00001
00002
00003
00004
00005
00006
00007
00008
00009
00010
00011
00012
00013
00014
00015
00016
00017
00018
00019
00020
00021
00022
00023
00024
00025
00026
00027
00028
00029 #include "asterisk.h"
00030
00031 ASTERISK_FILE_VERSION(__FILE__, "$Revision: 301849 $")
00032
00033 #include "asterisk/module.h"
00034 #include "asterisk/pbx.h"
00035 #include "asterisk/app.h"
00036 #include "asterisk/crypto.h"
00037
00038 #define AES_BLOCK_SIZE 16
00039
00040
00041
00042
00043
00044
00045
00046
00047
00048
00049
00050
00051
00052
00053
00054
00055
00056
00057
00058
00059
00060
00061
00062
00063
00064
00065
00066
00067
00068
00069
00070
00071
00072
00073
00074
00075
00076
00077
00078
00079
00080
00081
00082
00083
00084
00085
00086 static int aes_helper(struct ast_channel *chan, const char *cmd, char *data,
00087 char *buf, size_t len)
00088 {
00089 unsigned char curblock[AES_BLOCK_SIZE] = { 0, };
00090 char *tmp;
00091 char *tmpP;
00092 int data_len, encrypt;
00093 ast_aes_encrypt_key ecx;
00094 ast_aes_decrypt_key dcx;
00095
00096 AST_DECLARE_APP_ARGS(args,
00097 AST_APP_ARG(key);
00098 AST_APP_ARG(data);
00099 );
00100
00101 AST_STANDARD_APP_ARGS(args, data);
00102
00103 if (ast_strlen_zero(args.data) || ast_strlen_zero(args.key)) {
00104 ast_log(LOG_WARNING, "Syntax: %s(<key>,<data>) - missing argument!\n", cmd);
00105 return -1;
00106 }
00107
00108 if (strlen(args.key) != AES_BLOCK_SIZE) {
00109 ast_log(LOG_WARNING, "Syntax: %s(<key>,<data>) - <key> parameter must be exactly 16 characters!\n", cmd);
00110 return -1;
00111 }
00112
00113 ast_aes_set_encrypt_key((unsigned char *) args.key, &ecx);
00114 ast_aes_set_decrypt_key((unsigned char *) args.key, &dcx);
00115 tmp = ast_calloc(1, len);
00116 tmpP = tmp;
00117 encrypt = strcmp("AES_DECRYPT", cmd);
00118
00119 if (encrypt) {
00120 ast_copy_string(tmp, args.data, len);
00121 data_len = strlen(tmp);
00122 } else {
00123 data_len = ast_base64decode((unsigned char *) tmp, args.data, len);
00124 }
00125
00126 if (data_len >= len) {
00127 ast_log(LOG_WARNING, "Syntax: %s(<keys>,<data>) - <data> exceeds buffer length. Result may be truncated!\n", cmd);
00128 data_len = len - 1;
00129 }
00130
00131 while (data_len > 0) {
00132 memset(curblock, 0, AES_BLOCK_SIZE);
00133 memcpy(curblock, tmpP, (data_len < AES_BLOCK_SIZE) ? data_len : AES_BLOCK_SIZE);
00134 if (encrypt) {
00135 ast_aes_encrypt(curblock, (unsigned char *) tmpP, &ecx);
00136 } else {
00137 ast_aes_decrypt(curblock, (unsigned char *) tmpP, &dcx);
00138 }
00139 tmpP += AES_BLOCK_SIZE;
00140 data_len -= AES_BLOCK_SIZE;
00141 }
00142
00143 if (encrypt) {
00144 ast_base64encode(buf, (unsigned char *) tmp, strlen(tmp), len);
00145 } else {
00146 memcpy(buf, tmp, len);
00147 }
00148 ast_free(tmp);
00149
00150 return 0;
00151 }
00152
00153 static struct ast_custom_function aes_encrypt_function = {
00154 .name = "AES_ENCRYPT",
00155 .read = aes_helper,
00156 };
00157
00158 static struct ast_custom_function aes_decrypt_function = {
00159 .name = "AES_DECRYPT",
00160 .read = aes_helper,
00161 };
00162
00163 static int unload_module(void)
00164 {
00165 int res = ast_custom_function_unregister(&aes_decrypt_function);
00166 return res | ast_custom_function_unregister(&aes_encrypt_function);
00167 }
00168
00169 static int load_module(void)
00170 {
00171 int res = ast_custom_function_register(&aes_decrypt_function);
00172 res |= ast_custom_function_register(&aes_encrypt_function);
00173 return res ? AST_MODULE_LOAD_DECLINE : AST_MODULE_LOAD_SUCCESS;
00174 }
00175
00176 AST_MODULE_INFO(ASTERISK_GPL_KEY, AST_MODFLAG_DEFAULT, "AES dialplan functions",
00177 .load = load_module,
00178 .unload = unload_module,
00179 .nonoptreq = "res_crypto",
00180 );