blob: 1b4b9108eb27e2c7d34ff681a384a6023ec280ec [file] [log] [blame]
Jean-Paul Calderone8b63d452008-03-21 18:31:12 -04001# Copyright (C) Jean-Paul Calderone 2008, All rights reserved
2
Jean-Paul Calderoned8782ad2008-03-04 23:39:59 -05003"""
4Unit tests for L{OpenSSL.crypto}.
5"""
6
Rick Dean5b7b6372009-04-01 11:34:06 -05007from unittest import TestCase, main
Jean-Paul Calderoned8782ad2008-03-04 23:39:59 -05008
9from OpenSSL.crypto import TYPE_RSA, TYPE_DSA, Error, PKey, PKeyType
Jean-Paul Calderone78381d22008-03-06 23:35:22 -050010from OpenSSL.crypto import X509, X509Type, X509Name, X509NameType
Jean-Paul Calderone2aa2b332008-03-06 21:43:14 -050011from OpenSSL.crypto import X509Req, X509ReqType
Jean-Paul Calderonee7db4b42008-12-31 13:39:24 -050012from OpenSSL.crypto import X509Extension, X509ExtensionType
Jean-Paul Calderone828c9cb2008-04-26 18:06:54 -040013from OpenSSL.crypto import FILETYPE_PEM, load_certificate, load_privatekey
Rick Dean5b7b6372009-04-01 11:34:06 -050014from OpenSSL.crypto import FILETYPE_PEM, FILETYPE_ASN1
15from OpenSSL.crypto import FILETYPE_TEXT
16from OpenSSL.crypto import load_certificate, load_privatekey
17from OpenSSL.crypto import load_certificate_request
18from OpenSSL.crypto import dump_certificate, dump_privatekey
19from OpenSSL.crypto import dump_certificate_request
20from subprocess import Popen, PIPE
Jean-Paul Calderone828c9cb2008-04-26 18:06:54 -040021from OpenSSL.crypto import dump_privatekey
22
23
Jean-Paul Calderone20131f52009-04-01 12:05:45 -040024cleartextCertificatePEM = """-----BEGIN CERTIFICATE-----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41-----END CERTIFICATE-----
42"""
Jean-Paul Calderone828c9cb2008-04-26 18:06:54 -040043
Jean-Paul Calderone20131f52009-04-01 12:05:45 -040044cleartextPrivateKeyPEM = """-----BEGIN RSA PRIVATE KEY-----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58-----END RSA PRIVATE KEY-----
59"""
Jean-Paul Calderone828c9cb2008-04-26 18:06:54 -040060
Rick Dean5b7b6372009-04-01 11:34:06 -050061cleartextCertificateRequestPEM = (
62 "-----BEGIN CERTIFICATE REQUEST-----\n"
63 "MIIBnjCCAQcCAQAwXjELMAkGA1UEBhMCVVMxCzAJBgNVBAgTAklMMRAwDgYDVQQH\n"
64 "EwdDaGljYWdvMRcwFQYDVQQKEw5NeSBDb21wYW55IEx0ZDEXMBUGA1UEAxMORnJl\n"
65 "ZGVyaWNrIERlYW4wgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBANp6Y17WzKSw\n"
66 "BsUWkXdqg6tnXy8H8hA1msCMWpc+/2KJ4mbv5NyD6UD+/SqagQqulPbF/DFea9nA\n"
67 "E0zhmHJELcM8gUTIlXv/cgDWnmK4xj8YkjVUiCdqKRAKeuzLG1pGmwwF5lGeJpXN\n"
68 "xQn5ecR0UYSOWj6TTGXB9VyUMQzCClcBAgMBAAGgADANBgkqhkiG9w0BAQUFAAOB\n"
69 "gQAAJGuF/R/GGbeC7FbFW+aJgr9ee0Xbl6nlhu7pTe67k+iiKT2dsl2ti68MVTnu\n"
70 "Vrb3HUNqOkiwsJf6kCtq5oPn3QVYzTa76Dt2y3Rtzv6boRSlmlfrgS92GNma8JfR\n"
71 "oICQk3nAudi6zl1Dix3BCv1pUp5KMtGn3MeDEi6QFGy2rA==\n"
72 "-----END CERTIFICATE REQUEST-----\n")
73
Jean-Paul Calderone20131f52009-04-01 12:05:45 -040074encryptedPrivateKeyPEM = """-----BEGIN RSA PRIVATE KEY-----
75Proc-Type: 4,ENCRYPTED
76DEK-Info: DES-EDE3-CBC,9573604A18579E9E
Jean-Paul Calderone5ef86512008-04-26 19:06:28 -040077
Jean-Paul Calderone20131f52009-04-01 12:05:45 -040078SHOho56WxDkT0ht10UTeKc0F5u8cqIa01kzFAmETw0MAs8ezYtK15NPdCXUm3X/2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91-----END RSA PRIVATE KEY-----
92"""
Jean-Paul Calderone828c9cb2008-04-26 18:06:54 -040093encryptedPrivateKeyPEMPassphrase = "foobar"
94
95
Jean-Paul Calderoneac930e12008-03-06 18:50:51 -050096class _Python23TestCaseHelper:
Jean-Paul Calderone7da26a72008-03-06 00:35:20 -050097 # Python 2.3 compatibility.
