X-Git-Url: http://git.vrable.net/?a=blobdiff_plain;f=bluesky%2Fcrypto.c;h=df0af666b0eef3c5a25d872fd0fee81b5a8df59c;hb=ca027b3a4abb9e465a12ab9dec67654c1a3f9e46;hp=6eec4643e380b13626a2da9b9b92e18cd83c0762;hpb=c83d8b650786b8e7d6a9d41c9449c203929c7215;p=bluesky.git diff --git a/bluesky/crypto.c b/bluesky/crypto.c index 6eec464..df0af66 100644 --- a/bluesky/crypto.c +++ b/bluesky/crypto.c @@ -15,13 +15,12 @@ #include "bluesky.h" +static int DISABLE_CRYPTO = 1; + /* Cryptographic operations. The rest of the BlueSky code merely calls into * the functions in this file, so this is the only point where we interface * with an external cryptographic library. */ -#define CRYPTO_BLOCK_SIZE 16 /* 128-bit AES */ -#define CRYPTO_KEY_SIZE 16 - GCRY_THREAD_OPTION_PTHREAD_IMPL; void bluesky_crypt_init() @@ -49,6 +48,11 @@ void bluesky_crypt_random_bytes(guchar *buf, gint len) /* Encrypt a data block. */ BlueSkyRCStr *bluesky_crypt_encrypt(BlueSkyRCStr *in, const uint8_t *key) { + if (DISABLE_CRYPTO) { + bluesky_string_ref(in); + return in; + } + gcry_error_t status; gcry_cipher_hd_t handle; @@ -74,8 +78,8 @@ BlueSkyRCStr *bluesky_crypt_encrypt(BlueSkyRCStr *in, const uint8_t *key) gcry_strerror(status)); } - gcry_cipher_encrypt(handle, out + CRYPTO_BLOCK_SIZE, in->len, - in->data, in->len); + status = gcry_cipher_encrypt(handle, out + CRYPTO_BLOCK_SIZE, in->len, + in->data, in->len); if (status) { g_error("gcrypt error encrypting: %s\n", gcry_strerror(status)); @@ -85,3 +89,50 @@ BlueSkyRCStr *bluesky_crypt_encrypt(BlueSkyRCStr *in, const uint8_t *key) return bluesky_string_new(out, in->len + CRYPTO_BLOCK_SIZE); } + +/* Decrypt a data block. */ +BlueSkyRCStr *bluesky_crypt_decrypt(BlueSkyRCStr *in, const uint8_t *key) +{ + if (DISABLE_CRYPTO) { + bluesky_string_ref(in); + return in; + } + + gcry_error_t status; + gcry_cipher_hd_t handle; + + g_return_val_if_fail(in->len > CRYPTO_BLOCK_SIZE, NULL); + + status = gcry_cipher_open(&handle, GCRY_CIPHER_AES, GCRY_CIPHER_MODE_CBC, + GCRY_CIPHER_CBC_CTS); + if (status) { + g_error("gcrypt error setting up encryption: %s\n", + gcry_strerror(status)); + } + + uint8_t *out = g_malloc0(in->len - CRYPTO_BLOCK_SIZE); + + gcry_cipher_setkey(handle, key, CRYPTO_KEY_SIZE); + if (status) { + g_error("gcrypt error setting key: %s\n", + gcry_strerror(status)); + } + + status = gcry_cipher_setiv(handle, in->data, CRYPTO_BLOCK_SIZE); + if (status) { + g_error("gcrypt error setting IV: %s\n", + gcry_strerror(status)); + } + + status = gcry_cipher_decrypt(handle, out, in->len - CRYPTO_BLOCK_SIZE, + in->data + CRYPTO_BLOCK_SIZE, + in->len - CRYPTO_BLOCK_SIZE); + if (status) { + g_error("gcrypt error decrypting: %s\n", + gcry_strerror(status)); + } + + gcry_cipher_close(handle); + + return bluesky_string_new(out, in->len + CRYPTO_BLOCK_SIZE); +}