1 /* 2 * Copyright (C) 2015 The Android Open Source Project 3 * 4 * Licensed under the Apache License, Version 2.0 (the "License"); 5 * you may not use this file except in compliance with the License. 6 * You may obtain a copy of the License at 7 * 8 * http://www.apache.org/licenses/LICENSE-2.0 9 * 10 * Unless required by applicable law or agreed to in writing, software 11 * distributed under the License is distributed on an "AS IS" BASIS, 12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 13 * See the License for the specific language governing permissions and 14 * limitations under the License. 15 */ 16 17 package android.security.keystore; 18 19 import android.annotation.CallSuper; 20 import android.annotation.NonNull; 21 import android.annotation.Nullable; 22 import android.os.IBinder; 23 import android.security.KeyStore; 24 import android.security.KeyStoreException; 25 import android.security.keymaster.KeymasterArguments; 26 import android.security.keymaster.KeymasterDefs; 27 import android.security.keymaster.OperationResult; 28 29 import libcore.util.EmptyArray; 30 31 import java.nio.BufferOverflowException; 32 import java.nio.ByteBuffer; 33 import java.security.AlgorithmParameters; 34 import java.security.GeneralSecurityException; 35 import java.security.InvalidAlgorithmParameterException; 36 import java.security.InvalidKeyException; 37 import java.security.InvalidParameterException; 38 import java.security.Key; 39 import java.security.KeyFactory; 40 import java.security.NoSuchAlgorithmException; 41 import java.security.PrivateKey; 42 import java.security.ProviderException; 43 import java.security.PublicKey; 44 import java.security.SecureRandom; 45 import java.security.spec.AlgorithmParameterSpec; 46 import java.security.spec.InvalidKeySpecException; 47 import java.security.spec.PKCS8EncodedKeySpec; 48 import java.security.spec.X509EncodedKeySpec; 49 50 import javax.crypto.AEADBadTagException; 51 import javax.crypto.BadPaddingException; 52 import javax.crypto.Cipher; 53 import javax.crypto.CipherSpi; 54 import javax.crypto.IllegalBlockSizeException; 55 import javax.crypto.NoSuchPaddingException; 56 import javax.crypto.SecretKey; 57 import javax.crypto.SecretKeyFactory; 58 import javax.crypto.ShortBufferException; 59 import javax.crypto.spec.SecretKeySpec; 60 61 /** 62 * Base class for {@link CipherSpi} implementations of Android KeyStore backed ciphers. 63 * 64 * @hide 65 */ 66 abstract class AndroidKeyStoreCipherSpiBase extends CipherSpi implements KeyStoreCryptoOperation { 67 private final KeyStore mKeyStore; 68 69 // Fields below are populated by Cipher.init and KeyStore.begin and should be preserved after 70 // doFinal finishes. 71 private boolean mEncrypting; 72 private int mKeymasterPurposeOverride = -1; 73 private AndroidKeyStoreKey mKey; 74 private SecureRandom mRng; 75 76 /** 77 * Token referencing this operation inside keystore service. It is initialized by 78 * {@code engineInit} and is invalidated when {@code engineDoFinal} succeeds and on some error 79 * conditions in between. 80 */ 81 private IBinder mOperationToken; 82 private long mOperationHandle; 83 private KeyStoreCryptoOperationStreamer mMainDataStreamer; 84 private KeyStoreCryptoOperationStreamer mAdditionalAuthenticationDataStreamer; 85 private boolean mAdditionalAuthenticationDataStreamerClosed; 86 87 /** 88 * Encountered exception which could not be immediately thrown because it was encountered inside 89 * a method that does not throw checked exception. This exception will be thrown from 90 * {@code engineDoFinal}. Once such an exception is encountered, {@code engineUpdate} and 91 * {@code engineDoFinal} start ignoring input data. 92 */ 93 private Exception mCachedException; 94 AndroidKeyStoreCipherSpiBase()95 AndroidKeyStoreCipherSpiBase() { 96 mKeyStore = KeyStore.getInstance(); 97 } 98 99 @Override engineInit(int opmode, Key key, SecureRandom random)100 protected final void engineInit(int opmode, Key key, SecureRandom random) 101 throws InvalidKeyException { 102 resetAll(); 103 104 boolean success = false; 105 try { 106 init(opmode, key, random); 107 initAlgorithmSpecificParameters(); 