forked from zhanghe06/python
-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathpswEncrypt.py
More file actions
49 lines (35 loc) · 1.13 KB
/
pswEncrypt.py
File metadata and controls
49 lines (35 loc) · 1.13 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
# encoding: utf-8
__author__ = 'zhanghe'
import hashlib
import rsa
import Tea
import base64
# RSA 公钥
pubkey = "F20CE00BAE5361F8FA3AE9CEFA495362FF7DA1BA628F64A347F0A8C012BF0B254A30CD92ABFFE7A6EE0DC424CB6166F8819EFA5BCCB20EDFB4AD02E412CCF579B1CA711D55B8B0B3AEB60153D5E0693A2A86F3167D7847A0CB8B00004716A9095D9BADC977CBB804DBDCBA6029A9710869A453F27DFDDF83C016D928B3CBF4C7"
rsa_public_key = int(pubkey, 16)
key = rsa.PublicKey(rsa_public_key, 3)
def get_tea_pass(q, p, v):
# MD5 密码
md5 = hashlib.md5()
md5.update(p)
p = md5.digest()
# TEA 的KEY
md5 = hashlib.md5()
md5.update(p + ("%0.16X" % q).decode('hex'))
m = md5.digest()
# RSA的加密结果
n = rsa.encrypt(p, key)
# RSA 结果的长度
d = ("%0.4X" % len(n)).decode('hex')
# RSA 加密结果
d += n
# salt
d += ("%0.16X" % q).decode('hex')
# 验证码长度
d += ("%0.4X" % len(v)).decode('hex')
# 验证码
d += v.upper()
# TEA 加密并Base64编码
r = base64.b64encode(Tea.encrypt(d, m))
# 对特殊字符进行替换
return r.replace('/', '-').replace('+', '*').replace('=', '_')