[FL-2645, FL-2810] SubGhz: handle missing key in cryptostore. Lib: lower default display contrast. (#1717)
* SubGhz: skip file loading on key load fail * Lib: update default display contrast * Format sources Co-authored-by: hedger <hedger@users.noreply.github.com>
This commit is contained in:
parent
ff33bc6aea
commit
b62096fb91
@ -114,62 +114,69 @@ static bool subghz_keystore_read_file(SubGhzKeystore* instance, Stream* stream,
|
|||||||
char* encrypted_line = malloc(SUBGHZ_KEYSTORE_FILE_ENCRYPTED_LINE_SIZE);
|
char* encrypted_line = malloc(SUBGHZ_KEYSTORE_FILE_ENCRYPTED_LINE_SIZE);
|
||||||
size_t encrypted_line_cursor = 0;
|
size_t encrypted_line_cursor = 0;
|
||||||
|
|
||||||
if(iv) furi_hal_crypto_store_load_key(SUBGHZ_KEYSTORE_FILE_ENCRYPTION_KEY_SLOT, iv);
|
|
||||||
|
|
||||||
size_t ret = 0;
|
|
||||||
do {
|
do {
|
||||||
ret = stream_read(stream, buffer, FILE_BUFFER_SIZE);
|
if(iv) {
|
||||||
for(uint16_t i = 0; i < ret; i++) {
|
if(!furi_hal_crypto_store_load_key(SUBGHZ_KEYSTORE_FILE_ENCRYPTION_KEY_SLOT, iv)) {
|
||||||
if(buffer[i] == '\n' && encrypted_line_cursor > 0) {
|
FURI_LOG_E(TAG, "Unable to load decryption key");
|
||||||
// Process line
|
break;
|
||||||
if(iv) {
|
|
||||||
// Data alignment check, 32 instead of 16 because of hex encoding
|
|
||||||
size_t len = strlen(encrypted_line);
|
|
||||||
if(len % 32 == 0) {
|
|
||||||
// Inplace hex to bin conversion
|
|
||||||
for(size_t i = 0; i < len; i += 2) {
|
|
||||||
uint8_t hi_nibble = 0;
|
|
||||||
uint8_t lo_nibble = 0;
|
|
||||||
hex_char_to_hex_nibble(encrypted_line[i], &hi_nibble);
|
|
||||||
hex_char_to_hex_nibble(encrypted_line[i + 1], &lo_nibble);
|
|
||||||
encrypted_line[i / 2] = (hi_nibble << 4) | lo_nibble;
|
|
||||||
}
|
|
||||||
len /= 2;
|
|
||||||
|
|
||||||
if(furi_hal_crypto_decrypt(
|
|
||||||
(uint8_t*)encrypted_line, (uint8_t*)decrypted_line, len)) {
|
|
||||||
subghz_keystore_process_line(instance, decrypted_line);
|
|
||||||
} else {
|
|
||||||
FURI_LOG_E(TAG, "Decryption failed");
|
|
||||||
result = false;
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
FURI_LOG_E(TAG, "Invalid encrypted data: %s", encrypted_line);
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
subghz_keystore_process_line(instance, encrypted_line);
|
|
||||||
}
|
|
||||||
// reset line buffer
|
|
||||||
memset(decrypted_line, 0, SUBGHZ_KEYSTORE_FILE_DECRYPTED_LINE_SIZE);
|
|
||||||
memset(encrypted_line, 0, SUBGHZ_KEYSTORE_FILE_ENCRYPTED_LINE_SIZE);
|
|
||||||
encrypted_line_cursor = 0;
|
|
||||||
} else if(buffer[i] == '\r' || buffer[i] == '\n') {
|
|
||||||
// do not add line endings to the buffer
|
|
||||||
} else {
|
|
||||||
if(encrypted_line_cursor < SUBGHZ_KEYSTORE_FILE_ENCRYPTED_LINE_SIZE) {
|
|
||||||
encrypted_line[encrypted_line_cursor] = buffer[i];
|
|
||||||
encrypted_line_cursor++;
|
|
||||||
} else {
|
|
||||||
FURI_LOG_E(TAG, "Malformed file");
|
|
||||||
result = false;
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
} while(ret > 0 && result);
|
|
||||||
|
|
||||||
if(iv) furi_hal_crypto_store_unload_key(SUBGHZ_KEYSTORE_FILE_ENCRYPTION_KEY_SLOT);
|
size_t ret = 0;
|
||||||
|
do {
|
||||||
|
ret = stream_read(stream, buffer, FILE_BUFFER_SIZE);
|
||||||
|
for(uint16_t i = 0; i < ret; i++) {
|
||||||
|
