summaryrefslogtreecommitdiff
path: root/tests/hazmat/primitives/test_keywrap.py
diff options
context:
space:
mode:
Diffstat (limited to 'tests/hazmat/primitives/test_keywrap.py')
-rw-r--r--tests/hazmat/primitives/test_keywrap.py38
1 files changed, 19 insertions, 19 deletions
diff --git a/tests/hazmat/primitives/test_keywrap.py b/tests/hazmat/primitives/test_keywrap.py
index c74b144b6..9b91ccf36 100644
--- a/tests/hazmat/primitives/test_keywrap.py
+++ b/tests/hazmat/primitives/test_keywrap.py
@@ -24,15 +24,15 @@ class TestAESKeyWrap(object):
_load_all_params(
os.path.join("keywrap", "kwtestvectors"),
["KW_AE_128.txt", "KW_AE_192.txt", "KW_AE_256.txt"],
- load_nist_vectors
- )
+ load_nist_vectors,
+ ),
)
@pytest.mark.supported(
only_if=lambda backend: backend.cipher_supported(
algorithms.AES(b"\x00" * 16), modes.ECB()
),
skip_message="Does not support AES key wrap (RFC 3394) because AES-ECB"
- " is unsupported",
+ " is unsupported",
)
def test_wrap(self, backend, params):
wrapping_key = binascii.unhexlify(params["k"])
@@ -45,15 +45,15 @@ class TestAESKeyWrap(object):
_load_all_params(
os.path.join("keywrap", "kwtestvectors"),
["KW_AD_128.txt", "KW_AD_192.txt", "KW_AD_256.txt"],
- load_nist_vectors
- )
+ load_nist_vectors,
+ ),
)
@pytest.mark.supported(
only_if=lambda backend: backend.cipher_supported(
algorithms.AES(b"\x00" * 16), modes.ECB()
),
skip_message="Does not support AES key wrap (RFC 3394) because AES-ECB"
- " is unsupported",
+ " is unsupported",
)
def test_unwrap(self, backend, params):
wrapping_key = binascii.unhexlify(params["k"])
@@ -72,7 +72,7 @@ class TestAESKeyWrap(object):
algorithms.AES(b"\x00" * 16), modes.ECB()
),
skip_message="Does not support AES key wrap (RFC 3394) because AES-ECB"
- " is unsupported",
+ " is unsupported",
)
def test_wrap_invalid_key_length(self, backend):
# The wrapping key must be of length [16, 24, 32]
@@ -84,7 +84,7 @@ class TestAESKeyWrap(object):
algorithms.AES(b"\x00" * 16), modes.ECB()
),
skip_message="Does not support AES key wrap (RFC 3394) because AES-ECB"
- " is unsupported",
+ " is unsupported",
)
def test_unwrap_invalid_key_length(self, backend):
with pytest.raises(ValueError):
@@ -95,7 +95,7 @@ class TestAESKeyWrap(object):
algorithms.AES(b"\x00" * 16), modes.ECB()
),
skip_message="Does not support AES key wrap (RFC 3394) because AES-ECB"
- " is unsupported",
+ " is unsupported",
)
def test_wrap_invalid_key_to_wrap_length(self, backend):
# Keys to wrap must be at least 16 bytes long
@@ -121,7 +121,7 @@ class TestAESKeyWrap(object):
algorithms.AES(b"\x00" * 16), modes.ECB()
),
skip_message="Does not support AES key wrap (RFC 5649) because AES-ECB"
- " is unsupported",
+ " is unsupported",
)
@pytest.mark.requires_backend_interface(interface=CipherBackend)
class TestAESKeyWrapWithPadding(object):
@@ -130,8 +130,8 @@ class TestAESKeyWrapWithPadding(object):
_load_all_params(
os.path.join("keywrap", "kwtestvectors"),
["KWP_AE_128.txt", "KWP_AE_192.txt", "KWP_AE_256.txt"],
- load_nist_vectors
- )
+ load_nist_vectors,
+ ),
)
def test_wrap(self, backend, params):
wrapping_key = binascii.unhexlify(params["k"])
@@ -143,7 +143,7 @@ class TestAESKeyWrapWithPadding(object):
@pytest.mark.parametrize(
"params",
- _load_all_params("keywrap", ["kwp_botan.txt"], load_nist_vectors)
+ _load_all_params("keywrap", ["kwp_botan.txt"], load_nist_vectors),
)
def test_wrap_additional_vectors(self, backend, params):
wrapping_key = binascii.unhexlify(params["key"])
@@ -158,8 +158,8 @@ class TestAESKeyWrapWithPadding(object):
_load_all_params(
os.path.join("keywrap", "kwtestvectors"),
["KWP_AD_128.txt", "KWP_AD_192.txt", "KWP_AD_256.txt"],
- load_nist_vectors
- )
+ load_nist_vectors,
+ ),
)
def test_unwrap(self, backend, params):
wrapping_key = binascii.unhexlify(params["k"])
@@ -177,7 +177,7 @@ class TestAESKeyWrapWithPadding(object):
@pytest.mark.parametrize(
"params",
- _load_all_params("keywrap", ["kwp_botan.txt"], load_nist_vectors)
+ _load_all_params("keywrap", ["kwp_botan.txt"], load_nist_vectors),
)
def test_unwrap_additional_vectors(self, backend, params):
wrapping_key = binascii.unhexlify(params["key"])
@@ -190,18 +190,18 @@ class TestAESKeyWrapWithPadding(object):
def test_unwrap_invalid_wrapped_key_length(self, backend):
# Keys to unwrap must be at least 16 bytes
with pytest.raises(
- keywrap.InvalidUnwrap, match='Must be at least 16 bytes'
+ keywrap.InvalidUnwrap, match="Must be at least 16 bytes"
):
keywrap.aes_key_unwrap_with_padding(
b"sixteen_byte_key", b"\x00" * 15, backend
)
def test_wrap_invalid_key_length(self, backend):
- with pytest.raises(ValueError, match='must be a valid AES key length'):
+ with pytest.raises(ValueError, match="must be a valid AES key length"):
keywrap.aes_key_wrap_with_padding(b"badkey", b"\x00", backend)
def test_unwrap_invalid_key_length(self, backend):
- with pytest.raises(ValueError, match='must be a valid AES key length'):
+ with pytest.raises(ValueError, match="must be a valid AES key length"):
keywrap.aes_key_unwrap_with_padding(
b"badkey", b"\x00" * 16, backend
)