blob: 804d9b3763037bd371ad9e587186277f49417d9b [file] [log] [blame]
Shawn Willden907c3012014-12-08 15:51:55 -07001/*
2 * Copyright 2014 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
Shawn Willden6dde87c2014-12-11 14:08:48 -070017#include <stdio.h>
18
Shawn Willden907c3012014-12-08 15:51:55 -070019#include <openssl/aes.h>
Shawn Willdenf0f68b92014-12-30 16:03:28 -070020#include <openssl/err.h>
Shawn Willden907c3012014-12-08 15:51:55 -070021#include <openssl/rand.h>
22
Shawn Willden567a4a02014-12-31 12:14:46 -070023#include <keymaster/logger.h>
24
Shawn Willden63ac0432014-12-29 14:07:08 -070025#include "aes_key.h"
Shawn Willden907c3012014-12-08 15:51:55 -070026#include "aes_operation.h"
Shawn Willdenf0f68b92014-12-30 16:03:28 -070027#include "openssl_err.h"
Shawn Willden907c3012014-12-08 15:51:55 -070028
29namespace keymaster {
30
Shawn Willden63ac0432014-12-29 14:07:08 -070031/**
Shawn Willdenf0f68b92014-12-30 16:03:28 -070032 * Abstract base for AES operation factories. This class does all of the work to create
33 * AES operations.
Shawn Willden63ac0432014-12-29 14:07:08 -070034 */
Shawn Willdenf0f68b92014-12-30 16:03:28 -070035class AesOperationFactory : public OperationFactory {
Shawn Willden63ac0432014-12-29 14:07:08 -070036 public:
37 virtual KeyType registry_key() const { return KeyType(KM_ALGORITHM_AES, purpose()); }
38
Shawn Willden567a4a02014-12-31 12:14:46 -070039 virtual Operation* CreateOperation(const Key& key, keymaster_error_t* error);
Shawn Willden63ac0432014-12-29 14:07:08 -070040 virtual const keymaster_block_mode_t* SupportedBlockModes(size_t* block_mode_count) const;
Shawn Willdenf0f68b92014-12-30 16:03:28 -070041 virtual const keymaster_padding_t* SupportedPaddingModes(size_t* padding_count) const;
Shawn Willden63ac0432014-12-29 14:07:08 -070042
43 virtual keymaster_purpose_t purpose() const = 0;
Shawn Willdenf0f68b92014-12-30 16:03:28 -070044
45 private:
Shawn Willden7a62f5e2015-03-10 12:59:20 -060046 virtual Operation* CreateOcbOperation(const SymmetricKey& key, bool caller_nonce,
47 keymaster_error_t* error);
Shawn Willdenf0f68b92014-12-30 16:03:28 -070048 virtual Operation* CreateEvpOperation(const SymmetricKey& key,
49 keymaster_block_mode_t block_mode,
Shawn Willden7a62f5e2015-03-10 12:59:20 -060050 keymaster_padding_t padding, bool caller_iv,
51 keymaster_error_t* error);
Shawn Willden63ac0432014-12-29 14:07:08 -070052};
53
Shawn Willdenf0f68b92014-12-30 16:03:28 -070054Operation* AesOperationFactory::CreateOperation(const Key& key, keymaster_error_t* error) {
Shawn Willden63ac0432014-12-29 14:07:08 -070055 *error = KM_ERROR_OK;
56
Shawn Willdenf0f68b92014-12-30 16:03:28 -070057 const SymmetricKey* symmetric_key = static_cast<const SymmetricKey*>(&key);
58 if (!symmetric_key) {
59 *error = KM_ERROR_UNKNOWN_ERROR;
60 return NULL;
61 }
62
63 switch (symmetric_key->key_data_size()) {
64 case 16:
65 case 24:
66 case 32:
67 break;
68 default:
69 *error = KM_ERROR_UNSUPPORTED_KEY_SIZE;
70 return NULL;
71 }
72
Shawn Willden63ac0432014-12-29 14:07:08 -070073 keymaster_block_mode_t block_mode;
Shawn Willdenf0f68b92014-12-30 16:03:28 -070074 if (!key.authorizations().GetTagValue(TAG_BLOCK_MODE, &block_mode) || !supported(block_mode))
75 *error = KM_ERROR_UNSUPPORTED_BLOCK_MODE;
76
77 keymaster_padding_t padding = KM_PAD_NONE;
78 key.authorizations().GetTagValue(TAG_PADDING, &padding);
79
Shawn Willden7a62f5e2015-03-10 12:59:20 -060080 bool caller_nonce = key.authorizations().GetTagValue(TAG_CALLER_NONCE);
81
Shawn Willdenf0f68b92014-12-30 16:03:28 -070082 if (*error != KM_ERROR_OK)
83 return NULL;
84
85 switch (block_mode) {
86 case KM_MODE_OCB:
87 if (padding != KM_PAD_NONE) {
88 *error = KM_ERROR_UNSUPPORTED_PADDING_MODE;
89 return NULL;
90 }
Shawn Willden7a62f5e2015-03-10 12:59:20 -060091 return CreateOcbOperation(*symmetric_key, caller_nonce, error);
