This module has no docstring.
oid = <property object at 0x7f92bf09c9a0>
value = <property object at 0x7f92bf0acb80>
with_traceback(...) Exception.with_traceback(tb) -- set self.__traceback__ to tb and return self.
args = <attribute 'args' of 'BaseException' objects>
get_attribute_for_oid(self, oid: cryptography.hazmat._oid.ObjectIdentifier) -> cryptography.x509.base.Attribute
fingerprint(self, algorithm: cryptography.hazmat.primitives.hashes.HashAlgorithm) -> bytes Returns bytes using digest passed.
public_bytes(self, encoding: cryptography.hazmat.primitives._serialization.Encoding) -> bytes Serializes the certificate to PEM or DER format.
public_key(self) -> Union[cryptography.hazmat.primitives.asymmetric.dsa.DSAPublicKey, cryptography.hazmat.primitives.asymmetric.rsa.RSAPublicKey, cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePublicKey, cryptography.hazmat.primitives.asymmetric.ed25519.Ed25519PublicKey, cryptography.hazmat.primitives.asymmetric.ed448.Ed448PublicKey, cryptography.hazmat.primitives.asymmetric.x25519.X25519PublicKey, cryptography.hazmat.primitives.asymmetric.x448.X448PublicKey] Returns the public key
extensions = <abc.abstractproperty object at 0x7f92bf5c92e0> Returns an Extensions object.
issuer = <abc.abstractproperty object at 0x7f92bf045a60> Returns the issuer name object.
not_valid_after = <abc.abstractproperty object at 0x7f92bf045a00> Not after time (represented as UTC datetime)
not_valid_before = <abc.abstractproperty object at 0x7f92bf0459a0> Not before time (represented as UTC datetime)
serial_number = <abc.abstractproperty object at 0x7f92bf0867c0> Returns certificate serial number
signature = <abc.abstractproperty object at 0x7f92bf5c9340> Returns the signature bytes.
signature_algorithm_oid = <abc.abstractproperty object at 0x7f92bf5c9280> Returns the ObjectIdentifier of the signature algorithm.
signature_hash_algorithm = <abc.abstractproperty object at 0x7f92bf5c9220> Returns a HashAlgorithm corresponding to the type of the digest signed in the certificate.
subject = <abc.abstractproperty object at 0x7f92bf0458e0> Returns the subject name object.
tbs_certificate_bytes = <abc.abstractproperty object at 0x7f92bf5c93a0> Returns the tbsCertificate payload bytes as defined in RFC 5280.
version = <abc.abstractproperty object at 0x7f92bf0ae280> Returns the certificate version
add_extension(self, extval: cryptography.x509.extensions.ExtensionType, critical: bool) -> 'CertificateBuilder' Adds an X.509 extension to the certificate.
issuer_name(self, name: cryptography.x509.name.Name) -> 'CertificateBuilder' Sets the CA's distinguished name.
not_valid_after(self, time: datetime.datetime) -> 'CertificateBuilder' Sets the certificate expiration time.
not_valid_before(self, time: datetime.datetime) -> 'CertificateBuilder' Sets the certificate activation time.
public_key(self, key: Union[cryptography.hazmat.primitives.asymmetric.dsa.DSAPublicKey, cryptography.hazmat.primitives.asymmetric.rsa.RSAPublicKey, cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePublicKey, cryptography.hazmat.primitives.asymmetric.ed25519.Ed25519PublicKey, cryptography.hazmat.primitives.asymmetric.ed448.Ed448PublicKey, cryptography.hazmat.primitives.asymmetric.x25519.X25519PublicKey, cryptography.hazmat.primitives.asymmetric.x448.X448PublicKey]) -> 'CertificateBuilder' Sets the requestor's public key (as found in the signing request).
serial_number(self, number: int) -> 'CertificateBuilder' Sets the certificate serial number.
sign(self, private_key: Union[cryptography.hazmat.primitives.asymmetric.ed25519.Ed25519PrivateKey, cryptography.hazmat.primitives.asymmetric.ed448.Ed448PrivateKey, cryptography.hazmat.primitives.asymmetric.rsa.RSAPrivateKey, cryptography.hazmat.primitives.asymmetric.dsa.DSAPrivateKey, cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePrivateKey], algorithm: Optional[cryptography.hazmat.primitives.hashes.HashAlgorithm], backend: Any = None) -> cryptography.x509.base.Certificate Signs the certificate using the CA's private key.
subject_name(self, name: cryptography.x509.name.Name) -> 'CertificateBuilder' Sets the requestor's distinguished name.
fingerprint(self, algorithm: cryptography.hazmat.primitives.hashes.HashAlgorithm) -> bytes Returns bytes using digest passed.
get_revoked_certificate_by_serial_number(self, serial_number: int) -> Optional[cryptography.x509.base.RevokedCertificate] Returns an instance of RevokedCertificate or None if the serial_number is not in the CRL.
