summaryrefslogtreecommitdiff
path: root/python/vyos
diff options
context:
space:
mode:
authorChristian Poessinger <christian@poessinger.com>2021-07-04 22:00:37 +0200
committerGitHub <noreply@github.com>2021-07-04 22:00:37 +0200
commit562ead14a6dd1eb9190b9a9f38981423937bfc94 (patch)
treee8e13e28dc94744747f563f51cdd3ab9e711b359 /python/vyos
parent70efa3dd54bc88a73f21a8c7d2e1eecb65f0508c (diff)
parentb123b46f2e2a674cef3fffb4fc56082f2b1136d6 (diff)
downloadvyos-1x-562ead14a6dd1eb9190b9a9f38981423937bfc94.tar.gz
vyos-1x-562ead14a6dd1eb9190b9a9f38981423937bfc94.zip
Merge pull request #910 from sarthurdev/pki_ext
pki: T3642: Add standard extensions to generated certificates
Diffstat (limited to 'python/vyos')
-rw-r--r--python/vyos/pki.py17
1 files changed, 14 insertions, 3 deletions
diff --git a/python/vyos/pki.py b/python/vyos/pki.py
index 80efe26b2..a575ac16a 100644
--- a/python/vyos/pki.py
+++ b/python/vyos/pki.py
@@ -124,7 +124,14 @@ def create_certificate_request(subject, private_key):
.subject_name(subject_obj) \
.sign(private_key, hashes.SHA256())
-def create_certificate(cert_req, ca_cert, ca_private_key, valid_days=365, cert_type='server', is_ca=False):
+def add_key_identifier(ca_cert):
+ try:
+ ski_ext = ca_cert.extensions.get_extension_for_class(x509.SubjectKeyIdentifier)
+ return x509.AuthorityKeyIdentifier.from_issuer_subject_key_identifier(ski_ext.value)
+ except:
+ return x509.AuthorityKeyIdentifier.from_issuer_public_key(ca_cert.public_key())
+
+def create_certificate(cert_req, ca_cert, ca_private_key, valid_days=365, cert_type='server', is_ca=False, is_sub_ca=False):
ext_key_usage = []
if is_ca:
ext_key_usage = [ExtendedKeyUsageOID.CLIENT_AUTH, ExtendedKeyUsageOID.SERVER_AUTH]
@@ -141,8 +148,7 @@ def create_certificate(cert_req, ca_cert, ca_private_key, valid_days=365, cert_t
.not_valid_before(datetime.datetime.utcnow()) \
.not_valid_after(datetime.datetime.utcnow() + datetime.timedelta(days=int(valid_days)))
- builder = builder.add_extension(x509.BasicConstraints(ca=is_ca, path_length=None), critical=True)
- builder = builder.add_extension(x509.ExtendedKeyUsage(ext_key_usage), critical=True)
+ builder = builder.add_extension(x509.BasicConstraints(ca=is_ca, path_length=0 if is_sub_ca else None), critical=True)
builder = builder.add_extension(x509.KeyUsage(
digital_signature=True,
content_commitment=False,
@@ -153,6 +159,11 @@ def create_certificate(cert_req, ca_cert, ca_private_key, valid_days=365, cert_t
crl_sign=is_ca,
encipher_only=False,
decipher_only=False), critical=True)
+ builder = builder.add_extension(x509.ExtendedKeyUsage(ext_key_usage), critical=False)
+ builder = builder.add_extension(x509.SubjectKeyIdentifier.from_public_key(cert_req.public_key()), critical=False)
+
+ if not is_ca or is_sub_ca:
+ builder = builder.add_extension(add_key_identifier(ca_cert), critical=False)
for ext in cert_req.extensions:
builder = builder.add_extension(ext, critical=False)