scryptenc.c 15 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607
  1. /*-
  2. * Copyright 2009 Colin Percival
  3. * All rights reserved.
  4. *
  5. * Redistribution and use in source and binary forms, with or without
  6. * modification, are permitted provided that the following conditions
  7. * are met:
  8. * 1. Redistributions of source code must retain the above copyright
  9. * notice, this list of conditions and the following disclaimer.
  10. * 2. Redistributions in binary form must reproduce the above copyright
  11. * notice, this list of conditions and the following disclaimer in the
  12. * documentation and/or other materials provided with the distribution.
  13. *
  14. * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
  15. * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
  16. * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
  17. * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
  18. * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
  19. * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
  20. * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
  21. * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
  22. * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
  23. * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
  24. * SUCH DAMAGE.
  25. *
  26. * This file was originally written by Colin Percival as part of the Tarsnap
  27. * online backup system.
  28. */
  29. #include "scrypt_platform.h"
  30. #include <errno.h>
  31. #include <fcntl.h>
  32. #include <stdint.h>
  33. #include <stdio.h>
  34. #include <string.h>
  35. #include <unistd.h>
  36. #include <openssl/aes.h>
  37. #include "crypto_aesctr.h"
  38. #include "memlimit.h"
  39. #include "scrypt.h"
  40. #include "scrypt_cpuperf.h"
  41. #include "sha256.h"
  42. #include "sysendian.h"
  43. #include "scryptenc.h"
  44. #define ENCBLOCK 65536
  45. static int pickparams(size_t, double, double,
  46. int *, uint32_t *, uint32_t *);
  47. static int checkparams(size_t, double, double, int, uint32_t, uint32_t);
  48. static int getsalt(uint8_t[32]);
  49. static int
  50. pickparams(size_t maxmem, double maxmemfrac, double maxtime,
  51. int * logN, uint32_t * r, uint32_t * p)
  52. {
  53. size_t memlimit;
  54. double opps;
  55. double opslimit;
  56. double maxN, maxrp;
  57. int rc;
  58. /* Figure out how much memory to use. */
  59. if (memtouse(maxmem, maxmemfrac, &memlimit))
  60. return (1);
  61. /* Figure out how fast the CPU is. */
  62. if ((rc = scrypt_cpuperf(&opps)) != 0)
  63. return (rc);
  64. opslimit = opps * maxtime;
  65. /* Allow a minimum of 2^15 salsa20/8 cores. */
  66. if (opslimit < 32768)
  67. opslimit = 32768;
  68. /* Fix r = 8 for now. */
  69. *r = 8;
  70. /*
  71. * The memory limit requires that 128Nr <= memlimit, while the CPU
  72. * limit requires that 4Nrp <= opslimit. If opslimit < memlimit/32,
  73. * opslimit imposes the stronger limit on N.
  74. */
  75. #ifdef DEBUG
  76. fprintf(stderr, "Requiring 128Nr <= %zu, 4Nrp <= %f\n",
  77. memlimit, opslimit);
  78. #endif
  79. if (opslimit < memlimit/32) {
  80. /* Set p = 1 and choose N based on the CPU limit. */
  81. *p = 1;
  82. maxN = opslimit / (*r * 4);
  83. for (*logN = 1; *logN < 63; *logN += 1) {
  84. if ((uint64_t)(1) << *logN > maxN / 2)
  85. break;
  86. }
  87. } else {
  88. /* Set N based on the memory limit. */
  89. maxN = memlimit / (*r * 128);
  90. for (*logN = 1; *logN < 63; *logN += 1) {
  91. if ((uint64_t)(1) << *logN > maxN / 2)
  92. break;
  93. }
  94. /* Choose p based on the CPU limit. */
  95. maxrp = (opslimit / 4) / ((uint64_t)(1) << *logN);
  96. if (maxrp > 0x3fffffff)
  97. maxrp = 0x3fffffff;
  98. *p = (uint32_t)(maxrp) / *r;
  99. }
  100. #ifdef DEBUG
  101. fprintf(stderr, "N = %zu r = %d p = %d\n",
  102. (size_t)(1) << *logN, (int)(*r), (int)(*p));
  103. #endif
  104. /* Success! */
  105. return (0);
  106. }
  107. static int
  108. checkparams(size_t maxmem, double maxmemfrac, double maxtime,
  109. int logN, uint32_t r, uint32_t p)
  110. {
  111. size_t memlimit;
  112. double opps;
  113. double opslimit;
  114. uint64_t N;
  115. int rc;
  116. /* Figure out the maximum amount of memory we can use. */
  117. if (memtouse(maxmem, maxmemfrac, &memlimit))
  118. return (1);
  119. /* Figure out how fast the CPU is. */
  120. if ((rc = scrypt_cpuperf(&opps)) != 0)
  121. return (rc);
  122. opslimit = opps * maxtime;
  123. /* Sanity-check values. */
  124. if ((logN < 1) || (logN > 63))
  125. return (7);
  126. if ((uint64_t)(r) * (uint64_t)(p) >= 0x40000000)
  127. return (7);
  128. /* Check limits. */
  129. N = (uint64_t)(1) << logN;
  130. if ((memlimit / N) / r < 128)
  131. return (9);
  132. if ((opslimit / N) / (r * p) < 4)
  133. return (10);
  134. /* Success! */
  135. return (0);
  136. }
  137. static int
  138. getsalt(uint8_t salt[32])
  139. {
  140. int fd;
  141. ssize_t lenread;
  142. uint8_t * buf = salt;
  143. size_t buflen = 32;
  144. /* Open /dev/urandom. */
  145. if ((fd = open("/dev/urandom", O_RDONLY)) == -1)
  146. goto err0;
  147. /* Read bytes until we have filled the buffer. */
  148. while (buflen > 0) {
  149. if ((lenread = read(fd, buf, buflen)) == -1)
  150. goto err1;
  151. /* The random device should never EOF. */
  152. if (lenread == 0)
  153. goto err1;
  154. /* We're partly done. */
  155. buf += lenread;
  156. buflen -= lenread;
  157. }
  158. /* Close the device. */
  159. while (close(fd) == -1) {
  160. if (errno != EINTR)
  161. goto err0;
  162. }
  163. /* Success! */
  164. return (0);
  165. err1:
  166. close(fd);
  167. err0:
  168. /* Failure! */
  169. return (4);
  170. }
  171. static int
  172. scryptenc_setup(uint8_t header[96], uint8_t dk[64],
  173. const uint8_t * passwd, size_t passwdlen,
  174. size_t maxmem, double maxmemfrac, double maxtime)
  175. {
  176. uint8_t salt[32];
  177. uint8_t hbuf[32];
  178. int logN;
  179. uint64_t N;
  180. uint32_t r;
  181. uint32_t p;
  182. SHA256_CTX ctx;
  183. uint8_t * key_hmac = &dk[32];
  184. HMAC_SHA256_CTX hctx;
  185. int rc;
  186. /* Pick values for N, r, p. */
  187. if ((rc = pickparams(maxmem, maxmemfrac, maxtime,
  188. &logN, &r, &p)) != 0)
  189. return (rc);
  190. N = (uint64_t)(1) << logN;
  191. /* Get some salt. */
  192. if ((rc = getsalt(salt)) != 0)
  193. return (rc);
  194. /* Generate the derived keys. */
  195. if (scrypt(passwd, passwdlen, salt, 32, N, r, p, dk, 64))
  196. return (3);
  197. /* Construct the file header. */
  198. memcpy(header, "scrypt", 6);
  199. header[6] = 0;
  200. header[7] = logN;
  201. be32enc(&header[8], r);
  202. be32enc(&header[12], p);
  203. memcpy(&header[16], salt, 32);
  204. /* Add header checksum. */
  205. SHA256_Init(&ctx);
  206. SHA256_Update(&ctx, header, 48);
  207. SHA256_Final(hbuf, &ctx);
  208. memcpy(&header[48], hbuf, 16);
  209. /* Add header signature (used for verifying password). */
  210. HMAC_SHA256_Init(&hctx, key_hmac, 32);
  211. HMAC_SHA256_Update(&hctx, header, 64);
  212. HMAC_SHA256_Final(hbuf, &hctx);
  213. memcpy(&header[64], hbuf, 32);
  214. /* Success! */
  215. return (0);
  216. }
  217. static int
  218. scryptdec_setup(const uint8_t header[96], uint8_t dk[64],
  219. const uint8_t * passwd, size_t passwdlen,
  220. size_t maxmem, double maxmemfrac, double maxtime)
  221. {
  222. uint8_t salt[32];
  223. uint8_t hbuf[32];
  224. int logN;
  225. uint32_t r;
  226. uint32_t p;
  227. uint64_t N;
  228. SHA256_CTX ctx;
  229. uint8_t * key_hmac = &dk[32];
  230. HMAC_SHA256_CTX hctx;
  231. int rc;
  232. /* Parse N, r, p, salt. */
  233. logN = header[7];
  234. r = be32dec(&header[8]);
  235. p = be32dec(&header[12]);
  236. memcpy(salt, &header[16], 32);
  237. /* Verify header checksum. */
  238. SHA256_Init(&ctx);
  239. SHA256_Update(&ctx, header, 48);
  240. SHA256_Final(hbuf, &ctx);
  241. if (memcmp(&header[48], hbuf, 16))
  242. return (7);
  243. /*
  244. * Check whether the provided parameters are valid and whether the
  245. * key derivation function can be computed within the allowed memory
  246. * and CPU time.
  247. */
  248. if ((rc = checkparams(maxmem, maxmemfrac, maxtime, logN, r, p)) != 0)
  249. return (rc);
  250. /* Compute the derived keys. */
  251. N = (uint64_t)(1) << logN;
  252. if (scrypt(passwd, passwdlen, salt, 32, N, r, p, dk, 64))
  253. return (3);
  254. /* Check header signature (i.e., verify password). */
  255. HMAC_SHA256_Init(&hctx, key_hmac, 32);
  256. HMAC_SHA256_Update(&hctx, header, 64);
  257. HMAC_SHA256_Final(hbuf, &hctx);
  258. if (memcmp(hbuf, &header[64], 32))
  259. return (11);
  260. /* Success! */
  261. return (0);
  262. }
  263. /**
  264. * scryptenc_buf(inbuf, inbuflen, outbuf, passwd, passwdlen,
  265. * maxmem, maxmemfrac, maxtime):
  266. * Encrypt inbuflen bytes from inbuf, writing the resulting inbuflen + 128
  267. * bytes to outbuf.
  268. */
  269. int
  270. scryptenc_buf(const uint8_t * inbuf, size_t inbuflen, uint8_t * outbuf,
  271. const uint8_t * passwd, size_t passwdlen,
  272. size_t maxmem, double maxmemfrac, double maxtime)
  273. {
  274. uint8_t dk[64];
  275. uint8_t hbuf[32];
  276. uint8_t header[96];
  277. uint8_t * key_enc = dk;
  278. uint8_t * key_hmac = &dk[32];
  279. int rc;
  280. HMAC_SHA256_CTX hctx;
  281. AES_KEY key_enc_exp;
  282. struct crypto_aesctr * AES;
  283. /* Generate the header and derived key. */
  284. if ((rc = scryptenc_setup(header, dk, passwd, passwdlen,
  285. maxmem, maxmemfrac, maxtime)) != 0)
  286. return (rc);
  287. /* Copy header into output buffer. */
  288. memcpy(outbuf, header, 96);
  289. /* Encrypt data. */
  290. if (AES_set_encrypt_key(key_enc, 256, &key_enc_exp))
  291. return (5);
  292. if ((AES = crypto_aesctr_init(&key_enc_exp, 0)) == NULL)
  293. return (6);
  294. crypto_aesctr_stream(AES, inbuf, &outbuf[96], inbuflen);
  295. crypto_aesctr_free(AES);
  296. /* Add signature. */
  297. HMAC_SHA256_Init(&hctx, key_hmac, 32);
  298. HMAC_SHA256_Update(&hctx, outbuf, 96 + inbuflen);
  299. HMAC_SHA256_Final(hbuf, &hctx);
  300. memcpy(&outbuf[96 + inbuflen], hbuf, 32);
  301. /* Zero sensitive data. */
  302. memset(dk, 0, 64);
  303. memset(&key_enc_exp, 0, sizeof(AES_KEY));
  304. /* Success! */
  305. return (0);
  306. }
  307. /**
  308. * scryptdec_buf(inbuf, inbuflen, outbuf, outlen, passwd, passwdlen,
  309. * maxmem, maxmemfrac, maxtime):
  310. * Decrypt inbuflen bytes fro inbuf, writing the result into outbuf and the
  311. * decrypted data length to outlen. The allocated length of outbuf must
  312. * be at least inbuflen.
  313. */
  314. int
  315. scryptdec_buf(const uint8_t * inbuf, size_t inbuflen, uint8_t * outbuf,
  316. size_t * outlen, const uint8_t * passwd, size_t passwdlen,
  317. size_t maxmem, double maxmemfrac, double maxtime)
  318. {
  319. uint8_t hbuf[32];
  320. uint8_t dk[64];
  321. uint8_t * key_enc = dk;
  322. uint8_t * key_hmac = &dk[32];
  323. int rc;
  324. HMAC_SHA256_CTX hctx;
  325. AES_KEY key_enc_exp;
  326. struct crypto_aesctr * AES;
  327. /*
  328. * All versions of the scrypt format will start with "scrypt" and
  329. * have at least 7 bytes of header.
  330. */
  331. if ((inbuflen < 7) || (memcmp(inbuf, "scrypt", 6) != 0))
  332. return (7);
  333. /* Check the format. */
  334. if (inbuf[6] != 0)
  335. return (8);
  336. /* We must have at least 128 bytes. */
  337. if (inbuflen < 128)
  338. return (7);
  339. /* Parse the header and generate derived keys. */
  340. if ((rc = scryptdec_setup(inbuf, dk, passwd, passwdlen,
  341. maxmem, maxmemfrac, maxtime)) != 0)
  342. return (rc);
  343. /* Decrypt data. */
  344. if (AES_set_encrypt_key(key_enc, 256, &key_enc_exp))
  345. return (5);
  346. if ((AES = crypto_aesctr_init(&key_enc_exp, 0)) == NULL)
  347. return (6);
  348. crypto_aesctr_stream(AES, &inbuf[96], outbuf, inbuflen - 128);
  349. crypto_aesctr_free(AES);
  350. *outlen = inbuflen - 128;
  351. /* Verify signature. */
  352. HMAC_SHA256_Init(&hctx, key_hmac, 32);
  353. HMAC_SHA256_Update(&hctx, inbuf, inbuflen - 32);
  354. HMAC_SHA256_Final(hbuf, &hctx);
  355. if (memcmp(hbuf, &inbuf[inbuflen - 32], 32))
  356. return (7);
  357. /* Zero sensitive data. */
  358. memset(dk, 0, 64);
  359. memset(&key_enc_exp, 0, sizeof(AES_KEY));
  360. /* Success! */
  361. return (0);
  362. }
  363. /**
  364. * scryptenc_file(infile, outfile, passwd, passwdlen,
  365. * maxmem, maxmemfrac, maxtime):
  366. * Read a stream from infile and encrypt it, writing the resulting stream to
  367. * outfile.
  368. */
  369. int
  370. scryptenc_file(FILE * infile, FILE * outfile,
  371. const uint8_t * passwd, size_t passwdlen,
  372. size_t maxmem, double maxmemfrac, double maxtime)
  373. {
  374. uint8_t buf[ENCBLOCK];
  375. uint8_t dk[64];
  376. uint8_t hbuf[32];
  377. uint8_t header[96];
  378. uint8_t * key_enc = dk;
  379. uint8_t * key_hmac = &dk[32];
  380. size_t readlen;
  381. HMAC_SHA256_CTX hctx;
  382. AES_KEY key_enc_exp;
  383. struct crypto_aesctr * AES;
  384. int rc;
  385. /* Generate the header and derived key. */
  386. if ((rc = scryptenc_setup(header, dk, passwd, passwdlen,
  387. maxmem, maxmemfrac, maxtime)) != 0)
  388. return (rc);
  389. /* Hash and write the header. */
  390. HMAC_SHA256_Init(&hctx, key_hmac, 32);
  391. HMAC_SHA256_Update(&hctx, header, 96);
  392. if (fwrite(header, 96, 1, outfile) != 1)
  393. return (12);
  394. /*
  395. * Read blocks of data, encrypt them, and write them out; hash the
  396. * data as it is produced.
  397. */
  398. if (AES_set_encrypt_key(key_enc, 256, &key_enc_exp))
  399. return (5);
  400. if ((AES = crypto_aesctr_init(&key_enc_exp, 0)) == NULL)
  401. return (6);
  402. do {
  403. if ((readlen = fread(buf, 1, ENCBLOCK, infile)) == 0)
  404. break;
  405. crypto_aesctr_stream(AES, buf, buf, readlen);
  406. HMAC_SHA256_Update(&hctx, buf, readlen);
  407. if (fwrite(buf, 1, readlen, outfile) < readlen)
  408. return (12);
  409. } while (1);
  410. crypto_aesctr_free(AES);
  411. /* Did we exit the loop due to a read error? */
  412. if (ferror(infile))
  413. return (13);
  414. /* Compute the final HMAC and output it. */
  415. HMAC_SHA256_Final(hbuf, &hctx);
  416. if (fwrite(hbuf, 32, 1, outfile) != 1)
  417. return (12);
  418. /* Zero sensitive data. */
  419. memset(dk, 0, 64);
  420. memset(&key_enc_exp, 0, sizeof(AES_KEY));
  421. /* Success! */
  422. return (0);
  423. }
  424. /**
  425. * scryptdec_file(infile, outfile, passwd, passwdlen,
  426. * maxmem, maxmemfrac, maxtime):
  427. * Read a stream from infile and decrypt it, writing the resulting stream to
  428. * outfile.
