source_code stringlengths 45 7.24k | function_name stringlengths 1 111 | messages list |
|---|---|---|
def x(filepath, hash_algorithms=['sha256']):
securesystemslib.formats.PATH_SCHEMA.check_match(filepath)
securesystemslib.formats.HASHALGORITHMS_SCHEMA.check_match(hash_algorithms)
file_hashes = {}
if not os.path.exists(filepath):
raise securesystemslib.exceptions.Error('Path ' + repr(filepath) +
' doest not exist.')
filepath = os.path.abspath(filepath)
file_length = os.path.getsize(filepath)
for algorithm in hash_algorithms:
digest_object = securesystemslib.hash.digest_filename(filepath,
algorithm)
file_hashes.update({algorithm: digest_object.hexdigest()})
securesystemslib.formats.HASHDICT_SCHEMA.check_match(file_hashes)
return file_length, file_hashes
| get_file_details | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(filepath, hash_algorithms=['sha256']):\n securesystemslib.formats.PATH_SCHEMA.check_match(filepath)\n securesystemslib.formats.HASHALGORITHMS_SCHEMA.check_match(hash_algorithms)\n file_hashes = {}\n if not os.path.exists(filepath):\n raise securesystemslib.exceptions.Error('Path ' + repr(filepath) +\n ' doest not exist.')\n filepath = os.path.abspath(filepath)\n file_length = os.path.getsize(filepath)\n for algorithm in hash_algorithms:\n digest_object = securesystemslib.hash.digest_filename(filepath,\n algorithm)\n file_hashes.update({algorithm: digest_object.hexdigest()})\n securesystemslib.formats.HASHDICT_SCHEMA.check_match(file_hashes)\n return file_length, file_hashes\n",
"role": "user"
},
{
"content": "get_file_details",
"role": "assistant"
}
] |
def x(filename):
securesystemslib.formats.PATH_SCHEMA.check_match(filename)
directory = os.path.split(filename)[0]
if directory and not os.path.exists(directory):
os.makedirs(directory, 448)
| ensure_parent_dir | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(filename):\n securesystemslib.formats.PATH_SCHEMA.check_match(filename)\n directory = os.path.split(filename)[0]\n if directory and not os.path.exists(directory):\n os.makedirs(directory, 448)\n",
"role": "user"
},
{
"content": "ensure_parent_dir",
"role": "assistant"
}
] |
def x(filepath, confined_directories):
securesystemslib.formats.RELPATH_SCHEMA.check_match(filepath)
securesystemslib.formats.RELPATHS_SCHEMA.check_match(confined_directories)
for confined_directory in confined_directories:
if confined_directory == '':
return True
filepath = os.path.normpath(filepath)
confined_directory = os.path.normpath(confined_directory)
if os.path.dirname(filepath) == confined_directory:
return True
return False
| file_in_confined_directories | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(filepath, confined_directories):\n securesystemslib.formats.RELPATH_SCHEMA.check_match(filepath)\n securesystemslib.formats.RELPATHS_SCHEMA.check_match(confined_directories)\n for confined_directory in confined_directories:\n if confined_directory == '':\n return True\n filepath = os.path.normpath(filepath)\n confined_directory = os.path.normpath(confined_directory)\n if os.path.dirname(filepath) == confined_directory:\n return True\n return False\n",
"role": "user"
},
{
"content": "file_in_confined_directories",
"role": "assistant"
}
] |
def x(roles, delegated_role):
securesystemslib.formats.ROLELIST_SCHEMA.check_match(roles)
securesystemslib.formats.ROLENAME_SCHEMA.check_match(delegated_role)
role_index = None
for index in six.moves.xrange(len(roles)):
role = roles[index]
name = role.get('name')
if name is None:
no_name_message = 'Role with no name.'
raise securesystemslib.exceptions.RepositoryError(no_name_message)
elif name == delegated_role:
if role_index is None:
role_index = index
else:
duplicate_role_message = 'Duplicate role (' + str(
delegated_role) + ').'
raise securesystemslib.exceptions.RepositoryError(
'Duplicate role (' + str(delegated_role) + ').')
else:
logger.debug('Skipping delegated role: ' + repr(delegated_role))
return role_index
| find_delegated_role | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(roles, delegated_role):\n securesystemslib.formats.ROLELIST_SCHEMA.check_match(roles)\n securesystemslib.formats.ROLENAME_SCHEMA.check_match(delegated_role)\n role_index = None\n for index in six.moves.xrange(len(roles)):\n role = roles[index]\n name = role.get('name')\n if name is None:\n no_name_message = 'Role with no name.'\n raise securesystemslib.exceptions.RepositoryError(no_name_message)\n elif name == delegated_role:\n if role_index is None:\n role_index = index\n else:\n duplicate_role_message = 'Duplicate role (' + str(\n delegated_role) + ').'\n raise securesystemslib.exceptions.RepositoryError(\n 'Duplicate role (' + str(delegated_role) + ').')\n else:\n logger.debug('Skipping delegated role: ' + repr(delegated_role))\n return role_index\n",
"role": "user"
},
{
"content": "find_delegated_role",
"role": "assistant"
}
] |
def x(rolename, list_of_targets, parent_delegations):
securesystemslib.formats.ROLENAME_SCHEMA.check_match(rolename)
securesystemslib.formats.RELPATHS_SCHEMA.check_match(list_of_targets)
securesystemslib.formats.DELEGATIONS_SCHEMA.check_match(parent_delegations)
if rolename == 'targets':
return
roles = parent_delegations['roles']
role_index = find_delegated_role(roles, rolename)
if role_index is not None:
role = roles[role_index]
allowed_child_paths = role.get('paths')
allowed_child_path_hash_prefixes = role.get('path_hash_prefixes')
actual_child_targets = list_of_targets
if allowed_child_path_hash_prefixes is not None:
consistent = paths_are_consistent_with_hash_prefixes
if not consistent(actual_child_targets,
allowed_child_path_hash_prefixes):
message = (repr(rolename) +
' specifies a target that does not' +
' have a path hash prefix listed in its parent role.')
raise securesystemslib.exceptions.ForbiddenTargetError(message)
elif allowed_child_paths is not None:
for child_target in actual_child_targets:
for allowed_child_path in allowed_child_paths:
if fnmatch.fnmatch(child_target, allowed_child_path):
break
else:
raise securesystemslib.exceptions.ForbiddenTargetError(
'Role ' + repr(rolename) + ' specifies target' +
repr(child_target) + ',' +
' which is not an allowed path according to the delegations set by its parent role.'
)
else:
raise securesystemslib.exceptions.FormatError(repr(role) +
' did not contain one of the required fields ("paths" or "path_hash_prefixes").'
)
else:
raise securesystemslib.exceptions.RepositoryError(
'The parent role has not delegated to ' + repr(rolename) + '.')
| ensure_all_targets_allowed | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(rolename, list_of_targets, parent_delegations):\n securesystemslib.formats.ROLENAME_SCHEMA.check_match(rolename)\n securesystemslib.formats.RELPATHS_SCHEMA.check_match(list_of_targets)\n securesystemslib.formats.DELEGATIONS_SCHEMA.check_match(parent_delegations)\n if rolename == 'targets':\n return\n roles = parent_delegations['roles']\n role_index = find_delegated_role(roles, rolename)\n if role_index is not None:\n role = roles[role_index]\n allowed_child_paths = role.get('paths')\n allowed_child_path_hash_prefixes = role.get('path_hash_prefixes')\n actual_child_targets = list_of_targets\n if allowed_child_path_hash_prefixes is not None:\n consistent = paths_are_consistent_with_hash_prefixes\n if not consistent(actual_child_targets,\n allowed_child_path_hash_prefixes):\n message = (repr(rolename) +\n ' specifies a target that does not' +\n ' have a path hash prefix listed in its parent role.')\n raise securesystemslib.exceptions.ForbiddenTargetError(message)\n elif allowed_child_paths is not None:\n for child_target in actual_child_targets:\n for allowed_child_path in allowed_child_paths:\n if fnmatch.fnmatch(child_target, allowed_child_path):\n break\n else:\n raise securesystemslib.exceptions.ForbiddenTargetError(\n 'Role ' + repr(rolename) + ' specifies target' +\n repr(child_target) + ',' +\n ' which is not an allowed path according to the delegations set by its parent role.'\n )\n else:\n raise securesystemslib.exceptions.FormatError(repr(role) +\n ' did not contain one of the required fields (\"paths\" or \"path_hash_prefixes\").'\n )\n else:\n raise securesystemslib.exceptions.RepositoryError(\n 'The parent role has not delegated to ' + repr(rolename) + '.')\n",
"role": "user"
},
{
"content": "ensure_all_targets_allowed",
"role": "assistant"
}
] |
def x(paths, path_hash_prefixes):
securesystemslib.formats.RELPATHS_SCHEMA.check_match(paths)
securesystemslib.formats.PATH_HASH_PREFIXES_SCHEMA.check_match(
path_hash_prefixes)
consistent = False
for path in paths:
path_hash = get_target_hash(path)
consistent = False
for path_hash_prefix in path_hash_prefixes:
if path_hash.startswith(path_hash_prefix):
consistent = True
break
if not consistent:
break
return consistent
| paths_are_consistent_with_hash_prefixes | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(paths, path_hash_prefixes):\n securesystemslib.formats.RELPATHS_SCHEMA.check_match(paths)\n securesystemslib.formats.PATH_HASH_PREFIXES_SCHEMA.check_match(\n path_hash_prefixes)\n consistent = False\n for path in paths:\n path_hash = get_target_hash(path)\n consistent = False\n for path_hash_prefix in path_hash_prefixes:\n if path_hash.startswith(path_hash_prefix):\n consistent = True\n break\n if not consistent:\n break\n return consistent\n",
"role": "user"
},
{
"content": "paths_are_consistent_with_hash_prefixes",
"role": "assistant"
}
] |
def x(target_filepath):
securesystemslib.formats.RELPATH_SCHEMA.check_match(target_filepath)
digest_object = securesystemslib.hash.digest(HASH_FUNCTION)
encoded_target_filepath = target_filepath.encode('utf-8')
digest_object.update(encoded_target_filepath)
target_filepath_hash = digest_object.hexdigest()
return target_filepath_hash
| get_target_hash | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(target_filepath):\n securesystemslib.formats.RELPATH_SCHEMA.check_match(target_filepath)\n digest_object = securesystemslib.hash.digest(HASH_FUNCTION)\n encoded_target_filepath = target_filepath.encode('utf-8')\n digest_object.update(encoded_target_filepath)\n target_filepath_hash = digest_object.hexdigest()\n return target_filepath_hash\n",
"role": "user"
},
{
"content": "get_target_hash",
"role": "assistant"
}
] |
def x():
global _json_module
if _json_module is not None:
return _json_module
else:
try:
module = __import__('json')
except ImportError:
raise ImportError('Could not import the json module')
else:
_json_module = module
return module
| import_json | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x():\n global _json_module\n if _json_module is not None:\n return _json_module\n else:\n try:\n module = __import__('json')\n except ImportError:\n raise ImportError('Could not import the json module')\n else:\n _json_module = module\n return module\n",
"role": "user"
},
{
"content": "import_json",
"role": "assistant"
}
] |
def x(data):
deserialized_object = None
try:
deserialized_object = json.loads(data)
except TypeError:
message = 'Invalid JSON string: ' + repr(data)
raise securesystemslib.exceptions.Error(message)
except ValueError:
message = 'Cannot deserialize to a Python object: ' + repr(data)
raise securesystemslib.exceptions.Error(message)
else:
return deserialized_object
| load_json_string | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(data):\n deserialized_object = None\n try:\n deserialized_object = json.loads(data)\n except TypeError:\n message = 'Invalid JSON string: ' + repr(data)\n raise securesystemslib.exceptions.Error(message)\n except ValueError:\n message = 'Cannot deserialize to a Python object: ' + repr(data)\n raise securesystemslib.exceptions.Error(message)\n else:\n return deserialized_object\n",
"role": "user"
},
{
"content": "load_json_string",
"role": "assistant"
}
] |
def x(filepath):
securesystemslib.formats.PATH_SCHEMA.check_match(filepath)
deserialized_object = None
if filepath.endswith('.gz'):
logger.debug('gzip.open(' + str(filepath) + ')')
fileobject = six.StringIO(gzip.open(filepath).read().decode('utf-8'))
else:
logger.debug('open(' + str(filepath) + ')')
fileobject = open(filepath)
try:
deserialized_object = json.load(fileobject)
except (ValueError, TypeError) as e:
raise securesystemslib.exceptions.Error(
'Cannot deserialize to a Python object: ' + repr(filepath))
else:
fileobject.close()
return deserialized_object
finally:
fileobject.close()
| load_json_file | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(filepath):\n securesystemslib.formats.PATH_SCHEMA.check_match(filepath)\n deserialized_object = None\n if filepath.endswith('.gz'):\n logger.debug('gzip.open(' + str(filepath) + ')')\n fileobject = six.StringIO(gzip.open(filepath).read().decode('utf-8'))\n else:\n logger.debug('open(' + str(filepath) + ')')\n fileobject = open(filepath)\n try:\n deserialized_object = json.load(fileobject)\n except (ValueError, TypeError) as e:\n raise securesystemslib.exceptions.Error(\n 'Cannot deserialize to a Python object: ' + repr(filepath))\n else:\n fileobject.close()\n return deserialized_object\n finally:\n fileobject.close()\n",
"role": "user"
},
{
"content": "load_json_file",
"role": "assistant"
}
] |
def x(digest1, digest2):
securesystemslib.formats.HEX_SCHEMA.check_match(digest1)
securesystemslib.formats.HEX_SCHEMA.check_match(digest2)
if len(digest1) != len(digest2):
return False
are_equal = True
for element in range(len(digest1)):
if digest1[element] != digest2[element]:
are_equal = False
return are_equal
| digests_are_equal | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(digest1, digest2):\n securesystemslib.formats.HEX_SCHEMA.check_match(digest1)\n securesystemslib.formats.HEX_SCHEMA.check_match(digest2)\n if len(digest1) != len(digest2):\n return False\n are_equal = True\n for element in range(len(digest1)):\n if digest1[element] != digest2[element]:\n are_equal = False\n return are_equal\n",
"role": "user"
},
{
"content": "digests_are_equal",
"role": "assistant"
}
] |
def x(self, prefix):
try:
self.temporary_file = tempfile.NamedTemporaryFile(prefix=prefix)
except OSError as err:
logger.critical('Cannot create a system temporary directory: ' +
repr(err))
raise securesystemslib.exceptions.Error(err)
| default_temporary_directory | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, prefix):\n try:\n self.temporary_file = tempfile.NamedTemporaryFile(prefix=prefix)\n except OSError as err:\n logger.critical('Cannot create a system temporary directory: ' +\n repr(err))\n raise securesystemslib.exceptions.Error(err)\n",
"role": "user"
},
{
"content": "default_temporary_directory",
"role": "assistant"
}
] |
def x(self, size=None):
if size is None:
self.temporary_file.seek(0)
data = self.temporary_file.read()
self.temporary_file.seek(0)
return data
else:
if not (isinstance(size, int) and size > 0):
raise securesystemslib.exceptions.FormatError
return self.temporary_file.read(size)
| read | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, size=None):\n if size is None:\n self.temporary_file.seek(0)\n data = self.temporary_file.read()\n self.temporary_file.seek(0)\n return data\n else:\n if not (isinstance(size, int) and size > 0):\n raise securesystemslib.exceptions.FormatError\n return self.temporary_file.read(size)\n",
"role": "user"
},
{
"content": "read",
"role": "assistant"
}
] |
def x(self, data, auto_flush=True):
self.temporary_file.write(data)
if auto_flush:
self.flush()
| write | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, data, auto_flush=True):\n self.temporary_file.write(data)\n if auto_flush:\n self.flush()\n",
"role": "user"
},
{
"content": "write",
"role": "assistant"
}
] |
def x(self, destination_path):
self.flush()
self.seek(0)
destination_file = open(destination_path, 'wb')
shutil.copyfileobj(self.temporary_file, destination_file)
destination_file.flush()
os.fsync(destination_file.fileno())
destination_file.close()
self.close_temp_file()
| move | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, destination_path):\n self.flush()\n self.seek(0)\n destination_file = open(destination_path, 'wb')\n shutil.copyfileobj(self.temporary_file, destination_file)\n destination_file.flush()\n os.fsync(destination_file.fileno())\n destination_file.close()\n self.close_temp_file()\n",
"role": "user"
},
{
"content": "move",
"role": "assistant"
}
] |
def x(self, compression):
securesystemslib.formats.NAME_SCHEMA.check_match(compression)
if self._orig_file is not None:
raise securesystemslib.exceptions.Error(
'Can only set compression on a TempFile once.')
if compression != 'gzip':
raise securesystemslib.exceptions.Error(
'Only gzip compression is supported.')
self.seek(0)
self._compression = compression
self._orig_file = self.temporary_file
try:
gzip_file_object = gzip.GzipFile(fileobj=self.temporary_file, mode='rb'
)
uncompressed_content = gzip_file_object.read()
self.temporary_file = tempfile.NamedTemporaryFile()
self.temporary_file.write(uncompressed_content)
self.flush()
except Exception as exception:
raise securesystemslib.exceptions.DecompressionError(exception)
| decompress_temp_file_object | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, compression):\n securesystemslib.formats.NAME_SCHEMA.check_match(compression)\n if self._orig_file is not None:\n raise securesystemslib.exceptions.Error(\n 'Can only set compression on a TempFile once.')\n if compression != 'gzip':\n raise securesystemslib.exceptions.Error(\n 'Only gzip compression is supported.')\n self.seek(0)\n self._compression = compression\n self._orig_file = self.temporary_file\n try:\n gzip_file_object = gzip.GzipFile(fileobj=self.temporary_file, mode='rb'\n )\n uncompressed_content = gzip_file_object.read()\n self.temporary_file = tempfile.NamedTemporaryFile()\n self.temporary_file.write(uncompressed_content)\n self.flush()\n except Exception as exception:\n raise securesystemslib.exceptions.DecompressionError(exception)\n",
"role": "user"
},
{
"content": "decompress_temp_file_object",
"role": "assistant"
}
] |
def x(self):
self.temporary_file.close()
if self._orig_file is not None:
self._orig_file.close()
| close_temp_file | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n self.temporary_file.close()\n if self._orig_file is not None:\n self._orig_file.close()\n",
"role": "user"
},
{
"content": "close_temp_file",
"role": "assistant"
}
] |
def x(self, object):
try:
self.check_match(object)
except securesystemslib.exceptions.FormatError:
return False
else:
return True
| matches | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, object):\n try:\n self.check_match(object)\n except securesystemslib.exceptions.FormatError:\n return False\n else:\n return True\n",
"role": "user"
},
{
"content": "matches",
"role": "assistant"
}
] |
def x(self, *etypes, timeout=None):
self._validate_etypes(*etypes)
start = time.time()
e = self._eventq.get(timeout=timeout)
if isinstance(e, Exception):
raise e
self._stats['events_recieved'] += 1
if etypes and e.type not in etypes:
if timeout:
timeout -= time.time() - start
log.debug('ignoring filtered event: {}'.format(e.json))
self._stats['events_dropped'] += 1
return self.get_event(*etypes, timeout=timeout)
return e
| get_event | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, *etypes, timeout=None):\n self._validate_etypes(*etypes)\n start = time.time()\n e = self._eventq.get(timeout=timeout)\n if isinstance(e, Exception):\n raise e\n self._stats['events_recieved'] += 1\n if etypes and e.type not in etypes:\n if timeout:\n timeout -= time.time() - start\n log.debug('ignoring filtered event: {}'.format(e.json))\n self._stats['events_dropped'] += 1\n return self.get_event(*etypes, timeout=timeout)\n return e\n",
"role": "user"
},
{
"content": "get_event",
"role": "assistant"
}
] |
def x(self, *etypes, idle_timeout=None):
while self._state != STATE_STOPPED:
try:
yield self.get_event(*etypes, timeout=idle_timeout)
except Queue.Empty:
log.info('idle timeout reached for events()')
return
| events | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, *etypes, idle_timeout=None):\n while self._state != STATE_STOPPED:\n try:\n yield self.get_event(*etypes, timeout=idle_timeout)\n except Queue.Empty:\n log.info('idle timeout reached for events()')\n return\n",
"role": "user"
},
{
"content": "events",
"role": "assistant"
}
] |
def x(self, text, channel, confirm=True):
self._send_id += 1
msg = SlackMsg(self._send_id, channel.id, text)
self.ws.send(msg.json)
self._stats['messages_sent'] += 1
if confirm:
for e in self.events():
if e.get('reply_to') == self._send_id:
msg.sent = True
msg.ts = e.ts
return msg
else:
return msg
| send_msg | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, text, channel, confirm=True):\n self._send_id += 1\n msg = SlackMsg(self._send_id, channel.id, text)\n self.ws.send(msg.json)\n self._stats['messages_sent'] += 1\n if confirm:\n for e in self.events():\n if e.get('reply_to') == self._send_id:\n msg.sent = True\n msg.ts = e.ts\n return msg\n else:\n return msg\n",
"role": "user"
},
{
"content": "send_msg",
"role": "assistant"
}
] |
def x(self, event):
if event.get('user'):
event.user = self.lookup_user(event.get('user'))
if event.get('channel'):
event.channel = self.lookup_channel(event.get('channel'))
if self.user.id in event.mentions:
event.mentions_me = True
event.mentions = [self.lookup_user(uid) for uid in event.mentions]
return event
| process_event | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, event):\n if event.get('user'):\n event.user = self.lookup_user(event.get('user'))\n if event.get('channel'):\n event.channel = self.lookup_channel(event.get('channel'))\n if self.user.id in event.mentions:\n event.mentions_me = True\n event.mentions = [self.lookup_user(uid) for uid in event.mentions]\n return event\n",
"role": "user"
},
{
"content": "process_event",
"role": "assistant"
}
] |
def x(input, output=None, options={}):
if 'input_format' not in options and 'output_format' not in options:
raise ValueError('no input_format and output_format specified!')
input_format = options.get('input_format', 'yaml')
output_format = options.get('output_format', 'yaml')
parser = Parser.get_concrete_class(input_format)(**options)
writer = Writer.get_concrete_class(output_format)(**options)
if not output and not writer.single_file_output:
raise ValueError(
"this output_format requires specifying 'output' argument")
_output = output
if not _output:
_output = StringIO.StringIO()
writer.write(parser.parse(input), _output)
if not output:
return _output.getvalue()
| convert | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(input, output=None, options={}):\n if 'input_format' not in options and 'output_format' not in options:\n raise ValueError('no input_format and output_format specified!')\n input_format = options.get('input_format', 'yaml')\n output_format = options.get('output_format', 'yaml')\n parser = Parser.get_concrete_class(input_format)(**options)\n writer = Writer.get_concrete_class(output_format)(**options)\n if not output and not writer.single_file_output:\n raise ValueError(\n \"this output_format requires specifying 'output' argument\")\n _output = output\n if not _output:\n _output = StringIO.StringIO()\n writer.write(parser.parse(input), _output)\n if not output:\n return _output.getvalue()\n",
"role": "user"
},
{
"content": "convert",
"role": "assistant"
}
] |
def x(self, data_out, table):
headers = []
data = []
qualifiers_marks = []
qualifiers = {}
self._extract_independent_variables(table, headers, data, qualifiers_marks)
for dependent_variable in table.dependent_variables:
self._parse_dependent_variable(dependent_variable, headers,
qualifiers, qualifiers_marks, data)
self._write_metadata(data_out, table)
self._write_csv_data(data_out, qualifiers, qualifiers_marks, headers, data)
| write_packed_data | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, data_out, table):\n headers = []\n data = []\n qualifiers_marks = []\n qualifiers = {}\n self._extract_independent_variables(table, headers, data, qualifiers_marks)\n for dependent_variable in table.dependent_variables:\n self._parse_dependent_variable(dependent_variable, headers,\n qualifiers, qualifiers_marks, data)\n self._write_metadata(data_out, table)\n self._write_csv_data(data_out, qualifiers, qualifiers_marks, headers, data)\n",
"role": "user"
},
{
"content": "write_packed_data",
"role": "assistant"
}
] |
def x(algorithm=DEFAULT_HASH_ALGORITHM, hash_library=DEFAULT_HASH_LIBRARY):
securesystemslib.formats.NAME_SCHEMA.check_match(algorithm)
securesystemslib.formats.NAME_SCHEMA.check_match(hash_library)
if hash_library == 'hashlib' and hash_library in SUPPORTED_LIBRARIES:
try:
return hashlib.new(algorithm)
except ValueError:
raise securesystemslib.exceptions.UnsupportedAlgorithmError(
algorithm)
elif hash_library == 'pyca_crypto' and hash_library in SUPPORTED_LIBRARIES:
pass
else:
raise securesystemslib.exceptions.UnsupportedLibraryError(
'Unsupported library requested. Supported hash libraries: ' +
repr(SUPPORTED_LIBRARIES))
| digest | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(algorithm=DEFAULT_HASH_ALGORITHM, hash_library=DEFAULT_HASH_LIBRARY):\n securesystemslib.formats.NAME_SCHEMA.check_match(algorithm)\n securesystemslib.formats.NAME_SCHEMA.check_match(hash_library)\n if hash_library == 'hashlib' and hash_library in SUPPORTED_LIBRARIES:\n try:\n return hashlib.new(algorithm)\n except ValueError:\n raise securesystemslib.exceptions.UnsupportedAlgorithmError(\n algorithm)\n elif hash_library == 'pyca_crypto' and hash_library in SUPPORTED_LIBRARIES:\n pass\n else:\n raise securesystemslib.exceptions.UnsupportedLibraryError(\n 'Unsupported library requested. Supported hash libraries: ' +\n repr(SUPPORTED_LIBRARIES))\n",
"role": "user"
},
{
"content": "digest",
"role": "assistant"
}
] |
def x(file_object, algorithm=DEFAULT_HASH_ALGORITHM, hash_library=
DEFAULT_HASH_LIBRARY, normalize_line_endings=False):
securesystemslib.formats.NAME_SCHEMA.check_match(algorithm)
securesystemslib.formats.NAME_SCHEMA.check_match(hash_library)
digest_object = digest(algorithm, hash_library)
file_object.seek(0)
while True:
data = file_object.read(DEFAULT_CHUNK_SIZE)
if not data:
break
if normalize_line_endings:
while data[-1:] == b'\r':
c = file_object.read(1)
if not c:
break
data += c
data = data.replace(b'\r\n', b'\n').replace(b'\r', b'\n')
if not isinstance(data, six.binary_type):
digest_object.update(data.encode('utf-8'))
else:
digest_object.update(data)
return digest_object
| digest_fileobject | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(file_object, algorithm=DEFAULT_HASH_ALGORITHM, hash_library=\n DEFAULT_HASH_LIBRARY, normalize_line_endings=False):\n securesystemslib.formats.NAME_SCHEMA.check_match(algorithm)\n securesystemslib.formats.NAME_SCHEMA.check_match(hash_library)\n digest_object = digest(algorithm, hash_library)\n file_object.seek(0)\n while True:\n data = file_object.read(DEFAULT_CHUNK_SIZE)\n if not data:\n break\n if normalize_line_endings:\n while data[-1:] == b'\\r':\n c = file_object.read(1)\n if not c:\n break\n data += c\n data = data.replace(b'\\r\\n', b'\\n').replace(b'\\r', b'\\n')\n if not isinstance(data, six.binary_type):\n digest_object.update(data.encode('utf-8'))\n else:\n digest_object.update(data)\n return digest_object\n",
"role": "user"
},
{
"content": "digest_fileobject",
"role": "assistant"
}
] |
def x(filename, algorithm=DEFAULT_HASH_ALGORITHM, hash_library=
DEFAULT_HASH_LIBRARY, normalize_line_endings=False):
securesystemslib.formats.RELPATH_SCHEMA.check_match(filename)
securesystemslib.formats.NAME_SCHEMA.check_match(algorithm)
securesystemslib.formats.NAME_SCHEMA.check_match(hash_library)
digest_object = None
with open(filename, 'rb') as file_object:
digest_object = digest_fileobject(file_object, algorithm,
hash_library, normalize_line_endings)
return digest_object
| digest_filename | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(filename, algorithm=DEFAULT_HASH_ALGORITHM, hash_library=\n DEFAULT_HASH_LIBRARY, normalize_line_endings=False):\n securesystemslib.formats.RELPATH_SCHEMA.check_match(filename)\n securesystemslib.formats.NAME_SCHEMA.check_match(algorithm)\n securesystemslib.formats.NAME_SCHEMA.check_match(hash_library)\n digest_object = None\n with open(filename, 'rb') as file_object:\n digest_object = digest_fileobject(file_object, algorithm,\n hash_library, normalize_line_endings)\n return digest_object\n",
"role": "user"
},
{
"content": "digest_filename",
"role": "assistant"
}
] |
def x(source: str) ->CommonTokenStream:
lexer = LuaLexer(InputStream(source))
stream = CommonTokenStream(lexer)
return stream
| get_token_stream | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(source: str) ->CommonTokenStream:\n lexer = LuaLexer(InputStream(source))\n stream = CommonTokenStream(lexer)\n return stream\n",
"role": "user"
},
{
"content": "get_token_stream",
"role": "assistant"
}
] |
def x(self, slug):
endpoint = '/evolution-stone/' + slug
return self.make_request(self.BASE_URL + endpoint)
| get_evolution_stone | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, slug):\n endpoint = '/evolution-stone/' + slug\n return self.make_request(self.BASE_URL + endpoint)\n",
"role": "user"
},
{
"content": "get_evolution_stone",
"role": "assistant"
}
] |
def x(self, slug):
endpoint = '/league/' + slug
return self.make_request(self.BASE_URL + endpoint)
| get_league | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, slug):\n endpoint = '/league/' + slug\n return self.make_request(self.BASE_URL + endpoint)\n",
"role": "user"
},
{
"content": "get_league",
"role": "assistant"
}
] |
def x(self, name):
endpoint = '/pokemon/' + str(name)
return self.make_request(self.BASE_URL + endpoint)
| get_pokemon_by_name | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, name):\n endpoint = '/pokemon/' + str(name)\n return self.make_request(self.BASE_URL + endpoint)\n",
"role": "user"
},
{
"content": "get_pokemon_by_name",
"role": "assistant"
}
] |
def x(self, number):
endpoint = '/pokemon/' + str(number)
return self.make_request(self.BASE_URL + endpoint)
| get_pokemon_by_number | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, number):\n endpoint = '/pokemon/' + str(number)\n return self.make_request(self.BASE_URL + endpoint)\n",
"role": "user"
},
{
"content": "get_pokemon_by_number",
"role": "assistant"
}
] |
def x(bits=_DEFAULT_RSA_KEY_BITS):
securesystemslib.formats.RSAKEYBITS_SCHEMA.check_match(bits)
private_key = rsa.generate_private_key(public_exponent=65537, key_size=
bits, backend=default_backend())
private_pem = private_key.private_bytes(encoding=serialization.Encoding
.PEM, format=serialization.PrivateFormat.TraditionalOpenSSL,
encryption_algorithm=serialization.NoEncryption())
public_key = private_key.public_key()
public_pem = public_key.public_bytes(encoding=serialization.Encoding.
PEM, format=serialization.PublicFormat.SubjectPublicKeyInfo)
return public_pem.decode('utf-8'), private_pem.decode('utf-8')
| generate_rsa_public_and_private | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(bits=_DEFAULT_RSA_KEY_BITS):\n securesystemslib.formats.RSAKEYBITS_SCHEMA.check_match(bits)\n private_key = rsa.generate_private_key(public_exponent=65537, key_size=\n bits, backend=default_backend())\n private_pem = private_key.private_bytes(encoding=serialization.Encoding\n .PEM, format=serialization.PrivateFormat.TraditionalOpenSSL,\n encryption_algorithm=serialization.NoEncryption())\n public_key = private_key.public_key()\n public_pem = public_key.public_bytes(encoding=serialization.Encoding.\n PEM, format=serialization.PublicFormat.SubjectPublicKeyInfo)\n return public_pem.decode('utf-8'), private_pem.decode('utf-8')\n",
"role": "user"
},
{
"content": "generate_rsa_public_and_private",
"role": "assistant"
}
] |
def x(private_key, data, scheme='rsassa-pss-sha256'):
securesystemslib.formats.PEMRSA_SCHEMA.check_match(private_key)
securesystemslib.formats.DATA_SCHEMA.check_match(data)
securesystemslib.formats.RSA_SCHEME_SCHEMA.check_match(scheme)
signature = None
if len(private_key):
if scheme == 'rsassa-pss-sha256':
try:
private_key_object = load_pem_private_key(private_key.
encode('utf-8'), password=None, backend=default_backend())
signature = private_key_object.sign(data, padding.PSS(mgf=
padding.MGF1(hashes.SHA256()), salt_length=hashes.
SHA256().digest_size), hashes.SHA256())
except ValueError:
raise securesystemslib.exceptions.CryptoError(
'The private key (in PEM format) could not be deserialized.'
)
except TypeError:
raise securesystemslib.exceptions.CryptoError(
'The private key was unexpectedly encrypted.')
except cryptography.exceptions.UnsupportedAlgorithm:
raise securesystemslib.exceptions.CryptoError(
'The private key is encrypted with an unsupported algorithm.'
)
else:
raise securesystemslib.exceptions.UnsupportedAlgorithmError(
'Unsupported signature scheme is specified: ' + repr(scheme))
else:
raise ValueError('The required private key is unset.')
return signature, scheme
| create_rsa_signature | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(private_key, data, scheme='rsassa-pss-sha256'):\n securesystemslib.formats.PEMRSA_SCHEMA.check_match(private_key)\n securesystemslib.formats.DATA_SCHEMA.check_match(data)\n securesystemslib.formats.RSA_SCHEME_SCHEMA.check_match(scheme)\n signature = None\n if len(private_key):\n if scheme == 'rsassa-pss-sha256':\n try:\n private_key_object = load_pem_private_key(private_key.\n encode('utf-8'), password=None, backend=default_backend())\n signature = private_key_object.sign(data, padding.PSS(mgf=\n padding.MGF1(hashes.SHA256()), salt_length=hashes.\n SHA256().digest_size), hashes.SHA256())\n except ValueError:\n raise securesystemslib.exceptions.CryptoError(\n 'The private key (in PEM format) could not be deserialized.'\n )\n except TypeError:\n raise securesystemslib.exceptions.CryptoError(\n 'The private key was unexpectedly encrypted.')\n except cryptography.exceptions.UnsupportedAlgorithm:\n raise securesystemslib.exceptions.CryptoError(\n 'The private key is encrypted with an unsupported algorithm.'\n )\n else:\n raise securesystemslib.exceptions.UnsupportedAlgorithmError(\n 'Unsupported signature scheme is specified: ' + repr(scheme))\n else:\n raise ValueError('The required private key is unset.')\n return signature, scheme\n",
"role": "user"
},
{
"content": "create_rsa_signature",
"role": "assistant"
}
] |
def x(signature, signature_scheme, public_key, data):
securesystemslib.formats.PEMRSA_SCHEMA.check_match(public_key)
securesystemslib.formats.RSA_SCHEME_SCHEMA.check_match(signature_scheme)
securesystemslib.formats.PYCACRYPTOSIGNATURE_SCHEMA.check_match(signature)
securesystemslib.formats.DATA_SCHEMA.check_match(data)
valid_signature = False
try:
public_key_object = serialization.load_pem_public_key(public_key.
encode('utf-8'), backend=default_backend())
try:
public_key_object.verify(signature, data, padding.PSS(mgf=
padding.MGF1(hashes.SHA256()), salt_length=hashes.SHA256().
digest_size), hashes.SHA256())
return True
except cryptography.exceptions.InvalidSignature:
return False
except (ValueError, cryptography.exceptions.UnsupportedAlgorithm) as e:
raise securesystemslib.exceptions.CryptoError(
'The PEM could not be decoded successfully, or contained an unsupported key type: '
+ str(e))
| verify_rsa_signature | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(signature, signature_scheme, public_key, data):\n securesystemslib.formats.PEMRSA_SCHEMA.check_match(public_key)\n securesystemslib.formats.RSA_SCHEME_SCHEMA.check_match(signature_scheme)\n securesystemslib.formats.PYCACRYPTOSIGNATURE_SCHEMA.check_match(signature)\n securesystemslib.formats.DATA_SCHEMA.check_match(data)\n valid_signature = False\n try:\n public_key_object = serialization.load_pem_public_key(public_key.\n encode('utf-8'), backend=default_backend())\n try:\n public_key_object.verify(signature, data, padding.PSS(mgf=\n padding.MGF1(hashes.SHA256()), salt_length=hashes.SHA256().\n digest_size), hashes.SHA256())\n return True\n except cryptography.exceptions.InvalidSignature:\n return False\n except (ValueError, cryptography.exceptions.UnsupportedAlgorithm) as e:\n raise securesystemslib.exceptions.CryptoError(\n 'The PEM could not be decoded successfully, or contained an unsupported key type: '\n + str(e))\n",
"role": "user"
},
{
"content": "verify_rsa_signature",
"role": "assistant"
}
] |
def x(private_key, passphrase):
securesystemslib.formats.PEMRSA_SCHEMA.check_match(private_key)
securesystemslib.formats.PASSWORD_SCHEMA.check_match(passphrase)
if len(private_key):
try:
private_key = load_pem_private_key(private_key.encode('utf-8'),
password=None, backend=default_backend())
except ValueError:
raise securesystemslib.exceptions.CryptoError(
'The private key (in PEM format) could not be deserialized.')
else:
raise ValueError('The required private key is unset.')
encrypted_pem = private_key.private_bytes(encoding=serialization.
Encoding.PEM, format=serialization.PrivateFormat.TraditionalOpenSSL,
encryption_algorithm=serialization.BestAvailableEncryption(
passphrase.encode('utf-8')))
return encrypted_pem.decode()
| create_rsa_encrypted_pem | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(private_key, passphrase):\n securesystemslib.formats.PEMRSA_SCHEMA.check_match(private_key)\n securesystemslib.formats.PASSWORD_SCHEMA.check_match(passphrase)\n if len(private_key):\n try:\n private_key = load_pem_private_key(private_key.encode('utf-8'),\n password=None, backend=default_backend())\n except ValueError:\n raise securesystemslib.exceptions.CryptoError(\n 'The private key (in PEM format) could not be deserialized.')\n else:\n raise ValueError('The required private key is unset.')\n encrypted_pem = private_key.private_bytes(encoding=serialization.\n Encoding.PEM, format=serialization.PrivateFormat.TraditionalOpenSSL,\n encryption_algorithm=serialization.BestAvailableEncryption(\n passphrase.encode('utf-8')))\n return encrypted_pem.decode()\n",
"role": "user"
},
{
"content": "create_rsa_encrypted_pem",
"role": "assistant"
}
] |
def x(pem, passphrase=None):
securesystemslib.formats.PEMRSA_SCHEMA.check_match(pem)
if passphrase is not None:
securesystemslib.formats.PASSWORD_SCHEMA.check_match(passphrase)
passphrase = passphrase.encode('utf-8')
try:
private_key = load_pem_private_key(pem.encode('utf-8'), passphrase,
backend=default_backend())
except (ValueError, TypeError, cryptography.exceptions.UnsupportedAlgorithm
) as e:
raise securesystemslib.exceptions.CryptoError(
'RSA (public, private) tuple cannot be generated from the encrypted PEM string: '
+ str(e))
private_pem = private_key.private_bytes(encoding=serialization.Encoding
.PEM, format=serialization.PrivateFormat.TraditionalOpenSSL,
encryption_algorithm=serialization.NoEncryption())
public_key = private_key.public_key()
public_pem = public_key.public_bytes(encoding=serialization.Encoding.
PEM, format=serialization.PublicFormat.SubjectPublicKeyInfo)
return public_pem.decode(), private_pem.decode()
| create_rsa_public_and_private_from_pem | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(pem, passphrase=None):\n securesystemslib.formats.PEMRSA_SCHEMA.check_match(pem)\n if passphrase is not None:\n securesystemslib.formats.PASSWORD_SCHEMA.check_match(passphrase)\n passphrase = passphrase.encode('utf-8')\n try:\n private_key = load_pem_private_key(pem.encode('utf-8'), passphrase,\n backend=default_backend())\n except (ValueError, TypeError, cryptography.exceptions.UnsupportedAlgorithm\n ) as e:\n raise securesystemslib.exceptions.CryptoError(\n 'RSA (public, private) tuple cannot be generated from the encrypted PEM string: '\n + str(e))\n private_pem = private_key.private_bytes(encoding=serialization.Encoding\n .PEM, format=serialization.PrivateFormat.TraditionalOpenSSL,\n encryption_algorithm=serialization.NoEncryption())\n public_key = private_key.public_key()\n public_pem = public_key.public_bytes(encoding=serialization.Encoding.\n PEM, format=serialization.PublicFormat.SubjectPublicKeyInfo)\n return public_pem.decode(), private_pem.decode()\n",
"role": "user"
},
{
"content": "create_rsa_public_and_private_from_pem",
"role": "assistant"
}
] |
def x(key_object, password):
securesystemslib.formats.ANYKEY_SCHEMA.check_match(key_object)
securesystemslib.formats.PASSWORD_SCHEMA.check_match(password)
if 'private' not in key_object['keyval'] or not key_object['keyval'][
'private']:
raise securesystemslib.exceptions.FormatError(
'Key object does not contain a private part.')
salt, iterations, derived_key = _generate_derived_key(password)
derived_key_information = {'salt': salt, 'iterations': iterations,
'derived_key': derived_key}
encrypted_key = _encrypt(json.dumps(key_object), derived_key_information)
return encrypted_key
| encrypt_key | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(key_object, password):\n securesystemslib.formats.ANYKEY_SCHEMA.check_match(key_object)\n securesystemslib.formats.PASSWORD_SCHEMA.check_match(password)\n if 'private' not in key_object['keyval'] or not key_object['keyval'][\n 'private']:\n raise securesystemslib.exceptions.FormatError(\n 'Key object does not contain a private part.')\n salt, iterations, derived_key = _generate_derived_key(password)\n derived_key_information = {'salt': salt, 'iterations': iterations,\n 'derived_key': derived_key}\n encrypted_key = _encrypt(json.dumps(key_object), derived_key_information)\n return encrypted_key\n",
"role": "user"
},
{
"content": "encrypt_key",
"role": "assistant"
}
] |
def x(encrypted_key, password):
securesystemslib.formats.ENCRYPTEDKEY_SCHEMA.check_match(encrypted_key)
securesystemslib.formats.PASSWORD_SCHEMA.check_match(password)
json_data = _decrypt(encrypted_key, password)
key_object = securesystemslib.util.load_json_string(json_data.decode())
return key_object
| decrypt_key | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(encrypted_key, password):\n securesystemslib.formats.ENCRYPTEDKEY_SCHEMA.check_match(encrypted_key)\n securesystemslib.formats.PASSWORD_SCHEMA.check_match(password)\n json_data = _decrypt(encrypted_key, password)\n key_object = securesystemslib.util.load_json_string(json_data.decode())\n return key_object\n",
"role": "user"
},
{
"content": "decrypt_key",
"role": "assistant"
}
] |
def x(password, salt=None, iterations=None):
backend = default_backend()
if salt is None:
salt = os.urandom(_SALT_SIZE)
if iterations is None:
iterations = _PBKDF2_ITERATIONS
pbkdf_object = PBKDF2HMAC(algorithm=hashes.SHA256(), length=32, salt=
salt, iterations=iterations, backend=backend)
derived_key = pbkdf_object.derive(password.encode('utf-8'))
return salt, iterations, derived_key
| generate_derived_key | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(password, salt=None, iterations=None):\n backend = default_backend()\n if salt is None:\n salt = os.urandom(_SALT_SIZE)\n if iterations is None:\n iterations = _PBKDF2_ITERATIONS\n pbkdf_object = PBKDF2HMAC(algorithm=hashes.SHA256(), length=32, salt=\n salt, iterations=iterations, backend=backend)\n derived_key = pbkdf_object.derive(password.encode('utf-8'))\n return salt, iterations, derived_key\n",
"role": "user"
},
{
"content": "generate_derived_key",
"role": "assistant"
}
] |
def x(key_data, derived_key_information):
iv = os.urandom(16)
symmetric_key = derived_key_information['derived_key']
encryptor = Cipher(algorithms.AES(symmetric_key), modes.CTR(iv),
backend=default_backend()).encryptor()
ciphertext = encryptor.update(key_data.encode('utf-8')
) + encryptor.finalize()
symmetric_key = derived_key_information['derived_key']
salt = derived_key_information['salt']
hmac_object = cryptography.hazmat.primitives.hmac.HMAC(symmetric_key,
hashes.SHA256(), backend=default_backend())
hmac_object.update(ciphertext)
hmac_value = binascii.hexlify(hmac_object.finalize())
iterations = derived_key_information['iterations']
return binascii.hexlify(salt).decode() + _ENCRYPTION_DELIMITER + str(
iterations) + _ENCRYPTION_DELIMITER + hmac_value.decode(
) + _ENCRYPTION_DELIMITER + binascii.hexlify(iv).decode(
) + _ENCRYPTION_DELIMITER + binascii.hexlify(ciphertext).decode()
| encrypt | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(key_data, derived_key_information):\n iv = os.urandom(16)\n symmetric_key = derived_key_information['derived_key']\n encryptor = Cipher(algorithms.AES(symmetric_key), modes.CTR(iv),\n backend=default_backend()).encryptor()\n ciphertext = encryptor.update(key_data.encode('utf-8')\n ) + encryptor.finalize()\n symmetric_key = derived_key_information['derived_key']\n salt = derived_key_information['salt']\n hmac_object = cryptography.hazmat.primitives.hmac.HMAC(symmetric_key,\n hashes.SHA256(), backend=default_backend())\n hmac_object.update(ciphertext)\n hmac_value = binascii.hexlify(hmac_object.finalize())\n iterations = derived_key_information['iterations']\n return binascii.hexlify(salt).decode() + _ENCRYPTION_DELIMITER + str(\n iterations) + _ENCRYPTION_DELIMITER + hmac_value.decode(\n ) + _ENCRYPTION_DELIMITER + binascii.hexlify(iv).decode(\n ) + _ENCRYPTION_DELIMITER + binascii.hexlify(ciphertext).decode()\n",
"role": "user"
},
{
"content": "encrypt",
"role": "assistant"
}
] |
def x(file_contents, password):
try:
salt, iterations, hmac, iv, ciphertext = file_contents.split(
_ENCRYPTION_DELIMITER)
except ValueError:
raise securesystemslib.exceptions.CryptoError('Invalid encrypted file.'
