buffalo-lib.c 10 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480
  1. /*
  2. * Copyright (C) 2009-2011 Gabor Juhos <juhosg@openwrt.org>
  3. *
  4. * This program is free software; you can redistribute it and/or modify it
  5. * under the terms of the GNU General Public License version 2 as published
  6. * by the Free Software Foundation.
  7. *
  8. */
  9. #include <stdio.h>
  10. #include <stdlib.h>
  11. #include <string.h>
  12. #include <errno.h>
  13. #include <unistd.h>
  14. #include <sys/stat.h>
  15. #include "buffalo-lib.h"
  16. static uint32_t crc32_table[256] =
  17. {
  18. 0x00000000, 0x04c11db7, 0x09823b6e, 0x0d4326d9,
  19. 0x130476dc, 0x17c56b6b, 0x1a864db2, 0x1e475005,
  20. 0x2608edb8, 0x22c9f00f, 0x2f8ad6d6, 0x2b4bcb61,
  21. 0x350c9b64, 0x31cd86d3, 0x3c8ea00a, 0x384fbdbd,
  22. 0x4c11db70, 0x48d0c6c7, 0x4593e01e, 0x4152fda9,
  23. 0x5f15adac, 0x5bd4b01b, 0x569796c2, 0x52568b75,
  24. 0x6a1936c8, 0x6ed82b7f, 0x639b0da6, 0x675a1011,
  25. 0x791d4014, 0x7ddc5da3, 0x709f7b7a, 0x745e66cd,
  26. 0x9823b6e0, 0x9ce2ab57, 0x91a18d8e, 0x95609039,
  27. 0x8b27c03c, 0x8fe6dd8b, 0x82a5fb52, 0x8664e6e5,
  28. 0xbe2b5b58, 0xbaea46ef, 0xb7a96036, 0xb3687d81,
  29. 0xad2f2d84, 0xa9ee3033, 0xa4ad16ea, 0xa06c0b5d,
  30. 0xd4326d90, 0xd0f37027, 0xddb056fe, 0xd9714b49,
  31. 0xc7361b4c, 0xc3f706fb, 0xceb42022, 0xca753d95,
  32. 0xf23a8028, 0xf6fb9d9f, 0xfbb8bb46, 0xff79a6f1,
  33. 0xe13ef6f4, 0xe5ffeb43, 0xe8bccd9a, 0xec7dd02d,
  34. 0x34867077, 0x30476dc0, 0x3d044b19, 0x39c556ae,
  35. 0x278206ab, 0x23431b1c, 0x2e003dc5, 0x2ac12072,
  36. 0x128e9dcf, 0x164f8078, 0x1b0ca6a1, 0x1fcdbb16,
  37. 0x018aeb13, 0x054bf6a4, 0x0808d07d, 0x0cc9cdca,
  38. 0x7897ab07, 0x7c56b6b0, 0x71159069, 0x75d48dde,
  39. 0x6b93dddb, 0x6f52c06c, 0x6211e6b5, 0x66d0fb02,
  40. 0x5e9f46bf, 0x5a5e5b08, 0x571d7dd1, 0x53dc6066,
  41. 0x4d9b3063, 0x495a2dd4, 0x44190b0d, 0x40d816ba,
  42. 0xaca5c697, 0xa864db20, 0xa527fdf9, 0xa1e6e04e,
  43. 0xbfa1b04b, 0xbb60adfc, 0xb6238b25, 0xb2e29692,
  44. 0x8aad2b2f, 0x8e6c3698, 0x832f1041, 0x87ee0df6,
  45. 0x99a95df3, 0x9d684044, 0x902b669d, 0x94ea7b2a,
  46. 0xe0b41de7, 0xe4750050, 0xe9362689, 0xedf73b3e,
  47. 0xf3b06b3b, 0xf771768c, 0xfa325055, 0xfef34de2,
  48. 0xc6bcf05f, 0xc27dede8, 0xcf3ecb31, 0xcbffd686,
  49. 0xd5b88683, 0xd1799b34, 0xdc3abded, 0xd8fba05a,
  50. 0x690ce0ee, 0x6dcdfd59, 0x608edb80, 0x644fc637,
  51. 0x7a089632, 0x7ec98b85, 0x738aad5c, 0x774bb0eb,
  52. 0x4f040d56, 0x4bc510e1, 0x46863638, 0x42472b8f,
  53. 0x5c007b8a, 0x58c1663d, 0x558240e4, 0x51435d53,
  54. 0x251d3b9e, 0x21dc2629, 0x2c9f00f0, 0x285e1d47,
  55. 0x36194d42, 0x32d850f5, 0x3f9b762c, 0x3b5a6b9b,
  56. 0x0315d626, 0x07d4cb91, 0x0a97ed48, 0x0e56f0ff,
  57. 0x1011a0fa, 0x14d0bd4d, 0x19939b94, 0x1d528623,
  58. 0xf12f560e, 0xf5ee4bb9, 0xf8ad6d60, 0xfc6c70d7,
  59. 0xe22b20d2, 0xe6ea3d65, 0xeba91bbc, 0xef68060b,
  60. 0xd727bbb6, 0xd3e6a601, 0xdea580d8, 0xda649d6f,
  61. 0xc423cd6a, 0xc0e2d0dd, 0xcda1f604, 0xc960ebb3,
  62. 0xbd3e8d7e, 0xb9ff90c9, 0xb4bcb610, 0xb07daba7,
  63. 0xae3afba2, 0xaafbe615, 0xa7b8c0cc, 0xa379dd7b,
  64. 0x9b3660c6, 0x9ff77d71, 0x92b45ba8, 0x9675461f,
