blob: 0164f1ce9d07716536b2c4b65b674686839d41a9 [file] [log] [blame]
Bram Moolenaaredf3f972016-08-29 22:49:24 +02001/* vi:set ts=8 sts=4 sw=4 noet:
Bram Moolenaar8f4ac012014-08-10 13:38:34 +02002 *
3 * VIM - Vi IMproved by Bram Moolenaar
4 *
5 * Do ":help uganda" in Vim to read copying and usage conditions.
6 * Do ":help credits" in Vim to see a list of people who contributed.
7 * See README.txt for an overview of the Vim source code.
8 */
9
10/*
11 * crypt.c: Generic encryption support.
12 */
13#include "vim.h"
14
15#if defined(FEAT_CRYPT) || defined(PROTO)
16/*
17 * Optional encryption support.
18 * Mohsin Ahmed, mosh@sasi.com, 1998-09-24
19 * Based on zip/crypt sources.
20 * Refactored by David Leadbeater, 2014.
21 *
22 * NOTE FOR USA: Since 2000 exporting this code from the USA is allowed to
23 * most countries. There are a few exceptions, but that still should not be a
24 * problem since this code was originally created in Europe and India.
25 *
26 * Blowfish addition originally made by Mohsin Ahmed,
27 * http://www.cs.albany.edu/~mosh 2010-03-14
28 * Based on blowfish by Bruce Schneier (http://www.schneier.com/blowfish.html)
29 * and sha256 by Christophe Devine.
30 */
31
32typedef struct {
Bram Moolenaarc667da52019-11-30 20:52:27 +010033 char *name; // encryption name as used in 'cryptmethod'
34 char *magic; // magic bytes stored in file header
35 int salt_len; // length of salt, or 0 when not using salt
36 int seed_len; // length of seed, or 0 when not using salt
Bram Moolenaar987411d2019-01-18 22:48:34 +010037#ifdef CRYPT_NOT_INPLACE
Bram Moolenaarc667da52019-11-30 20:52:27 +010038 int works_inplace; // encryption/decryption can be done in-place
Bram Moolenaar987411d2019-01-18 22:48:34 +010039#endif
Bram Moolenaarc667da52019-11-30 20:52:27 +010040 int whole_undofile; // whole undo file is encrypted
Bram Moolenaar8f4ac012014-08-10 13:38:34 +020041
Bram Moolenaarc667da52019-11-30 20:52:27 +010042 // Optional function pointer for a self-test.
Bram Moolenaar8f4ac012014-08-10 13:38:34 +020043 int (* self_test_fn)();
44
Bram Moolenaarad3ec762019-04-21 00:00:13 +020045 // Function pointer for initializing encryption/decryption.
Bram Moolenaar6ee96582019-04-27 22:06:37 +020046 int (* init_fn)(cryptstate_T *state, char_u *key,
Bram Moolenaar8f4ac012014-08-10 13:38:34 +020047 char_u *salt, int salt_len, char_u *seed, int seed_len);
48
Bram Moolenaarc667da52019-11-30 20:52:27 +010049 // Function pointers for encoding/decoding from one buffer into another.
50 // Optional, however, these or the _buffer ones should be configured.
Bram Moolenaar8f4ac012014-08-10 13:38:34 +020051 void (*encode_fn)(cryptstate_T *state, char_u *from, size_t len,
52 char_u *to);
53 void (*decode_fn)(cryptstate_T *state, char_u *from, size_t len,
54 char_u *to);
55
Bram Moolenaarc667da52019-11-30 20:52:27 +010056 // Function pointers for encoding and decoding, can buffer data if needed.
57 // Optional (however, these or the above should be configured).
Bram Moolenaar8f4ac012014-08-10 13:38:34 +020058 long (*encode_buffer_fn)(cryptstate_T *state, char_u *from, size_t len,
59 char_u **newptr);
60 long (*decode_buffer_fn)(cryptstate_T *state, char_u *from, size_t len,
61 char_u **newptr);
62
Bram Moolenaarc667da52019-11-30 20:52:27 +010063 // Function pointers for in-place encoding and decoding, used for
64 // crypt_*_inplace(). "from" and "to" arguments will be equal.
65 // These may be the same as decode_fn and encode_fn above, however an
66 // algorithm may implement them in a way that is not interchangeable with
67 // the crypt_(en|de)code() interface (for example because it wishes to add
68 // padding to files).
