├── .gitignore ├── LICENSE ├── README.md ├── ciphers ├── __init__.py ├── aes_cbc.py ├── aes_ecb.py ├── aes_gcm.py ├── aes_rsa.py ├── des.py ├── des3.py ├── dynamic_key.py ├── rsa.py ├── sm2.py ├── sm2_sm4.py └── sm4_cbc.py ├── manager.py ├── requirements.txt ├── statics ├── AesCbc.html ├── AesCbcForm.html ├── AesCbcFormData.html ├── AesCbcQuery.html ├── AesEcb.html ├── AesGcm.html ├── AesRsa.html ├── Des3Cbc.html ├── DesCbc.html ├── DynamicKey.html ├── Index.html ├── Rsa.html ├── Sm2.html ├── Sm2Sm4.html └── Sm4Cbc.html └── user.db /.gitignore: -------------------------------------------------------------------------------- 1 | # Byte-compiled / optimized / DLL files 2 | __pycache__/ 3 | *.py[cod] 4 | *$py.class 5 | 6 | # C extensions 7 | *.so 8 | 9 | # Distribution / packaging 10 | .Python 11 | build/ 12 | develop-eggs/ 13 | dist/ 14 | downloads/ 15 | eggs/ 16 | .eggs/ 17 | lib/ 18 | lib64/ 19 | parts/ 20 | sdist/ 21 | var/ 22 | wheels/ 23 | share/python-wheels/ 24 | *.egg-info/ 25 | .installed.cfg 26 | *.egg 27 | MANIFEST 28 | 29 | # PyInstaller 30 | # Usually these files are written by a python script from a template 31 | # before PyInstaller builds the exe, so as to inject date/other infos into it. 32 | *.manifest 33 | *.spec 34 | 35 | # Installer logs 36 | pip-log.txt 37 | pip-delete-this-directory.txt 38 | 39 | # Unit test / coverage reports 40 | htmlcov/ 41 | .tox/ 42 | .nox/ 43 | .coverage 44 | .coverage.* 45 | .cache 46 | nosetests.xml 47 | coverage.xml 48 | *.cover 49 | *.py,cover 50 | .hypothesis/ 51 | .pytest_cache/ 52 | cover/ 53 | 54 | # Translations 55 | *.mo 56 | *.pot 57 | 58 | # Django stuff: 59 | *.log 60 | local_settings.py 61 | db.sqlite3 62 | db.sqlite3-journal 63 | 64 | # Flask stuff: 65 | instance/ 66 | .webassets-cache 67 | 68 | # Scrapy stuff: 69 | .scrapy 70 | 71 | # Sphinx documentation 72 | docs/_build/ 73 | 74 | # PyBuilder 75 | .pybuilder/ 76 | target/ 77 | 78 | # Jupyter Notebook 79 | .ipynb_checkpoints 80 | 81 | # IPython 82 | profile_default/ 83 | ipython_config.py 84 | 85 | # pyenv 86 | # For a library or package, you might want to ignore these files since the code is 87 | # intended to run in multiple environments; otherwise, check them in: 88 | # .python-version 89 | 90 | # pipenv 91 | # According to pypa/pipenv#598, it is recommended to include Pipfile.lock in version control. 92 | # However, in case of collaboration, if having platform-specific dependencies or dependencies 93 | # having no cross-platform support, pipenv may install dependencies that don't work, or not 94 | # install all needed dependencies. 95 | #Pipfile.lock 96 | 97 | # poetry 98 | # Similar to Pipfile.lock, it is generally recommended to include poetry.lock in version control. 99 | # This is especially recommended for binary packages to ensure reproducibility, and is more 100 | # commonly ignored for libraries. 101 | # https://python-poetry.org/docs/basic-usage/#commit-your-poetrylock-file-to-version-control 102 | #poetry.lock 103 | 104 | # pdm 105 | # Similar to Pipfile.lock, it is generally recommended to include pdm.lock in version control. 106 | #pdm.lock 107 | # pdm stores project-wide configurations in .pdm.toml, but it is recommended to not include it 108 | # in version control. 109 | # https://pdm.fming.dev/latest/usage/project/#working-with-version-control 110 | .pdm.toml 111 | .pdm-python 112 | .pdm-build/ 113 | 114 | # PEP 582; used by e.g. github.com/David-OConnor/pyflow and github.com/pdm-project/pdm 115 | __pypackages__/ 116 | 117 | # Celery stuff 118 | celerybeat-schedule 119 | celerybeat.pid 120 | 121 | # SageMath parsed files 122 | *.sage.py 123 | 124 | # Environments 125 | .env 126 | .venv 127 | env/ 128 | venv/ 129 | ENV/ 130 | env.bak/ 131 | venv.bak/ 132 | 133 | # Spyder project settings 134 | .spyderproject 135 | .spyproject 136 | 137 | # Rope project settings 138 | .ropeproject 139 | 140 | # mkdocs documentation 141 | /site 142 | 143 | # mypy 144 | .mypy_cache/ 145 | .dmypy.json 146 | dmypy.json 147 | 148 | # Pyre type checker 149 | .pyre/ 150 | 151 | # pytype static type analyzer 152 | .pytype/ 153 | 154 | # Cython debug symbols 155 | cython_debug/ 156 | 157 | # PyCharm 158 | # JetBrains specific template is maintained in a separate JetBrains.gitignore that can 159 | # be found at https://github.com/github/gitignore/blob/main/Global/JetBrains.gitignore 160 | # and can be added to the global gitignore or merged into this file. For a more nuclear 161 | # option (not recommended) you can uncomment the following to ignore the entire idea folder. 162 | #.idea/ 163 | 164 | t.py -------------------------------------------------------------------------------- /LICENSE: -------------------------------------------------------------------------------- 1 | Apache License 2 | Version 2.0, January 2004 3 | http://www.apache.org/licenses/ 4 | 5 | TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION 6 | 7 | 1. Definitions. 8 | 9 | "License" shall mean the terms and conditions for use, reproduction, 10 | and distribution as defined by Sections 1 through 9 of this document. 