#include "identitymanager.h" #include "utils.h" #include #include #include #include #include #include #define SER_UNIQUEID "uniqueid" #define SER_CERT "certificate" #define SER_KEY "key" IdentityManager* IdentityManager::s_Im = nullptr; IdentityManager* IdentityManager::get() { // This will always be called first on the main thread, // so it's safe to initialize without locks. if (s_Im == nullptr) { s_Im = new IdentityManager(); } return s_Im; } void IdentityManager::createCredentials(QSettings& settings) { X509* cert = X509_new(); THROW_BAD_ALLOC_IF_NULL(cert); EVP_PKEY* pk = EVP_PKEY_new(); THROW_BAD_ALLOC_IF_NULL(pk); BIGNUM* bne = BN_new(); THROW_BAD_ALLOC_IF_NULL(bne); RSA* rsa = RSA_new(); THROW_BAD_ALLOC_IF_NULL(rsa); BN_set_word(bne, RSA_F4); RSA_generate_key_ex(rsa, 2048, bne, nullptr); EVP_PKEY_assign_RSA(pk, rsa); X509_set_version(cert, 2); ASN1_INTEGER_set(X509_get_serialNumber(cert), 0); #if OPENSSL_VERSION_NUMBER < 0x10100000L X509_gmtime_adj(X509_get_notBefore(cert), 0); X509_gmtime_adj(X509_get_notAfter(cert), 60 * 60 * 24 * 365 * 20); // 20 yrs #else ASN1_TIME* before = ASN1_STRING_dup(X509_get0_notBefore(cert)); THROW_BAD_ALLOC_IF_NULL(before); ASN1_TIME* after = ASN1_STRING_dup(X509_get0_notAfter(cert)); THROW_BAD_ALLOC_IF_NULL(after); X509_gmtime_adj(before, 0); X509_gmtime_adj(after, 60 * 60 * 24 * 365 * 20); // 20 yrs X509_set1_notBefore(cert, before); X509_set1_notAfter(cert, after); ASN1_STRING_free(before); ASN1_STRING_free(after); #endif X509_set_pubkey(cert, pk); X509_NAME* name = X509_get_subject_name(cert); X509_NAME_add_entry_by_txt(name, "CN", MBSTRING_ASC, reinterpret_cast(const_cast("NVIDIA GameStream Client")), -1, -1, 0); X509_set_issuer_name(cert, name); X509_sign(cert, pk, EVP_sha1()); BIO* biokey = BIO_new(BIO_s_mem()); THROW_BAD_ALLOC_IF_NULL(biokey); PEM_write_bio_PrivateKey(biokey, pk, NULL, NULL, 0, NULL, NULL); BIO* biocert = BIO_new(BIO_s_mem()); THROW_BAD_ALLOC_IF_NULL(biocert); PEM_write_bio_X509(biocert, cert); BUF_MEM* mem; BIO_get_mem_ptr(biokey, &mem); m_CachedPrivateKey = QByteArray(mem->data, (int)mem->length); BIO_get_mem_ptr(biocert, &mem); m_CachedPemCert = QByteArray(mem->data, (int)mem->length); X509_free(cert); EVP_PKEY_free(pk); BN_free(bne); BIO_free(biokey); BIO_free(biocert); settings.setValue(SER_CERT, m_CachedPemCert); settings.setValue(SER_KEY, m_CachedPrivateKey); qDebug() << "Wrote new identity credentials to settings"; } IdentityManager::IdentityManager() { QSettings settings; m_CachedPemCert = settings.value(SER_CERT).toByteArray(); m_CachedPrivateKey = settings.value(SER_KEY).toByteArray(); if (m_CachedPemCert.isEmpty() || m_CachedPrivateKey.isEmpty()) { qDebug() << "No existing credentials found"; createCredentials(settings); } else if (getSslCertificate().isNull()) { qWarning() << "Certificate is unreadable"; createCredentials(settings); } else if (getSslKey().isNull()) { qWarning() << "Private key is unreadable"; createCredentials(settings); } // We should have valid credentials now. If not, we're screwed if (getSslCertificate().isNull()) { qFatal("Newly generated certificate is unreadable"); } if (getSslKey().isNull()) { qFatal("Newly generated private key is unreadable"); } } QSslCertificate IdentityManager::getSslCertificate() { if (m_CachedSslCert.isNull()) { m_CachedSslCert = QSslCertificate(m_CachedPemCert); } return m_CachedSslCert; } QSslKey IdentityManager::getSslKey() { if (m_CachedSslKey.isNull()) { BIO* bio = BIO_new_mem_buf(m_CachedPrivateKey.data(), -1); THROW_BAD_ALLOC_IF_NULL(bio); EVP_PKEY* pk = PEM_read_bio_PrivateKey(bio, nullptr, nullptr, nullptr); BIO_free(bio); bio = BIO_new(BIO_s_mem()); THROW_BAD_ALLOC_IF_NULL(bio); // We must write out our PEM in the old PKCS1 format for SecureTransport // on macOS/iOS to be able to read it. BUF_MEM* mem; BIO_get_mem_ptr(bio, &mem); PEM_write_bio_PrivateKey_traditional(bio, pk, nullptr, nullptr, 0, nullptr, 0); m_CachedSslKey = QSslKey(QByteArray::fromRawData(mem->data, (int)mem->length), QSsl::Rsa); BIO_free(bio); EVP_PKEY_free(pk); } return m_CachedSslKey; } QSslConfiguration IdentityManager::getSslConfig() { QSslConfiguration sslConfig(QSslConfiguration::defaultConfiguration()); sslConfig.setLocalCertificate(getSslCertificate()); sslConfig.setPrivateKey(getSslKey()); return sslConfig; } QString IdentityManager::getUniqueId() { if (m_CachedUniqueId.isNull()) { QSettings settings; // Load the unique ID from settings m_CachedUniqueId = settings.value(SER_UNIQUEID).toString(); if (!m_CachedUniqueId.isEmpty() && !m_CachedUniqueId.isNull()) { qDebug() << "Loaded unique ID from settings: " << m_CachedUniqueId; } else { // Generate a new unique ID in base 16 m_CachedUniqueId = QString::number( QRandomGenerator64::securelySeeded().generate64(), 16); qDebug() << "Generated new unique ID: " << m_CachedUniqueId; settings.setValue(SER_UNIQUEID, m_CachedUniqueId); } } return m_CachedUniqueId; } QByteArray IdentityManager::getCertificate() { return m_CachedPemCert; } QByteArray IdentityManager::getPrivateKey() { return m_CachedPrivateKey; }