ruby-aes-cext 1.0-i686-linux
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- data/CHANGELOG +6 -0
- data/COPYING +20 -0
- data/README +77 -0
- data/Rakefile +154 -0
- data/examples/encrypt_block.rb +22 -0
- data/examples/encrypt_buffer.rb +24 -0
- data/examples/encrypt_stream.rb +39 -0
- data/examples/example_helper.rb +27 -0
- data/ext/ruby-aes/aes_alg.so +0 -0
- data/lib/ruby-aes.rb +162 -0
- data/test/KAT_MCT/aes_kat_mct.rb +386 -0
- data/test/KAT_MCT/rijndael-vals.zip +0 -0
- data/test/KAT_MCT/table.128 +128 -0
- data/test/KAT_MCT/table.192 +128 -0
- data/test/KAT_MCT/table.256 +128 -0
- data/test/test_helper.rb +14 -0
- data/test/test_ruby-aes.rb +113 -0
- metadata +78 -0
data/CHANGELOG
ADDED
data/COPYING
ADDED
@@ -0,0 +1,20 @@
|
|
1
|
+
Copyright (c) 2007 Alex Boussinet
|
2
|
+
|
3
|
+
Permission is hereby granted, free of charge, to any person obtaining
|
4
|
+
a copy of this software and associated documentation files (the
|
5
|
+
"Software"), to deal in the Software without restriction, including
|
6
|
+
without limitation the rights to use, copy, modify, merge, publish,
|
7
|
+
distribute, sublicense, and/or sell copies of the Software, and to
|
8
|
+
permit persons to whom the Software is furnished to do so, subject to
|
9
|
+
the following conditions:
|
10
|
+
|
11
|
+
The above copyright notice and this permission notice shall be
|
12
|
+
included in all copies or substantial portions of the Software.
|
13
|
+
|
14
|
+
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
|
15
|
+
EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
|
16
|
+
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
|
17
|
+
NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE
|
18
|
+
LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION
|
19
|
+
OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION
|
20
|
+
WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
|
data/README
ADDED
@@ -0,0 +1,77 @@
|
|
1
|
+
README for ruby-aes
|
2
|
+
===================
|
3
|
+
|
4
|
+
Ruby AES <http://rubyforge.org/projects/ruby-aes> is an implementation of the Rijndael algorithm.
|
5
|
+
|
6
|
+
Written by Alex Boussinet <mailto:alex.boussinet@gmail.com>
|
7
|
+
|
8
|
+
This release is mainly an import from the Ruby Application Archive (RAA).
|
9
|
+
I've added all the versions I was working on (algorithm variations) and a new
|
10
|
+
C extension for improved performance.
|
11
|
+
6 variations are available:
|
12
|
+
|
13
|
+
* "Normal":
|
14
|
+
Pure Ruby implementation of the Rijndael algorithm specifications.
|
15
|
+
Useful for understanding the algorithm.
|
16
|
+
|
17
|
+
* "Optimized":
|
18
|
+
Pure Ruby implementation based on the "Normal" code but optimized for speed.
|
19
|
+
The SubBytes and ShiftRows methods have been combined.
|
20
|
+
|
21
|
+
* "Table Optimized 1":
|
22
|
+
Pure Ruby implementation based on the C code from the Rijndael website.
|
23
|
+
The arrays of constants are bigger because all the operations are
|
24
|
+
already computed so it's mainly based on table look ups.
|
25
|
+
|
26
|
+
* "Table Optimized 2":
|
27
|
+
Pure Ruby implementation based on the "Table Optimized 1" code.
|
28
|
+
The arrays of constants are bigger because all the operations are
|
29
|
+
already computed and table look ups are also combined.
|
30
|
+
|
31
|
+
* "Table Unroll Optimized 1":
|
32
|
+
Pure Ruby implementation based on the "Table Optimized 1" code.
|
33
|
+
The change here is that the loops are unrolled.
|
34
|
+
|
35
|
+
* "Table Unroll Optimized 2":
|
36
|
+
Pure Ruby implementation based on the "Table Optimized 2" code.
|
37
|
+
The change here is that the loops are unrolled.
