467 lines
12 KiB
C
Raw Normal View History

2020-10-12 19:10:19 +02:00
/******************************************************************************/
/* SlunkCrypt, by LoRd_MuldeR <MuldeR2@GMX.de> */
2020-10-12 19:10:19 +02:00
/* This work has been released under the CC0 1.0 Universal license! */
/******************************************************************************/
2020-10-26 19:56:45 +01:00
/* Internal */
#include "../include/slunkcrypt.h"
#include "version.h"
/* CRT */
2020-10-12 19:10:19 +02:00
#include <string.h>
2020-10-26 19:56:45 +01:00
#include <limits.h>
#include <assert.h>
2020-10-12 19:10:19 +02:00
2020-10-26 19:56:45 +01:00
/* Compiler compatibility */
#if defined(_MSC_VER)
# define FORCE_INLINE __forceinline
# define UNUSED __pragma(warning(suppress: 4189))
#elif defined(__GNUC__)
# define FORCE_INLINE __attribute__((always_inline)) inline
# define UNUSED __attribute__((unused))
2020-10-15 21:56:36 +02:00
#else
2020-10-26 19:56:45 +01:00
# define FORCE_INLINE inline
# define UNUSED
2020-10-15 21:56:36 +02:00
#endif
2021-03-31 00:05:40 +02:00
/* Utilities */
#define LOGICAL_XOR(X,Y) ((Y) ? (!(X)) : (X))
2020-10-20 15:21:00 +02:00
/* Version info */
const uint16_t SLUNKCRYPT_VERSION_MAJOR = MY_VERSION_MAJOR;
const uint16_t SLUNKCRYPT_VERSION_MINOR = MY_VERSION_MINOR;
const uint16_t SLUNKCRYPT_VERSION_PATCH = MY_VERSION_PATCH;
const char* const SLUNKCRYPT_BUILD = __DATE__ " " __TIME__;
/* Const */
#define HASH_MAGIC_PRIME 0x00000100000001B3ull
#define HASH_OFFSET_BASE 0xCBF29CE484222325ull
2020-10-20 15:21:00 +02:00
// ==========================================================================
// Data structures
// ==========================================================================
2020-10-12 19:10:19 +02:00
typedef struct
{
2021-03-18 23:02:55 +01:00
uint64_t a, b, c;
}
2020-10-16 18:07:45 +02:00
key_data_t;
2021-03-18 23:02:55 +01:00
typedef struct
{
uint32_t x, y, z, w, v, d;
}
rand_state_t;
2020-10-12 19:10:19 +02:00
typedef struct
{
2020-10-14 13:39:12 +02:00
uint8_t wheel_fwd[256U][256U];
uint8_t wheel_bwd[256U][256U];
2021-03-31 00:05:40 +02:00
uint8_t step_fwd[241U];
uint8_t step_bwd[241U];
2021-03-27 16:19:26 +01:00
uint8_t rotation_fwd[256U];
uint8_t rotation_bwd[256U];
2020-10-14 13:39:12 +02:00
uint8_t counter;
2020-10-12 19:10:19 +02:00
}
crypt_state_t;
2020-10-18 20:41:02 +02:00
// ==========================================================================
// Abort flag
// ==========================================================================
volatile int g_slunkcrypt_abort_flag = 0;
2020-10-18 20:41:02 +02:00
#define CHECK_ABORTED() do \
{ \
if (g_slunkcrypt_abort_flag) \
2020-10-18 20:41:02 +02:00
{ \
return SLUNKCRYPT_ABORTED; \
2020-10-18 20:41:02 +02:00
} \
} \
while (0)
// ==========================================================================
