diff options
author | Danny Hermes <daniel.j.hermes@gmail.com> | 2015-08-20 14:05:56 -0700 |
---|---|---|
committer | Danny Hermes <daniel.j.hermes@gmail.com> | 2015-08-21 08:23:07 -0700 |
commit | 28445b98bb81c60189dc73119904b0125ca73cd3 (patch) | |
tree | 2ee4eba0fbb8cfaaa2d2ec468194f9f16683a682 /tests/test__pycrypto_crypt.py | |
parent | 22981ac17bcba14f8743f4b852fbe0eb5f1f1c8d (diff) | |
download | oauth2client-28445b98bb81c60189dc73119904b0125ca73cd3.tar.gz |
Making tests/ files pass PEP8.
This is all errors except E402: module level import not at top of file.
This is because in most (all?) files the __author__ global comes
before imports begin.
Ref: http://stackoverflow.com/a/24859703/1068170
Diffstat (limited to 'tests/test__pycrypto_crypt.py')
-rw-r--r-- | tests/test__pycrypto_crypt.py | 10 |
1 files changed, 5 insertions, 5 deletions
diff --git a/tests/test__pycrypto_crypt.py b/tests/test__pycrypto_crypt.py index 9895a62..0f26b03 100644 --- a/tests/test__pycrypto_crypt.py +++ b/tests/test__pycrypto_crypt.py @@ -23,9 +23,9 @@ from oauth2client.crypt import PyCryptoVerifier class TestPyCryptoVerifier(unittest.TestCase): PUBLIC_KEY_FILENAME = os.path.join(os.path.dirname(__file__), - 'data', 'publickey.pem') + 'data', 'publickey.pem') PRIVATE_KEY_FILENAME = os.path.join(os.path.dirname(__file__), - 'data', 'privatekey.pem') + 'data', 'privatekey.pem') def _load_public_key_bytes(self): with open(self.PUBLIC_KEY_FILENAME, 'rb') as fh: @@ -41,18 +41,18 @@ class TestPyCryptoVerifier(unittest.TestCase): actual_signature = signer.sign(to_sign) verifier = PyCryptoVerifier.from_string(self._load_public_key_bytes(), - is_x509_cert=True) + is_x509_cert=True) self.assertTrue(verifier.verify(to_sign, actual_signature)) def test_verify_failure(self): verifier = PyCryptoVerifier.from_string(self._load_public_key_bytes(), - is_x509_cert=True) + is_x509_cert=True) bad_signature = b'' self.assertFalse(verifier.verify(b'foo', bad_signature)) def test_verify_bad_key(self): verifier = PyCryptoVerifier.from_string(self._load_public_key_bytes(), - is_x509_cert=True) + is_x509_cert=True) bad_signature = b'' self.assertFalse(verifier.verify(b'foo', bad_signature)) |