if(buffer[i] == '\n' && encrypted_line_cursor > 0) {
|
||||||
|
// Process line
|
||||||
|
if(iv) {
|
||||||
|
// Data alignment check, 32 instead of 16 because of hex encoding
|
||||||
|
size_t len = strlen(encrypted_line);
|
||||||
|
if(len % 32 == 0) {
|
||||||
|
// Inplace hex to bin conversion
|
||||||
|
for(size_t i = 0; i < len; i += 2) {
|
||||||
|
uint8_t hi_nibble = 0;
|
||||||
|
uint8_t lo_nibble = 0;
|
||||||
|
hex_char_to_hex_nibble(encrypted_line[i], &hi_nibble);
|
||||||
|
hex_char_to_hex_nibble(encrypted_line[i + 1], &lo_nibble);
|
||||||
|
encrypted_line[i / 2] = (hi_nibble << 4) | lo_nibble;
|
||||||
|
}
|
||||||
|
len /= 2;
|
||||||
|
|
||||||
|
if(furi_hal_crypto_decrypt(
|
||||||
|
(uint8_t*)encrypted_line, (uint8_t*)decrypted_line, len)) {
|
||||||
|
subghz_keystore_process_line(instance, decrypted_line);
|
||||||
|
} else {
|
||||||
|
FURI_LOG_E(TAG, "Decryption failed");
|
||||||
|
result = false;
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
FURI_LOG_E(TAG, "Invalid encrypted data: %s", encrypted_line);
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
subghz_keystore_process_line(instance, encrypted_line);
|
||||||
|
}
|
||||||
|
// reset line buffer
|
||||||
|
memset(decrypted_line, 0, SUBGHZ_KEYSTORE_FILE_DECRYPTED_LINE_SIZE);
|
||||||
|
memset(encrypted_line, 0, SUBGHZ_KEYSTORE_FILE_ENCRYPTED_LINE_SIZE);
|
||||||
|
encrypted_line_cursor = 0;
|
||||||
|
} else if(buffer[i] == '\r' || buffer[i] == '\n') {
|
||||||
|
// do not add line endings to the buffer
|
||||||
|
} else {
|
||||||
|
if(encrypted_line_cursor < SUBGHZ_KEYSTORE_FILE_ENCRYPTED_LINE_SIZE) {
|
||||||
|
encrypted_line[encrypted_line_cursor] = buffer[i];
|
||||||
|
encrypted_line_cursor++;
|
||||||
|
} else {
|
||||||
|
FURI_LOG_E(TAG, "Malformed file");
|
||||||
|
result = false;
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
} while(ret > 0 && result);
|
||||||
|
|
||||||
|
if(iv) furi_hal_crypto_store_unload_key(SUBGHZ_KEYSTORE_FILE_ENCRYPTION_KEY_SLOT);
|
||||||
|
} while(false);
|
||||||
|
|
||||||
free(encrypted_line);
|
free(encrypted_line);
|
||||||
free(decrypted_line);
|
free(decrypted_line);
|
||||||
|
@ -225,7 +225,7 @@ uint8_t u8x8_d_st756x_flipper(u8x8_t* u8x8, uint8_t msg, uint8_t arg_int, void*
|
|||||||
* RR = 10 / ((1 - (63 - 32) / 162) * 2.1) ~= 5.88 is 6 (0b110)
|
* RR = 10 / ((1 - (63 - 32) / 162) * 2.1) ~= 5.88 is 6 (0b110)
|
||||||
* Bias = 1/9 (false)
|
* Bias = 1/9 (false)
|
||||||
*/
|
*/
|
||||||
u8x8_d_st756x_init(u8x8, 32, 0b110, false);
|
u8x8_d_st756x_init(u8x8, 31, 0b110, false);
|
||||||
} else {
|
} else {
|
||||||
/* ERC v1(ST7565) and v2(ST7567)
|
/* ERC v1(ST7565) and v2(ST7567)
|
||||||
* EV = 33
|
* EV = 33
|
||||||
@ -233,7 +233,7 @@ uint8_t u8x8_d_st756x_flipper(u8x8_t* u8x8, uint8_t msg, uint8_t arg_int, void*
|
|||||||
* RR = 9.3 / ((1 - (63 - 32) / 162) * 2.1) ~= 5.47 is 5.5 (0b101)
|
* RR = 9.3 / ((1 - (63 - 32) / 162) * 2.1) ~= 5.47 is 5.5 (0b101)
|
||||||
* Bias = 1/9 (false)
|
* Bias = 1/9 (false)
|
||||||
*/
|
*/
|
||||||
u8x8_d_st756x_init(u8x8, 33, 0b101, false);
|
u8x8_d_st756x_init(u8x8, 32, 0b101, false);
|
||||||
}
|
}
|
||||||
break;
|
break;
|
||||||
case U8X8_MSG_DISPLAY_SET_FLIP_MODE:
|
case U8X8_MSG_DISPLAY_SET_FLIP_MODE:
|
||||||
|
Loading…
Reference in New Issue
Block a user