crypto.py 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446
  1. #!/usr/bin/env python3
  2. #
  3. # MMGen Wallet, a terminal-based cryptocurrency wallet
  4. # Copyright (C)2013-2025 The MMGen Project <mmgen@tuta.io>
  5. #
  6. # This program is free software: you can redistribute it and/or modify
  7. # it under the terms of the GNU General Public License as published by
  8. # the Free Software Foundation, either version 3 of the License, or
  9. # (at your option) any later version.
  10. #
  11. # This program is distributed in the hope that it will be useful,
  12. # but WITHOUT ANY WARRANTY; without even the implied warranty of
  13. # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  14. # GNU General Public License for more details.
  15. #
  16. # You should have received a copy of the GNU General Public License
  17. # along with this program. If not, see <http://www.gnu.org/licenses/>.
  18. """
  19. crypto: Random number, password hashing and symmetric encryption routines for the MMGen suite
  20. """
  21. import os
  22. from collections import namedtuple
  23. from .cfg import gc
  24. from .util import msg, msg_r, ymsg, fmt, die, make_chksum_8, oneshot_warning
  25. class Crypto:
  26. mmenc_ext = 'mmenc'
  27. scramble_hash_rounds = 10
  28. salt_len = 16
  29. aesctr_iv_len = 16
  30. aesctr_dfl_iv = int.to_bytes(1, aesctr_iv_len, 'big')
  31. hincog_chk_len = 8
  32. mmenc_salt_len = 32
  33. mmenc_nonce_len = 32
  34. # Scrypt params: 'id_num': [N, r, p] (N is an exponent of two)
  35. # NB: scrypt() in Python hashlib supports max N value of 14. This means that
  36. # for hash presets > 3 the standalone scrypt library must be used!
  37. _hp = namedtuple('scrypt_preset', ['N', 'r', 'p'])
  38. hash_presets = {
  39. '1': _hp(12, 8, 1),
  40. '2': _hp(13, 8, 4),
  41. '3': _hp(14, 8, 8),
  42. '4': _hp(15, 8, 12),
  43. '5': _hp(16, 8, 16),
  44. '6': _hp(17, 8, 20),
  45. '7': _hp(18, 8, 24)}
  46. class pwfile_reuse_warning(oneshot_warning):
  47. message = 'Reusing passphrase from file {!r} at user request'
  48. def __init__(self, fn):
  49. oneshot_warning.__init__(self, div=fn, fmt_args=[fn], reverse=True)
  50. def pwfile_used(self, passwd_file):
  51. if hasattr(self, '_pwfile_used'):
  52. self.pwfile_reuse_warning(passwd_file)
  53. return True
  54. else:
  55. self._pwfile_used = True
  56. return False
  57. def __init__(self, cfg):
  58. self.cfg = cfg
  59. self.util = cfg._util
  60. def get_hash_params(self, hash_preset):
  61. if hash_preset in self.hash_presets:
  62. return self.hash_presets[hash_preset] # N, r, p
  63. else: # Shouldn't be here
  64. die(3, f"{hash_preset}: invalid 'hash_preset' value")
  65. def sha256_rounds(self, s):
  66. from hashlib import sha256
  67. for _ in range(self.scramble_hash_rounds):
  68. s = sha256(s).digest()
  69. return s
  70. def scramble_seed(self, seed, scramble_key):
  71. import hmac
  72. step1 = hmac.digest(seed, scramble_key, 'sha256')
  73. if self.cfg.debug:
  74. msg(f'Seed: {seed.hex()!r}\nScramble key: {scramble_key}\nScrambled seed: {step1.hex()}\n')
  75. return self.sha256_rounds(step1)
  76. def encrypt_seed(self, data, key, *, desc='seed'):
  77. return self.encrypt_data(data, key=key, desc=desc)
  78. def decrypt_seed(self, enc_seed, key, *, seed_id, key_id):
  79. self.util.vmsg_r('Checking key...')
  80. chk1 = make_chksum_8(key)
  81. if key_id:
  82. if not self.util.compare_chksums(key_id, 'key ID', chk1, 'computed'):
  83. msg('Incorrect passphrase or hash preset')
  84. return False
  85. dec_seed = self.decrypt_data(enc_seed, key, desc='seed')
  86. chk2 = make_chksum_8(dec_seed)
  87. if seed_id:
  88. if self.util.compare_chksums(seed_id, 'Seed ID', chk2, 'decrypted seed'):
  89. self.util.qmsg('Passphrase is OK')
  90. else:
  91. if not self.cfg.debug:
  92. msg_r('Checking key ID...')
