/tmp/bitcoin/src/util/obfuscation.h
Line | Count | Source |
1 | | // Copyright (c) 2025-present The Bitcoin Core developers |
2 | | // Distributed under the MIT software license, see the accompanying |
3 | | // file COPYING or http://www.opensource.org/licenses/mit-license.php. |
4 | | |
5 | | #ifndef BITCOIN_UTIL_OBFUSCATION_H |
6 | | #define BITCOIN_UTIL_OBFUSCATION_H |
7 | | |
8 | | #include <crypto/hex_base.h> |
9 | | #include <span.h> |
10 | | #include <tinyformat.h> |
11 | | #include <util/strencodings.h> |
12 | | |
13 | | #include <array> |
14 | | #include <bit> |
15 | | #include <climits> |
16 | | #include <cstdint> |
17 | | #include <ios> |
18 | | #include <memory> |
19 | | |
20 | | class Obfuscation |
21 | | { |
22 | | public: |
23 | | using KeyType = uint64_t; |
24 | | static constexpr size_t KEY_SIZE{sizeof(KeyType)}; |
25 | | |
26 | 20.1k | Obfuscation() { SetRotations(0); } |
27 | | explicit Obfuscation(std::span<const std::byte, KEY_SIZE> key_bytes) |
28 | 2.71k | { |
29 | 2.71k | SetRotations(ToKey(key_bytes)); |
30 | 2.71k | } |
31 | | |
32 | 67.8M | operator bool() const { return m_rotations[0] != 0; } |
33 | | |
34 | | void operator()(std::span<std::byte> target, size_t key_offset = 0) const |
35 | 1.69M | { |
36 | 1.69M | if (!*this) return; |
37 | | |
38 | 1.32M | KeyType rot_key{m_rotations[key_offset % KEY_SIZE]}; // Continue obfuscation from where we left off |
39 | 1.32M | if (target.size() > KEY_SIZE) { |
40 | | // Obfuscate until KEY_SIZE alignment boundary |
41 | 928k | if (const auto misalign{reinterpret_cast<uintptr_t>(target.data()) % KEY_SIZE}) { |
42 | 416 | const size_t alignment{KEY_SIZE - misalign}; |
43 | 416 | XorWord(target.first(alignment), rot_key); |
44 | | |
45 | 416 | target = {std::assume_aligned<KEY_SIZE>(target.data() + alignment), target.size() - alignment}; |
46 | 416 | rot_key = m_rotations[(key_offset + alignment) % KEY_SIZE]; |
47 | 416 | } |
48 | | // Aligned obfuscation in 8*KEY_SIZE chunks |
49 | 101M | for (constexpr auto unroll{8}; target.size() >= KEY_SIZE * unroll; target = target.subspan(KEY_SIZE * unroll)) { |
50 | 899M | for (size_t i{0}; i < unroll; ++i) { |
51 | 799M | XorWord(target.subspan(i * KEY_SIZE, KEY_SIZE), rot_key); |
52 | 799M | } |
53 | 100M | } |
54 | | // Aligned obfuscation in KEY_SIZE chunks |
55 | 3.94M | for (; target.size() >= KEY_SIZE; target = target.subspan(KEY_SIZE)) { |
56 | 3.01M | XorWord(target.first<KEY_SIZE>(), rot_key); |
57 | 3.01M | } |
58 | 928k | } |
59 | 1.32M | XorWord(target, rot_key); |
60 | 1.32M | } |
61 | | |
62 | | template <typename Stream> |
63 | | void Serialize(Stream& s) const |
64 | 1.41k | { |
65 | | // Use vector serialization for convenient compact size prefix. |
66 | 1.41k | std::vector<std::byte> bytes{KEY_SIZE}; |
67 | 1.41k | std::memcpy(bytes.data(), &m_rotations[0], KEY_SIZE); |
68 | 1.41k | s << bytes; |
69 | 1.41k | } void Obfuscation::Serialize<DataStream>(DataStream&) const Line | Count | Source | 64 | 501 | { | 65 | | // Use vector serialization for convenient compact size prefix. | 66 | 501 | std::vector<std::byte> bytes{KEY_SIZE}; | 67 | 501 | std::memcpy(bytes.data(), &m_rotations[0], KEY_SIZE); | 68 | 501 | s << bytes; | 69 | 501 | } |
