mirror of
https://github.com/ComradCollective/Comrad
synced 2024-11-03 23:15:33 +00:00
144 lines
5.4 KiB
Python
144 lines
5.4 KiB
Python
# addresses
|
|
KOMRADE_URL = 'komrade.app'
|
|
KOMRADE_ONION = 'u7spnj3dmwumzoa4.onion'
|
|
KOMRADE_ONION2 = 'rwg4zcnpwshv4laq.onion' #'128.232.229.63' #'komrade.app'
|
|
|
|
|
|
OPERATOR_API_URL = f'http://{KOMRADE_ONION}/op/'
|
|
|
|
|
|
# paths
|
|
import os
|
|
PATH_KOMRADE = os.path.abspath(os.path.join(os.path.expanduser('~'),'.komrade'))
|
|
PATH_KOMRADE_KEYS = os.path.join(PATH_KOMRADE,'.keys')
|
|
PATH_KOMRADE_DATA = os.path.join(PATH_KOMRADE,'.data')
|
|
for x in [PATH_KOMRADE,PATH_KOMRADE_DATA,PATH_KOMRADE_KEYS]:
|
|
if not os.path.exists(x):
|
|
os.makedirs(x)
|
|
PATH_CRYPT_OP_KEYS = os.path.join(PATH_KOMRADE_KEYS,'.op.db.keys.crypt')
|
|
PATH_CRYPT_OP_DATA = os.path.join(PATH_KOMRADE_DATA,'.op.db.data.encr')
|
|
# PATH_CRYPT_CA_KEYS = os.path.join(PATH_KOMRADE_KEYS,'.ca.db.keys.crypt')
|
|
# PATH_CRYPT_CA_DATA = os.path.join(PATH_KOMRADE_DATA,'.ca.db.data.encr')
|
|
PATH_CRYPT_CA_KEYS = PATH_CRYPT_OP_KEYS
|
|
PATH_CRYPT_CA_DATA = PATH_CRYPT_OP_DATA
|
|
|
|
# etc
|
|
BSEP=b'||||||||||'
|
|
BSEP2=b'@@@@@@@@@@'
|
|
BSEP3=b'##########'
|
|
|
|
OPERATOR_NAME = 'TheOperator'
|
|
TELEPHONE_NAME = 'TheTelephone'
|
|
PATH_APP = os.path.abspath(os.path.dirname(__file__))
|
|
PATH_BUILTIN_KEYCHAINS_ENCR = os.path.join(PATH_APP,'.builtin.keychains.encr')
|
|
PATH_BUILTIN_KEYCHAINS_DECR = os.path.join(PATH_APP,'.builtin.keychains.decr')
|
|
|
|
|
|
# key names
|
|
|
|
KEYNAMES = [
|
|
'pubkey','privkey','adminkey',
|
|
'pubkey_encr','privkey_encr','adminkey_encr',
|
|
'pubkey_decr','privkey_decr','adminkey_decr',
|
|
'pubkey_encr_encr','privkey_encr_encr','adminkey_encr_encr',
|
|
'pubkey_encr_decr','privkey_encr_decr','adminkey_encr_decr',
|
|
'pubkey_decr_encr','privkey_decr_encr','adminkey_decr_encr',
|
|
'pubkey_decr_decr','privkey_decr_decr','adminkey_decr_decr'
|
|
]
|
|
|
|
OPERATOR_INTERCEPT_MESSAGE = "If you'd like to make a call, please hang up and try again. If you need help, hang up, and then dial your operator."
|
|
|
|
|
|
|
|
KEYMAKER_DEFAULT_KEYS_TO_SAVE = ['pubkey_encr', 'privkey_encr', 'adminkey_encr']
|
|
# KEYMAKER_DEFAULT_KEYS_TO_RETURN = ['pubkey_decr_encr', 'privkey_decr_encr', 'adminkey_decr_encr']
|
|
KEYMAKER_DEFAULT_KEYS_TO_RETURN = ['pubkey_decr', 'privkey_decr_encr', 'adminkey_decr_encr']
|
|
# KEYMAKER_DEFAULT_KEYS_TO_RETURN += ['pubkey_decr_decr', 'privkey_decr_decr', 'adminkey_decr_decr']
|
|
KEYMAKER_DEFAULT_KEYS_TO_RETURN += ['privkey_decr_decr', 'adminkey_decr_decr']
|
|
KEYMAKER_DEFAULT_KEYS_TO_GEN = ['pubkey','privkey','adminkey']
|
|
KEYMAKER_DEFAULT_KEYS_TO_GEN += ['pubkey_decr','privkey_decr', 'adminkey_decr']
|
|
KEYMAKER_DEFAULT_KEYS_TO_GEN += KEYMAKER_DEFAULT_KEYS_TO_SAVE
|
|
KEYMAKER_DEFAULT_KEYS_TO_GEN += KEYMAKER_DEFAULT_KEYS_TO_RETURN
|
|
KEYMAKER_DEFAULT_KEYS_TO_GEN = list(set(KEYMAKER_DEFAULT_KEYS_TO_GEN))
|
|
