|
1
|
1 |
|
import os |
|
2
|
1 |
|
import zipfile |
|
3
|
1 |
|
from collections.abc import Iterable |
|
4
|
1 |
|
from datetime import datetime |
|
5
|
|
|
|
|
6
|
1 |
|
from cryptography import x509 |
|
7
|
1 |
|
from cryptography.exceptions import InvalidSignature |
|
8
|
1 |
|
from cryptography.hazmat.primitives.asymmetric import padding |
|
9
|
1 |
|
from pytz import utc |
|
10
|
|
|
|
|
11
|
1 |
|
current_dir = os.path.dirname(__file__) |
|
12
|
|
|
|
|
13
|
|
|
|
|
14
|
1 |
|
class CertificateStore: |
|
15
|
1 |
|
def __init__(self, trusted_certificates: Iterable): |
|
16
|
1 |
|
self._trusted_certificates = { |
|
17
|
|
|
cert.subject.public_bytes(): cert for cert in trusted_certificates |
|
18
|
|
|
} |
|
19
|
|
|
|
|
20
|
1 |
|
def issuer_certificate(self, cert): |
|
21
|
1 |
|
return self._trusted_certificates[cert.issuer.public_bytes()] |
|
22
|
|
|
|
|
23
|
1 |
|
def verify_certificate(self, issued_cert, at: datetime): |
|
24
|
|
|
"""Verifies issued_cert. |
|
25
|
|
|
|
|
26
|
|
|
Args: |
|
27
|
|
|
issued_cert: The issued certificate. |
|
28
|
|
|
|
|
29
|
|
|
Returns: |
|
30
|
|
|
True if certificate was issued by a trusted certificate |
|
31
|
|
|
:param issued_cert: issued certificate to validate |
|
32
|
|
|
:param at: date at witch to do the validation |
|
33
|
|
|
""" |
|
34
|
1 |
|
if at.tzinfo: |
|
35
|
1 |
|
at = at.astimezone(tz=utc).replace(tzinfo=None) |
|
36
|
|
|
|
|
37
|
1 |
|
def validate_date(cert): |
|
38
|
1 |
|
if not cert.not_valid_before <= at <= cert.not_valid_after: |
|
39
|
|
|
raise ValueError("Date Not Valid") |
|
40
|
|
|
|
|
41
|
1 |
|
try: |
|
42
|
1 |
|
validate_date(issued_cert) |
|
43
|
1 |
|
signing_cert = self.issuer_certificate(issued_cert) |
|
44
|
1 |
|
validate_date(signing_cert) |
|
45
|
|
|
|
|
46
|
1 |
|
signing_cert.public_key().verify( |
|
47
|
|
|
signature=issued_cert.signature, |
|
48
|
|
|
data=issued_cert.tbs_certificate_bytes, |
|
49
|
|
|
padding=padding.PKCS1v15(), |
|
50
|
|
|
algorithm=issued_cert.signature_hash_algorithm |
|
51
|
|
|
) |
|
52
|
|
|
|
|
53
|
|
|
# Assume the parent certificates have been already validated, only checking dates |
|
54
|
1 |
|
while True: |
|
55
|
1 |
|
parent_cert = self.issuer_certificate(signing_cert) |
|
56
|
1 |
|
if parent_cert == signing_cert: |
|
57
|
1 |
|
return True |
|
58
|
1 |
|
validate_date(parent_cert) |
|
59
|
1 |
|
signing_cert = parent_cert |
|
60
|
|
|
|
|
61
|
|
|
except (IndexError, InvalidSignature, ValueError) as ex: |
|
62
|
|
|
return False |
|
63
|
|
|
|
|
64
|
1 |
|
@classmethod |
|
65
|
1 |
|
def create(cls, certs_zip): |
|
66
|
|
|
""" |
|
67
|
|
|
Creates a Certificate Store from the certificates in a zip file |
|
68
|
|
|
:param certs_zip: |
|
69
|
|
|
:return: CertificateStore |
|
70
|
|
|
""" |
|
71
|
1 |
|
with zipfile.ZipFile(certs_zip, "r") as zf: |
|
72
|
1 |
|
return cls( |
|
73
|
|
|
trusted_certificates= |
|
74
|
|
|
(x509.load_der_x509_certificate(zf.read(fileinfo)) for fileinfo in zf.infolist()) |
|
|
|
|
|
|
75
|
|
|
) |
|
76
|
|
|
|