// Byte access (endianness agnostic)
// ==========================================================================
static FORCE_INLINE uint32_t lower_u64(const uint64_t value)
{
return (uint32_t)(value & 0xFFFFFFFF);
}
static FORCE_INLINE uint32_t upper_u64(const uint64_t value)
{
2021-03-18 22:36:26 +01:00
return (uint32_t)((value >> 32U) & 0xFFFFFFFF);
}
static FORCE_INLINE uint8_t byte_u16(const uint16_t value, const size_t off)
{
assert(off < sizeof(uint16_t));
return (uint8_t)((value >> (CHAR_BIT * off)) & 0xFF);
}
static FORCE_INLINE uint8_t byte_u64(const uint64_t value, const size_t off)
{
assert(off < sizeof(uint64_t));
return (uint8_t)((value >> (CHAR_BIT * off)) & 0xFF);
}
2020-10-12 19:10:19 +02:00
// ==========================================================================
// Hash function
// ==========================================================================
static FORCE_INLINE void hash_update_str(uint64_t* const hash, const uint8_t* const data, const size_t data_len)
2020-10-12 19:10:19 +02:00
{
size_t i;
for (i = 0U; i < data_len; ++i)
2020-10-12 19:10:19 +02:00
{
*hash = ((*hash) ^ data[i]) * HASH_MAGIC_PRIME;
}
}
static FORCE_INLINE void hash_update_u64(uint64_t* const hash, const uint64_t value)
{
size_t i;
for (i = 0U; i < sizeof(uint64_t); ++i)
{
*hash = ((*hash) ^ byte_u64(value, i)) * HASH_MAGIC_PRIME;
}
}
static FORCE_INLINE void hash_update_u16(uint64_t* const hash, const uint16_t value)
{
size_t i;
for (i = 0U; i < sizeof(uint16_t); ++i)
{
*hash = ((*hash) ^ byte_u16(value, i)) * HASH_MAGIC_PRIME;
2020-10-12 19:10:19 +02:00
}
}
static uint64_t hash_code_init(const uint64_t salt, const uint16_t i, const uint8_t* const data, const size_t data_len)
2020-10-12 19:10:19 +02:00
{
uint64_t hash = HASH_OFFSET_BASE;
hash_update_u64(&hash, salt);
hash_update_u16(&hash, i);
hash_update_str(&hash, data, data_len);
return hash;
}
static uint64_t hash_code_next(const uint64_t salt, const uint8_t* const data, const size_t data_len)
{
uint64_t hash = HASH_OFFSET_BASE;
hash_update_u64(&hash, salt);
hash_update_str(&hash, data, data_len);
return hash;
2020-10-12 19:10:19 +02:00
}
// ==========================================================================
// Key derivation
// ==========================================================================
2021-03-18 23:02:55 +01:00
static FORCE_INLINE uint64_t keygen_loop(uint64_t salt, const uint16_t i, const uint8_t* const passwd, const size_t passwd_len)
{
2021-03-18 23:02:55 +01:00
size_t u;
uint64_t result = salt = hash_code_init(salt, i, passwd, passwd_len);
for (u = 1U; u < 99971U; ++u)
{
result ^= salt = hash_code_next(salt, passwd, passwd_len);
}
return result;
}
2020-10-16 18:07:45 +02:00
static void generate_key(key_data_t *const key, const uint64_t salt, const uint16_t pepper, const uint8_t* const passwd, const size_t passwd_len)
