亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? aescrypt.c

?? linux下完成任意文件的AES加密. 口令可變,加密穩定迅速.
?? C
?? 第 1 頁 / 共 3 頁
字號:
/* *  AES Crypt for Linux *  Copyright (C) 2007, 2008 * *  Contributors: *      Glenn Washburn <crass@berlios.de> *      Paul E. Jones <paulej@packetizer.com> *      Mauro Gilardi <galvao.m@gmail.com> * * This software is licensed as "freeware."  Permission to distribute * this software in source and binary forms is hereby granted without a * fee.  THIS SOFTWARE IS PROVIDED 'AS IS' AND WITHOUT ANY EXPRESSED OR * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. * THE AUTHOR SHALL NOT BE HELD LIABLE FOR ANY DAMAGES RESULTING FROM * THE USE OF THIS SOFTWARE, EITHER DIRECTLY OR INDIRECTLY, INCLUDING, * BUT NOT LIMITED TO, LOSS OF DATA OR DATA BEING RENDERED INACCURATE. * */#include <stdio.h>#include <string.h>#include <sys/types.h>#include <sys/stat.h>#include <fcntl.h>#include <unistd.h> // getopt#include <assert.h>#include <stdlib.h> // malloc#include <time.h> // time#include <iconv.h> // iconv stuff#include <langinfo.h> // nl_langinfo#include <errno.h> // errno#include "aescrypt.h"#include "password.h"#include "version.h"/* *  encrypt_stream * *  This function is called to encrypt the open data steam "infp". */int encrypt_stream(FILE *infp, FILE *outfp, char* passwd, int passlen){    aes_context                 aes_ctx;    sha256_context              sha_ctx;    aescrypt_hdr                aeshdr;    sha256_t                    digest;    unsigned char               IV[16];    unsigned char               iv_key[48];    int                         i, j, n;    unsigned char               buffer[32];    unsigned char               ipad[64], opad[64];    time_t                      current_time;    pid_t                       process_id;    FILE                        *randfp = NULL;    unsigned char               tag_buffer[256];    // Open the source for random data.  Note that while the entropy    // might be lower with /dev/urandom than /dev/random, it will not    // fail to produce something.  Also, we're going to hash the result    // anyway.    if ((randfp = fopen("/dev/urandom", "r")) == NULL)    {        perror("Error open /dev/urandom:");        return  -1;    }    // Create the 16-bit IV and 32-bit encryption key    // used for encrypting the plaintext file.  We do    // not trust the rand() function, so we improve on    // that by also hashing the random digits and using    // only a portion of the hash.  This IV and key    // generation could be replaced with any good random    // source of data.    memset(iv_key, 0, 48);    for (i=0; i<48; i+=16)    {        memset(buffer, 0, 32);        sha256_starts(&sha_ctx);        for(j=0; j<256; j++)        {            if ((n = fread(buffer, 1, 32, randfp)) != 32)            {                fprintf(stderr, "Error: Couldn't read from /dev/urandom : %d\n",n);                fclose(randfp);                return  -1;            }            sha256_update(&sha_ctx, buffer, 32);        }        sha256_finish(&sha_ctx, digest);        memcpy(iv_key+i, digest, 16);    }    // Write an AES signature at the head of the file, along    // with the AES file format version number.    