libreoffice-online/common/Crypto.cpp
Jan Holesovsky 92aca7f2dd Compile the support key in (when configured to use one).
Change-Id: Iffff0b95b245b91d9732a774a6026a3cec2b2222
Reviewed-on: https://gerrit.libreoffice.org/43185
Reviewed-by: Andras Timar <andras.timar@collabora.com>
Tested-by: Andras Timar <andras.timar@collabora.com>
2017-10-06 11:39:29 +02:00

132 lines
3.6 KiB
C++

/* -*- Mode: C++; tab-width: 4; indent-tabs-mode: nil; c-basic-offset: 4; fill-column: 100 -*- */
/*
* This file is part of the LibreOffice project.
*
* This Source Code Form is subject to the terms of the Mozilla Public
* License, v. 2.0. If a copy of the MPL was not distributed with this
* file, You can obtain one at http://mozilla.org/MPL/2.0/.
*/
#include "config.h"
#if ENABLE_SUPPORT_KEY
#include <Poco/DigestStream.h>
#include <Poco/Base64Decoder.h>
#include <Poco/DateTimeParser.h>
#include <Poco/Crypto/RSADigestEngine.h>
#include <fstream>
#include <sstream>
#include <iostream>
#include "Log.hpp"
#include "Crypto.hpp"
#include "support-public-key.hpp"
using namespace Poco;
using namespace Poco::Crypto;
struct SupportKeyImpl
{
bool _invalid;
std::string _key;
std::string _data;
std::string _signature;
DateTime _expiry;
// Key format: iso-expiry-date:field1:field2:field:...:<signature>
SupportKeyImpl(const std::string &key)
: _invalid(true), _key(key)
{
LOG_INF("Support key '" << key << "' provided");
size_t firstColon = key.find(':');
if (firstColon != std::string::npos)
{
std::string expiry(key.substr(0, firstColon));
LOG_INF("Support key with expiry '" << expiry << "'");
try {
int timeZoneDifferential = 0;
Poco::DateTimeParser::parse(expiry, _expiry, timeZoneDifferential);
size_t lastColon = key.rfind(":");
if (lastColon != std::string::npos)
{
_signature = key.substr(lastColon + 1,
key.length() - lastColon);
_data = key.substr(0, lastColon);
LOG_INF("Support key signature '" << _signature << "' data '" << _data << "'");
_invalid = false;
}
} catch (SyntaxException &e) {
LOG_ERR("Invalid support key expiry '" << expiry << "'");
}
}
}
};
SupportKey::SupportKey(const std::string &key) :
_impl(new SupportKeyImpl(key))
{
}
SupportKey::~SupportKey()
{
}
bool SupportKey::verify()
{
if (_impl->_invalid)
{
LOG_ERR("Basic key structure is invalid.");
return false;
}
std::istringstream pubStream(SUPPORT_PUBLIC_KEY);
try {
RSAKey keyPub(&pubStream);
RSADigestEngine rsaEngine(keyPub, RSADigestEngine::DigestType::DIGEST_SHA1);
rsaEngine.update(_impl->_data);
std::istringstream sigStream(_impl->_signature);
Poco::Base64Decoder rawStream(sigStream);
std::istreambuf_iterator<char> eos;
std::vector<unsigned char> rawSignature(std::istreambuf_iterator<char>(rawStream), eos);
LOG_INF("Signature of length " << rawSignature.size()
<< " data size: " << _impl->_data.length());
if (!rsaEngine.verify(rawSignature))
{
LOG_ERR("Support key is not correctly signed.");
return false;
}
} catch (...) {
LOG_ERR("Exception validating support key.");
return false;
}
LOG_INF("Support key correctly signed.");
return true;
}
int SupportKey::validDaysRemaining()
{
if (!verify())
{
LOG_ERR("Support key signature is invalid.");
return 0;
}
Timespan remaining = _impl->_expiry - DateTime();
int days = remaining.days();
if (days > 0)
LOG_INF("Support key has " << days << " remaining");
else
LOG_ERR("Support key has expired for " << -days << " days");
return days;
}
#endif // ENABLE_SUPPORT_KEY
/* vim:set shiftwidth=4 softtabstop=4 expandtab: */