{
2021-03-18 23:02:55 +01:00
key->a = keygen_loop(salt, (pepper & 0x3FFF) | 0x0000, passwd, passwd_len);
key->b = keygen_loop(salt, (pepper & 0x3FFF) | 0x4000, passwd, passwd_len);
key->c = keygen_loop(salt, (pepper & 0x3FFF) | 0x8000, passwd, passwd_len);
}
2020-10-12 19:10:19 +02:00
// ==========================================================================
// PRNG
// ==========================================================================
2021-03-18 23:02:55 +01:00
static void random_init(rand_state_t *const state, const key_data_t *const key)
2020-10-12 19:10:19 +02:00
{
slunkcrypt_bzero(state, sizeof(rand_state_t));
2021-03-18 23:02:55 +01:00
state->x = lower_u64(key->a);
state->y = upper_u64(key->a);
state->z = lower_u64(key->b);
state->w = upper_u64(key->b);
state->v = lower_u64(key->c);
state->d = upper_u64(key->c);
2020-10-12 19:10:19 +02:00
}
static uint32_t random_next(rand_state_t *const state)
2020-10-12 19:10:19 +02:00
{
2021-03-18 23:02:55 +01:00
const uint32_t t = state->x ^ (state->x >> 2);
state->x = state->y;
state->y = state->z;
state->z = state->w;
state->w = state->v;
state->v ^= (state->v << 4) ^ t ^ (t << 1);
return (state->d += 0x000587C5) + state->v;
2020-10-12 19:10:19 +02:00
}
static void random_seed(rand_state_t *const state, uint64_t salt, const uint16_t pepper, const uint8_t *const passwd, const size_t passwd_len)
2020-10-12 19:10:19 +02:00
{
size_t i;
key_data_t key;
do
{
generate_key(&key, salt++, pepper, passwd, passwd_len);
random_init(state, &key);
slunkcrypt_bzero(&key, sizeof(key_data_t));
}
while (!(state->x || state->y || state->z || state->w || state->v));
for (i = 0U; i < 97U; ++i)
2020-10-12 19:10:19 +02:00
{
2021-03-18 23:02:55 +01:00
UNUSED volatile uint32_t q = random_next(state);
2020-10-12 19:10:19 +02:00
}
}
// ==========================================================================
// Initialization
// ==========================================================================
2020-10-26 19:56:45 +01:00
static int initialize_state(crypt_state_t* const crypt_state, const uint64_t nonce, const uint8_t* const passwd, const size_t passwd_len)
2020-10-12 19:10:19 +02:00
{
rand_state_t rand_state;
size_t r, i;
slunkcrypt_bzero(crypt_state, sizeof(crypt_state_t));
2020-10-14 14:02:05 +02:00
/* set up wheels and initial rotation */
for (r = 0U; r < 256U; ++r)
2020-10-12 19:10:19 +02:00
{
2020-10-26 19:56:45 +01:00
random_seed(&rand_state, nonce, (uint16_t)r, passwd, passwd_len);
2021-03-27 16:19:26 +01:00
crypt_state->rotation_bwd[255U - r] = crypt_state->rotation_fwd[r] = (uint8_t)random_next(&rand_state);
for (i = 0U; i < 256U; ++i)
2020-10-12 19:10:19 +02:00
{
const size_t j = random_next(&rand_state) % (i + 1U);
if (j != i)
{
2020-10-14 13:39:12 +02:00
crypt_state->wheel_fwd[r][i] = crypt_state->wheel_fwd[r][j];
2020-10-12 19:10:19 +02:00
