rockbox/apps/plugins/keybox.c
Johannes Schwarz 73d25744fb FS#10283 simplify plugins' menus by using stringlist with callback (by Teruaki Kawashima - some minor changes by myself)
git-svn-id: svn://svn.rockbox.org/rockbox/trunk@21523 a1c6a512-1295-4272-9138-f99709370657
2009-06-26 17:59:33 +00:00

662 lines
17 KiB
C

/***************************************************************************
* __________ __ ___.
* Open \______ \ ____ ____ | | _\_ |__ _______ ___
* Source | _// _ \_/ ___\| |/ /| __ \ / _ \ \/ /
* Jukebox | | ( <_> ) \___| < | \_\ ( <_> > < <
* Firmware |____|_ /\____/ \___ >__|_ \|___ /\____/__/\_ \
* \/ \/ \/ \/ \/
* $Id$
*
* Copyright (C) 2008 Nils Wallménius
*
* This program is free software; you can redistribute it and/or
* modify it under the terms of the GNU General Public License
* as published by the Free Software Foundation; either version 2
* of the License, or (at your option) any later version.
*
* This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
* KIND, either express or implied.
*
****************************************************************************/
#include "plugin.h"
#include "lib/md5.h"
PLUGIN_HEADER
#define KEYBOX_FILE PLUGIN_APPS_DIR "/keybox.dat"
#define BLOCK_SIZE 8
#define MAX_ENTRIES 12*BLOCK_SIZE /* keep this a multiple of BLOCK_SIZE */
#define FIELD_LEN 32 /* should be enough for anyone ;) */
/* The header begins with the unencrypted salt (4 bytes) padded with 4 bytes of
zeroes. After that comes the encrypted hash of the master password (16 bytes) */
#define HEADER_LEN 24
enum
{
FILE_OPEN_ERROR = -1
};
struct pw_entry
{
bool used;
char title[FIELD_LEN];
char name[FIELD_LEN];
char password[FIELD_LEN];
struct pw_entry *next;
};
struct pw_list
{
struct pw_entry first; /* always points to the first element in the list */
struct pw_entry entries[MAX_ENTRIES];
int num_entries;
} pw_list;
/* use this to access hashes in different ways, not byte order
independent but does it matter? */
union hash
{
uint8_t bytes[16];
uint32_t words[4];
};
static char buffer[sizeof(struct pw_entry)*MAX_ENTRIES];
static int bytes_read = 0; /* bytes read into the buffer */
static struct gui_synclist kb_list;
static union hash key;
static char master_pw[FIELD_LEN];
static uint32_t salt;
static union hash pwhash;
static bool data_changed = false;
static void encrypt_buffer(char *buf, size_t size, uint32_t *key);
static void decrypt_buffer(char *buf, size_t size, uint32_t *key);
/* the following two functions are the reference TEA implementation by
David Wheeler and Roger Needham taken from
http://en.wikipedia.org/wiki/Tiny_Encryption_Algorithm */
static void encrypt(uint32_t* v, uint32_t* k)
{
uint32_t v0=v[0], v1=v[1], sum=0, i; /* set up */
static const uint32_t delta=0x9e3779b9; /* a key schedule constant */
uint32_t k0=k[0], k1=k[1], k2=k[2], k3=k[3]; /* cache key */
for (i=0; i < 32; i++) { /* basic cycle start */
sum += delta;
v0 += ((v1<<4) + k0) ^ (v1 + sum) ^ ((v1>>5) + k1);
v1 += ((v0<<4) + k2) ^ (v0 + sum) ^ ((v0>>5) + k3); /* end cycle */
}
v[0]=v0; v[1]=v1;
}
static void decrypt(uint32_t* v, uint32_t* k)
{
uint32_t v0=v[0], v1=v[1], sum=0xC6EF3720, i; /* set up */
static const uint32_t delta=0x9e3779b9; /* a key schedule constant */
uint32_t k0=k[0], k1=k[1], k2=k[2], k3=k[3]; /* cache key */
for (i=0; i<32; i++) { /* basic cycle start */
v1 -= ((v0<<4) + k2) ^ (v0 + sum) ^ ((v0>>5) + k3);
v0 -= ((v1<<4) + k0) ^ (v1 + sum) ^ ((v1>>5) + k1);
sum -= delta; /* end cycle */
}
v[0]=v0; v[1]=v1;
}
