/* * Copyright 2020, The Android Open Source Project * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ #define LOG_TAG "android.hardware.security.sharedsecret-impl" #include #include "AndroidSharedSecret.h" #include "KeyMintUtils.h" #include #include namespace aidl::android::hardware::security::sharedsecret { using keymaster::ComputeSharedHmacRequest; using keymint::km_utils::kmBlob2vector; using keymint::km_utils::kmError2ScopedAStatus; AndroidSharedSecret::AndroidSharedSecret( const std::shared_ptr& keymint) : impl_(keymint->getKeymasterImpl()) {} AndroidSharedSecret::~AndroidSharedSecret() {} ScopedAStatus AndroidSharedSecret::getSharedSecretParameters(SharedSecretParameters* params) { auto response = impl_->GetHmacSharingParameters(); params->seed = kmBlob2vector(response.params.seed); params->nonce = {std::begin(response.params.nonce), std::end(response.params.nonce)}; return kmError2ScopedAStatus(response.error); } ScopedAStatus AndroidSharedSecret::computeSharedSecret(const vector& params, vector* sharingCheck) { ComputeSharedHmacRequest request(impl_->message_version()); request.params_array.params_array = new (std::nothrow) keymaster::HmacSharingParameters[params.size()]; if (request.params_array.params_array == nullptr) { return kmError2ScopedAStatus(KM_ERROR_MEMORY_ALLOCATION_FAILED); } request.params_array.num_params = params.size(); for (size_t i = 0; i < params.size(); ++i) { request.params_array.params_array[i].seed = {params[i].seed.data(), params[i].seed.size()}; if (sizeof(request.params_array.params_array[i].nonce) != params[i].nonce.size()) { return kmError2ScopedAStatus(KM_ERROR_INVALID_ARGUMENT); } memcpy(request.params_array.params_array[i].nonce, params[i].nonce.data(), params[i].nonce.size()); } auto response = impl_->ComputeSharedHmac(request); if (response.error == KM_ERROR_OK) *sharingCheck = kmBlob2vector(response.sharing_check); return kmError2ScopedAStatus(response.error); } } // namespace aidl::android::hardware::security::sharedsecret