blob: 0a283e6c07a8d72a47cdcd75c304a4ad06addf80 [file] [log] [blame]
Jean-Paul Calderone8b63d452008-03-21 18:31:12 -04001# Copyright (C) Jean-Paul Calderone 2008, All rights reserved
2
Jean-Paul Calderoned8782ad2008-03-04 23:39:59 -05003"""
4Unit tests for L{OpenSSL.crypto}.
5"""
6
Jean-Paul Calderone0b88b6a2009-07-05 12:44:41 -04007from unittest import main
8
Jean-Paul Calderone653f5582009-04-01 14:42:32 -04009from os import popen2
Jean-Paul Calderoned8782ad2008-03-04 23:39:59 -050010
11from OpenSSL.crypto import TYPE_RSA, TYPE_DSA, Error, PKey, PKeyType
Jean-Paul Calderone78381d22008-03-06 23:35:22 -050012from OpenSSL.crypto import X509, X509Type, X509Name, X509NameType
Jean-Paul Calderone2aa2b332008-03-06 21:43:14 -050013from OpenSSL.crypto import X509Req, X509ReqType
Jean-Paul Calderonee7db4b42008-12-31 13:39:24 -050014from OpenSSL.crypto import X509Extension, X509ExtensionType
Rick Dean5b7b6372009-04-01 11:34:06 -050015from OpenSSL.crypto import load_certificate, load_privatekey
Jean-Paul Calderonef17e4212009-04-01 14:21:40 -040016from OpenSSL.crypto import FILETYPE_PEM, FILETYPE_ASN1, FILETYPE_TEXT
Jean-Paul Calderone71919862009-04-01 13:01:19 -040017from OpenSSL.crypto import dump_certificate, load_certificate_request
18from OpenSSL.crypto import dump_certificate_request, dump_privatekey
Jean-Paul Calderonedc138fa2009-06-27 14:32:07 -040019from OpenSSL.crypto import PKCS7Type, load_pkcs7_data
20from OpenSSL.crypto import PKCS12Type, load_pkcs12
21from OpenSSL.crypto import NetscapeSPKI, NetscapeSPKIType
Jean-Paul Calderone0b88b6a2009-07-05 12:44:41 -040022from OpenSSL.test.util import TestCase
Jean-Paul Calderone828c9cb2008-04-26 18:06:54 -040023
Rick Dean623ee362009-07-17 12:22:16 -050024from OpenSSL.crypto import load_pkcs12, PKCS12
25from subprocess import Popen, PIPE
Jean-Paul Calderone828c9cb2008-04-26 18:06:54 -040026
Jean-Paul Calderone20131f52009-04-01 12:05:45 -040027cleartextCertificatePEM = """-----BEGIN CERTIFICATE-----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44-----END CERTIFICATE-----
45"""
Jean-Paul Calderone828c9cb2008-04-26 18:06:54 -040046
Jean-Paul Calderone20131f52009-04-01 12:05:45 -040047cleartextPrivateKeyPEM = """-----BEGIN RSA PRIVATE KEY-----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61-----END RSA PRIVATE KEY-----
62"""
Jean-Paul Calderone828c9cb2008-04-26 18:06:54 -040063
Rick Dean5b7b6372009-04-01 11:34:06 -050064cleartextCertificateRequestPEM = (
65 "-----BEGIN CERTIFICATE REQUEST-----\n"
66 "MIIBnjCCAQcCAQAwXjELMAkGA1UEBhMCVVMxCzAJBgNVBAgTAklMMRAwDgYDVQQH\n"
67 "EwdDaGljYWdvMRcwFQYDVQQKEw5NeSBDb21wYW55IEx0ZDEXMBUGA1UEAxMORnJl\n"
68 "ZGVyaWNrIERlYW4wgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBANp6Y17WzKSw\n"
69 "BsUWkXdqg6tnXy8H8hA1msCMWpc+/2KJ4mbv5NyD6UD+/SqagQqulPbF/DFea9nA\n"
70 "E0zhmHJELcM8gUTIlXv/cgDWnmK4xj8YkjVUiCdqKRAKeuzLG1pGmwwF5lGeJpXN\n"
71 "xQn5ecR0UYSOWj6TTGXB9VyUMQzCClcBAgMBAAGgADANBgkqhkiG9w0BAQUFAAOB\n"
72 "gQAAJGuF/R/GGbeC7FbFW+aJgr9ee0Xbl6nlhu7pTe67k+iiKT2dsl2ti68MVTnu\n"
73 "Vrb3HUNqOkiwsJf6kCtq5oPn3QVYzTa76Dt2y3Rtzv6boRSlmlfrgS92GNma8JfR\n"
74 "oICQk3nAudi6zl1Dix3BCv1pUp5KMtGn3MeDEi6QFGy2rA==\n"
75 "-----END CERTIFICATE REQUEST-----\n")
76
Jean-Paul Calderone20131f52009-04-01 12:05:45 -040077encryptedPrivateKeyPEM = """-----BEGIN RSA PRIVATE KEY-----
78Proc-Type: 4,ENCRYPTED
79DEK-Info: DES-EDE3-CBC,9573604A18579E9E
Jean-Paul Calderone5ef86512008-04-26 19:06:28 -040080
Jean-Paul Calderone20131f52009-04-01 12:05:45 -040081SHOho56WxDkT0ht10UTeKc0F5u8cqIa01kzFAmETw0MAs8ezYtK15NPdCXUm3X/2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94-----END RSA PRIVATE KEY-----
95"""
Jean-Paul Calderone828c9cb2008-04-26 18:06:54 -040096encryptedPrivateKeyPEMPassphrase = "foobar"
97
Jean-Paul Calderonedc138fa2009-06-27 14:32:07 -040098# Some PKCS12 data, base64 encoded. The data itself was constructed using the
99# openssl command line:
100#
101# openssl pkcs12 -export -in s.pem -out o.p12 -inkey s.pem -certfile s.pem
102#
103# With s.pem containing a private key and certificate. The contents of the
104# generated file, o.p12, were then base64 encoded to produce this value.
