example email
* changed joe@foo.bar to joe@example.org as it is only a matter of time before ICANN actually creates bar as a gTLD, if they haven't already.
This commit is contained in:
parent
4fc1239815
commit
8345bf6f43
@ -17,7 +17,7 @@
|
||||
# Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
|
||||
|
||||
# Sample of key deletion
|
||||
# It deletes keys for joe@foo.bar generated by genkey.pl script
|
||||
# It deletes keys for joe@example.org generated by genkey.pl script
|
||||
|
||||
from pyme import core
|
||||
|
||||
@ -29,6 +29,6 @@ core.check_version(None)
|
||||
|
||||
c = core.Context()
|
||||
# 0 in keylist means to list not only public but secret keys as well.
|
||||
for thekey in [x for x in c.op_keylist_all("joe@foo.bar", 0)]:
|
||||
for thekey in [x for x in c.op_keylist_all("joe@example.org", 0)]:
|
||||
# 1 in delete means to delete not only public but secret keys as well.
|
||||
c.op_delete(thekey, 1)
|
||||
|
@ -17,7 +17,7 @@
|
||||
# Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
|
||||
|
||||
# Sample of export and import of keys
|
||||
# It uses keys for joe@foo.bar generated by genkey.pl script
|
||||
# It uses keys for joe@example.org generated by genkey.pl script
|
||||
|
||||
import sys
|
||||
from pyme import core
|
||||
@ -27,7 +27,7 @@ core.check_version(None)
|
||||
expkey = core.Data()
|
||||
c = core.Context()
|
||||
c.set_armor(1)
|
||||
user = "joe@foo.bar"
|
||||
user = "joe@example.org"
|
||||
|
||||
print(" - Export %s's public keys - " % user)
|
||||
c.op_export(user, 0, expkey)
|
||||
|
@ -35,7 +35,7 @@ Subkey-Type: RSA
|
||||
Subkey-Length: 2048
|
||||
Name-Real: Joe Tester
|
||||
Name-Comment: with stupid passphrase
|
||||
Name-Email: joe@foo.bar
|
||||
Name-Email: joe@example.org
|
||||
Passphrase: abcdabcdfs
|
||||
Expire-Date: 2020-12-31
|
||||
</GnupgKeyParms>
|
||||
|
@ -17,7 +17,7 @@
|
||||
# Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
|
||||
|
||||
# Sample of unattended signing/verifying of a message.
|
||||
# It uses keys for joe@foo.bar generated by genkey.pl script
|
||||
# It uses keys for joe@example.org generated by genkey.pl script
|
||||
|
||||
import sys
|
||||
from pyme import core, callbacks
|
||||
@ -28,10 +28,10 @@ core.check_version(None)
|
||||
plain = core.Data("Test message")
|
||||
sig = core.Data()
|
||||
c = core.Context()
|
||||
user = "joe@foo.bar"
|
||||
user = "joe@example.org"
|
||||
|
||||
c.signers_clear()
|
||||
# Add joe@foo.bar's keys in the list of signers
|
||||
# Add joe@example.org's keys in the list of signers
|
||||
for sigkey in c.op_keylist_all(user, 1):
|
||||
if sigkey.can_sign:
|
||||
c.signers_add(sigkey)
|
||||
@ -41,7 +41,7 @@ if not c.signers_enum(0):
|
||||
|
||||
# This is a map between signer e-mail and its password
|
||||
passlist = {
|
||||
"<joe@foo.bar>": "abcdabcdfs"
|
||||
"<joe@example.org>": "abcdabcdfs"
|
||||
}
|
||||
|
||||
# callback will return password based on the e-mail listed in the hint.
|
||||
|
Loading…
Reference in New Issue
Block a user