Arthur de Jong

Open Source / Free Software developer

summaryrefslogtreecommitdiffstats
path: root/tests
Commit message (Collapse)AuthorAgeFilesLines
* Add support for setting secretArthur de Jong2014-06-151-0/+12
| | | | | | This supports setters for the secret, counter, time_offset, time_interval and time_drift properties. Setting these values stores the values unencrypted internally.
* Add tests for missing or invalid MACArthur de Jong2014-06-144-0/+172
| | | | This tests for incomplete, unknown or invalid MACs in PSKC files.
* Add MAC tests to all CBC encrypted keysArthur de Jong2014-06-145-0/+52
| | | | | This adds hmac-sha224, hmac-sha256, hmac-sha384 and hmac-sha512 tests for values that are encrypted using CBC block cypher modes.
* Support kw-tripledes decryptionArthur de Jong2014-05-312-0/+41
| | | | | This adds support for key unwrapping using the RFC 3217 Triple DES key wrap algorithm if the PSKC file uses this.
* Implement RFC 3217 Triple DES key wrappingArthur de Jong2014-05-311-0/+85
|
* Merge test_minimal into test_miscArthur de Jong2014-05-312-51/+30
|
* Add an ActivIdentity-3DES testArthur de Jong2014-05-312-0/+79
| | | | | The test is taken from draft-hoyer-keyprov-pskc-algorithm-profiles-01 modified to fit the schema as described in RFC 6030.
* Add an SecurID-AES-Counter testArthur de Jong2014-05-312-0/+69
| | | | | The test is taken from draft-hoyer-keyprov-pskc-algorithm-profiles-01 modified to be valid XML and to fit the schema as described in RFC 6030.
* Add an TOTP testArthur de Jong2014-05-312-0/+72
| | | | | The test is taken from draft-hoyer-keyprov-pskc-algorithm-profiles-01 modified to fit the schema as described in RFC 6030.
* Add an OCRA testArthur de Jong2014-05-312-0/+92
| | | | | The test is taken from draft-hoyer-keyprov-pskc-algorithm-profiles-01 modified to fit the schema as described in RFC 6030.
* Add a test for an odd namespaceArthur de Jong2014-05-312-0/+59
|
* Support kw-aes128, kw-aes192 and kw-aes256Arthur de Jong2014-05-304-0/+117
| | | | | This adds support for key unwrapping using the RFC 3394 or RFC 5649 algorithm if the PSKC file uses this.
* Implement padding as specified in RFC 5649Arthur de Jong2014-05-301-1/+79
| | | | This adds a pad argument with which padding can be forced or disabled.
* Allow speciying an initial value for key wrappingArthur de Jong2014-05-301-0/+17
|
* Provide an RFC 3394 AES key wrapping algorithmArthur de Jong2014-05-301-0/+101
| | | | This also introduces an EncryptionError exception.
* Always put a space between RFC and numberArthur de Jong2014-05-298-26/+27
|
* Support Tripple DES decryptionArthur de Jong2014-05-292-0/+40
|
* Add tests for key derivation problemsArthur de Jong2014-05-291-0/+39
| | | | | This tests for unknown or missing algorithms and unknown derivation parameters.
* Add test for missing key encryption algorithmArthur de Jong2014-05-292-1/+24
| | | | | This also introduces a toplevel PSKCError exception that all exceptions have as parent.
* Add test for all AES-CBC encryption schemesArthur de Jong2014-05-294-0/+131
|
* Add test for missing secret valueArthur de Jong2014-05-291-0/+2
|
* Add a function for adding a new keyArthur de Jong2014-05-251-1/+10
|
* Support creating an empty PSKC instanceArthur de Jong2014-05-251-0/+5
|
* Raise an exception if decryption failsArthur de Jong2014-05-253-2/+50
|
* Add tests for invalid PSKC filesArthur de Jong2014-05-234-0/+65
|
* Use pskcxml as file name extensionArthur de Jong2014-05-238-7/+7
| | | | This is the extension that is suggested in RFC6030.
* Improve testArthur de Jong2014-05-231-2/+7
| | | | | This tests that, before the PSKC ecnryption is key available, the secret from the key cannot be extracted.
* Provide pskc.key docstringsArthur de Jong2014-04-191-1/+1
| | | | | | | | | This documents most of the information that is available per key and adds a few other minor cosmetic changes. This also re-organises the key properties to be in a slightly more logical order and renames the userid key property to key_userid to more clearly distinguish it from device_userid.
* Add bulk provisioning test from Figure 10Arthur de Jong2014-04-162-0/+154
|
* Add test for Figure 7 from RFC6030Arthur de Jong2014-04-132-0/+94
| | | | | This tests encrypted key derivation using PBKDF2 and a pre-shared passphrase.
* Add test for Figure 6 from RFC6030Arthur de Jong2014-04-122-0/+78
| | | | This test key encryption with a pre-shared key and MAC checks.
* Add test for Figure 5 from RFC6030Arthur de Jong2014-04-112-0/+114
| | | | This test extraction of key policy information and cross-key references.
* Add test for Figure 4 from RFC6030Arthur de Jong2014-04-112-0/+54
| | | | | This tests for key profile and key reference properties that can be used to reference external keys.
* Add test for Figure 3 from RFC6030Arthur de Jong2014-04-112-0/+71
| | | | | This tests Figure 3 from RFC6030 with a very basic plain text secret key and some supplementary data.
* Add test for example from RFC6030Arthur de Jong2014-04-072-0/+60
| | | | | This tests Figure 2 from RFC6030 with a very basic plain text secret key.
* Minimal testArthur de Jong2014-04-071-0/+35
This adds a doctest for the absolute minimum PSKC file that does not contain any useful information.