11 | 12 | "Licensor" shall mean the copyright owner or entity authorized by 13 | the copyright owner that is granting the License. 14 | 15 | "Legal Entity" shall mean the union of the acting entity and all 16 | other entities that control, are controlled by, or are under common 17 | control with that entity. For the purposes of this definition, 18 | "control" means (i) the power, direct or indirect, to cause the 19 | direction or management of such entity, whether by contract or 20 | otherwise, or (ii) ownership of fifty percent (50%) or more of the 21 | outstanding shares, or (iii) beneficial ownership of such entity. 22 | 23 | "You" (or "Your") shall mean an individual or Legal Entity 24 | exercising permissions granted by this License. 25 | 26 | "Source" form shall mean the preferred form for making modifications, 27 | including but not limited to software source code, documentation 28 | source, and configuration files. 29 | 30 | "Object" form shall mean any form resulting from mechanical 31 | transformation or translation of a Source form, including but 32 | not limited to compiled object code, generated documentation, 33 | and conversions to other media types. 34 | 35 | "Work" shall mean the work of authorship, whether in Source or 36 | Object form, made available under the License, as indicated by a 37 | copyright notice that is included in or attached to the work 38 | (an example is provided in the Appendix below). 39 | 40 | "Derivative Works" shall mean any work, whether in Source or Object 41 | form, that is based on (or derived from) the Work and for which the 42 | editorial revisions, annotations, elaborations, or other modifications 43 | represent, as a whole, an original work of authorship. For the purposes 44 | of this License, Derivative Works shall not include works that remain 45 | separable from, or merely link (or bind by name) to the interfaces of, 46 | the Work and Derivative Works thereof. 47 | 48 | "Contribution" shall mean any work of authorship, including 49 | the original version of the Work and any modifications or additions 50 | to that Work or Derivative Works thereof, that is intentionally 51 | submitted to Licensor for inclusion in the Work by the copyright owner 52 | or by an individual or Legal Entity authorized to submit on behalf of 53 | the copyright owner. For the purposes of this definition, "submitted" 54 | means any form of electronic, verbal, or written communication sent 55 | to the Licensor or its representatives, including but not limited to 56 | communication on electronic mailing lists, source code control systems, 57 | and issue tracking systems that are managed by, or on behalf of, the 58 | Licensor for the purpose of discussing and improving the Work, but 59 | excluding communication that is conspicuously marked or otherwise 60 | designated in writing by the copyright owner as "Not a Contribution." 61 | 62 | "Contributor" shall mean Licensor and any individual or Legal Entity 63 | on behalf of whom a Contribution has been received by Licensor and 64 | subsequently incorporated within the Work. 65 | 66 | 2. Grant of Copyright License. Subject to the terms and conditions of 67 | this License, each Contributor hereby grants to You a perpetual, 68 | worldwide, non-exclusive, no-charge, royalty-free, irrevocable 69 | copyright license to reproduce, prepare Derivative Works of, 70 | publicly display, publicly perform, sublicense, and distribute the 71 | Work and such Derivative Works in Source or Object form. 72 | 73 | 3. Grant of Patent License. Subject to the terms and conditions of 74 | this License, each Contributor hereby grants to You a perpetual, 75 | worldwide, non-exclusive, no-charge, royalty-free, irrevocable 76 | (except as stated in this section) patent license to make, have made, 77 | use, offer to sell, sell, import, and otherwise transfer the Work, 78 | where such license applies only to those patent claims licensable 79 | by such Contributor that are necessarily infringed by their 80 | Contribution(s) alone or by combination of their Contribution(s) 81 | with the Work to which such Contribution(s) was submitted. If You 82 | institute patent litigation against any entity (including a 83 | cross-claim or counterclaim in a lawsuit) alleging that the Work 84 | or a Contribution incorporated within the Work constitutes direct 85 | or contributory patent infringement, then any patent licenses 86 | granted to You under this License for that Work shall terminate 87 | as of the date such litigation is filed. 88 | 89 | 4. Redistribution. You may reproduce and distribute copies of the 90 | Work or Derivative Works thereof in any medium, with or without 91 | modifications, and in Source or Object form, provided that You 92 | meet the following conditions: 93 | 94 | (a) You must give any other recipients of the Work or 95 | Derivative Works a copy of this License; and 96 | 97 | (b) You must cause any modified files to carry prominent notices 98 | stating that You changed the files; and 99 | 100 | (c) You must retain, in the Source form of any Derivative Works 101 | that You distribute, all copyright, patent, trademark, and 102 | attribution notices from the Source form of the Work, 103 | excluding those notices that do not pertain to any part of 104 | the Derivative Works; and 105 | 106 | (d) If the Work includes a "NOTICE" text file as part of its 107 | distribution, then any Derivative Works that You distribute must 108 | include a readable copy of the attribution notices contained 109 | within such NOTICE file, excluding those notices that do not 110 | pertain to any part of the Derivative Works, in at least one 111 | of the following places: within a NOTICE text file distributed 112 | as part of the Derivative Works; within the Source form or 113 | documentation, if provided along with the Derivative Works; or, 114 | within a display generated by the Derivative Works, if and 115 | wherever such third-party notices normally appear. The contents 116 | of the NOTICE file are for informational purposes only and 117 | do not modify the License. You may add Your own attribution 118 | notices within Derivative Works that You distribute, alongside 119 | or as an addendum to the NOTICE text from the Work, provided 120 | that such additional attribution notices cannot be construed 121 | as modifying the License. 122 | 123 | You may add Your own copyright statement to Your modifications and 124 | may provide additional or different license terms and conditions 125 | for use, reproduction, or distribution of Your modifications, or 126 | for any such Derivative Works as a whole, provided Your use, 127 | reproduction, and distribution of the Work otherwise complies with 128 | the conditions stated in this License. 129 | 130 | 5. Submission of Contributions. Unless You explicitly state otherwise, 131 | any Contribution intentionally submitted for inclusion in the Work 132 | by You to the Licensor shall be under the terms and conditions of 133 | this License, without any additional terms or conditions. 134 | Notwithstanding the above, nothing herein shall supersede or modify 135 | the terms of any separate license agreement you may have executed 136 | with Licensor regarding such Contributions. 137 | 138 | 6. Trademarks. This License does not grant permission to use the trade 139 | names, trademarks, service marks, or product names of the Licensor, 140 | except as required for reasonable and customary use in describing the 141 | origin of the Work and reproducing the content of the NOTICE file. 142 | 143 | 7. Disclaimer of Warranty. Unless required by applicable law or 144 | agreed to in writing, Licensor provides the Work (and each 145 | Contributor provides its Contributions) on an "AS IS" BASIS, 146 | WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or 147 | implied, including, without limitation, any warranties or conditions 148 | of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A 149 | PARTICULAR PURPOSE. You are solely responsible for determining the 150 | appropriateness of using or redistributing the Work and assume any 151 | risks associated with Your exercise of permissions under this License. 152 | 153 | 8. Limitation of Liability. In no event and under no legal theory, 154 | whether in tort (including negligence), contract, or otherwise, 155 | unless required by applicable law (such as deliberate and grossly 156 | negligent acts) or agreed to in writing, shall any Contributor be 157 | liable to You for damages, including any direct, indirect, special, 158 | incidental, or consequential damages of any character arising as a 159 | result of this License or out of the use or inability to use the 160 | Work (including but not limited to damages for loss of goodwill, 161 | work stoppage, computer failure or malfunction, or any and all 162 | other commercial damages or losses), even if such Contributor 163 | has been advised of the possibility of such damages. 164 | 165 | 9. Accepting Warranty or Additional Liability. While redistributing 166 | the Work or Derivative Works thereof, You may choose to offer, 167 | and charge a fee for, acceptance of support, warranty, indemnity, 168 | or other liability obligations and/or rights consistent with this 169 | License. However, in accepting such obligations, You may act only 170 | on Your own behalf and on Your sole responsibility, not on behalf 171 | of any other Contributor, and only if You agree to indemnify, 172 | defend, and hold each Contributor harmless for any liability 173 | incurred by, or claims asserted against, such Contributor by reason 174 | of your accepting any such warranty or additional liability. 