123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489 |
- # This file is dual licensed under the terms of the Apache License, Version
- # 2.0, and the BSD License. See the LICENSE file in the root of this repository
- # for complete details.
- import abc
- import datetime
- import typing
- from cryptography import utils
- from cryptography import x509
- from cryptography.hazmat.bindings._rust import ocsp
- from cryptography.hazmat.primitives import hashes, serialization
- from cryptography.x509.base import (
- PRIVATE_KEY_TYPES,
- _EARLIEST_UTC_TIME,
- _convert_to_naive_utc_time,
- _reject_duplicate_extension,
- )
- class OCSPResponderEncoding(utils.Enum):
- HASH = "By Hash"
- NAME = "By Name"
- class OCSPResponseStatus(utils.Enum):
- SUCCESSFUL = 0
- MALFORMED_REQUEST = 1
- INTERNAL_ERROR = 2
- TRY_LATER = 3
- SIG_REQUIRED = 5
- UNAUTHORIZED = 6
- _ALLOWED_HASHES = (
- hashes.SHA1,
- hashes.SHA224,
- hashes.SHA256,
- hashes.SHA384,
- hashes.SHA512,
- )
- def _verify_algorithm(algorithm):
- if not isinstance(algorithm, _ALLOWED_HASHES):
- raise ValueError(
- "Algorithm must be SHA1, SHA224, SHA256, SHA384, or SHA512"
- )
- class OCSPCertStatus(utils.Enum):
- GOOD = 0
- REVOKED = 1
- UNKNOWN = 2
- class _SingleResponse(object):
- def __init__(
- self,
- cert,
- issuer,
- algorithm,
- cert_status,
- this_update,
- next_update,
- revocation_time,
- revocation_reason,
- ):
- if not isinstance(cert, x509.Certificate) or not isinstance(
- issuer, x509.Certificate
- ):
- raise TypeError("cert and issuer must be a Certificate")
- _verify_algorithm(algorithm)
- if not isinstance(this_update, datetime.datetime):
- raise TypeError("this_update must be a datetime object")
- if next_update is not None and not isinstance(
- next_update, datetime.datetime
- ):
- raise TypeError("next_update must be a datetime object or None")
- self._cert = cert
- self._issuer = issuer
- self._algorithm = algorithm
- self._this_update = this_update
- self._next_update = next_update
- if not isinstance(cert_status, OCSPCertStatus):
- raise TypeError(
- "cert_status must be an item from the OCSPCertStatus enum"
- )
- if cert_status is not OCSPCertStatus.REVOKED:
- if revocation_time is not None:
- raise ValueError(
- "revocation_time can only be provided if the certificate "
- "is revoked"
- )
- if revocation_reason is not None:
- raise ValueError(
- "revocation_reason can only be provided if the certificate"
- " is revoked"
- )
- else:
- if not isinstance(revocation_time, datetime.datetime):
- raise TypeError("revocation_time must be a datetime object")
- revocation_time = _convert_to_naive_utc_time(revocation_time)
- if revocation_time < _EARLIEST_UTC_TIME:
- raise ValueError(
- "The revocation_time must be on or after"
- " 1950 January 1."
- )
- if revocation_reason is not None and not isinstance(
- revocation_reason, x509.ReasonFlags
- ):
- raise TypeError(
- "revocation_reason must be an item from the ReasonFlags "
- "enum or None"
- )
- self._cert_status = cert_status
- self._revocation_time = revocation_time
- self._revocation_reason = revocation_reason
- class OCSPRequest(metaclass=abc.ABCMeta):
- @abc.abstractproperty
- def issuer_key_hash(self) -> bytes:
- """
- The hash of the issuer public key
- """
- @abc.abstractproperty
- def issuer_name_hash(self) -> bytes:
- """
- The hash of the issuer name
- """
- @abc.abstractproperty
- def hash_algorithm(self) -> hashes.HashAlgorithm:
- """
- The hash algorithm used in the issuer name and key hashes
- """
- @abc.abstractproperty
- def serial_number(self) -> int:
- """
- The serial number of the cert whose status is being checked
- """
- @abc.abstractmethod
- def public_bytes(self, encoding: serialization.Encoding) -> bytes:
- """
- Serializes the request to DER
- """
- @abc.abstractproperty
- def extensions(self) -> x509.Extensions:
- """
- The list of request extensions. Not single request extensions.
