aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
-rw-r--r--lib/arc.c27
-rw-r--r--lib/arc.h4
-rw-r--r--storage_xml.c2
-rw-r--r--tests/check_arc.c35
4 files changed, 50 insertions, 18 deletions
diff --git a/lib/arc.c b/lib/arc.c
index 617f6b96..fd498454 100644
--- a/lib/arc.c
+++ b/lib/arc.c
@@ -130,18 +130,40 @@ unsigned char arc_getbyte( struct arc_state *st )
don't need it anymore.
Both functions return the number of bytes in the result string.
+
+ Note that if you use the pad_to argument, you will need zero-termi-
+ nation to find back the original string length after decryption. So
+ it shouldn't be used if your string contains \0s by itself!
*/
-int arc_encode( char *clear, int clear_len, unsigned char **crypt, char *password )
+int arc_encode( char *clear, int clear_len, unsigned char **crypt, char *password, int pad_to )
{
struct arc_state *st;
unsigned char *key;
- int key_len, i;
+ char *padded = NULL;
+ int key_len, i, padded_len;
key_len = strlen( password ) + ARC_IV_LEN;
if( clear_len <= 0 )
clear_len = strlen( clear );
+ /* Pad the string to the closest multiple of pad_to. This makes it
+ impossible to see the exact length of the password. */
+ if( pad_to > 0 && ( clear_len % pad_to ) > 0 )
+ {
+ padded_len = clear_len + pad_to - ( clear_len % pad_to );
+ padded = g_malloc( padded_len );
+ memcpy( padded, clear, clear_len );
+
+ /* First a \0 and then random data, so we don't have to do
+ anything special when decrypting. */
+ padded[clear_len] = 0;
+ random_bytes( (unsigned char*) padded + clear_len + 1, padded_len - clear_len - 1 );
+
+ clear = padded;
+ clear_len = padded_len;
+ }
+
/* Prepare buffers and the key + IV */
*crypt = g_malloc( clear_len + ARC_IV_LEN );
key = g_malloc( key_len );
@@ -160,6 +182,7 @@ int arc_encode( char *clear, int clear_len, unsigned char **crypt, char *passwor
crypt[0][i+ARC_IV_LEN] = clear[i] ^ arc_getbyte( st );
g_free( st );
+ g_free( padded );
return clear_len + ARC_IV_LEN;
}
diff --git a/lib/arc.h b/lib/arc.h
index 882372ed..58f30d3d 100644
--- a/lib/arc.h
+++ b/lib/arc.h
@@ -30,7 +30,7 @@ struct arc_state
unsigned char i, j;
};
-struct arc_state *arc_keymaker( unsigned char *key, int kl, int cycles );
+G_GNUC_MALLOC struct arc_state *arc_keymaker( unsigned char *key, int kl, int cycles );
unsigned char arc_getbyte( struct arc_state *st );
-int arc_encode( char *clear, int clear_len, unsigned char **crypt, char *password );
+int arc_encode( char *clear, int clear_len, unsigned char **crypt, char *password, int pad_to );
int arc_decode( unsigned char *crypt, int crypt_len, char **clear, char *password );
diff --git a/storage_xml.c b/storage_xml.c
index 19070a74..6ea4d442 100644
--- a/storage_xml.c
+++ b/storage_xml.c
