More passing tests, doing what passing tests do <3 krista-local-7-Jan-2020
authorKrista 'DarthMama' Bennett <krista@pep.foundation>
Sat, 11 Jan 2020 15:00:20 +0100
branchkrista-local-7-Jan-2020
changeset 432328b0e2285aa1
parent 4322 76806e5aebb2
child 4324 820329a83680
More passing tests, doing what passing tests do <3
test/src/KeyResetMessageTest.cc
     1.1 --- a/test/src/KeyResetMessageTest.cc	Sat Jan 11 14:07:06 2020 +0100
     1.2 +++ b/test/src/KeyResetMessageTest.cc	Sat Jan 11 15:00:20 2020 +0100
     1.3 @@ -236,7 +236,7 @@
     1.4      return PEP_STATUS_OK;
     1.5  }
     1.6  
     1.7 -// FAIL
     1.8 +
     1.9  TEST_F(KeyResetMessageTest, check_reset_key_and_notify) {
    1.10      send_setup();
    1.11  
    1.12 @@ -376,7 +376,7 @@
    1.13      cout << "HEY! reset_fpr is " << new_fpr << endl;    
    1.14  }
    1.15  
    1.16 -// PASS
    1.17 +
    1.18  TEST_F(KeyResetMessageTest, check_non_reset_receive_revoked) {
    1.19      receive_setup();
    1.20      pEp_identity* alice_ident = new_identity("pep.test.alice@pep-project.org", NULL,
    1.21 @@ -409,7 +409,6 @@
    1.22      free(keylist);
    1.23  }
    1.24  
    1.25 -// FAIL (fix mail)
    1.26  TEST_F(KeyResetMessageTest, check_reset_receive_revoked) {
    1.27      PEP_STATUS status = set_up_ident_from_scratch(session,
    1.28                  "test_keys/pub/pep.test.fenris-0x4F3D2900_pub.asc",
    1.29 @@ -461,7 +460,7 @@
    1.30      free(keylist);
    1.31  }
    1.32  
    1.33 -// PASS
    1.34 +
    1.35  TEST_F(KeyResetMessageTest, check_receive_message_to_revoked_key_from_unknown) {
    1.36      // create_msg_for_revoked_key(); // call to recreate msg
    1.37      send_setup();
    1.38 @@ -491,7 +490,7 @@
    1.39      free_identity(from_ident);
    1.40  }
    1.41  
    1.42 -// FAIL
    1.43 +
    1.44  TEST_F(KeyResetMessageTest, check_receive_message_to_revoked_key_from_contact) {
    1.45      // create_msg_for_revoked_key(); // call to recreate msg
    1.46      send_setup();
    1.47 @@ -573,7 +572,7 @@
    1.48      }
    1.49  }
    1.50  
    1.51 -// FAIL
    1.52 +
    1.53  TEST_F(KeyResetMessageTest, check_multiple_resets_single_key) {
    1.54      send_setup();
    1.55  
    1.56 @@ -595,7 +594,7 @@
    1.57      ASSERT_TRUE(from_ident->fpr != NULL && from_ident->fpr[0] != 0);
    1.58  }
    1.59  
    1.60 -// PASS
    1.61 +
    1.62  TEST_F(KeyResetMessageTest, check_reset_ident_uid_only) {
    1.63      send_setup(); // lazy
    1.64      pEp_identity* bob = new_identity(NULL, NULL, bob_user_id.c_str(), NULL);
    1.65 @@ -605,7 +604,7 @@
    1.66      ASSERT_EQ(status , PEP_ILLEGAL_VALUE);
    1.67  }
    1.68  
    1.69 -// PASS
    1.70 +
    1.71  TEST_F(KeyResetMessageTest, check_reset_ident_address_only) {
    1.72      send_setup(); // lazy
    1.73      pEp_identity* bob = new_identity("pep.test.bob@pep-project.org", NULL, NULL, NULL);
    1.74 @@ -614,7 +613,7 @@
    1.75      ASSERT_EQ(status , PEP_ILLEGAL_VALUE);
    1.76  }
    1.77  
    1.78 -// PASS
    1.79 +
    1.80  TEST_F(KeyResetMessageTest, check_reset_ident_null_ident) {
    1.81      // Ok, let's reset it
    1.82      PEP_STATUS status = key_reset_identity(session, NULL, NULL);
    1.83 @@ -688,8 +687,296 @@
    1.84                                    
    1.85  }
    1.86  
