o
    eq                     @   s   g d Z ddlZddlZddlmZ ddlmZmZmZ ddl	m
Z
 ddlmZ ddlmZ ddlmZmZmZ dd	lmZmZmZ G d
d deZd#ddZd$ddZdd Zdd Zdd Zdd Zdd Zdd Z dd Z!d%d d!Z"e"Z#d"Z$dS )&)generate	construct
import_keyRsaKeyoid    N)Random)tobytesbordtostr)DerSequence)bytes_to_long)Integer)test_probable_primegenerate_probable_prime	COMPOSITE)_expand_subject_public_key_info_create_subject_public_key_info _extract_subject_public_key_infoc                   @   s  e Zd ZdZdd Zedd Zedd Zedd	 Zed
d Z	edd Z
edd Zdd Zdd Zdd Zdd Zdd Zdd Zdd Zdd Zd d! Zd"d# Zd$d% Zd&d' Zd(d) Zd*d+ Z	.	-d?d/d0ZeZeZd1d2 Zd3d4 Zd5d6 Zd7d8 Z d9d: Z!d;d< Z"d=d> Z#d-S )@r   aP  Class defining an actual RSA key.
    Do not instantiate directly.
    Use :func:`generate`, :func:`construct` or :func:`import_key` instead.

    :ivar n: RSA modulus
    :vartype n: integer

    :ivar e: RSA public exponent
    :vartype e: integer

    :ivar d: RSA private exponent
    :vartype d: integer

    :ivar p: First factor of the RSA modulus
    :vartype p: integer

    :ivar q: Second factor of the RSA modulus
    :vartype q: integer

    :ivar u: Chinese remainder component (:math:`p^{-1} \text{mod } q`)
    :vartype u: integer

    :undocumented: exportKey, publickey
    c                 K   s   t | }t d}|t dB }|||fvrtd| D ]\}}t| d| | q||krC| j| jd  | _| j| jd  | _	dS dS )a.  Build an RSA key.

        :Keywords:
          n : integer
            The modulus.
          e : integer
            The public exponent.
          d : integer
            The private exponent. Only required for private keys.
          p : integer
            The first factor of the modulus. Only required for private keys.
          q : integer
            The second factor of the modulus. Only required for private keys.
          u : integer
            The CRT coefficient (inverse of p modulo q). Only required for
            private keys.
        ne)pqduzSome RSA components are missing_   N)
setkeys
ValueErroritemssetattr_d_p_dp_q_dq)selfkwargs	input_set
public_setprivate_set	componentvalue r.   :/usr/lib/python3/dist-packages/Cryptodome/PublicKey/RSA.py__init__N   s   zRsaKey.__init__c                 C   
   t | jS N)int_nr'   r.   r.   r/   r   l      
zRsaKey.nc                 C   r1   r2   )r3   _er5   r.   r.   r/   r   p   r6   zRsaKey.ec                 C      |   stdt| jS )Nz-No private exponent available for public keys)has_privateAttributeErrorr3   r"   r5   r.   r.   r/   r   t      
zRsaKey.dc                 C   r8   )Nz.No CRT component 'p' available for public keys)r9   r:   r3   r#   r5   r.   r.   r/   r   z   r;   zRsaKey.pc                 C   r8   )Nz.No CRT component 'q' available for public keys)r9   r:   r3   r%   r5   r.   r.   r/   r      r;   zRsaKey.qc                 C   r8   )Nz.No CRT component 'u' available for public keys)r9   r:   r3   _ur5   r.   r.   r/   r      r;   zRsaKey.uc                 C   s
   | j  S )zSize of the RSA modulus in bitsr4   size_in_bitsr5   r.   r.   r/   r>      r6   zRsaKey.size_in_bitsc                 C   s   | j  d d d S )z9The minimal amount of bytes that can hold the RSA modulusr      r=   r5   r.   r.   r/   size_in_bytes   s   zRsaKey.size_in_bytesc                 C   s>   d|  kr| j k std tdttt|| j| j S )Nr   zPlaintext too large)r4   r   r3   powr   r7   )r'   	plaintextr.   r.   r/   _encrypt   s
   zRsaKey._encryptc           	      C   s   d|  kr| j k std td|  stdtjd| j d}t|t|| j| j  | j  }t|| j| j	}t|| j
| j}|| | j | j }|| j	 | }t|| j || j }|S )Nr   zCiphertext too largezThis is not a private keyr   )min_inclusivemax_exclusive)r4   r   r9   	TypeErrorr   random_rangerA   r7   r$   r#   r&   r%   r<   _mult_modulo_bytesinverse)	r'   
ciphertextrcpm1m2hmpresultr.   r.   r/   _decrypt_to_bytes   s$   
zRsaKey._decrypt_to_bytesc                 C   s   t | |S )zLegacy private method)r   rR   r'   rJ   r.   r.   r/   _decrypt   s   zRsaKey._decryptc                 C   s
   t | dS )z"Whether this is an RSA private keyr"   )hasattrr5   r.   r.   r/   r9      s   
zRsaKey.has_privatec                 C      dS NTr.   r5   r.   r.   r/   can_encrypt      zRsaKey.can_encryptc                 C   rV   rW   r.   r5   r.   r.   r/   can_sign   rY   zRsaKey.can_signc                 C   s   t | j| jdS )z^A matching RSA public key.

