mirror of
https://github.com/markqvist/Reticulum.git
synced 2024-11-22 21:50:18 +00:00
Restructed to Identity
This commit is contained in:
parent
5fcbb5d338
commit
4c92493bc2
@ -2,6 +2,7 @@ import base64
|
|||||||
import math
|
import math
|
||||||
from Identity import Identity
|
from Identity import Identity
|
||||||
from Transport import Transport
|
from Transport import Transport
|
||||||
|
from Packet import Packet
|
||||||
from cryptography.fernet import Fernet
|
from cryptography.fernet import Fernet
|
||||||
from cryptography.hazmat.primitives import hashes
|
from cryptography.hazmat.primitives import hashes
|
||||||
from cryptography.hazmat.backends import default_backend
|
from cryptography.hazmat.backends import default_backend
|
||||||
@ -47,7 +48,7 @@ class Destination:
|
|||||||
return digest.finalize()[:10]
|
return digest.finalize()[:10]
|
||||||
|
|
||||||
|
|
||||||
def __init__(self, direction, type, app_name, *aspects):
|
def __init__(self, identity, direction, type, app_name, *aspects):
|
||||||
# Check input values and build name string
|
# Check input values and build name string
|
||||||
if "." in app_name: raise ValueError("Dots can't be used in app names")
|
if "." in app_name: raise ValueError("Dots can't be used in app names")
|
||||||
if not type in Destination.types: raise ValueError("Unknown destination type")
|
if not type in Destination.types: raise ValueError("Unknown destination type")
|
||||||
@ -56,18 +57,19 @@ class Destination:
|
|||||||
self.direction = direction
|
self.direction = direction
|
||||||
self.mtu = 0
|
self.mtu = 0
|
||||||
|
|
||||||
|
if identity == None:
|
||||||
|
identity = Identity()
|
||||||
|
identity.createKeys()
|
||||||
|
|
||||||
|
self.identity = identity
|
||||||
|
aspects = aspects+(identity.hexhash,)
|
||||||
|
|
||||||
self.name = Destination.getDestinationName(app_name, *aspects)
|
self.name = Destination.getDestinationName(app_name, *aspects)
|
||||||
self.hash = Destination.getDestinationHash(app_name, *aspects)
|
self.hash = Destination.getDestinationHash(app_name, *aspects)
|
||||||
self.hexhash = self.hash.encode("hex_codec")
|
self.hexhash = self.hash.encode("hex_codec")
|
||||||
|
|
||||||
self.callback = None
|
self.callback = None
|
||||||
|
|
||||||
# Initialize keys to none
|
|
||||||
self.prv = None
|
|
||||||
self.pub = None
|
|
||||||
self.prv_bytes = None
|
|
||||||
self.pub_bytes = None
|
|
||||||
|
|
||||||
Transport.registerDestination(self)
|
Transport.registerDestination(self)
|
||||||
|
|
||||||
|
|
||||||
@ -85,54 +87,33 @@ class Destination:
|
|||||||
self.callback(plaintext, self)
|
self.callback(plaintext, self)
|
||||||
|
|
||||||
|
|
||||||
def createKey(self):
|
def createKeys(self):
|
||||||
if self.type == Destination.PLAIN:
|
if self.type == Destination.PLAIN:
|
||||||
raise TypeError("A plain destination does not hold any keys")
|
raise TypeError("A plain destination does not hold any keys")
|
||||||
|
|
||||||
if self.type == Destination.SINGLE:
|
if self.type == Destination.SINGLE:
|
||||||
self.prv = rsa.generate_private_key(
|
raise TypeError("A single destination holds keys through an Identity instance")
|
||||||
public_exponent=65337,
|
|
||||||
key_size=Destination.KEYSIZE,
|
|
||||||
backend=default_backend()
|
|
||||||
)
|
|
||||||
