Skip to content
Snippets Groups Projects
Commit 29fca36a authored by David Zeuthen's avatar David Zeuthen
Browse files

Identity: Update for changes to ISO 18013-5.

Key derivation for session encryption and MACing now involves mixing
in SessionTranscriptBytes. Update docs to reflect this.

Also, the standard changed such that instead of DeviceAuthentication
being MACed or signed, it's instead DeviceAuthenticationBytes which is
defined as #6.24(bstr .cbor DeviceAuthentication). The same also for
ReaderAuthentication, now ReaderAuthenticationBytes is the CBOR which
is signed by the reader.

Also make a note that the encryptMessageToReader() and
decryptMessageFromReader() should NOT be used and applications should
instead implement these themselves. This is because we don't have the
SessionTranscript available and it's way too late to start adding
public API now. For the next Android version these methods will be
deprecated. Realistically this shouldn't be a problem because
applications are expected to use the Jetpack anyway.

Bug: 159482543
Test: atest android.security.identity.cts
Merged-In: I380a973a0cc78f1206fd7a33d0bd4896a0b16c6d
Change-Id: I8b2931b4f44a398bcbeb753fafa91a509cf68780
parent f9836b01
No related branches found
No related tags found
No related merge requests found
......@@ -41,19 +41,18 @@ public abstract class IdentityCredential {
/**
* Create an ephemeral key pair to use to establish a secure channel with a reader.
*
* <p>Most applications will use only the public key, and only to send it to the reader,
* allowing the private key to be used internally for {@link #encryptMessageToReader(byte[])}
* and {@link #decryptMessageFromReader(byte[])}. The private key is also provided for
* applications that wish to use a cipher suite that is not supported by
* {@link IdentityCredentialStore}.
* <p>Applications should use this key-pair for the communications channel with the reader
* using a protocol / cipher-suite appropriate for the application. One example of such a
* protocol is the one used for Mobile Driving Licenses, see ISO 18013-5 section 9.2.1 "Session
* encryption".
*
* @return ephemeral key pair to use to establish a secure channel with a reader.
*/
public @NonNull abstract KeyPair createEphemeralKeyPair();
/**
* Set the ephemeral public key provided by the reader. This must be called before
* {@link #encryptMessageToReader} or {@link #decryptMessageFromReader} can be called.
* Set the ephemeral public key provided by the reader. If called, this must be called before
* {@link #getEntries(byte[], Map, byte[], byte[])} is called.
*
* @param readerEphemeralPublicKey The ephemeral public key provided by the reader to
* establish a secure session.
......@@ -65,6 +64,11 @@ public abstract class IdentityCredential {
/**
* Encrypt a message for transmission to the reader.
*
* <p>Do not use. In this version of the API, this method produces an incorrect
* result. Instead, applications should implement message encryption/decryption themselves as
* detailed in the {@link #createEphemeralKeyPair()} method. In a future API-level, this
* method will be deprecated.
*
* @param messagePlaintext unencrypted message to encrypt.
* @return encrypted message.
*/
......@@ -73,6 +77,11 @@ public abstract class IdentityCredential {
/**
* Decrypt a message received from the reader.
*
* <p>Do not use. In this version of the API, this method produces an incorrect
* result. Instead, applications should implement message encryption/decryption themselves as
* detailed in the {@link #createEphemeralKeyPair()} method. In a future API-level, this
* method will be deprecated.
*
* @param messageCiphertext encrypted message to decrypt.
* @return decrypted message.
* @throws MessageDecryptionException if the ciphertext couldn't be decrypted.
......@@ -178,7 +187,7 @@ public abstract class IdentityCredential {
*
* <p>If {@code readerAuth} is not {@code null} it must be the bytes of a {@code COSE_Sign1}
* structure as defined in RFC 8152. For the payload nil shall be used and the
* detached payload is the ReaderAuthentication CBOR described below.
* detached payload is the ReaderAuthenticationBytes CBOR described below.
* <pre>
* ReaderAuthentication = [
* "ReaderAuthentication",
......@@ -186,7 +195,9 @@ public abstract class IdentityCredential {
* ItemsRequestBytes
* ]
*
* ItemsRequestBytes = #6.24(bstr .cbor ItemsRequest) ; Bytes of ItemsRequest
* ItemsRequestBytes = #6.24(bstr .cbor ItemsRequest)
*
* ReaderAuthenticationBytes = #6.24(bstr .cbor ReaderAuthentication)
* </pre>
*
* <p>where {@code ItemsRequestBytes} are the bytes in the {@code requestMessage} parameter.
......
......@@ -68,8 +68,8 @@ public abstract class ResultData {
* {@link #getMessageAuthenticationCode()} can be used to get a MAC.
*
* <p>The CBOR structure which is cryptographically authenticated is the
* {@code DeviceAuthentication} structure according to the following
* <a href="https://tools.ietf.org/html/draft-ietf-cbor-cddl-06">CDDL</a> schema:
* {@code DeviceAuthenticationBytes} structure according to the following
* <a href="https://tools.ietf.org/html/rfc8610">CDDL</a> schema:
*
* <pre>
* DeviceAuthentication = [
......@@ -80,15 +80,9 @@ public abstract class ResultData {
* ]
*
* DocType = tstr
*
* SessionTranscript = [
* DeviceEngagementBytes,
* EReaderKeyBytes
* ]
*
* DeviceEngagementBytes = #6.24(bstr .cbor DeviceEngagement)
* EReaderKeyBytes = #6.24(bstr .cbor EReaderKey.Pub)
* SessionTranscript = any
* DeviceNameSpacesBytes = #6.24(bstr .cbor DeviceNameSpaces)
* DeviceAuthenticationBytes = #6.24(bstr .cbor DeviceAuthentication)
* </pre>
*
* <p>where
......@@ -115,7 +109,7 @@ public abstract class ResultData {
public abstract @NonNull byte[] getAuthenticatedData();
/**
* Returns a message authentication code over the {@code DeviceAuthentication} CBOR
* Returns a message authentication code over the {@code DeviceAuthenticationBytes} CBOR
* specified in {@link #getAuthenticatedData()}, to prove to the reader that the data
* is from a trusted credential.
*
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment