Cheng Tang | c92b3ea | 2012-07-02 17:29:24 +0800 | [diff] [blame] | 1 | #! /usr/bin/env python
|
Cheng Tang | c1b86be | 2012-09-24 11:18:36 +0800 | [diff] [blame] | 2 | # -*- coding: utf-8
|
Cheng Tang | c92b3ea | 2012-07-02 17:29:24 +0800 | [diff] [blame] | 3 | # vim: tabstop=4
|
| 4 |
|
Cheng Tang | c1b86be | 2012-09-24 11:18:36 +0800 | [diff] [blame] | 5 | import pyDes
|
| 6 | import codecs
|
Cheng Tang | c92b3ea | 2012-07-02 17:29:24 +0800 | [diff] [blame] | 7 |
|
| 8 |
|
| 9 | def desencrypt(key, data, m=pyDes.ECB):
|
| 10 | k = pyDes.des(key, pad=None, padmode=pyDes.PAD_NORMAL, mode=m)
|
Cheng Tang | c1b86be | 2012-09-24 11:18:36 +0800 | [diff] [blame] | 11 | return k.encrypt(data)
|
| 12 |
|
| 13 |
|
Cheng Tang | c92b3ea | 2012-07-02 17:29:24 +0800 | [diff] [blame] | 14 | def desdecrypt(key, data, m=pyDes.ECB):
|
| 15 | k = pyDes.des(key, pad=None, padmode=pyDes.PAD_NORMAL, mode=m)
|
Cheng Tang | c1b86be | 2012-09-24 11:18:36 +0800 | [diff] [blame] | 16 | return k.decrypt(data)
|
| 17 |
|
Cheng Tang | c92b3ea | 2012-07-02 17:29:24 +0800 | [diff] [blame] | 18 |
|
| 19 | def tripledesencrypt(key, data, m=pyDes.ECB):
|
| 20 | k = pyDes.triple_des(key, pad=None, padmode=pyDes.PAD_NORMAL, mode=m)
|
| 21 | return k.encrypt(data)
|
Cheng Tang | c1b86be | 2012-09-24 11:18:36 +0800 | [diff] [blame] | 22 |
|
| 23 |
|
Cheng Tang | c92b3ea | 2012-07-02 17:29:24 +0800 | [diff] [blame] | 24 | def tripledesdecrypt(key, data, m=pyDes.ECB):
|
| 25 | k = pyDes.triple_des(key, pad=None, padmode=pyDes.PAD_NORMAL, mode=m)
|
| 26 | return k.decrypt(data)
|
| 27 |
|
| 28 |
|
| 29 | def desencrypthex(key, data):
|
| 30 | k = pyDes.des(codecs.decode(key, 'hex'), pad=None, padmode=pyDes.PAD_NORMAL)
|
Cheng Tang | c1b86be | 2012-09-24 11:18:36 +0800 | [diff] [blame] | 31 | e = k.encrypt(codecs.decode(data, 'hex'))
|
Cheng Tang | c92b3ea | 2012-07-02 17:29:24 +0800 | [diff] [blame] | 32 | return codecs.encode(e, 'hex')
|
| 33 |
|
Cheng Tang | c1b86be | 2012-09-24 11:18:36 +0800 | [diff] [blame] | 34 |
|
Cheng Tang | c92b3ea | 2012-07-02 17:29:24 +0800 | [diff] [blame] | 35 | def tripledesencrypthex(key, data):
|
| 36 | k = pyDes.triple_des(codecs.decode(key, 'hex'), pad=None, padmode=pyDes.PAD_NORMAL)
|
| 37 | e1 = k.encrypt(codecs.decode(data, 'hex'))
|
| 38 | return codecs.encode(e1, 'hex')
|
| 39 |
|
Cheng Tang | c1b86be | 2012-09-24 11:18:36 +0800 | [diff] [blame] | 40 |
|
Cheng Tang | c92b3ea | 2012-07-02 17:29:24 +0800 | [diff] [blame] | 41 | def DataNot(data):
|
Cheng Tang | c1b86be | 2012-09-24 11:18:36 +0800 | [diff] [blame] | 42 | r = [chr((~ord(a)) & 0xFF) for a in data]
|
| 43 | return "".join(r)
|
| 44 |
|
| 45 |
|
Cheng Tang | c92b3ea | 2012-07-02 17:29:24 +0800 | [diff] [blame] | 46 | def PadCardPhyNo(phyno):
|
| 47 | r = ''
|
| 48 | if len(phyno) < 8:
|
| 49 | pad = "\x80\x00\x00\x00\x00\x00\x00\x00"
|
| 50 | l = 8 - len(phyno)
|
| 51 | r = phyno + pad[:l]
|
| 52 | elif len(phyno) == 8:
|
| 53 | r = phyno
|
| 54 | else:
|
| 55 | r = phyno[:8]
|
| 56 | return r
|
Cheng Tang | c1b86be | 2012-09-24 11:18:36 +0800 | [diff] [blame] | 57 |
|
| 58 |
|
Cheng Tang | c92b3ea | 2012-07-02 17:29:24 +0800 | [diff] [blame] | 59 | def PadCardPhyNoHex(phyno):
|
| 60 | return codecs.encode(PadCardPhyNo(codecs.decode(phyno, 'hex')), 'hex')
|
Cheng Tang | c1b86be | 2012-09-24 11:18:36 +0800 | [diff] [blame] | 61 |
|
| 62 |
|
Cheng Tang | c92b3ea | 2012-07-02 17:29:24 +0800 | [diff] [blame] | 63 | def PbocDeliveryKey(factor, key):
|
| 64 | cipherdatanot = ''
|
| 65 | cipherdata = PadCardPhyNo(factor)
|
Cheng Tang | c92b3ea | 2012-07-02 17:29:24 +0800 | [diff] [blame] | 66 | print "factor is [%s]" % codecs.encode(cipherdata, 'hex')
|
| 67 |
|
Cheng Tang | c1b86be | 2012-09-24 11:18:36 +0800 | [diff] [blame] | 68 | # singledes delivery
|
| 69 | if len(key) == 8:
|
Cheng Tang | c92b3ea | 2012-07-02 17:29:24 +0800 | [diff] [blame] | 70 | k1 = desencrypt(key, cipherdata)
|
| 71 | return k1
|
| 72 | elif len(key) == 16:
|
| 73 | cipherdatanot = DataNot(cipherdata)
|
Cheng Tang | c92b3ea | 2012-07-02 17:29:24 +0800 | [diff] [blame] | 74 | k1 = tripledesencrypt(key, cipherdata)
|
| 75 | k2 = tripledesencrypt(key, cipherdatanot)
|
Cheng Tang | c92b3ea | 2012-07-02 17:29:24 +0800 | [diff] [blame] | 76 | return k1 + k2
|
| 77 | else:
|
| 78 | raise ValueError('key length error')
|
Cheng Tang | c1b86be | 2012-09-24 11:18:36 +0800 | [diff] [blame] | 79 |
|
| 80 |
|
Cheng Tang | c92b3ea | 2012-07-02 17:29:24 +0800 | [diff] [blame] | 81 | def PbocDeliveryKeyHex(factor, key):
|
| 82 | f = codecs.decode(factor, 'hex')
|
| 83 | k = codecs.decode(key, 'hex')
|
| 84 | k1 = PbocDeliveryKey(f, k)
|
| 85 | return codecs.encode(k1, 'hex')
|
Cheng Tang | c1b86be | 2012-09-24 11:18:36 +0800 | [diff] [blame] | 86 |
|
Cheng Tang | c92b3ea | 2012-07-02 17:29:24 +0800 | [diff] [blame] | 87 |
|
| 88 | def CalcMac3DES(data, initdata, key):
|
| 89 | datalen = len(data)
|
| 90 | k = pyDes.des(key[:8], pad=None, padmode=pyDes.PAD_NORMAL)
|
Cheng Tang | c92b3ea | 2012-07-02 17:29:24 +0800 | [diff] [blame] | 91 | for i in range(datalen / 8):
|
Cheng Tang | c1b86be | 2012-09-24 11:18:36 +0800 | [diff] [blame] | 92 | m = []
|
