1*789431f2SAndroid Build Coastguard Worker /*
2*789431f2SAndroid Build Coastguard Worker * Copyright 2014 The Android Open Source Project
3*789431f2SAndroid Build Coastguard Worker *
4*789431f2SAndroid Build Coastguard Worker * Licensed under the Apache License, Version 2.0 (the "License");
5*789431f2SAndroid Build Coastguard Worker * you may not use this file except in compliance with the License.
6*789431f2SAndroid Build Coastguard Worker * You may obtain a copy of the License at
7*789431f2SAndroid Build Coastguard Worker *
8*789431f2SAndroid Build Coastguard Worker * http://www.apache.org/licenses/LICENSE-2.0
9*789431f2SAndroid Build Coastguard Worker *
10*789431f2SAndroid Build Coastguard Worker * Unless required by applicable law or agreed to in writing, software
11*789431f2SAndroid Build Coastguard Worker * distributed under the License is distributed on an "AS IS" BASIS,
12*789431f2SAndroid Build Coastguard Worker * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13*789431f2SAndroid Build Coastguard Worker * See the License for the specific language governing permissions and
14*789431f2SAndroid Build Coastguard Worker * limitations under the License.
15*789431f2SAndroid Build Coastguard Worker */
16*789431f2SAndroid Build Coastguard Worker
17*789431f2SAndroid Build Coastguard Worker #include <keymaster/km_openssl/symmetric_key.h>
18*789431f2SAndroid Build Coastguard Worker
19*789431f2SAndroid Build Coastguard Worker #include <utility>
20*789431f2SAndroid Build Coastguard Worker
21*789431f2SAndroid Build Coastguard Worker #include <assert.h>
22*789431f2SAndroid Build Coastguard Worker #include <inttypes.h>
23*789431f2SAndroid Build Coastguard Worker
24*789431f2SAndroid Build Coastguard Worker #include <openssl/err.h>
25*789431f2SAndroid Build Coastguard Worker #include <openssl/rand.h>
26*789431f2SAndroid Build Coastguard Worker
27*789431f2SAndroid Build Coastguard Worker #include <keymaster/android_keymaster_utils.h>
28*789431f2SAndroid Build Coastguard Worker #include <keymaster/keymaster_context.h>
29*789431f2SAndroid Build Coastguard Worker #include <keymaster/km_openssl/aes_key.h>
30*789431f2SAndroid Build Coastguard Worker #include <keymaster/km_openssl/hmac_key.h>
31*789431f2SAndroid Build Coastguard Worker #include <keymaster/km_openssl/openssl_err.h>
32*789431f2SAndroid Build Coastguard Worker #include <keymaster/logger.h>
33*789431f2SAndroid Build Coastguard Worker
34*789431f2SAndroid Build Coastguard Worker namespace keymaster {
35*789431f2SAndroid Build Coastguard Worker
GenerateKey(const AuthorizationSet & key_description,UniquePtr<Key>,const KeymasterBlob &,KeymasterKeyBlob * key_blob,AuthorizationSet * hw_enforced,AuthorizationSet * sw_enforced,CertificateChain *) const36*789431f2SAndroid Build Coastguard Worker keymaster_error_t SymmetricKeyFactory::GenerateKey(const AuthorizationSet& key_description,
37*789431f2SAndroid Build Coastguard Worker UniquePtr<Key> /* attest_key */,
38*789431f2SAndroid Build Coastguard Worker const KeymasterBlob& /* issuer_subject */,
39*789431f2SAndroid Build Coastguard Worker KeymasterKeyBlob* key_blob,
40*789431f2SAndroid Build Coastguard Worker AuthorizationSet* hw_enforced,
41*789431f2SAndroid Build Coastguard Worker AuthorizationSet* sw_enforced,
42*789431f2SAndroid Build Coastguard Worker CertificateChain* /* cert_chain */) const {
43*789431f2SAndroid Build Coastguard Worker if (!key_blob || !hw_enforced || !sw_enforced) return KM_ERROR_OUTPUT_PARAMETER_NULL;