    1.87 +TEST_F(KeyResetMessageTest, check_reset_grouped_own_multi_ident_one_fpr) {
    1.88 +    char* pubkey1 = strdup("74D79B4496E289BD8A71B70BA8E2C4530019697D");
    1.89  
    1.90 -// PASS
    1.91 +    pEp_identity* alex_id = new_identity("pep.test.alexander@darthmama.org",
    1.92 +                                        NULL,
    1.93 +                                        "AlexID",
    1.94 +                                        "Alexander Braithwaite");
    1.95 +
    1.96 +    pEp_identity* alex_id2 = new_identity("pep.test.alexander6@darthmama.org",
    1.97 +                                          NULL,
    1.98 +                                          "AlexID",
    1.99 +                                          "Alexander Braithwaite");
   1.100 +    
   1.101 +    pEp_identity* alex_id3 = new_identity("pep.test.alexander6a@darthmama.org",
   1.102 +                                          NULL,
   1.103 +                                          "AlexID",
   1.104 +                                          "Alexander Braithwaite");
   1.105 +
   1.106 +    PEP_STATUS status = read_file_and_import_key(session, "test_keys/pub/pep.test.alexander6-0x0019697D_pub.asc");
   1.107 +    status = read_file_and_import_key(session, "test_keys/priv/pep.test.alexander6-0x0019697D_priv.asc");
   1.108 +
   1.109 +    alex_id->me = true;
   1.110 +    status = set_own_key(session, alex_id, pubkey1);
   1.111 +    ASSERT_EQ(status, PEP_STATUS_OK);    
   1.112 +
   1.113 +    alex_id2->me = true;
   1.114 +    status = set_own_key(session, alex_id2, pubkey1);
   1.115 +    ASSERT_EQ(status, PEP_STATUS_OK);    
   1.116 +
   1.117 +    alex_id3->me = true;
   1.118 +    status = set_own_key(session, alex_id3, pubkey1);
   1.119 +    ASSERT_EQ(status, PEP_STATUS_OK);    
   1.120 +        
   1.121 +    status = myself(session, alex_id);
   1.122 +    ASSERT_EQ(status, PEP_STATUS_OK);    
   1.123 +    ASSERT_STREQ(pubkey1, alex_id->fpr);
   1.124 +    
   1.125 +    status = myself(session, alex_id2);
   1.126 +    ASSERT_EQ(status, PEP_STATUS_OK);    
   1.127 +    ASSERT_STREQ(pubkey1, alex_id2->fpr);
   1.128 +
   1.129 +    status = myself(session, alex_id3);
   1.130 +    ASSERT_EQ(status, PEP_STATUS_OK);    
   1.131 +    ASSERT_STREQ(pubkey1, alex_id3->fpr);
   1.132 +
   1.133 +    status = key_reset(session, pubkey1, alex_id);
   1.134 +
   1.135 +    alex_id->fpr = pubkey1;
   1.136 +    status = get_trust(session, alex_id);
   1.137 +    ASSERT_EQ(alex_id->comm_type , PEP_ct_mistrusted);
   1.138 +
   1.139 +    bool revoked = false;
   1.140 +    status = key_revoked(session, pubkey1, &revoked);
   1.141 +    ASSERT_EQ(status, PEP_STATUS_OK);    
   1.142 +    ASSERT_TRUE(revoked);    
   1.143 +    
   1.144 +    status = myself(session, alex_id);
   1.145 +    ASSERT_EQ(status, PEP_STATUS_OK);    
   1.146 +    ASSERT_STRNE(pubkey1, alex_id->fpr);
   1.147 +    
   1.148 +    status = myself(session, alex_id2);
   1.149 +    ASSERT_EQ(status, PEP_STATUS_OK);    
   1.150 +    ASSERT_STRNE(pubkey1, alex_id2->fpr);
   1.151 +
   1.152 +    status = myself(session, alex_id3);
   1.153 +    ASSERT_EQ(status, PEP_STATUS_OK);    
   1.154 +    ASSERT_STRNE(pubkey1, alex_id3->fpr);
   1.155 +    
   1.156 +    ASSERT_STRNE(alex_id->fpr, alex_id2->fpr);
   1.157 +    ASSERT_STRNE(alex_id->fpr, alex_id3->fpr);
