I was wondering about this myself recently, more out of idle curiosity
than any serious need for it. I took a look at their source code and
made a quick attempt to implement it in crypto++ with no success. I
didn't dig very hard, but it looks like they might be doing something
odd with the initial setup of the key schedule. (Their key derivation
is decidedly non-standard but easy to implement. I did confirm in the
debugger that that wasn't the problem.)

The source code to vim is available, and the crypto there doesn't
appear to have any really hairy dependencies on the rest of the
codebase. I think it'd be quicker to rip that out and use it than to
figure out what the incompatibility is, provided the vim license is
acceptable to you.

But the short answer is that I can't point you to such a code snippet
and based on my quick look last week, I'd be surprised if anyone else
can, unless I was just making a stupid mistake. (Totally possible... I
only took a quick look.)

Geoff

On Mon, Apr 11, 2011 at 16:17, diyu01 <[email protected]> wrote:
> Hi, I have a file created by "vim -x ..." My vim is version 7.3 and it
> says it uses blowfish algorithm to encrypt the file. Can anyone kindly
> point me to a code snippet that will allow me to read out the
> decrypted file contents when I have access to the password? Thank you!
>
> --
> You received this message because you are subscribed to the "Crypto++ Users" 
> Google Group.
> To unsubscribe, send an email to [email protected].
> More information about Crypto++ and this group is available at 
> http://www.cryptopp.com.

-- 
You received this message because you are subscribed to the "Crypto++ Users" 
Google Group.
To unsubscribe, send an email to [email protected].
More information about Crypto++ and this group is available at 
http://www.cryptopp.com.

Reply via email to