blob: 96440fffc1657103bdb799e531b0ef8b6b2f6a2c [file] [log] [blame]
Shawn Willden19fca882015-01-22 16:35:30 -07001/*
2 * Copyright 2014 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
Shawn Willden907c3012014-12-08 15:51:55 -070017#include <assert.h>
18
Shawn Willden19fca882015-01-22 16:35:30 -070019#include <openssl/err.h>
20#include <openssl/rand.h>
21
22#include "aes_key.h"
Shawn Willden907c3012014-12-08 15:51:55 -070023#include "aes_operation.h"
24#include "unencrypted_key_blob.h"
Shawn Willden19fca882015-01-22 16:35:30 -070025
26namespace keymaster {
27
28AesKey* AesKey::GenerateKey(const AuthorizationSet& key_description, const Logger& logger,
29 keymaster_error_t* error) {
30 if (!error)
31 return NULL;
32
33 AuthorizationSet authorizations(key_description);
34 uint32_t key_size_bits;
35 if (!authorizations.GetTagValue(TAG_KEY_SIZE, &key_size_bits) ||
36 !size_is_supported(key_size_bits)) {
37 *error = KM_ERROR_UNSUPPORTED_KEY_SIZE;
38 return NULL;
39 }
40
Shawn Willden19fca882015-01-22 16:35:30 -070041 size_t key_data_size = key_size_bits / 8;
Shawn Willden907c3012014-12-08 15:51:55 -070042 uint8_t key_data[MAX_KEY_SIZE];
43 Eraser erase_key_data(key_data, MAX_KEY_SIZE);
44 if (!RAND_bytes(key_data, key_data_size)) {
Shawn Willden19fca882015-01-22 16:35:30 -070045 logger.error("Error %ul generating %d bit AES key", ERR_get_error(), key_size_bits);
46 *error = KM_ERROR_UNKNOWN_ERROR;
47 return NULL;
48 }
49
50 *error = KM_ERROR_OK;
Shawn Willden907c3012014-12-08 15:51:55 -070051 return new AesKey(key_data, key_data_size, authorizations, logger);
Shawn Willden19fca882015-01-22 16:35:30 -070052}
53
54bool AesKey::ModeAndPurposesAreCompatible(const AuthorizationSet& authorizations,
55 keymaster_block_mode_t block_mode, const Logger& logger) {
56 keymaster_purpose_t purpose;
57 for (size_t i = 0; authorizations.GetTagValue(TAG_PURPOSE, i, &purpose); ++i) {
58 switch (purpose) {
59 case KM_PURPOSE_SIGN:
60 case KM_PURPOSE_VERIFY:
Shawn Willden6dde87c2014-12-11 14:08:48 -070061 if (block_mode < KM_MODE_FIRST_MAC) {
62 logger.error("Only MACing modes are supported for signing and verification "
63 "purposes.");
Shawn Willden19fca882015-01-22 16:35:30 -070064 return false;
65 }
66 break;
67
68 case KM_PURPOSE_ENCRYPT:
69 case KM_PURPOSE_DECRYPT:
70 if (block_mode >= KM_MODE_FIRST_MAC) {
71 logger.error("MACing modes not supported for encryption and decryption purposes.");
72 return false;
73 }
74 break;
75 }
76 }
77 return true;
78}
79
Shawn Willden907c3012014-12-08 15:51:55 -070080AesKey::AesKey(const uint8_t(&key_data)[MAX_KEY_SIZE], size_t key_data_size,
81 AuthorizationSet& auths, const Logger& logger)
82 : Key(auths, logger), key_data_size_(key_data_size) {
83 memcpy(key_data_, key_data, key_data_size);
84}
85
86AesKey::AesKey(const UnencryptedKeyBlob& blob, const Logger& logger, keymaster_error_t* error)
87 : Key(blob, logger), key_data_size_(blob.unencrypted_key_material_length()) {
