1
|
|
|
# -*- coding: utf-8 -*- |
2
|
10 |
|
from __future__ import absolute_import, unicode_literals |
3
|
10 |
|
|
4
|
10 |
|
import base64 |
5
|
10 |
|
import copy |
6
|
|
|
import hashlib |
7
|
10 |
|
import socket |
8
|
|
|
|
9
|
10 |
|
import six |
10
|
|
|
|
11
|
|
|
from wechatpy.utils import to_binary, to_text |
12
|
10 |
|
|
13
|
10 |
|
|
14
|
10 |
|
def format_url(params, api_key=None): |
15
|
10 |
|
data = [to_binary('{0}={1}'.format(k, params[k])) for k in sorted(params) if params[k]] |
16
|
10 |
|
if api_key: |
17
|
|
|
data.append(to_binary('key={0}'.format(api_key))) |
18
|
|
|
return b"&".join(data) |
19
|
10 |
|
|
20
|
10 |
|
|
21
|
10 |
|
def calculate_signature(params, api_key): |
22
|
|
|
url = format_url(params, api_key) |
23
|
|
|
return to_text(hashlib.md5(url).hexdigest().upper()) |
24
|
10 |
|
|
25
|
|
|
|
26
|
|
|
def _check_signature(params, api_key): |
27
|
|
|
_params = copy.deepcopy(params) |
28
|
|
|
sign = _params.pop('sign', '') |
29
|
|
|
return sign == calculate_signature(_params, api_key) |
30
|
10 |
|
|
31
|
10 |
|
|
32
|
10 |
|
def dict_to_xml(d, sign): |
33
|
|
|
xml = ['<xml>\n'] |
34
|
10 |
|
for k in sorted(d): |
35
|
10 |
|
# use sorted to avoid test error on Py3k |
36
|
10 |
|
v = d[k] |
37
|
|
|
if isinstance(v, six.integer_types) or (isinstance(v, six.string_types) and v.isdigit()): |
38
|
10 |
|
xml.append('<{0}>{1}</{0}>\n'.format(to_text(k), to_text(v))) |
39
|
|
|
else: |
40
|
|
|
xml.append( |
41
|
10 |
|
'<{0}><![CDATA[{1}]]></{0}>\n'.format(to_text(k), to_text(v)) |
42
|
10 |
|
) |
43
|
|
|
xml.append('<sign><![CDATA[{0}]]></sign>\n</xml>'.format(to_text(sign))) |
44
|
|
|
return ''.join(xml) |
45
|
10 |
|
|
46
|
10 |
|
|
47
|
10 |
|
def get_external_ip(): |
48
|
10 |
|
sock = socket.socket(socket.AF_INET, socket.SOCK_DGRAM) |
49
|
10 |
|
try: |
50
|
10 |
|
wechat_ip = socket.gethostbyname('api.mch.weixin.qq.com') |
51
|
10 |
|
sock.connect((wechat_ip, 80)) |
52
|
10 |
|
addr, port = sock.getsockname() |
53
|
|
|
sock.close() |
54
|
|
|
return addr |
55
|
|
|
except socket.error: |
56
|
|
|
return '127.0.0.1' |
57
|
|
|
|
58
|
|
|
|
59
|
|
|
def rsa_encrypt(data, pem, b64_encode=True): |
60
|
|
|
""" |
61
|
|
|
rsa 加密 |
62
|
|
|
:param data: 待加密字符串/binary |
63
|
|
|
:param pem: RSA public key 内容/binary |
64
|
|
|
:param b64_encode: 是否对输出进行 base64 encode |
65
|
|
|
:return: 如果 b64_encode=True 的话,返回加密并 base64 处理后的 string;否则返回加密后的 binary |
66
|
|
|
""" |
67
|
|
|
from cryptography.hazmat.backends import default_backend |
68
|
|
|
from cryptography.hazmat.primitives import serialization |
69
|
|
|
from cryptography.hazmat.primitives import hashes |
70
|
|
|
from cryptography.hazmat.primitives.asymmetric import padding |
71
|
|
|
encoded_data = to_binary(data) |
72
|
|
|
pem = to_binary(pem) |
73
|
|
|
public_key = serialization.load_pem_public_key(pem, backend=default_backend()) |
74
|
|
|
encrypted_data = public_key.encrypt( |
75
|
|
|
encoded_data, |
76
|
|
|
padding=padding.OAEP( |
77
|
|
|
mgf=padding.MGF1(hashes.SHA1()), |
78
|
|
|
algorithm=hashes.SHA1(), |
79
|
|
|
label=None, |
80
|
|
|
) |
81
|
|
|
) |
82
|
|
|
if b64_encode: |
83
|
|
|
encrypted_data = base64.b64encode(encrypted_data).decode('utf-8') |
84
|
|
|
return encrypted_data |
85
|
|
|
|
86
|
|
|
|
87
|
|
|
def rsa_decrypt(encrypted_data, pem, password=None): |
88
|
|
|
""" |
89
|
|
|
rsa 解密 |
90
|
|
|
:param encrypted_data: 待解密 bytes |
91
|
|
|
:param pem: RSA private key 内容/binary |
92
|
|
|
:param password: RSA private key pass phrase |
93
|
|
|
:return: 解密后的 binary |
94
|
|
|
""" |
95
|
|
|
from cryptography.hazmat.backends import default_backend |
96
|
|
|
from cryptography.hazmat.primitives import serialization |
97
|
|
|
from cryptography.hazmat.primitives import hashes |
98
|
|
|
from cryptography.hazmat.primitives.asymmetric import padding |
99
|
|
|
|
100
|
|
|
encrypted_data = to_binary(encrypted_data) |
101
|
|
|
pem = to_binary(pem) |
102
|
|
|
private_key = serialization.load_pem_private_key(pem, password, backend=default_backend()) |
103
|
|
|
data = private_key.decrypt( |
104
|
|
|
encrypted_data, |
105
|
|
|
padding=padding.OAEP( |
106
|
|
|
mgf=padding.MGF1(hashes.SHA1()), |
107
|
|
|
algorithm=hashes.SHA1(), |
108
|
|
|
label=None, |
109
|
|
|
) |
110
|
|
|
) |
111
|
|
|
return data |
112
|
|
|
|