@@ -427,7 +427,7 @@ static storage_status_t xml_save( irc_t *irc, int overwrite )
char *pass_b64;
int pass_len;
- pass_len = arc_encode( acc->pass, strlen( acc->pass ), (unsigned char**) &pass_cr, irc->password );
+ pass_len = arc_encode( acc->pass, strlen( acc->pass ), (unsigned char**) &pass_cr, irc->password, 12 );
pass_b64 = base64_encode( pass_cr, pass_len );
g_free( pass_cr );
diff --git a/tests/check_arc.c b/tests/check_arc.c
index a430f899..9d913dcd 100644
--- a/tests/check_arc.c
+++ b/tests/check_arc.c
@@ -6,13 +6,14 @@
#include <stdio.h>
#include "arc.h"
-char *password = "TotT";
+char *password = "ArcVier";
char *clear_tests[] =
{
"Wie dit leest is gek :-)",
"ItllBeBitlBee",
"One more boring password",
+ "Hoi hoi",
NULL
};
@@ -27,7 +28,7 @@ static void check_codec(int l)
char *decrypted;
int len;
- len = arc_encode( clear_tests[i], 0, &crypted, password );
+ len = arc_encode( clear_tests[i], 0, &crypted, password, 12 );
len = arc_decode( crypted, len, &decrypted, password );
fail_if( strcmp( clear_tests[i], decrypted ) != 0,
@@ -40,27 +41,35 @@ static void check_codec(int l)
struct
{
- unsigned char crypted[24];
+ unsigned char crypted[30];
int len;
char *decrypted;
} decrypt_tests[] = {
+ /* One block with padding. */
{
{
- 0xc3, 0x0d, 0x43, 0xc3, 0xee, 0x80, 0xe2, 0x8c, 0x0b, 0x29, 0x32, 0x7e,
- 0x38, 0x05, 0x82, 0x10, 0x21, 0x1c, 0x4a, 0x00, 0x2c
- }, 21, "Debugging sucks"
+ 0x3f, 0x79, 0xb0, 0xf5, 0x91, 0x56, 0xd2, 0x1b, 0xd1, 0x4b, 0x67, 0xac,
+ 0xb1, 0x31, 0xc9, 0xdb, 0xf9, 0xaa
+ }, 18, "short pass"
},
+
+ /* Two blocks with padding. */
{
{
- 0xb0, 0x00, 0x57, 0x0d, 0x0d, 0x0d, 0x70, 0xe1, 0xc0, 0x00, 0xa4, 0x25,
- 0x7d, 0xbe, 0x03, 0xcc, 0x24, 0xd1, 0x0c
- }, 19, "Testing rocks"
+ 0xf9, 0xa6, 0xec, 0x5d, 0xc7, 0x06, 0xb8, 0x6b, 0x63, 0x9f, 0x2d, 0xb5,
+ 0x7d, 0xaa, 0x32, 0xbb, 0xd8, 0x08, 0xfd, 0x81, 0x2e, 0xca, 0xb4, 0xd7,
+ 0x2f, 0x36, 0x9c, 0xac, 0xa0, 0xbc
+ }, 30, "longer password"
},
+
+ /* This string is exactly two "blocks" long, to make sure unpadded strings also decrypt
+ properly. */
{
{
- 0xb6, 0x92, 0x59, 0xe4, 0xf9, 0xc1, 0x7a, 0xf6, 0xf3, 0x18, 0xea, 0x28,
- 0x73, 0x6d, 0xb3, 0x0a, 0x6f, 0x0a, 0x2b, 0x43, 0x57, 0xe9, 0x3e, 0x63
- }, 24, "OSCAR is creepy..."
+ 0x95, 0x4d, 0xcf, 0x4d, 0x5e, 0x6c, 0xcf, 0xef, 0xb9, 0x80, 0x00, 0xef,
+ 0x25, 0xe9, 0x17, 0xf6, 0x29, 0x6a, 0x82, 0x79, 0x1c, 0xca, 0x68, 0xb5,
+ 0x4e, 0xd0, 0xc1, 0x41, 0x8e, 0xe6
+ }, 30, "OSCAR is really creepy.."
},
{ "", 0, NULL }
};
@@ -79,7 +88,7 @@ static void check_decod(int l)
&decrypted, password );
fail_if( strcmp( decrypt_tests[i].decrypted, decrypted ) != 0,
- "%s didn't decrypt properly", clear_tests[i] );
+ "`%s' didn't decrypt properly", decrypt_tests[i].decrypted );
g_free( decrypted );
}