@@ -42,17 +42,8 @@ def get_ava(assertion):
42
42
43
43
44
44
class TestSignedResponse ():
45
-
46
45
def setup_class (self ):
47
46
self .server = Server ("idp_conf" )
48
- sign_alg = Mock ()
49
- sign_alg .return_value = ds .SIG_RSA_SHA512
50
- digest_alg = Mock ()
51
- digest_alg .return_value = ds .DIGEST_SHA512
52
- self .restet_default = ds .DefaultSignature
53
- ds .DefaultSignature = MagicMock ()
54
- ds .DefaultSignature ().get_sign_alg = sign_alg
55
- ds .DefaultSignature ().get_digest_alg = digest_alg
56
47
conf = config .SPConfig ()
57
48
conf .load_file ("server_conf" )
58
49
self .client = client .Saml2Client (conf )
@@ -62,7 +53,6 @@ def setup_class(self):
62
53
"mail" : [
"[email protected] " ],
"title" :
"The man" }
63
54
64
55
def teardown_class (self ):
65
- ds .DefaultSignature = self .restet_default
66
56
self .server .close ()
67
57
68
58
def verify_assertion (self , assertion ):
@@ -76,7 +66,6 @@ def verify_assertion(self, assertion):
76
66
'surName' : ['Jeter' ], 'title' : ['The man' ]}
77
67
78
68
def test_signed_response (self ):
79
-
80
69
print (ds .DefaultSignature ().get_digest_alg ())
81
70
name_id = self .server .ident .transient_nameid (
82
71
"urn:mace:example.com:saml:roland:sp" , "id12" )
@@ -96,11 +85,10 @@ def test_signed_response(self):
96
85
assert signed_resp
97
86
98
87
sresponse = response_from_string (signed_resp )
99
- assert ds .SIG_RSA_SHA512 in str (sresponse ), "Not correctly signed!"
100
- assert ds .DIGEST_SHA512 in str (sresponse ), "Not correctly signed!"
88
+ assert ds .SIG_RSA_SHA1 in str (sresponse ), "Not correctly signed!"
89
+ assert ds .DIGEST_SHA1 in str (sresponse ), "Not correctly signed!"
101
90
102
91
def test_signed_response_1 (self ):
103
-
104
92
signed_resp = self .server .create_authn_response (
105
93
self .ava ,
106
94
"id12" , # in_response_to
@@ -112,15 +100,15 @@ def test_signed_response_1(self):
112
100
)
113
101
114
102
sresponse = response_from_string (signed_resp )
115
- assert ds .SIG_RSA_SHA512 in str (sresponse ), "Not correctly signed!"
116
- assert ds .DIGEST_SHA512 in str (sresponse ), "Not correctly signed!"
103
+ assert ds .SIG_RSA_SHA1 in str (sresponse ), "Not correctly signed!"
104
+ assert ds .DIGEST_SHA1 in str (sresponse ), "Not correctly signed!"
117
105
valid = self .server .sec .verify_signature (signed_resp ,
118
106
self .server .config .cert_file ,
119
107
node_name = 'urn:oasis:names:tc:SAML:2.0:protocol:Response' ,
120
108
node_id = sresponse .id )
121
109
assert valid
122
- assert ds .SIG_RSA_SHA512 in str (sresponse .assertion [0 ]), "Not correctly signed!"
123
- assert ds .DIGEST_SHA512 in str (sresponse .assertion [0 ]), "Not correctly signed!"
110
+ assert ds .SIG_RSA_SHA1 in str (sresponse .assertion [0 ]), "Not correctly signed!"
111
+ assert ds .DIGEST_SHA1 in str (sresponse .assertion [0 ]), "Not correctly signed!"
124
112
valid = self .server .sec .verify_signature (signed_resp ,
125
113
self .server .config .cert_file ,
126
114
node_name = 'urn:oasis:names:tc:SAML:2.0:assertion:Assertion' ,
@@ -130,7 +118,6 @@ def test_signed_response_1(self):
130
118
self .verify_assertion (sresponse .assertion )
131
119
132
120
def test_signed_response_2 (self ):
133
-
134
121
signed_resp = self .server .create_authn_response (
135
122
self .ava ,
136
123
"id12" , # in_response_to
@@ -161,6 +148,7 @@ def test_signed_response_2(self):
161
148
162
149
self .verify_assertion (sresponse .assertion )
163
150
151
+
164
152
if __name__ == "__main__" :
165
153
ts = TestSignedResponse ()
166
154
ts .setup_class ()
0 commit comments