diff options
Diffstat (limited to 'src/mailman_pgp/pgp/tests/test_mime.py')
| -rw-r--r-- | src/mailman_pgp/pgp/tests/test_mime.py | 86 |
1 files changed, 43 insertions, 43 deletions
diff --git a/src/mailman_pgp/pgp/tests/test_mime.py b/src/mailman_pgp/pgp/tests/test_mime.py index 7243e06..fab50bb 100644 --- a/src/mailman_pgp/pgp/tests/test_mime.py +++ b/src/mailman_pgp/pgp/tests/test_mime.py @@ -29,42 +29,42 @@ class MIMEWrapperTestCase(WrapperTestCase): class TestSigning(MIMEWrapperTestCase): @parameterized.expand([ - (load_message('data/mime_signed.eml'), + (load_message('mime_signed.eml'), True), - (load_message('data/mime_signed_invalid.eml'), + (load_message('mime_signed_invalid.eml'), True), - (load_message('data/clear.eml'), + (load_message('clear.eml'), False) ]) def test_is_signed(self, message, signed): super().is_signed(message, signed) @parameterized.expand([ - (load_message('data/clear.eml'), - load_key('data/rsa_1024.priv.asc')), - (load_message('data/clear.eml'), - load_key('data/ecc_p256.priv.asc')) + (load_message('clear.eml'), + load_key('rsa_1024.priv.asc')), + (load_message('clear.eml'), + load_key('ecc_p256.priv.asc')) ]) def test_sign(self, message, key): super().sign(message, key) @parameterized.expand([ - (load_message('data/clear.eml'), - load_key('data/rsa_1024.priv.asc'), - load_key('data/rsa_1024.pub.asc')), - (load_message('data/clear.eml'), - load_key('data/ecc_p256.priv.asc'), - load_key('data/ecc_p256.pub.asc')) + (load_message('clear.eml'), + load_key('rsa_1024.priv.asc'), + load_key('rsa_1024.pub.asc')), + (load_message('clear.eml'), + load_key('ecc_p256.priv.asc'), + load_key('ecc_p256.pub.asc')) ]) def test_sign_verify(self, message, priv, pub): super().sign_verify(message, priv, pub) @parameterized.expand([ - (load_message('data/mime_signed.eml'), - load_key('data/rsa_1024.pub.asc'), + (load_message('mime_signed.eml'), + load_key('rsa_1024.pub.asc'), True), - (load_message('data/mime_signed_invalid.eml'), - load_key('data/rsa_1024.pub.asc'), + (load_message('mime_signed_invalid.eml'), + load_key('rsa_1024.pub.asc'), False) ]) def test_verify(self, message, key, valid): @@ -73,20 +73,20 @@ class TestSigning(MIMEWrapperTestCase): class TestEncryption(MIMEWrapperTestCase): @parameterized.expand([ - (load_message('data/mime_encrypted.eml'), + (load_message('mime_encrypted.eml'), True), - (load_message('data/mime_encrypted_then_signed.eml'), + (load_message('mime_encrypted_then_signed.eml'), True) ]) def test_is_encrypted(self, message, encrypted): super().is_encrypted(message, encrypted) @parameterized.expand([ - (load_message('data/clear.eml'), - load_key('data/rsa_1024.pub.asc')), - (load_message('data/clear.eml'), - (load_key('data/rsa_1024.pub.asc'), - load_key('data/ecc_p256.pub.asc'))) + (load_message('clear.eml'), + load_key('rsa_1024.pub.asc')), + (load_message('clear.eml'), + (load_key('rsa_1024.pub.asc'), + load_key('ecc_p256.pub.asc'))) ]) def test_encrypt(self, message, keys, **kwargs): if isinstance(keys, tuple): @@ -95,19 +95,19 @@ class TestEncryption(MIMEWrapperTestCase): super().encrypt(message, keys, **kwargs) @parameterized.expand([ - (load_message('data/clear.eml'), - load_key('data/rsa_1024.pub.asc'), - load_key('data/rsa_1024.priv.asc')), - (load_message('data/clear.eml'), - load_key('data/ecc_p256.pub.asc'), - load_key('data/ecc_p256.priv.asc')) + (load_message('clear.eml'), + load_key('rsa_1024.pub.asc'), + load_key('rsa_1024.priv.asc')), + (load_message('clear.eml'), + load_key('ecc_p256.pub.asc'), + load_key('ecc_p256.priv.asc')) ]) def test_encrypt_decrypt(self, message, pub, priv): super().encrypt_decrypt(message, pub, priv) @parameterized.expand([ - (load_message('data/mime_encrypted.eml'), - load_key('data/rsa_1024.priv.asc'), + (load_message('mime_encrypted.eml'), + load_key('rsa_1024.priv.asc'), 'Some encrypted text.\n') ]) def test_decrypt(self, message, key, clear): @@ -116,23 +116,23 @@ class TestEncryption(MIMEWrapperTestCase): class TestKeys(MIMEWrapperTestCase): @parameterized.expand([ - (load_message('data/mime_privkey.eml'), + (load_message('mime_privkey.eml'), True), - (load_message('data/mime_pubkey.eml'), + (load_message('mime_pubkey.eml'), True), - (load_message('data/clear.eml'), + (load_message('clear.eml'), False), - (load_message('data/mime_signed.eml'), + (load_message('mime_signed.eml'), False) ]) def test_has_keys(self, message, has_keys): super().has_keys(message, has_keys) @parameterized.expand([ - (load_message('data/mime_privkey.eml'), - [load_key('data/rsa_1024.priv.asc')]), - (load_message('data/mime_pubkey.eml'), - [load_key('data/rsa_1024.pub.asc')]) + (load_message('mime_privkey.eml'), + [load_key('rsa_1024.priv.asc')]), + (load_message('mime_pubkey.eml'), + [load_key('rsa_1024.pub.asc')]) ]) def test_keys(self, message, keys): super().keys(message, keys) @@ -140,9 +140,9 @@ class TestKeys(MIMEWrapperTestCase): class TestCombined(MIMEWrapperTestCase): @parameterized.expand([ - (load_message('data/clear.eml'), - load_key('data/rsa_1024.priv.asc'), - load_key('data/ecc_p256.priv.asc')) + (load_message('clear.eml'), + load_key('rsa_1024.priv.asc'), + load_key('ecc_p256.priv.asc')) ]) def test_sign_encrypt_decrypt_verify(self, message, sign_key, encrypt_key): super().sign_encrypt_decrypt_verify(message, sign_key, encrypt_key) |
