This commit is contained in:
RogueMaster
2022-10-17 10:24:19 -04:00
parent 441e0fad45
commit 8f416c9304
48 changed files with 2235 additions and 1769 deletions

View File

@@ -62,7 +62,9 @@ static void on_token_secret_user_comitted(InputTextSceneCallbackResult* result)
free(result); free(result);
} }
void totp_scene_add_new_token_activate(PluginState* plugin_state, const TokenAddEditSceneContext* context) { void totp_scene_add_new_token_activate(
PluginState* plugin_state,
const TokenAddEditSceneContext* context) {
SceneState* scene_state = malloc(sizeof(SceneState)); SceneState* scene_state = malloc(sizeof(SceneState));
plugin_state->current_scene_state = scene_state; plugin_state->current_scene_state = scene_state;
scene_state->token_name = "Name"; scene_state->token_name = "Name";
@@ -98,11 +100,38 @@ void totp_scene_add_new_token_render(Canvas* const canvas, PluginState* plugin_s
return; return;
} }
ui_control_text_box_render(canvas, 10 - scene_state->screen_y_offset, scene_state->token_name, scene_state->selected_control == TokenNameTextBox); ui_control_text_box_render(
ui_control_text_box_render(canvas, 27 - scene_state->screen_y_offset, scene_state->token_secret, scene_state->selected_control == TokenSecretTextBox); canvas,
ui_control_select_render(canvas, 0, 44 - scene_state->screen_y_offset, SCREEN_WIDTH, TOKEN_ALGO_LIST[scene_state->algo], scene_state->selected_control == TokenAlgoSelect); 10 - scene_state->screen_y_offset,
ui_control_select_render(canvas, 0, 63 - scene_state->screen_y_offset, SCREEN_WIDTH, TOKEN_DIGITS_LIST[scene_state->digits_count], scene_state->selected_control == TokenLengthSelect); scene_state->token_name,
ui_control_button_render(canvas, SCREEN_WIDTH_CENTER - 24, 85 - scene_state->screen_y_offset, 48, 13, "Confirm", scene_state->selected_control == ConfirmButton); scene_state->selected_control == TokenNameTextBox);
ui_control_text_box_render(
canvas,
27 - scene_state->screen_y_offset,
scene_state->token_secret,
scene_state->selected_control == TokenSecretTextBox);
ui_control_select_render(
canvas,
0,
44 - scene_state->screen_y_offset,
SCREEN_WIDTH,
TOKEN_ALGO_LIST[scene_state->algo],
scene_state->selected_control == TokenAlgoSelect);
ui_control_select_render(
canvas,
0,
63 - scene_state->screen_y_offset,
SCREEN_WIDTH,
TOKEN_DIGITS_LIST[scene_state->digits_count],
scene_state->selected_control == TokenLengthSelect);
ui_control_button_render(
canvas,
SCREEN_WIDTH_CENTER - 24,
85 - scene_state->screen_y_offset,
48,
13,
"Confirm",
scene_state->selected_control == ConfirmButton);
canvas_set_color(canvas, ColorWhite); canvas_set_color(canvas, ColorWhite);
canvas_draw_box(canvas, 0, 0, SCREEN_WIDTH, 10); canvas_draw_box(canvas, 0, 0, SCREEN_WIDTH, 10);
@@ -123,7 +152,8 @@ void update_screen_y_offset(SceneState* scene_state) {
bool totp_scene_add_new_token_handle_event(PluginEvent* const event, PluginState* plugin_state) { bool totp_scene_add_new_token_handle_event(PluginEvent* const event, PluginState* plugin_state) {
if(event->type == EventTypeKey) { if(event->type == EventTypeKey) {
SceneState* scene_state = (SceneState*)plugin_state->current_scene_state; SceneState* scene_state = (SceneState*)plugin_state->current_scene_state;
if (scene_state->input_started_at > 0 && furi_get_tick() - scene_state->input_started_at > 300) { if(scene_state->input_started_at > 0 &&
furi_get_tick() - scene_state->input_started_at > 300) {
return totp_input_text_handle_event(event, scene_state->input_state); return totp_input_text_handle_event(event, scene_state->input_state);
} }
@@ -150,8 +180,7 @@ bool totp_scene_add_new_token_handle_event(PluginEvent* const event, PluginState
} else { } else {
scene_state->algo = SHA1; scene_state->algo = SHA1;
} }
} } else if(scene_state->selected_control == TokenLengthSelect) {
else if (scene_state->selected_control == TokenLengthSelect) {
if(scene_state->digits_count < TOTP_8_DIGITS) { if(scene_state->digits_count < TOTP_8_DIGITS) {
scene_state->digits_count++; scene_state->digits_count++;
} else { } else {
@@ -166,8 +195,7 @@ bool totp_scene_add_new_token_handle_event(PluginEvent* const event, PluginState
} else { } else {
scene_state->algo = SHA512; scene_state->algo = SHA512;
} }
} } else if(scene_state->selected_control == TokenLengthSelect) {
else if (scene_state->selected_control == TokenLengthSelect) {
if(scene_state->digits_count > TOTP_6_DIGITS) { if(scene_state->digits_count > TOTP_6_DIGITS) {
scene_state->digits_count--; scene_state->digits_count--;
} else { } else {
@@ -181,14 +209,16 @@ bool totp_scene_add_new_token_handle_event(PluginEvent* const event, PluginState
if(scene_state->input_state != NULL) { if(scene_state->input_state != NULL) {
totp_input_text_free(scene_state->input_state); totp_input_text_free(scene_state->input_state);
} }
scene_state->input_state = totp_input_text_activate(scene_state->token_name_input_context); scene_state->input_state =
totp_input_text_activate(scene_state->token_name_input_context);
scene_state->input_started_at = furi_get_tick(); scene_state->input_started_at = furi_get_tick();
break; break;
case TokenSecretTextBox: case TokenSecretTextBox:
if(scene_state->input_state != NULL) { if(scene_state->input_state != NULL) {
totp_input_text_free(scene_state->input_state); totp_input_text_free(scene_state->input_state);
} }
scene_state->input_state = totp_input_text_activate(scene_state->token_secret_input_context); scene_state->input_state =
totp_input_text_activate(scene_state->token_secret_input_context);
scene_state->input_started_at = furi_get_tick(); scene_state->input_started_at = furi_get_tick();
break; break;
case TokenAlgoSelect: case TokenAlgoSelect:
@@ -200,7 +230,11 @@ bool totp_scene_add_new_token_handle_event(PluginEvent* const event, PluginState
tokenInfo->name = malloc(scene_state->token_name_length + 1); tokenInfo->name = malloc(scene_state->token_name_length + 1);
strcpy(tokenInfo->name, scene_state->token_name); strcpy(tokenInfo->name, scene_state->token_name);
token_info_set_secret(tokenInfo, scene_state->token_secret, scene_state->token_secret_length, &plugin_state->iv[0]); token_info_set_secret(
tokenInfo,
scene_state->token_secret,
scene_state->token_secret_length,
&plugin_state->iv[0]);
tokenInfo->algo = scene_state->algo; tokenInfo->algo = scene_state->algo;
tokenInfo->digits = scene_state->digits_count; tokenInfo->digits = scene_state->digits_count;
@@ -214,16 +248,20 @@ bool totp_scene_add_new_token_handle_event(PluginEvent* const event, PluginState
totp_config_file_save_new_token(tokenInfo); totp_config_file_save_new_token(tokenInfo);
GenerateTokenSceneContext generate_scene_context = { .current_token_index = plugin_state->tokens_count - 1 }; GenerateTokenSceneContext generate_scene_context = {
totp_scene_director_activate_scene(plugin_state, TotpSceneGenerateToken, &generate_scene_context); .current_token_index = plugin_state->tokens_count - 1};
totp_scene_director_activate_scene(
plugin_state, TotpSceneGenerateToken, &generate_scene_context);
break; break;
} }
} }
break; break;
case InputKeyBack: case InputKeyBack:
if(scene_state->current_token_index >= 0) { if(scene_state->current_token_index >= 0) {
GenerateTokenSceneContext generate_scene_context = { .current_token_index = scene_state->current_token_index }; GenerateTokenSceneContext generate_scene_context = {
totp_scene_director_activate_scene(plugin_state, TotpSceneGenerateToken, &generate_scene_context); .current_token_index = scene_state->current_token_index};
totp_scene_director_activate_scene(
plugin_state, TotpSceneGenerateToken, &generate_scene_context);
} else { } else {
totp_scene_director_activate_scene(plugin_state, TotpSceneGenerateToken, NULL); totp_scene_director_activate_scene(plugin_state, TotpSceneGenerateToken, NULL);
} }

View File

@@ -11,7 +11,9 @@ typedef struct {
} TokenAddEditSceneContext; } TokenAddEditSceneContext;
void totp_scene_add_new_token_init(PluginState* plugin_state); void totp_scene_add_new_token_init(PluginState* plugin_state);
void totp_scene_add_new_token_activate(PluginState* plugin_state, const TokenAddEditSceneContext* context); void totp_scene_add_new_token_activate(
PluginState* plugin_state,
const TokenAddEditSceneContext* context);
void totp_scene_add_new_token_render(Canvas* const canvas, PluginState* plugin_state); void totp_scene_add_new_token_render(Canvas* const canvas, PluginState* plugin_state);
bool totp_scene_add_new_token_handle_event(PluginEvent* const event, PluginState* plugin_state); bool totp_scene_add_new_token_handle_event(PluginEvent* const event, PluginState* plugin_state);
void totp_scene_add_new_token_deactivate(PluginState* plugin_state); void totp_scene_add_new_token_deactivate(PluginState* plugin_state);

View File

@@ -7,11 +7,7 @@
#define DIGIT_TO_CHAR(digit) ((digit) + '0') #define DIGIT_TO_CHAR(digit) ((digit) + '0')
typedef enum { typedef enum { HoursInput, MinutesInput, ConfirmButton } Control;
HoursInput,
MinutesInput,
ConfirmButton
} Control;
typedef struct { typedef struct {
int8_t tz_offset_hours; int8_t tz_offset_hours;
@@ -24,7 +20,9 @@ void totp_scene_app_settings_init(PluginState* plugin_state) {
UNUSED(plugin_state); UNUSED(plugin_state);
} }
void totp_scene_app_settings_activate(PluginState* plugin_state, const AppSettingsSceneContext* context) { void totp_scene_app_settings_activate(
PluginState* plugin_state,
const AppSettingsSceneContext* context) {
SceneState* scene_state = malloc(sizeof(SceneState)); SceneState* scene_state = malloc(sizeof(SceneState));
plugin_state->current_scene_state = scene_state; plugin_state->current_scene_state = scene_state;
if(context != NULL) { if(context != NULL) {
@@ -64,13 +62,32 @@ void totp_scene_app_settings_render(Canvas* const canvas, PluginState* plugin_st
char tmp_str[4]; char tmp_str[4];
two_digit_to_str(scene_state->tz_offset_hours, &tmp_str[0]); two_digit_to_str(scene_state->tz_offset_hours, &tmp_str[0]);
canvas_draw_str_aligned(canvas, 0, 16, AlignLeft, AlignTop, "Hours:"); canvas_draw_str_aligned(canvas, 0, 16, AlignLeft, AlignTop, "Hours:");
ui_control_select_render(canvas, 36, 10, SCREEN_WIDTH - 36, &tmp_str[0], scene_state->selected_control == HoursInput); ui_control_select_render(
canvas,
36,
10,
SCREEN_WIDTH - 36,
&tmp_str[0],
scene_state->selected_control == HoursInput);
two_digit_to_str(scene_state->tz_offset_minutes, &tmp_str[0]); two_digit_to_str(scene_state->tz_offset_minutes, &tmp_str[0]);
canvas_draw_str_aligned(canvas, 0, 34, AlignLeft, AlignTop, "Minutes:"); canvas_draw_str_aligned(canvas, 0, 34, AlignLeft, AlignTop, "Minutes:");
ui_control_select_render(canvas, 36, 28, SCREEN_WIDTH - 36, &tmp_str[0], scene_state->selected_control == MinutesInput); ui_control_select_render(
canvas,
36,
28,
SCREEN_WIDTH - 36,
&tmp_str[0],
scene_state->selected_control == MinutesInput);
ui_control_button_render(canvas, SCREEN_WIDTH_CENTER - 24, 50, 48, 13, "Confirm", scene_state->selected_control == ConfirmButton); ui_control_button_render(
canvas,
SCREEN_WIDTH_CENTER - 24,
50,
48,
13,
"Confirm",
scene_state->selected_control == ConfirmButton);
} }
bool totp_scene_app_settings_handle_event(PluginEvent* const event, PluginState* plugin_state) { bool totp_scene_app_settings_handle_event(PluginEvent* const event, PluginState* plugin_state) {
@@ -116,12 +133,15 @@ bool totp_scene_app_settings_handle_event(PluginEvent* const event, PluginState*
break; break;
case InputKeyOk: case InputKeyOk:
if(scene_state->selected_control == ConfirmButton) { if(scene_state->selected_control == ConfirmButton) {
plugin_state->timezone_offset = (float)scene_state->tz_offset_hours + (float)scene_state->tz_offset_minutes / 60.0f; plugin_state->timezone_offset = (float)scene_state->tz_offset_hours +
(float)scene_state->tz_offset_minutes / 60.0f;
totp_config_file_update_timezone_offset(plugin_state->timezone_offset); totp_config_file_update_timezone_offset(plugin_state->timezone_offset);
if(scene_state->current_token_index >= 0) { if(scene_state->current_token_index >= 0) {
TokenMenuSceneContext generate_scene_context = { .current_token_index = scene_state->current_token_index }; TokenMenuSceneContext generate_scene_context = {
totp_scene_director_activate_scene(plugin_state, TotpSceneTokenMenu, &generate_scene_context); .current_token_index = scene_state->current_token_index};
totp_scene_director_activate_scene(
plugin_state, TotpSceneTokenMenu, &generate_scene_context);
} else { } else {
totp_scene_director_activate_scene(plugin_state, TotpSceneTokenMenu, NULL); totp_scene_director_activate_scene(plugin_state, TotpSceneTokenMenu, NULL);
} }
@@ -129,8 +149,10 @@ bool totp_scene_app_settings_handle_event(PluginEvent* const event, PluginState*
break; break;
case InputKeyBack: { case InputKeyBack: {
if(scene_state->current_token_index >= 0) { if(scene_state->current_token_index >= 0) {
TokenMenuSceneContext generate_scene_context = { .current_token_index = scene_state->current_token_index }; TokenMenuSceneContext generate_scene_context = {
totp_scene_director_activate_scene(plugin_state, TotpSceneTokenMenu, &generate_scene_context); .current_token_index = scene_state->current_token_index};
totp_scene_director_activate_scene(
plugin_state, TotpSceneTokenMenu, &generate_scene_context);
} else { } else {
totp_scene_director_activate_scene(plugin_state, TotpSceneTokenMenu, NULL); totp_scene_director_activate_scene(plugin_state, TotpSceneTokenMenu, NULL);
} }

View File

@@ -11,7 +11,9 @@ typedef struct {
} AppSettingsSceneContext; } AppSettingsSceneContext;
void totp_scene_app_settings_init(PluginState* plugin_state); void totp_scene_app_settings_init(PluginState* plugin_state);
void totp_scene_app_settings_activate(PluginState* plugin_state, const AppSettingsSceneContext* context); void totp_scene_app_settings_activate(
PluginState* plugin_state,
const AppSettingsSceneContext* context);
void totp_scene_app_settings_render(Canvas* const canvas, PluginState* plugin_state); void totp_scene_app_settings_render(Canvas* const canvas, PluginState* plugin_state);
bool totp_scene_app_settings_handle_event(PluginEvent* const event, PluginState* plugin_state); bool totp_scene_app_settings_handle_event(PluginEvent* const event, PluginState* plugin_state);
void totp_scene_app_settings_deactivate(PluginState* plugin_state); void totp_scene_app_settings_deactivate(PluginState* plugin_state);

View File

@@ -35,10 +35,28 @@ void totp_scene_authenticate_render(Canvas* const canvas, PluginState* plugin_st
} }
if(plugin_state->crypto_verify_data == NULL) { if(plugin_state->crypto_verify_data == NULL) {
canvas_draw_str_aligned(canvas, SCREEN_WIDTH_CENTER, SCREEN_HEIGHT_CENTER - 10 + v_shift, AlignCenter, AlignCenter, "Use arrow keys"); canvas_draw_str_aligned(
canvas_draw_str_aligned(canvas, SCREEN_WIDTH_CENTER, SCREEN_HEIGHT_CENTER + 5 + v_shift, AlignCenter, AlignCenter, "to setup new PIN"); canvas,
SCREEN_WIDTH_CENTER,
SCREEN_HEIGHT_CENTER - 10 + v_shift,
AlignCenter,
AlignCenter,
"Use arrow keys");
canvas_draw_str_aligned(
canvas,
SCREEN_WIDTH_CENTER,
SCREEN_HEIGHT_CENTER + 5 + v_shift,
AlignCenter,
AlignCenter,
"to setup new PIN");
} else { } else {
canvas_draw_str_aligned(canvas, SCREEN_WIDTH_CENTER, SCREEN_HEIGHT_CENTER + v_shift, AlignCenter, AlignCenter, "Use arrow keys to enter PIN"); canvas_draw_str_aligned(
canvas,
SCREEN_WIDTH_CENTER,
SCREEN_HEIGHT_CENTER + v_shift,
AlignCenter,
AlignCenter,
"Use arrow keys to enter PIN");
} }
const uint8_t PIN_ASTERISK_RADIUS = 3; const uint8_t PIN_ASTERISK_RADIUS = 3;
const uint8_t PIN_ASTERISK_STEP = (PIN_ASTERISK_RADIUS << 1) + 2; const uint8_t PIN_ASTERISK_STEP = (PIN_ASTERISK_RADIUS << 1) + 2;
@@ -92,7 +110,8 @@ bool totp_scene_authenticate_handle_event(PluginEvent* const event, PluginState*
} }
break; break;
case InputKeyOk: case InputKeyOk:
totp_crypto_seed_iv(plugin_state, &scene_state->code_input[0], scene_state->code_length); totp_crypto_seed_iv(
plugin_state, &scene_state->code_input[0], scene_state->code_length);
if(totp_crypto_verify_key(plugin_state)) { if(totp_crypto_verify_key(plugin_state)) {
FURI_LOG_D(LOGGING_TAG, "PIN is valid"); FURI_LOG_D(LOGGING_TAG, "PIN is valid");
@@ -105,7 +124,13 @@ bool totp_scene_authenticate_handle_event(PluginEvent* const event, PluginState*
DialogMessage* message = dialog_message_alloc(); DialogMessage* message = dialog_message_alloc();
dialog_message_set_buttons(message, "Try again", NULL, NULL); dialog_message_set_buttons(message, "Try again", NULL, NULL);
dialog_message_set_header(message, "You entered\ninvalid PIN", SCREEN_WIDTH_CENTER - 25, SCREEN_HEIGHT_CENTER - 5, AlignCenter, AlignCenter); dialog_message_set_header(
message,
"You entered\ninvalid PIN",
SCREEN_WIDTH_CENTER - 25,
SCREEN_HEIGHT_CENTER - 5,
AlignCenter,
AlignCenter);
dialog_message_set_icon(message, &I_DolphinCommon_56x48, 72, 17); dialog_message_set_icon(message, &I_DolphinCommon_56x48, 72, 17);
dialog_message_show(plugin_state->dialogs, message); dialog_message_show(plugin_state->dialogs, message);
dialog_message_free(message); dialog_message_free(message);

View File

@@ -72,9 +72,12 @@ static void i_token_to_str(uint32_t i_token_code, char* str, TokenDigitsCount le
TOTP_ALGO get_totp_algo_impl(TokenHashAlgo algo) { TOTP_ALGO get_totp_algo_impl(TokenHashAlgo algo) {
switch(algo) { switch(algo) {
case SHA1: return TOTP_ALGO_SHA1; case SHA1:
case SHA256: return TOTP_ALGO_SHA256; return TOTP_ALGO_SHA1;
case SHA512: return TOTP_ALGO_SHA512; case SHA256:
return TOTP_ALGO_SHA256;
case SHA512:
return TOTP_ALGO_SHA512;
} }
return NULL; return NULL;
@@ -84,7 +87,10 @@ void update_totp_params(PluginState* const plugin_state) {
SceneState* scene_state = (SceneState*)plugin_state->current_scene_state; SceneState* scene_state = (SceneState*)plugin_state->current_scene_state;
if(scene_state->current_token_index < plugin_state->tokens_count) { if(scene_state->current_token_index < plugin_state->tokens_count) {
TokenInfo* tokenInfo = (TokenInfo *)(list_element_at(plugin_state->tokens_list, scene_state->current_token_index)->data); TokenInfo* tokenInfo =
(TokenInfo*)(list_element_at(
plugin_state->tokens_list, scene_state->current_token_index)
->data);
scene_state->need_token_update = true; scene_state->need_token_update = true;
scene_state->last_code_name = tokenInfo->name; scene_state->last_code_name = tokenInfo->name;
@@ -95,7 +101,9 @@ void totp_scene_generate_token_init(PluginState* plugin_state) {
UNUSED(plugin_state); UNUSED(plugin_state);
} }
void totp_scene_generate_token_activate(PluginState* plugin_state, const GenerateTokenSceneContext* context) { void totp_scene_generate_token_activate(
PluginState* plugin_state,
const GenerateTokenSceneContext* context) {
if(!plugin_state->token_list_loaded) { if(!plugin_state->token_list_loaded) {
totp_config_file_load_tokens(plugin_state); totp_config_file_load_tokens(plugin_state);
} }
@@ -113,8 +121,20 @@ void totp_scene_generate_token_activate(PluginState* plugin_state, const Generat
void totp_scene_generate_token_render(Canvas* const canvas, PluginState* plugin_state) { void totp_scene_generate_token_render(Canvas* const canvas, PluginState* plugin_state) {
if(plugin_state->tokens_count == 0) { if(plugin_state->tokens_count == 0) {
canvas_draw_str_aligned(canvas, SCREEN_WIDTH_CENTER, SCREEN_HEIGHT_CENTER - 10, AlignCenter, AlignCenter, "Token list is empty"); canvas_draw_str_aligned(
canvas_draw_str_aligned(canvas, SCREEN_WIDTH_CENTER, SCREEN_HEIGHT_CENTER + 10, AlignCenter, AlignCenter, "Press OK button to add"); canvas,
SCREEN_WIDTH_CENTER,
SCREEN_HEIGHT_CENTER - 10,
AlignCenter,
AlignCenter,
"Token list is empty");
canvas_draw_str_aligned(
canvas,
SCREEN_WIDTH_CENTER,
SCREEN_HEIGHT_CENTER + 10,
AlignCenter,
AlignCenter,
"Press OK button to add");
return; return;
} }
@@ -132,12 +152,26 @@ void totp_scene_generate_token_render(Canvas* const canvas, PluginState* plugin_
scene_state->need_token_update = false; scene_state->need_token_update = false;
scene_state->last_token_gen_time = curr_ts; scene_state->last_token_gen_time = curr_ts;
TokenInfo* tokenInfo = (TokenInfo*)(list_element_at(plugin_state->tokens_list, scene_state->current_token_index)->data); TokenInfo* tokenInfo =
(TokenInfo*)(list_element_at(
plugin_state->tokens_list, scene_state->current_token_index)
->data);
uint8_t key_length; uint8_t key_length;
uint8_t* key = totp_crypto_decrypt(tokenInfo->token, tokenInfo->token_length, &plugin_state->iv[0], &key_length); uint8_t* key = totp_crypto_decrypt(
tokenInfo->token, tokenInfo->token_length, &plugin_state->iv[0], &key_length);
i_token_to_str(totp_at(get_totp_algo_impl(tokenInfo->algo), token_info_get_digits_count(tokenInfo), key, key_length, curr_ts, plugin_state->timezone_offset, TOKEN_LIFETIME), scene_state->last_code, tokenInfo->digits); i_token_to_str(
totp_at(
get_totp_algo_impl(tokenInfo->algo),
token_info_get_digits_count(tokenInfo),
key,
key_length,
curr_ts,
plugin_state->timezone_offset,
TOKEN_LIFETIME),
scene_state->last_code,
tokenInfo->digits);
memset(key, 0, key_length); memset(key, 0, key_length);
free(key); free(key);
@@ -149,9 +183,21 @@ void totp_scene_generate_token_render(Canvas* const canvas, PluginState* plugin_
canvas_set_font(canvas, FontPrimary); canvas_set_font(canvas, FontPrimary);
uint16_t token_name_width = canvas_string_width(canvas, scene_state->last_code_name); uint16_t token_name_width = canvas_string_width(canvas, scene_state->last_code_name);
if(SCREEN_WIDTH - token_name_width > 18) { if(SCREEN_WIDTH - token_name_width > 18) {
canvas_draw_str_aligned(canvas, SCREEN_WIDTH_CENTER, SCREEN_HEIGHT_CENTER - 20, AlignCenter, AlignCenter, scene_state->last_code_name); canvas_draw_str_aligned(
canvas,
SCREEN_WIDTH_CENTER,
SCREEN_HEIGHT_CENTER - 20,
AlignCenter,
AlignCenter,
scene_state->last_code_name);
} else { } else {
canvas_draw_str_aligned(canvas, 9, SCREEN_HEIGHT_CENTER - 20, AlignLeft, AlignCenter, scene_state->last_code_name); canvas_draw_str_aligned(
canvas,
9,
SCREEN_HEIGHT_CENTER - 20,
AlignLeft,
AlignCenter,
scene_state->last_code_name);
canvas_set_color(canvas, ColorWhite); canvas_set_color(canvas, ColorWhite);
canvas_draw_box(canvas, 0, SCREEN_HEIGHT_CENTER - 24, 9, 9); canvas_draw_box(canvas, 0, SCREEN_HEIGHT_CENTER - 24, 9, 9);
canvas_draw_box(canvas, SCREEN_WIDTH - 10, SCREEN_HEIGHT_CENTER - 24, 9, 9); canvas_draw_box(canvas, SCREEN_WIDTH - 10, SCREEN_HEIGHT_CENTER - 24, 9, 9);
@@ -159,7 +205,13 @@ void totp_scene_generate_token_render(Canvas* const canvas, PluginState* plugin_
} }
canvas_set_font(canvas, FontBigNumbers); canvas_set_font(canvas, FontBigNumbers);
canvas_draw_str_aligned(canvas, SCREEN_WIDTH_CENTER, SCREEN_HEIGHT_CENTER, AlignCenter, AlignCenter, scene_state->last_code); canvas_draw_str_aligned(
canvas,
SCREEN_WIDTH_CENTER,
SCREEN_HEIGHT_CENTER,
AlignCenter,
AlignCenter,
scene_state->last_code);
const uint8_t BAR_MARGIN = 3; const uint8_t BAR_MARGIN = 3;
const uint8_t BAR_HEIGHT = 4; const uint8_t BAR_HEIGHT = 4;
@@ -167,16 +219,23 @@ void totp_scene_generate_token_render(Canvas* const canvas, PluginState* plugin_
uint8_t barWidth = (uint8_t)((float)(SCREEN_WIDTH - (BAR_MARGIN << 1)) * percentDone); uint8_t barWidth = (uint8_t)((float)(SCREEN_WIDTH - (BAR_MARGIN << 1)) * percentDone);
uint8_t barX = ((SCREEN_WIDTH - (BAR_MARGIN << 1) - barWidth) >> 1) + BAR_MARGIN; uint8_t barX = ((SCREEN_WIDTH - (BAR_MARGIN << 1) - barWidth) >> 1) + BAR_MARGIN;
canvas_draw_box( canvas_draw_box(canvas, barX, SCREEN_HEIGHT - BAR_MARGIN - BAR_HEIGHT, barWidth, BAR_HEIGHT);
canvas,
barX,
SCREEN_HEIGHT - BAR_MARGIN - BAR_HEIGHT,
barWidth,
BAR_HEIGHT);
if(plugin_state->tokens_count > 1) { if(plugin_state->tokens_count > 1) {
canvas_draw_xbm(canvas, 0, SCREEN_HEIGHT_CENTER - 24, ICON_ARROW_LEFT_8x9_WIDTH, ICON_ARROW_LEFT_8x9_HEIGHT, &ICON_ARROW_LEFT_8x9[0]); canvas_draw_xbm(
canvas_draw_xbm(canvas, SCREEN_WIDTH - 9, SCREEN_HEIGHT_CENTER - 24, ICON_ARROW_RIGHT_8x9_WIDTH, ICON_ARROW_RIGHT_8x9_HEIGHT, &ICON_ARROW_RIGHT_8x9[0]); canvas,
0,
SCREEN_HEIGHT_CENTER - 24,
ICON_ARROW_LEFT_8x9_WIDTH,
ICON_ARROW_LEFT_8x9_HEIGHT,
&ICON_ARROW_LEFT_8x9[0]);
canvas_draw_xbm(
canvas,
SCREEN_WIDTH - 9,
SCREEN_HEIGHT_CENTER - 24,
ICON_ARROW_RIGHT_8x9_WIDTH,
ICON_ARROW_RIGHT_8x9_HEIGHT,
&ICON_ARROW_RIGHT_8x9[0]);
} }
} }
@@ -211,7 +270,8 @@ bool totp_scene_generate_token_handle_event(PluginEvent* const event, PluginStat
if(plugin_state->tokens_count == 0) { if(plugin_state->tokens_count == 0) {
totp_scene_director_activate_scene(plugin_state, TotpSceneTokenMenu, NULL); totp_scene_director_activate_scene(plugin_state, TotpSceneTokenMenu, NULL);
} else { } else {
TokenMenuSceneContext ctx = { .current_token_index = scene_state->current_token_index }; TokenMenuSceneContext ctx = {
.current_token_index = scene_state->current_token_index};
totp_scene_director_activate_scene(plugin_state, TotpSceneTokenMenu, &ctx); totp_scene_director_activate_scene(plugin_state, TotpSceneTokenMenu, &ctx);
} }
break; break;

View File

@@ -11,7 +11,9 @@ typedef struct {
} GenerateTokenSceneContext; } GenerateTokenSceneContext;
void totp_scene_generate_token_init(PluginState* plugin_state); void totp_scene_generate_token_init(PluginState* plugin_state);
void totp_scene_generate_token_activate(PluginState* plugin_state, const GenerateTokenSceneContext* context); void totp_scene_generate_token_activate(
PluginState* plugin_state,
const GenerateTokenSceneContext* context);
void totp_scene_generate_token_render(Canvas* const canvas, PluginState* plugin_state); void totp_scene_generate_token_render(Canvas* const canvas, PluginState* plugin_state);
bool totp_scene_generate_token_handle_event(PluginEvent* const event, PluginState* plugin_state); bool totp_scene_generate_token_handle_event(PluginEvent* const event, PluginState* plugin_state);
void totp_scene_generate_token_deactivate(PluginState* plugin_state); void totp_scene_generate_token_deactivate(PluginState* plugin_state);

View File

@@ -6,7 +6,10 @@
#include "token_menu/totp_scene_token_menu.h" #include "token_menu/totp_scene_token_menu.h"
#include "app_settings/totp_app_settings.h" #include "app_settings/totp_app_settings.h"
void totp_scene_director_activate_scene(PluginState* const plugin_state, Scene scene, const void* context) { void totp_scene_director_activate_scene(
PluginState* const plugin_state,
Scene scene,
const void* context) {
plugin_state->changing_scene = true; plugin_state->changing_scene = true;
totp_scene_director_deactivate_active_scene(plugin_state); totp_scene_director_deactivate_active_scene(plugin_state);
switch(scene) { switch(scene) {

View File

@@ -5,7 +5,10 @@
#include "../types/plugin_event.h" #include "../types/plugin_event.h"
#include "totp_scenes_enum.h" #include "totp_scenes_enum.h"
void totp_scene_director_activate_scene(PluginState* const plugin_state, Scene scene, const void* context); void totp_scene_director_activate_scene(
PluginState* const plugin_state,
Scene scene,
const void* context);
void totp_scene_director_deactivate_active_scene(PluginState* const plugin_state); void totp_scene_director_deactivate_active_scene(PluginState* const plugin_state);
void totp_scene_director_init_scenes(PluginState* const plugin_state); void totp_scene_director_init_scenes(PluginState* const plugin_state);
void totp_scene_director_render(Canvas* const canvas, PluginState* const plugin_state); void totp_scene_director_render(Canvas* const canvas, PluginState* const plugin_state);

View File

@@ -14,11 +14,7 @@
#define SCREEN_HEIGHT_THIRD (SCREEN_HEIGHT / 3) #define SCREEN_HEIGHT_THIRD (SCREEN_HEIGHT / 3)
#define SCREEN_HEIGHT_THIRD_CENTER (SCREEN_HEIGHT_THIRD >> 1) #define SCREEN_HEIGHT_THIRD_CENTER (SCREEN_HEIGHT_THIRD >> 1)
typedef enum { typedef enum { AddNewToken, DeleteToken, AppSettings } Control;
AddNewToken,
DeleteToken,
AppSettings
} Control;
typedef struct { typedef struct {
Control selected_control; Control selected_control;
@@ -29,7 +25,9 @@ void totp_scene_token_menu_init(PluginState* plugin_state) {
UNUSED(plugin_state); UNUSED(plugin_state);
} }
void totp_scene_token_menu_activate(PluginState* plugin_state, const TokenMenuSceneContext* context) { void totp_scene_token_menu_activate(
PluginState* plugin_state,
const TokenMenuSceneContext* context) {
SceneState* scene_state = malloc(sizeof(SceneState)); SceneState* scene_state = malloc(sizeof(SceneState));
plugin_state->current_scene_state = scene_state; plugin_state->current_scene_state = scene_state;
if(context != NULL) { if(context != NULL) {
@@ -42,12 +40,47 @@ void totp_scene_token_menu_activate(PluginState* plugin_state, const TokenMenuSc
void totp_scene_token_menu_render(Canvas* const canvas, PluginState* plugin_state) { void totp_scene_token_menu_render(Canvas* const canvas, PluginState* plugin_state) {
SceneState* scene_state = (SceneState*)plugin_state->current_scene_state; SceneState* scene_state = (SceneState*)plugin_state->current_scene_state;
if(scene_state->current_token_index < 0) { if(scene_state->current_token_index < 0) {
ui_control_button_render(canvas, SCREEN_WIDTH_CENTER - 36, 5, 72, 21, "Add new token", scene_state->selected_control == AddNewToken); ui_control_button_render(
ui_control_button_render(canvas, SCREEN_WIDTH_CENTER - 36, 39, 72, 21, "Settings", scene_state->selected_control == AppSettings); canvas,
SCREEN_WIDTH_CENTER - 36,
5,
72,
21,
"Add new token",
scene_state->selected_control == AddNewToken);
ui_control_button_render(
canvas,
SCREEN_WIDTH_CENTER - 36,
39,
72,
21,
"Settings",
scene_state->selected_control == AppSettings);
} else { } else {
ui_control_button_render(canvas, SCREEN_WIDTH_CENTER - 36, SCREEN_HEIGHT_THIRD_CENTER - 8, 72, 16, "Add new token", scene_state->selected_control == AddNewToken); ui_control_button_render(
ui_control_button_render(canvas, SCREEN_WIDTH_CENTER - 36, SCREEN_HEIGHT_THIRD + SCREEN_HEIGHT_THIRD_CENTER - 8, 72, 16, "Delete token", scene_state->selected_control == DeleteToken); canvas,
ui_control_button_render(canvas, SCREEN_WIDTH_CENTER - 36, SCREEN_HEIGHT_THIRD + SCREEN_HEIGHT_THIRD + SCREEN_HEIGHT_THIRD_CENTER - 8, 72, 16, "Settings", scene_state->selected_control == AppSettings); SCREEN_WIDTH_CENTER - 36,
SCREEN_HEIGHT_THIRD_CENTER - 8,
72,
16,
"Add new token",
scene_state->selected_control == AddNewToken);
ui_control_button_render(
canvas,
SCREEN_WIDTH_CENTER - 36,
SCREEN_HEIGHT_THIRD + SCREEN_HEIGHT_THIRD_CENTER - 8,
72,
16,
"Delete token",
scene_state->selected_control == DeleteToken);
ui_control_button_render(
canvas,
SCREEN_WIDTH_CENTER - 36,
SCREEN_HEIGHT_THIRD + SCREEN_HEIGHT_THIRD + SCREEN_HEIGHT_THIRD_CENTER - 8,
72,
16,
"Settings",
scene_state->selected_control == AppSettings);
} }
} }
@@ -59,7 +92,8 @@ bool totp_scene_token_menu_handle_event(PluginEvent* const event, PluginState* p
case InputKeyUp: case InputKeyUp:
if(scene_state->selected_control > AddNewToken) { if(scene_state->selected_control > AddNewToken) {
scene_state->selected_control--; scene_state->selected_control--;
if (scene_state->selected_control == DeleteToken && scene_state->current_token_index < 0) { if(scene_state->selected_control == DeleteToken &&
scene_state->current_token_index < 0) {
scene_state->selected_control--; scene_state->selected_control--;
} }
} else { } else {
@@ -69,7 +103,8 @@ bool totp_scene_token_menu_handle_event(PluginEvent* const event, PluginState* p
case InputKeyDown: case InputKeyDown:
if(scene_state->selected_control < AppSettings) { if(scene_state->selected_control < AppSettings) {
scene_state->selected_control++; scene_state->selected_control++;
if (scene_state->selected_control == DeleteToken && scene_state->current_token_index < 0) { if(scene_state->selected_control == DeleteToken &&
scene_state->current_token_index < 0) {
scene_state->selected_control++; scene_state->selected_control++;
} }
} else { } else {
@@ -83,16 +118,25 @@ bool totp_scene_token_menu_handle_event(PluginEvent* const event, PluginState* p
case InputKeyOk: case InputKeyOk:
switch(scene_state->selected_control) { switch(scene_state->selected_control) {
case AddNewToken: { case AddNewToken: {
TokenAddEditSceneContext add_new_token_scene_context = { .current_token_index = scene_state->current_token_index }; TokenAddEditSceneContext add_new_token_scene_context = {
totp_scene_director_activate_scene(plugin_state, TotpSceneAddNewToken, &add_new_token_scene_context); .current_token_index = scene_state->current_token_index};
totp_scene_director_activate_scene(
plugin_state, TotpSceneAddNewToken, &add_new_token_scene_context);
break; break;
} }
case DeleteToken: { case DeleteToken: {
DialogMessage* message = dialog_message_alloc(); DialogMessage* message = dialog_message_alloc();
dialog_message_set_buttons(message, "No", NULL, "Yes"); dialog_message_set_buttons(message, "No", NULL, "Yes");
dialog_message_set_header(message, "Confirmation", 0, 0, AlignLeft, AlignTop); dialog_message_set_header(message, "Confirmation", 0, 0, AlignLeft, AlignTop);
dialog_message_set_text(message, "Are you sure want to delete?", SCREEN_WIDTH_CENTER, SCREEN_HEIGHT_CENTER, AlignCenter, AlignCenter); dialog_message_set_text(
DialogMessageButton dialog_result = dialog_message_show(plugin_state->dialogs, message); message,
"Are you sure want to delete?",
SCREEN_WIDTH_CENTER,
SCREEN_HEIGHT_CENTER,
AlignCenter,
AlignCenter);
DialogMessageButton dialog_result =
dialog_message_show(plugin_state->dialogs, message);
dialog_message_free(message); dialog_message_free(message);
if(dialog_result == DialogMessageButtonRight) { if(dialog_result == DialogMessageButtonRight) {
uint8_t i = 0; uint8_t i = 0;
@@ -105,20 +149,25 @@ bool totp_scene_token_menu_handle_event(PluginEvent* const event, PluginState* p
TokenInfo* tokenInfo = list_node->data; TokenInfo* tokenInfo = list_node->data;
token_info_free(tokenInfo); token_info_free(tokenInfo);
plugin_state->tokens_list = list_remove(plugin_state->tokens_list, list_node); plugin_state->tokens_list =
list_remove(plugin_state->tokens_list, list_node);
plugin_state->tokens_count--; plugin_state->tokens_count--;
totp_full_save_config_file(plugin_state); totp_full_save_config_file(plugin_state);
totp_scene_director_activate_scene(plugin_state, TotpSceneGenerateToken, NULL); totp_scene_director_activate_scene(
plugin_state, TotpSceneGenerateToken, NULL);
} }
break; break;
} }
case AppSettings: { case AppSettings: {
if(scene_state->current_token_index >= 0) { if(scene_state->current_token_index >= 0) {
AppSettingsSceneContext app_settings_context = { .current_token_index = scene_state->current_token_index }; AppSettingsSceneContext app_settings_context = {
totp_scene_director_activate_scene(plugin_state, TotpSceneAppSettings, &app_settings_context); .current_token_index = scene_state->current_token_index};
totp_scene_director_activate_scene(
plugin_state, TotpSceneAppSettings, &app_settings_context);
} else { } else {
totp_scene_director_activate_scene(plugin_state, TotpSceneAppSettings, NULL); totp_scene_director_activate_scene(
plugin_state, TotpSceneAppSettings, NULL);
} }
break; break;
} }
@@ -126,8 +175,10 @@ bool totp_scene_token_menu_handle_event(PluginEvent* const event, PluginState* p
break; break;
case InputKeyBack: { case InputKeyBack: {
if(scene_state->current_token_index >= 0) { if(scene_state->current_token_index >= 0) {
GenerateTokenSceneContext generate_scene_context = { .current_token_index = scene_state->current_token_index }; GenerateTokenSceneContext generate_scene_context = {
totp_scene_director_activate_scene(plugin_state, TotpSceneGenerateToken, &generate_scene_context); .current_token_index = scene_state->current_token_index};
totp_scene_director_activate_scene(
plugin_state, TotpSceneGenerateToken, &generate_scene_context);
} else { } else {
totp_scene_director_activate_scene(plugin_state, TotpSceneGenerateToken, NULL); totp_scene_director_activate_scene(plugin_state, TotpSceneGenerateToken, NULL);
} }

