Compare commits

...

9 Commits

10 changed files with 70 additions and 44 deletions

2
.gitignore vendored
View File

@ -5,3 +5,5 @@
/build/classes/kotlin/jvm/main/ /build/classes/kotlin/jvm/main/
/build/classes/kotlin/jvm/test/ /build/classes/kotlin/jvm/test/
/.idea /.idea
/.kotlin/
/.gigaide/gigaide.properties

View File

@ -2,7 +2,9 @@
[![License: MIT](https://img.shields.io/badge/License-MIT-yellow.svg)](https://opensource.org/licenses/MIT) [![License: MIT](https://img.shields.io/badge/License-MIT-yellow.svg)](https://opensource.org/licenses/MIT)
> Current stable version 0.2.3 We have moved off github due to growing tensions in the world. Thanks for understanding.
> Current stable version 0.2.6
This project targets to provide command set of multiplatform tools to faciliate restore access with non-recoverable passwords by providing a backup `secret` string as the only way to reset the password. It is ready to use in android, web and server apps (native target is not yet supported because of the encryption layer not yet supporting it) This project targets to provide command set of multiplatform tools to faciliate restore access with non-recoverable passwords by providing a backup `secret` string as the only way to reset the password. It is ready to use in android, web and server apps (native target is not yet supported because of the encryption layer not yet supporting it)
@ -35,7 +37,7 @@ and add in dependencies like:
~~~ ~~~
dependencies { dependencies {
//... //...
implementation("net.sergeych:superlogin:0.2.3") implementation("net.sergeych:superlogin:0.2.6")
} }
~~~ ~~~

View File

@ -1,15 +1,15 @@
plugins { plugins {
kotlin("multiplatform") version "1.7.21" kotlin("multiplatform") version "2.1.0"
kotlin("plugin.serialization") version "1.7.21" kotlin("plugin.serialization") version "2.1.0"
`maven-publish` `maven-publish`
} }
val ktor_version="2.1.1" val ktor_version="2.3.12"
val logback_version="1.2.10" val logback_version="1.2.10"
group = "net.sergeych" group = "net.sergeych"
version = "0.2.2" version = "0.3.2-SNAPSHOT"
repositories { repositories {
mavenCentral() mavenCentral()
@ -23,20 +23,13 @@ repositories {
kotlin { kotlin {
jvm { jvmToolchain(17)
compilations.all { jvm()
kotlinOptions.jvmTarget = "1.8"
}
withJava()
testRuns["test"].executionTask.configure {
useJUnitPlatform()
}
}
js(IR) { js(IR) {
browser { browser {
commonWebpackConfig { // commonWebpackConfig {
cssSupport.enabled = true // cssSupport.enabled = true
} // }
testTask { testTask {
useMocha { useMocha {
timeout = "30000" timeout = "30000"
@ -51,9 +44,7 @@ kotlin {
val commonMain by getting { val commonMain by getting {
dependencies { dependencies {
implementation("org.jetbrains.kotlinx:kotlinx-coroutines-core:1.6.3") implementation("org.jetbrains.kotlinx:kotlinx-coroutines-core:1.6.3")
api("net.sergeych:unikrypto:1.2.2-SNAPSHOT") api("net.sergeych:parsec3:0.5.3")
api("net.sergeych:parsec3:0.4.3-SNAPSHOT")
api("net.sergeych:boss-serialization-mp:0.2.4-SNAPSHOT")
api("net.sergeych:unikrypto:1.2.5") api("net.sergeych:unikrypto:1.2.5")
} }
} }

View File

@ -1,4 +1,2 @@
kotlin.code.style=official kotlin.code.style=official
kotlin.mpp.enableGranularSourceSetsMetadata=true
kotlin.native.enableDependencyPropagation=false
kotlin.js.generate.executable.default=false kotlin.js.generate.executable.default=false

View File

@ -1,5 +1,5 @@
distributionBase=GRADLE_USER_HOME distributionBase=GRADLE_USER_HOME
distributionPath=wrapper/dists distributionPath=wrapper/dists
distributionUrl=https\://services.gradle.org/distributions/gradle-7.4.2-bin.zip distributionUrl=https\://services.gradle.org/distributions/gradle-8.2-bin.zip
zipStoreBase=GRADLE_USER_HOME zipStoreBase=GRADLE_USER_HOME
zipStorePath=wrapper/dists zipStorePath=wrapper/dists

