import hashlib from typing import Dict, Any import json import requests from urllib.parse import urljoin from Cryptodome import Random from Cryptodome.Cipher import AES import base64 BLOCK_SIZE = 16 def pad(data): length = BLOCK_SIZE - (len(data) % BLOCK_SIZE) return data + (chr(length) * length).encode() def bytes_to_key(data, salt, output=48): # extended from https://gist.github.com/gsakkis/4546068 assert len(salt) == 8, len(salt) data += salt key = hashlib.md5(data).digest() final_key = key while len(final_key) < output: key = hashlib.md5(key + data).digest() final_key += key return final_key[:output] def encrypt(message, passphrase): salt = Random.new().read(8) key_iv = bytes_to_key(passphrase, salt, 32 + 16) key = key_iv[:32] iv = key_iv[32:] aes = AES.new(key, AES.MODE_CBC, iv) return base64.b64encode(b"Salted__" + salt + aes.encrypt(pad(message))) class PyCookieCloud: def __init__(self, url: str, uuid: str, password: str): self.url: str = url self.uuid: str = uuid self.password: str = password def check_connection(self) -> bool: """ Test the connection to the CookieCloud server. :return: True if the connection is successful, False otherwise. """ try: resp = requests.get(self.url) if resp.status_code == 200: return True else: return False except Exception as e: print(str(e)) return False def update_cookie(self, cookie: Dict[str, Any]) -> bool: """ Update cookie data to CookieCloud. :param cookie: cookie value to update, if this cookie does not contain 'cookie_data' key, it will be added into 'cookie_data'. :return: if update success, return True, else return False. """ if 'cookie_data' not in cookie: cookie = {'cookie_data': cookie} raw_data = json.dumps(cookie) encrypted_data = encrypt(raw_data.encode('utf-8'), self.get_the_key().encode('utf-8')).decode('utf-8') cookie_cloud_request = requests.post(urljoin(self.url, '/update'), data={'uuid': self.uuid, 'encrypted': encrypted_data}) if cookie_cloud_request.status_code == 200: if cookie_cloud_request.json()['action'] == 'done': return True return False def get_the_key(self) -> str: """ Get the key used to encrypt and decrypt data. :return: the key. """ md5 = hashlib.md5() md5.update((self.uuid + '-' + self.password).encode('utf-8')) return md5.hexdigest()[:16]