blob: 5a8358891714c515af902a3f6407919b45ac5816 [file] [log] [blame]
Bram Moolenaaredf3f972016-08-29 22:49:24 +02001/* vi:set ts=8 sts=4 sw=4 noet:
Bram Moolenaar8f4ac012014-08-10 13:38:34 +02002 *
3 * VIM - Vi IMproved by Bram Moolenaar
4 *
5 * Do ":help uganda" in Vim to read copying and usage conditions.
6 * Do ":help credits" in Vim to see a list of people who contributed.
7 * See README.txt for an overview of the Vim source code.
8 */
9
10/*
11 * crypt.c: Generic encryption support.
12 */
13#include "vim.h"
14
15#if defined(FEAT_CRYPT) || defined(PROTO)
16/*
17 * Optional encryption support.
18 * Mohsin Ahmed, mosh@sasi.com, 1998-09-24
19 * Based on zip/crypt sources.
20 * Refactored by David Leadbeater, 2014.
21 *
22 * NOTE FOR USA: Since 2000 exporting this code from the USA is allowed to
23 * most countries. There are a few exceptions, but that still should not be a
24 * problem since this code was originally created in Europe and India.
25 *
26 * Blowfish addition originally made by Mohsin Ahmed,
27 * http://www.cs.albany.edu/~mosh 2010-03-14
28 * Based on blowfish by Bruce Schneier (http://www.schneier.com/blowfish.html)
29 * and sha256 by Christophe Devine.
30 */
31
32typedef struct {
Bram Moolenaarc667da52019-11-30 20:52:27 +010033 char *name; // encryption name as used in 'cryptmethod'
34 char *magic; // magic bytes stored in file header
35 int salt_len; // length of salt, or 0 when not using salt
Christian Brabandtf573c6e2021-06-20 14:02:16 +020036 int seed_len; // length of seed, or 0 when not using seed
Bram Moolenaar987411d2019-01-18 22:48:34 +010037#ifdef CRYPT_NOT_INPLACE
Bram Moolenaarc667da52019-11-30 20:52:27 +010038 int works_inplace; // encryption/decryption can be done in-place
Bram Moolenaar987411d2019-01-18 22:48:34 +010039#endif
Bram Moolenaarc667da52019-11-30 20:52:27 +010040 int whole_undofile; // whole undo file is encrypted
Bram Moolenaar8f4ac012014-08-10 13:38:34 +020041
Bram Moolenaarc667da52019-11-30 20:52:27 +010042 // Optional function pointer for a self-test.
Bram Moolenaar8f4ac012014-08-10 13:38:34 +020043 int (* self_test_fn)();
44
Bram Moolenaarad3ec762019-04-21 00:00:13 +020045 // Function pointer for initializing encryption/decryption.
Bram Moolenaar6ee96582019-04-27 22:06:37 +020046 int (* init_fn)(cryptstate_T *state, char_u *key,
Bram Moolenaar8f4ac012014-08-10 13:38:34 +020047 char_u *salt, int salt_len, char_u *seed, int seed_len);
48
Bram Moolenaarc667da52019-11-30 20:52:27 +010049 // Function pointers for encoding/decoding from one buffer into another.
50 // Optional, however, these or the _buffer ones should be configured.
Bram Moolenaar8f4ac012014-08-10 13:38:34 +020051 void (*encode_fn)(cryptstate_T *state, char_u *from, size_t len,
Christian Brabandtf573c6e2021-06-20 14:02:16 +020052 char_u *to, int last);
Bram Moolenaar8f4ac012014-08-10 13:38:34 +020053 void (*decode_fn)(cryptstate_T *state, char_u *from, size_t len,
Christian Brabandtf573c6e2021-06-20 14:02:16 +020054 char_u *to, int last);
Bram Moolenaar8f4ac012014-08-10 13:38:34 +020055
Bram Moolenaarc667da52019-11-30 20:52:27 +010056 // Function pointers for encoding and decoding, can buffer data if needed.
57 // Optional (however, these or the above should be configured).
Bram Moolenaar8f4ac012014-08-10 13:38:34 +020058 long (*encode_buffer_fn)(cryptstate_T *state, char_u *from, size_t len,
Christian Brabandtf573c6e2021-06-20 14:02:16 +020059 char_u **newptr, int last);
Bram Moolenaar8f4ac012014-08-10 13:38:34 +020060 long (*decode_buffer_fn)(cryptstate_T *state, char_u *from, size_t len,
Christian Brabandtf573c6e2021-06-20 14:02:16 +020061 char_u **newptr, int last);
Bram Moolenaar8f4ac012014-08-10 13:38:34 +020062
Bram Moolenaarc667da52019-11-30 20:52:27 +010063 // Function pointers for in-place encoding and decoding, used for
64 // crypt_*_inplace(). "from" and "to" arguments will be equal.
65 // These may be the same as decode_fn and encode_fn above, however an
66 // algorithm may implement them in a way that is not interchangeable with
67 // the crypt_(en|de)code() interface (for example because it wishes to add
68 // padding to files).
69 // This method is used for swap and undo files which have a rigid format.
