xref: /dragonfly/usr.bin/enigma/enigma.c (revision 1d1731fa)
1 /*
2  *	"enigma.c" is in file cbw.tar from
3  *	anonymous FTP host watmsg.waterloo.edu: pub/crypt/cbw.tar.Z
4  *
5  *	A one-rotor machine designed along the lines of Enigma
6  *	but considerably trivialized.
7  *
8  *	A public-domain replacement for the UNIX "crypt" command.
9  *
10  *	Upgraded to function properly on 64-bit machines.
11  *
12  * $FreeBSD: src/usr.bin/enigma/enigma.c,v 1.2.6.3 2001/08/01 23:51:34 obrien Exp $
13  * $DragonFly: src/usr.bin/enigma/enigma.c,v 1.3 2003/10/04 20:36:43 hmp Exp $
14  */
15 
16 #include <sys/types.h>
17 #include <sys/wait.h>
18 
19 #include <stdio.h>
20 #include <stdlib.h>
21 #include <string.h>
22 #include <unistd.h>
23 
24 #define MINUSKVAR "CrYpTkEy"
25 
26 #define ECHO 010
27 #define ROTORSZ 256
28 #define MASK 0377
29 char	t1[ROTORSZ];
30 char	t2[ROTORSZ];
31 char	t3[ROTORSZ];
32 char	deck[ROTORSZ];
33 char	buf[13];
34 
35 int	main(int, char *[]);
36 void	shuffle(char *);
37 void	setup(char *);
38 
39 void
40 setup(char *pw)
41 {
42 	int ic, i, k, temp, pf[2], pid;
43 	unsigned rnd;
44 	long seed;
45 
46 	strncpy(buf, pw, 8);
47 	while (*pw)
48 		*pw++ = '\0';
49 	buf[8] = buf[0];
50 	buf[9] = buf[1];
51 	pipe(pf);
52 	if ((pid=fork())==0) {
53 		close(0);
54 		close(1);
55 		dup(pf[0]);
56 		dup(pf[1]);
57 		execlp("makekey", "-", (char *)0);
58 		execl("/usr/libexec/makekey", "-", (char *)0);	/* BSDI */
59 		execl("/usr/lib/makekey", "-", (char *)0);
60 		execl("/usr/bin/makekey", "-", (char *)0);	/* IBM */
61 		execl("/lib/makekey", "-", (char *)0);
62 		perror("makekey");
63 		fprintf(stderr, "enigma: cannot execute 'makekey', aborting\n");
64 		exit(1);
65 	}
66 	write(pf[1], buf, 10);
67 	close(pf[1]);
68 	i=wait((int *)NULL);
69 	if (i<0) perror("enigma: wait");
70 	if (i!=pid) {
71 		fprintf(stderr, "enigma: expected pid %d, got pid %d\n", pid, i);
72 		exit(1);
73 	}
74 	if ((i=read(pf[0], buf, 13)) != 13) {
75 		fprintf(stderr, "enigma: cannot generate key, read %d\n",i);
76 		exit(1);
77 	}
78 	seed = 123;
79 	for (i=0; i<13; i++)
80 		seed = seed*buf[i] + i;
81 	for(i=0;i<ROTORSZ;i++) {
82 		t1[i] = i;
83 		deck[i] = i;
84 	}
85 	for(i=0;i<ROTORSZ;i++) {
86 		seed = 5*seed + buf[i%13];
87 		if( sizeof(long) > 4 )  {
88 			/* Force seed to stay in 32-bit signed math */
89 			if( seed & 0x80000000 )
90 				seed = seed | (-1L & ~0xFFFFFFFFL);
91 			else
92 				seed &= 0x7FFFFFFF;
93 		}
94 		rnd = seed % 65521;
95 		k = ROTORSZ-1 - i;
96 		ic = (rnd&MASK)%(k+1);
97 		rnd >>= 8;
98 		temp = t1[k];
99 		t1[k] = t1[ic];
100 		t1[ic] = temp;
101 		if(t3[k]!=0) continue;
102 		ic = (rnd&MASK) % k;
103 		while(t3[ic]!=0) ic = (ic+1) % k;
104 		t3[k] = ic;
105 		t3[ic] = k;
106 	}
107 	for(i=0;i<ROTORSZ;i++)
108 		t2[t1[i]&MASK] = i;
109 }
110 
111 int
112 main(int argc, char **argv)
113 {
114 	register int i, n1, n2, nr1, nr2;
115 	int secureflg = 0, kflag = 0;
116 	char *cp;
117 
118 	if (argc > 1 && argv[1][0] == '-') {
119 		if (argv[1][1] == 's') {
120 			argc--;
121 			argv++;
122 			secureflg = 1;
123 		} else if (argv[1][1] == 'k') {
124 			argc--;
125 			argv++;
126 			kflag = 1;
127 		}
128 	}
129 	if (kflag) {
130 		if ((cp = getenv(MINUSKVAR)) == NULL) {
131 			fprintf(stderr, "%s not set\n", MINUSKVAR);
132 			exit(1);
133 		}
134 		setup(cp);
135 	} else if (argc != 2) {
136 		setup(getpass("Enter key:"));
137 	}
138 	else
139 		setup(argv[1]);
140 	n1 = 0;
141 	n2 = 0;
142 	nr2 = 0;
143 
144 	while((i=getchar()) != -1) {
145 		if (secureflg) {
146 			nr1 = deck[n1]&MASK;
147 			nr2 = deck[nr1]&MASK;
148 		} else {
149 			nr1 = n1;
150 		}
151 		i = t2[(t3[(t1[(i+nr1)&MASK]+nr2)&MASK]-nr2)&MASK]-nr1;
152 		putchar(i);
153 		n1++;
154 		if(n1==ROTORSZ) {
155 			n1 = 0;
156 			n2++;
157 			if(n2==ROTORSZ) n2 = 0;
158 			if (secureflg) {
159 				shuffle(deck);
160 			} else {
161 				nr2 = n2;
162 			}
163 		}
164 	}
165 
166 	return 0;
167 }
168 
169 void
170 shuffle(char *deckary)
171 {
172 	int i, ic, k, temp;
173 	unsigned rnd;
174 	static long seed = 123;
175 
176 	for(i=0;i<ROTORSZ;i++) {
177 		seed = 5*seed + buf[i%13];
178 		rnd = seed % 65521;
179 		k = ROTORSZ-1 - i;
180 		ic = (rnd&MASK)%(k+1);
181 		temp = deckary[k];
182 		deckary[k] = deckary[ic];
183 		deckary[ic] = temp;
184 	}
185 }
186