diff options
Diffstat (limited to 'src/mailman_pgp/pgp/tests/test_wrapper.py')
| -rw-r--r-- | src/mailman_pgp/pgp/tests/test_wrapper.py | 110 |
1 files changed, 55 insertions, 55 deletions
diff --git a/src/mailman_pgp/pgp/tests/test_wrapper.py b/src/mailman_pgp/pgp/tests/test_wrapper.py index 1c55ed2..fb7f0bb 100644 --- a/src/mailman_pgp/pgp/tests/test_wrapper.py +++ b/src/mailman_pgp/pgp/tests/test_wrapper.py @@ -28,47 +28,47 @@ class PGPWrapperTestCase(WrapperTestCase): class TestSigning(PGPWrapperTestCase): @parameterized.expand([ - (load_message('data/inline_cleartext_signed.eml'), + (load_message('inline_cleartext_signed.eml'), True), - (load_message('data/inline_cleartext_signed_invalid.eml'), + (load_message('inline_cleartext_signed_invalid.eml'), True), - (load_message('data/inline_encrypted.eml'), + (load_message('inline_encrypted.eml'), False), - (load_message('data/inline_signed.eml'), + (load_message('inline_signed.eml'), True), - (load_message('data/inline_signed_corrupted.eml'), + (load_message('inline_signed_corrupted.eml'), False), - (load_message('data/mime_signed.eml'), + (load_message('mime_signed.eml'), True), - (load_message('data/mime_signed_invalid.eml'), + (load_message('mime_signed_invalid.eml'), True), - (load_message('data/clear.eml'), + (load_message('clear.eml'), False) ]) def test_is_signed(self, message, signed): super().is_signed(message, signed) @parameterized.expand([ - (load_message('data/clear.eml'), - load_key('data/rsa_1024.priv.asc')), - (load_message('data/clear.eml'), - load_key('data/ecc_p256.priv.asc')) + (load_message('clear.eml'), + load_key('rsa_1024.priv.asc')), + (load_message('clear.eml'), + load_key('ecc_p256.priv.asc')) ]) def test_sign(self, message, key): super().sign(message, key) @parameterized.expand([ - (load_message('data/inline_cleartext_signed.eml'), - load_key('data/rsa_1024.pub.asc'), + (load_message('inline_cleartext_signed.eml'), + load_key('rsa_1024.pub.asc'), True), - (load_message('data/inline_cleartext_signed_invalid.eml'), - load_key('data/rsa_1024.pub.asc'), + (load_message('inline_cleartext_signed_invalid.eml'), + load_key('rsa_1024.pub.asc'), False), - (load_message('data/mime_signed.eml'), - load_key('data/rsa_1024.pub.asc'), + (load_message('mime_signed.eml'), + load_key('rsa_1024.pub.asc'), True), - (load_message('data/mime_signed_invalid.eml'), - load_key('data/rsa_1024.pub.asc'), + (load_message('mime_signed_invalid.eml'), + load_key('rsa_1024.pub.asc'), False) ]) def test_verify(self, message, key, valid): @@ -77,30 +77,30 @@ class TestSigning(PGPWrapperTestCase): class TestEncryption(PGPWrapperTestCase): @parameterized.expand([ - (load_message('data/inline_encrypted.eml'), + (load_message('inline_encrypted.eml'), True), - (load_message('data/mime_encrypted_then_signed.eml'), + (load_message('mime_encrypted_then_signed.eml'), True), - (load_message('data/inline_cleartext_signed.eml'), + (load_message('inline_cleartext_signed.eml'), False), - (load_message('data/inline_cleartext_signed_invalid.eml'), + (load_message('inline_cleartext_signed_invalid.eml'), False), - (load_message('data/inline_signed.eml'), + (load_message('inline_signed.eml'), False), - (load_message('data/inline_signed_corrupted.eml'), + (load_message('inline_signed_corrupted.eml'), False), - (load_message('data/clear.eml'), + (load_message('clear.eml'), False) ]) def test_is_encrypted(self, message, encrypted): super().is_encrypted(message, encrypted) @parameterized.expand([ - (load_message('data/clear.eml'), - load_key('data/rsa_1024.pub.asc')), - (load_message('data/clear.eml'), - (load_key('data/rsa_1024.pub.asc'), - load_key('data/ecc_p256.pub.asc'))) + (load_message('clear.eml'), + load_key('rsa_1024.pub.asc')), + (load_message('clear.eml'), + (load_key('rsa_1024.pub.asc'), + load_key('ecc_p256.pub.asc'))) ]) def test_encrypt(self, message, keys, **kwargs): if isinstance(keys, tuple): @@ -109,19 +109,19 @@ class TestEncryption(PGPWrapperTestCase): super().encrypt(message, keys, **kwargs) @parameterized.expand([ - (load_message('data/clear.eml'), - load_key('data/rsa_1024.pub.asc'), - load_key('data/rsa_1024.priv.asc')), - (load_message('data/clear.eml'), - load_key('data/ecc_p256.pub.asc'), - load_key('data/ecc_p256.priv.asc')) + (load_message('clear.eml'), + load_key('rsa_1024.pub.asc'), + load_key('rsa_1024.priv.asc')), + (load_message('clear.eml'), + load_key('ecc_p256.pub.asc'), + load_key('ecc_p256.priv.asc')) ]) def test_encrypt_decrypt(self, message, pub, priv): super().encrypt_decrypt(message, pub, priv) @parameterized.expand([ - (load_message('data/inline_encrypted.eml'), - load_key('data/rsa_1024.priv.asc'), + (load_message('inline_encrypted.eml'), + load_key('rsa_1024.priv.asc'), 'Some encrypted text.\n\n') ]) def test_decrypt(self, message, key, clear): @@ -130,33 +130,33 @@ class TestEncryption(PGPWrapperTestCase): class TestKeys(PGPWrapperTestCase): @parameterized.expand([ - (load_message('data/inline_privkey.eml'), + (load_message('inline_privkey.eml'), True), - (load_message('data/inline_pubkey.eml'), + (load_message('inline_pubkey.eml'), True), - (load_message('data/inline_cleartext_signed.eml'), + (load_message('inline_cleartext_signed.eml'), False), - (load_message('data/mime_privkey.eml'), + (load_message('mime_privkey.eml'), True), - (load_message('data/mime_pubkey.eml'), + (load_message('mime_pubkey.eml'), True), - (load_message('data/mime_signed.eml'), + (load_message('mime_signed.eml'), False), - (load_message('data/clear.eml'), + (load_message('clear.eml'), False) ]) def test_has_keys(self, message, has_keys): super().has_keys(message, has_keys) @parameterized.expand([ - (load_message('data/inline_privkey.eml'), - [load_key('data/rsa_1024.priv.asc')]), - (load_message('data/inline_pubkey.eml'), - [load_key('data/rsa_1024.pub.asc')]), - (load_message('data/mime_privkey.eml'), - [load_key('data/rsa_1024.priv.asc')]), - (load_message('data/mime_pubkey.eml'), - [load_key('data/rsa_1024.pub.asc')]) + (load_message('inline_privkey.eml'), + [load_key('rsa_1024.priv.asc')]), + (load_message('inline_pubkey.eml'), + [load_key('rsa_1024.pub.asc')]), + (load_message('mime_privkey.eml'), + [load_key('rsa_1024.priv.asc')]), + (load_message('mime_pubkey.eml'), + [load_key('rsa_1024.pub.asc')]) ]) def test_keys(self, message, keys): super().keys(message, keys) |
