123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160 |
- import base64
- import binascii
- import re
- from typing import Any, Union
- try:
- from cryptography.hazmat.primitives.asymmetric.ec import EllipticCurve
- from cryptography.hazmat.primitives.asymmetric.utils import (
- decode_dss_signature,
- encode_dss_signature,
- )
- except ModuleNotFoundError:
- EllipticCurve = Any # type: ignore
- def force_bytes(value: Union[str, bytes]) -> bytes:
- if isinstance(value, str):
- return value.encode("utf-8")
- elif isinstance(value, bytes):
- return value
- else:
- raise TypeError("Expected a string value")
- def base64url_decode(input: Union[str, bytes]) -> bytes:
- if isinstance(input, str):
- input = input.encode("ascii")
- rem = len(input) % 4
- if rem > 0:
- input += b"=" * (4 - rem)
- return base64.urlsafe_b64decode(input)
- def base64url_encode(input: bytes) -> bytes:
- return base64.urlsafe_b64encode(input).replace(b"=", b"")
- def to_base64url_uint(val: int) -> bytes:
- if val < 0:
- raise ValueError("Must be a positive integer")
- int_bytes = bytes_from_int(val)
- if len(int_bytes) == 0:
- int_bytes = b"\x00"
- return base64url_encode(int_bytes)
- def from_base64url_uint(val: Union[str, bytes]) -> int:
- if isinstance(val, str):
- val = val.encode("ascii")
- data = base64url_decode(val)
- return int.from_bytes(data, byteorder="big")
- def number_to_bytes(num: int, num_bytes: int) -> bytes:
- padded_hex = "%0*x" % (2 * num_bytes, num)
- return binascii.a2b_hex(padded_hex.encode("ascii"))
- def bytes_to_number(string: bytes) -> int:
- return int(binascii.b2a_hex(string), 16)
- def bytes_from_int(val: int) -> bytes:
- remaining = val
- byte_length = 0
- while remaining != 0:
- remaining >>= 8
- byte_length += 1
- return val.to_bytes(byte_length, "big", signed=False)
- def der_to_raw_signature(der_sig: bytes, curve: EllipticCurve) -> bytes:
- num_bits = curve.key_size
- num_bytes = (num_bits + 7) // 8
- r, s = decode_dss_signature(der_sig)
- return number_to_bytes(r, num_bytes) + number_to_bytes(s, num_bytes)
- def raw_to_der_signature(raw_sig: bytes, curve: EllipticCurve) -> bytes:
- num_bits = curve.key_size
- num_bytes = (num_bits + 7) // 8
- if len(raw_sig) != 2 * num_bytes:
- raise ValueError("Invalid signature")
- r = bytes_to_number(raw_sig[:num_bytes])
- s = bytes_to_number(raw_sig[num_bytes:])
- return encode_dss_signature(r, s)
- # Based on https://github.com/hynek/pem/blob/7ad94db26b0bc21d10953f5dbad3acfdfacf57aa/src/pem/_core.py#L224-L252
- _PEMS = {
- b"CERTIFICATE",
- b"TRUSTED CERTIFICATE",
- b"PRIVATE KEY",
- b"PUBLIC KEY",
- b"ENCRYPTED PRIVATE KEY",
- b"OPENSSH PRIVATE KEY",
- b"DSA PRIVATE KEY",
- b"RSA PRIVATE KEY",
- b"RSA PUBLIC KEY",
- b"EC PRIVATE KEY",
- b"DH PARAMETERS",
- b"NEW CERTIFICATE REQUEST",
- b"CERTIFICATE REQUEST",
- b"SSH2 PUBLIC KEY",
- b"SSH2 ENCRYPTED PRIVATE KEY",
- b"X509 CRL",
- }
- _PEM_RE = re.compile(
- b"----[- ]BEGIN ("
- + b"|".join(_PEMS)
- + b""")[- ]----\r?
- .+?\r?
- ----[- ]END \\1[- ]----\r?\n?""",
- re.DOTALL,
- )
- def is_pem_format(key: bytes) -> bool:
- return bool(_PEM_RE.search(key))
- # Based on https://github.com/pyca/cryptography/blob/bcb70852d577b3f490f015378c75cba74986297b/src/cryptography/hazmat/primitives/serialization/ssh.py#L40-L46
- _CERT_SUFFIX = b"-cert-v01@openssh.com"
- _SSH_PUBKEY_RC = re.compile(br"\A(\S+)[ \t]+(\S+)")
- _SSH_KEY_FORMATS = [
- b"ssh-ed25519",
- b"ssh-rsa",
- b"ssh-dss",
- b"ecdsa-sha2-nistp256",
- b"ecdsa-sha2-nistp384",
- b"ecdsa-sha2-nistp521",
- ]
- def is_ssh_key(key: bytes) -> bool:
- if any(string_value in key for string_value in _SSH_KEY_FORMATS):
- return True
- ssh_pubkey_match = _SSH_PUBKEY_RC.match(key)
- if ssh_pubkey_match:
- key_type = ssh_pubkey_match.group(1)
- if _CERT_SUFFIX == key_type[-len(_CERT_SUFFIX) :]:
- return True
- return False
|