X-Git-Url: http://www.average.org/gitweb/?p=pam_pcsc_cr.git;a=blobdiff_plain;f=crypto.c;h=c2d6c1471f349dfee3ba981e0997c5a809f296c0;hp=cbdae18f8d32ca2349a050a199ecb25b28e9678d;hb=ecefc4912f36f9153e63e7e0ee90d8ef69898fed;hpb=4f3247d992b2d4152da0ebc0daf828c874e0b1f1 diff --git a/crypto.c b/crypto.c index cbdae18..c2d6c14 100644 --- a/crypto.c +++ b/crypto.c @@ -1,30 +1,70 @@ -#include -#include +#ifdef HAVE_CONFIG_H +# include "config.h" +#endif +#include +#include "crypto.h" +#include "crypto_if.h" -int main() +extern struct crypto_interface ossl_crypto_if; +extern struct crypto_interface tom_crypto_if; + +static struct crypto_interface *ifs[] = { +#ifdef HAVE_OPENSSL + &ossl_crypto_if, +#endif +#ifdef HAVE_TOMCRYPT + &tom_crypto_if, +#endif + (void*)0, +}; +#define MAX_IF (sizeof(ifs)/sizeof(struct crypto_interface *)-2) + +static int which = 0; + +int select_crypto_if(int ifno) +{ + if (ifno < 0 || ifno > MAX_IF) return -1; + which = ifno; + return 0; +} + +const char *crypto_init(int ifno) { - EVP_CIPHER_CTX ctx; - unsigned char key[32] = {0}; - unsigned char iv[16] = {0}; - unsigned char in[16] = {0}; - unsigned char out[32]; /* at least one block longer than in[] */ - int outlen1, outlen2; + if (ifno < 0 || ifno > MAX_IF) return (const char *)0; + return ifs[ifno]->init(); +} - EVP_EncryptInit(&ctx, EVP_aes_256_cbc(), key, iv); - EVP_EncryptUpdate(&ctx, out, &outlen1, in, sizeof(in)); - EVP_EncryptFinal(&ctx, out + outlen1, &outlen2); +#define INITIV {0} - printf("ciphertext length: %d\n", outlen1 + outlen2); +unsigned long encrypt(void *key, int keylen, void *pt, void *ct, int tlen) +{ + unsigned char iv[16] = INITIV; - return 0; + assert(keylen == 16); + return ifs[which]->encrypt(key, keylen, iv, pt, ct, tlen); } -// result = HMAC(EVP_sha256(), key, 999, data, 888, NULL, NULL); -// EVP_MD * +unsigned long decrypt(void *key, int keylen, void *ct, void *pt, int tlen) +{ + unsigned char iv[16] = INITIV; -// HMAC_CTX hctx; -// HMAC_CTX_init(&hctx); -// if (HMAC_Init(&hctx, key, keylen, EVP_sha1())) success; -// if (HMAC_Update(&hctx, data, datalen)) success; -// if (HMAC_Final(&hctx, &digest, &digestlen)) success -// HMAC_CTX_cleanup(&hctx); + assert(keylen == 16); + return ifs[which]->decrypt(key, keylen, iv, ct, pt, tlen); +} + +unsigned long hash(void *pt, int tlen, void *tag, int *taglen) +{ + assert(*taglen == 20); + return ifs[which]->hash(pt, tlen, tag, taglen); +} + +unsigned long hmac(void *key, int keylen, void *pt, int tlen, void *tag, int *taglen) +{ + assert(*taglen == 20); + return ifs[which]->hmac(key, keylen, pt, tlen, tag, taglen); +} + +const char *crypto_errstr(unsigned long err) +{ + return ifs[which]->errstr(err); +}