119fca88879ffd9e02f068226df9e536aac4e4623Shawn Willden/* 219fca88879ffd9e02f068226df9e536aac4e4623Shawn Willden * Copyright 2014 The Android Open Source Project 319fca88879ffd9e02f068226df9e536aac4e4623Shawn Willden * 419fca88879ffd9e02f068226df9e536aac4e4623Shawn Willden * Licensed under the Apache License, Version 2.0 (the "License"); 519fca88879ffd9e02f068226df9e536aac4e4623Shawn Willden * you may not use this file except in compliance with the License. 619fca88879ffd9e02f068226df9e536aac4e4623Shawn Willden * You may obtain a copy of the License at 719fca88879ffd9e02f068226df9e536aac4e4623Shawn Willden * 819fca88879ffd9e02f068226df9e536aac4e4623Shawn Willden * http://www.apache.org/licenses/LICENSE-2.0 919fca88879ffd9e02f068226df9e536aac4e4623Shawn Willden * 1019fca88879ffd9e02f068226df9e536aac4e4623Shawn Willden * Unless required by applicable law or agreed to in writing, software 1119fca88879ffd9e02f068226df9e536aac4e4623Shawn Willden * distributed under the License is distributed on an "AS IS" BASIS, 1219fca88879ffd9e02f068226df9e536aac4e4623Shawn Willden * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 1319fca88879ffd9e02f068226df9e536aac4e4623Shawn Willden * See the License for the specific language governing permissions and 1419fca88879ffd9e02f068226df9e536aac4e4623Shawn Willden * limitations under the License. 1519fca88879ffd9e02f068226df9e536aac4e4623Shawn Willden */ 1619fca88879ffd9e02f068226df9e536aac4e4623Shawn Willden 1795e1382b75bab7d8b4cce3c1267fa23df2006957Shawn Willden#include "aes_key.h" 1895e1382b75bab7d8b4cce3c1267fa23df2006957Shawn Willden 19907c3015d0edf1e43cdc9e0bba0e3fc23dca8cfcShawn Willden#include <assert.h> 20907c3015d0edf1e43cdc9e0bba0e3fc23dca8cfcShawn Willden 210f906ec40f6ade7955c6b967ea522aade54ea2e4Shawn Willden#include <new> 220f906ec40f6ade7955c6b967ea522aade54ea2e4Shawn Willden 2319fca88879ffd9e02f068226df9e536aac4e4623Shawn Willden#include <openssl/err.h> 2419fca88879ffd9e02f068226df9e536aac4e4623Shawn Willden#include <openssl/rand.h> 2519fca88879ffd9e02f068226df9e536aac4e4623Shawn Willden 26907c3015d0edf1e43cdc9e0bba0e3fc23dca8cfcShawn Willden#include "aes_operation.h" 2719fca88879ffd9e02f068226df9e536aac4e4623Shawn Willden 2819fca88879ffd9e02f068226df9e536aac4e4623Shawn Willdennamespace keymaster { 2919fca88879ffd9e02f068226df9e536aac4e4623Shawn Willden 300629810b145187575bc26c910dded0d24c64569dShawn WilldenAesEncryptionOperationFactory encrypt_factory; 310629810b145187575bc26c910dded0d24c64569dShawn WilldenAesDecryptionOperationFactory decrypt_factory; 320629810b145187575bc26c910dded0d24c64569dShawn Willden 330629810b145187575bc26c910dded0d24c64569dShawn WilldenOperationFactory* AesKeyFactory::GetOperationFactory(keymaster_purpose_t purpose) const { 340629810b145187575bc26c910dded0d24c64569dShawn Willden switch (purpose) { 350629810b145187575bc26c910dded0d24c64569dShawn Willden case KM_PURPOSE_ENCRYPT: 360629810b145187575bc26c910dded0d24c64569dShawn Willden return &encrypt_factory; 370629810b145187575bc26c910dded0d24c64569dShawn Willden case KM_PURPOSE_DECRYPT: 380629810b145187575bc26c910dded0d24c64569dShawn Willden return &decrypt_factory; 390629810b145187575bc26c910dded0d24c64569dShawn Willden default: 400629810b145187575bc26c910dded0d24c64569dShawn Willden return nullptr; 410629810b145187575bc26c910dded0d24c64569dShawn Willden } 420629810b145187575bc26c910dded0d24c64569dShawn Willden} 430629810b145187575bc26c910dded0d24c64569dShawn Willden 440cb6942d3efb6c056f96321c82a4b3d86af601d6Shawn Willdenkeymaster_error_t AesKeyFactory::LoadKey(const KeymasterKeyBlob& key_material, 45d599b15c0693950bdc72fb867872044fdc484ef5Shawn Willden const AuthorizationSet& /* additional_params */, 460cb6942d3efb6c056f96321c82a4b3d86af601d6Shawn Willden const AuthorizationSet& hw_enforced, 470629810b145187575bc26c910dded0d24c64569dShawn Willden const AuthorizationSet& sw_enforced, 480629810b145187575bc26c910dded0d24c64569dShawn Willden