crypto.c 8.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441
  1. /* Copyright 2001,2002 Roger Dingledine, Matej Pfajfar. */
  2. /* See LICENSE for licensing information */
  3. /* $Id$ */
  4. #include "crypto.h"
  5. #include <stdlib.h>
  6. #include <assert.h>
  7. int crypto_global_init()
  8. {
  9. ERR_load_crypto_strings();
  10. return 0;
  11. }
  12. int crypto_global_cleanup()
  13. {
  14. ERR_free_strings();
  15. return 0;
  16. }
  17. crypto_pk_env_t *crypto_new_pk_env(int type)
  18. {
  19. crypto_pk_env_t *env;
  20. env = (crypto_pk_env_t *)malloc(sizeof(crypto_pk_env_t));
  21. if (!env)
  22. return 0;
  23. env->type = type;
  24. env->key = NULL;
  25. env->aux = NULL;
  26. switch(type) {
  27. case CRYPTO_PK_RSA:
  28. env->key = (unsigned char *)RSA_new();
  29. if (!env->key) {
  30. free((void *)env);
  31. return NULL;
  32. }
  33. break;
  34. default:
  35. free((void *)env);
  36. return NULL;
  37. break;
  38. }
  39. return env;
  40. }
  41. void crypto_free_pk_env(crypto_pk_env_t *env)
  42. {
  43. assert(env);
  44. switch(env->type) {
  45. case CRYPTO_PK_RSA:
  46. if (env->key)
  47. RSA_free((RSA *)env->key);
  48. break;
  49. default:
  50. break;
  51. }
  52. free((void *)env);
  53. return;
  54. }
  55. crypto_cipher_env_t *crypto_new_cipher_env(int type)
  56. {
  57. crypto_cipher_env_t *env;
  58. env = (crypto_cipher_env_t *)malloc(sizeof(crypto_cipher_env_t));
  59. if (!env)
  60. return NULL;
  61. env->type = type;
  62. env->key = NULL;
  63. env->iv = NULL;
  64. env->aux = NULL;
  65. switch(type) {
  66. case CRYPTO_CIPHER_IDENTITY:
  67. env->aux = (unsigned char *)malloc(sizeof(EVP_CIPHER_CTX));
  68. if (!env->aux) {
  69. free((void *)env);
  70. return NULL;
  71. }
  72. EVP_CIPHER_CTX_init((EVP_CIPHER_CTX *)env->aux);
  73. break;
  74. case CRYPTO_CIPHER_DES:
  75. env->aux = (unsigned char *)malloc(sizeof(EVP_CIPHER_CTX));
  76. if (!env->aux) {
  77. free((void *)env);
  78. return NULL;
  79. }
  80. env->key = (unsigned char *)malloc(8);
  81. if (!env->key) {
  82. free((void *)env->aux);
  83. free((void *)env);
  84. return NULL;
  85. }
  86. env->iv = (unsigned char *)malloc(8);
  87. if (!env->iv) {
  88. free((void *)env->key);
  89. free((void *)env->aux);
  90. return NULL;
  91. }
  92. EVP_CIPHER_CTX_init((EVP_CIPHER_CTX *)env->aux);
  93. break;
  94. case CRYPTO_CIPHER_RC4:
  95. env->aux = (unsigned char *)malloc(sizeof(EVP_CIPHER_CTX));
  96. if (!env->aux) {
  97. free((void *)env);
  98. return NULL;
  99. }
  100. env->key = (unsigned char *)malloc(16);
  101. if (!env->key) {
  102. free((void *)env->aux);
  103. free((void *)env);
  104. return NULL;
  105. }
  106. env->iv = (unsigned char *)malloc(16);
  107. if (!env->iv) {
  108. free((void *)env->key);
  109. free((void *)env->aux);
  110. return NULL;
  111. }
  112. break;
  113. EVP_CIPHER_CTX_init((EVP_CIPHER_CTX *)env->aux);
  114. default:
  115. free((void *)env);
  116. return NULL;
  117. break;
  118. }
  119. return env;
  120. }
  121. void crypto_free_cipher_env(crypto_cipher_env_t *env)
  122. {
  123. assert(env);
  124. switch(env->type) {
  125. case CRYPTO_CIPHER_IDENTITY:
  126. if (env->aux) {
  127. EVP_CIPHER_CTX_cleanup((EVP_CIPHER_CTX *)env->aux);
  128. free((void *)env->aux);
  129. }
  130. break;
  131. case CRYPTO_CIPHER_DES:
  132. if (env->aux) {
  133. EVP_CIPHER_CTX_cleanup((EVP_CIPHER_CTX *)env->aux);
  134. free((void *)env->aux);
  135. }
  136. if (env->key)
  137. free((void *)env->key);
  138. if (env->iv)
  139. free((void *)env->iv);
  140. break;
  141. case CRYPTO_CIPHER_RC4:
  142. if (env->aux) {
  143. EVP_CIPHER_CTX_cleanup((EVP_CIPHER_CTX *)env->aux);
  144. free((void *)env->aux);
  145. }
  146. if (env->key)
  147. free((void *)env->key);
  148. if (env->iv)
  149. free((void *)env->iv);
  150. break;
  151. default:
  152. break;
  153. }
  154. free((void *)env);
  155. return;
  156. }
  157. /* public key crypto */
  158. int crypto_pk_generate_key(crypto_pk_env_t *env)
  159. {
  160. assert(env);
  161. switch(env->type) {
  162. case CRYPTO_PK_RSA:
  163. if (env->key)
  164. RSA_free((RSA *)env->key);
  165. env->key = (unsigned char *)RSA_generate_key(1024,65535, NULL, NULL);
  166. if (!env->key)
  167. return -1;
  168. break;
  169. default:
  170. return -1;
  171. }
  172. return 0;
  173. }
  174. int crypto_pk_read_private_key(crypto_pk_env_t *env, FILE *src)
  175. {
  176. assert(env && src);
  177. switch(env->type) {
  178. case CRYPTO_PK_RSA:
  179. if (env->key)
  180. RSA_free((RSA *)env->key);
  181. env->key = (unsigned char *)PEM_read_RSAPrivateKey(src, (RSA **)&env->key, NULL, NULL);
  182. if (!env->key)
  183. return -1;
  184. break;
  185. default :
  186. return -1;
  187. }
  188. return 0;
  189. }
  190. int crypto_pk_read_public_key(crypto_pk_env_t *env, FILE *src)
  191. {
  192. assert(env && src);
  193. switch(env->type) {
  194. case CRYPTO_PK_RSA:
  195. if (env->key)
  196. RSA_free((RSA *)env->key);
  197. env->key = (unsigned char *)PEM_read_RSAPublicKey(src, (RSA **)&env->key, NULL, NULL);
  198. if (!env->key)
  199. return -1;
  200. break;
  201. default :
  202. return -1;
  203. }
  204. return 0;
  205. }
  206. int crypto_pk_write_private_key(crypto_pk_env_t *env, FILE *dest)
  207. {
  208. assert(env && dest);
  209. switch(env->type) {
  210. case CRYPTO_PK_RSA:
  211. if (!env->key)
  212. return -1;
  213. if (PEM_write_RSAPrivateKey(dest, (RSA *)env->key, NULL, NULL, 0,0, NULL) == 0)
  214. return -1;
  215. break;
  216. default :
  217. return -1;
  218. }
  219. return 0;
  220. }
  221. int crypto_pk_write_public_key(crypto_pk_env_t *env, FILE *dest)
  222. {
  223. assert(env && dest);
  224. switch(env->type) {
  225. case CRYPTO_PK_RSA:
  226. if (!env->key)
  227. return -1;
  228. if (PEM_write_RSAPublicKey(dest, (RSA *)env->key) == 0)
  229. return -1;
  230. break;
  231. default :
  232. return -1;
  233. }
  234. return 0;
  235. }
  236. int crypto_pk_check_key(crypto_pk_env_t *env)
  237. {
  238. assert(env);
  239. switch(env->type) {
  240. case CRYPTO_PK_RSA:
  241. return RSA_check_key((RSA *)env->key);
  242. default:
  243. return -1;
  244. }
  245. }
  246. int crypto_pk_set_key(crypto_pk_env_t *env, unsigned char *key)
  247. {
  248. assert(env && key);
  249. switch(env->type) {
  250. case CRYPTO_PK_RSA:
  251. if (env->key)
  252. RSA_free((RSA *)env->key);
  253. env->key = key;
  254. break;
  255. default :
  256. return -1;
  257. }
  258. return 0;
  259. }
  260. int crypto_pk_public_encrypt(crypto_pk_env_t *env, unsigned char *from, int fromlen, unsigned char *to, int padding)
  261. {
  262. assert(env && from && to);
  263. switch(env->type) {
  264. case CRYPTO_PK_RSA:
  265. return RSA_public_encrypt(fromlen, from, to, (RSA *)env->key, padding);
  266. default:
  267. return -1;
  268. }
  269. }
