text
stringlengths 0
828
|
|---|
687,"def _create_modulename(cdef_sources, source, sys_version):
|
""""""
|
This is the same as CFFI's create modulename except we don't include the
|
CFFI version.
|
""""""
|
key = '\x00'.join([sys_version[:3], source, cdef_sources])
|
key = key.encode('utf-8')
|
k1 = hex(binascii.crc32(key[0::2]) & 0xffffffff)
|
k1 = k1.lstrip('0x').rstrip('L')
|
k2 = hex(binascii.crc32(key[1::2]) & 0xffffffff)
|
k2 = k2.lstrip('0').rstrip('L')
|
return '_xprintidle_cffi_{0}{1}'.format(k1, k2)"
|
688,"def server_identity_is_verified(self):
|
"""""" GPGAuth stage0 """"""
|
# Encrypt a uuid token for the server
|
server_verify_token = self.gpg.encrypt(self._nonce0,
|
self.server_fingerprint, always_trust=True)
|
if not server_verify_token.ok:
|
raise GPGAuthStage0Exception(
|
'Encryption of the nonce0 (%s) '
|
'to the server fingerprint (%s) failed.' %
|
(self._nonce0, self.server_fingerprint)
|
)
|
server_verify_response = post_server_verify_token(
|
self,
|
keyid=self.user_fingerprint,
|
server_verify_token=str(server_verify_token)
|
)
|
if not check_server_verify_response(server_verify_response):
|
raise GPGAuthStage0Exception(""Verify endpoint wrongly formatted"")
|
if server_verify_response.headers.get('X-GPGAuth-Verify-Response') != self._nonce0:
|
raise GPGAuthStage0Exception(
|
'The server decrypted something different than what we sent '
|
'(%s <> %s)' %
|
(server_verify_response.headers.get('X-GPGAuth-Verify-Response'), self._nonce0))
|
logger.info('server_identity_is_verified: OK')
|
return True"
|
689,"def user_auth_token(self):
|
"""""" GPGAuth Stage1 """"""
|
# stage0 is a prequisite
|
if not self.server_identity_is_verified:
|
return False
|
server_login_response = post_log_in(
|
self,
|
keyid=self.user_fingerprint
|
)
|
if not check_server_login_stage1_response(server_login_response):
|
raise GPGAuthStage1Exception(""Login endpoint wrongly formatted"")
|
# Get the encrypted User Auth Token
|
encrypted_user_auth_token = unquote_plus(
|
server_login_response.headers.get('X-GPGAuth-User-Auth-Token')
|
.replace('\\\\', '\\')
|
).replace('\\ ', ' ')
|
logger.debug('User token to decrypt: %s', encrypted_user_auth_token)
|
logger.info('Decrypting the user authentication token; '
|
'password prompt expected')
|
passphrase = None
|
# For the sake of tests, allow one to set the passphrase onto
|
# the object
|
if hasattr(self, '_user_passphrase'):
|
passphrase = self._user_passphrase
|
user_auth_token = self.gpg.decrypt(encrypted_user_auth_token, always_trust=True, passphrase=passphrase)
|
if not user_auth_token.ok:
|
raise GPGAuthStage1Exception(""Auth token decryption failed: %s"", user_auth_token.status)
|
logger.info('user_auth_token: %s', user_auth_token)
|
return str(user_auth_token)"
|
690,"def is_authenticated_with_token(self):
|
"""""" GPGAuth Stage 2 """"""
|
"""""" Send back the token to the server to get auth cookie """"""
|
server_login_response = post_log_in(
|
self,
|
keyid=self.user_fingerprint,
|
user_token_result=self.user_auth_token
|
)
|
if not check_server_login_stage2_response(server_login_response):
|
raise GPGAuthStage2Exception(""Login endpoint wrongly formatted"")
|
self.cookies.save(ignore_discard=True)
|
logger.info('is_authenticated_with_token: OK')
|
return True"
|
691,"def publish(self,message,message_type,topic=''):
|
""""""
|
Publish the message on the PUB socket with the given topic name.
|
Args:
|
- message: the message to publish
|
- message_type: the type of message being sent
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.