2012-04-09 17:53:46 -04:00
|
|
|
/*
|
|
|
|
* Copyright (C) 2012 Felix Geyer <debfx@fobos.de>
|
2017-02-24 19:12:01 -05:00
|
|
|
* Copyright (C) 2017 Lennart Glauer <mail@lennart-glauer.de>
|
2017-06-09 17:40:36 -04:00
|
|
|
* Copyright (C) 2017 KeePassXC Team <team@keepassxc.org>
|
2012-04-09 17:53:46 -04:00
|
|
|
*
|
|
|
|
* This program is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU General Public License as published by
|
|
|
|
* the Free Software Foundation, either version 2 or (at your option)
|
|
|
|
* version 3 of the License.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU General Public License
|
|
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include "Tools.h"
|
|
|
|
|
2015-07-22 18:11:05 -04:00
|
|
|
#include <QCoreApplication>
|
2013-10-03 09:18:16 -04:00
|
|
|
#include <QIODevice>
|
2018-03-31 16:01:30 -04:00
|
|
|
#include <QImageReader>
|
2013-10-03 09:18:16 -04:00
|
|
|
#include <QLocale>
|
|
|
|
#include <QStringList>
|
2018-05-14 15:26:26 -04:00
|
|
|
#include <cctype>
|
2012-04-09 17:53:46 -04:00
|
|
|
|
2013-10-03 09:18:16 -04:00
|
|
|
#include <QElapsedTimer>
|
2012-08-05 13:19:01 -04:00
|
|
|
|
2012-07-12 07:51:50 -04:00
|
|
|
#ifdef Q_OS_WIN
|
2018-03-31 16:01:30 -04:00
|
|
|
#include <aclapi.h> // for SetSecurityInfo()
|
2017-03-02 13:24:31 -05:00
|
|
|
#include <windows.h> // for Sleep(), SetDllDirectoryA(), SetSearchPathMode(), ...
|
2012-07-12 07:51:50 -04:00
|
|
|
#endif
|
|
|
|
|
|
|
|
#ifdef Q_OS_UNIX
|
|
|
|
#include <time.h> // for nanosleep()
|
|
|
|
#endif
|
|
|
|
|
2012-10-21 13:24:17 -04:00
|
|
|
#include "config-keepassx.h"
|
|
|
|
|
2015-05-14 06:58:00 -04:00
|
|
|
#if defined(HAVE_RLIMIT_CORE)
|
|
|
|
#include <sys/resource.h>
|
|
|
|
#endif
|
|
|
|
|
2012-10-13 05:05:50 -04:00
|
|
|
#if defined(HAVE_PR_SET_DUMPABLE)
|
|
|
|
#include <sys/prctl.h>
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#ifdef HAVE_PT_DENY_ATTACH
|
2018-04-05 07:59:42 -04:00
|
|
|
// clang-format off
|
2018-03-31 16:01:30 -04:00
|
|
|
#include <sys/types.h>
|
2018-04-04 22:01:52 -04:00
|
|
|
#include <sys/ptrace.h>
|
2018-04-05 07:59:42 -04:00
|
|
|
// clang-format on
|
2012-10-13 05:05:50 -04:00
|
|
|
#endif
|
|
|
|
|
2018-03-31 16:01:30 -04:00
|
|
|
namespace Tools
|
2012-04-09 17:53:46 -04:00
|
|
|
{
|
|
|
|
|
2018-05-14 15:26:26 -04:00
|
|
|
QString humanReadableFileSize(qint64 bytes, quint32 precision)
|
2018-03-31 16:01:30 -04:00
|
|
|
{
|
2018-05-14 15:26:26 -04:00
|
|
|
constexpr auto kibibyte = 1024;
|
2018-03-31 16:01:30 -04:00
|
|
|
double size = bytes;
|
|
|
|
|
|
|
|
QStringList units = QStringList() << "B"
|
|
|
|
<< "KiB"
|
|
|
|
<< "MiB"
|
|
|
|
<< "GiB";
|
|
|
|
int i = 0;
|
|
|
|
int maxI = units.size() - 1;
|
2012-04-09 17:53:46 -04:00
|
|
|
|