105pkcs12Data = """\
106MIIJGQIBAzCCCN8GCSqGSIb3DQEHAaCCCNAEggjMMIIIyDCCBucGCSqGSIb3DQEHBqCCBtgwggbU
107AgEAMIIGzQYJKoZIhvcNAQcBMBwGCiqGSIb3DQEMAQYwDgQIdwchN+KDjC8CAggAgIIGoOh59lWQ
108vz7FB2ewPHduY3pBhJX1W7ioN1k2xAoelE04v30CvNNa0A8qIjk6U7WLRXL74jG1xPq+WcAUtNtk
1093ZfTaPTPR+q5xVNBZFHeKDirt7yherl8Xs16OEl0IgNpNHRLeHxi4JeBqkGReq1vkybus2ALyQ/B
110FgbrNJiaGpvUx64A3FnHKbT0pVIvsg5iqcpCQ2SDLeJnqKFuP/2+SE5WnNvM6SBG20HMNOR9+SM5
111tPETapeu7AFkJ03FY3OF+fllHnv8fyXXDkv7F1bX8P2q6wQSRK6DXq6DO1Qjqzmrrtk4Pq6Hne2x
112onN2Bx9yUR83tNn4bQWNDasbnQpdI3Fsgg6RS5+B7y9tw37nygyND9ME0NcCysDov5zIG84gsZHn
1133LDFQkP4M7iBscNCund18FNQomrqAmPvejos+OXMQlNd/la15UQgUqv33V91WIMNmDDt80eVdxp8
1140D4gCvIl3xPp0Lp1EwhXwQxmx7LS3Fj0yCaiBOVevqhp9uq0i5hhdPA4a/XyIAeuJCS07s21fAe3
115Ay3S7olg1DTtN9wSJL6C1wus3VDMicB82ZC4+wAbfheedseenA0ubMDj38JqHgUtb02jMb9Ff3QR
116Hj6qzv5nJIJjmCG+cBatMh775f/9y/7wuElZYjv/vPb9S4Oraxz3ZgLtkU15PVeLjFHsHWRnrhVC
117ORaDEdX42kXfTMTaDsqFPg10ZS4fb7kCqD+ef0U4nCB0pfKyDo3hyDxHxGMqEVwyhKrl2UKljmcz
11802AGKxf6SERGdApGX4ENSuEG8v37CJTnmf1Tvf+K3fcCwBWTVDjhCgyCYrqaR02r8ixjRCU47L7e
119fe0c6WcTIYcXwWPPwqk6lUm8jH/IFSohUxrGaLRsvtYMK5O1ss3fGnv5DysLoWRRHNsp9EqJ+nXP
120bC5KRS01M78twFHXyIVgML13sMwox3aMCADP4HAFisUTQjSq0LlrHHVSIdIz3dEC3jsIs2bRxaVE
121dGaMorvVhoCNucGtdXD778EHsPy6ierUd6LijOYGs+yxUKVdeSAHYiQqBB/0uwo5tqeUjc1xte4V
1227o68M0TnaeXZk6eJj8cy+Z7uvlKrEWG/d+yDp6ZrS/uuCUqlfakSUQVLwhpupRs6bOfbU9VWmuuW
123T/whDpJHkGRqz15d3K43wkF6gWx7tpnwps2boB3fjQVlQ20xJ+4QjYV6Yu/0dlhyU69/sZEHQXvL
124xdZsLwkjEHhGPoMkVSpSZF7mSgM4iI8nFkPbfNOSBGpW8GTYUQN+YI+GjQYwk2zGpB3Fhfc9lVuK
125QqlYUtGkj2UauO9diqS1rVOIQORJ49EmA0w0VJz6A3teklGRQvdfSiTdTmg+PcYtdllquni0MMJO
1263t7fpOnfmZRxvOx9J8WsLlz18uvq8+jDGs0InNFGxUf5v+iTBjY2ByzaMZDa84xqu6+cVuGcQGRu
127NJCpxWNOyfKrDnJ+TOg1/AV3dHiuBNeyOE6XkwzhfEH0TaAWvqtmqRFBIjhsMwkg9qooeJwWANUP
128fq+UxpR8M5UDMBEKcwk+paSLtzAL/Xznk2q9U2JKPrmcD79bSNafDZ33/5U05mGq3CmY5DVjoy+C
129qhbfIQssrNhWxN3yCtHDDOrXVwEb/DAKSIfVz07mRKP/9jW2aC3nmRSt8Gd+JYy4nNRFAcatIcoC
130IHB5rtEXdhHHfZsAaVPGPgfpeVGIK8FXZTSLYGSGHsjXAXG0xS9nXX/8mHyKP3SKd5/h1H9llYhh
131nXXBM7lY6W8A6wRmMmOTkHn5Ovi+mavWeCioKiGfqoUQDRow/PdfwVLUVhe1OTCx4G5F8mXLpIWp
1321wzrOqMfOGDKD+RCgz/5sqVzAvgj0LTttoRKGipJjVb5luaLZswKCtlemD9xRb8J/PRp/6YHvrxW
1332taIJyZPBmbiqXAIFCiwjnurnP9WK4h6ss+bwj8lY3fB8CPwRAyy2p7dpXeNFby0ZkWPlBqKEXgZ
13403uQ8mUGXrty5ha03z7Gzab3RqAUu7l21i4DBbZjcn8j5NPrc3cNVpbJMic/0NDvojI3pIqsQ3yv
1353JbYdkVzlmEmapHCgF/SGVkZMo28uoC1upZMHRvb4zIrRlj1CVlUxmQu00q8GudNBcPOrQVONt5+
136eBvxD/Dco26wHPusPieUMlkj9VP9FS24bdocKXOL7KHOnsZ5oLS1S4hA7l7wEtzfoRHt1M1x8UCQ
137hYcQEbZsOrxqmKlbgm0B6bBsdK0IxGNhgdtKHUCdxHYkpSEYLXwwggHZBgkqhkiG9w0BBwGgggHK
138BIIBxjCCAcIwggG+BgsqhkiG9w0BDAoBAqCCAYYwggGCMBwGCiqGSIb3DQEMAQMwDgQIZ+Y92Rjm
139N5cCAggABIIBYD2z0NOajj7NlnWDRO8hlRiDIo8UTZ3E2UjP4rSbKh7ZLGULHALuH+gcwD3814U7
140VukIkyhiE1VvqPMXb2m4VTCp9BE4oXda0S2Mao1nKxbeMTZ3GE3+C7HPIuTTNQnsnpspIctNAarC
141IIuhgSQmjdILrkmX0QjH5vrQFbdpcDDb/IRba13hws8FM2OrduM+MDEM6xkwiG3AGDgKEPYsd1Ai
142uP8EMX4dzZ9BvEJHaAynzSpUxWy13ntMxNfeIuOKAT9HNsHr0MQgDDpVEhRY26IAZhNFfjtWdAjI
143OiMxk3BjixMUof9i1Xh+4yQsrzLcBJazCyphtb6YvnorQQxWUnaQXWjmU4QS36ajuyOXgFf1Z3jk
1446CLztf6kq3rY4uQ7aQIUJjUcWP0dUGr6LLZRVYP4uL/N/QSasliQGhTxrjEHywyPqRQjKVgV9c6D
145ueHmII59hoZPA6a2cYpQnsuFoeAxJTAjBgkqhkiG9w0BCRUxFgQUVFyHPk/34xv0OdgMn18Sjffj
1467lcwMTAhMAkGBSsOAwIaBQAEFBxVa/flSZttaXvzg+oLJBqgUWuVBAh0s4gPVAEKHAICCAA=
147""".decode('base64')
148
149# Some PKCS#7 stuff. Generated with the openssl command line:
150#
151# openssl crl2pkcs7 -inform pem -outform pem -certfile s.pem -nocrl
152#
153# with a certificate and key (but the key should be irrelevant) in s.pem
154pkcs7Data = """\
155-----BEGIN PKCS7-----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174-----END PKCS7-----
175"""
176
Jean-Paul Calderone828c9cb2008-04-26 18:06:54 -0400177
Jean-Paul Calderone7da26a72008-03-06 00:35:20 -0500178
Jean-Paul Calderone18808652009-07-05 12:54:05 -0400179class X509ExtTests(TestCase):
Jean-Paul Calderonee7db4b42008-12-31 13:39:24 -0500180 def test_construction(self):
181 """
182 L{X509Extension} accepts an extension type name, a critical flag,
183 and an extension value and returns an L{X509ExtensionType} instance.
