1 /*
2  * Copyright 2014 The Android Open Source Project
3  *
4  * Licensed under the Apache License, Version 2.0 (the "License");
5  * you may not use this file except in compliance with the License.
6  * You may obtain a copy of the License at
7  *
8  *      http://www.apache.org/licenses/LICENSE-2.0
9  *
10  * Unless required by applicable law or agreed to in writing, software
11  * distributed under the License is distributed on an "AS IS" BASIS,
12  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13  * See the License for the specific language governing permissions and
14  * limitations under the License.
15  */
16 
17 #include "rsa_key.h"
18 
19 #include <keymaster/keymaster_context.h>
20 
21 #include "openssl_err.h"
22 #include "openssl_utils.h"
23 #include "rsa_operation.h"
24 
25 namespace keymaster {
26 
EvpToInternal(const EVP_PKEY * pkey)27 bool RsaKey::EvpToInternal(const EVP_PKEY* pkey) {
28     rsa_key_.reset(EVP_PKEY_get1_RSA(const_cast<EVP_PKEY*>(pkey)));
29     return rsa_key_.get() != NULL;
30 }
31 
InternalToEvp(EVP_PKEY * pkey) const32 bool RsaKey::InternalToEvp(EVP_PKEY* pkey) const {
33     return EVP_PKEY_set1_RSA(pkey, rsa_key_.get()) == 1;
34 }
35 
SupportedMode(keymaster_purpose_t purpose,keymaster_padding_t padding)36 bool RsaKey::SupportedMode(keymaster_purpose_t purpose, keymaster_padding_t padding) {
37     switch (purpose) {
38     case KM_PURPOSE_SIGN:
39     case KM_PURPOSE_VERIFY:
40         return padding == KM_PAD_NONE || padding == KM_PAD_RSA_PSS ||
41                padding == KM_PAD_RSA_PKCS1_1_5_SIGN;
42         break;
43     case KM_PURPOSE_ENCRYPT:
44     case KM_PURPOSE_DECRYPT:
45         return padding == KM_PAD_RSA_OAEP || padding == KM_PAD_RSA_PKCS1_1_5_ENCRYPT;
46         break;
47     };
48     return false;
49 }
50 
SupportedMode(keymaster_purpose_t purpose,keymaster_digest_t digest)51 bool RsaKey::SupportedMode(keymaster_purpose_t purpose, keymaster_digest_t digest) {
52     switch (purpose) {
53     case KM_PURPOSE_SIGN:
54     case KM_PURPOSE_VERIFY:
55         return digest == KM_DIGEST_NONE || digest == KM_DIGEST_SHA_2_256;
56         break;
57     case KM_PURPOSE_ENCRYPT:
58     case KM_PURPOSE_DECRYPT:
59         /* Don't care */
60         break;
61     };
62     return true;
63 }
64 
65 }  // namespace keymaster
66