summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
-rw-r--r--scripts/encryptor.py57
-rw-r--r--src/handlers.rs14
-rw-r--r--tests/route_tests.rs8
3 files changed, 69 insertions, 10 deletions
diff --git a/scripts/encryptor.py b/scripts/encryptor.py
new file mode 100644
index 0000000..008ac51
--- /dev/null
+++ b/scripts/encryptor.py
@@ -0,0 +1,57 @@
1import os
2from cryptography.hazmat.primitives.ciphers.modes import CBC
3from cryptography.hazmat.primitives.ciphers import Cipher, algorithms, modes
4from cryptography.hazmat.primitives import padding
5import base64
6import binascii
7
8def bin2hex(binStr):
9 return binascii.hexlify(binStr)
10
11def hex2bin(hexStr):
12 return binascii.unhexlify(hexStr)
13
14iv = hex2bin("6e657665726d696e647468656e66756b")
15key = hex2bin("6e6565726d666e646e6565726d666e64")
16
17mode = CBC(iv)
18
19cipher = Cipher(algorithms.AES(key), mode)
20
21encryptor = cipher.encryptor()
22
23padder = padding.PKCS7(128).padder()
24
25payload_string = """{"public_key":"-----BEGIN PUBLIC KEY-----\\nMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAzJN9ALFoUHE8SigFhtql
26\\n+GPI6dIVHDCfAFXe6DU131yXoL14imBRBb5SevMou5WGiL7XBTdtlRaY8+dkNdFz\\nWEMhPoe++/GvV3u6Mq6UAJMjuiJj838NbJVl+83+NEP66htXpqidTIdr
277syaRU1T\\n0PfgvVYdNkwiWkTVtwveRchGtUwp2iZePMSF1+vtKKDvzXgZuwrKBhwBFXz6ApSZ\\n+eGkWhK1pW6TRTSENlySwb/DEg5PckzOzApLTTQqi4uu+sHU
28D+McAtOP9pNILwst\\nG87LxNEO0roFqUaDIhRolgkF8jol2BUZmKChdy84XX+L6jpqDvPsxuTUpIghr0Jq\\nvQIDAQAB\\n-----END PUBLIC KEY-----","st
29udent_id":"e223795","passwd":"pmcTCKox99NFsqp"}"""
30
31byte_guys = str.encode(payload_string)
32padded_data = padder.update(byte_guys)
33
34ct = encryptor.update(padded_data) + encryptor.finalize()
35
36c = base64.b64encode(ct)
37
38import Crypto
39from Crypto.Cipher import PKCS1_OAEP
40from Crypto.PublicKey import RSA
41
42gradecoin_key = """-----BEGIN PUBLIC KEY-----
43MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAyGuqiCPGcguy+Y9TH7Bl
447XlEsalyqb9bYlzpbV0dnqZ3lPkEPkuOhkN+GcuiV6iXtSwyh7nB+xTRXKJFRUBO
45/jbN8jfcxVwBu0JxjF3v1YRBxbOHhz2A295mbKD9xHQCKxkfYBNkUXxj8gd+GaDv
46QiSW5NdrX/lEkvqfGtdEX1m2+HdcG0+3YW24Xg0znhCwLr+sorLuJaDy9Xa0Uo+D
47PWGC5s001U/BxkCIWJ+eJQCb7Bv+9vXb8BGRK/ecMb/fb6h5O+8fgB64RCHMgcc2
48v+Q/dPt8kHX1OJdMuYUrUJGACppMQY3W6e1HdlRIBcZKL2LMZ2CrIB/2D5LiJhPT
49hQIDAQAB
50-----END PUBLIC KEY-----"""
51
52publickey = RSA.import_key(gradecoin_key)
53
54asy_cipher = PKCS1_OAEP.new(publickey, hashAlgo=Crypto.Hash.SHA256)
55ciphertext = asy_cipher.encrypt(key)
56
57key = base64.b64encode(ciphertext)
diff --git a/src/handlers.rs b/src/handlers.rs
index 376d079..2401c0d 100644
--- a/src/handlers.rs
+++ b/src/handlers.rs
@@ -139,8 +139,9 @@ pub async fn authenticate_user(
139 } 139 }
140 }; 140 };
141 141
142 // TODO: request iv is coming with base64 encoding <16-04-21, yigit> // 142 let byte_iv = base64::decode(&request.iv).unwrap();
143 let cipher = match Aes128Cbc::new_var(&temp_key, &request.iv.as_bytes()) { 143
144 let cipher = match Aes128Cbc::new_var(&temp_key, &byte_iv) {
144 Ok(c) => c, 145 Ok(c) => c,
145 Err(err) => { 146 Err(err) => {
146 debug!( 147 debug!(
@@ -175,17 +176,19 @@ pub async fn authenticate_user(
175 } 176 }
176 }; 177 };
177 178
179 println!(">>>{:?}<<<", auth_packet);
180
178 let auth_plaintext = match cipher.decrypt_vec(&auth_packet) { 181 let auth_plaintext = match cipher.decrypt_vec(&auth_packet) {
179 Ok(p) => p, 182 Ok(p) => p,
180 Err(err) => { 183 Err(err) => {
181 debug!( 184 println!(
182 "Base64 decoded auth request did not decrypt correctly {:?} {}", 185 "Base64 decoded auth request did not decrypt correctly {:?} {}",
