00001
00002
00003
00004
00005
00006
00007
00008
00009
00010
00011
00012
00013
00014
00015
00016
00017
00018
00019
00020
00021
00022
00023
00024
00025
00026 #include "asterisk.h"
00027
00028 ASTERISK_FILE_VERSION(__FILE__, "$Revision: 172548 $")
00029
00030 #include "asterisk/module.h"
00031 #include "asterisk/pbx.h"
00032 #include "asterisk/app.h"
00033 #include "asterisk/aes.h"
00034
00035 #define AES_BLOCK_SIZE 16
00036
00037
00038
00039
00040
00041
00042
00043
00044
00045
00046
00047
00048
00049
00050
00051
00052
00053
00054
00055
00056
00057
00058
00059
00060
00061
00062
00063
00064
00065
00066
00067
00068
00069
00070
00071
00072
00073 static int aes_helper(struct ast_channel *chan, const char *cmd, char *data,
00074 char *buf, size_t len)
00075 {
00076 unsigned char curblock[AES_BLOCK_SIZE] = { 0, };
00077 char *tmp;
00078 char *tmpP;
00079 int data_len, encrypt;
00080 ast_aes_encrypt_key ecx;
00081 ast_aes_decrypt_key dcx;
00082
00083 AST_DECLARE_APP_ARGS(args,
00084 AST_APP_ARG(key);
00085 AST_APP_ARG(data);
00086 );
00087
00088 AST_STANDARD_APP_ARGS(args, data);
00089
00090 if (ast_strlen_zero(args.data) || ast_strlen_zero(args.key)) {
00091 ast_log(LOG_WARNING, "Syntax: %s(<key>,<data>) - missing argument!\n", cmd);
00092 return -1;
00093 }
00094
00095 if (strlen(args.key) != AES_BLOCK_SIZE) {
00096 ast_log(LOG_WARNING, "Syntax: %s(<key>,<data>) - <key> parameter must be exactly 16 characters!\n", cmd);
00097 return -1;
00098 }
00099
00100 ast_aes_encrypt_key((unsigned char *) args.key, &ecx);
00101 ast_aes_decrypt_key((unsigned char *) args.key, &dcx);
00102 tmp = ast_calloc(1, len);
00103 tmpP = tmp;
00104 encrypt = strcmp("AES_DECRYPT", cmd);
00105
00106 if (encrypt) {
00107 ast_copy_string(tmp, args.data, len);
00108 data_len = strlen(tmp);
00109 } else {
00110 data_len = ast_base64decode((unsigned char *) tmp, args.data, len);
00111 }
00112
00113 if (data_len >= len) {
00114 ast_log(LOG_WARNING, "Syntax: %s(<keys>,<data>) - <data> exceeds buffer length. Result may be truncated!\n", cmd);
00115 data_len = len - 1;
00116 }
00117
00118 while (data_len > 0) {
00119 memset(curblock, 0, AES_BLOCK_SIZE);
00120 memcpy(curblock, tmpP, (data_len < AES_BLOCK_SIZE) ? data_len : AES_BLOCK_SIZE);
00121 if (encrypt) {
00122 ast_aes_encrypt(curblock, (unsigned char *) tmpP, &ecx);
00123 } else {
00124 ast_aes_decrypt(curblock, (unsigned char *) tmpP, &dcx);
00125 }
00126 tmpP += AES_BLOCK_SIZE;
00127 data_len -= AES_BLOCK_SIZE;
00128 }
00129
00130 if (encrypt) {
00131 ast_base64encode(buf, (unsigned char *) tmp, strlen(tmp), len);
00132 } else {
00133 memcpy(buf, tmp, len);
00134 }
00135 ast_free(tmp);
00136
00137 return 0;
00138 }
00139
00140 static struct ast_custom_function aes_encrypt_function = {
00141 .name = "AES_ENCRYPT",
00142 .read = aes_helper,
00143 };
00144
00145 static struct ast_custom_function aes_decrypt_function = {
00146 .name = "AES_DECRYPT",
00147 .read = aes_helper,
00148 };
00149
00150 static int unload_module(void)
00151 {
00152 int res = ast_custom_function_unregister(&aes_decrypt_function);
00153 return res | ast_custom_function_unregister(&aes_encrypt_function);
00154 }
00155
00156 static int load_module(void)
00157 {
00158 int res = ast_custom_function_register(&aes_decrypt_function);
00159 res |= ast_custom_function_register(&aes_encrypt_function);
00160 return res ? AST_MODULE_LOAD_DECLINE : AST_MODULE_LOAD_SUCCESS;
00161 }
00162
00163 AST_MODULE_INFO_STANDARD(ASTERISK_GPL_KEY, "AES dialplan functions");