44*789431f2SAndroid Build Coastguard Worker
45*789431f2SAndroid Build Coastguard Worker uint32_t key_size_bits;
46*789431f2SAndroid Build Coastguard Worker if (!key_description.GetTagValue(TAG_KEY_SIZE, &key_size_bits) ||
47*789431f2SAndroid Build Coastguard Worker !key_size_supported(key_size_bits))
48*789431f2SAndroid Build Coastguard Worker return KM_ERROR_UNSUPPORTED_KEY_SIZE;
49*789431f2SAndroid Build Coastguard Worker
50*789431f2SAndroid Build Coastguard Worker keymaster_error_t error = validate_algorithm_specific_new_key_params(key_description);
51*789431f2SAndroid Build Coastguard Worker if (error != KM_ERROR_OK) return error;
52*789431f2SAndroid Build Coastguard Worker
53*789431f2SAndroid Build Coastguard Worker size_t key_data_size = key_size_bytes(key_size_bits);
54*789431f2SAndroid Build Coastguard Worker KeymasterKeyBlob key_material(key_data_size);
55*789431f2SAndroid Build Coastguard Worker if (!key_material.key_material) return KM_ERROR_MEMORY_ALLOCATION_FAILED;
56*789431f2SAndroid Build Coastguard Worker
57*789431f2SAndroid Build Coastguard Worker error = random_source_.GenerateRandom(key_material.writable_data(), key_data_size);
58*789431f2SAndroid Build Coastguard Worker if (error != KM_ERROR_OK) {
59*789431f2SAndroid Build Coastguard Worker LOG_E("Error generating %d bit symmetric key", key_size_bits);
60*789431f2SAndroid Build Coastguard Worker return error;
61*789431f2SAndroid Build Coastguard Worker }
62*789431f2SAndroid Build Coastguard Worker
63*789431f2SAndroid Build Coastguard Worker return blob_maker_.CreateKeyBlob(key_description, KM_ORIGIN_GENERATED, key_material, key_blob,
64*789431f2SAndroid Build Coastguard Worker hw_enforced, sw_enforced);
65*789431f2SAndroid Build Coastguard Worker }
66*789431f2SAndroid Build Coastguard Worker
ImportKey(const AuthorizationSet & key_description,keymaster_key_format_t input_key_material_format,const KeymasterKeyBlob & input_key_material,UniquePtr<Key>,const KeymasterBlob &,KeymasterKeyBlob * output_key_blob,AuthorizationSet * hw_enforced,AuthorizationSet * sw_enforced,CertificateChain *) const67*789431f2SAndroid Build Coastguard Worker keymaster_error_t SymmetricKeyFactory::ImportKey(const AuthorizationSet& key_description, //
68*789431f2SAndroid Build Coastguard Worker keymaster_key_format_t input_key_material_format,
69*789431f2SAndroid Build Coastguard Worker const KeymasterKeyBlob& input_key_material, //
70*789431f2SAndroid Build Coastguard Worker UniquePtr<Key> /* attest_key */,
71*789431f2SAndroid Build Coastguard Worker const KeymasterBlob& /* issuer_subject */,
72*789431f2SAndroid Build Coastguard Worker KeymasterKeyBlob* output_key_blob,
73*789431f2SAndroid Build Coastguard Worker AuthorizationSet* hw_enforced,
74*789431f2SAndroid Build Coastguard Worker AuthorizationSet* sw_enforced,
75*789431f2SAndroid Build Coastguard Worker CertificateChain* /* cert_chain */) const {
76*789431f2SAndroid Build Coastguard Worker if (!output_key_blob || !hw_enforced || !sw_enforced) return KM_ERROR_OUTPUT_PARAMETER_NULL;
77*789431f2SAndroid Build Coastguard Worker
78*789431f2SAndroid Build Coastguard Worker AuthorizationSet authorizations(key_description);
79*789431f2SAndroid Build Coastguard Worker
80*789431f2SAndroid Build Coastguard Worker uint32_t key_bits;
81*789431f2SAndroid Build Coastguard Worker if (!authorizations.GetTagValue(TAG_KEY_SIZE, &key_bits)) {
82*789431f2SAndroid Build Coastguard Worker // Determine key size if not provided.
