Command line tool for decrypting vim-blowfish-encrypted files.
As of version 7.3 vim offers built in blowfish encryption/decryption. Unfortunately the resulting files can only be read back by vim, precluding batch processing or scripting. Also longevity of encrypted data is a concern if a program with the dependencies and size of vim is required to unlock it.
This project provides a very simpe vimdecrypt
Python module for decrypting
blowfish-encoded file objects, as well as the vimdecrypt
command line tool
for decrypting files to stdout.
Vimdecrypt supports only blowfish2 encryption. Files encrypted using either zip
or blowfish should be converted using :set cm=blowfish2
prior to using this
tool.
Besides Python 3, vimdecrypt requires any one of PyCryto, PyCryptoDome or blowfish to be installed.
Both the Python module and the command line tool are installable via setuptools:
$ python setup.py install (--user)
With ~/.local/bin
in your executable path, decrypt any file to stdout using:
$ vimdecrypt [path]
If the path argument is omitted then data is read from stdin:
$ cat somefile | vimdecrypt
Note that the password is obtained via GNU getpass which does not interfere with stdin/stdout redirection.
The Python module defines only the decrypt
method:
>>> import vimdecrypt
>>> with open('somefile', 'rb') as f:
>>> text = vimdecrypt.decrypt(f)
Thanks to @nlitsme for demonstrating blowfish decryption in Python. His identically named vimdecrypt project supports multiple encryption methods as well as password cracking.