16
16
import six
17
17
import uuid
18
18
19
- from cryptography .hazmat .backends import default_backend
20
19
from cryptography .hazmat .primitives .asymmetric import rsa
21
20
from cryptography .hazmat .primitives import hashes
22
21
from cryptography .hazmat .primitives import serialization
@@ -112,8 +111,7 @@ def _generate_certificate(issuer_name, subject_name, extensions,
112
111
113
112
private_key = rsa .generate_private_key (
114
113
public_exponent = 65537 ,
115
- key_size = CONF .x509 .rsa_key_size ,
116
- backend = default_backend ()
114
+ key_size = CONF .x509 .rsa_key_size
117
115
)
118
116
119
117
# subject name is set as common name
@@ -132,7 +130,7 @@ def _generate_certificate(issuer_name, subject_name, extensions,
132
130
ca_key = private_key
133
131
ca_key_password = encryption_password
134
132
135
- csr = csr .sign (private_key , hashes .SHA256 (), default_backend () )
133
+ csr = csr .sign (private_key , hashes .SHA256 ())
136
134
137
135
if six .PY3 and isinstance (encryption_password , six .text_type ):
138
136
encryption_password = encryption_password .encode ()
@@ -170,8 +168,7 @@ def _load_pem_private_key(ca_key, ca_key_password=None):
170
168
171
169
ca_key = serialization .load_pem_private_key (
172
170
ca_key ,
173
- password = ca_key_password ,
174
- backend = default_backend ()
171
+ password = ca_key_password
175
172
)
176
173
177
174
return ca_key
@@ -198,7 +195,7 @@ def sign(csr, issuer_name, ca_key, ca_key_password=None,
198
195
csr = six .b (str (csr ))
199
196
if not isinstance (csr , x509 .CertificateSigningRequest ):
200
197
try :
201
- csr = x509 .load_pem_x509_csr (csr , backend = default_backend () )
198
+ csr = x509 .load_pem_x509_csr (csr )
202
199
except ValueError :
203
200
LOG .exception ("Received invalid csr %s." , csr )
204
201
raise exception .InvalidCsr (csr = csr )
@@ -229,7 +226,6 @@ def sign(csr, issuer_name, ca_key, ca_key_password=None,
229
226
230
227
certificate = builder .sign (
231
228
private_key = ca_key , algorithm = hashes .SHA256 (),
232
- backend = default_backend ()
233
229
).public_bytes (serialization .Encoding .PEM ).strip ()
234
230
235
231
return certificate
@@ -239,14 +235,14 @@ def generate_csr_and_key(common_name):
239
235
"""Return a dict with a new csr, public key and private key."""
240
236
private_key = rsa .generate_private_key (
241
237
public_exponent = 65537 ,
242
- key_size = 2048 ,
243
- backend = default_backend () )
238
+ key_size = 2048
239
+ )
244
240
245
241
public_key = private_key .public_key ()
246
242
247
243
csr = x509 .CertificateSigningRequestBuilder ().subject_name (x509 .Name ([
248
244
x509 .NameAttribute (x509 .oid .NameOID .COMMON_NAME , common_name ),
249
- ])).sign (private_key , hashes .SHA256 (), default_backend () )
245
+ ])).sign (private_key , hashes .SHA256 ())
250
246
251
247
result = {
252
248
'csr' : csr .public_bytes (
0 commit comments