src/pEp_internal.h
author Krista Bennett <krista@pep-project.org>
Wed, 18 Apr 2018 20:39:11 +0200
branchENGINE-423
changeset 2612 2c6bad8b4a69
parent 2593 0876c1a73ae1
child 2684 a5175dd76542
permissions -rw-r--r--
ENGINE-423: partial implementation of reencrypt functionality. Stashing changes to check another bug.
vb@1517
     1
// This file is under GNU General Public License 3.0
vb@1517
     2
// see LICENSE.txt
vb@1517
     3
krista@2150
     4
#define PEP_ENGINE_VERSION "0.9.0"
vb@908
     5
vb@908
     6
// maximum attachment size to import as key 1MB, maximum of 20 attachments
vb@908
     7
vb@908
     8
#define MAX_KEY_SIZE (1024 * 1024)
vb@908
     9
#define MAX_KEYS_TO_IMPORT  20
vb@24
    10
krista@2612
    11
#define KEY_EXPIRE_DELTA (60 * 60 * 24 * 365)
krista@2612
    12
vb@233
    13
// this is 20 trustwords with 79 chars max
vb@251
    14
#define MAX_TRUSTWORDS_SPACE (20 * 80)
vb@24
    15
vb@24
    16
// XML parameters string
vb@24
    17
#define PARMS_MAX 32768
vb@24
    18
vb@24
    19
// maximum busy wait time in ms
vb@24
    20
#define BUSY_WAIT_TIME 5000
vb@24
    21
vb@24
    22
// maximum line length for reading gpg.conf
vb@24
    23
#define MAX_LINELENGTH 1024
vb@24
    24
vb@24
    25
// default keyserver
vb@450
    26
#ifndef DEFAULT_KEYSERVER
vb@24
    27
#define DEFAULT_KEYSERVER "hkp://keys.gnupg.net"
vb@450
    28
#endif
vb@450
    29
vb@450
    30
// crashdump constants
vb@450
    31
#ifndef CRASHDUMP_DEFAULT_LINES
vb@450
    32
#define CRASHDUMP_DEFAULT_LINES 100
vb@450
    33
#endif
vb@450
    34
#define CRASHDUMP_MAX_LINES 32767
vb@24
    35
krista@2045
    36
// p≡p full string, NUL-terminated
krista@2045
    37
#ifndef PEP_SUBJ_STRING
krista@2045
    38
#define PEP_SUBJ_STRING {0x70,0xE2,0x89,0xA1,0x70,0x00}
krista@2045
    39
#define PEP_SUBJ_BYTELEN 5
krista@2045
    40
#endif
krista@2045
    41
krista@2078
    42
#ifndef PEP_SUBJ_KEY
krista@2078
    43
#define PEP_SUBJ_KEY "Subject: "
krista@2078
    44
#define PEP_SUBJ_KEY_LC "subject: "
krista@2078
    45
#define PEP_SUBJ_KEY_LEN 9
krista@2078
    46
#endif
krista@2078
    47
krista@2120
    48
#ifndef PEP_MSG_WRAP_KEY
krista@2120
    49
#define PEP_MSG_WRAP_KEY "pEp-Wrapped-Message-Info: "
krista@2120
    50
#define PEP_MSG_WRAP_KEY_LC "pep-wrapped-message-info: "
krista@2120
    51
#define PEP_MSG_WRAP_KEY_LEN 26
krista@2078
    52
#endif
krista@2078
    53
krista@2078
    54
vb@130
    55
#include "platform.h"
vb@130
    56
vb@24
    57
#ifdef WIN32
vb@24
    58
#define LOCAL_DB windoze_local_db()
vb@24
    59
#define SYSTEM_DB windoze_system_db()
vb@24
    60
#define LIBGPGME "libgpgme-11.dll"
vb@24
    61
#else // UNIX
vb@24
    62
#define _POSIX_C_SOURCE 200809L
vb@24
    63
#include <dlfcn.h>
vb@24
    64
#define LOCAL_DB unix_local_db()
vb@24
    65
#ifndef SYSTEM_DB
vb@24
    66
#define SYSTEM_DB "/usr/share/pEp/system.db"
vb@24
    67
#endif
vb@24
    68
#ifndef LIBGPGME
vb@24
    69
#define LIBGPGME "libgpgme-pthread.so"
vb@24
    70
#endif
vb@24
    71
#endif
vb@24
    72
vb@24
    73
#include <locale.h>
vb@24
    74
#include <stdlib.h>
vb@24
    75
#include <string.h>
vb@24
    76
#include <assert.h>
vb@24
    77
#include <stdio.h>
edouard@1521
    78
#include <ctype.h>
krista@2176
    79
#include <math.h>
vb@24
    80
damiano@1997
    81
#ifdef SQLITE3_FROM_OS
damiano@1997
    82
#include <sqlite3.h>
damiano@1997
    83
#else
vb@24
    84
#include "sqlite3.h"
damiano@1997
    85
#endif
vb@24
    86
vb@24
    87
#include "pEpEngine.h"
Edouard@168
    88
Edouard@168
    89
// If not specified, build for GPG
Edouard@168
    90
#ifndef USE_NETPGP
Edouard@168
    91
#ifndef USE_GPG
Edouard@168
    92
#define USE_GPG
Edouard@168
    93
#endif
Edouard@168
    94
#endif
Edouard@168
    95
Edouard@168
    96
#ifdef USE_GPG
vb@24
    97
#include "pgp_gpg_internal.h"
vb@229
    98
#elif defined(USE_NETPGP)
Edouard@168
    99
#include "pgp_netpgp_internal.h"
vb@24
   100
#endif
vb@24
   101
vb@292
   102
#include "keymanagement.h"
vb@28
   103
#include "cryptotech.h"
vb@28
   104
#include "transport.h"
krista@2271
   105
#include "sync.h"
vb@28
   106
vb@125
   107
#define NOT_IMPLEMENTED assert(0); return PEP_UNKNOWN_ERROR;
vb@24
   108
edouard@1603
   109
struct _pEpSession;
edouard@1603
   110
typedef struct _pEpSession pEpSession;
edouard@1603
   111
struct _pEpSession {
vb@24
   112
    const char *version;
Edouard@168
   113
#ifdef USE_GPG
vb@24
   114
    gpgme_ctx_t ctx;
vb@229
   115
#elif defined(USE_NETPGP)
Edouard@252
   116
    pEpNetPGPSession ctx;
vb@24
   117
#endif
vb@24
   118
vb@62
   119
    PEP_cryptotech_t *cryptotech;
vb@62
   120
    PEP_transport_t *transports;
vb@28
   121
vb@24
   122
    sqlite3 *db;
vb@24
   123
    sqlite3 *system_db;
vb@24
   124
vb@24
   125
    sqlite3_stmt *log;
vb@233
   126
    sqlite3_stmt *trustword;
vb@24
   127
    sqlite3_stmt *get_identity;
krista@2461
   128
    sqlite3_stmt *get_identity_without_trust_check;
krista@2461
   129
    sqlite3_stmt *get_identities_by_address;
krista@1799
   130
    sqlite3_stmt *replace_identities_fpr;
krista@2461
   131
    sqlite3_stmt *replace_main_user_fpr;
krista@2461
   132
    sqlite3_stmt *get_main_user_fpr;
krista@2461
   133
    sqlite3_stmt *refresh_userid_default_key;
krista@2461
   134
    sqlite3_stmt *remove_fpr_as_default;
vb@24
   135
    sqlite3_stmt *set_person;
krista@2480
   136
    sqlite3_stmt *update_person;
krista@2480
   137
    sqlite3_stmt *exists_person;    
krista@2468
   138
    sqlite3_stmt *set_as_pep_user;
krista@2468
   139
    sqlite3_stmt *is_pep_user;
edouard@1234
   140
    sqlite3_stmt *set_device_group;
edouard@1235
   141
    sqlite3_stmt *get_device_group;
vb@24
   142
    sqlite3_stmt *set_pgp_keypair;
krista@2478
   143
    sqlite3_stmt *set_identity_entry;
krista@2480
   144
    sqlite3_stmt *update_identity_entry;
krista@2480
   145
    sqlite3_stmt *exists_identity_entry;        
vb@932
   146
    sqlite3_stmt *set_identity_flags;
edouard@1394
   147
    sqlite3_stmt *unset_identity_flags;
vb@24
   148
    sqlite3_stmt *set_trust;
krista@2542
   149
    sqlite3_stmt *update_trust;
krista@2542
   150
    sqlite3_stmt *update_trust_to_pep;    
krista@2480
   151
    sqlite3_stmt *exists_trust_entry;
krista@1799
   152
    sqlite3_stmt *update_trust_for_fpr;
vb@24
   153
    sqlite3_stmt *get_trust;
vb@251
   154
    sqlite3_stmt *least_trust;
krista@2593
   155
    sqlite3_stmt *mark_compromised;
Edouard@409
   156
    sqlite3_stmt *reset_trust;
vb@450
   157
    sqlite3_stmt *crashdump;
vb@458
   158
    sqlite3_stmt *languagelist;
vb@458
   159
    sqlite3_stmt *i18n_token;
krista@2461
   160
    sqlite3_stmt *replace_userid;
fdik@494
   161
fdik@494
   162
    // blacklist
fdik@494
   163
    sqlite3_stmt *blacklist_add;
fdik@494
   164
    sqlite3_stmt *blacklist_delete;
fdik@494
   165
    sqlite3_stmt *blacklist_is_listed;
fdik@494
   166
    sqlite3_stmt *blacklist_retrieve;
Edouard@584
   167
    
Edouard@584
   168
    // Own keys
Edouard@584
   169
    sqlite3_stmt *own_key_is_listed;
vb@955
   170
    sqlite3_stmt *own_identities_retrieve;
edouard@1394
   171
    sqlite3_stmt *own_keys_retrieve;
krista@2461
   172
    sqlite3_stmt *get_user_default_key;
krista@2461
   173
        
krista@2461
   174
    sqlite3_stmt *get_default_own_userid;
krista@2461
   175
krista@2461
   176
//    sqlite3_stmt *set_own_key;
vb@292
   177
vb@632
   178
    // sequence value
vb@633
   179
    sqlite3_stmt *sequence_value1;
vb@633
   180
    sqlite3_stmt *sequence_value2;
vb@1085
   181
    sqlite3_stmt *sequence_value3;
vb@632
   182
edouard@1236
   183
    // revoked keys
Edouard@693
   184
    sqlite3_stmt *set_revoked;
Edouard@693
   185
    sqlite3_stmt *get_revoked;
Edouard@693
   186
krista@2471
   187
    // mistrusted
krista@2471
   188
    sqlite3_stmt* add_mistrusted_key;
krista@2471
   189
    sqlite3_stmt* is_mistrusted_key;    
krista@2471
   190
    sqlite3_stmt* delete_mistrusted_key;
krista@2471
   191
    
krista@2461
   192
    // aliases
krista@2461
   193
    sqlite3_stmt *get_userid_alias_default;
krista@2461
   194
    sqlite3_stmt *add_userid_alias;
krista@2461
   195
Edouard@693
   196
    // callbacks
vb@292
   197
    examine_identity_t examine_identity;
vb@292
   198
    void *examine_management;
edouard@1462
   199
    void *sync_management;
vb@599
   200
    void *sync_obj;
krista@2271
   201
    messageToSend_t messageToSend;
krista@2271
   202
    notifyHandshake_t notifyHandshake;
krista@2271
   203
    inject_sync_msg_t inject_sync_msg;
krista@2271
   204
    retrieve_next_sync_msg_t retrieve_next_sync_msg;
vb@464
   205
edouard@1236
   206
    // key sync
edouard@1603
   207
    pEpSession* sync_session;
krista@2271
   208
    DeviceState_state sync_state;
edouard@1460
   209
    void* sync_state_payload;
edouard@1236
   210
    char sync_uuid[37];
edouard@1316
   211
    time_t LastCannotDecrypt;
edouard@1316
   212
    time_t LastUpdateRequest;
vb@690
   213
vb@464
   214
    // runtime config
vb@464
   215
vb@464
   216
    bool passive_mode;
vb@464
   217
    bool unencrypted_subject;
vb@1110
   218
    bool keep_sync_msg;
vb@1819
   219
    bool service_log;
krista@2129
   220
krista@2129
   221
    // mistrust undo cache
krista@2129
   222
    pEp_identity* cached_mistrusted;
Edouard@720
   223
    
roker@1722
   224
#ifdef DEBUG_ERRORSTACK
roker@1722
   225
    stringlist_t* errorstack;
roker@1722
   226
#endif
edouard@1603
   227
};
vb@48
   228
roker@1722
   229
vb@62
   230
PEP_STATUS init_transport_system(PEP_SESSION session, bool in_first);
vb@62
   231
void release_transport_system(PEP_SESSION session, bool out_last);
vb@48
   232
krista@1639
   233
/* NOT to be exposed to the outside!!! */
krista@1639
   234
PEP_STATUS encrypt_only(
krista@1639
   235
        PEP_SESSION session, const stringlist_t *keylist, const char *ptext,
krista@1639
   236
        size_t psize, char **ctext, size_t *csize
krista@1639
   237
);
krista@1639
   238
krista@2047
   239
#if defined(NDEBUG) || defined(NOLOG)
vb@216
   240
#define DEBUG_LOG(TITLE, ENTITY, DESC)
vb@216
   241
#else
huss@1571
   242
#ifdef ANDROID
huss@1571
   243
#include <android/log.h>
vb@1819
   244
#define  LOG_MORE(...)  __android_log_print(ANDROID_LOG_DEBUG, "pEpEngine", " %s :: %s :: %s :: %s ", __VA_ARGS__);
edouard@1630
   245
#else
edouard@1630
   246
#include <stdio.h>
vb@1819
   247
#define  LOG_MORE(...)  fprintf(stderr, "pEpEngine DEBUG_LOG('%s','%s','%s','%s')\n", __VA_ARGS__);
huss@1571
   248
#endif
edouard@1630
   249
#define DEBUG_LOG(TITLE, ENTITY, DESC) {\
vb@1819
   250
    log_event(session, (TITLE), (ENTITY), (DESC), "debug " __FILE__ ":" S_LINE);\
vb@1819
   251
    LOG_MORE((TITLE), (ENTITY), (DESC), __FILE__ ":" S_LINE)\
edouard@1630
   252
}
vb@216
   253
#endif
vb@216
   254
edouard@1746
   255
typedef enum _normalize_hex_rest_t {
edouard@1746
   256
    accept_hex,
edouard@1746
   257
    ignore_hex,
edouard@1746
   258
    reject_hex
edouard@1746
   259
} normalize_hex_res_t;
edouard@1746
   260
edouard@1746
   261
static inline normalize_hex_res_t _normalize_hex(char *hex) 
edouard@1746
   262
{
edouard@1746
   263
    if (*hex >= '0' && *hex <= '9')
edouard@1746
   264
        return accept_hex;
edouard@1746
   265
edouard@1746
   266
    if (*hex >= 'A' && *hex <= 'F') {
edouard@1746
   267
        *hex += 'a' - 'A';
edouard@1746
   268
        return accept_hex;
edouard@1746
   269
    }
edouard@1746
   270
edouard@1746
   271
    if (*hex >= 'a' && *hex <= 'f') 
edouard@1746
   272
        return accept_hex;
edouard@1746
   273
edouard@1746
   274
    if (*hex == ' ') 
edouard@1746
   275
        return ignore_hex;
edouard@1746
   276
edouard@1746
   277
    return reject_hex;
edouard@1746
   278
}
edouard@1746
   279
edouard@1521
   280
// Space tolerant and case insensitive fingerprint string compare
edouard@1746
   281
static inline PEP_STATUS _compare_fprs(
edouard@1746
   282
        const char* fpra,
edouard@1746
   283
        size_t fpras,
edouard@1746
   284
        const char* fprb,
edouard@1746
   285
        size_t fprbs,
edouard@1746
   286
        int* comparison)
edouard@1746
   287
{
edouard@1746
   288
edouard@1746
   289
    size_t ai = 0;
edouard@1746
   290
    size_t bi = 0;
edouard@1746
   291
    size_t significant = 0;
edouard@1746
   292
    int _comparison = 0;
edouard@1746
   293
    const int _FULL_FINGERPRINT_LENGTH = 40;
edouard@1746
   294
   
edouard@1746
   295
    // First compare every non-ignored chars until an end is reached
edouard@1746
   296
