aboutsummaryrefslogtreecommitdiff
path: root/pow/POW-0.7/test/test.py
diff options
context:
space:
mode:
Diffstat (limited to 'pow/POW-0.7/test/test.py')
-rwxr-xr-xpow/POW-0.7/test/test.py2128
1 files changed, 0 insertions, 2128 deletions
diff --git a/pow/POW-0.7/test/test.py b/pow/POW-0.7/test/test.py
deleted file mode 100755
index a2070df5..00000000
--- a/pow/POW-0.7/test/test.py
+++ /dev/null
@@ -1,2128 +0,0 @@
-#!/usr/bin/env python
-
-#*****************************************************************************#
-#* *#
-#* Copyright (c) 2002, Peter Shannon *#
-#* All rights reserved. *#
-#* *#
-#* Redistribution and use in source and binary forms, with or without *#
-#* modification, are permitted provided that the following conditions *#
-#* are met: *#
-#* *#
-#* * Redistributions of source code must retain the above *#
-#* copyright notice, this list of conditions and the following *#
-#* disclaimer. *#
-#* *#
-#* * Redistributions in binary form must reproduce the above *#
-#* copyright notice, this list of conditions and the following *#
-#* disclaimer in the documentation and/or other materials *#
-#* provided with the distribution. *#
-#* *#
-#* * The name of the contributors may be used to endorse or promote *#
-#* products derived from this software without specific prior *#
-#* written permission. *#
-#* *#
-#* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS *#
-#* "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT *#
-#* LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS *#
-#* FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS *#
-#* OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, *#
-#* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT *#
-#* LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, *#
-#* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY *#
-#* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT *#
-#* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE *#
-#* OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. *#
-#* *#
-#*****************************************************************************#
-
-import unittest, POW.pkix, POW._oids, base64, sys, os, socket, time, types, string, StringIO, pprint
-
-if not os.path.isdir('working'):
- os.mkdir('working')
-
-DEBUG = 0
-
-o2i = POW.pkix.obj2oid
-
-def wo(mystring):
- file = open('test.der', 'w')
- file.write(mystring)
- file.close()
-
-def checkValue(constructor, val1):
- obj1 = constructor()
- obj1.set(val1)
- io = obj1.toString()
- if DEBUG:
- file = open('test.der', 'w')
- obj1.write(file)
- file.close()
-
- obj2 = constructor()
- obj2.fromString(io)
- val2 = obj2.get()
- if val2 == val1:
- return 1
- else:
- if DEBUG:
- print 'read result:', val2
- return 0
-
-class DerEncodingTestCase(unittest.TestCase):
- 'a small suite of tests for the most complex codings'
-
- def booleanTest(self):
- 'test boolean support'
- print
- self.failUnless( checkValue(POW.pkix.Boolean, 1), 'true was not presereved correctly')
- self.failUnless( checkValue(POW.pkix.Boolean, 0), 'false was not presereved correctly')
-
- def integerTest(self):
- 'test integer support'
- print
- for i in range(-5000, 5000):
- print 'checking codings for', i
- self.failUnless( checkValue(POW.pkix.Integer, i), '%i was not presereved correctly' % i)
-
- def oidTest(self):
- 'test oid support'
- print
- for oid in POW._oids.data.keys():
- print 'checking codings for', oid
- self.failUnless( checkValue(POW.pkix.Oid, oid), '%s was not presereved correctly' % `oid`)
-
- def bitStringTest(self):
- 'test bitstring support'
- values = [
- (0,), (1,), (0,0), (0,1), (1,0), (1,1), (0,1,0,1,0), (0,0,0,0,0,0,0),
- (1,1,1,1,1,1,1,), (0,0,0,0,0,0,0,0), (1,1,1,1,1,1,1,1),
- (0,0,0,0,0,0,0,0,0), (1,1,1,1,1,1,1,1,1,)
- ]
- print
- for val in values:
- print 'checking codings for', val
- self.failUnless( checkValue(POW.pkix.BitString, val), '%s was not presereved correctly' % `val`)
-
-
-class ComplexDerTestCase(unittest.TestCase):
- '''a suite of tests for testing encoding of defaults, optional, explicit,
- implied and choice objects'''
-
- def emptySeqTest(self):
- 'checking coding of empty sequence object'
- seq = POW.pkix.Sequence([])
- try:
- seq.toString()
- self.fail('attempting to write this should have raised and exception')
- except:
- pass
- self.failUnless(seq.toString() == '0\x00', 'empty sequence encoded incorrectly')
- seq.fromString(seq.toString())
- self.failUnless(seq.get() == (), 'empty sequence decoded incorrectly')
- self.failUnless(seq.toString() == '0\x00', 'empty sequence encoded incorrectly')
-
- def seqOfSimpleTest(self):
- 'checking coding of basic sequence object'
- seq = POW.pkix.Sequence([ POW.pkix.Integer(), POW.pkix.Boolean(), POW.pkix.T61String() ])
- try:
- seq.toString()
- self.fail('attempting to write this should have raised and exception')
- except:
- pass
- values = (64, 1, 'Hello World')
- seq.set( values )
- self.failUnless(seq.toString() == '0\x13\x02\x01@\x01\x01\xff\x14\x0bHello World', 'sequence of basic encoded incorrectly')
- seq.fromString(seq.toString())
- self.failUnless(seq.get() == values, 'sequence of basic decoded incorrectly')
- self.failUnless(seq.toString() == '0\x13\x02\x01@\x01\x01\xff\x14\x0bHello World', 'sequence of basic encoded incorrectly')
-
- def seqOfSeqTest(self):
- 'checking coding of sequence of sequence object'
- seqa = POW.pkix.Sequence([ POW.pkix.Integer(), POW.pkix.Boolean(), POW.pkix.T61String() ])
- seqb = POW.pkix.Sequence([ seqa, POW.pkix.Integer(), POW.pkix.Boolean() ])
- try:
- seqb.toString()
- self.fail('attempting to write this should have raised and exception')
- except:
- pass
- values = ((64, 1, 'Hello World'), 128, 0)
- seqb.set( values )
- self.failUnless(seqb.toString() == '0\x1c0\x13\x02\x01@\x01\x01\xff\x14\x0bHello World\x02\x02\x00\x80\x01\x01\x00',
- 'sequence of sequence encoded incorrectly')
- seqb.fromString(seqb.toString())
- self.failUnless(seqb.get() == values, 'sequence of sequence decoded incorrectly')
- self.failUnless(seqb.toString() == '0\x1c0\x13\x02\x01@\x01\x01\xff\x14\x0bHello World\x02\x02\x00\x80\x01\x01\x00',
- 'sequence of sequence encoded incorrectly')
-
- def seqOfSimpleWithOptionalTest(self):
- 'checking coding of sequence of basic objects with optional object'
- seq = POW.pkix.Sequence([ POW.pkix.Integer(1), POW.pkix.Boolean(), POW.pkix.T61String() ])
- try:
- seq.toString()
- self.fail('attempting to write this should have raised and exception')
- except:
- pass
- values = (None, 1, 'Hello World')
- seq.set(values)
- self.failUnless(seq.toString() == '0\x10\x01\x01\xff\x14\x0bHello World', 'sequence of basic with optional encoded incorrectly')
- seq.fromString(seq.toString())
- self.failUnless(seq.get() == values, 'sequence of basic with optional decoded incorrectly')
- self.failUnless(seq.toString() == '0\x10\x01\x01\xff\x14\x0bHello World', 'sequence of basic with optional encoded incorrectly')
-
- def seqOfSimpleWithDefaultTest(self):
- 'checking coding of sequence of basic objects with default object'
- seq = POW.pkix.Sequence([ POW.pkix.Integer(), POW.pkix.Boolean(), POW.pkix.T61String(0, 'FAtIZWxsbyBXb3JsZA==\n') ])
- try:
- seq.toString()
- self.fail('attempting to write this should have raised and exception')
- except:
- pass
- values = (32, 1, None)
- seq.set( values )
- self.failUnless(seq.toString() == '0\x06\x02\x01 \x01\x01\xff', 'sequence of basic with default encoded incorrectly')
- seq.fromString(seq.toString())
- self.failUnless(seq.get() == (32,1,'Hello World'), 'sequence of basic with default decoded incorrectly')
- self.failUnless(seq.toString() == '0\x06\x02\x01 \x01\x01\xff', 'sequence of basic with default encoded incorrectly')
-
- def seqOfOptionalSeqTest(self):
- 'checking coding of sequence of optional sequence object'
- seq = POW.pkix.Sequence([ POW.pkix.Sequence([POW.pkix.Integer()],1) ])
- try:
- seq.toString()
- except:
- self.fail('attempting to write this should not have raised and exception')
- pass
- rep = seq.toString()
- self.failUnless(seq.toString() == '0\x00', 'sequence of optional sequence encoded incorrectly')
- seq.fromString('0\x00')
- self.failUnless(seq.toString() == '0\x00', 'sequence of optional sequence encoded incorrectly')
- values = ((64,),)
- seq.set( values )
- self.failUnless(seq.toString() == '0\x050\x03\x02\x01@', 'sequence of set optional sequence encoded incorrectly')
- seq.fromString(seq.toString())
- self.failUnless(seq.get() == values, 'sequence of set optional sequence decoded incorrectly')
-
- def seqOfPartiallySetOptionalSeqTest(self):
- 'checking coding of sequence of optional sequence objects'
- seq = POW.pkix.Sequence([ POW.pkix.Sequence([POW.pkix.Integer(), POW.pkix.Integer()],1) ])
- try:
- seq.toString()
- except:
- self.fail('attempting to write this should not have raised and exception')
- pass
- self.failUnless(seq.toString() == '0\x00', 'sequence of optional sequence encoded incorrectly')
- seq.fromString('0\x00')
- self.failUnless(seq.toString() == '0\x00', 'sequence of optional sequence encoded incorrectly')
- values = ((7,None),)
- seq.set( values )
- self.failUnless(seq.toString() == '0\x00', 'sequence of set optional sequence encoded incorrectly')
- seq.fromString(seq.toString())
- values = ((7,14),)
- seq.set( values )
- self.failUnless(seq.toString() == '0\x080\x06\x02\x01\x07\x02\x01\x0e', 'sequence of set optional sequence encoded incorrectly')
- seq.fromString('0\x080\x06\x02\x01\x07\x02\x01\x0e')
- self.failUnless(seq.toString() == '0\x080\x06\x02\x01\x07\x02\x01\x0e', 'sequence of set optional sequence encoded incorrectly')
-
-
- def defaultSeqTest(self):
- 'checking coding of default sequence object'
- seq = POW.pkix.Sequence([POW.pkix.Integer()], 0, 'MAMCAQc=\n')
- try:
- seq.toString()
- except:
- self.fail('attempting to write this should not have raised and exception')
- pass
- self.failUnless(seq.toString() == '', 'unset default sequence encoded incorrectly')
- seq.fromString('')
- self.failUnless(seq.toString() == '', 'unset default sequence encoded incorrectly')
- values = (64,)
- seq.set( values )
