| /*********************************************************** |
| Copyright 1994 by Lance Ellinghouse, |
| Cathedral City, California Republic, United States of America. |
| |
| All Rights Reserved |
| |
| Permission to use, copy, modify, and distribute this software and its |
| documentation for any purpose and without fee is hereby granted, |
| provided that the above copyright notice appear in all copies and that |
| both that copyright notice and this permission notice appear in |
| supporting documentation, and that the name of Lance Ellinghouse |
| not be used in advertising or publicity pertaining to distribution |
| of the software without specific, written prior permission. |
| |
| LANCE ELLINGHOUSE DISCLAIMS ALL WARRANTIES WITH REGARD TO |
| THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND |
| FITNESS, IN NO EVENT SHALL LANCE ELLINGHOUSE BE LIABLE FOR ANY SPECIAL, |
| INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING |
| FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, |
| NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION |
| WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
| |
| ******************************************************************/ |
| |
| /* This creates an encryption and decryption engine I am calling |
| a rotor due to the original design was a harware rotor with |
| contacts used in Germany during WWII. |
| |
| Rotor Module: |
| |
| - rotor.newrotor('key') -> rotorobject (default of 6 rotors) |
| - rotor.newrotor('key', num_rotors) -> rotorobject |
| |
| Rotor Objects: |
| |
| - ro.setkey('string') -> None (resets the key as defined in newrotor(). |
| - ro.encrypt('string') -> encrypted string |
| - ro.decrypt('encrypted string') -> unencrypted string |
| |
| - ro.encryptmore('string') -> encrypted string |
| - ro.decryptmore('encrypted string') -> unencrypted string |
| |
| NOTE: the {en,de}cryptmore() methods use the setup that was |
| established via the {en,de}crypt calls. They will NOT |
| re-initalize the rotors unless: 1) They have not been |
| initalized with {en,de}crypt since the last setkey() call; |
| 2) {en,de}crypt has not been called for this rotor yet. |
| |
| NOTE: you MUST use the SAME key in rotor.newrotor() |
| if you wish to decrypt an encrypted string. |
| Also, the encrypted string is NOT 0-127 ASCII. |
| It is considered BINARY data. |
| |
| */ |
| |
| /* Rotor objects */ |
| |
| #include "Python.h" |
| #include "mymath.h" |
| |
| #define TRUE 1 |
| #define FALSE 0 |
| |
| typedef struct { |
| PyObject_HEAD |
| int seed[3]; |
| short key[5]; |
| int isinited; |
| int size; |
| int size_mask; |
| int rotors; |
| unsigned char *e_rotor; /* [num_rotors][size] */ |
| unsigned char *d_rotor; /* [num_rotors][size] */ |
| unsigned char *positions; /* [num_rotors] */ |
| unsigned char *advances; /* [num_rotors] */ |
| } Rotorobj; |
| |
| staticforward PyTypeObject Rotor_Type; |
| |
| #define is_rotor(v) ((v)->ob_type == &Rotor_Type) |
| |
| /* |
| This defines the necessary routines to manage rotor objects |
| */ |
| |
| static void |
| set_seed(r) |
| Rotorobj *r; |
| { |
| r->seed[0] = r->key[0]; |
| r->seed[1] = r->key[1]; |