69 // This method is used for swap and undo files which have a rigid format.
Bram Moolenaar8f4ac012014-08-10 13:38:34 +020070 void (*encode_inplace_fn)(cryptstate_T *state, char_u *p1, size_t len,
71 char_u *p2);
72 void (*decode_inplace_fn)(cryptstate_T *state, char_u *p1, size_t len,
73 char_u *p2);
74} cryptmethod_T;
75
Bram Moolenaarc667da52019-11-30 20:52:27 +010076// index is method_nr of cryptstate_T, CRYPT_M_*
Bram Moolenaar8f4ac012014-08-10 13:38:34 +020077static cryptmethod_T cryptmethods[CRYPT_M_COUNT] = {
Bram Moolenaarc667da52019-11-30 20:52:27 +010078 // PK_Zip; very weak
Bram Moolenaar8f4ac012014-08-10 13:38:34 +020079 {
80 "zip",
81 "VimCrypt~01!",
82 0,
83 0,
Bram Moolenaar987411d2019-01-18 22:48:34 +010084#ifdef CRYPT_NOT_INPLACE
Bram Moolenaar8f4ac012014-08-10 13:38:34 +020085 TRUE,
Bram Moolenaar987411d2019-01-18 22:48:34 +010086#endif
Bram Moolenaar8f4ac012014-08-10 13:38:34 +020087 FALSE,
88 NULL,
89 crypt_zip_init,
90 crypt_zip_encode, crypt_zip_decode,
91 NULL, NULL,
92 crypt_zip_encode, crypt_zip_decode,
93 },
94
Bram Moolenaarc667da52019-11-30 20:52:27 +010095 // Blowfish/CFB + SHA-256 custom key derivation; implementation issues.
Bram Moolenaar8f4ac012014-08-10 13:38:34 +020096 {
97 "blowfish",
98 "VimCrypt~02!",
99 8,
100 8,
Bram Moolenaar987411d2019-01-18 22:48:34 +0100101#ifdef CRYPT_NOT_INPLACE
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200102 TRUE,
Bram Moolenaar987411d2019-01-18 22:48:34 +0100103#endif
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200104 FALSE,
105 blowfish_self_test,
106 crypt_blowfish_init,
107 crypt_blowfish_encode, crypt_blowfish_decode,
108 NULL, NULL,
109 crypt_blowfish_encode, crypt_blowfish_decode,
110 },
111
Bram Moolenaarc667da52019-11-30 20:52:27 +0100112 // Blowfish/CFB + SHA-256 custom key derivation; fixed.
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200113 {
114 "blowfish2",
115 "VimCrypt~03!",
116 8,
117 8,
Bram Moolenaar987411d2019-01-18 22:48:34 +0100118#ifdef CRYPT_NOT_INPLACE
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200119 TRUE,
Bram Moolenaar987411d2019-01-18 22:48:34 +0100120#endif
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200121 TRUE,
122 blowfish_self_test,
123 crypt_blowfish_init,
124 crypt_blowfish_encode, crypt_blowfish_decode,
125 NULL, NULL,
126 crypt_blowfish_encode, crypt_blowfish_decode,
127 },
Bram Moolenaard23a8232018-02-10 18:45:26 +0100128
Bram Moolenaarc667da52019-11-30 20:52:27 +0100129 // NOTE: when adding a new method, use some random bytes for the magic key,
130 // to avoid that a text file is recognized as encrypted.
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200131};
132
Bram Moolenaarc667da52019-11-30 20:52:27 +0100133#define CRYPT_MAGIC_LEN 12 // cannot change
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200134static char crypt_magic_head[] = "VimCrypt~";
135
136/*
137 * Return int value for crypt method name.
138 * 0 for "zip", the old method. Also for any non-valid value.
139 * 1 for "blowfish".
140 * 2 for "blowfish2".
141 */
142 int
Bram Moolenaar7454a062016-01-30 15:14:10 +0100143crypt_method_nr_from_name(char_u *name)
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200144{
145 int i;
146
147 for (i = 0; i < CRYPT_M_COUNT; ++i)
148 if (STRCMP(name, cryptmethods[i].name) == 0)
149 return i;
150 return 0;
151}
152
153/*
154 * Get the crypt method used for a file from "ptr[len]", the magic text at the
155 * start of the file.
156 * Returns -1 when no encryption used.
157 */
158 int
Bram Moolenaar7454a062016-01-30 15:14:10 +0100159crypt_method_nr_from_magic(char *ptr, int len)
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200160{
161 int i;
162
163 if (len < CRYPT_MAGIC_LEN)
164 return -1;
165
166 for (i = 0; i < CRYPT_M_COUNT; i++)
167 if (memcmp(ptr, cryptmethods[i].magic, CRYPT_MAGIC_LEN) == 0)
168 return i;
169
170 i = (int)STRLEN(crypt_magic_head);
171 if (len >= i && memcmp(ptr, crypt_magic_head, i) == 0)
Bram Moolenaarf9e3e092019-01-13 23:38:42 +0100172 emsg(_("E821: File is encrypted with unknown method"));
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200173
174 return -1;
175}
176
Bram Moolenaar987411d2019-01-18 22:48:34 +0100177#ifdef CRYPT_NOT_INPLACE
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200178/*
179 * Return TRUE if the crypt method for "method_nr" can be done in-place.
180 */
181 int
Bram Moolenaar7454a062016-01-30 15:14:10 +0100182crypt_works_inplace(cryptstate_T *state)
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200183{
184 return cryptmethods[state->method_nr].works_inplace;
185}
Bram Moolenaar987411d2019-01-18 22:48:34 +0100186#endif
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200187
188/*
189 * Get the crypt method for buffer "buf" as a number.
190 */
191 int
Bram Moolenaar7454a062016-01-30 15:14:10 +0100192crypt_get_method_nr(buf_T *buf)
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200193{
194 return crypt_method_nr_from_name(*buf->b_p_cm == NUL ? p_cm : buf->b_p_cm);
195}
196
197/*
198 * Return TRUE when the buffer uses an encryption method that encrypts the
199 * whole undo file, not only the text.
200 */
201 int
Bram Moolenaar7454a062016-01-30 15:14:10 +0100202crypt_whole_undofile(int method_nr)
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200203{
204 return cryptmethods[method_nr].whole_undofile;
205}
206
207/*
Bram Moolenaar32aa1022019-11-02 22:54:41 +0100208 * Get crypt method specific length of the file header in bytes.
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200209 */
210 int
Bram Moolenaar7454a062016-01-30 15:14:10 +0100211crypt_get_header_len(int method_nr)
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200212{
213 return CRYPT_MAGIC_LEN
214 + cryptmethods[method_nr].salt_len
215 + cryptmethods[method_nr].seed_len;
216}
217
218/*
219 * Set the crypt method for buffer "buf" to "method_nr" using the int value as
220 * returned by crypt_method_nr_from_name().
221 */
222 void
Bram Moolenaar7454a062016-01-30 15:14:10 +0100223crypt_set_cm_option(buf_T *buf, int method_nr)
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200224{
225 free_string_option(buf->b_p_cm);
226 buf->b_p_cm = vim_strsave((char_u *)cryptmethods[method_nr].name);
227}
228
229/*
230 * If the crypt method for the current buffer has a self-test, run it and
231 * return OK/FAIL.
232 */
233 int
Bram Moolenaar7454a062016-01-30 15:14:10 +0100234crypt_self_test(void)
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200235{
236 int method_nr = crypt_get_method_nr(curbuf);
237
238 if (cryptmethods[method_nr].self_test_fn == NULL)
239 return OK;
240 return cryptmethods[method_nr].self_test_fn();
241}
242
243/*
244 * Allocate a crypt state and initialize it.
Bram Moolenaar6ee96582019-04-27 22:06:37 +0200245 * Return NULL for failure.
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200246 */
247 cryptstate_T *
Bram Moolenaar7454a062016-01-30 15:14:10 +0100248crypt_create(
249 int method_nr,
250 char_u *key,
251 char_u *salt,
252 int salt_len,
253 char_u *seed,
254 int seed_len)
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200255{
Bram Moolenaarc799fe22019-05-28 23:08:19 +0200256 cryptstate_T *state = ALLOC_ONE(cryptstate_T);
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200257
Bram Moolenaar6ee96582019-04-27 22:06:37 +0200258 if (state == NULL)
259 return state;
260
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200261 state->method_nr = method_nr;
Bram Moolenaar6ee96582019-04-27 22:06:37 +0200262 if (cryptmethods[method_nr].init_fn(
263 state, key, salt, salt_len, seed, seed_len) == FAIL)
264 {
265 vim_free(state);
266 return NULL;
267 }
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200268 return state;
269}
270
271/*
272 * Allocate a crypt state from a file header and initialize it.
