summaryrefslogtreecommitdiffabout
authorMichael Krelin <hacker@klever.net>2009-04-06 20:27:39 (UTC)
committer Michael Krelin <hacker@klever.net>2009-04-06 20:27:39 (UTC)
commit51d8a8a4ac6ef6096c393fd602df34c6bf8f6366 (patch) (unidiff)
tree8126f60fac6562b14c965e41d19983d81312638a
parentde964540e5a58b3a9195c642ef7a0745ee3b2344 (diff)
downloadiii-51d8a8a4ac6ef6096c393fd602df34c6bf8f6366.zip
iii-51d8a8a4ac6ef6096c393fd602df34c6bf8f6366.tar.gz
iii-51d8a8a4ac6ef6096c393fd602df34c6bf8f6366.tar.bz2
better nonce generation and session credentials verification
based on the patch from Chris Davies Signed-off-by: Michael Krelin <hacker@klever.net>
Diffstat (more/less context) (ignore whitespace changes)
-rw-r--r--AUTHORS1
-rw-r--r--configure.ac6
-rw-r--r--src/Makefile.am4
-rw-r--r--src/eyefiservice.cc21
-rw-r--r--src/eyetil.cc17
-rw-r--r--src/eyetil.h1
6 files changed, 43 insertions, 7 deletions
diff --git a/AUTHORS b/AUTHORS
index 257669f..e7f9101 100644
--- a/AUTHORS
+++ b/AUTHORS
@@ -1,9 +1,10 @@
1Klever dissected: 1Klever dissected:
2 Michael 'hacker' Krelin <hacker@klever.net> 2 Michael 'hacker' Krelin <hacker@klever.net>
3 Leonid Ivanov <kamel@klever.net> 3 Leonid Ivanov <kamel@klever.net>
4 4
5 5
6Thanks to: 6Thanks to:
7 7
8cdavies of Eye-Fi forums for integrity digest verification algorithm. 8cdavies of Eye-Fi forums for integrity digest verification algorithm.
9 See http://forums.eye.fi/viewtopic.php?f=4&t=270&p=4074#p4074 9 See http://forums.eye.fi/viewtopic.php?f=4&t=270&p=4074#p4074
10 and session nonce verification patch
diff --git a/configure.ac b/configure.ac
index 2e66fc4..515d465 100644
--- a/configure.ac
+++ b/configure.ac
@@ -1,71 +1,77 @@
1AC_INIT([iii], [0.1], [iii-bugs@klever.net]) 1AC_INIT([iii], [0.1], [iii-bugs@klever.net])
2AC_CONFIG_SRCDIR([src/iiid.cc]) 2AC_CONFIG_SRCDIR([src/iiid.cc])
3AC_CONFIG_HEADERS([config.h]) 3AC_CONFIG_HEADERS([config.h])
4AM_INIT_AUTOMAKE([dist-bzip2]) 4AM_INIT_AUTOMAKE([dist-bzip2])
5 5
6AC_PROG_INSTALL 6AC_PROG_INSTALL
7AC_PROG_CXX 7AC_PROG_CXX
8AC_PROG_CC 8AC_PROG_CC
9PKG_PROG_PKG_CONFIG 9PKG_PROG_PKG_CONFIG
10 10
11AC_HEADER_STDC 11AC_HEADER_STDC
12 12
13AC_PATH_PROG([XSLTPROC],[xsltproc],[true]) 13AC_PATH_PROG([XSLTPROC],[xsltproc],[true])
14 14
15PKG_CHECK_MODULES([MODULES],[gsoap++ openssl libconfuse],,[ 15PKG_CHECK_MODULES([MODULES],[gsoap++ openssl libconfuse],,[
16 AC_MSG_ERROR([one of the build dependencies isn't satisfied]) 16 AC_MSG_ERROR([one of the build dependencies isn't satisfied])
17]) 17])
18PKG_CHECK_MODULES([UUID],[uuid],[have_uuid=true],[have_uuid=false])
19AM_CONDITIONAL([HAVE_UUID],[$have_uuid])
20if $have_uuid ; then
21 AC_DEFINE([HAVE_LIBUUID],,[defined in presence of libuuid])
22 AC_SUBST([UUID_UUID],[uuid])
23fi
18 24
19AC_PATH_PROG([SOAPCPP2],[soapcpp2],[false]) 25AC_PATH_PROG([SOAPCPP2],[soapcpp2],[false])
20test "$SOAPCPP2" = "false" && AC_MSG_ERROR([no soapcpp2 tool, part of gsoap package, found.]) 26test "$SOAPCPP2" = "false" && AC_MSG_ERROR([no soapcpp2 tool, part of gsoap package, found.])