  93. if self.util.compare_chksums(key_id, 'key ID', chk1, 'computed'):
  94. msg('Key ID is correct but decryption of seed failed')
  95. else:
  96. msg('Incorrect passphrase or hash preset')
  97. self.util.vmsg('')
  98. return False
  99. self.util.dmsg(f'Decrypted seed: {dec_seed.hex()}')
  100. return dec_seed
  101. def encrypt_data(
  102. self,
  103. data,
  104. *,
  105. key,
  106. iv = aesctr_dfl_iv,
  107. desc = 'data',
  108. verify = True,
  109. silent = False):
  110. from cryptography.hazmat.primitives.ciphers import Cipher, algorithms, modes
  111. from cryptography.hazmat.backends import default_backend
  112. if not silent:
  113. self.util.vmsg(f'Encrypting {desc}')
  114. c = Cipher(algorithms.AES(key), modes.CTR(iv), backend=default_backend())
  115. encryptor = c.encryptor()
  116. enc_data = encryptor.update(data) + encryptor.finalize()
  117. if verify:
  118. self.util.vmsg_r(f'Performing a test decryption of the {desc}...')
  119. c = Cipher(algorithms.AES(key), modes.CTR(iv), backend=default_backend())
  120. encryptor = c.encryptor()
  121. dec_data = encryptor.update(enc_data) + encryptor.finalize()
  122. if dec_data != data:
  123. die(2, f'ERROR.\nDecrypted {desc} doesn’t match original {desc}')
  124. if not silent:
  125. self.util.vmsg('done')
  126. return enc_data
  127. def decrypt_data(
  128. self,
  129. enc_data,
  130. key,
  131. *,
  132. iv = aesctr_dfl_iv,
  133. desc = 'data'):
  134. from cryptography.hazmat.primitives.ciphers import Cipher, algorithms, modes
  135. from cryptography.hazmat.backends import default_backend
  136. self.util.vmsg_r(f'Decrypting {desc} with key...')
  137. c = Cipher(algorithms.AES(key), modes.CTR(iv), backend=default_backend())
  138. encryptor = c.encryptor()
  139. return encryptor.update(enc_data) + encryptor.finalize()
  140. def scrypt_hash_passphrase(
  141. self,
  142. passwd,
  143. salt,
  144. hash_preset,
  145. *,
  146. buflen = 32):
  147. # Buflen arg is for brainwallets only, which use this function to generate
  148. # the seed directly.
  149. ps = self.get_hash_params(hash_preset)
  150. if isinstance(passwd, str):
  151. passwd = passwd.encode()
  152. def do_hashlib_scrypt():
  153. from hashlib import scrypt
  154. return scrypt(
  155. password = passwd,
  156. salt = salt,
  157. n = 2**ps.N,
  158. r = ps.r,
  159. p = ps.p,
  160. maxmem = 0,
  161. dklen = buflen)
  162. def do_standalone_scrypt():
  163. import scrypt
  164. return scrypt.hash(
  165. password = passwd,
  166. salt = salt,
  167. N = 2**ps.N,
  168. r = ps.r,
  169. p = ps.p,
  170. buflen = buflen)
  171. if int(hash_preset) > 3:
  172. msg_r('Hashing passphrase, please wait...')
  173. # hashlib.scrypt doesn't support N > 14 (hash preset > 3)
  174. ret = (
  175. do_standalone_scrypt() if ps.N > 14 or self.cfg.force_standalone_scrypt_module else
  176. do_hashlib_scrypt())
  177. if int(hash_preset) > 3:
  178. msg_r('\b'*34 + ' '*34 + '\b'*34)
  179. return ret
  180. def make_key(
  181. self,
  182. passwd,
  183. salt,
  184. hash_preset,
  185. *,
  186. desc = 'encryption key',
  187. from_what = 'passphrase',
  188. verbose = False):
  189. if self.cfg.verbose or verbose:
  190. msg_r(f"Generating {desc}{' from ' + from_what if from_what else ''}...")
  191. key = self.scrypt_hash_passphrase(passwd, salt, hash_preset)
  192. if self.cfg.verbose or verbose:
  193. msg('done')
  194. self.util.dmsg(f'Key: {key.hex()}')
  195. return key
  196. def _get_random_data_from_user(self, uchars=None, *, desc='data'):
  197. if uchars is None:
  198. uchars = self.cfg.usr_randchars
  199. info1 = f"""
  200. Now we're going to gather some additional input from the keyboard to further
  201. randomize the random data {desc}.
