idx int64 0 63k | question stringlengths 61 4.03k | target stringlengths 6 1.23k |
|---|---|---|
53,000 | def set_ccc ( ctx , management_key , pin ) : controller = ctx . obj [ 'controller' ] _ensure_authenticated ( ctx , controller , pin , management_key ) controller . update_ccc ( ) | Generate and set a CCC on the YubiKey . |
53,001 | def generate_certificate ( ctx , slot , management_key , pin , public_key , subject , valid_days ) : controller = ctx . obj [ 'controller' ] _ensure_authenticated ( ctx , controller , pin , management_key , require_pin_and_key = True ) data = public_key . read ( ) public_key = serialization . load_pem_public_key ( data , default_backend ( ) ) now = datetime . datetime . now ( ) valid_to = now + datetime . timedelta ( days = valid_days ) try : controller . generate_self_signed_certificate ( slot , public_key , subject , now , valid_to , touch_callback = prompt_for_touch ) except APDUError as e : logger . error ( 'Failed to generate certificate for slot %s' , slot , exc_info = e ) ctx . fail ( 'Certificate generation failed.' ) | Generate a self - signed X . 509 certificate . |
53,002 | def change_pin ( ctx , pin , new_pin ) : controller = ctx . obj [ 'controller' ] if not pin : pin = _prompt_pin ( ctx , prompt = 'Enter your current PIN' ) if not new_pin : new_pin = click . prompt ( 'Enter your new PIN' , default = '' , hide_input = True , show_default = False , confirmation_prompt = True , err = True ) if not _valid_pin_length ( pin ) : ctx . fail ( 'Current PIN must be between 6 and 8 characters long.' ) if not _valid_pin_length ( new_pin ) : ctx . fail ( 'New PIN must be between 6 and 8 characters long.' ) try : controller . change_pin ( pin , new_pin ) click . echo ( 'New PIN set.' ) except AuthenticationBlocked as e : logger . debug ( 'PIN is blocked.' , exc_info = e ) ctx . fail ( 'PIN is blocked.' ) except WrongPin as e : logger . debug ( 'Failed to change PIN, %d tries left' , e . tries_left , exc_info = e ) ctx . fail ( 'PIN change failed - %d tries left.' % e . tries_left ) | Change the PIN code . |
53,003 | def change_puk ( ctx , puk , new_puk ) : controller = ctx . obj [ 'controller' ] if not puk : puk = _prompt_pin ( ctx , prompt = 'Enter your current PUK' ) if not new_puk : new_puk = click . prompt ( 'Enter your new PUK' , default = '' , hide_input = True , show_default = False , confirmation_prompt = True , err = True ) if not _valid_pin_length ( puk ) : ctx . fail ( 'Current PUK must be between 6 and 8 characters long.' ) if not _valid_pin_length ( new_puk ) : ctx . fail ( 'New PUK must be between 6 and 8 characters long.' ) try : controller . change_puk ( puk , new_puk ) click . echo ( 'New PUK set.' ) except AuthenticationBlocked as e : logger . debug ( 'PUK is blocked.' , exc_info = e ) ctx . fail ( 'PUK is blocked.' ) except WrongPuk as e : logger . debug ( 'Failed to change PUK, %d tries left' , e . tries_left , exc_info = e ) ctx . fail ( 'PUK change failed - %d tries left.' % e . tries_left ) | Change the PUK code . |
53,004 | def change_management_key ( ctx , management_key , pin , new_management_key , touch , protect , generate , force ) : controller = ctx . obj [ 'controller' ] pin_verified = _ensure_authenticated ( ctx , controller , pin , management_key , require_pin_and_key = protect , mgm_key_prompt = 'Enter your current management key ' '[blank to use default key]' , no_prompt = force ) if new_management_key and generate : ctx . fail ( 'Invalid options: --new-management-key conflicts with ' '--generate' ) if touch and controller . version < ( 4 , 0 , 0 ) : ctx . fail ( 'Require touch not supported on this YubiKey.' ) if not pin_verified and controller . has_stored_key : if pin : _verify_pin ( ctx , controller , pin , no_prompt = force ) elif not force : click . confirm ( 'The current management key is stored on the YubiKey' ' and will not be cleared if no PIN is provided. Continue?' , abort = True , err = True ) if not new_management_key and not protect : if generate : new_management_key = generate_random_management_key ( ) if not protect : click . echo ( 'Generated management key: {}' . format ( b2a_hex ( new_management_key ) . decode ( 'utf-8' ) ) ) elif force : ctx . fail ( 'New management key not given. Please remove the --force ' 'flag, or set the --generate flag or the ' '--new-management-key option.' ) else : new_management_key = click . prompt ( 'Enter your new management key' , hide_input = True , confirmation_prompt = True , err = True ) if new_management_key and type ( new_management_key ) is not bytes : try : new_management_key = a2b_hex ( new_management_key ) except Exception : ctx . fail ( 'New management key has the wrong format.' ) try : controller . set_mgm_key ( new_management_key , touch = touch , store_on_device = protect ) except APDUError as e : logger . error ( 'Failed to change management key' , exc_info = e ) ctx . fail ( 'Changing the management key failed.' ) | Change the management key . |
53,005 | def unblock_pin ( ctx , puk , new_pin ) : controller = ctx . obj [ 'controller' ] if not puk : puk = click . prompt ( 'Enter PUK' , default = '' , show_default = False , hide_input = True , err = True ) if not new_pin : new_pin = click . prompt ( 'Enter a new PIN' , default = '' , show_default = False , hide_input = True , err = True ) controller . unblock_pin ( puk , new_pin ) | Unblock the PIN . |
53,006 | def read_object ( ctx , pin , object_id ) : controller = ctx . obj [ 'controller' ] def do_read_object ( retry = True ) : try : click . echo ( controller . get_data ( object_id ) ) except APDUError as e : if e . sw == SW . NOT_FOUND : ctx . fail ( 'No data found.' ) elif e . sw == SW . SECURITY_CONDITION_NOT_SATISFIED : _verify_pin ( ctx , controller , pin ) do_read_object ( retry = False ) else : raise do_read_object ( ) | Read arbitrary PIV object . |
