blob: c36531ddba38045465910f282815e2f936fa779a [file] [log] [blame]
Shawn Willden63ac0432014-12-29 14:07:08 -07001/*
2 * Copyright 2014 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17#include "operation.h"
18
Shawn Willden117a0cc2015-06-01 07:05:41 -060019#include <keymaster/authorization_set.h>
20
21#include "key.h"
22
Shawn Willden63ac0432014-12-29 14:07:08 -070023namespace keymaster {
24
Shawn Willdend92591d2014-12-30 18:19:10 -070025bool OperationFactory::supported(keymaster_padding_t padding) const {
26 size_t padding_count;
27 const keymaster_padding_t* supported_paddings = SupportedPaddingModes(&padding_count);
28 for (size_t i = 0; i < padding_count; ++i)
29 if (padding == supported_paddings[i])
30 return true;
31 return false;
32}
33
34bool OperationFactory::supported(keymaster_block_mode_t block_mode) const {
35 size_t block_mode_count;
36 const keymaster_block_mode_t* supported_block_modes = SupportedBlockModes(&block_mode_count);
37 for (size_t i = 0; i < block_mode_count; ++i)
38 if (block_mode == supported_block_modes[i])
39 return true;
40 return false;
41}
42
43bool OperationFactory::supported(keymaster_digest_t digest) const {
44 size_t digest_count;
45 const keymaster_digest_t* supported_digests = SupportedDigests(&digest_count);
46 for (size_t i = 0; i < digest_count; ++i)
47 if (digest == supported_digests[i])
48 return true;
49 return false;
50}
51
Shawn Willden294a2db2015-06-17 11:20:56 -060052inline bool is_public_key_algorithm(keymaster_algorithm_t algorithm) {
53 switch (algorithm) {
54 case KM_ALGORITHM_HMAC:
55 case KM_ALGORITHM_AES:
56 return false;
57 case KM_ALGORITHM_RSA:
58 case KM_ALGORITHM_EC:
59 return true;
60 }
61
62 // Unreachable.
63 assert(false);
64 return false;
65}
66
67bool OperationFactory::is_public_key_operation() const {
68 KeyType key_type = registry_key();
69
70 if (!is_public_key_algorithm(key_type.algorithm))
71 return false;
72
73 switch (key_type.purpose) {
74 case KM_PURPOSE_VERIFY:
75 case KM_PURPOSE_ENCRYPT:
76 return true;
77 case KM_PURPOSE_SIGN:
78 case KM_PURPOSE_DECRYPT:
Shawn Willdend4c83db2015-12-22 14:40:15 -070079 case KM_PURPOSE_DERIVE_KEY:
Shawn Willden294a2db2015-06-17 11:20:56 -060080 return false;
81 };
82
83 // Unreachable.
84 assert(false);
85 return false;
86}
87
Shawn Willden117a0cc2015-06-01 07:05:41 -060088bool OperationFactory::GetAndValidatePadding(const AuthorizationSet& begin_params, const Key& key,
89 keymaster_padding_t* padding,
90 keymaster_error_t* error) const {
91 *error = KM_ERROR_UNSUPPORTED_PADDING_MODE;
92 if (!begin_params.GetTagValue(TAG_PADDING, padding)) {
93 LOG_E("%d padding modes specified in begin params", begin_params.GetTagCount(TAG_PADDING));
94 return false;
95 } else if (!supported(*padding)) {
96 LOG_E("Padding mode %d not supported", *padding);
97 return false;
Shawn Willdenbfd9ed72015-06-11 10:51:12 -060098 } else if (
Shawn Willden294a2db2015-06-17 11:20:56 -060099 // If it's a public key operation, all padding modes are authorized.
100 !is_public_key_operation() &&
Shawn Willdenbfd9ed72015-06-11 10:51:12 -0600101 // Otherwise the key needs to authorize the specific mode.
102 !key.authorizations().Contains(TAG_PADDING, *padding) &&
103 !key.authorizations().Contains(TAG_PADDING_OLD, *padding)) {
Shawn Willden117a0cc2015-06-01 07:05:41 -0600104 LOG_E("Padding mode %d was specified, but not authorized by key", *padding);
105 *error = KM_ERROR_INCOMPATIBLE_PADDING_MODE;
106 return false;
107 }
108
109 *error = KM_ERROR_OK;
110 return true;
111}
112
113bool OperationFactory::GetAndValidateDigest(const AuthorizationSet& begin_params, const Key& key,
114 keymaster_digest_t* digest,
115 keymaster_error_t* error) const {
116 *error = KM_ERROR_UNSUPPORTED_DIGEST;
117 if (!begin_params.GetTagValue(TAG_DIGEST, digest)) {
118 LOG_E("%d digests specified in begin params", begin_params.GetTagCount(TAG_DIGEST));
119 return false;
120 } else if (!supported(*digest)) {
121 LOG_E("Digest %d not supported", *digest);
122 return false;
Shawn Willdenbfd9ed72015-06-11 10:51:12 -0600123 } else if (
Shawn Willden294a2db2015-06-17 11:20:56 -0600124 // If it's a public key operation, all digests are authorized.
125 !is_public_key_operation() &&
Shawn Willdenbfd9ed72015-06-11 10:51:12 -0600126 // Otherwise the key needs to authorize the specific digest.
127 !key.authorizations().Contains(TAG_DIGEST, *digest) &&
128 !key.authorizations().Contains(TAG_DIGEST_OLD, *digest)) {
Shawn Willden117a0cc2015-06-01 07:05:41 -0600129 LOG_E("Digest %d was specified, but not authorized by key", *digest);
130 *error = KM_ERROR_INCOMPATIBLE_DIGEST;
131 return false;
132 }
133 *error = KM_ERROR_OK;
134 return true;
135}
136
Shawn Willden63ac0432014-12-29 14:07:08 -0700137} // namespace keymaster