| r->seed[2] = r->key[2]; |
| r->isinited = FALSE; |
| } |
| |
| /* Return the next random number in the range [0.0 .. 1.0) */ |
| static float |
| r_random(r) |
| Rotorobj *r; |
| { |
| int x, y, z; |
| float val, term; |
| |
| x = r->seed[0]; |
| y = r->seed[1]; |
| z = r->seed[2]; |
| |
| x = 171 * (x % 177) - 2 * (x/177); |
| y = 172 * (y % 176) - 35 * (y/176); |
| z = 170 * (z % 178) - 63 * (z/178); |
| |
| if (x < 0) x = x + 30269; |
| if (y < 0) y = y + 30307; |
| if (z < 0) z = z + 30323; |
| |
| r->seed[0] = x; |
| r->seed[1] = y; |
| r->seed[2] = z; |
| |
| term = (float)( |
| (((float)x)/(float)30269.0) + |
| (((float)y)/(float)30307.0) + |
| (((float)z)/(float)30323.0) |
| ); |
| val = term - (float)floor((double)term); |
| |
| if (val >= 1.0) |
| val = 0.0; |
| |
| return val; |
| } |
| |
| static short |
| r_rand(r, s) |
| Rotorobj *r; |
| short s; |
| { |
| /*short tmp = (short)((int)(r_random(r) * (float)32768.0) % 32768);*/ |
| short tmp = (short)((short)(r_random(r) * (float)s) % s); |
| return tmp; |
| } |
| |
| static void |
| set_key(r, key) |
| Rotorobj *r; |
| char *key; |
| { |
| #ifdef BUGGY_CODE_BW_COMPAT |
| /* See comments below */ |
| int k1=995, k2=576, k3=767, k4=671, k5=463; |
| #else |
| unsigned long k1=995, k2=576, k3=767, k4=671, k5=463; |
| #endif |
| int i; |
| int len = strlen(key); |
| for (i = 0; i < len; i++) { |
| #ifdef BUGGY_CODE_BW_COMPAT |
| /* This is the code as it was originally released. |
| It causes warnings on many systems and can generate |
| different results as well. If you have files |
| encrypted using an older version you may want to |
| #define BUGGY_CODE_BW_COMPAT so as to be able to |
| decrypt them... */ |
| k1 = (((k1<<3 | k1<<-13) + key[i]) & 65535); |
| k2 = (((k2<<3 | k2<<-13) ^ key[i]) & 65535); |
| k3 = (((k3<<3 | k3<<-13) - key[i]) & 65535); |
| k4 = ((key[i] - (k4<<3 | k4<<-13)) & 65535); |
| k5 = (((k5<<3 | k5<<-13) ^ ~key[i]) & 65535); |
| #else |
| /* This code should be more portable */ |
| k1 = (((k1<<3 | k1>>13) + key[i]) & 65535); |
| k2 = (((k2<<3 | k2>>13) ^ key[i]) & 65535); |
| k3 = (((k3<<3 | k3>>13) - key[i]) & 65535); |
| k4 = ((key[i] - (k4<<3 | k4>>13)) & 65535); |
| k5 = (((k5<<3 | k5>>13) ^ ~key[i]) & 65535); |
| #endif |
| } |
| r->key[0] = (short)k1; |
| r->key[1] = (short)(k2|1); |
| r->key[2] = (short)k3; |
| r->key[3] = (short)k4; |
| r->key[4] = (short)k5; |
| |
| set_seed(r); |
| } |
| |
| /* These define the interface to a rotor object */ |
| static Rotorobj * |
| rotorobj_new(num_rotors, key) |
| int num_rotors; |
| char *key; |
| { |
| Rotorobj *xp; |
| |
| xp = PyObject_NEW(Rotorobj, &Rotor_Type); |
| if (xp == NULL) |
| return NULL; |
| set_key(xp, key); |
| |
| xp->size = 256; |
| xp->size_mask = xp->size - 1; |
| xp->size_mask = 0; |
| xp->rotors = num_rotors; |
| xp->e_rotor = NULL; |
| xp->d_rotor = NULL; |
| xp->positions = NULL; |
| xp->advances = NULL; |
| |
| if (!(xp->e_rotor = PyMem_NEW(unsigned char, num_rotors * xp->size))) |
| goto finally; |
| if (!(xp->d_rotor = PyMem_NEW(unsigned char, num_rotors * xp->size))) |
| goto finally; |
| if (!(xp->positions = PyMem_NEW(unsigned char, num_rotors))) |
