pypush-plus-plus/ids/_helpers.py

40 lines
1.5 KiB
Python
Raw Permalink Normal View History

2023-05-09 14:36:33 -05:00
from collections import namedtuple
USER_AGENT = "com.apple.madrid-lookup [macOS,13.2.1,22D68,MacBookPro18,3]"
PROTOCOL_VERSION = "1640"
2024-01-30 14:37:30 -06:00
# KeyPair is a named tuple that holds a private key and a certificate (public key) in PEM form, as well as a x509
2023-05-09 14:36:33 -05:00
KeyPair = namedtuple("KeyPair", ["key", "cert"])
2024-01-30 14:37:30 -06:00
Helperx509 = ""
2023-05-09 14:36:33 -05:00
2023-05-09 16:03:27 -05:00
2023-05-09 14:36:33 -05:00
def dearmour(armoured: str) -> str:
import re
2023-05-09 16:03:27 -05:00
2023-05-09 14:36:33 -05:00
# Use a regex to remove the header and footer (generic so it work on more than just certificates)
2023-05-09 16:03:27 -05:00
return re.sub(r"-----BEGIN .*-----|-----END .*-----", "", armoured).replace(
"\n", ""
)
2023-07-27 10:04:57 -05:00
from cryptography.hazmat.primitives import serialization
2023-07-27 19:13:54 -05:00
from cryptography.hazmat.primitives.asymmetric import ec, rsa
2023-07-27 10:04:57 -05:00
def parse_key(key: str):
# Check if it is a public or private key
if "PUBLIC" in key:
return serialization.load_pem_public_key(key.encode())
else:
return serialization.load_pem_private_key(key.encode(), None)
2023-07-27 19:13:54 -05:00
def serialize_key(key):
if isinstance(key, ec.EllipticCurvePrivateKey) or isinstance(key, rsa.RSAPrivateKey):
2023-07-27 10:04:57 -05:00
return key.private_bytes(
encoding=serialization.Encoding.PEM,
format=serialization.PrivateFormat.TraditionalOpenSSL,
encryption_algorithm=serialization.NoEncryption(),
).decode("utf-8").strip()
else:
return key.public_bytes(
encoding=serialization.Encoding.PEM,
format=serialization.PublicFormat.SubjectPublicKeyInfo,
).decode("utf-8").strip()