blob: d9317fd0dfd5d33d438d12dcad36942ccf7deeca [file] [log] [blame]
Jean-Paul Calderone8b63d452008-03-21 18:31:12 -04001# Copyright (C) Jean-Paul Calderone 2008, All rights reserved
2
Jean-Paul Calderoned8782ad2008-03-04 23:39:59 -05003"""
4Unit tests for L{OpenSSL.crypto}.
5"""
6
Jean-Paul Calderone0b88b6a2009-07-05 12:44:41 -04007from unittest import main
8
Jean-Paul Calderone653f5582009-04-01 14:42:32 -04009from os import popen2
Jean-Paul Calderoned8782ad2008-03-04 23:39:59 -050010
11from OpenSSL.crypto import TYPE_RSA, TYPE_DSA, Error, PKey, PKeyType
Jean-Paul Calderone78381d22008-03-06 23:35:22 -050012from OpenSSL.crypto import X509, X509Type, X509Name, X509NameType
Jean-Paul Calderone2aa2b332008-03-06 21:43:14 -050013from OpenSSL.crypto import X509Req, X509ReqType
Jean-Paul Calderonee7db4b42008-12-31 13:39:24 -050014from OpenSSL.crypto import X509Extension, X509ExtensionType
Rick Dean5b7b6372009-04-01 11:34:06 -050015from OpenSSL.crypto import load_certificate, load_privatekey
Jean-Paul Calderonef17e4212009-04-01 14:21:40 -040016from OpenSSL.crypto import FILETYPE_PEM, FILETYPE_ASN1, FILETYPE_TEXT
Jean-Paul Calderone71919862009-04-01 13:01:19 -040017from OpenSSL.crypto import dump_certificate, load_certificate_request
18from OpenSSL.crypto import dump_certificate_request, dump_privatekey
Jean-Paul Calderonedc138fa2009-06-27 14:32:07 -040019from OpenSSL.crypto import PKCS7Type, load_pkcs7_data
20from OpenSSL.crypto import PKCS12Type, load_pkcs12
21from OpenSSL.crypto import NetscapeSPKI, NetscapeSPKIType
Jean-Paul Calderone0b88b6a2009-07-05 12:44:41 -040022from OpenSSL.test.util import TestCase
Jean-Paul Calderone828c9cb2008-04-26 18:06:54 -040023
24
Jean-Paul Calderone20131f52009-04-01 12:05:45 -040025cleartextCertificatePEM = """-----BEGIN CERTIFICATE-----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42-----END CERTIFICATE-----
43"""
Jean-Paul Calderone828c9cb2008-04-26 18:06:54 -040044
Jean-Paul Calderone20131f52009-04-01 12:05:45 -040045cleartextPrivateKeyPEM = """-----BEGIN RSA PRIVATE KEY-----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59-----END RSA PRIVATE KEY-----
60"""
Jean-Paul Calderone828c9cb2008-04-26 18:06:54 -040061
Rick Dean5b7b6372009-04-01 11:34:06 -050062cleartextCertificateRequestPEM = (
63 "-----BEGIN CERTIFICATE REQUEST-----\n"
64 "MIIBnjCCAQcCAQAwXjELMAkGA1UEBhMCVVMxCzAJBgNVBAgTAklMMRAwDgYDVQQH\n"
65 "EwdDaGljYWdvMRcwFQYDVQQKEw5NeSBDb21wYW55IEx0ZDEXMBUGA1UEAxMORnJl\n"
66 "ZGVyaWNrIERlYW4wgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBANp6Y17WzKSw\n"
67 "BsUWkXdqg6tnXy8H8hA1msCMWpc+/2KJ4mbv5NyD6UD+/SqagQqulPbF/DFea9nA\n"
68 "E0zhmHJELcM8gUTIlXv/cgDWnmK4xj8YkjVUiCdqKRAKeuzLG1pGmwwF5lGeJpXN\n"
69 "xQn5ecR0UYSOWj6TTGXB9VyUMQzCClcBAgMBAAGgADANBgkqhkiG9w0BAQUFAAOB\n"
70 "gQAAJGuF/R/GGbeC7FbFW+aJgr9ee0Xbl6nlhu7pTe67k+iiKT2dsl2ti68MVTnu\n"
71 "Vrb3HUNqOkiwsJf6kCtq5oPn3QVYzTa76Dt2y3Rtzv6boRSlmlfrgS92GNma8JfR\n"
72 "oICQk3nAudi6zl1Dix3BCv1pUp5KMtGn3MeDEi6QFGy2rA==\n"
73 "-----END CERTIFICATE REQUEST-----\n")
74
Jean-Paul Calderone20131f52009-04-01 12:05:45 -040075encryptedPrivateKeyPEM = """-----BEGIN RSA PRIVATE KEY-----
76Proc-Type: 4,ENCRYPTED
77DEK-Info: DES-EDE3-CBC,9573604A18579E9E
Jean-Paul Calderone5ef86512008-04-26 19:06:28 -040078
Jean-Paul Calderone20131f52009-04-01 12:05:45 -040079SHOho56WxDkT0ht10UTeKc0F5u8cqIa01kzFAmETw0MAs8ezYtK15NPdCXUm3X/2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92-----END RSA PRIVATE KEY-----
93"""
Jean-Paul Calderone828c9cb2008-04-26 18:06:54 -040094encryptedPrivateKeyPEMPassphrase = "foobar"
95
Jean-Paul Calderonedc138fa2009-06-27 14:32:07 -040096# Some PKCS12 data, base64 encoded. The data itself was constructed using the
97# openssl command line:
98#
99# openssl pkcs12 -export -in s.pem -out o.p12 -inkey s.pem -certfile s.pem
100#
101# With s.pem containing a private key and certificate. The contents of the
102# generated file, o.p12, were then base64 encoded to produce this value.
