Nevar pievienot vairāk kā 25 tēmas Tēmai ir jāsākas ar burtu vai ciparu, tā var saturēt domu zīmes ('-') un var būt līdz 35 simboliem gara.
 
 
 
 

849 rindas
27 KiB

  1. # This file is dual licensed under the terms of the Apache License, Version
  2. # 2.0, and the BSD License. See the LICENSE file in the root of this repository
  3. # for complete details.
  4. from __future__ import annotations
  5. import abc
  6. import datetime
  7. import os
  8. import typing
  9. import warnings
  10. from collections.abc import Iterable
  11. from cryptography import utils
  12. from cryptography.hazmat.bindings._rust import x509 as rust_x509
  13. from cryptography.hazmat.primitives import hashes
  14. from cryptography.hazmat.primitives.asymmetric import (
  15. dsa,
  16. ec,
  17. ed448,
  18. ed25519,
  19. padding,
  20. rsa,
  21. x448,
  22. x25519,
  23. )
  24. from cryptography.hazmat.primitives.asymmetric.types import (
  25. CertificateIssuerPrivateKeyTypes,
  26. CertificatePublicKeyTypes,
  27. )
  28. from cryptography.x509.extensions import (
  29. Extension,
  30. Extensions,
  31. ExtensionType,
  32. _make_sequence_methods,
  33. )
  34. from cryptography.x509.name import Name, _ASN1Type
  35. from cryptography.x509.oid import ObjectIdentifier
  36. _EARLIEST_UTC_TIME = datetime.datetime(1950, 1, 1)
  37. # This must be kept in sync with sign.rs's list of allowable types in
  38. # identify_hash_type
  39. _AllowedHashTypes = typing.Union[
  40. hashes.SHA224,
  41. hashes.SHA256,
  42. hashes.SHA384,
  43. hashes.SHA512,
  44. hashes.SHA3_224,
  45. hashes.SHA3_256,
  46. hashes.SHA3_384,
  47. hashes.SHA3_512,
  48. ]
  49. class AttributeNotFound(Exception):
  50. def __init__(self, msg: str, oid: ObjectIdentifier) -> None:
  51. super().__init__(msg)
  52. self.oid = oid
  53. def _reject_duplicate_extension(
  54. extension: Extension[ExtensionType],
  55. extensions: list[Extension[ExtensionType]],
  56. ) -> None:
  57. # This is quadratic in the number of extensions
  58. for e in extensions:
  59. if e.oid == extension.oid:
  60. raise ValueError("This extension has already been set.")
  61. def _reject_duplicate_attribute(
  62. oid: ObjectIdentifier,
  63. attributes: list[tuple[ObjectIdentifier, bytes, int | None]],
  64. ) -> None:
  65. # This is quadratic in the number of attributes
  66. for attr_oid, _, _ in attributes:
  67. if attr_oid == oid:
  68. raise ValueError("This attribute has already been set.")
  69. def _convert_to_naive_utc_time(time: datetime.datetime) -> datetime.datetime:
  70. """Normalizes a datetime to a naive datetime in UTC.
  71. time -- datetime to normalize. Assumed to be in UTC if not timezone
  72. aware.
