Index: telemetry/third_party/web-page-replay/certutils.py |
diff --git a/telemetry/third_party/web-page-replay/certutils.py b/telemetry/third_party/web-page-replay/certutils.py |
index 46c31a8167b77082160029b760a3d4c8b4e407f4..4de0560bf28a9d8a829976c7dbff52e861f9312f 100644 |
--- a/telemetry/third_party/web-page-replay/certutils.py |
+++ b/telemetry/third_party/web-page-replay/certutils.py |
@@ -130,8 +130,6 @@ def generate_dummy_ca_cert(subject='_WebPageReplayCert'): |
ca_cert.set_pubkey(key) |
ca_cert.add_extensions([ |
crypto.X509Extension('basicConstraints', True, 'CA:TRUE'), |
- crypto.X509Extension('subjectAltName', False, 'DNS:' + subject), |
- crypto.X509Extension('nsCertType', True, 'sslCA'), |
crypto.X509Extension('extendedKeyUsage', True, |
('serverAuth,clientAuth,emailProtection,' |
'timeStamping,msCodeInd,msCodeCom,msCTLSign,' |
@@ -230,20 +228,13 @@ def generate_cert(root_ca_cert_str, server_cert_str, server_host): |
Returns: |
a PEM formatted certificate string |
""" |
- EXTENSION_WHITELIST = set(['subjectAltName']) |
- |
if openssl_import_error: |
raise openssl_import_error # pylint: disable=raising-bad-type |
common_name = server_host |
- reused_extensions = [] |
if server_cert_str: |
original_cert = load_cert(server_cert_str) |
common_name = original_cert.get_subject().commonName |
- for i in xrange(original_cert.get_extension_count()): |
- original_cert_extension = original_cert.get_extension(i) |
- if original_cert_extension.get_short_name() in EXTENSION_WHITELIST: |
- reused_extensions.append(original_cert_extension) |
ca_cert = load_cert(root_ca_cert_str) |
ca_key = load_privatekey(root_ca_cert_str) |
@@ -255,7 +246,10 @@ def generate_cert(root_ca_cert_str, server_cert_str, server_host): |
cert.set_issuer(ca_cert.get_subject()) |
cert.set_serial_number(int(time.time()*10000)) |
cert.set_pubkey(ca_key) |
- cert.add_extensions(reused_extensions) |
+ cert.add_extensions([ |
+ crypto.X509Extension('subjectAltName', False, 'DNS:' + server_host), |
+ crypto.X509Extension('extendedKeyUsage', False, 'serverAuth,clientAuth'), |
+ ]) |
cert.sign(ca_key, 'sha256') |
return _dump_cert(cert) |