98 def assertTrue(self, *a, **kw):
99 return self.failUnless(*a, **kw)
100
101
Jean-Paul Calderone7535dab2008-03-06 18:53:11 -0500102 def assertFalse(self, *a, **kw):
103 return self.failIf(*a, **kw)
104
105
Jean-Paul Calderone391585f2008-12-31 14:36:31 -0500106
Jean-Paul Calderonee7db4b42008-12-31 13:39:24 -0500107class X509ExtTests(TestCase, _Python23TestCaseHelper):
108 def test_construction(self):
109 """
110 L{X509Extension} accepts an extension type name, a critical flag,
111 and an extension value and returns an L{X509ExtensionType} instance.
112 """
Jean-Paul Calderone2ee1e7c2008-12-31 14:58:38 -0500113 basic = X509Extension('basicConstraints', True, 'CA:true')
Jean-Paul Calderonee7db4b42008-12-31 13:39:24 -0500114 self.assertTrue(
115 isinstance(basic, X509ExtensionType),
116 "%r is of type %r, should be %r" % (
117 basic, type(basic), X509ExtensionType))
118
Jean-Paul Calderone2ee1e7c2008-12-31 14:58:38 -0500119 comment = X509Extension('nsComment', False, 'pyOpenSSL unit test')
Jean-Paul Calderonee7db4b42008-12-31 13:39:24 -0500120 self.assertTrue(
121 isinstance(comment, X509ExtensionType),
122 "%r is of type %r, should be %r" % (
123 comment, type(comment), X509ExtensionType))
124
125
Jean-Paul Calderone391585f2008-12-31 14:36:31 -0500126 def test_invalid_extension(self):
127 """
128 L{X509Extension} raises something if it is passed a bad extension
129 name or value.
130 """
131 self.assertRaises(
132 Error, X509Extension, 'thisIsMadeUp', False, 'hi')
133 self.assertRaises(
134 Error, X509Extension, 'basicConstraints', False, 'blah blah')
135
Jean-Paul Calderone2ee1e7c2008-12-31 14:58:38 -0500136 # Exercise a weird one (an extension which uses the r2i method). This
137 # exercises the codepath that requires a non-NULL ctx to be passed to
138 # X509V3_EXT_nconf. It can't work now because we provide no
139 # configuration database. It might be made to work in the future.
140 self.assertRaises(
141 Error, X509Extension, 'proxyCertInfo', True,
142 'language:id-ppl-anyLanguage,pathlen:1,policy:text:AB')
143
Jean-Paul Calderone391585f2008-12-31 14:36:31 -0500144
Jean-Paul Calderonee7db4b42008-12-31 13:39:24 -0500145 def test_get_critical(self):
146 """
147 L{X509ExtensionType.get_critical} returns the value of the
148 extension's critical flag.
149 """
Jean-Paul Calderone2ee1e7c2008-12-31 14:58:38 -0500150 ext = X509Extension('basicConstraints', True, 'CA:true')
Jean-Paul Calderonee7db4b42008-12-31 13:39:24 -0500151 self.assertTrue(ext.get_critical())
Jean-Paul Calderone2ee1e7c2008-12-31 14:58:38 -0500152 ext = X509Extension('basicConstraints', False, 'CA:true')
Jean-Paul Calderonee7db4b42008-12-31 13:39:24 -0500153 self.assertFalse(ext.get_critical())
154
Jean-Paul Calderone7535dab2008-03-06 18:53:11 -0500155
Jean-Paul Calderonef8c5fab2008-12-31 15:53:48 -0500156 def test_get_short_name(self):
157 """
158 L{X509ExtensionType.get_short_name} returns a string giving the short
159 type name of the extension.
160 """
161 ext = X509Extension('basicConstraints', True, 'CA:true')
162 self.assertEqual(ext.get_short_name(), 'basicConstraints')
163 ext = X509Extension('nsComment', True, 'foo bar')
164 self.assertEqual(ext.get_short_name(), 'nsComment')
165
166
Jean-Paul Calderone391585f2008-12-31 14:36:31 -0500167
Jean-Paul Calderoneac930e12008-03-06 18:50:51 -0500168class PKeyTests(TestCase, _Python23TestCaseHelper):
169 """
170 Unit tests for L{OpenSSL.crypto.PKey}.
171 """
Jean-Paul Calderoned8782ad2008-03-04 23:39:59 -0500172 def test_construction(self):
173 """
174 L{PKey} takes no arguments and returns a new L{PKeyType} instance.
175 """
176 self.assertRaises(TypeError, PKey, None)
177 key = PKey()
178 self.assertTrue(
179 isinstance(key, PKeyType),
180 "%r is of type %r, should be %r" % (key, type(key), PKeyType))
181
182
183 def test_pregeneration(self):
184 """
185 L{PKeyType.bits} and L{PKeyType.type} return C{0} before the key is
186 generated.
