• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 /*
2  * Copyright (c) 2020 Huawei Device Co., Ltd.
3  * Licensed under the Apache License, Version 2.0 (the "License");
4  * you may not use this file except in compliance with the License.
5  * You may obtain a copy of the License at
6  *
7  *    http://www.apache.org/licenses/LICENSE-2.0
8  *
9  * Unless required by applicable law or agreed to in writing, software
10  * distributed under the License is distributed on an "AS IS" BASIS,
11  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12  * See the License for the specific language governing permissions and
13  * limitations under the License.
14  */
15 
16 #if !(defined(_CUT_STS_) || defined(_CUT_STS_SERVER_))
17 
18 #include "securec.h"
19 #include "log.h"
20 #include "mem_stat.h"
21 #include "jsonutil.h"
22 #include "commonutil.h"
23 #include "parsedata.h"
24 #include "key_agreement_version.h"
25 #include "add_auth_info.h"
26 
parse_auth_start_request(const char * payload,enum json_object_data_type data_type)27 void *parse_auth_start_request(const char *payload, enum json_object_data_type data_type)
28 {
29     struct sts_start_request_data *auth_start_request =
30         (struct sts_start_request_data *)MALLOC(sizeof(struct sts_start_request_data));
31     if (auth_start_request == NULL) {
32         return NULL;
33     }
34     (void)memset_s(auth_start_request, sizeof(*auth_start_request), 0, sizeof(*auth_start_request));
35     json_pobject obj = parse_payload(payload, data_type);
36     if (obj == NULL) {
37         LOGE("Parse Auth Start Request parse payload failed");
38         goto error;
39     }
40     /* op */
41     int32_t op = get_json_int(obj, FIELD_OPERATION_CODE);
42     if (op == -1) {
43         LOGE("Parse Auth Start Request failed, field is null in operationCode");
44         goto error;
45     }
46     auth_start_request->operation_code = op;
47     /* challenge */
48     int32_t result = byte_convert(obj, FIELD_CHALLENGE, auth_start_request->challenge.challenge,
49                                   &auth_start_request->challenge.length, CHALLENGE_BUFF_LENGTH);
50     if (result != HC_OK) {
51         LOGE("Parse Add AuthInfo Data failed, field is null in challenge");
52         goto error;
53     }
54     /* epk */
55     result = byte_convert(obj, FIELD_EPK, (uint8_t *)auth_start_request->epk.stpk,
56                           &auth_start_request->epk.length, HC_ST_PUBLIC_KEY_LEN);
57     if (result != HC_OK) {
58         LOGE("Parse Add AuthInfo Data failed, field is null in epk");
59         goto error;
60     }
61     /* pkgName */
62     (void)string_convert(obj, FIELD_PKG_NAME, (uint8_t *)auth_start_request->package_name.name,
63                          &auth_start_request->package_name.length, HC_PACKAGE_NAME_BUFF_LEN);
64     /* peerAuthId */
65     (void)byte_convert(obj, FIELD_PEER_AUTH_ID, (uint8_t *)auth_start_request->self_auth_id.auth_id,
66                        &auth_start_request->self_auth_id.length, HC_AUTH_ID_BUFF_LEN);
67     /* peerUserType */
68     int peer_user_type = get_json_int(obj, FIELD_PEER_USER_TYPE);
69 
70     auth_start_request->peer_user_type = peer_user_type;
71     /* version */
72     json_pobject obj_ver = get_json_obj(obj, FIELD_VERSION);
73     bool ret = parse_version(obj_ver, &auth_start_request->peer_version, &auth_start_request->peer_support_version);
74     if (!ret) {
75         LOGE("Parse Auth Start Request, field is null in version");
76         goto error;
77     }
78     free_payload(obj, data_type);
79     return (void *)auth_start_request;
80 error:
81     free_payload(obj, data_type);
82     FREE(auth_start_request);
83     return NULL;
84 }
85 
free_auth_start_request(void * obj)86 void free_auth_start_request(void *obj)
87 {
88     if (obj != NULL) {
89         FREE(obj);
90     }
91 }
92 
