コード例 #1
0
ファイル: test_x509_csr.py プロジェクト: pabit/anchor
 def test_sign(self):
     key = utils.get_private_key_from_pem(self.key_rsa_data)
     signer = cryptography_io.make_signer(key, 'RSA', 'SHA256')
     self.csr.sign('RSA', 'SHA256', signer)
     # 10 bytes is definitely enough for non malicious case, right?
     self.assertEqual(b'\x16\xbd!\x9b\xfb\xfd\x10\xa1\xaf\x92',
                      self.csr._get_signature()[:10])
コード例 #2
0
 def test_sign_unknown_hash(self):
     key = utils.get_private_key_from_pem(self.key_rsa_data)
     with self.assertRaises(x509_errors.X509Error):
         self.cert.sign(key, "no_such_hash")
コード例 #3
0
 def test_sign_dsa_sha1(self):
     key = utils.get_private_key_from_pem(self.key_dsa_data)
     self.cert.sign(key, "sha1")
     # DSA signatures are not deterministic which means we can only
     # verify the signature, not make sure it's always the same
     self.assertTrue(self.cert.verify(key.public_key()))
コード例 #4
0
 def test_sign_rsa_sha1(self):
     key = utils.get_private_key_from_pem(self.key_rsa_data)
     self.cert.sign(key, "sha1")
     self.assertEqual(self.cert.get_fingerprint(), "BA1B5C97D68EAE738FD10657E6F0B143")
     self.assertTrue(self.cert.verify(key.public_key()))
コード例 #5
0
 def test_sign_bad_md(self):
     key = utils.get_private_key_from_pem(self.key_rsa_data)
     self.assertRaises(x509_errors.X509Error, self.cert.sign, key, "BAD")
コード例 #6
0
 def test_sign_unknown_hash(self):
     key = utils.get_private_key_from_pem(self.key_rsa_data)
     with self.assertRaises(x509_errors.X509Error):
         self.cert.sign(key, 'no_such_hash')
コード例 #7
0
 def test_sign_bad_md(self):
     key = utils.get_private_key_from_pem(self.key_rsa_data)
     self.assertRaises(x509_errors.X509Error,
                       self.cert.sign,
                       key, "BAD")
コード例 #8
0
ファイル: test_x509_csr.py プロジェクト: agh/anchor
 def test_sign(self):
     key = utils.get_private_key_from_pem(self.key_rsa_data)
     self.csr.sign(key)
     # 10 bytes is definitely enough for non malicious case, right?
     self.assertEqual(b'\x16\xbd!\x9b\xfb\xfd\x10\xa1\xaf\x92',
                      self.csr._get_signature()[:10])
コード例 #9
0
 def test_sign(self):
     key = utils.get_private_key_from_pem(self.key_rsa_data)
     self.csr.sign(key)
     # 10 bytes is definitely enough for non malicious case, right?
     self.assertEqual(b'5I\xc2\x03\x97\xd2\xf0\xd6\x06\x8c',
                      self.csr._get_signature()[:10])
コード例 #10
0
ファイル: test_signing_backend.py プロジェクト: pabit/anchor
 def test_sign_bad_md(self):
     key = utils.get_private_key_from_pem(self.key_rsa_data)
     with self.assertRaises(signers.SigningError):
         cryptography_io.make_signer(key, "BAD", "RSA")
コード例 #11
0
 def test_sign(self):
     key = utils.get_private_key_from_pem(self.key_rsa_data)
     self.csr.sign(key)
     # 10 bytes is definitely enough for non malicious case, right?
     self.assertEqual(b'\x16\xbd!\x9b\xfb\xfd\x10\xa1\xaf\x92',
                      self.csr._get_signature()[:10])
コード例 #12
0
 def test_sign_dsa_sha1(self):
     key = utils.get_private_key_from_pem(self.key_dsa_data)
     self.cert.sign(key, 'sha1')
     # DSA signatures are not deterministic which means we can only
     # verify the signature, not make sure it's always the same
     self.assertTrue(self.cert.verify(key.public_key()))
コード例 #13
0
 def test_sign_rsa_sha1(self):
     key = utils.get_private_key_from_pem(self.key_rsa_data)
     self.cert.sign(key, 'sha1')
     self.assertEqual(self.cert.get_fingerprint(),
                      "BA1B5C97D68EAE738FD10657E6F0B143")
     self.assertTrue(self.cert.verify(key.public_key()))