103pkcs12Data = """\
104MIIJGQIBAzCCCN8GCSqGSIb3DQEHAaCCCNAEggjMMIIIyDCCBucGCSqGSIb3DQEHBqCCBtgwggbU
105AgEAMIIGzQYJKoZIhvcNAQcBMBwGCiqGSIb3DQEMAQYwDgQIdwchN+KDjC8CAggAgIIGoOh59lWQ
106vz7FB2ewPHduY3pBhJX1W7ioN1k2xAoelE04v30CvNNa0A8qIjk6U7WLRXL74jG1xPq+WcAUtNtk
1073ZfTaPTPR+q5xVNBZFHeKDirt7yherl8Xs16OEl0IgNpNHRLeHxi4JeBqkGReq1vkybus2ALyQ/B
108FgbrNJiaGpvUx64A3FnHKbT0pVIvsg5iqcpCQ2SDLeJnqKFuP/2+SE5WnNvM6SBG20HMNOR9+SM5
109tPETapeu7AFkJ03FY3OF+fllHnv8fyXXDkv7F1bX8P2q6wQSRK6DXq6DO1Qjqzmrrtk4Pq6Hne2x
110onN2Bx9yUR83tNn4bQWNDasbnQpdI3Fsgg6RS5+B7y9tw37nygyND9ME0NcCysDov5zIG84gsZHn
1113LDFQkP4M7iBscNCund18FNQomrqAmPvejos+OXMQlNd/la15UQgUqv33V91WIMNmDDt80eVdxp8
1120D4gCvIl3xPp0Lp1EwhXwQxmx7LS3Fj0yCaiBOVevqhp9uq0i5hhdPA4a/XyIAeuJCS07s21fAe3
113Ay3S7olg1DTtN9wSJL6C1wus3VDMicB82ZC4+wAbfheedseenA0ubMDj38JqHgUtb02jMb9Ff3QR
114Hj6qzv5nJIJjmCG+cBatMh775f/9y/7wuElZYjv/vPb9S4Oraxz3ZgLtkU15PVeLjFHsHWRnrhVC
115ORaDEdX42kXfTMTaDsqFPg10ZS4fb7kCqD+ef0U4nCB0pfKyDo3hyDxHxGMqEVwyhKrl2UKljmcz
11602AGKxf6SERGdApGX4ENSuEG8v37CJTnmf1Tvf+K3fcCwBWTVDjhCgyCYrqaR02r8ixjRCU47L7e
117fe0c6WcTIYcXwWPPwqk6lUm8jH/IFSohUxrGaLRsvtYMK5O1ss3fGnv5DysLoWRRHNsp9EqJ+nXP
118bC5KRS01M78twFHXyIVgML13sMwox3aMCADP4HAFisUTQjSq0LlrHHVSIdIz3dEC3jsIs2bRxaVE
119dGaMorvVhoCNucGtdXD778EHsPy6ierUd6LijOYGs+yxUKVdeSAHYiQqBB/0uwo5tqeUjc1xte4V
1207o68M0TnaeXZk6eJj8cy+Z7uvlKrEWG/d+yDp6ZrS/uuCUqlfakSUQVLwhpupRs6bOfbU9VWmuuW
121T/whDpJHkGRqz15d3K43wkF6gWx7tpnwps2boB3fjQVlQ20xJ+4QjYV6Yu/0dlhyU69/sZEHQXvL
122xdZsLwkjEHhGPoMkVSpSZF7mSgM4iI8nFkPbfNOSBGpW8GTYUQN+YI+GjQYwk2zGpB3Fhfc9lVuK
123QqlYUtGkj2UauO9diqS1rVOIQORJ49EmA0w0VJz6A3teklGRQvdfSiTdTmg+PcYtdllquni0MMJO
1243t7fpOnfmZRxvOx9J8WsLlz18uvq8+jDGs0InNFGxUf5v+iTBjY2ByzaMZDa84xqu6+cVuGcQGRu
125NJCpxWNOyfKrDnJ+TOg1/AV3dHiuBNeyOE6XkwzhfEH0TaAWvqtmqRFBIjhsMwkg9qooeJwWANUP
126fq+UxpR8M5UDMBEKcwk+paSLtzAL/Xznk2q9U2JKPrmcD79bSNafDZ33/5U05mGq3CmY5DVjoy+C
127qhbfIQssrNhWxN3yCtHDDOrXVwEb/DAKSIfVz07mRKP/9jW2aC3nmRSt8Gd+JYy4nNRFAcatIcoC
128IHB5rtEXdhHHfZsAaVPGPgfpeVGIK8FXZTSLYGSGHsjXAXG0xS9nXX/8mHyKP3SKd5/h1H9llYhh
129nXXBM7lY6W8A6wRmMmOTkHn5Ovi+mavWeCioKiGfqoUQDRow/PdfwVLUVhe1OTCx4G5F8mXLpIWp
1301wzrOqMfOGDKD+RCgz/5sqVzAvgj0LTttoRKGipJjVb5luaLZswKCtlemD9xRb8J/PRp/6YHvrxW
1312taIJyZPBmbiqXAIFCiwjnurnP9WK4h6ss+bwj8lY3fB8CPwRAyy2p7dpXeNFby0ZkWPlBqKEXgZ
13203uQ8mUGXrty5ha03z7Gzab3RqAUu7l21i4DBbZjcn8j5NPrc3cNVpbJMic/0NDvojI3pIqsQ3yv
1333JbYdkVzlmEmapHCgF/SGVkZMo28uoC1upZMHRvb4zIrRlj1CVlUxmQu00q8GudNBcPOrQVONt5+
134eBvxD/Dco26wHPusPieUMlkj9VP9FS24bdocKXOL7KHOnsZ5oLS1S4hA7l7wEtzfoRHt1M1x8UCQ
135hYcQEbZsOrxqmKlbgm0B6bBsdK0IxGNhgdtKHUCdxHYkpSEYLXwwggHZBgkqhkiG9w0BBwGgggHK
136BIIBxjCCAcIwggG+BgsqhkiG9w0BDAoBAqCCAYYwggGCMBwGCiqGSIb3DQEMAQMwDgQIZ+Y92Rjm
137N5cCAggABIIBYD2z0NOajj7NlnWDRO8hlRiDIo8UTZ3E2UjP4rSbKh7ZLGULHALuH+gcwD3814U7
138VukIkyhiE1VvqPMXb2m4VTCp9BE4oXda0S2Mao1nKxbeMTZ3GE3+C7HPIuTTNQnsnpspIctNAarC
139IIuhgSQmjdILrkmX0QjH5vrQFbdpcDDb/IRba13hws8FM2OrduM+MDEM6xkwiG3AGDgKEPYsd1Ai
140uP8EMX4dzZ9BvEJHaAynzSpUxWy13ntMxNfeIuOKAT9HNsHr0MQgDDpVEhRY26IAZhNFfjtWdAjI
141OiMxk3BjixMUof9i1Xh+4yQsrzLcBJazCyphtb6YvnorQQxWUnaQXWjmU4QS36ajuyOXgFf1Z3jk
1426CLztf6kq3rY4uQ7aQIUJjUcWP0dUGr6LLZRVYP4uL/N/QSasliQGhTxrjEHywyPqRQjKVgV9c6D
143ueHmII59hoZPA6a2cYpQnsuFoeAxJTAjBgkqhkiG9w0BCRUxFgQUVFyHPk/34xv0OdgMn18Sjffj
1447lcwMTAhMAkGBSsOAwIaBQAEFBxVa/flSZttaXvzg+oLJBqgUWuVBAh0s4gPVAEKHAICCAA=
145""".decode('base64')
146
147# Some PKCS#7 stuff. Generated with the openssl command line:
148#
149# openssl crl2pkcs7 -inform pem -outform pem -certfile s.pem -nocrl
150#
151# with a certificate and key (but the key should be irrelevant) in s.pem
152pkcs7Data = """\
153-----BEGIN PKCS7-----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172-----END PKCS7-----
173"""
174
Jean-Paul Calderone828c9cb2008-04-26 18:06:54 -0400175
Jean-Paul Calderone7da26a72008-03-06 00:35:20 -0500176
Jean-Paul Calderone18808652009-07-05 12:54:05 -0400177class X509ExtTests(TestCase):
Jean-Paul Calderonee7db4b42008-12-31 13:39:24 -0500178 def test_construction(self):
179 """
180 L{X509Extension} accepts an extension type name, a critical flag,
181 and an extension value and returns an L{X509ExtensionType} instance.
