aboutsummaryrefslogtreecommitdiffstats
path: root/tests/hazmat/primitives
Commit message (Collapse)AuthorAgeFilesLines
* Add support for 160 bit ARC4 keysEhren Kret2015-11-281-0/+1
|
* Swapping modified x509 test with modified ec testPeter Hamilton2015-10-301-11/+2
|
* Adding elliptic curve test fixturesPeter Hamilton2015-10-291-0/+296
| | | | This change adds pre-generated elliptic curve keys to be used in elliptic curve tests.
* Error cleanly if the public and private keys to an ECDH key exchange are on ↵Alex Gaynor2015-10-281-1/+27
| | | | different curves
* add ellipticcurvepublicnumbers reprPaul Kehrer2015-10-281-0/+5
|
* address review feedbackPaul Kehrer2015-10-281-7/+0
|
* modify approach to use EllipticCurvePublicNumbers methodsPaul Kehrer2015-10-272-73/+76
|
* remove support for null points, improve docsPaul Kehrer2015-10-271-2/+4
|
* add support for encoding/decoding elliptic curve pointsPaul Kehrer2015-10-261-2/+71
| | | | Based on the work of @ronf in #2346.
* add comments on test cases to explain reasons a bit betterPaul Kehrer2015-10-221-0/+5
|
* make skip message more verbosePaul Kehrer2015-10-211-11/+10
|
* AES keywrap supportPaul Kehrer2015-10-211-0/+112
|
* better place for this testAlex Gaynor2015-10-191-0/+16
|
* removed unused code, and added a testAlex Gaynor2015-10-191-12/+13
|
* be more pro-active in handling invalid keysAlex Gaynor2015-10-181-23/+27
|
* unusedAlex Gaynor2015-10-171-6/+0
|
* a refactor to the APIAlex Gaynor2015-10-171-53/+41
|
* Add an Elliptic Curve Key Exchange Algorithm(ECDH)Simo Sorce2015-10-171-1/+93
| | | | | | | | | The ECDH Key Exchange algorithm as standardized in NIST publication 800-56A Revision 2 Includes tests with vectors from NIST. Signed-off-by: Simo Sorce <simo@redhat.com>
* Catch Invalid X or Y points and raise a ValueErrorSimo Sorce2015-10-121-0/+29
| | | | Signed-off-by: Simo Sorce <simo@redhat.com>
* rename this file for consistencyAlex Gaynor2015-09-261-0/+0
|
* Some cleanupsAlex Gaynor2015-09-241-3/+3
|
* Test X9.63 with NIST test vectorsSimo Sorce2015-09-241-0/+72
| | | | Signed-off-by: Simo Sorce <simo@redhat.com>
* Add X963KDF from ANSI X9.63:2001Simo Sorce2015-09-241-0/+120
| | | | | | | | | | The implemention allows the use a Hash function to implement a KDF very similar to ConcatKDFHash, just different enough to require a separate derivation function. Closes #2203 Signed-off-by: Simo Sorce <simo@redhat.com>
* skip if check on ec testPaul Kehrer2015-08-121-1/+2
|
* Merge pull request #2262 from viraptor/non-bytes-signaturesPaul Kehrer2015-08-123-0/+31
|\ | | | | Ensure early exeption on non-bytes signature
| * Enforce signature type in ECDSA and add testsStanisław Pitucha2015-08-123-0/+31
| | | | | | | | | | Ensure that ECDSA signatures are bytes to match RSA/DSA and add tests for all three.
* | resolve incorrect docs/naming around DSA (r, s) tuple encode/decodePaul Kehrer2015-08-102-23/+31
|/
* Fixes #2199 -- allow SSH keys to have spaces in their commentsAlex Gaynor2015-08-031-6/+4
|
* Fixed #2143 -- added __hash__ to RSA{Public,Private}NumbersAlex Gaynor2015-07-121-0/+16
|
* do the same simplification to the aad testPaul Kehrer2015-07-011-3/+1
|
* add missing test, simplify encrypted byte near limit calculationPaul Kehrer2015-07-011-3/+15
|
* add additional increment testsPaul Kehrer2015-07-011-8/+18
|
* put the AAD and encrypted byte limit checks in the parent contextPaul Kehrer2015-07-011-0/+30
|
* require serialization in asym testsPaul Kehrer2015-06-274-164/+70
|
* More branch coverage improvements. By virtue of reorganization and a new testAlex Gaynor2015-06-271-0/+21
|
* fix ec_cdata_to_evp_pkey bugPaul Kehrer2015-06-221-0/+18
| | | | | | We weren't actually returning the object and the tests weren't catching it because we didn't try to use the evp_pkey property in the tests. The added test confirms it actually works.
* Remove our workarounds for pyasn.1 bugs, a new pyasn.1 is out!Alex Gaynor2015-06-221-2/+2
|
* Add ConcatKDF from NIST SP 800-56ASimo Sorce2015-06-121-0/+251
| | | | | | | | | The implemention allows the use an HMAC function as per Revision 2 of the document. Conformance of the formatting of the OtherInfo argument is responsability of the calling application. Signed-off-by: Simo Sorce <simo@redhat.com>
* Remove a default argument and rename a private function.Jiangge Zhang2015-06-032-3/+3
|
* Follow the review advice: turn URI generator into methods.Jiangge Zhang2015-06-032-9/+4
|
* Add "generate_key_uri" utility for HOTP/TOTP.Jiangge Zhang2015-05-262-0/+31
|
* Merge pull request #1989 from elitest/fixapachelicPaul Kehrer2015-05-241-12/+3
|\ | | | | Fix dual license in test_dh.py
| * Fix dual license in test_dh.pyJim Shaver2015-05-241-12/+3
| |
* | add support for secp256k1Paul Kehrer2015-05-081-4/+11
| |
* | Refs #1870 - replace six.u with u prefix in tests/hazmat/primitivesEeshan Garg2015-04-297-32/+18
|/
* Merge pull request #1848 from reaperhulk/invalid-tokenAlex Gaynor2015-04-142-2/+4
|\ | | | | Twofactor invalid token
| * Move cryptography.exceptions.InvalidToken to ↵Steven Buss2015-04-132-2/+4
| | | | | | | | cryptography.hazmat.primitives.twofactor
* | Work around pyasn1's willingness to return endOfOctets in DER parsingGeoffrey Thomas2015-04-131-0/+5
|/ | | | See #1838 for discussion.
* DER serialization of DSA private keysPaul Kehrer2015-03-141-24/+86
|
* support DER encoded EC private key serializationPaul Kehrer2015-03-131-12/+93
|