All Downloads are FREE. Search and download functionalities are using the official Maven repository.

src.android.security.identity.IdentityCredential Maven / Gradle / Ivy

/*
 * Copyright 2019 The Android Open Source Project
 *
 * Licensed under the Apache License, Version 2.0 (the "License");
 * you may not use this file except in compliance with the License.
 * You may obtain a copy of the License at
 *
 *      http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS,
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 * See the License for the specific language governing permissions and
 * limitations under the License.
 */

package android.security.identity;

import android.annotation.NonNull;
import android.annotation.Nullable;

import java.security.InvalidKeyException;
import java.security.KeyPair;
import java.security.PublicKey;
import java.security.cert.X509Certificate;
import java.time.Instant;
import java.util.Collection;
import java.util.Map;

/**
 * Class used to read data from a previously provisioned credential.
 *
 * Use {@link IdentityCredentialStore#getCredentialByName(String, int)} to get a
 * {@link IdentityCredential} instance.
 */
public abstract class IdentityCredential {
    /**
     * @hide
     */
    protected IdentityCredential() {}

    /**
     * Create an ephemeral key pair to use to establish a secure channel with a reader.
     *
     * 

Applications should use this key-pair for the communications channel with the reader * using a protocol / cipher-suite appropriate for the application. One example of such a * protocol is the one used for Mobile Driving Licenses, see ISO 18013-5 section 9.2.1 "Session * encryption". * * @return ephemeral key pair to use to establish a secure channel with a reader. */ public @NonNull abstract KeyPair createEphemeralKeyPair(); /** * Set the ephemeral public key provided by the reader. If called, this must be called before * {@link #getEntries(byte[], Map, byte[], byte[])} is called. * * @param readerEphemeralPublicKey The ephemeral public key provided by the reader to * establish a secure session. * @throws InvalidKeyException if the given key is invalid. */ public abstract void setReaderEphemeralPublicKey(@NonNull PublicKey readerEphemeralPublicKey) throws InvalidKeyException; /** * Encrypt a message for transmission to the reader. * *

Do not use. In this version of the API, this method produces an incorrect * result. Instead, applications should implement message encryption/decryption themselves as * detailed in the {@link #createEphemeralKeyPair()} method. In a future API-level, this * method will be deprecated. * * @param messagePlaintext unencrypted message to encrypt. * @return encrypted message. */ public @NonNull abstract byte[] encryptMessageToReader(@NonNull byte[] messagePlaintext); /** * Decrypt a message received from the reader. * *

Do not use. In this version of the API, this method produces an incorrect * result. Instead, applications should implement message encryption/decryption themselves as * detailed in the {@link #createEphemeralKeyPair()} method. In a future API-level, this * method will be deprecated. * * @param messageCiphertext encrypted message to decrypt. * @return decrypted message. * @throws MessageDecryptionException if the ciphertext couldn't be decrypted. */ public @NonNull abstract byte[] decryptMessageFromReader(@NonNull byte[] messageCiphertext) throws MessageDecryptionException; /** * Gets the X.509 certificate chain for the CredentialKey which identifies this * credential to the issuing authority. This is the same certificate chain that * was returned by {@link WritableIdentityCredential#getCredentialKeyCertificateChain(byte[])} * when the credential was first created and its Android Keystore extension will * contain the challenge data set at that time. See the documentation * for that method for important information about this certificate chain. * * @return the certificate chain for this credential's CredentialKey. */ public @NonNull abstract Collection getCredentialKeyCertificateChain(); /** * Sets whether to allow using an authentication key which use count has been exceeded if no * other key is available. This must be called prior to calling * {@link #getEntries(byte[], Map, byte[], byte[])}. * * By default this is set to true. * * @param allowUsingExhaustedKeys whether to allow using an authentication key which use count * has been exceeded if no other key is available. */ public abstract void setAllowUsingExhaustedKeys(boolean allowUsingExhaustedKeys); /** * Sets whether to allow using an authentication key which has been expired if no * other key is available. This must be called prior to calling * {@link #getEntries(byte[], Map, byte[], byte[])}. * *

By default this is set to false. * *

This is only implemented in feature version 202101 or later. If not implemented, the call * fails with {@link UnsupportedOperationException}. See * {@link android.content.pm.PackageManager#FEATURE_IDENTITY_CREDENTIAL_HARDWARE} for known * feature versions. * * @param allowUsingExpiredKeys whether to allow using an authentication key which use count * has been exceeded if no other key is available. */ public void setAllowUsingExpiredKeys(boolean allowUsingExpiredKeys) { throw new UnsupportedOperationException(); } /** * Called by android.hardware.biometrics.CryptoObject#getOpId() to get an * operation handle. * * @hide */ public abstract long getCredstoreOperationHandle(); /** * Retrieve data entries and associated data from this {@code IdentityCredential}. * *

If an access control check fails for one of the requested entries or if the entry * doesn't exist, the entry is simply not returned. The application can detect this * by using the {@link ResultData#getStatus(String, String)} method on each of the requested * entries. * *

It is the responsibility of the calling application to know if authentication is needed * and use e.g. {@link android.hardware.biometrics.BiometricPrompt} to make the user * authenticate using a {@link android.hardware.biometrics.BiometricPrompt.CryptoObject} which * references this object. If needed, this must be done before calling * {@link #getEntries(byte[], Map, byte[], byte[])}. * *

It is permissible to call this method multiple times using the same instance but if this * is done, the {@code sessionTranscript} parameter must be identical for each call. If this is * not the case, the {@link SessionTranscriptMismatchException} exception is thrown. * *

If not {@code null} the {@code requestMessage} parameter must contain data for the request * from the verifier. The content can be defined in the way appropriate for the credential, byt * there are three requirements that must be met to work with this API: *

    *
  • The content must be a CBOR-encoded structure.
  • *
  • The CBOR structure must be a map.
  • *
  • The map must contain a tstr key "nameSpaces" whose value contains a map, as described in * the example below.
  • *
* *

If these requirements are not met the {@link InvalidRequestMessageException} exception * is thrown. * *

Here's an example of CBOR which conforms to this requirement: *

     *   ItemsRequest = {
     *     ? "docType" : DocType,
     *     "nameSpaces" : NameSpaces,
     *     ? "RequestInfo" : {* tstr => any} ; Additional info the reader wants to provide
     *   }
     *
     *   DocType = tstr
     *
     *   NameSpaces = {
     *     + NameSpace => DataElements    ; Requested data elements for each NameSpace
     *   }
     *
     *   NameSpace = tstr
     *
     *   DataElements = {
     *     + DataElement => IntentToRetain
     *   }
     *
     *   DataElement = tstr
     *   IntentToRetain = bool
     * 
* *

If the {@code sessionTranscript} parameter is not {@code null}, the X and Y coordinates * of the public part of the key-pair previously generated by {@link #createEphemeralKeyPair()} * must appear somewhere in the bytes of the CBOR. Each of these coordinates must appear * encoded with the most significant bits first and use the exact amount of bits indicated by * the key size of the ephemeral keys. For example, if the ephemeral key is using the P-256 * curve then the 32 bytes for the X coordinate encoded with the most significant bits first * must appear somewhere in {@code sessionTranscript} and ditto for the 32 bytes for the Y * coordinate. * *

If {@code readerAuth} is not {@code null} it must be the bytes of a {@code COSE_Sign1} * structure as defined in RFC 8152. For the payload nil shall be used and the * detached payload is the ReaderAuthenticationBytes CBOR described below. *

     *     ReaderAuthentication = [
     *       "ReaderAuthentication",
     *       SessionTranscript,
     *       ItemsRequestBytes
     *     ]
     *
     *     ItemsRequestBytes = #6.24(bstr .cbor ItemsRequest)
     *
     *     ReaderAuthenticationBytes = #6.24(bstr .cbor ReaderAuthentication)
     * 
* *

where {@code ItemsRequestBytes} are the bytes in the {@code requestMessage} parameter. * *

The public key corresponding to the key used to make the signature, can be found in the * {@code x5chain} unprotected header element of the {@code COSE_Sign1} structure (as as * described in * draft-ietf-cose-x509-04). * There will be at least one certificate in said element and there may be more (and if so, * each certificate must be signed by its successor). * *

Data elements protected by reader authentication are returned if, and only if, they are * mentioned in {@code requestMessage}, {@code requestMessage} is signed by the top-most * certificate in the reader's certificate chain, and the data element is configured * with an {@link AccessControlProfile} configured with an X.509 certificate which appears * in the certificate chain. * *

Note that only items referenced in {@code entriesToRequest} are returned - the * {@code requestMessage} parameter is used only for enforcing reader authentication. * *

The reason for having {@code requestMessage} and {@code entriesToRequest} as separate * parameters is that the former represents a request from the remote verifier device * (optionally signed) and this allows the application to filter the request to not include * data elements which the user has not consented to sharing. * * @param requestMessage If not {@code null}, must contain CBOR data conforming to * the schema mentioned above. * @param entriesToRequest The entries to request, organized as a map of namespace * names with each value being a collection of data elements * in the given namespace. * @param readerSignature A {@code COSE_Sign1} structure as described above or * {@code null} if reader authentication is not being used. * @return A {@link ResultData} object containing entry data organized by namespace and a * cryptographically authenticated representation of the same data. * @throws SessionTranscriptMismatchException Thrown when trying use multiple different * session transcripts. * @throws NoAuthenticationKeyAvailableException if authentication keys were never * provisioned, the method * {@link #setAvailableAuthenticationKeys(int, int)} * was called with {@code keyCount} set to 0, * the method * {@link #setAllowUsingExhaustedKeys(boolean)} * was called with {@code false} and all * available authentication keys have been * exhausted. * @throws InvalidReaderSignatureException if the reader signature is invalid, or it * doesn't contain a certificate chain, or if * the signature failed to validate. * @throws InvalidRequestMessageException if the requestMessage is malformed. * @throws EphemeralPublicKeyNotFoundException if the ephemeral public key was not found in * the session transcript. */ public abstract @NonNull ResultData getEntries( @Nullable byte[] requestMessage, @NonNull Map> entriesToRequest, @Nullable byte[] sessionTranscript, @Nullable byte[] readerSignature) throws SessionTranscriptMismatchException, NoAuthenticationKeyAvailableException, InvalidReaderSignatureException, EphemeralPublicKeyNotFoundException, InvalidRequestMessageException; /** * Sets the number of dynamic authentication keys the {@code IdentityCredential} will maintain, * and the number of times each should be used. * *

The Identity Credential system will select the least-used dynamic authentication key each * time {@link #getEntries(byte[], Map, byte[], byte[])} is called. Identity Credentials * for which this method has not been called behave as though it had been called wit * {@code keyCount} 0 and {@code maxUsesPerKey} 1. * * @param keyCount The number of active, certified dynamic authentication keys the * {@code IdentityCredential} will try to keep available. This value * must be non-negative. * @param maxUsesPerKey The maximum number of times each of the keys will be used before it's * eligible for replacement. This value must be greater than zero. */ public abstract void setAvailableAuthenticationKeys(int keyCount, int maxUsesPerKey); /** * Gets a collection of dynamic authentication keys that need certification. * *

When there aren't enough certified dynamic authentication keys, either because the key * count has been increased or because one or more keys have reached their usage count, this * method will generate replacement keys and certificates and return them for issuer * certification. The issuer certificates and associated static authentication data must then * be provided back to the Identity Credential using * {@link #storeStaticAuthenticationData(X509Certificate, byte[])}. The private part of * each authentication key never leaves secure hardware. * *

Each X.509 certificate is signed by CredentialKey. The certificate chain for CredentialKey * can be obtained using the {@link #getCredentialKeyCertificateChain()} method. *

If the implementation is feature version 202101 or later, * each X.509 certificate contains an X.509 extension at OID 1.3.6.1.4.1.11129.2.1.26 which * contains a DER encoded OCTET STRING with the bytes of the CBOR with the following CDDL: *

     *   ProofOfBinding = [
     *     "ProofOfBinding",
     *     bstr,              // Contains SHA-256(ProofOfProvisioning)
     *   ]
     * 
*

This CBOR enables an issuer to determine the exact state of the credential it * returns issuer-signed data for. * *

See {@link android.content.pm.PackageManager#FEATURE_IDENTITY_CREDENTIAL_HARDWARE} for * known feature versions. * * @return A collection of X.509 certificates for dynamic authentication keys that need issuer * certification. */ public @NonNull abstract Collection getAuthKeysNeedingCertification(); /** * Store authentication data associated with a dynamic authentication key. * * This should only be called for an authenticated key returned by * {@link #getAuthKeysNeedingCertification()}. * * @param authenticationKey The dynamic authentication key for which certification and * associated static * authentication data is being provided. * @param staticAuthData Static authentication data provided by the issuer that validates * the authenticity * and integrity of the credential data fields. * @throws UnknownAuthenticationKeyException If the given authentication key is not recognized. * @deprecated Use {@link #storeStaticAuthenticationData(X509Certificate, Instant, byte[])} * instead. */ @Deprecated public abstract void storeStaticAuthenticationData( @NonNull X509Certificate authenticationKey, @NonNull byte[] staticAuthData) throws UnknownAuthenticationKeyException; /** * Store authentication data associated with a dynamic authentication key. * * This should only be called for an authenticated key returned by * {@link #getAuthKeysNeedingCertification()}. * *

