moving to scripts
This commit is contained in:
@@ -0,0 +1,245 @@
|
||||
# This file is dual licensed under the terms of the Apache License, Version
|
||||
# 2.0, and the BSD License. See the LICENSE file in the root of this repository
|
||||
# for complete details.
|
||||
|
||||
|
||||
from cryptography.x509 import certificate_transparency
|
||||
from cryptography.x509.base import (
|
||||
AttributeNotFound,
|
||||
Certificate,
|
||||
CertificateBuilder,
|
||||
CertificateRevocationList,
|
||||
CertificateRevocationListBuilder,
|
||||
CertificateSigningRequest,
|
||||
CertificateSigningRequestBuilder,
|
||||
InvalidVersion,
|
||||
RevokedCertificate,
|
||||
RevokedCertificateBuilder,
|
||||
Version,
|
||||
load_der_x509_certificate,
|
||||
load_der_x509_crl,
|
||||
load_der_x509_csr,
|
||||
load_pem_x509_certificate,
|
||||
load_pem_x509_crl,
|
||||
load_pem_x509_csr,
|
||||
random_serial_number,
|
||||
)
|
||||
from cryptography.x509.extensions import (
|
||||
AccessDescription,
|
||||
AuthorityInformationAccess,
|
||||
AuthorityKeyIdentifier,
|
||||
BasicConstraints,
|
||||
CRLDistributionPoints,
|
||||
CRLNumber,
|
||||
CRLReason,
|
||||
CertificateIssuer,
|
||||
CertificatePolicies,
|
||||
DeltaCRLIndicator,
|
||||
DistributionPoint,
|
||||
DuplicateExtension,
|
||||
ExtendedKeyUsage,
|
||||
Extension,
|
||||
ExtensionNotFound,
|
||||
ExtensionType,
|
||||
Extensions,
|
||||
FreshestCRL,
|
||||
GeneralNames,
|
||||
InhibitAnyPolicy,
|
||||
InvalidityDate,
|
||||
IssuerAlternativeName,
|
||||
IssuingDistributionPoint,
|
||||
KeyUsage,
|
||||
NameConstraints,
|
||||
NoticeReference,
|
||||
OCSPNoCheck,
|
||||
OCSPNonce,
|
||||
PolicyConstraints,
|
||||
PolicyInformation,
|
||||
PrecertPoison,
|
||||
PrecertificateSignedCertificateTimestamps,
|
||||
ReasonFlags,
|
||||
SignedCertificateTimestamps,
|
||||
SubjectAlternativeName,
|
||||
SubjectInformationAccess,
|
||||
SubjectKeyIdentifier,
|
||||
TLSFeature,
|
||||
TLSFeatureType,
|
||||
UnrecognizedExtension,
|
||||
UserNotice,
|
||||
)
|
||||
from cryptography.x509.general_name import (
|
||||
DNSName,
|
||||
DirectoryName,
|
||||
GeneralName,
|
||||
IPAddress,
|
||||
OtherName,
|
||||
RFC822Name,
|
||||
RegisteredID,
|
||||
UniformResourceIdentifier,
|
||||
UnsupportedGeneralNameType,
|
||||
)
|
||||
from cryptography.x509.name import (
|
||||
Name,
|
||||
NameAttribute,
|
||||
RelativeDistinguishedName,
|
||||
)
|
||||
from cryptography.x509.oid import (
|
||||
AuthorityInformationAccessOID,
|
||||
CRLEntryExtensionOID,
|
||||
CertificatePoliciesOID,
|
||||
ExtendedKeyUsageOID,
|
||||
ExtensionOID,
|
||||
NameOID,
|
||||
ObjectIdentifier,
|
||||
SignatureAlgorithmOID,
|
||||
)
|
||||
|
||||
|
||||
OID_AUTHORITY_INFORMATION_ACCESS = ExtensionOID.AUTHORITY_INFORMATION_ACCESS
|
||||
OID_AUTHORITY_KEY_IDENTIFIER = ExtensionOID.AUTHORITY_KEY_IDENTIFIER
|
||||
OID_BASIC_CONSTRAINTS = ExtensionOID.BASIC_CONSTRAINTS
|
||||
OID_CERTIFICATE_POLICIES = ExtensionOID.CERTIFICATE_POLICIES
|
||||
OID_CRL_DISTRIBUTION_POINTS = ExtensionOID.CRL_DISTRIBUTION_POINTS
|
||||
OID_EXTENDED_KEY_USAGE = ExtensionOID.EXTENDED_KEY_USAGE
|
||||
OID_FRESHEST_CRL = ExtensionOID.FRESHEST_CRL
|
||||
OID_INHIBIT_ANY_POLICY = ExtensionOID.INHIBIT_ANY_POLICY
|
||||
OID_ISSUER_ALTERNATIVE_NAME = ExtensionOID.ISSUER_ALTERNATIVE_NAME
|
||||
OID_KEY_USAGE = ExtensionOID.KEY_USAGE
|
||||
OID_NAME_CONSTRAINTS = ExtensionOID.NAME_CONSTRAINTS
|
||||
OID_OCSP_NO_CHECK = ExtensionOID.OCSP_NO_CHECK
|
||||
OID_POLICY_CONSTRAINTS = ExtensionOID.POLICY_CONSTRAINTS
|
||||
OID_POLICY_MAPPINGS = ExtensionOID.POLICY_MAPPINGS
|
||||
OID_SUBJECT_ALTERNATIVE_NAME = ExtensionOID.SUBJECT_ALTERNATIVE_NAME
|
||||
OID_SUBJECT_DIRECTORY_ATTRIBUTES = ExtensionOID.SUBJECT_DIRECTORY_ATTRIBUTES
|
||||
OID_SUBJECT_INFORMATION_ACCESS = ExtensionOID.SUBJECT_INFORMATION_ACCESS
|
||||
OID_SUBJECT_KEY_IDENTIFIER = ExtensionOID.SUBJECT_KEY_IDENTIFIER
|
||||
|
||||
OID_DSA_WITH_SHA1 = SignatureAlgorithmOID.DSA_WITH_SHA1
|
||||
OID_DSA_WITH_SHA224 = SignatureAlgorithmOID.DSA_WITH_SHA224
|
||||
OID_DSA_WITH_SHA256 = SignatureAlgorithmOID.DSA_WITH_SHA256
|
||||
OID_ECDSA_WITH_SHA1 = SignatureAlgorithmOID.ECDSA_WITH_SHA1
|
||||
OID_ECDSA_WITH_SHA224 = SignatureAlgorithmOID.ECDSA_WITH_SHA224
|
||||
OID_ECDSA_WITH_SHA256 = SignatureAlgorithmOID.ECDSA_WITH_SHA256
|
||||
OID_ECDSA_WITH_SHA384 = SignatureAlgorithmOID.ECDSA_WITH_SHA384
|
||||
OID_ECDSA_WITH_SHA512 = SignatureAlgorithmOID.ECDSA_WITH_SHA512
|
||||
OID_RSA_WITH_MD5 = SignatureAlgorithmOID.RSA_WITH_MD5
|
||||
OID_RSA_WITH_SHA1 = SignatureAlgorithmOID.RSA_WITH_SHA1
|
||||
OID_RSA_WITH_SHA224 = SignatureAlgorithmOID.RSA_WITH_SHA224
|
||||
OID_RSA_WITH_SHA256 = SignatureAlgorithmOID.RSA_WITH_SHA256
|
||||
OID_RSA_WITH_SHA384 = SignatureAlgorithmOID.RSA_WITH_SHA384
|
||||
OID_RSA_WITH_SHA512 = SignatureAlgorithmOID.RSA_WITH_SHA512
|
||||
OID_RSASSA_PSS = SignatureAlgorithmOID.RSASSA_PSS
|
||||
|
||||
OID_COMMON_NAME = NameOID.COMMON_NAME
|
||||
OID_COUNTRY_NAME = NameOID.COUNTRY_NAME
|
||||
OID_DOMAIN_COMPONENT = NameOID.DOMAIN_COMPONENT
|
||||
OID_DN_QUALIFIER = NameOID.DN_QUALIFIER
|
||||
OID_EMAIL_ADDRESS = NameOID.EMAIL_ADDRESS
|
||||
OID_GENERATION_QUALIFIER = NameOID.GENERATION_QUALIFIER
|
||||
OID_GIVEN_NAME = NameOID.GIVEN_NAME
|
||||
OID_LOCALITY_NAME = NameOID.LOCALITY_NAME
|
||||
OID_ORGANIZATIONAL_UNIT_NAME = NameOID.ORGANIZATIONAL_UNIT_NAME
|
||||
OID_ORGANIZATION_NAME = NameOID.ORGANIZATION_NAME
|
||||
OID_PSEUDONYM = NameOID.PSEUDONYM
|
||||
OID_SERIAL_NUMBER = NameOID.SERIAL_NUMBER
|
||||
OID_STATE_OR_PROVINCE_NAME = NameOID.STATE_OR_PROVINCE_NAME
|
||||
OID_SURNAME = NameOID.SURNAME
|
||||
OID_TITLE = NameOID.TITLE
|
||||
|
||||
OID_CLIENT_AUTH = ExtendedKeyUsageOID.CLIENT_AUTH
|
||||
OID_CODE_SIGNING = ExtendedKeyUsageOID.CODE_SIGNING
|
||||
OID_EMAIL_PROTECTION = ExtendedKeyUsageOID.EMAIL_PROTECTION
|
||||
OID_OCSP_SIGNING = ExtendedKeyUsageOID.OCSP_SIGNING
|
||||
OID_SERVER_AUTH = ExtendedKeyUsageOID.SERVER_AUTH
|
||||
OID_TIME_STAMPING = ExtendedKeyUsageOID.TIME_STAMPING
|
||||
|
||||
OID_ANY_POLICY = CertificatePoliciesOID.ANY_POLICY
|
||||
OID_CPS_QUALIFIER = CertificatePoliciesOID.CPS_QUALIFIER
|
||||
OID_CPS_USER_NOTICE = CertificatePoliciesOID.CPS_USER_NOTICE
|
||||
|
||||
OID_CERTIFICATE_ISSUER = CRLEntryExtensionOID.CERTIFICATE_ISSUER
|
||||
OID_CRL_REASON = CRLEntryExtensionOID.CRL_REASON
|
||||
OID_INVALIDITY_DATE = CRLEntryExtensionOID.INVALIDITY_DATE
|
||||
|
||||
OID_CA_ISSUERS = AuthorityInformationAccessOID.CA_ISSUERS
|
||||
OID_OCSP = AuthorityInformationAccessOID.OCSP
|
||||
|
||||
__all__ = [
|
||||
"certificate_transparency",
|
||||
"load_pem_x509_certificate",
|
||||
"load_der_x509_certificate",
|
||||
"load_pem_x509_csr",
|
||||
"load_der_x509_csr",
|
||||
"load_pem_x509_crl",
|
||||
"load_der_x509_crl",
|
||||
"random_serial_number",
|
||||
"AttributeNotFound",
|
||||
"InvalidVersion",
|
||||
"DeltaCRLIndicator",
|
||||
"DuplicateExtension",
|
||||
"ExtensionNotFound",
|
||||
"UnsupportedGeneralNameType",
|
||||
"NameAttribute",
|
||||
"Name",
|
||||
"RelativeDistinguishedName",
|
||||
"ObjectIdentifier",
|
||||
"ExtensionType",
|
||||
"Extensions",
|
||||
"Extension",
|
||||
"ExtendedKeyUsage",
|
||||
"FreshestCRL",
|
||||
"IssuingDistributionPoint",
|
||||
"TLSFeature",
|
||||
"TLSFeatureType",
|
||||
"OCSPNoCheck",
|
||||
"BasicConstraints",
|
||||
"CRLNumber",
|
||||
"KeyUsage",
|
||||
"AuthorityInformationAccess",
|
||||
"SubjectInformationAccess",
|
||||
"AccessDescription",
|
||||
"CertificatePolicies",
|
||||
"PolicyInformation",
|
||||
"UserNotice",
|
||||
"NoticeReference",
|
||||
"SubjectKeyIdentifier",
|
||||
"NameConstraints",
|
||||
"CRLDistributionPoints",
|
||||
"DistributionPoint",
|
||||
"ReasonFlags",
|
||||
"InhibitAnyPolicy",
|
||||
"SubjectAlternativeName",
|
||||
"IssuerAlternativeName",
|
||||
"AuthorityKeyIdentifier",
|
||||
"GeneralNames",
|
||||
"GeneralName",
|
||||
"RFC822Name",
|
||||
"DNSName",
|
||||
"UniformResourceIdentifier",
|
||||
"RegisteredID",
|
||||
"DirectoryName",
|
||||
"IPAddress",
|
||||
"OtherName",
|
||||
"Certificate",
|
||||
"CertificateRevocationList",
|
||||
"CertificateRevocationListBuilder",
|
||||
"CertificateSigningRequest",
|
||||
"RevokedCertificate",
|
||||
"RevokedCertificateBuilder",
|
||||
"CertificateSigningRequestBuilder",
|
||||
"CertificateBuilder",
|
||||
"Version",
|
||||
"OID_CA_ISSUERS",
|
||||
"OID_OCSP",
|
||||
"CertificateIssuer",
|
||||
"CRLReason",
|
||||
"InvalidityDate",
|
||||
"UnrecognizedExtension",
|
||||
"PolicyConstraints",
|
||||
"PrecertificateSignedCertificateTimestamps",
|
||||
"PrecertPoison",
|
||||
"OCSPNonce",
|
||||
"SignedCertificateTimestamps",
|
||||
"SignatureAlgorithmOID",
|
||||
"NameOID",
|
||||
]
