blob: cb788d0fecc31cf1a8073d36801d5a10aa455361 [file] [log] [blame]
Thai Duong7689ed62015-03-20 16:50:18 -07001/*
2 * Copyright 2015 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
Janis Danisevskisf54cc932017-05-10 15:29:10 -070017#include <keymaster/km_openssl/hmac.h>
Thai Duong7689ed62015-03-20 16:50:18 -070018
19#include <assert.h>
Shawn Willden0f906ec2015-06-20 09:16:30 -060020
Thai Duong7689ed62015-03-20 16:50:18 -070021#include <openssl/evp.h>
22#include <openssl/hmac.h>
Shawn Willden0f906ec2015-06-20 09:16:30 -060023#include <openssl/mem.h>
Thai Duong7689ed62015-03-20 16:50:18 -070024#include <openssl/sha.h>
25
Shawn Willden0f906ec2015-06-20 09:16:30 -060026#include <keymaster/android_keymaster_utils.h>
Adam Langleyc3326552015-04-28 13:20:52 -070027
Thai Duong7689ed62015-03-20 16:50:18 -070028namespace keymaster {
29
30size_t HmacSha256::DigestLength() const {
31 return SHA256_DIGEST_LENGTH;
32}
33
Thai Duong60eebdc2015-03-25 17:20:24 -070034bool HmacSha256::Init(const Buffer& key) {
35 return Init(key.peek_read(), key.available_read());
36}
37
Thai Duong7689ed62015-03-20 16:50:18 -070038bool HmacSha256::Init(const uint8_t* key, size_t key_len) {
Shawn Willden32873522020-12-14 22:29:46 -070039 if (!key) return false;
Thai Duong7689ed62015-03-20 16:50:18 -070040
Thai Duong60eebdc2015-03-25 17:20:24 -070041 key_len_ = key_len;
Shawn Willden0f906ec2015-06-20 09:16:30 -060042 key_.reset(dup_buffer(key, key_len));
Thai Duong60eebdc2015-03-25 17:20:24 -070043 if (!key_.get()) {
44 return false;
45 }
Thai Duong7689ed62015-03-20 16:50:18 -070046 return true;
47}
48
Thai Duong7689ed62015-03-20 16:50:18 -070049bool HmacSha256::Sign(const Buffer& data, uint8_t* out_digest, size_t digest_len) const {
50 return Sign(data.peek_read(), data.available_read(), out_digest, digest_len);
51}
52
53bool HmacSha256::Sign(const uint8_t* data, size_t data_len, uint8_t* out_digest,
Thai Duong60eebdc2015-03-25 17:20:24 -070054 size_t digest_len) const {
Thai Duong7689ed62015-03-20 16:50:18 -070055 assert(digest_len);
56
57 uint8_t tmp[SHA256_DIGEST_LENGTH];
58 uint8_t* digest = tmp;
Shawn Willden32873522020-12-14 22:29:46 -070059 if (digest_len >= SHA256_DIGEST_LENGTH) digest = out_digest;
Thai Duong7689ed62015-03-20 16:50:18 -070060
Thai Duong60eebdc2015-03-25 17:20:24 -070061 if (nullptr == ::HMAC(EVP_sha256(), key_.get(), key_len_, data, data_len, digest, nullptr)) {
Thai Duong7689ed62015-03-20 16:50:18 -070062 return false;
63 }
Shawn Willden32873522020-12-14 22:29:46 -070064 if (digest_len < SHA256_DIGEST_LENGTH) memcpy(out_digest, tmp, digest_len);
Thai Duong7689ed62015-03-20 16:50:18 -070065
66 return true;
67}
68
69bool HmacSha256::Verify(const Buffer& data, const Buffer& digest) const {
70 return Verify(data.peek_read(), data.available_read(), digest.peek_read(),
71 digest.available_read());
72}
73
74bool HmacSha256::Verify(const uint8_t* data, size_t data_len, const uint8_t* digest,
Thai Duong60eebdc2015-03-25 17:20:24 -070075 size_t digest_len) const {
Shawn Willden32873522020-12-14 22:29:46 -070076 if (digest_len != SHA256_DIGEST_LENGTH) return false;
Thai Duong7689ed62015-03-20 16:50:18 -070077
78 uint8_t computed_digest[SHA256_DIGEST_LENGTH];
Shawn Willden32873522020-12-14 22:29:46 -070079 if (!Sign(data, data_len, computed_digest, sizeof(computed_digest))) return false;
Thai Duong7689ed62015-03-20 16:50:18 -070080
81 return 0 == CRYPTO_memcmp(digest, computed_digest, SHA256_DIGEST_LENGTH);
82}
83
84} // namespace keymaster