21 27
22notfound=false 28notfound=false
23AC_CHECK_HEADERS([archive.h],[ 29AC_CHECK_HEADERS([archive.h],[
24 AC_CHECK_LIB([archive],[archive_read_new],,[notfound=true]) 30 AC_CHECK_LIB([archive],[archive_read_new],,[notfound=true])
25],[notfound=true]) 31],[notfound=true])
26$notfound && AC_MSG_ERROR([no required libarchive library found. get one from http://people.freebsd.org/~kientzle/libarchive/]) 32$notfound && AC_MSG_ERROR([no required libarchive library found. get one from http://people.freebsd.org/~kientzle/libarchive/])
27 33
28notfound=false 34notfound=false
29AC_LANG_PUSH([C++]) 35AC_LANG_PUSH([C++])
30AC_CHECK_HEADERS([autosprintf.h],[ 36AC_CHECK_HEADERS([autosprintf.h],[
31 AC_CHECK_LIB([asprintf],[main],,[notfound=true]) 37 AC_CHECK_LIB([asprintf],[main],,[notfound=true])
32],[notfound=true]) 38],[notfound=true])
33$notfound && AC_MSG_ERROR([no autosprintf, part of gettext, found]) 39$notfound && AC_MSG_ERROR([no autosprintf, part of gettext, found])
34AC_LANG_POP([C++]) 40AC_LANG_POP([C++])
35 41
36nitpick=false 42nitpick=false
37AC_ARG_ENABLE([nitpicking], 43AC_ARG_ENABLE([nitpicking],
38 AC_HELP_STRING([--enable-nitpicking],[make compiler somewhat overly fastidious about the code it deals with]), 44 AC_HELP_STRING([--enable-nitpicking],[make compiler somewhat overly fastidious about the code it deals with]),
39 [ test "$enableval" = "no" || nitpick=true ] 45 [ test "$enableval" = "no" || nitpick=true ]
40) 46)
41if $nitpick ; then 47if $nitpick ; then
42 CPP_NITPICK="-pedantic -Wall -Wextra -Wundef -Wshadow \ 48 CPP_NITPICK="-pedantic -Wall -Wextra -Wundef -Wshadow \
43 -Wunsafe-loop-optimizations -Wconversion -Wmissing-format-attribute \ 49 -Wunsafe-loop-optimizations -Wconversion -Wmissing-format-attribute \
44 -Wredundant-decls -ansi -Wlogical-op -Wmissing-noreturn" 50 -Wredundant-decls -ansi -Wlogical-op -Wmissing-noreturn"
45 C_NITPICK="$CPP_NITPICK" 51 C_NITPICK="$CPP_NITPICK"
46 CXX_NITPICK="$C_NITPICK" 52 CXX_NITPICK="$C_NITPICK"
47 53
48 CPPFLAGS="$CPPFLAGS $CPP_NITPICK" 54 CPPFLAGS="$CPPFLAGS $CPP_NITPICK"
49 CFLAGS="$CFLAGS $C_NITPICK" 55 CFLAGS="$CFLAGS $C_NITPICK"
50 CXXFLAGS="$CXXFLAGS $CXX_NITPICK" 56 CXXFLAGS="$CXXFLAGS $CXX_NITPICK"
51fi 57fi
52 58
53ndebug=true 59ndebug=true
54AC_ARG_ENABLE([debug], 60AC_ARG_ENABLE([debug],
55 AC_HELP_STRING([--enable-debug],[enable debugging code]), 61 AC_HELP_STRING([--enable-debug],[enable debugging code]),
56 [ test "$enableval" = "no" || ndebug=false ] 62 [ test "$enableval" = "no" || ndebug=false ]
57) 63)
58if $ndebug ; then 64if $ndebug ; then
59 CPPFLAGS_DEBUG="-DNDEBUG" 65 CPPFLAGS_DEBUG="-DNDEBUG"
60else 66else
61 CPPFLAGS_DEBUG="-DDEBUG" 67 CPPFLAGS_DEBUG="-DDEBUG"
62fi 68fi
63AC_SUBST([CPPFLAGS_DEBUG]) 69AC_SUBST([CPPFLAGS_DEBUG])
64 70
65AC_CONFIG_FILES([ 71AC_CONFIG_FILES([
66 Makefile 72 Makefile
67 src/Makefile 73 src/Makefile
68 doc/Makefile 74 doc/Makefile
69 doc/iiid.8 75 doc/iiid.8
70]) 76])
71AC_OUTPUT 77AC_OUTPUT
diff --git a/src/Makefile.am b/src/Makefile.am
index 09f698e..b5b7d5c 100644
--- a/src/Makefile.am
+++ b/src/Makefile.am
@@ -1,32 +1,32 @@
1sbin_PROGRAMS=iiid 1sbin_PROGRAMS=iiid
2noinst_HEADERS = \ 2noinst_HEADERS = \
3 eyefi.h \ 3 eyefi.h \
4 eyekinfig.h eyetil.h \ 4 eyekinfig.h eyetil.h \
5 eyefiworker.h 5 eyefiworker.h
6 6
7AM_CPPFLAGS = ${CPPFLAGS_DEBUG} \ 7AM_CPPFLAGS = ${CPPFLAGS_DEBUG} \
8 -DEYEKIN_CONF_DIR=\"${sysconfdir}/${PACKAGE}\" 8 -DEYEKIN_CONF_DIR=\"${sysconfdir}/${PACKAGE}\"
9DEFAULT_INCLUDES = -I${top_builddir} -I${builddir} -I${srcdir} 9DEFAULT_INCLUDES = -I${top_builddir} -I${builddir} -I${srcdir}
10INCLUDES = ${MODULES_CFLAGS} 10INCLUDES = ${MODULES_CFLAGS} ${UUID_CFLAGS}
11 11
12iiid_SOURCES = iiid.cc \ 12iiid_SOURCES = iiid.cc \
13 eyekinfig.cc eyetil.cc \ 13 eyekinfig.cc eyetil.cc \
14 eyefiservice.cc eyefiworker.cc 14 eyefiservice.cc eyefiworker.cc
15nodist_iiid_SOURCES = \ 15nodist_iiid_SOURCES = \
16 ${builddir}/soapC.cpp ${builddir}/soapeyefiService.cpp \ 16 ${builddir}/soapC.cpp ${builddir}/soapeyefiService.cpp \
17 COPYING.cc 17 COPYING.cc
18iiid_LDADD = ${MODULES_LIBS} 18iiid_LDADD = ${MODULES_LIBS} ${UUID_LIBS}
19 19
20COPYING.cc: ${top_srcdir}/COPYING 20COPYING.cc: ${top_srcdir}/COPYING
21 echo "const char * COPYING = " >$@ || (rm $@;exit 1) 21 echo "const char * COPYING = " >$@ || (rm $@;exit 1)
