Compare commits
80 Commits
| Author | SHA1 | Date | |
|---|---|---|---|
| 9d91ec912a | |||
| 7e431d98e9 | |||
| 90ffb25a2b | |||
| 79e43877a2 | |||
| abe87e865b | |||
| f87b2dbd8f | |||
| 1582c88be5 | |||
| 2ce3e823c5 | |||
| 4983edaaae | |||
| 66c6e3eea5 | |||
| b058911fb8 | |||
| a0ce6f3253 | |||
| 5e1de92454 | |||
| 55cf7b1937 | |||
| 3d990091eb | |||
| 232846e7ce | |||
| 860ec08d4f | |||
| 60276f5c97 | |||
| 8616e78547 | |||
| 8327ee125b | |||
| 5dadd948e6 | |||
| 02044f1054 | |||
| 194bd5fea5 | |||
| eb126bb663 | |||
| a4a4c0d8b2 | |||
| 0c4ef55a98 | |||
| 4a651da067 | |||
| 7b5db60d80 | |||
| 84e2ee5639 | |||
| 0f3af174b0 | |||
| 3f0a258c21 | |||
| 2a5aec7dce | |||
| 6c796df30a | |||
| 09ea57f146 | |||
| 0ae2423f19 | |||
| 3859e6492a | |||
| 0978d0323a | |||
| 0ea8b2dd32 | |||
| 12f92d2c96 | |||
| aea69148a8 | |||
| d537bc4948 | |||
| 42a8f5c358 | |||
| 7a30949ddd | |||
| eb8a5b6565 | |||
| d0a5628072 | |||
| 5498a2321e | |||
| fe2eb40ead | |||
| 0db1988d8f | |||
| 97530c8eb3 | |||
| a85c4ed55b | |||
| a9974c7e87 | |||
| 592d54728b | |||
| 21b3c4de52 | |||
| 3a854c3ccf | |||
| 877add0dbf | |||
| 482687cb68 | |||
| e35d94243e | |||
| e88e1b5d3d | |||
| 41ef97c43e | |||
| 7810e66114 | |||
| b4be05c34d | |||
| 1cb0ba935d | |||
| 8c8c873e73 | |||
| 692f65b7f0 | |||
| 1c4200a73a | |||
| 1c9e2ee527 | |||
| 8401e14ae0 | |||
| 0dbd81d1cc | |||
| f979789c11 | |||
| 498d7d31c4 | |||
| e58f05619e | |||
| 992b9349b3 | |||
| 1f4a1fb90f | |||
| c7fae1ad1d | |||
| 37bcb6a6d2 | |||
| 9ded0aed44 | |||
| 4442837ce8 | |||
| 31ee220558 | |||
| 0a25c13b65 | |||
| fd9d87c548 |
@@ -1,7 +1,29 @@
|
||||
|
||||
When building, use build.sh, not make.
|
||||
|
||||
Use it as follows: build.sh -m "useful comment on changes being made"
|
||||
|
||||
When making TUI menus, try to use the first leter of the command and the key to press to execute that command. For example, if the command is "Open file" try to use a keypress of "o" upper or lower case to signal to open the file. Use this instead of number keyed menus when possible. In the command, the letter should be underlined that signifies the command.
|
||||
|
||||
## Buffer Size Guidelines
|
||||
|
||||
### Path Handling
|
||||
- Always use buffers of size 1024 or PATH_MAX (4096) for file paths
|
||||
- When concatenating paths with snprintf, ensure buffer is at least 2x the expected maximum input
|
||||
- Use safer path construction patterns that check lengths before concatenation
|
||||
|
||||
### String Formatting Safety
|
||||
- Before using snprintf with dynamic strings, validate that buffer size >= sum of all input string lengths + format characters + 1
|
||||
- Use strnlen() to check actual string lengths before formatting
|
||||
- Consider using asprintf() for dynamic allocation when exact size is unknown
|
||||
- Add length validation before snprintf calls
|
||||
|
||||
### Compiler Warning Prevention
|
||||
- Always size string buffers generously (minimum 1024 for paths, 512 for general strings)
|
||||
- Use buffer size calculations: `size >= strlen(str1) + strlen(str2) + format_overhead + 1`
|
||||
- Add runtime length checks before snprintf operations
|
||||
- Consider using safer alternatives like strlcpy/strlcat if available
|
||||
|
||||
### Code Patterns to Avoid
|
||||
- Fixed-size buffers (512 bytes) for path operations where inputs could be 255+ bytes each
|
||||
- Concatenating unchecked strings with snprintf
|
||||
- Assuming maximum path component sizes without validation
|
||||
|
||||
9
.gitignore
vendored
9
.gitignore
vendored
@@ -1,9 +1,10 @@
|
||||
otp
|
||||
pads/
|
||||
files/
|
||||
Gemini.md
|
||||
TropicOfCancer-HenryMiller.txt
|
||||
.gitea_token
|
||||
true_rng/
|
||||
swiftrng/
|
||||
|
||||
# Auto-generated version files
|
||||
src/version.h
|
||||
src/version.c
|
||||
VERSION
|
||||
# Auto-generated files (none currently)
|
||||
|
||||
1
.rooignore
Normal file
1
.rooignore
Normal file
@@ -0,0 +1 @@
|
||||
otp copy.c
|
||||
@@ -1,361 +0,0 @@
|
||||
# Generic Automatic Version Increment System for Any Repository
|
||||
|
||||
Here's a generalized implementation guide for adding automatic versioning to any project:
|
||||
|
||||
## Core Concept
|
||||
**Automatic patch version increment with each build** - Every build automatically increments the patch version: v0.1.0 → v0.1.1 → v0.1.2, etc.
|
||||
|
||||
## Implementation Steps
|
||||
|
||||
### 1. Add Version Increment Function to Build Script
|
||||
Add this function to your build script (bash example):
|
||||
|
||||
```bash
|
||||
# Function to automatically increment version
|
||||
increment_version() {
|
||||
echo "[INFO] Incrementing version..."
|
||||
|
||||
# Check if we're in a git repository
|
||||
if ! git rev-parse --git-dir > /dev/null 2>&1; then
|
||||
echo "[WARNING] Not in a git repository - skipping version increment"
|
||||
return 0
|
||||
fi
|
||||
|
||||
# Get the highest version tag (not chronologically latest)
|
||||
LATEST_TAG=$(git tag -l 'v*.*.*' | sort -V | tail -n 1 || echo "v0.1.0")
|
||||
if [[ -z "$LATEST_TAG" ]]; then
|
||||
LATEST_TAG="v0.1.0"
|
||||
fi
|
||||
|
||||
# Extract version components (remove 'v' prefix)
|
||||
VERSION=${LATEST_TAG#v}
|
||||
|
||||
# Parse major.minor.patch using regex
|
||||
if [[ $VERSION =~ ^([0-9]+)\.([0-9]+)\.([0-9]+)$ ]]; then
|
||||
MAJOR=${BASH_REMATCH[1]}
|
||||
MINOR=${BASH_REMATCH[2]}
|
||||
PATCH=${BASH_REMATCH[3]}
|
||||
else
|
||||
echo "[ERROR] Invalid version format in tag: $LATEST_TAG"
|
||||
echo "[ERROR] Expected format: v0.1.0"
|
||||
return 1
|
||||
fi
|
||||
|
||||
# Increment patch version
|
||||
NEW_PATCH=$((PATCH + 1))
|
||||
NEW_VERSION="v${MAJOR}.${MINOR}.${NEW_PATCH}"
|
||||
|
||||
echo "[INFO] Current version: $LATEST_TAG"
|
||||
echo "[INFO] New version: $NEW_VERSION"
|
||||
|
||||
# Create new git tag
|
||||
if git tag "$NEW_VERSION" 2>/dev/null; then
|
||||
echo "[SUCCESS] Created new version tag: $NEW_VERSION"
|
||||
else
|
||||
echo "[WARNING] Tag $NEW_VERSION already exists - using existing version"
|
||||
NEW_VERSION=$LATEST_TAG
|
||||
fi
|
||||
|
||||
# Update VERSION file for compatibility
|
||||
echo "${NEW_VERSION#v}" > VERSION
|
||||
echo "[SUCCESS] Updated VERSION file to ${NEW_VERSION#v}"
|
||||
}
|
||||
```
|
||||
|
||||
### 2. Generate Version Header Files (For C/C++ Projects)
|
||||
Add this to the increment_version function:
|
||||
|
||||
```bash
|
||||
# Generate version.h header file (adjust path as needed)
|
||||
cat > src/version.h << EOF
|
||||
/*
|
||||
* Auto-Generated Version Header
|
||||
* DO NOT EDIT THIS FILE MANUALLY - Generated by build script
|
||||
*/
|
||||
|
||||
#ifndef VERSION_H
|
||||
#define VERSION_H
|
||||
|
||||
#define VERSION_MAJOR ${MAJOR}
|
||||
#define VERSION_MINOR ${MINOR}
|
||||
#define VERSION_PATCH ${NEW_PATCH}
|
||||
#define VERSION_STRING "${MAJOR}.${MINOR}.${NEW_PATCH}"
|
||||
#define VERSION_TAG "${NEW_VERSION}"
|
||||
|
||||
/* Build information */
|
||||
#define BUILD_DATE "$(date +%Y-%m-%d)"
|
||||
#define BUILD_TIME "$(date +%H:%M:%S)"
|
||||
#define BUILD_TIMESTAMP "$(date '+%Y-%m-%d %H:%M:%S')"
|
||||
|
||||
/* Git information */
|
||||
#define GIT_HASH "$(git rev-parse --short HEAD 2>/dev/null || echo 'unknown')"
|
||||
#define GIT_BRANCH "$(git rev-parse --abbrev-ref HEAD 2>/dev/null || echo 'unknown')"
|
||||
|
||||
/* Display versions */
|
||||
#define VERSION_DISPLAY "${NEW_VERSION}"
|
||||
#define VERSION_FULL_DISPLAY "${NEW_VERSION} ($(date '+%Y-%m-%d %H:%M:%S'), $(git rev-parse --short HEAD 2>/dev/null || echo 'unknown'))"
|
||||
|
||||
/* Version API functions */
|
||||
const char* get_version(void);
|
||||
const char* get_version_full(void);
|
||||
const char* get_build_info(void);
|
||||
|
||||
#endif /* VERSION_H */
|
||||
EOF
|
||||
|
||||
# Generate version.c implementation file
|
||||
cat > src/version.c << EOF
|
||||
/*
|
||||
* Auto-Generated Version Implementation
|
||||
* DO NOT EDIT THIS FILE MANUALLY - Generated by build script
|
||||
*/
|
||||
|
||||
#include "version.h"
|
||||
|
||||
const char* get_version(void) {
|
||||
return VERSION_TAG;
|
||||
}
|
||||
|
||||
const char* get_version_full(void) {
|
||||
return VERSION_FULL_DISPLAY;
|
||||
}
|
||||
|
||||
const char* get_build_info(void) {
|
||||
return "Built on " BUILD_DATE " at " BUILD_TIME " from commit " GIT_HASH " on branch " GIT_BRANCH;
|
||||
}
|
||||
EOF
|
||||
```
|
||||
|
||||
### 3. Generate Version File for Other Languages
|
||||
|
||||
**Python (`src/__version__.py`):**
|
||||
```bash
|
||||
cat > src/__version__.py << EOF
|
||||
"""Auto-generated version file"""
|
||||
__version__ = "${MAJOR}.${MINOR}.${NEW_PATCH}"
|
||||
__version_tag__ = "${NEW_VERSION}"
|
||||
__build_date__ = "$(date +%Y-%m-%d)"
|
||||
__build_time__ = "$(date +%H:%M:%S)"
|
||||
__git_hash__ = "$(git rev-parse --short HEAD 2>/dev/null || echo 'unknown')"
|
||||
__git_branch__ = "$(git rev-parse --abbrev-ref HEAD 2>/dev/null || echo 'unknown')"
|
||||
EOF
|
||||
```
|
||||
|
||||
**JavaScript/Node.js (update `package.json`):**
|
||||
```bash
|
||||
# Update package.json version field
|
||||
if [ -f package.json ]; then
|
||||
sed -i "s/\"version\": \".*\"/\"version\": \"${MAJOR}.${MINOR}.${NEW_PATCH}\"/" package.json
|
||||
fi
|
||||
```
|
||||
|
||||
**Rust (update `Cargo.toml`):**
|
||||
```bash
|
||||
if [ -f Cargo.toml ]; then
|
||||
sed -i "s/^version = \".*\"/version = \"${MAJOR}.${MINOR}.${NEW_PATCH}\"/" Cargo.toml
|
||||
fi
|
||||
```
|
||||
|
||||
**Go (generate `version.go`):**
|
||||
```bash
|
||||
cat > version.go << EOF
|
||||
// Auto-generated version file
|
||||
package main
|
||||
|
||||
const (
|
||||
VersionMajor = ${MAJOR}
|
||||
VersionMinor = ${MINOR}
|
||||
VersionPatch = ${NEW_PATCH}
|
||||
VersionString = "${MAJOR}.${MINOR}.${NEW_PATCH}"
|
||||
VersionTag = "${NEW_VERSION}"
|
||||
BuildDate = "$(date +%Y-%m-%d)"
|
||||
BuildTime = "$(date +%H:%M:%S)"
|
||||
GitHash = "$(git rev-parse --short HEAD 2>/dev/null || echo 'unknown')"
|
||||
GitBranch = "$(git rev-parse --abbrev-ref HEAD 2>/dev/null || echo 'unknown')"
|
||||
)
|
||||
EOF
|
||||
```
|
||||
|
||||
**Java (generate `Version.java`):**
|
||||
```bash
|
||||
cat > src/main/java/Version.java << EOF
|
||||
// Auto-generated version class
|
||||
public class Version {
|
||||
public static final int VERSION_MAJOR = ${MAJOR};
|
||||
public static final int VERSION_MINOR = ${MINOR};
|
||||
public static final int VERSION_PATCH = ${NEW_PATCH};
|
||||
public static final String VERSION_STRING = "${MAJOR}.${MINOR}.${NEW_PATCH}";
|
||||
public static final String VERSION_TAG = "${NEW_VERSION}";
|
||||
public static final String BUILD_DATE = "$(date +%Y-%m-%d)";
|
||||
public static final String BUILD_TIME = "$(date +%H:%M:%S)";
|
||||
public static final String GIT_HASH = "$(git rev-parse --short HEAD 2>/dev/null || echo 'unknown')";
|
||||
public static final String GIT_BRANCH = "$(git rev-parse --abbrev-ref HEAD 2>/dev/null || echo 'unknown')";
|
||||
}
|
||||
EOF
|
||||
```
|
||||
|
||||
### 4. Integrate into Build Targets
|
||||
Call `increment_version` before your main build commands:
|
||||
|
||||
```bash
|
||||
build_library() {
|
||||
increment_version
|
||||
echo "[INFO] Building library..."
|
||||
# Your actual build commands here
|
||||
make clean && make
|
||||
}
|
||||
|
||||
build_release() {
|
||||
increment_version
|
||||
echo "[INFO] Building release..."
|
||||
# Your release build commands
|
||||
}
|
||||
|
||||
build_package() {
|
||||
increment_version
|
||||
echo "[INFO] Building package..."
|
||||
# Your packaging commands
|
||||
}
|
||||
```
|
||||
|
||||
### 5. Update .gitignore
|
||||
Add generated version files to `.gitignore`:
|
||||
|
||||
```gitignore
|
||||
# Auto-generated version files
|
||||
src/version.h
|
||||
src/version.c
|
||||
src/__version__.py
|
||||
version.go
|
||||
src/main/java/Version.java
|
||||
VERSION
|
||||
```
|
||||
|
||||
### 6. Update Build System Files
|
||||
|
||||
**For Makefile projects:**
|
||||
```makefile
|
||||
# Add version.c to your source files
|
||||
SOURCES = main.c utils.c version.c
|
||||
```
|
||||
|
||||
**For CMake projects:**
|
||||
```cmake
|
||||
# Add version files to your target
|
||||
target_sources(your_target PRIVATE src/version.c)
|
||||
```
|
||||
|
||||
**For Node.js projects:**
|
||||
```json
|
||||
{
|
||||
"scripts": {
|
||||
"build": "node build.js && increment_version",
|
||||
"version": "node -e \"console.log(require('./package.json').version)\""
|
||||
}
|
||||
}
|
||||
```
|
||||
|
||||
### 7. Create Initial Version Tag
|
||||
```bash
|
||||
# Start with initial version
|
||||
git tag v0.1.0
|
||||
```
|
||||
|
||||
## Usage Pattern
|
||||
```bash
|
||||
./build.sh # v0.1.0 → v0.1.1
|
||||
./build.sh release # v0.1.1 → v0.1.2
|
||||
./build.sh package # v0.1.2 → v0.1.3
|
||||
```
|
||||
|
||||
## Manual Version Control
|
||||
|
||||
### Major/Minor Version Bumps
|
||||
```bash
|
||||
# For feature releases (minor bump)
|
||||
git tag v0.2.0 # Next build: v0.2.1
|
||||
|
||||
# For breaking changes (major bump)
|
||||
git tag v1.0.0 # Next build: v1.0.1
|
||||
```
|
||||
|
||||
### Version Reset
|
||||
```bash
|
||||
# Delete incorrect tags (if needed)
|
||||
git tag -d v0.2.1
|
||||
git push origin --delete v0.2.1 # If pushed to remote
|
||||
|
||||
# Create correct base version
|
||||
git tag v0.2.0
|
||||
|
||||
# Next build will create v0.2.1
|
||||
```
|
||||
|
||||
## Example Build Script Template
|
||||
```bash
|
||||
#!/bin/bash
|
||||
set -e
|
||||
|
||||
# Colors for output
|
||||
RED='\033[0;31m'
|
||||
GREEN='\033[0;32m'
|
||||
YELLOW='\033[1;33m'
|
||||
BLUE='\033[0;34m'
|
||||
NC='\033[0m'
|
||||
|
||||
print_status() { echo -e "${BLUE}[INFO]${NC} $1"; }
|
||||
print_success() { echo -e "${GREEN}[SUCCESS]${NC} $1"; }
|
||||
print_warning() { echo -e "${YELLOW}[WARNING]${NC} $1"; }
|
||||
print_error() { echo -e "${RED}[ERROR]${NC} $1"; }
|
||||
|
||||
# Insert increment_version function here
|
||||
|
||||
case "${1:-build}" in
|
||||
build)
|
||||
increment_version
|
||||
print_status "Building project..."
|
||||
# Your build commands
|
||||
;;
|
||||
clean)
|
||||
print_status "Cleaning build artifacts..."
|
||||
# Your clean commands
|
||||
;;
|
||||
test)
|
||||
print_status "Running tests..."
|
||||
# Your test commands (no version increment)
|
||||
;;
|
||||
release)
|
||||
increment_version
|
||||
print_status "Building release..."
|
||||
# Your release commands
|
||||
;;
|
||||
*)
|
||||
echo "Usage: $0 {build|clean|test|release}"
|
||||
exit 1
|
||||
;;
|
||||
esac
|
||||
```
|
||||
|
||||
## Benefits
|
||||
1. **Zero maintenance** - No manual version editing
|
||||
2. **Build traceability** - Every build has unique version + metadata
|
||||
3. **Git integration** - Automatic version tags
|
||||
4. **Language agnostic** - Adapt generation for any language
|
||||
5. **CI/CD friendly** - Works in automated environments
|
||||
6. **Rollback friendly** - Easy to revert to previous versions
|
||||
|
||||
## Troubleshooting
|
||||
|
||||
### Version Not Incrementing
|
||||
- Ensure you're in a git repository
|
||||
- Check that git tags exist: `git tag --list`
|
||||
- Verify tag format matches `v*.*.*` pattern
|
||||
|
||||
### Tag Already Exists
|
||||
If a tag already exists, the build continues with existing version:
|
||||
```
|
||||
[WARNING] Tag v0.2.1 already exists - using existing version
|
||||
```
|
||||
|
||||
### Missing Git Information
|
||||
If git is unavailable, version files show "unknown" for git hash and branch.
