pyca / pynacl

@@ -107,12 +107,12 @@
Loading
107 107
    priv = PrivateKey.generate()
108 108
109 109
    check_type_error(
110 -
        ("SealedBox must be created from a PublicKey" " or a PrivateKey"),
110 +
        ("SealedBox must be created from a PublicKey or a PrivateKey"),
111 111
        SealedBox,
112 112
        priv.encode(),
113 113
    )
114 114
    check_type_error(
115 -
        ("SealedBox must be created from a PublicKey" " or a PrivateKey"),
115 +
        ("SealedBox must be created from a PublicKey or a PrivateKey"),
116 116
        SealedBox,
117 117
        priv.public_key.encode(),
118 118
    )

@@ -258,7 +258,7 @@
Loading
258 258
    )
259 259
    ensure(
260 260
        len(sk) == crypto_sign_SECRETKEYBYTES,
261 -
        ("secret key must be {} " "bytes long").format(
261 +
        ("secret key must be {} bytes long").format(
262 262
            crypto_sign_SECRETKEYBYTES
263 263
        ),
264 264
        raising=exc.TypeError,
@@ -299,7 +299,7 @@
Loading
299 299
    )
300 300
    ensure(
301 301
        len(signature) == crypto_sign_BYTES,
302 -
        ("signature must be {} " "bytes long").format(crypto_sign_BYTES),
302 +
        ("signature must be {} bytes long").format(crypto_sign_BYTES),
303 303
        raising=exc.TypeError,
304 304
    )
305 305
    ensure(
@@ -309,7 +309,7 @@
Loading
309 309
    )
310 310
    ensure(
311 311
        len(pk) == crypto_sign_PUBLICKEYBYTES,
312 -
        ("public key must be {} " "bytes long").format(
312 +
        ("public key must be {} bytes long").format(
313 313
            crypto_sign_PUBLICKEYBYTES
314 314
        ),
315 315
        raising=exc.TypeError,

@@ -43,7 +43,7 @@
Loading
43 43
    """
44 44
    if len(seed) != randombytes_SEEDBYTES:
45 45
        raise exc.TypeError(
46 -
            "Deterministic random bytes must be generated " "from 32 bytes"
46 +
            "Deterministic random bytes must be generated from 32 bytes"
47 47
        )
48 48
49 49
    buf = ffi.new("unsigned char[]", size)

@@ -313,17 +313,17 @@
Loading
313 313
    priv = PrivateKey.generate()
314 314
315 315
    check_type_error(
316 -
        ("PrivateKey must be created from a 32 bytes long " "raw secret key"),
316 +
        ("PrivateKey must be created from a 32 bytes long raw secret key"),
317 317
        PrivateKey,
318 318
        12,
319 319
    )
320 320
    check_type_error(
321 -
        ("PrivateKey must be created from a 32 bytes long " "raw secret key"),
321 +
        ("PrivateKey must be created from a 32 bytes long raw secret key"),
322 322
        PrivateKey,
323 323
        priv,
324 324
    )
325 325
    check_type_error(
326 -
        ("PrivateKey must be created from a 32 bytes long " "raw secret key"),
326 +
        ("PrivateKey must be created from a 32 bytes long raw secret key"),
327 327
        PrivateKey,
328 328
        priv.public_key,
329 329
    )

@@ -52,7 +52,7 @@
Loading
52 52
    h3 = c.crypto_hash_sha256(msg)
53 53
    assert len(h3) == c.crypto_hash_sha256_BYTES
54 54
    assert tohex(h3) == (
55 -
        "ab530a13e45914982b79f9b7e3fba994" "cfd1f3fb22f71cea1afbf02b460c6d1d"
55 +
        "ab530a13e45914982b79f9b7e3fba994cfd1f3fb22f71cea1afbf02b460c6d1d"
56 56
    )
57 57
    assert tohex(h3) == hashlib.sha256(msg).hexdigest()
58 58
@@ -200,7 +200,7 @@
Loading
200 200
    z = unhexlify(b"10" * 32)
201 201
    bz1 = c.crypto_scalarmult_base(z)
202 202
    assert tohex(bz1) == (
203 -
        "781faab908430150daccdd6f9d6c5086" "e34f73a93ebbaa271765e5036edfc519"
203 +
        "781faab908430150daccdd6f9d6c5086e34f73a93ebbaa271765e5036edfc519"
204 204
    )
205 205
    bz2 = c.crypto_scalarmult(z, base)
206 206
    assert tohex(bz1) == tohex(bz2)
@@ -211,7 +211,7 @@
Loading
211 211
    Taken from test vectors in libsodium
212 212
    """
213 213
    keypair_seed = unhexlify(
214 -
        b"421151a459faeade3d247115f94aedae" b"42318124095afabe4d1451a559faedee"
214 +
        b"421151a459faeade3d247115f94aedae42318124095afabe4d1451a559faedee"
215 215
    )
216 216
    ed25519_pk, ed25519_sk = c.crypto_sign_seed_keypair(keypair_seed)
217 217
@@ -233,10 +233,10 @@
Loading
233 233
    curve25519_sk = c.crypto_sign_ed25519_sk_to_curve25519(ed25519_sk)
234 234
235 235
    assert tohex(curve25519_pk) == (
236 -
        "f1814f0e8ff1043d8a44d25babff3ced" "cae6c22c3edaa48f857ae70de2baae50"
236 +
        "f1814f0e8ff1043d8a44d25babff3cedcae6c22c3edaa48f857ae70de2baae50"
237 237
    )
238 238
    assert tohex(curve25519_sk) == (
239 -
        "8052030376d47112be7f73ed7a019293" "dd12ad910b654455798b4667d73de166"
239 +
        "8052030376d47112be7f73ed7a019293dd12ad910b654455798b4667d73de166"
240 240
    )
241 241
242 242
@@ -400,10 +400,10 @@
Loading
400 400
    # sk, pk, msg, exp_sig
401 401
    # taken from RFC 8032 section 7.3.  Test Vectors for Ed25519ph
402 402
    sk = unhexlify(
403 -
        b"833fe62409237b9d62ec77587520911e" b"9a759cec1d19755b7da901b96dca3d42"
403 +
        b"833fe62409237b9d62ec77587520911e9a759cec1d19755b7da901b96dca3d42"
404 404
    )
405 405
    pk = unhexlify(
406 -
        b"ec172b93ad5e563bf4932c70e1245034" b"c35467ef2efd4d64ebf819683467e2bf"
406 +
        b"ec172b93ad5e563bf4932c70e1245034c35467ef2efd4d64ebf819683467e2bf"
407 407
    )
408 408
    msg = b"abc"
409 409
    exp_sig = unhexlify(
@@ -438,7 +438,7 @@
Loading
438 438
    msg = unhexlify(hmsg)
439 439
440 440
    seed = unhexlify(
441 -
        b"421151a459faeade3d247115f94aedae" b"42318124095afabe4d1451a559faedee"
441 +
        b"421151a459faeade3d247115f94aedae42318124095afabe4d1451a559faedee"
442 442
    )
443 443
444 444
    pk, sk = c.crypto_sign_seed_keypair(seed)

