amnezia-client/client/secureformat.cpp
eugenyorbitsoftcom 3b78c3a929 chiperSettings
2022-07-29 14:58:22 +06:00

201 lines
6 KiB
C++

#include "secureformat.h"
#include <QTextStream>
#include <QVariantMap>
#include <QDebug>
#include "openssl/evp.h"
void handleErrors() {
qDebug() << "handleErrors";
}
int gcm_encrypt(unsigned char *plaintext, int plaintext_len,
unsigned char *key,
unsigned char *iv, int iv_len,
unsigned char *ciphertext)
{
EVP_CIPHER_CTX *ctx;
int len;
int ciphertext_len;
/* Create and initialise the context */
if(!(ctx = EVP_CIPHER_CTX_new()))
handleErrors();
/* Initialise the encryption operation. */
if(1 != EVP_EncryptInit_ex(ctx, EVP_aes_256_gcm(), NULL, NULL, NULL))
handleErrors();
/*
* Set IV length if default 12 bytes (96 bits) is not appropriate
*/
if(1 != EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_GCM_SET_IVLEN, iv_len, NULL))
handleErrors();
/* Initialise key and IV */
if(1 != EVP_EncryptInit_ex(ctx, NULL, NULL, key, iv))
handleErrors();
/*
* Provide the message to be encrypted, and obtain the encrypted output.
* EVP_EncryptUpdate can be called multiple times if necessary
*/
if(1 != EVP_EncryptUpdate(ctx, ciphertext, &len, plaintext, plaintext_len))
handleErrors();
ciphertext_len = len;
/*
* Finalise the encryption. Normally ciphertext bytes may be written at
* this stage, but this does not occur in GCM mode
*/
if(1 != EVP_EncryptFinal_ex(ctx, ciphertext + len, &len))
handleErrors();
ciphertext_len += len;
/* Clean up */
EVP_CIPHER_CTX_free(ctx);
return ciphertext_len;
}
int gcm_decrypt(unsigned char *ciphertext, int ciphertext_len,
unsigned char *key,
unsigned char *iv, int iv_len,
unsigned char *plaintext)
{
EVP_CIPHER_CTX *ctx;
int len;
int plaintext_len;
int ret;
/* Create and initialise the context */
if(!(ctx = EVP_CIPHER_CTX_new()))
handleErrors();
/* Initialise the decryption operation. */
if(!EVP_DecryptInit_ex(ctx, EVP_aes_256_gcm(), NULL, NULL, NULL))
handleErrors();
/* Set IV length. Not necessary if this is 12 bytes (96 bits) */
if(!EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_GCM_SET_IVLEN, iv_len, NULL))
handleErrors();
/* Initialise key and IV */
if(!EVP_DecryptInit_ex(ctx, NULL, NULL, key, iv))
handleErrors();
/*
* Provide the message to be decrypted, and obtain the plaintext output.
* EVP_DecryptUpdate can be called multiple times if necessary
*/
if(!EVP_DecryptUpdate(ctx, plaintext, &len, ciphertext, ciphertext_len))
handleErrors();
plaintext_len = len;
/*
* Finalise the decryption. A positive return value indicates success,
* anything else is a failure - the plaintext is not trustworthy.
*/
ret = EVP_DecryptFinal_ex(ctx, plaintext + len, &len);
/* Clean up */
EVP_CIPHER_CTX_free(ctx);
if(ret > 0) {
/* Success */
plaintext_len += len;
return plaintext_len;
} else {
/* Verify failed */
return -1;
}
}
SecureFormat::SecureFormat()
{
m_format = QSettings::registerFormat("plist",
readSecureFile,
writeSecureFile);
qDebug() << "SecureFormat" << m_format;
}
bool SecureFormat::readSecureFile(QIODevice& device, QSettings::SettingsMap& map) {
if (!device.isOpen()) {
return false;
}
QTextStream inStream(&device);
while (!inStream.atEnd()) {
QString line = inStream.readLine();
qDebug() << "SecureFormat::readSecureFile: " << line;
QStringList keyValue = line.split("<=>");
map.insert(keyValue.first(), keyValue.last());
}
return true;
}
bool SecureFormat::writeSecureFile(QIODevice& device, const QSettings::SettingsMap& map) {
if (!device.isOpen()) {
return false;
}
QTextStream outStream(&device);
auto keys = map.keys();
for (auto key : keys) {
outStream << key << "<=>" << map.value(key).toString();
qDebug() << "SecureFormat::writeSecureFile: " << key << "<=>" << map.value(key).toString();
}
return true;
}
void SecureFormat::chiperSettings(const QSettings &oldSetting, QSettings &newSetting) {
QVariantMap keysValuesPairs;
QStringList keys = oldSetting.allKeys();
QStringListIterator it(keys);
while ( it.hasNext() ) {
QString currentKey = it.next();
keysValuesPairs.insert(currentKey, oldSetting.value(currentKey));
}
unsigned char gcmkey[] = "12345qwerty";
unsigned char iv[] = "000000000000";
for (const QString& key : keys) {
QString value = keysValuesPairs.value(key).toString();
int plainTextSize = value.toUtf8().size();
unsigned char* plainText = new unsigned char[plainTextSize];
std::memcpy(plainText, value.toUtf8().constData(), plainTextSize);
unsigned char chipherText[UINT16_MAX];
int chipherTextSize = gcm_encrypt(plainText, plainTextSize,
gcmkey,
iv, 12,
chipherText);
QByteArray qChipherArray = QByteArray::fromRawData((const char *)chipherText, chipherTextSize);
// unsigned char decryptPlainText[UINT16_MAX];
// gcm_decrypt((unsigned char*)qChipherArray.data(), qChipherArray.size(),
// gcmkey,
// iv, 12,
// decryptPlainText);
// QString qDecryptPlainText = QString::fromUtf8((const char *)decryptPlainText);
// qDebug() << "qDecryptPlainText:" << qDecryptPlainText;
newSetting.setValue(key, qChipherArray);
}
// newSetting.sync();
// qDebug() << "newSetting.allKeys(): " << newSetting.allKeys();
// for (const QString& key : newSetting.allKeys()) {
// QString value = keysValuesPairs.value(key).toString();
// qDebug() << "newSetting value: " << value;
// }
}
const QSettings::Format& SecureFormat::format() const{
return m_format;
}