187 """
188 key = PKey()
189 self.assertEqual(key.type(), 0)
190 self.assertEqual(key.bits(), 0)
191
192
193 def test_failedGeneration(self):
194 """
Jean-Paul Calderoneab82db72008-03-06 00:09:31 -0500195 L{PKeyType.generate_key} takes two arguments, the first giving the key
196 type as one of L{TYPE_RSA} or L{TYPE_DSA} and the second giving the
197 number of bits to generate. If an invalid type is specified or
198 generation fails, L{Error} is raised. If an invalid number of bits is
199 specified, L{ValueError} or L{Error} is raised.
Jean-Paul Calderoned8782ad2008-03-04 23:39:59 -0500200 """
201 key = PKey()
202 self.assertRaises(TypeError, key.generate_key)
203 self.assertRaises(TypeError, key.generate_key, 1, 2, 3)
204 self.assertRaises(TypeError, key.generate_key, "foo", "bar")
205 self.assertRaises(Error, key.generate_key, -1, 0)
Jean-Paul Calderoneab82db72008-03-06 00:09:31 -0500206
Jean-Paul Calderoneab82db72008-03-06 00:09:31 -0500207 self.assertRaises(ValueError, key.generate_key, TYPE_RSA, -1)
208 self.assertRaises(ValueError, key.generate_key, TYPE_RSA, 0)
Jean-Paul Calderoned71fe982008-03-06 00:31:50 -0500209
210 # XXX RSA generation for small values of bits is fairly buggy in a wide
211 # range of OpenSSL versions. I need to figure out what the safe lower
212 # bound for a reasonable number of OpenSSL versions is and explicitly
213 # check for that in the wrapper. The failure behavior is typically an
214 # infinite loop inside OpenSSL.
215
216 # self.assertRaises(Error, key.generate_key, TYPE_RSA, 2)
Jean-Paul Calderoned8782ad2008-03-04 23:39:59 -0500217
218 # XXX DSA generation seems happy with any number of bits. The DSS
219 # says bits must be between 512 and 1024 inclusive. OpenSSL's DSA
220 # generator doesn't seem to care about the upper limit at all. For
Jean-Paul Calderoneeff3cd92008-03-05 22:35:26 -0500221 # the lower limit, it uses 512 if anything smaller is specified.
Jean-Paul Calderoned8782ad2008-03-04 23:39:59 -0500222 # So, it doesn't seem possible to make generate_key fail for
223 # TYPE_DSA with a bits argument which is at least an int.
224
225 # self.assertRaises(Error, key.generate_key, TYPE_DSA, -7)
226
227
228 def test_rsaGeneration(self):
229 """
230 L{PKeyType.generate_key} generates an RSA key when passed
231 L{TYPE_RSA} as a type and a reasonable number of bits.
232 """
233 bits = 128
234 key = PKey()
235 key.generate_key(TYPE_RSA, bits)
236 self.assertEqual(key.type(), TYPE_RSA)
237 self.assertEqual(key.bits(), bits)
238
239
240 def test_dsaGeneration(self):
241 """
242 L{PKeyType.generate_key} generates a DSA key when passed
243 L{TYPE_DSA} as a type and a reasonable number of bits.
244 """
245 # 512 is a magic number. The DSS (Digital Signature Standard)
246 # allows a minimum of 512 bits for DSA. DSA_generate_parameters
247 # will silently promote any value below 512 to 512.
248 bits = 512
249 key = PKey()
250 key.generate_key(TYPE_DSA, bits)
251 self.assertEqual(key.type(), TYPE_DSA)
252 self.assertEqual(key.bits(), bits)
253
254
255 def test_regeneration(self):
256 """
257 L{PKeyType.generate_key} can be called multiple times on the same
258 key to generate new keys.
259 """
260 key = PKey()
261 for type, bits in [(TYPE_RSA, 512), (TYPE_DSA, 576)]:
262 key.generate_key(type, bits)
263 self.assertEqual(key.type(), type)
264 self.assertEqual(key.bits(), bits)
Jean-Paul Calderoneeff3cd92008-03-05 22:35:26 -0500265
266
267
Jean-Paul Calderoneac930e12008-03-06 18:50:51 -0500268class X509NameTests(TestCase, _Python23TestCaseHelper):
Jean-Paul Calderoneeff3cd92008-03-05 22:35:26 -0500269 """
270 Unit tests for L{OpenSSL.crypto.X509Name}.
271 """
Jean-Paul Calderonee098dc72008-03-06 18:36:19 -0500272 def _x509name(self, **attrs):
273 # XXX There's no other way to get a new X509Name yet.
