1
0
Fork 0
mirror of https://github.com/HACKERALERT/Picocrypt.git synced 2024-12-29 10:53:03 +00:00

Finalize v1.22

This commit is contained in:
Evan Su 2021-12-22 11:56:33 -05:00 committed by GitHub
parent 8f183b6f95
commit 82c21b2986
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23

View file

@ -1,8 +1,8 @@
package main
/*
Picocrypt v1.21
Picocrypt v1.22
Copyright (c) Evan Su (https://evansu.cc)
Released under a GNU GPL v3 License
https://github.com/HACKERALERT/Picocrypt
@ -45,7 +45,7 @@ import (
"crypto/sha256"
"crypto/subtle"
"github.com/HACKERALERT/serpent"
"github.com/HACKERALERT/serpent" //v0.0.0-20210716182301-293b29869c66
"golang.org/x/crypto/argon2"
"golang.org/x/crypto/blake2b"
"golang.org/x/crypto/blake2s"
@ -54,16 +54,16 @@ import (
"golang.org/x/crypto/sha3"
// UI
"github.com/HACKERALERT/giu"
"github.com/HACKERALERT/giu" //v0.5.7-0.20211216020632-65de69857557
// Reed-Solomon
"github.com/HACKERALERT/infectious"
"github.com/HACKERALERT/infectious" //v0.0.0-20211215232025-9d20874ad4b1
// Helpers
"github.com/HACKERALERT/clipboard"
"github.com/HACKERALERT/dialog"
"github.com/HACKERALERT/jibber_jabber"
"github.com/HACKERALERT/zxcvbn-go"
"github.com/HACKERALERT/clipboard" //v0.1.5-0.20211215214929-7345ba96aeca
"github.com/HACKERALERT/dialog" //v0.0.0-20211215220206-17f428aa513e
"github.com/HACKERALERT/jibber_jabber" //v0.0.0-20211215234401-c23e432f628b
"github.com/HACKERALERT/zxcvbn-go" //v0.0.0-20210927200100-f131a4666ad5
)
//go:embed icon.png
@ -92,7 +92,7 @@ var languages = []string{
var languageSelected int32
// Generic variables
var version = "v1.21"
var version = "v1.22"
var window *giu.MasterWindow
var windowOptimized bool
var dpi float32
@ -139,7 +139,6 @@ var metadataPrompt = "Metadata:"
var metadataDisabled bool
// Advanced options
var fast bool
var paranoid bool
var reedsolo bool
var deleteWhenDone bool
@ -174,7 +173,6 @@ var showConfirmation bool
// Reed-Solomon encoders
var rs1, _ = infectious.NewFEC(1, 3) // 1 data shard, 3 total -> 2 parity shards
var rs5, _ = infectious.NewFEC(5, 15)
var rs6, _ = infectious.NewFEC(6, 18)
var rs16, _ = infectious.NewFEC(16, 48)
var rs24, _ = infectious.NewFEC(24, 72)
var rs32, _ = infectious.NewFEC(32, 96)
@ -182,6 +180,7 @@ var rs64, _ = infectious.NewFEC(64, 192)
var rs128, _ = infectious.NewFEC(128, 136)
// File checksum generator variables
var csProgress float32
var csMd5 string
var csSha1 string
var csSha256 string
@ -195,7 +194,6 @@ var sha256Color = color.RGBA{0x00, 0x00, 0x00, 0x00}
var sha3Color = color.RGBA{0x00, 0x00, 0x00, 0x00}
var blake2bColor = color.RGBA{0x00, 0x00, 0x00, 0x00}
var blake2sColor = color.RGBA{0x00, 0x00, 0x00, 0x00}
var csProgress float32 = 0
var md5Selected = true
var sha1Selected = true
var sha256Selected = true
@ -542,21 +540,19 @@ func draw() {
giu.Label(s("Advanced:")),
giu.Custom(func() {
if mode != "decrypt" {
giu.Row(
giu.Checkbox(s("Use fast mode"), &fast),
giu.Dummy(-221, 0),
giu.Checkbox(s("Encode with Reed-Solomon"), &reedsolo),
).Build()
giu.Row(
giu.Checkbox(s("Use paranoid mode"), &paranoid),
giu.Dummy(-221, 0),
giu.Checkbox(s("Delete files when complete"), &deleteWhenDone),
giu.Checkbox(s("Encode with Reed-Solomon"), &reedsolo),
).Build()
giu.Row(
giu.Style().SetDisabled(!(len(allFiles) > 1 || len(onlyFolders) > 0)).To(
giu.Checkbox(s("Compress files"), &compress),
),
giu.Dummy(-221, 0),
giu.Checkbox(s("Delete files when complete"), &deleteWhenDone),
).Build()
giu.Row(
giu.Checkbox(s("Split every"), &split),
giu.InputText(&splitSize).Size(55/dpi).Flags(giu.InputTextFlagsCharsHexadecimal).OnChange(func() {
split = splitSize != ""
@ -865,19 +861,18 @@ func draw() {
giu.Label(fmt.Sprintf(s("Picocrypt %s, created by Evan Su (https://evansu.cc/)."), version)),
giu.Label(s("Released under a GNU GPL v3 License.")),
giu.Label(s("A warm thank you to all the people listed below.")),
giu.Label(s("Patrons:")),