184 """
Jean-Paul Calderone2ee1e7c2008-12-31 14:58:38 -0500185 basic = X509Extension('basicConstraints', True, 'CA:true')
Jean-Paul Calderonee7db4b42008-12-31 13:39:24 -0500186 self.assertTrue(
187 isinstance(basic, X509ExtensionType),
188 "%r is of type %r, should be %r" % (
189 basic, type(basic), X509ExtensionType))
190
Jean-Paul Calderone2ee1e7c2008-12-31 14:58:38 -0500191 comment = X509Extension('nsComment', False, 'pyOpenSSL unit test')
Jean-Paul Calderonee7db4b42008-12-31 13:39:24 -0500192 self.assertTrue(
193 isinstance(comment, X509ExtensionType),
194 "%r is of type %r, should be %r" % (
195 comment, type(comment), X509ExtensionType))
196
197
Jean-Paul Calderone391585f2008-12-31 14:36:31 -0500198 def test_invalid_extension(self):
199 """
200 L{X509Extension} raises something if it is passed a bad extension
201 name or value.
202 """
203 self.assertRaises(
204 Error, X509Extension, 'thisIsMadeUp', False, 'hi')
205 self.assertRaises(
206 Error, X509Extension, 'basicConstraints', False, 'blah blah')
207
Jean-Paul Calderone2ee1e7c2008-12-31 14:58:38 -0500208 # Exercise a weird one (an extension which uses the r2i method). This
209 # exercises the codepath that requires a non-NULL ctx to be passed to
210 # X509V3_EXT_nconf. It can't work now because we provide no
211 # configuration database. It might be made to work in the future.
212 self.assertRaises(
213 Error, X509Extension, 'proxyCertInfo', True,
214 'language:id-ppl-anyLanguage,pathlen:1,policy:text:AB')
215
Jean-Paul Calderone391585f2008-12-31 14:36:31 -0500216
Jean-Paul Calderonee7db4b42008-12-31 13:39:24 -0500217 def test_get_critical(self):
218 """
219 L{X509ExtensionType.get_critical} returns the value of the
220 extension's critical flag.
221 """
Jean-Paul Calderone2ee1e7c2008-12-31 14:58:38 -0500222 ext = X509Extension('basicConstraints', True, 'CA:true')
Jean-Paul Calderonee7db4b42008-12-31 13:39:24 -0500223 self.assertTrue(ext.get_critical())
Jean-Paul Calderone2ee1e7c2008-12-31 14:58:38 -0500224 ext = X509Extension('basicConstraints', False, 'CA:true')
Jean-Paul Calderonee7db4b42008-12-31 13:39:24 -0500225 self.assertFalse(ext.get_critical())
226
Jean-Paul Calderone7535dab2008-03-06 18:53:11 -0500227
Jean-Paul Calderonef8c5fab2008-12-31 15:53:48 -0500228 def test_get_short_name(self):
229 """
230 L{X509ExtensionType.get_short_name} returns a string giving the short
231 type name of the extension.
232 """
233 ext = X509Extension('basicConstraints', True, 'CA:true')
234 self.assertEqual(ext.get_short_name(), 'basicConstraints')
235 ext = X509Extension('nsComment', True, 'foo bar')
236 self.assertEqual(ext.get_short_name(), 'nsComment')
237
238
Jean-Paul Calderone391585f2008-12-31 14:36:31 -0500239
Jean-Paul Calderone18808652009-07-05 12:54:05 -0400240class PKeyTests(TestCase):
Jean-Paul Calderoneac930e12008-03-06 18:50:51 -0500241 """
242 Unit tests for L{OpenSSL.crypto.PKey}.
243 """
Jean-Paul Calderoned8782ad2008-03-04 23:39:59 -0500244 def test_construction(self):
245 """
246 L{PKey} takes no arguments and returns a new L{PKeyType} instance.
247 """
248 self.assertRaises(TypeError, PKey, None)
249 key = PKey()
250 self.assertTrue(
251 isinstance(key, PKeyType),
252 "%r is of type %r, should be %r" % (key, type(key), PKeyType))
253
254
255 def test_pregeneration(self):
256 """
257 L{PKeyType.bits} and L{PKeyType.type} return C{0} before the key is
258 generated.
259 """
260 key = PKey()
261 self.assertEqual(key.type(), 0)
262 self.assertEqual(key.bits(), 0)
263
264
265 def test_failedGeneration(self):
266 """
Jean-Paul Calderoneab82db72008-03-06 00:09:31 -0500267 L{PKeyType.generate_key} takes two arguments, the first giving the key
268 type as one of L{TYPE_RSA} or L{TYPE_DSA} and the second giving the
269 number of bits to generate. If an invalid type is specified or
270 generation fails, L{Error} is raised. If an invalid number of bits is
271 specified, L{ValueError} or L{Error} is raised.
Jean-Paul Calderoned8782ad2008-03-04 23:39:59 -0500272 """
273 key = PKey()
274 self.assertRaises(TypeError, key.generate_key)
275 self.assertRaises(TypeError, key.generate_key, 1, 2, 3)
276 self.assertRaises(TypeError, key.generate_key, "foo", "bar")
277 self.assertRaises(Error, key.generate_key, -1, 0)
Jean-Paul Calderoneab82db72008-03-06 00:09:31 -0500278
Jean-Paul Calderoneab82db72008-03-06 00:09:31 -0500279 self.assertRaises(ValueError, key.generate_key, TYPE_RSA, -1)
280 self.assertRaises(ValueError, key.generate_key, TYPE_RSA, 0)
Jean-Paul Calderoned71fe982008-03-06 00:31:50 -0500281
282 # XXX RSA generation for small values of bits is fairly buggy in a wide
283 # range of OpenSSL versions. I need to figure out what the safe lower
284 # bound for a reasonable number of OpenSSL versions is and explicitly
285 # check for that in the wrapper. The failure behavior is typically an
286 # infinite loop inside OpenSSL.
287
288 # self.assertRaises(Error, key.generate_key, TYPE_RSA, 2)
Jean-Paul Calderoned8782ad2008-03-04 23:39:59 -0500289
290 # XXX DSA generation seems happy with any number of bits. The DSS
291 # says bits must be between 512 and 1024 inclusive. OpenSSL's DSA
292 # generator doesn't seem to care about the upper limit at all. For
Jean-Paul Calderoneeff3cd92008-03-05 22:35:26 -0500293 # the lower limit, it uses 512 if anything smaller is specified.
Jean-Paul Calderoned8782ad2008-03-04 23:39:59 -0500294 # So, it doesn't seem possible to make generate_key fail for
295 # TYPE_DSA with a bits argument which is at least an int.
296
297 # self.assertRaises(Error, key.generate_key, TYPE_DSA, -7)
298
299
300 def test_rsaGeneration(self):
301 """
302 L{PKeyType.generate_key} generates an RSA key when passed
303 L{TYPE_RSA} as a type and a reasonable number of bits.
304 """
305 bits = 128
306 key = PKey()
307 key.generate_key(TYPE_RSA, bits)
308 self.assertEqual(key.type(), TYPE_RSA)
309 self.assertEqual(key.bits(), bits)
310
311
312 def test_dsaGeneration(self):
313 """
314 L{PKeyType.generate_key} generates a DSA key when passed
315 L{TYPE_DSA} as a type and a reasonable number of bits.
316 """
317 # 512 is a magic number. The DSS (Digital Signature Standard)
318 # allows a minimum of 512 bits for DSA. DSA_generate_parameters
319 # will silently promote any value below 512 to 512.
