Compare commits
6 commits
42c8250815
...
07d35d6684
Author | SHA1 | Date | |
---|---|---|---|
07d35d6684 | |||
80140fa867 | |||
b589296455 | |||
95ddaf0e18 | |||
d813622ed9 | |||
9834e850a5 |
6 changed files with 1533 additions and 337 deletions
5
Makefile
5
Makefile
|
@ -8,10 +8,7 @@ BINDIR = $(PREFIX)/bin
|
|||
MANDIR = $(PREFIX)/share/man/man1
|
||||
PKG_CONFIG = pkg-config
|
||||
|
||||
PKGS = libsodium
|
||||
LIBS != $(PKG_CONFIG) --libs $(PKGS)
|
||||
INCS != $(PKG_CONFIG) --cflags $(PKGS)
|
||||
CFLAGS += -std=c99 -pedantic -Wall -D_DEFAULT_SOURCE $(INCS)
|
||||
CFLAGS += -std=c99 -pedantic -Wall -D_DEFAULT_SOURCE
|
||||
|
||||
.c.o:
|
||||
$(CC) -o $@ $(CFLAGS) -c $<
|
||||
|
|
|
@ -1,7 +1,5 @@
|
|||
# apm
|
||||
apm, argon password manager; a simple implementation of [pass](https://www.passwordstore.org/)(1) in C. It uses a unique key to encrypt every password, it provides functionality to edit, add, generate, show, list, remove passwords. It uses argon2 to create hash of master password and uses XSalsa20 to encrypt the password.
|
||||
|
||||
> The name "argon" is chosen as it uses argon2 algorithm and sodium(library) is stored with argon.
|
||||
A simple implementation of [pass](https://www.passwordstore.org/)(1) in C. It uses a unique key to encrypt every password, it provides functionality to edit, add, generate, show, list, remove passwords. It uses blake2b to create hash of master password and uses AES256-CBC to encrypt the password.
|
||||
|
||||
Before using apm, you must export 2 environment variables in order to make it work
|
||||
```sh
|
||||
|
@ -17,7 +15,7 @@ Usage: apm [-vhL] [[-e | -R | -I | -Q] <password>] [-M <file>] [-G <password> <l
|
|||
```
|
||||
|
||||
# Dependencies
|
||||
- libsodium
|
||||
None
|
||||
|
||||
# Building
|
||||
You will need to run these with elevated privilages.
|
||||
|
|
2
apm.1
2
apm.1
|
@ -14,7 +14,7 @@ apm \- Minimalistic password manager
|
|||
.RB [ \-G ]
|
||||
|
||||
.SH DESCRIPTION
|
||||
apm is a minimalistic command line password manager and a rewrite of pass in C. It uses a unique key to encrypt every password, it provides functionality to edit, add, generate, show, list, remove passwords. It uses argon2 to create hash of master password and uses XSalsa20 to encrypt the password.
|
||||
Simple implementation of pass in C. It uses a unique key to encrypt every password, it provides functionality to edit, add, generate, show, list, remove passwords. It uses blake2b to create hash of master password and uses AES256-CBC to encrypt the password.
|
||||
|
||||
.SH OPTIONS
|
||||
.TP
|
||||
|
|
635
apm.c
635
apm.c
|
@ -1,416 +1,395 @@
|
|||
#include <dirent.h>
|
||||
#include <libgen.h>
|
||||
#include <linux/limits.h>
|
||||
#include <stdio.h>
|
||||
#include <stdlib.h>
|
||||
#include <string.h>
|
||||
#include <unistd.h>
|
||||
#include <dirent.h>
|
||||
#include <libgen.h>
|
||||
#include <time.h>
|
||||
#include <sys/stat.h>
|
||||
#include <sys/resource.h>
|
||||
#include <linux/limits.h>
|
||||
|
||||
#include <sodium.h>
|
||||
#include <sys/stat.h>
|
||||
#include <time.h>
|
||||
#include <unistd.h>
|
||||
|
||||
#include "arg.h"
|
||||
|
||||
#define KEY_SIZE crypto_secretbox_KEYBYTES
|
||||
#define NONCE_SIZE crypto_secretbox_NONCEBYTES
|
||||
#define SALT_SIZE crypto_pwhash_SALTBYTES
|
||||
#include "aes256.h"
|
||||
#include "blake2b.h"
|
||||
|
||||
#define KEY_SIZE 32
|
||||
#define IV_SIZE 16
|
||||
|
||||
char *argv0;
|
||||
|
||||
void die(char *str);
|
||||
char *get_master_key(void);
|
||||
void random_bytes(uint8_t *bytes, size_t size);
|
||||
|
||||
void *memalloc(size_t size)
|
||||
{
|
||||
void *ptr = malloc(size);
|
||||
if (!ptr) {
|
||||
perror("apm");
|
||||
exit(EXIT_FAILURE);
|
||||
}
|
||||
return ptr;
|
||||
void *ptr = malloc(size);
|
||||
if (!ptr) {
|
||||
perror("apm");
|
||||
exit(EXIT_FAILURE);
|
||||
}
|
||||
return ptr;
|
||||
}
|
||||
|
||||
void usage(void)
|
||||
{
|
||||
printf("Usage: %s [-vhL] [[-e | -R | -I | -Q] <password>] [-M <file>] [-G <password> <length>]\n", argv0);