274 name = X509().get_subject()
275 attrs = attrs.items()
276 # Make the order stable - order matters!
277 attrs.sort(lambda (k1, v1), (k2, v2): cmp(v1, v2))
278 for k, v in attrs:
279 setattr(name, k, v)
280 return name
281
282
Jean-Paul Calderoneeff3cd92008-03-05 22:35:26 -0500283 def test_attributes(self):
284 """
285 L{X509NameType} instances have attributes for each standard (?)
286 X509Name field.
287 """
Jean-Paul Calderonee098dc72008-03-06 18:36:19 -0500288 name = self._x509name()
Jean-Paul Calderoneeff3cd92008-03-05 22:35:26 -0500289 name.commonName = "foo"
290 self.assertEqual(name.commonName, "foo")
291 self.assertEqual(name.CN, "foo")
292 name.CN = "baz"
293 self.assertEqual(name.commonName, "baz")
294 self.assertEqual(name.CN, "baz")
295 name.commonName = "bar"
296 self.assertEqual(name.commonName, "bar")
297 self.assertEqual(name.CN, "bar")
298 name.CN = "quux"
299 self.assertEqual(name.commonName, "quux")
300 self.assertEqual(name.CN, "quux")
301
302
Jean-Paul Calderoneeff3cd92008-03-05 22:35:26 -0500303 def test_copy(self):
304 """
305 L{X509Name} creates a new L{X509NameType} instance with all the same
306 attributes as an existing L{X509NameType} instance when called with
307 one.
308 """
Jean-Paul Calderonee098dc72008-03-06 18:36:19 -0500309 name = self._x509name(commonName="foo", emailAddress="bar@example.com")
Jean-Paul Calderoneeff3cd92008-03-05 22:35:26 -0500310
311 copy = X509Name(name)
312 self.assertEqual(copy.commonName, "foo")
313 self.assertEqual(copy.emailAddress, "bar@example.com")
Jean-Paul Calderonee098dc72008-03-06 18:36:19 -0500314
315 # Mutate the copy and ensure the original is unmodified.
Jean-Paul Calderoneeff3cd92008-03-05 22:35:26 -0500316 copy.commonName = "baz"
317 self.assertEqual(name.commonName, "foo")
Jean-Paul Calderonee098dc72008-03-06 18:36:19 -0500318
319 # Mutate the original and ensure the copy is unmodified.
Jean-Paul Calderoneeff3cd92008-03-05 22:35:26 -0500320 name.emailAddress = "quux@example.com"
321 self.assertEqual(copy.emailAddress, "bar@example.com")
322
Jean-Paul Calderonee098dc72008-03-06 18:36:19 -0500323
324 def test_repr(self):
325 """
326 L{repr} passed an L{X509NameType} instance should return a string
327 containing a description of the type and the NIDs which have been set
328 on it.
329 """
330 name = self._x509name(commonName="foo", emailAddress="bar")
331 self.assertEqual(
332 repr(name),
333 "<X509Name object '/emailAddress=bar/CN=foo'>")
334
335
336 def test_comparison(self):
337 """
338 L{X509NameType} instances should compare based on their NIDs.
339 """
340 def _equality(a, b, assertTrue, assertFalse):
341 assertTrue(a == b, "(%r == %r) --> False" % (a, b))
342 assertFalse(a != b)
343 assertTrue(b == a)
344 assertFalse(b != a)
345
346 def assertEqual(a, b):
347 _equality(a, b, self.assertTrue, self.assertFalse)
348
349 # Instances compare equal to themselves.
350 name = self._x509name()
351 assertEqual(name, name)
352
353 # Empty instances should compare equal to each other.
354 assertEqual(self._x509name(), self._x509name())
355
356 # Instances with equal NIDs should compare equal to each other.
357 assertEqual(self._x509name(commonName="foo"),
358 self._x509name(commonName="foo"))
359
360 # Instance with equal NIDs set using different aliases should compare
361 # equal to each other.
362 assertEqual(self._x509name(commonName="foo"),
363 self._x509name(CN="foo"))
364
365 # Instances with more than one NID with the same values should compare
366 # equal to each other.
367 assertEqual(self._x509name(CN="foo", organizationalUnitName="bar"),
368 self._x509name(commonName="foo", OU="bar"))
369
370 def assertNotEqual(a, b):
371 _equality(a, b, self.assertFalse, self.assertTrue)
372
373 # Instances with different values for the same NID should not compare
374 # equal to each other.
375 assertNotEqual(self._x509name(CN="foo"),
376 self._x509name(CN="bar"))
377
378 # Instances with different NIDs should not compare equal to each other.
