File: example.c

package info (click to toggle)
yudit 3.1.0-1
  • links: PTS, VCS
  • area: main
  • in suites: bookworm, forky, sid, trixie
  • size: 18,472 kB
  • sloc: cpp: 76,344; perl: 5,630; makefile: 989; ansic: 823; sh: 441
file content (140 lines) | stat: -rw-r--r-- 3,751 bytes parent folder | download | duplicates (2)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
/**
 * Because of export restrictions encryption is done via an 
 * addon plugin which can be dropped in Yudit plugin directory.
 *
 * This sample sedy encrytpion plugin should be compiled as a dynamic 
 * library:
 *  - libsedy.so (Linux/Unix)
 *  - libsedy.dll (Window)
 *  - libsedy.dylib (Mac).
 *
 * Linux
 *  gcc -c -Wall -Werror -fpic sedy.c
 *  gcc -shared -o libsedy.so sedy.o
 * 
 * Mac  
 * gcc -c -Wall -Werror -fpic sedy.c
 * gc -shared -o libsedy.dylib sedy.o
 *
 * Windows
 * cl /Zi -c -nologo  /D_USRDLL /D_WINDLL  sedy.c
 * link -nologo /DLL /OUT:libsedy.dll sedy.obj
 *
 * Gaspar Sinai <gaspar@yudit.org> 2020-05-02, Tokyo
 */ 
#include <stdio.h>
#include <string.h>
#include <stdlib.h>
#include "yudit_sedy.h"


#define SAMPLE_ENCRYPT "Sey Encrypted\n"
#define SAMPLE_DECRYPT "Sey Decrypted\n"

char* last_cypher = "TDES-168-bit";

typedef struct _sedy_context {
    char* result;  
    unsigned long result_size;
    char* cypher;
    char* password;
} sedy_context;

void* object;

// If cypher is null, it will be guessed from decrypted data.
// return the context.
SEDY_EXPORT void* sedy_create (char* password, char* cypher) {

    sedy_context* ret = (sedy_context*) malloc(sizeof(sedy_context));
    if (ret == 0) return 0;
    ret->result = 0;
    ret->result_size = 0;
    ret->cypher = (char*) malloc(strlen (cypher)+1);
    if (ret->cypher == 0) {
        free(ret);
        return 0;
    }
    if(cypher) {
        strcpy(ret->cypher, cypher);
    } else {
        ret->cypher[0] = '0';
    }
    ret->password = (char*) malloc(strlen (password)+1);
    if (ret->password == 0) {
        free(ret->cypher);
        free(ret);
        return 0;
    }
    strcpy(ret->password, password);
    return ret;
}

SEDY_EXPORT void sedy_destroy (void* sedy) {
    sedy_context* sc = (sedy_context*) sedy;
    if (sc->result) free (sc->result);
    if (sc->password) free (sc->password);
    if (sc->cypher) free (sc->cypher);
    free(sc);
}

SEDY_EXPORT char* sedy_get_result (void* sedy) {
    sedy_context* sc = (sedy_context*) sedy;
    return sc->result;
}

SEDY_EXPORT unsigned long sedy_get_result_size (void* sedy) {
    sedy_context* sc = (sedy_context*) sedy;
    return sc->result_size;
}

// When cypher is guessed.
SEDY_EXPORT char* sedy_get_cypher (void* sedy) {
    sedy_context* sc = (sedy_context*) sedy;
    return sc->cypher;
}

SEDY_EXPORT int sedy_encrypt (void* sedy, char* buffer, unsigned long buffer_size) {
    sedy_context* sc = (sedy_context*) sedy;
    char* ret;
    if (sc->result) {
        free (sc->result);
        sc->result = 0;
        sc->result_size = 0;
    }
    if (strcmp(sc->cypher, "TDES-168-bit")!=0) {
        return SEDY_UNSOPPORTED_CYPHER;
    }
    if (strcmp(sc->password, "1234")!=0) {
        return SEDY_BAD_PASSWORD;
    }
    ret = (char*) malloc(strlen (SAMPLE_ENCRYPT) + 1);
    if (!ret) return SEDY_OUT_OF_MEMORY;
    strcpy (ret, SAMPLE_ENCRYPT);
    sc->result_size = strlen (SAMPLE_ENCRYPT);
    sc->result = ret;
    return SEDY_NO_ERROR;
}

/* you can pass NULL as cypher and it will guess the cypher. */
SEDY_EXPORT int sedy_decrypt (void* sedy, char* buffer, unsigned long buffer_size) {
    sedy_context* sc = (sedy_context*) sedy;
    char* ret;
    if (sc->result) {
        free (sc->result);
        sc->result = 0;
        sc->result_size = 0;
    }
    if (strcmp(sc->cypher, "TDES-168-bit")!=0) {
        return SEDY_UNSOPPORTED_CYPHER;
    }
    if (strcmp(sc->password, "1234")!=0) {
        return SEDY_BAD_PASSWORD;
    }
    ret = (char*) malloc(strlen (SAMPLE_DECRYPT) + 1);
    if (!ret) return SEDY_OUT_OF_MEMORY;
    strcpy (ret, SAMPLE_DECRYPT);
    sc->result_size = strlen (SAMPLE_DECRYPT);
    sc->result = ret;
    return SEDY_NO_ERROR;
}