public static function decrypt($msg, $rcptid) { gio::log("Decrypting message ..."); $priv_key = GsonCrypt::getkey($rcptid, true, true); $res1 = openssl_get_privatekey($priv_key, config::$privateKeyPassword); $tt = explode(":::", $msg); $cnt = count($tt); $i = 0; while ($i < $cnt) { openssl_private_decrypt($tt[$i], $str1, $res1); @($str .= $str1); $i++; } gio::log("... Done decrypting message"); return $str; }
public static function give($to, $amt) { $ramt = $amt; $rem = mine::countcoins($coins); if ($rem < $amt) { gio::output("Not enough coins"); return false; } $paths = Tools::address($to); if (!$paths) { gio::output("The destination account is invalid"); return false; } $getcoins = array(); $c = 1; if (!is_array($coins)) { return false; } $vals = array_keys($coins); rsort($vals); foreach ($vals as $val) { if ($amt < $val) { continue; } if ($amt <= 0) { break; } $ch[$val] = floor($amt / $val); if ($ch[$val] > count($coins[$val])) { $ch[$val] = count($coins[$val]); } $amt -= $ch[$val] * $val; } foreach ($ch as $v => $n) { while ($n > 0 && (list($id, $coin) = each($coins[$v]))) { $getcoins[$id] = $coin; unset($coins[$v][$id]); $n--; } } foreach ($getcoins as $k => $v) { $secret[$k] = Tools::makesecrets(); $getcoins[$k]['secret'] = GsonCrypt::seal($secret[$k], $paths['srakey']); } $net = new Gnet(); if (!$net->connect($paths['address'], intval($paths['port']))) { gio::output("Unable to connect to the destination account"); return false; } else { $m = Gmsg::create(Gmsg::prepare($getcoins, "deposit", $paths['account'])); $m = GsonCrypt::seal($m, $paths['bank']); if (!$m) { gio::output("Unable to send!"); gio::output("POSSIBLE CAUSES:"); gio::output("The destination bank's certificate is not avaiable!"); gio::output("Account may not be registered with sra!"); gio::output("Account may have been deregistered with sra!"); return false; } $r = $net->send($m); $s = GsonCrypt::unseal($r); $r = $s ? Gmsg::extract($s) : Gmsg::extract($r); unset($net); if (!$r || !$r['status']) { gio::output("Deposit of {$ramt} coins to {$to} Failed!"); gio::output($r['response']); return false; } else { $old = storage::load($paths['srakey']); foreach ($getcoins as $id => $coin) { $getcoins[$id]['secret'] = $secret[$id]; $val = $coin['value']; $old[$val][$id] =& $getcoins[$id]; } storage::save($old, $paths['srakey']); storage::save($coins); gio::output("Deposit of {$ramt} coins to {$to} was successful"); return true; } } }
public static function readfile($file) { $file = config::$encryptLocalStorage ? "{$file}." . config::$encrypedLocalStorageExtention : "{$file}"; gio::log("Reading file: {$file} ...", VERBOSE); $fp = @fopen("{$file}", 'rb'); !config::$encryptLocalStorage ? '' : @stream_filter_append($fp, GsonCrypt::getLocalEncAlgo('mdecrypt'), STREAM_FILTER_READ, GsonCrypt::getLocalEncKeys()); $data = rtrim(@stream_get_contents($fp)); @fclose($fp); if ($data) { gio::log("... Done reading file: {$file}", VERBOSE); } else { gio::log("... Error reading file: {$file} ...", E_USER_WARNING); } return $data; }
public static function process($msg) { $res = ""; $status = 1; $sender = ""; $umsg = GsonCrypt::unseal($msg); if (!$umsg) { $ex = Gmsg::extract($msg); if ($ex && is_array($ex)) { $umsg = $msg; } else { $status = 0; $res = "Unable to decode the message"; } } if ($umsg) { $parts = self::extract($umsg); $action = $parts["op"]; $mess = $parts["msg"]; $recipient = $parts["recipient"]; $sender = $parts["sender"]; if (isset($parts["bank"])) { $sender = $parts["bank"] . "_{$sender}"; } if (strtolower($recipient) != strtolower(config::$accountId)) { $status = 0; $res = config::$accountId . " is not the intended recipient [{$recipient}]"; $rply = Gmsg::create(array("status" => $status, "response" => $res)); } else { switch ($action) { case "notification": $r = transaction::notification($mess, $sender); $m = Gmsg::create(array("status" => $r[0], "response" => $r[1])); $rply = GsonCrypt::sign($m); break; case "revokecert": if (!