Welcome to mirror list, hosted at ThFree Co, Russian Federation.

github.com/nextcloud/desktop.git - Unnamed repository; edit this file 'description' to name the repository.
summaryrefslogtreecommitdiff
path: root/src
diff options
context:
space:
mode:
authorMatthieu Gallien <matthieu.gallien@nextcloud.com>2022-10-05 12:21:29 +0300
committerMatthieu Gallien <matthieu_gallien@yahoo.fr>2022-10-24 11:25:41 +0300
commitcd30d3645e2161f819827a0827140fc57db16a3d (patch)
treec9a78ce0479ce647ccbee2b1510dfd88eed62ede /src
parent8ea75f49679224dbd4d3f0be999fe602c5b4751c (diff)
fix review comments from sonarcloud static analyzis
Signed-off-by: Matthieu Gallien <matthieu.gallien@nextcloud.com>
Diffstat (limited to 'src')
-rw-r--r--src/libsync/clientsideencryption.cpp36
-rw-r--r--src/libsync/clientsideencryption.h4
2 files changed, 22 insertions, 18 deletions
diff --git a/src/libsync/clientsideencryption.cpp b/src/libsync/clientsideencryption.cpp
index fd1f501a2..9bd5919ea 100644
--- a/src/libsync/clientsideencryption.cpp
+++ b/src/libsync/clientsideencryption.cpp
@@ -196,7 +196,9 @@ namespace {
EVP_PKEY_CTX* _ctx = nullptr;
};
- class PKey {
+ }
+
+ class ClientSideEncryption::PKey {
public:
~PKey()
{
@@ -255,6 +257,8 @@ namespace {
EVP_PKEY* _pkey = nullptr;
};
+ namespace
+ {
class X509Certificate {
public:
~X509Certificate()
@@ -619,7 +623,7 @@ QByteArray decryptStringSymmetric(const QByteArray& key, const QByteArray& data)
QByteArray privateKeyToPem(const QByteArray key) {
Bio privateKeyBio;
BIO_write(privateKeyBio, key.constData(), key.size());
- auto pkey = PKey::readPrivateKey(privateKeyBio);
+ auto pkey = ClientSideEncryption::PKey::readPrivateKey(privateKeyBio);
Bio pemBio;
PEM_write_bio_PKCS8PrivateKey(pemBio, pkey, nullptr, nullptr, 0, nullptr, nullptr);
@@ -1181,12 +1185,17 @@ void ClientSideEncryption::generateCSR(const AccountPtr &account, PKey keyPair)
qCInfo(lcCse()) << "Returning the certificate";
qCInfo(lcCse()) << output;
+ sendSignRequestCSR(account, std::move(keyPair), output);
+}
+
+void ClientSideEncryption::sendSignRequestCSR(const AccountPtr &account, PKey keyPair, const QByteArray &csrContent)
+{
auto job = new SignPublicKeyApiJob(account, e2eeBaseUrl() + "public-key", this);
- job->setCsr(output);
+ job->setCsr(csrContent);
connect(job, &SignPublicKeyApiJob::jsonReceived, [this, account, keyPair = std::move(keyPair)](const QJsonDocument& json, int retCode) {
if (retCode == 200) {
- QString cert = json.object().value("ocs").toObject().value("data").toObject().value("public-key").toString();
+ const auto cert = json.object().value("ocs").toObject().value("data").toObject().value("public-key").toString();
_certificate = QSslCertificate(cert.toLocal8Bit(), QSsl::Pem);
_publicKey = _certificate.publicKey();
@@ -1195,22 +1204,15 @@ void ClientSideEncryption::generateCSR(const AccountPtr &account, PKey keyPair)
BIO_write(certificateBio, certificatePem.constData(), certificatePem.size());
const auto x509Certificate = X509Certificate::readCertificate(certificateBio);
- if (auto certificateCheckResult = X509_check_private_key(x509Certificate, keyPair) ; !certificateCheckResult) {
- std::array<char, 512> buffer;
- qCInfo(lcCse()) << "X509_check_private_key" << certificateCheckResult;
-
- unsigned long lastError = 1;
- while (lastError) {
- lastError = ERR_get_error();
- qCInfo(lcCse()) << ERR_error_string(lastError, buffer.data());
+ if (const auto certificateCheckResult = X509_check_private_key(x509Certificate, keyPair) ; !certificateCheckResult) {
+ auto lastError = 1;
+ while ((lastError= ERR_get_error())) {
+ qCInfo(lcCse()) << ERR_lib_error_string(lastError);
}
-
forgetSensitiveData(account);
return;
}
-
qCInfo(lcCse()) << "received a valid certificate";
-
fetchAndValidatePublicKeyFromServer(account);
}
qCInfo(lcCse()) << retCode;
@@ -1497,7 +1499,7 @@ QByteArray FolderMetadata::encryptMetadataKey(const QByteArray& data) const
Bio publicKeyBio;
QByteArray publicKeyPem = _account->e2e()->_publicKey.toPem();
BIO_write(publicKeyBio, publicKeyPem.constData(), publicKeyPem.size());
- auto publicKey = PKey::readPublicKey(publicKeyBio);
+ auto publicKey = ClientSideEncryption::PKey::readPublicKey(publicKeyBio);
// The metadata key is binary so base64 encode it first
return EncryptionHelper::encryptStringAsymmetric(publicKey, data.toBase64());
@@ -1508,7 +1510,7 @@ QByteArray FolderMetadata::decryptMetadataKey(const QByteArray& encryptedMetadat
Bio privateKeyBio;
QByteArray privateKeyPem = _account->e2e()->_privateKey;
BIO_write(privateKeyBio, privateKeyPem.constData(), privateKeyPem.size());
- auto key = PKey::readPrivateKey(privateKeyBio);
+ auto key = ClientSideEncryption::PKey::readPrivateKey(privateKeyBio);
// Also base64 decode the result
QByteArray decryptResult = EncryptionHelper::decryptStringAsymmetric(
diff --git a/src/libsync/clientsideencryption.h b/src/libsync/clientsideencryption.h
index b3f6079fe..7e7e6d059 100644
--- a/src/libsync/clientsideencryption.h
+++ b/src/libsync/clientsideencryption.h
@@ -114,18 +114,20 @@ private:
}
namespace {
-class PKey;
}
class OWNCLOUDSYNC_EXPORT ClientSideEncryption : public QObject {
Q_OBJECT
public:
+ class PKey;
+
ClientSideEncryption();
void initialize(const AccountPtr &account);
private:
void generateKeyPair(const AccountPtr &account);
void generateCSR(const AccountPtr &account, PKey keyPair);
+ void sendSignRequestCSR(const AccountPtr &account, PKey keyPair, const QByteArray &csrContent);
void encryptPrivateKey(const AccountPtr &account);
public: