ruby-aes-cext 1.1-i486-linux
Sign up to get free protection for your applications and to get access to all the features.
- data/CHANGELOG +12 -0
- data/COPYING +20 -0
- data/README +77 -0
- data/Rakefile +154 -0
- data/doc/rdoc/classes/Aes.html +500 -0
- data/doc/rdoc/classes/AesShared.html +265 -0
- data/doc/rdoc/created.rid +1 -0
- data/doc/rdoc/files/CHANGELOG.html +127 -0
- data/doc/rdoc/files/COPYING.html +129 -0
- data/doc/rdoc/files/README.html +235 -0
- data/doc/rdoc/files/lib/ruby-aes/aes_shared_rb.html +101 -0
- data/doc/rdoc/files/lib/ruby-aes_rb.html +108 -0
- data/doc/rdoc/fr_class_index.html +28 -0
- data/doc/rdoc/fr_file_index.html +31 -0
- data/doc/rdoc/fr_method_index.html +43 -0
- data/doc/rdoc/index.html +24 -0
- data/doc/rdoc/rdoc-style.css +208 -0
- data/examples/encrypt_block.rb +23 -0
- data/examples/encrypt_buffer.rb +25 -0
- data/examples/encrypt_stream.rb +40 -0
- data/examples/example_helper.rb +27 -0
- data/ext/ruby-aes/aes_alg.so +0 -0
- data/lib/ruby-aes/aes_shared.rb +77 -0
- data/lib/ruby-aes.rb +168 -0
- data/test/KAT_MCT/aes_kat_mct.rb +386 -0
- data/test/KAT_MCT/rijndael-vals.zip +0 -0
- data/test/KAT_MCT/table.128 +128 -0
- data/test/KAT_MCT/table.192 +128 -0
- data/test/KAT_MCT/table.256 +128 -0
- data/test/test_helper.rb +16 -0
- data/test/test_ruby-aes.rb +126 -0
- metadata +97 -0
@@ -0,0 +1,208 @@
|
|
1
|
+
|
2
|
+
body {
|
3
|
+
font-family: Verdana,Arial,Helvetica,sans-serif;
|
4
|
+
font-size: 90%;
|
5
|
+
margin: 0;
|
6
|
+
margin-left: 40px;
|
7
|
+
padding: 0;
|
8
|
+
background: white;
|
9
|
+
}
|
10
|
+
|
11
|
+
h1,h2,h3,h4 { margin: 0; color: #efefef; background: transparent; }
|
12
|
+
h1 { font-size: 150%; }
|
13
|
+
h2,h3,h4 { margin-top: 1em; }
|
14
|
+
|
15
|
+
a { background: #eef; color: #039; text-decoration: none; }
|
16
|
+
a:hover { background: #039; color: #eef; }
|
17
|
+
|
18
|
+
/* Override the base stylesheet's Anchor inside a table cell */
|
19
|
+
td > a {
|
20
|
+
background: transparent;
|
21
|
+
color: #039;
|
22
|
+
text-decoration: none;
|
23
|
+
}
|
24
|
+
|
25
|
+
/* and inside a section title */
|
26
|
+
.section-title > a {
|
27
|
+
background: transparent;
|
28
|
+
color: #eee;
|
29
|
+
text-decoration: none;
|
30
|
+
}
|
31
|
+
|
32
|
+
/* === Structural elements =================================== */
|
33
|
+
|
34
|
+
div#index {
|
35
|
+
margin: 0;
|
36
|
+
margin-left: -40px;
|
37
|
+
padding: 0;
|
38
|
+
font-size: 90%;
|
39
|
+
}
|
40
|
+
|
41
|
+
|
42
|
+
div#index a {
|
43
|
+
margin-left: 0.7em;
|
44
|
+
}
|
45
|
+
|
46
|
+
div#index .section-bar {
|
47
|
+
margin-left: 0px;
|
48
|
+
padding-left: 0.7em;
|
49
|
+
background: #ccc;
|
50
|
+
font-size: small;
|
51
|
+
}
|
52
|
+
|
53
|
+
|
54
|
+
div#classHeader, div#fileHeader {
|
55
|
+
width: auto;
|
56
|
+
color: white;
|
57
|
+
