4.7. Crypto¶
- alot.crypto.RFC3156_micalg_from_algo(hash_algo)¶
Converts a GPGME hash algorithm name to one conforming to RFC3156.
GPGME returns hash algorithm names such as “SHA256”, but RFC3156 says that programs need to use names such as “pgp-sha256” instead.
- alot.crypto.bad_signatures_to_str(error)¶
Convert a bad signature exception to a text message. This is a workaround for gpg not handling non-ascii data correctly.
- Parameters:
error (BadSignatures) – BadSignatures exception
- alot.crypto.check_uid_validity(key, email)¶
Check that a the email belongs to the given key. Also check the trust level of this connection. Only if the trust level is high enough (>=4) the email is assumed to belong to the key.
- alot.crypto.decrypt_verify(encrypted, session_keys=None)¶
Decrypts the given ciphertext string and returns both the signatures (if any) and the plaintext.
- alot.crypto.detached_signature_for(plaintext_str, keys)¶
Signs the given plaintext string and returns the detached signature.
A detached signature in GPG speak is a separate blob of data containing a signature for the specified plaintext.
- alot.crypto.encrypt(plaintext_str, keys)¶
Encrypt data and return the encrypted form.
- alot.crypto.get_key(keyid, validate=False, encrypt=False, sign=False, signed_only=False)¶
Gets a key from the keyring by filtering for the specified keyid, but only if the given keyid is specific enough (if it matches multiple keys, an exception will be thrown).
If validate is True also make sure that returned key is not invalid, revoked or expired. In addition if encrypt or sign is True also validate that key is valid for that action. For example only keys with private key can sign. If signed_only is True make sure that the user id can be trusted to belong to the key (is signed). This last check will only work if the keyid is part of the user id associated with the key, not if it is part of the key fingerprint.
- Parameters:
keyid (str) – filter term for the keyring (usually a key ID)
validate (bool) – validate that returned keyid is valid
encrypt (bool) – when validating confirm that returned key can encrypt
sign (bool) – when validating confirm that returned key can sign
signed_only (bool) – only return keys whose uid is signed (trusted to belong to the key)
- Returns:
A gpg key matching the given parameters
- Return type:
gpg.gpgme._gpgme_key
- Raises:
GPGProblem – if the keyid is ambiguous
GPGProblem – if there is no key that matches the parameters
GPGProblem – if a key is found, but signed_only is true and the key is unused
- alot.crypto.list_keys(hint=None, private=False)¶
Returns a generator of all keys containing the fingerprint, or all keys if hint is None.
The generator may raise exceptions of :class:gpg.errors.GPGMEError, and it is the caller’s responsibility to handle them.
- alot.crypto.validate_key(key, sign=False, encrypt=False)¶
Assert that a key is valide and optionally that it can be used for signing or encrypting. Raise GPGProblem otherwise.
- Parameters:
- Raises:
GPGProblem – If the key is revoked, expired, or invalid
GPGProblem – If encrypt is true and the key cannot be used to encrypt
GPGProblem – If sign is true and th key cannot be used to encrypt
- alot.crypto.verify_detached(message, signature)¶
Verifies whether the message is authentic by checking the signature.