blob: ffc4f356ecd72e0452e640bbe202fda8ef4f8359 [file] [log] [blame]
Jean-Paul Calderone8b63d452008-03-21 18:31:12 -04001# Copyright (C) Jean-Paul Calderone 2008, All rights reserved
2
Jean-Paul Calderoned8782ad2008-03-04 23:39:59 -05003"""
4Unit tests for L{OpenSSL.crypto}.
5"""
6
7from unittest import TestCase
8
9from OpenSSL.crypto import TYPE_RSA, TYPE_DSA, Error, PKey, PKeyType
Jean-Paul Calderone78381d22008-03-06 23:35:22 -050010from OpenSSL.crypto import X509, X509Type, X509Name, X509NameType
Jean-Paul Calderone2aa2b332008-03-06 21:43:14 -050011from OpenSSL.crypto import X509Req, X509ReqType
Jean-Paul Calderone828c9cb2008-04-26 18:06:54 -040012from OpenSSL.crypto import FILETYPE_PEM, load_certificate, load_privatekey
13from OpenSSL.crypto import dump_privatekey
14
15
16cleartextPrivateKeyPEM = (
17 "-----BEGIN RSA PRIVATE KEY-----\n"
18 "MIICXAIBAAKBgQDaemNe1syksAbFFpF3aoOrZ18vB/IQNZrAjFqXPv9iieJm7+Tc\n"
19 "g+lA/v0qmoEKrpT2xfwxXmvZwBNM4ZhyRC3DPIFEyJV7/3IA1p5iuMY/GJI1VIgn\n"
20 "aikQCnrsyxtaRpsMBeZRniaVzcUJ+XnEdFGEjlo+k0xlwfVclDEMwgpXAQIDAQAB\n"
21 "AoGBALi0a7pMQqqgnriVAdpBVJveQtxSDVWi2/gZMKVZfzNheuSnv4amhtaKPKJ+\n"
22 "CMZtHkcazsE2IFvxRN/kgato9H3gJqq8nq2CkdpdLNVKBoxiCtkLfutdY4SQLtoY\n"
23 "USN7exk131pchsAJXYlR6mCW+ZP+E523cNwpPgsyKxVbmXSBAkEA9470fy2W0jFM\n"
24 "taZFslpntKSzbvn6JmdtjtvWrM1bBaeeqFiGBuQFYg46VaCUaeRWYw02jmYAsDYh\n"
25 "ZQavmXThaQJBAOHtlAQ0IJJEiMZr6vtVPH32fmbthSv1AUSYPzKqdlQrUnOXPQXu\n"
26 "z70cFoLG1TvPF5rBxbOkbQ/s8/ka5ZjPfdkCQCeC7YsO36+UpsWnUCBzRXITh4AC\n"
27 "7eYLQ/U1KUJTVF/GrQ/5cQrQgftwgecAxi9Qfmk4xqhbp2h4e0QAmS5I9WECQH02\n"
28 "0QwrX8nxFeTytr8pFGezj4a4KVCdb2B3CL+p3f70K7RIo9d/7b6frJI6ZL/LHQf2\n"
29 "UP4pKRDkgKsVDx7MELECQGm072/Z7vmb03h/uE95IYJOgY4nfmYs0QKA9Is18wUz\n"
30 "DpjfE33p0Ha6GO1VZRIQoqE24F8o5oimy3BEjryFuw4=\n"
31 "-----END RSA PRIVATE KEY-----\n")
32
33
Jean-Paul Calderone5ef86512008-04-26 19:06:28 -040034cleartextCertificatePEM = (
35 "-----BEGIN CERTIFICATE-----\n"
36 "MIICfTCCAeYCAQEwDQYJKoZIhvcNAQEEBQAwgYYxCzAJBgNVBAYTAlVTMRkwFwYD\n"
37 "VQQDExBweW9wZW5zc2wuc2YubmV0MREwDwYDVQQHEwhOZXcgWW9yazESMBAGA1UE\n"
38 "ChMJUHlPcGVuU1NMMREwDwYDVQQIEwhOZXcgWW9yazEQMA4GCSqGSIb3DQEJARYB\n"
