t.w._.d.DigestCredentialFactory(object) : class documentation

Part of twisted.web._auth.digest View Source View In Hierarchy

Implements interfaces: twisted.web.iweb.ICredentialFactory

Support for RFC2617 HTTP Digest Authentication
ParametersalgorithmCase insensitive string specifying the hash algorithm to use. Must be either 'md5' or 'sha'. 'md5-sess' is not supported.
authenticationRealmcase sensitive string that specifies the realm portion of the challenge
Instance VariablesprivateKeyA random string used for generating the secure opaque. (type: str )
Class VariablesCHALLENGE_LIFETIME_SECSThe number of seconds for which an opaque should be valid.
Method __init__ Undocumented
Method generateNonce Create a random value suitable for use as the nonce parameter of a WWW-Authenticate challenge.
Method generateOpaque Generate an opaque to be returned to the client. This is a unique string that can be returned to us and verified.
Method verifyOpaque Given the opaque and nonce from the request, as well as the clientip that made the request, verify that the opaque was generated by us. And that it's not too old.
Method getChallenge Generate the challenge for use in the WWW-Authenticate header
Method decode Decode the given response and attempt to generate a DigestedCredentials from it.
Method _getTime Parameterize the time based seed used in generateOpaque so we can deterministically unittest it's behavior.
def __init__(self, algorithm, authenticationRealm): (source)
Undocumented
def generateNonce(self): (source)
Create a random value suitable for use as the nonce parameter of a WWW-Authenticate challenge.
Returns (type: str )
def _getTime(self): (source)
Parameterize the time based seed used in generateOpaque so we can deterministically unittest it's behavior.
def generateOpaque(self, nonce, clientip): (source)
Generate an opaque to be returned to the client. This is a unique string that can be returned to us and verified.
def verifyOpaque(self, opaque, nonce, clientip): (source)
Given the opaque and nonce from the request, as well as the clientip that made the request, verify that the opaque was generated by us. And that it's not too old.
ParametersopaqueThe opaque value from the Digest response
nonceThe nonce value from the Digest response
clientipThe remote IP address of the client making the request or None if the request was submitted over a channel where this does not make sense.
ReturnsTrue if the opaque was successfully verified.
Raiseserror.LoginFailedif opaque could not be parsed or contained the wrong values.
def getChallenge(self, request): (source)
Generate the challenge for use in the WWW-Authenticate header
ParametersrequestThe IRequest to with access was denied and for the response to which this challenge is being generated.
ReturnsThe dict that can be used to generate a WWW-Authenticate header.
def decode(self, response, request): (source)
Decode the given response and attempt to generate a DigestedCredentials from it.
ParametersresponseA string of comma seperated key=value pairs (type: str )
requestthe request being processed (type: twisted.web2.server.Request )
ReturnsDigestedCredentials
Raiseserror.LoginFailedIf the response does not contain a username, a nonce, an opaque, or if the opaque is invalid.
API Documentation for Twisted, generated by pydoctor at 2011-10-27 16:02:37.