buffer[0] = 'A';    buffer[1] = 'E';    buffer[2] = 'S';    buffer[3] = (unsigned char) 0x02;   // Version 2    buffer[4] = '\0';                   // Reserved for version 0    if (fwrite(buffer, 1, 5, outfp) != 5)    {        fprintf(stderr, "Error: Could not write out header data\n");        fclose(randfp);        return  -1;    }    // Write out the CREATED-BY tag    j = 11 +                   // "CREATED-BY\0"        strlen(PROG_NAME) +    // Program name        1 +                    // Space        strlen(PROG_VERSION);  // Program version ID    // Our extension buffer is only 256 octets long, so    // let's not write an extension if it is too big    if (j < 256)    {        buffer[0] = '\0';        buffer[1] = (unsigned char) (j & 0xff);        if (fwrite(buffer, 1, 2, outfp) != 2)        {            fprintf(stderr, "Error: Could not write tag to AES file (1)\n");            fclose(randfp);            return  -1;        }        strncpy(tag_buffer, "CREATED_BY", 255);        tag_buffer[255] = '\0';        if (fwrite(tag_buffer, 1, 11, outfp) != 11)        {            fprintf(stderr, "Error: Could not write tag to AES file (2)\n");            fclose(randfp);            return  -1;        }        sprintf(tag_buffer, "%s %s", PROG_NAME, PROG_VERSION);        j = strlen(tag_buffer);        if (fwrite(tag_buffer, 1, j, outfp) != j)        {            fprintf(stderr, "Error: Could not write tag to AES file (3)\n");            fclose(randfp);            return  -1;        }    }    // Write out the "container" extension    buffer[0] = '\0';    buffer[1] = (unsigned char) 128;    if (fwrite(buffer, 1, 2, outfp) != 2)    {        fprintf(stderr, "Error: Could not write tag to AES file (4)\n");        fclose(randfp);        return  -1;    }    bzero(tag_buffer, 128);    if (fwrite(tag_buffer, 1, 128, outfp) != 128)    {        fprintf(stderr, "Error: Could not write tag to AES file (5)\n");        fclose(randfp);        return  -1;    }    // Write out 0x0000 to indicate that no more extensions exist    buffer[0] = '\0';    buffer[1] = '\0';    if (fwrite(buffer, 1, 2, outfp) != 2)    {        fprintf(stderr, "Error: Could not write tag to AES file (6)\n");        fclose(randfp);        return  -1;    }    // We will use an initialization vector comprised of the current time    // process ID, and random data, all hashed together with SHA-256.    current_time = time(NULL);    for(i = 0; i < 8; i++)    {        buffer[i] = (unsigned char)                        (current_time >> (i * 8));    }    process_id = getpid();    for(i = 0; i < 8; i++)    {        buffer[i+8] = (unsigned char)                        (process_id >> (i * 8));    }    sha256_starts(  &sha_ctx);    sha256_update(  &sha_ctx, buffer, 16);    for (i=0; i<256; i++)    {        if (fread(buffer, 1, 32, randfp) != 32)        {            fprintf(stderr, "Error: Couldn't read from /dev/random\n");            fclose(randfp);            return  -1;        }        sha256_update(  &sha_ctx,                        buffer,                        32);    }    sha256_finish(  &sha_ctx, digest);    memcpy(IV, digest, 16);    // We're finished collecting random data    fclose(randfp);    // Write the initialization vector to the file    if (fwrite(IV, 1, 16, outfp) != 16)    {        fprintf(stderr, "Error: Could not write out initialization vector\n");        return  -1;    }        // Hash the IV and password 8192 times    memset(digest, 0, 32);    memcpy(digest, IV, 16);    for(i=0; i<8192; i++)    {        sha256_starts(  &sha_ctx);        sha256_update(  &sha_ctx, digest, 32);        sha256_update(  &sha_ctx,                        (unsigned char*)passwd,                        (unsigned long)passlen);        sha256_finish(  &sha_ctx,                        digest);    }    // Set the AES encryption key    aes_set_key(&aes_ctx, digest, 256);    // Set the ipad and opad arrays with values as    // per RFC 2104 (HMAC).  