1
0
mirror of git://git.gnupg.org/gnupg.git synced 2024-11-04 20:38:50 +01:00
gnupg/g10/cipher.c

154 lines
4.4 KiB
C
Raw Normal View History

1997-11-23 16:38:27 +01:00
/* cipher.c - En-/De-ciphering filter
2002-06-29 15:46:34 +02:00
* Copyright (C) 1998, 1999, 2000, 2001 Free Software Foundation, Inc.
1997-11-23 16:38:27 +01:00
*
* This file is part of GnuPG.
1997-11-23 16:38:27 +01:00
*
* GnuPG is free software; you can redistribute it and/or modify
1997-11-23 16:38:27 +01:00
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 2 of the License, or
* (at your option) any later version.
*
* GnuPG is distributed in the hope that it will be useful,
1997-11-23 16:38:27 +01:00
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, write to the Free Software
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301,
* USA.
1997-11-23 16:38:27 +01:00
*/
#include <config.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <errno.h>
#include <assert.h>
#include "errors.h"
#include "iobuf.h"
2002-06-29 15:46:34 +02:00
#include "memory.h"
1997-11-23 16:38:27 +01:00
#include "util.h"
#include "filter.h"
#include "packet.h"
#include "options.h"
#include "main.h"
#include "status.h"
1997-11-23 16:38:27 +01:00
#define MIN_PARTIAL_SIZE 512
static void
write_header( cipher_filter_context_t *cfx, IOBUF a )
{
PACKET pkt;
PKT_encrypted ed;
1998-07-29 21:35:05 +02:00
byte temp[18];
2002-06-29 15:46:34 +02:00
unsigned blocksize;
unsigned nprefix;
2002-06-29 15:46:34 +02:00
blocksize = cipher_get_blocksize( cfx->dek->algo );
if( blocksize < 8 || blocksize > 16 )
log_fatal("unsupported blocksize %u\n", blocksize );
2002-06-29 15:46:34 +02:00
memset( &ed, 0, sizeof ed );
ed.len = cfx->datalen;
2002-06-29 15:46:34 +02:00
ed.extralen = blocksize+2;
* packet.h, build-packet.c (build_sig_subpkt), export.c (do_export_stream), import.c (remove_bad_stuff, import), parse-packet.c (dump_sig_subpkt, parse_one_sig_subpkt): Remove vestigal code for the old sig cache subpacket. This wasn't completely harmless as it caused subpacket 101 to disappear on import and export. * options.h, armor.c, cipher.c, g10.c, keyedit.c, pkclist.c, sign.c, encode.c, getkey.c, revoke.c: The current flags for different levels of PGP-ness are massively complex. This is step one in simplifying them. No functional change yet, just use a macro to check for compliance level. * sign.c (sign_file): Fix bug that causes spurious compression preference warning. * sign.c (clearsign_file): Fix bug that prevents proper warning message from appearing when clearsigning in --pgp2 mode with a non-v3 RSA key. * main.h, misc.c (compliance_option_string, compliance_string, compliance_failure), pkclist.c (build_pk_list), sign.c (sign_file, clearsign_file), encode.c (encode_crypt, write_pubkey_enc_from_list): New functions to put the "this message may not be usable...." warning in one place. * options.h, g10.c (main): Part two of the simplification. Use a single enum to indicate what we are compliant to (1991, 2440, PGPx, etc.) * g10.c (main): Show errors for failure in export, send-keys, recv-keys, and refresh-keys. * options.h, g10.c (main): Give algorithm warnings for algorithms chosen against the --pgpX and --openpgp rules. * keydb.h, pkclist.c (algo_available): Make TIGER192 invalid in --openpgp mode. * sign.c (sign_file), pkclist.c (algo_available): Allow passing a hint of 0.