padding: 0.5em 1.5em 0.5em 1.5em;
|
58
|
+
margin: 0;
|
59
|
+
margin-left: -40px;
|
60
|
+
border-bottom: 3px solid #006;
|
61
|
+
}
|
62
|
+
|
63
|
+
div#classHeader a, div#fileHeader a {
|
64
|
+
background: inherit;
|
65
|
+
color: white;
|
66
|
+
}
|
67
|
+
|
68
|
+
div#classHeader td, div#fileHeader td {
|
69
|
+
background: inherit;
|
70
|
+
color: white;
|
71
|
+
}
|
72
|
+
|
73
|
+
|
74
|
+
div#fileHeader {
|
75
|
+
background: #057;
|
76
|
+
}
|
77
|
+
|
78
|
+
div#classHeader {
|
79
|
+
background: #048;
|
80
|
+
}
|
81
|
+
|
82
|
+
|
83
|
+
.class-name-in-header {
|
84
|
+
font-size: 180%;
|
85
|
+
font-weight: bold;
|
86
|
+
}
|
87
|
+
|
88
|
+
|
89
|
+
div#bodyContent {
|
90
|
+
padding: 0 1.5em 0 1.5em;
|
91
|
+
}
|
92
|
+
|
93
|
+
div#description {
|
94
|
+
padding: 0.5em 1.5em;
|
95
|
+
background: #efefef;
|
96
|
+
border: 1px dotted #999;
|
97
|
+
}
|
98
|
+
|
99
|
+
div#description h1,h2,h3,h4,h5,h6 {
|
100
|
+
color: #125;;
|
101
|
+
background: transparent;
|
102
|
+
}
|
103
|
+
|
104
|
+
div#validator-badges {
|
105
|
+
text-align: center;
|
106
|
+
}
|
107
|
+
div#validator-badges img { border: 0; }
|
108
|
+
|
109
|
+
div#copyright {
|
110
|
+
color: #333;
|
111
|
+
background: #efefef;
|
112
|
+
font: 0.75em sans-serif;
|
113
|
+
margin-top: 5em;
|
114
|
+
margin-bottom: 0;
|
115
|
+
padding: 0.5em 2em;
|
116
|
+
}
|
117
|
+
|
118
|
+
|
119
|
+
/* === Classes =================================== */
|
120
|
+
|
121
|
+
table.header-table {
|
122
|
+
color: white;
|
123
|
+
font-size: small;
|
124
|
+
}
|
125
|
+
|
126
|
+
.type-note {
|
127
|
+
font-size: small;
|
128
|
+
color: #DEDEDE;
|
129
|
+
}
|
130
|
+
|
131
|
+
.xxsection-bar {
|
132
|
+
background: #eee;
|
133
|
+
color: #333;
|
134
|
+
padding: 3px;
|
135
|
+
}
|
136
|
+
|
137
|
+
.section-bar {
|
138
|
+
color: #333;
|
139
|
+
border-bottom: 1px solid #999;
|
140
|
+
margin-left: -20px;
|
141
|
+
}
|
142
|
+
|
143
|
+
|
144
|
+
.section-title {
|
145
|
+
background: #79a;
|
146
|
+
color: #eee;
|
147
|
+
padding: 3px;
|
148
|
+
margin-top: 2em;
|
149
|
+
margin-left: -30px;
|
150
|
+
border: 1px solid #999;
|
151
|
+
}
|
152
|
+
|
153
|
+
.top-aligned-row { vertical-align: top }
|
154
|
+
.bottom-aligned-row { vertical-align: bottom }
|
155
|
+
|
156
|
+
/* --- Context section classes ----------------------- */
|
157
|
+
|
158
|
+
.context-row { }
|
159
|
+
.context-item-name { font-family: monospace; font-weight: bold; color: black; }
|
160
|
+
.context-item-value { font-size: small; color: #448; }
|
161
|
+
.context-item-desc { color: #333; padding-left: 2em; }
|
162
|
+
|
163
|
+
/* --- Method classes -------------------------- */
|
164
|
+
.method-detail {
|
165
|
+
background: #efefef;
|
166
|
+
padding: 0;
|
167
|
+
margin-top: 0.5em;
|
168
|
+
margin-bottom: 1em;
|
169
|
+
