2016-03-23 23:26:57 +01:00
|
|
|
from binascii import hexlify
|
2017-03-02 15:03:08 +01:00
|
|
|
from bmconfigparser import BMConfigParser
|
2013-01-16 17:52:52 +01:00
|
|
|
import pyelliptic
|
2014-05-21 11:59:08 +02:00
|
|
|
from pyelliptic import arithmetic as a, OpenSSL
|
2013-01-16 17:52:52 +01:00
|
|
|
def makeCryptor(privkey):
|
2014-07-15 00:01:56 +02:00
|
|
|
private_key = a.changebase(privkey, 16, 256, minlen=32)
|
|
|
|
public_key = pointMult(private_key)
|
|
|
|
privkey_bin = '\x02\xca\x00\x20' + private_key
|
|
|
|
pubkey_bin = '\x02\xca\x00\x20' + public_key[1:-32] + '\x00\x20' + public_key[-32:]
|
|
|
|
cryptor = pyelliptic.ECC(curve='secp256k1',privkey=privkey_bin,pubkey=pubkey_bin)
|
|
|
|
return cryptor
|
2013-01-16 17:52:52 +01:00
|
|
|
def hexToPubkey(pubkey):
|
2014-07-15 00:01:56 +02:00
|
|
|
pubkey_raw = a.changebase(pubkey[2:],16,256,minlen=64)
|
|
|
|
pubkey_bin = '\x02\xca\x00 '+pubkey_raw[:32]+'\x00 '+pubkey_raw[32:]
|
|
|
|
return pubkey_bin
|
2013-01-16 17:52:52 +01:00
|
|
|
def makePubCryptor(pubkey):
|
2014-07-15 00:01:56 +02:00
|
|
|
pubkey_bin = hexToPubkey(pubkey)
|
|
|
|
return pyelliptic.ECC(curve='secp256k1',pubkey=pubkey_bin)
|
2013-01-16 17:52:52 +01:00
|
|
|
# Converts hex private key into hex public key
|
|
|
|
def privToPub(privkey):
|
2014-07-15 00:01:56 +02:00
|
|
|
private_key = a.changebase(privkey, 16, 256, minlen=32)
|
|
|
|
public_key = pointMult(private_key)
|
2016-03-23 23:26:57 +01:00
|
|
|
return hexlify(public_key)
|
2013-01-16 17:52:52 +01:00
|
|
|
# Encrypts message with hex public key
|
|
|
|
def encrypt(msg,hexPubkey):
|
2014-07-15 00:01:56 +02:00
|
|
|
return pyelliptic.ECC(curve='secp256k1').encrypt(msg,hexToPubkey(hexPubkey))
|
2013-01-16 17:52:52 +01:00
|
|
|
# Decrypts message with hex private key
|
|
|
|
def decrypt(msg,hexPrivkey):
|
2014-07-15 00:01:56 +02:00
|
|
|
return makeCryptor(hexPrivkey).decrypt(msg)
|
2013-01-18 23:38:09 +01:00
|
|
|
# Decrypts message with an existing pyelliptic.ECC.ECC object
|
2013-01-16 17:52:52 +01:00
|
|
|
def decryptFast(msg,cryptor):
|
2014-07-15 00:01:56 +02:00
|
|
|
return cryptor.decrypt(msg)
|
2013-01-16 17:52:52 +01:00
|
|
|
# Signs with hex private key
|
|
|
|
def sign(msg,hexPrivkey):
