blob: 9500e4119025385c8b0df5597fb698c36769e187 [file] [log] [blame]
Jean-Paul Calderone8b63d452008-03-21 18:31:12 -04001# Copyright (C) Jean-Paul Calderone 2008, All rights reserved
2
Jean-Paul Calderoned8782ad2008-03-04 23:39:59 -05003"""
4Unit tests for L{OpenSSL.crypto}.
5"""
6
Jean-Paul Calderone0b88b6a2009-07-05 12:44:41 -04007from unittest import main
8
Jean-Paul Calderone653f5582009-04-01 14:42:32 -04009from os import popen2
Rick Dean47262da2009-07-08 16:17:17 -050010from datetime import datetime, timedelta
Jean-Paul Calderoned8782ad2008-03-04 23:39:59 -050011
12from OpenSSL.crypto import TYPE_RSA, TYPE_DSA, Error, PKey, PKeyType
Jean-Paul Calderone78381d22008-03-06 23:35:22 -050013from OpenSSL.crypto import X509, X509Type, X509Name, X509NameType
Jean-Paul Calderone2aa2b332008-03-06 21:43:14 -050014from OpenSSL.crypto import X509Req, X509ReqType
Jean-Paul Calderonee7db4b42008-12-31 13:39:24 -050015from OpenSSL.crypto import X509Extension, X509ExtensionType
Rick Dean5b7b6372009-04-01 11:34:06 -050016from OpenSSL.crypto import load_certificate, load_privatekey
Jean-Paul Calderonef17e4212009-04-01 14:21:40 -040017from OpenSSL.crypto import FILETYPE_PEM, FILETYPE_ASN1, FILETYPE_TEXT
Jean-Paul Calderone71919862009-04-01 13:01:19 -040018from OpenSSL.crypto import dump_certificate, load_certificate_request
19from OpenSSL.crypto import dump_certificate_request, dump_privatekey
Jean-Paul Calderonedc138fa2009-06-27 14:32:07 -040020from OpenSSL.crypto import PKCS7Type, load_pkcs7_data
21from OpenSSL.crypto import PKCS12Type, load_pkcs12
22from OpenSSL.crypto import NetscapeSPKI, NetscapeSPKIType
Jean-Paul Calderone0b88b6a2009-07-05 12:44:41 -040023from OpenSSL.test.util import TestCase
Jean-Paul Calderone828c9cb2008-04-26 18:06:54 -040024
25
Jean-Paul Calderone20131f52009-04-01 12:05:45 -040026cleartextCertificatePEM = """-----BEGIN CERTIFICATE-----
27MIIC7TCCAlagAwIBAgIIPQzE4MbeufQwDQYJKoZIhvcNAQEFBQAwWDELMAkGA1UE
28BhMCVVMxCzAJBgNVBAgTAklMMRAwDgYDVQQHEwdDaGljYWdvMRAwDgYDVQQKEwdU
29ZXN0aW5nMRgwFgYDVQQDEw9UZXN0aW5nIFJvb3QgQ0EwIhgPMjAwOTAzMjUxMjM2
30NThaGA8yMDE3MDYxMTEyMzY1OFowWDELMAkGA1UEBhMCVVMxCzAJBgNVBAgTAklM
31MRAwDgYDVQQHEwdDaGljYWdvMRAwDgYDVQQKEwdUZXN0aW5nMRgwFgYDVQQDEw9U
32ZXN0aW5nIFJvb3QgQ0EwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBAPmaQumL
33urpE527uSEHdL1pqcDRmWzu+98Y6YHzT/J7KWEamyMCNZ6fRW1JCR782UQ8a07fy
342xXsKy4WdKaxyG8CcatwmXvpvRQ44dSANMihHELpANTdyVp6DCysED6wkQFurHlF
351dshEaJw8b/ypDhmbVIo6Ci1xvCJqivbLFnbAgMBAAGjgbswgbgwHQYDVR0OBBYE
36FINVdy1eIfFJDAkk51QJEo3IfgSuMIGIBgNVHSMEgYAwfoAUg1V3LV4h8UkMCSTn
37VAkSjch+BK6hXKRaMFgxCzAJBgNVBAYTAlVTMQswCQYDVQQIEwJJTDEQMA4GA1UE
38BxMHQ2hpY2FnbzEQMA4GA1UEChMHVGVzdGluZzEYMBYGA1UEAxMPVGVzdGluZyBS
39b290IENBggg9DMTgxt659DAMBgNVHRMEBTADAQH/MA0GCSqGSIb3DQEBBQUAA4GB
40AGGCDazMJGoWNBpc03u6+smc95dEead2KlZXBATOdFT1VesY3+nUOqZhEhTGlDMi
41hkgaZnzoIq/Uamidegk4hirsCT/R+6vsKAAxNTcBjUeZjlykCJWy5ojShGftXIKY
42w/njVbKMXrvc83qmTdGl3TAM0fxQIpqgcglFLveEBgzn
43-----END CERTIFICATE-----
44"""
Jean-Paul Calderone828c9cb2008-04-26 18:06:54 -040045
Jean-Paul Calderone20131f52009-04-01 12:05:45 -040046cleartextPrivateKeyPEM = """-----BEGIN RSA PRIVATE KEY-----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60-----END RSA PRIVATE KEY-----
61"""
Jean-Paul Calderone828c9cb2008-04-26 18:06:54 -040062
Rick Dean5b7b6372009-04-01 11:34:06 -050063cleartextCertificateRequestPEM = (
64 "-----BEGIN CERTIFICATE REQUEST-----\n"
65 "MIIBnjCCAQcCAQAwXjELMAkGA1UEBhMCVVMxCzAJBgNVBAgTAklMMRAwDgYDVQQH\n"
66 "EwdDaGljYWdvMRcwFQYDVQQKEw5NeSBDb21wYW55IEx0ZDEXMBUGA1UEAxMORnJl\n"
67 "ZGVyaWNrIERlYW4wgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBANp6Y17WzKSw\n"
68 "BsUWkXdqg6tnXy8H8hA1msCMWpc+/2KJ4mbv5NyD6UD+/SqagQqulPbF/DFea9nA\n"
69 "E0zhmHJELcM8gUTIlXv/cgDWnmK4xj8YkjVUiCdqKRAKeuzLG1pGmwwF5lGeJpXN\n"
70 "xQn5ecR0UYSOWj6TTGXB9VyUMQzCClcBAgMBAAGgADANBgkqhkiG9w0BAQUFAAOB\n"
71 "gQAAJGuF/R/GGbeC7FbFW+aJgr9ee0Xbl6nlhu7pTe67k+iiKT2dsl2ti68MVTnu\n"
72 "Vrb3HUNqOkiwsJf6kCtq5oPn3QVYzTa76Dt2y3Rtzv6boRSlmlfrgS92GNma8JfR\n"
73 "oICQk3nAudi6zl1Dix3BCv1pUp5KMtGn3MeDEi6QFGy2rA==\n"
74 "-----END CERTIFICATE REQUEST-----\n")
75
Jean-Paul Calderone20131f52009-04-01 12:05:45 -040076encryptedPrivateKeyPEM = """-----BEGIN RSA PRIVATE KEY-----
77Proc-Type: 4,ENCRYPTED
78DEK-Info: DES-EDE3-CBC,9573604A18579E9E
Jean-Paul Calderone5ef86512008-04-26 19:06:28 -040079
Jean-Paul Calderone20131f52009-04-01 12:05:45 -040080SHOho56WxDkT0ht10UTeKc0F5u8cqIa01kzFAmETw0MAs8ezYtK15NPdCXUm3X/2
81a17G7LSF5bkxOgZ7vpXyMzun/owrj7CzvLxyncyEFZWvtvzaAhPhvTJtTIB3kf8B
828+qRcpTGK7NgXEgYBW5bj1y4qZkD4zCL9o9NQzsKI3Ie8i0239jsDOWR38AxjXBH
83mGwAQ4Z6ZN5dnmM4fhMIWsmFf19sNyAML4gHenQCHhmXbjXeVq47aC2ProInJbrm
84+00TcisbAQ40V9aehVbcDKtS4ZbMVDwncAjpXpcncC54G76N6j7F7wL7L/FuXa3A
85fvSVy9n2VfF/pJ3kYSflLHH2G/DFxjF7dl0GxhKPxJjp3IJi9VtuvmN9R2jZWLQF
86tfC8dXgy/P9CfFQhlinqBTEwgH0oZ/d4k4NVFDSdEMaSdmBAjlHpc+Vfdty3HVnV
87rKXj//wslsFNm9kIwJGIgKUa/n2jsOiydrsk1mgH7SmNCb3YHgZhbbnq0qLat/HC
88gHDt3FHpNQ31QzzL3yrenFB2L9osIsnRsDTPFNi4RX4SpDgNroxOQmyzCCV6H+d4
89o1mcnNiZSdxLZxVKccq0AfRpHqpPAFnJcQHP6xyT9MZp6fBa0XkxDnt9kNU8H3Qw
907SJWZ69VXjBUzMlQViLuaWMgTnL+ZVyFZf9hTF7U/ef4HMLMAVNdiaGG+G+AjCV/
91MbzjS007Oe4qqBnCWaFPSnJX6uLApeTbqAxAeyCql56ULW5x6vDMNC3dwjvS/CEh
9211n8RkgFIQA0AhuKSIg3CbuartRsJnWOLwgLTzsrKYL4yRog1RJrtw==
93-----END RSA PRIVATE KEY-----
94"""
Jean-Paul Calderone828c9cb2008-04-26 18:06:54 -040095encryptedPrivateKeyPEMPassphrase = "foobar"
96
Jean-Paul Calderonedc138fa2009-06-27 14:32:07 -040097# Some PKCS12 data, base64 encoded. The data itself was constructed using the
98# openssl command line:
99#
100# openssl pkcs12 -export -in s.pem -out o.p12 -inkey s.pem -certfile s.pem
101#
102# With s.pem containing a private key and certificate. The contents of the
103# generated file, o.p12, were then base64 encoded to produce this value.
104pkcs12Data = """\
105MIIJGQIBAzCCCN8GCSqGSIb3DQEHAaCCCNAEggjMMIIIyDCCBucGCSqGSIb3DQEHBqCCBtgwggbU
106AgEAMIIGzQYJKoZIhvcNAQcBMBwGCiqGSIb3DQEMAQYwDgQIdwchN+KDjC8CAggAgIIGoOh59lWQ
107vz7FB2ewPHduY3pBhJX1W7ioN1k2xAoelE04v30CvNNa0A8qIjk6U7WLRXL74jG1xPq+WcAUtNtk
1083ZfTaPTPR+q5xVNBZFHeKDirt7yherl8Xs16OEl0IgNpNHRLeHxi4JeBqkGReq1vkybus2ALyQ/B
109FgbrNJiaGpvUx64A3FnHKbT0pVIvsg5iqcpCQ2SDLeJnqKFuP/2+SE5WnNvM6SBG20HMNOR9+SM5
110tPETapeu7AFkJ03FY3OF+fllHnv8fyXXDkv7F1bX8P2q6wQSRK6DXq6DO1Qjqzmrrtk4Pq6Hne2x
111onN2Bx9yUR83tNn4bQWNDasbnQpdI3Fsgg6RS5+B7y9tw37nygyND9ME0NcCysDov5zIG84gsZHn
1123LDFQkP4M7iBscNCund18FNQomrqAmPvejos+OXMQlNd/la15UQgUqv33V91WIMNmDDt80eVdxp8
1130D4gCvIl3xPp0Lp1EwhXwQxmx7LS3Fj0yCaiBOVevqhp9uq0i5hhdPA4a/XyIAeuJCS07s21fAe3
114Ay3S7olg1DTtN9wSJL6C1wus3VDMicB82ZC4+wAbfheedseenA0ubMDj38JqHgUtb02jMb9Ff3QR
115Hj6qzv5nJIJjmCG+cBatMh775f/9y/7wuElZYjv/vPb9S4Oraxz3ZgLtkU15PVeLjFHsHWRnrhVC
116ORaDEdX42kXfTMTaDsqFPg10ZS4fb7kCqD+ef0U4nCB0pfKyDo3hyDxHxGMqEVwyhKrl2UKljmcz
11702AGKxf6SERGdApGX4ENSuEG8v37CJTnmf1Tvf+K3fcCwBWTVDjhCgyCYrqaR02r8ixjRCU47L7e
118fe0c6WcTIYcXwWPPwqk6lUm8jH/IFSohUxrGaLRsvtYMK5O1ss3fGnv5DysLoWRRHNsp9EqJ+nXP
119bC5KRS01M78twFHXyIVgML13sMwox3aMCADP4HAFisUTQjSq0LlrHHVSIdIz3dEC3jsIs2bRxaVE
120dGaMorvVhoCNucGtdXD778EHsPy6ierUd6LijOYGs+yxUKVdeSAHYiQqBB/0uwo5tqeUjc1xte4V
1217o68M0TnaeXZk6eJj8cy+Z7uvlKrEWG/d+yDp6ZrS/uuCUqlfakSUQVLwhpupRs6bOfbU9VWmuuW
122T/whDpJHkGRqz15d3K43wkF6gWx7tpnwps2boB3fjQVlQ20xJ+4QjYV6Yu/0dlhyU69/sZEHQXvL
123xdZsLwkjEHhGPoMkVSpSZF7mSgM4iI8nFkPbfNOSBGpW8GTYUQN+YI+GjQYwk2zGpB3Fhfc9lVuK
124QqlYUtGkj2UauO9diqS1rVOIQORJ49EmA0w0VJz6A3teklGRQvdfSiTdTmg+PcYtdllquni0MMJO
1253t7fpOnfmZRxvOx9J8WsLlz18uvq8+jDGs0InNFGxUf5v+iTBjY2ByzaMZDa84xqu6+cVuGcQGRu
126NJCpxWNOyfKrDnJ+TOg1/AV3dHiuBNeyOE6XkwzhfEH0TaAWvqtmqRFBIjhsMwkg9qooeJwWANUP
127fq+UxpR8M5UDMBEKcwk+paSLtzAL/Xznk2q9U2JKPrmcD79bSNafDZ33/5U05mGq3CmY5DVjoy+C
128qhbfIQssrNhWxN3yCtHDDOrXVwEb/DAKSIfVz07mRKP/9jW2aC3nmRSt8Gd+JYy4nNRFAcatIcoC
129IHB5rtEXdhHHfZsAaVPGPgfpeVGIK8FXZTSLYGSGHsjXAXG0xS9nXX/8mHyKP3SKd5/h1H9llYhh
130nXXBM7lY6W8A6wRmMmOTkHn5Ovi+mavWeCioKiGfqoUQDRow/PdfwVLUVhe1OTCx4G5F8mXLpIWp
1311wzrOqMfOGDKD+RCgz/5sqVzAvgj0LTttoRKGipJjVb5luaLZswKCtlemD9xRb8J/PRp/6YHvrxW
1322taIJyZPBmbiqXAIFCiwjnurnP9WK4h6ss+bwj8lY3fB8CPwRAyy2p7dpXeNFby0ZkWPlBqKEXgZ
13303uQ8mUGXrty5ha03z7Gzab3RqAUu7l21i4DBbZjcn8j5NPrc3cNVpbJMic/0NDvojI3pIqsQ3yv
1343JbYdkVzlmEmapHCgF/SGVkZMo28uoC1upZMHRvb4zIrRlj1CVlUxmQu00q8GudNBcPOrQVONt5+
135eBvxD/Dco26wHPusPieUMlkj9VP9FS24bdocKXOL7KHOnsZ5oLS1S4hA7l7wEtzfoRHt1M1x8UCQ
136hYcQEbZsOrxqmKlbgm0B6bBsdK0IxGNhgdtKHUCdxHYkpSEYLXwwggHZBgkqhkiG9w0BBwGgggHK
137BIIBxjCCAcIwggG+BgsqhkiG9w0BDAoBAqCCAYYwggGCMBwGCiqGSIb3DQEMAQMwDgQIZ+Y92Rjm
138N5cCAggABIIBYD2z0NOajj7NlnWDRO8hlRiDIo8UTZ3E2UjP4rSbKh7ZLGULHALuH+gcwD3814U7
139VukIkyhiE1VvqPMXb2m4VTCp9BE4oXda0S2Mao1nKxbeMTZ3GE3+C7HPIuTTNQnsnpspIctNAarC
140IIuhgSQmjdILrkmX0QjH5vrQFbdpcDDb/IRba13hws8FM2OrduM+MDEM6xkwiG3AGDgKEPYsd1Ai
141uP8EMX4dzZ9BvEJHaAynzSpUxWy13ntMxNfeIuOKAT9HNsHr0MQgDDpVEhRY26IAZhNFfjtWdAjI
142OiMxk3BjixMUof9i1Xh+4yQsrzLcBJazCyphtb6YvnorQQxWUnaQXWjmU4QS36ajuyOXgFf1Z3jk
1436CLztf6kq3rY4uQ7aQIUJjUcWP0dUGr6LLZRVYP4uL/N/QSasliQGhTxrjEHywyPqRQjKVgV9c6D
144ueHmII59hoZPA6a2cYpQnsuFoeAxJTAjBgkqhkiG9w0BCRUxFgQUVFyHPk/34xv0OdgMn18Sjffj
1457lcwMTAhMAkGBSsOAwIaBQAEFBxVa/flSZttaXvzg+oLJBqgUWuVBAh0s4gPVAEKHAICCAA=
146""".decode('base64')
147
148# Some PKCS#7 stuff. Generated with the openssl command line:
149#
150# openssl crl2pkcs7 -inform pem -outform pem -certfile s.pem -nocrl
151#
152# with a certificate and key (but the key should be irrelevant) in s.pem