        Returns:
            a new :class:`RsaKey` object
        r   )r   r4   r7   r5   r.   r.   r/   
public_key   s   zRsaKey.public_keyc                 C   sH   |   |  kr
dS | j|jks| j|jkrdS |   sdS | j|jkS )NFT)r9   r   r   r   r'   otherr.   r.   r/   __eq__   s   zRsaKey.__eq__c                 C   s
   | |k S r2   r.   r\   r.   r.   r/   __ne__   s   
zRsaKey.__ne__c                 C   s   ddl m} |)Nr   )PicklingError)pickler`   )r'   r`   r.   r.   r/   __getstate__   s   zRsaKey.__getstate__c                 C   sP   |   rdt| jt| jt| jt| jf }nd}dt| jt| j|f S )Nz, d=%d, p=%d, q=%d, u=%d zRsaKey(n=%d, e=%d%s))r9   r3   r"   r#   r%   r<   r4   r7   )r'   extrar.   r.   r/   __repr__   s   zRsaKey.__repr__c                 C   s"   |   rd}nd}d|t| f S )NPrivatePublicz%s RSA key at 0x%X)r9   id)r'   key_typer.   r.   r/   __str__   s   zRsaKey.__str__PEMNr   c                 C   s  |durt |}|du rtj}|dkrRdd | j| jfD \}}t|d d@ r,d| }t|d d@ r8d| }d||g}d	d
d |D }	dt|	dd  S | 	 rt
d| j| j| j| j| j| j| jd  | j| jd  t| j| jg	 }
|dkrd}|dkr|rtdn6ddlm} |dkr|du rd}||
td}
nd}|sd}||
t||}
d}nd}ttt
| j| jg}
|dkr|
S |dkrddlm} ||
|||}t |S td| )a5  Export this RSA key.

        Args:
          format (string):
            The format to use for wrapping the key:

            - *'PEM'*. (*Default*) Text encoding, done according to `RFC1421`_/`RFC1423`_.
            - *'DER'*. Binary encoding.
            - *'OpenSSH'*. Textual encoding, done according to OpenSSH specification.
              Only suitable for public keys (not private keys).

          passphrase (string):
            (*For private keys only*) The pass phrase used for protecting the output.

          pkcs (integer):
            (*For private keys only*) The ASN.1 structure to use for
            serializing the key. Note that even in case of PEM
            encoding, there is an inner ASN.1 DER structure.

            With ``pkcs=1`` (*default*), the private key is encoded in a
            simple `PKCS#1`_ structure (``RSAPrivateKey``).

            With ``pkcs=8``, the private key is encoded in a `PKCS#8`_ structure
            (``PrivateKeyInfo``).

            .. note::
                This parameter is ignored for a public key.
                For DER and PEM, an ASN.1 DER ``SubjectPublicKeyInfo``
                structure is always used.

          protection (string):
            (*For private keys only*)
            The encryption scheme to use for protecting the private key.

            If ``None`` (default), the behavior depends on :attr:`format`:

            - For *'DER'*, the *PBKDF2WithHMAC-SHA1AndDES-EDE3-CBC*
              scheme is used. The following operations are performed:

                1. A 16 byte Triple DES key is derived from the passphrase
                   using :func:`Cryptodome.Protocol.KDF.PBKDF2` with 8 bytes salt,
                   and 1 000 iterations of :mod:`Cryptodome.Hash.HMAC`.
                2. The private key is encrypted using CBC.
                3. The encrypted key is encoded according to PKCS#8.

            - For *'PEM'*, the obsolete PEM encryption scheme is used.
              It is based on MD5 for key derivation, and Triple DES for encryption.

