secret-locking on symmetric keys

This commit is contained in:
Mirek Kratochvil 2017-09-10 17:29:23 +02:00
parent c0770926e9
commit 578691f45e
12 changed files with 587 additions and 178 deletions

View file

@ -28,7 +28,7 @@ echo "${NAME}_CPPFLAGS = -I\$(srcdir)/$i/ ${COMMON_CPPFLAGS}" >>$OUT
echo "${NAME}_CFLAGS = ${COMMON_CFLAGS}" >>$OUT echo "${NAME}_CFLAGS = ${COMMON_CFLAGS}" >>$OUT
echo "${NAME}_CXXFLAGS = ${COMMON_CXXFLAGS}" >>$OUT echo "${NAME}_CXXFLAGS = ${COMMON_CXXFLAGS}" >>$OUT
echo "${NAME}_LDFLAGS = ${COMMON_LDFLAGS} \$(CRYPTOPP_CFLAGS) " >>$OUT echo "${NAME}_LDFLAGS = ${COMMON_LDFLAGS} \$(CRYPTOPP_CFLAGS) " >>$OUT
echo "${NAME}_LDADD = -lgmp -lfftw3 -lm \$(CRYPTOPP_LIBS) ${COMMON_LDADD} " >>$OUT echo "${NAME}_LDADD = -lgmp -lfftw3 -lm \$(CRYPTOPP_LIBS) ${COMMON_LDADD} \$(EXTRA_LIBS) " >>$OUT
if [[ "$OSTYPE" == "darwin"* ]]; then if [[ "$OSTYPE" == "darwin"* ]]; then
glibtoolize --force && aclocal && autoconf && automake --add-missing glibtoolize --force && aclocal && autoconf && automake --add-missing

View file

@ -53,6 +53,22 @@ else
AC_DEFINE([HAVE_CRYPTOPP], [0]) AC_DEFINE([HAVE_CRYPTOPP], [0])
fi fi
#check for readpassphrase. If none is found, we use getpass (with a warning)
AC_CHECK_HEADER([readpassphrase.h],
[READPASSPHRASE=native],
AC_CHECK_HEADER([bsd/readpassphrase.h],
[READPASSPHRASE=bsd], ))
if test "$READPASSPHRASE" = "native"; then
AC_DEFINE([HAVE_READPASSPHRASE], [1])
fi
if test "$READPASSPHRASE" = "bsd"; then
AC_DEFINE([HAVE_BSDREADPASSPHRASE], [1])
AC_CHECK_LIB([bsd], [readpassphrase],
[LIBS="-lbsd $LIBS"], #is there a better version of this?
AC_MSG_ERROR([library for bsd/readpassphrase.h not found]))
fi
#check for standard functions #check for standard functions
AC_CHECK_FUNCS([memset mkdir], , AC_MSG_ERROR([Required function missing])) AC_CHECK_FUNCS([memset mkdir], , AC_MSG_ERROR([Required function missing]))
@ -63,6 +79,7 @@ AC_CHECK_HEADERS([fcntl.h inttypes.h stddef.h stdlib.h string.h sys/file.h unist
AC_CHECK_HEADER_STDBOOL AC_CHECK_HEADER_STDBOOL
AC_C_INLINE AC_C_INLINE
AC_TYPE_SIZE_T AC_TYPE_SIZE_T
AC_TYPE_SSIZE_T
AC_TYPE_UINT32_T AC_TYPE_UINT32_T
AC_TYPE_UINT64_T AC_TYPE_UINT64_T
AC_TYPE_UINT8_T AC_TYPE_UINT8_T