153pkcs7Data = """\
154-----BEGIN PKCS7-----
155MIIDNwYJKoZIhvcNAQcCoIIDKDCCAyQCAQExADALBgkqhkiG9w0BBwGgggMKMIID
156BjCCAm+gAwIBAgIBATANBgkqhkiG9w0BAQQFADB7MQswCQYDVQQGEwJTRzERMA8G
157A1UEChMITTJDcnlwdG8xFDASBgNVBAsTC00yQ3J5cHRvIENBMSQwIgYDVQQDExtN
158MkNyeXB0byBDZXJ0aWZpY2F0ZSBNYXN0ZXIxHTAbBgkqhkiG9w0BCQEWDm5ncHNA
159cG9zdDEuY29tMB4XDTAwMDkxMDA5NTEzMFoXDTAyMDkxMDA5NTEzMFowUzELMAkG
160A1UEBhMCU0cxETAPBgNVBAoTCE0yQ3J5cHRvMRIwEAYDVQQDEwlsb2NhbGhvc3Qx
161HTAbBgkqhkiG9w0BCQEWDm5ncHNAcG9zdDEuY29tMFwwDQYJKoZIhvcNAQEBBQAD
162SwAwSAJBAKy+e3dulvXzV7zoTZWc5TzgApr8DmeQHTYC8ydfzH7EECe4R1Xh5kwI
163zOuuFfn178FBiS84gngaNcrFi0Z5fAkCAwEAAaOCAQQwggEAMAkGA1UdEwQCMAAw
164LAYJYIZIAYb4QgENBB8WHU9wZW5TU0wgR2VuZXJhdGVkIENlcnRpZmljYXRlMB0G
165A1UdDgQWBBTPhIKSvnsmYsBVNWjj0m3M2z0qVTCBpQYDVR0jBIGdMIGagBT7hyNp
16665w6kxXlxb8pUU/+7Sg4AaF/pH0wezELMAkGA1UEBhMCU0cxETAPBgNVBAoTCE0y
167Q3J5cHRvMRQwEgYDVQQLEwtNMkNyeXB0byBDQTEkMCIGA1UEAxMbTTJDcnlwdG8g
168Q2VydGlmaWNhdGUgTWFzdGVyMR0wGwYJKoZIhvcNAQkBFg5uZ3BzQHBvc3QxLmNv
169bYIBADANBgkqhkiG9w0BAQQFAAOBgQA7/CqT6PoHycTdhEStWNZde7M/2Yc6BoJu
170VwnW8YxGO8Sn6UJ4FeffZNcYZddSDKosw8LtPOeWoK3JINjAk5jiPQ2cww++7QGG
171/g5NDjxFZNDJP1dGiLAxPW6JXwov4v0FmdzfLOZ01jDcgQQZqEpYlgpuI5JEWUQ9
172Ho4EzbYCOaEAMQA=
173-----END PKCS7-----
174"""
175
Jean-Paul Calderone828c9cb2008-04-26 18:06:54 -0400176
Jean-Paul Calderone7da26a72008-03-06 00:35:20 -0500177
Jean-Paul Calderone18808652009-07-05 12:54:05 -0400178class X509ExtTests(TestCase):
Jean-Paul Calderonef0179c72009-07-17 15:48:22 -0400179 """
180 Tests for L{OpenSSL.crypto.X509Extension}.
181 """
182
183 def setUp(self):
184 """
185 Create a new private key and start a certificate request (for a test
186 method to finish in one way or another).
187 """
188 # Basic setup stuff to generate a certificate
189 self.pkey = PKey()
190 self.pkey.generate_key(TYPE_RSA, 384)
191 self.req = X509Req()
192 self.req.set_pubkey(self.pkey)
193 # Authority good you have.
194 self.req.get_subject().commonName = "Yoda root CA"
195 self.x509 = X509()
196 self.subject = self.x509.get_subject()
197 self.subject.commonName = self.req.get_subject().commonName
198 self.x509.set_issuer(self.subject)
199 self.x509.set_pubkey(self.pkey)
200 now = datetime.now().strftime("%Y%m%d%H%M%SZ")
201 expire = (datetime.now() + timedelta(days=100)).strftime("%Y%m%d%H%M%SZ")
202 self.x509.set_notBefore(now)
203 self.x509.set_notAfter(expire)
204
205
Jean-Paul Calderonee7db4b42008-12-31 13:39:24 -0500206 def test_construction(self):
207 """
208 L{X509Extension} accepts an extension type name, a critical flag,
209 and an extension value and returns an L{X509ExtensionType} instance.
210 """
Jean-Paul Calderone2ee1e7c2008-12-31 14:58:38 -0500211 basic = X509Extension('basicConstraints', True, 'CA:true')
Jean-Paul Calderonee7db4b42008-12-31 13:39:24 -0500212 self.assertTrue(
213 isinstance(basic, X509ExtensionType),
214 "%r is of type %r, should be %r" % (
215 basic, type(basic), X509ExtensionType))
216
Jean-Paul Calderone2ee1e7c2008-12-31 14:58:38 -0500217 comment = X509Extension('nsComment', False, 'pyOpenSSL unit test')
Jean-Paul Calderonee7db4b42008-12-31 13:39:24 -0500218 self.assertTrue(
219 isinstance(comment, X509ExtensionType),
220 "%r is of type %r, should be %r" % (
221 comment, type(comment), X509ExtensionType))
222
223
Jean-Paul Calderone391585f2008-12-31 14:36:31 -0500224 def test_invalid_extension(self):
225 """
226 L{X509Extension} raises something if it is passed a bad extension
227 name or value.