379 assertNotEqual(self._x509name(CN="foo"),
380 self._x509name(OU="foo"))
381
382 def _inequality(a, b, assertTrue, assertFalse):
383 assertTrue(a < b)
384 assertTrue(a <= b)
385 assertTrue(b > a)
386 assertTrue(b >= a)
387 assertFalse(a > b)
388 assertFalse(a >= b)
389 assertFalse(b < a)
390 assertFalse(b <= a)
391
392 def assertLessThan(a, b):
393 _inequality(a, b, self.assertTrue, self.assertFalse)
394
395 # An X509Name with a NID with a value which sorts less than the value
396 # of the same NID on another X509Name compares less than the other
397 # X509Name.
398 assertLessThan(self._x509name(CN="abc"),
399 self._x509name(CN="def"))
400
401 def assertGreaterThan(a, b):
402 _inequality(a, b, self.assertFalse, self.assertTrue)
403
404 # An X509Name with a NID with a value which sorts greater than the
405 # value of the same NID on another X509Name compares greater than the
406 # other X509Name.
407 assertGreaterThan(self._x509name(CN="def"),
408 self._x509name(CN="abc"))
Jean-Paul Calderone2aa2b332008-03-06 21:43:14 -0500409
410
Jean-Paul Calderone110cd092008-03-24 17:27:42 -0400411 def test_hash(self):
412 """
413 L{X509Name.hash} returns an integer hash based on the value of the
414 name.
415 """
416 a = self._x509name(CN="foo")
417 b = self._x509name(CN="foo")
418 self.assertEqual(a.hash(), b.hash())
419 a.CN = "bar"
420 self.assertNotEqual(a.hash(), b.hash())
421
422
Jean-Paul Calderonee957a002008-03-25 15:16:51 -0400423 def test_der(self):
424 """
425 L{X509Name.der} returns the DER encoded form of the name.
426 """
427 a = self._x509name(CN="foo", C="US")
428 self.assertEqual(
429 a.der(),
430 '0\x1b1\x0b0\t\x06\x03U\x04\x06\x13\x02US'
431 '1\x0c0\n\x06\x03U\x04\x03\x13\x03foo')
432
433
Jean-Paul Calderonec54cc182008-03-26 21:11:07 -0400434 def test_get_components(self):
435 """
436 L{X509Name.get_components} returns a C{list} of two-tuples of C{str}
437 giving the NIDs and associated values which make up the name.
438 """
439 a = self._x509name()
440 self.assertEqual(a.get_components(), [])
441 a.CN = "foo"
442 self.assertEqual(a.get_components(), [("CN", "foo")])
443 a.organizationalUnitName = "bar"
444 self.assertEqual(
445 a.get_components(),
446 [("CN", "foo"), ("OU", "bar")])
447
Jean-Paul Calderone110cd092008-03-24 17:27:42 -0400448
Jean-Paul Calderoneac0d95f2008-03-10 00:00:42 -0400449class _PKeyInteractionTestsMixin:
450 """
451 Tests which involve another thing and a PKey.
452 """
453 def signable(self):
454 """
455 Return something with a C{set_pubkey}, C{set_pubkey}, and C{sign} method.
456 """
457 raise NotImplementedError()
458
459
460 def test_signWithUngenerated(self):
461 """
462 L{X509Req.sign} raises L{ValueError} when pass a L{PKey} with no parts.
463 """
464 request = self.signable()
465 key = PKey()
466 self.assertRaises(ValueError, request.sign, key, 'MD5')
467
468
469 def test_signWithPublicKey(self):
470 """
471 L{X509Req.sign} raises L{ValueError} when pass a L{PKey} with no
472 private part as the signing key.
473 """
474 request = self.signable()
475 key = PKey()
476 key.generate_key(TYPE_RSA, 512)
477 request.set_pubkey(key)
478 pub = request.get_pubkey()
479 self.assertRaises(ValueError, request.sign, pub, 'MD5')
480
481
482
483class X509ReqTests(TestCase, _PKeyInteractionTestsMixin, _Python23TestCaseHelper):
Jean-Paul Calderone2aa2b332008-03-06 21:43:14 -0500484 """
485 Tests for L{OpenSSL.crypto.X509Req}.
486 """
Jean-Paul Calderoneac0d95f2008-03-10 00:00:42 -0400487 def signable(self):
488 """
489 Create and return a new L{X509Req}.
490 """
491 return X509Req()
492
493
Jean-Paul Calderone2aa2b332008-03-06 21:43:14 -0500494 def test_construction(self):
495 """
496 L{X509Req} takes no arguments and returns an L{X509ReqType} instance.
497 """
498 request = X509Req()
499 self.assertTrue(
500 isinstance(request, X509ReqType),
501 "%r is of type %r, should be %r" % (request, type(request), X509ReqType))
502
503
Jean-Paul Calderone8dd19b82008-12-28 20:41:16 -0500504 def test_version(self):
505 """
506 L{X509ReqType.set_version} sets the X.509 version of the certificate
507 request. L{X509ReqType.get_version} returns the X.509 version of
508 the certificate request. The initial value of the version is 0.