108 try { 109 ensureKeystoreOperationInitialized(); 110 } catch (InvalidAlgorithmParameterException e) { 111 throw new InvalidKeyException(e); 112 } 113 success = true; 114 } finally { 115 if (!success) { 116 resetAll(); 117 } 118 } 119 } 120 121 @Override engineInit(int opmode, Key key, AlgorithmParameters params, SecureRandom random)122 protected final void engineInit(int opmode, Key key, AlgorithmParameters params, 123 SecureRandom random) throws InvalidKeyException, InvalidAlgorithmParameterException { 124 resetAll(); 125 126 boolean success = false; 127 try { 128 init(opmode, key, random); 129 initAlgorithmSpecificParameters(params); 130 ensureKeystoreOperationInitialized(); 131 success = true; 132 } finally { 133 if (!success) { 134 resetAll(); 135 } 136 } 137 } 138 139 @Override engineInit(int opmode, Key key, AlgorithmParameterSpec params, SecureRandom random)140 protected final void engineInit(int opmode, Key key, AlgorithmParameterSpec params, 141 SecureRandom random) throws InvalidKeyException, InvalidAlgorithmParameterException { 142 resetAll(); 143 144 boolean success = false; 145 try { 146 init(opmode, key, random); 147 initAlgorithmSpecificParameters(params); 148 ensureKeystoreOperationInitialized(); 149 success = true; 150 } finally { 151 if (!success) { 152 resetAll(); 153 } 154 } 155 } 156 init(int opmode, Key key, SecureRandom random)157 private void init(int opmode, Key key, SecureRandom random) throws InvalidKeyException { 158 switch (opmode) { 159 case Cipher.ENCRYPT_MODE: 160 case Cipher.WRAP_MODE: 161 mEncrypting = true; 162 break; 163 case Cipher.DECRYPT_MODE: 164 case Cipher.UNWRAP_MODE: 165 mEncrypting = false; 166 break; 167 default: 168 throw new InvalidParameterException("Unsupported opmode: " + opmode); 169 } 170 initKey(opmode, key); 171 if (mKey == null) { 172 throw new ProviderException("initKey did not initialize the key"); 173 } 174 mRng = random; 175 } 176 177 /** 178 * Resets this cipher to its pristine pre-init state. This must be equivalent to obtaining a new 179 * cipher instance. 180 * 181 * <p>Subclasses storing additional state should override this method, reset the additional 182 * state, and then chain to superclass. 183 */ 184 @CallSuper resetAll()185 protected void resetAll() { 186 IBinder operationToken = mOperationToken; 187 if (operationToken != null) { 188 mKeyStore.abort(operationToken); 189 } 190 mEncrypting = false; 191 mKeymasterPurposeOverride = -1; 192 mKey = null; 193 mRng = null; 194 mOperationToken = null; 195 mOperationHandle = 0; 196 mMainDataStreamer = null; 197 mAdditionalAuthenticationDataStreamer = null; 198 mAdditionalAuthenticationDataStreamerClosed = false; 199 mCachedException = null; 200 } 201 202 /** 203 * Resets this cipher while preserving the initialized state. This must be equivalent to 204 * rolling back the cipher's state to just after the most recent {@code engineInit} completed 205 * successfully. 206 * 207 * <p>Subclasses storing additional post-init state should override this method, reset the 208 * additional state, and then chain to superclass. 209 */ 210 @CallSuper resetWhilePreservingInitState()211 protected void resetWhilePreservingInitState() { 212 IBinder operationToken = mOperationToken; 213 if (operationToken != null) { 214 mKeyStore.abort(operationToken); 215 } 216 mOperationToken = null; 217 mOperationHandle = 0; 218 mMainDataStreamer = null; 219 mAdditionalAuthenticationDataStreamer = null; 220 mAdditionalAuthenticationDataStreamerClosed = false; 221 mCachedException = null; 222 } 223 ensureKeystoreOperationInitialized()224 private void ensureKeystoreOperationInitialized() throws InvalidKeyException, 225 InvalidAlgorithmParameterException { 226 if (mMainDataStreamer != null) { 227 return; 228 } 229 if (mCachedException != null) { 230 return; 231 } 232 if (mKey == null) { 233 throw new IllegalStateException("Not initialized"); 234 } 235 236 KeymasterArguments keymasterInputArgs = new KeymasterArguments(); 237 addAlgorithmSpecificParametersToBegin(keymasterInputArgs); 238 byte[] additionalEntropy = KeyStoreCryptoOperationUtils.getRandomBytesToMixIntoKeystoreRng( 