source_code
stringlengths
45
7.24k
function_name
stringlengths
1
111
messages
list
def x(filepath, hash_algorithms=['sha256']): securesystemslib.formats.PATH_SCHEMA.check_match(filepath) securesystemslib.formats.HASHALGORITHMS_SCHEMA.check_match(hash_algorithms) file_hashes = {} if not os.path.exists(filepath): raise securesystemslib.exceptions.Error('Path ' + repr(filepath) + ' doest not exist.') filepath = os.path.abspath(filepath) file_length = os.path.getsize(filepath) for algorithm in hash_algorithms: digest_object = securesystemslib.hash.digest_filename(filepath, algorithm) file_hashes.update({algorithm: digest_object.hexdigest()}) securesystemslib.formats.HASHDICT_SCHEMA.check_match(file_hashes) return file_length, file_hashes
get_file_details
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(filepath, hash_algorithms=['sha256']):\n securesystemslib.formats.PATH_SCHEMA.check_match(filepath)\n securesystemslib.formats.HASHALGORITHMS_SCHEMA.check_match(hash_algorithms)\n file_hashes = {}\n if not os.path.exists(filepath):\n raise securesystemslib.exceptions.Error('Path ' + repr(filepath) +\n ' doest not exist.')\n filepath = os.path.abspath(filepath)\n file_length = os.path.getsize(filepath)\n for algorithm in hash_algorithms:\n digest_object = securesystemslib.hash.digest_filename(filepath,\n algorithm)\n file_hashes.update({algorithm: digest_object.hexdigest()})\n securesystemslib.formats.HASHDICT_SCHEMA.check_match(file_hashes)\n return file_length, file_hashes\n", "role": "user" }, { "content": "get_file_details", "role": "assistant" } ]
def x(filename): securesystemslib.formats.PATH_SCHEMA.check_match(filename) directory = os.path.split(filename)[0] if directory and not os.path.exists(directory): os.makedirs(directory, 448)
ensure_parent_dir
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(filename):\n securesystemslib.formats.PATH_SCHEMA.check_match(filename)\n directory = os.path.split(filename)[0]\n if directory and not os.path.exists(directory):\n os.makedirs(directory, 448)\n", "role": "user" }, { "content": "ensure_parent_dir", "role": "assistant" } ]
def x(filepath, confined_directories): securesystemslib.formats.RELPATH_SCHEMA.check_match(filepath) securesystemslib.formats.RELPATHS_SCHEMA.check_match(confined_directories) for confined_directory in confined_directories: if confined_directory == '': return True filepath = os.path.normpath(filepath) confined_directory = os.path.normpath(confined_directory) if os.path.dirname(filepath) == confined_directory: return True return False
file_in_confined_directories
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(filepath, confined_directories):\n securesystemslib.formats.RELPATH_SCHEMA.check_match(filepath)\n securesystemslib.formats.RELPATHS_SCHEMA.check_match(confined_directories)\n for confined_directory in confined_directories:\n if confined_directory == '':\n return True\n filepath = os.path.normpath(filepath)\n confined_directory = os.path.normpath(confined_directory)\n if os.path.dirname(filepath) == confined_directory:\n return True\n return False\n", "role": "user" }, { "content": "file_in_confined_directories", "role": "assistant" } ]
def x(roles, delegated_role): securesystemslib.formats.ROLELIST_SCHEMA.check_match(roles) securesystemslib.formats.ROLENAME_SCHEMA.check_match(delegated_role) role_index = None for index in six.moves.xrange(len(roles)): role = roles[index] name = role.get('name') if name is None: no_name_message = 'Role with no name.' raise securesystemslib.exceptions.RepositoryError(no_name_message) elif name == delegated_role: if role_index is None: role_index = index else: duplicate_role_message = 'Duplicate role (' + str( delegated_role) + ').' raise securesystemslib.exceptions.RepositoryError( 'Duplicate role (' + str(delegated_role) + ').') else: logger.debug('Skipping delegated role: ' + repr(delegated_role)) return role_index
find_delegated_role
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(roles, delegated_role):\n securesystemslib.formats.ROLELIST_SCHEMA.check_match(roles)\n securesystemslib.formats.ROLENAME_SCHEMA.check_match(delegated_role)\n role_index = None\n for index in six.moves.xrange(len(roles)):\n role = roles[index]\n name = role.get('name')\n if name is None:\n no_name_message = 'Role with no name.'\n raise securesystemslib.exceptions.RepositoryError(no_name_message)\n elif name == delegated_role:\n if role_index is None:\n role_index = index\n else:\n duplicate_role_message = 'Duplicate role (' + str(\n delegated_role) + ').'\n raise securesystemslib.exceptions.RepositoryError(\n 'Duplicate role (' + str(delegated_role) + ').')\n else:\n logger.debug('Skipping delegated role: ' + repr(delegated_role))\n return role_index\n", "role": "user" }, { "content": "find_delegated_role", "role": "assistant" } ]
def x(rolename, list_of_targets, parent_delegations): securesystemslib.formats.ROLENAME_SCHEMA.check_match(rolename) securesystemslib.formats.RELPATHS_SCHEMA.check_match(list_of_targets) securesystemslib.formats.DELEGATIONS_SCHEMA.check_match(parent_delegations) if rolename == 'targets': return roles = parent_delegations['roles'] role_index = find_delegated_role(roles, rolename) if role_index is not None: role = roles[role_index] allowed_child_paths = role.get('paths') allowed_child_path_hash_prefixes = role.get('path_hash_prefixes') actual_child_targets = list_of_targets if allowed_child_path_hash_prefixes is not None: consistent = paths_are_consistent_with_hash_prefixes if not consistent(actual_child_targets, allowed_child_path_hash_prefixes): message = (repr(rolename) + ' specifies a target that does not' + ' have a path hash prefix listed in its parent role.') raise securesystemslib.exceptions.ForbiddenTargetError(message) elif allowed_child_paths is not None: for child_target in actual_child_targets: for allowed_child_path in allowed_child_paths: if fnmatch.fnmatch(child_target, allowed_child_path): break else: raise securesystemslib.exceptions.ForbiddenTargetError( 'Role ' + repr(rolename) + ' specifies target' + repr(child_target) + ',' + ' which is not an allowed path according to the delegations set by its parent role.' ) else: raise securesystemslib.exceptions.FormatError(repr(role) + ' did not contain one of the required fields ("paths" or "path_hash_prefixes").' ) else: raise securesystemslib.exceptions.RepositoryError( 'The parent role has not delegated to ' + repr(rolename) + '.')
ensure_all_targets_allowed
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(rolename, list_of_targets, parent_delegations):\n securesystemslib.formats.ROLENAME_SCHEMA.check_match(rolename)\n securesystemslib.formats.RELPATHS_SCHEMA.check_match(list_of_targets)\n securesystemslib.formats.DELEGATIONS_SCHEMA.check_match(parent_delegations)\n if rolename == 'targets':\n return\n roles = parent_delegations['roles']\n role_index = find_delegated_role(roles, rolename)\n if role_index is not None:\n role = roles[role_index]\n allowed_child_paths = role.get('paths')\n allowed_child_path_hash_prefixes = role.get('path_hash_prefixes')\n actual_child_targets = list_of_targets\n if allowed_child_path_hash_prefixes is not None:\n consistent = paths_are_consistent_with_hash_prefixes\n if not consistent(actual_child_targets,\n allowed_child_path_hash_prefixes):\n message = (repr(rolename) +\n ' specifies a target that does not' +\n ' have a path hash prefix listed in its parent role.')\n raise securesystemslib.exceptions.ForbiddenTargetError(message)\n elif allowed_child_paths is not None:\n for child_target in actual_child_targets:\n for allowed_child_path in allowed_child_paths:\n if fnmatch.fnmatch(child_target, allowed_child_path):\n break\n else:\n raise securesystemslib.exceptions.ForbiddenTargetError(\n 'Role ' + repr(rolename) + ' specifies target' +\n repr(child_target) + ',' +\n ' which is not an allowed path according to the delegations set by its parent role.'\n )\n else:\n raise securesystemslib.exceptions.FormatError(repr(role) +\n ' did not contain one of the required fields (\"paths\" or \"path_hash_prefixes\").'\n )\n else:\n raise securesystemslib.exceptions.RepositoryError(\n 'The parent role has not delegated to ' + repr(rolename) + '.')\n", "role": "user" }, { "content": "ensure_all_targets_allowed", "role": "assistant" } ]
def x(paths, path_hash_prefixes): securesystemslib.formats.RELPATHS_SCHEMA.check_match(paths) securesystemslib.formats.PATH_HASH_PREFIXES_SCHEMA.check_match( path_hash_prefixes) consistent = False for path in paths: path_hash = get_target_hash(path) consistent = False for path_hash_prefix in path_hash_prefixes: if path_hash.startswith(path_hash_prefix): consistent = True break if not consistent: break return consistent
paths_are_consistent_with_hash_prefixes
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(paths, path_hash_prefixes):\n securesystemslib.formats.RELPATHS_SCHEMA.check_match(paths)\n securesystemslib.formats.PATH_HASH_PREFIXES_SCHEMA.check_match(\n path_hash_prefixes)\n consistent = False\n for path in paths:\n path_hash = get_target_hash(path)\n consistent = False\n for path_hash_prefix in path_hash_prefixes:\n if path_hash.startswith(path_hash_prefix):\n consistent = True\n break\n if not consistent:\n break\n return consistent\n", "role": "user" }, { "content": "paths_are_consistent_with_hash_prefixes", "role": "assistant" } ]
def x(target_filepath): securesystemslib.formats.RELPATH_SCHEMA.check_match(target_filepath) digest_object = securesystemslib.hash.digest(HASH_FUNCTION) encoded_target_filepath = target_filepath.encode('utf-8') digest_object.update(encoded_target_filepath) target_filepath_hash = digest_object.hexdigest() return target_filepath_hash
get_target_hash
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(target_filepath):\n securesystemslib.formats.RELPATH_SCHEMA.check_match(target_filepath)\n digest_object = securesystemslib.hash.digest(HASH_FUNCTION)\n encoded_target_filepath = target_filepath.encode('utf-8')\n digest_object.update(encoded_target_filepath)\n target_filepath_hash = digest_object.hexdigest()\n return target_filepath_hash\n", "role": "user" }, { "content": "get_target_hash", "role": "assistant" } ]
def x(): global _json_module if _json_module is not None: return _json_module else: try: module = __import__('json') except ImportError: raise ImportError('Could not import the json module') else: _json_module = module return module
import_json
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x():\n global _json_module\n if _json_module is not None:\n return _json_module\n else:\n try:\n module = __import__('json')\n except ImportError:\n raise ImportError('Could not import the json module')\n else:\n _json_module = module\n return module\n", "role": "user" }, { "content": "import_json", "role": "assistant" } ]
def x(data): deserialized_object = None try: deserialized_object = json.loads(data) except TypeError: message = 'Invalid JSON string: ' + repr(data) raise securesystemslib.exceptions.Error(message) except ValueError: message = 'Cannot deserialize to a Python object: ' + repr(data) raise securesystemslib.exceptions.Error(message) else: return deserialized_object
load_json_string
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(data):\n deserialized_object = None\n try:\n deserialized_object = json.loads(data)\n except TypeError:\n message = 'Invalid JSON string: ' + repr(data)\n raise securesystemslib.exceptions.Error(message)\n except ValueError:\n message = 'Cannot deserialize to a Python object: ' + repr(data)\n raise securesystemslib.exceptions.Error(message)\n else:\n return deserialized_object\n", "role": "user" }, { "content": "load_json_string", "role": "assistant" } ]
def x(filepath): securesystemslib.formats.PATH_SCHEMA.check_match(filepath) deserialized_object = None if filepath.endswith('.gz'): logger.debug('gzip.open(' + str(filepath) + ')') fileobject = six.StringIO(gzip.open(filepath).read().decode('utf-8')) else: logger.debug('open(' + str(filepath) + ')') fileobject = open(filepath) try: deserialized_object = json.load(fileobject) except (ValueError, TypeError) as e: raise securesystemslib.exceptions.Error( 'Cannot deserialize to a Python object: ' + repr(filepath)) else: fileobject.close() return deserialized_object finally: fileobject.close()
load_json_file
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(filepath):\n securesystemslib.formats.PATH_SCHEMA.check_match(filepath)\n deserialized_object = None\n if filepath.endswith('.gz'):\n logger.debug('gzip.open(' + str(filepath) + ')')\n fileobject = six.StringIO(gzip.open(filepath).read().decode('utf-8'))\n else:\n logger.debug('open(' + str(filepath) + ')')\n fileobject = open(filepath)\n try:\n deserialized_object = json.load(fileobject)\n except (ValueError, TypeError) as e:\n raise securesystemslib.exceptions.Error(\n 'Cannot deserialize to a Python object: ' + repr(filepath))\n else:\n fileobject.close()\n return deserialized_object\n finally:\n fileobject.close()\n", "role": "user" }, { "content": "load_json_file", "role": "assistant" } ]
def x(digest1, digest2): securesystemslib.formats.HEX_SCHEMA.check_match(digest1) securesystemslib.formats.HEX_SCHEMA.check_match(digest2) if len(digest1) != len(digest2): return False are_equal = True for element in range(len(digest1)): if digest1[element] != digest2[element]: are_equal = False return are_equal
digests_are_equal
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(digest1, digest2):\n securesystemslib.formats.HEX_SCHEMA.check_match(digest1)\n securesystemslib.formats.HEX_SCHEMA.check_match(digest2)\n if len(digest1) != len(digest2):\n return False\n are_equal = True\n for element in range(len(digest1)):\n if digest1[element] != digest2[element]:\n are_equal = False\n return are_equal\n", "role": "user" }, { "content": "digests_are_equal", "role": "assistant" } ]
def x(self, prefix): try: self.temporary_file = tempfile.NamedTemporaryFile(prefix=prefix) except OSError as err: logger.critical('Cannot create a system temporary directory: ' + repr(err)) raise securesystemslib.exceptions.Error(err)
default_temporary_directory
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, prefix):\n try:\n self.temporary_file = tempfile.NamedTemporaryFile(prefix=prefix)\n except OSError as err:\n logger.critical('Cannot create a system temporary directory: ' +\n repr(err))\n raise securesystemslib.exceptions.Error(err)\n", "role": "user" }, { "content": "default_temporary_directory", "role": "assistant" } ]
def x(self, size=None): if size is None: self.temporary_file.seek(0) data = self.temporary_file.read() self.temporary_file.seek(0) return data else: if not (isinstance(size, int) and size > 0): raise securesystemslib.exceptions.FormatError return self.temporary_file.read(size)