)
salt = binascii.unhexlify(salt.encode('utf-8'))
iterations = int(iterations)
iv = binascii.unhexlify(iv.encode('utf-8'))
ciphertext = binascii.unhexlify(ciphertext.encode('utf-8'))
junk_old_salt, junk_old_iterations, symmetric_key = _generate_derived_key(
password, salt, iterations)
generated_hmac_object = cryptography.hazmat.primitives.hmac.HMAC(
symmetric_key, hashes.SHA256(), backend=default_backend())
generated_hmac_object.update(ciphertext)
generated_hmac = binascii.hexlify(generated_hmac_object.finalize())
if not securesystemslib.util.digests_are_equal(generated_hmac.decode(),
hmac):
raise securesystemslib.exceptions.CryptoError('Decryption failed.')
decryptor = Cipher(algorithms.AES(symmetric_key), modes.CTR(iv),
backend=default_backend()).decryptor()
plaintext = decryptor.update(ciphertext) + decryptor.finalize()
return plaintext
| decrypt | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(file_contents, password):\n try:\n salt, iterations, hmac, iv, ciphertext = file_contents.split(\n _ENCRYPTION_DELIMITER)\n except ValueError:\n raise securesystemslib.exceptions.CryptoError('Invalid encrypted file.'\n )\n salt = binascii.unhexlify(salt.encode('utf-8'))\n iterations = int(iterations)\n iv = binascii.unhexlify(iv.encode('utf-8'))\n ciphertext = binascii.unhexlify(ciphertext.encode('utf-8'))\n junk_old_salt, junk_old_iterations, symmetric_key = _generate_derived_key(\n password, salt, iterations)\n generated_hmac_object = cryptography.hazmat.primitives.hmac.HMAC(\n symmetric_key, hashes.SHA256(), backend=default_backend())\n generated_hmac_object.update(ciphertext)\n generated_hmac = binascii.hexlify(generated_hmac_object.finalize())\n if not securesystemslib.util.digests_are_equal(generated_hmac.decode(),\n hmac):\n raise securesystemslib.exceptions.CryptoError('Decryption failed.')\n decryptor = Cipher(algorithms.AES(symmetric_key), modes.CTR(iv),\n backend=default_backend()).decryptor()\n plaintext = decryptor.update(ciphertext) + decryptor.finalize()\n return plaintext\n",
"role": "user"
},
{
"content": "decrypt",
"role": "assistant"
}
] |
def x(home_dir, site_packages=True, clear=False, unzip_setuptools=False,
use_distribute=False):
home_dir, lib_dir, inc_dir, bin_dir = path_locations(home_dir)
py_executable = os.path.abspath(install_python(home_dir, lib_dir,
inc_dir, bin_dir, site_packages=site_packages, clear=clear))
install_distutils(lib_dir, home_dir)
if use_distribute or os.environ.get('VIRTUALENV_USE_DISTRIBUTE'):
install_distribute(py_executable, unzip=unzip_setuptools)
else:
install_setuptools(py_executable, unzip=unzip_setuptools)
install_pip(py_executable)
install_activate(home_dir, bin_dir)
| create_environment | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(home_dir, site_packages=True, clear=False, unzip_setuptools=False,\n use_distribute=False):\n home_dir, lib_dir, inc_dir, bin_dir = path_locations(home_dir)\n py_executable = os.path.abspath(install_python(home_dir, lib_dir,\n inc_dir, bin_dir, site_packages=site_packages, clear=clear))\n install_distutils(lib_dir, home_dir)\n if use_distribute or os.environ.get('VIRTUALENV_USE_DISTRIBUTE'):\n install_distribute(py_executable, unzip=unzip_setuptools)\n else:\n install_setuptools(py_executable, unzip=unzip_setuptools)\n install_pip(py_executable)\n install_activate(home_dir, bin_dir)\n",
"role": "user"
},
{
"content": "create_environment",
"role": "assistant"
}
] |
def x(lib_dir):
if [p for p in distutils.sysconfig.get_config_vars().values() if
isinstance(p, basestring) and 'lib64' in p]:
logger.debug('This system uses lib64; symlinking lib64 to lib')
assert os.path.basename(lib_dir) == 'python%s' % sys.version[:3
], 'Unexpected python lib dir: %r' % lib_dir
lib_parent = os.path.dirname(lib_dir)
assert os.path.basename(lib_parent
) == 'lib', 'Unexpected parent dir: %r' % lib_parent
copyfile(lib_parent, os.path.join(os.path.dirname(lib_parent), 'lib64')
)
| fix_lib64 | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(lib_dir):\n if [p for p in distutils.sysconfig.get_config_vars().values() if \n isinstance(p, basestring) and 'lib64' in p]:\n logger.debug('This system uses lib64; symlinking lib64 to lib')\n assert os.path.basename(lib_dir) == 'python%s' % sys.version[:3\n ], 'Unexpected python lib dir: %r' % lib_dir\n lib_parent = os.path.dirname(lib_dir)\n assert os.path.basename(lib_parent\n ) == 'lib', 'Unexpected parent dir: %r' % lib_parent\n copyfile(lib_parent, os.path.join(os.path.dirname(lib_parent), 'lib64')\n )\n",
"role": "user"
},
{
"content": "fix_lib64",
"role": "assistant"
}
] |
def x(exe):
if os.path.abspath(exe) != exe:
paths = os.environ.get('PATH', '').split(os.pathsep)
for path in paths:
if os.path.exists(os.path.join(path, exe)):
exe = os.path.join(path, exe)
break
if not os.path.exists(exe):
logger.fatal('The executable %s (from --python=%s) does not exist' %
(exe, exe))
sys.exit(3)
return exe
| resolve_interpreter | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(exe):\n if os.path.abspath(exe) != exe:\n paths = os.environ.get('PATH', '').split(os.pathsep)\n for path in paths:\n if os.path.exists(os.path.join(path, exe)):\n exe = os.path.join(path, exe)\n break\n if not os.path.exists(exe):\n logger.fatal('The executable %s (from --python=%s) does not exist' %\n (exe, exe))\n sys.exit(3)\n return exe\n",
"role": "user"
},
{
"content": "resolve_interpreter",
"role": "assistant"
}
] |
def x(home_dir):
activate_this = os.path.join(home_dir, 'bin', 'activate_this.py')
if not os.path.exists(activate_this):
logger.fatal(
"The environment doesn't have a file %s -- please re-run virtualenv on this environment to update it"
% activate_this)
fixup_scripts(home_dir)
fixup_pth_and_egg_link(home_dir)
| make_environment_relocatable | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(home_dir):\n activate_this = os.path.join(home_dir, 'bin', 'activate_this.py')\n if not os.path.exists(activate_this):\n logger.fatal(\n \"The environment doesn't have a file %s -- please re-run virtualenv on this environment to update it\"\n % activate_this)\n fixup_scripts(home_dir)\n fixup_pth_and_egg_link(home_dir)\n",
"role": "user"
},
{
"content": "make_environment_relocatable",
"role": "assistant"
}
] |
def x(bits=_DEFAULT_RSA_KEY_BITS, scheme='rsassa-pss-sha256'):
securesystemslib.formats.RSAKEYBITS_SCHEMA.check_match(bits)
securesystemslib.formats.RSA_SCHEME_SCHEMA.check_match(scheme)
rsakey_dict = {}
keytype = 'rsa'
public = None
private = None
public, private = (securesystemslib.pyca_crypto_keys.
generate_rsa_public_and_private(bits))
public = extract_pem(public, private_pem=False)
private = extract_pem(private, private_pem=True)
key_value = {'public': public.replace('\r\n', '\n'), 'private': ''}
keyid = _get_keyid(keytype, scheme, key_value)
key_value['private'] = private
rsakey_dict['keytype'] = keytype
rsakey_dict['scheme'] = scheme
rsakey_dict['keyid'] = keyid
rsakey_dict['keyid_hash_algorithms'
] = securesystemslib.settings.HASH_ALGORITHMS
rsakey_dict['keyval'] = key_value
return rsakey_dict
| generate_rsa_key | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(bits=_DEFAULT_RSA_KEY_BITS, scheme='rsassa-pss-sha256'):\n securesystemslib.formats.RSAKEYBITS_SCHEMA.check_match(bits)\n securesystemslib.formats.RSA_SCHEME_SCHEMA.check_match(scheme)\n rsakey_dict = {}\n keytype = 'rsa'\n public = None\n private = None\n public, private = (securesystemslib.pyca_crypto_keys.\n generate_rsa_public_and_private(bits))\n public = extract_pem(public, private_pem=False)\n private = extract_pem(private, private_pem=True)\n key_value = {'public': public.replace('\\r\\n', '\\n'), 'private': ''}\n keyid = _get_keyid(keytype, scheme, key_value)\n key_value['private'] = private\n rsakey_dict['keytype'] = keytype\n rsakey_dict['scheme'] = scheme\n rsakey_dict['keyid'] = keyid\n rsakey_dict['keyid_hash_algorithms'\n ] = securesystemslib.settings.HASH_ALGORITHMS\n rsakey_dict['keyval'] = key_value\n return rsakey_dict\n",
"role": "user"
},
{
"content": "generate_rsa_key",
"role": "assistant"
}
] |
def x(scheme='ecdsa-sha2-nistp256'):
securesystemslib.formats.ECDSA_SCHEME_SCHEMA.check_match(scheme)
ecdsa_key = {}
keytype = 'ecdsa-sha2-nistp256'
public = None
private = None
public, private = securesystemslib.ecdsa_keys.generate_public_and_private(
scheme)
key_value = {'public': public.replace('\r\n', '\n'), 'private': ''}
keyid = _get_keyid(keytype, scheme, key_value)
key_value['private'] = private
ecdsa_key['keytype'] = keytype
ecdsa_key['scheme'] = scheme
ecdsa_key['keyid'] = keyid
ecdsa_key['keyval'] = key_value
ecdsa_key['keyid_hash_algorithms'
] = securesystemslib.settings.HASH_ALGORITHMS
return ecdsa_key
| generate_ecdsa_key | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(scheme='ecdsa-sha2-nistp256'):\n securesystemslib.formats.ECDSA_SCHEME_SCHEMA.check_match(scheme)\n ecdsa_key = {}\n keytype = 'ecdsa-sha2-nistp256'\n public = None\n private = None\n public, private = securesystemslib.ecdsa_keys.generate_public_and_private(\n scheme)\n key_value = {'public': public.replace('\\r\\n', '\\n'), 'private': ''}\n keyid = _get_keyid(keytype, scheme, key_value)\n key_value['private'] = private\n ecdsa_key['keytype'] = keytype\n ecdsa_key['scheme'] = scheme\n ecdsa_key['keyid'] = keyid\n ecdsa_key['keyval'] = key_value\n ecdsa_key['keyid_hash_algorithms'\n ] = securesystemslib.settings.HASH_ALGORITHMS\n return ecdsa_key\n",
"role": "user"
},
{
"content": "generate_ecdsa_key",
"role": "assistant"
}
] |
def x(scheme='ed25519'):
securesystemslib.formats.ED25519_SIG_SCHEMA.check_match(scheme)
ed25519_key = {}
keytype = 'ed25519'
public = None
private = None
public, private = (securesystemslib.ed25519_keys.
generate_public_and_private())
key_value = {'public': binascii.hexlify(public).decode(), 'private': ''}
keyid = _get_keyid(keytype, scheme, key_value)
key_value['private'] = binascii.hexlify(private).decode()
ed25519_key['keytype'] = keytype
ed25519_key['scheme'] = scheme
ed25519_key['keyid'] = keyid
ed25519_key['keyid_hash_algorithms'
] = securesystemslib.settings.HASH_ALGORITHMS
ed25519_key['keyval'] = key_value
return ed25519_key
| generate_ed25519_key | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(scheme='ed25519'):\n securesystemslib.formats.ED25519_SIG_SCHEMA.check_match(scheme)\n ed25519_key = {}\n keytype = 'ed25519'\n public = None\n private = None\n public, private = (securesystemslib.ed25519_keys.\n generate_public_and_private())\n key_value = {'public': binascii.hexlify(public).decode(), 'private': ''}\n keyid = _get_keyid(keytype, scheme, key_value)\n key_value['private'] = binascii.hexlify(private).decode()\n ed25519_key['keytype'] = keytype\n ed25519_key['scheme'] = scheme\n ed25519_key['keyid'] = keyid\n ed25519_key['keyid_hash_algorithms'\n ] = securesystemslib.settings.HASH_ALGORITHMS\n ed25519_key['keyval'] = key_value\n return ed25519_key\n",
"role": "user"
},
{
"content": "generate_ed25519_key",
"role": "assistant"
}
] |
def x(keytype, scheme, key_value, private=False):
securesystemslib.formats.KEYTYPE_SCHEMA.check_match(keytype)
securesystemslib.formats.SCHEME_SCHEMA.check_match(scheme)
securesystemslib.formats.KEYVAL_SCHEMA.check_match(key_value)
if private is True:
if 'private' not in key_value:
raise securesystemslib.exceptions.FormatError(
'The required private key is missing from: ' + repr(key_value))
else:
return {'keytype': keytype, 'scheme': scheme, 'keyval': key_value}
else:
public_key_value = {'public': key_value['public']}
return {'keytype': keytype, 'scheme': scheme,
'keyid_hash_algorithms': securesystemslib.settings.
HASH_ALGORITHMS, 'keyval': public_key_value}
| format_keyval_to_metadata | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(keytype, scheme, key_value, private=False):\n securesystemslib.formats.KEYTYPE_SCHEMA.check_match(keytype)\n securesystemslib.formats.SCHEME_SCHEMA.check_match(scheme)\n securesystemslib.formats.KEYVAL_SCHEMA.check_match(key_value)\n if private is True:\n if 'private' not in key_value:\n raise securesystemslib.exceptions.FormatError(\n 'The required private key is missing from: ' + repr(key_value))\n else:\n return {'keytype': keytype, 'scheme': scheme, 'keyval': key_value}\n else:\n public_key_value = {'public': key_value['public']}\n return {'keytype': keytype, 'scheme': scheme,\n 'keyid_hash_algorithms': securesystemslib.settings.\n HASH_ALGORITHMS, 'keyval': public_key_value}\n",
"role": "user"
},
{
"content": "format_keyval_to_metadata",
"role": "assistant"
}
] |
def x(key_metadata):
securesystemslib.formats.KEY_SCHEMA.check_match(key_metadata)
key_dict = {}
keytype = key_metadata['keytype']
scheme = key_metadata['scheme']
key_value = key_metadata['keyval']
default_keyid = _get_keyid(keytype, scheme, key_value)
keyids = set()
keyids.add(default_keyid)
for hash_algorithm in securesystemslib.settings.HASH_ALGORITHMS:
keyid = _get_keyid(keytype, scheme, key_value, hash_algorithm)
keyids.add(keyid)
key_dict['keytype'] = keytype
key_dict['scheme'] = scheme
key_dict['keyid'] = default_keyid
key_dict['keyid_hash_algorithms'
] = securesystemslib.settings.HASH_ALGORITHMS
key_dict['keyval'] = key_value
return key_dict, keyids
| format_metadata_to_key | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(key_metadata):\n securesystemslib.formats.KEY_SCHEMA.check_match(key_metadata)\n key_dict = {}\n keytype = key_metadata['keytype']\n scheme = key_metadata['scheme']\n key_value = key_metadata['keyval']\n default_keyid = _get_keyid(keytype, scheme, key_value)\n keyids = set()\n keyids.add(default_keyid)\n for hash_algorithm in securesystemslib.settings.HASH_ALGORITHMS:\n keyid = _get_keyid(keytype, scheme, key_value, hash_algorithm)\n keyids.add(keyid)\n key_dict['keytype'] = keytype\n key_dict['scheme'] = scheme\n key_dict['keyid'] = default_keyid\n key_dict['keyid_hash_algorithms'\n ] = securesystemslib.settings.HASH_ALGORITHMS\n key_dict['keyval'] = key_value\n return key_dict, keyids\n",
"role": "user"
},
{
"content": "format_metadata_to_key",
"role": "assistant"
}
] |
def x(keytype, scheme, key_value, hash_algorithm='sha256'):
key_meta = format_keyval_to_metadata(keytype, scheme, key_value,
private=False)
key_update_data = securesystemslib.formats.encode_canonical(key_meta)
digest_object = securesystemslib.hash.digest(hash_algorithm)
digest_object.update(key_update_data.encode('utf-8'))
keyid = digest_object.hexdigest()
return keyid
| get_keyid | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(keytype, scheme, key_value, hash_algorithm='sha256'):\n key_meta = format_keyval_to_metadata(keytype, scheme, key_value,\n private=False)\n key_update_data = securesystemslib.formats.encode_canonical(key_meta)\n digest_object = securesystemslib.hash.digest(hash_algorithm)\n digest_object.update(key_update_data.encode('utf-8'))\n keyid = digest_object.hexdigest()\n return keyid\n",
"role": "user"
},
{
"content": "get_keyid",
"role": "assistant"
}
] |
def x(key_dict, data):
securesystemslib.formats.ANYKEY_SCHEMA.check_match(key_dict)
signature = {}
keytype = key_dict['keytype']
scheme = key_dict['scheme']
public = key_dict['keyval']['public']
private = key_dict['keyval']['private']
keyid = key_dict['keyid']
sig = None
if keytype == 'rsa':
if scheme == 'rsassa-pss-sha256':
private = private.replace('\r\n', '\n')
sig, scheme = (securesystemslib.pyca_crypto_keys.
create_rsa_signature(private, data, scheme))
else:
raise securesystemslib.exceptions.UnsupportedAlgorithmError(
'Unsupported RSA signature scheme specified: ' + repr(scheme))
elif keytype == 'ed25519':
public = binascii.unhexlify(public.encode('utf-8'))
private = binascii.unhexlify(private.encode('utf-8'))
sig, scheme = securesystemslib.ed25519_keys.create_signature(public,
private, data, scheme)
elif keytype == 'ecdsa-sha2-nistp256':
sig, scheme = securesystemslib.ecdsa_keys.create_signature(public,
private, data, scheme)
else:
raise TypeError('Invalid key type.')
