123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401 |
- /*-
- * Copyright 2009 Colin Percival
- * All rights reserved.
- *
- * Redistribution and use in source and binary forms, with or without
- * modification, are permitted provided that the following conditions
- * are met:
- * 1. Redistributions of source code must retain the above copyright
- * notice, this list of conditions and the following disclaimer.
- * 2. Redistributions in binary form must reproduce the above copyright
- * notice, this list of conditions and the following disclaimer in the
- * documentation and/or other materials provided with the distribution.
- *
- * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
- * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
- * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
- * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
- * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
- * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
- * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
- * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
- * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
- * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
- * SUCH DAMAGE.
- */
- #include "platform.h"
- #include <errno.h>
- #include <math.h>
- #include <stdint.h>
- #include <stdio.h>
- #include <stdlib.h>
- #include <string.h>
- #include "getopt.h"
- #include "humansize.h"
- #include "insecure_memzero.h"
- #include "parsenum.h"
- #include "passphrase_entry.h"
- #include "scryptenc.h"
- #include "scryptenc_print_error.h"
- #include "warnp.h"
- static void
- usage(void)
- {
- fprintf(stderr,
- "usage: scrypt {enc | dec | info} [-f] [--logN value] [-M maxmem]\n"
- " [-m maxmemfrac] [-P] [-p value] [-r value]"
- " [-t maxtime] [-v]\n"
- " [--passphrase method:arg] infile [outfile]\n"
- " scrypt --version\n");
- exit(1);
- }
- /**
- * scrypt_mode_info(infilename):
- * Print scrypt parameters used for the specified ${infilename}, or read from
- * stdin if that argument is NULL.
- */
- static int
- scrypt_mode_info(const char * infilename)
- {
- FILE * infile;
- int rc;
- /* If the input isn't stdin, open the file. */
- if (infilename != NULL) {
- if ((infile = fopen(infilename, "rb")) == NULL) {
- warnp("Cannot open input file: %s", infilename);
- goto err0;
- }
- } else {
- infile = stdin;
- }
- /* Print the encryption parameters used for the file. */
- if ((rc = scryptdec_file_printparams(infile)) != SCRYPT_OK) {
- scryptenc_print_error(rc, infilename, NULL);
- goto err1;
- }
- /* Clean up. */
- if ((infile != stdin) && fclose(infile))
- warnp("fclose");
- /* Success! */
- return (0);
- err1:
- if ((infile != stdin) && fclose(infile))
- warnp("fclose");
- err0:
- /* Failure! */
- return (-1);
- }
- /**
- * scrypt_mode_enc_dec(params, passphrase_entry, passphrase_arg, dec, verbose,
- * force_resources, infilename, outfilename):
- * Either encrypt (if ${dec} is 0) or decrypt (if ${dec} is non-zero)
- * ${infilename} (or standard input if this is NULL) to ${outfilename}.
- * Use scrypt parameters ${params}, with passphrase entry method
- * ${passphrase_entry} and argument ${passphrase_arg}. If ${verbose} is
- * non-zero, print verbose messages. If ${force_resources} is non-zero,
- * do not check whether encryption or decryption will exceed the estimated
- * time or memory requirements.
- */
- static int
- scrypt_mode_enc_dec(struct scryptenc_params params,
- enum passphrase_entry passphrase_entry, const char * passphrase_arg,
- int dec, int verbose, int force_resources,
- const char * infilename, const char * outfilename)
- {
- struct scryptdec_file_cookie * C = NULL;
- FILE * infile;
- FILE * outfile = stdout;
- char * passwd;
- int rc;
- /* If the input isn't stdin, open the file. */
- if (infilename != NULL) {
- if ((infile = fopen(infilename, "rb")) == NULL) {
- warnp("Cannot open input file: %s", infilename);
- goto err0;
- }
- } else {
- infile = stdin;
- }
- /* Get the password. */
- if (passphrase_entry_readpass(&passwd, passphrase_entry,
- passphrase_arg, "Please enter passphrase",
- "Please confirm passphrase", dec)) {
- warnp("passphrase_entry_readpass");
- goto err1;
- }
- /*-
- * If we're decrypting, open the input file and process its header;
- * doing this here allows us to abort without creating an output
- * file if the input file does not have a valid scrypt header or if
- * we have the wrong passphrase.
