138 lines
3.9 KiB
C
138 lines
3.9 KiB
C
/*
|
|
This is part of WHY2
|
|
Copyright (C) 2022 Václav Šmejkal
|
|
|
|
This program is free software: you can redistribute it and/or modify
|
|
it under the terms of the GNU General Public License as published by
|
|
the Free Software Foundation, either version 3 of the License, or
|
|
(at your option) any later version.
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU General Public License for more details.
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
along with this program. If not, see <https://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
#include <why2/encrypter.h>
|
|
|
|
#include <stdio.h>
|
|
#include <string.h>
|
|
#include <sys/time.h>
|
|
|
|
#include <why2/flags.h>
|
|
#include <why2/memory.h>
|
|
#include <why2/misc.h>
|
|
|
|
why2_output_flags why2_encrypt_text(char *text, char *key_new)
|
|
{
|
|
//CHECK VARIABLE
|
|
unsigned char check_exit_code;
|
|
|
|
//TIME VARIABLES
|
|
struct timeval start_time;
|
|
struct timeval finish_time;
|
|
gettimeofday(&start_time, NULL);
|
|
|
|
//CHECK FOR ACTIVE WHY2_VERSION
|
|
if ((check_exit_code = why2_check_version()) != WHY2_SUCCESS)
|
|
{
|
|
return why2_no_output(check_exit_code);
|
|
}
|
|
|
|
//CHECK FOR INVALID text
|
|
if ((check_exit_code = why2_check_text(text)) != WHY2_SUCCESS)
|
|
{
|
|
return why2_no_output(check_exit_code);
|
|
}
|
|
|
|
why2_set_memory_identifier("core_decrypt");
|
|
|
|
//VARIABLES
|
|
char *key = NULL;
|
|
char *returning_text = NULL;
|
|
char *text_buffer = NULL;
|
|
int *text_key_chain = why2_malloc(sizeof(int) * strlen(text));
|
|
int number_buffer = 0;
|
|
|
|
if (key_new != NULL)
|
|
{
|
|
//CHECK FOR INVALID key
|
|
if ((check_exit_code = why2_check_key(key_new)) != WHY2_SUCCESS)
|
|
{
|
|
why2_clean_memory("core_decrypt");
|
|
return why2_no_output(check_exit_code);
|
|
}
|
|
|
|
key = why2_strdup(key_new);
|
|
|
|
//REDEFINE keyLength
|
|
why2_set_key_length(strlen(key));
|
|
} else //LOAD KEY
|
|
{
|
|
key = why2_generate_key(why2_get_key_length());
|
|
}
|
|
|
|
//LOAD text_key_chain
|
|
why2_generate_text_key_chain(key, text_key_chain, strlen(text));
|
|
|
|
//ACTUALLY ENCRYPT TEXT
|
|
for (int i = 0; i < (int) strlen(text); i++)
|
|
{
|
|
text_key_chain[i] = why2_get_encryption_operation()(text_key_chain[i], (int) text[i]);
|
|
}
|
|
|
|
if (why2_get_flags().format == WHY2_OUTPUT_TEXT) //NORMAL 420.-69 FORMAT
|
|
{
|
|
//COUNT REQUIRED SIZE FOR returning_text
|
|
for (int i = 0; i < (int) strlen(text); i++)
|
|
{
|
|
number_buffer += why2_count_int_length(text_key_chain[i]);
|
|
}
|
|
|
|
//ALLOCATE returning_text (WITH THE SEPARATORS)
|
|
returning_text = why2_calloc(number_buffer + strlen(text), sizeof(char));
|
|
|
|
//LOAD returning_text
|
|
for (int i = 0; i < (int) strlen(text); i++)
|
|
{
|
|
number_buffer = sizeof(int) * why2_count_int_length(text_key_chain[i]);
|
|
|
|
text_buffer = why2_realloc(text_buffer, number_buffer);
|
|
|
|
sprintf(text_buffer, "%d", text_key_chain[i]);
|
|
|
|
strcat(returning_text, text_buffer);
|
|
|
|
if (i != (int) strlen(text) - 1)
|
|
{
|
|
returning_text[strlen(returning_text)] = why2_get_encryption_separator();
|
|
}
|
|
}
|
|
}
|
|
|
|
//GET FINISH TIME
|
|
gettimeofday(&finish_time, NULL);
|
|
|
|
//LOAD output
|
|
why2_output_flags output =
|
|
{
|
|
returning_text, //ENCRYPTED TEXT
|
|
key, //GENERATED/USED KEY
|
|
why2_count_unused_key_size(text, key), // NUMBER OF WHY2_UNUSED CHARS IN KEY
|
|
why2_count_repeated_key_size(text, key), //NUMBER OF REPEATED CHARS IN KEY
|
|
why2_compare_time_micro(start_time, finish_time), // ELAPSED TIME
|
|
WHY2_SUCCESS //EXIT CODE
|
|
};
|
|
|
|
//DEALLOCATION
|
|
why2_deallocate(text_key_chain);
|
|
why2_deallocate(text_buffer);
|
|
|
|
why2_reset_memory_identifier();
|
|
|
|
return output;
|
|
}
|