123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735 |
- /*
- * Copyright 2014 The Android Open Source Project
- *
- * Licensed under the Apache License, Version 2.0 (the "License");
- * you may not use this file except in compliance with the License.
- * You may obtain a copy of the License at
- *
- * http://www.apache.org/licenses/LICENSE-2.0
- *
- * Unless required by applicable law or agreed to in writing, software
- * distributed under the License is distributed on an "AS IS" BASIS,
- * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- * See the License for the specific language governing permissions and
- * limitations under the License.
- */
- #include <keymaster/android_keymaster_messages.h>
- #include <keymaster/android_keymaster_utils.h>
- namespace keymaster {
- /*
- * Helper functions for working with key blobs.
- */
- static void set_key_blob(keymaster_key_blob_t* key_blob, const void* key_material, size_t length) {
- delete[] key_blob->key_material;
- key_blob->key_material = dup_buffer(key_material, length);
- key_blob->key_material_size = length;
- }
- static size_t key_blob_size(const keymaster_key_blob_t& key_blob) {
- return sizeof(uint32_t) /* key size */ + key_blob.key_material_size;
- }
- static uint8_t* serialize_key_blob(const keymaster_key_blob_t& key_blob, uint8_t* buf,
- const uint8_t* end) {
- return append_size_and_data_to_buf(buf, end, key_blob.key_material, key_blob.key_material_size);
- }
- static bool deserialize_key_blob(keymaster_key_blob_t* key_blob, const uint8_t** buf_ptr,
- const uint8_t* end) {
- delete[] key_blob->key_material;
- key_blob->key_material = nullptr;
- UniquePtr<uint8_t[]> deserialized_key_material;
- if (!copy_size_and_data_from_buf(buf_ptr, end, &key_blob->key_material_size,
- &deserialized_key_material))
- return false;
- key_blob->key_material = deserialized_key_material.release();
- return true;
- }
- static size_t blob_size(const keymaster_blob_t& blob) {
- return sizeof(uint32_t) /* data size */ + blob.data_length;
- }
- static uint8_t* serialize_blob(const keymaster_blob_t& blob, uint8_t* buf, const uint8_t* end) {
- return append_size_and_data_to_buf(buf, end, blob.data, blob.data_length);
- }
- static bool deserialize_blob(keymaster_blob_t* blob, const uint8_t** buf_ptr, const uint8_t* end) {
- delete[] blob->data;
- *blob = {};
- UniquePtr<uint8_t[]> deserialized_blob;
- if (!copy_size_and_data_from_buf(buf_ptr, end, &blob->data_length, &deserialized_blob))
- return false;
- blob->data = deserialized_blob.release();
- return true;
- }
- size_t KeymasterResponse::SerializedSize() const {
- if (error != KM_ERROR_OK)
- return sizeof(int32_t);
- else
- return sizeof(int32_t) + NonErrorSerializedSize();
- }
- uint8_t* KeymasterResponse::Serialize(uint8_t* buf, const uint8_t* end) const {
- buf = append_uint32_to_buf(buf, end, static_cast<uint32_t>(error));
- if (error == KM_ERROR_OK)
- buf = NonErrorSerialize(buf, end);
- return buf;
- }
- bool KeymasterResponse::Deserialize(const uint8_t** buf_ptr, const uint8_t* end) {
- if (!copy_uint32_from_buf(buf_ptr, end, &error))
- return false;
- if (error != KM_ERROR_OK)
- return true;
- return NonErrorDeserialize(buf_ptr, end);
- }
- GenerateKeyResponse::~GenerateKeyResponse() {
- delete[] key_blob.key_material;
- }
- size_t GenerateKeyResponse::NonErrorSerializedSize() const {
- return key_blob_size(key_blob) + enforced.SerializedSize() + unenforced.SerializedSize();
- }
- uint8_t* GenerateKeyResponse::NonErrorSerialize(uint8_t* buf, const uint8_t* end) const {
- buf = serialize_key_blob(key_blob, buf, end);
- buf = enforced.Serialize(buf, end);
- return unenforced.Serialize(buf, end);
