blob: 1af58cabf20e17849b5e8c7231e952ab23b36440 [file] [log] [blame]
Shawn Willdend67afae2014-08-19 12:36:27 -06001/*
2 * Copyright 2014 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
Shawn Willdena278f612014-12-23 11:22:21 -070017#include "asymmetric_key.h"
18
Shawn Willdenf268d742014-08-19 15:36:26 -060019#include <openssl/x509.h>
20
Shawn Willdenb9d584d2015-01-22 16:35:00 -070021#include <hardware/keymaster_defs.h>
Shawn Willden98d9b922014-08-26 08:14:10 -060022
Thai Duongf862a762015-03-18 14:10:56 -070023#include "ec_key.h"
Shawn Willden567a4a02014-12-31 12:14:46 -070024#include "openssl_err.h"
Shawn Willdend67afae2014-08-19 12:36:27 -060025#include "openssl_utils.h"
Shawn Willdena278f612014-12-23 11:22:21 -070026#include "rsa_key.h"
Shawn Willden72014ad2014-09-17 13:04:10 -060027#include "unencrypted_key_blob.h"
Shawn Willdend67afae2014-08-19 12:36:27 -060028
29namespace keymaster {
30
Shawn Willdena278f612014-12-23 11:22:21 -070031EVP_PKEY* AsymmetricKeyFactory::ExtractEvpKey(keymaster_key_format_t key_format,
32 keymaster_algorithm_t expected_algorithm,
33 const uint8_t* key_data, size_t key_data_length,
34 keymaster_error_t* error) {
Shawn Willden4d306ec2015-03-04 07:29:49 -070035 *error = KM_ERROR_UNSUPPORTED_KEY_FORMAT;
36 if (key_format != KM_KEY_FORMAT_PKCS8)
Shawn Willdena278f612014-12-23 11:22:21 -070037 return NULL;
Shawn Willdena278f612014-12-23 11:22:21 -070038
Shawn Willden4d306ec2015-03-04 07:29:49 -070039 UniquePtr<EVP_PKEY, EVP_PKEY_Delete> pkey;
40 *error = convert_pkcs8_blob_to_evp(key_data, key_data_length, expected_algorithm, &pkey);
41 if (*error != KM_ERROR_OK)
Shawn Willdena278f612014-12-23 11:22:21 -070042 return NULL;
Shawn Willdena278f612014-12-23 11:22:21 -070043
44 return pkey.release();
45}
46
47static const keymaster_key_format_t supported_import_formats[] = {KM_KEY_FORMAT_PKCS8};
48const keymaster_key_format_t* AsymmetricKeyFactory::SupportedImportFormats(size_t* format_count) {
49 *format_count = array_length(supported_import_formats);
50 return supported_import_formats;
51}
52
53static const keymaster_key_format_t supported_export_formats[] = {KM_KEY_FORMAT_X509};
54const keymaster_key_format_t* AsymmetricKeyFactory::SupportedExportFormats(size_t* format_count) {
55 *format_count = array_length(supported_export_formats);
56 return supported_export_formats;
57}
58
Shawn Willden72014ad2014-09-17 13:04:10 -060059keymaster_error_t AsymmetricKey::LoadKey(const UnencryptedKeyBlob& blob) {
Shawn Willdend67afae2014-08-19 12:36:27 -060060 UniquePtr<EVP_PKEY, EVP_PKEY_Delete> evp_key(EVP_PKEY_new());
61 if (evp_key.get() == NULL)
62 return KM_ERROR_MEMORY_ALLOCATION_FAILED;
63
64 EVP_PKEY* tmp_pkey = evp_key.get();
Shawn Willden72014ad2014-09-17 13:04:10 -060065 const uint8_t* key_material = blob.unencrypted_key_material();
