diff options
author | Alex Gaynor <alex.gaynor@gmail.com> | 2018-08-01 06:53:39 -0400 |
---|---|---|
committer | Paul Kehrer <paul.l.kehrer@gmail.com> | 2018-08-01 18:53:39 +0800 |
commit | 8d46eafc90793282fb007ed3dde51d761edcf595 (patch) | |
tree | 68e28b2a5cff091e2b1748484c0967847dfea409 /tests/wycheproof/test_aes.py | |
parent | c37d11e1ac05d70a75b86fcdac0b46cdeda8d455 (diff) | |
download | cryptography-8d46eafc90793282fb007ed3dde51d761edcf595.tar.gz cryptography-8d46eafc90793282fb007ed3dde51d761edcf595.tar.bz2 cryptography-8d46eafc90793282fb007ed3dde51d761edcf595.zip |
Updated wycheproof tests for new upstream vectors (#4378)
* updated tests for upstream wycheproof changes
* Updated AES tests
* oops, flake8
Diffstat (limited to 'tests/wycheproof/test_aes.py')
-rw-r--r-- | tests/wycheproof/test_aes.py | 22 |
1 files changed, 16 insertions, 6 deletions
diff --git a/tests/wycheproof/test_aes.py b/tests/wycheproof/test_aes.py index 929ad8dc..a3d75123 100644 --- a/tests/wycheproof/test_aes.py +++ b/tests/wycheproof/test_aes.py @@ -8,6 +8,7 @@ import binascii import pytest +from cryptography.exceptions import InvalidTag from cryptography.hazmat.backends.interfaces import CipherBackend from cryptography.hazmat.primitives import padding from cryptography.hazmat.primitives.ciphers import ( @@ -67,11 +68,19 @@ def test_aes_gcm(backend, wycheproof): dec.authenticate_additional_data(aad) computed_msg = dec.update(ct) + dec.finalize() assert computed_msg == msg - else: - # All invalid GCM tests are IV len 0 right now - assert len(iv) == 0 + elif len(iv) == 0: with pytest.raises(ValueError): Cipher(algorithms.AES(key), modes.GCM(iv), backend) + else: + dec = Cipher( + algorithms.AES(key), + modes.GCM(iv, tag, min_tag_length=len(tag)), + backend + ).decryptor() + dec.authenticate_additional_data(aad) + dec.update(ct) + with pytest.raises(InvalidTag): + dec.finalize() @pytest.mark.requires_backend_interface(interface=CipherBackend) @@ -89,8 +98,9 @@ def test_aes_gcm_aead_api(backend, wycheproof): assert computed_ct == ct + tag computed_msg = aesgcm.decrypt(iv, ct + tag, aad) assert computed_msg == msg - else: - # All invalid GCM tests are IV len 0 right now - assert len(iv) == 0 + elif len(iv) == 0: with pytest.raises(ValueError): aesgcm.encrypt(iv, msg, aad) + else: + with pytest.raises(InvalidTag): + aesgcm.decrypt(iv, ct + tag, aad) |