diff options
author | Heiner Lohaus <hlohaus@users.noreply.github.com> | 2024-03-25 21:06:51 +0100 |
---|---|---|
committer | Heiner Lohaus <hlohaus@users.noreply.github.com> | 2024-03-25 21:06:51 +0100 |
commit | 347d3f92da458520b30e91e56bd66e472e084e70 (patch) | |
tree | 8fa21c18ce4380b89db814687483530f01fe506d /g4f/Provider/openai/crypt.py | |
parent | Merge pull request #1744 from igeni/concat2fstr (diff) | |
download | gpt4free-347d3f92da458520b30e91e56bd66e472e084e70.tar gpt4free-347d3f92da458520b30e91e56bd66e472e084e70.tar.gz gpt4free-347d3f92da458520b30e91e56bd66e472e084e70.tar.bz2 gpt4free-347d3f92da458520b30e91e56bd66e472e084e70.tar.lz gpt4free-347d3f92da458520b30e91e56bd66e472e084e70.tar.xz gpt4free-347d3f92da458520b30e91e56bd66e472e084e70.tar.zst gpt4free-347d3f92da458520b30e91e56bd66e472e084e70.zip |
Diffstat (limited to '')
-rw-r--r-- | g4f/Provider/openai/crypt.py | 66 |
1 files changed, 66 insertions, 0 deletions
diff --git a/g4f/Provider/openai/crypt.py b/g4f/Provider/openai/crypt.py new file mode 100644 index 00000000..e7f35190 --- /dev/null +++ b/g4f/Provider/openai/crypt.py @@ -0,0 +1,66 @@ +import json +import base64 +import hashlib +import random +from Crypto.Cipher import AES + +def pad(data: str) -> bytes: + # Convert the string to bytes and calculate the number of bytes to pad + data_bytes = data.encode() + padding = 16 - (len(data_bytes) % 16) + # Append the padding bytes with their value + return data_bytes + bytes([padding] * padding) + +def encrypt(data, key): + salt = "" + salted = "" + dx = bytes() + + # Generate salt, as 8 random lowercase letters + salt = "".join(random.choice("abcdefghijklmnopqrstuvwxyz") for _ in range(8)) + + # Our final key and IV come from the key and salt being repeatedly hashed + for x in range(3): + dx = hashlib.md5(dx + key.encode() + salt.encode()).digest() + salted += dx.hex() + + # Pad the data before encryption + data = pad(data) + + aes = AES.new( + bytes.fromhex(salted[:64]), AES.MODE_CBC, bytes.fromhex(salted[64:96]) + ) + + return json.dumps( + { + "ct": base64.b64encode(aes.encrypt(data)).decode(), + "iv": salted[64:96], + "s": salt.encode().hex(), + } + ) + +def unpad(data: bytes) -> bytes: + # Extract the padding value from the last byte and remove padding + padding_value = data[-1] + return data[:-padding_value] + +def decrypt(data: str, key: str): + # Parse JSON data + parsed_data = json.loads(base64.b64decode(data)) + ct = base64.b64decode(parsed_data["ct"]) + iv = bytes.fromhex(parsed_data["iv"]) + salt = bytes.fromhex(parsed_data["s"]) + + salted = '' + dx = b'' + for x in range(3): + dx = hashlib.md5(dx + key.encode() + salt).digest() + salted += dx.hex() + + aes = AES.new( + bytes.fromhex(salted[:64]), AES.MODE_CBC, iv + ) + + data = aes.decrypt(ct) + if data.startswith(b'[{"key":'): + return unpad(data).decode()
\ No newline at end of file |