import base64 import hashlib import os from cryptography.hazmat.backends import default_backend from cryptography.hazmat.primitives import padding from cryptography.hazmat.primitives.ciphers import Cipher, algorithms, modes BUFFER_SIZE = 64 * 1024 # 64 KB class Security: @staticmethod def encrypt_to(input_bytes, key): aes_key = hashlib.sha256(key.encode('utf-8')).digest() iv = os.urandom(16) cipher = Cipher(algorithms.AES(aes_key), modes.CBC(iv), backend=default_backend()) encryptor = cipher.encryptor() padder = padding.PKCS7(128).padder() padded_plaintext = padder.update(input_bytes) + padder.finalize() ciphertext = encryptor.update(padded_plaintext) + encryptor.finalize() return iv + ciphertext @staticmethod def decrypt_to(ciphertext_with_iv_bytes, key): aes_key = hashlib.sha256(key.encode('utf-8')).digest() iv = ciphertext_with_iv_bytes[:16] ciphertext_bytes = ciphertext_with_iv_bytes[16:] cipher = Cipher(algorithms.AES(aes_key), modes.CBC(iv), backend=default_backend()) decryptor = cipher.decryptor() decrypted_padded_bytes = decryptor.update(ciphertext_bytes) + decryptor.finalize() # Manual PKCS7 unpadding check and removal padding_value = decrypted_padded_bytes[-1] # Get the last byte, which indicates padding length if 1 <= padding_value <= 16: # Valid PKCS7 padding value range for AES-128 padding_length = padding_value plaintext_bytes = decrypted_padded_bytes[:-padding_length] # Remove padding bytes else: plaintext_bytes = decrypted_padded_bytes return bytes(plaintext_bytes) @staticmethod def calc_hash(key): str_bytes = key.encode('utf-8') hash_bytes = hashlib.sha384(str_bytes).digest() h = base64.b64encode(hash_bytes).decode('utf-8') return h @staticmethod def get_hw_hash(hardware): key = f'Azaion_{hardware.mac_address}_{hardware.cpu}_{hardware.gpu}' return Security.calc_hash(key) @staticmethod def get_api_encryption_key(creds, hardware_hash): key = f'{creds.email}-{creds.password}-{hardware_hash}-#%@AzaionKey@%#---' return Security.calc_hash(key) @staticmethod def get_model_encryption_key(): key = '-#%@AzaionKey@%#---234sdfklgvhjbnn' return Security.calc_hash(key)