File: session.c

package info (click to toggle)
lastpass-cli 0.3.0-2%2Bdeb8u1
  • links: PTS
  • area: main
  • in suites: jessie
  • size: 416 kB
  • ctags: 447
  • sloc: ansic: 4,844; sh: 129; makefile: 49
file content (99 lines) | stat: -rw-r--r-- 2,931 bytes parent folder | download | duplicates (2)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
/*
 * Copyright (c) 2014 LastPass. All Rights Reserved.
 *
 *
 */

#include "xml.h"
#include "config.h"
#include "util.h"
#include "cipher.h"
#include <sys/mman.h>
#include <string.h>

struct session *session_new(void)
{
	return new0(struct session, 1);
}
void session_free(struct session *session)
{
	if (!session)
		return;
	free(session->uid);
	free(session->sessionid);
	free(session->token);
	free(session->private_key.key);
	free(session);
}
bool session_is_valid(struct session *session)
{
	return session && session->uid && session->sessionid && session->token;
}
void session_set_private_key(struct session *session, unsigned const char key[KDF_HASH_LEN], const char *key_hex)
{
	#define start_str "LastPassPrivateKey<"
	#define end_str ">LastPassPrivateKey"
	size_t len;
	_cleanup_free_ char *encrypted_key = NULL;
	_cleanup_free_ char *decrypted_key = NULL;
	char *encrypted_key_start, *start, *end;

	len = strlen(key_hex);
	if (len % 2 != 0)
		die("Key hex in wrong format.");
	len /= 2;

	len += 16 /* IV */ + 1 /* pound symbol */;
	encrypted_key = xcalloc(len + 1, 1);
	encrypted_key[0] = '!';
	memcpy(&encrypted_key[1], key, 16);
	encrypted_key_start = &encrypted_key[17];
	hex_to_bytes(key_hex, &encrypted_key_start);
	decrypted_key = cipher_aes_decrypt(encrypted_key, len, key);
	if (!decrypted_key)
		warn("Could not decrypt private key.");
	else {
		start = strstr(decrypted_key, start_str);
		end = strstr(decrypted_key, end_str);
		if (!start || !end || end <= start)
			warn("Could not decode decrypted private key.");
		else {
			start += strlen(start_str);
			*end = '\0';

			len = strlen(start);
			if (len % 2 != 0)
				die("Invalid private key after decryption and decoding.");
			len /= 2;

			hex_to_bytes(start, (char **)&session->private_key.key);
			session->private_key.len = len;
			mlock(session->private_key.key, len);
		}
	}
	#undef start_str
	#undef end_str
}
void session_save(struct session *session, unsigned const char key[KDF_HASH_LEN])
{
	config_write_encrypted_string("session_uid", session->uid, key);
	config_write_encrypted_string("session_sessionid", session->sessionid, key);
	config_write_encrypted_string("session_token", session->token, key);
	config_write_encrypted_buffer("session_privatekey", (char *)session->private_key.key, session->private_key.len, key);
}
struct session *sesssion_load(unsigned const char key[KDF_HASH_LEN])
{
	struct session *session = session_new();
	session->uid = config_read_encrypted_string("session_uid", key);
	session->sessionid = config_read_encrypted_string("session_sessionid", key);
	session->token = config_read_encrypted_string("session_token", key);
	session->private_key.len = config_read_encrypted_buffer("session_privatekey", (char **)&session->private_key.key, key);
	mlock(session->private_key.key, session->private_key.len);

	if (session_is_valid(session))
		return session;
	else {
		session_free(session);
		return NULL;
	}
}