@@ -123,18 +123,18 @@ def create_ca(cacert_path, ca_name,
123
123
ca .set_pubkey (key )
124
124
125
125
ca .add_extensions ([
126
- OpenSSL .crypto .X509Extension ('basicConstraints' , True ,
127
- 'CA:TRUE, pathlen:0' ),
128
- OpenSSL .crypto .X509Extension ('keyUsage' , True ,
129
- 'keyCertSign, cRLSign' ),
130
- OpenSSL .crypto .X509Extension ('subjectKeyIdentifier' , False , 'hash' ,
126
+ OpenSSL .crypto .X509Extension (b 'basicConstraints' , True ,
127
+ b 'CA:TRUE, pathlen:0' ),
128
+ OpenSSL .crypto .X509Extension (b 'keyUsage' , True ,
129
+ b 'keyCertSign, cRLSign' ),
130
+ OpenSSL .crypto .X509Extension (b 'subjectKeyIdentifier' , False , b 'hash' ,
131
131
subject = ca )])
132
132
133
133
ca .add_extensions ([
134
134
OpenSSL .crypto .X509Extension (
135
- 'authorityKeyIdentifier' ,
135
+ b 'authorityKeyIdentifier' ,
136
136
False ,
137
- 'issuer:always,keyid:always' ,
137
+ b 'issuer:always,keyid:always' ,
138
138
issuer = ca )])
139
139
ca .sign (key , digest )
140
140
@@ -192,7 +192,7 @@ def create_ca_signed_cert(cacert_path, ca_name,
192
192
fp .read (),
193
193
)
194
194
not_after = datetime .datetime .strptime (
195
- cert .get_notAfter (),
195
+ cert .get_notAfter (). decode () ,
196
196
"%Y%m%d%H%M%SZ" ,
197
197
)
198
198
ttl = (not_after - datetime .datetime .utcnow ()).total_seconds ()
@@ -252,10 +252,10 @@ def create_ca_signed_cert(cacert_path, ca_name,
252
252
253
253
cert .add_extensions ([
254
254
OpenSSL .crypto .X509Extension (
255
- "keyUsage" , True , "digitalSignature, keyEncipherment" ,
255
+ b "keyUsage" , True , b "digitalSignature, keyEncipherment" ,
256
256
),
257
257
OpenSSL .crypto .X509Extension (
258
- "extendedKeyUsage" , False , ", " .join (usage ),
258
+ b "extendedKeyUsage" , False , ", " .join (usage ). encode ( ),
259
259
),
260
260
])
261
261
0 commit comments