aboutsummaryrefslogtreecommitdiff
path: root/src/mailman_pgp/pgp/tests/test_inline.py
diff options
context:
space:
mode:
Diffstat (limited to 'src/mailman_pgp/pgp/tests/test_inline.py')
-rw-r--r--src/mailman_pgp/pgp/tests/test_inline.py102
1 files changed, 51 insertions, 51 deletions
diff --git a/src/mailman_pgp/pgp/tests/test_inline.py b/src/mailman_pgp/pgp/tests/test_inline.py
index 900d5b2..cd18209 100644
--- a/src/mailman_pgp/pgp/tests/test_inline.py
+++ b/src/mailman_pgp/pgp/tests/test_inline.py
@@ -29,54 +29,54 @@ class InlineWrapperTestCase(WrapperTestCase):
class TestSigning(InlineWrapperTestCase):
@parameterized.expand([
- (load_message('data/inline_cleartext_signed.eml'),
+ (load_message('inline_cleartext_signed.eml'),
True),
- (load_message('data/inline_cleartext_signed_invalid.eml'),
+ (load_message('inline_cleartext_signed_invalid.eml'),
True),
- (load_message('data/inline_signed.eml'),
+ (load_message('inline_signed.eml'),
True),
- (load_message('data/inline_signed_corrupted.eml'),
+ (load_message('inline_signed_corrupted.eml'),
False),
- (load_message('data/clear.eml'),
+ (load_message('clear.eml'),
False),
- (load_message('data/inline_encrypted.eml'),
+ (load_message('inline_encrypted.eml'),
False)
])
def test_is_signed(self, message, signed):
super().is_signed(message, signed)
@parameterized.expand([
- (load_message('data/clear.eml'),
- load_key('data/rsa_1024.priv.asc')),
- (load_message('data/clear.eml'),
- load_key('data/ecc_p256.priv.asc'))
+ (load_message('clear.eml'),
+ load_key('rsa_1024.priv.asc')),
+ (load_message('clear.eml'),
+ load_key('ecc_p256.priv.asc'))
])
def test_sign(self, message, key):
super().sign(message, key)
@parameterized.expand([
- (load_message('data/clear.eml'),
- load_key('data/rsa_1024.priv.asc'),
- load_key('data/rsa_1024.pub.asc')),
- (load_message('data/clear.eml'),
- load_key('data/ecc_p256.priv.asc'),
- load_key('data/ecc_p256.pub.asc'))
+ (load_message('clear.eml'),
+ load_key('rsa_1024.priv.asc'),
+ load_key('rsa_1024.pub.asc')),
+ (load_message('clear.eml'),
+ load_key('ecc_p256.priv.asc'),
+ load_key('ecc_p256.pub.asc'))
])
def test_sign_verify(self, message, priv, pub):
super().sign_verify(message, priv, pub)
@parameterized.expand([
- (load_message('data/inline_cleartext_signed.eml'),
- load_key('data/rsa_1024.pub.asc'),
+ (load_message('inline_cleartext_signed.eml'),
+ load_key('rsa_1024.pub.asc'),
True),
- (load_message('data/inline_cleartext_signed_invalid.eml'),
- load_key('data/rsa_1024.pub.asc'),
+ (load_message('inline_cleartext_signed_invalid.eml'),
+ load_key('rsa_1024.pub.asc'),
False),
- (load_message('data/inline_signed.eml'),
- load_key('data/rsa_1024.pub.asc'),
+ (load_message('inline_signed.eml'),
+ load_key('rsa_1024.pub.asc'),
True),
- (load_message('data/inline_signed_corrupted.eml'),
- load_key('data/rsa_1024.pub.asc'),
+ (load_message('inline_signed_corrupted.eml'),
+ load_key('rsa_1024.pub.asc'),
False),
])
def test_verify(self, message, key, valid):
@@ -85,28 +85,28 @@ class TestSigning(InlineWrapperTestCase):
