1
0
mirror of https://github.com/profanity-im/profanity.git synced 2024-11-03 19:37:16 -05:00
profanity/src/omemo/store.c

472 lines
15 KiB
C
Raw Normal View History

2019-06-17 04:47:56 -04:00
/*
* store.c
2019-11-13 06:11:05 -05:00
* vim: expandtab:ts=4:sts=4:sw=4
2019-06-17 04:47:56 -04:00
*
* Copyright (C) 2019 Paul Fariello <paul@fariello.eu>
*
* This file is part of Profanity.
*
* Profanity is free software: you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation, either version 3 of the License, or
* (at your option) any later version.
*
* Profanity is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with Profanity. If not, see <https://www.gnu.org/licenses/>.
*
* In addition, as a special exception, the copyright holders give permission to
* link the code of portions of this program with the OpenSSL library under
* certain conditions as described in each individual source file, and
* distribute linked combinations including the two.
*
* You must obey the GNU General Public License in all respects for all of the
* code used other than OpenSSL. If you modify file(s) with this exception, you
* may extend this exception to your version of the file(s), but you are not
* obligated to do so. If you do not wish to do so, delete this exception
* statement from your version. If you delete this exception statement from all
* source files in the program, then also delete it here.
*
*/
#include <glib.h>
#include <signal/signal_protocol.h>
#include "config.h"
#include "log.h"
2019-03-07 01:20:29 -05:00
#include "omemo/omemo.h"
#include "omemo/store.h"
2020-07-07 08:18:57 -04:00
static void _g_hash_table_free(GHashTable* hash_table);
2019-07-10 06:27:28 -04:00
2020-07-07 08:18:57 -04:00
GHashTable*
session_store_new(void)
{
2019-07-10 06:27:28 -04:00
return g_hash_table_new_full(g_str_hash, g_str_equal, free, (GDestroyNotify)_g_hash_table_free);
}
2020-07-07 08:18:57 -04:00
GHashTable*
pre_key_store_new(void)
{
return g_hash_table_new_full(g_direct_hash, g_direct_equal, NULL, (GDestroyNotify)signal_buffer_free);
}
2020-07-07 08:18:57 -04:00
GHashTable*
signed_pre_key_store_new(void)
{
return g_hash_table_new_full(g_direct_hash, g_direct_equal, NULL, (GDestroyNotify)signal_buffer_free);
}
void
2020-07-07 08:18:57 -04:00
identity_key_store_new(identity_key_store_t* identity_key_store)
{
identity_key_store->trusted = g_hash_table_new_full(g_str_hash, g_str_equal, free, (GDestroyNotify)signal_buffer_free);
identity_key_store->private = NULL;
identity_key_store->public = NULL;
}
#ifdef HAVE_LIBSIGNAL_LT_2_3_2
int
2020-07-07 08:18:57 -04:00
load_session(signal_buffer** record, const signal_protocol_address* address,
void* user_data)
#else
int
2020-07-07 08:18:57 -04:00
load_session(signal_buffer** record, signal_buffer** user_record,
const signal_protocol_address* address, void* user_data)
#endif
{
2020-07-07 08:18:57 -04:00
GHashTable* session_store = (GHashTable*)user_data;
GHashTable* device_store = NULL;
log_debug("[OMEMO][STORE] Looking for %s in session_store", address->name);
device_store = g_hash_table_lookup(session_store, address->name);
if (!device_store) {
*record = NULL;
2021-06-28 14:02:22 -04:00
