You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
pEpEngine/src/pEpEngine.c

2229 lines
64 KiB

// This file is under GNU General Public License 3.0
// see LICENSE.txt
9 years ago
#include "pEp_internal.h"
8 years ago
#include "dynamic_api.h"
9 years ago
#include "cryptotech.h"
#include "transport.h"
#include "blacklist.h"
#include "sync_fsm.h"
9 years ago
static int init_count = -1;
// sql manipulation statements
static const char *sql_log =
"insert into log (title, entity, description, comment)"
"values (?1, ?2, ?3, ?4);";
static const char *sql_trustword =
"select id, word from wordlist where lang = lower(?1) "
"and id = ?2 ;";
static const char *sql_get_identity =
"select fpr, username, comm_type, lang,"
" identity.flags | pgp_keypair.flags"
" from identity"
" join person on id = identity.user_id"
" join pgp_keypair on fpr = identity.main_key_id"
" join trust on id = trust.user_id"
" and pgp_keypair_fpr = identity.main_key_id"
" where address = ?1 and identity.user_id = ?2;";
// Set person, but if already exist, only update.
// if main_key_id already set, don't touch.
static const char *sql_set_person =
"insert or replace into person (id, username, lang, main_key_id, device_group)"
" values (?1, ?2, ?3,"
" (select coalesce((select main_key_id from person "
" where id = ?1), upper(replace(?4,' ','')))),"
" (select device_group from person where id = ?1)) ;";
static const char *sql_set_device_group =
"update person set device_group = ?1 "
"where id = '" PEP_OWN_USERID "';";
static const char *sql_get_device_group =
"select device_group from person "
"where id = '" PEP_OWN_USERID "';";
static const char *sql_set_pgp_keypair =
"insert or replace into pgp_keypair (fpr) "
"values (upper(replace(?1,' ',''))) ;";
static const char *sql_set_identity =
"insert or replace into identity ("
" address, main_key_id, "
" user_id, flags"
") values ("
" ?1,"
" upper(replace(?2,' ','')),"
" ?3,"
// " (select"
// " coalesce("
// " (select flags from identity"
// " where address = ?1 and"
// " user_id = ?3),"
// " 0)"
// " ) | (?4 & 255)"
/* set_identity ignores previous flags, and doesn't filter machine flags */
" ?4"
");";
static const char *sql_set_identity_flags =
"update identity set flags = "
" ((?1 & 255) | (select flags from identity"
" where address = ?2 and user_id = ?3)) "
"where address = ?2 and user_id = ?3 ;";
static const char *sql_unset_identity_flags =
"update identity set flags = "
" ( ~(?1 & 255) & (select flags from identity"
" where address = ?2 and user_id = ?3)) "
"where address = ?2 and user_id = ?3 ;";
static const char *sql_set_trust =
"insert or replace into trust (user_id, pgp_keypair_fpr, comm_type) "
"values (?1, upper(replace(?2,' ','')), ?3) ;";
static const char *sql_get_trust =
"select comm_type from trust where user_id = ?1 "
"and pgp_keypair_fpr = upper(replace(?2,' ','')) ;";
static const char *sql_least_trust =
"select min(comm_type) from trust where pgp_keypair_fpr = upper(replace(?1,' ','')) ;";
static const char *sql_mark_as_compromized =
"update trust not indexed set comm_type = 15"
" where pgp_keypair_fpr = upper(replace(?1,' ','')) ;";
static const char *sql_crashdump =
"select timestamp, title, entity, description, comment"
" from log order by timestamp desc limit ?1 ;";
static const char *sql_languagelist =
"select i18n_language.lang, name, phrase"
" from i18n_language join i18n_token using (lang) where i18n_token.id = 1000;" ;
static const char *sql_i18n_token =
"select phrase from i18n_token where lang = lower(?1) and id = ?2 ;";
// blacklist
static const char *sql_blacklist_add =
"insert or replace into blacklist_keys (fpr) values (upper(replace(?1,' ',''))) ;"
"delete from identity where main_key_id = upper(replace(?1,' ','')) ;"
"delete from pgp_keypair where fpr = upper(replace(?1,' ','')) ;";
static const char *sql_blacklist_delete =
"delete from blacklist_keys where fpr = upper(replace(?1,' ','')) ;";
static const char *sql_blacklist_is_listed =
"select count(*) from blacklist_keys where fpr = upper(replace(?1,' ','')) ;";
static const char *sql_blacklist_retrieve =
"select * from blacklist_keys ;";
// Own keys
static const char *sql_own_key_is_listed =
"select count(*) from ("
" select main_key_id from person "
" where main_key_id = upper(replace(?1,' ',''))"
" and id = '" PEP_OWN_USERID "' "
" union "
" select main_key_id from identity "
" where main_key_id = upper(replace(?1,' ',''))"
" and user_id = '" PEP_OWN_USERID "' );";
static const char *sql_own_identities_retrieve =
"select address, fpr, username, "
" lang, identity.flags | pgp_keypair.flags"
" from identity"
" join person on id = identity.user_id"
" join pgp_keypair on fpr = identity.main_key_id"
" join trust on id = trust.user_id"
" and pgp_keypair_fpr = identity.main_key_id"
" where identity.user_id = '" PEP_OWN_USERID "'"
" and (identity.flags & ?1) = 0;";
static const char *sql_own_keys_retrieve =
"select fpr from own_keys"
" natural join identity"
" where (identity.flags & ?1) = 0;";
static const char *sql_set_own_key =
"insert or replace into own_keys (address, user_id, fpr)"
" values (?1, '" PEP_OWN_USERID "', upper(replace(?2,' ','')));";
// Sequence
static const char *sql_sequence_value1 =
"insert or replace into sequences (name, value, own) "
"values (?1, "
"(select coalesce((select value + 1 from sequences "
"where name = ?1), 1 )), ?2) ; ";
static const char *sql_sequence_value2 =
"select value, own from sequences where name = ?1 ;";
static const char *sql_sequence_value3 =
"update sequences set value = ?2, own = ?3 where name = ?1 ;";
// Revocation tracking
static const char *sql_set_revoked =
"insert or replace into revoked_keys ("
" revoked_fpr, replacement_fpr, revocation_date) "
"values (upper(replace(?1,' ','')),"
" upper(replace(?2,' ','')),"
" ?3) ;";
static const char *sql_get_revoked =
"select revoked_fpr, revocation_date from revoked_keys"
" where replacement_fpr = upper(replace(?1,' ','')) ;";
static int user_version(void *_version, int count, char **text, char **name)
{
assert(_version);
assert(count == 1);
assert(text && text[0]);
if (!(_version && count == 1 && text && text[0]))
return -1;
int *version = (int *) _version;
*version = atoi(text[0]);
return 0;
}
9 years ago
DYNAMIC_API PEP_STATUS init(PEP_SESSION *session)
{
PEP_STATUS status = PEP_STATUS_OK;
int int_result;
bool in_first = false;
assert(sqlite3_threadsafe());
if (!sqlite3_threadsafe())
return PEP_INIT_SQLITE3_WITHOUT_MUTEX;
// a little race condition - but still a race condition
8 years ago
// mitigated by calling caveat (see documentation)
++init_count;
8 years ago
if (init_count == 0)
in_first = true;
9 years ago
assert(session);
8 years ago
if (session == NULL)
return PEP_ILLEGAL_VALUE;
*session = NULL;
9 years ago
8 years ago
pEpSession *_session = calloc(1, sizeof(pEpSession));
assert(_session);
if (_session == NULL)
goto enomem;
_session->version = PEP_ENGINE_VERSION;
9 years ago
assert(LOCAL_DB);
if (LOCAL_DB == NULL) {
status = PEP_INIT_CANNOT_OPEN_DB;
goto pep_error;
9 years ago
}
int_result = sqlite3_open_v2(
LOCAL_DB,
&_session->db,
SQLITE_OPEN_READWRITE
| SQLITE_OPEN_CREATE
| SQLITE_OPEN_FULLMUTEX
| SQLITE_OPEN_PRIVATECACHE,
NULL
);
if (int_result != SQLITE_OK) {
status = PEP_INIT_CANNOT_OPEN_DB;
goto pep_error;
}
9 years ago
sqlite3_busy_timeout(_session->db, BUSY_WAIT_TIME);
9 years ago
assert(SYSTEM_DB);
if (SYSTEM_DB == NULL) {
status = PEP_INIT_CANNOT_OPEN_SYSTEM_DB;
goto pep_error;
9 years ago
}
int_result = sqlite3_open_v2(
SYSTEM_DB, &_session->system_db,
SQLITE_OPEN_READONLY
| SQLITE_OPEN_FULLMUTEX
| SQLITE_OPEN_SHAREDCACHE,
NULL
);
9 years ago
if (int_result != SQLITE_OK) {
status = PEP_INIT_CANNOT_OPEN_SYSTEM_DB;
goto pep_error;
}
9 years ago
sqlite3_busy_timeout(_session->system_db, 1000);
9 years ago
// increment this when patching DDL
#define _DDL_USER_VERSION "5"
if (in_first) {
7 years ago
int_result = sqlite3_exec(
_session->db,
7 years ago
"create table if not exists version_info (\n"
" id integer primary key,\n"
7 years ago
" timestamp integer default (datetime('now')),\n"
" version text,\n"
" comment text\n"
");\n",
NULL,
NULL,
NULL
);
int_result = sqlite3_exec(
_session->db,
7 years ago
"PRAGMA application_id = 0x23423423;\n"
"create table if not exists log (\n"
7 years ago
" timestamp integer default (datetime('now')),\n"
" title text not null,\n"
" entity text not null,\n"
" description text,\n"
" comment text\n"
");\n"
"create index if not exists log_timestamp on log (\n"
" timestamp\n"
");\n"
"create table if not exists pgp_keypair (\n"
" fpr text primary key,\n"
" created integer,\n"
" expires integer,\n"
" comment text,\n"
7 years ago
" flags integer default 0\n"
");\n"
"create index if not exists pgp_keypair_expires on pgp_keypair (\n"
" expires\n"
");\n"
"create table if not exists person (\n"
" id text primary key,\n"
" username text not null,\n"
" main_key_id text\n"
" references pgp_keypair (fpr)\n"
" on delete set null,\n"
" lang text,\n"
7 years ago
" comment text,\n"
" device_group text\n"
");\n"
"create table if not exists identity (\n"
" address text,\n"
" user_id text\n"
" references person (id)\n"
" on delete cascade,\n"
" main_key_id text\n"
" references pgp_keypair (fpr)\n"
" on delete set null,\n"
" comment text,\n"
7 years ago
" flags integer default 0,"
" primary key (address, user_id)\n"
");\n"
"create table if not exists trust (\n"
" user_id text not null\n"
" references person (id)\n"
" on delete cascade,\n"
" pgp_keypair_fpr text not null\n"
" references pgp_keypair (fpr)\n"
" on delete cascade,\n"
" comm_type integer not null,\n"
" comment text,\n"
" primary key (user_id, pgp_keypair_fpr)\n"
");\n"
7 years ago
// blacklist
"create table if not exists blacklist_keys (\n"
" fpr text primary key\n"
");\n"
7 years ago
// sequences
"create table if not exists sequences(\n"
" name text primary key,\n"
7 years ago
" value integer default 0,\n"
" own integer default 0\n"
7 years ago
");\n"
"create table if not exists revoked_keys (\n"
" revoked_fpr text primary key,\n"
" replacement_fpr text not null\n"
" references pgp_keypair (fpr)\n"
" on delete cascade,\n"
" revocation_date integer\n"
");\n"
"create table if not exists own_keys (\n"
" address text,\n"
" user_id text,\n"
" fpr text not null\n"
" references pgp_keypair (fpr)\n"
" on delete cascade,\n"
" foreign key (address, user_id)\n"
" references identity\n"
" on delete cascade,\n"
" check (user_id = '" PEP_OWN_USERID "')\n"
" primary key (address, fpr)\n"
");\n"
,
NULL,
NULL,
NULL
);
assert(int_result == SQLITE_OK);
int version;
int_result = sqlite3_exec(
_session->db,
"pragma user_version;",
user_version,
&version,
NULL
);
assert(int_result == SQLITE_OK);
if (version < 1) {