Bram Moolenaar8f4ac012014-08-10 13:38:34 +020070 void (*encode_inplace_fn)(cryptstate_T *state, char_u *p1, size_t len,
Christian Brabandtf573c6e2021-06-20 14:02:16 +020071 char_u *p2, int last);
Bram Moolenaar8f4ac012014-08-10 13:38:34 +020072 void (*decode_inplace_fn)(cryptstate_T *state, char_u *p1, size_t len,
Christian Brabandtf573c6e2021-06-20 14:02:16 +020073 char_u *p2, int last);
Bram Moolenaar8f4ac012014-08-10 13:38:34 +020074} cryptmethod_T;
75
Bram Moolenaarc667da52019-11-30 20:52:27 +010076// index is method_nr of cryptstate_T, CRYPT_M_*
Bram Moolenaar8f4ac012014-08-10 13:38:34 +020077static cryptmethod_T cryptmethods[CRYPT_M_COUNT] = {
Bram Moolenaarc667da52019-11-30 20:52:27 +010078 // PK_Zip; very weak
Bram Moolenaar8f4ac012014-08-10 13:38:34 +020079 {
80 "zip",
81 "VimCrypt~01!",
82 0,
83 0,
Bram Moolenaar987411d2019-01-18 22:48:34 +010084#ifdef CRYPT_NOT_INPLACE
Bram Moolenaar8f4ac012014-08-10 13:38:34 +020085 TRUE,
Bram Moolenaar987411d2019-01-18 22:48:34 +010086#endif
Bram Moolenaar8f4ac012014-08-10 13:38:34 +020087 FALSE,
88 NULL,
89 crypt_zip_init,
90 crypt_zip_encode, crypt_zip_decode,
91 NULL, NULL,
92 crypt_zip_encode, crypt_zip_decode,
93 },
94
Bram Moolenaarc667da52019-11-30 20:52:27 +010095 // Blowfish/CFB + SHA-256 custom key derivation; implementation issues.
Bram Moolenaar8f4ac012014-08-10 13:38:34 +020096 {
97 "blowfish",
98 "VimCrypt~02!",
99 8,
100 8,
Bram Moolenaar987411d2019-01-18 22:48:34 +0100101#ifdef CRYPT_NOT_INPLACE
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200102 TRUE,
Bram Moolenaar987411d2019-01-18 22:48:34 +0100103#endif
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200104 FALSE,
105 blowfish_self_test,
106 crypt_blowfish_init,
107 crypt_blowfish_encode, crypt_blowfish_decode,
108 NULL, NULL,
109 crypt_blowfish_encode, crypt_blowfish_decode,
110 },
111
Bram Moolenaarc667da52019-11-30 20:52:27 +0100112 // Blowfish/CFB + SHA-256 custom key derivation; fixed.
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200113 {
114 "blowfish2",
115 "VimCrypt~03!",
116 8,
117 8,
Bram Moolenaar987411d2019-01-18 22:48:34 +0100118#ifdef CRYPT_NOT_INPLACE
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200119 TRUE,
Bram Moolenaar987411d2019-01-18 22:48:34 +0100120#endif
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200121 TRUE,
122 blowfish_self_test,
123 crypt_blowfish_init,
124 crypt_blowfish_encode, crypt_blowfish_decode,
125 NULL, NULL,
126 crypt_blowfish_encode, crypt_blowfish_decode,
127 },
Bram Moolenaard23a8232018-02-10 18:45:26 +0100128
Christian Brabandtf573c6e2021-06-20 14:02:16 +0200129 // XChaCha20 using libsodium
130 {
131 "xchacha20",
132 "VimCrypt~04!",
133#ifdef FEAT_SODIUM
134 crypto_pwhash_argon2id_SALTBYTES, // 16
135#else
136 16,
137#endif
138 8,
139#ifdef CRYPT_NOT_INPLACE
140 FALSE,
141#endif
142 FALSE,
143 NULL,
144 crypt_sodium_init,
Christian Brabandt226b28b2021-06-21 21:08:08 +0200145 NULL, NULL,
Christian Brabandtf573c6e2021-06-20 14:02:16 +0200146 crypt_sodium_buffer_encode, crypt_sodium_buffer_decode,
Christian Brabandt226b28b2021-06-21 21:08:08 +0200147 NULL, NULL,
Christian Brabandtf573c6e2021-06-20 14:02:16 +0200148 },
149
Bram Moolenaarc667da52019-11-30 20:52:27 +0100150 // NOTE: when adding a new method, use some random bytes for the magic key,
151 // to avoid that a text file is recognized as encrypted.
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200152};
153
Christian Brabandtf573c6e2021-06-20 14:02:16 +0200154#ifdef FEAT_SODIUM
155typedef struct {
156 size_t count;
157 unsigned char key[crypto_box_SEEDBYTES];
158 // 32, same as crypto_secretstream_xchacha20poly1305_KEYBYTES
159 crypto_secretstream_xchacha20poly1305_state
160 state;
161} sodium_state_T;
162#endif
163
Bram Moolenaarc667da52019-11-30 20:52:27 +0100164#define CRYPT_MAGIC_LEN 12 // cannot change
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200165static char crypt_magic_head[] = "VimCrypt~";
166
167/*
168 * Return int value for crypt method name.
169 * 0 for "zip", the old method. Also for any non-valid value.
170 * 1 for "blowfish".
171 * 2 for "blowfish2".
172 */
173 int
Bram Moolenaar7454a062016-01-30 15:14:10 +0100174crypt_method_nr_from_name(char_u *name)
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200175{
176 int i;
177
178 for (i = 0; i < CRYPT_M_COUNT; ++i)
179 if (STRCMP(name, cryptmethods[i].name) == 0)
180 return i;
181 return 0;
182}
183
184/*
185 * Get the crypt method used for a file from "ptr[len]", the magic text at the
186 * start of the file.
187 * Returns -1 when no encryption used.