log_info("[OMEMO][STORE] No device store for %s found", address->name);
return 0;
}
log_debug("[OMEMO][STORE] Looking for device %d of %s ", address->device_id, address->name);
2020-07-07 08:18:57 -04:00
signal_buffer* original = g_hash_table_lookup(device_store, GINT_TO_POINTER(address->device_id));
if (!original) {
*record = NULL;
log_warning("[OMEMO][STORE] No device (%d) store for %s found", address->device_id, address->name);
return 0;
}
*record = signal_buffer_copy(original);
return 1;
}
int
2020-07-07 08:18:57 -04:00
get_sub_device_sessions(signal_int_list** sessions, const char* name,
size_t name_len, void* user_data)
{
2020-07-07 08:18:57 -04:00
GHashTable* session_store = (GHashTable*)user_data;
GHashTable* device_store = NULL;
GHashTableIter iter;
gpointer key, value;
device_store = g_hash_table_lookup(session_store, name);
if (!device_store) {
log_debug("[OMEMO][STORE] What?");
return SG_SUCCESS;
}
*sessions = signal_int_list_alloc();
g_hash_table_iter_init(&iter, device_store);
while (g_hash_table_iter_next(&iter, &key, &value)) {
signal_int_list_push_back(*sessions, GPOINTER_TO_INT(key));
}
return SG_SUCCESS;
}
#ifdef HAVE_LIBSIGNAL_LT_2_3_2
int
2020-07-07 08:18:57 -04:00
store_session(const signal_protocol_address* address, uint8_t* record,
size_t record_len, void* user_data)
#else
int
2020-07-07 08:18:57 -04:00
store_session(const signal_protocol_address* address,
uint8_t* record, size_t record_len,
uint8_t* user_record, size_t user_record_len,
void* user_data)
#endif
{
2020-07-07 08:18:57 -04:00
GHashTable* session_store = (GHashTable*)user_data;
GHashTable* device_store = NULL;
log_debug("[OMEMO][STORE] Store session for %s (%d)", address->name, address->device_id);
2020-07-07 08:18:57 -04:00
device_store = g_hash_table_lookup(session_store, (void*)address->name);
if (!device_store) {
device_store = g_hash_table_new_full(g_direct_hash, g_direct_equal, NULL, (GDestroyNotify)signal_buffer_free);
g_hash_table_insert(session_store, strdup(address->name), device_store);
}
2020-07-07 08:18:57 -04:00
signal_buffer* buffer = signal_buffer_create(record, record_len);
g_hash_table_insert(device_store, GINT_TO_POINTER(address->device_id), buffer);
2019-03-07 01:20:29 -05:00
2020-07-07 08:18:57 -04:00
char* record_b64 = g_base64_encode(record, record_len);
char* device_id = g_strdup_printf("%d", address->device_id);
2019-03-21 19:03:16 -04:00
g_key_file_set_string(omemo_sessions_keyfile(), address->name, device_id, record_b64);
free(device_id);
g_free(record_b64);
2019-03-07 01:20:29 -05:00
omemo_sessions_keyfile_save();
return SG_SUCCESS;
}
int
2020-07-07 08:18:57 -04:00
contains_session(const signal_protocol_address* address, void* user_data)
{
2020-07-07 08:18:57 -04:00
GHashTable* session_store = (GHashTable*)user_data;
GHashTable* device_store = NULL;
device_store = g_hash_table_lookup(session_store, address->name);
if (!device_store) {
log_debug("[OMEMO][STORE] No Device");
return 0;
}
if (!g_hash_table_lookup(device_store, GINT_TO_POINTER(address->device_id))) {
log_debug("[OMEMO][STORE] No Session for %d ", address->device_id);
return 0;
}
return 1;
}
int
2020-07-07 08:18:57 -04:00
delete_session(const signal_protocol_address* address, void* user_data)