175 | 176 | END OF TERMS AND CONDITIONS 177 | 178 | APPENDIX: How to apply the Apache License to your work. 179 | 180 | To apply the Apache License to your work, attach the following 181 | boilerplate notice, with the fields enclosed by brackets "[]" 182 | replaced with your own identifying information. (Don't include 183 | the brackets!) The text should be enclosed in the appropriate 184 | comment syntax for the file format. We also recommend that a 185 | file or class name and description of purpose be included on the 186 | same "printed page" as the copyright notice for easier 187 | identification within third-party archives. 188 | 189 | Copyright m2sec 190 | 191 | Licensed under the Apache License, Version 2.0 (the "License"); 192 | you may not use this file except in compliance with the License. 193 | You may obtain a copy of the License at 194 | 195 | http://www.apache.org/licenses/LICENSE-2.0 196 | 197 | Unless required by applicable law or agreed to in writing, software 198 | distributed under the License is distributed on an "AS IS" BASIS, 199 | WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 200 | See the License for the specific language governing permissions and 201 | limitations under the License. 202 | -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | # GalaxyDemo 2 | HTTP报文二次加密的具体实现,用于给 https://github.com/outlaws-bai/Galaxy 提供服务以测试及展示 3 | 4 | > python 3.8+ 5 | 6 | **场景** 7 | 8 | `AesCbc`: 通过AES CBC模式使用指定的密钥和IV对用户输入的数据进行加密请求,并对服务器响应的数据进行解密。 9 | 10 | `AesEcb`: 通过AES ECB模式使用指定的密钥对用户输入的数据进行加密请求,并对服务器响应的数据进行解密。 11 | 12 | `AesGcm`: 通过AES GCM模式使用指定的密钥和IV对用户输入的数据进行加密请求,并对服务器响应的数据进行解密。 13 | 14 | `AesRsa`: 使用随机生成的AES密钥加密用户数据,通过RSA加密AES密钥后发送请求,并在收到响应后解密AES密钥和数据。 15 | 16 | `DynamicKey`: 客户端生成随机AES密钥,AES加密数据,RSA加密随机密钥,响应用随机密钥通过AES加密。 17 | 18 | `Rsa`: 使用RSA公钥加密用户输入的数据,并将加密后的数据发送到服务器;服务器响应的加密数据使用另外一组RSA私钥解密后展示。 19 | 20 | `Sm2`: 使用SM2算法对用户输入的数据进行加密,并将加密后的数据发送到服务器;服务器响应的加密数据使用另外一组SM2私钥进行解密。 21 | 22 | `Sm2Sm4`: 使用随机生成的SM4密钥加密用户数据,通过SM2加密SM4密钥后发送请求,并在收到响应后解密SM4密钥和数据。 23 | 24 | `Sm4Cbc`: 使用SM4算法在CBC模式下对数据进行加密请求,并展示解密后的结果。 25 | 26 | `DES`:通过DES CBC模式使用指定的密钥和IV对用户输入的数据进行加密请求,并对服务器响应的数据进行解密。 27 | 28 | `3DES`:通过DES3 CBC模式使用指定的密钥和IV对用户输入的数据进行加密请求,并对服务器响应的数据进行解密。 29 | 30 | `AesCbcQuery`:通过AES CBC模式使用指定的密钥和IV对用户输入的数据进行加密请求,并对服务器响应的数据进行解密。只是请求为get 31 | 32 | `AesCbcForm`:通过AES CBC模式使用指定的密钥和IV对用户输入的数据进行加密请求,并对服务器响应的数据进行解密。只是请求为post-form 33 | 34 | `AesCbcFormData`:通过AES CBC模式使用指定的密钥和IV对用户输入的数据进行加密请求,并对服务器响应的数据进行解密。只是请求为post-formdata 35 | 36 | **安装依赖** 37 | 38 | ```bash 39 | pip install -r requirements.txt 40 | ``` 41 | 42 | **启动** 43 | ```bash 44 | python manager.py 45 | ``` 46 | 47 | -------------------------------------------------------------------------------- /ciphers/__init__.py: -------------------------------------------------------------------------------- 1 | import base64 2 | import random 3 | import string 4 | from abc import ABCMeta, abstractmethod 5 | 6 | 7 | class ICipher(metaclass=ABCMeta): 8 | @abstractmethod 9 | def decrypt(self, data): 10 | """解密""" 11 | 12 | @abstractmethod 13 | def encrypt(self, data): 14 | """加密""" 15 | 16 | 17 | def parse_sm2_pri(pri): 18 | pri_hex = base64.b64decode(pri).hex() 19 | return pri_hex[72 : 72 + 64] 20 | 21 | 22 | def parse_sm2_pub(pub): 23 | pub_hex = base64.b64decode(pub).hex() 24 | return pub_hex[-128:] 25 | 26 | 27 | def reandom_str(length): 28 | return "".join( 29 | [random.choice(string.ascii_letters + string.digits) for _ in range(length)] 30 | ) 31 | 32 | 33 | def get_cipher_map(): 34 | from .aes_cbc import AesCbc 35 | from .aes_ecb import AesEcb 36 | from .aes_gcm import AesGcm 37 | from .aes_rsa import AesRsa 38 | from .rsa import Rsa 39 | from .sm2_sm4 import Sm2Sm4 40 | from .sm2 import Sm2 41 | from .sm4_cbc import Sm4Cbc 42 | from .des import DesCbc 43 | from .des3 import DesCbc3 44 | from .dynamic_key import DynamicKey 45 | 46 | return { 47 | "aes-cbc": AesCbc(), 48 | "aes-ecb": AesEcb(), 49 | "aes-gcm": AesGcm(), 50 | "rsa": Rsa(), 51 | "aes-rsa": AesRsa(), 52 | "sm2": Sm2(), 53 | "sm4-cbc": Sm4Cbc(), 54 | "sm2-sm4": Sm2Sm4(), 55 | "des-cbc": DesCbc(), 56 | "des3-cbc": DesCbc3(), 57 | "dynamic-key": DynamicKey(), 58 | } 59 | 60 | 61 | class Constants: 62 | AES_KEY = "32byteslongsecretkeyforaes256!aa" 63 | AES_IV = "16byteslongiv456" 64 | AES_TAG_LEN = 128 65 | RSA_PUB_BASE64_KEY1 = "MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC7JoQAWLsovzHjaUMZg2lwO4LCuP97mitUc4chqRlQD3NgyCWLqEnYyM+OJ7i6cyMuWLwGtMi29DoKLjpE/xRZR0OUk46PDCAtyDgIyejK7c7KlZTbiqb4PtiJNLZgg0UP62kLMycnpY/wg/R2G9g+7MiJWUV5SR+Lhryv8CWezQIDAQAB" 66 | RSA_PRI_BASE64_KEY1 = "MIICdQIBADANBgkqhkiG9w0BAQEFAASCAl8wggJbAgEAAoGBALsmhABYuyi/MeNpQxmDaXA7gsK4/3uaK1RzhyGpGVAPc2DIJYuoSdjIz44nuLpzIy5YvAa0yLb0OgouOkT/FFlHQ5STjo8MIC3IOAjJ6MrtzsqVlNuKpvg+2Ik0tmCDRQ/raQszJyelj/CD9HYb2D7syIlZRXlJH4uGvK/wJZ7NAgMBAAECgYAhgbhRbZF4rp6Kdh6e00HN58G2BjQrl4MZeCOh+aoABPwlwD/EnMk36GAMtfzjWNjcI+PqGXT0GI7JotQo5ThpoweXX/uoeGOW+UkYLA6a67lmxfoZsDtY2+jnaWIs2c7Itz3ClRxo4tYwCoPNjtaBpMfPgZaYg2QN8/wLQPI66wJBAM0xpjb2OlLDs75lVxbm6v6Dx3YBS20GSqJqvf+14a/k7mrZ3PmAHOfqTqKOwbVQJmLbeOpU+sUBpeLpILKOCLcCQQDpfSsDhdosC6qTL9XnF2jS49iws2RBKw5YjDkClwA6VMNj5uzL1Rl7/AimLRMnB4BwrD95ksuOJsqNXW6wRGibAkAkk28PaQCodB38GFBX0r2ctJy/Wie5vV9caC6KAD/EfMhK357WEpIUfN2beFrrGOhewsRg8NjqeQq60dd0PIEtAkBYAm03O7n8Bj26kzpejA1gCLBCEqyEf/U9XUWT+1UDp7Wqr32sa1vaxyp/cNgaSxKX5eVbLwD5SRfqZ0B0wqRnAkATpUNiCqjQVS+OI5dwjoI1Rx3oI8pyKWOg3+QIHIRgL3pc8HLdZ2BkX4Vf6ANb4+noQnD/di1Mj+0pUL8RhIJE" 