sha/sha.c

944 lines
30 KiB
C
Raw Normal View History

2022-09-07 15:41:40 +08:00
#include <stdio.h>
#include <string.h>
2022-09-07 15:41:40 +08:00
#include <stdint.h>
#include <ctype.h>
#include <unistd.h>
2022-09-07 15:41:40 +08:00
#include <stdlib.h>
#include <stdbool.h>
#include <string.h>
#include <string.h>
2022-09-07 15:41:40 +08:00
#define CBC 1
#define CTR 1
#define ECB 1
2022-09-07 15:41:40 +08:00
#include "aes.h"
2022-09-07 15:41:40 +08:00
#define BUFFER_SIZE 270
2022-09-07 15:41:40 +08:00
char *buff;
long file_size;
2022-09-07 15:41:40 +08:00
static void hex2str(uint8_t * input, uint16_t input_len, char *output)
2022-09-07 15:41:40 +08:00
{
2023-07-07 17:36:36 +08:00
const char *hexEncode = "0123456789ABCDEF";
int i = 0, j = 0;
2022-09-07 15:41:40 +08:00
for (i = 0; i < input_len; i++) {
output[j++] = hexEncode[(input[i] >> 4) & 0xf];
output[j++] = hexEncode[(input[i]) & 0xf];
2022-09-07 15:41:40 +08:00
}
}
int open_file(char *filename)
{
FILE *file;
file = fopen(filename, "r");
if (file == NULL) {
perror("cannot open config file.");
exit(-1);
}
fseek(file, 0, SEEK_END);
file_size = ftell(file);
buff = (char *)malloc(file_size + 1);
2023-07-07 11:58:01 +08:00
if (!buff)
2022-09-07 15:41:40 +08:00
perror("out of memory.");
rewind(file);
if (fread(buff, file_size, 1, file) < 1) {
perror("fread");
}
fclose(file);
buff[file_size] = '\0';
return 0;
}
char *source_c[] = {
2023-07-07 11:58:01 +08:00
"#include <stdio.h>",
"#include <string.h>",
"#include <stdint.h>",
"#include <ctype.h>",
"#include <unistd.h>",
"#include <stdlib.h>",
"#include <stdbool.h>",
"#define CBC 1",
"#define CTR 1",
"#define ECB 1",
"#ifndef _AES_H_",
"#define _AES_H_",
"",
"#include <stdint.h>",
"#include <stddef.h>",
"",
"#ifndef CBC",
"#define CBC 1",
"#endif",
"",
"#ifndef ECB",
"#define ECB 1",
"#endif",
"",
"#ifndef CTR",
"#define CTR 1",
"#endif",
"",
2023-07-07 17:36:36 +08:00
"//#define AES128 1",
2023-07-07 11:58:01 +08:00
"//#define AES192 1",
2023-07-07 17:36:36 +08:00
"#define AES256 1",
2023-07-07 11:58:01 +08:00
"",
"#define AES_BLOCKLEN 16 // Block length in bytes - AES is 128b block only",
"",
"#if defined(AES256) && (AES256 == 1)",
"#define AES_KEYLEN 32",
"#define AES_keyExpSize 240",
"#elif defined(AES192) && (AES192 == 1)",
"#define AES_KEYLEN 24",
"#define AES_keyExpSize 208",
"#else",
"#define AES_KEYLEN 16 // Key length in bytes",
"#define AES_keyExpSize 176",
"#endif",
"",
"struct AES_ctx {",
" uint8_t RoundKey[AES_keyExpSize];",
"#if (defined(CBC) && (CBC == 1)) || (defined(CTR) && (CTR == 1))",
" uint8_t Iv[AES_BLOCKLEN];",
"#endif",
"};",
"",
"void AES_init_ctx(struct AES_ctx *ctx, const uint8_t * key);",
"#if (defined(CBC) && (CBC == 1)) || (defined(CTR) && (CTR == 1))",
"void AES_init_ctx_iv(struct AES_ctx *ctx, const uint8_t * key, const uint8_t * iv);",
"void AES_ctx_set_iv(struct AES_ctx *ctx, const uint8_t * iv);",
"#endif",
"",
"#if defined(ECB) && (ECB == 1)",
"void AES_ECB_encrypt(const struct AES_ctx *ctx, uint8_t * buf);",
"void AES_ECB_decrypt(const struct AES_ctx *ctx, uint8_t * buf);",
"",
"#endif // #if defined(ECB) && (ECB == !)",
"",
"#if defined(CBC) && (CBC == 1)",
"void AES_CBC_encrypt_buffer(struct AES_ctx *ctx, uint8_t * buf, size_t length);",
"void AES_CBC_decrypt_buffer(struct AES_ctx *ctx, uint8_t * buf, size_t length);",
"",
"#endif // #if defined(CBC) && (CBC == 1)",
"",
"#if defined(CTR) && (CTR == 1)",
"",
