X-Git-Url: http://www.average.org/gitweb/?p=pam_pcsc_cr.git;a=blobdiff_plain;f=crypto.c;h=105db4e727cf43220bfe4d341ed138230cc2480a;hp=cbdae18f8d32ca2349a050a199ecb25b28e9678d;hb=4a5da38dfd8b0236564ffe6b70eab1eeb399fff0;hpb=4f3247d992b2d4152da0ebc0daf828c874e0b1f1 diff --git a/crypto.c b/crypto.c index cbdae18..105db4e 100644 --- a/crypto.c +++ b/crypto.c @@ -1,30 +1,74 @@ -#include -#include +#ifdef HAVE_CONFIG_H +# include "config.h" +#endif +#include +#include "crypto.h" +#include "crypto_if.h" -int main() +extern struct crypto_interface ossl_crypto_if; +extern struct crypto_interface tom_crypto_if; +extern struct crypto_interface gnu_crypto_if; + +static struct crypto_interface *ifs[] = { +#ifdef HAVE_OPENSSL + &ossl_crypto_if, +#endif +#ifdef HAVE_TOMCRYPT + &tom_crypto_if, +#endif +#ifdef HAVE_GCRYPT + &gnu_crypto_if, +#endif + (void*)0, +}; +#define MAX_IF (sizeof(ifs)/sizeof(struct crypto_interface *)-2) + +static int which = 0; + +int select_crypto_if(const int ifno) +{ + if (ifno < 0 || ifno > MAX_IF) return -1; + which = ifno; + return 0; +} + +const char *crypto_init(const int ifno) { - EVP_CIPHER_CTX ctx; - unsigned char key[32] = {0}; - unsigned char iv[16] = {0}; - unsigned char in[16] = {0}; - unsigned char out[32]; /* at least one block longer than in[] */ - int outlen1, outlen2; + if (ifno < 0 || ifno > MAX_IF) return (const char *)0; + return ifs[ifno]->init(); +} - EVP_EncryptInit(&ctx, EVP_aes_256_cbc(), key, iv); - EVP_EncryptUpdate(&ctx, out, &outlen1, in, sizeof(in)); - EVP_EncryptFinal(&ctx, out + outlen1, &outlen2); +#define INITIV {0} - printf("ciphertext length: %d\n", outlen1 + outlen2); +unsigned long encrypt(const void *key, const int keylen, const void *pt, void *ct, const int tlen) +{ + unsigned char iv[16] = INITIV; - return 0; + assert(keylen == 16); + return ifs[which]->encrypt(key, keylen, iv, pt, ct, tlen); } -// result = HMAC(EVP_sha256(), key, 999, data, 888, NULL, NULL); -// EVP_MD * +unsigned long decrypt(const void *key, const int keylen, const void *ct, void *pt, const int tlen) +{ + unsigned char iv[16] = INITIV; -// HMAC_CTX hctx; -// HMAC_CTX_init(&hctx); -// if (HMAC_Init(&hctx, key, keylen, EVP_sha1())) success; -// if (HMAC_Update(&hctx, data, datalen)) success; -// if (HMAC_Final(&hctx, &digest, &digestlen)) success -// HMAC_CTX_cleanup(&hctx); + assert(keylen == 16); + return ifs[which]->decrypt(key, keylen, iv, ct, pt, tlen); +} + +unsigned long hash(const void *pt, const int tlen, void *tag, int *taglen) +{ + assert(*taglen == 20); + return ifs[which]->hash(pt, tlen, tag, taglen); +} + +unsigned long hmac(const void *key, const int keylen, const void *pt, const int tlen, void *tag, int *taglen) +{ + assert(*taglen == 20); + return ifs[which]->hmac(key, keylen, pt, tlen, tag, taglen); +} + +const char *crypto_errstr(const unsigned long err) +{ + return ifs[which]->errstr(err); +}