View File

@@ -11,7 +11,9 @@ typedef struct {
} TokenMenuSceneContext; } TokenMenuSceneContext;
void totp_scene_token_menu_init(PluginState* plugin_state); void totp_scene_token_menu_init(PluginState* plugin_state);
void totp_scene_token_menu_activate(PluginState* plugin_state, const TokenMenuSceneContext* context); void totp_scene_token_menu_activate(
PluginState* plugin_state,
const TokenMenuSceneContext* context);
void totp_scene_token_menu_render(Canvas* const canvas, PluginState* plugin_state); void totp_scene_token_menu_render(Canvas* const canvas, PluginState* plugin_state);
bool totp_scene_token_menu_handle_event(PluginEvent* const event, PluginState* plugin_state); bool totp_scene_token_menu_handle_event(PluginEvent* const event, PluginState* plugin_state);
void totp_scene_token_menu_deactivate(PluginState* plugin_state); void totp_scene_token_menu_deactivate(PluginState* plugin_state);

View File

@@ -61,8 +61,7 @@ int base32_decode(const uint8_t *encoded, uint8_t *result, int bufSize) {
return count; return count;
} }
int base32_encode(const uint8_t *data, int length, uint8_t *result, int base32_encode(const uint8_t* data, int length, uint8_t* result, int bufSize) {
int bufSize) {
if(length < 0 || length > (1 << 28)) { if(length < 0 || length > (1 << 28)) {
return -1; return -1;
} }

View File

@@ -31,6 +31,5 @@
int base32_decode(const uint8_t* encoded, uint8_t* result, int bufSize) int base32_decode(const uint8_t* encoded, uint8_t* result, int bufSize)
__attribute__((visibility("hidden"))); __attribute__((visibility("hidden")));
int base32_encode(const uint8_t *data, int length, uint8_t *result, int base32_encode(const uint8_t* data, int length, uint8_t* result, int bufSize)
int bufSize)
__attribute__((visibility("hidden"))); __attribute__((visibility("hidden")));

View File

@@ -12,8 +12,10 @@
uint8_t token_info_get_digits_as_int(TokenInfo* token_info) { uint8_t token_info_get_digits_as_int(TokenInfo* token_info) {
switch(token_info->digits) { switch(token_info->digits) {
case TOTP_6_DIGITS: return 6; case TOTP_6_DIGITS:
case TOTP_8_DIGITS: return 8; return 6;
case TOTP_8_DIGITS:
return 8;
} }
return 6; return 6;
@@ -32,9 +34,12 @@ void token_info_set_digits_from_int(TokenInfo* token_info, uint8_t digits) {
char* token_info_get_algo_as_cstr(TokenInfo* token_info) { char* token_info_get_algo_as_cstr(TokenInfo* token_info) {
switch(token_info->algo) { switch(token_info->algo) {
case SHA1: return TOTP_CONFIG_TOKEN_ALGO_SHA1_NAME; case SHA1:
case SHA256: return TOTP_CONFIG_TOKEN_ALGO_SHA256_NAME; return TOTP_CONFIG_TOKEN_ALGO_SHA1_NAME;
case SHA512: return TOTP_CONFIG_TOKEN_ALGO_SHA512_NAME; case SHA256:
return TOTP_CONFIG_TOKEN_ALGO_SHA256_NAME;
case SHA512:
return TOTP_CONFIG_TOKEN_ALGO_SHA512_NAME;
} }
return NULL; return NULL;
@@ -71,7 +76,10 @@ FlipperFormat* totp_open_config_file(Storage* storage) {
} else { } else {
FURI_LOG_D(LOGGING_TAG, "Config file %s is not found. Will create new.", CONFIG_FILE_PATH); FURI_LOG_D(LOGGING_TAG, "Config file %s is not found. Will create new.", CONFIG_FILE_PATH);
if(storage_common_stat(storage, CONFIG_FILE_DIRECTORY_PATH, NULL) == FSE_NOT_EXIST) { if(storage_common_stat(storage, CONFIG_FILE_DIRECTORY_PATH, NULL) == FSE_NOT_EXIST) {
FURI_LOG_D(LOGGING_TAG, "Directory %s doesn't exist. Will create new.", CONFIG_FILE_DIRECTORY_PATH); FURI_LOG_D(
LOGGING_TAG,
"Directory %s doesn't exist. Will create new.",
CONFIG_FILE_DIRECTORY_PATH);
if(!storage_simply_mkdir(storage, CONFIG_FILE_DIRECTORY_PATH)) { if(!storage_simply_mkdir(storage, CONFIG_FILE_DIRECTORY_PATH)) {
FURI_LOG_E(LOGGING_TAG, "Error creating directory %s", CONFIG_FILE_DIRECTORY_PATH); FURI_LOG_E(LOGGING_TAG, "Error creating directory %s", CONFIG_FILE_DIRECTORY_PATH);
return NULL; return NULL;
@@ -84,33 +92,48 @@ FlipperFormat* totp_open_config_file(Storage* storage) {
return NULL; return NULL;
} }
flipper_format_write_header_cstr(fff_data_file, CONFIG_FILE_HEADER, CONFIG_FILE_ACTUAL_VERSION); flipper_format_write_header_cstr(
fff_data_file, CONFIG_FILE_HEADER, CONFIG_FILE_ACTUAL_VERSION);
float tmp_tz = 0; float tmp_tz = 0;
flipper_format_write_comment_cstr(fff_data_file, " "); flipper_format_write_comment_cstr(fff_data_file, " ");
flipper_format_write_comment_cstr(fff_data_file, "Timezone offset in hours. Important note: do not put '+' sign for positive values"); flipper_format_write_comment_cstr(
fff_data_file,
"Timezone offset in hours. Important note: do not put '+' sign for positive values");
flipper_format_write_float(fff_data_file, TOTP_CONFIG_KEY_TIMEZONE, &tmp_tz, 1); flipper_format_write_float(fff_data_file, TOTP_CONFIG_KEY_TIMEZONE, &tmp_tz, 1);
FuriString* temp_str = furi_string_alloc(); FuriString* temp_str = furi_string_alloc();
flipper_format_write_comment_cstr(fff_data_file, " "); flipper_format_write_comment_cstr(fff_data_file, " ");
flipper_format_write_comment_cstr(fff_data_file, "=== TOKEN SAMPLE BEGIN ==="); flipper_format_write_comment_cstr(fff_data_file, "=== TOKEN SAMPLE BEGIN ===");
flipper_format_write_comment_cstr(fff_data_file, " "); flipper_format_write_comment_cstr(fff_data_file, " ");
flipper_format_write_comment_cstr(fff_data_file, "# Token name which will be visible in the UI."); flipper_format_write_comment_cstr(
fff_data_file, "# Token name which will be visible in the UI.");
furi_string_printf(temp_str, "%s: Sample token name", TOTP_CONFIG_KEY_TOKEN_NAME); furi_string_printf(temp_str, "%s: Sample token name", TOTP_CONFIG_KEY_TOKEN_NAME);
flipper_format_write_comment(fff_data_file, temp_str); flipper_format_write_comment(fff_data_file, temp_str);
flipper_format_write_comment_cstr(fff_data_file, " "); flipper_format_write_comment_cstr(fff_data_file, " ");
flipper_format_write_comment_cstr(fff_data_file, "# Plain token secret without spaces, dashes and etc, just pure alpha-numeric characters. Important note: plain token will be encrypted and replaced by TOTP app"); flipper_format_write_comment_cstr(
fff_data_file,
"# Plain token secret without spaces, dashes and etc, just pure alpha-numeric characters. Important note: plain token will be encrypted and replaced by TOTP app");
furi_string_printf(temp_str, "%s: plaintokensecret", TOTP_CONFIG_KEY_TOKEN_SECRET); furi_string_printf(temp_str, "%s: plaintokensecret", TOTP_CONFIG_KEY_TOKEN_SECRET);
flipper_format_write_comment(fff_data_file, temp_str); flipper_format_write_comment(fff_data_file, temp_str);
flipper_format_write_comment_cstr(fff_data_file, " "); flipper_format_write_comment_cstr(fff_data_file, " ");
furi_string_printf(temp_str, " # Token hashing algorithm to use during code generation. Supported options are %s, %s and %s. If you are not use which one to use - use %s", TOTP_CONFIG_TOKEN_ALGO_SHA1_NAME, TOTP_CONFIG_TOKEN_ALGO_SHA256_NAME, TOTP_CONFIG_TOKEN_ALGO_SHA512_NAME, TOTP_CONFIG_TOKEN_ALGO_SHA1_NAME); furi_string_printf(
temp_str,
" # Token hashing algorithm to use during code generation. Supported options are %s, %s and %s. If you are not use which one to use - use %s",
TOTP_CONFIG_TOKEN_ALGO_SHA1_NAME,
TOTP_CONFIG_TOKEN_ALGO_SHA256_NAME,
TOTP_CONFIG_TOKEN_ALGO_SHA512_NAME,
TOTP_CONFIG_TOKEN_ALGO_SHA1_NAME);
flipper_format_write_comment(fff_data_file, temp_str); flipper_format_write_comment(fff_data_file, temp_str);
furi_string_printf(temp_str, "%s: %s", TOTP_CONFIG_KEY_TOKEN_ALGO, TOTP_CONFIG_TOKEN_ALGO_SHA1_NAME); furi_string_printf(
temp_str, "%s: %s", TOTP_CONFIG_KEY_TOKEN_ALGO, TOTP_CONFIG_TOKEN_ALGO_SHA1_NAME);
flipper_format_write_comment(fff_data_file, temp_str); flipper_format_write_comment(fff_data_file, temp_str);
flipper_format_write_comment_cstr(fff_data_file, " "); flipper_format_write_comment_cstr(fff_data_file, " ");
flipper_format_write_comment_cstr(fff_data_file, "# How many digits there should be in generated code. Available options are 6 and 8. Majority websites requires 6 digits code, however some rare websites wants to get 8 digits code. If you are not sure which one to use - use 6"); flipper_format_write_comment_cstr(
fff_data_file,
"# How many digits there should be in generated code. Available options are 6 and 8. Majority websites requires 6 digits code, however some rare websites wants to get 8 digits code. If you are not sure which one to use - use 6");
furi_string_printf(temp_str, "%s: 6", TOTP_CONFIG_KEY_TOKEN_DIGITS); furi_string_printf(temp_str, "%s: 6", TOTP_CONFIG_KEY_TOKEN_DIGITS);
flipper_format_write_comment(fff_data_file, temp_str); flipper_format_write_comment(fff_data_file, temp_str);
flipper_format_write_comment_cstr(fff_data_file, " "); flipper_format_write_comment_cstr(fff_data_file, " ");
@@ -132,8 +155,10 @@ FlipperFormat* totp_open_config_file(Storage* storage) {
void totp_config_file_save_new_token_i(FlipperFormat* file, TokenInfo* token_info) { void totp_config_file_save_new_token_i(FlipperFormat* file, TokenInfo* token_info) {
flipper_format_seek_to_end(file); flipper_format_seek_to_end(file);
flipper_format_write_string_cstr(file, TOTP_CONFIG_KEY_TOKEN_NAME, token_info->name); flipper_format_write_string_cstr(file, TOTP_CONFIG_KEY_TOKEN_NAME, token_info->name);
flipper_format_write_hex(file, TOTP_CONFIG_KEY_TOKEN_SECRET, token_info->token, token_info->token_length); flipper_format_write_hex(
flipper_format_write_string_cstr(file, TOTP_CONFIG_KEY_TOKEN_ALGO, token_info_get_algo_as_cstr(token_info)); file, TOTP_CONFIG_KEY_TOKEN_SECRET, token_info->token, token_info->token_length);
flipper_format_write_string_cstr(
file, TOTP_CONFIG_KEY_TOKEN_ALGO, token_info_get_algo_as_cstr(token_info));
uint32_t digits_count_as_uint32 = token_info_get_digits_as_int(token_info); uint32_t digits_count_as_uint32 = token_info_get_digits_as_int(token_info);
flipper_format_write_uint32(file, TOTP_CONFIG_KEY_TOKEN_DIGITS, &digits_count_as_uint32, 1); flipper_format_write_uint32(file, TOTP_CONFIG_KEY_TOKEN_DIGITS, &digits_count_as_uint32, 1);
} }
@@ -163,10 +188,17 @@ void totp_full_save_config_file(PluginState* const plugin_state) {
FlipperFormat* fff_data_file = flipper_format_file_alloc(storage); FlipperFormat* fff_data_file = flipper_format_file_alloc(storage);
flipper_format_file_open_always(fff_data_file, CONFIG_FILE_PATH); flipper_format_file_open_always(fff_data_file, CONFIG_FILE_PATH);
flipper_format_write_header_cstr(fff_data_file, CONFIG_FILE_HEADER, CONFIG_FILE_ACTUAL_VERSION); flipper_format_write_header_cstr(
flipper_format_write_hex(fff_data_file, TOTP_CONFIG_KEY_BASE_IV, &plugin_state->base_iv[0], TOTP_IV_SIZE); fff_data_file, CONFIG_FILE_HEADER, CONFIG_FILE_ACTUAL_VERSION);
flipper_format_write_hex(fff_data_file, TOTP_CONFIG_KEY_CRYPTO_VERIFY, plugin_state->crypto_verify_data, plugin_state->crypto_verify_data_length); flipper_format_write_hex(
flipper_format_write_float(fff_data_file, TOTP_CONFIG_KEY_TIMEZONE, &plugin_state->timezone_offset, 1); fff_data_file, TOTP_CONFIG_KEY_BASE_IV, &plugin_state->base_iv[0], TOTP_IV_SIZE);
flipper_format_write_hex(
fff_data_file,
TOTP_CONFIG_KEY_CRYPTO_VERIFY,
plugin_state->crypto_verify_data,
plugin_state->crypto_verify_data_length);
flipper_format_write_float(
fff_data_file, TOTP_CONFIG_KEY_TIMEZONE, &plugin_state->timezone_offset, 1);
flipper_format_write_bool(fff_data_file, TOTP_CONFIG_KEY_PINSET, &plugin_state->pin_set, 1); flipper_format_write_bool(fff_data_file, TOTP_CONFIG_KEY_PINSET, &plugin_state->pin_set, 1);
ListNode* node = plugin_state->tokens_list; ListNode* node = plugin_state->tokens_list;
while(node != NULL) { while(node != NULL) {
@@ -195,7 +227,12 @@ void totp_config_file_load_base(PluginState* const plugin_state) {
} }
if(file_version < CONFIG_FILE_ACTUAL_VERSION) { if(file_version < CONFIG_FILE_ACTUAL_VERSION) {
FURI_LOG_I(LOGGING_TAG, "Obsolete config file version detected. Current version: %" PRIu32 "; Actual version: %" PRId16, file_version, CONFIG_FILE_ACTUAL_VERSION); FURI_LOG_I(
LOGGING_TAG,
"Obsolete config file version detected. Current version: %" PRIu32
"; Actual version: %" PRId16,
file_version,
CONFIG_FILE_ACTUAL_VERSION);
totp_close_config_file(fff_data_file); totp_close_config_file(fff_data_file);
if(storage_common_stat(storage, CONFIG_FILE_BACKUP_PATH, NULL) == FSE_OK) { if(storage_common_stat(storage, CONFIG_FILE_BACKUP_PATH, NULL) == FSE_OK) {
@@ -220,21 +257,31 @@ void totp_config_file_load_base(PluginState* const plugin_state) {
flipper_format_free(fff_backup_data_file); flipper_format_free(fff_backup_data_file);
flipper_format_rewind(fff_data_file); flipper_format_rewind(fff_data_file);
} else { } else {
FURI_LOG_E(LOGGING_TAG, "An error occurred during taking backup of %s into %s before migration", CONFIG_FILE_PATH, CONFIG_FILE_BACKUP_PATH); FURI_LOG_E(
LOGGING_TAG,
"An error occurred during taking backup of %s into %s before migration",
CONFIG_FILE_PATH,
CONFIG_FILE_BACKUP_PATH);
} }
} }
if (!flipper_format_read_hex(fff_data_file, TOTP_CONFIG_KEY_BASE_IV, &plugin_state->base_iv[0], TOTP_IV_SIZE)) { if(!flipper_format_read_hex(
fff_data_file, TOTP_CONFIG_KEY_BASE_IV, &plugin_state->base_iv[0], TOTP_IV_SIZE)) {
FURI_LOG_D(LOGGING_TAG, "Missing base IV"); FURI_LOG_D(LOGGING_TAG, "Missing base IV");
} }
flipper_format_rewind(fff_data_file); flipper_format_rewind(fff_data_file);
uint32_t crypto_size; uint32_t crypto_size;
if (flipper_format_get_value_count(fff_data_file, TOTP_CONFIG_KEY_CRYPTO_VERIFY, &crypto_size) && crypto_size > 0) { if(flipper_format_get_value_count(fff_data_file, TOTP_CONFIG_KEY_CRYPTO_VERIFY, &crypto_size) &&
crypto_size > 0) {
plugin_state->crypto_verify_data = malloc(sizeof(uint8_t) * crypto_size); plugin_state->crypto_verify_data = malloc(sizeof(uint8_t) * crypto_size);
plugin_state->crypto_verify_data_length = crypto_size; plugin_state->crypto_verify_data_length = crypto_size;
if (!flipper_format_read_hex(fff_data_file, TOTP_CONFIG_KEY_CRYPTO_VERIFY, plugin_state->crypto_verify_data, crypto_size)) { if(!flipper_format_read_hex(
fff_data_file,
TOTP_CONFIG_KEY_CRYPTO_VERIFY,
plugin_state->crypto_verify_data,
crypto_size)) {
FURI_LOG_D(LOGGING_TAG, "Missing crypto verify token"); FURI_LOG_D(LOGGING_TAG, "Missing crypto verify token");
free(plugin_state->crypto_verify_data); free(plugin_state->crypto_verify_data);
plugin_state->crypto_verify_data = NULL; plugin_state->crypto_verify_data = NULL;
@@ -247,14 +294,16 @@ void totp_config_file_load_base(PluginState* const plugin_state) {
flipper_format_rewind(fff_data_file); flipper_format_rewind(fff_data_file);
if (!flipper_format_read_float(fff_data_file, TOTP_CONFIG_KEY_TIMEZONE, &plugin_state->timezone_offset, 1)) { if(!flipper_format_read_float(
fff_data_file, TOTP_CONFIG_KEY_TIMEZONE, &plugin_state->timezone_offset, 1)) {
plugin_state->timezone_offset = 0; plugin_state->timezone_offset = 0;
FURI_LOG_D(LOGGING_TAG, "Missing timezone offset information, defaulting to 0"); FURI_LOG_D(LOGGING_TAG, "Missing timezone offset information, defaulting to 0");
} }
flipper_format_rewind(fff_data_file); flipper_format_rewind(fff_data_file);
if (!flipper_format_read_bool(fff_data_file, TOTP_CONFIG_KEY_PINSET, &plugin_state->pin_set, 1)) { if(!flipper_format_read_bool(
fff_data_file, TOTP_CONFIG_KEY_PINSET, &plugin_state->pin_set, 1)) {
plugin_state->pin_set = true; plugin_state->pin_set = true;
} }
@@ -291,7 +340,8 @@ void totp_config_file_load_tokens(PluginState* const plugin_state) {
strcpy(tokenInfo->name, temp_cstr); strcpy(tokenInfo->name, temp_cstr);
uint32_t secret_bytes_count; uint32_t secret_bytes_count;
if (!flipper_format_get_value_count(fff_data_file, TOTP_CONFIG_KEY_TOKEN_SECRET, &secret_bytes_count)) { if(!flipper_format_get_value_count(
fff_data_file, TOTP_CONFIG_KEY_TOKEN_SECRET, &secret_bytes_count)) {
token_info_free(tokenInfo); token_info_free(tokenInfo);
continue; continue;
} }
@@ -309,7 +359,11 @@ void totp_config_file_load_tokens(PluginState* const plugin_state) {
} else { // encrypted } else { // encrypted
tokenInfo->token_length = secret_bytes_count; tokenInfo->token_length = secret_bytes_count;
tokenInfo->token = malloc(tokenInfo->token_length); tokenInfo->token = malloc(tokenInfo->token_length);
if (!flipper_format_read_hex(fff_data_file, TOTP_CONFIG_KEY_TOKEN_SECRET, tokenInfo->token, tokenInfo->token_length)) { if(!flipper_format_read_hex(
fff_data_file,
TOTP_CONFIG_KEY_TOKEN_SECRET,
tokenInfo->token,
tokenInfo->token_length)) {
token_info_free(tokenInfo); token_info_free(tokenInfo);
continue; continue;
} }
@@ -322,7 +376,8 @@ void totp_config_file_load_tokens(PluginState* const plugin_state) {
token_info_set_algo_from_str(tokenInfo, temp_str); token_info_set_algo_from_str(tokenInfo, temp_str);
if (!flipper_format_read_uint32(fff_data_file, TOTP_CONFIG_KEY_TOKEN_DIGITS, &temp_data32, 1)) { if(!flipper_format_read_uint32(
fff_data_file, TOTP_CONFIG_KEY_TOKEN_DIGITS, &temp_data32, 1)) {
token_info_free(tokenInfo); token_info_free(tokenInfo);
continue; continue;
} }

