CRL checker handles expired certificates
This commit is contained in:
parent
37ab26862a
commit
96355c4352
@ -112,29 +112,3 @@ def test_signed_pdf_dod_revoked(crl_check):
|
||||
}
|
||||
],
|
||||
}
|
||||
|
||||
|
||||
def test_signed_dod_pdf_signer_cert_expired(crl_check):
|
||||
#
|
||||
# TODO: Is this good enough? Do we want an expired DOD certificate? This test is using
|
||||
# a fake DOD certificate.
|
||||
#
|
||||
signed_pdf_dod_revoked = open("tests/fixtures/signed-expired-cert.pdf", "rb").read()
|
||||
result = pdf_signature_validations(pdf=signed_pdf_dod_revoked, crl_check=crl_check)
|
||||
|
||||
assert result == {
|
||||
"result": False,
|
||||
"signature_count": 1,
|
||||
"signatures": [
|
||||
{
|
||||
"cert_common_name": "Bob Alice",
|
||||
"hashed_binary_data": "bcfad46c89b1695325f5b6e73b589d086e3925ab384def6fcb13904991e69077",
|
||||
"hashing_algorithm": "sha256",
|
||||
"is_valid": False,
|
||||
"is_valid_cert": False,
|
||||
"is_valid_hash": True,
|
||||
"is_valid_signature": True,
|
||||
"signers_serial": -180_673_825_300_246_991_177_196,
|
||||
}
|
||||
],
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user