-
Notifications
You must be signed in to change notification settings - Fork 2.1k
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Implement Message Counter Synchronization Protocol (MCSP) part
- Loading branch information
1 parent
f4980c1
commit 16fd9bb
Showing
12 changed files
with
692 additions
and
4 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,270 @@ | ||
/* | ||
* | ||
* Copyright (c) 2021 Project CHIP Authors | ||
* | ||
* Licensed under the Apache License, Version 2.0 (the "License"); | ||
* you may not use this file except in compliance with the License. | ||
* You may obtain a copy of the License at | ||
* | ||
* http://www.apache.org/licenses/LICENSE-2.0 | ||
* | ||
* Unless required by applicable law or agreed to in writing, software | ||
* distributed under the License is distributed on an "AS IS" BASIS, | ||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | ||
* See the License for the specific language governing permissions and | ||
* limitations under the License. | ||
*/ | ||
|
||
/** | ||
* @file | ||
* This file implements the CHIP Secure Channel protocol. | ||
* | ||
*/ | ||
|
||
#include <core/CHIPCore.h> | ||
#include <core/CHIPEncoding.h> | ||
#include <core/CHIPKeyIds.h> | ||
#include <messaging/ExchangeContext.h> | ||
#include <messaging/ExchangeMgr.h> | ||
#include <messaging/Flags.h> | ||
#include <messaging/SecureChannelMgr.h> | ||
#include <protocols/Protocols.h> | ||
#include <support/BufferWriter.h> | ||
#include <support/CodeUtils.h> | ||
#include <support/logging/CHIPLogging.h> | ||
|
||
namespace chip { | ||
namespace SecureChannel { | ||
|
||
SecureChannelMgr::SecureChannelMgr() | ||
{ | ||
mExchangeMgr = nullptr; | ||
} | ||
|
||
CHIP_ERROR SecureChannelMgr::Init(Messaging::ExchangeManager * exchangeMgr) | ||
{ | ||
CHIP_ERROR err = CHIP_NO_ERROR; | ||
|
||
VerifyOrExit(exchangeMgr != nullptr, err = CHIP_ERROR_INCORRECT_STATE); | ||
mExchangeMgr = exchangeMgr; | ||
|
||
// Register to receive unsolicited Secure Channel Request messages from the exchange manager. | ||
err = mExchangeMgr->RegisterUnsolicitedMessageHandlerForProtocol(Protocols::kProtocol_SecureChannel, this); | ||
|
||
SuccessOrExit(err); | ||
|
||
exit: | ||
return err; | ||
} | ||
|
||
void SecureChannelMgr::Shutdown() | ||
{ | ||
if (mExchangeMgr != nullptr) | ||
{ | ||
mExchangeMgr->UnregisterUnsolicitedMessageHandlerForProtocol(Protocols::kProtocol_SecureChannel); | ||
mExchangeMgr = nullptr; | ||
} | ||
} | ||
|
||
void SecureChannelMgr::OnMessageReceived(Messaging::ExchangeContext * ec, const PacketHeader & packetHeader, | ||
const PayloadHeader & payloadHeader, System::PacketBufferHandle msgBuf) | ||
{ | ||
if (payloadHeader.HasMessageType(Protocols::SecureChannel::MsgType::MsgCounterSyncReq)) | ||
{ | ||
HandleMsgCounterSyncReq(ec, packetHeader, std::move(msgBuf)); | ||
} | ||
else if (payloadHeader.HasMessageType(Protocols::SecureChannel::MsgType::MsgCounterSyncRsp)) | ||
{ | ||
HandleMsgCounterSyncResp(ec, packetHeader, std::move(msgBuf)); | ||
} | ||
} | ||
|
||
void SecureChannelMgr::OnResponseTimeout(Messaging::ExchangeContext * ec) | ||
{ | ||
// Close the exchange if MsgCounterSyncRsp is not received before kMsgCounterSyncTimeout. | ||
if (ec != nullptr) | ||
ec->Close(); | ||
} | ||
|
||
// Create and initialize new exchange for the message counter synchronization request/response messages. | ||
CHIP_ERROR SecureChannelMgr::NewMsgCounterSyncExchange(SecureSessionHandle session, Messaging::ExchangeContext *& ec) | ||
{ | ||