| goto finally; |
| if (!(xp->advances = PyMem_NEW(unsigned char, num_rotors))) |
| goto finally; |
| |
| return xp; |
| |
| finally: |
| PyMem_XDEL(xp->e_rotor); |
| PyMem_XDEL(xp->d_rotor); |
| PyMem_XDEL(xp->positions); |
| PyMem_XDEL(xp->advances); |
| Py_DECREF(xp); |
| return (Rotorobj*)PyErr_NoMemory(); |
| } |
| |
| /* These routines impliment the rotor itself */ |
| |
| /* Here is a fairly sofisticated {en,de}cryption system. It is based |
| on the idea of a "rotor" machine. A bunch of rotors, each with a |
| different permutation of the alphabet, rotate around a different amount |
| after encrypting one character. The current state of the rotors is |
| used to encrypt one character. |
| |
| The code is smart enought to tell if your alphabet has a number of |
| characters equal to a power of two. If it does, it uses logical |
| operations, if not it uses div and mod (both require a division). |
| |
| You will need to make two changes to the code 1) convert to c, and |
| customize for an alphabet of 255 chars 2) add a filter at the begining, |
| and end, which subtracts one on the way in, and adds one on the way |
| out. |
| |
| You might wish to do some timing studies. Another viable alternative |
| is to "byte stuff" the encrypted data of a normal (perhaps this one) |
| encryption routine. |
| |
| j' |
| */ |
| |
| /*(defun RTR-make-id-rotor (rotor) |
| "Set ROTOR to the identity permutation" |
| (let ((j 0)) |
| (while (< j RTR-size) |
| (aset rotor j j) |
| (setq j (+ 1 j))) |
| rotor)) |
| */ |
| static void |
| RTR_make_id_rotor(r, rtr) |
| Rotorobj *r; |
| unsigned char *rtr; |
| { |
| register int j; |
| register int size = r->size; |
| for (j = 0; j < size; j++) { |
| rtr[j] = (unsigned char)j; |
| } |
| } |
| |
| |
| /*(defvar RTR-e-rotors |
| (let ((rv (make-vector RTR-number-of-rotors 0)) |
| (i 0) |
| tr) |
| (while (< i RTR-number-of-rotors) |
| (setq tr (make-vector RTR-size 0)) |
| (RTR-make-id-rotor tr) |
| (aset rv i tr) |
| (setq i (+ 1 i))) |
| rv) |
| "The current set of encryption rotors") |
| */ |
| static void |
| RTR_e_rotors(r) |
| Rotorobj *r; |
| { |
| int i; |
| for (i = 0; i < r->rotors; i++) { |
| RTR_make_id_rotor(r, &(r->e_rotor[(i*r->size)])); |
| } |
| } |
| |
| /*(defvar RTR-d-rotors |
| (let ((rv (make-vector RTR-number-of-rotors 0)) |
| (i 0) |
| tr) |
| (while (< i RTR-number-of-rotors) |
| (setq tr (make-vector RTR-size 0)) |
| (setq j 0) |
| (while (< j RTR-size) |
| (aset tr j j) |
| (setq j (+ 1 j))) |
| (aset rv i tr) |
| (setq i (+ 1 i))) |
| rv) |
| "The current set of decryption rotors") |
| */ |
| static void |
| RTR_d_rotors(r) |
| Rotorobj *r; |
| { |
| register int i, j; |
| for (i = 0; i < r->rotors; i++) { |
| for (j = 0; j < r->size; j++) { |
| r->d_rotor[((i*r->size)+j)] = (unsigned char)j; |
| } |
| } |
| } |
| |
| /*(defvar RTR-positions (make-vector RTR-number-of-rotors 1) |
| "The positions of the rotors at this time") |
| */ |
| static void |
| RTR_positions(r) |
| Rotorobj *r; |
| { |
| int i; |
| for (i = 0; i < r->rotors; i++) { |
| r->positions[i] = 1; |
| } |
| } |
| |
| /*(defvar RTR-advances (make-vector RTR-number-of-rotors 1) |
