Example #1
0
        public async Task ApplyDumpDebugData(string directory, string prefix)
        {
            var outputPath = Path.Combine(
                directory,
                $"{prefix}_{this.partitionId.ToString("N")}_{this.replicaId.ToString("X")}.txt");

            using (var file = File.OpenWrite(outputPath))
                using (var writer = new StreamWriter(file, Encoding.UTF8))
                    using (var mem = new MemoryStream())
                        using (var sha = new SHA512Managed())
                        {
                            sha.Initialize();
                            foreach (var entry in this.store)
                            {
                                var keyBytes = Encoding.UTF8.GetBytes(entry.Key);
                                mem.Write(keyBytes, 0, keyBytes.Length);
                                mem.Write(entry.Value, 0, entry.Value.Length);

                                await writer.WriteLineAsync($"{entry.Key} = {entry.Value.ToHexString()}");
                            }

                            mem.Seek(0, SeekOrigin.Begin);
                            var hash       = sha.ComputeHash(mem);
                            var hashString = $"HASH: {hash.ToHexString()}";
                            await writer.WriteLineAsync(hashString);

                            Debug.WriteLine(hashString);
                            ServiceEventSource.Current.Message(hashString);
                        }
        }
Example #2
0
    public static string Sha512(byte[] data)
    {
        byte[] hash;

        using (var sha = new SHA512Managed())
        {
            sha.Initialize();
            hash = sha.ComputeHash(data);
        }

        char[] chars = new char[hash.Length * 2];

        int j = 0;

        foreach (byte b in hash)
        {
            int nibble1 = (b & 0xF0) >> 4;
            int nibble2 = b & 0x0F;

            nibble1 += nibble1 > 9 ? 0x57 : 0x30;
            nibble2 += nibble2 > 9 ? 0x57 : 0x30;

            chars[j++] = (char)nibble1;
            chars[j++] = (char)nibble2;
        }

        return(new string(chars));
    }
Example #3
0
        private string Sha512Hash(string rawString)
        {
            var rawStringBytes = Encoding.Unicode.GetBytes(rawString);
            var hashProvider   = new SHA512Managed();

            hashProvider.Initialize();
            rawStringBytes = hashProvider.ComputeHash(rawStringBytes);
            hashProvider.Clear();
            return(Convert.ToBase64String(rawStringBytes));
        }
Example #4
0
            //
            public PRNG(byte[] random_state)
            {
                int total_len = random_state.Length;

                if (total_len % 64 != 0)
                {
                    throw new Exception("Random data must be divisible by the PRNG block size (64).");
                }
                initialRandomState = new byte[total_len];
                currentRandomState = new byte[total_len];
                Array.Copy(random_state, initialRandomState, total_len);
                Array.Copy(random_state, currentRandomState, total_len);
                currentIteration = 0;
                //
                sha = new SHA512Managed();
                sha.Initialize();
            }
Example #5
0
        /// <summary>
        /// Open the certificate store
        /// </summary>
        private SecretKeyStorage()
        {
            string secretKey = ConfigurationManager.AppSettings["SecretKey"];

            byte[] data = StringToByteArray(secretKey);

            if (null == secretKey || secretKey.Length % 2 == 1)
            {
                throw new Exception("No valid SecurEntity Secret Key found");
            }

            // Create a hash
            SHA512Managed sha = new SHA512Managed();

            sha.Initialize();
            sha.TransformBlock(data, 0, data.Length, data, 0);

            SecretKey = sha.Hash;
        }
        /// <summary>
        /// Given the user's password, generate a salt which will be mixed with the password
        /// when setting up the encryption parameters
        /// </summary>
        /// <param name="password">A string containing the user's password</param>
        /// <returns>An array of bytes containing the raw salt value</returns>
        private static byte[] GenerateSaltFromPassword(string password)
        {
            // Get the password as Unicode (UTF-8) bytes:
            byte[] salt = Encoding.UTF8.GetBytes(password);
            // Try to hash password multiple times using a really strong hash.
            // This should give us some really random-ish data for the salt.
            SHA512Managed hasher = new SHA512Managed();

