-
-
Notifications
You must be signed in to change notification settings - Fork 48
Expand file tree
/
Copy pathaes.py
More file actions
128 lines (99 loc) · 4.06 KB
/
aes.py
File metadata and controls
128 lines (99 loc) · 4.06 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
# Hydrogram - Telegram MTProto API Client Library for Python
# Copyright (C) 2017-2023 Dan <https://github.com/delivrance>
# Copyright (C) 2023-present Hydrogram <https://hydrogram.org>
#
# This file is part of Hydrogram.
#
# Hydrogram is free software: you can redistribute it and/or modify
# it under the terms of the GNU Lesser General Public License as published
# by the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# Hydrogram is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU Lesser General Public License for more details.
#
# You should have received a copy of the GNU Lesser General Public License
# along with Hydrogram. If not, see <http://www.gnu.org/licenses/>.
from __future__ import annotations
import logging
log = logging.getLogger(__name__)
try:
import tgcrypto
log.info("Using TgCrypto")
def ige256_encrypt(data: bytes, key: bytes, iv: bytes) -> bytes:
return tgcrypto.ige256_encrypt(data, key, iv)
def ige256_decrypt(data: bytes, key: bytes, iv: bytes) -> bytes:
return tgcrypto.ige256_decrypt(data, key, iv)
def ctr256_encrypt(
data: bytes, key: bytes, iv: bytearray, state: bytearray | None = None
) -> bytes:
return tgcrypto.ctr256_encrypt(data, key, iv, state or bytearray(1))
def ctr256_decrypt(
data: bytes, key: bytes, iv: bytearray, state: bytearray | None = None
) -> bytes:
return tgcrypto.ctr256_decrypt(data, key, iv, state or bytearray(1))
def xor(a: bytes, b: bytes) -> bytes:
return int.to_bytes(
int.from_bytes(a, "big") ^ int.from_bytes(b, "big"),
len(a),
"big",
)
except ImportError:
import pyaes
log.warning(
"TgCrypto is missing! "
"Hydrogram will work the same, but at a much slower speed. "
"More info: https://docs.hydrogram.org/en/latest/topics/speedups.html"
)
def ige256_encrypt(data: bytes, key: bytes, iv: bytes) -> bytes:
return ige(data, key, iv, True)
def ige256_decrypt(data: bytes, key: bytes, iv: bytes) -> bytes:
return ige(data, key, iv, False)
def ctr256_encrypt(
data: bytes, key: bytes, iv: bytearray, state: bytearray | None = None
) -> bytes:
return ctr(data, key, iv, state or bytearray(1))
def ctr256_decrypt(
data: bytes, key: bytes, iv: bytearray, state: bytearray | None = None
) -> bytes:
return ctr(data, key, iv, state or bytearray(1))
def xor(a: bytes, b: bytes) -> bytes:
return int.to_bytes(
int.from_bytes(a, "big") ^ int.from_bytes(b, "big"),
len(a),
"big",
)
def ige(data: bytes, key: bytes, iv: bytes, encrypt: bool) -> bytes:
cipher = pyaes.AES(key)
iv_1 = iv[:16]
iv_2 = iv[16:]
data = [data[i : i + 16] for i in range(0, len(data), 16)]
for i, chunk in enumerate(data):
if encrypt:
iv_1 = data[i] = xor(cipher.encrypt(xor(chunk, iv_1)), iv_2)
iv_2 = chunk
else:
iv_2 = data[i] = xor(cipher.decrypt(xor(chunk, iv_2)), iv_1)
iv_1 = chunk
return b"".join(data)
def ctr(data: bytes, key: bytes, iv: bytearray, state: bytearray) -> bytes:
cipher = pyaes.AES(key)
out = bytearray(data)
chunk = cipher.encrypt(iv)
for i in range(0, len(data), 16):
for j in range(min(len(data) - i, 16)):
out[i + j] ^= chunk[state[0]]
state[0] += 1
if state[0] >= 16:
state[0] = 0
if state[0] == 0:
for k in range(15, -1, -1):
try:
iv[k] += 1
break
except ValueError:
iv[k] = 0
chunk = cipher.encrypt(iv)
return out