Cheng Tang | c92b3ea | 2012-07-02 17:29:24 +0800 | [diff] [blame] | 93 | for j in range(len(initdata)):
|
Cheng Tang | c1b86be | 2012-09-24 11:18:36 +0800 | [diff] [blame] | 94 | m.append(chr(ord(initdata[j]) ^ ord(data[i * 8 + j])))
|
Cheng Tang | c92b3ea | 2012-07-02 17:29:24 +0800 | [diff] [blame] | 95 |
|
Cheng Tang | c1b86be | 2012-09-24 11:18:36 +0800 | [diff] [blame] | 96 | initdata = "".join(m)
|
Cheng Tang | c92b3ea | 2012-07-02 17:29:24 +0800 | [diff] [blame] | 97 | x = k.encrypt(initdata)
|
| 98 | initdata = x
|
| 99 |
|
Cheng Tang | c92b3ea | 2012-07-02 17:29:24 +0800 | [diff] [blame] | 100 | k1 = pyDes.des(key[8:], pad=None, padmode=pyDes.PAD_NORMAL)
|
| 101 | n = k1.decrypt(initdata)
|
| 102 | initdata = k.encrypt(n)
|
| 103 | return initdata
|
Cheng Tang | c1b86be | 2012-09-24 11:18:36 +0800 | [diff] [blame] | 104 |
|
| 105 |
|
Cheng Tang | c92b3ea | 2012-07-02 17:29:24 +0800 | [diff] [blame] | 106 | def CalcMac3DESHex(data, initdata, key):
|
| 107 | d = codecs.decode(data, 'hex')
|
| 108 | id = codecs.decode(initdata, 'hex')
|
| 109 | k = codecs.decode(key, 'hex')
|
| 110 | k1 = CalcMac3DES(d, id, k)
|
| 111 | return codecs.encode(k1, 'hex')
|
Cheng Tang | c1b86be | 2012-09-24 11:18:36 +0800 | [diff] [blame] | 112 |
|
| 113 |
|
Cheng Tang | c92b3ea | 2012-07-02 17:29:24 +0800 | [diff] [blame] | 114 | def CalcMacDES(data, initdata, key):
|
| 115 | datalen = len(data)
|
| 116 | k = pyDes.des(key, pad=None, padmode=pyDes.PAD_NORMAL)
|
Cheng Tang | c92b3ea | 2012-07-02 17:29:24 +0800 | [diff] [blame] | 117 | for i in range(datalen / 8):
|
Cheng Tang | c1b86be | 2012-09-24 11:18:36 +0800 | [diff] [blame] | 118 | m = []
|
Cheng Tang | c92b3ea | 2012-07-02 17:29:24 +0800 | [diff] [blame] | 119 | for j in range(len(initdata)):
|
Cheng Tang | c1b86be | 2012-09-24 11:18:36 +0800 | [diff] [blame] | 120 | m.append(chr(ord(initdata[j]) ^ ord(data[i * 8 + j])))
|
| 121 | initdata = "".join(m)
|
Cheng Tang | c92b3ea | 2012-07-02 17:29:24 +0800 | [diff] [blame] | 122 | x = k.encrypt(initdata)
|
| 123 | initdata = x
|
Cheng Tang | c1b86be | 2012-09-24 11:18:36 +0800 | [diff] [blame] | 124 |
|
Cheng Tang | c92b3ea | 2012-07-02 17:29:24 +0800 | [diff] [blame] | 125 | return initdata
|
Cheng Tang | c1b86be | 2012-09-24 11:18:36 +0800 | [diff] [blame] | 126 |
|
| 127 |
|
Cheng Tang | c92b3ea | 2012-07-02 17:29:24 +0800 | [diff] [blame] | 128 | def CalcMacDESHex(data, initdata, key):
|
| 129 | d = codecs.decode(data, 'hex')
|
| 130 | id = codecs.decode(initdata, 'hex')
|
| 131 | k = codecs.decode(key, 'hex')
|
| 132 | k1 = CalcMacDES(d, id, k)
