1 // SPDX-License-Identifier: GPL-2.0-only
3 * Copyright (C) 2009-2011 Gabor Juhos <juhosg@openwrt.org>
13 #include "buffalo-lib.h"
15 static uint32_t crc32_table
[256] =
17 0x00000000, 0x04c11db7, 0x09823b6e, 0x0d4326d9,
18 0x130476dc, 0x17c56b6b, 0x1a864db2, 0x1e475005,
19 0x2608edb8, 0x22c9f00f, 0x2f8ad6d6, 0x2b4bcb61,
20 0x350c9b64, 0x31cd86d3, 0x3c8ea00a, 0x384fbdbd,
21 0x4c11db70, 0x48d0c6c7, 0x4593e01e, 0x4152fda9,
22 0x5f15adac, 0x5bd4b01b, 0x569796c2, 0x52568b75,
23 0x6a1936c8, 0x6ed82b7f, 0x639b0da6, 0x675a1011,
24 0x791d4014, 0x7ddc5da3, 0x709f7b7a, 0x745e66cd,
25 0x9823b6e0, 0x9ce2ab57, 0x91a18d8e, 0x95609039,
26 0x8b27c03c, 0x8fe6dd8b, 0x82a5fb52, 0x8664e6e5,
27 0xbe2b5b58, 0xbaea46ef, 0xb7a96036, 0xb3687d81,
28 0xad2f2d84, 0xa9ee3033, 0xa4ad16ea, 0xa06c0b5d,
29 0xd4326d90, 0xd0f37027, 0xddb056fe, 0xd9714b49,
30 0xc7361b4c, 0xc3f706fb, 0xceb42022, 0xca753d95,
31 0xf23a8028, 0xf6fb9d9f, 0xfbb8bb46, 0xff79a6f1,
32 0xe13ef6f4, 0xe5ffeb43, 0xe8bccd9a, 0xec7dd02d,
33 0x34867077, 0x30476dc0, 0x3d044b19, 0x39c556ae,
34 0x278206ab, 0x23431b1c, 0x2e003dc5, 0x2ac12072,
35 0x128e9dcf, 0x164f8078, 0x1b0ca6a1, 0x1fcdbb16,
36 0x018aeb13, 0x054bf6a4, 0x0808d07d, 0x0cc9cdca,
37 0x7897ab07, 0x7c56b6b0, 0x71159069, 0x75d48dde,
38 0x6b93dddb, 0x6f52c06c, 0x6211e6b5, 0x66d0fb02,
39 0x5e9f46bf, 0x5a5e5b08, 0x571d7dd1, 0x53dc6066,
40 0x4d9b3063, 0x495a2dd4, 0x44190b0d, 0x40d816ba,
41 0xaca5c697, 0xa864db20, 0xa527fdf9, 0xa1e6e04e,
42 0xbfa1b04b, 0xbb60adfc, 0xb6238b25, 0xb2e29692,
43 0x8aad2b2f, 0x8e6c3698, 0x832f1041, 0x87ee0df6,
44 0x99a95df3, 0x9d684044, 0x902b669d, 0x94ea7b2a,
45 0xe0b41de7, 0xe4750050, 0xe9362689, 0xedf73b3e,
46 0xf3b06b3b, 0xf771768c, 0xfa325055, 0xfef34de2,
47 0xc6bcf05f, 0xc27dede8, 0xcf3ecb31, 0xcbffd686,
48 0xd5b88683, 0xd1799b34, 0xdc3abded, 0xd8fba05a,
49 0x690ce0ee, 0x6dcdfd59, 0x608edb80, 0x644fc637,
50 0x7a089632, 0x7ec98b85, 0x738aad5c, 0x774bb0eb,
51 0x4f040d56, 0x4bc510e1, 0x46863638, 0x42472b8f,
52 0x5c007b8a, 0x58c1663d, 0x558240e4, 0x51435d53,
53 0x251d3b9e, 0x21dc2629, 0x2c9f00f0, 0x285e1d47,
54 0x36194d42, 0x32d850f5, 0x3f9b762c, 0x3b5a6b9b,
55 0x0315d626, 0x07d4cb91, 0x0a97ed48, 0x0e56f0ff,
56 0x1011a0fa, 0x14d0bd4d, 0x19939b94, 0x1d528623,
57 0xf12f560e, 0xf5ee4bb9, 0xf8ad6d60, 0xfc6c70d7,
58 0xe22b20d2, 0xe6ea3d65, 0xeba91bbc, 0xef68060b,
59 0xd727bbb6, 0xd3e6a601, 0xdea580d8, 0xda649d6f,
60 0xc423cd6a, 0xc0e2d0dd, 0xcda1f604, 0xc960ebb3,
61 0xbd3e8d7e, 0xb9ff90c9, 0xb4bcb610, 0xb07daba7,
62 0xae3afba2, 0xaafbe615, 0xa7b8c0cc, 0xa379dd7b,
63 0x9b3660c6, 0x9ff77d71, 0x92b45ba8, 0x9675461f,
64 0x8832161a, 0x8cf30bad, 0x81b02d74, 0x857130c3,
65 0x5d8a9099, 0x594b8d2e, 0x5408abf7, 0x50c9b640,
66 0x4e8ee645, 0x4a4ffbf2, 0x470cdd2b, 0x43cdc09c,
67 0x7b827d21, 0x7f436096, 0x7200464f, 0x76c15bf8,