|
38
|
+
|
39
|
+
* "EXT Table Unroll Optimized 2":
|
40
|
+
C extension based on the "Table Unroll Optimized 2" code.
|
41
|
+
This extension is provided for major speed improvement.
|
42
|
+
|
43
|
+
All those variations share the same API:
|
44
|
+
Default key_length: 128
|
45
|
+
Default mode: 'ECB'
|
46
|
+
Default IV: 16 null chars ("00" * 16 in hex format)
|
47
|
+
Default key: 16 null chars ("00" * 16 in hex format)
|
48
|
+
Default input text: "PLAINTEXT"
|
49
|
+
|
50
|
+
Aes.check_key(key_string, key_length)
|
51
|
+
Aes.check_iv(iv_string)
|
52
|
+
Aes.check_kl(key_length)
|
53
|
+
Aes.check_mode(mode)
|
54
|
+
Aes.init(key_length, mode, key, iv)
|
55
|
+
Aes.encrypt_block(key_length, mode, key, iv, block) # no padding
|
56
|
+
Aes.decrypt_block(key_length, mode, key, iv, block) # no padding
|
57
|
+
Aes.encrypt_buffer(key_length, mode, key, iv, block) # padding
|
58
|
+
Aes.decrypt_buffer(key_length, mode, key, iv, block) # padding
|
59
|
+
Aes.encrypt_stream(key_length, mode, key, iv, sin, sout)
|
60
|
+
Aes.decrypt_stream(key_length, mode, key, iv, sin, sout)
|
61
|
+
Aes.bs() # block size for read operations (stream)
|
62
|
+
Aes.bs=(bs)
|
63
|
+
|
64
|
+
Valid modes are:
|
65
|
+
* ECB (Electronic Code Book)
|
66
|
+
* CBC (Cipher Block Chaining)
|
67
|
+
* OFB (Output Feedback)
|
68
|
+
* CFB (Cipher Feedback)
|
69
|
+
|
70
|
+
Valid key length:
|
71
|
+
* 128 bits
|
72
|
+
* 192 bits
|
73
|
+
* 256 bits
|
74
|
+
|
75
|
+
For a really good encryption, 256 bits CBC is recommanded.
|
76
|
+
|
77
|
+
For more information on AES-Rijndael, see: <http://csrc.nist.gov/encryption/aes/rijndael/>
|
data/Rakefile
ADDED
@@ -0,0 +1,154 @@
|
|
1
|
+
require 'rake'
|
2
|
+
require 'rake/clean'
|
3
|
+
require 'rake/testtask'
|
4
|
+
require 'rake/gempackagetask'
|
5
|
+
require 'rake/rdoctask'
|
6
|
+
require 'fileutils'
|
7
|
+
|
8
|
+
include FileUtils
|
9
|
+
|
10
|
+
@name = 'ruby-aes'
|
11
|
+
@version = '1.0'
|
12
|
+
@native = false
|
13
|
+
|
14
|
+
@lib = "lib/#{@name}"
|
15
|
+
@ext = "ext/#{@name}"
|
16
|
+
@ext_o = 'aes_alg.o'
|
17
|
+
@ext_so = "aes_alg.#{Config::CONFIG['DLEXT']}"
|
18
|
+
|
19
|
+
RDOC_OPTS = ['--quiet',
|
20
|
+
'--title', 'ruby-aes reference',
|
21
|
+
'--opname', 'index.html',
|
22
|
+
'--exclude', 'ext',
|
23
|
+
'--line-numbers',
|
24
|
+
'--main', 'README',
|
25
|
+
'--inline-source']
|
26
|
+
|
27
|
+
CLEAN.include [
|
28
|
+
'**/.*.sw?', '*.gem', '.config', '**/.DS_Store',
|
29
|
+
"#{@ext}/#{@ext_so}", "#{@ext}/#{@ext_o}",
|
30
|
+
