mirror of
https://github.com/apache/impala.git
synced 2025-12-25 02:03:09 -05:00
IMPALA-9719: Upgrade sasl-0.1.1 -> 0.2.1
Needed for python 3 compatibility. Note that we had to amend the make_shell_tarball.sh to account for the fact that execfile has been removed from python 3. Tested by running gerrit-verify-dryrun, and also confirmed I can connect to a kerberized host. $ <path_to>/impala-shell-4.0.0-SNAPSHOT/impala-shell -k --ssl -i host.redacted.com Starting Impala Shell with Kerberos authentication using Python 2.7.12 Using service name 'impala' SSL is enabled. Impala server certificates will NOT be verified (set --ca_cert to change) No handlers could be found for logger "thrift.transport.sslcompat" Opened TCP connection to host.redacted.com:21000 Connected to host.redacted.com:21000 Server version: impalad version 3.4.0-SNAPSHOT RELEASE (build d17bc21...) *********************************************************************************** Welcome to the Impala shell. (Impala Shell v4.0.0-SNAPSHOT (7af6a8d) built on Tue May 5 10:39:12 PDT 2020) To see more tips, run the TIP command. *********************************************************************************** [host.redacted.com:21000] default> Change-Id: Ibd02055d33e2da504eccd571f1f209ae2e5b7876 Reviewed-on: http://gerrit.cloudera.org:8080/15859 Tested-by: Impala Public Jenkins <impala-public-jenkins@cloudera.com> Reviewed-by: Tim Armstrong <tarmstrong@cloudera.com>
This commit is contained in:
committed by
Tim Armstrong
parent
86e611bdb2
commit
8b09343e7d
15
shell/ext-py/sasl-0.2.1/sasl/__init__.py
Normal file
15
shell/ext-py/sasl-0.2.1/sasl/__init__.py
Normal file
@@ -0,0 +1,15 @@
|
||||
# Copyright 2015 Cloudera Inc.
|
||||
#
|
||||
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||
# you may not use this file except in compliance with the License.
|
||||
# You may obtain a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
# See the License for the specific language governing permissions and
|
||||
# limitations under the License.
|
||||
|
||||
from sasl.saslwrapper import *
|
||||
4216
shell/ext-py/sasl-0.2.1/sasl/saslwrapper.cpp
Normal file
4216
shell/ext-py/sasl-0.2.1/sasl/saslwrapper.cpp
Normal file
File diff suppressed because it is too large
Load Diff
483
shell/ext-py/sasl-0.2.1/sasl/saslwrapper.h
Normal file
483
shell/ext-py/sasl-0.2.1/sasl/saslwrapper.h
Normal file
@@ -0,0 +1,483 @@
|
||||
/*
|
||||
* Licensed to the Apache Software Foundation (ASF) under one
|
||||
* or more contributor license agreements. See the NOTICE file
|
||||
* distributed with this work for additional information
|
||||
* regarding copyright ownership. The ASF licenses this file
|
||||
* to you under the Apache License, Version 2.0 (the
|
||||
* "License"); you may not use this file except in compliance
|
||||
* with the License. You may obtain a copy of the License at
|
||||
*
|
||||
* http://www.apache.org/licenses/LICENSE-2.0
|
||||
*
|
||||
* Unless required by applicable law or agreed to in writing,
|
||||
* software distributed under the License is distributed on an
|
||||
* "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
|
||||
* KIND, either express or implied. See the License for the
|
||||
* specific language governing permissions and limitations
|
||||
* under the License.
|
||||
*/
|
||||
|
||||
#include <stdint.h>
|
||||
#include <string>
|
||||
#include <sasl/sasl.h>
|
||||
#include <sstream>
|
||||
#include <stdlib.h>
|
||||
#include <string.h>
|
||||
#include <unistd.h>
|
||||
#include <iostream>
|
||||
|
||||
using namespace std;
|
||||
|
||||
namespace saslwrapper {
|
||||
|
||||
class ClientImpl {
|
||||
public:
|
||||
ClientImpl() : conn(0), cbIndex(0), maxBufSize(65535), minSsf(0), maxSsf(65535), externalSsf(0), secret(0) {}
|
||||
~ClientImpl() { if (conn) sasl_dispose(&conn); conn = 0; }
|
||||
|
||||
/**
|
||||
* Set attributes to be used in authenticating the session. All attributes should be set
|
||||
* before init() is called.
