Blob


1 /* encrypt file by writing
2 v2hdr,
3 16byte initialization vector,
4 AES-CBC(key, random | file),
5 HMAC_SHA1(md5(key), AES-CBC(random | file))
7 With CBC, if the first plaintext block is 0, the first ciphertext block is
8 E(IV). Using the overflow technique adopted for compatibility with cryptolib
9 makes the last cipertext block decryptable. Hence the random prefix to file.
10 */
11 #include <u.h>
12 #include <libc.h>
13 #include <bio.h>
14 #include <mp.h>
15 #include <libsec.h>
17 enum{ CHK = 16, BUF = 4096 };
19 uchar v2hdr[AESbsize+1] = "AES CBC SHA1 2\n";
20 Biobuf bin;
21 Biobuf bout;
23 void
24 safewrite(uchar *buf, int n)
25 {
26 int i = Bwrite(&bout, buf, n);
28 if(i == n)
29 return;
30 fprint(2, "write error\n");
31 exits("write error");
32 }
34 void
35 saferead(uchar *buf, int n)
36 {
37 int i = Bread(&bin, buf, n);
39 if(i == n)
40 return;
41 fprint(2, "read error\n");
42 exits("read error");
43 }
45 int
46 main(int argc, char **argv)
47 {
48 int encrypt = 0; /* 0=decrypt, 1=encrypt */
49 int n, nkey;
50 char *hex, *msg = nil;
51 uchar key[AESmaxkey], key2[MD5dlen];
52 uchar buf[BUF+SHA1dlen]; /* assumption: CHK <= SHA1dlen */
53 AESstate aes;
54 DigestState *dstate;
56 if(argc!=2 || argv[1][0]!='-'){
57 fprint(2,"usage: HEX=key %s -d < cipher.aes > clear.txt\n", argv[0]);
58 fprint(2," or: HEX=key %s -e < clear.txt > cipher.aes\n", argv[0]);
59 exits("usage");
60 }
61 if(argv[1][1] == 'e')
62 encrypt = 1;
63 Binit(&bin, 0, OREAD);
64 Binit(&bout, 1, OWRITE);
66 if((hex = getenv("HEX")) == nil)
67 hex = getpass("enter key: ");
68 nkey = 0;
69 if(hex != nil)
70 nkey = strlen(hex);
71 if(nkey == 0 || (nkey&1) || nkey>2*AESmaxkey){
72 fprint(2,"key should be 32 hex digits\n");
73 exits("key");
74 }
75 nkey = dec16(key, sizeof key, hex, nkey);
76 md5(key, nkey, key2, 0); /* so even if HMAC_SHA1 is broken, encryption key is protected */
78 if(encrypt){
79 safewrite(v2hdr, AESbsize);
80 genrandom(buf,2*AESbsize); /* CBC is semantically secure if IV is unpredictable. */
81 setupAESstate(&aes, key, nkey, buf); /* use first AESbsize bytes as IV */
82 aesCBCencrypt(buf+AESbsize, AESbsize, &aes); /* use second AESbsize bytes as initial plaintext */
83 safewrite(buf, 2*AESbsize);
84 dstate = hmac_sha1(buf+AESbsize, AESbsize, key2, MD5dlen, 0, 0);
85 while(1){
86 n = Bread(&bin, buf, BUF);
87 if(n < 0){
88 msg = "read error";
89 goto Exit;
90 }
91 aesCBCencrypt(buf, n, &aes);
92 safewrite(buf, n);
93 dstate = hmac_sha1(buf, n, key2, MD5dlen, 0, dstate);
94 if(n < BUF)
95 break; /* EOF */
96 }
97 hmac_sha1(0, 0, key2, MD5dlen, buf, dstate);
98 safewrite(buf, SHA1dlen);
99 }else{ /* decrypt */
100 Bread(&bin, buf, AESbsize);
101 if(memcmp(buf, v2hdr, AESbsize) == 0){
102 saferead(buf, 2*AESbsize); /* read IV and random initial plaintext */
103 setupAESstate(&aes, key, nkey, buf);
104 dstate = hmac_sha1(buf+AESbsize, AESbsize, key2, MD5dlen, 0, 0);
105 aesCBCdecrypt(buf+AESbsize, AESbsize, &aes);
106 saferead(buf, SHA1dlen);
107 while((n = Bread(&bin, buf+SHA1dlen, BUF)) > 0){
108 dstate = hmac_sha1(buf, n, key2, MD5dlen, 0, dstate);
109 aesCBCdecrypt(buf, n, &aes);
110 safewrite(buf, n);
111 memmove(buf, buf+n, SHA1dlen); /* these bytes are not yet decrypted */
113 hmac_sha1(0, 0, key2, MD5dlen, buf+SHA1dlen, dstate);
114 if(memcmp(buf, buf+SHA1dlen, SHA1dlen) != 0){
115 msg = "decrypted file failed to authenticate!";
116 goto Exit;
118 }else{ /* compatibility with past mistake */
119 // if file was encrypted with bad aescbc use this:
120 // memset(key, 0, AESmaxkey);
121 // else assume we're decrypting secstore files
122 setupAESstate(&aes, key, 0, buf);
123 saferead(buf, CHK);
124 aesCBCdecrypt(buf, CHK, &aes);
125 while((n = Bread(&bin, buf+CHK, BUF)) > 0){
126 aesCBCdecrypt(buf+CHK, n, &aes);
127 safewrite(buf, n);
128 memmove(buf, buf+n, CHK);
130 if(memcmp(buf, "XXXXXXXXXXXXXXXX", CHK) != 0){
131 msg = "decrypted file failed to authenticate";
132 goto Exit;
136 Exit:
137 memset(key, 0, sizeof(key));
138 memset(key2, 0, sizeof(key2));
139 memset(buf, 0, sizeof(buf));
140 if(msg != nil)
141 fprint(2, "%s\n", msg);
142 exits(msg);
143 return 1; /* gcc */