| /* encrypt V1.1 Fri Oct 18 04:28:03 NZDT 2002 */ |
| /* File de/encryption, using libtomcrypt */ |
| /* Written by Daniel Richards <kyhwana@world-net.co.nz> */ |
| /* Help from Tom St Denis with various bits */ |
| /* This code is public domain, no rights reserved. */ |
| /* Encrypts by default, -d flag enables decryption */ |
| /* ie: ./encrypt blowfish story.txt story.ct */ |
| /* ./encrypt -d blowfish story.ct story.pt */ |
| |
| #include <tomcrypt.h> |
| |
| int errno; |
| |
| int usage(char *name) |
| { |
| int x; |
| |
| printf("Usage: %s [-d](ecrypt) cipher infile outfile\nCiphers:\n", name); |
| for (x = 0; cipher_descriptor[x].name != NULL; x++) { |
| printf("%s\n",cipher_descriptor[x].name); |
| } |
| exit(1); |
| } |
| |
| void register_algs(void) |
| { |
| int x; |
| |
| #ifdef RIJNDAEL |
| register_cipher (&aes_desc); |
| #endif |
| #ifdef BLOWFISH |
| register_cipher (&blowfish_desc); |
| #endif |
| #ifdef XTEA |
| register_cipher (&xtea_desc); |
| #endif |
| #ifdef RC5 |
| register_cipher (&rc5_desc); |
| #endif |
| #ifdef RC6 |
| register_cipher (&rc6_desc); |
| #endif |
| #ifdef SAFERP |
| register_cipher (&saferp_desc); |
| #endif |
| #ifdef TWOFISH |
| register_cipher (&twofish_desc); |
| #endif |
| #ifdef SAFER |
| register_cipher (&safer_k64_desc); |
| register_cipher (&safer_sk64_desc); |
| register_cipher (&safer_k128_desc); |
| register_cipher (&safer_sk128_desc); |
| #endif |
| #ifdef RC2 |
| register_cipher (&rc2_desc); |
| #endif |
| #ifdef DES |
| register_cipher (&des_desc); |
| register_cipher (&des3_desc); |
| #endif |
| #ifdef CAST5 |
| register_cipher (&cast5_desc); |
| #endif |
| #ifdef NOEKEON |
| register_cipher (&noekeon_desc); |
| #endif |
| #ifdef SKIPJACK |
| register_cipher (&skipjack_desc); |
| #endif |
| #ifdef KHAZAD |
| register_cipher (&khazad_desc); |
| #endif |
| #ifdef ANUBIS |
| register_cipher (&anubis_desc); |
| #endif |
| |
| if (register_hash(&sha256_desc) == -1) { |
| printf("Error registering SHA256\n"); |
| exit(-1); |
| } |
| |
| if (register_prng(&yarrow_desc) == -1) { |
| printf("Error registering yarrow PRNG\n"); |
| exit(-1); |
| } |
| |
| if (register_prng(&sprng_desc) == -1) { |
| printf("Error registering sprng PRNG\n"); |
| exit(-1); |
| } |
| } |
| |
| int main(int argc, char *argv[]) |
| { |
| unsigned char plaintext[512],ciphertext[512]; |
| unsigned char tmpkey[512], key[MAXBLOCKSIZE], IV[MAXBLOCKSIZE]; |
| unsigned char inbuf[512]; /* i/o block size */ |
| unsigned long outlen, y, ivsize, x, decrypt; |
| symmetric_CTR ctr; |
| int cipher_idx, hash_idx, ks; |
| char *infile, *outfile, *cipher; |
| prng_state prng; |
| FILE *fdin, *fdout; |
| |
| /* register algs, so they can be printed */ |
| register_algs(); |
| |
| if (argc < 4) { |
| return usage(argv[0]); |
| } |
| |
| if (!strcmp(argv[1], "-d")) { |
| decrypt = 1; |
| cipher = argv[2]; |
| infile = argv[3]; |
| outfile = argv[4]; |
| } else { |
| decrypt = 0; |
| cipher = argv[1]; |
| infile = argv[2]; |
| outfile = argv[3]; |
| } |
| |
| /* file handles setup */ |
| fdin = fopen(infile,"rb"); |
