mirror of https://github.com/asterisk/asterisk
				
				
				
			
			You can not select more than 25 topics
			Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
		
		
		
		
		
			
		
			
				
					
					
						
							210 lines
						
					
					
						
							5.9 KiB
						
					
					
				
			
		
		
	
	
							210 lines
						
					
					
						
							5.9 KiB
						
					
					
				| /*
 | |
|  * Asterisk -- An open source telephony toolkit.
 | |
|  *
 | |
|  * Copyright (C) 2009, Digium, Inc.
 | |
|  *
 | |
|  * See http://www.asterisk.org for more information about
 | |
|  * the Asterisk project. Please do not directly contact
 | |
|  * any of the maintainers of this project for assistance;
 | |
|  * the project provides a web site, mailing lists and IRC
 | |
|  * channels for your use.
 | |
|  *
 | |
|  * This program is free software, distributed under the terms of
 | |
|  * the GNU General Public License Version 2. See the LICENSE file
 | |
|  * at the top of the source tree.
 | |
|  */
 | |
| 
 | |
| /*! \file
 | |
|  *
 | |
|  * \brief AES encryption/decryption dialplan functions
 | |
|  *
 | |
|  * \author David Vossel <dvossel@digium.com>
 | |
|  * \ingroup functions
 | |
|  */
 | |
| 
 | |
| 
 | |
| #include "asterisk.h"
 | |
| 
 | |
| ASTERISK_FILE_VERSION(__FILE__, "$Revision$")
 | |
| 
 | |
| #include "asterisk/module.h"
 | |
| #include "asterisk/pbx.h"
 | |
| #include "asterisk/app.h"
 | |
| #include "asterisk/aes.h"
 | |
| #include "asterisk/strings.h"
 | |
| 
 | |
| #define AES_BLOCK_SIZE 16
 | |
| 
 | |
| /*** DOCUMENTATION
 | |
| 	<function name="AES_ENCRYPT" language="en_US">
 | |
| 		<synopsis>
 | |
| 			Encrypt a string with AES given a 16 character key.
 | |
| 		</synopsis>
 | |
| 		<syntax>
 | |
| 			<parameter name="key" required="true">
 | |
| 				<para>AES Key</para>
 | |
| 			</parameter>
 | |
| 			<parameter name="string" required="true">
 | |
| 				<para>Input string</para>
 | |
| 			</parameter>
 | |
| 		</syntax>
 | |
| 		<description>
 | |
| 			<para>Returns an AES encrypted string encoded in base64.</para>
 | |
| 		</description>
 | |
| 	</function>
 | |
| 	<function name="AES_DECRYPT" language="en_US">
 | |
| 		<synopsis>
 | |
| 			Decrypt a string encoded in base64 with AES given a 16 character key.
 | |
| 		</synopsis>
 | |
| 		<syntax>
 | |
| 			<parameter name="key" required="true">
 | |
| 				<para>AES Key</para>
 | |
| 			</parameter>
 | |
| 			<parameter name="string" required="true">
 | |
| 				<para>Input string.</para>
 | |
| 			</parameter>
 | |
| 		</syntax>
 | |
| 		<description>
 | |
| 			<para>Returns the plain text string.</para>
 | |
| 		</description>
 | |
| 	</function>
 | |
|  ***/
 | |
| 
 | |
| 
 | |
| static int aes_helper(struct ast_channel *chan, const char *cmd, char *data,
 | |
| 	       char *buf, struct ast_str **str, ssize_t maxlen)
 | |
| {
 | |
| 	unsigned char curblock[AES_BLOCK_SIZE] = { 0, };
 | |
| 	char *tmp = NULL;
 | |
| 	char *tmpP;
 | |
| 	int data_len, encrypt;
 | |
| 	int keylen, len, tmplen, elen = 0;
 | |
| 	ast_aes_encrypt_key ecx;                        /*  AES 128 Encryption context */
 | |
| 	ast_aes_decrypt_key dcx;
 | |
| 	AST_DECLARE_APP_ARGS(args,
 | |
| 		AST_APP_ARG(key);
 | |
| 		AST_APP_ARG(data);
 | |
| 	);
 | |
| 
 | |
| 	AST_STANDARD_APP_ARGS(args, data);
 | |
| 
 | |
| 	if (ast_strlen_zero(args.data) || ast_strlen_zero(args.key)) {
 | |
| 		ast_log(LOG_WARNING, "Syntax: %s(<key>,<data>) - missing argument!\n", cmd);
 | |
| 		return -1;
 | |
| 	}
 | |
| 
 | |
| 	if ((keylen = strlen(args.key)) != AES_BLOCK_SIZE) {        /* key must be of 16 characters in length, 128 bits */
 | |
| 		ast_log(LOG_WARNING, "Syntax: %s(<key>,<data>) - <key> parameter must be exactly 16 characters%s!\n", cmd, keylen < 16 ? " - padding" : "");
 | |
| 		return -1;
 | |
| 	}
 | |
| 
 | |
| 	if (buf) {
 | |
| 		len = maxlen;
 | |
| 	} else if (maxlen == -1) {
 | |