188 */
189 int
Bram Moolenaar7454a062016-01-30 15:14:10 +0100190crypt_method_nr_from_magic(char *ptr, int len)
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200191{
192 int i;
193
194 if (len < CRYPT_MAGIC_LEN)
195 return -1;
196
197 for (i = 0; i < CRYPT_M_COUNT; i++)
198 if (memcmp(ptr, cryptmethods[i].magic, CRYPT_MAGIC_LEN) == 0)
199 return i;
200
201 i = (int)STRLEN(crypt_magic_head);
202 if (len >= i && memcmp(ptr, crypt_magic_head, i) == 0)
Bram Moolenaar9d00e4a2022-01-05 17:49:15 +0000203 emsg(_(e_file_is_encrypted_with_unknown_method));
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200204
205 return -1;
206}
207
Bram Moolenaar987411d2019-01-18 22:48:34 +0100208#ifdef CRYPT_NOT_INPLACE
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200209/*
210 * Return TRUE if the crypt method for "method_nr" can be done in-place.
211 */
212 int
Bram Moolenaar7454a062016-01-30 15:14:10 +0100213crypt_works_inplace(cryptstate_T *state)
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200214{
215 return cryptmethods[state->method_nr].works_inplace;
216}
Bram Moolenaar987411d2019-01-18 22:48:34 +0100217#endif
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200218
219/*
220 * Get the crypt method for buffer "buf" as a number.
221 */
222 int
Bram Moolenaar7454a062016-01-30 15:14:10 +0100223crypt_get_method_nr(buf_T *buf)
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200224{
225 return crypt_method_nr_from_name(*buf->b_p_cm == NUL ? p_cm : buf->b_p_cm);
226}
227
228/*
229 * Return TRUE when the buffer uses an encryption method that encrypts the
230 * whole undo file, not only the text.
231 */
232 int
Bram Moolenaar7454a062016-01-30 15:14:10 +0100233crypt_whole_undofile(int method_nr)
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200234{
235 return cryptmethods[method_nr].whole_undofile;
236}
237
238/*
Bram Moolenaar32aa1022019-11-02 22:54:41 +0100239 * Get crypt method specific length of the file header in bytes.
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200240 */
241 int
Bram Moolenaar7454a062016-01-30 15:14:10 +0100242crypt_get_header_len(int method_nr)
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200243{
244 return CRYPT_MAGIC_LEN
245 + cryptmethods[method_nr].salt_len
246 + cryptmethods[method_nr].seed_len;
247}
248
Christian Brabandt226b28b2021-06-21 21:08:08 +0200249
250/*
251 * Get maximum crypt method specific length of the file header in bytes.
252 */
253 int
254crypt_get_max_header_len()
255{
256 int i;
257 int max = 0;
258 int temp = 0;
259
260 for (i = 0; i < CRYPT_M_COUNT; ++i)
261 {
262 temp = crypt_get_header_len(i);
263 if (temp > max)
264 max = temp;
265 }
266 return max;
267}
268
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200269/*
270 * Set the crypt method for buffer "buf" to "method_nr" using the int value as
271 * returned by crypt_method_nr_from_name().
272 */
273 void
Bram Moolenaar7454a062016-01-30 15:14:10 +0100274crypt_set_cm_option(buf_T *buf, int method_nr)
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200275{
276 free_string_option(buf->b_p_cm);
277 buf->b_p_cm = vim_strsave((char_u *)cryptmethods[method_nr].name);
278}
279
280/*
281 * If the crypt method for the current buffer has a self-test, run it and
282 * return OK/FAIL.
283 */
284 int
Bram Moolenaar7454a062016-01-30 15:14:10 +0100285crypt_self_test(void)
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200286{
287 int method_nr = crypt_get_method_nr(curbuf);
288
289 if (cryptmethods[method_nr].self_test_fn == NULL)
290 return OK;
291 return cryptmethods[method_nr].self_test_fn();
292}
293
294/*
295 * Allocate a crypt state and initialize it.
Bram Moolenaar6ee96582019-04-27 22:06:37 +0200296 * Return NULL for failure.
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200297 */
298 cryptstate_T *
Bram Moolenaar7454a062016-01-30 15:14:10 +0100299crypt_create(
300 int method_nr,
301 char_u *key,
302 char_u *salt,
303 int salt_len,
304 char_u *seed,
305 int seed_len)
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200306{
Bram Moolenaarc799fe22019-05-28 23:08:19 +0200307 cryptstate_T *state = ALLOC_ONE(cryptstate_T);
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200308
Bram Moolenaar6ee96582019-04-27 22:06:37 +0200309 if (state == NULL)
310 return state;
311
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200312 state->method_nr = method_nr;
Bram Moolenaar6ee96582019-04-27 22:06:37 +0200313 if (cryptmethods[method_nr].init_fn(
Christian Brabandtf573c6e2021-06-20 14:02:16 +0200314 state, key, salt, salt_len, seed, seed_len) == FAIL)
Bram Moolenaar6ee96582019-04-27 22:06:37 +0200315 {
316 vim_free(state);
317 return NULL;
318 }
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200319 return state;
320}
321
322/*
323 * Allocate a crypt state from a file header and initialize it.
324 * Assumes that header contains at least the number of bytes that
325 * crypt_get_header_len() returns for "method_nr".
326 */
327 cryptstate_T *
Bram Moolenaar7454a062016-01-30 15:14:10 +0100328crypt_create_from_header(
329 int method_nr,
330 char_u *key,
331 char_u *header)
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200332{
333 char_u *salt = NULL;
334 char_u *seed = NULL;
335 int salt_len = cryptmethods[method_nr].salt_len;
336 int seed_len = cryptmethods[method_nr].seed_len;
337
338 if (salt_len > 0)
339 salt = header + CRYPT_MAGIC_LEN;
340 if (seed_len > 0)
341 seed = header + CRYPT_MAGIC_LEN + salt_len;
342
343 return crypt_create(method_nr, key, salt, salt_len, seed, seed_len);
344}
345
346/*
347 * Read the crypt method specific header data from "fp".
348 * Return an allocated cryptstate_T or NULL on error.
349 */
350 cryptstate_T *
Bram Moolenaar7454a062016-01-30 15:14:10 +0100351crypt_create_from_file(FILE *fp, char_u *key)
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200352{
353 int method_nr;
354 int header_len;
355 char magic_buffer[CRYPT_MAGIC_LEN];
356 char_u *buffer;
357 cryptstate_T *state;
358
359 if (fread(magic_buffer, CRYPT_MAGIC_LEN, 1, fp) != 1)
360 return NULL;
361 method_nr = crypt_method_nr_from_magic(magic_buffer, CRYPT_MAGIC_LEN);
362 if (method_nr < 0)
363 return NULL;
364
365 header_len = crypt_get_header_len(method_nr);
366 if ((buffer = alloc(header_len)) == NULL)
367 return NULL;
368 mch_memmove(buffer, magic_buffer, CRYPT_MAGIC_LEN);
369 if (header_len > CRYPT_MAGIC_LEN
370 && fread(buffer + CRYPT_MAGIC_LEN,
371 header_len - CRYPT_MAGIC_LEN, 1, fp) != 1)
372 {
373 vim_free(buffer);
374 return NULL;
375 }
376
377 state = crypt_create_from_header(method_nr, key, buffer);
378 vim_free(buffer);
379 return state;
380}
381
382/*
383 * Allocate a cryptstate_T for writing and initialize it with "key".
384 * Allocates and fills in the header and stores it in "header", setting
385 * "header_len". The header may include salt and seed, depending on
386 * cryptmethod. Caller must free header.
387 * Returns the state or NULL on failure.
388 */
389 cryptstate_T *
Bram Moolenaar7454a062016-01-30 15:14:10 +0100390crypt_create_for_writing(
391 int method_nr,
392 char_u *key,
393 char_u **header,
394 int *header_len)
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200395{
396 int len = crypt_get_header_len(method_nr);
397 char_u *salt = NULL;
398 char_u *seed = NULL;
399 int salt_len = cryptmethods[method_nr].salt_len;
400 int seed_len = cryptmethods[method_nr].seed_len;
401 cryptstate_T *state;
402
403 *header_len = len;
404 *header = alloc(len);
405 if (*header == NULL)
406 return NULL;
407
408 mch_memmove(*header, cryptmethods[method_nr].magic, CRYPT_MAGIC_LEN);
409 if (salt_len > 0 || seed_len > 0)
410 {
411 if (salt_len > 0)
412 salt = *header + CRYPT_MAGIC_LEN;
413 if (seed_len > 0)
414 seed = *header + CRYPT_MAGIC_LEN + salt_len;
415
Bram Moolenaarc667da52019-11-30 20:52:27 +0100416 // TODO: Should this be crypt method specific? (Probably not worth
417 // it). sha2_seed is pretty bad for large amounts of entropy, so make
418 // that into something which is suitable for anything.
Christian Brabandtf573c6e2021-06-20 14:02:16 +0200419#ifdef FEAT_SODIUM
420 if (sodium_init() >= 0)
421 {
Christian Brabandt226b28b2021-06-21 21:08:08 +0200422 if (salt_len > 0)
423 randombytes_buf(salt, salt_len);
424 if (seed_len > 0)
425 randombytes_buf(seed, seed_len);
Christian Brabandtf573c6e2021-06-20 14:02:16 +0200426 }
427 else
428#endif
429 sha2_seed(salt, salt_len, seed, seed_len);
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200430 }
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200431 state = crypt_create(method_nr, key, salt, salt_len, seed, seed_len);
432 if (state == NULL)
Bram Moolenaard23a8232018-02-10 18:45:26 +0100433 VIM_CLEAR(*header);
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200434 return state;
435}
436
437/*
438 * Free the crypt state.
439 */
440 void
Bram Moolenaar7454a062016-01-30 15:14:10 +0100441crypt_free_state(cryptstate_T *state)
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200442{
Christian Brabandtf573c6e2021-06-20 14:02:16 +0200443#ifdef FEAT_SODIUM
444 if (state->method_nr == CRYPT_M_SOD)
445 {
Bram Moolenaar131530a2021-07-29 20:37:49 +0200446 sodium_munlock(((sodium_state_T *)state->method_state)->key,
447 crypto_box_SEEDBYTES);
Christian Brabandtf573c6e2021-06-20 14:02:16 +0200448 sodium_memzero(state->method_state, sizeof(sodium_state_T));
449 sodium_free(state->method_state);
450 }
451 else
452#endif
453 vim_free(state->method_state);
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200454 vim_free(state);
455}
456
Bram Moolenaar987411d2019-01-18 22:48:34 +0100457#ifdef CRYPT_NOT_INPLACE
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200458/*
459 * Encode "from[len]" and store the result in a newly allocated buffer, which
460 * is stored in "newptr".
461 * Return number of bytes in "newptr", 0 for need more or -1 on error.
462 */
463 long
Bram Moolenaar7454a062016-01-30 15:14:10 +0100464crypt_encode_alloc(
465 cryptstate_T *state,
466 char_u *from,
467 size_t len,
Christian Brabandtf573c6e2021-06-20 14:02:16 +0200468 char_u **newptr,
469 int last)
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200470{
471 cryptmethod_T *method = &cryptmethods[state->method_nr];
472
473 if (method->encode_buffer_fn != NULL)
Bram Moolenaarc667da52019-11-30 20:52:27 +0100474 // Has buffer function, pass through.
Christian Brabandtf573c6e2021-06-20 14:02:16 +0200475 return method->encode_buffer_fn(state, from, len, newptr, last);
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200476 if (len == 0)
Bram Moolenaarc667da52019-11-30 20:52:27 +0100477 // Not buffering, just return EOF.
Bram Moolenaar9b8f0212014-08-13 22:05:53 +0200478 return (long)len;
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200479
Christian Brabandtf573c6e2021-06-20 14:02:16 +0200480 *newptr = alloc(len + 50);
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200481 if (*newptr == NULL)
482 return -1;
Christian Brabandtf573c6e2021-06-20 14:02:16 +0200483 method->encode_fn(state, from, len, *newptr, last);
Bram Moolenaar9b8f0212014-08-13 22:05:53 +0200484 return (long)len;
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200485}
486
487/*
488 * Decrypt "ptr[len]" and store the result in a newly allocated buffer, which
489 * is stored in "newptr".
490 * Return number of bytes in "newptr", 0 for need more or -1 on error.
491 */
492 long
Bram Moolenaar7454a062016-01-30 15:14:10 +0100493crypt_decode_alloc(
494 cryptstate_T *state,
495 char_u *ptr,
496 long len,
Christian Brabandtf573c6e2021-06-20 14:02:16 +0200497 char_u **newptr,
498 int last)
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200499{
500 cryptmethod_T *method = &cryptmethods[state->method_nr];
501
502 if (method->decode_buffer_fn != NULL)
Bram Moolenaarc667da52019-11-30 20:52:27 +0100503 // Has buffer function, pass through.
Christian Brabandtf573c6e2021-06-20 14:02:16 +0200504 return method->decode_buffer_fn(state, ptr, len, newptr, last);
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200505
506 if (len == 0)
Bram Moolenaarc667da52019-11-30 20:52:27 +0100507 // Not buffering, just return EOF.
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200508 return len;
509
510 *newptr = alloc(len);
511 if (*newptr == NULL)
512 return -1;
Christian Brabandtf573c6e2021-06-20 14:02:16 +0200513 method->decode_fn(state, ptr, len, *newptr, last);
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200514 return len;
515}
Bram Moolenaar987411d2019-01-18 22:48:34 +0100516#endif
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200517
518/*
519 * Encrypting "from[len]" into "to[len]".
520 */
521 void
Bram Moolenaar7454a062016-01-30 15:14:10 +0100522crypt_encode(
523 cryptstate_T *state,
524 char_u *from,
525 size_t len,
Christian Brabandtf573c6e2021-06-20 14:02:16 +0200526 char_u *to,
527 int last)
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200528{
Christian Brabandtf573c6e2021-06-20 14:02:16 +0200529 cryptmethods[state->method_nr].encode_fn(state, from, len, to, last);
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200530}
531
Bram Moolenaar987411d2019-01-18 22:48:34 +0100532#if 0 // unused
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200533/*
534 * decrypting "from[len]" into "to[len]".
535 */
536 void
Bram Moolenaar7454a062016-01-30 15:14:10 +0100537crypt_decode(
538 cryptstate_T *state,
539 char_u *from,
540 size_t len,
Christian Brabandtf573c6e2021-06-20 14:02:16 +0200541 char_u *to,
542 int last)
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200543{
Christian Brabandtf573c6e2021-06-20 14:02:16 +0200544 cryptmethods[state->method_nr].decode_fn(state, from, len, to, last);
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200545}
Bram Moolenaar987411d2019-01-18 22:48:34 +0100546#endif
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200547
548/*
549 * Simple inplace encryption, modifies "buf[len]" in place.
550 */
551 void
Bram Moolenaar7454a062016-01-30 15:14:10 +0100552crypt_encode_inplace(
553 cryptstate_T *state,
554 char_u *buf,
Christian Brabandtf573c6e2021-06-20 14:02:16 +0200555 size_t len,
556 int last)
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200557{
Christian Brabandtf573c6e2021-06-20 14:02:16 +0200558 cryptmethods[state->method_nr].encode_inplace_fn(state, buf, len,
559 buf, last);
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200560}
561
562/*
563 * Simple inplace decryption, modifies "buf[len]" in place.
564 */
565 void
Bram Moolenaar7454a062016-01-30 15:14:10 +0100566crypt_decode_inplace(
567 cryptstate_T *state,
568 char_u *buf,
Christian Brabandtf573c6e2021-06-20 14:02:16 +0200569 size_t len,
570 int last)
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200571{
Christian Brabandtf573c6e2021-06-20 14:02:16 +0200572 cryptmethods[state->method_nr].decode_inplace_fn(state, buf, len,
573 buf, last);
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200574}
575
576/*
577 * Free an allocated crypt key. Clear the text to make sure it doesn't stay
578 * in memory anywhere.
579 */
580 void
Bram Moolenaar7454a062016-01-30 15:14:10 +0100581crypt_free_key(char_u *key)
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200582{
583 char_u *p;
584
585 if (key != NULL)
586 {
587 for (p = key; *p != NUL; ++p)
588 *p = 0;
589 vim_free(key);
590 }
591}
592
593/*
Bram Moolenaar3a0c9082014-11-12 15:15:42 +0100594 * Check the crypt method and give a warning if it's outdated.
595 */
596 void
Bram Moolenaar7454a062016-01-30 15:14:10 +0100597crypt_check_method(int method)
Bram Moolenaar3a0c9082014-11-12 15:15:42 +0100598{
599 if (method < CRYPT_M_BF2)
600 {
601 msg_scroll = TRUE;
Bram Moolenaar32526b32019-01-19 17:43:09 +0100602 msg(_("Warning: Using a weak encryption method; see :help 'cm'"));
Bram Moolenaar3a0c9082014-11-12 15:15:42 +0100603 }
Christian Brabandt226b28b2021-06-21 21:08:08 +0200604}
605
606#ifdef FEAT_SODIUM
607 static void
608crypt_check_swapfile_curbuf(void)
609{
610 int method = crypt_get_method_nr(curbuf);
Christian Brabandtf573c6e2021-06-20 14:02:16 +0200611 if (method == CRYPT_M_SOD)
612 {
613 // encryption uses padding and MAC, that does not work very well with
614 // swap and undo files, so disable them
615 mf_close_file(curbuf, TRUE); // remove the swap file
616 set_option_value((char_u *)"swf", 0, NULL, OPT_LOCAL);
Christian Brabandtf573c6e2021-06-20 14:02:16 +0200617 msg_scroll = TRUE;
Christian Brabandt8a4c8122021-07-25 14:36:05 +0200618 msg(_("Note: Encryption of swapfile not supported, disabling swap file"));
Christian Brabandtf573c6e2021-06-20 14:02:16 +0200619 }
Bram Moolenaar3a0c9082014-11-12 15:15:42 +0100620}
Christian Brabandt226b28b2021-06-21 21:08:08 +0200621#endif
Bram Moolenaar3a0c9082014-11-12 15:15:42 +0100622
623 void
Bram Moolenaar7454a062016-01-30 15:14:10 +0100624crypt_check_current_method(void)
Bram Moolenaar3a0c9082014-11-12 15:15:42 +0100625{
626 crypt_check_method(crypt_get_method_nr(curbuf));
627}
628
629/*
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200630 * Ask the user for a crypt key.
631 * When "store" is TRUE, the new key is stored in the 'key' option, and the
632 * 'key' option value is returned: Don't free it.
633 * When "store" is FALSE, the typed key is returned in allocated memory.
634 * Returns NULL on failure.
635 */
636 char_u *
Bram Moolenaar7454a062016-01-30 15:14:10 +0100637crypt_get_key(
638 int store,
Bram Moolenaarc667da52019-11-30 20:52:27 +0100639 int twice) // Ask for the key twice.
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200640{
641 char_u *p1, *p2 = NULL;
642 int round;
643
644 for (round = 0; ; ++round)
645 {
646 cmdline_star = TRUE;
647 cmdline_row = msg_row;
648 p1 = getcmdline_prompt(NUL, round == 0
649 ? (char_u *)_("Enter encryption key: ")
650 : (char_u *)_("Enter same key again: "), 0, EXPAND_NOTHING,
651 NULL);
652 cmdline_star = FALSE;
653
654 if (p1 == NULL)
655 break;
656
657 if (round == twice)
658 {
659 if (p2 != NULL && STRCMP(p1, p2) != 0)
660 {
Bram Moolenaar32526b32019-01-19 17:43:09 +0100661 msg(_("Keys don't match!"));
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200662 crypt_free_key(p1);
663 crypt_free_key(p2);
664 p2 = NULL;
Bram Moolenaarc667da52019-11-30 20:52:27 +0100665 round = -1; // do it again
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200666 continue;
667 }
668
669 if (store)
670 {
671 set_option_value((char_u *)"key", 0L, p1, OPT_LOCAL);
672 crypt_free_key(p1);
673 p1 = curbuf->b_p_key;
Christian Brabandt226b28b2021-06-21 21:08:08 +0200674#ifdef FEAT_SODIUM
675 crypt_check_swapfile_curbuf();
676#endif
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200677 }
678 break;
679 }
680 p2 = p1;
681 }
682
Bram Moolenaarc667da52019-11-30 20:52:27 +0100683 // since the user typed this, no need to wait for return
Christian Brabandt226b28b2021-06-21 21:08:08 +0200684 if (crypt_get_method_nr(curbuf) != CRYPT_M_SOD)
685 {
686 if (msg_didout)
687 msg_putchar('\n');
688 need_wait_return = FALSE;
689 msg_didout = FALSE;
690 }
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200691
692 crypt_free_key(p2);
693 return p1;
694}
695
696
697/*
698 * Append a message to IObuff for the encryption/decryption method being used.
