382 lines
9.8 KiB
C
Raw Normal View History

2020-10-12 19:10:19 +02:00
/******************************************************************************/
/* SlunkCrypt, by LoRd_MuldeR <MuldeR2@GMX.de> */
2020-10-12 19:10:19 +02:00
/* This work has been released under the CC0 1.0 Universal license! */
/******************************************************************************/
2020-10-26 19:56:45 +01:00
/* Internal */
#include "slunkcrypt.h"
#include "compiler.h"
#include "keygen.h"
2022-03-21 21:11:46 +01:00
#include "thread.h"
2020-10-26 19:56:45 +01:00
#include "version.h"
/* CRT */
2020-10-12 19:10:19 +02:00
#include <string.h>
2020-10-26 19:56:45 +01:00
#include <limits.h>
/* Version */
const uint16_t SLUNKCRYPT_VERSION_MAJOR = LIB_VERSION_MAJOR;
const uint16_t SLUNKCRYPT_VERSION_MINOR = LIB_VERSION_MINOR;
const uint16_t SLUNKCRYPT_VERSION_PATCH = LIB_VERSION_PATCH;
const char *const SLUNKCRYPT_BUILD = __DATE__ ", " __TIME__;
2020-10-20 15:21:00 +02:00
/* Utilities */
2021-04-02 16:37:19 +02:00
#define BOOLIFY(X) (!!(X))
2020-10-20 15:21:00 +02:00
// ==========================================================================
// Data structures
// ==========================================================================
2020-10-12 19:10:19 +02:00
2021-03-18 23:02:55 +01:00
typedef struct
{
uint32_t x, y, z, w, v, d;
}
2021-04-01 23:37:37 +02:00
rand_state_t;
2021-03-18 23:02:55 +01:00
2020-10-12 19:10:19 +02:00
typedef struct
{
2021-04-02 16:37:19 +02:00
int reverse_mode;
2022-03-21 21:11:46 +01:00
const uint8_t (*wheel)[256U];
uint32_t counter;
2021-04-01 23:37:37 +02:00
rand_state_t random;
2022-03-21 21:11:46 +01:00
uint8_t *data;
}
thread_state_t;
typedef struct
{
uint8_t wheel[256U][256U];
thrdpl_t thread_pool;
size_t thread_idx;
thread_state_t thread_data[MAX_THREADS];
2020-10-12 19:10:19 +02:00
}
crypt_state_t;
2022-03-21 21:11:46 +01:00
#define THREAD_COUNT 1U
2020-10-18 20:41:02 +02:00
// ==========================================================================
// Abort flag
// ==========================================================================
volatile int g_slunkcrypt_abort_flag = 0;
2020-10-18 20:41:02 +02:00
#define CHECK_ABORTED() do \
{ \
if (g_slunkcrypt_abort_flag) \
2020-10-18 20:41:02 +02:00
{ \
2021-04-01 23:37:37 +02:00
goto aborted; \
2020-10-18 20:41:02 +02:00
} \
} \
while (0)
// ==========================================================================
// Byte access (endianness agnostic)
// ==========================================================================
static INLINE uint32_t lower_u64(const uint64_t value)
{
return (uint32_t)(value & 0xFFFFFFFF);
}
static INLINE uint32_t upper_u64(const uint64_t value)
{
return (uint32_t)(value >> 32U);
}
2020-10-12 19:10:19 +02:00
// ==========================================================================
// Deterministic random bit generator
2020-10-12 19:10:19 +02:00
// ==========================================================================
static INLINE void random_init(rand_state_t *const state, const keydata_t *const key)
2020-10-12 19:10:19 +02:00
{
2021-04-01 23:37:37 +02:00
slunkcrypt_bzero(state, sizeof(rand_state_t));
state->x = lower_u64(key->a);
state->y = upper_u64(key->a);
state->z = lower_u64(key->b);
state->w = upper_u64(key->b);
state->v = lower_u64(key->c);
state->d = upper_u64(key->c);
2020-10-12 19:10:19 +02:00
}
static INLINE uint32_t random_next(rand_state_t *const state)
