aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorPaul Kehrer <paul.l.kehrer@gmail.com>2015-08-06 11:47:32 +0100
committerPaul Kehrer <paul.l.kehrer@gmail.com>2015-08-06 12:01:09 +0100
commit822f3d358a5a1ee922be33df9afc4266c804fd79 (patch)
tree7d9b09035c55ecf1f2284513ee267a434c0381d4
parentcaace6089919ba1392488be6c43d43ce6ca35cb0 (diff)
downloadcryptography-822f3d358a5a1ee922be33df9afc4266c804fd79.tar.gz
cryptography-822f3d358a5a1ee922be33df9afc4266c804fd79.tar.bz2
cryptography-822f3d358a5a1ee922be33df9afc4266c804fd79.zip
add oid attribute to all extension types
-rw-r--r--docs/x509/reference.rst105
-rw-r--r--src/cryptography/x509.py26
2 files changed, 130 insertions, 1 deletions
diff --git a/docs/x509/reference.rst b/docs/x509/reference.rst
index 61971fed..29b82680 100644
--- a/docs/x509/reference.rst
+++ b/docs/x509/reference.rst
@@ -918,6 +918,14 @@ X.509 Extensions
be used for more than one operation is to be restricted. It corresponds to
:data:`OID_KEY_USAGE`.
+ .. attribute:: oid
+
+ .. versionadded:: 1.0
+
+ :type: :class:`ObjectIdentifier`
+
+ The OID associated with this extension type.
+
.. attribute:: digital_signature
:type: bool
@@ -1010,6 +1018,14 @@ X.509 Extensions
length restrictions may exist. It corresponds to
:data:`OID_BASIC_CONSTRAINTS`.
+ .. attribute:: oid
+
+ .. versionadded:: 1.0
+
+ :type: :class:`ObjectIdentifier`
+
+ The OID associated with this extension type.
+
.. attribute:: ca
:type: bool
@@ -1038,6 +1054,15 @@ X.509 Extensions
purposes indicated in the key usage extension. The object is
iterable to obtain the list of :ref:`extended key usage OIDs <eku_oids>`.
+ .. attribute:: oid
+
+ .. versionadded:: 1.0
+
+ :type: :class:`ObjectIdentifier`
+
+ The OID associated with this extension type.
+
+
.. class:: OCSPNoCheck
.. versionadded:: 1.0
@@ -1051,6 +1076,14 @@ X.509 Extensions
extension is only relevant when the certificate is an authorized OCSP
responder.
+ .. attribute:: oid
+
+ .. versionadded:: 1.0
+
+ :type: :class:`ObjectIdentifier`
+
+ The OID associated with this extension type.
+
.. class:: NameConstraints
.. versionadded:: 1.0
@@ -1060,6 +1093,14 @@ X.509 Extensions
beneath the CA certificate must (or must not) be in. For specific details
on the way this extension should be processed see :rfc:`5280`.
+ .. attribute:: oid
+
+ .. versionadded:: 1.0
+
+ :type: :class:`ObjectIdentifier`
+
+ The OID associated with this extension type.
+
.. attribute:: permitted_subtrees
:type: list of :class:`GeneralName` objects or None
@@ -1087,6 +1128,14 @@ X.509 Extensions
certificate chain. For more information about generation and use of this
extension see `RFC 5280 section 4.2.1.1`_.
+ .. attribute:: oid
+
+ .. versionadded:: 1.0
+
+ :type: :class:`ObjectIdentifier`
+
+ The OID associated with this extension type.
+
.. attribute:: key_identifier
:type: bytes
@@ -1113,6 +1162,14 @@ X.509 Extensions
The subject key identifier extension provides a means of identifying
certificates that contain a particular public key.
+ .. attribute:: oid
+
+ .. versionadded:: 1.0
+
+ :type: :class:`ObjectIdentifier`
+
+ The OID associated with this extension type.
+
.. attribute:: digest
:type: bytes
@@ -1128,6 +1185,14 @@ X.509 Extensions
of identities for which the certificate is valid. The object is iterable to
get every element.
+ .. attribute:: oid
+
+ .. versionadded:: 1.0
+
+ :type: :class:`ObjectIdentifier`
+
+ The OID associated with this extension type.
+
.. method:: get_values_for_type(type)
:param type: A :class:`GeneralName` provider. This is one of the
@@ -1158,6 +1223,14 @@ X.509 Extensions
of identities for the certificate issuer. The object is iterable to
get every element.
+ .. attribute:: oid
+
+ .. versionadded:: 1.0
+
+ :type: :class:`ObjectIdentifier`
+
+ The OID associated with this extension type.
+
.. method:: get_values_for_type(type)
:param type: A :class:`GeneralName` provider. This is one of the
@@ -1176,6 +1249,14 @@ X.509 Extensions
validation services (such as OCSP) and issuer data. It is an iterable,
containing one or more :class:`AccessDescription` instances.
+ .. attribute:: oid
+
+ .. versionadded:: 1.0
+
+ :type: :class:`ObjectIdentifier`
+
+ The OID associated with this extension type.
+
.. class:: AccessDescription
@@ -1206,6 +1287,14 @@ X.509 Extensions
obtained. It is an iterable, containing one or more
:class:`DistributionPoint` instances.
+ .. attribute:: oid
+
+ .. versionadded:: 1.0
+
+ :type: :class:`ObjectIdentifier`
+
+ The OID associated with this extension type.
+
.. class:: DistributionPoint
.. versionadded:: 0.9
@@ -1304,6 +1393,14 @@ X.509 Extensions
certificates issued by the subject of this certificate, but not in
additional certificates in the path.
+ .. attribute:: oid
+
+ .. versionadded:: 1.0
+
+ :type: :class:`ObjectIdentifier`
+
+ The OID associated with this extension type.
+
.. attribute:: skip_certs
:type: int
@@ -1315,6 +1412,14 @@ X.509 Extensions
The certificate policies extension is an iterable, containing one or more
:class:`PolicyInformation` instances.
+ .. attribute:: oid
+
+ .. versionadded:: 1.0
+
+ :type: :class:`ObjectIdentifier`
+
+ The OID associated with this extension type.
+
Certificate Policies Classes
~~~~~~~~~~~~~~~~~~~~~~~~~~~~
diff --git a/src/cryptography/x509.py b/src/cryptography/x509.py
index 0ddff728..c8380b1a 100644
--- a/src/cryptography/x509.py
+++ b/src/cryptography/x509.py
@@ -314,6 +314,8 @@ class Extension(object):
class ExtendedKeyUsage(object):
+ oid = OID_EXTENDED_KEY_USAGE
+
def __init__(self, usages):
if not all(isinstance(x, ObjectIdentifier) for x in usages):
raise TypeError(
@@ -342,10 +344,12 @@ class ExtendedKeyUsage(object):
class OCSPNoCheck(object):
- pass
+ oid = OID_OCSP_NO_CHECK
class BasicConstraints(object):
+ oid = OID_BASIC_CONSTRAINTS
+
def __init__(self, ca, path_length):
if not isinstance(ca, bool):
raise TypeError("ca must be a boolean value")
@@ -382,6 +386,8 @@ class BasicConstraints(object):
class KeyUsage(object):
+ oid = OID_KEY_USAGE
+
def __init__(self, digital_signature, content_commitment, key_encipherment,
data_encipherment, key_agreement, key_cert_sign, crl_sign,
encipher_only, decipher_only):
@@ -465,6 +471,8 @@ class KeyUsage(object):
class AuthorityInformationAccess(object):
+ oid = OID_AUTHORITY_INFORMATION_ACCESS
+
def __init__(self, descriptions):
if not all(isinstance(x, AccessDescription) for x in descriptions):
raise TypeError(
@@ -529,6 +537,8 @@ class AccessDescription(object):
class CertificatePolicies(object):
+ oid = OID_CERTIFICATE_POLICIES
+
def __init__(self, policies):
if not all(isinstance(x, PolicyInformation) for x in policies):
raise TypeError(
@@ -666,6 +676,8 @@ class NoticeReference(object):
class SubjectKeyIdentifier(object):
+ oid = OID_SUBJECT_KEY_IDENTIFIER
+
def __init__(self, digest):
self._digest = digest
@@ -687,6 +699,8 @@ class SubjectKeyIdentifier(object):
class NameConstraints(object):
+ oid = OID_NAME_CONSTRAINTS
+
def __init__(self, permitted_subtrees, excluded_subtrees):
if permitted_subtrees is not None:
if not all(
@@ -751,6 +765,8 @@ class NameConstraints(object):
class CRLDistributionPoints(object):
+ oid = OID_CRL_DISTRIBUTION_POINTS
+
def __init__(self, distribution_points):
if not all(
isinstance(x, DistributionPoint) for x in distribution_points
@@ -871,6 +887,8 @@ class ReasonFlags(Enum):
class InhibitAnyPolicy(object):
+ oid = OID_INHIBIT_ANY_POLICY
+
def __init__(self, skip_certs):
if not isinstance(skip_certs, six.integer_types):
raise TypeError("skip_certs must be an integer")
@@ -1161,6 +1179,8 @@ class GeneralNames(object):
class SubjectAlternativeName(object):
+ oid = OID_SUBJECT_ALTERNATIVE_NAME
+
def __init__(self, general_names):
self._general_names = GeneralNames(general_names)
@@ -1187,6 +1207,8 @@ class SubjectAlternativeName(object):
class IssuerAlternativeName(object):
+ oid = OID_ISSUER_ALTERNATIVE_NAME
+
def __init__(self, general_names):
self._general_names = GeneralNames(general_names)
@@ -1213,6 +1235,8 @@ class IssuerAlternativeName(object):
class AuthorityKeyIdentifier(object):
+ oid = OID_AUTHORITY_KEY_IDENTIFIER
+
def __init__(self, key_identifier, authority_cert_issuer,
authority_cert_serial_number):
if authority_cert_issuer or authority_cert_serial_number: