⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 encrypt.c

📁 Dropbear is an SSH 2 server, designed to be usable in small memory environments. It supports:
💻 C
字号:
/* encrypt V1.1 Fri Oct 18 04:28:03 NZDT 2002 *//* File de/encryption, using libtomcrypt *//* Written by Daniel Richards <kyhwana@world-net.co.nz> *//* Help from Tom St Denis with various bits *//* This code is public domain, no rights reserved. *//* Encrypts by default, -d flag enables decryption *//* ie: ./encrypt blowfish story.txt story.ct *//* ./encrypt -d blowfish story.ct story.pt */#include <tomcrypt.h>int errno;int usage(char *name) {   int x;   printf("Usage: %s [-d](ecrypt) cipher infile outfile\nCiphers:\n", name);   for (x = 0; cipher_descriptor[x].name != NULL; x++) {      printf("%s\n",cipher_descriptor[x].name);   }   exit(1);}void register_algs(void){   int x;   #ifdef RIJNDAEL  register_cipher (&aes_desc);#endif#ifdef BLOWFISH  register_cipher (&blowfish_desc);#endif#ifdef XTEA  register_cipher (&xtea_desc);#endif#ifdef RC5  register_cipher (&rc5_desc);#endif#ifdef RC6  register_cipher (&rc6_desc);#endif#ifdef SAFERP  register_cipher (&saferp_desc);#endif#ifdef TWOFISH  register_cipher (&twofish_desc);#endif#ifdef SAFER  register_cipher (&safer_k64_desc);  register_cipher (&safer_sk64_desc);  register_cipher (&safer_k128_desc);  register_cipher (&safer_sk128_desc);#endif#ifdef RC2  register_cipher (&rc2_desc);#endif#ifdef DES  register_cipher (&des_desc);  register_cipher (&des3_desc);#endif#ifdef CAST5  register_cipher (&cast5_desc);#endif#ifdef NOEKEON  register_cipher (&noekeon_desc);#endif#ifdef SKIPJACK  register_cipher (&skipjack_desc);#endif#ifdef KHAZAD  register_cipher (&khazad_desc);#endif#ifdef ANUBIS  register_cipher (&anubis_desc);#endif   if (register_hash(&sha256_desc) == -1) {      printf("Error registering SHA256\n");      exit(-1);   }    if (register_prng(&yarrow_desc) == -1) {      printf("Error registering yarrow PRNG\n");      exit(-1);   }   if (register_prng(&sprng_desc) == -1) {      printf("Error registering sprng PRNG\n");      exit(-1);   }}int main(int argc, char *argv[]) {   unsigned char plaintext[512],ciphertext[512];   unsigned char tmpkey[512], key[MAXBLOCKSIZE], IV[MAXBLOCKSIZE];   unsigned char inbuf[512]; /* i/o block size */   unsigned long outlen, y, ivsize, x, decrypt;   symmetric_CTR ctr;   int cipher_idx, hash_idx, ks;   char *infile, *outfile, *cipher;   prng_state prng;   FILE *fdin, *fdout;   /* register algs, so they can be printed */   register_algs();   if (argc < 4) {      return usage(argv[0]);   }   if (!strcmp(argv[1], "-d")) {      decrypt = 1;      cipher  = argv[2];      infile  = argv[3];      outfile = argv[4];   } else {      decrypt = 0;      cipher  = argv[1];      infile  = argv[2];      outfile = argv[3];   }      /* file handles setup */   fdin = fopen(infile,"rb");   if (fdin == NULL) {      perror("Can't open input for reading");      exit(-1);   }   fdout = fopen(outfile,"wb");   if (fdout == NULL) {       perror("Can't open output for writing");      exit(-1);   }    cipher_idx = find_cipher(cipher);   if (cipher_idx == -1) {      printf("Invalid cipher entered on command line.\n");      exit(-1);   }   hash_idx = find_hash("sha256");   if (hash_idx == -1) {      printf("SHA256 not found...?\n");      exit(-1);   }   ivsize = cipher_descriptor[cipher_idx].block_length;   ks = hash_descriptor[hash_idx].hashsize;   if (cipher_descriptor[cipher_idx].keysize(&ks) != CRYPT_OK) {       printf("Invalid keysize???\n");      exit(-1);   }   printf("\nEnter key: ");   fgets((char *)tmpkey,sizeof(tmpkey), stdin);   outlen = sizeof(key);   if ((errno = hash_memory(hash_idx,tmpkey,strlen((char *)tmpkey),key,&outlen)) != CRYPT_OK) {      printf("Error hashing key: %s\n", error_to_string(errno));      exit(-1);   }      if (decrypt) {      /* Need to read in IV */      if (fread(IV,1,ivsize,fdin) != ivsize) {         printf("Error reading IV from input.\n");         exit(-1);      }         if ((errno = ctr_start(cipher_idx,IV,key,ks,0,&ctr)) != CRYPT_OK) {         printf("ctr_start error: %s\n",error_to_string(errno));         exit(-1);      }      /* IV done */      do {         y = fread(inbuf,1,sizeof(inbuf),fdin);         if ((errno = ctr_decrypt(inbuf,plaintext,y,&ctr)) != CRYPT_OK) {            printf("ctr_decrypt error: %s\n", error_to_string(errno));            exit(-1);         }         if (fwrite(plaintext,1,y,fdout) != y) {            printf("Error writing to file.\n");            exit(-1);         }      } while (y == sizeof(inbuf));      fclose(fdin);      fclose(fdout);   } else {  /* encrypt */      /* Setup yarrow for random bytes for IV */            if ((errno = rng_make_prng(128, find_prng("yarrow"), &prng, NULL)) != CRYPT_OK) {         printf("Error setting up PRNG, %s\n", error_to_string(errno));      }            /* You can use rng_get_bytes on platforms that support it */      /* x = rng_get_bytes(IV,ivsize,NULL);*/      x = yarrow_read(IV,ivsize,&prng);      if (x != ivsize) {         printf("Error reading PRNG for IV required.\n");         exit(-1);      }         if (fwrite(IV,1,ivsize,fdout) != ivsize) {         printf("Error writing IV to output.\n");         exit(-1);      }      if ((errno = ctr_start(cipher_idx,IV,key,ks,0,&ctr)) != CRYPT_OK) {         printf("ctr_start error: %s\n",error_to_string(errno));         exit(-1);      }      do {         y = fread(inbuf,1,sizeof(inbuf),fdin);         if ((errno = ctr_encrypt(inbuf,ciphertext,y,&ctr)) != CRYPT_OK) {            printf("ctr_encrypt error: %s\n", error_to_string(errno));            exit(-1);         }         if (fwrite(ciphertext,1,y,fdout) != y) {            printf("Error writing to output.\n");            exit(-1);         }      } while (y == sizeof(inbuf));         fclose(fdout);      fclose(fdin);   }   return 0;}/* $Source: /cvs/libtom/libtomcrypt/demos/encrypt.c,v $ *//* $Revision: 1.2 $ *//* $Date: 2005/05/05 14:35:56 $ */

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -