/usr/include/ncbi-vdb/krypto/encfile-priv.h is in libncbi-vdb-dev 2.8.1+dfsg-2.
This file is owned by root:root, with mode 0o644.
The actual contents of the file can be viewed below.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 | /*===========================================================================
*
* PUBLIC DOMAIN NOTICE
* National Center for Biotechnology Information
*
* This software/database is a "United States Government Work" under the
* terms of the United States Copyright Act. It was written as part of
* the author's official duties as a United States Government employee and
* thus cannot be copyrighted. This software/database is freely available
* to the public for use. The National Library of Medicine and the U.S.
* Government have not placed any restriction on its use or reproduction.
*
* Although all reasonable efforts have been taken to ensure the accuracy
* and reliability of the software and data, the NLM and the U.S.
* Government do not and cannot warrant the performance or results that
* may be obtained by using this software or data. The NLM and the U.S.
* Government disclaim all warranties, express or implied, including
* warranties of performance, merchantability or fitness for any particular
* purpose.
*
* Please cite the author in any work or product based on this material.
*
* ===========================================================================
*
*/
#ifndef _h_krypto_encfile_priv_
#define _h_krypto_encfile_priv_
#ifndef _h_krypto_extern_
#include <krypto/extern.h>
#endif
#ifndef _h_klib_defs_
#include <klib/defs.h>
#endif
#include <krypto/encfile.h>
#ifdef __cplusplus
extern "C" {
#endif
#define DEBUG_STS(msg) DBGMSG(DBG_KRYPTO,DBG_FLAG(DBG_KRYPTO_STS),msg)
#define DEBUG_CFG(msg) DBGMSG(DBG_KRYPTO,DBG_FLAG(DBG_KRYPTO_CFG_,msg)
#define DEBUG_ENCRYPT(msg) DBGMSG(DBG_KRYPTO,DBG_FLAG(DBG_KRYPTO_ENCRYPT),msg)
#define DEBUG_DECRYPT(msg) DBGMSG(DBG_KRYPTO,DBG_FLAG(DBG_KRYPTO_DECRYPT),msg)
/* -----
* Encrypted file structure:
* - File Header
* - zero or more data blocks
* - file footer
*
* File Header:
* - file signature "NCBInenc"
* - byte order flag
* - version
*
* Data Block:
* - rkey - randomly generated 32 byte key for this block (encrypted using user key)
* - encrypted block of 32768 bytes size above says how many are really used (encrypted using rkey and salt above)
* - block-offset + (valid bytes in block % 32768)
* - crc-32 (includes phantom block start offset as initial seed)
*
* File Footer:
* - footer signature "foot"
* - checksum of crcs
*/
/* ----------------------------------------------------------------------
* Header - the file header
* all constant values for the first version
*/
typedef char KEncFileSig [8];
typedef uint32_t Endian_t;
typedef uint32_t KEncFileVersion;
typedef struct KEncFileHeader KEncFileHeader;
struct KEncFileHeader
{
KEncFileSig file_sig; /* "NCBInenc" or "NCBIkenc" */
Endian_t byte_order; /* do we byte swap on read? */
KEncFileVersion version; /* simple incrementation starting at 1 */
};
/* ----------------------------------------------------------------------
* KEncFileBlock
* The body of the file is blocks containing a portion of the decrypted
* file. These are an ordered sequence with the last block being the
* same size as the rest but with only some of the data portion being
* a part of the file.
*
* An encrypted file is longer than an unencrypted file by
* a constant: the lengths of the header and the footer
* proportionally by the length of the block key and crc
*/
/* -----
* Key the header for an encrypted block
*
* when initialized the first 38 bytes should be set to random data.
* valid is a count of how many bytes in the block are valid data
* offset is the offset of this block with in the decrypted file
*/
typedef uint8_t KEncFileKey [32];
/* -----
* We sized the data portion of a block to match the KPageFile
* structure allowing a KBufFile in front of a KEncFile to
* operate in a fairly efficient manner
*/
#define ENC_DATA_BLOCK_SIZE (32*1024)
typedef uint8_t KEncFileData [ENC_DATA_BLOCK_SIZE];
typedef uint16_t KEncFileOffValid;
typedef uint64_t KEncFileBlockId;
typedef uint16_t KEncFileBlockValid;
/* -----
* we use the same 32 bit CRC as the rest of the project
*/
typedef uint32_t KEncFileCRC;
/*
* NOTE:
* The size of data + u + id + crc + crc_copy must remain divisible
* by the size of key
*/
typedef struct KEncFileBlock KEncFileBlock;
struct KEncFileBlock
{
KEncFileKey key; /* encrypted with the user key */
KEncFileData data; /* encrypted with block key */
union
{
KEncFileBlockValid valid; /* obscured and encrypted */
uint8_t bytes [16]; /* mostly fill */
} u;
KEncFileBlockId id; /* plain text */
KEncFileCRC crc; /* plain text */
KEncFileCRC crc_copy; /* plain text */
};
/* ----------------------------------------------------------------------
* Foot - the ending of an encrypted file:
* these are in plan text for non-decryption validation of the whole file
*
* In Version 1 the crc_checksum is required.
* In Version 2 the crc_checksum is optional - if 0 it is not computed.
*/
typedef uint64_t KEncFileFooter_t;
typedef struct KEncFileFooter KEncFileFooter;
struct KEncFileFooter
{
KEncFileFooter_t block_count; /* how many blocks do we have? */
KEncFileFooter_t crc_checksum; /* sum of crcs of all blocks */
};
/* ----------
* Read mode is fully seekable if the underlying KFile is seekable some
* integrity checking will not be performed in allowing this seeking.
*/
KRYPTO_EXTERN rc_t CC KEncFileMakeRead_v1 (const struct KFile ** pself,
const struct KFile * encrypted_input,
const struct KKey * key);
KRYPTO_EXTERN rc_t CC KEncFileMakeRead_v2 (const struct KFile ** pself,
const struct KFile * encrypted_input,
const struct KKey * key);
/* ----------
* Write mode encrypted file can only be written straight through from the
* first byte to the last.
*/
KRYPTO_EXTERN rc_t CC KEncFileMakeWrite_v1 (struct KFile ** pself,
struct KFile * encrypted_output,
const struct KKey * key);
KRYPTO_EXTERN rc_t CC KEncFileMakeWrite_v2 (struct KFile ** pself,
struct KFile * encrypted_output,
const struct KKey * key);
/* ----------
* Update mode is read/write mode where seeking within the file is allowed.
*
* NOTE this is in the private interface because it is not actually working
* yet.
*/
KRYPTO_EXTERN rc_t CC KEncFileMakeUpdate_v1 (struct KFile ** pself,
struct KFile * encrypted,
const struct KKey * key);
KRYPTO_EXTERN rc_t CC KEncFileMakeUpdate_v2 (struct KFile ** pself,
struct KFile * encrypted,
const struct KKey * key);
/* ----------
* Validate mode can not be read or written.
* Upon open the whole file is read from beginning to end and all CRC
* and other integrity checks are performed immediately
*/
KRYPTO_EXTERN rc_t CC KEncFileValidate_v1 (const struct KFile * encrypted);
KRYPTO_EXTERN rc_t CC KEncFileValidate_v2 (const struct KFile * encrypted);
/* ----------
* Identify whether a file is a KEncFile type encrypted file by the header.
* read the header into a buffer and pass it into this function.
* The buffer_size needs to be at least 8 but more bytes lead to a better
* check up to the size of the header of a KEncFile type encrypted file.
* As the header may change in the future (in a backwards compatible way)
* that size might change from the current 16.
*
* Possible returns:
* 0:
* the file is an identified KEncFile type file. False positives are
* possible if a file happens to match at 8 or more bytes
*
* RC (rcFS, rcFile, rcIdentifying, rcFile, rcWrongType)
* the file is definitely not a KEncFIle type encrypted file.
*
* RC (rcFS, rcFile, rcIdentifying, rcParam, rcNull)
* bad parameters in the call
*
* RC (rcFS, rcFile, rcIdentifying, rcBuffer, rcInsufficient)
* not a large enough buffer to make an identification
*/
KRYPTO_EXTERN rc_t CC KFileIsEnc_v1 (const char * buffer, size_t buffer_size);
KRYPTO_EXTERN rc_t CC KFileIsEnc_v2 (const char * buffer, size_t buffer_size);
#ifdef __cplusplus
}
#endif
#endif /* _h_krypto_encfile_priv_ */
|