ebd8734ad7
* The entirety of the Python 3 port of PyME up to commit 2145348ec54c6027f2ea20f695de0277e2871405 * The old commit log has been saved as lang/py3-pyme/docs/old-commits.log * Can be viewed as a normal (separate) git repository at https://github.com/adversary-org/pyme3 * Utilising the submodule feature of git was deliberately skipped on humanitarian grounds (in order to prevent pain and suffering on the part of anyone having to manage this repository).
79 lines
2.4 KiB
Python
Executable File
79 lines
2.4 KiB
Python
Executable File
#!/usr/bin/env python3
|
|
# $Id$
|
|
# Copyright (C) 2004,2008 Igor Belyi <belyi@users.sourceforge.net>
|
|
#
|
|
# This program is free software; you can redistribute it and/or modify
|
|
# it under the terms of the GNU General Public License as published by
|
|
# the Free Software Foundation; either version 2 of the License, or
|
|
# (at your option) any later version.
|
|
#
|
|
# This program is distributed in the hope that it will be useful,
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
# GNU General Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU General Public License
|
|
# along with this program; if not, write to the Free Software
|
|
# Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
|
|
|
|
# Sample of unattended signing/verifying of a message.
|
|
# It uses keys for joe@foo.bar generated by genkey.pl script
|
|
|
|
import sys
|
|
from pyme import core, callbacks
|
|
from pyme.constants.sig import mode
|
|
|
|
core.check_version(None)
|
|
|
|
plain = core.Data("Test message")
|
|
sig = core.Data()
|
|
c = core.Context()
|
|
user = "joe@foo.bar"
|
|
|
|
c.signers_clear()
|
|
# Add joe@foo.bar's keys in the list of signers
|
|
for sigkey in c.op_keylist_all(user, 1):
|
|
if sigkey.can_sign:
|
|
c.signers_add(sigkey)
|
|
if not c.signers_enum(0):
|
|
print("No secret %s's keys suitable for signing!" % user)
|
|
sys.exit(0)
|
|
|
|
# This is a map between signer e-mail and its password
|
|
passlist = {
|
|
"<joe@foo.bar>": "abcdabcdfs"
|
|
}
|
|
|
|
# callback will return password based on the e-mail listed in the hint.
|
|
c.set_passphrase_cb(lambda x,y,z: passlist[x[x.rindex("<"):]])
|
|
|
|
c.op_sign(plain, sig, mode.CLEAR)
|
|
|
|
# Print out the signature (don't forget to rewind since signing put sig at EOF)
|
|
sig.seek(0,0)
|
|
signedtext = sig.read()
|
|
print(signedtext)
|
|
|
|
# Create Data with signed text.
|
|
sig2 = core.Data(signedtext)
|
|
plain2 = core.Data()
|
|
|
|
# Verify.
|
|
c.op_verify(sig2, None, plain2)
|
|
result = c.op_verify_result()
|
|
|
|
# List results for all signatures. Status equal 0 means "Ok".
|
|
index = 0
|
|
for sign in result.signatures:
|
|
index += 1
|
|
print("signature", index, ":")
|
|
print(" summary: ", sign.summary)
|
|
print(" status: ", sign.status)
|
|
print(" timestamp: ", sign.timestamp)
|
|
print(" fingerprint:", sign.fpr)
|
|
print(" uid: ", c.get_key(sign.fpr, 0).uids[0].uid)
|
|
|
|
# Print "unsigned" text. Rewind since verify put plain2 at EOF.
|
|
plain2.seek(0,0)
|
|
print("\n", plain2.read())
|