2018-05-25 08:03:25 +02:00
|
|
|
# Copyright (c) 2016-2017, Neil Booth
|
|
|
|
# Copyright (c) 2018, LBRY Inc.
|
|
|
|
#
|
|
|
|
# All rights reserved.
|
|
|
|
#
|
|
|
|
# See the file "LICENCE" for information about the copyright
|
|
|
|
# and warranty status of this software.
|
|
|
|
|
|
|
|
""" Cryptography hash functions and related classes. """
|
|
|
|
|
|
|
|
import os
|
|
|
|
import base64
|
|
|
|
import hashlib
|
|
|
|
import hmac
|
|
|
|
from binascii import hexlify, unhexlify
|
|
|
|
from cryptography.hazmat.primitives.ciphers import Cipher, modes
|
|
|
|
from cryptography.hazmat.primitives.ciphers.algorithms import AES
|
|
|
|
from cryptography.hazmat.primitives.padding import PKCS7
|
|
|
|
from cryptography.hazmat.backends import default_backend
|
|
|
|
|
|
|
|
from torba.util import bytes_to_int, int_to_bytes
|
2018-07-15 03:34:07 +02:00
|
|
|
from torba.constants import NULL_HASH32
|
2018-05-25 08:03:25 +02:00
|
|
|
|
|
|
|
|
2018-07-29 02:52:54 +02:00
|
|
|
class TXRef:
|
2018-07-15 03:34:07 +02:00
|
|
|
|
|
|
|
__slots__ = '_id', '_hash'
|
|
|
|
|
|
|
|
def __init__(self):
|
|
|
|
self._id = None
|
|
|
|
self._hash = None
|
|
|
|
|
|
|
|
@property
|
|
|
|
def id(self):
|
|
|
|
return self._id
|
|
|
|
|
|
|
|
@property
|
|
|
|
def hash(self):
|
|
|
|
return self._hash
|
|
|
|
|
|
|
|
@property
|
|
|
|
def is_null(self):
|
|
|
|
return self.hash == NULL_HASH32
|
|
|
|
|
|
|
|
|
|
|
|
class TXRefImmutable(TXRef):
|
|
|
|
|
|
|
|
__slots__ = ()
|
|
|
|
|
|
|
|
@classmethod
|
|
|
|
def from_hash(cls, tx_hash): # type: (bytes) -> TXRefImmutable
|
|
|
|
ref = cls()
|
|
|
|
ref._hash = tx_hash
|
|
|
|
ref._id = hexlify(tx_hash[::-1]).decode()
|
|
|
|
return ref
|
|
|
|
|
|
|
|
@classmethod
|
|
|
|
def from_id(cls, tx_id): # type: (str) -> TXRefImmutable
|
|
|
|
ref = cls()
|
|
|
|
ref._id = tx_id
|
|
|
|
ref._hash = unhexlify(tx_id)[::-1]
|
|
|
|
return ref
|
|
|
|
|
|
|
|
|
2018-05-25 08:03:25 +02:00
|
|
|
def sha256(x):
|
|
|
|
""" Simple wrapper of hashlib sha256. """
|
2018-07-29 02:52:54 +02:00
|
|
|
return hashlib.sha256(x).digest()
|
2018-05-25 08:03:25 +02:00
|
|
|
|
|
|
|
|
|
|
|
def sha512(x):
|
|
|
|
""" Simple wrapper of hashlib sha512. """
|
2018-07-29 02:52:54 +02:00
|
|
|
return hashlib.sha512(x).digest()
|
2018-05-25 08:03:25 +02:00
|
|
|
|
|
|
|
|
|
|
|
def ripemd160(x):
|
|
|
|
""" Simple wrapper of hashlib ripemd160. """
|
2018-07-29 02:52:54 +02:00
|
|
|
h = hashlib.new('ripemd160')
|
2018-05-25 08:03:25 +02:00
|
|
|
h.update(x)
|
|
|
|
return h.digest()
|
|
|
|
|
|
|
|
|
|
|
|
def double_sha256(x):
|
|
|
|
""" SHA-256 of SHA-256, as used extensively in bitcoin. """
|
|
|
|
return sha256(sha256(x))
|
|
|
|
|
|
|
|
|
|
|
|
def hmac_sha512(key, msg):
|
|
|
|
""" Use SHA-512 to provide an HMAC. """
|
2018-07-29 02:52:54 +02:00
|
|
|
return hmac.new(key, msg, hashlib.sha512).digest()
|
2018-05-25 08:03:25 +02:00
|
|
|
|
|
|
|
|
|
|
|
def hash160(x):
|
|
|
|
""" RIPEMD-160 of SHA-256.
