diff options
Diffstat (limited to 'tests/hazmat/primitives/test_keywrap.py')
-rw-r--r-- | tests/hazmat/primitives/test_keywrap.py | 38 |
1 files changed, 19 insertions, 19 deletions
diff --git a/tests/hazmat/primitives/test_keywrap.py b/tests/hazmat/primitives/test_keywrap.py index c74b144b6..9b91ccf36 100644 --- a/tests/hazmat/primitives/test_keywrap.py +++ b/tests/hazmat/primitives/test_keywrap.py @@ -24,15 +24,15 @@ class TestAESKeyWrap(object): _load_all_params( os.path.join("keywrap", "kwtestvectors"), ["KW_AE_128.txt", "KW_AE_192.txt", "KW_AE_256.txt"], - load_nist_vectors - ) + load_nist_vectors, + ), ) @pytest.mark.supported( only_if=lambda backend: backend.cipher_supported( algorithms.AES(b"\x00" * 16), modes.ECB() ), skip_message="Does not support AES key wrap (RFC 3394) because AES-ECB" - " is unsupported", + " is unsupported", ) def test_wrap(self, backend, params): wrapping_key = binascii.unhexlify(params["k"]) @@ -45,15 +45,15 @@ class TestAESKeyWrap(object): _load_all_params( os.path.join("keywrap", "kwtestvectors"), ["KW_AD_128.txt", "KW_AD_192.txt", "KW_AD_256.txt"], - load_nist_vectors - ) + load_nist_vectors, + ), ) @pytest.mark.supported( only_if=lambda backend: backend.cipher_supported( algorithms.AES(b"\x00" * 16), modes.ECB() ), skip_message="Does not support AES key wrap (RFC 3394) because AES-ECB" - " is unsupported", + " is unsupported", ) def test_unwrap(self, backend, params): wrapping_key = binascii.unhexlify(params["k"]) @@ -72,7 +72,7 @@ class TestAESKeyWrap(object): algorithms.AES(b"\x00" * 16), modes.ECB() ), skip_message="Does not support AES key wrap (RFC 3394) because AES-ECB" - " is unsupported", + " is unsupported", ) def test_wrap_invalid_key_length(self, backend): # The wrapping key must be of length [16, 24, 32] @@ -84,7 +84,7 @@ class TestAESKeyWrap(object): algorithms.AES(b"\x00" * 16), modes.ECB() ), skip_message="Does not support AES key wrap (RFC 3394) because AES-ECB" - " is unsupported", + " is unsupported", ) def test_unwrap_invalid_key_length(self, backend): with pytest.raises(ValueError): @@ -95,7 +95,7 @@ class TestAESKeyWrap(object): algorithms.AES(b"\x00" * 16), modes.ECB() ), skip_message="Does not support AES key wrap (RFC 3394) because AES-ECB" - " is unsupported", + " is unsupported", ) def test_wrap_invalid_key_to_wrap_length(self, backend): # Keys to wrap must be at least 16 bytes long @@ -121,7 +121,7 @@ class TestAESKeyWrap(object): algorithms.AES(b"\x00" * 16), modes.ECB() ), skip_message="Does not support AES key wrap (RFC 5649) because AES-ECB" - " is unsupported", + " is unsupported", ) @pytest.mark.requires_backend_interface(interface=CipherBackend) class TestAESKeyWrapWithPadding(object): @@ -130,8 +130,8 @@ class TestAESKeyWrapWithPadding(object): _load_all_params( os.path.join("keywrap", "kwtestvectors"), ["KWP_AE_128.txt", "KWP_AE_192.txt", "KWP_AE_256.txt"], - load_nist_vectors - ) + load_nist_vectors, + ), ) def test_wrap(self, backend, params): wrapping_key = binascii.unhexlify(params["k"]) @@ -143,7 +143,7 @@ class TestAESKeyWrapWithPadding(object): @pytest.mark.parametrize( "params", - _load_all_params("keywrap", ["kwp_botan.txt"], load_nist_vectors) + _load_all_params("keywrap", ["kwp_botan.txt"], load_nist_vectors), ) def test_wrap_additional_vectors(self, backend, params): wrapping_key = binascii.unhexlify(params["key"]) @@ -158,8 +158,8 @@ class TestAESKeyWrapWithPadding(object): _load_all_params( os.path.join("keywrap", "kwtestvectors"), ["KWP_AD_128.txt", "KWP_AD_192.txt", "KWP_AD_256.txt"], - load_nist_vectors - ) + load_nist_vectors, + ), ) def test_unwrap(self, backend, params): wrapping_key = binascii.unhexlify(params["k"]) @@ -177,7 +177,7 @@ class TestAESKeyWrapWithPadding(object): @pytest.mark.parametrize( "params", - _load_all_params("keywrap", ["kwp_botan.txt"], load_nist_vectors) + _load_all_params("keywrap", ["kwp_botan.txt"], load_nist_vectors), ) def test_unwrap_additional_vectors(self, backend, params): wrapping_key = binascii.unhexlify(params["key"]) @@ -190,18 +190,18 @@ class TestAESKeyWrapWithPadding(object): def test_unwrap_invalid_wrapped_key_length(self, backend): # Keys to unwrap must be at least 16 bytes with pytest.raises( - keywrap.InvalidUnwrap, match='Must be at least 16 bytes' + keywrap.InvalidUnwrap, match="Must be at least 16 bytes" ): keywrap.aes_key_unwrap_with_padding( b"sixteen_byte_key", b"\x00" * 15, backend ) def test_wrap_invalid_key_length(self, backend): - with pytest.raises(ValueError, match='must be a valid AES key length'): + with pytest.raises(ValueError, match="must be a valid AES key length"): keywrap.aes_key_wrap_with_padding(b"badkey", b"\x00", backend) def test_unwrap_invalid_key_length(self, backend): - with pytest.raises(ValueError, match='must be a valid AES key length'): + with pytest.raises(ValueError, match="must be a valid AES key length"): keywrap.aes_key_unwrap_with_padding( b"badkey", b"\x00" * 16, backend ) |