void Obfuscation::Serialize<AutoFile>(AutoFile&) const Line | Count | Source | 64 | 915 | { | 65 | | // Use vector serialization for convenient compact size prefix. | 66 | 915 | std::vector<std::byte> bytes{KEY_SIZE}; | 67 | 915 | std::memcpy(bytes.data(), &m_rotations[0], KEY_SIZE); | 68 | 915 | s << bytes; | 69 | 915 | } |
|
70 | | |
71 | | template <typename Stream> |
72 | | void Unserialize(Stream& s) |
73 | 1.29k | { |
74 | 1.29k | std::vector<std::byte> bytes{KEY_SIZE}; |
75 | 1.29k | s >> bytes; |
76 | 1.29k | if (bytes.size() != KEY_SIZE) throw std::ios_base::failure(strprintf("Obfuscation key size should be exactly %s bytes long", KEY_SIZE)); |
77 | 1.29k | SetRotations(ToKey(std::span<std::byte, KEY_SIZE>(bytes))); |
78 | 1.29k | } void Obfuscation::Unserialize<DataStream>(DataStream&) Line | Count | Source | 73 | 1 | { | 74 | 1 | std::vector<std::byte> bytes{KEY_SIZE}; | 75 | 1 | s >> bytes; | 76 | 1 | if (bytes.size() != KEY_SIZE) throw std::ios_base::failure(strprintf("Obfuscation key size should be exactly %s bytes long", KEY_SIZE)); | 77 | 1 | SetRotations(ToKey(std::span<std::byte, KEY_SIZE>(bytes))); | 78 | 1 | } |
void Obfuscation::Unserialize<SpanReader>(SpanReader&) Line | Count | Source | 73 | 845 | { | 74 | 845 | std::vector<std::byte> bytes{KEY_SIZE}; | 75 | 845 | s >> bytes; | 76 | 845 | if (bytes.size() != KEY_SIZE) throw std::ios_base::failure(strprintf("Obfuscation key size should be exactly %s bytes long", KEY_SIZE)); | 77 | 845 | SetRotations(ToKey(std::span<std::byte, KEY_SIZE>(bytes))); | 78 | 845 | } |
void Obfuscation::Unserialize<AutoFile>(AutoFile&) Line | Count | Source | 73 | 447 | { | 74 | 447 | std::vector<std::byte> bytes{KEY_SIZE}; | 75 | 447 | s >> bytes; | 76 | 447 | if (bytes.size() != KEY_SIZE) throw std::ios_base::failure(strprintf("Obfuscation key size should be exactly %s bytes long", KEY_SIZE)); | 77 | 447 | SetRotations(ToKey(std::span<std::byte, KEY_SIZE>(bytes))); | 78 | 447 | } |
|
79 | | |
80 | | std::string HexKey() const |
81 | 3.20k | { |
82 | 3.20k | return HexStr(std::as_bytes(std::span{&m_rotations[0], 1})); |
83 | 3.20k | } |
84 | | |
85 | | private: |
86 | | // Cached key rotations for different offsets. |
87 | | std::array<KeyType, KEY_SIZE> m_rotations; |
88 | | |
89 | | void SetRotations(KeyType key) |
90 | 24.1k | { |
91 | 217k | for (size_t i{0}; i < KEY_SIZE; ++i) { |
92 | 193k | int key_rotation_bits{int(CHAR_BIT * i)}; |
93 | | if constexpr (std::endian::native == std::endian::big) key_rotation_bits *= -1; |
94 | 193k | m_rotations[i] = std::rotr(key, key_rotation_bits); |
95 | 193k | } |
96 | 24.1k | } |
97 | | |
98 | | static KeyType ToKey(std::span<const std::byte, KEY_SIZE> key_span) |
99 | 4.00k | { |
100 | 4.00k | KeyType key{}; |
101 | 4.00k | std::memcpy(&key, key_span.data(), KEY_SIZE); |
102 | 4.00k | return key; |
103 | 4.00k | } |
104 | | |
105 | | static void XorWord(std::span<std::byte> target, KeyType key) |
106 | 803M | { |
107 | 803M | assert(target.size() <= KEY_SIZE); |
108 | 803M | if (target.empty()) return; |
109 | 803M | KeyType raw{}; |
110 | 803M | std::memcpy(&raw, target.data(), target.size()); |
111 | 803M | raw ^= key; |
112 | 803M | std::memcpy(target.data(), &raw, target.size()); |
113 | 803M | } |
114 | | }; |
115 | | |
116 | | #endif // BITCOIN_UTIL_OBFUSCATION_H |