signature['keyid'] = keyid
signature['sig'] = binascii.hexlify(sig).decode()
return signature
| create_signature | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(key_dict, data):\n securesystemslib.formats.ANYKEY_SCHEMA.check_match(key_dict)\n signature = {}\n keytype = key_dict['keytype']\n scheme = key_dict['scheme']\n public = key_dict['keyval']['public']\n private = key_dict['keyval']['private']\n keyid = key_dict['keyid']\n sig = None\n if keytype == 'rsa':\n if scheme == 'rsassa-pss-sha256':\n private = private.replace('\\r\\n', '\\n')\n sig, scheme = (securesystemslib.pyca_crypto_keys.\n create_rsa_signature(private, data, scheme))\n else:\n raise securesystemslib.exceptions.UnsupportedAlgorithmError(\n 'Unsupported RSA signature scheme specified: ' + repr(scheme))\n elif keytype == 'ed25519':\n public = binascii.unhexlify(public.encode('utf-8'))\n private = binascii.unhexlify(private.encode('utf-8'))\n sig, scheme = securesystemslib.ed25519_keys.create_signature(public,\n private, data, scheme)\n elif keytype == 'ecdsa-sha2-nistp256':\n sig, scheme = securesystemslib.ecdsa_keys.create_signature(public,\n private, data, scheme)\n else:\n raise TypeError('Invalid key type.')\n signature['keyid'] = keyid\n signature['sig'] = binascii.hexlify(sig).decode()\n return signature\n",
"role": "user"
},
{
"content": "create_signature",
"role": "assistant"
}
] |
def x(key_dict, signature, data):
securesystemslib.formats.ANYKEY_SCHEMA.check_match(key_dict)
securesystemslib.formats.SIGNATURE_SCHEMA.check_match(signature)
if key_dict['keyid'] != signature['keyid']:
raise securesystemslib.exceptions.CryptoError('The KEYID ( ' + repr
(key_dict['keyid']) +
' ) in the given key does not match the KEYID ( ' + repr(
signature['keyid']) + ' ) in the signature.')
else:
logger.debug('The KEYIDs of key_dict and the signature match.')
sig = signature['sig']
sig = binascii.unhexlify(sig.encode('utf-8'))
public = key_dict['keyval']['public']
keytype = key_dict['keytype']
scheme = key_dict['scheme']
valid_signature = False
if keytype == 'rsa':
if scheme == 'rsassa-pss-sha256':
valid_signature = (securesystemslib.pyca_crypto_keys.
verify_rsa_signature(sig, scheme, public, data))
else:
raise securesystemslib.exceptions.UnsupportedAlgorithmError(
'Unsupported signature scheme is specified: ' + repr(scheme))
elif keytype == 'ed25519':
if scheme == 'ed25519':
public = binascii.unhexlify(public.encode('utf-8'))
valid_signature = securesystemslib.ed25519_keys.verify_signature(
public, scheme, sig, data, use_pynacl=USE_PYNACL)
else:
raise securesystemslib.exceptions.UnsupportedAlgorithmError(
'Unsupported signature scheme is specified: ' + repr(scheme))
elif keytype == 'ecdsa-sha2-nistp256':
if scheme == 'ecdsa-sha2-nistp256':
valid_signature = securesystemslib.ecdsa_keys.verify_signature(
public, scheme, sig, data)
else:
raise securesystemslib.exceptions.UnsupportedAlgorithmError(
'Unsupported signature scheme is specified: ' + repr(scheme))
else:
raise TypeError('Unsupported key type.')
return valid_signature
| verify_signature | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(key_dict, signature, data):\n securesystemslib.formats.ANYKEY_SCHEMA.check_match(key_dict)\n securesystemslib.formats.SIGNATURE_SCHEMA.check_match(signature)\n if key_dict['keyid'] != signature['keyid']:\n raise securesystemslib.exceptions.CryptoError('The KEYID ( ' + repr\n (key_dict['keyid']) +\n ' ) in the given key does not match the KEYID ( ' + repr(\n signature['keyid']) + ' ) in the signature.')\n else:\n logger.debug('The KEYIDs of key_dict and the signature match.')\n sig = signature['sig']\n sig = binascii.unhexlify(sig.encode('utf-8'))\n public = key_dict['keyval']['public']\n keytype = key_dict['keytype']\n scheme = key_dict['scheme']\n valid_signature = False\n if keytype == 'rsa':\n if scheme == 'rsassa-pss-sha256':\n valid_signature = (securesystemslib.pyca_crypto_keys.\n verify_rsa_signature(sig, scheme, public, data))\n else:\n raise securesystemslib.exceptions.UnsupportedAlgorithmError(\n 'Unsupported signature scheme is specified: ' + repr(scheme))\n elif keytype == 'ed25519':\n if scheme == 'ed25519':\n public = binascii.unhexlify(public.encode('utf-8'))\n valid_signature = securesystemslib.ed25519_keys.verify_signature(\n public, scheme, sig, data, use_pynacl=USE_PYNACL)\n else:\n raise securesystemslib.exceptions.UnsupportedAlgorithmError(\n 'Unsupported signature scheme is specified: ' + repr(scheme))\n elif keytype == 'ecdsa-sha2-nistp256':\n if scheme == 'ecdsa-sha2-nistp256':\n valid_signature = securesystemslib.ecdsa_keys.verify_signature(\n public, scheme, sig, data)\n else:\n raise securesystemslib.exceptions.UnsupportedAlgorithmError(\n 'Unsupported signature scheme is specified: ' + repr(scheme))\n else:\n raise TypeError('Unsupported key type.')\n return valid_signature\n",
"role": "user"
},
{
"content": "verify_signature",
"role": "assistant"
}
] |
def x(pem, scheme='rsassa-pss-sha256', password=None):
securesystemslib.formats.PEMRSA_SCHEMA.check_match(pem)
securesystemslib.formats.RSA_SCHEME_SCHEMA.check_match(scheme)
if password is not None:
securesystemslib.formats.PASSWORD_SCHEMA.check_match(password)
else:
logger.debug(
'The password/passphrase is unset. The PEM is expected to be unencrypted.'
)
rsakey_dict = {}
keytype = 'rsa'
public = None
private = None
public, private = (securesystemslib.pyca_crypto_keys.
create_rsa_public_and_private_from_pem(pem, password))
public = extract_pem(public, private_pem=False)
private = extract_pem(private, private_pem=True)
key_value = {'public': public.replace('\r\n', '\n'), 'private': ''}
keyid = _get_keyid(keytype, scheme, key_value)
key_value['private'] = private
rsakey_dict['keytype'] = keytype
rsakey_dict['scheme'] = scheme
rsakey_dict['keyid'] = keyid
rsakey_dict['keyval'] = key_value
return rsakey_dict
| import_rsakey_from_private_pem | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(pem, scheme='rsassa-pss-sha256', password=None):\n securesystemslib.formats.PEMRSA_SCHEMA.check_match(pem)\n securesystemslib.formats.RSA_SCHEME_SCHEMA.check_match(scheme)\n if password is not None:\n securesystemslib.formats.PASSWORD_SCHEMA.check_match(password)\n else:\n logger.debug(\n 'The password/passphrase is unset. The PEM is expected to be unencrypted.'\n )\n rsakey_dict = {}\n keytype = 'rsa'\n public = None\n private = None\n public, private = (securesystemslib.pyca_crypto_keys.\n create_rsa_public_and_private_from_pem(pem, password))\n public = extract_pem(public, private_pem=False)\n private = extract_pem(private, private_pem=True)\n key_value = {'public': public.replace('\\r\\n', '\\n'), 'private': ''}\n keyid = _get_keyid(keytype, scheme, key_value)\n key_value['private'] = private\n rsakey_dict['keytype'] = keytype\n rsakey_dict['scheme'] = scheme\n rsakey_dict['keyid'] = keyid\n rsakey_dict['keyval'] = key_value\n return rsakey_dict\n",
"role": "user"
},
{
"content": "import_rsakey_from_private_pem",
"role": "assistant"
}
] |
def x(pem, scheme='rsassa-pss-sha256'):
securesystemslib.formats.PEMRSA_SCHEMA.check_match(pem)
securesystemslib.formats.RSA_SCHEME_SCHEMA.check_match(scheme)
if is_pem_public(pem):
public_pem = extract_pem(pem, private_pem=False)
else:
raise securesystemslib.exceptions.FormatError(
'Invalid public pem: ' + repr(pem))
rsakey_dict = {}
keytype = 'rsa'
key_value = {'public': public_pem.replace('\r\n', '\n'), 'private': ''}
keyid = _get_keyid(keytype, scheme, key_value)
rsakey_dict['keytype'] = keytype
rsakey_dict['scheme'] = scheme
rsakey_dict['keyid'] = keyid
rsakey_dict['keyval'] = key_value
rsakey_dict['keyid_hash_algorithms'
] = securesystemslib.settings.HASH_ALGORITHMS
return rsakey_dict
| import_rsakey_from_public_pem | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(pem, scheme='rsassa-pss-sha256'):\n securesystemslib.formats.PEMRSA_SCHEMA.check_match(pem)\n securesystemslib.formats.RSA_SCHEME_SCHEMA.check_match(scheme)\n if is_pem_public(pem):\n public_pem = extract_pem(pem, private_pem=False)\n else:\n raise securesystemslib.exceptions.FormatError(\n 'Invalid public pem: ' + repr(pem))\n rsakey_dict = {}\n keytype = 'rsa'\n key_value = {'public': public_pem.replace('\\r\\n', '\\n'), 'private': ''}\n keyid = _get_keyid(keytype, scheme, key_value)\n rsakey_dict['keytype'] = keytype\n rsakey_dict['scheme'] = scheme\n rsakey_dict['keyid'] = keyid\n rsakey_dict['keyval'] = key_value\n rsakey_dict['keyid_hash_algorithms'\n ] = securesystemslib.settings.HASH_ALGORITHMS\n return rsakey_dict\n",
"role": "user"
},
{
"content": "import_rsakey_from_public_pem",
"role": "assistant"
}
] |
def x(pem, private_pem=False):
if private_pem:
pem_header = '-----BEGIN RSA PRIVATE KEY-----'
pem_footer = '-----END RSA PRIVATE KEY-----'
else:
pem_header = '-----BEGIN PUBLIC KEY-----'
pem_footer = '-----END PUBLIC KEY-----'
header_start = 0
footer_start = 0
try:
header_start = pem.index(pem_header)
except ValueError:
if not private_pem:
raise securesystemslib.exceptions.FormatError(
'Required PEM header ' + repr(pem_header) +
"""
not found in PEM string: """ + repr(pem))
else:
raise securesystemslib.exceptions.FormatError(
'Required PEM header ' + repr(pem_header) +
"""
not found in private PEM string.""")
try:
footer_start = pem.index(pem_footer, header_start + len(pem_header))
except ValueError:
if not private_pem:
raise securesystemslib.exceptions.FormatError(
'Required PEM footer ' + repr(pem_footer) +
"""
not found in PEM string """ + repr(pem))
else:
raise securesystemslib.exceptions.FormatError(
'Required PEM footer ' + repr(pem_footer) +
"""
not found in private PEM string.""")
pem = pem[header_start:footer_start + len(pem_footer)]
return pem
| extract_pem | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(pem, private_pem=False):\n if private_pem:\n pem_header = '-----BEGIN RSA PRIVATE KEY-----'\n pem_footer = '-----END RSA PRIVATE KEY-----'\n else:\n pem_header = '-----BEGIN PUBLIC KEY-----'\n pem_footer = '-----END PUBLIC KEY-----'\n header_start = 0\n footer_start = 0\n try:\n header_start = pem.index(pem_header)\n except ValueError:\n if not private_pem:\n raise securesystemslib.exceptions.FormatError(\n 'Required PEM header ' + repr(pem_header) +\n \"\"\"\n not found in PEM string: \"\"\" + repr(pem))\n else:\n raise securesystemslib.exceptions.FormatError(\n 'Required PEM header ' + repr(pem_header) +\n \"\"\"\n not found in private PEM string.\"\"\")\n try:\n footer_start = pem.index(pem_footer, header_start + len(pem_header))\n except ValueError:\n if not private_pem:\n raise securesystemslib.exceptions.FormatError(\n 'Required PEM footer ' + repr(pem_footer) +\n \"\"\"\n not found in PEM string \"\"\" + repr(pem))\n else:\n raise securesystemslib.exceptions.FormatError(\n 'Required PEM footer ' + repr(pem_footer) +\n \"\"\"\n not found in private PEM string.\"\"\")\n pem = pem[header_start:footer_start + len(pem_footer)]\n return pem\n",
"role": "user"
},
{
"content": "extract_pem",
"role": "assistant"
}
] |
def x(key_object, password):
securesystemslib.formats.ANYKEY_SCHEMA.check_match(key_object)
securesystemslib.formats.PASSWORD_SCHEMA.check_match(password)
encrypted_key = None
encrypted_key = securesystemslib.pyca_crypto_keys.encrypt_key(key_object,
password)
return encrypted_key
| encrypt_key | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(key_object, password):\n securesystemslib.formats.ANYKEY_SCHEMA.check_match(key_object)\n securesystemslib.formats.PASSWORD_SCHEMA.check_match(password)\n encrypted_key = None\n encrypted_key = securesystemslib.pyca_crypto_keys.encrypt_key(key_object,\n password)\n return encrypted_key\n",
"role": "user"
},
{
"content": "encrypt_key",
"role": "assistant"
}
] |
def x(encrypted_key, passphrase):
securesystemslib.formats.ENCRYPTEDKEY_SCHEMA.check_match(encrypted_key)
securesystemslib.formats.PASSWORD_SCHEMA.check_match(passphrase)
key_object = None
key_object = securesystemslib.pyca_crypto_keys.decrypt_key(encrypted_key,
passphrase)
return key_object
| decrypt_key | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(encrypted_key, passphrase):\n securesystemslib.formats.ENCRYPTEDKEY_SCHEMA.check_match(encrypted_key)\n securesystemslib.formats.PASSWORD_SCHEMA.check_match(passphrase)\n key_object = None\n key_object = securesystemslib.pyca_crypto_keys.decrypt_key(encrypted_key,\n passphrase)\n return key_object\n",
"role": "user"
},
{
"content": "decrypt_key",
"role": "assistant"
}
] |
def x(private_key, passphrase):
securesystemslib.formats.PEMRSA_SCHEMA.check_match(private_key)
securesystemslib.formats.PASSWORD_SCHEMA.check_match(passphrase)
encrypted_pem = None
encrypted_pem = securesystemslib.pyca_crypto_keys.create_rsa_encrypted_pem(
private_key, passphrase)
return encrypted_pem
| create_rsa_encrypted_pem | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(private_key, passphrase):\n securesystemslib.formats.PEMRSA_SCHEMA.check_match(private_key)\n securesystemslib.formats.PASSWORD_SCHEMA.check_match(passphrase)\n encrypted_pem = None\n encrypted_pem = securesystemslib.pyca_crypto_keys.create_rsa_encrypted_pem(\n private_key, passphrase)\n return encrypted_pem\n",
"role": "user"
},
{
"content": "create_rsa_encrypted_pem",
"role": "assistant"
}
] |
def x(pem):
securesystemslib.formats.PEMRSA_SCHEMA.check_match(pem)
pem_header = '-----BEGIN PUBLIC KEY-----'
pem_footer = '-----END PUBLIC KEY-----'
try:
header_start = pem.index(pem_header)
pem.index(pem_footer, header_start + len(pem_header))
except ValueError:
return False
return True
| is_pem_public | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(pem):\n securesystemslib.formats.PEMRSA_SCHEMA.check_match(pem)\n pem_header = '-----BEGIN PUBLIC KEY-----'\n pem_footer = '-----END PUBLIC KEY-----'\n try:\n header_start = pem.index(pem_header)\n pem.index(pem_footer, header_start + len(pem_header))\n except ValueError:\n return False\n return True\n",
"role": "user"
},
{
"content": "is_pem_public",
"role": "assistant"
}
] |
def x(pem, keytype='rsa'):
securesystemslib.formats.PEMRSA_SCHEMA.check_match(pem)
securesystemslib.formats.NAME_SCHEMA.check_match(keytype)
if keytype == 'rsa':
pem_header = '-----BEGIN RSA PRIVATE KEY-----'
pem_footer = '-----END RSA PRIVATE KEY-----'
elif keytype == 'ec':
pem_header = '-----BEGIN EC PRIVATE KEY-----'
pem_footer = '-----END EC PRIVATE KEY-----'
else:
raise securesystemslib.exceptions.FormatError(
'Unsupported key type: ' + repr(keytype) +
'. Supported keytypes: ["rsa", "ec"]')
try:
header_start = pem.index(pem_header)
pem.index(pem_footer, header_start + len(pem_header))
except ValueError:
return False
return True
| is_pem_private | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(pem, keytype='rsa'):\n securesystemslib.formats.PEMRSA_SCHEMA.check_match(pem)\n securesystemslib.formats.NAME_SCHEMA.check_match(keytype)\n if keytype == 'rsa':\n pem_header = '-----BEGIN RSA PRIVATE KEY-----'\n pem_footer = '-----END RSA PRIVATE KEY-----'\n elif keytype == 'ec':\n pem_header = '-----BEGIN EC PRIVATE KEY-----'\n pem_footer = '-----END EC PRIVATE KEY-----'\n else:\n raise securesystemslib.exceptions.FormatError(\n 'Unsupported key type: ' + repr(keytype) +\n '. Supported keytypes: [\"rsa\", \"ec\"]')\n try:\n header_start = pem.index(pem_header)\n pem.index(pem_footer, header_start + len(pem_header))\n except ValueError:\n return False\n return True\n",
"role": "user"
},
{
"content": "is_pem_private",
"role": "assistant"
}
] |
def x(pem, scheme='ecdsa-sha2-nistp256', password=None):
securesystemslib.formats.PEMECDSA_SCHEMA.check_match(pem)
securesystemslib.formats.ECDSA_SCHEME_SCHEMA.check_match(scheme)
if password is not None:
securesystemslib.formats.PASSWORD_SCHEMA.check_match(password)
else:
logger.debug(
'The password/passphrase is unset. The PEM is expected to be unencrypted.'
