aboutsummaryrefslogtreecommitdiffstats
path: root/lang/python/docs/GPGMEpythonHOWTOen.org
diff options
context:
space:
mode:
authorBen McGinnes <[email protected]>2018-03-15 14:34:22 +0000
committerBen McGinnes <[email protected]>2018-03-15 14:34:22 +0000
commit94a95ac12364989db7f4be333107f3c023551857 (patch)
tree3fc5ef2bb3c947b11eab0beadb6e5c0373f8c519 /lang/python/docs/GPGMEpythonHOWTOen.org
parentdoc: python bindings howto (diff)
downloadgpgme-94a95ac12364989db7f4be333107f3c023551857.tar.gz
gpgme-94a95ac12364989db7f4be333107f3c023551857.zip
doc: python bindings howto
* Promoted final encryption example so that it will appear as heading 6.1.3 when exported to HTML or PDF.
Diffstat (limited to 'lang/python/docs/GPGMEpythonHOWTOen.org')
-rw-r--r--lang/python/docs/GPGMEpythonHOWTOen.org98
1 files changed, 49 insertions, 49 deletions
diff --git a/lang/python/docs/GPGMEpythonHOWTOen.org b/lang/python/docs/GPGMEpythonHOWTOen.org
index 71e738ac..30e10184 100644
--- a/lang/python/docs/GPGMEpythonHOWTOen.org
+++ b/lang/python/docs/GPGMEpythonHOWTOen.org
@@ -608,71 +608,71 @@
This will attempt to encrypt to all the keys searched for, then
remove invalid recipients if it fails and try again.
-**** Encrypting to one key using the second method
- :PROPERTIES:
- :CUSTOM_ID: howto-basic-encryption-monogamous
- :END:
+*** Encrypting to one key using the second method
+ :PROPERTIES:
+ :CUSTOM_ID: howto-basic-encryption-monogamous
+ :END:
- This example re-creates the first encryption example except it
- uses the same =encrypt= method used in the subsequent examples
- instead of the =op_encrypt= method. This means that, unlike the
- =op_encrypt= method, it /must/ use byte literal input data.
+ This example re-creates the first encryption example except it
+ uses the same =encrypt= method used in the subsequent examples
+ instead of the =op_encrypt= method. This means that, unlike the
+ =op_encrypt= method, it /must/ use byte literal input data.
- #+begin_src python
- import gpg
+ #+begin_src python
+ import gpg
- rkey = "0x12345678DEADBEEF"
- text = b"""Some text to test with.
+ rkey = "0x12345678DEADBEEF"
+ text = b"""Some text to test with.
- Since the text in this case must be bytes, it is most likely that
- the input form will be a separate file which is opened with "rb"
- as this is the simplest method of obtaining the correct data
- format.
- """
+ Since the text in this case must be bytes, it is most likely that
+ the input form will be a separate file which is opened with "rb"
+ as this is the simplest method of obtaining the correct data
+ format.
+ """
- c = gpg.Context(armor=True)
- rpattern = list(c.keylist(pattern=rkey, secret=False))
- logrus = []
+ c = gpg.Context(armor=True)
+ rpattern = list(c.keylist(pattern=rkey, secret=False))
+ logrus = []
- for i in range(len(rpattern)):
- if rpattern[i].can_encrypt == 1:
- logrus.append(rpattern[i])
+ for i in range(len(rpattern)):
+ if rpattern[i].can_encrypt == 1:
+ logrus.append(rpattern[i])
- cipher = c.encrypt(text, recipients=logrus, sign=False, always_trust=True)
+ cipher = c.encrypt(text, recipients=logrus, sign=False, always_trust=True)
- afile = open("secret_plans.txt.asc", "wb")
- afile.write(cipher[0])
- afile.close()
- #+end_src
+ afile = open("secret_plans.txt.asc", "wb")
+ afile.write(cipher[0])
+ afile.close()
+ #+end_src
- With one or two exceptions, this method will probably prove to be
- easier to implement than the first method and thus it is the
- recommended encryption method. Though it is even more likely to
- be used like this:
+ With one or two exceptions, this method will probably prove to be
+ easier to implement than the first method and thus it is the
+ recommended encryption method. Though it is even more likely to
+ be used like this:
- #+begin_src python
- import gpg
+ #+begin_src python
+ import gpg
- rkey = "0x12345678DEADBEEF"
+ rkey = "0x12345678DEADBEEF"
- afile = open("secret_plans.txt", "rb")
- text = afile.read()
- afile.close()
+ afile = open("secret_plans.txt", "rb")
+ text = afile.read()
+ afile.close()
- c = gpg.Context(armor=True)
- rpattern = list(c.keylist(pattern=rkey, secret=False))
- logrus = []
+ c = gpg.Context(armor=True)
+ rpattern = list(c.keylist(pattern=rkey, secret=False))
+ logrus = []
- for i in range(len(rpattern)):
- if rpattern[i].can_encrypt == 1:
- logrus.append(rpattern[i])
+ for i in range(len(rpattern)):
+ if rpattern[i].can_encrypt == 1:
+ logrus.append(rpattern[i])
- cipher = c.encrypt(text, recipients=logrus, sign=False, always_trust=True)
+ cipher = c.encrypt(text, recipients=logrus, sign=False, always_trust=True)
- afile = open("secret_plans.txt.asc", "wb")
- afile.write(cipher[0])
- afile.close()
- #+end_src
+ afile = open("secret_plans.txt.asc", "wb")
+ afile.write(cipher[0])
+ afile.close()
+ #+end_src
** Decryption