diff options
author | adamantike <mike@fmanganiello.com.ar> | 2016-05-08 15:36:57 -0300 |
---|---|---|
committer | adamantike <mike@fmanganiello.com.ar> | 2016-05-08 15:41:47 -0300 |
commit | 9f57740ec47f828b2be0cf0a104638c4abee9c3d (patch) | |
tree | 97815e235b5237035706d7cd2791e22cc5fdb548 /tests | |
parent | 505a25a1ada6f0d2b161ac7d12e626c7965f16f5 (diff) | |
download | rsa-git-9f57740ec47f828b2be0cf0a104638c4abee9c3d.tar.gz |
Drop byte_literal in favour of b''
Diffstat (limited to 'tests')
-rw-r--r-- | tests/test_cli.py | 7 | ||||
-rw-r--r-- | tests/test_common.py | 6 | ||||
-rw-r--r-- | tests/test_compat.py | 4 | ||||
-rw-r--r-- | tests/test_load_save_keys.py | 30 | ||||
-rw-r--r-- | tests/test_pem.py | 6 | ||||
-rw-r--r-- | tests/test_pkcs1.py | 10 | ||||
-rw-r--r-- | tests/test_transform.py | 25 |
7 files changed, 42 insertions, 46 deletions
diff --git a/tests/test_cli.py b/tests/test_cli.py index aad734a..4ae8da3 100644 --- a/tests/test_cli.py +++ b/tests/test_cli.py @@ -15,7 +15,6 @@ from io import StringIO, BytesIO import rsa import rsa.cli import rsa.util -from rsa._compat import b if sys.version_info[0] < 3: def make_buffer(): @@ -135,8 +134,8 @@ class KeygenTest(AbstractCliTest): rsa.cli.keygen() lines = get_bytes_out(out).splitlines() - self.assertEqual(b('-----BEGIN RSA PRIVATE KEY-----'), lines[0]) - self.assertEqual(b('-----END RSA PRIVATE KEY-----'), lines[-1]) + self.assertEqual(b'-----BEGIN RSA PRIVATE KEY-----', lines[0]) + self.assertEqual(b'-----END RSA PRIVATE KEY-----', lines[-1]) # The key size should be shown on stderr self.assertTrue('128-bit key' in err.getvalue()) @@ -217,7 +216,7 @@ class EncryptDecryptTest(AbstractCliTest): # We should have the original cleartext on stdout now. output = get_bytes_out(out) - self.assertEqual(b('Hello cleartext RSA users!'), output) + self.assertEqual(b'Hello cleartext RSA users!', output) @cleanup_files('encrypted.txt', 'cleartext.txt') def test_encrypt_decrypt_unhappy(self): diff --git a/tests/test_common.py b/tests/test_common.py index e26e004..af13695 100644 --- a/tests/test_common.py +++ b/tests/test_common.py @@ -17,14 +17,14 @@ import unittest import struct -from rsa._compat import byte, b +from rsa._compat import byte from rsa.common import byte_size, bit_size, inverse class TestByte(unittest.TestCase): def test_values(self): - self.assertEqual(byte(0), b('\x00')) - self.assertEqual(byte(255), b('\xff')) + self.assertEqual(byte(0), b'\x00') + self.assertEqual(byte(255), b'\xff') def test_struct_error_when_out_of_bounds(self): self.assertRaises(struct.error, byte, 256) diff --git a/tests/test_compat.py b/tests/test_compat.py index 2a58df5..0013155 100644 --- a/tests/test_compat.py +++ b/tests/test_compat.py @@ -18,7 +18,7 @@ import unittest import struct import sys -from rsa._compat import b, byte, is_bytes, range +from rsa._compat import byte, is_bytes, range class TestByte(unittest.TestCase): @@ -33,4 +33,4 @@ class TestByte(unittest.TestCase): self.assertRaises(struct.error, byte, -1) def test_byte_literal(self): - self.assertIsInstance(b('abc'), bytes) + self.assertIsInstance(b'abc', bytes) diff --git a/tests/test_load_save_keys.py b/tests/test_load_save_keys.py index 0caa067..ef6584b 100644 --- a/tests/test_load_save_keys.py +++ b/tests/test_load_save_keys.py @@ -21,55 +21,53 @@ import unittest import os.path import pickle -from rsa._compat import b - import rsa.key -B64PRIV_DER = b('MC4CAQACBQDeKYlRAgMBAAECBQDHn4npAgMA/icCAwDfxwIDANcXAgInbwIDAMZt') +B64PRIV_DER = b'MC4CAQACBQDeKYlRAgMBAAECBQDHn4npAgMA/icCAwDfxwIDANcXAgInbwIDAMZt' PRIVATE_DER = base64.standard_b64decode(B64PRIV_DER) -B64PUB_DER = b('MAwCBQDeKYlRAgMBAAE=') +B64PUB_DER = b'MAwCBQDeKYlRAgMBAAE=' PUBLIC_DER = base64.standard_b64decode(B64PUB_DER) -PRIVATE_PEM = b(''' +PRIVATE_PEM = b'''\ -----BEGIN CONFUSING STUFF----- Cruft before the key -----BEGIN RSA PRIVATE KEY----- Comment: something blah -%s +''' + B64PRIV_DER + b''' -----END RSA PRIVATE KEY----- Stuff after the key -----END CONFUSING STUFF----- -''' % B64PRIV_DER.decode("utf-8")) +''' -CLEAN_PRIVATE_PEM = b('''\ +CLEAN_PRIVATE_PEM = b'''\ -----BEGIN RSA PRIVATE KEY----- -%s +''' + B64PRIV_DER + b''' -----END RSA PRIVATE KEY----- -''' % B64PRIV_DER.decode("utf-8")) +''' -PUBLIC_PEM = b(''' +PUBLIC_PEM = b'''\ -----BEGIN CONFUSING STUFF----- Cruft before the key -----BEGIN RSA PUBLIC KEY----- Comment: something blah -%s +''' + B64PUB_DER + b''' -----END RSA PUBLIC KEY----- Stuff after the key -----END CONFUSING STUFF----- -''' % B64PUB_DER.decode("utf-8")) +''' -CLEAN_PUBLIC_PEM = b('''\ +CLEAN_PUBLIC_PEM = b'''\ -----BEGIN RSA PUBLIC KEY----- -%s +''' + B64PUB_DER + b''' -----END RSA PUBLIC KEY----- -''' % B64PUB_DER.decode("utf-8")) +''' class DerTest(unittest.TestCase): diff --git a/tests/test_pem.py b/tests/test_pem.py index 3e03ab0..5fb9600 100644 --- a/tests/test_pem.py +++ b/tests/test_pem.py @@ -17,7 +17,7 @@ import unittest -from rsa._compat import b, is_bytes +from rsa._compat import is_bytes from rsa.pem import _markers import rsa.key @@ -49,8 +49,8 @@ prime2 = 88103681619592083641803383393198542599284510949756076218404908654323473 class TestMarkers(unittest.TestCase): def test_values(self): self.assertEqual(_markers('RSA PRIVATE KEY'), - (b('-----BEGIN RSA PRIVATE KEY-----'), - b('-----END RSA PRIVATE KEY-----'))) + (b'-----BEGIN RSA PRIVATE KEY-----', + b'-----END RSA PRIVATE KEY-----')) class TestBytesAndStrings(unittest.TestCase): diff --git a/tests/test_pkcs1.py b/tests/test_pkcs1.py index 5702aae..bd1fd81 100644 --- a/tests/test_pkcs1.py +++ b/tests/test_pkcs1.py @@ -21,7 +21,7 @@ import unittest import rsa from rsa import pkcs1 -from rsa._compat import byte, b, is_bytes +from rsa._compat import byte, is_bytes class BinaryTest(unittest.TestCase): @@ -73,7 +73,7 @@ class