178 lines
8.8 KiB
Java
178 lines
8.8 KiB
Java
![]() |
/*
|
||
|
* Copyright 2021 The Android Open Source Project
|
||
|
*
|
||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||
|
* you may not use this file except in compliance with the License.
|
||
|
* You may obtain a copy of the License at
|
||
|
*
|
||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||
|
*
|
||
|
* Unless required by applicable law or agreed to in writing, software
|
||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||
|
* See the License for the specific language governing permissions and
|
||
|
* limitations under the License.
|
||
|
*/
|
||
|
|
||
|
package android.security.identity;
|
||
|
|
||
|
import android.annotation.NonNull;
|
||
|
import android.annotation.Nullable;
|
||
|
|
||
|
import java.security.InvalidKeyException;
|
||
|
import java.security.KeyPair;
|
||
|
import java.security.PublicKey;
|
||
|
|
||
|
/**
|
||
|
* Class for presenting multiple documents to a remote verifier.
|
||
|
*
|
||
|
* <p>This should be used for all interactions with a remote verifier instead of the now deprecated
|
||
|
* {@link IdentityCredential#getEntries(byte[], Map, byte[], byte[])} method.
|
||
|
*
|
||
|
* Use {@link IdentityCredentialStore#createPresentationSession(int)} to create a {@link
|
||
|
* PresentationSession} instance.
|
||
|
*/
|
||
|
public abstract class PresentationSession {
|
||
|
/**
|
||
|
* @hide
|
||
|
*/
|
||
|
protected PresentationSession() {}
|
||
|
|
||
|
/**
|
||
|
* Gets the ephemeral key pair to use to establish a secure channel with the verifier.
|
||
|
*
|
||
|
* <p>Applications should use this key-pair for the communications channel with the verifier
|
||
|
* using a protocol / cipher-suite appropriate for the application. One example of such a
|
||
|
* protocol is the one used for Mobile Driving Licenses, see ISO 18013-5.
|
||
|
*
|
||
|
* <p>The ephemeral key pair is tied to the {@link PresentationSession} instance so subsequent
|
||
|
* calls to this method will return the same key-pair.
|
||
|
*
|
||
|
* @return ephemeral key pair to use to establish a secure channel with a reader.
|
||
|
*/
|
||
|
public @NonNull abstract KeyPair getEphemeralKeyPair();
|
||
|
|
||
|
/**
|
||
|
* Set the ephemeral public key provided by the verifier.
|
||
|
*
|
||
|
* <p>If called, this must be called before any calls to
|
||
|
* {@link #getCredentialData(String, CredentialDataRequest)}.
|
||
|
*
|
||
|
* <p>This method can only be called once per {@link PresentationSession} instance.
|
||
|
*
|
||
|
* @param readerEphemeralPublicKey The ephemeral public key provided by the reader to
|
||
|
* establish a secure session.
|
||
|
* @throws InvalidKeyException if the given key is invalid.
|
||
|
*/
|
||
|
public abstract void setReaderEphemeralPublicKey(@NonNull PublicKey readerEphemeralPublicKey)
|
||
|
throws InvalidKeyException;
|
||
|
|
||
|
/**
|
||
|
* Set the session transcript.
|
||
|
*
|
||
|
* <p>If called, this must be called before any calls to
|
||
|
* {@link #getCredentialData(String, CredentialDataRequest)}.
|
||
|
*
|
||
|
* <p>If mdoc session encryption is used (e.g. if {@link #getEphemeralKeyPair()} has been
|
||
|
* called) then the X and Y coordinates of the public part of the key-pair returned by {@link
|
||
|
* #getEphemeralKeyPair()} must appear somewhere in the bytes of the passed in CBOR. Each of
|
||
|
* these coordinates must appear encoded with the most significant bits first and use the exact
|
||
|
* amount of bits indicated by the key size of the ephemeral keys. For example, if the
|
||
|
* ephemeral key is using the P-256 curve then the 32 bytes for the X coordinate encoded with
|
||
|
* the most significant bits first must appear somewhere and ditto for the 32 bytes for the Y
|
||
|
* coordinate.
|
||
|
*
|
||
|
* <p>This method can only be called once per {@link PresentationSession} instance.
|
||
|
*
|
||
|
* @param sessionTranscript the session transcript.
|
||
|
*/
|
||
|
public abstract void setSessionTranscript(@NonNull byte[] sessionTranscript);
|
||
|
|
||
|
/**
|
||
|
* Retrieves data from a named credential in the current presentation session.
|
||
|
*
|
||
|
* <p>If an access control check fails for one of the requested entries or if the entry
|
||
|
* doesn't exist, the entry is simply not returned. The application can detect this
|
||
|
* by using the {@link CredentialDataResult.Entries#getStatus(String, String)} method on
|
||
|
* each of the requested entries.
|
||
|
*
|
||
|
* <p>The application should not make any assumptions on whether user authentication is needed.