|
||||
exit(EXIT_SUCCESS);
|
||||
printf("Usage: %s [-vhL] [[-e | -R | -I | -Q] <password>] [-M <file>] [-G <password> <length>]\n", argv0);
|
||||
exit(EXIT_SUCCESS);
|
||||
}
|
||||
|
||||
int compare(const void *a, const void *b)
|
||||
{
|
||||
return strcmp(*(const char **)a, *(const char **)b);
|
||||
return strcmp(*(const char **)a, *(const char **)b);
|
||||
}
|
||||
|
||||
void tree(const char *basepath, int depth)
|
||||
{
|
||||
char path[PATH_MAX];
|
||||
struct dirent *dp;
|
||||
DIR *dir = opendir(basepath);
|
||||
char path[PATH_MAX];
|
||||
struct dirent *dp;
|
||||
DIR *dir = opendir(basepath);
|
||||
|
||||
if (!dir)
|
||||
return;
|
||||
if (!dir)
|
||||
return;
|
||||
|
||||
/* max 1024 files */
|
||||
char *files[1024];
|
||||
int file_count = 0;
|
||||
/* max 1024 files */
|
||||
char *files[1024];
|
||||
int file_count = 0;
|
||||
|
||||
while ((dp = readdir(dir)) != NULL) {
|
||||
if (strcmp(dp->d_name, ".") != 0 && strcmp(dp->d_name, "..") != 0) {
|
||||
files[file_count] = strdup(dp->d_name);
|
||||
file_count++;
|
||||
}
|
||||
}
|
||||
while ((dp = readdir(dir)) != NULL) {
|
||||
if (strcmp(dp->d_name, ".") != 0 && strcmp(dp->d_name, "..") != 0) {
|
||||
files[file_count] = strdup(dp->d_name);
|
||||
file_count++;
|
||||
}
|
||||
}
|
||||
|
||||
qsort(files, file_count, sizeof(char *), compare);
|
||||
qsort(files, file_count, sizeof(char *), compare);
|
||||
|
||||
for (int i = 0; i < file_count; i++) {
|
||||
for (int j = 0; j < depth - 1; j++) {
|
||||
printf("│ ");
|
||||
}
|
||||
for (int i = 0; i < file_count; i++) {
|
||||
for (int j = 0; j < depth - 1; j++) {
|
||||
printf("│ ");
|
||||
}
|
||||
|
||||
if (depth > 0) {
|
||||
printf("├── ");
|
||||
}
|
||||
if (depth > 0) {
|
||||
printf("├── ");
|
||||
}
|
||||
|
||||
printf("%s\n", files[i]);
|
||||
printf("%s\n", files[i]);
|
||||
|
||||
strcpy(path, basepath);
|
||||
strcat(path, "/");
|
||||
strcat(path, files[i]);
|
||||
strcpy(path, basepath);
|
||||
strcat(path, "/");
|
||||
strcat(path, files[i]);
|
||||
|
||||
tree(path, depth + 1);
|
||||
tree(path, depth + 1);
|
||||
|
||||
free(files[i]);
|
||||
}
|
||||
free(files[i]);
|
||||
}
|
||||
|
||||
closedir(dir);
|
||||
closedir(dir);
|
||||
}
|
||||
|
||||
char *get_apm(void)
|
||||
{
|
||||
char dirname[] = "apm";
|
||||
const char *apm_dir = getenv("APM_DIR");
|
||||
/* for / and null */
|
||||
size_t len = 2;
|
||||
if (apm_dir == NULL) {
|
||||
apm_dir = getenv("XDG_DATA_HOME");
|
||||
if (apm_dir == NULL) {
|
||||
apm_dir = getenv("HOME");
|
||||
if (apm_dir == NULL) {
|
||||
die("HOME not defined");
|
||||
}
|
||||
}
|
||||
len += strlen(dirname);
|
||||
} else {
|
||||
/* no / */
|
||||
len -= 1;
|
||||
}
|
||||
size_t dir_len = strlen(apm_dir);
|
||||
len += dir_len;
|
||||
char *dir = memalloc(len);
|
||||
char dirname[] = "apm";
|
||||
const char *apm_dir = getenv("APM_DIR");
|
||||
/* for / and null */
|
||||
size_t len = 2;
|
||||
if (apm_dir == NULL) {
|
||||
apm_dir = getenv("XDG_DATA_HOME");
|
||||
if (apm_dir == NULL) {
|
||||
apm_dir = getenv("HOME");
|
||||
if (apm_dir == NULL) {
|
||||
die("HOME not defined");
|
||||
}
|
||||
}
|
||||
len += strlen(dirname);
|
||||
} else {
|
||||
/* no / */
|
||||
len -= 1;
|
||||
}
|
||||
size_t dir_len = strlen(apm_dir);
|
||||
len += dir_len;
|
||||
char *dir = memalloc(len);
|
||||
|
||||
/* check if it is apm_DIR or other */
|
||||
if (len > dir_len) {
|
||||
snprintf(dir, len, "%s/%s", apm_dir, dirname);
|
||||
} else {
|
||||
strncpy(dir, apm_dir, len);
|
||||
}
|
||||
struct stat stats;
|
||||
/* check defined path is directory */
|
||||
if (!((stat(dir, &stats) == 0) && S_ISDIR(stats.st_mode))) {
|
||||
if (mkdir(dir, S_IRWXU)) { /* 700 */
|
||||
die("Cannot initialize directory");
|
||||
}
|
||||
}
|
||||
return dir;
|
||||
/* check if it is apm_DIR or other */
|
||||
if (len > dir_len) {
|
||||
snprintf(dir, len, "%s/%s", apm_dir, dirname);
|
||||
} else {
|
||||
strncpy(dir, apm_dir, len);
|
||||
}
|
||||
struct stat stats;
|
||||
/* check defined path is directory */
