D7net Mini Sh3LL v1
Current File : //lib/sudo/../openssh/../python3/dist-packages/pymacaroons/verifier.py |
import binascii
try:
# py2.7.7+ and py3.3+ have native comparison support
from hmac import compare_digest as constant_time_compare
except ImportError:
from pymacaroons.utils import equals as constant_time_compare
from pymacaroons.binders import HashSignaturesBinder
from pymacaroons.exceptions import MacaroonInvalidSignatureException
from pymacaroons.caveat_delegates import (
FirstPartyCaveatVerifierDelegate,
ThirdPartyCaveatVerifierDelegate,
)
from pymacaroons.utils import (
convert_to_bytes,
convert_to_string,
generate_derived_key,
hmac_digest
)
class Verifier(object):
def __init__(self):
self.predicates = []
self.callbacks = [self.verify_exact]
self.calculated_signature = None
self.first_party_caveat_verifier_delegate = (
FirstPartyCaveatVerifierDelegate()
)
self.third_party_caveat_verifier_delegate = (
ThirdPartyCaveatVerifierDelegate()
)
def satisfy_exact(self, predicate):
if predicate is None:
raise TypeError('Predicate cannot be none.')
self.predicates.append(convert_to_string(predicate))
def satisfy_general(self, func):
if not hasattr(func, '__call__'):
raise TypeError('General caveat verifiers must be callable.')
self.callbacks.append(func)
def verify_exact(self, predicate):
return predicate in self.predicates
def verify(self, macaroon, key, discharge_macaroons=None):
key = generate_derived_key(convert_to_bytes(key))
return self.verify_discharge(
macaroon,
macaroon,
key,
discharge_macaroons
)
def verify_discharge(self, root, discharge, key, discharge_macaroons=None):
calculated_signature = hmac_digest(
key, discharge.identifier_bytes
)
calculated_signature = self._verify_caveats(
root, discharge, discharge_macaroons, calculated_signature
)
if root != discharge:
calculated_signature = binascii.unhexlify(
HashSignaturesBinder(root).bind_signature(
binascii.hexlify(calculated_signature)
)
)
if not self._signatures_match(
discharge.signature_bytes,
binascii.hexlify(calculated_signature)):
raise MacaroonInvalidSignatureException('Signatures do not match')
return True
def _verify_caveats(self, root, macaroon, discharge_macaroons, signature):
for caveat in macaroon.caveats:
if self._caveat_met(root,
caveat,
macaroon,
discharge_macaroons,
signature):
signature = self._update_signature(caveat, signature)
return signature
def _caveat_met(self, root, caveat, macaroon,
discharge_macaroons, signature):
if caveat.first_party():
return (
self
.first_party_caveat_verifier_delegate
.verify_first_party_caveat(self, caveat, signature)
)
else:
return (
self
.third_party_caveat_verifier_delegate
.verify_third_party_caveat(
self, caveat, root, macaroon,
discharge_macaroons, signature,
)
)
def _update_signature(self, caveat, signature):
if caveat.first_party():
return (
self
.first_party_caveat_verifier_delegate
.update_signature(signature, caveat)
)
else:
return (
self
.third_party_caveat_verifier_delegate
.update_signature(signature, caveat)
)
def _signatures_match(self, macaroon_signature, computed_signature):
return constant_time_compare(
convert_to_bytes(macaroon_signature),
convert_to_bytes(computed_signature)
)
AnonSec - 2021 | Recode By D7net