  65. 0x8832161a, 0x8cf30bad, 0x81b02d74, 0x857130c3,
  66. 0x5d8a9099, 0x594b8d2e, 0x5408abf7, 0x50c9b640,
  67. 0x4e8ee645, 0x4a4ffbf2, 0x470cdd2b, 0x43cdc09c,
  68. 0x7b827d21, 0x7f436096, 0x7200464f, 0x76c15bf8,
  69. 0x68860bfd, 0x6c47164a, 0x61043093, 0x65c52d24,
  70. 0x119b4be9, 0x155a565e, 0x18197087, 0x1cd86d30,
  71. 0x029f3d35, 0x065e2082, 0x0b1d065b, 0x0fdc1bec,
  72. 0x3793a651, 0x3352bbe6, 0x3e119d3f, 0x3ad08088,
  73. 0x2497d08d, 0x2056cd3a, 0x2d15ebe3, 0x29d4f654,
  74. 0xc5a92679, 0xc1683bce, 0xcc2b1d17, 0xc8ea00a0,
  75. 0xd6ad50a5, 0xd26c4d12, 0xdf2f6bcb, 0xdbee767c,
  76. 0xe3a1cbc1, 0xe760d676, 0xea23f0af, 0xeee2ed18,
  77. 0xf0a5bd1d, 0xf464a0aa, 0xf9278673, 0xfde69bc4,
  78. 0x89b8fd09, 0x8d79e0be, 0x803ac667, 0x84fbdbd0,
  79. 0x9abc8bd5, 0x9e7d9662, 0x933eb0bb, 0x97ffad0c,
  80. 0xafb010b1, 0xab710d06, 0xa6322bdf, 0xa2f33668,
  81. 0xbcb4666d, 0xb8757bda, 0xb5365d03, 0xb1f740b4
  82. };
  83. int bcrypt_init(struct bcrypt_ctx *ctx, void *key, int keylen,
  84. unsigned long state_len)
  85. {
  86. unsigned char *state;
  87. unsigned char *p = key;
  88. unsigned long i, j;
  89. unsigned long k = 0;
  90. state = malloc(state_len);
  91. if (state == NULL)
  92. return -1;
  93. ctx->i = 0;
  94. ctx->j = 0;
  95. ctx->state = state;
  96. ctx->state_len = state_len;
  97. for (i = 0; i < state_len; i++)
  98. state[i] = i;
  99. for(i = 0, j = 0; i < state_len; i++, j = (j + 1) % keylen) {
  100. unsigned char t;
  101. t = state[i];
  102. k = (k + p[j] + t) % state_len;
  103. state[i] = state[k];
  104. state[k] = t;
  105. }
  106. return 0;
  107. }
  108. int bcrypt_process(struct bcrypt_ctx *ctx, unsigned char *src,
  109. unsigned char *dst, unsigned long len)
  110. {
  111. unsigned char *state = ctx->state;
  112. unsigned long state_len = ctx->state_len;
  113. unsigned char i, j;
  114. unsigned long k;
  115. i = ctx->i;
  116. j = ctx->j;
  117. for (k = 0; k < len; k++) {
  118. unsigned char t;
  119. i = (i + 1) % state_len;
  120. j = (j + state[i]) % state_len;
  121. t = state[j];
  122. state[j] = state[i];
  123. state[i] = t;
  124. dst[k] = src[k] ^ state[(state[i] + state[j]) % state_len];
  125. }
  126. ctx->i = i;
  127. ctx->j = j;
  128. return len;
  129. }
  130. void bcrypt_finish(struct bcrypt_ctx *ctx)
  131. {
  132. if (ctx->state)
  133. free(ctx->state);
  134. }
  135. int bcrypt_buf(unsigned char seed, unsigned char *key, unsigned char *src,
  136. unsigned char *dst, unsigned long len, int longstate)
  137. {
  138. unsigned char bckey[BCRYPT_MAX_KEYLEN + 1];
  139. unsigned int keylen;
  140. struct bcrypt_ctx ctx;
  141. int ret;
  142. /* setup decryption key */
  143. keylen = strlen((char *) key);
  144. bckey[0] = seed;
  145. memcpy(&bckey[1], key, keylen);
  146. keylen++;
  147. ret = bcrypt_init(&ctx, bckey, keylen,
  148. (longstate) ? len : BCRYPT_DEFAULT_STATE_LEN);
  149. if (ret)
  150. return ret;
  151. bcrypt_process(&ctx, src, dst, len);
  152. bcrypt_finish(&ctx);
  153. return 0;
  154. }
  155. uint32_t buffalo_csum(uint32_t csum, void *buf, unsigned long len)
  156. {
  157. char *p = buf;
