summaryrefslogtreecommitdiff
path: root/lang/python/tests/t-decrypt-verify.py
blob: 300fc713d7c899eff2a3ced1f86ed687b6eb8f2f (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
#!/usr/bin/env python

# Copyright (C) 2016 g10 Code GmbH
#
# This file is part of GPGME.
#
# GPGME is free software; you can redistribute it and/or modify it
# under the terms of the GNU General Public License as published by
# the Free Software Foundation; either version 2 of the License, or
# (at your option) any later version.
#
# GPGME is distributed in the hope that it will be useful, but WITHOUT
# ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
# or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU Lesser General
# Public License for more details.
#
# You should have received a copy of the GNU Lesser General Public
# License along with this program; if not, see <https://www.gnu.org/licenses/>.

from __future__ import absolute_import, print_function, unicode_literals

import gpg
import support

del absolute_import, print_function, unicode_literals


def check_verify_result(result, summary, fpr, status):
    assert len(result.signatures) == 1, "Unexpected number of signatures"
    sig = result.signatures[0]
    assert sig.summary == summary, "Unexpected signature summary"
    assert sig.fpr == fpr
    assert gpg.errors.GPGMEError(sig.status).getcode() == status
    assert len(sig.notations) == 0
    assert not sig.wrong_key_usage
    assert sig.validity == gpg.constants.validity.FULL
    assert gpg.errors.GPGMEError(
        sig.validity_reason).getcode() == gpg.errors.NO_ERROR


c = gpg.Context()

source = gpg.Data(file=support.make_filename("cipher-2.asc"))
sink = gpg.Data()

c.op_decrypt_verify(source, sink)
result = c.op_decrypt_result()
assert not result.unsupported_algorithm, \
    "Unsupported algorithm: {}".format(result.unsupported_algorithm)

support.print_data(sink)

verify_result = c.op_verify_result()
check_verify_result(
    verify_result, gpg.constants.sigsum.VALID | gpg.constants.sigsum.GREEN,
    "A0FF4590BB6122EDEF6E3C542D727CC768697734", gpg.errors.NO_ERROR)

# Idiomatic interface.
with gpg.Context() as c:
    alpha = c.get_key("A0FF4590BB6122EDEF6E3C542D727CC768697734", False)
    bob = c.get_key("D695676BDCEDCC2CDD6152BCFE180B1DA9E3B0B2", False)
    plaintext, _, verify_result = \
        c.decrypt(open(support.make_filename("cipher-2.asc")), verify=[alpha])
    assert plaintext.find(b'Wenn Sie dies lesen k') >= 0, \
        'Plaintext not found'
    check_verify_result(
        verify_result, gpg.constants.sigsum.VALID | gpg.constants.sigsum.GREEN,
        "A0FF4590BB6122EDEF6E3C542D727CC768697734", gpg.errors.NO_ERROR)

    try:
        c.decrypt(
            open(support.make_filename("cipher-2.asc")), verify=[alpha, bob])
    except Exception as e:
        assert len(e.missing) == 1
        assert e.missing[0] == bob
    else:
        assert False, "Expected an error, got none"

    plaintext, _, verify_result = c.decrypt(open(support.make_filename("cipher-no-sig.asc")))
    assert len(plaintext) > 0
    assert len(verify_result.signatures) == 0
    assert plaintext.find(b'Viscosity Dispersal Thimble Saturday Flaxseed Deflected') >= 0, \
        'unsigned Plaintext was not found'

    plaintext, _, verify_result = c.decrypt(open(support.make_filename("cipher-3.asc")))
    assert len(plaintext) > 0
    assert len(verify_result.signatures) == 1
    assert plaintext.find(b'Reenact Studied Thermos Bonehead Unclasp Opposing') >= 0, \
        'second Plaintext not found'