View file

@ -1,4 +1,4 @@
.TH CCR 1 2016-01-12 "ccr" "Codecrypt" .TH CCR 1 2017-10-22 "ccr" "Codecrypt"
.SH NAME .SH NAME
.B ccr .B ccr
\- The post-quantum cryptography encryption and signing tool \- The post-quantum cryptography encryption and signing tool
@ -227,6 +227,12 @@ Rename matching public keys. Use "-N" to specify a new name.
\fB\-M\fR, \fB\-\-rename\-secret\fR <\fIkeyspec\fR> \fB\-M\fR, \fB\-\-rename\-secret\fR <\fIkeyspec\fR>
Rename matching private keys. Rename matching private keys.
.TP
\fB\-w\fR, \fB\-\-with-lock\fR <\fIfile\fR>
When loading the secret part of the keyring, decrypt the file using the
specified shared key. If that file looks encrypted and \fB-w\fR is not
specified, asking for the password interactively (i.e. "-w @") will be assumed.
.SH FILES .SH FILES
Codecrypt stores user data in a directory specified by environment variable Codecrypt stores user data in a directory specified by environment variable
@ -300,6 +306,40 @@ idealized case and very roughly) halves the bit security (although the attack
remains exponential). Users who are aware of large quantum computers being remains exponential). Users who are aware of large quantum computers being
built are advised to use 2^192 or 2^256 bit security keys. built are advised to use 2^192 or 2^256 bit security keys.
.SH PASSWORD-DERIVED SYMMETRIC KEYS AND PASSWORD-PROTECTED SECRETS
Symmetric keys can be specified using a filename, or expanded from a password
(which is convenient e.g. for protecting private keys): If the filename for
\fB-S\fR starts with "@", program will first check the rest of the filename to
find a symmetric cipher algorithm specification, as in \fB-g\fR. If nothing is
specified, it will check CCR_SYMMETRIC_ALGORITHM environment variable, and if
that is still unspecified, it will default to "SYM,SHORTBLOCK". The reason for
defaulting the short blocks is that the functionality focuses on tiny keys.
After the symmetric algorithm is chosen, program will try to get the password
from environment variable CCR_SYMMETRIC_PASSWORD. If that variable is not set,
it will ask the user for the password interactively.
The password will be expanded to internally form a symmetric key for the
specified algorithm, which will in turn be used for the requested action.
Symmetric and private keys may be encrypted by a password or a symmetric key.
Parameter \fB-w\fR accepts the same arguments as \fB-S\fR, with the exception
that the resulting loaded or internally generated symmetric key will be used to
encrypt or decrypt symmetric and private keys when required:
Actions \fB-L\fR and \fB-U\fR can be used to lock, resp. unlock private keys
(specific keys to be modified can be selected using \fB--filter\fR) or
symmetric keys (if used together with \fB-S\fR). Action \fB-g\fR can be
modified by \fB-L\fR in the same way.
The environment variables used for automatically-specifying the password in
this case are separate from the previous ones: CCR_KEYRING_PASSWORD and
CCR_KEYRING_ALGORITHM for locking/unlocking private keys, respectively
CCR_SYMKEY_PASSWORD and CCR_SYMKEY_ALGORITHM for specifying symmetric key used
to unlock other symmetric keys (even the ones that are themselves used for
locking other keys).
.SH WARNINGS AND CAVEATS .SH WARNINGS AND CAVEATS
.SS General advice .SS General advice
@ -369,6 +409,14 @@ Codecrypt.
If the seed source of your system can not be trusted, fix the system instead. If the seed source of your system can not be trusted, fix the system instead.
.SH Password-derived symmetric keys
Passwords are weak and, if times did not change and humanoids are still
humanoids, you are prone to $5 wrench attacks.
Combination of \fB-L\fR and \fB-S\fR options can be exploited to output a
password-expanded key to a file. Doing that for any real purpose is a bad idea.
.SH Troubleshooting/FAQ .SH Troubleshooting/FAQ
Q: I can't read/verify messages from versions 1.3.1 and older! Q: I can't read/verify messages from versions 1.3.1 and older!