self.prv_bytes = self.prv.private_bytes(
|
|
||||||
encoding=serialization.Encoding.DER,
|
|
||||||
format=serialization.PrivateFormat.PKCS8,
|
|
||||||
encryption_algorithm=serialization.NoEncryption()
|
|
||||||
)
|
|
||||||
self.pub = self.prv.public_key()
|
|
||||||
self.pub_bytes = self.pub.public_bytes(
|
|
||||||
encoding=serialization.Encoding.DER,
|
|
||||||
format=serialization.PublicFormat.SubjectPublicKeyInfo
|
|
||||||
)
|
|
||||||
print("Keys created, private length is "+str(len(self.prv_bytes)))
|
|
||||||
print("Keys created, public length is "+str(len(self.pub_bytes)))
|
|
||||||
#+", public length is "+str(len(self.pub_bytes))))
|
|
||||||
|
|
||||||
if self.type == Destination.GROUP:
|
if self.type == Destination.GROUP:
|
||||||
self.prv_bytes = Fernet.generate_key()
|
self.prv_bytes = Fernet.generate_key()
|
||||||
self.prv = Fernet(self.prv_bytes)
|
self.prv = Fernet(self.prv_bytes)
|
||||||
|
|
||||||
|
|
||||||
def getKey(self):
|
def getPrivateKey(self):
|
||||||
if self.type == Destination.PLAIN:
|
if self.type == Destination.PLAIN:
|
||||||
raise TypeError("A plain destination does not hold any keys")
|
raise TypeError("A plain destination does not hold any keys")
|
||||||
|
elif self.type == Destination.SINGLE:
|
||||||
|
raise TypeError("A single destination holds keys through an Identity instance")
|
||||||
else:
|
else:
|
||||||
return self.prv_bytes
|
return self.prv_bytes
|
||||||
|
|
||||||
|
|
||||||
def loadKey(self, key):
|
def loadPrivateKey(self, key):
|
||||||
if self.type == Destination.PLAIN:
|
if self.type == Destination.PLAIN:
|
||||||
raise TypeError("A plain destination does not hold any keys")
|
raise TypeError("A plain destination does not hold any keys")
|
||||||
|
|
||||||
if self.type == Destination.SINGLE:
|
if self.type == Destination.SINGLE:
|
||||||
self.prv_bytes = key
|
raise TypeError("A single destination holds keys through an Identity instance")
|
||||||
self.prv = serialization.load_der_private_key(self.prv_bytes, password=None,backend=default_backend())
|
|
||||||
self.pub = self.prv.public_key()
|
|
||||||
self.pub_bytes = self.pub.public_bytes(
|
|
||||||
encoding=serialization.Encoding.DER,
|
|
||||||
format=serialization.PublicFormat.SubjectPublicKeyInfo
|
|
||||||
)
|
|
||||||
|
|
||||||
if self.type == Destination.GROUP:
|
if self.type == Destination.GROUP:
|
||||||
self.prv_bytes = key
|
self.prv_bytes = key
|
||||||
@ -141,39 +122,16 @@ class Destination:
|
|||||||
def loadPublicKey(self, key):
|
def loadPublicKey(self, key):
|
||||||
if self.type != Destination.SINGLE:
|
if self.type != Destination.SINGLE:
|
||||||
raise TypeError("Only the \"single\" destination type can hold a public key")
|
raise TypeError("Only the \"single\" destination type can hold a public key")
|
||||||
|
else:
|
||||||
self.pub_bytes = key
|
raise TypeError("A single destination holds keys through an Identity instance")
|
||||||
self.pub = load_der_public_key(self.pub_bytes, backend=default_backend())
|
|
||||||
|
|
||||||
|
|
||||||
def encrypt(self, plaintext):
|
def encrypt(self, plaintext):
|
||||||
if self.type == Destination.PLAIN:
|
if self.type == Destination.PLAIN:
|
||||||
return plaintext
|
return plaintext
|
||||||
|
|
||||||
if self.type == Destination.SINGLE and self.prv != None:
|
