mirror of
https://github.com/Leseratte10/acsm-calibre-plugin.git
synced 2024-12-22 17:29:56 +06:00
More Python2 fixes
This commit is contained in:
parent
171c6f36ba
commit
5fe4dbb75a
1
.gitignore
vendored
1
.gitignore
vendored
@ -2,3 +2,4 @@
|
|||||||
/calibre-plugin/keyextract/*.exe
|
/calibre-plugin/keyextract/*.exe
|
||||||
/calibre-plugin/module_id.txt
|
/calibre-plugin/module_id.txt
|
||||||
/calibre-plugin/__pycache__
|
/calibre-plugin/__pycache__
|
||||||
|
/calibre-plugin/*.pyc
|
||||||
|
@ -8,9 +8,6 @@ This is an experimental Python version of libgourou.
|
|||||||
# pyright: reportUndefinedVariable=false
|
# pyright: reportUndefinedVariable=false
|
||||||
|
|
||||||
import sys, os, time, shutil
|
import sys, os, time, shutil
|
||||||
if sys.version_info[0] < 3:
|
|
||||||
print("This script requires Python 3.")
|
|
||||||
exit(1)
|
|
||||||
|
|
||||||
import zipfile
|
import zipfile
|
||||||
from lxml import etree
|
from lxml import etree
|
||||||
|
@ -7,10 +7,6 @@ This is an experimental Python version of libgourou.
|
|||||||
|
|
||||||
import getpass, sys
|
import getpass, sys
|
||||||
|
|
||||||
if sys.version_info[0] < 3:
|
|
||||||
print("This script requires Python 3.")
|
|
||||||
exit(1)
|
|
||||||
|
|
||||||
from libadobe import createDeviceKeyFile, VAR_VER_SUPP_CONFIG_NAMES
|
from libadobe import createDeviceKeyFile, VAR_VER_SUPP_CONFIG_NAMES
|
||||||
from libadobeAccount import createDeviceFile, createUser, signIn, activateDevice
|
from libadobeAccount import createDeviceFile, createUser, signIn, activateDevice
|
||||||
|
|
||||||
@ -32,9 +28,9 @@ def main():
|
|||||||
|
|
||||||
|
|
||||||
if (VAR_MAIL == ""):
|
if (VAR_MAIL == ""):
|
||||||
VAR_MAIL = input("Please enter your AdobeID: ")
|
VAR_MAIL = input("Please enter your AdobeID (or press enter for anonymous auth): ")
|
||||||
|
|
||||||
if (VAR_PASS == ""):
|
if (VAR_PASS == "" and VAR_MAIL != ""):
|
||||||
VAR_PASS = getpass.getpass("Please enter the password for your AdobeID: ")
|
VAR_PASS = getpass.getpass("Please enter the password for your AdobeID: ")
|
||||||
|
|
||||||
if (VAR_VER is None):
|
if (VAR_VER is None):
|
||||||
@ -44,8 +40,8 @@ def main():
|
|||||||
print("Invalid version")
|
print("Invalid version")
|
||||||
exit(1)
|
exit(1)
|
||||||
|
|
||||||
if (VAR_MAIL == "" or VAR_PASS == ""):
|
if (VAR_MAIL != "" and VAR_PASS == ""):
|
||||||
print("Empty credential, aborting")
|
print("Empty password, aborting")
|
||||||
exit(1)
|
exit(1)
|
||||||
|
|
||||||
|
|
||||||
@ -61,7 +57,11 @@ def main():
|
|||||||
print("Error, couldn't create user: %s" % resp)
|
print("Error, couldn't create user: %s" % resp)
|
||||||
exit(1)
|
exit(1)
|
||||||
|
|
||||||
success, resp = signIn("AdobeID", VAR_MAIL, VAR_PASS)
|
if VAR_MAIL == "":
|
||||||
|
success, resp = signIn("anonymous", "", "")
|
||||||
|
else:
|
||||||
|
success, resp = signIn("AdobeID", VAR_MAIL, VAR_PASS)
|
||||||
|
|
||||||
if (success is False):
|
if (success is False):
|
||||||
print("Login unsuccessful: " + resp)
|
print("Login unsuccessful: " + resp)
|
||||||
exit(1)
|
exit(1)
|
||||||
|
@ -12,6 +12,7 @@ if sys.version_info[0] >= 3:
|
|||||||
else:
|
else:
|
||||||
from mock import patch
|
from mock import patch
|
||||||
from lxml import etree
|
from lxml import etree
|
||||||
|
import binascii
|
||||||
|
|
||||||
|
|
||||||
try:
|
try:
|
||||||
@ -187,10 +188,7 @@ class TestAdobe(unittest.TestCase):
|
|||||||
|
|
||||||
key = rsa.PrivateKey.load_pkcs1(RSA.importKey(base64.b64decode(mock_signing_key)).exportKey())
|
key = rsa.PrivateKey.load_pkcs1(RSA.importKey(base64.b64decode(mock_signing_key)).exportKey())
|
||||||
keylen = rsa.pkcs1.common.byte_size(key.n)
|
keylen = rsa.pkcs1.common.byte_size(key.n)
|
||||||
if sys.version_info[0] >= 3:
|
padded = rsa.pkcs1._pad_for_signing(bytes(payload_bytes), keylen)
|
||||||
padded = rsa.pkcs1._pad_for_signing(bytes(payload_bytes), keylen)
|
|
||||||
else:
|
|
||||||
padded = rsa.pkcs1._pad_for_signing(bytes(payload_bytes), keylen)
|
|
||||||
payload = rsa.pkcs1.transform.bytes2int(padded)
|
payload = rsa.pkcs1.transform.bytes2int(padded)
|
||||||
encrypted = key.blinded_encrypt(payload)
|
encrypted = key.blinded_encrypt(payload)
|
||||||
block = rsa.pkcs1.transform.int2bytes(encrypted, keylen)
|
block = rsa.pkcs1.transform.int2bytes(encrypted, keylen)
|
||||||
@ -310,10 +308,7 @@ class TestAdobe(unittest.TestCase):
|
|||||||
expected_msg.extend(bytearray(struct.pack("B", len(passwd))))
|
expected_msg.extend(bytearray(struct.pack("B", len(passwd))))
|
||||||
expected_msg.extend(bytearray(passwd.encode("latin-1")))
|
expected_msg.extend(bytearray(passwd.encode("latin-1")))
|
||||||
|
|
||||||
if sys.version_info[0] >= 3:
|
self.assertEqual(binascii.hexlify(msg), binascii.hexlify(expected_msg), "devkey encryption returned invalid result")
|
||||||
self.assertEqual(msg.hex(), expected_msg.hex(), "devkey encryption returned invalid result")
|
|
||||||
else:
|
|
||||||
self.assertEqual(msg, expected_msg, "devkey encryption returned invalid result")
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user