53,007 | def write_object ( ctx , pin , management_key , object_id , data ) : controller = ctx . obj [ 'controller' ] _ensure_authenticated ( ctx , controller , pin , management_key ) def do_write_object ( retry = True ) : try : controller . put_data ( object_id , data . read ( ) ) except APDUError as e : logger . debug ( 'Failed writing object' , exc_info = e ) if e . sw == SW . INCORRECT_PARAMETERS : ctx . fail ( 'Something went wrong, is the object id valid?' ) raise do_write_object ( ) | Write an arbitrary PIV object . |
53,008 | def fido ( ctx ) : dev = ctx . obj [ 'dev' ] if dev . is_fips : try : ctx . obj [ 'controller' ] = FipsU2fController ( dev . driver ) except Exception as e : logger . debug ( 'Failed to load FipsU2fController' , exc_info = e ) ctx . fail ( 'Failed to load FIDO Application.' ) else : try : ctx . obj [ 'controller' ] = Fido2Controller ( dev . driver ) except Exception as e : logger . debug ( 'Failed to load Fido2Controller' , exc_info = e ) ctx . fail ( 'Failed to load FIDO 2 Application.' ) | Manage FIDO applications . |
53,009 | def info ( ctx ) : controller = ctx . obj [ 'controller' ] if controller . is_fips : click . echo ( 'FIPS Approved Mode: {}' . format ( 'Yes' if controller . is_in_fips_mode else 'No' ) ) else : if controller . has_pin : try : click . echo ( 'PIN is set, with {} tries left.' . format ( controller . get_pin_retries ( ) ) ) except CtapError as e : if e . code == CtapError . ERR . PIN_BLOCKED : click . echo ( 'PIN is blocked.' ) else : click . echo ( 'PIN is not set.' ) | Display status of FIDO2 application . |
53,010 | def reset ( ctx , force ) : n_keys = len ( list ( get_descriptors ( ) ) ) if n_keys > 1 : ctx . fail ( 'Only one YubiKey can be connected to perform a reset.' ) if not force : if not click . confirm ( 'WARNING! This will delete all FIDO credentials, ' 'including FIDO U2F credentials, and restore ' 'factory settings. Proceed?' , err = True ) : ctx . abort ( ) def prompt_re_insert_key ( ) : click . echo ( 'Remove and re-insert your YubiKey to perform the reset...' ) removed = False while True : sleep ( 0.1 ) n_keys = len ( list ( get_descriptors ( ) ) ) if not n_keys : removed = True if removed and n_keys == 1 : return def try_reset ( controller_type ) : if not force : prompt_re_insert_key ( ) dev = list ( get_descriptors ( ) ) [ 0 ] . open_device ( TRANSPORT . FIDO ) controller = controller_type ( dev . driver ) controller . reset ( touch_callback = prompt_for_touch ) else : controller = ctx . obj [ 'controller' ] controller . reset ( touch_callback = prompt_for_touch ) if ctx . obj [ 'dev' ] . is_fips : if not force : destroy_input = click . prompt ( 'WARNING! This is a YubiKey FIPS device. This command will ' 'also overwrite the U2F attestation key; this action cannot be ' 'undone and this YubiKey will no longer be a FIPS compliant ' 'device.\n' 'To proceed, please enter the text "OVERWRITE"' , default = '' , show_default = False , err = True ) if destroy_input != 'OVERWRITE' : ctx . fail ( 'Reset aborted by user.' ) try : try_reset ( FipsU2fController ) except ApduError as e : if e . code == SW . COMMAND_NOT_ALLOWED : ctx . fail ( 'Reset failed. Reset must be triggered within 5 seconds' ' after the YubiKey is inserted.' ) else : logger . error ( 'Reset failed' , exc_info = e ) ctx . fail ( 'Reset failed.' ) except Exception as e : logger . error ( 'Reset failed' , exc_info = e ) ctx . fail ( 'Reset failed.' ) else : try : try_reset ( Fido2Controller ) except CtapError as e : if e . code == CtapError . ERR . ACTION_TIMEOUT : ctx . fail ( 'Reset failed. You need to touch your' ' YubiKey to confirm the reset.' ) elif e . code == CtapError . ERR . NOT_ALLOWED : ctx . fail ( 'Reset failed. Reset must be triggered within 5 seconds' ' after the YubiKey is inserted.' ) else : logger . error ( e ) ctx . fail ( 'Reset failed.' ) except Exception as e : logger . error ( e ) ctx . fail ( 'Reset failed.' ) | Reset all FIDO applications . |
53,011 | def unlock ( ctx , pin ) : controller = ctx . obj [ 'controller' ] if not controller . is_fips : ctx . fail ( 'This is not a YubiKey FIPS, and therefore' ' does not support a U2F PIN.' ) if pin is None : pin = _prompt_current_pin ( 'Enter your PIN' ) _fail_if_not_valid_pin ( ctx , pin , True ) try : controller . verify_pin ( pin ) except ApduError as e : if e . code == SW . VERIFY_FAIL_NO_RETRY : ctx . fail ( 'Wrong PIN.' ) if e . code == SW . AUTH_METHOD_BLOCKED : ctx . fail ( 'PIN is blocked.' ) if e . code == SW . COMMAND_NOT_ALLOWED : ctx . fail ( 'PIN is not set.' ) logger . error ( 'PIN verification failed' , exc_info = e ) ctx . fail ( 'PIN verification failed.' ) | Verify U2F PIN for YubiKey FIPS . |
53,012 | def get_pin_tries ( self ) : _ , sw = self . send_cmd ( INS . VERIFY , 0 , PIN , check = None ) return tries_left ( sw , self . version ) | Returns the number of PIN retries left 0 PIN authentication blocked . Note that 15 is the highest value that will be returned even if remaining tries is higher . |
53,013 | def cli ( ctx , device , log_level , log_file , reader ) : ctx . obj = YkmanContextObject ( ) if log_level : ykman . logging_setup . setup ( log_level , log_file = log_file ) if reader and device : ctx . fail ( '--reader and --device options can\'t be combined.' ) subcmd = next ( c for c in COMMANDS if c . name == ctx . invoked_subcommand ) if subcmd == list_keys : if reader : ctx . fail ( '--reader and list command can\'t be combined.' ) return transports = getattr ( subcmd , 'transports' , TRANSPORT . usb_transports ( ) ) if transports : def resolve_device ( ) : if device is not None : dev = _run_cmd_for_serial ( ctx , subcmd . name , transports , device ) else : dev = _run_cmd_for_single ( ctx , subcmd . name , transports , reader ) ctx . call_on_close ( dev . close ) return dev ctx . obj . add_resolver ( 'dev' , resolve_device ) | Configure your YubiKey via the command line . |