This is only implemented in feature version 202101 or later. If not implemented, the call * fails with {@link UnsupportedOperationException}. See * {@link android.content.pm.PackageManager#FEATURE_IDENTITY_CREDENTIAL_HARDWARE} for known * feature versions. * * @param authenticationKey The dynamic authentication key for which certification and * associated static * authentication data is being provided. * @param expirationDate The expiration date of the static authentication data. * @param staticAuthData Static authentication data provided by the issuer that validates * the authenticity * and integrity of the credential data fields. * @throws UnknownAuthenticationKeyException If the given authentication key is not recognized. */ public void storeStaticAuthenticationData( @NonNull X509Certificate authenticationKey, @NonNull Instant expirationDate, @NonNull byte[] staticAuthData) throws UnknownAuthenticationKeyException { throw new UnsupportedOperationException(); } /** * Get the number of times the dynamic authentication keys have been used. * * @return int array of dynamic authentication key usage counts. */ public @NonNull abstract int[] getAuthenticationDataUsageCount(); /** * Proves ownership of a credential. * *

This method returns a COSE_Sign1 data structure signed by the CredentialKey * with payload set to {@code ProofOfDeletion} as defined below.

* *

The returned CBOR is the following:

*
     *     ProofOfOwnership = [
     *          "ProofOfOwnership",           ; tstr
     *          tstr,                         ; DocType
     *          bstr,                         ; Challenge
     *          bool                          ; true if this is a test credential, should
     *                                        ; always be false.
     *      ]
     * 
* *

This is only implemented in feature version 202101 or later. If not implemented, the call * fails with {@link UnsupportedOperationException}. See * {@link android.content.pm.PackageManager#FEATURE_IDENTITY_CREDENTIAL_HARDWARE} for known * feature versions. * * @param challenge is a non-empty byte array whose contents should be unique, fresh and * provided by the issuing authority. The value provided is embedded in the * generated CBOR and enables the issuing authority to verify that the * returned proof is fresh. * @return the COSE_Sign1 data structure above */ public @NonNull byte[] proveOwnership(@NonNull byte[] challenge) { throw new UnsupportedOperationException(); } /** * Deletes a credential. * *

This method returns a COSE_Sign1 data structure signed by the CredentialKey * with payload set to {@code ProofOfDeletion} as defined below.

* *
     *     ProofOfDeletion = [
     *          "ProofOfDeletion",            ; tstr
     *          tstr,                         ; DocType
     *          bstr,                         ; Challenge
     *          bool                          ; true if this is a test credential, should
     *                                        ; always be false.
     *      ]
     * 
* *

This is only implemented in feature version 202101 or later. If not implemented, the call * fails with {@link UnsupportedOperationException}. See * {@link android.content.pm.PackageManager#FEATURE_IDENTITY_CREDENTIAL_HARDWARE} for known * feature versions. * * @param challenge is a non-empty byte array whose contents should be unique, fresh and * provided by the issuing authority. The value provided is embedded in the * generated CBOR and enables the issuing authority to verify that the * returned proof is fresh. * @return the COSE_Sign1 data structure above */ public @NonNull byte[] delete(@NonNull byte[] challenge) { throw new UnsupportedOperationException(); } /** * Updates the credential with new access control profiles and data items. * *

This method is similar to * {@link WritableIdentityCredential#personalize(PersonalizationData)} except that it operates * on an existing credential, see the documentation for that method for the format of the * returned data. * *

If this call succeeds an side-effect is that all dynamic authentication keys for the * credential are deleted. The application will need to use * {@link #getAuthKeysNeedingCertification()} to generate replacement keys and return * them for issuer certification. * *

This is only implemented in feature version 202101 or later. If not implemented, the call * fails with {@link UnsupportedOperationException}. See * {@link android.content.pm.PackageManager#FEATURE_IDENTITY_CREDENTIAL_HARDWARE} for known * feature versions. * * @param personalizationData The data to update, including access control profiles * and data elements and their values, grouped into namespaces. * @return A COSE_Sign1 data structure, see above. */ public @NonNull byte[] update(@NonNull PersonalizationData personalizationData) { throw new UnsupportedOperationException(); } }





© 2015 - 2025 Weber Informatics LLC | Privacy Policy