}
2020-10-14 13:39:12 +02:00
crypt_state->wheel_fwd[r][j] = (uint8_t)i;
2020-10-12 19:10:19 +02:00
}
for (i = 0U; i < 256U; ++i)
2020-10-12 19:10:19 +02:00
{
crypt_state->wheel_bwd[255U - r][crypt_state->wheel_fwd[r][i]] = (uint8_t)i;
2020-10-12 19:10:19 +02:00
}
2020-10-18 20:41:02 +02:00
CHECK_ABORTED();
2020-10-12 19:10:19 +02:00
}
2020-10-14 14:02:05 +02:00
/* set up stepping */
2020-10-26 19:56:45 +01:00
random_seed(&rand_state, nonce, 256U, passwd, passwd_len);
2021-03-31 00:05:40 +02:00
for (i = 0U; i < 241U; ++i)
2020-10-14 13:39:12 +02:00
{
const size_t j = random_next(&rand_state) % (i + 1U);
if (j != i)
{
2020-10-14 14:02:05 +02:00
crypt_state->step_fwd[i] = crypt_state->step_fwd[j];
crypt_state->step_bwd[i] = crypt_state->step_bwd[j];
2020-10-14 13:39:12 +02:00
}
2021-03-27 16:19:26 +01:00
crypt_state->step_fwd[j] = (uint8_t)( 6U + i);
crypt_state->step_bwd[j] = (uint8_t)(249U - i);
2020-10-14 13:39:12 +02:00
}
2020-10-14 14:02:05 +02:00
slunkcrypt_bzero(&rand_state, sizeof(rand_state_t));
return SLUNKCRYPT_SUCCESS;
2020-10-12 19:10:19 +02:00
}
// ==========================================================================
// Encrypt / Decrypt
// ==========================================================================
2021-03-31 00:05:40 +02:00
static FORCE_INLINE void increment(uint8_t *const arr, const size_t offset, const size_t limit, const int bwd)
2020-10-15 21:56:36 +02:00
{
size_t i;
2021-03-31 00:05:40 +02:00
for (i = offset; i < limit; ++i)
2021-03-27 16:19:26 +01:00
{
if (++arr[bwd ? (255U - i) : i] != 0U)
{
2021-03-31 00:05:40 +02:00
break; /*no carry*/
2020-10-15 21:56:36 +02:00
}
}
}
2021-03-31 00:05:40 +02:00
static FORCE_INLINE void odometer_step(uint8_t *const arr, const int bwd)
{
increment(arr, 0U, 6U, LOGICAL_XOR(bwd, 0));
increment(arr, 0U, 3U, LOGICAL_XOR(bwd, 1));
increment(arr, 3U, 6U, LOGICAL_XOR(bwd, 1));
increment(arr, 6U, 9U, LOGICAL_XOR(bwd, 1));
}
2021-03-27 16:19:26 +01:00
static FORCE_INLINE uint8_t process_encrypt(crypt_state_t* const crypt_state, uint8_t value)
2020-10-12 19:10:19 +02:00
{
size_t i;
for (i = 0U; i < 256U; ++i)
2020-10-12 19:10:19 +02:00
{
2021-04-01 00:36:04 +02:00
const uint8_t rotation = crypt_state->rotation_fwd[i];
value = (crypt_state->wheel_fwd[i][(value + rotation) & 0xFF] - rotation) & 0xFF;
2020-10-12 19:10:19 +02:00
}
2021-03-27 16:19:26 +01:00
++crypt_state->rotation_fwd[crypt_state->step_fwd[crypt_state->counter]];
odometer_step(crypt_state->rotation_fwd, 0);
2021-03-31 00:05:40 +02:00
crypt_state->counter = (crypt_state->counter + 1U) % 241U;
2020-10-12 19:10:19 +02:00
return value;
}
2021-03-27 16:19:26 +01:00
static FORCE_INLINE uint8_t process_decrypt(crypt_state_t* const crypt_state, uint8_t value)
2020-10-12 19:10:19 +02:00
{
size_t i;
for (i = 0U; i < 256U; ++i)
2020-10-12 19:10:19 +02:00
{