KEYMAKER_DEFAULT_KEYS_TO_GEN.sort(key=lambda x: x.count('_'))
|
|
|
|
|
|
KEY_TYPE_ASYMMETRIC_PUBKEY = 'asymmetric_pubkey'
|
|
KEY_TYPE_ASYMMETRIC_PRIVKEY = 'asymmetric_privkey'
|
|
KEY_TYPE_SYMMETRIC_WITHOUT_PASSPHRASE = 'symmetric_key_without_passphrase'
|
|
KEY_TYPE_SYMMETRIC_WITH_PASSPHRASE = 'symmetric_key_with_passphrase'
|
|
ENCRYPTED_KEY = 'encrypted_key'
|
|
|
|
|
|
KEYMAKER_DEFAULT_KEY_TYPES = {
|
|
'pubkey':KEY_TYPE_ASYMMETRIC_PUBKEY,
|
|
'privkey':KEY_TYPE_ASYMMETRIC_PRIVKEY,
|
|
'adminkey':KEY_TYPE_SYMMETRIC_WITHOUT_PASSPHRASE,
|
|
|
|
'pubkey_decr':KEY_TYPE_SYMMETRIC_WITHOUT_PASSPHRASE,
|
|
'privkey_decr':KEY_TYPE_SYMMETRIC_WITHOUT_PASSPHRASE,
|
|
'adminkey_decr':KEY_TYPE_SYMMETRIC_WITHOUT_PASSPHRASE,
|
|
|
|
'pubkey_decr_decr':KEY_TYPE_SYMMETRIC_WITHOUT_PASSPHRASE,
|
|
'privkey_decr_decr':KEY_TYPE_SYMMETRIC_WITH_PASSPHRASE,
|
|
'adminkey_decr_decr':KEY_TYPE_SYMMETRIC_WITH_PASSPHRASE,
|
|
|
|
'pubkey_encr_decr':KEY_TYPE_SYMMETRIC_WITHOUT_PASSPHRASE,
|
|
'privkey_encr_decr':KEY_TYPE_SYMMETRIC_WITH_PASSPHRASE,
|
|
'adminkey_encr_decr':KEY_TYPE_SYMMETRIC_WITH_PASSPHRASE,
|
|
|
|
|
|
# encrypted keys
|
|
'pubkey_encr':ENCRYPTED_KEY,
|
|
'privkey_encr':ENCRYPTED_KEY,
|
|
'adminkey_encr':ENCRYPTED_KEY,
|
|
'pubkey_encr_encr':ENCRYPTED_KEY,
|
|
'privkey_encr_encr':ENCRYPTED_KEY,
|
|
'adminkey_encr_encr':ENCRYPTED_KEY,
|
|
'pubkey_decr_encr':ENCRYPTED_KEY,
|
|
'privkey_decr_encr':ENCRYPTED_KEY,
|
|
'adminkey_decr_encr':ENCRYPTED_KEY
|
|
}
|
|
WHY_MSG = 'Forge the password of memory: '
|
|
|
|
|
|
|
|
|
|
import ujson as json
|
|
from pythemis.scell import SCellSeal
|
|
from base64 import b64decode,b64encode
|
|
## can I even hope to succeed?
|
|
def get_builtin_keys():
|
|
with open(PATH_BUILTIN_KEYCHAINS_ENCR,'rb') as f_encr, open(PATH_BUILTIN_KEYCHAINS_DECR,'rb') as f_decr:
|
|
builtin_keychains_b_encr_b64=f_encr.read()
|
|
builtin_keychains_b_decr_b64=f_decr.read()
|
|
|
|
builtin_keychains_b_encr=b64decode(builtin_keychains_b_encr_b64)
|
|
builtin_keychains_b_decr=b64decode(builtin_keychains_b_decr_b64)
|
|
|
|
builtin_keychains_b = SCellSeal(key=builtin_keychains_b_decr).decrypt(builtin_keychains_b_encr)
|
|
builtin_keychains_s = builtin_keychains_b.decode('utf-8')
|
|
builtin_keychains = json.loads(builtin_keychains_s)
|
|
|
|
# filter
|
|
print(builtin_keychains)
|
|
for name in builtin_keychains:
|
|
for keyname in builtin_keychains[name]:
|
|
v=builtin_keychains[name][keyname]
|
|
builtin_keychains[name][keyname] = b64decode(v.encode('utf-8'))
|
|
|
|
return builtin_keychains
|
|
|
|
BUILTIN_KEYCHAIN = get_builtin_keys()
|
|
if not BUILTIN_KEYCHAIN:
|
|
raise Exception('where are the keys to the telephone and operator? how are we going to make any calls... smh')
|
|
|
|
# TELEPHONE_KEYCHAIN = BUILTIN_KEYCHAIN[TELEPHONE_NAME]
|
|
# OPERATOR_KEYCHAIN = BUILTIN_KEYCHAIN[OPERATOR_NAME]
|
|
|
|
|
|
# print(TELEPHONE_KEYCHAIN)
|
|
|
|
# print()
|
|
# print(OPERATOR_KEYCHAIN)
|
|
print(BUILTIN_KEYCHAIN) |