Shawn Willdenf0f68b92014-12-30 16:03:28 -070092 case KM_MODE_ECB:
93 case KM_MODE_CBC:
Shawn Willden7a62f5e2015-03-10 12:59:20 -060094 return CreateEvpOperation(*symmetric_key, block_mode, padding, caller_nonce, error);
Shawn Willdenf0f68b92014-12-30 16:03:28 -070095 default:
Shawn Willden63ac0432014-12-29 14:07:08 -070096 *error = KM_ERROR_UNSUPPORTED_BLOCK_MODE;
97 return NULL;
98 }
Shawn Willdenf0f68b92014-12-30 16:03:28 -070099}
100
Shawn Willden7a62f5e2015-03-10 12:59:20 -0600101Operation* AesOperationFactory::CreateOcbOperation(const SymmetricKey& key, bool caller_nonce,
Shawn Willdenf0f68b92014-12-30 16:03:28 -0700102 keymaster_error_t* error) {
103 *error = KM_ERROR_OK;
Shawn Willden63ac0432014-12-29 14:07:08 -0700104
105 uint32_t chunk_length;
106 if (!key.authorizations().GetTagValue(TAG_CHUNK_LENGTH, &chunk_length) ||
107 chunk_length > AeadModeOperation::MAX_CHUNK_LENGTH)
108 // TODO(swillden): Create and use a better return code.
109 *error = KM_ERROR_INVALID_ARGUMENT;
110
111 uint32_t tag_length;
112 if (!key.authorizations().GetTagValue(TAG_MAC_LENGTH, &tag_length) ||
113 tag_length > AeadModeOperation::MAX_TAG_LENGTH)
114 // TODO(swillden): Create and use a better return code.
115 *error = KM_ERROR_INVALID_ARGUMENT;
116
117 keymaster_padding_t padding;
118 if (key.authorizations().GetTagValue(TAG_PADDING, &padding) && padding != KM_PAD_NONE)
119 *error = KM_ERROR_UNSUPPORTED_PADDING_MODE;
120
Shawn Willden63ac0432014-12-29 14:07:08 -0700121 if (*error != KM_ERROR_OK)
122 return NULL;
123
Shawn Willdenf0f68b92014-12-30 16:03:28 -0700124 Operation* op = new AesOcbOperation(purpose(), key.key_data(), key.key_data_size(),
Shawn Willdendfa1c032015-02-07 00:39:01 -0700125 chunk_length, tag_length, caller_nonce);
Shawn Willden63ac0432014-12-29 14:07:08 -0700126 if (!op)
127 *error = KM_ERROR_MEMORY_ALLOCATION_FAILED;
128 return op;
129}
130
Shawn Willdenf0f68b92014-12-30 16:03:28 -0700131Operation* AesOperationFactory::CreateEvpOperation(const SymmetricKey& key,
132 keymaster_block_mode_t block_mode,
Shawn Willden7a62f5e2015-03-10 12:59:20 -0600133 keymaster_padding_t padding, bool caller_iv,
Shawn Willdenf0f68b92014-12-30 16:03:28 -0700134 keymaster_error_t* error) {
135 Operation* op = NULL;
136 switch (purpose()) {
137 case KM_PURPOSE_ENCRYPT:
Shawn Willden7a62f5e2015-03-10 12:59:20 -0600138 op = new AesEvpEncryptOperation(block_mode, padding, caller_iv, key.key_data(),
139 key.key_data_size());
Shawn Willdenf0f68b92014-12-30 16:03:28 -0700140 break;
141 case KM_PURPOSE_DECRYPT:
142 op = new AesEvpDecryptOperation(block_mode, padding, key.key_data(), key.key_data_size());
143 break;
144 default:
145 *error = KM_ERROR_UNSUPPORTED_PURPOSE;
146 return NULL;
147 }
148
149 if (!op)
150 *error = KM_ERROR_MEMORY_ALLOCATION_FAILED;
151 return op;
152}
153
Shawn Willden7a62f5e2015-03-10 12:59:20 -0600154static const keymaster_block_mode_t supported_block_modes[] = {KM_MODE_OCB, KM_MODE_ECB,
155 KM_MODE_CBC};
Shawn Willden63ac0432014-12-29 14:07:08 -0700156
157const keymaster_block_mode_t*
Shawn Willdenf0f68b92014-12-30 16:03:28 -0700158AesOperationFactory::SupportedBlockModes(size_t* block_mode_count) const {
Shawn Willden63ac0432014-12-29 14:07:08 -0700159 *block_mode_count = array_length(supported_block_modes);
160 return supported_block_modes;
161}
162
Shawn Willdenf0f68b92014-12-30 16:03:28 -0700163static const keymaster_padding_t supported_padding_modes[] = {KM_PAD_NONE, KM_PAD_PKCS7};
164const keymaster_padding_t*
165AesOperationFactory::SupportedPaddingModes(size_t* padding_mode_count) const {
166 *padding_mode_count = array_length(supported_padding_modes);
167 return supported_padding_modes;
168}
Shawn Willden63ac0432014-12-29 14:07:08 -0700169
170/**
Shawn Willdenf0f68b92014-12-30 16:03:28 -0700171 * Concrete factory for AES encryption operations.
