| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291 |
- #pragma once
- #include "aes.h"
- #include "blowfish.h"
- #include "SHA1.h"
- #include <vector>
- class Navicat11Crypto {
- protected:
- BLOWFISH_KEY BlowfishKey;
- void BytesToHex(const void* src, size_t len, char* dst) {
- for (size_t i = 0; i < len; ++i) {
- char h = reinterpret_cast<const uint8_t*>(src)[i] >> 4;
- char l = reinterpret_cast<const uint8_t*>(src)[i] & 0x0F;
- h += h >= 10 ? 'A' - 10 : '0';
- l += l >= 10 ? 'A' - 10 : '0';
- dst[2 * i] = h;
- dst[2 * i + 1] = l;
- }
- }
- bool CheckHex(const char* src, size_t len) {
- if (len % 2 != 0)
- return false;
- for (size_t i = 0; i < len; i += 2) {
- char h = src[i];
- char l = src[i + 1];
- if (src[i] < '0' || src[i] > 'F')
- return false;
- if (src[i] < 'A' && src[i] > '9')
- return false;
- if (src[i + 1] < '0' || src[i + 1] > 'F')
- return false;
- if (src[i + 1] < 'A' && src[i + 1] > '9')
- return false;
- }
- return true;
- }
- void HexToBytes(const char* src, size_t len, void* dst) {
- for (size_t i = 0; i < len; i += 2) {
- uint8_t h = src[i];
- uint8_t l = src[i + 1];
- h -= h > '9' ? 'A' - 10 : '0';
- l -= l > '9' ? 'A' - 10 : '0';
- reinterpret_cast<uint8_t*>(dst)[i / 2] = (h << 4 )^ l;
- }
- }
- public:
- Navicat11Crypto() {
- const uint8_t DefaultKey[8] = {
- '3', 'D', 'C', '5', 'C', 'A', '3', '9'
- };
- SHA1_DIGEST KeyHash;
- accelc_SHA1(DefaultKey, sizeof(DefaultKey), &KeyHash);
- accelc_Blowfish_set_key(KeyHash.byte, sizeof(KeyHash), &BlowfishKey);
- }
- Navicat11Crypto(const void* srcBytes, size_t srclen) {
- if (srclen == 0)
- srclen = BLOWFISH_MIN_KEY_LENGTH;
- if (srclen > BLOWFISH_MAX_KEY_LENGTH)
- srclen = BLOWFISH_MAX_KEY_LENGTH;
- SHA1_DIGEST KeyHash;
- accelc_SHA1(srcBytes, srclen, &KeyHash);
- accelc_Blowfish_set_key(KeyHash.byte, sizeof(KeyHash), &BlowfishKey);
- }
- std::vector<char> EncryptString(const void* srcBytes, size_t srclen) {
- std::vector<char> ret;
- if (srclen == 0)
- return ret;
- ret.resize(srclen * 2 + 1);
- ret[srclen * 2] = 0;
- uint8_t CV[BLOWFISH_BLOCK_SIZE] = {
- 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff
- };
- accelc_Blowfish_encrypt(CV, &BlowfishKey, BLOWFISH_BIG_ENDIAN);
- const uint64_t* blocks = reinterpret_cast<const uint64_t*>(srcBytes);
- size_t blocks_len = srclen / BLOWFISH_BLOCK_SIZE;
- for (size_t i = 0; i < blocks_len; ++i) {
- union {
- uint8_t byte[8];
- uint64_t qword;
- } temp;
- temp.qword = blocks[i];
- temp.qword ^= *reinterpret_cast<uint64_t*>(CV);
- accelc_Blowfish_encrypt(temp.byte, &BlowfishKey, BLOWFISH_BIG_ENDIAN);
- *reinterpret_cast<uint64_t*>(CV) ^= temp.qword;
- BytesToHex(temp.byte, 8, ret.data() + 16 * i);
