diff options
author | Ade Lee <alee@redhat.com> | 2014-02-20 16:13:45 -0500 |
---|---|---|
committer | Ade Lee <alee@redhat.com> | 2014-02-26 01:17:13 -0500 |
commit | 640584b8047126b7892e8c635063df4ea11c1faa (patch) | |
tree | 469fabee1ab947a28ea7c87b64d69617b6984690 /base/kra/functional | |
parent | db00ea3bee6b86ae662cfdb8b50cca4a8be82ef1 (diff) | |
download | pki-640584b8047126b7892e8c635063df4ea11c1faa.tar.gz pki-640584b8047126b7892e8c635063df4ea11c1faa.tar.xz pki-640584b8047126b7892e8c635063df4ea11c1faa.zip |
Add methods to create nss certdb and import cert
Also changed arguments so that all args and returns from
CryptoUtil are unencoded.
Diffstat (limited to 'base/kra/functional')
-rw-r--r-- | base/kra/functional/drmtest.py | 20 |
1 files changed, 15 insertions, 5 deletions
diff --git a/base/kra/functional/drmtest.py b/base/kra/functional/drmtest.py index 43c297d4a..f3352b687 100644 --- a/base/kra/functional/drmtest.py +++ b/base/kra/functional/drmtest.py @@ -65,12 +65,20 @@ def main(): ''' test code execution ''' connection = PKIConnection('https', 'localhost', '8443', 'kra') connection.set_authentication_cert('/tmp/temp4.pem') - crypto = cryptoutil.NSSCryptoUtil("/tmp/drmtest/certdb", "redhat123") - kraclient = KRAClient(connection, crypto, "kra transport cert") - - # Test 1: Get Transport Cert + certdb_dir = "/tmp/drmtest-certdb" + certdb_password = "redhat123" + transport_nick = "kra transport cert" + cryptoutil.NSSCryptoUtil.setup_database(certdb_dir, certdb_password, over_write=True) + crypto = cryptoutil.NSSCryptoUtil(certdb_dir, certdb_password) + kraclient = KRAClient(connection, crypto) + + # Test 1: Get transport certificate and import it into the NSS database transport_cert = kraclient.system_certs.get_transport_cert() print transport_cert + tcert = transport_cert[len(pki.CERT_HEADER):len(transport_cert) -len(pki.CERT_FOOTER)] + crypto.import_cert(transport_nick, base64.decodestring(tcert), "u,u,u") + crypto.initialize_db() + kraclient.set_transport_cert(transport_nick) # Test 2: Get key request info print "Now getting key request" @@ -111,7 +119,9 @@ def main(): wrapped_session_key = crypto.asymmetric_wrap(session_key, kraclient.transport_cert) key_data, _unwrapped_key = kraclient.retrieve_key(key_id, trans_wrapped_session_key=wrapped_session_key) print_key_data(key_data) - unwrapped_key = crypto.symmetric_unwrap(key_data.wrappedPrivateData, session_key, nonce_iv=key_data.nonceData) + unwrapped_key = crypto.symmetric_unwrap(base64.decodestring(key_data.wrappedPrivateData), + session_key, + nonce_iv=base64.decodestring(key_data.nonceData)) key1 = base64.encodestring(unwrapped_key) # Test 7: Recover key without providing trans_wrapped_session_key |