1 /*
2 * Copyright (C) 2021 Huawei Device Co., Ltd.
3 * Licensed under the Apache License, Version 2.0 (the "License");
4 * you may not use this file except in compliance with the License.
5 * You may obtain a copy of the License at
6 *
7 * http://www.apache.org/licenses/LICENSE-2.0
8 *
9 * Unless required by applicable law or agreed to in writing, software
10 * distributed under the License is distributed on an "AS IS" BASIS,
11 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 * See the License for the specific language governing permissions and
13 * limitations under the License.
14 */
15
16 #include "pake_v1_client_protocol_task.h"
17 #include "das_task_common.h"
18 #include "hc_log.h"
19 #include "hc_types.h"
20 #include "pake_message_util.h"
21 #include "pake_v1_protocol_common.h"
22 #include "pake_v1_protocol_task_common.h"
23 #include "pake_task_common.h"
24
25 enum {
26 TASK_STATUS_CLIENT_PAKE_BEGIN = 0,
27 TASK_STATUS_CLIENT_PAKE_REQUEST,
28 TASK_STATUS_CLIENT_PAKE_CONFIRM,
29 TASK_STATUS_CLIENT_PAKE_VERIFY_CONFIRM,
30 };
31
GetTaskType(void)32 static CurTaskType GetTaskType(void)
33 {
34 return TASK_TYPE_PAKE_V1_PROTOCOL;
35 }
36
DestroyPakeV1ProtocolClientTask(struct AsyBaseCurTaskT * task)37 static void DestroyPakeV1ProtocolClientTask(struct AsyBaseCurTaskT *task)
38 {
39 HcFree(task);
40 }
41
PakeRequest(AsyBaseCurTask * task,PakeParams * params,CJson * out,int * status)42 static int PakeRequest(AsyBaseCurTask *task, PakeParams *params, CJson *out, int *status)
43 {
44 if (task->taskStatus != TASK_STATUS_CLIENT_PAKE_BEGIN) {
45 LOGI("The message is repeated, ignore it, status: %d", task->taskStatus);
46 *status = IGNORE_MSG;
47 return HC_SUCCESS;
48 }
49
50 int res = ConstructOutJson(params, out);
51 if (res != HC_SUCCESS) {
52 LOGE("ConstructOutJson failed, res: %d.", res);
53 return res;
54 }
55 CJson *payload = GetObjFromJson(out, FIELD_PAYLOAD);
56 if (payload == NULL) {
57 LOGE("Get payload from json failed.");
58 return HC_ERR_JSON_GET;
59 }
60 res = PackagePakeRequestData(params, payload);
61 if (res != HC_SUCCESS) {
62 LOGE("PackagePakeRequestData failed, res: %d.", res);
63 return res;
64 }
65 // package differentiated data
66 if (params->opCode == AUTHENTICATE || params->opCode == OP_UNBIND) {
67 if (params->opCode == AUTHENTICATE && params->isPseudonym) {
68 res = AddPseudonymIdAndChallenge(params, payload);
69 } else {
70 res = AddByteToJson(payload, FIELD_PEER_AUTH_ID, params->baseParams.idSelf.val,
71 params->baseParams.idSelf.length);
72 }
73 if (res != HC_SUCCESS) {
74 LOGE("Add idSelf failed, res: %d.", res);
75 return res;
76 }
77 }
78 if (params->opCode == AUTHENTICATE || params->opCode == OP_UNBIND || params->opCode == AUTH_KEY_AGREEMENT) {
79 res = AddIntToJson(payload, FIELD_KEY_LENGTH, params->returnKey.length);
80 if (res != HC_SUCCESS) {
81 LOGE("Add keyLength failed, res: %d.", res);
82 return res;
83 }
84 }
85
86 task->taskStatus = TASK_STATUS_CLIENT_PAKE_REQUEST;
87 *status = CONTINUE;
88 return res;
89 }
90
