mirror of https://github.com/TriliumNext/Notes
password change (reencryption)
parent
42c21afa62
commit
b83f090486
@ -0,0 +1,74 @@
|
|||||||
|
#!/usr/bin/python
|
||||||
|
|
||||||
|
import src.config_provider
|
||||||
|
import src.sql
|
||||||
|
import base64
|
||||||
|
import getpass
|
||||||
|
from Crypto.Cipher import AES
|
||||||
|
from Crypto.Util import Counter
|
||||||
|
import binascii
|
||||||
|
|
||||||
|
import src.my_scrypt
|
||||||
|
|
||||||
|
currentPassword = getpass.getpass(prompt="Enter current password: ")
|
||||||
|
|
||||||
|
currentPasswordHash = binascii.hexlify(src.my_scrypt.getVerificationHash(currentPassword))
|
||||||
|
|
||||||
|
config = src.config_provider.getConfig()
|
||||||
|
|
||||||
|
if currentPasswordHash != config['Login']['passwordHash']:
|
||||||
|
print("Given password doesn't match hash")
|
||||||
|
exit(-1)
|
||||||
|
|
||||||
|
currentPasswordEncryptionKey = src.my_scrypt.getEncryptionHash(currentPassword)
|
||||||
|
|
||||||
|
newPassword1 = getpass.getpass(prompt="Enter new password: ")
|
||||||
|
newPassword2 = getpass.getpass(prompt="Repeat the same password: ")
|
||||||
|
|
||||||
|
if newPassword1 != newPassword2:
|
||||||
|
print('Entered passwords are not identical!')
|
||||||
|
exit(-1)
|
||||||
|
|
||||||
|
newPasswordVerificationKey = binascii.hexlify(src.my_scrypt.getVerificationHash(newPassword1))
|
||||||
|
newPasswordEncryptionKey = src.my_scrypt.getEncryptionHash(newPassword1)
|
||||||
|
|
||||||
|
src.sql.connect(config['Document']['documentPath'])
|
||||||
|
|
||||||
|
encryptedNotes = src.sql.getResults("select note_id, note_title, note_text from notes where encryption = 1")
|
||||||
|
|
||||||
|
def decrypt(encryptedBase64):
|
||||||
|
encryptedBytes = base64.b64decode(encryptedBase64)
|
||||||
|
|
||||||
|
aes = getAes(currentPasswordEncryptionKey)
|
||||||
|
return aes.decrypt(encryptedBytes)
|
||||||
|
|
||||||
|
def encrypt(plainText):
|
||||||
|
aes = getAes(newPasswordEncryptionKey)
|
||||||
|
encryptedBytes = aes.encrypt(plainText)
|
||||||
|
|
||||||
|
return base64.b64encode(encryptedBytes)
|
||||||
|
|
||||||
|
def getAes(key):
|
||||||
|
return AES.new(key, AES.MODE_CTR, counter=Counter.new(128, initial_value=5))
|
||||||
|
|
||||||
|
for note in encryptedNotes:
|
||||||
|
decryptedTitle = decrypt(note['note_title'])
|
||||||
|
decryptedText = decrypt(note['note_text'])
|
||||||
|
|
||||||
|
reEncryptedTitle = encrypt(decryptedTitle)
|
||||||
|
reEncryptedText = encrypt(decryptedText)
|
||||||
|
|
||||||
|
print (reEncryptedTitle)
|
||||||
|
print (reEncryptedText)
|
||||||
|
|
||||||
|
src.sql.execute("update notes set note_title = ?, note_text = ? where note_id = ?",
|
||||||
|
[reEncryptedTitle, reEncryptedText, note['note_id']])
|
||||||
|
|
||||||
|
print("Note " + note['note_id'] + " reencrypted with new password")
|
||||||
|
|
||||||
|
print("New password hash is: " + newPasswordVerificationKey)
|
||||||
|
print("Set this value to passwordHash value in config.ini")
|
||||||
|
|
||||||
|
src.sql.commit()
|
||||||
|
|
||||||
|
print("Changes committed. All encrypted notes were re-encrypted successfully with new password key.")
|
||||||
@ -1,28 +1,15 @@
|
|||||||
#!/usr/bin/python
|
#!/usr/bin/python
|
||||||
|
|
||||||
import getpass
|
import getpass
|
||||||
|
import src.my_scrypt
|
||||||
import scrypt # pip install scrypt
|
|
||||||
import binascii
|
|
||||||
|
|
||||||
password1 = getpass.getpass()
|
password1 = getpass.getpass()
|
||||||
|
password2 = getpass.getpass(prompt='Repeat the same password:')
|
||||||
print('Repeat the same password:')
|
|
||||||
|
|
||||||
password2 = getpass.getpass()
|
|
||||||
|
|
||||||
if password1 == password2:
|
if password1 == password2:
|
||||||
# salt is constant
|
hash = src.my_scrypt.getVerificationHash(password1)
|
||||||
salt = "dc73b57736511340f132e4b5521d178afa6311c45e0c25e6a9339038507852a6"
|
|
||||||
|
|
||||||
hashed = scrypt.hash(password=password1,
|
|
||||||
salt=salt,
|
|
||||||
N=16384,
|
|
||||||
r=8,
|
|
||||||
p=1,
|
|
||||||
buflen=32)
|
|
||||||
|
|
||||||
print('Generated password hash:')
|
print('Generated password hash:')
|
||||||
print(binascii.hexlify(hashed))
|
print(hash)
|
||||||
else:
|
else:
|
||||||
print('Entered passwords are not identical!')
|
print('Entered passwords are not identical!')
|
||||||
@ -0,0 +1,7 @@
|
|||||||
|
import configparser
|
||||||
|
|
||||||
|
def getConfig():
|
||||||
|
config = configparser.ConfigParser()
|
||||||
|
config.read('config.ini')
|
||||||
|
|
||||||
|
return config
|
||||||
@ -0,0 +1,21 @@
|
|||||||
|
import scrypt # pip install scrypt
|
||||||
|
|
||||||
|
def getVerificationHash(password):
|
||||||
|
salt = "dc73b57736511340f132e4b5521d178afa6311c45e0c25e6a9339038507852a6"
|
||||||
|
|
||||||
|
return getScryptHash(password, salt)
|
||||||
|
|
||||||
|
def getEncryptionHash(password):
|
||||||
|
salt = "2503bfc386bc028772f803887eaaf4d4a5c1019036873e4ba5de79a4efb7e8d8"
|
||||||
|
|
||||||
|
return getScryptHash(password, salt)
|
||||||
|
|
||||||
|
def getScryptHash(password, salt):
|
||||||
|
hashed = scrypt.hash(password=password,
|
||||||
|
salt=salt,
|
||||||
|
N=16384,
|
||||||
|
r=8,
|
||||||
|
p=1,
|
||||||
|
buflen=32)
|
||||||
|
|
||||||
|
return hashed
|
||||||
Loading…
Reference in New Issue