$sender) { $status = 0; $res = "The sender is unknown"; } else { $res = ""; $ret = array("status" => $status, "response" => $res, "account" => $sender); $rply = self::create($ret); $rply = GsonCrypt::seal("{$rply}", "{$sender}"); @unlink(GsonCrypt::getkey($sender)); /* Buggy: Verify the sender first*/ } break; case "signcert": $k = GsonCrypt::getkey("{$sender}"); if (file_exists($k)) { $status = 2; $res = "This account already exist!"; } else { $res = GsonCrypt::signcert($sender, $mess); if (!$res) { $status = 0; $res = "An error occured while signing the certificate."; } } break; case "reverb": $res = $mess; break; default: $status = 0; $res = "Invalid Operation!"; } } } if (!isset($rply)) { $ret = array("status" => $status, "response" => $res, "account" => $sender); $rply = self::create($ret); $rply = $sender ? GsonCrypt::seal("{$rply}", "{$sender}") : "{$rply}"; } return $rply; }
public static function certexchange($addr) { $d = Tools::address($addr); if (file_exists(GsonCrypt::getcert($d['bank']))) { return true; } $c = GsonCrypt::getcert(null, true); $m = Gmsg::create(Gmsg::prepare($c, 'exchangecert', $d['bank'])); $net = new Gnet(); $r = $net->connect($d['address'], intval($d['port'])); if (!$r) { return false; } $r = $net->send($m); if (!$r) { return false; } $r = Gmsg::extract($r); if (!$r) { return false; } if ($r['status']) { $resp = gio::saverawfile($r['cert'], GsonCrypt::getcert($d['bank'])); } return isset($resp) ? $resp : false; }
public static function getcoins($vals, $owner, &$secrets, &$mycoin) { foreach ($vals as $v => $n) { foreach ($mycoin[$v] as $id => $coin) { if (!$n) { break; } if (empty($mycoin[$v])) { return false; } $getcoins[$id] = $coin; $secrets[$id] = Tools::makesecrets(); $getcoins[$id]['secret'] = GsonCrypt::seal($secrets[$id], $owner); $getcoins[$id]['transactioncount'] += 1; unset($mycoin[$v][$id]); $n--; } } return $getcoins; }
private static function deregister() { @unlink(GsonCrypt::getkey(config::$bankId)); @unlink(GsonCrypt::getcert(config::$bankId)); @unlink(config::$bankIdFile); @unlink(config::$walCfgFile); @(config::$bankId = null); }
private static function rollback() { @unlink(GsonCrypt::getkey(null)); @unlink(GsonCrypt::getkey(null, true)); @unlink(GsonCrypt::getcert()); @unlink(config::$accountIdFile); @unlink(config::$walCfgFile); @(config::$accountId = null); }
public static function status($oid) { $m = GsonCrypt::sign(Gmsg::create(array("oid" => $oid))); if (!$m) { $status = 0; $res = "Unable to sign status report for '{$oid}'"; } else { $m = Gmsg::create(Gmsg::Prepare($m, "statusrequest", config::$bankId)); $net = new Gnet(); $r = $net->send($m); unset($net); if (!$r) { $status = 0; $res = "Unable to send status report for '{$oid}'"; } else { $v = GsonCrypt::verify($r, config::$bankId); if (!$v) { $status = 0; $res = "Unable to verify response from bank for '{$oid}'"; } else { $v = Gmsg::extract($v); if (!$v) { $status = 0; $res = "Unable to understand the response in relation to '{$oid}'"; } else { $status = $v['status']; $res = $v['response']; } } } } return array($status, $res); }
public static function dcrypt($msg, $mode = MCRYPT_MODE_CBC) { $msg = explode("{::::}", $msg); $dcrypt = mcrypt_decrypt(GsonCrypt::getWalEncAlgo(), config::$walkey, $msg[1], $mode, $msg[0]); return $dcrypt; }
public static function signcert($account, $csr, $numberofdays = 0, $serial = "") { if (empty($serial)) { $serial = time(); } $cert = null; if (empty($numberofdays) || !is_numeric($numberofdays)) { $numberofdays = 7; } gio::log("Signing certificate with serial: {$serial} valid for {$numberofdays} days ...", VERBOSE); $mycert = self::getcert(null, true); $privkey = self::getkey(null, true, true); $sscert = openssl_csr_sign($csr, $mycert, $privkey, $numberofdays, self::$keyOpts, $serial); if ($sscert) { openssl_x509_export($sscert, $cert); } if ($cert) { gio::log("... Done signing certificate with serial: {$serial}", VERBOSE); gio::saverawfile($cert, GsonCrypt::getkey($account)); } else { gio::log("... Error signing certificate with serial: {$serial} ...", E_USER_WARNING); } return $cert; }
public static function process($msg) { $status = 1; $sender = ""; $res = ""; $umsg = GsonCrypt::unseal($msg); if (!$umsg) { $ex = Gmsg::extract($msg); if ($ex && is_array($ex)) { $umsg = $msg; } else { $status = 0; $res = "Unable to decode the message"; } } if ($umsg) { $parts = self::extract($umsg); $action = $parts["op"]; $mess = $parts["msg"]; $sender = $parts["sender"]; $recipient = $parts["recipient"]; if ($recipient && !account::exists($recipient)) { $status = 0; $res = "The recipient account {$recipient} does not reside here"; $rply = Gmsg::create(array("status" => $status, "response" => $res)); } else { switch ($action) { case "mrequest": $r = transaction::request($mess['m'], $sender, $mess['k']); $rply = Gmsg::create(array("status" => $r[0], "response" => $r[1])); break; case "mstatus": $r = transaction::mercorder($mess['m'], $sender, $mess['k']); $rply = Gmsg::create(array("status" => $r[0], "response" => $r[1])); break; case "statusrequest": $r = transaction::status($mess, $sender); $m = Gmsg::create(array("status" => $r[0], "response" => $r[1])); $rply = GsonCrypt::sign($m); break; case "paymentrequest": $r = transaction::request($mess, $sender); $m = Gmsg::create(array("status" => $r[0], "response" => $r[1])); $rply = GsonCrypt::sign($m); break; case "pullrequests": $r = transaction::pullrequests($mess, $sender); $m = Gmsg::create(array("status" => $r[0], "response" => $r[1])); $rply = GsonCrypt::sign($m); break; case "pullcoins": $r = account::pullcoins($mess, $sender); $m = Gmsg::create(array("status" => $r[0], "response" => $r[1])); $rply = GsonCrypt::sign($m); break; case "clearrequests": $r = transaction::clearrequests($mess, $sender); $m = Gmsg::create(array("status" => $r[0], "response" => $r[1])); $rply = GsonCrypt::sign($m); break; case "notification": $r = transaction::notification($mess, $sender); $m = Gmsg::create(array("status" => $r[0], "response" => $r[1])); $rply = GsonCrypt::sign($m); break; case "acknowledgement": $r = transaction::acknowledgement($mess, config::$SRA); $m = Gmsg::create(array("status" => $r[0], "response" => $r[1])); $rply = GsonCrypt::sign($m); break; case "deposit": $r = account::deposit($mess, $recipient); if (!$r) { $status = 0; $res = "Deposit failed"; } else { $res = "Deposit was successful"; } break; case "revokecert": $net = new Gnet(); $rply = $net->send("{$mess}", true); $net = null; break; case "signcert": $net = new Gnet(); $rply = $net->send("{$mess}", true); $net = null; break; case "register": $k = GsonCrypt::getcert(); if (is_readable($k)) { $res = gio::readfile($k); if (!$res) { $status = 0; } } $rply = Gmsg::create(array("status" => $status, "cert" => $res, "name" => config::$accountId, "account" => account::makenew())); break; case "create": $status = gio::savetofile($mess, GsonCrypt::getkey("{$sender}")); $res = $status ? "successful" : "failed"; $rply = Gmsg::create(array("status" => $status, "response" => $res)); break; case "remove": $res = ""; $ret = array("status" => $status, "response" => $res); $rply = self::create($ret); $rply = GsonCrypt::seal("{$rply}", "{$sender}"); unlink(GsonCrypt::getkey($sender)); break; case "exchangecert": $status = 0; if (!file_exists(GsonCrypt::getcert("{$sender}"))) { $status = gio::saverawfile($mess, GsonCrypt::getcert("{$sender}")); } $k = GsonCrypt::getcert(); if ($status && is_readable($k)) { $res = gio::readfile($k); if (!$res) { $status = 0; } } $rply = Gmsg::create(array("status" => $status, "cert" => $res)); break; case "reverb": $res = $mess; break; default: $status = 0; $res = "Invalid Operation!"; } } } if (!isset($rply)) { $ret = array("status" => $status, "response" => $res); $rply = self::create($ret); $rply = $sender ? GsonCrypt::seal("{$rply}", "{$sender}") : "{$rply}"; } return $rply; }