static int context_item_cb(int action, const struct menu_item_ex *this_item)
{
if (action == ACTION_REQUEST_MENUITEM
&& pw_list.num_entries == 0
&& ((intptr_t)this_item) != 0)
{
return ACTION_EXIT_MENUITEM;
}
return action;
}
MENUITEM_STRINGLIST(context_m, "Context menu", context_item_cb,
"Add entry",
"Edit title", "Edit user name", "Edit password",
"Delete entry")
static char * kb_list_cb(int selected_item, void *data,
char *buffer, size_t buffer_len)
{
(void)data;
int i;
struct pw_entry *entry = pw_list.first.next;
for (i = 0; i < selected_item; i++)
{
if (entry)
entry = entry->next;
}
if (!entry)
return NULL;
rb->snprintf(buffer, buffer_len, "%s", entry->title);
return buffer;
}
static void init_ll(void)
{
pw_list.first.next = &pw_list.entries[0];
pw_list.entries[0].next = NULL;
pw_list.num_entries = 0;
}
static void delete_entry(int selected_item)
{
int i;
struct pw_entry *entry = &pw_list.first;
struct pw_entry *entry2;
/* find the entry before the one to delete */
for (i = 0; i < selected_item; i++)
{
if (entry->next)
entry = entry->next;
}
entry2 = entry->next;
if (!entry2)
return;
entry->next = entry2->next;
entry2->used = false;
entry2->name[0] = '\0';
entry2->password[0] = '\0';
entry2->next = NULL;
rb->gui_synclist_set_nb_items(&kb_list, --pw_list.num_entries);
data_changed = true;
}
static void add_entry(int selected_item)
{
int i, j;
struct pw_entry *entry = pw_list.first.next;
for (i = 0; i < MAX_ENTRIES && pw_list.entries[i].used; i++)
;
if (pw_list.entries[i].used)
{
rb->splash(HZ, "Password list full");
return;
}
rb->splash(HZ, "Enter title");
pw_list.entries[i].title[0] = '\0';
if (rb->kbd_input(pw_list.entries[i].title, FIELD_LEN))
return;
rb->splash(HZ, "Enter name");
pw_list.entries[i].name[0] = '\0';
if (rb->kbd_input(pw_list.entries[i].name, FIELD_LEN))
{
pw_list.entries[i].title[0] = '\0';
return;
}
rb->splash(HZ, "Enter password");
pw_list.entries[i].password[0] = '\0';
if (rb->kbd_input(pw_list.entries[i].password, FIELD_LEN))
{
pw_list.entries[i].title[0] = '\0';
pw_list.entries[i].name[0] = '\0';
return;
}
for (j = 0; j < selected_item; j++)
{
if (entry->next)
entry = entry->next;
}
rb->gui_synclist_set_nb_items(&kb_list, ++pw_list.num_entries);
pw_list.entries[i].used = true;
pw_list.entries[i].next = entry->next;
entry->next = &pw_list.entries[i];
if (entry->next == entry)
entry->next = NULL;
data_changed = true;
}
static void edit_title(int selected_item)
{
int i;
struct pw_entry *entry = pw_list.first.next;
for (i = 0; i < selected_item; i++)
{
if (entry->next)
entry = entry->next;
}
if (rb->kbd_input(entry->title, FIELD_LEN) == 0)
data_changed = true;
}
static void edit_name(int selected_item)
{
int i;
struct pw_entry *entry = pw_list.first.next;
for (i = 0; i < selected_item; i++)
{
if (entry->next)
entry = entry->next;
}
if (rb->kbd_input(entry->name, FIELD_LEN) == 0)
data_changed = true;
}
static void edit_pw(int selected_item)
{
int i;
struct pw_entry *entry = pw_list.first.next;
for (i = 0; i < selected_item; i++)
{
if (entry->next)
entry = entry->next;
}
if (rb->kbd_input(entry->password, FIELD_LEN) == 0)
data_changed = true;
}
static void context_menu(int selected_item)
{
int selection, result;
bool exit = false;
do {
result = rb->do_menu(&context_m, &selection, NULL, false);
switch (result) {
case 0:
add_entry(selected_item);
return;
case 1:
edit_title(selected_item);
return;
case 2:
edit_name(selected_item);
return;
case 3:
edit_pw(selected_item);
return;
case 4:
delete_entry(selected_item);
return;
default:
exit = true;
