OXIESEC PANEL
- Current Dir:
/
/
usr
/
lib
/
python3
/
dist-packages
/
acme
Server IP: 139.59.38.164
Upload:
Create Dir:
Name
Size
Modified
Perms
📁
..
-
03/17/2025 09:32:20 AM
rwxr-xr-x
📄
__init__.py
727 bytes
02/07/2019 09:20:29 PM
rw-r--r--
📁
__pycache__
-
07/12/2020 04:36:20 PM
rwxr-xr-x
📄
challenges.py
19.8 KB
10/25/2019 12:22:34 AM
rw-r--r--
📄
challenges_test.py
21.17 KB
10/25/2019 12:22:34 AM
rw-r--r--
📄
client.py
46.26 KB
10/25/2019 12:22:34 AM
rw-r--r--
📄
client_test.py
56.84 KB
10/25/2019 12:22:34 AM
rw-r--r--
📄
crypto_util.py
10.99 KB
02/07/2019 09:20:29 PM
rw-r--r--
📄
crypto_util_test.py
9.98 KB
02/07/2019 09:20:29 PM
rw-r--r--
📄
errors.py
3.57 KB
02/07/2019 09:20:29 PM
rw-r--r--
📄
errors_test.py
1.48 KB
02/07/2019 09:20:29 PM
rw-r--r--
📄
fields.py
1.7 KB
02/07/2019 09:20:29 PM
rw-r--r--
📄
fields_test.py
2.03 KB
02/07/2019 09:20:29 PM
rw-r--r--
📄
jose_test.py
1.92 KB
02/07/2019 09:20:29 PM
rw-r--r--
📄
jws.py
2.09 KB
02/07/2019 09:20:29 PM
rw-r--r--
📄
jws_test.py
2.03 KB
02/07/2019 09:20:29 PM
rw-r--r--
📄
magic_typing.py
534 bytes
02/07/2019 09:20:29 PM
rw-r--r--
📄
magic_typing_test.py
1.42 KB
02/07/2019 09:20:29 PM
rw-r--r--
📄
messages.py
19.11 KB
02/07/2019 09:20:29 PM
rw-r--r--
📄
messages_test.py
16.25 KB
02/07/2019 09:20:29 PM
rw-r--r--
📄
standalone.py
11.09 KB
02/07/2019 09:20:29 PM
rw-r--r--
📄
standalone_test.py
10.54 KB
02/07/2019 09:20:29 PM
rw-r--r--
📄
test_util.py
3.12 KB
02/07/2019 09:20:29 PM
rw-r--r--
📄
util.py
166 bytes
02/07/2019 09:20:29 PM
rw-r--r--
📄
util_test.py
456 bytes
02/07/2019 09:20:29 PM
rw-r--r--
Editing: jws_test.py
Close
"""Tests for acme.jws.""" import unittest import josepy as jose from acme import test_util KEY = jose.JWKRSA.load(test_util.load_vector('rsa512_key.pem')) class HeaderTest(unittest.TestCase): """Tests for acme.jws.Header.""" good_nonce = jose.encode_b64jose(b'foo') wrong_nonce = u'F' # Following just makes sure wrong_nonce is wrong try: jose.b64decode(wrong_nonce) except (ValueError, TypeError): assert True else: assert False # pragma: no cover def test_nonce_decoder(self): from acme.jws import Header nonce_field = Header._fields['nonce'] self.assertRaises( jose.DeserializationError, nonce_field.decode, self.wrong_nonce) self.assertEqual(b'foo', nonce_field.decode(self.good_nonce)) class JWSTest(unittest.TestCase): """Tests for acme.jws.JWS.""" def setUp(self): self.privkey = KEY self.pubkey = self.privkey.public_key() self.nonce = jose.b64encode(b'Nonce') self.url = 'hi' self.kid = 'baaaaa' def test_kid_serialize(self): from acme.jws import JWS jws = JWS.sign(payload=b'foo', key=self.privkey, alg=jose.RS256, nonce=self.nonce, url=self.url, kid=self.kid) self.assertEqual(jws.signature.combined.nonce, self.nonce) self.assertEqual(jws.signature.combined.url, self.url) self.assertEqual(jws.signature.combined.kid, self.kid) self.assertEqual(jws.signature.combined.jwk, None) # TODO: check that nonce is in protected header self.assertEqual(jws, JWS.from_json(jws.to_json())) def test_jwk_serialize(self): from acme.jws import JWS jws = JWS.sign(payload=b'foo', key=self.privkey, alg=jose.RS256, nonce=self.nonce, url=self.url) self.assertEqual(jws.signature.combined.kid, None) self.assertEqual(jws.signature.combined.jwk, self.pubkey) if __name__ == '__main__': unittest.main() # pragma: no cover