diff options
| author | Justus Winter <[email protected]> | 2016-05-10 11:19:26 +0000 | 
|---|---|---|
| committer | Justus Winter <[email protected]> | 2016-05-10 11:19:26 +0000 | 
| commit | f4ba16b31ea282d0787a40be3f37b951584143a1 (patch) | |
| tree | ebb1ed1945dee5fc0e8e21ca62420a51924bbbad /lang/python/examples/signverify.py | |
| parent | Merge branch 'master' into justus/pyme3 (diff) | |
| download | gpgme-f4ba16b31ea282d0787a40be3f37b951584143a1.tar.gz gpgme-f4ba16b31ea282d0787a40be3f37b951584143a1.zip | |
python: Rename bindings.
--
Signed-off-by: Justus Winter <[email protected]>
Diffstat (limited to 'lang/python/examples/signverify.py')
| -rwxr-xr-x | lang/python/examples/signverify.py | 78 | 
1 files changed, 78 insertions, 0 deletions
| diff --git a/lang/python/examples/signverify.py b/lang/python/examples/signverify.py new file mode 100755 index 00000000..f8804ca9 --- /dev/null +++ b/lang/python/examples/signverify.py @@ -0,0 +1,78 @@ +#!/usr/bin/env python3 +# $Id$ +# Copyright (C) 2004,2008 Igor Belyi <[email protected]> +# +#    This program is free software; you can redistribute it and/or modify +#    it under the terms of the GNU General Public License as published by +#    the Free Software Foundation; either version 2 of the License, or +#    (at your option) any later version. +# +#    This program is distributed in the hope that it will be useful, +#    but WITHOUT ANY WARRANTY; without even the implied warranty of +#    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the +#    GNU General Public License for more details. +# +#    You should have received a copy of the GNU General Public License +#    along with this program; if not, write to the Free Software +#    Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA  02111-1307  USA + +# Sample of unattended signing/verifying of a message. +# It uses keys for [email protected] generated by genkey.pl script + +import sys +from pyme import core, callbacks +from pyme.constants.sig import mode + +core.check_version(None) + +plain = core.Data(b"Test message") +sig = core.Data() +c = core.Context() +user = b"[email protected]" + +c.signers_clear() +# Add [email protected]'s keys in the list of signers +for sigkey in c.op_keylist_all(user, 1): +    if sigkey.can_sign: +        c.signers_add(sigkey) +if not c.signers_enum(0): +    print("No secret %s's keys suitable for signing!" % user) +    sys.exit(0) + +# This is a map between signer e-mail and its password +passlist = { +    b"<[email protected]>": b"Crypt0R0cks" +    } +     +# callback will return password based on the e-mail listed in the hint. +c.set_passphrase_cb(lambda x,y,z: passlist[x[x.rindex("<"):]]) + +c.op_sign(plain, sig, mode.CLEAR) + +# Print out the signature (don't forget to rewind since signing put sig at EOF) +sig.seek(0,0) +signedtext = sig.read() +print(signedtext) + +# Create Data with signed text. +sig2 = core.Data(signedtext) +plain2 = core.Data() + +# Verify. +c.op_verify(sig2, None, plain2) +result = c.op_verify_result() + +# List results for all signatures. Status equal 0 means "Ok". +index = 0 +for sign in result.signatures: +    index += 1 +    print("signature", index, ":") +    print("  summary:    ", sign.summary) +    print("  status:     ", sign.status) +    print("  timestamp:  ", sign.timestamp) +    print("  fingerprint:", sign.fpr) +    print("  uid:        ", c.get_key(sign.fpr, 0).uids[0].uid) + +# Print "unsigned" text. Rewind since verify put plain2 at EOF. +plain2.seek(0,0) +print("\n", plain2.read()) | 
