1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97
|
/*
* encrypt.c
*
* Encryption initialization for the suspend and resume tools
*
* Copyright (C) 2006 Rafael J. Wysocki <rjw@sisk.pl>
*
* This file is released under the GPLv2.
*
*/
#include "config.h"
#ifdef CONFIG_ENCRYPT
#include <sys/types.h>
#include <sys/stat.h>
#include <fcntl.h>
#include <unistd.h>
#include <string.h>
#include <errno.h>
#include <termios.h>
#include "md5.h"
#include "encrypt.h"
gcry_cipher_hd_t cipher_handle;
struct key_data key_data;
/**
* read_password - get non-empty, \0-terminated password from stdin
* passbuf - buffer of at least PASS_SIZE * 2 chars
* vrfy - if verify the password or not
*/
void read_password(char *pass_buf, int vrfy)
{
struct termios termios;
char *vrfy_buf = vrfy ? pass_buf + PASS_SIZE : pass_buf;
int len;
tcgetattr(0, &termios);
termios.c_lflag &= ~ECHO;
termios.c_lflag |= ICANON | ECHONL;
tcsetattr(0, TCSANOW, &termios);
do {
do {
printf("Passphrase please (must be non-empty): ");
fgets(pass_buf, PASS_SIZE, stdin);
len = strlen(pass_buf) - 1;
} while (len <= 0);
if (pass_buf[len] == '\n')
pass_buf[len] = '\0';
if (vrfy) {
printf("Verify passphrase: ");
fgets(vrfy_buf, PASS_SIZE, stdin);
if (vrfy_buf[len] == '\n')
vrfy_buf[len] = '\0';
}
} while (vrfy && strncmp(pass_buf, vrfy_buf, PASS_SIZE));
termios.c_lflag |= ECHO;
tcsetattr(0, TCSANOW, &termios);
}
/**
* encrypt_init - set up the encryption key, initialization vector and mumber
* @pass_buf - auxiliary buffer that must be at least 2*PASS_SIZE bytes long
* if @vrfy is non-zero or at least PASS_SIZE long otherwise
* @key_buf - auxiliary buffer that must be at least max(KEY_SIZE,16) bytes
* long
*/
void
encrypt_init(unsigned char *key, unsigned char *ivec, char *pass_buf)
{
struct md5_ctx ctx;
memset(ivec, 0, CIPHER_BLOCK);
strncpy((char *)ivec, pass_buf, CIPHER_BLOCK);
md5_init_ctx(&ctx);
md5_process_bytes(pass_buf, strlen(pass_buf), &ctx);
md5_finish_ctx(&ctx, key);
}
void get_random_salt(unsigned char *salt, size_t size)
{
int fd;
memset(salt, 0, size);
fd = open("/dev/urandom", O_RDONLY);
if (fd >= 0) {
read(fd, salt, size);
close(fd);
}
}
#endif
|