|  | @@ -29,20 +29,21 @@ class test_SecureSerializer(SecurityCase):
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  |      def test_deserialize(self):
 | 
	
		
			
				|  |  |          s = self._get_s(KEY1, CERT1, [CERT1])
 | 
	
		
			
				|  |  | -        self.assertRaises(SecurityError, s.deserialize, 'bad data')
 | 
	
		
			
				|  |  | +        with self.assertRaises(SecurityError):
 | 
	
		
			
				|  |  | +            s.deserialize('bad data')
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  |      def test_unmatched_key_cert(self):
 | 
	
		
			
				|  |  |          s = self._get_s(KEY1, CERT2, [CERT1, CERT2])
 | 
	
		
			
				|  |  | -        self.assertRaises(SecurityError,
 | 
	
		
			
				|  |  | -                          s.deserialize, s.serialize('foo'))
 | 
	
		
			
				|  |  | +        with self.assertRaises(SecurityError):
 | 
	
		
			
				|  |  | +            s.deserialize(s.serialize('foo'))
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  |      def test_unknown_source(self):
 | 
	
		
			
				|  |  |          s1 = self._get_s(KEY1, CERT1, [CERT2])
 | 
	
		
			
				|  |  |          s2 = self._get_s(KEY1, CERT1, [])
 | 
	
		
			
				|  |  | -        self.assertRaises(SecurityError,
 | 
	
		
			
				|  |  | -                          s1.deserialize, s1.serialize('foo'))
 | 
	
		
			
				|  |  | -        self.assertRaises(SecurityError,
 | 
	
		
			
				|  |  | -                          s2.deserialize, s2.serialize('foo'))
 | 
	
		
			
				|  |  | +        with self.assertRaises(SecurityError):
 | 
	
		
			
				|  |  | +            s1.deserialize(s1.serialize('foo'))
 | 
	
		
			
				|  |  | +        with self.assertRaises(SecurityError):
 | 
	
		
			
				|  |  | +            s2.deserialize(s2.serialize('foo'))
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  |      def test_self_send(self):
 | 
	
		
			
				|  |  |          s1 = self._get_s(KEY1, CERT1, [CERT1])
 |