int_result = sqlite3_exec(
_session->db,
"alter table identity\n"
7 years ago
" add column flags integer default 0;\n",
NULL,
NULL,
NULL
);
}
if (version < 2) {
int_result = sqlite3_exec(
_session->db,
"alter table pgp_keypair\n"
7 years ago
" add column flags integer default 0;\n"
7 years ago
"alter table person\n"
" add column device_group text;\n",
NULL,
NULL,
NULL
);
}
7 years ago
if (version < 3) {
int_result = sqlite3_exec(
_session->db,
"alter table sequences\n"
" add column own integer default 0;\n",
NULL,
NULL,
NULL
);
}
if (version < 5) {
int_result = sqlite3_exec(
_session->db,
"delete from pgp_keypair where fpr = '';",
NULL,
NULL,
NULL
);
int_result = sqlite3_exec(
_session->db,
"delete from trust where pgp_keypair_fpr = '';",
NULL,
NULL,
NULL
);
}
if (version < atoi(_DDL_USER_VERSION)) {
int_result = sqlite3_exec(
_session->db,
"pragma user_version = "_DDL_USER_VERSION";\n"
"insert or replace into version_info (id, version)"
"values (1, '" PEP_ENGINE_VERSION "');",
NULL,
NULL,
NULL
);
assert(int_result == SQLITE_OK);
}
}
9 years ago
7 years ago
int_result = sqlite3_prepare_v2(_session->db, sql_log,
(int)strlen(sql_log), &_session->log, NULL);
assert(int_result == SQLITE_OK);
9 years ago
int_result = sqlite3_prepare_v2(_session->system_db, sql_trustword,
(int)strlen(sql_trustword), &_session->trustword, NULL);
assert(int_result == SQLITE_OK);
9 years ago
int_result = sqlite3_prepare_v2(_session->db, sql_get_identity,
(int)strlen(sql_get_identity), &_session->get_identity, NULL);
assert(int_result == SQLITE_OK);
9 years ago
int_result = sqlite3_prepare_v2(_session->db, sql_set_person,
(int)strlen(sql_set_person), &_session->set_person, NULL);
9 years ago
assert(int_result == SQLITE_OK);
int_result = sqlite3_prepare_v2(_session->db, sql_set_device_group,
(int)strlen(sql_set_device_group), &_session->set_device_group, NULL);
assert(int_result == SQLITE_OK);
int_result = sqlite3_prepare_v2(_session->db, sql_get_device_group,
(int)strlen(sql_get_device_group), &_session->get_device_group, NULL);
assert(int_result == SQLITE_OK);
9 years ago
int_result = sqlite3_prepare_v2(_session->db, sql_set_pgp_keypair,
7 years ago
(int)strlen(sql_set_pgp_keypair), &_session->set_pgp_keypair,
NULL);
assert(int_result == SQLITE_OK);
9 years ago
int_result = sqlite3_prepare_v2(_session->db, sql_set_identity,
(int)strlen(sql_set_identity), &_session->set_identity, NULL);
assert(int_result == SQLITE_OK);
int_result = sqlite3_prepare_v2(_session->db, sql_set_identity_flags,
7 years ago
(int)strlen(sql_set_identity_flags), &_session->set_identity_flags,
NULL);
assert(int_result == SQLITE_OK);
int_result = sqlite3_prepare_v2(_session->db, sql_unset_identity_flags,
(int)strlen(sql_unset_identity_flags), &_session->unset_identity_flags,
NULL);
assert(int_result == SQLITE_OK);
9 years ago
int_result = sqlite3_prepare_v2(_session->db, sql_set_trust,
(int)strlen(sql_set_trust), &_session->set_trust, NULL);
assert(int_result == SQLITE_OK);
int_result = sqlite3_prepare_v2(_session->db, sql_get_trust,
(int)strlen(sql_get_trust), &_session->get_trust, NULL);
assert(int_result == SQLITE_OK);
9 years ago
int_result = sqlite3_prepare_v2(_session->db, sql_least_trust,
(int)strlen(sql_least_trust), &_session->least_trust, NULL);
assert(int_result == SQLITE_OK);
int_result = sqlite3_prepare_v2(_session->db, sql_mark_as_compromized,
7 years ago
(int)strlen(sql_mark_as_compromized), &_session->mark_compromized,
NULL);
assert(int_result == SQLITE_OK);
int_result = sqlite3_prepare_v2(_session->db, sql_crashdump,
