From 2ce458dad50e641798d0eb1f73709833beef815d Mon Sep 17 00:00:00 2001 From: Pol Henarejos Date: Sun, 12 Feb 2023 21:53:01 +0100 Subject: [PATCH] Adding BP curves and RSA 4k to signature test. Signed-off-by: Pol Henarejos --- tests/pico-hsm/test_signature.py | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/tests/pico-hsm/test_signature.py b/tests/pico-hsm/test_signature.py index 4c88742..8d2272b 100644 --- a/tests/pico-hsm/test_signature.py +++ b/tests/pico-hsm/test_signature.py @@ -26,7 +26,7 @@ data = b'Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nullam neque u @pytest.mark.parametrize( - "curve", ['secp192r1', 'secp256r1', 'secp384r1', 'secp521r1',] + "curve", ['secp192r1', 'secp256r1', 'secp384r1', 'secp521r1', 'brainpoolP256r1', 'brainpoolP384r1', 'brainpoolP512r1', 'secp256k1'] ) @pytest.mark.parametrize( "scheme", [Algorithm.ALGO_EC_RAW, Algorithm.ALGO_EC_SHA1, Algorithm.ALGO_EC_SHA224, Algorithm.ALGO_EC_SHA256, Algorithm.ALGO_EC_SHA384, Algorithm.ALGO_EC_SHA512] @@ -43,7 +43,7 @@ def test_signature_ecc(device, curve, scheme): device.verify(pubkey, datab, signature, scheme) @pytest.mark.parametrize( - "modulus", [1024,2048] + "modulus", [1024,2048,4096] ) @pytest.mark.parametrize( "scheme", [Algorithm.ALGO_RSA_PKCS1_SHA1, Algorithm.ALGO_RSA_PKCS1_SHA224, Algorithm.ALGO_RSA_PKCS1_SHA256, Algorithm.ALGO_RSA_PKCS1_SHA384, Algorithm.ALGO_RSA_PKCS1_SHA512, Algorithm.ALGO_RSA_PSS_SHA1, Algorithm.ALGO_RSA_PSS_SHA224, Algorithm.ALGO_RSA_PSS_SHA256, Algorithm.ALGO_RSA_PSS_SHA384, Algorithm.ALGO_RSA_PSS_SHA512]