239 mRng, getAdditionalEntropyAmountForBegin()); 240 241 int purpose; 242 if (mKeymasterPurposeOverride != -1) { 243 purpose = mKeymasterPurposeOverride; 244 } else { 245 purpose = mEncrypting 246 ? KeymasterDefs.KM_PURPOSE_ENCRYPT : KeymasterDefs.KM_PURPOSE_DECRYPT; 247 } 248 OperationResult opResult = mKeyStore.begin( 249 mKey.getAlias(), 250 purpose, 251 true, // permit aborting this operation if keystore runs out of resources 252 keymasterInputArgs, 253 additionalEntropy, 254 mKey.getUid()); 255 if (opResult == null) { 256 throw new KeyStoreConnectException(); 257 } 258 259 // Store operation token and handle regardless of the error code returned by KeyStore to 260 // ensure that the operation gets aborted immediately if the code below throws an exception. 261 mOperationToken = opResult.token; 262 mOperationHandle = opResult.operationHandle; 263 264 // If necessary, throw an exception due to KeyStore operation having failed. 265 GeneralSecurityException e = KeyStoreCryptoOperationUtils.getExceptionForCipherInit( 266 mKeyStore, mKey, opResult.resultCode); 267 if (e != null) { 268 if (e instanceof InvalidKeyException) { 269 throw (InvalidKeyException) e; 270 } else if (e instanceof InvalidAlgorithmParameterException) { 271 throw (InvalidAlgorithmParameterException) e; 272 } else { 273 throw new ProviderException("Unexpected exception type", e); 274 } 275 } 276 277 if (mOperationToken == null) { 278 throw new ProviderException("Keystore returned null operation token"); 279 } 280 if (mOperationHandle == 0) { 281 throw new ProviderException("Keystore returned invalid operation handle"); 282 } 283 284 loadAlgorithmSpecificParametersFromBeginResult(opResult.outParams); 285 mMainDataStreamer = createMainDataStreamer(mKeyStore, opResult.token); 286 mAdditionalAuthenticationDataStreamer = 287 createAdditionalAuthenticationDataStreamer(mKeyStore, opResult.token); 288 mAdditionalAuthenticationDataStreamerClosed = false; 289 } 290 291 /** 292 * Creates a streamer which sends plaintext/ciphertext into the provided KeyStore and receives 293 * the corresponding ciphertext/plaintext from the KeyStore. 294 * 295 * <p>This implementation returns a working streamer. 296 */ 297 @NonNull createMainDataStreamer( KeyStore keyStore, IBinder operationToken)298 protected KeyStoreCryptoOperationStreamer createMainDataStreamer( 299 KeyStore keyStore, IBinder operationToken) { 300 return new KeyStoreCryptoOperationChunkedStreamer( 301 new KeyStoreCryptoOperationChunkedStreamer.MainDataStream( 302 keyStore, operationToken), 0); 303 } 304 305 /** 306 * Creates a streamer which sends Additional Authentication Data (AAD) into the KeyStore. 307 * 308 * <p>This implementation returns {@code null}. 309 * 310 * @return stream or {@code null} if AAD is not supported by this cipher. 311 */ 312 @Nullable createAdditionalAuthenticationDataStreamer( @uppressWarnings"unused") KeyStore keyStore, @SuppressWarnings("unused") IBinder operationToken)313 protected KeyStoreCryptoOperationStreamer createAdditionalAuthenticationDataStreamer( 314 @SuppressWarnings("unused") KeyStore keyStore, 315 @SuppressWarnings("unused") IBinder operationToken) { 316 return null; 317 } 318 319 @Override engineUpdate(byte[] input, int inputOffset, int inputLen)320 protected final byte[] engineUpdate(byte[] input, int inputOffset, int inputLen) { 321 if (mCachedException != null) { 322 return null; 323 } 324 try { 325 ensureKeystoreOperationInitialized(); 326 } catch (InvalidKeyException | InvalidAlgorithmParameterException e) { 327 mCachedException = e; 328 return null; 329 } 330 331 if (inputLen == 0) { 332 return null; 333 } 334 335 byte[] output; 336 try { 337 flushAAD(); 338 output = mMainDataStreamer.update(input, inputOffset, inputLen); 339 } catch (KeyStoreException e) { 340 mCachedException = e; 341 return null; 342 } 343 344 if (output.length == 0) { 345 return null; 346 } 347 348 return output; 349 } 350 flushAAD()351 private void flushAAD() throws KeyStoreException { 352 if ((mAdditionalAuthenticationDataStreamer != null) 353 && (!mAdditionalAuthenticationDataStreamerClosed)) { 354 byte[] output; 355 try { 356 output = mAdditionalAuthenticationDataStreamer.doFinal( 357 EmptyArray.BYTE, 0, 0, 358 null, // no signature 359 null // no additional entropy needed flushing AAD 360 ); 361 } finally { 362 mAdditionalAuthenticationDataStreamerClosed = true; 363 } 364 if ((output != null) && (output.length > 0)) { 365 throw new ProviderException( 366 "AAD update unexpectedly returned data: " + output.length + " bytes"); 367 } 368 } 369 } 370 371 @Override engineUpdate(byte[] input, int inputOffset, int inputLen, byte[] output, int outputOffset)372 protected final int engineUpdate(byte[] input, int inputOffset, int inputLen, byte[] output, 373 int outputOffset) throws ShortBufferException { 374 byte[] outputCopy = engineUpdate(input, inputOffset, inputLen); 375 if (outputCopy == null) { 376 return 0; 377 } 378 int outputAvailable = output.length - outputOffset; 379 if (outputCopy.length > outputAvailable) { 380 throw new ShortBufferException("Output buffer too short. Produced: " 381 + outputCopy.length + ", available: " + outputAvailable); 382 } 383 System.arraycopy(outputCopy, 0, output, outputOffset, outputCopy.length); 384 return outputCopy.length; 385 } 386 387 @Override engineUpdate(ByteBuffer input, ByteBuffer output)388 protected final int engineUpdate(ByteBuffer input, ByteBuffer output) 389 throws ShortBufferException { 390 if (input == null) { 391 throw new NullPointerException("input == null"); 392 } 393 if (output == null) { 394 throw new NullPointerException("output == null"); 395 } 396 397 int inputSize = input.remaining(); 398 byte[] outputArray; 399 if (input.hasArray()) { 400 outputArray = 401 engineUpdate( 402 input.array(), input.arrayOffset() + input.position(), inputSize); 403 input.position(input.position() + inputSize); 404 } else { 405 byte[] inputArray = new byte[inputSize]; 406 input.get(inputArray); 407 outputArray = engineUpdate(inputArray, 0, inputSize); 408 } 409 410 int outputSize = (outputArray != null) ? outputArray.length : 0; 411 if (outputSize > 0) { 412 int outputBufferAvailable = output.remaining(); 413 try { 414 output.put(outputArray); 415 } catch (BufferOverflowException e) { 416 throw new ShortBufferException( 417 "Output buffer too small. Produced: " + outputSize + ", available: " 418 + outputBufferAvailable); 419 } 420 } 421 return outputSize; 422 } 423 424 @Override engineUpdateAAD(byte[] input, int inputOffset, int inputLen)425 protected final void engineUpdateAAD(byte[] input, int inputOffset, int inputLen) { 426 if (mCachedException != null) { 427 return; 428 } 429 430 try { 431 ensureKeystoreOperationInitialized(); 432 } catch (InvalidKeyException | InvalidAlgorithmParameterException e) { 433 mCachedException = e; 434 return; 435 } 436 437 if (mAdditionalAuthenticationDataStreamerClosed) { 438 throw new IllegalStateException( 439 "AAD can only be provided before Cipher.update is invoked"); 440 } 441 442 if (mAdditionalAuthenticationDataStreamer == null) { 443 throw new IllegalStateException("This cipher does not support AAD"); 444 } 445 446 byte[] output; 447 try { 448 output = mAdditionalAuthenticationDataStreamer.update(input, inputOffset, inputLen); 449 } catch (KeyStoreException e) { 450 mCachedException = e; 451 return; 452 } 453 454 if ((output != null) && (output.length > 0)) { 455 throw new ProviderException("AAD update unexpectedly produced output: " 456 + output.length + " bytes"); 457 } 458 } 459 460 @Override engineUpdateAAD(ByteBuffer src)461 protected final void engineUpdateAAD(ByteBuffer src) { 462 if (src == null) { 463 throw new IllegalArgumentException("src == null"); 464 } 465 if (!src.hasRemaining()) { 466 return; 467 } 468 469 byte[] input; 470 int inputOffset; 471 int inputLen; 472 if (src.hasArray()) { 473 input = src.array(); 474 inputOffset = src.arrayOffset() + src.position(); 475 inputLen = src.remaining(); 476 src.position(src.limit()); 477 } else { 478 input = new byte[src.remaining()]; 479 inputOffset = 0; 480 inputLen = input.length; 481 src.get(input); 482 } 483 engineUpdateAAD(input, inputOffset, inputLen); 484 } 485 486 @Override engineDoFinal(byte[] input, int inputOffset, int inputLen)487 protected final