|
||||
if (!((stat(dir, &stats) == 0) && S_ISDIR(stats.st_mode))) {
|
||||
if (mkdir(dir, S_IRWXU)) { /* 700 */
|
||||
die("Cannot initialize directory");
|
||||
}
|
||||
}
|
||||
return dir;
|
||||
}
|
||||
|
||||
char *get_passfile(const char *key)
|
||||
{
|
||||
char *dir = get_apm();
|
||||
/* concat file name */
|
||||
/* / and null */
|
||||
size_t len = strlen(dir) + strlen(key) + 2;
|
||||
char *path = memalloc(len);
|
||||
snprintf(path, len, "%s/%s", dir, key);
|
||||
free(dir);
|
||||
return path;
|
||||
char *dir = get_apm();
|
||||
/* concat file name */
|
||||
/* / and null */
|
||||
size_t len = strlen(dir) + strlen(key) + 2;
|
||||
char *path = memalloc(len);
|
||||
snprintf(path, len, "%s/%s", dir, key);
|
||||
free(dir);
|
||||
return path;
|
||||
}
|
||||
|
||||
char *get_password(void)
|
||||
{
|
||||
size_t len;
|
||||
char *password = NULL;
|
||||
size_t len;
|
||||
char *password = NULL;
|
||||
|
||||
printf("Enter password to encrypt: \n");
|
||||
|
||||
getline(&password, &len, stdin);
|
||||
/* remove newline character */
|
||||
password[strcspn(password, "\n")] = '\0';
|
||||
return password;
|
||||
/* remove newline character */
|
||||
password[strcspn(password, "\n")] = '\0';
|
||||
return password;
|
||||
}
|
||||
|
||||
void encrypt_password(const char *name, char *password)
|
||||
{
|
||||
char *m_key = get_master_key();
|
||||
unsigned char salt[SALT_SIZE];
|
||||
unsigned char key[KEY_SIZE];
|
||||
unsigned char nonce[NONCE_SIZE];
|
||||
char *m_key = get_master_key();
|
||||
uint8_t key[KEY_SIZE];
|
||||
uint8_t iv[IV_SIZE];
|
||||
|
||||
/* generate random bytes for salt and nonce(number used once) */
|
||||
randombytes_buf(salt, sizeof(salt));
|
||||
randombytes_buf(nonce, sizeof(nonce));
|
||||
/* hash master password to give us the key for encrypting the password */
|
||||
if (crypto_pwhash(key, sizeof(key), m_key, strlen(m_key), salt,
|
||||
crypto_pwhash_OPSLIMIT_INTERACTIVE,
|
||||
crypto_pwhash_MEMLIMIT_INTERACTIVE,
|
||||
crypto_pwhash_ALG_DEFAULT) != 0) {
|
||||
sodium_free(m_key);
|
||||
perror("apm");
|
||||
die("Cannot create key");
|
||||
}
|
||||
size_t pw_len = strlen(password);
|
||||
/* Include space for authentication tag */
|
||||
size_t ciphered_len = crypto_secretbox_MACBYTES + pw_len;
|
||||
char ciphered[ciphered_len];
|
||||
/* generate random bytes for iv */
|
||||
random_bytes(iv, sizeof(iv));
|
||||
/* hash master password to give us the key for encrypting the password */
|
||||
blake2b(key, KEY_SIZE, NULL, 0, m_key, strlen(m_key));
|
||||
|
||||
/* encrypt password */
|
||||
if (crypto_secretbox_easy((unsigned char *) ciphered,
|
||||
(unsigned char *) password, pw_len,
|
||||
nonce, key) != 0) {
|
||||
sodium_free(m_key);
|
||||
die("Error encrypting password");
|
||||
}
|
||||
size_t pw_len = strlen(password);
|
||||
/* find last \n and replace with 0 */
|
||||
strrchr(password, '\n')[0] = '\0';
|
||||
char data[1024]; /* max 1024 bytes */
|
||||
strcpy(data, password);
|
||||
|
||||
char *filepath = get_passfile(name);
|
||||
FILE *file = fopen(filepath, "wb");
|
||||
if (file == NULL) {
|
||||
sodium_free(m_key);
|
||||
free(filepath);
|
||||
die("Error opening pass file to write");
|
||||
}
|
||||
|
||||
fwrite(salt, sizeof(salt), 1, file);
|
||||
fwrite(nonce, sizeof(nonce), 1, file);
|
||||
fwrite(ciphered, ciphered_len, 1, file);
|
||||
size_t data_len = EncryptData((uint8_t *) data, pw_len, key, iv);
|
||||
|
||||
fclose(file);
|
||||
free(filepath);
|
||||
sodium_free(m_key);
|
||||
char *filepath = get_passfile(name);
|
||||
FILE *file = fopen(filepath, "wb");
|
||||
if (file == NULL) {
|
||||
free(m_key);
|
||||
free(filepath);
|
||||
die("Error opening pass file to write");
|
||||
}
|
||||
|
||||
fwrite(iv, sizeof(iv), 1, file);
|
||||
fwrite(data, data_len, 1, file);
|
||||
|
||||
fclose(file);
|
||||
free(filepath);
|
||||
free(m_key);
|
||||
}
|
||||
|
||||
void decrypt_password(const char *name, int open)
|
||||
{
|
||||
char *m_key = get_master_key();
|
||||
unsigned char salt[SALT_SIZE];
