X-Git-Url: http://www.git.cypherpunks.ru/?a=blobdiff_plain;f=pygost%2Fgost28147.py;h=37760b909204f20c36cd5611843ddfdd6c7e05ec;hb=fa193af6abe5fcba3f74514a1900fc958eff8e37;hp=79ef968f7bbc964baf3c8941a5fb4e86a806f934;hpb=84d1df702df072d2babdf352a4f82086229317ea;p=pygost.git diff --git a/pygost/gost28147.py b/pygost/gost28147.py index 79ef968..37760b9 100644 --- a/pygost/gost28147.py +++ b/pygost/gost28147.py @@ -26,6 +26,7 @@ from functools import partial from pygost.gost3413 import pad2 from pygost.gost3413 import pad_size +from pygost.gost3413 import unpad2 from pygost.utils import hexdec from pygost.utils import strxor from pygost.utils import xrange # pylint: disable=redefined-builtin @@ -123,16 +124,6 @@ SBOXES = { (13, 14, 4, 1, 7, 0, 5, 10, 3, 12, 8, 15, 6, 2, 9, 11), (1, 3, 10, 9, 5, 11, 4, 15, 8, 6, 7, 14, 13, 0, 2, 12), ), - "AppliedCryptography": ( - (4, 10, 9, 2, 13, 8, 0, 14, 6, 11, 1, 12, 7, 15, 5, 3), - (14, 11, 4, 12, 6, 13, 15, 10, 2, 3, 8, 1, 0, 7, 5, 9), - (5, 8, 1, 13, 10, 3, 4, 2, 14, 15, 12, 7, 6, 0, 9, 11), - (7, 13, 10, 1, 0, 8, 9, 15, 14, 4, 6, 12, 11, 2, 5, 3), - (6, 12, 7, 1, 5, 15, 13, 8, 4, 10, 9, 14, 0, 3, 11, 2), - (4, 11, 10, 0, 7, 2, 1, 13, 3, 6, 8, 5, 9, 12, 15, 14), - (13, 11, 4, 1, 3, 15, 5, 9, 0, 10, 14, 7, 6, 8, 2, 12), - (1, 15, 13, 0, 5, 7, 10, 4, 9, 2, 3, 14, 6, 11, 8, 12), - ), "Gost28147_tc26_ParamZ": ( (12, 4, 6, 2, 10, 5, 11, 9, 14, 8, 13, 7, 0, 3, 15, 1), (6, 8, 2, 3, 9, 10, 5, 12, 1, 14, 4, 7, 11, 13, 0, 15), @@ -154,6 +145,7 @@ SBOXES = { (7, 14, 12, 13, 9, 4, 8, 15, 10, 2, 6, 0, 3, 11, 5, 1), ), } +SBOXES["AppliedCryptography"] = SBOXES["GostR3411_94_TestParamSet"] def _K(s, _in): @@ -347,14 +339,7 @@ def cbc_decrypt(key, data, pad=True, sbox=DEFAULT_SBOX): data[i - BLOCKSIZE:i], )) if pad: - last_block = bytearray(plaintext[-1]) - pad_index = last_block.rfind(b"\x80") - if pad_index == -1: - raise ValueError("Invalid padding") - for c in last_block[pad_index + 1:]: - if c != 0: - raise ValueError("Invalid padding") - plaintext[-1] = bytes(last_block[:pad_index]) + plaintext[-1] = unpad2(plaintext[-1], BLOCKSIZE) return b"".join(plaintext)