53,014 | def list_keys ( ctx , serials , readers ) : if readers : for reader in list_readers ( ) : click . echo ( reader . name ) ctx . exit ( ) all_descriptors = get_descriptors ( ) descriptors = [ d for d in all_descriptors if d . key_type != YUBIKEY . SKY ] skys = len ( all_descriptors ) - len ( descriptors ) handled_serials = set ( ) for dev in list_devices ( ) : handled = False if skys > 0 and dev . key_type == YUBIKEY . SKY : skys -= 1 serial = None handled = True else : serial = dev . serial if serial not in handled_serials : handled_serials . add ( serial ) matches = [ d for d in descriptors if ( d . key_type , d . mode ) == ( dev . driver . key_type , dev . driver . mode ) ] if len ( matches ) > 0 : d = matches [ 0 ] descriptors . remove ( d ) handled = True if handled : if serials : if serial : click . echo ( serial ) else : click . echo ( '{} [{}]{}' . format ( dev . device_name , dev . mode , ' Serial: {}' . format ( serial ) if serial else '' ) ) dev . close ( ) if not descriptors and not skys : break | List connected YubiKeys . |
53,015 | def otp ( ctx , access_code ) : ctx . obj [ 'controller' ] = OtpController ( ctx . obj [ 'dev' ] . driver ) if access_code is not None : if access_code == '' : access_code = click . prompt ( 'Enter access code' , show_default = False , err = True ) try : access_code = parse_access_code_hex ( access_code ) except Exception as e : ctx . fail ( 'Failed to parse access code: ' + str ( e ) ) ctx . obj [ 'controller' ] . access_code = access_code | Manage OTP Application . |
53,016 | def info ( ctx ) : dev = ctx . obj [ 'dev' ] controller = ctx . obj [ 'controller' ] slot1 , slot2 = controller . slot_status click . echo ( 'Slot 1: {}' . format ( slot1 and 'programmed' or 'empty' ) ) click . echo ( 'Slot 2: {}' . format ( slot2 and 'programmed' or 'empty' ) ) if dev . is_fips : click . echo ( 'FIPS Approved Mode: {}' . format ( 'Yes' if controller . is_in_fips_mode else 'No' ) ) | Display status of YubiKey Slots . |
53,017 | def swap ( ctx ) : controller = ctx . obj [ 'controller' ] click . echo ( 'Swapping slots...' ) try : controller . swap_slots ( ) except YkpersError as e : _failed_to_write_msg ( ctx , e ) | Swaps the two slot configurations . |
53,018 | def ndef ( ctx , slot , prefix ) : dev = ctx . obj [ 'dev' ] controller = ctx . obj [ 'controller' ] if not dev . config . nfc_supported : ctx . fail ( 'NFC interface not available.' ) if not controller . slot_status [ slot - 1 ] : ctx . fail ( 'Slot {} is empty.' . format ( slot ) ) try : if prefix : controller . configure_ndef_slot ( slot , prefix ) else : controller . configure_ndef_slot ( slot ) except YkpersError as e : _failed_to_write_msg ( ctx , e ) | Select slot configuration to use for NDEF . |
53,019 | def delete ( ctx , slot , force ) : controller = ctx . obj [ 'controller' ] if not force and not controller . slot_status [ slot - 1 ] : ctx . fail ( 'Not possible to delete an empty slot.' ) force or click . confirm ( 'Do you really want to delete' ' the configuration of slot {}?' . format ( slot ) , abort = True , err = True ) click . echo ( 'Deleting the configuration of slot {}...' . format ( slot ) ) try : controller . zap_slot ( slot ) except YkpersError as e : _failed_to_write_msg ( ctx , e ) | Deletes the configuration of a slot . |
53,020 | def yubiotp ( ctx , slot , public_id , private_id , key , no_enter , force , serial_public_id , generate_private_id , generate_key ) : dev = ctx . obj [ 'dev' ] controller = ctx . obj [ 'controller' ] if public_id and serial_public_id : ctx . fail ( 'Invalid options: --public-id conflicts with ' '--serial-public-id.' ) if private_id and generate_private_id : ctx . fail ( 'Invalid options: --private-id conflicts with ' '--generate-public-id.' ) if key and generate_key : ctx . fail ( 'Invalid options: --key conflicts with --generate-key.' ) if not public_id : if serial_public_id : if dev . serial is None : ctx . fail ( 'Serial number not set, public ID must be provided' ) public_id = modhex_encode ( b'\xff\x00' + struct . pack ( b'>I' , dev . serial ) ) click . echo ( 'Using YubiKey serial as public ID: {}' . format ( public_id ) ) elif force : ctx . fail ( 'Public ID not given. Please remove the --force flag, or ' 'add the --serial-public-id flag or --public-id option.' ) else : public_id = click . prompt ( 'Enter public ID' , err = True ) try : public_id = modhex_decode ( public_id ) except KeyError : ctx . fail ( 'Invalid public ID, must be modhex.' ) if not private_id : if generate_private_id : private_id = os . urandom ( 6 ) click . echo ( 'Using a randomly generated private ID: {}' . format ( b2a_hex ( private_id ) . decode ( 'ascii' ) ) ) elif force : ctx . fail ( 'Private ID not given. Please remove the --force flag, or ' 'add the --generate-private-id flag or --private-id option.' ) else : private_id = click . prompt ( 'Enter private ID' , err = True ) private_id = a2b_hex ( private_id ) if not key : if generate_key : key = os . urandom ( 16 ) click . echo ( 'Using a randomly generated secret key: {}' . format ( b2a_hex ( key ) . decode ( 'ascii' ) ) ) elif force : ctx . fail ( 'Secret key not given. Please remove the --force flag, or ' 'add the --generate-key flag or --key option.' ) else : key = click . prompt ( 'Enter secret key' , err = True ) key = a2b_hex ( key ) force or click . confirm ( 'Program an OTP credential in slot {}?' . format ( slot ) , abort = True , err = True ) try : controller . program_otp ( slot , key , public_id , private_id , not no_enter ) except YkpersError as e : _failed_to_write_msg ( ctx , e ) | Program a Yubico OTP credential . |
