summaryrefslogtreecommitdiff
path: root/tests/test_dnssec.py
diff options
context:
space:
mode:
authorSimo Sorce <idra@samba.org>2020-04-07 18:10:06 -0400
committerSimo Sorce <idra@samba.org>2020-04-07 18:23:59 -0400
commite93853e691a7308baddd1497120e35bcb9d0bcb0 (patch)
treeb667a617f73ce9403344b67aa49b129036b80539 /tests/test_dnssec.py
parent7316b156f44c4986a5b96e29992fb3f873f09f21 (diff)
downloaddnspython-e93853e691a7308baddd1497120e35bcb9d0bcb0.tar.gz
Use python cryptography for DNSSEC
Signed-off-by: Simo Sorce <simo@redhat.com>
Diffstat (limited to 'tests/test_dnssec.py')
-rw-r--r--tests/test_dnssec.py20
1 files changed, 2 insertions, 18 deletions
diff --git a/tests/test_dnssec.py b/tests/test_dnssec.py
index 16ad37d..b57d3c6 100644
--- a/tests/test_dnssec.py
+++ b/tests/test_dnssec.py
@@ -197,8 +197,8 @@ abs_ed448_mx_rrsig_2 = dns.rrset.from_text('example.com.', 3600, 'IN', 'RRSIG',
when5 = 1440021600
-@unittest.skipUnless(dns.dnssec._have_pycrypto,
- "Pycryptodome cannot be imported")
+@unittest.skipUnless(dns.dnssec._have_pyca,
+ "Python Cryptography cannot be imported")
class DNSSECValidatorTestCase(unittest.TestCase):
def testAbsoluteRSAGood(self): # type: () -> None
@@ -253,20 +253,12 @@ class DNSSECValidatorTestCase(unittest.TestCase):
abs_ecdsa384_keys, None, when4)
self.assertRaises(dns.dnssec.ValidationFailure, bad)
- @unittest.skipUnless(dns.dnssec._have_ecpy,
- "python EDDSA cannot be imported")
- @unittest.skipUnless(sys.version_info >= (3, 6),
- "Python 3.6 or later is needed")
def testAbsoluteED25519Good(self): # type: () -> None
dns.dnssec.validate(abs_ed25519_mx, abs_ed25519_mx_rrsig_1,
abs_ed25519_keys_1, None, when5)
dns.dnssec.validate(abs_ed25519_mx, abs_ed25519_mx_rrsig_2,
abs_ed25519_keys_2, None, when5)
- @unittest.skipUnless(dns.dnssec._have_ecpy,
- "python EDDSA cannot be imported")
- @unittest.skipUnless(sys.version_info >= (3, 6),
- "Python 3.6 or later is needed")
def testAbsoluteED25519Bad(self): # type: () -> None
with self.assertRaises(dns.dnssec.ValidationFailure):
dns.dnssec.validate(abs_other_ed25519_mx, abs_ed25519_mx_rrsig_1,
@@ -275,20 +267,12 @@ class DNSSECValidatorTestCase(unittest.TestCase):
dns.dnssec.validate(abs_other_ed25519_mx, abs_ed25519_mx_rrsig_2,
abs_ed25519_keys_2, None, when5)
- @unittest.skipUnless(dns.dnssec._have_ecpy,
- "python EDDSA cannot be imported")
- @unittest.skipUnless(sys.version_info >= (3, 6),
- "Python 3.6 or later is needed")
def testAbsoluteED448Good(self): # type: () -> None
dns.dnssec.validate(abs_ed448_mx, abs_ed448_mx_rrsig_1,
abs_ed448_keys_1, None, when5)
dns.dnssec.validate(abs_ed448_mx, abs_ed448_mx_rrsig_2,
abs_ed448_keys_2, None, when5)
- @unittest.skipUnless(dns.dnssec._have_ecpy,
- "python EDDSA cannot be imported")
- @unittest.skipUnless(sys.version_info >= (3, 6),
- "Python 3.6 or later is needed")
def testAbsoluteED448Bad(self): # type: () -> None
with self.assertRaises(dns.dnssec.ValidationFailure):
dns.dnssec.validate(abs_other_ed448_mx, abs_ed448_mx_rrsig_1,