"#{@ext}/Makefile", "#{@ext}/aes_cons.h", "#{@ext}/mkmf.log",
|
31
|
+
"#{@lib}/aes_alg.rb", "#{@lib}/aes_cons.rb", "#{@lib}/aes_gencons.rb"
|
32
|
+
]
|
33
|
+
|
34
|
+
SPEC = Gem::Specification.new do |s|
|
35
|
+
s.name = @name
|
36
|
+
s.version = @version
|
37
|
+
s.platform = Gem::Platform::RUBY
|
38
|
+
s.has_rdoc = true
|
39
|
+
s.rdoc_options += RDOC_OPTS
|
40
|
+
s.extra_rdoc_files = ['README', 'CHANGELOG', 'COPYING']
|
41
|
+
s.summary = 'ruby-aes is an implementation of the Rijndael algorithm (AES)'
|
42
|
+
s.description = s.summary
|
43
|
+
s.author = 'Alex Boussinet'
|
44
|
+
s.email = 'alex.boussinet@gmail.com'
|
45
|
+
s.homepage = "http://#{@name}.rubyforge.org"
|
46
|
+
s.rubyforge_project = @name
|
47
|
+
s.test_files = FileList['test/test_*.rb']
|
48
|
+
s.require_paths = ['lib']
|
49
|
+
# s.bindir = 'bin'
|
50
|
+
s.files = %w(CHANGELOG COPYING README Rakefile) +
|
51
|
+
Dir.glob('{doc,examples,lib,test}/**/*')
|
52
|
+
end
|
53
|
+
|
54
|
+
def task_gem
|
55
|
+
desc 'Build the gem'
|
56
|
+
Rake::GemPackageTask.new(SPEC) do |p|
|
57
|
+
p.need_tar = true
|
58
|
+
p.gem_spec = SPEC
|
59
|
+
end
|
60
|
+
end
|
61
|
+
|
62
|
+
Dir.glob('extras/*').each do |project|
|
63
|
+
desc "Specify the project to use"
|
64
|
+
task File.basename(project).to_sym do |t|
|
65
|
+
@type = t.name
|
66
|
+
|
67
|
+
@gem_name = "#{@name}-#{@type}"
|
68
|
+
SPEC.name = @gem_name
|
69
|
+
SPEC.files += [ "#{@lib}/aes_alg.rb", "#{@lib}/aes_cons.rb" ]
|
70
|
+
task_gem
|
71
|
+
end
|
72
|
+
end
|
73
|
+
|
74
|
+
desc "Specify the project to use"
|
75
|
+
task :cext do |t|
|
76
|
+
@type = t.name
|
77
|
+
|
78
|
+
@gem_name = "#{@name}-#{@type}"
|
79
|
+
SPEC.name = @gem_name
|
80
|
+
SPEC.require_paths += ['ext']
|
81
|
+
if @native
|
82
|
+
SPEC.files += ["#{@ext}/#{@ext_so}"]
|
83
|
+
SPEC.platform = Gem::Platform::CURRENT
|
84
|
+
else
|
85
|
+
SPEC.files += Dir.glob("#{@ext}/*")
|
86
|
+
SPEC.extensions = FileList["#{@ext}/extconf.rb"].to_a
|
87
|
+
end
|
88
|
+
task_gem
|
89
|
+
end
|
90
|
+
desc "Use the native version of cext"
|
91
|
+
task :native do
|
92
|
+
@native = true
|
93
|
+
Rake::Task[:cext].invoke
|
94
|
+
end
|
95
|
+
|
96
|
+
task :prepare do
|
97
|
+
if @type == 'cext'
|
98
|
+
Dir.chdir(@ext) do
|
99
|
+
ruby 'aes_gencons.rb'
|
100
|
+
if @native
|
101
|
+
ruby 'extconf.rb'
|
102
|
+
sh(PLATFORM =~ /win32/ ? 'nmake' : 'make')
|
103
|
+
end
|
104
|
+
end
|
105
|
+
else
|
106
|
+
cp "extras/#{@type}/aes_alg.rb", "#{@lib}/"
|
107
|
+
cp "extras/#{@type}/aes_gencons.rb", "#{@lib}/"
|
108
|
+
Dir.chdir(@lib) do
