void PasswordManager_ForgotDialog::FindMyPsw(CString Username, CString Email){
	
	CString Password = _T("");

	if (FindUserPassword(encryptDecrypt(Username), encryptDecrypt(Email), Password)){

		SetDlgItemText(IDC_FORGOT_PSW, Password);
	}
	else{
		CString UserDoesntExist;
		UserDoesntExist.LoadString(IDS_USER_DOESNT_EXIST);
		MessageBox(UserDoesntExist, 0, MB_ICONINFORMATION | MB_OK);
	}
}
BOOL PasswordManager_ForgotDialog::FindUserPassword(const CString& Username, const CString& Email, CString& Password){
	
	User rs;
	rs.Open();
	
	while (!rs.IsEOF()){
		if (Username == rs.m_userUsername && Email == rs.m_userEmail) {
			Password = encryptDecrypt(rs.m_userPassword);
			return true;
		}
		rs.MoveNext();
	}
	return false;
}
int main (int argc, char *argv[]) {
    ;
    printf("ENCDEC 1.1\n");
    char dir[255];
    if(argc < 2)
        strcpy(dir,"/mnt/usbDrive/toCrypt");
    else {
        strcpy(dir,argv[1]);
    }
    char filenameIn[255];
    strcpy(filenameIn,dir);
    printf("%s\n",filenameIn );

    char filenameOut[255];
    if(strcmp(filenameIn,"/mnt/usbDrive/toCrypt") == 0) {
        strcpy(filenameOut,"/mnt/usbDrive/crypted.xor");
    } else if(strcmp(filenameIn,"/mnt/usbDrive/toDecrypt.xor") == 0) {
        strcpy(filenameOut,"/mnt/usbDrive/decrypted");
    } else {
        strcpy(filenameOut,dir);
        strcat(filenameOut,".xor");
    }

    printf("%s\n",filenameOut );


    char buffIn[1024];
    char buffOut[1024];


    close(fopen(filenameOut,"w"));
    int fd1 = open(filenameIn, O_RDONLY);
    int fd2 = open(filenameOut, O_RDWR);

    if(filenameIn!=NULL) {
        int bytes = read(fd1, &buffIn, 1024);
        printf("%s\n",buffOut);
        //Crypt:
        encryptDecrypt(buffIn, buffOut);
        write(fd2,&buffOut,bytes);

        close(fd1);
        close(fd2);
    } else {
        //perror(filenameIn);
    }
    return 0;
}
int main(int argc, char *argv[]){

	
	DIR *dir = NULL;
	struct dirent *envelopDir = NULL;

	dir = opendir("/media/external/");
	if(dir == NULL){
		printf("Error. Cannot open /media/external.\n");
		exit(1);
	}
	printf("The directory /media/external has been properly opened.\n\n");
	

	int fr = open("/media/external/test.txt",O_RDONLY);
	int fw = open ("/media/external/encryptedFile.xor",O_WRONLY | O_CREAT);
	if (fr<0){
		printf("Error. Cannot open test.txt.\n");
		exit(1);
	}
	if (fw<0){
		printf("Error. Cannot write encryptedFile.xor \n");
		exit(1);
	}

	char buffer_in[TAILLE_MAX]="";
	char buffer_out[TAILLE_MAX]="";
	read(fr, buffer_in, TAILLE_MAX);
	encryptDecrypt(buffer_in, buffer_out);
	printf("%s\n",buffer_out);
	write(fw,buffer_out,TAILLE_MAX);
	close(fr);
	close(fw);
	close(dir);


	
	
	return 0;
}
Exemple #5
0
 std::string CXor::decryptBase64(const std::string & toDecrypt, const std::string & key)
 {
    return encryptDecrypt(CBase64::decode(toDecrypt), key);
 }
Exemple #6
0
 std::string CXor::encryptBase64(const std::string & toEncrypt, const std::string & key)
 {
    std::string cypher = encryptDecrypt(toEncrypt, key);
    return CBase64::encode((const unsigned char*)cypher.c_str(), cypher.size());   
 }
int main(int argc, char* argv[])
{
    char hostName[200] = DEFAULT_HOSTNAME;
    int port = DEFAULT_RESMGR_TPM_PORT; //DEFAULT_TPM_PORT;

    TPMI_DH_OBJECT keyHandle;
    TPMI_YES_NO decryptVal = NO;
    TPM2B_MAX_BUFFER inData;
    char outFilePath[PATH_MAX] = {0};

    setbuf(stdout, NULL);
    setvbuf (stdout, NULL, _IONBF, BUFSIZ);

    int opt = -1;
    const char *optstring = "hvk:P:D:I:o:p:d:c:X";
    static struct option long_options[] = {
      {"help",0,NULL,'h'},
      {"version",0,NULL,'v'},
      {"keyHandle",1,NULL,'k'},
      {"pwdk",1,NULL,'P'},
      {"decrypt",1,NULL,'D'},
      {"inFile",1,NULL,'I'},
      {"outFile",1,NULL,'o'},
      {"port",1,NULL,'p'},
      {"debugLevel",1,NULL,'d'},
      {"keyContext",1,NULL,'c'},
      {"passwdInHex",0,NULL,'X'},
      {0,0,0,0}
    };

    int returnVal = 0;
    int flagCnt = 0;
    int h_flag = 0,
        v_flag = 0,
        k_flag = 0,
        P_flag = 0,
        I_flag = 0,
        c_flag = 0,
        o_flag = 0;
    char *contextKeyFile = NULL;

    if(argc == 1)
    {
        showHelp(argv[0]);
        return 0;
    }

    while((opt = getopt_long(argc,argv,optstring,long_options,NULL)) != -1)
    {
        switch(opt)
        {
        case 'h':
            h_flag = 1;
            break;
        case 'v':
            v_flag = 1;
            break;
        case 'k':
            if(getSizeUint32Hex(optarg,&keyHandle) != 0)
            {
                returnVal = -1;
                break;
            }
            k_flag = 1;
            break;
        case 'P':
            sessionData.hmac.t.size = sizeof(sessionData.hmac.t) - 2;
            if(str2ByteStructure(optarg,&sessionData.hmac.t.size,sessionData.hmac.t.buffer) != 0)
            {
                returnVal = -2;
                break;
            }
            P_flag = 1;
            break;
        case 'D':
            if(strcmp("YES", optarg) == 0)
                decryptVal = YES;
            else if(strcmp("NO", optarg) == 0)
                decryptVal = NO;
            else
            {
                returnVal = -3;
                showArgError(optarg, argv[0]);
                break;
            }
            break;
        case 'I':
            inData.t.size = sizeof(inData) - 2;
            if(loadDataFromFile(optarg, inData.t.buffer, &inData.t.size) != 0)
            {
                returnVal = -4;
                break;
            }
            I_flag = 1;
            break;
        case 'o':
            safeStrNCpy(outFilePath, optarg, sizeof(outFilePath));
            if(checkOutFile(outFilePath) != 0)
            {
                returnVal = -5;
                break;
            }
            o_flag = 1;
            break;
        case 'p':
            if( getPort(optarg, &port) )
            {
                printf("Incorrect port number.\n");
                returnVal = -6;
            }
            break;
        case 'd':
            if( getDebugLevel(optarg, &debugLevel) )
            {
                printf("Incorrect debug level.\n");
                returnVal = -7;
            }
            break;
        case 'c':
            contextKeyFile = optarg;
            if(contextKeyFile == NULL || contextKeyFile[0] == '\0')
            {
                returnVal = -8;
                break;
            }
            printf("contextKeyFile = %s\n", contextKeyFile);
            c_flag = 1;
            break;
        case 'X':
            hexPasswd = true;
            break;
        case ':':
//              printf("Argument %c needs a value!\n",optopt);
            returnVal = -9;
            break;
        case '?':
//              printf("Unknown Argument: %c\n",optopt);
            returnVal = -10;
            break;
        //default:
        //  break;
        }
        if(returnVal)
            break;
    };

    if(returnVal != 0)
        return returnVal;
    if(P_flag == 0)
        sessionData.hmac.t.size = 0;

    flagCnt = h_flag + v_flag + k_flag + I_flag + o_flag + c_flag;

    if(flagCnt == 1)
    {
        if(h_flag == 1)
            showHelp(argv[0]);
        else if(v_flag == 1)
            showVersion(argv[0]);
        else
        {
            showArgMismatch(argv[0]);
            return -11;
        }
    }
    else if((flagCnt == 3) && (k_flag == 1 || c_flag == 1) && (I_flag == 1) && (o_flag == 1))
    {
        prepareTest(hostName, port, debugLevel);

        if(c_flag)
            returnVal = loadTpmContextFromFile(sysContext, &keyHandle, contextKeyFile);
        if (returnVal == 0)
            returnVal = encryptDecrypt(keyHandle, decryptVal, &inData, outFilePath);

        finishTest();

        if(returnVal)
            return -12;
    }
    else
    {
        showArgMismatch(argv[0]);
        return -13;
    }
    return 0;
}
int process_job(struct job *job){
	
	int err = SUCCESS, len=0, pos =0;
	char *msg = kmalloc(1024,GFP_KERNEL);
	char id[3];
	
	len = strlen("\nJob ID :"); 
	memcpy(msg+pos,"\nJob ID :",len);
	pos+=len;
	