Shawn Willden63ac0432014-12-29 14:07:08 -0700172 */
Shawn Willdenf0f68b92014-12-30 16:03:28 -0700173class AesEncryptionOperationFactory : public AesOperationFactory {
174 keymaster_purpose_t purpose() const { return KM_PURPOSE_ENCRYPT; }
175};
176static OperationFactoryRegistry::Registration<AesEncryptionOperationFactory> encrypt_registration;
177
178/**
179 * Concrete factory for AES decryption operations.
180 */
181class AesDecryptionOperationFactory : public AesOperationFactory {
Shawn Willden63ac0432014-12-29 14:07:08 -0700182 keymaster_purpose_t purpose() const { return KM_PURPOSE_DECRYPT; }
183};
Shawn Willdenf0f68b92014-12-30 16:03:28 -0700184static OperationFactoryRegistry::Registration<AesDecryptionOperationFactory> decrypt_registration;
Shawn Willden63ac0432014-12-29 14:07:08 -0700185
Shawn Willden6dde87c2014-12-11 14:08:48 -0700186keymaster_error_t AesOcbOperation::Initialize(uint8_t* key, size_t key_size, size_t nonce_length,
187 size_t tag_length) {
Shawn Willden63ac0432014-12-29 14:07:08 -0700188 if (tag_length > MAX_TAG_LENGTH || nonce_length > MAX_NONCE_LENGTH)
Shawn Willden6dde87c2014-12-11 14:08:48 -0700189 return KM_ERROR_INVALID_KEY_BLOB;
Shawn Willden907c3012014-12-08 15:51:55 -0700190
Shawn Willden6dde87c2014-12-11 14:08:48 -0700191 if (ae_init(ctx(), key, key_size, nonce_length, tag_length) != AE_SUCCESS) {
192 memset_s(ctx(), 0, ae_ctx_sizeof());
Shawn Willden907c3012014-12-08 15:51:55 -0700193 return KM_ERROR_UNKNOWN_ERROR;
194 }
Shawn Willden907c3012014-12-08 15:51:55 -0700195 return KM_ERROR_OK;
196}
197
Shawn Willden6dde87c2014-12-11 14:08:48 -0700198keymaster_error_t AesOcbOperation::EncryptChunk(const uint8_t* nonce, size_t /* nonce_length */,
199 size_t tag_length,
200 const keymaster_blob_t additional_data,
201 uint8_t* chunk, size_t chunk_size, Buffer* output) {
202 if (!ctx())
203 return KM_ERROR_UNKNOWN_ERROR;
204 uint8_t __attribute__((aligned(16))) tag[MAX_TAG_LENGTH];
Shawn Willden907c3012014-12-08 15:51:55 -0700205
Shawn Willden6dde87c2014-12-11 14:08:48 -0700206 // Encrypt chunk in place.