            Specifying a value for :attr:`protection` is only meaningful for PKCS#8
            (that is, ``pkcs=8``) and only if a pass phrase is present too.

            The supported schemes for PKCS#8 are listed in the
            :mod:`Cryptodome.IO.PKCS8` module (see :attr:`wrap_algo` parameter).

          randfunc (callable):
            A function that provides random bytes. Only used for PEM encoding.
            The default is :func:`Cryptodome.Random.get_random_bytes`.

        Returns:
          byte string: the encoded key

        Raises:
          ValueError:when the format is unknown or when you try to encrypt a private
            key with *DER* format and PKCS#1.

        .. warning::
            If you don't provide a pass phrase, the private key will be
            exported in the clear!

        .. _RFC1421:    http://www.ietf.org/rfc/rfc1421.txt
        .. _RFC1423:    http://www.ietf.org/rfc/rfc1423.txt
        .. _`PKCS#1`:   http://www.ietf.org/rfc/rfc3447.txt
        .. _`PKCS#8`:   http://www.ietf.org/rfc/rfc5208.txt
        NOpenSSHc                 S   s   g | ]}|  qS r.   )to_bytes.0xr.   r.   r/   
<listcomp>>  s    z%RsaKey.export_key.<locals>.<listcomp>r          s   ssh-rsa    c                 S   s    g | ]}t d t|| qS )>I)structpacklen)ro   kpr.   r.   r/   rq   D  s        ssh-rsa r   zRSA PRIVATE KEYDERz&PKCS#1 private key cannot be encryptedPKCS8rk   zPRIVATE KEYzENCRYPTED PRIVATE KEYz"PBKDF2WithHMAC-SHA1AndDES-EDE3-CBCz
PUBLIC KEYrk   z3Unknown key format '%s'. Cannot export the RSA key.)r   r   get_random_bytesr7   r4   r	   joinbinascii
b2a_base64r9   r   r   r   r   r   r   r   rI   encoder   Cryptodome.IOr~   wrapr   r   rk   )r'   format
passphrasepkcs
protectionrandfunce_bytesn_byteskeyparts	keystring
binary_keyri   r~   rk   pem_strr.   r.   r/   
export_key   sn   M
	
zRsaKey.export_keyc                 C      t dNz0Use module Cryptodome.Signature.pkcs1_15 insteadNotImplementedError)r'   MKr.   r.   r/   sign{     zRsaKey.signc                 C   r   r   r   )r'   r   	signaturer.   r.   r/   verify~  r   zRsaKey.verifyc                 C   r   Nz/Use module Cryptodome.Cipher.PKCS1_OAEP insteadr   )r'   rB   r   r.   r.   r/   encrypt  r   zRsaKey.encryptc                 C   r   r   r   rS   r.   r.   r/   decrypt  r   zRsaKey.decryptc                 C      t r2   r   r'   r   Br.   r.   r/   blind  rY   zRsaKey.blindc                 C   r   r2   r   r   r.   r.   r/   unblind  rY   zRsaKey.unblindc                 C   r   r2   r   r5   r.   r.   r/   size  rY   zRsaKey.size)rk   Nr   NN)$__name__
__module____qualname____doc__r0   propertyr   r   r   r   r   r   r>   r@   rC   rR   rT   r9   rX   rZ   r[   r^   r_   rb   re   rj   r   	exportKey	publickeyr   r   r   r   r   r   r   r.   r.   r.   r/   r   4   sT    





	
 r     c                    sv  | dk rt d d dks dk rt d|du rtj}td }}t  | | kr|d| d > k r| d }| | }tdd| d >   ||kr[tdd| d >   fd	d
}t|||dtd| d d >  fdd}t|||d}	|	 }d |	d }
 |
}| | kr|d| d > k s5|	kr|	}	|	}t	| ||	|dS )a4  Create a new RSA key pair.

    The algorithm closely follows NIST `FIPS 186-4`_ in its
    sections B.3.1 and B.3.3. The modulus is the product of
    two non-strong probable primes.
    Each prime passes a suitable number of Miller-Rabin tests
    with random bases and a single Lucas test.

    Args:
      bits (integer):
        Key length, or size (in bits) of the RSA modulus.
        It must be at least 1024, but **2048 is recommended.**
        The FIPS standard only defines 1024, 2048 and 3072.
      randfunc (callable):
        Function that returns random bytes.
        The default is :func:`Cryptodome.Random.get_random_bytes`.
      e (integer):
        Public RSA exponent. It must be an odd positive integer.
        It is typically a small number with very few ones in its
        binary representation.
        The FIPS standard requires the public exponent to be
        at least 65537 (the default).

    Returns: an RSA key object (:class:`RsaKey`, with private key).

    .. _FIPS 186-4: http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-4.pdf
    i   z"RSA modulus length must be >= 1024   r      zBRSA public exponent must be a positive, odd integer larger than 2.Nr   c                    s   | ko| d   dkS Nr   )gcd	candidate)r   min_pr.   r/   filter_p  s   zgenerate.<locals>.filter_p)
exact_bitsr   prime_filterd   c                    s*   | ko| d   dkot|  kS r   )r   absr   )r   min_distancemin_qr   r.   r/   filter_q  s
   zgenerate.<locals>.filter_qr   r   r   r   r   r   )
r   r   r   r   r>   sqrtr   lcmrI   r   )bitsr   r   r   r   size_qsize_pr   r   r   r   r   r.   )r   r   r   r   r   r/   r     sB   
!

r   Tc                 C   s  G dd dt }| }td| D ]\}}t||t| q|j}|j}t|ds/t||d}n|j}	t|dr>|j	}
|j
}nt|	| d }|}|d d	krV|d }|d d	ksLd
}td}|s|dk rt|}||k rt|||}|dkr||d krt|d|dkrt||d }
d}n|d9 }||k sj|d7 }|s|dk sb|std||
 d	ksJ ||
 }t|dr|j}n|
|}t|||	|
||d}|rq|dks||krtdt||dkrtd|d@ std| rq|	dks|	|krtdt||	dkrtd|
| |krtdt|
tkr#tdt|tkr.td|
d |d  }||
d |d  }||	 t| dkrPtdt|drq|dks`||krdtd|
| | dkrqtd|S )a!  Construct an RSA key from a tuple of valid RSA components.

    The modulus **n** must be the product of two primes.
    The public exponent **e** must be odd and larger than 1.

    In case of a private key, the following equations must apply:

    .. math::

        \begin{align}
        p*q &= n \\
        e*d &\equiv 1 ( \text{mod lcm} [(p-1)(q-1)]) \\
        p*u &\equiv 1 ( \text{mod } q)
        \end{align}

    Args:
        rsa_components (tuple):
            A tuple of integers, with at least 2 and no
            more than 6 items. The items come in the following order:

            1. RSA modulus *n*.
            2. Public exponent *e*.
            3. Private exponent *d*.
               Only required if the key is private.
            4. First factor of *n* (*p*).
               Optional, but the other factor *q* must also be present.
            5. Second factor of *n* (*q*). Optional.
            6. CRT coefficient *q*, that is :math:`p^{-1} \text{mod }q`. Optional.

        consistency_check (boolean):
            If ``True``, the library will verify that the provided components
            fulfil the main RSA properties.

    Raises:
        ValueError: when the key being imported fails the most basic RSA validity checks.

    Returns: An RSA key object (:class:`RsaKey`).
    c                   @   s   e Zd ZdS )zconstruct.<locals>.InputCompsN)r   r   r   r.   r.   r.   r/   
InputComps
  s    r   r   r   r   r   r   r   r   Fr   Tz2Unable to compute factors p and q from exponent d.r   zInvalid RSA public exponentz-RSA public exponent is not coprime to moduluszRSA modulus is not oddzInvalid RSA private exponentz.RSA private exponent is not coprime to modulusz RSA factors do not match moduluszRSA factor p is compositezRSA factor q is compositezInvalid RSA conditionzInvalid RSA component uzInvalid RSA component u with p)objectzipr!   r   r   r   rU   r   r   r   r   rA   r   r   r   rI   r9   r   r   r3   )rsa_componentsconsistency_checkr   input_compscompr-   r   r   keyr   r   r   ktottspottedakcandr   phir   r.   r.   r/   r     s   (