|
||||
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
998
asq-env/lib/python3.9/site-packages/cryptography/x509/base.py
Normal file
998
asq-env/lib/python3.9/site-packages/cryptography/x509/base.py
Normal file
@@ -0,0 +1,998 @@
|
||||
# This file is dual licensed under the terms of the Apache License, Version
|
||||
# 2.0, and the BSD License. See the LICENSE file in the root of this repository
|
||||
# for complete details.
|
||||
|
||||
|
||||
import abc
|
||||
import datetime
|
||||
import os
|
||||
import typing
|
||||
|
||||
from cryptography import utils
|
||||
from cryptography.hazmat.backends import _get_backend
|
||||
from cryptography.hazmat.backends.interfaces import Backend
|
||||
from cryptography.hazmat.bindings._rust import x509 as rust_x509
|
||||
from cryptography.hazmat.primitives import hashes, serialization
|
||||
from cryptography.hazmat.primitives.asymmetric import (
|
||||
dsa,
|
||||
ec,
|
||||
ed25519,
|
||||
ed448,
|
||||
rsa,
|
||||
)
|
||||
from cryptography.hazmat.primitives.asymmetric.types import (
|
||||
PRIVATE_KEY_TYPES as PRIVATE_KEY_TYPES,
|
||||
PUBLIC_KEY_TYPES as PUBLIC_KEY_TYPES,
|
||||
)
|
||||
from cryptography.x509.extensions import Extension, ExtensionType, Extensions
|
||||
from cryptography.x509.name import Name
|
||||
from cryptography.x509.oid import ObjectIdentifier
|
||||
|
||||
|
||||
_EARLIEST_UTC_TIME = datetime.datetime(1950, 1, 1)
|
||||
|
||||
|
||||
class AttributeNotFound(Exception):
|
||||
def __init__(self, msg: str, oid: ObjectIdentifier) -> None:
|
||||
super(AttributeNotFound, self).__init__(msg)
|
||||
self.oid = oid
|
||||
|
||||
|
||||
def _reject_duplicate_extension(
|
||||
extension: Extension[ExtensionType],
|
||||
extensions: typing.List[Extension[ExtensionType]],
|
||||
) -> None:
|
||||
# This is quadratic in the number of extensions
|
||||
for e in extensions:
|
||||
if e.oid == extension.oid:
|
||||
raise ValueError("This extension has already been set.")
|
||||
|
||||
|
||||
def _reject_duplicate_attribute(
|
||||
oid: ObjectIdentifier,
|
||||
attributes: typing.List[typing.Tuple[ObjectIdentifier, bytes]],
|
||||
) -> None:
|
||||
# This is quadratic in the number of attributes
|
||||
for attr_oid, _ in attributes:
|
||||
if attr_oid == oid:
|
||||
raise ValueError("This attribute has already been set.")
|
||||
|
||||
|
||||
def _convert_to_naive_utc_time(time: datetime.datetime) -> datetime.datetime:
|
||||
"""Normalizes a datetime to a naive datetime in UTC.
|
||||
|
||||
time -- datetime to normalize. Assumed to be in UTC if not timezone
|
||||
aware.
|
||||
"""
|
||||
if time.tzinfo is not None:
|
||||
offset = time.utcoffset()
|
||||
offset = offset if offset else datetime.timedelta()
|
||||
return time.replace(tzinfo=None) - offset
|
||||
else:
|
||||
return time
|
||||
|
||||
|
||||
class Version(utils.Enum):
|
||||
v1 = 0
|
||||
v3 = 2
|
||||
|
||||
|
||||
class InvalidVersion(Exception):
|
||||
def __init__(self, msg: str, parsed_version: int) -> None:
|
||||
super(InvalidVersion, self).__init__(msg)
|
||||
self.parsed_version = parsed_version
|
||||
|
||||
|
||||
class Certificate(metaclass=abc.ABCMeta):
|
||||
@abc.abstractmethod
|
||||
def fingerprint(self, algorithm: hashes.HashAlgorithm) -> bytes:
|
||||
"""
|
||||
Returns bytes using digest passed.
|
||||
"""
|
||||
|
||||
@abc.abstractproperty
|
||||
def serial_number(self) -> int:
|
||||
"""
|
||||
Returns certificate serial number
|
||||
"""
|
||||
|
||||
@abc.abstractproperty
|
||||
def version(self) -> Version:
|
||||
"""
|
||||
Returns the certificate version
|
||||
"""
|
||||
|
||||
@abc.abstractmethod
|
||||
def public_key(self) -> PUBLIC_KEY_TYPES:
|
||||
"""
|
||||
Returns the public key
|
||||
"""
|
||||
|
||||
@abc.abstractproperty
|
||||
def not_valid_before(self) -> datetime.datetime:
|
||||
"""
|
||||
Not before time (represented as UTC datetime)
|
||||
"""
|
||||
|
||||
@abc.abstractproperty
|
||||
def not_valid_after(self) -> datetime.datetime:
|
||||
"""
|
||||
Not after time (represented as UTC datetime)
|
||||
"""
|
||||
|
||||
@abc.abstractproperty
|
||||
def issuer(self) -> Name:
|
||||
"""
|
||||
Returns the issuer name object.
|
||||
"""
|
||||
|
||||
@abc.abstractproperty
|
||||
def subject(self) -> Name:
|
||||
"""
|
||||
Returns the subject name object.
|
||||
"""
|
||||
|
||||
@abc.abstractproperty
|
||||
def signature_hash_algorithm(
|
||||
self,
|
||||
) -> typing.Optional[hashes.HashAlgorithm]:
|
||||
"""
|
||||
Returns a HashAlgorithm corresponding to the type of the digest signed
|
||||
in the certificate.
|
||||
"""
|
||||
|
||||
@abc.abstractproperty
|
||||
def signature_algorithm_oid(self) -> ObjectIdentifier:
|
||||
"""
|
||||
Returns the ObjectIdentifier of the signature algorithm.
|
||||
"""
|
||||
|
||||
@abc.abstractproperty
|
||||
def extensions(self) -> Extensions:
|
||||
"""
|
||||
Returns an Extensions object.
|
||||
"""
|
||||
|
||||
@abc.abstractproperty
|
||||
def signature(self) -> bytes:
|
||||
"""
|
||||
Returns the signature bytes.
|
||||
"""
|
||||
|
||||
@abc.abstractproperty
|
||||
def tbs_certificate_bytes(self) -> bytes:
|
||||
"""
|
||||
Returns the tbsCertificate payload bytes as defined in RFC 5280.
|
||||
"""
|
||||
|
||||
@abc.abstractmethod
|
||||
def __eq__(self, other: object) -> bool:
|
||||
"""
|
||||
Checks equality.
|
||||
"""
|
||||
|
||||
@abc.abstractmethod
|
||||
def __ne__(self, other: object) -> bool:
|
||||
"""
|
||||
Checks not equal.
|
||||
"""
|
||||
|
||||
@abc.abstractmethod
|
||||
def __hash__(self) -> int:
|
||||
"""
|
||||
Computes a hash.
|
||||
"""
|
||||
|
||||
@abc.abstractmethod
|
||||
def public_bytes(self, encoding: serialization.Encoding) -> bytes:
|
||||
"""
|
||||
Serializes the certificate to PEM or DER format.
|
||||
"""
|
||||
|
||||
|
||||
# Runtime isinstance checks need this since the rust class is not a subclass.
|
||||
Certificate.register(rust_x509.Certificate)
|
||||
|
||||
|
||||
class RevokedCertificate(metaclass=abc.ABCMeta):
|
||||
@abc.abstractproperty
|
||||
def serial_number(self) -> int:
|
||||
"""
|
||||
Returns the serial number of the revoked certificate.
|
||||
"""
|
||||
|
||||
@abc.abstractproperty
|
||||
def revocation_date(self) -> datetime.datetime:
|
||||
"""
|
||||
Returns the date of when this certificate was revoked.
|
||||
"""
|
||||
|
||||
@abc.abstractproperty
|
||||
def extensions(self) -> Extensions:
|
||||
"""
|
||||
Returns an Extensions object containing a list of Revoked extensions.
|
||||
"""
|
||||
|
||||
|
||||
# Runtime isinstance checks need this since the rust class is not a subclass.
|
||||
RevokedCertificate.register(rust_x509.RevokedCertificate)
|
||||
|
||||
|
||||
class CertificateRevocationList(metaclass=abc.ABCMeta):
|
||||
@abc.abstractmethod
|
||||
def public_bytes(self, encoding: serialization.Encoding) -> bytes:
|
||||
"""
|
||||
Serializes the CRL to PEM or DER format.
|
||||
"""
|
||||
|
||||
@abc.abstractmethod
|
||||
def fingerprint(self, algorithm: hashes.HashAlgorithm) -> bytes:
|
||||
"""
|
||||
Returns bytes using digest passed.
|
||||
"""
|
||||
|
||||
@abc.abstractmethod
|
||||
def get_revoked_certificate_by_serial_number(
|
||||
self, serial_number: int
|
||||
) -> typing.Optional[RevokedCertificate]:
|
||||
"""
|
||||
Returns an instance of RevokedCertificate or None if the serial_number
|
||||
is not in the CRL.
|
||||
"""
|
||||
|
||||
@abc.abstractproperty
|
||||
def signature_hash_algorithm(
|
||||
self,
|
||||
) -> typing.Optional[hashes.HashAlgorithm]:
|
||||
"""
|
||||
Returns a HashAlgorithm corresponding to the type of the digest signed
|
||||
in the certificate.
|
||||
"""
|
||||
|
||||
@abc.abstractproperty
|
||||
def signature_algorithm_oid(self) -> ObjectIdentifier:
|
||||
"""
|
||||
Returns the ObjectIdentifier of the signature algorithm.
|
||||
"""
|
||||
|
||||
@abc.abstractproperty
|
||||
def issuer(self) -> Name:
|
||||
"""
|
||||
Returns the X509Name with the issuer of this CRL.
|
||||
"""
|
||||
|
||||
@abc.abstractproperty
|
||||
def next_update(self) -> typing.Optional[datetime.datetime]:
|
||||
"""
|
||||
Returns the date of next update for this CRL.
|
||||
"""
|
||||
|
||||
@abc.abstractproperty
|
||||
def last_update(self) -> datetime.datetime:
|
||||
"""
|
||||
Returns the date of last update for this CRL.
|
||||
"""
|
||||
|
||||
@abc.abstractproperty
|
||||
def extensions(self) -> Extensions:
|
||||
"""
|
||||
Returns an Extensions object containing a list of CRL extensions.