|
||||
*
|
||||
* @param key Name of attribute being set
|
||||
* @param value Value of attribute being set
|
||||
* @return true iff success. If false is returned, call getError() for error details.
|
||||
*
|
||||
* Available attribute keys:
|
||||
*
|
||||
* service - Name of the service being accessed
|
||||
* username - User identity for authentication
|
||||
* authname - User identity for authorization (if different from username)
|
||||
* password - Password associated with username
|
||||
* host - Fully qualified domain name of the server host
|
||||
* maxbufsize - Maximum receive buffer size for the security layer
|
||||
* minssf - Minimum acceptable security strength factor (integer)
|
||||
* maxssf - Maximum acceptable security strength factor (integer)
|
||||
* externalssf - Security strength factor supplied by external mechanism (i.e. SSL/TLS)
|
||||
* externaluser - Authentication ID (of client) as established by external mechanism
|
||||
*/
|
||||
bool setAttr(const string& key, const string& value);
|
||||
bool setAttr(const string& key, uint32_t value);
|
||||
|
||||
/**
|
||||
* Initialize the client object. This should be called after all of the properties have been set.
|
||||
*
|
||||
* @return true iff success. If false is returned, call getError() for error details.
|
||||
*/
|
||||
bool init();
|
||||
|
||||
/**
|
||||
* Start the SASL exchange with the server.
|
||||
*
|
||||
* @param mechList List of mechanisms provided by the server
|
||||
* @param chosen The mechanism chosen by the client
|
||||
* @param initialResponse Initial block of data to send to the server
|
||||
*
|
||||
* @return true iff success. If false is returned, call getError() for error details.
|
||||
*/
|
||||
bool start(const string& mechList, string& chosen, string& initialResponse);
|
||||
|
||||
/**
|
||||
* Step the SASL handshake.
|
||||
*
|
||||
* @param challenge The challenge supplied by the server
|
||||
* @param response (output) The response to be sent back to the server
|
||||
*
|
||||
* @return true iff success. If false is returned, call getError() for error details.
|
||||
*/
|
||||
bool step(const string& challenge, string& response);
|
||||
|
||||
/**
|
||||
* Encode data for secure transmission to the server.
|
||||
*
|
||||
* @param clearText Clear text data to be encrypted
|
||||
* @param cipherText (output) Encrypted data to be transmitted
|
||||
*
|
||||
* @return true iff success. If false is returned, call getError() for error details.
|
||||
*/
|
||||
bool encode(const string& clearText, string& cipherText);
|
||||
|
||||
/**
|
||||
* Decode data received from the server.
|
||||
*
|
||||
* @param cipherText Encrypted data received from the server
|
||||
* @param clearText (output) Decrypted clear text data
|
||||
*
|
||||
* @return true iff success. If false is returned, call getError() for error details.
|
||||
*/
|
||||
bool decode(const string& cipherText, string& clearText);
|
||||
|
||||
/**
|
||||
* Get the user identity (used for authentication) associated with this session.
|
||||
* Note that this is particularly useful for single-sign-on mechanisms in which the
|
||||
* username is not supplied by the application.
|
||||
*
|
||||
* @param userId (output) Authenticated user ID for this session.
|
||||
*/
|
||||
bool getUserId(string& userId);
|
||||
|
||||
/**
|
||||
* Get the security strength factor associated with this session.
|
||||
*
|
||||
* @param ssf (output) Negotiated SSF value.
|
||||
*/
|
||||
bool getSSF(int *ssf);
|
||||
|
||||
/**
|
||||
* Get error message for last error.
|
||||
* This function will return the last error message then clear the error state.
|
||||
* If there was no error or the error state has been cleared, this function will output
|
||||
* an empty string.
|
||||
*
|
||||
* @param error Error message string
|
||||
*/
|
||||
void getError(string& error);
|
||||
|
||||
private:
|
||||
// Declare private copy constructor and assignment operator. Ensure that this
|
||||
// class is non-copyable.
