def test_sign(self): key = utils.get_private_key_from_pem(self.key_rsa_data) signer = cryptography_io.make_signer(key, 'RSA', 'SHA256') self.csr.sign('RSA', 'SHA256', signer) # 10 bytes is definitely enough for non malicious case, right? self.assertEqual(b'\x16\xbd!\x9b\xfb\xfd\x10\xa1\xaf\x92', self.csr._get_signature()[:10])
def test_sign_unknown_hash(self): key = utils.get_private_key_from_pem(self.key_rsa_data) with self.assertRaises(x509_errors.X509Error): self.cert.sign(key, "no_such_hash")
def test_sign_dsa_sha1(self): key = utils.get_private_key_from_pem(self.key_dsa_data) self.cert.sign(key, "sha1") # DSA signatures are not deterministic which means we can only # verify the signature, not make sure it's always the same self.assertTrue(self.cert.verify(key.public_key()))
def test_sign_rsa_sha1(self): key = utils.get_private_key_from_pem(self.key_rsa_data) self.cert.sign(key, "sha1") self.assertEqual(self.cert.get_fingerprint(), "BA1B5C97D68EAE738FD10657E6F0B143") self.assertTrue(self.cert.verify(key.public_key()))
def test_sign_bad_md(self): key = utils.get_private_key_from_pem(self.key_rsa_data) self.assertRaises(x509_errors.X509Error, self.cert.sign, key, "BAD")
def test_sign_unknown_hash(self): key = utils.get_private_key_from_pem(self.key_rsa_data) with self.assertRaises(x509_errors.X509Error): self.cert.sign(key, 'no_such_hash')
def test_sign(self): key = utils.get_private_key_from_pem(self.key_rsa_data) self.csr.sign(key) # 10 bytes is definitely enough for non malicious case, right? self.assertEqual(b'\x16\xbd!\x9b\xfb\xfd\x10\xa1\xaf\x92', self.csr._get_signature()[:10])
def test_sign(self): key = utils.get_private_key_from_pem(self.key_rsa_data) self.csr.sign(key) # 10 bytes is definitely enough for non malicious case, right? self.assertEqual(b'5I\xc2\x03\x97\xd2\xf0\xd6\x06\x8c', self.csr._get_signature()[:10])
def test_sign_bad_md(self): key = utils.get_private_key_from_pem(self.key_rsa_data) with self.assertRaises(signers.SigningError): cryptography_io.make_signer(key, "BAD", "RSA")
def test_sign_dsa_sha1(self): key = utils.get_private_key_from_pem(self.key_dsa_data) self.cert.sign(key, 'sha1') # DSA signatures are not deterministic which means we can only # verify the signature, not make sure it's always the same self.assertTrue(self.cert.verify(key.public_key()))
def test_sign_rsa_sha1(self): key = utils.get_private_key_from_pem(self.key_rsa_data) self.cert.sign(key, 'sha1') self.assertEqual(self.cert.get_fingerprint(), "BA1B5C97D68EAE738FD10657E6F0B143") self.assertTrue(self.cert.verify(key.public_key()))