border: 1px dotted #ccc;
|
170
|
+
}
|
171
|
+
.method-heading {
|
172
|
+
color: black;
|
173
|
+
background: #ccc;
|
174
|
+
border-bottom: 1px solid #666;
|
175
|
+
padding: 0.2em 0.5em 0 0.5em;
|
176
|
+
}
|
177
|
+
.method-signature { color: black; background: inherit; }
|
178
|
+
.method-name { font-weight: bold; }
|
179
|
+
.method-args { font-style: italic; }
|
180
|
+
.method-description { padding: 0 0.5em 0 0.5em; }
|
181
|
+
|
182
|
+
/* --- Source code sections -------------------- */
|
183
|
+
|
184
|
+
a.source-toggle { font-size: 90%; }
|
185
|
+
div.method-source-code {
|
186
|
+
background: #262626;
|
187
|
+
color: #ffdead;
|
188
|
+
margin: 1em;
|
189
|
+
padding: 0.5em;
|
190
|
+
border: 1px dashed #999;
|
191
|
+
overflow: hidden;
|
192
|
+
}
|
193
|
+
|
194
|
+
div.method-source-code pre { color: #ffdead; overflow: hidden; }
|
195
|
+
|
196
|
+
/* --- Ruby keyword styles --------------------- */
|
197
|
+
|
198
|
+
.standalone-code { background: #221111; color: #ffdead; overflow: hidden; }
|
199
|
+
|
200
|
+
.ruby-constant { color: #7fffd4; background: transparent; }
|
201
|
+
.ruby-keyword { color: #00ffff; background: transparent; }
|
202
|
+
.ruby-ivar { color: #eedd82; background: transparent; }
|
203
|
+
.ruby-operator { color: #00ffee; background: transparent; }
|
204
|
+
.ruby-identifier { color: #ffdead; background: transparent; }
|
205
|
+
.ruby-node { color: #ffa07a; background: transparent; }
|
206
|
+
.ruby-comment { color: #b22222; font-weight: bold; background: transparent; }
|
207
|
+
.ruby-regexp { color: #ffa07a; background: transparent; }
|
208
|
+
.ruby-value { color: #7fffd4; background: transparent; }
|
@@ -0,0 +1,23 @@
|
|
1
|
+
#!/usr/bin/env ruby
|
2
|
+
|
3
|
+
require 'rubygems'
|
4
|
+
require 'ruby-aes'
|
5
|
+
require 'example_helper'
|
6
|
+
|
7
|
+
class RubyAES_block
|
8
|
+
|
9
|
+
include RubyAES_helper
|
10
|
+
|
11
|
+
def initialize
|
12
|
+
setup
|
13
|
+
pt = "0123467890ABCDEF"
|
14
|
+
puts "Using #{@kl}-#{@mode} encryption/decryption"
|
15
|
+
puts "Plaintext is: #{pt} (a block should be 16 octets)"
|
16
|
+
ct = Aes.encrypt_block(@kl, @mode, @keys[@kl], @iv, pt)
|
17
|
+
puts "Ciphertext (unpacked) is: #{ct.unpack("H*").first}"
|
18
|
+
npt = Aes.decrypt_block(@kl, @mode, @keys[@kl], @iv, ct)
|
19
|
+
puts "Decrypted ciphertext is: #{npt} (should be: #{pt})"
|
20
|
+
end
|
21
|
+
|
22
|
+
end
|
23
|
+
RubyAES_block.new
|
@@ -0,0 +1,25 @@
|
|
1
|
+
#!/usr/bin/env ruby
|
2
|
+
|
3
|
+
require 'rubygems'
|
4
|
+
require 'ruby-aes'
|
5
|
+
require 'example_helper'
|
6
|
+
|
7
|
+
class RubyAES_buffer
|
8
|
+
|
9
|
+
include RubyAES_helper
|
10
|
+
|
11
|
+
def initialize
|
12
|
+
setup
|
13
|
+
puts "Using #{@kl}-#{@mode} encryption/decryption"
|
14
|
+
pt = "The quick brown fox jumps over the lazy dog"
|
15
|
+