2018-05-14 15:26:26 -04:00
|
|
|
while ((size >= kibibyte) && (i < maxI)) {
|
|
|
|
size /= kibibyte;
|
2018-03-31 16:01:30 -04:00
|
|
|
i++;
|
|
|
|
}
|
|
|
|
|
2018-05-14 15:26:26 -04:00
|
|
|
return QString("%1 %2").arg(QLocale().toString(size, 'f', precision), units.at(i));
|
2012-04-09 17:53:46 -04:00
|
|
|
}
|
|
|
|
|
2018-03-31 16:01:30 -04:00
|
|
|
bool hasChild(const QObject* parent, const QObject* child)
|
|
|
|
{
|
|
|
|
if (!parent || !child) {
|
|
|
|
return false;
|
|
|
|
}
|
2012-04-18 16:08:22 -04:00
|
|
|
|
2018-03-31 16:01:30 -04:00
|
|
|
const QObjectList children = parent->children();
|
|
|
|
for (QObject* c : children) {
|
|
|
|
if (child == c || hasChild(c, child)) {
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
}
|
2012-04-18 18:04:52 -04:00
|
|
|
return false;
|
|
|
|
}
|
2016-09-02 13:51:51 -04:00
|
|
|
|
2018-03-31 16:01:30 -04:00
|
|
|
bool readFromDevice(QIODevice* device, QByteArray& data, int size)
|
|
|
|
{
|
|
|
|
QByteArray buffer;
|
|
|
|
buffer.resize(size);
|
|
|
|
|
|
|
|
qint64 readResult = device->read(buffer.data(), size);
|
|
|
|
if (readResult == -1) {
|
|
|
|
return false;
|
|
|
|
} else {
|
|
|
|
buffer.resize(readResult);
|
|
|
|
data = buffer;
|
2012-04-18 18:04:52 -04:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
}
|
2012-05-10 13:00:36 -04:00
|
|
|
|
2018-03-31 16:01:30 -04:00
|
|
|
bool readAllFromDevice(QIODevice* device, QByteArray& data)
|
|
|
|
{
|
|
|
|
QByteArray result;
|
|
|
|
qint64 readBytes = 0;
|
|
|
|
qint64 readResult;
|
|
|
|
do {
|
|
|
|
result.resize(result.size() + 16384);
|
|
|
|
readResult = device->read(result.data() + readBytes, result.size() - readBytes);
|
|
|
|
if (readResult > 0) {
|
|
|
|
readBytes += readResult;
|
|
|
|
}
|
|
|
|
} while (readResult > 0);
|
2012-05-10 13:00:36 -04:00
|
|
|
|
2018-03-31 16:01:30 -04:00
|
|
|
if (readResult == -1) {
|
|
|
|
return false;
|
|
|
|
} else {
|
|
|
|
result.resize(static_cast<int>(readBytes));
|
|
|
|
data = result;
|
|
|
|
return true;
|
2012-05-02 05:06:24 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-03-31 16:01:30 -04:00
|
|
|
QString imageReaderFilter()
|
|
|
|
{
|
|
|
|
const QList<QByteArray> formats = QImageReader::supportedImageFormats();
|
|
|
|
QStringList formatsStringList;
|
2012-05-10 12:09:42 -04:00
|
|
|
|
2018-03-31 16:01:30 -04:00
|
|
|
for (const QByteArray& format : formats) {
|
|
|
|
for (int i = 0; i < format.size(); i++) {
|
|
|
|
if (!QChar(format.at(i)).isLetterOrNumber()) {
|
|
|
|
continue;
|
|
|
|
}
|
2012-05-10 12:09:42 -04:00
|
|
|
}
|
2018-03-31 16:01:30 -04:00
|
|
|
|
|
|
|
formatsStringList.append("*." + QString::fromLatin1(format).toLower());
|
2012-05-10 12:09:42 -04:00
|
|
|
}
|
|
|
|
|
2018-03-31 16:01:30 -04:00
|
|
|
return formatsStringList.join(" ");