            for (int i = 0; i < SALT_ITERATION_COUNT; i++)
            {
                // .NET notes:  This isn't quite as simple as the Java version.  Each
                // time we use the hash engine, it must be initialized.  We then have
                // to tell it to transform the final block, which effectively gets it
                // to hash the whole thing.  Then we have to update our salt reference
                // to the new value.
                hasher.Initialize();
                hasher.TransformFinalBlock(salt, 0, salt.Length);
                salt = hasher.Hash;
            }
            return(salt);
        }
Example #7
0
 static ShaHash()
 {
     Sha = new SHA512Managed();
     Sha.Initialize();
 }
Example #8
0
        static void Main(string[] args)
        {
            if (args == null || args.Length < 1 || (args[0].ToLower() != "e" && args[0].ToLower() != "d"))
            {
                Console.Error.WriteLine("Usage:");
                Console.Error.WriteLine(" To encrypt: AesCrypt.exe e <file path>");
                Console.Error.WriteLine(" To decrypt: AesCrypt.exe d <file path> <iv> <key>");
                return;
            }

            if (args[0].ToLower() == "e")
            {
                // ENCRYPTION

                if (args.Length < 2)
                {
                    Console.Error.WriteLine("Usage: AesCrypt.exe e <file path>");
                }

                string   fileToEncrypt = args[1];
                FileInfo inpFile       = new FileInfo(fileToEncrypt);
                if (!inpFile.Exists)
                {
                    Console.Error.WriteLine("File does not exist");
                    return;
                }

                byte[] fileName = Encoding.UTF8.GetBytes(inpFile.FullName);

                string rootDir    = Path.GetDirectoryName(fileToEncrypt);
                string randomName = Guid.NewGuid().ToString("N");
                string tempName   = Path.Combine(rootDir, randomName);
                string finalHash;

                if (File.Exists(tempName))
                {
                    Console.Error.WriteLine("ERROR: temporary file exists, wtf how does that even happen");
                    return;
                }

                using (FileStream inp = File.Open(fileToEncrypt, FileMode.Open, FileAccess.Read, FileShare.Read))
                    using (FileStream oup = File.Create(tempName))
                        using (AesManaged enc = new AesManaged())
                        {
                            enc.KeySize = 256;
                            enc.Mode    = CipherMode.CBC;

                            enc.GenerateIV();
                            enc.GenerateKey();

                            SHA512Managed originalHash = new SHA512Managed();
                            originalHash.Initialize();

                            SHA512Managed cryptedHash = new SHA512Managed();
                            using (CryptoStream hashStream = new CryptoStream(oup, cryptedHash, CryptoStreamMode.Write))
                                using (CryptoStream cs = new CryptoStream(hashStream, enc.CreateEncryptor(), CryptoStreamMode.Write))
                                {
                                    // crypted file structure: {name length x2}{full file name}{data length x8}{data}{sha512 hash of data x64}

                                    byte[] lenFileName = BitConverter.GetBytes((ushort)fileName.Length);
                                    cs.Write(lenFileName, 0, lenFileName.Length);

                                    cs.Write(fileName, 0, fileName.Length);

                                    byte[] fileSizeBits = BitConverter.GetBytes(inpFile.Length);
                                    cs.Write(fileSizeBits, 0, fileSizeBits.Length);

                                    byte[] data = new byte[64 * 1024];
                                    int    bytesRead;
                                    long   bytesHashed = 0;
                                    do
                                    {
                                        // pull data from original file
                                        bytesRead = inp.Read(data, 0, data.Length);

                                        // send it to crypted stream
                                        cs.Write(data, 0, bytesRead);

                                        // also hash it for decryption verification purposes
                                        bytesHashed += originalHash.TransformBlock(data, 0, bytesRead, data, 0);
                                    } while (bytesRead > 0);

                                    // write original hash into crypted file so we can verify it after decryption
                                    originalHash.TransformFinalBlock(data, 0, 0);
                                    cs.Write(originalHash.Hash, 0, originalHash.Hash.Length);
                                }

                            finalHash = Base32.ToBase32String(cryptedHash.Hash);

                            string iv  = Convert.ToBase64String(enc.IV);
                            string key = Convert.ToBase64String(enc.Key);

                            Console.Out.WriteLine("{0} {1} {2}", finalHash, iv, key);
                        }

                File.Move(tempName, Path.Combine(rootDir, finalHash));
            }
            else
            {
                // DECRYPTION

                if (args.Length < 4)
                {
                    Console.Error.WriteLine("Usage: AesCrypt.exe d <file path> <iv> <key>");
                    return;
                }

