mirror of
https://github.com/veracrypt/VeraCrypt.git
synced 2025-11-11 02:58:02 -06:00
Windows: Implement foundations for Argon2 support as a KDF in addition to PBKDF2
This commit is contained in:
@@ -1707,6 +1707,8 @@ namespace VeraCrypt
|
|||||||
pkcs5_prf = WHIRLPOOL;
|
pkcs5_prf = WHIRLPOOL;
|
||||||
else if (_stricmp(request.BootPrfAlgorithmName, "Streebog") == 0)
|
else if (_stricmp(request.BootPrfAlgorithmName, "Streebog") == 0)
|
||||||
pkcs5_prf = STREEBOG;
|
pkcs5_prf = STREEBOG;
|
||||||
|
else if (_stricmp(request.BootPrfAlgorithmName, "Argon2") == 0)
|
||||||
|
pkcs5_prf = ARGON2;
|
||||||
#endif
|
#endif
|
||||||
else if (strlen(request.BootPrfAlgorithmName) == 0) // case of version < 1.0f
|
else if (strlen(request.BootPrfAlgorithmName) == 0) // case of version < 1.0f
|
||||||
pkcs5_prf = BLAKE2S;
|
pkcs5_prf = BLAKE2S;
|
||||||
|
|||||||
@@ -132,6 +132,7 @@ static Hash Hashes[] =
|
|||||||
{ BLAKE2S, L"BLAKE2s-256", FALSE, TRUE },
|
{ BLAKE2S, L"BLAKE2s-256", FALSE, TRUE },
|
||||||
{ WHIRLPOOL, L"Whirlpool", FALSE, FALSE },
|
{ WHIRLPOOL, L"Whirlpool", FALSE, FALSE },
|
||||||
{ STREEBOG, L"Streebog", FALSE, FALSE },
|
{ STREEBOG, L"Streebog", FALSE, FALSE },
|
||||||
|
{ ARGON2, L"Argon2", FALSE, FALSE },
|
||||||
#endif
|
#endif
|
||||||
{ 0, 0, 0 }
|
{ 0, 0, 0 }
|
||||||
};
|
};
|
||||||
|
|||||||
@@ -55,6 +55,7 @@ enum
|
|||||||
SHA256,
|
SHA256,
|
||||||
BLAKE2S,
|
BLAKE2S,
|
||||||
STREEBOG,
|
STREEBOG,
|
||||||
|
ARGON2,
|
||||||
HASH_ENUM_END_ID
|
HASH_ENUM_END_ID
|
||||||
};
|
};
|
||||||
|
|
||||||
@@ -226,6 +227,7 @@ typedef struct
|
|||||||
typedef struct keyInfo_t
|
typedef struct keyInfo_t
|
||||||
{
|
{
|
||||||
int noIterations; /* Number of times to iterate (PKCS-5) */
|
int noIterations; /* Number of times to iterate (PKCS-5) */
|
||||||
|
int memoryCost; /* Memory cost factor (PKCS-5) */
|
||||||
int keyLength; /* Length of the key */
|
int keyLength; /* Length of the key */
|
||||||
uint64 dummy; /* Dummy field to ensure 16-byte alignment of this structure */
|
uint64 dummy; /* Dummy field to ensure 16-byte alignment of this structure */
|
||||||
__int8 salt[PKCS5_SALT_SIZE]; /* PKCS-5 salt */
|
__int8 salt[PKCS5_SALT_SIZE]; /* PKCS-5 salt */
|
||||||
@@ -257,6 +259,7 @@ typedef struct CRYPTO_INFO_t
|
|||||||
#endif
|
#endif
|
||||||
|
|
||||||
int noIterations;
|
int noIterations;
|
||||||
|
int memoryCost;
|
||||||
int volumePim;
|
int volumePim;
|
||||||
|
|
||||||
BOOL bProtectHiddenVolume; // Indicates whether the volume contains a hidden volume to be protected against overwriting
|
BOOL bProtectHiddenVolume; // Indicates whether the volume contains a hidden volume to be protected against overwriting
|
||||||
|
|||||||
@@ -367,6 +367,8 @@ typedef struct
|
|||||||
unsigned __int64 encSpeed;
|
unsigned __int64 encSpeed;
|
||||||
unsigned __int64 decSpeed;
|
unsigned __int64 decSpeed;
|
||||||
unsigned __int64 meanBytesPerSec;
|
unsigned __int64 meanBytesPerSec;
|
||||||
|
unsigned __int64 iterations;
|
||||||
|
unsigned __int64 memoryCost;
|
||||||
} BENCHMARK_REC;
|
} BENCHMARK_REC;
|
||||||
|
|
||||||
BENCHMARK_REC benchmarkTable [BENCHMARK_MAX_ITEMS];
|
BENCHMARK_REC benchmarkTable [BENCHMARK_MAX_ITEMS];
|
||||||
@@ -6014,6 +6016,11 @@ static void ResetBenchmarkList (HWND hwndDlg)
|
|||||||
LvCol.cx = CompensateXDPI (80);
|
LvCol.cx = CompensateXDPI (80);
|
||||||
LvCol.fmt = LVCFMT_RIGHT;
|
LvCol.fmt = LVCFMT_RIGHT;
|
||||||
SendMessageW (hList,LVM_INSERTCOLUMNW,2,(LPARAM)&LvCol);
|
SendMessageW (hList,LVM_INSERTCOLUMNW,2,(LPARAM)&LvCol);
|
||||||
|
|
||||||
|
LvCol.pszText = GetString ("MEMORY_COST");
|
||||||
|
LvCol.cx = CompensateXDPI (80);