View file

@ -41,7 +41,6 @@
#define ENVELOPE_CLEARSIGN "clearsigned" #define ENVELOPE_CLEARSIGN "clearsigned"
#define ENVELOPE_DETACHSIGN "detachsign" #define ENVELOPE_DETACHSIGN "detachsign"
#define ENVELOPE_HASHFILE "hashfile" #define ENVELOPE_HASHFILE "hashfile"
#define ENVELOPE_SYMKEY "symkey"
#define MSG_CLEARTEXT "MESSAGE-IN-CLEARTEXT" #define MSG_CLEARTEXT "MESSAGE-IN-CLEARTEXT"
#define MSG_DETACHED "MESSAGE-DETACHED" #define MSG_DETACHED "MESSAGE-DETACHED"
@ -59,8 +58,10 @@ inline bool open_keyring (keyring&KR)
#define PREPARE_KEYRING if(!open_keyring(KR)) return 1 #define PREPARE_KEYRING if(!open_keyring(KR)) return 1
int action_gen_symkey (const std::string&algspec, static int action_gen_symkey (const std::string&algspec,
const std::string&symmetric, bool armor) const std::string&symmetric,
const std::string&withlock,
bool armor, bool force_lock)
{ {
symkey sk; symkey sk;
ccr_rng r; ccr_rng r;
@ -71,42 +72,13 @@ int action_gen_symkey (const std::string&algspec,
return 1; return 1;
} }
sencode*SK = sk.serialize(); if (!sk.save (symmetric, "", armor, force_lock, r)) return 1;
std::string data = SK->encode();
sencode_destroy (SK);
std::ofstream sk_out;
sk_out.open (symmetric == "-" ? "/dev/stdout" : symmetric.c_str(),
std::ios::out | std::ios::binary);
if (!sk_out) {
err ("error: can't open symkey file for writing");
return 1;
}
if (armor) {
std::vector<std::string> parts;
parts.resize (1);
base64_encode (data, parts[0]);
data = envelope_format (ENVELOPE_SYMKEY, parts, r);
}
sk_out << data;
if (!sk_out.good()) {
err ("error: can't write to symkey file");
return 1;
}
sk_out.close();
if (!sk_out.good()) {
err ("error: couldn't close symkey file");
return 1;
}
return 0; return 0;
} }
typedef std::map<std::string, std::string> algspectable_t; typedef std::map<std::string, std::string> algspectable_t;
algspectable_t& algspectable() static algspectable_t& algspectable()
{ {
static algspectable_t table; static algspectable_t table;
static bool init = false; static bool init = false;
@ -119,11 +91,10 @@ algspectable_t& algspectable()
table["SIG-192"] = "FMTSEQ192C-CUBE384-CUBE192"; table["SIG-192"] = "FMTSEQ192C-CUBE384-CUBE192";
table["SIG-256"] = "FMTSEQ256C-CUBE512-CUBE256"; table["SIG-256"] = "FMTSEQ256C-CUBE512-CUBE256";
table["SYM"] = "CHACHA20,CUBE512";
#if HAVE_CRYPTOPP==1 #if HAVE_CRYPTOPP==1
table["SYM"] = "CHACHA20,SHA256";
table["SYM-COMBINED"] = "CHACHA20,XSYND,ARCFOUR,CUBE512,SHA512"; table["SYM-COMBINED"] = "CHACHA20,XSYND,ARCFOUR,CUBE512,SHA512";
#else #else
table["SYM"] = "CHACHA20,CUBE512";
table["SYM-COMBINED"] = "CHACHA20,XSYND,ARCFOUR,CUBE512"; table["SYM-COMBINED"] = "CHACHA20,XSYND,ARCFOUR,CUBE512";
#endif #endif
@ -134,7 +105,8 @@ algspectable_t& algspectable()
} }
int action_gen_key (const std::string& p_algspec, const std::string&name, int action_gen_key (const std::string& p_algspec, const std::string&name,
const std::string&symmetric, bool armor, const std::string&symmetric, const std::string&withlock,
bool armor, bool force_lock,
keyring&KR, algorithm_suite&AS) keyring&KR, algorithm_suite&AS)
{ {
std::string algspec = to_unicase (p_algspec); std::string algspec = to_unicase (p_algspec);
@ -186,7 +158,8 @@ int action_gen_key (const std::string& p_algspec, const std::string&name,
//handle symmetric operation //handle symmetric operation
if (symmetric.length()) if (symmetric.length())
return action_gen_symkey (algspec, symmetric, armor); return action_gen_symkey (algspec, symmetric, withlock,
armor, force_lock);
algorithm*alg = NULL; algorithm*alg = NULL;
std::string algname; std::string algname;
@ -261,57 +234,11 @@ int action_gen_key (const std::string& p_algspec, const std::string&name,
* signatures/encryptions * signatures/encryptions
*/ */
int action_sym_encrypt (const std::string&symmetric, bool armor) static int action_sym_encrypt (const std::string&symmetric,
const std::string&withlock, bool armor)
{ {
//read the symmetric key first
std::ifstream sk_in;
sk_in.open (symmetric == "-" ? "/dev/stdin" : symmetric.c_str(),
std::ios::in | std::ios::binary);
if (!sk_in) {
err ("error: can't open symkey file");
return 1;
}
std::string sk_data;
if (!read_all_input (sk_data, sk_in)) {
err ("error: can't read symkey");
return 1;
}
sk_in.close();
if (armor) {
std::vector<std::string> parts;
std::string type;
if (!envelope_read (sk_data, 0, type, parts)) {
err ("error: no data envelope found");
return 1;
}
if (type != ENVELOPE_SYMKEY || parts.size() != 1) {
err ("error: wrong envelope format");
return 1;
}
if (!base64_decode (parts[0], sk_data)) {
err ("error: malformed data");
return 1;
}
}
sencode*SK = sencode_decode (sk_data);
if (!SK) {
err ("error: could not parse input sencode");
return 1;
}
symkey sk; symkey sk;
if (!sk.unserialize (SK)) { if (!sk.load (symmetric, withlock, true, armor)) return 1;
err ("error: could not parse input structure");
return 1;
}
sencode_destroy (SK);
ccr_rng r; ccr_rng r;
if (!r.seed (256)) SEED_FAILED; if (!r.seed (256)) SEED_FAILED;
@ -326,10 +253,11 @@ int action_sym_encrypt (const std::string&symmetric, bool armor)
int action_encrypt (const std::string&recipient, bool armor, int action_encrypt (const std::string&recipient, bool armor,
const std::string&symmetric, const std::string&symmetric,
const std::string&withlock,
keyring&KR, algorithm_suite&AS) keyring&KR, algorithm_suite&AS)
{ {
if (symmetric.length()) if (symmetric.length())
return action_sym_encrypt (symmetric, armor); return action_sym_encrypt (symmetric, withlock, armor);
//first, read plaintext //first, read plaintext
std::string data; std::string data;
@ -403,56 +331,11 @@ int action_encrypt (const std::string&recipient, bool armor,
} }
int action_sym_decrypt (const std::string&symmetric, bool armor) static int action_sym_decrypt (const std::string&symmetric,
const std::string&withlock, bool armor)
{ {
std::ifstream sk_in;
sk_in.open (symmetric == "-" ? "/dev/stdin" : symmetric.c_str(),
std::ios::in | std::ios::binary);
if (!sk_in) {
err ("error: can't open symkey file");
return 1;
}
std::string sk_data;
if (!read_all_input (sk_data, sk_in)) {
err ("error: can't read symkey");
return 1;
}
sk_in.close();
if (armor) {
std::vector<std::string> parts;
std::string type;
if (!envelope_read (sk_data, 0, type, parts)) {
err ("error: no data envelope found");
return 1;
}
if (type != ENVELOPE_SYMKEY || parts.size() != 1) {
err ("error: wrong envelope format");
return 1;
}
if (!base64_decode (parts[0], sk_data)) {
err ("error: malformed data");
return 1;
}
}
sencode*SK = sencode_decode (sk_data);
if (!SK) {
err ("error: could not parse input sencode");
return 1;
}
symkey sk; symkey sk;
if (!sk.unserialize (SK)) { if (!sk.load (symmetric, withlock, false, armor)) return 1;
err ("error: could not parse input structure");
return 1;
}
sencode_destroy (SK);
int ret = sk.decrypt (std::cin, std::cout); int ret = sk.decrypt (std::cin, std::cout);
@ -461,10 +344,11 @@ int action_sym_decrypt (const std::string&symmetric, bool armor)
} }
int action_decrypt (bool armor, const std::string&symmetric, int action_decrypt (bool armor, const std::string&symmetric,
const std::string&withlock,
keyring&KR, algorithm_suite&AS) keyring&KR, algorithm_suite&AS)
{ {
if (symmetric.length()) if (symmetric.length())
return action_sym_decrypt (symmetric, armor); return action_sym_decrypt (symmetric, withlock, armor);
std::string data; std::string data;
read_all_input (data); read_all_input (data);
@ -566,7 +450,7 @@ int action_decrypt (bool armor, const std::string&symmetric,
return 0; return 0;
} }
int action_hash_sign (bool armor, const std::string&symmetric) static int action_hash_sign (bool armor, const std::string&symmetric)
{ {
hashfile hf; hashfile hf;
if (!hf.create (std::cin)) { if (!hf.create (std::cin)) {
@ -612,6 +496,7 @@ int action_hash_sign (bool armor, const std::string&symmetric)
int action_sign (const std::string&user, bool armor, const std::string&detach, int action_sign (const std::string&user, bool armor, const std::string&detach,
bool clearsign, const std::string&symmetric, bool clearsign, const std::string&symmetric,
const std::string&withlock,
keyring&KR, algorithm_suite&AS) keyring&KR, algorithm_suite&AS)
{ {
//symmetric processing has its own function //symmetric processing has its own function
@ -748,7 +633,7 @@ int action_sign (const std::string&user, bool armor, const std::string&detach,
return 0; return 0;
} }
int action_hash_verify (bool armor, const std::string&symmetric) static int action_hash_verify (bool armor, const std::string&symmetric)
{ {
// first, input the hashfile // first, input the hashfile
std::ifstream hf_in; std::ifstream hf_in;
@ -807,6 +692,7 @@ int action_hash_verify (bool armor, const std::string&symmetric)
int action_verify (bool armor, const std::string&detach, int action_verify (bool armor, const std::string&detach,
bool clearsign, bool yes, const std::string&symmetric, bool clearsign, bool yes, const std::string&symmetric,
const std::string&withlock,
keyring&KR, algorithm_suite&AS) keyring&KR, algorithm_suite&AS)
{ {
//symmetric processing has its own function //symmetric processing has its own function
@ -1048,6 +934,7 @@ int action_verify (bool armor, const std::string&detach,
*/ */
int action_sign_encrypt (const std::string&user, const std::string&recipient, int action_sign_encrypt (const std::string&user, const std::string&recipient,
const std::string&withlock,
bool armor, keyring&KR, algorithm_suite&AS) bool armor, keyring&KR, algorithm_suite&AS)
{ {
/* /*
@ -1161,6 +1048,7 @@ int action_sign_encrypt (const std::string&user, const std::string&recipient,
int action_decrypt_verify (bool armor, bool yes, int action_decrypt_verify (bool armor, bool yes,
const std::string&withlock,
keyring&KR, algorithm_suite&AS) keyring&KR, algorithm_suite&AS)
{ {
std::string data; std::string data;
@ -1872,3 +1760,53 @@ int action_rename_sec (bool yes,
} }
return 0; return 0;
} }
/*
* locking/unlocking
*/
static int action_lock_symkey (const std::string&symmetric,
const std::string&withlock,
bool armor)
{
symkey sk;
if (!sk.load (symmetric, "", true, armor)) return 1;
ccr_rng r;
if (!r.seed (256)) SEED_FAILED;
if (!sk.save (symmetric, withlock, armor, true, r)) return 1;
return 0;
}
int action_lock_sec (const std::string&filter,
const std::string&symmetric,
const std::string&withlock,
bool armor,
keyring&)
{
if (!symmetric.empty())
return action_lock_symkey (symmetric, withlock, armor);
return 1;
}
static int action_unlock_symkey (const std::string&symmetric,
const std::string&withlock,
bool armor)
{
symkey sk;
if (!sk.load (symmetric, withlock, false, armor)) return 1;
ccr_rng r;
if (!r.seed (256)) SEED_FAILED;
if (!sk.save (symmetric, "", armor, false, r)) return 1;
return 0;
}
int action_unlock_sec (const std::string&filter,
const std::string&symmetric,
const std::string&withlock,
bool armor,
keyring&)
{
if (!symmetric.empty())
return action_unlock_symkey (symmetric, withlock, armor);
return 1;
}