read
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, size=None):\n if size is None:\n self.temporary_file.seek(0)\n data = self.temporary_file.read()\n self.temporary_file.seek(0)\n return data\n else:\n if not (isinstance(size, int) and size > 0):\n raise securesystemslib.exceptions.FormatError\n return self.temporary_file.read(size)\n", "role": "user" }, { "content": "read", "role": "assistant" } ]
def x(self, data, auto_flush=True): self.temporary_file.write(data) if auto_flush: self.flush()
write
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, data, auto_flush=True):\n self.temporary_file.write(data)\n if auto_flush:\n self.flush()\n", "role": "user" }, { "content": "write", "role": "assistant" } ]
def x(self, destination_path): self.flush() self.seek(0) destination_file = open(destination_path, 'wb') shutil.copyfileobj(self.temporary_file, destination_file) destination_file.flush() os.fsync(destination_file.fileno()) destination_file.close() self.close_temp_file()
move
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, destination_path):\n self.flush()\n self.seek(0)\n destination_file = open(destination_path, 'wb')\n shutil.copyfileobj(self.temporary_file, destination_file)\n destination_file.flush()\n os.fsync(destination_file.fileno())\n destination_file.close()\n self.close_temp_file()\n", "role": "user" }, { "content": "move", "role": "assistant" } ]
def x(self, compression): securesystemslib.formats.NAME_SCHEMA.check_match(compression) if self._orig_file is not None: raise securesystemslib.exceptions.Error( 'Can only set compression on a TempFile once.') if compression != 'gzip': raise securesystemslib.exceptions.Error( 'Only gzip compression is supported.') self.seek(0) self._compression = compression self._orig_file = self.temporary_file try: gzip_file_object = gzip.GzipFile(fileobj=self.temporary_file, mode='rb' ) uncompressed_content = gzip_file_object.read() self.temporary_file = tempfile.NamedTemporaryFile() self.temporary_file.write(uncompressed_content) self.flush() except Exception as exception: raise securesystemslib.exceptions.DecompressionError(exception)
decompress_temp_file_object
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, compression):\n securesystemslib.formats.NAME_SCHEMA.check_match(compression)\n if self._orig_file is not None:\n raise securesystemslib.exceptions.Error(\n 'Can only set compression on a TempFile once.')\n if compression != 'gzip':\n raise securesystemslib.exceptions.Error(\n 'Only gzip compression is supported.')\n self.seek(0)\n self._compression = compression\n self._orig_file = self.temporary_file\n try:\n gzip_file_object = gzip.GzipFile(fileobj=self.temporary_file, mode='rb'\n )\n uncompressed_content = gzip_file_object.read()\n self.temporary_file = tempfile.NamedTemporaryFile()\n self.temporary_file.write(uncompressed_content)\n self.flush()\n except Exception as exception:\n raise securesystemslib.exceptions.DecompressionError(exception)\n", "role": "user" }, { "content": "decompress_temp_file_object", "role": "assistant" } ]
def x(self): self.temporary_file.close() if self._orig_file is not None: self._orig_file.close()
close_temp_file
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n self.temporary_file.close()\n if self._orig_file is not None:\n self._orig_file.close()\n", "role": "user" }, { "content": "close_temp_file", "role": "assistant" } ]
def x(self, object): try: self.check_match(object) except securesystemslib.exceptions.FormatError: return False else: return True
matches
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, object):\n try:\n self.check_match(object)\n except securesystemslib.exceptions.FormatError:\n return False\n else:\n return True\n", "role": "user" }, { "content": "matches", "role": "assistant" } ]
def x(self, *etypes, timeout=None): self._validate_etypes(*etypes) start = time.time() e = self._eventq.get(timeout=timeout) if isinstance(e, Exception): raise e self._stats['events_recieved'] += 1 if etypes and e.type not in etypes: if timeout: timeout -= time.time() - start log.debug('ignoring filtered event: {}'.format(e.json)) self._stats['events_dropped'] += 1 return self.get_event(*etypes, timeout=timeout) return e
get_event
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, *etypes, timeout=None):\n self._validate_etypes(*etypes)\n start = time.time()\n e = self._eventq.get(timeout=timeout)\n if isinstance(e, Exception):\n raise e\n self._stats['events_recieved'] += 1\n if etypes and e.type not in etypes:\n if timeout:\n timeout -= time.time() - start\n log.debug('ignoring filtered event: {}'.format(e.json))\n self._stats['events_dropped'] += 1\n return self.get_event(*etypes, timeout=timeout)\n return e\n", "role": "user" }, { "content": "get_event", "role": "assistant" } ]
def x(self, *etypes, idle_timeout=None): while self._state != STATE_STOPPED: try: yield self.get_event(*etypes, timeout=idle_timeout) except Queue.Empty: log.info('idle timeout reached for events()') return
events
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, *etypes, idle_timeout=None):\n while self._state != STATE_STOPPED:\n try:\n yield self.get_event(*etypes, timeout=idle_timeout)\n except Queue.Empty:\n log.info('idle timeout reached for events()')\n return\n", "role": "user" }, { "content": "events", "role": "assistant" } ]
def x(self, text, channel, confirm=True): self._send_id += 1 msg = SlackMsg(self._send_id, channel.id, text) self.ws.send(msg.json) self._stats['messages_sent'] += 1 if confirm: for e in self.events(): if e.get('reply_to') == self._send_id: msg.sent = True msg.ts = e.ts return msg else: return msg
send_msg
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, text, channel, confirm=True):\n self._send_id += 1\n msg = SlackMsg(self._send_id, channel.id, text)\n self.ws.send(msg.json)\n self._stats['messages_sent'] += 1\n if confirm:\n for e in self.events():\n if e.get('reply_to') == self._send_id:\n msg.sent = True\n msg.ts = e.ts\n return msg\n else:\n return msg\n", "role": "user" }, { "content": "send_msg", "role": "assistant" } ]
def x(self, event): if event.get('user'): event.user = self.lookup_user(event.get('user')) if event.get('channel'): event.channel = self.lookup_channel(event.get('channel')) if self.user.id in event.mentions: event.mentions_me = True event.mentions = [self.lookup_user(uid) for uid in event.mentions] return event
process_event
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, event):\n if event.get('user'):\n event.user = self.lookup_user(event.get('user'))\n if event.get('channel'):\n event.channel = self.lookup_channel(event.get('channel'))\n if self.user.id in event.mentions:\n event.mentions_me = True\n event.mentions = [self.lookup_user(uid) for uid in event.mentions]\n return event\n", "role": "user" }, { "content": "process_event", "role": "assistant" } ]
def x(input, output=None, options={}): if 'input_format' not in options and 'output_format' not in options: raise ValueError('no input_format and output_format specified!') input_format = options.get('input_format', 'yaml') output_format = options.get('output_format', 'yaml') parser = Parser.get_concrete_class(input_format)(**options) writer = Writer.get_concrete_class(output_format)(**options) if not output and not writer.single_file_output: raise ValueError( "this output_format requires specifying 'output' argument") _output = output if not _output: _output = StringIO.StringIO() writer.write(parser.parse(input), _output) if not output: return _output.getvalue()
convert
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(input, output=None, options={}):\n if 'input_format' not in options and 'output_format' not in options:\n raise ValueError('no input_format and output_format specified!')\n input_format = options.get('input_format', 'yaml')\n output_format = options.get('output_format', 'yaml')\n parser = Parser.get_concrete_class(input_format)(**options)\n writer = Writer.get_concrete_class(output_format)(**options)\n if not output and not writer.single_file_output:\n raise ValueError(\n \"this output_format requires specifying 'output' argument\")\n _output = output\n if not _output:\n _output = StringIO.StringIO()\n writer.write(parser.parse(input), _output)\n if not output:\n return _output.getvalue()\n", "role": "user" }, { "content": "convert", "role": "assistant" } ]
def x(self, data_out, table): headers = [] data = [] qualifiers_marks = [] qualifiers = {} self._extract_independent_variables(table, headers, data, qualifiers_marks) for dependent_variable in table.dependent_variables: self._parse_dependent_variable(dependent_variable, headers, qualifiers, qualifiers_marks, data) self._write_metadata(data_out, table) self._write_csv_data(data_out, qualifiers, qualifiers_marks, headers, data)
write_packed_data
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, data_out, table):\n headers = []\n data = []\n qualifiers_marks = []\n qualifiers = {}\n self._extract_independent_variables(table, headers, data, qualifiers_marks)\n for dependent_variable in table.dependent_variables:\n self._parse_dependent_variable(dependent_variable, headers,\n qualifiers, qualifiers_marks, data)\n self._write_metadata(data_out, table)\n self._write_csv_data(data_out, qualifiers, qualifiers_marks, headers, data)\n", "role": "user" }, { "content": "write_packed_data", "role": "assistant" } ]
def x(algorithm=DEFAULT_HASH_ALGORITHM, hash_library=DEFAULT_HASH_LIBRARY): securesystemslib.formats.NAME_SCHEMA.check_match(algorithm) securesystemslib.formats.NAME_SCHEMA.check_match(hash_library) if hash_library == 'hashlib' and hash_library in SUPPORTED_LIBRARIES: try: return hashlib.new(algorithm) except ValueError: raise securesystemslib.exceptions.UnsupportedAlgorithmError( algorithm) elif hash_library == 'pyca_crypto' and hash_library in SUPPORTED_LIBRARIES: pass else: raise securesystemslib.exceptions.UnsupportedLibraryError( 'Unsupported library requested. Supported hash libraries: ' + repr(SUPPORTED_LIBRARIES))
digest
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(algorithm=DEFAULT_HASH_ALGORITHM, hash_library=DEFAULT_HASH_LIBRARY):\n securesystemslib.formats.NAME_SCHEMA.check_match(algorithm)\n securesystemslib.formats.NAME_SCHEMA.check_match(hash_library)\n if hash_library == 'hashlib' and hash_library in SUPPORTED_LIBRARIES:\n try:\n return hashlib.new(algorithm)\n except ValueError:\n raise securesystemslib.exceptions.UnsupportedAlgorithmError(\n algorithm)\n elif hash_library == 'pyca_crypto' and hash_library in SUPPORTED_LIBRARIES:\n pass\n else:\n raise securesystemslib.exceptions.UnsupportedLibraryError(\n 'Unsupported library requested. Supported hash libraries: ' +\n repr(SUPPORTED_LIBRARIES))\n", "role": "user" }, { "content": "digest", "role": "assistant" } ]
def x(file_object, algorithm=DEFAULT_HASH_ALGORITHM, hash_library= DEFAULT_HASH_LIBRARY, normalize_line_endings=False): securesystemslib.formats.NAME_SCHEMA.check_match(algorithm) securesystemslib.formats.NAME_SCHEMA.check_match(hash_library) digest_object = digest(algorithm, hash_library) file_object.seek(0) while True: data = file_object.read(DEFAULT_CHUNK_SIZE) if not data: break if normalize_line_endings: while data[-1:] == b'\r': c = file_object.read(1) if not c: break data += c data = data.replace(b'\r\n', b'\n').replace(b'\r', b'\n') if not isinstance(data, six.binary_type): digest_object.update(data.encode('utf-8')) else: digest_object.update(data) return digest_object
digest_fileobject
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(file_object, algorithm=DEFAULT_HASH_ALGORITHM, hash_library=\n DEFAULT_HASH_LIBRARY, normalize_line_endings=False):\n securesystemslib.formats.NAME_SCHEMA.check_match(algorithm)\n securesystemslib.formats.NAME_SCHEMA.check_match(hash_library)\n digest_object = digest(algorithm, hash_library)\n file_object.seek(0)\n while True:\n data = file_object.read(DEFAULT_CHUNK_SIZE)\n if not data:\n break\n if normalize_line_endings:\n while data[-1:] == b'\\r':\n c = file_object.read(1)\n if not c:\n break\n data += c\n data = data.replace(b'\\r\\n', b'\\n').replace(b'\\r', b'\\n')\n if not isinstance(data, six.binary_type):\n digest_object.update(data.encode('utf-8'))\n else:\n digest_object.update(data)\n return digest_object\n", "role": "user" }, { "content": "digest_fileobject", "role": "assistant" } ]
def x(filename, algorithm=DEFAULT_HASH_ALGORITHM, hash_library= DEFAULT_HASH_LIBRARY, normalize_line_endings=False): securesystemslib.formats.RELPATH_SCHEMA.check_match(filename) securesystemslib.formats.NAME_SCHEMA.check_match(algorithm) securesystemslib.formats.NAME_SCHEMA.check_match(hash_library) digest_object = None with open(filename, 'rb') as file_object: digest_object = digest_fileobject(file_object, algorithm, hash_library, normalize_line_endings) return digest_object
digest_filename
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(filename, algorithm=DEFAULT_HASH_ALGORITHM, hash_library=\n DEFAULT_HASH_LIBRARY, normalize_line_endings=False):\n securesystemslib.formats.RELPATH_SCHEMA.check_match(filename)\n securesystemslib.formats.NAME_SCHEMA.check_match(algorithm)\n securesystemslib.formats.NAME_SCHEMA.check_match(hash_library)\n digest_object = None\n with open(filename, 'rb') as file_object:\n digest_object = digest_fileobject(file_object, algorithm,\n hash_library, normalize_line_endings)\n return digest_object\n", "role": "user" }, { "content": "digest_filename", "role": "assistant" } ]
def x(source: str) ->CommonTokenStream: lexer = LuaLexer(InputStream(source)) stream = CommonTokenStream(lexer) return stream
get_token_stream
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(source: str) ->CommonTokenStream:\n lexer = LuaLexer(InputStream(source))\n stream = CommonTokenStream(lexer)\n return stream\n", "role": "user" }, { "content": "get_token_stream", "role": "assistant" } ]
def x(self, slug): endpoint = '/evolution-stone/' + slug return self.make_request(self.BASE_URL + endpoint)
get_evolution_stone
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, slug):\n endpoint = '/evolution-stone/' + slug\n return self.make_request(self.BASE_URL + endpoint)\n", "role": "user" }, { "content": "get_evolution_stone", "role": "assistant" } ]
def x(self, slug): endpoint = '/league/' + slug return self.make_request(self.BASE_URL + endpoint)
get_league
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, slug):\n endpoint = '/league/' + slug\n return self.make_request(self.BASE_URL + endpoint)\n", "role": "user" }, { "content": "get_league", "role": "assistant" } ]
def x(self, name): endpoint = '/pokemon/' + str(name) return self.make_request(self.BASE_URL + endpoint)
get_pokemon_by_name