- }
- bool GenerateKeyResponse::NonErrorDeserialize(const uint8_t** buf_ptr, const uint8_t* end) {
- return deserialize_key_blob(&key_blob, buf_ptr, end) && enforced.Deserialize(buf_ptr, end) &&
- unenforced.Deserialize(buf_ptr, end);
- }
- GetKeyCharacteristicsRequest::~GetKeyCharacteristicsRequest() {
- delete[] key_blob.key_material;
- }
- void GetKeyCharacteristicsRequest::SetKeyMaterial(const void* key_material, size_t length) {
- set_key_blob(&key_blob, key_material, length);
- }
- size_t GetKeyCharacteristicsRequest::SerializedSize() const {
- return key_blob_size(key_blob) + additional_params.SerializedSize();
- }
- uint8_t* GetKeyCharacteristicsRequest::Serialize(uint8_t* buf, const uint8_t* end) const {
- buf = serialize_key_blob(key_blob, buf, end);
- return additional_params.Serialize(buf, end);
- }
- bool GetKeyCharacteristicsRequest::Deserialize(const uint8_t** buf_ptr, const uint8_t* end) {
- return deserialize_key_blob(&key_blob, buf_ptr, end) &&
- additional_params.Deserialize(buf_ptr, end);
- }
- size_t GetKeyCharacteristicsResponse::NonErrorSerializedSize() const {
- return enforced.SerializedSize() + unenforced.SerializedSize();
- }
- uint8_t* GetKeyCharacteristicsResponse::NonErrorSerialize(uint8_t* buf, const uint8_t* end) const {
- buf = enforced.Serialize(buf, end);
- return unenforced.Serialize(buf, end);
- }
- bool GetKeyCharacteristicsResponse::NonErrorDeserialize(const uint8_t** buf_ptr,
- const uint8_t* end) {
- return enforced.Deserialize(buf_ptr, end) && unenforced.Deserialize(buf_ptr, end);
- }
- void BeginOperationRequest::SetKeyMaterial(const void* key_material, size_t length) {
- set_key_blob(&key_blob, key_material, length);
- }
- size_t BeginOperationRequest::SerializedSize() const {
- return sizeof(uint32_t) /* purpose */ + key_blob_size(key_blob) +
- additional_params.SerializedSize();
- }
- uint8_t* BeginOperationRequest::Serialize(uint8_t* buf, const uint8_t* end) const {
- buf = append_uint32_to_buf(buf, end, purpose);
- buf = serialize_key_blob(key_blob, buf, end);
- return additional_params.Serialize(buf, end);
- }
- bool BeginOperationRequest::Deserialize(const uint8_t** buf_ptr, const uint8_t* end) {
- return copy_uint32_from_buf(buf_ptr, end, &purpose) &&
- deserialize_key_blob(&key_blob, buf_ptr, end) &&
- additional_params.Deserialize(buf_ptr, end);
- }
- size_t BeginOperationResponse::NonErrorSerializedSize() const {
- if (message_version == 0)
- return sizeof(op_handle);
- else
- return sizeof(op_handle) + output_params.SerializedSize();
- }
- uint8_t* BeginOperationResponse::NonErrorSerialize(uint8_t* buf, const uint8_t* end) const {
- buf = append_uint64_to_buf(buf, end, op_handle);
- if (message_version > 0)
- buf = output_params.Serialize(buf, end);
- return buf;
- }
- bool BeginOperationResponse::NonErrorDeserialize(const uint8_t** buf_ptr, const uint8_t* end) {
- bool retval = copy_uint64_from_buf(buf_ptr, end, &op_handle);
- if (retval && message_version > 0)
- retval = output_params.Deserialize(buf_ptr, end);
- return retval;
- }
- size_t UpdateOperationRequest::SerializedSize() const {
- if (message_version == 0)
- return sizeof(op_handle) + input.SerializedSize();
- else
- return sizeof(op_handle) + input.SerializedSize() + additional_params.SerializedSize();
- }
- uint8_t* UpdateOperationRequest::Serialize(uint8_t* buf, const uint8_t* end) const {
- buf = append_uint64_to_buf(buf, end, op_handle);
- buf = input.Serialize(buf, end);
- if (message_version > 0)
- buf = additional_params.Serialize(buf, end);
- return buf;
- }
- bool UpdateOperationRequest::Deserialize(const uint8_t** buf_ptr, const uint8_t* end) {
- bool retval = copy_uint64_from_buf(buf_ptr, end, &op_handle) && input.Deserialize(buf_ptr, end);
- if (retval && message_version > 0)
- retval = additional_params.Deserialize(buf_ptr, end);
- return retval;
- }
- size_t UpdateOperationResponse::NonErrorSerializedSize() const {
- size_t size = 0;
- switch (message_version) {
- case 3:
- case 2:
- size += output_params.SerializedSize();
- FALLTHROUGH;
- case 1:
- size += sizeof(uint32_t);
- FALLTHROUGH;
- case 0:
- size += output.SerializedSize();
- break;
- default:
- assert(false);
- }
- return size;
- }
- uint8_t* UpdateOperationResponse::NonErrorSerialize(uint8_t* buf, const uint8_t* end) const {
- buf = output.Serialize(buf, end);
- if (message_version > 0)
- buf = append_uint32_to_buf(buf, end, input_consumed);
- if (message_version > 1)
- buf = output_params.Serialize(buf, end);
- return buf;
- }
- bool UpdateOperationResponse::NonErrorDeserialize(const uint8_t** buf_ptr, const uint8_t* end) {
- bool retval = output.Deserialize(buf_ptr, end);
- if (retval && message_version > 0)
- retval = copy_uint32_from_buf(buf_ptr, end, &input_consumed);
- if (retval && message_version > 1)
- retval = output_params.Deserialize(buf_ptr, end);
- return retval;
- }
- size_t FinishOperationRequest::SerializedSize() const {
- size_t size = 0;
- switch (message_version) {
- case 3:
- size += input.SerializedSize();
- FALLTHROUGH;
- case 2:
- case 1:
- size += additional_params.SerializedSize();
- FALLTHROUGH;
- case 0:
- size += sizeof(op_handle) + signature.SerializedSize();
- break;
- default:
- assert(false); // Should never get here.
- }
- return size;
- }
- uint8_t* FinishOperationRequest::Serialize(uint8_t* buf, const uint8_t* end) const {
- buf = append_uint64_to_buf(buf, end, op_handle);
- buf = signature.Serialize(buf, end);
- if (message_version > 0)
- buf = additional_params.Serialize(buf, end);
- if (message_version > 2)
- buf = input.Serialize(buf, end);
- return buf;
- }
- bool FinishOperationRequest::Deserialize(const uint8_t** buf_ptr, const uint8_t* end) {
- bool retval =
- copy_uint64_from_buf(buf_ptr, end, &op_handle) && signature.Deserialize(buf_ptr, end);
- if (retval && message_version > 0)
- retval = additional_params.Deserialize(buf_ptr, end);
- if (retval && message_version > 2)
- retval = input.Deserialize(buf_ptr, end);
- return retval;
- }
- size_t FinishOperationResponse::NonErrorSerializedSize() const {
- if (message_version < 2)
- return output.SerializedSize();
- else
- return output.SerializedSize() + output_params.SerializedSize();
- }
- uint8_t* FinishOperationResponse::NonErrorSerialize(uint8_t* buf, const uint8_t* end) const {
- buf = output.Serialize(buf, end);
- if (message_version > 1)
- buf = output_params.Serialize(buf, end);
- return buf;
- }
- bool FinishOperationResponse::NonErrorDeserialize(const uint8_t** buf_ptr, const uint8_t* end) {
- bool retval = output.Deserialize(buf_ptr, end);
- if (retval && message_version > 1)
- retval = output_params.Deserialize(buf_ptr, end);
- return retval;
- }
- size_t AddEntropyRequest::SerializedSize() const {
- return random_data.SerializedSize();
- }
- uint8_t* AddEntropyRequest::Serialize(uint8_t* buf, const uint8_t* end) const {
- return random_data.Serialize(buf, end);
- }
- bool AddEntropyRequest::Deserialize(const uint8_t** buf_ptr, const uint8_t* end) {
- return random_data.Deserialize(buf_ptr, end);
- }
- void ImportKeyRequest::SetKeyMaterial(const void* key_material, size_t length) {
- delete[] key_data;
- key_data = dup_buffer(key_material, length);
- key_data_length = length;
- }
- size_t ImportKeyRequest::SerializedSize() const {
- return key_description.SerializedSize() + sizeof(uint32_t) /* key_format */ +
