You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
164 lines
5.4 KiB
164 lines
5.4 KiB
# This module uses code from TLSLlite
|
|
# TLSLite Author: Trevor Perrin)
|
|
|
|
|
|
import binascii
|
|
|
|
from asn1tinydecoder import *
|
|
|
|
|
|
def a2b_base64(s):
|
|
try:
|
|
b = bytearray(binascii.a2b_base64(s))
|
|
except Exception as e:
|
|
raise SyntaxError("base64 error: %s" % e)
|
|
return b
|
|
|
|
def b2a_base64(b):
|
|
return binascii.b2a_base64(b)
|
|
|
|
|
|
def dePem(s, name):
|
|
"""Decode a PEM string into a bytearray of its payload.
|
|
|
|
The input must contain an appropriate PEM prefix and postfix
|
|
based on the input name string, e.g. for name="CERTIFICATE":
|
|
|
|
-----BEGIN CERTIFICATE-----
|
|
MIIBXDCCAUSgAwIBAgIBADANBgkqhkiG9w0BAQUFADAPMQ0wCwYDVQQDEwRUQUNL
|
|
...
|
|
KoZIhvcNAQEFBQADAwA5kw==
|
|
-----END CERTIFICATE-----
|
|
|
|
The first such PEM block in the input will be found, and its
|
|
payload will be base64 decoded and returned.
|
|
"""
|
|
prefix = "-----BEGIN %s-----" % name
|
|
postfix = "-----END %s-----" % name
|
|
start = s.find(prefix)
|
|
if start == -1:
|
|
raise SyntaxError("Missing PEM prefix")
|
|
end = s.find(postfix, start+len(prefix))
|
|
if end == -1:
|
|
raise SyntaxError("Missing PEM postfix")
|
|
s = s[start+len("-----BEGIN %s-----" % name) : end]
|
|
retBytes = a2b_base64(s) # May raise SyntaxError
|
|
return retBytes
|
|
|
|
def dePemList(s, name):
|
|
"""Decode a sequence of PEM blocks into a list of bytearrays.
|
|
|
|
The input must contain any number of PEM blocks, each with the appropriate
|
|
PEM prefix and postfix based on the input name string, e.g. for
|
|
name="TACK BREAK SIG". Arbitrary text can appear between and before and
|
|
after the PEM blocks. For example:
|
|
|
|
" Created by TACK.py 0.9.3 Created at 2012-02-01T00:30:10Z -----BEGIN TACK
|
|
BREAK SIG-----
|
|
ATKhrz5C6JHJW8BF5fLVrnQss6JnWVyEaC0p89LNhKPswvcC9/s6+vWLd9snYTUv
|
|
YMEBdw69PUP8JB4AdqA3K6Ap0Fgd9SSTOECeAKOUAym8zcYaXUwpk0+WuPYa7Zmm
|
|
SkbOlK4ywqt+amhWbg9txSGUwFO5tWUHT3QrnRlE/e3PeNFXLx5Bckg= -----END TACK
|
|
BREAK SIG----- Created by TACK.py 0.9.3 Created at 2012-02-01T00:30:11Z
|
|
-----BEGIN TACK BREAK SIG-----
|
|
ATKhrz5C6JHJW8BF5fLVrnQss6JnWVyEaC0p89LNhKPswvcC9/s6+vWLd9snYTUv
|
|
YMEBdw69PUP8JB4AdqA3K6BVCWfcjN36lx6JwxmZQncS6sww7DecFO/qjSePCxwM
|
|
+kdDqX/9/183nmjx6bf0ewhPXkA0nVXsDYZaydN8rJU1GaMlnjcIYxY= -----END TACK
|
|
BREAK SIG----- "
|
|
|
|
All such PEM blocks will be found, decoded, and return in an ordered list
|
|
of bytearrays, which may have zero elements if not PEM blocks are found.
|
|
"""
|
|
bList = []
|
|
prefix = "-----BEGIN %s-----" % name
|
|
postfix = "-----END %s-----" % name
|
|
while 1:
|
|
start = s.find(prefix)
|
|
if start == -1:
|
|
return bList
|
|
end = s.find(postfix, start+len(prefix))
|
|
if end == -1:
|
|
raise SyntaxError("Missing PEM postfix")
|
|
s2 = s[start+len(prefix) : end]
|
|
retBytes = a2b_base64(s2) # May raise SyntaxError
|
|
bList.append(retBytes)
|
|
s = s[end+len(postfix) : ]
|
|
|
|
def pem(b, name):
|
|
"""Encode a payload bytearray into a PEM string.
