aboutsummaryrefslogtreecommitdiffstats
path: root/tests/hazmat/primitives/utils.py
diff options
context:
space:
mode:
authorPaul Kehrer <paul.l.kehrer@gmail.com>2014-03-20 18:43:04 -0400
committerPaul Kehrer <paul.l.kehrer@gmail.com>2014-03-20 18:43:04 -0400
commitcdd0d2f045816f007a44d56691a023dd25bcb47a (patch)
treea81524d68aa5af550a69772e94c22977d2811d29 /tests/hazmat/primitives/utils.py
parent798c03456d6f1fa8f27433a7e3928d583e1e120f (diff)
parent23c641dad201446a019d4a5f1181908744fd347a (diff)
downloadcryptography-cdd0d2f045816f007a44d56691a023dd25bcb47a.tar.gz
cryptography-cdd0d2f045816f007a44d56691a023dd25bcb47a.tar.bz2
cryptography-cdd0d2f045816f007a44d56691a023dd25bcb47a.zip
Merge branch 'master' into rsa-pss-signing
* master: add mgf1_hash_supported unsupported hash check more concise way of generating tests switch to a lambda rename some things add FIPS 186-2/3 signature verification tests for RSA PKCSv15 and PSS revert one import order change a few small fixes Add ASN1_TIME_free import order fixes for future automated checking Conflicts: tests/hazmat/primitives/test_rsa.py tests/hazmat/primitives/utils.py
Diffstat (limited to 'tests/hazmat/primitives/utils.py')
-rw-r--r--tests/hazmat/primitives/utils.py40
1 files changed, 20 insertions, 20 deletions
diff --git a/tests/hazmat/primitives/utils.py b/tests/hazmat/primitives/utils.py
index 5d3b4d15..76212daa 100644
--- a/tests/hazmat/primitives/utils.py
+++ b/tests/hazmat/primitives/utils.py
@@ -14,21 +14,20 @@
from __future__ import absolute_import, division, print_function
import binascii
-import os
-
import itertools
+import os
import pytest
+from cryptography.exceptions import (
+ AlreadyFinalized, AlreadyUpdated, InvalidSignature, InvalidTag,
+ NotYetFinalized
+)
from cryptography.hazmat.primitives import hashes, hmac
-from cryptography.hazmat.primitives.asymmetric import rsa, padding
-from cryptography.hazmat.primitives.kdf.pbkdf2 import PBKDF2HMAC
+from cryptography.hazmat.primitives.asymmetric import padding, rsa
from cryptography.hazmat.primitives.ciphers import Cipher
from cryptography.hazmat.primitives.kdf.hkdf import HKDF
-
-from cryptography.exceptions import (
- AlreadyFinalized, NotYetFinalized, AlreadyUpdated, InvalidTag,
-)
+from cryptography.hazmat.primitives.kdf.pbkdf2 import PBKDF2HMAC
from ...utils import load_vectors_from_file
@@ -376,36 +375,37 @@ def generate_hkdf_test(param_loader, path, file_names, algorithm):
return test_hkdf
-def generate_rsa_pss_test(param_loader, path, file_names, hash_alg):
+def generate_rsa_verification_test(param_loader, path, file_names, hash_alg,
+ pad_factory):
all_params = _load_all_params(path, file_names, param_loader)
all_params = [i for i in all_params
if i["algorithm"] == hash_alg.name.upper()]
@pytest.mark.parametrize("params", all_params)
- def test_rsa_pss(self, backend, params):
- rsa_pss_test(backend, params, hash_alg)
+ def test_rsa_verification(self, backend, params):
+ rsa_verification_test(backend, params, hash_alg, pad_factory)
- return test_rsa_pss
+ return test_rsa_verification
-def rsa_pss_test(backend, params, hash_alg):
+def rsa_verification_test(backend, params, hash_alg, pad_factory):
public_key = rsa.RSAPublicKey(
public_exponent=params["public_exponent"],
modulus=params["modulus"]
)
+ pad = pad_factory(params, hash_alg)
verifier = public_key.verifier(
binascii.unhexlify(params["s"]),
- padding.PSS(
- mgf=padding.MGF1(
- algorithm=hash_alg,
- salt_length=params["salt_length"]
- )
- ),
+ pad,
hash_alg,
backend
)
verifier.update(binascii.unhexlify(params["msg"]))
- verifier.verify()
+ if params["fail"]:
+ with pytest.raises(InvalidSignature):
+ verifier.verify()
+ else:
+ verifier.verify()
def rsa_pss_signing_test(backend, hash_alg):