96 lines
2.8 KiB
Python
96 lines
2.8 KiB
Python
import paho.mqtt.client as paho
|
|
# from simplecrypt import encrypt, decrypt
|
|
from cryptography.fernet import Fernet
|
|
import base64
|
|
import _ctypes
|
|
from ctypes import *
|
|
from textwrap import wrap
|
|
|
|
|
|
# Konfigurasi MQTT server
|
|
broker = "nnag.xyz"
|
|
client = paho.Client()
|
|
port = 1883
|
|
|
|
|
|
def u_decrypt(arg):
|
|
print("Cipher Length : ", len(arg))
|
|
so_file2 = './EES593/URG_decrypt.so'
|
|
u_dec = CDLL(so_file2)
|
|
u_dec.main.restype = c_char_p
|
|
u_dec.main.argtype = c_char_p
|
|
c_return = u_dec.main(arg)
|
|
_ctypes.dlclose(u_dec._handle)
|
|
# print("Python Log, C RETURN TYPE : ", type(c_return))
|
|
return c_return.decode('ascii')
|
|
|
|
def file_handler(f_name, num):
|
|
num = str(num).zfill(2)
|
|
f = open("./cipher/"+f_name+"_"+num+".dat", "rb")
|
|
f_val = f.read()
|
|
f.close()
|
|
return f_val
|
|
|
|
def write_handler(f_name, num, arg):
|
|
num = str(num).zfill(2)
|
|
f = open("./cipher/"+f_name+"_"+num+".dat", "wb")
|
|
f.write(arg)
|
|
f.close()
|
|
|
|
def rsa_file_handler(f_name, num):
|
|
num = str(num).zfill(2)
|
|
f = open("./cipher/"+f_name+"_"+num+".dat", "rb")
|
|
f_val = f.read()
|
|
return f.val
|
|
|
|
def on_connect(client, userdata, flags, rc):
|
|
print("Connected with result code "+str(rc))
|
|
client.subscribe("device01/msg")
|
|
|
|
#Proses enkripsi
|
|
def payload_process(msg):
|
|
if len(msg) > 736:
|
|
msg_arr = wrap(msg, 736)
|
|
dec_msg_arr = []
|
|
for i in range(len(msg_arr)):
|
|
msg = base64.b64decode(msg_arr[i])
|
|
# print("=====[ Decryption Sequence "+str(i+1)+" ]=================")
|
|
dec_msg = u_decrypt(msg)
|
|
dec_msg_arr.append(dec_msg)
|
|
# print("C Return String : ", dec_msg )
|
|
final_msg = ''.join(dec_msg_arr)
|
|
else:
|
|
msg = base64.b64decode(msg)
|
|
final_msg = u_decrypt(msg)
|
|
return final_msg
|
|
|
|
def on_message(client, userdata, msg):
|
|
# print("========================================")
|
|
# print("Topic : ", msg.topic)
|
|
# print("QOS : ", msg.qos)
|
|
# print("Payload : ", msg.payload)
|
|
msg = msg.payload.decode()
|
|
if len(msg) != 0:
|
|
# all_data = msg.split('&', 1)
|
|
# user_ip = all_data[0]
|
|
# msg = all_data[1]
|
|
# print("Publisher : ",user_ip)
|
|
print("====[ Result ]=======================")
|
|
print("Incomming Message Length : ", len(msg))
|
|
# print("Incomming Message Type : ", type(msg))
|
|
real_data = payload_process(msg)
|
|
# real_data = real_data[1]
|
|
print("Decryption Result (Plaintext) : ", real_data)
|
|
print("Result Length : ", len(real_data))
|
|
print(" ")
|
|
return real_data
|
|
|
|
base_name = "cipher"
|
|
base_name_RSA3 = "RSA_3072"
|
|
base_name_RSA7 = "RSA_7680"
|
|
|
|
client.connect(broker,port)
|
|
client.on_connect = on_connect
|
|
client.on_message = on_message
|
|
client.loop_forever()
|