olm/src/axolotl.cpp

581 lines
15 KiB
C++
Raw Normal View History

2015-06-22 18:50:56 +02:00
/* Copyright 2015 OpenMarket Ltd
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include "axolotl/axolotl.hh"
#include "axolotl/session.hh"
#include "axolotl/account.hh"
#include "axolotl/base64.hh"
#include "axolotl/cipher.hh"
#include <new>
#include <cstring>
namespace {
static AxolotlAccount * to_c(axolotl::Account * account) {
return reinterpret_cast<AxolotlAccount *>(account);
}
static AxolotlSession * to_c(axolotl::Session * account) {
return reinterpret_cast<AxolotlSession *>(account);
}
static axolotl::Account * from_c(AxolotlAccount * account) {
return reinterpret_cast<axolotl::Account *>(account);
}
static axolotl::Session * from_c(AxolotlSession * account) {
return reinterpret_cast<axolotl::Session *>(account);
}
static std::uint8_t * from_c(void * bytes) {
return reinterpret_cast<std::uint8_t *>(bytes);
}
static std::uint8_t const * from_c(void const * bytes) {
return reinterpret_cast<std::uint8_t const *>(bytes);
}
static const std::uint8_t CIPHER_KDF_INFO[] = "Pickle";
static const axolotl::CipherAesSha256 PICKLE_CIPHER(
CIPHER_KDF_INFO, sizeof(CIPHER_KDF_INFO) -1
);
std::size_t enc_output_length(
size_t raw_length
) {
std::size_t length = PICKLE_CIPHER.encrypt_ciphertext_length(raw_length);
length += PICKLE_CIPHER.mac_length();
return axolotl::encode_base64_length(length);
}
std::uint8_t * enc_output_pos(
std::uint8_t * output,
size_t raw_length
) {
std::size_t length = PICKLE_CIPHER.encrypt_ciphertext_length(raw_length);
length += PICKLE_CIPHER.mac_length();
return output + axolotl::encode_base64_length(length) - length;
}
std::size_t enc_output(
std::uint8_t const * key, std::size_t key_length,
std::uint8_t * output, size_t raw_length
) {
std::size_t ciphertext_length = PICKLE_CIPHER.encrypt_ciphertext_length(
raw_length
);
std::size_t length = ciphertext_length + PICKLE_CIPHER.mac_length();
std::size_t base64_length = axolotl::encode_base64_length(length);
std::uint8_t * raw_output = output + base64_length - length;
PICKLE_CIPHER.encrypt(
key, key_length,
raw_output, raw_length,
raw_output, ciphertext_length,
raw_output, length
);
axolotl::encode_base64(raw_output, length, output);
return raw_length;
}
std::size_t enc_input(
std::uint8_t const * key, std::size_t key_length,
std::uint8_t * input, size_t b64_length,
axolotl::ErrorCode & last_error
) {
std::size_t enc_length = axolotl::decode_base64_length(b64_length);
if (enc_length == std::size_t(-1)) {
last_error = axolotl::ErrorCode::INVALID_BASE64;
return std::size_t(-1);
}
axolotl::decode_base64(input, b64_length, input);
std::size_t raw_length = enc_length - PICKLE_CIPHER.mac_length();
std::size_t result = PICKLE_CIPHER.decrypt(
key, key_length,
input, enc_length,
input, raw_length,
input, raw_length
);
if (result == std::size_t(-1)) {
last_error = axolotl::ErrorCode::BAD_ACCOUNT_KEY;
}
return result;
}
std::size_t b64_output_length(
size_t raw_length
) {
return axolotl::encode_base64_length(raw_length);
}
std::uint8_t * b64_output_pos(
std::uint8_t * output,
size_t raw_length
) {
return output + axolotl::encode_base64_length(raw_length) - raw_length;
}
std::size_t b64_output(
std::uint8_t * output, size_t raw_length
) {
std::size_t base64_length = axolotl::encode_base64_length(raw_length);
std::uint8_t * raw_output = output + base64_length - raw_length;
axolotl::encode_base64(raw_output, raw_length, output);
