/pvi.py

https://bitbucket.org/synic/pvi · Python · 140 lines · 96 code · 25 blank · 19 comment · 22 complexity · f01cbe763db9b6e41b747b761f776906 MD5 · raw file

  1. #!/usr/bin/env python
  2. # Copyright (C) 2006 Adam Olsen
  3. #
  4. # This program is free software; you can redistribute it and/or modify
  5. # it under the terms of the GNU General Public License as published by
  6. # the Free Software Foundation; either version 1, or (at your option)
  7. # any later version.
  8. #
  9. # This program is distributed in the hope that it will be useful,
  10. # but WITHOUT ANY WARRANTY; without even the implied warranty of
  11. # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  12. # GNU General Public License for more details.
  13. #
  14. # You should have received a copy of the GNU General Public License
  15. # along with this program; if not, write to the Free Software
  16. # Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
  17. import sys, os, re, tempfile, getpass, sha
  18. import time
  19. from Crypto.Cipher import Blowfish
  20. import subprocess
  21. def scanfile(file):
  22. data = open(file).read()
  23. reg = re.compile(r'"""## ENC START ' + r'##\n*(.*)\n*## ENC END ##"""',
  24. re.DOTALL|re.MULTILINE)
  25. m = reg.search(data)
  26. if not m or not m.group(1): return ""
  27. else: return m.group(1)
  28. def encrypt(data, key):
  29. outstring = ""
  30. data = "_encrypted_" + data
  31. padding = 8 - len(data) % 8
  32. iv = sha.new(str(time.time())).hexdigest()[:8]
  33. enc = Blowfish.new(key, Blowfish.MODE_CBC, iv)
  34. data += "X" * padding
  35. data = enc.encrypt(data)
  36. outstring = "%s%d%s" % (iv, padding, data.encode('base64'))
  37. return outstring
  38. def decrypt(data, key):
  39. iv = data[:8]
  40. padding = int(data[8:9])
  41. data = data[9:].decode('base64')
  42. enc = Blowfish.new(key, Blowfish.MODE_CBC, iv)
  43. data = enc.decrypt(data)
  44. data = data[:-padding]
  45. if not data.startswith('_encrypted_'):
  46. raise Exception("Decryption failed!")
  47. else:
  48. data = data.replace('_encrypted_', '')
  49. return data
  50. (handle, tmp) = tempfile.mkstemp()
  51. filedata = scanfile(__file__)
  52. if not filedata:
  53. print "This is a new file."
  54. ok = False
  55. while not ok:
  56. password = getpass.getpass("Enter the new password: ")
  57. verify = getpass.getpass("Verify the password: ")
  58. if password != verify:
  59. print "Password and verification did not match."
  60. else:
  61. ok = True
  62. else:
  63. password = getpass.getpass("Enter the password: ")
  64. try:
  65. data = decrypt(filedata, password)
  66. except:
  67. print "Decryption failed."
  68. sys.exit(1)
  69. h = open(tmp, 'w')
  70. h.write(data)
  71. h.close()
  72. editor = os.getenv('EDITOR')
  73. if not editor:
  74. editor = 'vi'
  75. retval = subprocess.call([editor, tmp])
  76. if retval != 0:
  77. print "Error running editor"
  78. os.unlink(tmp)
  79. sys.exit(1)
  80. data = open(tmp).read()
  81. os.unlink(tmp)
  82. clearfile = False
  83. if data.strip() == '':
  84. clearfile = True
  85. ## find out if they want to change the password
  86. if data.find('__changepass__') > -1:
  87. data = data.replace('__changepass__', '')
  88. ok = False
  89. while not ok:
  90. password = getpass.getpass("Enter the new password: ")
  91. verify = getpass.getpass("Verify the password: ")
  92. if password != verify:
  93. print "Password and verification did not match."
  94. else:
  95. ok = True
  96. data = encrypt(data, password)
  97. lines = open(__file__).readlines()
  98. h = open(__file__, 'w')
  99. found = False
  100. for line in lines:
  101. if line.startswith('"""## ENC START'):
  102. found = True
  103. h.write(line)
  104. break
  105. h.write(line)
  106. if not found:
  107. h.write('"""## ENC' + ' START ##\n')
  108. if clearfile:
  109. data = ''
  110. print "Resetting file..."
  111. h.write('\n%s\n## ENC END ##"""' % data)
  112. h.close()
  113. print "Done.\n"
  114. """## ENC START ##
  115. ## ENC END ##"""