diff options
author | Alex Stapleton <alexs@prol.etari.at> | 2014-05-16 15:25:48 +0100 |
---|---|---|
committer | Alex Stapleton <alexs@prol.etari.at> | 2014-05-16 15:25:48 +0100 |
commit | 3a7e9d3f4a9ad32c0782d69620543f6ad3adae93 (patch) | |
tree | 73e814331252a27cba43648ef7cb620eb487d5c2 /tests/hazmat/primitives/test_aes.py | |
parent | d1c0fb8bbe0984d54ba0f4b7a8861bca0e446e19 (diff) | |
parent | 2e36fe1289bcf44f9ba232218a0ee666ea34efd2 (diff) | |
download | cryptography-3a7e9d3f4a9ad32c0782d69620543f6ad3adae93.tar.gz cryptography-3a7e9d3f4a9ad32c0782d69620543f6ad3adae93.tar.bz2 cryptography-3a7e9d3f4a9ad32c0782d69620543f6ad3adae93.zip |
Merge pull request #1043 from reaperhulk/support-some-cfb8
add CFB8 support for AES/3DES on CommonCrypto and OpenSSL backends
Diffstat (limited to 'tests/hazmat/primitives/test_aes.py')
-rw-r--r-- | tests/hazmat/primitives/test_aes.py | 33 |
1 files changed, 33 insertions, 0 deletions
diff --git a/tests/hazmat/primitives/test_aes.py b/tests/hazmat/primitives/test_aes.py index 03be268d..173075d6 100644 --- a/tests/hazmat/primitives/test_aes.py +++ b/tests/hazmat/primitives/test_aes.py @@ -158,6 +158,39 @@ class TestAESModeCFB(object): @pytest.mark.supported( only_if=lambda backend: backend.cipher_supported( + algorithms.AES("\x00" * 16), modes.CFB8("\x00" * 16) + ), + skip_message="Does not support AES CFB8", +) +@pytest.mark.cipher +class TestAESModeCFB8(object): + test_CFB8 = generate_encrypt_test( + load_nist_vectors, + os.path.join("ciphers", "AES", "CFB"), + [ + "CFB8GFSbox128.rsp", + "CFB8GFSbox192.rsp", + "CFB8GFSbox256.rsp", + "CFB8KeySbox128.rsp", + "CFB8KeySbox192.rsp", + "CFB8KeySbox256.rsp", + "CFB8VarKey128.rsp", + "CFB8VarKey192.rsp", + "CFB8VarKey256.rsp", + "CFB8VarTxt128.rsp", + "CFB8VarTxt192.rsp", + "CFB8VarTxt256.rsp", + "CFB8MMT128.rsp", + "CFB8MMT192.rsp", + "CFB8MMT256.rsp", + ], + lambda key, **kwargs: algorithms.AES(binascii.unhexlify(key)), + lambda iv, **kwargs: modes.CFB8(binascii.unhexlify(iv)), + ) + + +@pytest.mark.supported( + only_if=lambda backend: backend.cipher_supported( algorithms.AES("\x00" * 16), modes.CTR("\x00" * 16) ), skip_message="Does not support AES CTR", |