1*789431f2SAndroid Build Coastguard Worker /*
2*789431f2SAndroid Build Coastguard Worker * Copyright 2015 The Android Open Source Project
3*789431f2SAndroid Build Coastguard Worker *
4*789431f2SAndroid Build Coastguard Worker * Licensed under the Apache License, Version 2.0 (the "License");
5*789431f2SAndroid Build Coastguard Worker * you may not use this file except in compliance with the License.
6*789431f2SAndroid Build Coastguard Worker * You may obtain a copy of the License at
7*789431f2SAndroid Build Coastguard Worker *
8*789431f2SAndroid Build Coastguard Worker * http://www.apache.org/licenses/LICENSE-2.0
9*789431f2SAndroid Build Coastguard Worker *
10*789431f2SAndroid Build Coastguard Worker * Unless required by applicable law or agreed to in writing, software
11*789431f2SAndroid Build Coastguard Worker * distributed under the License is distributed on an "AS IS" BASIS,
12*789431f2SAndroid Build Coastguard Worker * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13*789431f2SAndroid Build Coastguard Worker * See the License for the specific language governing permissions and
14*789431f2SAndroid Build Coastguard Worker * limitations under the License.
15*789431f2SAndroid Build Coastguard Worker */
16*789431f2SAndroid Build Coastguard Worker
17*789431f2SAndroid Build Coastguard Worker #include <keymaster/km_openssl/openssl_utils.h>
18*789431f2SAndroid Build Coastguard Worker
19*789431f2SAndroid Build Coastguard Worker #include <keymaster/android_keymaster_utils.h>
20*789431f2SAndroid Build Coastguard Worker #include <openssl/mem.h>
21*789431f2SAndroid Build Coastguard Worker #include <openssl/rand.h>
22*789431f2SAndroid Build Coastguard Worker
23*789431f2SAndroid Build Coastguard Worker #include <keymaster/km_openssl/openssl_err.h>
24*789431f2SAndroid Build Coastguard Worker
25*789431f2SAndroid Build Coastguard Worker namespace keymaster {
26*789431f2SAndroid Build Coastguard Worker
27*789431f2SAndroid Build Coastguard Worker constexpr uint32_t kAffinePointLength = 32;
28*789431f2SAndroid Build Coastguard Worker
ec_get_group_size(const EC_GROUP * group,size_t * key_size_bits)29*789431f2SAndroid Build Coastguard Worker keymaster_error_t ec_get_group_size(const EC_GROUP* group, size_t* key_size_bits) {
30*789431f2SAndroid Build Coastguard Worker switch (EC_GROUP_get_curve_name(group)) {
31*789431f2SAndroid Build Coastguard Worker case NID_secp224r1:
32*789431f2SAndroid Build Coastguard Worker *key_size_bits = 224;
33*789431f2SAndroid Build Coastguard Worker break;
34*789431f2SAndroid Build Coastguard Worker case NID_X9_62_prime256v1:
35*789431f2SAndroid Build Coastguard Worker *key_size_bits = 256;
36*789431f2SAndroid Build Coastguard Worker break;
37*789431f2SAndroid Build Coastguard Worker case NID_secp384r1:
38*789431f2SAndroid Build Coastguard Worker *key_size_bits = 384;
39*789431f2SAndroid Build Coastguard Worker break;
40*789431f2SAndroid Build Coastguard Worker case NID_secp521r1:
41*789431f2SAndroid Build Coastguard Worker *key_size_bits = 521;
42*789431f2SAndroid Build Coastguard Worker break;
43*789431f2SAndroid Build Coastguard Worker default:
44*789431f2SAndroid Build Coastguard Worker return KM_ERROR_UNSUPPORTED_EC_FIELD;
45*789431f2SAndroid Build Coastguard Worker }
46*789431f2SAndroid Build Coastguard Worker return KM_ERROR_OK;
47*789431f2SAndroid Build Coastguard Worker }
48*789431f2SAndroid Build Coastguard Worker
ec_get_group(keymaster_ec_curve_t curve)49*789431f2SAndroid Build Coastguard Worker EC_GROUP* ec_get_group(keymaster_ec_curve_t curve) {
50*789431f2SAndroid Build Coastguard Worker switch (curve) {
51*789431f2SAndroid Build Coastguard Worker case KM_EC_CURVE_P_224:
52*789431f2SAndroid Build Coastguard Worker return EC_GROUP_new_by_curve_name(NID_secp224r1);
53*789431f2SAndroid Build Coastguard Worker break;
54*789431f2SAndroid Build Coastguard Worker case KM_EC_CURVE_P_256:
55*789431f2SAndroid Build Coastguard Worker return EC_GROUP_new_by_curve_name(NID_X9_62_prime256v1);
56*789431f2SAndroid Build Coastguard Worker break;
57*789431f2SAndroid Build Coastguard Worker case KM_EC_CURVE_P_384:
58*789431f2SAndroid Build Coastguard Worker return EC_GROUP_new_by_curve_name(NID_secp384r1);
59*789431f2SAndroid Build Coastguard Worker break;
60*789431f2SAndroid Build Coastguard Worker case KM_EC_CURVE_P_521:
61*789431f2SAndroid Build Coastguard Worker return EC_GROUP_new_by_curve_name(NID_secp521r1);
62*789431f2SAndroid Build Coastguard Worker break;
63*789431f2SAndroid Build Coastguard Worker default:
64*789431f2SAndroid Build Coastguard Worker return nullptr;
65*789431f2SAndroid Build Coastguard Worker break;
66*789431f2SAndroid Build Coastguard Worker }
67*789431f2SAndroid Build Coastguard Worker }
68*789431f2SAndroid Build Coastguard Worker
convert_pkcs8_blob_to_evp(const uint8_t * key_data,size_t key_length,keymaster_algorithm_t expected_algorithm,UniquePtr<EVP_PKEY,EVP_PKEY_Delete> * pkey)69*789431f2SAndroid Build Coastguard Worker keymaster_error_t convert_pkcs8_blob_to_evp(const uint8_t* key_data, size_t key_length,
70*789431f2SAndroid Build Coastguard Worker keymaster_algorithm_t expected_algorithm,
71*789431f2SAndroid Build Coastguard Worker UniquePtr<EVP_PKEY, EVP_PKEY_Delete>* pkey) {
72*789431f2SAndroid Build Coastguard Worker if (key_data == nullptr || key_length <= 0) return KM_ERROR_INVALID_KEY_BLOB;
73*789431f2SAndroid Build Coastguard Worker
74*789431f2SAndroid Build Coastguard Worker UniquePtr<PKCS8_PRIV_KEY_INFO, PKCS8_PRIV_KEY_INFO_Delete> pkcs8(
75*789431f2SAndroid Build Coastguard Worker d2i_PKCS8_PRIV_KEY_INFO(nullptr, &key_data, key_length));
76*789431f2SAndroid Build Coastguard Worker if (pkcs8.get() == nullptr) return TranslateLastOpenSslError(true /* log_message */);
77*789431f2SAndroid Build Coastguard Worker
78*789431f2SAndroid Build Coastguard Worker pkey->reset(EVP_PKCS82PKEY(pkcs8.get()));
79*789431f2SAndroid Build Coastguard Worker if (!pkey->get()) return TranslateLastOpenSslError(true /* log_message */);
80*789431f2SAndroid Build Coastguard Worker
81*789431f2SAndroid Build Coastguard Worker // Check the key type detected from the PKCS8 blob matches the KM algorithm we expect.