UniquePtr<Key>* key) const { 490cb6942d3efb6c056f96321c82a4b3d86af601d6Shawn Willden if (!key) 500cb6942d3efb6c056f96321c82a4b3d86af601d6Shawn Willden return KM_ERROR_OUTPUT_PARAMETER_NULL; 510cb6942d3efb6c056f96321c82a4b3d86af601d6Shawn Willden 5233ab0389e908b98702806c746e7babc0d46eb452Shawn Willden uint32_t min_mac_length = 0; 5333ab0389e908b98702806c746e7babc0d46eb452Shawn Willden if (hw_enforced.Contains(TAG_BLOCK_MODE, KM_MODE_GCM) || 5433ab0389e908b98702806c746e7babc0d46eb452Shawn Willden sw_enforced.Contains(TAG_BLOCK_MODE, KM_MODE_GCM)) { 5533ab0389e908b98702806c746e7babc0d46eb452Shawn Willden 5633ab0389e908b98702806c746e7babc0d46eb452Shawn Willden if (!hw_enforced.GetTagValue(TAG_MIN_MAC_LENGTH, &min_mac_length) && 5733ab0389e908b98702806c746e7babc0d46eb452Shawn Willden !sw_enforced.GetTagValue(TAG_MIN_MAC_LENGTH, &min_mac_length)) { 5833ab0389e908b98702806c746e7babc0d46eb452Shawn Willden 5933ab0389e908b98702806c746e7babc0d46eb452Shawn Willden LOG_E("AES-GCM key must have KM_TAG_MIN_MAC_LENGTH", 0); 6033ab0389e908b98702806c746e7babc0d46eb452Shawn Willden return KM_ERROR_INVALID_KEY_BLOB; 6133ab0389e908b98702806c746e7babc0d46eb452Shawn Willden } 6233ab0389e908b98702806c746e7babc0d46eb452Shawn Willden } 6333ab0389e908b98702806c746e7babc0d46eb452Shawn Willden 640cb6942d3efb6c056f96321c82a4b3d86af601d6Shawn Willden keymaster_error_t error = KM_ERROR_OK; 650f906ec40f6ade7955c6b967ea522aade54ea2e4Shawn Willden key->reset(new (std::nothrow) AesKey(key_material, hw_enforced, sw_enforced, &error)); 660cb6942d3efb6c056f96321c82a4b3d86af601d6Shawn Willden if (!key->get()) 670cb6942d3efb6c056f96321c82a4b3d86af601d6Shawn Willden error = KM_ERROR_MEMORY_ALLOCATION_FAILED; 680cb6942d3efb6c056f96321c82a4b3d86af601d6Shawn Willden return error; 69f923963fda888eac9e7997b71d5525ea2f82a091Shawn Willden} 70a278f6156b9e57e1de8ca380b14fef113ad10be8Shawn Willden 7133ab0389e908b98702806c746e7babc0d46eb452Shawn Willdenkeymaster_error_t AesKeyFactory::validate_algorithm_specific_new_key_params( 7233ab0389e908b98702806c746e7babc0d46eb452Shawn Willden const AuthorizationSet& key_description) const { 7333ab0389e908b98702806c746e7babc0d46eb452Shawn Willden if (key_description.Contains(TAG_BLOCK_MODE, KM_MODE_GCM)) { 7433ab0389e908b98702806c746e7babc0d46eb452Shawn Willden uint32_t min_tag_length; 7533ab0389e908b98702806c746e7babc0d46eb452Shawn Willden if (!key_description.GetTagValue(TAG_MIN_MAC_LENGTH, &min_tag_length)) 7633ab0389e908b98702806c746e7babc0d46eb452Shawn Willden return KM_ERROR_MISSING_MIN_MAC_LENGTH; 7733ab0389e908b98702806c746e7babc0d46eb452Shawn Willden 7833ab0389e908b98702806c746e7babc0d46eb452Shawn Willden if (min_tag_length % 8 != 0) 7933ab0389e908b98702806c746e7babc0d46eb452Shawn Willden return KM_ERROR_UNSUPPORTED_MIN_MAC_LENGTH; 8033ab0389e908b98702806c746e7babc0d46eb452Shawn Willden 8133ab0389e908b98702806c746e7babc0d46eb452Shawn Willden if (min_tag_length < kMinGcmTagLength || min_tag_length > kMaxGcmTagLength) 8233ab0389e908b98702806c746e7babc0d46eb452Shawn Willden return KM_ERROR_UNSUPPORTED_MIN_MAC_LENGTH; 8333ab0389e908b98702806c746e7babc0d46eb452Shawn Willden } else { 8433ab0389e908b98702806c746e7babc0d46eb452Shawn Willden // Not GCM 8533ab0389e908b98702806c746e7babc0d46eb452Shawn Willden if (key_description.find(TAG_MIN_MAC_LENGTH) != -1) { 8633ab0389e908b98702806c746e7babc0d46eb452Shawn Willden LOG_W("KM_TAG_MIN_MAC_LENGTH found for non AES-GCM key", 0); 8733ab0389e908b98702806c746e7babc0d46eb452Shawn Willden return KM_ERROR_INVALID_TAG; 8833ab0389e908b98702806c746e7babc0d46eb452Shawn Willden } 8933ab0389e908b98702806c746e7babc0d46eb452Shawn Willden } 9033ab0389e908b98702806c746e7babc0d46eb452Shawn Willden 9133ab0389e908b98702806c746e7babc0d46eb452Shawn Willden return KM_ERROR_OK; 9233ab0389e908b98702806c746e7babc0d46eb452Shawn Willden} 9333ab0389e908b98702806c746e7babc0d46eb452Shawn Willden 9419fca88879ffd9e02f068226df9e536aac4e4623Shawn Willden} // namespace keymaster 95