Go to file
mamingshuai 2cf21e46f4
!1 添加老仓废弃说明
Merge pull request !1 from 何寅燊/master
废弃仓修改readme, 手工合入
2022-06-25 10:31:13 +00:00
common_lib Fix codex. 2022-04-28 22:55:23 +08:00
default_config add identical account for deviceauth 2022-04-26 04:33:31 +08:00
deps_adapter !228 【OpenHarmony开源贡献者计划2022】Fix build warnings 2022-06-07 16:00:28 +00:00
figures change readme ZN 2022-03-17 14:27:41 +08:00
frameworks !236 Add selinux of deviceauth 2022-05-31 03:48:39 +00:00
interfaces/innerkits support asysmetric credential 2022-05-30 20:53:00 +08:00
services change purpose for P256 key agree 2022-06-07 11:13:50 +08:00
test !235 support asymetric credential 2022-05-30 14:32:32 +00:00
.gitattributes update OpenHarmony 2.0 Canary 2021-06-02 02:56:04 +08:00
BUILD.gn Modify fuzz. 2022-05-27 21:49:13 +08:00
bundle.json adapt L0-L1 to bundle.json 2022-03-14 16:16:15 +08:00
deviceauth_env.gni deviceauth enable soft bus in mini system 2022-02-09 10:15:50 +08:00
LICENSE update OpenHarmony 2.0 Canary 2021-06-02 02:56:04 +08:00
README_zh.md Add notice for deprecated repository 2022-06-25 17:11:44 +08:00
README.md Add notice for deprecated repository 2022-06-25 17:11:44 +08:00

Notice

This repository has been deprecated due to repository rename. Access security_device_auth instead to obtain the latest code and capabilities.

deviceauth

Introduction

The device authentication module belongs to the security subsystem of OpenHarmony. It manages the entire lifecycle of trust relationships between devices, including establishment, maintenance, use, and cancellation, and implements authentication and secure session key exchange between trusted devices. It provides basic capabilities for trusted interconnections between devices that run OpenHarmony.

The device authentication module provides the following capabilities:

  • Device trust relationship management: manages the establishment, maintenance, and cancellation of trust relationships between devices in a unified manner; allows the isolation and controllable sharing of trust relationships created by different services.
  • Device trust relationship authentication: authenticates trust relationships between devices, allows trusted devices to exchange secure session keys with each other, and sets up connections between trusted devices through the DSoftBus.

The device authentication module consists of three submodules: device group management, device group authentication, and account-irrelevant P2P device authentication. The following figure shows the logical architecture of the device authentication module.

Figure 1 Architecture of the device authentication module

In the architecture:

  • Device group management: allows you to manage the trust relationships between the local device and other devices created by different services in a unified manner, create trust relationships between devices using the provided APIs, create an account-irrelevant device group, add trusted devices to the group, and create a trust relationship between isolated devices.
  • Device group authentication: allows devices to authenticate the trust relationships that have been established between them and exchange session keys.
  • Account-irrelevant P2P device authentication: allows two devices to establish a trust relationship based on a shared secret, and exchange a session key for secure communication based on the trusted relationship.

Directory Structure

/base/security/deviceauth
├── frameworks                   # Device authentication framework code
├── hals                         # HAL code for the tool library
│   ├── inc                      # Tool library header files
│   └── src                      # Tool library source files
├── interfaces                   # APIs exposed externally
└── services                     # Device authentication services
    ├── common                   # Common code
    ├── group_auth               # Device group authentication
    ├── group_manager            # Device group management
    ├── module                   # Authenticator module (including the account-irrelevant P2P device authenticator)
    └── session                  # Scheduling and session management module

Usage

Available APIs

The device group management sub-module abstracts trust relationships established by different services between devices into trust groups and provides unified APIs for creating, deleting, and querying groups. The device group authentication sub-module provides trusted device authentication and end-to-end session key exchange based on the trust groups.

Table 1 APIs in DeviceGroupManager

API

Description

const DeviceGroupManager *GetGmInstance()

Obtains a DeviceGroupManager instance.

int32_t RegCallback(const char *appId, const DeviceAuthCallback *callback)

Registers a callback.

int32_t CreateGroup(int64_t requestId, const char *appId, const char *createParams)

Creates a group of trusted devices.

int32_t DeleteGroup(int64_t requestId, const char *appId, const char *disbandParams)

Deletes a group of trusted devices.

int32_t AddMemberToGroup(int64_t requestId, const char *appId, const char *addParams)

Adds a member to a specified group.

int32_t DeleteMemberFromGroup(int64_t requestId, const char *appId, const char *deleteParams);

Deletes a member from a specified group.

int32_t ProcessData(int64_t requestId, const uint8_t *data, uint32_t dataLen)

Processes data that is bound or unbound.

int32_t GetGroupInfo(const char *appId, const char *queryParams, char **returnGroupVec, uint32_t *groupNum)

Obtains information about a trusted group of devices.

Table 2 APIs in GroupAuthManager

API

Description

const GroupAuthManager *GetGaInstance()

Obtains a GroupAuthManager instance.

int32_t AuthDevice(int64_t authReqId, const char *authParams, const DeviceAuthCallback *gaCallback)

Authenticates a peer device.

int32_t ProcessData(int64_t authReqId, const uint8_t *data, uint32_t dataLen,

const DeviceAuthCallback *gaCallback)

Processes authentication data.

Repositories Involved

Security subsystem

security_deviceauth