  202. An encryption key will be created from this input, and the random data will
  203. be encrypted using the key. The resulting data is guaranteed to be at least
  204. as random as the original random data, so even if you type very predictably
  205. no harm will be done.
  206. However, to gain the maximum benefit, try making your input as random as
  207. possible. Type slowly and choose your symbols carefully. Try to use both
  208. upper and lowercase letters as well as punctuation and numerals. The timings
  209. between your keystrokes will also be used as a source of entropy, so be as
  210. random as possible in your timing as well.
  211. """
  212. info2 = f"""
  213. Please type {uchars} symbols on your keyboard. What you type will not be displayed
  214. on the screen.
  215. """
  216. msg(f'Enter {uchars} random symbols' if self.cfg.quiet else
  217. '\n' + fmt(info1, indent=' ') +
  218. '\n' + fmt(info2))
  219. import time
  220. from .term import get_char_raw
  221. key_data = ''
  222. time_data = []
  223. for i in range(uchars):
  224. key_data += get_char_raw(f'\rYou may begin typing. {uchars-i} symbols left: ')
  225. time_data.append(time.time())
  226. msg_r('\r' if self.cfg.quiet else f'\rThank you. That’s enough.{" "*18}\n\n')
  227. time_data = [f'{t:.22f}'.rstrip('0') for t in time_data]
  228. avg_prec = sum(len(t.split('.')[1]) for t in time_data) // len(time_data)
  229. if avg_prec < gc.min_time_precision:
  230. ymsg(f'WARNING: Avg. time precision of only {avg_prec} decimal points. User entropy quality is degraded!')
  231. ret = key_data + '\n' + '\n'.join(time_data)
  232. if self.cfg.debug:
  233. msg(f'USER ENTROPY (user input + keystroke timings):\n{ret}')
  234. from .ui import line_input
  235. line_input(self.cfg, 'User random data successfully acquired. Press ENTER to continue: ')
  236. return ret.encode()
  237. def get_random(self, length):
  238. os_rand = os.urandom(length)
  239. assert len(os_rand) == length, f'OS random number generator returned {len(os_rand)} (!= {length}) bytes!'
  240. return self.add_user_random(
  241. rand_bytes = os_rand,
  242. desc = 'from your operating system')
  243. def add_user_random(
  244. self,
  245. rand_bytes,
  246. *,
  247. desc,
  248. urand = {'data': b'', 'counter': 0}):
  249. assert type(rand_bytes) is bytes, 'add_user_random_chk1'
  250. if self.cfg.usr_randchars:
  251. if not urand['data']:
  252. from hashlib import sha256
  253. urand['data'] = sha256(self._get_random_data_from_user(desc=desc)).digest()
  254. # counter protects against very evil rng that might repeatedly output the same data
  255. urand['counter'] += 1
  256. os_rand = os.urandom(8)
  257. assert len(os_rand) == 8, f'OS random number generator returned {len(os_rand)} (!= 8) bytes!'
  258. import hmac
  259. key = hmac.digest(
  260. urand['data'],
  261. os_rand + int.to_bytes(urand['counter'], 8, 'big'),
  262. 'sha256')
  263. msg(f'Encrypting random data {desc} with ephemeral key #{urand["counter"]}')
  264. return self.encrypt_data(data=rand_bytes, key=key, desc=desc, verify=False, silent=True)
  265. else:
  266. return rand_bytes
  267. def get_hash_preset_from_user(
  268. self,
  269. old_preset = gc.dfl_hash_preset,
  270. *,
  271. data_desc = 'data',
  272. prompt = None):
  273. prompt = prompt or (
  274. f'Enter hash preset for {data_desc}, \n' +
  275. f'or hit ENTER to accept the default value ({old_preset!r}): ')
  276. from .ui import line_input
  277. while True:
  278. ret = line_input(self.cfg, prompt)
  279. if ret:
  280. if ret in self.hash_presets:
  281. return ret
  282. else:
  283. msg('Invalid input. Valid choices are {}'.format(', '.join(self.hash_presets)))
  284. else:
  285. return old_preset
  286. def get_new_passphrase(self, data_desc, hash_preset, passwd_file, *, pw_desc='passphrase'):
  287. message = f"""
