Python pyaes.Decrypter() Examples
The following are 11
code examples of pyaes.Decrypter().
You can vote up the ones you like or vote down the ones you don't like,
and go to the original project or source file by following the links above each example.
You may also want to check out all available functions/classes of the module
pyaes
, or try the search function
.
Example #1
Source File: client.py From script.module.openscrapers with GNU General Public License v3.0 | 6 votes |
def _decrypt(self, msg, key, iv): from binascii import unhexlify, hexlify import pyaes msg = unhexlify(msg) key = unhexlify(key) iv = unhexlify(iv) if len(iv) != 16: return False decrypter = pyaes.Decrypter(pyaes.AESModeOfOperationCBC(key, iv)) plain_text = decrypter.feed(msg) plain_text += decrypter.feed() f = hexlify(plain_text) return f
Example #2
Source File: convert_old_wallet.py From joinmarket-clientserver with GNU General Public License v3.0 | 6 votes |
def decrypt_data(key, data): decrypter = Decrypter(AESModeOfOperationCBC(key, iv=data[:16])) plain = decrypter.feed(data[16:]) plain += decrypter.feed() return plain
Example #3
Source File: common.py From filmkodi with Apache License 2.0 | 6 votes |
def decrypt_py(cipher_text, key): if cipher_text: try: scraper_key = hashlib.sha256(key).digest() IV = '\0' * 16 decrypter = pyaes.Decrypter(pyaes.AESModeOfOperationCBC(scraper_key, IV)) plain_text = decrypter.feed(cipher_text) plain_text += decrypter.feed() if 'import' not in plain_text: plain_text = '' except Exception as e: log_utils.log_warning('Exception during Py Decrypt: %s' % (e)) plain_text = '' else: plain_text = '' return plain_text
Example #4
Source File: __init__.py From browser_cookie3 with GNU Lesser General Public License v3.0 | 5 votes |
def _decrypt(self, value, encrypted_value): """Decrypt encoded cookies """ if sys.platform == 'win32': try: return self._decrypt_windows_chrome(value, encrypted_value) # Fix for change in Chrome 80 except RuntimeError: # Failed to decrypt the cipher text with DPAPI if not self.key: raise RuntimeError( 'Failed to decrypt the cipher text with DPAPI and no AES key.') # Encrypted cookies should be prefixed with 'v10' according to the # Chromium code. Strip it off. encrypted_value = encrypted_value[3:] nonce, tag = encrypted_value[:12], encrypted_value[-16:] aes = AES.new(self.key, AES.MODE_GCM, nonce=nonce) data = aes.decrypt_and_verify(encrypted_value[12:-16], tag) return data.decode() if value or (encrypted_value[:3] not in [b'v11', b'v10']): return value # Encrypted cookies should be prefixed with 'v10' according to the # Chromium code. Strip it off. encrypted_value = encrypted_value[3:] encrypted_value_half_len = int(len(encrypted_value) / 2) cipher = pyaes.Decrypter( pyaes.AESModeOfOperationCBC(self.key, self.iv)) decrypted = cipher.feed(encrypted_value[:encrypted_value_half_len]) decrypted += cipher.feed(encrypted_value[encrypted_value_half_len:]) decrypted += cipher.feed() return decrypted.decode("utf-8")
Example #5
Source File: utils.py From tcex with Apache License 2.0 | 5 votes |
def decrypt_aes_cbc(key, ciphertext, iv=None): """Return AES CBC decrypted string. Args: key (bytes): The encryption key. ciphertext (bytes): The ciphertext to decrypt. iv (bytes, optional): The CBC initial vector. Returns: bytes: The encoded string. """ iv = iv or b'\0' * 16 # ensure key is bytes if isinstance(key, str): key = key.encode() # ensure plaintext is bytes if isinstance(ciphertext, str): ciphertext = ciphertext.encode() # ensure iv is bytes if isinstance(iv, str): iv = iv.encode() aes_cbc_decrypt = pyaes.Decrypter(pyaes.AESModeOfOperationCBC(key, iv=iv)) decrypted = aes_cbc_decrypt.feed(ciphertext) decrypted += aes_cbc_decrypt.feed() return decrypted
