upload android base code part6
This commit is contained in:
parent
421e214c7d
commit
4e516ec6ed
35396 changed files with 9188716 additions and 0 deletions
136
android/system/keymaster/openssl_utils.cpp
Normal file
136
android/system/keymaster/openssl_utils.cpp
Normal file
|
@ -0,0 +1,136 @@
|
|||
/*
|
||||
* Copyright 2015 The Android Open Source Project
|
||||
*
|
||||
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||
* you may not use this file except in compliance with the License.
|
||||
* You may obtain a copy of the License at
|
||||
*
|
||||
* http://www.apache.org/licenses/LICENSE-2.0
|
||||
*
|
||||
* Unless required by applicable law or agreed to in writing, software
|
||||
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
* See the License for the specific language governing permissions and
|
||||
* limitations under the License.
|
||||
*/
|
||||
|
||||
#include "openssl_utils.h"
|
||||
|
||||
#include <keymaster/android_keymaster_utils.h>
|
||||
|
||||
#include "openssl_err.h"
|
||||
|
||||
namespace keymaster {
|
||||
|
||||
keymaster_error_t ec_get_group_size(const EC_GROUP* group, size_t* key_size_bits) {
|
||||
switch (EC_GROUP_get_curve_name(group)) {
|
||||
case NID_secp224r1:
|
||||
*key_size_bits = 224;
|
||||
break;
|
||||
case NID_X9_62_prime256v1:
|
||||
*key_size_bits = 256;
|
||||
break;
|
||||
case NID_secp384r1:
|
||||
*key_size_bits = 384;
|
||||
break;
|
||||
case NID_secp521r1:
|
||||
*key_size_bits = 521;
|
||||
break;
|
||||
default:
|
||||
return KM_ERROR_UNSUPPORTED_EC_FIELD;
|
||||
}
|
||||
return KM_ERROR_OK;
|
||||
}
|
||||
|
||||
EC_GROUP* ec_get_group(keymaster_ec_curve_t curve) {
|
||||
switch (curve) {
|
||||
case KM_EC_CURVE_P_224:
|
||||
return EC_GROUP_new_by_curve_name(NID_secp224r1);
|
||||
break;
|
||||
case KM_EC_CURVE_P_256:
|
||||
return EC_GROUP_new_by_curve_name(NID_X9_62_prime256v1);
|
||||
break;
|
||||
case KM_EC_CURVE_P_384:
|
||||
return EC_GROUP_new_by_curve_name(NID_secp384r1);
|
||||
break;
|
||||
case KM_EC_CURVE_P_521:
|
||||
return EC_GROUP_new_by_curve_name(NID_secp521r1);
|
||||
break;
|
||||
default:
|
||||
return nullptr;
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
static int convert_to_evp(keymaster_algorithm_t algorithm) {
|
||||
switch (algorithm) {
|
||||
case KM_ALGORITHM_RSA:
|
||||
return EVP_PKEY_RSA;
|
||||
case KM_ALGORITHM_EC:
|
||||
return EVP_PKEY_EC;
|
||||
default:
|
||||
return -1;
|
||||
};
|
||||
}
|
||||
|
||||
keymaster_error_t convert_pkcs8_blob_to_evp(const uint8_t* key_data, size_t key_length,
|
||||
keymaster_algorithm_t expected_algorithm,
|
||||
UniquePtr<EVP_PKEY, EVP_PKEY_Delete>* pkey) {
|
||||
if (key_data == NULL || key_length <= 0)
|
||||
return KM_ERROR_INVALID_KEY_BLOB;
|
||||
|
||||
UniquePtr<PKCS8_PRIV_KEY_INFO, PKCS8_PRIV_KEY_INFO_Delete> pkcs8(
|
||||
d2i_PKCS8_PRIV_KEY_INFO(NULL, &key_data, key_length));
|
||||
if (pkcs8.get() == NULL)
|
||||
return TranslateLastOpenSslError(true /* log_message */);
|
||||
|
||||
pkey->reset(EVP_PKCS82PKEY(pkcs8.get()));
|
||||
if (!pkey->get())
|
||||
return TranslateLastOpenSslError(true /* log_message */);
|
||||
|
||||
if (EVP_PKEY_type((*pkey)->type) != convert_to_evp(expected_algorithm)) {
|
||||
LOG_E("EVP key algorithm was %d, not the expected %d", EVP_PKEY_type((*pkey)->type),
|
||||
convert_to_evp(expected_algorithm));
|
||||
return KM_ERROR_INVALID_KEY_BLOB;
|
||||
}
|
||||
|
||||
return KM_ERROR_OK;
|
||||
}
|
||||
|
||||
keymaster_error_t KeyMaterialToEvpKey(keymaster_key_format_t key_format,
|
||||
const KeymasterKeyBlob& key_material,
|
||||
keymaster_algorithm_t expected_algorithm,
|
||||
UniquePtr<EVP_PKEY, EVP_PKEY_Delete>* pkey) {
|
||||
if (key_format != KM_KEY_FORMAT_PKCS8)
|
||||
return KM_ERROR_UNSUPPORTED_KEY_FORMAT;
|
||||
|
||||
return convert_pkcs8_blob_to_evp(key_material.key_material, key_material.key_material_size,
|
||||
expected_algorithm, pkey);
|
||||
}
|
||||
|
||||
keymaster_error_t EvpKeyToKeyMaterial(const EVP_PKEY* pkey, KeymasterKeyBlob* key_blob) {
|
||||
int key_data_size = i2d_PrivateKey(pkey, NULL /* key_data*/);
|
||||
if (key_data_size <= 0)
|
||||
return TranslateLastOpenSslError();
|
||||
|
||||
if (!key_blob->Reset(key_data_size))
|
||||
return KM_ERROR_MEMORY_ALLOCATION_FAILED;
|
||||
|
||||
uint8_t* tmp = key_blob->writable_data();
|
||||
i2d_PrivateKey(pkey, &tmp);
|
||||
|
||||
return KM_ERROR_OK;
|
||||
}
|
||||
|
||||
size_t ec_group_size_bits(EC_KEY* ec_key) {
|
||||
const EC_GROUP* group = EC_KEY_get0_group(ec_key);
|
||||
UniquePtr<BN_CTX, BN_CTX_Delete> bn_ctx(BN_CTX_new());
|
||||
UniquePtr<BIGNUM, BIGNUM_Delete> order(BN_new());
|
||||
if (!EC_GROUP_get_order(group, order.get(), bn_ctx.get())) {
|
||||
LOG_E("Failed to get EC group order", 0);
|
||||
return 0;
|
||||
}
|
||||
return BN_num_bits(order.get());
|
||||
}
|
||||
|
||||
} // namespace keymaster
|
Loading…
Add table
Add a link
Reference in a new issue