// // Copyright (C) 2020 The Android Open Source Project // // Licensed under the Apache License, Version 2.0 (the "License"); // you may not use this file except in compliance with the License. // You may obtain a copy of the License at // // http://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. // See the License for the specific language governing permissions and // limitations under the License. #include "tpm_key_blob_maker.h" #include #include #include #include #include "host/commands/secure_env/composite_serialization.h" #include "host/commands/secure_env/encrypted_serializable.h" #include "host/commands/secure_env/hmac_serializable.h" #include "host/commands/secure_env/primary_key_builder.h" using keymaster::AuthorizationSet; using keymaster::KeymasterKeyBlob; using keymaster::Serializable; static constexpr char kUniqueKey[] = "TpmKeyBlobMaker"; /** * Distinguish what properties the secure_env implementation handles. If * secure_env handles it, the property is put in `hw_enforced`. Otherwise, the * property is put in `sw_enforced`, and the Keystore process inside Android * will try to enforce the property. */ static keymaster_error_t SplitEnforcedProperties( const keymaster::AuthorizationSet& key_description, keymaster::AuthorizationSet* hw_enforced, keymaster::AuthorizationSet* sw_enforced) { for (auto& entry : key_description) { switch (entry.tag) { case KM_TAG_PURPOSE: case KM_TAG_ALGORITHM: case KM_TAG_KEY_SIZE: case KM_TAG_RSA_PUBLIC_EXPONENT: case KM_TAG_BLOB_USAGE_REQUIREMENTS: case KM_TAG_DIGEST: case KM_TAG_PADDING: case KM_TAG_BLOCK_MODE: case KM_TAG_MIN_SECONDS_BETWEEN_OPS: case KM_TAG_MAX_USES_PER_BOOT: case KM_TAG_USER_SECURE_ID: case KM_TAG_NO_AUTH_REQUIRED: case KM_TAG_AUTH_TIMEOUT: case KM_TAG_CALLER_NONCE: case KM_TAG_MIN_MAC_LENGTH: case KM_TAG_KDF: case KM_TAG_EC_CURVE: case KM_TAG_ECIES_SINGLE_HASH_MODE: case KM_TAG_USER_AUTH_TYPE: case KM_TAG_ORIGIN: case KM_TAG_OS_VERSION: case KM_TAG_OS_PATCHLEVEL: case KM_TAG_EARLY_BOOT_ONLY: case KM_TAG_UNLOCKED_DEVICE_REQUIRED: hw_enforced->push_back(entry); break; default: sw_enforced->push_back(entry); } } return KM_ERROR_OK; } static KeymasterKeyBlob SerializableToKeyBlob( const Serializable& serializable) { std::vector data(serializable.SerializedSize() + 1); uint8_t* buf = data.data(); uint8_t* buf_end = buf + data.size(); buf = serializable.Serialize(buf, buf_end); if (buf != (buf_end - 1)) { LOG(ERROR) << "Serialized size did not match up with actual usage."; return {}; } return KeymasterKeyBlob(data.data(), buf - data.data()); } TpmKeyBlobMaker::TpmKeyBlobMaker(TpmResourceManager& resource_manager) : resource_manager_(resource_manager) { } keymaster_error_t TpmKeyBlobMaker::CreateKeyBlob( const AuthorizationSet& key_description, keymaster_key_origin_t origin, const KeymasterKeyBlob& key_material, KeymasterKeyBlob* blob, AuthorizationSet* hw_enforced, AuthorizationSet* sw_enforced) const { std::set protected_tags = { KM_TAG_ROOT_OF_TRUST, KM_TAG_ORIGIN, KM_TAG_OS_VERSION, KM_TAG_OS_PATCHLEVEL, }; for (auto tag : protected_tags) { if (key_description.Contains(tag)) { LOG(ERROR) << "Invalid tag " << tag; return KM_ERROR_INVALID_TAG; } } auto rc = SplitEnforcedProperties(key_description, hw_enforced, sw_enforced); if (rc != KM_ERROR_OK) { return rc; } hw_enforced->push_back(keymaster::TAG_ORIGIN, origin); // TODO(schuffelen): Set the os level and patch level properly. hw_enforced->push_back(keymaster::TAG_OS_VERSION, os_version_); hw_enforced->push_back(keymaster::TAG_OS_PATCHLEVEL, os_patchlevel_); return UnvalidatedCreateKeyBlob(key_material, *hw_enforced, *sw_enforced, blob); } keymaster_error_t TpmKeyBlobMaker::UnvalidatedCreateKeyBlob( const KeymasterKeyBlob& key_material, const AuthorizationSet& hw_enforced, const AuthorizationSet& sw_enforced, KeymasterKeyBlob* blob) const { keymaster::Buffer key_material_buffer( key_material.key_material, key_material.key_material_size); AuthorizationSet hw_enforced_mutable = hw_enforced; AuthorizationSet sw_enforced_mutable = sw_enforced; CompositeSerializable sensitive_material( {&key_material_buffer, &hw_enforced_mutable, &sw_enforced_mutable}); auto parent_key_fn = ParentKeyCreator(kUniqueKey); EncryptedSerializable encryption( resource_manager_, parent_key_fn, sensitive_material); auto signing_key_fn = SigningKeyCreator(kUniqueKey); HmacSerializable sign_check( resource_manager_, signing_key_fn, TPM2_SHA256_DIGEST_SIZE, &encryption); auto generated_blob = SerializableToKeyBlob(sign_check); LOG(VERBOSE) << "Keymaster key size: " << generated_blob.key_material_size; if (generated_blob.key_material_size != 0) { *blob = generated_blob; return KM_ERROR_OK; } LOG(ERROR) << "Failed to serialize key."; return KM_ERROR_UNKNOWN_ERROR; } keymaster_error_t TpmKeyBlobMaker::UnwrapKeyBlob( const keymaster_key_blob_t& blob, AuthorizationSet* hw_enforced, AuthorizationSet* sw_enforced, KeymasterKeyBlob* key_material) const { keymaster::Buffer key_material_buffer(blob.key_material_size); CompositeSerializable sensitive_material( {&key_material_buffer, hw_enforced, sw_enforced}); auto parent_key_fn = ParentKeyCreator(kUniqueKey); EncryptedSerializable encryption( resource_manager_, parent_key_fn, sensitive_material); auto signing_key_fn = SigningKeyCreator(kUniqueKey); HmacSerializable sign_check( resource_manager_, signing_key_fn, TPM2_SHA256_DIGEST_SIZE, &encryption); auto buf = blob.key_material; auto buf_end = buf + blob.key_material_size; if (!sign_check.Deserialize(&buf, buf_end)) { LOG(ERROR) << "Failed to deserialize key."; return KM_ERROR_UNKNOWN_ERROR; } if (key_material_buffer.available_read() == 0) { LOG(ERROR) << "Key material was corrupted and the size was too large"; return KM_ERROR_UNKNOWN_ERROR; } *key_material = KeymasterKeyBlob( key_material_buffer.peek_read(), key_material_buffer.available_read()); return KM_ERROR_OK; } keymaster_error_t TpmKeyBlobMaker::SetSystemVersion( uint32_t os_version, uint32_t os_patchlevel) { // TODO(b/155697375): Only accept new values of these from the bootloader os_version_ = os_version; os_patchlevel_ = os_patchlevel; return KM_ERROR_OK; }