/rednotebook/encrypt.py

https://github.com/tomka/rednotebook · Python · 96 lines · 40 code · 21 blank · 35 comment · 6 complexity · d6e08dcc17ea07f9c86421fa33994553 MD5 · raw file

  1. # -*- coding: utf-8 -*-
  2. # -----------------------------------------------------------------------
  3. # Copyright (c) 2009 Jendrik Seipp
  4. #
  5. # RedNotebook is free software; you can redistribute it and/or modify
  6. # it under the terms of the GNU General Public License as published by
  7. # the Free Software Foundation; either version 2 of the License, or
  8. # (at your option) any later version.
  9. #
  10. # RedNotebook is distributed in the hope that it will be useful,
  11. # but WITHOUT ANY WARRANTY; without even the implied warranty of
  12. # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  13. # GNU General Public License for more details.
  14. #
  15. # You should have received a copy of the GNU General Public License along
  16. # with RedNotebook; if not, write to the Free Software Foundation, Inc.,
  17. # 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
  18. # -----------------------------------------------------------------------
  19. try:
  20. from Crypto.Cipher import Blowfish
  21. except ImportError, err:
  22. Blowfish = None
  23. import base64
  24. # the block size for the cipher object; must be 8 for AES
  25. BLOCK_SIZE = 8
  26. # ----------------------------------------------------------------------
  27. #
  28. # Private functions
  29. # Public domain code from http://idsvandermolen.com/codefiles/crypto.py
  30. def nr_pad_bytes(blocksize, size):
  31. 'Return number of required pad bytes for block of size.'
  32. if not (0 < blocksize < 255):
  33. raise Error('blocksize must be between 0 and 255')
  34. return blocksize - (size % blocksize)
  35. def append_padding(blocksize, s):
  36. '''Append rfc 1423 padding to string.
  37. RFC 1423 algorithm adds 1 up to blocksize padding bytes to string s. Each
  38. padding byte contains the number of padding bytes.
  39. '''
  40. n = nr_pad_bytes(blocksize, len(s))
  41. return s + (chr(n) * n)
  42. def remove_padding(blocksize, s):
  43. 'Remove rfc 1423 padding from string.'
  44. n = ord(s[-1]) # last byte contains number of padding bytes
  45. if n > blocksize or n > len(s):
  46. raise Error('invalid padding')
  47. return s[:-n]
  48. # ----------------------------------------------------------------------
  49. def encrypt_blowfish(cipher, string):
  50. string = append_padding(BLOCK_SIZE, string)
  51. return base64.b64encode(cipher.encrypt(string))
  52. def decrypt_blowfish(cipher, encoded_string):
  53. dec_string = cipher.decrypt(base64.b64decode(encoded_string))
  54. return remove_padding(BLOCK_SIZE, dec_string)
  55. # ----------------------------------------------------------------------
  56. #
  57. # Public functions
  58. def encrypt(text, password):
  59. cipher = Blowfish.new(password)
  60. return encrypt_blowfish(cipher, text)
  61. def decrypt(enc_text, password):
  62. cipher = Blowfish.new(password)
  63. return decrypt_blowfish(cipher, enc_text)
  64. # ----------------------------------------------------------------------
  65. #
  66. # Testing
  67. if __name__ == '__main__':
  68. secret_text = 'secret text\nwith üni¢ödé'
  69. password = 'password'
  70. enc_string = encrypt(secret_text, password)
  71. print 'Encrypted string:', enc_string
  72. dec_string = decrypt(enc_string, password)
  73. print 'Decrypted string:', dec_string
  74. assert secret_text == dec_string