blob: 4231953a8f98d92dd50d46dc1d4a8b670b41ef0d [file] [log] [blame]
Shawn Willden2c8dd3e2014-09-18 15:16:31 -06001/*
2 * Copyright 2014 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
Shawn Willden2c8dd3e2014-09-18 15:16:31 -060017#include "rsa_key.h"
Shawn Willden567a4a02014-12-31 12:14:46 -070018
Shawn Willden0cb69422015-05-26 08:31:37 -060019#include <keymaster/keymaster_context.h>
20
Shawn Willden567a4a02014-12-31 12:14:46 -070021#include "openssl_err.h"
22#include "openssl_utils.h"
Shawn Willden06298102015-05-25 23:12:48 -060023#include "rsa_operation.h"
Shawn Willden2c8dd3e2014-09-18 15:16:31 -060024
25namespace keymaster {
26
Shawn Willden2c8dd3e2014-09-18 15:16:31 -060027bool RsaKey::EvpToInternal(const EVP_PKEY* pkey) {
28 rsa_key_.reset(EVP_PKEY_get1_RSA(const_cast<EVP_PKEY*>(pkey)));
29 return rsa_key_.get() != NULL;
30}
31
32bool RsaKey::InternalToEvp(EVP_PKEY* pkey) const {
33 return EVP_PKEY_set1_RSA(pkey, rsa_key_.get()) == 1;
34}
35
Shawn Willden4200f212014-12-02 07:01:21 -070036bool RsaKey::SupportedMode(keymaster_purpose_t purpose, keymaster_padding_t padding) {
37 switch (purpose) {
38 case KM_PURPOSE_SIGN:
39 case KM_PURPOSE_VERIFY:
Shawn Willdenf90f2352014-12-18 23:01:15 -070040 return padding == KM_PAD_NONE || padding == KM_PAD_RSA_PSS ||
41 padding == KM_PAD_RSA_PKCS1_1_5_SIGN;
Shawn Willdend4c83db2015-12-22 14:40:15 -070042
Shawn Willden4200f212014-12-02 07:01:21 -070043 case KM_PURPOSE_ENCRYPT:
44 case KM_PURPOSE_DECRYPT:
45 return padding == KM_PAD_RSA_OAEP || padding == KM_PAD_RSA_PKCS1_1_5_ENCRYPT;
Shawn Willdend4c83db2015-12-22 14:40:15 -070046
47 case KM_PURPOSE_DERIVE_KEY:
48 return false;
Shawn Willden4200f212014-12-02 07:01:21 -070049 };
50 return false;
51}
52
53bool RsaKey::SupportedMode(keymaster_purpose_t purpose, keymaster_digest_t digest) {
54 switch (purpose) {
55 case KM_PURPOSE_SIGN:
56 case KM_PURPOSE_VERIFY:
Shawn Willden61902362014-12-18 10:33:24 -070057 return digest == KM_DIGEST_NONE || digest == KM_DIGEST_SHA_2_256;
Shawn Willdend4c83db2015-12-22 14:40:15 -070058
Shawn Willden4200f212014-12-02 07:01:21 -070059 case KM_PURPOSE_ENCRYPT:
60 case KM_PURPOSE_DECRYPT:
61 /* Don't care */
62 break;
Shawn Willdend4c83db2015-12-22 14:40:15 -070063
64 case KM_PURPOSE_DERIVE_KEY:
65 return false;
Shawn Willden4200f212014-12-02 07:01:21 -070066 };
67 return true;
68}
69
Shawn Willden2c8dd3e2014-09-18 15:16:31 -060070} // namespace keymaster