509 """
510 request = X509Req()
511 self.assertEqual(request.get_version(), 0)
512 request.set_version(1)
513 self.assertEqual(request.get_version(), 1)
514 request.set_version(3)
515 self.assertEqual(request.get_version(), 3)
516
517
Jean-Paul Calderone2aa2b332008-03-06 21:43:14 -0500518 def test_get_subject(self):
519 """
520 L{X509ReqType.get_subject} returns an L{X509Name} for the subject of
521 the request and which is valid even after the request object is
522 otherwise dead.
523 """
524 request = X509Req()
525 subject = request.get_subject()
526 self.assertTrue(
527 isinstance(subject, X509NameType),
528 "%r is of type %r, should be %r" % (subject, type(subject), X509NameType))
529 subject.commonName = "foo"
530 self.assertEqual(request.get_subject().commonName, "foo")
531 del request
532 subject.commonName = "bar"
533 self.assertEqual(subject.commonName, "bar")
Jean-Paul Calderone78381d22008-03-06 23:35:22 -0500534
535
536
Jean-Paul Calderoneac0d95f2008-03-10 00:00:42 -0400537class X509Tests(TestCase, _PKeyInteractionTestsMixin, _Python23TestCaseHelper):
Jean-Paul Calderone78381d22008-03-06 23:35:22 -0500538 """
539 Tests for L{OpenSSL.crypto.X509}.
540 """
Jean-Paul Calderone5ef86512008-04-26 19:06:28 -0400541 pemData = cleartextCertificatePEM + cleartextPrivateKeyPEM
Jean-Paul Calderone8114b452008-03-25 15:27:59 -0400542
Jean-Paul Calderoneac0d95f2008-03-10 00:00:42 -0400543 def signable(self):
544 """
545 Create and return a new L{X509}.
546 """
547 return X509()
548
549
Jean-Paul Calderone78381d22008-03-06 23:35:22 -0500550 def test_construction(self):
551 """
552 L{X509} takes no arguments and returns an instance of L{X509Type}.
553 """
554 certificate = X509()
555 self.assertTrue(
556 isinstance(certificate, X509Type),
557 "%r is of type %r, should be %r" % (certificate,
558 type(certificate),
559 X509Type))
560
561
562 def test_serial_number(self):
563 """
564 The serial number of an L{X509Type} can be retrieved and modified with
565 L{X509Type.get_serial_number} and L{X509Type.set_serial_number}.
566 """
567 certificate = X509()
568 self.assertRaises(TypeError, certificate.set_serial_number)
569 self.assertRaises(TypeError, certificate.set_serial_number, 1, 2)
570 self.assertRaises(TypeError, certificate.set_serial_number, "1")
571 self.assertRaises(TypeError, certificate.set_serial_number, 5.5)
572 self.assertEqual(certificate.get_serial_number(), 0)
573 certificate.set_serial_number(1)
574 self.assertEqual(certificate.get_serial_number(), 1)
575 certificate.set_serial_number(2 ** 32 + 1)
576 self.assertEqual(certificate.get_serial_number(), 2 ** 32 + 1)
577 certificate.set_serial_number(2 ** 64 + 1)
578 self.assertEqual(certificate.get_serial_number(), 2 ** 64 + 1)
Jean-Paul Calderone525ef802008-03-09 20:39:42 -0400579 certificate.set_serial_number(2 ** 128 + 1)
580 self.assertEqual(certificate.get_serial_number(), 2 ** 128 + 1)
581
582
583 def _setBoundTest(self, which):
584 """
585 L{X509Type.set_notBefore} takes a string in the format of an ASN1
586 GENERALIZEDTIME and sets the beginning of the certificate's validity
587 period to it.
588 """
589 certificate = X509()
590 set = getattr(certificate, 'set_not' + which)
591 get = getattr(certificate, 'get_not' + which)
592
Jean-Paul Calderonee0615b52008-03-09 21:44:46 -0400593 # Starts with no value.
594 self.assertEqual(get(), None)
595
Jean-Paul Calderone525ef802008-03-09 20:39:42 -0400596 # GMT (Or is it UTC?) -exarkun
597 when = "20040203040506Z"
598 set(when)
599 self.assertEqual(get(), when)
600
601 # A plus two hours and thirty minutes offset
602 when = "20040203040506+0530"
603 set(when)
604 self.assertEqual(get(), when)
605
606 # A minus one hour fifteen minutes offset
607 when = "20040203040506-0115"
608 set(when)
609 self.assertEqual(get(), when)
610
611 # An invalid string results in a ValueError
612 self.assertRaises(ValueError, set, "foo bar")
613
614
615 def test_set_notBefore(self):
616 """
617 L{X509Type.set_notBefore} takes a string in the format of an ASN1
618 GENERALIZEDTIME and sets the beginning of the certificate's validity
619 period to it.
620 """
621 self._setBoundTest("Before")
622
623
624 def test_set_notAfter(self):
625 """
626 L{X509Type.set_notAfter} takes a string in the format of an ASN1
627 GENERALIZEDTIME and sets the end of the certificate's validity period
628 to it.