|
2012-05-10 12:09:42 -04:00
|
|
|
}
|
|
|
|
|
2018-03-31 16:01:30 -04:00
|
|
|
bool isHex(const QByteArray& ba)
|
|
|
|
{
|
2018-05-14 15:26:26 -04:00
|
|
|
for (const unsigned char c : ba) {
|
|
|
|
if (!std::isxdigit(c)) {
|
2018-03-31 16:01:30 -04:00
|
|
|
return false;
|
|
|
|
}
|
2012-05-10 12:34:51 -04:00
|
|
|
}
|
2018-03-31 16:01:30 -04:00
|
|
|
|
|
|
|
return true;
|
2012-05-10 12:34:51 -04:00
|
|
|
}
|
|
|
|
|
2018-03-31 16:01:30 -04:00
|
|
|
bool isBase64(const QByteArray& ba)
|
|
|
|
{
|
2018-05-14 15:26:26 -04:00
|
|
|
constexpr auto pattern = R"(^(?:[a-z0-9+]{4})*(?:[a-z0-9+]{3}=|[a-z0-9+]{2}==)?$)";
|
|
|
|
QRegExp regexp(pattern, Qt::CaseInsensitive, QRegExp::RegExp2);
|
2012-05-10 12:34:51 -04:00
|
|
|
|
2018-03-31 16:01:30 -04:00
|
|
|
QString base64 = QString::fromLatin1(ba.constData(), ba.size());
|
2015-11-01 12:30:50 -05:00
|
|
|
|
2018-03-31 16:01:30 -04:00
|
|
|
return regexp.exactMatch(base64);
|
|
|
|
}
|
2015-11-01 12:30:50 -05:00
|
|
|
|
2018-03-31 16:01:30 -04:00
|
|
|
void sleep(int ms)
|
|
|
|
{
|
|
|
|
Q_ASSERT(ms >= 0);
|
2015-11-01 12:30:50 -05:00
|
|
|
|
2018-03-31 16:01:30 -04:00
|
|
|
if (ms == 0) {
|
|
|
|
return;
|
|
|
|
}
|
2012-07-12 07:51:50 -04:00
|
|
|
|
|
|
|
#ifdef Q_OS_WIN
|
2018-03-31 16:01:30 -04:00
|
|
|
Sleep(uint(ms));
|
2012-07-12 07:51:50 -04:00
|
|
|
#else
|
2018-03-31 16:01:30 -04:00
|
|
|
timespec ts;
|
|
|
|
ts.tv_sec = ms / 1000;
|
|
|
|
ts.tv_nsec = (ms % 1000) * 1000 * 1000;
|
|
|
|
nanosleep(&ts, nullptr);
|
2012-07-12 07:51:50 -04:00
|
|
|
#endif
|
2012-11-02 10:33:39 -04:00
|
|
|
}
|
2012-07-12 07:51:50 -04:00
|
|
|
|
2018-03-31 16:01:30 -04:00
|
|
|
void wait(int ms)
|
|
|
|
{
|
|
|
|
Q_ASSERT(ms >= 0);
|
2012-07-12 07:51:50 -04:00
|
|
|
|
2018-03-31 16:01:30 -04:00
|
|
|
if (ms == 0) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
QElapsedTimer timer;
|
|
|
|
timer.start();
|
|
|
|
|
|
|
|
if (ms <= 50) {
|
|
|
|
QCoreApplication::processEvents(QEventLoop::AllEvents, ms);
|
|
|
|
sleep(qMax(ms - static_cast<int>(timer.elapsed()), 0));
|
|
|
|
} else {
|
|
|
|
int timeLeft;
|
|
|
|
do {
|
|
|
|
timeLeft = ms - timer.elapsed();
|
|
|
|
if (timeLeft > 0) {
|
|
|
|
QCoreApplication::processEvents(QEventLoop::AllEvents, timeLeft);
|
|
|
|
sleep(10);
|
|
|
|
}
|
|
|
|
} while (!timer.hasExpired(ms));
|
|
|
|
}
|
2012-07-12 07:51:50 -04:00
|
|
|
}
|
|
|
|
|
2018-03-31 16:01:30 -04:00
|
|
|
void disableCoreDumps()
|
|
|
|
{
|
|
|
|
// default to true
|
|
|
|
// there is no point in printing a warning if this is not implemented on the platform
|
|
|
|
bool success = true;
|
2012-10-13 05:05:50 -04:00
|
|
|
|
2015-05-14 06:58:00 -04:00
|
|
|
#if defined(HAVE_RLIMIT_CORE)
|
2018-03-31 16:01:30 -04:00
|
|
|
struct rlimit limit;
|
|
|
|
limit.rlim_cur = 0;
