def _get_keys(self): if "jwk" in self: return [self["jwk"]] elif "jku" in self: keys = load_jwks_from_url(self["jku"], {}) return dict(keys) elif "x5u" in self: try: return {"rsa": [load_x509_cert(self["x5u"], {})]} except Exception: ca_chain = load_x509_cert_chain(self["x5u"]) return {}
def _get_keys(self): if "jwk" in self: return [self["jwk"]] elif "jku" in self: keys = load_jwks_from_url(self["jku"], {}) return dict(keys) elif "x5u" in self: try: return {"rsa": [load_x509_cert(self["x5u"], {})]} except Exception: #ca_chain = load_x509_cert_chain(self["x5u"]) pass return {}
def _get_keys(self): if "jwk" in self: return [self["jwk"]] elif "jku" in self: keys = KEYS() keys.load_from_url(self["jku"]) return keys.as_dict() elif "x5u" in self: try: return {"rsa": [load_x509_cert(self["x5u"], {})]} except Exception: # ca_chain = load_x509_cert_chain(self["x5u"]) pass return {}
def _get_keys(self): logger.debug("_get_keys(): self._dict.keys={0}".format( self._dict.keys())) if "jwk" in self: return [self["jwk"]] elif "jku" in self: keys = KEYS() keys.load_from_url(self["jku"]) return keys.as_dict() elif "x5u" in self: try: return {"rsa": [load_x509_cert(self["x5u"], {})]} except Exception: # ca_chain = load_x509_cert_chain(self["x5u"]) pass return {}
def init_claims_clients(client_info): res = {} for cid, specs in client_info.items(): if "dynamic" in specs: cc = dynamic_init_claims_client(cid, args) else: cc = ClaimsClient(client_id=specs["client_id"]) cc.client_secret=specs["client_secret"] _req = cc.keystore.crypt.http_request _s2k = cc.keystore.spec2key try: for typ, key in load_x509_cert(_req, specs["x509_url"], _s2k): cc.keystore.set_verify_key(key, typ, cid) except KeyError: pass try: for typ, key in load_jwk(_req, specs["jwk_url"], _s2k): cc.keystore.set_verify_key(key, typ, cid) except KeyError: pass cc.userclaims_endpoint = specs["userclaims_endpoint"] res[cid] = cc return res
parser.add_argument('-r', dest="rsa_file", help="A file containing a RSA key") parser.add_argument("-i", dest="int", help="Integrity method") parser.add_argument("-f", dest="file", help="File with the message") parser.add_argument("message", nargs="?", help="The message to encrypt") args = parser.parse_args() keys = {} if args.jwk_url: keys = assign(load_jwks_from_url(lrequest, args.jwk_url)) elif args.jwk_file: keys = load_jwks(open(args.jwk_file).read()) elif args.x509_url: keys = load_x509_cert(lrequest, args.x509_url) elif args.x509_file: keys = [import_rsa_key_from_file(args.x509_file)] elif args.rsa_file: key = rsa_load(args.rsa_file) rsa_key = RSAKey(key=key) rsa_key.serialize() keys = [rsa_key] else: print("Needs encryption key") exit() if args.file: msg = open(args.file).read() msg = msg.strip("\n\r") else:
parser.add_argument("-m", dest="mode", default="public", help="Whether a public or private key should be used") parser.add_argument("-f", dest="file", help="File to be encrypted") parser.add_argument("message", nargs="?", help="The message to encrypt") args = parser.parse_args() keys = {} if args.jwk_url: keys = load_jwks_from_url(args.jwk_url, {}) elif args.jwk_file: keys = load_jwks(open(args.jwk_file).read()) elif args.x509_url: # load_x509_cert returns list of 2-tuples keys = [RSAKey(key=x) for x, y in load_x509_cert(lrequest, args.x509_url)] for key in keys: key.serialize() elif args.x509_file: # import_rsa_key_from_file returns RSA key instance _key = RSAKey(key=import_rsa_key_from_file(args.x509_file)) _key.serialize() keys = [_key] elif args.rsa_file: _key = RSAKey(key=rsa_load(args.rsa_file)) _key.serialize() keys = [_key] else: print >> sys.stderr, "Needs encryption key" exit()
