Linux server.nvwebsoft.co.in 3.10.0-1160.114.2.el7.x86_64 #1 SMP Wed Mar 20 15:54:52 UTC 2024 x86_64
Apache
: 162.240.12.249 | : 3.148.115.187
202 Domain
8.1.31
nbspublicschool
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
share /
doc /
pygpgme-0.3 /
tests /
[ HOME SHELL ]
Name
Size
Permission
Action
keys
[ DIR ]
drwxr-xr-x
__init__.py
1.85
KB
-rw-r--r--
test_context.py
5.28
KB
-rw-r--r--
test_delete.py
2.27
KB
-rw-r--r--
test_editkey.py
3.31
KB
-rw-r--r--
test_encrypt_decrypt.py
8.33
KB
-rw-r--r--
test_export.py
2.02
KB
-rw-r--r--
test_genkey.py
3.76
KB
-rw-r--r--
test_import.py
7.52
KB
-rw-r--r--
test_keylist.py
2.76
KB
-rw-r--r--
test_keys.py
12.08
KB
-rw-r--r--
test_passphrase.py
2.95
KB
-rw-r--r--
test_progress.py
1.94
KB
-rw-r--r--
test_sign_verify.py
12.97
KB
-rw-r--r--
util.py
1.69
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : test_editkey.py
# pygpgme - a Python wrapper for the gpgme library # Copyright (C) 2006 James Henstridge # # This library is free software; you can redistribute it and/or # modify it under the terms of the GNU Lesser General Public # License as published by the Free Software Foundation; either # version 2.1 of the License, or (at your option) any later version. # # This library is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU # Lesser General Public License for more details. # # You should have received a copy of the GNU Lesser General Public # License along with this library; if not, write to the Free Software # Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA import unittest import os try: from io import BytesIO except ImportError: from StringIO import StringIO as BytesIO import gpgme import gpgme.editutil from tests.util import GpgHomeTestCase class EditKeyTestCase(GpgHomeTestCase): import_keys = ['key1.pub', 'key1.sec', 'key2.pub', 'signonly.pub', 'signonly.sec'] def edit_quit_cb(self, status, args, fd): if status in [gpgme.STATUS_EOF, gpgme.STATUS_GOT_IT]: return self.status = status self.args = args os.write(fd, b'quit\n') def test_edit_quit(self): ctx = gpgme.Context() key = ctx.get_key('E79A842DA34A1CA383F64A1546BB55F0885C65A4') output = BytesIO() self.status = None self.args = None ctx.edit(key, self.edit_quit_cb, output) self.assertEqual(self.status, gpgme.STATUS_GET_LINE) self.assertEqual(self.args, 'keyedit.prompt') def test_edit_ownertrust(self): ctx = gpgme.Context() key = ctx.get_key('93C2240D6B8AA10AB28F701D2CF46B7FC97E6B0F') self.assertEqual(key.owner_trust, gpgme.VALIDITY_UNKNOWN) # try setting each validity: for trust in [gpgme.VALIDITY_NEVER, gpgme.VALIDITY_MARGINAL, gpgme.VALIDITY_FULL, gpgme.VALIDITY_ULTIMATE]: gpgme.editutil.edit_trust(ctx, key, trust) key = ctx.get_key('93C2240D6B8AA10AB28F701D2CF46B7FC97E6B0F') self.assertEqual(key.owner_trust, trust) def test_edit_sign(self): ctx = gpgme.Context() # we set the keylist mode so we can see signatures ctx.keylist_mode = gpgme.KEYLIST_MODE_SIGS ctx.signers = [ctx.get_key('15E7CE9BF1771A4ABC550B31F540A569CB935A42')] key = ctx.get_key('E79A842DA34A1CA383F64A1546BB55F0885C65A4') # check that there are no signatures from 0xCB935A42 for uid in key.uids: sigs = [sig for sig in uid.signatures if sig.keyid == 'F540A569CB935A42'] self.assertEqual(len(sigs), 0) gpgme.editutil.edit_sign(ctx, key, check=0) key = ctx.get_key('E79A842DA34A1CA383F64A1546BB55F0885C65A4') # check that there is a signature from 0xCB935A42 on each UID for uid in key.uids: sigs = [sig for sig in uid.signatures if sig.keyid == 'F540A569CB935A42'] self.assertEqual(len(sigs), 1) def test_suite(): loader = unittest.TestLoader() return loader.loadTestsFromName(__name__)
Close