- self.failUnless(seq.toString() == '0\x03\x02\x01@', 'set default sequence encoded incorrectly')
- seq.reset()
- seq.fromString('0\x03\x02\x01@')
- self.failUnless(seq.get() == (64,), 'set default sequence decoded incorrectly')
- self.failUnless(seq.toString() == '0\x03\x02\x01@', 'set default sequence encoded incorrectly')
-
- def sequenceOfChoiceTest(self):
- 'checking coding of sequence of choice objects'
- Time = lambda : POW.pkix.Choice({ 'generalTime' : POW.pkix.GeneralizedTime(),
- 'utcTime' : POW.pkix.UtcTime() })
- seq = POW.pkix.Sequence([Time(), Time()])
- try:
- seq.toString()
- self.fail('attempting to write this should have raised and exception')
- except:
- pass
- now = POW.pkix.time2gen(1031669280.1208529)
- then = POW.pkix.time2gen(1031669280.1208529 + 60*60*24*365*12)
- seq.set( (('generalTime',now),('generalTime',then)) )
- self.failUnless(seq.get() == (('generalTime', '20020910144800Z'), ('generalTime', '20140907144800Z')),
- 'sequence of choice encoded incorrectly')
- self.failUnless(seq.toString() == '0"\x18\x0f20020910144800Z\x18\x0f20140907144800Z',
- 'sequence of choice encoded incorrectly')
- self.failUnless(seq.get() == (('generalTime', '20020910144800Z'), ('generalTime', '20140907144800Z')),
- 'sequence of choice decoded incorrectly')
-
-
- def seqOfDefaultSeqTest(self):
- 'checking coding of sequence of default sequence object'
- seq = POW.pkix.Sequence([ POW.pkix.Sequence([POW.pkix.Integer()], 0, 'MAMCAQc=\n') ] )
- try:
- seq.toString()
- except:
- self.fail('attempting to write this should not have raised and exception')
- pass
- self.failUnless(seq.toString() == '0\x00', 'unset sequence of default sequence encoded incorrectly')
- seq.fromString('0\x00')
- values = ((128,),)
- seq.set( values )
- self.failUnless(seq.toString() == '0\x060\x04\x02\x02\x00\x80', 'set sequence of default sequence encoded incorrectly')
- seq.fromString(seq.toString())
- self.failUnless(seq.toString() == '0\x060\x04\x02\x02\x00\x80', 'set sequence of default sequence encoded incorrectly')
- self.failUnless(seq.get() == ((128,),), 'set sequence of default sequence decoded incorrectly')
- seq.reset()
- seq.fromString('0\x00')
- self.failUnless(seq.get() == ((7,),), 'default of sequence of default sequence decoded incorrectly')
-
- def sequenceOfSimpleTest(self):
- 'checking coding of basic and empty sequenceOf object'
- sqo = POW.pkix.SequenceOf(POW.pkix.Integer)
- derval = sqo.toString()
- self.failUnless(sqo.toString() == '0\x00', 'empty sequenceOf encoded incorrectly')
- sqo.fromString('0\x00')
- self.failUnless(sqo.toString() == '0\x00', 'empty sequenceOf encoded incorrectly')
- sqo.set( (1,2,3,4) )
- sqo.fromString(derval)
- self.failUnless(sqo.get() == (), 'empty sequenceOf decoded incorrectly')
- sqo.set( (1,2,3,4) )
- self.failUnless(sqo.toString() == '0\x0c\x02\x01\x01\x02\x01\x02\x02\x01\x03\x02\x01\x04', 'populated sequenceOf encoded incorrectly')
- sqo.reset()
- sqo.fromString('0\x0c\x02\x01\x01\x02\x01\x02\x02\x01\x03\x02\x01\x04')
- self.failUnless(sqo.toString() == '0\x0c\x02\x01\x01\x02\x01\x02\x02\x01\x03\x02\x01\x04', 'populated sequenceOf encoded incorrectly')
- self.failUnless(sqo.get() == (1,2,3,4), 'populated sequenceOf decoded incorrectly')
-
- def defaultSequenceOfTest(self):
- 'checking coding of default sequenceOf object'
- sqo = POW.pkix.SequenceOf(POW.pkix.Integer,0,'MAwCAQECAQICAQMCAQQ=\n')
- try:
- sqo.toString()
- except:
- self.fail('attempting to write this should not have raised and exception')
- pass
- self.failUnless(sqo.toString() == '', 'unset default sequenceOf encoded incorrectly')
- sqo.set(())
- sqo.fromString('')
- self.failUnless(sqo.toString() == '', 'unset default sequenceOf encoded incorrectly')
- sqo.fromString(sqo.toString())
- self.failUnless(sqo.get() == (1,2,3,4), 'default sequenceOf decoded incorrectly')
- sqo.set((24,48) )
- self.failUnless(sqo.toString() == '0\x06\x02\x01\x18\x02\x010', 'populated default sequenceOf encoded incorrectly')
- sqo.reset()
- sqo.fromString('0\x06\x02\x01\x18\x02\x010')
- self.failUnless(sqo.get() == (24,48), 'populated default sequenceOf decoded incorrectly')
- self.failUnless(sqo.toString() == '0\x06\x02\x01\x18\x02\x010', 'populated default sequenceOf encoded incorrectly')
-
- def sequenceOfDefaultSequenceOfTest(self):
- 'checking coding of sequence of default sequenceOf object'
- seq = POW.pkix.Sequence([ POW.pkix.SequenceOf(POW.pkix.Integer,0,'MAwCAQECAQICAQMCAQQ=\n') ])
- try:
- seq.toString()
- except:
- self.fail('attempting to write this should not have raised and exception')
- pass
- self.failUnless(seq.toString() == '0\x00', 'unset sequence of default sequenceOf encoded incorrectly')
- derval = seq.toString()
- seq.set( ((),) )
- seq.fromString(derval)
- self.failUnless(seq.get() == ((1,2,3,4),), 'sequence of default sequenceOf decoded incorrectly')
- seq.set( ((24,48),) )
- self.failUnless(seq.toString() == '0\x080\x06\x02\x01\x18\x02\x010', 'populated sequence of default sequenceOf encoded incorrectly')
- seq.reset()
- seq.fromString('0\x080\x06\x02\x01\x18\x02\x010')
- self.failUnless(seq.get() == ((24,48),), 'populated sequence of default sequenceOf decoded incorrectly')
- self.failUnless(seq.toString() == '0\x080\x06\x02\x01\x18\x02\x010', 'populated sequence of default sequenceOf encoded incorrectly')
-
- def optionalSequenceOfTest(self):
- 'checking coding of optional sequenceOf object'
- sqo = POW.pkix.SequenceOf(POW.pkix.Integer,1)
- try:
- sqo.toString()
- except:
- self.fail('attempting to write this should not have raised and exception')
- pass
- self.failUnless(sqo.toString() == '', 'unset optional sequenceOf encoded incorrectly')
- sqo.set((24,48) )
- self.failUnless(sqo.toString() == '0\x06\x02\x01\x18\x02\x010', 'set optional sequenceOf encoded incorrectly')
- sqo.reset()
- sqo.fromString('0\x06\x02\x01\x18\x02\x010')
- self.failUnless(sqo.get() == (24,48), 'set optional sequenceOf decoded incorrectly')
- self.failUnless(sqo.toString() == '0\x06\x02\x01\x18\x02\x010', 'set optional sequenceOf encoded incorrectly')
-
- def sequenceOfOptionalSequenceOfTest(self):
- 'checking coding of sequence of optional sequenceOf object'
- seq = POW.pkix.Sequence([ POW.pkix.SequenceOf(POW.pkix.Integer,1) ])
- try:
- seq.toString()
- except:
- self.fail('attempting to write this should not have raised and exception')
- pass
- self.failUnless(seq.toString() == '0\x00', 'unset sequence of optional sequenceOf encoded incorrectly')
- seq.set( ((1,2,3,4),) )
- self.failUnless(seq.toString() == '0\x0e0\x0c\x02\x01\x01\x02\x01\x02\x02\x01\x03\x02\x01\x04',
- 'populated sequence of optional sequenceOf encoded incorrectly')
- seq.reset()
- seq.fromString('0\x0e0\x0c\x02\x01\x01\x02\x01\x02\x02\x01\x03\x02\x01\x04')
- self.failUnless(seq.get() == ((1,2,3,4),), 'populated sequence of optional sequenceOf decoded incorrectly')
-
- def basicExplicitTest(self):
- 'checking coding of basic explicit object'
- exp = POW.pkix.Explicit( POW.pkix.CLASS_CONTEXT, POW.pkix.FORM_CONSTRUCTED, 0, POW.pkix.Integer() )
- try:
- exp.toString()
- self.fail('attempting to write this should have raised and exception')
- except:
- pass
- exp.set(1)
- self.failUnless(exp.toString() == '\xa0\x03\x02\x01\x01', 'set explicit integer encoded incorrectly')
- exp.reset()
- exp.fromString('\xa0\x03\x02\x01\x01')
- self.failUnless(exp.toString() == '\xa0\x03\x02\x01\x01', 'set explicit integer encoded incorrectly')
- self.failUnless(exp.get() == 1, 'set explicit integer decoded incorrectly')
-
- def defaultExplicitTest(self):
- 'checking coding of default explicit object'
- exp = POW.pkix.Explicit( POW.pkix.CLASS_CONTEXT, POW.pkix.FORM_CONSTRUCTED, 0, POW.pkix.Integer(), 0, 'oAMCAQE=\n' )
- try:
- exp.toString()
- except:
- self.fail('attempting to write this should not have raised and exception')
- pass
- self.failUnless(exp.toString() == '', 'unset default epxlicit integer encoded incorrectly')
- exp.set(14)
- self.failUnless(exp.toString() == '\xa0\x03\x02\x01\x0e', 'set explicit integer encoded incorrectly')
- exp.reset()
- exp.fromString('\xa0\x03\x02\x01\x0e')
- self.failUnless(exp.get() == 14, 'set explicit integer decoded incorrectly')
- self.failUnless(exp.toString() == '\xa0\x03\x02\x01\x0e', 'set explicit integer encoded incorrectly')
-
- def optionalExplicitTest(self):
- 'checking coding of optional explicit object'
- exp = POW.pkix.Explicit( POW.pkix.CLASS_CONTEXT, POW.pkix.FORM_CONSTRUCTED, 0, POW.pkix.Integer(), 1 )
- try:
- exp.toString()
- except:
- self.fail('attempting to write this should not have raised and exception')
- pass
- self.failUnless(exp.toString() == '', 'unset default epxlicit integer encoded incorrectly')
- exp.set(14)
- self.failUnless(exp.toString() == '\xa0\x03\x02\x01\x0e', 'set explicit integer encoded incorrectly')
- exp.reset()
- exp.fromString('\xa0\x03\x02\x01\x0e')
- self.failUnless(exp.get() == 14, 'set explicit integer decoded incorrectly')
- self.failUnless(exp.toString() == '\xa0\x03\x02\x01\x0e', 'set explicit integer encoded incorrectly')
-
- def basicChoiceTest(self):
- 'checking coding of basic choice object'
- chint = POW.pkix.Integer()
- chstring = POW.pkix.OctetString()
- chbool = POW.pkix.Boolean()
- choices = { 'i' : chint,
- 's' : chstring,
- 'b' : chbool }
-
- ch = POW.pkix.Choice(choices)
- try:
- ch.toString()
- self.fail('attempting to write this should have raised and exception')
- except:
- pass
- ch.set(('i',7))
- self.failUnless(ch.toString() == '\x02\x01\x07', 'set integer choice encoded incorrectly')
- ch.set(('s','Hello World'))
- self.failUnless(ch.toString() == '\x04\x0bHello World', 'set octet string choice encoded incorrectly')
- ch.set(('b',1))
- self.failUnless(ch.toString() == '\x01\x01\xff', 'set boolean choice encoded incorrectly')
-
- ch.fromString('\x02\x01\x07')
- self.failUnless(ch.get() == ('i',7), 'set integer choice decoded incorrectly')
- ch.fromString('\x04\x0bHello World')
- self.failUnless(ch.get() == ('s','Hello World'), 'set octet string choice decoded incorrectly')
- ch.fromString('\x01\x01\xff')
- self.failUnless(ch.get() == ('b',1), 'set integer boolean decoded incorrectly')
-
- def defaultChoiceTest(self):
