summaryrefslogtreecommitdiff
path: root/tests/keys/__init__.py
blob: b615b7c1be56b04c72b6ea3f5dbaa9463d86edc5 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
import json
import os

from jwt.utils import base64url_decode
from tests.utils import int_from_bytes

BASE_PATH = os.path.dirname(os.path.abspath(__file__))


def decode_value(val):
    decoded = base64url_decode(val)
    return int_from_bytes(decoded, "big")


def load_hmac_key():
    with open(os.path.join(BASE_PATH, "jwk_hmac.json")) as infile:
        keyobj = json.load(infile)

    return base64url_decode(keyobj["k"])


try:
    from cryptography.hazmat.primitives.asymmetric import ec

    from jwt.algorithms import RSAAlgorithm

    has_crypto = True
except ImportError:
    has_crypto = False

if has_crypto:

    def load_rsa_key():
        with open(os.path.join(BASE_PATH, "jwk_rsa_key.json")) as infile:
            return RSAAlgorithm.from_jwk(infile.read())

    def load_rsa_pub_key():
        with open(os.path.join(BASE_PATH, "jwk_rsa_pub.json")) as infile:
            return RSAAlgorithm.from_jwk(infile.read())

    def load_ec_key():
        with open(os.path.join(BASE_PATH, "jwk_ec_key.json")) as infile:
            keyobj = json.load(infile)

        return ec.EllipticCurvePrivateNumbers(
            private_value=decode_value(keyobj["d"]),
            public_numbers=load_ec_pub_key_p_521().public_numbers(),
        )

    def load_ec_pub_key_p_521():
        with open(os.path.join(BASE_PATH, "jwk_ec_pub_P-521.json")) as infile:
            keyobj = json.load(infile)

        return ec.EllipticCurvePublicNumbers(
            x=decode_value(keyobj["x"]),
            y=decode_value(keyobj["y"]),
            curve=ec.SECP521R1(),
        ).public_key()