[Python-Dev] frozenset C API?
"Martin v. Löwis"
martin at v.loewis.de
Thu Sep 6 08:46:50 CEST 2007
>> It's actually easier to do all or nothing. I'm tempted to just report
>> 'critical' extensions.
>
> Simpler to provide them all
I very much doubt that, at least if you want to report decoded
information. Conceptually, there is an infinite number of extensions,
and when you are done, I can show you lots of certificates that
have extensions that you don't support.
> This certificate has already been validated; the issue is
> how to get critical information to the app so it can make
> authorization decisions (like subjectAltName when the subject field is
> empty)
> {'extensions': {'1.3.6.1.5.5.7.1.12': u'',
> 'Authority Information Access': u'OCSP - URI:http://EVIntl-ocsp.verisign.com\n',
> 'X509v3 Authority Key Identifier': u'keyid:4E:43:C8:1D:76:EF:37:53:7A:4F:F2:58:6F:94:F3:38:E2:D5:BD:DF\n',
> 'X509v3 Basic Constraints': u'CA:FALSE',
> 'X509v3 CRL Distribution Points': u'URI:http://EVIntl-crl.verisign.com/EVIntl2006.crl\n',
> 'X509v3 Certificate Policies': u'Policy: 2.16.840.1.113733.1.7.23.6\n',
> 'X509v3 Extended Key Usage': u'TLS Web Server Authentication, TLS Web Client Authentication, Netscape Server Gated Crypto, Microsoft Server Gated Crypto',
> 'X509v3 Key Usage': u'Digital Signature, Key Encipherment',
> 'X509v3 Subject Key Identifier': u'F1:5A:89:93:55:47:4B:BA:51:F5:4E:E0:CB:16:55:F4:D7:CC:38:67'},
Hmm. In this certificate, none of the extensions you report have been
marked critical; they are all non-critical.
Also, you are reporting the logotype (1.3.6.1.5.5.7.1.12) incorrectly;
it's defined in RFC 3709, and it's definitely not an empty string in
the certificate you've used.
Regards,
Martin
More information about the Python-Dev
mailing list