class TestEncryption(InlineWrapperTestCase):
@parameterized.expand([
- (load_message('data/inline_encrypted.eml'),
+ (load_message('inline_encrypted.eml'),
True),
- (load_message('data/inline_cleartext_signed.eml'),
+ (load_message('inline_cleartext_signed.eml'),
False),
- (load_message('data/inline_cleartext_signed_invalid.eml'),
+ (load_message('inline_cleartext_signed_invalid.eml'),
False),
- (load_message('data/inline_signed.eml'),
+ (load_message('inline_signed.eml'),
False),
- (load_message('data/inline_signed_corrupted.eml'),
+ (load_message('inline_signed_corrupted.eml'),
False),
- (load_message('data/clear.eml'),
+ (load_message('clear.eml'),
False)
])
def test_is_encrypted(self, message, encrypted):
super().is_encrypted(message, encrypted)
@parameterized.expand([
- (load_message('data/clear.eml'),
- load_key('data/rsa_1024.pub.asc')),
- (load_message('data/clear.eml'),
- (load_key('data/rsa_1024.pub.asc'),
- load_key('data/ecc_p256.pub.asc')))
+ (load_message('clear.eml'),
+ load_key('rsa_1024.pub.asc')),
+ (load_message('clear.eml'),
+ (load_key('rsa_1024.pub.asc'),
+ load_key('ecc_p256.pub.asc')))
])
def test_encrypt(self, message, keys, **kwargs):
if isinstance(keys, tuple):
@@ -115,19 +115,19 @@ class TestEncryption(InlineWrapperTestCase):
super().encrypt(message, keys, **kwargs)
@parameterized.expand([
- (load_message('data/clear.eml'),
- load_key('data/rsa_1024.pub.asc'),
- load_key('data/rsa_1024.priv.asc')),
- (load_message('data/clear.eml'),
- load_key('data/ecc_p256.pub.asc'),
- load_key('data/ecc_p256.priv.asc'))
+ (load_message('clear.eml'),
+ load_key('rsa_1024.pub.asc'),
+ load_key('rsa_1024.priv.asc')),
+ (load_message('clear.eml'),
+ load_key('ecc_p256.pub.asc'),
+ load_key('ecc_p256.priv.asc'))
])
def test_encrypt_decrypt(self, message, pub, priv):
super().encrypt_decrypt(message, pub, priv)
@parameterized.expand([
- (load_message('data/inline_encrypted.eml'),
- load_key('data/rsa_1024.priv.asc'),
+ (load_message('inline_encrypted.eml'),
+ load_key('rsa_1024.priv.asc'),
'Some encrypted text.\n\n')
])
def test_decrypt(self, message, key, clear):
@@ -136,23 +136,23 @@ class TestEncryption(InlineWrapperTestCase):
class TestKeys(InlineWrapperTestCase):
@parameterized.expand([
- (load_message('data/inline_privkey.eml'),
+ (load_message('inline_privkey.eml'),
True),
- (load_message('data/inline_pubkey.eml'),
+ (load_message('inline_pubkey.eml'),
True),
- (load_message('data/clear.eml'),
+ (load_message('clear.eml'),
False),
- (load_message('data/inline_cleartext_signed.eml'),
+ (load_message('inline_cleartext_signed.eml'),
False)
])
def test_has_keys(self, message, has_keys):
super().has_keys(message, has_keys)
@parameterized.expand([
- (load_message('data/inline_privkey.eml'),
- [load_key('data/rsa_1024.priv.asc')]),
- (load_message('data/inline_pubkey.eml'),
- [load_key('data/rsa_1024.pub.asc')])
+ (load_message('inline_privkey.eml'),
+ [load_key('rsa_1024.priv.asc')]),
+ (load_message('inline_pubkey.eml'),
+ [load_key('rsa_1024.pub.asc')])
])
def test_keys(self, message, keys):
super().keys(message, keys)