"void AES_CTR_xcrypt_buffer(struct AES_ctx *ctx, uint8_t * buf, size_t length);",
"",
"#endif // #if defined(CTR) && (CTR == 1)",
"",
"#endif // _AES_H_",
"",
"",
"#define Nb 4",
"",
"#if defined(AES256) && (AES256 == 1)",
"#define Nk 8",
"#define Nr 14",
"#elif defined(AES192) && (AES192 == 1)",
"#define Nk 6",
"#define Nr 12",
"#else",
"#define Nk 4 // The number of 32 bit words in a key.",
"#define Nr 10 // The number of rounds in AES Cipher.",
"#endif",
"",
"#ifndef MULTIPLY_AS_A_FUNCTION",
"#define MULTIPLY_AS_A_FUNCTION 0",
"#endif",
"",
"typedef uint8_t state_t[4][4];",
"",
"static const uint8_t sbox[256] = {",
" 0x63, 0x7c, 0x77, 0x7b, 0xf2, 0x6b, 0x6f, 0xc5, 0x30, 0x01, 0x67, 0x2b, 0xfe, 0xd7, 0xab, 0x76,",
" 0xca, 0x82, 0xc9, 0x7d, 0xfa, 0x59, 0x47, 0xf0, 0xad, 0xd4, 0xa2, 0xaf, 0x9c, 0xa4, 0x72, 0xc0,",
" 0xb7, 0xfd, 0x93, 0x26, 0x36, 0x3f, 0xf7, 0xcc, 0x34, 0xa5, 0xe5, 0xf1, 0x71, 0xd8, 0x31, 0x15,",
" 0x04, 0xc7, 0x23, 0xc3, 0x18, 0x96, 0x05, 0x9a, 0x07, 0x12, 0x80, 0xe2, 0xeb, 0x27, 0xb2, 0x75,",
" 0x09, 0x83, 0x2c, 0x1a, 0x1b, 0x6e, 0x5a, 0xa0, 0x52, 0x3b, 0xd6, 0xb3, 0x29, 0xe3, 0x2f, 0x84,",
" 0x53, 0xd1, 0x00, 0xed, 0x20, 0xfc, 0xb1, 0x5b, 0x6a, 0xcb, 0xbe, 0x39, 0x4a, 0x4c, 0x58, 0xcf,",
" 0xd0, 0xef, 0xaa, 0xfb, 0x43, 0x4d, 0x33, 0x85, 0x45, 0xf9, 0x02, 0x7f, 0x50, 0x3c, 0x9f, 0xa8,",
" 0x51, 0xa3, 0x40, 0x8f, 0x92, 0x9d, 0x38, 0xf5, 0xbc, 0xb6, 0xda, 0x21, 0x10, 0xff, 0xf3, 0xd2,",
" 0xcd, 0x0c, 0x13, 0xec, 0x5f, 0x97, 0x44, 0x17, 0xc4, 0xa7, 0x7e, 0x3d, 0x64, 0x5d, 0x19, 0x73,",
" 0x60, 0x81, 0x4f, 0xdc, 0x22, 0x2a, 0x90, 0x88, 0x46, 0xee, 0xb8, 0x14, 0xde, 0x5e, 0x0b, 0xdb,",
" 0xe0, 0x32, 0x3a, 0x0a, 0x49, 0x06, 0x24, 0x5c, 0xc2, 0xd3, 0xac, 0x62, 0x91, 0x95, 0xe4, 0x79,",
" 0xe7, 0xc8, 0x37, 0x6d, 0x8d, 0xd5, 0x4e, 0xa9, 0x6c, 0x56, 0xf4, 0xea, 0x65, 0x7a, 0xae, 0x08,",
" 0xba, 0x78, 0x25, 0x2e, 0x1c, 0xa6, 0xb4, 0xc6, 0xe8, 0xdd, 0x74, 0x1f, 0x4b, 0xbd, 0x8b, 0x8a,",
" 0x70, 0x3e, 0xb5, 0x66, 0x48, 0x03, 0xf6, 0x0e, 0x61, 0x35, 0x57, 0xb9, 0x86, 0xc1, 0x1d, 0x9e,",
" 0xe1, 0xf8, 0x98, 0x11, 0x69, 0xd9, 0x8e, 0x94, 0x9b, 0x1e, 0x87, 0xe9, 0xce, 0x55, 0x28, 0xdf,",
" 0x8c, 0xa1, 0x89, 0x0d, 0xbf, 0xe6, 0x42, 0x68, 0x41, 0x99, 0x2d, 0x0f, 0xb0, 0x54, 0xbb, 0x16",
"};",
"",
"#if (defined(CBC) && CBC == 1) || (defined(ECB) && ECB == 1)",
"static const uint8_t rsbox[256] = {",
" 0x52, 0x09, 0x6a, 0xd5, 0x30, 0x36, 0xa5, 0x38, 0xbf, 0x40, 0xa3, 0x9e, 0x81, 0xf3, 0xd7, 0xfb,",
" 0x7c, 0xe3, 0x39, 0x82, 0x9b, 0x2f, 0xff, 0x87, 0x34, 0x8e, 0x43, 0x44, 0xc4, 0xde, 0xe9, 0xcb,",
" 0x54, 0x7b, 0x94, 0x32, 0xa6, 0xc2, 0x23, 0x3d, 0xee, 0x4c, 0x95, 0x0b, 0x42, 0xfa, 0xc3, 0x4e,",
" 0x08, 0x2e, 0xa1, 0x66, 0x28, 0xd9, 0x24, 0xb2, 0x76, 0x5b, 0xa2, 0x49, 0x6d, 0x8b, 0xd1, 0x25,",
" 0x72, 0xf8, 0xf6, 0x64, 0x86, 0x68, 0x98, 0x16, 0xd4, 0xa4, 0x5c, 0xcc, 0x5d, 0x65, 0xb6, 0x92,",
" 0x6c, 0x70, 0x48, 0x50, 0xfd, 0xed, 0xb9, 0xda, 0x5e, 0x15, 0x46, 0x57, 0xa7, 0x8d, 0x9d, 0x84,",
" 0x90, 0xd8, 0xab, 0x00, 0x8c, 0xbc, 0xd3, 0x0a, 0xf7, 0xe4, 0x58, 0x05, 0xb8, 0xb3, 0x45, 0x06,",
" 0xd0, 0x2c, 0x1e, 0x8f, 0xca, 0x3f, 0x0f, 0x02, 0xc1, 0xaf, 0xbd, 0x03, 0x01, 0x13, 0x8a, 0x6b,",
" 0x3a, 0x91, 0x11, 0x41, 0x4f, 0x67, 0xdc, 0xea, 0x97, 0xf2, 0xcf, 0xce, 0xf0, 0xb4, 0xe6, 0x73,",
" 0x96, 0xac, 0x74, 0x22, 0xe7, 0xad, 0x35, 0x85, 0xe2, 0xf9, 0x37, 0xe8, 0x1c, 0x75, 0xdf, 0x6e,",
" 0x47, 0xf1, 0x1a, 0x71, 0x1d, 0x29, 0xc5, 0x89, 0x6f, 0xb7, 0x62, 0x0e, 0xaa, 0x18, 0xbe, 0x1b,",
