blob: c5a2d63cfcbd5e477a4dfe277a0aa8ff30c048f5 [file] [log] [blame]
Shawn Willden815e8962020-12-11 13:05:27 +00001/*
2 * Copyright 2020, The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
Shawn Willden96d4e8c2020-12-07 17:03:54 -070017#define LOG_TAG "android.hardware.security.keymint-impl"
18#include <android-base/logging.h>
19
Shawn Willden815e8962020-12-11 13:05:27 +000020#include "KeyMintUtils.h"
21
Shawn Willden96d4e8c2020-12-07 17:03:54 -070022namespace aidl::android::hardware::security::keymint::km_utils {
Shawn Willden815e8962020-12-11 13:05:27 +000023
24using namespace ::keymaster;
25
Shawn Willden96d4e8c2020-12-07 17:03:54 -070026namespace {
27
28KeyParameter kmEnumParam2Aidl(const keymaster_key_param_t& param) {
29 switch (param.tag) {
30 case KM_TAG_PURPOSE:
31 return KeyParameter{Tag::PURPOSE, KeyParameterValue::make<KeyParameterValue::keyPurpose>(
32 static_cast<KeyPurpose>(param.enumerated))};
33 case KM_TAG_ALGORITHM:
34 return KeyParameter{Tag::ALGORITHM, KeyParameterValue::make<KeyParameterValue::algorithm>(
35 static_cast<Algorithm>(param.enumerated))};
36 case KM_TAG_BLOCK_MODE:
37 return KeyParameter{Tag::BLOCK_MODE, KeyParameterValue::make<KeyParameterValue::blockMode>(
38 static_cast<BlockMode>(param.enumerated))};
39 case KM_TAG_DIGEST:
40 return KeyParameter{Tag::DIGEST, KeyParameterValue::make<KeyParameterValue::digest>(
41 static_cast<Digest>(param.enumerated))};
42 case KM_TAG_PADDING:
43 return KeyParameter{Tag::PADDING, KeyParameterValue::make<KeyParameterValue::paddingMode>(
44 static_cast<PaddingMode>(param.enumerated))};
45 case KM_TAG_EC_CURVE:
46 return KeyParameter{Tag::EC_CURVE, KeyParameterValue::make<KeyParameterValue::ecCurve>(
47 static_cast<EcCurve>(param.enumerated))};
48 case KM_TAG_USER_AUTH_TYPE:
49 return KeyParameter{Tag::USER_AUTH_TYPE,
50 KeyParameterValue::make<KeyParameterValue::hardwareAuthenticatorType>(
51 static_cast<HardwareAuthenticatorType>(param.enumerated))};
52 case KM_TAG_ORIGIN:
53 return KeyParameter{Tag::ORIGIN, KeyParameterValue::make<KeyParameterValue::origin>(
54 static_cast<KeyOrigin>(param.enumerated))};
55 case KM_TAG_BLOB_USAGE_REQUIREMENTS:
56 case KM_TAG_KDF:
57 default:
58 return KeyParameter{Tag::INVALID, false};
59 }
60}
61
62keymaster_key_param_t kInvalidTag{.tag = KM_TAG_INVALID, .integer = 0};
63
64template <KeyParameterValue::Tag aidl_tag>
65keymaster_key_param_t aidlEnumVal2Km(keymaster_tag_t km_tag, const KeyParameterValue& value) {
66 return value.getTag() == aidl_tag
67 ? keymaster_param_enum(km_tag, static_cast<uint32_t>(value.get<aidl_tag>()))
68 : kInvalidTag;
69}
70
71keymaster_key_param_t aidlEnumParam2Km(const KeyParameter& param) {
72 auto tag = km_utils::legacy_enum_conversion(param.tag);
73 switch (tag) {
74 case KM_TAG_PURPOSE:
75 return aidlEnumVal2Km<KeyParameterValue::keyPurpose>(tag, param.value);
76 case KM_TAG_ALGORITHM:
77 return aidlEnumVal2Km<KeyParameterValue::algorithm>(tag, param.value);
78 case KM_TAG_BLOCK_MODE:
79 return aidlEnumVal2Km<KeyParameterValue::blockMode>(tag, param.value);
80 case KM_TAG_DIGEST:
81 return aidlEnumVal2Km<KeyParameterValue::digest>(tag, param.value);
82 case KM_TAG_PADDING:
83 return aidlEnumVal2Km<KeyParameterValue::paddingMode>(tag, param.value);
84 case KM_TAG_EC_CURVE:
85 return aidlEnumVal2Km<KeyParameterValue::ecCurve>(tag, param.value);
86 case KM_TAG_USER_AUTH_TYPE:
87 return aidlEnumVal2Km<KeyParameterValue::hardwareAuthenticatorType>(tag, param.value);
88 case KM_TAG_ORIGIN:
89 return aidlEnumVal2Km<KeyParameterValue::origin>(tag, param.value);