207 int ae_err = ae_encrypt(ctx(), nonce, chunk, chunk_size, additional_data.data,
208 additional_data.data_length, chunk, tag, AE_FINALIZE);
Shawn Willden907c3012014-12-08 15:51:55 -0700209
Shawn Willden907c3012014-12-08 15:51:55 -0700210 if (ae_err < 0)
211 return KM_ERROR_UNKNOWN_ERROR;
Shawn Willden6dde87c2014-12-11 14:08:48 -0700212 assert(ae_err == (int)buffered_data_length());
Shawn Willden907c3012014-12-08 15:51:55 -0700213
Shawn Willden6dde87c2014-12-11 14:08:48 -0700214 output->write(chunk, buffered_data_length());
215 output->write(tag, tag_length);
Shawn Willden907c3012014-12-08 15:51:55 -0700216
217 return KM_ERROR_OK;
218}
219
Shawn Willden6dde87c2014-12-11 14:08:48 -0700220keymaster_error_t AesOcbOperation::DecryptChunk(const uint8_t* nonce, size_t /* nonce_length */,
221 const uint8_t* tag, size_t /* tag_length */,
222 const keymaster_blob_t additional_data,
223 uint8_t* chunk, size_t chunk_size, Buffer* output) {
224 if (!ctx())
225 return KM_ERROR_UNKNOWN_ERROR;
226
227 // Decrypt chunk in place
228 int ae_err = ae_decrypt(ctx(), nonce, chunk, chunk_size, additional_data.data,
229 additional_data.data_length, chunk, tag, AE_FINALIZE);
230 if (ae_err == AE_INVALID)
231 return KM_ERROR_VERIFICATION_FAILED;
232 else if (ae_err < 0)
233 return KM_ERROR_UNKNOWN_ERROR;
234 assert(ae_err == (int)buffered_data_length());
235 output->write(chunk, chunk_size);
236
237 return KM_ERROR_OK;
Shawn Willden907c3012014-12-08 15:51:55 -0700238}
239
Shawn Willdenf0f68b92014-12-30 16:03:28 -0700240AesEvpOperation::AesEvpOperation(keymaster_purpose_t purpose, keymaster_block_mode_t block_mode,
Shawn Willden7a62f5e2015-03-10 12:59:20 -0600241 keymaster_padding_t padding, bool caller_iv, const uint8_t* key,
242 size_t key_size)
Shawn Willdenf0f68b92014-12-30 16:03:28 -0700243 : Operation(purpose), key_size_(key_size), block_mode_(block_mode), padding_(padding),
Shawn Willden7a62f5e2015-03-10 12:59:20 -0600244 caller_iv_(caller_iv) {
Shawn Willdenf0f68b92014-12-30 16:03:28 -0700245 memcpy(key_, key, key_size_);
246 EVP_CIPHER_CTX_init(&ctx_);
247}
248
249AesEvpOperation::~AesEvpOperation() {
250 EVP_CIPHER_CTX_cleanup(&ctx_);
251}
252
253keymaster_error_t AesEvpOperation::InitializeCipher() {
254 const EVP_CIPHER* cipher;
255 switch (block_mode_) {
256 case KM_MODE_ECB:
257 switch (key_size_) {
258 case 16:
259 cipher = EVP_aes_128_ecb();
260 break;
261 case 24:
262 cipher = EVP_aes_192_ecb();
263 break;
264 case 32:
265 cipher = EVP_aes_256_ecb();
266 break;
267 default:
268 return KM_ERROR_UNSUPPORTED_KEY_SIZE;
269 }
270 break;
271 case KM_MODE_CBC:
272 switch (key_size_) {
273 case 16:
274 cipher = EVP_aes_128_cbc();
275 break;
276 case 24:
277 cipher = EVP_aes_192_cbc();
278 break;
279 case 32:
280 cipher = EVP_aes_256_cbc();
281 break;
282 default:
283 return KM_ERROR_UNSUPPORTED_KEY_SIZE;
284 }
285 break;
Shawn Willdenf0f68b92014-12-30 16:03:28 -0700286 default:
287 return KM_ERROR_UNSUPPORTED_BLOCK_MODE;
288 }
289
290 int init_result =
Shawn Willden7a62f5e2015-03-10 12:59:20 -0600291 EVP_CipherInit_ex(&ctx_, cipher, NULL /* engine */, key_, iv_.get(), evp_encrypt_mode());
Shawn Willdenf0f68b92014-12-30 16:03:28 -0700292
293 if (!init_result)
294 return KM_ERROR_UNKNOWN_ERROR;
295
296 switch (padding_) {
297 case KM_PAD_NONE:
298 EVP_CIPHER_CTX_set_padding(&ctx_, 0 /* disable padding */);
299 break;
300 case KM_PAD_PKCS7:
301 // This is the default for OpenSSL EVP cipher operations.
302 break;
303 default:
304 return KM_ERROR_UNSUPPORTED_PADDING_MODE;
305 }
306
Shawn Willdenf0f68b92014-12-30 16:03:28 -0700307 return KM_ERROR_OK;
308}
309
310bool AesEvpOperation::need_iv() const {
311 switch (block_mode_) {
312 case KM_MODE_CBC:
Shawn Willdenf0f68b92014-12-30 16:03:28 -0700313 return true;
314 case KM_MODE_ECB:
315 return false;
316 default:
317 // Shouldn't get here.
