mirror of
https://github.com/servalproject/serval-dna.git
synced 2024-12-18 12:56:29 +00:00
c3cf86161f
Correct the maximum DID length defined in "serval_types.h" from 32 to 31. Add a definition of the maximum identity Name length and use it instead of the bare constant 64, eg, in the MDP_DNALOOKUP request handling code. Introduce a dataformats.h function for validating an identity name, and use it to validate the 'name' parameter in the CLI 'keyring set' command. Add 'did' and 'name' parameter validation to the GET /restful/keyring/add and GET /restful/keyring/SID/set requests (#131). Rename keyring_set_did() to keyring_set_did_name() and assert that DID and Name lengths have been validated before storing in the keyring. Update the Keyring REST API tech document.
358 lines
8.3 KiB
C
358 lines
8.3 KiB
C
/*
|
|
Serval DNA data interchange formats
|
|
Copyright (C) 2010-2013 Serval Project Inc.
|
|
|
|
This program is free software; you can redistribute it and/or
|
|
modify it under the terms of the GNU General Public License
|
|
as published by the Free Software Foundation; either version 2
|
|
of the License, or (at your option) any later version.
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU General Public License for more details.
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
along with this program; if not, write to the Free Software
|
|
Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
|
|
*/
|
|
|
|
#define __RHIZOME_TYPES_INLINE
|
|
#include <ctype.h>
|
|
#include "serval_types.h"
|
|
#include "rhizome_types.h"
|
|
#include "os.h"
|
|
#include "str.h"
|
|
#include "dataformats.h"
|
|
|
|
int cmp_sid_t(const sid_t *a, const sid_t *b)
|
|
{
|
|
return memcmp(a, b, sizeof a->binary);
|
|
}
|
|
|
|
int cmp_identity_t(const identity_t *a, const identity_t *b)
|
|
{
|
|
return memcmp(a, b, sizeof a->binary);
|
|
}
|
|
|
|
int str_to_sid_t(sid_t *sidp, const char *hex)
|
|
{
|
|
return parse_sid_t(sidp, hex, -1, NULL); // checks for nul terminator
|
|
}
|
|
|
|
int strn_to_sid_t(sid_t *sidp, const char *hex, size_t hexlen)
|
|
{
|
|
return parse_sid_t(sidp, hex, hexlen, NULL); // does not check for nul terminator
|
|
}
|
|
|
|
int parse_sid_t(sid_t *sidp, const char *hex, ssize_t hexlen, const char **endp)
|
|
{
|
|
const char *end = NULL;
|
|
if (strn_startswith(hex, hexlen, "broadcast", &end)) {
|
|
if (endp)
|
|
*endp = end;
|
|
else if (hexlen == -1 && *end != '\0')
|
|
return -1;
|
|
if (sidp)
|
|
*sidp = SID_BROADCAST;
|
|
return 0;
|
|
}
|
|
if (hexlen != -1 && hexlen != SID_STRLEN)
|
|
return -1;
|
|
sid_t tmp;
|
|
int n = fromhex(tmp.binary, hex, sizeof tmp.binary);
|
|
if (n != sizeof tmp.binary)
|
|
return -1;
|
|
if (endp)
|
|
*endp = hex + SID_STRLEN;
|
|
else if (hexlen == -1 && hex[SID_STRLEN] != '\0')
|
|
return -1;
|
|
if (sidp)
|
|
*sidp = tmp;
|
|
return 0;
|
|
}
|
|
|
|
int sid_get_special_type(const sid_t *sid)
|
|
{
|
|
if (is_all_matching(sid->binary, SID_SIZE -1, 0))
|
|
return sid->binary[SID_SIZE -1];
|
|
if (is_all_matching(sid->binary, SID_SIZE, 0xFF))
|
|
return SID_TYPE_BROADCAST;
|
|
return -1;
|
|
}
|
|
|
|
int str_is_subscriber_id(const char *sid)
|
|
{
|
|
size_t len = 0;
|
|
return strn_is_subscriber_id(sid, &len) && sid[len] == '\0';
|
|
}
|
|
|
|
int strn_is_subscriber_id(const char *sid, size_t *lenp)
|
|
{
|
|
if (strncasecmp(sid, "broadcast", 9) == 0) {
|
|
if (lenp)
|
|
*lenp = 9;
|
|
return 1;
|
|
}
|
|
if (is_xsubstring(sid, SID_STRLEN)) {
|
|
if (lenp)
|
|
*lenp = SID_STRLEN;
|
|
return 1;
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
int str_is_identity(const char *id)
|
|
{
|
|
return is_xstring(id, IDENTITY_STRLEN);
|
|
}
|
|
|
|
int strn_is_identity(const char *id, size_t *lenp)
|
|
{
|
|
if (is_xsubstring(id, IDENTITY_STRLEN)){
|
|
if (lenp)
|
|
*lenp = SID_STRLEN;
|
|
return 1;
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
int str_to_identity_t(identity_t *idp, const char *hex)
|
|
{
|
|
return parse_hex_t(idp, hex);
|
|
}
|
|
|
|
int strn_to_identity_t(identity_t *idp, const char *hex, const char **endp)
|
|
{
|
|
if (strn_fromhex(idp->binary, sizeof *idp, hex, endp)==sizeof *idp)
|
|
return 0;
|
|
return -1;
|
|
}
|
|
|
|
|
|
int cmp_rhizome_bid_t(const rhizome_bid_t *a, const rhizome_bid_t *b)
|
|
{
|
|
return memcmp(a, b, sizeof a->binary);
|
|
}
|
|
|
|
int str_to_rhizome_bid_t(rhizome_bid_t *bid, const char *hex)
|
|
{
|
|
return parse_rhizome_bid_t(bid, hex, -1, NULL); // checks for nul terminator
|
|
}
|
|
|
|
int strn_to_rhizome_bid_t(rhizome_bid_t *bid, const char *hex, size_t hexlen)
|
|
{
|
|
return parse_rhizome_bid_t(bid, hex, hexlen, NULL); // does not check for nul terminator
|
|
}
|
|
|
|
int parse_rhizome_bid_t(rhizome_bid_t *bid, const char *hex, ssize_t hexlen, const char **endp)
|
|
{
|
|
if (hexlen != -1 && hexlen != RHIZOME_BUNDLE_ID_STRLEN)
|
|
return -1;
|
|
rhizome_bid_t tmp;
|
|
int n = fromhex(tmp.binary, hex, sizeof tmp.binary);
|
|
if (n != sizeof tmp.binary)
|
|
return -1;
|
|
if (endp)
|
|
*endp = hex + RHIZOME_BUNDLE_ID_STRLEN;
|
|
else if (hexlen == -1 && hex[RHIZOME_BUNDLE_ID_STRLEN] != '\0')
|
|
return -1;
|
|
if (bid)
|
|
*bid = tmp;
|
|
return 0;
|
|
}
|
|
|
|
int cmp_rhizome_filehash_t(const rhizome_filehash_t *a, const rhizome_filehash_t *b)
|
|
{
|
|
return memcmp(a, b, sizeof a->binary);
|
|
}
|
|
|
|
int str_to_rhizome_filehash_t(rhizome_filehash_t *hashp, const char *hex)
|
|
{
|
|
return parse_hex_t(hashp, hex);
|
|
}
|
|
|
|
int strn_to_rhizome_filehash_t(rhizome_filehash_t *hashp, const char *hex, size_t hexlen)
|
|
{
|
|
const char *endp;
|
|
return parse_hexn_t(hashp, hex, hexlen, &endp);
|
|
}
|
|
|
|
int rhizome_is_bk_none(const rhizome_bk_t *bk) {
|
|
return is_all_matching(bk->binary, sizeof bk->binary, 0);
|
|
}
|
|
|
|
int str_to_rhizome_bk_t(rhizome_bk_t *bkp, const char *hex)
|
|
{
|
|
return parse_rhizome_bk_t(bkp, hex, -1, NULL); // checks for nul terminator
|
|
}
|
|
|
|
int strn_to_rhizome_bk_t(rhizome_bk_t *bkp, const char *hex, size_t hexlen)
|
|
{
|
|
return parse_rhizome_bk_t(bkp, hex, hexlen, NULL); // does not check for nul terminator
|
|
}
|
|
|
|
int parse_rhizome_bk_t(rhizome_bk_t *bkp, const char *hex, ssize_t hexlen, const char **endp)
|
|
{
|
|
if (hexlen != -1 && hexlen != RHIZOME_BUNDLE_KEY_STRLEN)
|
|
return -1;
|
|
rhizome_bk_t tmp;
|
|
int n = fromhex(tmp.binary, hex, sizeof tmp.binary);
|
|
if (n != sizeof tmp.binary)
|
|
return -1;
|
|
if (endp)
|
|
*endp = hex + RHIZOME_BUNDLE_KEY_STRLEN;
|
|
else if (hexlen == -1 && hex[RHIZOME_BUNDLE_KEY_STRLEN] != '\0')
|
|
return -1;
|
|
if (bkp)
|
|
*bkp = tmp;
|
|
return 0;
|
|
}
|
|
|
|
int str_to_rhizome_bsk_t(rhizome_bk_t *bskp, const char *text)
|
|
{
|
|
return strn_to_rhizome_bsk_t(bskp, text, strlen(text));
|
|
}
|
|
|
|
int strn_to_rhizome_bsk_t(rhizome_bk_t *bskp, const char *text, size_t textlen)
|
|
{
|
|
if (textlen > 0 && text[0] == '#') {
|
|
if (textlen <= 1)
|
|
return -1; // missing pass phrase
|
|
if (textlen > RHIZOME_BUNDLE_SECRET_MAX_STRLEN + 1)
|
|
return -1; // pass phrase too long
|
|
if (bskp)
|
|
strn_digest_passphrase(bskp->binary, sizeof bskp->binary, text, textlen);
|
|
return 0;
|
|
}
|
|
return strn_to_rhizome_bk_t(bskp, text, textlen);
|
|
}
|
|
|
|
int rhizome_strn_is_bundle_crypt_key(const char *key)
|
|
{
|
|
return is_xsubstring(key, RHIZOME_CRYPT_KEY_STRLEN);
|
|
}
|
|
|
|
int rhizome_str_is_bundle_crypt_key(const char *key)
|
|
{
|
|
return is_xstring(key, RHIZOME_CRYPT_KEY_STRLEN);
|
|
}
|
|
|
|
int rhizome_str_is_manifest_service(const char *text)
|
|
{
|
|
if (text[0] == '\0')
|
|
return 0;
|
|
while (*text && (isalnum(*text) || *text == '_' || *text == '.'))