   1.158 +    ASSERT_STRNE(alex_id2->fpr, alex_id3->fpr);
   1.159 +
   1.160 +    free_identity(alex_id);
   1.161 +    free_identity(alex_id2);
   1.162 +    free_identity(alex_id3);    
   1.163 +}
   1.164 +
   1.165 +TEST_F(KeyResetMessageTest, check_reset_grouped_own_multiple_keys_multiple_idents_reset_all) {
   1.166 +    char* pubkey1 = strdup("74D79B4496E289BD8A71B70BA8E2C4530019697D");
   1.167 +    char* pubkey2 = strdup("2E21325D202A44BFD9C607FCF095B202503B14D8");
   1.168 +    char* pubkey3 = strdup("3C1E713D8519D7F907E3142D179EAA24A216E95A");
   1.169 +
   1.170 +    pEp_identity* alex_id = new_identity("pep.test.alexander@darthmama.org",
   1.171 +                                        NULL,
   1.172 +                                        "AlexID",
   1.173 +                                        "Alexander Braithwaite");
   1.174 +
   1.175 +    pEp_identity* alex_id2 = new_identity("pep.test.alexander6@darthmama.org",
   1.176 +                                          NULL,
   1.177 +                                          "AlexID",
   1.178 +                                          "Alexander Braithwaite");
   1.179 +    
   1.180 +    pEp_identity* alex_id3 = new_identity("pep.test.alexander6a@darthmama.org",
   1.181 +                                          NULL,
   1.182 +                                          "AlexID",
   1.183 +                                          "Alexander Braithwaite");
   1.184 +
   1.185 +
   1.186 +    PEP_STATUS status = read_file_and_import_key(session, "test_keys/pub/pep.test.alexander6-0x0019697D_pub.asc");
   1.187 +    status = read_file_and_import_key(session, "test_keys/pub/pep.test.alexander6-0x503B14D8_pub.asc");
   1.188 +    status = read_file_and_import_key(session, "test_keys/pub/pep.test.alexander6-0xA216E95A_pub.asc");
   1.189 +    status = read_file_and_import_key(session, "test_keys/priv/pep.test.alexander6-0x0019697D_priv.asc");
   1.190 +    status = read_file_and_import_key(session, "test_keys/priv/pep.test.alexander6-0x503B14D8_priv.asc");
   1.191 +    status = read_file_and_import_key(session, "test_keys/priv/pep.test.alexander6-0xA216E95A_priv.asc");
   1.192 +
   1.193 +    alex_id->me = true;
   1.194 +    status = set_own_key(session, alex_id, pubkey1);
   1.195 +    ASSERT_EQ(status, PEP_STATUS_OK);    
   1.196 +
   1.197 +    alex_id2->me = true;
   1.198 +    status = set_own_key(session, alex_id2, pubkey2);
   1.199 +    ASSERT_EQ(status, PEP_STATUS_OK);    
   1.200 +
   1.201 +    alex_id3->me = true;
   1.202 +    status = set_own_key(session, alex_id3, pubkey3);
   1.203 +    ASSERT_EQ(status, PEP_STATUS_OK);    
   1.204 +        
   1.205 +    status = myself(session, alex_id);
   1.206 +    ASSERT_EQ(status, PEP_STATUS_OK);    
   1.207 +    ASSERT_STREQ(pubkey1, alex_id->fpr);
   1.208 +    
   1.209 +    status = myself(session, alex_id2);
   1.210 +    ASSERT_EQ(status, PEP_STATUS_OK);    
   1.211 +    ASSERT_STREQ(pubkey2, alex_id2->fpr);
   1.212 +
   1.213 +    status = myself(session, alex_id3);
   1.214 +    ASSERT_EQ(status, PEP_STATUS_OK);    
   1.215 +    ASSERT_STREQ(pubkey3, alex_id3->fpr);
   1.216 +
   1.217 +    status = key_reset(session, NULL, NULL);
   1.218 +
   1.219 +    free(alex_id->fpr);
   1.220 +    alex_id->fpr = pubkey1;
   1.221 +    status = get_trust(session, alex_id);