| "The number of positions to advance the rotors at a time") |
| */ |
| static void |
| RTR_advances(r) |
| Rotorobj *r; |
| { |
| int i; |
| for (i = 0; i < r->rotors; i++) { |
| r->advances[i] = 1; |
| } |
| } |
| |
| /*(defun RTR-permute-rotor (e d) |
| "Permute the E rotor, and make the D rotor its inverse" |
| ;; see Knuth for explaination of algorithm. |
| (RTR-make-id-rotor e) |
| (let ((i RTR-size) |
| q j) |
| (while (<= 2 i) |
| (setq q (fair16 i)) ; a little tricky, decrement here |
| (setq i (- i 1)) ; since we have origin 0 array's |
| (setq j (aref e q)) |
| (aset e q (aref e i)) |
| (aset e i j) |
| (aset d j i)) |
| (aset e 0 (aref e 0)) ; don't forget e[0] and d[0] |
| (aset d (aref e 0) 0))) |
| */ |
| static void |
| RTR_permute_rotor(r, e, d) |
| Rotorobj *r; |
| unsigned char *e; |
| unsigned char *d; |
| { |
| short i = r->size; |
| short q; |
| unsigned char j; |
| RTR_make_id_rotor(r,e); |
| while (2 <= i) { |
| q = r_rand(r,i); |
| i--; |
| j = e[q]; |
| e[q] = (unsigned char)e[i]; |
| e[i] = (unsigned char)j; |
| d[j] = (unsigned char)i; |
| } |
| e[0] = (unsigned char)e[0]; |
| d[(e[0])] = (unsigned char)0; |
| } |
| |
| /*(defun RTR-init (key) |
| "Given KEY (a list of 5 16 bit numbers), initialize the rotor machine. |
| Set the advancement, position, and permutation of the rotors" |
| (R16-set-state key) |
| (let (i) |
| (setq i 0) |
| (while (< i RTR-number-of-rotors) |
| (aset RTR-positions i (fair16 RTR-size)) |
| (aset RTR-advances i (+ 1 (* 2 (fair16 (/ RTR-size 2))))) |
| (message "Initializing rotor %d..." i) |
| (RTR-permute-rotor (aref RTR-e-rotors i) (aref RTR-d-rotors i)) |
| (setq i (+ 1 i))))) |
| */ |
| static void |
| RTR_init(r) |
| Rotorobj *r; |
| { |
| int i; |
| set_seed(r); |
| RTR_positions(r); |
| RTR_advances(r); |
| RTR_e_rotors(r); |
| RTR_d_rotors(r); |
| for (i = 0; i < r->rotors; i++) { |
| r->positions[i] = r_rand(r,r->size); |
| r->advances[i] = (1+(2*(r_rand(r,r->size/2)))); |
| RTR_permute_rotor(r, |
| &(r->e_rotor[(i*r->size)]), |
| &(r->d_rotor[(i*r->size)])); |
| } |
| r->isinited = TRUE; |
| } |
| |
| /*(defun RTR-advance () |
| "Change the RTR-positions vector, using the RTR-advances vector" |
| (let ((i 0) |
| (temp 0)) |
| (if RTR-size-mask |
| (while (< i RTR-number-of-rotors) |
| (setq temp (+ (aref RTR-positions i) (aref RTR-advances i))) |
| (aset RTR-positions i (logand temp RTR-size-mask)) |
| (if (and (>= temp RTR-size) |
| (< i (- RTR-number-of-rotors 1))) |
| (aset RTR-positions (+ i 1) |
| (+ 1 (aref RTR-positions (+ i 1))))) |
| (setq i (+ i 1))) |
| (while (< i RTR-number-of-rotors) |
| (setq temp (+ (aref RTR-positions i) (aref RTR-advances i))) |
| (aset RTR-positions i (% temp RTR-size)) |
| (if (and (>= temp RTR-size) |
| (< i (- RTR-number-of-rotors 1))) |
| (aset RTR-positions (+ i 1) |
| (+ 1 (aref RTR-positions (+ i 1))))) |
| (setq i (+ i 1)))))) |
| */ |
| static void |
| RTR_advance(r) |
| Rotorobj *r; |
| { |
| register int i=0, temp=0; |
| if (r->size_mask) { |
| while (i < r->rotors) { |
| temp = r->positions[i] + r->advances[i]; |
| r->positions[i] = temp & r->size_mask; |
| if ((temp >= r->size) && (i < (r->rotors - 1))) { |