|
||||
24
Makefile
24
Makefile
@@ -1,22 +1,24 @@
|
||||
CC = gcc
|
||||
CFLAGS = -Wall -Wextra -std=c99
|
||||
LIBS =
|
||||
LIBS_STATIC = -static
|
||||
CFLAGS = -Wall -Wextra -std=c99 -Iinclude
|
||||
LIBS = -lm
|
||||
LIBS_STATIC = -static -lm
|
||||
TARGET = otp
|
||||
SOURCE = otp.c
|
||||
VERSION_SOURCE = src/version.c
|
||||
SOURCES = $(wildcard src/*.c) nostr_chacha20.c otp.c
|
||||
OBJS = $(SOURCES:.c=.o)
|
||||
|
||||
# Default build target
|
||||
$(TARGET): $(SOURCE)
|
||||
$(CC) $(CFLAGS) -o $(TARGET) $(SOURCE) $(VERSION_SOURCE) $(LIBS)
|
||||
$(TARGET): $(OBJS)
|
||||
$(CC) $(CFLAGS) -o $(TARGET) $(OBJS) $(LIBS)
|
||||
|
||||
# Static linking target
|
||||
static: $(SOURCE)
|
||||
$(CC) $(CFLAGS) -o $(TARGET) $(SOURCE) $(VERSION_SOURCE) $(LIBS_STATIC)
|
||||
static: $(OBJS)
|
||||
$(CC) $(CFLAGS) -o $(TARGET) $(OBJS) $(LIBS_STATIC)
|
||||
|
||||
%.o: %.c
|
||||
$(CC) $(CFLAGS) -c $< -o $@
|
||||
|
||||
clean:
|
||||
rm -f $(TARGET) *.pad *.state
|
||||
rm -f src/version.h src/version.c VERSION
|
||||
rm -f $(TARGET) $(OBJS) *.pad *.state
|
||||
|
||||
install:
|
||||
sudo cp $(TARGET) /usr/local/bin/
|
||||
|
||||
62
README.md
62
README.md
@@ -1,6 +1,47 @@
|
||||
# OTP Cipher - One Time Pad Implementation
|
||||
|
||||
A secure one-time pad (OTP) cipher implementation in C with automatic versioning system.
|
||||
|
||||
## Introduction
|
||||
|
||||
A secure one-time pad (OTP) cipher implementation in C.
|
||||
|
||||
## Why One-Time Pads
|
||||
|
||||
Nostr and much of the web runs on public key cryptography. Public key cryptography is great, but it is vulnerable. Cryptographers know this, and they know what it takes to attack it, so what they do is just make the keys large enough such that the system is resistant to attack given computers as they are today.
|
||||
|
||||
There is one type of cryptography, however, that is invulnerable to any type of attack in our universe, and that is known as a one-time pad.
|
||||
|
||||
One-time pads rely directly on the laws of physics and what it means for a number to be truly random.
|
||||
|
||||
If you take your secret message and mix it with truly random numbers, and don't use those random numbers again, then that message is unbreakable by any computer, no matter how powerful, quantum or not, forever.
|
||||
|
||||
In fact, one-time pads are so powerful that if you have data encrypted by a one-time pad located in a distant galaxy, and that data is not kept anywhere else, then by destroying the pad used for encryption in your galaxy, the data is wiped from the universe and can never be recovered.
|
||||
|
||||
## Advantages and Limitations
|
||||
|
||||
### Limitations
|
||||
|
||||
1. The pad must be shared between the parties wanting to use it.
|
||||
2. The pad must be as long or longer than what you want to encrypt, and it can't be used a second time.
|
||||
|
||||
### Modern Advantages
|
||||
|
||||
While in the past, pad length might have been a problem, readily available USB drives in the terabytes make size less of a problem for many uses.
|
||||
|
||||
We are also becoming very accustomed to YubiKey authenticators in the USB ports of our computers. A small USB drive in our devices can now easily contain a key of greater length than all the text messages we would expect to send over a lifetime.
|
||||
|
||||
### Multi-Device Coordination
|
||||
|
||||
One of the problems to address is the fact that to use an OTP across several devices means that they have to coordinate to know when they are encrypting new plaintext and where to start in the key. Reusing the same section of the pad, while not necessarily fatal, degrades the encryption from its status as "Information Theoretically Secure".
|
||||
|
||||
To address this problem, we can use Nostr to share among devices the place in the pad that was last left off.
|
||||
|
||||
### Additional Benefits
|
||||
|
||||
One-time pads can be trivially encrypted and decrypted using pencil and paper, making them accessible even without electronic devices.
|
||||
|
||||
|
||||
|
||||
|
||||
## Features
|
||||
|
||||
@@ -13,15 +54,6 @@ A secure one-time pad (OTP) cipher implementation in C with automatic versioning
|
||||
- **Multiple Build Options**: Standard and static linking builds
|
||||
- **Cross-Platform**: Works on Linux and other UNIX-like systems
|
||||
|
||||
## Version Information
|
||||
|
||||
This project uses an automatic versioning system that:
|
||||
- Automatically increments the patch version on each build
|
||||
- Embeds build timestamp, git commit hash, and branch information
|
||||
- Creates git tags for version tracking
|
||||
- Generates version header files with detailed build metadata
|
||||
|
||||
Current version can be viewed with: `./otp --help` or by running the interactive mode.
|
||||
|
||||
## Building
|
||||
|
||||
@@ -31,7 +63,7 @@ Current version can be viewed with: `./otp --help` or by running the interactive
|
||||
- Git (for version tracking)
|
||||
- Make
|
||||
|
||||
**Note: OpenSSL is no longer required! This implementation is now completely self-contained.**
|
||||
|
||||
|
||||
### Build Commands
|
||||
|
||||
@@ -119,10 +151,7 @@ git tag v1.0.0 # Next build: v1.0.1
|
||||
- Full version display with metadata
|
||||
|
||||
### Generated Files
|
||||
The build system automatically generates:
|
||||
- `src/version.h` - Version constants and macros
|
||||
- `src/version.c` - Version API functions
|
||||
- `VERSION` - Plain text version number
|
||||
The build system automatically manages Git versioning by incrementing tags.
|
||||
|
||||
These files are excluded from git (.gitignore) and regenerated on each build.
|
||||
|
||||
@@ -144,9 +173,6 @@ otp/
|
||||
├── otp.c # Main source code
|
||||
├── README.md # This file
|
||||
├── .gitignore # Git ignore rules
|
||||
├── src/ # Generated version files (auto-created)
|
||||
│ ├── version.h # Version header (generated)
|
||||
│ └── version.c # Version implementation (generated)
|
||||
├── pads/ # OTP pad storage directory (created at runtime)
|
||||
└── VERSION # Plain text version (generated)
|
||||
```
|
||||
|
||||
3
TODO.md
Normal file
3
TODO.md
Normal file
@@ -0,0 +1,3 @@
|
||||
# TODO
|
||||
|
||||
## The pad menu in interactive encrypt mode gives numbers instead of checksum selection
|
||||
302
build.sh
302
build.sh
@@ -16,18 +16,31 @@ print_error() { echo -e "${RED}[ERROR]${NC} $1"; }
|
||||
# Global variable for commit message
|
||||
COMMIT_MESSAGE=""
|
||||
|
||||
# Parse command line arguments for -m flag
|
||||
while [[ $# -gt 0 ]]; do
|
||||
case $1 in
|
||||
-m|--message)
|
||||
COMMIT_MESSAGE="$2"
|
||||
shift 2
|
||||
# Parse command line arguments - check if first arg is a command, otherwise treat as commit message
|
||||
COMMAND=""
|
||||
if [[ $# -gt 0 ]]; then
|
||||
case "$1" in
|
||||
build|clean|install|uninstall)
|
||||
COMMAND="$1"
|
||||
shift
|
||||
;;
|
||||
*)
|
||||
# Keep other arguments for main logic
|
||||
break
|
||||
# First argument is not a command, so default to build and treat all args as commit message
|
||||
COMMAND="build"
|
||||
;;
|
||||
esac
|
||||
else
|
||||
# No arguments, default to build
|
||||
COMMAND="build"
|
||||
fi
|
||||
|
||||
# Any remaining arguments become the commit message
|
||||
for arg in "$@"; do
|
||||
if [[ -z "$COMMIT_MESSAGE" ]]; then
|
||||
COMMIT_MESSAGE="$arg"
|
||||
else
|
||||
COMMIT_MESSAGE="$COMMIT_MESSAGE $arg"
|
||||
fi
|
||||
done
|
||||
|
||||
# Function to automatically increment version
|
||||
@@ -100,13 +113,13 @@ increment_version() {
|
||||
print_success "Created new version tag: $NEW_VERSION"
|
||||
|
||||
# Push changes and tags to remote repository
|
||||
if git push ssh://ubuntu@laantungir.net:/home/ubuntu/git_repos/otp 2>/dev/null; then
|
||||
if git push 2>/dev/null; then
|
||||
print_success "Pushed changes to remote repository"
|
||||
else
|
||||
print_warning "Failed to push changes to remote repository"
|
||||
fi
|
||||
|
||||
if git push ssh://ubuntu@laantungir.net:/home/ubuntu/git_repos/otp --tags 2>/dev/null; then
|
||||
if git push --tags 2>/dev/null; then
|
||||
print_success "Pushed tags to remote repository"
|
||||
else
|
||||
print_warning "Failed to push tags to remote repository"
|
||||
@@ -123,106 +136,178 @@ increment_version() {
|
||||
fi
|
||||
fi
|
||||
|
||||
# Update VERSION file for compatibility
|
||||
echo "${NEW_VERSION#v}" > VERSION
|
||||
print_success "Updated VERSION file to ${NEW_VERSION#v}"
|
||||
# Update version strings in source code
|
||||
update_source_version "$NEW_VERSION"
|
||||
|
||||
# Generate version.h header file
|
||||
mkdir -p src
|
||||
cat > src/version.h << EOF
|
||||
/*
|
||||
* Auto-Generated Version Header
|
||||
* DO NOT EDIT THIS FILE MANUALLY - Generated by build script
|
||||
*/
|
||||
|
||||
#ifndef VERSION_H
|
||||
#define VERSION_H
|
||||
|
||||
#define VERSION_MAJOR ${MAJOR}
|
||||
#define VERSION_MINOR ${MINOR}
|
||||
#define VERSION_PATCH ${NEW_PATCH}
|
||||
#define VERSION_STRING "${MAJOR}.${MINOR}.${NEW_PATCH}"
|
||||
#define VERSION_TAG "${NEW_VERSION}"
|
||||
|
||||
/* Build information */
|
||||
#define BUILD_DATE "$(date +%Y-%m-%d)"
|
||||
#define BUILD_TIME "$(date +%H:%M:%S)"
|
||||
#define BUILD_TIMESTAMP "$(date '+%Y-%m-%d %H:%M:%S')"
|
||||
|
||||
/* Git information */
|
||||
#define GIT_HASH "$(git rev-parse --short HEAD 2>/dev/null || echo 'unknown')"
|
||||
#define GIT_BRANCH "$(git rev-parse --abbrev-ref HEAD 2>/dev/null || echo 'unknown')"
|
||||
|
||||
/* Display versions */
|
||||
#define VERSION_DISPLAY "${NEW_VERSION}"
|
||||
#define VERSION_FULL_DISPLAY "${NEW_VERSION} ($(date '+%Y-%m-%d %H:%M:%S'), $(git rev-parse --short HEAD 2>/dev/null || echo 'unknown'))"
|
||||
|
||||
/* Version API functions */
|
||||
const char* get_version(void);
|
||||
const char* get_version_full(void);
|
||||
const char* get_build_info(void);
|
||||
|
||||
#endif /* VERSION_H */
|
||||
EOF
|
||||
|
||||
# Generate version.c implementation file
|
||||
cat > src/version.c << EOF
|
||||
/*
|
||||
* Auto-Generated Version Implementation
|
||||
* DO NOT EDIT THIS FILE MANUALLY - Generated by build script
|
||||
*/
|
||||
|
||||
#include "version.h"
|
||||
|
||||
const char* get_version(void) {
|
||||
return VERSION_TAG;
|
||||
print_success "Version updated to ${NEW_VERSION}"
|
||||
}
|
||||
|
||||
const char* get_version_full(void) {
|
||||
return VERSION_FULL_DISPLAY;
|
||||
# Function to update version strings in source code
|
||||
update_source_version() {
|
||||
local NEW_VERSION="$1"
|
||||
|
||||
print_status "Updating version strings in source code..."
|
||||
|
||||
# Replace hardcoded version strings in otp.c with the current git tag
|
||||
if [ -f "otp.c" ]; then
|
||||
# Update main menu version
|
||||
sed -i "s/OTP v[0-9]\+\.[0-9]\+\.[0-9]\+/OTP $NEW_VERSION/g" otp.c
|
||||
# Update ASCII output version
|
||||
sed -i "s/Version: v[0-9]\+\.[0-9]\+\.[0-9]\+/Version: $NEW_VERSION/g" otp.c
|
||||
# Update usage/help text version
|
||||
sed -i "s/Implementation v[0-9]\+\.[0-9]\+\.[0-9]\+/Implementation $NEW_VERSION/g" otp.c
|
||||
|
||||
print_success "Updated version strings in otp.c to $NEW_VERSION"
|
||||
else
|
||||
print_warning "otp.c not found - skipping version string updates"
|
||||
fi
|
||||
}
|
||||
|
||||
const char* get_build_info(void) {
|
||||
return "Built on " BUILD_DATE " at " BUILD_TIME " from commit " GIT_HASH " on branch " GIT_BRANCH;
|
||||
}
|
||||
EOF
|
||||
|
||||
print_success "Generated version header files"
|
||||
# Cross-platform build functions
|
||||
check_cross_compiler() {
|
||||
if ! command -v aarch64-linux-gnu-gcc > /dev/null 2>&1; then
|
||||
print_error "ARM64/AArch64 cross-compiler not found!"
|
||||
print_error "Install with: sudo apt install gcc-aarch64-linux-gnu"
|
||||
print_error "Or on other distros: gcc-cross-aarch64"
|
||||
return 1
|
||||
fi
|
||||
return 0
|
||||
}
|
||||
|
||||
upload_release_asset() {
|
||||
local api_url="$1"
|
||||
local token="$2"
|
||||
local version="$3"
|
||||
local filename="$4"
|
||||
local display_name="$5"
|
||||
|
||||
if [ ! -f "$filename" ]; then
|
||||
print_warning "Binary $filename not found, skipping upload"
|
||||
return 1
|
||||
fi
|
||||
|
||||
print_status "Uploading $filename as '$display_name' to release..."
|
||||
|
||||
# Get release ID first
|
||||
local release_id=$(curl -s -H "Authorization: token $token" \
|
||||
"$api_url/releases/tags/$version" | \
|
||||
grep -o '"id":[0-9]*' | head -n1 | cut -d: -f2)
|
||||
|
||||
if [ -z "$release_id" ]; then
|
||||
print_error "Could not get release ID for $version"
|
||||
return 1
|
||||
fi
|
||||
|
||||
# Upload the asset using multipart/form-data
|
||||
curl -X POST "$api_url/releases/$release_id/assets" \
|
||||
-H "Authorization: token $token" \
|
||||
-F "attachment=@$filename;filename=$display_name"
|
||||
|
||||
if [ $? -eq 0 ]; then
|
||||
print_success "Uploaded $filename as '$display_name' successfully"
|
||||
else
|
||||
print_warning "Failed to upload $filename"
|
||||
return 1
|
||||
fi
|
||||
}
|
||||
|
||||
create_gitea_release() {
|
||||
local version="$1"
|
||||
|
||||
# Read token from ~/.gitea_token
|
||||
if [ ! -f "$HOME/.gitea_token" ]; then
|
||||
print_error "No ~/.gitea_token found. Cannot create release."
|
||||
print_error "Create ~/.gitea_token with your Gitea access token"
|
||||
return 1
|
||||
fi
|
||||
|
||||
local token=$(cat "$HOME/.gitea_token" | tr -d '\n\r')
|
||||
local api_url="https://git.laantungir.net/api/v1/repos/laantungir/otp"
|
||||
|
||||
print_status "Creating Gitea release for $version..."
|
||||
|
||||
# Create release
|
||||
local response=$(curl -s -X POST "$api_url/releases" \
|
||||
-H "Authorization: token $token" \
|
||||
-H "Content-Type: application/json" \
|
||||
-d "{\"tag_name\": \"$version\", \"name\": \"$version\", \"body\": \"Automated release for $version\"}")
|
||||
|
||||
if echo "$response" | grep -q '"id"'; then
|
||||
print_success "Created release $version"
|
||||
|
||||
# Upload binaries with descriptive names
|
||||
upload_release_asset "$api_url" "$token" "$version" "otp-x86_64" "otp-${version}-linux-x86_64"
|
||||
upload_release_asset "$api_url" "$token" "$version" "otp-arm64" "otp-${version}-linux-arm64"
|
||||
else
|
||||
print_warning "Release may already exist or creation failed"
|
||||
print_status "Response: $response"
|
||||
|
||||
# Try to upload to existing release anyway
|
||||
upload_release_asset "$api_url" "$token" "$version" "otp-x86_64" "otp-${version}-linux-x86_64"
|
||||
upload_release_asset "$api_url" "$token" "$version" "otp-arm64" "otp-${version}-linux-arm64"
|
||||
fi
|
||||
}
|
||||
|
||||
# Build functions
|
||||
build_project() {
|
||||
print_status "Cleaning previous build..."
|
||||
make clean
|
||||
increment_version
|
||||
print_status "Building OTP project..."
|
||||
make
|
||||
if [ $? -eq 0 ]; then
|
||||
print_success "Build completed successfully"
|
||||
|
||||
# Check for cross-compiler
|
||||
if ! check_cross_compiler; then
|
||||
print_warning "ARM64/AArch64 cross-compiler not available, building x86_64 only"
|
||||
|
||||
# Build x86_64 only
|
||||
print_status "Building OTP project for x86_64..."
|
||||
make CC=gcc
|
||||
if [ $? -eq 0 ]; then
|
||||
mv otp otp-x86_64
|
||||
print_success "x86_64 build completed successfully"
|
||||
else
|
||||
print_error "x86_64 build failed"
|
||||
return 1
|
||||
fi
|
||||
else
|
||||
print_error "Build failed"
|
||||
return 1
|
||||
# Build both architectures
|
||||
print_status "Building OTP project for x86_64..."
|
||||
make clean
|
||||
make CC=gcc
|
||||
if [ $? -eq 0 ]; then
|
||||
mv otp otp-x86_64
|
||||
print_success "x86_64 build completed successfully"
|
||||
else
|
||||
print_error "x86_64 build failed"
|
||||
return 1
|
||||
fi
|
||||
|
||||
print_status "Building OTP project for ARM64/AArch64..."
|
||||
make clean
|
||||
make CC=aarch64-linux-gnu-gcc
|
||||
if [ $? -eq 0 ]; then
|
||||
mv otp otp-arm64
|
||||
print_success "ARM64/AArch64 build completed successfully"
|
||||
else
|
||||
print_error "ARM64/AArch64 build failed"
|
||||
return 1
|
||||
fi
|
||||
fi
|
||||
}
|
||||
|
||||
build_static() {
|
||||
print_status "Cleaning previous build..."
|
||||
make clean
|
||||
increment_version
|
||||
print_status "Building OTP project with static linking..."
|
||||
make static
|
||||
if [ $? -eq 0 ]; then
|
||||
print_success "Static build completed successfully"
|
||||
|
||||
# Create Gitea release with binaries
|
||||
if [ -f "$HOME/.gitea_token" ]; then
|
||||
create_gitea_release "$NEW_VERSION"
|
||||
else
|
||||
print_error "Static build failed"
|
||||
return 1
|
||||
print_warning "No ~/.gitea_token found. Skipping release creation."
|
||||
print_warning "Create ~/.gitea_token with your Gitea access token to enable releases."
|
||||
fi
|
||||
|
||||
print_success "Build completed successfully"
|
||||
}
|
||||
|
||||
clean_project() {
|
||||
print_status "Cleaning build artifacts..."
|
||||
make clean
|
||||
rm -f VERSION src/version.h src/version.c
|
||||
# Remove cross-compiled binaries
|
||||
rm -f otp-x86_64 otp-arm64
|
||||
print_success "Clean completed"
|
||||
}
|
||||
|
||||
@@ -249,13 +334,10 @@ uninstall_project() {
|
||||
}
|
||||
|
||||
# Main script logic
|
||||
case "${1:-build}" in
|
||||
case "$COMMAND" in
|
||||
build)
|
||||
build_project
|
||||
;;
|
||||
static)
|
||||
build_static
|
||||
;;
|
||||
clean)
|
||||
clean_project
|
||||
;;
|
||||
@@ -265,29 +347,33 @@ case "${1:-build}" in
|
||||
uninstall)
|
||||
uninstall_project
|
||||
;;
|
||||
version)
|
||||
increment_version
|
||||
print_status "Version information generated"
|
||||
;;
|
||||
*)
|
||||
echo "OTP Cipher Build Script"
|
||||
echo "Usage: $0 [-m \"commit message\"] {build|static|clean|install|uninstall|version}"
|
||||
echo "Usage: $0 [command] [commit message]"
|
||||
echo ""
|
||||
echo "Options:"
|
||||
echo " -m, --message \"text\" - Specify commit message (skips interactive prompt)"
|
||||
echo "Arguments:"
|
||||
echo " command - {build|clean|install|uninstall} (default: build)"
|
||||
echo " commit message - Text to use as commit message (optional, skips interactive prompt)"
|
||||
echo ""
|
||||
echo "Commands:"
|
||||
echo " build - Build project with automatic version increment (default)"
|
||||
echo " static - Build with static linking"
|
||||
echo " clean - Clean build artifacts and generated files"
|
||||
echo " build - Cross-compile for x86_64 and ARM64/AArch64 with automatic version increment (default)"
|
||||
echo " clean - Clean build artifacts and cross-compiled binaries"
|
||||
echo " install - Install to system (requires build first)"
|
||||
echo " uninstall - Remove from system"
|
||||
echo " version - Generate version files only"
|
||||
echo ""
|
||||
echo "Build Output:"
|
||||
echo " otp-x86_64 - Native x86_64 binary"
|
||||
echo " otp-arm64 - ARM64/AArch64 binary for Raspberry Pi (if cross-compiler available)"
|
||||
echo ""
|
||||
echo "Gitea Integration:"
|
||||
echo " - Automatically creates releases with binaries if ~/.gitea_token exists"
|
||||
echo " - Requires: ARM64 cross-compiler (gcc-aarch64-linux-gnu)"
|
||||
echo ""
|
||||
echo "Examples:"
|
||||
echo " $0 build"
|
||||
echo " $0 -m \"Fixed checksum parsing bug\" build"
|
||||
echo " $0 --message \"Added new feature\" static"
|
||||
echo " $0"
|
||||
echo " $0 \"Fixed checksum parsing bug\""
|
||||
echo " $0 build \"Added new feature\""
|
||||
echo " $0 clean"
|
||||
exit 1
|
||||
;;
|
||||
esac
|
||||
|
||||
@@ -1 +0,0 @@
|
||||
Test file content for decryption
|
||||
BIN
files/out2.otp
BIN
files/out2.otp
Binary file not shown.
BIN
files/output.otp
BIN
files/output.otp
Binary file not shown.
@@ -1 +0,0 @@
|
||||
Test file content for decryption
|
||||
Binary file not shown.
@@ -1 +0,0 @@
|
||||
Hello, this is a test file for encryption!
|
||||
@@ -1,7 +0,0 @@
|
||||
-----BEGIN OTP MESSAGE-----
|
||||
Version: v0.2.29
|
||||
Pad-ChkSum: d0d4a489354348b08d8c7b324814d8c50010042e9da47f2c973f32a16a09101b
|
||||
Pad-Offset: 57
|
||||
|
||||
05S8GfS0tFfczNMUz0xrieFGoPSREM4uo5QhFGoBCcOzjfTXTDMt3hRtAQ==
|
||||
-----END OTP MESSAGE-----
|
||||
Binary file not shown.
@@ -1 +0,0 @@
|
||||
This is a test file for encryption.
|
||||
Binary file not shown.
345
include/otp.h
Normal file
345
include/otp.h
Normal file
@@ -0,0 +1,345 @@
|
||||
#ifndef OTP_H
|
||||
#define OTP_H
|
||||
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
// OTP CIPHER - FUNCTION PROTOTYPES HEADER
|
||||
// One Time Pad Implementation v0.2.109
|
||||
//
|
||||
// This header file contains all function prototypes extracted from otp.c
|
||||
// Organized by functional categories for better maintainability
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
|
||||
#include <stdio.h>
|
||||
#include <stdint.h>
|
||||
#include <stdlib.h>
|
||||
#include <termios.h>
|
||||
#include <sys/stat.h>
|
||||
#include <sys/ioctl.h>
|
||||
#include <time.h>
|
||||
#include <dirent.h>
|
||||
#include <fcntl.h>
|
||||
#include <unistd.h>
|
||||
#include <string.h>
|
||||
#include <ctype.h>
|
||||
|
||||
// Constants
|
||||
#define MAX_INPUT_SIZE 4096
|
||||
#define MAX_LINE_LENGTH 1024
|
||||
#define MAX_HASH_LENGTH 65
|
||||
#define PROGRESS_UPDATE_INTERVAL (64 * 1024 * 1024) // 64MB intervals
|
||||
#define DEFAULT_PADS_DIR "pads"
|
||||
#define FILES_DIR "files"
|
||||
#define MAX_ENTROPY_BUFFER (4 * 1024 * 1024) // 4MB entropy buffer for large operations
|
||||
|
||||
// Global variables - now managed through state module
|
||||
|
||||
//////////////////////////////////////////////////////////////////////////////
|
||||
// STATE MANAGEMENT FUNCTIONS
|
||||
//////////////////////////////////////////////////////////////////////////////
|
||||
|
||||
// State getters and setters
|
||||
const char* get_current_pads_dir(void);
|
||||
void set_current_pads_dir(const char* dir);
|
||||
int get_interactive_mode(void);
|
||||
void set_interactive_mode(int mode);
|
||||
int get_terminal_width(void);
|
||||
int get_terminal_height(void);
|
||||
void set_terminal_dimensions(int width, int height);
|
||||
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
// TYPE DEFINITIONS
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
|
||||
// Decrypt operation modes for universal decrypt function
|
||||
typedef enum {
|
||||
DECRYPT_MODE_INTERACTIVE, // Interactive text decryption with prompts
|
||||
DECRYPT_MODE_SILENT, // Silent text decryption (no prompts/labels)
|
||||
DECRYPT_MODE_FILE_TO_TEXT, // File to text output with prompts
|
||||
DECRYPT_MODE_FILE_TO_FILE // File to file output (binary)
|
||||
} decrypt_mode_t;
|
||||
|
||||
// Pad filter types for selection functions
|
||||
typedef enum {
|
||||
PAD_FILTER_ALL, // Show all pads
|
||||
PAD_FILTER_UNUSED_ONLY // Show only unused pads (0% usage)
|
||||
} pad_filter_type_t;
|
||||
|
||||
// Enhanced entropy system state structure
|
||||
typedef struct {
|
||||
size_t target_bytes; // Target entropy to collect
|
||||
size_t collected_bytes; // Bytes collected so far
|
||||
size_t unique_keys; // Number of unique keys pressed
|
||||
double collection_start_time; // Start timestamp
|
||||
double last_keypress_time; // Last keypress timestamp
|
||||
unsigned char quality_score; // Entropy quality (0-100)
|
||||
int auto_complete_enabled; // Allow auto-complete at minimum
|
||||
unsigned char key_histogram[256]; // Track key frequency
|
||||
} entropy_collection_state_t;
|
||||
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
// CORE APPLICATION FUNCTIONS
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
|
||||
// Main application entry points
|
||||
int main(int argc, char* argv[]);
|
||||
int interactive_mode(void);
|
||||
int command_line_mode(int argc, char* argv[]);
|
||||
int pipe_mode(int argc, char* argv[], const char* piped_text);
|
||||
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
// INPUT/OUTPUT DETECTION FUNCTIONS
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
|
||||
// Stdin detection functions
|
||||
int has_stdin_data(void);
|
||||
char* read_stdin_text(void);
|
||||
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
// PREFERENCES MANAGEMENT FUNCTIONS
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
|
||||
// Configuration and preferences handling
|
||||
int load_preferences(void);
|
||||
int save_preferences(void);
|
||||
char* get_preference(const char* key);
|
||||
int set_preference(const char* key, const char* value);
|
||||
char* get_default_pad_path(void);
|
||||
int set_default_pad_path(const char* pad_path);
|
||||
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
// HARDWARE DETECTION FUNCTIONS
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
|
||||
// OTP thumb drive detection function
|
||||
int detect_otp_thumb_drive(char* otp_drive_path, size_t path_size);
|
||||
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
// USB DRIVE MANAGEMENT FUNCTIONS
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
|
||||
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
// EXTERNAL TOOL INTEGRATION FUNCTIONS
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
|
||||
// Editor and file manager functions
|
||||
char* get_preferred_editor(void);
|
||||
char* get_preferred_file_manager(void);
|
||||
int launch_text_editor(const char* initial_content, char* result_buffer, size_t buffer_size);
|
||||
int launch_file_manager(const char* start_directory, char* selected_file, size_t buffer_size);
|
||||
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
// CORE CRYPTOGRAPHIC OPERATIONS
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
|
||||
// Primary encryption/decryption functions
|
||||
int generate_pad(uint64_t size_bytes, int show_progress);
|
||||
int encrypt_text(const char* pad_identifier, const char* input_text);
|
||||
int decrypt_text(const char* pad_identifier, const char* encrypted_message);
|
||||
int encrypt_file(const char* pad_identifier, const char* input_file, const char* output_file, int ascii_armor);
|
||||
int decrypt_file(const char* input_file, const char* output_file);
|
||||
int decrypt_binary_file(FILE* input_fp, const char* output_file);
|
||||
int decrypt_ascii_file(const char* input_file, const char* output_file);
|
||||
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
// ENHANCED ENTROPY SYSTEM FUNCTIONS
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
|
||||
// Entropy source types
|
||||
typedef enum {
|
||||
ENTROPY_SOURCE_KEYBOARD = 1,
|
||||
ENTROPY_SOURCE_DICE = 2,
|
||||
ENTROPY_SOURCE_TRUERNG = 3,
|
||||
ENTROPY_SOURCE_FILE = 4
|
||||
} entropy_source_t;
|
||||
|
||||
// Terminal control for entropy collection
|
||||
int setup_raw_terminal(struct termios* original_termios);
|
||||
void restore_terminal(struct termios* original_termios);
|
||||
|
||||
// Entropy collection and feedback
|
||||
int collect_entropy_with_feedback(unsigned char* entropy_buffer, size_t target_bytes,
|
||||
size_t* collected_bytes, int allow_early_exit);
|
||||
void display_entropy_progress(const entropy_collection_state_t* state);
|
||||
void draw_progress_bar(double percentage, int width);
|
||||
void draw_quality_bar(double quality, int width, const char* label);
|
||||
|
||||
// TrueRNG Device Constants (updated to match otp.c implementation)
|
||||
#define TRUERNG_VID "04D8"
|
||||
#define TRUERNG_PID "F5FE"
|
||||
#define TRUERNGPRO_VID "16D0"
|
||||
#define TRUERNGPRO_PID "0AA0"
|
||||
#define TRUERNGPROV2_VID "04D8"
|
||||
#define TRUERNGPROV2_PID "EBB5"
|
||||
|
||||
// SwiftRNG Device Constants (same VID/PID as TrueRNG devices)
|
||||
#define SWIFT_RNG_VID "04D8"
|
||||
#define SWIFT_RNG_PID "F5FE"
|
||||
#define SWIFT_RNG_PRO_VID "16D0"
|
||||
#define SWIFT_RNG_PRO_PID "0AA0"
|
||||
#define SWIFT_RNG_PRO_V2_VID "04D8"
|
||||
#define SWIFT_RNG_PRO_V2_PID "EBB5"
|
||||
|
||||
// TrueRNG/SwiftRNG Device Type enumeration
|
||||
typedef enum {
|
||||
TRUERNG_ORIGINAL = 1,
|
||||
TRUERNG_PRO = 2,
|
||||
TRUERNG_PRO_V2 = 3,
|
||||
SWIFT_RNG = 4,
|
||||
SWIFT_RNG_PRO = 5,
|
||||
SWIFT_RNG_PRO_V2 = 6
|
||||
} truerng_device_type_t;
|
||||
|
||||
// Hardware RNG device information structure
|
||||
typedef struct {
|
||||
char port_path[256]; // Device port path (e.g., /dev/ttyUSB0)
|
||||
truerng_device_type_t device_type; // Device type identifier
|
||||
char friendly_name[64]; // Human-readable device name
|
||||
int is_working; // 1 if device passes basic test, 0 otherwise
|
||||
} hardware_rng_device_t;
|
||||
|
||||
// Hardware RNG device detection and selection functions
|
||||
int detect_all_hardware_rng_devices(hardware_rng_device_t* devices, int max_devices, int* num_devices_found);
|
||||
int test_hardware_rng_device(const hardware_rng_device_t* device);
|
||||
int select_hardware_rng_device_interactive(hardware_rng_device_t* devices, int num_devices, hardware_rng_device_t* selected_device);
|
||||
int find_truerng_port(char* port_path, size_t port_path_size, truerng_device_type_t* device_type); // Legacy function for backward compatibility
|
||||
|
||||
// TrueRNG entropy collection functions (updated to match implementation)
|
||||
int setup_truerng_serial_port(const char* port_path);
|
||||
int collect_truerng_entropy(unsigned char* entropy_buffer, size_t target_bytes, size_t* collected_bytes, int display_progress);
|
||||
int collect_truerng_entropy_from_device(const hardware_rng_device_t* device, unsigned char* entropy_buffer,
|
||||
size_t target_bytes, size_t* collected_bytes, int display_progress);
|
||||
int collect_truerng_entropy_streaming_from_device(const hardware_rng_device_t* device, const char* pad_chksum,
|
||||
size_t total_bytes, int display_progress, int entropy_mode);
|
||||
const char* get_truerng_device_name(truerng_device_type_t device_type);
|
||||
int read_usb_device_info(const char* port_name, char* vid, char* pid);
|
||||
|
||||
// Dice entropy collection functions (updated to match implementation)
|
||||
int collect_dice_entropy(unsigned char* entropy_buffer, size_t target_bytes, size_t* collected_bytes, int display_progress);
|
||||
|
||||
// Unified entropy collection interface (updated to match implementation)
|
||||
int collect_entropy_by_source(entropy_source_t source, unsigned char* entropy_buffer, size_t target_bytes, size_t* collected_bytes, int display_progress);
|
||||
|
||||
// Entropy quality calculation
|
||||
double calculate_timing_quality(const entropy_collection_state_t* state);
|
||||
double calculate_variety_quality(const entropy_collection_state_t* state);
|
||||
unsigned char calculate_overall_quality(const entropy_collection_state_t* state);
|
||||
double get_precise_time(void);
|
||||
|
||||
// Entropy processing and application
|
||||
int derive_chacha20_params(const unsigned char* entropy_data, size_t entropy_size,
|
||||
unsigned char key[32], unsigned char nonce[12]);
|
||||
int add_entropy_to_pad(const char* pad_chksum, const unsigned char* entropy_data,
|
||||
size_t entropy_size, int show_progress);
|
||||
int add_entropy_direct_xor(const char* pad_chksum, const unsigned char* entropy_data,
|
||||
size_t entropy_size, uint64_t pad_size, int display_progress);
|
||||
int add_entropy_chacha20(const char* pad_chksum, const unsigned char* entropy_data,
|
||||
size_t entropy_size, uint64_t pad_size, int display_progress);
|
||||
int handle_add_entropy_to_pad(const char* pad_chksum);
|
||||
|
||||
// Enhanced entropy system helper functions
|
||||
int update_pad_checksum_after_entropy(const char* old_chksum, char* new_chksum);
|
||||
int rename_pad_files_safely(const char* old_chksum, const char* new_chksum);
|
||||
int is_pad_unused(const char* pad_chksum);
|
||||
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
// DIRECTORY MANAGEMENT FUNCTIONS
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
|
||||
// Directory handling and path management
|
||||
int ensure_pads_directory(void);
|
||||
void get_pad_path(const char* chksum, char* pad_path, char* state_path);
|
||||
const char* get_files_directory(void);
|
||||
void get_default_file_path(const char* filename, char* result_path, size_t result_size);
|
||||
void get_directory_display(const char* file_path, char* result, size_t result_size);
|
||||
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
// UTILITY FUNCTIONS
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
|
||||
// General utility and helper functions
|
||||
uint64_t parse_size_string(const char* size_str);
|
||||
char* find_pad_by_prefix(const char* prefix);
|
||||
int show_pad_info(const char* chksum);
|
||||
void show_progress(uint64_t current, uint64_t total, time_t start_time);
|
||||
void format_time_remaining(double seconds, char* buffer, size_t buffer_size);
|
||||
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
// FILE OPERATIONS
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
|
||||
// File state and checksum operations
|
||||
int read_state_offset(const char* pad_chksum, uint64_t* offset);
|
||||
int write_state_offset(const char* pad_chksum, uint64_t offset);
|
||||
int calculate_checksum(const char* filename, char* checksum_hex);
|
||||
int calculate_checksum_with_progress(const char* filename, char* checksum_hex, int display_progress, uint64_t file_size);
|
||||
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
// UNIVERSAL CORE FUNCTIONS FOR CODE CONSOLIDATION
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
|
||||
// Consolidated cryptographic operations
|
||||
int universal_xor_operation(const unsigned char* data, size_t data_len,
|
||||
const unsigned char* pad_data, unsigned char* result);
|
||||
int parse_ascii_message(const char* message, char* chksum, uint64_t* offset, char* base64_data);
|
||||
int load_pad_data(const char* pad_chksum, uint64_t offset, size_t length, unsigned char** pad_data);
|
||||
int generate_ascii_armor(const char* chksum, uint64_t offset, const unsigned char* encrypted_data,
|
||||
size_t data_length, char** ascii_output);
|
||||
int validate_pad_integrity(const char* pad_path, const char* expected_chksum);
|
||||
|
||||
// Universal decrypt function - consolidates all decrypt operations
|
||||
int universal_decrypt(const char* input_data, const char* output_target, decrypt_mode_t mode);
|
||||
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
// BASE64 ENCODING FUNCTIONS
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
|
||||
// Custom base64 implementation
|
||||
char* custom_base64_encode(const unsigned char* input, int length);
|
||||
unsigned char* custom_base64_decode(const char* input, int* output_length);
|
||||
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
// TERMINAL UI FUNCTIONS
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
|
||||
// Terminal dimension and UI functions
|
||||
void init_terminal_dimensions(void);
|
||||
void print_centered_header(const char* text, int pause_before_clear);
|
||||
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
// MENU SYSTEM FUNCTIONS
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
|
||||
// Interactive menu interface functions
|
||||
void show_main_menu(void);
|
||||
int handle_generate_menu(void);
|
||||
int handle_encrypt_menu(void);
|
||||
int handle_decrypt_menu(void);
|
||||
int handle_pads_menu(void);
|
||||
int handle_text_encrypt(void);
|
||||
int handle_file_encrypt(void);
|
||||
int handle_verify_pad(const char* pad_chksum);
|
||||
int handle_delete_pad(const char* pad_chksum);
|
||||
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
// ENHANCED INPUT FUNCTIONS
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
|
||||
// Advanced input handling
|
||||
int get_filename_with_default(const char* prompt, const char* default_path, char* result, size_t result_size);
|
||||
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
// PAD SELECTION FUNCTIONS
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
|
||||
// Unified pad selection interface
|
||||
char* select_pad_interactive(const char* title, const char* prompt, pad_filter_type_t filter_type, int allow_cancel);
|
||||
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
// USAGE AND HELP FUNCTIONS
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
|
||||
// Help and usage display
|
||||
void print_usage(const char* program_name);
|
||||
|
||||
#endif // OTP_H
|
||||
163
nostr_chacha20.c
Normal file
163
nostr_chacha20.c
Normal file
@@ -0,0 +1,163 @@
|
||||
/*
|
||||
* nostr_chacha20.c - ChaCha20 stream cipher implementation
|
||||
*
|
||||
* Implementation based on RFC 8439 "ChaCha20 and Poly1305 for IETF Protocols"
|
||||
*
|
||||
* This implementation is adapted from the RFC 8439 reference specification.
|
||||
* It prioritizes correctness and clarity over performance optimization.
|
||||
*/
|
||||
|
||||
#include "nostr_chacha20.h"
|
||||
#include <string.h>
|
||||
|
||||
/*
|
||||
* ============================================================================
|
||||
* UTILITY MACROS AND FUNCTIONS
|
||||
* ============================================================================
|
||||
*/
|
||||
|
||||
/* Left rotate a 32-bit value by n bits */
|
||||
#define ROTLEFT(a, b) (((a) << (b)) | ((a) >> (32 - (b))))
|
||||
|
||||
/* Convert 4 bytes to 32-bit little-endian */
|
||||
static uint32_t bytes_to_u32_le(const uint8_t *bytes) {
|
||||
return ((uint32_t)bytes[0]) |
|
||||
((uint32_t)bytes[1] << 8) |
|
||||
((uint32_t)bytes[2] << 16) |
|
||||
((uint32_t)bytes[3] << 24);
|
||||
}
|
||||
|
||||
/* Convert 32-bit to 4 bytes little-endian */
|
||||
static void u32_to_bytes_le(uint32_t val, uint8_t *bytes) {
|
||||
bytes[0] = (uint8_t)(val & 0xff);
|
||||
bytes[1] = (uint8_t)((val >> 8) & 0xff);
|
||||
bytes[2] = (uint8_t)((val >> 16) & 0xff);
|
||||
bytes[3] = (uint8_t)((val >> 24) & 0xff);
|
||||
}
|
||||
|
||||
/*
|
||||
* ============================================================================
|
||||
* CHACHA20 CORE FUNCTIONS
|
||||
* ============================================================================
|
||||
*/
|
||||
|
||||
void chacha20_quarter_round(uint32_t state[16], int a, int b, int c, int d) {
|
||||
state[a] += state[b];
|
||||
state[d] ^= state[a];
|
||||
state[d] = ROTLEFT(state[d], 16);
|
||||
|
||||
state[c] += state[d];
|
||||
state[b] ^= state[c];
|
||||
state[b] = ROTLEFT(state[b], 12);
|
||||
|
||||
state[a] += state[b];
|
||||
state[d] ^= state[a];
|
||||
state[d] = ROTLEFT(state[d], 8);
|
||||
|
||||
state[c] += state[d];
|
||||
state[b] ^= state[c];
|
||||
state[b] = ROTLEFT(state[b], 7);
|
||||
}
|
||||
|
||||
void chacha20_init_state(uint32_t state[16], const uint8_t key[32],
|
||||
uint32_t counter, const uint8_t nonce[12]) {
|
||||
/* ChaCha20 constants "expand 32-byte k" */
|
||||
state[0] = 0x61707865;
|
||||
state[1] = 0x3320646e;
|
||||
state[2] = 0x79622d32;
|
||||
state[3] = 0x6b206574;
|
||||
|
||||
/* Key (8 words) */
|
||||
state[4] = bytes_to_u32_le(key + 0);
|
||||
state[5] = bytes_to_u32_le(key + 4);
|
||||
state[6] = bytes_to_u32_le(key + 8);
|
||||
state[7] = bytes_to_u32_le(key + 12);
|
||||
state[8] = bytes_to_u32_le(key + 16);
|
||||
state[9] = bytes_to_u32_le(key + 20);
|
||||
state[10] = bytes_to_u32_le(key + 24);
|
||||
state[11] = bytes_to_u32_le(key + 28);
|
||||
|
||||
/* Counter (1 word) */
|
||||
state[12] = counter;
|
||||
|
||||
/* Nonce (3 words) */
|
||||
state[13] = bytes_to_u32_le(nonce + 0);
|
||||
state[14] = bytes_to_u32_le(nonce + 4);
|
||||
state[15] = bytes_to_u32_le(nonce + 8);
|
||||
}
|
||||
|
||||
void chacha20_serialize_state(const uint32_t state[16], uint8_t output[64]) {
|
||||
for (int i = 0; i < 16; i++) {
|
||||
u32_to_bytes_le(state[i], output + (i * 4));
|
||||
}
|
||||
}
|
||||
|
||||
int chacha20_block(const uint8_t key[32], uint32_t counter,
|
||||
const uint8_t nonce[12], uint8_t output[64]) {
|
||||
uint32_t state[16];
|
||||
uint32_t initial_state[16];
|
||||
|
||||
/* Initialize state */
|
||||
chacha20_init_state(state, key, counter, nonce);
|
||||
|
||||
/* Save initial state for later addition */
|
||||
memcpy(initial_state, state, sizeof(initial_state));
|
||||
|
||||
/* Perform 20 rounds (10 iterations of the 8 quarter rounds) */
|
||||
for (int i = 0; i < 10; i++) {
|
||||
/* Column rounds */
|
||||
chacha20_quarter_round(state, 0, 4, 8, 12);
|
||||
chacha20_quarter_round(state, 1, 5, 9, 13);
|
||||
chacha20_quarter_round(state, 2, 6, 10, 14);
|
||||
chacha20_quarter_round(state, 3, 7, 11, 15);
|
||||
|
||||
/* Diagonal rounds */
|
||||
chacha20_quarter_round(state, 0, 5, 10, 15);
|
||||
chacha20_quarter_round(state, 1, 6, 11, 12);
|
||||
chacha20_quarter_round(state, 2, 7, 8, 13);
|
||||
chacha20_quarter_round(state, 3, 4, 9, 14);
|
||||
}
|
||||
|
||||
/* Add initial state back (prevents slide attacks) */
|
||||
for (int i = 0; i < 16; i++) {
|
||||
state[i] += initial_state[i];
|
||||
}
|
||||
|
||||
/* Serialize to output bytes */
|
||||
chacha20_serialize_state(state, output);
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
int chacha20_encrypt(const uint8_t key[32], uint32_t counter,
|
||||
const uint8_t nonce[12], const uint8_t* input,
|
||||
uint8_t* output, size_t length) {
|
||||
uint8_t keystream[CHACHA20_BLOCK_SIZE];
|
||||
size_t offset = 0;
|
||||
|
||||
while (length > 0) {
|
||||
/* Generate keystream block */
|
||||
int ret = chacha20_block(key, counter, nonce, keystream);
|
||||
if (ret != 0) {
|
||||
return ret;
|
||||
}
|
||||
|
||||
/* XOR with input to produce output */
|
||||
size_t block_len = (length < CHACHA20_BLOCK_SIZE) ? length : CHACHA20_BLOCK_SIZE;
|
||||
for (size_t i = 0; i < block_len; i++) {
|
||||
output[offset + i] = input[offset + i] ^ keystream[i];
|
||||
}
|
||||
|
||||
/* Move to next block */
|
||||
offset += block_len;
|
||||
length -= block_len;
|
||||
counter++;
|
||||
|
||||
/* Check for counter overflow */
|
||||
if (counter == 0) {
|
||||
return -1; /* Counter wrapped around */
|
||||
}
|
||||
}
|
||||
|
||||
return 0;
|
||||
}
|
||||
115
nostr_chacha20.h
Normal file
115
nostr_chacha20.h
Normal file
@@ -0,0 +1,115 @@
|
||||
/*
|
||||
* nostr_chacha20.h - ChaCha20 stream cipher implementation
|
||||
*
|
||||
* Implementation based on RFC 8439 "ChaCha20 and Poly1305 for IETF Protocols"
|
||||
*
|
||||
* This is a small, portable implementation for NIP-44 support in the NOSTR library.
|
||||
* The implementation prioritizes correctness and simplicity over performance.
|
||||
*/
|
||||
|
||||
#ifndef NOSTR_CHACHA20_H
|
||||
#define NOSTR_CHACHA20_H
|
||||
|
||||
#include <stdint.h>
|
||||
#include <stddef.h>
|
||||
|
||||
#ifdef __cplusplus
|
||||
extern "C" {
|
||||
#endif
|
||||
|
||||
/*
|
||||
* ============================================================================
|
||||
* CONSTANTS AND DEFINITIONS
|
||||
* ============================================================================
|
||||
*/
|
||||
|
||||
#define CHACHA20_KEY_SIZE 32 /* 256 bits */
|
||||
#define CHACHA20_NONCE_SIZE 12 /* 96 bits */
|
||||
#define CHACHA20_BLOCK_SIZE 64 /* 512 bits */
|
||||
|
||||
/*
|
||||
* ============================================================================
|
||||
* CORE CHACHA20 FUNCTIONS
|
||||
* ============================================================================
|
||||
*/
|
||||
|
||||
/**
|
||||
* ChaCha20 quarter round operation
|
||||
*
|
||||
* Operates on four 32-bit words performing the core ChaCha20 quarter round:
|
||||
* a += b; d ^= a; d <<<= 16;
|
||||
* c += d; b ^= c; b <<<= 12;
|
||||
* a += b; d ^= a; d <<<= 8;
|
||||
* c += d; b ^= c; b <<<= 7;
|
||||
*
|
||||
* @param state[in,out] ChaCha state as 16 32-bit words
|
||||
* @param a, b, c, d Indices into state array for quarter round
|
||||
*/
|
||||
void chacha20_quarter_round(uint32_t state[16], int a, int b, int c, int d);
|
||||
|
||||
/**
|
||||
* ChaCha20 block function
|
||||
*
|
||||
* Transforms a 64-byte input block using ChaCha20 algorithm with 20 rounds.
|
||||
*
|
||||
* @param key[in] 32-byte key
|
||||
* @param counter[in] 32-bit block counter
|
||||
* @param nonce[in] 12-byte nonce
|
||||
* @param output[out] 64-byte output buffer
|
||||
* @return 0 on success, negative on error
|
||||
*/
|
||||
int chacha20_block(const uint8_t key[32], uint32_t counter,
|
||||
const uint8_t nonce[12], uint8_t output[64]);
|
||||
|
||||
/**
|
||||
* ChaCha20 encryption/decryption
|
||||
*
|
||||
* Encrypts or decrypts data using ChaCha20 stream cipher.
|
||||
* Since ChaCha20 is a stream cipher, encryption and decryption are the same operation.
|
||||
*
|
||||
* @param key[in] 32-byte key
|
||||
* @param counter[in] Initial 32-bit counter value
|
||||
* @param nonce[in] 12-byte nonce
|
||||
* @param input[in] Input data to encrypt/decrypt
|
||||
* @param output[out] Output buffer (can be same as input)
|
||||
* @param length[in] Length of input data in bytes
|
||||
* @return 0 on success, negative on error
|
||||
*/
|
||||
int chacha20_encrypt(const uint8_t key[32], uint32_t counter,
|
||||
const uint8_t nonce[12], const uint8_t* input,
|
||||
uint8_t* output, size_t length);
|
||||
|
||||
/*
|
||||
* ============================================================================
|
||||
* UTILITY FUNCTIONS
|
||||
* ============================================================================
|
||||
*/
|
||||
|
||||
/**
|
||||
* Initialize ChaCha20 state matrix
|
||||
*
|
||||
* Sets up the initial 16-word state matrix with constants, key, counter, and nonce.
|
||||
*
|
||||
* @param state[out] 16-word state array to initialize
|
||||
* @param key[in] 32-byte key
|
||||
* @param counter[in] 32-bit block counter
|
||||
* @param nonce[in] 12-byte nonce
|
||||
*/
|
||||
void chacha20_init_state(uint32_t state[16], const uint8_t key[32],
|
||||
uint32_t counter, const uint8_t nonce[12]);
|
||||
|
||||
/**
|
||||
* Serialize ChaCha20 state to bytes
|
||||
*
|
||||
* Converts 16 32-bit words to 64 bytes in little-endian format.
|
||||
*
|
||||
* @param state[in] 16-word state array
|
||||
* @param output[out] 64-byte output buffer
|
||||
*/
|
||||
void chacha20_serialize_state(const uint32_t state[16], uint8_t output[64]);
|
||||
|
||||
#ifdef __cplusplus
|
||||
}
|
||||
#endif
|
||||
|
||||
#endif /* NOSTR_CHACHA20_H */
|
||||
6278
otp copy.c
Normal file
6278
otp copy.c
Normal file
File diff suppressed because it is too large
Load Diff
329
otp.h
Normal file
329
otp.h
Normal file
@@ -0,0 +1,329 @@
|
||||
#ifndef OTP_H
|
||||
#define OTP_H
|
||||
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
// OTP CIPHER - FUNCTION PROTOTYPES HEADER
|
||||
// One Time Pad Implementation v0.2.109
|
||||
//
|
||||
// This header file contains all function prototypes extracted from otp.c
|
||||
// Organized by functional categories for better maintainability
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
|
||||
#include <stdio.h>
|
||||
#include <stdint.h>
|
||||
#include <stdlib.h>
|
||||
#include <termios.h>
|
||||
#include <sys/stat.h>
|
||||
#include <sys/ioctl.h>
|
||||
#include <time.h>
|
||||
#include <dirent.h>
|
||||
#include <fcntl.h>
|
||||
#include <unistd.h>
|
||||
#include <string.h>
|
||||
#include <ctype.h>
|
||||
|
||||
// Constants
|
||||
#define MAX_INPUT_SIZE 4096
|
||||
#define MAX_LINE_LENGTH 1024
|
||||
#define MAX_HASH_LENGTH 65
|
||||
#define PROGRESS_UPDATE_INTERVAL (64 * 1024 * 1024) // 64MB intervals
|
||||
#define DEFAULT_PADS_DIR "pads"
|
||||
#define FILES_DIR "files"
|
||||
#define MAX_ENTROPY_BUFFER (4 * 1024 * 1024) // 4MB entropy buffer for large operations
|
||||
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
// TYPE DEFINITIONS
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
|
||||
// Decrypt operation modes for universal decrypt function
|
||||
typedef enum {
|
||||
DECRYPT_MODE_INTERACTIVE, // Interactive text decryption with prompts
|
||||
DECRYPT_MODE_SILENT, // Silent text decryption (no prompts/labels)
|
||||
DECRYPT_MODE_FILE_TO_TEXT, // File to text output with prompts
|
||||
DECRYPT_MODE_FILE_TO_FILE // File to file output (binary)
|
||||
} decrypt_mode_t;
|
||||
|
||||
// Pad filter types for selection functions
|
||||
typedef enum {
|
||||
PAD_FILTER_ALL, // Show all pads
|
||||
PAD_FILTER_UNUSED_ONLY // Show only unused pads (0% usage)
|
||||
} pad_filter_type_t;
|
||||
|
||||
// Enhanced entropy system state structure
|
||||
typedef struct {
|
||||
size_t target_bytes; // Target entropy to collect
|
||||
size_t collected_bytes; // Bytes collected so far
|
||||
size_t unique_keys; // Number of unique keys pressed
|
||||
double collection_start_time; // Start timestamp
|
||||
double last_keypress_time; // Last keypress timestamp
|
||||
unsigned char quality_score; // Entropy quality (0-100)
|
||||
int auto_complete_enabled; // Allow auto-complete at minimum
|
||||
unsigned char key_histogram[256]; // Track key frequency
|
||||
} entropy_collection_state_t;
|
||||
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
// CORE APPLICATION FUNCTIONS
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
|
||||
// Main application entry points
|
||||
int main(int argc, char* argv[]);
|
||||
int interactive_mode(void);
|
||||
int command_line_mode(int argc, char* argv[]);
|
||||
int pipe_mode(int argc, char* argv[], const char* piped_text);
|
||||
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
// INPUT/OUTPUT DETECTION FUNCTIONS
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
|
||||
// Stdin detection functions
|
||||
int has_stdin_data(void);
|
||||
char* read_stdin_text(void);
|
||||
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
// PREFERENCES MANAGEMENT FUNCTIONS
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
|
||||
// Configuration and preferences handling
|
||||
int load_preferences(void);
|
||||
int save_preferences(void);
|
||||
char* get_preference(const char* key);
|
||||
int set_preference(const char* key, const char* value);
|
||||
char* get_default_pad_path(void);
|
||||
int set_default_pad_path(const char* pad_path);
|
||||
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
// HARDWARE DETECTION FUNCTIONS
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
|
||||
// OTP thumb drive detection function
|
||||
int detect_otp_thumb_drive(char* otp_drive_path, size_t path_size);
|
||||
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
// USB DRIVE MANAGEMENT FUNCTIONS
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
|
||||
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
// EXTERNAL TOOL INTEGRATION FUNCTIONS
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
|
||||
// Editor and file manager functions
|
||||
char* get_preferred_editor(void);
|
||||
char* get_preferred_file_manager(void);
|
||||
int launch_text_editor(const char* initial_content, char* result_buffer, size_t buffer_size);
|
||||
int launch_file_manager(const char* start_directory, char* selected_file, size_t buffer_size);
|
||||
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
// CORE CRYPTOGRAPHIC OPERATIONS
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
|
||||
// Primary encryption/decryption functions
|
||||
int generate_pad(uint64_t size_bytes, int show_progress);
|
||||
int encrypt_text(const char* pad_identifier, const char* input_text);
|
||||
int decrypt_text(const char* pad_identifier, const char* encrypted_message);
|
||||
int encrypt_file(const char* pad_identifier, const char* input_file, const char* output_file, int ascii_armor);
|
||||
int decrypt_file(const char* input_file, const char* output_file);
|
||||
int decrypt_binary_file(FILE* input_fp, const char* output_file);
|
||||
int decrypt_ascii_file(const char* input_file, const char* output_file);
|
||||
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
// ENHANCED ENTROPY SYSTEM FUNCTIONS
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
|
||||
// Entropy source types
|
||||
typedef enum {
|
||||
ENTROPY_SOURCE_KEYBOARD = 1,
|
||||
ENTROPY_SOURCE_DICE = 2,
|
||||
ENTROPY_SOURCE_TRUERNG = 3,
|
||||
ENTROPY_SOURCE_FILE = 4
|
||||
} entropy_source_t;
|
||||
|
||||
// Terminal control for entropy collection
|
||||
int setup_raw_terminal(struct termios* original_termios);
|
||||
void restore_terminal(struct termios* original_termios);
|
||||
|
||||
// Entropy collection and feedback
|
||||
int collect_entropy_with_feedback(unsigned char* entropy_buffer, size_t target_bytes,
|
||||
size_t* collected_bytes, int allow_early_exit);
|
||||
void display_entropy_progress(const entropy_collection_state_t* state);
|
||||
void draw_progress_bar(double percentage, int width);
|
||||
void draw_quality_bar(double quality, int width, const char* label);
|
||||
|
||||
// TrueRNG Device Constants (updated to match otp.c implementation)
|
||||
#define TRUERNG_VID "04D8"
|
||||
#define TRUERNG_PID "F5FE"
|
||||
#define TRUERNGPRO_VID "16D0"
|
||||
#define TRUERNGPRO_PID "0AA0"
|
||||
#define TRUERNGPROV2_VID "04D8"
|
||||
#define TRUERNGPROV2_PID "EBB5"
|
||||
|
||||
// SwiftRNG Device Constants (same VID/PID as TrueRNG devices)
|
||||
#define SWIFT_RNG_VID "04D8"
|
||||
#define SWIFT_RNG_PID "F5FE"
|
||||
#define SWIFT_RNG_PRO_VID "16D0"
|
||||
#define SWIFT_RNG_PRO_PID "0AA0"
|
||||
#define SWIFT_RNG_PRO_V2_VID "04D8"
|
||||
#define SWIFT_RNG_PRO_V2_PID "EBB5"
|
||||
|
||||
// TrueRNG/SwiftRNG Device Type enumeration
|
||||
typedef enum {
|
||||
TRUERNG_ORIGINAL = 1,
|
||||
TRUERNG_PRO = 2,
|
||||
TRUERNG_PRO_V2 = 3,
|
||||
SWIFT_RNG = 4,
|
||||
SWIFT_RNG_PRO = 5,
|
||||
SWIFT_RNG_PRO_V2 = 6
|
||||
} truerng_device_type_t;
|
||||
|
||||
// Hardware RNG device information structure
|
||||
typedef struct {
|
||||
char port_path[256]; // Device port path (e.g., /dev/ttyUSB0)
|
||||
truerng_device_type_t device_type; // Device type identifier
|
||||
char friendly_name[64]; // Human-readable device name
|
||||
int is_working; // 1 if device passes basic test, 0 otherwise
|
||||
} hardware_rng_device_t;
|
||||
|
||||
// Hardware RNG device detection and selection functions
|
||||
int detect_all_hardware_rng_devices(hardware_rng_device_t* devices, int max_devices, int* num_devices_found);
|
||||
int test_hardware_rng_device(const hardware_rng_device_t* device);
|
||||
int select_hardware_rng_device_interactive(hardware_rng_device_t* devices, int num_devices, hardware_rng_device_t* selected_device);
|
||||
int find_truerng_port(char* port_path, size_t port_path_size, truerng_device_type_t* device_type); // Legacy function for backward compatibility
|
||||
|
||||
// TrueRNG entropy collection functions (updated to match implementation)
|
||||
int setup_truerng_serial_port(const char* port_path);
|
||||
int collect_truerng_entropy(unsigned char* entropy_buffer, size_t target_bytes, size_t* collected_bytes, int display_progress);
|
||||
int collect_truerng_entropy_from_device(const hardware_rng_device_t* device, unsigned char* entropy_buffer,
|
||||
size_t target_bytes, size_t* collected_bytes, int display_progress);
|
||||
int collect_truerng_entropy_streaming_from_device(const hardware_rng_device_t* device, const char* pad_chksum,
|
||||
size_t total_bytes, int display_progress, int entropy_mode);
|
||||
const char* get_truerng_device_name(truerng_device_type_t device_type);
|
||||
int read_usb_device_info(const char* port_name, char* vid, char* pid);
|
||||
|
||||
// Dice entropy collection functions (updated to match implementation)
|
||||
int collect_dice_entropy(unsigned char* entropy_buffer, size_t target_bytes, size_t* collected_bytes, int display_progress);
|
||||
|
||||
// Unified entropy collection interface (updated to match implementation)
|
||||
int collect_entropy_by_source(entropy_source_t source, unsigned char* entropy_buffer, size_t target_bytes, size_t* collected_bytes, int display_progress);
|
||||
|
||||
// Entropy quality calculation
|
||||
double calculate_timing_quality(const entropy_collection_state_t* state);
|
||||
double calculate_variety_quality(const entropy_collection_state_t* state);
|
||||
unsigned char calculate_overall_quality(const entropy_collection_state_t* state);
|
||||
double get_precise_time(void);
|
||||
|
||||
// Entropy processing and application
|
||||
int derive_chacha20_params(const unsigned char* entropy_data, size_t entropy_size,
|
||||
unsigned char key[32], unsigned char nonce[12]);
|
||||
int add_entropy_to_pad(const char* pad_chksum, const unsigned char* entropy_data,
|
||||
size_t entropy_size, int show_progress);
|
||||
int add_entropy_direct_xor(const char* pad_chksum, const unsigned char* entropy_data,
|
||||
size_t entropy_size, uint64_t pad_size, int display_progress);
|
||||
int add_entropy_chacha20(const char* pad_chksum, const unsigned char* entropy_data,
|
||||
size_t entropy_size, uint64_t pad_size, int display_progress);
|
||||
int handle_add_entropy_to_pad(const char* pad_chksum);
|
||||
|
||||
// Enhanced entropy system helper functions
|
||||
int update_pad_checksum_after_entropy(const char* old_chksum, char* new_chksum);
|
||||
int rename_pad_files_safely(const char* old_chksum, const char* new_chksum);
|
||||
int is_pad_unused(const char* pad_chksum);
|
||||
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
// DIRECTORY MANAGEMENT FUNCTIONS
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
|
||||
// Directory handling and path management
|
||||
int ensure_pads_directory(void);
|
||||
void get_pad_path(const char* chksum, char* pad_path, char* state_path);
|
||||
const char* get_files_directory(void);
|
||||
void get_default_file_path(const char* filename, char* result_path, size_t result_size);
|
||||
void get_directory_display(const char* file_path, char* result, size_t result_size);
|
||||
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
// UTILITY FUNCTIONS
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
|
||||
// General utility and helper functions
|
||||
uint64_t parse_size_string(const char* size_str);
|
||||
char* find_pad_by_prefix(const char* prefix);
|
||||
int show_pad_info(const char* chksum);
|
||||
void show_progress(uint64_t current, uint64_t total, time_t start_time);
|
||||
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
// FILE OPERATIONS
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
|
||||
// File state and checksum operations
|
||||
int read_state_offset(const char* pad_chksum, uint64_t* offset);
|
||||
int write_state_offset(const char* pad_chksum, uint64_t offset);
|
||||
int calculate_checksum(const char* filename, char* checksum_hex);
|
||||
int calculate_checksum_with_progress(const char* filename, char* checksum_hex, int display_progress, uint64_t file_size);
|
||||
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
// UNIVERSAL CORE FUNCTIONS FOR CODE CONSOLIDATION
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
|
||||
// Consolidated cryptographic operations
|
||||
int universal_xor_operation(const unsigned char* data, size_t data_len,
|
||||
const unsigned char* pad_data, unsigned char* result);
|
||||
int parse_ascii_message(const char* message, char* chksum, uint64_t* offset, char* base64_data);
|
||||
int load_pad_data(const char* pad_chksum, uint64_t offset, size_t length, unsigned char** pad_data);
|
||||
int generate_ascii_armor(const char* chksum, uint64_t offset, const unsigned char* encrypted_data,
|
||||
size_t data_length, char** ascii_output);
|
||||
int validate_pad_integrity(const char* pad_path, const char* expected_chksum);
|
||||
|
||||
// Universal decrypt function - consolidates all decrypt operations
|
||||
int universal_decrypt(const char* input_data, const char* output_target, decrypt_mode_t mode);
|
||||
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
// BASE64 ENCODING FUNCTIONS
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
|
||||
// Custom base64 implementation
|
||||
char* custom_base64_encode(const unsigned char* input, int length);
|
||||
unsigned char* custom_base64_decode(const char* input, int* output_length);
|
||||
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
// TERMINAL UI FUNCTIONS
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
|
||||
// Terminal dimension and UI functions
|
||||
void init_terminal_dimensions(void);
|
||||
void print_centered_header(const char* text, int pause_before_clear);
|
||||
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
// MENU SYSTEM FUNCTIONS
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
|
||||
// Interactive menu interface functions
|
||||
void show_main_menu(void);
|
||||
int handle_generate_menu(void);
|
||||
int handle_encrypt_menu(void);
|
||||
int handle_decrypt_menu(void);
|
||||
int handle_pads_menu(void);
|
||||
int handle_text_encrypt(void);
|
||||
int handle_file_encrypt(void);
|
||||
int handle_verify_pad(const char* pad_chksum);
|
||||
int handle_delete_pad(const char* pad_chksum);
|
||||
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
// ENHANCED INPUT FUNCTIONS
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
|
||||
// Advanced input handling
|
||||
int get_filename_with_default(const char* prompt, const char* default_path, char* result, size_t result_size);
|
||||
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
// PAD SELECTION FUNCTIONS
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
|
||||
// Unified pad selection interface
|
||||
char* select_pad_interactive(const char* title, const char* prompt, pad_filter_type_t filter_type, int allow_cancel);
|
||||
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
// USAGE AND HELP FUNCTIONS
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
|
||||
// Help and usage display
|
||||
void print_usage(const char* program_name);
|
||||
|
||||
#endif // OTP_H
|
||||
1331
src/crypto.c
Normal file
1331
src/crypto.c
Normal file
File diff suppressed because it is too large
Load Diff
810
src/entropy.c
Normal file
810
src/entropy.c
Normal file
@@ -0,0 +1,810 @@
|
||||
#define _POSIX_C_SOURCE 200809L
|
||||
#define _DEFAULT_SOURCE
|
||||
|
||||
#include <stdio.h>
|
||||
#include <stdlib.h>
|
||||
#include <string.h>
|
||||
#include <stdint.h>
|
||||
#include <unistd.h>
|
||||
#include <sys/stat.h>
|
||||
#include <sys/statvfs.h>
|
||||
#include <sys/ioctl.h>
|
||||
#include <dirent.h>
|
||||
#include <time.h>
|
||||
#include <ctype.h>
|
||||
#include <termios.h>
|
||||
#include <fcntl.h>
|
||||
#include <math.h>
|
||||
#include "../nostr_chacha20.h"
|
||||
#include "../include/otp.h"
|
||||
|
||||
|
||||
// In-place pad entropy addition using Chacha20 or direct XOR
|
||||
int add_entropy_to_pad(const char* pad_chksum, const unsigned char* entropy_data,
|
||||
size_t entropy_size, int display_progress) {
|
||||
if (!pad_chksum || !entropy_data || entropy_size < 512) {
|
||||
printf("Error: Invalid entropy data or insufficient entropy\n");
|
||||
return 1;
|
||||
}
|
||||
|
||||
// Get pad file path
|
||||
char pad_path[1024];
|
||||
char state_path[1024];
|
||||
get_pad_path(pad_chksum, pad_path, state_path);
|
||||
|
||||
// Check if pad exists and get size
|
||||
struct stat pad_stat;
|
||||
if (stat(pad_path, &pad_stat) != 0) {
|
||||
printf("Error: Pad file not found: %s\n", pad_path);
|
||||
return 1;
|
||||
}
|
||||
|
||||
uint64_t pad_size = pad_stat.st_size;
|
||||
|
||||
// Determine entropy addition method based on entropy size vs pad size
|
||||
if (entropy_size >= pad_size) {
|
||||
// Use direct XOR when entropy >= pad size
|
||||
return add_entropy_direct_xor(pad_chksum, entropy_data, entropy_size, pad_size, display_progress);
|
||||
} else {
|
||||
// Use ChaCha20 when entropy < pad size
|
||||
return add_entropy_chacha20(pad_chksum, entropy_data, entropy_size, pad_size, display_progress);
|
||||
}
|
||||
}
|
||||
|
||||
// Direct XOR entropy addition for large entropy sources
|
||||
int add_entropy_direct_xor(const char* pad_chksum, const unsigned char* entropy_data,
|
||||
size_t entropy_size, uint64_t pad_size, int display_progress) {
|
||||
// Get pad file path
|
||||
char pad_path[1024];
|
||||
char state_path[1024];
|
||||
get_pad_path(pad_chksum, pad_path, state_path);
|
||||
|
||||
// Open pad file for read/write
|
||||
FILE* pad_file = fopen(pad_path, "r+b");
|
||||
if (!pad_file) {
|
||||
printf("Error: Cannot open pad file for modification: %s\n", pad_path);
|
||||
printf("Note: Pad files are read-only. Temporarily changing permissions...\n");
|
||||
|
||||
// Try to make writable temporarily
|
||||
if (chmod(pad_path, S_IRUSR | S_IWUSR) != 0) {
|
||||
printf("Error: Cannot change pad file permissions\n");
|
||||
return 1;
|
||||
}
|
||||
|
||||
pad_file = fopen(pad_path, "r+b");
|
||||
if (!pad_file) {
|
||||
printf("Error: Still cannot open pad file for modification\n");
|
||||
// Restore read-only
|
||||
chmod(pad_path, S_IRUSR);
|
||||
return 1;
|
||||
}
|
||||
}
|
||||
|
||||
if (display_progress) {
|
||||
printf("Adding entropy to pad using direct XOR...\n");
|
||||
printf("Pad size: %.2f GB (%lu bytes)\n", (double)pad_size / (1024.0*1024.0*1024.0), pad_size);
|
||||
printf("Entropy size: %zu bytes\n", entropy_size);
|
||||
}
|
||||
|
||||
// Process pad in chunks
|
||||
unsigned char buffer[64 * 1024]; // 64KB chunks
|
||||
size_t entropy_offset = 0;
|
||||
uint64_t offset = 0;
|
||||
time_t start_time = time(NULL);
|
||||
|
||||
while (offset < pad_size) {
|
||||
size_t chunk_size = sizeof(buffer);
|
||||
if (pad_size - offset < chunk_size) {
|
||||
chunk_size = pad_size - offset;
|
||||
}
|
||||
|
||||
// Read current pad data
|
||||
if (fread(buffer, 1, chunk_size, pad_file) != chunk_size) {
|
||||
printf("Error: Cannot read pad data at offset %lu\n", offset);
|
||||
fclose(pad_file);
|
||||
chmod(pad_path, S_IRUSR); // Restore read-only
|
||||
return 1;
|
||||
}
|
||||
|
||||
// XOR with entropy data (wrap around if entropy smaller than pad)
|
||||
for (size_t i = 0; i < chunk_size; i++) {
|
||||
buffer[i] ^= entropy_data[entropy_offset % entropy_size];
|
||||
entropy_offset++;
|
||||
}
|
||||
|
||||
// Seek back and write modified data
|
||||
if (fseek(pad_file, offset, SEEK_SET) != 0) {
|
||||
printf("Error: Cannot seek to offset %lu\n", offset);
|
||||
fclose(pad_file);
|
||||
chmod(pad_path, S_IRUSR);
|
||||
return 1;
|
||||
}
|
||||
|
||||
if (fwrite(buffer, 1, chunk_size, pad_file) != chunk_size) {
|
||||
printf("Error: Cannot write modified pad data\n");
|
||||
fclose(pad_file);
|
||||
chmod(pad_path, S_IRUSR);
|
||||
return 1;
|
||||
}
|
||||
|
||||
offset += chunk_size;
|
||||
|
||||
// Show progress for large pads
|
||||
if (display_progress && offset % (64 * 1024 * 1024) == 0) { // Every 64MB
|
||||
show_progress(offset, pad_size, start_time);
|
||||
}
|
||||
}
|
||||
|
||||
fclose(pad_file);
|
||||
|
||||
// Restore read-only permissions
|
||||
if (chmod(pad_path, S_IRUSR) != 0) {
|
||||
printf("Warning: Cannot restore pad file to read-only\n");
|
||||
}
|
||||
|
||||
if (display_progress) {
|
||||
show_progress(pad_size, pad_size, start_time);
|
||||
printf("\n✓ Entropy successfully added to pad using direct XOR\n");
|
||||
printf("✓ Pad integrity maintained\n");
|
||||
printf("✓ %zu bytes of entropy distributed across entire pad\n", entropy_size);
|
||||
printf("✓ Pad restored to read-only mode\n");
|
||||
|
||||
// Update checksum after entropy addition
|
||||
printf("\n🔄 Updating pad checksum...\n");
|
||||
char new_chksum[65];
|
||||
int checksum_result = update_pad_checksum_after_entropy(pad_chksum, new_chksum);
|
||||
|
||||
if (checksum_result == 0) {
|
||||
printf("✓ Pad checksum updated successfully\n");
|
||||
printf(" Old checksum: %.16s...\n", pad_chksum);
|
||||
printf(" New checksum: %.16s...\n", new_chksum);
|
||||
printf("✓ Pad files renamed to new checksum\n");
|
||||
|
||||
// Pause before returning to menu to let user see the success message
|
||||
print_centered_header("Entropy Addition Complete", 1);
|
||||
} else if (checksum_result == 2) {
|
||||
printf("ℹ Checksum unchanged (unusual but not an error)\n");
|
||||
} else {
|
||||
printf("⚠ Warning: Checksum update failed (entropy was added successfully)\n");
|
||||
printf(" You may need to manually handle the checksum update\n");
|
||||
return 1; // Report error despite successful entropy addition
|
||||
}
|
||||
}
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
// ChaCha20 entropy addition for smaller entropy sources
|
||||
int add_entropy_chacha20(const char* pad_chksum, const unsigned char* entropy_data,
|
||||
size_t entropy_size, uint64_t pad_size, int display_progress) {
|
||||
// Derive Chacha20 key and nonce from entropy
|
||||
unsigned char key[32], nonce[12];
|
||||
if (derive_chacha20_params(entropy_data, entropy_size, key, nonce) != 0) {
|
||||
printf("Error: Failed to derive Chacha20 parameters from entropy\n");
|
||||
return 1;
|
||||
}
|
||||
|
||||
// Get pad file path
|
||||
char pad_path[1024];
|
||||
char state_path[1024];
|
||||
get_pad_path(pad_chksum, pad_path, state_path);
|
||||
|
||||
// Open pad file for read/write
|
||||
FILE* pad_file = fopen(pad_path, "r+b");
|
||||
if (!pad_file) {
|
||||
printf("Error: Cannot open pad file for modification: %s\n", pad_path);
|
||||
printf("Note: Pad files are read-only. Temporarily changing permissions...\n");
|
||||
|
||||
// Try to make writable temporarily
|
||||
if (chmod(pad_path, S_IRUSR | S_IWUSR) != 0) {
|
||||
printf("Error: Cannot change pad file permissions\n");
|
||||
return 1;
|
||||
}
|
||||
|
||||
pad_file = fopen(pad_path, "r+b");
|
||||
if (!pad_file) {
|
||||
printf("Error: Still cannot open pad file for modification\n");
|
||||
// Restore read-only
|
||||
chmod(pad_path, S_IRUSR);
|
||||
return 1;
|
||||
}
|
||||
}
|
||||
|
||||
if (display_progress) {
|
||||
printf("Adding entropy to pad using Chacha20...\n");
|
||||
printf("Pad size: %.2f GB (%lu bytes)\n", (double)pad_size / (1024.0*1024.0*1024.0), pad_size);
|
||||
}
|
||||
|
||||
// Process pad in chunks
|
||||
unsigned char buffer[64 * 1024]; // 64KB chunks
|
||||
unsigned char keystream[64 * 1024];
|
||||
uint64_t offset = 0;
|
||||
uint32_t counter = 0;
|
||||
time_t start_time = time(NULL);
|
||||
|
||||
while (offset < pad_size) {
|
||||
size_t chunk_size = sizeof(buffer);
|
||||
if (pad_size - offset < chunk_size) {
|
||||
chunk_size = pad_size - offset;
|
||||
}
|
||||
|
||||
// Read current pad data
|
||||
if (fread(buffer, 1, chunk_size, pad_file) != chunk_size) {
|
||||
printf("Error: Cannot read pad data at offset %lu\n", offset);
|
||||
fclose(pad_file);
|
||||
chmod(pad_path, S_IRUSR); // Restore read-only
|
||||
return 1;
|
||||
}
|
||||
|
||||
// Generate keystream for this chunk
|
||||
if (chacha20_encrypt(key, counter, nonce, buffer, keystream, chunk_size) != 0) {
|
||||
printf("Error: Chacha20 keystream generation failed\n");
|
||||
fclose(pad_file);
|
||||
chmod(pad_path, S_IRUSR);
|
||||
return 1;
|
||||
}
|
||||
|
||||
// XOR existing pad with keystream (adds entropy)
|
||||
for (size_t i = 0; i < chunk_size; i++) {
|
||||
buffer[i] ^= keystream[i];
|
||||
}
|
||||
|
||||
// Seek back and write modified data
|
||||
if (fseek(pad_file, offset, SEEK_SET) != 0) {
|
||||
printf("Error: Cannot seek to offset %lu\n", offset);
|
||||
fclose(pad_file);
|
||||
chmod(pad_path, S_IRUSR);
|
||||
return 1;
|
||||
}
|
||||
|
||||
if (fwrite(buffer, 1, chunk_size, pad_file) != chunk_size) {
|
||||
printf("Error: Cannot write modified pad data\n");
|
||||
fclose(pad_file);
|
||||
chmod(pad_path, S_IRUSR);
|
||||
return 1;
|
||||
}
|
||||
|
||||
offset += chunk_size;
|
||||
counter += (chunk_size + 63) / 64; // Round up for block count
|
||||
|
||||
// Show progress for large pads
|
||||
if (display_progress && offset % (64 * 1024 * 1024) == 0) { // Every 64MB
|
||||
show_progress(offset, pad_size, start_time);
|
||||
}
|
||||
}
|
||||
|
||||
fclose(pad_file);
|
||||
|
||||
// Restore read-only permissions
|
||||
if (chmod(pad_path, S_IRUSR) != 0) {
|
||||
printf("Warning: Cannot restore pad file to read-only\n");
|
||||
}
|
||||
|
||||
if (display_progress) {
|
||||
show_progress(pad_size, pad_size, start_time);
|
||||
printf("\n✓ Entropy successfully added to pad using Chacha20\n");
|
||||
printf("✓ Pad integrity maintained\n");
|
||||