|
||||
"""
|
||||
|
||||
@abc.abstractproperty
|
||||
def signature(self) -> bytes:
|
||||
"""
|
||||
Returns the signature bytes.
|
||||
"""
|
||||
|
||||
@abc.abstractproperty
|
||||
def tbs_certlist_bytes(self) -> bytes:
|
||||
"""
|
||||
Returns the tbsCertList payload bytes as defined in RFC 5280.
|
||||
"""
|
||||
|
||||
@abc.abstractmethod
|
||||
def __eq__(self, other: object) -> bool:
|
||||
"""
|
||||
Checks equality.
|
||||
"""
|
||||
|
||||
@abc.abstractmethod
|
||||
def __ne__(self, other: object) -> bool:
|
||||
"""
|
||||
Checks not equal.
|
||||
"""
|
||||
|
||||
@abc.abstractmethod
|
||||
def __len__(self) -> int:
|
||||
"""
|
||||
Number of revoked certificates in the CRL.
|
||||
"""
|
||||
|
||||
@typing.overload
|
||||
def __getitem__(self, idx: int) -> RevokedCertificate:
|
||||
...
|
||||
|
||||
@typing.overload
|
||||
def __getitem__(self, idx: slice) -> typing.List[RevokedCertificate]:
|
||||
...
|
||||
|
||||
@abc.abstractmethod
|
||||
def __getitem__(
|
||||
self, idx: typing.Union[int, slice]
|
||||
) -> typing.Union[RevokedCertificate, typing.List[RevokedCertificate]]:
|
||||
"""
|
||||
Returns a revoked certificate (or slice of revoked certificates).
|
||||
"""
|
||||
|
||||
@abc.abstractmethod
|
||||
def __iter__(self) -> typing.Iterator[RevokedCertificate]:
|
||||
"""
|
||||
Iterator over the revoked certificates
|
||||
"""
|
||||
|
||||
@abc.abstractmethod
|
||||
def is_signature_valid(self, public_key: PUBLIC_KEY_TYPES) -> bool:
|
||||
"""
|
||||
Verifies signature of revocation list against given public key.
|
||||
"""
|
||||
|
||||
|
||||
CertificateRevocationList.register(rust_x509.CertificateRevocationList)
|
||||
|
||||
|
||||
class CertificateSigningRequest(metaclass=abc.ABCMeta):
|
||||
@abc.abstractmethod
|
||||
def __eq__(self, other: object) -> bool:
|
||||
"""
|
||||
Checks equality.
|
||||
"""
|
||||
|
||||
@abc.abstractmethod
|
||||
def __ne__(self, other: object) -> bool:
|
||||
"""
|
||||
Checks not equal.
|
||||
"""
|
||||
|
||||
@abc.abstractmethod
|
||||
def __hash__(self) -> int:
|
||||
"""
|
||||
Computes a hash.
|
||||
"""
|
||||
|
||||
@abc.abstractmethod
|
||||
def public_key(self) -> PUBLIC_KEY_TYPES:
|
||||
"""
|
||||
Returns the public key
|
||||
"""
|
||||
|
||||
@abc.abstractproperty
|
||||
def subject(self) -> Name:
|
||||
"""
|
||||
Returns the subject name object.
|
||||
"""
|
||||
|
||||
@abc.abstractproperty
|
||||
def signature_hash_algorithm(
|
||||
self,
|
||||
) -> typing.Optional[hashes.HashAlgorithm]:
|
||||
"""
|
||||
Returns a HashAlgorithm corresponding to the type of the digest signed
|
||||
in the certificate.
|
||||
"""
|
||||
|
||||
@abc.abstractproperty
|
||||
def signature_algorithm_oid(self) -> ObjectIdentifier:
|
||||
"""
|
||||
Returns the ObjectIdentifier of the signature algorithm.
|
||||
"""
|
||||
|
||||
@abc.abstractproperty
|
||||
def extensions(self) -> Extensions:
|
||||
"""
|
||||
Returns the extensions in the signing request.
|
||||
"""
|
||||
|
||||
@abc.abstractmethod
|
||||
def public_bytes(self, encoding: serialization.Encoding) -> bytes:
|
||||
"""
|
||||
Encodes the request to PEM or DER format.
|
||||
"""
|
||||
|
||||
@abc.abstractproperty
|
||||
def signature(self) -> bytes:
|
||||
"""
|
||||
Returns the signature bytes.
|
||||
"""
|
||||
|
||||
@abc.abstractproperty
|
||||
def tbs_certrequest_bytes(self) -> bytes:
|
||||
"""
|
||||
Returns the PKCS#10 CertificationRequestInfo bytes as defined in RFC
|
||||
2986.
|
||||
"""
|
||||
|
||||
@abc.abstractproperty
|
||||
def is_signature_valid(self) -> bool:
|
||||
"""
|
||||
Verifies signature of signing request.
|
||||
"""
|
||||
|
||||
@abc.abstractmethod
|
||||
def get_attribute_for_oid(self, oid: ObjectIdentifier) -> bytes:
|
||||
"""
|
||||
Get the attribute value for a given OID.
|
||||
"""
|
||||
|
||||
|
||||
# Runtime isinstance checks need this since the rust class is not a subclass.
|
||||
CertificateSigningRequest.register(rust_x509.CertificateSigningRequest)
|
||||
|
||||
|
||||
# Backend argument preserved for API compatibility, but ignored.
|
||||
def load_pem_x509_certificate(
|
||||
data: bytes, backend: typing.Any = None
|
||||
) -> Certificate:
|
||||
return rust_x509.load_pem_x509_certificate(data)
|
||||
|
||||
|
||||
# Backend argument preserved for API compatibility, but ignored.
|
||||
def load_der_x509_certificate(
|
||||
data: bytes, backend: typing.Any = None
|
||||
) -> Certificate:
|
||||
return rust_x509.load_der_x509_certificate(data)
|
||||
|
||||
|
||||
# Backend argument preserved for API compatibility, but ignored.
|
||||
def load_pem_x509_csr(
|
||||
data: bytes, backend: typing.Optional[Backend] = None
|
||||
) -> CertificateSigningRequest:
|
||||
return rust_x509.load_pem_x509_csr(data)
|
||||
|
||||
|
||||
# Backend argument preserved for API compatibility, but ignored.
|
||||
def load_der_x509_csr(
|
||||
data: bytes, backend: typing.Optional[Backend] = None
|
||||
) -> CertificateSigningRequest:
|
||||
return rust_x509.load_der_x509_csr(data)
|
||||
|
||||
|
||||
# Backend argument preserved for API compatibility, but ignored.
|
||||
def load_pem_x509_crl(
|
||||
data: bytes, backend: typing.Optional[Backend] = None
|
||||
) -> CertificateRevocationList:
|
||||
return rust_x509.load_pem_x509_crl(data)
|
||||
|
||||
|
||||
# Backend argument preserved for API compatibility, but ignored.
|
||||
def load_der_x509_crl(
|
||||
data: bytes, backend: typing.Optional[Backend] = None
|
||||
) -> CertificateRevocationList:
|
||||
return rust_x509.load_der_x509_crl(data)
|
||||
|
||||
|
||||
class CertificateSigningRequestBuilder(object):
|
||||
def __init__(
|
||||
self,
|
||||
subject_name: typing.Optional[Name] = None,
|
||||
extensions: typing.List[Extension[ExtensionType]] = [],
|
||||
attributes: typing.List[typing.Tuple[ObjectIdentifier, bytes]] = [],
|
||||
):
|
||||
"""
|
||||
Creates an empty X.509 certificate request (v1).
|
||||
"""
|
||||
self._subject_name = subject_name
|
||||
self._extensions = extensions
|
||||
self._attributes = attributes
|
||||
|
||||
def subject_name(self, name: Name) -> "CertificateSigningRequestBuilder":
|
||||
"""
|
||||
Sets the certificate requestor's distinguished name.
|
||||
"""
|
||||
if not isinstance(name, Name):
|
||||
raise TypeError("Expecting x509.Name object.")
|
||||
if self._subject_name is not None:
|
||||
raise ValueError("The subject name may only be set once.")
|
||||
return CertificateSigningRequestBuilder(
|
||||
name, self._extensions, self._attributes
|
||||
)
|
||||
|
||||
def add_extension(
|
||||
self, extval: ExtensionType, critical: bool
|
||||
) -> "CertificateSigningRequestBuilder":
|
||||
"""
|
||||
Adds an X.509 extension to the certificate request.
|
||||
"""
|
||||
if not isinstance(extval, ExtensionType):
|
||||
raise TypeError("extension must be an ExtensionType")
|
||||
|
||||
extension = Extension(extval.oid, critical, extval)
|
||||
_reject_duplicate_extension(extension, self._extensions)
|
||||
|
||||
return CertificateSigningRequestBuilder(
|
||||
self._subject_name,
|
||||
self._extensions + [extension],
|
||||
self._attributes,
|
||||
)
|
||||
|
||||
def add_attribute(
|
||||
self, oid: ObjectIdentifier, value: bytes
|
||||
) -> "CertificateSigningRequestBuilder":
|
||||
"""
|
||||
Adds an X.509 attribute with an OID and associated value.
|
||||
"""
|
||||
if not isinstance(oid, ObjectIdentifier):
|
||||
raise TypeError("oid must be an ObjectIdentifier")
|
||||
|
||||
if not isinstance(value, bytes):
|
||||
raise TypeError("value must be bytes")
|
||||
|
||||
_reject_duplicate_attribute(oid, self._attributes)
|
||||
|
||||
return CertificateSigningRequestBuilder(
|
||||
self._subject_name,
|
||||
self._extensions,
|
||||
self._attributes + [(oid, value)],
|
||||
)
|
||||
|
||||
def sign(
|
||||
self,
|
||||
private_key: PRIVATE_KEY_TYPES,
|
||||
algorithm: typing.Optional[hashes.HashAlgorithm],
|
||||
backend: typing.Optional[Backend] = None,
|
||||
) -> CertificateSigningRequest:
|
||||
"""
|
||||
Signs the request using the requestor's private key.
|
||||
"""
|
||||
backend = _get_backend(backend)
|
||||
if self._subject_name is None:
|
||||
raise ValueError("A CertificateSigningRequest must have a subject")
|
||||
return backend.create_x509_csr(self, private_key, algorithm)
|
||||
|
||||
|
||||
class CertificateBuilder(object):
|
||||
_extensions: typing.List[Extension[ExtensionType]]
|
||||
|
||||
def __init__(
|
||||
self,
|
||||
issuer_name: typing.Optional[Name] = None,
|
||||
subject_name: typing.Optional[Name] = None,
|
||||
public_key: typing.Optional[PUBLIC_KEY_TYPES] = None,
|
||||
serial_number: typing.Optional[int] = None,
|
||||
not_valid_before: typing.Optional[datetime.datetime] = None,
|
||||
not_valid_after: typing.Optional[datetime.datetime] = None,
|
||||
extensions: typing.List[Extension[ExtensionType]] = [],
|
||||
) -> None:
|
||||
self._version = Version.v3
|
||||
self._issuer_name = issuer_name
|
||||
self._subject_name = subject_name
|
||||
self._public_key = public_key
|
||||
self._serial_number = serial_number
|
||||
self._not_valid_before = not_valid_before
|
||||
self._not_valid_after = not_valid_after
|
||||
self._extensions = extensions
|
||||
|
||||
def issuer_name(self, name: Name) -> "CertificateBuilder":
|
||||
"""
|
||||
Sets the CA's distinguished name.
|
||||
"""
|
||||
if not isinstance(name, Name):
|
||||
raise TypeError("Expecting x509.Name object.")
|
||||
if self._issuer_name is not None:
|
||||
raise ValueError("The issuer name may only be set once.")
|
||||
return CertificateBuilder(
|
||||
name,
|
||||
self._subject_name,
|
||||
self._public_key,
|
||||
self._serial_number,
|
||||
self._not_valid_before,
|
||||
self._not_valid_after,
|
||||
self._extensions,
|
||||
)
|
||||
|
||||
def subject_name(self, name: Name) -> "CertificateBuilder":
|
||||
"""
|
||||
Sets the requestor's distinguished name.
|
||||
"""
|
||||
if not isinstance(name, Name):
|
||||
raise TypeError("Expecting x509.Name object.")
