-
-
Notifications
You must be signed in to change notification settings - Fork 69
/
GlobalUtils.m
277 lines (232 loc) · 10.3 KB
/
GlobalUtils.m
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
//
// GlobalUtils.m
// MobileOrg
//
// Created by Richard Moreland on 9/30/09.
// Copyright 2009 Richard Moreland.
//
// This program is free software; you can redistribute it and/or
// modify it under the terms of the GNU General Public License
// as published by the Free Software Foundation; either version 2
// of the License, or (at your option) any later version.
//
// This program is distributed in the hope that it will be useful,
// but WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
// GNU General Public License for more details.
//
// You should have received a copy of the GNU General Public License
// along with this program; if not, write to the Free Software
// Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
//
#import "GlobalUtils.h"
#import "Settings.h"
#import "MobileOrgAppDelegate.h"
#import "OutlineViewController.h"
#import "CommonCrypto/CommonCryptor.h"
#import "CommonCrypto/CommonDigest.h"
MobileOrgAppDelegate *AppInstance() {
return (MobileOrgAppDelegate*)[[UIApplication sharedApplication] delegate];
}
NSString *UUID() {
CFUUIDRef uuidObj = CFUUIDCreate(nil);
NSString *uuidString = (NSString*)CFUUIDCreateString(nil, uuidObj);
CFRelease(uuidObj);
return [uuidString autorelease];
}
NSString *FileWithName(NSString *name) {
return [[NSHomeDirectory() stringByAppendingPathComponent:@"Documents"] stringByAppendingPathComponent:name];
}
NSString *TemporaryFilename() {
return [[NSHomeDirectory() stringByAppendingPathComponent:@"Documents"] stringByAppendingPathComponent:UUID()];
}
void DeleteFile(NSString *filename) {
NSFileManager *NSFm = [NSFileManager defaultManager];
if ([NSFm fileExistsAtPath:filename]) {
NSError *e;
[NSFm removeItemAtPath:filename error:&e];
}
}
void UpdateEditActionCount() {
[[AppInstance() rootOutlineController] updateBadge];
}
// Get rid of any '*' characters in column zero by padding them with space in column 0.
// This changes what the user entered, but they shouldn't have done it in the first place.
NSString *EscapeHeadings(NSString *original) {
NSString *ret = [NSString stringWithString:original];
if ([original length] > 0) {
if ([original characterAtIndex:0] == '*') {
ret = [NSString stringWithFormat:@" %@", original];
}
}
ret = [ret stringByReplacingOccurrencesOfString:@"\n*" withString:@"\n *"];
return ret;
}
void UpdateAppBadge() {
int count = 0;
if ([[Settings instance] appBadgeMode] == AppBadgeModeTotal) {
count += [[[AppInstance() noteListController] navigationController].tabBarItem.badgeValue intValue];
count += [[[AppInstance() rootOutlineController] navigationController].tabBarItem.badgeValue intValue];
}
[UIApplication sharedApplication].applicationIconBadgeNumber = count;
}
// http://stackoverflow.com/questions/2576356/how-does-one-get-ui-user-interface-idiom-to-work-with-iphone-os-sdk-3-2
BOOL IsIpad() {
#if (__IPHONE_OS_VERSION_MAX_ALLOWED >= 30200)
if ([[UIDevice currentDevice] respondsToSelector: @selector(userInterfaceIdiom)])
return ([UIDevice currentDevice].userInterfaceIdiom == UIUserInterfaceIdiomPad);
#endif
return NO;
}
NSString *ReadPossiblyEncryptedFile(NSString *filename, NSString **error) {
*error = nil;
NSMutableData *data = [NSMutableData dataWithContentsOfFile:filename];
if (!data) {
*error = [NSString stringWithString:@"Unable to open file"];
return nil;
}
char buffer[16];
[data getBytes:buffer length:8];
if (!strncmp((const char*)buffer, "Salted__", 8)) {
NSData *decryptedData = [data AES256DecryptWithKey:[[Settings instance] encryptionPassword]];
if (decryptedData) {
if ([decryptedData length] > 0) {
NSString *tmpFileName = FileWithName(@"decrypted-file.org");
[[NSFileManager defaultManager] createFileAtPath:tmpFileName contents:decryptedData attributes:nil];
NSStringEncoding encoding;
NSError *e;
NSString *ret = [NSString stringWithContentsOfFile:tmpFileName usedEncoding:&encoding error:&e];
DeleteFile(FileWithName(@"decrypted-file.org"));
return ret;
} else {
return @"";
}
} else {
*error = [NSString stringWithString:@"Unable to decrypt file"];
return nil;
}
} else {
NSStringEncoding encoding;
NSError *e;
return [NSString stringWithContentsOfFile:filename usedEncoding:&encoding error:&e];
}
}
// From: http://stackoverflow.com/questions/652300/using-md5-hash-on-a-string-in-cocoa
NSString *md5(unsigned char *bytes, size_t len) {
unsigned char result[16];
CC_MD5( bytes, len, result );
return [NSString stringWithFormat:
@"%02X%02X%02X%02X%02X%02X%02X%02X%02X%02X%02X%02X%02X%02X%02X%02X",
result[0], result[1], result[2], result[3],
result[4], result[5], result[6], result[7],
result[8], result[9], result[10], result[11],
result[12], result[13], result[14], result[15]
];
}
static const int SaltPrefixLen = 8;
static const int SaltLen = 8;
void ExtractKeyAndIVFromPassphrase(const char *pass,
const unsigned char *salt,
unsigned char *key, unsigned char *iv)
{
// http://deusty.blogspot.com/2009/04/decrypting-openssl-aes-files-in-c.html
// Link above was very helpful in determing how this should work.
//NSLog(@"salt: %@", [NSString stringWithFormat:
// @"%02X%02X%02X%02X%02X%02X%02X%02X",
// salt[0], salt[1], salt[2], salt[3],
// salt[4], salt[5], salt[6], salt[7]
// ]);
size_t passLen = strlen(pass);
unsigned char lastKey[kCCKeySizeAES128];
unsigned char tmpStr[kCCKeySizeAES128 + passLen + SaltLen];
memcpy(tmpStr, pass, passLen);
memcpy(tmpStr + passLen, &salt[0], SaltLen);
CC_MD5(tmpStr, passLen + SaltLen, lastKey);
memcpy(key, lastKey, kCCKeySizeAES128);
//NSLog(@"key1: %@", md5(tmpStr, passLen + SaltLen));
memcpy(tmpStr, key, kCCKeySizeAES128);
memcpy(tmpStr + kCCKeySizeAES128, pass, passLen);
memcpy(tmpStr + kCCKeySizeAES128 + passLen, &salt[0], SaltLen);
CC_MD5(tmpStr, kCCKeySizeAES128 + passLen + SaltLen, lastKey);
memcpy(key + kCCKeySizeAES128, lastKey, kCCKeySizeAES128);
//NSLog(@"key2: %@", md5(tmpStr, kCCKeySizeAES128 + passLen + SaltLen));
memcpy(tmpStr, lastKey, kCCKeySizeAES128);
memcpy(tmpStr + kCCKeySizeAES128, pass, passLen);
memcpy(tmpStr + kCCKeySizeAES128 + passLen, &salt[0], SaltLen);
CC_MD5(tmpStr, kCCKeySizeAES128 + passLen + SaltLen, iv);
//NSLog(@"iv: %@", md5(tmpStr, kCCKeySizeAES128 + passLen + SaltLen));
}
// From: http://pastie.org/426530
@implementation NSData (AES256)
- (NSData *)AES256EncryptWithKey:(NSString *)passphrase {
unsigned char key[kCCKeySizeAES256];
unsigned char iv[kCCKeySizeAES128];
unsigned char salt[SaltLen];
const unsigned char *bytes = [self bytes];
void *buffer;
size_t bytesLen = [self length];
size_t bufferSize = bytesLen + kCCBlockSizeAES128 + SaltPrefixLen + SaltLen;
// Generate the salt, prepend it to the buffer
time_t now = time(NULL);
memcpy(salt, &now, sizeof(time_t));
buffer = malloc(bufferSize);
bzero(buffer, bufferSize);
strcpy(buffer, "Salted__");
memcpy(buffer+SaltPrefixLen, salt, SaltLen);
ExtractKeyAndIVFromPassphrase([passphrase cStringUsingEncoding:NSASCIIStringEncoding], salt, key, iv);
size_t numBytesEncrypted = 0;
CCCryptorStatus cryptStatus = CCCrypt(kCCEncrypt, kCCAlgorithmAES128, kCCOptionPKCS7Padding,
key, kCCKeySizeAES256,
iv,
bytes, bytesLen,
buffer+SaltPrefixLen+SaltLen, bufferSize-SaltPrefixLen-SaltLen,
&numBytesEncrypted);
if (cryptStatus == kCCSuccess) {
//the returned NSData takes ownership of the buffer and will free it on deallocation
return [NSData dataWithBytesNoCopy:buffer length:(numBytesEncrypted+SaltPrefixLen+SaltLen)];
}
else {
// TODO: Unknown error
}
free(buffer);
return nil;
}
- (NSData *)AES256DecryptWithKey:(NSString *)passphrase {
unsigned char key[kCCKeySizeAES256];
unsigned char iv[kCCKeySizeAES128];
unsigned char salt[SaltLen];
const unsigned char *bytes = [self bytes];
void *buffer;
size_t bytesLen = [self length];
size_t bufferSize = bytesLen + kCCBlockSizeAES128 + 1;
// Extract the salt, advance the byte buffer
memcpy(salt, [self bytes] + SaltPrefixLen, SaltLen);
bytesLen -= (SaltPrefixLen + SaltLen);
bytes += (SaltPrefixLen + SaltLen);
ExtractKeyAndIVFromPassphrase([passphrase cStringUsingEncoding:NSASCIIStringEncoding], salt, key, iv);
buffer = malloc(bufferSize);
bzero(buffer, bufferSize);
size_t numBytesDecrypted = 0;
CCCryptorStatus cryptStatus = CCCrypt(kCCDecrypt, kCCAlgorithmAES128, kCCOptionPKCS7Padding,
key, kCCKeySizeAES256,
iv,
bytes, bytesLen,
buffer, bufferSize,
&numBytesDecrypted);
// Add a null character at the end to terminate the string
// FUTURE TODO: This obviously isn't a good idea if we're handling anything other than text!
((char*)buffer)[numBytesDecrypted++] = '\0';
if (cryptStatus == kCCSuccess) {
//the returned NSData takes ownership of the buffer and will free it on deallocation
return [NSData dataWithBytesNoCopy:buffer length:numBytesDecrypted];
}
else if (cryptStatus == kCCDecodeError) {
// TODO: Error, likely a bad password
}
else {
// TODO: Unknown error
}
free(buffer);
return nil;
}
@end