(int)strlen(sql_crashdump), &_session->crashdump, NULL);
assert(int_result == SQLITE_OK);
int_result = sqlite3_prepare_v2(_session->system_db, sql_languagelist,
(int)strlen(sql_languagelist), &_session->languagelist, NULL);
assert(int_result == SQLITE_OK);
int_result = sqlite3_prepare_v2(_session->system_db, sql_i18n_token,
(int)strlen(sql_i18n_token), &_session->i18n_token, NULL);
assert(int_result == SQLITE_OK);
7 years ago
// blacklist
int_result = sqlite3_prepare_v2(_session->db, sql_blacklist_add,
(int)strlen(sql_blacklist_add), &_session->blacklist_add, NULL);
assert(int_result == SQLITE_OK);
int_result = sqlite3_prepare_v2(_session->db, sql_blacklist_delete,
7 years ago
(int)strlen(sql_blacklist_delete), &_session->blacklist_delete,
NULL);
7 years ago
assert(int_result == SQLITE_OK);
int_result = sqlite3_prepare_v2(_session->db, sql_blacklist_is_listed,
7 years ago
(int)strlen(sql_blacklist_is_listed),
&_session->blacklist_is_listed, NULL);
7 years ago
assert(int_result == SQLITE_OK);
int_result = sqlite3_prepare_v2(_session->db, sql_blacklist_retrieve,
7 years ago
(int)strlen(sql_blacklist_retrieve), &_session->blacklist_retrieve,
NULL);
assert(int_result == SQLITE_OK);
// Own keys
int_result = sqlite3_prepare_v2(_session->db, sql_own_key_is_listed,
7 years ago
(int)strlen(sql_own_key_is_listed), &_session->own_key_is_listed,
NULL);
assert(int_result == SQLITE_OK);
7 years ago
int_result = sqlite3_prepare_v2(_session->db, sql_own_identities_retrieve,
(int)strlen(sql_own_identities_retrieve),
&_session->own_identities_retrieve, NULL);
assert(int_result == SQLITE_OK);
7 years ago
int_result = sqlite3_prepare_v2(_session->db, sql_own_keys_retrieve,
(int)strlen(sql_own_keys_retrieve),
&_session->own_keys_retrieve, NULL);
assert(int_result == SQLITE_OK);
int_result = sqlite3_prepare_v2(_session->db, sql_set_own_key,
(int)strlen(sql_set_own_key),
&_session->set_own_key, NULL);
assert(int_result == SQLITE_OK);
7 years ago
// Sequence
int_result = sqlite3_prepare_v2(_session->db, sql_sequence_value1,
7 years ago
(int)strlen(sql_sequence_value1), &_session->sequence_value1,
NULL);
7 years ago
assert(int_result == SQLITE_OK);
int_result = sqlite3_prepare_v2(_session->db, sql_sequence_value2,
7 years ago
(int)strlen(sql_sequence_value2), &_session->sequence_value2,
NULL);
7 years ago
assert(int_result == SQLITE_OK);
7 years ago
int_result = sqlite3_prepare_v2(_session->db, sql_sequence_value3,
(int)strlen(sql_sequence_value3), &_session->sequence_value3,
NULL);
assert(int_result == SQLITE_OK);
// Revocation tracking
int_result = sqlite3_prepare_v2(_session->db, sql_set_revoked,
7 years ago
(int)strlen(sql_set_revoked), &_session->set_revoked, NULL);
assert(int_result == SQLITE_OK);
int_result = sqlite3_prepare_v2(_session->db, sql_get_revoked,
7 years ago
(int)strlen(sql_get_revoked), &_session->get_revoked, NULL);
assert(int_result == SQLITE_OK);
status = init_cryptotech(_session, in_first);
if (status != PEP_STATUS_OK)
goto pep_error;
9 years ago
status = init_transport_system(_session, in_first);
if (status != PEP_STATUS_OK)
goto pep_error;
status = log_event(_session, "init", "pEp " PEP_ENGINE_VERSION, NULL, NULL);
if (status != PEP_STATUS_OK)
goto pep_error;
7 years ago
// runtime config
#ifdef ANDROID
_session->use_only_own_private_keys = true;
#elif TARGET_OS_IPHONE
_session->use_only_own_private_keys = true;
#else
_session->use_only_own_private_keys = false;
#endif
7 years ago
*session = _session;
return PEP_STATUS_OK;
enomem:
status = PEP_OUT_OF_MEMORY;
pep_error:
release(_session);
return status;
9 years ago
}