68 0x68860bfd, 0x6c47164a, 0x61043093, 0x65c52d24,
69 0x119b4be9, 0x155a565e, 0x18197087, 0x1cd86d30,
70 0x029f3d35, 0x065e2082, 0x0b1d065b, 0x0fdc1bec,
71 0x3793a651, 0x3352bbe6, 0x3e119d3f, 0x3ad08088,
72 0x2497d08d, 0x2056cd3a, 0x2d15ebe3, 0x29d4f654,
73 0xc5a92679, 0xc1683bce, 0xcc2b1d17, 0xc8ea00a0,
74 0xd6ad50a5, 0xd26c4d12, 0xdf2f6bcb, 0xdbee767c,
75 0xe3a1cbc1, 0xe760d676, 0xea23f0af, 0xeee2ed18,
76 0xf0a5bd1d, 0xf464a0aa, 0xf9278673, 0xfde69bc4,
77 0x89b8fd09, 0x8d79e0be, 0x803ac667, 0x84fbdbd0,
78 0x9abc8bd5, 0x9e7d9662, 0x933eb0bb, 0x97ffad0c,
79 0xafb010b1, 0xab710d06, 0xa6322bdf, 0xa2f33668,
80 0xbcb4666d, 0xb8757bda, 0xb5365d03, 0xb1f740b4
83 int bcrypt_init(struct bcrypt_ctx
*ctx
, void *key
, int keylen
,
84 unsigned long state_len
)
87 unsigned char *p
= key
;
91 state
= malloc(state_len
);
98 ctx
->state_len
= state_len
;
100 for (i
= 0; i
< state_len
; i
++)
103 for(i
= 0, j
= 0; i
< state_len
; i
++, j
= (j
+ 1) % keylen
) {
107 k
= (k
+ p
[j
] + t
) % state_len
;
115 int bcrypt_process(struct bcrypt_ctx
*ctx
, unsigned char *src
,
116 unsigned char *dst
, unsigned long len
)
118 unsigned char *state
= ctx
->state
;
119 unsigned long state_len
= ctx
->state_len
;
126 for (k
= 0; k
< len
; k
++) {
129 i
= (i
+ 1) % state_len
;
130 j
= (j
+ state
[i
]) % state_len
;
135 dst
[k
] = src
[k
] ^ state
[(state
[i
] + state
[j
]) % state_len
];
144 void bcrypt_finish(struct bcrypt_ctx
*ctx
)
150 int bcrypt_buf(unsigned char seed
, unsigned char *key
, unsigned char *src
,
151 unsigned char *dst
, unsigned long len
, int longstate
)
153 unsigned char bckey
[BCRYPT_MAX_KEYLEN
+ 1];
155 struct bcrypt_ctx ctx
;
158 /* setup decryption key */
159 keylen
= strlen((char *) key
);
161 memcpy(&bckey
[1], key
, keylen
);
165 ret
= bcrypt_init(&ctx
, bckey
, keylen
,
166 (longstate
) ? len
: BCRYPT_DEFAULT_STATE_LEN
);
170 bcrypt_process(&ctx
, src
, dst
, len
);
176 uint32_t buffalo_csum(uint32_t csum
, void *buf
, unsigned long len
)
178 signed char *p
= buf
;
184 for (i
= 0; i
< 8; i
++)
185 csum
= (csum
>> 1) ^ ((csum
& 1) ? 0xedb88320ul
: 0);
191 uint32_t buffalo_crc(void *buf
, unsigned long len
)
193 unsigned char *p
= buf
;
194 unsigned long t
= len
;
198 crc
= (crc
<< 8) ^ crc32_table
[((crc
>> 24) ^ *p
++) & 0xFF];
201 crc
= (crc
<< 8) ^ crc32_table
[((crc
>> 24) ^ t
) & 0xFF];
208 unsigned long enc_compute_header_len(char *product
, char *version
)
210 return ENC_MAGIC_LEN
+ 1 + strlen(product
) + 1 +
211 strlen(version
) + 1 + 3 * sizeof(uint32_t);
214 unsigned long enc_compute_buf_len(char *product
, char *version
,
215 unsigned long datalen
)
219 ret
= enc_compute_header_len(product
, version
);
220 ret
+= datalen
+ sizeof(uint32_t);
221 ret
+= (4 - ret
% 4);
226 static void put_be32(void *data
, uint32_t val