View File

@@ -4,7 +4,9 @@
#define NEW_VERSION 2 #define NEW_VERSION 2
bool totp_config_migrate_v1_to_v2(FlipperFormat* fff_data_file, FlipperFormat* fff_backup_data_file) { bool totp_config_migrate_v1_to_v2(
FlipperFormat* fff_data_file,
FlipperFormat* fff_backup_data_file) {
flipper_format_write_header_cstr(fff_data_file, CONFIG_FILE_HEADER, NEW_VERSION); flipper_format_write_header_cstr(fff_data_file, CONFIG_FILE_HEADER, NEW_VERSION);
FuriString* temp_str = furi_string_alloc(); FuriString* temp_str = furi_string_alloc();
@@ -22,7 +24,8 @@ bool totp_config_migrate_v1_to_v2(FlipperFormat* fff_data_file, FlipperFormat* f
} }
while(true) { while(true) {
if (!flipper_format_read_string(fff_backup_data_file, TOTP_CONFIG_KEY_TOKEN_NAME, temp_str)) { if(!flipper_format_read_string(
fff_backup_data_file, TOTP_CONFIG_KEY_TOKEN_NAME, temp_str)) {
break; break;
} }
@@ -31,9 +34,11 @@ bool totp_config_migrate_v1_to_v2(FlipperFormat* fff_data_file, FlipperFormat* f
flipper_format_read_string(fff_backup_data_file, TOTP_CONFIG_KEY_TOKEN_SECRET, temp_str); flipper_format_read_string(fff_backup_data_file, TOTP_CONFIG_KEY_TOKEN_SECRET, temp_str);
flipper_format_write_string(fff_data_file, TOTP_CONFIG_KEY_TOKEN_SECRET, temp_str); flipper_format_write_string(fff_data_file, TOTP_CONFIG_KEY_TOKEN_SECRET, temp_str);
flipper_format_write_string_cstr(fff_data_file, TOTP_CONFIG_KEY_TOKEN_ALGO, TOTP_CONFIG_TOKEN_ALGO_SHA1_NAME); flipper_format_write_string_cstr(
fff_data_file, TOTP_CONFIG_KEY_TOKEN_ALGO, TOTP_CONFIG_TOKEN_ALGO_SHA1_NAME);
uint32_t default_digits = 6; uint32_t default_digits = 6;
flipper_format_write_uint32(fff_data_file, TOTP_CONFIG_KEY_TOKEN_DIGITS, &default_digits, 1); flipper_format_write_uint32(
fff_data_file, TOTP_CONFIG_KEY_TOKEN_DIGITS, &default_digits, 1);
} }
furi_string_free(temp_str); furi_string_free(temp_str);

View File

@@ -2,4 +2,6 @@
#include <flipper_format/flipper_format.h> #include <flipper_format/flipper_format.h>
bool totp_config_migrate_v1_to_v2(FlipperFormat* fff_data_file, FlipperFormat* fff_backup_data_file); bool totp_config_migrate_v1_to_v2(
FlipperFormat* fff_data_file,
FlipperFormat* fff_backup_data_file);

View File

@@ -9,7 +9,11 @@
#define CRYPTO_VERIFY_KEY_LENGTH 16 #define CRYPTO_VERIFY_KEY_LENGTH 16
#define CRYPTO_ALIGNMENT_FACTOR 16 #define CRYPTO_ALIGNMENT_FACTOR 16
uint8_t* totp_crypto_encrypt(const uint8_t* plain_data, const uint8_t plain_data_length, const uint8_t* iv, uint8_t* encrypted_data_length) { uint8_t* totp_crypto_encrypt(
const uint8_t* plain_data,
const uint8_t plain_data_length,
const uint8_t* iv,
uint8_t* encrypted_data_length) {
uint8_t* encrypted_data; uint8_t* encrypted_data;
size_t remain = plain_data_length % CRYPTO_ALIGNMENT_FACTOR; size_t remain = plain_data_length % CRYPTO_ALIGNMENT_FACTOR;
if(remain) { if(remain) {
@@ -39,7 +43,11 @@ uint8_t* totp_crypto_encrypt(const uint8_t* plain_data, const uint8_t plain_data
return encrypted_data; return encrypted_data;
} }
uint8_t* totp_crypto_decrypt(const uint8_t* encrypted_data, const uint8_t encrypted_data_length, const uint8_t* iv, uint8_t* decrypted_data_length) { uint8_t* totp_crypto_decrypt(
const uint8_t* encrypted_data,
const uint8_t encrypted_data_length,
const uint8_t* iv,
uint8_t* decrypted_data_length) {
*decrypted_data_length = encrypted_data_length; *decrypted_data_length = encrypted_data_length;
uint8_t* decrypted_data = malloc(*decrypted_data_length); uint8_t* decrypted_data = malloc(*decrypted_data_length);
furi_hal_crypto_store_load_key(CRYPTO_KEY_SLOT, iv); furi_hal_crypto_store_load_key(CRYPTO_KEY_SLOT, iv);
@@ -88,12 +96,22 @@ void totp_crypto_seed_iv(PluginState* plugin_state, uint8_t* pin, uint8_t pin_le
Storage* storage = totp_open_storage(); Storage* storage = totp_open_storage();
FlipperFormat* config_file = totp_open_config_file(storage); FlipperFormat* config_file = totp_open_config_file(storage);
plugin_state->crypto_verify_data = totp_crypto_encrypt((uint8_t* )CRYPTO_VERIFY_KEY, CRYPTO_VERIFY_KEY_LENGTH, &plugin_state->iv[0], &plugin_state->crypto_verify_data_length); plugin_state->crypto_verify_data = totp_crypto_encrypt(
(uint8_t*)CRYPTO_VERIFY_KEY,
CRYPTO_VERIFY_KEY_LENGTH,
&plugin_state->iv[0],
&plugin_state->crypto_verify_data_length);
flipper_format_insert_or_update_hex(config_file, TOTP_CONFIG_KEY_BASE_IV, plugin_state->base_iv, TOTP_IV_SIZE); flipper_format_insert_or_update_hex(
flipper_format_insert_or_update_hex(config_file, TOTP_CONFIG_KEY_CRYPTO_VERIFY, plugin_state->crypto_verify_data, CRYPTO_VERIFY_KEY_LENGTH); config_file, TOTP_CONFIG_KEY_BASE_IV, plugin_state->base_iv, TOTP_IV_SIZE);
flipper_format_insert_or_update_hex(
config_file,
TOTP_CONFIG_KEY_CRYPTO_VERIFY,
plugin_state->crypto_verify_data,
CRYPTO_VERIFY_KEY_LENGTH);
plugin_state->pin_set = pin != NULL && pin_length > 0; plugin_state->pin_set = pin != NULL && pin_length > 0;
flipper_format_insert_or_update_bool(config_file, TOTP_CONFIG_KEY_PINSET, &plugin_state->pin_set, 1); flipper_format_insert_or_update_bool(
config_file, TOTP_CONFIG_KEY_PINSET, &plugin_state->pin_set, 1);
totp_close_config_file(config_file); totp_close_config_file(config_file);
totp_close_storage(); totp_close_storage();
} }
@@ -101,7 +119,11 @@ void totp_crypto_seed_iv(PluginState* plugin_state, uint8_t* pin, uint8_t pin_le
bool totp_crypto_verify_key(const PluginState* plugin_state) { bool totp_crypto_verify_key(const PluginState* plugin_state) {
uint8_t decrypted_key_length; uint8_t decrypted_key_length;
uint8_t* decrypted_key = totp_crypto_decrypt(plugin_state->crypto_verify_data, plugin_state->crypto_verify_data_length, &plugin_state->iv[0], &decrypted_key_length); uint8_t* decrypted_key = totp_crypto_decrypt(
plugin_state->crypto_verify_data,
plugin_state->crypto_verify_data_length,
&plugin_state->iv[0],
&decrypted_key_length);
bool key_valid = true; bool key_valid = true;
for(uint8_t i = 0; i < CRYPTO_VERIFY_KEY_LENGTH && key_valid; i++) { for(uint8_t i = 0; i < CRYPTO_VERIFY_KEY_LENGTH && key_valid; i++) {

View File

@@ -2,7 +2,15 @@
#include "../../types/plugin_state.h" #include "../../types/plugin_state.h"
uint8_t* totp_crypto_encrypt(const uint8_t* plain_data, const uint8_t plain_data_length, const uint8_t* iv, uint8_t* encrypted_data_length); uint8_t* totp_crypto_encrypt(
uint8_t* totp_crypto_decrypt(const uint8_t* encrypted_data, const uint8_t encrypted_data_length, const uint8_t* iv, uint8_t* decrypted_data_length); const uint8_t* plain_data,
const uint8_t plain_data_length,
const uint8_t* iv,
uint8_t* encrypted_data_length);
uint8_t* totp_crypto_decrypt(
const uint8_t* encrypted_data,
const uint8_t encrypted_data_length,
const uint8_t* iv,
uint8_t* decrypted_data_length);
void totp_crypto_seed_iv(PluginState* plugin_state, uint8_t* pin, uint8_t pin_length); void totp_crypto_seed_iv(PluginState* plugin_state, uint8_t* pin, uint8_t pin_length);
bool totp_crypto_verify_key(const PluginState* plugin_state); bool totp_crypto_verify_key(const PluginState* plugin_state);

View File

@@ -1,13 +1,11 @@
#include "byteswap.h" #include "byteswap.h"
uint32_t swap_uint32( uint32_t val ) uint32_t swap_uint32(uint32_t val) {
{
val = ((val << 8) & 0xFF00FF00) | ((val >> 8) & 0xFF00FF); val = ((val << 8) & 0xFF00FF00) | ((val >> 8) & 0xFF00FF);
return (val << 16) | (val >> 16); return (val << 16) | (val >> 16);
} }
uint64_t swap_uint64( uint64_t val ) uint64_t swap_uint64(uint64_t val) {
{
val = ((val << 8) & 0xFF00FF00FF00FF00ULL) | ((val >> 8) & 0x00FF00FF00FF00FFULL); val = ((val << 8) & 0xFF00FF00FF00FF00ULL) | ((val >> 8) & 0x00FF00FF00FF00FFULL);
val = ((val << 16) & 0xFFFF0000FFFF0000ULL) | ((val >> 16) & 0x0000FFFF0000FFFFULL); val = ((val << 16) & 0xFFFF0000FFFF0000ULL) | ((val >> 16) & 0x0000FFFF0000FFFFULL);
return (val << 32) | (val >> 32); return (val << 32) | (val >> 32);

View File

@@ -0,0 +1,64 @@
#include <string.h>
#include "sha256.h"
#include "memxor.h"
#define IPAD 0x36
#define OPAD 0x5c
/* Concatenate two preprocessor tokens. */
#define _GLHMAC_CONCAT_(prefix, suffix) prefix##suffix
#define _GLHMAC_CONCAT(prefix, suffix) _GLHMAC_CONCAT_(prefix, suffix)
#if GL_HMAC_NAME == 5
#define HMAC_ALG md5
#else
#define HMAC_ALG _GLHMAC_CONCAT(sha, GL_HMAC_NAME)
#endif
#define GL_HMAC_CTX _GLHMAC_CONCAT(HMAC_ALG, _ctx)
#define GL_HMAC_FN _GLHMAC_CONCAT(hmac_, HMAC_ALG)
#define GL_HMAC_FN_INIT _GLHMAC_CONCAT(HMAC_ALG, _init_ctx)
#define GL_HMAC_FN_BLOC _GLHMAC_CONCAT(HMAC_ALG, _process_block)
#define GL_HMAC_FN_PROC _GLHMAC_CONCAT(HMAC_ALG, _process_bytes)
#define GL_HMAC_FN_FINI _GLHMAC_CONCAT(HMAC_ALG, _finish_ctx)
static void
hmac_hash(const void* key, size_t keylen, const void* in, size_t inlen, int pad, void* resbuf) {
struct GL_HMAC_CTX hmac_ctx;
char block[GL_HMAC_BLOCKSIZE];
memset(block, pad, sizeof block);
memxor(block, key, keylen);
GL_HMAC_FN_INIT(&hmac_ctx);
GL_HMAC_FN_BLOC(block, sizeof block, &hmac_ctx);
GL_HMAC_FN_PROC(in, inlen, &hmac_ctx);
GL_HMAC_FN_FINI(&hmac_ctx, resbuf);
}
int GL_HMAC_FN(const void* key, size_t keylen, const void* in, size_t inlen, void* resbuf) {
char optkeybuf[GL_HMAC_HASHSIZE];
char innerhash[GL_HMAC_HASHSIZE];
/* Ensure key size is <= block size. */
if(keylen > GL_HMAC_BLOCKSIZE) {
struct GL_HMAC_CTX keyhash;
GL_HMAC_FN_INIT(&keyhash);
GL_HMAC_FN_PROC(key, keylen, &keyhash);
GL_HMAC_FN_FINI(&keyhash, optkeybuf);
key = optkeybuf;
/* zero padding of the key to the block size
is implicit in the memxor. */
keylen = sizeof optkeybuf;
}
/* Compute INNERHASH from KEY and IN. */
hmac_hash(key, keylen, in, inlen, IPAD, innerhash);
/* Compute result from KEY and INNERHASH. */
hmac_hash(key, keylen, innerhash, sizeof innerhash, OPAD, resbuf);
return 0;
}

View File

@@ -0,0 +1,24 @@
/* hmac_sha1.c -- hashed message authentication codes
Copyright (C) 2018-2022 Free Software Foundation, Inc.
This file is free software: you can redistribute it and/or modify
it under the terms of the GNU Lesser General Public License as
published by the Free Software Foundation; either version 2.1 of the
License, or (at your option) any later version.
This file is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU Lesser General Public License for more details.
You should have received a copy of the GNU Lesser General Public License
along with this program. If not, see <https://www.gnu.org/licenses/>. */
#include "hmac_sha1.h"
#include "sha1.h"
#define GL_HMAC_NAME 1
#define GL_HMAC_BLOCKSIZE 64
#define GL_HMAC_HASHSIZE 20
#include "hmac_common.h"

View File

@@ -0,0 +1,11 @@
#pragma once
#include <stddef.h>
#define HMAC_SHA1_RESULT_SIZE 20
/* Compute Hashed Message Authentication Code with SHA-1, over BUFFER
data of BUFLEN bytes using the KEY of KEYLEN bytes, writing the
output to pre-allocated 20 byte minimum RESBUF buffer. Return 0 on
success. */
int hmac_sha1(const void* key, size_t keylen, const void* in, size_t inlen, void* restrict resbuf);

View File

@@ -0,0 +1,23 @@
/* hmac_sha256.c -- hashed message authentication codes
Copyright (C) 2018-2022 Free Software Foundation, Inc.
This file is free software: you can redistribute it and/or modify
it under the terms of the GNU Lesser General Public License as
published by the Free Software Foundation; either version 2.1 of the
License, or (at your option) any later version.
This file is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU Lesser General Public License for more details.
You should have received a copy of the GNU Lesser General Public License
along with this program. If not, see <https://www.gnu.org/licenses/>. */
#include "hmac_sha256.h"
#define GL_HMAC_NAME 256
#define GL_HMAC_BLOCKSIZE 64
#define GL_HMAC_HASHSIZE 32
#include "hmac_common.h"

View File

@@ -0,0 +1,11 @@
#pragma once
#include <stddef.h>
#define HMAC_SHA256_RESULT_SIZE 32
/* Compute Hashed Message Authentication Code with SHA-256, over BUFFER
data of BUFLEN bytes using the KEY of KEYLEN bytes, writing the
output to pre-allocated 32 byte minimum RESBUF buffer. Return 0 on
success. */
int hmac_sha256(const void* key, size_t keylen, const void* in, size_t inlen, void* restrict resbuf);

View File

@@ -0,0 +1,24 @@
/* hmac_sha512.c -- hashed message authentication codes
Copyright (C) 2018-2022 Free Software Foundation, Inc.
This file is free software: you can redistribute it and/or modify
it under the terms of the GNU Lesser General Public License as
published by the Free Software Foundation; either version 2.1 of the
License, or (at your option) any later version.
This file is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU Lesser General Public License for more details.
You should have received a copy of the GNU Lesser General Public License
along with this program. If not, see <https://www.gnu.org/licenses/>. */
#include "hmac_sha512.h"
#include "sha512.h"
#define GL_HMAC_NAME 512
#define GL_HMAC_BLOCKSIZE 128
#define GL_HMAC_HASHSIZE 64
#include "hmac_common.h"

View File

@@ -0,0 +1,11 @@
#pragma once
#include <stddef.h>
#define HMAC_SHA512_RESULT_SIZE 64
/* Compute Hashed Message Authentication Code with SHA-512, over BUFFER
data of BUFLEN bytes using the KEY of KEYLEN bytes, writing the
output to pre-allocated 64 byte minimum RESBUF buffer. Return 0 on
success. */
int hmac_sha512(const void* key, size_t keylen, const void* in, size_t inlen, void* restrict resbuf);

