00001
00002
00003
00004
00005
00006
00007
00008
00009
00010
00011
00012
00013
00014
00015
00016
00017
00018
00019
00020
00021
00022
00023
00024
00025
00026 #include "asterisk.h"
00027
00028 ASTERISK_FILE_VERSION(__FILE__, "$Revision: 301848 $")
00029
00030 #include "asterisk/module.h"
00031 #include "asterisk/pbx.h"
00032 #include "asterisk/app.h"
00033 #include "asterisk/aes.h"
00034
00035 #define AES_BLOCK_SIZE 16
00036
00037
00038
00039
00040
00041
00042
00043
00044
00045
00046
00047
00048
00049
00050
00051
00052
00053
00054
00055
00056
00057
00058
00059
00060
00061
00062
00063
00064
00065
00066
00067
00068
00069
00070
00071
00072
00073
00074
00075
00076
00077
00078
00079
00080
00081
00082
00083 static int aes_helper(struct ast_channel *chan, const char *cmd, char *data,
00084 char *buf, size_t len)
00085 {
00086 unsigned char curblock[AES_BLOCK_SIZE] = { 0, };
00087 char *tmp;
00088 char *tmpP;
00089 int data_len, encrypt;
00090 ast_aes_encrypt_key ecx;
00091 ast_aes_decrypt_key dcx;
00092
00093 AST_DECLARE_APP_ARGS(args,
00094 AST_APP_ARG(key);
00095 AST_APP_ARG(data);
00096 );
00097
00098 AST_STANDARD_APP_ARGS(args, data);
00099
00100 if (ast_strlen_zero(args.data) || ast_strlen_zero(args.key)) {
00101 ast_log(LOG_WARNING, "Syntax: %s(<key>,<data>) - missing argument!\n", cmd);
00102 return -1;
00103 }
00104
00105 if (strlen(args.key) != AES_BLOCK_SIZE) {
00106 ast_log(LOG_WARNING, "Syntax: %s(<key>,<data>) - <key> parameter must be exactly 16 characters!\n", cmd);
00107 return -1;
00108 }
00109
00110 ast_aes_encrypt_key((unsigned char *) args.key, &ecx);
00111 ast_aes_decrypt_key((unsigned char *) args.key, &dcx);
00112 tmp = ast_calloc(1, len);
00113 tmpP = tmp;
00114 encrypt = strcmp("AES_DECRYPT", cmd);
00115
00116 if (encrypt) {
00117 ast_copy_string(tmp, args.data, len);
00118 data_len = strlen(tmp);
00119 } else {
00120 data_len = ast_base64decode((unsigned char *) tmp, args.data, len);
00121 }
00122
00123 if (data_len >= len) {
00124 ast_log(LOG_WARNING, "Syntax: %s(<keys>,<data>) - <data> exceeds buffer length. Result may be truncated!\n", cmd);
00125 data_len = len - 1;
00126 }
00127
00128 while (data_len > 0) {
00129 memset(curblock, 0, AES_BLOCK_SIZE);
00130 memcpy(curblock, tmpP, (data_len < AES_BLOCK_SIZE) ? data_len : AES_BLOCK_SIZE);
00131 if (encrypt) {
00132 ast_aes_encrypt(curblock, (unsigned char *) tmpP, &ecx);
00133 } else {
00134 ast_aes_decrypt(curblock, (unsigned char *) tmpP, &dcx);
00135 }
00136 tmpP += AES_BLOCK_SIZE;
00137 data_len -= AES_BLOCK_SIZE;
00138 }
00139
00140 if (encrypt) {
00141 ast_base64encode(buf, (unsigned char *) tmp, strlen(tmp), len);
00142 } else {
00143 memcpy(buf, tmp, len);
00144 }
00145 ast_free(tmp);
00146
00147 return 0;
00148 }
00149
00150 static struct ast_custom_function aes_encrypt_function = {
00151 .name = "AES_ENCRYPT",
00152 .read = aes_helper,
00153 };
00154
00155 static struct ast_custom_function aes_decrypt_function = {
00156 .name = "AES_DECRYPT",
00157 .read = aes_helper,
00158 };
00159
00160 static int unload_module(void)
00161 {
00162 int res = ast_custom_function_unregister(&aes_decrypt_function);
00163 return res | ast_custom_function_unregister(&aes_encrypt_function);
00164 }
00165
00166 static int load_module(void)
00167 {
00168 int res = ast_custom_function_register(&aes_decrypt_function);
00169 res |= ast_custom_function_register(&aes_encrypt_function);
00170 return res ? AST_MODULE_LOAD_DECLINE : AST_MODULE_LOAD_SUCCESS;
00171 }
00172
00173 AST_MODULE_INFO_STANDARD(ASTERISK_GPL_KEY, "AES dialplan functions");