blob: 9678f9d7417d6853c35c7a1e656cd8ce6f2dbc6a [file] [log] [blame]
/*
* Copyright 2014 The Android Open Source Project
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include "symmetric_key.h"
#include <assert.h>
#include <openssl/err.h>
#include <openssl/rand.h>
#include "aes_key.h"
#include "hmac_key.h"
#include "unencrypted_key_blob.h"
namespace keymaster {
/* static */
SymmetricKey* SymmetricKey::GenerateKey(keymaster_algorithm_t algorithm,
const AuthorizationSet& key_description,
const Logger& logger, keymaster_error_t* error) {
if (!error)
return NULL;
*error = KM_ERROR_OK;
UniquePtr<SymmetricKey> key;
switch (algorithm) {
case KM_ALGORITHM_AES:
key.reset(new AesKey(key_description, logger));
break;
case KM_ALGORITHM_HMAC:
key.reset(new HmacKey(key_description, logger));
break;
default:
*error = KM_ERROR_UNSUPPORTED_ALGORITHM;
return NULL;
};
uint32_t key_size_bits;
if (!key_description.GetTagValue(TAG_KEY_SIZE, &key_size_bits) || key_size_bits % 8 != 0) {
*error = KM_ERROR_UNSUPPORTED_KEY_SIZE;
return NULL;
}
key->key_data_size_ = key_size_bits / 8;
if (key->key_data_size_ > MAX_KEY_SIZE) {
*error = KM_ERROR_UNSUPPORTED_KEY_SIZE;
return NULL;
}
if (!RAND_bytes(key->key_data_, key->key_data_size_)) {
logger.error("Error %ul generating %d bit AES key", ERR_get_error(), key_size_bits);
*error = KM_ERROR_UNKNOWN_ERROR;
return NULL;
}
if (*error != KM_ERROR_OK)
return NULL;
return key.release();
}
/* static */
SymmetricKey* SymmetricKey::CreateKey(keymaster_algorithm_t algorithm,
const UnencryptedKeyBlob& blob, const Logger& logger,
keymaster_error_t* error) {
switch (algorithm) {
case KM_ALGORITHM_AES:
return new AesKey(blob, logger, error);
case KM_ALGORITHM_HMAC:
return new HmacKey(blob, logger, error);
default:
*error = KM_ERROR_UNSUPPORTED_ALGORITHM;
return NULL;
}
}
SymmetricKey::SymmetricKey(const UnencryptedKeyBlob& blob, const Logger& logger,
keymaster_error_t* error)
: Key(blob, logger), key_data_size_(blob.unencrypted_key_material_length()) {
if (error)
*error = LoadKey(blob);
}
SymmetricKey::~SymmetricKey() {
memset_s(key_data_, 0, MAX_KEY_SIZE);
}
keymaster_error_t SymmetricKey::LoadKey(const UnencryptedKeyBlob& blob) {
assert(blob.unencrypted_key_material_length() == key_data_size_);
memcpy(key_data_, blob.unencrypted_key_material(), key_data_size_);
return KM_ERROR_OK;
}
keymaster_error_t SymmetricKey::key_material(UniquePtr<uint8_t[]>* key_material,
size_t* size) const {
*size = key_data_size_;
key_material->reset(new uint8_t[*size]);
if (!key_material->get())
return KM_ERROR_MEMORY_ALLOCATION_FAILED;
memcpy(key_material->get(), key_data_, *size);
return KM_ERROR_OK;
}
} // namespace keymaster