  73. """
  74. if time.tzinfo is not None:
  75. offset = time.utcoffset()
  76. offset = offset if offset else datetime.timedelta()
  77. return time.replace(tzinfo=None) - offset
  78. else:
  79. return time
  80. class Attribute:
  81. def __init__(
  82. self,
  83. oid: ObjectIdentifier,
  84. value: bytes,
  85. _type: int = _ASN1Type.UTF8String.value,
  86. ) -> None:
  87. self._oid = oid
  88. self._value = value
  89. self._type = _type
  90. @property
  91. def oid(self) -> ObjectIdentifier:
  92. return self._oid
  93. @property
  94. def value(self) -> bytes:
  95. return self._value
  96. def __repr__(self) -> str:
  97. return f"<Attribute(oid={self.oid}, value={self.value!r})>"
  98. def __eq__(self, other: object) -> bool:
  99. if not isinstance(other, Attribute):
  100. return NotImplemented
  101. return (
  102. self.oid == other.oid
  103. and self.value == other.value
  104. and self._type == other._type
  105. )
  106. def __hash__(self) -> int:
  107. return hash((self.oid, self.value, self._type))
  108. class Attributes:
  109. def __init__(
  110. self,
  111. attributes: Iterable[Attribute],
  112. ) -> None:
  113. self._attributes = list(attributes)
  114. __len__, __iter__, __getitem__ = _make_sequence_methods("_attributes")
  115. def __repr__(self) -> str:
  116. return f"<Attributes({self._attributes})>"
  117. def get_attribute_for_oid(self, oid: ObjectIdentifier) -> Attribute:
  118. for attr in self:
  119. if attr.oid == oid:
  120. return attr
  121. raise AttributeNotFound(f"No {oid} attribute was found", oid)
  122. class Version(utils.Enum):
  123. v1 = 0
  124. v3 = 2
  125. class InvalidVersion(Exception):
  126. def __init__(self, msg: str, parsed_version: int) -> None:
  127. super().__init__(msg)
  128. self.parsed_version = parsed_version
  129. Certificate = rust_x509.Certificate
  130. class RevokedCertificate(metaclass=abc.ABCMeta):
  131. @property
  132. @abc.abstractmethod
  133. def serial_number(self) -> int:
  134. """
  135. Returns the serial number of the revoked certificate.
  136. """
  137. @property
  138. @abc.abstractmethod
  139. def revocation_date(self) -> datetime.datetime:
  140. """
  141. Returns the date of when this certificate was revoked.
  142. """
  143. @property
  144. @abc.abstractmethod
  145. def revocation_date_utc(self) -> datetime.datetime:
  146. """
  147. Returns the date of when this certificate was revoked as a non-naive
  148. UTC datetime.
  149. """
  150. @property
  151. @abc.abstractmethod
  152. def extensions(self) -> Extensions:
  153. """
  154. Returns an Extensions object containing a list of Revoked extensions.
  155. """
  156. # Runtime isinstance checks need this since the rust class is not a subclass.
  157. RevokedCertificate.register(rust_x509.RevokedCertificate)
  158. class _RawRevokedCertificate(RevokedCertificate):
  159. def __init__(
  160. self,
  161. serial_number: int,
  162. revocation_date: datetime.datetime,
  163. extensions: Extensions,
  164. ):
  165. self._serial_number = serial_number
  166. self._revocation_date = revocation_date
  167. self._extensions = extensions
  168. @property
  169. def serial_number(self) -> int:
  170. return self._serial_number
  171. @property
  172. def revocation_date(self) -> datetime.datetime:
  173. warnings.warn(
  174. "Properties that return a naïve datetime object have been "
  175. "deprecated. Please switch to revocation_date_utc.",
  176. utils.DeprecatedIn42,
  177. stacklevel=2,
  178. )
  179. return self._revocation_date
  180. @property
  181. def revocation_date_utc(self) -> datetime.datetime:
  182. return self._revocation_date.replace(tzinfo=datetime.timezone.utc)
  183. @property
  184. def extensions(self) -> Extensions:
  185. return self._extensions
  186. CertificateRevocationList = rust_x509.CertificateRevocationList
  187. CertificateSigningRequest = rust_x509.CertificateSigningRequest
  188. load_pem_x509_certificate = rust_x509.load_pem_x509_certificate
  189. load_der_x509_certificate = rust_x509.load_der_x509_certificate
  190. load_pem_x509_certificates = rust_x509.load_pem_x509_certificates
  191. load_pem_x509_csr = rust_x509.load_pem_x509_csr
  192. load_der_x509_csr = rust_x509.load_der_x509_csr
  193. load_pem_x509_crl = rust_x509.load_pem_x509_crl
  194. load_der_x509_crl = rust_x509.load_der_x509_crl
  195. class CertificateSigningRequestBuilder:
  196. def __init__(
  197. self,
  198. subject_name: Name | None = None,
  199. extensions: list[Extension[ExtensionType]] = [],
  200. attributes: list[tuple[ObjectIdentifier, bytes, int | None]] = [],
  201. ):
  202. """
  203. Creates an empty X.509 certificate request (v1).
  204. """
  205. self._subject_name = subject_name
  206. self._extensions = extensions
  207. self._attributes = attributes
  208. def subject_name(self, name: Name) -> CertificateSigningRequestBuilder:
  209. """
  210. Sets the certificate requestor's distinguished name.
  211. """
  212. if not isinstance(name, Name):
  213. raise TypeError("Expecting x509.Name object.")