" 0xfc, 0x56, 0x3e, 0x4b, 0xc6, 0xd2, 0x79, 0x20, 0x9a, 0xdb, 0xc0, 0xfe, 0x78, 0xcd, 0x5a, 0xf4,",
" 0x1f, 0xdd, 0xa8, 0x33, 0x88, 0x07, 0xc7, 0x31, 0xb1, 0x12, 0x10, 0x59, 0x27, 0x80, 0xec, 0x5f,",
" 0x60, 0x51, 0x7f, 0xa9, 0x19, 0xb5, 0x4a, 0x0d, 0x2d, 0xe5, 0x7a, 0x9f, 0x93, 0xc9, 0x9c, 0xef,",
" 0xa0, 0xe0, 0x3b, 0x4d, 0xae, 0x2a, 0xf5, 0xb0, 0xc8, 0xeb, 0xbb, 0x3c, 0x83, 0x53, 0x99, 0x61,",
" 0x17, 0x2b, 0x04, 0x7e, 0xba, 0x77, 0xd6, 0x26, 0xe1, 0x69, 0x14, 0x63, 0x55, 0x21, 0x0c, 0x7d",
"};",
"#endif",
"",
"static const uint8_t Rcon[11] = {",
" 0x8d, 0x01, 0x02, 0x04, 0x08, 0x10, 0x20, 0x40, 0x80, 0x1b, 0x36",
"};",
"",
"#define getSBoxValue(num) (sbox[(num)])",
"",
"static void KeyExpansion(uint8_t * RoundKey, const uint8_t * Key)",
"{",
" unsigned i, j, k;",
" uint8_t tempa[4]; // Used for the column/row operations",
"",
" for (i = 0; i < Nk; ++i) {",
" RoundKey[(i * 4) + 0] = Key[(i * 4) + 0];",
" RoundKey[(i * 4) + 1] = Key[(i * 4) + 1];",
" RoundKey[(i * 4) + 2] = Key[(i * 4) + 2];",
" RoundKey[(i * 4) + 3] = Key[(i * 4) + 3];",
" }",
"",
" for (i = Nk; i < Nb * (Nr + 1); ++i) {",
" {",
" k = (i - 1) * 4;",
" tempa[0] = RoundKey[k + 0];",
" tempa[1] = RoundKey[k + 1];",
" tempa[2] = RoundKey[k + 2];",
" tempa[3] = RoundKey[k + 3];",
"",
" }",
"",
" if (i % Nk == 0) {",
" {",
" const uint8_t u8tmp = tempa[0];",
" tempa[0] = tempa[1];",
" tempa[1] = tempa[2];",
" tempa[2] = tempa[3];",
" tempa[3] = u8tmp;",
" }",
"",
" {",
" tempa[0] = getSBoxValue(tempa[0]);",
" tempa[1] = getSBoxValue(tempa[1]);",
" tempa[2] = getSBoxValue(tempa[2]);",
" tempa[3] = getSBoxValue(tempa[3]);",
" }",
"",
" tempa[0] = tempa[0] ^ Rcon[i / Nk];",
" }",
"#if defined(AES256) && (AES256 == 1)",
" if (i % Nk == 4) {",
" {",
" tempa[0] = getSBoxValue(tempa[0]);",
" tempa[1] = getSBoxValue(tempa[1]);",
" tempa[2] = getSBoxValue(tempa[2]);",
" tempa[3] = getSBoxValue(tempa[3]);",
" }",
" }",
"#endif",
" j = i * 4;",
" k = (i - Nk) * 4;",
" RoundKey[j + 0] = RoundKey[k + 0] ^ tempa[0];",
" RoundKey[j + 1] = RoundKey[k + 1] ^ tempa[1];",
" RoundKey[j + 2] = RoundKey[k + 2] ^ tempa[2];",
" RoundKey[j + 3] = RoundKey[k + 3] ^ tempa[3];",
" }",
"}",
"",
"void AES_init_ctx(struct AES_ctx *ctx, const uint8_t * key)",
"{",
" KeyExpansion(ctx->RoundKey, key);",
"}",
"",
"#if (defined(CBC) && (CBC == 1)) || (defined(CTR) && (CTR == 1))",
"void AES_init_ctx_iv(struct AES_ctx *ctx, const uint8_t * key, const uint8_t * iv)",
"{",
" KeyExpansion(ctx->RoundKey, key);",
" memcpy(ctx->Iv, iv, AES_BLOCKLEN);",
"}",
"",
"void AES_ctx_set_iv(struct AES_ctx *ctx, const uint8_t * iv)",
"{",
" memcpy(ctx->Iv, iv, AES_BLOCKLEN);",
"}",
"#endif",
"",
"static void AddRoundKey(uint8_t round, state_t * state, const uint8_t * RoundKey)",
"{",
" uint8_t i, j;",
" for (i = 0; i < 4; ++i) {",
" for (j = 0; j < 4; ++j) {",
" (*state)[i][j] ^= RoundKey[(round * Nb * 4) + (i * Nb) + j];",
" }",
" }",
"}",
"",
"static void SubBytes(state_t * state)",
"{",
" uint8_t i, j;",
" for (i = 0; i < 4; ++i) {",
" for (j = 0; j < 4; ++j) {",
" (*state)[j][i] = getSBoxValue((*state)[j][i]);",
" }",
" }",
"}",
"",
"static void ShiftRows(state_t * state)",
"{",
" uint8_t temp;",
"",
" temp = (*state)[0][1];",
" (*state)[0][1] = (*state)[1][1];",
" (*state)[1][1] = (*state)[2][1];",
" (*state)[2][1] = (*state)[3][1];",
" (*state)[3][1] = temp;",
" ",
" temp = (*state)[0][2];",
" (*state)[0][2] = (*state)[2][2];",
" (*state)[2][2] = temp;",
"",
" temp = (*state)[1][2];",
" (*state)[1][2] = (*state)[3][2];",
" (*state)[3][2] = temp;",
"",
" temp = (*state)[0][3];",
" (*state)[0][3] = (*state)[3][3];",
" (*state)[3][3] = (*state)[2][3];",
" (*state)[2][3] = (*state)[1][3];",
" (*state)[1][3] = temp;",
"}",
"",
"static uint8_t xtime(uint8_t x)",
"{",
" return ((x << 1) ^ (((x >> 7) & 1) * 0x1b));",
"}",
"",
"static void MixColumns(state_t * state)",
"{",
" uint8_t i;",
" uint8_t Tmp, Tm, t;",
" for (i = 0; i < 4; ++i) {",
" t = (*state)[i][0];",
" Tmp = (*state)[i][0] ^ (*state)[i][1] ^ (*state)[i][2] ^ (*state)[i][3];",
" Tm = (*state)[i][0] ^ (*state)[i][1];",
" Tm = xtime(Tm);",
" (*state)[i][0] ^= Tm ^ Tmp;",
" Tm = (*state)[i][1] ^ (*state)[i][2];",
" Tm = xtime(Tm);",
" (*state)[i][1] ^= Tm ^ Tmp;",
" Tm = (*state)[i][2] ^ (*state)[i][3];",
" Tm = xtime(Tm);",
" (*state)[i][2] ^= Tm ^ Tmp;",
" Tm = (*state)[i][3] ^ t;",
" Tm = xtime(Tm);",
" (*state)[i][3] ^= Tm ^ Tmp;",
" }",
"}",
"",
"#if MULTIPLY_AS_A_FUNCTION",
"static uint8_t Multiply(uint8_t x, uint8_t y)",
"{",
" return (((y & 1) * x) ^ ((y >> 1 & 1) * xtime(x)) ^ ((y >> 2 & 1) * xtime(xtime(x))) ^ ((y >> 3 & 1) * xtime(xtime(xtime(x)))) ^ ((y >> 4 & 1) * xtime(xtime(xtime(xtime(x)))))); /* this last call to xtime() can be omitted */",
"}",
"#else",
"#define Multiply(x, y) \\",
" ( ((y & 1) * x) ^ \\",
" ((y>>1 & 1) * xtime(x)) ^ \\",
" ((y>>2 & 1) * xtime(xtime(x))) ^ \\",
" ((y>>3 & 1) * xtime(xtime(xtime(x)))) ^ \\",
" ((y>>4 & 1) * xtime(xtime(xtime(xtime(x)))))) \\",
"",
"#endif",
"",
"#if (defined(CBC) && CBC == 1) || (defined(ECB) && ECB == 1)",
"",
"#define getSBoxInvert(num) (rsbox[(num)])",
"",
"static void InvMixColumns(state_t * state)",
"{",
" int i;",
" uint8_t a, b, c, d;",
" for (i = 0; i < 4; ++i) {",
" a = (*state)[i][0];",
" b = (*state)[i][1];",
" c = (*state)[i][2];",
" d = (*state)[i][3];",
"",
" (*state)[i][0] = Multiply(a, 0x0e) ^ Multiply(b, 0x0b) ^ Multiply(c, 0x0d) ^ Multiply(d, 0x09);",
" (*state)[i][1] = Multiply(a, 0x09) ^ Multiply(b, 0x0e) ^ Multiply(c, 0x0b) ^ Multiply(d, 0x0d);",
" (*state)[i][2] = Multiply(a, 0x0d) ^ Multiply(b, 0x09) ^ Multiply(c, 0x0e) ^ Multiply(d, 0x0b);",
" (*state)[i][3] = Multiply(a, 0x0b) ^ Multiply(b, 0x0d) ^ Multiply(c, 0x09) ^ Multiply(d, 0x0e);",
" }",
"}",
"",
"static void InvSubBytes(state_t * state)",
"{",
" uint8_t i, j;",
" for (i = 0; i < 4; ++i) {",
" for (j = 0; j < 4; ++j) {",
" (*state)[j][i] = getSBoxInvert((*state)[j][i]);",
" }",
" }",
"}",
"",
"static void InvShiftRows(state_t * state)",
"{",
" uint8_t temp;",
"",
" temp = (*state)[3][1];",
" (*state)[3][1] = (*state)[2][1];",
" (*state)[2][1] = (*state)[1][1];",
" (*state)[1][1] = (*state)[0][1];",
" (*state)[0][1] = temp;",
"",
" temp = (*state)[0][2];",
" (*state)[0][2] = (*state)[2][2];",
" (*state)[2][2] = temp;",
"",
" temp = (*state)[1][2];",
" (*state)[1][2] = (*state)[3][2];",
" (*state)[3][2] = temp;",
"",
" temp = (*state)[0][3];",
" (*state)[0][3] = (*state)[1][3];",
" (*state)[1][3] = (*state)[2][3];",
" (*state)[2][3] = (*state)[3][3];",
" (*state)[3][3] = temp;",
"}",
"#endif // #if (defined(CBC) && CBC == 1) || (defined(ECB) && ECB == 1)",
"",
"static void Cipher(state_t * state, const uint8_t * RoundKey)",
"{",
" uint8_t round = 0;",
"",
" AddRoundKey(0, state, RoundKey);",
"",
" for (round = 1;; ++round) {",
" SubBytes(state);",
" ShiftRows(state);",
" if (round == Nr) {",
" break;",
" }",
" MixColumns(state);",
" AddRoundKey(round, state, RoundKey);",
" }",
" AddRoundKey(Nr, state, RoundKey);",
"}",
"",
"#if (defined(CBC) && CBC == 1) || (defined(ECB) && ECB == 1)",
"static void InvCipher(state_t * state, const uint8_t * RoundKey)",
"{",
" uint8_t round = 0;",
"",
" AddRoundKey(Nr, state, RoundKey);",
"",
" for (round = (Nr - 1);; --round) {",
" InvShiftRows(state);",
" InvSubBytes(state);",
" AddRoundKey(round, state, RoundKey);",
" if (round == 0) {",
" break;",
" }",
" InvMixColumns(state);",
" }",
"",
"}",
"#endif // #if (defined(CBC) && CBC == 1) || (defined(ECB) && ECB == 1)",
"",
"#if defined(ECB) && (ECB == 1)",
"",
"void AES_ECB_encrypt(const struct AES_ctx *ctx, uint8_t * buf)",
"{",
" Cipher((state_t *) buf, ctx->RoundKey);",
"}",
"",
"void AES_ECB_decrypt(const struct AES_ctx *ctx, uint8_t * buf)",
"{",
" // The next function call decrypts the PlainText with the Key using AES algorithm.",
" InvCipher((state_t *) buf, ctx->RoundKey);",
"}",
"",
"#endif // #if defined(ECB) && (ECB == 1)",
"",
"#if defined(CBC) && (CBC == 1)",
"",
"static void XorWithIv(uint8_t * buf, const uint8_t * Iv)",
"{",
" uint8_t i;",
" for (i = 0; i < AES_BLOCKLEN; ++i) // The block in AES is always 128bit no matter the key size",
" {",
" buf[i] ^= Iv[i];",
" }",
"}",
"",
"void AES_CBC_encrypt_buffer(struct AES_ctx *ctx, uint8_t * buf, size_t length)",
2022-09-07 15:41:40 +08:00
"{",
2023-07-07 11:58:01 +08:00
" size_t i;",
" uint8_t *Iv = ctx->Iv;",
" for (i = 0; i < length; i += AES_BLOCKLEN) {",
" XorWithIv(buf, Iv);",
" Cipher((state_t *) buf, ctx->RoundKey);",
" Iv = buf;",
" buf += AES_BLOCKLEN;",
" }",
" /* store Iv in ctx for next call */",
" memcpy(ctx->Iv, Iv, AES_BLOCKLEN);",
"}",
"",
"void AES_CBC_decrypt_buffer(struct AES_ctx *ctx, uint8_t * buf, size_t length)",
"{",
" size_t i;",
" uint8_t storeNextIv[AES_BLOCKLEN];",
" for (i = 0; i < length; i += AES_BLOCKLEN) {",
" memcpy(storeNextIv, buf, AES_BLOCKLEN);",
" InvCipher((state_t *) buf, ctx->RoundKey);",
" XorWithIv(buf, ctx->Iv);",
" memcpy(ctx->Iv, storeNextIv, AES_BLOCKLEN);",
" buf += AES_BLOCKLEN;",
" }",
"",
"}",
"",
"#endif // #if defined(CBC) && (CBC == 1)",
"",
"#if defined(CTR) && (CTR == 1)",
"",
"void AES_CTR_xcrypt_buffer(struct AES_ctx *ctx, uint8_t * buf, size_t length)",
"{",
" uint8_t buffer[AES_BLOCKLEN];",
"",
" size_t i;",
" int bi;",
" for (i = 0, bi = AES_BLOCKLEN; i < length; ++i, ++bi) {",
" if (bi == AES_BLOCKLEN) { /* we need to regen xor compliment in buffer */",
" memcpy(buffer, ctx->Iv, AES_BLOCKLEN);",
" Cipher((state_t *) buffer, ctx->RoundKey);",
"",
" /* Increment Iv and handle overflow */",
" for (bi = (AES_BLOCKLEN - 1); bi >= 0; --bi) {",
" /* inc will overflow */",
" if (ctx->Iv[bi] == 255) {",
" ctx->Iv[bi] = 0;",
" continue;",
" }",
" ctx->Iv[bi] += 1;",
" break;",
" }",
" bi = 0;",
" }",
"",
" buf[i] = (buf[i] ^ buffer[bi]);",
" }",
"}",
"",
"#endif // #if defined(CTR) && (CTR == 1)",
"",
"static int oneHexChar2Hex(char hex) {",
2022-09-07 15:41:40 +08:00
" int outHex = 0;",
" if (isdigit(hex)) {",
" outHex = hex - '0';",
" } else if (isupper(hex)) {",
" outHex = hex - 'A' + 10;",
2023-07-07 11:58:01 +08:00
" } else if (islower(hex)) {",
2022-09-07 15:41:40 +08:00
" outHex = hex - 'a' + 10;",
" }",
" return outHex;",
"}",
"",
2023-07-07 11:58:01 +08:00
"static int HexString2Hex(const char *inHexString, uint8_t *outHex, int count) {",
