|
16 | 16 |
|
17 | 17 | package android.security.keystore2;
|
18 | 18 |
|
19 |
| -import android.security.keymaster.KeymasterArguments; |
20 | 19 | import android.security.keymaster.KeymasterDefs;
|
21 |
| -import android.security.keystore.KeyProperties; |
22 | 20 |
|
23 | 21 | import java.security.AlgorithmParameters;
|
24 | 22 | import java.security.NoSuchAlgorithmException;
|
25 |
| -import java.security.ProviderException; |
26 | 23 | import java.security.spec.ECGenParameterSpec;
|
27 | 24 | import java.security.spec.ECParameterSpec;
|
28 | 25 | import java.security.spec.InvalidParameterSpecException;
|
@@ -86,47 +83,6 @@ static boolean isKeymasterPaddingSchemeIndCpaCompatibleWithAsymmetricCrypto(
|
86 | 83 | }
|
87 | 84 | }
|
88 | 85 |
|
89 |
| - /** |
90 |
| - * Adds {@code KM_TAG_MIN_MAC_LENGTH} tag, if necessary, to the keymaster arguments for |
91 |
| - * generating or importing a key. This tag may only be needed for symmetric keys (e.g., HMAC, |
92 |
| - * AES-GCM). |
93 |
| - */ |
94 |
| - public static void addMinMacLengthAuthorizationIfNecessary(KeymasterArguments args, |
95 |
| - int keymasterAlgorithm, |
96 |
| - int[] keymasterBlockModes, |
97 |
| - int[] keymasterDigests) { |
98 |
| - switch (keymasterAlgorithm) { |
99 |
| - case KeymasterDefs.KM_ALGORITHM_AES: |
100 |
| - if (com.android.internal.util.ArrayUtils.contains( |
101 |
| - keymasterBlockModes, KeymasterDefs.KM_MODE_GCM)) { |
102 |
| - // AES GCM key needs the minimum length of AEAD tag specified. |
103 |
| - args.addUnsignedInt(KeymasterDefs.KM_TAG_MIN_MAC_LENGTH, |
104 |
| - AndroidKeyStoreAuthenticatedAESCipherSpi.GCM |
105 |
| - .MIN_SUPPORTED_TAG_LENGTH_BITS); |
106 |
| - } |
107 |
| - break; |
108 |
| - case KeymasterDefs.KM_ALGORITHM_HMAC: |
109 |
| - // HMAC key needs the minimum length of MAC set to the output size of the associated |
110 |
| - // digest. This is because we do not offer a way to generate shorter MACs and |
111 |
| - // don't offer a way to verify MACs (other than by generating them). |
112 |
| - if (keymasterDigests.length != 1) { |
113 |
| - throw new ProviderException( |
114 |
| - "Unsupported number of authorized digests for HMAC key: " |
115 |
| - + keymasterDigests.length |
116 |
| - + ". Exactly one digest must be authorized"); |
117 |
| - } |
118 |
| - int keymasterDigest = keymasterDigests[0]; |
119 |
| - int digestOutputSizeBits = getDigestOutputSizeBits(keymasterDigest); |
120 |
| - if (digestOutputSizeBits == -1) { |
121 |
| - throw new ProviderException( |
122 |
| - "HMAC key authorized for unsupported digest: " |
123 |
| - + KeyProperties.Digest.fromKeymaster(keymasterDigest)); |
124 |
| - } |
125 |
| - args.addUnsignedInt(KeymasterDefs.KM_TAG_MIN_MAC_LENGTH, digestOutputSizeBits); |
126 |
| - break; |
127 |
| - } |
128 |
| - } |
129 |
| - |
130 | 86 | static String getEcCurveFromKeymaster(int ecCurve) {
|
131 | 87 | switch (ecCurve) {
|
132 | 88 | case android.hardware.security.keymint.EcCurve.P_224:
|
|
0 commit comments