  214. if self._subject_name is not None:
  215. raise ValueError("The subject name may only be set once.")
  216. return CertificateSigningRequestBuilder(
  217. name, self._extensions, self._attributes
  218. )
  219. def add_extension(
  220. self, extval: ExtensionType, critical: bool
  221. ) -> CertificateSigningRequestBuilder:
  222. """
  223. Adds an X.509 extension to the certificate request.
  224. """
  225. if not isinstance(extval, ExtensionType):
  226. raise TypeError("extension must be an ExtensionType")
  227. extension = Extension(extval.oid, critical, extval)
  228. _reject_duplicate_extension(extension, self._extensions)
  229. return CertificateSigningRequestBuilder(
  230. self._subject_name,
  231. [*self._extensions, extension],
  232. self._attributes,
  233. )
  234. def add_attribute(
  235. self,
  236. oid: ObjectIdentifier,
  237. value: bytes,
  238. *,
  239. _tag: _ASN1Type | None = None,
  240. ) -> CertificateSigningRequestBuilder:
  241. """
  242. Adds an X.509 attribute with an OID and associated value.
  243. """
  244. if not isinstance(oid, ObjectIdentifier):
  245. raise TypeError("oid must be an ObjectIdentifier")
  246. if not isinstance(value, bytes):
  247. raise TypeError("value must be bytes")
  248. if _tag is not None and not isinstance(_tag, _ASN1Type):
  249. raise TypeError("tag must be _ASN1Type")
  250. _reject_duplicate_attribute(oid, self._attributes)
  251. if _tag is not None:
  252. tag = _tag.value
  253. else:
  254. tag = None
  255. return CertificateSigningRequestBuilder(
  256. self._subject_name,
  257. self._extensions,
  258. [*self._attributes, (oid, value, tag)],
  259. )
  260. def sign(
  261. self,
  262. private_key: CertificateIssuerPrivateKeyTypes,
  263. algorithm: _AllowedHashTypes | None,
  264. backend: typing.Any = None,
  265. *,
  266. rsa_padding: padding.PSS | padding.PKCS1v15 | None = None,
  267. ecdsa_deterministic: bool | None = None,
  268. ) -> CertificateSigningRequest:
  269. """
  270. Signs the request using the requestor's private key.
  271. """
  272. if self._subject_name is None:
  273. raise ValueError("A CertificateSigningRequest must have a subject")
  274. if rsa_padding is not None:
  275. if not isinstance(rsa_padding, (padding.PSS, padding.PKCS1v15)):
  276. raise TypeError("Padding must be PSS or PKCS1v15")
  277. if not isinstance(private_key, rsa.RSAPrivateKey):
  278. raise TypeError("Padding is only supported for RSA keys")
  279. if ecdsa_deterministic is not None:
  280. if not isinstance(private_key, ec.EllipticCurvePrivateKey):
  281. raise TypeError(
  282. "Deterministic ECDSA is only supported for EC keys"
  283. )
  284. return rust_x509.create_x509_csr(
  285. self,
  286. private_key,
  287. algorithm,
  288. rsa_padding,
  289. ecdsa_deterministic,
  290. )
  291. class CertificateBuilder:
  292. _extensions: list[Extension[ExtensionType]]
  293. def __init__(
  294. self,
  295. issuer_name: Name | None = None,
  296. subject_name: Name | None = None,
  297. public_key: CertificatePublicKeyTypes | None = None,
  298. serial_number: int | None = None,
  299. not_valid_before: datetime.datetime | None = None,
  300. not_valid_after: datetime.datetime | None = None,
  301. extensions: list[Extension[ExtensionType]] = [],
  302. ) -> None:
  303. self._version = Version.v3
  304. self._issuer_name = issuer_name
  305. self._subject_name = subject_name
  306. self._public_key = public_key
  307. self._serial_number = serial_number
  308. self._not_valid_before = not_valid_before
  309. self._not_valid_after = not_valid_after
  310. self._extensions = extensions
  311. def issuer_name(self, name: Name) -> CertificateBuilder:
  312. """
  313. Sets the CA's distinguished name.
  314. """
  315. if not isinstance(name, Name):
  316. raise TypeError("Expecting x509.Name object.")
  317. if self._issuer_name is not None:
  318. raise ValueError("The issuer name may only be set once.")
  319. return CertificateBuilder(
  320. name,
  321. self._subject_name,
  322. self._public_key,
  323. self._serial_number,
  324. self._not_valid_before,
  325. self._not_valid_after,
  326. self._extensions,
  327. )
  328. def subject_name(self, name: Name) -> CertificateBuilder:
  329. """
  330. Sets the requestor's distinguished name.
  331. """
  332. if not isinstance(name, Name):
  333. raise TypeError("Expecting x509.Name object.")
  334. if self._subject_name is not None:
  335. raise ValueError("The subject name may only be set once.")
  336. return CertificateBuilder(
  337. self._issuer_name,
  338. name,
  339. self._public_key,
  340. self._serial_number,
  341. self._not_valid_before,
  342. self._not_valid_after,
  343. self._extensions,
  344. )
  345. def public_key(
  346. self,
  347. key: CertificatePublicKeyTypes,
  348. ) -> CertificateBuilder:
  349. """
  350. Sets the requestor's public key (as found in the signing request).
  351. """
  352. if not isinstance(
  353. key,
  354. (
  355. dsa.DSAPublicKey,
  356. rsa.RSAPublicKey,
  357. ec.EllipticCurvePublicKey,
  358. ed25519.Ed25519PublicKey,
  359. ed448.Ed448PublicKey,
  360. x25519.X25519PublicKey,
  361. x448.X448PublicKey,
  362. ),
  363. ):
  364. raise TypeError(
  365. "Expecting one of DSAPublicKey, RSAPublicKey,"
  366. " EllipticCurvePublicKey, Ed25519PublicKey,"
  367. " Ed448PublicKey, X25519PublicKey, or "
  368. "X448PublicKey."
  369. )
  370. if self._public_key is not None:
  371. raise ValueError("The public key may only be set once.")
  372. return CertificateBuilder(
  373. self._issuer_name,
  374. self._subject_name,
  375. key,
  376. self._serial_number,
  377. self._not_valid_before,
  378. self._not_valid_after,
  379. self._extensions,
  380. )
  381. def serial_number(self, number: int) -> CertificateBuilder:
  382. """
  383. Sets the certificate serial number.
  384. """
  385. if not isinstance(number, int):
  386. raise TypeError("Serial number must be of integral type.")
  387. if self._serial_number is not None:
  388. raise ValueError("The serial number may only be set once.")
  389. if number <= 0:
  390. raise ValueError("The serial number should be positive.")
  391. # ASN.1 integers are always signed, so most significant bit must be
  392. # zero.
  393. if number.bit_length() >= 160: # As defined in RFC 5280
  394. raise ValueError(
  395. "The serial number should not be more than 159 bits."
  396. )
  397. return CertificateBuilder(
  398. self._issuer_name,
  399. self._subject_name,
  400. self._public_key,
  401. number,
  402. self._not_valid_before,
  403. self._not_valid_after,
  404. self._extensions,
  405. )
  406. def not_valid_before(self, time: datetime.datetime) -> CertificateBuilder:
  407. """
  408. Sets the certificate activation time.
  409. """
  410. if not isinstance(time, datetime.datetime):
  411. raise TypeError("Expecting datetime object.")
  412. if self._not_valid_before is not None:
  413. raise ValueError("The not valid before may only be set once.")
  414. time = _convert_to_naive_utc_time(time)
  415. if time < _EARLIEST_UTC_TIME:
  416. raise ValueError(
  417. "The not valid before date must be on or after"
  418. " 1950 January 1)."
  419. )
  420. if self._not_valid_after is not None and time > self._not_valid_after:
  421. raise ValueError(
  422. "The not valid before date must be before the not valid after "
  423. "date."
  424. )
  425. return CertificateBuilder(
  426. self._issuer_name,
  427. self._subject_name,
  428. self._public_key,
  429. self._serial_number,
  430. time,
  431. self._not_valid_after,
  432. self._extensions,
  433. )
  434. def not_valid_after(self, time: datetime.datetime) -> CertificateBuilder:
  435. """
  436. Sets the certificate expiration time.
  437. """
  438. if not isinstance(time, datetime.datetime):
  439. raise TypeError("Expecting datetime object.")
  440. if self._not_valid_after is not None:
  441. raise ValueError("The not valid after may only be set once.")
  442. time = _convert_to_naive_utc_time(time)
  443. if time < _EARLIEST_UTC_TIME:
  444. raise ValueError(
  445. "The not valid after date must be on or after 1950 January 1."
  446. )
  447. if (
  448. self._not_valid_before is not None
  449. and time < self._not_valid_before
  450. ):
  451. raise ValueError(
  452. "The not valid after date must be after the not valid before "
  453. "date."
  454. )
  455. return CertificateBuilder(
  456. self._issuer_name,
  457. self._subject_name,
  458. self._public_key,
  459. self._serial_number,
  460. self._not_valid_before,
  461. time,
  462. self._extensions,
  463. )
  464. def add_extension(
  465. self, extval: ExtensionType, critical: bool
  466. ) -> CertificateBuilder:
  467. """
  468. Adds an X.509 extension to the certificate.
  469. """
  470. if not isinstance(extval, ExtensionType):
  471. raise TypeError("extension must be an ExtensionType")
  472. extension = Extension(extval.oid, critical, extval)
  473. _reject_duplicate_extension(extension, self._extensions)
  474. return CertificateBuilder(
  475. self._issuer_name,
  476. self._subject_name,
  477. self._public_key,
  478. self._serial_number,
  479. self._not_valid_before,
  480. self._not_valid_after,
  481. [*self._extensions, extension],
  482. )
  483. def sign(
  484. self,
  485. private_key: CertificateIssuerPrivateKeyTypes,
  486. algorithm: _AllowedHashTypes | None,
  487. backend: typing.Any = None,
  488. *,
  489. rsa_padding: padding.PSS | padding.PKCS1v15 | None = None,
  490. ecdsa_deterministic: bool | None = None,
  491. ) -> Certificate:
  492. """
  493. Signs the certificate using the CA's private key.
  494. """
  495. if self._subject_name is None:
  496. raise ValueError("A certificate must have a subject name")
  497. if self._issuer_name is None:
  498. raise ValueError("A certificate must have an issuer name")
  499. if self._serial_number is None:
  500. raise ValueError("A certificate must have a serial number")
  501. if self._not_valid_before is None:
  502. raise ValueError("A certificate must have a not valid before time")
  503. if self._not_valid_after is None:
  504. raise ValueError("A certificate must have a not valid after time")
  505. if self._public_key is None:
  506. raise ValueError("A certificate must have a public key")
  507. if rsa_padding is not None:
  508. if not isinstance(rsa_padding, (padding.PSS, padding.PKCS1v15)):
  509. raise TypeError("Padding must be PSS or PKCS1v15")
  510. if not isinstance(private_key, rsa.RSAPrivateKey):
  511. raise TypeError("Padding is only supported for RSA keys")
  512. if ecdsa_deterministic is not None:
  513. if not isinstance(private_key, ec.EllipticCurvePrivateKey):
  514. raise TypeError(
  515. "Deterministic ECDSA is only supported for EC keys"
  516. )
  517. return rust_x509.create_x509_certificate(
  518. self,
  519. private_key,
  520. algorithm,
  521. rsa_padding,
  522. ecdsa_deterministic,
  523. )
  524. class CertificateRevocationListBuilder:
  525. _extensions: list[Extension[ExtensionType]]
  526. _revoked_certificates: list[RevokedCertificate]
  527. def __init__(
  528. self,
  529. issuer_name: Name | None = None,
  530. last_update: datetime.datetime | None = None,
  531. next_update: datetime.datetime | None = None,
  532. extensions: list[Extension[ExtensionType]] = [],
  533. revoked_certificates: list[RevokedCertificate] = [],
  534. ):
  535. self._issuer_name = issuer_name
  536. self._last_update = last_update
  537. self._next_update = next_update
  538. self._extensions = extensions
  539. self._revoked_certificates = revoked_certificates
  540. def issuer_name(
  541. self, issuer_name: Name
  542. ) -> CertificateRevocationListBuilder:
  543. if not isinstance(issuer_name, Name):
  544. raise TypeError("Expecting x509.Name object.")