" if (inHexString == NULL || outHex == NULL || count <= 0) {",
" return -1;",
" }",
"" " int len = strlen(inHexString);",
" bool hasIncompleteByte = (len % 2 != 0);",
"",
" if (hasIncompleteByte) {",
" len--;",
" }",
"",
" if (count < len / 2) {",
" return -1;",
" }",
"",
" for (int i = 0; i < len; i += 2) {",
" char ch1 = inHexString[i];",
" char ch2 = inHexString[i + 1];",
"",
" if (!isxdigit(ch1) || !isxdigit(ch2)) {",
" return -1;",
" }",
"" " int hex1 = oneHexChar2Hex(ch1);",
" int hex2 = oneHexChar2Hex(ch2);",
"",
" outHex[i / 2] = (hex1 << 4) | hex2;",
" }",
"",
" return len / 2;",
"}",
"",
"static int is_Resolver(char *shll_text, char *shbin)",
2022-09-07 15:41:40 +08:00
"{",
2023-07-07 11:58:01 +08:00
" char *p, *p1;",
" char temp[270];",
"",
" p = strstr(shll_text, \"\\n\");",
" memcpy(shbin, shll_text, p - shll_text);",
"",
"",
" if (0 == strncmp(shbin, \"#!\", 2))",
" {",
" p1 = strchr(shbin, '/');",
2023-07-07 17:36:36 +08:00
" memcpy(shbin, p1, (p - shll_text) - 2);",
" shbin[(p - shll_text) - 2] = '\\0';",
2023-07-07 11:58:01 +08:00
" }",
" else if (0 == strncmp(shbin, \":\", 1))",
" {",
" strcpy(shbin, getenv(\"SHELL\"));",
" }",
" else",
" {",
" printf(\"unknown shell!\\n\");",
" return -1;",
" }",
"",
" memset(temp, 0, 270);",
" strcpy(temp, \"which \");",
" strcat(temp, shbin);",
" strcat(temp, \" 1> /dev/null\");",
" if (0 != system(temp)) // 不存在解析器",
" {",
" printf(\"not found shell!\\n\");",
" return -1;",
" }",
" return 0;",
2022-09-07 15:41:40 +08:00
"}",
"",
2023-07-07 11:58:01 +08:00
"",
"void reverse_string(char *str, int len)",
"{",
" char *p1;",
" char *p2;",
"",
" p1 = str;",
" p2 = str + len - 1; //p2指向字符串尾地址",
" if (str == NULL) {",
" printf(\"Null pointer error!\");",
" return;",
" }",
" while (p1 < p2) //当p1地址小于p2地址时执行循环",
" {",
" char c = *p1;",
" *p1 = *p2; //完成指针指向地址的值的交换",
" *p2 = c;",
" p1++; //交换完毕后p1指针指向下一个字符地址",
" p2--; //交换完毕后p2指针指向上一个字符地址",
" }",
"",
"}",
"",
"#define BUFFER_SIZE 270",
"",
"int main(int argc, char *argv[])",
"{",
" char *argvs[BUFFER_SIZE];",
2023-07-07 17:36:36 +08:00
" char *shbin = NULL;",
2023-07-07 11:58:01 +08:00
" int l=1;",
" int i=4;",
"",
" struct AES_ctx ctx;",
" uint8_t *Hex_string = (uint8_t *) malloc(encrypted_text_len*2);",
2023-07-07 17:36:36 +08:00
"",
2023-07-07 11:58:01 +08:00
" reverse_string((char *)Encrypted_data, encrypted_text_len*2);",
" memset(Hex_string, 0, encrypted_text_len*2);",
"",
"",
" AES_init_ctx(&ctx, key);",
" HexString2Hex((char *)Encrypted_data, (char *)Hex_string, sizeof(Encrypted_data));",
" AES_ECB_decrypt(&ctx, Hex_string);",
" //printf(\"%s\\n\", Hex_string);",
"",
"",
" shbin = (char *) malloc(BUFFER_SIZE);",
" memset(shbin, 0, BUFFER_SIZE);",
" if (-1 == is_Resolver((char *)Hex_string, shbin))",
" {",
" goto EXIT;",
" }",
" //printf(\"%s\\n\", shbin);",
"",
" if (strstr(shbin, \"python\") != NULL) {",
" argvs[0] = argv[0];",
" argvs[1] = \"-c\";",
" argvs[2] = (char *)Hex_string;",
" //argvs[3] = argv[0];",
" for(i=3; i<=argc-1+3; i++)",
" {",
" argvs[i] = argv[l];",
" l++;",
" }",
" execvp(shbin, argvs);",
" }",
" else",
" {",
" argvs[0] = argv[0];",
" argvs[1] = \"-c\";",
" argvs[2] = (char *)Hex_string;",
" argvs[3] = argv[0];",
" for(i=4; i<=argc-1+4; i++)",
" {",
" argvs[i] = argv[l];",
" l++;",
" }",
"",
" execvp(shbin, argvs);",
" }",
"",
"",
"EXIT:",
" free(Hex_string);",
" free(shbin);",
"",
" return 0;",
"}",
