1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
|
# -*- coding: utf-8 -*-
import hashlib
import struct
from foreign.client_handling.lazagne.config.crypto.pyaes.aes import AESModeOfOperationECB, AESModeOfOperationCBC
from foreign.client_handling.lazagne.config.winstructure import char_to_int
AES_BLOCK_SIZE = 16
def sha256(s):
"""Return SHA256 digest of the string `s`."""
return hashlib.sha256(s).digest()
def transform_key(key, seed, rounds):
"""Transform `key` with `seed` `rounds` times using AES ECB."""
# create transform cipher with transform seed
cipher = AESModeOfOperationECB(seed)
# transform composite key rounds times
for n in range(0, rounds):
key = b"".join([cipher.encrypt(key[i:i + AES_BLOCK_SIZE]) for i in range(0, len(key), AES_BLOCK_SIZE)])
# return hash of transformed key
return sha256(key)
def aes_cbc_decrypt(data, key, enc_iv):
"""Decrypt and return `data` with AES CBC."""
cipher = AESModeOfOperationCBC(key, iv=enc_iv)
return b"".join([cipher.decrypt(data[i:i + AES_BLOCK_SIZE]) for i in range(0, len(data), AES_BLOCK_SIZE)])
def aes_cbc_encrypt(data, key, enc_iv):
cipher = AESModeOfOperationCBC(key, iv=enc_iv)
return b"".join([cipher.encrypt(data[i:i + AES_BLOCK_SIZE]) for i in range(0, len(data), AES_BLOCK_SIZE)])
def unpad(data):
extra = char_to_int(data[-1])
return data[:len(data) - extra]
def pad(s):
n = AES_BLOCK_SIZE - len(s) % AES_BLOCK_SIZE
return s + n * struct.pack('b', n)
def xor(aa, bb):
"""Return a bytearray of a bytewise XOR of `aa` and `bb`."""
result = bytearray()
for a, b in zip(bytearray(aa), bytearray(bb)):
result.append(a ^ b)
return result
|