| r->positions[(i+1)] = 1 + r->positions[(i+1)]; |
| } |
| i++; |
| } |
| } else { |
| while (i < r->rotors) { |
| temp = r->positions[i] + r->advances[i]; |
| r->positions[i] = temp%r->size; |
| if ((temp >= r->size) && (i < (r->rotors - 1))) { |
| r->positions[(i+1)] = 1 + r->positions[(i+1)]; |
| } |
| i++; |
| } |
| } |
| } |
| |
| /*(defun RTR-e-char (p) |
| "Encrypt the character P with the current rotor machine" |
| (let ((i 0)) |
| (if RTR-size-mask |
| (while (< i RTR-number-of-rotors) |
| (setq p (aref (aref RTR-e-rotors i) |
| (logand (logxor (aref RTR-positions i) |
| p) |
| RTR-size-mask))) |
| (setq i (+ 1 i))) |
| (while (< i RTR-number-of-rotors) |
| (setq p (aref (aref RTR-e-rotors i) |
| (% (logxor (aref RTR-positions i) |
| p) |
| RTR-size))) |
| (setq i (+ 1 i)))) |
| (RTR-advance) |
| p)) |
| */ |
| static unsigned char |
| RTR_e_char(r, p) |
| Rotorobj *r; |
| unsigned char p; |
| { |
| register int i=0; |
| register unsigned char tp=p; |
| if (r->size_mask) { |
| while (i < r->rotors) { |
| tp = r->e_rotor[(i*r->size) + |
| (((r->positions[i] ^ tp) & |
| r->size_mask))]; |
| i++; |
| } |
| } else { |
| while (i < r->rotors) { |
| tp = r->e_rotor[(i*r->size) + |
| (((r->positions[i] ^ tp) % |
| (unsigned int) r->size))]; |
| i++; |
| } |
| } |
| RTR_advance(r); |
| return ((unsigned char)tp); |
| } |
| |
| /*(defun RTR-d-char (c) |
| "Decrypt the character C with the current rotor machine" |
| (let ((i (- RTR-number-of-rotors 1))) |
| (if RTR-size-mask |
| (while (<= 0 i) |
| (setq c (logand (logxor (aref RTR-positions i) |
| (aref (aref RTR-d-rotors i) |
| c)) |
| RTR-size-mask)) |
| (setq i (- i 1))) |
| (while (<= 0 i) |
| (setq c (% (logxor (aref RTR-positions i) |
| (aref (aref RTR-d-rotors i) |
| c)) |
| RTR-size)) |
| (setq i (- i 1)))) |
| (RTR-advance) |
| c)) |
| */ |
| static unsigned char |
| RTR_d_char(r, c) |
| Rotorobj *r; |
| unsigned char c; |
| { |
| register int i = r->rotors - 1; |
| register unsigned char tc = c; |
| |
| if (r->size_mask) { |
| while (0 <= i) { |
| tc = (r->positions[i] ^ |
| r->d_rotor[(i*r->size)+tc]) & r->size_mask; |
| i--; |
| } |
| } else { |
| while (0 <= i) { |
| tc = (r->positions[i] ^ |
| r->d_rotor[(i*r->size)+tc]) % |
| (unsigned int) r->size; |
| i--; |
| } |
| } |
| RTR_advance(r); |
| return(tc); |
| } |
| |
| /*(defun RTR-e-region (beg end key) |
| "Perform a rotor encryption of the region from BEG to END by KEY" |
| (save-excursion |
| (let ((tenth (/ (- end beg) 10))) |
| (RTR-init key) |
| (goto-char beg) |
| ;; ### make it stop evry 10% or so to tell us |
| (while (< (point) end) |
| (let ((fc (following-char))) |
| (insert-char (RTR-e-char fc) 1) |
| (delete-char 1)))))) |
| */ |
| static void |
| RTR_e_region(r, beg, len, doinit) |
| Rotorobj *r; |
| unsigned char *beg; |
| int len; |
| int doinit; |
| { |
| register int i; |
| if (doinit || r->isinited == FALSE) |
| RTR_init(r); |
| for (i = 0; i < len; i++) { |
| beg[i] = RTR_e_char(r, beg[i]); |
| } |
| } |
| |
| /*(defun RTR-d-region (beg end key) |
| "Perform a rotor decryption of the region from BEG to END by KEY" |
| (save-excursion |
| (progn |
| (RTR-init key) |
| (goto-char beg) |