0
2022-09-07 15:41:40 +08:00
};
2023-07-07 17:36:36 +08:00
void reverse_string(char *str, int length)
2022-12-29 18:18:42 +08:00
{
2023-07-07 17:36:36 +08:00
if (str == NULL) {
2022-12-29 18:18:42 +08:00
printf("空指针错误!");
return;
}
2023-07-07 17:36:36 +08:00
char *start = str;
char *end = str + length - 1;
while (start < end) {
char temp = *start;
*start++ = *end;
*end-- = temp;
}
2022-12-29 18:18:42 +08:00
}
void usage(void)
{
printf(" SHA\n");
printf(" Shell Strict AES 128 bit encryption tool\n");
2023-07-07 11:58:01 +08:00
printf("Author: AIXIAO@AIXIAO.ME\n");
2022-12-29 18:18:42 +08:00
printf("\n");
2023-07-07 11:58:01 +08:00
2022-12-29 18:18:42 +08:00
printf("Usage:\n");
2023-07-07 11:58:01 +08:00
printf(" sha [-kfh?]\n");
printf(" -k : Key\n");
printf(" -f : Script File\n");
printf(" -h -? : Print Help\n");
2022-12-29 18:18:42 +08:00
printf("\n");
exit(0);
}
2022-09-07 15:41:40 +08:00
2023-07-07 11:58:01 +08:00
char pool[] = {
'0', '1', '2', '3', '4', '5', '6', '7', '8', '9',
'a', 'b', 'c', 'd', 'e', 'f', 'g', 'h', 'i', 'j',
'k', 'l', 'm', 'n', 'o', 'p', 'q', 'r', 's', 't',
'u', 'v', 'w', 'x', 'y', 'z', 'A', 'B', 'C', 'D',
'E', 'F', 'G', 'H', 'I', 'J', 'K', 'L', 'M', 'N',
'O', 'P', 'Q', 'R', 'S', 'T', 'U', 'V', 'W', 'X',
'Y', 'Z', '!', '@', '#', '$', '%', '^', '&', '*',
};
int rand_key(char *key)
{
2023-07-07 17:36:36 +08:00
int PASSWD_LEN = 32;
2023-07-07 11:58:01 +08:00
struct timeval tpstart;
2023-07-07 17:36:36 +08:00
char password[33];
2023-07-07 11:58:01 +08:00
int i = 0;
2023-07-07 17:36:36 +08:00
memset(password, 0, 33);
2023-07-07 11:58:01 +08:00
gettimeofday(&tpstart, NULL);
srand(tpstart.tv_usec);
while (i != PASSWD_LEN) {
password[i++] = pool[rand() % sizeof(pool)];
}
strcpy(key, password);
return 0;
}
2022-09-07 15:41:40 +08:00
int main(int argc, char *argv[])
{
2023-07-07 17:36:36 +08:00
static uint8_t key[33] = "";
2022-12-29 18:18:42 +08:00
char sh_file[1024];
2023-07-07 11:58:01 +08:00
int indx = 0;
2023-01-30 14:35:44 +08:00
2022-12-29 18:18:42 +08:00
int opt;
char optstrs[] = ":k:f:h?";
while (-1 != (opt = getopt(argc, argv, optstrs))) {
switch (opt) {
case 'k':
strcpy((char *)key, optarg);
break;
case 'f':
strcpy((char *)sh_file, optarg);
break;
case ':':
usage();
case 'h':
case '?':
usage();
default:
usage();
}
}
2023-07-07 11:58:01 +08:00
if (strlen((char *)key) == 0) {
rand_key((char *)key);
} else {
if ((strlen((char *)key) < 8) || (strlen((char *)key) > 15)) {
printf("The key must be 8-15 digits!\n");
exit(1);
}
}
if (argv[1] == NULL) {
usage();
2022-09-07 15:41:40 +08:00
}
2023-07-07 11:58:01 +08:00
2022-12-29 18:18:42 +08:00
open_file(sh_file);
2023-07-07 11:58:01 +08:00
2022-09-14 16:47:34 +08:00
struct AES_ctx ctx;
uint8_t text_content[file_size * 2];
2022-09-07 15:41:40 +08:00
uint8_t text_content_out[file_size * 2];
uint16_t text_content_length = file_size;
2023-07-07 11:58:01 +08:00
unsigned char encrypted_text[file_size * 2];
2022-09-07 15:41:40 +08:00
char encrypted_text_len[BUFFER_SIZE];
2023-07-07 11:58:01 +08:00
uint8_t *hexString = (uint8_t *) malloc(file_size * 2);
2022-09-07 15:41:40 +08:00
FILE *sfile = NULL;
char sourcefile[BUFFER_SIZE];
char binfile[BUFFER_SIZE];
2023-07-07 11:58:01 +08:00
char buildcmd[BUFFER_SIZE * 10];
char encrypted_key[1024];
2022-09-07 15:41:40 +08:00
memset(text_content, 0, file_size * 2);
memset(text_content_out, 0, file_size * 2);
2023-07-07 11:58:01 +08:00
memset(encrypted_text, 0, file_size * 2);