- sizeof(uint32_t) /* key_data_length */ + key_data_length;
- }
- uint8_t* ImportKeyRequest::Serialize(uint8_t* buf, const uint8_t* end) const {
- buf = key_description.Serialize(buf, end);
- buf = append_uint32_to_buf(buf, end, key_format);
- return append_size_and_data_to_buf(buf, end, key_data, key_data_length);
- }
- bool ImportKeyRequest::Deserialize(const uint8_t** buf_ptr, const uint8_t* end) {
- delete[] key_data;
- key_data = nullptr;
- UniquePtr<uint8_t[]> deserialized_key_material;
- if (!key_description.Deserialize(buf_ptr, end) ||
- !copy_uint32_from_buf(buf_ptr, end, &key_format) ||
- !copy_size_and_data_from_buf(buf_ptr, end, &key_data_length, &deserialized_key_material))
- return false;
- key_data = deserialized_key_material.release();
- return true;
- }
- void ImportKeyResponse::SetKeyMaterial(const void* key_material, size_t length) {
- set_key_blob(&key_blob, key_material, length);
- }
- size_t ImportKeyResponse::NonErrorSerializedSize() const {
- return key_blob_size(key_blob) + enforced.SerializedSize() + unenforced.SerializedSize();
- }
- uint8_t* ImportKeyResponse::NonErrorSerialize(uint8_t* buf, const uint8_t* end) const {
- buf = serialize_key_blob(key_blob, buf, end);
- buf = enforced.Serialize(buf, end);
- return unenforced.Serialize(buf, end);
- }
- bool ImportKeyResponse::NonErrorDeserialize(const uint8_t** buf_ptr, const uint8_t* end) {
- return deserialize_key_blob(&key_blob, buf_ptr, end) && enforced.Deserialize(buf_ptr, end) &&
- unenforced.Deserialize(buf_ptr, end);
- }
- void ExportKeyRequest::SetKeyMaterial(const void* key_material, size_t length) {
- set_key_blob(&key_blob, key_material, length);
- }
- size_t ExportKeyRequest::SerializedSize() const {
- return additional_params.SerializedSize() + sizeof(uint32_t) /* key_format */ +
- key_blob_size(key_blob);
- }
- uint8_t* ExportKeyRequest::Serialize(uint8_t* buf, const uint8_t* end) const {
- buf = additional_params.Serialize(buf, end);
- buf = append_uint32_to_buf(buf, end, key_format);
- return serialize_key_blob(key_blob, buf, end);
- }
- bool ExportKeyRequest::Deserialize(const uint8_t** buf_ptr, const uint8_t* end) {
- return additional_params.Deserialize(buf_ptr, end) &&
- copy_uint32_from_buf(buf_ptr, end, &key_format) &&
- deserialize_key_blob(&key_blob, buf_ptr, end);
- }
- void ExportKeyResponse::SetKeyMaterial(const void* key_material, size_t length) {
- delete[] key_data;
- key_data = dup_buffer(key_material, length);
- key_data_length = length;
- }
- size_t ExportKeyResponse::NonErrorSerializedSize() const {
- return sizeof(uint32_t) /* key_data_length */ + key_data_length;
- }
- uint8_t* ExportKeyResponse::NonErrorSerialize(uint8_t* buf, const uint8_t* end) const {
- return append_size_and_data_to_buf(buf, end, key_data, key_data_length);
- }
- bool ExportKeyResponse::NonErrorDeserialize(const uint8_t** buf_ptr, const uint8_t* end) {
- delete[] key_data;
- key_data = nullptr;
- UniquePtr<uint8_t[]> deserialized_key_material;
- if (!copy_size_and_data_from_buf(buf_ptr, end, &key_data_length, &deserialized_key_material))
- return false;
- key_data = deserialized_key_material.release();
- return true;
- }
- void DeleteKeyRequest::SetKeyMaterial(const void* key_material, size_t length) {
- set_key_blob(&key_blob, key_material, length);
- }
- size_t DeleteKeyRequest::SerializedSize() const {
- return key_blob_size(key_blob);
- }
- uint8_t* DeleteKeyRequest::Serialize(uint8_t* buf, const uint8_t* end) const {
- return serialize_key_blob(key_blob, buf, end);
- }
- bool DeleteKeyRequest::Deserialize(const uint8_t** buf_ptr, const uint8_t* end) {