2003-05-03 06:07:45 +02:00
ed.new_ctb = !ed.len && !RFC1991;
if( cfx->dek->use_mdc ) {
2002-06-29 15:46:34 +02:00
ed.mdc_method = DIGEST_ALGO_SHA1;
cfx->mdc_hash = md_open( DIGEST_ALGO_SHA1, 0 );
if ( DBG_HASHING )
2002-06-29 15:46:34 +02:00
md_start_debug( cfx->mdc_hash, "creatmdc" );
}
{
char buf[20];
sprintf (buf, "%d %d", ed.mdc_method, cfx->dek->algo);
write_status_text (STATUS_BEGIN_ENCRYPTION, buf);
}
2002-06-29 15:46:34 +02:00
init_packet( &pkt );
pkt.pkttype = cfx->dek->use_mdc? PKT_ENCRYPTED_MDC : PKT_ENCRYPTED;
pkt.pkt.encrypted = &ed;
if( build_packet( a, &pkt ))
log_bug("build_packet(ENCR_DATA) failed\n");
nprefix = blocksize;
2002-06-29 15:46:34 +02:00
randomize_buffer( temp, nprefix, 1 );
temp[nprefix] = temp[nprefix-2];
temp[nprefix+1] = temp[nprefix-1];
print_cipher_algo_note( cfx->dek->algo );
2002-06-29 15:46:34 +02:00
cfx->cipher_hd = cipher_open( cfx->dek->algo,
cfx->dek->use_mdc? CIPHER_MODE_CFB
2002-06-29 15:46:34 +02:00
: CIPHER_MODE_AUTO_CFB, 1 );
/* log_hexdump( "thekey", cfx->dek->key, cfx->dek->keylen );*/
2002-06-29 15:46:34 +02:00
cipher_setkey( cfx->cipher_hd, cfx->dek->key, cfx->dek->keylen );
cipher_setiv( cfx->cipher_hd, NULL, 0 );
/* log_hexdump( "prefix", temp, nprefix+2 ); */
2002-06-29 15:46:34 +02:00
if( cfx->mdc_hash ) /* hash the "IV" */
md_write( cfx->mdc_hash, temp, nprefix+2 );
cipher_encrypt( cfx->cipher_hd, temp, temp, nprefix+2);
cipher_sync( cfx->cipher_hd );
iobuf_write(a, temp, nprefix+2);
cfx->header=1;
}
1997-11-23 16:38:27 +01:00
1997-11-23 16:38:27 +01:00
/****************
1998-04-14 19:51:16 +02:00
* This filter is used to en/de-cipher data with a conventional algorithm
1997-11-23 16:38:27 +01:00
*/
int
cipher_filter( void *opaque, int control,
IOBUF a, byte *buf, size_t *ret_len)
{
size_t size = *ret_len;
cipher_filter_context_t *cfx = opaque;
int rc=0;
1998-03-19 16:27:29 +01:00
if( control == IOBUFCTRL_UNDERFLOW ) { /* decrypt */
1998-04-02 12:30:03 +02:00
rc = -1; /* not yet used */
1997-11-23 16:38:27 +01:00
}
1998-03-19 16:27:29 +01:00
else if( control == IOBUFCTRL_FLUSH ) { /* encrypt */
1997-11-23 16:38:27 +01:00
assert(a);
if( !cfx->header ) {
write_header( cfx, a );
1997-11-23 16:38:27 +01:00
}
if( cfx->mdc_hash )
2002-06-29 15:46:34 +02:00
md_write( cfx->mdc_hash, buf, size );
cipher_encrypt( cfx->cipher_hd, buf, buf, size);
1997-11-23 16:38:27 +01:00
if( iobuf_write( a, buf, size ) )
2002-06-29 15:46:34 +02:00
rc = G10ERR_WRITE_FILE;
1997-11-23 16:38:27 +01:00
}
else if( control == IOBUFCTRL_FREE ) {
if( cfx->mdc_hash ) {
byte *hash;
2002-06-29 15:46:34 +02:00
int hashlen = md_digest_length( md_get_algo( cfx->mdc_hash ) );
byte temp[22];
assert( hashlen == 20 );
/* we must hash the prefix of the MDC packet here */
temp[0] = 0xd3;
temp[1] = 0x14;
2002-06-29 15:46:34 +02:00
md_putc( cfx->mdc_hash, temp[0] );
md_putc( cfx->mdc_hash, temp[1] );
2002-06-29 15:46:34 +02:00
md_final( cfx->mdc_hash );
hash = md_read( cfx->mdc_hash, 0 );
memcpy(temp+2, hash, 20);
2002-06-29 15:46:34 +02:00
cipher_encrypt( cfx->cipher_hd, temp, temp, 22 );
md_close( cfx->mdc_hash ); cfx->mdc_hash = NULL;
if( iobuf_write( a, temp, 22 ) )
log_error("writing MDC packet failed\n" );
}
2002-06-29 15:46:34 +02:00
cipher_close(cfx->cipher_hd);
1997-11-23 16:38:27 +01:00
}
else if( control == IOBUFCTRL_DESC ) {
*(char**)buf = "cipher_filter";
}
return rc;
}