182 """
Jean-Paul Calderone2ee1e7c2008-12-31 14:58:38 -0500183 basic = X509Extension('basicConstraints', True, 'CA:true')
Jean-Paul Calderonee7db4b42008-12-31 13:39:24 -0500184 self.assertTrue(
185 isinstance(basic, X509ExtensionType),
186 "%r is of type %r, should be %r" % (
187 basic, type(basic), X509ExtensionType))
188
Jean-Paul Calderone2ee1e7c2008-12-31 14:58:38 -0500189 comment = X509Extension('nsComment', False, 'pyOpenSSL unit test')
Jean-Paul Calderonee7db4b42008-12-31 13:39:24 -0500190 self.assertTrue(
191 isinstance(comment, X509ExtensionType),
192 "%r is of type %r, should be %r" % (
193 comment, type(comment), X509ExtensionType))
Rick Deane15b1472009-07-09 15:53:42 -0500194 self.assertEqual(type(X509ExtensionType).__name__, 'type')
195 self.assertEqual(type(basic).__name__, 'X509Extension')
196 self.assertEqual(type(basic), X509ExtensionType)
Jean-Paul Calderonee7db4b42008-12-31 13:39:24 -0500197
198
Jean-Paul Calderone391585f2008-12-31 14:36:31 -0500199 def test_invalid_extension(self):
200 """
201 L{X509Extension} raises something if it is passed a bad extension
202 name or value.
203 """
204 self.assertRaises(
205 Error, X509Extension, 'thisIsMadeUp', False, 'hi')
206 self.assertRaises(
207 Error, X509Extension, 'basicConstraints', False, 'blah blah')
208
Jean-Paul Calderone2ee1e7c2008-12-31 14:58:38 -0500209 # Exercise a weird one (an extension which uses the r2i method). This
210 # exercises the codepath that requires a non-NULL ctx to be passed to
211 # X509V3_EXT_nconf. It can't work now because we provide no
212 # configuration database. It might be made to work in the future.
213 self.assertRaises(
214 Error, X509Extension, 'proxyCertInfo', True,
215 'language:id-ppl-anyLanguage,pathlen:1,policy:text:AB')
216
Jean-Paul Calderone391585f2008-12-31 14:36:31 -0500217
Jean-Paul Calderonee7db4b42008-12-31 13:39:24 -0500218 def test_get_critical(self):
219 """
220 L{X509ExtensionType.get_critical} returns the value of the
221 extension's critical flag.
222 """
Jean-Paul Calderone2ee1e7c2008-12-31 14:58:38 -0500223 ext = X509Extension('basicConstraints', True, 'CA:true')
Jean-Paul Calderonee7db4b42008-12-31 13:39:24 -0500224 self.assertTrue(ext.get_critical())
Jean-Paul Calderone2ee1e7c2008-12-31 14:58:38 -0500225 ext = X509Extension('basicConstraints', False, 'CA:true')
Jean-Paul Calderonee7db4b42008-12-31 13:39:24 -0500226 self.assertFalse(ext.get_critical())
227
Jean-Paul Calderone7535dab2008-03-06 18:53:11 -0500228
Jean-Paul Calderonef8c5fab2008-12-31 15:53:48 -0500229 def test_get_short_name(self):
230 """
231 L{X509ExtensionType.get_short_name} returns a string giving the short
232 type name of the extension.
233 """
234 ext = X509Extension('basicConstraints', True, 'CA:true')
235 self.assertEqual(ext.get_short_name(), 'basicConstraints')
236 ext = X509Extension('nsComment', True, 'foo bar')
237 self.assertEqual(ext.get_short_name(), 'nsComment')
238
239
Jean-Paul Calderone391585f2008-12-31 14:36:31 -0500240
Jean-Paul Calderone18808652009-07-05 12:54:05 -0400241class PKeyTests(TestCase):
Jean-Paul Calderoneac930e12008-03-06 18:50:51 -0500242 """
243 Unit tests for L{OpenSSL.crypto.PKey}.
244 """
Jean-Paul Calderoned8782ad2008-03-04 23:39:59 -0500245 def test_construction(self):
246 """
247 L{PKey} takes no arguments and returns a new L{PKeyType} instance.
248 """
249 self.assertRaises(TypeError, PKey, None)
250 key = PKey()
251 self.assertTrue(
252 isinstance(key, PKeyType),
253 "%r is of type %r, should be %r" % (key, type(key), PKeyType))
Rick Deane15b1472009-07-09 15:53:42 -0500254 self.assertEqual(type(PKeyType).__name__, 'type')
255 self.assertEqual(type(key).__name__, 'PKey')
256 self.assertEqual(type(key), PKeyType)
Jean-Paul Calderoned8782ad2008-03-04 23:39:59 -0500257
258
259 def test_pregeneration(self):
260 """
261 L{PKeyType.bits} and L{PKeyType.type} return C{0} before the key is
262 generated.
263 """
264 key = PKey()
265 self.assertEqual(key.type(), 0)
266 self.assertEqual(key.bits(), 0)
267
268
269 def test_failedGeneration(self):
270 """
Jean-Paul Calderoneab82db72008-03-06 00:09:31 -0500271 L{PKeyType.generate_key} takes two arguments, the first giving the key
272 type as one of L{TYPE_RSA} or L{TYPE_DSA} and the second giving the
273 number of bits to generate. If an invalid type is specified or
274 generation fails, L{Error} is raised. If an invalid number of bits is
275 specified, L{ValueError} or L{Error} is raised.
