diff options
| author | J08nY | 2017-06-23 20:53:49 +0200 |
|---|---|---|
| committer | J08nY | 2017-06-23 20:53:49 +0200 |
| commit | fc3791771047b44143868c6dc5f113e4f9157bf5 (patch) | |
| tree | 35428b6aec14743878faa9fb081889946e7d95df /src/mailman_pgp/pgp/tests/test_inline.py | |
| parent | 35f73955ab03c65936aad59511d92d87f645e3ea (diff) | |
| download | mailman-pgp-fc3791771047b44143868c6dc5f113e4f9157bf5.tar.gz mailman-pgp-fc3791771047b44143868c6dc5f113e4f9157bf5.tar.zst mailman-pgp-fc3791771047b44143868c6dc5f113e4f9157bf5.zip | |
Diffstat (limited to 'src/mailman_pgp/pgp/tests/test_inline.py')
| -rw-r--r-- | src/mailman_pgp/pgp/tests/test_inline.py | 26 |
1 files changed, 20 insertions, 6 deletions
diff --git a/src/mailman_pgp/pgp/tests/test_inline.py b/src/mailman_pgp/pgp/tests/test_inline.py index b6d84ec..d347c6a 100644 --- a/src/mailman_pgp/pgp/tests/test_inline.py +++ b/src/mailman_pgp/pgp/tests/test_inline.py @@ -29,10 +29,14 @@ class InlineWrapperTestCase(WrapperTestCase): class TestSigning(InlineWrapperTestCase): @parameterized.expand([ - (load_message('data/inline_signed.eml'), + (load_message('data/inline_cleartext_signed.eml'), + True), + (load_message('data/inline_cleartext_signed_invalid.eml'), True), - (load_message('data/inline_signed_invalid.eml'), + (load_message('data/inline_signed.eml'), True), + (load_message('data/inline_signed_corrupted.eml'), + False), (load_message('data/clear.eml'), False), (load_message('data/inline_encrypted.eml'), @@ -45,12 +49,18 @@ class TestSigning(InlineWrapperTestCase): pass @parameterized.expand([ + (load_message('data/inline_cleartext_signed.eml'), + load_key('data/rsa_1024.pub.asc'), + True), + (load_message('data/inline_cleartext_signed_invalid.eml'), + load_key('data/rsa_1024.pub.asc'), + False), (load_message('data/inline_signed.eml'), load_key('data/rsa_1024.pub.asc'), True), - (load_message('data/inline_signed_invalid.eml'), + (load_message('data/inline_signed_corrupted.eml'), load_key('data/rsa_1024.pub.asc'), - False) + False), ]) def test_verify(self, message, key, valid): super().verify(message, key, valid) @@ -60,9 +70,13 @@ class TestEncryption(InlineWrapperTestCase): @parameterized.expand([ (load_message('data/inline_encrypted.eml'), True), + (load_message('data/inline_cleartext_signed.eml'), + False), + (load_message('data/inline_cleartext_signed_invalid.eml'), + False), (load_message('data/inline_signed.eml'), False), - (load_message('data/inline_signed_invalid.eml'), + (load_message('data/inline_signed_corrupted.eml'), False), (load_message('data/clear.eml'), False) @@ -90,7 +104,7 @@ class TestKeys(InlineWrapperTestCase): True), (load_message('data/clear.eml'), False), - (load_message('data/inline_signed.eml'), + (load_message('data/inline_cleartext_signed.eml'), False) ]) def test_has_keys(self, message, has_keys): |
