I was wondering about this myself recently, more out of idle curiosity than any serious need for it. I took a look at their source code and made a quick attempt to implement it in crypto++ with no success. I didn't dig very hard, but it looks like they might be doing something odd with the initial setup of the key schedule. (Their key derivation is decidedly non-standard but easy to implement. I did confirm in the debugger that that wasn't the problem.)
The source code to vim is available, and the crypto there doesn't appear to have any really hairy dependencies on the rest of the codebase. I think it'd be quicker to rip that out and use it than to figure out what the incompatibility is, provided the vim license is acceptable to you. But the short answer is that I can't point you to such a code snippet and based on my quick look last week, I'd be surprised if anyone else can, unless I was just making a stupid mistake. (Totally possible... I only took a quick look.) Geoff On Mon, Apr 11, 2011 at 16:17, diyu01 <[email protected]> wrote: > Hi, I have a file created by "vim -x ..." My vim is version 7.3 and it > says it uses blowfish algorithm to encrypt the file. Can anyone kindly > point me to a code snippet that will allow me to read out the > decrypted file contents when I have access to the password? Thank you! > > -- > You received this message because you are subscribed to the "Crypto++ Users" > Google Group. > To unsubscribe, send an email to [email protected]. > More information about Crypto++ and this group is available at > http://www.cryptopp.com. -- You received this message because you are subscribed to the "Crypto++ Users" Google Group. To unsubscribe, send an email to [email protected]. More information about Crypto++ and this group is available at http://www.cryptopp.com.