  158. while (len--) {
  159. int i;
  160. csum ^= *p++;
  161. for (i = 0; i < 8; i++)
  162. csum = (csum >> 1) ^ ((csum & 1) ? 0xedb88320ul : 0);
  163. }
  164. return csum;
  165. }
  166. uint32_t buffalo_crc(void *buf, unsigned long len)
  167. {
  168. unsigned char *p = buf;
  169. unsigned long t = len;
  170. uint32_t crc = 0;
  171. while (len--)
  172. crc = (crc << 8) ^ crc32_table[((crc >> 24) ^ *p++) & 0xFF];
  173. while (t) {
  174. crc = (crc << 8) ^ crc32_table[((crc >> 24) ^ t) & 0xFF];
  175. t >>= 8;
  176. }
  177. return ~crc;
  178. }
  179. unsigned long enc_compute_header_len(char *product, char *version)
  180. {
  181. return ENC_MAGIC_LEN + 1 + strlen(product) + 1 +
  182. strlen(version) + 1 + 3 * sizeof(uint32_t);
  183. }
  184. unsigned long enc_compute_buf_len(char *product, char *version,
  185. unsigned long datalen)
  186. {
  187. unsigned long ret;
  188. ret = enc_compute_header_len(product, version);
  189. ret += datalen + sizeof(uint32_t);
  190. ret += (4 - ret % 4);
  191. return ret;
  192. }
  193. static void put_be32(void *data, uint32_t val)
  194. {
  195. unsigned char *p = data;
  196. p[0] = (val >> 24) & 0xff;
  197. p[1] = (val >> 16) & 0xff;
  198. p[2] = (val >> 8) & 0xff;
  199. p[3] = val & 0xff;
  200. }
  201. static uint32_t get_be32(void *data)
  202. {
  203. unsigned char *p = data;
  204. return (((uint32_t)p[0]) << 24) |
  205. (((uint32_t)p[1]) << 16) |
  206. (((uint32_t)p[2]) << 8) |
  207. ((uint32_t)p[3]);
  208. }
  209. static int check_magic(void *magic)
  210. {
  211. if (!memcmp("start", magic, ENC_MAGIC_LEN))
  212. return 0;
  213. if (!memcmp("asar1", magic, ENC_MAGIC_LEN))
  214. return 0;
  215. return -1;
  216. }
  217. int encrypt_buf(struct enc_param *ep, unsigned char *hdr,
  218. unsigned char *data)
  219. {
  220. unsigned char *p;
  221. uint32_t len;
  222. int err;
  223. int ret = -1;
  224. unsigned char s;
  225. p = (unsigned char *) hdr;
  226. /* setup magic */
  227. len = strlen((char *) ep->magic) + 1;
  228. memcpy(p, ep->magic, len);
  229. p += len;
  230. /* setup seed */
  231. *p++ = ep->seed;
  232. /* put product len */
  233. len = strlen((char *) ep->product) + 1;
  234. put_be32(p, len);
  235. p += sizeof(uint32_t);
  236. /* copy and crypt product name */
  237. memcpy(p, ep->product, len);
  238. err = bcrypt_buf(ep->seed, ep->key, p, p, len, ep->longstate);
  239. if (err)
  240. goto out;
  241. s = *p;
  242. p += len;
  243. /* put version length */
  244. len = strlen((char *) ep->version) + 1;
  245. put_be32(p, len);
  246. p += sizeof(uint32_t);
  247. /* copy and crypt version */
  248. memcpy(p, ep->version, len);
  249. err = bcrypt_buf(s, ep->key, p, p, len, ep->longstate);
  250. if (err)
  251. goto out;
  252. s = *p;
  253. p += len;
  254. /* put data length */
  255. put_be32(p, ep->datalen);
  256. /* encrypt data */
  257. err = bcrypt_buf(s, ep->key, data, data, ep->datalen, ep->longstate);
  258. if (err)
  259. goto out;
  260. /* put checksum */
  261. put_be32(&data[ep->datalen], ep->csum);
  262. ret = 0;
  263. out:
  264. return ret;