byte[] engineDoFinal(byte[] input, int inputOffset, int inputLen) 488 throws IllegalBlockSizeException, BadPaddingException { 489 if (mCachedException != null) { 490 throw (IllegalBlockSizeException) 491 new IllegalBlockSizeException().initCause(mCachedException); 492 } 493 494 try { 495 ensureKeystoreOperationInitialized(); 496 } catch (InvalidKeyException | InvalidAlgorithmParameterException e) { 497 throw (IllegalBlockSizeException) new IllegalBlockSizeException().initCause(e); 498 } 499 500 byte[] output; 501 try { 502 flushAAD(); 503 byte[] additionalEntropy = 504 KeyStoreCryptoOperationUtils.getRandomBytesToMixIntoKeystoreRng( 505 mRng, getAdditionalEntropyAmountForFinish()); 506 output = mMainDataStreamer.doFinal( 507 input, inputOffset, inputLen, 508 null, // no signature involved 509 additionalEntropy); 510 } catch (KeyStoreException e) { 511 switch (e.getErrorCode()) { 512 case KeymasterDefs.KM_ERROR_INVALID_INPUT_LENGTH: 513 throw (IllegalBlockSizeException) new IllegalBlockSizeException().initCause(e); 514 case KeymasterDefs.KM_ERROR_INVALID_ARGUMENT: 515 throw (BadPaddingException) new BadPaddingException().initCause(e); 516 case KeymasterDefs.KM_ERROR_VERIFICATION_FAILED: 517 throw (AEADBadTagException) new AEADBadTagException().initCause(e); 518 default: 519 throw (IllegalBlockSizeException) new IllegalBlockSizeException().initCause(e); 520 } 521 } 522 523 resetWhilePreservingInitState(); 524 return output; 525 } 526 527 @Override engineDoFinal(byte[] input, int inputOffset, int inputLen, byte[] output, int outputOffset)528 protected final int engineDoFinal(byte[] input, int inputOffset, int inputLen, byte[] output, 529 int outputOffset) throws ShortBufferException, IllegalBlockSizeException, 530 BadPaddingException { 531 byte[] outputCopy = engineDoFinal(input, inputOffset, inputLen); 532 if (outputCopy == null) { 533 return 0; 534 } 535 int outputAvailable = output.length - outputOffset; 536 if (outputCopy.length > outputAvailable) { 537 throw new ShortBufferException("Output buffer too short. Produced: " 538 + outputCopy.length + ", available: " + outputAvailable); 539 } 540 System.arraycopy(outputCopy, 0, output, outputOffset, outputCopy.length); 541 return outputCopy.length; 542 } 543 544 @Override engineDoFinal(ByteBuffer input, ByteBuffer output)545 protected final int engineDoFinal(ByteBuffer input, ByteBuffer output) 546 throws ShortBufferException, IllegalBlockSizeException, BadPaddingException { 547 if (input == null) { 548 throw new NullPointerException("input == null"); 549 } 550 if (output == null) { 551 throw new NullPointerException("output == null"); 552 } 553 554 int inputSize = input.remaining(); 555 byte[] outputArray; 556 if (input.hasArray()) { 557 outputArray = 558 engineDoFinal( 559 input.array(), input.arrayOffset() + input.position(), inputSize); 560 input.position(input.position() + inputSize); 561 } else { 562 byte[] inputArray = new byte[inputSize]; 563 input.get(inputArray); 564 outputArray = engineDoFinal(inputArray, 0, inputSize); 565 } 566 567 int outputSize = (outputArray != null) ? outputArray.length : 0; 568 if (outputSize > 0) { 569 int outputBufferAvailable = output.remaining(); 570 try { 571 output.put(outputArray); 572 } catch (BufferOverflowException e) { 573 throw new ShortBufferException( 574 "Output buffer too small. Produced: " + outputSize + ", available: " 575 + outputBufferAvailable); 576 } 577 } 578 return outputSize; 579 } 580 581 @Override engineWrap(Key key)582 protected final byte[] engineWrap(Key key) 583 throws IllegalBlockSizeException, InvalidKeyException { 584 if (mKey == null) { 585 throw new IllegalStateException("Not initilized"); 586 } 587 588 if (!isEncrypting()) { 589 throw new IllegalStateException( 590 "Cipher must be initialized in Cipher.WRAP_MODE to wrap keys"); 591 } 592 593 if (key == null) { 594 throw new NullPointerException("key == null"); 595 } 596 byte[] encoded = null; 597 if (key instanceof SecretKey) { 598 if ("RAW".equalsIgnoreCase(key.getFormat())) { 599 encoded = key.getEncoded(); 600 } 601 if (encoded == null) { 602 try { 603 SecretKeyFactory keyFactory = SecretKeyFactory.getInstance(key.getAlgorithm()); 604 SecretKeySpec spec = 605 (SecretKeySpec) keyFactory.getKeySpec( 606 (SecretKey) key, SecretKeySpec.class); 607 encoded = spec.getEncoded(); 608 } catch (NoSuchAlgorithmException | InvalidKeySpecException e) { 609 throw new InvalidKeyException( 610 "Failed to wrap key because it does not export its key material", 611 e); 612 } 613 } 614 } else if (key instanceof PrivateKey) { 615 if ("PKCS8".equalsIgnoreCase(key.getFormat())) { 616 encoded = key.getEncoded(); 617 } 618 if (encoded == null) { 619 try { 620 KeyFactory keyFactory = KeyFactory.getInstance(key.getAlgorithm()); 621 PKCS8EncodedKeySpec spec = 622 keyFactory.getKeySpec(key, PKCS8EncodedKeySpec.class); 623 encoded = spec.getEncoded(); 624 } catch (NoSuchAlgorithmException | InvalidKeySpecException e) { 625 throw new InvalidKeyException( 626 "Failed to wrap key because it does not export its key material", 627 e); 628 } 629 } 630 } else if (key instanceof PublicKey) { 631 if ("X.509".equalsIgnoreCase(key.getFormat())) { 632 encoded = key.getEncoded(); 633 } 634 if (encoded == null) { 635 try { 636 KeyFactory keyFactory = KeyFactory.getInstance(key.getAlgorithm()); 637 X509EncodedKeySpec spec = 638 keyFactory.getKeySpec(key, X509EncodedKeySpec.class); 639 encoded = spec.getEncoded(); 640 } catch (NoSuchAlgorithmException | InvalidKeySpecException e) { 641 throw new InvalidKeyException( 642 "Failed to wrap key because it does not export its key material", 643 e); 644 } 645 } 646 } else { 647 throw new InvalidKeyException("Unsupported key type: " + key.getClass().getName()); 648 } 649 650 if (encoded == null) { 651 throw new InvalidKeyException( 652 "Failed to wrap key because it does not export its key material"); 653 } 654 655 try { 656 return engineDoFinal(encoded, 0, encoded.length); 657 } catch (BadPaddingException e) { 658 throw (IllegalBlockSizeException) new IllegalBlockSizeException().initCause(e); 659 } 660 } 661 662 @Override engineUnwrap(byte[] wrappedKey, String wrappedKeyAlgorithm, int wrappedKeyType)663 protected final Key engineUnwrap(byte[] wrappedKey, String wrappedKeyAlgorithm, 664 int wrappedKeyType) throws InvalidKeyException, NoSuchAlgorithmException { 665 if (mKey == null) { 666 throw new IllegalStateException("Not initilized"); 667 } 668 669 if (isEncrypting()) { 670 throw new IllegalStateException( 671 "Cipher must be initialized in Cipher.WRAP_MODE to wrap keys"); 672 } 673 674 if (wrappedKey == null) { 675 throw new NullPointerException("wrappedKey == null"); 676 } 677 678 byte[] encoded; 679 try { 680 encoded = engineDoFinal(wrappedKey, 0, wrappedKey.length); 681 } catch (IllegalBlockSizeException | BadPaddingException e) { 682 throw new InvalidKeyException("Failed to unwrap key", e); 683 } 684 685 switch (wrappedKeyType) { 686 case Cipher.SECRET_KEY: 687 { 688 return new SecretKeySpec(encoded, wrappedKeyAlgorithm); 689 // break; 690 } 691 case Cipher.PRIVATE_KEY: 692 { 693 KeyFactory keyFactory = KeyFactory.getInstance(wrappedKeyAlgorithm); 694 try { 695 return keyFactory.generatePrivate(new PKCS8EncodedKeySpec(encoded)); 696 } catch (InvalidKeySpecException e) { 697 throw new InvalidKeyException( 698 "Failed to create private key from its PKCS#8 encoded form", e); 699 } 700 // break; 701 } 702 case Cipher.PUBLIC_KEY: 703 { 704 KeyFactory keyFactory = KeyFactory.getInstance(wrappedKeyAlgorithm); 705 try { 706 return keyFactory.generatePublic(new X509EncodedKeySpec(encoded)); 707 } catch (InvalidKeySpecException e) { 708 throw new InvalidKeyException( 709 "Failed to create public key from its X.509 encoded form", e); 710 } 711 // break; 712 } 713 default: 714 throw new InvalidParameterException( 715 "Unsupported wrappedKeyType: " + wrappedKeyType); 716 } 717 } 718 719 @Override engineSetMode(String mode)720 protected final void engineSetMode(String mode) throws NoSuchAlgorithmException { 721 // This should never be invoked because all algorithms registered with the AndroidKeyStore 722 // provide explicitly specify block mode. 723 throw new UnsupportedOperationException(); 724 } 725 726 @Override engineSetPadding(String arg0)727 protected