diff options
| author | Mark Adams <mark@markadams.me> | 2015-04-08 22:50:20 -0500 |
|---|---|---|
| committer | Mark Adams <mark@markadams.me> | 2015-04-12 20:57:39 -0500 |
| commit | 90577f7cef93c4d9e8b6168212f29129fa2b3f71 (patch) | |
| tree | bc139694dab69a8047140109a33eb2e9b30c7376 /tests/test_algorithms.py | |
| parent | a39b62eacc404f78094a5dfdf3b2e7113eea2f11 (diff) | |
| download | pyjwt-90577f7cef93c4d9e8b6168212f29129fa2b3f71.tar.gz | |
Added a test to improve coverage and cleaned up some existing tests.
Diffstat (limited to 'tests/test_algorithms.py')
| -rw-r--r-- | tests/test_algorithms.py | 18 |
1 files changed, 9 insertions, 9 deletions
diff --git a/tests/test_algorithms.py b/tests/test_algorithms.py index 8eb0eb3..5eb24bc 100644 --- a/tests/test_algorithms.py +++ b/tests/test_algorithms.py @@ -113,9 +113,9 @@ class TestAlgorithms(unittest.TestCase): def test_rsa_verify_should_return_false_if_signature_invalid(self): algo = RSAAlgorithm(RSAAlgorithm.SHA256) - jwt_message = ensure_bytes('Hello World!') + message = ensure_bytes('Hello World!') - jwt_sig = base64.b64decode(ensure_bytes( + sig = base64.b64decode(ensure_bytes( 'yS6zk9DBkuGTtcBzLUzSpo9gGJxJFOGvUqN01iLhWHrzBQ9ZEz3+Ae38AXp' '10RWwscp42ySC85Z6zoN67yGkLNWnfmCZSEv+xqELGEvBJvciOKsrhiObUl' '2mveSc1oeO/2ujkGDkkkJ2epn0YliacVjZF5+/uDmImUfAAj8lzjnHlzYix' @@ -123,21 +123,21 @@ class TestAlgorithms(unittest.TestCase): 'fHJnNUzAEUOXS0WahHVb57D30pcgIji9z923q90p5c7E2cU8V+E1qe8NdCA' 'APCDzZZ9zQ/dgcMVaBrGrgimrcLbPjueOKFgSO+SSjIElKA==')) - jwt_sig += ensure_bytes('123') # Signature is now invalid + sig += ensure_bytes('123') # Signature is now invalid with open(key_path('testkey_rsa.pub'), 'r') as keyfile: - jwt_pub_key = algo.prepare_key(keyfile.read()) + pub_key = algo.prepare_key(keyfile.read()) - result = algo.verify(jwt_message, jwt_pub_key, jwt_sig) + result = algo.verify(message, pub_key, sig) self.assertFalse(result) @unittest.skipIf(not has_crypto, 'Not supported without cryptography library') def test_rsa_verify_should_return_true_if_signature_valid(self): algo = RSAAlgorithm(RSAAlgorithm.SHA256) - jwt_message = ensure_bytes('Hello World!') + message = ensure_bytes('Hello World!') - jwt_sig = base64.b64decode(ensure_bytes( + sig = base64.b64decode(ensure_bytes( 'yS6zk9DBkuGTtcBzLUzSpo9gGJxJFOGvUqN01iLhWHrzBQ9ZEz3+Ae38AXp' '10RWwscp42ySC85Z6zoN67yGkLNWnfmCZSEv+xqELGEvBJvciOKsrhiObUl' '2mveSc1oeO/2ujkGDkkkJ2epn0YliacVjZF5+/uDmImUfAAj8lzjnHlzYix' @@ -146,9 +146,9 @@ class TestAlgorithms(unittest.TestCase): 'APCDzZZ9zQ/dgcMVaBrGrgimrcLbPjueOKFgSO+SSjIElKA==')) with open(key_path('testkey_rsa.pub'), 'r') as keyfile: - jwt_pub_key = algo.prepare_key(keyfile.read()) + pub_key = algo.prepare_key(keyfile.read()) - result = algo.verify(jwt_message, jwt_pub_key, jwt_sig) + result = algo.verify(message, pub_key, sig) self.assertTrue(result) @unittest.skipIf(not has_crypto, 'Not supported without cryptography library') |
