@@ -11,6 +11,7 @@ import (
1111
1212 "github.com/ProtonMail/go-crypto/openpgp/packet"
1313 "github.com/stretchr/testify/assert"
14+ "github.com/stretchr/testify/require"
1415)
1516
1617func TestTextMessageEncryptionWithPassword (t * testing.T ) {
@@ -32,7 +33,7 @@ func TestTextMessageEncryptionWithPassword(t *testing.T) {
3233 }
3334 sessionKey , ok := p .(* packet.SymmetricKeyEncrypted )
3435 if ok {
35- assert .Equal (t , sessionKey . CipherFunc , packet . CipherAES256 )
36+ assert .Equal (t , packet . CipherAES256 , sessionKey . CipherFunc )
3637 foundSk = true
3738 break
3839 }
@@ -43,7 +44,7 @@ func TestTextMessageEncryptionWithPassword(t *testing.T) {
4344 // Decrypt data with wrong password
4445 decryptorWrong , _ := testPGP .Decryption ().Password ([]byte ("Wrong password" )).New ()
4546 _ , err = decryptorWrong .Decrypt (encrypted .Bytes (), Bytes )
46- assert . NotNil (t , err )
47+ require . Error (t , err )
4748
4849 // Decrypt data with the good password
4950 decryptor , _ := testPGP .Decryption ().Password (testSymmetricKey ).New ()
@@ -67,7 +68,7 @@ func TestBinaryMessageEncryptionWithPassword(t *testing.T) {
6768 // Decrypt data with wrong password
6869 decryptorWrong , _ := testPGP .Decryption ().Password ([]byte ("Wrong password" )).New ()
6970 _ , err = decryptorWrong .Decrypt (encrypted .Bytes (), Bytes )
70- assert . NotNil (t , err )
71+ require . Error (t , err )
7172
7273 // Decrypt data with the good password
7374 decryptor , _ := testPGP .Decryption ().Password (testSymmetricKey ).New ()
@@ -305,7 +306,7 @@ func TestSHA1SignedMessageDecryption(t *testing.T) {
305306
306307func TestMultipleKeyMessageEncryption (t * testing.T ) {
307308 var message = []byte ("plain text" )
308- assert .Exactly (t , 3 , len ( keyRingTestMultiple .entities ) )
309+ assert .Len (t , keyRingTestMultiple .entities , 3 )
309310
310311 encryptor , _ := testPGP .Encryption ().Recipients (keyRingTestMultiple ).SigningKeys (keyRingTestPrivate ).New ()
311312 ciphertext , err := encryptor .Encrypt (message )
@@ -317,7 +318,7 @@ func TestMultipleKeyMessageEncryption(t *testing.T) {
317318 // followed by a single symmetrically encrypted data packet (tag 18)
318319 var p packet.Packet
319320 packets := packet .NewReader (bytes .NewReader (ciphertext .Bytes ()))
320- for i := 0 ; i < 3 ; i ++ {
321+ for range 3 {
321322 if p , err = packets .Next (); err != nil {
322323 t .Fatal (err .Error ())
323324 }
@@ -349,15 +350,15 @@ func TestMultipleKeyMessageEncryption(t *testing.T) {
349350
350351func TestMessageGetEncryptionKeyIDs (t * testing.T ) {
351352 var message = []byte ("plain text" )
352- assert .Exactly (t , 3 , len ( keyRingTestMultiple .entities ) )
353+ assert .Len (t , keyRingTestMultiple .entities , 3 )
353354
354355 encryptor , _ := testPGP .Encryption ().Recipients (keyRingTestMultiple ).SigningKeys (keyRingTestPrivate ).New ()
355356 ciphertext , err := encryptor .Encrypt (message )
356357 if err != nil {
357358 t .Fatal ("Expected no error when encrypting, got:" , err )
358359 }
359360 ids , ok := ciphertext .EncryptionKeyIDs ()
360- assert .Exactly (t , 3 , len ( ids ) )
361+ assert .Len (t , ids , 3 )
361362 assert .True (t , ok )
362363 encKey , ok := keyRingTestMultiple .entities [0 ].EncryptionKey (time .Now (), nil )
363364 assert .True (t , ok )
@@ -371,7 +372,7 @@ func TestMessageGetHexGetEncryptionKeyIDs(t *testing.T) {
371372 }
372373
373374 ids , ok := ciphertext .HexEncryptionKeyIDs ()
374- assert .Exactly (t , 2 , len ( ids ) )
375+ assert .Len (t , ids , 2 )
375376 assert .True (t , ok )
376377
377378 assert .Exactly (t , "76ad736fa7e0e83c" , ids [0 ])
@@ -388,7 +389,7 @@ func TestMessageGetSignatureKeyIDs(t *testing.T) {
388389 }
389390
390391 ids , ok := SignatureKeyIDs (signature )
391- assert .Exactly (t , 1 , len ( ids ) )
392+ assert .Len (t , ids , 1 )
392393 assert .True (t , ok )
393394 signingKey , ok := keyRingTestPrivate .entities [0 ].SigningKey (time .Now (), nil )
394395 assert .True (t , ok )
@@ -402,7 +403,7 @@ func TestMessageGetHexSignatureKeyIDs(t *testing.T) {
402403 }
403404
404405 ids , ok := ciphertext .HexSignatureKeyIDs ()
405- assert .Exactly (t , 2 , len ( ids ) )
406+ assert .Len (t , ids , 2 )
406407 assert .True (t , ok )
407408
408409 assert .Exactly (t , "3eb6259edf21df24" , ids [0 ])
0 commit comments