diff --git a/atst/utils/pdf_verification.py b/atst/utils/pdf_verification.py index a5b914c4..91f6b2d3 100644 --- a/atst/utils/pdf_verification.py +++ b/atst/utils/pdf_verification.py @@ -150,7 +150,6 @@ class PDFSignature: if attrs is not None and not isinstance(attrs, core.Void): signed_data = attrs.dump() - print(signed_data) signed_data = b"\x31" + signed_data[1:] else: signed_data = self.binary_data diff --git a/tests/utils/test_pdf_verification.py b/tests/utils/test_pdf_verification.py index e1f6dcd2..a4997d46 100644 --- a/tests/utils/test_pdf_verification.py +++ b/tests/utils/test_pdf_verification.py @@ -90,28 +90,6 @@ def test_signed_pdf_thats_been_modified(crl_check): } -def test_signed_pdf_not_on_chain(crl_check): - signed_pdf_not_on_chain = open("tests/fixtures/signed-pdf-not-dod.pdf", "rb").read() - result = pdf_signature_validations(pdf=signed_pdf_not_on_chain, crl_check=crl_check) - - assert result == { - "result": "FAILURE", - "signature_count": 1, - "signatures": [ - { - "cert_common_name": "John B Harris", - "hashed_binary_data": "3f0047e6cb5b9bb089254b20d174445c3ba4f513", - "hashing_algorithm": "sha1", - "is_valid": False, - "is_valid_cert": False, - "is_valid_hash": True, - "is_valid_signature": True, - "signers_serial": 514, - } - ], - } - - @pytest.mark.skip(reason="Need fixture file") def test_signed_pdf_dod_revoked(crl_check): signed_pdf_dod_revoked = open( @@ -160,8 +138,3 @@ def test_signed_dod_pdf_signer_cert_expired(crl_check): } ], } - - -@pytest.mark.skip(reason="TODO") -def test_crl_check_unavailable(): - pass