@@ -139,12 +139,11 @@ func TestVerifyBinDetachedSig(t *testing.T) {
139139}
140140
141141func Test_KeyRing_GetVerifiedSignatureTimestampSuccess (t * testing.T ) {
142- message := NewPlainMessageFromString ( testMessage )
142+ defer SetFixedTime ( testTime )
143143 var time int64 = 1600000000
144- pgp .latestServerTime = time
145- defer func () {
146- pgp .latestServerTime = testTime
147- }()
144+ SetFixedTime (time )
145+ message := NewPlainMessageFromString (testMessage )
146+
148147 signature , err := keyRingTestPrivate .SignDetached (message )
149148 if err != nil {
150149 t .Errorf ("Got an error while generating the signature: %v" , err )
@@ -159,12 +158,10 @@ func Test_KeyRing_GetVerifiedSignatureTimestampSuccess(t *testing.T) {
159158}
160159
161160func Test_KeyRing_GetVerifiedSignatureTimestampWithContext (t * testing.T ) {
162- message := NewPlainMessageFromString ( testMessage )
161+ defer SetFixedTime ( testTime )
163162 var time int64 = 1600000000
164- pgp .latestServerTime = time
165- defer func () {
166- pgp .latestServerTime = testTime
167- }()
163+ SetFixedTime (time )
164+ message := NewPlainMessageFromString (testMessage )
168165 var testContext = "test-context"
169166 signature , err := keyRingTestPrivate .SignDetachedWithContext (message , NewSigningContext (testContext , true ))
170167 if err != nil {
@@ -259,12 +256,10 @@ func getTimestampOfIssuer(signature *PGPSignature, keyID uint64) int64 {
259256}
260257
261258func Test_KeyRing_GetVerifiedSignatureTimestampError (t * testing.T ) {
262- message := NewPlainMessageFromString ( testMessage )
259+ defer SetFixedTime ( testTime )
263260 var time int64 = 1600000000
264- pgp .latestServerTime = time
265- defer func () {
266- pgp .latestServerTime = testTime
267- }()
261+ SetFixedTime (time )
262+ message := NewPlainMessageFromString (testMessage )
268263 signature , err := keyRingTestPrivate .SignDetached (message )
269264 if err != nil {
270265 t .Errorf ("Got an error while generating the signature: %v" , err )
@@ -616,12 +611,13 @@ func Test_VerifyDetachedWithDoubleContext(t *testing.T) {
616611}
617612
618613func Test_verifySignaturExpire (t * testing.T ) {
619- defer func ( t int64 ) { pgp . latestServerTime = t }( pgp . latestServerTime )
620- pgp . latestServerTime = 0
614+ defer SetFixedTime ( testTime )
615+ SetFixedTime ( 0 )
621616
622617 const lifetime = uint32 (time .Hour / time .Second )
623618
624619 cfg := & packet.Config {
620+ Time : GetTime ,
625621 Algorithm : packet .PubKeyAlgoEdDSA ,
626622 DefaultHash : crypto .SHA256 ,
627623 DefaultCipher : packet .CipherAES256 ,
@@ -655,10 +651,7 @@ func Test_verifySignaturExpire(t *testing.T) {
655651
656652 sig := NewPGPSignature (signature .GetBinary ())
657653
658- // packet.PublicKey.KeyExpired will return false here because PublicKey CreationTime has
659- // nanosecond precision, while pgpcrypto.GetUnixTime() has only second precision.
660- // Adjust the check time to be in the future to ensure that the key is not expired.
661- err = keyRing .VerifyDetached (message , sig , GetUnixTime ()+ 1 )
654+ err = keyRing .VerifyDetached (message , sig , GetUnixTime ())
662655 if err != nil {
663656 t .Fatal (err )
664657 }
0 commit comments