DYNAMIC_API void release(PEP_SESSION session)
{
bool out_last = false;
assert(init_count >= 0);
assert(session);
if (!((init_count >= 0) && session))
8 years ago
return;
// a small race condition but still a race condition
8 years ago
// mitigated by calling caveat (see documentation)
if (init_count == 0)
out_last = true;
--init_count;
if (session) {
if (session->sync_state != DeviceState_state_NONE)
unregister_sync_callbacks(session);
if (session->db) {
if (session->log)
sqlite3_finalize(session->log);
if (session->trustword)
sqlite3_finalize(session->trustword);
if (session->get_identity)
sqlite3_finalize(session->get_identity);
if (session->set_person)
sqlite3_finalize(session->set_person);
if (session->set_device_group)
sqlite3_finalize(session->set_device_group);
if (session->get_device_group)
sqlite3_finalize(session->get_device_group);
if (session->set_pgp_keypair)
sqlite3_finalize(session->set_pgp_keypair);
if (session->set_identity)
sqlite3_finalize(session->set_identity);
if (session->set_identity_flags)
sqlite3_finalize(session->set_identity_flags);
if (session->unset_identity_flags)
sqlite3_finalize(session->unset_identity_flags);
if (session->set_trust)
sqlite3_finalize(session->set_trust);
if (session->get_trust)
sqlite3_finalize(session->get_trust);
if (session->least_trust)
sqlite3_finalize(session->least_trust);
if (session->mark_compromized)
sqlite3_finalize(session->mark_compromized);
if (session->crashdump)
sqlite3_finalize(session->crashdump);
if (session->languagelist)
sqlite3_finalize(session->languagelist);
if (session->i18n_token)
sqlite3_finalize(session->i18n_token);
if (session->blacklist_add)
sqlite3_finalize(session->blacklist_add);
if (session->blacklist_delete)
sqlite3_finalize(session->blacklist_delete);
if (session->blacklist_is_listed)
sqlite3_finalize(session->blacklist_is_listed);
if (session->blacklist_retrieve)
sqlite3_finalize(session->blacklist_retrieve);
if (session->own_key_is_listed)
sqlite3_finalize(session->own_key_is_listed);
if (session->own_identities_retrieve)
sqlite3_finalize(session->own_identities_retrieve);
if (session->own_keys_retrieve)
sqlite3_finalize(session->own_keys_retrieve);
if (session->set_own_key)
sqlite3_finalize(session->set_own_key);
if (session->sequence_value1)
sqlite3_finalize(session->sequence_value1);
if (session->sequence_value2)
sqlite3_finalize(session->sequence_value2);
7 years ago
if (session->sequence_value3)
sqlite3_finalize(session->sequence_value3);
if (session->set_revoked)
sqlite3_finalize(session->set_revoked);
if (session->get_revoked)
sqlite3_finalize(session->get_revoked);
if (session->db)
sqlite3_close_v2(session->db);
if (session->system_db)
sqlite3_close_v2(session->system_db);
}
release_transport_system(session, out_last);
release_cryptotech(session, out_last);
free(session);
}
9 years ago
}
7 years ago
DYNAMIC_API void config_passive_mode(PEP_SESSION session, bool enable)
7 years ago
{
assert(session);
7 years ago
session->passive_mode = enable;
7 years ago
}
7 years ago
DYNAMIC_API void config_unencrypted_subject(PEP_SESSION session, bool enable)
7 years ago
{
assert(session);
7 years ago
session->unencrypted_subject = enable;
7 years ago
}
7 years ago
DYNAMIC_API void config_use_only_own_private_keys(PEP_SESSION session,
bool enable)
{
assert(session);
session->use_only_own_private_keys = enable;
}
DYNAMIC_API void config_keep_sync_msg(PEP_SESSION session, bool enable)
{
assert(session);
session->keep_sync_msg = enable;
}
9 years ago
DYNAMIC_API PEP_STATUS log_event(
PEP_SESSION session,
const char *title,