Skip to content

Commit 8af801e

Browse files
committed
minor refactoring
1 parent 6cc2214 commit 8af801e

File tree

2 files changed

+4
-4
lines changed

2 files changed

+4
-4
lines changed

tests/test_kem.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ def check_wrong_ciphertext(alg_name):
3535
with oqs.KeyEncapsulation(alg_name) as kem:
3636
public_key = kem.generate_keypair()
3737
ciphertext, shared_secret_server = kem.encap_secret(public_key)
38-
wrong_ciphertext = bytes(random.getrandbits(8) for _ in range(kem.details['length_ciphertext']))
38+
wrong_ciphertext = bytes(random.getrandbits(8) for _ in range(len(ciphertext)))
3939
shared_secret_client = kem.decap_secret(wrong_ciphertext)
4040
assert shared_secret_client != shared_secret_server
4141

tests/test_sig.py

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ def check_wrong_message(alg_name):
3636
message = bytes(random.getrandbits(8) for _ in range(100))
3737
public_key = sig.generate_keypair()
3838
signature = sig.sign(message)
39-
wrong_message = bytes(random.getrandbits(8) for _ in range(100))
39+
wrong_message = bytes(random.getrandbits(8) for _ in range(len(message)))
4040
assert not (sig.verify(wrong_message, signature, public_key))
4141

4242

@@ -52,7 +52,7 @@ def check_wrong_signature(alg_name):
5252
message = bytes(random.getrandbits(8) for _ in range(100))
5353
public_key = sig.generate_keypair()
5454
signature = sig.sign(message)
55-
wrong_signature = bytes(random.getrandbits(8) for _ in range(sig.details['length_signature']))
55+
wrong_signature = bytes(random.getrandbits(8) for _ in range(len(signature)))
5656
assert not (sig.verify(message, wrong_signature, public_key))
5757

5858

@@ -68,7 +68,7 @@ def check_wrong_public_key(alg_name):
6868
message = bytes(random.getrandbits(8) for _ in range(100))
6969
public_key = sig.generate_keypair()
7070
signature = sig.sign(message)
71-
wrong_public_key = bytes(random.getrandbits(8) for _ in range(sig.details['length_public_key']))
71+
wrong_public_key = bytes(random.getrandbits(8) for _ in range(len(public_key)))
7272
assert not (sig.verify(message, signature, wrong_public_key))
7373

7474

0 commit comments

Comments
 (0)