View file

@ -29,7 +29,8 @@
#include "algorithm.h" #include "algorithm.h"
int action_gen_key (const std::string& algspec, const std::string&name, int action_gen_key (const std::string& algspec, const std::string&name,
const std::string&symmetric, bool armor, const std::string&symmetric, const std::string&withlock,
bool armor, bool force_lock,
keyring&, algorithm_suite&); keyring&, algorithm_suite&);
/* /*
@ -37,24 +38,25 @@ int action_gen_key (const std::string& algspec, const std::string&name,
*/ */
int action_encrypt (const std::string&recipient, bool armor, int action_encrypt (const std::string&recipient, bool armor,
const std::string&symmetric, const std::string&symmetric, const std::string&withlock,
keyring&, algorithm_suite&); keyring&, algorithm_suite&);
int action_decrypt (bool armor, const std::string&symmetric, int action_decrypt (bool armor, const std::string&symmetric,
keyring&, algorithm_suite&); const std::string&withlock, keyring&, algorithm_suite&);
int action_sign (const std::string&user, bool armor, const std::string&detach, int action_sign (const std::string&user, bool armor, const std::string&detach,
bool clearsign, const std::string&symmetric, bool clearsign, const std::string&symmetric,
keyring&, algorithm_suite&); const std::string&withlock, keyring&, algorithm_suite&);
int action_verify (bool armor, const std::string&detach, int action_verify (bool armor, const std::string&detach,
bool clearsign, bool yes, const std::string&symmetric, bool clearsign, bool yes, const std::string&symmetric,
keyring&, algorithm_suite&); const std::string&withlock, keyring&, algorithm_suite&);
int action_sign_encrypt (const std::string&user, const std::string&recipient, int action_sign_encrypt (const std::string&user, const std::string&recipient,
bool armor, keyring&, algorithm_suite&); const std::string&withlock, bool armor,
keyring&, algorithm_suite&);
int action_decrypt_verify (bool armor, bool yes, int action_decrypt_verify (bool armor, bool yes, const std::string&withlock,
keyring&, algorithm_suite&); keyring&, algorithm_suite&);
/* /*
@ -96,5 +98,16 @@ int action_rename_sec (bool yes,
const std::string&filter, const std::string&name, const std::string&filter, const std::string&name,
keyring&); keyring&);
int action_lock_sec (const std::string&filter,
const std::string&symmetric,
const std::string&withlock,
bool armor,
keyring&);
int action_unlock_sec (const std::string&filter,
const std::string&symmetric,
const std::string&withlock,
bool armor,
keyring&);
#endif #endif