   1.222 +    ASSERT_EQ(alex_id->comm_type , PEP_ct_mistrusted);
   1.223 +
   1.224 +    free(alex_id2->fpr);
   1.225 +    alex_id2->fpr = pubkey2;
   1.226 +    status = get_trust(session, alex_id2);
   1.227 +    ASSERT_EQ(alex_id->comm_type , PEP_ct_mistrusted);
   1.228 +
   1.229 +    free(alex_id3->fpr);
   1.230 +    alex_id3->fpr = pubkey3;
   1.231 +    status = get_trust(session, alex_id3);
   1.232 +    ASSERT_EQ(alex_id->comm_type , PEP_ct_mistrusted);
   1.233 +
   1.234 +    bool revoked = false;
   1.235 +    status = key_revoked(session, pubkey1, &revoked);
   1.236 +    ASSERT_EQ(status, PEP_STATUS_OK);    
   1.237 +    ASSERT_TRUE(revoked);    
   1.238 +
   1.239 +    revoked = false;
   1.240 +    status = key_revoked(session, pubkey2, &revoked);
   1.241 +    ASSERT_EQ(status, PEP_STATUS_OK);    
   1.242 +    ASSERT_TRUE(revoked);    
   1.243 +
   1.244 +    revoked = false;
   1.245 +    status = key_revoked(session, pubkey3, &revoked);
   1.246 +    ASSERT_EQ(status, PEP_STATUS_OK);    
   1.247 +    ASSERT_TRUE(revoked);    
   1.248 +    
   1.249 +    status = myself(session, alex_id);
   1.250 +    ASSERT_EQ(status, PEP_STATUS_OK);    
   1.251 +    ASSERT_STRNE(pubkey1, alex_id->fpr);
   1.252 +    
   1.253 +    status = myself(session, alex_id2);
   1.254 +    ASSERT_EQ(status, PEP_STATUS_OK);    
   1.255 +    ASSERT_STRNE(pubkey2, alex_id2->fpr);
   1.256 +
   1.257 +    status = myself(session, alex_id3);
   1.258 +    ASSERT_EQ(status, PEP_STATUS_OK);    
   1.259 +    ASSERT_STRNE(pubkey3, alex_id3->fpr);
   1.260 +    
   1.261 +    // Not reaaaally necessary, but...
   1.262 +    ASSERT_STRNE(alex_id->fpr, alex_id2->fpr);
   1.263 +    ASSERT_STRNE(alex_id->fpr, alex_id3->fpr);
   1.264 +    ASSERT_STRNE(alex_id2->fpr, alex_id3->fpr);
   1.265 +
   1.266 +    free_identity(alex_id);
   1.267 +    free_identity(alex_id2);
   1.268 +    free_identity(alex_id3);    
   1.269 +}
   1.270 +
   1.271 +TEST_F(KeyResetMessageTest, check_reset_grouped_own_multiple_keys_multiple_idents_reset_one) {
   1.272 +    char* pubkey1 = strdup("74D79B4496E289BD8A71B70BA8E2C4530019697D");
   1.273 +    char* pubkey2 = strdup("2E21325D202A44BFD9C607FCF095B202503B14D8");
   1.274 +    char* pubkey3 = strdup("3C1E713D8519D7F907E3142D179EAA24A216E95A");
   1.275 +
   1.276 +    pEp_identity* alex_id = new_identity("pep.test.alexander@darthmama.org",
   1.277 +                                        NULL,
   1.278 +                                        "AlexID",
   1.279 +                                        "Alexander Braithwaite");
   1.280 +
   1.281 +    pEp_identity* alex_id2 = new_identity("pep.test.alexander6@darthmama.org",
   1.282 +                                          NULL,
   1.283 +                                          "AlexID",
   1.284 +                                          "Alexander Braithwaite");
   1.285 +    
   1.286 +    pEp_identity* alex_id3 = new_identity("pep.test.alexander6a@darthmama.org",
   1.287 +                                          NULL,
   1.288 +                                          "AlexID",
   1.289 +                                          "Alexander Braithwaite");
   1.290 +
   1.291 +
   1.292 +    PEP_STATUS status = read_file_and_import_key(session, "test_keys/pub/pep.test.alexander6-0x0019697D_pub.asc");