)
ecdsakey_dict = {}
keytype = 'ecdsa-sha2-nistp256'
public = None
private = None
public, private = (securesystemslib.ecdsa_keys.
create_ecdsa_public_and_private_from_pem(pem, password))
key_value = {'public': public.replace('\r\n', '\n'), 'private': ''}
keyid = _get_keyid(keytype, scheme, key_value)
key_value['private'] = private
ecdsakey_dict['keytype'] = keytype
ecdsakey_dict['scheme'] = scheme
ecdsakey_dict['keyid'] = keyid
ecdsakey_dict['keyval'] = key_value
ecdsakey_dict['keyid_hash_algorithms'
] = securesystemslib.settings.HASH_ALGORITHMS
return ecdsakey_dict
| import_ecdsakey_from_private_pem | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(pem, scheme='ecdsa-sha2-nistp256', password=None):\n securesystemslib.formats.PEMECDSA_SCHEMA.check_match(pem)\n securesystemslib.formats.ECDSA_SCHEME_SCHEMA.check_match(scheme)\n if password is not None:\n securesystemslib.formats.PASSWORD_SCHEMA.check_match(password)\n else:\n logger.debug(\n 'The password/passphrase is unset. The PEM is expected to be unencrypted.'\n )\n ecdsakey_dict = {}\n keytype = 'ecdsa-sha2-nistp256'\n public = None\n private = None\n public, private = (securesystemslib.ecdsa_keys.\n create_ecdsa_public_and_private_from_pem(pem, password))\n key_value = {'public': public.replace('\\r\\n', '\\n'), 'private': ''}\n keyid = _get_keyid(keytype, scheme, key_value)\n key_value['private'] = private\n ecdsakey_dict['keytype'] = keytype\n ecdsakey_dict['scheme'] = scheme\n ecdsakey_dict['keyid'] = keyid\n ecdsakey_dict['keyval'] = key_value\n ecdsakey_dict['keyid_hash_algorithms'\n ] = securesystemslib.settings.HASH_ALGORITHMS\n return ecdsakey_dict\n",
"role": "user"
},
{
"content": "import_ecdsakey_from_private_pem",
"role": "assistant"
}
] |
def x(pem, scheme='ecdsa-sha2-nistp256'):
securesystemslib.formats.PEMECDSA_SCHEMA.check_match(pem)
securesystemslib.formats.ECDSA_SCHEME_SCHEMA.check_match(scheme)
if is_pem_public(pem):
public_pem = extract_pem(pem, private_pem=False)
else:
raise securesystemslib.exceptions.FormatError(
'Invalid public pem: ' + repr(pem))
ecdsakey_dict = {}
keytype = 'ecdsa-sha2-nistp256'
key_value = {'public': public_pem.replace('\r\n', '\n'), 'private': ''}
keyid = _get_keyid(keytype, scheme, key_value)
ecdsakey_dict['keytype'] = keytype
ecdsakey_dict['scheme'] = scheme
ecdsakey_dict['keyid'] = keyid
ecdsakey_dict['keyval'] = key_value
ecdsakey_dict['keyid_hash_algorithms'
] = securesystemslib.settings.HASH_ALGORITHMS
return ecdsakey_dict
| import_ecdsakey_from_public_pem | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(pem, scheme='ecdsa-sha2-nistp256'):\n securesystemslib.formats.PEMECDSA_SCHEMA.check_match(pem)\n securesystemslib.formats.ECDSA_SCHEME_SCHEMA.check_match(scheme)\n if is_pem_public(pem):\n public_pem = extract_pem(pem, private_pem=False)\n else:\n raise securesystemslib.exceptions.FormatError(\n 'Invalid public pem: ' + repr(pem))\n ecdsakey_dict = {}\n keytype = 'ecdsa-sha2-nistp256'\n key_value = {'public': public_pem.replace('\\r\\n', '\\n'), 'private': ''}\n keyid = _get_keyid(keytype, scheme, key_value)\n ecdsakey_dict['keytype'] = keytype\n ecdsakey_dict['scheme'] = scheme\n ecdsakey_dict['keyid'] = keyid\n ecdsakey_dict['keyval'] = key_value\n ecdsakey_dict['keyid_hash_algorithms'\n ] = securesystemslib.settings.HASH_ALGORITHMS\n return ecdsakey_dict\n",
"role": "user"
},
{
"content": "import_ecdsakey_from_public_pem",
"role": "assistant"
}
] |
def x(pem, scheme='ecdsa-sha2-nistp256'):
securesystemslib.formats.PEMECDSA_SCHEMA.check_match(pem)
securesystemslib.formats.ECDSA_SCHEME_SCHEMA.check_match(scheme)
public_pem = ''
private_pem = ''
if is_pem_public(pem):
public_pem = extract_pem(pem, private_pem=False)
elif is_pem_private(pem, 'ec'):
return import_ecdsakey_from_private_pem(pem, password=None)
else:
raise securesystemslib.exceptions.FormatError(
'PEM contains neither a public nor private key: ' + repr(pem))
ecdsakey_dict = {}
keytype = 'ecdsa-sha2-nistp256'
key_value = {'public': public_pem.replace('\r\n', '\n'), 'private': ''}
keyid = _get_keyid(keytype, scheme, key_value)
ecdsakey_dict['keytype'] = keytype
ecdsakey_dict['scheme'] = scheme
ecdsakey_dict['keyid'] = keyid
ecdsakey_dict['keyval'] = key_value
return ecdsakey_dict
| import_ecdsakey_from_pem | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(pem, scheme='ecdsa-sha2-nistp256'):\n securesystemslib.formats.PEMECDSA_SCHEMA.check_match(pem)\n securesystemslib.formats.ECDSA_SCHEME_SCHEMA.check_match(scheme)\n public_pem = ''\n private_pem = ''\n if is_pem_public(pem):\n public_pem = extract_pem(pem, private_pem=False)\n elif is_pem_private(pem, 'ec'):\n return import_ecdsakey_from_private_pem(pem, password=None)\n else:\n raise securesystemslib.exceptions.FormatError(\n 'PEM contains neither a public nor private key: ' + repr(pem))\n ecdsakey_dict = {}\n keytype = 'ecdsa-sha2-nistp256'\n key_value = {'public': public_pem.replace('\\r\\n', '\\n'), 'private': ''}\n keyid = _get_keyid(keytype, scheme, key_value)\n ecdsakey_dict['keytype'] = keytype\n ecdsakey_dict['scheme'] = scheme\n ecdsakey_dict['keyid'] = keyid\n ecdsakey_dict['keyval'] = key_value\n return ecdsakey_dict\n",
"role": "user"
},
{
"content": "import_ecdsakey_from_pem",
"role": "assistant"
}
] |
def x(self):
self.save()
self._expected = []
if self.next_is_rc(Tokens.OPAR, False):
self.handle_hidden_right()
args = self.parse_param_list()
if args is not None:
if self.next_is_rc(Tokens.CPAR, False):
self.handle_hidden_right()
body = self.parse_block()
if body:
self._expected = []
token = self.next_is_rc(Tokens.END, False)
if token:
body.stop_char = token.stop
self.success()
return args, body
else:
self.abort()
else:
self.abort()
return self.failure()
| parse_func_body | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n self.save()\n self._expected = []\n if self.next_is_rc(Tokens.OPAR, False):\n self.handle_hidden_right()\n args = self.parse_param_list()\n if args is not None:\n if self.next_is_rc(Tokens.CPAR, False):\n self.handle_hidden_right()\n body = self.parse_block()\n if body:\n self._expected = []\n token = self.next_is_rc(Tokens.END, False)\n if token:\n body.stop_char = token.stop\n self.success()\n return args, body\n else:\n self.abort()\n else:\n self.abort()\n return self.failure()\n",
"role": "user"
},
{
"content": "parse_func_body",
"role": "assistant"
}
] |
def x(cls, class_name):
def x(cls):
for cls in cls.__subclasses__():
if lower(cls.__name__) == lower(class_name):
return cls
elif len(cls.__subclasses__()) > 0:
r = recurrent_class_lookup(cls)
if r is not None:
return r
return None
cls = recurrent_class_lookup(cls)
if cls:
return cls
else:
raise ValueError("'class_name '%s' is invalid" % class_name)
| get_concrete_class | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(cls, class_name):\n\n def x(cls):\n for cls in cls.__subclasses__():\n if lower(cls.__name__) == lower(class_name):\n return cls\n elif len(cls.__subclasses__()) > 0:\n r = recurrent_class_lookup(cls)\n if r is not None:\n return r\n return None\n cls = recurrent_class_lookup(cls)\n if cls:\n return cls\n else:\n raise ValueError(\"'class_name '%s' is invalid\" % class_name)\n",
"role": "user"
},
{
"content": "get_concrete_class",
"role": "assistant"
}
] |
def x(self):
pupil_data = _co.namedtuple('pupil_data', ['ZemaxApertureType',
'ApertureValue', 'entrancePupilDiameter', 'entrancePupilPosition',
'exitPupilDiameter', 'exitPupilPosition', 'ApodizationType',
'ApodizationFactor'])
data = self._ilensdataeditor.GetPupil()
return pupil_data(*data)
| GetPupil | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n pupil_data = _co.namedtuple('pupil_data', ['ZemaxApertureType',\n 'ApertureValue', 'entrancePupilDiameter', 'entrancePupilPosition',\n 'exitPupilDiameter', 'exitPupilPosition', 'ApodizationType',\n 'ApodizationFactor'])\n data = self._ilensdataeditor.GetPupil()\n return pupil_data(*data)\n",
"role": "user"
},
{
"content": "GetPupil",
"role": "assistant"
}
] |
def x(self, targets=list(), filename=str(), status=str()):
if targets and filename:
raise SyntaxError(
"You must specify only one of either targets=[] or filename=''.")
elif not targets and not filename:
raise SyntaxError(
"You must specify either a list of targets or filename='', but not both."
)
elif filename:
targets = self.read_file(filename)
my_targets = {'hosts': [], 'nets': []}
addresses = []
for target in targets:
if len(target.split()) > 1:
target_items = target.split()
for item in target_items:
try:
ip = IPAddress(item)
if ip.version == 4:
addresses.append(str(ip))
except AddrFormatError:
my_targets['hosts'].append(item)
except ValueError:
net = IPNetwork(item)
if net.ip.is_unicast(
) and net.version == 4 and net.netmask.netmask_bits(
) in range(8, 31):
my_targets['nets'].append(target_items[0])
else:
msg = str(str(net) +
""":Only IPv4 unicast addresses with bit masks
from 8 to 30 are supported."""
)
raise AttributeError(msg)
while len(addresses) > 1:
ip = IPAddress(addresses[0])
mask = IPAddress(addresses[1])
if ip.is_unicast() and mask.is_netmask():
net = IPNetwork(str(ip) + '/' + str(mask.netmask_bits()))
my_targets['nets'].append(str(net.cidr))
addresses.pop(0)
addresses.pop(0)
elif ip.is_unicast() and not ip.is_netmask():
my_targets['hosts'].append(str(ip))
addresses.pop(0)
if addresses:
ip = IPAddress(addresses[0])
if ip.is_unicast() and not ip.is_netmask():
my_targets['hosts'].append(addresses[0])
addresses.pop()
else:
try:
ip = IPAddress(target)
if ip.version == 4 and ip.is_unicast() and not ip.is_netmask():
my_targets['hosts'].append(target)
else:
msg = str(target +
'Only IPv4 unicast addresses are supported.')
raise AttributeError(msg)
except AddrFormatError:
my_targets['hosts'].append(target)
except ValueError:
net = IPNetwork(target)
if net.ip.is_unicast(
) and net.version == 4 and net.netmask.netmask_bits(
) in range(8, 31):
my_targets['nets'].append(target)
else:
msg = str(str(net) +
""":Only IPv4 unicast addresses with bit masks
from 8 to 30 are supported."""
)
raise AttributeError(msg)
"""
Build the list of commands to run.
"""
commands = []
if len(my_targets['hosts']) != 0:
for target in range(len(my_targets['hosts'])):
commands.append([self.fping, '-nV', my_targets['hosts'][target]])
if len(my_targets['nets']) != 0:
for target in range(len(my_targets['nets'])):
commands.append([self.fping, '-ngV', my_targets['nets'][target]])
"""
Start pinging each item in my_targets and return the requested results
when done.
"""
pool = ThreadPool(self.num_pools)
raw_results = pool.map(self.get_results, commands)
pool.close()
pool.join()
self.results = {host: result for host, result in csv.reader(''.join(
raw_results).splitlines())}
if not status:
return self.results
elif status == 'alive':
return self.alive
elif status == 'dead':
return self.dead
elif status == 'noip':
return self.noip
else:
raise SyntaxError("Valid status options are 'alive', 'dead' or 'noip'")
| ping | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, targets=list(), filename=str(), status=str()):\n if targets and filename:\n raise SyntaxError(\n \"You must specify only one of either targets=[] or filename=''.\")\n elif not targets and not filename:\n raise SyntaxError(\n \"You must specify either a list of targets or filename='', but not both.\"\n )\n elif filename:\n targets = self.read_file(filename)\n my_targets = {'hosts': [], 'nets': []}\n addresses = []\n for target in targets:\n if len(target.split()) > 1:\n target_items = target.split()\n for item in target_items:\n try:\n ip = IPAddress(item)\n if ip.version == 4:\n addresses.append(str(ip))\n except AddrFormatError:\n my_targets['hosts'].append(item)\n except ValueError:\n net = IPNetwork(item)\n if net.ip.is_unicast(\n ) and net.version == 4 and net.netmask.netmask_bits(\n ) in range(8, 31):\n my_targets['nets'].append(target_items[0])\n else:\n msg = str(str(net) +\n \"\"\":Only IPv4 unicast addresses with bit masks\n from 8 to 30 are supported.\"\"\"\n )\n raise AttributeError(msg)\n while len(addresses) > 1:\n ip = IPAddress(addresses[0])\n mask = IPAddress(addresses[1])\n if ip.is_unicast() and mask.is_netmask():\n net = IPNetwork(str(ip) + '/' + str(mask.netmask_bits()))\n my_targets['nets'].append(str(net.cidr))\n addresses.pop(0)\n addresses.pop(0)\n elif ip.is_unicast() and not ip.is_netmask():\n my_targets['hosts'].append(str(ip))\n addresses.pop(0)\n if addresses:\n ip = IPAddress(addresses[0])\n if ip.is_unicast() and not ip.is_netmask():\n my_targets['hosts'].append(addresses[0])\n addresses.pop()\n else:\n try:\n ip = IPAddress(target)\n if ip.version == 4 and ip.is_unicast() and not ip.is_netmask():\n my_targets['hosts'].append(target)\n else:\n msg = str(target +\n 'Only IPv4 unicast addresses are supported.')\n raise AttributeError(msg)\n except AddrFormatError:\n my_targets['hosts'].append(target)\n except ValueError:\n net = IPNetwork(target)\n if net.ip.is_unicast(\n ) and net.version == 4 and net.netmask.netmask_bits(\n ) in range(8, 31):\n my_targets['nets'].append(target)\n else:\n msg = str(str(net) +\n \"\"\":Only IPv4 unicast addresses with bit masks\n from 8 to 30 are supported.\"\"\"\n )\n raise AttributeError(msg)\n \"\"\"\n Build the list of commands to run.\n \"\"\"\n commands = []\n if len(my_targets['hosts']) != 0:\n for target in range(len(my_targets['hosts'])):\n commands.append([self.fping, '-nV', my_targets['hosts'][target]])\n if len(my_targets['nets']) != 0:\n for target in range(len(my_targets['nets'])):\n commands.append([self.fping, '-ngV', my_targets['nets'][target]])\n \"\"\"\n Start pinging each item in my_targets and return the requested results\n when done.\n \"\"\"\n pool = ThreadPool(self.num_pools)\n raw_results = pool.map(self.get_results, commands)\n pool.close()\n pool.join()\n self.results = {host: result for host, result in csv.reader(''.join(\n raw_results).splitlines())}\n if not status:\n return self.results\n elif status == 'alive':\n return self.alive\n elif status == 'dead':\n return self.dead\n elif status == 'noip':\n return self.noip\n else:\n raise SyntaxError(\"Valid status options are 'alive', 'dead' or 'noip'\")\n",
"role": "user"
},
{
"content": "ping",
"role": "assistant"
}
] |
def x(cmd):
try:
return subprocess.check_output(cmd)
except subprocess.CalledProcessError as e:
return e.output
| get_results | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(cmd):\n try:\n return subprocess.check_output(cmd)\n except subprocess.CalledProcessError as e:\n return e.output\n",
"role": "user"
},
{
"content": "get_results",
"role": "assistant"
}
] |
def x(filename):
lines = []
with open(filename) as f:
for line in f:
if len(line.strip()) != 0:
lines.append(line.strip())
return lines
| read_file | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(filename):\n lines = []\n with open(filename) as f:\n for line in f:\n if len(line.strip()) != 0:\n lines.append(line.strip())\n return lines\n",
"role": "user"
},
{
"content": "read_file",
"role": "assistant"
}
] |
def x(self, data_out, outputs):
compress = ROOTModule.ROOT.CompressionSettings(ROOTModule.ROOT.kZLIB, 1)
if isinstance(data_out, (str, unicode)):
self.file_emulation = True
outputs.append(ROOTModule.TFile.Open(data_out, 'RECREATE', '',
compress))
elif isinstance(data_out, ROOTModule.TFile):
outputs.append(data_out)
else:
self.file_emulation = True
filename = os.path.join(tempfile.mkdtemp(), 'tmp.root')
outputs.append(ROOTModule.TFile.Open(filename, 'RECREATE', '',
compress))
| prepare_outputs | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, data_out, outputs):\n compress = ROOTModule.ROOT.CompressionSettings(ROOTModule.ROOT.kZLIB, 1)\n if isinstance(data_out, (str, unicode)):\n self.file_emulation = True\n outputs.append(ROOTModule.TFile.Open(data_out, 'RECREATE', '',\n compress))\n elif isinstance(data_out, ROOTModule.TFile):\n outputs.append(data_out)\n else:\n self.file_emulation = True\n filename = os.path.join(tempfile.mkdtemp(), 'tmp.root')\n outputs.append(ROOTModule.TFile.Open(filename, 'RECREATE', '',\n compress))\n",
"role": "user"
},
{
"content": "prepare_outputs",
"role": "assistant"
}
] |
def x(self, data_in, data_out, *args, **kwargs):
self._get_tables(data_in)
self.file_emulation = False
outputs = []
self._prepare_outputs(data_out, outputs)
output = outputs[0]
for i in xrange(len(self.tables)):
table = self.tables[i]
self._write_table(output, table)
if data_out != output and hasattr(data_out, 'write'):
output.Flush()
output.ReOpen('read')
file_size = output.GetSize()
buff = bytearray(file_size)
output.ReadBuffer(buff, file_size)
data_out.write(buff)
if self.file_emulation:
filename = output.GetName()
output.Close()
| write | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, data_in, data_out, *args, **kwargs):\n self._get_tables(data_in)\n self.file_emulation = False\n outputs = []\n self._prepare_outputs(data_out, outputs)\n output = outputs[0]\n for i in xrange(len(self.tables)):\n table = self.tables[i]\n self._write_table(output, table)\n if data_out != output and hasattr(data_out, 'write'):\n output.Flush()\n output.ReOpen('read')\n file_size = output.GetSize()\n buff = bytearray(file_size)\n output.ReadBuffer(buff, file_size)\n data_out.write(buff)\n if self.file_emulation:\n filename = output.GetName()\n output.Close()\n",
"role": "user"
},
{
"content": "write",
"role": "assistant"
}
] |
def x(length, total_length):
indices = tuple(range(0, total_length, length)) + (None,)
return _pairwise(indices)
| groups_of | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(length, total_length):\n indices = tuple(range(0, total_length, length)) + (None,)\n return _pairwise(indices)\n",
"role": "user"
},
{
"content": "groups_of",
"role": "assistant"
}
] |
def x(sources, targets, masked=False):
assert len(sources) == 1 and len(targets) == 1
array = sources[0]
target = targets[0]
all_slices = _all_slices(array)
for index in np.ndindex(*[len(slices) for slices in all_slices]):
keys = tuple(slices[i] for slices, i in zip(all_slices, index))
if masked:
target[keys] = array[keys].masked_array()
else:
target[keys] = array[keys].ndarray()
| save | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(sources, targets, masked=False):\n assert len(sources) == 1 and len(targets) == 1\n array = sources[0]\n target = targets[0]\n all_slices = _all_slices(array)\n for index in np.ndindex(*[len(slices) for slices in all_slices]):\n keys = tuple(slices[i] for slices, i in zip(all_slices, index))\n if masked:\n target[keys] = array[keys].masked_array()\n else:\n target[keys] = array[keys].ndarray()\n",
"role": "user"
},
{
"content": "save",
"role": "assistant"
}
] |
def x(a, axis=None):
axes = _normalise_axis(axis, a)
if axes is None or len(axes) != 1:
msg = 'This operation is currently limited to a single axis'
raise AxisSupportError(msg)
return _Aggregation(a, axes[0], _CountStreamsHandler,
_CountMaskedStreamsHandler, np.dtype('i'), {})
| count | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(a, axis=None):\n axes = _normalise_axis(axis, a)\n if axes is None or len(axes) != 1:\n msg = 'This operation is currently limited to a single axis'\n raise AxisSupportError(msg)\n return _Aggregation(a, axes[0], _CountStreamsHandler,\n _CountMaskedStreamsHandler, np.dtype('i'), {})\n",
"role": "user"
},
{
"content": "count",
"role": "assistant"
}
] |
def x(a, axis=None):
axes = _normalise_axis(axis, a)
assert axes is not None and len(axes) == 1
return _Aggregation(a, axes[0], _MinStreamsHandler,
_MinMaskedStreamsHandler, a.dtype, {})
| min | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(a, axis=None):\n axes = _normalise_axis(axis, a)\n assert axes is not None and len(axes) == 1\n return _Aggregation(a, axes[0], _MinStreamsHandler,\n _MinMaskedStreamsHandler, a.dtype, {})\n",
"role": "user"
},
{
"content": "min",
"role": "assistant"
}
] |
def x(a, axis=None):
axes = _normalise_axis(axis, a)
assert axes is not None and len(axes) == 1
return _Aggregation(a, axes[0], _MaxStreamsHandler,
_MaxMaskedStreamsHandler, a.dtype, {})
| max | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(a, axis=None):\n axes = _normalise_axis(axis, a)\n assert axes is not None and len(axes) == 1\n return _Aggregation(a, axes[0], _MaxStreamsHandler,\n _MaxMaskedStreamsHandler, a.dtype, {})\n",
"role": "user"
},
{
"content": "max",
"role": "assistant"
}
] |
def x(a, axis=None):
axes = _normalise_axis(axis, a)
assert axes is not None and len(axes) == 1
return _Aggregation(a, axes[0], _SumStreamsHandler,
_SumMaskedStreamsHandler, a.dtype, {})
| sum | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(a, axis=None):\n axes = _normalise_axis(axis, a)\n assert axes is not None and len(axes) == 1\n return _Aggregation(a, axes[0], _SumStreamsHandler,\n _SumMaskedStreamsHandler, a.dtype, {})\n",
"role": "user"
},
{
"content": "sum",
"role": "assistant"
}
] |
def x(a, axis=None, mdtol=1):
axes = _normalise_axis(axis, a)
if axes is None or len(axes) != 1:
msg = 'This operation is currently limited to a single axis'
raise AxisSupportError(msg)
dtype = (np.array([0], dtype=a.dtype) / 1.0).dtype
kwargs = dict(mdtol=mdtol)
return _Aggregation(a, axes[0], _MeanStreamsHandler,
_MeanMaskedStreamsHandler, dtype, kwargs)
| mean | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(a, axis=None, mdtol=1):\n axes = _normalise_axis(axis, a)\n if axes is None or len(axes) != 1:\n msg = 'This operation is currently limited to a single axis'\n raise AxisSupportError(msg)\n dtype = (np.array([0], dtype=a.dtype) / 1.0).dtype\n kwargs = dict(mdtol=mdtol)\n return _Aggregation(a, axes[0], _MeanStreamsHandler,\n _MeanMaskedStreamsHandler, dtype, kwargs)\n",
"role": "user"
},
{
"content": "mean",
"role": "assistant"
}
] |
def x(a, axis=None, ddof=0):
axes = _normalise_axis(axis, a)
if axes is None or len(axes) != 1:
msg = 'This operation is currently limited to a single axis'
raise AxisSupportError(msg)
dtype = (np.array([0], dtype=a.dtype) / 1.0).dtype
return _Aggregation(a, axes[0], _StdStreamsHandler,
_StdMaskedStreamsHandler, dtype, dict(ddof=ddof))
| std | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(a, axis=None, ddof=0):\n axes = _normalise_axis(axis, a)\n if axes is None or len(axes) != 1:\n msg = 'This operation is currently limited to a single axis'\n raise AxisSupportError(msg)\n dtype = (np.array([0], dtype=a.dtype) / 1.0).dtype\n return _Aggregation(a, axes[0], _StdStreamsHandler,\n _StdMaskedStreamsHandler, dtype, dict(ddof=ddof))\n",
"role": "user"
},
{
"content": "std",
"role": "assistant"
}
] |
def x(a, axis=None, ddof=0):
axes = _normalise_axis(axis, a)
if axes is None or len(axes) != 1:
msg = 'This operation is currently limited to a single axis'
raise AxisSupportError(msg)
dtype = (np.array([0], dtype=a.dtype) / 1.0).dtype
return _Aggregation(a, axes[0], _VarStreamsHandler,
_VarMaskedStreamsHandler, dtype, dict(ddof=ddof))
| var | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(a, axis=None, ddof=0):\n axes = _normalise_axis(axis, a)\n if axes is None or len(axes) != 1:\n msg = 'This operation is currently limited to a single axis'\n raise AxisSupportError(msg)\n dtype = (np.array([0], dtype=a.dtype) / 1.0).dtype\n return _Aggregation(a, axes[0], _VarStreamsHandler,\n _VarMaskedStreamsHandler, dtype, dict(ddof=ddof))\n",
"role": "user"
},
{
"content": "var",
"role": "assistant"
}
] |
def x(ufunc, name=None):
if not isinstance(ufunc, np.ufunc):
raise TypeError('{} is not a ufunc'.format(ufunc))
ufunc_name = ufunc.__name__
ma_ufunc = getattr(np.ma, ufunc_name, None)
if ufunc.nin == 2 and ufunc.nout == 1:
func = _dual_input_fn_wrapper('np.{}'.format(ufunc_name), ufunc,
ma_ufunc, name)
elif ufunc.nin == 1 and ufunc.nout == 1:
func = _unary_fn_wrapper('np.{}'.format(ufunc_name), ufunc,
ma_ufunc, name)
else:
raise ValueError(
'Unsupported ufunc {!r} with {} input arrays & {} output arrays.'
.format(ufunc_name, ufunc.nin, ufunc.nout))
return func
| ufunc_wrapper | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(ufunc, name=None):\n if not isinstance(ufunc, np.ufunc):\n raise TypeError('{} is not a ufunc'.format(ufunc))\n ufunc_name = ufunc.__name__\n ma_ufunc = getattr(np.ma, ufunc_name, None)\n if ufunc.nin == 2 and ufunc.nout == 1:\n func = _dual_input_fn_wrapper('np.{}'.format(ufunc_name), ufunc,\n ma_ufunc, name)\n elif ufunc.nin == 1 and ufunc.nout == 1:\n func = _unary_fn_wrapper('np.{}'.format(ufunc_name), ufunc,\n ma_ufunc, name)\n else:\n raise ValueError(\n 'Unsupported ufunc {!r} with {} input arrays & {} output arrays.'\n .format(ufunc_name, ufunc.nin, ufunc.nout))\n return func\n",
"role": "user"
},
{
"content": "ufunc_wrapper",
"role": "assistant"
}
] |
def x(shape, keys):
keys = _full_keys(keys, len(shape))
sliced_shape = []
shape_dim = -1
for key in keys:
shape_dim += 1
if _is_scalar(key):
continue
elif isinstance(key, slice):
size = len(range(*key.indices(shape[shape_dim])))
sliced_shape.append(size)
elif isinstance(key, np.ndarray) and key.dtype == np.dtype('bool'):
sliced_shape.append(builtins.sum(key))
elif isinstance(key, (tuple, np.ndarray)):
sliced_shape.append(len(key))
elif key is np.newaxis:
shape_dim -= 1
sliced_shape.append(1)
else:
raise ValueError('Invalid indexing object "{}"'.format(key))
sliced_shape = tuple(sliced_shape)
return sliced_shape
| sliced_shape | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(shape, keys):\n keys = _full_keys(keys, len(shape))\n sliced_shape = []\n shape_dim = -1\n for key in keys:\n shape_dim += 1\n if _is_scalar(key):\n continue\n elif isinstance(key, slice):\n size = len(range(*key.indices(shape[shape_dim])))\n sliced_shape.append(size)\n elif isinstance(key, np.ndarray) and key.dtype == np.dtype('bool'):\n sliced_shape.append(builtins.sum(key))\n elif isinstance(key, (tuple, np.ndarray)):\n sliced_shape.append(len(key))\n elif key is np.newaxis:\n shape_dim -= 1\n sliced_shape.append(1)\n else:\n raise ValueError('Invalid indexing object \"{}\"'.format(key))\n sliced_shape = tuple(sliced_shape)\n return sliced_shape\n",
"role": "user"
},
{
"content": "sliced_shape",
"role": "assistant"
}
] |
def x(keys, ndim):
if not isinstance(keys, tuple):
keys = keys,
keys = list(keys)
n_keys_non_newaxis = len([key for key in keys if key is not np.newaxis])
is_ellipsis = [(key is Ellipsis) for key in keys]
if n_keys_non_newaxis - 1 >= ndim and any(is_ellipsis):
keys.pop(is_ellipsis.index(True))
n_keys_non_newaxis -= 1
if n_keys_non_newaxis > ndim:
raise IndexError('Dimensions are over specified for indexing.')
lh_keys = []
rh_keys = []
take_from_left = True
while keys:
if take_from_left:
next_key = keys.pop(0)
keys_list = lh_keys
else:
next_key = keys.pop(-1)
keys_list = rh_keys
if next_key is Ellipsis:
next_key = slice(None)
take_from_left = not take_from_left
keys_list.append(next_key)
middle = [slice(None)] * (ndim - n_keys_non_newaxis)
return tuple(lh_keys + middle + rh_keys[::-1])
| full_keys | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(keys, ndim):\n if not isinstance(keys, tuple):\n keys = keys,\n keys = list(keys)\n n_keys_non_newaxis = len([key for key in keys if key is not np.newaxis])\n is_ellipsis = [(key is Ellipsis) for key in keys]\n if n_keys_non_newaxis - 1 >= ndim and any(is_ellipsis):\n keys.pop(is_ellipsis.index(True))\n n_keys_non_newaxis -= 1\n if n_keys_non_newaxis > ndim:\n raise IndexError('Dimensions are over specified for indexing.')\n lh_keys = []\n rh_keys = []\n take_from_left = True\n while keys:\n if take_from_left:\n next_key = keys.pop(0)\n keys_list = lh_keys\n else:\n next_key = keys.pop(-1)\n keys_list = rh_keys\n if next_key is Ellipsis:\n next_key = slice(None)\n take_from_left = not take_from_left\n keys_list.append(next_key)\n middle = [slice(None)] * (ndim - n_keys_non_newaxis)\n return tuple(lh_keys + middle + rh_keys[::-1])\n",
"role": "user"
},
{
"content": "full_keys",
"role": "assistant"
}
] |
def x(array):
if not isinstance(array, Array):
if isinstance(array, np.ndarray):
array = NumpyArrayAdapter(array)
elif np.isscalar(array):
array = ConstantArray([], array)
else:
raise TypeError(
'The given array should be a `biggus.Array` instance, got {}.'
.format(type(array)))
return array
| ensure_array | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(array):\n if not isinstance(array, Array):\n if isinstance(array, np.ndarray):\n array = NumpyArrayAdapter(array)\n elif np.isscalar(array):\n array = ConstantArray([], array)\n else:\n raise TypeError(\n 'The given array should be a `biggus.Array` instance, got {}.'\n .format(type(array)))\n return array\n",
"role": "user"
},
{
"content": "ensure_array",
"role": "assistant"
}
] |
def x(array):
nbytes = array.nbytes
if nbytes < 1 << 10:
size = '{} B'.format(nbytes)
elif nbytes < 1 << 20:
size = '{:.02f} KiB'.format(nbytes / (1 << 10))
elif nbytes < 1 << 30:
size = '{:.02f} MiB'.format(nbytes / (1 << 20))
elif nbytes < 1 << 40:
size = '{:.02f} GiB'.format(nbytes / (1 << 30))
else:
size = '{:.02f} TiB'.format(nbytes / (1 << 40))
return size
| size | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(array):\n nbytes = array.nbytes\n if nbytes < 1 << 10:\n size = '{} B'.format(nbytes)\n elif nbytes < 1 << 20:\n size = '{:.02f} KiB'.format(nbytes / (1 << 10))\n elif nbytes < 1 << 30:\n size = '{:.02f} MiB'.format(nbytes / (1 << 20))\n elif nbytes < 1 << 40:\n size = '{:.02f} GiB'.format(nbytes / (1 << 30))\n else:\n size = '{:.02f} TiB'.format(nbytes / (1 << 40))\n return size\n",
"role": "user"
},
{
"content": "size",
"role": "assistant"
}
] |
def x(self, chunk):
if chunk is not None:
for queue in self.output_queues:
queue.put(chunk)
| output | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, chunk):\n if chunk is not None:\n for queue in self.output_queues:\n queue.put(chunk)\n",
"role": "user"
},
{
"content": "output",
"role": "assistant"
}
] |
def x(self):
try:
chunk_index = self.chunk_index_gen(self.array.shape, self.
iteration_order)
for key in chunk_index:
if self.masked:
data = self.array[key].masked_array()
else:
data = self.array[key].ndarray()
output_chunk = Chunk(key, data)
self.output(output_chunk)
except:
self.abort()
raise
else:
for queue in self.output_queues:
queue.put(QUEUE_FINISHED)
| run | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n try:\n chunk_index = self.chunk_index_gen(self.array.shape, self.\n iteration_order)\n for key in chunk_index:\n if self.masked:\n data = self.array[key].masked_array()\n else:\n data = self.array[key].ndarray()\n output_chunk = Chunk(key, data)\n self.output(output_chunk)\n except:\n self.abort()\n raise\n else:\n for queue in self.output_queues:\n queue.put(QUEUE_FINISHED)\n",
"role": "user"
},
{
"content": "run",
"role": "assistant"
}
] |
def x(self, input_nodes):
self.input_queues = [queue.Queue(maxsize=3) for _ in input_nodes]
for input_node, input_queue in zip(input_nodes, self.input_queues):
input_node.add_output_queue(input_queue)
| add_input_nodes | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, input_nodes):\n self.input_queues = [queue.Queue(maxsize=3) for _ in input_nodes]\n for input_node, input_queue in zip(input_nodes, self.input_queues):\n input_node.add_output_queue(input_queue)\n",
"role": "user"
},
{
"content": "add_input_nodes",
"role": "assistant"
}
] |
def x(self):
try:
while True:
input_chunks = [input.get() for input in self.input_queues]
for input in self.input_queues:
input.task_done()
if any(chunk is QUEUE_ABORT for chunk in input_chunks):
self.abort()
return
if any(chunk is QUEUE_FINISHED for chunk in input_chunks):
break
self.output(self.process_chunks(input_chunks))
self.output(self.finalise())
except:
self.abort()
raise
else:
for queue in self.output_queues:
queue.put(QUEUE_FINISHED)
| run | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n try:\n while True:\n input_chunks = [input.get() for input in self.input_queues]\n for input in self.input_queues:\n input.task_done()\n if any(chunk is QUEUE_ABORT for chunk in input_chunks):\n self.abort()\n return\n if any(chunk is QUEUE_FINISHED for chunk in input_chunks):\n break\n self.output(self.process_chunks(input_chunks))\n self.output(self.finalise())\n except:\n self.abort()\n raise\n else:\n for queue in self.output_queues:\n queue.put(QUEUE_FINISHED)\n",
"role": "user"
},
{
"content": "run",
"role": "assistant"
}
] |
def x(self, chunks):
chunk, = chunks
if chunk.keys:
self.result[chunk.keys] = chunk.data
else:
self.result[...] = chunk.data
| process_chunks | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, chunks):\n chunk, = chunks\n if chunk.keys:\n self.result[chunk.keys] = chunk.data\n else:\n self.result[...] = chunk.data\n",
"role": "user"
},
{
"content": "process_chunks",
"role": "assistant"
}
] |
def x(self, key, size, axis):
if _is_scalar(key):
if key >= size or key < -size:
msg = ('index {0} is out of bounds for axis {1} with size {2}'.
format(key, axis, size))
raise IndexError(msg)
elif isinstance(key, slice):
pass
elif isinstance(key, np.ndarray) and key.dtype == np.dtype('bool'):
if key.size > size:
msg = (
'too many boolean indices. Boolean index array of size {0} is greater than axis {1} with size {2}'
.format(key.size, axis, size))
raise IndexError(msg)
elif isinstance(key, collections.Iterable) and not isinstance(key, six.
string_types):
key = tuple(key)
for sub_key in key:
if sub_key >= size or sub_key < -size:
msg = ('index {0} is out of bounds for axis {1} with size {2}'
.format(sub_key, axis, size))
raise IndexError(msg)
else:
raise TypeError('invalid key {!r}'.format(key))
return key
| cleanup_new_key | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, key, size, axis):\n if _is_scalar(key):\n if key >= size or key < -size:\n msg = ('index {0} is out of bounds for axis {1} with size {2}'.\n format(key, axis, size))\n raise IndexError(msg)\n elif isinstance(key, slice):\n pass\n elif isinstance(key, np.ndarray) and key.dtype == np.dtype('bool'):\n if key.size > size:\n msg = (\n 'too many boolean indices. Boolean index array of size {0} is greater than axis {1} with size {2}'\n .format(key.size, axis, size))\n raise IndexError(msg)\n elif isinstance(key, collections.Iterable) and not isinstance(key, six.\n string_types):\n key = tuple(key)\n for sub_key in key:\n if sub_key >= size or sub_key < -size:\n msg = ('index {0} is out of bounds for axis {1} with size {2}'\n .format(sub_key, axis, size))\n raise IndexError(msg)\n else:\n raise TypeError('invalid key {!r}'.format(key))\n return key\n",
"role": "user"
},
{
"content": "cleanup_new_key",
"role": "assistant"
}
] |
def x(self, indices, new_key, axis):
size = len(indices)
if _is_scalar(new_key):
if new_key >= size or new_key < -size:
msg = ('index {0} is out of bounds for axis {1} with size {2}'.
format(new_key, axis, size))
raise IndexError(msg)
result_key = indices[new_key]
elif isinstance(new_key, slice):
result_key = indices.__getitem__(new_key)
elif isinstance(new_key, np.ndarray) and new_key.dtype == np.dtype('bool'):
if new_key.size > size:
msg = (
'too many boolean indices. Boolean index array of size {0} is greater than axis {1} with size {2}'
.format(new_key.size, axis, size))
raise IndexError(msg)
result_key = tuple(np.array(indices)[new_key])
elif isinstance(new_key, collections.Iterable) and not isinstance(new_key,
six.string_types):
new_key = tuple(new_key)
for sub_key in new_key:
if sub_key >= size or sub_key < -size:
msg = ('index {0} is out of bounds for axis {1} with size {2}'
.format(sub_key, axis, size))
raise IndexError(msg)
result_key = tuple(indices[key] for key in new_key)
else:
raise TypeError('invalid key {!r}'.format(new_key))
return result_key
| remap_new_key | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, indices, new_key, axis):\n size = len(indices)\n if _is_scalar(new_key):\n if new_key >= size or new_key < -size:\n msg = ('index {0} is out of bounds for axis {1} with size {2}'.\n format(new_key, axis, size))\n raise IndexError(msg)\n result_key = indices[new_key]\n elif isinstance(new_key, slice):\n result_key = indices.__getitem__(new_key)\n elif isinstance(new_key, np.ndarray) and new_key.dtype == np.dtype('bool'):\n if new_key.size > size:\n msg = (\n 'too many boolean indices. Boolean index array of size {0} is greater than axis {1} with size {2}'\n .format(new_key.size, axis, size))\n raise IndexError(msg)\n result_key = tuple(np.array(indices)[new_key])\n elif isinstance(new_key, collections.Iterable) and not isinstance(new_key,\n six.string_types):\n new_key = tuple(new_key)\n for sub_key in new_key:\n if sub_key >= size or sub_key < -size:\n msg = ('index {0} is out of bounds for axis {1} with size {2}'\n .format(sub_key, axis, size))\n raise IndexError(msg)\n result_key = tuple(indices[key] for key in new_key)\n else:\n raise TypeError('invalid key {!r}'.format(new_key))\n return result_key\n",
"role": "user"
},
{
"content": "remap_new_key",
"role": "assistant"
}
] |
def x(self, target, inverse=False):
if len(target) != self.ndim:
raise ValueError(
'The target iterable is of length {}, but should be of length {}.'
.format(len(target), self.ndim))
if inverse:
axis_map = self._inverse_axes_map
else:
axis_map = self._forward_axes_map
result = [None] * self.ndim
for axis, item in enumerate(target):
result[axis_map[axis]] = item
return tuple(result)
| apply_axes_mapping | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, target, inverse=False):\n if len(target) != self.ndim:\n raise ValueError(\n 'The target iterable is of length {}, but should be of length {}.'\n .format(len(target), self.ndim))\n if inverse:\n axis_map = self._inverse_axes_map\n else:\n axis_map = self._forward_axes_map\n result = [None] * self.ndim\n for axis, item in enumerate(target):\n result[axis_map[axis]] = item\n return tuple(result)\n",
"role": "user"
},
{
"content": "apply_axes_mapping",
"role": "assistant"
}
] |
def x(self, source_keys):
keys = list(source_keys)
del keys[self.axis]
return tuple(keys)
| output_keys | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, source_keys):\n keys = list(source_keys)\n del keys[self.axis]\n return tuple(keys)\n",
"role": "user"
},
{
"content": "output_keys",
"role": "assistant"
}
] |
def x(e):
e = e % l
P = ident
for i in range(253):
if e & 1:
P = edwards_add(P, Bpow[i])
e = e // 2
assert e == 0, e
return P
| scalarmult_B | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(e):\n e = e % l\n P = ident\n for i in range(253):\n if e & 1:\n P = edwards_add(P, Bpow[i])\n e = e // 2\n assert e == 0, e\n return P\n",
"role": "user"
},
{
"content": "scalarmult_B",
"role": "assistant"
}
] |
def x(sk):
h = H(sk)
a = 2 ** (b - 2) + sum(2 ** i * bit(h, i) for i in range(3, b - 2))
A = scalarmult_B(a)
return encodepoint(A)
| publickey_unsafe | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(sk):\n h = H(sk)\n a = 2 ** (b - 2) + sum(2 ** i * bit(h, i) for i in range(3, b - 2))\n A = scalarmult_B(a)\n return encodepoint(A)\n",
"role": "user"
},
{
"content": "publickey_unsafe",
"role": "assistant"
}
] |
def x():
seed = os.urandom(32)
public = None
try:
nacl_key = nacl.signing.SigningKey(seed)
public = nacl_key.verify_key.encode(encoder=nacl.encoding.RawEncoder())
except NameError:
raise securesystemslib.exceptions.UnsupportedLibraryError(
'The PyNaCl library and/or its dependencies unavailable.')
return public, seed
| generate_public_and_private | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x():\n seed = os.urandom(32)\n public = None\n try:\n nacl_key = nacl.signing.SigningKey(seed)\n public = nacl_key.verify_key.encode(encoder=nacl.encoding.RawEncoder())\n except NameError:\n raise securesystemslib.exceptions.UnsupportedLibraryError(\n 'The PyNaCl library and/or its dependencies unavailable.')\n return public, seed\n",
"role": "user"
},
{
"content": "generate_public_and_private",
"role": "assistant"
}
] |
def x(public_key, private_key, data, scheme):
securesystemslib.formats.ED25519PUBLIC_SCHEMA.check_match(public_key)
securesystemslib.formats.ED25519SEED_SCHEMA.check_match(private_key)
securesystemslib.formats.ED25519_SIG_SCHEMA.check_match(scheme)
public = public_key
private = private_key
signature = None
if scheme == 'ed25519':
try:
nacl_key = nacl.signing.SigningKey(private)
nacl_sig = nacl_key.sign(data)
signature = nacl_sig.signature
except NameError:
raise securesystemslib.exceptions.UnsupportedLibraryError(
'The PyNaCl library and/or its dependencies unavailable.')
except (ValueError, TypeError, nacl.exceptions.CryptoError) as e:
raise securesystemslib.exceptions.CryptoError(
'An "ed25519" signature could not be created with PyNaCl.' +
str(e))
else:
raise securesystemslib.exceptions.UnsupportedAlgorithmError(
'Unsupported signature scheme is specified: ' + repr(scheme))
return signature, scheme
| create_signature | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(public_key, private_key, data, scheme):\n securesystemslib.formats.ED25519PUBLIC_SCHEMA.check_match(public_key)\n securesystemslib.formats.ED25519SEED_SCHEMA.check_match(private_key)\n securesystemslib.formats.ED25519_SIG_SCHEMA.check_match(scheme)\n public = public_key\n private = private_key\n signature = None\n if scheme == 'ed25519':\n try:\n nacl_key = nacl.signing.SigningKey(private)\n nacl_sig = nacl_key.sign(data)\n signature = nacl_sig.signature\n except NameError:\n raise securesystemslib.exceptions.UnsupportedLibraryError(\n 'The PyNaCl library and/or its dependencies unavailable.')\n except (ValueError, TypeError, nacl.exceptions.CryptoError) as e:\n raise securesystemslib.exceptions.CryptoError(\n 'An \"ed25519\" signature could not be created with PyNaCl.' +\n str(e))\n else:\n raise securesystemslib.exceptions.UnsupportedAlgorithmError(\n 'Unsupported signature scheme is specified: ' + repr(scheme))\n return signature, scheme\n",
"role": "user"
},
{
"content": "create_signature",
"role": "assistant"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.