                FileInfo encFile = new FileInfo(args[1]);
                if (!encFile.Exists)
                {
                    Console.Error.WriteLine("File does not exist");
                    return;
                }

                byte[] iv = Convert.FromBase64String(args[2]);
                if (iv == null || iv.Length < 1)
                {
                    Console.Error.WriteLine("ERROR: invalid iv");
                    return;
                }
                byte[] key = Convert.FromBase64String(args[3]);
                if (key == null || key.Length < 1)
                {
                    Console.Error.WriteLine("ERROR: invalid key");
                    return;
                }

                using (FileStream inp = encFile.OpenRead())
                    using (AesManaged aes = new AesManaged())
                    {
                        aes.KeySize = 256;
                        aes.Mode    = CipherMode.CBC;

                        aes.IV  = iv;
                        aes.Key = key;

                        using (CryptoStream cs = new CryptoStream(inp, aes.CreateDecryptor(), CryptoStreamMode.Read))
                        {
                            // crypted file structure: {name length x4}{full file name}{data length x8}{data}{sha512 hash of data x64}

                            byte[] nameLengthBits = new byte[2];
                            if (cs.Read(nameLengthBits, 0, 2) != 2)
                            {
                                Console.Error.WriteLine("ERROR: Failed reading file name size");
                                return;
                            }
                            ushort nameLength = BitConverter.ToUInt16(nameLengthBits, 0);

                            byte[] originalName = new byte[nameLength];
                            if (cs.Read(originalName, 0, nameLength) != nameLength)
                            {
                                Console.Error.WriteLine("ERROR: Failed reading file name");
                                return;
                            }
                            string fileName = Encoding.UTF8.GetString(originalName);

                            byte[] dataLengthBits = new byte[8];
                            if (cs.Read(dataLengthBits, 0, dataLengthBits.Length) != dataLengthBits.Length)
                            {
                                Console.Error.WriteLine("ERROR: Failed reading data length");
                                return;
                            }
                            long dataLength = BitConverter.ToInt64(dataLengthBits, 0);

                            string outputFileName = Path.Combine(Directory.GetCurrentDirectory(), Path.GetFileName(fileName));
                            if (File.Exists(outputFileName))
                            {
                                Console.Error.WriteLine("ERROR: '{0}' already exists, exiting", outputFileName);
                                return;
                            }

                            Console.Out.WriteLine("Decrypting what was originally called '{0}' ({1:N0} bytes)", fileName, dataLength);
                            byte[] decryptedHash;
                            long   totalRead = 0;
                            using (FileStream outputStream = new FileStream(outputFileName, FileMode.CreateNew, FileAccess.Write, FileShare.Read))
                                using (SHA512Managed hasher = new SHA512Managed())
                                {
                                    byte[] buffer         = new byte[ReadBufferSize];
                                    long   bytesRemaining = dataLength;
                                    while (bytesRemaining > 0)
                                    {
                                        int readingThisRound = ReadBufferSize < bytesRemaining ? ReadBufferSize : (int)bytesRemaining;
                                        int bytesRead        = cs.Read(buffer, 0, readingThisRound);
                                        totalRead += bytesRead;

                                        // dump decrypted data to file
                                        outputStream.Write(buffer, 0, bytesRead);

                                        // run it through the grinder for verification later
                                        int hashProgress = hasher.TransformBlock(buffer, 0, bytesRead, buffer, 0);
                                        Debug.Assert(hashProgress == bytesRead, "Hash calculation out of whack with file IO, wtf is going on");

                                        bytesRemaining -= bytesRead;
                                    }

                                    hasher.TransformFinalBlock(buffer, 0, 0);
                                    decryptedHash = hasher.Hash;
                                }

                            byte[] originalHashBits = new byte[64];
                            if (cs.Read(originalHashBits, 0, originalHashBits.Length) != originalHashBits.Length)
                            {
                                Console.Error.WriteLine("ERROR: Failed reading verification hash, encrypted file is corrupted!");
                                return;
                            }

                            if (originalHashBits.SequenceEqual(decryptedHash))
                            {
                                Console.Out.WriteLine("Successfully decrypted '{0}'", outputFileName);
                            }
                            else
                            {
                                Console.Out.WriteLine("Decryption FAIL");
                            }
                        }
                    }
            }
        }