blob: 79ba2480228545c89b8dc3ed355bf6976631c836 [file] [log] [blame]
Shawn Willden907c3012014-12-08 15:51:55 -07001/*
2 * Copyright 2014 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
Shawn Willden6dde87c2014-12-11 14:08:48 -070017#include <stdio.h>
18
Shawn Willden907c3012014-12-08 15:51:55 -070019#include <openssl/aes.h>
Shawn Willdenf0f68b92014-12-30 16:03:28 -070020#include <openssl/err.h>
Shawn Willden907c3012014-12-08 15:51:55 -070021#include <openssl/rand.h>
22
Shawn Willden567a4a02014-12-31 12:14:46 -070023#include <keymaster/logger.h>
24
Shawn Willden63ac0432014-12-29 14:07:08 -070025#include "aes_key.h"
Shawn Willden907c3012014-12-08 15:51:55 -070026#include "aes_operation.h"
Shawn Willdenf0f68b92014-12-30 16:03:28 -070027#include "openssl_err.h"
Shawn Willden907c3012014-12-08 15:51:55 -070028
29namespace keymaster {
30
Shawn Willden63ac0432014-12-29 14:07:08 -070031/**
Shawn Willdenf0f68b92014-12-30 16:03:28 -070032 * Abstract base for AES operation factories. This class does all of the work to create
33 * AES operations.
Shawn Willden63ac0432014-12-29 14:07:08 -070034 */
Shawn Willdenf0f68b92014-12-30 16:03:28 -070035class AesOperationFactory : public OperationFactory {
Shawn Willden63ac0432014-12-29 14:07:08 -070036 public:
37 virtual KeyType registry_key() const { return KeyType(KM_ALGORITHM_AES, purpose()); }
38
Shawn Willden567a4a02014-12-31 12:14:46 -070039 virtual Operation* CreateOperation(const Key& key, keymaster_error_t* error);
Shawn Willden63ac0432014-12-29 14:07:08 -070040 virtual const keymaster_block_mode_t* SupportedBlockModes(size_t* block_mode_count) const;
Shawn Willdenf0f68b92014-12-30 16:03:28 -070041 virtual const keymaster_padding_t* SupportedPaddingModes(size_t* padding_count) const;
Shawn Willden63ac0432014-12-29 14:07:08 -070042
43 virtual keymaster_purpose_t purpose() const = 0;
Shawn Willdenf0f68b92014-12-30 16:03:28 -070044
45 private:
Shawn Willden7a62f5e2015-03-10 12:59:20 -060046 virtual Operation* CreateOcbOperation(const SymmetricKey& key, bool caller_nonce,
47 keymaster_error_t* error);
Shawn Willdenf0f68b92014-12-30 16:03:28 -070048 virtual Operation* CreateEvpOperation(const SymmetricKey& key,
49 keymaster_block_mode_t block_mode,
Shawn Willden7a62f5e2015-03-10 12:59:20 -060050 keymaster_padding_t padding, bool caller_iv,
51 keymaster_error_t* error);
Shawn Willden63ac0432014-12-29 14:07:08 -070052};
53
Shawn Willdenf0f68b92014-12-30 16:03:28 -070054Operation* AesOperationFactory::CreateOperation(const Key& key, keymaster_error_t* error) {
Shawn Willden63ac0432014-12-29 14:07:08 -070055 *error = KM_ERROR_OK;
Shawn Willdenf0f68b92014-12-30 16:03:28 -070056 const SymmetricKey* symmetric_key = static_cast<const SymmetricKey*>(&key);
Shawn Willdenf0f68b92014-12-30 16:03:28 -070057
58 switch (symmetric_key->key_data_size()) {
59 case 16:
60 case 24:
61 case 32:
62 break;
63 default:
64 *error = KM_ERROR_UNSUPPORTED_KEY_SIZE;
65 return NULL;
66 }
67
Shawn Willden63ac0432014-12-29 14:07:08 -070068 keymaster_block_mode_t block_mode;
Shawn Willdenf0f68b92014-12-30 16:03:28 -070069 if (!key.authorizations().GetTagValue(TAG_BLOCK_MODE, &block_mode) || !supported(block_mode))
70 *error = KM_ERROR_UNSUPPORTED_BLOCK_MODE;
71
72 keymaster_padding_t padding = KM_PAD_NONE;
73 key.authorizations().GetTagValue(TAG_PADDING, &padding);
74
Shawn Willden7a62f5e2015-03-10 12:59:20 -060075 bool caller_nonce = key.authorizations().GetTagValue(TAG_CALLER_NONCE);
76
Shawn Willdenf0f68b92014-12-30 16:03:28 -070077 if (*error != KM_ERROR_OK)
78 return NULL;
79
80 switch (block_mode) {
81 case KM_MODE_OCB:
82 if (padding != KM_PAD_NONE) {
83 *error = KM_ERROR_UNSUPPORTED_PADDING_MODE;
84 return NULL;
85 }
Shawn Willden7a62f5e2015-03-10 12:59:20 -060086 return CreateOcbOperation(*symmetric_key, caller_nonce, error);
Shawn Willdenf0f68b92014-12-30 16:03:28 -070087 case KM_MODE_ECB:
88 case KM_MODE_CBC:
Shawn Willden7a62f5e2015-03-10 12:59:20 -060089 return CreateEvpOperation(*symmetric_key, block_mode, padding, caller_nonce, error);
Shawn Willdenf0f68b92014-12-30 16:03:28 -070090 default:
Shawn Willden63ac0432014-12-29 14:07:08 -070091 *error = KM_ERROR_UNSUPPORTED_BLOCK_MODE;
92 return NULL;
93 }
Shawn Willdenf0f68b92014-12-30 16:03:28 -070094}
95
Shawn Willden7a62f5e2015-03-10 12:59:20 -060096Operation* AesOperationFactory::CreateOcbOperation(const SymmetricKey& key, bool caller_nonce,
Shawn Willdenf0f68b92014-12-30 16:03:28 -070097 keymaster_error_t* error) {
98 *error = KM_ERROR_OK;
Shawn Willden63ac0432014-12-29 14:07:08 -070099
100 uint32_t chunk_length;
101 if (!key.authorizations().GetTagValue(TAG_CHUNK_LENGTH, &chunk_length) ||
102 chunk_length > AeadModeOperation::MAX_CHUNK_LENGTH)
Shawn Willdenf01329d2015-03-11 21:51:38 -0600103 *error = KM_ERROR_UNSUPPORTED_CHUNK_LENGTH;
Shawn Willden63ac0432014-12-29 14:07:08 -0700104
105 uint32_t tag_length;
106 if (!key.authorizations().GetTagValue(TAG_MAC_LENGTH, &tag_length) ||
107 tag_length > AeadModeOperation::MAX_TAG_LENGTH)
Shawn Willdenf01329d2015-03-11 21:51:38 -0600108 *error = KM_ERROR_UNSUPPORTED_MAC_LENGTH;
Shawn Willden63ac0432014-12-29 14:07:08 -0700109
110 keymaster_padding_t padding;
111 if (key.authorizations().GetTagValue(TAG_PADDING, &padding) && padding != KM_PAD_NONE)
112 *error = KM_ERROR_UNSUPPORTED_PADDING_MODE;
113
Shawn Willden63ac0432014-12-29 14:07:08 -0700114 if (*error != KM_ERROR_OK)
115 return NULL;
116
