bb081d28da
* refactor service requests from service header * add APDU size checking and length feature * add unit tests to check for length when passing NULL buffer --------- Co-authored-by: Steve Karg <skarg@users.sourceforge.net>
184 lines
5.5 KiB
C
184 lines
5.5 KiB
C
/**************************************************************************
|
|
*
|
|
* Copyright (C) 2015 Nikola Jelic <nikola.jelic@euroicc.com>
|
|
*
|
|
* Permission is hereby granted, free of charge, to any person obtaining
|
|
* a copy of this software and associated documentation files (the
|
|
* "Software"), to deal in the Software without restriction, including
|
|
* without limitation the rights to use, copy, modify, merge, publish,
|
|
* distribute, sublicense, and/or sell copies of the Software, and to
|
|
* permit persons to whom the Software is furnished to do so, subject to
|
|
* the following conditions:
|
|
*
|
|
* The above copyright notice and this permission notice shall be included
|
|
* in all copies or substantial portions of the Software.
|
|
*
|
|
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
|
|
* EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
|
|
* MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.
|
|
* IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY
|
|
* CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT,
|
|
* TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE
|
|
* SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
|
|
*
|
|
*********************************************************************/
|
|
#include <stdint.h>
|
|
#include "bacnet/authentication_factor.h"
|
|
#include "bacnet/bacdcode.h"
|
|
|
|
/**
|
|
* @brief Encode the BACnetAuthenticationFactor complex data
|
|
* @param apdu Pointer to the buffer for encoding into, or NULL for length
|
|
* @param data Pointer used for encoding the value
|
|
* @return number of bytes encoded, or zero if unable to encode
|
|
*/
|
|
int bacapp_encode_authentication_factor(
|
|
uint8_t *apdu, BACNET_AUTHENTICATION_FACTOR *af)
|
|
{
|
|
int len;
|
|
int apdu_len = 0;
|
|
|
|
len = encode_context_enumerated(apdu, 0, af->format_type);
|
|
if (len < 0) {
|
|
return -1;
|
|
} else {
|
|
apdu_len += len;
|
|
if (apdu) {
|
|
apdu += len;
|
|
}
|
|
}
|
|
len = encode_context_unsigned(apdu, 1, af->format_class);
|
|
if (len < 0) {
|
|
return -1;
|
|
} else {
|
|
apdu_len += len;
|
|
if (apdu) {
|
|
apdu += len;
|
|
}
|
|
}
|
|
len = encode_context_octet_string(apdu, 2, &af->value);
|
|
if (len < 0) {
|
|
return -1;
|
|
} else {
|
|
apdu_len += len;
|
|
}
|
|
|
|
return apdu_len;
|
|
}
|
|
|
|
/**
|
|
* @brief Encode the BACnetAuthenticationFactor context tagged complex data
|
|
* @param apdu Pointer to the buffer for encoding into, or NULL for length
|
|
* @param data Pointer used for encoding the value
|
|
* @return number of bytes encoded, or zero if unable to encode
|
|
*/
|
|
int bacapp_encode_context_authentication_factor(
|
|
uint8_t *apdu, uint8_t tag, BACNET_AUTHENTICATION_FACTOR *af)
|
|
{
|
|
int len;
|
|
int apdu_len = 0;
|
|
|
|
len = encode_opening_tag(apdu, tag);
|
|
apdu_len += len;
|
|
if (apdu) {
|
|
apdu += len;
|
|
}
|
|
len = bacapp_encode_authentication_factor(apdu, af);
|
|
apdu_len += len;
|
|
if (apdu) {
|
|
apdu += len;
|
|
}
|
|
len = encode_closing_tag(apdu, tag);
|
|
apdu_len += len;
|
|
|
|
return apdu_len;
|
|
}
|
|
|
|
/**
|
|
* @brief Decode the BACnetAuthenticationFactor complex data
|
|
* @param apdu Pointer to the buffer for decoding.
|
|
* @param af Pointer to the property decoded data to be stored
|
|
* @return Bytes decoded or BACNET_STATUS_REJECT on error.
|
|
*/
|
|
int bacapp_decode_authentication_factor(
|
|
uint8_t *apdu, BACNET_AUTHENTICATION_FACTOR *af)
|
|
{
|
|
int len;
|
|
int apdu_len = 0;
|
|
uint32_t format_type = af->format_type;
|
|
BACNET_UNSIGNED_INTEGER unsigned_value = 0;
|
|
|
|
if (decode_is_context_tag(&apdu[apdu_len], 0)) {
|
|
len = decode_context_enumerated(&apdu[apdu_len], 0, &format_type);
|
|
if (len < 0) {
|
|
return -1;
|
|
} else if (format_type < AUTHENTICATION_FACTOR_MAX) {
|
|
apdu_len += len;
|
|
af->format_type = (BACNET_AUTHENTICATION_FACTOR_TYPE)format_type;
|
|
} else {
|
|
/* FIXME: Maybe this should return BACNET_STATUS_REJECT */
|
|
return -1;
|
|
}
|
|
} else {
|
|
return -1;
|
|
}
|
|
|
|
if (decode_is_context_tag(&apdu[apdu_len], 1)) {
|
|
len = decode_context_unsigned(&apdu[apdu_len], 1, &unsigned_value);
|
|
if (len < 0) {
|
|
return -1;
|
|
} else {
|
|
af->format_class = unsigned_value;
|
|
apdu_len += len;
|
|
}
|
|
} else {
|
|
return -1;
|
|
}
|
|
|
|
if (decode_is_context_tag(&apdu[apdu_len], 2)) {
|
|
len = decode_context_octet_string(&apdu[apdu_len], 2, &af->value);
|
|
if (len < 0) {
|
|
return -1;
|
|
} else {
|
|
apdu_len += len;
|
|
}
|
|
} else {
|
|
return -1;
|
|
}
|
|
|
|
return apdu_len;
|
|
}
|
|
|
|
/**
|
|
* @brief Decode the context tagged BACnetAuthenticationFactor complex data
|
|
* @param apdu Pointer to the buffer for decoding.
|
|
* @param tag context tag number wrapping the complex data
|
|
* @param af Pointer to the property decoded data to be stored
|
|
* @return Bytes decoded or BACNET_STATUS_REJECT on error.
|
|
*/
|
|
int bacapp_decode_context_authentication_factor(
|
|
uint8_t *apdu, uint8_t tag, BACNET_AUTHENTICATION_FACTOR *af)
|
|
{
|
|
int len = 0;
|
|
int section_length;
|
|
|
|
if (decode_is_opening_tag_number(&apdu[len], tag)) {
|
|
len++;
|
|
section_length = bacapp_decode_authentication_factor(&apdu[len], af);
|
|
|
|
if (section_length == -1) {
|
|
len = -1;
|
|
} else {
|
|
len += section_length;
|
|
if (decode_is_closing_tag_number(&apdu[len], tag)) {
|
|
len++;
|
|
} else {
|
|
len = -1;
|
|
}
|
|
}
|
|
} else {
|
|
len = -1;
|
|
}
|
|
return len;
|
|
}
|