/*
* Copyright 2014 The Android Open Source Project
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#ifndef SYSTEM_KEYMASTER_AES_OPERATION_H_
#define SYSTEM_KEYMASTER_AES_OPERATION_H_
#include <openssl/evp.h>
#include "ocb_utils.h"
#include "operation.h"
namespace keymaster {
/**
* Abstract base for AES operation factories. This class does all of the work to create
* AES operations.
*/
class AesOperationFactory : public OperationFactory {
public:
KeyType registry_key() const override { return KeyType(KM_ALGORITHM_AES, purpose()); }
Operation* CreateOperation(const Key& key, const AuthorizationSet& begin_params,
keymaster_error_t* error) override;
const keymaster_block_mode_t* SupportedBlockModes(size_t* block_mode_count) const override;
const keymaster_padding_t* SupportedPaddingModes(size_t* padding_count) const override;
virtual keymaster_purpose_t purpose() const = 0;
};
/**
* Concrete factory for AES encryption operations.
*/
class AesEncryptionOperationFactory : public AesOperationFactory {
keymaster_purpose_t purpose() const override { return KM_PURPOSE_ENCRYPT; }
};
/**
* Concrete factory for AES decryption operations.
*/
class AesDecryptionOperationFactory : public AesOperationFactory {
keymaster_purpose_t purpose() const override { return KM_PURPOSE_DECRYPT; }
};
static const size_t MAX_EVP_KEY_SIZE = 32;
class AesEvpOperation : public Operation {
public:
AesEvpOperation(keymaster_purpose_t purpose, keymaster_block_mode_t block_mode,
keymaster_padding_t padding, bool caller_iv, size_t tag_length,
const uint8_t* key, size_t key_size);
~AesEvpOperation();
keymaster_error_t Begin(const AuthorizationSet& input_params,
AuthorizationSet* output_params) override;
keymaster_error_t Update(const AuthorizationSet& additional_params, const Buffer& input,
AuthorizationSet* output_params, Buffer* output,
size_t* input_consumed) override;
keymaster_error_t Finish(const AuthorizationSet& additional_params, const Buffer& input,
const Buffer& signature, AuthorizationSet* output_params,
Buffer* output) override;
keymaster_error_t Abort() override;
virtual int evp_encrypt_mode() = 0;
protected:
bool need_iv() const;
keymaster_error_t InitializeCipher();
keymaster_error_t GetIv(const AuthorizationSet& input_params);
bool HandleAad(const AuthorizationSet& input_params, const Buffer& input,
keymaster_error_t* error);
bool ProcessAadBlocks(const uint8_t* data, size_t blocks, keymaster_error_t* error);
void FillBufferedAadBlock(keymaster_blob_t* aad);
bool ProcessBufferedAadBlock(keymaster_error_t* error);
bool InternalUpdate(const uint8_t* input, size_t input_length, Buffer* output,
keymaster_error_t* error);
bool UpdateForFinish(const AuthorizationSet& additional_params, const Buffer& input,
AuthorizationSet* output_params, Buffer* output, keymaster_error_t* error);
const keymaster_block_mode_t block_mode_;
EVP_CIPHER_CTX ctx_;
UniquePtr<uint8_t[]> iv_;
size_t iv_length_;
const bool caller_iv_;
size_t tag_length_;
UniquePtr<uint8_t[]> aad_block_buf_;
size_t aad_block_buf_length_;
private:
bool data_started_;
const size_t key_size_;
const keymaster_padding_t padding_;
uint8_t key_[MAX_EVP_KEY_SIZE];
};
class AesEvpEncryptOperation : public AesEvpOperation {
public:
AesEvpEncryptOperation(keymaster_block_mode_t block_mode, keymaster_padding_t padding,
bool caller_iv, size_t tag_length, const uint8_t* key, size_t key_size)
: AesEvpOperation(KM_PURPOSE_ENCRYPT, block_mode, padding, caller_iv, tag_length, key,
key_size) {}
keymaster_error_t Begin(const AuthorizationSet& input_params,
AuthorizationSet* output_params) override;
keymaster_error_t Finish(const AuthorizationSet& additional_params, const Buffer& input,
const Buffer& signature, AuthorizationSet* output_params,
Buffer* output) override;
int evp_encrypt_mode() override { return 1; }
private:
keymaster_error_t GenerateIv();
};
class AesEvpDecryptOperation : public AesEvpOperation {
public:
AesEvpDecryptOperation(keymaster_block_mode_t block_mode, keymaster_padding_t padding,
size_t tag_length, const uint8_t* key, size_t key_size)
: AesEvpOperation(KM_PURPOSE_DECRYPT, block_mode, padding,
false /* caller_iv -- don't care */, tag_length, key, key_size) {}
keymaster_error_t Begin(const AuthorizationSet& input_params,
AuthorizationSet* output_params) override;
keymaster_error_t Update(const AuthorizationSet& additional_params, const Buffer& input,
AuthorizationSet* output_params, Buffer* output,
size_t* input_consumed) override;
keymaster_error_t Finish(const AuthorizationSet& additional_params, const Buffer& input,
const Buffer& signature, AuthorizationSet* output_params,
Buffer* output) override;
int evp_encrypt_mode() override { return 0; }
private:
size_t tag_buf_unused() { return tag_length_ - tag_buf_length_; }
keymaster_error_t ProcessAllButTagLengthBytes(const Buffer& input, Buffer* output);
bool ProcessTagBufContentsAsData(size_t to_process, Buffer* output, keymaster_error_t* error);
void BufferCandidateTagData(const uint8_t* data, size_t data_length);
UniquePtr<uint8_t[]> tag_buf_;
size_t tag_buf_length_;
};
} // namespace keymaster
#endif // SYSTEM_KEYMASTER_AES_OPERATION_H_