|
||||||
|
LvCol.fmt = LVCFMT_RIGHT;
|
||||||
|
SendMessageW (hList,LVM_INSERTCOLUMNW,3,(LPARAM)&LvCol);
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -6111,10 +6118,14 @@ static void DisplayBenchmarkResults (HWND hwndDlg)
|
|||||||
LvItem.iSubItem = 1;
|
LvItem.iSubItem = 1;
|
||||||
LvItem.pszText = item1;
|
LvItem.pszText = item1;
|
||||||
SendMessageW (hList, LVM_SETITEMW, 0, (LPARAM)&LvItem);
|
SendMessageW (hList, LVM_SETITEMW, 0, (LPARAM)&LvItem);
|
||||||
swprintf_s (item1, sizeof(item1) / sizeof(item1[0]), L"%d", (int) benchmarkTable[i].decSpeed);
|
swprintf_s (item1, sizeof(item1) / sizeof(item1[0]), L"%d", (int) benchmarkTable[i].iterations);
|
||||||
LvItem.iSubItem = 2;
|
LvItem.iSubItem = 2;
|
||||||
LvItem.pszText = item1;
|
LvItem.pszText = item1;
|
||||||
SendMessageW (hList, LVM_SETITEMW, 0, (LPARAM)&LvItem);
|
SendMessageW (hList, LVM_SETITEMW, 0, (LPARAM)&LvItem);
|
||||||
|
swprintf_s (item1, sizeof(item1) / sizeof(item1[0]), L"%d", (int) benchmarkTable[i].memoryCost);
|
||||||
|
LvItem.iSubItem = 3;
|
||||||
|
LvItem.pszText = item1;
|
||||||
|
SendMessageW (hList, LVM_SETITEMW, 0, (LPARAM)&LvItem);
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -6203,6 +6214,9 @@ static BOOL PerformBenchmark(HWND hBenchDlg, HWND hwndDlg)
|
|||||||
|
|
||||||
for (hid = FIRST_PRF_ID; hid <= LAST_PRF_ID; hid++)
|
for (hid = FIRST_PRF_ID; hid <= LAST_PRF_ID; hid++)
|
||||||
{
|
{
|
||||||
|
// Skip Argon2 since it is not a hash function
|
||||||
|
if (hid == ARGON2)
|
||||||
|
continue;
|
||||||
if (QueryPerformanceCounter (&performanceCountStart) == 0)
|
if (QueryPerformanceCounter (&performanceCountStart) == 0)
|
||||||
goto counter_error;
|
goto counter_error;
|
||||||
|
|
||||||
@@ -6268,6 +6282,8 @@ static BOOL PerformBenchmark(HWND hBenchDlg, HWND hwndDlg)
|
|||||||
int thid, i;
|
int thid, i;
|
||||||
char dk[MASTER_KEYDATA_SIZE];
|
char dk[MASTER_KEYDATA_SIZE];
|
||||||
char *tmp_salt = {"\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xAA\xBB\xCC\xDD\xEE\xFF\x01\x23\x45\x67\x89\xAB\xCD\xEF\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xAA\xBB\xCC\xDD\xEE\xFF\x01\x23\x45\x67\x89\xAB\xCD\xEF\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xAA\xBB\xCC\xDD\xEE\xFF"};
|
char *tmp_salt = {"\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xAA\xBB\xCC\xDD\xEE\xFF\x01\x23\x45\x67\x89\xAB\xCD\xEF\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xAA\xBB\xCC\xDD\xEE\xFF\x01\x23\x45\x67\x89\xAB\xCD\xEF\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xAA\xBB\xCC\xDD\xEE\xFF"};
|
||||||
|
int memoryCost = 0;
|
||||||
|
int iterations = 0;
|
||||||
|
|
||||||
for (thid = FIRST_PRF_ID; thid <= LAST_PRF_ID; thid++)
|
for (thid = FIRST_PRF_ID; thid <= LAST_PRF_ID; thid++)
|
||||||
{
|
{
|
||||||
@@ -6279,32 +6295,38 @@ static BOOL PerformBenchmark(HWND hBenchDlg, HWND hwndDlg)
|
|||||||
|
|
||||||
for (i = 1; i <= 2; i++)
|
for (i = 1; i <= 2; i++)
|
||||||
{
|
{
|
||||||
|
iterations = get_pkcs5_iteration_count(thid, benchmarkPim, benchmarkPreBoot, &memoryCost);
|
||||||
switch (thid)
|
switch (thid)
|
||||||
{
|
{
|
||||||
|
|
||||||
case SHA512:
|
case SHA512:
|
||||||
/* PKCS-5 test with HMAC-SHA-512 used as the PRF */
|
/* PKCS-5 test with HMAC-SHA-512 used as the PRF */
|
||||||
derive_key_sha512 ("passphrase-1234567890", 21, tmp_salt, 64, get_pkcs5_iteration_count(thid, benchmarkPim, benchmarkPreBoot), dk, MASTER_KEYDATA_SIZE);
|
derive_key_sha512 ("passphrase-1234567890", 21, tmp_salt, 64, iterations, dk, MASTER_KEYDATA_SIZE);
|
||||||
break;
|
break;
|
||||||
|
|
||||||
case SHA256:
|
case SHA256:
|
||||||
/* PKCS-5 test with HMAC-SHA-256 used as the PRF */
|
/* PKCS-5 test with HMAC-SHA-256 used as the PRF */
|
||||||
derive_key_sha256 ("passphrase-1234567890", 21, tmp_salt, 64, get_pkcs5_iteration_count(thid, benchmarkPim, benchmarkPreBoot), dk, MASTER_KEYDATA_SIZE);
|
derive_key_sha256 ("passphrase-1234567890", 21, tmp_salt, 64, iterations, dk, MASTER_KEYDATA_SIZE);
|
||||||
break;
|
break;
|
||||||
#ifndef WOLFCRYPT_BACKEND
|
#ifndef WOLFCRYPT_BACKEND
|
||||||
case BLAKE2S:
|
case BLAKE2S:
|
||||||
/* PKCS-5 test with HMAC-BLAKE2s used as the PRF */
|
/* PKCS-5 test with HMAC-BLAKE2s used as the PRF */
|
||||||
derive_key_blake2s ("passphrase-1234567890", 21, tmp_salt, 64, get_pkcs5_iteration_count(thid, benchmarkPim, benchmarkPreBoot), dk, MASTER_KEYDATA_SIZE);
|
derive_key_blake2s ("passphrase-1234567890", 21, tmp_salt, 64, iterations, dk, MASTER_KEYDATA_SIZE);
|
||||||
break;
|
break;
|
||||||
|
|
||||||
case WHIRLPOOL:
|
case WHIRLPOOL:
|
||||||
/* PKCS-5 test with HMAC-Whirlpool used as the PRF */
|
/* PKCS-5 test with HMAC-Whirlpool used as the PRF */
|
||||||
derive_key_whirlpool ("passphrase-1234567890", 21, tmp_salt, 64, get_pkcs5_iteration_count(thid, benchmarkPim, benchmarkPreBoot), dk, MASTER_KEYDATA_SIZE);
|
derive_key_whirlpool ("passphrase-1234567890", 21, tmp_salt, 64, iterations, dk, MASTER_KEYDATA_SIZE);
|
||||||
break;
|
break;
|
||||||
|
|
||||||
case STREEBOG:
|
case STREEBOG:
|
||||||
/* PKCS-5 test with HMAC-STREEBOG used as the PRF */
|
/* PKCS-5 test with HMAC-STREEBOG used as the PRF */
|
||||||
derive_key_streebog("passphrase-1234567890", 21, tmp_salt, 64, get_pkcs5_iteration_count(thid, benchmarkPim, benchmarkPreBoot), dk, MASTER_KEYDATA_SIZE);
|
derive_key_streebog("passphrase-1234567890", 21, tmp_salt, 64, iterations, dk, MASTER_KEYDATA_SIZE);
|
||||||
|
break;
|
||||||
|
|
||||||
|
case ARGON2:
|
||||||
|
/* test with ARGON2 used as the PRF */
|
||||||
|
derive_key_argon2 ("passphrase-1234567890", 21, tmp_salt, 64, iterations, memoryCost, dk, MASTER_KEYDATA_SIZE);
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
@@ -6315,7 +6337,8 @@ static BOOL PerformBenchmark(HWND hBenchDlg, HWND hwndDlg)
|
|||||||
|
|
||||||
benchmarkTable[benchmarkTotalItems].encSpeed = performanceCountEnd.QuadPart - performanceCountStart.QuadPart;
|
benchmarkTable[benchmarkTotalItems].encSpeed = performanceCountEnd.QuadPart - performanceCountStart.QuadPart;
|
||||||
benchmarkTable[benchmarkTotalItems].id = thid;
|
benchmarkTable[benchmarkTotalItems].id = thid;
|
||||||
benchmarkTable[benchmarkTotalItems].decSpeed = get_pkcs5_iteration_count(thid, benchmarkPim, benchmarkPreBoot);
|
benchmarkTable[benchmarkTotalItems].iterations = iterations;
|
||||||
|
benchmarkTable[benchmarkTotalItems].memoryCost = memoryCost;
|
||||||
benchmarkTable[benchmarkTotalItems].meanBytesPerSec = (unsigned __int64) (1000 * ((float) benchmarkTable[benchmarkTotalItems].encSpeed / benchmarkPerformanceFrequency.QuadPart / 2));
|
benchmarkTable[benchmarkTotalItems].meanBytesPerSec = (unsigned __int64) (1000 * ((float) benchmarkTable[benchmarkTotalItems].encSpeed / benchmarkPerformanceFrequency.QuadPart / 2));
|
||||||
if (benchmarkPreBoot)
|
if (benchmarkPreBoot)
|
||||||
{
|
{
|
||||||
|
|||||||
@@ -100,6 +100,7 @@ typedef struct EncryptionThreadPoolWorkItemStruct
|
|||||||
LONG *CompletionFlag;
|
LONG *CompletionFlag;
|
||||||
char *DerivedKey;
|
char *DerivedKey;
|
||||||
int IterationCount;
|
int IterationCount;
|
||||||
|
int Memorycost;
|
||||||
TC_EVENT *NoOutstandingWorkItemEvent;
|
TC_EVENT *NoOutstandingWorkItemEvent;
|
||||||
LONG *OutstandingWorkItemCount;
|
LONG *OutstandingWorkItemCount;