|
109
|
+
ruby 'aes_gencons.rb'
|
110
|
+
rm_f 'aes_gencons.rb'
|
111
|
+
end
|
112
|
+
end
|
113
|
+
end
|
114
|
+
|
115
|
+
task :package => [:clean, :prepare, :rerdoc]
|
116
|
+
|
117
|
+
task :default do
|
118
|
+
STDERR.puts <<-EOM
|
119
|
+
You must call rake with one of this task as first param:
|
120
|
+
normal
|
121
|
+
optimized
|
122
|
+
table1
|
123
|
+
table2
|
124
|
+
unroll1
|
125
|
+
unroll2
|
126
|
+
cext
|
127
|
+
native (imply cext)
|
128
|
+
EOM
|
129
|
+
end
|
130
|
+
|
131
|
+
desc 'Run all the tests'
|
132
|
+
Rake::TestTask.new do |t|
|
133
|
+
t.libs << "test"
|
134
|
+
t.test_files = FileList['test/test_*.rb']
|
135
|
+
t.verbose = true
|
136
|
+
end
|
137
|
+
|
138
|
+
desc 'Build the documentation'
|
139
|
+
Rake::RDocTask.new do |rdoc|
|
140
|
+
rdoc.rdoc_dir = 'doc/rdoc'
|
141
|
+
rdoc.options += RDOC_OPTS
|
142
|
+
rdoc.main = 'README'
|
143
|
+
rdoc.rdoc_files.add ['README', 'CHANGELOG', 'COPYING', 'lib/**/*.rb']
|
144
|
+
end
|
145
|
+
|
146
|
+
desc 'Install the package'
|
147
|
+
task :install do |t|
|
148
|
+
sh %{sudo gem install pkg/#{@gem_name}}
|
149
|
+
end
|
150
|
+
|
151
|
+
desc 'Uninstall the package'
|
152
|
+
task :uninstall do
|
153
|
+
sh %{sudo gem uninstall #{@gem_name}}
|
154
|
+
end
|
@@ -0,0 +1,22 @@
|
|
1
|
+
#!/usr/bin/env ruby
|
2
|
+
|
3
|
+
require 'ruby-aes'
|
4
|
+
require 'example_helper'
|
5
|
+
|
6
|
+
class RubyAES_block
|
7
|
+
|
8
|
+
include RubyAES_helper
|
9
|
+
|
10
|
+
def initialize
|
11
|
+
setup
|
12
|
+
pt = "0123467890ABCDEF"
|
13
|
+
puts "Using #{@kl}-#{@mode} encryption/decryption"
|
14
|
+
puts "Plaintext is: #{pt} (a block should be 16 octets)"
|
15
|
+
ct = Aes.encrypt_block(@kl, @mode, @keys[@kl], @iv, pt)
|
16
|
+
puts "Ciphertext (unpacked) is: #{ct.unpack("H*").first}"
|
17
|
+
npt = Aes.decrypt_block(@kl, @mode, @keys[@kl], @iv, ct)
|
18
|
+
puts "Decrypted ciphertext is: #{npt} (should be: #{pt})"
|
19
|
+
end
|
20
|
+
|
21
|
+
end
|
22
|
+
RubyAES_block.new
|
@@ -0,0 +1,24 @@
|
|
1
|
+
#!/usr/bin/env ruby
|
2
|
+
|
3
|
+
require 'ruby-aes'
|
4
|
+
require 'example_helper'
|
5
|
+
|
6
|
+
class RubyAES_buffer
|
7
|
+
|
8
|
+
include RubyAES_helper
|
9
|
+
|
10
|
+
def initialize
|
11
|
+
setup
|
12
|
+
puts "Using #{@kl}-#{@mode} encryption/decryption"
|
13
|
+
pt = "The quick brown fox jumps over the lazy dog"
|
14
|
+
puts "Plaintext is: '#{pt}'"
|
15
|
+
puts "(a buffer will be padded so that its length will be a multiple of 16)"
|
16
|
+
ct = Aes.encrypt_buffer(@kl, @mode, @keys[@kl], @iv, pt)
|
17
|
+
puts "Ciphertext (unpacked) is: #{ct.unpack("H*").first}"
|
18
|
+
npt = Aes.decrypt_buffer(@kl, @mode, @keys[@kl], @iv, ct)
|
19
|
+
puts "Decrypted ciphertext is: '#{npt}'"
|
20
|
+
puts "(should be: '#{pt}')"
|
21
|
+
end
|
22
|
+
|
23
|
+
end
|
24
|
+
RubyAES_buffer.new
|
@@ -0,0 +1,39 @@
|
|
1
|
+
#!/usr/bin/env ruby
|
2
|
+
|
3
|
+
require 'ruby-aes'
|
4
|
+
require 'example_helper'
|
5
|
+
require 'fileutils'
|
6
|
+
|
7
|
+
class RubyAES_stream
|
8
|
+
|
9
|
+
include RubyAES_helper
|
10
|
+
|
11
|
+
def initialize
|
12
|
+
setup
|
13
|
+
puts "Using #{@kl}-#{@mode} encryption/decryption"
|
14
|
+
file = "_ruby-aes_encrypt_stream_"
|
15
|
+
|
16
|
+
sin = File.open(file, "w+b")
|
17
|
+
sin.puts "The quick brown fox jumps over the lazy dog"
|
18
|
+
sin.rewind
|
19
|
+
sout = File.open("#{file}.aes", "w+b")
|
20
|
+
Aes.encrypt_stream(@kl, @mode, @keys[@kl], @iv, sin, sout)
|
21
|
+
sin.close
|
22
|
+
sout.close
|
23
|
+
|
24
|
+
sin = File.open("#{file}.aes", "rb")
|
25
|
+
sout = File.open("#{file}.plain", "w+b")
|
26
|
+
Aes.decrypt_stream(@kl, @mode, @keys[@kl], @iv, sin, sout)
|
27
|
+
sin.close
|
28
|
+
sout.close
|
29
|
+
|
30
|
+
if IO.read(file) == IO.read("#{file}.plain")
|
31
|
+
puts "The decrypted file is exactly the same as the original one"
|
32
|
+
else
|
33
|
+
puts "The decrypted file differs from the orginal one"
|
34
|
+
end
|
35
|
+
FileUtils.rm_f [ file, "#{file}.aes", "#{file}.plain" ]
|
36
|
+
end
|
37
|
+
|
38
|
+
end
|
39
|
+
RubyAES_stream.new
|
@@ -0,0 +1,27 @@
|
|
1
|
+
#!/usr/bin/env ruby
|
2
|
+
|
3
|
+
module RubyAES_helper
|
4
|
+
|
5
|
+
KEY_LENGTH = [128,192,256].freeze
|
6
|
+
MODES = ['ECB','CBC','OFB','CFB'].freeze
|
7
|
+
|
8
|
+
def random_fill(n, buffer)
|
9
|
+
n.times do
|
10
|
+
buffer << rand(256).chr
|
11
|
+
end
|
12
|
+
end
|
13
|
+
|
14
|
+
def setup
|
15
|
+
@keys = {}
|
16
|
+
KEY_LENGTH.each do |kl|
|
17
|
+
@keys[kl] = ""
|
18
|
+
random_fill(kl/8, @keys[kl])
|
19
|
+
end
|
20
|
+
|
21
|
+
@iv = ""; random_fill(16, @iv)
|
22
|
+
@pt = ""; random_fill(64, @pt)
|
23
|
+
@kl = KEY_LENGTH[(rand * KEY_LENGTH.length).to_i]
|
24
|
+
@mode = MODES[(rand * MODES.length).to_i]
|
25
|
+
end
|
26
|
+
|
27
|
+
end
|
Binary file
|
data/lib/ruby-aes.rb
ADDED
@@ -0,0 +1,162 @@
|
|
1
|
+
=begin
|
2
|
+
This file is a part of ruby-aes <http://rubyforge.org/projects/ruby-aes>
|
3
|
+
Written by Alex Boussinet <alex.boussinet@gmail.com>
|
4
|
+
|
5
|
+
==Valid modes are:
|
6
|
+
* ECB (Electronic Code Book)
|
7
|
+
* CBC (Cipher Block Chaining)
|
8
|
+
