/*
* Claws Mail -- a GTK based, lightweight, and fast e-mail client
* Copyright (C) 1999-2012 Hiroyuki Yamamoto and the Claws Mail Team
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 3 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program. If not, see .
*
*/
#include "config.h"
#include
#include
#include
#include
#include
#include
#include
#if defined (__FreeBSD__)
#include
#endif
#include
#include "passcrypt.h"
static void crypt_cfb_buf(const char key[8], unsigned char *buf, unsigned len,
unsigned chunksize, int decrypt);
void passcrypt_encrypt(gchar *password, guint len)
{
crypt_cfb_buf(PASSCRYPT_KEY, password, len, 1, 0 );
}
void passcrypt_decrypt(gchar *password, guint len)
{
crypt_cfb_buf(PASSCRYPT_KEY, password, len, 1, 1 );
}
/*
* crypt_cfb_iv is the intermediate vector used for cypher feedback encryption
*/
unsigned char crypt_cfb_iv[64];
int crypt_cfb_blocksize = 8; /* 8 for DES */
#if defined (__FreeBSD__)
static void
crypt_cfb_buf(const char key[8], unsigned char *buf, unsigned len,
unsigned chunksize, int decrypt)
{
char des_key[8];
memcpy(des_key, PASSCRYPT_KEY, 8);
des_setparity(des_key);
if (decrypt)
ecb_crypt(des_key, buf, len, DES_DECRYPT);
else
ecb_crypt(des_key, buf, len, DES_ENCRYPT);
}
#else
static void crypt_cfb_shift(unsigned char *to,
const unsigned char *from, unsigned len);
static void crypt_cfb_xor(unsigned char *to, const unsigned char *from,
unsigned len);
static void crypt_unpack(unsigned char *a);
static void
crypt_cfb_buf(const char key[8], unsigned char *buf, unsigned len,
unsigned chunksize, int decrypt)
{
struct des_ctx ctx;
unsigned char temp[64];
des_set_key(&ctx,(const uint8_t*) key);
memset(temp, 0, sizeof(temp));
memset(crypt_cfb_iv, 0, sizeof(crypt_cfb_iv));
if (chunksize > crypt_cfb_blocksize)
chunksize = crypt_cfb_blocksize;
while (len) {
memcpy(temp, crypt_cfb_iv, sizeof(temp));
/* simulate encrypt() via Nettle */
char temp2[8];
memset(temp2,0,sizeof(temp2));
crypt_cfb_xor(temp2,temp,sizeof(temp)/sizeof(temp2));
des_encrypt(&ctx,sizeof(temp2),(uint8_t*)temp2,(uint8_t*)temp2);
memcpy(temp,temp2,sizeof(temp2));
crypt_unpack(temp);
/* */
if (chunksize > len)
chunksize = len;
if (decrypt)
crypt_cfb_shift(crypt_cfb_iv, buf, chunksize);
crypt_cfb_xor((unsigned char *) buf, temp, chunksize);
if (!decrypt)
crypt_cfb_shift(crypt_cfb_iv, buf, chunksize);
len -= chunksize;
buf += chunksize;
}
}
/*
* Shift len bytes from end of to buffer to beginning, then put len
* bytes from from at the end. Caution: the to buffer is unpacked,
* but the from buffer is not.
*/
static void
crypt_cfb_shift(unsigned char *to, const unsigned char *from, unsigned len)
{
unsigned i;
unsigned j;
unsigned k;
if (len < crypt_cfb_blocksize) {
i = len * 8;
j = crypt_cfb_blocksize * 8;
for (k = i; k < j; k++) {
to[0] = to[i];
++to;
}
}
for (i = 0; i < len; i++) {
j = *from++;
for (k = 0x80; k; k >>= 1)
*to++ = ((j & k) != 0);
}
}
/*
* XOR len bytes from from into the data at to. Caution: the from buffer
* is unpacked, but the to buffer is not.
*/
static void
crypt_cfb_xor(unsigned char *to, const unsigned char *from, unsigned len)
{
unsigned i;
unsigned j;
unsigned char c;
for (i = 0; i < len; i++) {
c = 0;
for (j = 0; j < 8; j++)
c = (c << 1) | *from++;
*to++ ^= c;
}
}
/*
* Take the 8-byte array at *a (must be able to hold 64 bytes!) and unpack
* each bit into its own byte.
*/
static void crypt_unpack(unsigned char *a)
{
int i, j;
for (i = 7; i >= 0; --i)
for (j = 7; j >= 0; --j)
a[(i << 3) + j] = (a[i] & (0x80 >> j)) != 0;
}
#endif