View File

@ -19,14 +19,19 @@ data class RegistrationArgs(
val packedACO: ByteArray, val packedACO: ByteArray,
val extraData: ByteArray? = null val extraData: ByteArray? = null
) { ) {
@Suppress("unused")
inline fun <reified T>toSuccess(loginToken: ByteArray, extraData: T): AuthenticationResult.Success { inline fun <reified T>toSuccess(loginToken: ByteArray, extraData: T): AuthenticationResult.Success {
return AuthenticationResult.Success( return AuthenticationResult.Success(
loginName, loginToken, BossEncoder.encode(extraData) loginName, loginToken, BossEncoder.encode(extraData)
) )
} }
inline fun <reified T>decodeOrNull(): T? = extraData?.let { it.decodeBoss<T>() } @Suppress("unused")
inline fun <reified T: Any>decodeOrThrow(): T = extraData?.let { it.decodeBoss<T>() } inline fun <reified T>decodeOrNull(): T? = extraData?.decodeBoss<T>()
@Suppress("unused")
inline fun <reified T: Any>decodeOrThrow(): T = extraData?.decodeBoss<T>()
?: throw IllegalArgumentException("missing require extra data of type ${T::class.simpleName}") ?: throw IllegalArgumentException("missing require extra data of type ${T::class.simpleName}")
} }
@ -44,6 +49,11 @@ sealed class AuthenticationResult {
@SerialName("LoginUnavailable") @SerialName("LoginUnavailable")
object LoginUnavailable: AuthenticationResult() object LoginUnavailable: AuthenticationResult()
@Serializable
@SerialName("OtherError")
class OtherError(val reason: String,val packedData: ByteArray?=null): AuthenticationResult()
@Serializable @Serializable
@SerialName("LoginIdUnavailable") @SerialName("LoginIdUnavailable")
object LoginIdUnavailable: AuthenticationResult() object LoginIdUnavailable: AuthenticationResult()

View File

@ -34,6 +34,7 @@ class Registration(
val pbkdfRounds: Int = 15000, val pbkdfRounds: Int = 15000,
) : LogTag("SLREG") { ) : LogTag("SLREG") {
@Suppress("unused")
sealed class Result { sealed class Result {
/** /**
* Login is already in use or is somehow else invalid * Login is already in use or is somehow else invalid
@ -53,6 +54,8 @@ class Registration(
val encodedData: ByteArray?) : Result() { val encodedData: ByteArray?) : Result() {
inline fun <reified D>data() = encodedData?.let { BossDecoder.decodeFrom<D>(it)} inline fun <reified D>data() = encodedData?.let { BossDecoder.decodeFrom<D>(it)}
} }
class OtherError(val code: String,val packedData: ByteArray?=null): Result()
} }
private var lastPasswordHash: ByteArray? = null private var lastPasswordHash: ByteArray? = null
@ -90,7 +93,7 @@ class Registration(
val nonce = adapter.invokeCommand(api.slGetNonce) val nonce = adapter.invokeCommand(api.slGetNonce)
val loginPrivateKey = deferredLoginKey.await() val loginPrivateKey = deferredLoginKey.await()
val spl = SuperloginRestoreAccessPayload(login, loginPrivateKey, dataKey) val spl = SuperloginRestoreAccessPayload(login, loginPrivateKey, dataKey)
repeat(10) { repeat(3) {
val (restoreKey, restoreData) = AccessControlObject.pack(passwordKeys!!.loginAccessKey, spl) val (restoreKey, restoreData) = AccessControlObject.pack(passwordKeys!!.loginAccessKey, spl)
try { try {
val packedArgs = SignedRecord.pack( val packedArgs = SignedRecord.pack(
@ -122,6 +125,8 @@ class Registration(
AuthenticationResult.LoginUnavailable -> return Result.InvalidLogin AuthenticationResult.LoginUnavailable -> return Result.InvalidLogin
is AuthenticationResult.OtherError -> return Result.OtherError(result.reason, result.packedData)
is AuthenticationResult.Success -> { is AuthenticationResult.Success -> {
return Result.Success( return Result.Success(
restoreKey.secret, restoreKey.secret,

