src/key_reset.c
author Krista Bennett <krista@pep-project.org>
Wed, 05 Dec 2018 12:38:23 +0100
branchsync
changeset 3174 ca08de2591b7
parent 2956 e82181973f21
child 3347 1572cabb0cc4
permissions -rw-r--r--
ENGINE-497: bad status handling fixed
     1 // This file is under GNU General Public License 3.0
     2 // see LICENSE.txt
     3 
     4 #include "pEp_internal.h"
     5 #include "dynamic_api.h"
     6 #include "message_api.h"
     7 
     8 #include <string.h>
     9 #include <stdlib.h>
    10 
    11 PEP_STATUS has_key_reset_been_sent(
    12         PEP_SESSION session, 
    13         const char* user_id, 
    14         const char* revoked_fpr,
    15         bool* contacted)
    16 {
    17     assert(session);
    18     assert(contacted);
    19     assert(user_id);
    20     assert(revoked_fpr);
    21     assert(!EMPTYSTR(user_id));
    22 
    23     if (!session || !contacted || EMPTYSTR(revoked_fpr) || EMPTYSTR(user_id))
    24         return PEP_ILLEGAL_VALUE;
    25     
    26     *contacted = false;
    27                     
    28     char* alias_default = NULL;
    29     
    30     PEP_STATUS status = get_userid_alias_default(session, user_id, &alias_default);
    31     
    32     if (status == PEP_CANNOT_FIND_ALIAS || EMPTYSTR(alias_default)) {
    33         free(alias_default);
    34         alias_default = strdup(user_id);
    35     }
    36     
    37     sqlite3_reset(session->was_id_for_revoke_contacted);
    38     sqlite3_bind_text(session->was_id_for_revoke_contacted, 1, revoked_fpr, -1,
    39             SQLITE_STATIC);
    40     sqlite3_bind_text(session->was_id_for_revoke_contacted, 2, user_id, -1,
    41             SQLITE_STATIC);        
    42     int result = sqlite3_step(session->was_id_for_revoke_contacted);
    43     switch (result) {
    44         case SQLITE_ROW: {
    45             *contacted = (sqlite3_column_int(session->was_id_for_revoke_contacted, 0) != 0);
    46             break;
    47         }
    48         default:
    49             sqlite3_reset(session->was_id_for_revoke_contacted);
    50             free(alias_default);
    51             return PEP_UNKNOWN_DB_ERROR;
    52     }
    53 
    54     sqlite3_reset(session->was_id_for_revoke_contacted);
    55     return PEP_STATUS_OK;
    56 }
    57 
    58 //static const char *sql_set_revoke_contact_as_notified =
    59 //    "insert or replace into revocation_contact_list(fpr, contact_id) values (?1, ?2) ;";
    60 
    61 PEP_STATUS set_reset_contact_notified(
    62         PEP_SESSION session,
    63         const char* revoke_fpr,
    64         const char* contact_id
    65     )
    66 {
    67     PEP_STATUS status = PEP_STATUS_OK;
    68     
    69     assert(session && !EMPTYSTR(revoke_fpr) && !EMPTYSTR(contact_id));
    70     
    71     if (!session || EMPTYSTR(revoke_fpr) || EMPTYSTR(contact_id))
    72         return PEP_ILLEGAL_VALUE;
    73     
    74     sqlite3_reset(session->set_revoke_contact_as_notified);
    75     sqlite3_bind_text(session->set_revoke_contact_as_notified, 1, revoke_fpr, -1, 
    76             SQLITE_STATIC);
    77     sqlite3_bind_text(session->set_revoke_contact_as_notified, 2, contact_id, -1,
    78             SQLITE_STATIC);
    79 
    80     int result;
    81     
    82     result = sqlite3_step(session->set_revoke_contact_as_notified);
    83     switch (result) {
    84         case SQLITE_DONE:
    85             status = PEP_STATUS_OK;
    86             break;
    87             
    88         default:
    89             status = PEP_UNKNOWN_DB_ERROR;
    90     }
    91     
    92     sqlite3_reset(session->set_revoke_contact_as_notified);
    93     return status;    
    94 }
    95 
    96 
    97 PEP_STATUS receive_key_reset(PEP_SESSION session,
    98                              message* reset_msg) {
    99 
   100     if (!session || !reset_msg)
   101         return PEP_ILLEGAL_VALUE;
   102 
   103     pEp_identity* sender_id = reset_msg->from;
   104                 
   105     if (!sender_id)
   106         return PEP_MALFORMED_KEY_RESET_MSG;
   107         
   108     PEP_STATUS status = update_identity(session, sender_id);
   109     if (!sender_id->user_id)
   110         return PEP_UNKNOWN_ERROR;
   111         
   112     if (is_me(session, sender_id))
   113         return PEP_ILLEGAL_VALUE;    
   114         
   115     if (!reset_msg->longmsg || strncmp(reset_msg->longmsg, "OLD: ", 5) != 0) 
   116         return PEP_MALFORMED_KEY_RESET_MSG;
   117 
   118     status = PEP_STATUS_OK;
   119     char* old_fpr = NULL;
   120     char* new_fpr = NULL;
   121     
   122     stringlist_t* keylist = NULL;
   123     pEp_identity* temp_ident = identity_dup(sender_id);
   124     if (!temp_ident) {
   125         status = PEP_OUT_OF_MEMORY;
   126         goto pEp_free;
   127     }        
   128             
   129     char* rest = NULL;
   130     char* p = strtok_r(reset_msg->longmsg, "\r\n", &rest);
   131     if (!EMPTYSTR(p + 5))
   132         old_fpr = strdup(p + 5);
   133     else {
   134         status = PEP_MALFORMED_KEY_RESET_MSG;
   135         goto pEp_free;
   136     }
   137     
   138     bool own_key = false;
   139     status = is_own_key(session, old_fpr, &own_key);
   140     
   141     if (own_key) {
   142         // Nope, no one can make us our own default. If we want to do that,
   143         // that's keysync, NOT key reset.
