1 /* Blue Sky: File Systems in the Cloud
3 * Copyright (C) 2009 The Regents of the University of California
4 * Written by Michael Vrable <mvrable@cs.ucsd.edu>
18 static int DISABLE_CRYPTO = 1;
20 /* Cryptographic operations. The rest of the BlueSky code merely calls into
21 * the functions in this file, so this is the only point where we interface
22 * with an external cryptographic library. */
24 GCRY_THREAD_OPTION_PTHREAD_IMPL;
26 void bluesky_crypt_init()
28 gcry_control(GCRYCTL_SET_THREAD_CBS, &gcry_threads_pthread);
30 if (gcry_control(GCRYCTL_INITIALIZATION_FINISHED_P))
33 if (!gcry_check_version(GCRYPT_VERSION))
34 g_error("libgcrypt version mismatch\n");
36 gcry_control(GCRYCTL_DISABLE_SECMEM, 0);
37 gcry_control(GCRYCTL_INITIALIZATION_FINISHED, 0);
40 /* Return cryptographically-strong random data. */
41 void bluesky_crypt_random_bytes(guchar *buf, gint len)
43 gcry_randomize(buf, len, GCRY_STRONG_RANDOM);
46 /* Encrypt a data block. */
47 BlueSkyRCStr *bluesky_crypt_encrypt(BlueSkyRCStr *in, const uint8_t *key)
50 bluesky_string_ref(in);
55 gcry_cipher_hd_t handle;
57 status = gcry_cipher_open(&handle, GCRY_CIPHER_AES, GCRY_CIPHER_MODE_CBC,
60 g_error("gcrypt error setting up encryption: %s\n",
61 gcry_strerror(status));
64 uint8_t *out = g_malloc0(in->len + CRYPTO_BLOCK_SIZE);
66 gcry_cipher_setkey(handle, key, CRYPTO_KEY_SIZE);
68 g_error("gcrypt error setting key: %s\n",
69 gcry_strerror(status));
72 bluesky_crypt_random_bytes(out, CRYPTO_BLOCK_SIZE);
73 status = gcry_cipher_setiv(handle, out, CRYPTO_BLOCK_SIZE);
75 g_error("gcrypt error setting IV: %s\n",
76 gcry_strerror(status));
79 status = gcry_cipher_encrypt(handle, out + CRYPTO_BLOCK_SIZE, in->len,
82 g_error("gcrypt error encrypting: %s\n",
83 gcry_strerror(status));
86 gcry_cipher_close(handle);
88 return bluesky_string_new(out, in->len + CRYPTO_BLOCK_SIZE);
91 /* Decrypt a data block. */
92 BlueSkyRCStr *bluesky_crypt_decrypt(BlueSkyRCStr *in, const uint8_t *key)
95 bluesky_string_ref(in);
100 gcry_cipher_hd_t handle;
102 g_return_val_if_fail(in->len > CRYPTO_BLOCK_SIZE, NULL);
104 status = gcry_cipher_open(&handle, GCRY_CIPHER_AES, GCRY_CIPHER_MODE_CBC,
105 GCRY_CIPHER_CBC_CTS);
107 g_error("gcrypt error setting up encryption: %s\n",
108 gcry_strerror(status));
111 uint8_t *out = g_malloc0(in->len - CRYPTO_BLOCK_SIZE);
113 gcry_cipher_setkey(handle, key, CRYPTO_KEY_SIZE);
115 g_error("gcrypt error setting key: %s\n",
116 gcry_strerror(status));
119 status = gcry_cipher_setiv(handle, in->data, CRYPTO_BLOCK_SIZE);
121 g_error("gcrypt error setting IV: %s\n",
122 gcry_strerror(status));
125 status = gcry_cipher_decrypt(handle, out, in->len - CRYPTO_BLOCK_SIZE,
126 in->data + CRYPTO_BLOCK_SIZE,
127 in->len - CRYPTO_BLOCK_SIZE);
129 g_error("gcrypt error decrypting: %s\n",
130 gcry_strerror(status));
133 gcry_cipher_close(handle);
135 return bluesky_string_new(out, in->len + CRYPTO_BLOCK_SIZE);