View File

@ -15,8 +15,7 @@ import net.sergeych.mp_tools.globalLaunch
import net.sergeych.parsec3.* import net.sergeych.parsec3.*
import net.sergeych.superlogin.* import net.sergeych.superlogin.*
import net.sergeych.superlogin.server.SuperloginRestoreAccessPayload import net.sergeych.superlogin.server.SuperloginRestoreAccessPayload
import net.sergeych.unikrypto.SignedRecord import net.sergeych.unikrypto.*
import net.sergeych.unikrypto.SymmetricKey
import kotlin.reflect.KType import kotlin.reflect.KType
import kotlin.reflect.typeOf import kotlin.reflect.typeOf
@ -394,7 +393,7 @@ class SuperloginClient<D, S : WithAdapter>(
aco.payload.dataStorageKey aco.payload.dataStorageKey
) )
// new ACO with a new password key and payload (but the same secret!) // new ACO with a new password key and payload (but the same secret!)
var newAco = aco.updatePasswordKey(keys.loginAccessKey).updatePayload(newSlp) val newAco = aco.updatePasswordKey(keys.loginAccessKey).updatePayload(newSlp)
// trying to update // trying to update
val result = invoke( val result = invoke(
serverApi.slChangePasswordAndLogin, ChangePasswordArgs( serverApi.slChangePasswordAndLogin, ChangePasswordArgs(
@ -422,14 +421,18 @@ class SuperloginClient<D, S : WithAdapter>(
} }
/** /**
* Change password for a logged-in user using its known password. It is a long operation * Change password for a logged-in user using its known password. It is a long operation.
*
* @param oldPassword existing password (re-request it from a user!) * @param oldPassword existing password (re-request it from a user!)
* @param newPassword new password. we do not chek it but it should be strong - check it on your end * @param newPassword new password. we do not check it, but it should be strong - check it on your end
* for example with [net.sergeych.unikrypto.Passwords] tools * for example with [net.sergeych.unikrypto.Passwords] tools
* @param passwordDerivationParams at this point derivation parameters are alwaus updated so it is possible * @param passwordDerivationParams at this point derivation parameters are always updated so it is possible
* to set it to desired * to set it to desired
* @param loginKeyStrength login key is regenerateed so its strength could be updated here * @param loginKeyStrength login key is regenerated so its strength could be updated here
* @return true if the password has been successfully changed *
* @return true if the password has been successfully changed, false if the server didn't allow it.
*
* @throws InvalidPasswordError if the oldPassword is wrong
*/ */
suspend fun changePassword( suspend fun changePassword(
oldPassword: String, newPassword: String, oldPassword: String, newPassword: String,
@ -441,10 +444,24 @@ class SuperloginClient<D, S : WithAdapter>(
val dp = invoke(serverApi.slRequestDerivationParams, loginName) val dp = invoke(serverApi.slRequestDerivationParams, loginName)
val keys = DerivedKeys.derive(oldPassword, dp) val keys = DerivedKeys.derive(oldPassword, dp)
val data = invoke(serverApi.slRequestACOByLoginName, RequestACOByLoginNameArgs(loginName, keys.loginId)) val data = invoke(serverApi.slRequestACOByLoginName, RequestACOByLoginNameArgs(loginName, keys.loginId))
return AccessControlObject.unpackWithKey<SuperloginRestoreAccessPayload>(data.packedACO, keys.loginAccessKey) try {
return AccessControlObject.unpackWithKey<SuperloginRestoreAccessPayload>(
data.packedACO,
keys.loginAccessKey
)
?.let { ?.let {
changePasswordWithACO(it, newPassword, passwordDerivationParams, loginKeyStrength) changePasswordWithACO(it, newPassword, passwordDerivationParams, loginKeyStrength)
} ?: false } ?: false
} catch (e: Exception) {
when (e) {
is Container.StructureError,
is Container.DecryptionError,
is EncryptedBinaryStorage.DecryptionFailed ->
throw InvalidPasswordError()
else -> throw e
}
}
} }

View File

@ -18,7 +18,7 @@ internal class AccessControlObjectTest {
val pk1 = SymmetricKeys.random() val pk1 = SymmetricKeys.random()
val pk2 = SymmetricKeys.random() val pk2 = SymmetricKeys.random()
val (rk, packed1) = AccessControlObject.pack(pk1, 117) val (rk, packed1) = AccessControlObject.pack(pk1, 117)
println(rk.secret) // println(rk.secret)
val ac1 = AccessControlObject.unpackWithKey<Int>(packed1,pk1) val ac1 = AccessControlObject.unpackWithKey<Int>(packed1,pk1)
assertNotNull(ac1) assertNotNull(ac1)
assertEquals(117, ac1.payload) assertEquals(117, ac1.payload)

View File

@ -59,7 +59,7 @@ data class TestSession(val s: TestStorage) : SLServerSession<TestData>() {
} }
override suspend fun loginByToken(token: ByteArray): AuthenticationResult { override suspend fun loginByToken(token: ByteArray): AuthenticationResult {
println("requested login by tokeb ${token.encodeToBase64Compact()}") println("requested login by token ${token.encodeToBase64Compact()}")
println(" ${s.byToken[token.toList()]}") println(" ${s.byToken[token.toList()]}")
println(" ${s.byToken.size} / ${s.byLoginId.size}") println(" ${s.byToken.size} / ${s.byLoginId.size}")
@ -218,14 +218,15 @@ internal class WsServerKtTest {
val api = TestApiServer<WithAdapter>() val api = TestApiServer<WithAdapter>()
val slc = SuperloginClient<TestData, S1>(client) val slc = SuperloginClient<TestData, S1>(client)
assertEquals(LoginState.LoggedOut, slc.state.value) assertEquals(LoginState.LoggedOut, slc.state.value)
var rt = slc.register("foo", "passwd", TestData("bar!")) var rt = slc.register("foo", "passwd", TestData("bar!"), 2048, 140)
val dk1 = slc.dataKey!! val dk1 = slc.dataKey!!
assertIs<Registration.Result.Success>(rt) assertIs<Registration.Result.Success>(rt)
val secret = rt.secret val secret = rt.secret
var token = rt.loginToken var token = rt.loginToken
assertFalse(slc.changePassword("wrong", "new")) assertFalse(slc.changePassword("wrong", "new"))
assertTrue(slc.changePassword("passwd", "newpass1")) assertTrue(slc.changePassword("passwd", "newpass1",
PasswordDerivationParams(300), 2048))
assertTrue { slc.isLoggedIn } assertTrue { slc.isLoggedIn }
assertEquals("foo", slc.call(api.loginName)) assertEquals("foo", slc.call(api.loginName))