diff options
author | Alex Gaynor <alex.gaynor@gmail.com> | 2015-12-22 10:54:25 -0500 |
---|---|---|
committer | Alex Gaynor <alex.gaynor@gmail.com> | 2015-12-22 10:54:25 -0500 |
commit | d05b0bd046be891957db6c8b1f78de492230d211 (patch) | |
tree | cc378c7a4971b3c7e2b9e68ca97e0f664d4f36f4 | |
parent | 1f32f2d28fd67e0671d2710c550c1044b7588acc (diff) | |
parent | 109237fd0a165966abcb2e6a8c687e7280483647 (diff) | |
download | cryptography-d05b0bd046be891957db6c8b1f78de492230d211.tar.gz cryptography-d05b0bd046be891957db6c8b1f78de492230d211.tar.bz2 cryptography-d05b0bd046be891957db6c8b1f78de492230d211.zip |
Merge pull request #2543 from reaperhulk/crl-extensions
support parsing CRL extensions in the OpenSSL backend
-rw-r--r-- | CHANGELOG.rst | 3 | ||||
-rw-r--r-- | docs/x509/reference.rst | 6 | ||||
-rw-r--r-- | src/cryptography/hazmat/backends/openssl/x509.py | 19 | ||||
-rw-r--r-- | src/cryptography/x509/oid.py | 2 | ||||
-rw-r--r-- | tests/test_x509.py | 22 |
5 files changed, 46 insertions, 6 deletions
diff --git a/CHANGELOG.rst b/CHANGELOG.rst index 938c2f95..742d4116 100644 --- a/CHANGELOG.rst +++ b/CHANGELOG.rst @@ -23,6 +23,9 @@ Changelog * Support serialization of certificate revocation lists using the :meth:`~cryptography.x509.CertificateRevocationList.public_bytes` method of :class:`~cryptography.x509.CertificateRevocationList`. +* Add support for parsing :class:`~cryptography.x509.CertificateRevocationList` + :meth:`~cryptography.x509.CertificateRevocationList.extensions` in the + OpenSSL backend. 1.1.2 - 2015-12-10 ~~~~~~~~~~~~~~~~~~ diff --git a/docs/x509/reference.rst b/docs/x509/reference.rst index d0606330..dace8c1b 100644 --- a/docs/x509/reference.rst +++ b/docs/x509/reference.rst @@ -2097,6 +2097,12 @@ instances. The following common OIDs are available as constants. identifier for the :class:`~cryptography.x509.OCSPNoCheck` extension type. + .. attribute:: CRL_NUMBER + + Corresponds to the dotted string ``"2.5.29.20"``. The identifier for + the ``CRLNumber`` extension type. This extension only has meaning + for certificate revocation lists. + Exceptions ~~~~~~~~~~ .. currentmodule:: cryptography.x509 diff --git a/src/cryptography/hazmat/backends/openssl/x509.py b/src/cryptography/hazmat/backends/openssl/x509.py index b7a88a4a..6f335f48 100644 --- a/src/cryptography/hazmat/backends/openssl/x509.py +++ b/src/cryptography/hazmat/backends/openssl/x509.py @@ -179,6 +179,12 @@ def _decode_ocsp_no_check(backend, ext): return x509.OCSPNoCheck() +def _decode_crl_number(backend, ext): + asn1_int = backend._ffi.cast("ASN1_INTEGER *", ext) + asn1_int = backend._ffi.gc(asn1_int, backend._lib.ASN1_INTEGER_free) + return backend._asn1_integer_to_int(asn1_int) + + class _X509ExtensionParser(object): def __init__(self, ext_count, get_ext, handlers, unsupported_exts=None): self.ext_count = ext_count @@ -870,7 +876,7 @@ class _CertificateRevocationList(object): @property def extensions(self): - raise NotImplementedError() + return _CRL_EXTENSION_PARSER.parse(self._backend, self._x509_crl) @utils.register_interface(x509.CertificateSigningRequest) @@ -978,6 +984,11 @@ _REVOKED_UNSUPPORTED_EXTENSIONS = set([ CRLExtensionOID.CERTIFICATE_ISSUER, ]) +_CRL_EXTENSION_HANDLERS = { + ExtensionOID.CRL_NUMBER: _decode_crl_number, + ExtensionOID.AUTHORITY_KEY_IDENTIFIER: _decode_authority_key_identifier, +} + _CERTIFICATE_EXTENSION_PARSER = _X509ExtensionParser( ext_count=lambda backend, x: backend._lib.X509_get_ext_count(x), get_ext=lambda backend, x, i: backend._lib.X509_get_ext(x, i), @@ -996,3 +1007,9 @@ _REVOKED_CERTIFICATE_EXTENSION_PARSER = _X509ExtensionParser( handlers=_REVOKED_EXTENSION_HANDLERS, unsupported_exts=_REVOKED_UNSUPPORTED_EXTENSIONS ) + +_CRL_EXTENSION_PARSER = _X509ExtensionParser( + ext_count=lambda backend, x: backend._lib.X509_CRL_get_ext_count(x), + get_ext=lambda backend, x, i: backend._lib.X509_CRL_get_ext(x, i), + handlers=_CRL_EXTENSION_HANDLERS, +) diff --git a/src/cryptography/x509/oid.py b/src/cryptography/x509/oid.py index 7b4df1c9..94295d66 100644 --- a/src/cryptography/x509/oid.py +++ b/src/cryptography/x509/oid.py @@ -85,6 +85,7 @@ class ExtensionOID(object): AUTHORITY_INFORMATION_ACCESS = ObjectIdentifier("1.3.6.1.5.5.7.1.1") SUBJECT_INFORMATION_ACCESS = ObjectIdentifier("1.3.6.1.5.5.7.1.11") OCSP_NO_CHECK = ObjectIdentifier("1.3.6.1.5.5.7.48.1.5") + CRL_NUMBER = ObjectIdentifier("2.5.29.20") class CRLExtensionOID(object): @@ -234,6 +235,7 @@ _OID_NAMES = { ExtensionOID.AUTHORITY_INFORMATION_ACCESS: "authorityInfoAccess", ExtensionOID.SUBJECT_INFORMATION_ACCESS: "subjectInfoAccess", ExtensionOID.OCSP_NO_CHECK: "OCSPNoCheck", + ExtensionOID.CRL_NUMBER: "cRLNumber", AuthorityInformationAccessOID.OCSP: "OCSP", AuthorityInformationAccessOID.CA_ISSUERS: "caIssuers", CertificatePoliciesOID.CPS_QUALIFIER: "id-qt-cps", diff --git a/tests/test_x509.py b/tests/test_x509.py index 27ce21e2..8d943225 100644 --- a/tests/test_x509.py +++ b/tests/test_x509.py @@ -175,14 +175,26 @@ class TestCertificateRevocationList(object): def test_extensions(self, backend): crl = _load_cert( - os.path.join("x509", "custom", "crl_all_reasons.pem"), - x509.load_pem_x509_crl, + os.path.join("x509", "PKITS_data", "crls", "GoodCACRL.crl"), + x509.load_der_x509_crl, backend ) - # CRL extensions are currently not supported in the OpenSSL backend. - with pytest.raises(NotImplementedError): - crl.extensions + crl_number = crl.extensions.get_extension_for_oid( + ExtensionOID.CRL_NUMBER + ) + aki = crl.extensions.get_extension_for_class( + x509.AuthorityKeyIdentifier + ) + assert crl_number.value == 1 + assert crl_number.critical is False + assert aki.value == x509.AuthorityKeyIdentifier( + key_identifier=( + b'X\x01\x84$\x1b\xbc+R\x94J=\xa5\x10r\x14Q\xf5\xaf:\xc9' + ), + authority_cert_issuer=None, + authority_cert_serial_number=None + ) def test_signature(self, backend): crl = _load_cert( |