|
||||
ClientImpl(const ClientImpl&);
|
||||
const ClientImpl& operator=(const ClientImpl&);
|
||||
|
||||
void addCallback(unsigned long id, void* proc);
|
||||
void lastCallback() { addCallback(SASL_CB_LIST_END, 0); }
|
||||
void setError(const string& context, int code, const string& text = "", const string& text2 = "");
|
||||
void interact(sasl_interact_t* prompt);
|
||||
|
||||
static int cbName(void *context, int id, const char **result, unsigned *len);
|
||||
static int cbPassword(sasl_conn_t *conn, void *context, int id, sasl_secret_t **psecret);
|
||||
|
||||
static bool initialized;
|
||||
sasl_conn_t* conn;
|
||||
sasl_callback_t callbacks[8];
|
||||
int cbIndex;
|
||||
string error;
|
||||
string serviceName;
|
||||
string userName;
|
||||
string authName;
|
||||
string password;
|
||||
string hostName;
|
||||
string externalUserName;
|
||||
uint32_t maxBufSize;
|
||||
uint32_t minSsf;
|
||||
uint32_t maxSsf;
|
||||
uint32_t externalSsf;
|
||||
sasl_secret_t* secret;
|
||||
};
|
||||
}
|
||||
|
||||
using namespace saslwrapper;
|
||||
|
||||
bool ClientImpl::initialized = false;
|
||||
|
||||
bool ClientImpl::init()
|
||||
{
|
||||
int result;
|
||||
|
||||
if (!initialized) {
|
||||
initialized = true;
|
||||
result = sasl_client_init(0);
|
||||
if (result != SASL_OK) {
|
||||
setError("sasl_client_init", result, sasl_errstring(result, 0, 0));
|
||||
return false;
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
addCallback(SASL_CB_GETREALM, 0);
|
||||
if (!userName.empty()) {
|
||||
addCallback(SASL_CB_USER, (void*) cbName);
|
||||
addCallback(SASL_CB_AUTHNAME, (void*) cbName);
|
||||
|
||||
if (!password.empty())
|
||||
addCallback(SASL_CB_PASS, (void*) cbPassword);
|
||||
else
|
||||
addCallback(SASL_CB_PASS, 0);
|
||||
}
|
||||
lastCallback();
|
||||
|
||||
unsigned flags;
|
||||
|
||||
flags = 0;
|
||||
if (!authName.empty() && authName != userName)
|
||||
flags |= SASL_NEED_PROXY;
|
||||
|
||||
result = sasl_client_new(serviceName.c_str(), hostName.c_str(), 0, 0, callbacks, flags, &conn);
|
||||
if (result != SASL_OK) {
|
||||
setError("sasl_client_new", result, sasl_errstring(result, 0, 0));
|
||||
return false;
|
||||
}
|
||||
|
||||
sasl_security_properties_t secprops;
|
||||
|
||||
secprops.min_ssf = minSsf;
|
||||
secprops.max_ssf = maxSsf;
|
||||
secprops.maxbufsize = maxBufSize;
|
||||
secprops.property_names = 0;
|
||||
secprops.property_values = 0;
|
||||
secprops.security_flags = 0;
|
||||
|
||||
result = sasl_setprop(conn, SASL_SEC_PROPS, &secprops);
|
||||
if (result != SASL_OK) {
|
||||
setError("sasl_setprop(SASL_SEC_PROPS)", result);
|
||||
sasl_dispose(&conn);
|
||||
conn = 0;
|
||||
return false;
|
||||
}
|
||||
|
||||
if (!externalUserName.empty()) {
|
||||
result = sasl_setprop(conn, SASL_AUTH_EXTERNAL, externalUserName.c_str());
|
||||
if (result != SASL_OK) {
|
||||
setError("sasl_setprop(SASL_AUTH_EXTERNAL)", result);
|
||||
sasl_dispose(&conn);
|
||||
conn = 0;
|
||||
return false;
|
||||
}
|
||||
|
||||
result = sasl_setprop(conn, SASL_SSF_EXTERNAL, &externalSsf);
|
||||
if (result != SASL_OK) {
|
||||
setError("sasl_setprop(SASL_SSF_EXTERNAL)", result);
|
||||
sasl_dispose(&conn);
|
||||
conn = 0;
|
||||
return false;
|
||||
}
|
||||
}
|
||||
|
||||
return true;
|
||||
}
|
||||
|
||||
bool ClientImpl::setAttr(const string& key, const string& value)
|
||||
{