320 bits = 512
321 key = PKey()
322 key.generate_key(TYPE_DSA, bits)
323 self.assertEqual(key.type(), TYPE_DSA)
324 self.assertEqual(key.bits(), bits)
325
326
327 def test_regeneration(self):
328 """
329 L{PKeyType.generate_key} can be called multiple times on the same
330 key to generate new keys.
331 """
332 key = PKey()
333 for type, bits in [(TYPE_RSA, 512), (TYPE_DSA, 576)]:
334 key.generate_key(type, bits)
335 self.assertEqual(key.type(), type)
336 self.assertEqual(key.bits(), bits)
Jean-Paul Calderoneeff3cd92008-03-05 22:35:26 -0500337
338
339
Jean-Paul Calderone18808652009-07-05 12:54:05 -0400340class X509NameTests(TestCase):
Jean-Paul Calderoneeff3cd92008-03-05 22:35:26 -0500341 """
342 Unit tests for L{OpenSSL.crypto.X509Name}.
343 """
Jean-Paul Calderonee098dc72008-03-06 18:36:19 -0500344 def _x509name(self, **attrs):
345 # XXX There's no other way to get a new X509Name yet.
346 name = X509().get_subject()
347 attrs = attrs.items()
348 # Make the order stable - order matters!
349 attrs.sort(lambda (k1, v1), (k2, v2): cmp(v1, v2))
350 for k, v in attrs:
351 setattr(name, k, v)
352 return name
353
354
Jean-Paul Calderoneeff3cd92008-03-05 22:35:26 -0500355 def test_attributes(self):
356 """
357 L{X509NameType} instances have attributes for each standard (?)
358 X509Name field.
359 """
Jean-Paul Calderonee098dc72008-03-06 18:36:19 -0500360 name = self._x509name()
Jean-Paul Calderoneeff3cd92008-03-05 22:35:26 -0500361 name.commonName = "foo"
362 self.assertEqual(name.commonName, "foo")
363 self.assertEqual(name.CN, "foo")
364 name.CN = "baz"
365 self.assertEqual(name.commonName, "baz")
366 self.assertEqual(name.CN, "baz")
367 name.commonName = "bar"
368 self.assertEqual(name.commonName, "bar")
369 self.assertEqual(name.CN, "bar")
370 name.CN = "quux"
371 self.assertEqual(name.commonName, "quux")
372 self.assertEqual(name.CN, "quux")
373
374
Jean-Paul Calderoneeff3cd92008-03-05 22:35:26 -0500375 def test_copy(self):
376 """
377 L{X509Name} creates a new L{X509NameType} instance with all the same
378 attributes as an existing L{X509NameType} instance when called with
379 one.
380 """
Jean-Paul Calderonee098dc72008-03-06 18:36:19 -0500381 name = self._x509name(commonName="foo", emailAddress="bar@example.com")
Jean-Paul Calderoneeff3cd92008-03-05 22:35:26 -0500382
383 copy = X509Name(name)
384 self.assertEqual(copy.commonName, "foo")
385 self.assertEqual(copy.emailAddress, "bar@example.com")
Jean-Paul Calderonee098dc72008-03-06 18:36:19 -0500386
387 # Mutate the copy and ensure the original is unmodified.
Jean-Paul Calderoneeff3cd92008-03-05 22:35:26 -0500388 copy.commonName = "baz"
389 self.assertEqual(name.commonName, "foo")
Jean-Paul Calderonee098dc72008-03-06 18:36:19 -0500390
391 # Mutate the original and ensure the copy is unmodified.
Jean-Paul Calderoneeff3cd92008-03-05 22:35:26 -0500392 name.emailAddress = "quux@example.com"
393 self.assertEqual(copy.emailAddress, "bar@example.com")
394
Jean-Paul Calderonee098dc72008-03-06 18:36:19 -0500395
396 def test_repr(self):
397 """
398 L{repr} passed an L{X509NameType} instance should return a string
399 containing a description of the type and the NIDs which have been set
400 on it.
401 """
402 name = self._x509name(commonName="foo", emailAddress="bar")
403 self.assertEqual(
404 repr(name),
405 "<X509Name object '/emailAddress=bar/CN=foo'>")
406
407
408 def test_comparison(self):
409 """
410 L{X509NameType} instances should compare based on their NIDs.
411 """
412 def _equality(a, b, assertTrue, assertFalse):
413 assertTrue(a == b, "(%r == %r) --> False" % (a, b))
414 assertFalse(a != b)
415 assertTrue(b == a)
416 assertFalse(b != a)
417
418 def assertEqual(a, b):
419 _equality(a, b, self.assertTrue, self.assertFalse)
420
421 # Instances compare equal to themselves.
422 name = self._x509name()
423 assertEqual(name, name)
424
425 # Empty instances should compare equal to each other.
426 assertEqual(self._x509name(), self._x509name())
427
428 # Instances with equal NIDs should compare equal to each other.
429 assertEqual(self._x509name(commonName="foo"),
430 self._x509name(commonName="foo"))
431
432 # Instance with equal NIDs set using different aliases should compare
433 # equal to each other.
434 assertEqual(self._x509name(commonName="foo"),
435 self._x509name(CN="foo"))
436
437 # Instances with more than one NID with the same values should compare
438 # equal to each other.
439 assertEqual(self._x509name(CN="foo", organizationalUnitName="bar"),
440 self._x509name(commonName="foo", OU="bar"))
441
442 def assertNotEqual(a, b):
443 _equality(a, b, self.assertFalse, self.assertTrue)
444
445 # Instances with different values for the same NID should not compare
446 # equal to each other.
447 assertNotEqual(self._x509name(CN="foo"),
448 self._x509name(CN="bar"))
449
450 # Instances with different NIDs should not compare equal to each other.
451 assertNotEqual(self._x509name(CN="foo"),
452 self._x509name(OU="foo"))
453
454 def _inequality(a, b, assertTrue, assertFalse):
455 assertTrue(a < b)
456 assertTrue(a <= b)
457 assertTrue(b > a)
458 assertTrue(b >= a)
459 assertFalse(a > b)
460 assertFalse(a >= b)
461 assertFalse(b < a)
462 assertFalse(b <= a)
463
464 def assertLessThan(a, b):
465 _inequality(a, b, self.assertTrue, self.assertFalse)
466
467 # An X509Name with a NID with a value which sorts less than the value
468 # of the same NID on another X509Name compares less than the other
469 # X509Name.
470 assertLessThan(self._x509name(CN="abc"),
471 self._x509name(CN="def"))
472
473 def assertGreaterThan(a, b):
474 _inequality(a, b, self.assertFalse, self.assertTrue)
475
476 # An X509Name with a NID with a value which sorts greater than the
477 # value of the same NID on another X509Name compares greater than the
478 # other X509Name.
479 assertGreaterThan(self._x509name(CN="def"),
480 self._x509name(CN="abc"))
Jean-Paul Calderone2aa2b332008-03-06 21:43:14 -0500481
482
Jean-Paul Calderone110cd092008-03-24 17:27:42 -0400483 def test_hash(self):
484 """
485 L{X509Name.hash} returns an integer hash based on the value of the
486 name.