- return deserialize_key_blob(&key_blob, buf_ptr, end);
- }
- size_t GetVersionResponse::NonErrorSerializedSize() const {
- return sizeof(major_ver) + sizeof(minor_ver) + sizeof(subminor_ver);
- }
- uint8_t* GetVersionResponse::NonErrorSerialize(uint8_t* buf, const uint8_t* end) const {
- if (buf + NonErrorSerializedSize() <= end) {
- *buf++ = major_ver;
- *buf++ = minor_ver;
- *buf++ = subminor_ver;
- } else {
- buf += NonErrorSerializedSize();
- }
- return buf;
- }
- bool GetVersionResponse::NonErrorDeserialize(const uint8_t** buf_ptr, const uint8_t* end) {
- if (*buf_ptr + NonErrorSerializedSize() > end)
- return false;
- const uint8_t* tmp = *buf_ptr;
- major_ver = *tmp++;
- minor_ver = *tmp++;
- subminor_ver = *tmp++;
- *buf_ptr = tmp;
- return true;
- }
- AttestKeyRequest::~AttestKeyRequest() {
- delete[] key_blob.key_material;
- }
- void AttestKeyRequest::SetKeyMaterial(const void* key_material, size_t length) {
- set_key_blob(&key_blob, key_material, length);
- }
- size_t AttestKeyRequest::SerializedSize() const {
- return key_blob_size(key_blob) + attest_params.SerializedSize();
- }
- uint8_t* AttestKeyRequest::Serialize(uint8_t* buf, const uint8_t* end) const {
- buf = serialize_key_blob(key_blob, buf, end);
- return attest_params.Serialize(buf, end);
- }
- bool AttestKeyRequest::Deserialize(const uint8_t** buf_ptr, const uint8_t* end) {
- return deserialize_key_blob(&key_blob, buf_ptr, end) && attest_params.Deserialize(buf_ptr, end);
- }
- AttestKeyResponse::~AttestKeyResponse() {
- for (size_t i = 0; i < certificate_chain.entry_count; ++i)
- delete[] certificate_chain.entries[i].data;
- delete[] certificate_chain.entries;
- }
- const size_t kMaxChainEntryCount = 10;
- bool AttestKeyResponse::AllocateChain(size_t entry_count) {
- if (entry_count > kMaxChainEntryCount)
- return false;
- if (certificate_chain.entries) {
- for (size_t i = 0; i < certificate_chain.entry_count; ++i)
- delete[] certificate_chain.entries[i].data;
- delete[] certificate_chain.entries;
- }
- certificate_chain.entry_count = entry_count;
- certificate_chain.entries = new (std::nothrow) keymaster_blob_t[entry_count];
- if (!certificate_chain.entries) {
- certificate_chain.entry_count = 0;
- return false;
- }
- memset(certificate_chain.entries, 0, sizeof(certificate_chain.entries[0]) * entry_count);
- return true;
- }
- size_t AttestKeyResponse::NonErrorSerializedSize() const {
- size_t result = sizeof(uint32_t); /* certificate_chain.entry_count */
- for (size_t i = 0; i < certificate_chain.entry_count; ++i) {
- result += sizeof(uint32_t); /* certificate_chain.entries[i].data_length */
- result += certificate_chain.entries[i].data_length;
- }
- return result;
- }
- uint8_t* AttestKeyResponse::NonErrorSerialize(uint8_t* buf, const uint8_t* end) const {
- buf = append_uint32_to_buf(buf, end, certificate_chain.entry_count);
- for (size_t i = 0; i < certificate_chain.entry_count; ++i) {
- buf = append_size_and_data_to_buf(buf, end, certificate_chain.entries[i].data,
- certificate_chain.entries[i].data_length);
- }
- return buf;
- }
- bool AttestKeyResponse::NonErrorDeserialize(const uint8_t** buf_ptr, const uint8_t* end) {
- size_t entry_count;
- if (!copy_uint32_from_buf(buf_ptr, end, &entry_count) || !AllocateChain(entry_count))
- return false;
- for (size_t i = 0; i < certificate_chain.entry_count; ++i) {
- UniquePtr<uint8_t[]> data;
- size_t data_length;
- if (!copy_size_and_data_from_buf(buf_ptr, end, &data_length, &data))
- return false;
- certificate_chain.entries[i].data = data.release();
- certificate_chain.entries[i].data_length = data_length;
- }
- return true;
- }
- UpgradeKeyRequest::~UpgradeKeyRequest() {
- delete[] key_blob.key_material;
- }
- void UpgradeKeyRequest::SetKeyMaterial(const void* key_material, size_t length) {
- set_key_blob(&key_blob, key_material, length);
- }
- size_t UpgradeKeyRequest::SerializedSize() const {
- return key_blob_size(key_blob) + upgrade_params.SerializedSize();
- }
- uint8_t* UpgradeKeyRequest::Serialize(uint8_t* buf, const uint8_t* end) const {
- buf = serialize_key_blob(key_blob, buf, end);
- return upgrade_params.Serialize(buf, end);
- }
- bool UpgradeKeyRequest::Deserialize(const uint8_t** buf_ptr, const uint8_t* end) {
- return deserialize_key_blob(&key_blob, buf_ptr, end) &&
- upgrade_params.Deserialize(buf_ptr, end);
- }
- UpgradeKeyResponse::~UpgradeKeyResponse() {
- delete[] upgraded_key.key_material;
- }
- size_t UpgradeKeyResponse::NonErrorSerializedSize() const {
- return key_blob_size(upgraded_key);
- }
- uint8_t* UpgradeKeyResponse::NonErrorSerialize(uint8_t* buf, const uint8_t* end) const {
- return serialize_key_blob(upgraded_key, buf, end);
- }
- bool UpgradeKeyResponse::NonErrorDeserialize(const uint8_t** buf_ptr, const uint8_t* end) {
- return deserialize_key_blob(&upgraded_key, buf_ptr, end);
- }
- size_t HmacSharingParameters::SerializedSize() const {
- return blob_size(seed) + sizeof(nonce);
- }
- uint8_t* HmacSharingParameters::Serialize(uint8_t* buf, const uint8_t* end) const {
- buf = serialize_blob(seed, buf, end);
- return append_to_buf(buf, end, nonce, sizeof(nonce));
- }
- bool HmacSharingParameters::Deserialize(const uint8_t** buf_ptr, const uint8_t* end) {
- return deserialize_blob(&seed, buf_ptr, end) &&
- copy_from_buf(buf_ptr, end, nonce, sizeof(nonce));
- }
- size_t HmacSharingParametersArray::SerializedSize() const {
- size_t size = sizeof(uint32_t); // num_params size
- for (size_t i = 0; i < num_params; ++i) {
- size += params_array[i].SerializedSize();
- }
- return size;
- }
- uint8_t* HmacSharingParametersArray::Serialize(uint8_t* buf, const uint8_t* end) const {
- buf = append_uint32_to_buf(buf, end, num_params);
- for (size_t i = 0; i < num_params; ++i) {
- buf = params_array[i].Serialize(buf, end);
- }
- return buf;
- }
- bool HmacSharingParametersArray::Deserialize(const uint8_t** buf_ptr, const uint8_t* end) {
- if (!copy_uint32_from_buf(buf_ptr, end, &num_params)) return false;
- params_array = new (std::nothrow) HmacSharingParameters[num_params];
- if (!params_array) return false;
- for (size_t i = 0; i < num_params; ++i) {
- if (!params_array[i].Deserialize(buf_ptr, end)) return false;
- }
- return true;
- }
- size_t ComputeSharedHmacResponse::NonErrorSerializedSize() const {
- return blob_size(sharing_check);
- }
- uint8_t* ComputeSharedHmacResponse::NonErrorSerialize(uint8_t* buf, const uint8_t* end) const {
- return serialize_blob(sharing_check, buf, end);
- }
- bool ComputeSharedHmacResponse::NonErrorDeserialize(const uint8_t** buf_ptr, const uint8_t* end) {
- return deserialize_blob(&sharing_check, buf_ptr, end);
- }
- size_t ImportWrappedKeyRequest::SerializedSize() const {
- return sizeof(uint32_t) /* wrapped_key_data_length */ + wrapped_key.key_material_size +
- sizeof(uint32_t) /* wrapping_key_data_length */ + wrapping_key.key_material_size +
- sizeof(uint32_t) /* masking_key_data_length */ + masking_key.key_material_size +
- additional_params.SerializedSize() + sizeof(uint64_t) /* password_sid */ +
- sizeof(uint64_t) /* biometric_sid */;
- }
- uint8_t* ImportWrappedKeyRequest::Serialize(uint8_t* buf, const uint8_t* end) const {
- buf = serialize_key_blob(wrapped_key, buf, end);
- buf = serialize_key_blob(wrapping_key, buf, end);
- buf = serialize_key_blob(masking_key, buf, end);
- buf = additional_params.Serialize(buf, end);