82*789431f2SAndroid Build Coastguard Worker keymaster_algorithm_t got_algorithm;
83*789431f2SAndroid Build Coastguard Worker switch (EVP_PKEY_id(pkey->get())) {
84*789431f2SAndroid Build Coastguard Worker case EVP_PKEY_RSA:
85*789431f2SAndroid Build Coastguard Worker got_algorithm = KM_ALGORITHM_RSA;
86*789431f2SAndroid Build Coastguard Worker break;
87*789431f2SAndroid Build Coastguard Worker case EVP_PKEY_EC:
88*789431f2SAndroid Build Coastguard Worker case EVP_PKEY_ED25519:
89*789431f2SAndroid Build Coastguard Worker case EVP_PKEY_X25519:
90*789431f2SAndroid Build Coastguard Worker got_algorithm = KM_ALGORITHM_EC;
91*789431f2SAndroid Build Coastguard Worker break;
92*789431f2SAndroid Build Coastguard Worker default:
93*789431f2SAndroid Build Coastguard Worker LOG_E("EVP key algorithm was unknown (type %d), not the expected %d",
94*789431f2SAndroid Build Coastguard Worker EVP_PKEY_id(pkey->get()), expected_algorithm);
95*789431f2SAndroid Build Coastguard Worker return KM_ERROR_INVALID_KEY_BLOB;
96*789431f2SAndroid Build Coastguard Worker }
97*789431f2SAndroid Build Coastguard Worker
98*789431f2SAndroid Build Coastguard Worker if (expected_algorithm != got_algorithm) {
99*789431f2SAndroid Build Coastguard Worker LOG_E("EVP key algorithm was %d (from type %d), not the expected %d", got_algorithm,
100*789431f2SAndroid Build Coastguard Worker EVP_PKEY_id(pkey->get()), expected_algorithm);
101*789431f2SAndroid Build Coastguard Worker return KM_ERROR_INVALID_KEY_BLOB;
102*789431f2SAndroid Build Coastguard Worker }
103*789431f2SAndroid Build Coastguard Worker
104*789431f2SAndroid Build Coastguard Worker return KM_ERROR_OK;
105*789431f2SAndroid Build Coastguard Worker }
106*789431f2SAndroid Build Coastguard Worker
KeyMaterialToEvpKey(keymaster_key_format_t key_format,const KeymasterKeyBlob & key_material,keymaster_algorithm_t expected_algorithm,EVP_PKEY_Ptr * pkey)107*789431f2SAndroid Build Coastguard Worker keymaster_error_t KeyMaterialToEvpKey(keymaster_key_format_t key_format,
108*789431f2SAndroid Build Coastguard Worker const KeymasterKeyBlob& key_material,
109*789431f2SAndroid Build Coastguard Worker keymaster_algorithm_t expected_algorithm,
110*789431f2SAndroid Build Coastguard Worker EVP_PKEY_Ptr* pkey) {
111*789431f2SAndroid Build Coastguard Worker if (key_format != KM_KEY_FORMAT_PKCS8) return KM_ERROR_UNSUPPORTED_KEY_FORMAT;
112*789431f2SAndroid Build Coastguard Worker
113*789431f2SAndroid Build Coastguard Worker return convert_pkcs8_blob_to_evp(key_material.key_material, key_material.key_material_size,
114*789431f2SAndroid Build Coastguard Worker expected_algorithm, pkey);
115*789431f2SAndroid Build Coastguard Worker }
116*789431f2SAndroid Build Coastguard Worker
EvpKeyToKeyMaterial(const EVP_PKEY * pkey,KeymasterKeyBlob * key_blob)117*789431f2SAndroid Build Coastguard Worker keymaster_error_t EvpKeyToKeyMaterial(const EVP_PKEY* pkey, KeymasterKeyBlob* key_blob) {
118*789431f2SAndroid Build Coastguard Worker switch (EVP_PKEY_id(pkey)) {
119*789431f2SAndroid Build Coastguard Worker case EVP_PKEY_ED25519:
120*789431f2SAndroid Build Coastguard Worker case EVP_PKEY_X25519: {
121*789431f2SAndroid Build Coastguard Worker // BoringSSL's i2d_PrivateKey does not handle curve 25519 keys.
122*789431f2SAndroid Build Coastguard Worker uint8_t* data = nullptr;
123*789431f2SAndroid Build Coastguard Worker size_t data_len;
124*789431f2SAndroid Build Coastguard Worker CBB cbb;
125*789431f2SAndroid Build Coastguard Worker if (!CBB_init(&cbb, 0) || !EVP_marshal_private_key(&cbb, pkey) ||
126*789431f2SAndroid Build Coastguard Worker !CBB_finish(&cbb, &data, &data_len)) {
127*789431f2SAndroid Build Coastguard Worker CBB_cleanup(&cbb);
128*789431f2SAndroid Build Coastguard Worker OPENSSL_free(data);
129*789431f2SAndroid Build Coastguard Worker return KM_ERROR_UNKNOWN_ERROR;
130*789431f2SAndroid Build Coastguard Worker }
131*789431f2SAndroid Build Coastguard Worker
132*789431f2SAndroid Build Coastguard Worker if (!key_blob->Reset(data_len)) {
133*789431f2SAndroid Build Coastguard Worker OPENSSL_free(data);
134*789431f2SAndroid Build Coastguard Worker return KM_ERROR_MEMORY_ALLOCATION_FAILED;
135*789431f2SAndroid Build Coastguard Worker }
136*789431f2SAndroid Build Coastguard Worker memcpy(key_blob->writable_data(), data, data_len);
137*789431f2SAndroid Build Coastguard Worker OPENSSL_free(data);
138*789431f2SAndroid Build Coastguard Worker break;
139*789431f2SAndroid Build Coastguard Worker }
140*789431f2SAndroid Build Coastguard Worker default: {
141*789431f2SAndroid Build Coastguard Worker int key_data_size = i2d_PrivateKey(pkey, nullptr /* key_data*/);
142*789431f2SAndroid Build Coastguard Worker if (key_data_size <= 0) return TranslateLastOpenSslError();
143*789431f2SAndroid Build Coastguard Worker
144*789431f2SAndroid Build Coastguard Worker if (!key_blob->Reset(key_data_size)) return KM_ERROR_MEMORY_ALLOCATION_FAILED;
145*789431f2SAndroid Build Coastguard Worker
146*789431f2SAndroid Build Coastguard Worker uint8_t* tmp = key_blob->writable_data();
147*789431f2SAndroid Build Coastguard Worker i2d_PrivateKey(pkey, &tmp);
148*789431f2SAndroid Build Coastguard Worker break;
149*789431f2SAndroid Build Coastguard Worker }
150*789431f2SAndroid Build Coastguard Worker }
151*789431f2SAndroid Build Coastguard Worker
152*789431f2SAndroid Build Coastguard Worker return KM_ERROR_OK;
153*789431f2SAndroid Build Coastguard Worker }
154*789431f2SAndroid Build Coastguard Worker
155*789431f2SAndroid Build Coastguard Worker // Remote provisioning helper function
GetEcdsa256KeyFromCert(const keymaster_blob_t * km_cert,uint8_t * x_coord,size_t x_length,uint8_t * y_coord,size_t y_length)156*789431f2SAndroid Build Coastguard Worker keymaster_error_t GetEcdsa256KeyFromCert(const keymaster_blob_t* km_cert, uint8_t* x_coord,
157*789431f2SAndroid Build Coastguard Worker size_t x_length, uint8_t* y_coord, size_t y_length) {
158*789431f2SAndroid Build Coastguard Worker if (km_cert == nullptr || x_coord == nullptr || y_coord == nullptr) {
159*789431f2SAndroid Build Coastguard Worker return KM_ERROR_UNEXPECTED_NULL_POINTER;
160*789431f2SAndroid Build Coastguard Worker }
161*789431f2SAndroid Build Coastguard Worker if (x_length != kAffinePointLength || y_length != kAffinePointLength) {
162*789431f2SAndroid Build Coastguard Worker return KM_ERROR_INVALID_ARGUMENT;
163*789431f2SAndroid Build Coastguard Worker }
164*789431f2SAndroid Build Coastguard Worker const uint8_t* temp = km_cert->data;
165*789431f2SAndroid Build Coastguard Worker X509_Ptr cert(d2i_X509(NULL, &temp, km_cert->data_length));
166*789431f2SAndroid Build Coastguard Worker if (!cert.get()) return TranslateLastOpenSslError();