puts "Plaintext is: '#{pt}'"
|
16
|
+
puts "(a buffer will be padded so that its length will be a multiple of 16)"
|
17
|
+
ct = Aes.encrypt_buffer(@kl, @mode, @keys[@kl], @iv, pt)
|
18
|
+
puts "Ciphertext (unpacked) is: #{ct.unpack("H*").first}"
|
19
|
+
npt = Aes.decrypt_buffer(@kl, @mode, @keys[@kl], @iv, ct)
|
20
|
+
puts "Decrypted ciphertext is: '#{npt}'"
|
21
|
+
puts "(should be: '#{pt}')"
|
22
|
+
end
|
23
|
+
|
24
|
+
end
|
25
|
+
RubyAES_buffer.new
|
@@ -0,0 +1,40 @@
|
|
1
|
+
#!/usr/bin/env ruby
|
2
|
+
|
3
|
+
require 'rubygems'
|
4
|
+
require 'ruby-aes'
|
5
|
+
require 'example_helper'
|
6
|
+
require 'fileutils'
|
7
|
+
|
8
|
+
class RubyAES_stream
|
9
|
+
|
10
|
+
include RubyAES_helper
|
11
|
+
|
12
|
+
def initialize
|
13
|
+
setup
|
14
|
+
puts "Using #{@kl}-#{@mode} encryption/decryption"
|
15
|
+
file = "_ruby-aes_encrypt_stream_"
|
16
|
+
|
17
|
+
sin = File.open(file, "w+b")
|
18
|
+
sin.puts "The quick brown fox jumps over the lazy dog"
|
19
|
+
sin.rewind
|
20
|
+
sout = File.open("#{file}.aes", "w+b")
|
21
|
+
Aes.encrypt_stream(@kl, @mode, @keys[@kl], @iv, sin, sout)
|
22
|
+
sin.close
|
23
|
+
sout.close
|
24
|
+
|
25
|
+
sin = File.open("#{file}.aes", "rb")
|
26
|
+
sout = File.open("#{file}.plain", "w+b")
|
27
|
+
Aes.decrypt_stream(@kl, @mode, @keys[@kl], @iv, sin, sout)
|
28
|
+
sin.close
|
29
|
+
sout.close
|
30
|
+
|
31
|
+
if IO.read(file) == IO.read("#{file}.plain")
|
32
|
+
puts "The decrypted file is exactly the same as the original one"
|
33
|
+
else
|
34
|
+
puts "The decrypted file differs from the orginal one"
|
35
|
+
end
|
36
|
+
FileUtils.rm_f [ file, "#{file}.aes", "#{file}.plain" ]
|
37
|
+
end
|
38
|
+
|
39
|
+
end
|
40
|
+
RubyAES_stream.new
|
@@ -0,0 +1,27 @@
|
|
1
|
+
#!/usr/bin/env ruby
|
2
|
+
|
3
|
+
module RubyAES_helper
|
4
|
+
|
5
|
+
KEY_LENGTH = [128,192,256].freeze
|
6
|
+
MODES = ['ECB','CBC','OFB','CFB'].freeze
|
7
|
+
|
8
|
+
def random_fill(n, buffer)
|
9
|
+
n.times do
|
10
|
+
buffer << rand(256).chr
|
11
|
+
end
|
12
|
+
end
|
13
|
+
|
14
|
+
def setup
|
15
|
+
@keys = {}
|
16
|
+
KEY_LENGTH.each do |kl|
|
17
|
+
@keys[kl] = ""
|
18
|
+
random_fill(kl/8, @keys[kl])
|
19
|
+
end
|
20
|
+
|
21
|
+
@iv = ""; random_fill(16, @iv)
|
22
|
+
@pt = ""; random_fill(64, @pt)
|
23
|
+
@kl = KEY_LENGTH[(rand * KEY_LENGTH.length).to_i]
|
24
|
+
@mode = MODES[(rand * MODES.length).to_i]
|
25
|
+
end
|
26
|
+
|
27
|
+
end
|
Binary file
|
@@ -0,0 +1,77 @@
|
|
1
|
+
=begin
|
2
|
+
This file is a part of ruby-aes <http://rubyforge.org/projects/ruby-aes>
|
3
|
+
Written by Alex Boussinet <alex.boussinet@gmail.com>
|
4
|
+
|
5
|
+
It contains the code shared by all the implementations
|
6
|
+
=end
|
7
|
+
|
8
|
+
module AesShared
|
9
|
+
def encrypt_blocks(buffer)
|
10
|
+
raise "Bad block length" unless (buffer.length % 16).zero?