- buf = append_uint64_to_buf(buf, end, password_sid);
- return append_uint64_to_buf(buf, end, biometric_sid);
- }
- bool ImportWrappedKeyRequest::Deserialize(const uint8_t** buf_ptr, const uint8_t* end) {
- return deserialize_key_blob(&wrapped_key, buf_ptr, end) &&
- deserialize_key_blob(&wrapping_key, buf_ptr, end) &&
- deserialize_key_blob(&masking_key, buf_ptr, end) &&
- additional_params.Deserialize(buf_ptr, end) &&
- copy_uint64_from_buf(buf_ptr, end, &password_sid) &&
- copy_uint64_from_buf(buf_ptr, end, &biometric_sid);
- }
- void ImportWrappedKeyRequest::SetWrappedMaterial(const void* key_material, size_t length) {
- set_key_blob(&wrapped_key, key_material, length);
- }
- void ImportWrappedKeyRequest::SetWrappingMaterial(const void* key_material, size_t length) {
- set_key_blob(&wrapping_key, key_material, length);
- }
- void ImportWrappedKeyRequest::SetMaskingKeyMaterial(const void* key_material, size_t length) {
- set_key_blob(&masking_key, key_material, length);
- }
- void ImportWrappedKeyResponse::SetKeyMaterial(const void* key_material, size_t length) {
- set_key_blob(&key_blob, key_material, length);
- }
- size_t ImportWrappedKeyResponse::NonErrorSerializedSize() const {
- return key_blob_size(key_blob) + enforced.SerializedSize() + unenforced.SerializedSize();
- }
- uint8_t* ImportWrappedKeyResponse::NonErrorSerialize(uint8_t* buf, const uint8_t* end) const {
- buf = serialize_key_blob(key_blob, buf, end);
- buf = enforced.Serialize(buf, end);
- return unenforced.Serialize(buf, end);
- }
- bool ImportWrappedKeyResponse::NonErrorDeserialize(const uint8_t** buf_ptr, const uint8_t* end) {
- return deserialize_key_blob(&key_blob, buf_ptr, end) && enforced.Deserialize(buf_ptr, end) &&
- unenforced.Deserialize(buf_ptr, end);
- }
- size_t HardwareAuthToken::SerializedSize() const {
- return sizeof(challenge) + sizeof(user_id) + sizeof(authenticator_id) +
- sizeof(authenticator_type) + sizeof(timestamp) + blob_size(mac);
- }
- uint8_t* HardwareAuthToken::Serialize(uint8_t* buf, const uint8_t* end) const {
- buf = append_uint64_to_buf(buf, end, challenge);
- buf = append_uint64_to_buf(buf, end, user_id);
- buf = append_uint64_to_buf(buf, end, authenticator_id);
- buf = append_uint32_to_buf(buf, end, authenticator_type);
- buf = append_uint64_to_buf(buf, end, timestamp);
- return serialize_blob(mac, buf, end);
- }
- bool HardwareAuthToken::Deserialize(const uint8_t** buf_ptr, const uint8_t* end) {
- return copy_uint64_from_buf(buf_ptr, end, &challenge) &&
- copy_uint64_from_buf(buf_ptr, end, &user_id) &&
- copy_uint64_from_buf(buf_ptr, end, &authenticator_id) &&
- copy_uint32_from_buf(buf_ptr, end, &authenticator_type) &&
- copy_uint64_from_buf(buf_ptr, end, ×tamp) && //
- deserialize_blob(&mac, buf_ptr, end);
- }
- size_t VerificationToken::SerializedSize() const {
- return sizeof(challenge) + sizeof(timestamp) + parameters_verified.SerializedSize() +
- sizeof(security_level) + blob_size(mac);
- }
- uint8_t* VerificationToken::Serialize(uint8_t* buf, const uint8_t* end) const {
- buf = append_uint64_to_buf(buf, end, challenge);
- buf = append_uint64_to_buf(buf, end, timestamp);
- buf = parameters_verified.Serialize(buf, end);
- buf = append_uint32_to_buf(buf, end, security_level);
- return serialize_blob(mac, buf, end);
- }
- bool VerificationToken::Deserialize(const uint8_t** buf_ptr, const uint8_t* end) {
- return copy_uint64_from_buf(buf_ptr, end, &challenge) &&
- copy_uint64_from_buf(buf_ptr, end, ×tamp) &&
- parameters_verified.Deserialize(buf_ptr, end) &&
- copy_uint32_from_buf(buf_ptr, end, &security_level) &&
- deserialize_blob(&mac, buf_ptr, end);
- }
- } // namespace keymaster
|