215 lines
5.1 KiB
Python
Executable File
215 lines
5.1 KiB
Python
Executable File
# -*- coding: utf-8 -*-
|
|
import time
|
|
import datetime
|
|
import random, base64
|
|
from hashlib import sha1
|
|
|
|
class RC4:
|
|
def __init__(self,data_coding='utf8'):
|
|
self.bcoding = 'iso-8859-1'
|
|
self.dcoding = data_coding
|
|
self.salt = b'AFUqx9WZuI32lnHk'
|
|
|
|
def _crypt(self,data,key):
|
|
"""RC4 algorithm return bytes"""
|
|
x = 0
|
|
box = [i for i in range(256) ]
|
|
for i in range(256):
|
|
x = (x + box[i] + key[i % len(key)]) % 256
|
|
box[i], box[x] = box[x], box[i]
|
|
x = y = 0
|
|
out = []
|
|
for char in data:
|
|
x = (x + 1) % 256
|
|
y = (y + box[x]) % 256
|
|
box[x], box[y] = box[y], box[x]
|
|
out.append(chr(char ^ box[(box[x] + box[y]) % 256]))
|
|
|
|
return ''.join(out).encode(self.bcoding)
|
|
|
|
def encode_bytes(self, bdata, key):
|
|
a = sha1(key + self.salt)
|
|
k = a.digest()
|
|
data = self.salt + self._crypt(bdata, k)
|
|
return data
|
|
|
|
def encode(self,data, key,encode=base64.b64encode, salt_length=16):
|
|
"""RC4 encryption with random salt and final encoding"""
|
|
if type(data)==type(''):
|
|
data = data.encode(self.dcoding)
|
|
key = key.encode(self.bcoding)
|
|
code = self.encode_bytes(data, key)
|
|
if encode:
|
|
code = encode(code)
|
|
return code.decode(self.dcoding)
|
|
return code
|
|
|
|
def decode_bytes(self, data, key):
|
|
salt_length = 16
|
|
salt = data[:salt_length]
|
|
a = sha1(key + self.salt)
|
|
k = a.digest() #.decode('iso-8859-1')
|
|
r = self._crypt(data[salt_length:], k)
|
|
return r
|
|
|
|
def decode(self,data, key,decode=base64.b64decode, salt_length=16):
|
|
"""RC4 decryption of encoded data"""
|
|
if type(data)==type(''):
|
|
data = data.encode(self.dcoding)
|
|
key = key.encode(self.bcoding)
|
|
if decode:
|
|
data = decode(data)
|
|
r = self.decode_bytes(data, key)
|
|
return r.decode(self.dcoding)
|
|
|
|
class KeyChain(object):
|
|
def __init__(self, seed_str, crypter=None, keylen=23, period=600, threshold=60, time_delta=0):
|
|
self.seed_str = seed_str
|
|
if isinstance(self.seed_str, str):
|
|
self.seed_str = self.seed_str.encode('utf-8')
|
|
self.period = int(period)
|
|
self.threshold = int(threshold)
|
|
self.crypter = crypter
|
|
self.time_delta = time_delta
|
|
if crypter is None:
|
|
self.crypter = RC4()
|
|
self.keylen = keylen
|
|
self.keypool = {
|
|
}
|
|
delta = datetime.timedelta(0)
|
|
self.timezone = datetime.timezone(delta, name='gmt')
|
|
|
|
def get_timestamp(self):
|
|
ts = int(time.time()) - self.time_delta
|
|
return ts
|
|
|
|
def is_near_bottom(self, indicator=None):
|
|
ts = self.get_timestamp()
|
|
i = indicator
|
|
if i is None:
|
|
i = self.get_indicator(ts)
|
|
if i + self.threshold > ts:
|
|
return True
|
|
return False
|
|
|
|
def is_near_top(self, indicator=None):
|
|
ts = self.get_timestamp()
