mirror of
https://github.com/ByteWelder/Tactility.git
synced 2026-02-19 03:13:14 +00:00
187 lines
5.3 KiB
C++
187 lines
5.3 KiB
C++
#include "Tactility/service/wifi/WifiApSettings.h"
|
|
|
|
#include <cstring>
|
|
#include <iomanip>
|
|
#include <ranges>
|
|
#include <Tactility/crypt/Crypt.h>
|
|
#include <Tactility/file/File.h>
|
|
#include <Tactility/file/PropertiesFile.h>
|
|
|
|
namespace tt::service::wifi::settings {
|
|
|
|
constexpr auto* TAG = "WifiApSettings";
|
|
|
|
constexpr auto* AP_SETTINGS_FORMAT = "/data/service/Wifi/{}.ap.properties";
|
|
|
|
constexpr auto* AP_PROPERTIES_KEY_SSID = "ssid";
|
|
constexpr auto* AP_PROPERTIES_KEY_PASSWORD = "password";
|
|
constexpr auto* AP_PROPERTIES_KEY_AUTO_CONNECT = "autoConnect";
|
|
constexpr auto* AP_PROPERTIES_KEY_CHANNEL = "channel";
|
|
|
|
|
|
std::string toHexString(const uint8_t *data, int length) {
|
|
std::stringstream stream;
|
|
stream << std::hex;
|
|
for( int i(0) ; i < length; ++i )
|
|
stream << std::setw(2) << std::setfill('0') << static_cast<int>(data[i]);
|
|
return stream.str();
|
|
}
|
|
|
|
bool readHex(const std::string& input, uint8_t* buffer, int length) {
|
|
if (input.size() / 2 != length) {
|
|
TT_LOG_E(TAG, "readHex() length mismatch");
|
|
return false;
|
|
}
|
|
|
|
char hex[3] = { 0 };
|
|
for (int i = 0; i < length; i++) {
|
|
hex[0] = input[i * 2];
|
|
hex[1] = input[i * 2 + 1];
|
|
char* endptr;
|
|
buffer[i] = static_cast<uint8_t>(strtoul(hex, &endptr, 16));
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
static std::string getApPropertiesFilePath(const std::string& ssid) {
|
|
return std::format(AP_SETTINGS_FORMAT, ssid);
|
|
}
|
|
|
|
static bool encrypt(const std::string& ssidInput, std::string& ssidOutput) {
|
|
uint8_t iv[16];
|
|
const auto length = ssidInput.size();
|
|
constexpr size_t chunk_size = 16;
|
|
const auto encrypted_length = ((length / chunk_size) + (length % chunk_size ? 1 : 0)) * chunk_size;
|
|
|
|
auto* buffer = static_cast<uint8_t*>(malloc(encrypted_length));
|
|
|
|
crypt::getIv(ssidInput.c_str(), ssidInput.size(), iv);
|
|
if (crypt::encrypt(iv, reinterpret_cast<const uint8_t*>(ssidInput.c_str()), buffer, encrypted_length) != 0) {
|
|
TT_LOG_E(TAG, "Failed to encrypt");
|
|
free(buffer);
|
|
return false;
|
|
}
|
|
|
|
ssidOutput = toHexString(buffer, encrypted_length);
|
|
free(buffer);
|
|
|
|
return true;
|
|
}
|
|
|
|
static bool decrypt(const std::string& ssidInput, std::string& ssidOutput) {
|
|
assert(!ssidInput.empty());
|
|
assert(ssidInput.size() % 2 == 0);
|
|
auto* data = static_cast<uint8_t*>(malloc(ssidInput.size() / 2));
|
|
if (!readHex(ssidInput, data, ssidInput.size() / 2)) {
|
|
TT_LOG_E(TAG, "Failed to read hex");
|
|
return false;
|
|
}
|
|
|
|
uint8_t iv[16];
|
|
crypt::getIv(ssidInput.c_str(), ssidInput.size(), iv);
|
|
|
|
auto result_length = ssidInput.size() / 2;
|
|
// Allocate correct length plus space for string null terminator
|
|
auto* result = static_cast<uint8_t*>(malloc(result_length + 1));
|
|
result[result_length] = 0;
|
|
|
|
int decrypt_result = crypt::decrypt(
|
|
iv,
|
|
data,
|
|
result,
|
|
ssidInput.size() / 2
|
|
);
|
|
|
|
free(data);
|
|
|
|
if (decrypt_result != 0) {
|
|
TT_LOG_E(TAG, "Failed to decrypt credentials for \"%s\": %d", ssidInput.c_str(), decrypt_result);
|
|
free(result);
|
|
return false;
|
|
}
|
|
|
|
ssidOutput = reinterpret_cast<char*>(result);
|
|
free(result);
|
|
return true;
|
|
}
|
|
|
|
bool contains(const std::string& ssid) {
|
|
const auto file_path = getApPropertiesFilePath(ssid);
|
|
return file::isFile(file_path);
|
|
}
|
|
|
|
bool load(const std::string& ssid, WifiApSettings& apSettings) {
|
|
const auto file_path = getApPropertiesFilePath(ssid);
|
|
std::map<std::string, std::string> map;
|
|
if (!file::loadPropertiesFile(file_path, map)) {
|
|
return false;
|
|
}
|
|
|
|
// SSID is required
|
|
if (!map.contains(AP_PROPERTIES_KEY_SSID)) {
|
|
return false;
|
|
}
|
|
|
|
apSettings.ssid = map[AP_PROPERTIES_KEY_SSID];
|
|
assert(ssid == apSettings.ssid);
|
|
|
|
if (map.contains(AP_PROPERTIES_KEY_PASSWORD)) {
|
|
std::string password_decrypted;
|
|
if (decrypt(map[AP_PROPERTIES_KEY_PASSWORD], password_decrypted)) {
|
|
apSettings.password = password_decrypted;
|
|
} else {
|
|
return false;
|
|
}
|
|
} else {
|
|
apSettings.password = "";
|
|
}
|
|
|
|
if (map.contains(AP_PROPERTIES_KEY_AUTO_CONNECT)) {
|
|
apSettings.autoConnect = (map[AP_PROPERTIES_KEY_AUTO_CONNECT] == "true");
|
|
} else {
|
|
apSettings.autoConnect = true;
|
|
}
|
|
|
|
if (map.contains(AP_PROPERTIES_KEY_CHANNEL)) {
|
|
apSettings.channel = std::stoi(map[AP_PROPERTIES_KEY_CHANNEL].c_str());
|
|
} else {
|
|
apSettings.channel = 0;
|
|
}
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
bool save(const WifiApSettings& apSettings) {
|
|
if (apSettings.ssid.empty()) {
|
|
return false;
|
|
}
|
|
|
|
const auto file_path = getApPropertiesFilePath(apSettings.ssid);
|
|
|
|
std::map<std::string, std::string> map;
|
|
|
|
std::string password_encrypted;
|
|
if (!encrypt(apSettings.password, password_encrypted)) {
|
|
return false;
|
|
}
|
|
|
|
map[AP_PROPERTIES_KEY_PASSWORD] = password_encrypted;
|
|
map[AP_PROPERTIES_KEY_SSID] = apSettings.ssid;
|
|
map[AP_PROPERTIES_KEY_AUTO_CONNECT] = apSettings.autoConnect ? "true" : "false";
|
|
map[AP_PROPERTIES_KEY_CHANNEL] = std::to_string(apSettings.channel);
|
|
|
|
return file::savePropertiesFile(file_path, map);
|
|
}
|
|
|
|
bool remove(const std::string& ssid) {
|
|
const auto path = getApPropertiesFilePath(ssid);
|
|
if (!file::isFile(path)) {
|
|
return false;
|
|
}
|
|
return ::remove(path.c_str()) == 0;
|
|
}
|
|
|
|
}
|