEY_SIZE];
83
84 let mut op = tee::create_operation(
85 tee::teec_param_types(
86 tee::TEEC_MEMREF_TEMP_INPUT,
87 tee::TEEC_NONE,
88 tee::TEEC_NONE,
89 tee::TEEC_MEMREF_TEMP_OUTPUT,
90 ),
91 [
92 tee::get_memref_input_parameter(&info.info),
93 tee::get_zero_parameter(),
94 tee::get_zero_parameter(),
95 tee::get_memref_output_parameter(&mut key_buf),
96 ],
97 );
98
99 call_command(device, &mut op, TaKeysafeCommand::GetUserDataStorageKey)?;
100
101 Ok(key_buf.to_vec())
102}
103
104fn rotate_key_from_tee_device(device: Option<&CStr>, info: KeyInfo) -> Result<(), Error> {
105 let mut op = tee::create_operation(
106 tee::teec_param_types(
107 tee::TEEC_MEMREF_TEMP_INPUT,
108 tee::TEEC_NONE,
109 tee::TEEC_NONE,
110 tee::TEEC_NONE,
111 ),
112 [
113 tee::get_memref_input_parameter(&info.info),
114 tee::get_zero_parameter(),
115 tee::get_zero_parameter(),
116 tee::get_zero_parameter(),
117 ],
118 );
119
120 call_command(device, &mut op, TaKeysafeCommand::RotateHardwareDerivedKey)
121}
122
123pub async fn get_hardware_derived_key(info: KeyInfo) -> Result<Vec<u8>, Error> {
126 const DEV_CLASS_TEE: &str = "/dev/class/tee";
127
128 let dir = fuchsia_fs::directory::open_in_namespace(DEV_CLASS_TEE, fuchsia_fs::Flags::empty())?;
129 let mut stream = device_watcher::watch_for_files(&dir).await?;
130 let first = stream
131 .try_next()
132 .map_err(Error::from)
133 .on_timeout(std::time::Duration::from_secs(5), || Err(Error::TeeDeviceWaitTimeout))
134 .await?;
135 let first = first.ok_or_else(|| {
136 Error::TeeDeviceWaitFailure(anyhow::anyhow!(
137 "'{DEV_CLASS_TEE}' watcher closed unexpectedly"
138 ))
139 })?;
140 let first = first.to_str().expect("paths are utf-8");
141
142 let dev = format!("{DEV_CLASS_TEE}/{first}");
143 let dev = CString::new(dev).expect("paths do not contain nul bytes");
144 get_key_from_tee_device(Some(&dev), info)
145}
146
147pub async fn get_hardware_derived_key_from_service(info: KeyInfo) -> Result<Vec<u8>, Error> {
150 get_key_from_tee_device(None, info)
151}
152
153pub async fn rotate_hardware_derived_key(info: KeyInfo) -> Result<(), Error> {
156 const DEV_CLASS_TEE: &str = "/dev/class/tee";
157
158 let dir = fuchsia_fs::directory::open_in_namespace(DEV_CLASS_TEE, fuchsia_fs::Flags::empty())?;
159 let mut stream = device_watcher::watch_for_files(&dir).await?;
160 let first = stream
161 .try_next()
162 .map_err(Error::from)
163 .on_timeout(std::time::Duration::from_secs(5), || Err(Error::TeeDeviceWaitTimeout))
164 .await?;
165 let first = first.ok_or_else(|| {
166 Error::TeeDeviceWaitFailure(anyhow::anyhow!(
167 "'{DEV_CLASS_TEE}' watcher closed unexpectedly"
168 ))
169 })?;
170 let first = first.to_str().expect("paths are utf-8");
171
172 let dev = format!("{DEV_CLASS_TEE}/{first}");
173 let dev = CString::new(dev).expect("paths do not contain nul bytes");
174 rotate_key_from_tee_device(Some(&dev), info)
175}
176
177pub async fn rotate_hardware_derived_key_from_service(info: KeyInfo) -> Result<(), Error> {
180 rotate_key_from_tee_device(None, info)
181}