git-svn-id: svn://svn.code.sf.net/p/bitchx/code/trunk@373 13b04d17-f746-0410-82c6-800466cd88b0
261 lines
5.5 KiB
C
261 lines
5.5 KiB
C
/*
|
|
* crypt.c: handles some encryption of messages stuff.
|
|
*
|
|
* Written By Michael Sandrof
|
|
*
|
|
* Copyright(c) 1990
|
|
*
|
|
* See the COPYRIGHT file, or do a HELP IRCII COPYRIGHT
|
|
*/
|
|
|
|
|
|
#include "irc.h"
|
|
static char cvsrevision[] = "$Id$";
|
|
CVS_REVISION(encrypt_c)
|
|
#include "struct.h"
|
|
|
|
#include "encrypt.h"
|
|
#include "vars.h"
|
|
#include "ircaux.h"
|
|
#include "list.h"
|
|
#include "ctcp.h"
|
|
#include "output.h"
|
|
#include "newio.h"
|
|
#define MAIN_SOURCE
|
|
#include "modval.h"
|
|
|
|
static void add_to_crypt (char *, char *);
|
|
static int remove_crypt (char *);
|
|
static char *do_crypt (char *, char *, int);
|
|
|
|
#define CRYPT_BUFFER_SIZE (IRCD_BUFFER_SIZE - 50) /* Make this less than
|
|
* the trasmittable
|
|
* buffer */
|
|
/*
|
|
* Crypt: the crypt list structure, consists of the nickname, and the
|
|
* encryption key
|
|
*/
|
|
typedef struct CryptStru
|
|
{
|
|
struct CryptStru *next;
|
|
char *nick;
|
|
char *key;
|
|
} Crypt;
|
|
|
|
/* crypt_list: the list of nicknames and encryption keys */
|
|
static Crypt *crypt_list = NULL;
|
|
|
|
/*
|
|
* add_to_crypt: adds the nickname and key pair to the crypt_list. If the
|
|
* nickname is already in the list, then the key is changed the the supplied
|
|
* key.
|
|
*/
|
|
static void add_to_crypt(char *nick, char *key)
|
|
{
|
|
Crypt *new;
|
|
|
|
if ((new = (Crypt *) remove_from_list((List **) &crypt_list, nick)) != NULL)
|
|
{
|
|
new_free(&(new->nick));
|
|
new_free(&(new->key));
|
|
new_free((char **)&new);
|
|
}
|
|
new = (Crypt *) new_malloc(sizeof(Crypt));
|
|
malloc_strcpy(&(new->nick), nick);
|
|
malloc_strcpy(&(new->key), key);
|
|
add_to_list((List **) &crypt_list, (List *) new);
|
|
}
|
|
|
|
/*
|
|
* remove_crypt: removes the given nickname from the crypt_list, returning 0
|
|
* if successful, and 1 if not (because the nickname wasn't in the list)
|
|
*/
|
|
static int remove_crypt(char *nick)
|
|
{
|
|
Crypt *tmp;
|
|
|
|
if ((tmp = (Crypt *) list_lookup((List **) &crypt_list, nick, !USE_WILDCARDS, REMOVE_FROM_LIST)) != NULL)
|
|
{
|
|
new_free(&(tmp->nick));
|
|
new_free(&(tmp->key));
|
|
new_free((char **)&tmp);
|
|
return (0);
|
|
}
|
|
return (1);
|
|
}
|
|
|
|
/*
|
|
* is_crypted: looks up nick in the crypt_list and returns the encryption key
|
|
* if found in the list. If not found in the crypt_list, null is returned.
|
|
*/
|
|
char * is_crypted(char *nick)
|
|
{
|
|
Crypt *tmp;
|
|
|
|
if (!crypt_list)
|
|
return NULL;
|
|
if ((tmp = (Crypt *) list_lookup((List **) &crypt_list, nick, !USE_WILDCARDS, !REMOVE_FROM_LIST)) != NULL)
|
|
return (tmp->key);
|
|
return NULL;
|
|
}
|
|
|
|
/*
|
|
* encrypt_cmd: the ENCRYPT command. Adds the given nickname and key to the
|
|
* encrypt list, or removes it, or list the list, you know.
|
|
*/
|
|
BUILT_IN_COMMAND(encrypt_cmd)
|
|
{
|
|
char *nick,
|
|
*key;
|
|
|
|
if ((nick = next_arg(args, &args)) != NULL)
|
|
{
|
|
if ((key = next_arg(args, &args)) != NULL)
|
|
{
|
|
add_to_crypt(nick, key);
|
|
say("%s added to the crypt with key %s", nick, key);
|
|
}
|
|
else
|
|
{
|
|
if (remove_crypt(nick))
|
|
say("No such nickname in the crypt: %s", nick);
|
|
else
|
|
say("%s removed from the crypt", nick);
|
|
}
|
|
}
|
|
else
|
|
{
|
|
if (crypt_list)
|
|
{
|
|
Crypt *tmp;
|
|
|
|
say("The crypt:");
|
|
for (tmp = crypt_list; tmp; tmp = tmp->next)
|
|
put_it("%s with key %s", tmp->nick, tmp->key);
|
|
}
|
|
else
|
|
say("The crypt is empty");
|
|
}
|
|
}
|
|
|
|
extern void BX_my_encrypt (char *str, int len, char *key)
|
|
{
|
|
int key_len,
|
|
key_pos,
|
|
i;
|
|
char mix,
|
|
tmp;
|
|
|
|
if (!key)
|
|
return;
|
|
|
|
key_len = strlen(key);
|
|
key_pos = 0;
|
|
mix = 0;
|
|
for (i = 0; i < len; i++)
|
|
{
|
|
tmp = str[i];
|
|
str[i] = mix ^ tmp ^ key[key_pos];
|
|
mix ^= tmp;
|
|
key_pos = (key_pos + 1) % key_len;
|
|
}
|
|
str[i] = (char) 0;
|
|
}
|
|
|
|
extern void BX_my_decrypt(char *str, int len, char *key)
|
|
{
|
|
int key_len,
|
|
key_pos,
|
|
i;
|
|
char mix,
|
|
tmp;
|
|
|
|
if (!key)
|
|
return;
|
|
|
|
key_len = strlen(key);
|
|
key_pos = 0;
|
|
/* mix = key[key_len-1]; */
|
|
mix = 0;
|
|
for (i = 0; i < len; i++)
|
|
{
|
|
tmp = mix ^ str[i] ^ key[key_pos];
|
|
str[i] = tmp;
|
|
mix ^= tmp;
|
|
key_pos = (key_pos + 1) % key_len;
|
|
}
|
|
str[i] = (char) 0;
|
|
}
|
|
|
|
static char *do_crypt(char *str, char *key, int flag)
|
|
{
|
|
int c;
|
|
char *ptr = NULL;
|
|
|
|
c = strlen(str);
|
|
if (flag)
|
|
{
|
|
my_encrypt(str, c, key);
|
|
ptr = ctcp_quote_it(str, c);
|
|
}
|
|
else
|
|
{
|
|
ptr = ctcp_unquote_it(str, &c);
|
|
my_decrypt(ptr, c, key);
|
|
}
|
|
return (ptr);
|
|
}
|
|
|
|
/*
|
|
* crypt_msg: Executes the encryption program on the given string with the
|
|
* given key. If flag is true, the string is encrypted and the returned
|
|
* string is ready to be sent over irc. If flag is false, the string is
|
|
* decrypted and the returned string should be readable
|
|
*/
|
|
char *crypt_msg(char *str, char *key)
|
|
{
|
|
char buffer[CRYPT_BUFFER_SIZE + 1];
|
|
char thing[6] = "";
|
|
char *ptr;
|
|
|
|
sprintf(thing, "%cSED ", CTCP_DELIM_CHAR);
|
|
*buffer = (char) 0;
|
|
if ((ptr = do_crypt(str, key, 1)))
|
|
{
|
|
strmcat(buffer, thing, CRYPT_BUFFER_SIZE);
|
|
strmcat(buffer, ptr, CRYPT_BUFFER_SIZE-1);
|
|
strmcat(buffer, CTCP_DELIM_STR, CRYPT_BUFFER_SIZE);
|
|
new_free(&ptr);
|
|
}
|
|
else
|
|
strmcat(buffer, str, CRYPT_BUFFER_SIZE);
|
|
|
|
return (m_strdup(buffer));
|
|
}
|
|
|
|
/*
|
|
* Given a CTCP SED argument 'str', it attempts to unscramble the text
|
|
* into something more sane. If the 'key' is not the one used to scramble
|
|
* the text, the results are unpredictable. This is probably the point.
|
|
*
|
|
* Note that the retval MUST be at least 'BIG_BUFFER_SIZE + 1'. This is
|
|
* not an oversight -- the retval is passed is to do_ctcp() which requires
|
|
* a big buffer to scratch around (The decrypted text could be a CTCP UTC
|
|
* which could expand to a larger string of text.)
|
|
*/
|
|
char *decrypt_msg (char *str, char *key)
|
|
{
|
|
char *buffer = (char *)new_malloc(BIG_BUFFER_SIZE + 1);
|
|
char *ptr;
|
|
|
|
if ((ptr = do_crypt(str, key, 0)) != NULL)
|
|
{
|
|
strlcpy(buffer, ptr, CRYPT_BUFFER_SIZE);
|
|
new_free(&ptr);
|
|
}
|
|
else
|
|
strlcat(buffer, str, CRYPT_BUFFER_SIZE);
|
|
|
|
return buffer;
|
|
}
|