SignatureTest(unittest.TestCase): def test_sign_verify(self): """Test happy flow of sign and verify""" - message = b('je moeder') + message = b'je moeder' print("\tMessage: %r" % message) signature = pkcs1.sign(message, self.priv, 'SHA-256') @@ -84,16 +84,16 @@ class SignatureTest(unittest.TestCase): def test_alter_message(self): """Altering the message should let the verification fail.""" - signature = pkcs1.sign(b('je moeder'), self.priv, 'SHA-256') + signature = pkcs1.sign(b'je moeder', self.priv, 'SHA-256') self.assertRaises(pkcs1.VerificationError, pkcs1.verify, - b('mijn moeder'), signature, self.pub) + b'mijn moeder', signature, self.pub) def test_sign_different_key(self): """Signing with another key should let the verification fail.""" (otherpub, _) = rsa.newkeys(512) - message = b('je moeder') + message = b'je moeder' signature = pkcs1.sign(message, self.priv, 'SHA-256') self.assertRaises(pkcs1.VerificationError, pkcs1.verify, message, signature, otherpub) diff --git a/tests/test_transform.py b/tests/test_transform.py index 7fe121b..fe0970c 100644 --- a/tests/test_transform.py +++ b/tests/test_transform.py @@ -15,37 +15,36 @@ # limitations under the License. import unittest -from rsa._compat import b from rsa.transform import int2bytes, bytes2int, _int2bytes class Test_int2bytes(unittest.TestCase): def test_accuracy(self): - self.assertEqual(int2bytes(123456789), b('\x07[\xcd\x15')) - self.assertEqual(_int2bytes(123456789), b('\x07[\xcd\x15')) + self.assertEqual(int2bytes(123456789), b'\x07[\xcd\x15') + self.assertEqual(_int2bytes(123456789), b'\x07[\xcd\x15') def test_codec_identity(self): self.assertEqual(bytes2int(int2bytes(123456789, 128)), 123456789) self.assertEqual(bytes2int(_int2bytes(123456789, 128)), 123456789) def test_chunk_size(self): - self.assertEqual(int2bytes(123456789, 6), b('\x00\x00\x07[\xcd\x15')) + self.assertEqual(int2bytes(123456789, 6), b'\x00\x00\x07[\xcd\x15') self.assertEqual(int2bytes(123456789, 7), - b('\x00\x00\x00\x07[\xcd\x15')) + b'\x00\x00\x00\x07[\xcd\x15') self.assertEqual(_int2bytes(123456789, 6), - b('\x00\x00\x07[\xcd\x15')) + b'\x00\x00\x07[\xcd\x15') self.assertEqual(_int2bytes(123456789, 7), - b('\x00\x00\x00\x07[\xcd\x15')) + b'\x00\x00\x00\x07[\xcd\x15') def test_zero(self): - self.assertEqual(int2bytes(0, 4), b('\x00') * 4) - self.assertEqual(int2bytes(0, 7), b('\x00') * 7) - self.assertEqual(int2bytes(0), b('\x00')) + self.assertEqual(int2bytes(0, 4), b'\x00' * 4) + self.assertEqual(int2bytes(0, 7), b'\x00' * 7) + self.assertEqual(int2bytes(0), b'\x00') - self.assertEqual(_int2bytes(0, 4), b('\x00') * 4) - self.assertEqual(_int2bytes(0, 7), b('\x00') * 7) - self.assertEqual(_int2bytes(0), b('\x00')) + self.assertEqual(_int2bytes(0, 4), b'\x00' * 4) + self.assertEqual(_int2bytes(0, 7), b'\x00' * 7) + self.assertEqual(_int2bytes(0), b'\x00') def test_correctness_against_base_implementation(self): # Slow test. |