@@ -68,9 +68,6 @@ class TestOpenSSHSerialization:
6868 ],
6969 )
7070 def test_load_ssh_public_key (self , key_file , cert_file , backend ):
71- if "ed25519" in key_file and not backend .ed25519_supported ():
72- pytest .skip ("Requires OpenSSL with Ed25519 support" )
73-
7471 # normal public key
7572 pub_data = load_vectors_from_file (
7673 os .path .join ("asymmetric" , "OpenSSH" , key_file ),
@@ -174,8 +171,6 @@ def run_partial_pubkey(self, pubdata, backend):
174171 ],
175172 )
176173 def test_load_ssh_private_key (self , key_file , backend ):
177- if "ed25519" in key_file and not backend .ed25519_supported ():
178- pytest .skip ("Requires OpenSSL with Ed25519 support" )
179174 if "-psw" in key_file and not ssh ._bcrypt_supported :
180175 pytest .skip ("Requires bcrypt module" )
181176
@@ -261,10 +256,6 @@ def test_load_ssh_private_key(self, key_file, backend):
261256 maxline = max (map (len , priv_data2 .split (b"\n " )))
262257 assert maxline < 80
263258
264- @pytest .mark .supported (
265- only_if = lambda backend : backend .ed25519_supported (),
266- skip_message = "Requires Ed25519 support" ,
267- )
268259 @pytest .mark .parametrize (
269260 "key_file" ,
270261 [
@@ -281,10 +272,6 @@ def test_load_unsupported_ssh_private_key(self, key_file):
281272 with pytest .raises (UnsupportedAlgorithm ):
282273 load_ssh_private_key (data , None )
283274
284- @pytest .mark .supported (
285- only_if = lambda backend : backend .ed25519_supported (),
286- skip_message = "Requires Ed25519 support" ,
287- )
288275 @pytest .mark .supported (
289276 only_if = lambda backend : ssh ._bcrypt_supported ,
290277 skip_message = "Requires that bcrypt exists" ,
@@ -304,10 +291,6 @@ def test_load_ssh_private_key_invalid_tag(self, backend):
304291 with pytest .raises (InvalidTag ):
305292 load_ssh_private_key (priv_data , b"password" )
306293
307- @pytest .mark .supported (
308- only_if = lambda backend : backend .ed25519_supported (),
309- skip_message = "Requires Ed25519 support" ,
310- )
311294 @pytest .mark .supported (
312295 only_if = lambda backend : ssh ._bcrypt_supported ,
313296 skip_message = "Requires that bcrypt exists" ,
@@ -1140,10 +1123,6 @@ def test_load_ssh_public_key_ecdsa_nist_p256_bad_curve_name(self, backend):
11401123 load_ssh_public_key (ssh_key , backend )
11411124
11421125
1143- @pytest .mark .supported (
1144- only_if = lambda backend : backend .ed25519_supported (),
1145- skip_message = "Requires OpenSSL with Ed25519 support" ,
1146- )
11471126class TestEd25519SSHSerialization :
11481127 def test_load_ssh_public_key (self , backend ):
11491128 ssh_key = (
@@ -1186,10 +1165,6 @@ def test_load_ssh_public_key_trailing_data(self, backend):
11861165
11871166
11881167class TestSSHCertificate :
1189- @pytest .mark .supported (
1190- only_if = lambda backend : backend .ed25519_supported (),
1191- skip_message = "Requires OpenSSL with Ed25519 support" ,
1192- )
11931168 def test_loads_ssh_cert (self , backend ):
11941169 # secp256r1 public key, ed25519 signing key
11951170 cert = load_ssh_public_identity (
@@ -1718,10 +1693,6 @@ def test_crit_opts_exts_lexically_sorted(self):
17181693 (b"zebra@cryptography.io" , b"" ),
17191694 ]
17201695
1721- @pytest .mark .supported (
1722- only_if = lambda backend : backend .ed25519_supported (),
1723- skip_message = "Requires OpenSSL with Ed25519 support" ,
1724- )
17251696 def test_sign_ed25519 (self , backend ):
17261697 private_key = ed25519 .Ed25519PrivateKey .generate ()
17271698 builder = (
@@ -1818,10 +1789,6 @@ def test_sign_and_byte_compare_rsa(self, monkeypatch):
18181789 b"zbwL217Q93R08bJn1hDWuiTiaHGauSy2gPUI+cnkvlEocHM"
18191790 )
18201791
1821- @pytest .mark .supported (
1822- only_if = lambda backend : backend .ed25519_supported (),
1823- skip_message = "Requires OpenSSL with Ed25519 support" ,
1824- )
18251792 def test_sign_and_byte_compare_ed25519 (self , monkeypatch , backend ):
18261793 # Monkey patch urandom to return a known value so we
18271794 # get a deterministic signature with Ed25519.
@@ -1911,10 +1878,7 @@ def test_ssh_key_fingerprint_rsa_sha256(self):
19111878 )
19121879
19131880 @pytest .mark .supported (
1914- only_if = lambda backend : (
1915- backend .hash_supported (hashes .MD5 ())
1916- and backend .ed25519_supported ()
1917- ),
1881+ only_if = lambda backend : backend .hash_supported (hashes .MD5 ()),
19181882 skip_message = "Does not support MD5 or Ed25519" ,
19191883 )
19201884 def test_ssh_key_fingerprint_ed25519_md5 (self ):
@@ -1927,10 +1891,6 @@ def test_ssh_key_fingerprint_ed25519_md5(self):
19271891 fingerprint = ssh_key_fingerprint (public_key , hashes .MD5 ())
19281892 assert fingerprint == b"\xe5 R=\x01 \x9e \xa0 \xc1 \xe9 \x8c ?L|\xc5 \x94 W\x85 "
19291893
1930- @pytest .mark .supported (
1931- only_if = lambda backend : backend .ed25519_supported (),
1932- skip_message = "Ed25519 not supported" ,
1933- )
19341894 def test_ssh_key_fingerprint_ed25519_sha256 (self ):
19351895 ssh_key = load_vectors_from_file (
19361896 os .path .join ("asymmetric" , "OpenSSH" , "ed25519-nopsw.key.pub" ),
0 commit comments