|
||||
if (key == "service")
|
||||
serviceName = value;
|
||||
else if (key == "username")
|
||||
userName = value;
|
||||
else if (key == "authname")
|
||||
authName = value;
|
||||
else if (key == "password") {
|
||||
password = value;
|
||||
free(secret);
|
||||
secret = (sasl_secret_t*) malloc(sizeof(sasl_secret_t) + password.length());
|
||||
}
|
||||
else if (key == "host")
|
||||
hostName = value;
|
||||
else if (key == "externaluser")
|
||||
externalUserName = value;
|
||||
else {
|
||||
setError("setAttr", -1, "Unknown string attribute name", key);
|
||||
return false;
|
||||
}
|
||||
|
||||
return true;
|
||||
}
|
||||
|
||||
bool ClientImpl::setAttr(const string& key, uint32_t value)
|
||||
{
|
||||
if (key == "minssf")
|
||||
minSsf = value;
|
||||
else if (key == "maxssf")
|
||||
maxSsf = value;
|
||||
else if (key == "externalssf")
|
||||
externalSsf = value;
|
||||
else if (key == "maxbufsize")
|
||||
maxBufSize = value;
|
||||
else {
|
||||
setError("setAttr", -1, "Unknown integer attribute name", key);
|
||||
return false;
|
||||
}
|
||||
|
||||
return true;
|
||||
}
|
||||
|
||||
bool ClientImpl::start(const string& mechList, string& chosen, string& initialResponse)
|
||||
{
|
||||
int result;
|
||||
sasl_interact_t* prompt = 0;
|
||||
const char* resp;
|
||||
const char* mech;
|
||||
unsigned int len;
|
||||
|
||||
do {
|
||||
result = sasl_client_start(conn, mechList.c_str(), &prompt, &resp, &len, &mech);
|
||||
if (result == SASL_INTERACT)
|
||||
interact(prompt);
|
||||
} while (result == SASL_INTERACT);
|
||||
if (result != SASL_OK && result != SASL_CONTINUE) {
|
||||
setError("sasl_client_start", result);
|
||||
return false;
|
||||
}
|
||||
|
||||
chosen = string(mech);
|
||||
initialResponse = string(resp, len);
|
||||
return true;
|
||||
}
|
||||
|
||||
bool ClientImpl::step(const string& challenge, string& response)
|
||||
{
|
||||
int result;
|
||||
sasl_interact_t* prompt = 0;
|
||||
const char* resp;
|
||||
unsigned int len;
|
||||
|
||||
do {
|
||||
result = sasl_client_step(conn, challenge.c_str(), challenge.size(), &prompt, &resp, &len);
|
||||
if (result == SASL_INTERACT)
|
||||
interact(prompt);
|
||||
} while (result == SASL_INTERACT);
|
||||
if (result != SASL_OK && result != SASL_CONTINUE) {
|
||||
setError("sasl_client_step", result);
|
||||
return false;
|
||||
}
|
||||
|
||||
response = string(resp, len);
|
||||
return true;
|
||||
}
|
||||
|
||||
bool ClientImpl::encode(const string& clearText, string& cipherText)
|
||||
{
|
||||
const char* output;
|
||||
unsigned int outlen;
|
||||
int result = sasl_encode(conn, clearText.c_str(), clearText.size(), &output, &outlen);
|
||||
if (result != SASL_OK) {
|
||||
setError("sasl_encode", result);
|
||||
return false;
|
||||
}
|
||||
cipherText = string(output, outlen);
|
||||
return true;
|
||||
}
|
||||
|
||||
bool ClientImpl::decode(const string& cipherText, string& clearText)
|
||||
{
|
||||
const char* input = cipherText.c_str();
|
||||
unsigned int inLen = cipherText.size();
|
||||
unsigned int remaining = inLen;
|
||||
const char* cursor = input;
|
||||
const char* output;
|
||||
unsigned int outlen;
|
||||
|
||||
clearText = string();
|
||||
while (remaining > 0) {
|
||||
unsigned int segmentLen = (remaining < maxBufSize) ? remaining : maxBufSize;
|
||||
int result = sasl_decode(conn, cursor, segmentLen, &output, &outlen);