487 """
488 a = self._x509name(CN="foo")
489 b = self._x509name(CN="foo")
490 self.assertEqual(a.hash(), b.hash())
491 a.CN = "bar"
492 self.assertNotEqual(a.hash(), b.hash())
493
494
Jean-Paul Calderonee957a002008-03-25 15:16:51 -0400495 def test_der(self):
496 """
497 L{X509Name.der} returns the DER encoded form of the name.
498 """
499 a = self._x509name(CN="foo", C="US")
500 self.assertEqual(
501 a.der(),
502 '0\x1b1\x0b0\t\x06\x03U\x04\x06\x13\x02US'
503 '1\x0c0\n\x06\x03U\x04\x03\x13\x03foo')
504
505
Jean-Paul Calderonec54cc182008-03-26 21:11:07 -0400506 def test_get_components(self):
507 """
508 L{X509Name.get_components} returns a C{list} of two-tuples of C{str}
509 giving the NIDs and associated values which make up the name.
510 """
511 a = self._x509name()
512 self.assertEqual(a.get_components(), [])
513 a.CN = "foo"
514 self.assertEqual(a.get_components(), [("CN", "foo")])
515 a.organizationalUnitName = "bar"
516 self.assertEqual(
517 a.get_components(),
518 [("CN", "foo"), ("OU", "bar")])
519
Jean-Paul Calderone110cd092008-03-24 17:27:42 -0400520
Jean-Paul Calderoneac0d95f2008-03-10 00:00:42 -0400521class _PKeyInteractionTestsMixin:
522 """
523 Tests which involve another thing and a PKey.
524 """
525 def signable(self):
526 """
527 Return something with a C{set_pubkey}, C{set_pubkey}, and C{sign} method.
528 """
529 raise NotImplementedError()
530
531
532 def test_signWithUngenerated(self):
533 """
534 L{X509Req.sign} raises L{ValueError} when pass a L{PKey} with no parts.
535 """
536 request = self.signable()
537 key = PKey()
538 self.assertRaises(ValueError, request.sign, key, 'MD5')
539
540
541 def test_signWithPublicKey(self):
542 """
543 L{X509Req.sign} raises L{ValueError} when pass a L{PKey} with no
544 private part as the signing key.
545 """
546 request = self.signable()
547 key = PKey()
548 key.generate_key(TYPE_RSA, 512)
549 request.set_pubkey(key)
550 pub = request.get_pubkey()
551 self.assertRaises(ValueError, request.sign, pub, 'MD5')
552
553
554
Jean-Paul Calderone18808652009-07-05 12:54:05 -0400555class X509ReqTests(TestCase, _PKeyInteractionTestsMixin):
Jean-Paul Calderone2aa2b332008-03-06 21:43:14 -0500556 """
557 Tests for L{OpenSSL.crypto.X509Req}.
558 """
Jean-Paul Calderoneac0d95f2008-03-10 00:00:42 -0400559 def signable(self):
560 """
561 Create and return a new L{X509Req}.
562 """
563 return X509Req()
564
565
Jean-Paul Calderone2aa2b332008-03-06 21:43:14 -0500566 def test_construction(self):
567 """
568 L{X509Req} takes no arguments and returns an L{X509ReqType} instance.
569 """
570 request = X509Req()
571 self.assertTrue(
572 isinstance(request, X509ReqType),
573 "%r is of type %r, should be %r" % (request, type(request), X509ReqType))
574
575
Jean-Paul Calderone8dd19b82008-12-28 20:41:16 -0500576 def test_version(self):
577 """
578 L{X509ReqType.set_version} sets the X.509 version of the certificate
579 request. L{X509ReqType.get_version} returns the X.509 version of
580 the certificate request. The initial value of the version is 0.
581 """
582 request = X509Req()
583 self.assertEqual(request.get_version(), 0)
584 request.set_version(1)
585 self.assertEqual(request.get_version(), 1)
586 request.set_version(3)
587 self.assertEqual(request.get_version(), 3)
588
589
Jean-Paul Calderone2aa2b332008-03-06 21:43:14 -0500590 def test_get_subject(self):
591 """
592 L{X509ReqType.get_subject} returns an L{X509Name} for the subject of
593 the request and which is valid even after the request object is
594 otherwise dead.
595 """
596 request = X509Req()
597 subject = request.get_subject()
598 self.assertTrue(
599 isinstance(subject, X509NameType),
600 "%r is of type %r, should be %r" % (subject, type(subject), X509NameType))
601 subject.commonName = "foo"
602 self.assertEqual(request.get_subject().commonName, "foo")
603 del request
604 subject.commonName = "bar"
605 self.assertEqual(subject.commonName, "bar")
Jean-Paul Calderone78381d22008-03-06 23:35:22 -0500606
607
608
Jean-Paul Calderone18808652009-07-05 12:54:05 -0400609class X509Tests(TestCase, _PKeyInteractionTestsMixin):
Jean-Paul Calderone78381d22008-03-06 23:35:22 -0500610 """
611 Tests for L{OpenSSL.crypto.X509}.
612 """
Jean-Paul Calderone5ef86512008-04-26 19:06:28 -0400613 pemData = cleartextCertificatePEM + cleartextPrivateKeyPEM
Jean-Paul Calderone8114b452008-03-25 15:27:59 -0400614
Jean-Paul Calderoneac0d95f2008-03-10 00:00:42 -0400615 def signable(self):
616 """
617 Create and return a new L{X509}.
618 """
619 return X509()
620
621
Jean-Paul Calderone78381d22008-03-06 23:35:22 -0500622 def test_construction(self):
623 """
624 L{X509} takes no arguments and returns an instance of L{X509Type}.
625 """
626 certificate = X509()
627 self.assertTrue(
628 isinstance(certificate, X509Type),
629 "%r is of type %r, should be %r" % (certificate,
630 type(certificate),
631 X509Type))
632
633
634 def test_serial_number(self):
635 """
636 The serial number of an L{X509Type} can be retrieved and modified with
637 L{X509Type.get_serial_number} and L{X509Type.set_serial_number}.
638 """
639 certificate = X509()
640 self.assertRaises(TypeError, certificate.set_serial_number)
641 self.assertRaises(TypeError, certificate.set_serial_number, 1, 2)
642 self.assertRaises(TypeError, certificate.set_serial_number, "1")
643 self.assertRaises(TypeError, certificate.set_serial_number, 5.5)
644 self.assertEqual(certificate.get_serial_number(), 0)
645 certificate.set_serial_number(1)
646 self.assertEqual(certificate.get_serial_number(), 1)
647 certificate.set_serial_number(2 ** 32 + 1)
648 self.assertEqual(certificate.get_serial_number(), 2 ** 32 + 1)
649 certificate.set_serial_number(2 ** 64 + 1)
650 self.assertEqual(certificate.get_serial_number(), 2 ** 64 + 1)
Jean-Paul Calderone525ef802008-03-09 20:39:42 -0400651 certificate.set_serial_number(2 ** 128 + 1)
652 self.assertEqual(certificate.get_serial_number(), 2 ** 128 + 1)
653
654
655 def _setBoundTest(self, which):
656 """
657 L{X509Type.set_notBefore} takes a string in the format of an ASN1
658 GENERALIZEDTIME and sets the beginning of the certificate's validity
659 period to it.
660 """
661 certificate = X509()
662 set = getattr(certificate, 'set_not' + which)
663 get = getattr(certificate, 'get_not' + which)
664
Jean-Paul Calderonee0615b52008-03-09 21:44:46 -0400665 # Starts with no value.
666 self.assertEqual(get(), None)
667
Jean-Paul Calderone525ef802008-03-09 20:39:42 -0400668 # GMT (Or is it UTC?) -exarkun
669 when = "20040203040506Z"
670 set(when)
671 self.assertEqual(get(), when)
672
673 # A plus two hours and thirty minutes offset
674 when = "20040203040506+0530"
675 set(when)
676 self.assertEqual(get(), when)
677
678 # A minus one hour fifteen minutes offset
679 when = "20040203040506-0115"
680 set(when)
681 self.assertEqual(get(), when)
682
683 # An invalid string results in a ValueError
684 self.assertRaises(ValueError, set, "foo bar")
685
686
687 def test_set_notBefore(self):
688 """
689 L{X509Type.set_notBefore} takes a string in the format of an ASN1
690 GENERALIZEDTIME and sets the beginning of the certificate's validity
691 period to it.
692 """
693 self._setBoundTest("Before")
694
695
696 def test_set_notAfter(self):
697 """
698 L{X509Type.set_notAfter} takes a string in the format of an ASN1
699 GENERALIZEDTIME and sets the end of the certificate's validity period
700 to it.
701 """
702 self._setBoundTest("After")
Jean-Paul Calderone76576d52008-03-24 16:04:46 -0400703
704
Jean-Paul Calderone38a646d2008-03-25 15:16:18 -0400705 def test_get_notBefore(self):
706 """
707 L{X509Type.get_notBefore} returns a string in the format of an ASN1
708 GENERALIZEDTIME even for certificates which store it as UTCTIME
709 internally.
710 """
Jean-Paul Calderone8114b452008-03-25 15:27:59 -0400711 cert = load_certificate(FILETYPE_PEM, self.pemData)
Jean-Paul Calderone20131f52009-04-01 12:05:45 -0400712 self.assertEqual(cert.get_notBefore(), "20090325123658Z")
Jean-Paul Calderone38a646d2008-03-25 15:16:18 -0400713
Rick Dean623ee362009-07-17 12:22:16 -0500714class PKCS12Tests(TestCase):
715 """
716 Tests functions in the L{OpenSSL.crypto.PKCS12} module.
717 """
718 pemData = cleartextCertificatePEM + cleartextPrivateKeyPEM
719
720 def test_construction(self):
721 p12 = PKCS12()
722 self.assertEqual(None, p12.get_certificate())
723 self.assertEqual(None, p12.get_privatekey())
724 self.assertEqual(None, p12.get_ca_certificates())
725
726 def test_type_errors(self):
727 p12 = PKCS12()
728 self.assertRaises(TypeError, p12.set_certificate, 3)
729 self.assertRaises(TypeError, p12.set_privatekey, 3)
730 self.assertRaises(TypeError, p12.set_ca_certificates, 3)
731 self.assertRaises(TypeError, p12.set_ca_certificates, X509())
732 self.assertRaises(TypeError, p12.set_ca_certificates, (3, 4))
733
734 def test_key_only(self):
735 """
736 L{OpenSSL.crypto.PKCS12.export} and load a PKCS without a key
737 """
738 passwd = 'blah'
739 p12 = PKCS12()
740 pkey = load_privatekey(FILETYPE_PEM, cleartextPrivateKeyPEM)
741 p12.set_privatekey( pkey )
742 self.assertEqual(None, p12.get_certificate())
743 self.assertEqual(pkey, p12.get_privatekey())
744 dumped_p12 = p12.export(passphrase=passwd, iter=2, maciter=3)
745 p12 = load_pkcs12(dumped_p12, passwd)
746 self.assertEqual(None, p12.get_ca_certificates())
747 self.assertEqual(None, p12.get_certificate())
748 # It's actually in the pkcs12, but we silently don't find it (a key without a cert)
749 #self.assertEqual(cleartextPrivateKeyPEM, dump_privatekey(FILETYPE_PEM, p12.get_privatekey()))
750
751 def test_cert_only(self):
752 """
753 L{OpenSSL.crypto.PKCS12.export} and load a PKCS without a key.
754 Strangely, OpenSSL converts it to a CA cert.
755 """
756 passwd = 'blah'
757 p12 = PKCS12()
758 cert = load_certificate(FILETYPE_PEM, cleartextCertificatePEM)
759 p12.set_certificate( cert )
760 self.assertEqual(cert, p12.get_certificate())
761 self.assertEqual(None, p12.get_privatekey())
762 dumped_p12 = p12.export(passphrase=passwd, iter=2, maciter=3)
763 p12 = load_pkcs12(dumped_p12, passwd)
764 self.assertEqual(None, p12.get_privatekey())
765 self.assertEqual(None, p12.get_certificate())
766 self.assertEqual(cleartextCertificatePEM, dump_certificate(FILETYPE_PEM, p12.get_ca_certificates()[0]))
767
768
769 def test_export_and_load(self):
770 """
771 L{OpenSSL.crypto.PKCS12.export} and others
772 """
773 # use openssl program to create a p12 then load it
774 from OpenSSL.test.test_ssl import client_cert_pem, client_key_pem, server_cert_pem, server_key_pem, root_cert_pem
775 passwd = 'whatever'
776 pem = client_key_pem + client_cert_pem
777 p12_str = Popen(["openssl", "pkcs12", '-export', '-clcerts', '-passout', 'pass:'+passwd], \
778 stdin=PIPE, stdout=PIPE).communicate(input=str(pem))[0]
779 p12 = load_pkcs12(p12_str, passwd)
780 # verify p12 using pkcs12 get_* functions
781 cert_pem = dump_certificate(FILETYPE_PEM, p12.get_certificate())
782 self.assertEqual(cert_pem, client_cert_pem)
783 key_pem = dump_privatekey(FILETYPE_PEM, p12.get_privatekey())
784 self.assertEqual(key_pem, client_key_pem)
785 self.assertEqual(None, p12.get_ca_certificates())
786 # dump cert and verify it using the openssl program
787 dumped_p12 = p12.export(passphrase=passwd, iter=2, maciter=0, friendly_name='blueberry')
788 recovered_key = Popen(["openssl", "pkcs12", '-nocerts', '-nodes', '-passin', 'pass:'+passwd ], \
789 stdin=PIPE, stdout=PIPE).communicate(input=str(dumped_p12))[0]
790 self.assertEqual(recovered_key[-len(client_key_pem):], client_key_pem)
791 recovered_cert = Popen(["openssl", "pkcs12", '-clcerts', '-nodes', '-passin', 'pass:'+passwd, '-nokeys' ], \
792 stdin=PIPE, stdout=PIPE).communicate(input=str(dumped_p12))[0]
793 self.assertEqual(recovered_cert[-len(client_cert_pem):], client_cert_pem)
794 # change the cert and key
795 p12.set_certificate(load_certificate(FILETYPE_PEM, server_cert_pem))
796 p12.set_privatekey(load_privatekey(FILETYPE_PEM, server_key_pem))
797 root_cert = load_certificate(FILETYPE_PEM, root_cert_pem)
798 p12.set_ca_certificates( [ root_cert ] )
799 p12.set_ca_certificates( ( root_cert, ) )
800 self.assertEqual(1, len(p12.get_ca_certificates()))
801 self.assertEqual(root_cert, p12.get_ca_certificates()[0])
