-
Notifications
You must be signed in to change notification settings - Fork 0
/
cryptfs_hw.cpp
126 lines (115 loc) · 4.05 KB
/
cryptfs_hw.cpp
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
/* Copyright (c) 2014, 2017, 2019 The Linux Foundation. All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions are
* met:
* * Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* * Redistributions in binary form must reproduce the above
* copyright notice, this list of conditions and the following
* disclaimer in the documentation and/or other materials provided
* with the distribution.
* * Neither the name of The Linux Foundation nor the names of its
* contributors may be used to endorse or promote products derived
* from this software without specific prior written permission.
*
* THIS SOFTWARE IS PROVIDED "AS IS" AND ANY EXPRESS OR IMPLIED
* WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
* MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT
* ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS
* BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
* CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
* SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
* BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
* WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
* OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
* IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
*/
#include <stdlib.h>
#include <string.h>
#include <sys/types.h>
#include <sys/stat.h>
#include <fcntl.h>
#include <errno.h>
#include "cutils/log.h"
#include "cutils/properties.h"
#include "cryptfs_hw.h"
#include "CryptfsHw.h"
using android::sp;
using vendor::qti::hardware::cryptfshw::V1_0::ICryptfsHw;
using ::android::hardware::Return;
using ::android::hardware::Void;
#define QTI_ICE_STORAGE_UFS 1
#define QTI_ICE_STORAGE_SDCC 2
int set_ice_param(int flag)
{
int rc = -1;
sp<ICryptfsHw> cryptfshwService = ICryptfsHw::getService();
if (cryptfshwService.get() == nullptr) {
ALOGE("Failed to get Cryptfshw service");
return rc;
}
rc = cryptfshwService->setIceParam(flag);
return rc;
}
int set_hw_device_encryption_key(const char* passwd, const char* enc_mode)
{
int rc = -1;
sp<ICryptfsHw> cryptfshwService = ICryptfsHw::getService();
if (cryptfshwService.get() == nullptr) {
ALOGE("Failed to get Cryptfshw service");
return rc;
}
rc = cryptfshwService->setKey(passwd, enc_mode);
return rc;
}
int update_hw_device_encryption_key(const char* oldpw, const char* newpw, const char* enc_mode)
{
int rc = -1;
sp<ICryptfsHw> cryptfshwService = ICryptfsHw::getService();
if (cryptfshwService.get() == nullptr) {
ALOGE("Failed to get Cryptfshw service");
return rc;
}
rc = cryptfshwService->updateKey(oldpw, newpw, enc_mode);
return rc;
}
unsigned int is_hw_disk_encryption(const char* encryption_mode)
{
int ret = 0;
if(encryption_mode) {
if (!strcmp(encryption_mode, "aes-xts")) {
SLOGD("HW based disk encryption is enabled \n");
ret = 1;
}
}
return ret;
}
int is_ice_enabled(void)
{
char prop_storage[PATH_MAX];
int storage_type = 0;
if (property_get("ro.boot.bootdevice", prop_storage, "")) {
if (strstr(prop_storage, "ufs")) {
/* All UFS based devices has ICE in it. So we dont need
* to check if corresponding device exists or not
*/
storage_type = QTI_ICE_STORAGE_UFS;
} else if (strstr(prop_storage, "sdhc")) {
if (access("/dev/icesdcc", F_OK) != -1)
storage_type = QTI_ICE_STORAGE_SDCC;
}
}
return storage_type;
}
int clear_hw_device_encryption_key()
{
int rc = -1;
sp<ICryptfsHw> cryptfshwService = ICryptfsHw::getService();
if (cryptfshwService.get() == nullptr) {
ALOGE("Failed to get Cryptfshw service");
return rc;
}
rc = cryptfshwService->clearKey();
return rc;
}