53,021 | def static ( ctx , slot , password , generate , length , keyboard_layout , no_enter , force ) : controller = ctx . obj [ 'controller' ] keyboard_layout = KEYBOARD_LAYOUT [ keyboard_layout ] if password and len ( password ) > 38 : ctx . fail ( 'Password too long (maximum length is 38 characters).' ) if generate and not length : ctx . fail ( 'Provide a length for the generated password.' ) if not password and not generate : password = click . prompt ( 'Enter a static password' , err = True ) elif not password and generate : password = generate_static_pw ( length , keyboard_layout ) if not force : _confirm_slot_overwrite ( controller , slot ) try : controller . program_static ( slot , password , not no_enter , keyboard_layout = keyboard_layout ) except YkpersError as e : _failed_to_write_msg ( ctx , e ) | Configure a static password . |
53,022 | def chalresp ( ctx , slot , key , totp , touch , force , generate ) : controller = ctx . obj [ 'controller' ] if key : if generate : ctx . fail ( 'Invalid options: --generate conflicts with KEY argument.' ) elif totp : key = parse_b32_key ( key ) else : key = parse_key ( key ) else : if force and not generate : ctx . fail ( 'No secret key given. Please remove the --force flag, ' 'set the KEY argument or set the --generate flag.' ) elif totp : while True : key = click . prompt ( 'Enter a secret key (base32)' , err = True ) try : key = parse_b32_key ( key ) break except Exception as e : click . echo ( e ) else : if generate : key = os . urandom ( 20 ) click . echo ( 'Using a randomly generated key: {}' . format ( b2a_hex ( key ) . decode ( 'ascii' ) ) ) else : key = click . prompt ( 'Enter a secret key' , err = True ) key = parse_key ( key ) cred_type = 'TOTP' if totp else 'challenge-response' force or click . confirm ( 'Program a {} credential in slot {}?' . format ( cred_type , slot ) , abort = True , err = True ) try : controller . program_chalresp ( slot , key , touch ) except YkpersError as e : _failed_to_write_msg ( ctx , e ) | Program a challenge - response credential . |
53,023 | def calculate ( ctx , slot , challenge , totp , digits ) : controller = ctx . obj [ 'controller' ] if not challenge and not totp : ctx . fail ( 'No challenge provided.' ) slot1 , slot2 = controller . slot_status if ( slot == 1 and not slot1 ) or ( slot == 2 and not slot2 ) : ctx . fail ( 'Cannot perform challenge-response on an empty slot.' ) if challenge and totp : try : challenge = int ( challenge ) except Exception as e : logger . error ( 'Error' , exc_info = e ) ctx . fail ( 'Timestamp challenge for TOTP must be an integer.' ) try : res = controller . calculate ( slot , challenge , totp = totp , digits = int ( digits ) , wait_for_touch = False ) except YkpersError as e : if e . errno == 11 : prompt_for_touch ( ) try : res = controller . calculate ( slot , challenge , totp = totp , digits = int ( digits ) , wait_for_touch = True ) except YkpersError as e : if e . errno == 4 : ctx . fail ( 'The YubiKey timed out.' ) else : ctx . fail ( e ) else : ctx . fail ( 'Failed to calculate challenge.' ) click . echo ( res ) | Perform a challenge - response operation . |
53,024 | def hotp ( ctx , slot , key , digits , counter , no_enter , force ) : controller = ctx . obj [ 'controller' ] if not key : while True : key = click . prompt ( 'Enter a secret key (base32)' , err = True ) try : key = parse_b32_key ( key ) break except Exception as e : click . echo ( e ) force or click . confirm ( 'Program a HOTP credential in slot {}?' . format ( slot ) , abort = True , err = True ) try : controller . program_hotp ( slot , key , counter , int ( digits ) == 8 , not no_enter ) except YkpersError as e : _failed_to_write_msg ( ctx , e ) | Program an HMAC - SHA1 OATH - HOTP credential . |
53,025 | def settings ( ctx , slot , new_access_code , delete_access_code , enter , pacing , force ) : controller = ctx . obj [ 'controller' ] if ( new_access_code is not None ) and delete_access_code : ctx . fail ( '--new-access-code conflicts with --delete-access-code.' ) if not controller . slot_status [ slot - 1 ] : ctx . fail ( 'Not possible to update settings on an empty slot.' ) if new_access_code is not None : if new_access_code == '' : new_access_code = click . prompt ( 'Enter new access code' , show_default = False , err = True ) try : new_access_code = parse_access_code_hex ( new_access_code ) except Exception as e : ctx . fail ( 'Failed to parse access code: ' + str ( e ) ) force or click . confirm ( 'Update the settings for slot {}? ' 'All existing settings will be overwritten.' . format ( slot ) , abort = True , err = True ) click . echo ( 'Updating settings for slot {}...' . format ( slot ) ) if pacing is not None : pacing = int ( pacing ) try : controller . update_settings ( slot , enter = enter , pacing = pacing ) except YkpersError as e : _failed_to_write_msg ( ctx , e ) if new_access_code : try : controller . set_access_code ( slot , new_access_code ) except Exception as e : logger . error ( 'Failed to set access code' , exc_info = e ) ctx . fail ( 'Failed to set access code: ' + str ( e ) ) if delete_access_code : try : controller . delete_access_code ( slot ) except Exception as e : logger . error ( 'Failed to delete access code' , exc_info = e ) ctx . fail ( 'Failed to delete access code: ' + str ( e ) ) | Update the settings for a slot . |
53,026 | def parse_private_key ( data , password ) : if is_pem ( data ) : if b'ENCRYPTED' in data : if password is None : raise TypeError ( 'No password provided for encrypted key.' ) try : return serialization . load_pem_private_key ( data , password , backend = default_backend ( ) ) except ValueError : raise except Exception : pass if is_pkcs12 ( data ) : try : p12 = crypto . load_pkcs12 ( data , password ) data = crypto . dump_privatekey ( crypto . FILETYPE_PEM , p12 . get_privatekey ( ) ) return serialization . load_pem_private_key ( data , password = None , backend = default_backend ( ) ) except crypto . Error as e : raise ValueError ( e ) try : return serialization . load_der_private_key ( data , password , backend = default_backend ( ) ) except Exception : pass raise ValueError ( 'Could not parse private key.' ) | Identifies decrypts and returns a cryptography private key object . |
