summaryrefslogtreecommitdiff
path: root/tests
diff options
context:
space:
mode:
authorSybren A. St?vel <sybren@stuvel.eu>2011-07-10 14:16:38 +0200
committerSybren A. St?vel <sybren@stuvel.eu>2011-07-10 14:16:38 +0200
commit9f627a4fd2d1055f6dde27e45ca17da0aa21b567 (patch)
tree829f42921896a8202677c284dad10612f644489a /tests
parentb666624b20a20d7e5861c93cdea2356cc0bb3c79 (diff)
downloadrsa-9f627a4fd2d1055f6dde27e45ca17da0aa21b567.tar.gz
Added PKCS#1 signatures and verification of signatures
Diffstat (limited to 'tests')
-rw-r--r--tests/test_pkcs1.py58
1 files changed, 45 insertions, 13 deletions
diff --git a/tests/test_pkcs1.py b/tests/test_pkcs1.py
index 0d55d7b..3392ed7 100644
--- a/tests/test_pkcs1.py
+++ b/tests/test_pkcs1.py
@@ -32,7 +32,8 @@ class BinaryTest(unittest.TestCase):
# Alter the encrypted stream
encrypted = encrypted[:5] + chr(ord(encrypted[5]) + 1) + encrypted[6:]
- self.assertRaises(ValueError, pkcs1.decrypt, encrypted, self.priv)
+ self.assertRaises(pkcs1.DecryptionError, pkcs1.decrypt, encrypted,
+ self.priv)
def test_randomness(self):
'''Encrypting the same message twice should result in different
@@ -45,15 +46,46 @@ class BinaryTest(unittest.TestCase):
self.assertNotEqual(encrypted1, encrypted2)
-# def test_sign_verify(self):
-#
-# message = struct.pack('>IIII', 0, 0, 0, 1) + 20 * '\x00'
-# print "\tMessage: %r" % message
-#
-# signed = rsa.sign(message, self.priv)
-# print "\tSigned: %r" % signed
-#
-# verified = rsa.verify(signed, self.pub)
-# print "\tVerified: %r" % verified
-#
-# self.assertEqual(message, verified)
+class SignatureTest(unittest.TestCase):
+
+ def setUp(self):
+ (self.pub, self.priv) = rsa.newkeys(512)
+
+ def test_sign_verify(self):
+ '''Test happy flow of sign and verify'''
+
+ message = 'je moeder'
+ print "\tMessage: %r" % message
+
+ signature = pkcs1.sign(message, self.priv, 'SHA-256')
+ print "\tSignature: %r" % signature
+
+ pkcs1.verify(message, signature, self.pub)
+
+ def test_alter_message(self):
+ '''Altering the message should let the verification fail.'''
+
+ signature = pkcs1.sign('je moeder', self.priv, 'SHA-256')
+ self.assertRaises(pkcs1.VerificationError, pkcs1.verify,
+ 'mijn moeder', signature, self.pub)
+
+ def test_sign_different_key(self):
+ '''Signing with another key should let the verification fail.'''
+
+ (otherpub, _) = rsa.newkeys(512)
+
+ message = 'je moeder'
+ signature = pkcs1.sign(message, self.priv, 'SHA-256')
+ self.assertRaises(pkcs1.VerificationError, pkcs1.verify,
+ message, signature, otherpub)
+
+ def test_multiple_signings(self):
+ '''Signing the same message twice should return the same signatures.'''
+
+ message = struct.pack('>IIII', 0, 0, 0, 1)
+ signature1 = pkcs1.sign(message, self.priv, 'SHA-1')
+ signature2 = pkcs1.sign(message, self.priv, 'SHA-1')
+
+ self.assertEqual(signature1, signature2)
+
+ \ No newline at end of file