* OFB (Output Feedback)
|
9
|
+
* CFB (Cipher Feedback)
|
10
|
+
|
11
|
+
==Valid key length:
|
12
|
+
* 128 bits
|
13
|
+
* 192 bits
|
14
|
+
* 256 bits
|
15
|
+
|
16
|
+
==API calls:
|
17
|
+
Default key_length: 128
|
18
|
+
Default mode: 'ECB'
|
19
|
+
Default IV: 16 null chars ("00" * 16 in hex format)
|
20
|
+
Default key: 16 null chars ("00" * 16 in hex format)
|
21
|
+
Default input text: "PLAINTEXT"
|
22
|
+
|
23
|
+
Aes.check_key(key_string, key_length)
|
24
|
+
Aes.check_iv(iv_string)
|
25
|
+
Aes.check_kl(key_length)
|
26
|
+
Aes.check_mode(mode)
|
27
|
+
Aes.init(key_length, mode, key, iv)
|
28
|
+
Aes.encrypt_block(key_length, mode, key, iv, block) # no padding
|
29
|
+
Aes.decrypt_block(key_length, mode, key, iv, block) # no padding
|
30
|
+
Aes.encrypt_buffer(key_length, mode, key, iv, block) # padding
|
31
|
+
Aes.decrypt_buffer(key_length, mode, key, iv, block) # padding
|
32
|
+
Aes.encrypt_stream(key_length, mode, key, iv, sin, sout)
|
33
|
+
Aes.decrypt_stream(key_length, mode, key, iv, sin, sout)
|
34
|
+
Aes.bs() # block size for read operations (stream)
|
35
|
+
Aes.bs=(bs)
|
36
|
+
=end
|
37
|
+
|
38
|
+
module Aes
|
39
|
+
|
40
|
+
require 'ruby-aes/aes_alg'
|
41
|
+
|
42
|
+
@@aes = nil
|
43
|
+
@@bs = 4096
|
44
|
+
|
45
|
+
def Aes.bs(); return @@bs end
|
46
|
+
def Aes.bs=(bs); @@bs = bs.to_i; @@bs==0 ? 4096 : @@bs = @@bs - @@bs%16 end
|
47
|
+
|
48
|
+
def Aes.check_key(key_string, kl = 128)
|
49
|
+
kl = Aes.check_kl(kl)
|
50
|
+
k = key_string.length
|
51
|
+
raise "Bad key string or bad key length" if (k != kl/8) && (k != kl/4)
|
52
|
+
hex = (key_string =~ /[a-f0-9A-F]{#{k}}/) == 0 && (k == kl/4)
|
53
|
+
bin = ! hex
|
54
|
+
if ! (([32, 48, 64].include?(k) && hex) ||
|
55
|
+
([16, 24, 32].include?(k) && bin))
|
56
|
+
raise "Bad key string"
|
57
|
+
end
|
58
|
+
hex ? [key_string].pack("H*") : key_string
|
59
|
+
end
|
60
|
+
|
61
|
+
def Aes.check_iv(iv_string)
|
62
|
+
k = iv_string.length
|
63
|
+
hex = (iv_string =~ /[a-f0-9A-F]{#{k}}/) == 0
|
64
|
+
bin = ! hex
|
65
|
+
if k == 32 && hex
|
66
|
+
return [iv_string].pack("H*")
|
67
|
+
elsif k == 16 && bin
|
68
|
+
return iv_string
|
69
|
+
else
|
70
|
+
raise "Bad IV string"
|
71
|
+
end
|
72
|
+
end
|
73
|
+
|
74
|
+
def Aes.check_mode (mode)
|
75
|
+
case mode
|
76
|
+
when 'ECB', 'CBC', 'OFB', 'CFB'
|
77
|
+
else raise "Bad cipher mode"
|
78
|
+
end
|
79
|
+
mode
|
80
|
+
end
|
81
|
+
|
82
|
+
def Aes.check_kl(key_length)
|
83
|
+
case key_length
|
84
|
+
when 128, 192, 256
|
85
|
+
else raise "Bad key length"
|