|
||||
if self._subject_name is not None:
|
||||
raise ValueError("The subject name may only be set once.")
|
||||
return CertificateBuilder(
|
||||
self._issuer_name,
|
||||
name,
|
||||
self._public_key,
|
||||
self._serial_number,
|
||||
self._not_valid_before,
|
||||
self._not_valid_after,
|
||||
self._extensions,
|
||||
)
|
||||
|
||||
def public_key(
|
||||
self,
|
||||
key: PUBLIC_KEY_TYPES,
|
||||
) -> "CertificateBuilder":
|
||||
"""
|
||||
Sets the requestor's public key (as found in the signing request).
|
||||
"""
|
||||
if not isinstance(
|
||||
key,
|
||||
(
|
||||
dsa.DSAPublicKey,
|
||||
rsa.RSAPublicKey,
|
||||
ec.EllipticCurvePublicKey,
|
||||
ed25519.Ed25519PublicKey,
|
||||
ed448.Ed448PublicKey,
|
||||
),
|
||||
):
|
||||
raise TypeError(
|
||||
"Expecting one of DSAPublicKey, RSAPublicKey,"
|
||||
" EllipticCurvePublicKey, Ed25519PublicKey or"
|
||||
" Ed448PublicKey."
|
||||
)
|
||||
if self._public_key is not None:
|
||||
raise ValueError("The public key may only be set once.")
|
||||
return CertificateBuilder(
|
||||
self._issuer_name,
|
||||
self._subject_name,
|
||||
key,
|
||||
self._serial_number,
|
||||
self._not_valid_before,
|
||||
self._not_valid_after,
|
||||
self._extensions,
|
||||
)
|
||||
|
||||
def serial_number(self, number: int) -> "CertificateBuilder":
|
||||
"""
|
||||
Sets the certificate serial number.
|
||||
"""
|
||||
if not isinstance(number, int):
|
||||
raise TypeError("Serial number must be of integral type.")
|
||||
if self._serial_number is not None:
|
||||
raise ValueError("The serial number may only be set once.")
|
||||
if number <= 0:
|
||||
raise ValueError("The serial number should be positive.")
|
||||
|
||||
# ASN.1 integers are always signed, so most significant bit must be
|
||||
# zero.
|
||||
if number.bit_length() >= 160: # As defined in RFC 5280
|
||||
raise ValueError(
|
||||
"The serial number should not be more than 159 " "bits."
|
||||
)
|
||||
return CertificateBuilder(
|
||||
self._issuer_name,
|
||||
self._subject_name,
|
||||
self._public_key,
|
||||
number,
|
||||
self._not_valid_before,
|
||||
self._not_valid_after,
|
||||
self._extensions,
|
||||
)
|
||||
|
||||
def not_valid_before(
|
||||
self, time: datetime.datetime
|
||||
) -> "CertificateBuilder":
|
||||
"""
|
||||
Sets the certificate activation time.
|
||||
"""
|
||||
if not isinstance(time, datetime.datetime):
|
||||
raise TypeError("Expecting datetime object.")
|
||||
if self._not_valid_before is not None:
|
||||
raise ValueError("The not valid before may only be set once.")
|
||||
time = _convert_to_naive_utc_time(time)
|
||||
if time < _EARLIEST_UTC_TIME:
|
||||
raise ValueError(
|
||||
"The not valid before date must be on or after"
|
||||
" 1950 January 1)."
|
||||
)
|
||||
if self._not_valid_after is not None and time > self._not_valid_after:
|
||||
raise ValueError(
|
||||
"The not valid before date must be before the not valid after "
|
||||
"date."
|
||||
)
|
||||
return CertificateBuilder(
|
||||
self._issuer_name,
|
||||
self._subject_name,
|
||||
self._public_key,
|
||||
self._serial_number,
|
||||
time,
|
||||
self._not_valid_after,
|
||||
self._extensions,
|
||||
)
|
||||
|
||||
def not_valid_after(self, time: datetime.datetime) -> "CertificateBuilder":
|
||||
"""
|
||||
Sets the certificate expiration time.
|
||||
"""
|
||||
if not isinstance(time, datetime.datetime):
|
||||
raise TypeError("Expecting datetime object.")
|
||||
if self._not_valid_after is not None:
|
||||
raise ValueError("The not valid after may only be set once.")
|
||||
time = _convert_to_naive_utc_time(time)
|
||||
if time < _EARLIEST_UTC_TIME:
|
||||
raise ValueError(
|
||||
"The not valid after date must be on or after"
|
||||
" 1950 January 1."
|
||||
)
|
||||
if (
|
||||
self._not_valid_before is not None
|
||||
and time < self._not_valid_before
|
||||
):
|
||||
raise ValueError(
|
||||
"The not valid after date must be after the not valid before "
|
||||
"date."
|
||||
)
|
||||
return CertificateBuilder(
|
||||
self._issuer_name,
|
||||
self._subject_name,
|
||||
self._public_key,
|
||||
self._serial_number,
|
||||
self._not_valid_before,
|
||||
time,
|
||||
self._extensions,
|
||||
)
|
||||
|
||||
def add_extension(
|
||||
self, extval: ExtensionType, critical: bool
|
||||
) -> "CertificateBuilder":
|
||||
"""
|
||||
Adds an X.509 extension to the certificate.
|
||||
"""
|
||||
if not isinstance(extval, ExtensionType):
|
||||
raise TypeError("extension must be an ExtensionType")
|
||||
|
||||
extension = Extension(extval.oid, critical, extval)
|
||||
_reject_duplicate_extension(extension, self._extensions)
|
||||
|
||||
return CertificateBuilder(
|
||||
self._issuer_name,
|
||||
self._subject_name,
|
||||
self._public_key,
|
||||
self._serial_number,
|
||||
self._not_valid_before,
|
||||
self._not_valid_after,
|
||||
self._extensions + [extension],
|
||||
)
|
||||
|
||||
def sign(
|
||||
self,
|
||||
private_key: PRIVATE_KEY_TYPES,
|
||||
algorithm: typing.Optional[hashes.HashAlgorithm],
|
||||
backend: typing.Optional[Backend] = None,
|
||||
) -> Certificate:
|
||||
"""
|
||||
Signs the certificate using the CA's private key.
|
||||
"""
|
||||
backend = _get_backend(backend)
|
||||
if self._subject_name is None:
|
||||
raise ValueError("A certificate must have a subject name")
|
||||
|
||||
if self._issuer_name is None:
|
||||
raise ValueError("A certificate must have an issuer name")
|
||||
|
||||
if self._serial_number is None:
|
||||
raise ValueError("A certificate must have a serial number")
|
||||
|
||||
if self._not_valid_before is None:
|
||||
raise ValueError("A certificate must have a not valid before time")
|
||||
|
||||
if self._not_valid_after is None:
|
||||
raise ValueError("A certificate must have a not valid after time")
|
||||
|
||||
if self._public_key is None:
|
||||
raise ValueError("A certificate must have a public key")
|
||||
|
||||
return backend.create_x509_certificate(self, private_key, algorithm)
|
||||
|
||||
|
||||
class CertificateRevocationListBuilder(object):
|
||||
_extensions: typing.List[Extension[ExtensionType]]
|
||||
_revoked_certificates: typing.List[RevokedCertificate]
|
||||
|
||||
def __init__(
|
||||
self,
|
||||
issuer_name: typing.Optional[Name] = None,
|
||||
last_update: typing.Optional[datetime.datetime] = None,
|
||||
next_update: typing.Optional[datetime.datetime] = None,
|
||||
extensions: typing.List[Extension[ExtensionType]] = [],
|
||||
revoked_certificates: typing.List[RevokedCertificate] = [],
|
||||
):
|
||||
self._issuer_name = issuer_name
|
||||
self._last_update = last_update
|
||||
self._next_update = next_update
|
||||
self._extensions = extensions
|
||||
self._revoked_certificates = revoked_certificates
|
||||
|
||||
def issuer_name(
|
||||
self, issuer_name: Name
|
||||
) -> "CertificateRevocationListBuilder":
|
||||
if not isinstance(issuer_name, Name):
|
||||
raise TypeError("Expecting x509.Name object.")
|
||||
if self._issuer_name is not None:
|
||||
raise ValueError("The issuer name may only be set once.")
|
||||
return CertificateRevocationListBuilder(
|
||||
issuer_name,
|
||||
self._last_update,
|
||||
self._next_update,
|
||||
self._extensions,
|
||||
self._revoked_certificates,
|
||||
)
|
||||
|
||||
def last_update(
|
||||
self, last_update: datetime.datetime
|
||||
) -> "CertificateRevocationListBuilder":
|
||||
if not isinstance(last_update, datetime.datetime):
|
||||
raise TypeError("Expecting datetime object.")
|
||||
if self._last_update is not None:
|
||||
raise ValueError("Last update may only be set once.")
|
||||
last_update = _convert_to_naive_utc_time(last_update)
|
||||
if last_update < _EARLIEST_UTC_TIME:
|
||||
raise ValueError(
|
||||
"The last update date must be on or after" " 1950 January 1."
|
||||
)
|
||||
if self._next_update is not None and last_update > self._next_update:
|
||||
raise ValueError(
|
||||
"The last update date must be before the next update date."
|
||||
)
|
||||
return CertificateRevocationListBuilder(
|
||||
self._issuer_name,
|
||||
last_update,
|
||||
self._next_update,
|
||||
self._extensions,
|
||||
self._revoked_certificates,
|
||||
)
|
||||
|
||||
def next_update(
|
||||
self, next_update: datetime.datetime
|
||||
) -> "CertificateRevocationListBuilder":
|
||||
if not isinstance(next_update, datetime.datetime):
|
||||
raise TypeError("Expecting datetime object.")
|
||||
if self._next_update is not None:
|
||||
raise ValueError("Last update may only be set once.")
|
||||
next_update = _convert_to_naive_utc_time(next_update)
|
||||
if next_update < _EARLIEST_UTC_TIME:
|
||||
raise ValueError(
|
||||
"The last update date must be on or after" " 1950 January 1."
|
||||
)
|
||||
if self._last_update is not None and next_update < self._last_update:
|
||||
raise ValueError(
|
||||
"The next update date must be after the last update date."
|
||||
)
|
||||
return CertificateRevocationListBuilder(
|
||||
self._issuer_name,
|
||||
self._last_update,
|
||||
next_update,
|
||||
self._extensions,
|
||||
self._revoked_certificates,
|
||||
)
|
||||
|
||||
def add_extension(
|
||||
self, extval: ExtensionType, critical: bool
|
||||
) -> "CertificateRevocationListBuilder":
|
||||
"""
|
||||
Adds an X.509 extension to the certificate revocation list.
|
||||
"""
|
||||
if not isinstance(extval, ExtensionType):
|
||||
raise TypeError("extension must be an ExtensionType")
|
||||
|
||||
extension = Extension(extval.oid, critical, extval)
|
||||
_reject_duplicate_extension(extension, self._extensions)
|
||||
return CertificateRevocationListBuilder(
|
||||
self._issuer_name,
|
||||
self._last_update,
|
||||
self._next_update,
|
||||
self._extensions + [extension],
|
||||
self._revoked_certificates,
|
||||
)
|
||||
|
||||
def add_revoked_certificate(
|
||||
self, revoked_certificate: RevokedCertificate
|
||||
) -> "CertificateRevocationListBuilder":
|
||||
"""
|
||||
Adds a revoked certificate to the CRL.