   144         status = PEP_ILLEGAL_VALUE;
   145         goto pEp_free;
   146     }
   147             
   148     p = strtok_r(NULL, "\r\n", &rest); 
   149     if (strncmp(p, "NEW: ", 5) != 0  || EMPTYSTR(p + 5)) {
   150         status = PEP_MALFORMED_KEY_RESET_MSG;
   151         goto pEp_free;
   152     }
   153 
   154     new_fpr = strdup(p + 5);
   155         
   156     // Reset the original key
   157     status = key_reset(session, old_fpr, temp_ident);
   158     if (status != PEP_STATUS_OK)
   159         goto pEp_free;
   160         
   161     status = find_keys(session, new_fpr, &keylist);
   162     if (status != PEP_STATUS_OK)
   163         goto pEp_free;
   164         
   165     if (!keylist) {
   166         status = PEP_KEY_NOT_FOUND;
   167         goto pEp_free;
   168     }
   169 
   170     // alright, we've checked as best we can. Let's set that baby.
   171     sender_id->fpr = new_fpr;
   172     
   173     // This only sets as the default, does NOT TRUST IN ANY WAY
   174     sender_id->comm_type = sender_id->comm_type & (~PEP_ct_confirmed);
   175     status = set_identity(session, sender_id);
   176     
   177     sender_id->fpr = NULL; // ownership for free
   178 pEp_free:    
   179     free_stringlist(keylist);    
   180     free(old_fpr);
   181     free(new_fpr);
   182     free_identity(temp_ident);
   183     return status;
   184 }
   185 
   186 PEP_STATUS create_standalone_key_reset_message(PEP_SESSION session,
   187                                                message** dst, 
   188                                                pEp_identity* recip,
   189                                                const char* old_fpr,
   190                                                const char* new_fpr) {
   191                                                    
   192     if (!dst || !recip->user_id || !recip->address)
   193         return PEP_ILLEGAL_VALUE;
   194 
   195     if (!old_fpr || !new_fpr)
   196         return PEP_ILLEGAL_VALUE;
   197         
   198     *dst = NULL;
   199     // Get own identity user has corresponded with
   200     pEp_identity* own_identity = NULL;
   201     
   202     PEP_STATUS status = get_own_ident_for_contact_id(session,
   203                                                      recip,
   204                                                      &own_identity);                                                       
   205     if (status != PEP_STATUS_OK)
   206         return status;
   207         
   208     message* reset_message = new_message(PEP_dir_outgoing);
   209     reset_message->from = own_identity;
   210     reset_message->to = new_identity_list(identity_dup(recip)); // ?
   211     
   212     const char* oldtag = "OLD: ";
   213     const char* newtag = "\nNEW: ";
   214     const size_t taglens = 11;
   215     size_t full_len = taglens + strlen(old_fpr) + strlen(new_fpr) + 2; // \n and \0
   216     char* longmsg = calloc(full_len, 1);
   217     strlcpy(longmsg, oldtag, full_len);
   218     strlcat(longmsg, old_fpr, full_len);
   219     strlcat(longmsg, newtag, full_len);
   220     strlcat(longmsg, new_fpr, full_len);
   221     strlcat(longmsg, "\n", full_len);
   222     reset_message->longmsg = longmsg; 
   223     reset_message->shortmsg = strdup("Key reset");    
   224     
   225     message* output_msg = NULL;
   226     
   227     status = encrypt_message(session, reset_message, NULL,
   228                              &output_msg, PEP_enc_PGP_MIME,
   229                              PEP_encrypt_flag_key_reset_only);
   230 
   231     if (status == PEP_STATUS_OK)
   232         *dst = output_msg;
   233         
   234     free_message(reset_message);
   235     return status;
   236 }
   237 
   238 PEP_STATUS send_key_reset_to_recents(PEP_SESSION session,
   239                                      const char* old_fpr, 
   240                                      const char* new_fpr) {
   241     assert(old_fpr);
   242     assert(new_fpr);
   243     assert(session);
   244     assert(session->messageToSend);
   245     
   246     if (!session || !old_fpr || !new_fpr)
   247         return PEP_ILLEGAL_VALUE;
   248 
   249     messageToSend_t send_cb = session->messageToSend;
   250     if (!send_cb)
   251         return PEP_SYNC_NO_MESSAGE_SEND_CALLBACK;
   252         
   253     identity_list* recent_contacts = NULL;
   254     message* reset_msg = NULL;
   255 
   256     PEP_STATUS status = get_last_contacted(session, &recent_contacts);
   257     
   258     if (status != PEP_STATUS_OK)
   259         goto pEp_free;
   260                     
   261     identity_list* curr_id_ptr = recent_contacts;
   262 
   263     for (curr_id_ptr = recent_contacts; curr_id_ptr; curr_id_ptr = curr_id_ptr->next) {
   264         pEp_identity* curr_id = curr_id_ptr->ident;
   265         
   266         if (!curr_id)
   267             break;
   268     
   269         const char* user_id = curr_id->user_id;
   270         
   271         // Should be impossible, but?
   272         if (!user_id)
   273             continue;
   274         
   275         // Check if it's us - if so, pointless...
   276         if (is_me(session, curr_id))
   277             continue;
   278             
   279         // Check if they've already been told - this shouldn't be the case, but...
   280         bool contacted = false;
   281         status = has_key_reset_been_sent(session, user_id, old_fpr, &contacted);
   282         if (status != PEP_STATUS_OK)
   283             goto pEp_free;
   284     
   285         if (contacted)
   286             continue;
   287             
   288         // if not, make em a message    
   289         reset_msg = NULL;
   290         
   291         status = create_standalone_key_reset_message(session,
   292                                                      &reset_msg,
   293                                                      curr_id,
   294                                                      old_fpr,
   295                                                      new_fpr);
   296 
   297         if (status == PEP_CANNOT_FIND_IDENTITY) { // this is ok, just means we never mailed them 
   298             status = PEP_STATUS_OK;
   299             continue; 
   300         }
   301             
   302         if (status != PEP_STATUS_OK) {
   303             free(reset_msg);
   304             goto pEp_free;
   305         }
   306         
   307         // insert into queue
   308         status = send_cb(reset_msg);
   309 
   310         if (status != PEP_STATUS_OK) {
   311             free(reset_msg);
   312             goto pEp_free;            
   313         }
   314             
   315         // Put into notified DB
   316         status = set_reset_contact_notified(session, old_fpr, user_id);
   317         if (status != PEP_STATUS_OK)
   318             goto pEp_free;            
   319     }
   320     
   321 pEp_free:
   322     free_identity_list(recent_contacts);
   323     return status;
   324 }
   325 
   326 DYNAMIC_API PEP_STATUS key_reset(
   327         PEP_SESSION session,
   328         const char* key_id,
   329         pEp_identity* ident
   330     )
   331 {
   332     if (!session)
   333         return PEP_ILLEGAL_VALUE;
   334         
   335     PEP_STATUS status = PEP_STATUS_OK;
   336         
   337     char* fpr_copy = NULL;
   338     char* own_id = NULL;
   339     char* new_key = NULL;
   340     identity_list* key_idents = NULL;
   341     stringlist_t* keys = NULL;
   342     
   343     if (!EMPTYSTR(key_id)) {
   344         fpr_copy = strdup(key_id);
   345         if (!fpr_copy)
   346             return PEP_OUT_OF_MEMORY;
   347     }
   348         
   349     if (!ident) {
   350         // Get list of own identities
   351         status = get_default_own_userid(session, &own_id);
   352         if (status != PEP_STATUS_OK)
   353             goto pEp_free;
   354             
   355         if (EMPTYSTR(fpr_copy)) {
   356             status = get_all_keys_for_user(session, own_id, &keys);
   357             if (status == PEP_STATUS_OK) {
   358                 stringlist_t* curr_key;
   359                 for (curr_key = keys; curr_key && curr_key->value; curr_key = curr_key->next) {
   360                     status = key_reset(session, curr_key->value, NULL);
   361                     if (status != PEP_STATUS_OK)
   362                         break;
   363                 }
   364             }
   365             goto pEp_free;
   366         } // otherwise, we have a specific fpr to process
   367 
   368         // fpr_copy exists, so... let's go.