|
|
++text;
|
|
return *text == '\0';
|
|
}
|
|
|
|
/* A name cannot contain a LF because that is the Rhizome text manifest field terminator. For the
|
|
* time being, CR is not allowed either, because the Rhizome field terminator includes an optional
|
|
* CR. See rhizome_manifest_parse().
|
|
*
|
|
* @author Andrew Bettison <andrew@servalproject.com>
|
|
*/
|
|
int rhizome_str_is_manifest_name(const char *text)
|
|
{
|
|
while (*text && *text != '\n' && *text != '\r')
|
|
++text;
|
|
return *text == '\0';
|
|
}
|
|
|
|
int str_is_did(const char *did)
|
|
{
|
|
size_t len = 0;
|
|
return strn_is_did(did, &len) && did[len] == '\0';
|
|
}
|
|
|
|
int is_didchar(char c)
|
|
{
|
|
return isdigit(c) || c == '*' || c == '#' || c == '+';
|
|
}
|
|
|
|
int strn_is_did(const char *did, size_t *lenp)
|
|
{
|
|
size_t i;
|
|
for (i = 0; i < DID_MAXSIZE && is_didchar(did[i]); ++i)
|
|
;
|
|
if (i < DID_MINSIZE)
|
|
return 0;
|
|
if (lenp)
|
|
*lenp = i;
|
|
return 1;
|
|
}
|
|
|
|
int str_is_identity_name(const char *name)
|
|
{
|
|
size_t len = 0;
|
|
return strn_is_identity_name(name, &len) && name[len] == '\0';
|
|
}
|
|
|
|
int strn_is_identity_name(const char *name, size_t *lenp)
|
|
{
|
|
size_t i;
|
|
for (i = 0; i < ID_NAME_MAXSIZE && name[i]; ++i)
|
|
;
|
|
if (i < ID_NAME_MINSIZE)
|
|
return 0;
|
|
if (lenp)
|
|
*lenp = i;
|
|
return 1;
|
|
}
|
|
|
|
void write_uint64(unsigned char *o,uint64_t v)
|
|
{
|
|
int i;
|
|
for(i=0;i<8;i++)
|
|
{ *(o++)=v&0xff; v=v>>8; }
|
|
}
|
|
|
|
void write_uint32(unsigned char *o,uint32_t v)
|
|
{
|
|
int i;
|
|
for(i=0;i<4;i++)
|
|
{ *(o++)=v&0xff; v=v>>8; }
|
|
}
|
|
|
|
void write_uint16(unsigned char *o,uint16_t v)
|
|
{
|
|
int i;
|
|
for(i=0;i<2;i++)
|
|
{ *(o++)=v&0xff; v=v>>8; }
|
|
}
|
|
|
|
uint64_t read_uint64(const unsigned char *o)
|
|
{
|
|
int i;
|
|
uint64_t v=0;
|
|
for(i=0;i<8;i++) v=(v<<8)|o[8-1-i];
|
|
return v;
|
|
}
|
|
|
|
uint32_t read_uint32(const unsigned char *o)
|
|
{
|
|
int i;
|
|
uint32_t v=0;
|
|
for(i=0;i<4;i++) v=(v<<8)|o[4-1-i];
|
|
return v;
|
|
}
|
|
|
|
uint16_t read_uint16(const unsigned char *o)
|
|
{
|
|
int i;
|
|
uint16_t v=0;
|
|
for(i=0;i<2;i++) v=(v<<8)|o[2-1-i];
|
|
return v;
|
|
}
|
|
|
|
int compare_wrapped_uint8(uint8_t one, uint8_t two)
|
|
{
|
|
return (int8_t)(one - two);
|
|
}
|
|
|
|
int compare_wrapped_uint16(uint16_t one, uint16_t two)
|
|
{
|
|
return (int16_t)(one - two);
|
|
}
|