| 		len = ast_str_size(*str);
 | |
| 	} else if (maxlen > 0) {
 | |
| 		len = maxlen;
 | |
| 	} else {
 | |
| 		len = INT_MAX;
 | |
| 	}
 | |
| 	ast_debug(3, "len=%d\n", len);
 | |
| 
 | |
| 	encrypt = strcmp("AES_DECRYPT", cmd);           /* -1 if encrypting, 0 if decrypting */
 | |
| 	/* Round up the buffer to an even multiple of 16, plus 1 */
 | |
| 	tmplen = (strlen(args.data) / 16 + 1) * 16 + 1;
 | |
| 	tmp = ast_calloc(1, tmplen);
 | |
| 	tmpP = tmp;
 | |
| 
 | |
| 	if (encrypt) {                                  /* if decrypting first decode src to base64 */
 | |
| 		/* encryption:  plaintext -> encryptedtext -> base64 */
 | |
| 		ast_aes_encrypt_key((unsigned char *) args.key, &ecx);
 | |
| 		strcpy(tmp, args.data);
 | |
| 		data_len = strlen(tmp);
 | |
| 	} else {
 | |
| 		/* decryption:  base64 -> encryptedtext -> plaintext */
 | |
| 		ast_aes_decrypt_key((unsigned char *) args.key, &dcx);
 | |
| 		data_len = ast_base64decode((unsigned char *) tmp, args.data, tmplen);
 | |
| 	}
 | |
| 
 | |
| 	if (data_len >= len) {                        /* make sure to not go over buffer len */
 | |
| 		ast_log(LOG_WARNING, "Syntax: %s(<keys>,<data>) - <data> exceeds buffer length.  Result may be truncated!\n", cmd);
 | |
| 		data_len = len - 1;
 | |
| 	}
 | |
| 
 | |
| 	while (data_len > 0) {
 | |
| 		/* Tricky operation.  We first copy the data into curblock, then
 | |
| 		 * the data is encrypted or decrypted and put back into the original
 | |
| 		 * buffer. */
 | |
| 		memset(curblock, 0, AES_BLOCK_SIZE);
 | |
| 		memcpy(curblock, tmpP, AES_BLOCK_SIZE);
 | |
| 		if (encrypt) {
 | |
| 			ast_aes_encrypt(curblock, (unsigned char *) tmpP, &ecx);
 | |
| 		} else {
 | |
| 			ast_aes_decrypt(curblock, (unsigned char *) tmpP, &dcx);
 | |
| 		}
 | |
| 		tmpP += AES_BLOCK_SIZE;
 | |
| 		data_len -= AES_BLOCK_SIZE;
 | |
| 		elen += AES_BLOCK_SIZE;
 | |
| 	}
 | |
| 
 | |
| 	if (encrypt) {                            /* if encrypting encode result to base64 */
 | |
| 		if (buf) {
 | |
| 			ast_base64encode(buf, (unsigned char *) tmp, elen, len);
 | |
| 		} else {
 | |
| 			if (maxlen >= 0) {
 | |
| 				ast_str_make_space(str, maxlen ? maxlen : elen * 4 / 3 + 2);
 | |
| 			}
 | |
| 			ast_base64encode(ast_str_buffer(*str), (unsigned char *) tmp, elen, ast_str_size(*str));
 | |
| 			ast_str_update(*str);
 | |
| 		}
 | |
| 	} else {
 | |
| 		if (buf) {
 | |
| 			memcpy(buf, tmp, len);
 | |
| 		} else {
 | |
| 			ast_str_set(str, maxlen, "%s", tmp);
 | |
| 		}
 | |
| 	}
 | |
| 	ast_free(tmp);
 | |
| 
 | |
| 	return 0;
 | |
| }
 | |
| 
 | |
| static int aes_buf_helper(struct ast_channel *chan, const char *cmd, char *data,
 | |
| 	       char *buf, size_t maxlen)
 | |
| {
 | |
| 	return aes_helper(chan, cmd, data, buf, NULL, maxlen);
 | |
| }
 | |
| 
 | |
| static int aes_str_helper(struct ast_channel *chan, const char *cmd, char *data,
 | |
| 	       struct ast_str **buf, ssize_t maxlen)
 | |
| {
 | |
| 	return aes_helper(chan, cmd, data, NULL, buf, maxlen);
 | |
| }
 | |
| 
 | |
| static struct ast_custom_function aes_encrypt_function = {
 | |
| 	.name = "AES_ENCRYPT",
 | |
| 	.read = aes_buf_helper,
 | |
| 	.read2 = aes_str_helper,
 | |
| };
 | |
| 
 | |
| static struct ast_custom_function aes_decrypt_function = {
 | |
| 	.name = "AES_DECRYPT",
 | |
| 	.read = aes_buf_helper,
 | |
| 	.read2 = aes_str_helper,
 | |
| };
 | |
| 
 | |
| static int unload_module(void)
 | |
| {
 | |
| 	int res = ast_custom_function_unregister(&aes_decrypt_function);
 | |
| 	return res | ast_custom_function_unregister(&aes_encrypt_function);
 | |
| }
 | |
| 
 | |
| static int load_module(void)
 | |
| {
 | |
| 	int res = ast_custom_function_register(&aes_decrypt_function);
 | |
| 	res |= ast_custom_function_register(&aes_encrypt_function);
 | |
| 	return res ? AST_MODULE_LOAD_DECLINE : AST_MODULE_LOAD_SUCCESS;
 | |
| }
 | |
| 
 | |
| AST_MODULE_INFO_STANDARD(ASTERISK_GPL_KEY, "AES dialplan functions");
 |