|
11
|
+
ct = ""
|
12
|
+
block = ""
|
13
|
+
buffer.each_byte do |char|
|
14
|
+
block << char
|
15
|
+
if block.length == 16
|
16
|
+
ct << encrypt_block(block)
|
17
|
+
block = ""
|
18
|
+
end
|
19
|
+
end
|
20
|
+
ct
|
21
|
+
end
|
22
|
+
|
23
|
+
def decrypt_blocks(buffer)
|
24
|
+
raise "Bad block length" unless (buffer.length % 16).zero?
|
25
|
+
pt = ""
|
26
|
+
block = ""
|
27
|
+
buffer.each_byte do |char|
|
28
|
+
block << char
|
29
|
+
if block.length == 16
|
30
|
+
pt << decrypt_block(block)
|
31
|
+
block = ""
|
32
|
+
end
|
33
|
+
end
|
34
|
+
pt
|
35
|
+
end
|
36
|
+
|
37
|
+
def encrypt_buffer(buffer)
|
38
|
+
ct = ""
|
39
|
+
block = ""
|
40
|
+
buffer.each_byte do |char|
|
41
|
+
block << char
|
42
|
+
if block.length == 16
|
43
|
+
ct << encrypt_block(block)
|
44
|
+
block = ""
|
45
|
+
end
|
46
|
+
end
|
47
|
+
c = "\000"
|
48
|
+
if (m = 16 - block.length % 16) != 16
|
49
|
+
c = m.chr
|
50
|
+
ct << encrypt_block(block << c * m)
|
51
|
+
end
|
52
|
+
ct << c
|
53
|
+
end
|
54
|
+
|
55
|
+
def decrypt_buffer(buffer)
|
56
|
+
pt = ""
|
57
|
+
block = ""
|
58
|
+
buffer.each_byte do |char|
|
59
|
+
block << char
|
60
|
+
if block.length == 16
|
61
|
+
pt << decrypt_block(block)
|
62
|
+
block = ""
|
63
|
+
end
|
64
|
+
end
|
65
|
+
if block.length != 1
|
66
|
+
raise 'Bad Block Padding'
|
67
|
+
elsif (c = block[-1]).zero?
