tlnbase: Peer class - electrum - Electrum Bitcoin wallet HTML git clone https://git.parazyd.org/electrum DIR Log DIR Files DIR Refs DIR Submodules --- DIR commit 7421bffaa23b6a79b83a7a99784837c43b1602f3 DIR parent 692bc148bbff5d7c00964a7f71064f19e274d286 HTML Author: ThomasV <thomasv@electrum.org> Date: Wed, 11 Apr 2018 05:48:22 +0200 lnbase: Peer class Diffstat: M lib/lnbase.py | 184 +++++++++++++++---------------- 1 file changed, 91 insertions(+), 93 deletions(-) --- DIR diff --git a/lib/lnbase.py b/lib/lnbase.py t@@ -16,6 +16,7 @@ import cryptography.hazmat.primitives.ciphers.aead as AEAD from electrum.bitcoin import public_key_from_private_key, ser_to_point, point_to_ser, string_to_number from electrum.bitcoin import int_to_hex, bfh, rev_hex +from electrum.util import PrintError tcp_socket_timeout = 10 server_response_timeout = 60 t@@ -224,98 +225,96 @@ def create_ephemeral_key(privkey): def process_message(message): print("Received %d bytes: "%len(message), binascii.hexlify(message)) -def send_message(writer, msg, sk, sn): - print("Sending %d bytes: "%len(msg), binascii.hexlify(msg)) - l = encode(len(msg), 2) - lc = aead_encrypt(sk, sn, b'', l) - c = aead_encrypt(sk, sn+1, b'', msg) - assert len(lc) == 18 - assert len(c) == len(msg) + 16 - writer.write(lc+c) - - -async def read_message(reader, rk, rn): - rspns = b'' - while True: - rspns += await reader.read(2**10) - print("buffer %d bytes:"%len(rspns), binascii.hexlify(rspns)) - lc = rspns[:18] - l = aead_decrypt(rk, rn, b'', lc) - length = decode(l) - if len(rspns) < 18 + length + 16: - continue - c = rspns[18:18 + length + 16] - msg = aead_decrypt(rk, rn+1, b'', c) - return msg - - - -async def main_loop(my_privkey, host, port, pubkey, loop): - reader, writer = await asyncio.open_connection(host, port, loop=loop) - - hs = HandshakeState(pubkey) - msg = act1_initiator_message(hs, my_privkey) - - # handshake act 1 - writer.write(msg) - rspns = await reader.read(2**10) - assert len(rspns) == 50 - hver, alice_epub, tag = rspns[0], rspns[1:34], rspns[34:] - assert bytes([hver]) == hs.handshake_version - - # handshake act 2 - hs.update(alice_epub) - myepriv, myepub = create_ephemeral_key(my_privkey) - ss = get_ecdh(myepriv, alice_epub) - ck, temp_k2 = get_bolt8_hkdf(hs.ck, ss) - hs.ck = ck - p = aead_decrypt(temp_k2, 0, hs.h, tag) - hs.update(tag) - - # handshake act 3 - my_pubkey = privkey_to_pubkey(my_privkey) - c = aead_encrypt(temp_k2, 1, hs.h, my_pubkey) - hs.update(c) - ss = get_ecdh(my_privkey[:32], alice_epub) - ck, temp_k3 = get_bolt8_hkdf(hs.ck, ss) - hs.ck = ck - t = aead_encrypt(temp_k3, 0, hs.h, b'') - sk, rk = get_bolt8_hkdf(hs.ck, b'') - msg = hs.handshake_version + c + t - writer.write(msg) - - # init counters - sn = 0 - rn = 0 - - # read init - msg = await read_message(reader, rk, rn) - process_message(msg) - rn += 2 - - # send init - init_msg = gen_msg("init", gflen=0, lflen=0) - send_message(writer, init_msg, sk, sn) - sn += 2 - - # send ping - msg_type = 18 - num_pong_bytes = 4 - byteslen = 4 - ping_msg = encode(msg_type, 2) + encode(num_pong_bytes, 2) + encode(byteslen, 2) + b'\x00'*byteslen - send_message(writer, ping_msg, sk, sn) - sn += 2 - - # read pong - msg = await read_message(reader, rk, rn) - process_message(msg) - rn += 2 - - # close socket - writer.close() - +class Peer(PrintError): + + def __init__(self, privkey, host, port, pubkey): + self.host = host + self.port = port + self.privkey = privkey + self.pubkey = pubkey + + def send_message(self, msg): + print("Sending %d bytes: "%len(msg), binascii.hexlify(msg)) + l = encode(len(msg), 2) + lc = aead_encrypt(self.sk, self.sn, b'', l) + c = aead_encrypt(self.sk, self.sn+1, b'', msg) + assert len(lc) == 18 + assert len(c) == len(msg) + 16 + self.writer.write(lc+c) + self.sn += 2 + + async def read_message(self): + rspns = b'' + while True: + rspns += await self.reader.read(2**10) + print("buffer %d bytes:"%len(rspns), binascii.hexlify(rspns)) + lc = rspns[:18] + l = aead_decrypt(self.rk, self.rn, b'', lc) + length = decode(l) + if len(rspns) < 18 + length + 16: + continue + c = rspns[18:18 + length + 16] + msg = aead_decrypt(self.rk, self.rn+1, b'', c) + self.rn += 2 + return msg + + async def handshake(self): + hs = HandshakeState(self.pubkey) + msg = act1_initiator_message(hs, self.privkey) + # act 1 + self.writer.write(msg) + rspns = await self.reader.read(2**10) + assert len(rspns) == 50 + hver, alice_epub, tag = rspns[0], rspns[1:34], rspns[34:] + assert bytes([hver]) == hs.handshake_version + # act 2 + hs.update(alice_epub) + myepriv, myepub = create_ephemeral_key(self.privkey) + ss = get_ecdh(myepriv, alice_epub) + ck, temp_k2 = get_bolt8_hkdf(hs.ck, ss) + hs.ck = ck + p = aead_decrypt(temp_k2, 0, hs.h, tag) + hs.update(tag) + # act 3 + my_pubkey = privkey_to_pubkey(self.privkey) + c = aead_encrypt(temp_k2, 1, hs.h, my_pubkey) + hs.update(c) + ss = get_ecdh(self.privkey[:32], alice_epub) + ck, temp_k3 = get_bolt8_hkdf(hs.ck, ss) + hs.ck = ck + t = aead_encrypt(temp_k3, 0, hs.h, b'') + self.sk, self.rk = get_bolt8_hkdf(hs.ck, b'') + msg = hs.handshake_version + c + t + self.writer.write(msg) + # init counters + self.sn = 0 + self.rn = 0 + + async def main_loop(self, loop): + self.reader, self.writer = await asyncio.open_connection(self.host, self.port, loop=loop) + await self.handshake() + # read init + msg = await self.read_message() + process_message(msg) + # send init + init_msg = gen_msg("init", gflen=0, lflen=0) + self.send_message(init_msg) + # send ping + ping_msg = gen_msg("ping", num_pong_bytes=4, byteslen=4) + self.send_message(ping_msg) + # read pong + msg = await self.read_message() + process_message(msg) + # close socket + self.writer.close() + + def run(self): + loop = asyncio.get_event_loop() + loop.run_until_complete(self.main_loop(loop)) + loop.close() + node_list = [ ('ecdsa.net', '9735', '038370f0e7a03eded3e1d41dc081084a87f0afa1c5b22090b4f3abb391eb15d8ff'), t@@ -331,6 +330,5 @@ if __name__ == "__main__": pubkey = binascii.unhexlify(pubkey) port = int(port) privkey = b"\x21"*32 + b"\x01" - loop = asyncio.get_event_loop() - loop.run_until_complete(main_loop(privkey, host, port, pubkey, loop)) - loop.close() + peer = Peer(privkey, host, port, pubkey) + peer.run()