self.assertIn('UserPolicy : False', out,
'The test cse should not have User policy enabled')
cse_ext = re.findall(r'^UniqueGUID\s+:\s+(.*)', out)
- self.assertEquals(len(cse_ext), 1,
- 'The test cse GUID was not found')
+ self.assertEqual(len(cse_ext), 1,
+ 'The test cse GUID was not found')
cse_ext = cse_ext[0]
self.assertTrue(check_guid(cse_ext),
'The test cse GUID was not formatted correctly')
out = self._get_password("virtualCryptSHA256;rounds=2561," +
"virtualCryptSHA512;rounds=5129",
True)
- self.assertEquals(sha256, _get_attribute(out, "virtualCryptSHA256"))
- self.assertEquals(sha512, _get_attribute(out, "virtualCryptSHA512"))
+ self.assertEqual(sha256, _get_attribute(out, "virtualCryptSHA256"))
+ self.assertEqual(sha512, _get_attribute(out, "virtualCryptSHA512"))
# The returned hashes should specify the correct number of rounds
self.assertTrue(sha256.startswith("{CRYPT}$5$rounds=2561"))
sha512 = _get_attribute(out, "virtualCryptSHA512")
out = self._get_password("virtualCryptSHA256,virtualCryptSHA512")
- self.assertEquals(sha256, _get_attribute(out, "virtualCryptSHA256"))
- self.assertEquals(sha512, _get_attribute(out, "virtualCryptSHA512"))
+ self.assertEqual(sha256, _get_attribute(out, "virtualCryptSHA256"))
+ self.assertEqual(sha512, _get_attribute(out, "virtualCryptSHA512"))
# gpg decryption not enabled.
# both virtual attributes specified, rounds specified
sha512 = _get_attribute(out, "virtualCryptSHA512")
out = self._get_password("virtualCryptSHA256,virtualCryptSHA512")
- self.assertEquals(sha256, _get_attribute(out, "virtualCryptSHA256"))
- self.assertEquals(sha512, _get_attribute(out, "virtualCryptSHA512"))
+ self.assertEqual(sha256, _get_attribute(out, "virtualCryptSHA256"))
+ self.assertEqual(sha512, _get_attribute(out, "virtualCryptSHA512"))
# gpg decryption not enabled.
# both virtual attributes specified, rounds specified
out = self._get_password("virtualCryptSHA256;rounds=2561," +
"virtualCryptSHA512;rounds=5129")
- self.assertEquals(sha256, _get_attribute(out, "virtualCryptSHA256"))
- self.assertEquals(sha512, _get_attribute(out, "virtualCryptSHA512"))
+ self.assertEqual(sha256, _get_attribute(out, "virtualCryptSHA256"))
+ self.assertEqual(sha512, _get_attribute(out, "virtualCryptSHA512"))
# Number of rounds should match that specified
self.assertTrue(sha256.startswith("{CRYPT}$5$rounds=2561"))
out = self._get_password("virtualCryptSHA256;rounds=4000," +
"virtualCryptSHA512;rounds=5000")
- self.assertEquals(sha256, _get_attribute(out, "virtualCryptSHA256"))
- self.assertEquals(sha512, _get_attribute(out, "virtualCryptSHA512"))
+ self.assertEqual(sha256, _get_attribute(out, "virtualCryptSHA256"))
+ self.assertEqual(sha512, _get_attribute(out, "virtualCryptSHA512"))
# As the number of rounds did not match, should have returned the
# first hash of the corresponding scheme
out = self._get_password("virtualCryptSHA256," +
"virtualCryptSHA512")
- self.assertEquals(sha256, _get_attribute(out, "virtualCryptSHA256"))
- self.assertEquals(sha512, _get_attribute(out, "virtualCryptSHA512"))
+ self.assertEqual(sha256, _get_attribute(out, "virtualCryptSHA256"))
+ self.assertEqual(sha512, _get_attribute(out, "virtualCryptSHA512"))