printf("✓ %zu bytes of entropy distributed across entire pad\n", entropy_size);
|
||||
printf("✓ Pad restored to read-only mode\n");
|
||||
|
||||
// Update checksum after entropy addition
|
||||
printf("\n🔄 Updating pad checksum...\n");
|
||||
char new_chksum[65];
|
||||
int checksum_result = update_pad_checksum_after_entropy(pad_chksum, new_chksum);
|
||||
|
||||
if (checksum_result == 0) {
|
||||
printf("✓ Pad checksum updated successfully\n");
|
||||
printf(" Old checksum: %.16s...\n", pad_chksum);
|
||||
printf(" New checksum: %.16s...\n", new_chksum);
|
||||
printf("✓ Pad files renamed to new checksum\n");
|
||||
|
||||
// Pause before returning to menu to let user see the success message
|
||||
print_centered_header("Entropy Addition Complete", 1);
|
||||
} else if (checksum_result == 2) {
|
||||
printf("ℹ Checksum unchanged (unusual but not an error)\n");
|
||||
} else {
|
||||
printf("⚠ Warning: Checksum update failed (entropy was added successfully)\n");
|
||||
printf(" You may need to manually handle the checksum update\n");
|
||||
return 1; // Report error despite successful entropy addition
|
||||
}
|
||||
}
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
// Enhanced entropy collection with visual feedback
|
||||
int collect_entropy_with_feedback(unsigned char* entropy_buffer, size_t target_bytes,
|
||||
size_t* collected_bytes, int allow_early_exit) {
|
||||
struct termios original_termios;
|
||||
entropy_collection_state_t state = {0};
|
||||
|
||||
// Initialize state
|
||||
state.target_bytes = target_bytes;
|
||||
state.auto_complete_enabled = allow_early_exit;
|
||||
state.collection_start_time = get_precise_time();
|
||||
|
||||
// Setup raw terminal
|
||||
if (setup_raw_terminal(&original_termios) != 0) {
|
||||
printf("Error: Cannot setup terminal for entropy collection\n");
|
||||
return 1;
|
||||
}
|
||||
|
||||
// Clear screen area for display
|
||||
printf("\n\n\n\n\n\n");
|
||||
printf("\033[2J\033[H"); // Clear screen and move to top
|
||||
|
||||
unsigned char entropy_block[16];
|
||||
struct timespec timestamp;
|
||||
uint32_t sequence_counter = 0;
|
||||
char key;
|
||||
unsigned char seen_keys[256] = {0};
|
||||
|
||||
*collected_bytes = 0;
|
||||
|
||||
while (state.collected_bytes < target_bytes) {
|
||||
// Update display
|
||||
state.quality_score = calculate_overall_quality(&state);
|
||||
display_entropy_progress(&state);
|
||||
|
||||
// Non-blocking read
|
||||
if (read(STDIN_FILENO, &key, 1) == 1) {
|
||||
// Handle ESC key for early exit
|
||||
if (key == 27 && allow_early_exit && state.collected_bytes >= 1024) {
|
||||
break; // Early exit allowed
|
||||
}
|
||||
|
||||
// Record keypress timing
|
||||
double current_time = get_precise_time();
|
||||
state.last_keypress_time = current_time;
|
||||
|
||||
// Update key histogram
|
||||
state.key_histogram[(unsigned char)key]++;
|
||||
|
||||
// Get high precision timestamp
|
||||
clock_gettime(CLOCK_MONOTONIC, ×tamp);
|
||||
|
||||
// Create enhanced entropy block: [key][timestamp][sequence][quality_bits]
|
||||
entropy_block[0] = key;
|
||||
memcpy(&entropy_block[1], ×tamp.tv_sec, 8);
|
||||
memcpy(&entropy_block[9], ×tamp.tv_nsec, 4);
|
||||
memcpy(&entropy_block[13], &sequence_counter, 2);
|
||||
entropy_block[15] = (unsigned char)(current_time * 1000) & 0xFF; // Sub-millisecond timing
|
||||
|
||||
// Add to entropy buffer
|
||||
if (state.collected_bytes + 16 <= MAX_ENTROPY_BUFFER) {
|
||||
memcpy(entropy_buffer + state.collected_bytes, entropy_block, 16);
|
||||
state.collected_bytes += 16;
|
||||
}
|
||||
|
||||
sequence_counter++;
|
||||
|
||||
// Track unique keys
|
||||
if (!seen_keys[(unsigned char)key]) {
|
||||
seen_keys[(unsigned char)key] = 1;
|
||||
state.unique_keys++;
|
||||
}
|
||||
} else {
|
||||
// No key available, just sleep and wait for keystrokes
|
||||
usleep(10000); // 10ms delay - wait for keystrokes, don't add timing entropy
|
||||
}
|
||||
|
||||
// Auto-complete at target if enabled
|
||||
if (state.collected_bytes >= target_bytes) {
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
// Final display update
|
||||
state.quality_score = calculate_overall_quality(&state);
|
||||
display_entropy_progress(&state);
|
||||
|
||||
// Summary
|
||||
double collection_time = get_precise_time() - state.collection_start_time;
|
||||
printf("\n\n✓ Entropy collection complete!\n");
|
||||
printf(" Collected: %zu bytes in %.1f seconds\n", state.collected_bytes, collection_time);
|
||||
printf(" Quality: %d%% (Excellent: 80%%+, Good: 60%%+)\n", state.quality_score);
|
||||
printf(" Unique keys: %zu\n", state.unique_keys);
|
||||
|
||||
// Restore terminal
|
||||
restore_terminal(&original_termios);
|
||||
|
||||
*collected_bytes = state.collected_bytes;
|
||||
return 0;
|
||||
}
|
||||
|
||||
// Chacha20 key derivation from collected entropy
|
||||
int derive_chacha20_params(const unsigned char* entropy_data, size_t entropy_size,
|
||||
unsigned char key[32], unsigned char nonce[12]) {
|
||||
if (!entropy_data || entropy_size < 512 || !key || !nonce) {
|
||||
return 1; // Error: insufficient entropy or null pointers
|
||||
}
|
||||
|
||||
// Phase 1: Generate base key from entropy using enhanced XOR checksum method
|
||||
unsigned char enhanced_checksum[44]; // 32 key + 12 nonce
|
||||
memset(enhanced_checksum, 0, 44);
|
||||
|
||||
// Mix entropy data similar to calculate_checksum but for 44 bytes
|
||||
for (size_t i = 0; i < entropy_size; i++) {
|
||||
unsigned char bucket = i % 44;
|
||||
enhanced_checksum[bucket] ^= entropy_data[i] ^
|
||||
((i >> 8) & 0xFF) ^
|
||||
((i >> 16) & 0xFF) ^
|
||||
((i >> 24) & 0xFF);
|
||||
}
|
||||
|
||||
// Phase 2: Add system entropy for additional randomness
|
||||
unsigned char system_entropy[32];
|
||||
FILE* urandom = fopen("/dev/urandom", "rb");
|
||||
if (!urandom) {
|
||||
return 2; // Error: cannot access system entropy
|
||||
}
|
||||
|
||||
if (fread(system_entropy, 1, 32, urandom) != 32) {
|
||||
fclose(urandom);
|
||||
return 2; // Error: insufficient system entropy
|
||||
}
|
||||
fclose(urandom);
|
||||
|
||||
// Mix system entropy into derived key
|
||||
for (int i = 0; i < 32; i++) {
|
||||
enhanced_checksum[i] ^= system_entropy[i];
|
||||
}
|
||||
|
||||
// Extract key and nonce
|
||||
memcpy(key, enhanced_checksum, 32);
|
||||
memcpy(nonce, enhanced_checksum + 32, 12);
|
||||
|
||||
return 0; // Success
|
||||
}
|
||||
|
||||
// Collect entropy from binary file
|
||||
int collect_file_entropy(unsigned char* entropy_buffer, size_t target_bytes,
|
||||
size_t* collected_bytes, int display_progress) {
|
||||
if (display_progress) {
|
||||
print_centered_header("File Entropy Collection", 0);
|
||||
printf("Load entropy from binary file (.bin format)\n");
|
||||
printf("Target: %zu bytes\n", target_bytes);
|
||||
}
|
||||
|
||||
printf("Enter path to binary entropy file: ");
|
||||
fflush(stdout);
|
||||
|
||||
char file_path[512];
|
||||
if (!fgets(file_path, sizeof(file_path), stdin)) {
|
||||
printf("Error: Failed to read input\n");
|
||||
return 1;
|
||||
}
|
||||
|
||||
// Remove newline
|
||||
file_path[strcspn(file_path, "\n")] = 0;
|
||||
|
||||
// Check if file exists and get size
|
||||
struct stat file_stat;
|
||||
if (stat(file_path, &file_stat) != 0) {
|
||||
printf("Error: File '%s' not found\n", file_path);
|
||||
return 1;
|
||||
}
|
||||
|
||||
if (!S_ISREG(file_stat.st_mode)) {
|
||||
printf("Error: '%s' is not a regular file\n", file_path);
|
||||
return 1;
|
||||
}
|
||||
|
||||
size_t file_size = file_stat.st_size;
|
||||
if (file_size == 0) {
|
||||
printf("Error: File is empty\n");
|
||||
return 1;
|
||||
}
|
||||
|
||||
if (file_size < target_bytes) {
|
||||
printf("Warning: File size (%zu bytes) is smaller than target (%zu bytes)\n",
|
||||
file_size, target_bytes);
|
||||
printf("Will read available data and pad with zeros if necessary.\n");
|
||||
}
|
||||
|
||||
// Open file for reading
|
||||
FILE* entropy_file = fopen(file_path, "rb");
|
||||
if (!entropy_file) {
|
||||
printf("Error: Cannot open file '%s' for reading\n", file_path);
|
||||
return 1;
|
||||
}
|
||||
|
||||
if (display_progress) {
|
||||
printf("Reading entropy from file...\n");
|
||||
}
|
||||
|
||||
// Read entropy data
|
||||
size_t bytes_to_read = (file_size < target_bytes) ? file_size : target_bytes;
|
||||
size_t bytes_read = fread(entropy_buffer, 1, bytes_to_read, entropy_file);
|
||||
|
||||
if (bytes_read != bytes_to_read) {
|
||||
printf("Error: Failed to read %zu bytes from file (read %zu)\n",
|
||||
bytes_to_read, bytes_read);
|
||||
fclose(entropy_file);
|
||||
return 1;
|
||||
}
|
||||
|
||||
fclose(entropy_file);
|
||||
|
||||
// Pad with zeros if file was smaller than target
|
||||
if (bytes_read < target_bytes) {
|
||||
memset(entropy_buffer + bytes_read, 0, target_bytes - bytes_read);
|
||||
*collected_bytes = target_bytes; // We padded to target size
|
||||
} else {
|
||||
*collected_bytes = bytes_read;
|
||||
}
|
||||
|
||||
if (display_progress) {
|
||||
printf("✓ File entropy collection complete!\n");
|
||||
printf(" File: %s\n", file_path);
|
||||
printf(" Read: %zu bytes\n", bytes_read);
|
||||
printf(" Total: %zu bytes (padded to target if necessary)\n", *collected_bytes);
|
||||
}
|
||||
|
||||
return 0; // Success
|
||||
}
|
||||
|
||||
// Collect entropy by source type with unified interface
|
||||
int collect_entropy_by_source(entropy_source_t source, unsigned char* entropy_buffer,
|
||||
size_t target_bytes, size_t* collected_bytes, int display_progress) {
|
||||
switch (source) {
|
||||
case ENTROPY_SOURCE_KEYBOARD:
|
||||
return collect_entropy_with_feedback(entropy_buffer, target_bytes, collected_bytes, 1);
|
||||
|
||||
case ENTROPY_SOURCE_TRUERNG:
|
||||
return collect_truerng_entropy(entropy_buffer, target_bytes, collected_bytes, display_progress);
|
||||
|
||||
case ENTROPY_SOURCE_DICE:
|
||||
return collect_dice_entropy(entropy_buffer, target_bytes, collected_bytes, display_progress);
|
||||
|
||||
case ENTROPY_SOURCE_FILE:
|
||||
return collect_file_entropy(entropy_buffer, target_bytes, collected_bytes, display_progress);
|
||||
|
||||
default:
|
||||
if (display_progress) {
|
||||
printf("Error: Unknown entropy source\n");
|
||||
}
|
||||
return 1;
|
||||
}
|
||||
}
|
||||
|
||||
// Collect manual entropy from any printable character input
|
||||
int collect_dice_entropy(unsigned char* entropy_buffer, size_t target_bytes,
|
||||
size_t* collected_bytes, int display_progress) {
|
||||
if (display_progress) {
|
||||
print_centered_header("Manual Entropy Collection", 0);
|
||||
printf("Enter any text, numbers, or symbols for entropy.\n");
|
||||
printf("Target: %zu bytes (%zu characters needed)\n", target_bytes, target_bytes);
|
||||
printf("Press Enter after each line, or 'done' when finished.\n\n");
|
||||
}
|
||||
|
||||
size_t bytes_written = 0;
|
||||
|
||||
char input[256];
|
||||
|
||||
while (bytes_written < target_bytes) {
|
||||
if (display_progress) {
|
||||
double percentage = (double)bytes_written / target_bytes * 100.0;
|
||||
printf("Progress: %.1f%% (%zu/%zu bytes) - Enter text: ",
|
||||
percentage, bytes_written, target_bytes);
|
||||
fflush(stdout);
|
||||
}
|
||||
|
||||
if (!fgets(input, sizeof(input), stdin)) {
|
||||
if (display_progress) {
|
||||
printf("Error: Failed to read input\n");
|
||||
}
|
||||
return 1;
|
||||
}
|
||||
|
||||
// Remove newline
|
||||
input[strcspn(input, "\n")] = 0;
|
||||
|
||||
// Check for done command
|
||||
if (strcmp(input, "done") == 0 && bytes_written >= target_bytes / 2) {
|
||||
break; // Allow early exit if we have at least half the target
|
||||
}
|
||||
|
||||
// Process each printable character as 8 bits of entropy
|
||||
for (size_t i = 0; input[i] && bytes_written < target_bytes; i++) {
|
||||
char c = input[i];
|
||||
if (c >= 32 && c <= 126) { // Printable ASCII characters
|
||||
entropy_buffer[bytes_written++] = (unsigned char)c;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
if (display_progress) {
|
||||
printf("\n✓ Manual entropy collection complete!\n");
|
||||
printf(" Collected: %zu bytes from text input\n", bytes_written);
|
||||
printf(" Entropy quality: 8 bits per character\n");
|
||||
}
|
||||
|
||||
*collected_bytes = bytes_written;
|
||||
return 0; // Success
|
||||
}
|
||||
|
||||
void restore_terminal(struct termios* original_termios) {
|
||||
tcsetattr(STDIN_FILENO, TCSANOW, original_termios);
|
||||
|
||||
// Reset stdin to blocking
|
||||
int flags = fcntl(STDIN_FILENO, F_GETFL);
|
||||
fcntl(STDIN_FILENO, F_SETFL, flags & ~O_NONBLOCK);
|
||||
}
|
||||
double get_precise_time(void) {
|
||||
struct timespec ts;
|
||||
clock_gettime(CLOCK_MONOTONIC, &ts);
|
||||
return ts.tv_sec + ts.tv_nsec / 1000000000.0;
|
||||
}
|
||||
|
||||
void draw_progress_bar(double percentage, int width) {
|
||||
int filled = (int)(percentage / 100.0 * width);
|
||||
if (filled > width) filled = width;
|
||||
|
||||
printf("[");
|
||||
for (int i = 0; i < filled; i++) {
|
||||
printf("█");
|
||||
}
|
||||
for (int i = filled; i < width; i++) {
|
||||
printf("░");
|
||||
}
|
||||
printf("]");
|
||||
}
|
||||
|
||||
void draw_quality_bar(double quality, int width, const char* label) {
|
||||
int filled = (int)(quality / 100.0 * width);
|
||||
if (filled > width) filled = width;
|
||||
|
||||
// Color coding based on quality
|
||||
const char* color;
|
||||
if (quality >= 80) color = "\033[32m"; // Green
|
||||
else if (quality >= 60) color = "\033[33m"; // Yellow
|
||||
else color = "\033[31m"; // Red
|
||||
|
||||
printf("%s", color);
|
||||
draw_progress_bar(quality, width);
|
||||
printf("\033[0m %-10s", label); // Reset color
|
||||
}
|
||||
|
||||
double calculate_timing_quality(const entropy_collection_state_t* state) {
|
||||
// Analyze timing variance between keypresses
|
||||
if (state->collected_bytes < 32) return 0.0; // Need minimum data
|
||||
|
||||
// Simplified timing quality based on collection rate and variation
|
||||
double elapsed = get_precise_time() - state->collection_start_time;
|
||||
if (elapsed < 0.1) return 0.0;
|
||||
|
||||
double rate = state->collected_bytes / elapsed;
|
||||
|
||||
// Optimal rate is around 50-200 bytes/second (moderate typing with good timing variance)
|
||||
if (rate >= 50 && rate <= 200) return 90.0;
|
||||
if (rate >= 20 && rate <= 500) return 70.0;
|
||||
if (rate >= 10 && rate <= 1000) return 50.0;
|
||||
return 30.0;
|
||||
}
|
||||
|
||||
double calculate_variety_quality(const entropy_collection_state_t* state) {
|
||||
// Analyze key variety and distribution
|
||||
if (state->collected_bytes < 16) return 0.0;
|
||||
|
||||
// Calculate entropy from key histogram
|
||||
double entropy = 0.0;
|
||||
size_t total_keys = 0;
|
||||
|
||||
// Count total keypresses
|
||||
for (int i = 0; i < 256; i++) {
|
||||
total_keys += state->key_histogram[i];
|
||||
}
|
||||
|
||||
if (total_keys == 0) return 0.0;
|
||||
|
||||
// Calculate Shannon entropy
|
||||
for (int i = 0; i < 256; i++) {
|
||||
if (state->key_histogram[i] > 0) {
|
||||
double p = (double)state->key_histogram[i] / total_keys;
|
||||
entropy -= p * log2(p);
|
||||
}
|
||||
}
|
||||
|
||||
// Convert entropy to quality score (0-100)
|
||||
double max_entropy = log2(256); // Perfect entropy for 8-bit keyspace
|
||||
double normalized_entropy = entropy / max_entropy;
|
||||
|
||||
// Scale based on unique keys as well
|
||||
double unique_key_factor = (double)state->unique_keys / 50.0; // 50+ unique keys is excellent
|
||||
if (unique_key_factor > 1.0) unique_key_factor = 1.0;
|
||||
|
||||
return (normalized_entropy * 70.0 + unique_key_factor * 30.0);
|
||||
}
|
||||
|
||||
unsigned char calculate_overall_quality(const entropy_collection_state_t* state) {
|
||||
double timing = calculate_timing_quality(state);
|
||||
double variety = calculate_variety_quality(state);
|
||||
|
||||
// Simple collection progress bonus
|
||||
double progress_bonus = (double)state->collected_bytes / state->target_bytes * 20.0;
|
||||
if (progress_bonus > 20.0) progress_bonus = 20.0;
|
||||
|
||||
// Weighted average
|
||||
double overall = (timing * 0.4 + variety * 0.4 + progress_bonus);
|
||||
if (overall > 100.0) overall = 100.0;
|
||||
|
||||
return (unsigned char)overall;
|
||||
}
|
||||
|
||||
void display_entropy_progress(const entropy_collection_state_t* state) {
|
||||
// Calculate percentages
|
||||
double progress = (double)state->collected_bytes / state->target_bytes * 100.0;
|
||||
if (progress > 100.0) progress = 100.0;
|
||||
|
||||
double quality = state->quality_score;
|
||||
double timing_quality = calculate_timing_quality(state);
|
||||
double variety_quality = calculate_variety_quality(state);
|
||||
|
||||
// Clear previous output and redraw
|
||||
printf("\033[2K\r"); // Clear line
|
||||
printf("\033[A\033[2K\r"); // Move up and clear
|
||||
printf("\033[A\033[2K\r"); // Move up and clear
|
||||
printf("\033[A\033[2K\r"); // Move up and clear
|
||||
printf("\033[A\033[2K\r"); // Move up and clear
|
||||
printf("\033[A\033[2K\r"); // Move up and clear
|
||||
|
||||
// Header
|
||||
printf("Adding Entropy to Pad - Target: %zu bytes\n\n", state->target_bytes);
|
||||
|
||||
// Main progress bar
|
||||
printf("Progress: ");
|
||||
draw_progress_bar(progress, 50);
|
||||
printf(" %.1f%% (%zu/%zu bytes)\n", progress, state->collected_bytes, state->target_bytes);
|
||||
|
||||
// Quality indicators
|
||||
printf("Quality: ");
|
||||
draw_quality_bar(quality, 50, "OVERALL");
|
||||
printf("\n");
|
||||
|
||||
printf("Timing: ");
|
||||
draw_quality_bar(timing_quality, 50, "VARIED");
|
||||
printf("\n");
|
||||
|
||||
printf("Keys: ");
|
||||
draw_quality_bar(variety_quality, 50, "DIVERSE");
