token_info.c 6.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207
  1. #include "token_info.h"
  2. #include <furi/core/check.h>
  3. #include <base32.h>
  4. #include <base64.h>
  5. #include <memset_s.h>
  6. #include "common.h"
  7. #include "../services/crypto/crypto_facade.h"
  8. TokenInfo* token_info_alloc() {
  9. TokenInfo* tokenInfo = malloc(sizeof(TokenInfo));
  10. furi_check(tokenInfo != NULL);
  11. tokenInfo->name = furi_string_alloc();
  12. token_info_set_defaults(tokenInfo);
  13. return tokenInfo;
  14. }
  15. void token_info_free(TokenInfo* token_info) {
  16. if(token_info == NULL) return;
  17. free(token_info->token);
  18. furi_string_free(token_info->name);
  19. free(token_info);
  20. }
  21. bool token_info_set_secret(
  22. TokenInfo* token_info,
  23. const char* plain_token_secret,
  24. size_t token_secret_length,
  25. PlainTokenSecretEncoding plain_token_secret_encoding,
  26. const CryptoSettings* crypto_settings) {
  27. if(token_secret_length == 0) return false;
  28. uint8_t* plain_secret;
  29. size_t plain_secret_length;
  30. size_t plain_secret_size;
  31. if(plain_token_secret_encoding == PlainTokenSecretEncodingBase32) {
  32. plain_secret_size = token_secret_length;
  33. plain_secret = malloc(plain_secret_size);
  34. furi_check(plain_secret != NULL);
  35. plain_secret_length =
  36. base32_decode((const uint8_t*)plain_token_secret, plain_secret, plain_secret_size);
  37. } else if(plain_token_secret_encoding == PlainTokenSecretEncodingBase64) {
  38. plain_secret_length = 0;
  39. plain_secret = base64_decode(
  40. (const uint8_t*)plain_token_secret,
  41. token_secret_length,
  42. &plain_secret_length,
  43. &plain_secret_size);
  44. furi_check(plain_secret != NULL);
  45. } else {
  46. return false;
  47. }
  48. bool result;
  49. if(plain_secret_length > 0) {
  50. if(token_info->token != NULL) {
  51. free(token_info->token);
  52. }
  53. token_info->token = totp_crypto_encrypt(
  54. plain_secret, plain_secret_length, crypto_settings, &token_info->token_length);
  55. result = true;
  56. } else {
  57. result = false;
  58. }
  59. memset_s(plain_secret, plain_secret_size, 0, plain_secret_size);
  60. free(plain_secret);
  61. return result;
  62. }
  63. bool token_info_set_digits_from_int(TokenInfo* token_info, uint8_t digits) {
  64. switch(digits) {
  65. case 5:
  66. token_info->digits = TokenDigitsCountFive;
  67. return true;
  68. case 6:
  69. token_info->digits = TokenDigitsCountSix;
  70. return true;
  71. case 8:
  72. token_info->digits = TokenDigitsCountEight;
  73. return true;
  74. default:
  75. break;
  76. }
  77. return false;
  78. }
  79. bool token_info_set_duration_from_int(TokenInfo* token_info, uint8_t duration) {
  80. #pragma GCC diagnostic push
  81. #pragma GCC diagnostic ignored "-Wtype-limits"
  82. if(duration >= TokenDurationMin && duration <= TokenDurationMax) { //-V560
  83. token_info->duration = duration;
  84. return true;
  85. }
  86. #pragma GCC diagnostic pop
  87. return false;
  88. }
  89. bool token_info_set_algo_from_str(TokenInfo* token_info, const FuriString* str) {
  90. if(furi_string_cmpi_str(str, TOKEN_HASH_ALGO_SHA1_NAME) == 0) {
  91. token_info->algo = TokenHashAlgoSha1;