|
||||
"""
|
||||
if not isinstance(revoked_certificate, RevokedCertificate):
|
||||
raise TypeError("Must be an instance of RevokedCertificate")
|
||||
|
||||
return CertificateRevocationListBuilder(
|
||||
self._issuer_name,
|
||||
self._last_update,
|
||||
self._next_update,
|
||||
self._extensions,
|
||||
self._revoked_certificates + [revoked_certificate],
|
||||
)
|
||||
|
||||
def sign(
|
||||
self,
|
||||
private_key: PRIVATE_KEY_TYPES,
|
||||
algorithm: typing.Optional[hashes.HashAlgorithm],
|
||||
backend: typing.Optional[Backend] = None,
|
||||
) -> CertificateRevocationList:
|
||||
backend = _get_backend(backend)
|
||||
if self._issuer_name is None:
|
||||
raise ValueError("A CRL must have an issuer name")
|
||||
|
||||
if self._last_update is None:
|
||||
raise ValueError("A CRL must have a last update time")
|
||||
|
||||
if self._next_update is None:
|
||||
raise ValueError("A CRL must have a next update time")
|
||||
|
||||
return backend.create_x509_crl(self, private_key, algorithm)
|
||||
|
||||
|
||||
class RevokedCertificateBuilder(object):
|
||||
def __init__(
|
||||
self,
|
||||
serial_number: typing.Optional[int] = None,
|
||||
revocation_date: typing.Optional[datetime.datetime] = None,
|
||||
extensions: typing.List[Extension[ExtensionType]] = [],
|
||||
):
|
||||
self._serial_number = serial_number
|
||||
self._revocation_date = revocation_date
|
||||
self._extensions = extensions
|
||||
|
||||
def serial_number(self, number: int) -> "RevokedCertificateBuilder":
|
||||
if not isinstance(number, int):
|
||||
raise TypeError("Serial number must be of integral type.")
|
||||
if self._serial_number is not None:
|
||||
raise ValueError("The serial number may only be set once.")
|
||||
if number <= 0:
|
||||
raise ValueError("The serial number should be positive")
|
||||
|
||||
# ASN.1 integers are always signed, so most significant bit must be
|
||||
# zero.
|
||||
if number.bit_length() >= 160: # As defined in RFC 5280
|
||||
raise ValueError(
|
||||
"The serial number should not be more than 159 " "bits."
|
||||
)
|
||||
return RevokedCertificateBuilder(
|
||||
number, self._revocation_date, self._extensions
|
||||
)
|
||||
|
||||
def revocation_date(
|
||||
self, time: datetime.datetime
|
||||
) -> "RevokedCertificateBuilder":
|
||||
if not isinstance(time, datetime.datetime):
|
||||
raise TypeError("Expecting datetime object.")
|
||||
if self._revocation_date is not None:
|
||||
raise ValueError("The revocation date may only be set once.")
|
||||
time = _convert_to_naive_utc_time(time)
|
||||
if time < _EARLIEST_UTC_TIME:
|
||||
raise ValueError(
|
||||
"The revocation date must be on or after" " 1950 January 1."
|
||||
)
|
||||
return RevokedCertificateBuilder(
|
||||
self._serial_number, time, self._extensions
|
||||
)
|
||||
|
||||
def add_extension(
|
||||
self, extval: ExtensionType, critical: bool
|
||||
) -> "RevokedCertificateBuilder":
|
||||
if not isinstance(extval, ExtensionType):
|
||||
raise TypeError("extension must be an ExtensionType")
|
||||
|
||||
extension = Extension(extval.oid, critical, extval)
|
||||
_reject_duplicate_extension(extension, self._extensions)
|
||||
return RevokedCertificateBuilder(
|
||||
self._serial_number,
|
||||
self._revocation_date,
|
||||
self._extensions + [extension],
|
||||
)
|
||||
|
||||
def build(
|
||||
self, backend: typing.Optional[Backend] = None
|
||||
) -> RevokedCertificate:
|
||||
backend = _get_backend(backend)
|
||||
if self._serial_number is None:
|
||||
raise ValueError("A revoked certificate must have a serial number")
|
||||
if self._revocation_date is None:
|
||||
raise ValueError(
|
||||
"A revoked certificate must have a revocation date"
|
||||
)
|
||||
|
||||
return backend.create_x509_revoked_certificate(self)
|
||||
|
||||
|
||||
def random_serial_number() -> int:
|
||||
return int.from_bytes(os.urandom(20), "big") >> 1
|
||||
@@ -0,0 +1,48 @@
|
||||
# This file is dual licensed under the terms of the Apache License, Version
|
||||
# 2.0, and the BSD License. See the LICENSE file in the root of this repository
|
||||
# for complete details.
|
||||
|
||||
|
||||
import abc
|
||||
import datetime
|
||||
|
||||
from cryptography import utils
|
||||
from cryptography.hazmat.bindings._rust import x509 as rust_x509
|
||||
|
||||
|
||||
class LogEntryType(utils.Enum):
|
||||
X509_CERTIFICATE = 0
|
||||
PRE_CERTIFICATE = 1
|
||||
|
||||
|
||||
class Version(utils.Enum):
|
||||
v1 = 0
|
||||
|
||||
|
||||
class SignedCertificateTimestamp(metaclass=abc.ABCMeta):
|
||||
@abc.abstractproperty
|
||||
def version(self) -> Version:
|
||||
"""
|
||||
Returns the SCT version.
|
||||
"""
|
||||
|
||||
@abc.abstractproperty
|
||||
def log_id(self) -> bytes:
|
||||
"""
|
||||
Returns an identifier indicating which log this SCT is for.
|
||||
"""
|
||||
|
||||
@abc.abstractproperty
|
||||
def timestamp(self) -> datetime.datetime:
|
||||
"""
|
||||
Returns the timestamp for this SCT.
|
||||
"""
|
||||
|
||||
@abc.abstractproperty
|
||||
def entry_type(self) -> LogEntryType:
|
||||
"""
|
||||
Returns whether this is an SCT for a certificate or pre-certificate.
|
||||
"""
|
||||
|
||||
|
||||
SignedCertificateTimestamp.register(rust_x509.Sct)
|
||||
2093
asq-env/lib/python3.9/site-packages/cryptography/x509/extensions.py
Normal file
2093
asq-env/lib/python3.9/site-packages/cryptography/x509/extensions.py
Normal file
File diff suppressed because it is too large
Load Diff
@@ -0,0 +1,295 @@
|
||||
# This file is dual licensed under the terms of the Apache License, Version
|
||||
# 2.0, and the BSD License. See the LICENSE file in the root of this repository
|
||||
# for complete details.
|
||||
|
||||
|
||||
import abc
|
||||
import ipaddress
|
||||
import typing
|
||||
from email.utils import parseaddr
|
||||
|
||||
from cryptography.x509.name import Name
|
||||
from cryptography.x509.oid import ObjectIdentifier
|
||||
|
||||
|
||||
_IPADDRESS_TYPES = typing.Union[
|
||||
ipaddress.IPv4Address,
|
||||
ipaddress.IPv6Address,
|
||||
ipaddress.IPv4Network,
|
||||
ipaddress.IPv6Network,
|
||||
]
|
||||
|
||||
|
||||
class UnsupportedGeneralNameType(Exception):
|
||||
pass
|
||||
|
||||
|
||||
class GeneralName(metaclass=abc.ABCMeta):
|
||||
@abc.abstractproperty
|
||||
def value(self) -> typing.Any:
|
||||
"""
|
||||
Return the value of the object
|
||||
"""
|
||||
|
||||
|
||||
class RFC822Name(GeneralName):
|
||||
def __init__(self, value: str) -> None:
|
||||
if isinstance(value, str):
|
||||
try:
|
||||
value.encode("ascii")
|
||||
except UnicodeEncodeError:
|
||||
raise ValueError(
|
||||
"RFC822Name values should be passed as an A-label string. "
|
||||
"This means unicode characters should be encoded via "
|
||||
"a library like idna."
|
||||
)
|
||||
else:
|
||||
raise TypeError("value must be string")
|
||||
|
||||
name, address = parseaddr(value)
|
||||
if name or not address:
|
||||
# parseaddr has found a name (e.g. Name <email>) or the entire
|
||||
# value is an empty string.
|
||||
raise ValueError("Invalid rfc822name value")
|
||||
|
||||
self._value = value
|
||||
|
||||
@property
|
||||
def value(self) -> str:
|
||||
return self._value
|
||||
|
||||
@classmethod
|
||||
def _init_without_validation(cls, value: str) -> "RFC822Name":
|
||||
instance = cls.__new__(cls)
|
||||
instance._value = value
|
||||
return instance
|
||||
|
||||
def __repr__(self) -> str:
|
||||
return "<RFC822Name(value={0!r})>".format(self.value)
|
||||
|
||||
def __eq__(self, other: object) -> bool:
|
||||
if not isinstance(other, RFC822Name):
|
||||
return NotImplemented
|
||||
|
||||
return self.value == other.value
|
||||
|
||||
def __ne__(self, other: object) -> bool:
|
||||
return not self == other
|
||||
|
||||
def __hash__(self) -> int:
|
||||
return hash(self.value)
|
||||
|
||||
|
||||
class DNSName(GeneralName):
|
||||
def __init__(self, value: str) -> None:
|
||||
if isinstance(value, str):
|
||||
try:
|
||||
value.encode("ascii")
|
||||
except UnicodeEncodeError:
|
||||
raise ValueError(
|
||||
"DNSName values should be passed as an A-label string. "
|
||||
"This means unicode characters should be encoded via "
|
||||
"a library like idna."
|
||||
)
|
||||
else:
|
||||
raise TypeError("value must be string")
|
||||
|
||||
self._value = value
|
||||
|
||||
@property
|
||||
def value(self) -> str:
|
||||
return self._value
|
||||
|
||||
@classmethod
|
||||
def _init_without_validation(cls, value: str) -> "DNSName":
|
||||
instance = cls.__new__(cls)
|
||||
instance._value = value
|
||||
return instance
|
||||
|
||||
def __repr__(self) -> str:
|
||||
return "<DNSName(value={0!r})>".format(self.value)
|
||||
|
||||
def __eq__(self, other: object) -> bool:
|
||||
if not isinstance(other, DNSName):
|
||||
return NotImplemented
|
||||
|
||||
return self.value == other.value
|
||||
|
||||
def __ne__(self, other: object) -> bool:
|
||||
return not self == other
|
||||
|
||||
def __hash__(self) -> int:
|
||||
return hash(self.value)
|
||||
|
||||
|
||||
class UniformResourceIdentifier(GeneralName):
|
||||
def __init__(self, value: str) -> None:
|
||||
if isinstance(value, str):
|
||||
try:
|
||||
value.encode("ascii")
|
||||
except UnicodeEncodeError:
|
||||
raise ValueError(
|
||||
"URI values should be passed as an A-label string. "
|
||||
"This means unicode characters should be encoded via "
|
||||
"a library like idna."
|
||||
)
|
||||
else:
|
||||
raise TypeError("value must be string")
|
||||
|
||||
self._value = value
|
||||
|
||||
@property
|
||||
def value(self) -> str:
|
||||
return self._value
|
||||
|
||||
@classmethod
|
||||
def _init_without_validation(
|
||||
cls, value: str
|
||||
) -> "UniformResourceIdentifier":
|
||||
instance = cls.__new__(cls)
|
||||
instance._value = value
|
||||
return instance
|
||||
|
||||
def __repr__(self) -> str:
|
||||
return "<UniformResourceIdentifier(value={0!r})>".format(self.value)
|
||||
|
||||
def __eq__(self, other: object) -> bool:
|
||||
if not isinstance(other, UniformResourceIdentifier):
|
||||
return NotImplemented
|
||||
|
||||
return self.value == other.value
|
||||
|
||||
def __ne__(self, other: object) -> bool:
|
||||
return not self == other
|
||||
|
||||
def __hash__(self) -> int:
|
||||
return hash(self.value)
|
||||
|
||||
|
||||
class DirectoryName(GeneralName):
|
||||
def __init__(self, value: Name) -> None:
|
||||
if not isinstance(value, Name):
|
||||
raise TypeError("value must be a Name")
|
||||
|
||||
self._value = value
|
||||
|
||||
@property
|
||||
def value(self) -> Name:
|
||||
return self._value
|
||||
|
||||
def __repr__(self) -> str:
|
||||
return "<DirectoryName(value={})>".format(self.value)
|
||||
|
||||
def __eq__(self, other: object) -> bool:
|
||||
if not isinstance(other, DirectoryName):
|
||||
return NotImplemented
|
||||
|
||||
return self.value == other.value
|
||||
|
||||
def __ne__(self, other: object) -> bool:
|
||||
return not self == other
|
||||
|
||||
def __hash__(self) -> int:
|
||||
return hash(self.value)
|
||||
|
||||
|
||||
class RegisteredID(GeneralName):
|
||||
def __init__(self, value: ObjectIdentifier) -> None:
|
||||
if not isinstance(value, ObjectIdentifier):
|
||||
raise TypeError("value must be an ObjectIdentifier")
|
||||
|
||||
self._value = value
|
||||
|
||||
@property
|
||||
def value(self) -> ObjectIdentifier:
|
||||
return self._value
|
||||
|
||||
def __repr__(self) -> str:
|
||||
return "<RegisteredID(value={})>".format(self.value)
|
||||
|
||||
def __eq__(self, other: object) -> bool:
|
||||
if not isinstance(other, RegisteredID):
|
||||
return NotImplemented
|
||||
|
||||
return self.value == other.value
|
||||
|
||||
def __ne__(self, other: object) -> bool:
|
||||
return not self == other
|
||||
|
||||
def __hash__(self) -> int:
|
||||
return hash(self.value)
|
||||
|
||||
|
||||
class IPAddress(GeneralName):
|
||||
def __init__(self, value: _IPADDRESS_TYPES) -> None:
|
||||
if not isinstance(
|
||||
value,
|
||||
(
|
||||
ipaddress.IPv4Address,
|
||||
ipaddress.IPv6Address,
|
||||
ipaddress.IPv4Network,
|
||||
ipaddress.IPv6Network,
|
||||
),
|
||||
):
|
||||
raise TypeError(
|
||||
"value must be an instance of ipaddress.IPv4Address, "
|
||||
"ipaddress.IPv6Address, ipaddress.IPv4Network, or "
|
||||
"ipaddress.IPv6Network"
|
||||
)
|
||||
|
||||
self._value = value
|
||||
|
||||
@property
|
||||
def value(self) -> _IPADDRESS_TYPES:
|
||||
return self._value
|
||||
|
||||
def __repr__(self) -> str:
|
||||
return "<IPAddress(value={})>".format(self.value)
|
||||
|
||||
def __eq__(self, other: object) -> bool:
|
||||
if not isinstance(other, IPAddress):
|
||||
return NotImplemented
|
||||
|
||||
return self.value == other.value
|
||||
|
||||
def __ne__(self, other: object) -> bool:
|
||||
return not self == other
|
||||
|
||||
def __hash__(self) -> int:
|
||||
return hash(self.value)
|
||||
|
||||
|
||||
class OtherName(GeneralName):
|
||||
def __init__(self, type_id: ObjectIdentifier, value: bytes) -> None:
|
||||
if not isinstance(type_id, ObjectIdentifier):
|
||||
raise TypeError("type_id must be an ObjectIdentifier")
|
||||
if not isinstance(value, bytes):
|
||||
raise TypeError("value must be a binary string")
|
||||
|
||||
self._type_id = type_id
|
||||
self._value = value
|
||||
|
||||
@property
|
||||
def type_id(self) -> ObjectIdentifier:
|
||||
return self._type_id
|
||||
|
||||
@property
|
||||
def value(self) -> bytes:
|
||||
return self._value
|
||||
|
||||
def __repr__(self) -> str:
|
||||
return "<OtherName(type_id={}, value={!r})>".format(
|
||||
self.type_id, self.value
|
||||
)
|
||||
|
||||
def __eq__(self, other: object) -> bool:
|
||||
if not isinstance(other, OtherName):
|
||||
return NotImplemented
|
||||
|
||||
return self.type_id == other.type_id and self.value == other.value
|
||||
|
||||
def __ne__(self, other: object) -> bool:
|
||||
return not self == other
|
||||
|
||||
def __hash__(self) -> int:
|
||||
return hash((self.type_id, self.value))
|
||||
294
asq-env/lib/python3.9/site-packages/cryptography/x509/name.py
Normal file
294
asq-env/lib/python3.9/site-packages/cryptography/x509/name.py
Normal file
@@ -0,0 +1,294 @@
|
||||
# This file is dual licensed under the terms of the Apache License, Version
|
||||
# 2.0, and the BSD License. See the LICENSE file in the root of this repository
|
||||
# for complete details.
|
||||
|
||||
import typing
|
||||
|
||||
from cryptography import utils
|
||||
from cryptography.hazmat.backends import _get_backend
|
||||
from cryptography.hazmat.backends.interfaces import Backend
|
||||
from cryptography.x509.oid import NameOID, ObjectIdentifier
|
||||
|
||||
|
||||
class _ASN1Type(utils.Enum):
|
||||
UTF8String = 12
|
||||
NumericString = 18
|
||||
PrintableString = 19
|
||||
T61String = 20
|
||||
IA5String = 22
|
||||
UTCTime = 23
|
||||
GeneralizedTime = 24
|
||||
VisibleString = 26
|
||||
UniversalString = 28
|
||||
BMPString = 30
|
||||
|
||||
|
||||
_ASN1_TYPE_TO_ENUM = {i.value: i for i in _ASN1Type}
|
||||
_SENTINEL = object()
|
||||
_NAMEOID_DEFAULT_TYPE = {
|
||||
NameOID.COUNTRY_NAME: _ASN1Type.PrintableString,
|
||||
NameOID.JURISDICTION_COUNTRY_NAME: _ASN1Type.PrintableString,
|
||||
NameOID.SERIAL_NUMBER: _ASN1Type.PrintableString,
|
||||
NameOID.DN_QUALIFIER: _ASN1Type.PrintableString,
|
||||
NameOID.EMAIL_ADDRESS: _ASN1Type.IA5String,
|
||||
NameOID.DOMAIN_COMPONENT: _ASN1Type.IA5String,
|
||||
}
|
||||
|
||||
#: Short attribute names from RFC 4514:
|
||||
#: https://tools.ietf.org/html/rfc4514#page-7
|
||||
_NAMEOID_TO_NAME = {
|
||||
NameOID.COMMON_NAME: "CN",
|
||||
NameOID.LOCALITY_NAME: "L",
|
||||
NameOID.STATE_OR_PROVINCE_NAME: "ST",
|
||||
NameOID.ORGANIZATION_NAME: "O",
|
||||
NameOID.ORGANIZATIONAL_UNIT_NAME: "OU",
|
||||
NameOID.COUNTRY_NAME: "C",
|
||||
NameOID.STREET_ADDRESS: "STREET",
|
||||
NameOID.DOMAIN_COMPONENT: "DC",
|
||||
NameOID.USER_ID: "UID",
|
||||
NameOID.EMAIL_ADDRESS: "E",
|
||||
}
|
||||
|
||||
|
||||
def _escape_dn_value(val: str) -> str:
|
||||
"""Escape special characters in RFC4514 Distinguished Name value."""
|
||||
|
||||
if not val:
|
||||
return ""
|
||||
|
||||
# See https://tools.ietf.org/html/rfc4514#section-2.4
|
||||
val = val.replace("\\", "\\\\")
|
||||
val = val.replace('"', '\\"')
|
||||
val = val.replace("+", "\\+")
|
||||
val = val.replace(",", "\\,")
|
||||
val = val.replace(";", "\\;")
|
||||
val = val.replace("<", "\\<")
|
||||
val = val.replace(">", "\\>")
|
||||
val = val.replace("\0", "\\00")
|
||||
|
||||
if val[0] in ("#", " "):
|
||||
val = "\\" + val
|
||||
if val[-1] == " ":
|
||||
val = val[:-1] + "\\ "
|
||||
|
||||
return val
|
||||
|
||||
|
||||
class NameAttribute(object):
|
||||
def __init__(
|
||||
self, oid: ObjectIdentifier, value: str, _type=_SENTINEL
|
||||
) -> None:
|
||||
if not isinstance(oid, ObjectIdentifier):
|
||||
raise TypeError(
|
||||
"oid argument must be an ObjectIdentifier instance."
|
||||
)
|
||||
|
||||
if not isinstance(value, str):
|
||||
raise TypeError("value argument must be a str.")
|
||||
|
||||
if (
|
||||
oid == NameOID.COUNTRY_NAME
|
||||
or oid == NameOID.JURISDICTION_COUNTRY_NAME
|
||||
):
|
||||
if len(value.encode("utf8")) != 2:
|
||||
raise ValueError(
|
||||
"Country name must be a 2 character country code"
|
||||
)
|
||||
|
||||
# The appropriate ASN1 string type varies by OID and is defined across
|
||||
# multiple RFCs including 2459, 3280, and 5280. In general UTF8String
|
||||
# is preferred (2459), but 3280 and 5280 specify several OIDs with
|
||||
# alternate types. This means when we see the sentinel value we need
|
||||
# to look up whether the OID has a non-UTF8 type. If it does, set it
|
||||
# to that. Otherwise, UTF8!
|
||||
if _type == _SENTINEL:
|
||||
_type = _NAMEOID_DEFAULT_TYPE.get(oid, _ASN1Type.UTF8String)
|
||||
|
||||
if not isinstance(_type, _ASN1Type):
|
||||
raise TypeError("_type must be from the _ASN1Type enum")
|
||||
|
||||
self._oid = oid
|
||||
self._value = value
|
||||
self._type = _type
|
||||
|
||||
@property
|
||||
def oid(self) -> ObjectIdentifier:
|
||||
return self._oid
|
||||
|
||||
@property
|
||||
def value(self) -> str:
|
||||
return self._value
|
||||
|
||||
@property
|
||||
def rfc4514_attribute_name(self) -> str:
|
||||
"""
|
||||
The short attribute name (for example "CN") if available,
|
||||
otherwise the OID dotted string.
|
||||
"""
|
||||
return _NAMEOID_TO_NAME.get(self.oid, self.oid.dotted_string)
|
||||
|
||||
def rfc4514_string(self) -> str:
|
||||
"""
|
||||
Format as RFC4514 Distinguished Name string.
|
||||
|
||||
Use short attribute name if available, otherwise fall back to OID
|
||||
dotted string.
|
||||
"""
|
||||
return "%s=%s" % (
|
||||
self.rfc4514_attribute_name,
|
||||
_escape_dn_value(self.value),
|
||||
)
|
||||
|
||||
def __eq__(self, other: object) -> bool:
|
||||
if not isinstance(other, NameAttribute):
|
||||
return NotImplemented
|
||||
|
||||
return self.oid == other.oid and self.value == other.value
|
||||
|
||||
def __ne__(self, other: object) -> bool:
|
||||
return not self == other
|
||||
|
||||
def __hash__(self) -> int:
|
||||
return hash((self.oid, self.value))
|
||||
|
||||
def __repr__(self) -> str:
|
||||
return "<NameAttribute(oid={0.oid}, value={0.value!r})>".format(self)
|
||||
|
||||
|
||||
class RelativeDistinguishedName(object):
|
||||
def __init__(self, attributes: typing.Iterable[NameAttribute]):
|
||||
attributes = list(attributes)
|
||||
if not attributes:
|
||||
raise ValueError("a relative distinguished name cannot be empty")
|
||||
if not all(isinstance(x, NameAttribute) for x in attributes):
|
||||
raise TypeError("attributes must be an iterable of NameAttribute")
|
||||
|
||||
# Keep list and frozenset to preserve attribute order where it matters
|
||||
self._attributes = attributes
|
||||
self._attribute_set = frozenset(attributes)
|
||||
|
||||
if len(self._attribute_set) != len(attributes):
|
||||
raise ValueError("duplicate attributes are not allowed")
|
||||
|
||||
def get_attributes_for_oid(
|
||||
self, oid: ObjectIdentifier
|
||||
) -> typing.List[NameAttribute]:
|
||||
return [i for i in self if i.oid == oid]
|
||||
|
||||
def rfc4514_string(self) -> str:
|
||||
"""
|
||||
Format as RFC4514 Distinguished Name string.
|
||||
|
||||
Within each RDN, attributes are joined by '+', although that is rarely
|
||||
used in certificates.
|
||||
"""
|
||||
return "+".join(attr.rfc4514_string() for attr in self._attributes)
|
||||
|
||||
def __eq__(self, other: object) -> bool:
|
||||
if not isinstance(other, RelativeDistinguishedName):
|
||||
return NotImplemented
|
||||
|
||||
return self._attribute_set == other._attribute_set
|
||||
|
||||
def __ne__(self, other: object) -> bool:
|
||||
return not self == other
|
||||
|
||||
def __hash__(self) -> int:
|
||||
return hash(self._attribute_set)
|
||||
|
||||
def __iter__(self) -> typing.Iterator[NameAttribute]:
|
||||
return iter(self._attributes)
|
||||
|
||||
def __len__(self) -> int:
|
||||
return len(self._attributes)
|
||||
|
||||
def __repr__(self) -> str:
|
||||
return "<RelativeDistinguishedName({})>".format(self.rfc4514_string())
|
||||
|
||||
|
||||
class Name(object):
|
||||
@typing.overload
|
||||
def __init__(self, attributes: typing.Iterable[NameAttribute]) -> None:
|
||||
...
|
||||
|
||||
@typing.overload
|
||||
def __init__(
|
||||
self, attributes: typing.Iterable[RelativeDistinguishedName]
|
||||
) -> None:
|
||||
...
|
||||
|
||||
def __init__(
|
||||
self,
|
||||
attributes: typing.Iterable[
|
||||
typing.Union[NameAttribute, RelativeDistinguishedName]
|
||||
],
|
||||
) -> None:
|
||||
attributes = list(attributes)
|
||||
if all(isinstance(x, NameAttribute) for x in attributes):
|
||||
self._attributes = [
|
||||
RelativeDistinguishedName([typing.cast(NameAttribute, x)])
|
||||
for x in attributes
|
||||
]
|
||||
elif all(isinstance(x, RelativeDistinguishedName) for x in attributes):
|
||||
self._attributes = typing.cast(
|
||||
typing.List[RelativeDistinguishedName], attributes
|
||||
)
|
||||
else:
|
||||
raise TypeError(
|
||||
"attributes must be a list of NameAttribute"
|
||||
" or a list RelativeDistinguishedName"
|
||||
)
|
||||
|
||||
def rfc4514_string(self) -> str:
|
||||
"""
|
||||
Format as RFC4514 Distinguished Name string.
|
||||
For example 'CN=foobar.com,O=Foo Corp,C=US'
|
||||
|
||||
An X.509 name is a two-level structure: a list of sets of attributes.
|
||||
Each list element is separated by ',' and within each list element, set
|
||||
elements are separated by '+'. The latter is almost never used in
|
||||
real world certificates. According to RFC4514 section 2.1 the
|
||||
RDNSequence must be reversed when converting to string representation.
|
||||
"""
|
||||
return ",".join(
|
||||
attr.rfc4514_string() for attr in reversed(self._attributes)
|
||||
)
|
||||
|
||||
def get_attributes_for_oid(
|
||||
self, oid: ObjectIdentifier
|
||||
) -> typing.List[NameAttribute]:
|
||||
return [i for i in self if i.oid == oid]
|
||||
|
||||
@property
|
||||
def rdns(self) -> typing.List[RelativeDistinguishedName]:
|
||||
return self._attributes
|
||||
|
||||
def public_bytes(self, backend: typing.Optional[Backend] = None) -> bytes:
|
||||
backend = _get_backend(backend)
|
||||
return backend.x509_name_bytes(self)
|
||||
|
||||
def __eq__(self, other: object) -> bool:
|
||||
if not isinstance(other, Name):
|
||||
return NotImplemented
|
||||
|
||||
return self._attributes == other._attributes
|
||||
|
||||
def __ne__(self, other: object) -> bool:
|
||||
return not self == other
|
||||
|
||||
def __hash__(self) -> int:
|
||||
# TODO: this is relatively expensive, if this looks like a bottleneck
|
||||
# for you, consider optimizing!
|
||||
return hash(tuple(self._attributes))
|
||||
|
||||
def __iter__(self) -> typing.Iterator[NameAttribute]:
|
||||
for rdn in self._attributes:
|
||||
for ava in rdn:
|
||||
yield ava
|
||||
|
||||
def __len__(self) -> int:
|
||||
return sum(len(rdn) for rdn in self._attributes)
|
||||
|
||||
def __repr__(self) -> str:
|
||||
rdns = ",".join(attr.rfc4514_string() for attr in self._attributes)
|
||||
return "<Name({})>".format(rdns)
|
||||
489
asq-env/lib/python3.9/site-packages/cryptography/x509/ocsp.py
Normal file
489
asq-env/lib/python3.9/site-packages/cryptography/x509/ocsp.py
Normal file
@@ -0,0 +1,489 @@
|
||||
# This file is dual licensed under the terms of the Apache License, Version
|
||||
# 2.0, and the BSD License. See the LICENSE file in the root of this repository
|
||||
# for complete details.
|
||||
|
||||
|
||||
import abc
|
||||
import datetime
|
||||
import typing
|
||||
|
||||
from cryptography import utils
|
||||
from cryptography import x509
|
||||
from cryptography.hazmat.bindings._rust import ocsp
|
||||
from cryptography.hazmat.primitives import hashes, serialization
|
||||
from cryptography.x509.base import (
|
||||
PRIVATE_KEY_TYPES,
|
||||
_EARLIEST_UTC_TIME,
|
||||
_convert_to_naive_utc_time,
|
||||
_reject_duplicate_extension,
|
||||
)
|
||||
|
||||
|
||||
class OCSPResponderEncoding(utils.Enum):
|
||||
HASH = "By Hash"
|
||||
NAME = "By Name"
|
||||
|
||||
|
||||
class OCSPResponseStatus(utils.Enum):
|
||||
SUCCESSFUL = 0
|
||||
MALFORMED_REQUEST = 1
|
||||
INTERNAL_ERROR = 2
|
||||
TRY_LATER = 3
|
||||
SIG_REQUIRED = 5
|
||||
UNAUTHORIZED = 6
|
||||
|
||||
|
||||
_ALLOWED_HASHES = (
|
||||
hashes.SHA1,
|
||||
hashes.SHA224,
|
||||
hashes.SHA256,
|
||||
hashes.SHA384,
|
||||
hashes.SHA512,
|
||||
)
|
||||
|
||||
|
||||
def _verify_algorithm(algorithm):
|
||||
if not isinstance(algorithm, _ALLOWED_HASHES):
|
||||
raise ValueError(
|
||||
"Algorithm must be SHA1, SHA224, SHA256, SHA384, or SHA512"
|
||||
)
|
||||
|
||||
|
||||
class OCSPCertStatus(utils.Enum):
|
||||
GOOD = 0
|
||||
REVOKED = 1
|
||||
UNKNOWN = 2
|
||||
|
||||
|
||||
class _SingleResponse(object):
|
||||
def __init__(
|
||||
self,
|
||||
cert,
|
||||
issuer,
|
||||
algorithm,
|
||||
cert_status,
|
||||
this_update,
|
||||
next_update,
|
||||
revocation_time,
|
||||
revocation_reason,
|
||||
):
|
||||
if not isinstance(cert, x509.Certificate) or not isinstance(
|
||||
issuer, x509.Certificate
|
||||
):
|
||||
raise TypeError("cert and issuer must be a Certificate")
|
||||
|
||||
_verify_algorithm(algorithm)
|
||||
if not isinstance(this_update, datetime.datetime):
|
||||
raise TypeError("this_update must be a datetime object")
|
||||
if next_update is not None and not isinstance(
|
||||
next_update, datetime.datetime
|
||||
):
|
||||
raise TypeError("next_update must be a datetime object or None")
|
||||
|
||||
self._cert = cert
|
||||
self._issuer = issuer
|
||||
self._algorithm = algorithm
|
||||
self._this_update = this_update
|
||||
self._next_update = next_update
|
||||
|
||||
if not isinstance(cert_status, OCSPCertStatus):
|
||||
raise TypeError(
|
||||
"cert_status must be an item from the OCSPCertStatus enum"
|
||||
)
|
||||
if cert_status is not OCSPCertStatus.REVOKED:
|
||||
if revocation_time is not None:
|
||||
raise ValueError(
|
||||
"revocation_time can only be provided if the certificate "
|
||||
"is revoked"
|
||||
)
|
||||
if revocation_reason is not None:
|
||||
raise ValueError(
|
||||
"revocation_reason can only be provided if the certificate"
|
||||
" is revoked"
|
||||
)
|
||||
else:
|
||||
if not isinstance(revocation_time, datetime.datetime):
|
||||
raise TypeError("revocation_time must be a datetime object")
|
||||
|
||||
revocation_time = _convert_to_naive_utc_time(revocation_time)
|
||||
if revocation_time < _EARLIEST_UTC_TIME:
|
||||
raise ValueError(
|
||||
"The revocation_time must be on or after"
|
||||
" 1950 January 1."
|
||||
)
|
||||
|
||||
if revocation_reason is not None and not isinstance(
|
||||
revocation_reason, x509.ReasonFlags
|
||||
):
|
||||
raise TypeError(
|
||||
"revocation_reason must be an item from the ReasonFlags "
|
||||
"enum or None"
|
||||
)
|
||||
|
||||
self._cert_status = cert_status
|
||||
self._revocation_time = revocation_time
|
||||
self._revocation_reason = revocation_reason
|
||||
|
||||
|
||||
class OCSPRequest(metaclass=abc.ABCMeta):
|
||||
@abc.abstractproperty
|
||||
def issuer_key_hash(self) -> bytes:
|
||||
"""
|
||||
The hash of the issuer public key
|
||||
"""
|
||||
|
||||
@abc.abstractproperty
|
||||
def issuer_name_hash(self) -> bytes:
|
||||
"""
|
||||
The hash of the issuer name
|
||||
"""
|
||||
|
||||
@abc.abstractproperty
|
||||
def hash_algorithm(self) -> hashes.HashAlgorithm:
|
||||
"""
|
||||
The hash algorithm used in the issuer name and key hashes
|
||||
"""
|
||||
|
||||
@abc.abstractproperty
|
||||
def serial_number(self) -> int:
|
||||
"""
|
||||
The serial number of the cert whose status is being checked
|
||||
"""
|
||||
|
||||
@abc.abstractmethod
|
||||
def public_bytes(self, encoding: serialization.Encoding) -> bytes:
|
||||
"""
|
||||
Serializes the request to DER
|
||||
"""
|
||||
|
||||
@abc.abstractproperty
|
||||
def extensions(self) -> x509.Extensions:
|
||||
"""
|
||||
The list of request extensions. Not single request extensions.
|
||||
"""
|
||||
|
||||
|
||||
class OCSPResponse(metaclass=abc.ABCMeta):
|
||||
@abc.abstractproperty
|
||||
def response_status(self) -> OCSPResponseStatus:
|
||||
"""
|
||||
The status of the response. This is a value from the OCSPResponseStatus
|
||||
enumeration
|
||||
"""
|
||||
|
||||
@abc.abstractproperty
|
||||
def signature_algorithm_oid(self) -> x509.ObjectIdentifier:
|
||||
"""
|
||||
The ObjectIdentifier of the signature algorithm
|
||||
"""
|
||||
|
||||
@abc.abstractproperty
|
||||
def signature_hash_algorithm(
|
||||
self,
|
||||
) -> typing.Optional[hashes.HashAlgorithm]:
|
||||
"""
|
||||
Returns a HashAlgorithm corresponding to the type of the digest signed
|
||||
"""
|
||||
|
||||
@abc.abstractproperty
|
||||
def signature(self) -> bytes:
|
||||
"""
|
||||
The signature bytes
|
||||
"""
|
||||
|
||||
@abc.abstractproperty
|
||||
def tbs_response_bytes(self) -> bytes:
|
||||
"""
|
||||
The tbsResponseData bytes
|
||||
"""
|
||||
|
||||
@abc.abstractproperty
|
||||
def certificates(self) -> typing.List[x509.Certificate]:
|
||||
"""
|
||||
A list of certificates used to help build a chain to verify the OCSP
|
||||
response. This situation occurs when the OCSP responder uses a delegate
|
||||
certificate.
|
||||
"""
|
||||
|
||||
@abc.abstractproperty
|
||||
def responder_key_hash(self) -> typing.Optional[bytes]:
|
||||
"""
|
||||
The responder's key hash or None
|
||||
"""
|
||||
|
||||
@abc.abstractproperty
|
||||
def responder_name(self) -> typing.Optional[x509.Name]:
|
||||
"""
|
||||
The responder's Name or None
|
||||
"""
|
||||
|
||||
@abc.abstractproperty
|
||||
def produced_at(self) -> datetime.datetime:
|
||||
"""
|
||||
The time the response was produced
|
||||
"""
|
||||
|
||||
@abc.abstractproperty
|
||||
def certificate_status(self) -> OCSPCertStatus:
|
||||
"""
|
||||
The status of the certificate (an element from the OCSPCertStatus enum)
|
||||
"""
|
||||
|
||||
@abc.abstractproperty
|
||||
def revocation_time(self) -> typing.Optional[datetime.datetime]:
|
||||
"""
|
||||
The date of when the certificate was revoked or None if not
|
||||
revoked.
|
||||
"""
|
||||
|
||||
@abc.abstractproperty
|
||||
def revocation_reason(self) -> typing.Optional[x509.ReasonFlags]:
|
||||
"""
|
||||
The reason the certificate was revoked or None if not specified or
|
||||
not revoked.
|
||||
"""
|
||||
|
||||
@abc.abstractproperty
|
||||
def this_update(self) -> datetime.datetime:
|
||||
"""
|
||||
The most recent time at which the status being indicated is known by
|
||||
the responder to have been correct
|
||||
"""
|
||||
|
||||
@abc.abstractproperty
|
||||
def next_update(self) -> typing.Optional[datetime.datetime]:
|
||||
"""
|
||||
The time when newer information will be available
|
||||
"""
|
||||
|
||||
@abc.abstractproperty
|
||||
def issuer_key_hash(self) -> bytes:
|
||||
"""
|
||||
The hash of the issuer public key
|
||||
"""
|
||||
|
||||
@abc.abstractproperty
|
||||
def issuer_name_hash(self) -> bytes:
|
||||
"""
|
||||
The hash of the issuer name
|
||||
"""
|
||||
|
||||
@abc.abstractproperty
|
||||
def hash_algorithm(self) -> hashes.HashAlgorithm:
|
||||
"""
|
||||
The hash algorithm used in the issuer name and key hashes
|
||||
"""
|
||||
|
||||
@abc.abstractproperty
|
||||
def serial_number(self) -> int:
|
||||
"""
|
||||
The serial number of the cert whose status is being checked
|
||||
"""
|
||||
|
||||
@abc.abstractproperty
|
||||
def extensions(self) -> x509.Extensions:
|
||||
"""
|
||||
The list of response extensions. Not single response extensions.
|
||||
"""
|
||||
|
||||
@abc.abstractproperty
|
||||
def single_extensions(self) -> x509.Extensions:
|
||||
"""
|
||||
The list of single response extensions. Not response extensions.
|
||||
"""
|
||||
|
||||
@abc.abstractmethod
|
||||
def public_bytes(self, encoding: serialization.Encoding) -> bytes:
|
||||
"""
|
||||
Serializes the response to DER
|
||||
"""
|
||||
|
||||
|
||||
class OCSPRequestBuilder(object):
|
||||
def __init__(
|
||||
self,
|
||||
request: typing.Optional[
|
||||
typing.Tuple[
|
||||
x509.Certificate, x509.Certificate, hashes.HashAlgorithm
|
||||
]
|
||||
] = None,
|
||||
extensions: typing.List[x509.Extension[x509.ExtensionType]] = [],
|
||||
) -> None:
|
||||
self._request = request
|
||||
self._extensions = extensions
|
||||
|
||||
def add_certificate(
|
||||
self,
|
||||
cert: x509.Certificate,
|
||||
issuer: x509.Certificate,
|
||||
algorithm: hashes.HashAlgorithm,
|
||||
) -> "OCSPRequestBuilder":
|
||||
if self._request is not None:
|
||||
raise ValueError("Only one certificate can be added to a request")
|
||||
|
||||
_verify_algorithm(algorithm)
|
||||
if not isinstance(cert, x509.Certificate) or not isinstance(
|
||||
issuer, x509.Certificate
|
||||
):
|
||||
raise TypeError("cert and issuer must be a Certificate")
|
||||
|
||||
return OCSPRequestBuilder((cert, issuer, algorithm), self._extensions)
|
||||
|
||||
def add_extension(
|
||||
self, extval: x509.ExtensionType, critical: bool
|
||||
) -> "OCSPRequestBuilder":
|
||||
if not isinstance(extval, x509.ExtensionType):
|
||||
raise TypeError("extension must be an ExtensionType")
|
||||
|
||||
extension = x509.Extension(extval.oid, critical, extval)
|
||||
_reject_duplicate_extension(extension, self._extensions)
|
||||
|
||||
return OCSPRequestBuilder(
|
||||
self._request, self._extensions + [extension]
|
||||
)
|
||||
|
||||
def build(self) -> OCSPRequest:
|
||||
from cryptography.hazmat.backends.openssl.backend import backend
|
||||
|
||||
if self._request is None:
|
||||
raise ValueError("You must add a certificate before building")
|
||||
|
||||
return backend.create_ocsp_request(self)
|
||||
|
||||
|
||||
class OCSPResponseBuilder(object):
|
||||
def __init__(
|
||||
self,
|
||||
response: typing.Optional[_SingleResponse] = None,
|
||||
responder_id: typing.Optional[
|
||||
typing.Tuple[x509.Certificate, OCSPResponderEncoding]
|
||||
] = None,
|
||||
certs: typing.Optional[typing.List[x509.Certificate]] = None,
|
||||
extensions: typing.List[x509.Extension[x509.ExtensionType]] = [],
|
||||
):
|
||||
self._response = response
|
||||
self._responder_id = responder_id
|
||||
self._certs = certs
|
||||
self._extensions = extensions
|
||||
|
||||
def add_response(
|
||||
self,
|
||||
cert: x509.Certificate,
|
||||
issuer: x509.Certificate,
|
||||
algorithm: hashes.HashAlgorithm,
|
||||
cert_status: OCSPCertStatus,
|
||||
this_update: datetime.datetime,
|
||||
next_update: typing.Optional[datetime.datetime],
|
||||
revocation_time: typing.Optional[datetime.datetime],
|
||||
revocation_reason: typing.Optional[x509.ReasonFlags],
|
||||
) -> "OCSPResponseBuilder":
|
||||
if self._response is not None:
|
||||
raise ValueError("Only one response per OCSPResponse.")
|
||||
|
||||
singleresp = _SingleResponse(
|
||||
cert,
|
||||
issuer,
|
||||
algorithm,
|
||||
cert_status,
|
||||
this_update,
|
||||
next_update,
|
||||
revocation_time,
|
||||
revocation_reason,
|
||||
)
|
||||
return OCSPResponseBuilder(
|
||||
singleresp,
|
||||
self._responder_id,
|
||||
self._certs,
|
||||
self._extensions,
|
||||
)
|
||||
|
||||
def responder_id(
|
||||
self, encoding: OCSPResponderEncoding, responder_cert: x509.Certificate
|
||||
) -> "OCSPResponseBuilder":
|
||||
if self._responder_id is not None:
|
||||
raise ValueError("responder_id can only be set once")
|
||||
if not isinstance(responder_cert, x509.Certificate):
|
||||
raise TypeError("responder_cert must be a Certificate")
|
||||
if not isinstance(encoding, OCSPResponderEncoding):
|
||||
raise TypeError(
|
||||
"encoding must be an element from OCSPResponderEncoding"
|
||||
)
|
||||
|
||||
return OCSPResponseBuilder(
|
||||
self._response,
|
||||
(responder_cert, encoding),
|
||||
self._certs,
|
||||
self._extensions,
|
||||
)
|
||||
|
||||
def certificates(
|
||||
self, certs: typing.Iterable[x509.Certificate]
|
||||
) -> "OCSPResponseBuilder":
|
||||
if self._certs is not None:
|
||||
raise ValueError("certificates may only be set once")
|
||||
certs = list(certs)
|
||||
if len(certs) == 0:
|
||||
raise ValueError("certs must not be an empty list")
|
||||
if not all(isinstance(x, x509.Certificate) for x in certs):
|
||||
raise TypeError("certs must be a list of Certificates")
|
||||
return OCSPResponseBuilder(
|
||||
self._response,
|
||||
self._responder_id,
|
||||
certs,
|
||||
self._extensions,
|
||||
)
|
||||
|
||||
def add_extension(
|
||||
self, extval: x509.ExtensionType, critical: bool
|
||||
) -> "OCSPResponseBuilder":
|
||||
if not isinstance(extval, x509.ExtensionType):
|
||||
raise TypeError("extension must be an ExtensionType")
|
||||
|
||||
extension = x509.Extension(extval.oid, critical, extval)
|
||||
_reject_duplicate_extension(extension, self._extensions)
|
||||
|
||||
return OCSPResponseBuilder(
|
||||
self._response,
|
||||
self._responder_id,
|
||||
self._certs,
|
||||
self._extensions + [extension],
|
||||
)
|
||||
|
||||
def sign(
|
||||
self,
|
||||
private_key: PRIVATE_KEY_TYPES,
|
||||
algorithm: typing.Optional[hashes.HashAlgorithm],
|
||||
) -> OCSPResponse:
|
||||
from cryptography.hazmat.backends.openssl.backend import backend
|
||||
|
||||
if self._response is None:
|
||||
raise ValueError("You must add a response before signing")
|
||||
if self._responder_id is None:
|
||||
raise ValueError("You must add a responder_id before signing")
|
||||
|
||||
return backend.create_ocsp_response(
|
||||
OCSPResponseStatus.SUCCESSFUL, self, private_key, algorithm
|
||||
)
|
||||
|
||||
@classmethod
|
||||
def build_unsuccessful(
|
||||
cls, response_status: OCSPResponseStatus
|
||||
) -> OCSPResponse:
|
||||
from cryptography.hazmat.backends.openssl.backend import backend
|
||||
|
||||
if not isinstance(response_status, OCSPResponseStatus):
|
||||
raise TypeError(
|
||||
"response_status must be an item from OCSPResponseStatus"
|
||||
)
|
||||
if response_status is OCSPResponseStatus.SUCCESSFUL:
|
||||
raise ValueError("response_status cannot be SUCCESSFUL")
|
||||
|
||||
return backend.create_ocsp_response(response_status, None, None, None)
|
||||
|
||||
|
||||
def load_der_ocsp_request(data: bytes) -> OCSPRequest:
|
||||
return ocsp.load_der_ocsp_request(data)
|
||||
|
||||
|
||||
def load_der_ocsp_response(data: bytes) -> OCSPResponse:
|
||||
return ocsp.load_der_ocsp_response(data)
|
||||
32
asq-env/lib/python3.9/site-packages/cryptography/x509/oid.py
Normal file
32
asq-env/lib/python3.9/site-packages/cryptography/x509/oid.py
Normal file
@@ -0,0 +1,32 @@
|
||||
# This file is dual licensed under the terms of the Apache License, Version
|
||||
# 2.0, and the BSD License. See the LICENSE file in the root of this repository
|
||||
# for complete details.
|
||||
|
||||
from cryptography.hazmat._oid import (
|
||||
AttributeOID,
|
||||
AuthorityInformationAccessOID,
|
||||
CRLEntryExtensionOID,
|
||||
CertificatePoliciesOID,
|
||||
ExtendedKeyUsageOID,
|
||||
ExtensionOID,
|
||||
NameOID,
|
||||
OCSPExtensionOID,
|
||||
ObjectIdentifier,
|
||||
SignatureAlgorithmOID,
|
||||
SubjectInformationAccessOID,
|
||||
)
|
||||
|
||||
|
||||
__all__ = [
|
||||
"AttributeOID",
|
||||
"AuthorityInformationAccessOID",
|
||||
"CRLEntryExtensionOID",
|
||||
"CertificatePoliciesOID",
|
||||
"ExtendedKeyUsageOID",
|
||||
"ExtensionOID",
|
||||
"NameOID",
|
||||
"OCSPExtensionOID",
|
||||
"ObjectIdentifier",
|
||||
"SignatureAlgorithmOID",
|
||||
"SubjectInformationAccessOID",
|
||||
]
|
||||
Reference in New Issue
Block a user