return base64_length;
}
std::size_t b64_input(
std::uint8_t * input, size_t b64_length,
axolotl::ErrorCode & last_error
) {
std::size_t raw_length = axolotl::decode_base64_length(b64_length);
if (raw_length == std::size_t(-1)) {
last_error = axolotl::ErrorCode::INVALID_BASE64;
return std::size_t(-1);
}
axolotl::decode_base64(input, b64_length, input);
return raw_length;
}
const char * errors[9] {
"SUCCESS",
"NOT_ENOUGH_RANDOM",
"OUTPUT_BUFFER_TOO_SMALL",
"BAD_MESSAGE_VERSION",
"BAD_MESSAGE_FORMAT",
"BAD_MESSAGE_MAC",
"BAD_MESSAGE_KEY_ID",
"INVALID_BASE64",
"BAD_ACCOUNT_KEY",
};
} // namespace
extern "C" {
size_t axolotl_error() {
return std::size_t(-1);
}
const char * axolotl_account_last_error(
AxolotlSession * account
) {
unsigned error = unsigned(from_c(account)->last_error);
if (error < 9) {
return errors[error];
} else {
return "UNKNOWN_ERROR";
}
}
const char * axolotl_session_last_error(
AxolotlSession * session
) {
unsigned error = unsigned(from_c(session)->last_error);
if (error < 9) {
return errors[error];
} else {
return "UNKNOWN_ERROR";
}
}
size_t axolotl_account_size() {
return sizeof(axolotl::Account);
}
size_t axolotl_session_size() {
return sizeof(axolotl::Session);
}
AxolotlAccount * axolotl_account(
void * memory
) {
return to_c(new(memory) axolotl::Account());
}
AxolotlSession * axolotl_session(
void * memory
) {
return to_c(new(memory) axolotl::Session());
}
size_t axolotl_pickle_account_length(
AxolotlAccount * account
) {
return enc_output_length(pickle_length(*from_c(account)));
}
size_t axolotl_pickle_session_length(
AxolotlSession * session
) {
return enc_output_length(pickle_length(*from_c(session)));
}
size_t axolotl_pickle_account(
AxolotlAccount * account,
void const * key, size_t key_length,
void * pickled, size_t pickled_length
) {
axolotl::Account & object = *from_c(account);
std::size_t raw_length = pickle_length(object);
if (pickled_length < enc_output_length(raw_length)) {
object.last_error = axolotl::ErrorCode::OUTPUT_BUFFER_TOO_SMALL;
return size_t(-1);
}
pickle(enc_output_pos(from_c(pickled), raw_length), object);
return enc_output(from_c(key), key_length, from_c(pickled), raw_length);
}
size_t axolotl_pickle_session(
AxolotlSession * session,
void const * key, size_t key_length,
void * pickled, size_t pickled_length
) {
axolotl::Session & object = *from_c(session);
std::size_t raw_length = pickle_length(object);
if (pickled_length < enc_output_length(raw_length)) {
object.last_error = axolotl::ErrorCode::OUTPUT_BUFFER_TOO_SMALL;
return size_t(-1);
}
pickle(enc_output_pos(from_c(pickled), raw_length), object);
return enc_output(from_c(key), key_length, from_c(pickled), raw_length);
}
size_t axolotl_unpickle_account(
AxolotlAccount * account,
void const * key, size_t key_length,
void * pickled, size_t pickled_length
) {
axolotl::Account & object = *from_c(account);
std::uint8_t * const pos = from_c(pickled);
std::size_t raw_length = enc_input(
from_c(key), key_length, pos, pickled_length, object.last_error
);
if (raw_length == std::size_t(-1)) {
return std::size_t(-1);
}
std::uint8_t * const end = pos + raw_length;
unpickle(pos, end, object);
return pickled_length;
}
size_t axolotl_unpickle_session(
AxolotlSession * session,
void const * key, size_t key_length,
void * pickled, size_t pickled_length
) {
axolotl::Session & object = *from_c(session);
std::uint8_t * const pos = from_c(pickled);
std::size_t raw_length = enc_input(