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, name):\n endpoint = '/pokemon/' + str(name)\n return self.make_request(self.BASE_URL + endpoint)\n", "role": "user" }, { "content": "get_pokemon_by_name", "role": "assistant" } ]
def x(self, number): endpoint = '/pokemon/' + str(number) return self.make_request(self.BASE_URL + endpoint)
get_pokemon_by_number
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, number):\n endpoint = '/pokemon/' + str(number)\n return self.make_request(self.BASE_URL + endpoint)\n", "role": "user" }, { "content": "get_pokemon_by_number", "role": "assistant" } ]
def x(bits=_DEFAULT_RSA_KEY_BITS): securesystemslib.formats.RSAKEYBITS_SCHEMA.check_match(bits) private_key = rsa.generate_private_key(public_exponent=65537, key_size= bits, backend=default_backend()) private_pem = private_key.private_bytes(encoding=serialization.Encoding .PEM, format=serialization.PrivateFormat.TraditionalOpenSSL, encryption_algorithm=serialization.NoEncryption()) public_key = private_key.public_key() public_pem = public_key.public_bytes(encoding=serialization.Encoding. PEM, format=serialization.PublicFormat.SubjectPublicKeyInfo) return public_pem.decode('utf-8'), private_pem.decode('utf-8')
generate_rsa_public_and_private
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(bits=_DEFAULT_RSA_KEY_BITS):\n securesystemslib.formats.RSAKEYBITS_SCHEMA.check_match(bits)\n private_key = rsa.generate_private_key(public_exponent=65537, key_size=\n bits, backend=default_backend())\n private_pem = private_key.private_bytes(encoding=serialization.Encoding\n .PEM, format=serialization.PrivateFormat.TraditionalOpenSSL,\n encryption_algorithm=serialization.NoEncryption())\n public_key = private_key.public_key()\n public_pem = public_key.public_bytes(encoding=serialization.Encoding.\n PEM, format=serialization.PublicFormat.SubjectPublicKeyInfo)\n return public_pem.decode('utf-8'), private_pem.decode('utf-8')\n", "role": "user" }, { "content": "generate_rsa_public_and_private", "role": "assistant" } ]
def x(private_key, data, scheme='rsassa-pss-sha256'): securesystemslib.formats.PEMRSA_SCHEMA.check_match(private_key) securesystemslib.formats.DATA_SCHEMA.check_match(data) securesystemslib.formats.RSA_SCHEME_SCHEMA.check_match(scheme) signature = None if len(private_key): if scheme == 'rsassa-pss-sha256': try: private_key_object = load_pem_private_key(private_key. encode('utf-8'), password=None, backend=default_backend()) signature = private_key_object.sign(data, padding.PSS(mgf= padding.MGF1(hashes.SHA256()), salt_length=hashes. SHA256().digest_size), hashes.SHA256()) except ValueError: raise securesystemslib.exceptions.CryptoError( 'The private key (in PEM format) could not be deserialized.' ) except TypeError: raise securesystemslib.exceptions.CryptoError( 'The private key was unexpectedly encrypted.') except cryptography.exceptions.UnsupportedAlgorithm: raise securesystemslib.exceptions.CryptoError( 'The private key is encrypted with an unsupported algorithm.' ) else: raise securesystemslib.exceptions.UnsupportedAlgorithmError( 'Unsupported signature scheme is specified: ' + repr(scheme)) else: raise ValueError('The required private key is unset.') return signature, scheme
create_rsa_signature
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(private_key, data, scheme='rsassa-pss-sha256'):\n securesystemslib.formats.PEMRSA_SCHEMA.check_match(private_key)\n securesystemslib.formats.DATA_SCHEMA.check_match(data)\n securesystemslib.formats.RSA_SCHEME_SCHEMA.check_match(scheme)\n signature = None\n if len(private_key):\n if scheme == 'rsassa-pss-sha256':\n try:\n private_key_object = load_pem_private_key(private_key.\n encode('utf-8'), password=None, backend=default_backend())\n signature = private_key_object.sign(data, padding.PSS(mgf=\n padding.MGF1(hashes.SHA256()), salt_length=hashes.\n SHA256().digest_size), hashes.SHA256())\n except ValueError:\n raise securesystemslib.exceptions.CryptoError(\n 'The private key (in PEM format) could not be deserialized.'\n )\n except TypeError:\n raise securesystemslib.exceptions.CryptoError(\n 'The private key was unexpectedly encrypted.')\n except cryptography.exceptions.UnsupportedAlgorithm:\n raise securesystemslib.exceptions.CryptoError(\n 'The private key is encrypted with an unsupported algorithm.'\n )\n else:\n raise securesystemslib.exceptions.UnsupportedAlgorithmError(\n 'Unsupported signature scheme is specified: ' + repr(scheme))\n else:\n raise ValueError('The required private key is unset.')\n return signature, scheme\n", "role": "user" }, { "content": "create_rsa_signature", "role": "assistant" } ]
def x(signature, signature_scheme, public_key, data): securesystemslib.formats.PEMRSA_SCHEMA.check_match(public_key) securesystemslib.formats.RSA_SCHEME_SCHEMA.check_match(signature_scheme) securesystemslib.formats.PYCACRYPTOSIGNATURE_SCHEMA.check_match(signature) securesystemslib.formats.DATA_SCHEMA.check_match(data) valid_signature = False try: public_key_object = serialization.load_pem_public_key(public_key. encode('utf-8'), backend=default_backend()) try: public_key_object.verify(signature, data, padding.PSS(mgf= padding.MGF1(hashes.SHA256()), salt_length=hashes.SHA256(). digest_size), hashes.SHA256()) return True except cryptography.exceptions.InvalidSignature: return False except (ValueError, cryptography.exceptions.UnsupportedAlgorithm) as e: raise securesystemslib.exceptions.CryptoError( 'The PEM could not be decoded successfully, or contained an unsupported key type: ' + str(e))
verify_rsa_signature
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(signature, signature_scheme, public_key, data):\n securesystemslib.formats.PEMRSA_SCHEMA.check_match(public_key)\n securesystemslib.formats.RSA_SCHEME_SCHEMA.check_match(signature_scheme)\n securesystemslib.formats.PYCACRYPTOSIGNATURE_SCHEMA.check_match(signature)\n securesystemslib.formats.DATA_SCHEMA.check_match(data)\n valid_signature = False\n try:\n public_key_object = serialization.load_pem_public_key(public_key.\n encode('utf-8'), backend=default_backend())\n try:\n public_key_object.verify(signature, data, padding.PSS(mgf=\n padding.MGF1(hashes.SHA256()), salt_length=hashes.SHA256().\n digest_size), hashes.SHA256())\n return True\n except cryptography.exceptions.InvalidSignature:\n return False\n except (ValueError, cryptography.exceptions.UnsupportedAlgorithm) as e:\n raise securesystemslib.exceptions.CryptoError(\n 'The PEM could not be decoded successfully, or contained an unsupported key type: '\n + str(e))\n", "role": "user" }, { "content": "verify_rsa_signature", "role": "assistant" } ]
def x(private_key, passphrase): securesystemslib.formats.PEMRSA_SCHEMA.check_match(private_key) securesystemslib.formats.PASSWORD_SCHEMA.check_match(passphrase) if len(private_key): try: private_key = load_pem_private_key(private_key.encode('utf-8'), password=None, backend=default_backend()) except ValueError: raise securesystemslib.exceptions.CryptoError( 'The private key (in PEM format) could not be deserialized.') else: raise ValueError('The required private key is unset.') encrypted_pem = private_key.private_bytes(encoding=serialization. Encoding.PEM, format=serialization.PrivateFormat.TraditionalOpenSSL, encryption_algorithm=serialization.BestAvailableEncryption( passphrase.encode('utf-8'))) return encrypted_pem.decode()
create_rsa_encrypted_pem
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(private_key, passphrase):\n securesystemslib.formats.PEMRSA_SCHEMA.check_match(private_key)\n securesystemslib.formats.PASSWORD_SCHEMA.check_match(passphrase)\n if len(private_key):\n try:\n private_key = load_pem_private_key(private_key.encode('utf-8'),\n password=None, backend=default_backend())\n except ValueError:\n raise securesystemslib.exceptions.CryptoError(\n 'The private key (in PEM format) could not be deserialized.')\n else:\n raise ValueError('The required private key is unset.')\n encrypted_pem = private_key.private_bytes(encoding=serialization.\n Encoding.PEM, format=serialization.PrivateFormat.TraditionalOpenSSL,\n encryption_algorithm=serialization.BestAvailableEncryption(\n passphrase.encode('utf-8')))\n return encrypted_pem.decode()\n", "role": "user" }, { "content": "create_rsa_encrypted_pem", "role": "assistant" } ]
def x(pem, passphrase=None): securesystemslib.formats.PEMRSA_SCHEMA.check_match(pem) if passphrase is not None: securesystemslib.formats.PASSWORD_SCHEMA.check_match(passphrase) passphrase = passphrase.encode('utf-8') try: private_key = load_pem_private_key(pem.encode('utf-8'), passphrase, backend=default_backend()) except (ValueError, TypeError, cryptography.exceptions.UnsupportedAlgorithm ) as e: raise securesystemslib.exceptions.CryptoError( 'RSA (public, private) tuple cannot be generated from the encrypted PEM string: ' + str(e)) private_pem = private_key.private_bytes(encoding=serialization.Encoding .PEM, format=serialization.PrivateFormat.TraditionalOpenSSL, encryption_algorithm=serialization.NoEncryption()) public_key = private_key.public_key() public_pem = public_key.public_bytes(encoding=serialization.Encoding. PEM, format=serialization.PublicFormat.SubjectPublicKeyInfo) return public_pem.decode(), private_pem.decode()
create_rsa_public_and_private_from_pem
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(pem, passphrase=None):\n securesystemslib.formats.PEMRSA_SCHEMA.check_match(pem)\n if passphrase is not None:\n securesystemslib.formats.PASSWORD_SCHEMA.check_match(passphrase)\n passphrase = passphrase.encode('utf-8')\n try:\n private_key = load_pem_private_key(pem.encode('utf-8'), passphrase,\n backend=default_backend())\n except (ValueError, TypeError, cryptography.exceptions.UnsupportedAlgorithm\n ) as e:\n raise securesystemslib.exceptions.CryptoError(\n 'RSA (public, private) tuple cannot be generated from the encrypted PEM string: '\n + str(e))\n private_pem = private_key.private_bytes(encoding=serialization.Encoding\n .PEM, format=serialization.PrivateFormat.TraditionalOpenSSL,\n encryption_algorithm=serialization.NoEncryption())\n public_key = private_key.public_key()\n public_pem = public_key.public_bytes(encoding=serialization.Encoding.\n PEM, format=serialization.PublicFormat.SubjectPublicKeyInfo)\n return public_pem.decode(), private_pem.decode()\n", "role": "user" }, { "content": "create_rsa_public_and_private_from_pem", "role": "assistant" } ]
def x(key_object, password): securesystemslib.formats.ANYKEY_SCHEMA.check_match(key_object) securesystemslib.formats.PASSWORD_SCHEMA.check_match(password) if 'private' not in key_object['keyval'] or not key_object['keyval'][ 'private']: raise securesystemslib.exceptions.FormatError( 'Key object does not contain a private part.') salt, iterations, derived_key = _generate_derived_key(password) derived_key_information = {'salt': salt, 'iterations': iterations, 'derived_key': derived_key} encrypted_key = _encrypt(json.dumps(key_object), derived_key_information) return encrypted_key
encrypt_key
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(key_object, password):\n securesystemslib.formats.ANYKEY_SCHEMA.check_match(key_object)\n securesystemslib.formats.PASSWORD_SCHEMA.check_match(password)\n if 'private' not in key_object['keyval'] or not key_object['keyval'][\n 'private']:\n raise securesystemslib.exceptions.FormatError(\n 'Key object does not contain a private part.')\n salt, iterations, derived_key = _generate_derived_key(password)\n derived_key_information = {'salt': salt, 'iterations': iterations,\n 'derived_key': derived_key}\n encrypted_key = _encrypt(json.dumps(key_object), derived_key_information)\n return encrypted_key\n", "role": "user" }, { "content": "encrypt_key", "role": "assistant" } ]
def x(encrypted_key, password): securesystemslib.formats.ENCRYPTEDKEY_SCHEMA.check_match(encrypted_key) securesystemslib.formats.PASSWORD_SCHEMA.check_match(password) json_data = _decrypt(encrypted_key, password) key_object = securesystemslib.util.load_json_string(json_data.decode()) return key_object
decrypt_key
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(encrypted_key, password):\n securesystemslib.formats.ENCRYPTEDKEY_SCHEMA.check_match(encrypted_key)\n securesystemslib.formats.PASSWORD_SCHEMA.check_match(password)\n json_data = _decrypt(encrypted_key, password)\n key_object = securesystemslib.util.load_json_string(json_data.decode())\n return key_object\n", "role": "user" }, { "content": "decrypt_key", "role": "assistant" } ]
def x(password, salt=None, iterations=None): backend = default_backend() if salt is None: salt = os.urandom(_SALT_SIZE) if iterations is None: iterations = _PBKDF2_ITERATIONS pbkdf_object = PBKDF2HMAC(algorithm=hashes.SHA256(), length=32, salt= salt, iterations=iterations, backend=backend) derived_key = pbkdf_object.derive(password.encode('utf-8')) return salt, iterations, derived_key
generate_derived_key
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(password, salt=None, iterations=None):\n backend = default_backend()\n if salt is None:\n salt = os.urandom(_SALT_SIZE)\n if iterations is None:\n iterations = _PBKDF2_ITERATIONS\n pbkdf_object = PBKDF2HMAC(algorithm=hashes.SHA256(), length=32, salt=\n salt, iterations=iterations, backend=backend)\n derived_key = pbkdf_object.derive(password.encode('utf-8'))\n return salt, iterations, derived_key\n", "role": "user" }, { "content": "generate_derived_key", "role": "assistant" } ]
def x(key_data, derived_key_information): iv = os.urandom(16) symmetric_key = derived_key_information['derived_key'] encryptor = Cipher(algorithms.AES(symmetric_key), modes.CTR(iv), backend=default_backend()).encryptor() ciphertext = encryptor.update(key_data.encode('utf-8') ) + encryptor.finalize() symmetric_key = derived_key_information['derived_key'] salt = derived_key_information['salt'] hmac_object = cryptography.hazmat.primitives.hmac.HMAC(symmetric_key, hashes.SHA256(), backend=default_backend()) hmac_object.update(ciphertext) hmac_value = binascii.hexlify(hmac_object.finalize()) iterations = derived_key_information['iterations'] return binascii.hexlify(salt).decode() + _ENCRYPTION_DELIMITER + str( iterations) + _ENCRYPTION_DELIMITER + hmac_value.decode( ) + _ENCRYPTION_DELIMITER + binascii.hexlify(iv).decode( ) + _ENCRYPTION_DELIMITER + binascii.hexlify(ciphertext).decode()
encrypt
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(key_data, derived_key_information):\n iv = os.urandom(16)\n symmetric_key = derived_key_information['derived_key']\n encryptor = Cipher(algorithms.AES(symmetric_key), modes.CTR(iv),\n backend=default_backend()).encryptor()\n ciphertext = encryptor.update(key_data.encode('utf-8')\n ) + encryptor.finalize()\n symmetric_key = derived_key_information['derived_key']\n salt = derived_key_information['salt']\n hmac_object = cryptography.hazmat.primitives.hmac.HMAC(symmetric_key,\n hashes.SHA256(), backend=default_backend())\n hmac_object.update(ciphertext)\n hmac_value = binascii.hexlify(hmac_object.finalize())\n iterations = derived_key_information['iterations']\n return binascii.hexlify(salt).decode() + _ENCRYPTION_DELIMITER + str(\n iterations) + _ENCRYPTION_DELIMITER + hmac_value.decode(\n ) + _ENCRYPTION_DELIMITER + binascii.hexlify(iv).decode(\n ) + _ENCRYPTION_DELIMITER + binascii.hexlify(ciphertext).decode()\n", "role": "user" }, { "content": "encrypt", "role": "assistant" } ]
def x(file_contents, password): try: salt, iterations, hmac, iv, ciphertext = file_contents.split( _ENCRYPTION_DELIMITER) except ValueError: raise securesystemslib.exceptions.CryptoError('Invalid encrypted file.' ) salt = binascii.unhexlify(salt.encode('utf-8')) iterations = int(iterations) iv = binascii.unhexlify(iv.encode('utf-8')) ciphertext = binascii.unhexlify(ciphertext.encode('utf-8')) junk_old_salt, junk_old_iterations, symmetric_key = _generate_derived_key( password, salt, iterations) generated_hmac_object = cryptography.hazmat.primitives.hmac.HMAC( symmetric_key, hashes.SHA256(), backend=default_backend()) generated_hmac_object.update(ciphertext) generated_hmac = binascii.hexlify(generated_hmac_object.finalize()) if not securesystemslib.util.digests_are_equal(generated_hmac.decode(), hmac): raise securesystemslib.exceptions.CryptoError('Decryption failed.') decryptor = Cipher(algorithms.AES(symmetric_key), modes.CTR(iv), backend=default_backend()).decryptor() plaintext = decryptor.update(ciphertext) + decryptor.finalize() return plaintext
decrypt
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(file_contents, password):\n try:\n salt, iterations, hmac, iv, ciphertext = file_contents.split(\n _ENCRYPTION_DELIMITER)\n except ValueError:\n raise securesystemslib.exceptions.CryptoError('Invalid encrypted file.'\n )\n salt = binascii.unhexlify(salt.encode('utf-8'))\n iterations = int(iterations)\n iv = binascii.unhexlify(iv.encode('utf-8'))\n ciphertext = binascii.unhexlify(ciphertext.encode('utf-8'))\n junk_old_salt, junk_old_iterations, symmetric_key = _generate_derived_key(\n password, salt, iterations)\n generated_hmac_object = cryptography.hazmat.primitives.hmac.HMAC(\n symmetric_key, hashes.SHA256(), backend=default_backend())\n generated_hmac_object.update(ciphertext)\n generated_hmac = binascii.hexlify(generated_hmac_object.finalize())\n if not securesystemslib.util.digests_are_equal(generated_hmac.decode(),\n hmac):\n raise securesystemslib.exceptions.CryptoError('Decryption failed.')\n decryptor = Cipher(algorithms.AES(symmetric_key), modes.CTR(iv),\n backend=default_backend()).decryptor()\n plaintext = decryptor.update(ciphertext) + decryptor.finalize()\n return plaintext\n", "role": "user" }, { "content": "decrypt", "role": "assistant" } ]
def x(home_dir, site_packages=True, clear=False, unzip_setuptools=False, use_distribute=False): home_dir, lib_dir, inc_dir, bin_dir = path_locations(home_dir) py_executable = os.path.abspath(install_python(home_dir, lib_dir, inc_dir, bin_dir, site_packages=site_packages, clear=clear)) install_distutils(lib_dir, home_dir) if use_distribute or os.environ.get('VIRTUALENV_USE_DISTRIBUTE'): install_distribute(py_executable, unzip=unzip_setuptools) else: install_setuptools(py_executable, unzip=unzip_setuptools) install_pip(py_executable) install_activate(home_dir, bin_dir)
create_environment
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(home_dir, site_packages=True, clear=False, unzip_setuptools=False,\n use_distribute=False):\n home_dir, lib_dir, inc_dir, bin_dir = path_locations(home_dir)\n py_executable = os.path.abspath(install_python(home_dir, lib_dir,\n inc_dir, bin_dir, site_packages=site_packages, clear=clear))\n install_distutils(lib_dir, home_dir)\n if use_distribute or os.environ.get('VIRTUALENV_USE_DISTRIBUTE'):\n install_distribute(py_executable, unzip=unzip_setuptools)\n else:\n install_setuptools(py_executable, unzip=unzip_setuptools)\n install_pip(py_executable)\n install_activate(home_dir, bin_dir)\n", "role": "user" }, { "content": "create_environment", "role": "assistant" } ]
def x(lib_dir): if [p for p in distutils.sysconfig.get_config_vars().values() if isinstance(p, basestring) and 'lib64' in p]: logger.debug('This system uses lib64; symlinking lib64 to lib') assert os.path.basename(lib_dir) == 'python%s' % sys.version[:3 ], 'Unexpected python lib dir: %r' % lib_dir lib_parent = os.path.dirname(lib_dir) assert os.path.basename(lib_parent ) == 'lib', 'Unexpected parent dir: %r' % lib_parent copyfile(lib_parent, os.path.join(os.path.dirname(lib_parent), 'lib64') )
fix_lib64
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(lib_dir):\n if [p for p in distutils.sysconfig.get_config_vars().values() if \n isinstance(p, basestring) and 'lib64' in p]:\n logger.debug('This system uses lib64; symlinking lib64 to lib')\n assert os.path.basename(lib_dir) == 'python%s' % sys.version[:3\n ], 'Unexpected python lib dir: %r' % lib_dir\n lib_parent = os.path.dirname(lib_dir)\n assert os.path.basename(lib_parent\n ) == 'lib', 'Unexpected parent dir: %r' % lib_parent\n copyfile(lib_parent, os.path.join(os.path.dirname(lib_parent), 'lib64')\n )\n", "role": "user" }, { "content": "fix_lib64", "role": "assistant" } ]
def x(exe): if os.path.abspath(exe) != exe: paths = os.environ.get('PATH', '').split(os.pathsep) for path in paths: if os.path.exists(os.path.join(path, exe)): exe = os.path.join(path, exe) break if not os.path.exists(exe): logger.fatal('The executable %s (from --python=%s) does not exist' % (exe, exe)) sys.exit(3) return exe
resolve_interpreter
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(exe):\n if os.path.abspath(exe) != exe:\n paths = os.environ.get('PATH', '').split(os.pathsep)\n for path in paths:\n if os.path.exists(os.path.join(path, exe)):\n exe = os.path.join(path, exe)\n break\n if not os.path.exists(exe):\n logger.fatal('The executable %s (from --python=%s) does not exist' %\n (exe, exe))\n sys.exit(3)\n return exe\n", "role": "user" }, { "content": "resolve_interpreter", "role": "assistant" } ]
def x(home_dir): activate_this = os.path.join(home_dir, 'bin', 'activate_this.py') if not os.path.exists(activate_this): logger.fatal( "The environment doesn't have a file %s -- please re-run virtualenv on this environment to update it" % activate_this) fixup_scripts(home_dir) fixup_pth_and_egg_link(home_dir)
make_environment_relocatable
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(home_dir):\n activate_this = os.path.join(home_dir, 'bin', 'activate_this.py')\n if not os.path.exists(activate_this):\n logger.fatal(\n \"The environment doesn't have a file %s -- please re-run virtualenv on this environment to update it\"\n % activate_this)\n fixup_scripts(home_dir)\n fixup_pth_and_egg_link(home_dir)\n", "role": "user" }, { "content": "make_environment_relocatable", "role": "assistant" } ]
def x(bits=_DEFAULT_RSA_KEY_BITS, scheme='rsassa-pss-sha256'): securesystemslib.formats.RSAKEYBITS_SCHEMA.check_match(bits) securesystemslib.formats.RSA_SCHEME_SCHEMA.check_match(scheme) rsakey_dict = {} keytype = 'rsa' public = None private = None public, private = (securesystemslib.pyca_crypto_keys. generate_rsa_public_and_private(bits)) public = extract_pem(public, private_pem=False) private = extract_pem(private, private_pem=True) key_value = {'public': public.replace('\r\n', '\n'), 'private': ''} keyid = _get_keyid(keytype, scheme, key_value) key_value['private'] = private rsakey_dict['keytype'] = keytype rsakey_dict['scheme'] = scheme rsakey_dict['keyid'] = keyid rsakey_dict['keyid_hash_algorithms' ] = securesystemslib.settings.HASH_ALGORITHMS rsakey_dict['keyval'] = key_value return rsakey_dict
generate_rsa_key
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(bits=_DEFAULT_RSA_KEY_BITS, scheme='rsassa-pss-sha256'):\n securesystemslib.formats.RSAKEYBITS_SCHEMA.check_match(bits)\n securesystemslib.formats.RSA_SCHEME_SCHEMA.check_match(scheme)\n rsakey_dict = {}\n keytype = 'rsa'\n public = None\n private = None\n public, private = (securesystemslib.pyca_crypto_keys.\n generate_rsa_public_and_private(bits))\n public = extract_pem(public, private_pem=False)\n private = extract_pem(private, private_pem=True)\n key_value = {'public': public.replace('\\r\\n', '\\n'), 'private': ''}\n keyid = _get_keyid(keytype, scheme, key_value)\n key_value['private'] = private\n rsakey_dict['keytype'] = keytype\n rsakey_dict['scheme'] = scheme\n rsakey_dict['keyid'] = keyid\n rsakey_dict['keyid_hash_algorithms'\n ] = securesystemslib.settings.HASH_ALGORITHMS\n rsakey_dict['keyval'] = key_value\n return rsakey_dict\n", "role": "user" }, { "content": "generate_rsa_key", "role": "assistant" } ]
def x(scheme='ecdsa-sha2-nistp256'): securesystemslib.formats.ECDSA_SCHEME_SCHEMA.check_match(scheme) ecdsa_key = {} keytype = 'ecdsa-sha2-nistp256' public = None private = None public, private = securesystemslib.ecdsa_keys.generate_public_and_private( scheme) key_value = {'public': public.replace('\r\n', '\n'), 'private': ''} keyid = _get_keyid(keytype, scheme, key_value) key_value['private'] = private ecdsa_key['keytype'] = keytype ecdsa_key['scheme'] = scheme ecdsa_key['keyid'] = keyid ecdsa_key['keyval'] = key_value ecdsa_key['keyid_hash_algorithms' ] = securesystemslib.settings.HASH_ALGORITHMS return ecdsa_key
generate_ecdsa_key
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(scheme='ecdsa-sha2-nistp256'):\n securesystemslib.formats.ECDSA_SCHEME_SCHEMA.check_match(scheme)\n ecdsa_key = {}\n keytype = 'ecdsa-sha2-nistp256'\n public = None\n private = None\n public, private = securesystemslib.ecdsa_keys.generate_public_and_private(\n scheme)\n key_value = {'public': public.replace('\\r\\n', '\\n'), 'private': ''}\n keyid = _get_keyid(keytype, scheme, key_value)\n key_value['private'] = private\n ecdsa_key['keytype'] = keytype\n ecdsa_key['scheme'] = scheme\n ecdsa_key['keyid'] = keyid\n ecdsa_key['keyval'] = key_value\n ecdsa_key['keyid_hash_algorithms'\n ] = securesystemslib.settings.HASH_ALGORITHMS\n return ecdsa_key\n", "role": "user" }, { "content": "generate_ecdsa_key", "role": "assistant" } ]
def x(scheme='ed25519'): securesystemslib.formats.ED25519_SIG_SCHEMA.check_match(scheme) ed25519_key = {} keytype = 'ed25519' public = None private = None public, private = (securesystemslib.ed25519_keys. generate_public_and_private()) key_value = {'public': binascii.hexlify(public).decode(), 'private': ''} keyid = _get_keyid(keytype, scheme, key_value) key_value['private'] = binascii.hexlify(private).decode() ed25519_key['keytype'] = keytype ed25519_key['scheme'] = scheme ed25519_key['keyid'] = keyid ed25519_key['keyid_hash_algorithms' ] = securesystemslib.settings.HASH_ALGORITHMS ed25519_key['keyval'] = key_value return ed25519_key
generate_ed25519_key
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(scheme='ed25519'):\n securesystemslib.formats.ED25519_SIG_SCHEMA.check_match(scheme)\n ed25519_key = {}\n keytype = 'ed25519'\n public = None\n private = None\n public, private = (securesystemslib.ed25519_keys.\n generate_public_and_private())\n key_value = {'public': binascii.hexlify(public).decode(), 'private': ''}\n keyid = _get_keyid(keytype, scheme, key_value)\n key_value['private'] = binascii.hexlify(private).decode()\n ed25519_key['keytype'] = keytype\n ed25519_key['scheme'] = scheme\n ed25519_key['keyid'] = keyid\n ed25519_key['keyid_hash_algorithms'\n ] = securesystemslib.settings.HASH_ALGORITHMS\n ed25519_key['keyval'] = key_value\n return ed25519_key\n", "role": "user" }, { "content": "generate_ed25519_key", "role": "assistant" } ]
def x(keytype, scheme, key_value, private=False): securesystemslib.formats.KEYTYPE_SCHEMA.check_match(keytype) securesystemslib.formats.SCHEME_SCHEMA.check_match(scheme) securesystemslib.formats.KEYVAL_SCHEMA.check_match(key_value) if private is True: if 'private' not in key_value: raise securesystemslib.exceptions.FormatError( 'The required private key is missing from: ' + repr(key_value)) else: return {'keytype': keytype, 'scheme': scheme, 'keyval': key_value} else: public_key_value = {'public': key_value['public']} return {'keytype': keytype, 'scheme': scheme, 'keyid_hash_algorithms': securesystemslib.settings. HASH_ALGORITHMS, 'keyval': public_key_value}
format_keyval_to_metadata
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(keytype, scheme, key_value, private=False):\n securesystemslib.formats.KEYTYPE_SCHEMA.check_match(keytype)\n securesystemslib.formats.SCHEME_SCHEMA.check_match(scheme)\n securesystemslib.formats.KEYVAL_SCHEMA.check_match(key_value)\n if private is True:\n if 'private' not in key_value:\n raise securesystemslib.exceptions.FormatError(\n 'The required private key is missing from: ' + repr(key_value))\n else:\n return {'keytype': keytype, 'scheme': scheme, 'keyval': key_value}\n else:\n public_key_value = {'public': key_value['public']}\n return {'keytype': keytype, 'scheme': scheme,\n 'keyid_hash_algorithms': securesystemslib.settings.\n HASH_ALGORITHMS, 'keyval': public_key_value}\n", "role": "user" }, { "content": "format_keyval_to_metadata", "role": "assistant" } ]
def x(key_metadata): securesystemslib.formats.KEY_SCHEMA.check_match(key_metadata) key_dict = {} keytype = key_metadata['keytype'] scheme = key_metadata['scheme'] key_value = key_metadata['keyval'] default_keyid = _get_keyid(keytype, scheme, key_value) keyids = set() keyids.add(default_keyid) for hash_algorithm in securesystemslib.settings.HASH_ALGORITHMS: keyid = _get_keyid(keytype, scheme, key_value, hash_algorithm) keyids.add(keyid) key_dict['keytype'] = keytype key_dict['scheme'] = scheme key_dict['keyid'] = default_keyid key_dict['keyid_hash_algorithms' ] = securesystemslib.settings.HASH_ALGORITHMS key_dict['keyval'] = key_value return key_dict, keyids
format_metadata_to_key
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(key_metadata):\n securesystemslib.formats.KEY_SCHEMA.check_match(key_metadata)\n key_dict = {}\n keytype = key_metadata['keytype']\n scheme = key_metadata['scheme']\n key_value = key_metadata['keyval']\n default_keyid = _get_keyid(keytype, scheme, key_value)\n keyids = set()\n keyids.add(default_keyid)\n for hash_algorithm in securesystemslib.settings.HASH_ALGORITHMS:\n keyid = _get_keyid(keytype, scheme, key_value, hash_algorithm)\n keyids.add(keyid)\n key_dict['keytype'] = keytype\n key_dict['scheme'] = scheme\n key_dict['keyid'] = default_keyid\n key_dict['keyid_hash_algorithms'\n ] = securesystemslib.settings.HASH_ALGORITHMS\n key_dict['keyval'] = key_value\n return key_dict, keyids\n", "role": "user" }, { "content": "format_metadata_to_key", "role": "assistant" } ]