Example #6
Source File: mtprotoproxy.py From mtprotoproxy with MIT License | 5 votes |
def use_slow_bundled_cryptography_module(): import pyaes msg = "To make the program a *lot* faster, please install cryptography module: " msg += "pip install cryptography\n" print(msg, flush=True, file=sys.stderr) class BundledEncryptorAdapter: __slots__ = ('mode', ) def __init__(self, mode): self.mode = mode def encrypt(self, data): encrypter = pyaes.Encrypter(self.mode, pyaes.PADDING_NONE) return encrypter.feed(data) + encrypter.feed() def decrypt(self, data): decrypter = pyaes.Decrypter(self.mode, pyaes.PADDING_NONE) return decrypter.feed(data) + decrypter.feed() def create_aes_ctr(key, iv): ctr = pyaes.Counter(iv) return pyaes.AESModeOfOperationCTR(key, ctr) def create_aes_cbc(key, iv): mode = pyaes.AESModeOfOperationCBC(key, iv) return BundledEncryptorAdapter(mode) return create_aes_ctr, create_aes_cbc
Example #7
Source File: test-blockfeeder.py From pyaes with MIT License | 5 votes |
def TestIssue15(): print('Issue #15') key = b"abcdefghijklmnop" iv = b"0123456789012345" encrypter = pyaes.Encrypter(pyaes.AESModeOfOperationCBC(key, iv)) plaintext = b"Hello World!!!!!" ciphertext = to_bufferable('') ciphertext += encrypter.feed(plaintext) ciphertext += encrypter.feed('') ciphertext += encrypter.feed(plaintext) ciphertext += encrypter.feed(None) expected = b'(Ob\xe5\xae"\xdc\xb0\x84\xc5\x04\x04GQ\xd8.\x0e4\xd2b\xc1\x15\xe5\x11M\xfc\x9a\xd2\xd5\xc8xP\x00[\xd57\x92\x01\xbb\xc42\x18\xbc\xbf\x1ay\x19P' decrypter = pyaes.Decrypter(pyaes.AESModeOfOperationCBC(key, iv)) output = to_bufferable('') output += decrypter.feed('') output += decrypter.feed(ciphertext) output += decrypter.feed('') output += decrypter.feed(None) print(" passed=%(passed)s" % dict(passed = (ciphertext == expected and output == (plaintext + plaintext))))
Example #8
Source File: digitalbitbox.py From HWI with MIT License | 5 votes |
def aes_decrypt_with_iv(key, iv, data): aes_cbc = pyaes.AESModeOfOperationCBC(key, iv=iv) aes = pyaes.Decrypter(aes_cbc) s = aes.feed(data) + aes.feed() # empty aes.feed() strips pkcs padding return s
Example #9
Source File: storage.py From joinmarket-clientserver with GNU General Public License v3.0 | 5 votes |
def _decrypt(self, data, iv): decrypter = pyaes.Decrypter( pyaes.AESModeOfOperationCBC(self._hash.hash, iv=native(iv))) try: dec_data = decrypter.feed(data) dec_data += decrypter.feed() except ValueError: # in most "wrong password" cases the pkcs7 padding will be wrong raise StoragePasswordError("Wrong password.") if not dec_data.startswith(self.MAGIC_DETECT_ENC): raise StoragePasswordError("Wrong password.") return dec_data[len(self.MAGIC_DETECT_ENC):]
Example #10
Source File: client.py From filmkodi with Apache License 2.0 | 5 votes |
def _decrypt(self, msg, key, iv): from binascii import unhexlify, hexlify import pyaes msg = unhexlify(msg) key = unhexlify(key) iv = unhexlify(iv) if len(iv) != 16: return False decrypter = pyaes.Decrypter(pyaes.AESModeOfOperationCBC(key, iv)) plain_text = decrypter.feed(msg) plain_text += decrypter.feed() f = hexlify(plain_text) return f
Example #11
Source File: aescipher.py From Audible with GNU Affero General Public License v3.0 | 5 votes |
def aes_cbc_decrypt(key: bytes, iv: bytes, encrypted_data: bytes) -> str: decrypter = Decrypter(AESModeOfOperationCBC(key, iv)) decrypted = decrypter.feed(encrypted_data) + decrypter.feed() return decrypted.decode("utf-8")