aboutsummaryrefslogtreecommitdiff
path: root/tests/test__pycrypto_crypt.py
diff options
context:
space:
mode:
authorDanny Hermes <daniel.j.hermes@gmail.com>2015-08-20 14:05:56 -0700
committerDanny Hermes <daniel.j.hermes@gmail.com>2015-08-21 08:23:07 -0700
commit28445b98bb81c60189dc73119904b0125ca73cd3 (patch)
tree2ee4eba0fbb8cfaaa2d2ec468194f9f16683a682 /tests/test__pycrypto_crypt.py
parent22981ac17bcba14f8743f4b852fbe0eb5f1f1c8d (diff)
downloadoauth2client-28445b98bb81c60189dc73119904b0125ca73cd3.tar.gz
Making tests/ files pass PEP8.
This is all errors except E402: module level import not at top of file. This is because in most (all?) files the __author__ global comes before imports begin. Ref: http://stackoverflow.com/a/24859703/1068170
Diffstat (limited to 'tests/test__pycrypto_crypt.py')
-rw-r--r--tests/test__pycrypto_crypt.py10
1 files changed, 5 insertions, 5 deletions
diff --git a/tests/test__pycrypto_crypt.py b/tests/test__pycrypto_crypt.py
index 9895a62..0f26b03 100644
--- a/tests/test__pycrypto_crypt.py
+++ b/tests/test__pycrypto_crypt.py
@@ -23,9 +23,9 @@ from oauth2client.crypt import PyCryptoVerifier
class TestPyCryptoVerifier(unittest.TestCase):
PUBLIC_KEY_FILENAME = os.path.join(os.path.dirname(__file__),
- 'data', 'publickey.pem')
+ 'data', 'publickey.pem')
PRIVATE_KEY_FILENAME = os.path.join(os.path.dirname(__file__),
- 'data', 'privatekey.pem')
+ 'data', 'privatekey.pem')
def _load_public_key_bytes(self):
with open(self.PUBLIC_KEY_FILENAME, 'rb') as fh:
@@ -41,18 +41,18 @@ class TestPyCryptoVerifier(unittest.TestCase):
actual_signature = signer.sign(to_sign)
verifier = PyCryptoVerifier.from_string(self._load_public_key_bytes(),
- is_x509_cert=True)
+ is_x509_cert=True)
self.assertTrue(verifier.verify(to_sign, actual_signature))
def test_verify_failure(self):
verifier = PyCryptoVerifier.from_string(self._load_public_key_bytes(),
- is_x509_cert=True)
+ is_x509_cert=True)
bad_signature = b''
self.assertFalse(verifier.verify(b'foo', bad_signature))
def test_verify_bad_key(self):
verifier = PyCryptoVerifier.from_string(self._load_public_key_bytes(),
- is_x509_cert=True)
+ is_x509_cert=True)
bad_signature = b''
self.assertFalse(verifier.verify(b'foo', bad_signature))