File: encrypt.c

package info (click to toggle)
uswsusp 1.0%2B20120915-6
  • links: PTS, VCS
  • area: main
  • in suites: jessie, jessie-kfreebsd
  • size: 1,548 kB
  • ctags: 1,422
  • sloc: ansic: 7,164; sh: 566; makefile: 222; perl: 65
file content (97 lines) | stat: -rw-r--r-- 2,180 bytes parent folder | download | duplicates (4)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
/*
 * encrypt.c
 *
 * Encryption initialization for the suspend and resume tools
 *
 * Copyright (C) 2006 Rafael J. Wysocki <rjw@sisk.pl>
 *
 * This file is released under the GPLv2.
 *
 */

#include "config.h"

#ifdef CONFIG_ENCRYPT
#include <sys/types.h>
#include <sys/stat.h>
#include <fcntl.h>
#include <unistd.h>
#include <string.h>
#include <errno.h>
#include <termios.h>

#include "md5.h"
#include "encrypt.h"

gcry_cipher_hd_t cipher_handle;
struct key_data key_data;

/**
 * read_password - get non-empty, \0-terminated password from stdin
 * passbuf - buffer of at least PASS_SIZE * 2 chars
 * vrfy - if verify the password or not
 */
void read_password(char *pass_buf, int vrfy)
{
	struct termios termios;
	char *vrfy_buf = vrfy ? pass_buf + PASS_SIZE : pass_buf;
	int len;

	tcgetattr(0, &termios);
	termios.c_lflag &= ~ECHO;
	termios.c_lflag |= ICANON | ECHONL;
	tcsetattr(0, TCSANOW, &termios);

	do {
		do {
			printf("Passphrase please (must be non-empty): ");
			fgets(pass_buf, PASS_SIZE, stdin);
			len = strlen(pass_buf) - 1;
		} while (len <= 0);
		if (pass_buf[len] == '\n')
			pass_buf[len] = '\0';
		if (vrfy) {
			printf("Verify passphrase: ");
			fgets(vrfy_buf, PASS_SIZE, stdin);
			if (vrfy_buf[len] == '\n')
				vrfy_buf[len] = '\0';
		}
	} while (vrfy && strncmp(pass_buf, vrfy_buf, PASS_SIZE));
	termios.c_lflag |= ECHO;
	tcsetattr(0, TCSANOW, &termios);
}

/**
 *	encrypt_init - set up the encryption key, initialization vector and mumber
 *	@pass_buf - auxiliary buffer that must be at least 2*PASS_SIZE bytes long
 *	if @vrfy is non-zero or at least PASS_SIZE long otherwise
 *	@key_buf - auxiliary buffer that must be at least max(KEY_SIZE,16) bytes
 *	long
 */

void
encrypt_init(unsigned char *key, unsigned char *ivec, char *pass_buf)
{

	struct md5_ctx ctx;

	memset(ivec, 0, CIPHER_BLOCK);
	strncpy((char *)ivec, pass_buf, CIPHER_BLOCK);
	md5_init_ctx(&ctx);
	md5_process_bytes(pass_buf, strlen(pass_buf), &ctx);
	md5_finish_ctx(&ctx, key);
}

void get_random_salt(unsigned char *salt, size_t size)
{
	int fd;

	memset(salt, 0, size);
	fd = open("/dev/urandom", O_RDONLY);
	if (fd >= 0) {
		read(fd, salt, size);
		close(fd);
	}
}
#endif