  265. }
  266. int decrypt_buf(struct enc_param *ep, unsigned char *data,
  267. unsigned long datalen)
  268. {
  269. unsigned char *p;
  270. uint32_t prod_len;
  271. uint32_t ver_len;
  272. uint32_t len;
  273. uint32_t csum;
  274. ssize_t remain;
  275. int err;
  276. int ret = -1;
  277. #define CHECKLEN(_l) do { \
  278. len = (_l); \
  279. if (remain < len) { \
  280. goto out; \
  281. } \
  282. } while (0)
  283. #define INCP() do { \
  284. p += len; \
  285. remain -= len; \
  286. } while (0)
  287. remain = datalen;
  288. p = data;
  289. CHECKLEN(ENC_MAGIC_LEN);
  290. err = check_magic(p);
  291. if (err)
  292. goto out;
  293. memcpy(ep->magic, p, ENC_MAGIC_LEN);
  294. INCP();
  295. CHECKLEN(1);
  296. ep->seed = *p;
  297. INCP();
  298. CHECKLEN(sizeof(uint32_t));
  299. prod_len = get_be32(p);
  300. if (prod_len > ENC_PRODUCT_LEN)
  301. goto out;
  302. INCP();
  303. CHECKLEN(prod_len);
  304. memcpy(ep->product, p, prod_len);
  305. INCP();
  306. CHECKLEN(sizeof(uint32_t));
  307. ver_len = get_be32(p);
  308. if (ver_len > ENC_VERSION_LEN)
  309. goto out;
  310. INCP();
  311. CHECKLEN(ver_len);
  312. memcpy(ep->version, p, ver_len);
  313. INCP();
  314. CHECKLEN(sizeof(uint32_t));
  315. ep->datalen = get_be32(p);
  316. INCP();
  317. /* decrypt data */
  318. CHECKLEN(ep->datalen);
  319. err = bcrypt_buf(ep->version[0], ep->key, p, data, ep->datalen,
  320. ep->longstate);
  321. if (err)
  322. goto out;
  323. INCP();
  324. CHECKLEN(sizeof(uint32_t));
  325. ep->csum = get_be32(p);
  326. INCP();
  327. csum = buffalo_csum(ep->datalen, data, ep->datalen);
  328. if (csum != ep->csum)
  329. goto out;
  330. /* decrypt product name */
  331. err = bcrypt_buf(ep->product[0], ep->key, ep->version, ep->version,
  332. ver_len, ep->longstate);
  333. if (err)
  334. goto out;
  335. /* decrypt version */
  336. err = bcrypt_buf(ep->seed, ep->key, ep->product, ep->product, prod_len,
  337. ep->longstate);
  338. if (err)
  339. goto out;
  340. ret = 0;
  341. out:
  342. return ret;
  343. #undef CHECKLEN
  344. #undef INCP
  345. }
  346. ssize_t get_file_size(char *name)
  347. {
  348. struct stat st;
  349. int err;
  350. err = stat(name, &st);
  351. if (err)
  352. return -1;
  353. return st.st_size;
  354. }
  355. int read_file_to_buf(char *name, void *buf, ssize_t buflen)
  356. {
  357. FILE *f;
  358. size_t done;
  359. int ret = -1;
  360. f = fopen(name, "r");
  361. if (f == NULL)
  362. goto out;
  363. errno = 0;
  364. done = fread(buf, buflen, 1, f);
  365. if (done != 1)
  366. goto close;
  367. ret = 0;
  368. close:
  369. fclose(f);
  370. out:
  371. return ret;
  372. }
  373. int write_buf_to_file(char *name, void *buf, ssize_t buflen)
  374. {
  375. FILE *f;
  376. size_t done;
  377. int ret = -1;
  378. f = fopen(name, "w");
  379. if (f == NULL)
  380. goto out;
  381. errno = 0;
  382. done = fwrite(buf, buflen, 1, f);
  383. if (done != 1)
  384. goto close;
  385. ret = 0;
  386. close:
  387. fflush(f);
  388. fclose(f);
  389. if (ret)
  390. unlink(name);
  391. out:
  392. return ret;
  393. }