7d0a979c07
* lang/python/tests/t-decrypt-verify.py: Comment recent changes.
--
Fixes-commit: bd2d282e57
GnuPG-bug-id: 4276
90 lines
3.3 KiB
Python
Executable File
90 lines
3.3 KiB
Python
Executable File
#!/usr/bin/env python
|
|
|
|
# Copyright (C) 2016 g10 Code GmbH
|
|
#
|
|
# This file is part of GPGME.
|
|
#
|
|
# GPGME is free software; you can redistribute it and/or modify it
|
|
# under the terms of the GNU General Public License as published by
|
|
# the Free Software Foundation; either version 2 of the License, or
|
|
# (at your option) any later version.
|
|
#
|
|
# GPGME is distributed in the hope that it will be useful, but WITHOUT
|
|
# ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
|
|
# or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General
|
|
# Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU Lesser General Public
|
|
# License along with this program; if not, see <https://www.gnu.org/licenses/>.
|
|
|
|
from __future__ import absolute_import, print_function, unicode_literals
|
|
|
|
import gpg
|
|
import support
|
|
|
|
del absolute_import, print_function, unicode_literals
|
|
|
|
|
|
def check_verify_result(result, summary, fpr, status):
|
|
assert len(result.signatures) == 1, "Unexpected number of signatures"
|
|
sig = result.signatures[0]
|
|
assert sig.summary == summary, "Unexpected signature summary"
|
|
assert sig.fpr == fpr
|
|
assert gpg.errors.GPGMEError(sig.status).getcode() == status
|
|
assert len(sig.notations) == 0
|
|
assert not sig.wrong_key_usage
|
|
assert sig.validity == gpg.constants.validity.FULL
|
|
assert gpg.errors.GPGMEError(
|
|
sig.validity_reason).getcode() == gpg.errors.NO_ERROR
|
|
|
|
|
|
c = gpg.Context()
|
|
|
|
source = gpg.Data(file=support.make_filename("cipher-2.asc"))
|
|
sink = gpg.Data()
|
|
|
|
c.op_decrypt_verify(source, sink)
|
|
result = c.op_decrypt_result()
|
|
assert not result.unsupported_algorithm, \
|
|
"Unsupported algorithm: {}".format(result.unsupported_algorithm)
|
|
|
|
support.print_data(sink)
|
|
|
|
verify_result = c.op_verify_result()
|
|
check_verify_result(
|
|
verify_result, gpg.constants.sigsum.VALID | gpg.constants.sigsum.GREEN,
|
|
"A0FF4590BB6122EDEF6E3C542D727CC768697734", gpg.errors.NO_ERROR)
|
|
|
|
# Idiomatic interface.
|
|
with gpg.Context() as c:
|
|
alpha = c.get_key("A0FF4590BB6122EDEF6E3C542D727CC768697734", False)
|
|
bob = c.get_key("D695676BDCEDCC2CDD6152BCFE180B1DA9E3B0B2", False)
|
|
plaintext, _, verify_result = \
|
|
c.decrypt(open(support.make_filename("cipher-2.asc")), verify=[alpha])
|
|
assert plaintext.find(b'Wenn Sie dies lesen k') >= 0, \
|
|
'Plaintext not found'
|
|
check_verify_result(
|
|
verify_result, gpg.constants.sigsum.VALID | gpg.constants.sigsum.GREEN,
|
|
"A0FF4590BB6122EDEF6E3C542D727CC768697734", gpg.errors.NO_ERROR)
|
|
|
|
try:
|
|
c.decrypt(
|
|
open(support.make_filename("cipher-2.asc")), verify=[alpha, bob])
|
|
except Exception as e:
|
|
assert len(e.missing) == 1
|
|
assert e.missing[0] == bob
|
|
else:
|
|
assert False, "Expected an error, got none"
|
|
|
|
# plaintext, _, verify_result = c.decrypt(open(support.make_filename("cipher-no-sig.asc")))
|
|
# assert len(plaintext) > 0
|
|
# assert len(verify_result.signatures) == 0
|
|
# assert plaintext.find(b'Viscosity Dispersal Thimble Saturday Flaxseed Deflected') >= 0, \
|
|
# 'unsigned Plaintext was not found'
|
|
#
|
|
# plaintext, _, verify_result = c.decrypt(open(support.make_filename("cipher-3.asc")))
|
|
# assert len(plaintext) > 0
|
|
# assert len(verify_result.signatures) == 1
|
|
# assert plaintext.find(b'Reenact Studied Thermos Bonehead Unclasp Opposing') >= 0, \
|
|
# 'second Plaintext not found'
|