|
|
|
|
limit.rlim_max = 0;
|
|
|
|
success = success && (setrlimit(RLIMIT_CORE, &limit) == 0);
|
2015-05-14 06:58:00 -04:00
|
|
|
#endif
|
|
|
|
|
|
|
|
#if defined(HAVE_PR_SET_DUMPABLE)
|
2018-03-31 16:01:30 -04:00
|
|
|
success = success && (prctl(PR_SET_DUMPABLE, 0) == 0);
|
2012-10-13 05:05:50 -04:00
|
|
|
#endif
|
|
|
|
|
2018-03-31 16:01:30 -04:00
|
|
|
// Mac OS X
|
2012-10-13 05:05:50 -04:00
|
|
|
#ifdef HAVE_PT_DENY_ATTACH
|
2018-03-31 16:01:30 -04:00
|
|
|
success = success && (ptrace(PT_DENY_ATTACH, 0, 0, 0) == 0);
|
2012-10-13 05:05:50 -04:00
|
|
|
#endif
|
|
|
|
|
2017-02-24 19:12:01 -05:00
|
|
|
#ifdef Q_OS_WIN
|
2018-03-31 16:01:30 -04:00
|
|
|
success = success && createWindowsDACL();
|
2017-02-24 19:12:01 -05:00
|
|
|
#endif
|
|
|
|
|
2018-03-31 16:01:30 -04:00
|
|
|
if (!success) {
|
|
|
|
qWarning("Unable to disable core dumps.");
|
|
|
|
}
|
2012-10-13 05:05:50 -04:00
|
|
|
}
|
|
|
|
|
2018-03-31 16:01:30 -04:00
|
|
|
void setupSearchPaths()
|
|
|
|
{
|
2015-12-06 08:32:06 -05:00
|
|
|
#ifdef Q_OS_WIN
|
2018-03-31 16:01:30 -04:00
|
|
|
// Make sure Windows doesn't load DLLs from the current working directory
|
|
|
|
SetDllDirectoryA("");
|
|
|
|
SetSearchPathMode(BASE_SEARCH_PATH_ENABLE_SAFE_SEARCHMODE);
|
2015-12-06 08:32:06 -05:00
|
|
|
#endif
|
2018-03-31 16:01:30 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
//
|
|
|
|
// This function grants the user associated with the process token minimal access rights and
|
|
|
|
// denies everything else on Windows. This includes PROCESS_QUERY_INFORMATION and
|
|
|
|
// PROCESS_VM_READ access rights that are required for MiniDumpWriteDump() or ReadProcessMemory().
|
|
|
|
// We do this using a discretionary access control list (DACL). Effectively this prevents
|
|
|
|
// crash dumps and disallows other processes from accessing our memory. This works as long
|
|
|
|
// as you do not have admin privileges, since then you are able to grant yourself the
|
|
|
|
// SeDebugPrivilege or SeTakeOwnershipPrivilege and circumvent the DACL.
|
|
|
|
//
|
|
|
|
bool createWindowsDACL()
|
|
|
|
{
|
|
|
|
bool bSuccess = false;
|
2017-02-24 19:12:01 -05:00
|
|
|
|
2017-02-24 19:35:47 -05:00
|
|
|
#ifdef Q_OS_WIN
|
2018-03-31 16:01:30 -04:00
|
|
|
// Process token and user
|
|
|
|
HANDLE hToken = nullptr;
|
|
|
|
PTOKEN_USER pTokenUser = nullptr;
|
|
|
|
DWORD cbBufferSize = 0;
|
|
|
|
|
|
|
|
// Access control list
|
|
|
|
PACL pACL = nullptr;
|
|
|
|
DWORD cbACL = 0;
|
|
|
|
|
|
|
|
// Open the access token associated with the calling process
|
|
|
|
if (!OpenProcessToken(GetCurrentProcess(), TOKEN_QUERY, &hToken)) {
|
|
|
|
goto Cleanup;
|
|
|
|
}
|
2017-02-24 19:12:01 -05:00
|
|
|
|
2018-03-31 16:01:30 -04:00
|
|
|
// Retrieve the token information in a TOKEN_USER structure
