mirror of
https://github.com/thegeeklab/ansible-later.git
synced 2024-11-14 01:00:39 +00:00
192 lines
5.8 KiB
Python
192 lines
5.8 KiB
Python
# Copyright (C) 2003-2007 Robey Pointer <robeypointer@gmail.com>
|
|
#
|
|
# This file is part of paramiko.
|
|
#
|
|
# Paramiko is free software; you can redistribute it and/or modify it under the
|
|
# terms of the GNU Lesser General Public License as published by the Free
|
|
# Software Foundation; either version 2.1 of the License, or (at your option)
|
|
# any later version.
|
|
#
|
|
# Paramiko is distributed in the hope that it will be useful, but WITHOUT ANY
|
|
# WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR
|
|
# A PARTICULAR PURPOSE. See the GNU Lesser General Public License for more
|
|
# details.
|
|
#
|
|
# You should have received a copy of the GNU Lesser General Public License
|
|
# along with Paramiko; if not, write to the Free Software Foundation, Inc.,
|
|
# 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA.
|
|
|
|
"""
|
|
RSA keys.
|
|
"""
|
|
|
|
from cryptography.exceptions import InvalidSignature
|
|
from cryptography.hazmat.backends import default_backend
|
|
from cryptography.hazmat.primitives import hashes, serialization
|
|
from cryptography.hazmat.primitives.asymmetric import rsa, padding
|
|
|
|
from paramiko.message import Message
|
|
from paramiko.pkey import PKey
|
|
from paramiko.py3compat import PY2
|
|
from paramiko.ssh_exception import SSHException
|
|
|
|
|
|
class RSAKey(PKey):
|
|
"""
|
|
Representation of an RSA key which can be used to sign and verify SSH2
|
|
data.
|
|
"""
|
|
|
|
def __init__(
|
|
self,
|
|
msg=None,
|
|
data=None,
|
|
filename=None,
|
|
password=None,
|
|
key=None,
|
|
file_obj=None,
|
|
):
|
|
self.key = None
|
|
self.public_blob = None
|
|
if file_obj is not None:
|
|
self._from_private_key(file_obj, password)
|
|
return
|
|
if filename is not None:
|
|
self._from_private_key_file(filename, password)
|
|
return
|
|
if (msg is None) and (data is not None):
|
|
msg = Message(data)
|
|
if key is not None:
|
|
self.key = key
|
|
else:
|
|
self._check_type_and_load_cert(
|
|
msg=msg,
|
|
key_type="ssh-rsa",
|
|
cert_type="ssh-rsa-cert-v01@openssh.com",
|
|
)
|
|
self.key = rsa.RSAPublicNumbers(
|
|
e=msg.get_mpint(), n=msg.get_mpint()
|
|
).public_key(default_backend())
|
|
|
|
@property
|
|
def size(self):
|
|
return self.key.key_size
|
|
|
|
@property
|
|
def public_numbers(self):
|
|
if isinstance(self.key, rsa.RSAPrivateKey):
|
|
return self.key.private_numbers().public_numbers
|
|
else:
|
|
return self.key.public_numbers()
|
|
|
|
def asbytes(self):
|
|
m = Message()
|
|
m.add_string("ssh-rsa")
|
|
m.add_mpint(self.public_numbers.e)
|
|
m.add_mpint(self.public_numbers.n)
|
|
return m.asbytes()
|
|
|
|
def __str__(self):
|
|
# NOTE: as per inane commentary in #853, this appears to be the least
|
|
# crummy way to get a representation that prints identical to Python
|
|
# 2's previous behavior, on both interpreters.
|
|
# TODO: replace with a nice clean fingerprint display or something
|
|
if PY2:
|
|
# Can't just return the .decode below for Py2 because stuff still
|
|
# tries stuffing it into ASCII for whatever godforsaken reason
|
|
return self.asbytes()
|
|
else:
|
|
return self.asbytes().decode("utf8", errors="ignore")
|
|
|
|
def __hash__(self):
|
|
return hash(
|
|
(self.get_name(), self.public_numbers.e, self.public_numbers.n)
|
|
)
|
|
|
|
def get_name(self):
|
|
return "ssh-rsa"
|
|
|
|
def get_bits(self):
|
|
return self.size
|
|
|
|
def can_sign(self):
|
|
return isinstance(self.key, rsa.RSAPrivateKey)
|
|
|
|
def sign_ssh_data(self, data):
|
|
sig = self.key.sign(
|
|
data, padding=padding.PKCS1v15(), algorithm=hashes.SHA1()
|
|
)
|
|
|
|
m = Message()
|
|
m.add_string("ssh-rsa")
|
|
m.add_string(sig)
|
|
return m
|
|
|
|
def verify_ssh_sig(self, data, msg):
|
|
if msg.get_text() != "ssh-rsa":
|
|
return False
|
|
key = self.key
|
|
if isinstance(key, rsa.RSAPrivateKey):
|
|
key = key.public_key()
|
|
|
|
try:
|
|
key.verify(
|
|
msg.get_binary(), data, padding.PKCS1v15(), hashes.SHA1()
|
|
)
|
|
except InvalidSignature:
|
|
return False
|
|
else:
|
|
return True
|
|
|
|
def write_private_key_file(self, filename, password=None):
|
|
self._write_private_key_file(
|
|
filename,
|
|
self.key,
|
|
serialization.PrivateFormat.TraditionalOpenSSL,
|
|
password=password,
|
|
)
|
|
|
|
def write_private_key(self, file_obj, password=None):
|
|
self._write_private_key(
|
|
file_obj,
|
|
self.key,
|
|
serialization.PrivateFormat.TraditionalOpenSSL,
|
|
password=password,
|
|
)
|
|
|
|
@staticmethod
|
|
def generate(bits, progress_func=None):
|
|
"""
|
|
Generate a new private RSA key. This factory function can be used to
|
|
generate a new host key or authentication key.
|
|
|
|
:param int bits: number of bits the generated key should be.
|
|
:param progress_func: Unused
|
|
:return: new `.RSAKey` private key
|
|
"""
|
|
key = rsa.generate_private_key(
|
|
public_exponent=65537, key_size=bits, backend=default_backend()
|
|
)
|
|
return RSAKey(key=key)
|
|
|
|
# ...internals...
|
|
|
|
def _from_private_key_file(self, filename, password):
|
|
data = self._read_private_key_file("RSA", filename, password)
|
|
self._decode_key(data)
|
|
|
|
def _from_private_key(self, file_obj, password):
|
|
data = self._read_private_key("RSA", file_obj, password)
|
|
self._decode_key(data)
|
|
|
|
def _decode_key(self, data):
|
|
try:
|
|
key = serialization.load_der_private_key(
|
|
data, password=None, backend=default_backend()
|
|
)
|
|
except ValueError as e:
|
|
raise SSHException(str(e))
|
|
|
|
assert isinstance(key, rsa.RSAPrivateKey)
|
|
self.key = key
|