802 # recover changed cert and key using the openssl program
803 dumped_p12 = p12.export(passphrase=passwd, iter=2, maciter=0, friendly_name='Serverlicious')
804 recovered_key = Popen(["openssl", "pkcs12", '-nocerts', '-nodes', '-passin', 'pass:'+passwd ], \
805 stdin=PIPE, stdout=PIPE).communicate(input=str(dumped_p12))[0]
806 self.assertEqual(recovered_key[-len(server_key_pem):], server_key_pem)
807 recovered_cert = Popen(["openssl", "pkcs12", '-clcerts', '-nodes', '-passin', 'pass:'+passwd, '-nokeys' ], \
808 stdin=PIPE, stdout=PIPE).communicate(input=str(dumped_p12))[0]
809 self.assertEqual(recovered_cert[-len(server_cert_pem):], server_cert_pem)
810 recovered_cert = Popen(["openssl", "pkcs12", '-cacerts', '-nodes', '-passin', 'pass:'+passwd, '-nokeys' ], \
811 stdin=PIPE, stdout=PIPE).communicate(input=str(dumped_p12))[0]
812 self.assertEqual(recovered_cert[-len(root_cert_pem):], root_cert_pem)
813 # Test other forms of no password
814 passwd = ''
815 dumped_p12_empty = p12.export(passphrase=passwd, iter=2, maciter=0, friendly_name='Sewer')
816 dumped_p12_none = p12.export(passphrase=None, iter=2, maciter=0, friendly_name='Sewer')
817 dumped_p12_nopw = p12.export( iter=2, maciter=0, friendly_name='Sewer')
818 recovered_empty = Popen(["openssl", "pkcs12", '-nodes', '-passin', 'pass:'+passwd ], \
819 stdin=PIPE, stdout=PIPE).communicate(input=str(dumped_p12_empty))[0]
820 recovered_none = Popen(["openssl", "pkcs12", '-nodes', '-passin', 'pass:'+passwd ], \
821 stdin=PIPE, stdout=PIPE).communicate(input=str(dumped_p12_none))[0]
822 recovered_nopw = Popen(["openssl", "pkcs12", '-nodes', '-passin', 'pass:'+passwd ], \
823 stdin=PIPE, stdout=PIPE).communicate(input=str(dumped_p12_nopw))[0]
824 self.assertEqual(recovered_none, recovered_nopw)
825 self.assertEqual(recovered_none, recovered_empty)
826 # Test removing CA certs
827 p12.set_ca_certificates( None )
828 self.assertEqual(None, p12.get_ca_certificates())
829 # Test without MAC
830 dumped_p12 = p12.export(maciter=-1, passphrase=passwd, iter=2)
831 recovered_key = Popen(["openssl", "pkcs12", '-nocerts', '-nodes', '-passin', 'pass:'+passwd, '-nomacver' ], \
832 stdin=PIPE, stdout=PIPE).communicate(input=str(dumped_p12))[0]
833 self.assertEqual(recovered_key[-len(server_key_pem):], server_key_pem)
834 # We can't load PKCS12 without MAC, because we use PCKS_parse()
835 #p12 = load_pkcs12(dumped_p12, passwd)
836
Jean-Paul Calderone38a646d2008-03-25 15:16:18 -0400837
838 def test_get_notAfter(self):
839 """
840 L{X509Type.get_notAfter} returns a string in the format of an ASN1
841 GENERALIZEDTIME even for certificates which store it as UTCTIME
842 internally.
843 """
Jean-Paul Calderone8114b452008-03-25 15:27:59 -0400844 cert = load_certificate(FILETYPE_PEM, self.pemData)
Jean-Paul Calderone20131f52009-04-01 12:05:45 -0400845 self.assertEqual(cert.get_notAfter(), "20170611123658Z")
Jean-Paul Calderone38a646d2008-03-25 15:16:18 -0400846
847
Jean-Paul Calderone76576d52008-03-24 16:04:46 -0400848 def test_digest(self):
849 """
850 L{X509.digest} returns a string giving ":"-separated hex-encoded words
851 of the digest of the certificate.
852 """
853 cert = X509()
854 self.assertEqual(
855 cert.digest("md5"),
856 "A8:EB:07:F8:53:25:0A:F2:56:05:C5:A5:C4:C4:C7:15")
Jean-Paul Calderone828c9cb2008-04-26 18:06:54 -0400857
858
859
Jean-Paul Calderone18808652009-07-05 12:54:05 -0400860class FunctionTests(TestCase):
Jean-Paul Calderone828c9cb2008-04-26 18:06:54 -0400861 """
862 Tests for free-functions in the L{OpenSSL.crypto} module.
863 """
864 def test_load_privatekey_wrongPassphrase(self):
865 """
866 L{load_privatekey} raises L{OpenSSL.crypto.Error} when it is passed an
867 encrypted PEM and an incorrect passphrase.
868 """
869 self.assertRaises(
870 Error,
871 load_privatekey, FILETYPE_PEM, encryptedPrivateKeyPEM, "quack")
872
873
874 def test_load_privatekey_passphrase(self):
875 """
876 L{load_privatekey} can create a L{PKey} object from an encrypted PEM
877 string if given the passphrase.
878 """
879 key = load_privatekey(
880 FILETYPE_PEM, encryptedPrivateKeyPEM,
881 encryptedPrivateKeyPEMPassphrase)
882 self.assertTrue(isinstance(key, PKeyType))
883
884
885 def test_load_privatekey_wrongPassphraseCallback(self):
886 """
887 L{load_privatekey} raises L{OpenSSL.crypto.Error} when it is passed an
888 encrypted PEM and a passphrase callback which returns an incorrect
889 passphrase.
890 """
891 called = []
892 def cb(*a):
893 called.append(None)
894 return "quack"
895 self.assertRaises(
896 Error,
897 load_privatekey, FILETYPE_PEM, encryptedPrivateKeyPEM, cb)
898 self.assertTrue(called)
899
900 def test_load_privatekey_passphraseCallback(self):
901 """
902 L{load_privatekey} can create a L{PKey} object from an encrypted PEM
903 string if given a passphrase callback which returns the correct
904 password.
905 """
906 called = []
907 def cb(writing):
908 called.append(writing)
909 return encryptedPrivateKeyPEMPassphrase
910 key = load_privatekey(FILETYPE_PEM, encryptedPrivateKeyPEM, cb)
911 self.assertTrue(isinstance(key, PKeyType))
912 self.assertEqual(called, [False])
913
914
915 def test_dump_privatekey_passphrase(self):
916 """
917 L{dump_privatekey} writes an encrypted PEM when given a passphrase.
918 """
919 passphrase = "foo"
920 key = load_privatekey(FILETYPE_PEM, cleartextPrivateKeyPEM)
921 pem = dump_privatekey(FILETYPE_PEM, key, "blowfish", passphrase)
922 self.assertTrue(isinstance(pem, str))
923 loadedKey = load_privatekey(FILETYPE_PEM, pem, passphrase)
924 self.assertTrue(isinstance(loadedKey, PKeyType))
925 self.assertEqual(loadedKey.type(), key.type())
926 self.assertEqual(loadedKey.bits(), key.bits())
927
Jean-Paul Calderonef17e4212009-04-01 14:21:40 -0400928
929 def _runopenssl(self, pem, *args):
930 """
931 Run the command line openssl tool with the given arguments and write
932 the given PEM to its stdin.
