aboutsummaryrefslogtreecommitdiffstats
path: root/tests/test_x509.py
diff options
context:
space:
mode:
authorPaul Kehrer <paul.l.kehrer@gmail.com>2017-06-30 19:49:53 -0500
committerAlex Gaynor <alex.gaynor@gmail.com>2017-06-30 17:49:53 -0700
commit784e3bc30d7c08952a2b994c57fc98bcc3f805c5 (patch)
treea2a232e436999d0a1e152d5a5a1891fda77007fa /tests/test_x509.py
parent51f049ab3c6eaddd2afc5b089d54ac7b8244fa1e (diff)
downloadcryptography-784e3bc30d7c08952a2b994c57fc98bcc3f805c5.tar.gz
cryptography-784e3bc30d7c08952a2b994c57fc98bcc3f805c5.tar.bz2
cryptography-784e3bc30d7c08952a2b994c57fc98bcc3f805c5.zip
disallow MD5 in CertificateBuilder and CertificateSigningRequestBuilder (#3738)
* disallow MD5 in CertificateBuilder and CertificateSigningRequestBuilder * only error on ECDSA and DSA lots of duplication in tests here, bleh * remove changelog entry, also handle this for CRLBuilder * pep8
Diffstat (limited to 'tests/test_x509.py')
-rw-r--r--tests/test_x509.py100
1 files changed, 100 insertions, 0 deletions
diff --git a/tests/test_x509.py b/tests/test_x509.py
index 7a99ff3d..41ccbed8 100644
--- a/tests/test_x509.py
+++ b/tests/test_x509.py
@@ -34,6 +34,7 @@ from cryptography.x509.oid import (
)
from .hazmat.primitives.fixtures_dsa import DSA_KEY_2048
+from .hazmat.primitives.fixtures_ec import EC_KEY_SECP256R1
from .hazmat.primitives.fixtures_rsa import RSA_KEY_2048, RSA_KEY_512
from .hazmat.primitives.test_ec import _skip_curve_unsupported
from .utils import load_vectors_from_file
@@ -1933,6 +1934,70 @@ class TestCertificateBuilder(object):
with pytest.raises(TypeError):
builder.sign(private_key, object(), backend)
+ @pytest.mark.requires_backend_interface(interface=RSABackend)
+ @pytest.mark.requires_backend_interface(interface=X509Backend)
+ def test_sign_rsa_with_md5(self, backend):
+ private_key = RSA_KEY_2048.private_key(backend)
+ builder = x509.CertificateBuilder()
+ builder = builder.subject_name(
+ x509.Name([x509.NameAttribute(NameOID.COUNTRY_NAME, u'US')])
+ ).issuer_name(
+ x509.Name([x509.NameAttribute(NameOID.COUNTRY_NAME, u'US')])
+ ).serial_number(
+ 1
+ ).public_key(
+ private_key.public_key()
+ ).not_valid_before(
+ datetime.datetime(2002, 1, 1, 12, 1)
+ ).not_valid_after(
+ datetime.datetime(2032, 1, 1, 12, 1)
+ )
+ cert = builder.sign(private_key, hashes.MD5(), backend)
+ assert isinstance(cert.signature_hash_algorithm, hashes.MD5)
+
+ @pytest.mark.requires_backend_interface(interface=DSABackend)
+ @pytest.mark.requires_backend_interface(interface=X509Backend)
+ def test_sign_dsa_with_md5(self, backend):
+ private_key = DSA_KEY_2048.private_key(backend)
+ builder = x509.CertificateBuilder()
+ builder = builder.subject_name(
+ x509.Name([x509.NameAttribute(NameOID.COUNTRY_NAME, u'US')])
+ ).issuer_name(
+ x509.Name([x509.NameAttribute(NameOID.COUNTRY_NAME, u'US')])
+ ).serial_number(
+ 1
+ ).public_key(
+ private_key.public_key()
+ ).not_valid_before(
+ datetime.datetime(2002, 1, 1, 12, 1)
+ ).not_valid_after(
+ datetime.datetime(2032, 1, 1, 12, 1)
+ )
+ with pytest.raises(ValueError):
+ builder.sign(private_key, hashes.MD5(), backend)
+
+ @pytest.mark.requires_backend_interface(interface=EllipticCurveBackend)
+ @pytest.mark.requires_backend_interface(interface=X509Backend)
+ def test_sign_ec_with_md5(self, backend):
+ _skip_curve_unsupported(backend, ec.SECP256R1())
+ private_key = EC_KEY_SECP256R1.private_key(backend)
+ builder = x509.CertificateBuilder()
+ builder = builder.subject_name(
+ x509.Name([x509.NameAttribute(NameOID.COUNTRY_NAME, u'US')])
+ ).issuer_name(
+ x509.Name([x509.NameAttribute(NameOID.COUNTRY_NAME, u'US')])
+ ).serial_number(
+ 1
+ ).public_key(
+ private_key.public_key()
+ ).not_valid_before(
+ datetime.datetime(2002, 1, 1, 12, 1)
+ ).not_valid_after(
+ datetime.datetime(2032, 1, 1, 12, 1)
+ )
+ with pytest.raises(ValueError):
+ builder.sign(private_key, hashes.MD5(), backend)
+
@pytest.mark.parametrize(
"cdp",
[
@@ -2623,6 +2688,41 @@ class TestCertificateSigningRequestBuilder(object):
builder.sign(private_key, 'NotAHash', backend)
@pytest.mark.requires_backend_interface(interface=RSABackend)
+ def test_sign_rsa_with_md5(self, backend):
+ private_key = RSA_KEY_2048.private_key(backend)
+
+ builder = x509.CertificateSigningRequestBuilder().subject_name(
+ x509.Name([
+ x509.NameAttribute(NameOID.ORGANIZATION_NAME, u'PyCA'),
+ ])
+ )
+ request = builder.sign(private_key, hashes.MD5(), backend)
+ assert isinstance(request.signature_hash_algorithm, hashes.MD5)
+
+ @pytest.mark.requires_backend_interface(interface=DSABackend)
+ def test_sign_dsa_with_md5(self, backend):
+ private_key = DSA_KEY_2048.private_key(backend)
+ builder = x509.CertificateSigningRequestBuilder().subject_name(
+ x509.Name([
+ x509.NameAttribute(NameOID.ORGANIZATION_NAME, u'PyCA'),
+ ])
+ )
+ with pytest.raises(ValueError):
+ builder.sign(private_key, hashes.MD5(), backend)
+
+ @pytest.mark.requires_backend_interface(interface=EllipticCurveBackend)
+ def test_sign_ec_with_md5(self, backend):
+ _skip_curve_unsupported(backend, ec.SECP256R1())
+ private_key = EC_KEY_SECP256R1.private_key(backend)
+ builder = x509.CertificateSigningRequestBuilder().subject_name(
+ x509.Name([
+ x509.NameAttribute(NameOID.ORGANIZATION_NAME, u'PyCA'),
+ ])
+ )
+ with pytest.raises(ValueError):
+ builder.sign(private_key, hashes.MD5(), backend)
+
+ @pytest.mark.requires_backend_interface(interface=RSABackend)
def test_no_subject_name(self, backend):
private_key = RSA_KEY_2048.private_key(backend)