Chilkat HOME .NET Core C# Android™ AutoIt C C# C++ Chilkat2-Python CkPython Classic ASP DataFlex Delphi ActiveX Delphi DLL Go Java Lianja Mono C# Node.js Objective-C PHP ActiveX PHP Extension Perl PowerBuilder PowerShell PureBasic Ruby SQL Server Swift 2 Swift 3,4,5... Tcl Unicode C Unicode C++ VB.NET VBScript Visual Basic 6.0 Visual FoxPro Xojo Plugin
(Unicode C) AES and CHACHA20 Encrypt/Decrypt TextDemonstrates the use of the new EncryptSb and DecryptSb methods introduced in Chilkat v9.5.0.67 to encrypt/decrypt the contents of StringBuilder objects. Note: This example requires Chilkat v9.5.0.67 or greater.
#include <C_CkStringBuilderW.h> #include <C_CkCrypt2W.h> #include <C_CkBinDataW.h> void ChilkatSample(void) { BOOL success; HCkStringBuilderW sb; int i; HCkCrypt2W crypt; const wchar_t *ivHex; const wchar_t *keyHex; HCkBinDataW bdEncrypted; HCkStringBuilderW sbOriginal; // This example assumes the Chilkat API to have been previously unlocked. // See Global Unlock Sample for sample code. // First build a string to be encrypted sb = CkStringBuilderW_Create(); i = 1; while (i < 10) { CkStringBuilderW_AppendInt(sb,i); CkStringBuilderW_Append(sb,L" the quick brown fox jumped over the lazy dog.\r\n"); i = i + 1; } wprintf(L"%s\n",CkStringBuilderW_getAsString(sb)); // The string to be encrypted looks like this: // 1 the quick brown fox jumped over the lazy dog. // 2 the quick brown fox jumped over the lazy dog. // 3 the quick brown fox jumped over the lazy dog. // 4 the quick brown fox jumped over the lazy dog. // 5 the quick brown fox jumped over the lazy dog. // 6 the quick brown fox jumped over the lazy dog. // ... crypt = CkCrypt2W_Create(); // Specify the encryption to be used. // First we'll do AES-128 CBC CkCrypt2W_putCryptAlgorithm(crypt,L"aes"); CkCrypt2W_putCipherMode(crypt,L"cbc"); CkCrypt2W_putKeyLength(crypt,128); ivHex = L"000102030405060708090A0B0C0D0E0F"; CkCrypt2W_SetEncodedIV(crypt,ivHex,L"hex"); keyHex = L"000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F"; CkCrypt2W_SetEncodedKey(crypt,keyHex,L"hex"); // When EncryptSb is called, the contents of the source (sb) // remains unmodified. The encrypted bytes are written into bdEncrypted. // If bdEncrypted already contained data, it is replaced with the encrypted bytes. bdEncrypted = CkBinDataW_Create(); success = CkCrypt2W_EncryptSb(crypt,sb,bdEncrypted); if (success != TRUE) { wprintf(L"%s\n",CkCrypt2W_lastErrorText(crypt)); CkStringBuilderW_Dispose(sb); CkCrypt2W_Dispose(crypt); CkBinDataW_Dispose(bdEncrypted); return; } // Examine the encrypted bytes: wprintf(L"%s\n",CkBinDataW_getEncoded(bdEncrypted,L"base64_mime")); // Sample encrypted data: // 0DdNZ22ckMMJBiaKhAu3wUEfh16XW356NIUsDmNs/xwbHe/p1201OmpfzwXwKktkAefu2pckrBgC // df+1w8lRo+KAy5n5wlAgMGM/UrsVJsp0BmDPk1vaxKrmrGpSXOVCQs1n2+0atIs5YLiOG+Va3+Mi // EQNb4YK7bNMmvt0++irBxTiGnkx/RncfKwgkbBUpl2x7yV13MW6lapDT6Md0DKAMsTXFJYGeIdEf // g2uxDDQzI5gUOUHTMrXQ8paD/K76KKB9Jpp/kAM9z8g/d8KUmuphA7KI64d38xsgOmcITlbhlCQ2 // PDkcU6RRzX0FUTUSMgQukhy0jkLZEjHX9poKJD+iJTOkcQUC3OqR9hKhSrvIgJN4lxdR71MheOoQ // 2wmvRdq+agTWWh333Vmb6J6yDV79aSpnqEDrA8Ks7Xzciol0gve91+JtVJlJKjWwEzWEU8GxF7Q8 // eaWI70lsC5nTLGcbqgKu6gzkzHlHyHaE2FAQA/d5I2dvfsAYUQCza0Zdyw8mmTtHhlP2Tfxj1uPv // H4Q7BGuKnx3SWT2CnpbX4091w7KzLAztrbFBo/Tf9w8ZpgTK9k1ryfW9/xnk6rW6iQ== // Decrypt to restore back to the original: sbOriginal = CkStringBuilderW_Create(); success = CkCrypt2W_DecryptSb(crypt,bdEncrypted,sbOriginal); if (success != TRUE) { wprintf(L"%s\n",CkCrypt2W_lastErrorText(crypt)); CkStringBuilderW_Dispose(sb); CkCrypt2W_Dispose(crypt); CkBinDataW_Dispose(bdEncrypted); CkStringBuilderW_Dispose(sbOriginal); return; } // Examine the original data: wprintf(L"%s\n",CkStringBuilderW_getAsString(sbOriginal)); // ---------------------------------------------------------------------------------- // To do chacha20 encryption, just change the settings: CkCrypt2W_putCryptAlgorithm(crypt,L"chacha20"); CkCrypt2W_putKeyLength(crypt,256); // The initial count is the initial block counter for the chacha20 algorithm. // It can be any integer, but must be set to the same when decrypting. CkCrypt2W_putInitialCount(crypt,22); // EncryptSb completely replaces the contents of bdEncrypted. success = CkCrypt2W_EncryptSb(crypt,sb,bdEncrypted); // However.. DecryptSb appends the decrypted text to whatever may // have already existed within sbOriginal. success = CkCrypt2W_DecryptSb(crypt,bdEncrypted,sbOriginal); wprintf(L"----\n"); wprintf(L"The original data should be here twice. Once from the AES decrypt, and again from the chacha20 decrypt.\n"); wprintf(L"%s\n",CkStringBuilderW_getAsString(sbOriginal)); wprintf(L"Success.\n"); CkStringBuilderW_Dispose(sb); CkCrypt2W_Dispose(crypt); CkBinDataW_Dispose(bdEncrypted); CkStringBuilderW_Dispose(sbOriginal); } |
© 2000-2024 Chilkat Software, Inc. All Rights Reserved.