Shawn Willdend67afae2014-08-19 12:36:27 -060066 if (d2i_PrivateKey(evp_key_type(), &tmp_pkey, &key_material, blob.key_material_length()) ==
Shawn Willdenf01329d2015-03-11 21:51:38 -060067 NULL)
68 return TranslateLastOpenSslError();
Shawn Willdend67afae2014-08-19 12:36:27 -060069 if (!EvpToInternal(evp_key.get()))
Shawn Willden567a4a02014-12-31 12:14:46 -070070 return TranslateLastOpenSslError();
Shawn Willdend67afae2014-08-19 12:36:27 -060071
72 return KM_ERROR_OK;
73}
74
75keymaster_error_t AsymmetricKey::key_material(UniquePtr<uint8_t[]>* material, size_t* size) const {
76 if (material == NULL || size == NULL)
77 return KM_ERROR_OUTPUT_PARAMETER_NULL;
78
79 UniquePtr<EVP_PKEY, EVP_PKEY_Delete> pkey(EVP_PKEY_new());
80 if (pkey.get() == NULL)
81 return KM_ERROR_MEMORY_ALLOCATION_FAILED;
82
83 if (!InternalToEvp(pkey.get()))
Shawn Willden567a4a02014-12-31 12:14:46 -070084 return TranslateLastOpenSslError();
Shawn Willdend67afae2014-08-19 12:36:27 -060085
86 *size = i2d_PrivateKey(pkey.get(), NULL /* key_data*/);
87 if (*size <= 0)
Shawn Willden567a4a02014-12-31 12:14:46 -070088 return TranslateLastOpenSslError();
Shawn Willdend67afae2014-08-19 12:36:27 -060089
90 material->reset(new uint8_t[*size]);
91 uint8_t* tmp = material->get();
92 i2d_PrivateKey(pkey.get(), &tmp);
93
94 return KM_ERROR_OK;
95}
96
Shawn Willdenf268d742014-08-19 15:36:26 -060097keymaster_error_t AsymmetricKey::formatted_key_material(keymaster_key_format_t format,
98 UniquePtr<uint8_t[]>* material,
Shawn Willdend67afae2014-08-19 12:36:27 -060099 size_t* size) const {
Shawn Willdenf268d742014-08-19 15:36:26 -0600100 if (format != KM_KEY_FORMAT_X509)
101 return KM_ERROR_UNSUPPORTED_KEY_FORMAT;
102
Shawn Willdend67afae2014-08-19 12:36:27 -0600103 if (material == NULL || size == NULL)
104 return KM_ERROR_OUTPUT_PARAMETER_NULL;
105
Shawn Willdenf268d742014-08-19 15:36:26 -0600106 UniquePtr<EVP_PKEY, EVP_PKEY_Delete> pkey(EVP_PKEY_new());
107 if (!InternalToEvp(pkey.get()))
Shawn Willden567a4a02014-12-31 12:14:46 -0700108 return TranslateLastOpenSslError();
Shawn Willdenf268d742014-08-19 15:36:26 -0600109
110 int key_data_length = i2d_PUBKEY(pkey.get(), NULL);
111 if (key_data_length <= 0)
Shawn Willden567a4a02014-12-31 12:14:46 -0700112 return TranslateLastOpenSslError();
Shawn Willdenf268d742014-08-19 15:36:26 -0600113
114 material->reset(new uint8_t[key_data_length]);
115 if (material->get() == NULL)
116 return KM_ERROR_MEMORY_ALLOCATION_FAILED;
117
118 uint8_t* tmp = material->get();
119 if (i2d_PUBKEY(pkey.get(), &tmp) != key_data_length) {
120 material->reset();
Shawn Willden567a4a02014-12-31 12:14:46 -0700121 return TranslateLastOpenSslError();
Shawn Willdenf268d742014-08-19 15:36:26 -0600122 }
123
124 *size = key_data_length;
125 return KM_ERROR_OK;
Shawn Willdend67afae2014-08-19 12:36:27 -0600126}
127
Shawn Willdend67afae2014-08-19 12:36:27 -0600128} // namespace keymaster