- *
- * If successful, we get back a cookie containing the decryption
- * parameters (which we'll use after we open the output file).
- */
- if (dec) {
- if ((rc = scryptdec_file_prep(infile, (uint8_t *)passwd,
- strlen(passwd), ¶ms, verbose, force_resources,
- &C)) != 0) {
- goto cleanup;
- }
- }
- /* If we have an output filename, open it. */
- if (outfilename != NULL) {
- if ((outfile = fopen(outfilename, "wb")) == NULL) {
- warnp("Cannot open output file: %s", outfilename);
- goto err2;
- }
- }
- /* Encrypt or decrypt. */
- if (dec)
- rc = scryptdec_file_copy(C, outfile);
- else
- rc = scryptenc_file(infile, outfile, (uint8_t *)passwd,
- strlen(passwd), ¶ms, verbose, force_resources);
- cleanup:
- /* Free the decryption cookie, if any. */
- scryptdec_file_cookie_free(C);
- /* Zero and free the password. */
- insecure_memzero(passwd, strlen(passwd));
- free(passwd);
- /* Close any files we opened. */
- if ((infile != stdin) && fclose(infile))
- warnp("fclose");
- if ((outfile != stdout) && fclose(outfile))
- warnp("fclose");
- /* If we failed, print the right error message and exit. */
- if (rc != SCRYPT_OK) {
- scryptenc_print_error(rc, infilename, outfilename);
- goto err0;
- }
- /* Success! */
- return (0);
- err2:
- scryptdec_file_cookie_free(C);
- insecure_memzero(passwd, strlen(passwd));
- free(passwd);
- err1:
- if ((infile != stdin) && fclose(infile))
- warnp("fclose");
- err0:
- /* Failure! */
- return (-1);
- }
- /* Parse a numeric optarg within a GETOPT context. (Requires ch and optarg.) */
- #define GETOPT_PARSENUM_WITHIN_UNSIGNED(var, min, max) do { \
- if (PARSENUM((var), optarg, (min), (max))) { \
- if (errno == ERANGE) { \
- warn0("%s must be between %ju and %ju" \
- " (inclusive)", ch, (uintmax_t)(min), \
- (uintmax_t)(max)); \
- } else \
- warnp("Invalid option: %s %s", ch, optarg); \
- exit(1); \
- } \
- } while (0)
- int
- main(int argc, char * argv[])
- {
- int dec = 0;
- int info = 0;
- int force_resources = 0;
- uint64_t maxmem64;
- struct scryptenc_params params = {0, 0.5, 300.0, 0, 0, 0};
- const char * ch;
- const char * infilename;
- const char * outfilename;
- int verbose = 0;
- enum passphrase_entry passphrase_entry = PASSPHRASE_UNSET;
- const char * passphrase_arg;
- WARNP_INIT;
- /* We should have "enc", "dec", or "info" first. */
- if (argc < 2)
- usage();
- if (strcmp(argv[1], "enc") == 0) {
- params.maxmem = 0;
- params.maxmemfrac = 0.125;
- params.maxtime = 5.0;
- } else if (strcmp(argv[1], "dec") == 0) {
- dec = 1;
- } else if (strcmp(argv[1], "info") == 0) {
- info = 1;
- } else if (strcmp(argv[1], "--version") == 0) {
- fprintf(stdout, "scrypt %s\n", PACKAGE_VERSION);
- exit(0);
- } else {
- warn0("First argument must be 'enc', 'dec', or 'info'.");
- usage();
- }
- argc--;
- argv++;
- /* Parse arguments. */
- while ((ch = GETOPT(argc, argv)) != NULL) {
- GETOPT_SWITCH(ch) {
- GETOPT_OPT("-f"):
- force_resources = 1;
- break;
- GETOPT_OPTARG("--logN"):
- GETOPT_PARSENUM_WITHIN_UNSIGNED(¶ms.logN, 10, 40);
- break;
- GETOPT_OPTARG("-M"):
- if (humansize_parse(optarg, &maxmem64)) {
- warn0("Could not parse the parameter to -M.");
