#include "session_pre_key.h" #include #include #include #include "curve.h" #include "LocalStorageProtocol.pb-c.h" #include "signal_protocol_internal.h" struct session_pre_key { signal_type_base base; uint32_t id; ec_key_pair *key_pair; }; struct session_signed_pre_key { signal_type_base base; uint32_t id; ec_key_pair *key_pair; uint64_t timestamp; size_t signature_len; uint8_t signature[]; }; struct session_pre_key_bundle { signal_type_base base; uint32_t registration_id; int device_id; uint32_t pre_key_id; ec_public_key *pre_key_public; uint32_t signed_pre_key_id; ec_public_key *signed_pre_key_public; signal_buffer *signed_pre_key_signature; ec_public_key *identity_key; }; /*------------------------------------------------------------------------*/ int session_pre_key_create(session_pre_key **pre_key, uint32_t id, ec_key_pair *key_pair) { session_pre_key *result = 0; assert(key_pair); result = malloc(sizeof(session_pre_key)); if(!result) { return SG_ERR_NOMEM; } memset(result, 0, sizeof(session_pre_key)); SIGNAL_INIT(result, session_pre_key_destroy); result->id = id; SIGNAL_REF(key_pair); result->key_pair = key_pair; *pre_key = result; return 0; } int session_pre_key_serialize(signal_buffer **buffer, const session_pre_key *pre_key) { int result = 0; size_t result_size = 0; Textsecure__PreKeyRecordStructure record = TEXTSECURE__PRE_KEY_RECORD_STRUCTURE__INIT; signal_buffer *public_buf = 0; signal_buffer *private_buf = 0; signal_buffer *result_buf = 0; ec_public_key *public_key = 0; ec_private_key *private_key = 0; size_t len = 0; uint8_t *data = 0; if(!pre_key) { result = SG_ERR_INVAL; goto complete; } public_key = ec_key_pair_get_public(pre_key->key_pair); result = ec_public_key_serialize(&public_buf, public_key); if(result < 0) { goto complete; } private_key = ec_key_pair_get_private(pre_key->key_pair); result = ec_private_key_serialize(&private_buf, private_key); if(result < 0) { goto complete; } record.has_id = 1; record.id = pre_key->id; record.has_publickey = 1; record.publickey.data = signal_buffer_data(public_buf); record.publickey.len = signal_buffer_len(public_buf); record.has_privatekey = 1; record.privatekey.data = signal_buffer_data(private_buf); record.privatekey.len = signal_buffer_len(private_buf); len = textsecure__pre_key_record_structure__get_packed_size(&record); result_buf = signal_buffer_alloc(len); if(!result_buf) { result = SG_ERR_NOMEM; goto complete; } data = signal_buffer_data(result_buf); result_size = textsecure__pre_key_record_structure__pack(&record, data); if(result_size != len) { signal_buffer_free(result_buf); result = SG_ERR_INVALID_PROTO_BUF; result_buf = 0; goto complete; } complete: if(public_buf) { signal_buffer_free(public_buf); } if(private_buf) { signal_buffer_free(private_buf); } if(result >= 0) { *buffer = result_buf; } return result; } int session_pre_key_deserialize(session_pre_key **pre_key, const uint8_t *data, size_t len, signal_context *global_context) { int result = 0; Textsecure__PreKeyRecordStructure *record = 0; ec_public_key *public_key = 0; ec_private_key *private_key = 0; ec_key_pair *key_pair = 0; session_pre_key *result_pre_key = 0; record = textsecure__pre_key_record_structure__unpack(0, len, data); if(!record) { result = SG_ERR_INVALID_PROTO_BUF; goto complete; } if(!record->has_id || !record->has_publickey || !record->has_privatekey) { result = SG_ERR_INVALID_KEY; goto complete; } result = curve_decode_point(&public_key, record->publickey.data, record->publickey.len, global_context); if(result < 0) { goto complete; } result = curve_decode_private_point(&private_key, record->privatekey.data, record->privatekey.len, global_context); if(result < 0) { goto complete; } result = ec_key_pair_create(&key_pair, public_key, private_key); if(result < 0) { goto complete; } result = session_pre_key_create(&result_pre_key, record->id, key_pair); if(result < 0) { goto complete; } complete: if(record) { textsecure__pre_key_record_structure__free_unpacked(record, 0); } if(public_key) { SIGNAL_UNREF(public_key); } if(private_key) { SIGNAL_UNREF(private_key); } if(key_pair) { SIGNAL_UNREF(key_pair); } if(result >= 0) { *pre_key = result_pre_key; } return result; } uint32_t session_pre_key_get_id(const session_pre_key *pre_key) { return pre_key->id; } ec_key_pair *session_pre_key_get_key_pair(const session_pre_key *pre_key) { return pre_key->key_pair; } void session_pre_key_destroy(signal_type_base *type) { session_pre_key *pre_key = (session_pre_key *)type; if(pre_key->key_pair) { SIGNAL_UNREF(pre_key->key_pair); } free(pre_key); } /*------------------------------------------------------------------------*/ int session_signed_pre_key_create(session_signed_pre_key **pre_key, uint32_t id, uint64_t timestamp, ec_key_pair *key_pair, const uint8_t *signature, size_t signature_len) { session_signed_pre_key *result = 0; assert(key_pair); assert(signature); assert(signature_len > 0); if(signature_len > (SIZE_MAX - sizeof(session_signed_pre_key)) / sizeof(uint8_t)) { return SG_ERR_NOMEM; } result = malloc(sizeof(session_signed_pre_key) + (sizeof(uint8_t) * signature_len)); if(!result) { return SG_ERR_NOMEM; } memset(result, 0, sizeof(session_signed_pre_key)); SIGNAL_INIT(result, session_signed_pre_key_destroy); result->id = id; result->timestamp = timestamp; SIGNAL_REF(key_pair); result->key_pair = key_pair; result->signature_len = signature_len; memcpy(result->signature, signature, signature_len); *pre_key = result; return 0; } int session_signed_pre_key_serialize(signal_buffer **buffer, const session_signed_pre_key *pre_key) { int result = 0; size_t result_size = 0; Textsecure__SignedPreKeyRecordStructure record = TEXTSECURE__SIGNED_PRE_KEY_RECORD_STRUCTURE__INIT; signal_buffer *public_buf = 0; signal_buffer *private_buf = 0; signal_buffer *signature_buf = 0; signal_buffer *result_buf = 0; ec_public_key *public_key = 0; ec_private_key *private_key = 0; size_t len = 0; uint8_t *data = 0; public_key = ec_key_pair_get_public(pre_key->key_pair); result = ec_public_key_serialize(&public_buf, public_key); if(result < 0) { goto complete; } private_key = ec_key_pair_get_private(pre_key->key_pair); result = ec_private_key_serialize(&private_buf, private_key); if(result < 0) { goto complete; } signature_buf = signal_buffer_create(pre_key->signature, pre_key->signature_len); if(!signature_buf) { result = SG_ERR_NOMEM; goto complete; } record.has_id = 1; record.id = pre_key->id; record.has_timestamp = 1; record.timestamp = pre_key->timestamp; record.has_publickey = 1; record.publickey.data = signal_buffer_data(public_buf); record.publickey.len = signal_buffer_len(public_buf); record.has_privatekey = 1; record.privatekey.data = signal_buffer_data(private_buf); record.privatekey.len = signal_buffer_len(private_buf); record.has_signature = 1; record.signature.data = signal_buffer_data(signature_buf); record.signature.len = signal_buffer_len(signature_buf); len = textsecure__signed_pre_key_record_structure__get_packed_size(&record); result_buf = signal_buffer_alloc(len); if(!result_buf) { result = SG_ERR_NOMEM; goto complete; } data = signal_buffer_data(result_buf); result_size = textsecure__signed_pre_key_record_structure__pack(&record, data); if(result_size != len) { signal_buffer_free(result_buf); result = SG_ERR_INVALID_PROTO_BUF; result_buf = 0; goto complete; } complete: if(public_buf) { signal_buffer_free(public_buf); } if(private_buf) { signal_buffer_free(private_buf); } if(signature_buf) { signal_buffer_free(signature_buf); } if(result >= 0) { *buffer = result_buf; } return result; } int session_signed_pre_key_deserialize(session_signed_pre_key **pre_key, const uint8_t *data, size_t len, signal_context *global_context) { int result = 0; Textsecure__SignedPreKeyRecordStructure *record = 0; ec_public_key *public_key = 0; ec_private_key *private_key = 0; ec_key_pair *key_pair = 0; session_signed_pre_key *result_pre_key = 0; record = textsecure__signed_pre_key_record_structure__unpack(0, len, data); if(!record) { result = SG_ERR_INVALID_PROTO_BUF; goto complete; } if(!record->has_id || !record->has_timestamp || !record->has_publickey || !record->has_privatekey || !record->has_signature) { result = SG_ERR_INVALID_KEY; goto complete; } result = curve_decode_point(&public_key, record->publickey.data, record->publickey.len, global_context); if(result < 0) { goto complete; } result = curve_decode_private_point(&private_key, record->privatekey.data, record->privatekey.len, global_context); if(result < 0) { goto complete; } result = ec_key_pair_create(&key_pair, public_key, private_key); if(result < 0) { goto complete; } result = session_signed_pre_key_create(&result_pre_key, record->id, record->timestamp, key_pair, record->signature.data, record->signature.len); if(result < 0) { goto complete; } complete: if(record) { textsecure__signed_pre_key_record_structure__free_unpacked(record, 0); } if(public_key) { SIGNAL_UNREF(public_key); } if(private_key) { SIGNAL_UNREF(private_key); } if(key_pair) { SIGNAL_UNREF(key_pair); } if(result >= 0) { *pre_key = result_pre_key; } return result; } uint32_t session_signed_pre_key_get_id(const session_signed_pre_key *pre_key) { return pre_key->id; } uint64_t session_signed_pre_key_get_timestamp(const session_signed_pre_key *pre_key) { return pre_key->timestamp; } ec_key_pair *session_signed_pre_key_get_key_pair(const session_signed_pre_key *pre_key) { return pre_key->key_pair; } const uint8_t *session_signed_pre_key_get_signature(const session_signed_pre_key *pre_key) { return pre_key->signature; } size_t session_signed_pre_key_get_signature_len(const session_signed_pre_key *pre_key) { return pre_key->signature_len; } void session_signed_pre_key_destroy(signal_type_base *type) { session_signed_pre_key *pre_key = (session_signed_pre_key *)type; if(pre_key->key_pair) { SIGNAL_UNREF(pre_key->key_pair); } free(pre_key); } /*------------------------------------------------------------------------*/ int session_pre_key_bundle_create(session_pre_key_bundle **bundle, uint32_t registration_id, int device_id, uint32_t pre_key_id, ec_public_key *pre_key_public, uint32_t signed_pre_key_id, ec_public_key *signed_pre_key_public, const uint8_t *signed_pre_key_signature_data, size_t signed_pre_key_signature_len, ec_public_key *identity_key) { int result = 0; session_pre_key_bundle *result_bundle = 0; result_bundle = malloc(sizeof(session_pre_key_bundle)); if(!result_bundle) { result = SG_ERR_NOMEM; goto complete; } memset(result_bundle, 0, sizeof(session_pre_key_bundle)); SIGNAL_INIT(result_bundle, session_pre_key_bundle_destroy); result_bundle->registration_id = registration_id; result_bundle->device_id = device_id; result_bundle->pre_key_id = pre_key_id; if(pre_key_public) { SIGNAL_REF(pre_key_public); result_bundle->pre_key_public = pre_key_public; } result_bundle->signed_pre_key_id = signed_pre_key_id; if(signed_pre_key_public) { SIGNAL_REF(signed_pre_key_public); result_bundle->signed_pre_key_public = signed_pre_key_public; } if(signed_pre_key_signature_data && signed_pre_key_signature_len > 0) { result_bundle->signed_pre_key_signature = signal_buffer_create( signed_pre_key_signature_data, signed_pre_key_signature_len); } if(identity_key) { SIGNAL_REF(identity_key); result_bundle->identity_key = identity_key; } complete: if(result >= 0) { *bundle = result_bundle; } else { if(result_bundle) { SIGNAL_UNREF(result_bundle); } } return result; } uint32_t session_pre_key_bundle_get_registration_id(const session_pre_key_bundle *bundle) { assert(bundle); return bundle->registration_id; } int session_pre_key_bundle_get_device_id(const session_pre_key_bundle *bundle) { assert(bundle); return bundle->device_id; } uint32_t session_pre_key_bundle_get_pre_key_id(const session_pre_key_bundle *bundle) { assert(bundle); return bundle->pre_key_id; } ec_public_key *session_pre_key_bundle_get_pre_key(const session_pre_key_bundle *bundle) { assert(bundle); return bundle->pre_key_public; } uint32_t session_pre_key_bundle_get_signed_pre_key_id(const session_pre_key_bundle *bundle) { assert(bundle); return bundle->signed_pre_key_id; } ec_public_key *session_pre_key_bundle_get_signed_pre_key(const session_pre_key_bundle *bundle) { assert(bundle); return bundle->signed_pre_key_public; } signal_buffer *session_pre_key_bundle_get_signed_pre_key_signature(const session_pre_key_bundle *bundle) { assert(bundle); return bundle->signed_pre_key_signature; } ec_public_key *session_pre_key_bundle_get_identity_key(const session_pre_key_bundle *bundle) { assert(bundle); return bundle->identity_key; } void session_pre_key_bundle_destroy(signal_type_base *type) { session_pre_key_bundle *bundle = (session_pre_key_bundle *)type; if(bundle->pre_key_public) { SIGNAL_UNREF(bundle->pre_key_public); } if(bundle->signed_pre_key_public) { SIGNAL_UNREF(bundle->signed_pre_key_public); } if(bundle->signed_pre_key_signature) { signal_buffer_free(bundle->signed_pre_key_signature); } if(bundle->identity_key) { SIGNAL_UNREF(bundle->identity_key); } free(bundle); }