   1.293 +    status = read_file_and_import_key(session, "test_keys/pub/pep.test.alexander6-0x503B14D8_pub.asc");
   1.294 +    status = read_file_and_import_key(session, "test_keys/pub/pep.test.alexander6-0xA216E95A_pub.asc");
   1.295 +    status = read_file_and_import_key(session, "test_keys/priv/pep.test.alexander6-0x0019697D_priv.asc");
   1.296 +    status = read_file_and_import_key(session, "test_keys/priv/pep.test.alexander6-0x503B14D8_priv.asc");
   1.297 +    status = read_file_and_import_key(session, "test_keys/priv/pep.test.alexander6-0xA216E95A_priv.asc");
   1.298 +
   1.299 +    alex_id->me = true;
   1.300 +    status = set_own_key(session, alex_id, pubkey1);
   1.301 +    ASSERT_EQ(status, PEP_STATUS_OK);    
   1.302 +
   1.303 +    alex_id2->me = true;
   1.304 +    status = set_own_key(session, alex_id2, pubkey2);
   1.305 +    ASSERT_EQ(status, PEP_STATUS_OK);    
   1.306 +
   1.307 +    alex_id3->me = true;
   1.308 +    status = set_own_key(session, alex_id3, pubkey3);
   1.309 +    ASSERT_EQ(status, PEP_STATUS_OK);    
   1.310 +        
   1.311 +    status = myself(session, alex_id);
   1.312 +    ASSERT_EQ(status, PEP_STATUS_OK);    
   1.313 +    ASSERT_STREQ(pubkey1, alex_id->fpr);
   1.314 +    
   1.315 +    status = myself(session, alex_id2);
   1.316 +    ASSERT_EQ(status, PEP_STATUS_OK);    
   1.317 +    ASSERT_STREQ(pubkey2, alex_id2->fpr);
   1.318 +
   1.319 +    status = myself(session, alex_id3);
   1.320 +    ASSERT_EQ(status, PEP_STATUS_OK);    
   1.321 +    ASSERT_STREQ(pubkey3, alex_id3->fpr);
   1.322 +
   1.323 +    status = key_reset_user(session, alex_id2->user_id, pubkey2);
   1.324 +
   1.325 +    free(alex_id->fpr);
   1.326 +    alex_id->fpr = pubkey1;
   1.327 +    status = get_trust(session, alex_id);
   1.328 +    ASSERT_EQ(alex_id->comm_type , PEP_ct_pEp);
   1.329 +
   1.330 +    free(alex_id2->fpr);
   1.331 +    alex_id2->fpr = pubkey2;
   1.332 +    status = get_trust(session, alex_id2);
   1.333 +    ASSERT_EQ(alex_id2->comm_type , PEP_ct_mistrusted);
   1.334 +
   1.335 +    free(alex_id3->fpr);
   1.336 +    alex_id3->fpr = pubkey3;
   1.337 +    status = get_trust(session, alex_id3);
   1.338 +    ASSERT_EQ(alex_id3->comm_type , PEP_ct_pEp);
   1.339 +
   1.340 +    bool revoked = false;
   1.341 +    status = key_revoked(session, pubkey1, &revoked);
   1.342 +    ASSERT_EQ(status, PEP_STATUS_OK);    
   1.343 +    ASSERT_FALSE(revoked);    
   1.344 +
   1.345 +    revoked = false;
   1.346 +    status = key_revoked(session, pubkey2, &revoked);
   1.347 +    ASSERT_EQ(status, PEP_STATUS_OK);    
   1.348 +    ASSERT_TRUE(revoked);    
   1.349 +
   1.350 +    revoked = false;
   1.351 +    status = key_revoked(session, pubkey3, &revoked);
   1.352 +    ASSERT_EQ(status, PEP_STATUS_OK);    
   1.353 +    ASSERT_FALSE(revoked);    
   1.354 +    
   1.355 +    status = myself(session, alex_id);
   1.356 +    ASSERT_EQ(status, PEP_STATUS_OK);    
   1.357 +    ASSERT_STREQ(pubkey1, alex_id->fpr);
   1.358 +    
   1.359 +    status = myself(session, alex_id2);
   1.360 +    ASSERT_EQ(status, PEP_STATUS_OK);    
   1.361 +    ASSERT_STRNE(pubkey2, alex_id2->fpr);
   1.362 +
   1.363 +    status = myself(session, alex_id3);
   1.364 +    ASSERT_EQ(status, PEP_STATUS_OK);    
   1.365 +    ASSERT_STREQ(pubkey3, alex_id3->fpr);
   1.366 +    
   1.367 +    // Not reaaaally necessary, but...
