summaryrefslogtreecommitdiff
path: root/identity/aidl/default/libeic/EicSession.c
blob: d0c7a0d77eb50fe0ab6d3fc37cecc7883e69770d (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
/*
 * Copyright 2020, The Android Open Source Project
 *
 * Licensed under the Apache License, Version 2.0 (the "License");
 * you may not use this file except in compliance with the License.
 * You may obtain a copy of the License at
 *
 *     http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS,
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 * See the License for the specific language governing permissions and
 * limitations under the License.
 */

#include <inttypes.h>

#include "EicCommon.h"
#include "EicSession.h"

// Global used for assigning ids for session objects.
//
static uint32_t gSessionLastIdAssigned = 0;

// The current session object or NULL if never initialized or if it has been shut down.
//
static EicSession* gSessionCurrent = NULL;

EicSession* eicSessionGetForId(uint32_t sessionId) {
    if (gSessionCurrent != NULL && gSessionCurrent->id == sessionId) {
        return gSessionCurrent;
    }
    return NULL;
}

bool eicSessionInit(EicSession* ctx) {
    eicMemSet(ctx, '\0', sizeof(EicSession));

    if (!eicNextId(&gSessionLastIdAssigned)) {
        eicDebug("Error getting id for object");
        return false;
    }
    ctx->id = gSessionLastIdAssigned;

    do {
        if (!eicOpsRandom((uint8_t*)&(ctx->authChallenge), sizeof(ctx->authChallenge))) {
            eicDebug("Failed generating random challenge");
            return false;
        }
    } while (ctx->authChallenge == EIC_KM_AUTH_CHALLENGE_UNSET);

    if (!eicOpsCreateEcKey(ctx->ephemeralPrivateKey, ctx->ephemeralPublicKey)) {
        eicDebug("Error creating ephemeral key-pair");
        return false;
    }

    gSessionCurrent = ctx;
    eicDebug("Initialized session with id %" PRIu32, ctx->id);
    return true;
}

bool eicSessionShutdown(EicSession* ctx) {
    if (ctx->id == 0) {
        eicDebug("Trying to shut down session with id 0");
        return false;
    }
    eicDebug("Shut down session with id %" PRIu32, ctx->id);
    eicMemSet(ctx, '\0', sizeof(EicSession));
    gSessionCurrent = NULL;
    return true;
}

bool eicSessionGetId(EicSession* ctx, uint32_t* outId) {
    *outId = ctx->id;
    return true;
}

bool eicSessionGetAuthChallenge(EicSession* ctx, uint64_t* outAuthChallenge) {
    *outAuthChallenge = ctx->authChallenge;
    return true;
}

bool eicSessionGetEphemeralKeyPair(EicSession* ctx,
                                   uint8_t ephemeralPrivateKey[EIC_P256_PRIV_KEY_SIZE]) {
    eicMemCpy(ephemeralPrivateKey, ctx->ephemeralPrivateKey, EIC_P256_PRIV_KEY_SIZE);
    return true;
}

bool eicSessionSetReaderEphemeralPublicKey(
        EicSession* ctx, const uint8_t readerEphemeralPublicKey[EIC_P256_PUB_KEY_SIZE]) {
    eicMemCpy(ctx->readerEphemeralPublicKey, readerEphemeralPublicKey, EIC_P256_PUB_KEY_SIZE);
    return true;
}

bool eicSessionSetSessionTranscript(EicSession* ctx, const uint8_t* sessionTranscript,
                                    size_t sessionTranscriptSize) {
    // Only accept the SessionTranscript if X and Y from the ephemeral key
    // we created is somewhere in SessionTranscript...
    //
    if (eicMemMem(sessionTranscript, sessionTranscriptSize, ctx->ephemeralPublicKey,
                  EIC_P256_PUB_KEY_SIZE / 2) == NULL) {
        eicDebug("Error finding X from ephemeralPublicKey in sessionTranscript");
        return false;
    }
    if (eicMemMem(sessionTranscript, sessionTranscriptSize,
                  ctx->ephemeralPublicKey + EIC_P256_PUB_KEY_SIZE / 2,
                  EIC_P256_PUB_KEY_SIZE / 2) == NULL) {
        eicDebug("Error finding Y from ephemeralPublicKey in sessionTranscript");
        return false;
    }

    // To save space we only store the SHA-256 of SessionTranscript
    //
    EicSha256Ctx shaCtx;
    eicOpsSha256Init(&shaCtx);
    eicOpsSha256Update(&shaCtx, sessionTranscript, sessionTranscriptSize);
    eicOpsSha256Final(&shaCtx, ctx->sessionTranscriptSha256);
    return true;
}