def load_key(args): key = keys.load(args.key) if key is not None: return key passwd = getpass.getpass("Enter key passphrase: ") passwd = passwd.encode('utf-8') return keys.load(args.key, passwd)
def load_key(keyfile): # TODO: better handling of invalid pass-phrase key = keys.load(keyfile) if key is not None: return key passwd = getpass.getpass("Enter key passphrase: ").encode('utf-8') return keys.load(keyfile, passwd)
def do_getpub(args): key = keys.load(args.key) if args.lang == 'c': key.emit_c() else: msg = "Unsupported language, valid are: c" raise argparse.ArgumentTypeError(msg)
def test_keygen(self): name1 = self.tname("keygen.pem") k = ECDSA256P1.generate() k.export_private(name1, b'secret') self.assertIsNone(load(name1)) k2 = load(name1, b'secret') pubname = self.tname('keygen-pub.pem') k2.export_public(pubname) pk2 = load(pubname) # We should be able to export the public key from the loaded # public key, but not the private key. pk2.export_public(self.tname('keygen-pub2.pem')) self.assertRaises(ECDSAUsageError, pk2.export_private, self.tname('keygen-priv2.pem'))
def do_sign(args): if args.rsa_pkcs1_15: keys.sign_rsa_pss = False img = image.Image.load(args.infile, version=args.version, header_size=args.header_size, included_header=args.included_header, pad=args.pad) key = keys.load(args.key) if args.key else None img.sign(key) if args.pad: img.pad_to(args.pad, args.align) img.save(args.outfile)
def test_keygen(self): # Try generating a RSA key with non-supported size with self.assertRaises(RSAUsageError): RSA.generate(key_size=1024) for key_size in RSA_KEY_SIZES: name1 = self.tname("keygen.pem") k = RSA.generate(key_size=key_size) k.export_private(name1, b'secret') # Try loading the key without a password. self.assertIsNone(load(name1)) k2 = load(name1, b'secret') pubname = self.tname('keygen-pub.pem') k2.export_public(pubname) pk2 = load(pubname) # We should be able to export the public key from the loaded # public key, but not the private key. pk2.export_public(self.tname('keygen-pub2.pem')) self.assertRaises(RSAUsageError, pk2.export_private, self.tname('keygen-priv2.pem'))
def do_sign(args): align = args.align if args.rsa_pkcs1_15: keys.sign_rsa_pss = False img = image.Image.load(args.infile, version=args.version, header_size=args.header_size, included_header=args.included_header, pad=args.pad) key = keys.load(args.key) if args.key else None img.sign(key) if args.pad: img.pad_to(args.pad, args.align) img.save(args.outfile)
def test_emit_pub(self): """Basic sanity check on the code emitters.""" pubname = self.tname("public.pem") k = ECDSA256P1.generate() k.export_public(pubname) k2 = load(pubname) ccode = io.StringIO() k2.emit_c(ccode) self.assertIn("ecdsa_pub_key", ccode.getvalue()) self.assertIn("ecdsa_pub_key_len", ccode.getvalue()) rustcode = io.StringIO() k2.emit_rust(rustcode) self.assertIn("ECDSA_PUB_KEY", rustcode.getvalue())
def test_emit_pub(self): """Basic sanity check on the code emitters, from public key.""" pubname = self.tname("public.pem") for key_size in RSA_KEY_SIZES: k = RSA.generate(key_size=key_size) k.export_public(pubname) k2 = load(pubname) ccode = io.StringIO() k2.emit_c(ccode) self.assertIn("rsa_pub_key", ccode.getvalue()) self.assertIn("rsa_pub_key_len", ccode.getvalue()) rustcode = io.StringIO() k2.emit_rust(rustcode) self.assertIn("RSA_PUB_KEY", rustcode.getvalue())
def do_getpub(args): key = keys.load(args.key) key.emit_c()