|
||||||
char *Password;
|
char *Password;
|
||||||
@@ -273,6 +274,11 @@ static TC_THREAD_PROC EncryptionThreadProc (void *threadArg)
|
|||||||
workItem->KeyDerivation.IterationCount, workItem->KeyDerivation.DerivedKey, GetMaxPkcs5OutSize());
|
workItem->KeyDerivation.IterationCount, workItem->KeyDerivation.DerivedKey, GetMaxPkcs5OutSize());
|
||||||
break;
|
break;
|
||||||
|
|
||||||
|
case ARGON2:
|
||||||
|
derive_key_argon2(workItem->KeyDerivation.Password, workItem->KeyDerivation.PasswordLength, workItem->KeyDerivation.Salt, PKCS5_SALT_SIZE,
|
||||||
|
workItem->KeyDerivation.IterationCount, workItem->KeyDerivation.Memorycost, workItem->KeyDerivation.DerivedKey, GetMaxPkcs5OutSize());
|
||||||
|
break;
|
||||||
|
|
||||||
default:
|
default:
|
||||||
TC_THROW_FATAL_EXCEPTION;
|
TC_THROW_FATAL_EXCEPTION;
|
||||||
}
|
}
|
||||||
@@ -533,7 +539,7 @@ void EncryptionThreadPoolStop ()
|
|||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
void EncryptionThreadPoolBeginKeyDerivation (TC_EVENT *completionEvent, TC_EVENT *noOutstandingWorkItemEvent, LONG *completionFlag, LONG *outstandingWorkItemCount, int pkcs5Prf, char *password, int passwordLength, char *salt, int iterationCount, char *derivedKey)
|
void EncryptionThreadPoolBeginKeyDerivation (TC_EVENT *completionEvent, TC_EVENT *noOutstandingWorkItemEvent, LONG *completionFlag, LONG *outstandingWorkItemCount, int pkcs5Prf, char *password, int passwordLength, char *salt, int iterationCount, int memoryCost, char *derivedKey)
|
||||||
{
|
{
|
||||||
EncryptionThreadPoolWorkItem *workItem;
|
EncryptionThreadPoolWorkItem *workItem;
|
||||||
|
|
||||||
@@ -556,6 +562,7 @@ void EncryptionThreadPoolBeginKeyDerivation (TC_EVENT *completionEvent, TC_EVENT
|
|||||||
workItem->KeyDerivation.CompletionFlag = completionFlag;
|
workItem->KeyDerivation.CompletionFlag = completionFlag;
|
||||||
workItem->KeyDerivation.DerivedKey = derivedKey;
|
workItem->KeyDerivation.DerivedKey = derivedKey;
|
||||||
workItem->KeyDerivation.IterationCount = iterationCount;
|
workItem->KeyDerivation.IterationCount = iterationCount;
|
||||||
|
workItem->KeyDerivation.Memorycost = memoryCost;
|
||||||
workItem->KeyDerivation.NoOutstandingWorkItemEvent = noOutstandingWorkItemEvent;
|
workItem->KeyDerivation.NoOutstandingWorkItemEvent = noOutstandingWorkItemEvent;
|
||||||
workItem->KeyDerivation.OutstandingWorkItemCount = outstandingWorkItemCount;
|
workItem->KeyDerivation.OutstandingWorkItemCount = outstandingWorkItemCount;
|
||||||
workItem->KeyDerivation.Password = password;
|
workItem->KeyDerivation.Password = password;
|
||||||
|
|||||||
@@ -32,7 +32,7 @@ typedef enum
|
|||||||
size_t GetCpuCount (WORD* pGroupCount);
|
size_t GetCpuCount (WORD* pGroupCount);
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
void EncryptionThreadPoolBeginKeyDerivation (TC_EVENT *completionEvent, TC_EVENT *noOutstandingWorkItemEvent, LONG *completionFlag, LONG *outstandingWorkItemCount, int pkcs5Prf, char *password, int passwordLength, char *salt, int iterationCount, char *derivedKey);
|
void EncryptionThreadPoolBeginKeyDerivation (TC_EVENT *completionEvent, TC_EVENT *noOutstandingWorkItemEvent, LONG *completionFlag, LONG *outstandingWorkItemCount, int pkcs5Prf, char *password, int passwordLength, char *salt, int iterationCount, int memoryCost, char *derivedKey);
|
||||||
void EncryptionThreadPoolBeginReadVolumeHeaderFinalization (TC_EVENT *keyDerivationCompletedEvent, TC_EVENT *noOutstandingWorkItemEvent, LONG* outstandingWorkItemCount, void* keyInfoBuffer, int keyInfoBufferSize, void* keyDerivationWorkItems, int keyDerivationWorkItemsSize);
|
void EncryptionThreadPoolBeginReadVolumeHeaderFinalization (TC_EVENT *keyDerivationCompletedEvent, TC_EVENT *noOutstandingWorkItemEvent, LONG* outstandingWorkItemCount, void* keyInfoBuffer, int keyInfoBufferSize, void* keyDerivationWorkItems, int keyDerivationWorkItemsSize);
|
||||||
void EncryptionThreadPoolDoWork (EncryptionThreadPoolWorkType type, uint8 *data, const UINT64_STRUCT *startUnitNo, uint32 unitCount, PCRYPTO_INFO cryptoInfo);
|
void EncryptionThreadPoolDoWork (EncryptionThreadPoolWorkType type, uint8 *data, const UINT64_STRUCT *startUnitNo, uint32 unitCount, PCRYPTO_INFO cryptoInfo);
|
||||||
BOOL EncryptionThreadPoolStart (size_t encryptionFreeCpuCount);
|
BOOL EncryptionThreadPoolStart (size_t encryptionFreeCpuCount);
|
||||||
|
|||||||
@@ -1641,6 +1641,7 @@
|
|||||||
<entry lang="en" key="ERR_XTS_MASTERKEY_VULNERABLE">WARNING: The volume's master key is vulnerable to an attack that compromises data security.\n\nPlease create a new volume and transfer the data to it.</entry>
|
<entry lang="en" key="ERR_XTS_MASTERKEY_VULNERABLE">WARNING: The volume's master key is vulnerable to an attack that compromises data security.\n\nPlease create a new volume and transfer the data to it.</entry>
|
||||||
<entry lang="en" key="ERR_SYSENC_XTS_MASTERKEY_VULNERABLE">WARNING: The encrypted system's master key is vulnerable to an attack that compromises data security.\nPlease decrypt the system partition/drive and then re-encrypt it.</entry>
|
<entry lang="en" key="ERR_SYSENC_XTS_MASTERKEY_VULNERABLE">WARNING: The encrypted system's master key is vulnerable to an attack that compromises data security.\nPlease decrypt the system partition/drive and then re-encrypt it.</entry>
|
||||||
<entry lang="en" key="ERR_XTS_MASTERKEY_VULNERABLE_SHORT">WARNING: The volume's master key has a security vulnerability.</entry>
|
<entry lang="en" key="ERR_XTS_MASTERKEY_VULNERABLE_SHORT">WARNING: The volume's master key has a security vulnerability.</entry>
|
||||||
|
<entry lang="en" key="MEMORY_COST">Memory Cost</entry>
|
||||||
</localization>
|
</localization>
|
||||||
<xs:schema attributeFormDefault="unqualified" elementFormDefault="qualified" xmlns:xs="http://www.w3.org/2001/XMLSchema">
|
<xs:schema attributeFormDefault="unqualified" elementFormDefault="qualified" xmlns:xs="http://www.w3.org/2001/XMLSchema">
|
||||||
<xs:element name="VeraCrypt">
|
<xs:element name="VeraCrypt">
|
||||||
|
|||||||
@@ -1271,6 +1271,9 @@ wchar_t *get_pkcs5_prf_name (int pkcs5_prf_id)
|
|||||||
case STREEBOG:
|
case STREEBOG:
|
||||||
return L"HMAC-STREEBOG";
|
return L"HMAC-STREEBOG";
|
||||||
|
|
||||||
|
case ARGON2:
|
||||||
|
return L"Argon2";
|
||||||
|
|
||||||
default:
|
default:
|
||||||
return L"(Unknown)";
|
return L"(Unknown)";
|
||||||
}
|
}
|
||||||
@@ -1278,14 +1281,17 @@ wchar_t *get_pkcs5_prf_name (int pkcs5_prf_id)
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
int get_pkcs5_iteration_count (int pkcs5_prf_id, int pim, BOOL bBoot)
|
int get_pkcs5_iteration_count (int pkcs5_prf_id, int pim, BOOL bBoot, int* pMemoryCost)
|
||||||
{
|
{
|
||||||
if ( (pim < 0)
|
if ( (pim < 0)
|
||||||
)
|
)
|
||||||
{
|
{
|
||||||
|
*pMemoryCost = 0;
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
*pMemoryCost = 0;
|
||||||
|
|
||||||
switch (pkcs5_prf_id)
|
switch (pkcs5_prf_id)
|
||||||
{
|
{
|
||||||
|
|
||||||
@@ -1319,6 +1325,13 @@ int get_pkcs5_iteration_count (int pkcs5_prf_id, int pim, BOOL bBoot)
|
|||||||
return bBoot? pim * 2048 : 15000 + pim * 1000;
|
return bBoot? pim * 2048 : 15000 + pim * 1000;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
case ARGON2:
|
||||||
|
{
|
||||||
|
int iterations;
