# =================================================================== # # Copyright (c) 2019, Legrandin <helderijs@gmail.com> # All rights reserved. # # Redistribution and use in source and binary forms, with or without # modification, are permitted provided that the following conditions # are met: # # 1. Redistributions of source code must retain the above copyright # notice, this list of conditions and the following disclaimer. # 2. Redistributions in binary form must reproduce the above copyright # notice, this list of conditions and the following disclaimer in # the documentation and/or other materials provided with the # distribution. # # THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS # "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT # LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS # FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE # COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, # INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, # BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; # LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER # CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT # LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN # ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE # POSSIBILITY OF SUCH DAMAGE. # =================================================================== import sys from Crypto.Cipher import _create_cipher from Crypto.Util._raw_api import (load_pycryptodome_raw_lib, VoidPointer, SmartPointer, c_size_t, c_uint8_ptr, c_uint) _raw_blowfish_lib = load_pycryptodome_raw_lib( "Crypto.Cipher._raw_eksblowfish", """ int EKSBlowfish_start_operation(const uint8_t key[], size_t key_len, const uint8_t salt[16], size_t salt_len, unsigned cost, unsigned invert, void **pResult); int EKSBlowfish_encrypt(const void *state, const uint8_t *in, uint8_t *out, size_t data_len); int EKSBlowfish_decrypt(const void *state, const uint8_t *in, uint8_t *out, size_t data_len); int EKSBlowfish_stop_operation(void *state); """ ) def _create_base_cipher(dict_parameters): """This method instantiates and returns a smart pointer to a low-level base cipher. It will absorb named parameters in the process.""" try: key = dict_parameters.pop("key") salt = dict_parameters.pop("salt") cost = dict_parameters.pop("cost") except KeyError as e: raise TypeError("Missing EKSBlowfish parameter: " + str(e)) invert = dict_parameters.pop("invert", True) if len(key) not in key_size: raise ValueError("Incorrect EKSBlowfish key length (%d bytes)" % len(key)) start_operation = _raw_blowfish_lib.EKSBlowfish_start_operation stop_operation = _raw_blowfish_lib.EKSBlowfish_stop_operation void_p = VoidPointer() result = start_operation(c_uint8_ptr(key), c_size_t(len(key)), c_uint8_ptr(salt), c_size_t(len(salt)), c_uint(cost), c_uint(int(invert)), void_p.address_of()) if result: raise ValueError("Error %X while instantiating the EKSBlowfish cipher" % result) return SmartPointer(void_p.get(), stop_operation) def new(key, mode, salt, cost, invert): """Create a new EKSBlowfish cipher Args: key (bytes, bytearray, memoryview): The secret key to use in the symmetric cipher. Its length can vary from 0 to 72 bytes. mode (one of the supported ``MODE_*`` constants): The chaining mode to use for encryption or decryption. salt (bytes, bytearray, memoryview): The salt that bcrypt uses to thwart rainbow table attacks cost (integer): The complexity factor in bcrypt invert (bool): If ``False``, in the inner loop use ``ExpandKey`` first over the salt and then over the key, as defined in the `original bcrypt specification <https://www.usenix.org/legacy/events/usenix99/provos/provos_html/node4.html>`_. If ``True``, reverse the order, as in the first implementation of `bcrypt` in OpenBSD. :Return: an EKSBlowfish object """ kwargs = { 'salt':salt, 'cost':cost, 'invert':invert } return _create_cipher(sys.modules[__name__], key, mode, **kwargs) MODE_ECB = 1 # Size of a data block (in bytes) block_size = 8 # Size of a key (in bytes) key_size = range(0, 72 + 1)
Name | Type | Size | Permission | Actions |
---|---|---|---|---|
__pycache__ | Folder | 0755 |
|
|
AES.py | File | 8.71 KB | 0644 |
|
AES.pyi | File | 3.63 KB | 0644 |
|
ARC2.py | File | 6.85 KB | 0644 |
|
ARC2.pyi | File | 980 B | 0644 |
|
ARC4.py | File | 5 KB | 0644 |
|
ARC4.pyi | File | 413 B | 0644 |
|
Blowfish.py | File | 5.82 KB | 0644 |
|
Blowfish.pyi | File | 1016 B | 0644 |
|
CAST.py | File | 5.93 KB | 0644 |
|
CAST.pyi | File | 981 B | 0644 |
|
ChaCha20.py | File | 10.48 KB | 0644 |
|
ChaCha20.pyi | File | 788 B | 0644 |
|
ChaCha20_Poly1305.py | File | 11.29 KB | 0644 |
|
ChaCha20_Poly1305.pyi | File | 1.08 KB | 0644 |
|
DES.py | File | 5.81 KB | 0644 |
|
DES.pyi | File | 961 B | 0644 |
|
DES3.py | File | 6.76 KB | 0644 |
|
DES3.pyi | File | 1.01 KB | 0644 |
|
PKCS1_OAEP.py | File | 8.62 KB | 0644 |
|
PKCS1_OAEP.pyi | File | 1.15 KB | 0644 |
|
PKCS1_v1_5.py | File | 7.95 KB | 0644 |
|
PKCS1_v1_5.pyi | File | 686 B | 0644 |
|
Salsa20.py | File | 6.2 KB | 0644 |
|
Salsa20.pyi | File | 751 B | 0644 |
|
_ARC4.abi3.so | File | 20.52 KB | 0755 |
|
_EKSBlowfish.py | File | 5.08 KB | 0644 |
|
_EKSBlowfish.pyi | File | 266 B | 0644 |
|
_Salsa20.abi3.so | File | 26.38 KB | 0755 |
|
__init__.py | File | 2.78 KB | 0644 |
|
__init__.pyi | File | 0 B | 0644 |
|
_chacha20.abi3.so | File | 29.91 KB | 0755 |
|
_mode_cbc.py | File | 10.63 KB | 0644 |
|
_mode_cbc.pyi | File | 687 B | 0644 |
|
_mode_ccm.py | File | 23.8 KB | 0644 |
|
_mode_ccm.pyi | File | 1.56 KB | 0644 |
|
_mode_cfb.py | File | 10.47 KB | 0644 |
|
_mode_cfb.pyi | File | 727 B | 0644 |
|
_mode_ctr.py | File | 15.44 KB | 0644 |
|
_mode_ctr.pyi | File | 800 B | 0644 |
|
_mode_eax.py | File | 14.11 KB | 0644 |
|
_mode_eax.pyi | File | 1.51 KB | 0644 |
|
_mode_ecb.py | File | 8.11 KB | 0644 |
|
_mode_ecb.pyi | File | 592 B | 0644 |
|
_mode_gcm.py | File | 20.8 KB | 0644 |
|
_mode_gcm.pyi | File | 1.5 KB | 0644 |
|
_mode_ocb.py | File | 19.47 KB | 0644 |
|
_mode_ocb.pyi | File | 1.2 KB | 0644 |
|
_mode_ofb.py | File | 9.97 KB | 0644 |
|
_mode_ofb.pyi | File | 691 B | 0644 |
|
_mode_openpgp.py | File | 6.89 KB | 0644 |
|
_mode_openpgp.pyi | File | 556 B | 0644 |
|
_mode_siv.py | File | 13.65 KB | 0644 |
|
_mode_siv.pyi | File | 1.23 KB | 0644 |
|
_pkcs1_decode.abi3.so | File | 34.85 KB | 0755 |
|
_raw_aes.abi3.so | File | 104.3 KB | 0755 |
|
_raw_aesni.abi3.so | File | 103.89 KB | 0755 |
|
_raw_arc2.abi3.so | File | 45.38 KB | 0755 |
|
_raw_blowfish.abi3.so | File | 76.8 KB | 0755 |
|
_raw_cast.abi3.so | File | 56.06 KB | 0755 |
|
_raw_cbc.abi3.so | File | 22.46 KB | 0755 |
|
_raw_cfb.abi3.so | File | 26.23 KB | 0755 |
|
_raw_ctr.abi3.so | File | 30.6 KB | 0755 |
|
_raw_des.abi3.so | File | 69.88 KB | 0755 |
|
_raw_des3.abi3.so | File | 70.82 KB | 0755 |
|
_raw_ecb.abi3.so | File | 18.57 KB | 0755 |
|
_raw_eksblowfish.abi3.so | File | 176.95 KB | 0755 |
|
_raw_ocb.abi3.so | File | 44.78 KB | 0755 |
|
_raw_ofb.abi3.so | File | 21.61 KB | 0755 |
|