blob: d7b90a70e24d3ed87f0a05deb11a210b8864e128 [file] [log] [blame]
Andres Morales6c9fe692015-02-23 10:44:41 -08001/*
2 * Copyright 2015 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 *
Andres Morales6c9fe692015-02-23 10:44:41 -080016 */
17
18#include <keyguard/keyguard_messages.h>
19
20#include <string.h>
21
Andres Moralesac808182015-02-26 14:11:04 -080022
Andres Morales6c9fe692015-02-23 10:44:41 -080023namespace keyguard {
24
25/**
Andres Moralesac808182015-02-26 14:11:04 -080026 * Methods for serializing/deserializing SizedBuffers
Andres Morales6c9fe692015-02-23 10:44:41 -080027 */
Andres Morales6c9fe692015-02-23 10:44:41 -080028
Andres Moralesac808182015-02-26 14:11:04 -080029static inline size_t serialized_buffer_size(const SizedBuffer &buf) {
Andres Morales6c9fe692015-02-23 10:44:41 -080030 return sizeof(uint32_t) + buf.length;
31}
32
33static inline void append_to_buffer(uint8_t **buffer, const SizedBuffer *to_append) {
34 memcpy(*buffer, &to_append->length, sizeof(to_append->length));
35 *buffer += sizeof(to_append->length);
36 memcpy(*buffer, to_append->buffer.get(), to_append->length);
37 *buffer += to_append->length;
38}
39
40static inline keyguard_error_t read_from_buffer(const uint8_t **buffer, const uint8_t *end,
41 SizedBuffer *target) {
42 if (*buffer + sizeof(target->length) >= end) return KG_ERROR_INVALID;
43
44 memcpy(&target->length, *buffer, sizeof(target->length));
45 *buffer += sizeof(target->length);
46 const uint8_t *buffer_end = *buffer + target->length;
47 if (buffer_end > end || buffer_end <= *buffer) return KG_ERROR_INVALID;
48
49 target->buffer.reset(new uint8_t[target->length]);
50 memcpy(target->buffer.get(), *buffer, target->length);
51 *buffer += target->length;
52 return KG_ERROR_OK;
53}
54
Andres Moralesac808182015-02-26 14:11:04 -080055
Andres Morales6c9fe692015-02-23 10:44:41 -080056size_t KeyguardMessage::GetSerializedSize() const {
Andres Moralesb2abaa82015-03-03 09:09:18 -080057 if (error == KG_ERROR_OK) {
Andres Moralesac808182015-02-26 14:11:04 -080058 return 2 * sizeof(uint32_t) + nonErrorSerializedSize();
Andres Morales6c9fe692015-02-23 10:44:41 -080059 } else {
60 return sizeof(uint32_t);
61 }
62}
63
64uint8_t *KeyguardMessage::Serialize() const {
Andres Moralesb2abaa82015-03-03 09:09:18 -080065 if (error != KG_ERROR_OK) {
Andres Morales6c9fe692015-02-23 10:44:41 -080066 uint32_t *error_buf = new uint32_t;
Andres Moralesb2abaa82015-03-03 09:09:18 -080067 *error_buf = static_cast<uint32_t>(error);
Andres Morales6c9fe692015-02-23 10:44:41 -080068 return reinterpret_cast<uint8_t *>(error_buf);
69 } else {
Andres Moralesac808182015-02-26 14:11:04 -080070 uint8_t *buf = new uint8_t[2*sizeof(uint32_t) + nonErrorSerializedSize()];
Andres Moralesb2abaa82015-03-03 09:09:18 -080071 uint32_t error_value = static_cast<uint32_t>(error);
Andres Morales6c9fe692015-02-23 10:44:41 -080072 memcpy(buf, &error_value, sizeof(uint32_t));
Andres Moralesb2abaa82015-03-03 09:09:18 -080073 memcpy(buf + sizeof(uint32_t), &user_id, sizeof(user_id));
Andres Moralesac808182015-02-26 14:11:04 -080074 nonErrorSerialize(buf + 2*sizeof(uint32_t));
Andres Morales6c9fe692015-02-23 10:44:41 -080075 return buf;
76 }
77}
78
79keyguard_error_t KeyguardMessage::Deserialize(const uint8_t *payload, const uint8_t *end) {
80 uint32_t error_value;