53,027 | def parse_certificates ( data , password ) : if is_pem ( data ) : certs = [ ] for cert in data . split ( PEM_IDENTIFIER ) : try : certs . append ( x509 . load_pem_x509_certificate ( PEM_IDENTIFIER + cert , default_backend ( ) ) ) except Exception : pass if len ( certs ) > 0 : return certs if is_pkcs12 ( data ) : try : p12 = crypto . load_pkcs12 ( data , password ) data = crypto . dump_certificate ( crypto . FILETYPE_PEM , p12 . get_certificate ( ) ) return [ x509 . load_pem_x509_certificate ( data , default_backend ( ) ) ] except crypto . Error as e : raise ValueError ( e ) try : return [ x509 . load_der_x509_certificate ( data , default_backend ( ) ) ] except Exception : pass raise ValueError ( 'Could not parse certificate.' ) | Identifies decrypts and returns list of cryptography x509 certificates . |
53,028 | def get_leaf_certificates ( certs ) : issuers = [ cert . issuer . get_attributes_for_oid ( x509 . NameOID . COMMON_NAME ) for cert in certs ] leafs = [ cert for cert in certs if ( cert . subject . get_attributes_for_oid ( x509 . NameOID . COMMON_NAME ) not in issuers ) ] return leafs | Extracts the leaf certificates from a list of certificates . Leaf certificates are ones whose subject does not appear as issuer among the others . |
53,029 | def set_lock_code ( ctx , lock_code , new_lock_code , clear , generate , force ) : dev = ctx . obj [ 'dev' ] def prompt_new_lock_code ( ) : return prompt_lock_code ( prompt = 'Enter your new lock code' ) def prompt_current_lock_code ( ) : return prompt_lock_code ( prompt = 'Enter your current lock code' ) def change_lock_code ( lock_code , new_lock_code ) : lock_code = _parse_lock_code ( ctx , lock_code ) new_lock_code = _parse_lock_code ( ctx , new_lock_code ) try : dev . write_config ( device_config ( config_lock = new_lock_code ) , reboot = True , lock_key = lock_code ) except Exception as e : logger . error ( 'Changing the lock code failed' , exc_info = e ) ctx . fail ( 'Failed to change the lock code. Wrong current code?' ) def set_lock_code ( new_lock_code ) : new_lock_code = _parse_lock_code ( ctx , new_lock_code ) try : dev . write_config ( device_config ( config_lock = new_lock_code ) , reboot = True ) except Exception as e : logger . error ( 'Setting the lock code failed' , exc_info = e ) ctx . fail ( 'Failed to set the lock code.' ) if generate and new_lock_code : ctx . fail ( 'Invalid options: --new-lock-code conflicts with --generate.' ) if clear : new_lock_code = CLEAR_LOCK_CODE if generate : new_lock_code = b2a_hex ( os . urandom ( 16 ) ) . decode ( 'utf-8' ) click . echo ( 'Using a randomly generated lock code: {}' . format ( new_lock_code ) ) force or click . confirm ( 'Lock configuration with this lock code?' , abort = True , err = True ) if dev . config . configuration_locked : if lock_code : if new_lock_code : change_lock_code ( lock_code , new_lock_code ) else : new_lock_code = prompt_new_lock_code ( ) change_lock_code ( lock_code , new_lock_code ) else : if new_lock_code : lock_code = prompt_current_lock_code ( ) change_lock_code ( lock_code , new_lock_code ) else : lock_code = prompt_current_lock_code ( ) new_lock_code = prompt_new_lock_code ( ) change_lock_code ( lock_code , new_lock_code ) else : if lock_code : ctx . fail ( 'There is no current lock code set. ' 'Use --new-lock-code to set one.' ) else : if new_lock_code : set_lock_code ( new_lock_code ) else : new_lock_code = prompt_new_lock_code ( ) set_lock_code ( new_lock_code ) | Set or change the configuration lock code . |
53,030 | def nfc ( ctx , enable , disable , enable_all , disable_all , list , lock_code , force ) : if not ( list or enable_all or enable or disable_all or disable ) : ctx . fail ( 'No configuration options chosen.' ) if enable_all : enable = APPLICATION . __members__ . keys ( ) if disable_all : disable = APPLICATION . __members__ . keys ( ) _ensure_not_invalid_options ( ctx , enable , disable ) dev = ctx . obj [ 'dev' ] nfc_supported = dev . config . nfc_supported nfc_enabled = dev . config . nfc_enabled if not nfc_supported : ctx . fail ( 'NFC interface not available.' ) if list : _list_apps ( ctx , nfc_enabled ) for app in enable : if APPLICATION [ app ] & nfc_supported : nfc_enabled |= APPLICATION [ app ] else : ctx . fail ( '{} not supported over NFC.' . format ( app ) ) for app in disable : if APPLICATION [ app ] & nfc_supported : nfc_enabled &= ~ APPLICATION [ app ] else : ctx . fail ( '{} not supported over NFC.' . format ( app ) ) f_confirm = '{}{}Configure NFC interface?' . format ( 'Enable {}.\n' . format ( ', ' . join ( [ str ( APPLICATION [ app ] ) for app in enable ] ) ) if enable else '' , 'Disable {}.\n' . format ( ', ' . join ( [ str ( APPLICATION [ app ] ) for app in disable ] ) ) if disable else '' ) is_locked = dev . config . configuration_locked if force and is_locked and not lock_code : ctx . fail ( 'Configuration is locked - please supply the --lock-code ' 'option.' ) if lock_code and not is_locked : ctx . fail ( 'Configuration is not locked - please remove the ' '--lock-code option.' ) force or click . confirm ( f_confirm , abort = True , err = True ) if is_locked and not lock_code : lock_code = prompt_lock_code ( ) if lock_code : lock_code = _parse_lock_code ( ctx , lock_code ) try : dev . write_config ( device_config ( nfc_enabled = nfc_enabled ) , reboot = True , lock_key = lock_code ) except Exception as e : logger . error ( 'Failed to write config' , exc_info = e ) ctx . fail ( 'Failed to configure NFC applications.' ) | Enable or disable applications over NFC . |
