forked from r4sas/PBinCLI
R4SAS
6 years ago
5 changed files with 364 additions and 143 deletions
@ -0,0 +1,226 @@
@@ -0,0 +1,226 @@
|
||||
from Crypto.Random import get_random_bytes |
||||
from Crypto.Cipher import AES |
||||
from base64 import b64encode, b64decode |
||||
|
||||
CIPHER_ITERATION_COUNT = 100000 |
||||
CIPHER_SALT_BYTES = 8 |
||||
CIPHER_BLOCK_BITS = 256 |
||||
CIPHER_BLOCK_BYTES = int(CIPHER_BLOCK_BITS/8) |
||||
CIPHER_TAG_BITS = int(CIPHER_BLOCK_BITS/2) |
||||
CIPHER_TAG_BYTES = int(CIPHER_TAG_BITS/8) |
||||
|
||||
class Paste: |
||||
def __init__(self, debug=False): |
||||
self._version = 2 |
||||
self._data = "" |
||||
self._text = "" |
||||
self._attachment = "" |
||||
self._attachment_name = "" |
||||
self._key = get_random_bytes(CIPHER_BLOCK_BYTES) |
||||
self._password = "" |
||||
self._debug = debug |
||||
|
||||
|
||||
def setVersion(self, version): |
||||
self._version = version |
||||
|
||||
|
||||
def setPassword(self, password): |
||||
self._password = password |
||||
|
||||
|
||||
def setText(self, text): |
||||
self._text = text |
||||
|
||||
|
||||
def setAttachment(self, path): |
||||
from pbincli.utils import check_readable, path_leaf |
||||
from mimetypes import guess_type |
||||
|
||||
check_readable(path) |
||||
with open(path, 'rb') as f: |
||||
contents = f.read() |
||||
f.close() |
||||
mime = guess_type(path, strict=False)[0] |
||||
|
||||
# MIME fallback |
||||
if not mime: mime = 'application/octet-stream' |
||||
|
||||
if self._debug: print("Filename:\t{}\nMIME-type:\t{}".format(path_leaf(path), mime)) |
||||
|
||||
self._attachment = 'data:' + mime + ';base64,' + b64encode(contents).decode() |
||||
self._attachment_name = path_leaf(path) |
||||
|
||||
|
||||
def getText(self): |
||||
return self._text |
||||
|
||||
|
||||
def getAttachment(self): |
||||
return [b64decode(self._attachment.split(',', 1)[1]), self._attachment_name] \ |
||||
if self._attachment \ |
||||
else [False,False] |
||||
|
||||
|
||||
def getJSON(self): |
||||
return self._data |
||||
|
||||
|
||||
def loadJSON(self, data): |
||||
self._data = data |
||||
|
||||
|
||||
def getHash(self): |
||||
if self._version == 2: |
||||
from base58 import b58encode |
||||
return b58encode(self._key).decode() |
||||
else: |
||||
return b64encode(self._key).decode() |
||||
|
||||
|
||||
def setHash(self, hash): |
||||
if self._version == 2: |
||||
from base58 import b58decode |
||||
self._key = b58decode(hash) |
||||
else: |
||||
self._key = b64decode(hash) |
||||
|
||||
|
||||
def __deriveKey(self, salt): |
||||
from Crypto.Protocol.KDF import PBKDF2 |
||||
from Crypto.Hash import HMAC, SHA256 |
||||
# Key derivation, using PBKDF2 and SHA256 HMAC |
||||
return PBKDF2( |
||||
self._key + self._password.encode(), |
||||
salt, |
||||
dkLen = CIPHER_BLOCK_BYTES, |
||||
count = CIPHER_ITERATION_COUNT, |
||||
prf = lambda password, salt: HMAC.new( |
||||
password, |
||||
salt, |
||||
SHA256 |
||||
).digest()) |
||||
|
||||
|
||||
def __initializeCipher(self, key, iv, adata): |
||||
from pbincli.utils import json_encode |
||||
cipher = AES.new(key, AES.MODE_GCM, nonce=iv, mac_len=CIPHER_TAG_BYTES) |
||||
cipher.update(json_encode(adata)) |
||||
return cipher |
||||
|
||||
|
||||
def decrypt(self): |
||||
from pbincli.utils import decompress |
||||
from json import loads as json_decode |
||||
|
||||
if self._version == 2: |
||||
iv = b64decode(self._paste['adata'][0][0]) |
||||
salt = b64decode(self._paste['adata'][0][1]) |
||||
key = self.__deriveKey(salt) |
||||
|
||||
cipher = self.__initializeCipher(key, iv, self._paste['adata']) |
||||
# Cut the cipher text into message and tag |
||||
cipher_text_tag = b64decode(self._paste['ct']) |
||||
cipher_text = cipher_text_tag[:-CIPHER_TAG_BYTES] |
||||
cipher_tag = cipher_text_tag[-CIPHER_TAG_BYTES:] |
||||
cipher_message = json_decode(decompress(cipher.decrypt_and_verify(cipher_text, cipher_tag), self._version)) |
||||
|
||||
self._text = cipher_message['paste'].encode() |
