1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99
|
/*
* Copyright (c) 2014 LastPass. All Rights Reserved.
*
*
*/
#include "xml.h"
#include "config.h"
#include "util.h"
#include "cipher.h"
#include <sys/mman.h>
#include <string.h>
struct session *session_new(void)
{
return new0(struct session, 1);
}
void session_free(struct session *session)
{
if (!session)
return;
free(session->uid);
free(session->sessionid);
free(session->token);
free(session->private_key.key);
free(session);
}
bool session_is_valid(struct session *session)
{
return session && session->uid && session->sessionid && session->token;
}
void session_set_private_key(struct session *session, unsigned const char key[KDF_HASH_LEN], const char *key_hex)
{
#define start_str "LastPassPrivateKey<"
#define end_str ">LastPassPrivateKey"
size_t len;
_cleanup_free_ char *encrypted_key = NULL;
_cleanup_free_ char *decrypted_key = NULL;
char *encrypted_key_start, *start, *end;
len = strlen(key_hex);
if (len % 2 != 0)
die("Key hex in wrong format.");
len /= 2;
len += 16 /* IV */ + 1 /* pound symbol */;
encrypted_key = xcalloc(len + 1, 1);
encrypted_key[0] = '!';
memcpy(&encrypted_key[1], key, 16);
encrypted_key_start = &encrypted_key[17];
hex_to_bytes(key_hex, &encrypted_key_start);
decrypted_key = cipher_aes_decrypt(encrypted_key, len, key);
if (!decrypted_key)
warn("Could not decrypt private key.");
else {
start = strstr(decrypted_key, start_str);
end = strstr(decrypted_key, end_str);
if (!start || !end || end <= start)
warn("Could not decode decrypted private key.");
else {
start += strlen(start_str);
*end = '\0';
len = strlen(start);
if (len % 2 != 0)
die("Invalid private key after decryption and decoding.");
len /= 2;
hex_to_bytes(start, (char **)&session->private_key.key);
session->private_key.len = len;
mlock(session->private_key.key, len);
}
}
#undef start_str
#undef end_str
}
void session_save(struct session *session, unsigned const char key[KDF_HASH_LEN])
{
config_write_encrypted_string("session_uid", session->uid, key);
config_write_encrypted_string("session_sessionid", session->sessionid, key);
config_write_encrypted_string("session_token", session->token, key);
config_write_encrypted_buffer("session_privatekey", (char *)session->private_key.key, session->private_key.len, key);
}
struct session *sesssion_load(unsigned const char key[KDF_HASH_LEN])
{
struct session *session = session_new();
session->uid = config_read_encrypted_string("session_uid", key);
session->sessionid = config_read_encrypted_string("session_sessionid", key);
session->token = config_read_encrypted_string("session_token", key);
session->private_key.len = config_read_encrypted_buffer("session_privatekey", (char **)&session->private_key.key, key);
mlock(session->private_key.key, session->private_key.len);
if (session_is_valid(session))
return session;
else {
session_free(session);
return NULL;
}
}
|