67 | RSA_PUB_BASE64_KEY2 = "MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCrfqYv278oDvreohZeR+UMiNSJC2FG4u8dSNC/hj88lw7eULQOiuUnsZ4eineeFOquXckjhkh1AJsd87+Nz1ZQB61dY3NmVR5Tk+2wH/kNdiVCoRrbULs29Tms17IyrZZU9WQFQbBxC/g6n5zwp6ST/siGRfHAwVVbq+iccQfdpwIDAQAB" 68 | RSA_PRI_BASE64_KEY2 = "MIICdgIBADANBgkqhkiG9w0BAQEFAASCAmAwggJcAgEAAoGBAKt+pi/bvygO+t6iFl5H5QyI1IkLYUbi7x1I0L+GPzyXDt5QtA6K5Sexnh6Kd54U6q5dySOGSHUAmx3zv43PVlAHrV1jc2ZVHlOT7bAf+Q12JUKhGttQuzb1OazXsjKtllT1ZAVBsHEL+DqfnPCnpJP+yIZF8cDBVVur6JxxB92nAgMBAAECgYAghb2lcNKBGcooo2uDiLXe2SoZLT/O7iVzk8YGtEJUzr7imUJ0SZHoo639U7wYjhXtaFrHMmWWTr2cAggvMAVJi5fZYYJLbYdc8O5QCKi6PzV2J2NxYyuABL5yarvy4Ji0twnDjlqBYqrjOsxJbeMv58CHLKqduIZuxppGGOoRQQJBANTV3JEg6xJdPXsF9ztOf03BNkvpibuUSNbTssTdzEtLMQW7zd5y1qTCwUbf+e2UsRIYPn5DwOlTu8SaE97Zz8ECQQDORm7szA0WL1OTYob0U1NSSFDn8Jg7FyX5md6ndL3KNTKBDBfe3hNpauLi01lTMbO3MoriOWsFiN++6dZAdwdnAkEAq6PcwN1/Ncwj7Lae7yEa4SXUF9w6yx+GrlkDbmhAfOginLEcES0jlLPLEtFFySeEtUb//uu9A24XmzF2nN2jAQJABgL7fJ89ymW6s9LtR/WdugotgXT7ms1D6BBZ8ttuJJSEUkp975rdSfc5gY7TTZ9nM3GfppQx0El66994xQwzBQJAct1HPeCVROxyEHNwsiRH9wqR5P4B59Mo1714R7ozsdTpVx8FWmqi+OQIJt+IizYgRyQ09qORAFei9AHeQtxKiw==" 69 | 70 | SM2_PUB_BASE64_KEY1 = "MFkwEwYHKoZIzj0CAQYIKoEcz1UBgi0DQgAEBv9Z+xbmSOH3W/V9UEpU1yUiJKNGh/I8EiENTPYxX3GujsZyKhuEUzxloKCATcNaKWi7w/yK3PxGONM4xvMlIQ==" 71 | SM2_PRI_BASE64_KEY1 = "MIGTAgEAMBMGByqGSM49AgEGCCqBHM9VAYItBHkwdwIBAQQgWmIprZ5a6TsqRUgy32J+F22AYIKl+14P4qlw/LPPCcagCgYIKoEcz1UBgi2hRANCAAQG/1n7FuZI4fdb9X1QSlTXJSIko0aH8jwSIQ1M9jFfca6OxnIqG4RTPGWgoIBNw1opaLvD/Irc/EY40zjG8yUh" 72 | SM2_PUB_BASE64_KEY2 = "MFkwEwYHKoZIzj0CAQYIKoEcz1UBgi0DQgAE/1kmIjlOfsqG9hN4b/O3hiSI91ErgVDeqB9YOgCFiUiFyPo32pCHh691zGnoAj0l/P132CyLgBeH6TUa/TrLUg==" 73 | SM2_PRI_BASE64_KEY2 = "MIGTAgEAMBMGByqGSM49AgEGCCqBHM9VAYItBHkwdwIBAQQgP8vW9tEh0dMP5gJNsol5Gyc6jvvgK1NRqOVg8VaLYVygCgYIKoEcz1UBgi2hRANCAAT/WSYiOU5+yob2E3hv87eGJIj3USuBUN6oH1g6AIWJSIXI+jfakIeHr3XMaegCPSX8/XfYLIuAF4fpNRr9OstS" 74 | 75 | SM4_KEY = "16byteslongkey12" 76 | SM4_IV = AES_IV 77 | DES_KEY = "12345678" 78 | DES_IV = "12345678" 79 | DES3_KEY = "24byteslongKeyfordes3!aa" 80 | DES3_IV = "8bytesIv" 81 | -------------------------------------------------------------------------------- /ciphers/aes_cbc.py: -------------------------------------------------------------------------------- 1 | import json 2 | import base64 3 | from Crypto.Cipher import AES 4 | from Crypto.Util.Padding import pad, unpad 5 | from . import ICipher, Constants 6 | 7 | 8 | class AesCbc(ICipher): 9 | def decrypt(self, data): 10 | encrypted_data_bytes = base64.b64decode(data["data"]) 11 | cipher = AES.new( 12 | Constants.AES_KEY.encode(), AES.MODE_CBC, Constants.AES_IV.encode() 13 | ) 14 | decrypted_data = unpad(cipher.decrypt(encrypted_data_bytes), AES.block_size) 15 | return json.loads(decrypted_data.decode()) 16 | 17 | def encrypt(self, data): 18 | json_data = json.dumps(data) 19 | cipher = AES.new( 20 | Constants.AES_KEY.encode(), AES.MODE_CBC, Constants.AES_IV.encode() 21 | ) 22 | encrypted_data = cipher.encrypt(pad(json_data.encode(), AES.block_size)) 23 | return {"data": base64.b64encode(encrypted_data).decode()} 24 | -------------------------------------------------------------------------------- /ciphers/aes_ecb.py: -------------------------------------------------------------------------------- 1 | import json 2 | import base64 3 | from Crypto.Cipher import AES 4 | from Crypto.Util.Padding import pad, unpad 5 | from . import ICipher, Constants 6 | 7 | 8 | class AesEcb(ICipher): 9 | cipher = AES.new(Constants.AES_KEY.encode(), AES.MODE_ECB) 10 | 11 | def decrypt(self, data): 12 | encrypted_data_bytes = base64.b64decode(data["data"]) 13 | decrypted_data = unpad( 14 | self.cipher.decrypt(encrypted_data_bytes), AES.block_size 15 | ) 16 | return json.loads(decrypted_data.decode()) 17 | 18 | def encrypt(self, data): 19 | json_data = json.dumps(data) 20 | encrypted_data = self.cipher.encrypt(pad(json_data.encode(), AES.block_size)) 21 | return {"data": base64.b64encode(encrypted_data).decode()} 22 | -------------------------------------------------------------------------------- /ciphers/aes_gcm.py: -------------------------------------------------------------------------------- 1 | import json 2 | import base64 3 | from Crypto.Cipher import AES 4 | from . import ICipher, Constants 5 | 6 | 7 | class AesGcm(ICipher): 8 | def decrypt(self, data): 9 | encrypted_data_bytes = base64.b64decode(data["data"]) 10 | cipher = AES.new( 11 | Constants.AES_KEY.encode(), 12 | AES.MODE_GCM, 13 | Constants.AES_IV.encode(), 14 | mac_len=16, 15 | ) 16 | decrypted_data = cipher.decrypt_and_verify( 17 | encrypted_data_bytes[:-16], encrypted_data_bytes[-16:] 18 | ) 19 | return json.loads(decrypted_data.decode()) 20 | 21 | def encrypt(self, data): 22 | json_data = json.dumps(data) 23 | cipher = AES.new( 24 | Constants.AES_KEY.encode(), 25 | AES.MODE_GCM, 26 | Constants.AES_IV.encode(), 27 | mac_len=16, 28 | ) 29 | encrypted_data, tag = cipher.encrypt_and_digest(json_data.encode()) 30 | return {"data": base64.b64encode(encrypted_data + tag).decode()} 31 | -------------------------------------------------------------------------------- /ciphers/aes_rsa.py: -------------------------------------------------------------------------------- 1 | import json 2 | import base64 3 | from Crypto.PublicKey import RSA 4 | from Crypto.Cipher import PKCS1_v1_5, AES 5 | from Crypto.Util.Padding import pad, unpad 6 | from . import ICipher, Constants, reandom_str 7 | 8 | 9 | class AesRsa(ICipher): 10 | def decrypt(self, data): 11 | encrypted_key_bytes = base64.b64decode(data["key"]) 12 | rsa_key = RSA.import_key(base64.b64decode(Constants.RSA_PRI_BASE64_KEY1)) 13 | cipher_rsa = PKCS1_v1_5.new(rsa_key) 14 | decrypted_key = cipher_rsa.decrypt(encrypted_key_bytes, 0) 15 | assert isinstance(decrypted_key, bytes) 16 | 17 | cipher_aes = AES.new(decrypted_key, AES.MODE_ECB) 18 | encrypted_data_bytes = base64.b64decode(data["data"]) 19 | decrypted_data = unpad(cipher_aes.decrypt(encrypted_data_bytes), AES.block_size) 20 | return json.loads(decrypted_data.decode()) 21 | 22 | def encrypt(self, data): 23 | random_key = reandom_str(32) 24 | 25 | cipher_aes = AES.new(random_key.encode(), AES.MODE_ECB) 26 | json_data = json.dumps(data) 27 | encrypted_data = cipher_aes.encrypt(pad(json_data.encode(), AES.block_size)) 28 | 29 | rsa_key = RSA.import_key(base64.b64decode(Constants.RSA_PUB_BASE64_KEY2)) 30 | cipher_rsa = PKCS1_v1_5.new(rsa_key) 31 | encrypted_key = cipher_rsa.encrypt(random_key.encode()) 32 | 33 | return { 34 | "data": base64.b64encode(encrypted_data).decode(), 35 | "key": base64.b64encode(encrypted_key).decode(), 36 | } 37 | -------------------------------------------------------------------------------- /ciphers/des.py: -------------------------------------------------------------------------------- 1 | import json 2 | import base64 3 | from Crypto.Cipher import DES 4 | from Crypto.Util.Padding import pad, unpad 5 | from . import ICipher, Constants 6 | 7 | 8 | class DesCbc(ICipher): 9 | def decrypt(self, data): 10 | encrypted_data_bytes = base64.b64decode(data["data"]) 11 | cipher = DES.new( 12 | Constants.DES_KEY.encode(), DES.MODE_CBC, Constants.DES_IV.encode() 13 | ) 14 | decrypted_data = unpad(cipher.decrypt(encrypted_data_bytes), DES.block_size) 15 | return json.loads(decrypted_data.decode()) 16 | 17 | def encrypt(self, data): 18 | json_data = json.dumps(data) 19 | cipher = DES.new( 20 | Constants.DES_KEY.encode(), DES.MODE_CBC, Constants.DES_IV.encode() 21 | ) 22 | encrypted_data = cipher.encrypt(pad(json_data.encode(), DES.block_size)) 23 | return {"data": base64.b64encode(encrypted_data).decode()} 24 | -------------------------------------------------------------------------------- /ciphers/des3.py: -------------------------------------------------------------------------------- 1 | import json 2 | import base64 3 | from Crypto.Cipher import DES3 4 | from Crypto.Util.Padding import pad, unpad 5 | from . import ICipher, Constants 6 | 7 | 8 | class DesCbc3(ICipher): 9 | def decrypt(self, data): 10 | encrypted_data_bytes = base64.b64decode(data["data"]) 11 | cipher = DES3.new( 12 | Constants.DES3_KEY.encode(), DES3.MODE_CBC, Constants.DES3_IV.encode() 13 | ) 14 | decrypted_data = unpad(cipher.decrypt(encrypted_data_bytes), DES3.block_size) 15 | return json.loads(decrypted_data.decode()) 16 | 17 | def encrypt(self, data): 18 | json_data = json.dumps(data) 19 | cipher = DES3.new( 20 | Constants.DES3_KEY.encode(), DES3.MODE_CBC, Constants.DES3_IV.encode() 21 | ) 22 | encrypted_data = cipher.encrypt(pad(json_data.encode(), DES3.block_size)) 23 | return {"data": base64.b64encode(encrypted_data).decode()} 24 | -------------------------------------------------------------------------------- /ciphers/dynamic_key.py: -------------------------------------------------------------------------------- 1 | import json 2 | import base64 3 | from . import ICipher, Constants 4 | from Crypto.PublicKey import RSA 5 | from Crypto.Cipher import PKCS1_v1_5, AES 6 | from Crypto.Util.Padding import pad, unpad 7 | 8 | 9 | class DynamicKey(ICipher): 10 | key: bytes 11 | 12 | def decrypt(self, data): 13 | encrypted_key_bytes = base64.b64decode(data["key"]) 14 | rsa_key = RSA.import_key(base64.b64decode(Constants.RSA_PRI_BASE64_KEY1)) 15 | cipher_rsa = PKCS1_v1_5.new(rsa_key) 16 | decrypted_key = cipher_rsa.decrypt(encrypted_key_bytes, 0) 17 | assert isinstance(decrypted_key, bytes) 18 | print("decrypted_key: ", decrypted_key) 19 | self.key = decrypted_key 20 | cipher_aes = AES.new(decrypted_key, AES.MODE_ECB) 21 | encrypted_data_bytes = base64.b64decode(data["data"]) 22 | decrypted_data = unpad(cipher_aes.decrypt(encrypted_data_bytes), AES.block_size) 23 | return json.loads(decrypted_data.decode()) 24 | 25 | def encrypt(self, data): 26 | json_data = json.dumps(data) 27 | cipher = AES.new(self.key, AES.MODE_ECB) 28 | encrypted_data = cipher.encrypt(pad(json_data.encode(), AES.block_size)) 29 | return {"data": base64.b64encode(encrypted_data).decode()} 30 | -------------------------------------------------------------------------------- /ciphers/rsa.py: -------------------------------------------------------------------------------- 1 | import json 2 | import base64 3 | from Crypto.PublicKey import RSA 4 | from Crypto.Cipher import PKCS1_v1_5 5 | from . import ICipher, Constants 6 | 7 | 8 | class Rsa(ICipher): 9 | def decrypt(self, data): 10 | encrypted_data_bytes = base64.b64decode(data["data"]) 11 | rsa_key = RSA.import_key(base64.b64decode(Constants.RSA_PRI_BASE64_KEY1)) 12 | cipher = PKCS1_v1_5.new(rsa_key) 13 | decrypted_data = cipher.decrypt(encrypted_data_bytes, 0) 14 | assert isinstance(decrypted_data, bytes) 15 | return json.loads(decrypted_data.decode()) 16 | 17 | def encrypt(self, data): 18 | json_data = json.dumps(data).encode() 19 | rsa_key = RSA.import_key(base64.b64decode(Constants.RSA_PUB_BASE64_KEY2)) 20 | cipher = PKCS1_v1_5.new(rsa_key) 21 | encrypted_data = cipher.encrypt(json_data) 22 | return {"data": base64.b64encode(encrypted_data).decode()} 23 | -------------------------------------------------------------------------------- /ciphers/sm2.py: -------------------------------------------------------------------------------- 1 | import json 2 | import base64 3 | from gmssl import sm2 4 | from . import ICipher, Constants, parse_sm2_pri, parse_sm2_pub 5 | 6 | 7 | class Sm2(ICipher): 8 | def decrypt(self, data): 9 | cipher = sm2.CryptSM2( 10 | parse_sm2_pri(Constants.SM2_PRI_BASE64_KEY1), 11 | parse_sm2_pub(Constants.SM2_PUB_BASE64_KEY1), 12 | asn1=False, 13 | ) 14 | encrypted_data_bytes = base64.b64decode(data["data"]) 15 | decrypted_data = cipher.decrypt(encrypted_data_bytes[1:]) 16 | assert decrypted_data 17 | return json.loads(decrypted_data.decode()) 18 | 19 | def encrypt(self, data): 20 | cipher = sm2.CryptSM2( 21 | parse_sm2_pri(Constants.SM2_PRI_BASE64_KEY2), 22 | parse_sm2_pub(Constants.SM2_PUB_BASE64_KEY2), 23 | asn1=False, 24 | ) 25 | json_data = json.dumps(data).encode() 26 | encrypted_data = cipher.encrypt(json_data) 27 | assert encrypted_data 28 | return { 29 | "data": base64.b64encode(b"\x04" + encrypted_data).decode(), 30 | } 31 | -------------------------------------------------------------------------------- /ciphers/sm2_sm4.py: -------------------------------------------------------------------------------- 1 | import json 2 | import base64 3 | from gmssl import sm2, sm4 4 | from Crypto.Util.Padding import pad, unpad 5 | from . import ICipher, Constants, reandom_str, parse_sm2_pri, parse_sm2_pub 6 | 7 | 8 | class Sm2Sm4(ICipher): 9 | def decrypt(self, data): 10 | cipher_sm2 = sm2.CryptSM2( 11 | parse_sm2_pri(Constants.SM2_PRI_BASE64_KEY1), 12 | parse_sm2_pub(Constants.SM2_PUB_BASE64_KEY1), 13 | ) 14 | 15 | encrypted_key_bytes = base64.b64decode(data["key"]) 16 | decrypted_key = cipher_sm2.decrypt(encrypted_key_bytes[1:]) 17 | assert decrypted_key 18 | 19 | encrypted_data_bytes = base64.b64decode(data["data"]) 20 | cipher = sm4.CryptSM4() 21 | cipher.set_key(decrypted_key, 1) 22 | decrypted_padded_data = cipher.crypt_ecb(encrypted_data_bytes) 23 | # decrypted_data = unpad(decrypted_padded_data, 16) 24 | # print(decrypted_data) 25 | return json.loads(decrypted_padded_data.decode()) 26 | 27 | def encrypt(self, data): 28 | cipher_sm2 = sm2.CryptSM2( 29 | parse_sm2_pri(Constants.SM2_PRI_BASE64_KEY2), 30 | parse_sm2_pub(Constants.SM2_PUB_BASE64_KEY2), 31 | ) 32 | 33 | random_key = reandom_str(16) 34 | 35 | json_data = json.dumps(data).encode() 36 | cipher = sm4.CryptSM4() 37 | cipher.set_key(random_key.encode(), 0) 38 | encrypted_data = cipher.crypt_ecb(json_data) 39 | 40 | encrypted_key = cipher_sm2.encrypt(random_key.encode()) 41 | assert encrypted_key 42 | 43 | return { 44 | "data": base64.b64encode(encrypted_data).decode(), 45 | "key": base64.b64encode(b"\x04" + encrypted_key).decode(), 46 | } 47 | -------------------------------------------------------------------------------- /ciphers/sm4_cbc.py: -------------------------------------------------------------------------------- 1 | import json 2 | import base64 3 | from gmssl import sm4 4 | from . import ICipher, Constants 5 | 6 | 7 | class Sm4Cbc(ICipher): 8 | def decrypt(self, data): 9 | encrypted_data_bytes = base64.b64decode(data["data"]) 10 | cipher = sm4.CryptSM4() 11 | cipher.set_key(Constants.SM4_KEY.encode(), 1) 12 | decrypted_padded_data = cipher.crypt_cbc( 13 | Constants.SM4_IV.encode(), encrypted_data_bytes 14 | ) 15 | return json.loads(decrypted_padded_data.decode()) 16 | 17 | def encrypt(self, data): 18 | json_data = json.dumps(data).encode() 19 | cipher = sm4.CryptSM4() 20 | cipher.set_key(Constants.SM4_KEY.encode(), 0) 21 | encrypted_data = cipher.crypt_cbc(Constants.SM4_IV.encode(), json_data) 22 | return { 23 | "data": base64.b64encode(encrypted_data).decode(), 24 | } 25 | -------------------------------------------------------------------------------- /manager.py: -------------------------------------------------------------------------------- 1 | import base64 2 | import sqlite3 3 | import traceback 4 | from Crypto.Cipher import AES 5 | from ciphers import get_cipher_map, Constants 6 | from Crypto.Util.Padding import pad, unpad 7 | from fastapi import FastAPI, Body, HTTPException, Query, Form 8 | from fastapi.responses import HTMLResponse, RedirectResponse, JSONResponse 9 | 10 | # uvicorn manager:app --host 0.0.0.0 --reload 11 | app = FastAPI() 12 | cipher_map = get_cipher_map() 13 | 14 | 15 | # 创建 SQLite 数据库引擎 16 | DATABASE_URL = "./user.db" 17 | # users = [ 18 | # {"id": 1, "name": "user1", "email": "alice@example.com"}, 19 | # {"id": 2, "name": "user2", "email": "bob@example.com"}, 20 | # ] 21 | 22 | 23 | @app.get("/", response_class=HTMLResponse) 24 | async def read_index(): 25 | return RedirectResponse("/Index.html") 26 | 27 | 28 | @app.get("/{name}.html", response_class=HTMLResponse) 29 | async def render_html(name): 30 | with open(f"statics/{name}.html", encoding="utf-8") as f: 31 | return HTMLResponse(content=f.read(), status_code=200) 32 | 33 | 34 | @app.post("/api/{cipher_name}/getUserInfo", response_class=JSONResponse) 35 | async def get_user_info(cipher_name, json_body=Body(...)): 36 | # 解密请求 37 | cipher = cipher_map[cipher_name] 38 | row_data = cipher.decrypt(json_body) 39 | print(f"decryptde data: {row_data}") 40 | # 业务逻辑 41 | username = row_data.get("username") # type: ignore 42 | if not username: 43 | raise HTTPException(status_code=404, detail="User not found") 44 | conn = sqlite3.connect(DATABASE_URL) 45 | cursor = conn.cursor() 46 | query = f"SELECT * FROM users WHERE name = '{username}'" 47 | try: 48 | cursor.execute(query) 49 | result = cursor.fetchone() 50 | if result is None: 51 | raise HTTPException(status_code=404, detail="User not found") 52 | user_info = {"id": result[0], "name": result[1], "email": result[2]} 53 | except Exception: 54 | user_info = {"status": "fail", "message": traceback.format_exc()} 55 | print(f"response data : {user_info}") 56 | # 加密响应 57 | return JSONResponse(cipher.encrypt(user_info)) 58 | 59 | 60 | @app.get("/api/aes-cbc/getUserInfoByQuery", response_class=JSONResponse) 61 | async def get_user_info_aes_cbc_get(username: str = Query(...)): 62 | # 解密请求 63 | encrypted_data_bytes = base64.b64decode(username) 64 | cipher = AES.new( 65 | Constants.AES_KEY.encode(), AES.MODE_CBC, Constants.AES_IV.encode() 66 | ) 67 | decrypted_data = unpad(cipher.decrypt(encrypted_data_bytes), AES.block_size) 68 | print(f"decryptde data: {decrypted_data}") 69 | # 业务逻辑 70 | username = decrypted_data.decode() # type: ignore 71 | if not username: 72 | raise HTTPException(status_code=404, detail="User not found") 73 | conn = sqlite3.connect(DATABASE_URL) 74 | cursor = conn.cursor() 75 | query = f"SELECT * FROM users WHERE name = '{username}'" 76 | try: 77 | cursor.execute(query) 78 | result = cursor.fetchone() 79 | if result is None: 80 | raise HTTPException(status_code=404, detail="User not found") 81 | user_info = {"id": result[0], "name": result[1], "email": result[2]} 82 | except Exception: 83 | user_info = {"status": "fail", "message": traceback.format_exc()} 84 | print(f"response data : {user_info}") 85 | # 加密响应 86 | return JSONResponse(get_cipher_map()["aes-cbc"].encrypt(user_info)) 87 | 88 | 89 | @app.post("/api/aes-cbc/getUserInfoByForm", response_class=JSONResponse) 90 | async def get_user_info_aes_cbc_post_form(username: str = Form(...)): 91 | # 解密请求 92 | encrypted_data_bytes = base64.b64decode(username) 93 | cipher = AES.new( 94 | Constants.AES_KEY.encode(), AES.MODE_CBC, Constants.AES_IV.encode() 95 | ) 96 | decrypted_data = unpad(cipher.decrypt(encrypted_data_bytes), AES.block_size) 97 | print(f"decryptde data: {decrypted_data}") 98 | # 业务逻辑 99 | username = decrypted_data.decode() # type: ignore 100 | if not username: 101 | raise HTTPException(status_code=404, detail="User not found") 102 | conn = sqlite3.connect(DATABASE_URL) 103 | cursor = conn.cursor() 104 | query = f"SELECT * FROM users WHERE name = '{username}'" 105 | try: 106 | cursor.execute(query) 107 | result = cursor.fetchone() 108 | if result is None: 109 | raise HTTPException(status_code=404, detail="User not found") 110 | user_info = {"id": result[0], "name": result[1], "email": result[2]} 111 | except Exception: 112 | user_info = {"status": "fail", "message": traceback.format_exc()} 113 | print(f"response data : {user_info}") 114 | # 加密响应 115 | return JSONResponse(get_cipher_map()["aes-cbc"].encrypt(user_info)) 116 | 117 | 118 | if __name__ == "__main__": 119 | import uvicorn 120 | 121 | uvicorn.run(app, host="0.0.0.0", port=8000) 122 | -------------------------------------------------------------------------------- /requirements.txt: -------------------------------------------------------------------------------- 1 | fastapi 2 | pycryptodome 3 | gmssl 4 | jinja2 5 | uvicorn 6 | sqlalchemy -------------------------------------------------------------------------------- /statics/AesCbc.html: -------------------------------------------------------------------------------- 1 | 2 | 3 |
4 | 5 |