forked from lastpass/lastpass-cli
-
Notifications
You must be signed in to change notification settings - Fork 0
/
session.c
99 lines (92 loc) · 2.84 KB
/
session.c
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
/*
* Copyright (c) 2014 LastPass.
*
*
*/
#include "xml.h"
#include "config.h"
#include "util.h"
#include "cipher.h"
#include <sys/mman.h>
#include <string.h>
struct session *session_new(void)
{
return new0(struct session, 1);
}
void session_free(struct session *session)
{
if (!session)
return;
free(session->uid);
free(session->sessionid);
free(session->token);
free(session->private_key.key);
free(session);
}
bool session_is_valid(struct session *session)
{
return session && session->uid && session->sessionid && session->token;
}
void session_set_private_key(struct session *session, unsigned const char key[KDF_HASH_LEN], const char *key_hex)
{
#define start_str "LastPassPrivateKey<"
#define end_str ">LastPassPrivateKey"
size_t len;
_cleanup_free_ char *encrypted_key = NULL;
_cleanup_free_ char *decrypted_key = NULL;
char *encrypted_key_start, *start, *end;
len = strlen(key_hex);
if (len % 2 != 0)
die("Key hex in wrong format.");
len /= 2;
len += 16 /* IV */ + 1 /* pound symbol */;
encrypted_key = xcalloc(len + 1, 1);
encrypted_key[0] = '!';
memcpy(&encrypted_key[1], key, 16);
encrypted_key_start = &encrypted_key[17];
hex_to_bytes(key_hex, &encrypted_key_start);
decrypted_key = cipher_aes_decrypt(encrypted_key, len, key);
if (!decrypted_key)
warn("Could not decrypt private key.");
else {
start = strstr(decrypted_key, start_str);
end = strstr(decrypted_key, end_str);
if (!start || !end || end <= start)
warn("Could not decode decrypted private key.");
else {
start += strlen(start_str);
*end = '\0';
len = strlen(start);
if (len % 2 != 0)
die("Invalid private key after decryption and decoding.");
len /= 2;
hex_to_bytes(start, (char **)&session->private_key.key);
session->private_key.len = len;
mlock(session->private_key.key, len);
}
}
#undef start_str
#undef end_str
}
void session_save(struct session *session, unsigned const char key[KDF_HASH_LEN])
{
config_write_encrypted_string("session_uid", session->uid, key);
config_write_encrypted_string("session_sessionid", session->sessionid, key);
config_write_encrypted_string("session_token", session->token, key);
config_write_encrypted_buffer("session_privatekey", (char *)session->private_key.key, session->private_key.len, key);
}
struct session *sesssion_load(unsigned const char key[KDF_HASH_LEN])
{
struct session *session = session_new();
session->uid = config_read_encrypted_string("session_uid", key);
session->sessionid = config_read_encrypted_string("session_sessionid", key);
session->token = config_read_encrypted_string("session_token", key);
session->private_key.len = config_read_encrypted_buffer("session_privatekey", (char **)&session->private_key.key, key);
mlock(session->private_key.key, session->private_key.len);
if (session_is_valid(session))
return session;
else {
session_free(session);
return NULL;
}
}