167*789431f2SAndroid Build Coastguard Worker EVP_PKEY_Ptr pubKey(X509_get_pubkey(cert.get()));
168*789431f2SAndroid Build Coastguard Worker if (!pubKey.get()) return TranslateLastOpenSslError();
169*789431f2SAndroid Build Coastguard Worker EC_KEY* ecKey = EVP_PKEY_get0_EC_KEY(pubKey.get());
170*789431f2SAndroid Build Coastguard Worker if (!ecKey) return TranslateLastOpenSslError();
171*789431f2SAndroid Build Coastguard Worker const EC_POINT* jacobian_coords = EC_KEY_get0_public_key(ecKey);
172*789431f2SAndroid Build Coastguard Worker if (!jacobian_coords) return TranslateLastOpenSslError();
173*789431f2SAndroid Build Coastguard Worker bssl::UniquePtr<BIGNUM> x(BN_new());
174*789431f2SAndroid Build Coastguard Worker bssl::UniquePtr<BIGNUM> y(BN_new());
175*789431f2SAndroid Build Coastguard Worker BN_CTX_Ptr ctx(BN_CTX_new());
176*789431f2SAndroid Build Coastguard Worker if (!ctx.get()) return TranslateLastOpenSslError();
177*789431f2SAndroid Build Coastguard Worker if (!EC_POINT_get_affine_coordinates_GFp(EC_KEY_get0_group(ecKey), jacobian_coords, x.get(),
178*789431f2SAndroid Build Coastguard Worker y.get(), ctx.get())) {
179*789431f2SAndroid Build Coastguard Worker return TranslateLastOpenSslError();
180*789431f2SAndroid Build Coastguard Worker }
181*789431f2SAndroid Build Coastguard Worker uint8_t* tmp_x = x_coord;
182*789431f2SAndroid Build Coastguard Worker if (BN_bn2binpad(x.get(), tmp_x, kAffinePointLength) != kAffinePointLength) {
183*789431f2SAndroid Build Coastguard Worker return TranslateLastOpenSslError();
184*789431f2SAndroid Build Coastguard Worker }
185*789431f2SAndroid Build Coastguard Worker uint8_t* tmp_y = y_coord;
186*789431f2SAndroid Build Coastguard Worker if (BN_bn2binpad(y.get(), tmp_y, kAffinePointLength) != kAffinePointLength) {
187*789431f2SAndroid Build Coastguard Worker return TranslateLastOpenSslError();
188*789431f2SAndroid Build Coastguard Worker }
189*789431f2SAndroid Build Coastguard Worker return KM_ERROR_OK;
190*789431f2SAndroid Build Coastguard Worker }
191*789431f2SAndroid Build Coastguard Worker
ec_group_size_bits(EC_KEY * ec_key)192*789431f2SAndroid Build Coastguard Worker size_t ec_group_size_bits(EC_KEY* ec_key) {
193*789431f2SAndroid Build Coastguard Worker const EC_GROUP* group = EC_KEY_get0_group(ec_key);
194*789431f2SAndroid Build Coastguard Worker UniquePtr<BN_CTX, BN_CTX_Delete> bn_ctx(BN_CTX_new());
195*789431f2SAndroid Build Coastguard Worker UniquePtr<BIGNUM, BIGNUM_Delete> order(BN_new());
196*789431f2SAndroid Build Coastguard Worker if (!EC_GROUP_get_order(group, order.get(), bn_ctx.get())) {
197*789431f2SAndroid Build Coastguard Worker LOG_E("Failed to get EC group order");
198*789431f2SAndroid Build Coastguard Worker return 0;
199*789431f2SAndroid Build Coastguard Worker }
200*789431f2SAndroid Build Coastguard Worker return BN_num_bits(order.get());
201*789431f2SAndroid Build Coastguard Worker }
202*789431f2SAndroid Build Coastguard Worker
GenerateRandom(uint8_t * buf,size_t length)203*789431f2SAndroid Build Coastguard Worker keymaster_error_t GenerateRandom(uint8_t* buf, size_t length) {
204*789431f2SAndroid Build Coastguard Worker if (RAND_bytes(buf, length) != 1) return KM_ERROR_UNKNOWN_ERROR;
205*789431f2SAndroid Build Coastguard Worker return KM_ERROR_OK;
206*789431f2SAndroid Build Coastguard Worker }
207*789431f2SAndroid Build Coastguard Worker
208*789431f2SAndroid Build Coastguard Worker } // namespace keymaster
209