	sprintf(id,"%d", job->job_id);
	memcpy(msg+pos,id,3);
	
	
	pos+=1;
	len = strlen("\nJob type :"); 
	memcpy(msg+pos,"\nJob type :",len);
	pos+=len;
	
	if(job->job_type==ENCRYPT||job->job_type==DECRYPT){
		err = encryptDecrypt(job);
		len = strlen("ENCRYPT\n"); 
		
		if(job->job_type==ENCRYPT) 
			memcpy(msg+pos,"ENCRYPT\n",len);
		else 
			memcpy(msg+pos,"ENCRYPT\n",len);
		
		pos+=len;
		
		len = strlen("Infile is ")	; 
		memcpy(msg+pos,"Infile is ",len);
		pos+=len;
		
		len = strlen(job->infile)	; 
		memcpy(msg+pos,job->infile,len);
		pos+=len;
		
		len = strlen("\nOutfile is ")	; 
		memcpy(msg+pos,"\nOutfile is ",len);
		pos+=len;
		
		len = strlen(job->outfile)	; 
		memcpy(msg+pos,job->outfile,len);
		pos+=len;
		
		
	}

	else if(job->job_type==CHECKSUM){
		err = checksum(job);
		len = strlen("CHECKSUM\n")	; 
		memcpy(msg+pos,"CHECKSUM\n",len);
		pos+=len;
		
		len = strlen("Infile is ")	; 
		memcpy(msg+pos,"Infile is ",len);
		pos+=len;
		
		len = strlen(job->infile)	; 
		memcpy(msg+pos,job->infile,len);
		pos+=len;
		
	}
	else if(job->job_type==LIST){
		list_queue(prod_cons_q, job);
	}
	
	
	len = strlen("\nStatus is ")	; 
	memcpy(msg+pos,"\nStatus is ",len);
	pos+=len;
	

	if(err>=SUCCESS){
	len = strlen("SUCCESS")	; 
	memcpy(msg+pos,"SUCCESS",len);
	pos+=len;
	}
	
	
	else {
	len = strlen("FAILIURE")	; 
	memcpy(msg+pos,"FAILIURE",len);
	pos+=len;
	}
	
	memcpy(msg+pos,"\0",1);
	printk("Heyy %s", msg);
	netlink(job->pid, msg);
	
	kfree(job);
	return err;
	
	}
int main(int argc, char *argv [])
{
	char ch[256];
	FILE *fcrypt;
	FILE *fdecrypt;
	char * pathc = NULL;
	char * pathd = NULL;
	// parse comand line
	if (argc == 1)
	{
		  fprintf(stderr, "Invalid usage: cryptage -c path_name_crypt -d path_name_decrypt\n");
		  exit(EXIT_FAILURE);
	}

	char * options = "c:d:";
	int option;
	while((option = getopt(argc, argv, options)) != -1)
	{
		  switch(option)
		  {
		      case 'c':
		          pathc = optarg;
							break;
					case 'd':
							pathd = optarg;
							break;
		      case '?':
		          fprintf(stderr, "Invalid option %c\n", optopt);
		          exit(EXIT_FAILURE);
		  }
	}

	

		if(pathc !=NULL){
			if(!fopen(pathc,"rb")){
				printf("cannot open file\n");
			} /* file to read */
			else{
					fcrypt = fopen("/mnt/cryptedxor.txt","w"); /* file to write encrypted message */
					int fdc = open(pathc, O_RDONLY);
					int taille_maxc = 1000;
					char buffer_inc[taille_maxc];
					char buffer_outc[taille_maxc];

					read(fdc, &buffer_inc, taille_maxc);
					encryptDecrypt(buffer_inc, buffer_outc);
					fputs(buffer_outc,fcrypt);

					printf("file encrypted \n");
					fclose(fcrypt);
					close(fdc);
			}
		}
		if(pathd != NULL){
			if(!fopen(pathd,"rb")){
				printf("cannot open file\n");
			} /* file to read */
			else{							
				fdecrypt = fopen("/mnt/decryptedxor.txt","w"); /* file to write encrypted message */
				int fdd = open(pathd, O_RDONLY);
				int taille_maxd = 1000;
				char buffer_ind[taille_maxd];
				char buffer_outd[taille_maxd];

				read(fdd, &buffer_ind, taille_maxd);
				encryptDecrypt(buffer_ind, buffer_outd);
				fputs(buffer_outd,fdecrypt);

				printf("file decrypted \n");
				close(fdd);				
				fclose(fdecrypt);				
			}
		}
	return 0;
}
void EncryptDecryptFile::run()
{
    stopped = false;
    encryptDecrypt(inputFileName, outputFileName, keyFileName);
}