228 """
229 self.assertRaises(
230 Error, X509Extension, 'thisIsMadeUp', False, 'hi')
231 self.assertRaises(
232 Error, X509Extension, 'basicConstraints', False, 'blah blah')
233
Jean-Paul Calderone2ee1e7c2008-12-31 14:58:38 -0500234 # Exercise a weird one (an extension which uses the r2i method). This
235 # exercises the codepath that requires a non-NULL ctx to be passed to
236 # X509V3_EXT_nconf. It can't work now because we provide no
237 # configuration database. It might be made to work in the future.
238 self.assertRaises(
239 Error, X509Extension, 'proxyCertInfo', True,
240 'language:id-ppl-anyLanguage,pathlen:1,policy:text:AB')
241
Jean-Paul Calderone391585f2008-12-31 14:36:31 -0500242
Jean-Paul Calderonee7db4b42008-12-31 13:39:24 -0500243 def test_get_critical(self):
244 """
245 L{X509ExtensionType.get_critical} returns the value of the
246 extension's critical flag.
247 """
Jean-Paul Calderone2ee1e7c2008-12-31 14:58:38 -0500248 ext = X509Extension('basicConstraints', True, 'CA:true')
Jean-Paul Calderonee7db4b42008-12-31 13:39:24 -0500249 self.assertTrue(ext.get_critical())
Jean-Paul Calderone2ee1e7c2008-12-31 14:58:38 -0500250 ext = X509Extension('basicConstraints', False, 'CA:true')
Jean-Paul Calderonee7db4b42008-12-31 13:39:24 -0500251 self.assertFalse(ext.get_critical())
252
Jean-Paul Calderone7535dab2008-03-06 18:53:11 -0500253
Jean-Paul Calderonef8c5fab2008-12-31 15:53:48 -0500254 def test_get_short_name(self):
255 """
256 L{X509ExtensionType.get_short_name} returns a string giving the short
257 type name of the extension.
258 """
259 ext = X509Extension('basicConstraints', True, 'CA:true')
260 self.assertEqual(ext.get_short_name(), 'basicConstraints')
261 ext = X509Extension('nsComment', True, 'foo bar')
262 self.assertEqual(ext.get_short_name(), 'nsComment')
263
264
Jean-Paul Calderonef0179c72009-07-17 15:48:22 -0400265 def test_unused_subject(self):
Rick Dean47262da2009-07-08 16:17:17 -0500266 """
Jean-Paul Calderonef0179c72009-07-17 15:48:22 -0400267 The C{subject} parameter to L{X509Extension} may be provided for an
268 extension which does not use it and is ignored in this case.
Rick Dean47262da2009-07-08 16:17:17 -0500269 """
Jean-Paul Calderonef0179c72009-07-17 15:48:22 -0400270 ext1 = X509Extension('basicConstraints', False, 'CA:TRUE', subject=self.x509)
271 self.x509.add_extensions([ext1])
272 self.x509.sign(self.pkey, 'sha1')
273 # This is a little lame. Can we think of a better way?
274 text = dump_certificate(FILETYPE_TEXT, self.x509)
275 self.assertTrue('X509v3 Basic Constraints:' in text)
276 self.assertTrue('CA:TRUE' in text)
277
278
279 def test_subject(self):
280 """
281 If an extension requires a subject, the C{subject} parameter to
282 L{X509Extension} provides its value.
283 """
284 ext3 = X509Extension('subjectKeyIdentifier', False, 'hash', subject=self.x509)
285 self.x509.add_extensions([ext3])
286 self.x509.sign(self.pkey, 'sha1')
287 text = dump_certificate(FILETYPE_TEXT, self.x509)
288 self.assertTrue('X509v3 Subject Key Identifier:' in text)
289
290
291 def test_missing_subject(self):
292 """
293 If an extension requires a subject and the C{subject} parameter is
294 given no value, something happens.
295 """
296 self.assertRaises(
297 Error, X509Extension, 'subjectKeyIdentifier', False, 'hash')
298
299
300 def test_invalid_subject(self):
301 """
302 If the C{subject} parameter is given a value which is not an L{X509}
303 instance, L{TypeError} is raised.
304 """
305 for badObj in [True, object(), "hello", [], self]:
306 self.assertRaises(
307 TypeError,
308 X509Extension,
309 'basicConstraints', False, 'CA:TRUE', subject=badObj)
310
311
312 def test_unused_issuer(self):
313 """
314 The C{issuer} parameter to L{X509Extension} may be provided for an
315 extension which does not use it and is ignored in this case.
316 """
317 ext1 = X509Extension('basicConstraints', False, 'CA:TRUE', issuer=self.x509)
318 self.x509.add_extensions([ext1])
319 self.x509.sign(self.pkey, 'sha1')
320 text = dump_certificate(FILETYPE_TEXT, self.x509)
321 self.assertTrue('X509v3 Basic Constraints:' in text)
322 self.assertTrue('CA:TRUE' in text)
323
324
325 def test_issuer(self):
326 """
327 If an extension requires a issuer, the C{issuer} parameter to
328 L{X509Extension} provides its value.
329 """
330 ext2 = X509Extension(
331 'authorityKeyIdentifier', False, 'issuer:always',
332 issuer=self.x509)
333 self.x509.add_extensions([ext2])
334 self.x509.sign(self.pkey, 'sha1')
335 text = dump_certificate(FILETYPE_TEXT, self.x509)
336 self.assertTrue('X509v3 Authority Key Identifier:' in text)
337 self.assertTrue('DirName:/CN=Yoda root CA' in text)
338
339
340 def test_missing_issuer(self):
341 """
342 If an extension requires an issue and the C{issuer} parameter is given
343 no value, something happens.
344 """
345 self.assertRaises(
346 Error,
347 X509Extension,
348 'authorityKeyIdentifier', False, 'keyid:always,issuer:always')
349
350
351 def test_invalid_issuer(self):
352 """
353 If the C{issuer} parameter is given a value which is not an L{X509}
354 instance, L{TypeError} is raised.
355 """
356 for badObj in [True, object(), "hello", [], self]:
357 self.assertRaises(
358 TypeError,
359 X509Extension,
360 'authorityKeyIdentifier', False, 'keyid:always,issuer:always',
361 issuer=badObj)
Rick Dean47262da2009-07-08 16:17:17 -0500362
363
Jean-Paul Calderone391585f2008-12-31 14:36:31 -0500364
Jean-Paul Calderone18808652009-07-05 12:54:05 -0400365class PKeyTests(TestCase):
Jean-Paul Calderoneac930e12008-03-06 18:50:51 -0500366 """
367 Unit tests for L{OpenSSL.crypto.PKey}.
368 """
Jean-Paul Calderoned8782ad2008-03-04 23:39:59 -0500369 def test_construction(self):
370 """
371 L{PKey} takes no arguments and returns a new L{PKeyType} instance.
372 """
373 self.assertRaises(TypeError, PKey, None)
374 key = PKey()
375 self.assertTrue(
376 isinstance(key, PKeyType),
377 "%r is of type %r, should be %r" % (key, type(key), PKeyType))
378
379
380 def test_pregeneration(self):
381 """
382 L{PKeyType.bits} and L{PKeyType.type} return C{0} before the key is
383 generated.
384 """
385 key = PKey()
386 self.assertEqual(key.type(), 0)
387 self.assertEqual(key.bits(), 0)
388
389
390 def test_failedGeneration(self):
391 """
Jean-Paul Calderoneab82db72008-03-06 00:09:31 -0500392 L{PKeyType.generate_key} takes two arguments, the first giving the key
393 type as one of L{TYPE_RSA} or L{TYPE_DSA} and the second giving the
394 number of bits to generate. If an invalid type is specified or
395 generation fails, L{Error} is raised. If an invalid number of bits is
396 specified, L{ValueError} or L{Error} is raised.