| (while (< (point) end) |
| (let ((fc (following-char))) |
| (insert-char (RTR-d-char fc) 1) |
| (delete-char 1)))))) |
| */ |
| static void |
| RTR_d_region(r, beg, len, doinit) |
| Rotorobj *r; |
| unsigned char *beg; |
| int len; |
| int doinit; |
| { |
| register int i; |
| if (doinit || r->isinited == FALSE) |
| RTR_init(r); |
| for (i = 0; i < len; i++) { |
| beg[i] = RTR_d_char(r, beg[i]); |
| } |
| } |
| |
| |
| /*(defun RTR-key-string-to-ints (key) |
| "Convert a string into a list of 4 numbers" |
| (let ((k1 995) |
| (k2 576) |
| (k3 767) |
| (k4 671) |
| (k5 463) |
| (i 0)) |
| (while (< i (length key)) |
| (setq k1 (logand (+ (logior (lsh k1 3) (lsh k1 -13)) (aref key i)) 65535)) |
| (setq k2 (logand (logxor (logior (lsh k2 3) (lsh k2 -13)) (aref key i)) 65535)) |
| (setq k3 (logand (- (logior (lsh k3 3) (lsh k3 -13)) (aref key i)) 65535)) |
| (setq k4 (logand (- (aref key i) (logior (lsh k4 3) (lsh k4 -13))) 65535)) |
| (setq k5 (logand (logxor (logior (lsh k5 3) (lsh k5 -13)) (lognot (aref key i))) 65535)) |
| (setq i (+ i 1))) |
| (list k1 (logior 1 k2) k3 k4 k5)))*/ |
| /* This is done in set_key() above */ |
| |
| #if 0 |
| /*(defun encrypt-region (beg end key) |
| "Interactivly encrypt the region" |
| (interactive "r\nsKey:") |
| (RTR-e-region beg end (RTR-key-string-to-ints key)))*/ |
| static void encrypt_region(r, region, len) |
| Rotorobj *r; |
| unsigned char *region; |
| int len; |
| { |
| RTR_e_region(r,region,len,TRUE); |
| } |
| |
| /*(defun decrypt-region (beg end key) |
| "Interactivly decrypt the region" |
| (interactive "r\nsKey:") |
| (RTR-d-region beg end (RTR-key-string-to-ints key)))*/ |
| static void decrypt_region(r, region, len) |
| Rotorobj *r; |
| unsigned char *region; |
| int len; |
| { |
| RTR_d_region(r,region,len,TRUE); |
| } |
| #endif /* 0 */ |
| |
| /* Rotor methods */ |
| |
| static void |
| rotor_dealloc(xp) |
| Rotorobj *xp; |
| { |
| PyMem_XDEL(xp->e_rotor); |
| PyMem_XDEL(xp->d_rotor); |
| PyMem_XDEL(xp->positions); |
| PyMem_XDEL(xp->advances); |
| PyMem_DEL(xp); |
| } |
| |
| static PyObject * |
| rotorobj_encrypt(self, args) |
| Rotorobj *self; |
| PyObject * args; |
| { |
| char *string = NULL; |
| int len = 0; |
| PyObject *rtn = NULL; |
| char *tmp; |
| |
| if (!PyArg_Parse(args, "s#", &string, &len)) |
| return NULL; |
| if (!(tmp = PyMem_NEW(char, len+5))) { |
| PyErr_NoMemory(); |
| return NULL; |
| } |
| memset(tmp, '\0', len+1); |
| memcpy(tmp, string, len); |
| RTR_e_region(self, (unsigned char *)tmp, len, TRUE); |
| rtn = PyString_FromStringAndSize(tmp, len); |
| PyMem_DEL(tmp); |
| return(rtn); |
| } |
| |
| static PyObject * |
| rotorobj_encrypt_more(self, args) |
| Rotorobj *self; |
| PyObject * args; |
| { |
| char *string = NULL; |
| int len = 0; |
| PyObject *rtn = NULL; |
| char *tmp; |
| |
| if (!PyArg_Parse(args, "s#", &string, &len)) |
| return NULL; |
| if (!(tmp = PyMem_NEW(char, len+5))) { |
| PyErr_NoMemory(); |
| return NULL; |
| } |
| memset(tmp, '\0', len+1); |
| memcpy(tmp, string, len); |
| RTR_e_region(self, (unsigned char *)tmp, len, FALSE); |
| rtn = PyString_FromStringAndSize(tmp, len); |
| PyMem_DEL(tmp); |
| return(rtn); |
