Chirag Pathak | 7a07994 | 2021-01-25 20:16:30 +0000 | [diff] [blame] | 1 | /* |
| 2 | * Copyright 2020, The Android Open Source Project |
| 3 | * |
| 4 | * Licensed under the Apache License, Version 2.0 (the "License"); |
| 5 | * you may not use this file except in compliance with the License. |
| 6 | * You may obtain a copy of the License at |
| 7 | * |
| 8 | * http://www.apache.org/licenses/LICENSE-2.0 |
| 9 | * |
| 10 | * Unless required by applicable law or agreed to in writing, software |
| 11 | * distributed under the License is distributed on an "AS IS" BASIS, |
| 12 | * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 13 | * See the License for the specific language governing permissions and |
| 14 | * limitations under the License. |
| 15 | */ |
| 16 | |
| 17 | #define LOG_TAG "android.hardware.security.sharedsecret-impl" |
| 18 | #include <log/log.h> |
| 19 | |
| 20 | #include "AndroidSharedSecret.h" |
| 21 | #include "KeyMintUtils.h" |
| 22 | #include <aidl/android/hardware/security/keymint/ErrorCode.h> |
| 23 | #include <keymaster/android_keymaster.h> |
| 24 | |
| 25 | namespace aidl::android::hardware::security::sharedsecret { |
| 26 | |
| 27 | using namespace ::keymaster; |
| 28 | using namespace ::aidl::android::hardware::security::keymint::km_utils; |
| 29 | |
| 30 | AndroidSharedSecret::AndroidSharedSecret(std::shared_ptr<keymint::AndroidKeyMintDevice> keymint) |
| 31 | : impl_(keymint->getKeymasterImpl()) {} |
| 32 | |
| 33 | AndroidSharedSecret::~AndroidSharedSecret() {} |
| 34 | |
| 35 | ScopedAStatus AndroidSharedSecret::getSharedSecretParameters(SharedSecretParameters* params) { |
| 36 | auto response = impl_->GetHmacSharingParameters(); |
| 37 | params->seed = kmBlob2vector(response.params.seed); |
| 38 | params->nonce = {std::begin(response.params.nonce), std::end(response.params.nonce)}; |
| 39 | return kmError2ScopedAStatus(response.error); |
| 40 | } |
| 41 | |
| 42 | ScopedAStatus AndroidSharedSecret::computeSharedSecret(const vector<SharedSecretParameters>& params, |
| 43 | vector<uint8_t>* sharingCheck) { |
| 44 | ComputeSharedHmacRequest request(impl_->message_version()); |
| 45 | request.params_array.params_array = new keymaster::HmacSharingParameters[params.size()]; |
| 46 | request.params_array.num_params = params.size(); |
| 47 | for (size_t i = 0; i < params.size(); ++i) { |
| 48 | request.params_array.params_array[i].seed = {params[i].seed.data(), params[i].seed.size()}; |
| 49 | if (sizeof(request.params_array.params_array[i].nonce) != params[i].nonce.size()) { |
| 50 | return kmError2ScopedAStatus(KM_ERROR_INVALID_ARGUMENT); |
| 51 | } |
| 52 | memcpy(request.params_array.params_array[i].nonce, params[i].nonce.data(), |
| 53 | params[i].nonce.size()); |
| 54 | } |
| 55 | auto response = impl_->ComputeSharedHmac(request); |
| 56 | if (response.error == KM_ERROR_OK) *sharingCheck = kmBlob2vector(response.sharing_check); |
| 57 | return kmError2ScopedAStatus(response.error); |
| 58 | } |
| 59 | |
| 60 | } // namespace aidl::android::hardware::security::sharedsecret |