53,031 | def info ( ctx , check_fips ) : dev = ctx . obj [ 'dev' ] if dev . is_fips and check_fips : fips_status = get_overall_fips_status ( dev . serial , dev . config ) click . echo ( 'Device type: {}' . format ( dev . device_name ) ) click . echo ( 'Serial number: {}' . format ( dev . serial or 'Not set or unreadable' ) ) if dev . version : f_version = '.' . join ( str ( x ) for x in dev . version ) click . echo ( 'Firmware version: {}' . format ( f_version ) ) else : click . echo ( 'Firmware version: Uncertain, re-run with only one ' 'YubiKey connected' ) config = dev . config if config . form_factor : click . echo ( 'Form factor: {!s}' . format ( config . form_factor ) ) click . echo ( 'Enabled USB interfaces: {}' . format ( dev . mode ) ) if config . nfc_supported : f_nfc = 'enabled' if config . nfc_enabled else 'disabled' click . echo ( 'NFC interface is {}.' . format ( f_nfc ) ) if config . configuration_locked : click . echo ( 'Configured applications are protected by a lock code.' ) click . echo ( ) print_app_status_table ( config ) if dev . is_fips and check_fips : click . echo ( ) click . echo ( 'FIPS Approved Mode: {}' . format ( 'Yes' if all ( fips_status . values ( ) ) else 'No' ) ) status_keys = list ( fips_status . keys ( ) ) status_keys . sort ( ) for status_key in status_keys : click . echo ( ' {}: {}' . format ( status_key , 'Yes' if fips_status [ status_key ] else 'No' ) ) | Show general information . |
53,032 | def oath ( ctx , password ) : try : controller = OathController ( ctx . obj [ 'dev' ] . driver ) ctx . obj [ 'controller' ] = controller ctx . obj [ 'settings' ] = Settings ( 'oath' ) except APDUError as e : if e . sw == SW . NOT_FOUND : ctx . fail ( "The OATH application can't be found on this YubiKey." ) raise if password : ctx . obj [ 'key' ] = controller . derive_key ( password ) | Manage OATH Application . |
53,033 | def info ( ctx ) : controller = ctx . obj [ 'controller' ] version = controller . version click . echo ( 'OATH version: {}.{}.{}' . format ( version [ 0 ] , version [ 1 ] , version [ 2 ] ) ) click . echo ( 'Password protection ' + ( 'enabled' if controller . locked else 'disabled' ) ) keys = ctx . obj [ 'settings' ] . get ( 'keys' , { } ) if controller . locked and controller . id in keys : click . echo ( 'The password for this YubiKey is remembered by ykman.' ) if ctx . obj [ 'dev' ] . is_fips : click . echo ( 'FIPS Approved Mode: {}' . format ( 'Yes' if controller . is_in_fips_mode else 'No' ) ) | Display status of OATH application . |
53,034 | def reset ( ctx ) : controller = ctx . obj [ 'controller' ] click . echo ( 'Resetting OATH data...' ) old_id = controller . id controller . reset ( ) settings = ctx . obj [ 'settings' ] keys = settings . setdefault ( 'keys' , { } ) if old_id in keys : del keys [ old_id ] settings . write ( ) click . echo ( 'Success! All OATH credentials have been cleared from your YubiKey.' ) | Reset all OATH data . |
53,035 | def add ( ctx , secret , name , issuer , period , oath_type , digits , touch , algorithm , counter , force ) : oath_type = OATH_TYPE [ oath_type ] algorithm = ALGO [ algorithm ] digits = int ( digits ) if not secret : while True : secret = click . prompt ( 'Enter a secret key (base32)' , err = True ) try : secret = parse_b32_key ( secret ) break except Exception as e : click . echo ( e ) ensure_validated ( ctx ) _add_cred ( ctx , CredentialData ( secret , issuer , name , oath_type , algorithm , digits , period , counter , touch ) , force ) | Add a new credential . |
53,036 | def uri ( ctx , uri , touch , force ) : if not uri : while True : uri = click . prompt ( 'Enter an OATH URI' , err = True ) try : uri = CredentialData . from_uri ( uri ) break except Exception as e : click . echo ( e ) ensure_validated ( ctx ) data = uri if data . digits == 5 and data . issuer == 'Steam' : data . digits = 6 data . touch = touch _add_cred ( ctx , data , force = force ) | Add a new credential from URI . |
53,037 | def list ( ctx , show_hidden , oath_type , period ) : ensure_validated ( ctx ) controller = ctx . obj [ 'controller' ] creds = [ cred for cred in controller . list ( ) if show_hidden or not cred . is_hidden ] creds . sort ( ) for cred in creds : click . echo ( cred . printable_key , nl = False ) if oath_type : click . echo ( u', {}' . format ( cred . oath_type . name ) , nl = False ) if period : click . echo ( ', {}' . format ( cred . period ) , nl = False ) click . echo ( ) | List all credentials . |
53,038 | def code ( ctx , show_hidden , query , single ) : ensure_validated ( ctx ) controller = ctx . obj [ 'controller' ] creds = [ ( cr , c ) for ( cr , c ) in controller . calculate_all ( ) if show_hidden or not cr . is_hidden ] creds = _search ( creds , query ) if len ( creds ) == 1 : cred , code = creds [ 0 ] if cred . touch : prompt_for_touch ( ) try : if cred . oath_type == OATH_TYPE . HOTP : hotp_touch_timer = Timer ( 0.500 , prompt_for_touch ) hotp_touch_timer . start ( ) creds = [ ( cred , controller . calculate ( cred ) ) ] hotp_touch_timer . cancel ( ) elif code is None : creds = [ ( cred , controller . calculate ( cred ) ) ] except APDUError as e : if e . sw == SW . SECURITY_CONDITION_NOT_SATISFIED : ctx . fail ( 'Touch credential timed out!' ) elif single : _error_multiple_hits ( ctx , [ cr for cr , c in creds ] ) if single : click . echo ( creds [ 0 ] [ 1 ] . value ) else : creds . sort ( ) outputs = [ ( cr . printable_key , c . value if c else '[Touch Credential]' if cr . touch else '[HOTP Credential]' if cr . oath_type == OATH_TYPE . HOTP else '' ) for ( cr , c ) in creds ] longest_name = max ( len ( n ) for ( n , c ) in outputs ) if outputs else 0 longest_code = max ( len ( c ) for ( n , c ) in outputs ) if outputs else 0 format_str = u'{:<%d} {:>%d}' % ( longest_name , longest_code ) for name , result in outputs : click . echo ( format_str . format ( name , result ) ) | Generate codes . |
53,039 | def delete ( ctx , query , force ) : ensure_validated ( ctx ) controller = ctx . obj [ 'controller' ] creds = controller . list ( ) hits = _search ( creds , query ) if len ( hits ) == 0 : click . echo ( 'No matches, nothing to be done.' ) elif len ( hits ) == 1 : cred = hits [ 0 ] if force or ( click . confirm ( u'Delete credential: {} ?' . format ( cred . printable_key ) , default = False , err = True ) ) : controller . delete ( cred ) click . echo ( u'Deleted {}.' . format ( cred . printable_key ) ) else : click . echo ( 'Deletion aborted by user.' ) else : _error_multiple_hits ( ctx , hits ) | Delete a credential . |