|
|
|
|
GetTokenInformation(hToken, TokenUser, nullptr, 0, &cbBufferSize);
|
2017-02-26 16:59:21 -05:00
|
|
|
|
2018-03-31 16:01:30 -04:00
|
|
|
pTokenUser = static_cast<PTOKEN_USER>(HeapAlloc(GetProcessHeap(), 0, cbBufferSize));
|
|
|
|
if (pTokenUser == nullptr) {
|
|
|
|
goto Cleanup;
|
|
|
|
}
|
2017-02-24 19:12:01 -05:00
|
|
|
|
2018-03-31 16:01:30 -04:00
|
|
|
if (!GetTokenInformation(hToken, TokenUser, pTokenUser, cbBufferSize, &cbBufferSize)) {
|
|
|
|
goto Cleanup;
|
|
|
|
}
|
2017-02-26 16:59:21 -05:00
|
|
|
|
2018-03-31 16:01:30 -04:00
|
|
|
if (!IsValidSid(pTokenUser->User.Sid)) {
|
|
|
|
goto Cleanup;
|
|
|
|
}
|
2017-02-24 19:12:01 -05:00
|
|
|
|
2018-03-31 16:01:30 -04:00
|
|
|
// Calculate the amount of memory that must be allocated for the DACL
|
|
|
|
cbACL = sizeof(ACL) + sizeof(ACCESS_ALLOWED_ACE) + GetLengthSid(pTokenUser->User.Sid);
|
2017-02-24 19:12:01 -05:00
|
|
|
|
2018-03-31 16:01:30 -04:00
|
|
|
// Create and initialize an ACL
|
|
|
|
pACL = static_cast<PACL>(HeapAlloc(GetProcessHeap(), 0, cbACL));
|
|
|
|
if (pACL == nullptr) {
|
|
|
|
goto Cleanup;
|
|
|
|
}
|
2017-02-24 19:12:01 -05:00
|
|
|
|
2018-03-31 16:01:30 -04:00
|
|
|
if (!InitializeAcl(pACL, cbACL, ACL_REVISION)) {
|
|
|
|
goto Cleanup;
|
|
|
|
}
|
2017-02-24 19:12:01 -05:00
|
|
|
|
2018-03-31 16:01:30 -04:00
|
|
|
// Add allowed access control entries, everything else is denied
|
|
|
|
if (!AddAccessAllowedAce(
|
|
|
|
pACL,
|
|
|
|
ACL_REVISION,
|
|
|
|
SYNCHRONIZE | PROCESS_QUERY_LIMITED_INFORMATION | PROCESS_TERMINATE, // same as protected process
|
|
|
|
pTokenUser->User.Sid // pointer to the trustee's SID
|
|
|
|
)) {
|
|
|
|
goto Cleanup;
|
|
|
|
}
|
2017-02-24 19:12:01 -05:00
|
|
|
|
2018-03-31 16:01:30 -04:00
|
|
|
// Set discretionary access control list
|
2018-05-14 15:26:26 -04:00
|
|
|
bSuccess = ERROR_SUCCESS
|
|
|
|
== SetSecurityInfo(GetCurrentProcess(), // object handle
|
|
|
|
SE_KERNEL_OBJECT, // type of object
|
|
|
|
DACL_SECURITY_INFORMATION, // change only the objects DACL
|
|
|
|
nullptr,
|
|
|
|
nullptr, // do not change owner or group
|
|
|
|
pACL, // DACL specified
|
|
|
|
nullptr // do not change SACL
|
|
|
|
);
|
2017-02-24 19:12:01 -05:00
|
|
|
|
2018-03-31 16:01:30 -04:00
|
|
|
Cleanup:
|
|
|
|
|
|
|
|
if (pACL != nullptr) {
|
|
|
|
HeapFree(GetProcessHeap(), 0, pACL);
|
|
|
|
}
|
|
|
|
if (pTokenUser != nullptr) {
|
|
|
|
HeapFree(GetProcessHeap(), 0, pTokenUser);
|
|
|
|
}
|
|
|
|
if (hToken != nullptr) {
|
|
|
|
CloseHandle(hToken);
|
|
|
|
}
|
2017-02-24 19:35:47 -05:00
|
|
|
#endif
|
2017-02-24 19:12:01 -05:00
|
|
|
|
2018-03-31 16:01:30 -04:00
|
|
|
return bSuccess;
|
|
|
|
}
|
2017-02-24 19:12:01 -05:00
|
|
|
|
2012-04-18 16:08:22 -04:00
|
|
|
} // namespace Tools
|