def x(keytype, scheme, key_value, hash_algorithm='sha256'): key_meta = format_keyval_to_metadata(keytype, scheme, key_value, private=False) key_update_data = securesystemslib.formats.encode_canonical(key_meta) digest_object = securesystemslib.hash.digest(hash_algorithm) digest_object.update(key_update_data.encode('utf-8')) keyid = digest_object.hexdigest() return keyid
get_keyid
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(keytype, scheme, key_value, hash_algorithm='sha256'):\n key_meta = format_keyval_to_metadata(keytype, scheme, key_value,\n private=False)\n key_update_data = securesystemslib.formats.encode_canonical(key_meta)\n digest_object = securesystemslib.hash.digest(hash_algorithm)\n digest_object.update(key_update_data.encode('utf-8'))\n keyid = digest_object.hexdigest()\n return keyid\n", "role": "user" }, { "content": "get_keyid", "role": "assistant" } ]
def x(key_dict, data): securesystemslib.formats.ANYKEY_SCHEMA.check_match(key_dict) signature = {} keytype = key_dict['keytype'] scheme = key_dict['scheme'] public = key_dict['keyval']['public'] private = key_dict['keyval']['private'] keyid = key_dict['keyid'] sig = None if keytype == 'rsa': if scheme == 'rsassa-pss-sha256': private = private.replace('\r\n', '\n') sig, scheme = (securesystemslib.pyca_crypto_keys. create_rsa_signature(private, data, scheme)) else: raise securesystemslib.exceptions.UnsupportedAlgorithmError( 'Unsupported RSA signature scheme specified: ' + repr(scheme)) elif keytype == 'ed25519': public = binascii.unhexlify(public.encode('utf-8')) private = binascii.unhexlify(private.encode('utf-8')) sig, scheme = securesystemslib.ed25519_keys.create_signature(public, private, data, scheme) elif keytype == 'ecdsa-sha2-nistp256': sig, scheme = securesystemslib.ecdsa_keys.create_signature(public, private, data, scheme) else: raise TypeError('Invalid key type.') signature['keyid'] = keyid signature['sig'] = binascii.hexlify(sig).decode() return signature
create_signature
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(key_dict, data):\n securesystemslib.formats.ANYKEY_SCHEMA.check_match(key_dict)\n signature = {}\n keytype = key_dict['keytype']\n scheme = key_dict['scheme']\n public = key_dict['keyval']['public']\n private = key_dict['keyval']['private']\n keyid = key_dict['keyid']\n sig = None\n if keytype == 'rsa':\n if scheme == 'rsassa-pss-sha256':\n private = private.replace('\\r\\n', '\\n')\n sig, scheme = (securesystemslib.pyca_crypto_keys.\n create_rsa_signature(private, data, scheme))\n else:\n raise securesystemslib.exceptions.UnsupportedAlgorithmError(\n 'Unsupported RSA signature scheme specified: ' + repr(scheme))\n elif keytype == 'ed25519':\n public = binascii.unhexlify(public.encode('utf-8'))\n private = binascii.unhexlify(private.encode('utf-8'))\n sig, scheme = securesystemslib.ed25519_keys.create_signature(public,\n private, data, scheme)\n elif keytype == 'ecdsa-sha2-nistp256':\n sig, scheme = securesystemslib.ecdsa_keys.create_signature(public,\n private, data, scheme)\n else:\n raise TypeError('Invalid key type.')\n signature['keyid'] = keyid\n signature['sig'] = binascii.hexlify(sig).decode()\n return signature\n", "role": "user" }, { "content": "create_signature", "role": "assistant" } ]
def x(key_dict, signature, data): securesystemslib.formats.ANYKEY_SCHEMA.check_match(key_dict) securesystemslib.formats.SIGNATURE_SCHEMA.check_match(signature) if key_dict['keyid'] != signature['keyid']: raise securesystemslib.exceptions.CryptoError('The KEYID ( ' + repr (key_dict['keyid']) + ' ) in the given key does not match the KEYID ( ' + repr( signature['keyid']) + ' ) in the signature.') else: logger.debug('The KEYIDs of key_dict and the signature match.') sig = signature['sig'] sig = binascii.unhexlify(sig.encode('utf-8')) public = key_dict['keyval']['public'] keytype = key_dict['keytype'] scheme = key_dict['scheme'] valid_signature = False if keytype == 'rsa': if scheme == 'rsassa-pss-sha256': valid_signature = (securesystemslib.pyca_crypto_keys. verify_rsa_signature(sig, scheme, public, data)) else: raise securesystemslib.exceptions.UnsupportedAlgorithmError( 'Unsupported signature scheme is specified: ' + repr(scheme)) elif keytype == 'ed25519': if scheme == 'ed25519': public = binascii.unhexlify(public.encode('utf-8')) valid_signature = securesystemslib.ed25519_keys.verify_signature( public, scheme, sig, data, use_pynacl=USE_PYNACL) else: raise securesystemslib.exceptions.UnsupportedAlgorithmError( 'Unsupported signature scheme is specified: ' + repr(scheme)) elif keytype == 'ecdsa-sha2-nistp256': if scheme == 'ecdsa-sha2-nistp256': valid_signature = securesystemslib.ecdsa_keys.verify_signature( public, scheme, sig, data) else: raise securesystemslib.exceptions.UnsupportedAlgorithmError( 'Unsupported signature scheme is specified: ' + repr(scheme)) else: raise TypeError('Unsupported key type.') return valid_signature
verify_signature
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(key_dict, signature, data):\n securesystemslib.formats.ANYKEY_SCHEMA.check_match(key_dict)\n securesystemslib.formats.SIGNATURE_SCHEMA.check_match(signature)\n if key_dict['keyid'] != signature['keyid']:\n raise securesystemslib.exceptions.CryptoError('The KEYID ( ' + repr\n (key_dict['keyid']) +\n ' ) in the given key does not match the KEYID ( ' + repr(\n signature['keyid']) + ' ) in the signature.')\n else:\n logger.debug('The KEYIDs of key_dict and the signature match.')\n sig = signature['sig']\n sig = binascii.unhexlify(sig.encode('utf-8'))\n public = key_dict['keyval']['public']\n keytype = key_dict['keytype']\n scheme = key_dict['scheme']\n valid_signature = False\n if keytype == 'rsa':\n if scheme == 'rsassa-pss-sha256':\n valid_signature = (securesystemslib.pyca_crypto_keys.\n verify_rsa_signature(sig, scheme, public, data))\n else:\n raise securesystemslib.exceptions.UnsupportedAlgorithmError(\n 'Unsupported signature scheme is specified: ' + repr(scheme))\n elif keytype == 'ed25519':\n if scheme == 'ed25519':\n public = binascii.unhexlify(public.encode('utf-8'))\n valid_signature = securesystemslib.ed25519_keys.verify_signature(\n public, scheme, sig, data, use_pynacl=USE_PYNACL)\n else:\n raise securesystemslib.exceptions.UnsupportedAlgorithmError(\n 'Unsupported signature scheme is specified: ' + repr(scheme))\n elif keytype == 'ecdsa-sha2-nistp256':\n if scheme == 'ecdsa-sha2-nistp256':\n valid_signature = securesystemslib.ecdsa_keys.verify_signature(\n public, scheme, sig, data)\n else:\n raise securesystemslib.exceptions.UnsupportedAlgorithmError(\n 'Unsupported signature scheme is specified: ' + repr(scheme))\n else:\n raise TypeError('Unsupported key type.')\n return valid_signature\n", "role": "user" }, { "content": "verify_signature", "role": "assistant" } ]
def x(pem, scheme='rsassa-pss-sha256', password=None): securesystemslib.formats.PEMRSA_SCHEMA.check_match(pem) securesystemslib.formats.RSA_SCHEME_SCHEMA.check_match(scheme) if password is not None: securesystemslib.formats.PASSWORD_SCHEMA.check_match(password) else: logger.debug( 'The password/passphrase is unset. The PEM is expected to be unencrypted.' ) rsakey_dict = {} keytype = 'rsa' public = None private = None public, private = (securesystemslib.pyca_crypto_keys. create_rsa_public_and_private_from_pem(pem, password)) public = extract_pem(public, private_pem=False) private = extract_pem(private, private_pem=True) key_value = {'public': public.replace('\r\n', '\n'), 'private': ''} keyid = _get_keyid(keytype, scheme, key_value) key_value['private'] = private rsakey_dict['keytype'] = keytype rsakey_dict['scheme'] = scheme rsakey_dict['keyid'] = keyid rsakey_dict['keyval'] = key_value return rsakey_dict
import_rsakey_from_private_pem
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(pem, scheme='rsassa-pss-sha256', password=None):\n securesystemslib.formats.PEMRSA_SCHEMA.check_match(pem)\n securesystemslib.formats.RSA_SCHEME_SCHEMA.check_match(scheme)\n if password is not None:\n securesystemslib.formats.PASSWORD_SCHEMA.check_match(password)\n else:\n logger.debug(\n 'The password/passphrase is unset. The PEM is expected to be unencrypted.'\n )\n rsakey_dict = {}\n keytype = 'rsa'\n public = None\n private = None\n public, private = (securesystemslib.pyca_crypto_keys.\n create_rsa_public_and_private_from_pem(pem, password))\n public = extract_pem(public, private_pem=False)\n private = extract_pem(private, private_pem=True)\n key_value = {'public': public.replace('\\r\\n', '\\n'), 'private': ''}\n keyid = _get_keyid(keytype, scheme, key_value)\n key_value['private'] = private\n rsakey_dict['keytype'] = keytype\n rsakey_dict['scheme'] = scheme\n rsakey_dict['keyid'] = keyid\n rsakey_dict['keyval'] = key_value\n return rsakey_dict\n", "role": "user" }, { "content": "import_rsakey_from_private_pem", "role": "assistant" } ]
def x(pem, scheme='rsassa-pss-sha256'): securesystemslib.formats.PEMRSA_SCHEMA.check_match(pem) securesystemslib.formats.RSA_SCHEME_SCHEMA.check_match(scheme) if is_pem_public(pem): public_pem = extract_pem(pem, private_pem=False) else: raise securesystemslib.exceptions.FormatError( 'Invalid public pem: ' + repr(pem)) rsakey_dict = {} keytype = 'rsa' key_value = {'public': public_pem.replace('\r\n', '\n'), 'private': ''} keyid = _get_keyid(keytype, scheme, key_value) rsakey_dict['keytype'] = keytype rsakey_dict['scheme'] = scheme rsakey_dict['keyid'] = keyid rsakey_dict['keyval'] = key_value rsakey_dict['keyid_hash_algorithms' ] = securesystemslib.settings.HASH_ALGORITHMS return rsakey_dict
import_rsakey_from_public_pem
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(pem, scheme='rsassa-pss-sha256'):\n securesystemslib.formats.PEMRSA_SCHEMA.check_match(pem)\n securesystemslib.formats.RSA_SCHEME_SCHEMA.check_match(scheme)\n if is_pem_public(pem):\n public_pem = extract_pem(pem, private_pem=False)\n else:\n raise securesystemslib.exceptions.FormatError(\n 'Invalid public pem: ' + repr(pem))\n rsakey_dict = {}\n keytype = 'rsa'\n key_value = {'public': public_pem.replace('\\r\\n', '\\n'), 'private': ''}\n keyid = _get_keyid(keytype, scheme, key_value)\n rsakey_dict['keytype'] = keytype\n rsakey_dict['scheme'] = scheme\n rsakey_dict['keyid'] = keyid\n rsakey_dict['keyval'] = key_value\n rsakey_dict['keyid_hash_algorithms'\n ] = securesystemslib.settings.HASH_ALGORITHMS\n return rsakey_dict\n", "role": "user" }, { "content": "import_rsakey_from_public_pem", "role": "assistant" } ]
def x(pem, private_pem=False): if private_pem: pem_header = '-----BEGIN RSA PRIVATE KEY-----' pem_footer = '-----END RSA PRIVATE KEY-----' else: pem_header = '-----BEGIN PUBLIC KEY-----' pem_footer = '-----END PUBLIC KEY-----' header_start = 0 footer_start = 0 try: header_start = pem.index(pem_header) except ValueError: if not private_pem: raise securesystemslib.exceptions.FormatError( 'Required PEM header ' + repr(pem_header) + """ not found in PEM string: """ + repr(pem)) else: raise securesystemslib.exceptions.FormatError( 'Required PEM header ' + repr(pem_header) + """ not found in private PEM string.""") try: footer_start = pem.index(pem_footer, header_start + len(pem_header)) except ValueError: if not private_pem: raise securesystemslib.exceptions.FormatError( 'Required PEM footer ' + repr(pem_footer) + """ not found in PEM string """ + repr(pem)) else: raise securesystemslib.exceptions.FormatError( 'Required PEM footer ' + repr(pem_footer) + """ not found in private PEM string.""") pem = pem[header_start:footer_start + len(pem_footer)] return pem
extract_pem
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(pem, private_pem=False):\n if private_pem:\n pem_header = '-----BEGIN RSA PRIVATE KEY-----'\n pem_footer = '-----END RSA PRIVATE KEY-----'\n else:\n pem_header = '-----BEGIN PUBLIC KEY-----'\n pem_footer = '-----END PUBLIC KEY-----'\n header_start = 0\n footer_start = 0\n try:\n header_start = pem.index(pem_header)\n except ValueError:\n if not private_pem:\n raise securesystemslib.exceptions.FormatError(\n 'Required PEM header ' + repr(pem_header) +\n \"\"\"\n not found in PEM string: \"\"\" + repr(pem))\n else:\n raise securesystemslib.exceptions.FormatError(\n 'Required PEM header ' + repr(pem_header) +\n \"\"\"\n not found in private PEM string.\"\"\")\n try:\n footer_start = pem.index(pem_footer, header_start + len(pem_header))\n except ValueError:\n if not private_pem:\n raise securesystemslib.exceptions.FormatError(\n 'Required PEM footer ' + repr(pem_footer) +\n \"\"\"\n not found in PEM string \"\"\" + repr(pem))\n else:\n raise securesystemslib.exceptions.FormatError(\n 'Required PEM footer ' + repr(pem_footer) +\n \"\"\"\n not found in private PEM string.\"\"\")\n pem = pem[header_start:footer_start + len(pem_footer)]\n return pem\n", "role": "user" }, { "content": "extract_pem", "role": "assistant" } ]
def x(key_object, password): securesystemslib.formats.ANYKEY_SCHEMA.check_match(key_object) securesystemslib.formats.PASSWORD_SCHEMA.check_match(password) encrypted_key = None encrypted_key = securesystemslib.pyca_crypto_keys.encrypt_key(key_object, password) return encrypted_key
encrypt_key
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(key_object, password):\n securesystemslib.formats.ANYKEY_SCHEMA.check_match(key_object)\n securesystemslib.formats.PASSWORD_SCHEMA.check_match(password)\n encrypted_key = None\n encrypted_key = securesystemslib.pyca_crypto_keys.encrypt_key(key_object,\n password)\n return encrypted_key\n", "role": "user" }, { "content": "encrypt_key", "role": "assistant" } ]
def x(encrypted_key, passphrase): securesystemslib.formats.ENCRYPTEDKEY_SCHEMA.check_match(encrypted_key) securesystemslib.formats.PASSWORD_SCHEMA.check_match(passphrase) key_object = None key_object = securesystemslib.pyca_crypto_keys.decrypt_key(encrypted_key, passphrase) return key_object
decrypt_key
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(encrypted_key, passphrase):\n securesystemslib.formats.ENCRYPTEDKEY_SCHEMA.check_match(encrypted_key)\n securesystemslib.formats.PASSWORD_SCHEMA.check_match(passphrase)\n key_object = None\n key_object = securesystemslib.pyca_crypto_keys.decrypt_key(encrypted_key,\n passphrase)\n return key_object\n", "role": "user" }, { "content": "decrypt_key", "role": "assistant" } ]
def x(private_key, passphrase): securesystemslib.formats.PEMRSA_SCHEMA.check_match(private_key) securesystemslib.formats.PASSWORD_SCHEMA.check_match(passphrase) encrypted_pem = None encrypted_pem = securesystemslib.pyca_crypto_keys.create_rsa_encrypted_pem( private_key, passphrase) return encrypted_pem
create_rsa_encrypted_pem
