android_system_core/trusty/keymaster/keymint/TrustySecureClock.cpp
Shawn Willden fed81d8e41 Add TrustyKeyMintDevice
Bug: 177729159
Test: Not testable until more CLs land
Merged-In: Iea4e70bb5b4ce051492f2e42d2e0d219d088388e
Change-Id: Iea4e70bb5b4ce051492f2e42d2e0d219d088388e
2021-06-18 07:11:36 -06:00

42 lines
1.6 KiB
C++

/*
* Copyright 2021, The Android Open Source Project
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include <trusty_keymaster/TrustySecureClock.h>
#include <aidl/android/hardware/security/keymint/ErrorCode.h>
#include <KeyMintUtils.h>
namespace aidl::android::hardware::security::secureclock::trusty {
using keymint::km_utils::kmBlob2vector;
using keymint::km_utils::kmError2ScopedAStatus;
::ndk::ScopedAStatus TrustySecureClock::generateTimeStamp(int64_t challenge,
TimeStampToken* token) {
keymaster::VerifyAuthorizationRequest request(impl_->message_version());
request.challenge = challenge;
auto response = impl_->VerifyAuthorization(request);
if (response.error != KM_ERROR_OK) return kmError2ScopedAStatus(response.error);
token->challenge = response.token.challenge;
token->timestamp.milliSeconds = static_cast<int64_t>(response.token.timestamp);
token->mac = kmBlob2vector(response.token.mac);
return ::ndk::ScopedAStatus::ok();
}
} // namespace aidl::android::hardware::security::secureclock::trusty