|
9 | 9 | from os.path import expanduser |
10 | 10 | from sys import platform as _platform |
11 | 11 |
|
12 | | -from cryptography import x509 |
| 12 | +from cryptography import x509, __version__ as cryptography_version |
13 | 13 | from cryptography.exceptions import InvalidSignature, UnsupportedAlgorithm |
14 | 14 | from cryptography.hazmat.backends import default_backend |
15 | 15 | from cryptography.hazmat.primitives import padding, hashes, serialization |
16 | 16 | from cryptography.hazmat.primitives.asymmetric.padding import PKCS1v15 |
17 | 17 | from cryptography.hazmat.primitives.asymmetric.rsa import RSAPublicNumbers, RSAPrivateNumbers, rsa_crt_iqmp, \ |
18 | 18 | rsa_crt_dmp1, rsa_crt_dmq1, RSAPublicKey, RSAPrivateKey |
19 | | -from cryptography.hazmat.primitives.ciphers import Cipher, algorithms, modes |
| 19 | +from cryptography.hazmat.primitives.ciphers import Cipher, modes |
20 | 20 | from cryptography.hazmat.primitives.kdf.pbkdf2 import PBKDF2HMAC |
21 | 21 | from cryptography.hazmat.primitives.serialization import pkcs12 |
22 | 22 | from pyasn1.codec.der import decoder as der_decoder |
|
26 | 26 | from pyasn1.type.namedtype import NamedTypes, NamedType |
27 | 27 | from pyasn1.type.univ import Sequence, Integer, OctetString, ObjectIdentifier, Set, BitString, Null |
28 | 28 |
|
| 29 | +if cryptography_version >= '43.0.0': |
| 30 | + from cryptography.hazmat.decrepit.ciphers import algorithms |
| 31 | +else: |
| 32 | + from cryptography.hazmat.primitives.ciphers import algorithms |
| 33 | + |
| 34 | + |
29 | 35 | ID_SEED_CBC = (1, 2, 410, 200004, 1, 4) |
30 | 36 | ID_SEED_CBC_WITH_SHA1 = (1, 2, 410, 200004, 1, 15) |
31 | 37 | ID_PBES2 = (1, 2, 840, 113549, 1, 5, 13) |
@@ -250,11 +256,11 @@ def valid_date(self) -> (datetime, datetime): |
250 | 256 | """Get valid date range |
251 | 257 |
|
252 | 258 | p = PinkSign(pubkey_path="/some/path/signCert.der") |
253 | | - print p.valid_date() # datetime.datetime(2019, 6, 11, 14, 59, 59), datetime.datetime(2018, 6, 5, 7, 22) |
| 259 | + print p.valid_date() # datetime.datetime(2019, 6, 11, 14, 59, 59, tzinfo=datetime.timezone.utc), datetime.datetime(2018, 6, 5, 7, 22, tzinfo=datetime.timezone.utc) |
254 | 260 | """ |
255 | 261 | if self.pub_cert is None: |
256 | 262 | raise ValueError("Public key should be loaded before fetching valid date.") |
257 | | - return self.pub_cert.not_valid_before, self.pub_cert.not_valid_after |
| 263 | + return self.pub_cert.not_valid_before_utc, self.pub_cert.not_valid_after_utc |
258 | 264 |
|
259 | 265 | def serialnum(self) -> int: |
260 | 266 | """Get serial number value |
|
0 commit comments