Skip to content
Snippets Groups Projects
Select Git revision
  • f2b51c7e7ec32a7de7cb692c65715527255b4842
  • master default protected
  • chrome-manifest-v3
  • feature/migrate-cordova-13
  • feat/improve-network-scan
  • feat/force-migration-check
  • develop
  • feature/encrypted_comment
  • feature/android_api_19
  • gitlab_migration_1
  • rml8
  • v1.7.15-rc1
  • v1.7.14
  • v1.7.13
  • v1.7.12
  • v1.7.11
  • v1.7.10
  • v1.7.9
  • v1.7.8
  • v1.7.7
  • v1.7.6
  • v1.7.5
  • v1.7.4
  • v1.7.3
  • v1.7.2
  • v1.7.1
  • v1.7.0
  • v1.7.0-rc2
  • v1.7.0-rc1
  • v1.6.12
  • v1.6.11
31 results

github.sh

Blame
  • load_binary_encrypted_message.py 1.70 KiB
    """
    Copyright  2014-2021 Vincent Texier <vit@free.fr>
    
    DuniterPy is free software: you can redistribute it and/or modify
    it under the terms of the GNU General Public License as published by
    the Free Software Foundation, either version 3 of the License, or
    (at your option) any later version.
    
    DuniterPy is distributed in the hope that it will be useful,
    but WITHOUT ANY WARRANTY; without even the implied warranty of
    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
    GNU General Public License for more details.
    
    You should have received a copy of the GNU General Public License
    along with this program.  If not, see <http://www.gnu.org/licenses/>.
    """
    
    import getpass
    import sys
    
    from duniterpy.key import SigningKey
    
    
    def load_binary_encrypted_message():
        if len(sys.argv) < 2:
            print(
                """
            Usage:
                python decrypt_message.py ENCRYPTED_MESSAGE_FILEPATH
            """
            )
    
        # capture encrypted message filepath argument
        signed_message_path = sys.argv[1]
    
        # prompt hidden user entry
        salt = getpass.getpass("Enter your passphrase (salt): ")
    
        # prompt hidden user entry
        password = getpass.getpass("Enter your password: ")
    
        # Create key object
        signing_key_instance = SigningKey.from_credentials(salt, password)
    
        # open encrypted message file
        with open(signed_message_path, "rb") as file_handler:
            encrypted_message = file_handler.read()
    
        # Decrypt the message!
        try:
            message = signing_key_instance.decrypt_seal(encrypted_message).decode("utf-8")
            print("Decrypted message:")
        except ValueError as error:
            message = str(error)
    
        print(message)
    
    if __name__ == "__main__":
        load_binary_encrypted_message()