aboutsummaryrefslogtreecommitdiffstats
path: root/tests
diff options
context:
space:
mode:
authorPaul Kehrer <paul.l.kehrer@gmail.com>2015-03-01 17:40:56 -0600
committerPaul Kehrer <paul.l.kehrer@gmail.com>2015-03-01 21:55:09 -0600
commit61ecd279ac3247a925d614c55c1e73d2dd87ea94 (patch)
tree5829fd5f647b2126d14ff1ceece1e905eb504b23 /tests
parentfb9410ddbaeb7e10343ff925bd505633e24c10c7 (diff)
downloadcryptography-61ecd279ac3247a925d614c55c1e73d2dd87ea94.tar.gz
cryptography-61ecd279ac3247a925d614c55c1e73d2dd87ea94.tar.bz2
cryptography-61ecd279ac3247a925d614c55c1e73d2dd87ea94.zip
skip those tests if ec unsupported
Diffstat (limited to 'tests')
-rw-r--r--tests/hazmat/primitives/test_ec.py7
1 files changed, 7 insertions, 0 deletions
diff --git a/tests/hazmat/primitives/test_ec.py b/tests/hazmat/primitives/test_ec.py
index f1c49cf7..e6cb6ce9 100644
--- a/tests/hazmat/primitives/test_ec.py
+++ b/tests/hazmat/primitives/test_ec.py
@@ -418,6 +418,7 @@ class TestECSerialization(object):
)
)
def test_private_bytes_encrypted_pem(self, backend, fmt, password):
+ _skip_curve_unsupported(backend, ec.SECP256R1())
key_bytes = load_vectors_from_file(
os.path.join(
"asymmetric", "PKCS8", "ec_private_key.pem"),
@@ -442,6 +443,7 @@ class TestECSerialization(object):
[serialization.Format.TraditionalOpenSSL, serialization.Format.PKCS8],
)
def test_private_bytes_unencrypted_pem(self, backend, fmt):
+ _skip_curve_unsupported(backend, ec.SECP256R1())
key_bytes = load_vectors_from_file(
os.path.join(
"asymmetric", "PKCS8", "ec_private_key.pem"),
@@ -462,6 +464,7 @@ class TestECSerialization(object):
assert loaded_priv_num == priv_num
def test_private_bytes_traditional_openssl_unencrypted_pem(self, backend):
+ _skip_curve_unsupported(backend, ec.SECP256R1())
key_bytes = load_vectors_from_file(
os.path.join(
"asymmetric", "PEM_Serialization", "ec_private_key.pem"),
@@ -476,6 +479,7 @@ class TestECSerialization(object):
assert serialized == key_bytes
def test_private_bytes_invalid_encoding(self, backend):
+ _skip_curve_unsupported(backend, ec.SECP256R1())
key = load_vectors_from_file(
os.path.join(
"asymmetric", "PKCS8", "ec_private_key.pem"),
@@ -492,6 +496,7 @@ class TestECSerialization(object):
)
def test_private_bytes_invalid_format(self, backend):
+ _skip_curve_unsupported(backend, ec.SECP256R1())
key = load_vectors_from_file(
os.path.join(
"asymmetric", "PKCS8", "ec_private_key.pem"),
@@ -508,6 +513,7 @@ class TestECSerialization(object):
)
def test_private_bytes_invalid_encryption_algorithm(self, backend):
+ _skip_curve_unsupported(backend, ec.SECP256R1())
key = load_vectors_from_file(
os.path.join(
"asymmetric", "PKCS8", "ec_private_key.pem"),
@@ -524,6 +530,7 @@ class TestECSerialization(object):
)
def test_private_bytes_unsupported_encryption_type(self, backend):
+ _skip_curve_unsupported(backend, ec.SECP256R1())
key = load_vectors_from_file(
os.path.join(
"asymmetric", "PKCS8", "ec_private_key.pem"),