[or-cvs] r10633: refined documentation, checked spaces (tor/branches/114-dist-storage/src/common)

kloesing at seul.org kloesing at seul.org
Sun Jun 17 12:40:30 UTC 2007


Author: kloesing
Date: 2007-06-17 08:40:29 -0400 (Sun, 17 Jun 2007)
New Revision: 10633

Modified:
   tor/branches/114-dist-storage/src/common/crypto.c
   tor/branches/114-dist-storage/src/common/crypto.h
Log:
refined documentation, checked spaces

Modified: tor/branches/114-dist-storage/src/common/crypto.c
===================================================================
--- tor/branches/114-dist-storage/src/common/crypto.c	2007-06-17 11:07:22 UTC (rev 10632)
+++ tor/branches/114-dist-storage/src/common/crypto.c	2007-06-17 12:40:29 UTC (rev 10633)
@@ -1148,46 +1148,44 @@
  * <b>key</b> of 16 bytes length to <b>to</b>. The length of <b>to</b> needs to
  * be the length of <b>from</b> plus 32 (up to 16 bytes for padding and exactly
  * 16 bytes for the initialization vector). On success, return the number of
- * bytes written, on failure, return -1  
+ * bytes written, on failure, return -1.
  */
 int
 crypto_cipher_encrypt_cbc(char *key, char *to, const char *from,
                           size_t fromlen)
 {
-  
-  int outlen, tmplen;
-  unsigned char iv[16];
-  EVP_CIPHER_CTX ctx;
 
+  EVP_CIPHER_CTX ctx; /* cipher context */
+  unsigned char iv[16]; /* initialization vector */
+  int outlen, tmplen; /* lengths of encrypted strings (w/ and wo/ final data) */
+
   tor_assert(key);
   tor_assert(to);
   tor_assert(from);
   tor_assert(fromlen);
 
+  /* initialize cipher contex */
+  EVP_CIPHER_CTX_init(&ctx);
+
   /* generate random initialization vector and write it to the first 16 bytes
    * of the result*/
   crypto_rand((char *)iv, 16);
-
-  /* copy initialization vector to result */
   memcpy((unsigned char *)to, iv, 16);
 
-  /* initialize cipher contex */
-  EVP_CIPHER_CTX_init(&ctx);
-
   /* set up cipher context for encryption with cipher type AES-128 in CBC mode,
    * default implementation, given key, and initialization vector */
   EVP_EncryptInit_ex(&ctx, EVP_aes_128_cbc(), NULL, (unsigned char *)key, iv);
 
   /* encrypt fromlen bytes from buffer from and write the encrypted version to
    * buffer to */
-  if(!EVP_EncryptUpdate(&ctx, ((unsigned char *)to) + 16, &outlen,
+  if (!EVP_EncryptUpdate(&ctx, ((unsigned char *)to) + 16, &outlen,
                         (const unsigned char *)from, (int)fromlen)) {
     crypto_log_errors(LOG_WARN, "encrypting");
     return -1;
   }
 
   /* encrypt the final data */
-  if(!EVP_EncryptFinal_ex(&ctx, ((unsigned char *)to) + 16 + outlen, &tmplen)) {
+  if (!EVP_EncryptFinal_ex(&ctx, ((unsigned char *)to)+16+outlen, &tmplen)) {
     crypto_log_errors(LOG_WARN, "encrypting the final data");
     return -1;
   }
@@ -1205,43 +1203,42 @@
  * <b>key</b> of 16 bytes length to <b>to</b>. The length of <b>to</b> may be
  * the length of <b>from</b> minus 16 (up to 16 bytes for padding and exactly
  * 16 bytes for the initialization vector). On success, return the number of
- * bytes written, on failure, return -1  
+ * bytes written, on failure, return -1.
  */
 int
 crypto_cipher_decrypt_cbc(char *key, char *to, const char *from,
                           size_t fromlen)
 {
-  
-  int outlen, tmplen;
-  unsigned char iv[16];
-  EVP_CIPHER_CTX ctx;
+  EVP_CIPHER_CTX ctx; /* cipher context */
+  unsigned char iv[16]; /* initialization vector */
+  int outlen, tmplen; /* lengths of decrypted strings (w/ and wo/ final data) */
 
   tor_assert(key);
   tor_assert(to);
   tor_assert(from);
   tor_assert(fromlen);
 
