-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathcrypt.py
153 lines (129 loc) · 4.12 KB
/
crypt.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
#!/usr/bin/env python
#coding=utf-8
import sys
import os
import json
import shutil
import subprocess
import argparse
############################################################
#http://www.coolcode.org/archives/?article-307.html
############################################################
import struct
_DELTA = 0x9E3779B9
def _long2str(v, w):
n = (len(v) - 1) << 2
if w:
m = v[-1]
if (m < n - 3) or (m > n): return ''
n = m
s = struct.pack('<%iL' % len(v), *v)
return s[0:n] if w else s
def _str2long(s, w):
n = len(s)
m = (4 - (n & 3) & 3) + n
s = s.ljust(m, "\0")
v = list(struct.unpack('<%iL' % (m >> 2), s))
if w: v.append(n)
return v
def xxtea_encrypt(str, key):
if str == '': return str
v = _str2long(str, True)
k = _str2long(key.ljust(16, "\0"), False)
n = len(v) - 1
z = v[n]
y = v[0]
sum = 0
q = 6 + 52 // (n + 1)
while q > 0:
sum = (sum + _DELTA) & 0xffffffff
e = sum >> 2 & 3
for p in xrange(n):
y = v[p + 1]
v[p] = (v[p] + ((z >> 5 ^ y << 2) + (y >> 3 ^ z << 4) ^ (sum ^ y) + (k[p & 3 ^ e] ^ z))) & 0xffffffff
z = v[p]
y = v[0]
v[n] = (v[n] + ((z >> 5 ^ y << 2) + (y >> 3 ^ z << 4) ^ (sum ^ y) + (k[n & 3 ^ e] ^ z))) & 0xffffffff
z = v[n]
q -= 1
return _long2str(v, False)
def xxtea_decrypt(str, key):
if str == '': return str
v = _str2long(str, False)
k = _str2long(key.ljust(16, "\0"), False)
n = len(v) - 1
z = v[n]
y = v[0]
q = 6 + 52 // (n + 1)
sum = (q * _DELTA) & 0xffffffff
while (sum != 0):
e = sum >> 2 & 3
for p in xrange(n, 0, -1):
z = v[p - 1]
v[p] = (v[p] - ((z >> 5 ^ y << 2) + (y >> 3 ^ z << 4) ^ (sum ^ y) + (k[p & 3 ^ e] ^ z))) & 0xffffffff
y = v[p]
z = v[n]
v[0] = (v[0] - ((z >> 5 ^ y << 2) + (y >> 3 ^ z << 4) ^ (sum ^ y) + (k[0 & 3 ^ e] ^ z))) & 0xffffffff
y = v[0]
sum = (sum - _DELTA) & 0xffffffff
return _long2str(v, True)
def fread(file):
with open(file, 'rb') as f:
return f.read()
def encrypt_file(file, key, sign):
data = fread(file)
if not data.startswith(sign):
codeded = xxtea_encrypt(data, key)
with open(file, 'wb') as f:
f.write(sign)
f.write(codeded)
def decrypt_file(file, key, sign):
data = fread(file)
if data.startswith(sign):
decoded = xxtea_decrypt(data[len(sign):], key)
with open(file, 'wb') as f:
f.write(decoded)
def scan(*dirs, **kwargs):
files = []
extensions = kwargs['extensions'] if kwargs.has_key('extensions') else None
excludes = kwargs['excludes'] if kwargs.has_key('excludes') else []
for top in dirs:
for root, dirnames, filenames in os.walk(top):
dirnames = [i for i in dirnames if i in excludes]
for f in filenames:
if f in excludes:
continue
ext = os.path.splitext(f)[1].lower()
if extensions is None or ext in extensions:
files.append(os.path.join(root, f))
return files
def prepare():
conf = json.loads(fread('.cocos-project.json'))
key = str(conf['xxtea_key'])
sign = str(conf['xxtea_sign'])
extensions = ['.ExportJson', '.plist', '.json', '.animation', '.fnt', '.md', '.xml', '.tmx', '.lua', '.png']
sources = scan('src', 'res', extensions=extensions, excludes=['Backup', 'README.md'])
return key, sign, sources
def encrypt(key, sign, sources):
print('encrypt %d files...' % len(sources))
for f in sources:
encrypt_file(f, key, sign)
print('OK')
def decrypt(key, sign, sources):
print('decrypt %d files...' % len(sources))
for f in sources:
decrypt_file(f, key, sign)
print('OK')
def main():
parser = argparse.ArgumentParser(description='The cocos resource encrypt/decrypt script.')
parser.add_argument('-e','--encrypt', action='store_true', help='encoding resources')
parser.add_argument('-d','--decrypt', action='store_true', help='encoding resources')
args = parser.parse_args()
if args.encrypt == args.decrypt:
parser.print_help()
return
if args.encrypt:
encrypt(*prepare())
else:
decrypt(*prepare())
main()