22 sed -e 's/"/\\"/g' -e 's/^/\"/' -e 's/$$/\\n\"/' $< >>$@ || (rm $@;exit 1) 22 sed -e 's/"/\\"/g' -e 's/^/\"/' -e 's/$$/\\n\"/' $< >>$@ || (rm $@;exit 1)
23 echo ';' >>$@ || (rm $@;exit 1) 23 echo ';' >>$@ || (rm $@;exit 1)
24 24
25${srcdir}/eyefiservice.cc: ${builddir}/soapeyefiService.h 25${srcdir}/eyefiservice.cc: ${builddir}/soapeyefiService.h
26${srcdir}/iiid.cc: ${builddir}/eyefi.nsmap 26${srcdir}/iiid.cc: ${builddir}/eyefi.nsmap
27 27
28${builddir}soapC.cpp ${builddir}/soapeyefiService.cpp ${builddir}/eyefi.nsmap ${builddir}/soapeyefiService.h: ${srcdir}/eyefi.h 28${builddir}soapC.cpp ${builddir}/soapeyefiService.cpp ${builddir}/eyefi.nsmap ${builddir}/soapeyefiService.h: ${srcdir}/eyefi.h
29 ${SOAPCPP2} -d${builddir} -S -L -a -i -w -x $< 29 ${SOAPCPP2} -d${builddir} -S -L -a -i -w -x $<
30 30
31clean-local: 31clean-local:
32 rm -f soap{{H,Stub,eyefiService}.h,{C,eyefiService}.cpp} eyefi.nsmap COPYING.cc 32 rm -f soap{{H,Stub,eyefiService}.h,{C,eyefiService}.cpp} eyefi.nsmap COPYING.cc
diff --git a/src/eyefiservice.cc b/src/eyefiservice.cc
index d233a07..1a21c02 100644
--- a/src/eyefiservice.cc
+++ b/src/eyefiservice.cc
@@ -1,202 +1,213 @@
1#include <cassert> 1#include <cassert>
2#include <iostream> 2#include <iostream>
3#include <fstream> 3#include <fstream>
4#include <stdexcept> 4#include <stdexcept>
5#include <iterator> 5#include <iterator>
6#include <syslog.h> 6#include <syslog.h>
7#include <sys/wait.h> 7#include <sys/wait.h>
8#include <autosprintf.h> 8#include <autosprintf.h>
9#include <openssl/rand.h>
9#include "eyekinfig.h" 10#include "eyekinfig.h"
10#include "eyetil.h" 11#include "eyetil.h"
11#include "soapeyefiService.h" 12#include "soapeyefiService.h"
12 13
14static binary_t session_nonce;
15
13static bool detached_child() { 16static bool detached_child() {
14 pid_t p = fork(); 17 pid_t p = fork();
15 if(p<0) throw std::runtime_error("failed to fork()"); 18 if(p<0) throw std::runtime_error("failed to fork()");
16 if(!p) { 19 if(!p) {
17 p = fork(); 20 p = fork();
18 if(p<0) { 21 if(p<0) {
19 syslog(LOG_ERR,"Failed to re-fork child process"); 22 syslog(LOG_ERR,"Failed to re-fork child process");
20 _exit(-1); 23 _exit(-1);
21 } 24 }
22 if(!p) { 25 if(!p) {
23 setsid(); 26 setsid();
24 for(int i=getdtablesize();i>=0;--i) close(i); 27 for(int i=getdtablesize();i>=0;--i) close(i);
25 int i=open("/dev/null",O_RDWR); assert(i==0); 28 int i=open("/dev/null",O_RDWR); assert(i==0);
26 i = dup(i); assert(i==1); 29 i = dup(i); assert(i==1);
27 i = dup(i); assert(i==2); 30 i = dup(i); assert(i==2);
28 return true; 31 return true;
29 } 32 }
30 _exit(0); 33 _exit(0);
31 } 34 }
32 int rc; 35 int rc;
33 if(waitpid(p,&rc,0)<0) throw std::runtime_error("failed to waitpid()"); 36 if(waitpid(p,&rc,0)<0) throw std::runtime_error("failed to waitpid()");
34 if(!WIFEXITED(rc)) throw std::runtime_error("error in forked process"); 37 if(!WIFEXITED(rc)) throw std::runtime_error("error in forked process");
35 if(WEXITSTATUS(rc)) throw std::runtime_error("forked process signalled error"); 38 if(WEXITSTATUS(rc)) throw std::runtime_error("forked process signalled error");
36 return false; 39 return false;
37} 40}
38 41
39int eyefiService::StartSession( 42int eyefiService::StartSession(
40 std::string macaddress,std::string cnonce, 43 std::string macaddress,std::string cnonce,
41 int transfermode,long transfermodetimestamp, 44 int transfermode,long transfermodetimestamp,
42 struct rns__StartSessionResponse &r ) { 45 struct rns__StartSessionResponse &r ) {
43#ifndef NDEBUG 46#ifndef NDEBUG
44 syslog(LOG_DEBUG, 47 syslog(LOG_DEBUG,
45 "StartSession request from %s with cnonce=%s, transfermode=%d, transfermodetimestamp=%ld", 48 "StartSession request from %s with cnonce=%s, transfermode=%d, transfermodetimestamp=%ld",
46 macaddress.c_str(), cnonce.c_str(), transfermode, transfermodetimestamp ); 49 macaddress.c_str(), cnonce.c_str(), transfermode, transfermodetimestamp );
47#endif 50#endif
48 r.credential = binary_t(macaddress+cnonce+eyekinfig_t(macaddress).get_upload_key()).md5().hex(); 51 r.credential = binary_t(macaddress+cnonce+eyekinfig_t(macaddress).get_upload_key()).md5().hex();
49 /* TODO: better nonce generator */ 52
50 time_t t = time(0); 53 r.snonce = session_nonce.make_nonce().hex();
51 r.snonce = binary_t(&t,sizeof(t)).md5().hex();
52 r.transfermode=transfermode; 54 r.transfermode=transfermode;
