xref: /aosp_15_r20/system/keymaster/km_openssl/hmac_key.cpp (revision 789431f29546679ab5188a97751fb38e3018d44d)
1*789431f2SAndroid Build Coastguard Worker /*
2*789431f2SAndroid Build Coastguard Worker  * Copyright 2014 The Android Open Source Project
3*789431f2SAndroid Build Coastguard Worker  *
4*789431f2SAndroid Build Coastguard Worker  * Licensed under the Apache License, Version 2.0 (the "License");
5*789431f2SAndroid Build Coastguard Worker  * you may not use this file except in compliance with the License.
6*789431f2SAndroid Build Coastguard Worker  * You may obtain a copy of the License at
7*789431f2SAndroid Build Coastguard Worker  *
8*789431f2SAndroid Build Coastguard Worker  *      http://www.apache.org/licenses/LICENSE-2.0
9*789431f2SAndroid Build Coastguard Worker  *
10*789431f2SAndroid Build Coastguard Worker  * Unless required by applicable law or agreed to in writing, software
11*789431f2SAndroid Build Coastguard Worker  * distributed under the License is distributed on an "AS IS" BASIS,
12*789431f2SAndroid Build Coastguard Worker  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13*789431f2SAndroid Build Coastguard Worker  * See the License for the specific language governing permissions and
14*789431f2SAndroid Build Coastguard Worker  * limitations under the License.
15*789431f2SAndroid Build Coastguard Worker  */
16*789431f2SAndroid Build Coastguard Worker 
17*789431f2SAndroid Build Coastguard Worker #include <keymaster/km_openssl/hmac_key.h>
18*789431f2SAndroid Build Coastguard Worker 
19*789431f2SAndroid Build Coastguard Worker #include <utility>
20*789431f2SAndroid Build Coastguard Worker 
21*789431f2SAndroid Build Coastguard Worker #include <openssl/err.h>
22*789431f2SAndroid Build Coastguard Worker #include <openssl/rand.h>
23*789431f2SAndroid Build Coastguard Worker 
24*789431f2SAndroid Build Coastguard Worker #include "hmac_operation.h"
25*789431f2SAndroid Build Coastguard Worker 
26*789431f2SAndroid Build Coastguard Worker namespace keymaster {
27*789431f2SAndroid Build Coastguard Worker 
28*789431f2SAndroid Build Coastguard Worker static HmacSignOperationFactory sign_factory;
29*789431f2SAndroid Build Coastguard Worker static HmacVerifyOperationFactory verify_factory;
30*789431f2SAndroid Build Coastguard Worker 
GetOperationFactory(keymaster_purpose_t purpose) const31*789431f2SAndroid Build Coastguard Worker OperationFactory* HmacKeyFactory::GetOperationFactory(keymaster_purpose_t purpose) const {
32*789431f2SAndroid Build Coastguard Worker     switch (purpose) {
33*789431f2SAndroid Build Coastguard Worker     case KM_PURPOSE_SIGN:
34*789431f2SAndroid Build Coastguard Worker         return &sign_factory;
35*789431f2SAndroid Build Coastguard Worker     case KM_PURPOSE_VERIFY:
36*789431f2SAndroid Build Coastguard Worker         return &verify_factory;
37*789431f2SAndroid Build Coastguard Worker     default:
38*789431f2SAndroid Build Coastguard Worker         return nullptr;
39*789431f2SAndroid Build Coastguard Worker     }
40*789431f2SAndroid Build Coastguard Worker }
41*789431f2SAndroid Build Coastguard Worker 
LoadKey(KeymasterKeyBlob && key_material,const AuthorizationSet &,AuthorizationSet && hw_enforced,AuthorizationSet && sw_enforced,UniquePtr<Key> * key) const42*789431f2SAndroid Build Coastguard Worker keymaster_error_t HmacKeyFactory::LoadKey(KeymasterKeyBlob&& key_material,
43*789431f2SAndroid Build Coastguard Worker                                           const AuthorizationSet& /* additional_params */,
44*789431f2SAndroid Build Coastguard Worker                                           AuthorizationSet&& hw_enforced,
45*789431f2SAndroid Build Coastguard Worker                                           AuthorizationSet&& sw_enforced,
46*789431f2SAndroid Build Coastguard Worker                                           UniquePtr<Key>* key) const {
47*789431f2SAndroid Build Coastguard Worker     if (!key) return KM_ERROR_OUTPUT_PARAMETER_NULL;
48*789431f2SAndroid Build Coastguard Worker 
49*789431f2SAndroid Build Coastguard Worker     uint32_t min_mac_length;
50*789431f2SAndroid Build Coastguard Worker     if (!hw_enforced.GetTagValue(TAG_MIN_MAC_LENGTH, &min_mac_length) &&
51*789431f2SAndroid Build Coastguard Worker         !sw_enforced.GetTagValue(TAG_MIN_MAC_LENGTH, &min_mac_length)) {
52*789431f2SAndroid Build Coastguard Worker         LOG_E("HMAC key must have KM_TAG_MIN_MAC_LENGTH");
53*789431f2SAndroid Build Coastguard Worker         return KM_ERROR_INVALID_KEY_BLOB;
