File: trust_list.md

package info (click to toggle)
oscrypto 1.3.0-7
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid, trixie
  • size: 2,164 kB
  • sloc: python: 22,115; makefile: 7
file content (100 lines) | stat: -rw-r--r-- 4,754 bytes parent folder | download | duplicates (2)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
# oscrypto.trust_list API Documentation

The *oscrypto.trust_list* submodule implements functions to extract CA
certificates/trust roots from the operating system trust store. The following
functions comprise the public API:

 - [`get_list()`](#get_list-function)
 - [`get_path()`](#get_path-function)

### `get_list()` function

> ```python
> def get_list(cache_length=24, map_vendor_oids=True, cert_callback=None):
>     """
>     :param cache_length:
>         The number of hours to cache the CA certs in memory before they are
>         refreshed
>
>     :param map_vendor_oids:
>         A bool indicating if the following mapping of OIDs should happen for
>         trust information from the OS trust list:
>          - 1.2.840.113635.100.1.3 (apple_ssl) -> 1.3.6.1.5.5.7.3.1 (server_auth)
>          - 1.2.840.113635.100.1.3 (apple_ssl) -> 1.3.6.1.5.5.7.3.2 (client_auth)
>          - 1.2.840.113635.100.1.8 (apple_smime) -> 1.3.6.1.5.5.7.3.4 (email_protection)
>          - 1.2.840.113635.100.1.9 (apple_eap) -> 1.3.6.1.5.5.7.3.13 (eap_over_ppp)
>          - 1.2.840.113635.100.1.9 (apple_eap) -> 1.3.6.1.5.5.7.3.14 (eap_over_lan)
>          - 1.2.840.113635.100.1.11 (apple_ipsec) -> 1.3.6.1.5.5.7.3.5 (ipsec_end_system)
>          - 1.2.840.113635.100.1.11 (apple_ipsec) -> 1.3.6.1.5.5.7.3.6 (ipsec_tunnel)
>          - 1.2.840.113635.100.1.11 (apple_ipsec) -> 1.3.6.1.5.5.7.3.7 (ipsec_user)
>          - 1.2.840.113635.100.1.11 (apple_ipsec) -> 1.3.6.1.5.5.7.3.17 (ipsec_ike)
>          - 1.2.840.113635.100.1.16 (apple_code_signing) -> 1.3.6.1.5.5.7.3.3 (code_signing)
>          - 1.2.840.113635.100.1.20 (apple_time_stamping) -> 1.3.6.1.5.5.7.3.8 (time_stamping)
>          - 1.3.6.1.4.1.311.10.3.2 (microsoft_time_stamp_signing) -> 1.3.6.1.5.5.7.3.8 (time_stamping)
>
>     :param cert_callback:
>         A callback that is called once for each certificate in the trust store.
>         It should accept two parameters: an asn1crypto.x509.Certificate object,
>         and a reason. The reason will be None if the certificate is being
>         exported, otherwise it will be a unicode string of the reason it won't.
>
>     :raises:
>         oscrypto.errors.CACertsError - when an error occurs exporting/locating certs
>
>     :return:
>         A (copied) list of 3-element tuples containing CA certs from the OS
>         trust ilst:
>          - 0: an asn1crypto.x509.Certificate object
>          - 1: a set of unicode strings of OIDs of trusted purposes
>          - 2: a set of unicode strings of OIDs of rejected purposes
>     """
> ```
>
> Retrieves (and caches in memory) the list of CA certs from the OS. Includes
> trust information from the OS - purposes the certificate should be trusted
> or rejected for.
>
> Trust information is encoded via object identifiers (OIDs) that are sourced
> from various RFCs and vendors (Apple and Microsoft). This trust information
> augments what is in the certificate itself. Any OID that is in the set of
> trusted purposes indicates the certificate has been explicitly trusted for
> a purpose beyond the extended key purpose extension. Any OID in the reject
> set is a purpose that the certificate should not be trusted for, even if
> present in the extended key purpose extension.
>
> *A list of common trust OIDs can be found as part of the `KeyPurposeId()`
> class in the `asn1crypto.x509` module of the `asn1crypto` package.*

### `get_path()` function

> ```python
> def get_path(temp_dir=None, cache_length=24, cert_callback=None):
>     """
>     :param temp_dir:
>         The temporary directory to cache the CA certs in on OS X and Windows.
>         Needs to have secure permissions so other users can not modify the
>         contents.
>
>     :param cache_length:
>         The number of hours to cache the CA certs on OS X and Windows
>
>     :param cert_callback:
>         A callback that is called once for each certificate in the trust store.
>         It should accept two parameters: an asn1crypto.x509.Certificate object,
>         and a reason. The reason will be None if the certificate is being
>         exported, otherwise it will be a unicode string of the reason it won't.
>         This is only called on Windows and OS X when passed to this function.
>
>     :raises:
>         oscrypto.errors.CACertsError - when an error occurs exporting/locating certs
>
>     :return:
>         The full filesystem path to a CA certs file
>     """
> ```
>
> Get the filesystem path to a file that contains OpenSSL-compatible CA certs.
>
> On OS X and Windows, there are extracted from the system certificate store
> and cached in a file on the filesystem. This path should not be writable
> by other users, otherwise they could inject CA certs into the trust list.