2021-04-01 00:36:04 +02:00
const uint8_t rotation = crypt_state->rotation_bwd[i];
value = (crypt_state->wheel_bwd[i][(value + rotation) & 0xFF] - rotation) & 0xFF;
2020-10-12 19:10:19 +02:00
}
2021-03-27 16:19:26 +01:00
++crypt_state->rotation_bwd[crypt_state->step_bwd[crypt_state->counter]];
odometer_step(crypt_state->rotation_bwd, 1);
2021-03-31 00:05:40 +02:00
crypt_state->counter = (crypt_state->counter + 1U) % 241U;
2020-10-12 19:10:19 +02:00
return value;
}
// ==========================================================================
// Public API
// ==========================================================================
2020-10-26 19:56:45 +01:00
int slunkcrypt_generate_nonce(uint64_t* const nonce)
2020-10-12 19:10:19 +02:00
{
2020-10-26 19:56:45 +01:00
if (!nonce)
2020-10-12 19:10:19 +02:00
{
return SLUNKCRYPT_FAILURE;
2020-10-12 19:10:19 +02:00
}
2020-10-14 14:02:05 +02:00
do
{
if (slunkcrypt_random_bytes((uint8_t*)nonce, sizeof(uint64_t)) != sizeof(uint64_t))
2020-10-14 14:02:05 +02:00
{
return SLUNKCRYPT_FAILURE;
2020-10-14 14:02:05 +02:00
}
}
2020-10-26 19:56:45 +01:00
while (!(*nonce));
return SLUNKCRYPT_SUCCESS;
2020-10-12 19:10:19 +02:00
}
2020-10-26 19:56:45 +01:00
slunkcrypt_t slunkcrypt_alloc(const uint64_t nonce, const uint8_t *const passwd, const size_t passwd_len)
2020-10-12 19:10:19 +02:00
{
crypt_state_t* state = NULL;
2020-10-20 15:21:00 +02:00
if ((!passwd) || (passwd_len < SLUNKCRYPT_PWDLEN_MIN) || (passwd_len > SLUNKCRYPT_PWDLEN_MAX))
2020-10-12 19:10:19 +02:00
{
return SLUNKCRYPT_NULL;
2020-10-12 19:10:19 +02:00
}
if (!(state = (crypt_state_t*)malloc(sizeof(crypt_state_t))))
2020-10-12 19:10:19 +02:00
{
return SLUNKCRYPT_NULL;
2020-10-18 20:41:02 +02:00
}
2020-10-26 19:56:45 +01:00
if (initialize_state(state, nonce, passwd, passwd_len) == SLUNKCRYPT_SUCCESS)
2020-10-18 20:41:02 +02:00
{
return ((slunkcrypt_t)state);
2020-10-18 20:41:02 +02:00
}
else
{
slunkcrypt_bzero(state, sizeof(crypt_state_t));
return SLUNKCRYPT_NULL;
2020-10-12 19:10:19 +02:00
}
}
2020-10-26 19:56:45 +01:00
int slunkcrypt_reset(const slunkcrypt_t context, const uint64_t nonce, const uint8_t *const passwd, const size_t passwd_len)
2020-10-14 13:39:12 +02:00
{
crypt_state_t* const state = (crypt_state_t*)context;
int result = SLUNKCRYPT_FAILURE;
2020-10-20 15:21:00 +02:00
if ((!state) || (!passwd) || (passwd_len < SLUNKCRYPT_PWDLEN_MIN) || (passwd_len > SLUNKCRYPT_PWDLEN_MAX))
2020-10-14 13:39:12 +02:00
{
return SLUNKCRYPT_FAILURE;
2020-10-14 13:39:12 +02:00
}
if ((result = initialize_state(state, nonce, passwd, passwd_len)) != SLUNKCRYPT_SUCCESS)
2020-10-18 20:41:02 +02:00
{
slunkcrypt_bzero(state, sizeof(crypt_state_t));
2020-10-18 20:41:02 +02:00
}
return result;
2020-10-14 13:39:12 +02:00
}
int slunkcrypt_encrypt(const slunkcrypt_t context, const uint8_t* const input, uint8_t* const output, size_t length)