| } |
| |
| static PyObject * |
| rotorobj_decrypt(self, args) |
| Rotorobj *self; |
| PyObject * args; |
| { |
| char *string = NULL; |
| int len = 0; |
| PyObject *rtn = NULL; |
| char *tmp; |
| |
| if (!PyArg_Parse(args, "s#", &string, &len)) |
| return NULL; |
| if (!(tmp = PyMem_NEW(char, len+5))) { |
| PyErr_NoMemory(); |
| return NULL; |
| } |
| memset(tmp, '\0', len+1); |
| memcpy(tmp, string, len); |
| RTR_d_region(self, (unsigned char *)tmp, len, TRUE); |
| rtn = PyString_FromStringAndSize(tmp, len); |
| PyMem_DEL(tmp); |
| return(rtn); |
| } |
| |
| static PyObject * |
| rotorobj_decrypt_more(self, args) |
| Rotorobj *self; |
| PyObject * args; |
| { |
| char *string = NULL; |
| int len = 0; |
| PyObject *rtn = NULL; |
| char *tmp; |
| |
| if (!PyArg_Parse(args, "s#", &string, &len)) |
| return NULL; |
| if (!(tmp = PyMem_NEW(char, len+5))) { |
| PyErr_NoMemory(); |
| return NULL; |
| } |
| memset(tmp, '\0', len+1); |
| memcpy(tmp, string, len); |
| RTR_d_region(self, (unsigned char *)tmp, len, FALSE); |
| rtn = PyString_FromStringAndSize(tmp, len); |
| PyMem_DEL(tmp); |
| return(rtn); |
| } |
| |
| static PyObject * |
| rotorobj_setkey(self, args) |
| Rotorobj *self; |
| PyObject * args; |
| { |
| char *string = NULL; |
| |
| if (!PyArg_ParseTuple(args, "|s", &string)) |
| return NULL; |
| |
| if (string) |
| set_key(self, string); |
| |
| Py_INCREF(Py_None); |
| return Py_None; |
| } |
| |
| static struct PyMethodDef |
| rotorobj_methods[] = { |
| {"encrypt", (PyCFunction)rotorobj_encrypt}, |
| {"encryptmore", (PyCFunction)rotorobj_encrypt_more}, |
| {"decrypt", (PyCFunction)rotorobj_decrypt}, |
| {"decryptmore", (PyCFunction)rotorobj_decrypt_more}, |
| {"setkey", (PyCFunction)rotorobj_setkey, 1}, |
| {NULL, NULL} /* sentinel */ |
| }; |
| |
| |
| /* Return a rotor object's named attribute. */ |
| static PyObject * |
| rotorobj_getattr(s, name) |
| Rotorobj *s; |
| char *name; |
| { |
| return Py_FindMethod(rotorobj_methods, (PyObject*)s, name); |
| } |
| |
| |
| statichere PyTypeObject Rotor_Type = { |
| PyObject_HEAD_INIT(&PyType_Type) |
| 0, /*ob_size*/ |
| "rotor", /*tp_name*/ |
| sizeof(Rotorobj), /*tp_size*/ |
| 0, /*tp_itemsize*/ |
| /* methods */ |
| (destructor)rotor_dealloc, /*tp_dealloc*/ |
| 0, /*tp_print*/ |
| (getattrfunc)rotorobj_getattr, /*tp_getattr*/ |
| 0, /*tp_setattr*/ |
| 0, /*tp_compare*/ |
| 0, /*tp_repr*/ |
| 0, /*tp_hash*/ |
| }; |
| |
| |
| static PyObject * |
| rotor_rotor(self, args) |
| PyObject * self; |
| PyObject * args; |
| { |
| Rotorobj *r; |
| char *string; |
| int len; |
| int num_rotors = 6; |
| |
| if (!PyArg_ParseTuple(args, "s#|i", &string, &len, &num_rotors)) |
| return NULL; |
| |
| r = rotorobj_new(num_rotors, string); |
| return (PyObject *)r; |
| } |
| |
| |
| static struct PyMethodDef |
| rotor_methods[] = { |
| {"newrotor", rotor_rotor, 1}, |
| {NULL, NULL} /* sentinel */ |
| }; |
| |
| |
| /* Initialize this module. |
| This is called when the first 'import rotor' is done, |
| via a table in config.c, if config.c is compiled with USE_ROTOR |
| defined. */ |
| |
| void |
| initrotor() |
| { |
| (void)Py_InitModule("rotor", rotor_methods); |
| } |