183 &auth_packet, err 186 &auth_packet, err
184 ); 187 );
185 188
186 let res_json = warp::reply::json(&GradeCoinResponse { 189 let res_json = warp::reply::json(&GradeCoinResponse {
187 res: ResponseType::Error, 190 res: ResponseType::Error,
188 message: "The Bas64 decoded auth request did not decrypt correctly".to_owned(), 191 message: "The Base64 decoded auth request did not decrypt correctly".to_owned(),
189 }); 192 });
190 193
191 return Ok(warp::reply::with_status(res_json, StatusCode::BAD_REQUEST)); 194 return Ok(warp::reply::with_status(res_json, StatusCode::BAD_REQUEST));
@@ -608,7 +611,8 @@ pub async fn authorized_propose_transaction(
608 // this transaction was already checked for correctness at custom_filters, we can panic here if 611 // this transaction was already checked for correctness at custom_filters, we can panic here if
609 // it has been changed since 612 // it has been changed since
610 613
611 let hashed_transaction = Md5::digest((&serde_json::to_string(&new_transaction).unwrap()).as_ref()); 614 let hashed_transaction =
615 Md5::digest((&serde_json::to_string(&new_transaction).unwrap()).as_ref());
612 if token_payload.claims.tha != format!("{:x}", hashed_transaction) { 616 if token_payload.claims.tha != format!("{:x}", hashed_transaction) {
613 println!( 617 println!(
614 "the hash of the request {:x} did not match the hash given in jwt {:?}", 618 "the hash of the request {:x} did not match the hash given in jwt {:?}",
diff --git a/tests/route_tests.rs b/tests/route_tests.rs
index 0b7628c..537b3d8 100644
--- a/tests/route_tests.rs
+++ b/tests/route_tests.rs
@@ -266,8 +266,6 @@ FQIDAQAB
266 let db = mocked_db(); 266 let db = mocked_db();
267 let filter = consensus_routes(db.clone()); 267 let filter = consensus_routes(db.clone());
268 268
269
270
271 let res = warp::test::request() 269 let res = warp::test::request()
272 .method("POST") 270 .method("POST")
273 .json(&Block { 271 .json(&Block {
@@ -447,9 +445,9 @@ FQIDAQAB
447 let res = warp::test::request() 445 let res = warp::test::request()
448 .method("POST") 446 .method("POST")
449 .json(&InitialAuthRequest { 447 .json(&InitialAuthRequest {
450 c: "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".to_owned(), 448 c: "xsF0qqyokuvOZJ4CgnW4mzfLHaTZS3vLqr7y8LFx6pdKo0XKXBJ4+Ojx8Uz6CYrQZLPy39O485BZNtYtLzcfF/03MePBNgSRM6ccVuh6hJ8UUAjv9nf93gZlnGceMP0bLKEaYRHTsgyW+s0y0ki7/CfYn3vveLDd4NVkkgFUAebcmMuAJJt0OAzSLgsQ/kww6hOOsIcIlBNlLIi0dopCUxE5h7aPqV4WyrxA/PSvE8hM8LcfYiATTa7PyinfkjCRu7hzItM/N3+h/zubI+6ht8lY4V/19WB24HnMZJdP1odAPuKbSDiyZoMvq+P7jHfWnbJxJJI7hEYlbB45MNMnFenVhzwEtIqHu6JEGhi7umDoh2zUDAXzofERkd3qNgPtV6L3hxmDX94Y8FIJ9ZdDj/EG06PXj9P3kg0Gt4t+hi+J8h+RtV+g+Pwza1kFCLA6sXoPxxhTuEGyYCYi+DYtWCOCFo2loyReg+juIQQRpSZsZmu4Ml5eEcVpD24lUWZ6yO/AL/TjA9eSU+PgSrQzNBggMWg4Pd6MubILBTI+crt/rSCKwcGBu2IDEiVTIWLCqlMW/PHL6LkLyLnnvOuP6yHKwpnlWboV9h+TSDfzs4aur1AoUnW+UuEQXvYYfVNkSPJ+dsOGHwi1LyAql3H36jX4dtESGZSINUjeiYxR8fwZdnge1Eo+sOGT3cQ+wCL9".to_owned(),
451 iv: "RbZzPxu1IL+f+PZ/SJzi/Q==".to_owned(), 449 iv: "bmV2ZXJtaW5kdGhlbmZ1aw==".to_owned(),
452 key: "baz".to_owned(), 450 key: "s4cn9BSmuForX6PxJAa55Es4t2puXuDtdII1lxEArqVlP+uYd5jDKofFtn9PCAoY7jyTgBIhQW7Ah5MGCcufWTaKHAjFVfSZ+qGwbGbBcklbNGH/F7cJ0Pe7kOCddUpIvLG6WH6+mnvyPs8PwDyagsx1Jc2PSSOYLAwkECvPbjiUjQiBixguTRNsU2eKaqzLimPE0w2ztvdA+IgCv94UPhjQfQrnMGK+Ppn3oK7IfKQJ7v2DLVNuz4d/BpwuqD+lYYAu4B4qn3daNR32a/mqAAlPg/RbPlH69N44Qh/NYux90FOY0XKxUskEwsAUw8dHFzzdKPcGx4C0s5e4KSLGkw==".to_owned(),
453 }) 451 })
454 .path("/register") 452 .path("/register")
455 .reply(&filter) 453 .reply(&filter)