- exit(1);
- }
- if (maxmem64 > SIZE_MAX) {
- warn0("The parameter to -M is too large.");
- exit(1);
- }
- params.maxmem = (size_t)maxmem64;
- break;
- GETOPT_OPTARG("-m"):
- if (PARSENUM(¶ms.maxmemfrac, optarg, 0, 0.5)) {
- warnp("Invalid option: -m %s", optarg);
- exit(1);
- }
- break;
- GETOPT_OPTARG("-p"):
- GETOPT_PARSENUM_WITHIN_UNSIGNED(¶ms.p, 1, 2048);
- break;
- GETOPT_OPTARG("--passphrase"):
- if (passphrase_entry != PASSPHRASE_UNSET) {
- warn0("You can only enter one --passphrase or"
- " -P argument");
- exit(1);
- }
- /* Parse "method:arg" optarg. */
- if (passphrase_entry_parse(optarg, &passphrase_entry,
- &passphrase_arg))
- exit(1);
- break;
- GETOPT_OPTARG("-r"):
- GETOPT_PARSENUM_WITHIN_UNSIGNED(¶ms.r, 1, 32);
- break;
- GETOPT_OPTARG("-t"):
- if (PARSENUM(¶ms.maxtime, optarg, 0, INFINITY)) {
- warnp("Invalid option: -t %s", optarg);
- exit(1);
- }
- break;
- GETOPT_OPT("-v"):
- verbose = 1;
- break;
- GETOPT_OPT("-P"):
- if (passphrase_entry != PASSPHRASE_UNSET) {
- warn0("You can only enter one --passphrase or"
- " -P argument");
- exit(1);
- }
- passphrase_entry = PASSPHRASE_STDIN_ONCE;
- passphrase_arg = "";
- break;
- GETOPT_MISSING_ARG:
- warn0("Missing argument to %s", ch);
- usage();
- GETOPT_DEFAULT:
- warn0("illegal option -- %s", ch);
- usage();
- }
- }
- argc -= optind;
- argv += optind;
- /* We must have one or two parameters left. */
- if ((argc < 1) || (argc > 2))
- usage();
- /* The explicit parameters must be zero, or all non-zero. */
- if ((params.logN != 0) && ((params.r == 0) || (params.p == 0))) {
- warn0("If --logN is set, -r and -p must also be set");
- goto err0;
- }
- if ((params.r != 0) && ((params.logN == 0) || (params.p == 0))) {
- warn0("If -r is set, --logN and -p must also be set");
- goto err0;
- }
- if ((params.p != 0) && ((params.logN == 0) || (params.r == 0))) {
- warn0("If -p is set, --logN and -r must also be set");
- goto err0;
- }
- /* We can't have a maxmemfrac of 0. */
- if (params.maxmemfrac == 0.0) {
- warn0("-m must be greater than 0");
- goto err0;
- }
- /* Set the input filename. */
- if (strcmp(argv[0], "-"))
- infilename = argv[0];
- else
- infilename = NULL;
- /* Set the output filename. */
- if (argc > 1)
- outfilename = argv[1];
- else
- outfilename = NULL;
- /* Set the default passphrase entry method. */
- if (passphrase_entry == PASSPHRASE_UNSET) {
- passphrase_entry = PASSPHRASE_TTY_STDIN;
- passphrase_arg = "";
- }
- /* Sanity check passphrase entry method and input filename. */
- if ((passphrase_entry == PASSPHRASE_STDIN_ONCE) &&
- (infilename == NULL)) {
- warn0("Cannot read both passphrase and input file"
- " from standard input");
- goto err0;
- }
- /* What type of operation are we doing? */
- if (info) {
- /* User selected 'info' mode. */
- if (scrypt_mode_info(infilename))
- goto err0;
- } else {
- /* User selected encryption or decryption. */
- if (scrypt_mode_enc_dec(params, passphrase_entry,
- passphrase_arg, dec, verbose, force_resources,
- infilename, outfilename))
- goto err0;
- }
- /* Success! */
- exit(0);
- err0:
- /* Failure! */
- exit(1);
- }
|