diff options
author | Paul Kehrer <paul.l.kehrer@gmail.com> | 2015-03-01 17:40:56 -0600 |
---|---|---|
committer | Paul Kehrer <paul.l.kehrer@gmail.com> | 2015-03-01 21:55:09 -0600 |
commit | 61ecd279ac3247a925d614c55c1e73d2dd87ea94 (patch) | |
tree | 5829fd5f647b2126d14ff1ceece1e905eb504b23 /tests/hazmat | |
parent | fb9410ddbaeb7e10343ff925bd505633e24c10c7 (diff) | |
download | cryptography-61ecd279ac3247a925d614c55c1e73d2dd87ea94.tar.gz cryptography-61ecd279ac3247a925d614c55c1e73d2dd87ea94.tar.bz2 cryptography-61ecd279ac3247a925d614c55c1e73d2dd87ea94.zip |
skip those tests if ec unsupported
Diffstat (limited to 'tests/hazmat')
-rw-r--r-- | tests/hazmat/primitives/test_ec.py | 7 |
1 files changed, 7 insertions, 0 deletions
diff --git a/tests/hazmat/primitives/test_ec.py b/tests/hazmat/primitives/test_ec.py index f1c49cf7..e6cb6ce9 100644 --- a/tests/hazmat/primitives/test_ec.py +++ b/tests/hazmat/primitives/test_ec.py @@ -418,6 +418,7 @@ class TestECSerialization(object): ) ) def test_private_bytes_encrypted_pem(self, backend, fmt, password): + _skip_curve_unsupported(backend, ec.SECP256R1()) key_bytes = load_vectors_from_file( os.path.join( "asymmetric", "PKCS8", "ec_private_key.pem"), @@ -442,6 +443,7 @@ class TestECSerialization(object): [serialization.Format.TraditionalOpenSSL, serialization.Format.PKCS8], ) def test_private_bytes_unencrypted_pem(self, backend, fmt): + _skip_curve_unsupported(backend, ec.SECP256R1()) key_bytes = load_vectors_from_file( os.path.join( "asymmetric", "PKCS8", "ec_private_key.pem"), @@ -462,6 +464,7 @@ class TestECSerialization(object): assert loaded_priv_num == priv_num def test_private_bytes_traditional_openssl_unencrypted_pem(self, backend): + _skip_curve_unsupported(backend, ec.SECP256R1()) key_bytes = load_vectors_from_file( os.path.join( "asymmetric", "PEM_Serialization", "ec_private_key.pem"), @@ -476,6 +479,7 @@ class TestECSerialization(object): assert serialized == key_bytes def test_private_bytes_invalid_encoding(self, backend): + _skip_curve_unsupported(backend, ec.SECP256R1()) key = load_vectors_from_file( os.path.join( "asymmetric", "PKCS8", "ec_private_key.pem"), @@ -492,6 +496,7 @@ class TestECSerialization(object): ) def test_private_bytes_invalid_format(self, backend): + _skip_curve_unsupported(backend, ec.SECP256R1()) key = load_vectors_from_file( os.path.join( "asymmetric", "PKCS8", "ec_private_key.pem"), @@ -508,6 +513,7 @@ class TestECSerialization(object): ) def test_private_bytes_invalid_encryption_algorithm(self, backend): + _skip_curve_unsupported(backend, ec.SECP256R1()) key = load_vectors_from_file( os.path.join( "asymmetric", "PKCS8", "ec_private_key.pem"), @@ -524,6 +530,7 @@ class TestECSerialization(object): ) def test_private_bytes_unsupported_encryption_type(self, backend): + _skip_curve_unsupported(backend, ec.SECP256R1()) key = load_vectors_from_file( os.path.join( "asymmetric", "PKCS8", "ec_private_key.pem"), |