You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
164 lines
5.4 KiB
164 lines
5.4 KiB
# This module uses code from TLSLlite |
|
# TLSLite Author: Trevor Perrin) |
|
|
|
|
|
import binascii |
|
|
|
from asn1tinydecoder import * |
|
|
|
|
|
def a2b_base64(s): |
|
try: |
|
b = bytearray(binascii.a2b_base64(s)) |
|
except Exception as e: |
|
raise SyntaxError("base64 error: %s" % e) |
|
return b |
|
|
|
def b2a_base64(b): |
|
return binascii.b2a_base64(b) |
|
|
|
|
|
def dePem(s, name): |
|
"""Decode a PEM string into a bytearray of its payload. |
|
|
|
The input must contain an appropriate PEM prefix and postfix |
|
based on the input name string, e.g. for name="CERTIFICATE": |
|
|
|
-----BEGIN CERTIFICATE----- |
|
MIIBXDCCAUSgAwIBAgIBADANBgkqhkiG9w0BAQUFADAPMQ0wCwYDVQQDEwRUQUNL |
|
... |
|
KoZIhvcNAQEFBQADAwA5kw== |
|
-----END CERTIFICATE----- |
|
|
|
The first such PEM block in the input will be found, and its |
|
payload will be base64 decoded and returned. |
|
""" |
|
prefix = "-----BEGIN %s-----" % name |
|
postfix = "-----END %s-----" % name |
|
start = s.find(prefix) |
|
if start == -1: |
|
raise SyntaxError("Missing PEM prefix") |
|
end = s.find(postfix, start+len(prefix)) |
|
if end == -1: |
|
raise SyntaxError("Missing PEM postfix") |
|
s = s[start+len("-----BEGIN %s-----" % name) : end] |
|
retBytes = a2b_base64(s) # May raise SyntaxError |
|
return retBytes |
|
|
|
def dePemList(s, name): |
|
"""Decode a sequence of PEM blocks into a list of bytearrays. |
|
|
|
The input must contain any number of PEM blocks, each with the appropriate |
|
PEM prefix and postfix based on the input name string, e.g. for |
|
name="TACK BREAK SIG". Arbitrary text can appear between and before and |
|
after the PEM blocks. For example: |
|
|
|
" Created by TACK.py 0.9.3 Created at 2012-02-01T00:30:10Z -----BEGIN TACK |
|
BREAK SIG----- |
|
ATKhrz5C6JHJW8BF5fLVrnQss6JnWVyEaC0p89LNhKPswvcC9/s6+vWLd9snYTUv |
|
YMEBdw69PUP8JB4AdqA3K6Ap0Fgd9SSTOECeAKOUAym8zcYaXUwpk0+WuPYa7Zmm |
|
SkbOlK4ywqt+amhWbg9txSGUwFO5tWUHT3QrnRlE/e3PeNFXLx5Bckg= -----END TACK |
|
BREAK SIG----- Created by TACK.py 0.9.3 Created at 2012-02-01T00:30:11Z |
|
-----BEGIN TACK BREAK SIG----- |
|
ATKhrz5C6JHJW8BF5fLVrnQss6JnWVyEaC0p89LNhKPswvcC9/s6+vWLd9snYTUv |
|
YMEBdw69PUP8JB4AdqA3K6BVCWfcjN36lx6JwxmZQncS6sww7DecFO/qjSePCxwM |
|
+kdDqX/9/183nmjx6bf0ewhPXkA0nVXsDYZaydN8rJU1GaMlnjcIYxY= -----END TACK |
|
BREAK SIG----- " |
|
|
|
All such PEM blocks will be found, decoded, and return in an ordered list |
|
of bytearrays, which may have zero elements if not PEM blocks are found. |
|
""" |
|
bList = [] |
|
prefix = "-----BEGIN %s-----" % name |
|
postfix = "-----END %s-----" % name |
|
while 1: |
|
start = s.find(prefix) |
|
if start == -1: |
|
return bList |
|
end = s.find(postfix, start+len(prefix)) |
|
if end == -1: |