is_signature_valid(self, public_key: Union[cryptography.hazmat.primitives.asymmetric.dsa.DSAPublicKey, cryptography.hazmat.primitives.asymmetric.rsa.RSAPublicKey, cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePublicKey, cryptography.hazmat.primitives.asymmetric.ed25519.Ed25519PublicKey, cryptography.hazmat.primitives.asymmetric.ed448.Ed448PublicKey]) -> bool Verifies signature of revocation list against given public key.
public_bytes(self, encoding: cryptography.hazmat.primitives._serialization.Encoding) -> bytes Serializes the CRL to PEM or DER format.
extensions = <abc.abstractproperty object at 0x7f92bf5c9700> Returns an Extensions object containing a list of CRL extensions.
issuer = <abc.abstractproperty object at 0x7f92bf5c95e0> Returns the X509Name with the issuer of this CRL.
last_update = <abc.abstractproperty object at 0x7f92bf5c96a0> Returns the date of last update for this CRL.
next_update = <abc.abstractproperty object at 0x7f92bf5c9640> Returns the date of next update for this CRL.
signature = <abc.abstractproperty object at 0x7f92bf5c9760> Returns the signature bytes.
signature_algorithm_oid = <abc.abstractproperty object at 0x7f92bf5c9580> Returns the ObjectIdentifier of the signature algorithm.
signature_hash_algorithm = <abc.abstractproperty object at 0x7f92bf5c9520> Returns a HashAlgorithm corresponding to the type of the digest signed in the certificate.
tbs_certlist_bytes = <abc.abstractproperty object at 0x7f92bf5c97c0> Returns the tbsCertList payload bytes as defined in RFC 5280.
add_extension(self, extval: cryptography.x509.extensions.ExtensionType, critical: bool) -> 'CertificateRevocationListBuilder' Adds an X.509 extension to the certificate revocation list.
add_revoked_certificate(self, revoked_certificate: cryptography.x509.base.RevokedCertificate) -> 'CertificateRevocationListBuilder' Adds a revoked certificate to the CRL.
issuer_name(self, issuer_name: cryptography.x509.name.Name) -> 'CertificateRevocationListBuilder'
last_update(self, last_update: datetime.datetime) -> 'CertificateRevocationListBuilder'
next_update(self, next_update: datetime.datetime) -> 'CertificateRevocationListBuilder'
sign(self, private_key: Union[cryptography.hazmat.primitives.asymmetric.ed25519.Ed25519PrivateKey, cryptography.hazmat.primitives.asymmetric.ed448.Ed448PrivateKey, cryptography.hazmat.primitives.asymmetric.rsa.RSAPrivateKey, cryptography.hazmat.primitives.asymmetric.dsa.DSAPrivateKey, cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePrivateKey], algorithm: Optional[cryptography.hazmat.primitives.hashes.HashAlgorithm], backend: Any = None) -> cryptography.x509.base.CertificateRevocationList
get_attribute_for_oid(self, oid: cryptography.hazmat._oid.ObjectIdentifier) -> bytes Get the attribute value for a given OID.
public_bytes(self, encoding: cryptography.hazmat.primitives._serialization.Encoding) -> bytes Encodes the request to PEM or DER format.
public_key(self) -> Union[cryptography.hazmat.primitives.asymmetric.dsa.DSAPublicKey, cryptography.hazmat.primitives.asymmetric.rsa.RSAPublicKey, cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePublicKey, cryptography.hazmat.primitives.asymmetric.ed25519.Ed25519PublicKey, cryptography.hazmat.primitives.asymmetric.ed448.Ed448PublicKey] Returns the public key
attributes = <abc.abstractproperty object at 0x7f92bf5c99a0> Returns an Attributes object.
extensions = <abc.abstractproperty object at 0x7f92bf5c9940> Returns the extensions in the signing request.
is_signature_valid = <abc.abstractproperty object at 0x7f92bf5c9ac0> Verifies signature of signing request.
signature = <abc.abstractproperty object at 0x7f92bf5c9a00> Returns the signature bytes.
signature_algorithm_oid = <abc.abstractproperty object at 0x7f92bf5c98e0> Returns the ObjectIdentifier of the signature algorithm.
signature_hash_algorithm = <abc.abstractproperty object at 0x7f92bf5c9880> Returns a HashAlgorithm corresponding to the type of the digest signed in the certificate.
subject = <abc.abstractproperty object at 0x7f92bf5c9820> Returns the subject name object.
tbs_certrequest_bytes = <abc.abstractproperty object at 0x7f92bf5c9a60> Returns the PKCS#10 CertificationRequestInfo bytes as defined in RFC 2986.
add_attribute(self, oid: cryptography.hazmat._oid.ObjectIdentifier, value: bytes) -> 'CertificateSigningRequestBuilder' Adds an X.509 attribute with an OID and associated value.
add_extension(self, extval: cryptography.x509.extensions.ExtensionType, critical: bool) -> 'CertificateSigningRequestBuilder' Adds an X.509 extension to the certificate request.