  545. if self._issuer_name is not None:
  546. raise ValueError("The issuer name may only be set once.")
  547. return CertificateRevocationListBuilder(
  548. issuer_name,
  549. self._last_update,
  550. self._next_update,
  551. self._extensions,
  552. self._revoked_certificates,
  553. )
  554. def last_update(
  555. self, last_update: datetime.datetime
  556. ) -> CertificateRevocationListBuilder:
  557. if not isinstance(last_update, datetime.datetime):
  558. raise TypeError("Expecting datetime object.")
  559. if self._last_update is not None:
  560. raise ValueError("Last update may only be set once.")
  561. last_update = _convert_to_naive_utc_time(last_update)
  562. if last_update < _EARLIEST_UTC_TIME:
  563. raise ValueError(
  564. "The last update date must be on or after 1950 January 1."
  565. )
  566. if self._next_update is not None and last_update > self._next_update:
  567. raise ValueError(
  568. "The last update date must be before the next update date."
  569. )
  570. return CertificateRevocationListBuilder(
  571. self._issuer_name,
  572. last_update,
  573. self._next_update,
  574. self._extensions,
  575. self._revoked_certificates,
  576. )
  577. def next_update(
  578. self, next_update: datetime.datetime
  579. ) -> CertificateRevocationListBuilder:
  580. if not isinstance(next_update, datetime.datetime):
  581. raise TypeError("Expecting datetime object.")
  582. if self._next_update is not None:
  583. raise ValueError("Last update may only be set once.")
  584. next_update = _convert_to_naive_utc_time(next_update)
  585. if next_update < _EARLIEST_UTC_TIME:
  586. raise ValueError(
  587. "The last update date must be on or after 1950 January 1."
  588. )
  589. if self._last_update is not None and next_update < self._last_update:
  590. raise ValueError(
  591. "The next update date must be after the last update date."
  592. )
  593. return CertificateRevocationListBuilder(
  594. self._issuer_name,
  595. self._last_update,
  596. next_update,
  597. self._extensions,
  598. self._revoked_certificates,
  599. )
  600. def add_extension(
  601. self, extval: ExtensionType, critical: bool
  602. ) -> CertificateRevocationListBuilder:
  603. """
  604. Adds an X.509 extension to the certificate revocation list.
  605. """
  606. if not isinstance(extval, ExtensionType):
  607. raise TypeError("extension must be an ExtensionType")
  608. extension = Extension(extval.oid, critical, extval)
  609. _reject_duplicate_extension(extension, self._extensions)
  610. return CertificateRevocationListBuilder(
  611. self._issuer_name,
  612. self._last_update,
  613. self._next_update,
  614. [*self._extensions, extension],
  615. self._revoked_certificates,
  616. )
  617. def add_revoked_certificate(
  618. self, revoked_certificate: RevokedCertificate
  619. ) -> CertificateRevocationListBuilder:
  620. """
