This repository has been archived by the owner on Jan 23, 2024. It is now read-only.
forked from google/token_bind
-
-
Notifications
You must be signed in to change notification settings - Fork 3
/
token_bind_client.c
103 lines (94 loc) · 4 KB
/
token_bind_client.c
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
/* Copyright 2016 Google Inc. All Rights Reserved.
Author: [email protected] (Bill Cox)
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License. */
#include "token_bind_client.h"
#include <stdlib.h>
#include "tb_bytestring.h"
/* Add a token binding to the token binding message. */
static bool buildTokenBinding(tbCBB* message_contents,
uint8_t token_binding_type,
const uint8_t* tokbind_id, size_t tokbind_id_len,
const uint8_t* signature, size_t signature_len) {
if (tokbind_id == NULL || tokbind_id_len == 0) {
return false;
}
tbCBB sig_cbb;
if (!tbCBB_add_u8(message_contents, token_binding_type) ||
!tbCBB_add_bytes(message_contents, tokbind_id, tokbind_id_len) ||
!tbCBB_add_u16_length_prefixed(message_contents, &sig_cbb) ||
!tbCBB_add_bytes(&sig_cbb, signature, signature_len) ||
/* No extensions, so just add u16 zero. */
!tbCBB_add_u16(message_contents, 0) ||
!tbCBB_flush(message_contents)) {
return false;
}
return true;
}
bool tbBuildTokenBindingMessage(const uint8_t* tokbind_id,
size_t tokbind_id_len, const uint8_t* signature,
size_t signature_len, uint8_t** out_message,
size_t* out_message_len) {
tbCBB tokbind_message, message_contents;
if (!tbCBB_init(&tokbind_message, 0) || out_message == NULL ||
out_message_len == NULL ||
!tbCBB_add_u16_length_prefixed(&tokbind_message, &message_contents) ||
!buildTokenBinding(&message_contents, TB_PROVIDED, tokbind_id,
tokbind_id_len, signature, signature_len) ||
!tbCBB_finish(&tokbind_message, out_message, out_message_len)) {
tbCBB_cleanup(&tokbind_message);
return false;
}
return true;
}
bool tbBuildReferredTokenBindingMessage(
const uint8_t* tokbind_id, size_t tokbind_id_len, const uint8_t* signature,
size_t signature_len, const uint8_t* referred_tokbind_id,
size_t referred_tokbind_id_len, const uint8_t* referred_signature,
size_t referred_signature_len, uint8_t** out_message,
size_t* out_message_len) {
tbCBB tokbind_message, message_contents;
if (!tbCBB_init(&tokbind_message, 0) || out_message == NULL ||
out_message_len == NULL ||
!tbCBB_add_u16_length_prefixed(&tokbind_message, &message_contents) ||
!buildTokenBinding(&message_contents, TB_PROVIDED, tokbind_id,
tokbind_id_len, signature, signature_len) ||
!buildTokenBinding(&message_contents, TB_REFERRED, referred_tokbind_id,
referred_tokbind_id_len, referred_signature,
referred_signature_len) ||
!tbCBB_finish(&tokbind_message, out_message, out_message_len)) {
tbCBB_cleanup(&tokbind_message);
return false;
}
return true;
}
bool tbEncodeKey(tbKeyType key_type, const EVP_PKEY* key,
uint8_t** out_tokbind_id, size_t* out_tokbind_id_len) {
int key_len = i2d_PublicKey((EVP_PKEY*)key, NULL);
if (key_len < 1) {
return false;
}
uint8_t* buf = malloc(key_len * sizeof(uint8_t));
if (buf == NULL) {
return false;
}
uint8_t* bufp = buf;
if (i2d_PublicKey((EVP_PKEY*)key, &bufp) != key_len) {
free(buf);
return false; /* Should never happen. */
}
if (!tbConvertDerKeyToTokenBindingID(buf, key_len, key_type, out_tokbind_id,
out_tokbind_id_len)) {
free(buf);
return false;
}
free(buf);
return true;
}