View file

@ -37,7 +37,7 @@ public:
I = J = 0; I = J = 0;
S.resize (Ssize); S.resize (Ssize);
mask = ~ (inttype) 0; mask = ~ (inttype) 0;
if ( (inttype) (1 << bits)) mask %= 1 << bits; if ( (inttype) (1 << bits) != 0) mask %= 1 << bits;
for (size_t i = 0; i < Ssize; ++i) S[i] = i; for (size_t i = 0; i < Ssize; ++i) S[i] = i;
} }
@ -45,7 +45,31 @@ public:
init(); init();
} }
void load_key (const inttype*begin, const inttype*end) { //ugly byte padding with zeroes for streamcipher compatibility
void load_key (const byte*begin, const byte*end) {
inttype j, t;
size_t i;
const byte *keypos;
//eat whole key iteratively, even if longer than permutation
for (; begin < end; begin += mask + 1) {
j = 0;
for (i = 0, keypos = begin;
i <= mask;
++i, ++keypos) {
if (keypos >= end) keypos = begin; //rotate
j = (j + S[i] + (*keypos)) & mask;
t = S[j];
S[j] = S[i];
S[i] = t;
}
}
discard (disc_bytes);
}
//this works on wide keys
void load_wkey (const inttype*begin, const inttype*end) {
inttype j, t; inttype j, t;
size_t i; size_t i;
const inttype *keypos; const inttype *keypos;
@ -67,7 +91,11 @@ public:
discard (disc_bytes); discard (disc_bytes);
} }
inttype gen() { inline byte gen() {
return genw();
}
inttype genw() {
I = (I + 1) & mask; I = (I + 1) & mask;
J = (J + S[I]) & mask; J = (J + S[I]) & mask;
@ -79,13 +107,20 @@ public:
return S[ (S[I] + S[J]) & mask]; return S[ (S[I] + S[J]) & mask];
} }
void gen (size_t n, inttype*out) { void gen (size_t n, byte*out) {
if (out) if (out)
for (size_t i = 0; i < n; ++i) out[i] = gen(); for (size_t i = 0; i < n; ++i) out[i] = gen();
else else
for (size_t i = 0; i < n; ++i) gen(); for (size_t i = 0; i < n; ++i) gen();
} }
void genw (size_t n, inttype*out) {
if (out)
for (size_t i = 0; i < n; ++i) out[i] = genw();
else
for (size_t i = 0; i < n; ++i) genw();
}
void gen (size_t n, std::vector<inttype>&out) { void gen (size_t n, std::vector<inttype>&out) {
out.resize (n); out.resize (n);
gen (n, & (out[0])); gen (n, & (out[0]));

View file

@ -25,11 +25,12 @@
#include "prng.h" #include "prng.h"
#include <stdint.h> #include <stdint.h>
#define randmax_type uint64_t
class ccr_rng : public prng class ccr_rng : public prng
{ {
public: public:
typedef uint64_t randmax_t;
chacha20 r; chacha20 r;
ccr_rng() { ccr_rng() {
@ -43,8 +44,8 @@ public:
bool seed (uint bits, bool quick = true); bool seed (uint bits, bool quick = true);
uint random (uint n) { uint random (uint n) {
randmax_type i; randmax_t i;
r.gen (sizeof (randmax_type), (byte*) &i); r.gen (sizeof (randmax_t), (byte*) &i);
return i % n; return i % n;
} }
}; };

