From 7f8a9057b4480863a26191221e29e3150a368c5c Mon Sep 17 00:00:00 2001 From: jesko Date: Tue, 10 Sep 2024 13:24:59 +0200 Subject: [PATCH] fix tests after rc2 eks change --- test/units/crypto/cipher/test_custom_cipher_modes.py | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/test/units/crypto/cipher/test_custom_cipher_modes.py b/test/units/crypto/cipher/test_custom_cipher_modes.py index 4766a10338..5702429a29 100644 --- a/test/units/crypto/cipher/test_custom_cipher_modes.py +++ b/test/units/crypto/cipher/test_custom_cipher_modes.py @@ -143,7 +143,7 @@ def test_compatibility_decrypt(self): key = b'refinery/testing' for mode in CIPHER_MODES: try: - E = -rc2(key, mode=mode, iv=B'refinery', raw=True) + E = -rc2(key, mode=mode, iv=B'refinery', raw=True, eks=128) D = +jc2(key, mode=mode, iv=B'refinery', raw=True) except ValueError: continue @@ -156,7 +156,7 @@ def test_compatibility_encrypt(self): for mode in CIPHER_MODES: try: E = -jc2(key, mode=mode, iv=B'refinery', raw=True) - D = +rc2(key, mode=mode, iv=B'refinery', raw=True) + D = +rc2(key, mode=mode, iv=B'refinery', raw=True, eks=128) except ValueError: continue M = self.generate_random_buffer(RC2.block_size * 20) @@ -166,7 +166,7 @@ def test_compatibility_encrypt(self): def test_ctr_mode(self): key = b'testing/refinery' E = -jc2(key, mode='ctr', iv=B'n0nc3', raw=True) - D = +rc2(key, mode='ctr', iv=B'n0nc3', raw=True) + D = +rc2(key, mode='ctr', iv=B'n0nc3', raw=True, eks=128) M = self.generate_random_buffer(RC2.block_size * 20) self.assertEqual(M, M | E | D | memoryview) @@ -174,5 +174,5 @@ def test_kryptografie_de_rc2_example(self): data = B'BeispielklartextBeispielklartext' key = B'Schokoladentorte' wish = bytes.fromhex('0969F22A 6E5BF195 E788759E 876521AF 0969F22A 6E5BF195 E788759E 876521AF') - self.assertEqual(bytes(data | -rc2(key, raw=True)), wish) + self.assertEqual(bytes(data | -rc2(key, raw=True, eks=128)), wish) self.assertEqual(bytes(wish | +jc2(key, raw=True)), data)