Alex Stokes
f08aa339b4
Verify the channel can pass some plaintext
2019-08-24 23:26:26 +02:00
Alex Stokes
737195f461
Simplify testing connection w/ other simplifications
2019-08-24 23:15:31 +02:00
Alex Stokes
10e30beb42
Disable "friendly" IDs for tests that expect a full string
2019-08-24 22:57:22 +02:00
Alex Stokes
a363ba97d1
Work in terms of the IRawConnection
abstraction
2019-08-24 22:52:09 +02:00
Alex Stokes
eb5ef39399
Convert message IO to work w/ a RawConnection
.
2019-08-24 22:47:56 +02:00
Alex Stokes
7c004a4e14
Mypy fixes
2019-08-24 22:38:26 +02:00
Alex Stokes
44e5de636f
Add "friendly" peer ID string representation for debugging
2019-08-24 22:38:26 +02:00
Alex Stokes
852609c85d
Clean up base session type
2019-08-24 22:38:26 +02:00
Alex Stokes
9355f33da8
Add basic test for secio
...
Two peers in-memory can create a secure, bidirectional channel
2019-08-24 22:38:26 +02:00
Alex Stokes
b8c0ef9ebb
Fix bugs in secio
implementation
2019-08-24 22:38:25 +02:00
Alex Stokes
228032805a
Some code cleanup
2019-08-24 22:38:25 +02:00
Alex Stokes
3f4589d497
Get tests working
2019-08-24 22:38:25 +02:00
Alex Stokes
d176115972
Add secio
to security upgrader suite
2019-08-24 22:37:46 +02:00
Alex Stokes
376a5d4fc6
Adjust callsite
2019-08-24 22:37:45 +02:00
Alex Stokes
1adef05e94
Typing and linting fixes
2019-08-24 22:37:45 +02:00
Alex Stokes
0fa3331b8c
Add clearer indication of "self encryption"
2019-08-24 22:37:45 +02:00
Alex Stokes
8e913a3faa
Dispatch serialization of keys based on key type
...
- Add some tests to check high-level roundtrip
2019-08-24 22:37:45 +02:00
Alex Stokes
4d30b31c55
Finish first pass at secio
implementation
2019-08-24 22:37:45 +02:00
Alex Stokes
af2e50aaf4
Add facility for authenticated encryption
2019-08-24 22:37:45 +02:00
Alex Stokes
228c17ae9e
Add ECDH key exchange utility
2019-08-24 22:37:44 +02:00
Alex Stokes
fb13dfa7b3
Add sign
and verify
operations for secp256k1
keys
2019-08-24 22:37:44 +02:00
Alex Stokes
3c97a5a0ed
Add ECC key implementation
2019-08-24 22:37:44 +02:00
Alex Stokes
91e11f3ec0
[wip] more secio implementation
2019-08-24 22:37:44 +02:00
Alex Stokes
0cc3fc24a7
Add source for some secure bytes, e.g. to provide a nonce
2019-08-24 22:37:44 +02:00
Alex Stokes
b59c5d6ca1
Add "msgio" functions
2019-08-24 22:37:44 +02:00
Alex Stokes
26165b0729
[wip] sketch of secio handshake
2019-08-24 22:37:44 +02:00
Alex Stokes
fd08bcf624
Add secio
protobufs
2019-08-24 22:37:43 +02:00
Alex Stokes
23f53ef954
Allow optional peer ID in a security session
2019-08-24 22:37:43 +02:00
Alex Stokes
27c0a4f77b
formatting
2019-08-24 22:37:43 +02:00
Alex Stokes
3e07faf343
Merge pull request #266 from ralexstokes/remove-unrelated-cde
...
Remove test suite for `asyncio`, *not* `py-libp2p`
2019-08-24 22:22:06 +02:00
Alex Stokes
d764ca2884
Merge pull request #265 from ralexstokes/add-wait-closed
...
Add call to `wait_closed` method of asyncio.StreamWriter
2019-08-24 22:17:29 +02:00
Alex Stokes
7ccdeaf308
Remove test suite for asyncio
, *not* py-libp2p
2019-08-24 22:10:47 +02:00
Alex Stokes
5b32bfdd3f
Add call to wait_closed
method of asyncio.StreamWriter
2019-08-24 22:06:24 +02:00
Alex Stokes
d9883ee4f0
Merge pull request #263 from ralexstokes/remove-stream-from-connection
...
Encapsulate the concept of a stream to the stream multiplexer
2019-08-24 21:58:59 +02:00
Alex Stokes
9c5fb4fa5a
Encapsulate concept of a "stream id" to a "muxed" connection
2019-08-24 21:50:07 +02:00
Alex Stokes
e29c1507bf
remove unused fields
2019-08-24 21:50:06 +02:00
Alex Stokes
9a74797068
Merge pull request #264 from ralexstokes/remove-simple-security
...
Removes the SimpleSecurityTransport
2019-08-24 21:49:29 +02:00
Alex Stokes
73495038e1
remove simple security
2019-08-24 21:39:25 +02:00
Alex Stokes
1790e48c99
Remove deprecated file
2019-08-24 21:36:30 +02:00
Kevin Mai-Husan Chia
da3c8be464
Merge pull request #253 from mhchia/feature/plaintext-2.0.0
...
Add `/plaintext/2.0.0` secure channel
2019-08-22 23:40:02 +08:00
mhchia
b516579256
Remove the unnecessary RSAPrivateKey.from_bytes
2019-08-22 22:54:14 +08:00
mhchia
c1eacf221f
PR feedback
...
- Check if the received peer id matches the one we initialize the
session with.
- Move the check inside `run_handshake`
2019-08-22 22:53:49 +08:00
Kevin Mai-Husan Chia
7c630df610
Update libp2p/security/insecure/transport.py
...
Co-Authored-By: NIC Lin <twedusuck@gmail.com>
2019-08-22 22:53:49 +08:00
mhchia
16a4fd33c1
PR feedbacks
...
- Move exceptions to exceptions.py
- Raise `UpgradeFailure` in upgrader
- Refine the try/catch for upgraders in swarm
2019-08-22 22:53:49 +08:00
mhchia
3e04480d62
Raise HandshakeFailure
in transport
...
Change the exception handling flow.
Raise `SecurityUpgradeFailure` in security_multistream.
2019-08-22 22:53:48 +08:00
mhchia
80452d9589
Fix make_exchange_message
to use the new API
2019-08-22 22:53:48 +08:00
mhchia
921bfb65cc
Verify the remote pubkey and peer_id
...
- Add `from_bytes` in RSAPublicKey and Secp256k1PublicKey
- Add `pubkey_from_protobuf` to parse pubkey from protobuf
- Verify key and peer_id in `InsecureSession.run_handshake`
2019-08-22 22:53:48 +08:00
mhchia
ef476e555b
Use RawConnection.read
...
Instead of accessing its reader and writer directly.
TODO: considering add `ReaderWriterCloser` interface and let connection
and stream inherit from it.
2019-08-22 22:53:48 +08:00
mhchia
0b466ddc86
Add lock to RawConnection
...
To avoid `self.writer.drain()` is called in parallel.
Reference: https://bugs.python.org/issue29930
2019-08-22 22:53:47 +08:00
mhchia
5768daa9bf
PR feedbacks
...
- Nits
- Add `SecurityUpgradeFailure` and handle `UpgradeFailure` in Swarm.
2019-08-22 22:53:47 +08:00