blob: d4c4b684816639f48f023795c61fd30852d1f6a9 [file] [log] [blame]
Jean-Paul Calderone8b63d452008-03-21 18:31:12 -04001# Copyright (C) Jean-Paul Calderone 2008, All rights reserved
2
Jean-Paul Calderoned8782ad2008-03-04 23:39:59 -05003"""
4Unit tests for L{OpenSSL.crypto}.
5"""
6
7from unittest import TestCase
8
9from OpenSSL.crypto import TYPE_RSA, TYPE_DSA, Error, PKey, PKeyType
Jean-Paul Calderone78381d22008-03-06 23:35:22 -050010from OpenSSL.crypto import X509, X509Type, X509Name, X509NameType
Jean-Paul Calderone2aa2b332008-03-06 21:43:14 -050011from OpenSSL.crypto import X509Req, X509ReqType
Jean-Paul Calderonee7db4b42008-12-31 13:39:24 -050012from OpenSSL.crypto import X509Extension, X509ExtensionType
Jean-Paul Calderone828c9cb2008-04-26 18:06:54 -040013from OpenSSL.crypto import FILETYPE_PEM, load_certificate, load_privatekey
14from OpenSSL.crypto import dump_privatekey
15
16
17cleartextPrivateKeyPEM = (
18 "-----BEGIN RSA PRIVATE KEY-----\n"
19 "MIICXAIBAAKBgQDaemNe1syksAbFFpF3aoOrZ18vB/IQNZrAjFqXPv9iieJm7+Tc\n"
20 "g+lA/v0qmoEKrpT2xfwxXmvZwBNM4ZhyRC3DPIFEyJV7/3IA1p5iuMY/GJI1VIgn\n"
21 "aikQCnrsyxtaRpsMBeZRniaVzcUJ+XnEdFGEjlo+k0xlwfVclDEMwgpXAQIDAQAB\n"
22 "AoGBALi0a7pMQqqgnriVAdpBVJveQtxSDVWi2/gZMKVZfzNheuSnv4amhtaKPKJ+\n"
23 "CMZtHkcazsE2IFvxRN/kgato9H3gJqq8nq2CkdpdLNVKBoxiCtkLfutdY4SQLtoY\n"
24 "USN7exk131pchsAJXYlR6mCW+ZP+E523cNwpPgsyKxVbmXSBAkEA9470fy2W0jFM\n"
25 "taZFslpntKSzbvn6JmdtjtvWrM1bBaeeqFiGBuQFYg46VaCUaeRWYw02jmYAsDYh\n"
26 "ZQavmXThaQJBAOHtlAQ0IJJEiMZr6vtVPH32fmbthSv1AUSYPzKqdlQrUnOXPQXu\n"
27 "z70cFoLG1TvPF5rBxbOkbQ/s8/ka5ZjPfdkCQCeC7YsO36+UpsWnUCBzRXITh4AC\n"
28 "7eYLQ/U1KUJTVF/GrQ/5cQrQgftwgecAxi9Qfmk4xqhbp2h4e0QAmS5I9WECQH02\n"
29 "0QwrX8nxFeTytr8pFGezj4a4KVCdb2B3CL+p3f70K7RIo9d/7b6frJI6ZL/LHQf2\n"
30 "UP4pKRDkgKsVDx7MELECQGm072/Z7vmb03h/uE95IYJOgY4nfmYs0QKA9Is18wUz\n"
31 "DpjfE33p0Ha6GO1VZRIQoqE24F8o5oimy3BEjryFuw4=\n"
32 "-----END RSA PRIVATE KEY-----\n")
33
34
Jean-Paul Calderone5ef86512008-04-26 19:06:28 -040035cleartextCertificatePEM = (
36 "-----BEGIN CERTIFICATE-----\n"
37 "MIICfTCCAeYCAQEwDQYJKoZIhvcNAQEEBQAwgYYxCzAJBgNVBAYTAlVTMRkwFwYD\n"
38 "VQQDExBweW9wZW5zc2wuc2YubmV0MREwDwYDVQQHEwhOZXcgWW9yazESMBAGA1UE\n"
39 "ChMJUHlPcGVuU1NMMREwDwYDVQQIEwhOZXcgWW9yazEQMA4GCSqGSIb3DQEJARYB\n"