|
68
|
+
pt
|
69
|
+
else
|
70
|
+
if block * c == pt[-c..-1]
|
71
|
+
pt[0..-c-1]
|
72
|
+
else
|
73
|
+
raise "Bad Block Padding"
|
74
|
+
end
|
75
|
+
end
|
76
|
+
end
|
77
|
+
end
|
data/lib/ruby-aes.rb
ADDED
@@ -0,0 +1,168 @@
|
|
1
|
+
=begin
|
2
|
+
This file is a part of ruby-aes <http://rubyforge.org/projects/ruby-aes>
|
3
|
+
Written by Alex Boussinet <alex.boussinet@gmail.com>
|
4
|
+
|
5
|
+
==Valid modes are:
|
6
|
+
* ECB (Electronic Code Book)
|
7
|
+
* CBC (Cipher Block Chaining)
|
8
|
+
* OFB (Output Feedback)
|
9
|
+
* CFB (Cipher Feedback)
|
10
|
+
|
11
|
+
==Valid key length:
|
12
|
+
* 128 bits
|
13
|
+
* 192 bits
|
14
|
+
* 256 bits
|
15
|
+
|
16
|
+
==API calls:
|
17
|
+
Default key_length: 128
|
18
|
+
Default mode: 'ECB'
|
19
|
+
Default IV: 16 null chars ("00" * 16 in hex format)
|
20
|
+
Default key: 16 null chars ("00" * 16 in hex format)
|
21
|
+
Default input text: "PLAINTEXT"
|
22
|
+
|
23
|
+
Aes.check_key(key_string, key_length)
|
24
|
+
Aes.check_iv(iv_string)
|
25
|
+
Aes.check_kl(key_length)
|
26
|
+
Aes.check_mode(mode)
|
27
|
+
Aes.init(key_length, mode, key, iv)
|
28
|
+
Aes.encrypt_block(key_length, mode, key, iv, block) # no padding
|
29
|
+
Aes.decrypt_block(key_length, mode, key, iv, block) # no padding
|
30
|
+
Aes.encrypt_buffer(key_length, mode, key, iv, block) # padding
|
31
|
+
Aes.decrypt_buffer(key_length, mode, key, iv, block) # padding
|
32
|
+
Aes.encrypt_stream(key_length, mode, key, iv, sin, sout)
|
33
|
+
Aes.decrypt_stream(key_length, mode, key, iv, sin, sout)
|
34
|
+
Aes.bs() # block size for read operations (stream)
|
35
|
+
Aes.bs=(bs)
|
36
|
+
=end
|
37
|
+
|
38
|
+
module Aes
|
39
|
+
|
40
|
+
require 'ruby-aes/aes_alg'
|
41
|
+
|
42
|
+
@@aes = nil
|
43
|
+
@@bs = 4096
|
44
|
+
|
45
|
+
def Aes.bs(); return @@bs end
|
46
|
+
def Aes.bs=(bs); @@bs = bs.to_i; @@bs==0 ? 4096 : @@bs = @@bs - @@bs%16 end
|
47
|
+
|
48
|
+
def Aes.check_key(key_string, kl = 128)
|
49
|
+
kl = Aes.check_kl(kl)
|
50
|
+
k = key_string ? key_string.length : 0
|
51
|
+
raise "Bad key string or bad key length" if (k != kl/8) && (k != kl/4)
|
52
|
+
hex = (key_string =~ /[a-f0-9A-F]{#{k}}/) == 0 && (k == kl/4)
|
53
|
+
bin = ! hex
|
54
|
+
if ! (([32, 48, 64].include?(k) && hex) ||
|
55
|
+
([16, 24, 32].include?(k) && bin))
|
56
|
+
raise "Bad key string"
|
57
|
+
end
|
58
|
+
hex ? [key_string].pack("H*") : key_string
|
59
|
+
end
|
60
|
+
|
61
|
+
def Aes.check_iv(iv_string)
|
62
|
+
k = iv_string.length
|
63
|
+
hex = (iv_string =~ /[a-f0-9A-F]{#{k}}/) == 0
|
64
|
+
bin = ! hex
|
65
|
+
if k == 32 && hex
|
66
|
+
return [iv_string].pack("H*")
|
67
|
+
elsif k == 16 && bin
|
68
|
+
return iv_string
|
69
|
+
else
|
70
|
+
raise "Bad IV string"
|
71
|
+
end
|
72
|
+
end
|
73
|
+
|
74
|
+
def Aes.check_mode (mode)
|
75
|
+
case mode
|
76
|
+
when 'ECB', 'CBC', 'OFB', 'CFB'
