mirror of
https://github.com/GoldenCheetah/GoldenCheetah.git
synced 2026-02-13 16:18:42 +00:00
.. when building on Debian there is no package for KQOauth, so as a temporary measure we're pulling it into the repo to support packaging. .. as soon as a KQOauth package is made available we will remove it from our repo
143 lines
4.0 KiB
C++
143 lines
4.0 KiB
C++
/**
|
|
* KQOAuth - An OAuth authentication library for Qt.
|
|
*
|
|
* Author: Johan Paul (johan.paul@gmail.com)
|
|
* http://www.johanpaul.com
|
|
*
|
|
* This library is free software; you can redistribute it and/or
|
|
* modify it under the terms of the GNU Lesser General Public
|
|
* License as published by the Free Software Foundation; either
|
|
* version 2.1 of the License, or (at your option) any later version.
|
|
*
|
|
* KQOAuth is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU Lesser General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU Lesser General Public License
|
|
* along with KQOAuth. If not, see <http://www.gnu.org/licenses/>.
|
|
*/
|
|
#include <QString>
|
|
#include <QCryptographicHash>
|
|
#include <QByteArray>
|
|
|
|
#include <QtDebug>
|
|
#include "kqoauthutils.h"
|
|
|
|
#include <openssl/pem.h>
|
|
#include <openssl/err.h>
|
|
#include <openssl/ssl.h>
|
|
#include <openssl/evp.h>
|
|
|
|
|
|
QString KQOAuthUtils::hmac_sha1(const QString &message, const QString &key)
|
|
{
|
|
QByteArray keyBytes = key.toLatin1();
|
|
int keyLength; // Lenght of key word
|
|
const int blockSize = 64; // Both MD5 and SHA-1 have a block size of 64.
|
|
|
|
keyLength = keyBytes.size();
|
|
// If key is longer than block size, we need to hash the key
|
|
if (keyLength > blockSize) {
|
|
QCryptographicHash hash(QCryptographicHash::Sha1);
|
|
hash.addData(keyBytes);
|
|
keyBytes = hash.result();
|
|
}
|
|
|
|
/* http://tools.ietf.org/html/rfc2104 - (1) */
|
|
// Create the opad and ipad for the hash function.
|
|
QByteArray ipad;
|
|
QByteArray opad;
|
|
|
|
ipad.fill( 0, blockSize);
|
|
opad.fill( 0, blockSize);
|
|
|
|
ipad.replace(0, keyBytes.length(), keyBytes);
|
|
opad.replace(0, keyBytes.length(), keyBytes);
|
|
|
|
/* http://tools.ietf.org/html/rfc2104 - (2) & (5) */
|
|
for (int i=0; i<64; i++) {
|
|
ipad[i] = ipad[i] ^ 0x36;
|
|
opad[i] = opad[i] ^ 0x5c;
|
|
}
|
|
|
|
QByteArray workArray;
|
|
workArray.clear();
|
|
|
|
workArray.append(ipad, 64);
|
|
/* http://tools.ietf.org/html/rfc2104 - (3) */
|
|
workArray.append(message.toLatin1());
|
|
|
|
|
|
/* http://tools.ietf.org/html/rfc2104 - (4) */
|
|
QByteArray sha1 = QCryptographicHash::hash(workArray, QCryptographicHash::Sha1);
|
|
|
|
/* http://tools.ietf.org/html/rfc2104 - (6) */
|
|
workArray.clear();
|
|
workArray.append(opad, 64);
|
|
workArray.append(sha1);
|
|
|
|
sha1.clear();
|
|
|
|
/* http://tools.ietf.org/html/rfc2104 - (7) */
|
|
sha1 = QCryptographicHash::hash(workArray, QCryptographicHash::Sha1);
|
|
return QString(sha1.toBase64());
|
|
}
|
|
|
|
QString KQOAuthUtils::rsa_sha1(const QString &message, const QString &key)
|
|
{
|
|
SSL_load_error_strings();
|
|
OpenSSL_add_all_algorithms();
|
|
OpenSSL_add_all_ciphers();
|
|
OpenSSL_add_all_digests();
|
|
|
|
EVP_PKEY *evpKey = 0;
|
|
evpKey = EVP_PKEY_new();
|
|
|
|
RSA *rsa = 0;
|
|
rsa = getRsaFromKey(key);
|
|
|
|
EVP_PKEY_set1_RSA(evpKey, rsa);
|
|
|
|
EVP_MD_CTX* ctx = 0;
|
|
ctx = EVP_MD_CTX_create();
|
|
EVP_SignInit_ex(ctx, EVP_sha1(), 0);
|
|
QByteArray latinMessage = message.toLatin1();
|
|
EVP_SignUpdate(ctx, latinMessage.data(), strlen(latinMessage.data()));
|
|
|
|
const int MAX_LEN = 1024;
|
|
unsigned char *sig = new unsigned char[MAX_LEN];
|
|
unsigned int sigLen;
|
|
|
|
EVP_SignFinal(ctx, sig, &sigLen, evpKey);
|
|
sig[sigLen] = '\0';
|
|
|
|
EVP_MD_CTX_destroy(ctx);
|
|
RSA_free(rsa);
|
|
EVP_PKEY_free(evpKey);
|
|
ERR_free_strings();
|
|
|
|
QByteArray ret((char *)sig, sigLen);
|
|
|
|
return QString(ret.toBase64());
|
|
}
|
|
|
|
RSA* KQOAuthUtils::getRsaFromKey(const QString &key)
|
|
{
|
|
BIO *bufio;
|
|
QByteArray data = key.toLocal8Bit();
|
|
char *pem_key_buffer = data.data();
|
|
int pem_key_buffer_len = strlen(pem_key_buffer);
|
|
|
|
bufio = BIO_new_mem_buf((void*)pem_key_buffer, pem_key_buffer_len);
|
|
RSA *rsa = 0;
|
|
rsa = RSA_new();
|
|
rsa = PEM_read_bio_RSAPrivateKey(bufio, 0, 0, NULL);
|
|
if (rsa == 0) {
|
|
printf("Can not parse RSA data. Errors:\n");
|
|
ERR_print_errors_fp(stderr);
|
|
exit(1);
|
|
}
|
|
return rsa;
|
|
}
|