def test_verify_tampered_signature(key): data = key.sign_message('hello world') # signature is a tuple of longs and/or strings signature = list(data['signature']) signature[0] += 1 data['signature'] = tuple(signature) assert not crypto.verify_message(**data)
def verify_signed_json_presence(self, pubkeyid, json): if not set(json.keys()) == self._JSON_KEYS: raise exc.HTTPBadRequest( "json must have these keys: %s" %(self._JSON_KEYS)) if not crypto.verify_message(fingerprint=pubkeyid, **json): raise exc.HTTPBadRequest("bad message integrity")
def test_verify_bad_public_key(key): data = key.sign_message('hello world') data['key'] += 'abba' assert not crypto.verify_message(**data)
def test_verify_tampered_message(key): data = key.sign_message('hello world') data['message'] += '!' assert not crypto.verify_message(**data)
def test_verify_message(key): data = key.sign_message('hello world') assert crypto.verify_message(**data)