||||
if 'attachment' in cipher_message and 'attachment_name' in cipher_message: |
||||
self._attachment = cipher_message['attachment'] |
||||
self._attachment_name = cipher_message['attachment_name'] |
||||
else: |
||||
from hashlib import sha256 |
||||
from sjcl import SJCL |
||||
|
||||
if self._password: |
||||
digest = sha256(self._password.encode("UTF-8")).hexdigest() |
||||
password = b64encode(self._key) + digest.encode("UTF-8") |
||||
else: |
||||
password = b64encode(self._key) |
||||
|
||||
cipher_text = json_decode(self._data['data']) |
||||
|
||||
if self._debug: print("Text:\t{}\n".format(data)) |
||||
|
||||
text = SJCL().decrypt(cipher_text, password) |
||||
|
||||
if len(text): |
||||
self._text = decompress(text.decode(), self._version) |
||||
|
||||
if 'attachment' in self._data and 'attachmentname' in self._data: |
||||
cipherfile = json_decode(self._data['attachment']) |
||||
cipherfilename = json_decode(self._data['attachmentname']) |
||||
|
||||
if self._debug: print("Name:\t{}\nData:\t{}".format(cipherfilename, cipherfile)) |
||||
|
||||
attachment = SJCL().decrypt(cipherfile, password) |
||||
attachmentname = SJCL().decrypt(cipherfilename, password) |
||||
|
||||
self._attachment = decompress(attachment.decode('utf-8'), self._version).decode('utf-8') |
||||
self._attachment_name = decompress(attachmentname.decode('utf-8'), self._version).decode('utf-8') |
||||
|
||||
|
||||
def encrypt(self, formatter, burnafterreading, discussion, expiration): |
||||
from pbincli.utils import compress, json_encode |
||||
if self._version == 2: |
||||
iv = get_random_bytes(CIPHER_TAG_BYTES) |
||||
salt = get_random_bytes(CIPHER_SALT_BYTES) |
||||
key = self.__deriveKey(salt) |
||||
|
||||
# prepare encryption authenticated data and message |
||||
adata = [ |
||||
[ |
||||
b64encode(iv).decode(), |
||||
b64encode(salt).decode(), |
||||
CIPHER_ITERATION_COUNT, |
||||
CIPHER_BLOCK_BITS, |
||||
CIPHER_TAG_BITS, |
||||
'aes', |
||||
'gcm', |
||||
'zlib' |
||||
], |
||||
formatter, |
||||
int(burnafterreading), |
||||
int(discussion) |
||||
] |
||||
cipher_message = {'paste':self._text} |
||||
if self._attachment: |
||||
cipher_message['attachment'] = self._attachment |
||||
cipher_message['attachment_name'] = self._attachment_name |
||||
|
||||
cipher = self.__initializeCipher(key, iv, adata) |
||||
ciphertext, tag = cipher.encrypt_and_digest(compress(json_encode(cipher_message), self._version)) |
||||
|
||||
self._data = {'v':2,'adata':adata,'ct':b64encode(ciphertext + tag).decode(),'meta':{'expire':expiration}} |
||||
|
||||
else: |
||||
from hashlib import sha256 |
||||
from sjcl import SJCL |
||||
|
||||
self._data = {'expire':expiration,'formatter':formatter,'burnafterreading':int(burnafterreading),'opendiscussion':int(discussion)} |
||||
|
||||
if self._password: |
||||
digest = sha256(self._password.encode("UTF-8")).hexdigest() |
||||
password = b64encode(self._key) + digest.encode("UTF-8") |
||||
else: |
||||
password = b64encode(self._key) |
||||
|
||||
if self._debug: print("Password:\t{}".format(password)) |
||||
|
||||
# Encrypting text |
||||
cipher = SJCL().encrypt(compress(self._text.encode('utf-8'), self._version), password, mode='gcm') |
||||
for k in ['salt', 'iv', 'ct']: cipher[k] = cipher[k].decode() |
||||
|
||||
self._data['data'] = json_encode(cipher) |
||||
|
||||
if self._attachment: |
||||
cipherfile = SJCL().encrypt(compress(self._attachment.encode('utf-8'), self._version), password, mode='gcm') |
||||
for k in ['salt', 'iv', 'ct']: cipherfile[k] = cipherfile[k].decode() |
||||
|
||||
cipherfilename = SJCL().encrypt(compress(self._attachment_name.encode('utf-8'), self._version), password, mode='gcm') |
||||
for k in ['salt', 'iv', 'ct']: cipherfilename[k] = cipherfilename[k].decode() |
||||
|
||||
self._data['attachment'] = json_encode(cipherfile) |
||||
self._data['attachmentname'] = json_encode(cipherfilename) |
||||
|
Loading…
Reference in new issue