|
||||||
|
get_argon2_params (pim, &iterations, pMemoryCost);
|
||||||
|
return iterations;
|
||||||
|
}
|
||||||
|
|
||||||
default:
|
default:
|
||||||
TC_THROW_FATAL_EXCEPTION; // Unknown/wrong ID
|
TC_THROW_FATAL_EXCEPTION; // Unknown/wrong ID
|
||||||
}
|
}
|
||||||
@@ -1341,4 +1354,27 @@ int is_pkcs5_prf_supported (int pkcs5_prf_id, PRF_BOOT_TYPE bootType)
|
|||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
|
void derive_key_argon2(char *pwd, int pwd_len, char *salt, int salt_len, uint32 iterations, uint32 memcost, char *dk, int dklen)
|
||||||
|
{
|
||||||
|
//TODO: Implement Argon2 derivation
|
||||||
|
// In case of failure, just fill the derived key dk with zeroes
|
||||||
|
}
|
||||||
|
|
||||||
|
void get_argon2_params(int pim, int* pIterations, int* pMemcost)
|
||||||
|
{
|
||||||
|
int memcost = 16 * 1024 + pim * 512;
|
||||||
|
int iterations;
|
||||||
|
|
||||||
|
if (memcost <= 64 * 1024) {
|
||||||
|
// For memory costs up to 64 MB
|
||||||
|
iterations = 100 - (pim * 85) / 96;
|
||||||
|
} else {
|
||||||
|
// For memory costs above 64 MB
|
||||||
|
iterations = 15 - ((pim - 96) * 10) / 192;
|
||||||
|
}
|
||||||
|
|
||||||
|
*pIterations = iterations;
|
||||||
|
*pMemcost = memcost;
|
||||||
|
}
|
||||||
|
|
||||||
#endif //!TC_WINDOWS_BOOT
|
#endif //!TC_WINDOWS_BOOT
|
||||||
|
|||||||
@@ -40,9 +40,13 @@ void derive_key_whirlpool (char *pwd, int pwd_len, char *salt, int salt_len, uin
|
|||||||
void hmac_streebog (char *k, int32 lk, char *d, int32 ld);
|
void hmac_streebog (char *k, int32 lk, char *d, int32 ld);
|
||||||
void derive_key_streebog (char *pwd, int pwd_len, char *salt, int salt_len, uint32 iterations, char *dk, int dklen);
|
void derive_key_streebog (char *pwd, int pwd_len, char *salt, int salt_len, uint32 iterations, char *dk, int dklen);
|
||||||
|
|
||||||
int get_pkcs5_iteration_count (int pkcs5_prf_id, int pim, BOOL bBoot);
|
int get_pkcs5_iteration_count (int pkcs5_prf_id, int pim, BOOL bBoot, int* pMemoryCost);
|
||||||
wchar_t *get_pkcs5_prf_name (int pkcs5_prf_id);
|
wchar_t *get_pkcs5_prf_name (int pkcs5_prf_id);
|
||||||
|
|
||||||
|
void derive_key_argon2(char *pwd, int pwd_len, char *salt, int salt_len, uint32 iterations, uint32 memcost, char *dk, int dklen);
|
||||||
|
void get_argon2_params(int pim, int* pIterations, int* pMemcost);
|
||||||
|
|
||||||
|
|
||||||
/* check if given PRF supported.*/
|
/* check if given PRF supported.*/
|
||||||
typedef enum
|
typedef enum
|
||||||
{
|
{
|
||||||
|
|||||||
@@ -282,7 +282,8 @@ BOOL Randmix ()
|
|||||||
break;
|
break;
|
||||||
|
|
||||||
#ifndef WOLFCRYPT_BACKEND
|
#ifndef WOLFCRYPT_BACKEND
|
||||||
case BLAKE2S:
|
case ARGON2: // in case of Argon2, we use Blake2s
|
||||||
|
case BLAKE2S:
|
||||||
digestSize = BLAKE2S_DIGESTSIZE;
|
digestSize = BLAKE2S_DIGESTSIZE;
|
||||||
break;
|
break;
|
||||||
|
|
||||||
@@ -319,7 +320,8 @@ BOOL Randmix ()
|
|||||||
break;
|
break;
|
||||||
|
|
||||||
#ifndef WOLFCRYPT_BACKEND
|
#ifndef WOLFCRYPT_BACKEND
|
||||||
case BLAKE2S:
|
case ARGON2: // in case of Argon2, we use Blake2s
|
||||||
|
case BLAKE2S:
|
||||||
blake2s_init(&bctx);
|
blake2s_init(&bctx);
|
||||||
blake2s_update(&bctx, pRandPool, RNG_POOL_SIZE);
|
blake2s_update(&bctx, pRandPool, RNG_POOL_SIZE);
|
||||||
blake2s_final(&bctx, hashOutputBuffer);
|
blake2s_final(&bctx, hashOutputBuffer);
|
||||||
|
|||||||
@@ -192,6 +192,8 @@ int ReadVolumeHeader (BOOL bBoot, char *encryptedHeader, Password *password, int
|
|||||||
size_t encryptionThreadCount = GetEncryptionThreadCount();
|
size_t encryptionThreadCount = GetEncryptionThreadCount();
|
||||||
LONG *outstandingWorkItemCount = NULL;