2020-10-12 19:10:19 +02:00
{
crypt_state_t* const state = (crypt_state_t*)context;
2020-10-14 13:39:12 +02:00
if (!state)
2020-10-12 19:10:19 +02:00
{
return SLUNKCRYPT_FAILURE;
2020-10-12 19:10:19 +02:00
}
2020-10-20 15:21:00 +02:00
if (length > 0U)
2020-10-12 19:10:19 +02:00
{
size_t i;
for (i = 0; i < length; ++i)
2020-10-20 15:21:00 +02:00
{
2021-03-27 16:19:26 +01:00
output[i] = process_encrypt(state, input[i]);
2020-10-20 15:21:00 +02:00
CHECK_ABORTED();
}
2020-10-12 19:10:19 +02:00
}
return SLUNKCRYPT_SUCCESS;
2020-10-12 19:10:19 +02:00
}
int slunkcrypt_encrypt_inplace(const slunkcrypt_t context, uint8_t* const buffer, size_t length)
2020-10-12 19:10:19 +02:00
{
crypt_state_t* const state = (crypt_state_t*)context;
2020-10-14 13:39:12 +02:00
if (!state)
2020-10-12 19:10:19 +02:00
{
return SLUNKCRYPT_FAILURE;
2020-10-12 19:10:19 +02:00
}
2020-10-20 15:21:00 +02:00
if (length > 0U)
2020-10-12 19:10:19 +02:00
{
size_t i;
for (i = 0; i < length; ++i)
2020-10-20 15:21:00 +02:00
{
2021-03-27 16:19:26 +01:00
buffer[i] = process_encrypt(state, buffer[i]);
2020-10-20 15:21:00 +02:00
CHECK_ABORTED();
}
2020-10-12 19:10:19 +02:00
}
return SLUNKCRYPT_SUCCESS;
2020-10-12 19:10:19 +02:00
}
int slunkcrypt_decrypt(const slunkcrypt_t context, const uint8_t* const input, uint8_t* const output, size_t length)
2020-10-12 19:10:19 +02:00
{
crypt_state_t* const state = (crypt_state_t*)context;
2020-10-14 13:39:12 +02:00
if (!state)
2020-10-12 19:10:19 +02:00
{
return SLUNKCRYPT_FAILURE;
2020-10-12 19:10:19 +02:00
}
2020-10-20 15:21:00 +02:00
if (length > 0U)
2020-10-12 19:10:19 +02:00
{
size_t i;
for (i = 0; i < length; ++i)
2020-10-20 15:21:00 +02:00
{
2021-03-27 16:19:26 +01:00
output[i] = process_decrypt(state, input[i]);
2020-10-20 15:21:00 +02:00
CHECK_ABORTED();
}
2020-10-12 19:10:19 +02:00
}
return SLUNKCRYPT_SUCCESS;
2020-10-12 19:10:19 +02:00
}
int slunkcrypt_decrypt_inplace(const slunkcrypt_t context, uint8_t* const buffer, size_t length)
2020-10-12 19:10:19 +02:00
{
crypt_state_t* const state = (crypt_state_t*)context;
2020-10-14 13:39:12 +02:00
if (!state)
2020-10-12 19:10:19 +02:00
{
return SLUNKCRYPT_FAILURE;
2020-10-12 19:10:19 +02:00
}
2020-10-20 15:21:00 +02:00
if (length > 0U)
2020-10-12 19:10:19 +02:00
{
size_t i;
for (i = 0; i < length; ++i)
2020-10-20 15:21:00 +02:00
{
2021-03-27 16:19:26 +01:00
buffer[i] = process_decrypt(state, buffer[i]);
2020-10-20 15:21:00 +02:00
CHECK_ABORTED();
}
2020-10-12 19:10:19 +02:00
}
return SLUNKCRYPT_SUCCESS;
2020-10-12 19:10:19 +02:00
}
void slunkcrypt_free(const slunkcrypt_t context)
2020-10-12 19:10:19 +02:00
{
crypt_state_t* const state = (crypt_state_t*)context;
2020-10-14 13:39:12 +02:00
if (state)
2020-10-12 19:10:19 +02:00
{
slunkcrypt_bzero(state, sizeof(crypt_state_t));
2020-10-14 13:39:12 +02:00
free(state);
2020-10-12 19:10:19 +02:00
}
}