699 */
700 void
Bram Moolenaar7454a062016-01-30 15:14:10 +0100701crypt_append_msg(
702 buf_T *buf)
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200703{
704 if (crypt_get_method_nr(buf) == 0)
705 STRCAT(IObuff, _("[crypted]"));
706 else
707 {
708 STRCAT(IObuff, "[");
709 STRCAT(IObuff, *buf->b_p_cm == NUL ? p_cm : buf->b_p_cm);
710 STRCAT(IObuff, "]");
711 }
712}
713
Christian Brabandtf573c6e2021-06-20 14:02:16 +0200714 int
715crypt_sodium_init(
716 cryptstate_T *state UNUSED,
717 char_u *key UNUSED,
718 char_u *salt UNUSED,
719 int salt_len UNUSED,
720 char_u *seed UNUSED,
721 int seed_len UNUSED)
722{
723# ifdef FEAT_SODIUM
724 // crypto_box_SEEDBYTES == crypto_secretstream_xchacha20poly1305_KEYBYTES
725 unsigned char dkey[crypto_box_SEEDBYTES]; // 32
726 sodium_state_T *sd_state;
Bram Moolenaar131530a2021-07-29 20:37:49 +0200727 int retval = 0;
Christian Brabandtf573c6e2021-06-20 14:02:16 +0200728
729 if (sodium_init() < 0)
730 return FAIL;
731
732 sd_state = (sodium_state_T *)sodium_malloc(sizeof(sodium_state_T));
733 sodium_memzero(sd_state, sizeof(sodium_state_T));
734
735 // derive a key from the password
736 if (crypto_pwhash(dkey, sizeof(dkey), (const char *)key, STRLEN(key), salt,
737 crypto_pwhash_OPSLIMIT_INTERACTIVE, crypto_pwhash_MEMLIMIT_INTERACTIVE,
738 crypto_pwhash_ALG_DEFAULT) != 0)
739 {
740 // out of memory
741 sodium_free(sd_state);
742 return FAIL;
743 }
744 memcpy(sd_state->key, dkey, crypto_box_SEEDBYTES);
Bram Moolenaar131530a2021-07-29 20:37:49 +0200745
746 retval += sodium_mlock(sd_state->key, crypto_box_SEEDBYTES);
747 retval += sodium_mlock(key, STRLEN(key));
748
749 if (retval < 0)
750 {
751 emsg(_(e_encryption_sodium_mlock_failed));
752 sodium_free(sd_state);
753 return FAIL;
754 }
Christian Brabandtf573c6e2021-06-20 14:02:16 +0200755 sd_state->count = 0;
756 state->method_state = sd_state;
757
758 return OK;
759# else
760 emsg(e_libsodium_not_built_in);
761 return FAIL;
762# endif
763}
764
765/*
766 * Encrypt "from[len]" into "to[len]".
767 * "from" and "to" can be equal to encrypt in place.
768 * Call needs to ensure that there is enough space in to (for the header)
769 */
Christian Brabandt226b28b2021-06-21 21:08:08 +0200770#if 0 // Currently unused
Christian Brabandtf573c6e2021-06-20 14:02:16 +0200771 void
772crypt_sodium_encode(
773 cryptstate_T *state UNUSED,
774 char_u *from UNUSED,
775 size_t len UNUSED,
776 char_u *to UNUSED,
777 int last UNUSED)
778{
779# ifdef FEAT_SODIUM
780 // crypto_box_SEEDBYTES == crypto_secretstream_xchacha20poly1305_KEYBYTES
781 sodium_state_T *sod_st = state->method_state;
782 unsigned char tag = last
783 ? crypto_secretstream_xchacha20poly1305_TAG_FINAL : 0;
784
785 if (sod_st->count == 0)
786 {
787 if (len <= crypto_secretstream_xchacha20poly1305_HEADERBYTES)
788 {
789 emsg(e_libsodium_cannot_encrypt_header);
790 return;
791 }
792 crypto_secretstream_xchacha20poly1305_init_push(&sod_st->state,
793 to, sod_st->key);
794 to += crypto_secretstream_xchacha20poly1305_HEADERBYTES;
795 }
796
797 if (sod_st->count && len <= crypto_secretstream_xchacha20poly1305_ABYTES)
798 {
799 emsg(e_libsodium_cannot_encrypt_buffer);
800 return;
801 }
802
803 crypto_secretstream_xchacha20poly1305_push(&sod_st->state, to, NULL,
804 from, len, NULL, 0, tag);
805
806 sod_st->count++;
807# endif
808}
Christian Brabandt226b28b2021-06-21 21:08:08 +0200809#endif
Christian Brabandtf573c6e2021-06-20 14:02:16 +0200810
Christian Brabandt226b28b2021-06-21 21:08:08 +0200811/*
Christian Brabandtf573c6e2021-06-20 14:02:16 +0200812 * Decrypt "from[len]" into "to[len]".
813 * "from" and "to" can be equal to encrypt in place.
814 */
Christian Brabandt226b28b2021-06-21 21:08:08 +0200815#if 0 // Currently unused
Christian Brabandtf573c6e2021-06-20 14:02:16 +0200816 void
817crypt_sodium_decode(
818 cryptstate_T *state UNUSED,
819 char_u *from UNUSED,
820 size_t len UNUSED,
821 char_u *to UNUSED,
822 int last UNUSED)
823{
824# ifdef FEAT_SODIUM
825 // crypto_box_SEEDBYTES == crypto_secretstream_xchacha20poly1305_KEYBYTES
826 sodium_state_T *sod_st = state->method_state;
827 unsigned char tag;
828 unsigned long long buf_len;
829 char_u *p1 = from;
830 char_u *p2 = to;
831 char_u *buf_out;
832
833 if (sod_st->count == 0
834 && len <= crypto_secretstream_xchacha20poly1305_HEADERBYTES)
835 {
836 emsg(e_libsodium_cannot_decrypt_header);
837 return;
838 }
839
840 buf_out = (char_u *)alloc(len);
841
842 if (buf_out == NULL)
843 {
844 emsg(e_libsodium_cannot_allocate_buffer);
845 return;
846 }
847 if (sod_st->count == 0)
848 {
849 if (crypto_secretstream_xchacha20poly1305_init_pull(
850 &sod_st->state, from, sod_st->key) != 0)
851 {
852 emsg(e_libsodium_decryption_failed_header_incomplete);
853 goto fail;
854 }
855
856 from += crypto_secretstream_xchacha20poly1305_HEADERBYTES;
857 len -= crypto_secretstream_xchacha20poly1305_HEADERBYTES;
858
859 if (p1 == p2)
860 to += crypto_secretstream_xchacha20poly1305_HEADERBYTES;
861 }
862
863 if (sod_st->count && len <= crypto_secretstream_xchacha20poly1305_ABYTES)
864 {
865 emsg(e_libsodium_cannot_decrypt_buffer);
Dominique Pellecb54bc62021-06-21 20:15:37 +0200866 goto fail;
Christian Brabandtf573c6e2021-06-20 14:02:16 +0200867 }
868 if (crypto_secretstream_xchacha20poly1305_pull(&sod_st->state,
869 buf_out, &buf_len, &tag, from, len, NULL, 0) != 0)
870 {
Dominique Pellecb54bc62021-06-21 20:15:37 +0200871 emsg(e_libsodium_decryption_failed);
Christian Brabandtf573c6e2021-06-20 14:02:16 +0200872 goto fail;
873 }
874 sod_st->count++;
875
876 if (tag == crypto_secretstream_xchacha20poly1305_TAG_FINAL && !last)
877 {
Dominique Pellecb54bc62021-06-21 20:15:37 +0200878 emsg(e_libsodium_decryption_failed_premature);
Christian Brabandtf573c6e2021-06-20 14:02:16 +0200879 goto fail;
880 }
881 if (p1 == p2)
882 mch_memmove(p2, buf_out, buf_len);
883
884fail:
885 vim_free(buf_out);
886# endif
887}
Christian Brabandt226b28b2021-06-21 21:08:08 +0200888#endif
Christian Brabandtf573c6e2021-06-20 14:02:16 +0200889
890/*
891 * Encrypt "from[len]" into "to[len]".