CHIP_ERROR err = CHIP_NO_ERROR; | ||
|
||
// Message counter synchronization protocol is only applicable for application group keys. | ||
VerifyOrExit(ChipKeyId::IsAppGroupKey(session.GetPeerKeyId()), err = CHIP_ERROR_INVALID_ARGUMENT); | ||
|
||
// Create new exchange context. | ||
ec = mExchangeMgr->NewContext(session, this); | ||
VerifyOrExit(ec != nullptr, err = CHIP_ERROR_NO_MEMORY); | ||
|
||
exit: | ||
return err; | ||
} | ||
|
||
CHIP_ERROR SecureChannelMgr::SendMsgCounterSyncReq(SecureSessionHandle session) | ||
{ | ||
CHIP_ERROR err = CHIP_NO_ERROR; | ||
Messaging::ExchangeContext * ec = nullptr; | ||
System::PacketBufferHandle msgBuf; | ||
Messaging::SendFlags sendFlags; | ||
uint8_t challenge[kMsgCounterChallengeSize]; | ||
|
||
// Create and initialize new exchange. | ||
err = NewMsgCounterSyncExchange(session, ec); | ||
SuccessOrExit(err); | ||
|
||
// Allocate a buffer for the null message. | ||
msgBuf = System::PacketBufferHandle::New(kMsgCounterChallengeSize); | ||
VerifyOrExit(!msgBuf.IsNull(), err = CHIP_ERROR_NO_MEMORY); | ||
|
||
// Generate a 64-bit random number to uniquely identify the request. | ||
err = DRBG_get_bytes(challenge, kMsgCounterChallengeSize); | ||
SuccessOrExit(err); | ||
|
||
// Store generated Challenge value to ExchangeContext to resolve synchronization response. | ||
ec->SetChallenge(challenge); | ||
|
||
memcpy(msgBuf->Start(), challenge, kMsgCounterChallengeSize); | ||
msgBuf->SetDataLength(kMsgCounterChallengeSize); | ||
|
||
// TODO:(#4641) We shall also set the C flag in the packet header, this will be used for message protection later. | ||
sendFlags.Set(Messaging::SendMessageFlags::kNoAutoRequestAck, true).Set(Messaging::SendMessageFlags::kExpectResponse, true); | ||
|
||
// Arm a timer to enforce that a MsgCounterSyncRsp is received before kMsgCounterSyncTimeout. | ||
ec->SetResponseTimeout(kMsgCounterSyncTimeout); | ||
|
||
// Send the message counter synchronization request in a Secure Channel Protocol::MsgCounterSyncReq message. | ||
err = ec->SendMessage(Protocols::SecureChannel::MsgType::MsgCounterSyncReq, std::move(msgBuf), sendFlags); | ||
SuccessOrExit(err); | ||
|
||
exit: | ||
if (err != CHIP_NO_ERROR) | ||
{ | ||
ChipLogError(ExchangeManager, "Failed to send message counter synchronization request with error:%s", ErrorStr(err)); | ||
} | ||
|
||
return err; | ||
} | ||
|
||
CHIP_ERROR SecureChannelMgr::SendMsgCounterSyncResp(Messaging::ExchangeContext * ec, SecureSessionHandle session) | ||
{ | ||
CHIP_ERROR err = CHIP_NO_ERROR; | ||
Transport::PeerConnectionState * state = nullptr; | ||
System::PacketBufferHandle msgBuf; | ||
uint8_t * msg = nullptr; | ||
|
||
state = mExchangeMgr->GetSessionMgr()->GetPeerConnectionState(session); | ||
VerifyOrExit(state != nullptr, err = CHIP_ERROR_NOT_CONNECTED); | ||
|
||
// Allocate new buffer. | ||
msgBuf = System::PacketBufferHandle::New(kMsgCounterSyncRespMsgSize); | ||
VerifyOrExit(!msgBuf.IsNull(), err = CHIP_ERROR_NO_MEMORY); | ||
|
||
msg = msgBuf->Start(); | ||
|
||
// Let's construct the message using BufBound | ||
{ | ||
Encoding::LittleEndian::BufferWriter bbuf(msg, kMsgCounterSyncRespMsgSize); | ||
|
||
// Write the message id (counter) field. | ||
bbuf.Put32(state->GetSendMessageIndex()); | ||
|
||
// Fill in the random value | ||
bbuf.Put(ec->GetChallenge(), kMsgCounterChallengeSize); | ||
|
||
VerifyOrExit(bbuf.Fit(), err = CHIP_ERROR_NO_MEMORY); | ||
} | ||
|
||
// Set message length. | ||
msgBuf->SetDataLength(kMsgCounterSyncRespMsgSize); | ||
|
||