Jean-Paul Calderoned8782ad2008-03-04 23:39:59 -0500276 """
277 key = PKey()
278 self.assertRaises(TypeError, key.generate_key)
279 self.assertRaises(TypeError, key.generate_key, 1, 2, 3)
280 self.assertRaises(TypeError, key.generate_key, "foo", "bar")
281 self.assertRaises(Error, key.generate_key, -1, 0)
Jean-Paul Calderoneab82db72008-03-06 00:09:31 -0500282
Jean-Paul Calderoneab82db72008-03-06 00:09:31 -0500283 self.assertRaises(ValueError, key.generate_key, TYPE_RSA, -1)
284 self.assertRaises(ValueError, key.generate_key, TYPE_RSA, 0)
Jean-Paul Calderoned71fe982008-03-06 00:31:50 -0500285
286 # XXX RSA generation for small values of bits is fairly buggy in a wide
287 # range of OpenSSL versions. I need to figure out what the safe lower
288 # bound for a reasonable number of OpenSSL versions is and explicitly
289 # check for that in the wrapper. The failure behavior is typically an
290 # infinite loop inside OpenSSL.
291
292 # self.assertRaises(Error, key.generate_key, TYPE_RSA, 2)
Jean-Paul Calderoned8782ad2008-03-04 23:39:59 -0500293
294 # XXX DSA generation seems happy with any number of bits. The DSS
295 # says bits must be between 512 and 1024 inclusive. OpenSSL's DSA
296 # generator doesn't seem to care about the upper limit at all. For
Jean-Paul Calderoneeff3cd92008-03-05 22:35:26 -0500297 # the lower limit, it uses 512 if anything smaller is specified.
Jean-Paul Calderoned8782ad2008-03-04 23:39:59 -0500298 # So, it doesn't seem possible to make generate_key fail for
299 # TYPE_DSA with a bits argument which is at least an int.
300
301 # self.assertRaises(Error, key.generate_key, TYPE_DSA, -7)
302
303
304 def test_rsaGeneration(self):
305 """
306 L{PKeyType.generate_key} generates an RSA key when passed
307 L{TYPE_RSA} as a type and a reasonable number of bits.
308 """
309 bits = 128
310 key = PKey()
311 key.generate_key(TYPE_RSA, bits)
312 self.assertEqual(key.type(), TYPE_RSA)
313 self.assertEqual(key.bits(), bits)
314
315
316 def test_dsaGeneration(self):
317 """
318 L{PKeyType.generate_key} generates a DSA key when passed
319 L{TYPE_DSA} as a type and a reasonable number of bits.
320 """
321 # 512 is a magic number. The DSS (Digital Signature Standard)
322 # allows a minimum of 512 bits for DSA. DSA_generate_parameters
323 # will silently promote any value below 512 to 512.
324 bits = 512
325 key = PKey()
326 key.generate_key(TYPE_DSA, bits)
327 self.assertEqual(key.type(), TYPE_DSA)
328 self.assertEqual(key.bits(), bits)
329
330
331 def test_regeneration(self):
332 """
333 L{PKeyType.generate_key} can be called multiple times on the same
334 key to generate new keys.
335 """
336 key = PKey()
337 for type, bits in [(TYPE_RSA, 512), (TYPE_DSA, 576)]:
338 key.generate_key(type, bits)
339 self.assertEqual(key.type(), type)
340 self.assertEqual(key.bits(), bits)
Jean-Paul Calderoneeff3cd92008-03-05 22:35:26 -0500341
342
343
Jean-Paul Calderone18808652009-07-05 12:54:05 -0400344class X509NameTests(TestCase):
Jean-Paul Calderoneeff3cd92008-03-05 22:35:26 -0500345 """
346 Unit tests for L{OpenSSL.crypto.X509Name}.
347 """
Jean-Paul Calderonee098dc72008-03-06 18:36:19 -0500348 def _x509name(self, **attrs):
349 # XXX There's no other way to get a new X509Name yet.
350 name = X509().get_subject()
351 attrs = attrs.items()
352 # Make the order stable - order matters!
353 attrs.sort(lambda (k1, v1), (k2, v2): cmp(v1, v2))
354 for k, v in attrs:
355 setattr(name, k, v)
356 return name
357
358
Rick Deane15b1472009-07-09 15:53:42 -0500359 def test_type(self):
360 """
361 L{X509NameType} is a type, and matches the type of a
362 X509Name.
363 """
364 name = self._x509name()
365 self.assertTrue(
366 isinstance(name, X509NameType),
367 "%r is of type %r, should be %r" % (
368 name, type(name), X509NameType))
369 self.assertEqual(type(X509NameType).__name__, 'type')
370 self.assertEqual(type(name).__name__, 'X509Name')
371 self.assertEqual(type(name), X509NameType)
372
373
Jean-Paul Calderoneeff3cd92008-03-05 22:35:26 -0500374 def test_attributes(self):
375 """
376 L{X509NameType} instances have attributes for each standard (?)
377 X509Name field.
378 """
Jean-Paul Calderonee098dc72008-03-06 18:36:19 -0500379 name = self._x509name()
Jean-Paul Calderoneeff3cd92008-03-05 22:35:26 -0500380 name.commonName = "foo"
381 self.assertEqual(name.commonName, "foo")
382 self.assertEqual(name.CN, "foo")
383 name.CN = "baz"
384 self.assertEqual(name.commonName, "baz")
385 self.assertEqual(name.CN, "baz")
386 name.commonName = "bar"
387 self.assertEqual(name.commonName, "bar")
388 self.assertEqual(name.CN, "bar")
389 name.CN = "quux"
390 self.assertEqual(name.commonName, "quux")
391 self.assertEqual(name.CN, "quux")
392
393
Jean-Paul Calderoneeff3cd92008-03-05 22:35:26 -0500394 def test_copy(self):
395 """
396 L{X509Name} creates a new L{X509NameType} instance with all the same
397 attributes as an existing L{X509NameType} instance when called with
398 one.
399 """
Jean-Paul Calderonee098dc72008-03-06 18:36:19 -0500400 name = self._x509name(commonName="foo", emailAddress="bar@example.com")
Jean-Paul Calderoneeff3cd92008-03-05 22:35:26 -0500401
402 copy = X509Name(name)
403 self.assertEqual(copy.commonName, "foo")
404 self.assertEqual(copy.emailAddress, "bar@example.com")
Jean-Paul Calderonee098dc72008-03-06 18:36:19 -0500405
406 # Mutate the copy and ensure the original is unmodified.
Jean-Paul Calderoneeff3cd92008-03-05 22:35:26 -0500407 copy.commonName = "baz"
408 self.assertEqual(name.commonName, "foo")
Jean-Paul Calderonee098dc72008-03-06 18:36:19 -0500409
410 # Mutate the original and ensure the copy is unmodified.
Jean-Paul Calderoneeff3cd92008-03-05 22:35:26 -0500411 name.emailAddress = "quux@example.com"
412 self.assertEqual(copy.emailAddress, "bar@example.com")
413
Jean-Paul Calderonee098dc72008-03-06 18:36:19 -0500414
415 def test_repr(self):
416 """
417 L{repr} passed an L{X509NameType} instance should return a string
418 containing a description of the type and the NIDs which have been set
419 on it.
420 """
421 name = self._x509name(commonName="foo", emailAddress="bar")
422 self.assertEqual(
423 repr(name),
424 "<X509Name object '/emailAddress=bar/CN=foo'>")
425
426
427 def test_comparison(self):
428 """
429 L{X509NameType} instances should compare based on their NIDs.
430 """
431 def _equality(a, b, assertTrue, assertFalse):
432 assertTrue(a == b, "(%r == %r) --> False" % (a, b))
433 assertFalse(a != b)
434 assertTrue(b == a)
435 assertFalse(b != a)
436
437 def assertEqual(a, b):
438 _equality(a, b, self.assertTrue, self.assertFalse)
439
440 # Instances compare equal to themselves.
441 name = self._x509name()
442 assertEqual(name, name)
443
444 # Empty instances should compare equal to each other.
445 assertEqual(self._x509name(), self._x509name())
446
447 # Instances with equal NIDs should compare equal to each other.
448 assertEqual(self._x509name(commonName="foo"),
449 self._x509name(commonName="foo"))
450
451 # Instance with equal NIDs set using different aliases should compare
452 # equal to each other.
453 assertEqual(self._x509name(commonName="foo"),
454 self._x509name(CN="foo"))
455
456 # Instances with more than one NID with the same values should compare
457 # equal to each other.
458 assertEqual(self._x509name(CN="foo", organizationalUnitName="bar"),
459 self._x509name(commonName="foo", OU="bar"))
460
461 def assertNotEqual(a, b):
462 _equality(a, b, self.assertFalse, self.assertTrue)
463
464 # Instances with different values for the same NID should not compare
465 # equal to each other.
466 assertNotEqual(self._x509name(CN="foo"),
467 self._x509name(CN="bar"))
468
469 # Instances with different NIDs should not compare equal to each other.
470 assertNotEqual(self._x509name(CN="foo"),
471 self._x509name(OU="foo"))
472
473 def _inequality(a, b, assertTrue, assertFalse):
474 assertTrue(a < b)
475 assertTrue(a <= b)
476 assertTrue(b > a)
477 assertTrue(b >= a)
478 assertFalse(a > b)
479 assertFalse(a >= b)
480 assertFalse(b < a)
481 assertFalse(b <= a)
482
483 def assertLessThan(a, b):
484 _inequality(a, b, self.assertTrue, self.assertFalse)
485
486 # An X509Name with a NID with a value which sorts less than the value
487 # of the same NID on another X509Name compares less than the other
488 # X509Name.
489 assertLessThan(self._x509name(CN="abc"),
490 self._x509name(CN="def"))
491
492 def assertGreaterThan(a, b):
493 _inequality(a, b, self.assertFalse, self.assertTrue)
494
495 # An X509Name with a NID with a value which sorts greater than the
496 # value of the same NID on another X509Name compares greater than the
497 # other X509Name.
498 assertGreaterThan(self._x509name(CN="def"),
499 self._x509name(CN="abc"))
Jean-Paul Calderone2aa2b332008-03-06 21:43:14 -0500500
501
Jean-Paul Calderone110cd092008-03-24 17:27:42 -0400502 def test_hash(self):
503 """
504 L{X509Name.hash} returns an integer hash based on the value of the
505 name.
506 """
507 a = self._x509name(CN="foo")
508 b = self._x509name(CN="foo")
509 self.assertEqual(a.hash(), b.hash())
510 a.CN = "bar"
511 self.assertNotEqual(a.hash(), b.hash())
512
513
Jean-Paul Calderonee957a002008-03-25 15:16:51 -0400514 def test_der(self):
515 """
516 L{X509Name.der} returns the DER encoded form of the name.
517 """
518 a = self._x509name(CN="foo", C="US")
519 self.assertEqual(
520 a.der(),
521 '0\x1b1\x0b0\t\x06\x03U\x04\x06\x13\x02US'
522 '1\x0c0\n\x06\x03U\x04\x03\x13\x03foo')
523
524
Jean-Paul Calderonec54cc182008-03-26 21:11:07 -0400525 def test_get_components(self):
526 """
527 L{X509Name.get_components} returns a C{list} of two-tuples of C{str}
528 giving the NIDs and associated values which make up the name.
529 """
530 a = self._x509name()
531 self.assertEqual(a.get_components(), [])
532 a.CN = "foo"
533 self.assertEqual(a.get_components(), [("CN", "foo")])
534 a.organizationalUnitName = "bar"
535 self.assertEqual(
536 a.get_components(),
537 [("CN", "foo"), ("OU", "bar")])
538
Jean-Paul Calderone110cd092008-03-24 17:27:42 -0400539
Jean-Paul Calderoneac0d95f2008-03-10 00:00:42 -0400540class _PKeyInteractionTestsMixin:
541 """
542 Tests which involve another thing and a PKey.
543 """
544 def signable(self):
545 """
546 Return something with a C{set_pubkey}, C{set_pubkey}, and C{sign} method.
547 """
548 raise NotImplementedError()
549
550
551 def test_signWithUngenerated(self):
552 """
553 L{X509Req.sign} raises L{ValueError} when pass a L{PKey} with no parts.
554 """
555 request = self.signable()
556 key = PKey()
557 self.assertRaises(ValueError, request.sign, key, 'MD5')
558
559
560 def test_signWithPublicKey(self):
561 """
562 L{X509Req.sign} raises L{ValueError} when pass a L{PKey} with no
563 private part as the signing key.
564 """
565 request = self.signable()
566 key = PKey()
567 key.generate_key(TYPE_RSA, 512)
568 request.set_pubkey(key)
569 pub = request.get_pubkey()
570 self.assertRaises(ValueError, request.sign, pub, 'MD5')
571
572
573
Jean-Paul Calderone18808652009-07-05 12:54:05 -0400574class X509ReqTests(TestCase, _PKeyInteractionTestsMixin):
Jean-Paul Calderone2aa2b332008-03-06 21:43:14 -0500575 """
576 Tests for L{OpenSSL.crypto.X509Req}.
577 """
Jean-Paul Calderoneac0d95f2008-03-10 00:00:42 -0400578 def signable(self):
579 """
580 Create and return a new L{X509Req}.
581 """
Rick Deane15b1472009-07-09 15:53:42 -0500582 req = X509Req()
583 self.assertEqual(type(X509ReqType).__name__, 'type')
584 self.assertEqual(type(req).__name__, 'X509Req')
585 self.assertEqual(type(req), X509ReqType)
586 return req
Jean-Paul Calderoneac0d95f2008-03-10 00:00:42 -0400587
588
Jean-Paul Calderone2aa2b332008-03-06 21:43:14 -0500589 def test_construction(self):
590 """
591 L{X509Req} takes no arguments and returns an L{X509ReqType} instance.
592 """
593 request = X509Req()
594 self.assertTrue(
595 isinstance(request, X509ReqType),
596 "%r is of type %r, should be %r" % (request, type(request), X509ReqType))
597
598
Jean-Paul Calderone8dd19b82008-12-28 20:41:16 -0500599 def test_version(self):
600 """
601 L{X509ReqType.set_version} sets the X.509 version of the certificate
602 request. L{X509ReqType.get_version} returns the X.509 version of
603 the certificate request. The initial value of the version is 0.
604 """
605 request = X509Req()
606 self.assertEqual(request.get_version(), 0)
607 request.set_version(1)
608 self.assertEqual(request.get_version(), 1)
609 request.set_version(3)
610 self.assertEqual(request.get_version(), 3)
611
612
Jean-Paul Calderone2aa2b332008-03-06 21:43:14 -0500613 def test_get_subject(self):
614 """
615 L{X509ReqType.get_subject} returns an L{X509Name} for the subject of
616 the request and which is valid even after the request object is
617 otherwise dead.
618 """
619 request = X509Req()
620 subject = request.get_subject()
621 self.assertTrue(
622 isinstance(subject, X509NameType),
623 "%r is of type %r, should be %r" % (subject, type(subject), X509NameType))
624 subject.commonName = "foo"
625 self.assertEqual(request.get_subject().commonName, "foo")
626 del request
627 subject.commonName = "bar"
628 self.assertEqual(subject.commonName, "bar")
Jean-Paul Calderone78381d22008-03-06 23:35:22 -0500629
630
631
Jean-Paul Calderone18808652009-07-05 12:54:05 -0400632class X509Tests(TestCase, _PKeyInteractionTestsMixin):
Jean-Paul Calderone78381d22008-03-06 23:35:22 -0500633 """
634 Tests for L{OpenSSL.crypto.X509}.
635 """
Jean-Paul Calderone5ef86512008-04-26 19:06:28 -0400636 pemData = cleartextCertificatePEM + cleartextPrivateKeyPEM
Jean-Paul Calderone8114b452008-03-25 15:27:59 -0400637
Jean-Paul Calderoneac0d95f2008-03-10 00:00:42 -0400638 def signable(self):
639 """
640 Create and return a new L{X509}.
641 """
642 return X509()
643
644
Jean-Paul Calderone78381d22008-03-06 23:35:22 -0500645 def test_construction(self):
646 """
647 L{X509} takes no arguments and returns an instance of L{X509Type}.
648 """
649 certificate = X509()
650 self.assertTrue(
651 isinstance(certificate, X509Type),
652 "%r is of type %r, should be %r" % (certificate,
653 type(certificate),
654 X509Type))
Rick Deane15b1472009-07-09 15:53:42 -0500655 self.assertEqual(type(X509Type).__name__, 'type')
656 self.assertEqual(type(certificate).__name__, 'X509')
657 self.assertEqual(type(certificate), X509Type)
Jean-Paul Calderone78381d22008-03-06 23:35:22 -0500658
659
660 def test_serial_number(self):
661 """
662 The serial number of an L{X509Type} can be retrieved and modified with
663 L{X509Type.get_serial_number} and L{X509Type.set_serial_number}.
664 """
665 certificate = X509()
666 self.assertRaises(TypeError, certificate.set_serial_number)
667 self.assertRaises(TypeError, certificate.set_serial_number, 1, 2)
668 self.assertRaises(TypeError, certificate.set_serial_number, "1")
669 self.assertRaises(TypeError, certificate.set_serial_number, 5.5)
670 self.assertEqual(certificate.get_serial_number(), 0)
671 certificate.set_serial_number(1)
672 self.assertEqual(certificate.get_serial_number(), 1)
673 certificate.set_serial_number(2 ** 32 + 1)
674 self.assertEqual(certificate.get_serial_number(), 2 ** 32 + 1)
675 certificate.set_serial_number(2 ** 64 + 1)
676 self.assertEqual(certificate.get_serial_number(), 2 ** 64 + 1)
Jean-Paul Calderone525ef802008-03-09 20:39:42 -0400677 certificate.set_serial_number(2 ** 128 + 1)
678 self.assertEqual(certificate.get_serial_number(), 2 ** 128 + 1)
679
680
681 def _setBoundTest(self, which):
682 """
683 L{X509Type.set_notBefore} takes a string in the format of an ASN1
684 GENERALIZEDTIME and sets the beginning of the certificate's validity
685 period to it.
686 """
687 certificate = X509()
688 set = getattr(certificate, 'set_not' + which)
689 get = getattr(certificate, 'get_not' + which)
690
Jean-Paul Calderonee0615b52008-03-09 21:44:46 -0400691 # Starts with no value.
692 self.assertEqual(get(), None)
693
Jean-Paul Calderone525ef802008-03-09 20:39:42 -0400694 # GMT (Or is it UTC?) -exarkun
695 when = "20040203040506Z"
696 set(when)
697 self.assertEqual(get(), when)
698
699 # A plus two hours and thirty minutes offset
700 when = "20040203040506+0530"
701 set(when)
702 self.assertEqual(get(), when)
703
704 # A minus one hour fifteen minutes offset
705 when = "20040203040506-0115"
706 set(when)
707 self.assertEqual(get(), when)
708
709 # An invalid string results in a ValueError
710 self.assertRaises(ValueError, set, "foo bar")
711
712
713 def test_set_notBefore(self):
714 """
715 L{X509Type.set_notBefore} takes a string in the format of an ASN1
716 GENERALIZEDTIME and sets the beginning of the certificate's validity
717 period to it.
718 """
719 self._setBoundTest("Before")
720
721
722 def test_set_notAfter(self):
723 """
724 L{X509Type.set_notAfter} takes a string in the format of an ASN1
725 GENERALIZEDTIME and sets the end of the certificate's validity period
726 to it.
727 """
728 self._setBoundTest("After")
Jean-Paul Calderone76576d52008-03-24 16:04:46 -0400729
730
Jean-Paul Calderone38a646d2008-03-25 15:16:18 -0400731 def test_get_notBefore(self):
732 """
733 L{X509Type.get_notBefore} returns a string in the format of an ASN1
734 GENERALIZEDTIME even for certificates which store it as UTCTIME
735 internally.
736 """
Jean-Paul Calderone8114b452008-03-25 15:27:59 -0400737 cert = load_certificate(FILETYPE_PEM, self.pemData)
Jean-Paul Calderone20131f52009-04-01 12:05:45 -0400738 self.assertEqual(cert.get_notBefore(), "20090325123658Z")
Jean-Paul Calderone38a646d2008-03-25 15:16:18 -0400739
740
741 def test_get_notAfter(self):
742 """
743 L{X509Type.get_notAfter} returns a string in the format of an ASN1
744 GENERALIZEDTIME even for certificates which store it as UTCTIME
745 internally.
746 """
Jean-Paul Calderone8114b452008-03-25 15:27:59 -0400747 cert = load_certificate(FILETYPE_PEM, self.pemData)
Jean-Paul Calderone20131f52009-04-01 12:05:45 -0400748 self.assertEqual(cert.get_notAfter(), "20170611123658Z")
Jean-Paul Calderone38a646d2008-03-25 15:16:18 -0400749
750
Jean-Paul Calderone76576d52008-03-24 16:04:46 -0400751 def test_digest(self):
752 """
753 L{X509.digest} returns a string giving ":"-separated hex-encoded words
754 of the digest of the certificate.
755 """
756 cert = X509()
757 self.assertEqual(
758 cert.digest("md5"),
759 "A8:EB:07:F8:53:25:0A:F2:56:05:C5:A5:C4:C4:C7:15")
Jean-Paul Calderone828c9cb2008-04-26 18:06:54 -0400760
761
762
Jean-Paul Calderone18808652009-07-05 12:54:05 -0400763class FunctionTests(TestCase):
Jean-Paul Calderone828c9cb2008-04-26 18:06:54 -0400764 """
765 Tests for free-functions in the L{OpenSSL.crypto} module.
766 """
767 def test_load_privatekey_wrongPassphrase(self):
768 """
769 L{load_privatekey} raises L{OpenSSL.crypto.Error} when it is passed an
770 encrypted PEM and an incorrect passphrase.
771 """
772 self.assertRaises(
773 Error,
774 load_privatekey, FILETYPE_PEM, encryptedPrivateKeyPEM, "quack")
775
776
777 def test_load_privatekey_passphrase(self):
778 """
779 L{load_privatekey} can create a L{PKey} object from an encrypted PEM
780 string if given the passphrase.
781 """
782 key = load_privatekey(
783 FILETYPE_PEM, encryptedPrivateKeyPEM,
784 encryptedPrivateKeyPEMPassphrase)
785 self.assertTrue(isinstance(key, PKeyType))
786
787
788 def test_load_privatekey_wrongPassphraseCallback(self):
789 """
790 L{load_privatekey} raises L{OpenSSL.crypto.Error} when it is passed an
791 encrypted PEM and a passphrase callback which returns an incorrect
792 passphrase.
793 """
794 called = []
795 def cb(*a):
796 called.append(None)
797 return "quack"
798 self.assertRaises(
799 Error,
800 load_privatekey, FILETYPE_PEM, encryptedPrivateKeyPEM, cb)
801 self.assertTrue(called)
802
803 def test_load_privatekey_passphraseCallback(self):
804 """
805 L{load_privatekey} can create a L{PKey} object from an encrypted PEM
806 string if given a passphrase callback which returns the correct
807 password.
808 """
809 called = []
810 def cb(writing):
811 called.append(writing)
812 return encryptedPrivateKeyPEMPassphrase
813 key = load_privatekey(FILETYPE_PEM, encryptedPrivateKeyPEM, cb)
814 self.assertTrue(isinstance(key, PKeyType))
815 self.assertEqual(called, [False])
816
817
818 def test_dump_privatekey_passphrase(self):
819 """
820 L{dump_privatekey} writes an encrypted PEM when given a passphrase.
821 """
822 passphrase = "foo"
823 key = load_privatekey(FILETYPE_PEM, cleartextPrivateKeyPEM)
824 pem = dump_privatekey(FILETYPE_PEM, key, "blowfish", passphrase)
825 self.assertTrue(isinstance(pem, str))
826 loadedKey = load_privatekey(FILETYPE_PEM, pem, passphrase)
827 self.assertTrue(isinstance(loadedKey, PKeyType))
828 self.assertEqual(loadedKey.type(), key.type())
829 self.assertEqual(loadedKey.bits(), key.bits())
830
Jean-Paul Calderonef17e4212009-04-01 14:21:40 -0400831
832 def _runopenssl(self, pem, *args):
833 """
834 Run the command line openssl tool with the given arguments and write
835 the given PEM to its stdin.
836 """
Jean-Paul Calderone16c4d5e2009-05-04 18:27:52 -0400837 write, read = popen2(" ".join(("openssl",) + args), "b")
Jean-Paul Calderone653f5582009-04-01 14:42:32 -0400838 write.write(pem)
839 write.close()
840 return read.read()
Jean-Paul Calderonef17e4212009-04-01 14:21:40 -0400841
842
Rick Dean5b7b6372009-04-01 11:34:06 -0500843 def test_dump_certificate(self):
844 """
845 L{dump_certificate} writes PEM, DER, and text.
846 """
Jean-Paul Calderonef17e4212009-04-01 14:21:40 -0400847 pemData = cleartextCertificatePEM + cleartextPrivateKeyPEM
Rick Dean5b7b6372009-04-01 11:34:06 -0500848 cert = load_certificate(FILETYPE_PEM, pemData)
849 dumped_pem = dump_certificate(FILETYPE_PEM, cert)
850 self.assertEqual(dumped_pem, cleartextCertificatePEM)
851 dumped_der = dump_certificate(FILETYPE_ASN1, cert)
Jean-Paul Calderonef17e4212009-04-01 14:21:40 -0400852 good_der = self._runopenssl(dumped_pem, "x509", "-outform", "DER")
Rick Dean5b7b6372009-04-01 11:34:06 -0500853 self.assertEqual(dumped_der, good_der)
854 cert2 = load_certificate(FILETYPE_ASN1, dumped_der)
855 dumped_pem2 = dump_certificate(FILETYPE_PEM, cert2)
856 self.assertEqual(dumped_pem2, cleartextCertificatePEM)
857 dumped_text = dump_certificate(FILETYPE_TEXT, cert)
Jean-Paul Calderonef17e4212009-04-01 14:21:40 -0400858 good_text = self._runopenssl(dumped_pem, "x509", "-noout", "-text")
Rick Dean5b7b6372009-04-01 11:34:06 -0500859 self.assertEqual(dumped_text, good_text)
860
861
862 def test_dump_privatekey(self):
863 """
864 L{dump_privatekey} writes a PEM, DER, and text.
865 """
866 key = load_privatekey(FILETYPE_PEM, cleartextPrivateKeyPEM)
867 dumped_pem = dump_privatekey(FILETYPE_PEM, key)
868 self.assertEqual(dumped_pem, cleartextPrivateKeyPEM)
869 dumped_der = dump_privatekey(FILETYPE_ASN1, key)
Jean-Paul Calderonef17e4212009-04-01 14:21:40 -0400870 # XXX This OpenSSL call writes "writing RSA key" to standard out. Sad.
