diff options
Diffstat (limited to 'lang/python/tests/t-encrypt-sym.py')
| -rwxr-xr-x | lang/python/tests/t-encrypt-sym.py | 63 | 
1 files changed, 63 insertions, 0 deletions
| diff --git a/lang/python/tests/t-encrypt-sym.py b/lang/python/tests/t-encrypt-sym.py new file mode 100755 index 00000000..0b24fd52 --- /dev/null +++ b/lang/python/tests/t-encrypt-sym.py @@ -0,0 +1,63 @@ +#!/usr/bin/env python3 + +# Copyright (C) 2016 g10 Code GmbH +# +# This file is part of GPGME. +# +# GPGME is free software; you can redistribute it and/or modify it +# under the terms of the GNU General Public License as published by +# the Free Software Foundation; either version 2 of the License, or +# (at your option) any later version. +# +# GPGME is distributed in the hope that it will be useful, but WITHOUT +# ANY WARRANTY; without even the implied warranty of MERCHANTABILITY +# or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU Lesser General +# Public License for more details. +# +# You should have received a copy of the GNU Lesser General Public +# License along with this program; if not, see <http://www.gnu.org/licenses/>. + +import os +from pyme import core, constants +import support + +support.init_gpgme(constants.PROTOCOL_OpenPGP) + +for passphrase in ("abc", b"abc"): +    c = core.Context() +    c.set_armor(True) +    c.set_pinentry_mode(constants.PINENTRY_MODE_LOOPBACK) + +    source = core.Data("Hallo Leute\n") +    cipher = core.Data() + +    passphrase_cb_called = 0 +    def passphrase_cb(hint, desc, prev_bad, hook=None): +        global passphrase_cb_called +        passphrase_cb_called += 1 +        return passphrase + +    c.set_passphrase_cb(passphrase_cb, None) + +    c.op_encrypt([], 0, source, cipher) +    assert passphrase_cb_called == 1, \ +        "Callback called {} times".format(passphrase_cb_called) +    support.print_data(cipher) + +    c = core.Context() +    c.set_armor(True) +    c.set_pinentry_mode(constants.PINENTRY_MODE_LOOPBACK) +    c.set_passphrase_cb(passphrase_cb, None) +    plain = core.Data() +    cipher.seek(0, os.SEEK_SET) + +    c.op_decrypt(cipher, plain) +    # Seems like the passphrase is cached. +    #assert passphrase_cb_called == 2, \ +    #    "Callback called {} times".format(passphrase_cb_called) +    support.print_data(plain) + +    plain.seek(0, os.SEEK_SET) +    plaintext = plain.read() +    assert plaintext == b"Hallo Leute\n", \ +        "Wrong plaintext {!r}".format(plaintext) | 