|
||||
unsigned char nonce[NONCE_SIZE];
|
||||
unsigned char key[KEY_SIZE];
|
||||
char *m_key = get_master_key();
|
||||
uint8_t key[KEY_SIZE];
|
||||
uint8_t iv[IV_SIZE];
|
||||
|
||||
char *filepath = get_passfile(name);
|
||||
FILE *file = fopen(filepath, "rb");
|
||||
if (file == NULL) {
|
||||
sodium_free(m_key);
|
||||
free(filepath);
|
||||
die("Error opening pass file to read");
|
||||
}
|
||||
|
||||
/* get salt and nonce from file */
|
||||
fread(salt, sizeof(char), sizeof(salt), file);
|
||||
fread(nonce, sizeof(char), sizeof(nonce), file);
|
||||
char *filepath = get_passfile(name);
|
||||
FILE *file = fopen(filepath, "rb");
|
||||
if (file == NULL) {
|
||||
free(m_key);
|
||||
free(filepath);
|
||||
die("Error opening pass file to read");
|
||||
}
|
||||
|
||||
fseek(file, 0, SEEK_END);
|
||||
size_t ciphered_len = ftell(file) - sizeof(salt) - sizeof(nonce);
|
||||
fseek(file, sizeof(salt) + sizeof(nonce), SEEK_SET);
|
||||
/* get iv from file */
|
||||
fread(iv, 1, sizeof(iv), file);
|
||||
|
||||
char ciphered[ciphered_len];
|
||||
fread(ciphered, sizeof(char), ciphered_len, file);
|
||||
if (crypto_pwhash(key, sizeof(key), m_key, strlen(m_key), salt,
|
||||
crypto_pwhash_OPSLIMIT_INTERACTIVE,
|
||||
crypto_pwhash_MEMLIMIT_INTERACTIVE,
|
||||
crypto_pwhash_ALG_DEFAULT) != 0) {
|
||||
sodium_free(m_key);
|
||||
free(filepath);
|
||||
perror("apm");
|
||||
die("Cannot create key");
|
||||
}
|
||||
/* take authentication bytes away */
|
||||
size_t deciphered_len = ciphered_len - crypto_secretbox_MACBYTES;
|
||||
char deciphered[deciphered_len];
|
||||
if (crypto_secretbox_open_easy((unsigned char *) deciphered,
|
||||
(unsigned char *) ciphered, ciphered_len, nonce, key) != 0) {
|
||||
sodium_free(m_key);
|
||||
free(filepath);
|
||||
fclose(file);
|
||||
die("Error decrypting password");
|
||||
}
|
||||
fseek(file, 0, SEEK_END);
|
||||
if (ftell(file) <= sizeof(iv)) {
|
||||
free(m_key);
|
||||
free(filepath);
|
||||
fclose(file);
|
||||
die("Empty file");
|
||||
}
|
||||
size_t ciphered_len = ftell(file) - sizeof(iv);
|
||||
fseek(file, sizeof(iv), SEEK_SET);
|
||||
|
||||
deciphered[deciphered_len] = '\0';
|
||||
if (open) {
|
||||
char *editor = getenv("EDITOR");
|
||||
if (editor == NULL) {
|
||||
die("EDITOR not defined");
|
||||
}
|
||||
char tmp_f[] = "/tmp/apm";
|
||||
FILE *tmp = fopen(tmp_f, "w+");
|
||||
fprintf(tmp, "%s\n", deciphered);
|
||||
fclose(tmp);
|
||||
char *cmd = memalloc(strlen(editor) + strlen(tmp_f) + 1);
|
||||
sprintf(cmd, "%s %s", editor, tmp_f);
|
||||
system(cmd);
|
||||
free(cmd);
|
||||
tmp = fopen(tmp_f, "r");
|
||||
fseek(tmp, 0, SEEK_END);
|
||||
long tmp_size = ftell(tmp);
|
||||
fseek(tmp, 0, SEEK_SET);
|
||||
char content[tmp_size + 1];
|
||||
fread(content, tmp_size, sizeof(char), tmp);
|
||||
encrypt_password(name, content);
|
||||
fclose(tmp);
|
||||
} else {
|
||||
printf("%s\n", deciphered);
|
||||
}
|
||||
char ciphered[ciphered_len];
|
||||
fread(ciphered, 1, ciphered_len, file);
|
||||
blake2b(key, KEY_SIZE, NULL, 0, m_key, strlen(m_key));
|
||||
|
||||
sodium_free(m_key);
|
||||
fclose(file);
|
||||
size_t data_len = DecryptData((uint8_t *) ciphered, ciphered_len, key, iv);
|
||||
ciphered[data_len] = '\0';
|
||||
|
||||
if (open) {
|
||||
char *editor = getenv("EDITOR");
|
||||
if (editor == NULL) {
|
||||
die("EDITOR not defined");
|
||||
}
|
||||
char tmp_f[] = "/tmp/apm";
|
||||
FILE *tmp = fopen(tmp_f, "w+");
|
||||
fprintf(tmp, "%s\n", ciphered);
|
||||
fclose(tmp);
|
||||
char *cmd = memalloc(strlen(editor) + strlen(tmp_f) + 1);
|
||||
sprintf(cmd, "%s %s", editor, tmp_f);
|
||||
system(cmd);
|
||||
free(cmd);
|
||||
tmp = fopen(tmp_f, "r");
|
||||
fseek(tmp, 0, SEEK_END);
|
||||
long tmp_size = ftell(tmp);
|
||||
fseek(tmp, 0, SEEK_SET);
|
||||
char content[tmp_size + 1];
|
||||
fread(content, tmp_size, sizeof(char), tmp);
|
||||
encrypt_password(name, content);
|
||||
fclose(tmp);
|
||||
} else {
|
||||
printf("%s\n", ciphered);
|
||||
}
|
||||
|
||||
free(m_key);
|
||||
fclose(file);
|
||||
}
