/* * This file is part of Codecrypt. * * Codecrypt is free software: you can redistribute it and/or modify it * under the terms of the GNU Lesser General Public License as published by * the Free Software Foundation, either version 3 of the License, or (at * your option) any later version. * * Codecrypt is distributed in the hope that it will be useful, but WITHOUT * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or * FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public * License for more details. * * You should have received a copy of the GNU Lesser General Public License * along with Codecrypt. If not, see . */ #include "symkey.h" #include "sc.h" #include "hash.h" #include "str_match.h" #include "iohelpers.h" #include bool symkey::is_valid() { return blocksize >= 1024 && blocksize < 0x10000000 && //256M !ciphers.empty() && !hashes.empty() && key.size() >= 32 && //not less than 256bits of key stuff key.size() < 2048; } bool symkey::create (const std::string&in, prng&rng) { //first, find cipher and hash names blocksize = 1024 * 1024; uint keysize = 32; std::stringstream ss (in); std::string tok; while (getline (ss, tok, ',')) { tok = to_unicase (tok); if (tok == "SHORTBLOCK") blocksize = 1024; else if (tok == "LONGBLOCK") blocksize = 64 * 1024 * 1024; else if (tok == "LONGKEY") keysize = 512; //overkill ;] else if (streamcipher::suite().count (tok)) ciphers.insert (tok); else if (hash_proc::suite().count (tok)) hashes.insert (tok); else { err ("symkey: unknown token: " << tok); return false; } } //increase keysize, if needed for (std::set::iterator i = ciphers.begin(), e = ciphers.end(); i != e; ++i) { instanceof sc (streamcipher::suite() [*i]->get()); sc.collect(); if (sc->key_size() > keysize) keysize = sc->key_size(); } //fill the key key.resize (keysize); for (uint i = 0; i < keysize; ++i) key[i] = rng.random (256); if (!is_valid()) { err ("symkey: failed to produce valid symmetric key"); err ("symkey: check that at least one hash and cipher is used"); return false; } return true; } typedef std::list > scs_t; typedef std::list > hashes_t; bool symkey::encrypt (std::istream&in, std::ostream&out, prng&rng) { if (!is_valid()) return false; /* * structure of symmetrically encrypted file: * * - one-time key part, key.size() bytes * (repeat: * - blocksize encrypted bytes * - sum(hashes's size) blocksize marker+bytes of block hashes * ) * - possibly incomplete last block (may be empty) * - hashes of last blocksize+block * - eof */ std::vector otkey; otkey.resize (key.size()); for (uint i = 0; i < otkey.size(); ++i) otkey[i] = rng.random (256); /* * initialize the ciphers */ scs_t scs; for (std::set::iterator i = ciphers.begin(), e = ciphers.end(); i != e; ++i) { if (!streamcipher::suite().count (*i)) { err ("symkey: unsupported cipher: " << *i); return false; } scs.push_back (streamcipher::suite() [*i]->get()); scs.back().collect(); scs.back()->init(); scs.back()->load_key_vector (key); scs.back()->load_key_vector (otkey); } /* * initialize the hashes */ uint hashes_size = 0; hashes_t hs; for (std::set::iterator i = hashes.begin(), e = hashes.end(); i != e; ++i) { if (!hash_proc::suite().count (*i)) { err ("symkey: unsupported hash function: " << *i); return false; } hs.push_back (hash_proc::suite() [*i]->get()); hs.back().collect(); hashes_size += hs.back()->size(); } /* * output the onetime key */ out.write ( (char*) & (otkey[0]), otkey.size()); /* * process the blocks */ std::vectorbuf, cipbuf; buf.resize (blocksize + hashes_size); cipbuf.resize (buf.size()); for (;;) { in.read ( (char*) & (buf[0]), blocksize); uint bytes_read = in.gcount(); if (!in && !in.eof()) { err ("symkey: failed reading input"); return false; } //hashup! uint hashpos = bytes_read; for (hashes_t::iterator i = hs.begin(), e = hs.end(); i != e; ++i) { hash_proc&hp = **i; hp.init(); hp.eat (& (buf[0]), & (buf[bytes_read])); hp.eat (key); hp.eat (otkey); std::vector res = hp.finish(); for (uint j = 0; j < res.size(); ++j, ++hashpos) buf[hashpos] = res[j]; //hashpos gets to the end of block with hashes } //encrypt! for (scs_t::iterator i = scs.begin(), e = scs.end(); i != e; ++i) { streamcipher&sc = **i; sc.gen (hashpos, & (cipbuf[0])); for (uint j = 0; j < hashpos; ++j) buf[j] = buf[j] ^ cipbuf[j]; } //output! out.write ( (char*) & (buf[0]), hashpos); if (!out) { err ("symkey: failed to write output"); return false; } //this was the last one if (bytes_read < blocksize) break; } return true; } int symkey::decrypt (std::istream&in, std::ostream&out) { if (!is_valid()) return 1; std::vector otkey; otkey.resize (key.size()); /* * read otkey */ in.read ( (char*) & (otkey[0]), otkey.size()); if (in.gcount() != (std::streamsize) otkey.size() || !in) { err ("symkey: failed reading input"); return 1; } /* * initialize the ciphers */ scs_t scs; for (std::set::iterator i = ciphers.begin(), e = ciphers.end(); i != e; ++i) { if (!streamcipher::suite().count (*i)) { err ("symkey: unsupported cipher: " << *i); return 1; } scs.push_back (streamcipher::suite() [*i]->get()); scs.back().collect(); scs.back()->init(); scs.back()->load_key_vector (key); scs.back()->load_key_vector (otkey); } /* * initialize the hashes */ uint hashes_size = 0; hashes_t hs; for (std::set::iterator i = hashes.begin(), e = hashes.end(); i != e; ++i) { if (!hash_proc::suite().count (*i)) { err ("symkey: unsupported hash function: " << *i); return 1; } hs.push_back (hash_proc::suite() [*i]->get()); hs.back().collect(); hashes_size += hs.back()->size(); } /* * process the blocks */ std::vector buf, cipbuf; buf.resize (blocksize + hashes_size); cipbuf.resize (buf.size()); for (;;) { in.read ( (char*) & (buf[0]), buf.size()); uint bytes_read = in.gcount(); if ( (!in && !in.eof()) || bytes_read < hashes_size) { err ("symkey: failed reading input"); return 1; } //decrypt! for (scs_t::iterator i = scs.begin(), e = scs.end(); i != e; ++i) { streamcipher&sc = **i; sc.gen (bytes_read, & (cipbuf[0])); for (uint j = 0; j < bytes_read; ++j) buf[j] = buf[j] ^ cipbuf[j]; } bytes_read -= hashes_size; //verify the hashes uint hashpos = bytes_read; for (hashes_t::iterator i = hs.begin(), e = hs.end(); i != e; ++i) { hash_proc&hp = **i; hp.init(); hp.eat (& (buf[0]), & (buf[bytes_read])); hp.eat (key); hp.eat (otkey); std::vector res = hp.finish(); for (uint j = 0; j < res.size(); ++j, ++hashpos) if (buf[hashpos] != res[j]) { err ("symkey: mangled input"); return 3; } } //now that all is OK, output! out.write ( (char*) & (buf[0]), bytes_read); //last one if (bytes_read < blocksize) break; } //did we read whole input? if (!in.eof()) { err ("symkey: failed reading input"); return 1; } return 0; }