|
| 133 | return codecs.encode(k1, 'hex')
|
Cheng Tang | c92b3ea | 2012-07-02 17:29:24 +0800 | [diff] [blame] | 134 |
|
Tang Cheng | 1aa15ee | 2012-09-06 10:12:23 +0800 | [diff] [blame] | 135 |
|
| 136 | def encrypt_m1key(inputkey):
|
| 137 | statickey = codecs.decode('3230303530313331', 'hex')
|
| 138 | key = codecs.decode(inputkey[:16], 'hex')
|
| 139 | outkey = []
|
| 140 | for i in range(8):
|
| 141 | t1 = ord(key[i])
|
| 142 | t2 = ord(statickey[i])
|
| 143 | t = ((~t1) ^ t2) & 0xFF
|
| 144 | outkey.append(chr(t))
|
| 145 | return codecs.encode(''.join(outkey), 'hex')
|
Cheng Tang | c1b86be | 2012-09-24 11:18:36 +0800 | [diff] [blame] | 146 |
|
| 147 |
|
| 148 | def tlv_fetch_value(data):
|
| 149 | datalen = len(data)
|
| 150 | offset = 0
|
| 151 | while offset < datalen:
|
| 152 | t = ord(data[offset])
|
| 153 | if t & 0x0F == 0x0F:
|
| 154 | tag = data[offset:offset + 2]
|
| 155 | offset += 2
|
| 156 | else:
|
| 157 | tag = data[offset]
|
| 158 | offset += 1
|
| 159 | t = ord(data[offset])
|
| 160 | if t & 0x80 == 0x80:
|
| 161 | vl = t & 0x7F
|
| 162 | vlen = 0
|
| 163 | for c in data[offset + 1:offset + 1 + vl]:
|
| 164 | vlen = (vlen << 8) + ord(c)
|
| 165 | offset += 1 + vl
|
| 166 | else:
|
| 167 | vlen = t & 0x7F
|
| 168 | offset += 1
|
| 169 |
|
| 170 | if datalen - offset < vlen:
|
| 171 | raise ValueError(u"data length Error, tag [%s]length[%d]" % (
|
| 172 | codecs.encode(tag, 'hex'), vlen))
|
| 173 | value = data[offset:offset + vlen]
|
| 174 | offset += vlen
|
| 175 | yield (tag, value,)
|
| 176 |
|
| 177 |
|
| 178 | def tlv_fetch_value_hex(data):
|
| 179 | for n, v in tlv_fetch_value(codecs.decode(data, 'hex')):
|
| 180 | yield (codecs.encode(n, 'hex'), codecs.encode(v, 'hex'))
|
| 181 |
|
| 182 |
|
| 183 | def tlv_parse_value(data):
|
| 184 | """
|
| 185 | 分析 tlv 格式的数据
|
| 186 | """
|
| 187 | result = {}
|
| 188 | for n, v in tlv_fetch_value(data):
|
| 189 | result.setdefault(n, v)
|
| 190 | return result
|
| 191 |
|
| 192 |
|
| 193 | def tlv_parse_value_hex(data):
|
| 194 | """
|
| 195 | 分析 tlv 格式的数据, data 是 hex 格式
|
| 196 | """
|
| 197 | result = {}
|
| 198 | for n, v in tlv_fetch_value(codecs.decode(data, 'hex')):
|
| 199 | result.setdefault(codecs.encode(n, 'hex'), codecs.encode(v, 'hex'))
|
| 200 | return result
|
| 201 |
|
| 202 |
|
| 203 | def tlv_fetch_define(data):
|
| 204 | """
|
| 205 | 分析 tlv 定义(不包括数据)
|
| 206 | """
|
| 207 | datalen = len(data)
|
| 208 | offset = 0
|
| 209 | while offset < datalen:
|
| 210 | t = ord(data[offset])
|
| 211 | if t & 0x0F == 0x0F:
|
| 212 | tag = data[offset:offset + 2]