|
||||
if (result != SASL_OK) {
|
||||
setError("sasl_decode", result);
|
||||
return false;
|
||||
}
|
||||
clearText = clearText + string(output, outlen);
|
||||
cursor += segmentLen;
|
||||
remaining -= segmentLen;
|
||||
}
|
||||
return true;
|
||||
}
|
||||
|
||||
bool ClientImpl::getUserId(string& userId)
|
||||
{
|
||||
int result;
|
||||
const char* operName;
|
||||
|
||||
result = sasl_getprop(conn, SASL_USERNAME, (const void**) &operName);
|
||||
if (result != SASL_OK) {
|
||||
setError("sasl_getprop(SASL_USERNAME)", result);
|
||||
return false;
|
||||
}
|
||||
|
||||
userId = string(operName);
|
||||
return true;
|
||||
}
|
||||
|
||||
bool ClientImpl::getSSF(int *ssf)
|
||||
{
|
||||
int result = sasl_getprop(conn, SASL_SSF, (const void **)&ssf);
|
||||
if (result != SASL_OK) {
|
||||
setError("sasl_getprop(SASL_SSF)", result);
|
||||
return false;
|
||||
}
|
||||
|
||||
return true;
|
||||
}
|
||||
|
||||
void ClientImpl::getError(string& _error)
|
||||
{
|
||||
_error = error;
|
||||
error.clear();
|
||||
}
|
||||
|
||||
void ClientImpl::addCallback(unsigned long id, void* proc)
|
||||
{
|
||||
callbacks[cbIndex].id = id;
|
||||
callbacks[cbIndex].proc = (int (*)()) proc;
|
||||
callbacks[cbIndex].context = this;
|
||||
cbIndex++;
|
||||
}
|
||||
|
||||
void ClientImpl::setError(const string& context, int code, const string& text, const string& text2)
|
||||
{
|
||||
stringstream err;
|
||||
string errtext;
|
||||
|
||||
if (text.empty()) {
|
||||
if (conn) {
|
||||
errtext = sasl_errdetail(conn);
|
||||
} else {
|
||||
errtext = sasl_errstring(code, NULL, NULL);
|
||||
}
|
||||
} else {
|
||||
errtext = text;
|
||||
}
|
||||
|
||||
err << "Error in " << context << " (" << code << ") " << errtext;
|
||||
if (!text2.empty())
|
||||
err << " - " << text2;
|
||||
error = err.str();
|
||||
}
|
||||
|
||||
void ClientImpl::interact(sasl_interact_t* prompt)
|
||||
{
|
||||
string output;
|
||||
char* input;
|
||||
|
||||
if (prompt->id == SASL_CB_PASS) {
|
||||
string ppt(prompt->prompt);
|
||||
ppt += ": ";
|
||||
char* pass = getpass(ppt.c_str());
|
||||
output = string(pass);
|
||||
} else {
|
||||
cout << prompt->prompt;
|
||||
if (prompt->defresult)
|
||||
cout << " [" << prompt->defresult << "]";
|
||||
cout << ": ";
|
||||
cin >> output;
|
||||
}
|
||||
prompt->result = output.c_str();
|
||||
prompt->len = output.length();
|
||||
}
|
||||
|
||||
int ClientImpl::cbName(void *context, int id, const char **result, unsigned *len)
|
||||
{
|
||||
ClientImpl* impl = (ClientImpl*) context;
|
||||
|
||||
if (id == SASL_CB_USER || (id == SASL_CB_AUTHNAME && impl->authName.empty())) {
|
||||
*result = impl->userName.c_str();
|
||||
//*len = impl->userName.length();
|
||||
} else if (id == SASL_CB_AUTHNAME) {
|
||||
*result = impl->authName.c_str();
|
||||
//*len = impl->authName.length();
|
||||
}
|
||||
|
||||
return SASL_OK;
|
||||
}
|
||||
|
||||
int ClientImpl::cbPassword(sasl_conn_t *conn, void *context, int id, sasl_secret_t **psecret)
|
||||
{
|
||||
ClientImpl* impl = (ClientImpl*) context;
|
||||
size_t length = impl->password.length();
|
||||
|
||||
if (id == SASL_CB_PASS) {
|
||||
impl->secret->len = length;
|
||||
::memcpy(impl->secret->data, impl->password.c_str(), length);
|
||||
} else
|
||||
impl->secret->len = 0;
|
||||
|
||||
*psecret = impl->secret;
|
||||
return SASL_OK;
