Commit
+9 -9 +/-1 browse
1 | diff --git a/src/dkim/sign.rs b/src/dkim/sign.rs |
2 | index 3a68c24..ea3dd24 100644 |
3 | --- a/src/dkim/sign.rs |
4 | +++ b/src/dkim/sign.rs |
5 | @@ -248,7 +248,7 @@ mod test { |
6 | ); |
7 | } |
8 | |
9 | - // Test RSA-SHA256 relaxed/relaxed |
10 | + dbg!("Test RSA-SHA256 relaxed/relaxed"); |
11 | #[cfg(feature = "rust-crypto")] |
12 | let pk_rsa = RsaKey::<Sha256>::from_pkcs1_pem(RSA_PRIVATE_KEY).unwrap(); |
13 | #[cfg(all(feature = "ring", not(feature = "rust-crypto")))] |
14 | @@ -267,7 +267,7 @@ mod test { |
15 | ) |
16 | .await; |
17 | |
18 | - // Test ED25519-SHA256 relaxed/relaxed |
19 | + dbg!("Test ED25519-SHA256 relaxed/relaxed"); |
20 | verify( |
21 | &resolver, |
22 | DkimSigner::from_key(pk_ed) |
23 | @@ -281,7 +281,7 @@ mod test { |
24 | ) |
25 | .await; |
26 | |
27 | - // Test RSA-SHA256 simple/simple with duplicated headers |
28 | + dbg!("Test RSA-SHA256 simple/simple with duplicated headers"); |
29 | #[cfg(feature = "rust-crypto")] |
30 | let pk_rsa = RsaKey::<Sha256>::from_pkcs1_pem(RSA_PRIVATE_KEY).unwrap(); |
31 | #[cfg(all(feature = "ring", not(feature = "rust-crypto")))] |
32 | @@ -307,7 +307,7 @@ mod test { |
33 | ) |
34 | .await; |
35 | |
36 | - // Test RSA-SHA256 simple/relaxed with fixed body length |
37 | + dbg!("Test RSA-SHA256 simple/relaxed with fixed body length"); |
38 | #[cfg(feature = "rust-crypto")] |
39 | let pk_rsa = RsaKey::<Sha256>::from_pkcs1_pem(RSA_PRIVATE_KEY).unwrap(); |
40 | #[cfg(all(feature = "ring", not(feature = "rust-crypto")))] |
41 | @@ -327,7 +327,7 @@ mod test { |
42 | ) |
43 | .await; |
44 | |
45 | - // Test AUID not matching domain |
46 | + dbg!("Test AUID not matching domains"); |
47 | #[cfg(feature = "rust-crypto")] |
48 | let pk_rsa = RsaKey::<Sha256>::from_pkcs1_pem(RSA_PRIVATE_KEY).unwrap(); |
49 | #[cfg(all(feature = "ring", not(feature = "rust-crypto")))] |
50 | @@ -346,7 +346,7 @@ mod test { |
51 | ) |
52 | .await; |
53 | |
54 | - // Test expired signature and reporting |
55 | + dbg!("Test expired signature and reporting"); |
56 | #[cfg(feature = "rust-crypto")] |
57 | let pk_rsa = RsaKey::<Sha256>::from_pkcs1_pem(RSA_PRIVATE_KEY).unwrap(); |
58 | #[cfg(all(feature = "ring", not(feature = "rust-crypto")))] |
59 | @@ -370,7 +370,7 @@ mod test { |
60 | .report; |
61 | assert_eq!(r.as_deref(), Some("dkim-failures@example.com")); |
62 | |
63 | - // Verify ATPS (failure) |
64 | + dbg!("Verify ATPS (failure)"); |
65 | #[cfg(feature = "rust-crypto")] |
66 | let pk_rsa = RsaKey::<Sha256>::from_pkcs1_pem(RSA_PRIVATE_KEY).unwrap(); |
67 | #[cfg(all(feature = "ring", not(feature = "rust-crypto")))] |
68 | @@ -390,7 +390,7 @@ mod test { |
69 | ) |
70 | .await; |
71 | |
72 | - // Verify ATPS (success) |
73 | + dbg!("Verify ATPS (success)"); |
74 | #[cfg(feature = "rust-crypto")] |
75 | let pk_rsa = RsaKey::<Sha256>::from_pkcs1_pem(RSA_PRIVATE_KEY).unwrap(); |
76 | #[cfg(all(feature = "ring", not(feature = "rust-crypto")))] |
77 | @@ -416,7 +416,7 @@ mod test { |
78 | ) |
79 | .await; |
80 | |
81 | - // Verify ATPS (success - no hash) |
82 | + dbg!("Verify ATPS (success - no hash)"); |
83 | #[cfg(feature = "rust-crypto")] |
84 | let pk_rsa = RsaKey::<Sha256>::from_pkcs1_pem(RSA_PRIVATE_KEY).unwrap(); |
85 | #[cfg(all(feature = "ring", not(feature = "rust-crypto")))] |