   1.368 +    ASSERT_STRNE(alex_id->fpr, alex_id2->fpr);
   1.369 +    ASSERT_STRNE(alex_id->fpr, alex_id3->fpr);
   1.370 +    ASSERT_STRNE(alex_id2->fpr, alex_id3->fpr);
   1.371 +
   1.372 +    free_identity(alex_id);
   1.373 +    free_identity(alex_id2);
   1.374 +    free_identity(alex_id3);    
   1.375 +}
   1.376 +
   1.377 +
   1.378  TEST_F(KeyResetMessageTest, check_reset_ident_other_pub_fpr) {
   1.379      send_setup(); // lazy
   1.380      pEp_identity* bob = new_identity("pep.test.bob@pep-project.org", NULL, bob_user_id.c_str(), NULL);
   1.381 @@ -713,7 +1000,7 @@
   1.382      // TODO: import key, verify PEP_ct_OpenPGP_unconfirmed
   1.383  }
   1.384  
   1.385 -// PASS
   1.386 +
   1.387  // Corner case?
   1.388  TEST_F(KeyResetMessageTest, check_reset_ident_other_priv_fpr) {
   1.389      send_setup(); // lazy
   1.390 @@ -744,7 +1031,7 @@
   1.391      // TODO: import key, verify PEP_ct_OpenPGP_unconfirmed
   1.392  }
   1.393  
   1.394 -// PASS
   1.395 +
   1.396  TEST_F(KeyResetMessageTest, check_reset_ident_other_pub_no_fpr) {
   1.397      send_setup(); // lazy
   1.398      pEp_identity* bob = new_identity("pep.test.bob@pep-project.org", NULL, bob_user_id.c_str(), NULL);
   1.399 @@ -773,7 +1060,7 @@
   1.400  //    const char* bob_fpr = "BFCDB7F301DEEEBBF947F29659BFF488C9C2EE39";
   1.401  // TODO: multiplr keys above
   1.402  
   1.403 -// PASS
   1.404 +
   1.405  TEST_F(KeyResetMessageTest, check_reset_ident_other_priv_no_fpr) {
   1.406      send_setup(); // lazy
   1.407      // Also import Bob's private key, because that dude is a fool.
   1.408 @@ -804,7 +1091,7 @@
   1.409      // TODO: import key, verify PEP_ct_OpenPGP_unconfirmed
   1.410  }
   1.411  
   1.412 -// PASS
   1.413 +
   1.414  TEST_F(KeyResetMessageTest, check_reset_ident_own_pub_fpr) {
   1.415      send_setup(); // lazy
   1.416      pEp_identity* alice = new_identity("pep.test.alice@pep-project.org", NULL, alice_user_id.c_str(), NULL);
   1.417 @@ -834,7 +1121,7 @@
   1.418      ASSERT_EQ(status , PEP_CANNOT_FIND_IDENTITY);
   1.419  }
   1.420  
   1.421 -// PASS
   1.422 +
   1.423  TEST_F(KeyResetMessageTest, check_reset_ident_own_priv_fpr) {
   1.424      send_setup(); // lazy
   1.425      pEp_identity* alice = new_identity("pep.test.alice@pep-project.org", NULL, alice_user_id.c_str(), NULL);
   1.426 @@ -853,7 +1140,7 @@
   1.427      ASSERT_STRNE(alice_fpr, alice_new_fpr);
   1.428  }
   1.429  
   1.430 -// PASS
   1.431 +
   1.432  TEST_F(KeyResetMessageTest, check_reset_ident_own_priv_no_fpr) {
   1.433      send_setup(); // lazy
   1.434      pEp_identity* alice = new_identity("pep.test.alice@pep-project.org", NULL, alice_user_id.c_str(), NULL);
   1.435 @@ -873,7 +1160,7 @@
   1.436      ASSERT_STRNE(alice_fpr, alice_new_fpr);
   1.437  }
   1.438  