@@ -98,7 +98,7 @@
Loading
98 98
    b"\x38\x39\x3a\x3b\x3c\x3d\x3e"
99 99
)
100 100
101 -
KEY = b"\x00\x01\x02\x03\x04\x05\x06\x07" b"\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f"
101 +
KEY = b"\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f"
102 102
103 103
XHASHES = [
104 104
    b"a3817f04ba25a8e66df67214c7550293",

@@ -70,6 +70,6 @@
Loading
70 70
    else:
71 71
        raise (
72 72
            CryptPrefixError(
73 -
                "given password_hash is not " "in a supported format"
73 +
                "given password_hash is not in a supported format"
74 74
            )
75 75
        )

@@ -299,7 +299,7 @@
Loading
299 299
300 300
    ensure(
301 301
        _clen >= crypto_box_SEALBYTES,
302 -
        ("Input cyphertext must be " "at least {} long").format(
302 +
        ("Input cyphertext must be at least {} long").format(
303 303
            crypto_box_SEALBYTES
304 304
        ),
305 305
        raising=exc.TypeError,

@@ -182,7 +182,7 @@
Loading
182 182
                public_key, PublicKey
183 183
            ):
184 184
                raise exc.TypeError(
185 -
                    "Box must be created from " "a PrivateKey and a PublicKey"
185 +
                    "Box must be created from a PrivateKey and a PublicKey"
186 186
                )
187 187
            self._shared_key = nacl.bindings.crypto_box_beforenm(
188 188
                public_key.encode(encoder=encoding.RawEncoder),
@@ -325,7 +325,7 @@
Loading
325 325
            )
326 326
        else:
327 327
            raise exc.TypeError(
328 -
                "SealedBox must be created from " "a PublicKey or a PrivateKey"
328 +
                "SealedBox must be created from a PublicKey or a PrivateKey"
329 329
            )
330 330
331 331
    def __bytes__(self):

@@ -26,7 +26,7 @@
Loading
26 26
27 27
__title__ = "PyNaCl"
28 28
__summary__ = (
29 -
    "Python binding to the Networking and Cryptography (NaCl) " "library"
29 +
    "Python binding to the Networking and Cryptography (NaCl) library"
30 30
)
31 31
__uri__ = "https://github.com/pyca/pynacl/"
32 32
Files Coverage
src/nacl 100.00%
tests 100.00%
Project Totals (48 files) 100.00%
Python 3.9 on Windows x64
Build #860018610 -
Python 3.6 on Windows x86
Build #860018610 -
Python 3.7 on Windows x86
Build #860018610 -
Python 3.5 on Windows x86
Build #860018610 -
Python 3.9system on macOS
Build #860018610 -
Python 3.9 on Windows x86
Build #860018610 -
Python 3.9 (minimal build) on macOS
Build #860018610 -
Python 3.8 on Windows x86
Build #860018610 -
Python 3.9 on macOS
Build #860018610 -
Python 3.5 on macOS
Build #860018610 -
Python 3.8 on macOS
Build #860018610 -
Python 3.9minimal on macOS
Build #860018610 -
Python 3.8 on Windows x64
Build #860018610 -
Python 3.6 on macOS
Build #860018610 -
Python 3.5 on macOS
Build #860018610 -
Python 3.5 on Windows x64
Build #860018610 -
Python 3.7 on macOS
Build #860018610 -
Python 3.6 on Windows x64
Build #860018610 -
Python 3.9 on macOS
Build #860018610 -
Python pypy3 on macOS
Build #860018610 -
Python 3.7 on Windows x64
Build #860018610 -
1
comment: false
2
coverage:
3
    status:
4
        patch:
5
            default:
6
                target: '100'
7
        project:
8
            default:
9
                target: '100'
Sunburst
The inner-most circle is the entire project, moving away from the center are folders then, finally, a single file. The size and color of each slice is representing the number of statements and the coverage, respectively.
Icicle
The top section represents the entire project. Proceeding with folders and finally individual files. The size and color of each slice is representing the number of statements and the coverage, respectively.
Grid
Each block represents a single file in the project. The size and color of each block is represented by the number of statements and the coverage, respectively.
Loading