diff options
Diffstat (limited to 'trusty/keymaster/keymint/TrustySharedSecret.cpp')
-rw-r--r-- | trusty/keymaster/keymint/TrustySharedSecret.cpp | 54 |
1 files changed, 0 insertions, 54 deletions
diff --git a/trusty/keymaster/keymint/TrustySharedSecret.cpp b/trusty/keymaster/keymint/TrustySharedSecret.cpp deleted file mode 100644 index 81091688a..000000000 --- a/trusty/keymaster/keymint/TrustySharedSecret.cpp +++ /dev/null @@ -1,54 +0,0 @@ -/* - * Copyright 2020, The Android Open Source Project - * - * Licensed under the Apache License, Version 2.0 (the "License"); - * you may not use this file except in compliance with the License. - * You may obtain a copy of the License at - * - * http://www.apache.org/licenses/LICENSE-2.0 - * - * Unless required by applicable law or agreed to in writing, software - * distributed under the License is distributed on an "AS IS" BASIS, - * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. - * See the License for the specific language governing permissions and - * limitations under the License. - */ - -#include <trusty_keymaster/TrustySharedSecret.h> - -#include <aidl/android/hardware/security/keymint/ErrorCode.h> -#include <keymaster/android_keymaster.h> -#include "KeyMintUtils.h" - -namespace aidl::android::hardware::security::sharedsecret::trusty { - -using keymint::km_utils::kmBlob2vector; -using keymint::km_utils::kmError2ScopedAStatus; - -::ndk::ScopedAStatus TrustySharedSecret::getSharedSecretParameters(SharedSecretParameters* params) { - auto response = impl_->GetHmacSharingParameters(); - params->seed = kmBlob2vector(response.params.seed); - params->nonce = {std::begin(response.params.nonce), std::end(response.params.nonce)}; - return kmError2ScopedAStatus(response.error); -} - -::ndk::ScopedAStatus TrustySharedSecret::computeSharedSecret( - const std::vector<SharedSecretParameters>& params, std::vector<uint8_t>* sharingCheck) { - keymaster::ComputeSharedHmacRequest request(impl_->message_version()); - request.params_array.params_array = new keymaster::HmacSharingParameters[params.size()]; - request.params_array.num_params = params.size(); - for (size_t i = 0; i < params.size(); ++i) { - request.params_array.params_array[i].seed = {params[i].seed.data(), params[i].seed.size()}; - if (sizeof(request.params_array.params_array[i].nonce) != params[i].nonce.size()) { - return kmError2ScopedAStatus(KM_ERROR_INVALID_ARGUMENT); - } - memcpy(request.params_array.params_array[i].nonce, params[i].nonce.data(), - params[i].nonce.size()); - } - - auto response = impl_->ComputeSharedHmac(request); - if (response.error == KM_ERROR_OK) *sharingCheck = kmBlob2vector(response.sharing_check); - return kmError2ScopedAStatus(response.error); -} - -} // namespace aidl::android::hardware::security::sharedsecret::trusty |