make_request_json_str(struct sts_start_request_data * auth_start_request,struct sts_start_request_data_hex tmp_hex)93 static char *make_request_json_str(struct sts_start_request_data *auth_start_request,
94                                    struct sts_start_request_data_hex tmp_hex)
95 {
96     char *tmp_str = (char *)MALLOC(RET_STR_LENGTH);
97     if (tmp_str == NULL) {
98         return NULL;
99     }
100     (void)memset_s(tmp_str, RET_STR_LENGTH, 0, RET_STR_LENGTH);
101     if (snprintf_s(tmp_str, RET_STR_LENGTH, RET_STR_LENGTH - 1,
102         "{\"%s\":%d,\"%s\":%d,\"%s\":{\"%s\":\"%s\",\"%s\":\"%s\",\"%s\":%d,"
103         "\"%s\":{\"%s\":\"%u.%u.%u\",\"%s\":\"%u.%u.%u\"},\"%s\":\"%s\","
104         "\"%s\":\"%s\",\"%s\":\"%s\",\"%s\":\"%d\",\"%s\":\"%u\"}}",
105         FIELD_AUTH_FORM, AUTH_FORM, FIELD_MESSAGE, AUTH_START_REQUEST, FIELD_PAYLOAD,
106         FIELD_CHALLENGE, tmp_hex.tmp_cha_data_hex, FIELD_EPK, tmp_hex.tmp_epk_data_hex,
107         FIELD_OPERATION_CODE, auth_start_request->operation_code,
108         FIELD_VERSION, FIELD_CURRENT_VERSION, auth_start_request->peer_version.first,
109         auth_start_request->peer_version.second,
110         auth_start_request->peer_version.third, FIELD_MIN_VERSION,
111         auth_start_request->peer_support_version.first,
112         auth_start_request->peer_support_version.second,
113         auth_start_request->peer_support_version.third,
114         FIELD_PKG_NAME, auth_start_request->package_name.name,
115         FIELD_SERVICE_TYPE, tmp_hex.tmp_type_data_hex,
116         FIELD_PEER_AUTH_ID, tmp_hex.tmp_auth_id_data_hex,
117         FIELD_PEER_USER_TYPE, auth_start_request->peer_user_type,
118         FIELD_KEY_LENGTH, auth_start_request->key_length) < 0) {
119         LOGE("String generate failed");
120         FREE(tmp_str);
121         tmp_str = NULL;
122     }
123     return tmp_str;
124 }
125 
make_auth_start_request(void * data)126 char *make_auth_start_request(void *data)
127 {
128     struct sts_start_request_data *auth_start_request = data;
129     struct sts_start_request_data_hex tmp_hex = {0, 0, 0, 0};
130     /* challenge */
131     tmp_hex.tmp_cha_data_hex = raw_byte_to_hex_string(auth_start_request->challenge.challenge,
132                                                       auth_start_request->challenge.length);
133     if (tmp_hex.tmp_cha_data_hex == NULL) {
134         return NULL;
135     }
136     /* epk */
137     tmp_hex.tmp_epk_data_hex = raw_byte_to_hex_string(auth_start_request->epk.stpk, auth_start_request->epk.length);
138     if (tmp_hex.tmp_epk_data_hex == NULL) {
139         FREE(tmp_hex.tmp_cha_data_hex);
140         return NULL;
141     }
142     /* service_type */
143     tmp_hex.tmp_type_data_hex = raw_byte_to_hex_string(auth_start_request->service_type.type,
144                                                        auth_start_request->service_type.length);
145     if (tmp_hex.tmp_type_data_hex == NULL) {
146         FREE(tmp_hex.tmp_epk_data_hex);
147         FREE(tmp_hex.tmp_cha_data_hex);
148         return NULL;
149     }
150     /* peerAuthId */
151     tmp_hex.tmp_auth_id_data_hex = raw_byte_to_hex_string(auth_start_request->self_auth_id.auth_id,
152                                                           auth_start_request->self_auth_id.length);
153     if (tmp_hex.tmp_auth_id_data_hex == NULL) {
154         FREE(tmp_hex.tmp_epk_data_hex);
155         FREE(tmp_hex.tmp_type_data_hex);
156         FREE(tmp_hex.tmp_cha_data_hex);
157         return NULL;
158     }
159     char *ret_str = make_request_json_str(auth_start_request, tmp_hex);
160     FREE(tmp_hex.tmp_epk_data_hex);
161     FREE(tmp_hex.tmp_cha_data_hex);
162     FREE(tmp_hex.tmp_type_data_hex);
163     FREE(tmp_hex.tmp_auth_id_data_hex);
164     return ret_str;
165 }
166 
167 #else /* _CUT_XXX_ */
168 
169 #include "parsedata.h"
170 DEFINE_EMPTY_STRUCT_FUNC(auth_start_request)
171 
172 #endif /* _CUT_XXX_ */
173 
174