| if (fdin == NULL) { |
| perror("Can't open input for reading"); |
| exit(-1); |
| } |
| |
| fdout = fopen(outfile,"wb"); |
| if (fdout == NULL) { |
| perror("Can't open output for writing"); |
| exit(-1); |
| } |
| |
| cipher_idx = find_cipher(cipher); |
| if (cipher_idx == -1) { |
| printf("Invalid cipher entered on command line.\n"); |
| exit(-1); |
| } |
| |
| hash_idx = find_hash("sha256"); |
| if (hash_idx == -1) { |
| printf("SHA256 not found...?\n"); |
| exit(-1); |
| } |
| |
| ivsize = cipher_descriptor[cipher_idx].block_length; |
| ks = hash_descriptor[hash_idx].hashsize; |
| if (cipher_descriptor[cipher_idx].keysize(&ks) != CRYPT_OK) { |
| printf("Invalid keysize???\n"); |
| exit(-1); |
| } |
| |
| printf("\nEnter key: "); |
| fgets((char *)tmpkey,sizeof(tmpkey), stdin); |
| outlen = sizeof(key); |
| if ((errno = hash_memory(hash_idx,tmpkey,strlen((char *)tmpkey),key,&outlen)) != CRYPT_OK) { |
| printf("Error hashing key: %s\n", error_to_string(errno)); |
| exit(-1); |
| } |
| |
| if (decrypt) { |
| /* Need to read in IV */ |
| if (fread(IV,1,ivsize,fdin) != ivsize) { |
| printf("Error reading IV from input.\n"); |
| exit(-1); |
| } |
| |
| if ((errno = ctr_start(cipher_idx,IV,key,ks,0,CTR_COUNTER_LITTLE_ENDIAN,&ctr)) != CRYPT_OK) { |
| printf("ctr_start error: %s\n",error_to_string(errno)); |
| exit(-1); |
| } |
| |
| /* IV done */ |
| do { |
| y = fread(inbuf,1,sizeof(inbuf),fdin); |
| |
| if ((errno = ctr_decrypt(inbuf,plaintext,y,&ctr)) != CRYPT_OK) { |
| printf("ctr_decrypt error: %s\n", error_to_string(errno)); |
| exit(-1); |
| } |
| |
| if (fwrite(plaintext,1,y,fdout) != y) { |
| printf("Error writing to file.\n"); |
| exit(-1); |
| } |
| } while (y == sizeof(inbuf)); |
| fclose(fdin); |
| fclose(fdout); |
| |
| } else { /* encrypt */ |
| /* Setup yarrow for random bytes for IV */ |
| |
| if ((errno = rng_make_prng(128, find_prng("yarrow"), &prng, NULL)) != CRYPT_OK) { |
| printf("Error setting up PRNG, %s\n", error_to_string(errno)); |
| } |
| |
| /* You can use rng_get_bytes on platforms that support it */ |
| /* x = rng_get_bytes(IV,ivsize,NULL);*/ |
| x = yarrow_read(IV,ivsize,&prng); |
| if (x != ivsize) { |
| printf("Error reading PRNG for IV required.\n"); |
| exit(-1); |
| } |
| |
| if (fwrite(IV,1,ivsize,fdout) != ivsize) { |
| printf("Error writing IV to output.\n"); |
| exit(-1); |
| } |
| |
| if ((errno = ctr_start(cipher_idx,IV,key,ks,0,CTR_COUNTER_LITTLE_ENDIAN,&ctr)) != CRYPT_OK) { |
| printf("ctr_start error: %s\n",error_to_string(errno)); |
| exit(-1); |
| } |
| |
| do { |
| y = fread(inbuf,1,sizeof(inbuf),fdin); |
| |
| if ((errno = ctr_encrypt(inbuf,ciphertext,y,&ctr)) != CRYPT_OK) { |
| printf("ctr_encrypt error: %s\n", error_to_string(errno)); |
| exit(-1); |
| } |
| |
| if (fwrite(ciphertext,1,y,fdout) != y) { |
| printf("Error writing to output.\n"); |
| exit(-1); |
| } |
| } while (y == sizeof(inbuf)); |
| fclose(fdout); |
| fclose(fdin); |
| } |
| return 0; |
| } |
| |
| /* $Source: /cvs/libtom/libtomcrypt/demos/encrypt.c,v $ */ |
| /* $Revision: 1.3 $ */ |
| /* $Date: 2005/08/04 20:43:50 $ */ |