871 good_der = self._runopenssl(dumped_pem, "rsa", "-outform", "DER")
Rick Dean5b7b6372009-04-01 11:34:06 -0500872 self.assertEqual(dumped_der, good_der)
873 key2 = load_privatekey(FILETYPE_ASN1, dumped_der)
874 dumped_pem2 = dump_privatekey(FILETYPE_PEM, key2)
875 self.assertEqual(dumped_pem2, cleartextPrivateKeyPEM)
876 dumped_text = dump_privatekey(FILETYPE_TEXT, key)
Jean-Paul Calderonef17e4212009-04-01 14:21:40 -0400877 good_text = self._runopenssl(dumped_pem, "rsa", "-noout", "-text")
Rick Dean5b7b6372009-04-01 11:34:06 -0500878 self.assertEqual(dumped_text, good_text)
879
Jean-Paul Calderonef17e4212009-04-01 14:21:40 -0400880
Rick Dean5b7b6372009-04-01 11:34:06 -0500881 def test_dump_certificate_request(self):
882 """
883 L{dump_certificate_request} writes a PEM, DER, and text.
884 """
885 req = load_certificate_request(FILETYPE_PEM, cleartextCertificateRequestPEM)
886 dumped_pem = dump_certificate_request(FILETYPE_PEM, req)
887 self.assertEqual(dumped_pem, cleartextCertificateRequestPEM)
888 dumped_der = dump_certificate_request(FILETYPE_ASN1, req)
Jean-Paul Calderonef17e4212009-04-01 14:21:40 -0400889 good_der = self._runopenssl(dumped_pem, "req", "-outform", "DER")
Rick Dean5b7b6372009-04-01 11:34:06 -0500890 self.assertEqual(dumped_der, good_der)
891 req2 = load_certificate_request(FILETYPE_ASN1, dumped_der)
892 dumped_pem2 = dump_certificate_request(FILETYPE_PEM, req2)
893 self.assertEqual(dumped_pem2, cleartextCertificateRequestPEM)
894 dumped_text = dump_certificate_request(FILETYPE_TEXT, req)
Jean-Paul Calderonef17e4212009-04-01 14:21:40 -0400895 good_text = self._runopenssl(dumped_pem, "req", "-noout", "-text")
Rick Dean5b7b6372009-04-01 11:34:06 -0500896 self.assertEqual(dumped_text, good_text)
897
Jean-Paul Calderone828c9cb2008-04-26 18:06:54 -0400898
899 def test_dump_privatekey_passphraseCallback(self):
900 """
901 L{dump_privatekey} writes an encrypted PEM when given a callback which
902 returns the correct passphrase.
903 """
904 passphrase = "foo"
905 called = []
906 def cb(writing):
907 called.append(writing)
908 return passphrase
909 key = load_privatekey(FILETYPE_PEM, cleartextPrivateKeyPEM)
910 pem = dump_privatekey(FILETYPE_PEM, key, "blowfish", cb)
911 self.assertTrue(isinstance(pem, str))
912 self.assertEqual(called, [True])
913 loadedKey = load_privatekey(FILETYPE_PEM, pem, passphrase)
914 self.assertTrue(isinstance(loadedKey, PKeyType))
915 self.assertEqual(loadedKey.type(), key.type())
916 self.assertEqual(loadedKey.bits(), key.bits())
Rick Dean5b7b6372009-04-01 11:34:06 -0500917
918
Jean-Paul Calderonedc138fa2009-06-27 14:32:07 -0400919 def test_load_pkcs7_data(self):
920 """
921 L{load_pkcs7_data} accepts a PKCS#7 string and returns an instance of
922 L{PKCS7Type}.
923 """
924 pkcs7 = load_pkcs7_data(FILETYPE_PEM, pkcs7Data)
925 self.assertTrue(isinstance(pkcs7, PKCS7Type))
Rick Deane15b1472009-07-09 15:53:42 -0500926 self.assertEqual(type(PKCS7Type).__name__, 'type')
927 self.assertEqual(type(pkcs7).__name__, 'PKCS7')
928 self.assertEqual(type(pkcs7), PKCS7Type)
Jean-Paul Calderonedc138fa2009-06-27 14:32:07 -0400929
930
931 def test_load_pkcs12(self):
932 """
933 L{load_pkcs12} accepts a PKCS#12 string and returns an instance of
934 L{PKCS12Type}.
935 """
936 pkcs12 = load_pkcs12(pkcs12Data)
937 self.assertTrue(isinstance(pkcs12, PKCS12Type))
Rick Deane15b1472009-07-09 15:53:42 -0500938 self.assertEqual(type(PKCS12Type).__name__, 'type')
939 self.assertEqual(type(pkcs12).__name__, 'PKCS12')
940 self.assertEqual(type(pkcs12), PKCS12Type)
Jean-Paul Calderonedc138fa2009-06-27 14:32:07 -0400941
942
943
944class NetscapeSPKITests(TestCase):
945 """
946 Tests for L{OpenSSL.crypto.NetscapeSPKI}.
947 """
948 def test_construction(self):
949 """
950 L{NetscapeSPKI} returns an instance of L{NetscapeSPKIType}.
951 """
952 nspki = NetscapeSPKI()
953 self.assertTrue(isinstance(nspki, NetscapeSPKIType))
Rick Deane15b1472009-07-09 15:53:42 -0500954 self.assertEqual(type(NetscapeSPKIType).__name__, 'type')
955 self.assertEqual(type(nspki).__name__, 'NetscapeSPKI')
956 self.assertEqual(type(nspki), NetscapeSPKIType)
Jean-Paul Calderonedc138fa2009-06-27 14:32:07 -0400957
958
959
Rick Dean5b7b6372009-04-01 11:34:06 -0500960if __name__ == '__main__':
961 main()