53 r.transfermodetimestamp=transfermodetimestamp; 55 r.transfermodetimestamp=transfermodetimestamp;
54 r.upsyncallowed=false; 56 r.upsyncallowed=false;
55 57
56 std::string cmd = eyekinfig_t(macaddress).get_on_start_session(); 58 std::string cmd = eyekinfig_t(macaddress).get_on_start_session();
57 if(!cmd.empty()) { 59 if(!cmd.empty()) {
58 if(detached_child()) { 60 if(detached_child()) {
59 putenv( gnu::autosprintf("EYEFI_MACADDRESS=%s",macaddress.c_str()) ); 61 putenv( gnu::autosprintf("EYEFI_MACADDRESS=%s",macaddress.c_str()) );
60 putenv( gnu::autosprintf("EYEFI_TRANSFERMODE=%d",transfermode) ); 62 putenv( gnu::autosprintf("EYEFI_TRANSFERMODE=%d",transfermode) );
61 putenv( gnu::autosprintf("EYEFI_TRANSFERMODETIMESTAMP=%ld",transfermodetimestamp) ); 63 putenv( gnu::autosprintf("EYEFI_TRANSFERMODETIMESTAMP=%ld",transfermodetimestamp) );
62 char *argv[] = { (char*)"/bin/sh", (char*)"-c", (char*)cmd.c_str(), 0 }; 64 char *argv[] = { (char*)"/bin/sh", (char*)"-c", (char*)cmd.c_str(), 0 };
63 execv("/bin/sh",argv); 65 execv("/bin/sh",argv);
64 syslog(LOG_ERR,"Failed to execute '%s'",cmd.c_str()); 66 syslog(LOG_ERR,"Failed to execute '%s'",cmd.c_str());
65 _exit(-1); 67 _exit(-1);
66 } 68 }
67 } 69 }
68 return SOAP_OK; 70 return SOAP_OK;
69} 71}
70 72
71int eyefiService::GetPhotoStatus( 73int eyefiService::GetPhotoStatus(
72 std::string credential, std::string macaddress, 74 std::string credential, std::string macaddress,
73 std::string filename, long filesize, std::string filesignature, 75 std::string filename, long filesize, std::string filesignature,
74 struct rns__GetPhotoStatusResponse &r ) { 76 struct rns__GetPhotoStatusResponse &r ) {
75#ifndef NDEBUG 77#ifndef NDEBUG
76 syslog(LOG_DEBUG, 78 syslog(LOG_DEBUG,
77 "GetPhotoStatus request from %s with credential=%s, filename=%s, filesize=%ld, filesignature=%s", 79 "GetPhotoStatus request from %s with credential=%s, filename=%s, filesize=%ld, filesignature=%s; session nonce=%s",
78 macaddress.c_str(), credential.c_str(), filename.c_str(), filesize, filesignature.c_str() ); 80 macaddress.c_str(), credential.c_str(), filename.c_str(), filesize, filesignature.c_str(), session_nonce.hex().c_str() );
81#endif
82
83 std::string computed_credential = binary_t(macaddress+eyekinfig_t(macaddress).get_upload_key()+session_nonce.hex()).md5().hex();
84
85#ifndef NDEBUG
86 syslog(LOG_DEBUG, " computed credential=%s", computed_credential.c_str());
79#endif 87#endif
88
89 if (credential != computed_credential) throw std::runtime_error("card authentication failed");
90
80 r.fileid = 1; r.offset = 0; 91 r.fileid = 1; r.offset = 0;
81 return SOAP_OK; 92 return SOAP_OK;
82} 93}
83 94
84int eyefiService::MarkLastPhotoInRoll( 95int eyefiService::MarkLastPhotoInRoll(
85 std::string macaddress, int mergedelta, 96 std::string macaddress, int mergedelta,
86 struct rns__MarkLastPhotoInRollResponse &r ) { 97 struct rns__MarkLastPhotoInRollResponse &r ) {
87#ifndef NDEBUG 98#ifndef NDEBUG
88 syslog(LOG_DEBUG, 99 syslog(LOG_DEBUG,
89 "MarkLastPhotoInRoll request from %s with mergedelta=%d", 100 "MarkLastPhotoInRoll request from %s with mergedelta=%d",
90 macaddress.c_str(), mergedelta ); 101 macaddress.c_str(), mergedelta );
91#endif 102#endif
92 std::string cmd = eyekinfig_t(macaddress).get_on_mark_last_photo_in_roll(); 103 std::string cmd = eyekinfig_t(macaddress).get_on_mark_last_photo_in_roll();
93 if(!cmd.empty()) { 104 if(!cmd.empty()) {
94 if(detached_child()) { 105 if(detached_child()) {
95 putenv( gnu::autosprintf("EYEFI_MACADDRESS=%s",macaddress.c_str()) ); 106 putenv( gnu::autosprintf("EYEFI_MACADDRESS=%s",macaddress.c_str()) );
96 putenv( gnu::autosprintf("EYEFI_MERGEDELTA=%d",mergedelta) ); 107 putenv( gnu::autosprintf("EYEFI_MERGEDELTA=%d",mergedelta) );
97 char *argv[] = { (char*)"/bin/sh", (char*)"-c", (char*)cmd.c_str(), 0 }; 108 char *argv[] = { (char*)"/bin/sh", (char*)"-c", (char*)cmd.c_str(), 0 };
98 execv("/bin/sh",argv); 109 execv("/bin/sh",argv);
99 syslog(LOG_ERR,"Failed to execute '%s'",cmd.c_str()); 110 syslog(LOG_ERR,"Failed to execute '%s'",cmd.c_str());
100 _exit(-1); 111 _exit(-1);
101 } 112 }
102 } 113 }
103 return SOAP_OK; 114 return SOAP_OK;
104} 115}
105 116
106int eyefiService::UploadPhoto( 117int eyefiService::UploadPhoto(
107 int fileid, std::string macaddress, 118 int fileid, std::string macaddress,
