|
20 | 20 | from cryptography.hazmat.primitives.serialization import pkcs7 |
21 | 21 | from cryptography.x509.oid import ( |
22 | 22 | ExtendedKeyUsageOID, |
23 | | - ExtensionOID, |
24 | 23 | ObjectIdentifier, |
25 | 24 | ) |
26 | 25 | from cryptography.x509.verification import ( |
@@ -135,14 +134,14 @@ def test_load_pkcs7_empty_certificates(self): |
135 | 134 |
|
136 | 135 | def _load_cert_key(): |
137 | 136 | key = load_vectors_from_file( |
138 | | - os.path.join("pkcs7", "ca_key.pem"), |
| 137 | + os.path.join("x509", "custom", "ca", "ca_key.pem"), |
139 | 138 | lambda pemfile: serialization.load_pem_private_key( |
140 | 139 | pemfile.read(), None, unsafe_skip_rsa_key_validation=True |
141 | 140 | ), |
142 | 141 | mode="rb", |
143 | 142 | ) |
144 | 143 | cert = load_vectors_from_file( |
145 | | - os.path.join("pkcs7", "ca.pem"), |
| 144 | + os.path.join("x509", "custom", "ca", "ca.pem"), |
146 | 145 | loader=lambda pemfile: x509.load_pem_x509_certificate(pemfile.read()), |
147 | 146 | mode="rb", |
148 | 147 | ) |
@@ -175,19 +174,25 @@ def build_pkcs7_certificate( |
175 | 174 | ) |
176 | 175 |
|
177 | 176 | # Add AuthorityKeyIdentifier extension |
178 | | - aki = certificate.extensions.get_extension_for_oid( |
179 | | - ExtensionOID.AUTHORITY_KEY_IDENTIFIER |
| 177 | + aki = x509.AuthorityKeyIdentifier( |
| 178 | + b"\xfc\xeb\xb4\xd8\x12\xf2\xc9=\x99\xc3<g\xf4}7}\xe6\x13\xed\xfa", |
| 179 | + None, |
| 180 | + None, |
180 | 181 | ) |
181 | 182 | certificate_builder = certificate_builder.add_extension( |
182 | | - aki.value, critical=False |
| 183 | + aki, |
| 184 | + critical=False, |
183 | 185 | ) |
184 | 186 |
|
185 | 187 | # Add SubjectAlternativeName extension |
186 | | - san = certificate.extensions.get_extension_for_oid( |
187 | | - ExtensionOID.SUBJECT_ALTERNATIVE_NAME |
| 188 | + san = x509.SubjectAlternativeName( |
| 189 | + [ |
| 190 | + x509.RFC822Name("example@example.com"), |
| 191 | + ] |
188 | 192 | ) |
189 | 193 | certificate_builder = certificate_builder.add_extension( |
190 | | - san.value, critical=True |
| 194 | + san, |
| 195 | + critical=True, |
191 | 196 | ) |
192 | 197 |
|
193 | 198 | # Add BasicConstraints extension |
@@ -266,7 +271,7 @@ def verify_invalid_pkcs7_certificate(certificate: x509.Certificate): |
266 | 271 | verifier.verify(certificate, []) |
267 | 272 |
|
268 | 273 | @pytest.mark.parametrize( |
269 | | - "filename", ["ca_non_ascii_san.pem", "ca_ascii_san.pem"] |
| 274 | + "filename", ["non-ascii-san.pem", "ascii-san.pem"] |
270 | 275 | ) |
271 | 276 | def test_verify_pkcs7_certificate_wrong_san(self, filename): |
272 | 277 | # Read a certificate with an invalid SAN |
|
0 commit comments