// Send message counter synchronization response message. | ||
err = ec->SendMessage(Protocols::SecureChannel::MsgType::MsgCounterSyncRsp, std::move(msgBuf), | ||
Messaging::SendFlags(Messaging::SendMessageFlags::kNoAutoRequestAck)); | ||
|
||
exit: | ||
if (err != CHIP_NO_ERROR) | ||
{ | ||
ChipLogError(ExchangeManager, "Failed to send message counter synchronization response with error:%s", ErrorStr(err)); | ||
} | ||
|
||
return err; | ||
} | ||
|
||
void SecureChannelMgr::HandleMsgCounterSyncReq(Messaging::ExchangeContext * ec, const PacketHeader & packetHeader, | ||
System::PacketBufferHandle msgBuf) | ||
{ | ||
CHIP_ERROR err = CHIP_NO_ERROR; | ||
|
||
const uint8_t * req = msgBuf->Start(); | ||
size_t reqlen = msgBuf->DataLength(); | ||
|
||
ChipLogDetail(ExchangeManager, "Received MsgCounterSyncReq request"); | ||
|
||
VerifyOrExit(packetHeader.GetSourceNodeId().HasValue(), err = CHIP_ERROR_INVALID_ARGUMENT); | ||
VerifyOrExit(ChipKeyId::IsAppGroupKey(packetHeader.GetEncryptionKeyID()), err = CHIP_ERROR_WRONG_KEY_TYPE); | ||
VerifyOrExit(req != nullptr, err = CHIP_ERROR_MESSAGE_INCOMPLETE); | ||
VerifyOrExit(reqlen == kMsgCounterChallengeSize, err = CHIP_ERROR_INVALID_MESSAGE_LENGTH); | ||
|
||
// Store the 64-bit value sent in the Challenge filed of the MsgCounterSyncReq. | ||
ec->SetChallenge(req); | ||
|
||
// Respond with MsgCounterSyncResp | ||
err = SendMsgCounterSyncResp(ec, { packetHeader.GetSourceNodeId().Value(), packetHeader.GetEncryptionKeyID() }); | ||
|
||
exit: | ||
if (err != CHIP_NO_ERROR) | ||
{ | ||
ChipLogError(ExchangeManager, "Failed to handle MsgCounterSyncReq message with error:%s", ErrorStr(err)); | ||
} | ||
|
||
if (ec != nullptr) | ||
ec->Close(); | ||
|
||
return; | ||
} | ||
|
||
void SecureChannelMgr::HandleMsgCounterSyncResp(Messaging::ExchangeContext * ec, const PacketHeader & packetHeader, | ||
System::PacketBufferHandle msgBuf) | ||
{ | ||
CHIP_ERROR err = CHIP_NO_ERROR; | ||
|
||
uint32_t syncCounter = 0; | ||
uint8_t challenge[kMsgCounterChallengeSize]; | ||
|
||
const uint8_t * resp = msgBuf->Start(); | ||
size_t resplen = msgBuf->DataLength(); | ||
|
||
ChipLogDetail(ExchangeManager, "Received MsgCounterSyncResp response"); | ||
|
||
VerifyOrExit(msgBuf->DataLength() == kMsgCounterSyncRespMsgSize, err = CHIP_ERROR_INVALID_MESSAGE_LENGTH); | ||
VerifyOrExit(ChipKeyId::IsAppGroupKey(packetHeader.GetEncryptionKeyID()), err = CHIP_ERROR_WRONG_KEY_TYPE); | ||
|
||
// Store the 64-bit value sent in the Challenge filed of the MsgCounterSyncReq. | ||
VerifyOrExit(resp != nullptr, err = CHIP_ERROR_MESSAGE_INCOMPLETE); | ||
VerifyOrExit(resplen == kMsgCounterSyncRespMsgSize, err = CHIP_ERROR_INVALID_MESSAGE_LENGTH); | ||
|
||
syncCounter = chip::Encoding::LittleEndian::Read32(resp); | ||
memcpy(challenge, resp, kMsgCounterChallengeSize); | ||
|
||
// Verify that the response field matches the expected Challenge field for the exchange. | ||
VerifyOrExit(memcmp(ec->GetChallenge(), challenge, kMsgCounterChallengeSize) == 0, err = CHIP_ERROR_INVALID_SIGNATURE); | ||
|
||
// ToDo:(#4628)Initialize/synchronize peer's message counter to FabricState. | ||
VerifyOrExit(syncCounter != 0, err = CHIP_ERROR_READ_FAILED); | ||
|
||
exit: | ||
if (err != CHIP_NO_ERROR) | ||
{ | ||
ChipLogError(ExchangeManager, "Failed to handle MsgCounterSyncResp message with error:%s", ErrorStr(err)); | ||
} | ||
|
||
if (ec != nullptr) | ||
ec->Close(); | ||
|
||
return; | ||
} | ||
|
||
} // namespace SecureChannel | ||
} // namespace chip |
Oops, something went wrong.