summaryrefslogtreecommitdiff
path: root/lib/gnutls_cipher_int.c
blob: 13be143e49a5e86f2787b7f7809749cbcebd9158 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
/*
 * Copyright (C) 2000, 2004, 2005 Free Software Foundation
 *
 * Author: Nikos Mavroyanopoulos
 *
 * This file is part of GNUTLS.
 *
 * The GNUTLS library is free software; you can redistribute it and/or
 * modify it under the terms of the GNU Lesser General Public License
 * as published by the Free Software Foundation; either version 2.1 of
 * the License, or (at your option) any later version.
 *
 * This library is distributed in the hope that it will be useful, but
 * WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
 * Lesser General Public License for more details.
 *
 * You should have received a copy of the GNU Lesser General Public
 * License along with this library; if not, write to the Free Software
 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307
 * USA
 *
 */

#include <gnutls_int.h>
#include <gnutls_errors.h>
#include <gnutls_cipher_int.h>
#include <gnutls_datum.h>

cipher_hd_t _gnutls_cipher_init(gnutls_cipher_algorithm_t cipher,
				const gnutls_datum_t * key,
				const gnutls_datum_t * iv)
{
    cipher_hd_t ret = NULL;
    int err = GC_INVALID_CIPHER;	/* doesn't matter */

    switch (cipher) {
    case GNUTLS_CIPHER_AES_128_CBC:
	err = gc_cipher_open(GC_AES128, GC_CBC, &ret);
	break;

    case GNUTLS_CIPHER_AES_256_CBC:
	err = gc_cipher_open(GC_AES256, GC_CBC, &ret);
	break;

    case GNUTLS_CIPHER_3DES_CBC:
	err = gc_cipher_open(GC_3DES, GC_CBC, &ret);
	break;

    case GNUTLS_CIPHER_DES_CBC:
	err = gc_cipher_open(GC_DES, GC_CBC, &ret);
	break;

    case GNUTLS_CIPHER_ARCFOUR_128:
	err = gc_cipher_open(GC_ARCFOUR128, GC_STREAM, &ret);
	break;

    case GNUTLS_CIPHER_ARCFOUR_40:
	err = gc_cipher_open(GC_ARCFOUR40, GC_STREAM, &ret);
	break;

    case GNUTLS_CIPHER_RC2_40_CBC:
	err = gc_cipher_open(GC_ARCTWO40, GC_CBC, &ret);
	break;

    default:
	return NULL;
    }

    if (err == 0) {
	gc_cipher_setkey(ret, key->size, key->data);
	if (iv->data != NULL && iv->size > 0)
	    gc_cipher_setiv(ret, iv->size, iv->data);
    } else if (cipher != GNUTLS_CIPHER_NULL) {
	gnutls_assert();
	_gnutls_x509_log("Crypto cipher[%d] error: %d\n", cipher, err);
	/* FIXME: gc_strerror */
    }

    return ret;
}

int _gnutls_cipher_encrypt(cipher_hd_t handle, void *text, int textlen)
{
    if (handle != GNUTLS_CIPHER_FAILED) {
	if (gc_cipher_encrypt_inline(handle, textlen, text) != 0) {
	    gnutls_assert();
	    return GNUTLS_E_INTERNAL_ERROR;
	}
    }
    return 0;
}

int _gnutls_cipher_decrypt(cipher_hd_t handle, void *ciphertext,
			   int ciphertextlen)
{
    if (handle != GNUTLS_CIPHER_FAILED) {
	if (gc_cipher_decrypt_inline(handle, ciphertextlen, ciphertext) !=
	    0) {
	    gnutls_assert();
	    return GNUTLS_E_INTERNAL_ERROR;
	}
    }
    return 0;
}

void _gnutls_cipher_deinit(cipher_hd_t handle)
{
    if (handle != GNUTLS_CIPHER_FAILED) {
	gc_cipher_close(handle);
    }
}