HMAC is defined as    //   H(K XOR opad, H(K XOR ipad, text))    memset(ipad, 0x36, 64);    memset(opad, 0x5C, 64);    for(i=0; i<32; i++)    {        ipad[i] ^= digest[i];        opad[i] ^= digest[i];    }    sha256_starts(&sha_ctx);    sha256_update(&sha_ctx, ipad, 64);    // Encrypt the IV and key used to encrypt the plaintext file,    // writing that encrypted text to the output file.    for(i=0; i<48; i+=16)    {        // Place the next 16 octets of IV and key buffer into        // the input buffer.        memcpy(buffer, iv_key+i, 16);        // XOR plain text block with previous encrypted        // output (i.e., use CBC)        for(j=0; j<16; j++)        {            buffer[j] ^= IV[j];        }        // Encrypt the contents of the buffer        aes_encrypt(&aes_ctx, buffer, buffer);                // Concatenate the "text" as we compute the HMAC        sha256_update(&sha_ctx, buffer, 16);        // Write the encrypted block        if (fwrite(buffer, 1, 16, outfp) != 16)        {            fprintf(stderr, "Error: Could not write iv_key data\n");            return  -1;        }                // Update the IV (CBC mode)        memcpy(IV, buffer, 16);    }    // Write the HMAC    sha256_finish(&sha_ctx, digest);    sha256_starts(&sha_ctx);    sha256_update(&sha_ctx, opad, 64);    sha256_update(&sha_ctx, digest, 32);    sha256_finish(&sha_ctx, digest);    // Write the encrypted block    if (fwrite(digest, 1, 32, outfp) != 32)    {        fprintf(stderr, "Error: Could not write iv_key HMAC\n");        return  -1;    }    // Re-load the IV and encryption key with the IV and    // key to now encrypt the datafile.  Also, reset the HMAC    // computation.    memcpy(IV, iv_key, 16);    // Set the AES encryption key    aes_set_key(&aes_ctx, iv_key+16, 256);    // Set the ipad and opad arrays with values as    // per RFC 2104 (HMAC).  HMAC is defined as    //   H(K XOR opad, H(K XOR ipad, text))    memset(ipad, 0x36, 64);    memset(opad, 0x5C, 64);    for(i=0; i<32; i++)    {        ipad[i] ^= iv_key[i+16];        opad[i] ^= iv_key[i+16];    }    // Wipe the IV and encryption mey from memory    memset(iv_key, 0, 48);    sha256_starts(&sha_ctx);    sha256_update(&sha_ctx, ipad, 64);    while ((n = fread(buffer, 1, 16, infp)) > 0)    {        // XOR plain text block with previous encrypted        // output (i.e., use CBC)        for(i=0; i<16; i++)        {            buffer[i] ^= IV[i];        }        // Encrypt the contents of the buffer        aes_encrypt(&aes_ctx, buffer, buffer);                // Concatenate the "text" as we compute the HMAC        sha256_update(&sha_ctx, buffer, 16);        // Write the encrypted block        if (fwrite(buffer, 1, 16, outfp) != 16)        {            fprintf(stderr, "Error: Could not write to output file\n");            return  -1;        }                // Update the IV (CBC mode)        