diff options
| author | Alex Gaynor <alex.gaynor@gmail.com> | 2014-07-11 16:20:50 -0700 | 
|---|---|---|
| committer | Alex Gaynor <alex.gaynor@gmail.com> | 2014-07-11 16:20:50 -0700 | 
| commit | 58a3f9197288447e6ee8d96d75afea77829dde8c (patch) | |
| tree | cd07cf3e1460adfd6c721d54b809c0349f6bbea6 /docs/hazmat/primitives | |
| parent | 814c57538b7cabba28024fb26c35dc29ab30dfc1 (diff) | |
| download | cryptography-58a3f9197288447e6ee8d96d75afea77829dde8c.tar.gz cryptography-58a3f9197288447e6ee8d96d75afea77829dde8c.tar.bz2 cryptography-58a3f9197288447e6ee8d96d75afea77829dde8c.zip  | |
Turn this into a doctest block
Diffstat (limited to 'docs/hazmat/primitives')
| -rw-r--r-- | docs/hazmat/primitives/asymmetric/serialization.rst | 42 | 
1 files changed, 35 insertions, 7 deletions
diff --git a/docs/hazmat/primitives/asymmetric/serialization.rst b/docs/hazmat/primitives/asymmetric/serialization.rst index 93bcffd0..5438c249 100644 --- a/docs/hazmat/primitives/asymmetric/serialization.rst +++ b/docs/hazmat/primitives/asymmetric/serialization.rst @@ -5,6 +5,33 @@ Key Serialization  .. currentmodule:: cryptography.hazmat.primitives.serialization +.. testsetup:: + +    pem_data = b""" +    -----BEGIN RSA PRIVATE KEY----- +    MIICXgIBAAKBgQDn09PV9KPE7Q+N5K5UtNLT1DLl8z/pKM2pP5tXqWx2OsEw00lC +    kDHdHESwzS050s/8rtkERKKyusCzCm9+vC1pQzUlmtibfF4PQAQc1pJL6KHqlidg +    Hw49atYmnC25CaeXt65pAYXoIacOZ8k5X7FW3Eagex8nG0iMw4ObOtg6CwIDAQAB +    AoGBAL31l/4YYN1rNrSZLrQgGyUSGsbLxJHEKolFon95R3O1fzoH117gkstQb4TE +    Cwv3jw/JIfBaYUq8tku/AE9D2Jx51x7kYaCuQIMTavKIgkXKfxTQCQDjSEfkvXMW +    4WOIj5sYdSCNbzLbaeFsWG32bSsBTy/sSheDIlCEFnqDuqwBAkEA+wYfJEMDf5nS +    VCQd9VKGM4HVeTWBioaWBFCflFdhc1Vb65dsNDp8iIMZgAHC2LEX5dMUmgqXk7AT +    lwFlIeW4CwJBAOxsSfuIVMuPKyx1xQ6ebpC7zeVxIOdswcM8ain91MSGDdKZw6pF +    ioFh3kUbKHw4yqqHbdRmUDAJ1mcgGJQOxgECQQCmQaGylKfmhWymyd0FtIip6J4I +    z4ViyEznwrZOu6kRiEF/QiUqWmpMx/fFrmTsvC5Fy43jkIxgBsiSxRvEXa+NAkB+ +    5m0bhwTEslchKSGZhC6inzuYAQ4BSh4C1mXBnk5bIf0/Ymtk9KiwY8CzZS1o5+7Y +    c5LfI/+8mTss5UxsBDYBAkEA6NqhcsNWndIJZiWUU4u+RjFUQXqH8WCyJmEDCNxs +    7SGRS1DTUGX4Y70m9dQpguy6Zg+gpHC+o+ERZR06uEQr+w== +    -----END RSA PRIVATE KEY----- +    """.strip() +    message = b"" + +    def sign_with_rsa_key(key, message): +        return b"" + +    def sign_with_dsa_key(key, message): +        return b"" +  There are several common schemes for serializing asymmetric private and public  keys to bytes. They generally support encryption of private keys and additional  key metadata. @@ -14,17 +41,18 @@ and will return an instance of the appropriate type. You should check that  the returned key matches the type your application expects when using these  methods. -    .. code-block:: pycon +    .. doctest:: +        >>> from cryptography.hazmat.backends import default_backend          >>> from cryptography.hazmat.primitives import interfaces          >>> from cryptography.hazmat.primitives.serialization import load_pem_pkcs8_private_key -        >>> key = load_pem_pkcs8_private_key(pem_data, password=None, backend=backend) +        >>> key = load_pem_pkcs8_private_key(pem_data, password=None, backend=default_backend())          >>> if isinstance(key, interfaces.RSAPrivateKey): -        >>>     signature = sign_with_rsa_key(key, message) -        >>> elif isinstance(key, interfaces.DSAPrivateKey): -        >>>     signature = sign_with_dsa_key(key, message) -        >>> else: -        >>>     raise TypeError +        ...     signature = sign_with_rsa_key(key, message) +        ... elif isinstance(key, interfaces.DSAPrivateKey): +        ...     signature = sign_with_dsa_key(key, message) +        ... else: +        ...     raise TypeError  PKCS #8 Format  | 
