Add encrypt and decrypt functions
This commit is contained in:
131
common/encfuncs.h
Normal file
131
common/encfuncs.h
Normal file
@@ -0,0 +1,131 @@
|
||||
#pragma once
|
||||
|
||||
|
||||
// <20><><EFBFBD>ܺ<EFBFBD><DCBA><EFBFBD>
|
||||
inline void encrypt_v1(unsigned char* data, size_t length, unsigned char key) {
|
||||
for (size_t i = 0; i < length; i++) {
|
||||
if (i % 2 == 0) {
|
||||
data[i] = data[i] + key; // ż<><C5BC><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> key
|
||||
}
|
||||
else {
|
||||
data[i] = data[i] - key; // <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> key
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
// <20><><EFBFBD>ܺ<EFBFBD><DCBA><EFBFBD>
|
||||
inline void decrypt_v1(unsigned char* data, size_t length, unsigned char key) {
|
||||
for (size_t i = 0; i < length; i++) {
|
||||
if (i % 2 == 0) {
|
||||
data[i] = data[i] - key; // ż<><C5BC><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> key <20><>ԭ
|
||||
}
|
||||
else {
|
||||
data[i] = data[i] + key; // <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> key <20><>ԭ
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
// <20><><EFBFBD>ܺ<EFBFBD><DCBA><EFBFBD> - ʹ<><CAB9><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>λ<EFBFBD><CEBB>ת
|
||||
inline void encrypt_v2(unsigned char* data, size_t length, unsigned char key) {
|
||||
for (size_t i = 0; i < length; i++) {
|
||||
// ż<><C5BC><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>key<65><79><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ѭ<EFBFBD><D1AD><EFBFBD><EFBFBD>λ1λ
|
||||
// <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>key<65><79><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ѭ<EFBFBD><D1AD><EFBFBD><EFBFBD>λ1λ
|
||||
data[i] ^= key;
|
||||
if (i % 2 == 0) {
|
||||
data[i] = (data[i] << 1) | (data[i] >> 7); // <20><>ѭ<EFBFBD><D1AD><EFBFBD><EFBFBD>λ
|
||||
}
|
||||
else {
|
||||
data[i] = (data[i] >> 1) | (data[i] << 7); // <20><>ѭ<EFBFBD><D1AD><EFBFBD><EFBFBD>λ
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
// <20><><EFBFBD>ܺ<EFBFBD><DCBA><EFBFBD>
|
||||
inline void decrypt_v2(unsigned char* data, size_t length, unsigned char key) {
|
||||
for (size_t i = 0; i < length; i++) {
|
||||
// <20><><EFBFBD>ܵ<EFBFBD><DCB5><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
if (i % 2 == 0) {
|
||||
data[i] = (data[i] >> 1) | (data[i] << 7); // <20><>ѭ<EFBFBD><D1AD><EFBFBD><EFBFBD>λ<EFBFBD><CEBB>ԭ
|
||||
}
|
||||
else {
|
||||
data[i] = (data[i] << 1) | (data[i] >> 7); // <20><>ѭ<EFBFBD><D1AD><EFBFBD><EFBFBD>λ<EFBFBD><CEBB>ԭ
|
||||
}
|
||||
data[i] ^= key; // <20>ٴ<EFBFBD><D9B4><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ԭ
|
||||
}
|
||||
}
|
||||
|
||||
// <20><><EFBFBD>ܺ<EFBFBD><DCBA><EFBFBD> V3 - <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>key<65>Ķ<EFBFBD>̬<EFBFBD><CCAC><EFBFBD><EFBFBD>
|
||||
inline void encrypt_v3(unsigned char* data, size_t length, unsigned char key) {
|
||||
for (size_t i = 0; i < length; i++) {
|
||||
unsigned char dynamic_key = key + (i % 8); // <20><>̬<EFBFBD>仯<EFBFBD><E4BBAF>key<65><79><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
if (i % 3 == 0) {
|
||||
data[i] = (data[i] + dynamic_key) ^ dynamic_key; // <20>ӷ<EFBFBD> + <20><><EFBFBD><EFBFBD>
|
||||
}
|
||||
else if (i % 3 == 1) {
|
||||
data[i] = (data[i] ^ dynamic_key) - dynamic_key; // <20><><EFBFBD><EFBFBD> + <20><><EFBFBD><EFBFBD>
|
||||
}
|
||||
else {
|
||||
data[i] = ~(data[i] + dynamic_key); // ȡ<><C8A1> + <20>ӷ<EFBFBD>
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
// <20><><EFBFBD>ܺ<EFBFBD><DCBA><EFBFBD> V3
|
||||
inline void decrypt_v3(unsigned char* data, size_t length, unsigned char key) {
|
||||
for (size_t i = 0; i < length; i++) {
|
||||
unsigned char dynamic_key = key + (i % 8);
|
||||
if (i % 3 == 0) {
|
||||
data[i] = (data[i] ^ dynamic_key) - dynamic_key; // <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ټ<EFBFBD>
|
||||
}
|
||||
else if (i % 3 == 1) {
|
||||
data[i] = (data[i] + dynamic_key) ^ dynamic_key; // <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ȼ<EFBFBD><C8BC><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
}
|
||||
else {
|
||||
data[i] = ~data[i] - dynamic_key; // <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ȡ<EFBFBD><C8A1><EFBFBD>ټ<EFBFBD>
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
// <20><><EFBFBD>ܺ<EFBFBD><DCBA><EFBFBD> V4 - <20><><EFBFBD><EFBFBD>α<EFBFBD><CEB1><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>У<EFBFBD><D0A3><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͬ<EFBFBD><CDAC><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
inline void encrypt_v4(unsigned char* data, size_t length, unsigned char key) {
|
||||
unsigned char rand = key;
|
||||
for (size_t i = 0; i < length; i++) {
|
||||
rand = (rand * 13 + 17) % 256; // α<><CEB1><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ɣ<EFBFBD>LCG<43><47>
|
||||
data[i] ^= rand; // <20><>α<EFBFBD><CEB1><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
}
|
||||
}
|
||||
|
||||
// <20><><EFBFBD>ܺ<EFBFBD><DCBA><EFBFBD> V4<56><34><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ȫ<EFBFBD><C8AB>ͬ<EFBFBD><CDAC><EFBFBD><EFBFBD>Ϊ<EFBFBD><CEAA><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Է<EFBFBD><D4B7>ԣ<EFBFBD>
|
||||
inline void decrypt_v4(unsigned char* data, size_t length, unsigned char key) {
|
||||
encrypt_v4(data, length, key); // <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ܵĽ<DCB5><C4BD>ܾ<EFBFBD><DCBE><EFBFBD><EFBFBD><EFBFBD>ִ<EFBFBD><D6B4>һ<EFBFBD><D2BB>
|
||||
}
|
||||
|
||||
// <20><><EFBFBD>ܺ<EFBFBD><DCBA><EFBFBD> V5 - V5 <20>汾<EFBFBD><E6B1BE><EFBFBD><EFBFBD>̬<EFBFBD><CCAC>Կ<EFBFBD><D4BF><EFBFBD><EFBFBD> + <20><><EFBFBD><EFBFBD>λ<EFBFBD><CEBB><EFBFBD>㣩
|
||||
inline void encrypt_v5(unsigned char* data, size_t length, unsigned char key) {
|
||||
for (size_t i = 0; i < length; i++) {
|
||||
unsigned char dynamic_key = (key + i) ^ 0x55; // <20><>̬<EFBFBD><CCAC>Կ<EFBFBD><D4BF><EFBFBD><EFBFBD>
|
||||
data[i] = ((data[i] + dynamic_key) ^ (dynamic_key << 3)) + (i % 7);
|
||||
}
|
||||
}
|
||||
|
||||
// <20><><EFBFBD>ܺ<EFBFBD><DCBA><EFBFBD> V5
|
||||
inline void decrypt_v5(unsigned char* data, size_t length, unsigned char key) {
|
||||
for (size_t i = 0; i < length; i++) {
|
||||
unsigned char dynamic_key = (key + i) ^ 0x55;
|
||||
data[i] = (((data[i] - (i % 7)) ^ (dynamic_key << 3)) - dynamic_key);
|
||||
}
|
||||
}
|
||||
|
||||
// <20><><EFBFBD><EFBFBD>/<2F><><EFBFBD>ܺ<EFBFBD><DCBA><EFBFBD> V6<56><36><EFBFBD>Է<EFBFBD><D4B7>ԣ<EFBFBD> - V6 <20>汾<EFBFBD><E6B1BE>α<EFBFBD><CEB1><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> + <20>Է<EFBFBD><D4B7>Խ<EFBFBD><D4BD>ܣ<EFBFBD>
|
||||
inline void encrypt_v6(unsigned char* data, size_t length, unsigned char key) {
|
||||
unsigned char rand = key;
|
||||
for (size_t i = 0; i < length; i++) {
|
||||
rand = (rand * 31 + 17) % 256; // <20><><EFBFBD><EFBFBD>α<EFBFBD><CEB1><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
data[i] ^= rand + i; // <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ֵ̬
|
||||
}
|
||||
}
|
||||
|
||||
// <20><><EFBFBD>ܺ<EFBFBD><DCBA><EFBFBD> V6<56><36>ֱ<EFBFBD>ӵ<EFBFBD><D3B5><EFBFBD> encrypt_v6 <20><><EFBFBD>ɣ<EFBFBD>
|
||||
inline void decrypt_v6(unsigned char* data, size_t length, unsigned char key) {
|
||||
encrypt_v6(data, length, key); // <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Է<EFBFBD><D4B7><EFBFBD>
|
||||
}
|
||||
Reference in New Issue
Block a user