break;
}
rb->yield();
} while (!exit);
}
static void splash_pw(int selected_item)
{
int i;
struct pw_entry *entry = pw_list.first.next;
for (i = 0; i < selected_item; i++)
{
if (entry->next)
entry = entry->next;
}
if (entry->name != '\0')
rb->splashf(0, "%s %s", entry->name, entry->password);
else
rb->splashf(0, "%s", entry->password);
rb->get_action(CONTEXT_STD, TIMEOUT_BLOCK);
}
static void hash_pw(union hash *out)
{
int i;
struct md5_s pw_md5;
InitMD5(&pw_md5);
AddMD5(&pw_md5, master_pw, rb->strlen(master_pw));
EndMD5(&pw_md5);
for (i = 0; i < 4; i++)
out->words[i] = htole32(pw_md5.p_digest[i]);
}
static void make_key(void)
{
int i;
char buf[sizeof(master_pw) + sizeof(salt) + 1];
struct md5_s key_md5;
size_t len = rb->strlen(master_pw);
rb->strncpy(buf, master_pw, sizeof(buf));
rb->memcpy(&buf[len], &salt, sizeof(salt));
InitMD5(&key_md5);
AddMD5(&key_md5, buf, rb->strlen(buf));
EndMD5(&key_md5);
for (i = 0; i < 4; i++)
key.words[i] = key_md5.p_digest[i];
}
static void decrypt_buffer(char *buf, size_t size, uint32_t *key)
{
unsigned int i;
uint32_t block[2];
for (i = 0; i < size/BLOCK_SIZE; i++)
{
rb->memcpy(&block[0], &buf[i*BLOCK_SIZE], sizeof(block));
block[0] = letoh32(block[0]);
block[1] = letoh32(block[1]);
decrypt(&block[0], key);
/* byte swap one block */
block[0] = letoh32(block[0]);
block[1] = letoh32(block[1]);
rb->memcpy(&buf[i*BLOCK_SIZE], &block[0], sizeof(block));
}
}
static void encrypt_buffer(char *buf, size_t size, uint32_t *key)
{
unsigned int i;
uint32_t block[2];
for (i = 0; i < size/BLOCK_SIZE; i++)
{
rb->memcpy(&block[0], &buf[i*BLOCK_SIZE], sizeof(block));
/* byte swap one block */
block[0] = htole32(block[0]);
block[1] = htole32(block[1]);
encrypt(&block[0], key);
block[0] = htole32(block[0]);
block[1] = htole32(block[1]);
rb->memcpy(&buf[i*BLOCK_SIZE], &block[0], sizeof(block));
}
}
static int parse_buffer(void)
{
int i;
int len;
struct pw_entry *entry = pw_list.first.next;
char *start, *end;
start = &buffer[HEADER_LEN];
rb->memcpy(&salt, &buffer[0], sizeof(salt));
make_key();
decrypt_buffer(&buffer[8], bytes_read - 8, &key.words[0]);
if (rb->memcmp(&buffer[8], &pwhash, sizeof(union hash)))
{
rb->splash(HZ*2, "Wrong password");
return -1;
}
for (i = 0; i < MAX_ENTRIES; i++)
{
end = rb->strchr(start, '\0'); /* find eol */
len = end - &buffer[HEADER_LEN];
if ((len > bytes_read + HEADER_LEN) || start == end)
{
break;
}
rb->strncpy(entry->title, start, FIELD_LEN);
start = end + 1;
end = rb->strchr(start, '\0'); /* find eol */
len = end - &buffer[HEADER_LEN];
if (len > bytes_read + HEADER_LEN)
{
break;
}
rb->strncpy(entry->name, start, FIELD_LEN);
start = end + 1;
end = rb->strchr(start, '\0'); /* find eol */
len = end - &buffer[HEADER_LEN];
if (len > bytes_read + HEADER_LEN)
{
break;
}
rb->strncpy(entry->password, start, FIELD_LEN);
start = end + 1;
entry->used = true;
if (i + 1 < MAX_ENTRIES - 1)
{
entry->next = &pw_list.entries[i+1];
entry = entry->next;
}
else
{
break;
}
}
entry->next = NULL;
pw_list.num_entries = i;
rb->gui_synclist_set_nb_items(&kb_list, pw_list.num_entries);
return 0;
}
static void write_output(int fd)
{
size_t bytes_written;
int i;
size_t len, size;
char *p = &buffer[HEADER_LEN]; /* reserve space for salt + hash */
rb->memcpy(&buffer[8], &pwhash, sizeof(union hash));
struct pw_entry *entry = pw_list.first.next;
for (i = 0; i < pw_list.num_entries; i++)
{
len = rb->strlen(entry->title);
rb->strncpy(p, entry->title, len+1);
p += len+1;
len = rb->strlen(entry->name);
rb->strncpy(p, entry->name, len+1);