- 'checking coding of default choice object'
- chint = POW.pkix.Integer()
- chstring = POW.pkix.OctetString()
- chbool = POW.pkix.Boolean()
- choices = { 'i' : chint,
- 's' : chstring,
- 'b' : chbool }
-
- ch = POW.pkix.Choice(choices,0,'AQH/\n')
- try:
- ch.toString()
- except:
- self.fail('attempting to write this should not have raised and exception')
- pass
- self.failUnless(ch.toString() == '', 'unset default choice encoded incorrectly')
- ch.set(('i',7))
- self.failUnless(ch.toString() == '\x02\x01\x07', 'set integer choice encoded incorrectly')
- ch.set(('s','Hello World'))
- self.failUnless(ch.toString() == '\x04\x0bHello World', 'set octet string choice encoded incorrectly')
-
- ch.fromString('\x02\x01\x07')
- self.failUnless(ch.get() == ('i',7), 'set integer choice decoded incorrectly')
- ch.fromString('\x04\x0bHello World')
- self.failUnless(ch.get() == ('s','Hello World'), 'set octet string choice decoded incorrectly')
- ch.fromString('')
- self.failUnless(ch.get() == ('b',1), 'set integer boolean decoded incorrectly')
-
- def optionalChoiceTest(self):
- 'checking coding of optional choice object'
- chint = POW.pkix.Integer()
- chstring = POW.pkix.OctetString()
- chbool = POW.pkix.Boolean()
- choices = { 'i' : chint,
- 's' : chstring,
- 'b' : chbool }
-
- ch = POW.pkix.Choice(choices,1)
- try:
- ch.toString()
- except:
- self.fail('attempting to write this should not have raised and exception')
- pass
- self.failUnless(ch.toString() == '', 'unset choice encoded incorrectly')
- ch.set(('i',7))
- self.failUnless(ch.toString() == '\x02\x01\x07', 'set integer choice encoded incorrectly')
- ch.set(('s','Hello World'))
- self.failUnless(ch.toString() == '\x04\x0bHello World', 'set octet string choice encoded incorrectly')
- ch.set(('b',1))
- self.failUnless(ch.toString() == '\x01\x01\xff', 'set boolean choice encoded incorrectly')
-
- ch.fromString('')
- self.failUnless(ch.get() == None, 'unset choice decoded incorrectly')
- ch.fromString('\x02\x01\x07')
- self.failUnless(ch.get() == ('i',7), 'set integer choice decoded incorrectly')
- ch.fromString('\x04\x0bHello World')
- self.failUnless(ch.get() == ('s','Hello World'), 'set octet string choice decoded incorrectly')
- ch.fromString('\x01\x01\xff')
- self.failUnless(ch.get() == ('b',1), 'set integer boolean decoded incorrectly')
-
- def choiceWithDefaultElementTest(self):
- 'checking coding of choice object with default choice'
- chint = POW.pkix.Integer()
- chstring = POW.pkix.OctetString(0,'BAtIZWxsbyBXb3JsZA==\n')
- chbool = POW.pkix.Boolean()
- choices = { 'i' : chint,
- 's' : chstring,
- 'b' : chbool }
-
- ch = POW.pkix.Choice(choices)
- try:
- ch.toString()
- except:
- self.fail('attempting to write this should not have raised and exception')
- pass
- self.failUnless(ch.get() == ('s','Hello World'), 'set octet string choice decoded incorrectly')
- ch.set(('i',7))
- self.failUnless(ch.toString() == '\x02\x01\x07', 'set integer choice encoded incorrectly')
- ch.set(('s','Hello World'))
- self.failUnless(ch.toString() == '', 'set octet string choice encoded incorrectly')
- ch.set(('b',1))
- self.failUnless(ch.toString() == '\x01\x01\xff', 'set boolean choice encoded incorrectly')
-
- ch.fromString('\x02\x01\x07')
- self.failUnless(ch.get() == ('i',7), 'set integer choice decoded incorrectly')
- ch.fromString('\x04\x0bHello World')
- self.failUnless(ch.get() == ('s','Hello World'), 'set octet string choice decoded incorrectly')
- ch.fromString('\x01\x01\xff')
- self.failUnless(ch.get() == ('b',1), 'set integer boolean decoded incorrectly')
-
-class PkixTestCase(unittest.TestCase):
- 'a set of tests to check codings of x509v3 objects'
-
- def confirmvalues(self, os, ns):
- for i in range( len(os) ):
- if os[i] != ns[i]:
- sys.stderr.write( '%i is faulty!\n' % i )
- sys.stderr.write( `os[i]`+'\n' )
- sys.stderr.write( `ns[i]`+'\n' )
- if isinstance(os[i], types.TupleType):
- self.confvalue(os[i], ns[i])
- else:
- print '%i is ok!' % i
-
- def validityTest(self):
- 'checking coding of validity object'
- v = POW.pkix.Validity()
- try:
- v.toString()
- self.fail('attempting to write this should have raised and exception')
- except:
- pass
- now = POW.pkix.time2gen(1031669280.1208529)
- v.set( (('generalTime', now),('generalTime', now)) )
- self.failUnless(v.toString() == '0"\x18\x0f20020910144800Z\x18\x0f20020910144800Z', 'set validity encoded incorrectly')
- v.fromString('0"\x18\x0f20020910144800Z\x18\x0f20020910144800Z')
- self.failUnless(v.get() == (('generalTime', now), ('generalTime', now)), 'set validity encoded incorrectly')
- self.failUnless(v.toString() == '0"\x18\x0f20020910144800Z\x18\x0f20020910144800Z', 'set validity encoded incorrectly')
-
- now = POW.pkix.time2utc(1031669280.1208529)
- v.set( (('utcTime', now),('utcTime', now)) )
- self.failUnless(v.toString() == '0\x1e\x17\r020910144800Z\x17\r020910144800Z', 'set validity encoded incorrectly')
- v.fromString('0\x1e\x17\r020910144800Z\x17\r020910144800Z')
- self.failUnless(v.get() == (('utcTime', now), ('utcTime', now)), 'set validity encoded incorrectly')
- self.failUnless(v.toString() == '0\x1e\x17\r020910144800Z\x17\r020910144800Z', 'set validity encoded incorrectly')
-
- def directoryStringTest(self):
- 'checking coding of directoryString object'
- d = POW.pkix.DirectoryString()
- try:
- d.toString()
- self.fail('attempting to write this should have raised and exception')
- except:
- pass
-
- d.set( ('teletexString', 'Hello World') )
- derval = '\x14\x0bHello World'
- self.failUnless(d.toString() == derval, 'set directoryString encoded incorrectly')
- d.fromString(derval)
- self.failUnless(d.toString() == derval, 'set directoryString encoded incorrectly')
- self.failUnless(d.get() == ('teletexString', 'Hello World'), 'set directoryString encoded incorrectly')
-
- d.set( ('printableString', 'Hello World') )
- derval = '\x13\x0bHello World'
- self.failUnless(d.toString() == derval, 'set directoryString encoded incorrectly')
- d.fromString(derval)
- self.failUnless(d.toString() == derval, 'set directoryString encoded incorrectly')
- self.failUnless(d.get() == ('printableString', 'Hello World'), 'set directoryString encoded incorrectly')
-
- d.set( ('universalString', 'Hello World') )
- derval = '\x1c\x0bHello World'
- self.failUnless(d.toString() == derval, 'set directoryString encoded incorrectly')
- d.fromString(derval)
- self.failUnless(d.toString() == derval, 'set directoryString encoded incorrectly')
- self.failUnless(d.get() == ('universalString', 'Hello World'), 'set directoryString encoded incorrectly')
-
- d.set( ('bmpString', 'Hello World') )
- derval = '\x1e\x0bHello World'
- self.failUnless(d.toString() == derval, 'set directoryString encoded incorrectly')
- d.fromString(derval)
- self.failUnless(d.toString() == derval, 'set directoryString encoded incorrectly')
- self.failUnless(d.get() == ('bmpString', 'Hello World'), 'set directoryString encoded incorrectly')
-
- d.set( ('utf8String', 'Hello World') )
- derval = '\x0c\x0bHello World'
- self.failUnless(d.toString() == derval, 'set directoryString encoded incorrectly')
- d.fromString(derval)
- self.failUnless(d.toString() == derval, 'set directoryString encoded incorrectly')
- self.failUnless(d.get() == ('utf8String', 'Hello World'), 'set directoryString encoded incorrectly')
-
- def attributeTypeAndValueTest(self):
- 'checking coding of attributeTypeAndValueTest object'
- av = POW.pkix.AttributeTypeAndValue()
- try:
- av.toString()
- self.fail('attempting to write this should have raised and exception')
- except:
- pass
- av.set( (o2i('commonName'), None ) )
- try:
- av.toString()
- self.fail('attempting to write this should have raised and exception')
- except:
- pass
- av.set( (o2i('commonName'), ('utf8String', None) ) )
- try:
- av.toString()
- self.fail('attempting to write this should have raised and exception')
- except:
- pass
-
- av.set( (o2i('commonName'), ('utf8String', u'Peter Shannon') ) )
- derval = '0\x14\x06\x03U\x04\x03\x0c\rPeter Shannon'
- self.failUnless(av.toString() == derval, 'set attributeTypeAndValue encoded incorrectly')
- av.fromString(derval)
- self.failUnless(av.toString() == derval, 'set attributeTypeAndValue encoded incorrectly')
- self.failUnless(av.get() == (o2i('commonName'), ('utf8String', u'Peter Shannon')), 'set attributeTypeAndValue encoded incorrectly')
-
-
- def x509v2Test(self):
- 'checking coding of x509v2 object'
- cipher = ciphers.getCipher('client')
- rsa = cipher[1]
-
- old = POW.pkix.Certificate()
- old.setVersion(1)
- old.setSerial(5)
-
- name = ( (( o2i('countryName'), ('printableString', 'GB') ),),
- (( o2i('stateOrProvinceName'), ('printableString', 'Hertfordshire') ),),
- (( o2i('organizationName'), ('printableString', 'The House') ),),
- (( o2i('commonName'), ('printableString', 'Client') ),) )
-
- old.setIssuer(name)
- old.setSubject(name)
-
- now = ('generalTime', POW.pkix.time2gen( time.time() ) )
- then = ('generalTime', POW.pkix.time2gen(time.time() + 60*60*24*365*12) )
- old.setNotBefore(now)
- old.setNotAfter(then)
- old.setIssuerUniqueID((1,0,1,0))
- old.setSubjectUniqueID((1,0,0,1))
- old.sign(rsa, POW.MD5_DIGEST)
-
- new = POW.pkix.Certificate()
- new.fromString( old.toString() )
- self.failUnless( new.getVersion() == 1, 'version was not presereved correctly')
- self.failUnless( new.getSerial() == 5, 'serial was not presereved correctly')
- self.failUnless( new.getNotBefore() == now, 'notBefore was not presereved correctly')
- self.failUnless( new.getNotAfter() == then, 'notAfter was not presereved correctly')
- self.failUnless( new.getIssuer() == name, 'issuerName was not presereved correctly')
- self.failUnless( new.getSubject() == name, 'subjectName was not presereved correctly')
- self.failUnless( new.getIssuerUniqueID() == (1,0,1,0), 'issuerUniqueId was not presereved correctly')
- self.failUnless( new.getSubjectUniqueID() == (1,0,0,1), 'subjectUniqueId was not presereved correctly')
- self.failUnless( new.verify(rsa), 'signed text was not verified')
-
-# os = old.get()
-# ns = new.get()
-# self.confirmvalues(os,ns)
-
-
- def x509v3Test(self):