40 "IDEQMA4GA1UECxMHVGVzdGluZzAeFw0wODAzMjUxOTA0MTNaFw0wOTAzMjUxOTA0\n"
41 "MTNaMIGGMQswCQYDVQQGEwJVUzEZMBcGA1UEAxMQcHlvcGVuc3NsLnNmLm5ldDER\n"
42 "MA8GA1UEBxMITmV3IFlvcmsxEjAQBgNVBAoTCVB5T3BlblNTTDERMA8GA1UECBMI\n"
43 "TmV3IFlvcmsxEDAOBgkqhkiG9w0BCQEWASAxEDAOBgNVBAsTB1Rlc3RpbmcwgZ8w\n"
44 "DQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBANp6Y17WzKSwBsUWkXdqg6tnXy8H8hA1\n"
45 "msCMWpc+/2KJ4mbv5NyD6UD+/SqagQqulPbF/DFea9nAE0zhmHJELcM8gUTIlXv/\n"
46 "cgDWnmK4xj8YkjVUiCdqKRAKeuzLG1pGmwwF5lGeJpXNxQn5ecR0UYSOWj6TTGXB\n"
47 "9VyUMQzCClcBAgMBAAEwDQYJKoZIhvcNAQEEBQADgYEAmm0Vzvv1O91WLl2LnF2P\n"
48 "q55LJdOnJbCCXIgxLdoVmvYAz1ZJq1eGKgKWI5QLgxiSzJLEU7KK//aVfiZzoCd5\n"
49 "RipBiEEMEV4eAY317bHPwPP+4Bj9t0l8AsDLseC5vLRHgxrLEu3bn08DYx6imB5Q\n"
50 "UBj849/xpszEM7BhwKE0GiQ=\n"
51 "-----END CERTIFICATE-----\n")
52
53
Jean-Paul Calderone828c9cb2008-04-26 18:06:54 -040054encryptedPrivateKeyPEM = (
55 "-----BEGIN RSA PRIVATE KEY-----\n"
56 "Proc-Type: 4,ENCRYPTED\n"
57 "DEK-Info: BF-CBC,8306665233D056B1\n"
58 "\n"
59 "BwxghOcX1F+M108qRGBfpUBrfaeKOszDEV18OjEE55p0yGsiDxvdol3c4bwI5ITy\n"
60 "ltP8w9O33CDUCjr+Ymj8xLpPP60TTfr/aHq+2fEuG4TfkeHb5fVYm0mgVnaOhJs3\n"
61 "a2n5IL/KNCdP3zMZa0IaMJ0M+VK90SLpq5nzXOWkufLyZL1+n8srkk06gepmHS7L\n"
62 "rH3rALNboG8yTH1qjE8PwcMrJAQfRMd4/4RTQv+4pUuKj7I2en+YwSQ/gomy7qN1\n"
63 "3s/gMgV/2GUbEcTVch4thZ9l3WsX18V76rBQkiZ7yrJkxwNMv+Qc2GfHtBnsXAyA\n"
64 "0nIE4Mm/OQqX8h7EJ4c2s1DMGVS0YZGU+75HN0A3iD01h8C5utqSScWzBA45j/Vy\n"
65 "3aypQVqQeW7kBMQlpc6pHvJ1EsjiAJRCto7tZNLxRdjMKBV4w75JNLaAFSraqA+R\n"
66 "/WPcdcXAQuhmCeh31fzmVOHJGRF7/5pAR/b7AnFTD4YbYVcglNis/jpdiI9k2AYP\n"
67 "wZNwXOIh6Ibq5hMvyV4/pySyLbgDOrfrOGpi8N6lBbzewByYQKiXwUEZf+Y5499/\n"
68 "CckajBhgYynPpe6mgsSeklWGc845iIwAtzavBNZIkn1hKP1P+TFjbl2O75u/9JLJ\n"
69 "6i4IFYCyQmwiHX8nTR717SpCN2gyZ2HrX7z2mKP/KokkAX2yidwoKh9FMUV5lOGO\n"
70 "JPc4MfPo4lPB7SP30AtOh7y7zlS3x8Uo0+0wCg5Z5Fn/73x3W+p5nyI0G9n7RGzL\n"
71 "ZeCWLdG/Cm6ZyIpYZGbZ5m+U3Fr6/El9V6LSxrB1TB+8G1NTdLlbeA==\n"
72 "-----END RSA PRIVATE KEY-----\n")
73encryptedPrivateKeyPEMPassphrase = "foobar"
74
75
Jean-Paul Calderoneac930e12008-03-06 18:50:51 -050076class _Python23TestCaseHelper:
Jean-Paul Calderone7da26a72008-03-06 00:35:20 -050077 # Python 2.3 compatibility.