39 "IDEQMA4GA1UECxMHVGVzdGluZzAeFw0wODAzMjUxOTA0MTNaFw0wOTAzMjUxOTA0\n"
40 "MTNaMIGGMQswCQYDVQQGEwJVUzEZMBcGA1UEAxMQcHlvcGVuc3NsLnNmLm5ldDER\n"
41 "MA8GA1UEBxMITmV3IFlvcmsxEjAQBgNVBAoTCVB5T3BlblNTTDERMA8GA1UECBMI\n"
42 "TmV3IFlvcmsxEDAOBgkqhkiG9w0BCQEWASAxEDAOBgNVBAsTB1Rlc3RpbmcwgZ8w\n"
43 "DQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBANp6Y17WzKSwBsUWkXdqg6tnXy8H8hA1\n"
44 "msCMWpc+/2KJ4mbv5NyD6UD+/SqagQqulPbF/DFea9nAE0zhmHJELcM8gUTIlXv/\n"
45 "cgDWnmK4xj8YkjVUiCdqKRAKeuzLG1pGmwwF5lGeJpXNxQn5ecR0UYSOWj6TTGXB\n"
46 "9VyUMQzCClcBAgMBAAEwDQYJKoZIhvcNAQEEBQADgYEAmm0Vzvv1O91WLl2LnF2P\n"
47 "q55LJdOnJbCCXIgxLdoVmvYAz1ZJq1eGKgKWI5QLgxiSzJLEU7KK//aVfiZzoCd5\n"
48 "RipBiEEMEV4eAY317bHPwPP+4Bj9t0l8AsDLseC5vLRHgxrLEu3bn08DYx6imB5Q\n"
49 "UBj849/xpszEM7BhwKE0GiQ=\n"
50 "-----END CERTIFICATE-----\n")
51
52
Jean-Paul Calderone828c9cb2008-04-26 18:06:54 -040053encryptedPrivateKeyPEM = (
54 "-----BEGIN RSA PRIVATE KEY-----\n"
55 "Proc-Type: 4,ENCRYPTED\n"
56 "DEK-Info: BF-CBC,8306665233D056B1\n"
57 "\n"
58 "BwxghOcX1F+M108qRGBfpUBrfaeKOszDEV18OjEE55p0yGsiDxvdol3c4bwI5ITy\n"
59 "ltP8w9O33CDUCjr+Ymj8xLpPP60TTfr/aHq+2fEuG4TfkeHb5fVYm0mgVnaOhJs3\n"
60 "a2n5IL/KNCdP3zMZa0IaMJ0M+VK90SLpq5nzXOWkufLyZL1+n8srkk06gepmHS7L\n"
61 "rH3rALNboG8yTH1qjE8PwcMrJAQfRMd4/4RTQv+4pUuKj7I2en+YwSQ/gomy7qN1\n"
62 "3s/gMgV/2GUbEcTVch4thZ9l3WsX18V76rBQkiZ7yrJkxwNMv+Qc2GfHtBnsXAyA\n"
63 "0nIE4Mm/OQqX8h7EJ4c2s1DMGVS0YZGU+75HN0A3iD01h8C5utqSScWzBA45j/Vy\n"
64 "3aypQVqQeW7kBMQlpc6pHvJ1EsjiAJRCto7tZNLxRdjMKBV4w75JNLaAFSraqA+R\n"
65 "/WPcdcXAQuhmCeh31fzmVOHJGRF7/5pAR/b7AnFTD4YbYVcglNis/jpdiI9k2AYP\n"
66 "wZNwXOIh6Ibq5hMvyV4/pySyLbgDOrfrOGpi8N6lBbzewByYQKiXwUEZf+Y5499/\n"
67 "CckajBhgYynPpe6mgsSeklWGc845iIwAtzavBNZIkn1hKP1P+TFjbl2O75u/9JLJ\n"
68 "6i4IFYCyQmwiHX8nTR717SpCN2gyZ2HrX7z2mKP/KokkAX2yidwoKh9FMUV5lOGO\n"
69 "JPc4MfPo4lPB7SP30AtOh7y7zlS3x8Uo0+0wCg5Z5Fn/73x3W+p5nyI0G9n7RGzL\n"
70 "ZeCWLdG/Cm6ZyIpYZGbZ5m+U3Fr6/El9V6LSxrB1TB+8G1NTdLlbeA==\n"
71 "-----END RSA PRIVATE KEY-----\n")
72encryptedPrivateKeyPEMPassphrase = "foobar"
73
74
Jean-Paul Calderoneac930e12008-03-06 18:50:51 -050075class _Python23TestCaseHelper:
Jean-Paul Calderone7da26a72008-03-06 00:35:20 -050076 # Python 2.3 compatibility.
77 def assertTrue(self, *a, **kw):
78 return self.failUnless(*a, **kw)
79
80
Jean-Paul Calderone7535dab2008-03-06 18:53:11 -050081 def assertFalse(self, *a, **kw):
82 return self.failIf(*a, **kw)
83
84
85
Jean-Paul Calderoneac930e12008-03-06 18:50:51 -050086class PKeyTests(TestCase, _Python23TestCaseHelper):
87 """
88 Unit tests for L{OpenSSL.crypto.PKey}.
89 """
Jean-Paul Calderoned8782ad2008-03-04 23:39:59 -050090 def test_construction(self):
91 """
92 L{PKey} takes no arguments and returns a new L{PKeyType} instance.
93 """
94 self.assertRaises(TypeError, PKey, None)
95 key = PKey()
96 self.assertTrue(
97 isinstance(key, PKeyType),
98 "%r is of type %r, should be %r" % (key, type(key), PKeyType))
99
100
101 def test_pregeneration(self):
102 """
103 L{PKeyType.bits} and L{PKeyType.type} return C{0} before the key is
104 generated.
105 """
106 key = PKey()
107 self.assertEqual(key.type(), 0)
108 self.assertEqual(key.bits(), 0)
109
110
111 def test_failedGeneration(self):
112 """
Jean-Paul Calderoneab82db72008-03-06 00:09:31 -0500113 L{PKeyType.generate_key} takes two arguments, the first giving the key
114 type as one of L{TYPE_RSA} or L{TYPE_DSA} and the second giving the
115 number of bits to generate. If an invalid type is specified or
116 generation fails, L{Error} is raised. If an invalid number of bits is
117 specified, L{ValueError} or L{Error} is raised.
Jean-Paul Calderoned8782ad2008-03-04 23:39:59 -0500118 """
119 key = PKey()
120 self.assertRaises(TypeError, key.generate_key)
121 self.assertRaises(TypeError, key.generate_key, 1, 2, 3)
122 self.assertRaises(TypeError, key.generate_key, "foo", "bar")
123 self.assertRaises(Error, key.generate_key, -1, 0)
Jean-Paul Calderoneab82db72008-03-06 00:09:31 -0500124
Jean-Paul Calderoneab82db72008-03-06 00:09:31 -0500125 self.assertRaises(ValueError, key.generate_key, TYPE_RSA, -1)
126 self.assertRaises(ValueError, key.generate_key, TYPE_RSA, 0)
Jean-Paul Calderoned71fe982008-03-06 00:31:50 -0500127
128 # XXX RSA generation for small values of bits is fairly buggy in a wide
129 # range of OpenSSL versions. I need to figure out what the safe lower
130 # bound for a reasonable number of OpenSSL versions is and explicitly
131 # check for that in the wrapper. The failure behavior is typically an
132 # infinite loop inside OpenSSL.
133
134 # self.assertRaises(Error, key.generate_key, TYPE_RSA, 2)
Jean-Paul Calderoned8782ad2008-03-04 23:39:59 -0500135
136 # XXX DSA generation seems happy with any number of bits. The DSS
137 # says bits must be between 512 and 1024 inclusive. OpenSSL's DSA
138 # generator doesn't seem to care about the upper limit at all. For
Jean-Paul Calderoneeff3cd92008-03-05 22:35:26 -0500139 # the lower limit, it uses 512 if anything smaller is specified.
Jean-Paul Calderoned8782ad2008-03-04 23:39:59 -0500140 # So, it doesn't seem possible to make generate_key fail for
141 # TYPE_DSA with a bits argument which is at least an int.
142
143 # self.assertRaises(Error, key.generate_key, TYPE_DSA, -7)
144
145
146 def test_rsaGeneration(self):
147 """
148 L{PKeyType.generate_key} generates an RSA key when passed
149 L{TYPE_RSA} as a type and a reasonable number of bits.
150 """
151 bits = 128
152 key = PKey()
153 key.generate_key(TYPE_RSA, bits)
154 self.assertEqual(key.type(), TYPE_RSA)
155 self.assertEqual(key.bits(), bits)
156
157
158 def test_dsaGeneration(self):
159 """
160 L{PKeyType.generate_key} generates a DSA key when passed
161 L{TYPE_DSA} as a type and a reasonable number of bits.
162 """
163 # 512 is a magic number. The DSS (Digital Signature Standard)
164 # allows a minimum of 512 bits for DSA. DSA_generate_parameters
165 # will silently promote any value below 512 to 512.
166 bits = 512
167 key = PKey()
168 key.generate_key(TYPE_DSA, bits)
169 self.assertEqual(key.type(), TYPE_DSA)
170 self.assertEqual(key.bits(), bits)
171
172
173 def test_regeneration(self):
174 """
175 L{PKeyType.generate_key} can be called multiple times on the same
176 key to generate new keys.
177 """
178 key = PKey()
179 for type, bits in [(TYPE_RSA, 512), (TYPE_DSA, 576)]:
180 key.generate_key(type, bits)
181 self.assertEqual(key.type(), type)
182 self.assertEqual(key.bits(), bits)
Jean-Paul Calderoneeff3cd92008-03-05 22:35:26 -0500183
184
185
Jean-Paul Calderoneac930e12008-03-06 18:50:51 -0500186class X509NameTests(TestCase, _Python23TestCaseHelper):
Jean-Paul Calderoneeff3cd92008-03-05 22:35:26 -0500187 """
188 Unit tests for L{OpenSSL.crypto.X509Name}.
189 """
Jean-Paul Calderonee098dc72008-03-06 18:36:19 -0500190 def _x509name(self, **attrs):
191 # XXX There's no other way to get a new X509Name yet.
192 name = X509().get_subject()
193 attrs = attrs.items()
194 # Make the order stable - order matters!
195 attrs.sort(lambda (k1, v1), (k2, v2): cmp(v1, v2))
196 for k, v in attrs:
197 setattr(name, k, v)
198 return name
199
200
Jean-Paul Calderoneeff3cd92008-03-05 22:35:26 -0500201 def test_attributes(self):
202 """
203 L{X509NameType} instances have attributes for each standard (?)
204 X509Name field.
205 """
Jean-Paul Calderonee098dc72008-03-06 18:36:19 -0500206 name = self._x509name()
Jean-Paul Calderoneeff3cd92008-03-05 22:35:26 -0500207 name.commonName = "foo"
208 self.assertEqual(name.commonName, "foo")
209 self.assertEqual(name.CN, "foo")
210 name.CN = "baz"
211 self.assertEqual(name.commonName, "baz")
212 self.assertEqual(name.CN, "baz")
213 name.commonName = "bar"
214 self.assertEqual(name.commonName, "bar")
215 self.assertEqual(name.CN, "bar")
216 name.CN = "quux"
217 self.assertEqual(name.commonName, "quux")
218 self.assertEqual(name.CN, "quux")
219
220
Jean-Paul Calderoneeff3cd92008-03-05 22:35:26 -0500221 def test_copy(self):
222 """
223 L{X509Name} creates a new L{X509NameType} instance with all the same
224 attributes as an existing L{X509NameType} instance when called with
225 one.
226 """
Jean-Paul Calderonee098dc72008-03-06 18:36:19 -0500227 name = self._x509name(commonName="foo", emailAddress="bar@example.com")
Jean-Paul Calderoneeff3cd92008-03-05 22:35:26 -0500228
229 copy = X509Name(name)
230 self.assertEqual(copy.commonName, "foo")
231 self.assertEqual(copy.emailAddress, "bar@example.com")
Jean-Paul Calderonee098dc72008-03-06 18:36:19 -0500232
233 # Mutate the copy and ensure the original is unmodified.
Jean-Paul Calderoneeff3cd92008-03-05 22:35:26 -0500234 copy.commonName = "baz"
235 self.assertEqual(name.commonName, "foo")
Jean-Paul Calderonee098dc72008-03-06 18:36:19 -0500236
237 # Mutate the original and ensure the copy is unmodified.
Jean-Paul Calderoneeff3cd92008-03-05 22:35:26 -0500238 name.emailAddress = "quux@example.com"
239 self.assertEqual(copy.emailAddress, "bar@example.com")
240
Jean-Paul Calderonee098dc72008-03-06 18:36:19 -0500241
242 def test_repr(self):
243 """
244 L{repr} passed an L{X509NameType} instance should return a string
245 containing a description of the type and the NIDs which have been set
246 on it.
247 """
248 name = self._x509name(commonName="foo", emailAddress="bar")
249 self.assertEqual(
250 repr(name),
251 "<X509Name object '/emailAddress=bar/CN=foo'>")
252
253
254 def test_comparison(self):
255 """
256 L{X509NameType} instances should compare based on their NIDs.
257 """
258 def _equality(a, b, assertTrue, assertFalse):
259 assertTrue(a == b, "(%r == %r) --> False" % (a, b))
260 assertFalse(a != b)
261 assertTrue(b == a)
262 assertFalse(b != a)
263
264 def assertEqual(a, b):
265 _equality(a, b, self.assertTrue, self.assertFalse)
266
267 # Instances compare equal to themselves.
268 name = self._x509name()
269 assertEqual(name, name)
270
271 # Empty instances should compare equal to each other.
272 assertEqual(self._x509name(), self._x509name())
273
274 # Instances with equal NIDs should compare equal to each other.
275 assertEqual(self._x509name(commonName="foo"),
276 self._x509name(commonName="foo"))
277
278 # Instance with equal NIDs set using different aliases should compare
279 # equal to each other.
280 assertEqual(self._x509name(commonName="foo"),
281 self._x509name(CN="foo"))
282
283 # Instances with more than one NID with the same values should compare
284 # equal to each other.
285 assertEqual(self._x509name(CN="foo", organizationalUnitName="bar"),
286 self._x509name(commonName="foo", OU="bar"))
287
288 def assertNotEqual(a, b):
289 _equality(a, b, self.assertFalse, self.assertTrue)
290
291 # Instances with different values for the same NID should not compare
292 # equal to each other.
293 assertNotEqual(self._x509name(CN="foo"),
294 self._x509name(CN="bar"))
295
296 # Instances with different NIDs should not compare equal to each other.
297 assertNotEqual(self._x509name(CN="foo"),
298 self._x509name(OU="foo"))
299
300 def _inequality(a, b, assertTrue, assertFalse):
301 assertTrue(a < b)
302 assertTrue(a <= b)
303 assertTrue(b > a)
304 assertTrue(b >= a)
305 assertFalse(a > b)
306 assertFalse(a >= b)
307 assertFalse(b < a)
308 assertFalse(b <= a)
309
310 def assertLessThan(a, b):
311 _inequality(a, b, self.assertTrue, self.assertFalse)
312
313 # An X509Name with a NID with a value which sorts less than the value
314 # of the same NID on another X509Name compares less than the other
315 # X509Name.
316 assertLessThan(self._x509name(CN="abc"),
317 self._x509name(CN="def"))
318
319 def assertGreaterThan(a, b):
320 _inequality(a, b, self.assertFalse, self.assertTrue)
321
322 # An X509Name with a NID with a value which sorts greater than the
323 # value of the same NID on another X509Name compares greater than the
324 # other X509Name.
325 assertGreaterThan(self._x509name(CN="def"),
326 self._x509name(CN="abc"))
Jean-Paul Calderone2aa2b332008-03-06 21:43:14 -0500327
328
Jean-Paul Calderone110cd092008-03-24 17:27:42 -0400329 def test_hash(self):
330 """
331 L{X509Name.hash} returns an integer hash based on the value of the
332 name.
333 """
334 a = self._x509name(CN="foo")
335 b = self._x509name(CN="foo")
336 self.assertEqual(a.hash(), b.hash())
337 a.CN = "bar"
338 self.assertNotEqual(a.hash(), b.hash())
339
340
Jean-Paul Calderonee957a002008-03-25 15:16:51 -0400341 def test_der(self):
342 """
343 L{X509Name.der} returns the DER encoded form of the name.
344 """
345 a = self._x509name(CN="foo", C="US")
346 self.assertEqual(
347 a.der(),
348 '0\x1b1\x0b0\t\x06\x03U\x04\x06\x13\x02US'
349 '1\x0c0\n\x06\x03U\x04\x03\x13\x03foo')
350
351
Jean-Paul Calderonec54cc182008-03-26 21:11:07 -0400352 def test_get_components(self):
353 """
354 L{X509Name.get_components} returns a C{list} of two-tuples of C{str}
355 giving the NIDs and associated values which make up the name.
356 """
357 a = self._x509name()
358 self.assertEqual(a.get_components(), [])
359 a.CN = "foo"
360 self.assertEqual(a.get_components(), [("CN", "foo")])
361 a.organizationalUnitName = "bar"
362 self.assertEqual(
363 a.get_components(),
364 [("CN", "foo"), ("OU", "bar")])
365
Jean-Paul Calderone110cd092008-03-24 17:27:42 -0400366
Jean-Paul Calderoneac0d95f2008-03-10 00:00:42 -0400367class _PKeyInteractionTestsMixin:
368 """
369 Tests which involve another thing and a PKey.
370 """
371 def signable(self):
372 """
373 Return something with a C{set_pubkey}, C{set_pubkey}, and C{sign} method.
374 """
375 raise NotImplementedError()
376
377
378 def test_signWithUngenerated(self):
379 """
380 L{X509Req.sign} raises L{ValueError} when pass a L{PKey} with no parts.
381 """
382 request = self.signable()
383 key = PKey()
384 self.assertRaises(ValueError, request.sign, key, 'MD5')
385
386
387 def test_signWithPublicKey(self):
388 """
389 L{X509Req.sign} raises L{ValueError} when pass a L{PKey} with no
390 private part as the signing key.
391 """
392 request = self.signable()
393 key = PKey()
394 key.generate_key(TYPE_RSA, 512)
395 request.set_pubkey(key)
396 pub = request.get_pubkey()
397 self.assertRaises(ValueError, request.sign, pub, 'MD5')
398
399
400
401class X509ReqTests(TestCase, _PKeyInteractionTestsMixin, _Python23TestCaseHelper):
Jean-Paul Calderone2aa2b332008-03-06 21:43:14 -0500402 """
403 Tests for L{OpenSSL.crypto.X509Req}.
404 """
Jean-Paul Calderoneac0d95f2008-03-10 00:00:42 -0400405 def signable(self):
406 """
407 Create and return a new L{X509Req}.
408 """
409 return X509Req()
410
411
Jean-Paul Calderone2aa2b332008-03-06 21:43:14 -0500412 def test_construction(self):
413 """
414 L{X509Req} takes no arguments and returns an L{X509ReqType} instance.
415 """
416 request = X509Req()
417 self.assertTrue(
418 isinstance(request, X509ReqType),
419 "%r is of type %r, should be %r" % (request, type(request), X509ReqType))
420
421
Jean-Paul Calderone8dd19b82008-12-28 20:41:16 -0500422 def test_version(self):
423 """
424 L{X509ReqType.set_version} sets the X.509 version of the certificate
425 request. L{X509ReqType.get_version} returns the X.509 version of
426 the certificate request. The initial value of the version is 0.
427 """
428 request = X509Req()
429 self.assertEqual(request.get_version(), 0)
430 request.set_version(1)
431 self.assertEqual(request.get_version(), 1)
432 request.set_version(3)
433 self.assertEqual(request.get_version(), 3)
434
435
Jean-Paul Calderone2aa2b332008-03-06 21:43:14 -0500436 def test_get_subject(self):
437 """
438 L{X509ReqType.get_subject} returns an L{X509Name} for the subject of
439 the request and which is valid even after the request object is
440 otherwise dead.
441 """
442 request = X509Req()
443 subject = request.get_subject()
444 self.assertTrue(
445 isinstance(subject, X509NameType),
446 "%r is of type %r, should be %r" % (subject, type(subject), X509NameType))
447 subject.commonName = "foo"
448 self.assertEqual(request.get_subject().commonName, "foo")
449 del request
450 subject.commonName = "bar"
451 self.assertEqual(subject.commonName, "bar")
Jean-Paul Calderone78381d22008-03-06 23:35:22 -0500452
453
454
Jean-Paul Calderoneac0d95f2008-03-10 00:00:42 -0400455class X509Tests(TestCase, _PKeyInteractionTestsMixin, _Python23TestCaseHelper):
Jean-Paul Calderone78381d22008-03-06 23:35:22 -0500456 """
457 Tests for L{OpenSSL.crypto.X509}.
458 """
Jean-Paul Calderone5ef86512008-04-26 19:06:28 -0400459 pemData = cleartextCertificatePEM + cleartextPrivateKeyPEM
Jean-Paul Calderone8114b452008-03-25 15:27:59 -0400460
Jean-Paul Calderoneac0d95f2008-03-10 00:00:42 -0400461 def signable(self):
462 """
463 Create and return a new L{X509}.
464 """
465 return X509()
466
467
Jean-Paul Calderone78381d22008-03-06 23:35:22 -0500468 def test_construction(self):
469 """
470 L{X509} takes no arguments and returns an instance of L{X509Type}.
471 """
472 certificate = X509()
473 self.assertTrue(
474 isinstance(certificate, X509Type),
475 "%r is of type %r, should be %r" % (certificate,
476 type(certificate),
477 X509Type))
478
479
480 def test_serial_number(self):
481 """
482 The serial number of an L{X509Type} can be retrieved and modified with
483 L{X509Type.get_serial_number} and L{X509Type.set_serial_number}.
484 """
485 certificate = X509()
486 self.assertRaises(TypeError, certificate.set_serial_number)
487 self.assertRaises(TypeError, certificate.set_serial_number, 1, 2)
488 self.assertRaises(TypeError, certificate.set_serial_number, "1")
489 self.assertRaises(TypeError, certificate.set_serial_number, 5.5)
490 self.assertEqual(certificate.get_serial_number(), 0)
491 certificate.set_serial_number(1)
492 self.assertEqual(certificate.get_serial_number(), 1)
493 certificate.set_serial_number(2 ** 32 + 1)
494 self.assertEqual(certificate.get_serial_number(), 2 ** 32 + 1)
495 certificate.set_serial_number(2 ** 64 + 1)
496 self.assertEqual(certificate.get_serial_number(), 2 ** 64 + 1)
Jean-Paul Calderone525ef802008-03-09 20:39:42 -0400497 certificate.set_serial_number(2 ** 128 + 1)
498 self.assertEqual(certificate.get_serial_number(), 2 ** 128 + 1)
499
500
501 def _setBoundTest(self, which):
502 """
503 L{X509Type.set_notBefore} takes a string in the format of an ASN1
504 GENERALIZEDTIME and sets the beginning of the certificate's validity
505 period to it.
506 """
507 certificate = X509()
508 set = getattr(certificate, 'set_not' + which)
509 get = getattr(certificate, 'get_not' + which)
510
Jean-Paul Calderonee0615b52008-03-09 21:44:46 -0400511 # Starts with no value.
512 self.assertEqual(get(), None)
513
Jean-Paul Calderone525ef802008-03-09 20:39:42 -0400514 # GMT (Or is it UTC?) -exarkun
515 when = "20040203040506Z"
516 set(when)
517 self.assertEqual(get(), when)
518
519 # A plus two hours and thirty minutes offset
520 when = "20040203040506+0530"
521 set(when)
522 self.assertEqual(get(), when)
523
524 # A minus one hour fifteen minutes offset
525 when = "20040203040506-0115"
526 set(when)
527 self.assertEqual(get(), when)
528
529 # An invalid string results in a ValueError
530 self.assertRaises(ValueError, set, "foo bar")
531
532
533 def test_set_notBefore(self):
534 """
535 L{X509Type.set_notBefore} takes a string in the format of an ASN1
536 GENERALIZEDTIME and sets the beginning of the certificate's validity
537 period to it.
538 """
539 self._setBoundTest("Before")
540
541
542 def test_set_notAfter(self):
543 """
544 L{X509Type.set_notAfter} takes a string in the format of an ASN1
545 GENERALIZEDTIME and sets the end of the certificate's validity period
546 to it.
547 """
548 self._setBoundTest("After")
Jean-Paul Calderone76576d52008-03-24 16:04:46 -0400549
550
Jean-Paul Calderone38a646d2008-03-25 15:16:18 -0400551 def test_get_notBefore(self):
552 """
553 L{X509Type.get_notBefore} returns a string in the format of an ASN1
554 GENERALIZEDTIME even for certificates which store it as UTCTIME
555 internally.
556 """
Jean-Paul Calderone8114b452008-03-25 15:27:59 -0400557 cert = load_certificate(FILETYPE_PEM, self.pemData)
Jean-Paul Calderone38a646d2008-03-25 15:16:18 -0400558 self.assertEqual(cert.get_notBefore(), "20080325190413Z")
559
560
561 def test_get_notAfter(self):
562 """
563 L{X509Type.get_notAfter} returns a string in the format of an ASN1
564 GENERALIZEDTIME even for certificates which store it as UTCTIME
565 internally.
566 """
Jean-Paul Calderone8114b452008-03-25 15:27:59 -0400567 cert = load_certificate(FILETYPE_PEM, self.pemData)
Jean-Paul Calderone38a646d2008-03-25 15:16:18 -0400568 self.assertEqual(cert.get_notAfter(), "20090325190413Z")
569
570
Jean-Paul Calderone76576d52008-03-24 16:04:46 -0400571 def test_digest(self):
572 """
573 L{X509.digest} returns a string giving ":"-separated hex-encoded words
574 of the digest of the certificate.
575 """
576 cert = X509()
577 self.assertEqual(
578 cert.digest("md5"),
579 "A8:EB:07:F8:53:25:0A:F2:56:05:C5:A5:C4:C4:C7:15")
Jean-Paul Calderone828c9cb2008-04-26 18:06:54 -0400580
581
582
Jean-Paul Calderone6fe60c22008-04-26 20:04:53 -0400583class FunctionTests(TestCase, _Python23TestCaseHelper):
Jean-Paul Calderone828c9cb2008-04-26 18:06:54 -0400584 """
585 Tests for free-functions in the L{OpenSSL.crypto} module.
586 """
587 def test_load_privatekey_wrongPassphrase(self):
588 """
589 L{load_privatekey} raises L{OpenSSL.crypto.Error} when it is passed an
590 encrypted PEM and an incorrect passphrase.
591 """
592 self.assertRaises(
593 Error,
594 load_privatekey, FILETYPE_PEM, encryptedPrivateKeyPEM, "quack")
595
596
597 def test_load_privatekey_passphrase(self):
598 """
599 L{load_privatekey} can create a L{PKey} object from an encrypted PEM
600 string if given the passphrase.
601 """
602 key = load_privatekey(
603 FILETYPE_PEM, encryptedPrivateKeyPEM,
604 encryptedPrivateKeyPEMPassphrase)
605 self.assertTrue(isinstance(key, PKeyType))
606
607
608 def test_load_privatekey_wrongPassphraseCallback(self):
609 """
610 L{load_privatekey} raises L{OpenSSL.crypto.Error} when it is passed an
611 encrypted PEM and a passphrase callback which returns an incorrect
612 passphrase.
613 """
614 called = []
615 def cb(*a):
616 called.append(None)
617 return "quack"
618 self.assertRaises(
619 Error,
620 load_privatekey, FILETYPE_PEM, encryptedPrivateKeyPEM, cb)
621 self.assertTrue(called)
622
623 def test_load_privatekey_passphraseCallback(self):
624 """
625 L{load_privatekey} can create a L{PKey} object from an encrypted PEM
626 string if given a passphrase callback which returns the correct
627 password.
628 """
629 called = []
630 def cb(writing):
631 called.append(writing)
632 return encryptedPrivateKeyPEMPassphrase
633 key = load_privatekey(FILETYPE_PEM, encryptedPrivateKeyPEM, cb)
634 self.assertTrue(isinstance(key, PKeyType))
635 self.assertEqual(called, [False])
636
637
638 def test_dump_privatekey_passphrase(self):
639 """
640 L{dump_privatekey} writes an encrypted PEM when given a passphrase.
641 """
642 passphrase = "foo"
643 key = load_privatekey(FILETYPE_PEM, cleartextPrivateKeyPEM)
644 pem = dump_privatekey(FILETYPE_PEM, key, "blowfish", passphrase)
645 self.assertTrue(isinstance(pem, str))
646 loadedKey = load_privatekey(FILETYPE_PEM, pem, passphrase)
647 self.assertTrue(isinstance(loadedKey, PKeyType))
648 self.assertEqual(loadedKey.type(), key.type())
649 self.assertEqual(loadedKey.bits(), key.bits())
650
651
652 def test_dump_privatekey_passphraseCallback(self):
653 """
654 L{dump_privatekey} writes an encrypted PEM when given a callback which
655 returns the correct passphrase.
656 """
657 passphrase = "foo"
658 called = []
659 def cb(writing):
660 called.append(writing)
661 return passphrase
662 key = load_privatekey(FILETYPE_PEM, cleartextPrivateKeyPEM)
663 pem = dump_privatekey(FILETYPE_PEM, key, "blowfish", cb)
664 self.assertTrue(isinstance(pem, str))
665 self.assertEqual(called, [True])
666 loadedKey = load_privatekey(FILETYPE_PEM, pem, passphrase)
667 self.assertTrue(isinstance(loadedKey, PKeyType))
668 self.assertEqual(loadedKey.type(), key.type())
669 self.assertEqual(loadedKey.bits(), key.bits())