View File

@@ -22,13 +22,11 @@
#include "memxor.h" #include "memxor.h"
void* memxor (void */*restrict*/ dest, const void */*restrict*/ src, size_t n) void* memxor(void* /*restrict*/ dest, const void* /*restrict*/ src, size_t n) {
{
char const* s = (char const*)src; char const* s = (char const*)src;
char* d = (char*)dest; char* d = (char*)dest;
for (; n > 0; n--) for(; n > 0; n--) *d++ ^= *s++;
*d++ ^= *s++;
return dest; return dest;
} }

View File

@@ -43,13 +43,10 @@
64-byte boundary. (RFC 1321, 3.1: Step 1) */ 64-byte boundary. (RFC 1321, 3.1: Step 1) */
static const unsigned char fillbuf[64] = {0x80, 0 /* , 0, 0, ... */}; static const unsigned char fillbuf[64] = {0x80, 0 /* , 0, 0, ... */};
/* Take a pointer to a 160 bit block of data (five 32 bit ints) and /* Take a pointer to a 160 bit block of data (five 32 bit ints) and
initialize it to the start constants of the SHA1 algorithm. This initialize it to the start constants of the SHA1 algorithm. This
must be called before using hash in the call to sha1_hash. */ must be called before using hash in the call to sha1_hash. */
void void sha1_init_ctx(struct sha1_ctx* ctx) {
sha1_init_ctx (struct sha1_ctx *ctx)
{
ctx->A = 0x67452301; ctx->A = 0x67452301;
ctx->B = 0xefcdab89; ctx->B = 0xefcdab89;
ctx->C = 0x98badcfe; ctx->C = 0x98badcfe;
@@ -63,17 +60,13 @@ sha1_init_ctx (struct sha1_ctx *ctx)
/* Copy the 4 byte value from v into the memory location pointed to by *cp, /* Copy the 4 byte value from v into the memory location pointed to by *cp,
If your architecture allows unaligned access this is equivalent to If your architecture allows unaligned access this is equivalent to
* (uint32_t *) cp = v */ * (uint32_t *) cp = v */
static void static void set_uint32(char* cp, uint32_t v) {
set_uint32 (char *cp, uint32_t v)
{
memcpy(cp, &v, sizeof v); memcpy(cp, &v, sizeof v);
} }
/* Put result from CTX in first 20 bytes following RESBUF. The result /* Put result from CTX in first 20 bytes following RESBUF. The result
must be in little endian byte order. */ must be in little endian byte order. */
void * void* sha1_read_ctx(const struct sha1_ctx* ctx, void* resbuf) {
sha1_read_ctx (const struct sha1_ctx *ctx, void *resbuf)
{
char* r = resbuf; char* r = resbuf;
set_uint32(r + 0 * sizeof ctx->A, SWAP(ctx->A)); set_uint32(r + 0 * sizeof ctx->A, SWAP(ctx->A));
set_uint32(r + 1 * sizeof ctx->B, SWAP(ctx->B)); set_uint32(r + 1 * sizeof ctx->B, SWAP(ctx->B));
@@ -86,17 +79,14 @@ sha1_read_ctx (const struct sha1_ctx *ctx, void *resbuf)
/* Process the remaining bytes in the internal buffer and the usual /* Process the remaining bytes in the internal buffer and the usual
prolog according to the standard and write the result to RESBUF. */ prolog according to the standard and write the result to RESBUF. */
void * void* sha1_finish_ctx(struct sha1_ctx* ctx, void* resbuf) {
sha1_finish_ctx (struct sha1_ctx *ctx, void *resbuf)
{
/* Take yet unprocessed bytes into account. */ /* Take yet unprocessed bytes into account. */
uint32_t bytes = ctx->buflen; uint32_t bytes = ctx->buflen;
size_t size = (bytes < 56) ? 64 / 4 : 64 * 2 / 4; size_t size = (bytes < 56) ? 64 / 4 : 64 * 2 / 4;
/* Now count remaining bytes. */ /* Now count remaining bytes. */
ctx->total[0] += bytes; ctx->total[0] += bytes;
if (ctx->total[0] < bytes) if(ctx->total[0] < bytes) ++ctx->total[1];
++ctx->total[1];
/* Put the 64-bit file length in *bits* at the end of the buffer. */ /* Put the 64-bit file length in *bits* at the end of the buffer. */
ctx->buffer[size - 2] = SWAP((ctx->total[1] << 3) | (ctx->total[0] >> 29)); ctx->buffer[size - 2] = SWAP((ctx->total[1] << 3) | (ctx->total[0] >> 29));
@@ -114,9 +104,7 @@ sha1_finish_ctx (struct sha1_ctx *ctx, void *resbuf)
result is always in little endian byte order, so that a byte-wise result is always in little endian byte order, so that a byte-wise
output yields to the wanted ASCII representation of the message output yields to the wanted ASCII representation of the message
digest. */ digest. */
void * void* sha1_buffer(const char* buffer, size_t len, void* resblock) {
sha1_buffer (const char *buffer, size_t len, void *resblock)
{
struct sha1_ctx ctx; struct sha1_ctx ctx;
/* Initialize the computation context. */ /* Initialize the computation context. */
@@ -129,29 +117,23 @@ sha1_buffer (const char *buffer, size_t len, void *resblock)
return sha1_finish_ctx(&ctx, resblock); return sha1_finish_ctx(&ctx, resblock);
} }
void void sha1_process_bytes(const void* buffer, size_t len, struct sha1_ctx* ctx) {
sha1_process_bytes (const void *buffer, size_t len, struct sha1_ctx *ctx)
{
/* When we already have some bits in our internal buffer concatenate /* When we already have some bits in our internal buffer concatenate
both inputs first. */ both inputs first. */
if (ctx->buflen != 0) if(ctx->buflen != 0) {
{
size_t left_over = ctx->buflen; size_t left_over = ctx->buflen;
size_t add = 128 - left_over > len ? len : 128 - left_over; size_t add = 128 - left_over > len ? len : 128 - left_over;
memcpy(&((char*)ctx->buffer)[left_over], buffer, add); memcpy(&((char*)ctx->buffer)[left_over], buffer, add);
ctx->buflen += add; ctx->buflen += add;
if (ctx->buflen > 64) if(ctx->buflen > 64) {
{
sha1_process_block(ctx->buffer, ctx->buflen & ~63, ctx); sha1_process_block(ctx->buffer, ctx->buflen & ~63, ctx);
ctx->buflen &= 63; ctx->buflen &= 63;
/* The regions in the following copy operation cannot overlap, /* The regions in the following copy operation cannot overlap,
because ctx->buflen < 64 ≤ (left_over + add) & ~63. */ because ctx->buflen < 64 ≤ (left_over + add) & ~63. */
memcpy (ctx->buffer, memcpy(ctx->buffer, &((char*)ctx->buffer)[(left_over + add) & ~63], ctx->buflen);
&((char *) ctx->buffer)[(left_over + add) & ~63],
ctx->buflen);
} }
buffer = (const char*)buffer + add; buffer = (const char*)buffer + add;
@@ -159,13 +141,11 @@ sha1_process_bytes (const void *buffer, size_t len, struct sha1_ctx *ctx)
} }
/* Process available complete blocks. */ /* Process available complete blocks. */
if (len >= 64) if(len >= 64) {
{
#if !(_STRING_ARCH_unaligned || _STRING_INLINE_unaligned) #if !(_STRING_ARCH_unaligned || _STRING_INLINE_unaligned)
#define UNALIGNED_P(p) ((uintptr_t)(p) % sizeof(uint32_t) != 0) #define UNALIGNED_P(p) ((uintptr_t)(p) % sizeof(uint32_t) != 0)
if(UNALIGNED_P(buffer)) if(UNALIGNED_P(buffer))
while (len > 64) while(len > 64) {
{
sha1_process_block(memcpy(ctx->buffer, buffer, 64), 64, ctx); sha1_process_block(memcpy(ctx->buffer, buffer, 64), 64, ctx);
buffer = (const char*)buffer + 64; buffer = (const char*)buffer + 64;
len -= 64; len -= 64;
@@ -180,14 +160,12 @@ sha1_process_bytes (const void *buffer, size_t len, struct sha1_ctx *ctx)
} }
/* Move remaining bytes in internal buffer. */ /* Move remaining bytes in internal buffer. */
if (len > 0) if(len > 0) {
{
size_t left_over = ctx->buflen; size_t left_over = ctx->buflen;
memcpy(&((char*)ctx->buffer)[left_over], buffer, len); memcpy(&((char*)ctx->buffer)[left_over], buffer, len);
left_over += len; left_over += len;
if (left_over >= 64) if(left_over >= 64) {
{
sha1_process_block(ctx->buffer, 64, ctx); sha1_process_block(ctx->buffer, 64, ctx);
left_over -= 64; left_over -= 64;
/* The regions in the following copy operation cannot overlap, /* The regions in the following copy operation cannot overlap,
@@ -216,9 +194,7 @@ sha1_process_bytes (const void *buffer, size_t len, struct sha1_ctx *ctx)
It is assumed that LEN % 64 == 0. It is assumed that LEN % 64 == 0.
Most of this code comes from GnuPG's cipher/sha1.c. */ Most of this code comes from GnuPG's cipher/sha1.c. */
void void sha1_process_block(const void* buffer, size_t len, struct sha1_ctx* ctx) {
sha1_process_block (const void *buffer, size_t len, struct sha1_ctx *ctx)
{
const uint32_t* words = buffer; const uint32_t* words = buffer;
size_t nwords = len / sizeof(uint32_t); size_t nwords = len / sizeof(uint32_t);
const uint32_t* endp = words + nwords; const uint32_t* endp = words + nwords;
@@ -238,23 +214,20 @@ sha1_process_block (const void *buffer, size_t len, struct sha1_ctx *ctx)
#define rol(x, n) (((x) << (n)) | ((uint32_t)(x) >> (32 - (n)))) #define rol(x, n) (((x) << (n)) | ((uint32_t)(x) >> (32 - (n))))
#define M(I) ( tm = x[I&0x0f] ^ x[(I-14)&0x0f] \ #define M(I) \
^ x[(I-8)&0x0f] ^ x[(I-3)&0x0f] \ (tm = x[I & 0x0f] ^ x[(I - 14) & 0x0f] ^ x[(I - 8) & 0x0f] ^ x[(I - 3) & 0x0f], \
, (x[I&0x0f] = rol(tm, 1)) ) (x[I & 0x0f] = rol(tm, 1)))
#define R(A,B,C,D,E,F,K,M) do { E += rol( A, 5 ) \ #define R(A, B, C, D, E, F, K, M) \
+ F( B, C, D ) \ do { \
+ K \ E += rol(A, 5) + F(B, C, D) + K + M; \
+ M; \
B = rol(B, 30); \ B = rol(B, 30); \
} while(0) } while(0)
while (words < endp) while(words < endp) {
{
uint32_t tm; uint32_t tm;
int t; int t;
for (t = 0; t < 16; t++) for(t = 0; t < 16; t++) {
{
x[t] = SWAP(*words); x[t] = SWAP(*words);
words++; words++;
} }

View File

@@ -39,8 +39,7 @@ extern "C" {
#include "gl_openssl.h" #include "gl_openssl.h"
#else #else
/* Structure to save state of computation between the single steps. */ /* Structure to save state of computation between the single steps. */
struct sha1_ctx struct sha1_ctx {
{
uint32_t A; uint32_t A;
uint32_t B; uint32_t B;
uint32_t C; uint32_t C;
@@ -59,15 +58,13 @@ extern void sha1_init_ctx (struct sha1_ctx *ctx);
initialization function update the context for the next LEN bytes initialization function update the context for the next LEN bytes
starting at BUFFER. starting at BUFFER.
It is necessary that LEN is a multiple of 64!!! */ It is necessary that LEN is a multiple of 64!!! */
extern void sha1_process_block (const void *buffer, size_t len, extern void sha1_process_block(const void* buffer, size_t len, struct sha1_ctx* ctx);
struct sha1_ctx *ctx);
/* Starting with the result of former calls of this function (or the /* Starting with the result of former calls of this function (or the
initialization function update the context for the next LEN bytes initialization function update the context for the next LEN bytes
starting at BUFFER. starting at BUFFER.
It is NOT required that LEN is a multiple of 64. */ It is NOT required that LEN is a multiple of 64. */
extern void sha1_process_bytes (const void *buffer, size_t len, extern void sha1_process_bytes(const void* buffer, size_t len, struct sha1_ctx* ctx);
struct sha1_ctx *ctx);
/* Process the remaining bytes in the buffer and put result from CTX /* Process the remaining bytes in the buffer and put result from CTX
in first 20 bytes following RESBUF. The result is always in little in first 20 bytes following RESBUF. The result is always in little
@@ -75,19 +72,16 @@ extern void sha1_process_bytes (const void *buffer, size_t len,
ASCII representation of the message digest. */ ASCII representation of the message digest. */
extern void* sha1_finish_ctx(struct sha1_ctx* ctx, void* restrict resbuf); extern void* sha1_finish_ctx(struct sha1_ctx* ctx, void* restrict resbuf);
/* Put result from CTX in first 20 bytes following RESBUF. The result is /* Put result from CTX in first 20 bytes following RESBUF. The result is
always in little endian byte order, so that a byte-wise output yields always in little endian byte order, so that a byte-wise output yields
to the wanted ASCII representation of the message digest. */ to the wanted ASCII representation of the message digest. */
extern void* sha1_read_ctx(const struct sha1_ctx* ctx, void* restrict resbuf); extern void* sha1_read_ctx(const struct sha1_ctx* ctx, void* restrict resbuf);
/* Compute SHA1 message digest for LEN bytes beginning at BUFFER. The /* Compute SHA1 message digest for LEN bytes beginning at BUFFER. The
result is always in little endian byte order, so that a byte-wise result is always in little endian byte order, so that a byte-wise
output yields to the wanted ASCII representation of the message output yields to the wanted ASCII representation of the message
digest. */ digest. */
extern void *sha1_buffer (const char *buffer, size_t len, extern void* sha1_buffer(const char* buffer, size_t len, void* restrict resblock);
void *restrict resblock);
#endif #endif
@@ -99,7 +93,6 @@ extern void *sha1_buffer (const char *buffer, size_t len,
beginning at RESBLOCK. */ beginning at RESBLOCK. */
extern int sha1_stream(FILE* stream, void* resblock); extern int sha1_stream(FILE* stream, void* resblock);
#ifdef __cplusplus #ifdef __cplusplus
} }
#endif #endif