- 'checking coding of x509v3 object'
-
- now = POW.pkix.time2gen( time.time() )
- then = POW.pkix.time2gen(time.time() + 60*60*24*365*12)
- cipher = ciphers.getCipher('client')
- rsa = cipher[1]
-
- policy = (
- ( o2i('id-cti-ets-proofOfReceipt'), (
- (o2i('cps'), ('cPSuri', 'http://www.p-s.org.uk/policies/policy1')),
- (o2i('unotice'), ('userNotice', ((('visibleString', 'The House'),(1,2,3)), ('visibleString', 'We guarentee nothing')) )),
- )),
- ( o2i('id-cti-ets-proofOfOrigin'), (
- (o2i('cps'), ('cPSuri', 'http://www.p-s.org.uk/policies/policy2')),
- ))
- )
-
- n1 = ('directoryName', ( (( o2i('countryName'), ('printableString', 'UK') ),),
- (( o2i('stateOrProvinceName'), ('printableString', 'Herts') ),),
- (( o2i('organizationName'), ('printableString', 'The House') ),),
- (( o2i('commonName'), ('printableString', 'Shannon Works') ),) ) )
-
- n2 = ('rfc822Name', 'peter_shannon@yahoo.com')
- n3 = ('uri', 'http://www.p-s.org.uk')
- n4 = ('iPAddress', POW.pkix.ip42oct(192,168,100,51))
-
- points = ( ( ('fullName',(n1, n4)), (1,1,1,1,1), (n1,) ), )
-
- authdigest = POW.Digest( POW.SHA1_DIGEST )
- authdigest.update(rsa.derWrite(POW.RSA_PUBLIC_KEY))
- keyHash = authdigest.digest()
-
- myExtensions = (
- ( o2i('privateKeyUsagePeriod'),0, (now, then)),
- ( o2i('keyUsage'),0, (1,1)),
- ( o2i('basicConstraints'),0, (0,None)),
- ( o2i('subjectKeyIdentifier'),0, keyHash),
- ( o2i('certificatePolicies'),0, policy ),
- ( o2i('subjectAltName'),0, (n2,)),
- ( o2i('issuerAltName'),0, (n1,n2,n3,n4)),
- ( o2i('authorityKeyIdentifier'),0, (keyHash, (), None) ),
- ( o2i('cRLDistributionPoints'),0, points ),
- )
-
- old = POW.pkix.Certificate()
- old.setVersion(2)
- old.setSerial(5)
-
- name = (
- (( o2i('commonName'), ('printableString', 'Peter Shannon') ),),
- )
-
- old.setIssuer(name)
- old.setSubject(name)
-
- old.setNotBefore( ('generalTime', now) )
- old.setNotAfter( ( 'generalTime', then) )
-
- old.setExtensions( myExtensions )
- old.sign(rsa, POW.MD5_DIGEST)
-
- new = POW.pkix.Certificate()
- new.fromString( old.toString() )
-
- extns = new.getExtensions()
-
-# ns = new.getExtensions()
-# self.confirmvalues(myExtensions,ns)
-
- self.failUnless( new.getVersion() == 2, 'version was not presereved correctly')
- self.failUnless( new.getSerial() == 5, 'serial was not presereved correctly')
- self.failUnless( new.getIssuer() == name, 'issuerName was not presereved correctly')
- self.failUnless( new.getSubject() == name, 'subjectName was not presereved correctly')
- self.failUnless( new.getNotBefore()[1] == now, 'notBefore was not presereved correctly')
- self.failUnless( new.getNotAfter()[1] == then, 'notAfter was not presereved correctly')
- self.failUnless( new.getExtensions() == myExtensions, 'extensions were not presereved correctly')
- self.failUnless( new.verify(rsa), 'signed text was not verified')
-
- def basicConstraintsTest(self):
- 'checking coding of basicConstraints'
- for val in [(0,0),(0,None), (1,None), (0,1),(0,2),(1,0),(1,1),(1,2)]:
- self.failUnless( checkValue(POW.pkix.BasicConstraints, val), '%s was not presereved correctly' % `val`)
-
- def generalNameTest(self):
- 'checking coding of subjectAltName'
- values = [
- (('directoryName', ( (( o2i('countryName'), ('printableString', 'UK') ),),
- (( o2i('stateOrProvinceName'), ('printableString', 'Herts') ),),
- (( o2i('organizationName'), ('printableString', 'The House') ),),
- (( o2i('commonName'), ('printableString', 'Shannon Works') ),), )
- ),),
- (('rfc822Name', 'peter_shannon@yahoo.com'),),
- (('uri', 'http://www.p-s.org.uk'),),
- (('iPAddress', POW.pkix.ip42oct(192,168,100,51)),),
- (('registeredId', o2i('countryName')),),
- (),
- ]
- for val in values:
- self.failUnless( checkValue(POW.pkix.GeneralNames, val), '%s was not presereved correctly' % `val`)
-
- def crlv1Test(self):
- 'checking coding of CRLv1 object'
- now = POW.pkix.time2gen( time.time() )
- then = POW.pkix.time2gen(time.time() + 60*60*24*365*12)
- cipher = ciphers.getCipher('client')
- rsa = cipher[1]
-
- old = POW.pkix.CertificateList()
- old.setThisUpdate( ('generalTime', now ) )
-
- name = ( (( o2i('countryName'), ('printableString', 'GB') ),),
- (( o2i('stateOrProvinceName'), ('printableString', 'Hertfordshire') ),),
- (( o2i('organizationName'), ('printableString', 'The House') ),),
- (( o2i('commonName'), ('printableString', 'Client') ),) )
-
- myRevocations = (
- (1, ('generalTime', now), ()),
- (2, ('generalTime', now), ()),
- (3, ('generalTime', now), (( o2i('cRLReason'), 0, 1),))
- )
-
- old.setIssuer(name)
- old.setRevokedCertificates( myRevocations )
-
- old.sign(rsa, POW.MD5_DIGEST)
-
- new = POW.pkix.CertificateList()
- new.fromString( old.toString() )
- self.failUnless( new.getVersion() == None, 'version was not presereved correctly')
- self.failUnless( new.getThisUpdate()[1] == now, 'thisUpdate was not presereved correctly')
- self.failUnless( new.getIssuer() == name, 'issuerName was not presereved correctly')
- self.failUnless( new.getRevokedCertificates() == myRevocations, 'revokedCerticates was not presereved correctly')
- self.failUnless( new.verify(rsa), 'signed envelope was not presereved correctly')
-
-
-class ExtensionsTestCase(unittest.TestCase):
- 'Extentions Tests'
-
- def extensionManipulationTest(self):
- 'Extensions manipulation for X509 object tests'
- sc = certs.getCert('server')
- basic = POW.pkix.BasicConstraints()
- basic.set([1,5])
- sc.addExtension( 'basicConstraints', 0, basic.toString() )
- sc.addExtension( 'basicConstraints', 0, basic.toString() )
- sc.addExtension( 'basicConstraints', 0, basic.toString() )
- self.failUnless( sc.countExtensions() == 3, 'cert should have 3 any extensions')
- sc.clearExtensions()
- self.failUnless( sc.countExtensions() == 0, 'cert should not have any extensions')
- sc.addExtension( 'basicConstraints', 0, basic.toString() )
- basic.set([0,1])
- sc.addExtension( 'basicConstraints', 0, basic.toString() )
- basic = POW.pkix.BasicConstraints()
- basic.fromString( sc.getExtension(1)[2] )
- self.failUnless( basic.get() == (0,1), 'incorrect extension handling ')
-
- def basicConstraintTest(self):
- 'Basic constraints tests'
- serverCert = certs.getCert('server')
- basic = POW.pkix.BasicConstraints()
- basic.set([1,5])
- serverCert.addExtension( 'basicConstraints', 0, basic.toString() )
- basic = POW.pkix.BasicConstraints()
- basic.fromString( serverCert.getExtension(0)[2] )
- values = basic.get()
- self.failUnless( values[0] == 1, 'ca value should be true')
- self.failUnless( values[1] == 5, 'pathlen values should be 5')
-
- def privateKeyUsagePeriodTest(self):
- 'Private key usage period tests'
- serverCert = certs.getCert('server')
- period = POW.pkix.PrivateKeyUsagePeriod()
- t1 = POW.pkix.time2gen( time.time() )
- t2 = POW.pkix.time2gen(time.time() + 60*60*24*365 )
- period.set([t1,t2])
- serverCert.addExtension( 'privateKeyUsagePeriod', 0, period.toString() )
- period = POW.pkix.PrivateKeyUsagePeriod()
- period.fromString( serverCert.getExtension(0)[2] )
- values = period.get()
- self.failUnless( values == (t1,t2), 'private key usage period is incorrect')
-
- def keyUsageTest(self):
- 'privateKeyUsage tests'
- serverCert = certs.getCert('server')
- usage = POW.pkix.KeyUsage()
- usage.set([1,1])
- serverCert.addExtension( 'keyUsage', 0, usage.toString() )
- usage = POW.pkix.KeyUsage()
- usage.fromString( serverCert.getExtension(0)[2] )
- values = usage.get()
- self.failUnless( values == (1,1), 'bit pattern is incorrect')
-
- def issuerAltNameTest(self):
- 'Issuer Alt Name tests'
- n1 = ('directoryName', ( (( o2i('countryName'), ('printableString', 'UK') ),),
- (( o2i('stateOrProvinceName'), ('printableString', 'Herts') ),),
- (( o2i('organizationName'), ('printableString', 'The House') ),),
- (( o2i('commonName'), ('printableString', 'Shannon Works') ),) ) )
-
- n2 = ('rfc822Name', 'peter_shannon@yahoo.com')
- n3 = ('uri', 'http://www.p-s.org.uk')
- n4 = ('iPAddress', POW.pkix.ip42oct(192,168,100,51))
-
- serverCert = certs.getCert('server')
- issuer = POW.pkix.IssuerAltName()
- issuer.set([n1,n2,n3,n4])
- serverCert.addExtension( 'issuerAltName', 0, issuer.toString() )
- issuer = POW.pkix.IssuerAltName()
- issuer.fromString( serverCert.getExtension(0)[2] )
- values = issuer.get()
- self.failUnless( values == (n1,n2,n3,n4), 'generalNames are incorrect')
-
- def subjectAltNameTest(self):
- 'Subject Alt Name tests'
- n1 = ('directoryName', ( (( o2i('countryName'), ('printableString', 'UK') ),),
- (( o2i('stateOrProvinceName'), ('printableString', 'Herts') ),),
- (( o2i('organizationName'), ('printableString', 'The House') ),),
- (( o2i('commonName'), ('printableString', 'Shannon Works') ),) ) )
-
- n2 = ('rfc822Name', 'peter_shannon@yahoo.com')
- n3 = ('uri', 'http://www.p-s.org.uk')
- n4 = ('iPAddress', POW.pkix.ip42oct(192,168,100,51))
-
- serverCert = certs.getCert('server')
- subject = POW.pkix.SubjectAltName()
- subject.set([n1,n2,n3,n4])
- serverCert.addExtension( 'subjectAltName', 0, subject.toString() )
- subject = POW.pkix.SubjectAltName()
- subject.fromString( serverCert.getExtension(0)[2] )
- values = subject.get()
- self.failUnless( values == (n1,n2,n3,n4), 'generalNames are incorrect')
-
-
- def certPolicyTest(self):
- 'Certificate Policies tests'
- policies=(
- ( o2i('id-cti-ets-proofOfReceipt'), (
- (o2i('cps'), ('cPSuri', 'http://www.p-s.org.uk/policies/ps1')),
- (o2i('unotice'), ('userNotice', ((('visibleString', 'The House'),(1,2,3)), ('visibleString', 'We guarentee nothing')) )),
- )),
- ( o2i('id-cti-ets-proofOfOrigin'), (
- (o2i('cps'), ('cPSuri', 'http://www.p-s.org.uk/policies/p2')),
- ))
- )
-
- serverCert = certs.getCert('server')
- policy = POW.pkix.CertificatePolicies()
- policy.set(policies)
- serverCert.addExtension( 'certificatePolicies', 0, policy.toString() )
- policy = POW.pkix.CertificatePolicies()
- policy.fromString( serverCert.getExtension(0)[2] )
- values = policy.get()
- self.failUnless( values == policies, 'policies are incorrect')
-
-
-
-#--------------- Hash test case ---------------#
-
-class HashTestCase(unittest.TestCase):
- 'Hash algorithm tests'
-
- plainText = 'My extremely silly pass phrase!'
