Python cryptography.hazmat.primitives.ciphers.algorithms.TripleDES() Examples
The following are 6
code examples of cryptography.hazmat.primitives.ciphers.algorithms.TripleDES().
You can vote up the ones you like or vote down the ones you don't like,
and go to the original project or source file by following the links above each example.
You may also want to check out all available functions/classes of the module
cryptography.hazmat.primitives.ciphers.algorithms
, or try the search function
.
Example #1
Source File: constants.py From PGPy with BSD 3-Clause "New" or "Revised" License | 6 votes |
def cipher(self): bs = {SymmetricKeyAlgorithm.IDEA: algorithms.IDEA, SymmetricKeyAlgorithm.TripleDES: algorithms.TripleDES, SymmetricKeyAlgorithm.CAST5: algorithms.CAST5, SymmetricKeyAlgorithm.Blowfish: algorithms.Blowfish, SymmetricKeyAlgorithm.AES128: algorithms.AES, SymmetricKeyAlgorithm.AES192: algorithms.AES, SymmetricKeyAlgorithm.AES256: algorithms.AES, SymmetricKeyAlgorithm.Twofish256: namedtuple('Twofish256', ['block_size'])(block_size=128), SymmetricKeyAlgorithm.Camellia128: algorithms.Camellia, SymmetricKeyAlgorithm.Camellia192: algorithms.Camellia, SymmetricKeyAlgorithm.Camellia256: algorithms.Camellia} if self in bs: return bs[self] raise NotImplementedError(repr(self))
Example #2
Source File: constants.py From PGPy with BSD 3-Clause "New" or "Revised" License | 6 votes |
def key_size(self): ks = {SymmetricKeyAlgorithm.IDEA: 128, SymmetricKeyAlgorithm.TripleDES: 192, SymmetricKeyAlgorithm.CAST5: 128, SymmetricKeyAlgorithm.Blowfish: 128, SymmetricKeyAlgorithm.AES128: 128, SymmetricKeyAlgorithm.AES192: 192, SymmetricKeyAlgorithm.AES256: 256, SymmetricKeyAlgorithm.Twofish256: 256, SymmetricKeyAlgorithm.Camellia128: 128, SymmetricKeyAlgorithm.Camellia192: 192, SymmetricKeyAlgorithm.Camellia256: 256} if self in ks: return ks[self] raise NotImplementedError(repr(self))
Example #3
Source File: des3_decrypter.py From dfvfs with Apache License 2.0 | 6 votes |
def __init__( self, cipher_mode=None, initialization_vector=None, key=None, **kwargs): """Initializes a decrypter. Args: cipher_mode (Optional[str]): cipher mode. initialization_vector (Optional[bytes]): initialization vector. key (Optional[bytes]): key. kwargs (dict): keyword arguments depending on the decrypter. Raises: ValueError: when key is not set or the cipher mode is not supported. """ if not key: raise ValueError('Missing key.') if cipher_mode not in self._ENCRYPTION_MODES: raise ValueError('Unsupported cipher mode: {0!s}'.format(cipher_mode)) algorithm = algorithms.TripleDES(key) super(DES3Decrypter, self).__init__( algorithm=algorithm, cipher_mode=cipher_mode, initialization_vector=initialization_vector, **kwargs)
Example #4
Source File: cached_credentials.py From winreg-kb with Apache License 2.0 | 6 votes |
def _DecryptTripleDES(self, key, data): """Decrypts Triple DES-ECB encrypted data. Args: key (str): key used to decrypt the data. data (bytes): data to decrypt. Returns: bytes: decrypted data. """ algorithm = algorithms.TripleDES(key) mode = modes.ECB() backend = backends.default_backend() cipher = ciphers.Cipher(algorithm, mode=mode, backend=backend) cipher_context = cipher.decryptor() return cipher_context.update(data)
Example #5
Source File: TDES.py From msldap with MIT License | 5 votes |
def setup_cipher(self): algorithm = algorithms.TripleDES(self.key) self._cipher = Cipher(algorithm, mode=self.IV, backend=default_backend()) self.encryptor = self._cipher.encryptor() self.decryptor = self._cipher.decryptor()
Example #6
Source File: smime.py From commandment with MIT License | 4 votes |
def decrypt_smime_content(payload: bytes, key: rsa.RSAPrivateKey) -> bytes: content_info = ContentInfo.load(payload) assert content_info['content_type'].native == 'enveloped_data' content: EnvelopedData = content_info['content'] matching_recipient = content['recipient_infos'][0] # Need to see if we hold the key for any valid recipient. # for recipient_info in content['recipient_infos']: # assert recipient_info.name == 'ktri' # Only support KeyTransRecipientInfo # ktri: KeyTransRecipientInfo = recipient_info.chosen # recipient_id: RecipientIdentifier = ktri['rid'] # assert recipient_id.name == 'issuer_and_serial_number' # Only support IssuerAndSerialNumber # matching_recipient = recipient_info encryption_algo = matching_recipient.chosen['key_encryption_algorithm'].native encrypted_key = matching_recipient.chosen['encrypted_key'].native assert encryption_algo['algorithm'] == 'rsa' # Get the content key plain_key = key.decrypt( encrypted_key, padding=padding.PKCS1v15(), ) # Now we have the plain key, we can decrypt the encrypted data encrypted_contentinfo = content['encrypted_content_info'] algorithm: EncryptionAlgorithm = encrypted_contentinfo['content_encryption_algorithm'] #: EncryptionAlgorithm encrypted_content_bytes = encrypted_contentinfo['encrypted_content'].native symkey = None if algorithm.encryption_cipher == 'aes': symkey = AES(plain_key) elif algorithm.encryption_cipher == 'tripledes': symkey = TripleDES(plain_key) else: print('Dont understand encryption cipher: ', algorithm.encryption_cipher) cipher = Cipher(symkey, modes.CBC(algorithm.encryption_iv), backend=default_backend()) decryptor = cipher.decryptor() decrypted_data = decryptor.update(encrypted_content_bytes) + decryptor.finalize() return decrypted_data