mirror of
https://github.com/Sneed-Group/pypush-plus-plus
synced 2024-12-23 19:32:29 -06:00
40 lines
No EOL
1.5 KiB
Python
40 lines
No EOL
1.5 KiB
Python
from collections import namedtuple
|
|
|
|
USER_AGENT = "com.apple.madrid-lookup [macOS,13.2.1,22D68,MacBookPro18,3]"
|
|
PROTOCOL_VERSION = "1640"
|
|
|
|
# KeyPair is a named tuple that holds a private key and a certificate (public key) in PEM form, as well as a x509
|
|
KeyPair = namedtuple("KeyPair", ["key", "cert"])
|
|
Helperx509 = ""
|
|
|
|
|
|
def dearmour(armoured: str) -> str:
|
|
import re
|
|
|
|
# Use a regex to remove the header and footer (generic so it work on more than just certificates)
|
|
return re.sub(r"-----BEGIN .*-----|-----END .*-----", "", armoured).replace(
|
|
"\n", ""
|
|
)
|
|
|
|
from cryptography.hazmat.primitives import serialization
|
|
from cryptography.hazmat.primitives.asymmetric import ec, rsa
|
|
def parse_key(key: str):
|
|
# Check if it is a public or private key
|
|
if "PUBLIC" in key:
|
|
return serialization.load_pem_public_key(key.encode())
|
|
else:
|
|
return serialization.load_pem_private_key(key.encode(), None)
|
|
|
|
def serialize_key(key):
|
|
if isinstance(key, ec.EllipticCurvePrivateKey) or isinstance(key, rsa.RSAPrivateKey):
|
|
return key.private_bytes(
|
|
encoding=serialization.Encoding.PEM,
|
|
format=serialization.PrivateFormat.TraditionalOpenSSL,
|
|
encryption_algorithm=serialization.NoEncryption(),
|
|
).decode("utf-8").strip()
|
|
else:
|
|
return key.public_bytes(
|
|
encoding=serialization.Encoding.PEM,
|
|
format=serialization.PublicFormat.SubjectPublicKeyInfo,
|
|
).decode("utf-8").strip()
|
|
|