   369         // Process own identities with this fpr
   370         status = get_identities_by_main_key_id(session, fpr_copy, &key_idents);
   371         
   372         if (status == PEP_STATUS_OK) {
   373             // have ident list, or should
   374             identity_list* curr_ident;
   375             for (curr_ident = key_idents; curr_ident && curr_ident->ident; 
   376                  curr_ident = curr_ident->next) {
   377                 pEp_identity* this_identity = curr_ident->ident;
   378                 status = key_reset(session, fpr_copy, this_identity);
   379                 if (status != PEP_STATUS_OK)
   380                     break;                    
   381             }
   382         }
   383         else if (status == PEP_CANNOT_FIND_IDENTITY) // not an error
   384             status = PEP_STATUS_OK;
   385             
   386         goto pEp_free;
   387     }
   388     else { // an identity was specified.       
   389         if (is_me(session, ident)) {            
   390             // FIXME: make sure this IS our fpr?
   391             
   392             // If it got sent in with an empty fpr...
   393             if (EMPTYSTR(fpr_copy)) {
   394                 //
   395                 // if (!EMPTYSTR(ident->fpr))
   396                 //     fpr_copy = strdup(ident->fpr);
   397                 status = _myself(session, ident, false, true);
   398                 if (status == PEP_STATUS_OK && ident->fpr)
   399                     fpr_copy = strdup(ident->fpr);
   400                 else {
   401                     // last resort?
   402                     // Get list of own identities
   403                     char* own_id = NULL;
   404                     status = get_default_own_userid(session, &own_id);
   405                     if (status == PEP_STATUS_OK)
   406                         status = get_user_default_key(session, own_id, &fpr_copy);
   407                     if (status != PEP_STATUS_OK || EMPTYSTR(fpr_copy))  {
   408                         free(own_id);
   409                         return (status == PEP_STATUS_OK ? PEP_KEY_NOT_FOUND : status);
   410                     }
   411                 }
   412             }
   413                         
   414             free(ident->fpr);
   415             ident->fpr = fpr_copy;            
   416             // Create revocation
   417             status = revoke_key(session, fpr_copy, NULL);
   418             // generate new key
   419             if (status == PEP_STATUS_OK) {
   420                 ident->fpr = NULL;
   421                 status = generate_keypair(session, ident);
   422             }
   423             if (status == PEP_STATUS_OK) {
   424                 new_key = strdup(ident->fpr);
   425                 status = set_own_key(session, ident, new_key);
   426             }
   427             // mistrust fpr from trust
   428             ident->fpr = fpr_copy;
   429             
   430             ident->comm_type = PEP_ct_mistrusted;
   431             status = set_trust(session, ident);
   432             ident->fpr = NULL;
   433             
   434             // Done with old use of ident.
   435             if (status == PEP_STATUS_OK) {
   436                 // Update fpr for outgoing
   437                 status = myself(session, ident);
   438             }
   439             
   440             if (status == PEP_STATUS_OK)
   441                 // cascade that mistrust for anyone using this key
   442                 status = mark_as_compromised(session, fpr_copy);
   443             if (status == PEP_STATUS_OK)
   444                 status = remove_fpr_as_default(session, fpr_copy);
   445             if (status == PEP_STATUS_OK)
   446                 status = add_mistrusted_key(session, fpr_copy);
   447             // add to revocation list 
   448             if (status == PEP_STATUS_OK) 
   449                 status = set_revoked(session, fpr_copy, new_key, time(NULL));            
   450             // for all active communication partners:
   451             //      active_send revocation
   452             if (status == PEP_STATUS_OK)
   453                 status = send_key_reset_to_recents(session, fpr_copy, new_key);
   454                 
   455         }
   456         else { // not is_me
   457             // TODO: Decide what this means. We have a non-own identity, we don't
   458             //       have an fpr. Do we reset all keys for that identity?
   459             if (EMPTYSTR(fpr_copy)) {
   460                 NOT_IMPLEMENTED
   461             }
   462                 
   463             // remove fpr from all identities
   464             // remove fpr from all users
   465             if (status == PEP_STATUS_OK)
   466                 status = remove_fpr_as_default(session, fpr_copy);
   467             // delete key from DB
   468             if (status == PEP_STATUS_OK) {
   469                 status = remove_key(session, fpr_copy);
   470             };
   471         }
   472     }
   473     
   474 pEp_free:
   475     free(fpr_copy);
   476     free(own_id);
   477     free_identity_list(key_idents);
   478     free_stringlist(keys);
   479     free(new_key);    
   480     return status;
   481 }