diff options
Diffstat (limited to 'tests')
-rw-r--r-- | tests/hazmat/backends/test_openssl.py | 25 | ||||
-rw-r--r-- | tests/hazmat/bindings/test_utils.py | 25 | ||||
-rw-r--r-- | tests/hazmat/primitives/test_rsa.py | 253 | ||||
-rw-r--r-- | tests/hazmat/primitives/utils.py | 33 | ||||
-rw-r--r-- | tests/test_utils.py | 154 | ||||
-rw-r--r-- | tests/utils.py | 38 |
6 files changed, 512 insertions, 16 deletions
diff --git a/tests/hazmat/backends/test_openssl.py b/tests/hazmat/backends/test_openssl.py index 599d1531..c5d0a013 100644 --- a/tests/hazmat/backends/test_openssl.py +++ b/tests/hazmat/backends/test_openssl.py @@ -21,6 +21,7 @@ from cryptography.exceptions import ( ) from cryptography.hazmat.backends.openssl.backend import backend, Backend from cryptography.hazmat.primitives import interfaces, hashes +from cryptography.hazmat.primitives.asymmetric import rsa, padding from cryptography.hazmat.primitives.ciphers import Cipher from cryptography.hazmat.primitives.ciphers.algorithms import AES from cryptography.hazmat.primitives.ciphers.modes import CBC @@ -137,6 +138,30 @@ class TestOpenSSL(object): with pytest.raises(UnsupportedHash): backend.derive_pbkdf2_hmac(hashes.SHA256(), 10, b"", 1000, b"") + @pytest.mark.skipif( + backend._lib.OPENSSL_VERSION_NUMBER >= 0x1000100f, + reason="Requires an older OpenSSL. Must be < 1.0.1" + ) + def test_non_sha1_pss_mgf1_hash_algorithm_on_old_openssl(self): + private_key = rsa.RSAPrivateKey.generate( + public_exponent=65537, + key_size=512, + backend=backend + ) + public_key = private_key.public_key() + with pytest.raises(UnsupportedHash): + public_key.verifier( + b"sig", + padding.PSS( + mgf=padding.MGF1( + algorithm=hashes.SHA256(), + salt_length=padding.MGF1.MAX_LENGTH + ) + ), + hashes.SHA1(), + backend + ) + # This test is not in the next class because to check if it's really # default we don't want to run the setup_method before it def test_osrandom_engine_is_default(self): diff --git a/tests/hazmat/bindings/test_utils.py b/tests/hazmat/bindings/test_utils.py new file mode 100644 index 00000000..0d5b34de --- /dev/null +++ b/tests/hazmat/bindings/test_utils.py @@ -0,0 +1,25 @@ +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or +# implied. +# See the License for the specific language governing permissions and +# limitations under the License. + +from __future__ import absolute_import, division, print_function + +from cryptography.hazmat.bindings import utils + + +def test_create_modulename(): + cdef_sources = ["cdef sources go here"] + source = "source code" + name = utils._create_modulename(cdef_sources, source, "2.7") + assert name == "_Cryptography_cffi_bcba7f4bx4a14b588" + name = utils._create_modulename(cdef_sources, source, "3.2") + assert name == "_Cryptography_cffi_a7462526x4a14b588" diff --git a/tests/hazmat/primitives/test_rsa.py b/tests/hazmat/primitives/test_rsa.py index 0e88bb7f..955e69c9 100644 --- a/tests/hazmat/primitives/test_rsa.py +++ b/tests/hazmat/primitives/test_rsa.py @@ -21,11 +21,16 @@ import os import pytest from cryptography import exceptions, utils -from cryptography.exceptions import UnsupportedInterface +from cryptography.exceptions import ( + UnsupportedAlgorithm, UnsupportedInterface +) from cryptography.hazmat.primitives import hashes, interfaces from cryptography.hazmat.primitives.asymmetric import rsa, padding -from ...utils import load_pkcs1_vectors, load_vectors_from_file +from .utils import generate_rsa_pss_test +from ...utils import ( + load_pkcs1_vectors, load_vectors_from_file, load_rsa_nist_vectors +) @utils.register_interface(interfaces.AsymmetricPadding) @@ -33,6 +38,10 @@ class DummyPadding(object): name = "UNSUPPORTED-PADDING" +class DummyMGF(object): + pass + + def _modinv(e, m): """ Modular Multiplicative Inverse. Returns x such that: (x*e) mod m == 1 @@ -530,6 +539,122 @@ class TestRSAVerification(object): with pytest.raises(exceptions.InvalidSignature): verifier.verify() + @pytest.mark.parametrize( + "pkcs1_example", + _flatten_pkcs1_examples(load_vectors_from_file( + os.path.join( + "asymmetric", "RSA", "pkcs-1v2-1d2-vec", "pss-vect.txt"), + load_pkcs1_vectors + )) + ) + def test_pss_verification(self, pkcs1_example, backend): + private, public, example = pkcs1_example + public_key = rsa.RSAPublicKey( + public_exponent=public["public_exponent"], + modulus=public["modulus"] + ) + verifier = public_key.verifier( + binascii.unhexlify(example["signature"]), + padding.PSS( + mgf=padding.MGF1( + algorithm=hashes.SHA1(), + salt_length=padding.MGF1.MAX_LENGTH + ) + ), + hashes.SHA1(), + backend + ) + verifier.update(binascii.unhexlify(example["message"])) + verifier.verify() + + def test_invalid_pss_signature_wrong_data(self, backend): + public_key = rsa.RSAPublicKey( + modulus=int( + b"dffc2137d5e810cde9e4b4612f5796447218bab913b3fa98bdf7982e4fa6" + b"ec4d6653ef2b29fb1642b095befcbea6decc178fb4bed243d3c3592c6854" + b"6af2d3f3", 16 + ), + public_exponent=65537 + ) + signature = binascii.unhexlify( + b"0e68c3649df91c5bc3665f96e157efa75b71934aaa514d91e94ca8418d100f45" + b"6f05288e58525f99666bab052adcffdf7186eb40f583bd38d98c97d3d524808b" + ) + verifier = public_key.verifier( + signature, + padding.PSS( + mgf=padding.MGF1( + algorithm=hashes.SHA1(), + salt_length=padding.MGF1.MAX_LENGTH + ) + ), + hashes.SHA1(), + backend + ) + verifier.update(b"incorrect data") + with pytest.raises(exceptions.InvalidSignature): + verifier.verify() + + def test_invalid_pss_signature_wrong_key(self, backend): + signature = binascii.unhexlify( + b"3a1880165014ba6eb53cc1449d13e5132ebcc0cfd9ade6d7a2494a0503bd0826" + b"f8a46c431e0d7be0ca3e453f8b2b009e2733764da7927cc6dbe7a021437a242e" + ) + public_key = rsa.RSAPublicKey( + modulus=int( + b"381201f4905d67dfeb3dec131a0fbea773489227ec7a1448c3109189ac68" + b"5a95441be90866a14c4d2e139cd16db540ec6c7abab13ffff91443fd46a8" + b"960cbb7658ded26a5c95c86f6e40384e1c1239c63e541ba221191c4dd303" + b"231b42e33c6dbddf5ec9a746f09bf0c25d0f8d27f93ee0ae5c0d723348f4" + b"030d3581e13522e1", 16 + ), + public_exponent=65537 + ) + verifier = public_key.verifier( + signature, + padding.PSS( + mgf=padding.MGF1( + algorithm=hashes.SHA1(), + salt_length=padding.MGF1.MAX_LENGTH + ) + ), + hashes.SHA1(), + backend + ) + verifier.update(b"sign me") + with pytest.raises(exceptions.InvalidSignature): + verifier.verify() + + def test_invalid_pss_signature_data_too_large_for_modulus(self, backend): + signature = binascii.unhexlify( + b"cb43bde4f7ab89eb4a79c6e8dd67e0d1af60715da64429d90c716a490b799c29" + b"194cf8046509c6ed851052367a74e2e92d9b38947ed74332acb115a03fcc0222" + ) + public_key = rsa.RSAPublicKey( + modulus=int( + b"381201f4905d67dfeb3dec131a0fbea773489227ec7a1448c3109189ac68" + b"5a95441be90866a14c4d2e139cd16db540ec6c7abab13ffff91443fd46a8" + b"960cbb7658ded26a5c95c86f6e40384e1c1239c63e541ba221191c4dd303" + b"231b42e33c6dbddf5ec9a746f09bf0c25d0f8d27f93ee0ae5c0d723348f4" + b"030d3581e13522", 16 + ), + public_exponent=65537 + ) + verifier = public_key.verifier( + signature, + padding.PSS( + mgf=padding.MGF1( + algorithm=hashes.SHA1(), + salt_length=padding.MGF1.MAX_LENGTH + ) + ), + hashes.SHA1(), + backend + ) + verifier.update(b"sign me") + with pytest.raises(exceptions.InvalidSignature): + verifier.verify() + def test_use_after_finalize(self, backend): private_key = rsa.RSAPrivateKey.generate( public_exponent=65537, @@ -583,6 +708,130 @@ class TestRSAVerification(object): public_key.verifier( b"foo", padding.PKCS1v15(), hashes.SHA256(), pretend_backend) + def test_unsupported_pss_mgf(self, backend): + private_key = rsa.RSAPrivateKey.generate( + public_exponent=65537, + key_size=512, + backend=backend + ) + public_key = private_key.public_key() + with pytest.raises(UnsupportedAlgorithm): + public_key.verifier(b"sig", padding.PSS(mgf=DummyMGF()), + hashes.SHA1(), backend) + + def test_pss_verify_salt_length_too_long(self, backend): + signature = binascii.unhexlify( + b"8b9a3ae9fb3b64158f3476dd8d8a1f1425444e98940e0926378baa9944d219d8" + b"534c050ef6b19b1bdc6eb4da422e89161106a6f5b5cc16135b11eb6439b646bd" + ) + public_key = rsa.RSAPublicKey( + modulus=int( + b"d309e4612809437548b747d7f9eb9cd3340f54fe42bb3f84a36933b0839c" + b"11b0c8b7f67e11f7252370161e31159c49c784d4bc41c42a78ce0f0b40a3" + b"ca8ffb91", 16 + ), + public_exponent=65537 + ) + verifier = public_key.verifier( + signature, + padding.PSS( + mgf=padding.MGF1( + algorithm=hashes.SHA1(), + salt_length=1000000 + ) + ), + hashes.SHA1(), + backend + ) + verifier.update(b"sign me") + with pytest.raises(exceptions.InvalidSignature): + verifier.verify() + + +@pytest.mark.supported( + only_if=lambda backend: backend.mgf1_hash_supported(hashes.SHA1()), + skip_message="Does not support SHA1 with MGF1." +) +@pytest.mark.rsa +class TestRSAPSSMGF1VerificationSHA1(object): + test_rsa_pss_mgf1_sha1 = generate_rsa_pss_test( + load_rsa_nist_vectors, + os.path.join("asymmetric", "RSA", "FIPS_186-2"), + [ + "SigGenPSS_186-2.rsp", + "SigGenPSS_186-3.rsp", + ], + hashes.SHA1() + ) + + +@pytest.mark.supported( + only_if=lambda backend: backend.mgf1_hash_supported(hashes.SHA224()), + skip_message="Does not support SHA224 with MGF1." +) +@pytest.mark.rsa +class TestRSAPSSMGF1VerificationSHA224(object): + test_rsa_pss_mgf1_sha224 = generate_rsa_pss_test( + load_rsa_nist_vectors, + os.path.join("asymmetric", "RSA", "FIPS_186-2"), + [ + "SigGenPSS_186-2.rsp", + "SigGenPSS_186-3.rsp", + ], + hashes.SHA224() + ) + + +@pytest.mark.supported( + only_if=lambda backend: backend.mgf1_hash_supported(hashes.SHA256()), + skip_message="Does not support SHA256 with MGF1." +) +@pytest.mark.rsa +class TestRSAPSSMGF1VerificationSHA256(object): + test_rsa_pss_mgf1_sha256 = generate_rsa_pss_test( + load_rsa_nist_vectors, + os.path.join("asymmetric", "RSA", "FIPS_186-2"), + [ + "SigGenPSS_186-2.rsp", + "SigGenPSS_186-3.rsp", + ], + hashes.SHA256() + ) + + +@pytest.mark.supported( + only_if=lambda backend: backend.mgf1_hash_supported(hashes.SHA384()), + skip_message="Does not support SHA384 with MGF1." +) +@pytest.mark.rsa +class TestRSAPSSMGF1VerificationSHA384(object): + test_rsa_pss_mgf1_sha384 = generate_rsa_pss_test( + load_rsa_nist_vectors, + os.path.join("asymmetric", "RSA", "FIPS_186-2"), + [ + "SigGenPSS_186-2.rsp", + "SigGenPSS_186-3.rsp", + ], + hashes.SHA384() + ) + + +@pytest.mark.supported( + only_if=lambda backend: backend.mgf1_hash_supported(hashes.SHA512()), + skip_message="Does not support SHA512 with MGF1." +) +@pytest.mark.rsa +class TestRSAPSSMGF1VerificationSHA512(object): + test_rsa_pss_mgf1_sha512 = generate_rsa_pss_test( + load_rsa_nist_vectors, + os.path.join("asymmetric", "RSA", "FIPS_186-2"), + [ + "SigGenPSS_186-2.rsp", + "SigGenPSS_186-3.rsp", + ], + hashes.SHA512() + ) + class TestMGF1(object): def test_invalid_hash_algorithm(self): diff --git a/tests/hazmat/primitives/utils.py b/tests/hazmat/primitives/utils.py index f0a00319..31491023 100644 --- a/tests/hazmat/primitives/utils.py +++ b/tests/hazmat/primitives/utils.py @@ -21,6 +21,7 @@ import itertools import pytest from cryptography.hazmat.primitives import hashes, hmac +from cryptography.hazmat.primitives.asymmetric import rsa, padding from cryptography.hazmat.primitives.kdf.pbkdf2 import PBKDF2HMAC from cryptography.hazmat.primitives.ciphers import Cipher from cryptography.hazmat.primitives.kdf.hkdf import HKDF @@ -373,3 +374,35 @@ def generate_hkdf_test(param_loader, path, file_names, algorithm): hkdf_test(backend, algorithm, params) return test_hkdf + + +def generate_rsa_pss_test(param_loader, path, file_names, hash_alg): + all_params = _load_all_params(path, file_names, param_loader) + all_params = [i for i in all_params + if i["algorithm"] == hash_alg.name.upper()] + + @pytest.mark.parametrize("params", all_params) + def test_rsa_pss(self, backend, params): + rsa_pss_test(backend, params, hash_alg) + + return test_rsa_pss + + +def rsa_pss_test(backend, params, hash_alg): + public_key = rsa.RSAPublicKey( + public_exponent=params["public_exponent"], + modulus=params["modulus"] + ) + verifier = public_key.verifier( + binascii.unhexlify(params["s"]), + padding.PSS( + mgf=padding.MGF1( + algorithm=hash_alg, + salt_length=params["salt_length"] + ) + ), + hash_alg, + backend + ) + verifier.update(binascii.unhexlify(params["msg"])) + verifier.verify() diff --git a/tests/test_utils.py b/tests/test_utils.py index 433dab04..1003d61d 100644 --- a/tests/test_utils.py +++ b/tests/test_utils.py @@ -1042,6 +1042,9 @@ def test_load_totp_vectors(): def test_load_rsa_nist_vectors(): vector_data = textwrap.dedent(""" + # CAVS 11.4 + # "SigGen PKCS#1 RSASSA-PSS" information + # Mod sizes selected: 1024 1536 2048 3072 4096 # SHA Algorithm selected:SHA1 SHA224 SHA256 SHA384 SHA512 # Salt len: 20 @@ -1075,31 +1078,170 @@ def test_load_rsa_nist_vectors(): "modulus": int("bcb47b2e0dafcba81ff2a2b5cb115ca7e757184c9d72bcdcda" "707a146b3b4e29989d", 16), "public_exponent": 65537, - "algorithm": b"SHA1", + "algorithm": "SHA1", "salt_length": 20, "msg": b"1248f62a4389f42f7b4bb131053d6c88a994db2075b912ccbe3ea7dc6" b"11714f14e", "s": b"682cf53c1145d22a50caa9eb1a9ba70670c5915e0fdfde6457a765de2a8" - b"fe12de97" + b"fe12de97", + "fail": False }, { "modulus": int("bcb47b2e0dafcba81ff2a2b5cb115ca7e757184c9d72bcdcda" "707a146b3b4e29989d", 16), "public_exponent": 65537, - "algorithm": b"SHA384", + "algorithm": "SHA384", "salt_length": 20, "msg": b"e511903c2f1bfba245467295ac95413ac4746c984c3750a728c388aa6" b"28b0ebf", "s": b"9c748702bbcc1f9468864cd360c8c39d007b2d8aaee833606c70f7593cf" - b"0d1519" + b"0d1519", + "fail": False }, { "modulus": 78187493520, "public_exponent": 65537, - "algorithm": b"SHA512", + "algorithm": "SHA512", "salt_length": 20, "msg": b"3456781293fab829", - "s": b"deadbeef0000" + "s": b"deadbeef0000", + "fail": False + }, + ] + + +def test_load_rsa_nist_pkcs1v15_verification_vectors(): + vector_data = textwrap.dedent(""" + # CAVS 11.0 + # "SigVer PKCS#1 Ver 1.5" information + # Mod sizes selected: 1024 1536 2048 3072 4096 + # SHA Algorithm selected:SHA1 SHA224 SHA256 SHA384 SHA512 + # Generated on Wed Mar 02 00:13:02 2011 + + [mod = 1024] + + n = be499b5e7f06c83fa0293e31465c8eb6b58af920bae52a7b5b9bfeb7aa72db126411 + + p = e7a80c5d211c06acb900939495f26d365fc2b4825b75e356f89003eaa5931e6be5c3 + q = d248aa248000f720258742da67b711940c8f76e1ecd52b67a6ffe1e49354d66ff84f + + SHAAlg = SHA1 + e = 00000000000000000000000000000000000000000000000000000000000000000011 + d = 0d0f17362bdad181db4e1fe03e8de1a3208989914e14bf269558826bfa20faf4b68d + Msg = 6b9cfac0ba1c7890b13e381ce752195cc1375237db2afcf6a9dcd1f95ec733a80c + S = 562d87b5781c01d166fef3972669a0495c145b898a17df4743fbefb0a1582bd6ba9d + SaltVal = 11223344555432167890 + Result = F (3 - Signature changed ) + + SHAAlg = SHA1 + e = 0000000000003 + d = bfa20faf4b68d + Msg = 2a67c70ff14f9b34ddb42e6f89d5971057a0da980fc9ae70c81a84da0c0ac42737 + S = 2b91c6ae2b3c46ff18d5b7abe239634cb752d0acb53eea0ccd8ea8483036a50e8faf + SaltVal = 11223344555432167890 + Result = P + """).splitlines() + + vectors = load_rsa_nist_vectors(vector_data) + assert vectors == [ + { + "modulus": int("be499b5e7f06c83fa0293e31465c8eb6b58af920bae52a7b5b" + "9bfeb7aa72db126411", 16), + "p": int("e7a80c5d211c06acb900939495f26d365fc2b4825b75e356f89003ea" + "a5931e6be5c3", 16), + "q": int("d248aa248000f720258742da67b711940c8f76e1ecd52b67a6ffe1e4" + "9354d66ff84f", 16), + "public_exponent": 17, + "algorithm": "SHA1", + "private_exponent": int("0d0f17362bdad181db4e1fe03e8de1a3208989914" + "e14bf269558826bfa20faf4b68d", 16), + "msg": b"6b9cfac0ba1c7890b13e381ce752195cc1375237db2afcf6a9dcd1f95" + b"ec733a80c", + "s": b"562d87b5781c01d166fef3972669a0495c145b898a17df4743fbefb0a15" + b"82bd6ba9d", + "saltval": b"11223344555432167890", + "fail": True + }, + { + "modulus": int("be499b5e7f06c83fa0293e31465c8eb6b58af920bae52a7b5b" + "9bfeb7aa72db126411", 16), + "p": int("e7a80c5d211c06acb900939495f26d365fc2b4825b75e356f89003ea" + "a5931e6be5c3", 16), + "q": int("d248aa248000f720258742da67b711940c8f76e1ecd52b67a6ffe1e4" + "9354d66ff84f", 16), + "public_exponent": 3, + "algorithm": "SHA1", + "private_exponent": int("bfa20faf4b68d", 16), + "msg": b"2a67c70ff14f9b34ddb42e6f89d5971057a0da980fc9ae70c81a84da0" + b"c0ac42737", + "s": b"2b91c6ae2b3c46ff18d5b7abe239634cb752d0acb53eea0ccd8ea848303" + b"6a50e8faf", + "saltval": b"11223344555432167890", + "fail": False + }, + ] + + +def test_load_rsa_nist_pss_verification_vectors(): + vector_data = textwrap.dedent(""" + # CAVS 11.0 + # "SigVer PKCS#1 RSASSA-PSS" information + # Mod sizes selected: 1024 1536 2048 3072 4096 + # SHA Algorithm selected:SHA1 SHA224 SHA256 SHA384 SHA512 + # Salt len: 10 + # Generated on Wed Mar 02 00:25:22 2011 + + [mod = 1024] + + n = be499b5e7f06c83fa0293e31465c8eb6b5 + + p = e7a80c5d211c06acb900939495f26d365f + q = d248aa248000f720258742da67b711940c + + SHAAlg = SHA1 + e = 00000000000000011 + d = c8e26a88239672cf49b3422a07c4d834ba + Msg = 6b9cfac0ba1c7890b13e381ce752195c + S = 562d87b5781c01d166fef3972669a0495c + SaltVal = 11223344555432167890 + Result = F (3 - Signature changed ) + + SHAAlg = SHA384 + e = 000003 + d = 0d0f17362bdad181db4e1fe03e8de1a320 + Msg = 2a67c70ff14f9b34ddb42e6f89d59710 + S = 2b91c6ae2b3c46ff18d5b7abe239634cb7 + SaltVal = 11223344555432167890 + Result = P + """).splitlines() + + vectors = load_rsa_nist_vectors(vector_data) + assert vectors == [ + { + "modulus": int("be499b5e7f06c83fa0293e31465c8eb6b5", 16), + "p": int("e7a80c5d211c06acb900939495f26d365f", 16), + "q": int("d248aa248000f720258742da67b711940c", 16), + "public_exponent": 17, + "algorithm": "SHA1", + "private_exponent": int("c8e26a88239672cf49b3422a07c4d834ba", 16), + "msg": b"6b9cfac0ba1c7890b13e381ce752195c", + "s": b"562d87b5781c01d166fef3972669a0495c", + "saltval": b"11223344555432167890", + "salt_length": 10, + "fail": True + }, + { + "modulus": int("be499b5e7f06c83fa0293e31465c8eb6b5", 16), + "p": int("e7a80c5d211c06acb900939495f26d365f", 16), + "q": int("d248aa248000f720258742da67b711940c", 16), + "public_exponent": 3, + "algorithm": "SHA384", + "private_exponent": int("0d0f17362bdad181db4e1fe03e8de1a320", 16), + "msg": b"2a67c70ff14f9b34ddb42e6f89d59710", + "s": b"2b91c6ae2b3c46ff18d5b7abe239634cb7", + "saltval": b"11223344555432167890", + "salt_length": 10, + "fail": False }, ] diff --git a/tests/utils.py b/tests/utils.py index 720a9054..4d6882c2 100644 --- a/tests/utils.py +++ b/tests/utils.py @@ -302,6 +302,8 @@ def load_pkcs1_vectors(vector_data): def load_rsa_nist_vectors(vector_data): test_data = None + p = None + salt_length = None data = [] for line in vector_data: @@ -322,17 +324,37 @@ def load_rsa_nist_vectors(vector_data): if name == "n": n = int(value, 16) - elif name == "e": + elif name == "e" and p is None: e = int(value, 16) + elif name == "p": + p = int(value, 16) + elif name == "q": + q = int(value, 16) elif name == "SHAAlg": - test_data = { - "modulus": n, - "public_exponent": e, - "salt_length": salt_length, - "algorithm": value.encode("ascii") - } + if p is None: + test_data = { + "modulus": n, + "public_exponent": e, + "salt_length": salt_length, + "algorithm": value, + "fail": False + } + else: + test_data = { + "modulus": n, + "p": p, + "q": q, + "algorithm": value + } + if salt_length is not None: + test_data["salt_length"] = salt_length data.append(test_data) - continue + elif name == "e" and p is not None: + test_data["public_exponent"] = int(value, 16) + elif name == "d": + test_data["private_exponent"] = int(value, 16) + elif name == "Result": + test_data["fail"] = value.startswith("F") # For all other tokens we simply want the name, value stored in # the dictionary else: |