|
||||
|
||||
char *get_master_key(void)
|
||||
{
|
||||
char *key_path = getenv("APM_KEY");
|
||||
char *m_key = NULL;
|
||||
if (key_path != NULL) {
|
||||
FILE *key_file = fopen(key_path, "r");
|
||||
if (key_file == NULL) {
|
||||
perror("apm");
|
||||
exit(EXIT_FAILURE);
|
||||
}
|
||||
struct stat st;
|
||||
if ((fstat(fileno(key_file), &st) == 0) || (S_ISREG(st.st_mode))) {
|
||||
size_t pass_size = st.st_size;
|
||||
m_key = (char *) sodium_malloc(pass_size);
|
||||
if (m_key == NULL) {
|
||||
perror("apm");
|
||||
exit(EXIT_FAILURE);
|
||||
}
|
||||
if (fgets(m_key, pass_size, key_file) == NULL) {
|
||||
perror("apm");
|
||||
exit(EXIT_FAILURE);
|
||||
}
|
||||
}
|
||||
} else {
|
||||
fprintf(stderr, "apm: You are required to set APM_KEY to pass file\n");
|
||||
exit(EXIT_FAILURE);
|
||||
}
|
||||
return m_key;
|
||||
char *key_path = getenv("APM_KEY");
|
||||
char *m_key = NULL;
|
||||
if (key_path != NULL) {
|
||||
FILE *key_file = fopen(key_path, "r");
|
||||
if (key_file == NULL) {
|
||||
perror("apm");
|
||||
exit(EXIT_FAILURE);
|
||||
}
|
||||
struct stat st;
|
||||
if ((fstat(fileno(key_file), &st) == 0) || (S_ISREG(st.st_mode))) {
|
||||
size_t pass_size = st.st_size;
|
||||
m_key = memalloc(pass_size);
|
||||
if (fgets(m_key, pass_size, key_file) == NULL) {
|
||||
perror("apm");
|
||||
exit(EXIT_FAILURE);
|
||||
}
|
||||
}
|
||||
} else {
|
||||
fprintf(stderr, "apm: You are required to set APM_KEY to pass file\n");
|
||||
exit(EXIT_FAILURE);
|
||||
}
|
||||
return m_key;
|
||||
}
|
||||
|
||||
void generate_password(char*name, int length)
|
||||
void random_bytes(uint8_t *bytes, size_t size)
|
||||
{
|
||||
srand(time(NULL));
|
||||
const char *characters = "abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ01234567890123456789~`!@#$%^&*()-_+=[]{}|/,.<>;:'";
|
||||
size_t characters_len = strlen(characters);
|
||||
char *random_string = memalloc(length + 1);
|
||||
for (int i = 0; i < length; i++) {
|
||||
random_string[i] = characters[rand() % (characters_len - 1)];
|
||||
}
|
||||
random_string[length] = '\0';
|
||||
printf("The generated password for %s is: %s\n", name, random_string);
|
||||
encrypt_password(name, random_string);
|
||||
free(random_string);
|
||||
FILE *file = fopen("/dev/urandom", "r");
|
||||
if (file == NULL) {
|
||||
die("Cannot open /dev/urandom");
|
||||
}
|
||||
fread(bytes, 1, size, file);
|
||||
fclose(file);
|
||||
}
|
||||
|
||||
void generate_password(char *name, int length)
|
||||
{
|
||||
srand(time(NULL));
|
||||
const char *characters = "abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ01234567890123456789~`!@#$%^&*()-_+=[]{}|/,.<>;:'";
|
||||
size_t characters_len = strlen(characters);
|
||||
char *random_string = memalloc(length + 1);
|
||||
for (int i = 0; i < length; i++) {
|
||||
random_string[i] = characters[rand() % (characters_len - 1)];
|
||||
}
|
||||
random_string[length] = '\0';
|
||||
printf("The generated password for %s is: %s\n", name, random_string);
|
||||
encrypt_password(name, random_string);
|
||||
free(random_string);
|
||||
}
|
||||
|
||||
void die(char *str)
|
||||
{
|
||||
fprintf(stderr, "apm: %s\n", str);
|
||||
exit(EXIT_FAILURE);
|
||||
fprintf(stderr, "apm: %s\n", str);
|
||||
exit(EXIT_FAILURE);
|
||||
}
|
||||
|
||||
int main(int argc, char *argv[])
|
||||
int main(int argc, char **argv)
|
||||
{
|
||||
if (sodium_init() == -1) {
|
||||
die("Error initializing sodium");
|
||||
}
|
||||
/* disable core dump for security */
|
||||
setrlimit(RLIMIT_CORE, &(struct rlimit) {0, 0});
|
||||
|
||||
/* disable core dump for security */
|
||||
setrlimit(RLIMIT_CORE, &(struct rlimit) {0, 0});
|
||||
|
||||
ARGBEGIN {
|
||||
case 'h':
|
||||
usage();
|
||||
break;
|
||||
case 'v':
|
||||
printf("apm 1.0.0\n");
|
||||
exit(EXIT_SUCCESS);
|
||||
break;
|
||||
case 'e':
|
||||
decrypt_password(EARGF(usage()), 1);
|
||||
exit(EXIT_SUCCESS);
|
||||
break;
|
||||
case 'R':;
|
||||
char *pass_file = get_passfile(EARGF(usage()));
|
||||
if (remove(pass_file)) {
|
||||
perror("apm");
|
||||