ParseMsgForClientConfirm(PakeParams * params,const CJson * in)91 static int ParseMsgForClientConfirm(PakeParams *params, const CJson *in)
92 {
93 int res = ParsePakeResponseMessage(params, in);
94 if (res != HC_SUCCESS) {
95 LOGE("ParsePakeResponseMessage failed, res: %d.", res);
96 return res;
97 }
98 // parse differentiated data
99 res = GetByteFromJson(in, FIELD_CHALLENGE, params->baseParams.challengePeer.val,
100 params->baseParams.challengePeer.length);
101 if (res != HC_SUCCESS) {
102 LOGE("Get challengePeer failed, res: %d.", res);
103 return res;
104 }
105 if (params->opCode == AUTHENTICATE || params->opCode == OP_UNBIND) {
106 if (params->opCode == AUTHENTICATE && params->isPseudonym) {
107 res = CheckPseudonymId(params, in);
108 } else {
109 res = GetAndCheckAuthIdPeer(in, &(params->baseParams.idSelf), &(params->baseParams.idPeer));
110 }
111 if (res != HC_SUCCESS) {
112 LOGE("GetAndCheckAuthIdPeer failed, res: %d.", res);
113 return res;
114 }
115 }
116 return res;
117 }
118
PackageMsgForClientConfirm(PakeParams * params,CJson * out)119 static int PackageMsgForClientConfirm(PakeParams *params, CJson *out)
120 {
121 int res = ConstructOutJson(params, out);
122 if (res != HC_SUCCESS) {
123 LOGE("ConstructOutJson failed, res: %d.", res);
124 return res;
125 }
126 CJson *payload = GetObjFromJson(out, FIELD_PAYLOAD);
127 if (payload == NULL) {
128 LOGE("Get payload from json failed.");
129 return HC_ERR_JSON_GET;
130 }
131 res = PackagePakeClientConfirmData(params, payload);
132 if (res != HC_SUCCESS) {
133 LOGE("PackagePakeClientConfirmData failed, res: %d.", res);
134 return res;
135 }
136 // differentiated data
137 res = AddByteToJson(payload, FIELD_CHALLENGE, params->baseParams.challengeSelf.val,
138 params->baseParams.challengeSelf.length);
139 if (res != HC_SUCCESS) {
140 LOGE("Add challengeSelf failed, res: %d.", res);
141 return res;
142 }
143 return res;
144 }
145
PakeClientConfirm(AsyBaseCurTask * task,PakeParams * params,const CJson * in,CJson * out,int * status)146 static int PakeClientConfirm(AsyBaseCurTask *task, PakeParams *params, const CJson *in, CJson *out, int *status)
147 {
148 int res;
149 if (task->taskStatus < TASK_STATUS_CLIENT_PAKE_REQUEST) {
150 LOGE("Invalid taskStatus: %d", task->taskStatus);
151 return HC_ERR_BAD_MESSAGE;
152 }
153 if (task->taskStatus > TASK_STATUS_CLIENT_PAKE_REQUEST) {
154 LOGI("The message is repeated, ignore it, status: %d", task->taskStatus);
155 *status = IGNORE_MSG;
156 return HC_SUCCESS;
157 }
158
159 res = ParseMsgForClientConfirm(params, in);
160 if (res != HC_SUCCESS) {
161 LOGE("ParseMsgForClientConfirm failed, res: %d.", res);
162 return res;
163 }
164 if (params->isPskSupported && (params->opCode == AUTHENTICATE || params->opCode == OP_UNBIND)) {
165 res = FillPskWithDerivedKeyHex(params);
166 if (res != HC_SUCCESS) {
167 LOGE("FillPskWithDerivedKeyHex failed, res: %x.", res);
168 return res;
169 }
170 }
171
172 // execute
173 res = ClientConfirmPakeV1Protocol(&(params->baseParams));
174 if (res != HC_SUCCESS) {
175 LOGE("ClientConfirmPakeV1Protocol failed, res:%d", res);