View File

@@ -42,15 +42,12 @@
64-byte boundary. */ 64-byte boundary. */
static const unsigned char fillbuf[64] = {0x80, 0 /* , 0, 0, ... */}; static const unsigned char fillbuf[64] = {0x80, 0 /* , 0, 0, ... */};
/* /*
Takes a pointer to a 256 bit block of data (eight 32 bit ints) and Takes a pointer to a 256 bit block of data (eight 32 bit ints) and
initializes it to the start constants of the SHA256 algorithm. This initializes it to the start constants of the SHA256 algorithm. This
must be called before using hash in the call to sha256_hash must be called before using hash in the call to sha256_hash
*/ */
void void sha256_init_ctx(struct sha256_ctx* ctx) {
sha256_init_ctx (struct sha256_ctx *ctx)
{
ctx->state[0] = 0x6a09e667UL; ctx->state[0] = 0x6a09e667UL;
ctx->state[1] = 0xbb67ae85UL; ctx->state[1] = 0xbb67ae85UL;
ctx->state[2] = 0x3c6ef372UL; ctx->state[2] = 0x3c6ef372UL;
@@ -64,9 +61,7 @@ sha256_init_ctx (struct sha256_ctx *ctx)
ctx->buflen = 0; ctx->buflen = 0;
} }
void void sha224_init_ctx(struct sha256_ctx* ctx) {
sha224_init_ctx (struct sha256_ctx *ctx)
{
ctx->state[0] = 0xc1059ed8UL; ctx->state[0] = 0xc1059ed8UL;
ctx->state[1] = 0x367cd507UL; ctx->state[1] = 0x367cd507UL;
ctx->state[2] = 0x3070dd17UL; ctx->state[2] = 0x3070dd17UL;
@@ -83,59 +78,46 @@ sha224_init_ctx (struct sha256_ctx *ctx)
/* Copy the value from v into the memory location pointed to by *CP, /* Copy the value from v into the memory location pointed to by *CP,
If your architecture allows unaligned access, this is equivalent to If your architecture allows unaligned access, this is equivalent to
* (__typeof__ (v) *) cp = v */ * (__typeof__ (v) *) cp = v */
static void static void set_uint32(char* cp, uint32_t v) {
set_uint32 (char *cp, uint32_t v)
{
memcpy(cp, &v, sizeof v); memcpy(cp, &v, sizeof v);
} }
/* Put result from CTX in first 32 bytes following RESBUF. /* Put result from CTX in first 32 bytes following RESBUF.
The result must be in little endian byte order. */ The result must be in little endian byte order. */
void * void* sha256_read_ctx(const struct sha256_ctx* ctx, void* resbuf) {
sha256_read_ctx (const struct sha256_ctx *ctx, void *resbuf)
{
int i; int i;
char* r = resbuf; char* r = resbuf;
for (i = 0; i < 8; i++) for(i = 0; i < 8; i++) set_uint32(r + i * sizeof ctx->state[0], SWAP(ctx->state[i]));
set_uint32 (r + i * sizeof ctx->state[0], SWAP (ctx->state[i]));
return resbuf; return resbuf;
} }
void * void* sha224_read_ctx(const struct sha256_ctx* ctx, void* resbuf) {
sha224_read_ctx (const struct sha256_ctx *ctx, void *resbuf)
{
int i; int i;
char* r = resbuf; char* r = resbuf;
for (i = 0; i < 7; i++) for(i = 0; i < 7; i++) set_uint32(r + i * sizeof ctx->state[0], SWAP(ctx->state[i]));
set_uint32 (r + i * sizeof ctx->state[0], SWAP (ctx->state[i]));
return resbuf; return resbuf;
} }
/* Process the remaining bytes in the internal buffer and the usual /* Process the remaining bytes in the internal buffer and the usual
prolog according to the standard and write the result to RESBUF. */ prolog according to the standard and write the result to RESBUF. */
static void static void sha256_conclude_ctx(struct sha256_ctx* ctx) {
sha256_conclude_ctx (struct sha256_ctx *ctx)
{
/* Take yet unprocessed bytes into account. */ /* Take yet unprocessed bytes into account. */
size_t bytes = ctx->buflen; size_t bytes = ctx->buflen;
size_t size = (bytes < 56) ? 64 / 4 : 64 * 2 / 4; size_t size = (bytes < 56) ? 64 / 4 : 64 * 2 / 4;
/* Now count remaining bytes. */ /* Now count remaining bytes. */
ctx->total[0] += bytes; ctx->total[0] += bytes;
if (ctx->total[0] < bytes) if(ctx->total[0] < bytes) ++ctx->total[1];
++ctx->total[1];
/* Put the 64-bit file length in *bits* at the end of the buffer. /* Put the 64-bit file length in *bits* at the end of the buffer.
Use set_uint32 rather than a simple assignment, to avoid risk of Use set_uint32 rather than a simple assignment, to avoid risk of
unaligned access. */ unaligned access. */
set_uint32 ((char *) &ctx->buffer[size - 2], set_uint32((char*)&ctx->buffer[size - 2], SWAP((ctx->total[1] << 3) | (ctx->total[0] >> 29)));
SWAP ((ctx->total[1] << 3) | (ctx->total[0] >> 29))); set_uint32((char*)&ctx->buffer[size - 1], SWAP(ctx->total[0] << 3));
set_uint32 ((char *) &ctx->buffer[size - 1],
SWAP (ctx->total[0] << 3));
memcpy(&((char*)ctx->buffer)[bytes], fillbuf, (size - 2) * 4 - bytes); memcpy(&((char*)ctx->buffer)[bytes], fillbuf, (size - 2) * 4 - bytes);
@@ -143,16 +125,12 @@ sha256_conclude_ctx (struct sha256_ctx *ctx)
sha256_process_block(ctx->buffer, size * 4, ctx); sha256_process_block(ctx->buffer, size * 4, ctx);
} }
void * void* sha256_finish_ctx(struct sha256_ctx* ctx, void* resbuf) {
sha256_finish_ctx (struct sha256_ctx *ctx, void *resbuf)
{
sha256_conclude_ctx(ctx); sha256_conclude_ctx(ctx);
return sha256_read_ctx(ctx, resbuf); return sha256_read_ctx(ctx, resbuf);
} }
void * void* sha224_finish_ctx(struct sha256_ctx* ctx, void* resbuf) {
sha224_finish_ctx (struct sha256_ctx *ctx, void *resbuf)
{
sha256_conclude_ctx(ctx); sha256_conclude_ctx(ctx);
return sha224_read_ctx(ctx, resbuf); return sha224_read_ctx(ctx, resbuf);
} }
@@ -161,9 +139,7 @@ sha224_finish_ctx (struct sha256_ctx *ctx, void *resbuf)
result is always in little endian byte order, so that a byte-wise result is always in little endian byte order, so that a byte-wise
output yields to the wanted ASCII representation of the message output yields to the wanted ASCII representation of the message
digest. */ digest. */
void * void* sha256_buffer(const char* buffer, size_t len, void* resblock) {
sha256_buffer (const char *buffer, size_t len, void *resblock)
{
struct sha256_ctx ctx; struct sha256_ctx ctx;
/* Initialize the computation context. */ /* Initialize the computation context. */
@@ -176,9 +152,7 @@ sha256_buffer (const char *buffer, size_t len, void *resblock)
return sha256_finish_ctx(&ctx, resblock); return sha256_finish_ctx(&ctx, resblock);
} }
void * void* sha224_buffer(const char* buffer, size_t len, void* resblock) {
sha224_buffer (const char *buffer, size_t len, void *resblock)
{
struct sha256_ctx ctx; struct sha256_ctx ctx;
/* Initialize the computation context. */ /* Initialize the computation context. */
@@ -191,29 +165,23 @@ sha224_buffer (const char *buffer, size_t len, void *resblock)
return sha224_finish_ctx(&ctx, resblock); return sha224_finish_ctx(&ctx, resblock);
} }
void void sha256_process_bytes(const void* buffer, size_t len, struct sha256_ctx* ctx) {
sha256_process_bytes (const void *buffer, size_t len, struct sha256_ctx *ctx)
{
/* When we already have some bits in our internal buffer concatenate /* When we already have some bits in our internal buffer concatenate
both inputs first. */ both inputs first. */
if (ctx->buflen != 0) if(ctx->buflen != 0) {
{
size_t left_over = ctx->buflen; size_t left_over = ctx->buflen;
size_t add = 128 - left_over > len ? len : 128 - left_over; size_t add = 128 - left_over > len ? len : 128 - left_over;
memcpy(&((char*)ctx->buffer)[left_over], buffer, add); memcpy(&((char*)ctx->buffer)[left_over], buffer, add);
ctx->buflen += add; ctx->buflen += add;
if (ctx->buflen > 64) if(ctx->buflen > 64) {
{
sha256_process_block(ctx->buffer, ctx->buflen & ~63, ctx); sha256_process_block(ctx->buffer, ctx->buflen & ~63, ctx);
ctx->buflen &= 63; ctx->buflen &= 63;
/* The regions in the following copy operation cannot overlap, /* The regions in the following copy operation cannot overlap,
because ctx->buflen < 64 ≤ (left_over + add) & ~63. */ because ctx->buflen < 64 ≤ (left_over + add) & ~63. */
memcpy (ctx->buffer, memcpy(ctx->buffer, &((char*)ctx->buffer)[(left_over + add) & ~63], ctx->buflen);
&((char *) ctx->buffer)[(left_over + add) & ~63],
ctx->buflen);
} }
buffer = (const char*)buffer + add; buffer = (const char*)buffer + add;
@@ -221,13 +189,11 @@ sha256_process_bytes (const void *buffer, size_t len, struct sha256_ctx *ctx)
} }
/* Process available complete blocks. */ /* Process available complete blocks. */
if (len >= 64) if(len >= 64) {
{
#if !(_STRING_ARCH_unaligned || _STRING_INLINE_unaligned) #if !(_STRING_ARCH_unaligned || _STRING_INLINE_unaligned)
#define UNALIGNED_P(p) ((uintptr_t)(p) % sizeof(uint32_t) != 0) #define UNALIGNED_P(p) ((uintptr_t)(p) % sizeof(uint32_t) != 0)
if(UNALIGNED_P(buffer)) if(UNALIGNED_P(buffer))
while (len > 64) while(len > 64) {
{
sha256_process_block(memcpy(ctx->buffer, buffer, 64), 64, ctx); sha256_process_block(memcpy(ctx->buffer, buffer, 64), 64, ctx);
buffer = (const char*)buffer + 64; buffer = (const char*)buffer + 64;
len -= 64; len -= 64;
@@ -242,14 +208,12 @@ sha256_process_bytes (const void *buffer, size_t len, struct sha256_ctx *ctx)
} }
/* Move remaining bytes in internal buffer. */ /* Move remaining bytes in internal buffer. */
if (len > 0) if(len > 0) {
{
size_t left_over = ctx->buflen; size_t left_over = ctx->buflen;
memcpy(&((char*)ctx->buffer)[left_over], buffer, len); memcpy(&((char*)ctx->buffer)[left_over], buffer, len);
left_over += len; left_over += len;
if (left_over >= 64) if(left_over >= 64) {
{
sha256_process_block(ctx->buffer, 64, ctx); sha256_process_block(ctx->buffer, 64, ctx);
left_over -= 64; left_over -= 64;
/* The regions in the following copy operation cannot overlap, /* The regions in the following copy operation cannot overlap,
@@ -265,21 +229,16 @@ sha256_process_bytes (const void *buffer, size_t len, struct sha256_ctx *ctx)
/* SHA256 round constants */ /* SHA256 round constants */
#define K(I) sha256_round_constants[I] #define K(I) sha256_round_constants[I]
static const uint32_t sha256_round_constants[64] = { static const uint32_t sha256_round_constants[64] = {
0x428a2f98UL, 0x71374491UL, 0xb5c0fbcfUL, 0xe9b5dba5UL, 0x428a2f98UL, 0x71374491UL, 0xb5c0fbcfUL, 0xe9b5dba5UL, 0x3956c25bUL, 0x59f111f1UL,
0x3956c25bUL, 0x59f111f1UL, 0x923f82a4UL, 0xab1c5ed5UL, 0x923f82a4UL, 0xab1c5ed5UL, 0xd807aa98UL, 0x12835b01UL, 0x243185beUL, 0x550c7dc3UL,
0xd807aa98UL, 0x12835b01UL, 0x243185beUL, 0x550c7dc3UL, 0x72be5d74UL, 0x80deb1feUL, 0x9bdc06a7UL, 0xc19bf174UL, 0xe49b69c1UL, 0xefbe4786UL,
0x72be5d74UL, 0x80deb1feUL, 0x9bdc06a7UL, 0xc19bf174UL, 0x0fc19dc6UL, 0x240ca1ccUL, 0x2de92c6fUL, 0x4a7484aaUL, 0x5cb0a9dcUL, 0x76f988daUL,
0xe49b69c1UL, 0xefbe4786UL, 0x0fc19dc6UL, 0x240ca1ccUL, 0x983e5152UL, 0xa831c66dUL, 0xb00327c8UL, 0xbf597fc7UL, 0xc6e00bf3UL, 0xd5a79147UL,
0x2de92c6fUL, 0x4a7484aaUL, 0x5cb0a9dcUL, 0x76f988daUL, 0x06ca6351UL, 0x14292967UL, 0x27b70a85UL, 0x2e1b2138UL, 0x4d2c6dfcUL, 0x53380d13UL,
0x983e5152UL, 0xa831c66dUL, 0xb00327c8UL, 0xbf597fc7UL, 0x650a7354UL, 0x766a0abbUL, 0x81c2c92eUL, 0x92722c85UL, 0xa2bfe8a1UL, 0xa81a664bUL,
0xc6e00bf3UL, 0xd5a79147UL, 0x06ca6351UL, 0x14292967UL, 0xc24b8b70UL, 0xc76c51a3UL, 0xd192e819UL, 0xd6990624UL, 0xf40e3585UL, 0x106aa070UL,
0x27b70a85UL, 0x2e1b2138UL, 0x4d2c6dfcUL, 0x53380d13UL, 0x19a4c116UL, 0x1e376c08UL, 0x2748774cUL, 0x34b0bcb5UL, 0x391c0cb3UL, 0x4ed8aa4aUL,
0x650a7354UL, 0x766a0abbUL, 0x81c2c92eUL, 0x92722c85UL, 0x5b9cca4fUL, 0x682e6ff3UL, 0x748f82eeUL, 0x78a5636fUL, 0x84c87814UL, 0x8cc70208UL,
0xa2bfe8a1UL, 0xa81a664bUL, 0xc24b8b70UL, 0xc76c51a3UL,
0xd192e819UL, 0xd6990624UL, 0xf40e3585UL, 0x106aa070UL,
0x19a4c116UL, 0x1e376c08UL, 0x2748774cUL, 0x34b0bcb5UL,
0x391c0cb3UL, 0x4ed8aa4aUL, 0x5b9cca4fUL, 0x682e6ff3UL,
0x748f82eeUL, 0x78a5636fUL, 0x84c87814UL, 0x8cc70208UL,
0x90befffaUL, 0xa4506cebUL, 0xbef9a3f7UL, 0xc67178f2UL, 0x90befffaUL, 0xa4506cebUL, 0xbef9a3f7UL, 0xc67178f2UL,
}; };
@@ -291,9 +250,7 @@ static const uint32_t sha256_round_constants[64] = {
It is assumed that LEN % 64 == 0. It is assumed that LEN % 64 == 0.
Most of this code comes from GnuPG's cipher/sha1.c. */ Most of this code comes from GnuPG's cipher/sha1.c. */
void void sha256_process_block(const void* buffer, size_t len, struct sha256_ctx* ctx) {
sha256_process_block (const void *buffer, size_t len, struct sha256_ctx *ctx)
{
const uint32_t* words = buffer; const uint32_t* words = buffer;
size_t nwords = len / sizeof(uint32_t); size_t nwords = len / sizeof(uint32_t);
const uint32_t* endp = words + nwords; const uint32_t* endp = words + nwords;
@@ -320,26 +277,24 @@ sha256_process_block (const void *buffer, size_t len, struct sha256_ctx *ctx)
#define SS0(x) (rol(x, 30) ^ rol(x, 19) ^ rol(x, 10)) #define SS0(x) (rol(x, 30) ^ rol(x, 19) ^ rol(x, 10))
#define SS1(x) (rol(x, 26) ^ rol(x, 21) ^ rol(x, 7)) #define SS1(x) (rol(x, 26) ^ rol(x, 21) ^ rol(x, 7))
#define M(I) ( tm = S1(x[(I-2)&0x0f]) + x[(I-7)&0x0f] \ #define M(I) \
+ S0(x[(I-15)&0x0f]) + x[I&0x0f] \ (tm = S1(x[(I - 2) & 0x0f]) + x[(I - 7) & 0x0f] + S0(x[(I - 15) & 0x0f]) + x[I & 0x0f], \
, x[I&0x0f] = tm ) x[I & 0x0f] = tm)
#define R(A,B,C,D,E,F,G,H,K,M) do { t0 = SS0(A) + F2(A,B,C); \ #define R(A, B, C, D, E, F, G, H, K, M) \
t1 = H + SS1(E) \ do { \
+ F1(E,F,G) \ t0 = SS0(A) + F2(A, B, C); \
+ K \ t1 = H + SS1(E) + F1(E, F, G) + K + M; \
+ M; \ D += t1; \
D += t1; H = t0 + t1; \ H = t0 + t1; \
} while(0) } while(0)
while (words < endp) while(words < endp) {
{
uint32_t tm; uint32_t tm;
uint32_t t0, t1; uint32_t t0, t1;
int t; int t;
/* FIXME: see sha1.c for a better implementation. */ /* FIXME: see sha1.c for a better implementation. */
for (t = 0; t < 16; t++) for(t = 0; t < 16; t++) {
{
x[t] = SWAP(*words); x[t] = SWAP(*words);
words++; words++;
} }

View File

@@ -41,8 +41,7 @@ enum { SHA256_DIGEST_SIZE = 256 / 8 };
#include "gl_openssl.h" #include "gl_openssl.h"
#else #else
/* Structure to save state of computation between the single steps. */ /* Structure to save state of computation between the single steps. */
struct sha256_ctx struct sha256_ctx {
{
uint32_t state[8]; uint32_t state[8];
uint32_t total[2]; uint32_t total[2];
@@ -58,15 +57,13 @@ extern void sha224_init_ctx (struct sha256_ctx *ctx);
initialization function update the context for the next LEN bytes initialization function update the context for the next LEN bytes
starting at BUFFER. starting at BUFFER.
It is necessary that LEN is a multiple of 64!!! */ It is necessary that LEN is a multiple of 64!!! */
extern void sha256_process_block (const void *buffer, size_t len, extern void sha256_process_block(const void* buffer, size_t len, struct sha256_ctx* ctx);
struct sha256_ctx *ctx);
/* Starting with the result of former calls of this function (or the /* Starting with the result of former calls of this function (or the
initialization function update the context for the next LEN bytes initialization function update the context for the next LEN bytes
starting at BUFFER. starting at BUFFER.
It is NOT required that LEN is a multiple of 64. */ It is NOT required that LEN is a multiple of 64. */
extern void sha256_process_bytes (const void *buffer, size_t len, extern void sha256_process_bytes(const void* buffer, size_t len, struct sha256_ctx* ctx);
struct sha256_ctx *ctx);
/* Process the remaining bytes in the buffer and put result from CTX /* Process the remaining bytes in the buffer and put result from CTX
in first 32 (28) bytes following RESBUF. The result is always in little in first 32 (28) bytes following RESBUF. The result is always in little
@@ -75,24 +72,18 @@ extern void sha256_process_bytes (const void *buffer, size_t len,
extern void* sha256_finish_ctx(struct sha256_ctx* ctx, void* restrict resbuf); extern void* sha256_finish_ctx(struct sha256_ctx* ctx, void* restrict resbuf);
extern void* sha224_finish_ctx(struct sha256_ctx* ctx, void* restrict resbuf); extern void* sha224_finish_ctx(struct sha256_ctx* ctx, void* restrict resbuf);
/* Put result from CTX in first 32 (28) bytes following RESBUF. The result is /* Put result from CTX in first 32 (28) bytes following RESBUF. The result is
always in little endian byte order, so that a byte-wise output yields always in little endian byte order, so that a byte-wise output yields
to the wanted ASCII representation of the message digest. */ to the wanted ASCII representation of the message digest. */
extern void *sha256_read_ctx (const struct sha256_ctx *ctx, extern void* sha256_read_ctx(const struct sha256_ctx* ctx, void* restrict resbuf);
void *restrict resbuf); extern void* sha224_read_ctx(const struct sha256_ctx* ctx, void* restrict resbuf);
extern void *sha224_read_ctx (const struct sha256_ctx *ctx,
void *restrict resbuf);
/* Compute SHA256 (SHA224) message digest for LEN bytes beginning at BUFFER. /* Compute SHA256 (SHA224) message digest for LEN bytes beginning at BUFFER.
The result is always in little endian byte order, so that a byte-wise The result is always in little endian byte order, so that a byte-wise
output yields to the wanted ASCII representation of the message output yields to the wanted ASCII representation of the message
digest. */ digest. */
extern void *sha256_buffer (const char *buffer, size_t len, extern void* sha256_buffer(const char* buffer, size_t len, void* restrict resblock);
void *restrict resblock); extern void* sha224_buffer(const char* buffer, size_t len, void* restrict resblock);
extern void *sha224_buffer (const char *buffer, size_t len,
void *restrict resblock);
#endif #endif
@@ -105,7 +96,6 @@ extern void *sha224_buffer (const char *buffer, size_t len,
extern int sha256_stream(FILE* stream, void* resblock); extern int sha256_stream(FILE* stream, void* resblock);
extern int sha224_stream(FILE* stream, void* resblock); extern int sha224_stream(FILE* stream, void* resblock);
#ifdef __cplusplus #ifdef __cplusplus
} }
#endif #endif