final void engineSetPadding(String arg0) throws NoSuchPaddingException { 728 // This should never be invoked because all algorithms registered with the AndroidKeyStore 729 // provide explicitly specify padding mode. 730 throw new UnsupportedOperationException(); 731 } 732 733 @Override engineGetKeySize(Key key)734 protected final int engineGetKeySize(Key key) throws InvalidKeyException { 735 throw new UnsupportedOperationException(); 736 } 737 738 @CallSuper 739 @Override finalize()740 public void finalize() throws Throwable { 741 try { 742 IBinder operationToken = mOperationToken; 743 if (operationToken != null) { 744 mKeyStore.abort(operationToken); 745 } 746 } finally { 747 super.finalize(); 748 } 749 } 750 751 @Override getOperationHandle()752 public final long getOperationHandle() { 753 return mOperationHandle; 754 } 755 setKey(@onNull AndroidKeyStoreKey key)756 protected final void setKey(@NonNull AndroidKeyStoreKey key) { 757 mKey = key; 758 } 759 760 /** 761 * Overrides the default purpose/type of the crypto operation. 762 */ setKeymasterPurposeOverride(int keymasterPurpose)763 protected final void setKeymasterPurposeOverride(int keymasterPurpose) { 764 mKeymasterPurposeOverride = keymasterPurpose; 765 } 766 getKeymasterPurposeOverride()767 protected final int getKeymasterPurposeOverride() { 768 return mKeymasterPurposeOverride; 769 } 770 771 /** 772 * Returns {@code true} if this cipher is initialized for encryption, {@code false} if this 773 * cipher is initialized for decryption. 774 */ isEncrypting()775 protected final boolean isEncrypting() { 776 return mEncrypting; 777 } 778 779 @NonNull getKeyStore()780 protected final KeyStore getKeyStore() { 781 return mKeyStore; 782 } 783 getConsumedInputSizeBytes()784 protected final long getConsumedInputSizeBytes() { 785 if (mMainDataStreamer == null) { 786 throw new IllegalStateException("Not initialized"); 787 } 788 return mMainDataStreamer.getConsumedInputSizeBytes(); 789 } 790 getProducedOutputSizeBytes()791 protected final long getProducedOutputSizeBytes() { 792 if (mMainDataStreamer == null) { 793 throw new IllegalStateException("Not initialized"); 794 } 795 return mMainDataStreamer.getProducedOutputSizeBytes(); 796 } 797 opmodeToString(int opmode)798 static String opmodeToString(int opmode) { 799 switch (opmode) { 800 case Cipher.ENCRYPT_MODE: 801 return "ENCRYPT_MODE"; 802 case Cipher.DECRYPT_MODE: 803 return "DECRYPT_MODE"; 804 case Cipher.WRAP_MODE: 805 return "WRAP_MODE"; 806 case Cipher.UNWRAP_MODE: 807 return "UNWRAP_MODE"; 808 default: 809 return String.valueOf(opmode); 810 } 811 } 812 813 // The methods below need to be implemented by subclasses. 814 815 /** 816 * Initializes this cipher with the provided key. 817 * 818 * @throws InvalidKeyException if the {@code key} is not suitable for this cipher in the 819 * specified {@code opmode}. 820 * 821 * @see #setKey(AndroidKeyStoreKey) 822 */ initKey(int opmode, @Nullable Key key)823 protected abstract void initKey(int opmode, @Nullable Key key) throws InvalidKeyException; 824 825 /** 826 * Returns algorithm-specific parameters used by this cipher or {@code null} if no 827 * algorithm-specific parameters are used. 828 */ 829 @Nullable 830 @Override engineGetParameters()831 protected abstract AlgorithmParameters engineGetParameters(); 832 833 /** 834 * Invoked by {@code engineInit} to initialize algorithm-specific parameters when no additional 835 * initialization parameters were provided. 836 * 837 * @throws InvalidKeyException if this cipher cannot be configured based purely on the provided 838 * key and needs additional parameters to be provided to {@code Cipher.init}. 839 */ initAlgorithmSpecificParameters()840 protected abstract void initAlgorithmSpecificParameters() throws InvalidKeyException; 841 842 /** 843 * Invoked by {@code engineInit} to initialize algorithm-specific parameters when additional 844 * parameters were provided. 845 * 846 * @param params additional algorithm parameters or {@code null} if not specified. 847 * 848 * @throws InvalidAlgorithmParameterException if there is insufficient information to configure 849 * this cipher or if the provided parameters are not suitable for this cipher. 850 */ initAlgorithmSpecificParameters( @ullable AlgorithmParameterSpec params)851 protected abstract void initAlgorithmSpecificParameters( 852 @Nullable AlgorithmParameterSpec params) throws InvalidAlgorithmParameterException; 853 854 /** 855 * Invoked by {@code engineInit} to initialize algorithm-specific parameters when additional 856 * parameters were provided. 857 * 858 * @param params additional algorithm parameters or {@code null} if not specified. 859 * 860 * @throws InvalidAlgorithmParameterException if there is insufficient information to configure 861 * this cipher or if the provided parameters are not suitable for this cipher. 862 */ initAlgorithmSpecificParameters(@ullable AlgorithmParameters params)863 protected abstract void initAlgorithmSpecificParameters(@Nullable AlgorithmParameters params) 864 throws InvalidAlgorithmParameterException; 865 866 /** 867 * Returns the amount of additional entropy (in bytes) to be provided to the KeyStore's 868 * {@code begin} operation. This amount of entropy is typically what's consumed to generate 869 * random parameters, such as IV. 870 * 871 * <p>For decryption, the return value should be {@code 0} because decryption should not be 872 * consuming any entropy. For encryption, the value combined with 873 * {@link #getAdditionalEntropyAmountForFinish()} should match (or exceed) the amount of Shannon 874 * entropy of the ciphertext produced by this cipher assuming the key, the plaintext, and all 875 * explicitly provided parameters to {@code Cipher.init} are known. For example, for AES CBC 876 * encryption with an explicitly provided IV the return value should be {@code 0}, whereas for 877 * the case where IV is generated by the KeyStore's {@code begin} operation it should be 878 * {@code 16}. 879 */ getAdditionalEntropyAmountForBegin()880 protected abstract int getAdditionalEntropyAmountForBegin(); 881 882 /** 883 * Returns the amount of additional entropy (in bytes) to be provided to the KeyStore's 884 * {@code finish} operation. This amount of entropy is typically what's consumed by encryption 885 * padding scheme. 886 * 887 * <p>For decryption, the return value should be {@code 0} because decryption should not be 888 * consuming any entropy. For encryption, the value combined with 889 * {@link #getAdditionalEntropyAmountForBegin()} should match (or exceed) the amount of Shannon 890 * entropy of the ciphertext produced by this cipher assuming the key, the plaintext, and all 891 * explicitly provided parameters to {@code Cipher.init} are known. For example, for RSA with 892 * OAEP the return value should be the size of the OAEP hash output. For RSA with PKCS#1 padding 893 * the return value should be the size of the padding string or could be raised (for simplicity) 894 * to the size of the modulus. 895 */ getAdditionalEntropyAmountForFinish()896 protected abstract int getAdditionalEntropyAmountForFinish(); 897 898 /** 899 * Invoked to add algorithm-specific parameters for the KeyStore's {@code begin} operation. 900 * 901 * @param keymasterArgs keystore/keymaster arguments to be populated with algorithm-specific 902 * parameters. 903 */ addAlgorithmSpecificParametersToBegin( @onNull KeymasterArguments keymasterArgs)904 protected abstract void addAlgorithmSpecificParametersToBegin( 905 @NonNull KeymasterArguments keymasterArgs); 906 907 /** 908 * Invoked to obtain algorithm-specific parameters from the result of the KeyStore's 909 * {@code begin} operation. 910 * 911 * <p>Some parameters, such as IV, are not required to be provided to {@code Cipher.init}. Such 912 * parameters, if not provided, must be generated by KeyStore and returned to the user of 913 * {@code Cipher} and potentially reused after {@code doFinal}. 914 * 915 * @param keymasterArgs keystore/keymaster arguments returned by KeyStore {@code begin} 916 * operation. 917 */ loadAlgorithmSpecificParametersFromBeginResult( @onNull KeymasterArguments keymasterArgs)918 protected abstract void loadAlgorithmSpecificParametersFromBeginResult( 919 @NonNull KeymasterArguments keymasterArgs); 920 } 921