summaryrefslogtreecommitdiff
path: root/plugins/MirOTR/libotr-3.2.0/toolkit/otr_readforge.c
diff options
context:
space:
mode:
Diffstat (limited to 'plugins/MirOTR/libotr-3.2.0/toolkit/otr_readforge.c')
-rw-r--r--plugins/MirOTR/libotr-3.2.0/toolkit/otr_readforge.c133
1 files changed, 0 insertions, 133 deletions
diff --git a/plugins/MirOTR/libotr-3.2.0/toolkit/otr_readforge.c b/plugins/MirOTR/libotr-3.2.0/toolkit/otr_readforge.c
deleted file mode 100644
index 203001cf92..0000000000
--- a/plugins/MirOTR/libotr-3.2.0/toolkit/otr_readforge.c
+++ /dev/null
@@ -1,133 +0,0 @@
-/*
- * Off-the-Record Messaging Toolkit
- * Copyright (C) 2004-2008 Ian Goldberg, Chris Alexander, Nikita Borisov
- * <otr@cypherpunks.ca>
- *
- * This program is free software; you can redistribute it and/or modify
- * it under the terms of version 2 of the GNU General Public License as
- * published by the Free Software Foundation.
- *
- * This program is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- * GNU General Public License for more details.
- *
- * You should have received a copy of the GNU General Public License
- * along with this program; if not, write to the Free Software
- * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
- */
-
-/* system headers */
-#include <stdio.h>
-#include <stdlib.h>
-
-/* libotr headers */
-#include "proto.h"
-
-/* toolkit headers */
-#include "readotr.h"
-#include "parse.h"
-#include "sesskeys.h"
-#include "sha1hmac.h"
-#include "ctrmode.h"
-
-static void usage(const char *progname)
-{
- fprintf(stderr, "Usage: %s aeskey [new_message]\n"
-"Read an OTR Data Message from stdin. Use the given AES key to\n"
-"verify its MAC and decrypt the message to stdout. If new_message\n"
-"is given, output a new OTR Data Message with the same fields as the\n"
-"original, but with the message replaced by new_message\n", progname);
- exit(1);
-}
-
-int main(int argc, char **argv)
-{
- unsigned char *aeskey;
- unsigned char mackey[20];
- unsigned char macval[20];
- size_t aeskeylen;
- unsigned char *plaintext, *ciphertext;
- char *otrmsg = NULL;
- DataMsg datamsg;
-
- if (argc != 2 && argc != 3) {
- usage(argv[0]);
- }
-
- argv_to_buf(&aeskey, &aeskeylen, argv[1]);
- if (!aeskey) {
- usage(argv[0]);
- }
-
- if (aeskeylen != 16) {
- fprintf(stderr, "The AES key must be 32 hex chars long.\n");
- usage(argv[0]);
- }
-
- otrmsg = readotr(stdin);
- if (otrmsg == NULL) {
- fprintf(stderr, "No OTR Data Message found on stdin.\n");
- exit(1);
- }
-
- if (otrl_proto_message_type(otrmsg) != OTRL_MSGTYPE_DATA) {
- fprintf(stderr, "OTR Non-Data Message found on stdin.\n");
- exit(1);
- }
-
- datamsg = parse_datamsg(otrmsg);
- free(otrmsg);
- if (datamsg == NULL) {
- fprintf(stderr, "Invalid OTR Data Message found on stdin.\n");
- exit(1);
- }
-
- /* Create the MAC key */
- sesskeys_make_mac(mackey, aeskey);
-
- /* Check the MAC */
- sha1hmac(macval, mackey, datamsg->macstart,
- datamsg->macend - datamsg->macstart);
- if (memcmp(macval, datamsg->mac, 20)) {
- fprintf(stderr, "MAC does not verify: wrong AES key?\n");
- } else {
- /* Decrypt the message */
- plaintext = malloc(datamsg->encmsglen+1);
- if (!plaintext) {
- fprintf(stderr, "Out of memory!\n");
- exit(1);
- }
- aes_ctr_crypt(plaintext, datamsg->encmsg, datamsg->encmsglen,
- aeskey, datamsg->ctr);
- plaintext[datamsg->encmsglen] = '\0';
- printf("Plaintext: ``%s''\n", plaintext);
- free(plaintext);
- }
-
- /* Do we want to forge a message? */
- if (argv[2] != NULL) {
- char *newdatamsg;
- size_t newlen = strlen(argv[2]);
- ciphertext = malloc(newlen);
- if (!ciphertext && newlen > 0) {
- fprintf(stderr, "Out of memory!\n");
- exit(1);
- }
- aes_ctr_crypt(ciphertext, (const unsigned char *)argv[2], newlen,
- aeskey, datamsg->ctr);
- free(datamsg->encmsg);
- datamsg->encmsg = ciphertext;
- datamsg->encmsglen = newlen;
-
- newdatamsg = remac_datamsg(datamsg, mackey);
-
- printf("%s\n", newdatamsg);
- free(newdatamsg);
- }
-
- free_datamsg(datamsg);
- free(aeskey);
- fflush(stdout);
- return 0;
-}