tomcrypt/demos/encrypt.c

265 lines
6.7 KiB
C
Raw Normal View History

2003-03-02 19:59:24 -05:00
/* encrypt V1.1 Fri Oct 18 04:28:03 NZDT 2002 */
/* File de/encryption, using libtomcrypt */
/* Written by Daniel Richards <kyhwana@world-net.co.nz> */
/* Help from Tom St Denis with various bits */
/* This code is public domain, no rights reserved. */
/* Encrypts by default, -d flag enables decryption */
/* ie: ./encrypt blowfish story.txt story.ct */
/* ./encrypt -d blowfish story.ct story.pt */
2004-12-30 18:55:53 -05:00
#include <tomcrypt.h>
2003-03-02 19:59:24 -05:00
int errno;
2013-03-20 12:34:00 -04:00
int usage(char *name)
2003-03-02 19:59:24 -05:00
{
int x;
printf("Usage encrypt: %s cipher infile outfile\n", name);
printf("Usage decrypt: %s -d cipher infile outfile\n", name);
printf("Usage test: %s -t cipher\nCiphers:\n", name);
2003-03-02 19:59:24 -05:00
for (x = 0; cipher_descriptor[x].name != NULL; x++) {
printf("%s\n",cipher_descriptor[x].name);
}
exit(1);
}
void register_algs(void)
{
int x;
2013-03-20 12:34:00 -04:00
2007-07-20 13:48:02 -04:00
#ifdef LTC_RIJNDAEL
2004-05-12 16:42:16 -04:00
register_cipher (&aes_desc);
#endif
2007-07-20 13:48:02 -04:00
#ifdef LTC_BLOWFISH
2004-05-12 16:42:16 -04:00
register_cipher (&blowfish_desc);
#endif
2007-07-20 13:48:02 -04:00
#ifdef LTC_XTEA
2004-05-12 16:42:16 -04:00
register_cipher (&xtea_desc);
#endif
2007-07-20 13:48:02 -04:00
#ifdef LTC_RC5
2004-05-12 16:42:16 -04:00
register_cipher (&rc5_desc);
#endif
2007-07-20 13:48:02 -04:00
#ifdef LTC_RC6
2004-05-12 16:42:16 -04:00
register_cipher (&rc6_desc);
#endif
2007-07-20 13:48:02 -04:00
#ifdef LTC_SAFERP
2004-05-12 16:42:16 -04:00
register_cipher (&saferp_desc);
#endif
2007-07-20 13:48:02 -04:00
#ifdef LTC_TWOFISH
2004-05-12 16:42:16 -04:00
register_cipher (&twofish_desc);
#endif
2007-07-20 13:48:02 -04:00
#ifdef LTC_SAFER
2004-05-12 16:42:16 -04:00
register_cipher (&safer_k64_desc);
register_cipher (&safer_sk64_desc);
register_cipher (&safer_k128_desc);
register_cipher (&safer_sk128_desc);
#endif
2007-07-20 13:48:02 -04:00
#ifdef LTC_RC2
2004-05-12 16:42:16 -04:00
register_cipher (&rc2_desc);
#endif
2007-07-20 13:48:02 -04:00
#ifdef LTC_DES
2004-05-12 16:42:16 -04:00
register_cipher (&des_desc);
register_cipher (&des3_desc);
#endif
2007-07-20 13:48:02 -04:00
#ifdef LTC_CAST5
2004-05-12 16:42:16 -04:00
register_cipher (&cast5_desc);
#endif
2007-07-20 13:48:02 -04:00
#ifdef LTC_NOEKEON
2004-05-12 16:42:16 -04:00
register_cipher (&noekeon_desc);
#endif
2007-07-20 13:48:02 -04:00
#ifdef LTC_SKIPJACK
2004-05-12 16:42:16 -04:00
register_cipher (&skipjack_desc);
#endif
2007-07-20 13:48:02 -04:00
#ifdef LTC_KHAZAD
2004-12-30 18:55:53 -05:00
register_cipher (&khazad_desc);
#endif
2007-07-20 13:48:02 -04:00
#ifdef LTC_ANUBIS
2004-12-30 18:55:53 -05:00
register_cipher (&anubis_desc);
#endif
2003-03-02 19:59:24 -05:00
if (register_hash(&sha256_desc) == -1) {
2007-07-20 13:48:02 -04:00
printf("Error registering LTC_SHA256\n");
2003-03-02 19:59:24 -05:00
exit(-1);
2013-03-20 12:34:00 -04:00
}
2003-03-02 19:59:24 -05:00
if (register_prng(&yarrow_desc) == -1) {
printf("Error registering yarrow PRNG\n");
exit(-1);
}
if (register_prng(&sprng_desc) == -1) {
printf("Error registering sprng PRNG\n");
exit(-1);
}
}
2013-03-20 12:34:00 -04:00
int main(int argc, char *argv[])
2003-03-02 19:59:24 -05:00
{
unsigned char plaintext[512],ciphertext[512];
unsigned char tmpkey[512], key[MAXBLOCKSIZE], IV[MAXBLOCKSIZE];
unsigned char inbuf[512]; /* i/o block size */
unsigned long outlen, y, ivsize, x, decrypt;
symmetric_CTR ctr;
int cipher_idx, hash_idx, ks;
char *infile, *outfile, *cipher;
prng_state prng;
FILE *fdin, *fdout;
/* register algs, so they can be printed */
register_algs();
if (argc < 4) {
if ((argc > 2) && (!strcmp(argv[1], "-t"))) {
cipher = argv[2];
cipher_idx = find_cipher(cipher);
if (cipher_idx == -1) {
printf("Invalid cipher %s entered on command line.\n", cipher);
exit(-1);
} /* if */