|
|
|
|
Used to make bitcoin addresses from pubkeys. """
|
|
|
|
return ripemd160(sha256(x))
|
|
|
|
|
|
|
|
|
|
|
|
def hash_to_hex_str(x):
|
|
|
|
""" Convert a big-endian binary hash to displayed hex string.
|
|
|
|
Display form of a binary hash is reversed and converted to hex. """
|
|
|
|
return hexlify(reversed(x))
|
|
|
|
|
|
|
|
|
|
|
|
def hex_str_to_hash(x):
|
|
|
|
""" Convert a displayed hex string to a binary hash. """
|
|
|
|
return reversed(unhexlify(x))
|
|
|
|
|
|
|
|
|
2018-09-21 20:49:16 +02:00
|
|
|
def aes_encrypt(secret: str, value: str, init_vector: bytes = None) -> str:
|
|
|
|
if init_vector is not None:
|
|
|
|
assert len(init_vector) == 16
|
2018-09-18 20:32:33 +02:00
|
|
|
else:
|
2018-09-21 20:49:16 +02:00
|
|
|
init_vector = os.urandom(16)
|
|
|
|
key = double_sha256(secret.encode())
|
|
|
|
encryptor = Cipher(AES(key), modes.CBC(init_vector), default_backend()).encryptor()
|
2018-05-25 08:03:25 +02:00
|
|
|
padder = PKCS7(AES.block_size).padder()
|
2018-09-21 20:49:16 +02:00
|
|
|
padded_data = padder.update(value.encode()) + padder.finalize()
|
2018-09-18 20:32:33 +02:00
|
|
|
encrypted_data = encryptor.update(padded_data) + encryptor.finalize()
|
2018-09-21 20:49:16 +02:00
|
|
|
return base64.b64encode(init_vector + encrypted_data).decode()
|
2018-05-25 08:03:25 +02:00
|
|
|
|
|
|
|
|
2018-09-21 20:49:16 +02:00
|
|
|
def aes_decrypt(secret: str, value: str) -> str:
|
|
|
|
data = base64.b64decode(value.encode())
|
|
|
|
key = double_sha256(secret.encode())
|
2018-05-25 08:03:25 +02:00
|
|
|
init_vector, data = data[:16], data[16:]
|
|
|
|
decryptor = Cipher(AES(key), modes.CBC(init_vector), default_backend()).decryptor()
|
|
|
|
unpadder = PKCS7(AES.block_size).unpadder()
|
|
|
|
result = unpadder.update(decryptor.update(data)) + unpadder.finalize()
|
2018-09-21 20:49:16 +02:00
|
|
|
return result.decode()
|
2018-05-25 08:03:25 +02:00
|
|
|
|
|
|
|
|
|
|
|
class Base58Error(Exception):
|
|
|
|
""" Exception used for Base58 errors. """
|
|
|
|
|
|
|
|
|
2018-07-29 02:52:54 +02:00
|
|
|
class Base58:
|
2018-05-25 08:03:25 +02:00
|
|
|
""" Class providing base 58 functionality. """
|
|
|
|
|
|
|
|
chars = u'123456789ABCDEFGHJKLMNPQRSTUVWXYZabcdefghijkmnopqrstuvwxyz'
|
|
|
|
assert len(chars) == 58
|
|
|
|
char_map = {c: n for n, c in enumerate(chars)}
|
|
|
|
|
|
|
|
@classmethod
|
|
|
|
def char_value(cls, c):
|
|
|
|
val = cls.char_map.get(c)
|
|
|
|
if val is None:
|
|
|
|
raise Base58Error('invalid base 58 character "{}"'.format(c))
|
|
|
|
return val
|
|
|
|
|
|
|
|
@classmethod
|
|
|
|
def decode(cls, txt):
|
|
|
|
""" Decodes txt into a big-endian bytearray. """
|
2018-07-26 20:35:44 +02:00
|
|
|
if isinstance(txt, memoryview):
|
2018-06-14 02:57:57 +02:00
|
|
|
txt = str(txt)
|
|
|
|
|
2018-07-26 20:35:44 +02:00
|
|
|
if isinstance(txt, bytes):
|
2018-05-25 08:03:25 +02:00
|
|
|
txt = txt.decode()
|
|
|
|
|
2018-07-26 20:35:44 +02:00
|
|
|
if not isinstance(txt, str):
|
2018-05-25 08:03:25 +02:00
|
|
|
raise TypeError('a string is required')
|
|
|
|
|
|
|
|
if not txt:
|
|
|
|
raise Base58Error('string cannot be empty')
|
|
|
|
|
|
|
|
value = 0
|
|
|
|
for c in txt:
|
|
|
|
value = value * 58 + cls.char_value(c)
|
|
|
|
|
|
|
|
result = int_to_bytes(value)
|
|
|
|
|
|
|
|
# Prepend leading zero bytes if necessary
|
|
|
|
count = 0
|
|
|
|
for c in txt:
|
|
|
|
if c != u'1':
|
|
|
|
break
|
|
|
|
count += 1
|
|
|
|
if count:
|
2018-07-29 02:52:54 +02:00
|
|
|
result = bytes((0,)) * count + result
|
2018-05-25 08:03:25 +02:00
|
|
|
|
|
|
|
return result
|
|
|
|
|
|
|
|
@classmethod
|
|
|
|
def encode(cls, be_bytes):
|
|
|
|
"""Converts a big-endian bytearray into a base58 string."""
|
|
|
|
value = bytes_to_int(be_bytes)
|
|
|
|
|
|
|
|
txt = u''
|
|
|
|
while value:
|
|
|
|
value, mod = divmod(value, 58)
|
|
|
|
txt += cls.chars[mod]
|
|
|
|
|
|
|
|
for byte in be_bytes:
|
|
|
|
if byte != 0:
|
|
|
|
break
|
|
|
|
txt += u'1'
|
|
|
|
|
2018-07-15 03:34:07 +02:00
|
|
|
return txt[::-1]
|
2018-05-25 08:03:25 +02:00
|
|
|
|
|
|
|
@classmethod
|
|
|
|
def decode_check(cls, txt, hash_fn=double_sha256):
|
|
|
|
""" Decodes a Base58Check-encoded string to a payload. The version prefixes it. """
|
|
|
|
be_bytes = cls.decode(txt)
|
|
|
|
result, check = be_bytes[:-4], be_bytes[-4:]
|
|
|
|
if check != hash_fn(result)[:4]:
|
|
|
|
raise Base58Error('invalid base 58 checksum for {}'.format(txt))
|
|
|
|
return result
|
|
|
|
|
|
|
|
@classmethod
|
|
|
|
def encode_check(cls, payload, hash_fn=double_sha256):
|
|
|
|
""" Encodes a payload bytearray (which includes the version byte(s))
|
|
|
|
into a Base58Check string."""
|
|
|
|
be_bytes = payload + hash_fn(payload)[:4]
|
|
|
|
return cls.encode(be_bytes)
|