summaryrefslogtreecommitdiff
path: root/rsa/pem.py
diff options
context:
space:
mode:
authorSybren A. St?vel <sybren@stuvel.eu>2011-07-19 23:53:59 +0200
committerSybren A. St?vel <sybren@stuvel.eu>2011-07-19 23:53:59 +0200
commite9fc17cf57ec14e652f0effe4e85279ea5f2aba2 (patch)
treec4323bc70163ad4f1d92c5c531b2f599e509d991 /rsa/pem.py
parentf95a8b2bba01a4d6a1076b08dc7e3a74ba656b59 (diff)
downloadrsa-e9fc17cf57ec14e652f0effe4e85279ea5f2aba2.tar.gz
Added loading of DER and PEM encoded private keys
Diffstat (limited to 'rsa/pem.py')
-rw-r--r--rsa/pem.py60
1 files changed, 60 insertions, 0 deletions
diff --git a/rsa/pem.py b/rsa/pem.py
new file mode 100644
index 0000000..a06d59f
--- /dev/null
+++ b/rsa/pem.py
@@ -0,0 +1,60 @@
+'''Functions that load and write PEM-encoded files.'''
+
+import base64
+
+def load_pem(contents, pem_start, pem_end):
+ '''Loads a PEM file.
+
+ Only considers the information between lines "pem_start" and "pem_end". For
+ private keys these are '-----BEGIN RSA PRIVATE KEY-----' and
+ '-----END RSA PRIVATE KEY-----'
+
+ @param contents: the contents of the file to interpret
+ @param pem_start: the start marker of the PEM content, such as
+ '-----BEGIN RSA PRIVATE KEY-----'
+ @param pem_end: the end marker of the PEM content, such as
+ '-----END RSA PRIVATE KEY-----'
+
+ @return the base64-decoded content between the start and end markers.
+
+ @raise ValueError: when the content is invalid, for example when the start
+ marker cannot be found.
+
+ '''
+
+ pem_lines = []
+ in_pem_part = False
+
+ for line in contents.split('\n'):
+ line = line.strip()
+
+ # Handle start marker
+ if line == pem_start:
+ if in_pem_part:
+ raise ValueError('Seen start marker "%s" twice' % pem_start)
+
+ in_pem_part = True
+ continue
+
+ # Skip stuff before first marker
+ if not in_pem_part:
+ continue
+
+ # Handle end marker
+ if in_pem_part and line == pem_end:
+ in_pem_part = False
+ break
+
+ pem_lines.append(line)
+
+ # Do some sanity checks
+ if not pem_lines:
+ raise ValueError('No PEM start marker "%s" found' % pem_start)
+
+ if in_pem_part:
+ raise ValueError('No PEM end marker "%s" found' % pem_end)
+
+ # Base64-decode the contents
+ pem = ''.join(pem_lines)
+ return base64.decodestring(pem)
+