|
||||
printf("\n");
|
||||
|
||||
// Instructions
|
||||
if (state->collected_bytes >= 1024 && state->auto_complete_enabled) {
|
||||
printf("\nPress ESC to finish (minimum reached) or continue typing...");
|
||||
} else if (state->collected_bytes < 1024) {
|
||||
printf("\nType random keys... (%zu more bytes needed)", 1024 - state->collected_bytes);
|
||||
} else {
|
||||
printf("\nType random keys or press ESC when satisfied...");
|
||||
}
|
||||
|
||||
fflush(stdout);
|
||||
}
|
||||
|
||||
// Keyboard entropy functions
|
||||
int setup_raw_terminal(struct termios* original_termios) {
|
||||
struct termios new_termios;
|
||||
|
||||
if (tcgetattr(STDIN_FILENO, original_termios) != 0) {
|
||||
return 1;
|
||||
}
|
||||
|
||||
new_termios = *original_termios;
|
||||
new_termios.c_lflag &= ~(ICANON | ECHO);
|
||||
new_termios.c_cc[VMIN] = 0;
|
||||
new_termios.c_cc[VTIME] = 0;
|
||||
|
||||
if (tcsetattr(STDIN_FILENO, TCSANOW, &new_termios) != 0) {
|
||||
return 1;
|
||||
}
|
||||
|
||||
// Set stdin to non-blocking
|
||||
int flags = fcntl(STDIN_FILENO, F_GETFL);
|
||||
if (fcntl(STDIN_FILENO, F_SETFL, flags | O_NONBLOCK) == -1) {
|
||||
tcsetattr(STDIN_FILENO, TCSANOW, original_termios);
|
||||
return 1;
|
||||
}
|
||||
|
||||
return 0;
|
||||
}
|
||||
270
src/main.c
Normal file
270
src/main.c
Normal file
@@ -0,0 +1,270 @@
|
||||
#define _POSIX_C_SOURCE 200809L
|
||||
#define _DEFAULT_SOURCE
|
||||
|
||||
#include <stdio.h>
|
||||
#include <stdlib.h>
|
||||
#include <string.h>
|
||||
#include <stdint.h>
|
||||
#include <unistd.h>
|
||||
#include <sys/stat.h>
|
||||
#include <sys/statvfs.h>
|
||||
#include <sys/ioctl.h>
|
||||
#include <dirent.h>
|
||||
#include <time.h>
|
||||
#include <ctype.h>
|
||||
#include <termios.h>
|
||||
#include <fcntl.h>
|
||||
#include <math.h>
|
||||
#include "../include/otp.h"
|
||||
|
||||
int main(int argc, char* argv[]) {
|
||||
// Initialize terminal dimensions first
|
||||
init_terminal_dimensions();
|
||||
|
||||
// Load preferences
|
||||
load_preferences();
|
||||
|
||||
// Detect interactive mode: true when running with no arguments AND no piped input
|
||||
int is_interactive = (argc == 1 && !has_stdin_data());
|
||||
set_interactive_mode(is_interactive);
|
||||
|
||||
// Check for OTP thumb drive on startup
|
||||
char otp_drive_path[512];
|
||||
if (detect_otp_thumb_drive(otp_drive_path, sizeof(otp_drive_path))) {
|
||||
// Only show messages in interactive mode
|
||||
if (get_interactive_mode()) {
|
||||
printf("Detected OTP thumb drive: %s\n", otp_drive_path);
|
||||
printf("Using as default pads directory for this session.\n\n");
|
||||
}
|
||||
set_current_pads_dir(otp_drive_path);
|
||||
}
|
||||
|
||||
if (get_interactive_mode()) {
|
||||
return interactive_mode();
|
||||
} else {
|
||||
return command_line_mode(argc, argv);
|
||||
}
|
||||
}
|
||||
|
||||
int command_line_mode(int argc, char* argv[]) {
|
||||
// Check for help flags first (only if we have arguments)
|
||||
if (argc > 1 && (strcmp(argv[1], "-h") == 0 || strcmp(argv[1], "--h") == 0 ||
|
||||
strcmp(argv[1], "-help") == 0 || strcmp(argv[1], "--help") == 0 ||
|
||||
strcmp(argv[1], "help") == 0)) {
|
||||
print_usage(argv[0]);
|
||||
return 0;
|
||||
}
|
||||
|
||||
// If no arguments but piped input, default to encrypt mode
|
||||
if (argc == 1 && has_stdin_data()) {
|
||||
char* piped_text = read_stdin_text();
|
||||
if (piped_text) {
|
||||
int result = pipe_mode(argc, argv, piped_text);
|
||||
free(piped_text);
|
||||
return result;
|
||||
}
|
||||
}
|
||||
|
||||
if (argc > 1 && (strcmp(argv[1], "generate") == 0 || strcmp(argv[1], "-g") == 0)) {
|
||||
if (argc != 3) {
|
||||
printf("Usage: %s generate|-g <size>\n", argv[0]);
|
||||
printf("Size examples: 1024, 1GB, 5TB, 512MB\n");
|
||||
return 1;
|
||||
}
|
||||
uint64_t size = parse_size_string(argv[2]);
|
||||
if (size == 0) {
|
||||
printf("Error: Invalid size format\n");
|
||||
return 1;
|
||||
}
|
||||
return generate_pad(size, 1); // Use simplified pad generation
|
||||
}
|
||||
else if (strcmp(argv[1], "encrypt") == 0 || strcmp(argv[1], "-e") == 0) {
|
||||
// Check for piped input first
|
||||
if (has_stdin_data()) {
|
||||
char* piped_text = read_stdin_text();
|
||||
if (piped_text) {
|
||||
int result = pipe_mode(argc, argv, piped_text);
|
||||
free(piped_text);
|
||||
return result;
|
||||
}
|
||||
}
|
||||
|
||||
if (argc < 2 || argc > 4) {
|
||||
printf("Usage: %s encrypt|-e [pad_chksum_or_prefix] [text_to_encrypt]\n", argv[0]);
|
||||
return 1;
|
||||
}
|
||||
|
||||
// Check if pad was specified or use default
|
||||
const char* pad_identifier = NULL;
|
||||
const char* text = NULL;
|
||||
|
||||
if (argc == 2) {
|
||||
// Just -e, use default pad, no text (interactive)
|
||||
pad_identifier = NULL;
|
||||
text = NULL;
|
||||
} else if (argc == 3) {
|
||||
// Could be -e <pad> or -e <text> (using default pad)
|
||||
// Check if default pad is available to determine interpretation
|
||||
char* default_pad = get_default_pad_path();
|
||||
if (default_pad) {
|
||||
// Default pad available, treat argument as text
|
||||
pad_identifier = NULL;
|
||||
text = argv[2];
|
||||
free(default_pad);
|
||||
} else {
|
||||
// No default pad, treat as pad identifier
|
||||
pad_identifier = argv[2];
|
||||
text = NULL;
|
||||
}
|
||||
} else {
|
||||
// argc == 4: -e <pad> <text>
|
||||
pad_identifier = argv[2];
|
||||
text = argv[3];
|
||||
}
|
||||
|
||||
// If pad_identifier is NULL, we need to use default pad
|
||||
if (pad_identifier == NULL) {
|
||||
char* default_pad = get_default_pad_path();
|
||||
if (default_pad) {
|
||||
// Extract checksum from default pad path
|
||||
char* filename = strrchr(default_pad, '/');
|
||||
if (!filename) filename = default_pad;
|
||||
else filename++; // Skip the '/'
|
||||
|
||||
// Extract checksum (remove .pad extension)
|
||||
if (strlen(filename) >= 68 && strstr(filename, ".pad")) {
|
||||
static char default_checksum[65];
|
||||
strncpy(default_checksum, filename, 64);
|
||||
default_checksum[64] = '\0';
|
||||
pad_identifier = default_checksum;
|
||||
}
|
||||
free(default_pad);
|
||||
|
||||
// Call encrypt_text and return result
|
||||
return encrypt_text(pad_identifier, text);
|
||||
} else {
|
||||
printf("Error: No default pad configured. Specify pad explicitly or configure default pad.\n");
|
||||
return 1;
|
||||
}
|
||||
} else {
|
||||
// Explicit pad specified, normal operation
|
||||
return encrypt_text(pad_identifier, text);
|
||||
}
|
||||
}
|
||||
else if (strcmp(argv[1], "decrypt") == 0 || strcmp(argv[1], "-d") == 0) {
|
||||
if (argc == 2) {
|
||||
// Check for piped input first
|
||||
if (has_stdin_data()) {
|
||||
// Piped decrypt mode - read stdin and decrypt silently
|
||||
char* piped_message = read_stdin_text();
|
||||
if (piped_message) {
|
||||
int result = decrypt_text(NULL, piped_message);
|
||||
free(piped_message);
|
||||
return result;
|
||||
}
|
||||
}
|
||||
// Interactive mode - no arguments needed
|
||||
return decrypt_text(NULL, NULL);
|
||||
}
|
||||
else if (argc == 3) {
|
||||
// Check if the argument looks like an encrypted message (starts with -----)
|
||||
if (strncmp(argv[2], "-----BEGIN OTP MESSAGE-----", 27) == 0) {
|
||||
// Inline decrypt with message only - use silent mode for command line
|
||||
return decrypt_text(NULL, argv[2]);
|
||||
} else {
|
||||
// Check if it's a file (contains . or ends with known extensions)
|
||||
if (strstr(argv[2], ".") != NULL) {
|
||||
// Treat as file
|
||||
return decrypt_file(argv[2], NULL);
|
||||
} else {
|
||||
// Interactive decrypt with pad hint (legacy support)
|
||||
return decrypt_text(argv[2], NULL);
|
||||
}
|
||||
}
|
||||
}
|
||||
else if (argc == 4) {
|
||||
// Check for -o flag for output file
|
||||
if (strcmp(argv[2], "-o") == 0) {
|
||||
printf("Usage: %s decrypt|-d <input_file> [-o <output_file>]\n", argv[0]);
|
||||
return 1;
|
||||
} else {
|
||||
// Legacy format: pad_chksum and message, or file with output
|
||||
// Use silent mode for command line when message is provided
|
||||
return decrypt_text(argv[2], argv[3]);
|
||||
}
|
||||
}
|
||||
else if (argc == 5 && strcmp(argv[3], "-o") == 0) {
|
||||
// File decryption with output: -d <input_file> -o <output_file>
|
||||
return decrypt_file(argv[2], argv[4]);
|
||||
}
|
||||
else {
|
||||
printf("Usage: %s decrypt|-d [encrypted_message|file] [-o output_file]\n", argv[0]);
|
||||
printf(" %s decrypt|-d [encrypted_message] (pad info from message)\n", argv[0]);
|
||||
return 1;
|
||||
}
|
||||
}
|
||||
else if (strcmp(argv[1], "-f") == 0) {
|
||||
// File encryption mode: -f <input_file> <pad_prefix> [-a] [-o <output_file>]
|
||||
if (argc < 4) {
|
||||
printf("Usage: %s -f <input_file> <pad_prefix> [-a] [-o <output_file>]\n", argv[0]);
|
||||
return 1;
|
||||
}
|
||||
|
||||
const char* input_file = argv[2];
|
||||
const char* pad_prefix = argv[3];
|
||||
int ascii_armor = 0;
|
||||
const char* output_file = NULL;
|
||||
|
||||
// Parse optional flags
|
||||
for (int i = 4; i < argc; i++) {
|
||||
if (strcmp(argv[i], "-a") == 0) {
|
||||
ascii_armor = 1;
|
||||
} else if (strcmp(argv[i], "-o") == 0 && i + 1 < argc) {
|
||||
output_file = argv[++i];
|
||||
}
|
||||
}
|
||||
|
||||
return encrypt_file(pad_prefix, input_file, output_file, ascii_armor);
|
||||
}
|
||||
else if (strcmp(argv[1], "list") == 0 || strcmp(argv[1], "-l") == 0) {
|
||||
printf("Available pads:\n");
|
||||
char* selected = select_pad_interactive("Available pads:", "Select pad (or press Enter to exit)", PAD_FILTER_ALL, 0);
|
||||
if (selected) {
|
||||
free(selected);
|
||||
}
|
||||
return 0;
|
||||
}
|
||||
else {
|
||||
print_usage(argv[0]);
|
||||
return 1;
|
||||
}
|
||||
}
|
||||
|
||||
void print_usage(const char* program_name) {
|
||||
printf("OTP Cipher - One Time Pad Implementation v0.3.16\n");
|
||||
printf("Built for testing entropy system\n");
|
||||
printf("Usage:\n");
|
||||
printf(" %s - Interactive mode\n", program_name);
|
||||
printf(" %s generate|-g <size> - Generate new pad\n", program_name);
|
||||
printf(" %s encrypt|-e [pad_checksum_prefix] [text] - Encrypt text\n", program_name);
|
||||
printf(" %s decrypt|-d [encrypted_message] - Decrypt message\n", program_name);
|
||||
printf(" %s -f <file> <pad_prefix> [-a] [-o <out>] - Encrypt file\n", program_name);
|
||||
printf(" %s list|-l - List available pads\n", program_name);
|
||||
printf("\nFile Operations:\n");
|
||||
printf(" -f <file> <pad> - Encrypt file (binary .otp format)\n");
|
||||
printf(" -f <file> <pad> -a - Encrypt file (ASCII .otp.asc format)\n");
|
||||
printf(" -o <output> - Specify output filename\n");
|
||||
printf("\nShort flags:\n");
|
||||
printf(" -g generate -e encrypt -d decrypt -l list -f file\n");
|
||||
printf("\nExamples:\n");
|
||||
printf(" %s -e 1a2b3c \"Hello world\" - Encrypt inline text\n", program_name);
|
||||
printf(" %s -f document.pdf 1a2b - Encrypt file (binary)\n", program_name);
|
||||
printf(" %s -f document.pdf 1a2b -a - Encrypt file (ASCII)\n", program_name);
|
||||
printf(" %s -f document.pdf 1a2b -o secret.otp - Encrypt with custom output\n", program_name);
|
||||
printf(" %s -d \"-----BEGIN OTP MESSAGE-----...\" - Decrypt message/file\n", program_name);
|
||||
printf(" %s -d encrypted.otp.asc - Decrypt ASCII file\n", program_name);
|
||||
printf(" %s -g 1GB - Generate 1GB pad\n", program_name);
|
||||
printf(" %s -l - List pads\n", program_name);
|
||||
printf("\nSize examples: 1GB, 5TB, 512MB, 2048 (bytes)\n");
|
||||
printf("Pad selection: Full chksum or prefix\n");
|
||||
}
|
||||
1226
src/pads.c
Normal file
1226
src/pads.c
Normal file
File diff suppressed because it is too large
Load Diff
45
src/state.c
Normal file
45
src/state.c
Normal file
@@ -0,0 +1,45 @@
|
||||
#include <string.h>
|
||||
#include <stdlib.h>
|
||||
#include "../include/otp.h"
|
||||
|
||||
// Global state variables
|
||||
static char current_pads_dir[512] = DEFAULT_PADS_DIR;
|
||||
static int is_interactive_mode = 0;
|
||||
|
||||
// Terminal dimensions (moved from ui.c to state.c for global access)
|
||||
static int terminal_width = 80; // Default fallback width
|
||||
static int terminal_height = 24; // Default fallback height
|
||||
|
||||
// Getters and setters for global state
|
||||
|
||||
const char* get_current_pads_dir(void) {
|
||||
return current_pads_dir;
|
||||
}
|
||||
|
||||
void set_current_pads_dir(const char* dir) {
|
||||
if (dir) {
|
||||
strncpy(current_pads_dir, dir, sizeof(current_pads_dir) - 1);
|
||||
current_pads_dir[sizeof(current_pads_dir) - 1] = '\0';
|
||||
}
|
||||
}
|
||||
|
||||
int get_interactive_mode(void) {
|
||||
return is_interactive_mode;
|
||||
}
|
||||
|
||||
void set_interactive_mode(int mode) {
|
||||
is_interactive_mode = mode;
|
||||
}
|
||||
|
||||
int get_terminal_width(void) {
|
||||
return terminal_width;
|
||||
}
|
||||
|
||||
int get_terminal_height(void) {
|
||||
return terminal_height;
|
||||
}
|
||||
|
||||
void set_terminal_dimensions(int width, int height) {
|
||||
terminal_width = width;
|
||||
terminal_height = height;
|
||||
}
|
||||
114
src/trng.c
Normal file
114
src/trng.c
Normal file
@@ -0,0 +1,114 @@
|
||||
#define _POSIX_C_SOURCE 200809L
|
||||
#define _DEFAULT_SOURCE
|
||||
|
||||
#include <stdio.h>
|
||||
#include <stdlib.h>
|
||||
#include <string.h>
|
||||
#include <stdint.h>
|
||||
#include <unistd.h>
|
||||
#include <sys/stat.h>
|
||||
#include <sys/statvfs.h>
|
||||
#include <sys/ioctl.h>
|
||||
#include <dirent.h>
|
||||
#include <time.h>
|
||||
#include <ctype.h>
|
||||
#include <termios.h>
|
||||
#include <fcntl.h>
|
||||
#include <math.h>
|
||||
#include "../nostr_chacha20.h"
|
||||
#include "../include/otp.h"
|
||||
|
||||
// Basic TrueRNG entropy collection function
|
||||
int collect_truerng_entropy(unsigned char* entropy_buffer, size_t target_bytes, size_t* collected_bytes, int display_progress) {
|
||||
hardware_rng_device_t devices[10];
|
||||
int num_devices_found = 0;
|
||||
|
||||
// Detect available TrueRNG devices
|
||||
if (detect_all_hardware_rng_devices(devices, 10, &num_devices_found) != 0) {
|
||||
if (display_progress) {
|
||||
printf("Error: Failed to detect hardware RNG devices\n");
|
||||
}
|
||||
return 1;
|
||||
}
|
||||
|
||||
if (num_devices_found == 0) {
|
||||
if (display_progress) {
|
||||
printf("No hardware RNG devices found.\n");
|
||||
printf("\nSupported devices:\n");
|
||||
printf(" - TrueRNG/SwiftRNG (PID: %s, VID: %s)\n", TRUERNG_VID, TRUERNG_PID);
|
||||
printf(" - TrueRNGpro/SwiftRNGpro (PID: %s, VID: %s)\n", TRUERNGPRO_VID, TRUERNGPRO_PID);
|
||||
printf(" - TrueRNGproV2/SwiftRNGproV2 (PID: %s, VID: %s)\n", TRUERNGPROV2_VID, TRUERNGPROV2_PID);
|
||||
printf("\nPlease connect a TrueRNG or SwiftRNG device and try again.\n");
|
||||
}
|
||||
return 1;
|
||||
}
|
||||
|
||||
// Use first available device
|
||||
hardware_rng_device_t* selected_device = &devices[0];
|
||||
|
||||
if (display_progress) {
|
||||
printf("Using device: %s\n", selected_device->friendly_name);
|
||||
printf("Collecting %zu bytes of entropy...\n", target_bytes);
|
||||
}
|
||||
|
||||
// Collect entropy from the device
|
||||
int result = collect_truerng_entropy_from_device(selected_device, entropy_buffer, target_bytes, collected_bytes, display_progress);
|
||||
|
||||
if (result != 0) {
|
||||
if (display_progress) {
|
||||
printf("Error: Failed to collect entropy from TrueRNG device\n");
|
||||
}
|
||||
return 1;
|
||||
}
|
||||
|
||||
if (display_progress) {
|
||||
printf("✓ Successfully collected %zu bytes of entropy from TrueRNG device\n", *collected_bytes);
|
||||
}
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
// Wrapper function to match the header declaration
|
||||
// Note: Full implementation moved to otp.c during modularization
|
||||
// This is a placeholder that should be implemented when the full streaming
|
||||
// functionality is moved to the trng module
|
||||
int collect_truerng_entropy_streaming_from_device(const hardware_rng_device_t* device, const char* pad_chksum,
|
||||
size_t total_bytes, int display_progress, int entropy_mode) {
|
||||
// For now, return an error - full implementation needs to be moved from otp.c
|
||||
(void)device; // Suppress unused parameter warning
|
||||
(void)pad_chksum;
|
||||
(void)total_bytes;
|
||||
(void)display_progress;
|
||||
(void)entropy_mode;
|
||||
|
||||
fprintf(stderr, "Error: collect_truerng_entropy_streaming_from_device not yet implemented in modular version\n");
|
||||
return 1; // Error
|
||||
}
|
||||
|
||||
// Detect all available hardware RNG devices
|
||||
int detect_all_hardware_rng_devices(hardware_rng_device_t* devices, int max_devices, int* num_devices_found) {
|
||||
*num_devices_found = 0;
|
||||
|
||||
// For now, return empty list - full implementation would scan /dev for TrueRNG devices
|
||||
// This is a placeholder that should be implemented when the full TRNG functionality
|
||||
// is moved to the trng module
|
||||
|
||||
(void)devices; // Suppress unused parameter warning
|
||||
(void)max_devices;
|
||||
|
||||
return 0; // Success but no devices found
|
||||
}
|
||||
|
||||
// Collect entropy from a specific TrueRNG device
|
||||
int collect_truerng_entropy_from_device(const hardware_rng_device_t* device, unsigned char* entropy_buffer,
|
||||
size_t target_bytes, size_t* collected_bytes, int display_progress) {
|
||||
// For now, return an error - full implementation needs to be moved from otp.c
|
||||
(void)device; // Suppress unused parameter warning
|
||||
(void)entropy_buffer;
|
||||
(void)target_bytes;
|
||||
(void)collected_bytes;
|
||||
(void)display_progress;
|
||||
|
||||