|
| 213 | offset += 2
|
| 214 | else:
|
| 215 | tag = data[offset]
|
| 216 | offset += 1
|
| 217 | t = ord(data[offset])
|
| 218 | if t & 0x80 == 0x80:
|
| 219 | vl = t & 0x7F
|
| 220 | vlen = 0
|
| 221 | for c in data[offset + 1:offset + 1 + vl]:
|
| 222 | vlen = (vlen << 8) + ord(c)
|
| 223 | offset += 1 + vl
|
| 224 | else:
|
| 225 | vlen = t & 0x7F
|
| 226 | offset += 1
|
| 227 | yield (tag, vlen,)
|
| 228 |
|
| 229 |
|
| 230 | def tlv_fetch_define_hex(data):
|
| 231 | """
|
| 232 | 分析 tlv 定义(不包括数据), data hex 格式
|
| 233 | """
|
| 234 | for n, l in tlv_fetch_define(codecs.decode(data, 'hex')):
|
| 235 | yield (codecs.encode(n, 'hex'), l)
|
| 236 |
|
| 237 |
|
| 238 | def tlv_parse_define(data):
|
| 239 | """
|
| 240 | 分析 tlv 定义(不包括数据)
|
| 241 | """
|
| 242 | result = {}
|
| 243 | for n, l in tlv_fetch_define(data):
|
| 244 | result.setdefault(n, l)
|
| 245 | return result
|
| 246 |
|
| 247 |
|
| 248 | def tlv_parse_define_hex(data):
|
| 249 | """
|
| 250 | 分析 tlv 定义(不包括数据), data hex 格式
|
| 251 | """
|
| 252 | result = {}
|
| 253 | for n, l in tlv_fetch_define(codecs.decode(data, 'hex')):
|
| 254 | result.setdefault(codecs.encode(n, 'hex'), l)
|
| 255 | return result
|
| 256 |
|
| 257 |
|
| 258 | def extract_ec_data(data, tags):
|
| 259 | offset = 0
|
| 260 | datalen = len(data)
|
| 261 | for tag in tags:
|
| 262 | tag_len = len(tag)
|
| 263 | if offset + tag_len > datalen:
|
| 264 | break
|
| 265 | if data[offset:offset + tag_len] != tag:
|
| 266 | raise KeyError(u"Tag [%s] not found", codecs.encode(tag, 'hex'))
|
| 267 | offset += tag_len
|
| 268 | t = ord(data[offset])
|
| 269 | if t & 0x80 == 0x80:
|
| 270 | vl = t & 0x7F
|
| 271 | vlen = 0
|
| 272 | for c in data[offset + 1:offset + 1 + vl]:
|
| 273 | vlen = (vlen << 8) + ord(c)
|
| 274 | offset += 1 + vl
|
| 275 | else:
|
| 276 | vlen = t & 0x7F
|
| 277 | offset += 1
|
| 278 | if offset + vlen > datalen:
|
| 279 | raise ValueError(u"data length error!tag[%s]length[%d]" % (
|
| 280 | codecs.encode(tag, 'hex'), vlen))
|
| 281 | value = data[offset:offset + vlen]
|
| 282 | offset += vlen
|
| 283 | yield (tag, value,)
|
| 284 |
|
| 285 |
|
| 286 | def extract_ec_data_hex(data, tags):
|
| 287 | t = [codecs.decode(a, 'hex') for a in tags]
|
| 288 | for t, v in extract_ec_data(codecs.decode(data, 'hex'), t):
|
| 289 | yield (codecs.encode(t, 'hex'), codecs.encode(v, 'hex'),)
|
| 290 |
|
| 291 |
|
| 292 | def extract_ec_data_dict_hex(data, tags):
|
| 293 | result = {}
|
| 294 | for t, v in extract_ec_data_hex(data, tags):
|
| 295 | result.setdefault(t, v)
|
| 296 | return result
|