$


r   c                 G   sN   t  j| ddd}|d dkrtdt|dd t|d |d	 g S )
N	   Tnr_elementsonly_ints_expectedr   z(No PKCS#1 encoding of an RSA private keyr            )r   decoder   r   r   rI   encodedr(   derr.   r.   r/   _import_pkcs1_privateq  s   (r   c                 G   s   t  j| ddd}t|S )Nr   Tr   )r   r   r   r   r.   r.   r/   _import_pkcs1_public  s   r   c                 G   s.   t | \}}}|tks|d urtdt|S )NzNo RSA subjectPublicKeyInfo)r   r   r   r   )r   r(   algoidencoded_keyparamsr.   r.   r/   _import_subjectPublicKeyInfo  s   r   c                 G   s   t | }t|S r2   )r   r   )r   r(   sp_infor.   r.   r/   _import_x509_cert  s   r   c                 C   s:   ddl m} || |}|d tkrtdt|d |S )Nr   r}   zNo PKCS#8 encoded RSA keyr   )r   r~   unwrapr   r   _import_keyDER)r   r   r~   r   r.   r.   r/   _import_pkcs8  s
   r   c              	   C   sB   t ttttf}|D ]}z|| |W   S  ty   Y q	w td)z@Import an RSA key (public or private half), encoded in DER form.RSA key format is not supported)r   r   r   r   r   r   )
extern_keyr   	decodingsdecodingr.   r.   r/   r     s   r   c                 C   s   ddl m}m}m}m} || |\}}|dkrtd||\}}||\}	}||\}
}||\}}||\}}||\}}||\}}|| dd ||	|
|||fD }t|S )Nr   )import_openssh_private_generic
read_bytesread_stringcheck_paddingzssh-rsazThis SSH key is not RSAc                 S   s   g | ]}t |qS r.   )r   
from_bytesrn   r.   r.   r/   rq     s    z/_import_openssh_private_rsa.<locals>.<listcomp>)_opensshr   r   r   r   r   r   )datapasswordr   r   r   r   ssh_name	decryptedr   r   r   iqmpr   r   r   paddedbuildr.   r.   r/   _import_openssh_private_rsa  s   r   c                 C   sV  ddl m} t| } |durt|}| dr+t| }|||\}}}t||}|S | drD|t| |\}}}|r?d}t||S | drt	| 
dd }	g }
t|	d	krtd
|	dd	 d }|
|	d	d	|   |	d	| d }	t|	d	ks[t|
d }t|
d }t||gS t| dkrt| d dkrt| |S td)a  Import an RSA key (public or private).

    Args:
      extern_key (string or byte string):
        The RSA key to import.

        The following formats are supported for an RSA **public key**:

        - X.509 certificate (binary or PEM format)
        - X.509 ``subjectPublicKeyInfo`` DER SEQUENCE (binary or PEM
          encoding)
        - `PKCS#1`_ ``RSAPublicKey`` DER SEQUENCE (binary or PEM encoding)
        - An OpenSSH line (e.g. the content of ``~/.ssh/id_ecdsa``, ASCII)

        The following formats are supported for an RSA **private key**:

        - PKCS#1 ``RSAPrivateKey`` DER SEQUENCE (binary or PEM encoding)
        - `PKCS#8`_ ``PrivateKeyInfo`` or ``EncryptedPrivateKeyInfo``
          DER SEQUENCE (binary or PEM encoding)
        - OpenSSH (text format, introduced in `OpenSSH 6.5`_)

        For details about the PEM encoding, see `RFC1421`_/`RFC1423`_.

      passphrase (string or byte string):
        For private keys only, the pass phrase that encrypts the key.

    Returns: An RSA key object (:class:`RsaKey`).

    Raises:
      ValueError/IndexError/TypeError:
        When the given key cannot be parsed (possibly because the pass
        phrase is wrong).

    .. _RFC1421: http://www.ietf.org/rfc/rfc1421.txt
    .. _RFC1423: http://www.ietf.org/rfc/rfc1423.txt
    .. _`PKCS#1`: http://www.ietf.org/rfc/rfc3447.txt
    .. _`PKCS#8`: http://www.ietf.org/rfc/rfc5208.txt
    .. _`OpenSSH 6.5`: https://flak.tedunangst.com/post/new-openssh-key-format-and-bcrypt-pbkdf
    r   r   Ns   -----BEGIN OPENSSH PRIVATE KEYs   -----rz       r   r   ru   r   0   r   )r   rk   r   
startswithr
   r   r   r   r   
a2b_base64splitrx   rv   unpackappendr   r   r   r	   r   )r   r   rk   text_encodedopenssh_encodedmarkerenc_flagrQ   r   r   r   lengthr   r   r.   r.   r/   r     s8   )





r   z1.2.840.113549.1.1.1)Nr   )Tr2   )%__all__r   rv   
Cryptodomer   Cryptodome.Util.py3compatr   r	   r
   Cryptodome.Util.asn1r   Cryptodome.Util.numberr   Cryptodome.Math.Numbersr   Cryptodome.Math.Primalityr   r   r   Cryptodome.PublicKeyr   r   r   r   r   r   r   r   r   r   r   r   r   r   r   	importKeyr   r.   r.   r.   r/   <module>   s4     
_
Q 		
P