text stringlengths 0 828 |
|---|
687,"def _create_modulename(cdef_sources, source, sys_version): |
"""""" |
This is the same as CFFI's create modulename except we don't include the |
CFFI version. |
"""""" |
key = '\x00'.join([sys_version[:3], source, cdef_sources]) |
key = key.encode('utf-8') |
k1 = hex(binascii.crc32(key[0::2]) & 0xffffffff) |
k1 = k1.lstrip('0x').rstrip('L') |
k2 = hex(binascii.crc32(key[1::2]) & 0xffffffff) |
k2 = k2.lstrip('0').rstrip('L') |
return '_xprintidle_cffi_{0}{1}'.format(k1, k2)" |
688,"def server_identity_is_verified(self): |
"""""" GPGAuth stage0 """""" |
# Encrypt a uuid token for the server |
server_verify_token = self.gpg.encrypt(self._nonce0, |
self.server_fingerprint, always_trust=True) |
if not server_verify_token.ok: |
raise GPGAuthStage0Exception( |
'Encryption of the nonce0 (%s) ' |
'to the server fingerprint (%s) failed.' % |
(self._nonce0, self.server_fingerprint) |
) |
server_verify_response = post_server_verify_token( |
self, |
keyid=self.user_fingerprint, |
server_verify_token=str(server_verify_token) |
) |
if not check_server_verify_response(server_verify_response): |
raise GPGAuthStage0Exception(""Verify endpoint wrongly formatted"") |
if server_verify_response.headers.get('X-GPGAuth-Verify-Response') != self._nonce0: |
raise GPGAuthStage0Exception( |
'The server decrypted something different than what we sent ' |
'(%s <> %s)' % |
(server_verify_response.headers.get('X-GPGAuth-Verify-Response'), self._nonce0)) |
logger.info('server_identity_is_verified: OK') |
return True" |
689,"def user_auth_token(self): |
"""""" GPGAuth Stage1 """""" |
# stage0 is a prequisite |
if not self.server_identity_is_verified: |
return False |
server_login_response = post_log_in( |
self, |
keyid=self.user_fingerprint |
) |
if not check_server_login_stage1_response(server_login_response): |
raise GPGAuthStage1Exception(""Login endpoint wrongly formatted"") |
# Get the encrypted User Auth Token |
encrypted_user_auth_token = unquote_plus( |
server_login_response.headers.get('X-GPGAuth-User-Auth-Token') |
.replace('\\\\', '\\') |
).replace('\\ ', ' ') |
logger.debug('User token to decrypt: %s', encrypted_user_auth_token) |
logger.info('Decrypting the user authentication token; ' |
'password prompt expected') |
passphrase = None |
# For the sake of tests, allow one to set the passphrase onto |
# the object |
if hasattr(self, '_user_passphrase'): |
passphrase = self._user_passphrase |
user_auth_token = self.gpg.decrypt(encrypted_user_auth_token, always_trust=True, passphrase=passphrase) |
if not user_auth_token.ok: |
raise GPGAuthStage1Exception(""Auth token decryption failed: %s"", user_auth_token.status) |
logger.info('user_auth_token: %s', user_auth_token) |
return str(user_auth_token)" |
690,"def is_authenticated_with_token(self): |
"""""" GPGAuth Stage 2 """""" |
"""""" Send back the token to the server to get auth cookie """""" |
server_login_response = post_log_in( |
self, |
keyid=self.user_fingerprint, |
user_token_result=self.user_auth_token |
) |
if not check_server_login_stage2_response(server_login_response): |
raise GPGAuthStage2Exception(""Login endpoint wrongly formatted"") |
self.cookies.save(ignore_discard=True) |
logger.info('is_authenticated_with_token: OK') |
return True" |
691,"def publish(self,message,message_type,topic=''): |
"""""" |
Publish the message on the PUB socket with the given topic name. |
Args: |
- message: the message to publish |
- message_type: the type of message being sent |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.