53,040 | def set_password ( ctx , new_password , remember ) : ensure_validated ( ctx , prompt = 'Enter your current password' ) if not new_password : new_password = click . prompt ( 'Enter your new password' , hide_input = True , confirmation_prompt = True , err = True ) controller = ctx . obj [ 'controller' ] settings = ctx . obj [ 'settings' ] keys = settings . setdefault ( 'keys' , { } ) key = controller . set_password ( new_password ) click . echo ( 'Password updated.' ) if remember : keys [ controller . id ] = b2a_hex ( key ) . decode ( ) settings . write ( ) click . echo ( 'Password remembered' ) elif controller . id in keys : del keys [ controller . id ] settings . write ( ) | Password protect the OATH credentials . |
53,041 | def remember_password ( ctx , forget , clear_all ) : controller = ctx . obj [ 'controller' ] settings = ctx . obj [ 'settings' ] keys = settings . setdefault ( 'keys' , { } ) if clear_all : del settings [ 'keys' ] settings . write ( ) click . echo ( 'All passwords have been cleared.' ) elif forget : if controller . id in keys : del keys [ controller . id ] settings . write ( ) click . echo ( 'Password forgotten.' ) else : ensure_validated ( ctx , remember = True ) | Manage local password storage . |
53,042 | def refresh_balance ( self ) : left_depth = self . left_node . depth if self . left_node else 0 right_depth = self . right_node . depth if self . right_node else 0 self . depth = 1 + max ( left_depth , right_depth ) self . balance = right_depth - left_depth | Recalculate self . balance and self . depth based on child node values . |
53,043 | def compute_depth ( self ) : left_depth = self . left_node . compute_depth ( ) if self . left_node else 0 right_depth = self . right_node . compute_depth ( ) if self . right_node else 0 return 1 + max ( left_depth , right_depth ) | Recursively computes true depth of the subtree . Should only be needed for debugging . Unless something is wrong the depth field should reflect the correct depth of the subtree . |
53,044 | def rotate ( self ) : self . refresh_balance ( ) if abs ( self . balance ) < 2 : return self my_heavy = self . balance > 0 child_heavy = self [ my_heavy ] . balance > 0 if my_heavy == child_heavy or self [ my_heavy ] . balance == 0 : return self . srotate ( ) else : return self . drotate ( ) | Does rotating if necessary to balance this node and returns the new top node . |
53,045 | def srotate ( self ) : heavy = self . balance > 0 light = not heavy save = self [ heavy ] self [ heavy ] = save [ light ] save [ light ] = self . rotate ( ) promotees = [ iv for iv in save [ light ] . s_center if save . center_hit ( iv ) ] if promotees : for iv in promotees : save [ light ] = save [ light ] . remove ( iv ) save . s_center . update ( promotees ) save . refresh_balance ( ) return save | Single rotation . Assumes that balance is + - 2 . |
53,046 | def add ( self , interval ) : if self . center_hit ( interval ) : self . s_center . add ( interval ) return self else : direction = self . hit_branch ( interval ) if not self [ direction ] : self [ direction ] = Node . from_interval ( interval ) self . refresh_balance ( ) return self else : self [ direction ] = self [ direction ] . add ( interval ) return self . rotate ( ) | Returns self after adding the interval and balancing . |
53,047 | def remove ( self , interval ) : done = [ ] return self . remove_interval_helper ( interval , done , should_raise_error = True ) | Returns self after removing the interval and balancing . |
53,048 | def discard ( self , interval ) : done = [ ] return self . remove_interval_helper ( interval , done , should_raise_error = False ) | Returns self after removing interval and balancing . |
53,049 | def remove_interval_helper ( self , interval , done , should_raise_error ) : if self . center_hit ( interval ) : if not should_raise_error and interval not in self . s_center : done . append ( 1 ) return self try : self . s_center . remove ( interval ) except : self . print_structure ( ) raise KeyError ( interval ) if self . s_center : done . append ( 1 ) return self return self . prune ( ) else : direction = self . hit_branch ( interval ) if not self [ direction ] : if should_raise_error : raise ValueError done . append ( 1 ) return self self [ direction ] = self [ direction ] . remove_interval_helper ( interval , done , should_raise_error ) if not done : return self . rotate ( ) return self | Returns self after removing interval and balancing . If interval doesn t exist raise ValueError . |
53,050 | def search_overlap ( self , point_list ) : result = set ( ) for j in point_list : self . search_point ( j , result ) return result | Returns all intervals that overlap the point_list . |
53,051 | def search_point ( self , point , result ) : for k in self . s_center : if k . begin <= point < k . end : result . add ( k ) if point < self . x_center and self [ 0 ] : return self [ 0 ] . search_point ( point , result ) elif point > self . x_center and self [ 1 ] : return self [ 1 ] . search_point ( point , result ) return result | Returns all intervals that contain point . |
53,052 | def prune ( self ) : if not self [ 0 ] or not self [ 1 ] : direction = not self [ 0 ] result = self [ direction ] return result else : heir , self [ 0 ] = self [ 0 ] . pop_greatest_child ( ) ( heir [ 0 ] , heir [ 1 ] ) = ( self [ 0 ] , self [ 1 ] ) heir . refresh_balance ( ) heir = heir . rotate ( ) return heir | On a subtree where the root node s s_center is empty return a new subtree with no empty s_centers . |
53,053 | def contains_point ( self , p ) : for iv in self . s_center : if iv . contains_point ( p ) : return True branch = self [ p > self . x_center ] return branch and branch . contains_point ( p ) | Returns whether this node or a child overlaps p . |