|
|
i = indicator
|
|
if i is None:
|
|
i = self.get_indicator(ts)
|
|
if i + self.period - self.threshold < ts:
|
|
return True
|
|
return False
|
|
|
|
def get_indicator(self, ts=None):
|
|
if ts is None:
|
|
ts = self.get_timestamp()
|
|
return int(ts / self.period) * self.period
|
|
|
|
def genKey(self, indicator):
|
|
vv = indicator
|
|
if self.keypool.get(vv):
|
|
return self.keypool[vv]
|
|
v = vv
|
|
k1 = 0
|
|
k = ''
|
|
m = len(self.seed_str)
|
|
while k1 < self.keylen:
|
|
j = v % self.keylen
|
|
v = v - (j + k1) * m + self.keylen
|
|
k = k + chr(self.seed_str[j])
|
|
k1 += self.threshold / 2
|
|
key = k.encode('utf-8')
|
|
self.keypool[vv] = key
|
|
dates = [ d for d in self.keypool.keys() ]
|
|
for d in dates:
|
|
if d < indicator - self.period:
|
|
del self.keypool[d]
|
|
return key
|
|
|
|
def encode(self, text):
|
|
bdata = text.encode('utf-8')
|
|
return self.encode_bytes(bdata)
|
|
|
|
def encode_bytes(self, bdata):
|
|
indicator = self.get_indicator()
|
|
key = self.genKey(indicator)
|
|
data = key + bdata
|
|
return self.crypter.encode_bytes(data, key)
|
|
|
|
def _decode(self, data, key):
|
|
d = self.crypter.decode_bytes(data, key)
|
|
if d[:len(key)] == key:
|
|
return d[len(key):]
|
|
return None
|
|
|
|
def decode_bytes(self, data):
|
|
indicator = self.get_indicator()
|
|
key = self.genKey(indicator)
|
|
d = self._decode(data, key)
|
|
if d is not None:
|
|
return d
|
|
|
|
if self.is_near_bottom(indicator):
|
|
indicator -= self.period
|
|
key = self.genKey(indicator)
|
|
return self._decode(data, key)
|
|
|
|
if self.is_near_top(indicator):
|
|
indicator += self.period
|
|
key = self.genKey(indicator)
|
|
return self._decode(data, key)
|
|
return None
|
|
|
|
def decode(self, data):
|
|
d = self.decode_bytes(data)
|
|
if d is None:
|
|
return None
|
|
return d.decode('utf-8')
|
|
pwdkey = 'ytguiojbhvhbnkl'
|
|
def password(pwdtxt):
|
|
rc = RC4()
|
|
code = rc.encode(pwdtxt, pwdkey)
|
|
t = rc.decode(code, pwdkey)
|
|
if (t == pwdtxt):
|
|
return code
|
|
else:
|
|
return None
|
|
|
|
def unpassword(code):
|
|
rc = RC4()
|
|
t = rc.decode(code, pwdkey)
|
|
return t
|
|
|
|
"""
|
|
if __name__ == '__main__':
|
|
import sys
|
|
if len(sys.argv) > 1:
|
|
print(password(sys.argv[1]))
|
|
sys.exit(0)
|
|
ps = [
|
|
'45dr6tcfyvguh',
|
|
'ft7gy8uh9ij0',
|
|
'opiluykhcgjfncm'
|
|
]
|
|
for p in ps:
|
|
print(password(p))
|
|
"""
|
|
|
|
if __name__=='__main__':
|
|
# 需要加密的数据长度没有限制
|
|
# 密钥
|
|
|
|
data=b"231r3 feregrenerjk gkht324g8924gnfw k;ejkvwkjerv"
|
|
key = b'123456'
|
|
rc4 = RC4()
|
|
kc = KeyChain('in the heaven, we are equal', rc4)
|
|
|
|
print(data)
|
|
# 加码
|
|
encoded_data = kc.encode_bytes(data)
|
|
print(encoded_data,len(encoded_data) )
|
|
# 解码
|
|
decoded_data = kc.decode_bytes(encoded_data)
|
|
print(data, decoded_data, decoded_data==data)
|