diff options
Diffstat (limited to 'src/mailman_pgp/pgp/tests/test_inline.py')
| -rw-r--r-- | src/mailman_pgp/pgp/tests/test_inline.py | 102 |
1 files changed, 51 insertions, 51 deletions
diff --git a/src/mailman_pgp/pgp/tests/test_inline.py b/src/mailman_pgp/pgp/tests/test_inline.py index 900d5b2..cd18209 100644 --- a/src/mailman_pgp/pgp/tests/test_inline.py +++ b/src/mailman_pgp/pgp/tests/test_inline.py @@ -29,54 +29,54 @@ class InlineWrapperTestCase(WrapperTestCase): class TestSigning(InlineWrapperTestCase): @parameterized.expand([ - (load_message('data/inline_cleartext_signed.eml'), + (load_message('inline_cleartext_signed.eml'), True), - (load_message('data/inline_cleartext_signed_invalid.eml'), + (load_message('inline_cleartext_signed_invalid.eml'), True), - (load_message('data/inline_signed.eml'), + (load_message('inline_signed.eml'), True), - (load_message('data/inline_signed_corrupted.eml'), + (load_message('inline_signed_corrupted.eml'), False), - (load_message('data/clear.eml'), + (load_message('clear.eml'), False), - (load_message('data/inline_encrypted.eml'), + (load_message('inline_encrypted.eml'), False) ]) def test_is_signed(self, message, signed): super().is_signed(message, signed) @parameterized.expand([ - (load_message('data/clear.eml'), - load_key('data/rsa_1024.priv.asc')), - (load_message('data/clear.eml'), - load_key('data/ecc_p256.priv.asc')) + (load_message('clear.eml'), + load_key('rsa_1024.priv.asc')), + (load_message('clear.eml'), + load_key('ecc_p256.priv.asc')) ]) def test_sign(self, message, key): super().sign(message, key) @parameterized.expand([ - (load_message('data/clear.eml'), - load_key('data/rsa_1024.priv.asc'), - load_key('data/rsa_1024.pub.asc')), - (load_message('data/clear.eml'), - load_key('data/ecc_p256.priv.asc'), - load_key('data/ecc_p256.pub.asc')) + (load_message('clear.eml'), + load_key('rsa_1024.priv.asc'), + load_key('rsa_1024.pub.asc')), + (load_message('clear.eml'), + load_key('ecc_p256.priv.asc'), + load_key('ecc_p256.pub.asc')) ]) def test_sign_verify(self, message, priv, pub): super().sign_verify(message, priv, pub) @parameterized.expand([ - (load_message('data/inline_cleartext_signed.eml'), - load_key('data/rsa_1024.pub.asc'), + (load_message('inline_cleartext_signed.eml'), + load_key('rsa_1024.pub.asc'), True), - (load_message('data/inline_cleartext_signed_invalid.eml'), - load_key('data/rsa_1024.pub.asc'), + (load_message('inline_cleartext_signed_invalid.eml'), + load_key('rsa_1024.pub.asc'), False), - (load_message('data/inline_signed.eml'), - load_key('data/rsa_1024.pub.asc'), + (load_message('inline_signed.eml'), + load_key('rsa_1024.pub.asc'), True), - (load_message('data/inline_signed_corrupted.eml'), - load_key('data/rsa_1024.pub.asc'), + (load_message('inline_signed_corrupted.eml'), + load_key('rsa_1024.pub.asc'), False), ]) def test_verify(self, message, key, valid): @@ -85,28 +85,28 @@ class TestSigning(InlineWrapperTestCase): class TestEncryption(InlineWrapperTestCase): @parameterized.expand([ - (load_message('data/inline_encrypted.eml'), + (load_message('inline_encrypted.eml'), True), - (load_message('data/inline_cleartext_signed.eml'), + (load_message('inline_cleartext_signed.eml'), False), - (load_message('data/inline_cleartext_signed_invalid.eml'), + (load_message('inline_cleartext_signed_invalid.eml'), False), - (load_message('data/inline_signed.eml'), + (load_message('inline_signed.eml'), False), - (load_message('data/inline_signed_corrupted.eml'), + (load_message('inline_signed_corrupted.eml'), False), - (load_message('data/clear.eml'), + (load_message('clear.eml'), False) ]) def test_is_encrypted(self, message, encrypted): super().is_encrypted(message, encrypted) @parameterized.expand([ - (load_message('data/clear.eml'), - load_key('data/rsa_1024.pub.asc')), - (load_message('data/clear.eml'), - (load_key('data/rsa_1024.pub.asc'), - load_key('data/ecc_p256.pub.asc'))) + (load_message('clear.eml'), + load_key('rsa_1024.pub.asc')), + (load_message('clear.eml'), + (load_key('rsa_1024.pub.asc'), + load_key('ecc_p256.pub.asc'))) ]) def test_encrypt(self, message, keys, **kwargs): if isinstance(keys, tuple): @@ -115,19 +115,19 @@ class TestEncryption(InlineWrapperTestCase): super().encrypt(message, keys, **kwargs) @parameterized.expand([ - (load_message('data/clear.eml'), - load_key('data/rsa_1024.pub.asc'), - load_key('data/rsa_1024.priv.asc')), - (load_message('data/clear.eml'), - load_key('data/ecc_p256.pub.asc'), - load_key('data/ecc_p256.priv.asc')) + (load_message('clear.eml'), + load_key('rsa_1024.pub.asc'), + load_key('rsa_1024.priv.asc')), + (load_message('clear.eml'), + load_key('ecc_p256.pub.asc'), + load_key('ecc_p256.priv.asc')) ]) def test_encrypt_decrypt(self, message, pub, priv): super().encrypt_decrypt(message, pub, priv) @parameterized.expand([ - (load_message('data/inline_encrypted.eml'), - load_key('data/rsa_1024.priv.asc'), + (load_message('inline_encrypted.eml'), + load_key('rsa_1024.priv.asc'), 'Some encrypted text.\n\n') ]) def test_decrypt(self, message, key, clear): @@ -136,23 +136,23 @@ class TestEncryption(InlineWrapperTestCase): class TestKeys(InlineWrapperTestCase): @parameterized.expand([ - (load_message('data/inline_privkey.eml'), + (load_message('inline_privkey.eml'), True), - (load_message('data/inline_pubkey.eml'), + (load_message('inline_pubkey.eml'), True), - (load_message('data/clear.eml'), + (load_message('clear.eml'), False), - (load_message('data/inline_cleartext_signed.eml'), + (load_message('inline_cleartext_signed.eml'), False) ]) def test_has_keys(self, message, has_keys): super().has_keys(message, has_keys) @parameterized.expand([ - (load_message('data/inline_privkey.eml'), - [load_key('data/rsa_1024.priv.asc')]), - (load_message('data/inline_pubkey.eml'), - [load_key('data/rsa_1024.pub.asc')]) + (load_message('inline_privkey.eml'), + [load_key('rsa_1024.priv.asc')]), + (load_message('inline_pubkey.eml'), + [load_key('rsa_1024.pub.asc')]) ]) def test_keys(self, message, keys): super().keys(message, keys) |