)
228 unsigned char *p
= data
;
230 p
[0] = (val
>> 24) & 0xff;
231 p
[1] = (val
>> 16) & 0xff;
232 p
[2] = (val
>> 8) & 0xff;
236 static uint32_t get_be32(void *data
)
238 unsigned char *p
= data
;
240 return (((uint32_t)p
[0]) << 24) |
241 (((uint32_t)p
[1]) << 16) |
242 (((uint32_t)p
[2]) << 8) |
246 static int check_magic(void *magic
)
248 if (!memcmp("start", magic
, ENC_MAGIC_LEN
))
251 if (!memcmp("asar1", magic
, ENC_MAGIC_LEN
))
257 int encrypt_buf(struct enc_param
*ep
, unsigned char *hdr
,
266 p
= (unsigned char *) hdr
;
269 len
= strlen((char *) ep
->magic
) + 1;
270 memcpy(p
, ep
->magic
, len
);
276 /* put product len */
277 len
= strlen((char *) ep
->product
) + 1;
279 p
+= sizeof(uint32_t);
281 /* copy and crypt product name */
282 memcpy(p
, ep
->product
, len
);
283 err
= bcrypt_buf(ep
->seed
, ep
->key
, p
, p
, len
, ep
->longstate
);
289 /* put version length */
290 len
= strlen((char *) ep
->version
) + 1;
292 p
+= sizeof(uint32_t);
294 /* copy and crypt version */
295 memcpy(p
, ep
->version
, len
);
296 err
= bcrypt_buf(s
, ep
->key
, p
, p
, len
, ep
->longstate
);
302 /* put data length */
303 put_be32(p
, ep
->datalen
);
306 err
= bcrypt_buf(s
, ep
->key
, data
, data
, ep
->datalen
, ep
->longstate
);
311 put_be32(&data
[ep
->datalen
], ep
->csum
);
319 int decrypt_buf(struct enc_param
*ep
, unsigned char *data
,
320 unsigned long datalen
)
331 #define CHECKLEN(_l) do { \
333 if (remain < len) { \
338 #define INCP() do { \
346 CHECKLEN(ENC_MAGIC_LEN
);
347 err
= check_magic(p
);
350 memcpy(ep
->magic
, p
, ENC_MAGIC_LEN
);
357 CHECKLEN(sizeof(uint32_t));
358 prod_len
= get_be32(p
);
359 if (prod_len
> ENC_PRODUCT_LEN
)
364 memcpy(ep
->product
, p
, prod_len
);
367 CHECKLEN(sizeof(uint32_t));
368 ver_len
= get_be32(p
);
369 if (ver_len
> ENC_VERSION_LEN
)
374 memcpy(ep
->version
, p
, ver_len
);
377 CHECKLEN(sizeof(uint32_t));
378 ep
->datalen
= get_be32(p
);
382 CHECKLEN(ep
->datalen
);
383 err
= bcrypt_buf(ep
->version
[0], ep
->key
, p
, data
, ep
->datalen
,
389 CHECKLEN(sizeof(uint32_t));
390 ep
->csum
= get_be32(p
);
393 csum
= buffalo_csum(ep
->datalen
, data
, ep
->datalen
);
394 if (csum
!= ep
->csum
)
397 /* decrypt product name */
398 err
= bcrypt_buf(ep
->product
[0], ep
->key
, ep
->version
, ep
->version
,
399 ver_len
, ep
->longstate
);
403 /* decrypt version */
404 err
= bcrypt_buf(ep
->seed
, ep
->key
, ep
->product
, ep
->product
, prod_len
,
417 ssize_t
get_file_size(char *name
)
422 err
= stat(name
, &st
);
429 int read_file_to_buf(char *name
, void *buf
, ssize_t buflen
)
435 f
= fopen(name
, "r");
440 done
= fread(buf
, buflen
, 1, f
);
452 int write_buf_to_file(char *name
, void *buf
, ssize_t buflen
)
458 f
= fopen(name
, "w");
463 done
= fwrite(buf
, buflen
, 1, f
);