  288. You must choose a passphrase to encrypt your {data_desc} with.
  289. A key will be generated from your passphrase using a hash preset of '{hash_preset}'.
  290. Please note that no strength checking of passphrases is performed.
  291. For an empty passphrase, just hit ENTER twice.
  292. """
  293. if passwd_file:
  294. from .fileutil import get_words_from_file
  295. pw = ' '.join(get_words_from_file(
  296. cfg = self.cfg,
  297. infile = passwd_file,
  298. desc = f'{pw_desc} for {data_desc}',
  299. quiet = self.pwfile_used(passwd_file)))
  300. else:
  301. self.util.qmsg('\n'+fmt(message, indent=' '))
  302. from .ui import get_words_from_user
  303. if self.cfg.echo_passphrase:
  304. pw = ' '.join(get_words_from_user(self.cfg, f'Enter {pw_desc} for {data_desc}: '))
  305. else:
  306. for _ in range(gc.passwd_max_tries):
  307. pw = ' '.join(get_words_from_user(self.cfg, f'Enter {pw_desc} for {data_desc}: '))
  308. pw_chk = ' '.join(get_words_from_user(self.cfg, f'Repeat {pw_desc}: '))
  309. self.util.dmsg(f'Passphrases: [{pw}] [{pw_chk}]')
  310. if pw == pw_chk:
  311. self.util.vmsg('Passphrases match')
  312. break
  313. msg('Passphrases do not match. Try again.')
  314. else:
  315. die(2, f'User failed to duplicate passphrase in {gc.passwd_max_tries} attempts')
  316. if pw == '':
  317. self.util.qmsg('WARNING: Empty passphrase')
  318. return pw
  319. def get_passphrase(self, data_desc, passwd_file, *, pw_desc='passphrase'):
  320. if passwd_file:
  321. from .fileutil import get_words_from_file
  322. return ' '.join(get_words_from_file(
  323. cfg = self.cfg,
  324. infile = passwd_file,
  325. desc = f'{pw_desc} for {data_desc}',
  326. quiet = self.pwfile_used(passwd_file)))
  327. else:
  328. from .ui import get_words_from_user
  329. return ' '.join(get_words_from_user(self.cfg, f'Enter {pw_desc} for {data_desc}: '))
  330. def mmgen_encrypt(self, data, *, passwd=None, desc='data', hash_preset=None):
  331. salt = self.get_random(self.mmenc_salt_len)
  332. iv = self.get_random(self.aesctr_iv_len)
  333. nonce = self.get_random(self.mmenc_nonce_len)
  334. hp = hash_preset or self.cfg.hash_preset or self.get_hash_preset_from_user(data_desc=desc)
  335. m = ('user-requested', 'default')[hp=='3']
  336. self.util.vmsg(f'Encrypting {desc}')
  337. self.util.qmsg(f'Using {m} hash preset of {hp!r}')
  338. passwd = passwd or self.get_new_passphrase(
  339. data_desc = desc,
  340. hash_preset = hp,
  341. passwd_file = self.cfg.passwd_file)
  342. key = self.make_key(passwd, salt, hp)
  343. from hashlib import sha256
  344. enc_d = self.encrypt_data(sha256(nonce+data).digest() + nonce + data, key=key, iv=iv, desc=desc)
  345. return salt+iv+enc_d
  346. def mmgen_decrypt(self, data, *, passwd=None, desc='data', hash_preset=None):
  347. self.util.vmsg(f'Preparing to decrypt {desc}')
  348. dstart = self.mmenc_salt_len + self.aesctr_iv_len
  349. salt = data[:self.mmenc_salt_len]
  350. iv = data[self.mmenc_salt_len:dstart]
  351. enc_d = data[dstart:]
  352. hp = hash_preset or self.cfg.hash_preset or self.get_hash_preset_from_user(data_desc=desc)
  353. m = ('user-requested', 'default')[hp=='3']
  354. self.util.qmsg(f'Using {m} hash preset of {hp!r}')
  355. passwd = passwd or self.get_passphrase(
  356. data_desc = desc,
  357. passwd_file = self.cfg.passwd_file)
  358. key = self.make_key(passwd, salt, hp)
  359. dec_d = self.decrypt_data(enc_d, key, iv=iv, desc=desc)
  360. sha256_len = 32
  361. from hashlib import sha256
  362. if dec_d[:sha256_len] == sha256(dec_d[sha256_len:]).digest():
  363. self.util.vmsg('OK')
  364. return dec_d[sha256_len+self.mmenc_nonce_len:]
  365. else:
  366. msg('Incorrect passphrase or hash preset')
  367. return False
  368. def mmgen_decrypt_retry(self, d, *, desc='data'):
  369. while True:
  370. d_dec = self.mmgen_decrypt(d, desc=desc)
  371. if d_dec:
  372. return d_dec
  373. msg('Trying again...')