ebd8734ad7
* The entirety of the Python 3 port of PyME up to commit 2145348ec54c6027f2ea20f695de0277e2871405 * The old commit log has been saved as lang/py3-pyme/docs/old-commits.log * Can be viewed as a normal (separate) git repository at https://github.com/adversary-org/pyme3 * Utilising the submodule feature of git was deliberately skipped on humanitarian grounds (in order to prevent pain and suffering on the part of anyone having to manage this repository).
66 lines
2.0 KiB
Python
Executable File
66 lines
2.0 KiB
Python
Executable File
#!/usr/bin/env python3
|
|
# $Id$
|
|
# Copyright (C) 2008 Igor Belyi <belyi@users.sourceforge.net>
|
|
# Copyright (C) 2002 John Goerzen <jgoerzen@complete.org>
|
|
#
|
|
# This program is free software; you can redistribute it and/or modify
|
|
# it under the terms of the GNU General Public License as published by
|
|
# the Free Software Foundation; either version 2 of the License, or
|
|
# (at your option) any later version.
|
|
#
|
|
# This program is distributed in the hope that it will be useful,
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
# GNU General Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU General Public License
|
|
# along with this program; if not, write to the Free Software
|
|
# Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
|
|
|
|
"""
|
|
This program will try to encrypt a simple message to each key on your keyring.
|
|
If your keyring has any invalid keys on it, those keys will be removed
|
|
and it will re-try the encryption."""
|
|
|
|
from pyme import core
|
|
from pyme.core import Data, Context
|
|
from pyme.constants import validity
|
|
|
|
core.check_version(None)
|
|
|
|
plain = Data('This is my message.')
|
|
|
|
c = Context()
|
|
c.set_armor(1)
|
|
|
|
def sendto(keylist):
|
|
cipher = Data()
|
|
c.op_encrypt(keylist, 1, plain, cipher)
|
|
cipher.seek(0,0)
|
|
return cipher.read()
|
|
|
|
names = []
|
|
for key in c.op_keylist_all(None, 0):
|
|
print(" *** Found key for %s" % key.uids[0].uid)
|
|
valid = 0
|
|
for subkey in key.subkeys:
|
|
keyid = subkey.keyid
|
|
if keyid == None:
|
|
break
|
|
can_encrypt = subkey.can_encrypt
|
|
valid += can_encrypt
|
|
print(" Subkey %s: encryption %s" % \
|
|
(keyid, can_encrypt and "enabled" or "disabled"))
|
|
|
|
if valid:
|
|
names.append(key)
|
|
else:
|
|
print(" This key cannot be used for encryption; skipping.")
|
|
|
|
passno = 0
|
|
|
|
print("Encrypting to %d recipients" % len(names))
|
|
print(sendto(names))
|
|
|
|
|