|
2015-03-27 20:25:32 +01:00
|
|
|
# pyelliptic is upgrading from SHA1 to SHA256 for signing. We must
|
|
|
|
# upgrade PyBitmessage gracefully.
|
|
|
|
# https://github.com/yann2192/pyelliptic/pull/33
|
|
|
|
# More discussion: https://github.com/yann2192/pyelliptic/issues/32
|
2017-03-02 15:03:08 +01:00
|
|
|
digestAlg = BMConfigParser().safeGet('bitmessagesettings', 'digestalg', 'sha1')
|
|
|
|
if digestAlg == "sha1":
|
|
|
|
# SHA1, this will eventually be deprecated
|
|
|
|
return makeCryptor(hexPrivkey).sign(msg, digest_alg=OpenSSL.digest_ecdsa_sha1)
|
|
|
|
elif digestAlg == "sha256":
|
|
|
|
# SHA256. Eventually this will become the default
|
|
|
|
return makeCryptor(hexPrivkey).sign(msg, digest_alg=OpenSSL.EVP_sha256)
|
|
|
|
else:
|
|
|
|
raise ValueError("Unknown digest algorithm %s" % (digestAlgo))
|
2013-01-16 17:52:52 +01:00
|
|
|
# Verifies with hex public key
|
|
|
|
def verify(msg,sig,hexPubkey):
|
2015-03-27 20:25:32 +01:00
|
|
|
# As mentioned above, we must upgrade gracefully to use SHA256. So
|
|
|
|
# let us check the signature using both SHA1 and SHA256 and if one
|
|
|
|
# of them passes then we will be satisfied. Eventually this can
|
|
|
|
# be simplified and we'll only check with SHA256.
|
2014-08-27 09:14:32 +02:00
|
|
|
try:
|
2017-01-13 12:02:34 +01:00
|
|
|
sigVerifyPassed = makePubCryptor(hexPubkey).verify(sig,msg,digest_alg=OpenSSL.digest_ecdsa_sha1) # old SHA1 algorithm.
|
2015-03-27 20:25:32 +01:00
|
|
|
except:
|
|
|
|
sigVerifyPassed = False
|
|
|
|
if sigVerifyPassed:
|
|
|
|
# The signature check passed using SHA1
|
|
|
|
return True
|
|
|
|
# The signature check using SHA1 failed. Let us try it with SHA256.
|
|
|
|
try:
|
|
|
|
return makePubCryptor(hexPubkey).verify(sig,msg,digest_alg=OpenSSL.EVP_sha256)
|
2014-08-27 09:14:32 +02:00
|
|
|
except:
|
|
|
|
return False
|
2014-05-21 11:59:08 +02:00
|
|
|
|
|
|
|
# Does an EC point multiplication; turns a private key into a public key.
|
|
|
|
def pointMult(secret):
|
2015-02-06 22:31:23 +01:00
|
|
|
while True:
|
|
|
|
try:
|
|
|
|
"""
|
|
|
|
Evidently, this type of error can occur very rarely:
|
|
|
|
|
|
|
|
File "highlevelcrypto.py", line 54, in pointMult
|
|
|
|
group = OpenSSL.EC_KEY_get0_group(k)
|
|
|
|
WindowsError: exception: access violation reading 0x0000000000000008
|
|
|
|
"""
|
|
|
|
k = OpenSSL.EC_KEY_new_by_curve_name(OpenSSL.get_curve('secp256k1'))
|
|
|
|
priv_key = OpenSSL.BN_bin2bn(secret, 32, None)
|
|
|
|
group = OpenSSL.EC_KEY_get0_group(k)
|
|
|
|
pub_key = OpenSSL.EC_POINT_new(group)
|
|
|
|
|
|
|
|
OpenSSL.EC_POINT_mul(group, pub_key, priv_key, None, None, None)
|
|
|
|
OpenSSL.EC_KEY_set_private_key(k, priv_key)
|
|
|
|
OpenSSL.EC_KEY_set_public_key(k, pub_key)
|
|
|
|
|
|
|
|
size = OpenSSL.i2o_ECPublicKey(k, None)
|
|
|
|
mb = OpenSSL.create_string_buffer(size)
|
|
|
|
OpenSSL.i2o_ECPublicKey(k, OpenSSL.byref(OpenSSL.pointer(mb)))
|
|
|
|
|
|
|
|
OpenSSL.EC_POINT_free(pub_key)
|
|
|
|
OpenSSL.BN_free(priv_key)
|
|
|
|
OpenSSL.EC_KEY_free(k)
|
|
|
|
return mb.raw
|
|
|
|
|
|
|
|
except Exception as e:
|
|
|
|
import traceback
|
|
|
|
import time
|
|
|
|
traceback.print_exc()
|
|
|
|
time.sleep(0.2)
|
2014-07-15 00:01:56 +02:00
|
|
|
|