273 * Assumes that header contains at least the number of bytes that
274 * crypt_get_header_len() returns for "method_nr".
275 */
276 cryptstate_T *
Bram Moolenaar7454a062016-01-30 15:14:10 +0100277crypt_create_from_header(
278 int method_nr,
279 char_u *key,
280 char_u *header)
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200281{
282 char_u *salt = NULL;
283 char_u *seed = NULL;
284 int salt_len = cryptmethods[method_nr].salt_len;
285 int seed_len = cryptmethods[method_nr].seed_len;
286
287 if (salt_len > 0)
288 salt = header + CRYPT_MAGIC_LEN;
289 if (seed_len > 0)
290 seed = header + CRYPT_MAGIC_LEN + salt_len;
291
292 return crypt_create(method_nr, key, salt, salt_len, seed, seed_len);
293}
294
295/*
296 * Read the crypt method specific header data from "fp".
297 * Return an allocated cryptstate_T or NULL on error.
298 */
299 cryptstate_T *
Bram Moolenaar7454a062016-01-30 15:14:10 +0100300crypt_create_from_file(FILE *fp, char_u *key)
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200301{
302 int method_nr;
303 int header_len;
304 char magic_buffer[CRYPT_MAGIC_LEN];
305 char_u *buffer;
306 cryptstate_T *state;
307
308 if (fread(magic_buffer, CRYPT_MAGIC_LEN, 1, fp) != 1)
309 return NULL;
310 method_nr = crypt_method_nr_from_magic(magic_buffer, CRYPT_MAGIC_LEN);
311 if (method_nr < 0)
312 return NULL;
313
314 header_len = crypt_get_header_len(method_nr);
315 if ((buffer = alloc(header_len)) == NULL)
316 return NULL;
317 mch_memmove(buffer, magic_buffer, CRYPT_MAGIC_LEN);
318 if (header_len > CRYPT_MAGIC_LEN
319 && fread(buffer + CRYPT_MAGIC_LEN,
320 header_len - CRYPT_MAGIC_LEN, 1, fp) != 1)
321 {
322 vim_free(buffer);
323 return NULL;
324 }
325
326 state = crypt_create_from_header(method_nr, key, buffer);
327 vim_free(buffer);
328 return state;
329}
330
331/*
332 * Allocate a cryptstate_T for writing and initialize it with "key".
333 * Allocates and fills in the header and stores it in "header", setting
334 * "header_len". The header may include salt and seed, depending on
335 * cryptmethod. Caller must free header.
336 * Returns the state or NULL on failure.
337 */
338 cryptstate_T *
Bram Moolenaar7454a062016-01-30 15:14:10 +0100339crypt_create_for_writing(
340 int method_nr,
341 char_u *key,
342 char_u **header,
343 int *header_len)
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200344{
345 int len = crypt_get_header_len(method_nr);
346 char_u *salt = NULL;
347 char_u *seed = NULL;
348 int salt_len = cryptmethods[method_nr].salt_len;
349 int seed_len = cryptmethods[method_nr].seed_len;
350 cryptstate_T *state;
351
352 *header_len = len;
353 *header = alloc(len);
354 if (*header == NULL)
355 return NULL;
356
357 mch_memmove(*header, cryptmethods[method_nr].magic, CRYPT_MAGIC_LEN);
358 if (salt_len > 0 || seed_len > 0)
359 {
360 if (salt_len > 0)
361 salt = *header + CRYPT_MAGIC_LEN;
362 if (seed_len > 0)
363 seed = *header + CRYPT_MAGIC_LEN + salt_len;
364
Bram Moolenaarc667da52019-11-30 20:52:27 +0100365 // TODO: Should this be crypt method specific? (Probably not worth
366 // it). sha2_seed is pretty bad for large amounts of entropy, so make
367 // that into something which is suitable for anything.
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200368 sha2_seed(salt, salt_len, seed, seed_len);
369 }
370
371 state = crypt_create(method_nr, key, salt, salt_len, seed, seed_len);
372 if (state == NULL)
Bram Moolenaard23a8232018-02-10 18:45:26 +0100373 VIM_CLEAR(*header);
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200374 return state;
375}
376
377/*
378 * Free the crypt state.