    while(ai < fpras && bi < fprbs)
edouard@1746
   297
    {
edouard@1746
   298
        char fprac = fpra[ai];
edouard@1746
   299
        char fprbc = fprb[bi];
edouard@1746
   300
        normalize_hex_res_t fprah = _normalize_hex(&fprac);
edouard@1746
   301
        normalize_hex_res_t fprbh = _normalize_hex(&fprbc);
edouard@1746
   302
edouard@1746
   303
        if(fprah == reject_hex || fprbh == reject_hex)
edouard@1746
   304
            return PEP_ILLEGAL_VALUE;
edouard@1746
   305
edouard@1746
   306
        if ( fprah == ignore_hex )
edouard@1746
   307
        {
edouard@1746
   308
            ai++;
edouard@1746
   309
        }
edouard@1746
   310
        else if ( fprbh == ignore_hex )
edouard@1746
   311
        {
edouard@1746
   312
            bi++;
edouard@1746
   313
        }
edouard@1746
   314
        else
edouard@1746
   315
        {
edouard@1746
   316
            if(fprac != fprbc && _comparison == 0 )
edouard@1746
   317
            {
edouard@1746
   318
                _comparison = fprac > fprbc ? 1 : -1;
edouard@1746
   319
            }
edouard@1746
   320
edouard@1746
   321
            significant++;
edouard@1746
   322
            ai++;
edouard@1746
   323
            bi++;
edouard@1746
   324
edouard@1746
   325
        } 
edouard@1746
   326
    }
edouard@1746
   327
edouard@1746
   328
    // Bail out if we didn't got enough significnt chars
edouard@1746
   329
    if (significant != _FULL_FINGERPRINT_LENGTH )
edouard@1746
   330
        return PEP_TRUSTWORDS_FPR_WRONG_LENGTH;
edouard@1746
   331
edouard@1746
   332
    // Then purge remaining chars, all must be ignored chars
edouard@1746
   333
    while ( ai < fpras )
edouard@1746
   334
    {
edouard@1746
   335
        char fprac = fpra[ai];
edouard@1746
   336
        normalize_hex_res_t fprah = _normalize_hex(&fprac);
edouard@1746
   337
        if( fprah == reject_hex )
edouard@1746
   338
            return PEP_ILLEGAL_VALUE;
edouard@1746
   339
        if ( fprah != ignore_hex )
edouard@1746
   340
            return PEP_TRUSTWORDS_FPR_WRONG_LENGTH;
edouard@1746
   341
        ai++;
edouard@1746
   342
    }
edouard@1746
   343
    while ( bi < fprbs )
edouard@1746
   344
    {
edouard@1746
   345
        char fprbc = fprb[bi];
edouard@1746
   346
        normalize_hex_res_t fprbh = _normalize_hex(&fprbc);
edouard@1746
   347
        if( fprbh == reject_hex )
edouard@1746
   348
            return PEP_ILLEGAL_VALUE;
edouard@1746
   349
        if ( fprbh != ignore_hex )
edouard@1746
   350
            return PEP_TRUSTWORDS_FPR_WRONG_LENGTH;
edouard@1746
   351
        bi++;
edouard@1746
   352
    }
edouard@1746
   353
edouard@1746
   354
    *comparison = _comparison;
edouard@1746
   355
    return PEP_STATUS_OK;
edouard@1746
   356
}
edouard@1746
   357
edouard@1521
   358
static inline int _same_fpr(
edouard@1521
   359
        const char* fpra,
edouard@1521
   360
        size_t fpras,
edouard@1521
   361
        const char* fprb,
edouard@1521
   362
        size_t fprbs
edouard@1521
   363
    )
edouard@1521
   364
{
edouard@1746
   365
    // illegal values are ignored, and considered not same.
edouard@1746
   366
    int comparison = 1;
edouard@1746
   367
edouard@1746
   368
    _compare_fprs(fpra, fpras, fprb, fprbs, &comparison);
edouard@1746
   369
edouard@1746
   370
    return comparison == 0;
edouard@1521
   371
}
roker@1722
   372
krista@2045
   373
// size is the length of the bytestr that's coming in. This is really only intended
krista@2045
   374
// for comparing two full strings. If charstr's length is different from bytestr_size,
krista@2045
   375
// we'll return a non-zero value.
krista@2045
   376
static inline int _unsigned_signed_strcmp(const unsigned char* bytestr, const char* charstr, int bytestr_size) {
krista@2045
   377
    int charstr_len = strlen(charstr);
krista@2045
   378
    if (charstr_len != bytestr_size)
krista@2045
   379
        return -1; // we don't actually care except that it's non-zero
krista@2045
   380
    return memcmp(bytestr, charstr, bytestr_size);
krista@2045
   381
}
krista@2045
   382
krista@2045
   383
// This is just a horrible example of C type madness. UTF-8 made me do it.
krista@2045
   384
static inline char* _pep_subj_copy() {
krista@2285
   385
#ifndef WIN32
krista@2045
   386
    unsigned char pepstr[] = PEP_SUBJ_STRING;
krista@2045
   387
    void* retval = calloc(1, sizeof(unsigned char)*PEP_SUBJ_BYTELEN + 1);
krista@2045
   388
    memcpy(retval, pepstr, PEP_SUBJ_BYTELEN);
krista@2045
   389
    return (char*)retval;
krista@2285
   390
#else
krista@2285
   391
    return strdup("pEp");
krista@2285
   392
#endif
krista@2045
   393
}
krista@2045
   394
krista@2461
   395
static inline bool is_me(PEP_SESSION session, pEp_identity* test_ident) {
krista@2461
   396
    bool retval = false;
krista@2461
   397
    if (test_ident && test_ident->user_id) {
krista@2461
   398
        char* def_id = NULL;
krista@2461
   399
        get_default_own_userid(session, &def_id);
krista@2461
   400
        if (test_ident->me || 
krista@2461
   401
            (def_id && strcmp(def_id, test_ident->user_id) == 0)) {
krista@2461
   402
            retval = true;
krista@2461
   403
        }
krista@2461
   404
        free(def_id);
krista@2461
   405
    }
krista@2461
   406
    return retval;
krista@2461
   407
}
krista@2461
   408
krista@2461
   409
#ifndef EMPTYSTR
krista@2461
   410
#define EMPTYSTR(STR) ((STR) == NULL || (STR)[0] == '\0')
krista@2461
   411
#endif
krista@2461
   412
krista@2549
   413
#ifndef IS_PGP_CT
krista@2549
   414
#define IS_PGP_CT(CT) (((CT) | PEP_ct_confirmed) == PEP_ct_OpenPGP)
krista@2549
   415
#endif
krista@2549
   416
krista@2461
   417
#ifndef _MIN
krista@2461
   418
#define _MIN(A, B) ((B) > (A) ? (A) : (B))
krista@2461
   419
#endif
krista@2461
   420
#ifndef _MAX
krista@2461
   421
#define _MAX(A, B) ((B) > (A) ? (B) : (A))
krista@2461
   422
#endif
krista@2461
   423
krista@2461
   424
krista@2176
   425
// These are globals used in generating message IDs and should only be
krista@2176
   426
// computed once, as they're either really constants or OS-dependent
krista@2176
   427
krista@2467
   428
extern int _pEp_rand_max_bits;
krista@2467
   429
extern double _pEp_log2_36;
krista@2176
   430
krista@2176
   431
static inline void _init_globals() {
vb@2571
   432
    _pEp_rand_max_bits = (int) ceil(log2((double) RAND_MAX));
krista@2176
   433
    _pEp_log2_36 = log2(36);
krista@2176
   434
}