Skip to content
Snippets Groups Projects
session.cpp 11.2 KiB
Newer Older
  • Learn to ignore specific revisions
  • Mark Haines's avatar
    Mark Haines committed
    /* Copyright 2015 OpenMarket Ltd
     *
     * Licensed under the Apache License, Version 2.0 (the "License");
     * you may not use this file except in compliance with the License.
     * You may obtain a copy of the License at
     *
     *     http://www.apache.org/licenses/LICENSE-2.0
     *
     * Unless required by applicable law or agreed to in writing, software
     * distributed under the License is distributed on an "AS IS" BASIS,
     * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
     * See the License for the specific language governing permissions and
     * limitations under the License.
     */
    
    #include "olm/session.hh"
    #include "olm/cipher.hh"
    #include "olm/crypto.hh"
    #include "olm/account.hh"
    #include "olm/memory.hh"
    #include "olm/message.hh"
    #include "olm/pickle.hh"
    
    
    #include <cstring>
    
    namespace {
    
    static const std::size_t KEY_LENGTH = 32;
    static const std::uint8_t PROTOCOL_VERSION = 0x3;
    
    
    static const std::uint8_t ROOT_KDF_INFO[] = "OLM_ROOT";
    static const std::uint8_t RATCHET_KDF_INFO[] = "OLM_RATCHET";
    static const std::uint8_t CIPHER_KDF_INFO[] = "OLM_KEYS";
    
    static const olm::CipherAesSha256 OLM_CIPHER(
    
        CIPHER_KDF_INFO, sizeof(CIPHER_KDF_INFO) -1
    );
    
    
    static const olm::KdfInfo OLM_KDF_INFO = {
    
        ROOT_KDF_INFO, sizeof(ROOT_KDF_INFO) - 1,
        RATCHET_KDF_INFO, sizeof(RATCHET_KDF_INFO) - 1
    };
    
    } // namespace
    
    
    olm::Session::Session(
    ) : ratchet(OLM_KDF_INFO, OLM_CIPHER),
        last_error(olm::ErrorCode::SUCCESS),
    
        received_message(false),
        bob_one_time_key_id(0) {
    
    }
    
    
    
    std::size_t olm::Session::new_outbound_session_random_length() {
    
        return KEY_LENGTH * 2;
    
    std::size_t olm::Session::new_outbound_session(
        olm::Account const & local_account,
        olm::Curve25519PublicKey const & identity_key,
    
        olm::Curve25519PublicKey const & one_time_key,
    
        std::uint8_t const * random, std::size_t random_length
    ) {
        if (random_length < new_outbound_session_random_length()) {
    
            last_error = olm::ErrorCode::NOT_ENOUGH_RANDOM;
    
            return std::size_t(-1);
        }
    
        Curve25519KeyPair base_key;
    
        olm::curve25519_generate_key(random, base_key);
    
        Curve25519KeyPair ratchet_key;
    
        olm::curve25519_generate_key(random + 32, ratchet_key);
    
        received_message = false;
    
        alice_identity_key = local_account.identity_keys.curve25519_key;
    
        alice_base_key = base_key;
    
        bob_one_time_key = one_time_key;
    
        std::uint8_t shared_secret[96];
    
            local_account.identity_keys.curve25519_key,
    
            one_time_key, shared_secret
    
             base_key, identity_key, shared_secret + 32
    
             base_key, one_time_key, shared_secret + 64
    
        ratchet.initialise_as_alice(shared_secret, 96, ratchet_key);
    
    
        olm::unset(base_key);
        olm::unset(ratchet_key);
        olm::unset(shared_secret);
    
    
        return std::size_t(0);
    }
    
    namespace {
    
    bool check_message_fields(
    
    ) {
        bool ok = true;
        ok = ok && reader.identity_key;
        ok = ok && reader.identity_key_length == KEY_LENGTH;
        ok = ok && reader.message;
        ok = ok && reader.base_key;
        ok = ok && reader.base_key_length == KEY_LENGTH;
    
        ok = ok && reader.one_time_key;
        ok = ok && reader.one_time_key_length == KEY_LENGTH;
    
    std::size_t olm::Session::new_inbound_session(
        olm::Account & local_account,
    
        std::uint8_t const * one_time_key_message, std::size_t message_length
    ) {
    
        decode_one_time_key_message(reader, one_time_key_message, message_length);
    
        if (!check_message_fields(reader)) {
    
            last_error = olm::ErrorCode::BAD_MESSAGE_FORMAT;
    
            return std::size_t(-1);
        }
    
    
        decode_message(
            message_reader, reader.message, reader.message_length,
            ratchet.ratchet_cipher.mac_length()
        );
    
        if (!message_reader.ratchet_key
                || message_reader.ratchet_key_length != KEY_LENGTH) {
    
            last_error = olm::ErrorCode::BAD_MESSAGE_FORMAT;
    
            return std::size_t(-1);
        }
    
    
        std::memcpy(alice_identity_key.public_key, reader.identity_key, 32);
    
        std::memcpy(alice_base_key.public_key, reader.base_key, 32);
    
        std::memcpy(bob_one_time_key.public_key, reader.one_time_key, 32);
    
        olm::Curve25519PublicKey ratchet_key;
    
        std::memcpy(ratchet_key.public_key, message_reader.ratchet_key, 32);
    
        olm::OneTimeKey const * our_one_time_key = local_account.lookup_key(
            bob_one_time_key
    
            last_error = olm::ErrorCode::BAD_MESSAGE_KEY_ID;
    
            return std::size_t(-1);
        }
    
    
        std::uint8_t shared_secret[96];
    
            our_one_time_key->key, alice_identity_key, shared_secret
    
            local_account.identity_keys.curve25519_key,
            alice_base_key, shared_secret + 32
    
            our_one_time_key->key, alice_base_key, shared_secret + 64
    
        ratchet.initialise_as_bob(shared_secret, 96, ratchet_key);
    
    bool olm::Session::matches_inbound_session(
    
        std::uint8_t const * one_time_key_message, std::size_t message_length
    ) {
    
        decode_one_time_key_message(reader, one_time_key_message, message_length);
    
        if (!check_message_fields(reader)) {
            return false;
        }
    
        bool same = true;
        same = same && 0 == std::memcmp(
    
            reader.identity_key, alice_identity_key.public_key, KEY_LENGTH
    
        );
        same = same && 0 == std::memcmp(
            reader.base_key, alice_base_key.public_key, KEY_LENGTH
        );
    
        same = same && 0 == std::memcmp(
            reader.one_time_key, bob_one_time_key.public_key, KEY_LENGTH
        );
    
    olm::MessageType olm::Session::encrypt_message_type() {
    
        if (received_message) {
    
    std::size_t olm::Session::encrypt_message_length(
    
        std::size_t plaintext_length
    ) {
        std::size_t message_length = ratchet.encrypt_output_length(
            plaintext_length
        );
    
        if (received_message) {
            return message_length;
        }
    
        return encode_one_time_key_message_length(
    
            KEY_LENGTH,
            KEY_LENGTH,
            message_length
        );
    }
    
    
    
    std::size_t olm::Session::encrypt_random_length() {
    
        return ratchet.encrypt_random_length();
    }
    
    
    
        std::uint8_t const * plaintext, std::size_t plaintext_length,
        std::uint8_t const * random, std::size_t random_length,
        std::uint8_t * message, std::size_t message_length
    ) {
        if (message_length < encrypt_message_length(plaintext_length)) {
    
            last_error = olm::ErrorCode::OUTPUT_BUFFER_TOO_SMALL;
    
            return std::size_t(-1);
        }
        std::uint8_t * message_body;
        std::size_t message_body_length = ratchet.encrypt_output_length(
            plaintext_length
        );
    
        if (received_message) {
            message_body = message;
        } else {
    
            encode_one_time_key_message(
                writer,
                PROTOCOL_VERSION,
    
                KEY_LENGTH,
                KEY_LENGTH,
                message_body_length,
                message
            );
    
            std::memcpy(
                writer.one_time_key, bob_one_time_key.public_key, KEY_LENGTH
            );
    
            std::memcpy(
    
                writer.identity_key, alice_identity_key.public_key, KEY_LENGTH
    
            );
            std::memcpy(
                writer.base_key, alice_base_key.public_key, KEY_LENGTH
            );
            message_body = writer.message;
        }
    
        std::size_t result = ratchet.encrypt(
            plaintext, plaintext_length,
            random, random_length,
            message_body, message_body_length
        );
    
        if (result == std::size_t(-1)) {
            last_error = ratchet.last_error;
    
            ratchet.last_error = olm::ErrorCode::SUCCESS;
    
    std::size_t olm::Session::decrypt_max_plaintext_length(
    
        MessageType message_type,
        std::uint8_t const * message, std::size_t message_length
    ) {
        std::uint8_t const * message_body;
        std::size_t message_body_length;
    
        if (message_type == olm::MessageType::MESSAGE) {
    
            message_body = message;
            message_body_length = message_length;
        } else {
    
            decode_one_time_key_message(reader, message, message_length);
            if (!reader.message) {
    
                last_error = olm::ErrorCode::BAD_MESSAGE_FORMAT;
    
                return std::size_t(-1);
            }
            message_body = reader.message;
            message_body_length = reader.message_length;
        }
    
        std::size_t result = ratchet.decrypt_max_plaintext_length(
            message_body, message_body_length
        );
    
        if (result == std::size_t(-1)) {
            last_error = ratchet.last_error;
    
            ratchet.last_error = olm::ErrorCode::SUCCESS;
    
    std::size_t olm::Session::decrypt(
        olm::MessageType message_type,
    
        std::uint8_t const * message, std::size_t message_length,
        std::uint8_t * plaintext, std::size_t max_plaintext_length
    ) {
        std::uint8_t const * message_body;
        std::size_t message_body_length;
    
        if (message_type == olm::MessageType::MESSAGE) {
    
            message_body = message;
            message_body_length = message_length;
        } else {
    
            decode_one_time_key_message(reader, message, message_length);
            if (!reader.message) {
    
                last_error = olm::ErrorCode::BAD_MESSAGE_FORMAT;
    
                return std::size_t(-1);
            }
            message_body = reader.message;
            message_body_length = reader.message_length;
        }
    
        std::size_t result = ratchet.decrypt(
            message_body, message_body_length, plaintext, max_plaintext_length
        );
    
        if (result == std::size_t(-1)) {
            last_error = ratchet.last_error;
    
            ratchet.last_error = olm::ErrorCode::SUCCESS;
    
        } else {
            received_message = true;
    
        }
        return result;
    }
    
        Session const & value
    ) {
        std::size_t length = 0;
    
        length += olm::pickle_length(value.received_message);
    
        length += olm::pickle_length(value.alice_identity_key);
    
        length += olm::pickle_length(value.alice_base_key);
    
        length += olm::pickle_length(value.bob_one_time_key);
    
        length += olm::pickle_length(value.bob_one_time_key_id);
        length += olm::pickle_length(value.ratchet);
    
        std::uint8_t * pos,
        Session const & value
    ) {
    
        pos = olm::pickle(pos, value.received_message);
    
        pos = olm::pickle(pos, value.alice_identity_key);
    
        pos = olm::pickle(pos, value.alice_base_key);
    
        pos = olm::pickle(pos, value.bob_one_time_key);
    
        pos = olm::pickle(pos, value.bob_one_time_key_id);
        pos = olm::pickle(pos, value.ratchet);
    
        std::uint8_t const * pos, std::uint8_t const * end,
        Session & value
    ) {
    
        pos = olm::unpickle(pos, end, value.received_message);
    
        pos = olm::unpickle(pos, end, value.alice_identity_key);
    
        pos = olm::unpickle(pos, end, value.alice_base_key);
    
        pos = olm::unpickle(pos, end, value.bob_one_time_key);
    
        pos = olm::unpickle(pos, end, value.bob_one_time_key_id);
        pos = olm::unpickle(pos, end, value.ratchet);