operator-time
quadrismegistus 4 years ago
parent 9592f3a3d2
commit e64d168181

@ -1 +1 @@
AAEBQAwAAAAQAAAALQAAAMAPieX8VPk7FpATBIlBv8Jnmn2YZOYdMOza5ohYScD6o+bPQWyr1aa+Q7LUHaiDt1OVRGrYB3YhpL45eVV3pMy43fR+kEf4hWo=
AAEBQAwAAAAQAAAALQAAAM1wDYnw17MjutQre0k9BUeM8zwpjVCaZhTg1i14HNW06hq9UeXaKoFPt7dwGrAaxGSL+gmzqNMKAkd6Fy7YdWHEQy1xYkmAw2Q=

@ -0,0 +1 @@
AAEBQAwAAAAQAAAAIAAAAHW/aLWQA8Pa5qy1/bU5PUbZqG2Qn2HJybwee03nVbxOrMEUtctz4aC/9RuJMcJTbOyPWAPSRe3T3W65lA==

@ -0,0 +1 @@
AAEBQAwAAAAQAAAALQAAABun/ckkVaguDfiK03UIu9aHj574bp33jsvBpF0hscqIR0cWwZ1qJb8fBFsSoYwYadw8tC6Tu50kbciUKj4UTmodnxE2lRBxdv4=

@ -7,4 +7,31 @@ from .mazes import *
from .switchboard import *
from .the_operator import *
from .the_telephone import *
from .the_telephone import *
## can I even hope to succeed?
def get_builtin_keys():
with open(PATH_BUILTIN_KEYCHAINS_ENCR,'rb') as f_encr, open(PATH_BUILTIN_KEYCHAINS_DECR,'rb') as f_decr:
builtin_keychains_b_encr_b64=f_encr.read()
builtin_keychains_b_decr_b64=f_decr.read()
builtin_keychains_b_encr=b64decode(builtin_keychains_b_encr_b64)
builtin_keychains_b_decr=b64decode(builtin_keychains_b_decr_b64)
builtin_keychains_b = SCellSeal(key=builtin_keychains_b_decr).decrypt(builtin_keychains_b_encr)
builtin_keychains_s = builtin_keychains_b.decode('utf-8')
builtin_keychains = json.loads(builtin_keychains_s)
# filter
print(builtin_keychains)
for name in builtin_keychains:
for keyname in builtin_keychains[name]:
v=builtin_keychains[name][keyname]
builtin_keychains[name][keyname] = v.encode('utf-8')
return builtin_keychains

@ -69,7 +69,9 @@ def init_operators():
path_crypt_data=PATH_CRYPT_OP_KEYS
)
keys_to_return = [k for k in KEYMAKER_DEFAULT_KEYS_TO_RETURN if not k.startswith('admin')]
# keys_to_return = [k for k in KEYMAKER_DEFAULT_KEYS_TO_RETURN if not k.startswith('admin')]
keys_to_return ['pubkey_decr','privkey_decr']
op_decr_keys = op.forge_new_keys(keys_to_return=keys_to_return)
@ -101,7 +103,6 @@ def init_operators():
with open(PATH_BUILTIN_KEYCHAINS_ENCR,'wb') as of:
of.write(builtin_keychains_b_encr_b64)
# pickle.dump(builtin_keychains, )
print('>> saved:',PATH_BUILTIN_KEYCHAINS_ENCR)
with open(PATH_BUILTIN_KEYCHAINS_DECR,'wb') as of:
of.write(builtin_keychains_b_decr_b64)

@ -98,4 +98,45 @@ KEYMAKER_DEFAULT_KEY_TYPES = {
'privkey_decr_encr':ENCRYPTED_KEY,
'adminkey_decr_encr':ENCRYPTED_KEY
}
WHY_MSG = 'Forge the password of memory: '
WHY_MSG = 'Forge the password of memory: '
import ujson as json
from pythemis.scell import SCellSeal
from base64 import b64decode,b64encode
## can I even hope to succeed?
def get_builtin_keys():
with open(PATH_BUILTIN_KEYCHAINS_ENCR,'rb') as f_encr, open(PATH_BUILTIN_KEYCHAINS_DECR,'rb') as f_decr:
builtin_keychains_b_encr_b64=f_encr.read()
builtin_keychains_b_decr_b64=f_decr.read()
builtin_keychains_b_encr=b64decode(builtin_keychains_b_encr_b64)
builtin_keychains_b_decr=b64decode(builtin_keychains_b_decr_b64)
builtin_keychains_b = SCellSeal(key=builtin_keychains_b_decr).decrypt(builtin_keychains_b_encr)
builtin_keychains_s = builtin_keychains_b.decode('utf-8')
builtin_keychains = json.loads(builtin_keychains_s)
# filter
print(builtin_keychains)
for name in builtin_keychains:
for keyname in builtin_keychains[name]:
v=builtin_keychains[name][keyname]
builtin_keychains[name][keyname] = v.encode('utf-8')
return builtin_keychains
BUILTIN_KEYCHAIN = get_builtin_keys()
if not BUILTIN_KEYCHAIN or not TELEPHONE_NAME in BUILTIN_KEYCHAIN or not OPERATOR_NAME in BUILTIN_KEYCHAIN:
raise Exception('where are the keys to the telephone and operator? how are we going to make any calls... smh')
TELEPHONE_KEYCHAIN = BUILTIN_KEYCHAIN[TELEPHONE_NAME]
OPERATOR_KEYCHAIN = BUILTIN_KEYCHAIN[OPERATOR_NAME]
print(TELEPHONE_KEYCHAIN)
print()
print(OPERATOR_KEYCHAIN)
Loading…
Cancel
Save