|
77
|
+
else raise "Bad cipher mode"
|
78
|
+
end
|
79
|
+
mode
|
80
|
+
end
|
81
|
+
|
82
|
+
def Aes.check_kl(key_length)
|
83
|
+
case key_length
|
84
|
+
when 128, 192, 256
|
85
|
+
else raise "Bad key length"
|
86
|
+
end
|
87
|
+
key_length
|
88
|
+
end
|
89
|
+
|
90
|
+
def Aes.init(keyl, mode, key, iv)
|
91
|
+
unless @@aes
|
92
|
+
@@aes = AesAlg.new(Aes.check_kl(keyl), Aes.check_mode(mode),
|
93
|
+
Aes.check_key(key, keyl), iv ? Aes.check_iv(iv) : nil)
|
94
|
+
else
|
95
|
+
@@aes.init(Aes.check_kl(keyl), Aes.check_mode(mode),
|
96
|
+
Aes.check_key(key, keyl), iv ? Aes.check_iv(iv) : nil)
|
97
|
+
end
|
98
|
+
end
|
99
|
+
|
100
|
+
def Aes.encrypt_block(keyl, mode, key, iv, block = "DEFAULT PLAINTXT")
|
101
|
+
raise "Bad Block size" if block.length < 16 || block.length > 16
|
102
|
+
Aes.init(keyl, mode, key, iv)
|
103
|
+
@@aes.encrypt_block(block)
|
104
|
+
end
|
105
|
+
|
106
|
+
def Aes.decrypt_block(keyl, mode, key, iv, block = "DEFAULT PLAINTXT")
|
107
|
+
Aes.init(keyl, mode, key, iv)
|
108
|
+
@@aes.decrypt_block(block)
|
109
|
+
end
|
110
|
+
|
111
|
+
def Aes.encrypt_buffer(keyl, mode, key, iv, buffer = "PLAINTEXT")
|
112
|
+
Aes.init(keyl, mode, key, iv)
|
113
|
+
@@aes.encrypt_buffer(buffer)
|
114
|
+
end
|
115
|
+
|
116
|
+
def Aes.decrypt_buffer(keyl, mode, key, iv, buffer = "DEFAULT PLAINTXT")
|
117
|
+
raise "Bad Block size" if buffer.length < 16
|
118
|
+
Aes.init(keyl, mode, key, iv)
|
119
|
+
@@aes.decrypt_buffer(buffer)
|
120
|
+
end
|
121
|
+
|
122
|
+
def Aes.encrypt_stream(keyl, mode, key, iv, sin = STDIN, sout = STDOUT)
|
123
|
+
Aes.init(keyl, mode, key, iv)
|
124
|
+
case sout
|
125
|
+
when String, Array, IO
|
126
|
+
else
|
127
|
+
raise "Bad output stream (String, Array, IO)"
|
128
|
+
end
|
129
|
+
case sin
|
130
|
+
when String
|
131
|
+
sout << @@aes.encrypt_buffer(sin)
|
132
|
+
when IO
|
133
|
+
while buf = sin.read(@@bs)
|
134
|
+
if buf.length == @@bs
|
135
|
+
sout << @@aes.encrypt_blocks(buf)
|
136
|
+
else
|
137
|
+
sout << @@aes.encrypt_buffer(buf)
|
138
|
+
end
|
139
|
+
end
|
140
|
+
else
|
141
|
+
raise "Bad input stream (String, IO)"
|
142
|
+
end
|
143
|
+
end
|
144
|
+
|
145
|
+
def Aes.decrypt_stream(keyl, mode, key, iv, sin = STDIN, sout = STDOUT)
|
146
|
+
Aes.init(keyl, mode, key, iv)
|
147
|
+
case sout
|
148
|
+
when String, Array, IO
|
149
|
+
else
|
150
|
+
raise "Bad output stream (String, Array, IO)"
|
151
|
+
end
|
152
|
+
case sin
|
153
|
+
when String
|
154
|
+
sout << @@aes.decrypt_buffer(sin)
|
155
|
+
when IO
|
156
|
+
while buf = sin.read(@@bs)#+1)
|
157
|
+
if buf.length == @@bs
|
158
|
+
sout << @@aes.decrypt_blocks(buf)
|
159
|
+
else
|
160
|
+
sout << @@aes.decrypt_buffer(buf)
|
161
|
+
end
|
162
|
+
end
|
163
|
+
else
|
164
|
+
raise "Bad input stream (String, IO)"
|
165
|
+
end
|
166
|
+
end
|
167
|
+
|
168
|
+
end # end Aes
|