|
LONG *outstandingWorkItemCount = NULL;
|
||||||
int i;
|
int i;
|
||||||
|
int iterationsCount = 0;
|
||||||
|
int memoryCost = 0;
|
||||||
#endif
|
#endif
|
||||||
size_t queuedWorkItems = 0;
|
size_t queuedWorkItems = 0;
|
||||||
|
|
||||||
@@ -322,9 +324,10 @@ int ReadVolumeHeader (BOOL bBoot, char *encryptedHeader, Password *password, int
|
|||||||
item->KeyReady = FALSE;
|
item->KeyReady = FALSE;
|
||||||
item->Pkcs5Prf = enqPkcs5Prf;
|
item->Pkcs5Prf = enqPkcs5Prf;
|
||||||
|
|
||||||
|
iterationsCount = get_pkcs5_iteration_count (enqPkcs5Prf, pim, bBoot, &memoryCost);
|
||||||
EncryptionThreadPoolBeginKeyDerivation (keyDerivationCompletedEvent, noOutstandingWorkItemEvent,
|
EncryptionThreadPoolBeginKeyDerivation (keyDerivationCompletedEvent, noOutstandingWorkItemEvent,
|
||||||
&item->KeyReady, outstandingWorkItemCount, enqPkcs5Prf, keyInfo->userKey,
|
&item->KeyReady, outstandingWorkItemCount, enqPkcs5Prf, keyInfo->userKey,
|
||||||
keyInfo->keyLength, keyInfo->salt, get_pkcs5_iteration_count (enqPkcs5Prf, pim, bBoot), item->DerivedKey);
|
keyInfo->keyLength, keyInfo->salt, iterationsCount, memoryCost, item->DerivedKey);
|
||||||
|
|
||||||
++queuedWorkItems;
|
++queuedWorkItems;
|
||||||
break;
|
break;
|
||||||
@@ -346,7 +349,9 @@ int ReadVolumeHeader (BOOL bBoot, char *encryptedHeader, Password *password, int
|
|||||||
if (!item->Free && InterlockedExchangeAdd (&item->KeyReady, 0) == TRUE)
|
if (!item->Free && InterlockedExchangeAdd (&item->KeyReady, 0) == TRUE)
|
||||||
{
|
{
|
||||||
pkcs5_prf = item->Pkcs5Prf;
|
pkcs5_prf = item->Pkcs5Prf;
|
||||||
keyInfo->noIterations = get_pkcs5_iteration_count (pkcs5_prf, pim, bBoot);
|
iterationsCount = get_pkcs5_iteration_count (pkcs5_prf, pim, bBoot, &memoryCost);
|
||||||
|
keyInfo->noIterations = iterationsCount;
|
||||||
|
keyInfo->memoryCost = memoryCost;
|
||||||
memcpy (dk, item->DerivedKey, sizeof (dk));
|
memcpy (dk, item->DerivedKey, sizeof (dk));
|
||||||
|
|
||||||
item->Free = TRUE;
|
item->Free = TRUE;
|
||||||
@@ -365,7 +370,9 @@ KeyReady: ;
|
|||||||
#endif // !defined(_UEFI)
|
#endif // !defined(_UEFI)
|
||||||
{
|
{
|
||||||
pkcs5_prf = enqPkcs5Prf;
|
pkcs5_prf = enqPkcs5Prf;
|
||||||
keyInfo->noIterations = get_pkcs5_iteration_count (enqPkcs5Prf, pim, bBoot);
|
iterationsCount = get_pkcs5_iteration_count (enqPkcs5Prf, pim, bBoot, &memoryCost);
|
||||||
|
keyInfo->noIterations = iterationsCount;
|
||||||
|
keyInfo->memoryCost = memoryCost;
|
||||||
|
|
||||||
switch (pkcs5_prf)
|
switch (pkcs5_prf)
|
||||||
{
|
{
|
||||||
@@ -380,21 +387,25 @@ KeyReady: ;
|
|||||||
break;
|
break;
|
||||||
|
|
||||||
#ifndef WOLFCRYPT_BACKEND
|
#ifndef WOLFCRYPT_BACKEND
|
||||||
case BLAKE2S:
|
case BLAKE2S:
|
||||||
derive_key_blake2s (keyInfo->userKey, keyInfo->keyLength, keyInfo->salt,
|
derive_key_blake2s (keyInfo->userKey, keyInfo->keyLength, keyInfo->salt,
|
||||||
PKCS5_SALT_SIZE, keyInfo->noIterations, dk, GetMaxPkcs5OutSize());
|
PKCS5_SALT_SIZE, keyInfo->noIterations, dk, GetMaxPkcs5OutSize());
|
||||||
break;
|
break;
|
||||||
|
|
||||||
case WHIRLPOOL:
|
case WHIRLPOOL:
|
||||||
derive_key_whirlpool (keyInfo->userKey, keyInfo->keyLength, keyInfo->salt,
|
derive_key_whirlpool (keyInfo->userKey, keyInfo->keyLength, keyInfo->salt,
|
||||||
PKCS5_SALT_SIZE, keyInfo->noIterations, dk, GetMaxPkcs5OutSize());
|
PKCS5_SALT_SIZE, keyInfo->noIterations, dk, GetMaxPkcs5OutSize());
|
||||||
break;
|
break;
|
||||||
|
|
||||||
|
case STREEBOG:
|
||||||
case STREEBOG:
|
|
||||||
derive_key_streebog(keyInfo->userKey, keyInfo->keyLength, keyInfo->salt,
|
derive_key_streebog(keyInfo->userKey, keyInfo->keyLength, keyInfo->salt,
