aboutsummaryrefslogtreecommitdiffstats
path: root/tests/hazmat/primitives/test_blowfish.py
diff options
context:
space:
mode:
authorPaul Kehrer <paul.l.kehrer@gmail.com>2013-10-31 18:46:44 -0500
committerPaul Kehrer <paul.l.kehrer@gmail.com>2013-10-31 18:46:44 -0500
commitd09f3e1448ee593cff51e9d9f6a923b273b83b4a (patch)
treeaad2ec68ef13ad3be28bdf6fb744649f5a0bd9b0 /tests/hazmat/primitives/test_blowfish.py
parent0419e5ef5f8b4f068cc30e006c55158de914c366 (diff)
downloadcryptography-d09f3e1448ee593cff51e9d9f6a923b273b83b4a.tar.gz
cryptography-d09f3e1448ee593cff51e9d9f6a923b273b83b4a.tar.bz2
cryptography-d09f3e1448ee593cff51e9d9f6a923b273b83b4a.zip
add skipif checks for blowfish
Diffstat (limited to 'tests/hazmat/primitives/test_blowfish.py')
-rw-r--r--tests/hazmat/primitives/test_blowfish.py16
1 files changed, 16 insertions, 0 deletions
diff --git a/tests/hazmat/primitives/test_blowfish.py b/tests/hazmat/primitives/test_blowfish.py
index 64ce5175..cd5e03a4 100644
--- a/tests/hazmat/primitives/test_blowfish.py
+++ b/tests/hazmat/primitives/test_blowfish.py
@@ -29,6 +29,10 @@ class TestBlowfish(object):
["bf-ecb.txt"],
lambda key: ciphers.Blowfish(binascii.unhexlify(key)),
lambda key: modes.ECB(),
+ only_if=lambda backend: backend.ciphers.supported(
+ ciphers.Blowfish("\x00" * 56), modes.ECB()
+ ),
+ skip_message="Does not support Blowfish ECB",
)
test_CBC = generate_encrypt_test(
@@ -37,6 +41,10 @@ class TestBlowfish(object):
["bf-cbc.txt"],
lambda key, iv: ciphers.Blowfish(binascii.unhexlify(key)),
lambda key, iv: modes.CBC(binascii.unhexlify(iv)),
+ only_if=lambda backend: backend.ciphers.supported(
+ ciphers.Blowfish("\x00" * 56), modes.CBC("\x00" * 8)
+ ),
+ skip_message="Does not support Blowfish CBC",
)
test_OFB = generate_encrypt_test(
@@ -45,6 +53,10 @@ class TestBlowfish(object):
["bf-ofb.txt"],
lambda key, iv: ciphers.Blowfish(binascii.unhexlify(key)),
lambda key, iv: modes.OFB(binascii.unhexlify(iv)),
+ only_if=lambda backend: backend.ciphers.supported(
+ ciphers.Blowfish("\x00" * 56), modes.OFB("\x00" * 8)
+ ),
+ skip_message="Does not support Blowfish OFB",
)
test_CFB = generate_encrypt_test(
@@ -53,4 +65,8 @@ class TestBlowfish(object):
["bf-cfb.txt"],
lambda key, iv: ciphers.Blowfish(binascii.unhexlify(key)),
lambda key, iv: modes.CFB(binascii.unhexlify(iv)),
+ only_if=lambda backend: backend.ciphers.supported(
+ ciphers.Blowfish("\x00" * 56), modes.CFB("\x00" * 8)
+ ),
+ skip_message="Does not support Blowfish CFB",
)