Skip to content

Instantly share code, notes, and snippets.

@F483
Created May 23, 2016 11:43
Show Gist options
  • Star 1 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save F483/41e1a43f56846d7ac82422c2f3c30687 to your computer and use it in GitHub Desktop.
Save F483/41e1a43f56846d7ac82422c2f3c30687 to your computer and use it in GitHub Desktop.
openssl compatible encryption example
from hashlib import md5
from Crypto import Random
from Crypto.Cipher import AES
def _chr(i):
if isinstance(i, bytes):
return i # FIXME why is it mixed in python 2 ?
return chr(i).encode('utf-8')
def _derive_key_and_iv(password, salt, key_length, iv_length):
d = d_i = b''
while len(d) < key_length + iv_length:
d_i = md5(d_i + password + salt).digest()
d += d_i
return d[:key_length], d[key_length:key_length+iv_length]
def symmetric_encrypt(in_file, out_file, password, key_length=32):
""" OpenSSL compatible aes encryption.
Equivalent to `openssl aes-256-cbc -salt -in in_file -out out_file.enc`
Arguments:
in_file: Input file like object.
out_file: Output file like object.
password: Secure encryption password.
key_length: Key lenght.
Raises:
storjcore.sanitize.ValidationError: if input is invalid
Source:
http://stackoverflow.com/a/16761459
Added documentation, tests, input validation and ported to Python 3.
Example:
> from storjcore import encryptedio
> with open("in_file", 'rb') as fi, open("out_file.enc", 'wb') as fo:
> encryptedio.symmetric_encrypt(fi, fo, b"secure_password")
"""
assert(isinstance(password, bytes))
assert(isinstance(key_length, int))
# encrypet
bs = AES.block_size
salt = Random.new().read(bs - len(b'Salted__'))
key, iv = _derive_key_and_iv(password, salt, key_length, bs)
cipher = AES.new(key, AES.MODE_CBC, iv)
out_file.write(b'Salted__' + salt)
finished = False
while not finished:
chunk = in_file.read(1024 * bs)
if len(chunk) == 0 or len(chunk) % bs != 0:
padding_length = (bs - len(chunk) % bs) or bs
chunk += padding_length * _chr(padding_length)
finished = True
encrypted_chunk = cipher.encrypt(chunk)
out_file.write(encrypted_chunk)
def symmetric_decrypt(in_file, out_file, password, key_length=32):
""" OpenSSL compatible aes decryption.
Equivalent to `openssl aes-256-cbc -d -in in_file.enc -out out_file`
Arguments:
in_file: Input file like object.
out_file: Output file like object.
password: Secure encryption password.
key_length: Key lenght.
Raises:
storjcore.sanitize.ValidationError: if input is invalid
Source:
http://stackoverflow.com/a/16761459
Added documentation, tests, input validation and ported to Python 3.
Example:
> from storjcore import encryptedio
> with open("in_file.enc", 'rb') as fi, open("out_file", 'wb') as fo:
> encryptedio.symmetric_decrypt(fi, fo, b"secure_password")
"""
assert(isinstance(password, bytes))
assert(isinstance(key_length, int))
# decrypt
bs = AES.block_size
salt = in_file.read(bs)[len(b'Salted__'):]
key, iv = _derive_key_and_iv(password, salt, key_length, bs)
cipher = AES.new(key, AES.MODE_CBC, iv)
next_chunk = b''
finished = False
while not finished:
chunk, next_chunk = next_chunk, cipher.decrypt(in_file.read(1024 * bs))
if len(next_chunk) == 0:
padding_length = ord(_chr(chunk[-1]))
chunk = chunk[:-padding_length]
finished = True
out_file.write(chunk)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment