summaryrefslogtreecommitdiffstats
path: root/base/kra
diff options
context:
space:
mode:
authorAbhishek Koneru <akoneru@redhat.com>2014-03-03 07:54:04 -0500
committerAbhishek Koneru <akoneru@redhat.com>2014-03-06 09:28:27 -0500
commit7695dd5be515130c7e083fd52ac89735473d63b2 (patch)
treea2e36500317ecb8eef96a06cd14b67a65cfc63d9 /base/kra
parentb8568b14c462b3a55b5336dfa140f97c4906b573 (diff)
downloadpki-7695dd5be515130c7e083fd52ac89735473d63b2.tar.gz
pki-7695dd5be515130c7e083fd52ac89735473d63b2.tar.xz
pki-7695dd5be515130c7e083fd52ac89735473d63b2.zip
Modify return object for retrieve_key(key_id, twsk)
Modify the return type of the function retrieve_key(key_id, trans_wrapped_session_key) from returining a tuple KeyData, unwrapped_key to KeyData by setting the unwrapped_key to KeyData.private_data attribute for the case where trans_wrapped_session_key is not provided by the caller.
Diffstat (limited to 'base/kra')
-rw-r--r--base/kra/functional/drmtest.py22
1 files changed, 14 insertions, 8 deletions
diff --git a/base/kra/functional/drmtest.py b/base/kra/functional/drmtest.py
index 00f7d7a9d..5b09b0aaa 100644
--- a/base/kra/functional/drmtest.py
+++ b/base/kra/functional/drmtest.py
@@ -60,6 +60,8 @@ def print_key_data(key_data):
print "Key Size: " + str(key_data.size)
print "Nonce Data: " + base64.encodestring(key_data.nonceData)
print "Wrapped Private Data: " + base64.encodestring(key_data.wrappedPrivateData)
+ if key_data.private_data is not None:
+ print "Private Data: " + base64.encodestring(key_data.private_data)
def main():
''' test code execution '''
@@ -93,8 +95,12 @@ def main():
# Test 2: Get key request info
print "Now getting key request"
- keyrequest = keyclient.get_request_info('2')
- print_key_request(keyrequest)
+ try:
+ keyrequest = keyclient.get_request_info('2')
+ print_key_request(keyrequest)
+ except pki.RequestNotFoundException as e:
+ print "Can be ignored for a first time run!!"
+ print e
# Test 3: List requests
print "Now listing some requests"
@@ -132,7 +138,7 @@ def main():
session_key = crypto.generate_session_key()
wrapped_session_key = crypto.asymmetric_wrap(session_key, keyclient.transport_cert)
print "My key id is " + str(key_id)
- key_data, _unwrapped_key = keyclient.retrieve_key(key_id, trans_wrapped_session_key=wrapped_session_key)
+ key_data = keyclient.retrieve_key(key_id, trans_wrapped_session_key=wrapped_session_key)
print_key_data(key_data)
unwrapped_key = crypto.symmetric_unwrap(key_data.wrappedPrivateData,
session_key,
@@ -140,9 +146,9 @@ def main():
key1 = base64.encodestring(unwrapped_key)
# Test 7: Recover key without providing trans_wrapped_session_key
- key_data, unwrapped_key = keyclient.retrieve_key(key_id)
+ key_data = keyclient.retrieve_key(key_id)
print_key_data(key_data)
- key2 = base64.encodestring(unwrapped_key)
+ key2 = base64.encodestring(key_data.private_data)
# Test 8 - Confirm that keys returned are the same
if key1 == key2:
@@ -172,7 +178,7 @@ def main():
# Test 12 - Test exception on retrieve_key.
print "Try to retrieve an invalid key"
try:
- key_data, unwrapped_key = keyclient.retrieve_key('2000003434')
+ key_data = keyclient.retrieve_key('2000003434')
except pki.KeyNotFoundException as exc:
print "KeyNotFoundException thrown - Code:" + exc.code + " Message: " + exc.message
@@ -226,9 +232,9 @@ def main():
key_info = keyclient.get_active_key_info(client_key_id)
print_key_info(key_info)
- key_data, unwrapped_key = keyclient.retrieve_key(key_info.get_key_id())
+ key_data = keyclient.retrieve_key(key_info.get_key_id())
print_key_data(key_data)
- key2 = base64.encodestring(unwrapped_key)
+ key2 = base64.encodestring(key_data.private_data)
if key1 == key2:
print "Success: archived and recovered keys match"