Jean-Paul Calderoned8782ad2008-03-04 23:39:59 -0500397 """
398 key = PKey()
399 self.assertRaises(TypeError, key.generate_key)
400 self.assertRaises(TypeError, key.generate_key, 1, 2, 3)
401 self.assertRaises(TypeError, key.generate_key, "foo", "bar")
402 self.assertRaises(Error, key.generate_key, -1, 0)
Jean-Paul Calderoneab82db72008-03-06 00:09:31 -0500403
Jean-Paul Calderoneab82db72008-03-06 00:09:31 -0500404 self.assertRaises(ValueError, key.generate_key, TYPE_RSA, -1)
405 self.assertRaises(ValueError, key.generate_key, TYPE_RSA, 0)
Jean-Paul Calderoned71fe982008-03-06 00:31:50 -0500406
407 # XXX RSA generation for small values of bits is fairly buggy in a wide
408 # range of OpenSSL versions. I need to figure out what the safe lower
409 # bound for a reasonable number of OpenSSL versions is and explicitly
410 # check for that in the wrapper. The failure behavior is typically an
411 # infinite loop inside OpenSSL.
412
413 # self.assertRaises(Error, key.generate_key, TYPE_RSA, 2)
Jean-Paul Calderoned8782ad2008-03-04 23:39:59 -0500414
415 # XXX DSA generation seems happy with any number of bits. The DSS
416 # says bits must be between 512 and 1024 inclusive. OpenSSL's DSA
417 # generator doesn't seem to care about the upper limit at all. For
Jean-Paul Calderoneeff3cd92008-03-05 22:35:26 -0500418 # the lower limit, it uses 512 if anything smaller is specified.
Jean-Paul Calderoned8782ad2008-03-04 23:39:59 -0500419 # So, it doesn't seem possible to make generate_key fail for
420 # TYPE_DSA with a bits argument which is at least an int.
421
422 # self.assertRaises(Error, key.generate_key, TYPE_DSA, -7)
423
424
425 def test_rsaGeneration(self):
426 """
427 L{PKeyType.generate_key} generates an RSA key when passed
428 L{TYPE_RSA} as a type and a reasonable number of bits.
429 """
430 bits = 128
431 key = PKey()
432 key.generate_key(TYPE_RSA, bits)
433 self.assertEqual(key.type(), TYPE_RSA)
434 self.assertEqual(key.bits(), bits)
435
436
437 def test_dsaGeneration(self):
438 """
439 L{PKeyType.generate_key} generates a DSA key when passed
440 L{TYPE_DSA} as a type and a reasonable number of bits.
441 """
442 # 512 is a magic number. The DSS (Digital Signature Standard)
443 # allows a minimum of 512 bits for DSA. DSA_generate_parameters
444 # will silently promote any value below 512 to 512.
445 bits = 512
446 key = PKey()
447 key.generate_key(TYPE_DSA, bits)
448 self.assertEqual(key.type(), TYPE_DSA)
449 self.assertEqual(key.bits(), bits)
450
451
452 def test_regeneration(self):
453 """
454 L{PKeyType.generate_key} can be called multiple times on the same
455 key to generate new keys.
456 """
457 key = PKey()
458 for type, bits in [(TYPE_RSA, 512), (TYPE_DSA, 576)]:
459 key.generate_key(type, bits)
460 self.assertEqual(key.type(), type)
461 self.assertEqual(key.bits(), bits)
Jean-Paul Calderoneeff3cd92008-03-05 22:35:26 -0500462
463
464
Jean-Paul Calderone18808652009-07-05 12:54:05 -0400465class X509NameTests(TestCase):
Jean-Paul Calderoneeff3cd92008-03-05 22:35:26 -0500466 """
467 Unit tests for L{OpenSSL.crypto.X509Name}.
468 """
Jean-Paul Calderonee098dc72008-03-06 18:36:19 -0500469 def _x509name(self, **attrs):
470 # XXX There's no other way to get a new X509Name yet.
471 name = X509().get_subject()
472 attrs = attrs.items()
473 # Make the order stable - order matters!
474 attrs.sort(lambda (k1, v1), (k2, v2): cmp(v1, v2))
475 for k, v in attrs:
476 setattr(name, k, v)
477 return name
478
479
Jean-Paul Calderoneeff3cd92008-03-05 22:35:26 -0500480 def test_attributes(self):
481 """
482 L{X509NameType} instances have attributes for each standard (?)
483 X509Name field.
484 """
Jean-Paul Calderonee098dc72008-03-06 18:36:19 -0500485 name = self._x509name()
Jean-Paul Calderoneeff3cd92008-03-05 22:35:26 -0500486 name.commonName = "foo"
487 self.assertEqual(name.commonName, "foo")
488 self.assertEqual(name.CN, "foo")
489 name.CN = "baz"
490 self.assertEqual(name.commonName, "baz")
491 self.assertEqual(name.CN, "baz")
492 name.commonName = "bar"
493 self.assertEqual(name.commonName, "bar")
494 self.assertEqual(name.CN, "bar")
495 name.CN = "quux"
496 self.assertEqual(name.commonName, "quux")
497 self.assertEqual(name.CN, "quux")
498
499
Jean-Paul Calderoneeff3cd92008-03-05 22:35:26 -0500500 def test_copy(self):
501 """
502 L{X509Name} creates a new L{X509NameType} instance with all the same
503 attributes as an existing L{X509NameType} instance when called with
504 one.
505 """
Jean-Paul Calderonee098dc72008-03-06 18:36:19 -0500506 name = self._x509name(commonName="foo", emailAddress="bar@example.com")
Jean-Paul Calderoneeff3cd92008-03-05 22:35:26 -0500507
508 copy = X509Name(name)
509 self.assertEqual(copy.commonName, "foo")
510 self.assertEqual(copy.emailAddress, "bar@example.com")
Jean-Paul Calderonee098dc72008-03-06 18:36:19 -0500511
512 # Mutate the copy and ensure the original is unmodified.
Jean-Paul Calderoneeff3cd92008-03-05 22:35:26 -0500513 copy.commonName = "baz"
514 self.assertEqual(name.commonName, "foo")
Jean-Paul Calderonee098dc72008-03-06 18:36:19 -0500515
516 # Mutate the original and ensure the copy is unmodified.
Jean-Paul Calderoneeff3cd92008-03-05 22:35:26 -0500517 name.emailAddress = "quux@example.com"
518 self.assertEqual(copy.emailAddress, "bar@example.com")
519
Jean-Paul Calderonee098dc72008-03-06 18:36:19 -0500520
521 def test_repr(self):
522 """
523 L{repr} passed an L{X509NameType} instance should return a string
524 containing a description of the type and the NIDs which have been set
525 on it.
526 """
527 name = self._x509name(commonName="foo", emailAddress="bar")
528 self.assertEqual(
529 repr(name),
530 "<X509Name object '/emailAddress=bar/CN=foo'>")
531
532
533 def test_comparison(self):
534 """
535 L{X509NameType} instances should compare based on their NIDs.
536 """
537 def _equality(a, b, assertTrue, assertFalse):
538 assertTrue(a == b, "(%r == %r) --> False" % (a, b))
539 assertFalse(a != b)
540 assertTrue(b == a)
541 assertFalse(b != a)
542
543 def assertEqual(a, b):
544 _equality(a, b, self.assertTrue, self.assertFalse)
545
546 # Instances compare equal to themselves.
547 name = self._x509name()
548 assertEqual(name, name)
549
550 # Empty instances should compare equal to each other.
551 assertEqual(self._x509name(), self._x509name())
552
553 # Instances with equal NIDs should compare equal to each other.
