-
Notifications
You must be signed in to change notification settings - Fork 80
/
Copy pathcrypto.pyx
165 lines (146 loc) · 5.99 KB
/
crypto.pyx
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
#------------------------------------------------------------------------------
# Copyright (c) 2021, 2025, Oracle and/or its affiliates.
#
# This software is dual-licensed to you under the Universal Permissive License
# (UPL) 1.0 as shown at https://oss.oracle.com/licenses/upl and Apache License
# 2.0 as shown at http://www.apache.org/licenses/LICENSE-2.0. You may choose
# either license.
#
# If you elect to accept the software under the Apache License, Version 2.0,
# the following applies:
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# https://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
#------------------------------------------------------------------------------
#------------------------------------------------------------------------------
# crypto.pyx
#
# Cython file defining the cryptographic methods used by the thin client
# (embedded in thin_impl.pyx).
#------------------------------------------------------------------------------
try:
from cryptography import x509
from cryptography.hazmat.primitives import hashes, serialization
from cryptography.hazmat.primitives.ciphers import algorithms, modes, Cipher
from cryptography.hazmat.primitives.asymmetric import padding
from cryptography.hazmat.primitives.kdf import pbkdf2
except Exception as e:
CRYPTOGRAPHY_IMPORT_ERROR = e
DN_REGEX = '(?:^|,\s?)(?:(?P<name>[A-Z]+)=(?P<val>"(?:[^"]|"")+"|[^,]+))+'
PEM_WALLET_FILE_NAME = "ewallet.pem"
def _name_matches(name_to_check, cert_name):
"""
Returns a boolean indicating if the name to check matches with the
certificate name. The certificate name may contain a wildcard (*)
character.
"""
# check for a full match (case insensitive)
cert_name = cert_name.lower()
name_to_check = name_to_check.lower()
if name_to_check == cert_name:
return True
# ensure that more than one label exists in both the name to check and the
# certificate name
check_pos = name_to_check.find(".")
cert_pos = cert_name.find(".")
if check_pos <= 0 or cert_pos <= 0:
return False
# ensure that the right hand labels all match
if name_to_check[check_pos:] != cert_name[cert_pos:]:
return False
# match wildcards, if applicable
cert_label = cert_name[:cert_pos]
check_label = name_to_check[:check_pos]
if cert_label == "*":
return True
elif cert_label.startswith("*"):
return check_label.endswith(cert_label[1:])
elif cert_label.endswith("*"):
return check_label.startswith(cert_label[:-1])
wildcard_pos = cert_name.find("*")
if wildcard_pos < 0:
return False
return check_label.startswith(cert_label[:wildcard_pos]) \
and check_label.endswith(cert_label[wildcard_pos + 1:])
def check_server_dn(sock, expected_dn, expected_name):
"""
Validates the server distinguished name (if one is specified) or the
simple name (if a distinguished name is not present).
"""
cert_data = sock.getpeercert(binary_form=True)
cert = x509.load_der_x509_certificate(cert_data)
if expected_dn is not None:
server_dn = cert.subject.rfc4514_string()
expected_dn_dict = dict(re.findall(DN_REGEX, expected_dn))
server_dn_dict = dict(re.findall(DN_REGEX, server_dn))
if server_dn_dict != expected_dn_dict:
errors._raise_err(errors.ERR_INVALID_SERVER_CERT_DN,
expected_dn=expected_dn)
else:
try:
ext = cert.extensions.get_extension_for_oid(
x509.oid.ExtensionOID.SUBJECT_ALTERNATIVE_NAME
)
for name in ext.value.get_values_for_type(x509.DNSName):
if _name_matches(expected_name, name):
return
except x509.ExtensionNotFound:
pass
for name in cert.subject.get_attributes_for_oid(
x509.oid.NameOID.COMMON_NAME
):
if _name_matches(expected_name, name.value):
return
errors._raise_err(errors.ERR_INVALID_SERVER_NAME,
expected_name=expected_name)
def decrypt_cbc(key, encrypted_text):
"""
Decrypt the given text using the given key.
"""
iv = bytes(16)
algo = algorithms.AES(key)
cipher = Cipher(algo, modes.CBC(iv))
decryptor = cipher.decryptor()
return decryptor.update(encrypted_text)
def encrypt_cbc(key, plain_text, zeros=False):
"""
Encrypt the given text using the given key. If the zeros flag is set, use
zero padding if required. Otherwise, use number padding.
"""
block_size = 16
iv = bytes(block_size)
algo = algorithms.AES(key)
cipher = Cipher(algo, modes.CBC(iv))
encryptor = cipher.encryptor()
n = block_size - len(plain_text) % block_size
if n:
if zeros:
plain_text += bytes(n)
else:
plain_text += (bytes([n]) * n)
return encryptor.update(plain_text) + encryptor.finalize()
def get_derived_key(key, salt, length, iterations):
"""
Return a derived key using PBKDF2.
"""
kdf = pbkdf2.PBKDF2HMAC(algorithm=hashes.SHA512(), salt=salt,
length=length, iterations=iterations)
return kdf.derive(key)
def get_signature(private_key_str, text):
"""
Returns a signed version of the given text (used for IAM token
authentication) in base64 encoding.
"""
private_key = serialization.load_pem_private_key(private_key_str.encode(),
password=None)
sig = private_key.sign(text.encode(), padding.PKCS1v15(), hashes.SHA256())
return base64.b64encode(sig).decode()