giu.Label(" - Frederick Doe"),
giu.Label(s("Donators:")),
giu.Label(s("Donors:")),
giu.Label(" - jp26"),
giu.Label(" - Tybbs"),
giu.Label(" - W.Graham"),
giu.Label(" - N. Chin"),
giu.Label(" - Manjot"),
giu.Label(" - Phil P."),
giu.Label(" - E. Zahard"),
giu.Label(s("Translators:")),
giu.Label("umitseyhan75, digitalblossom, zeeaall, francirc, kurpau"),
giu.Label(s("Other:")),
giu.Label("Fuderal, u/greenreddits, u/Tall_Escape, u/NSABackdoors"),
giu.Label("umitseyhan75, digitalblossom, zeeaall, kurpau, francirc, yn, Etim-Orb").Wrapped(true),
giu.Label(s("Others:")),
giu.Label("Fuderal, u/greenreddits, u/Tall_Escape, u/NSABackdoors, @samuel-lucas6").Wrapped(true),
),
).Build()
}),
@ -1047,23 +1042,23 @@ func onDrop(names []string) {
metadata = s("Metadata is corrupted.")
}
flags := make([]byte, 18)
flags := make([]byte, 15)
fin.Read(flags)
fin.Close()
flags, err = rsDecode(rs6, flags)
flags, err = rsDecode(rs5, flags)
if err != nil {
mainStatus = "Input file is corrupt and cannot be decrypted."
mainStatusColor = color.RGBA{0xff, 0x00, 0x00, 0xff}
return
}
if flags[2] == 1 {
if flags[1] == 1 {
keyfile = true
keyfilePrompt = s("Keyfiles required.")
} else {
keyfilePrompt = s("Not applicable.")
}
if flags[5] == 1 {
if flags[2] == 1 {
keyfileOrderMatters = true
}
} else {
@ -1245,7 +1240,7 @@ func work() {
stat, _ := os.Stat(inputFile)
total := stat.Size()
if mode == "decrypt" {
total -= 789
total -= 786
}
// XChaCha20's max message size is 256 GiB
@ -1299,14 +1294,14 @@ func work() {
fout.Write(rsEncode(rs1, []byte{i}))
}
flags := make([]byte, 6)
if fast {
flags := make([]byte, 5)
if paranoid {
flags[0] = 1
}
if paranoid {
if len(keyfiles) > 0 {
flags[1] = 1
}
if len(keyfiles) > 0 {
if keyfileOrderMatters {
flags[2] = 1
}
if reedsolo {
@ -1315,10 +1310,7 @@ func work() {
if total%1048576 >= 1048448 {
flags[4] = 1
}
if keyfileOrderMatters {
flags[5] = 1
}
flags = rsEncode(rs6, flags)
flags = rsEncode(rs5, flags)
fout.Write(flags)
// Fill salts and nonce with Go's CSPRNG
@ -1377,11 +1369,10 @@ func work() {
fin.Read(make([]byte, metadataLength*3))
flags := make([]byte, 18)
flags := make([]byte, 15)
fin.Read(flags)
flags, err3 = rsDecode(rs6, flags)
fast = flags[0] == 1
paranoid = flags[1] == 1
flags, err3 = rsDecode(rs5, flags)
paranoid = flags[0] == 1
reedsolo = flags[3] == 1
padded = flags[4] == 1
@ -1434,16 +1425,7 @@ func work() {
// Derive encryption/decryption keys and subkeys
var key []byte
if fast {
key = argon2.IDKey(
[]byte(password),
salt,
4,
131072,
4,
32,
)
} else if paranoid {
if paranoid {
key = argon2.IDKey(
[]byte(password),
salt,
@ -1527,9 +1509,9 @@ func work() {
keyfileCorrect := true
var tmp bool
keyCorrect = !(subtle.ConstantTimeCompare(keyHash, _keyHash) == 0)
keyCorrect = subtle.ConstantTimeCompare(keyHash, _keyHash) != 0
if keyfile {
keyfileCorrect = !(subtle.ConstantTimeCompare(keyfileHash, _keyfileHash) == 0)
keyfileCorrect = subtle.ConstantTimeCompare(keyfileHash, _keyfileHash) != 0
tmp = !keyCorrect || !keyfileCorrect
} else {
tmp = !keyCorrect
@ -1586,12 +1568,12 @@ func work() {
subkey := make([]byte, 32)
hkdf := hkdf.New(sha3.New256, key, hkdfSalt, nil)
hkdf.Read(subkey)
if fast {
// Keyed BLAKE2b
mac, _ = blake2b.New512(subkey)
} else {
if paranoid {
// HMAC-SHA3
mac = hmac.New(sha3.New512, subkey)
} else {
// Keyed BLAKE2b
mac, _ = blake2b.New512(subkey)
}
// Generate another subkey and cipher (not used unless paranoid mode is checked)
@ -1757,7 +1739,7 @@ func work() {
if mode == "encrypt" {
// Seek back to header and write important data
fout.Seek(int64(312+len(metadata)*3), 0)
fout.Seek(int64(309+len(metadata)*3), 0)
fout.Write(rsEncode(rs64, keyHash))
fout.Write(rsEncode(rs32, keyfileHash))
fout.Write(rsEncode(rs64, mac.Sum(nil)))
@ -2032,7 +2014,6 @@ func resetUI() {
split = false
splitSize = ""
splitSelected = 1
fast = false
deleteWhenDone = false
paranoid = false
compress = false