-
- def _symmetricGeneralTest(self, type, expected=None):
- digest = POW.Digest( type )
- digest.update( self.plainText )
- b64Text = base64.encodestring( digest.digest() )
- self.failUnlessEqual( b64Text, expected, 'Digest result incorrect' )
-
- def testMd2(self):
- 'Generate and check MD2 hash'
- self._symmetricGeneralTest( POW.MD2_DIGEST, 'O9VUpKqYAHkCgPyAkclL8g==\n' )
-
- def testMd5(self):
- 'Generate and check MD5 hash'
- self._symmetricGeneralTest( POW.MD5_DIGEST, 'kzb1VPPjrYNNA0gwsoKsQw==\n' )
-
- def testSha(self):
- 'Generate and check SHA hash'
- self._symmetricGeneralTest( POW.SHA_DIGEST, 'ptkIj1ilu9oFTFbP3A6o3KuJL+Q=\n')
-
- def testSha1(self):
- 'Generate and check SHA1 hash'
- self._symmetricGeneralTest( POW.SHA1_DIGEST, '7zk06ujVcAWhzREYzY4s4lCw4WQ=\n' )
-
- def testRipemd160(self):
- 'Generate and check RIPEMD160 hash'
- self._symmetricGeneralTest( POW.RIPEMD160_DIGEST, 'R+ve9PdUxqr45duMhG8CBQiahkU=\n' )
-
-#--------------- Hash test case ---------------#
-#--------------- Hmac test case ---------------#
-
-class HmacTestCase(unittest.TestCase):
- 'HMAC algorithm tests'
-
- plainText = 'My extremely silly pass phrase!'
- password = 'Puny pass word'
-
- def _symmetricGeneralTest(self, type, expected=None):
- hmac = POW.Hmac( type, self.password )
- hmac.update( self.plainText )
- b64Text = base64.encodestring( hmac.mac() )
- self.failUnlessEqual( b64Text, expected, 'HMAC result incorrect' )
-
- def testHmacMd2(self):
- 'Generate and check MD2 HMAC'
- self._symmetricGeneralTest( POW.MD2_DIGEST, 'UgWmfru6kM68GFn3HMmbeg==\n' )
-
- def testHmacMd5(self):
- 'Generate and check MD5 HMAC'
- self._symmetricGeneralTest( POW.MD5_DIGEST, '+l1oP2UbL0dW7L51lw2LSg==\n' )
-
- def testHmacSha(self):
- 'Generate and check SHA HMAC'
- self._symmetricGeneralTest( POW.SHA_DIGEST, 'xuLEZcpj96p2Uo0/Ief1zjUdJdM=\n')
-
- def testHmacSha1(self):
- 'Generate and check SHA1 HMAC'
- self._symmetricGeneralTest( POW.SHA1_DIGEST, 'nnT7qPYMHjJ46JXQWmR/Ap0XK2E=\n' )
-
- def testHmacRipemd160(self):
- 'Generate and check RIPEMD160 HMAC'
- self._symmetricGeneralTest( POW.RIPEMD160_DIGEST, 'AeSjVffp5FPIBBtabpD/nwVDz/s=\n' )
-
-#--------------- Hmac test case ---------------#
-#--------------- Symmetric cipher test case ---------------#
-
-class SymmetricTestCase(unittest.TestCase):
- 'Symmetric algorithm tests'
-
- password = 'Hello :)'
-
- plainText = '''
-# Basic system aliases that MUST be present.
-postmaster: root
-mailer-daemon: postmaster
-
-# amavis
-virusalert: root
-
-# General redirections for pseudo accounts in /etc/passwd.
-administrator: root
-daemon: root
-lp: root
-news: root
-uucp: root
-games: root
-man: root
-at: root
-postgres: root
-mdom: root
-amanda: root
-ftp: root
-wwwrun: root
-squid: root
-msql: root
-gnats: root
-nobody: root
-'''
-
- plainText = 'Hello World'
-
- def _symmetricGeneralTest(self, type):
- symmetric = POW.Symmetric( type )
- symmetric.encryptInit( self.password )
- cipherText = symmetric.update( self.plainText ) + symmetric.final()
- symmetric.decryptInit( self.password )
- decipheredText = symmetric.update( cipherText ) + symmetric.final()
- self.failUnlessEqual( self.plainText, decipheredText, 'decrypted cipher text not equal to original text' )
-
- def testDES_ECB(self):
- 'Generate and check DES_ECB encrypted text'
- self._symmetricGeneralTest( POW.DES_ECB )
-
- def testDES_EDE(self):
- 'Generate and check DES_EDE encrypted text'
- self._symmetricGeneralTest( POW.DES_EDE )
-
- def testDES_EDE3(self):
- 'Generate and check DES_EDE3 encrypted text'
- self._symmetricGeneralTest( POW.DES_EDE3 )
-
- def testDES_CFB(self):
- 'Generate and check DES_CFB encrypted text'
- self._symmetricGeneralTest( POW.DES_ECB )
-
- def testDES_EDE_CFB(self):
- 'Generate and check DES_EDE_CFB encrypted text'
- self._symmetricGeneralTest( POW.DES_EDE_CFB )
-
- def testDES_EDE3_CFB(self):
- 'Generate and check DES_EDE3_CFB encrypted text'
- self._symmetricGeneralTest( POW.DES_EDE3_CFB )
-
- def testDES_OFB(self):
- 'Generate and check DES_OFB encrypted text'
- self._symmetricGeneralTest( POW.DES_OFB )
-
- def testDES_EDE_OFB(self):
- 'Generate and check DES_EDE_OFB encrypted text'
- self._symmetricGeneralTest( POW.DES_EDE_OFB )
-
- def testDES_EDE3_OFB(self):
- 'Generate and check DES_EDE3_OFB encrypted text'
- self._symmetricGeneralTest( POW.DES_EDE3_OFB )
-
- def testDES_CBC(self):
- 'Generate and check DES_CBC encrypted text'
- self._symmetricGeneralTest( POW.DES_CBC )
-
- def testDES_EDE_CBC(self):
- 'Generate and check DES_EDE_CBC encrypted text'
- self._symmetricGeneralTest( POW.DES_EDE_CBC )
-
- def testDES_EDE3_CBC(self):
- 'Generate and check DES_EDE3_CBC encrypted text'
- self._symmetricGeneralTest( POW.DES_EDE3_CBC )
-
- def testDESX_CBC(self):
- 'Generate and check DESX_CBC encrypted text'
- self._symmetricGeneralTest( POW.DESX_CBC )
-
- def testRC4(self):
- 'Generate and check RC4 encrypted text'
- self._symmetricGeneralTest( POW.RC4 )
-
- def testRC4_40(self):
- 'Generate and check RC4_40 encrypted text'
- self._symmetricGeneralTest( POW.DES_EDE3_CBC )
-
- def testIDEA_ECB(self):
- 'Generate and check IDEA_ECB encrypted text'
- self._symmetricGeneralTest( POW.IDEA_ECB )
-
- def testIDEA_CFB(self):
- 'Generate and check IDEA_CFB encrypted text'
- self._symmetricGeneralTest( POW.IDEA_CFB )
-
- def testIDEA_OFB(self):
- 'Generate and check IDEA_OFB encrypted text'
- self._symmetricGeneralTest( POW.IDEA_OFB )
-
- def testIDEA_CBC(self):
- 'Generate and check IDEA_CBC encrypted text'
- self._symmetricGeneralTest( POW.IDEA_CBC )
-
- def testRC2_ECB(self):
- 'Generate and check RC2_ECB encrypted text'
- self._symmetricGeneralTest( POW.RC2_ECB )
-
- def testRC2_CBC(self):
- 'Generate and check RC2_CBC encrypted text'
- self._symmetricGeneralTest( POW.RC2_CBC )
-
- def testRC2_40_CBC(self):
- 'Generate and check RC2_40_CBC encrypted text'
- self._symmetricGeneralTest( POW.RC2_40_CBC )
-
- def testRC2_CFB(self):
- 'Generate and check RC2_CFB encrypted text'
- self._symmetricGeneralTest( POW.RC2_CFB )
-
- def testRC2_OFB(self):
- 'Generate and check RC2_OFB encrypted text'
- self._symmetricGeneralTest( POW.RC2_OFB )
-
- def testBF_ECB(self):
- 'Generate and check BF_ECB encrypted text'
- self._symmetricGeneralTest( POW.BF_ECB )
-
- def testBF_CBC(self):
- 'Generate and check BF_CBC encrypted text'
- self._symmetricGeneralTest( POW.BF_CBC )
-
- def testBF_CFB(self):
- 'Generate and check BF_CFB encrypted text'
- self._symmetricGeneralTest( POW.BF_CFB )
-
- def testBF_OFB(self):
- 'Generate and check BF_OFB encrypted text'
- self._symmetricGeneralTest( POW.BF_OFB )
-
- def testCAST5_ECB(self):
- 'Generate and check CAST5_ECB encrypted text'
- self._symmetricGeneralTest( POW.CAST5_ECB )
-
- def testCAST5_CBC(self):
- 'Generate and check CAST5_CBC encrypted text'
- self._symmetricGeneralTest( POW.CAST5_CBC )
-
- def testCAST5_CFB(self):
- 'Generate and check CAST5_CFB encrypted text'
- self._symmetricGeneralTest( POW.CAST5_CFB )
-
- def testCAST5_OFB(self):
- 'Generate and check CAST5_OFB encrypted text'
- self._symmetricGeneralTest( POW.CAST5_OFB )
-
- def testRC5_32_12_16_CBC(self):
- 'Generate and check CAST5_OFB encrypted text'
- self._symmetricGeneralTest( POW.CAST5_OFB )
-
- def testRC5_32_12_16_CFB(self):
- 'Generate and check CAST5_OFB encrypted text'
- self._symmetricGeneralTest( POW.CAST5_OFB )
-
- def testRC5_32_12_16_ECB(self):
- 'Generate and check CAST5_OFB encrypted text'
- self._symmetricGeneralTest( POW.CAST5_OFB )
-
- def testRC5_32_12_16_OFB(self):
- 'Generate and check CAST5_OFB encrypted text'
- self._symmetricGeneralTest( POW.CAST5_OFB )
-
-#--------------- Symmetric cipher test case ---------------#
-#--------------- Asymmetric cipher test case ---------------#
-
-class AsymmetricUtilities:
-
- keys = { 'client' : { 'priv' : 'working/key1Priv', 'pub' : 'working/key1Pub' },
- 'server' : { 'priv' : 'working/key2Priv', 'pub' : 'working/key2Pub' },
- 'ca' : { 'priv' : 'working/key3Priv', 'pub' : 'working/key3Pub' },
- 'ca2' : { 'priv' : 'working/key4Priv', 'pub' : 'working/key4Pub' },
- 'ca3' : { 'priv' : 'working/key5Priv', 'pub' : 'working/key5Pub' },
- 'server2': { 'priv' : 'working/key6Priv', 'pub' : 'working/key6Pub' } }
-
- password = 'Silly password'
-
- def prepCiphers(self):
- for entity in self.keys.keys():
- self.makeCipher(entity)
-
- def unPrepCiphers(self):
- for entity in self.keys.keys():
- self.remCipher(entity)
-
- def getCipher(self, entry):
- privFile = open( self.keys[entry]['priv'] )
- pubFile = open( self.keys[entry]['pub'] )
- priv = POW.pemRead( POW.RSA_PRIVATE_KEY,privFile.read(), self.password )
- pub = POW.pemRead( POW.RSA_PUBLIC_KEY, pubFile.read() )
- privFile.close()
- pubFile.close()
- return (pub, priv)
-
- def makeCipher(self, entry):
- cipher = POW.Asymmetric()
- privFile = open( self.keys[entry]['priv'], 'w' )
- pubFile = open( self.keys[entry]['pub'], 'w' )
- privFile.write( cipher.pemWrite( POW.RSA_PRIVATE_KEY, POW.DES_EDE3_CFB, self.password ) )
- pubFile.write( cipher.pemWrite( POW.RSA_PUBLIC_KEY ) )
- privFile.close()
- pubFile.close()
-
- def remCipher(self, entry):
- try: os.remove( self.keys[entry]['priv'] )
- except: pass
- try: os.remove( self.keys[entry]['pub'] )
- except: pass
-
-class AsymmetricTestCase(unittest.TestCase):
- 'Asymmetric algorithm tests'
-
- plainText = 'A little text to encrypt!'
