@@ -100,8 +100,11 @@ def open_with_key(self, aes_key=None, twofish_key=None, serpent_key=None):
100
100
if serpent_key : self .dataenc ['serpent' ].set_keys (serpent_key )
101
101
self .open_with_key = True
102
102
103
- def open (self , password , hidden = False , decode = True , backup = False ):
104
- self .pw = password
103
+ def open (self , password , hidden = False , decode = True , backup = False , keyfiles = None ):
104
+ if keyfiles :
105
+ self .pw = self .keyfile (password ,keyfiles )
106
+ else :
107
+ self .pw = password
105
108
106
109
#open container as file object
107
110
if not self .fd : self .fd = open (self .fn , "r+b" )
@@ -167,6 +170,96 @@ def open(self, password, hidden=False, decode=True, backup=False):
167
170
else :
168
171
return False
169
172
173
+ # from "TrueCrypt 7.1a Source\Common\Crc.c"
174
+ def truecrypt_crc (self , data , crc ):
175
+ # /* CRC polynomial 0x04c11db7 */
176
+ crc_32_tab = [
177
+ 0x00000000 , 0x77073096 , 0xee0e612c , 0x990951ba , 0x076dc419 , 0x706af48f , 0xe963a535 , 0x9e6495a3 ,
178
+ 0x0edb8832 , 0x79dcb8a4 , 0xe0d5e91e , 0x97d2d988 , 0x09b64c2b , 0x7eb17cbd , 0xe7b82d07 , 0x90bf1d91 ,
179
+ 0x1db71064 , 0x6ab020f2 , 0xf3b97148 , 0x84be41de , 0x1adad47d , 0x6ddde4eb , 0xf4d4b551 , 0x83d385c7 ,
180
+ 0x136c9856 , 0x646ba8c0 , 0xfd62f97a , 0x8a65c9ec , 0x14015c4f , 0x63066cd9 , 0xfa0f3d63 , 0x8d080df5 ,
181
+ 0x3b6e20c8 , 0x4c69105e , 0xd56041e4 , 0xa2677172 , 0x3c03e4d1 , 0x4b04d447 , 0xd20d85fd , 0xa50ab56b ,
182
+ 0x35b5a8fa , 0x42b2986c , 0xdbbbc9d6 , 0xacbcf940 , 0x32d86ce3 , 0x45df5c75 , 0xdcd60dcf , 0xabd13d59 ,
183
+ 0x26d930ac , 0x51de003a , 0xc8d75180 , 0xbfd06116 , 0x21b4f4b5 , 0x56b3c423 , 0xcfba9599 , 0xb8bda50f ,
184
+ 0x2802b89e , 0x5f058808 , 0xc60cd9b2 , 0xb10be924 , 0x2f6f7c87 , 0x58684c11 , 0xc1611dab , 0xb6662d3d ,
185
+ 0x76dc4190 , 0x01db7106 , 0x98d220bc , 0xefd5102a , 0x71b18589 , 0x06b6b51f , 0x9fbfe4a5 , 0xe8b8d433 ,
186
+ 0x7807c9a2 , 0x0f00f934 , 0x9609a88e , 0xe10e9818 , 0x7f6a0dbb , 0x086d3d2d , 0x91646c97 , 0xe6635c01 ,
187
+ 0x6b6b51f4 , 0x1c6c6162 , 0x856530d8 , 0xf262004e , 0x6c0695ed , 0x1b01a57b , 0x8208f4c1 , 0xf50fc457 ,
188
+ 0x65b0d9c6 , 0x12b7e950 , 0x8bbeb8ea , 0xfcb9887c , 0x62dd1ddf , 0x15da2d49 , 0x8cd37cf3 , 0xfbd44c65 ,
189
+ 0x4db26158 , 0x3ab551ce , 0xa3bc0074 , 0xd4bb30e2 , 0x4adfa541 , 0x3dd895d7 , 0xa4d1c46d , 0xd3d6f4fb ,
190
+ 0x4369e96a , 0x346ed9fc , 0xad678846 , 0xda60b8d0 , 0x44042d73 , 0x33031de5 , 0xaa0a4c5f , 0xdd0d7cc9 ,
191
+ 0x5005713c , 0x270241aa , 0xbe0b1010 , 0xc90c2086 , 0x5768b525 , 0x206f85b3 , 0xb966d409 , 0xce61e49f ,
192
+ 0x5edef90e , 0x29d9c998 , 0xb0d09822 , 0xc7d7a8b4 , 0x59b33d17 , 0x2eb40d81 , 0xb7bd5c3b , 0xc0ba6cad ,
193
+ 0xedb88320 , 0x9abfb3b6 , 0x03b6e20c , 0x74b1d29a , 0xead54739 , 0x9dd277af , 0x04db2615 , 0x73dc1683 ,
194
+ 0xe3630b12 , 0x94643b84 , 0x0d6d6a3e , 0x7a6a5aa8 , 0xe40ecf0b , 0x9309ff9d , 0x0a00ae27 , 0x7d079eb1 ,
195
+ 0xf00f9344 , 0x8708a3d2 , 0x1e01f268 , 0x6906c2fe , 0xf762575d , 0x806567cb , 0x196c3671 , 0x6e6b06e7 ,
196
+ 0xfed41b76 , 0x89d32be0 , 0x10da7a5a , 0x67dd4acc , 0xf9b9df6f , 0x8ebeeff9 , 0x17b7be43 , 0x60b08ed5 ,
197
+ 0xd6d6a3e8 , 0xa1d1937e , 0x38d8c2c4 , 0x4fdff252 , 0xd1bb67f1 , 0xa6bc5767 , 0x3fb506dd , 0x48b2364b ,
198
+ 0xd80d2bda , 0xaf0a1b4c , 0x36034af6 , 0x41047a60 , 0xdf60efc3 , 0xa867df55 , 0x316e8eef , 0x4669be79 ,
199
+ 0xcb61b38c , 0xbc66831a , 0x256fd2a0 , 0x5268e236 , 0xcc0c7795 , 0xbb0b4703 , 0x220216b9 , 0x5505262f ,
200
+ 0xc5ba3bbe , 0xb2bd0b28 , 0x2bb45a92 , 0x5cb36a04 , 0xc2d7ffa7 , 0xb5d0cf31 , 0x2cd99e8b , 0x5bdeae1d ,
201
+ 0x9b64c2b0 , 0xec63f226 , 0x756aa39c , 0x026d930a , 0x9c0906a9 , 0xeb0e363f , 0x72076785 , 0x05005713 ,
202
+ 0x95bf4a82 , 0xe2b87a14 , 0x7bb12bae , 0x0cb61b38 , 0x92d28e9b , 0xe5d5be0d , 0x7cdcefb7 , 0x0bdbdf21 ,
203
+ 0x86d3d2d4 , 0xf1d4e242 , 0x68ddb3f8 , 0x1fda836e , 0x81be16cd , 0xf6b9265b , 0x6fb077e1 , 0x18b74777 ,
204
+ 0x88085ae6 , 0xff0f6a70 , 0x66063bca , 0x11010b5c , 0x8f659eff , 0xf862ae69 , 0x616bffd3 , 0x166ccf45 ,
205
+ 0xa00ae278 , 0xd70dd2ee , 0x4e048354 , 0x3903b3c2 , 0xa7672661 , 0xd06016f7 , 0x4969474d , 0x3e6e77db ,
206
+ 0xaed16a4a , 0xd9d65adc , 0x40df0b66 , 0x37d83bf0 , 0xa9bcae53 , 0xdebb9ec5 , 0x47b2cf7f , 0x30b5ffe9 ,
207
+ 0xbdbdf21c , 0xcabac28a , 0x53b39330 , 0x24b4a3a6 , 0xbad03605 , 0xcdd70693 , 0x54de5729 , 0x23d967bf ,
208
+ 0xb3667a2e , 0xc4614ab8 , 0x5d681b02 , 0x2a6f2b94 , 0xb40bbe37 , 0xc30c8ea1 , 0x5a05df1b , 0x2d02ef8d ]
209
+
210
+ # CRC = (CRC >> 8) ^ crc_32_tab[ (CRC ^ *data++) & 0xFF ];
211
+ return (crc >> 8 ) ^ crc_32_tab [(crc ^ ord (data )) & 0xFF ]
212
+
213
+ def keyfile (self ,password ,keyfiles ):
214
+ #pad password with zero bytes until length of 64
215
+ while len (password ) < 64 :
216
+ password = password + '\x00 '
217
+
218
+ #fill keypool with zero bytes
219
+ keyfilePool = []
220
+ keyfilePoolCursor = 0
221
+ for x in range (64 ):
222
+ keyfilePool .append (0 )
223
+
224
+ total_processed = 0
225
+ for keyfile in keyfiles :
226
+ keyfilefd = open (keyfile ,'rb' )
227
+ keyfilefd .seek (0 )
228
+ keyfiledata = keyfilefd .read (1048576 ) #read first 1MB
229
+ keyfilefd .close ()
230
+
231
+ #stop processing if 1MB has been read
232
+ if total_processed == 1048576 : break
233
+
234
+ #read each byte of keyfile, stopping at 1MB in total
235
+ crc = 0xFFFFFFFF
236
+ for x in range (len (keyfiledata )):
237
+ total_processed += 1
238
+
239
+ # from "TrueCrypt 7.1a Source\Common\Keyfiles.c"
240
+ crc = self .truecrypt_crc (keyfiledata [x ], crc ) & 0xFFFFFFFF
241
+ #keyPool[writePos++] += (unsigned __int8) (crc >> 24);
242
+ keyfilePool [keyfilePoolCursor ] = (keyfilePool [keyfilePoolCursor ] + ((crc >> 24 ) & 0xFF )) % 256
243
+ #keyPool[writePos++] += (unsigned __int8) (crc >> 16);
244
+ keyfilePool [keyfilePoolCursor + 1 ] = (keyfilePool [keyfilePoolCursor + 1 ] + ((crc >> 16 ) & 0xFF )) % 256
245
+ #keyPool[writePos++] += (unsigned __int8) (crc >> 8);
246
+ keyfilePool [keyfilePoolCursor + 2 ] = (keyfilePool [keyfilePoolCursor + 2 ] + ((crc >> 8 ) & 0xFF )) % 256
247
+ #keyPool[writePos++] += (unsigned __int8) crc;
248
+ keyfilePool [keyfilePoolCursor + 3 ] = (keyfilePool [keyfilePoolCursor + 3 ] + ((crc ) & 0xFF )) % 256
249
+ keyfilePoolCursor += 4
250
+
251
+ #reset cursor if needed
252
+ if keyfilePoolCursor == 64 : keyfilePoolCursor = 0
253
+
254
+ #stop processing if 1MB has been read
255
+ if total_processed == 1048576 : break
256
+
257
+ keyfilePoolString = ""
258
+ for x in range (64 ):
259
+ keyfilePoolString = keyfilePoolString + chr ((keyfilePool [x ] + ord (password [x ])) % 256 )
260
+
261
+ return keyfilePoolString
262
+
170
263
def decodeHeader (self ):
171
264
#Decode header into struct/namedtuple
172
265
TCHDR = namedtuple ('TCHDR' , "Magic HdrVersion MinProgVer CRC Reserved HiddenVolSize VolSize DataStart DataSize Flags SectorSize Reserved2 CRC3 Keys" )
0 commit comments