{
2020-07-07 08:18:57 -04:00
GHashTable* session_store = (GHashTable*)user_data;
GHashTable* device_store = NULL;
device_store = g_hash_table_lookup(session_store, address->name);
if (!device_store) {
return SG_SUCCESS;
}
g_hash_table_remove(device_store, GINT_TO_POINTER(address->device_id));
2020-07-07 08:18:57 -04:00
char* device_id_str = g_strdup_printf("%d", address->device_id);
g_key_file_remove_key(omemo_sessions_keyfile(), address->name, device_id_str, NULL);
g_free(device_id_str);
omemo_sessions_keyfile_save();
return SG_SUCCESS;
}
int
2020-07-07 08:18:57 -04:00
delete_all_sessions(const char* name, size_t name_len, void* user_data)
{
2020-07-07 08:18:57 -04:00
GHashTable* session_store = (GHashTable*)user_data;
GHashTable* device_store = NULL;
device_store = g_hash_table_lookup(session_store, name);
if (!device_store) {
log_debug("[OMEMO][STORE] No device => no delete");
return SG_SUCCESS;
}
guint len = g_hash_table_size(device_store);
g_hash_table_remove_all(device_store);
return len;
}
int
2020-07-07 08:18:57 -04:00
load_pre_key(signal_buffer** record, uint32_t pre_key_id, void* user_data)
{
2020-07-07 08:18:57 -04:00
signal_buffer* original;
GHashTable* pre_key_store = (GHashTable*)user_data;
original = g_hash_table_lookup(pre_key_store, GINT_TO_POINTER(pre_key_id));
if (original == NULL) {
log_error("[OMEMO][STORE] SG_ERR_INVALID_KEY_ID");
return SG_ERR_INVALID_KEY_ID;
}
*record = signal_buffer_copy(original);
return SG_SUCCESS;
}
int
2020-07-07 08:18:57 -04:00
store_pre_key(uint32_t pre_key_id, uint8_t* record, size_t record_len,
void* user_data)
{
2020-07-07 08:18:57 -04:00
GHashTable* pre_key_store = (GHashTable*)user_data;
2020-07-07 08:18:57 -04:00
signal_buffer* buffer = signal_buffer_create(record, record_len);
g_hash_table_insert(pre_key_store, GINT_TO_POINTER(pre_key_id), buffer);
2019-04-01 07:00:19 -04:00
/* Long term storage */
2020-07-07 08:18:57 -04:00
char* pre_key_id_str = g_strdup_printf("%d", pre_key_id);
char* record_b64 = g_base64_encode(record, record_len);
2019-04-01 07:00:19 -04:00
g_key_file_set_string(omemo_identity_keyfile(), OMEMO_STORE_GROUP_PREKEYS, pre_key_id_str, record_b64);
g_free(pre_key_id_str);
g_free(record_b64);
omemo_identity_keyfile_save();
return SG_SUCCESS;
}
int
2020-07-07 08:18:57 -04:00
contains_pre_key(uint32_t pre_key_id, void* user_data)
{
2020-07-07 08:18:57 -04:00
GHashTable* pre_key_store = (GHashTable*)user_data;
return g_hash_table_lookup(pre_key_store, GINT_TO_POINTER(pre_key_id)) != NULL;
}
int
2020-07-07 08:18:57 -04:00
remove_pre_key(uint32_t pre_key_id, void* user_data)
{
2020-07-07 08:18:57 -04:00
GHashTable* pre_key_store = (GHashTable*)user_data;
2019-04-01 07:00:19 -04:00
int ret = g_hash_table_remove(pre_key_store, GINT_TO_POINTER(pre_key_id));
/* Long term storage */
2020-07-07 08:18:57 -04:00
char* pre_key_id_str = g_strdup_printf("%d", pre_key_id);
2019-04-01 07:00:19 -04:00
g_key_file_remove_key(omemo_identity_keyfile(), OMEMO_STORE_GROUP_PREKEYS, pre_key_id_str, NULL);
g_free(pre_key_id_str);
omemo_identity_keyfile_save();
if (ret > 0) {
return SG_SUCCESS;
} else {
log_error("[OMEMO][STORE] SG_ERR_INVALID_KEY_ID");
return SG_ERR_INVALID_KEY_ID;
}
}
int
2020-07-07 08:18:57 -04:00
load_signed_pre_key(signal_buffer** record, uint32_t signed_pre_key_id,
void* user_data)
{
2020-07-07 08:18:57 -04:00
signal_buffer* original;
GHashTable* signed_pre_key_store = (GHashTable*)user_data;
original = g_hash_table_lookup(signed_pre_key_store, GINT_TO_POINTER(signed_pre_key_id));
if (!original) {
log_error("[OMEMO][STORE] SG_ERR_INVALID_KEY_ID");
return SG_ERR_INVALID_KEY_ID;
}
*record = signal_buffer_copy(original);
return SG_SUCCESS;
}
int
2020-07-07 08:18:57 -04:00
store_signed_pre_key(uint32_t signed_pre_key_id, uint8_t* record,
size_t record_len, void* user_data)
{
2020-07-07 08:18:57 -04:00
GHashTable* signed_pre_key_store = (GHashTable*)user_data;
2020-07-07 08:18:57 -04:00
signal_buffer* buffer = signal_buffer_create(record, record_len);
g_hash_table_insert(signed_pre_key_store, GINT_TO_POINTER(signed_pre_key_id), buffer);
2019-04-01 07:00:19 -04:00
/* Long term storage */
2020-07-07 08:18:57 -04:00
char* signed_pre_key_id_str = g_strdup_printf("%d", signed_pre_key_id);
char* record_b64 = g_base64_encode(record, record_len);
2019-04-01 07:00:19 -04:00
g_key_file_set_string(omemo_identity_keyfile(), OMEMO_STORE_GROUP_SIGNED_PREKEYS, signed_pre_key_id_str, record_b64);
g_free(signed_pre_key_id_str);
g_free(record_b64);
omemo_identity_keyfile_save();
return SG_SUCCESS;
}
int
2020-07-07 08:18:57 -04:00
contains_signed_pre_key(uint32_t signed_pre_key_id, void* user_data)
{
2020-07-07 08:18:57 -04:00
GHashTable* signed_pre_key_store = (GHashTable*)user_data;
return g_hash_table_lookup(signed_pre_key_store, GINT_TO_POINTER(signed_pre_key_id)) != NULL;
}
int
2020-07-07 08:18:57 -04:00
remove_signed_pre_key(uint32_t signed_pre_key_id, void* user_data)
{
2020-07-07 08:18:57 -04:00
GHashTable* signed_pre_key_store = (GHashTable*)user_data;
2019-04-01 07:00:19 -04:00
int ret = g_hash_table_remove(signed_pre_key_store, GINT_TO_POINTER(signed_pre_key_id));
/* Long term storage */
2020-07-07 08:18:57 -04:00
char* signed_pre_key_id_str = g_strdup_printf("%d", signed_pre_key_id);
2019-04-01 07:00:19 -04:00
g_key_file_remove_key(omemo_identity_keyfile(), OMEMO_STORE_GROUP_PREKEYS, signed_pre_key_id_str, NULL);
g_free(signed_pre_key_id_str);
omemo_identity_keyfile_save();
return ret;
}
int
2020-07-07 08:18:57 -04:00
get_identity_key_pair(signal_buffer** public_data, signal_buffer** private_data,
void* user_data)
{
2020-07-07 08:18:57 -04:00
identity_key_store_t* identity_key_store = (identity_key_store_t*)user_data;
*public_data = signal_buffer_copy(identity_key_store->public);
*private_data = signal_buffer_copy(identity_key_store->private);
return SG_SUCCESS;
}
int
2020-07-07 08:18:57 -04:00
get_local_registration_id(void* user_data, uint32_t* registration_id)
{
2020-07-07 08:18:57 -04:00
identity_key_store_t* identity_key_store = (identity_key_store_t*)user_data;
*registration_id = identity_key_store->registration_id;
return SG_SUCCESS;
}
int
2020-07-07 08:18:57 -04:00
save_identity(const signal_protocol_address* address, uint8_t* key_data,
size_t key_len, void* user_data)
{
2020-07-07 08:18:57 -04:00
identity_key_store_t* identity_key_store = (identity_key_store_t*)user_data;
if (identity_key_store->recv) {
/* Do not trust identity automatically */
/* Instead we perform a real trust check */
identity_key_store->recv = false;
int trusted = is_trusted_identity(address, key_data, key_len, user_data);
identity_key_store->recv = true;
if (trusted == 0) {
log_debug("[OMEMO][STORE] trusted 0");
/* If not trusted we just don't save the identity */
return SG_SUCCESS;
}
}
2020-07-07 08:18:57 -04:00
signal_buffer* buffer = signal_buffer_create(key_data, key_len);
2020-07-07 08:18:57 -04:00
GHashTable* trusted = g_hash_table_lookup(identity_key_store->trusted, address->name);
if (!trusted) {
trusted = g_hash_table_new_full(g_direct_hash, g_direct_equal, NULL, (GDestroyNotify)signal_buffer_free);
g_hash_table_insert(identity_key_store->trusted, strdup(address->name), trusted);
}
g_hash_table_insert(trusted, GINT_TO_POINTER(address->device_id), buffer);
2019-04-01 07:00:19 -04:00
/* Long term storage */
2020-07-07 08:18:57 -04:00
char* key_b64 = g_base64_encode(key_data, key_len);
char* device_id = g_strdup_printf("%d", address->device_id);
g_key_file_set_string(omemo_trust_keyfile(), address->name, device_id, key_b64);
g_free(device_id);
2019-03-21 19:03:16 -04:00
g_free(key_b64);
omemo_trust_keyfile_save();
return SG_SUCCESS;
}
int
2020-07-07 08:18:57 -04:00
is_trusted_identity(const signal_protocol_address* address, uint8_t* key_data,
size_t key_len, void* user_data)
{
2019-03-21 19:03:16 -04:00
int ret;
2020-07-07 08:18:57 -04:00
identity_key_store_t* identity_key_store = (identity_key_store_t*)user_data;
log_debug("[OMEMO][STORE] Checking trust %s (%d)", address->name, address->device_id);
2020-07-07 08:18:57 -04:00
GHashTable* trusted = g_hash_table_lookup(identity_key_store->trusted, address->name);
if (!trusted) {
if (identity_key_store->recv) {
log_debug("[OMEMO][STORE] identity_key_store->recv");
return 1;
} else {
log_debug("[OMEMO][STORE] !identity_key_store->recv");
return 0;
}
}
2020-07-07 08:18:57 -04:00
signal_buffer* buffer = signal_buffer_create(key_data, key_len);
signal_buffer* original = g_hash_table_lookup(trusted, GINT_TO_POINTER(address->device_id));
if(!original) {
log_debug("[OMEMO][STORE] original not found %s (%d)", address->name, address->device_id);
}
2019-03-21 19:03:16 -04:00
ret = original != NULL && signal_buffer_compare(buffer, original) == 0;
signal_buffer_free(buffer);
if (identity_key_store->recv) {
log_debug("[OMEMO][STORE] 1 identity_key_store->recv");
return 1;
} else {
log_debug("[OMEMO][STORE] Checking trust %s (%d): %d", address->name, address->device_id, ret);
return ret;
}
}
int
2020-07-07 08:18:57 -04:00
store_sender_key(const signal_protocol_sender_key_name* sender_key_name,
uint8_t* record, size_t record_len, uint8_t* user_record,
size_t user_record_len, void* user_data)
{
return SG_SUCCESS;
}
int
2020-07-07 08:18:57 -04:00
load_sender_key(signal_buffer** record, signal_buffer** user_record,
const signal_protocol_sender_key_name* sender_key_name,
void* user_data)
{
return SG_SUCCESS;
}
2019-07-10 06:27:28 -04:00
static void
2020-07-07 08:18:57 -04:00
_g_hash_table_free(GHashTable* hash_table)
2019-07-10 06:27:28 -04:00
{
g_hash_table_remove_all(hash_table);
g_hash_table_unref(hash_table);
}