| Index: tools/telemetry/third_party/gsutilz/third_party/rsa/tests/test_pkcs1.py
|
| diff --git a/tools/telemetry/third_party/gsutilz/third_party/rsa/tests/test_pkcs1.py b/tools/telemetry/third_party/gsutilz/third_party/rsa/tests/test_pkcs1.py
|
| deleted file mode 100644
|
| index d5882dfd1b4a27b5f83b295b659dd58fa7285016..0000000000000000000000000000000000000000
|
| --- a/tools/telemetry/third_party/gsutilz/third_party/rsa/tests/test_pkcs1.py
|
| +++ /dev/null
|
| @@ -1,94 +0,0 @@
|
| -'''Tests string operations.'''
|
| -
|
| -import struct
|
| -import unittest2
|
| -
|
| -import rsa
|
| -from rsa import pkcs1
|
| -from rsa._compat import byte, is_integer, b, is_bytes
|
| -
|
| -class BinaryTest(unittest2.TestCase):
|
| -
|
| - def setUp(self):
|
| - (self.pub, self.priv) = rsa.newkeys(256)
|
| -
|
| - def test_enc_dec(self):
|
| -
|
| - message = struct.pack('>IIII', 0, 0, 0, 1)
|
| - print("\tMessage: %r" % message)
|
| -
|
| - encrypted = pkcs1.encrypt(message, self.pub)
|
| - print("\tEncrypted: %r" % encrypted)
|
| -
|
| - decrypted = pkcs1.decrypt(encrypted, self.priv)
|
| - print("\tDecrypted: %r" % decrypted)
|
| -
|
| - self.assertEqual(message, decrypted)
|
| -
|
| - def test_decoding_failure(self):
|
| -
|
| - message = struct.pack('>IIII', 0, 0, 0, 1)
|
| - encrypted = pkcs1.encrypt(message, self.pub)
|
| -
|
| - # Alter the encrypted stream
|
| - a = encrypted[5]
|
| - if is_bytes(a):
|
| - a = ord(a)
|
| - encrypted = encrypted[:5] + byte(a + 1) + encrypted[6:]
|
| -
|
| - self.assertRaises(pkcs1.DecryptionError, pkcs1.decrypt, encrypted,
|
| - self.priv)
|
| -
|
| - def test_randomness(self):
|
| - '''Encrypting the same message twice should result in different
|
| - cryptos.
|
| - '''
|
| -
|
| - message = struct.pack('>IIII', 0, 0, 0, 1)
|
| - encrypted1 = pkcs1.encrypt(message, self.pub)
|
| - encrypted2 = pkcs1.encrypt(message, self.pub)
|
| -
|
| - self.assertNotEqual(encrypted1, encrypted2)
|
| -
|
| -class SignatureTest(unittest2.TestCase):
|
| -
|
| - def setUp(self):
|
| - (self.pub, self.priv) = rsa.newkeys(512)
|
| -
|
| - def test_sign_verify(self):
|
| - '''Test happy flow of sign and verify'''
|
| -
|
| - message = b('je moeder')
|
| - print("\tMessage: %r" % message)
|
| -
|
| - signature = pkcs1.sign(message, self.priv, 'SHA-256')
|
| - print("\tSignature: %r" % signature)
|
| -
|
| - self.assertTrue(pkcs1.verify(message, signature, self.pub))
|
| -
|
| - def test_alter_message(self):
|
| - '''Altering the message should let the verification fail.'''
|
| -
|
| - signature = pkcs1.sign(b('je moeder'), self.priv, 'SHA-256')
|
| - self.assertRaises(pkcs1.VerificationError, pkcs1.verify,
|
| - b('mijn moeder'), signature, self.pub)
|
| -
|
| - def test_sign_different_key(self):
|
| - '''Signing with another key should let the verification fail.'''
|
| -
|
| - (otherpub, _) = rsa.newkeys(512)
|
| -
|
| - message = b('je moeder')
|
| - signature = pkcs1.sign(message, self.priv, 'SHA-256')
|
| - self.assertRaises(pkcs1.VerificationError, pkcs1.verify,
|
| - message, signature, otherpub)
|
| -
|
| - def test_multiple_signings(self):
|
| - '''Signing the same message twice should return the same signatures.'''
|
| -
|
| - message = struct.pack('>IIII', 0, 0, 0, 1)
|
| - signature1 = pkcs1.sign(message, self.priv, 'SHA-1')
|
| - signature2 = pkcs1.sign(message, self.priv, 'SHA-1')
|
| -
|
| - self.assertEqual(signature1, signature2)
|
| -
|
|
|