| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330 |
- /* --- BEGIN COPYRIGHT BLOCK ---
- * Copyright (C) 2005 Red Hat, Inc.
- * All rights reserved.
- * --- END COPYRIGHT BLOCK --- */
- // Created: 2-8-2005
- // Author(s): Scott Bridges
- #include "passhand.h"
- #include <time.h>
- #define KEY {0xe8, 0xa7, 0x7c, 0xe2, 0x05, 0x63, 0x6a, 0x31}
- #define IV {0xe4, 0xbb, 0x3b, 0xd3, 0xc3, 0x71, 0x2e, 0x58}
- void timeStamp(fstream* outFile)
- {
- if(outFile->is_open())
- {
- char dateBuf[32];
- char timeBuf[32];
- _strdate(dateBuf);
- _strtime(timeBuf);
- *outFile << dateBuf << " " << timeBuf << ": ";
- }
- }
- int saveSet(PASS_INFO_LIST* passInfoList, char* filename)
- {
- int result = 0;
- fstream outFile;
- PASS_INFO_LIST_ITERATOR currentPair;
- strstream plainTextStream;
- char* cipherTextBuf;
- int usernameLen;
- int passwordLen;
- int plainTextLen;
- int cipherTextLen;
- int resultTextLen = 0;
- int pairCount = passInfoList->size();
- // Write usernames and passwords to a strstream
- plainTextStream.write((char*)&pairCount, sizeof(pairCount));
- for(currentPair = passInfoList->begin(); currentPair != passInfoList->end(); currentPair++)
- {
- // Usernames
- usernameLen = strlen(currentPair->username) + 1;
- plainTextStream.write((char*)&usernameLen, sizeof(usernameLen));
- plainTextStream.write(currentPair->username, usernameLen);
-
- // Passwords
- passwordLen = strlen(currentPair->password) + 1;
- plainTextStream.write((char*)&passwordLen, sizeof(passwordLen));
- plainTextStream.write(currentPair->password, passwordLen);
- }
- plainTextLen = plainTextStream.tellp() - plainTextStream.tellg();
- // cipherTextBuf length must be at least plainTextLen + 8
- cipherTextLen = plainTextLen + 8;
- cipherTextBuf = (char*)malloc(cipherTextLen);
- if(encrypt(plainTextStream.str(), plainTextLen, cipherTextBuf, cipherTextLen, &resultTextLen) != 0)
- {
- result = -1;
- goto exit;
- }
- // Write cipher text to file
- outFile.open(filename, ios::out | ios::binary);
- if(!outFile.is_open())
- {
- result = -1;
- goto exit;
- }
- outFile.write(cipherTextBuf, resultTextLen);
- outFile.close();
- exit:
- return result;
- }
- int loadSet(PASS_INFO_LIST* passInfoList, char* filename)
- {
- int result = 0;
- int i;
- fstream inFile;
- PASS_INFO newPair;
- strstream* plainTextStream;
- char* cipherTextBuf;
- char* plainTextBuf;
- int usernameLen;
- int passwordLen;
- int plainTextLen;
- int cipherTextLen;
- int resultTextLen = 0;
- int pairCount;
- // Read in cipher text from file
- inFile.open(filename, ios::in | ios::binary);
- if(!inFile.is_open())
- {
- result = -1;
- goto exit;
- }
- // Determine file size
- inFile.seekg(0, ios::end);
- cipherTextLen = inFile.tellg();
- inFile.seekg(0, ios::beg);
- // plainTextLen length must be at least cipherTextLen
- plainTextLen = cipherTextLen;
- cipherTextBuf = (char*)malloc(cipherTextLen);
- plainTextBuf = (char*)malloc(plainTextLen);
- inFile.read(cipherTextBuf, cipherTextLen);
- inFile.close();
- if(decrypt(cipherTextBuf, cipherTextLen, plainTextBuf, plainTextLen, &resultTextLen) != 0)
- {
- result = -1;
- goto exit;
- }
- plainTextStream = new strstream(plainTextBuf, resultTextLen);
- plainTextStream->read((char*)&pairCount, sizeof(pairCount));
- // Read usernames and passwords from a strstream
- for(i = 0; i < pairCount; i++)
- {
- // Username
- plainTextStream->read((char*)&usernameLen, sizeof(usernameLen));
- newPair.username = (char*)malloc(usernameLen);
- plainTextStream->read((char*)newPair.username, usernameLen);
- // Password
- plainTextStream->read((char*)&passwordLen, sizeof(passwordLen));
- newPair.password = (char*)malloc(passwordLen);
- plainTextStream->read((char*)newPair.password, passwordLen);
- // Backoff
- newPair.backoffCount = 0;
- // Load time
- time(&newPair.atTime);
- passInfoList->push_back(newPair);
- }
- delete plainTextStream;
- exit:
- return result;
- }
- int clearSet(PASS_INFO_LIST* passInfoList)
- {
- // ToDo: zero out memory
- passInfoList->clear();