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(private_key, passphrase):\n securesystemslib.formats.PEMRSA_SCHEMA.check_match(private_key)\n securesystemslib.formats.PASSWORD_SCHEMA.check_match(passphrase)\n encrypted_pem = None\n encrypted_pem = securesystemslib.pyca_crypto_keys.create_rsa_encrypted_pem(\n private_key, passphrase)\n return encrypted_pem\n", "role": "user" }, { "content": "create_rsa_encrypted_pem", "role": "assistant" } ]
def x(pem): securesystemslib.formats.PEMRSA_SCHEMA.check_match(pem) pem_header = '-----BEGIN PUBLIC KEY-----' pem_footer = '-----END PUBLIC KEY-----' try: header_start = pem.index(pem_header) pem.index(pem_footer, header_start + len(pem_header)) except ValueError: return False return True
is_pem_public
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(pem):\n securesystemslib.formats.PEMRSA_SCHEMA.check_match(pem)\n pem_header = '-----BEGIN PUBLIC KEY-----'\n pem_footer = '-----END PUBLIC KEY-----'\n try:\n header_start = pem.index(pem_header)\n pem.index(pem_footer, header_start + len(pem_header))\n except ValueError:\n return False\n return True\n", "role": "user" }, { "content": "is_pem_public", "role": "assistant" } ]
def x(pem, keytype='rsa'): securesystemslib.formats.PEMRSA_SCHEMA.check_match(pem) securesystemslib.formats.NAME_SCHEMA.check_match(keytype) if keytype == 'rsa': pem_header = '-----BEGIN RSA PRIVATE KEY-----' pem_footer = '-----END RSA PRIVATE KEY-----' elif keytype == 'ec': pem_header = '-----BEGIN EC PRIVATE KEY-----' pem_footer = '-----END EC PRIVATE KEY-----' else: raise securesystemslib.exceptions.FormatError( 'Unsupported key type: ' + repr(keytype) + '. Supported keytypes: ["rsa", "ec"]') try: header_start = pem.index(pem_header) pem.index(pem_footer, header_start + len(pem_header)) except ValueError: return False return True
is_pem_private
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(pem, keytype='rsa'):\n securesystemslib.formats.PEMRSA_SCHEMA.check_match(pem)\n securesystemslib.formats.NAME_SCHEMA.check_match(keytype)\n if keytype == 'rsa':\n pem_header = '-----BEGIN RSA PRIVATE KEY-----'\n pem_footer = '-----END RSA PRIVATE KEY-----'\n elif keytype == 'ec':\n pem_header = '-----BEGIN EC PRIVATE KEY-----'\n pem_footer = '-----END EC PRIVATE KEY-----'\n else:\n raise securesystemslib.exceptions.FormatError(\n 'Unsupported key type: ' + repr(keytype) +\n '. Supported keytypes: [\"rsa\", \"ec\"]')\n try:\n header_start = pem.index(pem_header)\n pem.index(pem_footer, header_start + len(pem_header))\n except ValueError:\n return False\n return True\n", "role": "user" }, { "content": "is_pem_private", "role": "assistant" } ]
def x(pem, scheme='ecdsa-sha2-nistp256', password=None): securesystemslib.formats.PEMECDSA_SCHEMA.check_match(pem) securesystemslib.formats.ECDSA_SCHEME_SCHEMA.check_match(scheme) if password is not None: securesystemslib.formats.PASSWORD_SCHEMA.check_match(password) else: logger.debug( 'The password/passphrase is unset. The PEM is expected to be unencrypted.' ) ecdsakey_dict = {} keytype = 'ecdsa-sha2-nistp256' public = None private = None public, private = (securesystemslib.ecdsa_keys. create_ecdsa_public_and_private_from_pem(pem, password)) key_value = {'public': public.replace('\r\n', '\n'), 'private': ''} keyid = _get_keyid(keytype, scheme, key_value) key_value['private'] = private ecdsakey_dict['keytype'] = keytype ecdsakey_dict['scheme'] = scheme ecdsakey_dict['keyid'] = keyid ecdsakey_dict['keyval'] = key_value ecdsakey_dict['keyid_hash_algorithms' ] = securesystemslib.settings.HASH_ALGORITHMS return ecdsakey_dict
import_ecdsakey_from_private_pem
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(pem, scheme='ecdsa-sha2-nistp256', password=None):\n securesystemslib.formats.PEMECDSA_SCHEMA.check_match(pem)\n securesystemslib.formats.ECDSA_SCHEME_SCHEMA.check_match(scheme)\n if password is not None:\n securesystemslib.formats.PASSWORD_SCHEMA.check_match(password)\n else:\n logger.debug(\n 'The password/passphrase is unset. The PEM is expected to be unencrypted.'\n )\n ecdsakey_dict = {}\n keytype = 'ecdsa-sha2-nistp256'\n public = None\n private = None\n public, private = (securesystemslib.ecdsa_keys.\n create_ecdsa_public_and_private_from_pem(pem, password))\n key_value = {'public': public.replace('\\r\\n', '\\n'), 'private': ''}\n keyid = _get_keyid(keytype, scheme, key_value)\n key_value['private'] = private\n ecdsakey_dict['keytype'] = keytype\n ecdsakey_dict['scheme'] = scheme\n ecdsakey_dict['keyid'] = keyid\n ecdsakey_dict['keyval'] = key_value\n ecdsakey_dict['keyid_hash_algorithms'\n ] = securesystemslib.settings.HASH_ALGORITHMS\n return ecdsakey_dict\n", "role": "user" }, { "content": "import_ecdsakey_from_private_pem", "role": "assistant" } ]
def x(pem, scheme='ecdsa-sha2-nistp256'): securesystemslib.formats.PEMECDSA_SCHEMA.check_match(pem) securesystemslib.formats.ECDSA_SCHEME_SCHEMA.check_match(scheme) if is_pem_public(pem): public_pem = extract_pem(pem, private_pem=False) else: raise securesystemslib.exceptions.FormatError( 'Invalid public pem: ' + repr(pem)) ecdsakey_dict = {} keytype = 'ecdsa-sha2-nistp256' key_value = {'public': public_pem.replace('\r\n', '\n'), 'private': ''} keyid = _get_keyid(keytype, scheme, key_value) ecdsakey_dict['keytype'] = keytype ecdsakey_dict['scheme'] = scheme ecdsakey_dict['keyid'] = keyid ecdsakey_dict['keyval'] = key_value ecdsakey_dict['keyid_hash_algorithms' ] = securesystemslib.settings.HASH_ALGORITHMS return ecdsakey_dict
import_ecdsakey_from_public_pem
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(pem, scheme='ecdsa-sha2-nistp256'):\n securesystemslib.formats.PEMECDSA_SCHEMA.check_match(pem)\n securesystemslib.formats.ECDSA_SCHEME_SCHEMA.check_match(scheme)\n if is_pem_public(pem):\n public_pem = extract_pem(pem, private_pem=False)\n else:\n raise securesystemslib.exceptions.FormatError(\n 'Invalid public pem: ' + repr(pem))\n ecdsakey_dict = {}\n keytype = 'ecdsa-sha2-nistp256'\n key_value = {'public': public_pem.replace('\\r\\n', '\\n'), 'private': ''}\n keyid = _get_keyid(keytype, scheme, key_value)\n ecdsakey_dict['keytype'] = keytype\n ecdsakey_dict['scheme'] = scheme\n ecdsakey_dict['keyid'] = keyid\n ecdsakey_dict['keyval'] = key_value\n ecdsakey_dict['keyid_hash_algorithms'\n ] = securesystemslib.settings.HASH_ALGORITHMS\n return ecdsakey_dict\n", "role": "user" }, { "content": "import_ecdsakey_from_public_pem", "role": "assistant" } ]
def x(pem, scheme='ecdsa-sha2-nistp256'): securesystemslib.formats.PEMECDSA_SCHEMA.check_match(pem) securesystemslib.formats.ECDSA_SCHEME_SCHEMA.check_match(scheme) public_pem = '' private_pem = '' if is_pem_public(pem): public_pem = extract_pem(pem, private_pem=False) elif is_pem_private(pem, 'ec'): return import_ecdsakey_from_private_pem(pem, password=None) else: raise securesystemslib.exceptions.FormatError( 'PEM contains neither a public nor private key: ' + repr(pem)) ecdsakey_dict = {} keytype = 'ecdsa-sha2-nistp256' key_value = {'public': public_pem.replace('\r\n', '\n'), 'private': ''} keyid = _get_keyid(keytype, scheme, key_value) ecdsakey_dict['keytype'] = keytype ecdsakey_dict['scheme'] = scheme ecdsakey_dict['keyid'] = keyid ecdsakey_dict['keyval'] = key_value return ecdsakey_dict
import_ecdsakey_from_pem
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(pem, scheme='ecdsa-sha2-nistp256'):\n securesystemslib.formats.PEMECDSA_SCHEMA.check_match(pem)\n securesystemslib.formats.ECDSA_SCHEME_SCHEMA.check_match(scheme)\n public_pem = ''\n private_pem = ''\n if is_pem_public(pem):\n public_pem = extract_pem(pem, private_pem=False)\n elif is_pem_private(pem, 'ec'):\n return import_ecdsakey_from_private_pem(pem, password=None)\n else:\n raise securesystemslib.exceptions.FormatError(\n 'PEM contains neither a public nor private key: ' + repr(pem))\n ecdsakey_dict = {}\n keytype = 'ecdsa-sha2-nistp256'\n key_value = {'public': public_pem.replace('\\r\\n', '\\n'), 'private': ''}\n keyid = _get_keyid(keytype, scheme, key_value)\n ecdsakey_dict['keytype'] = keytype\n ecdsakey_dict['scheme'] = scheme\n ecdsakey_dict['keyid'] = keyid\n ecdsakey_dict['keyval'] = key_value\n return ecdsakey_dict\n", "role": "user" }, { "content": "import_ecdsakey_from_pem", "role": "assistant" } ]
def x(self): self.save() self._expected = [] if self.next_is_rc(Tokens.OPAR, False): self.handle_hidden_right() args = self.parse_param_list() if args is not None: if self.next_is_rc(Tokens.CPAR, False): self.handle_hidden_right() body = self.parse_block() if body: self._expected = [] token = self.next_is_rc(Tokens.END, False) if token: body.stop_char = token.stop self.success() return args, body else: self.abort() else: self.abort() return self.failure()
parse_func_body
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n self.save()\n self._expected = []\n if self.next_is_rc(Tokens.OPAR, False):\n self.handle_hidden_right()\n args = self.parse_param_list()\n if args is not None:\n if self.next_is_rc(Tokens.CPAR, False):\n self.handle_hidden_right()\n body = self.parse_block()\n if body:\n self._expected = []\n token = self.next_is_rc(Tokens.END, False)\n if token:\n body.stop_char = token.stop\n self.success()\n return args, body\n else:\n self.abort()\n else:\n self.abort()\n return self.failure()\n", "role": "user" }, { "content": "parse_func_body", "role": "assistant" } ]
def x(cls, class_name): def x(cls): for cls in cls.__subclasses__(): if lower(cls.__name__) == lower(class_name): return cls elif len(cls.__subclasses__()) > 0: r = recurrent_class_lookup(cls) if r is not None: return r return None cls = recurrent_class_lookup(cls) if cls: return cls else: raise ValueError("'class_name '%s' is invalid" % class_name)
get_concrete_class
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(cls, class_name):\n\n def x(cls):\n for cls in cls.__subclasses__():\n if lower(cls.__name__) == lower(class_name):\n return cls\n elif len(cls.__subclasses__()) > 0:\n r = recurrent_class_lookup(cls)\n if r is not None:\n return r\n return None\n cls = recurrent_class_lookup(cls)\n if cls:\n return cls\n else:\n raise ValueError(\"'class_name '%s' is invalid\" % class_name)\n", "role": "user" }, { "content": "get_concrete_class", "role": "assistant" } ]
def x(self): pupil_data = _co.namedtuple('pupil_data', ['ZemaxApertureType', 'ApertureValue', 'entrancePupilDiameter', 'entrancePupilPosition', 'exitPupilDiameter', 'exitPupilPosition', 'ApodizationType', 'ApodizationFactor']) data = self._ilensdataeditor.GetPupil() return pupil_data(*data)
GetPupil
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n pupil_data = _co.namedtuple('pupil_data', ['ZemaxApertureType',\n 'ApertureValue', 'entrancePupilDiameter', 'entrancePupilPosition',\n 'exitPupilDiameter', 'exitPupilPosition', 'ApodizationType',\n 'ApodizationFactor'])\n data = self._ilensdataeditor.GetPupil()\n return pupil_data(*data)\n", "role": "user" }, { "content": "GetPupil", "role": "assistant" } ]
def x(self, targets=list(), filename=str(), status=str()): if targets and filename: raise SyntaxError( "You must specify only one of either targets=[] or filename=''.") elif not targets and not filename: raise SyntaxError( "You must specify either a list of targets or filename='', but not both." ) elif filename: targets = self.read_file(filename) my_targets = {'hosts': [], 'nets': []} addresses = [] for target in targets: if len(target.split()) > 1: target_items = target.split() for item in target_items: try: ip = IPAddress(item) if ip.version == 4: addresses.append(str(ip)) except AddrFormatError: my_targets['hosts'].append(item) except ValueError: net = IPNetwork(item) if net.ip.is_unicast( ) and net.version == 4 and net.netmask.netmask_bits( ) in range(8, 31): my_targets['nets'].append(target_items[0]) else: msg = str(str(net) + """:Only IPv4 unicast addresses with bit masks from 8 to 30 are supported.""" ) raise AttributeError(msg) while len(addresses) > 1: ip = IPAddress(addresses[0]) mask = IPAddress(addresses[1]) if ip.is_unicast() and mask.is_netmask(): net = IPNetwork(str(ip) + '/' + str(mask.netmask_bits())) my_targets['nets'].append(str(net.cidr)) addresses.pop(0) addresses.pop(0) elif ip.is_unicast() and not ip.is_netmask(): my_targets['hosts'].append(str(ip)) addresses.pop(0) if addresses: ip = IPAddress(addresses[0]) if ip.is_unicast() and not ip.is_netmask(): my_targets['hosts'].append(addresses[0]) addresses.pop() else: try: ip = IPAddress(target) if ip.version == 4 and ip.is_unicast() and not ip.is_netmask(): my_targets['hosts'].append(target) else: msg = str(target + 'Only IPv4 unicast addresses are supported.') raise AttributeError(msg) except AddrFormatError: my_targets['hosts'].append(target) except ValueError: net = IPNetwork(target) if net.ip.is_unicast( ) and net.version == 4 and net.netmask.netmask_bits( ) in range(8, 31): my_targets['nets'].append(target) else: msg = str(str(net) + """:Only IPv4 unicast addresses with bit masks from 8 to 30 are supported.""" ) raise AttributeError(msg) """ Build the list of commands to run. """ commands = [] if len(my_targets['hosts']) != 0: for target in range(len(my_targets['hosts'])): commands.append([self.fping, '-nV', my_targets['hosts'][target]]) if len(my_targets['nets']) != 0: for target in range(len(my_targets['nets'])): commands.append([self.fping, '-ngV', my_targets['nets'][target]]) """ Start pinging each item in my_targets and return the requested results when done. """ pool = ThreadPool(self.num_pools) raw_results = pool.map(self.get_results, commands) pool.close() pool.join() self.results = {host: result for host, result in csv.reader(''.join( raw_results).splitlines())} if not status: return self.results elif status == 'alive': return self.alive elif status == 'dead': return self.dead elif status == 'noip': return self.noip else: raise SyntaxError("Valid status options are 'alive', 'dead' or 'noip'")
ping