-  /* copy initialization vector from buffer */
-  memcpy(iv, (unsigned const char *)from, 16);
-
   /* initialize cipher contex */
   EVP_CIPHER_CTX_init(&ctx);
 
+  /* copy initialization vector from buffer */
+  memcpy(iv, (unsigned const char *)from, 16);
+
   /* set up cipher context for decryption with cipher type AES-128 in CBC mode,
    * default implementation, given key, and initialization vector */
   EVP_DecryptInit_ex(&ctx, EVP_aes_128_cbc(), NULL, (unsigned char *)key, iv);
 
   /* decrypt fromlen-16 bytes from buffer from and write the decrypted version
    * to buffer to */
-  if(!EVP_DecryptUpdate(&ctx, (unsigned char *)to, &outlen,
+  if (!EVP_DecryptUpdate(&ctx, (unsigned char *)to, &outlen,
                         ((const unsigned char *)from) + 16,
                         (int)fromlen - 16)) {
     crypto_log_errors(LOG_WARN, "decrypting");
     return -1;
   }
 
-  /* encrypt the final data */
-  if(!EVP_DecryptFinal_ex(&ctx, ((unsigned char *)to) + outlen, &tmplen)) {
+  /* decrypt the final data */
+  if (!EVP_DecryptFinal_ex(&ctx, ((unsigned char *)to) + outlen, &tmplen)) {
     crypto_log_errors(LOG_WARN, "decrypting the final data");
     return -1;
   }
@@ -1923,14 +1920,12 @@
   unsigned int nbits, i, j, bit;
   char *tmp;
   nbits = srclen * 5;
-  
-  //log_warn(LD_DIR, "srclen is %d, nbits is %d", srclen, nbits); 
-  
+
   tor_assert((nbits%8) == 0); /* We need an even multiple of 8 bits. */
   tor_assert((nbits/8) <= destlen); /* We need enough space. */
   tor_assert(destlen < SIZE_T_CEILING);
-  
-  /* convert base32 encoded chars by the 5-bit values that they represent */
+
+  /* convert base32 encoded chars to the 5-bit values that they represent */
   tmp = tor_malloc_zero(srclen);
   for (j = 0; j < srclen; ++j) {
     if (src[j] > 0x60 && src[j] < 0x7B) tmp[j] = src[j] - 0x61;
@@ -1940,12 +1935,12 @@
       return -1;
     }
   }
-  
+
   /* assemble result byte-wise by applying the five possible cases */
   for (i = 0, bit = 0; bit < nbits; ++i, bit += 8) {
     switch (bit % 40) {
     case 0:
-      dest[i] = (((uint8_t)tmp[(bit/5)]) << 3) + 
+      dest[i] = (((uint8_t)tmp[(bit/5)]) << 3) +
                 (((uint8_t)tmp[(bit/5)+1]) >> 2);
       break;
     case 8:
@@ -1968,7 +1963,7 @@
       break;
     }
   }
-  
+
   tor_free(tmp);
   tmp = NULL;
   return 0;

Modified: tor/branches/114-dist-storage/src/common/crypto.h
===================================================================
--- tor/branches/114-dist-storage/src/common/crypto.h	2007-06-17 11:07:22 UTC (rev 10632)
+++ tor/branches/114-dist-storage/src/common/crypto.h	2007-06-17 12:40:29 UTC (rev 10633)
@@ -123,7 +123,7 @@
                           const char *from, size_t fromlen);
 int crypto_cipher_decrypt(crypto_cipher_env_t *env, char *to,
                           const char *from, size_t fromlen);
-                          
+
 int crypto_cipher_encrypt_cbc(char *key, char *to, const char *from,
                               size_t fromlen);
 int crypto_cipher_decrypt_cbc(char *key, char *to, const char *from,



More information about the tor-commits mailing list