View file

@ -42,8 +42,8 @@ void print_help (char*pname)
out (" -T, --test perform (probably nonexistent) testing/debugging stuff"); out (" -T, --test perform (probably nonexistent) testing/debugging stuff");
outeol; outeol;
out ("Global options:"); out ("Global options:");
out (" -R, --in input file, default is stdin"); out (" -R, --in set input file, default is stdin");
out (" -o, --out output file, default is stdout"); out (" -o, --out set output file, default is stdout");
out (" -E, --err the same for stderr"); out (" -E, --err the same for stderr");
out (" -a, --armor use ascii-armored I/O"); out (" -a, --armor use ascii-armored I/O");
out (" -y, --yes assume that answer is `yes' everytime"); out (" -y, --yes assume that answer is `yes' everytime");
@ -76,12 +76,18 @@ void print_help (char*pname)
out (" -X, --delete-secret"); out (" -X, --delete-secret");
out (" -m, --rename rename matching keys"); out (" -m, --rename rename matching keys");
out (" -M, --rename-secret"); out (" -M, --rename-secret");
out (" -L, --lock lock secrets");
out (" -U, --unlock unlock secrets");
outeol; outeol;
out ("Key management options:"); out ("Key management options:");
out (" -n, --no-action on import, only show what would be imported");
out (" -N, --name specify a new name for renaming or importing");
out (" -F, --filter only work with keys with matching names"); out (" -F, --filter only work with keys with matching names");
out (" -f, --fingerprint format full key IDs nicely for human eyes"); out (" -f, --fingerprint format full key IDs nicely for human eyes");
out (" -N, --name specify a new name for renaming or importing");
out (" -n, --no-action on import, only show what would be imported");
out (" -w, --with-lock specify the symmetric key for (un)locking the secrets");
outeol;
out (" With -S and -w, using `@' as the key file name will cause the program to");
out (" interactively ask for a password and derive the symmetric key from it.");
outeol; outeol;
out ("Codecrypt eats data. Use it with caution."); out ("Codecrypt eats data. Use it with caution.");
outeol; outeol;
@ -126,6 +132,7 @@ int main (int argc, char**argv)
std::string recipient, user, std::string recipient, user,
input, output, err_output, input, output, err_output,
name, filter, name, filter,
withlock,
action_param, action_param,
detach_sign, detach_sign,
symmetric; symmetric;
@ -163,6 +170,9 @@ int main (int argc, char**argv)
{"delete-secret", 1, 0, 'X' }, {"delete-secret", 1, 0, 'X' },
{"rename-secret", 1, 0, 'M' }, {"rename-secret", 1, 0, 'M' },
{"lock", 0, 0, 'L' },
{"unlock", 0, 0, 'U' },
{"gen-key", 1, 0, 'g' }, {"gen-key", 1, 0, 'g' },
{"name", 1, 0, 'N' }, {"name", 1, 0, 'N' },
@ -171,6 +181,8 @@ int main (int argc, char**argv)
{"fingerprint", 0, 0, 'f' }, {"fingerprint", 0, 0, 'f' },
{"no-action", 0, 0, 'n' }, {"no-action", 0, 0, 'n' },
{"with-lock", 1, 0, 'w' },
//actions //actions
{"sign", 0, 0, 's' }, {"sign", 0, 0, 's' },
{"verify", 0, 0, 'v' }, {"verify", 0, 0, 'v' },
@ -188,7 +200,7 @@ int main (int argc, char**argv)
option_index = -1; option_index = -1;
c = getopt_long c = getopt_long
(argc, argv, (argc, argv,
"hVTayr:u:R:o:E:kipx:m:KIPX:M:g:N:F:fnsvedCb:S:", "hVTayr:u:R:o:E:kipx:m:KIPX:M:LUg:N:F:fnw:svedCb:S:",
long_opts, &option_index); long_opts, &option_index);
if (c == -1) break; if (c == -1) break;
@ -251,26 +263,32 @@ int main (int argc, char**argv)
read_action ('X') read_action ('X')
read_action ('M') read_action ('M')
read_action ('g') read_action ('U')
read_single_opt ('N', name, read_single_opt ('N', name,
"please specify single name") "specify a single name")
read_single_opt ('F', filter, read_single_opt ('F', filter,
"please specify single filter string") "specify a single filter string")
read_flag ('f', opt_fingerprint) read_flag ('f', opt_fingerprint)
read_flag ('n', opt_import_no_action) read_flag ('n', opt_import_no_action)
read_single_opt ('w', withlock,
"specify a single key lock")
/* /*
* combinations of s+e and d+v are possible. result is * combinations of s+e and d+v are possible. result is
* 'E' = "big encrypt with sig" and 'D' "big decrypt * 'E' = "big encrypt with sig", 'D' "big decrypt
* with verify". * with verify" and 'G' = "generate and lock"
*/ */
read_action_comb ('s', 'e', 'E') read_action_comb ('s', 'e', 'E')
read_action_comb ('v', 'd', 'D')
read_action_comb ('e', 's', 'E') read_action_comb ('e', 's', 'E')
read_action_comb ('v', 'd', 'D')
read_action_comb ('d', 'v', 'D') read_action_comb ('d', 'v', 'D')
read_action_comb ('g', 'L', 'G')
read_action_comb ('L', 'g', 'G')
read_flag ('C', opt_clearsign) read_flag ('C', opt_clearsign)
read_single_opt ('b', detach_sign, read_single_opt ('b', detach_sign,
"specify only one detach-sign file") "specify only one detach-sign file")
@ -352,14 +370,18 @@ int main (int argc, char**argv)
} }
if (symmetric.length()) switch (action) { if (symmetric.length()) switch (action) {
case 'd':
case 'e': case 'e':
case 'g': case 'd':
case 's': case 's':
case 'v': case 'v':
case 'g':
case 'G':
case 'L':
case 'U':
break; break;
default: default:
progerr ("specified action doesn't support symmetric operation"); progerr ("specified action doesn't support"
" symmetric operation");
exitval = 1; exitval = 1;
goto exit; goto exit;
} }
@ -367,36 +389,45 @@ int main (int argc, char**argv)
switch (action) { switch (action) {
case 'g': case 'g':
exitval = action_gen_key (action_param, name, exitval = action_gen_key (action_param, name,
symmetric, opt_armor, symmetric, withlock,
opt_armor, false,
KR, AS);
break;
case 'G':
exitval = action_gen_key (action_param, name,
symmetric, withlock,
opt_armor, true,
KR, AS); KR, AS);
break; break;
case 'e': case 'e':
exitval = action_encrypt (recipient, opt_armor, symmetric, exitval = action_encrypt (recipient, opt_armor, symmetric,
KR, AS); withlock, KR, AS);
break; break;
case 'd': case 'd':
exitval = action_decrypt (opt_armor, symmetric, KR, AS); exitval = action_decrypt (opt_armor, symmetric, withlock,
KR, AS);
break; break;
case 's': case 's':
exitval = action_sign (user, opt_armor, detach_sign, exitval = action_sign (user, opt_armor, detach_sign,
opt_clearsign, symmetric, KR, AS); opt_clearsign, symmetric, withlock, KR, AS);
break; break;
case 'v': case 'v':
exitval = action_verify (opt_armor, detach_sign, opt_clearsign, exitval = action_verify (opt_armor, detach_sign, opt_clearsign,
opt_yes, symmetric, KR, AS); opt_yes, symmetric, withlock, KR, AS);
break; break;
case 'E': case 'E':
exitval = action_sign_encrypt (user, recipient, opt_armor, exitval = action_sign_encrypt (user, recipient, withlock,
KR, AS); opt_armor, KR, AS);
break; break;
case 'D': case 'D':
exitval = action_decrypt_verify (opt_armor, opt_yes, exitval = action_decrypt_verify (opt_armor, opt_yes, withlock,
KR, AS); KR, AS);
break; break;
@ -445,6 +476,16 @@ int main (int argc, char**argv)
exitval = action_rename_sec (opt_yes, action_param, name, KR); exitval = action_rename_sec (opt_yes, action_param, name, KR);
break; break;
case 'L':
exitval = action_lock_sec (filter, symmetric, withlock,
opt_armor, KR);
break;
case 'U':
exitval = action_unlock_sec (filter, symmetric, withlock,
opt_armor, KR);
break;
default: default:
progerr ("no action specified, use `--help'"); progerr ("no action specified, use `--help'");
exitval = 1; exitval = 1;