- """
- class OCSPResponse(metaclass=abc.ABCMeta):
- @abc.abstractproperty
- def response_status(self) -> OCSPResponseStatus:
- """
- The status of the response. This is a value from the OCSPResponseStatus
- enumeration
- """
- @abc.abstractproperty
- def signature_algorithm_oid(self) -> x509.ObjectIdentifier:
- """
- The ObjectIdentifier of the signature algorithm
- """
- @abc.abstractproperty
- def signature_hash_algorithm(
- self,
- ) -> typing.Optional[hashes.HashAlgorithm]:
- """
- Returns a HashAlgorithm corresponding to the type of the digest signed
- """
- @abc.abstractproperty
- def signature(self) -> bytes:
- """
- The signature bytes
- """
- @abc.abstractproperty
- def tbs_response_bytes(self) -> bytes:
- """
- The tbsResponseData bytes
- """
- @abc.abstractproperty
- def certificates(self) -> typing.List[x509.Certificate]:
- """
- A list of certificates used to help build a chain to verify the OCSP
- response. This situation occurs when the OCSP responder uses a delegate
- certificate.
- """
- @abc.abstractproperty
- def responder_key_hash(self) -> typing.Optional[bytes]:
- """
- The responder's key hash or None
- """
- @abc.abstractproperty
- def responder_name(self) -> typing.Optional[x509.Name]:
- """
- The responder's Name or None
- """
- @abc.abstractproperty
- def produced_at(self) -> datetime.datetime:
- """
- The time the response was produced
- """
- @abc.abstractproperty
- def certificate_status(self) -> OCSPCertStatus:
- """
- The status of the certificate (an element from the OCSPCertStatus enum)
- """
- @abc.abstractproperty
- def revocation_time(self) -> typing.Optional[datetime.datetime]:
- """
- The date of when the certificate was revoked or None if not
- revoked.
- """
- @abc.abstractproperty
- def revocation_reason(self) -> typing.Optional[x509.ReasonFlags]:
- """
- The reason the certificate was revoked or None if not specified or
- not revoked.
- """
- @abc.abstractproperty
- def this_update(self) -> datetime.datetime:
- """
- The most recent time at which the status being indicated is known by
- the responder to have been correct
- """
- @abc.abstractproperty
- def next_update(self) -> typing.Optional[datetime.datetime]:
- """
- The time when newer information will be available
- """
- @abc.abstractproperty
- def issuer_key_hash(self) -> bytes:
- """
- The hash of the issuer public key
- """
- @abc.abstractproperty
- def issuer_name_hash(self) -> bytes:
- """
- The hash of the issuer name
- """
- @abc.abstractproperty
- def hash_algorithm(self) -> hashes.HashAlgorithm:
- """
- The hash algorithm used in the issuer name and key hashes
- """
- @abc.abstractproperty
- def serial_number(self) -> int:
- """
- The serial number of the cert whose status is being checked
- """
- @abc.abstractproperty
- def extensions(self) -> x509.Extensions:
- """
- The list of response extensions. Not single response extensions.
- """
- @abc.abstractproperty
- def single_extensions(self) -> x509.Extensions:
- """
- The list of single response extensions. Not response extensions.
- """
- @abc.abstractmethod
- def public_bytes(self, encoding: serialization.Encoding) -> bytes:
- """
- Serializes the response to DER
- """
- class OCSPRequestBuilder(object):
- def __init__(
- self,
- request: typing.Optional[
- typing.Tuple[
- x509.Certificate, x509.Certificate, hashes.HashAlgorithm
- ]
- ] = None,
- extensions: typing.List[x509.Extension[x509.ExtensionType]] = [],
- ) -> None:
- self._request = request
- self._extensions = extensions
- def add_certificate(
- self,
- cert: x509.Certificate,
- issuer: x509.Certificate,
- algorithm: hashes.HashAlgorithm,
- ) -> "OCSPRequestBuilder":
- if self._request is not None:
- raise ValueError("Only one certificate can be added to a request")
- _verify_algorithm(algorithm)
- if not isinstance(cert, x509.Certificate) or not isinstance(
- issuer, x509.Certificate
- ):
- raise TypeError("cert and issuer must be a Certificate")
- return OCSPRequestBuilder((cert, issuer, algorithm), self._extensions)
- def add_extension(
- self, extval: x509.ExtensionType, critical: bool
- ) -> "OCSPRequestBuilder":
- if not isinstance(extval, x509.ExtensionType):
- raise TypeError("extension must be an ExtensionType")
- extension = x509.Extension(extval.oid, critical, extval)
- _reject_duplicate_extension(extension, self._extensions)
- return OCSPRequestBuilder(
- self._request, self._extensions + [extension]
- )
- def build(self) -> OCSPRequest:
- from cryptography.hazmat.backends.openssl.backend import backend
- if self._request is None:
- raise ValueError("You must add a certificate before building")
- return backend.create_ocsp_request(self)
- class OCSPResponseBuilder(object):
- def __init__(
- self,
- response: typing.Optional[_SingleResponse] = None,
- responder_id: typing.Optional[
- typing.Tuple[x509.Certificate, OCSPResponderEncoding]
- ] = None,
- certs: typing.Optional[typing.List[x509.Certificate]] = None,
- extensions: typing.List[x509.Extension[x509.ExtensionType]] = [],
- ):
- self._response = response
- self._responder_id = responder_id
- self._certs = certs
- self._extensions = extensions
- def add_response(
- self,
- cert: x509.Certificate,
- issuer: x509.Certificate,
- algorithm: hashes.HashAlgorithm,
- cert_status: OCSPCertStatus,
- this_update: datetime.datetime,
- next_update: typing.Optional[datetime.datetime],
- revocation_time: typing.Optional[datetime.datetime],
- revocation_reason: typing.Optional[x509.ReasonFlags],
- ) -> "OCSPResponseBuilder":
- if self._response is not None:
- raise ValueError("Only one response per OCSPResponse.")
- singleresp = _SingleResponse(
- cert,
- issuer,
- algorithm,
- cert_status,
- this_update,
- next_update,
- revocation_time,
- revocation_reason,
- )
- return OCSPResponseBuilder(
- singleresp,
- self._responder_id,
- self._certs,
- self._extensions,
- )
- def responder_id(
- self, encoding: OCSPResponderEncoding, responder_cert: x509.Certificate
- ) -> "OCSPResponseBuilder":
- if self._responder_id is not None:
- raise ValueError("responder_id can only be set once")
- if not isinstance(responder_cert, x509.Certificate):
- raise TypeError("responder_cert must be a Certificate")
- if not isinstance(encoding, OCSPResponderEncoding):
- raise TypeError(
- "encoding must be an element from OCSPResponderEncoding"
- )
- return OCSPResponseBuilder(
- self._response,
- (responder_cert, encoding),
- self._certs,
- self._extensions,
- )
- def certificates(
- self, certs: typing.Iterable[x509.Certificate]
- ) -> "OCSPResponseBuilder":
- if self._certs is not None:
- raise ValueError("certificates may only be set once")
- certs = list(certs)
- if len(certs) == 0:
- raise ValueError("certs must not be an empty list")
- if not all(isinstance(x, x509.Certificate) for x in certs):
- raise TypeError("certs must be a list of Certificates")
- return OCSPResponseBuilder(
- self._response,
- self._responder_id,
- certs,
- self._extensions,
- )
- def add_extension(
- self, extval: x509.ExtensionType, critical: bool
- ) -> "OCSPResponseBuilder":
- if not isinstance(extval, x509.ExtensionType):
- raise TypeError("extension must be an ExtensionType")
- extension = x509.Extension(extval.oid, critical, extval)
- _reject_duplicate_extension(extension, self._extensions)
- return OCSPResponseBuilder(
- self._response,
- self._responder_id,
- self._certs,
- self._extensions + [extension],
- )
- def sign(
- self,
- private_key: PRIVATE_KEY_TYPES,
- algorithm: typing.Optional[hashes.HashAlgorithm],
- ) -> OCSPResponse:
- from cryptography.hazmat.backends.openssl.backend import backend
- if self._response is None:
- raise ValueError("You must add a response before signing")
- if self._responder_id is None:
- raise ValueError("You must add a responder_id before signing")
- return backend.create_ocsp_response(
- OCSPResponseStatus.SUCCESSFUL, self, private_key, algorithm
- )
- @classmethod
- def build_unsuccessful(
- cls, response_status: OCSPResponseStatus
- ) -> OCSPResponse:
- from cryptography.hazmat.backends.openssl.backend import backend
- if not isinstance(response_status, OCSPResponseStatus):
- raise TypeError(
- "response_status must be an item from OCSPResponseStatus"
- )
- if response_status is OCSPResponseStatus.SUCCESSFUL:
- raise ValueError("response_status cannot be SUCCESSFUL")
- return backend.create_ocsp_response(response_status, None, None, None)
- def load_der_ocsp_request(data: bytes) -> OCSPRequest:
- return ocsp.load_der_ocsp_request(data)
- def load_der_ocsp_response(data: bytes) -> OCSPResponse:
- return ocsp.load_der_ocsp_response(data)
|