blob: 40a890646c0b006d8ebb9cfe9f94001ba5537421 [file] [log] [blame]
Shawn Willden0d560bf2014-12-15 17:44:02 -07001/*
2 * Copyright 2014 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17#include "hmac_key.h"
18
Shawn Willden0f906ec2015-06-20 09:16:30 -060019#include <new>
20
Shawn Willden0d560bf2014-12-15 17:44:02 -070021#include <openssl/err.h>
22#include <openssl/rand.h>
23
24#include "hmac_operation.h"
25
26namespace keymaster {
27
Shawn Willden06298102015-05-25 23:12:48 -060028static HmacSignOperationFactory sign_factory;
29static HmacVerifyOperationFactory verify_factory;
30
31OperationFactory* HmacKeyFactory::GetOperationFactory(keymaster_purpose_t purpose) const {
32 switch (purpose) {
33 case KM_PURPOSE_SIGN:
34 return &sign_factory;
35 case KM_PURPOSE_VERIFY:
36 return &verify_factory;
37 default:
38 return nullptr;
39 }
40}
41
Shawn Willden0cb69422015-05-26 08:31:37 -060042keymaster_error_t HmacKeyFactory::LoadKey(const KeymasterKeyBlob& key_material,
Shawn Willdend599b152015-07-27 16:58:30 -060043 const AuthorizationSet& /* additional_params */,
Shawn Willden0cb69422015-05-26 08:31:37 -060044 const AuthorizationSet& hw_enforced,
45 const AuthorizationSet& sw_enforced,
Shawn Willden06298102015-05-25 23:12:48 -060046 UniquePtr<Key>* key) const {
Shawn Willden0cb69422015-05-26 08:31:37 -060047 if (!key)
48 return KM_ERROR_OUTPUT_PARAMETER_NULL;
Shawn Willdena278f612014-12-23 11:22:21 -070049
Shawn Willden33ab0382015-07-08 08:47:25 -060050 uint32_t min_mac_length;
51 if (!hw_enforced.GetTagValue(TAG_MIN_MAC_LENGTH, &min_mac_length) &&
52 !sw_enforced.GetTagValue(TAG_MIN_MAC_LENGTH, &min_mac_length)) {
53 LOG_E("HMAC key must have KM_TAG_MIN_MAC_LENGTH", 0);
54 return KM_ERROR_INVALID_KEY_BLOB;
55 }
56
Shawn Willden0cb69422015-05-26 08:31:37 -060057 keymaster_error_t error;
Shawn Willden0f906ec2015-06-20 09:16:30 -060058 key->reset(new (std::nothrow) HmacKey(key_material, hw_enforced, sw_enforced, &error));
Shawn Willden0cb69422015-05-26 08:31:37 -060059 if (!key->get())
60 error = KM_ERROR_MEMORY_ALLOCATION_FAILED;
61 return error;
Shawn Willdenf9239632015-05-12 06:57:37 -060062}
Shawn Willdena278f612014-12-23 11:22:21 -070063
Shawn Willden33ab0382015-07-08 08:47:25 -060064keymaster_error_t HmacKeyFactory::validate_algorithm_specific_new_key_params(
65 const AuthorizationSet& key_description) const {
66 uint32_t min_mac_length_bits;
67 if (!key_description.GetTagValue(TAG_MIN_MAC_LENGTH, &min_mac_length_bits))
68 return KM_ERROR_MISSING_MIN_MAC_LENGTH;
69
70 keymaster_digest_t digest;
71 if (!key_description.GetTagValue(TAG_DIGEST, &digest)) {
72 LOG_E("%d digests specified for HMAC key", key_description.GetTagCount(TAG_DIGEST));
73 return KM_ERROR_UNSUPPORTED_DIGEST;
74 }
75
76 size_t hash_size_bits = 0;
77 switch (digest) {
78 case KM_DIGEST_NONE:
79 return KM_ERROR_UNSUPPORTED_DIGEST;
80 case KM_DIGEST_MD5:
81 hash_size_bits = 128;
82 break;
83 case KM_DIGEST_SHA1:
84 hash_size_bits = 160;
85 break;
86 case KM_DIGEST_SHA_2_224:
87 hash_size_bits = 224;
88 break;
89 case KM_DIGEST_SHA_2_256:
90 hash_size_bits = 256;
91 break;
92 case KM_DIGEST_SHA_2_384:
93 hash_size_bits = 384;
94 break;
95 case KM_DIGEST_SHA_2_512:
96 hash_size_bits = 512;
97 break;
98 };
99
100 if (hash_size_bits == 0) {
101 // digest was not matched
102 return KM_ERROR_UNSUPPORTED_DIGEST;
103 }
104
105 if (min_mac_length_bits % 8 != 0 || min_mac_length_bits > hash_size_bits)
106 return KM_ERROR_UNSUPPORTED_MIN_MAC_LENGTH;
107
108 if (min_mac_length_bits < kMinHmacLengthBits)
109 return KM_ERROR_UNSUPPORTED_MIN_MAC_LENGTH;
110
111 return KM_ERROR_OK;
112}
113
Shawn Willden0d560bf2014-12-15 17:44:02 -0700114} // namespace keymaster