99
src/pwrng.cpp Normal file
View file

@ -0,0 +1,99 @@
/*
* This file is part of Codecrypt.
*
* Copyright (C) 2013-2017 Mirek Kratochvil <exa.exa@gmail.com>
*
* Codecrypt is free software: you can redistribute it and/or modify it
* under the terms of the GNU Lesser General Public License as published by
* the Free Software Foundation, either version 3 of the License, or (at
* your option) any later version.
*
* Codecrypt is distributed in the hope that it will be useful, but WITHOUT
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public
* License for more details.
*
* You should have received a copy of the GNU Lesser General Public License
* along with Codecrypt. If not, see <http://www.gnu.org/licenses/>.
*/
#include "pwrng.h"
#include "iohelpers.h"
#include <stdlib.h>
#if (HAVE_READPASSPHRASE == 1)
#include <readpassphrase.h>
#elif (HAVE_BSDREADPASSPHRASE == 1)
#include <bsd/readpassphrase.h>
#else
#warning "Falling back to getpass(3), which is marked obsolete!"
/* If you see this, you might as well want to take the readpassphrase()
* implementation from e.g. openssh's openbsd-compat and put it here. */
#include <unistd.h>
#endif
#define MAX_PW_LEN 1024 //like if someone enjoyed typing that.
static bool read_password (const std::string&prompt, std::string&pw)
{
#if (HAVE_READPASSPHRASE == 1 || HAVE_BSDREADPASSPHRASE==1)
/* readpassphrase reads at most bufsiz-1 bytes and gets the terminating
* zero just right */
std::vector<char> pwbuf;
pwbuf.resize (MAX_PW_LEN, 0);
if (!readpassphrase (prompt.c_str(), pwbuf.data(), MAX_PW_LEN,
RPP_REQUIRE_TTY))
return false;
pw = pwbuf.data();
return true;
#else
char* pass = getpass (prompt.c_str());
if (!pass) return false;
pw = pass;
return true;
#endif
}
bool pw_rng::seed_from_user_password (const std::string&reason,
const std::string&env_var,
bool verify)
{
std::string pw;
const char*env = getenv (env_var.c_str());
if (env) {
pw = env;
err ("Password for "
<< reason
<< " successfully read from environment "
<< env_var);
} else {
if (!read_password
("Enter password for " + reason + ": ", pw)) {
err ("pwrng: interactive password reading failed");
return false;
}
if (verify) {
std::string pw2;
if (!read_password
("Same password again for verification: ",
pw2)) {
err ("pwrng: password verification failed");
return false;
}
if (pw != pw2) {
err ("Passwords do not match!");
return false;
}
}
}
r.load_key ( (byte*) pw.data(),
(byte*) (pw.data() + pw.length()));
return true;
}

