Chirag Pathak | 7a07994 | 2021-01-25 20:16:30 +0000 | [diff] [blame] | 1 | /* |
| 2 | * Copyright 2020, The Android Open Source Project |
| 3 | * |
| 4 | * Licensed under the Apache License, Version 2.0 (the "License"); |
| 5 | * you may not use this file except in compliance with the License. |
| 6 | * You may obtain a copy of the License at |
| 7 | * |
| 8 | * http://www.apache.org/licenses/LICENSE-2.0 |
| 9 | * |
| 10 | * Unless required by applicable law or agreed to in writing, software |
| 11 | * distributed under the License is distributed on an "AS IS" BASIS, |
| 12 | * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 13 | * See the License for the specific language governing permissions and |
| 14 | * limitations under the License. |
| 15 | */ |
| 16 | |
| 17 | #define LOG_TAG "android.hardware.security.sharedsecret-impl" |
| 18 | #include <log/log.h> |
| 19 | |
| 20 | #include "AndroidSharedSecret.h" |
| 21 | #include "KeyMintUtils.h" |
| 22 | #include <aidl/android/hardware/security/keymint/ErrorCode.h> |
| 23 | #include <keymaster/android_keymaster.h> |
| 24 | |
| 25 | namespace aidl::android::hardware::security::sharedsecret { |
| 26 | |
Shawn Willden | 9a3792e | 2021-04-08 09:38:14 -0600 | [diff] [blame] | 27 | using keymaster::ComputeSharedHmacRequest; |
| 28 | using keymint::km_utils::kmBlob2vector; |
| 29 | using keymint::km_utils::kmError2ScopedAStatus; |
Chirag Pathak | 7a07994 | 2021-01-25 20:16:30 +0000 | [diff] [blame] | 30 | |
Shawn Willden | 9a3792e | 2021-04-08 09:38:14 -0600 | [diff] [blame] | 31 | AndroidSharedSecret::AndroidSharedSecret( |
| 32 | const std::shared_ptr<keymint::AndroidKeyMintDevice>& keymint) |
Chirag Pathak | 7a07994 | 2021-01-25 20:16:30 +0000 | [diff] [blame] | 33 | : impl_(keymint->getKeymasterImpl()) {} |
| 34 | |
| 35 | AndroidSharedSecret::~AndroidSharedSecret() {} |
| 36 | |
| 37 | ScopedAStatus AndroidSharedSecret::getSharedSecretParameters(SharedSecretParameters* params) { |
| 38 | auto response = impl_->GetHmacSharingParameters(); |
| 39 | params->seed = kmBlob2vector(response.params.seed); |
| 40 | params->nonce = {std::begin(response.params.nonce), std::end(response.params.nonce)}; |
| 41 | return kmError2ScopedAStatus(response.error); |
| 42 | } |
| 43 | |
| 44 | ScopedAStatus AndroidSharedSecret::computeSharedSecret(const vector<SharedSecretParameters>& params, |
| 45 | vector<uint8_t>* sharingCheck) { |
| 46 | ComputeSharedHmacRequest request(impl_->message_version()); |
David Drysdale | b80ef35 | 2022-01-24 08:07:34 +0000 | [diff] [blame] | 47 | request.params_array.params_array = |
| 48 | new (std::nothrow) keymaster::HmacSharingParameters[params.size()]; |
David Drysdale | 01d2e13 | 2022-01-25 09:46:45 +0000 | [diff] [blame] | 49 | if (request.params_array.params_array == nullptr) { |
| 50 | return kmError2ScopedAStatus(KM_ERROR_MEMORY_ALLOCATION_FAILED); |
| 51 | } |
Chirag Pathak | 7a07994 | 2021-01-25 20:16:30 +0000 | [diff] [blame] | 52 | request.params_array.num_params = params.size(); |
| 53 | for (size_t i = 0; i < params.size(); ++i) { |
| 54 | request.params_array.params_array[i].seed = {params[i].seed.data(), params[i].seed.size()}; |
| 55 | if (sizeof(request.params_array.params_array[i].nonce) != params[i].nonce.size()) { |
| 56 | return kmError2ScopedAStatus(KM_ERROR_INVALID_ARGUMENT); |
| 57 | } |
| 58 | memcpy(request.params_array.params_array[i].nonce, params[i].nonce.data(), |
| 59 | params[i].nonce.size()); |
| 60 | } |
| 61 | auto response = impl_->ComputeSharedHmac(request); |
| 62 | if (response.error == KM_ERROR_OK) *sharingCheck = kmBlob2vector(response.sharing_check); |
| 63 | return kmError2ScopedAStatus(response.error); |
| 64 | } |
| 65 | |
| 66 | } // namespace aidl::android::hardware::security::sharedsecret |