892 * "from" and "to" can be equal to encrypt in place.
893 */
894 long
895crypt_sodium_buffer_encode(
896 cryptstate_T *state UNUSED,
897 char_u *from UNUSED,
898 size_t len UNUSED,
899 char_u **buf_out UNUSED,
900 int last UNUSED)
901{
902# ifdef FEAT_SODIUM
903 // crypto_box_SEEDBYTES == crypto_secretstream_xchacha20poly1305_KEYBYTES
904 unsigned long long out_len;
905 char_u *ptr;
906 unsigned char tag = last
907 ? crypto_secretstream_xchacha20poly1305_TAG_FINAL : 0;
908 int length;
909 sodium_state_T *sod_st = state->method_state;
910 int first = (sod_st->count == 0);
911
Christian Brabandt226b28b2021-06-21 21:08:08 +0200912 length = (int)len + crypto_secretstream_xchacha20poly1305_ABYTES
Christian Brabandtf573c6e2021-06-20 14:02:16 +0200913 + (first ? crypto_secretstream_xchacha20poly1305_HEADERBYTES : 0);
914 *buf_out = alloc_clear(length);
915 if (*buf_out == NULL)
916 {
917 emsg(e_libsodium_cannot_allocate_buffer);
918 return -1;
919 }
920 ptr = *buf_out;
921
922 if (first)
923 {
924 crypto_secretstream_xchacha20poly1305_init_push(&sod_st->state,
925 ptr, sod_st->key);
926 ptr += crypto_secretstream_xchacha20poly1305_HEADERBYTES;
927 }
928
929 crypto_secretstream_xchacha20poly1305_push(&sod_st->state, ptr,
930 &out_len, from, len, NULL, 0, tag);
931
932 sod_st->count++;
933 return out_len + (first
934 ? crypto_secretstream_xchacha20poly1305_HEADERBYTES : 0);
935# else
936 return -1;
937# endif
938}
939
940/*
941 * Decrypt "from[len]" into "to[len]".
942 * "from" and "to" can be equal to encrypt in place.
943 */
944 long
945crypt_sodium_buffer_decode(
946 cryptstate_T *state UNUSED,
947 char_u *from UNUSED,
948 size_t len UNUSED,
949 char_u **buf_out UNUSED,
950 int last UNUSED)
951{
952# ifdef FEAT_SODIUM
953 // crypto_box_SEEDBYTES == crypto_secretstream_xchacha20poly1305_KEYBYTES
954 sodium_state_T *sod_st = state->method_state;
955 unsigned char tag;
956 unsigned long long out_len;
957 *buf_out = alloc_clear(len);
958 if (*buf_out == NULL)
959 {
960 emsg(e_libsodium_cannot_allocate_buffer);
961 return -1;
962 }
963
964 if (sod_st->count == 0)
965 {
966 if (crypto_secretstream_xchacha20poly1305_init_pull(&sod_st->state,
967 from, sod_st->key) != 0)
968 {
969 emsg(e_libsodium_decryption_failed_header_incomplete);
970 return -1;
971 }
972 from += crypto_secretstream_xchacha20poly1305_HEADERBYTES;
973 len -= crypto_secretstream_xchacha20poly1305_HEADERBYTES;
974 sod_st->count++;
975 }
976 if (crypto_secretstream_xchacha20poly1305_pull(&sod_st->state,
977 *buf_out, &out_len, &tag, from, len, NULL, 0) != 0)
978 {
Dominique Pellecb54bc62021-06-21 20:15:37 +0200979 emsg(e_libsodium_decryption_failed);
Christian Brabandtf573c6e2021-06-20 14:02:16 +0200980 return -1;
981 }
982
983 if (tag == crypto_secretstream_xchacha20poly1305_TAG_FINAL && !last)
Dominique Pellecb54bc62021-06-21 20:15:37 +0200984 emsg(e_libsodium_decryption_failed_premature);
Christian Brabandtf573c6e2021-06-20 14:02:16 +0200985 return (long) out_len;
986# else
987 return -1;
988# endif
989}
990
Bram Moolenaarc667da52019-11-30 20:52:27 +0100991#endif // FEAT_CRYPT