2020-10-12 19:10:19 +02:00
{
2021-03-18 23:02:55 +01:00
const uint32_t t = state->x ^ (state->x >> 2);
state->x = state->y;
state->y = state->z;
state->z = state->w;
state->w = state->v;
state->v ^= (state->v << 4) ^ t ^ (t << 1);
return (state->d += 0x000587C5) + state->v;
2020-10-12 19:10:19 +02:00
}
static INLINE void random_seed(rand_state_t *const state, uint64_t salt, const uint16_t pepper, const uint8_t *const passwd, const size_t passwd_len)
2020-10-12 19:10:19 +02:00
{
size_t i;
keydata_t key;
do
{
slunkcrypt_keygen(&key, salt++, pepper, passwd, passwd_len);
random_init(state, &key);
slunkcrypt_bzero(&key, sizeof(keydata_t));
}
while (!(state->x || state->y || state->z || state->w || state->v));
for (i = 0U; i < 97U; ++i)
2020-10-12 19:10:19 +02:00
{
2021-03-18 23:02:55 +01:00
UNUSED volatile uint32_t q = random_next(state);
2020-10-12 19:10:19 +02:00
}
}
// ==========================================================================
// Initialization
// ==========================================================================
2022-03-21 21:11:46 +01:00
static int initialize_state(crypt_state_t *const state, const uint64_t nonce, const uint8_t *const passwd, const size_t passwd_len, const int mode, const int reset)
2020-10-12 19:10:19 +02:00
{
uint8_t temp[256U][256U];
size_t r, i;
2022-03-21 21:11:46 +01:00
rand_state_t random;
uint32_t counter;
const int reverse_mode = BOOLIFY(mode);
/* backup previous value */
const thrdpl_t thread_pool = reset ? state->thread_pool : THRDPL_NULL;
/* initialize state */
2021-04-01 23:37:37 +02:00
slunkcrypt_bzero(state, sizeof(crypt_state_t));
2022-03-21 21:11:46 +01:00
/* create thread-pool */
if ((state->thread_pool = reset ? thread_pool : thrdpl_create(THREAD_COUNT)) == THRDPL_NULL)
{
return SLUNKCRYPT_FAILURE;
}
/* initialize counter */
2022-03-21 21:11:46 +01:00
random_seed(&random, nonce, (uint16_t)(-1), passwd, passwd_len);
counter = random_next(&random);
2021-04-01 23:37:37 +02:00
/* set up the wheel permutations */
for (r = 0U; r < 256U; ++r)
2020-10-12 19:10:19 +02:00
{
2022-03-21 21:11:46 +01:00
random_seed(&random, nonce, (uint16_t)r, passwd, passwd_len);
for (i = 0U; i < 256U; ++i)
2020-10-12 19:10:19 +02:00
{
2022-03-21 21:11:46 +01:00
const size_t j = random_next(&random) % (i + 1U);
2020-10-12 19:10:19 +02:00
if (j != i)
{
2021-04-01 23:37:37 +02:00
state->wheel[r][i] = state->wheel[r][j];
2020-10-12 19:10:19 +02:00
}
2021-04-01 23:37:37 +02:00
state->wheel[r][j] = (uint8_t)i;
2020-10-12 19:10:19 +02:00
}
CHECK_ABORTED();
}
/* reverse the wheels, if requested */
2022-03-21 21:11:46 +01:00
if (reverse_mode)
{
for (r = 0U; r < 256U; ++r)
2020-10-12 19:10:19 +02:00
{
for (i = 0U; i < 256U; ++i)
{
2021-04-01 23:37:37 +02:00
temp[r][state->wheel[r][i]] = (uint8_t)i;
}
2020-10-12 19:10:19 +02:00
}
for (r = 0U; r < 256U; ++r)
{
2021-04-01 23:37:37 +02:00
memcpy(state->wheel[255U - r], temp[r], 256U);
}
slunkcrypt_bzero(temp, sizeof(temp));
2020-10-18 20:41:02 +02:00
CHECK_ABORTED();
2020-10-12 19:10:19 +02:00
}
2020-10-14 14:02:05 +02:00
2022-03-21 21:11:46 +01:00
/* set up thread state */
random_seed(&random, nonce, 256U, passwd, passwd_len);
for (i = 0U; i < THREAD_COUNT; ++i)
{
state->thread_data[i].reverse_mode = reverse_mode;
state->thread_data[i].wheel = state->wheel;
state->thread_data[i].counter = counter + ((uint32_t)i);
memcpy(&state->thread_data[i].random, &random, sizeof(rand_state_t));
for (r = 0U; r < i * 63U; ++r)
{
random_next(&state->thread_data[i].random);
}
CHECK_ABORTED();
}
slunkcrypt_bzero(&counter, sizeof(uint32_t));
slunkcrypt_bzero(&random, sizeof(rand_state_t));
return SLUNKCRYPT_SUCCESS;
/* aborted */
2021-04-01 23:37:37 +02:00
aborted:
2022-03-21 21:11:46 +01:00
thrdpl_destroy(state->thread_pool);
2021-04-01 23:37:37 +02:00
slunkcrypt_bzero(state, sizeof(crypt_state_t));
2022-03-21 21:11:46 +01:00
slunkcrypt_bzero(&counter, sizeof(uint32_t));
slunkcrypt_bzero(&random, sizeof(rand_state_t));
return SLUNKCRYPT_ABORTED;
2020-10-12 19:10:19 +02:00
}
// ==========================================================================
// Encrypt / Decrypt
// ==========================================================================
static INLINE void update_offset(uint8_t *const offset, uint32_t seed, rand_state_t *const state, const int reverse)
2020-10-15 21:56:36 +02:00
{
size_t i;
for (i = 0U; i < 256U; ++i, seed >>= CHAR_BIT)
2021-03-27 16:19:26 +01:00
{
if (i && (!(i & 3U)))
2021-03-27 16:19:26 +01:00
{
seed = random_next(state);
2020-10-15 21:56:36 +02:00
}
offset[reverse ? (255U - i) : i] = (uint8_t)seed;
2020-10-15 21:56:36 +02:00
}
2022-03-21 21:11:46 +01:00
for (i = 0U; i < 63U * (THREAD_COUNT - 1U); ++i)
{
random_next(state);
}
2020-10-15 21:56:36 +02:00
}
2022-03-21 21:11:46 +01:00
static INLINE void process_next_symbol(thread_state_t *const state)
2020-10-12 19:10:19 +02:00
{
2021-04-01 23:37:37 +02:00
uint8_t offset[256U];
size_t i;
2022-03-21 21:11:46 +01:00
update_offset(offset, state->counter, &state->random, state->reverse_mode);
for (i = 0U; i < 256U; ++i)
2020-10-12 19:10:19 +02:00
{
2022-03-21 21:11:46 +01:00
*state->data = (state->wheel[i][(*state->data + offset[i]) & 0xFF] - offset[i]) & 0xFF;
2020-10-12 19:10:19 +02:00
}
2022-03-21 21:11:46 +01:00
state->counter += THREAD_COUNT;
2020-10-12 19:10:19 +02:00
}
// ==========================================================================
// Public API
// ==========================================================================
2021-04-01 23:37:37 +02:00
int slunkcrypt_generate_nonce(uint64_t *const nonce)
2020-10-12 19:10:19 +02:00
{
2020-10-26 19:56:45 +01:00
if (!nonce)
2020-10-12 19:10:19 +02:00
{
return SLUNKCRYPT_FAILURE;
2020-10-12 19:10:19 +02:00
}
2020-10-14 14:02:05 +02:00
do
{
if (slunkcrypt_random_bytes((uint8_t*)nonce, sizeof(uint64_t)) != sizeof(uint64_t))
2020-10-14 14:02:05 +02:00
{
return SLUNKCRYPT_FAILURE;
2020-10-14 14:02:05 +02:00
}
}
2020-10-26 19:56:45 +01:00
while (!(*nonce));
return SLUNKCRYPT_SUCCESS;
2020-10-12 19:10:19 +02:00
}
slunkcrypt_t slunkcrypt_alloc(const uint64_t nonce, const uint8_t *const passwd, const size_t passwd_len, const int mode)
2020-10-12 19:10:19 +02:00
{
crypt_state_t* state = NULL;
if ((!passwd) || (passwd_len < SLUNKCRYPT_PWDLEN_MIN) || (passwd_len > SLUNKCRYPT_PWDLEN_MAX) || (mode < SLUNKCRYPT_ENCRYPT) || (mode > SLUNKCRYPT_DECRYPT))
2020-10-12 19:10:19 +02:00
{
return SLUNKCRYPT_NULL;
2020-10-12 19:10:19 +02:00
}
if (!(state = (crypt_state_t*)malloc(sizeof(crypt_state_t))))
2020-10-12 19:10:19 +02:00
{
return SLUNKCRYPT_NULL;
2020-10-18 20:41:02 +02:00
}
2022-03-21 21:11:46 +01:00
if (initialize_state(state, nonce, passwd, passwd_len, mode, 0) == SLUNKCRYPT_SUCCESS)
2020-10-18 20:41:02 +02:00
{
return ((slunkcrypt_t)state);
2020-10-18 20:41:02 +02:00
}
else
{
slunkcrypt_bzero(state, sizeof(crypt_state_t));
return SLUNKCRYPT_NULL;
2020-10-12 19:10:19 +02:00
}
}
int slunkcrypt_reset(const slunkcrypt_t context, const uint64_t nonce, const uint8_t *const passwd, const size_t passwd_len, const int mode)
2020-10-14 13:39:12 +02:00
{
2021-04-01 23:37:37 +02:00
crypt_state_t *const state = (crypt_state_t*)context;
int result = SLUNKCRYPT_FAILURE;
if ((!state) || (!passwd) || (passwd_len < SLUNKCRYPT_PWDLEN_MIN) || (passwd_len > SLUNKCRYPT_PWDLEN_MAX) || (mode < SLUNKCRYPT_ENCRYPT) || (mode > SLUNKCRYPT_DECRYPT))
2020-10-14 13:39:12 +02:00
{
return SLUNKCRYPT_FAILURE;
2020-10-14 13:39:12 +02:00
}
2022-03-21 21:11:46 +01:00
if ((result = initialize_state(state, nonce, passwd, passwd_len, mode, 1)) != SLUNKCRYPT_SUCCESS)
2020-10-18 20:41:02 +02:00
{
slunkcrypt_bzero(state, sizeof(crypt_state_t));
2020-10-18 20:41:02 +02:00
}
return result;
2020-10-14 13:39:12 +02:00
}
int slunkcrypt_process(const slunkcrypt_t context, const uint8_t *const input, uint8_t *const output, size_t length)
2020-10-12 19:10:19 +02:00
{
2022-03-21 21:11:46 +01:00
size_t i;
crypt_state_t *const state = (crypt_state_t*)context;
2020-10-14 13:39:12 +02:00
if (!state)
2020-10-12 19:10:19 +02:00
{
return SLUNKCRYPT_FAILURE;
2020-10-12 19:10:19 +02:00
}
2020-10-20 15:21:00 +02:00
if (length > 0U)
2020-10-12 19:10:19 +02:00
{
2022-03-21 21:11:46 +01:00
memcpy(output, input, length * sizeof(uint8_t));
for (i = 0; i < length; ++i)
2020-10-20 15:21:00 +02:00
{
2022-03-21 21:11:46 +01:00
abort(); //process_next_symbol(state, output + i);
2020-10-20 15:21:00 +02:00
CHECK_ABORTED();
}
2020-10-12 19:10:19 +02:00
}
2022-03-21 21:11:46 +01:00
thrdpl_await(state->thread_pool);
return SLUNKCRYPT_SUCCESS;
2021-04-01 23:37:37 +02:00
aborted:
2022-03-21 21:11:46 +01:00
thrdpl_await(state->thread_pool);
slunkcrypt_bzero(state, sizeof(crypt_state_t));
return SLUNKCRYPT_ABORTED;
2020-10-12 19:10:19 +02:00
}
2021-04-02 16:37:19 +02:00
int slunkcrypt_inplace(const slunkcrypt_t context, uint8_t *const buffer, size_t length)
2020-10-12 19:10:19 +02:00
{
2022-03-21 21:11:46 +01:00
size_t i;
crypt_state_t *const state = (crypt_state_t*)context;
2020-10-14 13:39:12 +02:00
if (!state)
2020-10-12 19:10:19 +02:00
{
return SLUNKCRYPT_FAILURE;
2020-10-12 19:10:19 +02:00
}
2020-10-20 15:21:00 +02:00
if (length > 0U)
2020-10-12 19:10:19 +02:00
{
for (i = 0; i < length; ++i)
2020-10-20 15:21:00 +02:00
{
2022-03-21 21:11:46 +01:00
state->thread_data[state->thread_idx].data = buffer + i;
//process_next_symbol(&state->thread_data[state->thread_idx]);
thrdpl_submit(state->thread_pool, process_next_symbol, &state->thread_data[state->thread_idx]);
if (++state->thread_idx >= THREAD_COUNT)
{
state->thread_idx = 0U;
}
2020-10-20 15:21:00 +02:00
CHECK_ABORTED();
}
2020-10-12 19:10:19 +02:00
}
2022-03-21 21:11:46 +01:00
thrdpl_await(state->thread_pool);
return SLUNKCRYPT_SUCCESS;
2021-04-01 23:37:37 +02:00
aborted:
2022-03-21 21:11:46 +01:00
thrdpl_await(state->thread_pool);
slunkcrypt_bzero(state, sizeof(crypt_state_t));
return SLUNKCRYPT_ABORTED;
2020-10-12 19:10:19 +02:00
}
void slunkcrypt_free(const slunkcrypt_t context)
2020-10-12 19:10:19 +02:00
{
2021-04-01 23:37:37 +02:00
crypt_state_t *const state = (crypt_state_t*)context;
2020-10-14 13:39:12 +02:00
if (state)
2020-10-12 19:10:19 +02:00
{
2022-03-21 21:11:46 +01:00
thrdpl_destroy(state->thread_pool);
slunkcrypt_bzero(state, sizeof(crypt_state_t));
2020-10-14 13:39:12 +02:00
free(state);
2020-10-12 19:10:19 +02:00
}
}