  621. Adds a revoked certificate to the CRL.
  622. """
  623. if not isinstance(revoked_certificate, RevokedCertificate):
  624. raise TypeError("Must be an instance of RevokedCertificate")
  625. return CertificateRevocationListBuilder(
  626. self._issuer_name,
  627. self._last_update,
  628. self._next_update,
  629. self._extensions,
  630. [*self._revoked_certificates, revoked_certificate],
  631. )
  632. def sign(
  633. self,
  634. private_key: CertificateIssuerPrivateKeyTypes,
  635. algorithm: _AllowedHashTypes | None,
  636. backend: typing.Any = None,
  637. *,
  638. rsa_padding: padding.PSS | padding.PKCS1v15 | None = None,
  639. ecdsa_deterministic: bool | None = None,
  640. ) -> CertificateRevocationList:
  641. if self._issuer_name is None:
  642. raise ValueError("A CRL must have an issuer name")
  643. if self._last_update is None:
  644. raise ValueError("A CRL must have a last update time")
  645. if self._next_update is None:
  646. raise ValueError("A CRL must have a next update time")
  647. if rsa_padding is not None:
  648. if not isinstance(rsa_padding, (padding.PSS, padding.PKCS1v15)):
  649. raise TypeError("Padding must be PSS or PKCS1v15")
  650. if not isinstance(private_key, rsa.RSAPrivateKey):
  651. raise TypeError("Padding is only supported for RSA keys")
  652. if ecdsa_deterministic is not None:
  653. if not isinstance(private_key, ec.EllipticCurvePrivateKey):
  654. raise TypeError(
  655. "Deterministic ECDSA is only supported for EC keys"
  656. )
  657. return rust_x509.create_x509_crl(
  658. self,
  659. private_key,
  660. algorithm,
  661. rsa_padding,
  662. ecdsa_deterministic,
  663. )
  664. class RevokedCertificateBuilder:
  665. def __init__(
  666. self,
  667. serial_number: int | None = None,
  668. revocation_date: datetime.datetime | None = None,
  669. extensions: list[Extension[ExtensionType]] = [],
  670. ):
  671. self._serial_number = serial_number
  672. self._revocation_date = revocation_date
  673. self._extensions = extensions
  674. def serial_number(self, number: int) -> RevokedCertificateBuilder:
  675. if not isinstance(number, int):
  676. raise TypeError("Serial number must be of integral type.")
  677. if self._serial_number is not None:
  678. raise ValueError("The serial number may only be set once.")
  679. if number <= 0:
  680. raise ValueError("The serial number should be positive")
  681. # ASN.1 integers are always signed, so most significant bit must be
  682. # zero.
  683. if number.bit_length() >= 160: # As defined in RFC 5280
  684. raise ValueError(
  685. "The serial number should not be more than 159 bits."
  686. )
  687. return RevokedCertificateBuilder(
  688. number, self._revocation_date, self._extensions
  689. )
  690. def revocation_date(
  691. self, time: datetime.datetime
  692. ) -> RevokedCertificateBuilder:
  693. if not isinstance(time, datetime.datetime):
  694. raise TypeError("Expecting datetime object.")
  695. if self._revocation_date is not None:
  696. raise ValueError("The revocation date may only be set once.")
  697. time = _convert_to_naive_utc_time(time)
  698. if time < _EARLIEST_UTC_TIME:
  699. raise ValueError(
  700. "The revocation date must be on or after 1950 January 1."
  701. )
  702. return RevokedCertificateBuilder(
  703. self._serial_number, time, self._extensions
  704. )
  705. def add_extension(
  706. self, extval: ExtensionType, critical: bool
  707. ) -> RevokedCertificateBuilder:
  708. if not isinstance(extval, ExtensionType):
  709. raise TypeError("extension must be an ExtensionType")
  710. extension = Extension(extval.oid, critical, extval)
  711. _reject_duplicate_extension(extension, self._extensions)
  712. return RevokedCertificateBuilder(
  713. self._serial_number,
  714. self._revocation_date,
  715. [*self._extensions, extension],
  716. )
  717. def build(self, backend: typing.Any = None) -> RevokedCertificate:
  718. if self._serial_number is None:
  719. raise ValueError("A revoked certificate must have a serial number")
  720. if self._revocation_date is None:
  721. raise ValueError(
  722. "A revoked certificate must have a revocation date"
  723. )
  724. return _RawRevokedCertificate(
  725. self._serial_number,
  726. self._revocation_date,
  727. Extensions(self._extensions),
  728. )
  729. def random_serial_number() -> int:
  730. return int.from_bytes(os.urandom(20), "big") >> 1