summaryrefslogtreecommitdiff
path: root/src/encrypt.c
blob: 3f4f4a3fd39f5561d393bda4fd5491a893eb7903 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
/* Include file for high-level encryption routines.
 *
 * (C) 2003-2014 Anope Team
 * Contact us at team@anope.org
 *
 * Please read COPYING and README for further details.
 *
 * Based on the original code of Epona by Lara.
 * Based on the original code of Services by Andy Church. 
 * 
 *
 */

#include "services.h"
#include "encrypt.h"

Encryption encryption;

/******************************************************************************/
void encmodule_encrypt(int (*func)
                        (const char *src, int len, char *dest, int size))
{
    encryption.encrypt = func;
}

void encmodule_encrypt_check_len(int (*func) (int passlen, int bufsize))
{
    encryption.encrypt_check_len = func;
}

void encmodule_decrypt(int (*func) (const char *src, char *dest, int size))
{
    encryption.decrypt = func;
}

void encmodule_check_password(int (*func)
                               (const char *plaintext,
                                const char *password))
{
    encryption.check_password = func;
}

/******************************************************************************/


/** 
 * Encrypt string `src' of length `len', placing the result in buffer
 * `dest' of size `size'.  Returns 0 on success, -1 on error.
 **/
int enc_encrypt(const char *src, int len, char *dest, int size)
{
    if (encryption.encrypt) {
        return encryption.encrypt(src, len, dest, size);
    }
    return -1;
}

/** 
 * Check whether the result of encrypting a password of length `passlen'
 * will fit in a buffer of size `bufsize'.  Returns 0 if the encrypted
 * password would fit in the buffer, otherwise returns the maximum length
 * password that would fit (this value will be smaller than `passlen').
 * If the result of encrypting even a 1-byte password would exceed the
 * specified buffer size, generates a fatal error.
 **/
int enc_encrypt_check_len(int passlen, int bufsize)
{
    if (encryption.encrypt_check_len) {
        return encryption.encrypt_check_len(passlen, bufsize);
    }
    return -1;
}

/**
 * Decrypt encrypted string `src' into buffer `dest' of length `len'.
 * Returns 1 (not 0) on success, 0 if the encryption algorithm does not
 * allow decryption, and -1 if another failure occurred (e.g. destination
 * buffer too small).
 **/
int enc_decrypt(const char *src, char *dest, int size)
{
    if (encryption.decrypt) {
        return encryption.decrypt(src, dest, size);
    }
    return -1;
}

/**
 * Check an input password `plaintext' against a stored, encrypted password
 * `password'.  Return value is:
 *   1 if the password matches
 *   0 if the password does not match
 *   -1 if an error occurred while checking
 **/
int enc_check_password(const char *plaintext, const char *password)
{
    if (encryption.check_password) {
        return encryption.check_password(plaintext, password);
    }
    return -1;
}

/* EOF */