1
0
Fork 0
This repository has been archived on 2024-02-17. You can view files and clone it, but cannot push or open issues or pull requests.
SecureSocketService/Socket.py
2019-07-13 13:29:31 +02:00

118 lines
3.8 KiB
Python

import socket
from cryptography.hazmat.backends import default_backend
from cryptography.hazmat.primitives.asymmetric import rsa
from cryptography.hazmat.primitives import serialization
from cryptography.hazmat.primitives import hashes
from cryptography.hazmat.primitives.asymmetric import padding
from cryptography.fernet import Fernet
class Socket:
def __init__(self):
self.socket = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
self.key = None
self.fernet = None
def send(self, sock: socket.socket, message: str):
if type(message) != bytes:
message = message.encode("Utf8")
if self.fernet:
message = self.fernet.encrypt(message)
try:
sock.send(message)
except socket.error:
raise ConnectionError("Fail to send")
else:
return True
def receive(self, sock: socket.socket, utf8=True, fernet=True):
try:
response = sock.recv(1028)
except socket.error:
raise ConnectionError("Fail to receive")
else:
if self.fernet and fernet:
response = self.fernet.decrypt(response)
if utf8:
response = response.decode("Utf8")
return response
def set_secure_connexion(self, sock: socket.socket):
if not self.key:
self.key = Fernet.generate_key()
self.fernet = Fernet(self.key)
public_key = serialization.load_pem_public_key(
self.receive(sock, False, False),
backend=default_backend()
)
sock.send(
public_key.encrypt(
self.key,
padding.OAEP(
mgf=padding.MGF1(algorithm=hashes.SHA256()),
algorithm=hashes.SHA256(),
label=None
)
)
)
if self.receive(sock) == "Key receive":
self.send(sock, "Key valid")
return True
else:
raise ConnectionError("Invalid key !")
def get_secure_connexion(self, sock: socket.socket):
private_key = rsa.generate_private_key(
public_exponent=65537,
key_size=2048,
backend=default_backend()
)
public_key = private_key.public_key()
pem = public_key.public_bytes(
encoding=serialization.Encoding.PEM,
format=serialization.PublicFormat.SubjectPublicKeyInfo
)
self.send(sock, pem)
self.key = private_key.decrypt(
self.receive(sock, False, False),
padding.OAEP(
mgf=padding.MGF1(algorithm=hashes.SHA256()),
algorithm=hashes.SHA256(),
label=None
)
)
self.fernet = Fernet(self.key)
self.send(sock, "Key receive")
if self.receive(sock) != "Key valid":
raise ConnectionError("Invalid key !")
return True
def connect_server(self, sock: socket.socket, host: str, port: int, service_id: int):
try:
sock.connect((host, port))
except socket.error:
raise ConnectionError("Can't connect to server !")
else:
self.get_secure_connexion(self.socket)
self.send(sock, f"Client service ID: {service_id}")
if self.receive(sock) != f"Server service ID: {service_id}":
raise ConnectionError("Server service ID")
return True
def connect_client(self, sock: socket, service_id: int):
connexion, address = sock.accept()
self.set_secure_connexion(connexion)
if self.receive(connexion) == f"Client service ID: {service_id}":
self.send(connexion, f"Server service ID: {service_id}")
return connexion
else:
raise ConnectionError("Invalid client service ID !")