aboutsummaryrefslogtreecommitdiff
path: root/src/mailman_pgp/pgp/tests/test_mime.py
diff options
context:
space:
mode:
Diffstat (limited to 'src/mailman_pgp/pgp/tests/test_mime.py')
-rw-r--r--src/mailman_pgp/pgp/tests/test_mime.py86
1 files changed, 43 insertions, 43 deletions
diff --git a/src/mailman_pgp/pgp/tests/test_mime.py b/src/mailman_pgp/pgp/tests/test_mime.py
index 7243e06..fab50bb 100644
--- a/src/mailman_pgp/pgp/tests/test_mime.py
+++ b/src/mailman_pgp/pgp/tests/test_mime.py
@@ -29,42 +29,42 @@ class MIMEWrapperTestCase(WrapperTestCase):
class TestSigning(MIMEWrapperTestCase):
@parameterized.expand([
- (load_message('data/mime_signed.eml'),
+ (load_message('mime_signed.eml'),
True),
- (load_message('data/mime_signed_invalid.eml'),
+ (load_message('mime_signed_invalid.eml'),
True),
- (load_message('data/clear.eml'),
+ (load_message('clear.eml'),
False)
])
def test_is_signed(self, message, signed):
super().is_signed(message, signed)
@parameterized.expand([
- (load_message('data/clear.eml'),
- load_key('data/rsa_1024.priv.asc')),
- (load_message('data/clear.eml'),
- load_key('data/ecc_p256.priv.asc'))
+ (load_message('clear.eml'),
+ load_key('rsa_1024.priv.asc')),
+ (load_message('clear.eml'),
+ load_key('ecc_p256.priv.asc'))
])
def test_sign(self, message, key):
super().sign(message, key)
@parameterized.expand([
- (load_message('data/clear.eml'),
- load_key('data/rsa_1024.priv.asc'),
- load_key('data/rsa_1024.pub.asc')),
- (load_message('data/clear.eml'),
- load_key('data/ecc_p256.priv.asc'),
- load_key('data/ecc_p256.pub.asc'))
+ (load_message('clear.eml'),
+ load_key('rsa_1024.priv.asc'),
+ load_key('rsa_1024.pub.asc')),
+ (load_message('clear.eml'),
+ load_key('ecc_p256.priv.asc'),
+ load_key('ecc_p256.pub.asc'))
])
def test_sign_verify(self, message, priv, pub):
super().sign_verify(message, priv, pub)
@parameterized.expand([
- (load_message('data/mime_signed.eml'),
- load_key('data/rsa_1024.pub.asc'),
+ (load_message('mime_signed.eml'),
+ load_key('rsa_1024.pub.asc'),
True),
- (load_message('data/mime_signed_invalid.eml'),
- load_key('data/rsa_1024.pub.asc'),
+ (load_message('mime_signed_invalid.eml'),
+ load_key('rsa_1024.pub.asc'),
False)
])
def test_verify(self, message, key, valid):
@@ -73,20 +73,20 @@ class TestSigning(MIMEWrapperTestCase):
class TestEncryption(MIMEWrapperTestCase):
@parameterized.expand([
- (load_message('data/mime_encrypted.eml'),
+ (load_message('mime_encrypted.eml'),
True),
- (load_message('data/mime_encrypted_then_signed.eml'),
+ (load_message('mime_encrypted_then_signed.eml'),
True)
])
def test_is_encrypted(self, message, encrypted):
super().is_encrypted(message, encrypted)
@parameterized.expand([
- (load_message('data/clear.eml'),
- load_key('data/rsa_1024.pub.asc')),
- (load_message('data/clear.eml'),
- (load_key('data/rsa_1024.pub.asc'),
- load_key('data/ecc_p256.pub.asc')))
+ (load_message('clear.eml'),
+ load_key('rsa_1024.pub.asc')),
+ (load_message('clear.eml'),
+ (load_key('rsa_1024.pub.asc'),
+ load_key('ecc_p256.pub.asc')))
])
def test_encrypt(self, message, keys, **kwargs):
if isinstance(keys, tuple):
@@ -95,19 +95,19 @@ class TestEncryption(MIMEWrapperTestCase):
super().encrypt(message, keys, **kwargs)
@parameterized.expand([
- (load_message('data/clear.eml'),
- load_key('data/rsa_1024.pub.asc'),
- load_key('data/rsa_1024.priv.asc')),
- (load_message('data/clear.eml'),
- load_key('data/ecc_p256.pub.asc'),
- load_key('data/ecc_p256.priv.asc'))
+ (load_message('clear.eml'),
+ load_key('rsa_1024.pub.asc'),
+ load_key('rsa_1024.priv.asc')),
+ (load_message('clear.eml'),
+ load_key('ecc_p256.pub.asc'),
+ load_key('ecc_p256.priv.asc'))
])
def test_encrypt_decrypt(self, message, pub, priv):
super().encrypt_decrypt(message, pub, priv)
@parameterized.expand([
- (load_message('data/mime_encrypted.eml'),
- load_key('data/rsa_1024.priv.asc'),
+ (load_message('mime_encrypted.eml'),
+ load_key('rsa_1024.priv.asc'),
'Some encrypted text.\n')
])
def test_decrypt(self, message, key, clear):
@@ -116,23 +116,23 @@ class TestEncryption(MIMEWrapperTestCase):
class TestKeys(MIMEWrapperTestCase):
@parameterized.expand([
- (load_message('data/mime_privkey.eml'),
+ (load_message('mime_privkey.eml'),
True),
- (load_message('data/mime_pubkey.eml'),
+ (load_message('mime_pubkey.eml'),
True),
- (load_message('data/clear.eml'),
+ (load_message('clear.eml'),
False),
- (load_message('data/mime_signed.eml'),
+ (load_message('mime_signed.eml'),
False)
])
def test_has_keys(self, message, has_keys):
super().has_keys(message, has_keys)
@parameterized.expand([
- (load_message('data/mime_privkey.eml'),
- [load_key('data/rsa_1024.priv.asc')]),
- (load_message('data/mime_pubkey.eml'),
- [load_key('data/rsa_1024.pub.asc')])
+ (load_message('mime_privkey.eml'),
+ [load_key('rsa_1024.priv.asc')]),
+ (load_message('mime_pubkey.eml'),
+ [load_key('rsa_1024.pub.asc')])
])
def test_keys(self, message, keys):
super().keys(message, keys)
@@ -140,9 +140,9 @@ class TestKeys(MIMEWrapperTestCase):
class TestCombined(MIMEWrapperTestCase):
@parameterized.expand([
- (load_message('data/clear.eml'),
- load_key('data/rsa_1024.priv.asc'),
- load_key('data/ecc_p256.priv.asc'))
+ (load_message('clear.eml'),
+ load_key('rsa_1024.priv.asc'),
+ load_key('ecc_p256.priv.asc'))
])
def test_sign_encrypt_decrypt_verify(self, message, sign_key, encrypt_key):
super().sign_encrypt_decrypt_verify(message, sign_key, encrypt_key)