- }
-
- if (srclen % BLOWFISH_BLOCK_SIZE) {
- accelc_Blowfish_encrypt(CV, &BlowfishKey, BLOWFISH_BIG_ENDIAN);
- for (size_t i = 0; i < srclen % BLOWFISH_BLOCK_SIZE; ++i)
- CV[i] ^= reinterpret_cast<const uint8_t*>(blocks + blocks_len)[i];
- BytesToHex(CV, srclen % BLOWFISH_BLOCK_SIZE, ret.data() + 16 * blocks_len);
- }
- return ret;
- }
- std::vector<uint8_t> DecryptString(const char* srchex, size_t srclen) {
- std::vector<uint8_t> ret;
- if (CheckHex(srchex, srclen) == false)
- return ret;
- ret.resize(srclen / 2);
- uint8_t CV[BLOWFISH_BLOCK_SIZE] = {
- 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff
- };
- accelc_Blowfish_encrypt(CV, &BlowfishKey, BLOWFISH_BIG_ENDIAN);
- const char (*blocks)[16] = reinterpret_cast<const char (*)[16]>(srchex);
- size_t blocks_len = srclen / 16;
- for (size_t i = 0; i < blocks_len; ++i) {
- union {
- uint8_t byte[8];
- uint64_t qword;
- } temp, temp2;
- HexToBytes(blocks[i], 16, temp.byte);
- std::memcpy(temp2.byte, temp.byte, 8);
- accelc_Blowfish_decrypt(temp.byte, &BlowfishKey, BLOWFISH_BIG_ENDIAN);
- temp.qword ^= *reinterpret_cast<uint64_t*>(CV);
- *reinterpret_cast<uint64_t*>(ret.data() + 8 * i) = temp.qword;
- *reinterpret_cast<uint64_t*>(CV) ^= temp2.qword;
- }
- if (srclen % 16) {
- union {
- uint8_t byte[8];
- uint64_t qword;
- } temp = { };
- HexToBytes(blocks[blocks_len], srclen % 16, temp.byte);
- accelc_Blowfish_encrypt(CV, &BlowfishKey, BLOWFISH_BIG_ENDIAN);
- for (size_t i = 0; i < (srclen % 16) / 2; ++i)
- ret[blocks_len * 8 + i] = temp.byte[i] ^ CV[i];
- }
- return ret;
- }
- };
- class Navicat12Crypto : public Navicat11Crypto {
- protected:
- AES_KEY AES128Key;
- public:
- Navicat12Crypto() : Navicat11Crypto() {
- uint8_t DefaultKey[16] = {
- 'l', 'i', 'b', 'c', 'c', 'k', 'e', 'y',
- 'l', 'i', 'b', 'c', 'c', 'k', 'e', 'y'
- };
- accelc_AES128_set_key(DefaultKey, &AES128Key);
- }
- Navicat12Crypto(const void* srcBytes, size_t srclen) :
- Navicat11Crypto(srcBytes, srclen) {
-
- uint8_t DefaultKey[16] = {
- 'l', 'i', 'b', 'c', 'c', 'k', 'e', 'y',
- 'l', 'i', 'b', 'c', 'c', 'k', 'e', 'y'
- };
- accelc_AES128_set_key(DefaultKey, &AES128Key);
- }
- std::vector<char> EncryptString(const void* srcBytes, size_t srclen) {
- std::vector<char> ret;
- if (srclen == 0)
- return ret;
- ret.resize((srclen / AES_BLOCK_SIZE + 1) * AES_BLOCK_SIZE * 2);
- union {
- uint8_t byte[AES_BLOCK_SIZE];
- uint64_t qword[2];
- } CV = {
- 'l', 'i', 'b', 'c', 'c', 'i', 'v', ' ',
- 'l', 'i', 'b', 'c', 'c', 'i', 'v', ' '
- };
- const uint8_t (*blocks)[AES_BLOCK_SIZE] = reinterpret_cast<const uint8_t (*)[AES_BLOCK_SIZE]>(srcBytes);
- size_t blocks_len = srclen / AES_BLOCK_SIZE;