54*789431f2SAndroid Build Coastguard Worker     }
55*789431f2SAndroid Build Coastguard Worker 
56*789431f2SAndroid Build Coastguard Worker     key->reset(new (std::nothrow)
57*789431f2SAndroid Build Coastguard Worker                    HmacKey(std::move(key_material), std::move(hw_enforced), std::move(sw_enforced),
58*789431f2SAndroid Build Coastguard Worker                            this));
59*789431f2SAndroid Build Coastguard Worker     if (!key->get()) return KM_ERROR_MEMORY_ALLOCATION_FAILED;
60*789431f2SAndroid Build Coastguard Worker     return KM_ERROR_OK;
61*789431f2SAndroid Build Coastguard Worker }
62*789431f2SAndroid Build Coastguard Worker 
validate_algorithm_specific_new_key_params(const AuthorizationSet & key_description) const63*789431f2SAndroid Build Coastguard Worker keymaster_error_t HmacKeyFactory::validate_algorithm_specific_new_key_params(
64*789431f2SAndroid Build Coastguard Worker     const AuthorizationSet& key_description) const {
65*789431f2SAndroid Build Coastguard Worker     uint32_t min_mac_length_bits;
66*789431f2SAndroid Build Coastguard Worker     if (!key_description.GetTagValue(TAG_MIN_MAC_LENGTH, &min_mac_length_bits))
67*789431f2SAndroid Build Coastguard Worker         return KM_ERROR_MISSING_MIN_MAC_LENGTH;
68*789431f2SAndroid Build Coastguard Worker 
69*789431f2SAndroid Build Coastguard Worker     keymaster_digest_t digest;
70*789431f2SAndroid Build Coastguard Worker     if (!key_description.GetTagValue(TAG_DIGEST, &digest)) {
71*789431f2SAndroid Build Coastguard Worker         LOG_E("%zu digests specified for HMAC key", key_description.GetTagCount(TAG_DIGEST));
72*789431f2SAndroid Build Coastguard Worker         return KM_ERROR_UNSUPPORTED_DIGEST;
73*789431f2SAndroid Build Coastguard Worker     }
74*789431f2SAndroid Build Coastguard Worker 
75*789431f2SAndroid Build Coastguard Worker     size_t hash_size_bits = 0;
76*789431f2SAndroid Build Coastguard Worker     switch (digest) {
77*789431f2SAndroid Build Coastguard Worker     case KM_DIGEST_NONE:
78*789431f2SAndroid Build Coastguard Worker         return KM_ERROR_UNSUPPORTED_DIGEST;
79*789431f2SAndroid Build Coastguard Worker     case KM_DIGEST_MD5:
80*789431f2SAndroid Build Coastguard Worker         hash_size_bits = 128;
81*789431f2SAndroid Build Coastguard Worker         break;
82*789431f2SAndroid Build Coastguard Worker     case KM_DIGEST_SHA1:
83*789431f2SAndroid Build Coastguard Worker         hash_size_bits = 160;
84*789431f2SAndroid Build Coastguard Worker         break;
85*789431f2SAndroid Build Coastguard Worker     case KM_DIGEST_SHA_2_224:
86*789431f2SAndroid Build Coastguard Worker         hash_size_bits = 224;
87*789431f2SAndroid Build Coastguard Worker         break;
88*789431f2SAndroid Build Coastguard Worker     case KM_DIGEST_SHA_2_256:
89*789431f2SAndroid Build Coastguard Worker         hash_size_bits = 256;
90*789431f2SAndroid Build Coastguard Worker         break;
91*789431f2SAndroid Build Coastguard Worker     case KM_DIGEST_SHA_2_384:
92*789431f2SAndroid Build Coastguard Worker         hash_size_bits = 384;
93*789431f2SAndroid Build Coastguard Worker         break;
94*789431f2SAndroid Build Coastguard Worker     case KM_DIGEST_SHA_2_512:
95*789431f2SAndroid Build Coastguard Worker         hash_size_bits = 512;
96*789431f2SAndroid Build Coastguard Worker         break;
97*789431f2SAndroid Build Coastguard Worker     };
98*789431f2SAndroid Build Coastguard Worker 
99*789431f2SAndroid Build Coastguard Worker     if (hash_size_bits == 0) {
100*789431f2SAndroid Build Coastguard Worker         // digest was not matched
101*789431f2SAndroid Build Coastguard Worker         return KM_ERROR_UNSUPPORTED_DIGEST;
102*789431f2SAndroid Build Coastguard Worker     }
103*789431f2SAndroid Build Coastguard Worker 
104*789431f2SAndroid Build Coastguard Worker     if (min_mac_length_bits % 8 != 0 || min_mac_length_bits > hash_size_bits)
105*789431f2SAndroid Build Coastguard Worker         return KM_ERROR_UNSUPPORTED_MIN_MAC_LENGTH;
106*789431f2SAndroid Build Coastguard Worker 
107*789431f2SAndroid Build Coastguard Worker     if (min_mac_length_bits < kMinHmacLengthBits) return KM_ERROR_UNSUPPORTED_MIN_MAC_LENGTH;
108*789431f2SAndroid Build Coastguard Worker 
109*789431f2SAndroid Build Coastguard Worker     return KM_ERROR_OK;
110*789431f2SAndroid Build Coastguard Worker }
111*789431f2SAndroid Build Coastguard Worker 
112*789431f2SAndroid Build Coastguard Worker }  // namespace keymaster
113