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, targets=list(), filename=str(), status=str()):\n if targets and filename:\n raise SyntaxError(\n \"You must specify only one of either targets=[] or filename=''.\")\n elif not targets and not filename:\n raise SyntaxError(\n \"You must specify either a list of targets or filename='', but not both.\"\n )\n elif filename:\n targets = self.read_file(filename)\n my_targets = {'hosts': [], 'nets': []}\n addresses = []\n for target in targets:\n if len(target.split()) > 1:\n target_items = target.split()\n for item in target_items:\n try:\n ip = IPAddress(item)\n if ip.version == 4:\n addresses.append(str(ip))\n except AddrFormatError:\n my_targets['hosts'].append(item)\n except ValueError:\n net = IPNetwork(item)\n if net.ip.is_unicast(\n ) and net.version == 4 and net.netmask.netmask_bits(\n ) in range(8, 31):\n my_targets['nets'].append(target_items[0])\n else:\n msg = str(str(net) +\n \"\"\":Only IPv4 unicast addresses with bit masks\n from 8 to 30 are supported.\"\"\"\n )\n raise AttributeError(msg)\n while len(addresses) > 1:\n ip = IPAddress(addresses[0])\n mask = IPAddress(addresses[1])\n if ip.is_unicast() and mask.is_netmask():\n net = IPNetwork(str(ip) + '/' + str(mask.netmask_bits()))\n my_targets['nets'].append(str(net.cidr))\n addresses.pop(0)\n addresses.pop(0)\n elif ip.is_unicast() and not ip.is_netmask():\n my_targets['hosts'].append(str(ip))\n addresses.pop(0)\n if addresses:\n ip = IPAddress(addresses[0])\n if ip.is_unicast() and not ip.is_netmask():\n my_targets['hosts'].append(addresses[0])\n addresses.pop()\n else:\n try:\n ip = IPAddress(target)\n if ip.version == 4 and ip.is_unicast() and not ip.is_netmask():\n my_targets['hosts'].append(target)\n else:\n msg = str(target +\n 'Only IPv4 unicast addresses are supported.')\n raise AttributeError(msg)\n except AddrFormatError:\n my_targets['hosts'].append(target)\n except ValueError:\n net = IPNetwork(target)\n if net.ip.is_unicast(\n ) and net.version == 4 and net.netmask.netmask_bits(\n ) in range(8, 31):\n my_targets['nets'].append(target)\n else:\n msg = str(str(net) +\n \"\"\":Only IPv4 unicast addresses with bit masks\n from 8 to 30 are supported.\"\"\"\n )\n raise AttributeError(msg)\n \"\"\"\n Build the list of commands to run.\n \"\"\"\n commands = []\n if len(my_targets['hosts']) != 0:\n for target in range(len(my_targets['hosts'])):\n commands.append([self.fping, '-nV', my_targets['hosts'][target]])\n if len(my_targets['nets']) != 0:\n for target in range(len(my_targets['nets'])):\n commands.append([self.fping, '-ngV', my_targets['nets'][target]])\n \"\"\"\n Start pinging each item in my_targets and return the requested results\n when done.\n \"\"\"\n pool = ThreadPool(self.num_pools)\n raw_results = pool.map(self.get_results, commands)\n pool.close()\n pool.join()\n self.results = {host: result for host, result in csv.reader(''.join(\n raw_results).splitlines())}\n if not status:\n return self.results\n elif status == 'alive':\n return self.alive\n elif status == 'dead':\n return self.dead\n elif status == 'noip':\n return self.noip\n else:\n raise SyntaxError(\"Valid status options are 'alive', 'dead' or 'noip'\")\n", "role": "user" }, { "content": "ping", "role": "assistant" } ]
def x(cmd): try: return subprocess.check_output(cmd) except subprocess.CalledProcessError as e: return e.output
get_results
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(cmd):\n try:\n return subprocess.check_output(cmd)\n except subprocess.CalledProcessError as e:\n return e.output\n", "role": "user" }, { "content": "get_results", "role": "assistant" } ]
def x(filename): lines = [] with open(filename) as f: for line in f: if len(line.strip()) != 0: lines.append(line.strip()) return lines
read_file
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(filename):\n lines = []\n with open(filename) as f:\n for line in f:\n if len(line.strip()) != 0:\n lines.append(line.strip())\n return lines\n", "role": "user" }, { "content": "read_file", "role": "assistant" } ]
def x(self, data_out, outputs): compress = ROOTModule.ROOT.CompressionSettings(ROOTModule.ROOT.kZLIB, 1) if isinstance(data_out, (str, unicode)): self.file_emulation = True outputs.append(ROOTModule.TFile.Open(data_out, 'RECREATE', '', compress)) elif isinstance(data_out, ROOTModule.TFile): outputs.append(data_out) else: self.file_emulation = True filename = os.path.join(tempfile.mkdtemp(), 'tmp.root') outputs.append(ROOTModule.TFile.Open(filename, 'RECREATE', '', compress))
prepare_outputs
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, data_out, outputs):\n compress = ROOTModule.ROOT.CompressionSettings(ROOTModule.ROOT.kZLIB, 1)\n if isinstance(data_out, (str, unicode)):\n self.file_emulation = True\n outputs.append(ROOTModule.TFile.Open(data_out, 'RECREATE', '',\n compress))\n elif isinstance(data_out, ROOTModule.TFile):\n outputs.append(data_out)\n else:\n self.file_emulation = True\n filename = os.path.join(tempfile.mkdtemp(), 'tmp.root')\n outputs.append(ROOTModule.TFile.Open(filename, 'RECREATE', '',\n compress))\n", "role": "user" }, { "content": "prepare_outputs", "role": "assistant" } ]
def x(self, data_in, data_out, *args, **kwargs): self._get_tables(data_in) self.file_emulation = False outputs = [] self._prepare_outputs(data_out, outputs) output = outputs[0] for i in xrange(len(self.tables)): table = self.tables[i] self._write_table(output, table) if data_out != output and hasattr(data_out, 'write'): output.Flush() output.ReOpen('read') file_size = output.GetSize() buff = bytearray(file_size) output.ReadBuffer(buff, file_size) data_out.write(buff) if self.file_emulation: filename = output.GetName() output.Close()
write
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, data_in, data_out, *args, **kwargs):\n self._get_tables(data_in)\n self.file_emulation = False\n outputs = []\n self._prepare_outputs(data_out, outputs)\n output = outputs[0]\n for i in xrange(len(self.tables)):\n table = self.tables[i]\n self._write_table(output, table)\n if data_out != output and hasattr(data_out, 'write'):\n output.Flush()\n output.ReOpen('read')\n file_size = output.GetSize()\n buff = bytearray(file_size)\n output.ReadBuffer(buff, file_size)\n data_out.write(buff)\n if self.file_emulation:\n filename = output.GetName()\n output.Close()\n", "role": "user" }, { "content": "write", "role": "assistant" } ]
def x(length, total_length): indices = tuple(range(0, total_length, length)) + (None,) return _pairwise(indices)
groups_of
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(length, total_length):\n indices = tuple(range(0, total_length, length)) + (None,)\n return _pairwise(indices)\n", "role": "user" }, { "content": "groups_of", "role": "assistant" } ]
def x(sources, targets, masked=False): assert len(sources) == 1 and len(targets) == 1 array = sources[0] target = targets[0] all_slices = _all_slices(array) for index in np.ndindex(*[len(slices) for slices in all_slices]): keys = tuple(slices[i] for slices, i in zip(all_slices, index)) if masked: target[keys] = array[keys].masked_array() else: target[keys] = array[keys].ndarray()
save
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(sources, targets, masked=False):\n assert len(sources) == 1 and len(targets) == 1\n array = sources[0]\n target = targets[0]\n all_slices = _all_slices(array)\n for index in np.ndindex(*[len(slices) for slices in all_slices]):\n keys = tuple(slices[i] for slices, i in zip(all_slices, index))\n if masked:\n target[keys] = array[keys].masked_array()\n else:\n target[keys] = array[keys].ndarray()\n", "role": "user" }, { "content": "save", "role": "assistant" } ]
def x(a, axis=None): axes = _normalise_axis(axis, a) if axes is None or len(axes) != 1: msg = 'This operation is currently limited to a single axis' raise AxisSupportError(msg) return _Aggregation(a, axes[0], _CountStreamsHandler, _CountMaskedStreamsHandler, np.dtype('i'), {})
count
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(a, axis=None):\n axes = _normalise_axis(axis, a)\n if axes is None or len(axes) != 1:\n msg = 'This operation is currently limited to a single axis'\n raise AxisSupportError(msg)\n return _Aggregation(a, axes[0], _CountStreamsHandler,\n _CountMaskedStreamsHandler, np.dtype('i'), {})\n", "role": "user" }, { "content": "count", "role": "assistant" } ]
def x(a, axis=None): axes = _normalise_axis(axis, a) assert axes is not None and len(axes) == 1 return _Aggregation(a, axes[0], _MinStreamsHandler, _MinMaskedStreamsHandler, a.dtype, {})
min
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(a, axis=None):\n axes = _normalise_axis(axis, a)\n assert axes is not None and len(axes) == 1\n return _Aggregation(a, axes[0], _MinStreamsHandler,\n _MinMaskedStreamsHandler, a.dtype, {})\n", "role": "user" }, { "content": "min", "role": "assistant" } ]
def x(a, axis=None): axes = _normalise_axis(axis, a) assert axes is not None and len(axes) == 1 return _Aggregation(a, axes[0], _MaxStreamsHandler, _MaxMaskedStreamsHandler, a.dtype, {})
max
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(a, axis=None):\n axes = _normalise_axis(axis, a)\n assert axes is not None and len(axes) == 1\n return _Aggregation(a, axes[0], _MaxStreamsHandler,\n _MaxMaskedStreamsHandler, a.dtype, {})\n", "role": "user" }, { "content": "max", "role": "assistant" } ]
def x(a, axis=None): axes = _normalise_axis(axis, a) assert axes is not None and len(axes) == 1 return _Aggregation(a, axes[0], _SumStreamsHandler, _SumMaskedStreamsHandler, a.dtype, {})
sum
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(a, axis=None):\n axes = _normalise_axis(axis, a)\n assert axes is not None and len(axes) == 1\n return _Aggregation(a, axes[0], _SumStreamsHandler,\n _SumMaskedStreamsHandler, a.dtype, {})\n", "role": "user" }, { "content": "sum", "role": "assistant" } ]
def x(a, axis=None, mdtol=1): axes = _normalise_axis(axis, a) if axes is None or len(axes) != 1: msg = 'This operation is currently limited to a single axis' raise AxisSupportError(msg) dtype = (np.array([0], dtype=a.dtype) / 1.0).dtype kwargs = dict(mdtol=mdtol) return _Aggregation(a, axes[0], _MeanStreamsHandler, _MeanMaskedStreamsHandler, dtype, kwargs)
mean
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(a, axis=None, mdtol=1):\n axes = _normalise_axis(axis, a)\n if axes is None or len(axes) != 1:\n msg = 'This operation is currently limited to a single axis'\n raise AxisSupportError(msg)\n dtype = (np.array([0], dtype=a.dtype) / 1.0).dtype\n kwargs = dict(mdtol=mdtol)\n return _Aggregation(a, axes[0], _MeanStreamsHandler,\n _MeanMaskedStreamsHandler, dtype, kwargs)\n", "role": "user" }, { "content": "mean", "role": "assistant" } ]
def x(a, axis=None, ddof=0): axes = _normalise_axis(axis, a) if axes is None or len(axes) != 1: msg = 'This operation is currently limited to a single axis' raise AxisSupportError(msg) dtype = (np.array([0], dtype=a.dtype) / 1.0).dtype return _Aggregation(a, axes[0], _StdStreamsHandler, _StdMaskedStreamsHandler, dtype, dict(ddof=ddof))
std
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(a, axis=None, ddof=0):\n axes = _normalise_axis(axis, a)\n if axes is None or len(axes) != 1:\n msg = 'This operation is currently limited to a single axis'\n raise AxisSupportError(msg)\n dtype = (np.array([0], dtype=a.dtype) / 1.0).dtype\n return _Aggregation(a, axes[0], _StdStreamsHandler,\n _StdMaskedStreamsHandler, dtype, dict(ddof=ddof))\n", "role": "user" }, { "content": "std", "role": "assistant" } ]
def x(a, axis=None, ddof=0): axes = _normalise_axis(axis, a) if axes is None or len(axes) != 1: msg = 'This operation is currently limited to a single axis' raise AxisSupportError(msg) dtype = (np.array([0], dtype=a.dtype) / 1.0).dtype return _Aggregation(a, axes[0], _VarStreamsHandler, _VarMaskedStreamsHandler, dtype, dict(ddof=ddof))
var
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(a, axis=None, ddof=0):\n axes = _normalise_axis(axis, a)\n if axes is None or len(axes) != 1:\n msg = 'This operation is currently limited to a single axis'\n raise AxisSupportError(msg)\n dtype = (np.array([0], dtype=a.dtype) / 1.0).dtype\n return _Aggregation(a, axes[0], _VarStreamsHandler,\n _VarMaskedStreamsHandler, dtype, dict(ddof=ddof))\n", "role": "user" }, { "content": "var", "role": "assistant" } ]
def x(ufunc, name=None): if not isinstance(ufunc, np.ufunc): raise TypeError('{} is not a ufunc'.format(ufunc)) ufunc_name = ufunc.__name__ ma_ufunc = getattr(np.ma, ufunc_name, None) if ufunc.nin == 2 and ufunc.nout == 1: func = _dual_input_fn_wrapper('np.{}'.format(ufunc_name), ufunc, ma_ufunc, name) elif ufunc.nin == 1 and ufunc.nout == 1: func = _unary_fn_wrapper('np.{}'.format(ufunc_name), ufunc, ma_ufunc, name) else: raise ValueError( 'Unsupported ufunc {!r} with {} input arrays & {} output arrays.' .format(ufunc_name, ufunc.nin, ufunc.nout)) return func
ufunc_wrapper
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(ufunc, name=None):\n if not isinstance(ufunc, np.ufunc):\n raise TypeError('{} is not a ufunc'.format(ufunc))\n ufunc_name = ufunc.__name__\n ma_ufunc = getattr(np.ma, ufunc_name, None)\n if ufunc.nin == 2 and ufunc.nout == 1:\n func = _dual_input_fn_wrapper('np.{}'.format(ufunc_name), ufunc,\n ma_ufunc, name)\n elif ufunc.nin == 1 and ufunc.nout == 1:\n func = _unary_fn_wrapper('np.{}'.format(ufunc_name), ufunc,\n ma_ufunc, name)\n else:\n raise ValueError(\n 'Unsupported ufunc {!r} with {} input arrays & {} output arrays.'\n .format(ufunc_name, ufunc.nin, ufunc.nout))\n return func\n", "role": "user" }, { "content": "ufunc_wrapper", "role": "assistant" } ]
def x(shape, keys): keys = _full_keys(keys, len(shape)) sliced_shape = [] shape_dim = -1 for key in keys: shape_dim += 1 if _is_scalar(key): continue elif isinstance(key, slice): size = len(range(*key.indices(shape[shape_dim]))) sliced_shape.append(size) elif isinstance(key, np.ndarray) and key.dtype == np.dtype('bool'): sliced_shape.append(builtins.sum(key)) elif isinstance(key, (tuple, np.ndarray)): sliced_shape.append(len(key)) elif key is np.newaxis: shape_dim -= 1 sliced_shape.append(1) else: raise ValueError('Invalid indexing object "{}"'.format(key)) sliced_shape = tuple(sliced_shape) return sliced_shape
sliced_shape
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(shape, keys):\n keys = _full_keys(keys, len(shape))\n sliced_shape = []\n shape_dim = -1\n for key in keys:\n shape_dim += 1\n if _is_scalar(key):\n continue\n elif isinstance(key, slice):\n size = len(range(*key.indices(shape[shape_dim])))\n sliced_shape.append(size)\n elif isinstance(key, np.ndarray) and key.dtype == np.dtype('bool'):\n sliced_shape.append(builtins.sum(key))\n elif isinstance(key, (tuple, np.ndarray)):\n sliced_shape.append(len(key))\n elif key is np.newaxis:\n shape_dim -= 1\n sliced_shape.append(1)\n else:\n raise ValueError('Invalid indexing object \"{}\"'.format(key))\n sliced_shape = tuple(sliced_shape)\n return sliced_shape\n", "role": "user" }, { "content": "sliced_shape", "role": "assistant" } ]
def x(keys, ndim): if not isinstance(keys, tuple): keys = keys, keys = list(keys) n_keys_non_newaxis = len([key for key in keys if key is not np.newaxis]) is_ellipsis = [(key is Ellipsis) for key in keys] if n_keys_non_newaxis - 1 >= ndim and any(is_ellipsis): keys.pop(is_ellipsis.index(True)) n_keys_non_newaxis -= 1 if n_keys_non_newaxis > ndim: raise IndexError('Dimensions are over specified for indexing.') lh_keys = [] rh_keys = [] take_from_left = True while keys: if take_from_left: next_key = keys.pop(0) keys_list = lh_keys else: next_key = keys.pop(-1) keys_list = rh_keys if next_key is Ellipsis: next_key = slice(None) take_from_left = not take_from_left keys_list.append(next_key) middle = [slice(None)] * (ndim - n_keys_non_newaxis) return tuple(lh_keys + middle + rh_keys[::-1])
full_keys