if self.type == Destination.SINGLE and self.identity != None:
|
||||||
chunksize = (Destination.KEYSIZE-Destination.PADDINGSIZE)/8
|
return self.identity.encrypt(plaintext)
|
||||||
chunks = int(math.ceil(len(plaintext)/(float(chunksize))))
|
|
||||||
print("Plaintext size is "+str(len(plaintext))+", with "+str(chunks)+" chunks")
|
|
||||||
|
|
||||||
ciphertext = "";
|
|
||||||
for chunk in range(chunks):
|
|
||||||
start = chunk*chunksize
|
|
||||||
end = (chunk+1)*chunksize
|
|
||||||
if (chunk+1)*chunksize > len(plaintext):
|
|
||||||
end = len(plaintext)
|
|
||||||
|
|
||||||
print("Processing chunk "+str(chunk+1)+" of "+str(chunks)+". Starting at "+str(start)+" and stopping at "+str(end)+". The length is "+str(len(plaintext[start:end])))
|
|
||||||
|
|
||||||
ciphertext += self.pub.encrypt(
|
|
||||||
plaintext[start:end],
|
|
||||||
padding.OAEP(
|
|
||||||
mgf=padding.MGF1(algorithm=hashes.SHA1()),
|
|
||||||
algorithm=hashes.SHA1(),
|
|
||||||
label=None
|
|
||||||
)
|
|
||||||
)
|
|
||||||
print("Plaintext encrypted, ciphertext length is "+str(len(ciphertext))+" bytes.")
|
|
||||||
return ciphertext
|
|
||||||
|
|
||||||
if self.type == Destination.GROUP and self.prv != None:
|
if self.type == Destination.GROUP and self.prv != None:
|
||||||
try:
|
try:
|
||||||
@ -186,44 +144,21 @@ class Destination:
|
|||||||
if self.type == Destination.PLAIN:
|
if self.type == Destination.PLAIN:
|
||||||
return ciphertext
|
return ciphertext
|
||||||
|
|
||||||
if self.type == Destination.SINGLE and self.prv != None:
|
if self.type == Destination.SINGLE and self.identity != None:
|
||||||
print("Ciphertext length is "+str(len(ciphertext))+". ")
|
return self.identity.decrypt(ciphertext)
|
||||||
chunksize = (Destination.KEYSIZE)/8
|
|
||||||
chunks = int(math.ceil(len(ciphertext)/(float(chunksize))))
|
|
||||||
|
|
||||||
plaintext = "";
|
|
||||||
for chunk in range(chunks):
|
|
||||||
start = chunk*chunksize
|
|
||||||
end = (chunk+1)*chunksize
|
|
||||||
if (chunk+1)*chunksize > len(ciphertext):
|
|
||||||
end = len(ciphertext)
|
|
||||||
|
|
||||||
print("Processing chunk "+str(chunk+1)+" of "+str(chunks)+". Starting at "+str(start)+" and stopping at "+str(end)+". The length is "+str(len(ciphertext[start:end])))
|
|
||||||
|
|
||||||
plaintext += self.prv.decrypt(
|
|
||||||
ciphertext[start:end],
|
|
||||||
padding.OAEP(
|
|
||||||
mgf=padding.MGF1(algorithm=hashes.SHA1()),
|
|
||||||
algorithm=hashes.SHA1(),
|
|
||||||
label=None
|
|
||||||
)
|
|
||||||
)
|
|
||||||
return plaintext;
|
|
||||||
|
|
||||||
if self.type == Destination.GROUP:
|
if self.type == Destination.GROUP:
|
||||||
return self.prv.decrypt(base64.urlsafe_b64encode(ciphertext))
|
return self.prv.decrypt(base64.urlsafe_b64encode(ciphertext))
|
||||||
|
|
||||||
|
|
||||||
def sign(self, message):
|
def sign(self, message):
|
||||||
if self.type == Destination.SINGLE and self.prv != None:
|
if self.type == Destination.SINGLE and self.identity != None:
|
||||||
signer = self.prv.signer(
|
return self.identity.sign(message)
|
||||||
padding.PSS(
|
|
||||||
mgf=padding.MGF1(hashes.SHA256()),
|
|
||||||
salt_length=padding.PSS.MAX_LENGTH
|
|
||||||
),
|
|
||||||
hashes.SHA256()
|
|
||||||
)
|
|
||||||
signer.update(message)
|
|
||||||
return signer.finalize()
|
|
||||||
else:
|
else:
|
||||||
return None
|
return None
|
||||||
|
|
||||||
|
|
||||||
|
# Creates an announce packet for this destination.
|
||||||
|
# Application specific data can be added to the announce.
|
||||||
|
def announce(self,app_data=None):
|
||||||
|
pass
|
||||||
|
@ -17,9 +17,14 @@ class FlexPE:
|
|||||||
configpath = configdir+"/config"
|
configpath = configdir+"/config"
|
||||||
|
|
||||||
|
|
||||||
def __init__(self):
|
def __init__(self,config=None):
|
||||||
if os.path.isfile(FlexPE.configpath):
|
if config != None:
|
||||||
self.config = ConfigObj(FlexPE.configpath)
|
self.configpath = config
|
||||||
|
else:
|
||||||
|
self.configpath = FlexPE.configpath
|
||||||
|
|
||||||
|
if os.path.isfile(self.configpath):
|
||||||
|
self.config = ConfigObj(self.configpath)
|
||||||
else:
|
else:
|
||||||
print("Could not load config file, creating default configuration...")
|
print("Could not load config file, creating default configuration...")
|
||||||
self.createDefaultConfig()
|
self.createDefaultConfig()
|
||||||
|
145
FPE/Identity.py
145
FPE/Identity.py
@ -1,3 +1,10 @@
|
|||||||
|
import base64
|
||||||
|
import math
|
||||||
|
from cryptography.hazmat.primitives import hashes
|
||||||
|
from cryptography.hazmat.backends import default_backend
|
||||||
|
from cryptography.hazmat.primitives import serialization
|
||||||
|
from cryptography.hazmat.primitives.asymmetric import rsa
|
||||||
|
from cryptography.hazmat.primitives.asymmetric import padding
|
||||||
|
|
||||||
class Identity:
|
class Identity:
|
||||||
# Configure key size
|
# Configure key size
|
||||||
@ -5,3 +12,141 @@ class Identity:
|
|||||||
|
|
||||||
# Padding size, not configurable
|
# Padding size, not configurable
|
||||||
PADDINGSIZE= 336;
|
PADDINGSIZE= 336;
|
||||||
|
|
||||||
|
def __init__(self):
|
||||||
|
# Initialize keys to none
|
||||||
|
self.prv = None
|
||||||
|
self.pub = None
|
||||||
|
self.prv_bytes = None
|
||||||
|
self.pub_bytes = None
|
||||||
|
self.hash = None
|
||||||
|
self.hexhash = None
|
||||||
|
|
||||||
|
self.createKeys()
|
||||||
|
|
||||||
|
@staticmethod
|
||||||
|
def getHash(pub_key):
|
||||||
|
digest = hashes.Hash(hashes.SHA256(), backend=default_backend())
|
||||||
|
digest.update(pub_key)
|
||||||
|
|
||||||
|
return digest.finalize()[:10]
|
||||||
|
|
||||||
|
def createKeys(self):
|
||||||
|
self.prv = rsa.generate_private_key(
|
||||||
|
public_exponent=65337,
|
||||||
|
key_size=Identity.KEYSIZE,
|
||||||
|
backend=default_backend()
|
||||||
|
)
|
||||||
|
self.prv_bytes = self.prv.private_bytes(
|
||||||
|
encoding=serialization.Encoding.DER,
|
