Xxtea
Python extension module xxtea
Install / Use
/learn @ifduyue/XxteaREADME
xxtea |github-actions-badge| |pypi-badge| |supported-pythons-badge| |license-badge|
.. |github-actions-badge| image:: https://github.com/ifduyue/xxtea/actions/workflows/test.yml/badge.svg :target: https://github.com/ifduyue/xxtea/actions/workflows/test.yml :alt: Github Actions Status
.. |pypi-badge| image:: https://img.shields.io/pypi/v/xxtea.svg :target: https://pypi.python.org/pypi/xxtea :alt: Latest Version
.. |supported-pythons-badge| image:: https://img.shields.io/pypi/pyversions/xxtea.svg :target: https://pypi.python.org/pypi/xxtea :alt: Supported Python versions
.. |license-badge| image:: https://img.shields.io/pypi/l/xxtea.svg :target: https://pypi.python.org/pypi/xxtea :alt: License
.. _XXTEA: http://en.wikipedia.org/wiki/XXTEA .. _longs2bytes: https://github.com/ifduyue/xxtea/blob/master/xxtea.c#L130 .. _bytes2longs: https://github.com/ifduyue/xxtea/blob/master/xxtea.c#L102 .. PKCS#7: http://en.wikipedia.org/wiki/Padding%28cryptography%29#PKCS7
XXTEA_ implemented as a Python extension module, licensed under 2-clause BSD.
The XXTEA_ algorithm takes a 128-bit key and operates on an array of 32-bit integers (at least 2 integers), but it doesn't define the conversions between bytes and array. Due to this reason, many XXTEA implementations out there are not compatible with each other.
In this implementation, the conversions between bytes and array are
taken care of by longs2bytes_ and bytes2longs_. PKCS#7_ padding is also used
to make sure that the input bytes are padded to multiple of 4-byte (the size
of a 32-bit integer) and at least 8-byte long (the size of two 32-bit integer,
which is required by the XXTEA_ algorithm). As a result of these measures,
you can encrypt not only texts, but also any binary bytes of any length.
Installation
::
$ pip install xxtea -U
Usage
This module provides four functions: encrypt(), decrypt(),
encrypt_hex(), and decrypt_hex().
.. code-block:: Python
>>> import os
>>> import xxtea
>>> import binascii
>>>
>>> key = os.urandom(16) # Key must be a 16-byte string.
>>> s = b"xxtea is good"
>>>
>>> enc = xxtea.encrypt(s, key)
>>> dec = xxtea.decrypt(enc, key)
>>> s == dec
True
>>>
>>> hexenc = xxtea.encrypt_hex(s, key)
>>> hexenc
b'7ad85672d770fb5cf636c49d57e732ae'
>>> s == xxtea.decrypt_hex(hexenc, key)
True
>>>
>>> binascii.hexlify(enc) == hexenc
True
encrypt_hex() and decrypt_hex() operate on ciphertext in a hexadecimal
representation. They are exactly equivalent to:
.. code-block:: python
>>> hexenc = binascii.hexlify(xxtea.encrypt(s, key))
>>> s == xxtea.decrypt(binascii.unhexlify(hexenc), key)
True
Padding
Padding is enabled by default, in this case you can encode any bytes of any length.
.. code-block:: python
>>> xxtea.encrypt_hex('', key)
b'd63256eb59134f1f'
>>> xxtea.decrypt_hex(_, key)
b''
>>> xxtea.encrypt_hex(' ', key)
b'97009bd24074a7a5'
>>> xxtea.decrypt_hex(_, key)
b' '
You can disable padding by setting padding parameter to False.
In this case data will not be padded, so data length must be a multiple of 4 bytes and must not be less than 8 bytes.
Otherwise ValueError will be raised:
.. code-block:: python
>>> xxtea.encrypt_hex('', key, padding=False)
ValueError: Data length must be a multiple of 4 bytes and must not be less than 8 bytes
>>> xxtea.encrypt_hex('xxtea is good', key, padding=False)
ValueError: Data length must be a multiple of 4 bytes and must not be less than 8 bytes
>>> xxtea.encrypt_hex('12345678', key, padding=False)
b'64f4e969ba90d386'
>>> xxtea.decrypt_hex(_, key, padding=False)
b'12345678'
Rounds
By default xxtea manipulates the input data for 6 + 52 / n rounds,
where n denotes how many 32-bit integers the input data can fit in.
We can change this by setting rounds parameter.
Do note that the more rounds it is, the more time will be consumed.
.. code-block:: python
>>> import xxtea
>>> import string
>>> data = string.digits
>>> key = string.ascii_letters[:16]
>>> xxtea.encrypt_hex(data, key)
b'5b80b08a5d1923e4cd992dd5'
>>> 6 + 52 // ((len(data) + (4 - 1)) // 4) # 4 means 4 bytes, size of a 32-bit integer
23
>>> xxtea.encrypt_hex(data, key, rounds=23)
b'5b80b08a5d1923e4cd992dd5'
>>> xxtea.encrypt_hex(data, key, rounds=1024)
b'1577bbf28c43ced93bd50720'
Catching Exceptions
When calling decrypt() and decrypt_hex(), it is possible that a ValueError or a TypeError
is raised:
.. code-block:: python
>>> from __future__ import print_function
>>> import xxtea
>>>
>>> def try_catch(func, *args, **kwargs):
... try:
... func(*args, **kwargs)
... except Exception as e:
... print(e.__class__.__name__, ':', e)
...
...
...
>>> try_catch(xxtea.decrypt, '', key='')
ValueError : Need a 16-byte key.
>>> try_catch(xxtea.decrypt, '', key=' '*16)
ValueError : Invalid data, data length is not a multiple of 4, or less than 8.
>>> try_catch(xxtea.decrypt, ' '*8, key=' '*16)
ValueError : Invalid data, illegal PKCS#7 padding. Could be using a wrong key.
>>> try_catch(xxtea.decrypt_hex, ' '*8, key=' '*16)
TypeError : Non-hexadecimal digit found
>>> try_catch(xxtea.decrypt_hex, 'abc', key=' '*16)
TypeError : Odd-length string
>>> try_catch(xxtea.decrypt_hex, 'abcd', key=' '*16)
ValueError : Invalid data, data length is not a multiple of 4, or less than 8.
Related Skills
node-connect
347.6kDiagnose OpenClaw node connection and pairing failures for Android, iOS, and macOS companion apps
claude-opus-4-5-migration
108.4kMigrate prompts and code from Claude Sonnet 4.0, Sonnet 4.5, or Opus 4.1 to Opus 4.5
frontend-design
108.4kCreate distinctive, production-grade frontend interfaces with high design quality. Use this skill when the user asks to build web components, pages, or applications. Generates creative, polished code that avoids generic AI aesthetics.
model-usage
347.6kUse CodexBar CLI local cost usage to summarize per-model usage for Codex or Claude, including the current (most recent) model or a full model breakdown. Trigger when asked for model-level usage/cost data from codexbar, or when you need a scriptable per-model summary from codexbar cost JSON.
