This repository has been archived on 2025-06-24. You can view files and clone it, but you cannot make any changes to it's state, such as pushing and creating new issues, pull requests or comments.
scrypt-genpass/main.c

206 lines
4.8 KiB
C

/*-
* Copyright 2009 Colin Percival
* All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
*
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
* SUCH DAMAGE.
*/
#include "scrypt_platform.h"
#include <inttypes.h>
#include <stdint.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <unistd.h>
#include "readpass.h"
#include "genpass.h"
#include "warn.h"
static void
usage(void)
{
fprintf(stderr,
"usage: scrypt-genpass [-m MAXMEM] [-o MAXOPS] [-k KEYFILE] [-p PASS] <site>\n");
exit(1);
}
int
main(int argc, char *argv[])
{
FILE * infile = NULL;
FILE * outfile = stdout;
int dec = 0;
int passwdlen = 0;
uint32_t maxmem = 1000;
uint32_t megaops = 32;
char ch;
char * keyfile = NULL;
char * passwd = NULL;
int rc;
int i;
#ifdef NEED_WARN_PROGNAME
warn_progname = "scrypt-genpass";
#endif
if (argc < 1)
usage();
/* Parse arguments. */
while ((ch = getopt(argc, argv, "hk:m:o:p:")) != -1) {
switch (ch) {
case 'k':
keyfile = strdup(optarg);
case 'm':
maxmem = atoi(optarg);
break;
case 'o':
megaops = atoi(optarg);
break;
case 'p':
passwd = strdup(optarg);
break;
default:
usage();
}
}
argc -= optind;
argv += optind;
/* We must have one parameters left. */
if (argc != 1)
usage();
if (!passwd) {
/* Prompt for a password. */
if (tarsnap_readpass(&passwd, "Please enter passphrase",
dec ? NULL : "Please confirm passphrase", 1))
exit(1);
}
passwdlen = strlen(passwd);
if (keyfile) {
FILE *fp;
size_t keyfilelen;
fp = fopen(keyfile, "rb");
if (fp) {
fseek(fp, 0, SEEK_END);
keyfilelen = ftell(fp);
fseek(fp, 0, SEEK_SET);
printf("DEBUG: keyfilelen = %d\n", keyfilelen);
uint8_t* combinedkey = malloc(passwdlen + keyfilelen + 1);
if (combinedkey) {
strcpy(combinedkey, passwd);
memset(passwd, 0, passwdlen);
free(passwd);
int n = fread(combinedkey + passwdlen, keyfilelen, 1, fp);
/* n == number of items read == 1 */
fclose(fp);
printf("DEBUG: n = %d\n", n);
passwd = combinedkey;
passwdlen += keyfilelen;
printf("DEBUG: combinedkey = %s\n", passwd);
} else {
rc = 15;
}
} else {
rc = 14;
}
}
uint8_t passhash[32];
sha256string(passhash, passwd, passwdlen);
char buf1[65];
bintohex(buf1, 32, passhash);
printf("Master hex: %s\n", buf1);
uint8_t dk[64];
rc = genpass(dk, (uint8_t *)passwd, passwdlen, (void*) *argv,
maxmem, megaops);
/* Zero and free the password. */
memset(passwd, 0, passwdlen);
free(passwd);
free(keyfile);
char buf[129];
bintohex(buf, 64, dk);
printf("Hex passkey: %s\n", buf);
/* If we failed, print the right error message and exit. */
if (rc != 0) {
switch (rc) {
case 1:
warn("Error determining amount of available memory");
break;
case 2:
warn("Error reading clocks");
break;
case 3:
warn("Error computing derived key");
break;
case 4:
warn("Error reading salt");
break;
case 5:
warn("OpenSSL error");
break;
case 6:
warn("Error allocating memory");
break;
case 7:
warnx("Input is not valid scrypt-encrypted block");
break;
case 8:
warnx("Unrecognized scrypt format version");
break;
case 9:
warnx("Decrypting file would require too much memory");
break;
case 10:
warnx("Decrypting file would take too much CPU time");
break;
case 11:
warnx("Passphrase is incorrect");
break;
case 12:
warn("Error writing file: %s",
(argc > 1) ? argv[1] : "standard output");
break;
case 13:
warn("Error reading file: %s", argv[0]);
break;
case 14:
warn("Unable to open keyfile: %s", keyfile);
break;
case 15:
warn("Unable to allocate memory for combined key");
break;
}
exit(1);
}
return (0);
}