Add keyfile support. Not entirely working yet.
This commit is contained in:
parent
5a3a8506fc
commit
3dd81551c6
3 changed files with 52 additions and 9 deletions
|
@ -152,18 +152,18 @@ bintohex(char* outstring, size_t nbytes, uint8_t* data)
|
||||||
}
|
}
|
||||||
|
|
||||||
int
|
int
|
||||||
sha256string(uint8_t hash[32], char* s)
|
sha256string(uint8_t hash[32], uint8_t* s, int n)
|
||||||
{
|
{
|
||||||
SHA256_CTX sha256_ctx;
|
SHA256_CTX sha256_ctx;
|
||||||
SHA256_Init(&sha256_ctx);
|
SHA256_Init(&sha256_ctx);
|
||||||
SHA256_Update(&sha256_ctx, (void*) s, strlen(s));
|
SHA256_Update(&sha256_ctx, (void*) s, n);
|
||||||
SHA256_Final(hash, &sha256_ctx);
|
SHA256_Final(hash, &sha256_ctx);
|
||||||
}
|
}
|
||||||
|
|
||||||
static int
|
static int
|
||||||
getsalt(uint8_t salt[32], void* site)
|
getsalt(uint8_t salt[32], void* site)
|
||||||
{
|
{
|
||||||
sha256string(salt, site);
|
sha256string(salt, site, strlen(site));
|
||||||
char buf[65];
|
char buf[65];
|
||||||
bintohex(buf, 32, salt);
|
bintohex(buf, 32, salt);
|
||||||
printf("Site hex: %s\n", buf);
|
printf("Site hex: %s\n", buf);
|
||||||
|
|
|
@ -73,7 +73,7 @@
|
||||||
*/
|
*/
|
||||||
int bintohex(char* outstring, size_t nbytes, uint8_t* data);
|
int bintohex(char* outstring, size_t nbytes, uint8_t* data);
|
||||||
|
|
||||||
int sha256string(uint8_t* hash, char* s);
|
int sha256string(uint8_t* hash, uint8_t* s, int n);
|
||||||
|
|
||||||
int genpass(uint8_t dk[64],
|
int genpass(uint8_t dk[64],
|
||||||
const uint8_t * passwd, size_t passwdlen, void* site,
|
const uint8_t * passwd, size_t passwdlen, void* site,
|
||||||
|
|
53
main.c
53
main.c
|
@ -41,7 +41,7 @@ usage(void)
|
||||||
{
|
{
|
||||||
|
|
||||||
fprintf(stderr,
|
fprintf(stderr,
|
||||||
"usage: scrypt-genpass [-m MAXMEM] [-o MAXOPS] [-p PASS] <site>\n");
|
"usage: scrypt-genpass [-m MAXMEM] [-o MAXOPS] [-k KEYFILE] [-p PASS] <site>\n");
|
||||||
exit(1);
|
exit(1);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -51,9 +51,11 @@ main(int argc, char *argv[])
|
||||||
FILE * infile = NULL;
|
FILE * infile = NULL;
|
||||||
FILE * outfile = stdout;
|
FILE * outfile = stdout;
|
||||||
int dec = 0;
|
int dec = 0;
|
||||||
|
int passwdlen = 0;
|
||||||
uint32_t maxmem = 1000;
|
uint32_t maxmem = 1000;
|
||||||
uint32_t megaops = 32;
|
uint32_t megaops = 32;
|
||||||
char ch;
|
char ch;
|
||||||
|
char * keyfile = NULL;
|
||||||
char * passwd = NULL;
|
char * passwd = NULL;
|
||||||
int rc;
|
int rc;
|
||||||
int i;
|
int i;
|
||||||
|
@ -66,8 +68,10 @@ main(int argc, char *argv[])
|
||||||
usage();
|
usage();
|
||||||
|
|
||||||
/* Parse arguments. */
|
/* Parse arguments. */
|
||||||
while ((ch = getopt(argc, argv, "hm:o:p:")) != -1) {
|
while ((ch = getopt(argc, argv, "hk:m:o:p:")) != -1) {
|
||||||
switch (ch) {
|
switch (ch) {
|
||||||
|
case 'k':
|
||||||
|
keyfile = strdup(optarg);
|
||||||
case 'm':
|
case 'm':
|
||||||
maxmem = atoi(optarg);
|
maxmem = atoi(optarg);
|
||||||
break;
|
break;
|
||||||
|
@ -94,19 +98,52 @@ main(int argc, char *argv[])
|
||||||
dec ? NULL : "Please confirm passphrase", 1))
|
dec ? NULL : "Please confirm passphrase", 1))
|
||||||
exit(1);
|
exit(1);
|
||||||
}
|
}
|
||||||
|
passwdlen = strlen(passwd);
|
||||||
|
|
||||||
|
if (keyfile) {
|
||||||
|
FILE *fp;
|
||||||
|
size_t keyfilelen;
|
||||||
|
|
||||||
|
fp = fopen(keyfile, "rb");
|
||||||
|
if (fp) {
|
||||||
|
fseek(fp, 0, SEEK_END);
|
||||||
|
keyfilelen = ftell(fp);
|
||||||
|
fseek(fp, 0, SEEK_SET);
|
||||||
|
printf("DEBUG: keyfilelen = %d\n", keyfilelen);
|
||||||
|
uint8_t* combinedkey = malloc(passwdlen + keyfilelen + 1);
|
||||||
|
if (combinedkey) {
|
||||||
|
strcpy(combinedkey, passwd);
|
||||||
|
memset(passwd, 0, passwdlen);
|
||||||
|
free(passwd);
|
||||||
|
int n = fread(combinedkey + passwdlen, keyfilelen, 1, fp);
|
||||||
|
/* n == number of items read == 1 */
|
||||||
|
fclose(fp);
|
||||||
|
printf("DEBUG: n = %d\n", n);
|
||||||
|
passwd = combinedkey;
|
||||||
|
passwdlen += keyfilelen;
|
||||||
|
printf("DEBUG: combinedkey = %s\n", passwd);
|
||||||
|
} else {
|
||||||
|
rc = 15;
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
rc = 14;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
uint8_t passhash[32];
|
uint8_t passhash[32];
|
||||||
sha256string(passhash, passwd);
|
sha256string(passhash, passwd, passwdlen);
|
||||||
char buf1[65];
|
char buf1[65];
|
||||||
bintohex(buf1, 32, passhash);
|
bintohex(buf1, 32, passhash);
|
||||||
printf("Master hex: %s\n", buf1);
|
printf("Master hex: %s\n", buf1);
|
||||||
|
|
||||||
uint8_t dk[64];
|
uint8_t dk[64];
|
||||||
rc = genpass(dk, (uint8_t *)passwd, strlen(passwd), (void*) *argv,
|
rc = genpass(dk, (uint8_t *)passwd, passwdlen, (void*) *argv,
|
||||||
maxmem, megaops);
|
maxmem, megaops);
|
||||||
|
|
||||||
/* Zero and free the password. */
|
/* Zero and free the password. */
|
||||||
memset(passwd, 0, strlen(passwd));
|
memset(passwd, 0, passwdlen);
|
||||||
free(passwd);
|
free(passwd);
|
||||||
|
free(keyfile);
|
||||||
|
|
||||||
char buf[129];
|
char buf[129];
|
||||||
bintohex(buf, 64, dk);
|
bintohex(buf, 64, dk);
|
||||||
|
@ -155,6 +192,12 @@ main(int argc, char *argv[])
|
||||||
case 13:
|
case 13:
|
||||||
warn("Error reading file: %s", argv[0]);
|
warn("Error reading file: %s", argv[0]);
|
||||||
break;
|
break;
|
||||||
|
case 14:
|
||||||
|
warn("Unable to open keyfile: %s", keyfile);
|
||||||
|
break;
|
||||||
|
case 15:
|
||||||
|
warn("Unable to allocate memory for combined key");
|
||||||
|
break;
|
||||||
}
|
}
|
||||||
exit(1);
|
exit(1);
|
||||||
}
|
}
|
||||||
|
|
Reference in a new issue