diff options
author | Paul Kehrer <paul.l.kehrer@gmail.com> | 2015-08-05 18:32:18 +0100 |
---|---|---|
committer | Paul Kehrer <paul.l.kehrer@gmail.com> | 2015-08-05 18:32:18 +0100 |
commit | d4a7f062d7dc9330fb701086dd06ac81a5b1e3d5 (patch) | |
tree | 41881d81d4ec27a19e846d7af5c110a6c3eae651 /tests | |
parent | f22f61234470bd5c86c80ae409b2698d2a2da1a5 (diff) | |
download | cryptography-d4a7f062d7dc9330fb701086dd06ac81a5b1e3d5.tar.gz cryptography-d4a7f062d7dc9330fb701086dd06ac81a5b1e3d5.tar.bz2 cryptography-d4a7f062d7dc9330fb701086dd06ac81a5b1e3d5.zip |
rename to classmethod to from_public_key
Diffstat (limited to 'tests')
-rw-r--r-- | tests/test_x509_ext.py | 12 |
1 files changed, 6 insertions, 6 deletions
diff --git a/tests/test_x509_ext.py b/tests/test_x509_ext.py index 4c7cce54..73cdfc5f 100644 --- a/tests/test_x509_ext.py +++ b/tests/test_x509_ext.py @@ -955,7 +955,7 @@ class TestSubjectKeyIdentifierExtension(object): @pytest.mark.requires_backend_interface(interface=RSABackend) @pytest.mark.requires_backend_interface(interface=X509Backend) - def test_create_from_rsa_public_key(self, backend): + def test_from_rsa_public_key(self, backend): cert = _load_cert( os.path.join("x509", "PKITS_data", "certs", "GoodCACert.crt"), x509.load_der_x509_certificate, @@ -964,14 +964,14 @@ class TestSubjectKeyIdentifierExtension(object): ext = cert.extensions.get_extension_for_oid( x509.OID_SUBJECT_KEY_IDENTIFIER ) - ski = x509.SubjectKeyIdentifier.create_from_public_key( + ski = x509.SubjectKeyIdentifier.from_public_key( cert.public_key() ) assert ext.value == ski @pytest.mark.requires_backend_interface(interface=DSABackend) @pytest.mark.requires_backend_interface(interface=X509Backend) - def test_create_from_dsa_public_key(self, backend): + def test_from_dsa_public_key(self, backend): cert = _load_cert( os.path.join("x509", "custom", "dsa_selfsigned_ca.pem"), x509.load_pem_x509_certificate, @@ -981,14 +981,14 @@ class TestSubjectKeyIdentifierExtension(object): ext = cert.extensions.get_extension_for_oid( x509.OID_SUBJECT_KEY_IDENTIFIER ) - ski = x509.SubjectKeyIdentifier.create_from_public_key( + ski = x509.SubjectKeyIdentifier.from_public_key( cert.public_key() ) assert ext.value == ski @pytest.mark.requires_backend_interface(interface=EllipticCurveBackend) @pytest.mark.requires_backend_interface(interface=X509Backend) - def test_create_from_ec_public_key(self, backend): + def test_from_ec_public_key(self, backend): _skip_curve_unsupported(backend, ec.SECP384R1()) cert = _load_cert( os.path.join("x509", "ecdsa_root.pem"), @@ -999,7 +999,7 @@ class TestSubjectKeyIdentifierExtension(object): ext = cert.extensions.get_extension_for_oid( x509.OID_SUBJECT_KEY_IDENTIFIER ) - ski = x509.SubjectKeyIdentifier.create_from_public_key( + ski = x509.SubjectKeyIdentifier.from_public_key( cert.public_key() ) assert ext.value == ski |