83*789431f2SAndroid Build Coastguard Worker key_bits = key_size_bits(input_key_material.key_material_size);
84*789431f2SAndroid Build Coastguard Worker authorizations.push_back(TAG_KEY_SIZE, key_bits);
85*789431f2SAndroid Build Coastguard Worker }
86*789431f2SAndroid Build Coastguard Worker
87*789431f2SAndroid Build Coastguard Worker keymaster_error_t error = validate_algorithm_specific_new_key_params(key_description);
88*789431f2SAndroid Build Coastguard Worker if (error != KM_ERROR_OK) return error;
89*789431f2SAndroid Build Coastguard Worker if (!key_size_supported(key_bits)) return KM_ERROR_UNSUPPORTED_KEY_SIZE;
90*789431f2SAndroid Build Coastguard Worker if (input_key_material_format != KM_KEY_FORMAT_RAW) return KM_ERROR_UNSUPPORTED_KEY_FORMAT;
91*789431f2SAndroid Build Coastguard Worker
92*789431f2SAndroid Build Coastguard Worker if (key_bits != key_size_bits(input_key_material.key_material_size)) {
93*789431f2SAndroid Build Coastguard Worker LOG_E("Expected %" PRIu32 "-bit key data but got %zu-bit key", key_bits,
94*789431f2SAndroid Build Coastguard Worker key_size_bits(input_key_material.key_material_size));
95*789431f2SAndroid Build Coastguard Worker return KM_ERROR_INVALID_KEY_BLOB;
96*789431f2SAndroid Build Coastguard Worker }
97*789431f2SAndroid Build Coastguard Worker
98*789431f2SAndroid Build Coastguard Worker return blob_maker_.CreateKeyBlob(authorizations, KM_ORIGIN_IMPORTED, input_key_material,
99*789431f2SAndroid Build Coastguard Worker output_key_blob, hw_enforced, sw_enforced);
100*789431f2SAndroid Build Coastguard Worker }
101*789431f2SAndroid Build Coastguard Worker
102*789431f2SAndroid Build Coastguard Worker static const keymaster_key_format_t supported_import_formats[] = {KM_KEY_FORMAT_RAW};
103*789431f2SAndroid Build Coastguard Worker const keymaster_key_format_t*
SupportedImportFormats(size_t * format_count) const104*789431f2SAndroid Build Coastguard Worker SymmetricKeyFactory::SupportedImportFormats(size_t* format_count) const {
105*789431f2SAndroid Build Coastguard Worker *format_count = array_length(supported_import_formats);
106*789431f2SAndroid Build Coastguard Worker return supported_import_formats;
107*789431f2SAndroid Build Coastguard Worker }
108*789431f2SAndroid Build Coastguard Worker
SymmetricKey(KeymasterKeyBlob && key_material,AuthorizationSet && hw_enforced,AuthorizationSet && sw_enforced,const KeyFactory * key_factory)109*789431f2SAndroid Build Coastguard Worker SymmetricKey::SymmetricKey(KeymasterKeyBlob&& key_material, AuthorizationSet&& hw_enforced,
110*789431f2SAndroid Build Coastguard Worker AuthorizationSet&& sw_enforced, const KeyFactory* key_factory)
111*789431f2SAndroid Build Coastguard Worker : Key(std::move(hw_enforced), std::move(sw_enforced), key_factory) {
112*789431f2SAndroid Build Coastguard Worker key_material_ = std::move(key_material);
113*789431f2SAndroid Build Coastguard Worker }
114*789431f2SAndroid Build Coastguard Worker
~SymmetricKey()115*789431f2SAndroid Build Coastguard Worker SymmetricKey::~SymmetricKey() {}
116*789431f2SAndroid Build Coastguard Worker
117*789431f2SAndroid Build Coastguard Worker } // namespace keymaster
118