  429. */
  430. int
  431. scryptdec_file(FILE * infile, FILE * outfile,
  432. const uint8_t * passwd, size_t passwdlen,
  433. size_t maxmem, double maxmemfrac, double maxtime)
  434. {
  435. uint8_t buf[ENCBLOCK + 32];
  436. uint8_t header[96];
  437. uint8_t hbuf[32];
  438. uint8_t dk[64];
  439. uint8_t * key_enc = dk;
  440. uint8_t * key_hmac = &dk[32];
  441. size_t buflen = 0;
  442. size_t readlen;
  443. HMAC_SHA256_CTX hctx;
  444. AES_KEY key_enc_exp;
  445. struct crypto_aesctr * AES;
  446. int rc;
  447. /*
  448. * Read the first 7 bytes of the file; all future version of scrypt
  449. * are guaranteed to have at least 7 bytes of header.
  450. */
  451. if (fread(header, 7, 1, infile) < 1) {
  452. if (ferror(infile))
  453. return (13);
  454. else
  455. return (7);
  456. }
  457. /* Do we have the right magic? */
  458. if (memcmp(header, "scrypt", 6))
  459. return (7);
  460. if (header[6] != 0)
  461. return (8);
  462. /*
  463. * Read another 89 bytes of the file; version 0 of the srypt file
  464. * format has a 96-byte header.
  465. */
  466. if (fread(&header[7], 89, 1, infile) < 1) {
  467. if (ferror(infile))
  468. return (13);
  469. else
  470. return (7);
  471. }
  472. /* Parse the header and generate derived keys. */
  473. if ((rc = scryptdec_setup(header, dk, passwd, passwdlen,
  474. maxmem, maxmemfrac, maxtime)) != 0)
  475. return (rc);
  476. /* Start hashing with the header. */
  477. HMAC_SHA256_Init(&hctx, key_hmac, 32);
  478. HMAC_SHA256_Update(&hctx, header, 96);
  479. /*
  480. * We don't know how long the encrypted data block is (we can't know,
  481. * since data can be streamed into 'scrypt enc') so we need to read
  482. * data and decrypt all of it except the final 32 bytes, then check
  483. * if that final 32 bytes is the correct signature.
  484. */
  485. if (AES_set_encrypt_key(key_enc, 256, &key_enc_exp))
  486. return (5);
  487. if ((AES = crypto_aesctr_init(&key_enc_exp, 0)) == NULL)
  488. return (6);
  489. do {
  490. /* Read data until we have more than 32 bytes of it. */
  491. if ((readlen = fread(&buf[buflen], 1,
  492. ENCBLOCK + 32 - buflen, infile)) == 0)
  493. break;
  494. buflen += readlen;
  495. if (buflen <= 32)
  496. continue;
  497. /*
  498. * Decrypt, hash, and output everything except the last 32
  499. * bytes out of what we have in our buffer.
  500. */
  501. HMAC_SHA256_Update(&hctx, buf, buflen - 32);
  502. crypto_aesctr_stream(AES, buf, buf, buflen - 32);
  503. if (fwrite(buf, 1, buflen - 32, outfile) < buflen - 32)
  504. return (12);
  505. /* Move the last 32 bytes to the start of the buffer. */
  506. memmove(buf, &buf[buflen - 32], 32);
  507. buflen = 32;
  508. } while (1);
  509. crypto_aesctr_free(AES);
  510. /* Did we exit the loop due to a read error? */
  511. if (ferror(infile))
  512. return (13);
  513. /* Did we read enough data that we *might* have a valid signature? */
  514. if (buflen < 32)
  515. return (7);
  516. /* Verify signature. */
  517. HMAC_SHA256_Final(hbuf, &hctx);
  518. if (memcmp(hbuf, buf, 32))
  519. return (7);
  520. /* Zero sensitive data. */
  521. memset(dk, 0, 64);
  522. memset(&key_enc_exp, 0, sizeof(AES_KEY));
  523. return (0);
  524. }