mirror of https://github.com/r4sas/PBinCLI
R4SAS
8 years ago
commit
a46f03ec83
8 changed files with 222 additions and 0 deletions
@ -0,0 +1,4 @@
@@ -0,0 +1,4 @@
|
||||
PBinCLI |
||||
======== |
||||
|
||||
PrivateBin CLI (in development) |
@ -0,0 +1,40 @@
@@ -0,0 +1,40 @@
|
||||
#! /usr/bin/env python3 |
||||
import os |
||||
import sys |
||||
import argparse |
||||
|
||||
import pbincli.actions |
||||
from pbincli.utils import PBinCLIException |
||||
|
||||
def main(): |
||||
parser = argparse.ArgumentParser() |
||||
subparsers = parser.add_subparsers(title="actions", help="List of commands") |
||||
# a send command |
||||
send_parser = subparsers.add_parser("send", description="Send data to PrivateBin instance", usage="""%(prog)s --cert data/user_at_mail.i2p.crt --private-key data/priv_key.pem --signer-id user@mail.i2p""") |
||||
send_parser.add_argument("-b", "--burn", default=False, action="store_true", help="Burn after reading") |
||||
send_parser.add_argument("-d", "--discus", default=False, action="store_true", help="Open discussion") |
||||
send_parser.add_argument("-e", "--expire", default="1day", action="store", help="Expiration of paste") |
||||
send_parser.add_argument("-f", "--format", default="plaintext", action="store", help="Format of text paste") |
||||
send_parser.add_argument("-p", "--password", default=None, help="RSA private key (default: data/priv_key.pem)") |
||||
send_parser.add_argument("filename", type=argparse.FileType('r'), help="Filename (example: image.jpg)") |
||||
send_parser.set_defaults(func=pbincli.actions.send) |
||||
'''# a get command |
||||
get_parser = subparsers.add_parser("get", description="Recieve data from PrivateBin instance", usage="""echo $YOUR_PASSWORD | %(prog)s --netdb /path/to/netDb --private-key data/priv_key.pem --outfile output/i2pseeds.su3 --signer-id user@mail.i2p""") |
||||
get_parser.add_argument("--signer-id", required=True, help="Identifier of certificate (example: user@mail.i2p)") |
||||
get_parser.add_argument("--private-key", default="data/priv_key.pem", help="RSA private key (default: data/priv_key.pem)") |
||||
get_parser.add_argument("-o", "--outfile", default="output/i2pseeds.su3", help="Output file (default: output/i2pseeds.su3)") |
||||
get_parser.add_argument("--netdb", required=True, help="Path to netDb folder (example: ~/.i2pd/netDb)") |
||||
get_parser.set_defaults(func=pyseeder.actions.reseed)''' |
||||
# parse arguments |
||||
args = parser.parse_args() |
||||
if hasattr(args, "func"): |
||||
try: |
||||
args.func(args) |
||||
except PBinCLIException as pe: |
||||
print("PBinCLI error: {}".format(pe)) |
||||
sys.exit(1) |
||||
else: |
||||
parser.print_help() |
||||
|
||||
if __name__ == "__main__": |
||||
main() |
@ -0,0 +1,7 @@
@@ -0,0 +1,7 @@
|
||||
"""Action functions for argparser""" |
||||
import pbincli.sjcl_gcm |
||||
import pbincli.actions |
||||
from pbincli.utils import PBinCLIException, check_readable, check_writable |
||||
|
||||
def send(args): |
||||
print("Meow!") |
@ -0,0 +1,152 @@
@@ -0,0 +1,152 @@
|
||||
#!/usr/bin/env python |
||||
# -*- coding: utf-8 -*- |
||||
|
||||
""" |
||||
|
||||
|
||||
Edited SJCL.py library (https://github.com/berlincode/sjcl/) |
||||
for AES.MODE_GCM support, work begin. |
||||
|
||||
pip3.5 install pycryptodome |
||||
|
||||
|
||||
|
||||
""" |
||||
|
||||
from Crypto.Hash import SHA256, HMAC |
||||
#pip3.5 install pycryptodome |
||||
from Crypto.Protocol.KDF import PBKDF2 |
||||
from Crypto.Cipher import AES |
||||
from Crypto.Random import get_random_bytes |
||||
import base64 |
||||
|
||||
|
||||
def truncate_iv(iv, ol, tlen): # ol and tlen in bits |
||||
ivl = len(iv) # iv length in bytes |
||||
ol = (ol - tlen) // 8 |
||||
|
||||
# "compute the length of the length" (see gcm.js) |
||||
L = 2 |
||||
while (L < 4) and ((ol >> (8*L))) > 0: |
||||
L += 1 |
||||
if L < 15 - ivl: |
||||
L = 15 - ivl |
||||
|
||||
return iv[:(15-L)] |
||||
|
||||
|
||||
def check_mode_gcm(): |
||||
# checks if pycrypto has support for gcm |
||||
try: |
||||
AES.MODE_GCM |
||||
except: |
||||
raise Exception( |
||||
"Pycrypto does not seem to support MODE_gcm. " + |
||||
"You need a version >= 2.7a1 (or a special branch)." |
||||
) |
||||
|
||||
|
||||
class SJCL(object): |
||||
|
||||
def __init__(self): |
||||
self.salt_size = 8 # bytes |
||||
self.tag_size = 16 # bytes |
||||
self.mac_size = 16 # bytes; mac = message authentication code (MAC) |
||||
self.prf = lambda p, s: HMAC.new(p, s, SHA256).digest() |
||||
|
||||
def decrypt(self, data, passphrase): |
||||
check_mode_gcm() # check gcm support |
||||
|
||||
if data["cipher"] != "aes": |
||||
raise Exception("only aes cipher supported") |
||||
print(data["mode"]) |
||||
if data["mode"] != "gcm": |
||||
raise Exception("unknown mode(!=gcm)") |
||||
|
||||
if data["adata"] != "": |
||||
raise Exception("additional authentication data not equal ''") |
||||
|
||||
if data["v"] != 1: |
||||
raise Exception("only version 1 is currently supported") |
||||
|
||||
if data["ts"] != self.tag_size * 8: |
||||
raise Exception("desired tag length != %d" % (self.tag_size * 8)) |
||||
|
||||
salt = base64.b64decode(data["salt"]) |
||||
|
||||
# print "salt", hex_string(salt) |
||||
if len(salt) != self.salt_size: |
||||
raise Exception("salt should be %d bytes long" % self.salt_size) |
||||
|
||||
dkLen = data["ks"]//8 |
||||
if dkLen != 16: |
||||
raise Exception("key length should be 16 bytes") |
||||
|
||||
key = PBKDF2( |
||||
passphrase, |
||||
salt, |
||||
count=data['iter'], |
||||
dkLen=dkLen, |
||||
prf=self.prf |
||||
) |
||||
# print "key", hex_string(key) |
||||
|
||||
ciphertext = base64.b64decode(data["ct"]) |
||||
iv = base64.b64decode(data["iv"]) |
||||
# print AES.block_size |
||||
|
||||
nonce = truncate_iv(iv, len(ciphertext)*8, data["ts"]) |
||||
|
||||
# split tag from ciphertext (tag was simply appended to ciphertext) |
||||
mac = ciphertext[-(data["ts"]//8):] |
||||
# print len(ciphertext) |
||||
ciphertext = ciphertext[:-(data["ts"]//8)] |
||||
# print len(ciphertext) |
||||
# print len(tag) |
||||
|
||||
# print "len", len(nonce) |
||||
cipher = AES.new(key, AES.MODE_GCM, nonce) |
||||
plaintext = cipher.decrypt(ciphertext) |
||||
print(mac) |
||||
# cipher.verify(mac) |
||||
|
||||
return plaintext |
||||
|
||||
def encrypt(self, plaintext, passphrase, count=1000, dkLen=16): |
||||
# dkLen = key length in bytes |
||||
|
||||
check_mode_gcm() # check gcm support |
||||
|
||||
salt = get_random_bytes(self.salt_size) |
||||
iv = get_random_bytes(16) # TODO dkLen? |
||||
|
||||
key = PBKDF2(passphrase, salt, count=count, dkLen=dkLen, prf=self.prf) |
||||
|
||||
# TODO plaintext padding? |
||||
nonce = truncate_iv(iv, len(plaintext) * 8, self.tag_size * 8) |
||||
# print len(nonce) |
||||
|
||||
cipher = AES.new( |
||||
key, |
||||
AES.MODE_GCM, |
||||
nonce, |
||||
mac_len=self.mac_size |
||||
) |
||||
|
||||
ciphertext = cipher.encrypt(plaintext) |
||||
mac = cipher.digest() |
||||
|
||||
ciphertext = ciphertext + mac |
||||
|
||||
return { |
||||
"salt": base64.b64encode(salt), |
||||
"iter": count, |
||||
"ks": dkLen*8, |
||||
"ct": base64.b64encode(ciphertext), |
||||
"iv": base64.b64encode(iv), |
||||
"cipher": "aes", |
||||
"mode": "gcm", |
||||
"adata": "", |
||||
"v": 1, |
||||
"ts": self.tag_size * 8 |
||||
} |
@ -0,0 +1,15 @@
@@ -0,0 +1,15 @@
|
||||
"""Various code""" |
||||
import os |
||||
|
||||
class PBinCLIException(Exception): |
||||
pass |
||||
|
||||
def check_readable(f): |
||||
"""Checks if path exists and readable""" |
||||
if not os.path.exists(f) or not os.access(f, os.R_OK): |
||||
raise PBinCLIException("Error accessing path: {}".format(f)) |
||||
|
||||
def check_writable(f): |
||||
"""Checks if path is writable""" |
||||
if not os.access(os.path.dirname(f) or ".", os.W_OK): |
||||
raise PBinCLIException("Path is not writable: {}".format(f)) |
Loading…
Reference in new issue