diff options
author | Alex Gaynor <alex.gaynor@gmail.com> | 2013-10-28 10:09:15 -0700 |
---|---|---|
committer | Alex Gaynor <alex.gaynor@gmail.com> | 2013-10-28 10:09:15 -0700 |
commit | 9d683f71433ca4f2a09052159dc10d2f2dcb3222 (patch) | |
tree | 86928a635b22a4dc36bce266550323533e166ff8 /tests/hazmat/primitives/test_ciphers.py | |
parent | 01fbdf74967f8e22e3ea2d15f195898c64d34cc3 (diff) | |
parent | 0a1550e86fbb8a64a1f534babd76da5afd1c4c11 (diff) | |
download | cryptography-9d683f71433ca4f2a09052159dc10d2f2dcb3222.tar.gz cryptography-9d683f71433ca4f2a09052159dc10d2f2dcb3222.tar.bz2 cryptography-9d683f71433ca4f2a09052159dc10d2f2dcb3222.zip |
Merge pull request #188 from dstufft/hazmat
Create a Hazardous Materials Area
Diffstat (limited to 'tests/hazmat/primitives/test_ciphers.py')
-rw-r--r-- | tests/hazmat/primitives/test_ciphers.py | 67 |
1 files changed, 67 insertions, 0 deletions
diff --git a/tests/hazmat/primitives/test_ciphers.py b/tests/hazmat/primitives/test_ciphers.py new file mode 100644 index 00000000..26b297a2 --- /dev/null +++ b/tests/hazmat/primitives/test_ciphers.py @@ -0,0 +1,67 @@ +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or +# implied. +# See the License for the specific language governing permissions and +# limitations under the License. + +from __future__ import absolute_import, division, print_function + +import binascii + +import pytest + +from cryptography.hazmat.primitives.block.ciphers import ( + AES, Camellia, TripleDES, +) + + +class TestAES(object): + @pytest.mark.parametrize(("key", "keysize"), [ + (b"0" * 32, 128), + (b"0" * 48, 192), + (b"0" * 64, 256), + ]) + def test_key_size(self, key, keysize): + cipher = AES(binascii.unhexlify(key)) + assert cipher.key_size == keysize + + def test_invalid_key_size(self): + with pytest.raises(ValueError): + AES(binascii.unhexlify(b"0" * 12)) + + +class TestCamellia(object): + @pytest.mark.parametrize(("key", "keysize"), [ + (b"0" * 32, 128), + (b"0" * 48, 192), + (b"0" * 64, 256), + ]) + def test_key_size(self, key, keysize): + cipher = Camellia(binascii.unhexlify(key)) + assert cipher.key_size == keysize + + def test_invalid_key_size(self): + with pytest.raises(ValueError): + Camellia(binascii.unhexlify(b"0" * 12)) + + +class TestTripleDES(object): + @pytest.mark.parametrize("key", [ + b"0" * 16, + b"0" * 32, + b"0" * 48, + ]) + def test_key_size(self, key): + cipher = TripleDES(binascii.unhexlify(key)) + assert cipher.key_size == 192 + + def test_invalid_key_size(self): + with pytest.raises(ValueError): + TripleDES(binascii.unhexlify(b"0" * 12)) |