90
src/pwrng.h Normal file
View file

@ -0,0 +1,90 @@
/*
* This file is part of Codecrypt.
*
* Copyright (C) 2013-2016 Mirek Kratochvil <exa.exa@gmail.com>
*
* Codecrypt is free software: you can redistribute it and/or modify it
* under the terms of the GNU Lesser General Public License as published by
* the Free Software Foundation, either version 3 of the License, or (at
* your option) any later version.
*
* Codecrypt is distributed in the hope that it will be useful, but WITHOUT
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public
* License for more details.
*
* You should have received a copy of the GNU Lesser General Public License
* along with Codecrypt. If not, see <http://www.gnu.org/licenses/>.
*/
#ifndef _ccr_pwrng_h_
#define _ccr_pwrng_h_
#include "arcfour.h"
#include "prng.h"
#include <stdint.h>
class pw_rng : public prng
{
public:
/*
* Using wide arcfour for this purpose might seem weird, but:
*
* - it has large memory requirements
* (1Mbit, with possible ~0.95Mbit of entropy)
*
* - it takes some (very easily parametrizable) amount of time to seed,
* touching the above memory more or less randomly in the process
*
* - "retry rate" is constrained by how many passwords the human user
* can enter per time unit, which (together with the fact that the
* output of this thing is not supposed to get broadcasted directly)
* mostly disables all the known statistical attacks on arcfour
*
* - it's a highly nonstandard variant of a well-understood concept
* (therefore a good candidate for codecrypt right?)
*
* - arcfour is fast, but notably immune to vectorization and similar
* speedups.
*
* The other variant would be scrypt, which we don't implement for two
* reasons:
*
* - there's currently an scrypt-based cryptocoin, which provides
* insane amount of available inversion power against scrypt, which, if
* slightly abused, would invert any password-based key in seconds
*
* - admit it, arcfour is nicer
*
* Discarding 1M of output is very probably good for most uses (it
* permutes well and takes just around 50ms to run on current
* mainstream hardware) but YMMV.
*
* Please report any reasonable cases against this parameter choice.
*/
arcfour<uint16_t, 16, 1024 * 1024> r;
void init () {
r.init();
}
void clear() {
r.clear();
}
bool seed_from_user_password (const std::string& reason,
const std::string& env_var,
bool verify);
typedef uint64_t randmax_t;
uint random (uint n) {
randmax_t i;
r.gen (sizeof (randmax_t), (byte*) &i);
return i % n;
}
};
#endif

View file

@ -84,6 +84,128 @@ bool symkey::create (const std::string&in, prng&rng)
return true; return true;
} }
/*
* loading/saving
*/
#include "envelope.h"
#include "base64.h"
#include "seclock.h"
#define ENVELOPE_SYMKEY "symkey"
bool symkey::load (const std::string&fn, const std::string&withlock,
bool for_encryption, bool armor)
{
if (fn.length() && fn[0] == '@') {
//shared-secret password is requested
return load_lock_secret (*this, fn, "expanding shared secret",
"SYMMETRIC", for_encryption);
}
std::ifstream sk_in;
sk_in.open (fn == "-" ? "/dev/stdin" : fn.c_str(),
std::ios::in | std::ios::binary);
if (!sk_in) {
err ("error: can't open symkey file");
return false;
}
std::string sk_data;
if (!read_all_input (sk_data, sk_in)) {
err ("error: can't read symkey");
return false;
}
sk_in.close();
if (armor) {
std::vector<std::string> parts;
std::string type;
if (!envelope_read (sk_data, 0, type, parts)) {
err ("error: no data envelope found");
return false;
}
if (type != ENVELOPE_SYMKEY || parts.size() != 1) {
err ("error: wrong envelope format");
return false;
}
if (!base64_decode (parts[0], sk_data)) {
err ("error: malformed data");
return false;
}
}
if (looks_like_locked_secret (sk_data)) {
std::string tmp;
if (!unlock_secret (sk_data, tmp,
withlock, fn, "SYMKEY")) return false;
sk_data = tmp;
}
sencode*SK = sencode_decode (sk_data);
if (!SK) {
err ("error: could not parse input sencode");
return false;
}
if (!unserialize (SK)) {
err ("error: could not parse input structure");
sencode_destroy (SK);
return false;
}
sencode_destroy (SK);
return true;
}
bool symkey::save (const std::string&fn, const std::string&withlock,
bool armor, bool force_lock, prng&r)
{
sencode*SK = serialize();
std::string data = SK->encode();
sencode_destroy (SK);
if (force_lock) {
std::string tmp;
if (!lock_secret (data, tmp, withlock, fn, "SYMKEY", r))
return false;
data = tmp;
}
std::ofstream sk_out;
sk_out.open (fn == "-" ? "/dev/stdout" : fn.c_str(),
std::ios::out | std::ios::binary);
if (!sk_out) {
err ("error: can't open symkey file for writing");
return false;
}
if (armor) {
std::vector<std::string> parts;
parts.resize (1);
base64_encode (data, parts[0]);
data = envelope_format (ENVELOPE_SYMKEY, parts, r);
}
sk_out << data;
if (!sk_out.good()) {
err ("error: can't write to symkey file");
return false;
}
sk_out.close();
if (!sk_out.good()) {
err ("error: couldn't close symkey file");
return false;
}
return true;
}
typedef std::list<instanceof<streamcipher> > scs_t; typedef std::list<instanceof<streamcipher> > scs_t;
typedef std::list<instanceof<hash_proc> > hashes_t; typedef std::list<instanceof<hash_proc> > hashes_t;

View file

@ -28,7 +28,7 @@
#include <vector> #include <vector>
#include "types.h" #include "types.h"
#include "generator.h" #include "prng.h"
#include "sencode.h" #include "sencode.h"
class symkey class symkey
@ -48,6 +48,11 @@ public:
bool is_valid(); bool is_valid();
bool create (const std::string&, prng&); bool create (const std::string&, prng&);
bool load (const std::string&fn, const std::string&withlock,
bool for_encryption, bool armor);
bool save (const std::string&fn, const std::string&withlock,
bool armor, bool force_lock, prng&r);
}; };
#endif #endif