|
||
|
* Instead, the application should request the data elements values first and then examine
|
||
|
* the returned {@link CredentialDataResult.Entries}. If
|
||
|
* {@link CredentialDataResult.Entries#STATUS_USER_AUTHENTICATION_FAILED} is returned the
|
||
|
* application should get a
|
||
|
* {@link android.hardware.biometrics.BiometricPrompt.CryptoObject} which references this
|
||
|
* object and use it with a {@link android.hardware.biometrics.BiometricPrompt}. Upon successful
|
||
|
* authentication the application may call
|
||
|
* {@link #getCredentialData(String, CredentialDataRequest)} again.
|
||
|
*
|
||
|
* <p>It is permissible to call this method multiple times using the same credential name.
|
||
|
* If this is done the same auth-key will be used.
|
||
|
*
|
||
|
* <p>If the reader signature is set in the request parameter (via the
|
||
|
* {@link CredentialDataRequest.Builder#setReaderSignature(byte[])} method) it must contain
|
||
|
* the bytes of a {@code COSE_Sign1} structure as defined in RFC 8152. For the payload
|
||
|
* {@code nil} shall be used and the detached payload is the {@code ReaderAuthenticationBytes}
|
||
|
* CBOR described below.
|
||
|
* <pre>
|
||
|
* ReaderAuthentication = [
|
||
|
* "ReaderAuthentication",
|
||
|
* SessionTranscript,
|
||
|
* ItemsRequestBytes
|
||
|
* ]
|
||
|
*
|
||
|
* ItemsRequestBytes = #6.24(bstr .cbor ItemsRequest)
|
||
|
*
|
||
|
* ReaderAuthenticationBytes = #6.24(bstr .cbor ReaderAuthentication)
|
||
|
* </pre>
|
||
|
*
|
||
|
* <p>where {@code ItemsRequestBytes} are the bytes of the request message set in
|
||
|
* the request parameter (via the
|
||
|
* {@link CredentialDataRequest.Builder#setRequestMessage(byte[])} method).
|
||
|
*
|
||
|
* <p>The public key corresponding to the key used to make the signature, can be found in the
|
||
|
* {@code x5chain} unprotected header element of the {@code COSE_Sign1} structure (as as
|
||
|
* described in
|
||
|
* <a href="https://tools.ietf.org/html/draft-ietf-cose-x509-08">draft-ietf-cose-x509-08</a>).
|
||
|
* There will be at least one certificate in said element and there may be more (and if so,
|
||
|
* each certificate must be signed by its successor).
|
||
|
*
|
||
|
* <p>Data elements protected by reader authentication are returned if, and only if,
|
||
|
* {@code requestMessage} is signed by the top-most certificate in the reader's certificate
|
||
|
* chain, and the data element is configured with an {@link AccessControlProfile} configured
|
||
|
* with an X.509 certificate for a key which appear in the certificate chain.
|
||
|
*
|
||
|
* <p>Note that the request message CBOR is used only for enforcing reader authentication, it's
|
||
|
* not used for determining which entries this API will return. The application is expected to
|
||
|
* have parsed the request message and filtered it according to user preference and/or consent.
|
||
|
*
|
||
|
* @param credentialName the name of the credential to retrieve.
|
||
|
* @param request the data to retrieve from the credential
|
||
|
* @return If the credential wasn't found, returns null. Otherwise a
|
||
|
* {@link CredentialDataResult} object containing entry data organized by namespace and
|
||
|
* a cryptographically authenticated representation of the same data, bound to the
|
||
|
* current session.
|
||
|
* @throws NoAuthenticationKeyAvailableException if authentication keys were never
|
||
|
* provisioned for the credential or if they
|
||
|
* are expired or exhausted their use-count.
|
||
|
* @throws InvalidRequestMessageException if the requestMessage is malformed.
|
||
|
* @throws InvalidReaderSignatureException if the reader signature is invalid, or it
|
||
|
* doesn't contain a certificate chain, or if
|
||
|
* the signature failed to validate.
|
||
|
* @throws EphemeralPublicKeyNotFoundException if the ephemeral public key was not found in
|
||
|
* the session transcript.
|
||
|
*/
|
||
|
public abstract @Nullable CredentialDataResult getCredentialData(
|
||
|
@NonNull String credentialName, @NonNull CredentialDataRequest request)
|
||
|
throws NoAuthenticationKeyAvailableException, InvalidReaderSignatureException,
|
||
|
InvalidRequestMessageException, EphemeralPublicKeyNotFoundException;
|
||
|
|
||
|
/**
|
||
|
* Called by android.hardware.biometrics.CryptoObject#getOpId() to get an
|
||
|
* operation handle.
|
||
|
*
|
||
|
* @hide
|
||
|
*/
|
||
|
public abstract long getCredstoreOperationHandle();
|
||
|
}
|