-
- def testPemIo(self):
- 'Read and write ciphers in PEM format'
- cipher = ciphers.getCipher('client')
- public = cipher[0]
- private = cipher[1]
- pub = public.pemWrite( POW.RSA_PUBLIC_KEY )
- public2 = POW.pemRead( POW.RSA_PUBLIC_KEY, pub )
- priv = private.pemWrite( POW.RSA_PRIVATE_KEY )
- private2 = POW.pemRead( POW.RSA_PRIVATE_KEY, priv )
- priv = private.pemWrite( POW.RSA_PRIVATE_KEY, POW.DES_EDE3_CFB, 'password' )
- private2 = POW.pemRead( POW.RSA_PRIVATE_KEY, priv, 'password' )
- cipherText = public2.publicEncrypt( self.plainText )
- deCiphered = private2.privateDecrypt( cipherText )
- self.failUnlessEqual( self.plainText, deCiphered )
-
- def testDerIo(self):
- 'Read and write ciphers in DER format'
- cipher = ciphers.getCipher('client')
- publicKey = cipher[0]
- privateKey = cipher[1]
- pubDer = publicKey.derWrite( POW.RSA_PUBLIC_KEY )
- publicKey2 = POW.derRead( POW.RSA_PUBLIC_KEY, pubDer )
- privDer = privateKey.derWrite( POW.RSA_PRIVATE_KEY )
- privateKey2 = POW.derRead( POW.RSA_PRIVATE_KEY, privDer)
- cipherText = publicKey.publicEncrypt( self.plainText )
- deCiphered = privateKey.privateDecrypt( cipherText )
- self.failUnlessEqual( self.plainText, deCiphered )
-
- def testPublicEncrypt(self):
- 'Encrypt text using public RSA cipher, decrypt and compare'
- cipher = ciphers.getCipher('client')
- public = cipher[0]
- private = cipher[1]
- cipherText = public.publicEncrypt( self.plainText )
- deCiphered = private.privateDecrypt( cipherText )
- self.failUnlessEqual( self.plainText, deCiphered )
-
- def testPrivateEncrypt(self):
- 'Encrypt text using private RSA cipher, decrypt and compare'
- cipher = ciphers.getCipher('client')
- public = cipher[0]
- private = cipher[1]
- cipherText = private.privateEncrypt( self.plainText )
- deCiphered = public.publicDecrypt( cipherText )
- self.failUnlessEqual( self.plainText, deCiphered )
-
- def testSign(self):
- 'Sign text using private RSA cipher and verify'
- cipher = ciphers.getCipher('client')
- public = cipher[0]
- private = cipher[1]
- digest = POW.Digest( POW.SHA1_DIGEST )
- digest.update( self.plainText )
- signedText = private.sign( digest.digest(), POW.SHA1_DIGEST )
- self.failUnless( public.verify( signedText, digest.digest(), POW.SHA1_DIGEST ) )
-
-#--------------- Asymmetric cipher test case ---------------#
-#--------------- X509 test case ---------------#
-
-class X509Utilities:
-
- certs = { 'client' : 'working/cert1',
- 'server' : 'working/cert2',
- 'ca' : 'working/cert3',
- 'ca2' : 'working/cert4',
- 'ca3' : 'working/cert5',
- 'server2': 'working/cert6' }
-
- clientName = ( ('C', 'GB'), ('ST', 'Hertfordshire'),
- ('O', 'The House'), ('CN', 'Client') )
-
- serverName = ( ('C', 'GB'), ('ST', 'Hertfordshire'),
- ('O', 'The House'), ('CN', 'Server') )
-
- caName = ( ('C', 'GB'), ('ST', 'Hertfordshire'),
- ('O', 'The House'), ('CN', 'CA') )
-
- ca2Name = ( ('C', 'GB'), ('ST', 'Hertfordshire'),
- ('O', 'The House'), ('CN', 'CA2') )
-
- ca3Name = ( ('C', 'GB'), ('ST', 'Hertfordshire'),
- ('O', 'The House'), ('CN', 'CA3') )
-
- server2Name = ( ('C', 'GB'), ('ST', 'Hertfordshire'),
- ('O', 'The House'), ('CN', 'server2') )
-
- notBefore = POW.pkix.time2utc(1005960447)
- notAfter = POW.pkix.time2utc(1037496447)
-
- caSerial = 0
- serverSerial = 1
- clientSerial = 2
- ca2Serial = 3
- ca3Serial = 4
- server2Serial = 5
-
- def __init__(self):
- self.asymUtils = AsymmetricUtilities()
- self.asymUtils.prepCiphers()
-
- def prepCerts(self):
- for cert in self.certs.keys():
- self.makeCert(cert)
-
- def unPrepCerts(self):
- self.asymUtils.unPrepCiphers()
- for cert in self.certs.keys():
- self.remCert(cert)
-
- def getCert(self, entry):
- certFile = open( self.certs[entry] )
- cert = POW.pemRead( POW.X509_CERTIFICATE, certFile.read() )
- certFile.close()
- return cert
-
- def makeCert(self, entry):
- caCipher = self.asymUtils.getCipher('ca')
- ca2Cipher = self.asymUtils.getCipher('ca2')
- ca3Cipher = self.asymUtils.getCipher('ca3')
- cert = POW.X509()
- #cert.setVersion(2)
-
- if entry == 'server':
- serverCipher = self.asymUtils.getCipher('server')
- cert.setIssuer( self.caName )
- cert.setSubject( self.serverName )
- cert.setSerial( self.serverSerial )
- cert.setNotBefore( self.notBefore )
- cert.setNotAfter( self.notAfter )
- cert.setPublicKey( serverCipher[1] )
- cert.sign( caCipher[1] )
-
- elif entry == 'client':
- clientCipher = self.asymUtils.getCipher('client')
- cert.setIssuer( self.caName )
- cert.setSubject( self.clientName )
- cert.setSerial( self.clientSerial )
- cert.setNotBefore( self.notBefore )
- cert.setNotAfter( self.notAfter )
- cert.setPublicKey( clientCipher[0] )
- cert.sign( caCipher[1] )
-
- elif entry == 'ca':
- cert.setIssuer( self.caName )
- cert.setSubject( self.caName )
- cert.setSerial( self.caSerial )
- cert.setNotBefore( self.notBefore )
- cert.setNotAfter( self.notAfter )
- cert.setPublicKey( caCipher[0] )
- cert.sign( caCipher[1] )
-
- elif entry == 'ca2':
- cert.setIssuer( self.caName )
- cert.setSubject( self.ca2Name )
- cert.setSerial( self.ca2Serial )
- cert.setNotBefore( self.notBefore )
- cert.setNotAfter( self.notAfter )
- cert.setPublicKey( ca2Cipher[0] )
- cert.sign( caCipher[1] )
-
- elif entry == 'ca3':
- cert.setIssuer( self.ca2Name )
- cert.setSubject( self.ca3Name )
- cert.setSerial( self.ca3Serial )
- cert.setNotBefore( self.notBefore )
- cert.setNotAfter( self.notAfter )
- cert.setPublicKey( ca3Cipher[0] )
- cert.sign( ca2Cipher[1] )
-
- elif entry == 'server2':
- server2Cipher = self.asymUtils.getCipher('server2')
- cert.setIssuer( self.ca3Name )
- cert.setSubject( self.server2Name )
- cert.setSerial( self.server2Serial )
- cert.setNotBefore( self.notBefore )
- cert.setNotAfter( self.notAfter )
- cert.setPublicKey( server2Cipher[0] )
- cert.sign( ca3Cipher[1] )
-
- else:
- raise Exception, 'Entry should be ca, ca2, server, server2 or client!'
-
- certFile = open( self.certs[entry], 'w' )
- certFile.write( cert.pemWrite() )
- certFile.close()
-
- def remCert(self, entry):
- try: os.remove( self.certs[entry] )
- except: pass
-
-class X509TestCase(unittest.TestCase):
- 'X509 tests'
-
- def testPemIo(self):
- 'Read and write certificate in PEM format'
- serverCert = certs.getCert('server')
- cert = serverCert.pemWrite()
- cert2 = POW.pemRead( POW.X509_CERTIFICATE, cert )
- serverCert.getIssuer()
-
- def testDerIo(self):
- 'Read and write certificate in DER format'
- serverCert = certs.getCert('server')
- cert = serverCert.derWrite()
- cert2 = POW.derRead( POW.X509_CERTIFICATE, cert )
- serverCert.getIssuer()
-
- def testIssuer(self):
- 'Check the issuer is correct for server cerficate'
- serverCert = certs.getCert('server')
- self.failUnlessEqual( certs.caName, serverCert.getIssuer() )
-
- def testSubject(self):
- 'Check the subject is correct for server cerficate'
- serverCert = certs.getCert('server')
- self.failUnlessEqual( certs.serverName, serverCert.getSubject() )
-
- def testVersion(self):
- 'Check version number is correct for server cerficate'
- serverCert = certs.getCert('server')
- self.failUnlessEqual( 1, serverCert.getSerial() )
-
- def testSerial(self):
- 'Check serial number is correct for server cerficate'
- serverCert = certs.getCert('server')
- self.failUnlessEqual( certs.serverSerial, serverCert.getSerial() )
-
- def testNotBefore(self):
- 'Check notBefore date is correct for server cerficate'
- serverCert = certs.getCert('server')
- self.failUnlessEqual( certs.notBefore, serverCert.getNotBefore() )
-
- def testNotAfter(self):
- 'Check notAfter date is correct for server cerficate'
- serverCert = certs.getCert('server')
- self.failUnlessEqual( certs.notAfter, serverCert.getNotAfter() )
-
-#--------------- X509 test case ---------------#
-#--------------- X509 Store test case ---------------#
-
-class X509StoreTestCase(unittest.TestCase):
- 'X509 Store tests'
-
- def testVerify(self):
- 'Verify server\'s certificate againtst CA certificate'
- caCert = certs.getCert('ca')
- serverCert = certs.getCert('server')
-
- store = POW.X509Store()
- store.addTrust( caCert )
- self.failUnless( store.verify( serverCert ) )
-
- def testVerifyChain(self):
- 'Verify chain of certificate againtst CA certificate'
- caCert = certs.getCert('ca')
- ca2Cert = certs.getCert('ca2')
- ca3Cert = certs.getCert('ca3')
- server2Cert = certs.getCert('server2')
-
- store = POW.X509Store()
- store.addTrust( caCert )
- self.failUnless( store.verifyChain( server2Cert, [ca3Cert, ca2Cert ]) )
-
-
-#--------------- X509 Store test case ---------------#
-#--------------- X509 Revoked test case ---------------#
-
-class X509RevokedTestCase(unittest.TestCase):
- 'X509 Store tests'
-
- serial = 7
- revokedOn = POW.pkix.time2utc(1005960447)
-
- def testRevoked(self):
- 'Create X509 revocation and check values are correct'
- rev = POW.X509Revoked( self.serial, self.revokedOn )
- self.failUnlessEqual( rev.getDate(), self.revokedOn )
- self.failUnlessEqual( rev.getSerial(), self.serial )
-
-#--------------- X509 Revoked test case ---------------#
-#--------------- X509 CRL test case ---------------#
-
-class X509CrlTestCase(unittest.TestCase):
- 'X509 CRL tests'
-
- revocationData = ( ( 1, POW.pkix.time2utc(1005960447) ),
- ( 2, POW.pkix.time2utc(1005960448) ),
- ( 3, POW.pkix.time2utc(1005960449) ),
- ( 4, POW.pkix.time2utc(1005960450) ),
- ( 5, POW.pkix.time2utc(1005960451) ) )
-
- thisUpdate = POW.pkix.time2utc(1005960447)
- nextUpdate = POW.pkix.time2utc(1037496447)
-
- version = 2
-
- def setUp(self):
- self.ca = certs.getCert('ca')
- self.caCipher = ciphers.getCipher('ca')
-
- revocations = []
- for rev in self.revocationData:
- revocation = POW.X509Revoked( rev[0], rev[1] )
