3.2 Decode Python Example
The following Python script demonstrates how to verify the signed entries and decode their
contents. The script has been tested on Python v3.9.10. Required packages can be
installed using the Python package manager,
pip:
pip install python-jose[cryptography]
# (c) 2024 Microchip Technology Inc. and its subsidiaries. # # Subject to your compliance with these terms, you may use this Microchip software # and any derivatives of this software. You must retain the above copyright notice # with any redistribution of this software and the following disclaimers. It is # your responsibility to comply with third party license terms applicable to your # use of third party software (including open source software) that may accompany # this Microchip software. # # THIS SOFTWARE IS SUPPLIED BY MICROCHIP "AS IS". NO WARRANTIES, WHETHER EXPRESS, # IMPLIED OR STATUTORY, APPLY TO THIS SOFTWARE, INCLUDING ANY IMPLIED WARRANTIES # OF NON-INFRINGEMENT, MERCHANTABILITY, AND FITNESS FOR A PARTICULAR PURPOSE. IN # NO EVENT WILL MICROCHIP BE LIABLE FOR ANY INDIRECT, SPECIAL, PUNITIVE, INCIDENTAL # OR CONSEQUENTIAL LOSS, DAMAGE, COST OR EXPENSE OF ANY KIND WHATSOEVER RELATED TO # THIS SOFTWARE, HOWEVER CAUSED, EVEN IF MICROCHIP HAS BEEN ADVISED OF THE POSSIBILITY # OR THE DAMAGES ARE FORESEEABLE. TO THE FULLEST EXTENT ALLOWED BY LAW, MICROCHIP'S # TOTAL LIABILITY ON ALL CLAIMS IN ANY WAY RELATED TO THIS SOFTWARE WILL NOT EXCEED # THE AMOUNT OF FEES, IF ANY, THAT YOU HAVE PAID DIRECTLY TO MICROCHIP FOR THIS SOFTWARE. import json from base64 import b64decode from argparse import ArgumentParser import jose.jws from jose.utils import base64url_decode, base64url_encode from cryptography import x509 from cryptography.hazmat.backends import default_backend from cryptography.hazmat.primitives import hashes, serialization from cryptography.hazmat.primitives.asymmetric import ec, ed25519, ed448, x25519, x448, rsa parser = ArgumentParser( description='Verify and decode secure element manifest' ) parser.add_argument( '--manifest', help='Manifest file to process', nargs=1, type=str, required=True, metavar='file' ) parser.add_argument( '--cert', help='Verification certificate file in PEM format', nargs=1, type=str, required=True, metavar='file' ) args = parser.parse_args() # List out allowed verification algorithms for the JWS. Only allows # public-key based ones. verification_algorithms = [ 'RS256', 'RS384', 'RS512', 'ES256', 'ES384', 'ES512' ] # Load manifest as JSON with open(args.manifest[0], 'rb') as f: manifest = json.load(f) # Load verification certificate in PEM format with open(args.cert[0], 'rb') as f: verification_cert = x509.load_pem_x509_certificate( data=f.read(), backend=default_backend() ) # Convert verification certificate public key to PEM format verification_public_key_pem = verification_cert.public_key().public_bytes( encoding=serialization.Encoding.PEM, format=serialization.PublicFormat.SubjectPublicKeyInfo ).decode(encoding='ascii') # Get the base64url encoded subject key identifier for the verification cert ski_ext = verification_cert.extensions.get_extension_for_class( extclass=x509.SubjectKeyIdentifier ) verification_cert_kid_b64 = base64url_encode( ski_ext.value.digest ).decode(encoding='ascii') # Get the base64url encoded sha-256 thumbprint for the verification cert verification_cert_x5t_s256_b64 = base64url_encode( verification_cert.fingerprint(hashes.SHA256()) ).decode(encoding='ascii') # Process all the entries in the manifest for i, signed_se in enumerate(manifest): print('') print('Processing entry {} of {}:'.format(i+1, len(manifest))) print('uniqueId: {}'.format( signed_se['header']['uniqueId'] )) # Decode the protected header protected = json.loads( base64url_decode( signed_se['protected'].encode('ascii') ) ) if protected['kid'] != verification_cert_kid_b64: raise ValueError('kid does not match certificate value') if protected['x5t#S256'] != verification_cert_x5t_s256_b64: raise ValueError('x5t#S256 does not match certificate value') # Convert JWS to compact form as required by python-jose jws_compact = '.'