View File

@@ -42,15 +42,12 @@
128-byte boundary. */ 128-byte boundary. */
static const unsigned char fillbuf[128] = {0x80, 0 /* , 0, 0, ... */}; static const unsigned char fillbuf[128] = {0x80, 0 /* , 0, 0, ... */};
/* /*
Takes a pointer to a 512 bit block of data (eight 64 bit ints) and Takes a pointer to a 512 bit block of data (eight 64 bit ints) and
initializes it to the start constants of the SHA512 algorithm. This initializes it to the start constants of the SHA512 algorithm. This
must be called before using hash in the call to sha512_hash must be called before using hash in the call to sha512_hash
*/ */
void void sha512_init_ctx(struct sha512_ctx* ctx) {
sha512_init_ctx (struct sha512_ctx *ctx)
{
ctx->state[0] = u64hilo(0x6a09e667, 0xf3bcc908); ctx->state[0] = u64hilo(0x6a09e667, 0xf3bcc908);
ctx->state[1] = u64hilo(0xbb67ae85, 0x84caa73b); ctx->state[1] = u64hilo(0xbb67ae85, 0x84caa73b);
ctx->state[2] = u64hilo(0x3c6ef372, 0xfe94f82b); ctx->state[2] = u64hilo(0x3c6ef372, 0xfe94f82b);
@@ -64,9 +61,7 @@ sha512_init_ctx (struct sha512_ctx *ctx)
ctx->buflen = 0; ctx->buflen = 0;
} }
void void sha384_init_ctx(struct sha512_ctx* ctx) {
sha384_init_ctx (struct sha512_ctx *ctx)
{
ctx->state[0] = u64hilo(0xcbbb9d5d, 0xc1059ed8); ctx->state[0] = u64hilo(0xcbbb9d5d, 0xc1059ed8);
ctx->state[1] = u64hilo(0x629a292a, 0x367cd507); ctx->state[1] = u64hilo(0x629a292a, 0x367cd507);
ctx->state[2] = u64hilo(0x9159015a, 0x3070dd17); ctx->state[2] = u64hilo(0x9159015a, 0x3070dd17);
@@ -83,60 +78,48 @@ sha384_init_ctx (struct sha512_ctx *ctx)
/* Copy the value from V into the memory location pointed to by *CP, /* Copy the value from V into the memory location pointed to by *CP,
If your architecture allows unaligned access, this is equivalent to If your architecture allows unaligned access, this is equivalent to
* (__typeof__ (v) *) cp = v */ * (__typeof__ (v) *) cp = v */
static void static void set_uint64(char* cp, u64 v) {
set_uint64 (char *cp, u64 v)
{
memcpy(cp, &v, sizeof v); memcpy(cp, &v, sizeof v);
} }
/* Put result from CTX in first 64 bytes following RESBUF. /* Put result from CTX in first 64 bytes following RESBUF.
The result must be in little endian byte order. */ The result must be in little endian byte order. */
void * void* sha512_read_ctx(const struct sha512_ctx* ctx, void* resbuf) {
sha512_read_ctx (const struct sha512_ctx *ctx, void *resbuf)
{
int i; int i;
char* r = resbuf; char* r = resbuf;
for (i = 0; i < 8; i++) for(i = 0; i < 8; i++) set_uint64(r + i * sizeof ctx->state[0], SWAP(ctx->state[i]));
set_uint64 (r + i * sizeof ctx->state[0], SWAP (ctx->state[i]));
return resbuf; return resbuf;
} }
void * void* sha384_read_ctx(const struct sha512_ctx* ctx, void* resbuf) {
sha384_read_ctx (const struct sha512_ctx *ctx, void *resbuf)
{
int i; int i;
char* r = resbuf; char* r = resbuf;
for (i = 0; i < 6; i++) for(i = 0; i < 6; i++) set_uint64(r + i * sizeof ctx->state[0], SWAP(ctx->state[i]));
set_uint64 (r + i * sizeof ctx->state[0], SWAP (ctx->state[i]));
return resbuf; return resbuf;
} }
/* Process the remaining bytes in the internal buffer and the usual /* Process the remaining bytes in the internal buffer and the usual
prolog according to the standard and write the result to RESBUF. */ prolog according to the standard and write the result to RESBUF. */
static void static void sha512_conclude_ctx(struct sha512_ctx* ctx) {
sha512_conclude_ctx (struct sha512_ctx *ctx)
{
/* Take yet unprocessed bytes into account. */ /* Take yet unprocessed bytes into account. */
size_t bytes = ctx->buflen; size_t bytes = ctx->buflen;
size_t size = (bytes < 112) ? 128 / 8 : 128 * 2 / 8; size_t size = (bytes < 112) ? 128 / 8 : 128 * 2 / 8;
/* Now count remaining bytes. */ /* Now count remaining bytes. */
ctx->total[0] = u64plus(ctx->total[0], u64lo(bytes)); ctx->total[0] = u64plus(ctx->total[0], u64lo(bytes));
if (u64lt (ctx->total[0], u64lo (bytes))) if(u64lt(ctx->total[0], u64lo(bytes))) ctx->total[1] = u64plus(ctx->total[1], u64lo(1));
ctx->total[1] = u64plus (ctx->total[1], u64lo (1));
/* Put the 128-bit file length in *bits* at the end of the buffer. /* Put the 128-bit file length in *bits* at the end of the buffer.
Use set_uint64 rather than a simple assignment, to avoid risk of Use set_uint64 rather than a simple assignment, to avoid risk of
unaligned access. */ unaligned access. */
set_uint64 ((char *) &ctx->buffer[size - 2], set_uint64(
SWAP (u64or (u64shl (ctx->total[1], 3), (char*)&ctx->buffer[size - 2],
u64shr (ctx->total[0], 61)))); SWAP(u64or(u64shl(ctx->total[1], 3), u64shr(ctx->total[0], 61))));
set_uint64 ((char *) &ctx->buffer[size - 1], set_uint64((char*)&ctx->buffer[size - 1], SWAP(u64shl(ctx->total[0], 3)));
SWAP (u64shl (ctx->total[0], 3)));
memcpy(&((char*)ctx->buffer)[bytes], fillbuf, (size - 2) * 8 - bytes); memcpy(&((char*)ctx->buffer)[bytes], fillbuf, (size - 2) * 8 - bytes);
@@ -144,16 +127,12 @@ sha512_conclude_ctx (struct sha512_ctx *ctx)
sha512_process_block(ctx->buffer, size * 8, ctx); sha512_process_block(ctx->buffer, size * 8, ctx);
} }
void * void* sha512_finish_ctx(struct sha512_ctx* ctx, void* resbuf) {
sha512_finish_ctx (struct sha512_ctx *ctx, void *resbuf)
{
sha512_conclude_ctx(ctx); sha512_conclude_ctx(ctx);
return sha512_read_ctx(ctx, resbuf); return sha512_read_ctx(ctx, resbuf);
} }
void * void* sha384_finish_ctx(struct sha512_ctx* ctx, void* resbuf) {
sha384_finish_ctx (struct sha512_ctx *ctx, void *resbuf)
{
sha512_conclude_ctx(ctx); sha512_conclude_ctx(ctx);
return sha384_read_ctx(ctx, resbuf); return sha384_read_ctx(ctx, resbuf);
} }
@@ -162,9 +141,7 @@ sha384_finish_ctx (struct sha512_ctx *ctx, void *resbuf)
result is always in little endian byte order, so that a byte-wise result is always in little endian byte order, so that a byte-wise
output yields to the wanted ASCII representation of the message output yields to the wanted ASCII representation of the message
digest. */ digest. */
void * void* sha512_buffer(const char* buffer, size_t len, void* resblock) {
sha512_buffer (const char *buffer, size_t len, void *resblock)
{
struct sha512_ctx ctx; struct sha512_ctx ctx;
/* Initialize the computation context. */ /* Initialize the computation context. */
@@ -177,9 +154,7 @@ sha512_buffer (const char *buffer, size_t len, void *resblock)
return sha512_finish_ctx(&ctx, resblock); return sha512_finish_ctx(&ctx, resblock);
} }
void * void* sha384_buffer(const char* buffer, size_t len, void* resblock) {
sha384_buffer (const char *buffer, size_t len, void *resblock)
{
struct sha512_ctx ctx; struct sha512_ctx ctx;
/* Initialize the computation context. */ /* Initialize the computation context. */
@@ -192,29 +167,23 @@ sha384_buffer (const char *buffer, size_t len, void *resblock)
return sha384_finish_ctx(&ctx, resblock); return sha384_finish_ctx(&ctx, resblock);
} }
void void sha512_process_bytes(const void* buffer, size_t len, struct sha512_ctx* ctx) {
sha512_process_bytes (const void *buffer, size_t len, struct sha512_ctx *ctx)
{
/* When we already have some bits in our internal buffer concatenate /* When we already have some bits in our internal buffer concatenate
both inputs first. */ both inputs first. */
if (ctx->buflen != 0) if(ctx->buflen != 0) {
{
size_t left_over = ctx->buflen; size_t left_over = ctx->buflen;
size_t add = 256 - left_over > len ? len : 256 - left_over; size_t add = 256 - left_over > len ? len : 256 - left_over;
memcpy(&((char*)ctx->buffer)[left_over], buffer, add); memcpy(&((char*)ctx->buffer)[left_over], buffer, add);
ctx->buflen += add; ctx->buflen += add;
if (ctx->buflen > 128) if(ctx->buflen > 128) {
{
sha512_process_block(ctx->buffer, ctx->buflen & ~127, ctx); sha512_process_block(ctx->buffer, ctx->buflen & ~127, ctx);
ctx->buflen &= 127; ctx->buflen &= 127;
/* The regions in the following copy operation cannot overlap, /* The regions in the following copy operation cannot overlap,
because ctx->buflen < 128 ≤ (left_over + add) & ~127. */ because ctx->buflen < 128 ≤ (left_over + add) & ~127. */
memcpy (ctx->buffer, memcpy(ctx->buffer, &((char*)ctx->buffer)[(left_over + add) & ~127], ctx->buflen);
&((char *) ctx->buffer)[(left_over + add) & ~127],
ctx->buflen);
} }
buffer = (const char*)buffer + add; buffer = (const char*)buffer + add;
@@ -222,13 +191,11 @@ sha512_process_bytes (const void *buffer, size_t len, struct sha512_ctx *ctx)
} }
/* Process available complete blocks. */ /* Process available complete blocks. */
if (len >= 128) if(len >= 128) {
{
#if !(_STRING_ARCH_unaligned || _STRING_INLINE_unaligned) #if !(_STRING_ARCH_unaligned || _STRING_INLINE_unaligned)
#define UNALIGNED_P(p) ((uintptr_t)(p) % sizeof(u64) != 0) #define UNALIGNED_P(p) ((uintptr_t)(p) % sizeof(u64) != 0)
if(UNALIGNED_P(buffer)) if(UNALIGNED_P(buffer))
while (len > 128) while(len > 128) {
{
sha512_process_block(memcpy(ctx->buffer, buffer, 128), 128, ctx); sha512_process_block(memcpy(ctx->buffer, buffer, 128), 128, ctx);
buffer = (const char*)buffer + 128; buffer = (const char*)buffer + 128;
len -= 128; len -= 128;
@@ -243,14 +210,12 @@ sha512_process_bytes (const void *buffer, size_t len, struct sha512_ctx *ctx)
} }
/* Move remaining bytes in internal buffer. */ /* Move remaining bytes in internal buffer. */
if (len > 0) if(len > 0) {
{
size_t left_over = ctx->buflen; size_t left_over = ctx->buflen;
memcpy(&((char*)ctx->buffer)[left_over], buffer, len); memcpy(&((char*)ctx->buffer)[left_over], buffer, len);
left_over += len; left_over += len;
if (left_over >= 128) if(left_over >= 128) {
{
sha512_process_block(ctx->buffer, 128, ctx); sha512_process_block(ctx->buffer, 128, ctx);
left_over -= 128; left_over -= 128;
/* The regions in the following copy operation cannot overlap, /* The regions in the following copy operation cannot overlap,
@@ -316,9 +281,7 @@ static u64 const sha512_round_constants[80] = {
It is assumed that LEN % 128 == 0. It is assumed that LEN % 128 == 0.
Most of this code comes from GnuPG's cipher/sha1.c. */ Most of this code comes from GnuPG's cipher/sha1.c. */
void void sha512_process_block(const void* buffer, size_t len, struct sha512_ctx* ctx) {
sha512_process_block (const void *buffer, size_t len, struct sha512_ctx *ctx)
{
u64 const* words = buffer; u64 const* words = buffer;
u64 const* endp = words + len / sizeof(u64); u64 const* endp = words + len / sizeof(u64);
u64 x[16]; u64 x[16];
@@ -336,39 +299,31 @@ sha512_process_block (const void *buffer, size_t len, struct sha512_ctx *ctx)
length of the file up to 2^128 bits. Here we only compute the length of the file up to 2^128 bits. Here we only compute the
number of bytes. Do a double word increment. */ number of bytes. Do a double word increment. */
ctx->total[0] = u64plus(ctx->total[0], lolen); ctx->total[0] = u64plus(ctx->total[0], lolen);
ctx->total[1] = u64plus (ctx->total[1], ctx->total[1] = u64plus(
u64plus (u64size (len >> 31 >> 31 >> 2), ctx->total[1], u64plus(u64size(len >> 31 >> 31 >> 2), u64lo(u64lt(ctx->total[0], lolen))));
u64lo (u64lt (ctx->total[0], lolen))));
#define S0(x) u64xor(u64rol(x, 63), u64xor(u64rol(x, 56), u64shr(x, 7))) #define S0(x) u64xor(u64rol(x, 63), u64xor(u64rol(x, 56), u64shr(x, 7)))
#define S1(x) u64xor(u64rol(x, 45), u64xor(u64rol(x, 3), u64shr(x, 6))) #define S1(x) u64xor(u64rol(x, 45), u64xor(u64rol(x, 3), u64shr(x, 6)))
#define SS0(x) u64xor(u64rol(x, 36), u64xor(u64rol(x, 30), u64rol(x, 25))) #define SS0(x) u64xor(u64rol(x, 36), u64xor(u64rol(x, 30), u64rol(x, 25)))
#define SS1(x) u64xor(u64rol(x, 50), u64xor(u64rol(x, 46), u64rol(x, 23))) #define SS1(x) u64xor(u64rol(x, 50), u64xor(u64rol(x, 46), u64rol(x, 23)))
#define M(I) (x[(I) & 15] \ #define M(I) \
= u64plus (x[(I) & 15], \ (x[(I)&15] = u64plus( \
u64plus (S1 (x[((I) - 2) & 15]), \ x[(I)&15], \
u64plus (x[((I) - 7) & 15], \ u64plus(S1(x[((I)-2) & 15]), u64plus(x[((I)-7) & 15], S0(x[((I)-15) & 15])))))
S0 (x[((I) - 15) & 15])))))
#define R(A, B, C, D, E, F, G, H, K, M) \ #define R(A, B, C, D, E, F, G, H, K, M) \
do \ do { \
{ \
u64 t0 = u64plus(SS0(A), F2(A, B, C)); \ u64 t0 = u64plus(SS0(A), F2(A, B, C)); \
u64 t1 = \ u64 t1 = u64plus(H, u64plus(SS1(E), u64plus(F1(E, F, G), u64plus(K, M)))); \
u64plus (H, u64plus (SS1 (E), \
u64plus (F1 (E, F, G), u64plus (K, M)))); \
D = u64plus(D, t1); \ D = u64plus(D, t1); \
H = u64plus(t0, t1); \ H = u64plus(t0, t1); \
} \ } while(0)
while (0)
while (words < endp) while(words < endp) {
{
int t; int t;
/* FIXME: see sha1.c for a better implementation. */ /* FIXME: see sha1.c for a better implementation. */
for (t = 0; t < 16; t++) for(t = 0; t < 16; t++) {
{
x[t] = SWAP(*words); x[t] = SWAP(*words);
words++; words++;
} }

View File

@@ -41,8 +41,7 @@ enum { SHA512_DIGEST_SIZE = 512 / 8 };
#include "gl_openssl.h" #include "gl_openssl.h"
#else #else
/* Structure to save state of computation between the single steps. */ /* Structure to save state of computation between the single steps. */
struct sha512_ctx struct sha512_ctx {
{
u64 state[8]; u64 state[8];
u64 total[2]; u64 total[2];
@@ -58,15 +57,13 @@ extern void sha384_init_ctx (struct sha512_ctx *ctx);
initialization function update the context for the next LEN bytes initialization function update the context for the next LEN bytes
starting at BUFFER. starting at BUFFER.
It is necessary that LEN is a multiple of 128!!! */ It is necessary that LEN is a multiple of 128!!! */
extern void sha512_process_block (const void *buffer, size_t len, extern void sha512_process_block(const void* buffer, size_t len, struct sha512_ctx* ctx);
struct sha512_ctx *ctx);
/* Starting with the result of former calls of this function (or the /* Starting with the result of former calls of this function (or the
initialization function update the context for the next LEN bytes initialization function update the context for the next LEN bytes
starting at BUFFER. starting at BUFFER.
It is NOT required that LEN is a multiple of 128. */ It is NOT required that LEN is a multiple of 128. */
extern void sha512_process_bytes (const void *buffer, size_t len, extern void sha512_process_bytes(const void* buffer, size_t len, struct sha512_ctx* ctx);
struct sha512_ctx *ctx);
/* Process the remaining bytes in the buffer and put result from CTX /* Process the remaining bytes in the buffer and put result from CTX
in first 64 (48) bytes following RESBUF. The result is always in little in first 64 (48) bytes following RESBUF. The result is always in little
@@ -75,27 +72,21 @@ extern void sha512_process_bytes (const void *buffer, size_t len,
extern void* sha512_finish_ctx(struct sha512_ctx* ctx, void* restrict resbuf); extern void* sha512_finish_ctx(struct sha512_ctx* ctx, void* restrict resbuf);
extern void* sha384_finish_ctx(struct sha512_ctx* ctx, void* restrict resbuf); extern void* sha384_finish_ctx(struct sha512_ctx* ctx, void* restrict resbuf);
/* Put result from CTX in first 64 (48) bytes following RESBUF. The result is /* Put result from CTX in first 64 (48) bytes following RESBUF. The result is
always in little endian byte order, so that a byte-wise output yields always in little endian byte order, so that a byte-wise output yields
to the wanted ASCII representation of the message digest. to the wanted ASCII representation of the message digest.
IMPORTANT: On some systems it is required that RESBUF is correctly IMPORTANT: On some systems it is required that RESBUF is correctly
aligned for a 32 bits value. */ aligned for a 32 bits value. */
extern void *sha512_read_ctx (const struct sha512_ctx *ctx, extern void* sha512_read_ctx(const struct sha512_ctx* ctx, void* restrict resbuf);
void *restrict resbuf); extern void* sha384_read_ctx(const struct sha512_ctx* ctx, void* restrict resbuf);
extern void *sha384_read_ctx (const struct sha512_ctx *ctx,
void *restrict resbuf);
/* Compute SHA512 (SHA384) message digest for LEN bytes beginning at BUFFER. /* Compute SHA512 (SHA384) message digest for LEN bytes beginning at BUFFER.
The result is always in little endian byte order, so that a byte-wise The result is always in little endian byte order, so that a byte-wise
output yields to the wanted ASCII representation of the message output yields to the wanted ASCII representation of the message
digest. */ digest. */
extern void *sha512_buffer (const char *buffer, size_t len, extern void* sha512_buffer(const char* buffer, size_t len, void* restrict resblock);
void *restrict resblock); extern void* sha384_buffer(const char* buffer, size_t len, void* restrict resblock);
extern void *sha384_buffer (const char *buffer, size_t len,
void *restrict resblock);
#endif #endif
@@ -108,7 +99,6 @@ extern void *sha384_buffer (const char *buffer, size_t len,
extern int sha512_stream(FILE* stream, void* resblock); extern int sha512_stream(FILE* stream, void* resblock);
extern int sha384_stream(FILE* stream, void* resblock); extern int sha384_stream(FILE* stream, void* resblock);
#ifdef __cplusplus #ifdef __cplusplus
} }
#endif #endif

View File

@@ -30,8 +30,7 @@ ListNode *list_find(ListNode *head, void* data) {
ListNode* it; ListNode* it;
for(it = head; it != NULL; it = it->next) for(it = head; it != NULL; it = it->next)
if (it->data == data) if(it->data == data) break;
break;
return it; return it;
} }
@@ -39,7 +38,8 @@ ListNode *list_find(ListNode *head, void* data) {
ListNode* list_element_at(ListNode* head, uint16_t index) { ListNode* list_element_at(ListNode* head, uint16_t index) {
ListNode* it; ListNode* it;
uint16_t i; uint16_t i;
for (it = head, i = 0; it != NULL && i < index; it = it->next, i++); for(it = head, i = 0; it != NULL && i < index; it = it->next, i++)
;
return it; return it;
} }

View File

@@ -9,8 +9,16 @@ typedef struct ListNode {
} ListNode; } ListNode;
ListNode* list_init_head(void* data); ListNode* list_init_head(void* data);
ListNode *list_add(ListNode *head, void* data); /* adds element with specified data to the end of the list and returns new head node. */ ListNode* list_add(
ListNode *list_find(ListNode *head, void* data); /* returns pointer of element with specified data in list. */ ListNode* head,
ListNode *list_element_at(ListNode *head, uint16_t index); /* returns pointer of element with specified index in list. */ void* data); /* adds element with specified data to the end of the list and returns new head node. */
ListNode *list_remove(ListNode *head, ListNode *ep); /* removes element from the list and returns new head node. */ ListNode* list_find(
ListNode* head,
void* data); /* returns pointer of element with specified data in list. */
ListNode* list_element_at(
ListNode* head,
uint16_t index); /* returns pointer of element with specified index in list. */
ListNode* list_remove(
ListNode* head,
ListNode* ep); /* removes element from the list and returns new head node. */
void list_free(ListNode* head); /* deletes all elements of the list. */ void list_free(ListNode* head); /* deletes all elements of the list. */

View File

@@ -5,9 +5,9 @@
#include <stdint.h> #include <stdint.h>
#include <string.h> #include <string.h>
#include <math.h> #include <math.h>
#include "../hmac/hmac-sha1.h" #include "../hmac/hmac_sha1.h"
#include "../hmac/hmac-sha256.h" #include "../hmac/hmac_sha256.h"
#include "../hmac/hmac-sha512.h" #include "../hmac/hmac_sha512.h"
#include "../timezone_utils/timezone_utils.h" #include "../timezone_utils/timezone_utils.h"
#define UINT64_GET_BYTE(integer, index) ((integer >> (8 * index)) & 0xFF) #define UINT64_GET_BYTE(integer, index) ((integer >> (8 * index)) & 0xFF)
@@ -25,8 +25,7 @@
timeblock given for_time, using data->interval timeblock given for_time, using data->interval
error, 0 error, 0
*/ */
uint64_t totp_timecode(uint8_t interval, uint64_t for_time) uint64_t totp_timecode(uint8_t interval, uint64_t for_time) {
{
return for_time / interval; return for_time / interval;
} }
@@ -35,8 +34,7 @@ uint64_t totp_timecode(uint8_t interval, uint64_t for_time)
out_bytes is the null-terminated output string already allocated out_bytes is the null-terminated output string already allocated
*/ */
void otp_num_to_bytes(uint64_t integer, uint8_t* out_bytes) void otp_num_to_bytes(uint64_t integer, uint8_t* out_bytes) {
{
out_bytes[7] = UINT64_GET_BYTE(integer, 0); out_bytes[7] = UINT64_GET_BYTE(integer, 0);
out_bytes[6] = UINT64_GET_BYTE(integer, 1); out_bytes[6] = UINT64_GET_BYTE(integer, 1);
out_bytes[5] = UINT64_GET_BYTE(integer, 2); out_bytes[5] = UINT64_GET_BYTE(integer, 2);
@@ -57,8 +55,12 @@ void otp_num_to_bytes(uint64_t integer, uint8_t* out_bytes)
OTP code if otp code was successfully generated OTP code if otp code was successfully generated
0 otherwise 0 otherwise
*/ */
uint32_t otp_generate(TOTP_ALGO algo, uint8_t digits, const uint8_t* plain_secret, uint8_t plain_secret_length, uint64_t input) uint32_t otp_generate(
{ TOTP_ALGO algo,
uint8_t digits,
const uint8_t* plain_secret,
uint8_t plain_secret_length,
uint64_t input) {
uint8_t* bytes = malloc(8); uint8_t* bytes = malloc(8);
memset(bytes, 0, 8); memset(bytes, 0, 8);
uint8_t* hmac = malloc(64); uint8_t* hmac = malloc(64);
@@ -75,10 +77,8 @@ uint32_t otp_generate(TOTP_ALGO algo, uint8_t digits, const uint8_t* plain_secre
uint64_t offset = (hmac[hmac_len - 1] & 0xF); uint64_t offset = (hmac[hmac_len - 1] & 0xF);
uint64_t i_code = uint64_t i_code =
((hmac[offset] & 0x7F) << 24 | ((hmac[offset] & 0x7F) << 24 | (hmac[offset + 1] & 0xFF) << 16 |
(hmac[offset + 1] & 0xFF) << 16 | (hmac[offset + 2] & 0xFF) << 8 | (hmac[offset + 3] & 0xFF));
(hmac[offset + 2] & 0xFF) << 8 |
(hmac[offset + 3] & 0xFF));
i_code %= (uint64_t)pow(10, digits); i_code %= (uint64_t)pow(10, digits);
free(hmac); free(hmac);
@@ -97,23 +97,50 @@ uint32_t otp_generate(TOTP_ALGO algo, uint8_t digits, const uint8_t* plain_secre
TOTP code if otp code was successfully generated TOTP code if otp code was successfully generated
0 otherwise 0 otherwise
*/ */
uint32_t totp_at(TOTP_ALGO algo, uint8_t digits, const uint8_t* plain_secret, uint8_t plain_secret_length, uint64_t for_time, float timezone, uint8_t interval) uint32_t totp_at(
{ TOTP_ALGO algo,
uint64_t for_time_adjusted = timezone_offset_apply(for_time, timezone_offset_from_hours(timezone)); uint8_t digits,
return otp_generate(algo, digits, plain_secret, plain_secret_length, totp_timecode(interval, for_time_adjusted)); const uint8_t* plain_secret,
uint8_t plain_secret_length,
uint64_t for_time,
float timezone,
uint8_t interval) {
uint64_t for_time_adjusted =
timezone_offset_apply(for_time, timezone_offset_from_hours(timezone));
return otp_generate(
algo,
digits,
plain_secret,
plain_secret_length,
totp_timecode(interval, for_time_adjusted));
} }
static int totp_algo_sha1(const uint8_t* key, uint8_t key_length, const uint8_t* input, uint8_t input_length, uint8_t* output) { static int totp_algo_sha1(
const uint8_t* key,
uint8_t key_length,
const uint8_t* input,
uint8_t input_length,
uint8_t* output) {
hmac_sha1(key, key_length, input, input_length, output); hmac_sha1(key, key_length, input, input_length, output);
return HMAC_SHA1_RESULT_SIZE; return HMAC_SHA1_RESULT_SIZE;
} }
static int totp_algo_sha256(const uint8_t* key, uint8_t key_length, const uint8_t* input, uint8_t input_length, uint8_t* output) { static int totp_algo_sha256(
const uint8_t* key,
uint8_t key_length,
const uint8_t* input,
uint8_t input_length,
uint8_t* output) {
hmac_sha256(key, key_length, input, input_length, output); hmac_sha256(key, key_length, input, input_length, output);
return HMAC_SHA256_RESULT_SIZE; return HMAC_SHA256_RESULT_SIZE;
} }
static int totp_algo_sha512(const uint8_t* key, uint8_t key_length, const uint8_t* input, uint8_t input_length, uint8_t* output) { static int totp_algo_sha512(
const uint8_t* key,
uint8_t key_length,
const uint8_t* input,
uint8_t input_length,
uint8_t* output) {
hmac_sha512(key, key_length, input, input_length, output); hmac_sha512(key, key_length, input, input_length, output);
return HMAC_SHA512_RESULT_SIZE; return HMAC_SHA512_RESULT_SIZE;
} }

View File

@@ -15,7 +15,12 @@
Must return 0 if error, or the length in bytes of the HMAC operation. Must return 0 if error, or the length in bytes of the HMAC operation.
*/ */
typedef int (*TOTP_ALGO)(const uint8_t* key, uint8_t key_length, const uint8_t* input, uint8_t input_length, uint8_t* output); typedef int (*TOTP_ALGO)(
const uint8_t* key,
uint8_t key_length,
const uint8_t* input,
uint8_t input_length,
uint8_t* output);
/* /*
Computes HMAC using SHA1 Computes HMAC using SHA1
@@ -38,4 +43,11 @@ extern const TOTP_ALGO TOTP_ALGO_SHA512;
TOTP token on success TOTP token on success
0 otherwise 0 otherwise
*/ */
uint32_t totp_at(TOTP_ALGO algo, uint8_t digits, const uint8_t* plain_secret, uint8_t plain_secret_length, uint64_t for_time, float timezone, uint8_t interval); uint32_t totp_at(
TOTP_ALGO algo,
uint8_t digits,
const uint8_t* plain_secret,
uint8_t plain_secret_length,
uint64_t for_time,
float timezone,
uint8_t interval);

View File

@@ -8,4 +8,5 @@ static const uint8_t ICON_ARROW_LEFT_8x9[] = { 0x80,0xe0,0xf8,0xfe,0xff,0xfe,0xf
#define ICON_ARROW_RIGHT_8x9_WIDTH 8 #define ICON_ARROW_RIGHT_8x9_WIDTH 8
#define ICON_ARROW_RIGHT_8x9_HEIGHT 9 #define ICON_ARROW_RIGHT_8x9_HEIGHT 9
static const uint8_t ICON_ARROW_RIGHT_8x9[] = { 0x01,0x07,0x1f,0x7f,0xff,0x7f,0x1f,0x07,0x01 }; static const uint8_t ICON_ARROW_RIGHT_8x9[] =
{0x01, 0x07, 0x1f, 0x7f, 0xff, 0x7f, 0x1f, 0x07, 0x01};

View File

@@ -11,33 +11,96 @@ void ui_control_text_box_render(Canvas* const canvas, int8_t y, char* text, bool
} }
if(is_selected) { if(is_selected) {
canvas_draw_rframe(canvas, TEXT_BOX_MARGIN, TEXT_BOX_MARGIN + y, SCREEN_WIDTH - TEXT_BOX_MARGIN - TEXT_BOX_MARGIN, TEXT_BOX_HEIGHT, 0); canvas_draw_rframe(
canvas_draw_rframe(canvas, TEXT_BOX_MARGIN - 1, TEXT_BOX_MARGIN + y - 1, SCREEN_WIDTH - TEXT_BOX_MARGIN - TEXT_BOX_MARGIN + 2, TEXT_BOX_HEIGHT + 2, 1); canvas,
TEXT_BOX_MARGIN,
TEXT_BOX_MARGIN + y,
SCREEN_WIDTH - TEXT_BOX_MARGIN - TEXT_BOX_MARGIN,
TEXT_BOX_HEIGHT,
0);
canvas_draw_rframe(
canvas,
TEXT_BOX_MARGIN - 1,
TEXT_BOX_MARGIN + y - 1,
SCREEN_WIDTH - TEXT_BOX_MARGIN - TEXT_BOX_MARGIN + 2,
TEXT_BOX_HEIGHT + 2,
1);
} else { } else {
canvas_draw_rframe(canvas, TEXT_BOX_MARGIN, TEXT_BOX_MARGIN + y, SCREEN_WIDTH - TEXT_BOX_MARGIN - TEXT_BOX_MARGIN, TEXT_BOX_HEIGHT, 1); canvas_draw_rframe(
canvas,
TEXT_BOX_MARGIN,
TEXT_BOX_MARGIN + y,
SCREEN_WIDTH - TEXT_BOX_MARGIN - TEXT_BOX_MARGIN,
TEXT_BOX_HEIGHT,
1);
} }
canvas_draw_str_aligned(canvas, TEXT_BOX_MARGIN + 2, TEXT_BOX_MARGIN + 3 + y, AlignLeft, AlignTop, text); canvas_draw_str_aligned(
canvas, TEXT_BOX_MARGIN + 2, TEXT_BOX_MARGIN + 3 + y, AlignLeft, AlignTop, text);
} }
void ui_control_select_render(Canvas* const canvas, int16_t x, int16_t y, uint8_t width, char* text, bool is_selected) { void ui_control_select_render(
Canvas* const canvas,
int16_t x,
int16_t y,
uint8_t width,
char* text,
bool is_selected) {
if(y < -TEXT_BOX_HEIGHT) { if(y < -TEXT_BOX_HEIGHT) {
return; return;
} }
if(is_selected) { if(is_selected) {
canvas_draw_rframe(canvas, x + TEXT_BOX_MARGIN, TEXT_BOX_MARGIN + y, width - TEXT_BOX_MARGIN - TEXT_BOX_MARGIN, TEXT_BOX_HEIGHT, 0); canvas_draw_rframe(
canvas_draw_rframe(canvas, x + TEXT_BOX_MARGIN - 1, TEXT_BOX_MARGIN + y - 1, width - TEXT_BOX_MARGIN - TEXT_BOX_MARGIN + 2, TEXT_BOX_HEIGHT + 2, 1); canvas,
x + TEXT_BOX_MARGIN,
TEXT_BOX_MARGIN + y,
width - TEXT_BOX_MARGIN - TEXT_BOX_MARGIN,
TEXT_BOX_HEIGHT,
0);
canvas_draw_rframe(
canvas,
x + TEXT_BOX_MARGIN - 1,
TEXT_BOX_MARGIN + y - 1,
width - TEXT_BOX_MARGIN - TEXT_BOX_MARGIN + 2,
TEXT_BOX_HEIGHT + 2,
1);
} else { } else {
canvas_draw_rframe(canvas, x + TEXT_BOX_MARGIN, TEXT_BOX_MARGIN + y, width - TEXT_BOX_MARGIN - TEXT_BOX_MARGIN, TEXT_BOX_HEIGHT, 1); canvas_draw_rframe(
canvas,
x + TEXT_BOX_MARGIN,
TEXT_BOX_MARGIN + y,
width - TEXT_BOX_MARGIN - TEXT_BOX_MARGIN,
TEXT_BOX_HEIGHT,
1);
} }
canvas_draw_str_aligned(canvas, x + (width >> 1), TEXT_BOX_MARGIN + 3 + y, AlignCenter, AlignTop, text); canvas_draw_str_aligned(
canvas_draw_xbm(canvas, x + TEXT_BOX_MARGIN + 2, TEXT_BOX_MARGIN + 2 + y, ICON_ARROW_LEFT_8x9_WIDTH, ICON_ARROW_LEFT_8x9_HEIGHT, &ICON_ARROW_LEFT_8x9[0]); canvas, x + (width >> 1), TEXT_BOX_MARGIN + 3 + y, AlignCenter, AlignTop, text);
canvas_draw_xbm(canvas, x + width - TEXT_BOX_MARGIN - 10, TEXT_BOX_MARGIN + 2 + y, ICON_ARROW_RIGHT_8x9_WIDTH, ICON_ARROW_RIGHT_8x9_HEIGHT, &ICON_ARROW_RIGHT_8x9[0]); canvas_draw_xbm(
canvas,
x + TEXT_BOX_MARGIN + 2,
TEXT_BOX_MARGIN + 2 + y,
ICON_ARROW_LEFT_8x9_WIDTH,
ICON_ARROW_LEFT_8x9_HEIGHT,
&ICON_ARROW_LEFT_8x9[0]);
canvas_draw_xbm(
canvas,
x + width - TEXT_BOX_MARGIN - 10,
TEXT_BOX_MARGIN + 2 + y,
ICON_ARROW_RIGHT_8x9_WIDTH,
ICON_ARROW_RIGHT_8x9_HEIGHT,
&ICON_ARROW_RIGHT_8x9[0]);
} }
void ui_control_button_render(Canvas* const canvas, int16_t x, int16_t y, uint8_t width, uint8_t height, char* text, bool is_selected) { void ui_control_button_render(
Canvas* const canvas,
int16_t x,
int16_t y,
uint8_t width,
uint8_t height,
char* text,
bool is_selected) {
if(y < -height) { if(y < -height) {
return; return;
} }
@@ -49,7 +112,8 @@ void ui_control_button_render(Canvas* const canvas, int16_t x, int16_t y, uint8_
canvas_draw_rframe(canvas, x, y, width, height, 1); canvas_draw_rframe(canvas, x, y, width, height, 1);
} }
canvas_draw_str_aligned(canvas, x + (width >> 1), y + (height >> 1) + 1, AlignCenter, AlignCenter, text); canvas_draw_str_aligned(
canvas, x + (width >> 1), y + (height >> 1) + 1, AlignCenter, AlignCenter, text);
if(is_selected) { if(is_selected) {
canvas_set_color(canvas, ColorBlack); canvas_set_color(canvas, ColorBlack);
} }

View File

@@ -4,5 +4,18 @@
#include <gui/gui.h> #include <gui/gui.h>
void ui_control_text_box_render(Canvas* const canvas, int8_t y, char* text, bool is_selected); void ui_control_text_box_render(Canvas* const canvas, int8_t y, char* text, bool is_selected);
void ui_control_button_render(Canvas* const canvas, int16_t x, int16_t y, uint8_t width, uint8_t height, char* text, bool is_selected); void ui_control_button_render(
void ui_control_select_render(Canvas* const canvas, int16_t x, int16_t y, uint8_t width, char* text, bool is_selected); Canvas* const canvas,
int16_t x,
int16_t y,
uint8_t width,
uint8_t height,
char* text,
bool is_selected);
void ui_control_select_render(
Canvas* const canvas,
int16_t x,
int16_t y,
uint8_t width,
char* text,
bool is_selected);

View File

@@ -48,7 +48,13 @@ static bool totp_state_init(PluginState* const plugin_state) {
if(plugin_state->crypto_verify_data == NULL) { if(plugin_state->crypto_verify_data == NULL) {
DialogMessage* message = dialog_message_alloc(); DialogMessage* message = dialog_message_alloc();
dialog_message_set_buttons(message, "No", NULL, "Yes"); dialog_message_set_buttons(message, "No", NULL, "Yes");
dialog_message_set_text(message, "Would you like to setup PIN?", SCREEN_WIDTH_CENTER, SCREEN_HEIGHT_CENTER, AlignCenter, AlignCenter); dialog_message_set_text(
message,
"Would you like to setup PIN?",
SCREEN_WIDTH_CENTER,
SCREEN_HEIGHT_CENTER,
AlignCenter,
AlignCenter);
DialogMessageButton dialog_result = dialog_message_show(plugin_state->dialogs, message); DialogMessageButton dialog_result = dialog_message_show(plugin_state->dialogs, message);
dialog_message_free(message); dialog_message_free(message);
if(dialog_result == DialogMessageButtonRight) { if(dialog_result == DialogMessageButtonRight) {
@@ -64,10 +70,18 @@ static bool totp_state_init(PluginState* const plugin_state) {
if(totp_crypto_verify_key(plugin_state)) { if(totp_crypto_verify_key(plugin_state)) {
totp_scene_director_activate_scene(plugin_state, TotpSceneGenerateToken, NULL); totp_scene_director_activate_scene(plugin_state, TotpSceneGenerateToken, NULL);
} else { } else {
FURI_LOG_E(LOGGING_TAG, "Digital signature verification failed. Looks like conf file was created on another flipper and can't be used on any other"); FURI_LOG_E(
LOGGING_TAG,
"Digital signature verification failed. Looks like conf file was created on another flipper and can't be used on any other");
DialogMessage* message = dialog_message_alloc(); DialogMessage* message = dialog_message_alloc();
dialog_message_set_buttons(message, "Exit", NULL, NULL); dialog_message_set_buttons(message, "Exit", NULL, NULL);
dialog_message_set_text(message, "Digital signature verification failed", SCREEN_WIDTH_CENTER, SCREEN_HEIGHT_CENTER, AlignCenter, AlignCenter); dialog_message_set_text(
message,
"Digital signature verification failed",
SCREEN_WIDTH_CENTER,
SCREEN_HEIGHT_CENTER,
AlignCenter,
AlignCenter);
dialog_message_show(plugin_state->dialogs, message); dialog_message_show(plugin_state->dialogs, message);
dialog_message_free(message); dialog_message_free(message);
return false; return false;
@@ -142,7 +156,9 @@ int32_t totp_app() {
} }
processing = totp_scene_director_handle_event(&event, plugin_state); processing = totp_scene_director_handle_event(&event, plugin_state);
} else if (plugin_state->pin_set && plugin_state->current_scene != TotpSceneAuthentication && furi_get_tick() - last_user_interaction_time > IDLE_TIMEOUT) { } else if(
plugin_state->pin_set && plugin_state->current_scene != TotpSceneAuthentication &&
furi_get_tick() - last_user_interaction_time > IDLE_TIMEOUT) {
totp_scene_director_activate_scene(plugin_state, TotpSceneAuthentication, NULL); totp_scene_director_activate_scene(plugin_state, TotpSceneAuthentication, NULL);
} }

View File

@@ -20,11 +20,17 @@ void token_info_free(TokenInfo* token_info) {
free(token_info); free(token_info);
} }
void token_info_set_secret(TokenInfo* token_info, const char* base32_token_secret, uint8_t token_secret_length, uint8_t* iv) { void token_info_set_secret(
TokenInfo* token_info,
const char* base32_token_secret,
uint8_t token_secret_length,
uint8_t* iv) {
uint8_t* plain_secret = malloc(token_secret_length); uint8_t* plain_secret = malloc(token_secret_length);
int plain_secret_length = base32_decode((uint8_t *)base32_token_secret, plain_secret, token_secret_length); int plain_secret_length =
base32_decode((uint8_t*)base32_token_secret, plain_secret, token_secret_length);
token_info->token = totp_crypto_encrypt(plain_secret, plain_secret_length, iv, &token_info->token_length); token_info->token =
totp_crypto_encrypt(plain_secret, plain_secret_length, iv, &token_info->token_length);
memset(plain_secret, 0, token_secret_length); memset(plain_secret, 0, token_secret_length);
free(plain_secret); free(plain_secret);
@@ -32,8 +38,10 @@ void token_info_set_secret(TokenInfo* token_info, const char* base32_token_secre
uint8_t token_info_get_digits_count(TokenInfo* token_info) { uint8_t token_info_get_digits_count(TokenInfo* token_info) {
switch(token_info->digits) { switch(token_info->digits) {
case TOTP_6_DIGITS: return 6; case TOTP_6_DIGITS:
case TOTP_8_DIGITS: return 8; return 6;
case TOTP_8_DIGITS:
return 8;
} }
return 6; return 6;

View File

@@ -2,16 +2,9 @@
#include <inttypes.h> #include <inttypes.h>
typedef enum { typedef enum { SHA1, SHA256, SHA512 } TokenHashAlgo;
SHA1,
SHA256,
SHA512
} TokenHashAlgo;
typedef enum { typedef enum { TOTP_6_DIGITS, TOTP_8_DIGITS } TokenDigitsCount;
TOTP_6_DIGITS,
TOTP_8_DIGITS
} TokenDigitsCount;
typedef struct { typedef struct {
uint8_t* token; uint8_t* token;
@@ -23,5 +16,9 @@ typedef struct {
TokenInfo* token_info_alloc(); TokenInfo* token_info_alloc();
void token_info_free(TokenInfo* token_info); void token_info_free(TokenInfo* token_info);
void token_info_set_secret(TokenInfo* token_info, const char* base32_token_secret, uint8_t token_secret_length, uint8_t* iv); void token_info_set_secret(
TokenInfo* token_info,
const char* base32_token_secret,
uint8_t token_secret_length,
uint8_t* iv);
uint8_t token_info_get_digits_count(TokenInfo* token_info); uint8_t token_info_get_digits_count(TokenInfo* token_info);