- revocations.append( revocation )
-
- self.crl = POW.X509Crl()
- self.crl.setVersion( self.version )
- self.crl.setIssuer( self.ca.getIssuer() )
- self.crl.setThisUpdate( self.thisUpdate )
- self.crl.setNextUpdate( self.nextUpdate )
- self.crl.setRevoked( revocations )
- self.crl.sign( self.caCipher[1] )
-
- def tearDown(self):
- del self.ca
- del self.caCipher
- del self.crl
-
- def testPemIo(self):
- 'Read and write CRL in PEM format'
- pemCrl = self.crl.pemWrite()
- newCrl = POW.pemRead( POW.X509_CRL, pemCrl )
- self.failUnlessEqual( self.version, newCrl.getVersion() )
-
- def testDerIo(self):
- 'Read and write CRL in DER format'
- derCrl = self.crl.derWrite()
- newCrl = POW.derRead( POW.X509_CRL, derCrl )
- self.failUnlessEqual( self.version, newCrl.getVersion() )
-
- def testVersion(self):
- 'Create CRL and check version number is correct'
- self.failUnlessEqual( self.version, self.crl.getVersion() )
-
- def testIssuer(self):
- 'Create CRL and check issuer name is correct'
- self.failUnlessEqual( self.ca.getIssuer(), self.crl.getIssuer() )
-
- def testThisUpdate(self):
- 'Create CRL and check thisUpdate is correct'
- self.failUnlessEqual( self.thisUpdate, self.crl.getThisUpdate() )
-
- def testNextUpdate(self):
- 'Create CRL and check nextUpdate is correct'
- self.failUnlessEqual( self.nextUpdate, self.crl.getNextUpdate() )
-
- def testRevoked(self):
- 'Create CRL and check list of revoked objects is correct'
- revokedCerts = self.crl.getRevoked()
- for i in range( len(revokedCerts) ):
- revocation = revokedCerts[i]
- serial = revocation.getSerial()
- date = revocation.getDate()
- index = serial - 1
- self.failUnlessEqual( self.revocationData[index][0], serial )
- self.failUnlessEqual( self.revocationData[index][1], date )
-
-
-
- def crlIssuerAltNameTest(self):
- 'CRL Issuer Alt Name tests'
-
- n1 = ('directoryName', ( (( o2i('countryName'), ('printableString', 'UK') ),),
- (( o2i('stateOrProvinceName'), ('printableString', 'Herts') ),),
- (( o2i('organizationName'), ('printableString', 'The House') ),),
- (( o2i('commonName'), ('printableString', 'Shannon Works') ),) ) )
-
- n2 = ('rfc822Name', 'peter_shannon@yahoo.com')
- n3 = ('uri', 'http://www.p-s.org.uk')
- n4 = ('iPAddress', POW.pkix.ip42oct(192,168,100,51))
-
- issuer = POW.pkix.IssuerAltName()
- issuer.set([n1,n2,n3,n4])
- self.crl.addExtension( 'issuerAltName', 0, issuer.toString() )
- issuer = POW.pkix.IssuerAltName()
- issuer.fromString( self.crl.getExtension(0)[2] )
- values = issuer.get()
- self.failUnless( values == (n1,n2,n3,n4), 'generalNames are incorrect')
-
- def crlExtensionManipulationTest(self):
- 'Extension manipulation for CRL object tests'
-
- n1 = ('directoryName', ( (( o2i('countryName'), ('printableString', 'UK') ),),
- (( o2i('stateOrProvinceName'), ('printableString', 'Herts') ),),
- (( o2i('organizationName'), ('printableString', 'The House') ),),
- (( o2i('commonName'), ('printableString', 'Shannon Works') ),) ) )
-
- n2 = ('rfc822Name', 'peter_shannon@yahoo.com')
- n3 = ('uri', 'http://www.p-s.org.uk')
- n4 = ('iPAddress', POW.pkix.ip42oct(192,168,100,51))
-
- issuer = POW.pkix.IssuerAltName()
- issuer.set((n1,n2,n3,n4))
- self.crl.addExtension( 'issuerAltName', 0, issuer.toString() )
- self.crl.addExtension( 'issuerAltName', 0, issuer.toString() )
- self.failUnless( self.crl.countExtensions() == 2, 'CRL should have 2 any extensions')
- self.crl.clearExtensions()
- self.failUnless( self.crl.countExtensions() == 0, 'CRL should have no extensions')
- self.crl.addExtension( 'issuerAltName', 0, issuer.toString() )
-
- issuer = POW.pkix.IssuerAltName()
- issuer.fromString( self.crl.getExtension(0)[2] )
- self.failUnless( issuer.get() == (n1,n2,n3,n4), 'incorrect extension handling ')
-
-
- issuer = POW.pkix.IssuerAltName()
- issuer.fromString( self.crl.getExtension(0)[2] )
- values = issuer.get()
- self.failUnless( values == (n1,n2,n3,n4), 'generalNames are incorrect')
-
- def revExtensionManipulationTest(self):
- 'Extension manipulation for CRL revocation object tests'
- invalid = POW.pkix.InvalidityDate()
- invalid.set( POW.pkix.time2gen(time.time()) )
- reason = POW.pkix.CrlReason()
- reason.set(1)
-
- revdata = self.revocationData[0]
- revo = POW.X509Revoked( revdata[0], revdata[1] )
- revo.addExtension( 'invalidityDate', 0, invalid.toString() )
- revo.addExtension( 'CRLReason', 0, reason.toString() )
- self.failUnless( revo.countExtensions() == 2, 'revocation should have 2 any extensions')
- revo.clearExtensions()
- self.failUnless( revo.countExtensions() == 0, 'revocation should have no extensions')
- revo.addExtension( 'CRLReason', 0, reason.toString() )
- revo.addExtension( 'invalidityDate', 0, invalid.toString() )
- reason = POW.pkix.CrlReason()
- reason.fromString( revo.getExtension(0)[2] )
- self.failUnless( reason.get() == 1, 'incorrect extension handling ')
-
- def revocationExtensionTest(self):
- 'CRL Revocation Extension tests'
- self.ca = certs.getCert('ca')
- self.caCipher = ciphers.getCipher('ca')
-
- revocations = []
- invalid = POW.pkix.InvalidityDate()
- invalid.set( POW.pkix.time2gen(time.time()) )
- reason = POW.pkix.CrlReason()
- reason.set(1)
- for rev in self.revocationData:
- revocation = POW.X509Revoked( rev[0], rev[1] )
- revocation.addExtension( 'invalidityDate', 0, invalid.toString() )
- revocation.addExtension( 'CRLReason', 0, reason.toString() )
- revocations.append( revocation )
-
- self.crl = POW.X509Crl()
- self.crl.setVersion( self.version )
- self.crl.setIssuer( self.ca.getIssuer() )
- self.crl.setThisUpdate( self.thisUpdate )
- self.crl.setNextUpdate( self.nextUpdate )
- self.crl.setRevoked( revocations )
- self.crl.sign( self.caCipher[1] )
-
-
-
-#--------------- X509 CRL test case ---------------#
-#--------------- SSL test case ---------------#
-
-serverPort = 7777
-clientMsg = 'Message from client to server...'
-serverMsg = 'Message from server to client...'
-
-def serverCertKey():
- cert = certs.getCert('server')
- key = ciphers.getCipher('server')[1]
- return cert, key
-
-def clientCertKey():
- cert = certs.getCert('client')
- key = ciphers.getCipher('client')[1]
- return cert, key
-
-class SimpleSslServer:
-
- def __init__(self, test):
- cert, key = serverCertKey()
- ssl = POW.Ssl( POW.SSLV23_SERVER_METHOD )
- ssl.useCertificate(cert)
- ssl.useKey(key)
-
- sock = socket.socket( socket.AF_INET, socket.SOCK_STREAM )
- sock.bind( ('', serverPort) )
- sock.listen(1)
- conn, addr = sock.accept()
- sock.shutdown(0)
- sock.close()
- ssl.setFd( conn.fileno() )
- ssl.accept()
-
- msg = ssl.read()
- ssl.write(serverMsg)
-
- while 1:
- try: ssl.shutdown(); break
- except: time.sleep(1)
-
- conn.shutdown(0)
- conn.close()
- test.failUnlessEqual( clientMsg, msg, 'client/server communication failiure' )
-
-class ValidatingSslServer:
-
- def __init__(self, test):
- cert, key = serverCertKey()
- ssl = POW.Ssl( POW.SSLV23_SERVER_METHOD )
- ssl.useCertificate(cert)
- ssl.useKey(key)
- ssl.setVerifyMode( POW.SSL_VERIFY_PEER )
-
- store = POW.X509Store()
- store.addTrust( certs.getCert('ca') )
-
- sock = socket.socket( socket.AF_INET, socket.SOCK_STREAM )
- sock.bind( ('', serverPort) )
- sock.listen(1)
- conn, addr = sock.accept()
- sock.shutdown(0)
- sock.close()
- ssl.setFd( conn.fileno() )
- ssl.accept()
-
- clientCert = ssl.peerCertificate()
-
- msg = ssl.read()
- ssl.write(serverMsg)
-
- while 1:
- try: ssl.shutdown(); break
- except: time.sleep(1)
-
- conn.shutdown(0)
- conn.close()
- test.failUnless( store.verify( clientCert ), 'client certificate failed verification' )
-
-class SslClient:
-
- def __init__(self, test):
- cert, key = clientCertKey()
- ssl = POW.Ssl( POW.SSLV23_CLIENT_METHOD )
- ssl.useCertificate(cert)
- ssl.useKey(key)
- sock = socket.socket( socket.AF_INET, socket.SOCK_STREAM )
- sock.connect( ('', serverPort) )
- ssl.setFd( sock.fileno() )
- ssl.connect()
-
- ssl.write(clientMsg)
- ssl.read()
-
- while 1:
- try: ssl.shutdown(); break
- except: time.sleep(1)
-
- sock.shutdown(0)
- sock.close()
-
-class ValidatingSslClient:
-
- def __init__(self, test):
- cert, key = clientCertKey()
- ssl = POW.Ssl( POW.SSLV23_CLIENT_METHOD )
- ssl.useCertificate(cert)
- ssl.useKey(key)
- ssl.setVerifyMode( POW.SSL_VERIFY_PEER )
-
- store = POW.X509Store()
- store.addTrust( certs.getCert('ca') )
-
- sock = socket.socket( socket.AF_INET, socket.SOCK_STREAM )
- sock.connect( ('', serverPort) )
- ssl.setFd( sock.fileno() )
- ssl.connect()
-
- serverCert = ssl.peerCertificate()
-
- ssl.write(clientMsg)
- ssl.read()
-
- while 1:
- try: ssl.shutdown(); break
- except: time.sleep(1)
-
- sock.shutdown(0)
- sock.close()
- test.failUnless( store.verify( serverCert ), 'client certificate failed verification' )
-
-
-
-class SslTestCase(unittest.TestCase):
- 'SSL tests'
-
- def testSimple(self):
- '''Test client/server communication over SSL'''
- global serverPort
- serverPort += 1
- pid = os.fork()
- if pid:
- time.sleep(1)
- SimpleSslServer(self)
- else:
- time.sleep(3)
- SslClient(self)
- os._exit(0)
-
- def testClientValidation(self):
- '''Request and validate client certificate'''
- global serverPort
- serverPort += 1
- pid = os.fork()
- if pid:
- time.sleep(1)
- ValidatingSslServer(self)
- else:
- time.sleep(3)
- SslClient(self)
- os._exit(0)
-
- def testServerValidation(self):
- '''Request and validate server certificate'''
- global serverPort
- serverPort += 1
- pid = os.fork()
- if pid:
- time.sleep(3)
- ValidatingSslClient(self)
- else:
- time.sleep(1)
- SimpleSslServer(self)
- os._exit(0)
-
-#--------------- SSL test case ---------------#
-#--------------- Test suite generators ---------------#
-