|
||||
}
|
||||
94
shell/ext-py/sasl-0.2.1/sasl/saslwrapper.pyx
Normal file
94
shell/ext-py/sasl-0.2.1/sasl/saslwrapper.pyx
Normal file
@@ -0,0 +1,94 @@
|
||||
# Copyright 2015 Cloudera Inc.
|
||||
#
|
||||
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||
# you may not use this file except in compliance with the License.
|
||||
# You may obtain a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
# See the License for the specific language governing permissions and
|
||||
# limitations under the License.
|
||||
|
||||
from six import string_types, PY3
|
||||
|
||||
from libcpp cimport bool
|
||||
from libc.stdint cimport uint32_t
|
||||
from libcpp.string cimport string as string_t
|
||||
|
||||
cdef extern from 'saslwrapper.h' namespace 'saslwrapper':
|
||||
cdef cppclass ClientImpl:
|
||||
ClientImpl() except +
|
||||
bool setAttr(const string_t& key, const string_t& value)
|
||||
bool setAttr(const string_t& key, uint32_t value)
|
||||
bool init()
|
||||
bool start(const string_t& mechList, string_t& chosen, string_t& initialResponse)
|
||||
bool step(const string_t& challenge, string_t& response)
|
||||
bool encode(const string_t& clearText, string_t& cipherText)
|
||||
bool decode(const string_t& cipherText, string_t& clearText)
|
||||
bool getUserId(string_t& userId)
|
||||
bool getSSF(int *ssf)
|
||||
void getError(string_t& error)
|
||||
|
||||
|
||||
cpdef string_t to_bytes(bytes_or_str):
|
||||
if PY3 and isinstance(bytes_or_str, string_types):
|
||||
return bytes_or_str.encode('utf-8')
|
||||
return bytes_or_str
|
||||
|
||||
|
||||
cpdef to_string(bytes_or_str):
|
||||
if isinstance(bytes_or_str, bytes):
|
||||
return bytes_or_str.decode('utf-8')
|
||||
return bytes_or_str
|
||||
|
||||
|
||||
cdef class Client:
|
||||
cdef ClientImpl _this
|
||||
|
||||
cpdef setAttr(self, key, value):
|
||||
if isinstance(value, int):
|
||||
return self._this.setAttr(to_bytes(key), <uint32_t> value)
|
||||
elif isinstance(value, string_types):
|
||||
return self._this.setAttr(to_bytes(key), <string_t> to_bytes(value))
|
||||
|
||||
cpdef init(self):
|
||||
return self._this.init()
|
||||
|
||||
cpdef start(self, mech_list):
|
||||
cdef string_t chosen
|
||||
cdef string_t initial_response
|
||||
success = self._this.start(to_bytes(mech_list), chosen, initial_response)
|
||||
return (success, chosen, initial_response)
|
||||
|
||||
cpdef step(self, challenge):
|
||||
cdef string_t response
|
||||
success = self._this.step(to_bytes(challenge), response)
|
||||
return (success, response)
|
||||
|
||||
cpdef encode(self, clear_text):
|
||||
cdef string_t cipher_text
|
||||
success = self._this.encode(to_bytes(clear_text), cipher_text)
|
||||
return (success, cipher_text)
|
||||
|
||||
cpdef decode(self, cipher_text):
|
||||
cdef string_t clear_text
|
||||
success = self._this.decode(to_bytes(cipher_text), clear_text)
|
||||
return (success, clear_text)
|
||||
|
||||
cpdef getUserId(self):
|
||||
cdef string_t user_id
|
||||
success = self._this.getUserId(user_id)
|
||||
return (success, user_id)
|
||||
|
||||
cpdef getSSF(self):
|
||||
cdef int ssf
|
||||
success = self._this.getSSF(&ssf)
|
||||
return (success, ssf)
|
||||
|
||||
cpdef getError(self):
|
||||
cdef string_t error
|
||||
self._this.getError(error)
|
||||
return error
|
||||
Reference in New Issue
Block a user