379 */
380 void
Bram Moolenaar7454a062016-01-30 15:14:10 +0100381crypt_free_state(cryptstate_T *state)
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200382{
383 vim_free(state->method_state);
384 vim_free(state);
385}
386
Bram Moolenaar987411d2019-01-18 22:48:34 +0100387#ifdef CRYPT_NOT_INPLACE
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200388/*
389 * Encode "from[len]" and store the result in a newly allocated buffer, which
390 * is stored in "newptr".
391 * Return number of bytes in "newptr", 0 for need more or -1 on error.
392 */
393 long
Bram Moolenaar7454a062016-01-30 15:14:10 +0100394crypt_encode_alloc(
395 cryptstate_T *state,
396 char_u *from,
397 size_t len,
398 char_u **newptr)
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200399{
400 cryptmethod_T *method = &cryptmethods[state->method_nr];
401
402 if (method->encode_buffer_fn != NULL)
Bram Moolenaarc667da52019-11-30 20:52:27 +0100403 // Has buffer function, pass through.
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200404 return method->encode_buffer_fn(state, from, len, newptr);
405 if (len == 0)
Bram Moolenaarc667da52019-11-30 20:52:27 +0100406 // Not buffering, just return EOF.
Bram Moolenaar9b8f0212014-08-13 22:05:53 +0200407 return (long)len;
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200408
Bram Moolenaar51e14382019-05-25 20:21:28 +0200409 *newptr = alloc(len);
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200410 if (*newptr == NULL)
411 return -1;
412 method->encode_fn(state, from, len, *newptr);
Bram Moolenaar9b8f0212014-08-13 22:05:53 +0200413 return (long)len;
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200414}
415
416/*
417 * Decrypt "ptr[len]" and store the result in a newly allocated buffer, which
418 * is stored in "newptr".
419 * Return number of bytes in "newptr", 0 for need more or -1 on error.
420 */
421 long
Bram Moolenaar7454a062016-01-30 15:14:10 +0100422crypt_decode_alloc(
423 cryptstate_T *state,
424 char_u *ptr,
425 long len,
426 char_u **newptr)
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200427{
428 cryptmethod_T *method = &cryptmethods[state->method_nr];
429
430 if (method->decode_buffer_fn != NULL)
Bram Moolenaarc667da52019-11-30 20:52:27 +0100431 // Has buffer function, pass through.
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200432 return method->decode_buffer_fn(state, ptr, len, newptr);
433
434 if (len == 0)
Bram Moolenaarc667da52019-11-30 20:52:27 +0100435 // Not buffering, just return EOF.
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200436 return len;
437
438 *newptr = alloc(len);
439 if (*newptr == NULL)
440 return -1;
441 method->decode_fn(state, ptr, len, *newptr);
442 return len;
443}
Bram Moolenaar987411d2019-01-18 22:48:34 +0100444#endif
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200445
446/*
447 * Encrypting "from[len]" into "to[len]".
448 */
449 void
Bram Moolenaar7454a062016-01-30 15:14:10 +0100450crypt_encode(
451 cryptstate_T *state,
452 char_u *from,
453 size_t len,
454 char_u *to)
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200455{
456 cryptmethods[state->method_nr].encode_fn(state, from, len, to);
457}
458
Bram Moolenaar987411d2019-01-18 22:48:34 +0100459#if 0 // unused
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200460/*
461 * decrypting "from[len]" into "to[len]".
462 */
463 void
Bram Moolenaar7454a062016-01-30 15:14:10 +0100464crypt_decode(
465 cryptstate_T *state,
466 char_u *from,
467 size_t len,
468 char_u *to)
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200469{
470 cryptmethods[state->method_nr].decode_fn(state, from, len, to);
471}
Bram Moolenaar987411d2019-01-18 22:48:34 +0100472#endif
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200473
474/*
475 * Simple inplace encryption, modifies "buf[len]" in place.
476 */
477 void
Bram Moolenaar7454a062016-01-30 15:14:10 +0100478crypt_encode_inplace(
479 cryptstate_T *state,
480 char_u *buf,
481 size_t len)
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200482{
483 cryptmethods[state->method_nr].encode_inplace_fn(state, buf, len, buf);
484}
485
486/*
487 * Simple inplace decryption, modifies "buf[len]" in place.
488 */
489 void
Bram Moolenaar7454a062016-01-30 15:14:10 +0100490crypt_decode_inplace(
491 cryptstate_T *state,
492 char_u *buf,
493 size_t len)
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200494{
495 cryptmethods[state->method_nr].decode_inplace_fn(state, buf, len, buf);
496}
497
498/*
499 * Free an allocated crypt key. Clear the text to make sure it doesn't stay
500 * in memory anywhere.
501 */
502 void
Bram Moolenaar7454a062016-01-30 15:14:10 +0100503crypt_free_key(char_u *key)
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200504{
505 char_u *p;
506
507 if (key != NULL)
508 {
509 for (p = key; *p != NUL; ++p)
510 *p = 0;
511 vim_free(key);
512 }
513}
514
515/*
Bram Moolenaar3a0c9082014-11-12 15:15:42 +0100516 * Check the crypt method and give a warning if it's outdated.
517 */
518 void
Bram Moolenaar7454a062016-01-30 15:14:10 +0100519crypt_check_method(int method)
Bram Moolenaar3a0c9082014-11-12 15:15:42 +0100520{
521 if (method < CRYPT_M_BF2)
522 {
523 msg_scroll = TRUE;
Bram Moolenaar32526b32019-01-19 17:43:09 +0100524 msg(_("Warning: Using a weak encryption method; see :help 'cm'"));
Bram Moolenaar3a0c9082014-11-12 15:15:42 +0100525 }
526}
527
528 void
Bram Moolenaar7454a062016-01-30 15:14:10 +0100529crypt_check_current_method(void)
Bram Moolenaar3a0c9082014-11-12 15:15:42 +0100530{
531 crypt_check_method(crypt_get_method_nr(curbuf));
532}
533
534/*
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200535 * Ask the user for a crypt key.
536 * When "store" is TRUE, the new key is stored in the 'key' option, and the
537 * 'key' option value is returned: Don't free it.
538 * When "store" is FALSE, the typed key is returned in allocated memory.
539 * Returns NULL on failure.
540 */
541 char_u *
Bram Moolenaar7454a062016-01-30 15:14:10 +0100542crypt_get_key(
543 int store,
Bram Moolenaarc667da52019-11-30 20:52:27 +0100544 int twice) // Ask for the key twice.
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200545{
546 char_u *p1, *p2 = NULL;
547 int round;
548
549 for (round = 0; ; ++round)
550 {
551 cmdline_star = TRUE;
552 cmdline_row = msg_row;
553 p1 = getcmdline_prompt(NUL, round == 0
554 ? (char_u *)_("Enter encryption key: ")
555 : (char_u *)_("Enter same key again: "), 0, EXPAND_NOTHING,
556 NULL);
557 cmdline_star = FALSE;
558
559 if (p1 == NULL)
560 break;
561
562 if (round == twice)
563 {
564 if (p2 != NULL && STRCMP(p1, p2) != 0)
565 {
Bram Moolenaar32526b32019-01-19 17:43:09 +0100566 msg(_("Keys don't match!"));
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200567 crypt_free_key(p1);
568 crypt_free_key(p2);
569 p2 = NULL;
Bram Moolenaarc667da52019-11-30 20:52:27 +0100570 round = -1; // do it again
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200571 continue;
572 }
573
574 if (store)
575 {
576 set_option_value((char_u *)"key", 0L, p1, OPT_LOCAL);
577 crypt_free_key(p1);
578 p1 = curbuf->b_p_key;
579 }
580 break;
581 }
582 p2 = p1;
583 }
584
Bram Moolenaarc667da52019-11-30 20:52:27 +0100585 // since the user typed this, no need to wait for return
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200586 if (msg_didout)
587 msg_putchar('\n');
588 need_wait_return = FALSE;
589 msg_didout = FALSE;
590
591 crypt_free_key(p2);
592 return p1;
593}
594
595
596/*
597 * Append a message to IObuff for the encryption/decryption method being used.
598 */
599 void
Bram Moolenaar7454a062016-01-30 15:14:10 +0100600crypt_append_msg(
601 buf_T *buf)
Bram Moolenaar8f4ac012014-08-10 13:38:34 +0200602{
603 if (crypt_get_method_nr(buf) == 0)
604 STRCAT(IObuff, _("[crypted]"));
605 else
606 {
607 STRCAT(IObuff, "[");
608 STRCAT(IObuff, *buf->b_p_cm == NUL ? p_cm : buf->b_p_cm);
609 STRCAT(IObuff, "]");
610 }
611}
612
Bram Moolenaarc667da52019-11-30 20:52:27 +0100613#endif // FEAT_CRYPT