summaryrefslogtreecommitdiff
path: root/lib/backupclient/BackupClientCryptoKeys.cpp
blob: 7a8da7baa1e53477675bdb9ad943e86fe0c8e3f3 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
// --------------------------------------------------------------------------
//
// File
//		Name:    BackupClientCryptoKeys.cpp
//		Purpose: function for setting up all the backup client keys
//		Created: 1/12/03
//
// --------------------------------------------------------------------------

#include "Box.h"

#include <string.h>

#include "BackupClientCryptoKeys.h"
#include "FileStream.h"
#include "BackupStoreFilenameClear.h"
#include "BackupStoreException.h"
#include "BackupClientFileAttributes.h"
#include "BackupStoreFile.h"

#include "MemLeakFindOn.h"

// --------------------------------------------------------------------------
//
// Function
//		Name:    BackupClientCryptoKeys_Setup(const char *)
//		Purpose: Read in the key material file, and set keys to all the backup elements required.
//		Created: 1/12/03
//
// --------------------------------------------------------------------------
void BackupClientCryptoKeys_Setup(const std::string& rKeyMaterialFilename)
{
	// Read in the key material
	unsigned char KeyMaterial[BACKUPCRYPTOKEYS_FILE_SIZE];
	
	// Open the file
	FileStream file(rKeyMaterialFilename);

	// Read in data
	if(!file.ReadFullBuffer(KeyMaterial, BACKUPCRYPTOKEYS_FILE_SIZE, 0))
	{
		THROW_EXCEPTION(BackupStoreException, CouldntLoadClientKeyMaterial)
	}
	
	// Setup keys and encoding method for filename encryption
	BackupStoreFilenameClear::SetBlowfishKey(
		KeyMaterial + BACKUPCRYPTOKEYS_FILENAME_KEY_START,
		BACKUPCRYPTOKEYS_FILENAME_KEY_LENGTH,
		KeyMaterial + BACKUPCRYPTOKEYS_FILENAME_IV_START,
		BACKUPCRYPTOKEYS_FILENAME_IV_LENGTH);
	BackupStoreFilenameClear::SetEncodingMethod(
		BackupStoreFilename::Encoding_Blowfish);

	// Setup key for attributes encryption
	BackupClientFileAttributes::SetBlowfishKey(
		KeyMaterial + BACKUPCRYPTOKEYS_ATTRIBUTES_KEY_START, 
		BACKUPCRYPTOKEYS_ATTRIBUTES_KEY_LENGTH);

	// Setup secret for attribute hashing
	BackupClientFileAttributes::SetAttributeHashSecret(
		KeyMaterial + BACKUPCRYPTOKEYS_ATTRIBUTE_HASH_SECRET_START,
		BACKUPCRYPTOKEYS_ATTRIBUTE_HASH_SECRET_LENGTH);

	// Setup keys for file data encryption
	BackupStoreFile::SetBlowfishKeys(
		KeyMaterial + BACKUPCRYPTOKEYS_ATTRIBUTES_KEY_START,
		BACKUPCRYPTOKEYS_ATTRIBUTES_KEY_LENGTH,
		KeyMaterial + BACKUPCRYPTOKEYS_FILE_BLOCK_ENTRY_KEY_START,
		BACKUPCRYPTOKEYS_FILE_BLOCK_ENTRY_KEY_LENGTH);

#ifndef HAVE_OLD_SSL
	// Use AES where available
	BackupStoreFile::SetAESKey(
		KeyMaterial + BACKUPCRYPTOKEYS_FILE_AES_KEY_START,
		BACKUPCRYPTOKEYS_FILE_AES_KEY_LENGTH);
#endif

	// Wipe the key material from memory
	#ifdef _MSC_VER // not defined on MinGW
		SecureZeroMemory(KeyMaterial, BACKUPCRYPTOKEYS_FILE_SIZE);
	#else
		::memset(KeyMaterial, 0, BACKUPCRYPTOKEYS_FILE_SIZE);
	#endif
}