.join([ signed_se['protected'], signed_se['payload'], signed_se['signature'] ]) # Verify and decode the payload. If verification fails an exception will # be raised. se = json.loads( jose.jws.verify( token=jws_compact, key=verification_public_key_pem, algorithms=verification_algorithms ) ) if se['uniqueId'] != signed_se['header']['uniqueId']: raise ValueError( ( 'uniqueId in header "{}" does not match version in' + ' payload "{}"' ).format( signed_se['header']['uniqueId'], se['uniqueId'] ) ) print('Verified') print('SecureElement = ') print(json.dumps(se, indent=2)) # Decode public keys and certificates try: public_keys = se['publicKeySet']['keys'] except KeyError: public_keys = [] for jwk in public_keys: print('Public key in slot {}:'.format(int(jwk['kid']))) if jwk['kty'] == 'EC': # Decode x and y integers x = int.from_bytes(bytes=base64url_decode(jwk['x'].encode('utf8')), byteorder='big') y = int.from_bytes(bytes=base64url_decode(jwk['y'].encode('utf8')), byteorder='big') # Get public key if jwk['crv'] == 'P-224': public_key = ec.EllipticCurvePublicNumbers(curve=ec.SECP224R1(), x=x, y=y).public_key( backend=default_backend() ) elif jwk['crv'] == 'P-256': public_key = ec.EllipticCurvePublicNumbers(curve=ec.SECP256R1(), x=x, y=y).public_key( backend=default_backend() ) elif jwk['crv'] == 'P-384': public_key = ec.EllipticCurvePublicNumbers(curve=ec.SECP384R1(), x=x, y=y).public_key( backend=default_backend() ) elif jwk['crv'] == 'P-521': public_key = ec.EllipticCurvePublicNumbers(curve=ec.SECP521R1(), x=x, y=y).public_key( backend=default_backend() ) elif jwk['crv'] == 'secp256k1': public_key = ec.EllipticCurvePublicNumbers(curve=ec.SECP256K1(), x=x, y=y).public_key( backend=default_backend() ) elif jwk['crv'] == 'brainpoolP256r1': public_key = ec.EllipticCurvePublicNumbers(curve=ec.BrainpoolP256R1(), x=x, y=y).public_key( backend=default_backend() ) elif jwk['crv'] == 'brainpoolP384r1': public_key = ec.EllipticCurvePublicNumbers(curve=ec.BrainpoolP384R1(), x=x, y=y).public_key( backend=default_backend() ) elif jwk['crv'] == 'brainpoolP512r1': public_key = ec.EllipticCurvePublicNumbers(curve=ec.BrainpoolP512R1(), x=x, y=y).public_key( backend=default_backend() ) else: raise ValueError( 'Unsupported {}'.format(json.dumps({'crv': jwk['crv']})) ) print(public_key.public_bytes( encoding=serialization.Encoding.PEM, format=serialization.PublicFormat.SubjectPublicKeyInfo ).decode(encoding='ascii')) elif jwk['kty'] == 'OKP': if jwk['crv'] == 'Ed25519': public_key = ed25519.Ed25519PublicKey.from_public_bytes(data=base64url_decode(jwk['x'])) elif jwk['crv'] == 'Ed448': public_key = ed448.Ed448PublicKey.from_public_bytes(data=base64url_decode(jwk['x'])) elif jwk['crv'] == 'X25519': public_key = x25519.X25519PublicKey.from_public_bytes(data=base64url_decode(jwk['x'])) elif jwk['crv'] == 'X448': public_key = x448.X448PublicKey.from_public_bytes(data=base64url_decode(jwk['x'])) else: raise ValueError( 'Unsupported {}'.format(json.dumps({'crv': jwk['crv']})) ) print(public_key.public_bytes( encoding=serialization.Encoding.PEM, format=serialization.PublicFormat.SubjectPublicKeyInfo ).decode(encoding='ascii')) elif jwk['kty'] == 'RSA': n = int.from_bytes(bytes=base64url_decode(jwk['n'].encode('utf8')), byteorder='big') e = int.from_bytes(bytes=base64url_decode(jwk['e'].encode('utf8')), byteorder='big') public_key = rsa.RSAPublicNumbers(n=n, e=e).public_key(backend=default_backend()) print(public_key.public_bytes( encoding=serialization.Encoding.PEM, format=serialization.PublicFormat.SubjectPublicKeyInfo ).decode(encoding='ascii')) else: raise ValueError( 'Unsupported {}'.format(json.dumps({'kty': jwk['kty']})) ) # Decode any available certificates for cert_b64 in jwk.get('x5c', []): cert = x509.load_der_x509_certificate( data=b64decode(cert_b64), backend=default_backend() ) print(cert.public_bytes( encoding=serialization.Encoding.PEM ).decode(encoding='ascii'))