if (cipher_descriptor[cipher_idx].test)
{
if (cipher_descriptor[cipher_idx].test() != CRYPT_OK)
{
printf("Error when testing cipher %s.\n", cipher);
exit(-1);
}
else
{
printf("Testing cipher %s succeeded.\n", cipher);
exit(0);
} /* if ... else */
} /* if */
}
2003-12-24 13:59:57 -05:00
return usage(argv[0]);
2003-03-02 19:59:24 -05:00
}
if (!strcmp(argv[1], "-d")) {
decrypt = 1;
cipher = argv[2];
infile = argv[3];
outfile = argv[4];
} else {
decrypt = 0;
cipher = argv[1];
infile = argv[2];
outfile = argv[3];
2013-03-20 12:34:00 -04:00
}
2003-03-02 19:59:24 -05:00
/* file handles setup */
fdin = fopen(infile,"rb");
if (fdin == NULL) {
perror("Can't open input for reading");
exit(-1);
}
fdout = fopen(outfile,"wb");
2013-03-20 12:34:00 -04:00
if (fdout == NULL) {
2003-03-02 19:59:24 -05:00
perror("Can't open output for writing");
exit(-1);
}
2013-03-20 12:34:00 -04:00
2003-03-02 19:59:24 -05:00
cipher_idx = find_cipher(cipher);
if (cipher_idx == -1) {
printf("Invalid cipher entered on command line.\n");
exit(-1);
}
hash_idx = find_hash("sha256");
if (hash_idx == -1) {
2007-07-20 13:48:02 -04:00
printf("LTC_SHA256 not found...?\n");
2003-03-02 19:59:24 -05:00
exit(-1);
}
ivsize = cipher_descriptor[cipher_idx].block_length;
ks = hash_descriptor[hash_idx].hashsize;
2013-03-20 12:34:00 -04:00
if (cipher_descriptor[cipher_idx].keysize(&ks) != CRYPT_OK) {
2003-03-02 19:59:24 -05:00
printf("Invalid keysize???\n");
exit(-1);
}
printf("\nEnter key: ");
2004-05-12 16:42:16 -04:00
fgets((char *)tmpkey,sizeof(tmpkey), stdin);
2003-03-02 19:59:24 -05:00
outlen = sizeof(key);
2004-05-12 16:42:16 -04:00
if ((errno = hash_memory(hash_idx,tmpkey,strlen((char *)tmpkey),key,&outlen)) != CRYPT_OK) {
2003-03-02 19:59:24 -05:00
printf("Error hashing key: %s\n", error_to_string(errno));
exit(-1);
}
2013-03-20 12:34:00 -04:00
2003-03-02 19:59:24 -05:00
if (decrypt) {
/* Need to read in IV */
if (fread(IV,1,ivsize,fdin) != ivsize) {
printf("Error reading IV from input.\n");
exit(-1);
}
2013-03-20 12:34:00 -04:00
2005-11-18 00:15:37 -05:00
if ((errno = ctr_start(cipher_idx,IV,key,ks,0,CTR_COUNTER_LITTLE_ENDIAN,&ctr)) != CRYPT_OK) {
2003-03-02 19:59:24 -05:00
printf("ctr_start error: %s\n",error_to_string(errno));
exit(-1);
}
/* IV done */
do {
y = fread(inbuf,1,sizeof(inbuf),fdin);
if ((errno = ctr_decrypt(inbuf,plaintext,y,&ctr)) != CRYPT_OK) {
printf("ctr_decrypt error: %s\n", error_to_string(errno));
exit(-1);
}
if (fwrite(plaintext,1,y,fdout) != y) {
printf("Error writing to file.\n");
exit(-1);
}
} while (y == sizeof(inbuf));
fclose(fdin);
fclose(fdout);
} else { /* encrypt */
/* Setup yarrow for random bytes for IV */
2013-03-20 12:34:00 -04:00
2003-03-02 19:59:24 -05:00
if ((errno = rng_make_prng(128, find_prng("yarrow"), &prng, NULL)) != CRYPT_OK) {
printf("Error setting up PRNG, %s\n", error_to_string(errno));
2013-03-20 12:34:00 -04:00
}
2003-03-02 19:59:24 -05:00
/* You can use rng_get_bytes on platforms that support it */
/* x = rng_get_bytes(IV,ivsize,NULL);*/
x = yarrow_read(IV,ivsize,&prng);
if (x != ivsize) {
printf("Error reading PRNG for IV required.\n");
exit(-1);
}
2013-03-20 12:34:00 -04:00
2003-03-02 19:59:24 -05:00
if (fwrite(IV,1,ivsize,fdout) != ivsize) {
printf("Error writing IV to output.\n");
exit(-1);
}
2005-11-18 00:15:37 -05:00
if ((errno = ctr_start(cipher_idx,IV,key,ks,0,CTR_COUNTER_LITTLE_ENDIAN,&ctr)) != CRYPT_OK) {
2003-03-02 19:59:24 -05:00
printf("ctr_start error: %s\n",error_to_string(errno));
exit(-1);
}
do {
y = fread(inbuf,1,sizeof(inbuf),fdin);
if ((errno = ctr_encrypt(inbuf,ciphertext,y,&ctr)) != CRYPT_OK) {
printf("ctr_encrypt error: %s\n", error_to_string(errno));
exit(-1);
}
if (fwrite(ciphertext,1,y,fdout) != y) {
printf("Error writing to output.\n");
exit(-1);
}
2013-03-20 12:34:00 -04:00
} while (y == sizeof(inbuf));
2003-03-02 19:59:24 -05:00
fclose(fdout);
fclose(fdin);
}
return 0;
}
2005-06-08 20:08:13 -04:00
/* $Source$ */
/* $Revision$ */
/* $Date$ */