/python/hider.py

https://bitbucket.org/synic/hider · Python · 114 lines · 88 code · 25 blank · 1 comment · 18 complexity · 43a42cfcd60c101e73c7682560f07916 MD5 · raw file

  1. #!/usr/bin/env python
  2. from Crypto.Cipher import Blowfish
  3. from Crypto.Hash import SHA
  4. from Crypto import Random
  5. from optparse import OptionParser
  6. import sys
  7. import struct
  8. import os.path
  9. import os
  10. _MAGIC = bytearray([0, 2, 144, 4, 3, 4, 5, 6, 3, 12, 144, 134, 5, 6, 24, 2, 0, 3, 4, 3, 4, 3, 88, 4, 5])
  11. def check_file(f):
  12. h = open(f, 'r')
  13. test = h.read(len(_MAGIC))
  14. h.close()
  15. return test == _MAGIC
  16. def encrypt_file(inf, outf, password):
  17. infile = open(inf, 'r')
  18. outfile = open(outf, 'w')
  19. iv = Random.get_random_bytes(Blowfish.block_size)
  20. bf = Blowfish.new(SHA.new(password).hexdigest(), Blowfish.MODE_CBC, iv)
  21. filesize = os.path.getsize(inf)
  22. outfile.write(str(_MAGIC))
  23. outfile.write(struct.pack('<Q', filesize))
  24. outfile.write(iv)
  25. outfile.write(bf.encrypt(str(_MAGIC)))
  26. while True:
  27. chunk = infile.read(8192)
  28. if len(chunk) == 0:
  29. break
  30. elif len(chunk) % 16 != 0:
  31. chunk += ' ' * (16 - len(chunk) % 16)
  32. outfile.write(bf.encrypt(chunk))
  33. outfile.close()
  34. infile.close()
  35. def decrypt_file(inf, outf, password):
  36. infile = open(inf, 'r')
  37. outfile = open(outf, 'w')
  38. test = infile.read(len(_MAGIC))
  39. if test != _MAGIC:
  40. raise Exception("This is not an encrypted file")
  41. origsize = struct.unpack('<Q', infile.read(struct.calcsize('Q')))[0]
  42. iv = infile.read(Blowfish.block_size)
  43. bf = Blowfish.new(SHA.new(password).hexdigest(), Blowfish.MODE_CBC, iv)
  44. testdecrypt = bf.decrypt(infile.read(len(_MAGIC)))
  45. if testdecrypt != _MAGIC:
  46. raise Exception("Failure decrypting file.")
  47. while True:
  48. chunk = infile.read(8192)
  49. if len(chunk) == 0:
  50. break
  51. outfile.write(bf.decrypt(chunk))
  52. outfile.truncate(origsize)
  53. outfile.close()
  54. infile.close()
  55. def main():
  56. usage = "Usage: %prog [options] file"
  57. parser = OptionParser(usage)
  58. parser.add_option("-i", "--input", dest="infile")
  59. parser.add_option("-o", "--output", dest="outfile")
  60. (options, args) = parser.parse_args()
  61. if not options.infile:
  62. if len(args) != 1:
  63. parser.error("Incorrect number of arguments")
  64. infile = args[0]
  65. else:
  66. if args:
  67. parser.error("Incorrect number of arguments")
  68. infile = options.infile
  69. outfile = options.outfile
  70. if check_file(infile):
  71. print "File is to be decrypted."
  72. if not outfile: outfile = "%s.dec" % infile
  73. decrypt = True
  74. else:
  75. print "File is to be encrypted."
  76. if not outfile: outfile = "%s.enc" % infile
  77. decrypt = False
  78. os.system("stty -echo")
  79. print "Please enter your password: ",
  80. password = sys.stdin.readline().strip()
  81. os.system("stty echo")
  82. print ""
  83. if decrypt:
  84. decrypt_file(infile, outfile, password)
  85. else:
  86. encrypt_file(infile, outfile, password)
  87. print "Done.\n"
  88. if __name__ == '__main__':
  89. main()