} else {
|
||||
printf("Removed %s\n", basename(pass_file));
|
||||
}
|
||||
free(pass_file);
|
||||
exit(EXIT_SUCCESS);
|
||||
break;
|
||||
case 'I':;
|
||||
char *pw = get_password();
|
||||
encrypt_password(EARGF(usage()), pw);
|
||||
free(pw);
|
||||
exit(EXIT_SUCCESS);
|
||||
break;
|
||||
case 'Q':
|
||||
decrypt_password(EARGF(usage()), 0);
|
||||
exit(EXIT_SUCCESS);
|
||||
break;
|
||||
case 'L':;
|
||||
char *apm = get_apm();
|
||||
tree(apm, 0);
|
||||
free(apm);
|
||||
exit(EXIT_SUCCESS);
|
||||
break;
|
||||
case 'M':;
|
||||
char *filename = EARGF(usage());
|
||||
FILE *file = fopen(filename, "r");
|
||||
if (file == NULL) {
|
||||
die("Cannot open file to read");
|
||||
}
|
||||
fseek(file, 0, SEEK_END);
|
||||
long file_size = ftell(file);
|
||||
fseek(file, 0, SEEK_SET);
|
||||
char *content = memalloc(file_size);
|
||||
fread(content, sizeof(char), file_size, file);
|
||||
char *f_basename = basename(filename);
|
||||
char *dot = strrchr(f_basename, '.');
|
||||
if (dot != NULL) {
|
||||
*dot = '\0';
|
||||
}
|
||||
encrypt_password(f_basename, content);
|
||||
exit(EXIT_SUCCESS);
|
||||
break;
|
||||
case 'G':;
|
||||
if (argc > 0)
|
||||
--argc, ++argv;
|
||||
goto run;
|
||||
default:
|
||||
usage();
|
||||
} ARGEND;
|
||||
ARGBEGIN {
|
||||
case 'h':
|
||||
usage();
|
||||
break;
|
||||
case 'v':
|
||||
printf("apm 1.0.0\n");
|
||||
exit(EXIT_SUCCESS);
|
||||
break;
|
||||
case 'e':
|
||||
decrypt_password(EARGF(usage()), 1);
|
||||
exit(EXIT_SUCCESS);
|
||||
break;
|
||||
case 'R':;
|
||||
char *pass_file = get_passfile(EARGF(usage()));
|
||||
if (remove(pass_file)) {
|
||||
perror("apm");
|
||||
} else {
|
||||
printf("Removed %s\n", basename(pass_file));
|
||||
}
|
||||
free(pass_file);
|
||||
exit(EXIT_SUCCESS);
|
||||
break;
|
||||
case 'I':;
|
||||
char *pw = get_password();
|
||||
encrypt_password(EARGF(usage()), pw);
|
||||
free(pw);
|
||||
exit(EXIT_SUCCESS);
|
||||
break;
|
||||
case 'Q':
|
||||
decrypt_password(EARGF(usage()), 0);
|
||||
exit(EXIT_SUCCESS);
|
||||
break;
|
||||
case 'L':;
|
||||
char *apm = get_apm();
|
||||
tree(apm, 0);
|
||||
free(apm);
|
||||
exit(EXIT_SUCCESS);
|
||||
break;
|
||||
case 'M':;
|
||||
char *filename = EARGF(usage());
|
||||
FILE *file = fopen(filename, "r");
|
||||
if (file == NULL) {
|
||||
die("Cannot open file to read");
|
||||
}
|
||||
fseek(file, 0, SEEK_END);
|
||||
long file_size = ftell(file);
|
||||
fseek(file, 0, SEEK_SET);
|
||||
char *content = memalloc(file_size);
|
||||
fread(content, sizeof(char), file_size, file);
|
||||
char *f_basename = basename(filename);
|
||||
char *dot = strrchr(f_basename, '.');
|
||||
if (dot != NULL) {
|
||||
*dot = '\0';
|
||||
}
|
||||
encrypt_password(f_basename, content);
|
||||
exit(EXIT_SUCCESS);
|
||||
break;
|
||||
case 'G':;
|
||||
if (argc > 0)
|
||||
--argc, ++argv;
|
||||
goto run;
|
||||
default:
|
||||
usage();
|
||||
} ARGEND;
|
||||
|
||||
run:
|
||||
switch (argc) {
|
||||
case 0:
|
||||
usage();
|
||||
break;
|
||||
case 1:
|
||||
decrypt_password(argv[0], 0);
|
||||
break;
|
||||
case 2:
|
||||
generate_password(argv[0], atoi(argv[1]));
|
||||
break;
|
||||
}
|
||||
run:
|
||||
switch (argc) {
|
||||
case 0:
|
||||
usage();
|
||||
break;
|
||||
case 1:
|
||||
decrypt_password(argv[0], 0);
|
||||
break;
|
||||
case 2:
|
||||
generate_password(argv[0], atoi(argv[1]));
|
||||
break;
|
||||
}
|
||||
|
||||
return 0;
|
||||
return 0;
|
||||
}
|
||||
|
|
191
blake2b.h
Normal file
191
blake2b.h
Normal file
|
@ -0,0 +1,191 @@
|
|||
// https://github.com/jamesvan2019/blake2b_c
|
||||
// BLAKE2b Hashing Context and API Prototypes
|
||||
|
||||
#ifndef BLAKE2B_H
|
||||
#define BLAKE2B_H
|
||||
|
||||
#include <stdint.h>
|
||||
#include <stddef.h>
|
||||
|
||||
// state context
|
||||
typedef struct {
|
||||
uint8_t b[128]; // input buffer
|
||||
uint64_t h[8]; // chained state
|
||||
uint64_t t[2]; // total number of bytes
|
||||
size_t c; // pointer for b[]
|
||||
size_t outlen; // digest size
|
||||
} blake2b_ctx;
|
||||
|
||||
// Cyclic right rotation.