78 def assertTrue(self, *a, **kw):
79 return self.failUnless(*a, **kw)
80
81
Jean-Paul Calderone7535dab2008-03-06 18:53:11 -050082 def assertFalse(self, *a, **kw):
83 return self.failIf(*a, **kw)
84
85
Jean-Paul Calderone391585f2008-12-31 14:36:31 -050086
Jean-Paul Calderonee7db4b42008-12-31 13:39:24 -050087class X509ExtTests(TestCase, _Python23TestCaseHelper):
88 def test_construction(self):
89 """
90 L{X509Extension} accepts an extension type name, a critical flag,
91 and an extension value and returns an L{X509ExtensionType} instance.
92 """
93 basic = X509Extension('basicConstraints', 1, 'CA:true')
94 self.assertTrue(
95 isinstance(basic, X509ExtensionType),
96 "%r is of type %r, should be %r" % (
97 basic, type(basic), X509ExtensionType))
98
99 comment = X509Extension('nsComment', 0, 'pyOpenSSL unit test')
100 self.assertTrue(
101 isinstance(comment, X509ExtensionType),
102 "%r is of type %r, should be %r" % (
103 comment, type(comment), X509ExtensionType))
104
105
Jean-Paul Calderone391585f2008-12-31 14:36:31 -0500106 def test_invalid_extension(self):
107 """
108 L{X509Extension} raises something if it is passed a bad extension
109 name or value.
110 """
111 self.assertRaises(
112 Error, X509Extension, 'thisIsMadeUp', False, 'hi')
113 self.assertRaises(
114 Error, X509Extension, 'basicConstraints', False, 'blah blah')
115
116
Jean-Paul Calderonee7db4b42008-12-31 13:39:24 -0500117 def test_get_critical(self):
118 """
119 L{X509ExtensionType.get_critical} returns the value of the
120 extension's critical flag.
121 """
122 ext = X509Extension('basicConstraints', 1, 'CA:true')
123 self.assertTrue(ext.get_critical())
124 ext = X509Extension('basicConstraints', 0, 'CA:true')
125 self.assertFalse(ext.get_critical())
126
Jean-Paul Calderone7535dab2008-03-06 18:53:11 -0500127
Jean-Paul Calderone391585f2008-12-31 14:36:31 -0500128
Jean-Paul Calderoneac930e12008-03-06 18:50:51 -0500129class PKeyTests(TestCase, _Python23TestCaseHelper):
130 """
131 Unit tests for L{OpenSSL.crypto.PKey}.
132 """
Jean-Paul Calderoned8782ad2008-03-04 23:39:59 -0500133 def test_construction(self):
134 """
135 L{PKey} takes no arguments and returns a new L{PKeyType} instance.
136 """
137 self.assertRaises(TypeError, PKey, None)
138 key = PKey()
139 self.assertTrue(
140 isinstance(key, PKeyType),
141 "%r is of type %r, should be %r" % (key, type(key), PKeyType))
142
143
144 def test_pregeneration(self):
145 """
146 L{PKeyType.bits} and L{PKeyType.type} return C{0} before the key is
147 generated.
148 """
149 key = PKey()
150 self.assertEqual(key.type(), 0)
151 self.assertEqual(key.bits(), 0)
152
153
154 def test_failedGeneration(self):
155 """
Jean-Paul Calderoneab82db72008-03-06 00:09:31 -0500156 L{PKeyType.generate_key} takes two arguments, the first giving the key
157 type as one of L{TYPE_RSA} or L{TYPE_DSA} and the second giving the
158 number of bits to generate. If an invalid type is specified or
159 generation fails, L{Error} is raised. If an invalid number of bits is
160 specified, L{ValueError} or L{Error} is raised.
Jean-Paul Calderoned8782ad2008-03-04 23:39:59 -0500161 """
162 key = PKey()
163 self.assertRaises(TypeError, key.generate_key)
164 self.assertRaises(TypeError, key.generate_key, 1, 2, 3)
165 self.assertRaises(TypeError, key.generate_key, "foo", "bar")
166 self.assertRaises(Error, key.generate_key, -1, 0)
Jean-Paul Calderoneab82db72008-03-06 00:09:31 -0500167
Jean-Paul Calderoneab82db72008-03-06 00:09:31 -0500168 self.assertRaises(ValueError, key.generate_key, TYPE_RSA, -1)
169 self.assertRaises(ValueError, key.generate_key, TYPE_RSA, 0)
Jean-Paul Calderoned71fe982008-03-06 00:31:50 -0500170
171 # XXX RSA generation for small values of bits is fairly buggy in a wide
172 # range of OpenSSL versions. I need to figure out what the safe lower
173 # bound for a reasonable number of OpenSSL versions is and explicitly
174 # check for that in the wrapper. The failure behavior is typically an
175 # infinite loop inside OpenSSL.
176
177 # self.assertRaises(Error, key.generate_key, TYPE_RSA, 2)
Jean-Paul Calderoned8782ad2008-03-04 23:39:59 -0500178
179 # XXX DSA generation seems happy with any number of bits. The DSS
180 # says bits must be between 512 and 1024 inclusive. OpenSSL's DSA
181 # generator doesn't seem to care about the upper limit at all. For
Jean-Paul Calderoneeff3cd92008-03-05 22:35:26 -0500182 # the lower limit, it uses 512 if anything smaller is specified.
Jean-Paul Calderoned8782ad2008-03-04 23:39:59 -0500183 # So, it doesn't seem possible to make generate_key fail for
184 # TYPE_DSA with a bits argument which is at least an int.
185
186 # self.assertRaises(Error, key.generate_key, TYPE_DSA, -7)
187
188
189 def test_rsaGeneration(self):
190 """
191 L{PKeyType.generate_key} generates an RSA key when passed
192 L{TYPE_RSA} as a type and a reasonable number of bits.
193 """
194 bits = 128
195 key = PKey()
196 key.generate_key(TYPE_RSA, bits)
197 self.assertEqual(key.type(), TYPE_RSA)
198 self.assertEqual(key.bits(), bits)
199
200
201 def test_dsaGeneration(self):
202 """
203 L{PKeyType.generate_key} generates a DSA key when passed
204 L{TYPE_DSA} as a type and a reasonable number of bits.
205 """
206 # 512 is a magic number. The DSS (Digital Signature Standard)
207 # allows a minimum of 512 bits for DSA. DSA_generate_parameters
208 # will silently promote any value below 512 to 512.
209 bits = 512
210 key = PKey()
211 key.generate_key(TYPE_DSA, bits)
212 self.assertEqual(key.type(), TYPE_DSA)
213 self.assertEqual(key.bits(), bits)
214
215
216 def test_regeneration(self):
217 """
218 L{PKeyType.generate_key} can be called multiple times on the same
219 key to generate new keys.
220 """
221 key = PKey()
222 for type, bits in [(TYPE_RSA, 512), (TYPE_DSA, 576)]:
223 key.generate_key(type, bits)
224 self.assertEqual(key.type(), type)
225 self.assertEqual(key.bits(), bits)
Jean-Paul Calderoneeff3cd92008-03-05 22:35:26 -0500226
227
228
Jean-Paul Calderoneac930e12008-03-06 18:50:51 -0500229class X509NameTests(TestCase, _Python23TestCaseHelper):
Jean-Paul Calderoneeff3cd92008-03-05 22:35:26 -0500230 """
231 Unit tests for L{OpenSSL.crypto.X509Name}.
232 """
Jean-Paul Calderonee098dc72008-03-06 18:36:19 -0500233 def _x509name(self, **attrs):
234 # XXX There's no other way to get a new X509Name yet.
235 name = X509().get_subject()
236 attrs = attrs.items()
237 # Make the order stable - order matters!
238 attrs.sort(lambda (k1, v1), (k2, v2): cmp(v1, v2))
239 for k, v in attrs:
240 setattr(name, k, v)
241 return name
242
243
Jean-Paul Calderoneeff3cd92008-03-05 22:35:26 -0500244 def test_attributes(self):
245 """
246 L{X509NameType} instances have attributes for each standard (?)
247 X509Name field.
248 """
Jean-Paul Calderonee098dc72008-03-06 18:36:19 -0500249 name = self._x509name()
Jean-Paul Calderoneeff3cd92008-03-05 22:35:26 -0500250 name.commonName = "foo"
251 self.assertEqual(name.commonName, "foo")
252 self.assertEqual(name.CN, "foo")
253 name.CN = "baz"
254 self.assertEqual(name.commonName, "baz")
255 self.assertEqual(name.CN, "baz")
256 name.commonName = "bar"
257 self.assertEqual(name.commonName, "bar")
258 self.assertEqual(name.CN, "bar")
259 name.CN = "quux"
260 self.assertEqual(name.commonName, "quux")
261 self.assertEqual(name.CN, "quux")
262
263
Jean-Paul Calderoneeff3cd92008-03-05 22:35:26 -0500264 def test_copy(self):
265 """
266 L{X509Name} creates a new L{X509NameType} instance with all the same
267 attributes as an existing L{X509NameType} instance when called with
268 one.
269 """
Jean-Paul Calderonee098dc72008-03-06 18:36:19 -0500270 name = self._x509name(commonName="foo", emailAddress="bar@example.com")
Jean-Paul Calderoneeff3cd92008-03-05 22:35:26 -0500271
272 copy = X509Name(name)
273 self.assertEqual(copy.commonName, "foo")
274 self.assertEqual(copy.emailAddress, "bar@example.com")
Jean-Paul Calderonee098dc72008-03-06 18:36:19 -0500275
276 # Mutate the copy and ensure the original is unmodified.
Jean-Paul Calderoneeff3cd92008-03-05 22:35:26 -0500277 copy.commonName = "baz"
278 self.assertEqual(name.commonName, "foo")
Jean-Paul Calderonee098dc72008-03-06 18:36:19 -0500279
280 # Mutate the original and ensure the copy is unmodified.
Jean-Paul Calderoneeff3cd92008-03-05 22:35:26 -0500281 name.emailAddress = "quux@example.com"
282 self.assertEqual(copy.emailAddress, "bar@example.com")
283
Jean-Paul Calderonee098dc72008-03-06 18:36:19 -0500284
285 def test_repr(self):
286 """
287 L{repr} passed an L{X509NameType} instance should return a string
288 containing a description of the type and the NIDs which have been set
289 on it.
290 """
291 name = self._x509name(commonName="foo", emailAddress="bar")
292 self.assertEqual(
293 repr(name),
294 "<X509Name object '/emailAddress=bar/CN=foo'>")
295
296
297 def test_comparison(self):
298 """
299 L{X509NameType} instances should compare based on their NIDs.
300 """
301 def _equality(a, b, assertTrue, assertFalse):
302 assertTrue(a == b, "(%r == %r) --> False" % (a, b))
303 assertFalse(a != b)
304 assertTrue(b == a)
305 assertFalse(b != a)
306
307 def assertEqual(a, b):
308 _equality(a, b, self.assertTrue, self.assertFalse)
309
310 # Instances compare equal to themselves.
311 name = self._x509name()
312 assertEqual(name, name)
313
314 # Empty instances should compare equal to each other.
315 assertEqual(self._x509name(), self._x509name())
316
317 # Instances with equal NIDs should compare equal to each other.
318 assertEqual(self._x509name(commonName="foo"),
319 self._x509name(commonName="foo"))
320
321 # Instance with equal NIDs set using different aliases should compare
322 # equal to each other.
323 assertEqual(self._x509name(commonName="foo"),
324 self._x509name(CN="foo"))
325
326 # Instances with more than one NID with the same values should compare
327 # equal to each other.
328 assertEqual(self._x509name(CN="foo", organizationalUnitName="bar"),
329 self._x509name(commonName="foo", OU="bar"))
330
331 def assertNotEqual(a, b):
332 _equality(a, b, self.assertFalse, self.assertTrue)
333
334 # Instances with different values for the same NID should not compare
335 # equal to each other.
336 assertNotEqual(self._x509name(CN="foo"),
337 self._x509name(CN="bar"))
338
339 # Instances with different NIDs should not compare equal to each other.
340 assertNotEqual(self._x509name(CN="foo"),
341 self._x509name(OU="foo"))
342
343 def _inequality(a, b, assertTrue, assertFalse):
344 assertTrue(a < b)
345 assertTrue(a <= b)
346 assertTrue(b > a)
347 assertTrue(b >= a)
348 assertFalse(a > b)
349 assertFalse(a >= b)
350 assertFalse(b < a)
351 assertFalse(b <= a)
352
353 def assertLessThan(a, b):
354 _inequality(a, b, self.assertTrue, self.assertFalse)
355
356 # An X509Name with a NID with a value which sorts less than the value
357 # of the same NID on another X509Name compares less than the other
358 # X509Name.
359 assertLessThan(self._x509name(CN="abc"),
360 self._x509name(CN="def"))
361
362 def assertGreaterThan(a, b):
363 _inequality(a, b, self.assertFalse, self.assertTrue)
364
365 # An X509Name with a NID with a value which sorts greater than the
366 # value of the same NID on another X509Name compares greater than the
367 # other X509Name.
368 assertGreaterThan(self._x509name(CN="def"),
369 self._x509name(CN="abc"))
Jean-Paul Calderone2aa2b332008-03-06 21:43:14 -0500370
371
Jean-Paul Calderone110cd092008-03-24 17:27:42 -0400372 def test_hash(self):
373 """
374 L{X509Name.hash} returns an integer hash based on the value of the
375 name.
376 """
377 a = self._x509name(CN="foo")
378 b = self._x509name(CN="foo")
379 self.assertEqual(a.hash(), b.hash())
380 a.CN = "bar"
381 self.assertNotEqual(a.hash(), b.hash())
382
383
Jean-Paul Calderonee957a002008-03-25 15:16:51 -0400384 def test_der(self):
385 """
386 L{X509Name.der} returns the DER encoded form of the name.
387 """
388 a = self._x509name(CN="foo", C="US")
389 self.assertEqual(
390 a.der(),
391 '0\x1b1\x0b0\t\x06\x03U\x04\x06\x13\x02US'
392 '1\x0c0\n\x06\x03U\x04\x03\x13\x03foo')
393
394
Jean-Paul Calderonec54cc182008-03-26 21:11:07 -0400395 def test_get_components(self):
396 """
397 L{X509Name.get_components} returns a C{list} of two-tuples of C{str}
398 giving the NIDs and associated values which make up the name.
399 """
400 a = self._x509name()
401 self.assertEqual(a.get_components(), [])
402 a.CN = "foo"
403 self.assertEqual(a.get_components(), [("CN", "foo")])
404 a.organizationalUnitName = "bar"
405 self.assertEqual(
406 a.get_components(),
407 [("CN", "foo"), ("OU", "bar")])
408
Jean-Paul Calderone110cd092008-03-24 17:27:42 -0400409
Jean-Paul Calderoneac0d95f2008-03-10 00:00:42 -0400410class _PKeyInteractionTestsMixin:
411 """
412 Tests which involve another thing and a PKey.
413 """
414 def signable(self):
415 """
416 Return something with a C{set_pubkey}, C{set_pubkey}, and C{sign} method.
417 """
418 raise NotImplementedError()
419
420
421 def test_signWithUngenerated(self):
422 """
423 L{X509Req.sign} raises L{ValueError} when pass a L{PKey} with no parts.
424 """
425 request = self.signable()
426 key = PKey()
427 self.assertRaises(ValueError, request.sign, key, 'MD5')
428
429
430 def test_signWithPublicKey(self):
431 """
432 L{X509Req.sign} raises L{ValueError} when pass a L{PKey} with no
433 private part as the signing key.
434 """
435 request = self.signable()
436 key = PKey()
437 key.generate_key(TYPE_RSA, 512)
438 request.set_pubkey(key)
439 pub = request.get_pubkey()
440 self.assertRaises(ValueError, request.sign, pub, 'MD5')
441
442
443
444class X509ReqTests(TestCase, _PKeyInteractionTestsMixin, _Python23TestCaseHelper):
Jean-Paul Calderone2aa2b332008-03-06 21:43:14 -0500445 """
446 Tests for L{OpenSSL.crypto.X509Req}.
447 """
Jean-Paul Calderoneac0d95f2008-03-10 00:00:42 -0400448 def signable(self):
449 """
450 Create and return a new L{X509Req}.
451 """
452 return X509Req()
453
454
Jean-Paul Calderone2aa2b332008-03-06 21:43:14 -0500455 def test_construction(self):
456 """
457 L{X509Req} takes no arguments and returns an L{X509ReqType} instance.
458 """
459 request = X509Req()
460 self.assertTrue(
461 isinstance(request, X509ReqType),
462 "%r is of type %r, should be %r" % (request, type(request), X509ReqType))
463
464
Jean-Paul Calderone8dd19b82008-12-28 20:41:16 -0500465 def test_version(self):
466 """
467 L{X509ReqType.set_version} sets the X.509 version of the certificate
468 request. L{X509ReqType.get_version} returns the X.509 version of
469 the certificate request. The initial value of the version is 0.
470 """
471 request = X509Req()
472 self.assertEqual(request.get_version(), 0)
473 request.set_version(1)
474 self.assertEqual(request.get_version(), 1)
475 request.set_version(3)
476 self.assertEqual(request.get_version(), 3)
477
478
Jean-Paul Calderone2aa2b332008-03-06 21:43:14 -0500479 def test_get_subject(self):
480 """
481 L{X509ReqType.get_subject} returns an L{X509Name} for the subject of
482 the request and which is valid even after the request object is
483 otherwise dead.
484 """
485 request = X509Req()
486 subject = request.get_subject()
487 self.assertTrue(
488 isinstance(subject, X509NameType),
489 "%r is of type %r, should be %r" % (subject, type(subject), X509NameType))
490 subject.commonName = "foo"
491 self.assertEqual(request.get_subject().commonName, "foo")
492 del request
493 subject.commonName = "bar"
494 self.assertEqual(subject.commonName, "bar")
Jean-Paul Calderone78381d22008-03-06 23:35:22 -0500495
496
497
Jean-Paul Calderoneac0d95f2008-03-10 00:00:42 -0400498class X509Tests(TestCase, _PKeyInteractionTestsMixin, _Python23TestCaseHelper):
Jean-Paul Calderone78381d22008-03-06 23:35:22 -0500499 """