176 return res;
177 }
178
179 res = PackageMsgForClientConfirm(params, out);
180 if (res != HC_SUCCESS) {
181 LOGE("PackageMsgForClientConfirm failed, res: %d.", res);
182 return res;
183 }
184
185 task->taskStatus = TASK_STATUS_CLIENT_PAKE_CONFIRM;
186 *status = CONTINUE;
187 return res;
188 }
189
PakeClientVerifyConfirm(AsyBaseCurTask * task,PakeParams * params,const CJson * in,int * status)190 static int PakeClientVerifyConfirm(AsyBaseCurTask *task, PakeParams *params, const CJson *in, int *status)
191 {
192 if (task->taskStatus < TASK_STATUS_CLIENT_PAKE_CONFIRM) {
193 LOGE("Invalid taskStatus: %d", task->taskStatus);
194 return HC_ERR_BAD_MESSAGE;
195 }
196 if (task->taskStatus > TASK_STATUS_CLIENT_PAKE_CONFIRM) {
197 LOGI("The message is repeated, ignore it, status: %d", task->taskStatus);
198 *status = IGNORE_MSG;
199 return HC_SUCCESS;
200 }
201
202 // parse message
203 int res = ParsePakeServerConfirmMessage(params, in);
204 if (res != HC_SUCCESS) {
205 LOGE("ParsePakeServerConfirmMessage failed, res: %d.", res);
206 return res;
207 }
208
209 // execute
210 res = ClientVerifyConfirmPakeV1Protocol(¶ms->baseParams);
211 if (res != HC_SUCCESS) {
212 LOGE("ClientVerifyConfirmPakeV1Protocol failed, res: %d.", res);
213 return res;
214 }
215
216 task->taskStatus = TASK_STATUS_CLIENT_PAKE_VERIFY_CONFIRM;
217 *status = FINISH;
218 return res;
219 }
220
Process(struct AsyBaseCurTaskT * task,PakeParams * params,const CJson * in,CJson * out,int * status)221 static int Process(struct AsyBaseCurTaskT *task, PakeParams *params, const CJson *in, CJson *out, int *status)
222 {
223 int res = HC_SUCCESS;
224 uint32_t step = ProtocolMessageIn(in);
225 if (step == INVALID_MESSAGE) {
226 res = PakeRequest(task, params, out, status);
227 step = 1;
228 goto OUT;
229 }
230
231 step = step + 1; /* when receive peer message code, need to do next step */
232 switch (step) {
233 case STEP_TWO:
234 res = PakeClientConfirm(task, params, in, out, status);
235 break;
236 case STEP_THREE:
237 res = PakeClientVerifyConfirm(task, params, in, status);
238 break;
239 default:
240 res = HC_ERR_BAD_MESSAGE;
241 break;
242 }
243 OUT:
244 if (res != HC_SUCCESS) {
245 LOGE("Process step:%d failed, res: %x.", step, res);
246 return res;
247 }
248 if (step != STEP_THREE) {
249 res = ClientProtocolMessageOut(out, params->opCode, step);
250 if (res != HC_SUCCESS) {
251 LOGE("ClientProtocolMessageOut failed, res: %x.", res);
252 }
253 }
254 return res;
255 }
256
CreatePakeV1ProtocolClientTask(void)257 AsyBaseCurTask *CreatePakeV1ProtocolClientTask(void)
258 {
259 PakeV1ProtocolClientTask *task = (PakeV1ProtocolClientTask *)HcMalloc(sizeof(PakeV1ProtocolClientTask), 0);
260 if (task == NULL) {
261 LOGE("Malloc for PakeV1ProtocolClientTask failed.");
262 return NULL;
263 }
264 task->taskBase.destroyTask = DestroyPakeV1ProtocolClientTask;
265 task->taskBase.process = Process;
266 task->taskBase.taskStatus = TASK_STATUS_CLIENT_PAKE_BEGIN;
267 task->taskBase.getCurTaskType = GetTaskType;
268 return (AsyBaseCurTask *)task;
269 }