void encrypt(char block[64], int edflag);
#define _XOPEN_SOURCE
/* See feature_test_macros(7)
*/
#include <stdlib.h>
void setkey(const char *key);
#define _GNU_SOURCE
/* See feature_test_macros(7)
*/
#include <crypt.h>
void setkey_r(const char *key, struct crypt_data *data);
void encrypt_r(char *block, int edflag ", struct crypt_data *" data );
Each of these requires linking with -lcrypt.
The encrypt() function modifies the passed buffer, encoding if edflag is 0, and decoding if 1 is being passed. Like the key argument, also block is a bit vector representation of the actual value that is encoded. The result is returned in that same vector.
These two functions
are not reentrant, that is, the key data is kept in static storage. The
functions setkey_r() and encrypt_r() are the reentrant versions. They use
the following structure to hold the key data:
struct crypt_data { char keysched[16 * 8]; char sb0[32768]; char sb1[32768]; char sb2[32768]; char sb3[32768]; char crypt_3_buf[14]; char current_salt[2]; long int current_saltbits; int direction; int initialized; };
Before calling setkey_r() set data->initialized to zero.
The encrypt_r() and setkey_r() functions are thread-safe.
#define _XOPEN_SOURCE #include <unistd.h> #include <stdlib.h> int main(void) { char key[64]; /* bit pattern for key */ char txt[64]; /* bit pattern for messages */ setkey(key); encrypt(txt, 0); /* encode */ encrypt(txt, 1); /* decode */ }