629 """
630 self._setBoundTest("After")
Jean-Paul Calderone76576d52008-03-24 16:04:46 -0400631
632
Jean-Paul Calderone38a646d2008-03-25 15:16:18 -0400633 def test_get_notBefore(self):
634 """
635 L{X509Type.get_notBefore} returns a string in the format of an ASN1
636 GENERALIZEDTIME even for certificates which store it as UTCTIME
637 internally.
638 """
Jean-Paul Calderone8114b452008-03-25 15:27:59 -0400639 cert = load_certificate(FILETYPE_PEM, self.pemData)
Jean-Paul Calderone20131f52009-04-01 12:05:45 -0400640 self.assertEqual(cert.get_notBefore(), "20090325123658Z")
Jean-Paul Calderone38a646d2008-03-25 15:16:18 -0400641
642
643 def test_get_notAfter(self):
644 """
645 L{X509Type.get_notAfter} returns a string in the format of an ASN1
646 GENERALIZEDTIME even for certificates which store it as UTCTIME
647 internally.
648 """
Jean-Paul Calderone8114b452008-03-25 15:27:59 -0400649 cert = load_certificate(FILETYPE_PEM, self.pemData)
Jean-Paul Calderone20131f52009-04-01 12:05:45 -0400650 self.assertEqual(cert.get_notAfter(), "20170611123658Z")
Jean-Paul Calderone38a646d2008-03-25 15:16:18 -0400651
652
Jean-Paul Calderone76576d52008-03-24 16:04:46 -0400653 def test_digest(self):
654 """
655 L{X509.digest} returns a string giving ":"-separated hex-encoded words
656 of the digest of the certificate.
657 """
658 cert = X509()
659 self.assertEqual(
660 cert.digest("md5"),
661 "A8:EB:07:F8:53:25:0A:F2:56:05:C5:A5:C4:C4:C7:15")
Jean-Paul Calderone828c9cb2008-04-26 18:06:54 -0400662
663
664
Jean-Paul Calderone6fe60c22008-04-26 20:04:53 -0400665class FunctionTests(TestCase, _Python23TestCaseHelper):
Jean-Paul Calderone828c9cb2008-04-26 18:06:54 -0400666 """
667 Tests for free-functions in the L{OpenSSL.crypto} module.
668 """
669 def test_load_privatekey_wrongPassphrase(self):
670 """
671 L{load_privatekey} raises L{OpenSSL.crypto.Error} when it is passed an
672 encrypted PEM and an incorrect passphrase.
673 """
674 self.assertRaises(
675 Error,
676 load_privatekey, FILETYPE_PEM, encryptedPrivateKeyPEM, "quack")
677
678
679 def test_load_privatekey_passphrase(self):
680 """
681 L{load_privatekey} can create a L{PKey} object from an encrypted PEM
682 string if given the passphrase.
683 """
684 key = load_privatekey(
685 FILETYPE_PEM, encryptedPrivateKeyPEM,
686 encryptedPrivateKeyPEMPassphrase)
687 self.assertTrue(isinstance(key, PKeyType))
688
689
690 def test_load_privatekey_wrongPassphraseCallback(self):
691 """
692 L{load_privatekey} raises L{OpenSSL.crypto.Error} when it is passed an
693 encrypted PEM and a passphrase callback which returns an incorrect
694 passphrase.
695 """
696 called = []
697 def cb(*a):
698 called.append(None)
699 return "quack"
700 self.assertRaises(
701 Error,
702 load_privatekey, FILETYPE_PEM, encryptedPrivateKeyPEM, cb)
703 self.assertTrue(called)
704
705 def test_load_privatekey_passphraseCallback(self):
706 """
707 L{load_privatekey} can create a L{PKey} object from an encrypted PEM
708 string if given a passphrase callback which returns the correct
709 password.
710 """
711 called = []
712 def cb(writing):
713 called.append(writing)
714 return encryptedPrivateKeyPEMPassphrase
715 key = load_privatekey(FILETYPE_PEM, encryptedPrivateKeyPEM, cb)
716 self.assertTrue(isinstance(key, PKeyType))
717 self.assertEqual(called, [False])
718
719
720 def test_dump_privatekey_passphrase(self):
721 """
722 L{dump_privatekey} writes an encrypted PEM when given a passphrase.
723 """
724 passphrase = "foo"
725 key = load_privatekey(FILETYPE_PEM, cleartextPrivateKeyPEM)
726 pem = dump_privatekey(FILETYPE_PEM, key, "blowfish", passphrase)
727 self.assertTrue(isinstance(pem, str))
728 loadedKey = load_privatekey(FILETYPE_PEM, pem, passphrase)
729 self.assertTrue(isinstance(loadedKey, PKeyType))
730 self.assertEqual(loadedKey.type(), key.type())
731 self.assertEqual(loadedKey.bits(), key.bits())
732
Rick Dean5b7b6372009-04-01 11:34:06 -0500733 def test_dump_certificate(self):
734 """
735 L{dump_certificate} writes PEM, DER, and text.
736 """
737 pemData = cleartextCertificatePEM + cleartextPrivateKeyPEM
738 cert = load_certificate(FILETYPE_PEM, pemData)
739 dumped_pem = dump_certificate(FILETYPE_PEM, cert)
740 self.assertEqual(dumped_pem, cleartextCertificatePEM)
741 dumped_der = dump_certificate(FILETYPE_ASN1, cert)
742 good_der = Popen(["openssl", "x509", "-outform", "DER"], \
743 stdin=PIPE, stdout=PIPE).communicate(input=str(dumped_pem))[0]
744 self.assertEqual(dumped_der, good_der)
745 cert2 = load_certificate(FILETYPE_ASN1, dumped_der)
746 dumped_pem2 = dump_certificate(FILETYPE_PEM, cert2)
747 self.assertEqual(dumped_pem2, cleartextCertificatePEM)
748 dumped_text = dump_certificate(FILETYPE_TEXT, cert)
749 good_text = Popen(["openssl", "x509", "-noout", "-text"], \
750 stdin=PIPE, stdout=PIPE).communicate(input=str(dumped_pem))[0]
751 self.assertEqual(dumped_text, good_text)
752
753
754 def test_dump_privatekey(self):
755 """
756 L{dump_privatekey} writes a PEM, DER, and text.
757 """
758 key = load_privatekey(FILETYPE_PEM, cleartextPrivateKeyPEM)
759 dumped_pem = dump_privatekey(FILETYPE_PEM, key)
760 self.assertEqual(dumped_pem, cleartextPrivateKeyPEM)
761 dumped_der = dump_privatekey(FILETYPE_ASN1, key)
762 good_der = Popen(["openssl", "rsa", "-outform", "DER"], \
763 stdin=PIPE, stdout=PIPE).communicate(input=str(dumped_pem))[0]
764 self.assertEqual(dumped_der, good_der)
765 key2 = load_privatekey(FILETYPE_ASN1, dumped_der)
766 dumped_pem2 = dump_privatekey(FILETYPE_PEM, key2)
767 self.assertEqual(dumped_pem2, cleartextPrivateKeyPEM)
768 dumped_text = dump_privatekey(FILETYPE_TEXT, key)
769 good_text = Popen(["openssl", "rsa", "-noout", "-text"], \
770 stdin=PIPE, stdout=PIPE).communicate(input=str(dumped_pem))[0]
771 self.assertEqual(dumped_text, good_text)
772
773 def test_dump_certificate_request(self):
774 """
775 L{dump_certificate_request} writes a PEM, DER, and text.
776 """
777 req = load_certificate_request(FILETYPE_PEM, cleartextCertificateRequestPEM)
778 dumped_pem = dump_certificate_request(FILETYPE_PEM, req)
779 self.assertEqual(dumped_pem, cleartextCertificateRequestPEM)
780 dumped_der = dump_certificate_request(FILETYPE_ASN1, req)
781 good_der = Popen(["openssl", "req", "-outform", "DER"], \
782 stdin=PIPE, stdout=PIPE).communicate(input=str(dumped_pem))[0]
783 self.assertEqual(dumped_der, good_der)
784 req2 = load_certificate_request(FILETYPE_ASN1, dumped_der)
785 dumped_pem2 = dump_certificate_request(FILETYPE_PEM, req2)
786 self.assertEqual(dumped_pem2, cleartextCertificateRequestPEM)
787 dumped_text = dump_certificate_request(FILETYPE_TEXT, req)
788 good_text = Popen(["openssl", "req", "-noout", "-text"], \
789 stdin=PIPE, stdout=PIPE).communicate(input=str(dumped_pem))[0]
790 self.assertEqual(dumped_text, good_text)
791
Jean-Paul Calderone828c9cb2008-04-26 18:06:54 -0400792
793 def test_dump_privatekey_passphraseCallback(self):
794 """
795 L{dump_privatekey} writes an encrypted PEM when given a callback which
796 returns the correct passphrase.
797 """
798 passphrase = "foo"
799 called = []
800 def cb(writing):
801 called.append(writing)
802 return passphrase
803 key = load_privatekey(FILETYPE_PEM, cleartextPrivateKeyPEM)
804 pem = dump_privatekey(FILETYPE_PEM, key, "blowfish", cb)
805 self.assertTrue(isinstance(pem, str))
806 self.assertEqual(called, [True])
807 loadedKey = load_privatekey(FILETYPE_PEM, pem, passphrase)
808 self.assertTrue(isinstance(loadedKey, PKeyType))
809 self.assertEqual(loadedKey.type(), key.type())
810 self.assertEqual(loadedKey.bits(), key.bits())
Rick Dean5b7b6372009-04-01 11:34:06 -0500811
812
813if __name__ == '__main__':
814 main()
815