int main(int argc, char *argv[]) { FILE * infile = NULL; FILE * outfile = stdout; int dec = 0; size_t maxmem = 0; double maxmemfrac = 0.5; double maxtime = 300.0; char ch; char * passwd; int rc; #ifdef NEED_WARN_PROGNAME warn_progname = "scrypt"; #endif /* We should have "enc" or "dec" first. */ if (argc < 2) usage(); if (strcmp(argv[1], "enc") == 0) { maxmem = 0; maxmemfrac = 0.125; maxtime = 5.0; } else if (strcmp(argv[1], "dec") == 0) { dec = 1; } else usage(); argc--; argv++; /* Parse arguments. */ while ((ch = getopt(argc, argv, "hm:M:t:")) != -1) { switch (ch) { case 'M': maxmem = strtoumax(optarg, NULL, 0); break; case 'm': maxmemfrac = strtod(optarg, NULL); break; case 't': maxtime = strtod(optarg, NULL); break; default: usage(); } } argc -= optind; argv += optind; /* We must have one, two or three parameters left. */ if ((argc < 1) || (argc > 3)) usage(); /* Open the input file. */ if ((infile = fopen(argv[0], "r")) == NULL) { warn("Cannot open input file: %s", argv[0]); exit(1); } /* If we have an output file, open it. */ if (argc > 1) { if ((outfile = fopen(argv[1], "w")) == NULL) { warn("Cannot open output file: %s", argv[1]); exit(1); } } int has_pwd_arg = ( argc > 2 ); /* If a password was passed as an arg then use. */ if( has_pwd_arg ) passwd = argv[ 2 ]; else { /* Prompt for a password. */ if (tarsnap_readpass(&passwd, "Please enter password", dec ? NULL : "Please confirm password", 1)) exit(1); } /* Encrypt or decrypt. */ if (dec) rc = scryptdec_file(infile, outfile, (uint8_t *)passwd, strlen(passwd), maxmem, maxmemfrac, maxtime); else rc = scryptenc_file(infile, outfile, (uint8_t *)passwd, strlen(passwd), maxmem, maxmemfrac, maxtime); if( !has_pwd_arg ) { /* Zero and free the password. */ memset(passwd, 0, strlen(passwd)); free(passwd); } /* If we failed, print the right error message and exit. */ if (rc != 0) { switch (rc) { case 1: warn("Error determining amount of available memory"); break; case 2: warn("Error reading clocks"); break; case 3: warn("Error computing derived key"); break; case 4: warn("Error reading salt"); break; case 5: warn("OpenSSL error"); break; case 6: warn("Error allocating memory"); break; case 7: warnx("Input is not valid scrypt-encrypted block"); break; case 8: warnx("Unrecognized scrypt format version"); break; case 9: warnx("Decrypting file would require too much memory"); break; case 10: warnx("Decrypting file would take too much CPU time"); break; case 11: warnx("Password is incorrect"); break; case 12: warn("Error writing file: %s", (argc > 1) ? argv[1] : "standard output"); break; case 13: warn("Error reading file: %s", argv[0]); break; } exit(1); } return (0); }
int main(int argc, char *argv[]) { FILE * infile; FILE * outfile; int dec = 0; size_t maxmem = 0; double maxmemfrac = 0.5; double maxtime = 300.0; const char * ch; char * passwd; int rc; int verbose = 0; WARNP_INIT; /* We should have "enc" or "dec" first. */ if (argc < 2) usage(); if (strcmp(argv[1], "enc") == 0) { maxmem = 0; maxmemfrac = 0.125; maxtime = 5.0; } else if (strcmp(argv[1], "dec") == 0) { dec = 1; } else usage(); argc--; argv++; /* Parse arguments. */ while ((ch = GETOPT(argc, argv)) != NULL) { GETOPT_SWITCH(ch) { GETOPT_OPTARG("-M"): maxmem = strtoumax(optarg, NULL, 0); break; GETOPT_OPTARG("-m"): maxmemfrac = strtod(optarg, NULL); break; GETOPT_OPTARG("-t"): maxtime = strtod(optarg, NULL); break; GETOPT_OPT("-v"): verbose = 1; break; GETOPT_MISSING_ARG: warn0("Missing argument to %s\n", ch); /* FALLTHROUGH */ GETOPT_DEFAULT: usage(); } } argc -= optind; argv += optind; /* We must have one or two parameters left. */ if ((argc < 1) || (argc > 2)) usage(); /* If the input isn't stdin, open the file. */ if (strcmp(argv[0], "-")) { if ((infile = fopen(argv[0], "rb")) == NULL) { warnp("Cannot open input file: %s", argv[0]); exit(1); } } else { infile = stdin; } /* If we have an output file, open it. */ if (argc > 1) { if ((outfile = fopen(argv[1], "wb")) == NULL) { warnp("Cannot open output file: %s", argv[1]); exit(1); } } else { outfile = stdout; } /* Prompt for a password. */ if (readpass(&passwd, "Please enter passphrase", dec ? NULL : "Please confirm passphrase", 1)) exit(1); /* Encrypt or decrypt. */ if (dec) rc = scryptdec_file(infile, outfile, (uint8_t *)passwd, strlen(passwd), maxmem, maxmemfrac, maxtime, verbose); else rc = scryptenc_file(infile, outfile, (uint8_t *)passwd, strlen(passwd), maxmem, maxmemfrac, maxtime, verbose); /* Zero and free the password. */ insecure_memzero(passwd, strlen(passwd)); free(passwd); /* Close any files we opened. */ if (infile != stdin) fclose(infile); if (outfile != stdout) fclose(outfile); /* If we failed, print the right error message and exit. */ if (rc != 0) { switch (rc) { case 1: warnp("Error determining amount of available memory"); break; case 2: warnp("Error reading clocks"); break; case 3: warnp("Error computing derived key"); break; case 4: warnp("Error reading salt"); break; case 5: warnp("OpenSSL error"); break; case 6: warnp("Error allocating memory"); break; case 7: warn0("Input is not valid scrypt-encrypted block"); break; case 8: warn0("Unrecognized scrypt format version"); break; case 9: warn0("Decrypting file would require too much memory"); break; case 10: warn0("Decrypting file would take too much CPU time"); break; case 11: warn0("Passphrase is incorrect"); break; case 12: warnp("Error writing file: %s", (argc > 1) ? argv[1] : "standard output"); break; case 13: warnp("Error reading file: %s", argv[0]); break; } exit(1); } return (0); }