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(keys, ndim):\n if not isinstance(keys, tuple):\n keys = keys,\n keys = list(keys)\n n_keys_non_newaxis = len([key for key in keys if key is not np.newaxis])\n is_ellipsis = [(key is Ellipsis) for key in keys]\n if n_keys_non_newaxis - 1 >= ndim and any(is_ellipsis):\n keys.pop(is_ellipsis.index(True))\n n_keys_non_newaxis -= 1\n if n_keys_non_newaxis > ndim:\n raise IndexError('Dimensions are over specified for indexing.')\n lh_keys = []\n rh_keys = []\n take_from_left = True\n while keys:\n if take_from_left:\n next_key = keys.pop(0)\n keys_list = lh_keys\n else:\n next_key = keys.pop(-1)\n keys_list = rh_keys\n if next_key is Ellipsis:\n next_key = slice(None)\n take_from_left = not take_from_left\n keys_list.append(next_key)\n middle = [slice(None)] * (ndim - n_keys_non_newaxis)\n return tuple(lh_keys + middle + rh_keys[::-1])\n", "role": "user" }, { "content": "full_keys", "role": "assistant" } ]
def x(array): if not isinstance(array, Array): if isinstance(array, np.ndarray): array = NumpyArrayAdapter(array) elif np.isscalar(array): array = ConstantArray([], array) else: raise TypeError( 'The given array should be a `biggus.Array` instance, got {}.' .format(type(array))) return array
ensure_array
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(array):\n if not isinstance(array, Array):\n if isinstance(array, np.ndarray):\n array = NumpyArrayAdapter(array)\n elif np.isscalar(array):\n array = ConstantArray([], array)\n else:\n raise TypeError(\n 'The given array should be a `biggus.Array` instance, got {}.'\n .format(type(array)))\n return array\n", "role": "user" }, { "content": "ensure_array", "role": "assistant" } ]
def x(array): nbytes = array.nbytes if nbytes < 1 << 10: size = '{} B'.format(nbytes) elif nbytes < 1 << 20: size = '{:.02f} KiB'.format(nbytes / (1 << 10)) elif nbytes < 1 << 30: size = '{:.02f} MiB'.format(nbytes / (1 << 20)) elif nbytes < 1 << 40: size = '{:.02f} GiB'.format(nbytes / (1 << 30)) else: size = '{:.02f} TiB'.format(nbytes / (1 << 40)) return size
size
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(array):\n nbytes = array.nbytes\n if nbytes < 1 << 10:\n size = '{} B'.format(nbytes)\n elif nbytes < 1 << 20:\n size = '{:.02f} KiB'.format(nbytes / (1 << 10))\n elif nbytes < 1 << 30:\n size = '{:.02f} MiB'.format(nbytes / (1 << 20))\n elif nbytes < 1 << 40:\n size = '{:.02f} GiB'.format(nbytes / (1 << 30))\n else:\n size = '{:.02f} TiB'.format(nbytes / (1 << 40))\n return size\n", "role": "user" }, { "content": "size", "role": "assistant" } ]
def x(self, chunk): if chunk is not None: for queue in self.output_queues: queue.put(chunk)
output
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, chunk):\n if chunk is not None:\n for queue in self.output_queues:\n queue.put(chunk)\n", "role": "user" }, { "content": "output", "role": "assistant" } ]
def x(self): try: chunk_index = self.chunk_index_gen(self.array.shape, self. iteration_order) for key in chunk_index: if self.masked: data = self.array[key].masked_array() else: data = self.array[key].ndarray() output_chunk = Chunk(key, data) self.output(output_chunk) except: self.abort() raise else: for queue in self.output_queues: queue.put(QUEUE_FINISHED)
run
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n try:\n chunk_index = self.chunk_index_gen(self.array.shape, self.\n iteration_order)\n for key in chunk_index:\n if self.masked:\n data = self.array[key].masked_array()\n else:\n data = self.array[key].ndarray()\n output_chunk = Chunk(key, data)\n self.output(output_chunk)\n except:\n self.abort()\n raise\n else:\n for queue in self.output_queues:\n queue.put(QUEUE_FINISHED)\n", "role": "user" }, { "content": "run", "role": "assistant" } ]
def x(self, input_nodes): self.input_queues = [queue.Queue(maxsize=3) for _ in input_nodes] for input_node, input_queue in zip(input_nodes, self.input_queues): input_node.add_output_queue(input_queue)
add_input_nodes
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, input_nodes):\n self.input_queues = [queue.Queue(maxsize=3) for _ in input_nodes]\n for input_node, input_queue in zip(input_nodes, self.input_queues):\n input_node.add_output_queue(input_queue)\n", "role": "user" }, { "content": "add_input_nodes", "role": "assistant" } ]
def x(self): try: while True: input_chunks = [input.get() for input in self.input_queues] for input in self.input_queues: input.task_done() if any(chunk is QUEUE_ABORT for chunk in input_chunks): self.abort() return if any(chunk is QUEUE_FINISHED for chunk in input_chunks): break self.output(self.process_chunks(input_chunks)) self.output(self.finalise()) except: self.abort() raise else: for queue in self.output_queues: queue.put(QUEUE_FINISHED)
run
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n try:\n while True:\n input_chunks = [input.get() for input in self.input_queues]\n for input in self.input_queues:\n input.task_done()\n if any(chunk is QUEUE_ABORT for chunk in input_chunks):\n self.abort()\n return\n if any(chunk is QUEUE_FINISHED for chunk in input_chunks):\n break\n self.output(self.process_chunks(input_chunks))\n self.output(self.finalise())\n except:\n self.abort()\n raise\n else:\n for queue in self.output_queues:\n queue.put(QUEUE_FINISHED)\n", "role": "user" }, { "content": "run", "role": "assistant" } ]
def x(self, chunks): chunk, = chunks if chunk.keys: self.result[chunk.keys] = chunk.data else: self.result[...] = chunk.data
process_chunks
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, chunks):\n chunk, = chunks\n if chunk.keys:\n self.result[chunk.keys] = chunk.data\n else:\n self.result[...] = chunk.data\n", "role": "user" }, { "content": "process_chunks", "role": "assistant" } ]
def x(self, key, size, axis): if _is_scalar(key): if key >= size or key < -size: msg = ('index {0} is out of bounds for axis {1} with size {2}'. format(key, axis, size)) raise IndexError(msg) elif isinstance(key, slice): pass elif isinstance(key, np.ndarray) and key.dtype == np.dtype('bool'): if key.size > size: msg = ( 'too many boolean indices. Boolean index array of size {0} is greater than axis {1} with size {2}' .format(key.size, axis, size)) raise IndexError(msg) elif isinstance(key, collections.Iterable) and not isinstance(key, six. string_types): key = tuple(key) for sub_key in key: if sub_key >= size or sub_key < -size: msg = ('index {0} is out of bounds for axis {1} with size {2}' .format(sub_key, axis, size)) raise IndexError(msg) else: raise TypeError('invalid key {!r}'.format(key)) return key
cleanup_new_key
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, key, size, axis):\n if _is_scalar(key):\n if key >= size or key < -size:\n msg = ('index {0} is out of bounds for axis {1} with size {2}'.\n format(key, axis, size))\n raise IndexError(msg)\n elif isinstance(key, slice):\n pass\n elif isinstance(key, np.ndarray) and key.dtype == np.dtype('bool'):\n if key.size > size:\n msg = (\n 'too many boolean indices. Boolean index array of size {0} is greater than axis {1} with size {2}'\n .format(key.size, axis, size))\n raise IndexError(msg)\n elif isinstance(key, collections.Iterable) and not isinstance(key, six.\n string_types):\n key = tuple(key)\n for sub_key in key:\n if sub_key >= size or sub_key < -size:\n msg = ('index {0} is out of bounds for axis {1} with size {2}'\n .format(sub_key, axis, size))\n raise IndexError(msg)\n else:\n raise TypeError('invalid key {!r}'.format(key))\n return key\n", "role": "user" }, { "content": "cleanup_new_key", "role": "assistant" } ]
def x(self, indices, new_key, axis): size = len(indices) if _is_scalar(new_key): if new_key >= size or new_key < -size: msg = ('index {0} is out of bounds for axis {1} with size {2}'. format(new_key, axis, size)) raise IndexError(msg) result_key = indices[new_key] elif isinstance(new_key, slice): result_key = indices.__getitem__(new_key) elif isinstance(new_key, np.ndarray) and new_key.dtype == np.dtype('bool'): if new_key.size > size: msg = ( 'too many boolean indices. Boolean index array of size {0} is greater than axis {1} with size {2}' .format(new_key.size, axis, size)) raise IndexError(msg) result_key = tuple(np.array(indices)[new_key]) elif isinstance(new_key, collections.Iterable) and not isinstance(new_key, six.string_types): new_key = tuple(new_key) for sub_key in new_key: if sub_key >= size or sub_key < -size: msg = ('index {0} is out of bounds for axis {1} with size {2}' .format(sub_key, axis, size)) raise IndexError(msg) result_key = tuple(indices[key] for key in new_key) else: raise TypeError('invalid key {!r}'.format(new_key)) return result_key
remap_new_key
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, indices, new_key, axis):\n size = len(indices)\n if _is_scalar(new_key):\n if new_key >= size or new_key < -size:\n msg = ('index {0} is out of bounds for axis {1} with size {2}'.\n format(new_key, axis, size))\n raise IndexError(msg)\n result_key = indices[new_key]\n elif isinstance(new_key, slice):\n result_key = indices.__getitem__(new_key)\n elif isinstance(new_key, np.ndarray) and new_key.dtype == np.dtype('bool'):\n if new_key.size > size:\n msg = (\n 'too many boolean indices. Boolean index array of size {0} is greater than axis {1} with size {2}'\n .format(new_key.size, axis, size))\n raise IndexError(msg)\n result_key = tuple(np.array(indices)[new_key])\n elif isinstance(new_key, collections.Iterable) and not isinstance(new_key,\n six.string_types):\n new_key = tuple(new_key)\n for sub_key in new_key:\n if sub_key >= size or sub_key < -size:\n msg = ('index {0} is out of bounds for axis {1} with size {2}'\n .format(sub_key, axis, size))\n raise IndexError(msg)\n result_key = tuple(indices[key] for key in new_key)\n else:\n raise TypeError('invalid key {!r}'.format(new_key))\n return result_key\n", "role": "user" }, { "content": "remap_new_key", "role": "assistant" } ]
def x(self, target, inverse=False): if len(target) != self.ndim: raise ValueError( 'The target iterable is of length {}, but should be of length {}.' .format(len(target), self.ndim)) if inverse: axis_map = self._inverse_axes_map else: axis_map = self._forward_axes_map result = [None] * self.ndim for axis, item in enumerate(target): result[axis_map[axis]] = item return tuple(result)
apply_axes_mapping
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, target, inverse=False):\n if len(target) != self.ndim:\n raise ValueError(\n 'The target iterable is of length {}, but should be of length {}.'\n .format(len(target), self.ndim))\n if inverse:\n axis_map = self._inverse_axes_map\n else:\n axis_map = self._forward_axes_map\n result = [None] * self.ndim\n for axis, item in enumerate(target):\n result[axis_map[axis]] = item\n return tuple(result)\n", "role": "user" }, { "content": "apply_axes_mapping", "role": "assistant" } ]
def x(self, source_keys): keys = list(source_keys) del keys[self.axis] return tuple(keys)
output_keys
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, source_keys):\n keys = list(source_keys)\n del keys[self.axis]\n return tuple(keys)\n", "role": "user" }, { "content": "output_keys", "role": "assistant" } ]
def x(e): e = e % l P = ident for i in range(253): if e & 1: P = edwards_add(P, Bpow[i]) e = e // 2 assert e == 0, e return P
scalarmult_B
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(e):\n e = e % l\n P = ident\n for i in range(253):\n if e & 1:\n P = edwards_add(P, Bpow[i])\n e = e // 2\n assert e == 0, e\n return P\n", "role": "user" }, { "content": "scalarmult_B", "role": "assistant" } ]
def x(sk): h = H(sk) a = 2 ** (b - 2) + sum(2 ** i * bit(h, i) for i in range(3, b - 2)) A = scalarmult_B(a) return encodepoint(A)
publickey_unsafe
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(sk):\n h = H(sk)\n a = 2 ** (b - 2) + sum(2 ** i * bit(h, i) for i in range(3, b - 2))\n A = scalarmult_B(a)\n return encodepoint(A)\n", "role": "user" }, { "content": "publickey_unsafe", "role": "assistant" } ]
def x(): seed = os.urandom(32) public = None try: nacl_key = nacl.signing.SigningKey(seed) public = nacl_key.verify_key.encode(encoder=nacl.encoding.RawEncoder()) except NameError: raise securesystemslib.exceptions.UnsupportedLibraryError( 'The PyNaCl library and/or its dependencies unavailable.') return public, seed
generate_public_and_private
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x():\n seed = os.urandom(32)\n public = None\n try:\n nacl_key = nacl.signing.SigningKey(seed)\n public = nacl_key.verify_key.encode(encoder=nacl.encoding.RawEncoder())\n except NameError:\n raise securesystemslib.exceptions.UnsupportedLibraryError(\n 'The PyNaCl library and/or its dependencies unavailable.')\n return public, seed\n", "role": "user" }, { "content": "generate_public_and_private", "role": "assistant" } ]
def x(public_key, private_key, data, scheme): securesystemslib.formats.ED25519PUBLIC_SCHEMA.check_match(public_key) securesystemslib.formats.ED25519SEED_SCHEMA.check_match(private_key) securesystemslib.formats.ED25519_SIG_SCHEMA.check_match(scheme) public = public_key private = private_key signature = None if scheme == 'ed25519': try: nacl_key = nacl.signing.SigningKey(private) nacl_sig = nacl_key.sign(data) signature = nacl_sig.signature except NameError: raise securesystemslib.exceptions.UnsupportedLibraryError( 'The PyNaCl library and/or its dependencies unavailable.') except (ValueError, TypeError, nacl.exceptions.CryptoError) as e: raise securesystemslib.exceptions.CryptoError( 'An "ed25519" signature could not be created with PyNaCl.' + str(e)) else: raise securesystemslib.exceptions.UnsupportedAlgorithmError( 'Unsupported signature scheme is specified: ' + repr(scheme)) return signature, scheme
create_signature
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(public_key, private_key, data, scheme):\n securesystemslib.formats.ED25519PUBLIC_SCHEMA.check_match(public_key)\n securesystemslib.formats.ED25519SEED_SCHEMA.check_match(private_key)\n securesystemslib.formats.ED25519_SIG_SCHEMA.check_match(scheme)\n public = public_key\n private = private_key\n signature = None\n if scheme == 'ed25519':\n try:\n nacl_key = nacl.signing.SigningKey(private)\n nacl_sig = nacl_key.sign(data)\n signature = nacl_sig.signature\n except NameError:\n raise securesystemslib.exceptions.UnsupportedLibraryError(\n 'The PyNaCl library and/or its dependencies unavailable.')\n except (ValueError, TypeError, nacl.exceptions.CryptoError) as e:\n raise securesystemslib.exceptions.CryptoError(\n 'An \"ed25519\" signature could not be created with PyNaCl.' +\n str(e))\n else:\n raise securesystemslib.exceptions.UnsupportedAlgorithmError(\n 'Unsupported signature scheme is specified: ' + repr(scheme))\n return signature, scheme\n", "role": "user" }, { "content": "create_signature", "role": "assistant" } ]