||||||
|
format=serialization.PrivateFormat.PKCS8,
|
||||||
|
encryption_algorithm=serialization.NoEncryption()
|
||||||
|
)
|
||||||
|
self.pub = self.prv.public_key()
|
||||||
|
self.pub_bytes = self.pub.public_bytes(
|
||||||
|
encoding=serialization.Encoding.DER,
|
||||||
|
format=serialization.PublicFormat.SubjectPublicKeyInfo
|
||||||
|
)
|
||||||
|
|
||||||
|
self.hash = Identity.getHash(self.pub_bytes)
|
||||||
|
self.hexhash = self.hash.encode("hex_codec")
|
||||||
|
|
||||||
|
print("Identity keys created, private length is "+str(len(self.prv_bytes)))
|
||||||
|
print("Identity keys created, public length is "+str(len(self.pub_bytes)))
|
||||||
|
|
||||||
|
def getPrivateKey(self):
|
||||||
|
return self.prv_bytes
|
||||||
|
|
||||||
|
def getPublicKey(self):
|
||||||
|
return self.pub_bytes
|
||||||
|
|
||||||
|
def loadPrivateKey(self, key):
|
||||||
|
self.prv_bytes = key
|
||||||
|
self.prv = serialization.load_der_private_key(self.prv_bytes, password=None,backend=default_backend())
|
||||||
|
self.pub = self.prv.public_key()
|
||||||
|
self.pub_bytes = self.pub.public_bytes(
|
||||||
|
encoding=serialization.Encoding.DER,
|
||||||
|
format=serialization.PublicFormat.SubjectPublicKeyInfo
|
||||||
|
)
|
||||||
|
|
||||||
|
def loadPublicKey(self, key):
|
||||||
|
self.pub_bytes = key
|
||||||
|
self.pub = load_der_public_key(self.pub_bytes, backend=default_backend())
|
||||||
|
|
||||||
|
def saveIdentity(self):
|
||||||
|
pass
|
||||||
|
|
||||||
|
def loadIdentity(self):
|
||||||
|
pass
|
||||||
|
|
||||||
|
def encrypt(self, plaintext):
|
||||||
|
if self.prv != None:
|
||||||
|
chunksize = (Identity.KEYSIZE-Identity.PADDINGSIZE)/8
|
||||||
|
chunks = int(math.ceil(len(plaintext)/(float(chunksize))))
|
||||||
|
print("Plaintext size is "+str(len(plaintext))+", with "+str(chunks)+" chunks")
|
||||||
|
|
||||||
|
ciphertext = "";
|
||||||
|
for chunk in range(chunks):
|
||||||
|
start = chunk*chunksize
|
||||||
|
end = (chunk+1)*chunksize
|
||||||
|
if (chunk+1)*chunksize > len(plaintext):
|
||||||
|
end = len(plaintext)
|
||||||
|
|
||||||
|
print("Processing chunk "+str(chunk+1)+" of "+str(chunks)+". Starting at "+str(start)+" and stopping at "+str(end)+". The length is "+str(len(plaintext[start:end])))
|
||||||
|
|
||||||
|
ciphertext += self.pub.encrypt(
|
||||||
|
plaintext[start:end],
|
||||||
|
padding.OAEP(
|
||||||
|
mgf=padding.MGF1(algorithm=hashes.SHA1()),
|
||||||
|
algorithm=hashes.SHA1(),
|
||||||
|
label=None
|
||||||
|
)
|
||||||
|
)
|
||||||
|
print("Plaintext encrypted, ciphertext length is "+str(len(ciphertext))+" bytes.")
|
||||||
|
return ciphertext
|
||||||
|
else:
|
||||||
|
raise KeyError("Encryption failed because identity does not hold a private key")
|
||||||
|
|
||||||
|
|
||||||
|
def decrypt(self, ciphertext):
|
||||||
|
if self.prv != None:
|
||||||
|
print("Ciphertext length is "+str(len(ciphertext))+". ")
|
||||||
|
chunksize = (Identity.KEYSIZE)/8
|
||||||
|
chunks = int(math.ceil(len(ciphertext)/(float(chunksize))))
|
||||||
|
|
||||||
|
plaintext = "";
|
||||||
|
for chunk in range(chunks):
|
||||||
|
start = chunk*chunksize
|
||||||
|
end = (chunk+1)*chunksize
|
||||||
|
if (chunk+1)*chunksize > len(ciphertext):
|
||||||
|
end = len(ciphertext)
|
||||||
|
|
||||||
|
print("Processing chunk "+str(chunk+1)+" of "+str(chunks)+". Starting at "+str(start)+" and stopping at "+str(end)+". The length is "+str(len(ciphertext[start:end])))
|
||||||
|
|
||||||
|
plaintext += self.prv.decrypt(
|
||||||
|
ciphertext[start:end],
|
||||||
|
padding.OAEP(
|
||||||
|
mgf=padding.MGF1(algorithm=hashes.SHA1()),
|
||||||
|
algorithm=hashes.SHA1(),
|
||||||
|
label=None
|
||||||
|
)
|
||||||
|
)
|
||||||
|
return plaintext;
|
||||||
|
else:
|
||||||
|
raise KeyError("Decryption failed because identity does not hold a private key")
|
||||||
|
|
||||||
|
|
||||||
|
def sign(self, message):
|
||||||
|
if self.prv != None:
|
||||||
|
signer = self.prv.signer(
|
||||||
|
padding.PSS(
|
||||||
|
mgf=padding.MGF1(hashes.SHA256()),
|
||||||
|
salt_length=padding.PSS.MAX_LENGTH
|
||||||
|
),
|
||||||
|
hashes.SHA256()
|
||||||
|
)
|
||||||
|
signer.update(message)
|
||||||
|
return signer.finalize()
|
||||||
|
else:
|
||||||
|
raise KeyError("Signing failed because identity does not hold a private key")
|
||||||
|
|
||||||
|
16
t.py
16
t.py
@ -3,6 +3,7 @@
|
|||||||
# from FPE import FlexPE
|
# from FPE import FlexPE
|
||||||
from FPE import *
|
from FPE import *
|
||||||
# from FPE import Destination
|
# from FPE import Destination
|
||||||
|
import os
|
||||||
import time
|
import time
|
||||||
|
|
||||||
def testCallback(message, receiver):
|
def testCallback(message, receiver):
|
||||||
@ -11,17 +12,20 @@ def testCallback(message, receiver):
|
|||||||
print("----------")
|
print("----------")
|
||||||
|
|
||||||
|
|
||||||
|
#fpe = FlexPE(config=os.path.expanduser("~")+"/.flexpe/config.test")
|
||||||
fpe = FlexPE()
|
fpe = FlexPE()
|
||||||
d1=Destination(Destination.IN, Destination.SINGLE, "messenger", "markqvist")
|
identity = Identity()
|
||||||
d1.createKey()
|
|
||||||
|
d1=Destination(identity, Destination.IN, Destination.SINGLE, "messenger", "user")
|
||||||
d1.setCallback(testCallback)
|
d1.setCallback(testCallback)
|
||||||
|
|
||||||
d2=Destination(Destination.IN, Destination.PLAIN, "plainchat", "markqvist")
|
# d2=Destination(identity, Destination.IN, Destination.PLAIN, "plainchat", "markqvist")
|
||||||
d2.setCallback(testCallback)
|
# d2.setCallback(testCallback)
|
||||||
|
|
||||||
|
print identity.hexhash
|
||||||
print d1.name
|
print d1.name
|
||||||
print d1.hexhash
|
print d1.hexhash
|
||||||
print d1.pub
|
print d1.identity.pub
|
||||||
print "---"
|
print "---"
|
||||||
print
|
print
|
||||||
|
|
||||||
@ -32,7 +36,7 @@ for x in range(300):
|
|||||||
msg += "a"
|
msg += "a"
|
||||||
signed = d1.sign(msg)
|
signed = d1.sign(msg)
|
||||||
sl = len(signed)
|
sl = len(signed)
|
||||||
pl = len(d1.pub_bytes)
|
pl = len(d1.identity.pub_bytes)
|
||||||
print("Signature length is "+str(sl))
|
print("Signature length is "+str(sl))
|
||||||
print("Minimum announce is "+str(pl+sl+8))
|
print("Minimum announce is "+str(pl+sl+8))
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user