Shawn Willdenf0f68b92014-12-30 16:03:28 -0700117 Operation* op = new AesOcbOperation(purpose(), key.key_data(), key.key_data_size(),
Shawn Willdendfa1c032015-02-07 00:39:01 -0700118 chunk_length, tag_length, caller_nonce);
Shawn Willden63ac0432014-12-29 14:07:08 -0700119 if (!op)
120 *error = KM_ERROR_MEMORY_ALLOCATION_FAILED;
121 return op;
122}
123
Shawn Willdenf0f68b92014-12-30 16:03:28 -0700124Operation* AesOperationFactory::CreateEvpOperation(const SymmetricKey& key,
125 keymaster_block_mode_t block_mode,
Shawn Willden7a62f5e2015-03-10 12:59:20 -0600126 keymaster_padding_t padding, bool caller_iv,
Shawn Willdenf0f68b92014-12-30 16:03:28 -0700127 keymaster_error_t* error) {
128 Operation* op = NULL;
129 switch (purpose()) {
130 case KM_PURPOSE_ENCRYPT:
Shawn Willden7a62f5e2015-03-10 12:59:20 -0600131 op = new AesEvpEncryptOperation(block_mode, padding, caller_iv, key.key_data(),
132 key.key_data_size());
Shawn Willdenf0f68b92014-12-30 16:03:28 -0700133 break;
134 case KM_PURPOSE_DECRYPT:
135 op = new AesEvpDecryptOperation(block_mode, padding, key.key_data(), key.key_data_size());
136 break;
137 default:
138 *error = KM_ERROR_UNSUPPORTED_PURPOSE;
139 return NULL;
140 }
141
142 if (!op)
143 *error = KM_ERROR_MEMORY_ALLOCATION_FAILED;
144 return op;
145}
146
Shawn Willden7a62f5e2015-03-10 12:59:20 -0600147static const keymaster_block_mode_t supported_block_modes[] = {KM_MODE_OCB, KM_MODE_ECB,
148 KM_MODE_CBC};
Shawn Willden63ac0432014-12-29 14:07:08 -0700149
150const keymaster_block_mode_t*
Shawn Willdenf0f68b92014-12-30 16:03:28 -0700151AesOperationFactory::SupportedBlockModes(size_t* block_mode_count) const {
Shawn Willden63ac0432014-12-29 14:07:08 -0700152 *block_mode_count = array_length(supported_block_modes);
153 return supported_block_modes;
154}
155
Shawn Willdenf0f68b92014-12-30 16:03:28 -0700156static const keymaster_padding_t supported_padding_modes[] = {KM_PAD_NONE, KM_PAD_PKCS7};
157const keymaster_padding_t*
158AesOperationFactory::SupportedPaddingModes(size_t* padding_mode_count) const {
159 *padding_mode_count = array_length(supported_padding_modes);
160 return supported_padding_modes;
161}
Shawn Willden63ac0432014-12-29 14:07:08 -0700162
163/**
Shawn Willdenf0f68b92014-12-30 16:03:28 -0700164 * Concrete factory for AES encryption operations.
Shawn Willden63ac0432014-12-29 14:07:08 -0700165 */
Shawn Willdenf0f68b92014-12-30 16:03:28 -0700166class AesEncryptionOperationFactory : public AesOperationFactory {
167 keymaster_purpose_t purpose() const { return KM_PURPOSE_ENCRYPT; }
168};
169static OperationFactoryRegistry::Registration<AesEncryptionOperationFactory> encrypt_registration;
170
171/**
172 * Concrete factory for AES decryption operations.
173 */
174class AesDecryptionOperationFactory : public AesOperationFactory {
Shawn Willden63ac0432014-12-29 14:07:08 -0700175 keymaster_purpose_t purpose() const { return KM_PURPOSE_DECRYPT; }
176};
Shawn Willdenf0f68b92014-12-30 16:03:28 -0700177static OperationFactoryRegistry::Registration<AesDecryptionOperationFactory> decrypt_registration;
Shawn Willden63ac0432014-12-29 14:07:08 -0700178
Shawn Willden6dde87c2014-12-11 14:08:48 -0700179keymaster_error_t AesOcbOperation::Initialize(uint8_t* key, size_t key_size, size_t nonce_length,
180 size_t tag_length) {
Shawn Willden63ac0432014-12-29 14:07:08 -0700181 if (tag_length > MAX_TAG_LENGTH || nonce_length > MAX_NONCE_LENGTH)
Shawn Willden6dde87c2014-12-11 14:08:48 -0700182 return KM_ERROR_INVALID_KEY_BLOB;
Shawn Willden907c3012014-12-08 15:51:55 -0700183
Shawn Willden6dde87c2014-12-11 14:08:48 -0700184 if (ae_init(ctx(), key, key_size, nonce_length, tag_length) != AE_SUCCESS) {
185 memset_s(ctx(), 0, ae_ctx_sizeof());
Shawn Willden907c3012014-12-08 15:51:55 -0700186 return KM_ERROR_UNKNOWN_ERROR;
187 }
Shawn Willden907c3012014-12-08 15:51:55 -0700188 return KM_ERROR_OK;
189}
190
Shawn Willden6dde87c2014-12-11 14:08:48 -0700191keymaster_error_t AesOcbOperation::EncryptChunk(const uint8_t* nonce, size_t /* nonce_length */,
192 size_t tag_length,
193 const keymaster_blob_t additional_data,
194 uint8_t* chunk, size_t chunk_size, Buffer* output) {
195 if (!ctx())
196 return KM_ERROR_UNKNOWN_ERROR;
197 uint8_t __attribute__((aligned(16))) tag[MAX_TAG_LENGTH];
Shawn Willden907c3012014-12-08 15:51:55 -0700198
Shawn Willden6dde87c2014-12-11 14:08:48 -0700199 // Encrypt chunk in place.
200 int ae_err = ae_encrypt(ctx(), nonce, chunk, chunk_size, additional_data.data,
201 additional_data.data_length, chunk, tag, AE_FINALIZE);
Shawn Willden907c3012014-12-08 15:51:55 -0700202
Shawn Willden907c3012014-12-08 15:51:55 -0700203 if (ae_err < 0)
204 return KM_ERROR_UNKNOWN_ERROR;
Shawn Willden6dde87c2014-12-11 14:08:48 -0700205 assert(ae_err == (int)buffered_data_length());
Shawn Willden907c3012014-12-08 15:51:55 -0700206
Shawn Willden6dde87c2014-12-11 14:08:48 -0700207 output->write(chunk, buffered_data_length());
208 output->write(tag, tag_length);
Shawn Willden907c3012014-12-08 15:51:55 -0700209
210 return KM_ERROR_OK;
211}
212
Shawn Willden6dde87c2014-12-11 14:08:48 -0700213keymaster_error_t AesOcbOperation::DecryptChunk(const uint8_t* nonce, size_t /* nonce_length */,
214 const uint8_t* tag, size_t /* tag_length */,
215 const keymaster_blob_t additional_data,
216 uint8_t* chunk, size_t chunk_size, Buffer* output) {
217 if (!ctx())
218 return KM_ERROR_UNKNOWN_ERROR;
219
220 // Decrypt chunk in place
221 int ae_err = ae_decrypt(ctx(), nonce, chunk, chunk_size, additional_data.data,