318 assert(false);
319 return false;
320 }
321}
322
Shawn Willden7a62f5e2015-03-10 12:59:20 -0600323keymaster_error_t AesEvpOperation::Begin(const AuthorizationSet& input_params,
324 AuthorizationSet* output_params) {
325 if (!output_params)
326 return KM_ERROR_OUTPUT_PARAMETER_NULL;
327
328 keymaster_error_t error = KM_ERROR_OK;
329 if (need_iv()) {
330 switch (purpose()) {
331 case KM_PURPOSE_ENCRYPT:
332 if (caller_iv_)
333 error = GetIv(input_params);
334 else {
335 iv_.reset(new uint8_t[AES_BLOCK_SIZE]);
336 if (!iv_.get())
337 return KM_ERROR_MEMORY_ALLOCATION_FAILED;
338 if (!RAND_bytes(iv_.get(), AES_BLOCK_SIZE))
339 error = TranslateLastOpenSslError();
340 }
341
342 if (error == KM_ERROR_OK)
343 output_params->push_back(TAG_NONCE, iv_.get(), AES_BLOCK_SIZE);
344 break;
345
346 case KM_PURPOSE_DECRYPT:
347 error = GetIv(input_params);
348 break;
349 default:
350 return KM_ERROR_UNSUPPORTED_PURPOSE;
351 }
352 }
353
354 if (error == KM_ERROR_OK)
355 error = InitializeCipher();
356
357 return error;
358}
359
360keymaster_error_t AesEvpOperation::GetIv(const AuthorizationSet& input_params) {
361 keymaster_blob_t iv_blob;
362 if (!input_params.GetTagValue(TAG_NONCE, &iv_blob)) {
363 LOG_E("No IV provided", 0);
364 return KM_ERROR_INVALID_ARGUMENT;
365 }
366 if (iv_blob.data_length != AES_BLOCK_SIZE) {
367 LOG_E("Expected %d-byte IV for AES operation, but got %d bytes", AES_BLOCK_SIZE,
368 iv_blob.data_length);
369 return KM_ERROR_INVALID_ARGUMENT;
370 }
371 iv_.reset(dup_array(iv_blob.data, iv_blob.data_length));
Shawn Willden92b69a32015-03-14 11:07:36 -0600372 if (!iv_.get())
373 return KM_ERROR_MEMORY_ALLOCATION_FAILED;
Shawn Willdenf0f68b92014-12-30 16:03:28 -0700374 return KM_ERROR_OK;
375}
376
377inline size_t min(size_t a, size_t b) {
378 if (a < b)
379 return a;
380 return b;
381}
382
383keymaster_error_t AesEvpOperation::Update(const AuthorizationSet& /* additional_params */,
384 const Buffer& input, Buffer* output,
385 size_t* input_consumed) {
386 output->reserve(input.available_read() + AES_BLOCK_SIZE);
387
388 const uint8_t* input_pos = input.peek_read();
389 const uint8_t* input_end = input_pos + input.available_read();
390
Shawn Willdenf0f68b92014-12-30 16:03:28 -0700391 int output_written = -1;
392 if (!EVP_CipherUpdate(&ctx_, output->peek_write(), &output_written, input_pos,
393 input_end - input_pos))
394 return TranslateLastOpenSslError();
395
396 assert(output_written >= 0);
397 assert(output_written <= (int)output->available_write());
398 output->advance_write(output_written);
399 *input_consumed = input.available_read();
400 return KM_ERROR_OK;
401}
402
403keymaster_error_t AesEvpOperation::Finish(const AuthorizationSet& /* additional_params */,
404 const Buffer& /* signature */, Buffer* output) {
405 output->reserve(AES_BLOCK_SIZE);
406
407 int output_written = -1;
408 if (!EVP_CipherFinal_ex(&ctx_, output->peek_write(), &output_written)) {
409 LOG_E("Error encrypting final block: %s", ERR_error_string(ERR_peek_last_error(), NULL));
410 return TranslateLastOpenSslError();
411 }
412
413 assert(output_written <= AES_BLOCK_SIZE);
414 output->advance_write(output_written);
415 return KM_ERROR_OK;
416}
417
418keymaster_error_t AesEvpOperation::Abort() {
419 return KM_ERROR_OK;
420}
421
Shawn Willden907c3012014-12-08 15:51:55 -0700422} // namespace keymaster