from_c(key), key_length, pos, pickled_length, object.last_error
);
if (raw_length == std::size_t(-1)) {
return std::size_t(-1);
}
std::uint8_t * const end = pos + raw_length;
unpickle(pos, end, object);
return pickled_length;
}
size_t axolotl_create_account_random_length(
AxolotlAccount * account
) {
return from_c(account)->new_account_random_length();
}
size_t axolotl_create_account(
AxolotlAccount * account,
void const * random, size_t random_length
) {
return from_c(account)->new_account(from_c(random), random_length);
}
namespace {
static const std::size_t OUTPUT_KEY_LENGTH = 2 + 10 + 2 +
axolotl::encode_base64_length(32) + 3;
void output_key(
axolotl::LocalKey const & key,
std::uint8_t sep,
std::uint8_t * output
) {
output[0] = sep;
output[1] = '[';
std::memset(output + 2, ' ', 10);
uint32_t value = key.id;
uint8_t * number = output + 11;
*number = '0' + value % 10;
value /= 10;
while (value) {
*(--number) = '0' + value % 10;
value /= 10;
}
output[12] = ',';
output[13] = '"';
axolotl::encode_base64(key.key.public_key, 32, output + 14);
output[OUTPUT_KEY_LENGTH - 3] = '"';
output[OUTPUT_KEY_LENGTH - 2] = ']';
output[OUTPUT_KEY_LENGTH - 1] = '\n';
}
} // namespace
size_t axolotl_account_identity_keys_length(
AxolotlAccount * account
) {
return OUTPUT_KEY_LENGTH + 1;
}
size_t axolotl_account_identity_keys(
AxolotlAccount * account,
void * identity_keys, size_t identity_key_length
) {
2015-06-22 18:50:56 +02:00
std::size_t length = axolotl_account_identity_keys_length(account);
if (identity_key_length < length) {
from_c(account)->last_error =
axolotl::ErrorCode::OUTPUT_BUFFER_TOO_SMALL;
return size_t(-1);
}
std::uint8_t * output = from_c(identity_keys);
output_key(from_c(account)->identity_key, '[', output);
output += OUTPUT_KEY_LENGTH;
output[0] = ']';
return length;
}
size_t axolotl_account_one_time_keys_length(
AxolotlAccount * account
) {
size_t count = from_c(account)->one_time_keys.size();
return OUTPUT_KEY_LENGTH * (count + 1) + 1;
}
size_t axolotl_account_one_time_keys(
AxolotlAccount * account,
void * identity_keys, size_t identity_key_length
) {
std::size_t length = axolotl_account_one_time_keys_length(account);
if (identity_key_length < length) {
from_c(account)->last_error =
axolotl::ErrorCode::OUTPUT_BUFFER_TOO_SMALL;
return size_t(-1);
}
std::uint8_t * output = from_c(identity_keys);
output_key(from_c(account)->last_resort_one_time_key, '[', output);
output += OUTPUT_KEY_LENGTH;
for (auto const & key : from_c(account)->one_time_keys) {
output_key(key, ',', output);
output += OUTPUT_KEY_LENGTH;
}
output[0] = ']';
return length;
}
2015-06-16 16:15:40 +02:00
size_t axolotl_create_outbound_session_random_length(
AxolotlSession * session
) {
return from_c(session)->new_outbound_session_random_length();
}
size_t axolotl_create_outbound_session(
AxolotlSession * session,
AxolotlAccount * account,
void const * their_identity_key, size_t their_identity_key_length,
unsigned their_one_time_key_id,
void const * their_one_time_key, size_t their_one_time_key_length,
void const * random, size_t random_length
) {
if (axolotl::decode_base64_length(their_identity_key_length) != 32
|| axolotl::decode_base64_length(their_one_time_key_length) != 32
) {
from_c(session)->last_error = axolotl::ErrorCode::INVALID_BASE64;
return std::size_t(-1);
}
axolotl::Curve25519PublicKey identity_key;
axolotl::RemoteKey one_time_key;
axolotl::decode_base64(
