blob: 9678f9d7417d6853c35c7a1e656cd8ce6f2dbc6a [file] [log] [blame]
Shawn Willden95e13822014-12-15 16:12:16 -07001/*
2 * Copyright 2014 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17#include "symmetric_key.h"
18
19#include <assert.h>
20
21#include <openssl/err.h>
22#include <openssl/rand.h>
23
24#include "aes_key.h"
Shawn Willden0d560bf2014-12-15 17:44:02 -070025#include "hmac_key.h"
Shawn Willden95e13822014-12-15 16:12:16 -070026#include "unencrypted_key_blob.h"
27
28namespace keymaster {
29
30/* static */
31SymmetricKey* SymmetricKey::GenerateKey(keymaster_algorithm_t algorithm,
32 const AuthorizationSet& key_description,
33 const Logger& logger, keymaster_error_t* error) {
34 if (!error)
35 return NULL;
36
37 *error = KM_ERROR_OK;
38
39 UniquePtr<SymmetricKey> key;
40 switch (algorithm) {
41 case KM_ALGORITHM_AES:
42 key.reset(new AesKey(key_description, logger));
43 break;
Shawn Willden0d560bf2014-12-15 17:44:02 -070044 case KM_ALGORITHM_HMAC:
45 key.reset(new HmacKey(key_description, logger));
46 break;
Shawn Willden95e13822014-12-15 16:12:16 -070047 default:
48 *error = KM_ERROR_UNSUPPORTED_ALGORITHM;
49 return NULL;
50 };
51
52 uint32_t key_size_bits;
53 if (!key_description.GetTagValue(TAG_KEY_SIZE, &key_size_bits) || key_size_bits % 8 != 0) {
54 *error = KM_ERROR_UNSUPPORTED_KEY_SIZE;
55 return NULL;
56 }
57
58 key->key_data_size_ = key_size_bits / 8;
59 if (key->key_data_size_ > MAX_KEY_SIZE) {
60 *error = KM_ERROR_UNSUPPORTED_KEY_SIZE;
61 return NULL;
62 }
63 if (!RAND_bytes(key->key_data_, key->key_data_size_)) {
64 logger.error("Error %ul generating %d bit AES key", ERR_get_error(), key_size_bits);
65 *error = KM_ERROR_UNKNOWN_ERROR;
66 return NULL;
67 }
68
69 if (*error != KM_ERROR_OK)
70 return NULL;
71 return key.release();
72}
73
74/* static */
75SymmetricKey* SymmetricKey::CreateKey(keymaster_algorithm_t algorithm,
76 const UnencryptedKeyBlob& blob, const Logger& logger,
77 keymaster_error_t* error) {
78 switch (algorithm) {
79 case KM_ALGORITHM_AES:
80 return new AesKey(blob, logger, error);
Shawn Willden0d560bf2014-12-15 17:44:02 -070081 case KM_ALGORITHM_HMAC:
82 return new HmacKey(blob, logger, error);
Shawn Willden95e13822014-12-15 16:12:16 -070083 default:
84 *error = KM_ERROR_UNSUPPORTED_ALGORITHM;
85 return NULL;
86 }
87}
88
89SymmetricKey::SymmetricKey(const UnencryptedKeyBlob& blob, const Logger& logger,
90 keymaster_error_t* error)
91 : Key(blob, logger), key_data_size_(blob.unencrypted_key_material_length()) {
92 if (error)
93 *error = LoadKey(blob);
94}
95
96SymmetricKey::~SymmetricKey() {
97 memset_s(key_data_, 0, MAX_KEY_SIZE);
98}
99
100keymaster_error_t SymmetricKey::LoadKey(const UnencryptedKeyBlob& blob) {
101 assert(blob.unencrypted_key_material_length() == key_data_size_);
102 memcpy(key_data_, blob.unencrypted_key_material(), key_data_size_);
103
104 return KM_ERROR_OK;
105}
106
107keymaster_error_t SymmetricKey::key_material(UniquePtr<uint8_t[]>* key_material,
108 size_t* size) const {
109 *size = key_data_size_;
110 key_material->reset(new uint8_t[*size]);
111 if (!key_material->get())
112 return KM_ERROR_MEMORY_ALLOCATION_FAILED;
113 memcpy(key_material->get(), key_data_, *size);
114 return KM_ERROR_OK;
115}
116
117} // namespace keymaster