sign(self, private_key: Union[cryptography.hazmat.primitives.asymmetric.ed25519.Ed25519PrivateKey, cryptography.hazmat.primitives.asymmetric.ed448.Ed448PrivateKey, cryptography.hazmat.primitives.asymmetric.rsa.RSAPrivateKey, cryptography.hazmat.primitives.asymmetric.dsa.DSAPrivateKey, cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePrivateKey], algorithm: Optional[cryptography.hazmat.primitives.hashes.HashAlgorithm], backend: Any = None) -> cryptography.x509.base.CertificateSigningRequest Signs the request using the requestor's private key.
subject_name(self, name: cryptography.x509.name.Name) -> 'CertificateSigningRequestBuilder' Sets the certificate requestor's distinguished name.
critical = <property object at 0x7f92bf5cd720>
oid = <property object at 0x7f92bf5cd6d0>
value = <property object at 0x7f92bf5cd770>
public_bytes(self) -> bytes Serializes the extension type to DER.
get_extension_for_class(self, extclass: Type[~ExtensionTypeVar]) -> 'Extension[ExtensionTypeVar]'
get_extension_for_oid(self, oid: cryptography.hazmat._oid.ObjectIdentifier) -> 'Extension[ExtensionType]'
with_traceback(...) Exception.with_traceback(tb) -- set self.__traceback__ to tb and return self.
args = <attribute 'args' of 'BaseException' objects>
get_attributes_for_oid(self, oid: cryptography.hazmat._oid.ObjectIdentifier) -> List[cryptography.x509.name.NameAttribute]
public_bytes(self, backend: Any = None) -> bytes
rfc4514_string(self, attr_name_overrides: Optional[Mapping[cryptography.hazmat._oid.ObjectIdentifier, str]] = None) -> str Format as RFC4514 Distinguished Name string. For example 'CN=foobar.com,O=Foo Corp,C=US' An X.509 name is a two-level structure: a list of sets of attributes. Each list element is separated by ',' and within each list element, set elements are separated by '+'. The latter is almost never used in real world certificates. According to RFC4514 section 2.1 the RDNSequence must be reversed when converting to string representation.
rdns = <property object at 0x7f92bef80540>
dotted_string = <property object at 0x7f92bf0c7810>
extensions = <abc.abstractproperty object at 0x7f92bf5c94c0> Returns an Extensions object containing a list of Revoked extensions.
revocation_date = <abc.abstractproperty object at 0x7f92bf5c9460> Returns the date of when this certificate was revoked.
serial_number = <abc.abstractproperty object at 0x7f92bf5c9400> Returns the serial number of the revoked certificate.
add_extension(self, extval: cryptography.x509.extensions.ExtensionType, critical: bool) -> 'RevokedCertificateBuilder'
build(self, backend: Any = None) -> cryptography.x509.base.RevokedCertificate
revocation_date(self, time: datetime.datetime) -> 'RevokedCertificateBuilder'
serial_number(self, number: int) -> 'RevokedCertificateBuilder'
An enumeration.
v1 = <Version.v1: 0>
v3 = <Version.v3: 2>
load_der_x509_certificate(data: bytes, backend: Any = None) -> cryptography.x509.base.Certificate
load_der_x509_crl(data: bytes, backend: Any = None) -> cryptography.x509.base.CertificateRevocationList
load_der_x509_csr(data: bytes, backend: Any = None) -> cryptography.x509.base.CertificateSigningRequest
load_pem_x509_certificate(data: bytes, backend: Any = None) -> cryptography.x509.base.Certificate
load_pem_x509_crl(data: bytes, backend: Any = None) -> cryptography.x509.base.CertificateRevocationList
load_pem_x509_csr(data: bytes, backend: Any = None) -> cryptography.x509.base.CertificateSigningRequest
random_serial_number() -> int
CERTIFICATE_PUBLIC_KEY_TYPES = typing.Union[cryptography.hazmat.primitives.asymmetric.dsa.DSAPublicKey, cryptography.hazmat.primitives.asymmetric.rsa.RSAPublicKey, cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePublicKey, cryptography.hazmat.primitives.asymmetric.ed25519.Ed25519PublicKey, cryptography.hazmat.primitives.asymmetric.ed448.Ed448PublicKey, cryptography.hazmat.primitives.asymmetric.x25519.X25519PublicKey, cryptography.hazmat.primitives.asymmetric.x448.X448PublicKey]
PRIVATE_KEY_TYPES = typing.Union[cryptography.hazmat.primitives.asymmetric.ed25519.Ed25519PrivateKey, cryptography.hazmat.primitives.asymmetric.ed448.Ed448PrivateKey, cryptography.hazmat.primitives.asymmetric.rsa.RSAPrivateKey, cryptography.hazmat.primitives.asymmetric.dsa.DSAPrivateKey, cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePrivateKey]
PUBLIC_KEY_TYPES = typing.Union[cryptography.hazmat.primitives.asymmetric.dsa.DSAPublicKey, cryptography.hazmat.primitives.asymmetric.rsa.RSAPublicKey, cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePublicKey, cryptography.hazmat.primitives.asymmetric.ed25519.Ed25519PublicKey, cryptography.hazmat.primitives.asymmetric.ed448.Ed448PublicKey]