   1.439 -// PASS
   1.440 +
   1.441  TEST_F(KeyResetMessageTest, check_reset_user_other_no_fpr) {
   1.442        char* pubkey1 = strdup("74D79B4496E289BD8A71B70BA8E2C4530019697D");
   1.443        char* pubkey2 = strdup("2E21325D202A44BFD9C607FCF095B202503B14D8");
   1.444 @@ -934,7 +1221,7 @@
   1.445  
   1.446  }
   1.447  
   1.448 -// PASS
   1.449 +
   1.450  TEST_F(KeyResetMessageTest, check_reset_user_other_fpr) {
   1.451        char* pubkey1 = strdup("74D79B4496E289BD8A71B70BA8E2C4530019697D");
   1.452        char* pubkey2 = strdup("2E21325D202A44BFD9C607FCF095B202503B14D8");
   1.453 @@ -1006,7 +1293,7 @@
   1.454      free_identity(alex_id);
   1.455  }
   1.456  
   1.457 -// FAIL
   1.458 +
   1.459  TEST_F(KeyResetMessageTest, check_reset_user_own_fpr) {
   1.460        char* pubkey1 = strdup("74D79B4496E289BD8A71B70BA8E2C4530019697D");
   1.461        char* pubkey2 = strdup("2E21325D202A44BFD9C607FCF095B202503B14D8");
   1.462 @@ -1075,7 +1362,7 @@
   1.463      free_identity(alex_id);
   1.464  }
   1.465  
   1.466 -// PASS
   1.467 +
   1.468  TEST_F(KeyResetMessageTest, check_reset_user_no_fpr) {
   1.469        char* pubkey1 = strdup("74D79B4496E289BD8A71B70BA8E2C4530019697D");
   1.470        char* pubkey2 = strdup("2E21325D202A44BFD9C607FCF095B202503B14D8");
   1.471 @@ -1118,7 +1405,7 @@
   1.472      free_identity(alex_id);
   1.473  }
   1.474  
   1.475 -// FAIL
   1.476 +
   1.477  TEST_F(KeyResetMessageTest, check_reset_all_own_keys) {
   1.478      char* pubkey1 = strdup("74D79B4496E289BD8A71B70BA8E2C4530019697D");
   1.479      char* pubkey2 = strdup("2E21325D202A44BFD9C607FCF095B202503B14D8");
   1.480 @@ -1222,7 +1509,7 @@
   1.481      free_identity(alex_id);
   1.482  }
   1.483  
   1.484 -// PASS
   1.485 +
   1.486  TEST_F(KeyResetMessageTest, check_reset_all_own_no_own) {
   1.487        char* pubkey1 = strdup("74D79B4496E289BD8A71B70BA8E2C4530019697D");
   1.488        char* pubkey2 = strdup("2E21325D202A44BFD9C607FCF095B202503B14D8");
   1.489 @@ -1330,7 +1617,7 @@
   1.490      myfile.close();      
   1.491  }
   1.492  
   1.493 -// PASS
   1.494 +
   1.495  TEST_F(KeyResetMessageTest, check_no_reset_message_to_self) {
   1.496      pEp_identity* bob = NULL;
   1.497      PEP_STATUS status = set_up_preset(session, BOB,
   1.498 @@ -1361,7 +1648,7 @@
   1.499      ASSERT_EQ(status, PEP_VERIFY_SIGNER_KEY_REVOKED);
   1.500  }
   1.501  
   1.502 -// PASS
   1.503 +
   1.504  TEST_F(KeyResetMessageTest, check_reset_mistrust_next_msg_have_not_mailed) {
   1.505      pEp_identity* carol = NULL;
   1.506      PEP_STATUS status = set_up_preset(session, CAROL,
   1.507 @@ -1553,7 +1840,7 @@
   1.508  }
   1.509  */
   1.510  
   1.511 -// PASS
   1.512 +
   1.513  TEST_F(KeyResetMessageTest, codec_test) {
   1.514      // create input values
   1.515