  92. return true;
  93. }
  94. if(furi_string_cmpi_str(str, TOKEN_HASH_ALGO_SHA256_NAME) == 0) {
  95. token_info->algo = TokenHashAlgoSha256;
  96. return true;
  97. }
  98. if(furi_string_cmpi_str(str, TOKEN_HASH_ALGO_SHA512_NAME) == 0) {
  99. token_info->algo = TokenHashAlgoSha512;
  100. return true;
  101. }
  102. if(furi_string_cmpi_str(str, TOKEN_HASH_ALGO_STEAM_NAME) == 0) {
  103. token_info->algo = TokenHashAlgoSteam;
  104. return true;
  105. }
  106. return false;
  107. }
  108. bool token_info_set_algo_from_int(TokenInfo* token_info, uint8_t algo_code) {
  109. switch(algo_code) {
  110. case TokenHashAlgoSha1:
  111. token_info->algo = TokenHashAlgoSha1;
  112. break;
  113. case TokenHashAlgoSha256:
  114. token_info->algo = TokenHashAlgoSha256;
  115. break;
  116. case TokenHashAlgoSha512:
  117. token_info->algo = TokenHashAlgoSha512;
  118. break;
  119. case TokenHashAlgoSteam:
  120. token_info->algo = TokenHashAlgoSteam;
  121. break;
  122. default:
  123. return false;
  124. }
  125. return true;
  126. }
  127. const char* token_info_get_algo_as_cstr(const TokenInfo* token_info) {
  128. switch(token_info->algo) {
  129. case TokenHashAlgoSha1:
  130. return TOKEN_HASH_ALGO_SHA1_NAME;
  131. case TokenHashAlgoSha256:
  132. return TOKEN_HASH_ALGO_SHA256_NAME;
  133. case TokenHashAlgoSha512:
  134. return TOKEN_HASH_ALGO_SHA512_NAME;
  135. case TokenHashAlgoSteam:
  136. return TOKEN_HASH_ALGO_STEAM_NAME;
  137. default:
  138. break;
  139. }
  140. return NULL;
  141. }
  142. bool token_info_set_automation_feature_from_str(TokenInfo* token_info, const FuriString* str) {
  143. if(furi_string_cmpi_str(str, TOKEN_AUTOMATION_FEATURE_ENTER_AT_THE_END_NAME) == 0) {
  144. token_info->automation_features |= TokenAutomationFeatureEnterAtTheEnd;
  145. return true;
  146. }
  147. if(furi_string_cmpi_str(str, TOKEN_AUTOMATION_FEATURE_TAB_AT_THE_END_NAME) == 0) {
  148. token_info->automation_features |= TokenAutomationFeatureTabAtTheEnd;
  149. return true;
  150. }
  151. if(furi_string_cmpi_str(str, TOKEN_AUTOMATION_FEATURE_TYPE_SLOWER_NAME) == 0) {
  152. token_info->automation_features |= TokenAutomationFeatureTypeSlower;
  153. return true;
  154. }
  155. if(furi_string_cmpi_str(str, TOKEN_AUTOMATION_FEATURE_NONE_NAME) == 0) {
  156. token_info->automation_features = TokenAutomationFeatureNone;
  157. return true;
  158. }
  159. return false;
  160. }
  161. TokenInfo* token_info_clone(const TokenInfo* src) {
  162. TokenInfo* clone = token_info_alloc();
  163. memcpy(clone, src, sizeof(TokenInfo));
  164. clone->token = malloc(src->token_length);
  165. furi_check(clone->token != NULL);
  166. memcpy(clone->token, src->token, src->token_length);
  167. clone->name = furi_string_alloc();
  168. furi_string_set(clone->name, src->name);
  169. return clone;
  170. }
  171. void token_info_set_defaults(TokenInfo* token_info) {
  172. furi_check(token_info != NULL);
  173. token_info->algo = TokenHashAlgoDefault;
  174. token_info->digits = TokenDigitsCountDefault;
  175. token_info->duration = TokenDurationDefault;
  176. token_info->automation_features = TokenAutomationFeatureNone;
  177. furi_string_reset(token_info->name);
  178. }