memcpy(IV, buffer, 16);        // Assume this number of octets is the file modulo        aeshdr.last_block_size = n;    }    // Check to see if we had a read error    if (n < 0)    {        fprintf(stderr, "Error: Couldn't read input file\n");        return  -1;    }    // Write the file size modulo    buffer[0] = (char) (aeshdr.last_block_size & 0x0F);    if (fwrite(buffer, 1, 1, outfp) != 1)    {        fprintf(stderr, "Error: Could not write the file size modulo\n");        return  -1;    }    // Write the HMAC    sha256_finish(&sha_ctx, digest);    sha256_starts(&sha_ctx);    sha256_update(&sha_ctx, opad, 64);    sha256_update(&sha_ctx, digest, 32);    sha256_finish(&sha_ctx, digest);    if (fwrite(digest, 1, 32, outfp) != 32)    {        fprintf(stderr, "Error: Could not write the file HMAC\n");        return  -1;    }    return 0;}

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
国产日韩三级在线| 午夜影院在线观看欧美| 99久久99久久久精品齐齐| 一二三四社区欧美黄| 精品国产亚洲一区二区三区在线观看| 91色在线porny| 欧美一区中文字幕| www.亚洲人| 日本va欧美va瓶| 综合久久国产九一剧情麻豆| 欧美伦理电影网| 免费高清在线视频一区·| 国产精品国产三级国产aⅴ无密码| 欧美午夜影院一区| 成人国产在线观看| 免播放器亚洲一区| 亚洲高清在线精品| 国产精品污污网站在线观看 | 日本免费在线视频不卡一不卡二| 久久久久久夜精品精品免费| 欧美高清视频在线高清观看mv色露露十八| 久久国产三级精品| 青草国产精品久久久久久| 中文字幕精品三区| 精品视频在线看| 极品少妇xxxx偷拍精品少妇| 亚洲美女免费视频| 国产亚洲自拍一区| 欧美色图在线观看| 成人美女视频在线观看| 日韩精品三区四区| 久久色.com| 欧美大片一区二区三区| 国产精品白丝av| 国产99久久久久久免费看农村| 天堂影院一区二区| 日韩高清一区二区| 亚洲黄色免费网站| 一区二区三区四区激情| 在线欧美日韩国产| 久久电影网站中文字幕| 一区二区三区在线不卡| 亚洲欧美一区二区三区国产精品| 国产欧美一区二区精品秋霞影院| 亚洲精品一区二区三区精华液 | 91精品国产综合久久久蜜臀粉嫩| 一本大道久久a久久精品综合| 亚洲人成人一区二区在线观看 | 欧美亚洲国产一区二区三区va| 91麻豆6部合集magnet| 国产精品一品二品| 成人永久免费视频| 国产成人精品一区二| 国产suv精品一区二区6| 国产精品一线二线三线| 国产一区二区三区蝌蚪| 久久99国产乱子伦精品免费| 久久99久久久欧美国产| 奇米888四色在线精品| 亚洲精品自拍动漫在线| 亚洲精品欧美在线| 国产精品久久久久一区| 亚洲天堂网中文字| 一区二区三区视频在线看| 97久久超碰精品国产| 一区二区三区**美女毛片| 亚洲福利国产精品| 五月激情丁香一区二区三区| 亚洲精品免费在线观看| 亚洲综合另类小说| 香蕉影视欧美成人| 极品少妇一区二区三区精品视频| 国精产品一区一区三区mba视频 | 欧美在线影院一区二区| 欧美精品少妇一区二区三区| 欧美日韩国产电影| 久久色成人在线| 国产精品妹子av| 日韩理论片在线| 亚洲图片一区二区| 日韩国产精品久久久| 精品一区二区日韩| 国产成人在线影院| 欧美日韩一区在线观看| 91麻豆精品国产91久久久久久| 国产情人综合久久777777| 久久精品一二三| 亚洲图片欧美视频| 久久99久久99| 色噜噜狠狠色综合欧洲selulu| 欧美日韩综合一区| 一本一本久久a久久精品综合麻豆 一本一道波多野结衣一区二区 | av激情综合网| 国产精品青草久久| 亚洲成人一区二区| 国产成人在线电影| 91浏览器在线视频| 久久久精品欧美丰满| 亚洲三级在线观看| 激情图区综合网| 日本道色综合久久| 国产亚洲综合在线| 丝袜亚洲精品中文字幕一区| 成人高清视频在线观看| 欧美日韩aaaaa| 国产精品传媒在线| 免费欧美高清视频| 国产福利一区二区三区视频| 色老综合老女人久久久| 99精品视频中文字幕| 精品国产亚洲在线| 最新热久久免费视频| 韩国女主播成人在线观看| 一本久久a久久免费精品不卡| 精品盗摄一区二区三区| 天堂蜜桃一区二区三区| jlzzjlzz亚洲女人18| 精品电影一区二区| 日日夜夜免费精品| 在线观看网站黄不卡| 国产日韩欧美精品一区| 精品一区二区综合| 欧美人与禽zozo性伦| 亚洲伦在线观看| 国产精品乡下勾搭老头1| 欧美一级片免费看| 一区二区三区四区不卡视频| av欧美精品.com| 中文字幕欧美三区| 欧美一区二区免费| 亚洲一区二区在线免费观看视频| 波多野结衣中文一区| 精品成人一区二区三区四区| 美女一区二区视频| 7777精品伊人久久久大香线蕉完整版 | 在线不卡a资源高清| 国产精品久久久一本精品| 亚洲123区在线观看| 91丨porny丨中文| 亚洲第一电影网| 成人午夜精品在线| 99re6这里只有精品视频在线观看 99re8在线精品视频免费播放 | 日韩一级欧美一级| 亚洲人午夜精品天堂一二香蕉| av在线播放不卡| 一区二区欧美在线观看| 欧美一二三区在线观看| 蜜臀av性久久久久av蜜臀妖精| 欧美一区二区三区视频免费| 91国产丝袜在线播放| 国产精品久久精品日日| 国产福利一区二区三区| 欧美激情艳妇裸体舞| 国产精品一区二区三区四区| 久久亚洲免费视频| 激情综合网激情| 亚洲国产精品成人综合色在线婷婷| 蜜桃视频在线观看一区二区| 精品入口麻豆88视频| 麻豆高清免费国产一区| 久久久天堂av| 成人妖精视频yjsp地址| 亚洲精品精品亚洲| 欧美综合视频在线观看| 视频一区免费在线观看| 欧美日产在线观看| 国产又粗又猛又爽又黄91精品| 精品1区2区在线观看| 不卡一二三区首页| 亚洲裸体在线观看| 日韩欧美电影一区| 国产馆精品极品| 一区二区三区高清| 欧美精品在欧美一区二区少妇| 国产一区二区毛片| 国产精品区一区二区三区| 成人app下载| 欧美在线综合视频| 国产精品久久久久四虎| 一区二区中文字幕在线| 7777精品伊人久久久大香线蕉经典版下载 | 国产suv精品一区二区三区| 日本一区二区三区dvd视频在线 | 亚洲高清视频在线| 欧美一区欧美二区| 美国精品在线观看| 中文字幕综合网| 91精品国产品国语在线不卡| 精品影视av免费| 亚洲国产人成综合网站| 日韩欧美自拍偷拍| 色悠久久久久综合欧美99| 日本在线不卡视频| 亚洲欧美色综合| 日韩午夜精品视频| 欧美怡红院视频| 久久99久久久欧美国产| 亚洲影视资源网| 久久综合中文字幕| 欧美久久一区二区|