blob: f392e121becab93518ff1f600c5720317c2fa979 [file] [log] [blame]
/*
* Copyright 2021 The Android Open Source Project
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package android.security.identity;
import android.annotation.NonNull;
import android.annotation.Nullable;
import java.security.InvalidKeyException;
import java.security.KeyPair;
import java.security.PublicKey;
/**
* Class for presenting multiple documents to a remote verifier.
*
* <p>This should be used for all interactions with a remote verifier instead of the now deprecated
* {@link IdentityCredential#getEntries(byte[], Map, byte[], byte[])} method.
*
* Use {@link IdentityCredentialStore#createPresentationSession(int)} to create a {@link
* PresentationSession} instance.
*/
public abstract class PresentationSession {
/**
* @hide
*/
protected PresentationSession() {}
/**
* Gets the ephemeral key pair to use to establish a secure channel with the verifier.
*
* <p>Applications should use this key-pair for the communications channel with the verifier
* using a protocol / cipher-suite appropriate for the application. One example of such a
* protocol is the one used for Mobile Driving Licenses, see ISO 18013-5.
*
* <p>The ephemeral key pair is tied to the {@link PresentationSession} instance so subsequent
* calls to this method will return the same key-pair.
*
* @return ephemeral key pair to use to establish a secure channel with a reader.
*/
public @NonNull abstract KeyPair getEphemeralKeyPair();
/**
* Set the ephemeral public key provided by the verifier.
*
* <p>If called, this must be called before any calls to
* {@link #getCredentialData(String, CredentialDataRequest)}.
*
* <p>This method can only be called once per {@link PresentationSession} instance.
*
* @param readerEphemeralPublicKey The ephemeral public key provided by the reader to
* establish a secure session.
* @throws InvalidKeyException if the given key is invalid.
*/
public abstract void setReaderEphemeralPublicKey(@NonNull PublicKey readerEphemeralPublicKey)
throws InvalidKeyException;
/**
* Set the session transcript.
*
* <p>If called, this must be called before any calls to
* {@link #getCredentialData(String, CredentialDataRequest)}.
*
* <p>If mdoc session encryption is used (e.g. if {@link #getEphemeralKeyPair()} has been
* called) then the X and Y coordinates of the public part of the key-pair returned by {@link
* #getEphemeralKeyPair()} must appear somewhere in the bytes of the passed in CBOR. Each of
* these coordinates must appear encoded with the most significant bits first and use the exact
* amount of bits indicated by the key size of the ephemeral keys. For example, if the
* ephemeral key is using the P-256 curve then the 32 bytes for the X coordinate encoded with
* the most significant bits first must appear somewhere and ditto for the 32 bytes for the Y
* coordinate.
*
* <p>This method can only be called once per {@link PresentationSession} instance.
*
* @param sessionTranscript the session transcript.
*/
public abstract void setSessionTranscript(@NonNull byte[] sessionTranscript);
/**
* Retrieves data from a named credential in the current presentation session.
*
* <p>If an access control check fails for one of the requested entries or if the entry
* doesn't exist, the entry is simply not returned. The application can detect this
* by using the {@link CredentialDataResult.Entries#getStatus(String, String)} method on
* each of the requested entries.
*
* <p>The application should not make any assumptions on whether user authentication is needed.
* Instead, the application should request the data elements values first and then examine
* the returned {@link CredentialDataResult.Entries}. If
* {@link CredentialDataResult.Entries#STATUS_USER_AUTHENTICATION_FAILED} is returned the
* application should get a
* {@link android.hardware.biometrics.BiometricPrompt.CryptoObject} which references this
* object and use it with a {@link android.hardware.biometrics.BiometricPrompt}. Upon successful
* authentication the application may call
* {@link #getCredentialData(String, CredentialDataRequest)} again.
*
* <p>It is permissible to call this method multiple times using the same credential name.
* If this is done the same auth-key will be used.
*
* <p>If the reader signature is set in the request parameter (via the
* {@link CredentialDataRequest.Builder#setReaderSignature(byte[])} method) it must contain
* the bytes of a {@code COSE_Sign1} structure as defined in RFC 8152. For the payload
* {@code nil} shall be used and the detached payload is the {@code ReaderAuthenticationBytes}
* CBOR described below.
* <pre>
* ReaderAuthentication = [
* "ReaderAuthentication",
* SessionTranscript,
* ItemsRequestBytes
* ]
*
* ItemsRequestBytes = #6.24(bstr .cbor ItemsRequest)
*
* ReaderAuthenticationBytes = #6.24(bstr .cbor ReaderAuthentication)
* </pre>
*
* <p>where {@code ItemsRequestBytes} are the bytes of the request message set in
* the request parameter (via the
* {@link CredentialDataRequest.Builder#setRequestMessage(byte[])} method).
*
* <p>The public key corresponding to the key used to make the signature, can be found in the
* {@code x5chain} unprotected header element of the {@code COSE_Sign1} structure (as as
* described in
* <a href="https://tools.ietf.org/html/draft-ietf-cose-x509-08">draft-ietf-cose-x509-08</a>).
* There will be at least one certificate in said element and there may be more (and if so,
* each certificate must be signed by its successor).
*
* <p>Data elements protected by reader authentication are returned if, and only if,
* {@code requestMessage} is signed by the top-most certificate in the reader's certificate
* chain, and the data element is configured with an {@link AccessControlProfile} configured
* with an X.509 certificate for a key which appear in the certificate chain.
*
* <p>Note that the request message CBOR is used only for enforcing reader authentication, it's
* not used for determining which entries this API will return. The application is expected to
* have parsed the request message and filtered it according to user preference and/or consent.
*
* @param credentialName the name of the credential to retrieve.
* @param request the data to retrieve from the credential
* @return If the credential wasn't found, returns null. Otherwise a
* {@link CredentialDataResult} object containing entry data organized by namespace and
* a cryptographically authenticated representation of the same data, bound to the
* current session.
* @throws NoAuthenticationKeyAvailableException if authentication keys were never
* provisioned for the credential or if they
* are expired or exhausted their use-count.
* @throws InvalidRequestMessageException if the requestMessage is malformed.
* @throws InvalidReaderSignatureException if the reader signature is invalid, or it
* doesn't contain a certificate chain, or if
* the signature failed to validate.
* @throws EphemeralPublicKeyNotFoundException if the ephemeral public key was not found in
* the session transcript.
*/
public abstract @Nullable CredentialDataResult getCredentialData(
@NonNull String credentialName, @NonNull CredentialDataRequest request)
throws NoAuthenticationKeyAvailableException, InvalidReaderSignatureException,
InvalidRequestMessageException, EphemeralPublicKeyNotFoundException;
/**
* Called by android.hardware.biometrics.CryptoObject#getOpId() to get an
* operation handle.
*
* @hide
*/
public abstract long getCredstoreOperationHandle();
}