81 if (payload + sizeof(uint32_t) > end) return KG_ERROR_INVALID;
82 memcpy(&error_value, payload, sizeof(uint32_t));
Andres Moralesb2abaa82015-03-03 09:09:18 -080083 error = static_cast<keyguard_error_t>(error_value);
Andres Moralesac808182015-02-26 14:11:04 -080084 payload += sizeof(uint32_t);
Andres Moralesb2abaa82015-03-03 09:09:18 -080085 if (error == KG_ERROR_OK) {
Andres Moralesac808182015-02-26 14:11:04 -080086 if (payload == end) return KG_ERROR_INVALID;
Andres Moralesb2abaa82015-03-03 09:09:18 -080087 user_id = *((uint32_t *) payload);
88 error = nonErrorDeserialize(payload + sizeof(uint32_t), end);
Andres Morales6c9fe692015-02-23 10:44:41 -080089 }
90
Andres Moralesb2abaa82015-03-03 09:09:18 -080091 return error;
Andres Morales6c9fe692015-02-23 10:44:41 -080092}
93
94
Andres Moralesac808182015-02-26 14:11:04 -080095VerifyRequest::VerifyRequest(uint32_t user_id, SizedBuffer *enrolled_password_handle,
Andres Morales6c9fe692015-02-23 10:44:41 -080096 SizedBuffer *provided_password_payload) {
Andres Moralesb2abaa82015-03-03 09:09:18 -080097 this->user_id = user_id;
98 this->password_handle.buffer.reset(enrolled_password_handle->buffer.release());
99 this->password_handle.length = enrolled_password_handle->length;
100 this->provided_password.buffer.reset(provided_password_payload->buffer.release());
101 this->provided_password.length = provided_password_payload->length;
Andres Morales6c9fe692015-02-23 10:44:41 -0800102}
103
104VerifyRequest::VerifyRequest() {
Andres Moralesb2abaa82015-03-03 09:09:18 -0800105 memset_s(&password_handle, 0, sizeof(password_handle));
106 memset_s(&provided_password, 0, sizeof(provided_password));
Andres Morales6c9fe692015-02-23 10:44:41 -0800107}
108
109VerifyRequest::~VerifyRequest() {
Andres Moralesb2abaa82015-03-03 09:09:18 -0800110 if (password_handle.buffer.get()) {
111 password_handle.buffer.reset();
Andres Morales6c9fe692015-02-23 10:44:41 -0800112 }
113
Andres Moralesb2abaa82015-03-03 09:09:18 -0800114 if (provided_password.buffer.get()) {
115 memset_s(provided_password.buffer.get(), 0, provided_password.length);
116 provided_password.buffer.reset();
Andres Morales6c9fe692015-02-23 10:44:41 -0800117 }
118}
119
120size_t VerifyRequest::nonErrorSerializedSize() const {
Andres Moralesb2abaa82015-03-03 09:09:18 -0800121 return serialized_buffer_size(password_handle) + serialized_buffer_size(provided_password);
Andres Morales6c9fe692015-02-23 10:44:41 -0800122}
123
124void VerifyRequest::nonErrorSerialize(uint8_t *buffer) const {
Andres Moralesb2abaa82015-03-03 09:09:18 -0800125 append_to_buffer(&buffer, &password_handle);
126 append_to_buffer(&buffer, &provided_password);
Andres Morales6c9fe692015-02-23 10:44:41 -0800127}
128
129keyguard_error_t VerifyRequest::nonErrorDeserialize(const uint8_t *payload, const uint8_t *end) {
130 keyguard_error_t error = KG_ERROR_OK;
131
Andres Moralesb2abaa82015-03-03 09:09:18 -0800132 if (password_handle.buffer.get()) {
133 password_handle.buffer.reset();
Andres Morales6c9fe692015-02-23 10:44:41 -0800134 }
135
Andres Moralesb2abaa82015-03-03 09:09:18 -0800136 if (provided_password.buffer.get()) {
137 memset_s(provided_password.buffer.get(), 0, provided_password.length);
138 provided_password.buffer.reset();
Andres Morales6c9fe692015-02-23 10:44:41 -0800139 }
140
Andres Moralesb2abaa82015-03-03 09:09:18 -0800141 error = read_from_buffer(&payload, end, &password_handle);
Andres Morales6c9fe692015-02-23 10:44:41 -0800142 if (error != KG_ERROR_OK) return error;
143
Andres Moralesb2abaa82015-03-03 09:09:18 -0800144 return read_from_buffer(&payload, end, &provided_password);
Andres Morales6c9fe692015-02-23 10:44:41 -0800145
146}
147
Andres Moralesac808182015-02-26 14:11:04 -0800148VerifyResponse::VerifyResponse(uint32_t user_id, SizedBuffer *verification_token) {
Andres Moralesb2abaa82015-03-03 09:09:18 -0800149 this->user_id = user_id;
150 this->verification_token.buffer.reset(verification_token->buffer.release());
151 this->verification_token.length = verification_token->length;
Andres Morales6c9fe692015-02-23 10:44:41 -0800152}
153
154VerifyResponse::VerifyResponse() {
Andres Moralesb2abaa82015-03-03 09:09:18 -0800155 memset_s(&verification_token, 0, sizeof(verification_token));
Andres Morales6c9fe692015-02-23 10:44:41 -0800156};
157
158VerifyResponse::~VerifyResponse() {
Andres Moralesb2abaa82015-03-03 09:09:18 -0800159 if (verification_token.length > 0) {
160 verification_token.buffer.reset();
Andres Morales6c9fe692015-02-23 10:44:41 -0800161 }
162}
163
Andres Moralesac808182015-02-26 14:11:04 -0800164void VerifyResponse::SetVerificationToken(SizedBuffer *verification_token) {
Andres Moralesb2abaa82015-03-03 09:09:18 -0800165 this->verification_token.buffer.reset(verification_token->buffer.release());
166 this->verification_token.length = verification_token->length;
Andres Moralesac808182015-02-26 14:11:04 -0800167}
168
Andres Morales6c9fe692015-02-23 10:44:41 -0800169size_t VerifyResponse::nonErrorSerializedSize() const {
Andres Moralesb2abaa82015-03-03 09:09:18 -0800170 return serialized_buffer_size(verification_token);
Andres Morales6c9fe692015-02-23 10:44:41 -0800171}
172
173void VerifyResponse::nonErrorSerialize(uint8_t *buffer) const {
Andres Moralesb2abaa82015-03-03 09:09:18 -0800174 append_to_buffer(&buffer, &verification_token);
Andres Morales6c9fe692015-02-23 10:44:41 -0800175}
176
177keyguard_error_t VerifyResponse::nonErrorDeserialize(const uint8_t *payload, const uint8_t *end) {
Andres Moralesb2abaa82015-03-03 09:09:18 -0800178 if (verification_token.buffer.get()) {
179 verification_token.buffer.reset();
Andres Morales6c9fe692015-02-23 10:44:41 -0800180 }
181
Andres Moralesb2abaa82015-03-03 09:09:18 -0800182 return read_from_buffer(&payload, end, &verification_token);
Andres Morales6c9fe692015-02-23 10:44:41 -0800183}
184
Andres Moralesac808182015-02-26 14:11:04 -0800185EnrollRequest::EnrollRequest(uint32_t user_id, SizedBuffer *provided_password) {
Andres Moralesb2abaa82015-03-03 09:09:18 -0800186 this->user_id = user_id;
187 this->provided_password.buffer.reset(provided_password->buffer.release());
188 this->provided_password.length = provided_password->length;
Andres Morales6c9fe692015-02-23 10:44:41 -0800189}
190
191EnrollRequest::EnrollRequest() {
Andres Moralesb2abaa82015-03-03 09:09:18 -0800192 memset_s(&provided_password, 0, sizeof(provided_password));
Andres Morales6c9fe692015-02-23 10:44:41 -0800193}
194
195EnrollRequest::~EnrollRequest() {
Andres Moralesb2abaa82015-03-03 09:09:18 -0800196 if (provided_password.buffer.get()) {
197 memset_s(provided_password.buffer.get(), 0, provided_password.length);
198 provided_password.buffer.reset();
Andres Morales6c9fe692015-02-23 10:44:41 -0800199 }
200}
201
202size_t EnrollRequest::nonErrorSerializedSize() const {
Andres Moralesb2abaa82015-03-03 09:09:18 -0800203 return serialized_buffer_size(provided_password);
Andres Morales6c9fe692015-02-23 10:44:41 -0800204}
205
206void EnrollRequest::nonErrorSerialize(uint8_t *buffer) const {
Andres Moralesb2abaa82015-03-03 09:09:18 -0800207 append_to_buffer(&buffer, &provided_password);
Andres Morales6c9fe692015-02-23 10:44:41 -0800208}
209
210keyguard_error_t EnrollRequest::nonErrorDeserialize(const uint8_t *payload, const uint8_t *end) {
Andres Moralesb2abaa82015-03-03 09:09:18 -0800211 if (provided_password.buffer.get()) {
212 memset_s(provided_password.buffer.get(), 0, provided_password.length);
213 provided_password.buffer.reset();
Andres Morales6c9fe692015-02-23 10:44:41 -0800214 }
215
Andres Moralesb2abaa82015-03-03 09:09:18 -0800216 return read_from_buffer(&payload, end, &provided_password);
Andres Morales6c9fe692015-02-23 10:44:41 -0800217}
218
Andres Moralesac808182015-02-26 14:11:04 -0800219EnrollResponse::EnrollResponse(uint32_t user_id, SizedBuffer *enrolled_password_handle) {
Andres Moralesb2abaa82015-03-03 09:09:18 -0800220 this->user_id = user_id;
221 this->enrolled_password_handle.buffer.reset(enrolled_password_handle->buffer.release());
222 this->enrolled_password_handle.length = enrolled_password_handle->length;
Andres Morales6c9fe692015-02-23 10:44:41 -0800223}
224
225EnrollResponse::EnrollResponse() {
Andres Moralesb2abaa82015-03-03 09:09:18 -0800226 memset_s(&enrolled_password_handle, 0, sizeof(enrolled_password_handle));
Andres Morales6c9fe692015-02-23 10:44:41 -0800227}
228
229EnrollResponse::~EnrollResponse() {
Andres Moralesb2abaa82015-03-03 09:09:18 -0800230 if (enrolled_password_handle.buffer.get()) {
231 enrolled_password_handle.buffer.reset();
Andres Morales6c9fe692015-02-23 10:44:41 -0800232 }
233}
234
Andres Moralesac808182015-02-26 14:11:04 -0800235void EnrollResponse::SetEnrolledPasswordHandle(SizedBuffer *enrolled_password_handle) {
Andres Moralesb2abaa82015-03-03 09:09:18 -0800236 this->enrolled_password_handle.buffer.reset(enrolled_password_handle->buffer.release());
237 this->enrolled_password_handle.length = enrolled_password_handle->length;
Andres Moralesac808182015-02-26 14:11:04 -0800238}
239
Andres Morales6c9fe692015-02-23 10:44:41 -0800240size_t EnrollResponse::nonErrorSerializedSize() const {
Andres Moralesb2abaa82015-03-03 09:09:18 -0800241 return serialized_buffer_size(enrolled_password_handle);
Andres Morales6c9fe692015-02-23 10:44:41 -0800242}
243
244void EnrollResponse::nonErrorSerialize(uint8_t *buffer) const {
Andres Moralesb2abaa82015-03-03 09:09:18 -0800245 append_to_buffer(&buffer, &enrolled_password_handle);
Andres Morales6c9fe692015-02-23 10:44:41 -0800246}
247
248keyguard_error_t EnrollResponse::nonErrorDeserialize(const uint8_t *payload, const uint8_t *end) {
Andres Moralesb2abaa82015-03-03 09:09:18 -0800249 if (enrolled_password_handle.buffer.get()) {
250 enrolled_password_handle.buffer.reset();
Andres Morales6c9fe692015-02-23 10:44:41 -0800251 }
252
Andres Moralesb2abaa82015-03-03 09:09:18 -0800253 return read_from_buffer(&payload, end, &enrolled_password_handle);
Andres Morales6c9fe692015-02-23 10:44:41 -0800254}
255
256};
257