|
||||
|
||||
#ifndef ROTR64
|
||||
#define ROTR64(x, y) (((x) >> (y)) ^ ((x) << (64 - (y))))
|
||||
#endif
|
||||
|
||||
// Little-endian byte access.
|
||||
|
||||
#define B2B_GET64(p) \
|
||||
(((uint64_t) ((uint8_t *) (p))[0]) ^ \
|
||||
(((uint64_t) ((uint8_t *) (p))[1]) << 8) ^ \
|
||||
(((uint64_t) ((uint8_t *) (p))[2]) << 16) ^ \
|
||||
(((uint64_t) ((uint8_t *) (p))[3]) << 24) ^ \
|
||||
(((uint64_t) ((uint8_t *) (p))[4]) << 32) ^ \
|
||||
(((uint64_t) ((uint8_t *) (p))[5]) << 40) ^ \
|
||||
(((uint64_t) ((uint8_t *) (p))[6]) << 48) ^ \
|
||||
(((uint64_t) ((uint8_t *) (p))[7]) << 56))
|
||||
|
||||
// G Mixing function.
|
||||
|
||||
#define B2B_G(a, b, c, d, x, y) { \
|
||||
v[a] = v[a] + v[b] + x; \
|
||||
v[d] = ROTR64(v[d] ^ v[a], 32); \
|
||||
v[c] = v[c] + v[d]; \
|
||||
v[b] = ROTR64(v[b] ^ v[c], 24); \
|
||||
v[a] = v[a] + v[b] + y; \
|
||||
v[d] = ROTR64(v[d] ^ v[a], 16); \
|
||||
v[c] = v[c] + v[d]; \
|
||||
v[b] = ROTR64(v[b] ^ v[c], 63); }
|
||||
|
||||
// Initialization Vector.
|
||||
|
||||
static const uint64_t blake2b_iv[8] = {
|
||||
0x6A09E667F3BCC908, 0xBB67AE8584CAA73B,
|
||||
0x3C6EF372FE94F82B, 0xA54FF53A5F1D36F1,
|
||||
0x510E527FADE682D1, 0x9B05688C2B3E6C1F,
|
||||
0x1F83D9ABFB41BD6B, 0x5BE0CD19137E2179
|
||||
};
|
||||
|
||||
// Compression function. "last" flag indicates last block.
|
||||
|
||||
static void blake2b_compress(blake2b_ctx *ctx, int last)
|
||||
{
|
||||
const uint8_t sigma[12][16] = {
|
||||
{ 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15 },
|
||||
{ 14, 10, 4, 8, 9, 15, 13, 6, 1, 12, 0, 2, 11, 7, 5, 3 },
|
||||
{ 11, 8, 12, 0, 5, 2, 15, 13, 10, 14, 3, 6, 7, 1, 9, 4 },
|
||||
{ 7, 9, 3, 1, 13, 12, 11, 14, 2, 6, 5, 10, 4, 0, 15, 8 },
|
||||
{ 9, 0, 5, 7, 2, 4, 10, 15, 14, 1, 11, 12, 6, 8, 3, 13 },
|
||||
{ 2, 12, 6, 10, 0, 11, 8, 3, 4, 13, 7, 5, 15, 14, 1, 9 },
|
||||
{ 12, 5, 1, 15, 14, 13, 4, 10, 0, 7, 6, 3, 9, 2, 8, 11 },
|
||||
{ 13, 11, 7, 14, 12, 1, 3, 9, 5, 0, 15, 4, 8, 6, 2, 10 },
|
||||
{ 6, 15, 14, 9, 11, 3, 0, 8, 12, 2, 13, 7, 1, 4, 10, 5 },
|
||||
{ 10, 2, 8, 4, 7, 6, 1, 5, 15, 11, 9, 14, 3, 12, 13, 0 },
|
||||
{ 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15 },
|
||||
{ 14, 10, 4, 8, 9, 15, 13, 6, 1, 12, 0, 2, 11, 7, 5, 3 }
|
||||
};
|
||||
int i;
|
||||
uint64_t v[16], m[16];
|
||||
|
||||
for (i = 0; i < 8; i++) { // init work variables
|
||||
v[i] = ctx->h[i];
|
||||
v[i + 8] = blake2b_iv[i];
|
||||
}
|
||||
|
||||
v[12] ^= ctx->t[0]; // low 64 bits of offset
|
||||
v[13] ^= ctx->t[1]; // high 64 bits
|
||||
if (last) // last block flag set ?