|
raise SyntaxError("Missing PEM postfix") |
|
s2 = s[start+len(prefix) : end] |
|
retBytes = a2b_base64(s2) # May raise SyntaxError |
|
bList.append(retBytes) |
|
s = s[end+len(postfix) : ] |
|
|
|
def pem(b, name): |
|
"""Encode a payload bytearray into a PEM string. |
|
|
|
The input will be base64 encoded, then wrapped in a PEM prefix/postfix |
|
based on the name string, e.g. for name="CERTIFICATE": |
|
|
|
-----BEGIN CERTIFICATE----- |
|
MIIBXDCCAUSgAwIBAgIBADANBgkqhkiG9w0BAQUFADAPMQ0wCwYDVQQDEwRUQUNL |
|
... |
|
KoZIhvcNAQEFBQADAwA5kw== |
|
-----END CERTIFICATE----- |
|
""" |
|
s1 = b2a_base64(b)[:-1] # remove terminating \n |
|
s2 = "" |
|
while s1: |
|
s2 += s1[:64] + "\n" |
|
s1 = s1[64:] |
|
s = ("-----BEGIN %s-----\n" % name) + s2 + \ |
|
("-----END %s-----\n" % name) |
|
return s |
|
|
|
def pemSniff(inStr, name): |
|
searchStr = "-----BEGIN %s-----" % name |
|
return searchStr in inStr |
|
|
|
|
|
def parse_private_key(s): |
|
"""Parse a string containing a PEM-encoded <privateKey>.""" |
|
if pemSniff(s, "PRIVATE KEY"): |
|
bytes = dePem(s, "PRIVATE KEY") |
|
return _parsePKCS8(bytes) |
|
elif pemSniff(s, "RSA PRIVATE KEY"): |
|
bytes = dePem(s, "RSA PRIVATE KEY") |
|
return _parseSSLeay(bytes) |
|
else: |
|
raise SyntaxError("Not a PEM private key file") |
|
|
|
|
|
def _parsePKCS8(bytes): |
|
s = str(bytes) |
|
root = asn1_node_root(s) |
|
version_node = asn1_node_first_child(s, root) |
|
version = bytestr_to_int(asn1_get_value_of_type(s, version_node, 'INTEGER')) |
|
if version != 0: |
|
raise SyntaxError("Unrecognized PKCS8 version") |
|
rsaOID_node = asn1_node_next(s, version_node) |
|
ii = asn1_node_first_child(s, rsaOID_node) |
|
rsaOID = decode_OID(asn1_get_value_of_type(s, ii, 'OBJECT IDENTIFIER')) |
|
if rsaOID != '1.2.840.113549.1.1.1': |
|
raise SyntaxError("Unrecognized AlgorithmIdentifier") |
|
privkey_node = asn1_node_next(s, rsaOID_node) |
|
value = asn1_get_value_of_type(s, privkey_node, 'OCTET STRING') |
|
return _parseASN1PrivateKey(value) |
|
|
|
|
|
def _parseSSLeay(bytes): |
|
return _parseASN1PrivateKey(str(bytes)) |
|
|
|
|
|
def bytesToNumber(s): |
|
return int(binascii.hexlify(s), 16) |
|
|
|
|
|
def _parseASN1PrivateKey(s): |
|
root = asn1_node_root(s) |
|
version_node = asn1_node_first_child(s, root) |
|
version = bytestr_to_int(asn1_get_value_of_type(s, version_node, 'INTEGER')) |
|
if version != 0: |
|
raise SyntaxError("Unrecognized RSAPrivateKey version") |
|
n = asn1_node_next(s, version_node) |
|
e = asn1_node_next(s, n) |
|
d = asn1_node_next(s, e) |
|
p = asn1_node_next(s, d) |
|
q = asn1_node_next(s, p) |
|
dP = asn1_node_next(s, q) |
|
dQ = asn1_node_next(s, dP) |
|
qInv = asn1_node_next(s, dQ) |
|
return map(lambda x: bytesToNumber(asn1_get_value_of_type(s, x, 'INTEGER')), [n, e, d, p, q, dP, dQ, qInv]) |
|
|
|
|