90 case KM_TAG_BLOB_USAGE_REQUIREMENTS:
91 case KM_TAG_KDF:
92 default:
93 CHECK(false) << "Unknown or unused enum tag: Something is broken";
94 return keymaster_param_enum(tag, false);
95 }
96}
97
98} // namespace
99
Shawn Willden815e8962020-12-11 13:05:27 +0000100vector<uint8_t> authToken2AidlVec(const HardwareAuthToken& token) {
101 static_assert(1 /* version size */ + sizeof(token.challenge) + sizeof(token.userId) +
102 sizeof(token.authenticatorId) + sizeof(token.authenticatorType) +
103 sizeof(token.timestamp) + 32 /* HMAC size */
104 == sizeof(hw_auth_token_t),
105 "HardwareAuthToken content size does not match hw_auth_token_t size");
106
107 vector<uint8_t> result;
108
109 if (token.mac.size() <= 32) return result;
110
111 result.resize(sizeof(hw_auth_token_t));
112 auto pos = result.begin();
113 *pos++ = 0; // Version byte
114 pos = copy_bytes_to_iterator(token.challenge, pos);
115 pos = copy_bytes_to_iterator(token.userId, pos);
116 pos = copy_bytes_to_iterator(token.authenticatorId, pos);
117 pos = copy_bytes_to_iterator(token.authenticatorType, pos);
118 pos = copy_bytes_to_iterator(token.timestamp, pos);
119 pos = std::copy(token.mac.data(), token.mac.data() + token.mac.size(), pos);
120
121 return result;
122}
123
Shawn Willden815e8962020-12-11 13:05:27 +0000124vector<KeyParameter> kmParamSet2Aidl(const keymaster_key_param_set_t& set) {
125 vector<KeyParameter> result;
126 if (set.length == 0 || set.params == nullptr) return result;
127
Shawn Willden96d4e8c2020-12-07 17:03:54 -0700128 result.reserve(set.length);
Shawn Willden815e8962020-12-11 13:05:27 +0000129 keymaster_key_param_t* params = set.params;
130 for (size_t i = 0; i < set.length; ++i) {
Shawn Willden96d4e8c2020-12-07 17:03:54 -0700131 auto tag = legacy_enum_conversion(params[i].tag);
132 switch (typeFromTag(params[i].tag)) {
Shawn Willden815e8962020-12-11 13:05:27 +0000133 case KM_ENUM:
134 case KM_ENUM_REP:
Shawn Willden96d4e8c2020-12-07 17:03:54 -0700135 result.push_back(kmEnumParam2Aidl(params[i]));
Shawn Willden815e8962020-12-11 13:05:27 +0000136 break;
137 case KM_UINT:
138 case KM_UINT_REP:
Shawn Willden96d4e8c2020-12-07 17:03:54 -0700139 result.push_back(KeyParameter{
140 tag, KeyParameterValue::make<KeyParameterValue::integer>(params[i].integer)});
Shawn Willden815e8962020-12-11 13:05:27 +0000141 break;
142 case KM_ULONG:
143 case KM_ULONG_REP:
Shawn Willden96d4e8c2020-12-07 17:03:54 -0700144 result.push_back(KeyParameter{
145 tag,
146 KeyParameterValue::make<KeyParameterValue::longInteger>(params[i].long_integer)});
Shawn Willden815e8962020-12-11 13:05:27 +0000147 break;
148 case KM_DATE:
Shawn Willden96d4e8c2020-12-07 17:03:54 -0700149 result.push_back(KeyParameter{
150 tag, KeyParameterValue::make<KeyParameterValue::dateTime>(params[i].date_time)});
Shawn Willden815e8962020-12-11 13:05:27 +0000151 break;
152 case KM_BOOL:
Shawn Willden96d4e8c2020-12-07 17:03:54 -0700153 result.push_back(KeyParameter{tag, params[i].boolean});
Shawn Willden815e8962020-12-11 13:05:27 +0000154 break;
155 case KM_BIGNUM:
156 case KM_BYTES:
Shawn Willden96d4e8c2020-12-07 17:03:54 -0700157 result.push_back(
158 {tag, KeyParameterValue::make<KeyParameterValue::blob>(std::vector(
159 params[i].blob.data, params[i].blob.data + params[i].blob.data_length))});
Shawn Willden815e8962020-12-11 13:05:27 +0000160 break;
161 case KM_INVALID:
162 default:
Shawn Willden96d4e8c2020-12-07 17:03:54 -0700163 CHECK(false) << "Unknown or unused enum tag: Something is broken";
164 result.push_back(KeyParameter{tag, false});
Shawn Willden815e8962020-12-11 13:05:27 +0000165 break;
166 }
167 }
168 return result;
169}
170
Shawn Willden815e8962020-12-11 13:05:27 +0000171keymaster_key_param_set_t aidlKeyParams2Km(const vector<KeyParameter>& keyParams) {
172 keymaster_key_param_set_t set;
173
Shawn Willden96d4e8c2020-12-07 17:03:54 -0700174 set.params = static_cast<keymaster_key_param_t*>(
175 malloc(keyParams.size() * sizeof(keymaster_key_param_t)));
Shawn Willden815e8962020-12-11 13:05:27 +0000176 set.length = keyParams.size();
177
178 for (size_t i = 0; i < keyParams.size(); ++i) {
Shawn Willden96d4e8c2020-12-07 17:03:54 -0700179 const auto& param = keyParams[i];
180 auto tag = legacy_enum_conversion(param.tag);
Shawn Willden815e8962020-12-11 13:05:27 +0000181 switch (typeFromTag(tag)) {
Shawn Willden96d4e8c2020-12-07 17:03:54 -0700182
Shawn Willden815e8962020-12-11 13:05:27 +0000183 case KM_ENUM:
184 case KM_ENUM_REP:
Shawn Willden96d4e8c2020-12-07 17:03:54 -0700185 set.params[i] = aidlEnumParam2Km(param);
Shawn Willden815e8962020-12-11 13:05:27 +0000186 break;
Shawn Willden96d4e8c2020-12-07 17:03:54 -0700187
Shawn Willden815e8962020-12-11 13:05:27 +0000188 case KM_UINT:
189 case KM_UINT_REP:
Shawn Willden96d4e8c2020-12-07 17:03:54 -0700190 set.params[i] =
191 param.value.getTag() == KeyParameterValue::integer
192 ? keymaster_param_int(tag, param.value.get<KeyParameterValue::integer>())
193 : kInvalidTag;
Shawn Willden815e8962020-12-11 13:05:27 +0000194 break;
Shawn Willden96d4e8c2020-12-07 17:03:54 -0700195
Shawn Willden815e8962020-12-11 13:05:27 +0000196 case KM_ULONG:
197 case KM_ULONG_REP:
Shawn Willden96d4e8c2020-12-07 17:03:54 -0700198 set.params[i] =
199 param.value.getTag() == KeyParameterValue::longInteger
200 ? keymaster_param_long(tag, param.value.get<KeyParameterValue::longInteger>())
201 : kInvalidTag;
Shawn Willden815e8962020-12-11 13:05:27 +0000202 break;
Shawn Willden96d4e8c2020-12-07 17:03:54 -0700203
Shawn Willden815e8962020-12-11 13:05:27 +0000204 case KM_DATE:
Shawn Willden96d4e8c2020-12-07 17:03:54 -0700205 set.params[i] =
206 param.value.getTag() == KeyParameterValue::dateTime
207 ? keymaster_param_date(tag, param.value.get<KeyParameterValue::dateTime>())
208 : kInvalidTag;
Shawn Willden815e8962020-12-11 13:05:27 +0000209 break;
Shawn Willden96d4e8c2020-12-07 17:03:54 -0700210
Shawn Willden815e8962020-12-11 13:05:27 +0000211 case KM_BOOL:
Shawn Willden96d4e8c2020-12-07 17:03:54 -0700212 set.params[i] = keymaster_param_bool(tag);
Shawn Willden815e8962020-12-11 13:05:27 +0000213 break;
Shawn Willden96d4e8c2020-12-07 17:03:54 -0700214
Shawn Willden815e8962020-12-11 13:05:27 +0000215 case KM_BIGNUM:
216 case KM_BYTES:
Shawn Willden96d4e8c2020-12-07 17:03:54 -0700217 if (param.value.getTag() == KeyParameterValue::blob) {
218 const auto& value = param.value.get<KeyParameterValue::blob>();
219 uint8_t* copy = static_cast<uint8_t*>(malloc(value.size()));
220 std::copy(value.begin(), value.end(), copy);
221 set.params[i] = keymaster_param_blob(tag, copy, value.size());
222 } else {
223 set.params[i] = kInvalidTag;
224 }
Shawn Willden815e8962020-12-11 13:05:27 +0000225 break;
Shawn Willden96d4e8c2020-12-07 17:03:54 -0700226
Shawn Willden815e8962020-12-11 13:05:27 +0000227 case KM_INVALID:
228 default:
Shawn Willden96d4e8c2020-12-07 17:03:54 -0700229 CHECK(false) << "Invalid tag: Something is broken";
Shawn Willden815e8962020-12-11 13:05:27 +0000230 set.params[i].tag = KM_TAG_INVALID;
231 /* just skip */
232 break;
233 }
234 }
235
236 return set;
237}
238
Shawn Willden96d4e8c2020-12-07 17:03:54 -0700239} // namespace aidl::android::hardware::security::keymint::km_utils