Skip to content

Commit ceb8b2a

Browse files
committed
adapted based on comments & prauscher feedback
1 parent db7eab9 commit ceb8b2a

File tree

5 files changed

+15
-72
lines changed

5 files changed

+15
-72
lines changed

tests/hazmat/primitives/test_pkcs7.py

Lines changed: 15 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,6 @@
2020
from cryptography.hazmat.primitives.serialization import pkcs7
2121
from cryptography.x509.oid import (
2222
ExtendedKeyUsageOID,
23-
ExtensionOID,
2423
ObjectIdentifier,
2524
)
2625
from cryptography.x509.verification import (
@@ -135,14 +134,14 @@ def test_load_pkcs7_empty_certificates(self):
135134

136135
def _load_cert_key():
137136
key = load_vectors_from_file(
138-
os.path.join("pkcs7", "ca_key.pem"),
137+
os.path.join("x509", "custom", "ca", "ca_key.pem"),
139138
lambda pemfile: serialization.load_pem_private_key(
140139
pemfile.read(), None, unsafe_skip_rsa_key_validation=True
141140
),
142141
mode="rb",
143142
)
144143
cert = load_vectors_from_file(
145-
os.path.join("pkcs7", "ca.pem"),
144+
os.path.join("x509", "custom", "ca", "ca.pem"),
146145
loader=lambda pemfile: x509.load_pem_x509_certificate(pemfile.read()),
147146
mode="rb",
148147
)
@@ -175,19 +174,25 @@ def build_pkcs7_certificate(
175174
)
176175

177176
# Add AuthorityKeyIdentifier extension
178-
aki = certificate.extensions.get_extension_for_oid(
179-
ExtensionOID.AUTHORITY_KEY_IDENTIFIER
177+
aki = x509.AuthorityKeyIdentifier(
178+
b"\xfc\xeb\xb4\xd8\x12\xf2\xc9=\x99\xc3<g\xf4}7}\xe6\x13\xed\xfa",
179+
None,
180+
None,
180181
)
181182
certificate_builder = certificate_builder.add_extension(
182-
aki.value, critical=False
183+
aki,
184+
critical=False,
183185
)
184186

185187
# Add SubjectAlternativeName extension
186-
san = certificate.extensions.get_extension_for_oid(
187-
ExtensionOID.SUBJECT_ALTERNATIVE_NAME
188+
san = x509.SubjectAlternativeName(
189+
[
190+
x509.RFC822Name("[email protected]"),
191+
]
188192
)
189193
certificate_builder = certificate_builder.add_extension(
190-
san.value, critical=True
194+
san,
195+
critical=True,
191196
)
192197

193198
# Add BasicConstraints extension
@@ -266,7 +271,7 @@ def verify_invalid_pkcs7_certificate(certificate: x509.Certificate):
266271
verifier.verify(certificate, [])
267272

268273
@pytest.mark.parametrize(
269-
"filename", ["ca_non_ascii_san.pem", "ca_ascii_san.pem"]
274+
"filename", ["non-ascii-san.pem", "ascii-san.pem"]
270275
)
271276
def test_verify_pkcs7_certificate_wrong_san(self, filename):
272277
# Read a certificate with an invalid SAN

vectors/cryptography_vectors/pkcs7/ca.pem

Lines changed: 0 additions & 11 deletions
This file was deleted.

vectors/cryptography_vectors/pkcs7/ca_ascii_san.pem

Lines changed: 0 additions & 23 deletions
This file was deleted.

vectors/cryptography_vectors/pkcs7/ca_key.pem

Lines changed: 0 additions & 5 deletions
This file was deleted.

vectors/cryptography_vectors/pkcs7/ca_non_ascii_san.pem

Lines changed: 0 additions & 23 deletions
This file was deleted.

0 commit comments

Comments
 (0)