554 assertEqual(self._x509name(commonName="foo"),
555 self._x509name(commonName="foo"))
556
557 # Instance with equal NIDs set using different aliases should compare
558 # equal to each other.
559 assertEqual(self._x509name(commonName="foo"),
560 self._x509name(CN="foo"))
561
562 # Instances with more than one NID with the same values should compare
563 # equal to each other.
564 assertEqual(self._x509name(CN="foo", organizationalUnitName="bar"),
565 self._x509name(commonName="foo", OU="bar"))
566
567 def assertNotEqual(a, b):
568 _equality(a, b, self.assertFalse, self.assertTrue)
569
570 # Instances with different values for the same NID should not compare
571 # equal to each other.
572 assertNotEqual(self._x509name(CN="foo"),
573 self._x509name(CN="bar"))
574
575 # Instances with different NIDs should not compare equal to each other.
576 assertNotEqual(self._x509name(CN="foo"),
577 self._x509name(OU="foo"))
578
579 def _inequality(a, b, assertTrue, assertFalse):
580 assertTrue(a < b)
581 assertTrue(a <= b)
582 assertTrue(b > a)
583 assertTrue(b >= a)
584 assertFalse(a > b)
585 assertFalse(a >= b)
586 assertFalse(b < a)
587 assertFalse(b <= a)
588
589 def assertLessThan(a, b):
590 _inequality(a, b, self.assertTrue, self.assertFalse)
591
592 # An X509Name with a NID with a value which sorts less than the value
593 # of the same NID on another X509Name compares less than the other
594 # X509Name.
595 assertLessThan(self._x509name(CN="abc"),
596 self._x509name(CN="def"))
597
598 def assertGreaterThan(a, b):
599 _inequality(a, b, self.assertFalse, self.assertTrue)
600
601 # An X509Name with a NID with a value which sorts greater than the
602 # value of the same NID on another X509Name compares greater than the
603 # other X509Name.
604 assertGreaterThan(self._x509name(CN="def"),
605 self._x509name(CN="abc"))
Jean-Paul Calderone2aa2b332008-03-06 21:43:14 -0500606
607
Jean-Paul Calderone110cd092008-03-24 17:27:42 -0400608 def test_hash(self):
609 """
610 L{X509Name.hash} returns an integer hash based on the value of the
611 name.
612 """
613 a = self._x509name(CN="foo")
614 b = self._x509name(CN="foo")
615 self.assertEqual(a.hash(), b.hash())
616 a.CN = "bar"
617 self.assertNotEqual(a.hash(), b.hash())
618
619
Jean-Paul Calderonee957a002008-03-25 15:16:51 -0400620 def test_der(self):
621 """
622 L{X509Name.der} returns the DER encoded form of the name.
623 """
624 a = self._x509name(CN="foo", C="US")
625 self.assertEqual(
626 a.der(),
627 '0\x1b1\x0b0\t\x06\x03U\x04\x06\x13\x02US'
628 '1\x0c0\n\x06\x03U\x04\x03\x13\x03foo')
629
630
Jean-Paul Calderonec54cc182008-03-26 21:11:07 -0400631 def test_get_components(self):
632 """
633 L{X509Name.get_components} returns a C{list} of two-tuples of C{str}
634 giving the NIDs and associated values which make up the name.
635 """
636 a = self._x509name()
637 self.assertEqual(a.get_components(), [])
638 a.CN = "foo"
639 self.assertEqual(a.get_components(), [("CN", "foo")])
640 a.organizationalUnitName = "bar"
641 self.assertEqual(
642 a.get_components(),
643 [("CN", "foo"), ("OU", "bar")])
644
Jean-Paul Calderone110cd092008-03-24 17:27:42 -0400645
Jean-Paul Calderoneac0d95f2008-03-10 00:00:42 -0400646class _PKeyInteractionTestsMixin:
647 """
648 Tests which involve another thing and a PKey.
649 """
650 def signable(self):
651 """
652 Return something with a C{set_pubkey}, C{set_pubkey}, and C{sign} method.
653 """
654 raise NotImplementedError()
655
656
657 def test_signWithUngenerated(self):
658 """
659 L{X509Req.sign} raises L{ValueError} when pass a L{PKey} with no parts.
660 """
661 request = self.signable()
662 key = PKey()
663 self.assertRaises(ValueError, request.sign, key, 'MD5')
664
665
666 def test_signWithPublicKey(self):
667 """
668 L{X509Req.sign} raises L{ValueError} when pass a L{PKey} with no
669 private part as the signing key.
670 """
671 request = self.signable()
672 key = PKey()
673 key.generate_key(TYPE_RSA, 512)
674 request.set_pubkey(key)
675 pub = request.get_pubkey()
676 self.assertRaises(ValueError, request.sign, pub, 'MD5')
677
678
679
Jean-Paul Calderone18808652009-07-05 12:54:05 -0400680class X509ReqTests(TestCase, _PKeyInteractionTestsMixin):
Jean-Paul Calderone2aa2b332008-03-06 21:43:14 -0500681 """
682 Tests for L{OpenSSL.crypto.X509Req}.
683 """
Jean-Paul Calderoneac0d95f2008-03-10 00:00:42 -0400684 def signable(self):
685 """
686 Create and return a new L{X509Req}.
687 """
688 return X509Req()
689
690
Jean-Paul Calderone2aa2b332008-03-06 21:43:14 -0500691 def test_construction(self):
692 """
693 L{X509Req} takes no arguments and returns an L{X509ReqType} instance.
694 """
695 request = X509Req()
696 self.assertTrue(
697 isinstance(request, X509ReqType),
698 "%r is of type %r, should be %r" % (request, type(request), X509ReqType))
699
700
Jean-Paul Calderone8dd19b82008-12-28 20:41:16 -0500701 def test_version(self):
702 """
703 L{X509ReqType.set_version} sets the X.509 version of the certificate
704 request. L{X509ReqType.get_version} returns the X.509 version of
705 the certificate request. The initial value of the version is 0.
706 """
707 request = X509Req()
708 self.assertEqual(request.get_version(), 0)
709 request.set_version(1)
710 self.assertEqual(request.get_version(), 1)
711 request.set_version(3)
712 self.assertEqual(request.get_version(), 3)
713
714
Jean-Paul Calderone2aa2b332008-03-06 21:43:14 -0500715 def test_get_subject(self):
716 """
717 L{X509ReqType.get_subject} returns an L{X509Name} for the subject of
718 the request and which is valid even after the request object is
719 otherwise dead.
720 """
721 request = X509Req()
722 subject = request.get_subject()
723 self.assertTrue(
724 isinstance(subject, X509NameType),
725 "%r is of type %r, should be %r" % (subject, type(subject), X509NameType))
726 subject.commonName = "foo"
727 self.assertEqual(request.get_subject().commonName, "foo")
728 del request
729 subject.commonName = "bar"
730 self.assertEqual(subject.commonName, "bar")
Jean-Paul Calderone78381d22008-03-06 23:35:22 -0500731
732
733
Jean-Paul Calderone18808652009-07-05 12:54:05 -0400734class X509Tests(TestCase, _PKeyInteractionTestsMixin):
Jean-Paul Calderone78381d22008-03-06 23:35:22 -0500735 """
736 Tests for L{OpenSSL.crypto.X509}.
737 """
Jean-Paul Calderone5ef86512008-04-26 19:06:28 -0400738 pemData = cleartextCertificatePEM + cleartextPrivateKeyPEM
Jean-Paul Calderone8114b452008-03-25 15:27:59 -0400739
Jean-Paul Calderoneac0d95f2008-03-10 00:00:42 -0400740 def signable(self):
741 """
742 Create and return a new L{X509}.
743 """
744 return X509()
745
746
Jean-Paul Calderone78381d22008-03-06 23:35:22 -0500747 def test_construction(self):
748 """
749 L{X509} takes no arguments and returns an instance of L{X509Type}.
750 """
751 certificate = X509()
752 self.assertTrue(
753 isinstance(certificate, X509Type),
754 "%r is of type %r, should be %r" % (certificate,
755 type(certificate),
756 X509Type))
757
758
759 def test_serial_number(self):
760 """
761 The serial number of an L{X509Type} can be retrieved and modified with
762 L{X509Type.get_serial_number} and L{X509Type.set_serial_number}.
763 """
764 certificate = X509()
765 self.assertRaises(TypeError, certificate.set_serial_number)
766 self.assertRaises(TypeError, certificate.set_serial_number, 1, 2)
767 self.assertRaises(TypeError, certificate.set_serial_number, "1")
768 self.assertRaises(TypeError, certificate.set_serial_number, 5.5)
769 self.assertEqual(certificate.get_serial_number(), 0)
770 certificate.set_serial_number(1)
771 self.assertEqual(certificate.get_serial_number(), 1)
772 certificate.set_serial_number(2 ** 32 + 1)
773 self.assertEqual(certificate.get_serial_number(), 2 ** 32 + 1)
774 certificate.set_serial_number(2 ** 64 + 1)
775 self.assertEqual(certificate.get_serial_number(), 2 ** 64 + 1)
Jean-Paul Calderone525ef802008-03-09 20:39:42 -0400776 certificate.set_serial_number(2 ** 128 + 1)
777 self.assertEqual(certificate.get_serial_number(), 2 ** 128 + 1)
778
779
780 def _setBoundTest(self, which):
781 """
782 L{X509Type.set_notBefore} takes a string in the format of an ASN1
783 GENERALIZEDTIME and sets the beginning of the certificate's validity
784 period to it.
785 """
786 certificate = X509()
787 set = getattr(certificate, 'set_not' + which)
788 get = getattr(certificate, 'get_not' + which)
789
Jean-Paul Calderonee0615b52008-03-09 21:44:46 -0400790 # Starts with no value.
791 self.assertEqual(get(), None)
792
Jean-Paul Calderone525ef802008-03-09 20:39:42 -0400793 # GMT (Or is it UTC?) -exarkun
794 when = "20040203040506Z"
795 set(when)
796 self.assertEqual(get(), when)
797
798 # A plus two hours and thirty minutes offset
799 when = "20040203040506+0530"
800 set(when)
801 self.assertEqual(get(), when)
802
803 # A minus one hour fifteen minutes offset
804 when = "20040203040506-0115"
805 set(when)
806 self.assertEqual(get(), when)
807
808 # An invalid string results in a ValueError
809 self.assertRaises(ValueError, set, "foo bar")
810
811
812 def test_set_notBefore(self):
813 """
814 L{X509Type.set_notBefore} takes a string in the format of an ASN1
815 GENERALIZEDTIME and sets the beginning of the certificate's validity
816 period to it.
817 """
818 self._setBoundTest("Before")
819
820
821 def test_set_notAfter(self):
822 """
823 L{X509Type.set_notAfter} takes a string in the format of an ASN1
824 GENERALIZEDTIME and sets the end of the certificate's validity period
825 to it.
826 """
827 self._setBoundTest("After")
Jean-Paul Calderone76576d52008-03-24 16:04:46 -0400828
829
Jean-Paul Calderone38a646d2008-03-25 15:16:18 -0400830 def test_get_notBefore(self):
831 """
832 L{X509Type.get_notBefore} returns a string in the format of an ASN1
833 GENERALIZEDTIME even for certificates which store it as UTCTIME
834 internally.
835 """
Jean-Paul Calderone8114b452008-03-25 15:27:59 -0400836 cert = load_certificate(FILETYPE_PEM, self.pemData)
Jean-Paul Calderone20131f52009-04-01 12:05:45 -0400837 self.assertEqual(cert.get_notBefore(), "20090325123658Z")
Jean-Paul Calderone38a646d2008-03-25 15:16:18 -0400838
839
840 def test_get_notAfter(self):
841 """
842 L{X509Type.get_notAfter} returns a string in the format of an ASN1
843 GENERALIZEDTIME even for certificates which store it as UTCTIME
844 internally.
845 """
Jean-Paul Calderone8114b452008-03-25 15:27:59 -0400846 cert = load_certificate(FILETYPE_PEM, self.pemData)
Jean-Paul Calderone20131f52009-04-01 12:05:45 -0400847 self.assertEqual(cert.get_notAfter(), "20170611123658Z")
Jean-Paul Calderone38a646d2008-03-25 15:16:18 -0400848
849
Jean-Paul Calderone76576d52008-03-24 16:04:46 -0400850 def test_digest(self):
851 """
852 L{X509.digest} returns a string giving ":"-separated hex-encoded words
853 of the digest of the certificate.
854 """
855 cert = X509()
856 self.assertEqual(
857 cert.digest("md5"),
858 "A8:EB:07:F8:53:25:0A:F2:56:05:C5:A5:C4:C4:C7:15")
Jean-Paul Calderone828c9cb2008-04-26 18:06:54 -0400859
860
861
Jean-Paul Calderone18808652009-07-05 12:54:05 -0400862class FunctionTests(TestCase):
Jean-Paul Calderone828c9cb2008-04-26 18:06:54 -0400863 """
864 Tests for free-functions in the L{OpenSSL.crypto} module.
865 """
866 def test_load_privatekey_wrongPassphrase(self):
867 """
868 L{load_privatekey} raises L{OpenSSL.crypto.Error} when it is passed an
869 encrypted PEM and an incorrect passphrase.
870 """
871 self.assertRaises(
872 Error,
873 load_privatekey, FILETYPE_PEM, encryptedPrivateKeyPEM, "quack")
874
875
876 def test_load_privatekey_passphrase(self):
877 """
878 L{load_privatekey} can create a L{PKey} object from an encrypted PEM
879 string if given the passphrase.
880 """
881 key = load_privatekey(
882 FILETYPE_PEM, encryptedPrivateKeyPEM,
883 encryptedPrivateKeyPEMPassphrase)
884 self.assertTrue(isinstance(key, PKeyType))
885
886
887 def test_load_privatekey_wrongPassphraseCallback(self):
888 """
889 L{load_privatekey} raises L{OpenSSL.crypto.Error} when it is passed an
890 encrypted PEM and a passphrase callback which returns an incorrect
891 passphrase.
892 """
893 called = []
894 def cb(*a):
895 called.append(None)
896 return "quack"
897 self.assertRaises(
898 Error,
899 load_privatekey, FILETYPE_PEM, encryptedPrivateKeyPEM, cb)
900 self.assertTrue(called)
901
902 def test_load_privatekey_passphraseCallback(self):
903 """
904 L{load_privatekey} can create a L{PKey} object from an encrypted PEM
905 string if given a passphrase callback which returns the correct
906 password.
907 """
908 called = []
909 def cb(writing):
910 called.append(writing)
911 return encryptedPrivateKeyPEMPassphrase
912 key = load_privatekey(FILETYPE_PEM, encryptedPrivateKeyPEM, cb)
913 self.assertTrue(isinstance(key, PKeyType))
914 self.assertEqual(called, [False])
915
916
917 def test_dump_privatekey_passphrase(self):
918 """
919 L{dump_privatekey} writes an encrypted PEM when given a passphrase.
920 """
921 passphrase = "foo"
922 key = load_privatekey(FILETYPE_PEM, cleartextPrivateKeyPEM)
923 pem = dump_privatekey(FILETYPE_PEM, key, "blowfish", passphrase)
924 self.assertTrue(isinstance(pem, str))
925 loadedKey = load_privatekey(FILETYPE_PEM, pem, passphrase)
926 self.assertTrue(isinstance(loadedKey, PKeyType))
927 self.assertEqual(loadedKey.type(), key.type())
928 self.assertEqual(loadedKey.bits(), key.bits())
929
Jean-Paul Calderonef17e4212009-04-01 14:21:40 -0400930
931 def _runopenssl(self, pem, *args):
932 """
933 Run the command line openssl tool with the given arguments and write
934 the given PEM to its stdin.
935 """
Jean-Paul Calderone16c4d5e2009-05-04 18:27:52 -0400936 write, read = popen2(" ".join(("openssl",) + args), "b")
Jean-Paul Calderone653f5582009-04-01 14:42:32 -0400937 write.write(pem)
938 write.close()
939 return read.read()
Jean-Paul Calderonef17e4212009-04-01 14:21:40 -0400940
941
Rick Dean5b7b6372009-04-01 11:34:06 -0500942 def test_dump_certificate(self):
943 """
944 L{dump_certificate} writes PEM, DER, and text.
945 """
Jean-Paul Calderonef17e4212009-04-01 14:21:40 -0400946 pemData = cleartextCertificatePEM + cleartextPrivateKeyPEM
Rick Dean5b7b6372009-04-01 11:34:06 -0500947 cert = load_certificate(FILETYPE_PEM, pemData)
948 dumped_pem = dump_certificate(FILETYPE_PEM, cert)
949 self.assertEqual(dumped_pem, cleartextCertificatePEM)
950 dumped_der = dump_certificate(FILETYPE_ASN1, cert)
Jean-Paul Calderonef17e4212009-04-01 14:21:40 -0400951 good_der = self._runopenssl(dumped_pem, "x509", "-outform", "DER")
Rick Dean5b7b6372009-04-01 11:34:06 -0500952 self.assertEqual(dumped_der, good_der)
953 cert2 = load_certificate(FILETYPE_ASN1, dumped_der)
954 dumped_pem2 = dump_certificate(FILETYPE_PEM, cert2)
955 self.assertEqual(dumped_pem2, cleartextCertificatePEM)
956 dumped_text = dump_certificate(FILETYPE_TEXT, cert)
Jean-Paul Calderonef17e4212009-04-01 14:21:40 -0400957 good_text = self._runopenssl(dumped_pem, "x509", "-noout", "-text")
Rick Dean5b7b6372009-04-01 11:34:06 -0500958 self.assertEqual(dumped_text, good_text)
959
960
961 def test_dump_privatekey(self):
962 """
963 L{dump_privatekey} writes a PEM, DER, and text.
964 """
965 key = load_privatekey(FILETYPE_PEM, cleartextPrivateKeyPEM)
966 dumped_pem = dump_privatekey(FILETYPE_PEM, key)
967 self.assertEqual(dumped_pem, cleartextPrivateKeyPEM)
968 dumped_der = dump_privatekey(FILETYPE_ASN1, key)
Jean-Paul Calderonef17e4212009-04-01 14:21:40 -0400969 # XXX This OpenSSL call writes "writing RSA key" to standard out. Sad.
970 good_der = self._runopenssl(dumped_pem, "rsa", "-outform", "DER")
Rick Dean5b7b6372009-04-01 11:34:06 -0500971 self.assertEqual(dumped_der, good_der)
972 key2 = load_privatekey(FILETYPE_ASN1, dumped_der)
973 dumped_pem2 = dump_privatekey(FILETYPE_PEM, key2)
974 self.assertEqual(dumped_pem2, cleartextPrivateKeyPEM)
975 dumped_text = dump_privatekey(FILETYPE_TEXT, key)
Jean-Paul Calderonef17e4212009-04-01 14:21:40 -0400976 good_text = self._runopenssl(dumped_pem, "rsa", "-noout", "-text")
Rick Dean5b7b6372009-04-01 11:34:06 -0500977 self.assertEqual(dumped_text, good_text)
978
Jean-Paul Calderonef17e4212009-04-01 14:21:40 -0400979
Rick Dean5b7b6372009-04-01 11:34:06 -0500980 def test_dump_certificate_request(self):
981 """
982 L{dump_certificate_request} writes a PEM, DER, and text.
983 """
984 req = load_certificate_request(FILETYPE_PEM, cleartextCertificateRequestPEM)
985 dumped_pem = dump_certificate_request(FILETYPE_PEM, req)
986 self.assertEqual(dumped_pem, cleartextCertificateRequestPEM)
987 dumped_der = dump_certificate_request(FILETYPE_ASN1, req)
Jean-Paul Calderonef17e4212009-04-01 14:21:40 -0400988 good_der = self._runopenssl(dumped_pem, "req", "-outform", "DER")
Rick Dean5b7b6372009-04-01 11:34:06 -0500989 self.assertEqual(dumped_der, good_der)
990 req2 = load_certificate_request(FILETYPE_ASN1, dumped_der)
991 dumped_pem2 = dump_certificate_request(FILETYPE_PEM, req2)
992 self.assertEqual(dumped_pem2, cleartextCertificateRequestPEM)
993 dumped_text = dump_certificate_request(FILETYPE_TEXT, req)
Jean-Paul Calderonef17e4212009-04-01 14:21:40 -0400994 good_text = self._runopenssl(dumped_pem, "req", "-noout", "-text")
Rick Dean5b7b6372009-04-01 11:34:06 -0500995 self.assertEqual(dumped_text, good_text)
996
Jean-Paul Calderone828c9cb2008-04-26 18:06:54 -0400997
998 def test_dump_privatekey_passphraseCallback(self):
999 """
1000 L{dump_privatekey} writes an encrypted PEM when given a callback which
1001 returns the correct passphrase.
1002 """
1003 passphrase = "foo"
1004 called = []
1005 def cb(writing):
1006 called.append(writing)
1007 return passphrase
1008 key = load_privatekey(FILETYPE_PEM, cleartextPrivateKeyPEM)
1009 pem = dump_privatekey(FILETYPE_PEM, key, "blowfish", cb)
1010 self.assertTrue(isinstance(pem, str))
1011 self.assertEqual(called, [True])
1012 loadedKey = load_privatekey(FILETYPE_PEM, pem, passphrase)
1013 self.assertTrue(isinstance(loadedKey, PKeyType))
1014 self.assertEqual(loadedKey.type(), key.type())
1015 self.assertEqual(loadedKey.bits(), key.bits())
Rick Dean5b7b6372009-04-01 11:34:06 -05001016
1017
Jean-Paul Calderonedc138fa2009-06-27 14:32:07 -04001018 def test_load_pkcs7_data(self):
1019 """
1020 L{load_pkcs7_data} accepts a PKCS#7 string and returns an instance of
1021 L{PKCS7Type}.
1022 """
1023 pkcs7 = load_pkcs7_data(FILETYPE_PEM, pkcs7Data)
1024 self.assertTrue(isinstance(pkcs7, PKCS7Type))
1025
1026
1027 def test_load_pkcs12(self):
1028 """
1029 L{load_pkcs12} accepts a PKCS#12 string and returns an instance of
1030 L{PKCS12Type}.
1031 """
1032 pkcs12 = load_pkcs12(pkcs12Data)
1033 self.assertTrue(isinstance(pkcs12, PKCS12Type))
1034
1035
1036
1037class NetscapeSPKITests(TestCase):
1038 """
1039 Tests for L{OpenSSL.crypto.NetscapeSPKI}.
1040 """
1041 def test_construction(self):
1042 """
1043 L{NetscapeSPKI} returns an instance of L{NetscapeSPKIType}.
1044 """
1045 nspki = NetscapeSPKI()
1046 self.assertTrue(isinstance(nspki, NetscapeSPKIType))
1047
1048
1049
Rick Dean5b7b6372009-04-01 11:34:06 -05001050if __name__ == '__main__':
1051 main()