Mcdecryptor

#!/usr/bin/env python3 import argparse import os import sys from cryptography.hazmat.primitives.ciphers.aead import AESGCM from binascii import unhexlify

MAGIC = b"MCDEC01\n" NONCE_SIZE = 12 TAG_SIZE = 16 mcdecryptor

def decrypt_file(in_path, out_path, key): with open(in_path, "rb") as f: header = f.read(len(MAGIC)) if header != MAGIC: raise SystemExit("Input file has invalid header/magic") nonce = f.read(NONCE_SIZE) rest = f.read() if len(nonce) != NONCE_SIZE or len(rest) < TAG_SIZE: raise SystemExit("Input file too short or malformed") ciphertext, tag = rest[:-TAG_SIZE], rest[-TAG_SIZE:] aesgcm = AESGCM(key) try: plaintext = aesgcm.decrypt(nonce, ciphertext + tag, header) except Exception: raise SystemExit("Decryption failed or authentication tag mismatch") if out_path: with open(out_path, "wb") as out: out.write(plaintext) else: sys.stdout.buffer.write(plaintext) key): with open(in_path

def load_key(hexkey): if hexkey is None: key_hex = os.environ.get("MC_KEY") if not key_hex: raise SystemExit("No key provided via -k and MC_KEY not set") hexkey = key_hex try: key = unhexlify(hexkey) except Exception: raise SystemExit("Key must be hex") if len(key) != 32: raise SystemExit("Key must be 32 bytes (64 hex chars) for AES-256") return key tag = rest[:-TAG_SIZE]