key_parameters = {} elif key_type == 'pgp': key_parameters = {'name_real' : 'Alf', 'name_email' : '*****@*****.**', 'key_type' : 'RSA', 'key_length' : 1024, 'key_usage' : 'cert', 'subkey_type' : 'RSA', 'subkey_length' : 1024, 'subkey_usage' : 'encrypt,sign,auth'} elif key_type == 'squeak': key_parameters = {'bits' : 4096} Alf = tp.User('Alf', key=ut.createPrivateKey(key_type, key_parameters), revoke_date=None, default_mail_access='allow', when_mail_exhausted='block', quota_size=100*1024*1024, mail_quota_size=10*1024*1024, max_message_size=None, user_class=None, auth_token=None) resp = Alf.create(client) assert(resp['status'] == 'ok') if test_params.node_debug_enabled == True: print (client.send_debug({'action' : 'database'})) client.assert_integrity(True)
elif key_type == 'pgp': key_parameters = {'name_real' : 'Alf', 'name_email' : '*****@*****.**', 'key_type' : 'RSA', 'key_length' : 1024, 'key_usage' : 'cert', 'subkey_type' : 'RSA', 'subkey_length' : 1024, 'subkey_usage' : 'encrypt,sign,auth'} elif key_type == 'squeak': key_parameters = {'bits' : 4096} Alf = tp.User( user_id='Alf', key=ut.createPrivateKey(key_type, key_parameters), revoke_date=None, #default_mail_access='allow', default_mail_access='proof_of_work/' + alf_proof_of_work_args, when_mail_exhausted='block', quota_size=user_quota, mail_quota_size=mail_quota, max_message_size=None, user_class=None, auth_token=None) if key_type == 'dummy': read_key_parameters = {} post_key_parameters = {} delete_key_parameters = {}