diff options
author | Alex Gaynor <alex.gaynor@gmail.com> | 2015-12-21 11:35:51 -0500 |
---|---|---|
committer | Alex Gaynor <alex.gaynor@gmail.com> | 2015-12-21 11:35:51 -0500 |
commit | a04e032be907759af8d5b838fc94d581c49b484a (patch) | |
tree | 8410ea4591acccad1ce1f810c13c350279ea82d1 | |
parent | 394cca58a7dbd7e34d111f8c78a8f2dabda3a4b3 (diff) | |
parent | 2c91858de5fca63ee56b342d44fee73ed220d547 (diff) | |
download | cryptography-a04e032be907759af8d5b838fc94d581c49b484a.tar.gz cryptography-a04e032be907759af8d5b838fc94d581c49b484a.tar.bz2 cryptography-a04e032be907759af8d5b838fc94d581c49b484a.zip |
Merge pull request #2541 from reaperhulk/crl-serialization
add a CRL public_bytes method
-rw-r--r-- | CHANGELOG.rst | 3 | ||||
-rw-r--r-- | docs/x509/reference.rst | 12 | ||||
-rw-r--r-- | src/cryptography/hazmat/backends/openssl/x509.py | 14 | ||||
-rw-r--r-- | src/cryptography/x509/base.py | 5 | ||||
-rw-r--r-- | tests/test_x509.py | 66 |
5 files changed, 100 insertions, 0 deletions
diff --git a/CHANGELOG.rst b/CHANGELOG.rst index cb2934cf..71944611 100644 --- a/CHANGELOG.rst +++ b/CHANGELOG.rst @@ -16,6 +16,9 @@ Changelog * :class:`~cryptography.x509.NameConstraints` are now supported in the :class:`~cryptography.x509.CertificateBuilder` and :class:`~cryptography.x509.CertificateSigningRequestBuilder`. +* Support serialization of certificate revocation lists using the + :meth:`~cryptography.x509.CertificateRevocationList.public_bytes` method of + :class:`~cryptography.x509.CertificateRevocationList`. 1.1.2 - 2015-12-10 ~~~~~~~~~~~~~~~~~~ diff --git a/docs/x509/reference.rst b/docs/x509/reference.rst index 91c53444..d0606330 100644 --- a/docs/x509/reference.rst +++ b/docs/x509/reference.rst @@ -523,6 +523,18 @@ X.509 CRL (Certificate Revocation List) Object used to validate a signature, but use extreme caution as CRL validation is a complex problem that involves much more than just signature checks. + .. method:: public_bytes(encoding) + + .. versionadded:: 1.2 + + :param encoding: The + :class:`~cryptography.hazmat.primitives.serialization.Encoding` + that will be used to serialize the certificate revocation list. + + :return bytes: The data that can be written to a file or sent + over the network and used as part of a certificate verification + process. + X.509 Certificate Builder ~~~~~~~~~~~~~~~~~~~~~~~~~ diff --git a/src/cryptography/hazmat/backends/openssl/x509.py b/src/cryptography/hazmat/backends/openssl/x509.py index f50a0d5d..b7a88a4a 100644 --- a/src/cryptography/hazmat/backends/openssl/x509.py +++ b/src/cryptography/hazmat/backends/openssl/x509.py @@ -833,6 +833,20 @@ class _CertificateRevocationList(object): ) return self._backend._ffi.buffer(pp[0], res)[:] + def public_bytes(self, encoding): + bio = self._backend._create_mem_bio() + if encoding is serialization.Encoding.PEM: + res = self._backend._lib.PEM_write_bio_X509_CRL( + bio, self._x509_crl + ) + elif encoding is serialization.Encoding.DER: + res = self._backend._lib.i2d_X509_CRL_bio(bio, self._x509_crl) + else: + raise TypeError("encoding must be an item from the Encoding enum") + + self._backend.openssl_assert(res == 1) + return self._backend._read_mem_bio(bio) + def _revoked_certificates(self): revoked = self._backend._lib.X509_CRL_get_REVOKED(self._x509_crl) revoked_list = [] diff --git a/src/cryptography/x509/base.py b/src/cryptography/x509/base.py index 49761046..057d0e9b 100644 --- a/src/cryptography/x509/base.py +++ b/src/cryptography/x509/base.py @@ -156,6 +156,11 @@ class Certificate(object): @six.add_metaclass(abc.ABCMeta) class CertificateRevocationList(object): + @abc.abstractmethod + def public_bytes(self, encoding): + """ + Serializes the CRL to PEM or DER format. + """ @abc.abstractmethod def fingerprint(self, algorithm): diff --git a/tests/test_x509.py b/tests/test_x509.py index 511aac6b..27ce21e2 100644 --- a/tests/test_x509.py +++ b/tests/test_x509.py @@ -222,6 +222,72 @@ class TestCertificateRevocationList(object): verifier.update(crl.tbs_certlist_bytes) verifier.verify() + def test_public_bytes_pem(self, backend): + crl = _load_cert( + os.path.join("x509", "custom", "crl_empty.pem"), + x509.load_pem_x509_crl, + backend + ) + + # Encode it to PEM and load it back. + crl = x509.load_pem_x509_crl(crl.public_bytes( + encoding=serialization.Encoding.PEM, + ), backend) + + assert len(crl) == 0 + assert crl.last_update == datetime.datetime(2015, 12, 20, 23, 44, 47) + assert crl.next_update == datetime.datetime(2015, 12, 28, 0, 44, 47) + + def test_public_bytes_der(self, backend): + crl = _load_cert( + os.path.join("x509", "custom", "crl_all_reasons.pem"), + x509.load_pem_x509_crl, + backend + ) + + # Encode it to DER and load it back. + crl = x509.load_der_x509_crl(crl.public_bytes( + encoding=serialization.Encoding.DER, + ), backend) + + assert len(crl) == 12 + assert crl.last_update == datetime.datetime(2015, 1, 1, 0, 0, 0) + assert crl.next_update == datetime.datetime(2016, 1, 1, 0, 0, 0) + + @pytest.mark.parametrize( + ("cert_path", "loader_func", "encoding"), + [ + ( + os.path.join("x509", "custom", "crl_all_reasons.pem"), + x509.load_pem_x509_crl, + serialization.Encoding.PEM, + ), + ( + os.path.join("x509", "PKITS_data", "crls", "GoodCACRL.crl"), + x509.load_der_x509_crl, + serialization.Encoding.DER, + ), + ] + ) + def test_public_bytes_match(self, cert_path, loader_func, encoding, + backend): + crl_bytes = load_vectors_from_file( + cert_path, lambda pemfile: pemfile.read(), mode="rb" + ) + crl = loader_func(crl_bytes, backend) + serialized = crl.public_bytes(encoding) + assert serialized == crl_bytes + + def test_public_bytes_invalid_encoding(self, backend): + crl = _load_cert( + os.path.join("x509", "custom", "crl_empty.pem"), + x509.load_pem_x509_crl, + backend + ) + + with pytest.raises(TypeError): + crl.public_bytes('NotAnEncoding') + @pytest.mark.requires_backend_interface(interface=X509Backend) class TestRevokedCertificate(object): |