parser.add_argument('-r', dest="rsa_file", help="A file containing a RSA key") parser.add_argument("-i", dest="int", help="Integrity method") parser.add_argument("-f", dest="file", help="File with the message") parser.add_argument("message", nargs="?", help="The message to encrypt") args = parser.parse_args() keys = {} if args.jwk_url: keys = load_jwks_from_url(args.jwk_url) elif args.jwk_file: keys = load_jwks(open(args.jwk_file).read()) elif args.x509_url: keys = load_x509_cert(args.x509_url, {}) elif args.x509_file: keys = [import_rsa_key_from_file(args.x509_file)] elif args.rsa_file: key = rsa_load(args.rsa_file) rsa_key = RSAKey(key=key) rsa_key.serialize() keys = [rsa_key] else: print("Needs encryption key") exit() if args.file: msg = open(args.file).read() msg = msg.strip("\n\r") else:
default="public", help="Whether a public or private key should be used") parser.add_argument("-f", dest="file", help="File to be encrypted") parser.add_argument("message", nargs="?", help="The message to encrypt") args = parser.parse_args() keys = {} if args.jwk_url: keys = load_jwks_from_url(args.jwk_url, {}) elif args.jwk_file: keys = load_jwks(open(args.jwk_file).read()) elif args.x509_url: # load_x509_cert returns list of 2-tuples keys = [ RSAKey(key=x) for x, y in load_x509_cert(lrequest, args.x509_url) ] for key in keys: key.serialize() elif args.x509_file: # import_rsa_key_from_file returns RSA key instance _key = RSAKey(key=import_rsa_key_from_file(args.x509_file)) _key.serialize() keys = [_key] elif args.rsa_file: _key = RSAKey(key=rsa_load(args.rsa_file)) _key.serialize() keys = [_key] else: print >> sys.stderr, "Needs encryption key" exit()
args = parser.parse_args() keys = {} if args.jwk_url: keys = assign(load_jwks_from_url(lrequest, args.jwk_url)) if args.mode == "private": print >> sys.stderr, "Missing private key to decrypt with" exit() elif args.jwk_file: keys = assign(load_jwks(open(args.jwk_file).read())) if args.mode == "private": print >> sys.stderr, "Missing private key to decrypt with" exit() elif args.x509_url: keys = assign(load_x509_cert(lrequest, args.x509_url)) if args.mode == "private": print >> sys.stderr, "Missing private key to decrypt with" exit() elif args.x509_file: keys = {"rsa": [x509_rsa_loads(open(args.x509_file).read())]} if args.mode == "private": print >> sys.stderr, "Missing private key to decrypt with" exit() elif args.rsa_file: keys = {"rsa": [rsa_load(args.rsa_file)]} else: print >> sys.stderr, "Needs encryption key" exit() if args.file:
help="URL pointing to a file containing a JWK") parser.add_argument('-r', dest="rsa_file", help="A file containing a RSA key") parser.add_argument("-i", dest="int", help="Integrity method") parser.add_argument("-f", dest="file", help="File with the message") parser.add_argument("message", nargs="?", help="The message to encrypt") args = parser.parse_args() keys = {} if args.jwk_url: keys = load_jwks_from_url(args.jwk_url) elif args.jwk_file: keys = load_jwks(open(args.jwk_file).read()) elif args.x509_url: keys = load_x509_cert(args.x509_url, {}) elif args.x509_file: keys = [import_rsa_key_from_file(args.x509_file)] elif args.rsa_file: key = rsa_load(args.rsa_file) rsa_key = RSAKey(key=key) rsa_key.serialize() keys = [rsa_key] else: print("Needs encryption key") exit() if args.file: msg = open(args.file).read() msg = msg.strip("\n\r") else:
help="URL pointing to a file containing a JWK") parser.add_argument('-r', dest="rsa_file", help="A file containing a RSA key") parser.add_argument("-i", dest="int", help="Integrity method") parser.add_argument("-f", dest="file", help="File with the message") parser.add_argument("message", nargs="?", help="The message to encrypt") args = parser.parse_args() keys = {} if args.jwk_url: keys = assign(load_jwks_from_url(lrequest, args.jwk_url)) elif args.jwk_file: keys = load_jwks(open(args.jwk_file).read()) elif args.x509_url: keys = load_x509_cert(lrequest, args.x509_url) elif args.x509_file: keys = [import_rsa_key_from_file(args.x509_file)] elif args.rsa_file: key = rsa_load(args.rsa_file) rsa_key = RSAKey(key=key) rsa_key.serialize() keys = [rsa_key] else: print("Needs encryption key") exit() if args.file: msg = open(args.file).read() msg = msg.strip("\n\r") else: