File: getkeyfromencrypted_mac_linux.cc

package info (click to toggle)
signalbackup-tools 20250313.1-1
  • links: PTS, VCS
  • area: main
  • in suites: sid, trixie
  • size: 3,752 kB
  • sloc: cpp: 47,042; sh: 477; ansic: 399; ruby: 19; makefile: 3
file content (73 lines) | stat: -rw-r--r-- 1,994 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
/*
  Copyright (C) 2024  Selwin van Dijk

  This file is part of signalbackup-tools.

  signalbackup-tools is free software: you can redistribute it and/or modify
  it under the terms of the GNU General Public License as published by
  the Free Software Foundation, either version 3 of the License, or
  (at your option) any later version.

  signalbackup-tools is distributed in the hope that it will be useful,
  but WITHOUT ANY WARRANTY; without even the implied warranty of
  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
  GNU General Public License for more details.

  You should have received a copy of the GNU General Public License
  along with signalbackup-tools.  If not, see <https://www.gnu.org/licenses/>.
*/

#if !defined(__WIN32) && !defined(__MINGW64__)

#include "desktopdatabase.ih"

bool DesktopDatabase::getKeyFromEncrypted_mac_linux()
{
  // 1. get the encrypted key from config.json
  std::string keystr = readEncryptedKey();
  if (keystr.empty())
    return false;

  // 2. get the secrets
  std::set<std::string> secrets;
  auto tryDecrypt = [&]()
  {
    for (auto s = secrets.begin(); s != secrets.end(); ++s)
    {
      d_hexkey = decryptKey_linux_mac(*s, keystr, s == std::prev(secrets.end()));
      if (!d_hexkey.empty())
        return true;
    }
    return false;
  };
#if defined(__APPLE__) && defined(__MACH__)
  getSecrets_mac(&secrets);
  if (tryDecrypt())
    return true;
#else
  getSecrets_linux_SecretService(&secrets);
  if (tryDecrypt())
    return true;
  getSecrets_linux_Kwallet(6, &secrets); // nothing from libsecret, try kwallet6...
  if (tryDecrypt())
    return true;
  getSecrets_linux_Kwallet(5, &secrets); // nothing from kwallet6, try kwallet5...
  if (tryDecrypt())
    return true;
#endif
  if (secrets.empty())
  {
    Logger::error("Failed to get any secrets");
    return false;
  }

  if (d_hexkey.empty())
  {
    Logger::error("Failed to decrypt valid key. :(");
    return false;
  }

  return false;
}

#endif