- return -1;
- }
- int encrypt(char* plainTextBuf, int plainTextLen, char* cipherTextBuf, int cipherTextLen, int* resultTextLen)
- {
- int result = 0;
- SECStatus rv1, rv2, rv3;
- PK11SlotInfo* slot = NULL;
- PK11SymKey* SymKey = NULL;
- SECItem* SecParam = NULL;
- PK11Context* EncContext = NULL;
- unsigned char gKey[] = KEY;
- unsigned char gIV[] = IV;
- PK11SymKey* key = NULL;
- SECItem keyItem;
- SECItem ivItem;
- CK_MECHANISM_TYPE cipherMech = CKM_DES_CBC_PAD;
- int offset;
- int tempTextLen;
- // Initialize NSS
- rv1 = NSS_NoDB_Init(".");
- if(rv1 != SECSuccess)
- {
- result = PR_GetError();
- goto exit;
- }
- // Get a key slot
- slot = PK11_GetInternalKeySlot();
- if(slot == NULL)
- {
- result = PR_GetError();
- goto exit;
- }
- // Generate a symmetric key
- keyItem.data = gKey;
- keyItem.len = sizeof(gKey);
- SymKey = PK11_ImportSymKey(slot, cipherMech, PK11_OriginUnwrap, CKA_ENCRYPT, &keyItem, NULL);
- if(SymKey == NULL)
- {
- result = PR_GetError();
- goto exit;
- }
- // Set up the PKCS11 encryption paramters
- ivItem.data = gIV;
- ivItem.len = sizeof(gIV);
- SecParam = PK11_ParamFromIV(cipherMech, &ivItem);
- if(SecParam == NULL)
- {
- if(SymKey != NULL)
- {
- PK11_FreeSymKey(SymKey);
- }
- result = PR_GetError();
- goto exit;
- }
- // ToDo: check parameters
- // Encrypt
- tempTextLen = 0;
- EncContext = PK11_CreateContextBySymKey(cipherMech, CKA_ENCRYPT, SymKey, SecParam);
- rv2 = PK11_CipherOp(EncContext, (unsigned char*)cipherTextBuf, &tempTextLen, cipherTextLen, (unsigned char*)plainTextBuf, plainTextLen);
- offset = tempTextLen;
- rv3 = PK11_DigestFinal(EncContext, (unsigned char*)cipherTextBuf + offset, (unsigned int*)&tempTextLen, cipherTextLen - offset);
- *resultTextLen = offset + tempTextLen;
- // Clean up
- PK11_DestroyContext(EncContext, PR_TRUE);
- PK11_FreeSymKey(SymKey);
- SECITEM_FreeItem(SecParam, PR_TRUE);
- if((rv2 != SECSuccess) || (rv2 != SECSuccess))
- {
- result = PR_GetError();
- goto exit;
- }
- exit:
- return result;
- }
- int decrypt(char* cipherTextBuf, int cipherTextLen, char* plainTextBuf, int plainTextLen, int* resultTextLen)
- {
- int result = 0;
- SECStatus rv1, rv2, rv3;
- PK11SlotInfo* slot = NULL;
- PK11SymKey* SymKey = NULL;
- SECItem* SecParam = NULL;
- PK11Context* EncContext = NULL;
- unsigned char gKey[] = KEY;
- unsigned char gIV[] = IV;
- PK11SymKey* key = NULL;
- SECItem keyItem;
- SECItem ivItem;
- CK_MECHANISM_TYPE cipherMech = CKM_DES_CBC_PAD;
- int offset;
- int tempTextLen;
- // Initialize NSS
- rv1 = NSS_NoDB_Init(".");
- if(rv1 != SECSuccess)
- {
- result = PR_GetError();
- goto exit;
- }
- // Get a key slot
- slot = PK11_GetInternalKeySlot();
- if(slot == NULL)
- {
- result = PR_GetError();
- goto exit;
- }
- // Generate a symmetric key
- keyItem.data = gKey;
- keyItem.len = sizeof(gKey);
- SymKey = PK11_ImportSymKey(slot, cipherMech, PK11_OriginUnwrap, CKA_ENCRYPT, &keyItem, NULL);
- if(SymKey == NULL)
- {
- result = PR_GetError();
- goto exit;
- }
- // Set up the PKCS11 encryption paramters
- ivItem.data = gIV;
- ivItem.len = sizeof(gIV);
- SecParam = PK11_ParamFromIV(cipherMech, &ivItem);
- if(SecParam == NULL)
- {
- if(SymKey != NULL)
- {
- PK11_FreeSymKey(SymKey);
- }
- result = PR_GetError();
- goto exit;
- }
- // ToDo: check parameters
- // Decrypt
- tempTextLen = 0;
- EncContext = PK11_CreateContextBySymKey(cipherMech, CKA_DECRYPT, SymKey, SecParam);
- rv2 = PK11_CipherOp(EncContext, (unsigned char*)plainTextBuf, &tempTextLen, plainTextLen, (unsigned char*)cipherTextBuf, cipherTextLen);
- offset = tempTextLen;
- rv3 = PK11_DigestFinal(EncContext, (unsigned char*)plainTextBuf + offset, (unsigned int*)&tempTextLen, plainTextLen - offset);
- *resultTextLen = offset + tempTextLen;
- // Clean up
- PK11_DestroyContext(EncContext, PR_TRUE);
- PK11_FreeSymKey(SymKey);
- SECITEM_FreeItem(SecParam, PR_TRUE);
- if((rv2 != SECSuccess) || (rv2 != SECSuccess))
- {
- result = PR_GetError();
- goto exit;
- }
- exit:
- return result;
- }
|