- Timestamp:
- 02/12/13 13:12:08 (12 years ago)
- Location:
- trunk
- Files:
-
- 3 edited
Legend:
- Unmodified
- Added
- Removed
-
trunk/bin/bletchley-analyze
r28 r35 81 81 line_size = 64 82 82 group_size *= 2 # two hex digits per byte 83 print(group_size)84 83 hex_blobs = map(binascii.b2a_hex, blobs) 85 84 color_map = buffertools.blockWiseColorMap(group_size, hex_blobs) -
trunk/lib/bletchley/CBC/__init__.py
r21 r35 231 231 while(len(last_bytes)!=self.block_size): 232 232 last_bytes = self.decrypt_next_byte(prior, block, last_bytes) 233 234 self.log_message("Decrypted block: %s" % repr(last_bytes)) 233 235 return last_bytes 234 236 … … 282 284 decrypted = self.decrypt_block(self._iv, blocks[0]) + decrypted 283 285 284 return buffertools.stripPKCS7Pad(decrypted )286 return buffertools.stripPKCS7Pad(decrypted, self.block_size) 285 287 286 288 -
trunk/lib/bletchley/blobtools.py
r34 r35 287 287 def encode(self, blob): 288 288 if 'plus' in self.dialect: 289 return urllib.quote(blob )289 return urllib.quote(blob, '') 290 290 else: 291 return urllib.quote_plus(blob )291 return urllib.quote_plus(blob, '') 292 292 293 293
Note: See TracChangeset
for help on using the changeset viewer.