500 Tests for L{OpenSSL.crypto.X509}.
501 """
Jean-Paul Calderone5ef86512008-04-26 19:06:28 -0400502 pemData = cleartextCertificatePEM + cleartextPrivateKeyPEM
Jean-Paul Calderone8114b452008-03-25 15:27:59 -0400503
Jean-Paul Calderoneac0d95f2008-03-10 00:00:42 -0400504 def signable(self):
505 """
506 Create and return a new L{X509}.
507 """
508 return X509()
509
510
Jean-Paul Calderone78381d22008-03-06 23:35:22 -0500511 def test_construction(self):
512 """
513 L{X509} takes no arguments and returns an instance of L{X509Type}.
514 """
515 certificate = X509()
516 self.assertTrue(
517 isinstance(certificate, X509Type),
518 "%r is of type %r, should be %r" % (certificate,
519 type(certificate),
520 X509Type))
521
522
523 def test_serial_number(self):
524 """
525 The serial number of an L{X509Type} can be retrieved and modified with
526 L{X509Type.get_serial_number} and L{X509Type.set_serial_number}.
527 """
528 certificate = X509()
529 self.assertRaises(TypeError, certificate.set_serial_number)
530 self.assertRaises(TypeError, certificate.set_serial_number, 1, 2)
531 self.assertRaises(TypeError, certificate.set_serial_number, "1")
532 self.assertRaises(TypeError, certificate.set_serial_number, 5.5)
533 self.assertEqual(certificate.get_serial_number(), 0)
534 certificate.set_serial_number(1)
535 self.assertEqual(certificate.get_serial_number(), 1)
536 certificate.set_serial_number(2 ** 32 + 1)
537 self.assertEqual(certificate.get_serial_number(), 2 ** 32 + 1)
538 certificate.set_serial_number(2 ** 64 + 1)
539 self.assertEqual(certificate.get_serial_number(), 2 ** 64 + 1)
Jean-Paul Calderone525ef802008-03-09 20:39:42 -0400540 certificate.set_serial_number(2 ** 128 + 1)
541 self.assertEqual(certificate.get_serial_number(), 2 ** 128 + 1)
542
543
544 def _setBoundTest(self, which):
545 """
546 L{X509Type.set_notBefore} takes a string in the format of an ASN1
547 GENERALIZEDTIME and sets the beginning of the certificate's validity
548 period to it.
549 """
550 certificate = X509()
551 set = getattr(certificate, 'set_not' + which)
552 get = getattr(certificate, 'get_not' + which)
553
Jean-Paul Calderonee0615b52008-03-09 21:44:46 -0400554 # Starts with no value.
555 self.assertEqual(get(), None)
556
Jean-Paul Calderone525ef802008-03-09 20:39:42 -0400557 # GMT (Or is it UTC?) -exarkun
558 when = "20040203040506Z"
559 set(when)
560 self.assertEqual(get(), when)
561
562 # A plus two hours and thirty minutes offset
563 when = "20040203040506+0530"
564 set(when)
565 self.assertEqual(get(), when)
566
567 # A minus one hour fifteen minutes offset
568 when = "20040203040506-0115"
569 set(when)
570 self.assertEqual(get(), when)
571
572 # An invalid string results in a ValueError
573 self.assertRaises(ValueError, set, "foo bar")
574
575
576 def test_set_notBefore(self):
577 """
578 L{X509Type.set_notBefore} takes a string in the format of an ASN1
579 GENERALIZEDTIME and sets the beginning of the certificate's validity
580 period to it.
581 """
582 self._setBoundTest("Before")
583
584
585 def test_set_notAfter(self):
586 """
587 L{X509Type.set_notAfter} takes a string in the format of an ASN1
588 GENERALIZEDTIME and sets the end of the certificate's validity period
589 to it.
590 """
591 self._setBoundTest("After")
Jean-Paul Calderone76576d52008-03-24 16:04:46 -0400592
593
Jean-Paul Calderone38a646d2008-03-25 15:16:18 -0400594 def test_get_notBefore(self):
595 """
596 L{X509Type.get_notBefore} returns a string in the format of an ASN1
597 GENERALIZEDTIME even for certificates which store it as UTCTIME
598 internally.
599 """
Jean-Paul Calderone8114b452008-03-25 15:27:59 -0400600 cert = load_certificate(FILETYPE_PEM, self.pemData)
Jean-Paul Calderone38a646d2008-03-25 15:16:18 -0400601 self.assertEqual(cert.get_notBefore(), "20080325190413Z")
602
603
604 def test_get_notAfter(self):
605 """
606 L{X509Type.get_notAfter} returns a string in the format of an ASN1
607 GENERALIZEDTIME even for certificates which store it as UTCTIME
608 internally.