-def derEncodingTests():
- suite = unittest.TestSuite()
- suite.addTest( DerEncodingTestCase('integerTest') )
- suite.addTest( DerEncodingTestCase('oidTest') )
- suite.addTest( DerEncodingTestCase('booleanTest') )
- suite.addTest( DerEncodingTestCase('bitStringTest') )
- return suite
-
-def complexDerTests():
- suite = unittest.TestSuite()
- suite.addTest( ComplexDerTestCase('emptySeqTest') )
- suite.addTest( ComplexDerTestCase('seqOfSimpleTest') )
- suite.addTest( ComplexDerTestCase('seqOfSeqTest') )
- suite.addTest( ComplexDerTestCase('seqOfSimpleWithOptionalTest') )
- suite.addTest( ComplexDerTestCase('seqOfSimpleWithDefaultTest') )
- suite.addTest( ComplexDerTestCase('seqOfOptionalSeqTest') )
- suite.addTest( ComplexDerTestCase('seqOfPartiallySetOptionalSeqTest') )
- suite.addTest( ComplexDerTestCase('defaultSeqTest') )
- suite.addTest( ComplexDerTestCase('sequenceOfChoiceTest') )
- suite.addTest( ComplexDerTestCase('seqOfDefaultSeqTest') )
- suite.addTest( ComplexDerTestCase('sequenceOfSimpleTest') )
- suite.addTest( ComplexDerTestCase('defaultSequenceOfTest') )
- suite.addTest( ComplexDerTestCase('sequenceOfDefaultSequenceOfTest') )
- suite.addTest( ComplexDerTestCase('optionalSequenceOfTest') )
- suite.addTest( ComplexDerTestCase('sequenceOfOptionalSequenceOfTest') )
- suite.addTest( ComplexDerTestCase('basicExplicitTest') )
- suite.addTest( ComplexDerTestCase('defaultExplicitTest') )
- suite.addTest( ComplexDerTestCase('optionalExplicitTest') )
- suite.addTest( ComplexDerTestCase('basicChoiceTest') )
- suite.addTest( ComplexDerTestCase('defaultChoiceTest') )
- suite.addTest( ComplexDerTestCase('optionalChoiceTest') )
- suite.addTest( ComplexDerTestCase('choiceWithDefaultElementTest') )
- return suite
-
-def pkixTests():
- suite = unittest.TestSuite()
- suite.addTest( PkixTestCase('validityTest') )
- suite.addTest( PkixTestCase('directoryStringTest') )
- suite.addTest( PkixTestCase('attributeTypeAndValueTest') )
- suite.addTest( PkixTestCase('x509v2Test') )
- suite.addTest( PkixTestCase('basicConstraintsTest') )
- suite.addTest( PkixTestCase('generalNameTest') )
- suite.addTest( PkixTestCase('x509v3Test') )
- suite.addTest( PkixTestCase('crlv1Test') )
- return suite
-
-def x509ExtensionSuite():
- suite = unittest.TestSuite()
- suite.addTest( ExtensionsTestCase('extensionManipulationTest') )
- suite.addTest( ExtensionsTestCase('basicConstraintTest') )
- suite.addTest( ExtensionsTestCase('privateKeyUsagePeriodTest') )
- suite.addTest( ExtensionsTestCase('keyUsageTest') )
- suite.addTest( ExtensionsTestCase('issuerAltNameTest') )
- suite.addTest( ExtensionsTestCase('subjectAltNameTest') )
- suite.addTest( ExtensionsTestCase('certPolicyTest') )
- return suite
-
-def hashSuite():
- suite = unittest.TestSuite()
- suite.addTest( HashTestCase('testMd2') )
- suite.addTest( HashTestCase('testMd5') )
- suite.addTest( HashTestCase('testSha') )
- suite.addTest( HashTestCase('testSha1') )
- suite.addTest( HashTestCase('testRipemd160') )
- return suite
-
-def hmacSuite():
- suite = unittest.TestSuite()
- suite.addTest( HmacTestCase('testHmacMd2') )
- suite.addTest( HmacTestCase('testHmacMd5') )
- suite.addTest( HmacTestCase('testHmacSha') )
- suite.addTest( HmacTestCase('testHmacSha1') )
- suite.addTest( HmacTestCase('testHmacRipemd160') )
- return suite
-
-def symmetricSuite():
- suite = unittest.TestSuite()
- if 'DES_ECB' in POW.__dict__.keys():
- suite.addTest( SymmetricTestCase('testDES_ECB') )
- if 'DES_EDE' in POW.__dict__.keys():
- suite.addTest( SymmetricTestCase('testDES_EDE') )
- if 'DES_EDE3' in POW.__dict__.keys():
- suite.addTest( SymmetricTestCase('testDES_EDE3') )
- if 'DES_CFB' in POW.__dict__.keys():
- suite.addTest( SymmetricTestCase('testDES_CFB') )
- if 'DES_EDE_CFB' in POW.__dict__.keys():
- suite.addTest( SymmetricTestCase('testDES_EDE_CFB') )
- if 'DES_EDE3_CFB' in POW.__dict__.keys():
- suite.addTest( SymmetricTestCase('testDES_EDE3_CFB') )
- if 'DES_OFB' in POW.__dict__.keys():
- suite.addTest( SymmetricTestCase('testDES_OFB') )
- if 'DES_EDE_OFB' in POW.__dict__.keys():
- suite.addTest( SymmetricTestCase('testDES_EDE_OFB') )
- if 'DES_EDE3_OFB' in POW.__dict__.keys():
- suite.addTest( SymmetricTestCase('testDES_EDE3_OFB') )
- if 'DES_CBC' in POW.__dict__.keys():
- suite.addTest( SymmetricTestCase('testDES_CBC') )
- if 'DES_EDE_CBC' in POW.__dict__.keys():
- suite.addTest( SymmetricTestCase('testDES_EDE_CBC') )
- if 'DES_EDE3_CBC' in POW.__dict__.keys():
- suite.addTest( SymmetricTestCase('testDES_EDE3_CBC') )
- if 'DESX_CBC' in POW.__dict__.keys():
- suite.addTest( SymmetricTestCase('testDESX_CBC') )
- if 'RC4' in POW.__dict__.keys():
- suite.addTest( SymmetricTestCase('testRC4') )
- if 'RC4_40' in POW.__dict__.keys():
- suite.addTest( SymmetricTestCase('testRC4_40') )
- if 'IDEA_ECB' in POW.__dict__.keys():
- suite.addTest( SymmetricTestCase('testIDEA_ECB') )
- if 'IDEA_CFB' in POW.__dict__.keys():
- suite.addTest( SymmetricTestCase('testIDEA_CFB') )
- if 'IDEA_OFB' in POW.__dict__.keys():
- suite.addTest( SymmetricTestCase('testIDEA_OFB') )
- if 'IDEA_CBC' in POW.__dict__.keys():
- suite.addTest( SymmetricTestCase('testIDEA_CBC') )
- if 'RC2_ECB' in POW.__dict__.keys():
- suite.addTest( SymmetricTestCase('testRC2_ECB') )
- if 'RC2_CBC' in POW.__dict__.keys():
- suite.addTest( SymmetricTestCase('testRC2_CBC') )
- if 'RC2_40_CBC' in POW.__dict__.keys():
- suite.addTest( SymmetricTestCase('testRC2_40_CBC') )
- if 'RC2_CFB' in POW.__dict__.keys():
- suite.addTest( SymmetricTestCase('testRC2_CFB') )
- if 'RC2_OFB' in POW.__dict__.keys():
- suite.addTest( SymmetricTestCase('testRC2_OFB') )
- if 'BF_ECB' in POW.__dict__.keys():
- suite.addTest( SymmetricTestCase('testBF_ECB') )
- if 'BF_CBC' in POW.__dict__.keys():
- suite.addTest( SymmetricTestCase('testBF_CBC') )
- if 'BF_CFB' in POW.__dict__.keys():
- suite.addTest( SymmetricTestCase('testBF_CFB') )
- if 'BF_OFB' in POW.__dict__.keys():
- suite.addTest( SymmetricTestCase('testBF_OFB') )
- if 'CAST5_ECB' in POW.__dict__.keys():
- suite.addTest( SymmetricTestCase('testCAST5_ECB') )
- if 'CAST5_CBC' in POW.__dict__.keys():
- suite.addTest( SymmetricTestCase('testCAST5_CBC') )
- if 'CAST5_CFB' in POW.__dict__.keys():
- suite.addTest( SymmetricTestCase('testCAST5_CFB') )
- if 'CAST5_OFB' in POW.__dict__.keys():
- suite.addTest( SymmetricTestCase('testCAST5_OFB') )
- if 'RC5_32_12_16_CBC' in POW.__dict__.keys():
- suite.addTest( SymmetricTestCase('testRC5_32_12_16_CBC') )
- if 'RC5_32_12_16_CFB' in POW.__dict__.keys():
- suite.addTest( SymmetricTestCase('testRC5_32_12_16_CFB') )
- if 'RC6_32_12_16_ECB' in POW.__dict__.keys():
- suite.addTest( SymmetricTestCase('testRC5_32_12_16_ECB') )
- if 'RC5_32_12_16_OFB' in POW.__dict__.keys():
- suite.addTest( SymmetricTestCase('testRC5_32_12_16_OFB') )
- return suite
-
-def asymmetricSuite():
- suite = unittest.TestSuite()
- suite.addTest( AsymmetricTestCase('testPemIo') )
- suite.addTest( AsymmetricTestCase('testDerIo') )
- suite.addTest( AsymmetricTestCase('testPublicEncrypt') )
- suite.addTest( AsymmetricTestCase('testPrivateEncrypt') )
- suite.addTest( AsymmetricTestCase('testSign') )
- return suite
-
-def x509Suite():
- suite = unittest.TestSuite()
- suite.addTest( X509TestCase('testPemIo') )
- suite.addTest( X509TestCase('testDerIo') )
- suite.addTest( X509TestCase('testIssuer') )
- suite.addTest( X509TestCase('testSubject') )
- suite.addTest( X509TestCase('testVersion') )
- suite.addTest( X509TestCase('testSerial') )
- suite.addTest( X509TestCase('testNotBefore') )
- suite.addTest( X509TestCase('testNotAfter') )
- return suite
-
-def x509StoreSuite():
- suite = unittest.TestSuite()
- suite.addTest( X509StoreTestCase('testVerify') )
- suite.addTest( X509StoreTestCase('testVerifyChain') )
- return suite
-
-def x509RevokedSuite():
- suite = unittest.TestSuite()
- suite.addTest( X509RevokedTestCase('testRevoked') )
- return suite
-
-def x509CrlSuite():
- suite = unittest.TestSuite()
- suite.addTest( X509CrlTestCase('testPemIo') )
- suite.addTest( X509CrlTestCase('testDerIo') )
- suite.addTest( X509CrlTestCase('testVersion') )
- suite.addTest( X509CrlTestCase('testIssuer') )
- suite.addTest( X509CrlTestCase('testThisUpdate') )
- suite.addTest( X509CrlTestCase('testNextUpdate') )
- suite.addTest( X509CrlTestCase('testRevoked') )
- suite.addTest( X509CrlTestCase('crlIssuerAltNameTest') )
- suite.addTest( X509CrlTestCase('revExtensionManipulationTest') )
- suite.addTest( X509CrlTestCase('revocationExtensionTest') )
- suite.addTest( X509CrlTestCase('crlExtensionManipulationTest') )
- return suite
-
-def sslSuite():
- suite = unittest.TestSuite()
- suite.addTest( SslTestCase('testSimple') )
- suite.addTest( SslTestCase('testClientValidation') )
- suite.addTest( SslTestCase('testServerValidation') )
- return suite
-
-#--------------- Test suite generators ---------------#
-#--------------- main ---------------#
-
-if __name__ == '__main__':
- print '\n\tGenerating RSA keys and certificates to use for testing...\n'
-
- certs = X509Utilities()
- ciphers = certs.asymUtils
- certs.prepCerts()
-
- runner = unittest.TextTestRunner( sys.stderr, 1, 2)
- runner.run( derEncodingTests() )
- runner.run( complexDerTests() )
- runner.run( pkixTests() )
- runner.run( hashSuite() )
- runner.run( hmacSuite() )
- runner.run( symmetricSuite() )
- runner.run( asymmetricSuite() )
- runner.run( x509Suite() )
- runner.run( x509StoreSuite() )
- runner.run( x509RevokedSuite() )
- runner.run( x509CrlSuite() )
- runner.run( x509ExtensionSuite() )
- if sys.platform != 'win32':
- runner.run( sslSuite() )
-
- certs.unPrepCerts()
-
-#--------------- main ---------------#