aboutsummaryrefslogtreecommitdiff
path: root/src/mailman_pgp/pgp/tests/test_inline.py
diff options
context:
space:
mode:
authorJ08nY2017-06-23 20:53:49 +0200
committerJ08nY2017-06-23 20:53:49 +0200
commitfc3791771047b44143868c6dc5f113e4f9157bf5 (patch)
tree35428b6aec14743878faa9fb081889946e7d95df /src/mailman_pgp/pgp/tests/test_inline.py
parent35f73955ab03c65936aad59511d92d87f645e3ea (diff)
downloadmailman-pgp-fc3791771047b44143868c6dc5f113e4f9157bf5.tar.gz
mailman-pgp-fc3791771047b44143868c6dc5f113e4f9157bf5.tar.zst
mailman-pgp-fc3791771047b44143868c6dc5f113e4f9157bf5.zip
Diffstat (limited to 'src/mailman_pgp/pgp/tests/test_inline.py')
-rw-r--r--src/mailman_pgp/pgp/tests/test_inline.py26
1 files changed, 20 insertions, 6 deletions
diff --git a/src/mailman_pgp/pgp/tests/test_inline.py b/src/mailman_pgp/pgp/tests/test_inline.py
index b6d84ec..d347c6a 100644
--- a/src/mailman_pgp/pgp/tests/test_inline.py
+++ b/src/mailman_pgp/pgp/tests/test_inline.py
@@ -29,10 +29,14 @@ class InlineWrapperTestCase(WrapperTestCase):
class TestSigning(InlineWrapperTestCase):
@parameterized.expand([
- (load_message('data/inline_signed.eml'),
+ (load_message('data/inline_cleartext_signed.eml'),
+ True),
+ (load_message('data/inline_cleartext_signed_invalid.eml'),
True),
- (load_message('data/inline_signed_invalid.eml'),
+ (load_message('data/inline_signed.eml'),
True),
+ (load_message('data/inline_signed_corrupted.eml'),
+ False),
(load_message('data/clear.eml'),
False),
(load_message('data/inline_encrypted.eml'),
@@ -45,12 +49,18 @@ class TestSigning(InlineWrapperTestCase):
pass
@parameterized.expand([
+ (load_message('data/inline_cleartext_signed.eml'),
+ load_key('data/rsa_1024.pub.asc'),
+ True),
+ (load_message('data/inline_cleartext_signed_invalid.eml'),
+ load_key('data/rsa_1024.pub.asc'),
+ False),
(load_message('data/inline_signed.eml'),
load_key('data/rsa_1024.pub.asc'),
True),
- (load_message('data/inline_signed_invalid.eml'),
+ (load_message('data/inline_signed_corrupted.eml'),
load_key('data/rsa_1024.pub.asc'),
- False)
+ False),
])
def test_verify(self, message, key, valid):
super().verify(message, key, valid)
@@ -60,9 +70,13 @@ class TestEncryption(InlineWrapperTestCase):
@parameterized.expand([
(load_message('data/inline_encrypted.eml'),
True),
+ (load_message('data/inline_cleartext_signed.eml'),
+ False),
+ (load_message('data/inline_cleartext_signed_invalid.eml'),
+ False),
(load_message('data/inline_signed.eml'),
False),
- (load_message('data/inline_signed_invalid.eml'),
+ (load_message('data/inline_signed_corrupted.eml'),
False),
(load_message('data/clear.eml'),
False)
@@ -90,7 +104,7 @@ class TestKeys(InlineWrapperTestCase):
True),
(load_message('data/clear.eml'),
False),
- (load_message('data/inline_signed.eml'),
+ (load_message('data/inline_cleartext_signed.eml'),
False)
])
def test_has_keys(self, message, has_keys):