609 """
Jean-Paul Calderone8114b452008-03-25 15:27:59 -0400610 cert = load_certificate(FILETYPE_PEM, self.pemData)
Jean-Paul Calderone38a646d2008-03-25 15:16:18 -0400611 self.assertEqual(cert.get_notAfter(), "20090325190413Z")
612
613
Jean-Paul Calderone76576d52008-03-24 16:04:46 -0400614 def test_digest(self):
615 """
616 L{X509.digest} returns a string giving ":"-separated hex-encoded words
617 of the digest of the certificate.
618 """
619 cert = X509()
620 self.assertEqual(
621 cert.digest("md5"),
622 "A8:EB:07:F8:53:25:0A:F2:56:05:C5:A5:C4:C4:C7:15")
Jean-Paul Calderone828c9cb2008-04-26 18:06:54 -0400623
624
625
Jean-Paul Calderone6fe60c22008-04-26 20:04:53 -0400626class FunctionTests(TestCase, _Python23TestCaseHelper):
Jean-Paul Calderone828c9cb2008-04-26 18:06:54 -0400627 """
628 Tests for free-functions in the L{OpenSSL.crypto} module.
629 """
630 def test_load_privatekey_wrongPassphrase(self):
631 """
632 L{load_privatekey} raises L{OpenSSL.crypto.Error} when it is passed an
633 encrypted PEM and an incorrect passphrase.
634 """
635 self.assertRaises(
636 Error,
637 load_privatekey, FILETYPE_PEM, encryptedPrivateKeyPEM, "quack")
638
639
640 def test_load_privatekey_passphrase(self):
641 """
642 L{load_privatekey} can create a L{PKey} object from an encrypted PEM
643 string if given the passphrase.
644 """
645 key = load_privatekey(
646 FILETYPE_PEM, encryptedPrivateKeyPEM,
647 encryptedPrivateKeyPEMPassphrase)
648 self.assertTrue(isinstance(key, PKeyType))
649
650
651 def test_load_privatekey_wrongPassphraseCallback(self):
652 """
653 L{load_privatekey} raises L{OpenSSL.crypto.Error} when it is passed an
654 encrypted PEM and a passphrase callback which returns an incorrect
655 passphrase.
656 """
657 called = []
658 def cb(*a):
659 called.append(None)
660 return "quack"
661 self.assertRaises(
662 Error,
663 load_privatekey, FILETYPE_PEM, encryptedPrivateKeyPEM, cb)
664 self.assertTrue(called)
665
666 def test_load_privatekey_passphraseCallback(self):
667 """
668 L{load_privatekey} can create a L{PKey} object from an encrypted PEM
669 string if given a passphrase callback which returns the correct
670 password.
671 """
672 called = []
673 def cb(writing):
674 called.append(writing)
675 return encryptedPrivateKeyPEMPassphrase
676 key = load_privatekey(FILETYPE_PEM, encryptedPrivateKeyPEM, cb)
677 self.assertTrue(isinstance(key, PKeyType))
678 self.assertEqual(called, [False])
679
680
681 def test_dump_privatekey_passphrase(self):
682 """
683 L{dump_privatekey} writes an encrypted PEM when given a passphrase.
684 """
685 passphrase = "foo"
686 key = load_privatekey(FILETYPE_PEM, cleartextPrivateKeyPEM)
687 pem = dump_privatekey(FILETYPE_PEM, key, "blowfish", passphrase)
688 self.assertTrue(isinstance(pem, str))
689 loadedKey = load_privatekey(FILETYPE_PEM, pem, passphrase)
690 self.assertTrue(isinstance(loadedKey, PKeyType))
691 self.assertEqual(loadedKey.type(), key.type())
692 self.assertEqual(loadedKey.bits(), key.bits())
693
694
695 def test_dump_privatekey_passphraseCallback(self):
696 """
697 L{dump_privatekey} writes an encrypted PEM when given a callback which
698 returns the correct passphrase.
699 """
700 passphrase = "foo"
701 called = []
702 def cb(writing):
703 called.append(writing)
704 return passphrase
705 key = load_privatekey(FILETYPE_PEM, cleartextPrivateKeyPEM)
706 pem = dump_privatekey(FILETYPE_PEM, key, "blowfish", cb)
707 self.assertTrue(isinstance(pem, str))
708 self.assertEqual(called, [True])
709 loadedKey = load_privatekey(FILETYPE_PEM, pem, passphrase)
710 self.assertTrue(isinstance(loadedKey, PKeyType))
711 self.assertEqual(loadedKey.type(), key.type())
712 self.assertEqual(loadedKey.bits(), key.bits())