fprintf(stderr, "Error: collect_truerng_entropy_from_device not yet implemented in modular version\n");
|
||||
return 1; // Error
|
||||
}
|
||||
503
src/ui.c
Normal file
503
src/ui.c
Normal file
@@ -0,0 +1,503 @@
|
||||
#define _POSIX_C_SOURCE 200809L
|
||||
#define _DEFAULT_SOURCE
|
||||
|
||||
#include <stdio.h>
|
||||
#include <stdlib.h>
|
||||
#include <string.h>
|
||||
#include <stdint.h>
|
||||
#include <unistd.h>
|
||||
#include <sys/stat.h>
|
||||
#include <sys/statvfs.h>
|
||||
#include <sys/ioctl.h>
|
||||
#include <dirent.h>
|
||||
#include <time.h>
|
||||
#include <ctype.h>
|
||||
#include <termios.h>
|
||||
#include <fcntl.h>
|
||||
#include <math.h>
|
||||
#include "../include/otp.h"
|
||||
|
||||
// Initialize terminal dimensions
|
||||
void init_terminal_dimensions(void) {
|
||||
struct winsize ws;
|
||||
|
||||
// Try to get actual terminal size
|
||||
if (ioctl(STDOUT_FILENO, TIOCGWINSZ, &ws) == 0 && ws.ws_col > 0 && ws.ws_row > 0) {
|
||||
set_terminal_dimensions(ws.ws_col, ws.ws_row);
|
||||
}
|
||||
// If ioctl fails, keep the default values (80x24)
|
||||
}
|
||||
|
||||
// Print centered header with = padding, screen clearing, and optional pause
|
||||
void print_centered_header(const char* text, int pause_before_clear) {
|
||||
if (!text) return;
|
||||
|
||||
// Phase 1: Pause if requested
|
||||
if (pause_before_clear) {
|
||||
printf("\nPress Enter to continue...");
|
||||
fflush(stdout);
|
||||
|
||||
// Wait for Enter key
|
||||
int c;
|
||||
while ((c = getchar()) != '\n' && c != EOF) {
|
||||
// Consume any extra characters until newline
|
||||
}
|
||||
}
|
||||
|
||||
// Phase 2: Clear screen using terminal height
|
||||
for (int i = 0; i < get_terminal_height(); i++) {
|
||||
printf("\n");
|
||||
}
|
||||
|
||||
// Phase 3: Display centered header (existing logic)
|
||||
int text_len = strlen(text);
|
||||
int available_width = get_terminal_width();
|
||||
|
||||
// Ensure minimum spacing: at least 1 space on each side
|
||||
int min_required = text_len + 4; // text + " " + text + " " (spaces around text)
|
||||
|
||||
if (available_width < min_required) {
|
||||
// Terminal too narrow - just print the text with minimal formatting
|
||||
printf("=== %s ===\n", text);
|
||||
return;
|
||||
}
|
||||
|
||||
// Calculate padding
|
||||
int total_padding = available_width - text_len - 2; // -2 for spaces around text
|
||||
int left_padding = total_padding / 2;
|
||||
int right_padding = total_padding - left_padding;
|
||||
|
||||
// Print the header
|
||||
for (int i = 0; i < left_padding; i++) {
|
||||
printf("=");
|
||||
}
|
||||
printf(" %s ", text);
|
||||
for (int i = 0; i < right_padding; i++) {
|
||||
printf("=");
|
||||
}
|
||||
printf("\n");
|
||||
}
|
||||
|
||||
// Interactive mode main loop
|
||||
int interactive_mode(void) {
|
||||
char input[10];
|
||||
printf("\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n");
|
||||
while (1) {
|
||||
show_main_menu();
|
||||
|
||||
if (!fgets(input, sizeof(input), stdin)) {
|
||||
printf("Goodbye!\n");
|
||||
break;
|
||||
}
|
||||
|
||||
char choice = toupper(input[0]);
|
||||
|
||||
switch (choice) {
|
||||
case 'T':
|
||||
handle_text_encrypt();
|
||||
break;
|
||||
case 'F':
|
||||
handle_file_encrypt();
|
||||
break;
|
||||
case 'D':
|
||||
handle_decrypt_menu();
|
||||
break;
|
||||
case 'P':
|
||||
handle_pads_menu();
|
||||
break;
|
||||
case 'X':
|
||||
case 'Q':
|
||||
printf("Goodbye!\n");
|
||||
return 0;
|
||||
default:
|
||||
printf("Invalid choice. Please try again.\n");
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
void show_main_menu(void) {
|
||||
printf("\n");
|
||||
print_centered_header("Main Menu - OTP v0.3.16", 0);
|
||||
printf("\n");
|
||||
|
||||
printf(" \033[4mT\033[0mext encrypt\n"); //TEXT ENCRYPT
|
||||
printf(" \033[4mF\033[0mile encrypt\n"); //FILE ENCRYPT
|
||||
printf(" \033[4mD\033[0mecrypt\n"); //DECRYPT
|
||||
printf(" \033[4mP\033[0mads\n"); //PADS
|
||||
printf(" E\033[4mx\033[0mit\n"); //EXIT
|
||||
printf("\nSelect option: ");
|
||||
}
|
||||
|
||||
int handle_generate_menu(void) {
|
||||
printf("\n");
|
||||
print_centered_header("Generate New Pad", 0);
|
||||
printf("Enter pad size (examples: 1GB, 5TB, 512MB, 2048): ");
|
||||
|
||||
char size_input[64];
|
||||
if (!fgets(size_input, sizeof(size_input), stdin)) {
|
||||
printf("Error: Failed to read input\n");
|
||||
return 1;
|
||||
}
|
||||
|
||||
size_input[strcspn(size_input, "\n")] = 0;
|
||||
uint64_t size = parse_size_string(size_input);
|
||||
|
||||
if (size == 0) {
|
||||
printf("Error: Invalid size format\n");
|
||||
return 1;
|
||||
}
|
||||
|
||||
double size_gb = (double)size / (1024.0 * 1024.0 * 1024.0);
|
||||
printf("Generating %.2f GB pad...\n", size_gb);
|
||||
printf("Note: Use 'Add entropy' in Pads menu to enhance randomness after creation.\n");
|
||||
|
||||
return generate_pad(size, 1);
|
||||
}
|
||||
|
||||
int handle_encrypt_menu(void) {
|
||||
printf("\n");
|
||||
print_centered_header("Encrypt Data", 0);
|
||||
|
||||
printf("Available pads:\n");
|
||||
char* selected = select_pad_interactive("Available pads:", "Select pad (or press Enter to continue)", PAD_FILTER_ALL, 0);
|
||||
int pad_count = 1; // Assume at least 1 pad if function returned
|
||||
if (selected) {
|
||||
free(selected);
|
||||
} else {
|
||||
pad_count = 0;
|
||||
}
|
||||
if (pad_count == 0) {
|
||||
printf("No pads available. Generate a pad first.\n");
|
||||
return 1;
|
||||
}
|
||||
|
||||
// Ask user to choose between text and file encryption
|
||||
printf("\nSelect encryption type:\n");
|
||||
printf(" 1. Text message\n");
|
||||
printf(" 2. File\n");
|
||||
printf("Enter choice (1-2): ");
|
||||
|
||||
char choice_input[10];
|
||||
if (!fgets(choice_input, sizeof(choice_input), stdin)) {
|
||||
printf("Error: Failed to read input\n");
|
||||
return 1;
|
||||
}
|
||||
|
||||
int choice = atoi(choice_input);
|
||||
|
||||
if (choice == 1) {
|
||||
// Text encryption - use unified pad selection
|
||||
char* selected_pad = select_pad_interactive("Select Pad for Text Encryption",
|
||||
"Select pad (by prefix)",
|
||||
PAD_FILTER_ALL, 1);
|
||||
if (!selected_pad) {
|
||||
printf("Text encryption cancelled.\n");
|
||||
return 1;
|
||||
}
|
||||
|
||||
int result = encrypt_text(selected_pad, NULL); // NULL for interactive mode
|
||||
free(selected_pad);
|
||||
return result;
|
||||
}
|
||||
else if (choice == 2) {
|
||||
// File encryption
|
||||
printf("\nFile selection options:\n");
|
||||
printf(" 1. Type file path directly\n");
|
||||
printf(" 2. Use file manager\n");
|
||||
printf("Enter choice (1-2): ");
|
||||
|
||||
char file_choice[10];
|
||||
char input_file[512];
|
||||
|
||||
if (!fgets(file_choice, sizeof(file_choice), stdin)) {
|
||||
printf("Error: Failed to read input\n");
|
||||
return 1;
|
||||
}
|
||||
|
||||
if (atoi(file_choice) == 2) {
|
||||
// Use file manager
|
||||
if (launch_file_manager(".", input_file, sizeof(input_file)) != 0) {
|
||||
printf("Falling back to manual file path entry.\n");
|
||||
printf("Enter input file path: ");
|
||||
if (!fgets(input_file, sizeof(input_file), stdin)) {
|
||||
printf("Error: Failed to read input\n");
|
||||
return 1;
|
||||
}
|
||||
input_file[strcspn(input_file, "\n")] = 0;
|
||||
}
|
||||
} else {
|
||||
// Direct file path input
|
||||
printf("Enter input file path: ");
|
||||
if (!fgets(input_file, sizeof(input_file), stdin)) {
|
||||
printf("Error: Failed to read input\n");
|
||||
return 1;
|
||||
}
|
||||
input_file[strcspn(input_file, "\n")] = 0;
|
||||
}
|
||||
|
||||
// Check if file exists
|
||||
if (access(input_file, R_OK) != 0) {
|
||||
printf("Error: File '%s' not found or cannot be read\n", input_file);
|
||||
return 1;
|
||||
}
|
||||
|
||||
// Use unified pad selection
|
||||
char* selected_pad = select_pad_interactive("Select Pad for File Encryption",
|
||||
"Select pad (by prefix)",
|
||||
PAD_FILTER_ALL, 1);
|
||||
if (!selected_pad) {
|
||||
printf("File encryption cancelled.\n");
|
||||
return 1;
|
||||
}
|
||||
|
||||
// Ask for output format
|
||||
printf("\nSelect output format:\n");
|
||||
printf(" 1. Binary (.otp) - preserves file permissions\n");
|
||||
printf(" 2. ASCII (.otp.asc) - text-safe format\n");
|
||||
printf("Enter choice (1-2): ");
|
||||
|
||||
char format_input[10];
|
||||
if (!fgets(format_input, sizeof(format_input), stdin)) {
|
||||
printf("Error: Failed to read input\n");
|
||||
return 1;
|
||||
}
|
||||
|
||||
int ascii_armor = (atoi(format_input) == 2) ? 1 : 0;
|
||||
|
||||
// Generate default output filename with files directory and use enhanced input function
|
||||
char default_output[1024]; // Increased size to prevent truncation warnings
|
||||
char temp_default[1024];
|
||||
|
||||
// Generate base filename with appropriate extension
|
||||
if (ascii_armor) {
|
||||
snprintf(temp_default, sizeof(temp_default), "%s.otp.asc", input_file);
|
||||
} else {
|
||||
snprintf(temp_default, sizeof(temp_default), "%s.otp", input_file);
|
||||
}
|
||||
|
||||
// Apply files directory default path
|
||||
get_default_file_path(temp_default, default_output, sizeof(default_output));
|
||||
|
||||
char output_file[512];
|
||||
if (get_filename_with_default("Output filename:", default_output, output_file, sizeof(output_file)) != 0) {
|
||||
printf("Error: Failed to read input\n");
|
||||
return 1;
|
||||
}
|
||||
|
||||
const char* output_filename = output_file;
|
||||
|
||||
int result = encrypt_file(selected_pad, input_file, output_filename, ascii_armor);
|
||||
free(selected_pad);
|
||||
return result;
|
||||
}
|
||||
else {
|
||||
printf("Invalid choice. Please enter 1 or 2.\n");
|
||||
return 1;
|
||||
}
|
||||
}
|
||||
|
||||
int handle_decrypt_menu(void) {
|
||||
printf("\n");
|
||||
print_centered_header("Smart Decrypt", 0);
|
||||
printf("Enter encrypted data (paste ASCII armor), file path, or press Enter to browse files:\n");
|
||||
|
||||
char input_line[MAX_LINE_LENGTH];
|
||||
if (!fgets(input_line, sizeof(input_line), stdin)) {
|
||||
printf("Error: Failed to read input\n");
|
||||
return 1;
|
||||
}
|
||||
|
||||
// Remove newline
|
||||
input_line[strcspn(input_line, "\n")] = 0;
|
||||
|
||||
if (strlen(input_line) == 0) {
|
||||
// Empty input - launch file manager to browse for files
|
||||
char selected_file[512];
|
||||
if (launch_file_manager(get_files_directory(), selected_file, sizeof(selected_file)) != 0) {
|
||||
printf("Error: Could not launch file manager\n");
|
||||
return 1;
|
||||
}
|
||||
|
||||
// Generate smart default output filename with files directory and use enhanced input function
|
||||
char temp_default[512];
|
||||
char default_output[512];
|
||||
strncpy(temp_default, selected_file, sizeof(temp_default) - 1);
|
||||
temp_default[sizeof(temp_default) - 1] = '\0';
|
||||
|
||||
// Remove common encrypted extensions to get a better default
|
||||
if (strstr(temp_default, ".otp.asc")) {
|
||||
// Replace .otp.asc with original extension or no extension
|
||||
char* ext_pos = strstr(temp_default, ".otp.asc");
|
||||
*ext_pos = '\0';
|
||||
} else if (strstr(temp_default, ".otp")) {
|
||||
// Replace .otp with original extension or no extension
|
||||
char* ext_pos = strstr(temp_default, ".otp");
|
||||
*ext_pos = '\0';
|
||||
} else {
|
||||
// No recognized encrypted extension, add .decrypted suffix
|
||||
strncat(temp_default, ".decrypted", sizeof(temp_default) - strlen(temp_default) - 1);
|
||||
}
|
||||
|
||||
// Apply files directory default path
|
||||
get_default_file_path(temp_default, default_output, sizeof(default_output));
|
||||
|
||||
char output_file[512];
|
||||
if (get_filename_with_default("Output filename:", default_output, output_file, sizeof(output_file)) != 0) {
|
||||
printf("Error: Failed to read input\n");
|
||||
return 1;
|
||||
}
|
||||
|
||||
return decrypt_file(selected_file, output_file);
|
||||
}
|
||||
else if (strncmp(input_line, "-----BEGIN OTP MESSAGE-----", 27) == 0) {
|
||||
// Looks like ASCII armor - collect the full message
|
||||
char full_message[MAX_INPUT_SIZE * 4] = {0};
|
||||
strcat(full_message, input_line);
|
||||
strcat(full_message, "\n");
|
||||
|
||||
printf("Continue pasting the message (end with -----END OTP MESSAGE-----):\n");
|
||||
|
||||
char line[MAX_LINE_LENGTH];
|
||||
while (fgets(line, sizeof(line), stdin)) {
|
||||
strncat(full_message, line, sizeof(full_message) - strlen(full_message) - 1);
|
||||
if (strstr(line, "-----END OTP MESSAGE-----")) {
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
return decrypt_text(NULL, full_message);
|
||||
}
|
||||
else {
|
||||
// Check if it looks like a file path
|
||||
if (access(input_line, R_OK) == 0) {
|
||||
// It's a valid file - decrypt it with enhanced input for output filename
|
||||
char temp_default[512];
|
||||
char default_output[512];
|
||||
strncpy(temp_default, input_line, sizeof(temp_default) - 1);
|
||||
temp_default[sizeof(temp_default) - 1] = '\0';
|
||||
|
||||
// Remove common encrypted extensions to get a better default
|
||||
if (strstr(temp_default, ".otp.asc")) {
|
||||
// Replace .otp.asc with original extension or no extension
|
||||
char* ext_pos = strstr(temp_default, ".otp.asc");
|
||||
*ext_pos = '\0';
|
||||
} else if (strstr(temp_default, ".otp")) {
|
||||
// Replace .otp with original extension or no extension
|
||||
char* ext_pos = strstr(temp_default, ".otp");
|
||||
*ext_pos = '\0';
|
||||
} else {
|
||||
// No recognized encrypted extension, add .decrypted suffix
|
||||
strncat(temp_default, ".decrypted", sizeof(temp_default) - strlen(temp_default) - 1);
|
||||
}
|
||||
|
||||
// Apply files directory default path
|
||||
get_default_file_path(temp_default, default_output, sizeof(default_output));
|
||||
|
||||
char output_file[512];
|
||||
if (get_filename_with_default("Output filename:", default_output, output_file, sizeof(output_file)) != 0) {
|
||||
printf("Error: Failed to read input\n");
|
||||
return 1;
|
||||
}
|
||||
|
||||
return decrypt_file(input_line, output_file);
|
||||
} else {
|
||||
printf("Input not recognized as ASCII armor or valid file path.\n");
|
||||
return 1;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
int handle_text_encrypt(void) {
|
||||
printf("\n");
|
||||
print_centered_header("Text Encrypt", 0);
|
||||
|
||||
// Launch text editor directly
|
||||
char text_buffer[MAX_INPUT_SIZE];
|
||||
if (launch_text_editor(NULL, text_buffer, sizeof(text_buffer)) != 0) {
|
||||
printf("Error: Could not launch text editor\n");
|
||||
return 1;
|
||||
}
|
||||
|
||||
if (strlen(text_buffer) == 0) {
|
||||
printf("No text entered - canceling encryption\n");
|
||||
return 1;
|
||||
}
|
||||
|
||||
// Use unified pad selection
|
||||
char* selected_pad = select_pad_interactive("Select Pad for Text Encryption",
|
||||
"Select pad (by prefix)",
|
||||
PAD_FILTER_ALL, 1);
|
||||
if (!selected_pad) {
|
||||
printf("Text encryption cancelled.\n");
|
||||
return 1;
|
||||
}
|
||||
|
||||
int result = encrypt_text(selected_pad, text_buffer);
|
||||
free(selected_pad);
|
||||
return result;
|
||||
}
|
||||
|
||||
int handle_file_encrypt(void) {
|
||||
printf("\n");
|
||||
print_centered_header("File Encrypt", 0);
|
||||
|
||||
// Launch file manager directly
|
||||
char input_file[512];
|
||||
if (launch_file_manager(".", input_file, sizeof(input_file)) != 0) {
|
||||
printf("Error: Could not launch file manager\n");
|
||||
return 1;
|
||||
}
|
||||
|
||||
// Check if file exists
|
||||
if (access(input_file, R_OK) != 0) {
|
||||
printf("Error: File '%s' not found or cannot be read\n", input_file);
|
||||
return 1;
|
||||
}
|
||||
|
||||
// Use unified pad selection
|
||||
char* selected_pad = select_pad_interactive("Select Pad for File Encryption",
|
||||
"Select pad (by prefix)",
|
||||
PAD_FILTER_ALL, 1);
|
||||
if (!selected_pad) {
|
||||
printf("File encryption cancelled.\n");
|
||||
return 1;
|
||||
}
|
||||
|
||||
// Ask for output format
|
||||
printf("\nSelect output format:\n");
|
||||
printf(" 1. Binary (.otp) - preserves file permissions\n");
|
||||
printf(" 2. ASCII (.otp.asc) - text-safe format\n");
|
||||
printf("Enter choice (1-2): ");
|
||||
|
||||
char format_input[10];
|
||||
if (!fgets(format_input, sizeof(format_input), stdin)) {
|
||||
printf("Error: Failed to read input\n");
|
||||
return 1;
|
||||
}
|
||||
|
||||
int ascii_armor = (atoi(format_input) == 2) ? 1 : 0;
|
||||
|
||||
// Generate default output filename
|
||||
char default_output[1024]; // Increased buffer size to prevent truncation warnings
|
||||
if (ascii_armor) {
|
||||
snprintf(default_output, sizeof(default_output), "%s.otp.asc", input_file);
|
||||
} else {
|
||||
snprintf(default_output, sizeof(default_output), "%s.otp", input_file);
|
||||
}
|
||||
|
||||
// Use enhanced input function for output filename
|
||||
char output_file[512];
|
||||
if (get_filename_with_default("Output filename:", default_output, output_file, sizeof(output_file)) != 0) {
|
||||
printf("Error: Failed to read input\n");
|
||||
return 1;
|
||||
}
|
||||
|
||||
const char* output_filename = output_file;
|
||||
|
||||
int result = encrypt_file(selected_pad, input_file, output_filename, ascii_armor);
|
||||
free(selected_pad);
|
||||
return result;
|
||||
}
|
||||
1041
src/util.c
Normal file
1041
src/util.c
Normal file
File diff suppressed because it is too large
Load Diff
@@ -1 +0,0 @@
|
||||
Testing updated files directory functionality
|
||||
@@ -1 +0,0 @@
|
||||
Testing files directory functionality
|
||||
BIN
test_new.txt.otp
BIN
test_new.txt.otp
Binary file not shown.
1
true_rng
Submodule
1
true_rng
Submodule
Submodule true_rng added at 52ed7af980
Reference in New Issue
Block a user