- for (size_t i = 0; i < blocks_len; ++i) {
- union {
- uint8_t byte[AES_BLOCK_SIZE];
- uint64_t qword[2];
- } temp;
- std::memcpy(temp.byte, blocks[i], AES_BLOCK_SIZE);
- temp.qword[0] ^= CV.qword[0];
- temp.qword[1] ^= CV.qword[1];
- accelc_AES128_encrypt(temp.byte, &AES128Key);
- BytesToHex(temp.byte, AES_BLOCK_SIZE, ret.data() + 2 * AES_BLOCK_SIZE * i);
- CV.qword[0] = temp.qword[0];
- CV.qword[1] = temp.qword[1];
- }
- uint8_t padding = AES_BLOCK_SIZE - srclen % AES_BLOCK_SIZE;
- union {
- uint8_t byte[AES_BLOCK_SIZE];
- uint64_t qword[2];
- } temp;
- std::memcpy(temp.byte, blocks[blocks_len], srclen % AES_BLOCK_SIZE);
- for (size_t i = srclen % AES_BLOCK_SIZE; i < AES_BLOCK_SIZE; ++i)
- temp.byte[i] = padding;
- temp.qword[0] ^= CV.qword[0];
- temp.qword[1] ^= CV.qword[1];
- accelc_AES128_encrypt(temp.byte, &AES128Key);
- BytesToHex(temp.byte, AES_BLOCK_SIZE, ret.data() + 2 * AES_BLOCK_SIZE * blocks_len);
- return ret;
- }
- std::vector<uint8_t> DecryptString(const char* srchex, size_t srclen) {
- std::vector<uint8_t> ret;
- if (srclen % (2 * AES_BLOCK_SIZE) != 0 || CheckHex(srchex, srclen) == false)
- return ret;
- ret.reserve(srclen / 2);
- ret.resize(srclen / 2 - AES_BLOCK_SIZE);
- union {
- uint8_t byte[AES_BLOCK_SIZE];
- uint64_t qword[2];
- } CV = {
- 'l', 'i', 'b', 'c', 'c', 'i', 'v', ' ',
- 'l', 'i', 'b', 'c', 'c', 'i', 'v', ' '
- };
- const char (*blocks)[2 * AES_BLOCK_SIZE] = reinterpret_cast<const char(*)[2 * AES_BLOCK_SIZE]>(srchex);
- size_t blocks_len = srclen / (2 * AES_BLOCK_SIZE);
- for (size_t i = 0; i < blocks_len; ++i) {
- union {
- uint8_t byte[AES_BLOCK_SIZE];
- uint64_t qword[2];
- } temp, NextVector;
- HexToBytes(blocks[i], 2 * AES_BLOCK_SIZE, temp.byte);
- std::memcpy(NextVector.byte, temp.byte, AES_BLOCK_SIZE);
- accelc_AES128_decrypt(temp.byte, &AES128Key);
- temp.qword[0] ^= CV.qword[0];
- temp.qword[1] ^= CV.qword[1];
- std::memcpy(ret.data() + AES_BLOCK_SIZE * i, temp.byte, AES_BLOCK_SIZE);
- std::memcpy(CV.byte, NextVector.byte, AES_BLOCK_SIZE);
- }
- union {
- uint8_t byte[AES_BLOCK_SIZE];
- uint64_t qword[2];
- } temp;
- HexToBytes(blocks[blocks_len], 2 * AES_BLOCK_SIZE, temp.byte);
- accelc_AES128_decrypt(temp.byte, &AES128Key);
- temp.qword[0] ^= CV.qword[0];
- temp.qword[1] ^= CV.qword[1];
- if (temp.byte[AES_BLOCK_SIZE - 1] > AES_BLOCK_SIZE) {
- ret.clear();
- return ret;
- } else {
- uint8_t padding = temp.byte[AES_BLOCK_SIZE - 1];
- for (int i = AES_BLOCK_SIZE - padding; i < AES_BLOCK_SIZE; ++i)
- if (temp.byte[i] != padding) {
- ret.clear();
- return ret;
- }
- for (int i = 0; i < (AES_BLOCK_SIZE - padding); ++i)
- ret.emplace_back(temp.byte[i]);
- }
- return ret;
- }
- };
|