  270. int crypto_pk_private_decrypt(crypto_pk_env_t *env, unsigned char *from, int fromlen, unsigned char *to, int padding)
  271. {
  272. assert(env && from && to);
  273. switch(env->type) {
  274. case CRYPTO_PK_RSA:
  275. return RSA_private_decrypt(fromlen, from, to, (RSA *)env->key, padding);
  276. default:
  277. return -1;
  278. }
  279. }
  280. /* symmetric crypto */
  281. int crypto_cipher_set_iv(crypto_cipher_env_t *env, unsigned char *iv)
  282. {
  283. assert(env && iv);
  284. switch(env->type) {
  285. case CRYPTO_CIPHER_IDENTITY:
  286. break;
  287. case CRYPTO_CIPHER_DES:
  288. case CRYPTO_CIPHER_RC4:
  289. if (env->iv)
  290. free((void *)env->iv);
  291. env->iv = iv;
  292. break;
  293. default:
  294. return -1;
  295. }
  296. return 0;
  297. }
  298. int crypto_cipher_set_key(crypto_cipher_env_t *env, unsigned char *key)
  299. {
  300. assert(env && key);
  301. switch(env->type) {
  302. case CRYPTO_CIPHER_IDENTITY:
  303. break;
  304. case CRYPTO_CIPHER_DES:
  305. case CRYPTO_CIPHER_RC4:
  306. if (env->key)
  307. free((void *)env->key);
  308. env->key = key;
  309. break;
  310. default:
  311. return -1;
  312. }
  313. return 0;
  314. }
  315. int crypto_cipher_encrypt_init_cipher(crypto_cipher_env_t *env)
  316. {
  317. assert(env);
  318. switch(env->type) {
  319. case CRYPTO_CIPHER_IDENTITY:
  320. return !(EVP_EncryptInit((EVP_CIPHER_CTX *)env->aux, EVP_enc_null(), env->key, env->iv));
  321. case CRYPTO_CIPHER_DES:
  322. return !(EVP_EncryptInit((EVP_CIPHER_CTX *)env->aux, EVP_des_ofb(), env->key, env->iv));
  323. case CRYPTO_CIPHER_RC4:
  324. return !(EVP_EncryptInit((EVP_CIPHER_CTX *)env->aux, EVP_rc4(), env->key, env->iv));
  325. default:
  326. return -1;
  327. }
  328. return 0;
  329. }
  330. int crypto_cipher_decrypt_init_cipher(crypto_cipher_env_t *env)
  331. {
  332. assert(env);
  333. switch(env->type) {
  334. case CRYPTO_CIPHER_IDENTITY:
  335. return !(EVP_DecryptInit((EVP_CIPHER_CTX *)env->aux, EVP_enc_null(), env->key, env->iv));
  336. case CRYPTO_CIPHER_DES:
  337. return !(EVP_DecryptInit((EVP_CIPHER_CTX *)env->aux, EVP_des_ofb(), env->key, env->iv));
  338. case CRYPTO_CIPHER_RC4:
  339. return !(EVP_DecryptInit((EVP_CIPHER_CTX *)env->aux, EVP_rc4(), env->key, env->iv));
  340. default:
  341. return -1;
  342. }
  343. return 0;
  344. }
  345. int crypto_cipher_encrypt(crypto_cipher_env_t *env, unsigned char *from, unsigned int fromlen, unsigned char *to)
  346. {
  347. int tolen;
  348. assert(env && from && to);
  349. return !(EVP_EncryptUpdate((EVP_CIPHER_CTX *)env->aux, to, &tolen, from, fromlen));
  350. }
  351. int crypto_cipher_decrypt(crypto_cipher_env_t *env, unsigned char *from, unsigned int fromlen, unsigned char *to)
  352. {
  353. int tolen;
  354. assert(env && from && to);
  355. return !(EVP_DecryptUpdate((EVP_CIPHER_CTX *)env->aux, to, &tolen, from, fromlen));
  356. }
  357. /* SHA-1 */
  358. int crypto_SHA_digest(unsigned char *m, int len, unsigned char *digest)
  359. {
  360. assert(m && digest);
  361. return (SHA1(m,len,digest) == NULL);
  362. }
  363. /* random numbers */
  364. int crypto_rand(unsigned int n, unsigned char *to)
  365. {
  366. assert(to);
  367. return (RAND_bytes(to, n) == -1);
  368. }
  369. int crypto_pseudo_rand(unsigned int n, unsigned char *to)
  370. {
  371. assert(to);
  372. return (RAND_pseudo_bytes(to, n) == -1);
  373. }
  374. /* errors */
  375. char *crypto_perror()
  376. {
  377. return (char *)ERR_reason_error_string(ERR_get_error());
  378. }