2022-09-07 15:41:40 +08:00
memset(encrypted_text_len, 0, BUFFER_SIZE);
2023-07-07 11:58:01 +08:00
memset(hexString, 0, file_size * 2);
2022-09-07 15:41:40 +08:00
memset(sourcefile, 0, BUFFER_SIZE);
memset(binfile, 0, BUFFER_SIZE);
2023-07-07 11:58:01 +08:00
memset(buildcmd, 0, BUFFER_SIZE * 10);
memset(encrypted_key, 0, 1024);
2022-09-07 15:41:40 +08:00
memcpy(text_content, buff, strlen(buff));
2023-07-07 11:58:01 +08:00
AES_init_ctx(&ctx, key);
AES_ECB_encrypt(&ctx, text_content);
2022-09-07 15:41:40 +08:00
//转16进制字符串
hex2str(text_content, file_size, (char *)hexString);
2023-07-07 11:58:01 +08:00
2023-07-07 17:36:36 +08:00
reverse_string((char *)hexString, text_content_length*2);
2023-07-07 11:58:01 +08:00
2022-09-07 15:41:40 +08:00
//拼接
2023-07-07 17:36:36 +08:00
strncat((char *)encrypted_text, "char Encrypted_data[]=\"", 24);
strncat((char *)encrypted_text, (const char *)hexString, text_content_length*2);
2022-09-07 15:41:40 +08:00
strcat((char *)encrypted_text, "\";");
2023-07-07 11:58:01 +08:00
2023-07-07 17:36:36 +08:00
memcpy(encrypted_key, "const char key[33] = \"", 23);
strncat((char *)encrypted_key, (char *)key, 32);
2022-12-29 18:18:42 +08:00
strcat((char *)encrypted_key, "\";");
2023-07-07 11:58:01 +08:00
2022-09-07 15:41:40 +08:00
// 长度
sprintf(encrypted_text_len, "int encrypted_text_len=%d;\n", text_content_length);
2023-07-07 11:58:01 +08:00
2022-12-29 18:18:42 +08:00
strcpy(sourcefile, sh_file);
2022-09-07 15:41:40 +08:00
strcat(sourcefile, ".c");
2023-07-07 11:58:01 +08:00
2022-09-07 15:41:40 +08:00
// 写入文件
sfile = fopen(sourcefile, "w");
2023-07-07 11:58:01 +08:00
if (sfile == NULL) {
perror("fopen");
return 1;
2022-09-07 15:41:40 +08:00
}
2023-07-07 11:58:01 +08:00
2022-09-07 15:41:40 +08:00
fprintf(sfile, "%s\n", encrypted_text);
fprintf(sfile, "%s\n", encrypted_text_len);
2022-12-29 18:18:42 +08:00
fprintf(sfile, "%s\n", encrypted_key);
2022-09-07 15:41:40 +08:00
fflush(sfile);
2023-07-07 11:58:01 +08:00
for (indx = 0; source_c[indx]; indx++)
2022-09-07 15:41:40 +08:00
fprintf(sfile, "%s\n", source_c[indx]);
fclose(sfile);
strcpy(binfile, sourcefile);
strcat(binfile, ".x");
sleep(1);
2023-07-07 11:58:01 +08:00
if (getenv("CFLAGS") != NULL)
2023-07-07 11:58:01 +08:00
sprintf(buildcmd, "gcc %s %s -o %s", getenv("CFLAGS"), sourcefile, binfile);
else
2022-12-26 11:28:59 +08:00
sprintf(buildcmd, "gcc %s -o %s", sourcefile, binfile);
2023-07-07 11:58:01 +08:00
2022-09-14 16:47:34 +08:00
strcat(buildcmd, " && strip ");
strcat(buildcmd, binfile);
// 编译
if (0 != system(buildcmd)) {
return -1;
}
2023-07-07 11:58:01 +08:00
2022-12-29 18:18:42 +08:00
//remove(sourcefile);
2022-09-07 15:41:40 +08:00
free(buff);
2023-07-07 17:36:36 +08:00
free(hexString);
2023-07-07 11:58:01 +08:00
// 压缩
2023-07-07 11:58:01 +08:00
if (system("which upx 1> /dev/null") == 0) {
char *upxcommand = malloc(BUFFER_SIZE);
if (upxcommand == NULL) {
return -1; // 内存分配失败,处理错误
}
memset(upxcommand, 0, BUFFER_SIZE);
strcpy(upxcommand, "upx -9 ");
strcat(upxcommand, binfile);
2023-07-07 11:58:01 +08:00
FILE *fp = popen(upxcommand, "r");
if (fp == NULL) {
free(upxcommand); // 释放分配的内存
return -1; // 处理打开管道错误
}
int status = pclose(fp);
if (status == -1 || WEXITSTATUS(status) != 0) {
free(upxcommand); // 释放分配的内存
return -1; // 处理执行upx命令错误
}
2023-07-07 11:58:01 +08:00
free(upxcommand); // 释放分配的内存
}
2022-09-07 15:41:40 +08:00
return 0;
2023-07-07 11:58:01 +08:00
}