/src/rho/crypto.py

https://github.com/weshayutin/rho · Python · 147 lines · 120 code · 11 blank · 16 comment · 2 complexity · 74856bf6dac26f425caa167113622075 MD5 · raw file

  1. #
  2. # Copyright (c) 2009 Red Hat, Inc.
  3. #
  4. # This software is licensed to you under the GNU General Public License,
  5. # version 2 (GPLv2). There is NO WARRANTY for this software, express or
  6. # implied, including the implied warranties of MERCHANTABILITY or FITNESS
  7. # FOR A PARTICULAR PURPOSE. You should have received a copy of GPLv2
  8. # along with this software; if not, see
  9. # http://www.gnu.org/licenses/old-licenses/gpl-2.0.txt.
  10. #
  11. """ Configuration Encryption Module """
  12. import os.path
  13. # From the python-crypto package
  14. from Crypto.Cipher import Blowfish
  15. class BadKeyException(Exception):
  16. pass
  17. class NoSuchFileException(Exception):
  18. pass
  19. def pad(plaintext):
  20. """
  21. Pad the given plaintext such that it's length is a multiple of 8 bytes.
  22. Padding bytes will be equal to the number of padding bytes that are
  23. required. (i.e. if the string requires 2 padding bytes, those two bytes
  24. will have the value of 0x02)
  25. For more information on why this is done:
  26. http://www.di-mgt.com.au/cryptopad.html
  27. """
  28. # Only works on strings, need to throw exception if for instance we get a unicode
  29. if type(plaintext) != type(''):
  30. raise Exception("Can only pad strings.")
  31. return_me = plaintext
  32. if len(return_me) % 8 != 0:
  33. padding_needed = 8 - (len(return_me) % 8)
  34. return_me = return_me + str(padding_needed) * padding_needed
  35. return return_me
  36. def unpad(plaintext):
  37. """
  38. Remove any padding present on this decrypted string.
  39. There is a known problem here, where if the original string did not
  40. require padding, but ended with a string like "7777777" or "333", we
  41. cannot tell if that string is padded or was like that to begin with.
  42. In this method we have to assume it's padded and chop them off, but this
  43. is basically a non-issue as we'll only ever be encrypting/decrypting XML
  44. or JSON here, which will never end with integer sequences.
  45. """
  46. # Only works on strings, need to throw exception if for instance we get a unicode
  47. if type(plaintext) != type(''):
  48. raise Exception("Can only pad strings.")
  49. if len(plaintext) % 8 != 0:
  50. raise Exception("String length not a multiple of 8")
  51. return_me = plaintext
  52. if plaintext[-1] in ['1', '2', '3', '4', '5', '6', '7']:
  53. # Indicates there could be padding involved:
  54. chop_count = int(plaintext[-1])
  55. chopped_bytes = plaintext[-chop_count]
  56. # If this is padding, all bytes chopped should equal the count:
  57. all_bytes_match = True
  58. for c in chopped_bytes:
  59. if c != plaintext[-1]:
  60. all_bytes_match = False
  61. break
  62. if all_bytes_match:
  63. chop_to = len(plaintext) - chop_count
  64. return_me = plaintext[0:chop_to]
  65. return return_me
  66. def encrypt(plaintext, key):
  67. """
  68. Encrypt the plaintext using the given key.
  69. Uses the Blowfish algorithm. Plaintext will be padded if required.
  70. """
  71. obj = Blowfish.new(key, Blowfish.MODE_CBC)
  72. plaintext = pad(plaintext)
  73. ciphertext = obj.encrypt(plaintext)
  74. return ciphertext
  75. def decrypt(ciphertext, key):
  76. """
  77. Decrypt the ciphertext with the given key.
  78. Uses the Blowfish algorithm. Padding bytes (if present) will be removed.
  79. """
  80. obj = Blowfish.new(key, Blowfish.MODE_CBC)
  81. decrypted_plaintext = obj.decrypt(ciphertext)
  82. return_me = unpad(decrypted_plaintext)
  83. # TODO: is there a way to know decryption failed?
  84. #if return_me is None:
  85. # # Looks like decryption failed, probably a bad key:
  86. # raise BadKeyException
  87. return return_me
  88. def write_file(filename, plaintext, key):
  89. """
  90. Encrypt plaintext with the given key and write to file.
  91. Existing file will be overwritten so be careful.
  92. """
  93. f = open(filename, 'w')
  94. f.write(encrypt(plaintext, key))
  95. f.close()
  96. def read_file(filename, key):
  97. """
  98. Decrypt contents of file with the given key, and return as a string.
  99. Assume that we're reading files that we encrypted. (i.e. we're not trying
  100. to read files encrypted manually with gpg)
  101. """
  102. if not os.path.exists(filename):
  103. raise NoSuchFileException()
  104. f = open(filename, 'r')
  105. return_me = decrypt(f.read(), key)
  106. f.close()
  107. return return_me