|
20 | 20 | from cryptography.hazmat.primitives.serialization import pkcs7
|
21 | 21 | from cryptography.x509.oid import (
|
22 | 22 | ExtendedKeyUsageOID,
|
23 |
| - ExtensionOID, |
24 | 23 | ObjectIdentifier,
|
25 | 24 | )
|
26 | 25 | from cryptography.x509.verification import (
|
@@ -135,14 +134,14 @@ def test_load_pkcs7_empty_certificates(self):
|
135 | 134 |
|
136 | 135 | def _load_cert_key():
|
137 | 136 | key = load_vectors_from_file(
|
138 |
| - os.path.join("pkcs7", "ca_key.pem"), |
| 137 | + os.path.join("x509", "custom", "ca", "ca_key.pem"), |
139 | 138 | lambda pemfile: serialization.load_pem_private_key(
|
140 | 139 | pemfile.read(), None, unsafe_skip_rsa_key_validation=True
|
141 | 140 | ),
|
142 | 141 | mode="rb",
|
143 | 142 | )
|
144 | 143 | cert = load_vectors_from_file(
|
145 |
| - os.path.join("pkcs7", "ca.pem"), |
| 144 | + os.path.join("x509", "custom", "ca", "ca.pem"), |
146 | 145 | loader=lambda pemfile: x509.load_pem_x509_certificate(pemfile.read()),
|
147 | 146 | mode="rb",
|
148 | 147 | )
|
@@ -175,19 +174,25 @@ def build_pkcs7_certificate(
|
175 | 174 | )
|
176 | 175 |
|
177 | 176 | # Add AuthorityKeyIdentifier extension
|
178 |
| - aki = certificate.extensions.get_extension_for_oid( |
179 |
| - ExtensionOID.AUTHORITY_KEY_IDENTIFIER |
| 177 | + aki = x509.AuthorityKeyIdentifier( |
| 178 | + b"\xfc\xeb\xb4\xd8\x12\xf2\xc9=\x99\xc3<g\xf4}7}\xe6\x13\xed\xfa", |
| 179 | + None, |
| 180 | + None, |
180 | 181 | )
|
181 | 182 | certificate_builder = certificate_builder.add_extension(
|
182 |
| - aki.value, critical=False |
| 183 | + aki, |
| 184 | + critical=False, |
183 | 185 | )
|
184 | 186 |
|
185 | 187 | # Add SubjectAlternativeName extension
|
186 |
| - san = certificate.extensions.get_extension_for_oid( |
187 |
| - ExtensionOID.SUBJECT_ALTERNATIVE_NAME |
| 188 | + san = x509.SubjectAlternativeName( |
| 189 | + [ |
| 190 | + x509. RFC822Name( "[email protected]"), |
| 191 | + ] |
188 | 192 | )
|
189 | 193 | certificate_builder = certificate_builder.add_extension(
|
190 |
| - san.value, critical=True |
| 194 | + san, |
| 195 | + critical=True, |
191 | 196 | )
|
192 | 197 |
|
193 | 198 | # Add BasicConstraints extension
|
@@ -266,7 +271,7 @@ def verify_invalid_pkcs7_certificate(certificate: x509.Certificate):
|
266 | 271 | verifier.verify(certificate, [])
|
267 | 272 |
|
268 | 273 | @pytest.mark.parametrize(
|
269 |
| - "filename", ["ca_non_ascii_san.pem", "ca_ascii_san.pem"] |
| 274 | + "filename", ["non-ascii-san.pem", "ascii-san.pem"] |
270 | 275 | )
|
271 | 276 | def test_verify_pkcs7_certificate_wrong_san(self, filename):
|
272 | 277 | # Read a certificate with an invalid SAN
|
|
0 commit comments