|
||||||
PKCS5_SALT_SIZE, keyInfo->noIterations, dk, GetMaxPkcs5OutSize());
|
PKCS5_SALT_SIZE, keyInfo->noIterations, dk, GetMaxPkcs5OutSize());
|
||||||
break;
|
break;
|
||||||
|
|
||||||
|
case ARGON2:
|
||||||
|
derive_key_argon2(keyInfo->userKey, keyInfo->keyLength, keyInfo->salt,
|
||||||
|
PKCS5_SALT_SIZE, keyInfo->noIterations, keyInfo->memoryCost, dk, GetMaxPkcs5OutSize());
|
||||||
|
break;
|
||||||
#endif
|
#endif
|
||||||
default:
|
default:
|
||||||
// Unknown/wrong ID
|
// Unknown/wrong ID
|
||||||
@@ -540,6 +551,7 @@ KeyReady: ;
|
|||||||
{
|
{
|
||||||
cryptoInfo->pkcs5 = pkcs5_prf;
|
cryptoInfo->pkcs5 = pkcs5_prf;
|
||||||
cryptoInfo->noIterations = keyInfo->noIterations;
|
cryptoInfo->noIterations = keyInfo->noIterations;
|
||||||
|
cryptoInfo->memoryCost = keyInfo->memoryCost;
|
||||||
cryptoInfo->volumePim = pim;
|
cryptoInfo->volumePim = pim;
|
||||||
goto ret;
|
goto ret;
|
||||||
}
|
}
|
||||||
@@ -581,6 +593,7 @@ KeyReady: ;
|
|||||||
// PKCS #5
|
// PKCS #5
|
||||||
cryptoInfo->pkcs5 = pkcs5_prf;
|
cryptoInfo->pkcs5 = pkcs5_prf;
|
||||||
cryptoInfo->noIterations = keyInfo->noIterations;
|
cryptoInfo->noIterations = keyInfo->noIterations;
|
||||||
|
cryptoInfo->memoryCost = keyInfo->memoryCost;
|
||||||
cryptoInfo->volumePim = pim;
|
cryptoInfo->volumePim = pim;
|
||||||
|
|
||||||
// Init the cipher with the decrypted master key
|
// Init the cipher with the decrypted master key
|
||||||
@@ -962,12 +975,13 @@ int CreateVolumeHeaderInMemory (HWND hwndDlg, BOOL bBoot, char *header, int ea,
|
|||||||
{
|
{
|
||||||
memcpy (keyInfo.userKey, password->Text, nUserKeyLen);
|
memcpy (keyInfo.userKey, password->Text, nUserKeyLen);
|
||||||
keyInfo.keyLength = nUserKeyLen;
|
keyInfo.keyLength = nUserKeyLen;
|
||||||
keyInfo.noIterations = get_pkcs5_iteration_count (pkcs5_prf, pim, bBoot);
|
keyInfo.noIterations = get_pkcs5_iteration_count (pkcs5_prf, pim, bBoot, &keyInfo.memoryCost);
|
||||||
}
|
}
|
||||||
else
|
else
|
||||||
{
|
{
|
||||||
keyInfo.keyLength = 0;
|
keyInfo.keyLength = 0;
|
||||||
keyInfo.noIterations = 0;
|
keyInfo.noIterations = 0;
|
||||||
|
keyInfo.memoryCost = 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
// User selected encryption algorithm
|
// User selected encryption algorithm
|
||||||
@@ -976,6 +990,7 @@ int CreateVolumeHeaderInMemory (HWND hwndDlg, BOOL bBoot, char *header, int ea,
|
|||||||
// User selected PRF
|
// User selected PRF
|
||||||
cryptoInfo->pkcs5 = pkcs5_prf;
|
cryptoInfo->pkcs5 = pkcs5_prf;
|
||||||
cryptoInfo->noIterations = keyInfo.noIterations;
|
cryptoInfo->noIterations = keyInfo.noIterations;
|
||||||
|
cryptoInfo->memoryCost = keyInfo.memoryCost;
|
||||||
cryptoInfo->volumePim = pim;
|
cryptoInfo->volumePim = pim;
|
||||||
|
|
||||||
// Mode of operation
|
// Mode of operation
|
||||||
@@ -1023,6 +1038,11 @@ int CreateVolumeHeaderInMemory (HWND hwndDlg, BOOL bBoot, char *header, int ea,
|
|||||||
derive_key_streebog(keyInfo.userKey, keyInfo.keyLength, keyInfo.salt,
|
derive_key_streebog(keyInfo.userKey, keyInfo.keyLength, keyInfo.salt,
|
||||||
PKCS5_SALT_SIZE, keyInfo.noIterations, dk, GetMaxPkcs5OutSize());
|
PKCS5_SALT_SIZE, keyInfo.noIterations, dk, GetMaxPkcs5OutSize());
|
||||||
break;
|
break;
|
||||||
|
|
||||||
|
case ARGON2:
|
||||||
|
derive_key_argon2(keyInfo.userKey, keyInfo.keyLength, keyInfo.salt,
|
||||||
|
PKCS5_SALT_SIZE, keyInfo.noIterations, keyInfo.memoryCost, dk, GetMaxPkcs5OutSize());
|
||||||
|
break;
|
||||||
#endif
|
#endif
|
||||||
default:
|
default:
|
||||||
// Unknown/wrong ID
|
// Unknown/wrong ID
|
||||||
|
|||||||
Reference in New Issue
Block a user