86
|
+
end
|
87
|
+
key_length
|
88
|
+
end
|
89
|
+
|
90
|
+
def Aes.init(keyl, mode, key, iv)
|
91
|
+
unless @@aes
|
92
|
+
@@aes = AesAlg.new(Aes.check_kl(keyl), Aes.check_mode(mode),
|
93
|
+
Aes.check_key(key, keyl), iv ? Aes.check_iv(iv) : nil)
|
94
|
+
else
|
95
|
+
@@aes.init(Aes.check_kl(keyl), Aes.check_mode(mode),
|
96
|
+
Aes.check_key(key, keyl), iv ? Aes.check_iv(iv) : nil)
|
97
|
+
end
|
98
|
+
end
|
99
|
+
|
100
|
+
def Aes.encrypt_block(keyl, mode, key, iv, block = "DEFAULT PLAINTXT")
|
101
|
+
raise "Bad Block size" if block.length < 16 || block.length > 16
|
102
|
+
Aes.init(keyl, mode, key, iv)
|
103
|
+
@@aes.encrypt_block(block)
|
104
|
+
end
|
105
|
+
|
106
|
+
def Aes.decrypt_block(keyl, mode, key, iv, block = "DEFAULT PLAINTXT")
|
107
|
+
Aes.init(keyl, mode, key, iv)
|
108
|
+
@@aes.decrypt_block(block)
|
109
|
+
end
|
110
|
+
|
111
|
+
def Aes.encrypt_buffer(keyl, mode, key, iv, buffer = "PLAINTEXT")
|
112
|
+
Aes.init(keyl, mode, key, iv)
|
113
|
+
@@aes.encrypt_buffer(buffer)
|
114
|
+
end
|
115
|
+
|
116
|
+
def Aes.decrypt_buffer(keyl, mode, key, iv, buffer = "DEFAULT PLAINTXT")
|
117
|
+
raise "Bad Block size" if buffer.length < 16
|
118
|
+
Aes.init(keyl, mode, key, iv)
|
119
|
+
@@aes.decrypt_buffer(buffer)
|
120
|
+
end
|
121
|
+
|
122
|
+
def Aes.encrypt_stream(keyl, mode, key, iv, sin = STDIN, sout = STDOUT)
|
123
|
+
Aes.init(keyl, mode, key, iv)
|
124
|
+
case sout
|
125
|
+
when String, Array, IO
|
126
|
+
else
|
127
|
+
raise "Bad output stream (String, Array, IO)"
|
128
|
+
end
|
129
|
+
case sin
|
130
|
+
when String
|
131
|
+
sout << @@aes.encrypt_buffer(sin)
|
132
|
+
when IO
|
133
|
+
while buf = sin.read(@@bs)
|
134
|
+
sout << ((buf.length % 16).zero? ? @@aes.encrypt_blocks(buf) :
|
135
|
+
@@aes.encrypt_buffer(buf))
|
136
|
+
end
|
137
|
+
else
|
138
|
+
raise "Bad input stream (String, IO)"
|
139
|
+
end
|
140
|
+
end
|
141
|
+
|
142
|
+
def Aes.decrypt_stream(keyl, mode, key, iv, sin = STDIN, sout = STDOUT)
|
143
|
+
Aes.init(keyl, mode, key, iv)
|
144
|
+
case sout
|
145
|
+
when String, Array, IO
|
146
|
+
else
|
147
|
+
raise "Bad output stream (String, Array, IO)"
|
148
|
+
end
|
149
|
+
case sin
|
150
|
+
when String
|
151
|
+
sout << @@aes.decrypt_buffer(sin)
|
152
|
+
when IO
|
153
|
+
while buf = sin.read(@@bs)
|
154
|
+
sout << (sin.eof? ? @@aes.decrypt_buffer(buf) :
|
155
|
+
@@aes.decrypt_blocks(buf))
|
156
|
+
end
|
157
|
+
else
|
158
|
+
raise "Bad input stream (String, IO)"
|
159
|
+
end
|
160
|
+
end
|
161
|
+
|
162
|
+
end # end Aes
|