88 if (error)
89 *error = LoadKey(blob);
90}
91
92AesKey::~AesKey() {
93 memset_s(key_data_, 0, MAX_KEY_SIZE);
94}
95
96keymaster_error_t AesKey::LoadKey(const UnencryptedKeyBlob& blob) {
97 assert(blob.unencrypted_key_material_length() == key_data_size_);
98 memcpy(key_data_, blob.unencrypted_key_material(), key_data_size_);
99
100 return KM_ERROR_OK;
101}
102
103Operation* AesKey::CreateOperation(keymaster_purpose_t purpose, keymaster_error_t* error) {
104 keymaster_block_mode_t block_mode;
105 if (!authorizations().GetTagValue(TAG_BLOCK_MODE, &block_mode)) {
106 *error = KM_ERROR_UNSUPPORTED_BLOCK_MODE;
107 return NULL;
108 }
109
110 switch (block_mode) {
111 case KM_MODE_OCB:
112 return CreateOcbOperation(purpose, error);
113 default:
114 *error = KM_ERROR_UNSUPPORTED_BLOCK_MODE;
115 return NULL;
116 }
117}
118
119Operation* AesKey::CreateOcbOperation(keymaster_purpose_t purpose, keymaster_error_t* error) {
120 *error = KM_ERROR_OK;
121
122 uint32_t chunk_length;
123 if (!authorizations().GetTagValue(TAG_CHUNK_LENGTH, &chunk_length))
124 // TODO(swillden): Create and use a better return code.
Shawn Willdenbe4a2a32014-12-15 14:51:10 -0700125 *error = KM_ERROR_INVALID_ARGUMENT;
Shawn Willden907c3012014-12-08 15:51:55 -0700126
127 uint32_t tag_length;
128 if (!authorizations().GetTagValue(TAG_MAC_LENGTH, &tag_length))
129 // TODO(swillden): Create and use a better return code.
Shawn Willdenbe4a2a32014-12-15 14:51:10 -0700130 *error = KM_ERROR_INVALID_ARGUMENT;
131
132 keymaster_padding_t padding;
133 if (authorizations().GetTagValue(TAG_PADDING, &padding) && padding != KM_PAD_NONE) {
134 *error = KM_ERROR_UNSUPPORTED_PADDING_MODE;
135 }
Shawn Willden907c3012014-12-08 15:51:55 -0700136
137 if (*error != KM_ERROR_OK)
138 return NULL;
139
140 keymaster_blob_t additional_data = {0, 0};
141 authorizations().GetTagValue(TAG_ADDITIONAL_DATA, &additional_data);
142
143 Operation* op = NULL;
144 switch (purpose) {
145 case KM_PURPOSE_ENCRYPT:
Shawn Willden6dde87c2014-12-11 14:08:48 -0700146 case KM_PURPOSE_DECRYPT:
147 op = new AesOcbOperation(purpose, logger_, key_data_, key_data_size_, chunk_length,
148 tag_length, additional_data);
Shawn Willden907c3012014-12-08 15:51:55 -0700149 break;
150 default:
151 *error = KM_ERROR_UNSUPPORTED_PURPOSE;
152 return NULL;
153 }
154
155 if (!op)
156 *error = KM_ERROR_MEMORY_ALLOCATION_FAILED;
157
158 return op;
Shawn Willden19fca882015-01-22 16:35:30 -0700159}
160
161keymaster_error_t AesKey::key_material(UniquePtr<uint8_t[]>* key_material, size_t* size) const {
162 *size = key_data_size_;
163 key_material->reset(new uint8_t[*size]);
Shawn Willden907c3012014-12-08 15:51:55 -0700164 if (!key_material->get())
165 return KM_ERROR_MEMORY_ALLOCATION_FAILED;
166 memcpy(key_material->get(), key_data_, *size);
Shawn Willden19fca882015-01-22 16:35:30 -0700167 return KM_ERROR_OK;
168}
169
170} // namespace keymaster