Certificate signing functions.
Call set_subprocess() with the subprocess module. Either Python’s subprocess or eventlet.green.subprocess can be used.
If set_subprocess() is not called, this module will pick Python’s subprocess or eventlet.green.subprocess based on if os module is patched by eventlet.
keystoneclient.common.cms.
OpensslCmsExitStatus
¶Bases: object
COMMAND_OPTIONS_PARSING_ERROR
= 1¶CREATE_CMS_READ_MIME_ERROR
= 3¶INPUT_FILE_READ_ERROR
= 2¶SUCCESS
= 0¶keystoneclient.common.cms.
cms_hash_token
(token_id, mode='md5')¶Hash PKI tokens.
keystoneclient.common.cms.
cms_sign_data
(data_to_sign, signing_cert_file_name, signing_key_file_name, outform='PEM', message_digest='sha256')¶Use OpenSSL to sign a document.
Produces a Base64 encoding of a DER formatted CMS Document http://en.wikipedia.org/wiki/Cryptographic_Message_Syntax
Parameters: |
|
---|
keystoneclient.common.cms.
cms_sign_text
(data_to_sign, signing_cert_file_name, signing_key_file_name, message_digest='sha256')¶keystoneclient.common.cms.
cms_sign_token
(text, signing_cert_file_name, signing_key_file_name, message_digest='sha256')¶keystoneclient.common.cms.
cms_to_token
(cms_text)¶Convert a CMS-signed token in PEM format to a custom URL-safe format.
The conversion consists of replacing ‘/’ char in the PEM-formatted token with the ‘-‘ char and doing other such textual replacements to make the result marshallable via HTTP. The return value can thus be used as the value of a HTTP header such as “X-Auth-Token”.
This ad-hoc conversion is an unfortunate oversight since the returned value now does not conform to any of the standard variants of base64 encoding. It would have been better to use base64url encoding (either on the PEM formatted text or, perhaps even better, on the inner CMS-signed binary value without any PEM formatting). In any case, the same conversion is done in reverse in the other direction (for token verification), so there are no correctness issues here. Note that the non-standard encoding of the token will be preserved so as to not break backward compatibility.
The conversion issue is detailed by the code author in a blog post at http://adam.younglogic.com/2014/02/compressed-tokens/.
keystoneclient.common.cms.
cms_verify
(formatted, signing_cert_file_name, ca_file_name, inform='PEM')¶Verify the signature of the contents IAW CMS syntax.
Raises: |
|
---|
keystoneclient.common.cms.
is_ans1_token
(token)¶Deprecated.
This function is deprecated as of the 1.7.0 release in favor of
is_asn1_token()
and may be removed in the 2.0.0 release.
keystoneclient.common.cms.
is_asn1_token
(token)¶Determine if a token appears to be PKI-based.
thx to ayoung for sorting this out.
base64 decoded hex representation of MII is 3082:
In [3]: binascii.hexlify(base64.b64decode('MII='))
Out[3]: '3082'
re: http://www.itu.int/ITU-T/studygroups/com17/languages/X.690-0207.pdf
pg4: For tags from 0 to 30 the first octet is the identfier
pg10: Hex 30 means sequence, followed by the length of that sequence.
pg5: Second octet is the length octet
first bit indicates short or long form, next 7 bits encode the
number of subsequent octets that make up the content length octets
as an unsigned binary int
82 = 10000010 (first bit indicates long form)
0000010 = 2 octets of content length
so read the next 2 octets to get the length of the content.
In the case of a very large content length there could be a requirement to have more than 2 octets to designate the content length, therefore requiring us to check for MIM, MIQ, etc.
In [4]: base64.b64encode(binascii.a2b_hex('3083'))
Out[4]: 'MIM='
In [5]: base64.b64encode(binascii.a2b_hex('3084'))
Out[5]: 'MIQ='
Checking for MI would become invalid at 16 octets of content length
10010000 = 90
In [6]: base64.b64encode(binascii.a2b_hex('3090'))
Out[6]: 'MJA='
Checking for just M is insufficient
But we will only check for MII: Max length of the content using 2 octets is 3FFF or 16383.
It’s not practical to support a token of this length or greater in http therefore, we will check for MII only and ignore the case of larger tokens
keystoneclient.common.cms.
is_pkiz
(token_text)¶Determine if a token is PKIZ.
Checks if the string has the prefix that indicates it is a Crypto Message Syntax, Z compressed token.
keystoneclient.common.cms.
pkiz_sign
(text, signing_cert_file_name, signing_key_file_name, compression_level=6, message_digest='sha256')¶keystoneclient.common.cms.
pkiz_uncompress
(signed_text)¶keystoneclient.common.cms.
pkiz_verify
(signed_text, signing_cert_file_name, ca_file_name)¶keystoneclient.common.cms.
set_subprocess
(_subprocess=None)¶Set subprocess module to use.
The subprocess could be eventlet.green.subprocess if using eventlet, or Python’s subprocess otherwise.
keystoneclient.common.cms.
token_to_cms
(signed_text)¶Convert a custom formatted token to a PEM-formatted token.
See documentation for cms_to_token() for details on the custom formatting.
keystoneclient.common.cms.
verify_token
(token, signing_cert_file_name, ca_file_name)¶Except where otherwise noted, this document is licensed under Creative Commons Attribution 3.0 License. See all OpenStack Legal Documents.