def test_get_public_key(self): key = CryptographyRSAKey(private_key, ALGORITHMS.RS256) public_key = key.public_key() public_key2 = public_key.public_key() assert public_key == public_key2 key = RSAKey(private_key, ALGORITHMS.RS256) public_key = key.public_key() public_key2 = public_key.public_key() assert public_key == public_key2
def test_cryptography_wrap_key_unencoded_cleartext(private_key_pem, algorithm): private_key = CryptographyRSAKey(private_key_pem, algorithm) key = b'test' public_key = private_key.public_key() wrapped = public_key.wrap_key(key) unwrapped = private_key.unwrap_key(wrapped) assert unwrapped == key
def test_signing_parity(self): key1 = RSAKey(private_key, ALGORITHMS.RS256) vkey1 = key1.public_key() key2 = CryptographyRSAKey(private_key, ALGORITHMS.RS256) vkey2 = key2.public_key() msg = b'test' sig1 = key1.sign(msg) sig2 = key2.sign(msg) assert vkey1.verify(msg, sig1) assert vkey1.verify(msg, sig2) assert vkey2.verify(msg, sig1) assert vkey2.verify(msg, sig2) # invalid signature assert not vkey2.verify(msg, b'n' * 64)