108 std::string filename, long filesize, std::string filesignature, 119 std::string filename, long filesize, std::string filesignature,
109 std::string encryption, int flags, 120 std::string encryption, int flags,
110 struct rns__UploadPhotoResponse& r ) { 121 struct rns__UploadPhotoResponse& r ) {
111#ifndef NDEBUG 122#ifndef NDEBUG
112 syslog(LOG_DEBUG, 123 syslog(LOG_DEBUG,
113 "UploadPhoto request from %s with fileid=%d, filename=%s, filesize=%ld," 124 "UploadPhoto request from %s with fileid=%d, filename=%s, filesize=%ld,"
114 " filesignature=%s, encryption=%s, flags=%04X", 125 " filesignature=%s, encryption=%s, flags=%04X",
115 macaddress.c_str(), fileid, filename.c_str(), filesize, 126 macaddress.c_str(), fileid, filename.c_str(), filesize,
116 filesignature.c_str(), encryption.c_str(), flags ); 127 filesignature.c_str(), encryption.c_str(), flags );
117#endif 128#endif
118 eyekinfig_t eyekinfig(macaddress); 129 eyekinfig_t eyekinfig(macaddress);
119 130
120 umask(eyekinfig.get_umask()); 131 umask(eyekinfig.get_umask());
121 132
122 std::string td = eyekinfig.get_targetdir(); 133 std::string td = eyekinfig.get_targetdir();
123 tmpdir_t indir(td+"/.incoming.XXXXXX"); 134 tmpdir_t indir(td+"/.incoming.XXXXXX");
124 135
125 std::string jf; 136 std::string jf;
126 binary_t digest, idigest; 137 binary_t digest, idigest;
127 138
128 for(soap_multipart::iterator i=mime.begin(),ie=mime.end();i!=ie;++i) { 139 for(soap_multipart::iterator i=mime.begin(),ie=mime.end();i!=ie;++i) {
129#ifndef NDEBUG 140#ifndef NDEBUG
130 syslog(LOG_DEBUG, 141 syslog(LOG_DEBUG,
131 " MIME attachment with id=%s, type=%s, size=%ld", 142 " MIME attachment with id=%s, type=%s, size=%ld",
132 (*i).id, (*i).type, (long)(*i).size ); 143 (*i).id, (*i).type, (long)(*i).size );
133#endif 144#endif
134 145
135 if((*i).id && !strcmp((*i).id,"INTEGRITYDIGEST")) { 146 if((*i).id && !strcmp((*i).id,"INTEGRITYDIGEST")) {
136 std::string idigestr((*i).ptr,(*i).size); 147 std::string idigestr((*i).ptr,(*i).size);
137#ifndef NDEBUG 148#ifndef NDEBUG
138 syslog(LOG_DEBUG, " INTEGRITYDIGEST=%s", idigestr.c_str()); 149 syslog(LOG_DEBUG, " INTEGRITYDIGEST=%s", idigestr.c_str());
139#endif 150#endif
140 idigest.from_hex(idigestr); 151 idigest.from_hex(idigestr);
141 } 152 }
142 if( (*i).id && !strcmp((*i).id,"FILENAME") ) { 153 if( (*i).id && !strcmp((*i).id,"FILENAME") ) {
143 assert( (*i).type && !strcmp((*i).type,"application/x-tar") ); 154 assert( (*i).type && !strcmp((*i).type,"application/x-tar") );
144#ifdef III_SAVE_TARS 155#ifdef III_SAVE_TARS
145 std::string tarfile = indir.get_file(filename); 156 std::string tarfile = indir.get_file(filename);
146 { 157 {
147 std::ofstream(tarfile.c_str(),std::ios::out|std::ios::binary).write((*i).ptr,(*i).size); 158 std::ofstream(tarfile.c_str(),std::ios::out|std::ios::binary).write((*i).ptr,(*i).size);
148 } 159 }
149#endif 160#endif
150 161
151 if(!jf.empty()) throw std::runtime_error("already seen tarball"); 162 if(!jf.empty()) throw std::runtime_error("already seen tarball");
152 if(!digest.empty()) throw std::runtime_error("already have integrity digest"); 163 if(!digest.empty()) throw std::runtime_error("already have integrity digest");
153 digest = integrity_digest((*i).ptr,(*i).size,eyekinfig.get_upload_key()); 164 digest = integrity_digest((*i).ptr,(*i).size,eyekinfig.get_upload_key());
154#ifndef NDEBUG 165#ifndef NDEBUG
155 syslog(LOG_DEBUG," computed integrity digest=%s", digest.hex().c_str()); 166 syslog(LOG_DEBUG," computed integrity digest=%s", digest.hex().c_str());
156#endif 167#endif
157 168
158 tarchive_t a((*i).ptr,(*i).size); 169 tarchive_t a((*i).ptr,(*i).size);
159 if(!a.read_next_header()) 170 if(!a.read_next_header())
160 throw std::runtime_error("failed to tarchive_t::read_next_header())"); 171 throw std::runtime_error("failed to tarchive_t::read_next_header())");
161 jf = indir.get_file(a.entry_pathname()); 172 jf = indir.get_file(a.entry_pathname());
162 int fd=open(jf.c_str(),O_CREAT|O_WRONLY,0666); 173 int fd=open(jf.c_str(),O_CREAT|O_WRONLY,0666);
163 assert(fd>0); 174 assert(fd>0);
164 a.read_data_into_fd(fd); 175 a.read_data_into_fd(fd);
165 close(fd); 176 close(fd);
166 } 177 }
167 } 178 }
168 179
169 if(jf.empty()) throw std::runtime_error("haven't seen jpeg file"); 180 if(jf.empty()) throw std::runtime_error("haven't seen jpeg file");
170 if(digest!=idigest) throw std::runtime_error("integrity digest verification failed"); 181 if(digest!=idigest) throw std::runtime_error("integrity digest verification failed");
171 182
172 std::string::size_type ls = jf.rfind('/'); 183 std::string::size_type ls = jf.rfind('/');
173 std::string jbn = (ls==std::string::npos)?jf:jf.substr(ls+1); 184 std::string jbn = (ls==std::string::npos)?jf:jf.substr(ls+1);
174 std::string tf = td+'/'+jbn; 185 std::string tf = td+'/'+jbn;
175 bool success = false; 186 bool success = false;
176 if(!link(jf.c_str(), tf.c_str())) { 187 if(!link(jf.c_str(), tf.c_str())) {
177 unlink(jf.c_str()); success = true; 188 unlink(jf.c_str()); success = true;
178 }else{ 189 }else{
179 for(int i=1;i<32767;++i) { 190 for(int i=1;i<32767;++i) {
180 tf = (const char*)gnu::autosprintf( "%s/(%05d)%s", 191 tf = (const char*)gnu::autosprintf( "%s/(%05d)%s",
181 td.c_str(), i, jbn.c_str() ); 192 td.c_str(), i, jbn.c_str() );
182 if(!link(jf.c_str(), tf.c_str())) { 193 if(!link(jf.c_str(), tf.c_str())) {
183 unlink(jf.c_str()); success = true; 194 unlink(jf.c_str()); success = true;
184 break; 195 break;
185 } 196 }
186 } 197 }
187 } 198 }
188 std::string cmd = eyekinfig.get_on_upload_photo(); 199 std::string cmd = eyekinfig.get_on_upload_photo();
189 if(success && !cmd.empty()) { 200 if(success && !cmd.empty()) {
190 if(detached_child()) { 201 if(detached_child()) {
191 putenv( gnu::autosprintf("EYEFI_MACADDRESS=%s",macaddress.c_str()) ); 202 putenv( gnu::autosprintf("EYEFI_MACADDRESS=%s",macaddress.c_str()) );
192 putenv( gnu::autosprintf("EYEFI_UPLOADED=%s",tf.c_str()) ); 203 putenv( gnu::autosprintf("EYEFI_UPLOADED=%s",tf.c_str()) );
193 char *argv[] = { (char*)"/bin/sh", (char*)"-c", (char*)cmd.c_str(), 0 }; 204 char *argv[] = { (char*)"/bin/sh", (char*)"-c", (char*)cmd.c_str(), 0 };
194 execv("/bin/sh",argv); 205 execv("/bin/sh",argv);
195 syslog(LOG_ERR,"Failed to execute '%s'",cmd.c_str()); 206 syslog(LOG_ERR,"Failed to execute '%s'",cmd.c_str());
196 _exit(-1); 207 _exit(-1);
197 } 208 }
198 } 209 }
199 210
200 r.success = true; 211 r.success = true;
201 return SOAP_OK; 212 return SOAP_OK;
202} 213}
diff --git a/src/eyetil.cc b/src/eyetil.cc
index fe816a6..7669cb6 100644
--- a/src/eyetil.cc
+++ b/src/eyetil.cc
@@ -1,146 +1,163 @@
1#include <stdlib.h> 1#include <stdlib.h>
2#include <sys/stat.h> 2#include <sys/stat.h>
3#include <syslog.h> 3#include <syslog.h>
4#include <iostream> 4#include <iostream>
5#include <cassert> 5#include <cassert>
6#include <stdexcept> 6#include <stdexcept>
7#include <algorithm> 7#include <algorithm>
8#include <numeric> 8#include <numeric>
9#include <openssl/md5.h> 9#include <openssl/md5.h>
10#include "eyetil.h" 10#include "eyetil.h"
11 11
12#include "config.h"
13#ifdef HAVE_LIBUUID
14# include <uuid/uuid.h>
15#endif
16
12binary_t& binary_t::from_hex(const std::string& h) { 17binary_t& binary_t::from_hex(const std::string& h) {
13 std::string::size_type hs = h.length(); 18 std::string::size_type hs = h.length();
14 if(hs&1) 19 if(hs&1)
15 throw std::runtime_error("odd number of characters in hexadecimal number"); 20 throw std::runtime_error("odd number of characters in hexadecimal number");
16 int rvs = hs>>1; 21 int rvs = hs>>1;
17 resize(rvs); 22 resize(rvs);
18 const unsigned char *hp = (const unsigned char*)h.data(); 23 const unsigned char *hp = (const unsigned char*)h.data();
19 iterator oi=begin(); 24 iterator oi=begin();
20 char t[3] = { 0,0,0 }; 25 char t[3] = { 0,0,0 };
21 for(int i=0;i<rvs;++i) { 26 for(int i=0;i<rvs;++i) {
22 t[0]=*(hp++); t[1]=*(hp++); 27 t[0]=*(hp++); t[1]=*(hp++);
23 *(oi++) = strtol(t,0,16); 28 *(oi++) = strtol(t,0,16);
24 } 29 }
25 return *this; 30 return *this;
26} 31}
27 32
28binary_t& binary_t::from_data(const void *d,size_t s) { 33binary_t& binary_t::from_data(const void *d,size_t s) {
29 resize(s); 34 resize(s);
30 std::copy((const unsigned char*)d,(const unsigned char *)d+s, 35 std::copy((const unsigned char*)d,(const unsigned char *)d+s,
31 begin() ); 36 begin() );
32 return *this; 37 return *this;
33} 38}
34 39
40binary_t& binary_t::make_nonce() {
41#ifdef HAVE_LIBUUID
42 uuid_t uuid;
43 uuid_generate(uuid);
44 from_data((unsigned char*)uuid,sizeof(uuid));
45#else
46 resize(16);
47 std::generate_n(begin(),16,rand);
48#endif /* HAVE_LIBUUID */
49 return *this;
50}
51
35std::string binary_t::hex() const { 52std::string binary_t::hex() const {
36 std::string rv; 53 std::string rv;
37 rv.reserve((size()<<1)+1); 54 rv.reserve((size()<<1)+1);
38 char t[3] = {0,0,0}; 55 char t[3] = {0,0,0};
39 for(const_iterator i=begin(),ie=end();i!=ie;++i) { 56 for(const_iterator i=begin(),ie=end();i!=ie;++i) {
40 int rc = snprintf(t,sizeof(t),"%02x",*i); 57 int rc = snprintf(t,sizeof(t),"%02x",*i);
41 assert(rc<sizeof(t)); 58 assert(rc<sizeof(t));
42 rv += t; 59 rv += t;
43 } 60 }
44 return rv; 61 return rv;
45} 62}
46 63
47binary_t binary_t::md5() const { 64binary_t binary_t::md5() const {
48 binary_t rv(MD5_DIGEST_LENGTH); 65 binary_t rv(MD5_DIGEST_LENGTH);
49 if(!MD5( 66 if(!MD5(
50 (const unsigned char*)&(front()),size(), 67 (const unsigned char*)&(front()),size(),
51 (unsigned char*)&(rv.front()) )) 68 (unsigned char*)&(rv.front()) ))
52 throw std::runtime_error("failed to md5()"); 69 throw std::runtime_error("failed to md5()");
53 return rv; 70 return rv;
54} 71}
55 72
56static void make_path_for_template(const std::string& p,mode_t m) { 73static void make_path_for_template(const std::string& p,mode_t m) {
57 struct stat st; 74 struct stat st;
58 std::string pp; 75 std::string pp;
59 for(std::string::size_type sl=p.find('/',1); 76 for(std::string::size_type sl=p.find('/',1);
60 sl!=std::string::npos; 77 sl!=std::string::npos;
61 sl=p.find('/',sl+1)) { 78 sl=p.find('/',sl+1)) {
62 if(stat( (pp=p.substr(0,sl)).c_str() ,&st) 79 if(stat( (pp=p.substr(0,sl)).c_str() ,&st)
63 || !S_ISDIR(st.st_mode)) { 80 || !S_ISDIR(st.st_mode)) {
64 if(mkdir(pp.c_str(),m)) 81 if(mkdir(pp.c_str(),m))
65 throw std::runtime_error("failed to mkdir()"); 82 throw std::runtime_error("failed to mkdir()");
66 } 83 }
67 } 84 }
68} 85}
69 86
70tmpdir_t::tmpdir_t(const std::string& dt) : dir(dt) { 87tmpdir_t::tmpdir_t(const std::string& dt) : dir(dt) {
71 make_path_for_template(dt,0777); 88 make_path_for_template(dt,0777);
72 if(!mkdtemp((char*)dir.data())) 89 if(!mkdtemp((char*)dir.data()))
73 throw std::runtime_error("failed to mkdtmp()"); 90 throw std::runtime_error("failed to mkdtmp()");
74} 91}
75tmpdir_t::~tmpdir_t() { 92tmpdir_t::~tmpdir_t() {
76 assert(!dir.empty()); 93 assert(!dir.empty());
77 if(rmdir(dir.c_str())) { 94 if(rmdir(dir.c_str())) {
78 syslog(LOG_WARNING,"Failed to remove '%s' directory",dir.c_str()); 95 syslog(LOG_WARNING,"Failed to remove '%s' directory",dir.c_str());
79 } 96 }
80} 97}
81 98
82std::string tmpdir_t::get_file(const std::string& f) { 99std::string tmpdir_t::get_file(const std::string& f) {
83 std::string::size_type ls = f.rfind('/'); 100 std::string::size_type ls = f.rfind('/');
84 return dir+'/'+( 101 return dir+'/'+(
85 (ls==std::string::npos) 102 (ls==std::string::npos)
86 ? f 103 ? f
87 : f.substr(ls+1) 104 : f.substr(ls+1)
88 ); 105 );
89} 106}
90 107
91tarchive_t::tarchive_t(void *p,size_t s) : a(archive_read_new()), e(0) { 108tarchive_t::tarchive_t(void *p,size_t s) : a(archive_read_new()), e(0) {
92 if(!a) throw std::runtime_error("failed to archive_read_new()"); 109 if(!a) throw std::runtime_error("failed to archive_read_new()");
93 if(archive_read_support_format_tar(a)) { 110 if(archive_read_support_format_tar(a)) {
94 archive_read_finish(a); 111 archive_read_finish(a);
95 throw std::runtime_error("failed to archive_read_support_format_tar()"); 112 throw std::runtime_error("failed to archive_read_support_format_tar()");
96 } 113 }
97 if(archive_read_open_memory(a,p,s)) { 114 if(archive_read_open_memory(a,p,s)) {
98 archive_read_finish(a); 115 archive_read_finish(a);
99 throw std::runtime_error("failed to archive_read_open_memory()"); 116 throw std::runtime_error("failed to archive_read_open_memory()");
100 } 117 }
101} 118}
102tarchive_t::~tarchive_t() { 119tarchive_t::~tarchive_t() {
103 assert(a); 120 assert(a);
104 archive_read_finish(a); 121 archive_read_finish(a);
105} 122}
106 123
107bool tarchive_t::read_next_header() { 124bool tarchive_t::read_next_header() {
108 assert(a); 125 assert(a);
109 return archive_read_next_header(a,&e)==ARCHIVE_OK; 126 return archive_read_next_header(a,&e)==ARCHIVE_OK;
110} 127}
111 128
112std::string tarchive_t::entry_pathname() { 129std::string tarchive_t::entry_pathname() {
113 assert(a); assert(e); 130 assert(a); assert(e);
114 return archive_entry_pathname(e); 131 return archive_entry_pathname(e);
115} 132}
116 133
117bool tarchive_t::read_data_into_fd(int fd) { 134bool tarchive_t::read_data_into_fd(int fd) {
118 assert(a); 135 assert(a);
119 return archive_read_data_into_fd(a,fd)==ARCHIVE_OK; 136 return archive_read_data_into_fd(a,fd)==ARCHIVE_OK;
120} 137}
121 138
122#pragma pack(1) 139#pragma pack(1)
123struct block512_t { 140struct block512_t {
124 enum { words = 512 / sizeof(uint16_t) }; 141 enum { words = 512 / sizeof(uint16_t) };
125 uint16_t data[words]; 142 uint16_t data[words];
126 143
127 static uint16_t tcpcksum(block512_t& data) { 144 static uint16_t tcpcksum(block512_t& data) {
128 uint32_t sum = std::accumulate(data.data,data.data+words,0); 145 uint32_t sum = std::accumulate(data.data,data.data+words,0);
129 while(uint32_t hw = sum>>16) sum = (sum&0xffff)+hw; 146 while(uint32_t hw = sum>>16) sum = (sum&0xffff)+hw;
130 return ~sum; 147 return ~sum;
131 } 148 }
132 149
133}; 150};
134#pragma pack() 151#pragma pack()
135 152
136binary_t integrity_digest(const void *ptr,size_t size,const std::string& ukey) { 153binary_t integrity_digest(const void *ptr,size_t size,const std::string& ukey) {
137 binary_t key; key.from_hex(ukey); 154 binary_t key; key.from_hex(ukey);
138 std::vector<uint16_t> blksums; blksums.reserve(size/sizeof(block512_t)); 155 std::vector<uint16_t> blksums; blksums.reserve(size/sizeof(block512_t));
139 block512_t *db = (block512_t*)ptr, 156 block512_t *db = (block512_t*)ptr,
140 *de = db + size/sizeof(block512_t); 157 *de = db + size/sizeof(block512_t);
141 std::transform( db, de, std::back_inserter(blksums), block512_t::tcpcksum ); 158 std::transform( db, de, std::back_inserter(blksums), block512_t::tcpcksum );
142 binary_t subject; 159 binary_t subject;
143 subject.from_data((void*)&(blksums.front()),blksums.size()*sizeof(uint16_t)); 160 subject.from_data((void*)&(blksums.front()),blksums.size()*sizeof(uint16_t));
144 std::copy( key.begin(), key.end(), std::back_inserter(subject) ); 161 std::copy( key.begin(), key.end(), std::back_inserter(subject) );
145 return subject.md5(); 162 return subject.md5();
146} 163}
diff --git a/src/eyetil.h b/src/eyetil.h
index 378f703..d946e71 100644
--- a/src/eyetil.h
+++ b/src/eyetil.h
@@ -1,51 +1,52 @@
1#ifndef __EYETIL_H 1#ifndef __EYETIL_H
2#define __EYETIL_H 2#define __EYETIL_H
3 3
4#include <vector> 4#include <vector>
5#include <string> 5#include <string>
6#include <archive.h> 6#include <archive.h>
7#include <archive_entry.h> 7#include <archive_entry.h>
8 8
9class binary_t : public std::vector<unsigned char> { 9class binary_t : public std::vector<unsigned char> {
10 public: 10 public:
11 binary_t() { } 11 binary_t() { }
12 binary_t(size_type n) : std::vector<unsigned char>(n) { } 12 binary_t(size_type n) : std::vector<unsigned char>(n) { }
13 binary_t(const std::string& h) { from_hex(h); } 13 binary_t(const std::string& h) { from_hex(h); }
14 binary_t(const void *d,size_t s) { from_data(d,s); } 14 binary_t(const void *d,size_t s) { from_data(d,s); }
15 15
16 binary_t& from_hex(const std::string& h); 16 binary_t& from_hex(const std::string& h);
17 binary_t& from_data(const void *d,size_t s); 17 binary_t& from_data(const void *d,size_t s);
18 binary_t& make_nonce();
18 19
19 std::string hex() const; 20 std::string hex() const;
20 binary_t md5() const; 21 binary_t md5() const;
21}; 22};
22 23
23class tmpdir_t { 24class tmpdir_t {
24 public: 25 public:
25 std::string dir; 26 std::string dir;
26 27
27 tmpdir_t(const std::string& dt); 28 tmpdir_t(const std::string& dt);
28 ~tmpdir_t(); 29 ~tmpdir_t();
29 30
30 std::string get_file(const std::string& f); 31 std::string get_file(const std::string& f);
31}; 32};
32 33
33class tarchive_t { 34class tarchive_t {
34 public: 35 public:
35 struct archive *a; 36 struct archive *a;
36 struct archive_entry *e; 37 struct archive_entry *e;
37 38
38 tarchive_t(void *p,size_t s); 39 tarchive_t(void *p,size_t s);
39 ~tarchive_t(); 40 ~tarchive_t();
40 41
41 bool read_next_header(); 42 bool read_next_header();
42 43
43 std::string entry_pathname(); 44 std::string entry_pathname();
44 45
45 bool read_data_into_fd(int fd); 46 bool read_data_into_fd(int fd);
46}; 47};
47 48
48binary_t integrity_digest(const void *ptr,size_t size, 49binary_t integrity_digest(const void *ptr,size_t size,
49 const std::string& ukey); 50 const std::string& ukey);
50 51
51#endif /* __EYETIL_H */ 52#endif /* __EYETIL_H */