222 additional_data.data_length, chunk, tag, AE_FINALIZE);
223 if (ae_err == AE_INVALID)
224 return KM_ERROR_VERIFICATION_FAILED;
225 else if (ae_err < 0)
226 return KM_ERROR_UNKNOWN_ERROR;
227 assert(ae_err == (int)buffered_data_length());
228 output->write(chunk, chunk_size);
229
230 return KM_ERROR_OK;
Shawn Willden907c3012014-12-08 15:51:55 -0700231}
232
Shawn Willdenf0f68b92014-12-30 16:03:28 -0700233AesEvpOperation::AesEvpOperation(keymaster_purpose_t purpose, keymaster_block_mode_t block_mode,
Shawn Willden7a62f5e2015-03-10 12:59:20 -0600234 keymaster_padding_t padding, bool caller_iv, const uint8_t* key,
235 size_t key_size)
Shawn Willdenf0f68b92014-12-30 16:03:28 -0700236 : Operation(purpose), key_size_(key_size), block_mode_(block_mode), padding_(padding),
Shawn Willden7a62f5e2015-03-10 12:59:20 -0600237 caller_iv_(caller_iv) {
Shawn Willdenf0f68b92014-12-30 16:03:28 -0700238 memcpy(key_, key, key_size_);
239 EVP_CIPHER_CTX_init(&ctx_);
240}
241
242AesEvpOperation::~AesEvpOperation() {
243 EVP_CIPHER_CTX_cleanup(&ctx_);
244}
245
246keymaster_error_t AesEvpOperation::InitializeCipher() {
247 const EVP_CIPHER* cipher;
248 switch (block_mode_) {
249 case KM_MODE_ECB:
250 switch (key_size_) {
251 case 16:
252 cipher = EVP_aes_128_ecb();
253 break;
254 case 24:
255 cipher = EVP_aes_192_ecb();
256 break;
257 case 32:
258 cipher = EVP_aes_256_ecb();
259 break;
260 default:
261 return KM_ERROR_UNSUPPORTED_KEY_SIZE;
262 }
263 break;
264 case KM_MODE_CBC:
265 switch (key_size_) {
266 case 16:
267 cipher = EVP_aes_128_cbc();
268 break;
269 case 24:
270 cipher = EVP_aes_192_cbc();
271 break;
272 case 32:
273 cipher = EVP_aes_256_cbc();
274 break;
275 default:
276 return KM_ERROR_UNSUPPORTED_KEY_SIZE;
277 }
278 break;
Shawn Willdenf0f68b92014-12-30 16:03:28 -0700279 default:
280 return KM_ERROR_UNSUPPORTED_BLOCK_MODE;
281 }
282
283 int init_result =
Shawn Willden7a62f5e2015-03-10 12:59:20 -0600284 EVP_CipherInit_ex(&ctx_, cipher, NULL /* engine */, key_, iv_.get(), evp_encrypt_mode());
Shawn Willdenf0f68b92014-12-30 16:03:28 -0700285
286 if (!init_result)
Shawn Willdenf01329d2015-03-11 21:51:38 -0600287 return TranslateLastOpenSslError();
Shawn Willdenf0f68b92014-12-30 16:03:28 -0700288
289 switch (padding_) {
290 case KM_PAD_NONE:
291 EVP_CIPHER_CTX_set_padding(&ctx_, 0 /* disable padding */);
292 break;
293 case KM_PAD_PKCS7:
294 // This is the default for OpenSSL EVP cipher operations.
295 break;
296 default:
297 return KM_ERROR_UNSUPPORTED_PADDING_MODE;
298 }
299
Shawn Willdenf0f68b92014-12-30 16:03:28 -0700300 return KM_ERROR_OK;
301}
302
303bool AesEvpOperation::need_iv() const {
304 switch (block_mode_) {
305 case KM_MODE_CBC:
Shawn Willdenf0f68b92014-12-30 16:03:28 -0700306 return true;
307 case KM_MODE_ECB:
308 return false;
309 default:
310 // Shouldn't get here.
311 assert(false);
312 return false;
313 }
314}
315
Shawn Willden7a62f5e2015-03-10 12:59:20 -0600316keymaster_error_t AesEvpOperation::Begin(const AuthorizationSet& input_params,
317 AuthorizationSet* output_params) {
318 if (!output_params)
319 return KM_ERROR_OUTPUT_PARAMETER_NULL;
320
321 keymaster_error_t error = KM_ERROR_OK;
322 if (need_iv()) {
323 switch (purpose()) {
324 case KM_PURPOSE_ENCRYPT:
325 if (caller_iv_)
326 error = GetIv(input_params);
327 else {
328 iv_.reset(new uint8_t[AES_BLOCK_SIZE]);
329 if (!iv_.get())
330 return KM_ERROR_MEMORY_ALLOCATION_FAILED;
331 if (!RAND_bytes(iv_.get(), AES_BLOCK_SIZE))
332 error = TranslateLastOpenSslError();
333 }
334
335 if (error == KM_ERROR_OK)
336 output_params->push_back(TAG_NONCE, iv_.get(), AES_BLOCK_SIZE);
337 break;
338
339 case KM_PURPOSE_DECRYPT:
340 error = GetIv(input_params);
341 break;
342 default:
343 return KM_ERROR_UNSUPPORTED_PURPOSE;
344 }
345 }
346
347 if (error == KM_ERROR_OK)
348 error = InitializeCipher();
349
350 return error;
351}
352
353keymaster_error_t AesEvpOperation::GetIv(const AuthorizationSet& input_params) {
354 keymaster_blob_t iv_blob;
355 if (!input_params.GetTagValue(TAG_NONCE, &iv_blob)) {
356 LOG_E("No IV provided", 0);
357 return KM_ERROR_INVALID_ARGUMENT;
358 }
359 if (iv_blob.data_length != AES_BLOCK_SIZE) {
360 LOG_E("Expected %d-byte IV for AES operation, but got %d bytes", AES_BLOCK_SIZE,
361 iv_blob.data_length);
362 return KM_ERROR_INVALID_ARGUMENT;
363 }
364 iv_.reset(dup_array(iv_blob.data, iv_blob.data_length));
Shawn Willden92b69a32015-03-14 11:07:36 -0600365 if (!iv_.get())
366 return KM_ERROR_MEMORY_ALLOCATION_FAILED;
Shawn Willdenf0f68b92014-12-30 16:03:28 -0700367 return KM_ERROR_OK;
368}
369
370inline size_t min(size_t a, size_t b) {
371 if (a < b)
372 return a;
373 return b;
374}
375
376keymaster_error_t AesEvpOperation::Update(const AuthorizationSet& /* additional_params */,
377 const Buffer& input, Buffer* output,
378 size_t* input_consumed) {
379 output->reserve(input.available_read() + AES_BLOCK_SIZE);
380
381 const uint8_t* input_pos = input.peek_read();
382 const uint8_t* input_end = input_pos + input.available_read();
383
Shawn Willdenf0f68b92014-12-30 16:03:28 -0700384 int output_written = -1;
385 if (!EVP_CipherUpdate(&ctx_, output->peek_write(), &output_written, input_pos,
386 input_end - input_pos))
387 return TranslateLastOpenSslError();
388
389 assert(output_written >= 0);
390 assert(output_written <= (int)output->available_write());
391 output->advance_write(output_written);
392 *input_consumed = input.available_read();
393 return KM_ERROR_OK;
394}
395
396keymaster_error_t AesEvpOperation::Finish(const AuthorizationSet& /* additional_params */,
397 const Buffer& /* signature */, Buffer* output) {
398 output->reserve(AES_BLOCK_SIZE);
399
400 int output_written = -1;
401 if (!EVP_CipherFinal_ex(&ctx_, output->peek_write(), &output_written)) {
402 LOG_E("Error encrypting final block: %s", ERR_error_string(ERR_peek_last_error(), NULL));
403 return TranslateLastOpenSslError();
404 }
405
406 assert(output_written <= AES_BLOCK_SIZE);
407 output->advance_write(output_written);
408 return KM_ERROR_OK;
409}
410
411keymaster_error_t AesEvpOperation::Abort() {
412 return KM_ERROR_OK;
413}
414
Shawn Willden907c3012014-12-08 15:51:55 -0700415} // namespace keymaster