933 """
Jean-Paul Calderone16c4d5e2009-05-04 18:27:52 -0400934 write, read = popen2(" ".join(("openssl",) + args), "b")
Jean-Paul Calderone653f5582009-04-01 14:42:32 -0400935 write.write(pem)
936 write.close()
937 return read.read()
Jean-Paul Calderonef17e4212009-04-01 14:21:40 -0400938
939
Rick Dean5b7b6372009-04-01 11:34:06 -0500940 def test_dump_certificate(self):
941 """
942 L{dump_certificate} writes PEM, DER, and text.
943 """
Jean-Paul Calderonef17e4212009-04-01 14:21:40 -0400944 pemData = cleartextCertificatePEM + cleartextPrivateKeyPEM
Rick Dean5b7b6372009-04-01 11:34:06 -0500945 cert = load_certificate(FILETYPE_PEM, pemData)
946 dumped_pem = dump_certificate(FILETYPE_PEM, cert)
947 self.assertEqual(dumped_pem, cleartextCertificatePEM)
948 dumped_der = dump_certificate(FILETYPE_ASN1, cert)
Jean-Paul Calderonef17e4212009-04-01 14:21:40 -0400949 good_der = self._runopenssl(dumped_pem, "x509", "-outform", "DER")
Rick Dean5b7b6372009-04-01 11:34:06 -0500950 self.assertEqual(dumped_der, good_der)
951 cert2 = load_certificate(FILETYPE_ASN1, dumped_der)
952 dumped_pem2 = dump_certificate(FILETYPE_PEM, cert2)
953 self.assertEqual(dumped_pem2, cleartextCertificatePEM)
954 dumped_text = dump_certificate(FILETYPE_TEXT, cert)
Jean-Paul Calderonef17e4212009-04-01 14:21:40 -0400955 good_text = self._runopenssl(dumped_pem, "x509", "-noout", "-text")
Rick Dean5b7b6372009-04-01 11:34:06 -0500956 self.assertEqual(dumped_text, good_text)
957
958
959 def test_dump_privatekey(self):
960 """
961 L{dump_privatekey} writes a PEM, DER, and text.
962 """
963 key = load_privatekey(FILETYPE_PEM, cleartextPrivateKeyPEM)
964 dumped_pem = dump_privatekey(FILETYPE_PEM, key)
965 self.assertEqual(dumped_pem, cleartextPrivateKeyPEM)
966 dumped_der = dump_privatekey(FILETYPE_ASN1, key)
Jean-Paul Calderonef17e4212009-04-01 14:21:40 -0400967 # XXX This OpenSSL call writes "writing RSA key" to standard out. Sad.
968 good_der = self._runopenssl(dumped_pem, "rsa", "-outform", "DER")
Rick Dean5b7b6372009-04-01 11:34:06 -0500969 self.assertEqual(dumped_der, good_der)
970 key2 = load_privatekey(FILETYPE_ASN1, dumped_der)
971 dumped_pem2 = dump_privatekey(FILETYPE_PEM, key2)
972 self.assertEqual(dumped_pem2, cleartextPrivateKeyPEM)
973 dumped_text = dump_privatekey(FILETYPE_TEXT, key)
Jean-Paul Calderonef17e4212009-04-01 14:21:40 -0400974 good_text = self._runopenssl(dumped_pem, "rsa", "-noout", "-text")
Rick Dean5b7b6372009-04-01 11:34:06 -0500975 self.assertEqual(dumped_text, good_text)
976
Jean-Paul Calderonef17e4212009-04-01 14:21:40 -0400977
Rick Dean5b7b6372009-04-01 11:34:06 -0500978 def test_dump_certificate_request(self):
979 """
980 L{dump_certificate_request} writes a PEM, DER, and text.
981 """
982 req = load_certificate_request(FILETYPE_PEM, cleartextCertificateRequestPEM)
983 dumped_pem = dump_certificate_request(FILETYPE_PEM, req)
984 self.assertEqual(dumped_pem, cleartextCertificateRequestPEM)
985 dumped_der = dump_certificate_request(FILETYPE_ASN1, req)
Jean-Paul Calderonef17e4212009-04-01 14:21:40 -0400986 good_der = self._runopenssl(dumped_pem, "req", "-outform", "DER")
Rick Dean5b7b6372009-04-01 11:34:06 -0500987 self.assertEqual(dumped_der, good_der)
988 req2 = load_certificate_request(FILETYPE_ASN1, dumped_der)
989 dumped_pem2 = dump_certificate_request(FILETYPE_PEM, req2)
990 self.assertEqual(dumped_pem2, cleartextCertificateRequestPEM)
991 dumped_text = dump_certificate_request(FILETYPE_TEXT, req)
Jean-Paul Calderonef17e4212009-04-01 14:21:40 -0400992 good_text = self._runopenssl(dumped_pem, "req", "-noout", "-text")
Rick Dean5b7b6372009-04-01 11:34:06 -0500993 self.assertEqual(dumped_text, good_text)
994
Jean-Paul Calderone828c9cb2008-04-26 18:06:54 -0400995
996 def test_dump_privatekey_passphraseCallback(self):
997 """
998 L{dump_privatekey} writes an encrypted PEM when given a callback which
999 returns the correct passphrase.
1000 """
1001 passphrase = "foo"
1002 called = []
1003 def cb(writing):
1004 called.append(writing)
1005 return passphrase
1006 key = load_privatekey(FILETYPE_PEM, cleartextPrivateKeyPEM)
1007 pem = dump_privatekey(FILETYPE_PEM, key, "blowfish", cb)
1008 self.assertTrue(isinstance(pem, str))
1009 self.assertEqual(called, [True])
1010 loadedKey = load_privatekey(FILETYPE_PEM, pem, passphrase)
1011 self.assertTrue(isinstance(loadedKey, PKeyType))
1012 self.assertEqual(loadedKey.type(), key.type())
1013 self.assertEqual(loadedKey.bits(), key.bits())
Rick Dean5b7b6372009-04-01 11:34:06 -05001014
1015
Jean-Paul Calderonedc138fa2009-06-27 14:32:07 -04001016 def test_load_pkcs7_data(self):
1017 """
1018 L{load_pkcs7_data} accepts a PKCS#7 string and returns an instance of
1019 L{PKCS7Type}.
1020 """
1021 pkcs7 = load_pkcs7_data(FILETYPE_PEM, pkcs7Data)
1022 self.assertTrue(isinstance(pkcs7, PKCS7Type))
1023
1024
1025 def test_load_pkcs12(self):
1026 """
1027 L{load_pkcs12} accepts a PKCS#12 string and returns an instance of
1028 L{PKCS12Type}.
1029 """
1030 pkcs12 = load_pkcs12(pkcs12Data)
1031 self.assertTrue(isinstance(pkcs12, PKCS12Type))
1032
1033
1034
1035class NetscapeSPKITests(TestCase):
1036 """
1037 Tests for L{OpenSSL.crypto.NetscapeSPKI}.
1038 """
1039 def test_construction(self):
1040 """
1041 L{NetscapeSPKI} returns an instance of L{NetscapeSPKIType}.
1042 """
1043 nspki = NetscapeSPKI()
1044 self.assertTrue(isinstance(nspki, NetscapeSPKIType))
1045
1046
1047
Rick Dean5b7b6372009-04-01 11:34:06 -05001048if __name__ == '__main__':
1049 main()