p += len+1;
len = rb->strlen(entry->password);
rb->strncpy(p, entry->password, len+1);
p += len+1;
if (entry->next)
entry = entry->next;
}
*p++ = '\0'; /* mark the end of the list */
/* round up to a number divisible by BLOCK_SIZE */
size = ((p - buffer + BLOCK_SIZE - 1) / BLOCK_SIZE) * BLOCK_SIZE;
salt = rb->rand();
make_key();
encrypt_buffer(&buffer[8], size, &key.words[0]);
rb->memcpy(&buffer[0], &salt, sizeof(salt));
bytes_written = rb->write(fd, &buffer, size);
}
static int enter_pw(char *pw_buf, size_t buflen, bool new_pw)
{
char buf[2][sizeof(master_pw)];
rb->memset(buf, 0, sizeof(buf));
rb->memset(master_pw, 0, sizeof(master_pw));
if (new_pw)
{
rb->splash(HZ, "Enter new master password");
if (rb->kbd_input(buf[0], sizeof(buf[0])))
return -1;
rb->splash(HZ, "Confirm master password");
if (rb->kbd_input(buf[1], sizeof(buf[1])))
return -1;
if (rb->strcmp(buf[0], buf[1]))
{
rb->splash(HZ, "Password mismatch");
return -1;
}
else
{
rb->strncpy(pw_buf, buf[0], buflen);
hash_pw(&pwhash);
return 0;
}
}
rb->splash(HZ, "Enter master password");
if (rb->kbd_input(pw_buf, buflen))
return -1;
hash_pw(&pwhash);
return 0;
}
static int keybox(void)
{
int button, fd;
bool new_file = !rb->file_exists(KEYBOX_FILE);
bool done = false;
if (enter_pw(master_pw, sizeof (master_pw), new_file))
return 0;
/* Read the existing file */
if (!new_file)
{
fd = rb->open(KEYBOX_FILE, O_RDONLY);
if (fd < 0)
return FILE_OPEN_ERROR;
bytes_read = rb->read(fd, &buffer, sizeof(buffer));
if (parse_buffer())
return 0;
rb->close(fd);
}
while (!done)
{
rb->gui_synclist_draw(&kb_list);
button = rb->get_action(CONTEXT_LIST, TIMEOUT_BLOCK);
if (rb->gui_synclist_do_button(&kb_list, &button, LIST_WRAP_ON))
continue;
switch (button)
{
case ACTION_STD_OK:
splash_pw(rb->gui_synclist_get_sel_pos(&kb_list));
break;
case ACTION_STD_CONTEXT:
context_menu(rb->gui_synclist_get_sel_pos(&kb_list));
break;
case ACTION_STD_CANCEL:
done = true;
break;
}
rb->yield();
}
if (data_changed)
{
fd = rb->open(KEYBOX_FILE, O_WRONLY | O_CREAT | O_TRUNC);
if (fd < 0)
return FILE_OPEN_ERROR;
write_output(fd);
rb->close(fd);
}
return 0;
}
static void reset(void)
{
static const char *message_lines[]=
{"Do you really want", "to reset keybox?"};
static const char *yes_lines[]=
{"Keybox reset."};
static const struct text_message message={message_lines, 2};
static const struct text_message yes_message={yes_lines, 1};
if(rb->gui_syncyesno_run(&message, &yes_message, NULL) == YESNO_YES)
{
rb->remove(KEYBOX_FILE);
rb->memset(&buffer, 0, sizeof(buffer));
rb->memset(&pw_list, 0, sizeof(pw_list));
init_ll();
}
}
static int main_menu(void)
{
int selection, result, ret;
bool exit = false;
MENUITEM_STRINGLIST(menu,"Keybox", NULL, "Enter Keybox",
"Reset Keybox", "Exit");
do {
result = rb->do_menu(&menu, &selection, NULL, false);
switch (result) {
case 0:
ret = keybox();
if (ret)
return ret;
break;
case 1:
reset();
break;
case 2:
exit = true;
break;
}
rb->yield();
} while (!exit);
return 0;
}
enum plugin_status plugin_start(const void *parameter)
{
(void)parameter;
int ret;
rb->gui_synclist_init(&kb_list, &kb_list_cb, NULL, false, 1, NULL);
rb->gui_synclist_set_title(&kb_list, "Keybox", NOICON);
rb->gui_synclist_set_icon_callback(&kb_list, NULL);
rb->gui_synclist_set_nb_items(&kb_list, 0);
rb->gui_synclist_limit_scroll(&kb_list, false);
rb->gui_synclist_select_item(&kb_list, 0);
init_ll();
ret = main_menu();
switch (ret)
{
case FILE_OPEN_ERROR:
rb->splash(HZ*2, "Error opening file");
return PLUGIN_ERROR;
}
return PLUGIN_OK;
}