mirror of
http://galexander.org/git/simplesshd.git
synced 2024-11-13 18:58:57 +00:00
242 lines
5.9 KiB
C
242 lines
5.9 KiB
C
|
/* encrypt V1.1 Fri Oct 18 04:28:03 NZDT 2002 */
|
||
|
/* File de/encryption, using libtomcrypt */
|
||
|
/* Written by Daniel Richards <kyhwana@world-net.co.nz> */
|
||
|
/* Help from Tom St Denis with various bits */
|
||
|
/* This code is public domain, no rights reserved. */
|
||
|
/* Encrypts by default, -d flag enables decryption */
|
||
|
/* ie: ./encrypt blowfish story.txt story.ct */
|
||
|
/* ./encrypt -d blowfish story.ct story.pt */
|
||
|
|
||
|
#include <tomcrypt.h>
|
||
|
|
||
|
int errno;
|
||
|
|
||
|
int usage(char *name)
|
||
|
{
|
||
|
int x;
|
||
|
|
||
|
printf("Usage: %s [-d](ecrypt) cipher infile outfile\nCiphers:\n", name);
|
||
|
for (x = 0; cipher_descriptor[x].name != NULL; x++) {
|
||
|
printf("%s\n",cipher_descriptor[x].name);
|
||
|
}
|
||
|
exit(1);
|
||
|
}
|
||
|
|
||
|
void register_algs(void)
|
||
|
{
|
||
|
int x;
|
||
|
|
||
|
#ifdef RIJNDAEL
|
||
|
register_cipher (&aes_desc);
|
||
|
#endif
|
||
|
#ifdef BLOWFISH
|
||
|
register_cipher (&blowfish_desc);
|
||
|
#endif
|
||
|
#ifdef XTEA
|
||
|
register_cipher (&xtea_desc);
|
||
|
#endif
|
||
|
#ifdef RC5
|
||
|
register_cipher (&rc5_desc);
|
||
|
#endif
|
||
|
#ifdef RC6
|
||
|
register_cipher (&rc6_desc);
|
||
|
#endif
|
||
|
#ifdef SAFERP
|
||
|
register_cipher (&saferp_desc);
|
||
|
#endif
|
||
|
#ifdef TWOFISH
|
||
|
register_cipher (&twofish_desc);
|
||
|
#endif
|
||
|
#ifdef SAFER
|
||
|
register_cipher (&safer_k64_desc);
|
||
|
register_cipher (&safer_sk64_desc);
|
||
|
register_cipher (&safer_k128_desc);
|
||
|
register_cipher (&safer_sk128_desc);
|
||
|
#endif
|
||
|
#ifdef RC2
|
||
|
register_cipher (&rc2_desc);
|
||
|
#endif
|
||
|
#ifdef DES
|
||
|
register_cipher (&des_desc);
|
||
|
register_cipher (&des3_desc);
|
||
|
#endif
|
||
|
#ifdef CAST5
|
||
|
register_cipher (&cast5_desc);
|
||
|
#endif
|
||
|
#ifdef NOEKEON
|
||
|
register_cipher (&noekeon_desc);
|
||
|
#endif
|
||
|
#ifdef SKIPJACK
|
||
|
register_cipher (&skipjack_desc);
|
||
|
#endif
|
||
|
#ifdef KHAZAD
|
||
|
register_cipher (&khazad_desc);
|
||
|
#endif
|
||
|
#ifdef ANUBIS
|
||
|
register_cipher (&anubis_desc);
|
||
|
#endif
|
||
|
|
||
|
if (register_hash(&sha256_desc) == -1) {
|
||
|
printf("Error registering SHA256\n");
|
||
|
exit(-1);
|
||
|
}
|
||
|
|
||
|
if (register_prng(&yarrow_desc) == -1) {
|
||
|
printf("Error registering yarrow PRNG\n");
|
||
|
exit(-1);
|
||
|
}
|
||
|
|
||
|
if (register_prng(&sprng_desc) == -1) {
|
||
|
printf("Error registering sprng PRNG\n");
|
||
|
exit(-1);
|
||
|
}
|
||
|
}
|
||
|
|
||
|
int main(int argc, char *argv[])
|
||
|
{
|
||
|
unsigned char plaintext[512],ciphertext[512];
|
||
|
unsigned char tmpkey[512], key[MAXBLOCKSIZE], IV[MAXBLOCKSIZE];
|
||
|
unsigned char inbuf[512]; /* i/o block size */
|
||
|
unsigned long outlen, y, ivsize, x, decrypt;
|
||
|
symmetric_CTR ctr;
|
||
|
int cipher_idx, hash_idx, ks;
|
||
|
char *infile, *outfile, *cipher;
|
||
|
prng_state prng;
|
||
|
FILE *fdin, *fdout;
|
||
|
|
||
|
/* register algs, so they can be printed */
|
||
|
register_algs();
|
||
|
|
||
|
if (argc < 4) {
|
||
|
return usage(argv[0]);
|
||
|
}
|
||
|
|
||
|
if (!strcmp(argv[1], "-d")) {
|
||
|
decrypt = 1;
|
||
|
cipher = argv[2];
|
||
|
infile = argv[3];
|
||
|
outfile = argv[4];
|
||
|
} else {
|
||
|
decrypt = 0;
|
||
|
cipher = argv[1];
|
||
|
infile = argv[2];
|
||
|
outfile = argv[3];
|
||
|
}
|
||
|
|
||
|
/* file handles setup */
|
||
|
fdin = fopen(infile,"rb");
|
||
|
if (fdin == NULL) {
|
||
|
perror("Can't open input for reading");
|
||
|
exit(-1);
|
||
|
}
|
||
|
|
||
|
fdout = fopen(outfile,"wb");
|
||
|
if (fdout == NULL) {
|
||
|
perror("Can't open output for writing");
|
||
|
exit(-1);
|
||
|
}
|
||
|
|
||
|
cipher_idx = find_cipher(cipher);
|
||
|
if (cipher_idx == -1) {
|
||
|
printf("Invalid cipher entered on command line.\n");
|
||
|
exit(-1);
|
||
|
}
|
||
|
|
||
|
hash_idx = find_hash("sha256");
|
||
|
if (hash_idx == -1) {
|
||
|
printf("SHA256 not found...?\n");
|
||
|
exit(-1);
|
||
|
}
|
||
|
|
||
|
ivsize = cipher_descriptor[cipher_idx].block_length;
|
||
|
ks = hash_descriptor[hash_idx].hashsize;
|
||
|
if (cipher_descriptor[cipher_idx].keysize(&ks) != CRYPT_OK) {
|
||
|
printf("Invalid keysize???\n");
|
||
|
exit(-1);
|
||
|
}
|
||
|
|
||
|
printf("\nEnter key: ");
|
||
|
fgets((char *)tmpkey,sizeof(tmpkey), stdin);
|
||
|
outlen = sizeof(key);
|
||
|
if ((errno = hash_memory(hash_idx,tmpkey,strlen((char *)tmpkey),key,&outlen)) != CRYPT_OK) {
|
||
|
printf("Error hashing key: %s\n", error_to_string(errno));
|
||
|
exit(-1);
|
||
|
}
|
||
|
|
||
|
if (decrypt) {
|
||
|
/* Need to read in IV */
|
||
|
if (fread(IV,1,ivsize,fdin) != ivsize) {
|
||
|
printf("Error reading IV from input.\n");
|
||
|
exit(-1);
|
||
|
}
|
||
|
|
||
|
if ((errno = ctr_start(cipher_idx,IV,key,ks,0,CTR_COUNTER_LITTLE_ENDIAN,&ctr)) != CRYPT_OK) {
|
||
|
printf("ctr_start error: %s\n",error_to_string(errno));
|
||
|
exit(-1);
|
||
|
}
|
||
|
|
||
|
/* IV done */
|
||
|
do {
|
||
|
y = fread(inbuf,1,sizeof(inbuf),fdin);
|
||
|
|
||
|
if ((errno = ctr_decrypt(inbuf,plaintext,y,&ctr)) != CRYPT_OK) {
|
||
|
printf("ctr_decrypt error: %s\n", error_to_string(errno));
|
||
|
exit(-1);
|
||
|
}
|
||
|
|
||
|
if (fwrite(plaintext,1,y,fdout) != y) {
|
||
|
printf("Error writing to file.\n");
|
||
|
exit(-1);
|
||
|
}
|
||
|
} while (y == sizeof(inbuf));
|
||
|
fclose(fdin);
|
||
|
fclose(fdout);
|
||
|
|
||
|
} else { /* encrypt */
|
||
|
/* Setup yarrow for random bytes for IV */
|
||
|
|
||
|
if ((errno = rng_make_prng(128, find_prng("yarrow"), &prng, NULL)) != CRYPT_OK) {
|
||
|
printf("Error setting up PRNG, %s\n", error_to_string(errno));
|
||
|
}
|
||
|
|
||
|
/* You can use rng_get_bytes on platforms that support it */
|
||
|
/* x = rng_get_bytes(IV,ivsize,NULL);*/
|
||
|
x = yarrow_read(IV,ivsize,&prng);
|
||
|
if (x != ivsize) {
|
||
|
printf("Error reading PRNG for IV required.\n");
|
||
|
exit(-1);
|
||
|
}
|
||
|
|
||
|
if (fwrite(IV,1,ivsize,fdout) != ivsize) {
|
||
|
printf("Error writing IV to output.\n");
|
||
|
exit(-1);
|
||
|
}
|
||
|
|
||
|
if ((errno = ctr_start(cipher_idx,IV,key,ks,0,CTR_COUNTER_LITTLE_ENDIAN,&ctr)) != CRYPT_OK) {
|
||
|
printf("ctr_start error: %s\n",error_to_string(errno));
|
||
|
exit(-1);
|
||
|
}
|
||
|
|
||
|
do {
|
||
|
y = fread(inbuf,1,sizeof(inbuf),fdin);
|
||
|
|
||
|
if ((errno = ctr_encrypt(inbuf,ciphertext,y,&ctr)) != CRYPT_OK) {
|
||
|
printf("ctr_encrypt error: %s\n", error_to_string(errno));
|
||
|
exit(-1);
|
||
|
}
|
||
|
|
||
|
if (fwrite(ciphertext,1,y,fdout) != y) {
|
||
|
printf("Error writing to output.\n");
|
||
|
exit(-1);
|
||
|
}
|
||
|
} while (y == sizeof(inbuf));
|
||
|
fclose(fdout);
|
||
|
fclose(fdin);
|
||
|
}
|
||
|
return 0;
|
||
|
}
|
||
|
|
||
|
/* $Source: /cvs/libtom/libtomcrypt/demos/encrypt.c,v $ */
|
||
|
/* $Revision: 1.3 $ */
|
||
|
/* $Date: 2005/08/04 20:43:50 $ */
|