|
|
d773ec |
diff -Naur dnspython-2.2.1/tests/test_dnssec.py dnspython-2.2.1-upd/tests/test_dnssec.py
|
|
|
d773ec |
--- dnspython-2.2.1/tests/test_dnssec.py 2022-03-06 20:04:56.000000000 -0300
|
|
|
d773ec |
+++ dnspython-2.2.1-upd/tests/test_dnssec.py 2023-01-06 15:17:49.763218922 -0300
|
|
|
d773ec |
@@ -271,18 +271,22 @@
|
|
|
d773ec |
self.assertEqual(dns.dnssec.key_id(rsamd5_keys[abs_example][0]), 30239)
|
|
|
d773ec |
self.assertEqual(dns.dnssec.key_id(rsamd5_keys[abs_example][1]), 62992)
|
|
|
d773ec |
|
|
|
d773ec |
+ @unittest.skip(reason="SHA1 is not supported.")
|
|
|
d773ec |
def testAbsoluteRSAGood(self): # type: () -> None
|
|
|
d773ec |
dns.dnssec.validate(abs_soa, abs_soa_rrsig, abs_keys, None, when)
|
|
|
d773ec |
|
|
|
d773ec |
+ @unittest.skip(reason="SHA1 is not supported.")
|
|
|
d773ec |
def testDuplicateKeytag(self): # type: () -> None
|
|
|
d773ec |
dns.dnssec.validate(abs_soa, abs_soa_rrsig, abs_keys_duplicate_keytag, None, when)
|
|
|
d773ec |
|
|
|
d773ec |
+ @unittest.skip(reason="SHA1 is not supported.")
|
|
|
d773ec |
def testAbsoluteRSABad(self): # type: () -> None
|
|
|
d773ec |
def bad(): # type: () -> None
|
|
|
d773ec |
dns.dnssec.validate(abs_other_soa, abs_soa_rrsig, abs_keys, None,
|
|
|
d773ec |
when)
|
|
|
d773ec |
self.assertRaises(dns.dnssec.ValidationFailure, bad)
|
|
|
d773ec |
|
|
|
d773ec |
+ @unittest.skip(reason="SHA1 is not supported.")
|
|
|
d773ec |
def testRelativeRSAGood(self): # type: () -> None
|
|
|
d773ec |
dns.dnssec.validate(rel_soa, rel_soa_rrsig, rel_keys,
|
|
|
d773ec |
abs_dnspython_org, when)
|
|
|
d773ec |
@@ -290,6 +294,7 @@
|
|
|
d773ec |
dns.dnssec.validate(rel_soa, rel_soa_rrsig, rel_keys,
|
|
|
d773ec |
'dnspython.org', when)
|
|
|
d773ec |
|
|
|
d773ec |
+ @unittest.skip(reason="SHA1 is not supported.")
|
|
|
d773ec |
def testRelativeRSABad(self): # type: () -> None
|
|
|
d773ec |
def bad(): # type: () -> None
|
|
|
d773ec |
dns.dnssec.validate(rel_other_soa, rel_soa_rrsig, rel_keys,
|
|
|
d773ec |
@@ -358,6 +363,7 @@
|
|
|
d773ec |
dns.dnssec.validate(rsasha512_ns, rsasha512_ns_rrsig, rsasha512_keys,
|
|
|
d773ec |
None, rsasha512_when)
|
|
|
d773ec |
|
|
|
d773ec |
+ @unittest.skip(reason="SHA1 is not supported.")
|
|
|
d773ec |
def testWildcardGoodAndBad(self):
|
|
|
d773ec |
dns.dnssec.validate(wildcard_txt, wildcard_txt_rrsig,
|
|
|
d773ec |
wildcard_keys, None, wildcard_when)
|
|
|
d773ec |
@@ -384,6 +390,7 @@
|
|
|
d773ec |
dns.dnssec.validate_rrsig(com_txt, com_txt_rrsig[0], wildcard_keys,
|
|
|
d773ec |
None, wildcard_when)
|
|
|
d773ec |
|
|
|
d773ec |
+ @unittest.skip(reason="SHA1 is not supported.")
|
|
|
d773ec |
def testAlternateParameterFormats(self): # type: () -> None
|
|
|
d773ec |
# Pass rrset and rrsigset as (name, rdataset) tuples, not rrsets
|
|
|
d773ec |
rrset = (abs_soa.name, abs_soa.to_rdataset())
|