|
||||
v[14] = ~v[14];
|
||||
|
||||
for (i = 0; i < 16; i++) // get little-endian words
|
||||
m[i] = B2B_GET64(&ctx->b[8 * i]);
|
||||
|
||||
for (i = 0; i < 12; i++) { // twelve rounds
|
||||
B2B_G( 0, 4, 8, 12, m[sigma[i][ 0]], m[sigma[i][ 1]]);
|
||||
B2B_G( 1, 5, 9, 13, m[sigma[i][ 2]], m[sigma[i][ 3]]);
|
||||
B2B_G( 2, 6, 10, 14, m[sigma[i][ 4]], m[sigma[i][ 5]]);
|
||||
B2B_G( 3, 7, 11, 15, m[sigma[i][ 6]], m[sigma[i][ 7]]);
|
||||
B2B_G( 0, 5, 10, 15, m[sigma[i][ 8]], m[sigma[i][ 9]]);
|
||||
B2B_G( 1, 6, 11, 12, m[sigma[i][10]], m[sigma[i][11]]);
|
||||
B2B_G( 2, 7, 8, 13, m[sigma[i][12]], m[sigma[i][13]]);
|
||||
B2B_G( 3, 4, 9, 14, m[sigma[i][14]], m[sigma[i][15]]);
|
||||
}
|
||||
|
||||
for( i = 0; i < 8; ++i )
|
||||
ctx->h[i] ^= v[i] ^ v[i + 8];
|
||||
}
|
||||
|
||||
// Add "inlen" bytes from "in" into the hash.
|
||||
void blake2b_update(blake2b_ctx *ctx, // context
|
||||
const void *in, size_t inlen) // data to be hashed
|
||||
{
|
||||
size_t i;
|
||||
|
||||
for (i = 0; i < inlen; i++) {
|
||||
if (ctx->c == 128) { // buffer full ?
|
||||
ctx->t[0] += ctx->c; // add counters
|
||||
if (ctx->t[0] < ctx->c) // carry overflow ?
|
||||
ctx->t[1]++; // high word
|
||||
blake2b_compress(ctx, 0); // compress (not last)
|
||||
ctx->c = 0; // counter to zero
|
||||
}
|
||||
ctx->b[ctx->c++] = ((const uint8_t *) in)[i];
|
||||
}
|
||||
}
|
||||
|
||||
// Initialize the hashing context "ctx" with optional key "key".
|
||||
// 1 <= outlen <= 64 gives the digest size in bytes.
|
||||
// Secret key (also <= 64 bytes) is optional (keylen = 0).
|
||||
int blake2b_init(blake2b_ctx *ctx, size_t outlen,
|
||||
const void *key, size_t keylen) // secret key
|
||||
{
|
||||
size_t i;
|
||||
|
||||
if (outlen == 0 || outlen > 64 || keylen > 64)
|
||||
return -1; // illegal parameters
|
||||
|
||||
for (i = 0; i < 8; i++) // state, "param block"
|
||||
ctx->h[i] = blake2b_iv[i];
|
||||
ctx->h[0] ^= 0x01010000 ^ (keylen << 8) ^ outlen;
|
||||
|
||||
ctx->t[0] = 0; // input count low word
|
||||
ctx->t[1] = 0; // input count high word
|
||||
ctx->c = 0; // pointer within buffer
|
||||
ctx->outlen = outlen;
|
||||
|
||||
for (i = keylen; i < 128; i++) // zero input block
|
||||
ctx->b[i] = 0;
|
||||
if (keylen > 0) {
|
||||
blake2b_update(ctx, key, keylen);
|
||||
ctx->c = 128; // at the end
|
||||
}
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
// Generate the message digest (size given in init).
|
||||
// Result placed in "out".
|
||||
void blake2b_final(blake2b_ctx *ctx, void *out)
|
||||
{
|
||||
size_t i;
|
||||
|
||||
ctx->t[0] += ctx->c; // mark last block offset
|
||||
if (ctx->t[0] < ctx->c) // carry overflow
|
||||
ctx->t[1]++; // high word
|
||||
|
||||
while (ctx->c < 128) // fill up with zeros
|
||||
ctx->b[ctx->c++] = 0;
|
||||
blake2b_compress(ctx, 1); // final block flag = 1
|
||||
|
||||
// little endian convert and store
|
||||
for (i = 0; i < ctx->outlen; i++) {
|
||||
((uint8_t *) out)[i] =
|
||||
(ctx->h[i >> 3] >> (8 * (i & 7))) & 0xFF;
|
||||
}
|
||||
}
|
||||
|
||||
// All-in-one convenience function.
|
||||
int blake2b(void *out, size_t outlen, // return buffer for digest
|
||||
const void *key, size_t keylen, // optional secret key
|
||||
const void *in, size_t inlen) // data to be hashed
|
||||
{
|
||||
blake2b_ctx ctx;
|
||||
|
||||
if (blake2b_init(&ctx, outlen, key, keylen))
|
||||
return -1;
|
||||
blake2b_update(&ctx, in, inlen);
|
||||
blake2b_final(&ctx, out);
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
#endif
|
Loading…
Reference in a new issue