from_c(their_identity_key), their_identity_key_length,
identity_key.public_key
);
one_time_key.id = their_one_time_key_id;
axolotl::decode_base64(
from_c(their_one_time_key), their_one_time_key_length,
one_time_key.key.public_key
);
return from_c(session)->new_outbound_session(
*from_c(account), identity_key, one_time_key,
from_c(random), random_length
);
}
size_t axolotl_create_inbound_session(
AxolotlSession * session,
AxolotlAccount * account,
void * one_time_key_message, size_t message_length
) {
std::size_t raw_length = b64_input(
from_c(one_time_key_message), message_length, from_c(session)->last_error
);
if (raw_length == std::size_t(-1)) {
return std::size_t(-1);
}
return from_c(session)->new_inbound_session(
*from_c(account), from_c(one_time_key_message), raw_length
);
}
size_t axolotl_matches_inbound_session(
AxolotlSession * session,
void * one_time_key_message, size_t message_length
) {
std::size_t raw_length = b64_input(
from_c(one_time_key_message), message_length, from_c(session)->last_error
);
if (raw_length == std::size_t(-1)) {
return std::size_t(-1);
}
bool matches = from_c(session)->matches_inbound_session(
from_c(one_time_key_message), raw_length
);
return matches ? 1 : 0;
}
size_t axolotl_remove_one_time_keys(
AxolotlAccount * account,
AxolotlSession * session
) {
size_t result = from_c(account)->remove_key(
from_c(session)->bob_one_time_key_id
);
if (result == std::size_t(-1)) {
from_c(account)->last_error = axolotl::ErrorCode::BAD_MESSAGE_KEY_ID;
}
return result;
}
size_t axolotl_encrypt_message_type(
AxolotlSession * session
) {
return size_t(from_c(session)->encrypt_message_type());
}
size_t axolotl_encrypt_random_length(
AxolotlSession * session
) {
return from_c(session)->encrypt_random_length();
}
size_t axolotl_encrypt_message_length(
AxolotlSession * session,
size_t plaintext_length
) {
return b64_output_length(
from_c(session)->encrypt_message_length(plaintext_length)
);
}
size_t axolotl_encrypt(
AxolotlSession * session,
void const * plaintext, size_t plaintext_length,
void const * random, size_t random_length,
void * message, size_t message_length
) {
std::size_t raw_length = from_c(session)->encrypt_message_length(
plaintext_length
);
if (message_length < raw_length) {
from_c(session)->last_error =
axolotl::ErrorCode::OUTPUT_BUFFER_TOO_SMALL;
return std::size_t(-1);
}
from_c(session)->encrypt(
from_c(plaintext), plaintext_length,
from_c(random), random_length,
b64_output_pos(from_c(message), raw_length), raw_length
);
return b64_output(from_c(message), raw_length);
}
size_t axolotl_decrypt_max_plaintext_length(
AxolotlSession * session,
size_t message_type,
void * message, size_t message_length
) {
std::size_t raw_length = b64_input(
from_c(message), message_length, from_c(session)->last_error
);
if (raw_length == std::size_t(-1)) {
return std::size_t(-1);
}
return from_c(session)->decrypt_max_plaintext_length(
axolotl::MessageType(message_type), from_c(message), raw_length
);
}
size_t axolotl_decrypt(
AxolotlSession * session,
size_t message_type,
void * message, size_t message_length,
void * plaintext, size_t max_plaintext_length
) {
std::size_t raw_length = b64_input(
from_c(message), message_length, from_c(session)->last_error
);
if (raw_length == std::size_t(-1)) {
return std::size_t(-1);
}
return from_c(session)->decrypt(
axolotl::MessageType(message_type), from_c(message), raw_length,
from_c(plaintext), max_plaintext_length
);
}
}