stevenwdv 2022-03-31 20:57:32 +09:00 zatwierdzone przez GitHub
commit a62a09d6d4
Nie znaleziono w bazie danych klucza dla tego podpisu
ID klucza GPG: 4AEE18F83AFDEB23
1 zmienionych plików z 35 dodań i 12 usunięć

Wyświetl plik

@ -561,7 +561,7 @@ uint8_t ctap_parse_hmac_secret(CborValue * val, CTAP_hmac_secret * hs)
{
size_t map_length;
size_t salt_len;
uint8_t parsed_count = 0;
size_t cose_key_parsed = 0, salt_enc_parsed = 0, salt_auth_parsed = 0;
int key;
int ret;
unsigned int i;
@ -595,26 +595,42 @@ uint8_t ctap_parse_hmac_secret(CborValue * val, CTAP_hmac_secret * hs)
switch(key)
{
case EXT_HMAC_SECRET_COSE_KEY:
++cose_key_parsed;
ret = parse_cose_key(&map, &hs->keyAgreement);
check_retr(ret);
parsed_count++;
break;
case EXT_HMAC_SECRET_SALT_ENC:
++salt_enc_parsed;
salt_len = 64;
ret = cbor_value_copy_byte_string(&map, hs->saltEnc, &salt_len, NULL);
if ((salt_len != 32 && salt_len != 64) || ret == CborErrorOutOfMemory)
if (cbor_value_get_type(&map) == CborByteStringType)
{
return CTAP1_ERR_INVALID_LENGTH;
ret = cbor_value_copy_byte_string(&map, hs->saltEnc, &salt_len, NULL);
if ((salt_len != 32 && salt_len != 64) || ret == CborErrorOutOfMemory)
{
return CTAP1_ERR_INVALID_LENGTH;
}
check_ret(ret);
}
else
{
printf2(TAG_ERR, "error, CborByteStringType expected\r\n");
return CTAP2_ERR_INVALID_CBOR_TYPE;
}
check_ret(ret);
hs->saltLen = salt_len;
parsed_count++;
break;
case EXT_HMAC_SECRET_SALT_AUTH:
++salt_auth_parsed;
salt_len = 32;
ret = cbor_value_copy_byte_string(&map, hs->saltAuth, &salt_len, NULL);
check_ret(ret);
parsed_count++;
if (cbor_value_get_type(&map) == CborByteStringType)
{
ret = cbor_value_copy_byte_string(&map, hs->saltAuth, &salt_len, NULL);
check_ret(ret);
}
else
{
printf2(TAG_ERR, "error, CborByteStringType expected\r\n");
return CTAP2_ERR_INVALID_CBOR_TYPE;
}
break;
}
@ -622,9 +638,16 @@ uint8_t ctap_parse_hmac_secret(CborValue * val, CTAP_hmac_secret * hs)
check_ret(ret);
}
if (parsed_count != 3)
if (cose_key_parsed > 1 || salt_enc_parsed > 1 || salt_auth_parsed > 1)
{
printf2(TAG_ERR, "ctap_parse_hmac_secret missing parameter. Got %d.\r\n", parsed_count);
printf2(TAG_ERR, "ctap_parse_hmac_secret duplicate key.\r\n");
return CTAP2_ERR_INVALID_CBOR;
}
if (!(cose_key_parsed && salt_enc_parsed && salt_auth_parsed))
{
printf2(TAG_ERR, "ctap_parse_hmac_secret missing parameter. Got %d.\r\n",
cose_key_parsed + salt_enc_parsed + salt_auth_parsed);
return CTAP2_ERR_MISSING_PARAMETER;
}