|
|
|
|
The input will be base64 encoded, then wrapped in a PEM prefix/postfix
|
|
based on the name string, e.g. for name="CERTIFICATE":
|
|
|
|
-----BEGIN CERTIFICATE-----
|
|
MIIBXDCCAUSgAwIBAgIBADANBgkqhkiG9w0BAQUFADAPMQ0wCwYDVQQDEwRUQUNL
|
|
...
|
|
KoZIhvcNAQEFBQADAwA5kw==
|
|
-----END CERTIFICATE-----
|
|
"""
|
|
s1 = b2a_base64(b)[:-1] # remove terminating \n
|
|
s2 = ""
|
|
while s1:
|
|
s2 += s1[:64] + "\n"
|
|
s1 = s1[64:]
|
|
s = ("-----BEGIN %s-----\n" % name) + s2 + \
|
|
("-----END %s-----\n" % name)
|
|
return s
|
|
|
|
def pemSniff(inStr, name):
|
|
searchStr = "-----BEGIN %s-----" % name
|
|
return searchStr in inStr
|
|
|
|
|
|
def parse_private_key(s):
|
|
"""Parse a string containing a PEM-encoded <privateKey>."""
|
|
if pemSniff(s, "PRIVATE KEY"):
|
|
bytes = dePem(s, "PRIVATE KEY")
|
|
return _parsePKCS8(bytes)
|
|
elif pemSniff(s, "RSA PRIVATE KEY"):
|
|
bytes = dePem(s, "RSA PRIVATE KEY")
|
|
return _parseSSLeay(bytes)
|
|
else:
|
|
raise SyntaxError("Not a PEM private key file")
|
|
|
|
|
|
def _parsePKCS8(bytes):
|
|
s = str(bytes)
|
|
root = asn1_node_root(s)
|
|
version_node = asn1_node_first_child(s, root)
|
|
version = bytestr_to_int(asn1_get_value_of_type(s, version_node, 'INTEGER'))
|
|
if version != 0:
|
|
raise SyntaxError("Unrecognized PKCS8 version")
|
|
rsaOID_node = asn1_node_next(s, version_node)
|
|
ii = asn1_node_first_child(s, rsaOID_node)
|
|
rsaOID = decode_OID(asn1_get_value_of_type(s, ii, 'OBJECT IDENTIFIER'))
|
|
if rsaOID != '1.2.840.113549.1.1.1':
|
|
raise SyntaxError("Unrecognized AlgorithmIdentifier")
|
|
privkey_node = asn1_node_next(s, rsaOID_node)
|
|
value = asn1_get_value_of_type(s, privkey_node, 'OCTET STRING')
|
|
return _parseASN1PrivateKey(value)
|
|
|
|
|
|
def _parseSSLeay(bytes):
|
|
return _parseASN1PrivateKey(str(bytes))
|
|
|
|
|
|
def bytesToNumber(s):
|
|
return int(binascii.hexlify(s), 16)
|
|
|
|
|
|
def _parseASN1PrivateKey(s):
|
|
root = asn1_node_root(s)
|
|
version_node = asn1_node_first_child(s, root)
|
|
version = bytestr_to_int(asn1_get_value_of_type(s, version_node, 'INTEGER'))
|
|
if version != 0:
|
|
raise SyntaxError("Unrecognized RSAPrivateKey version")
|
|
n = asn1_node_next(s, version_node)
|
|
e = asn1_node_next(s, n)
|
|
d = asn1_node_next(s, e)
|
|
p = asn1_node_next(s, d)
|
|
q = asn1_node_next(s, p)
|
|
dP = asn1_node_next(s, q)
|
|
dQ = asn1_node_next(s, dP)
|
|
qInv = asn1_node_next(s, dQ)
|
|
return map(lambda x: bytesToNumber(asn1_get_value_of_type(s, x, 'INTEGER')), [n, e, d, p, q, dP, dQ, qInv])
|
|
|
|
|