53,054 | def print_structure ( self , indent = 0 , tostring = False ) : nl = '\n' sp = indent * ' ' rlist = [ str ( self ) + nl ] if self . s_center : for iv in sorted ( self . s_center ) : rlist . append ( sp + ' ' + repr ( iv ) + nl ) if self . left_node : rlist . append ( sp + '<: ' ) rlist . append ( self . left_node . print_structure ( indent + 1 , True ) ) if self . right_node : rlist . append ( sp + '>: ' ) rlist . append ( self . right_node . print_structure ( indent + 1 , True ) ) result = '' . join ( rlist ) if tostring : return result else : print ( result ) | For debugging . |
53,055 | def from_tuples ( cls , tups ) : ivs = [ Interval ( * t ) for t in tups ] return IntervalTree ( ivs ) | Create a new IntervalTree from an iterable of 2 - or 3 - tuples where the tuple lists begin end and optionally data . |
53,056 | def _add_boundaries ( self , interval ) : begin = interval . begin end = interval . end if begin in self . boundary_table : self . boundary_table [ begin ] += 1 else : self . boundary_table [ begin ] = 1 if end in self . boundary_table : self . boundary_table [ end ] += 1 else : self . boundary_table [ end ] = 1 | Records the boundaries of the interval in the boundary table . |
53,057 | def _remove_boundaries ( self , interval ) : begin = interval . begin end = interval . end if self . boundary_table [ begin ] == 1 : del self . boundary_table [ begin ] else : self . boundary_table [ begin ] -= 1 if self . boundary_table [ end ] == 1 : del self . boundary_table [ end ] else : self . boundary_table [ end ] -= 1 | Removes the boundaries of the interval from the boundary table . |
53,058 | def add ( self , interval ) : if interval in self : return if interval . is_null ( ) : raise ValueError ( "IntervalTree: Null Interval objects not allowed in IntervalTree:" " {0}" . format ( interval ) ) if not self . top_node : self . top_node = Node . from_interval ( interval ) else : self . top_node = self . top_node . add ( interval ) self . all_intervals . add ( interval ) self . _add_boundaries ( interval ) | Adds an interval to the tree if not already present . |
53,059 | def remove ( self , interval ) : if interval not in self : raise ValueError self . top_node = self . top_node . remove ( interval ) self . all_intervals . remove ( interval ) self . _remove_boundaries ( interval ) | Removes an interval from the tree if present . If not raises ValueError . |
53,060 | def discard ( self , interval ) : if interval not in self : return self . all_intervals . discard ( interval ) self . top_node = self . top_node . discard ( interval ) self . _remove_boundaries ( interval ) | Removes an interval from the tree if present . If not does nothing . |
53,061 | def difference ( self , other ) : ivs = set ( ) for iv in self : if iv not in other : ivs . add ( iv ) return IntervalTree ( ivs ) | Returns a new tree comprising all intervals in self but not in other . |
53,062 | def intersection ( self , other ) : ivs = set ( ) shorter , longer = sorted ( [ self , other ] , key = len ) for iv in shorter : if iv in longer : ivs . add ( iv ) return IntervalTree ( ivs ) | Returns a new tree of all intervals common to both self and other . |
53,063 | def intersection_update ( self , other ) : ivs = list ( self ) for iv in ivs : if iv not in other : self . remove ( iv ) | Removes intervals from self unless they also exist in other . |
53,064 | def symmetric_difference ( self , other ) : if not isinstance ( other , set ) : other = set ( other ) me = set ( self ) ivs = me . difference ( other ) . union ( other . difference ( me ) ) return IntervalTree ( ivs ) | Return a tree with elements only in self or other but not both . |
53,065 | def symmetric_difference_update ( self , other ) : other = set ( other ) ivs = list ( self ) for iv in ivs : if iv in other : self . remove ( iv ) other . remove ( iv ) self . update ( other ) | Throws out all intervals except those only in self or other not both . |
53,066 | def remove_overlap ( self , begin , end = None ) : hitlist = self . at ( begin ) if end is None else self . overlap ( begin , end ) for iv in hitlist : self . remove ( iv ) | Removes all intervals overlapping the given point or range . |
53,067 | def remove_envelop ( self , begin , end ) : hitlist = self . envelop ( begin , end ) for iv in hitlist : self . remove ( iv ) | Removes all intervals completely enveloped in the given range . |
53,068 | def find_nested ( self ) : result = { } def add_if_nested ( ) : if parent . contains_interval ( child ) : if parent not in result : result [ parent ] = set ( ) result [ parent ] . add ( child ) long_ivs = sorted ( self . all_intervals , key = Interval . length , reverse = True ) for i , parent in enumerate ( long_ivs ) : for child in long_ivs [ i + 1 : ] : add_if_nested ( ) return result | Returns a dictionary mapping parent intervals to sets of intervals overlapped by and contained in the parent . |
53,069 | def overlaps ( self , begin , end = None ) : if end is not None : return self . overlaps_range ( begin , end ) elif isinstance ( begin , Number ) : return self . overlaps_point ( begin ) else : return self . overlaps_range ( begin . begin , begin . end ) | Returns whether some interval in the tree overlaps the given point or range . |
53,070 | def overlaps_point ( self , p ) : if self . is_empty ( ) : return False return bool ( self . top_node . contains_point ( p ) ) | Returns whether some interval in the tree overlaps p . |
53,071 | def overlaps_range ( self , begin , end ) : if self . is_empty ( ) : return False elif begin >= end : return False elif self . overlaps_point ( begin ) : return True return any ( self . overlaps_point ( bound ) for bound in self . boundary_table if begin < bound < end ) | Returns whether some interval in the tree overlaps the given range . Returns False if given a null interval over which to test . |
53,072 | def split_overlaps ( self ) : if not self : return if len ( self . boundary_table ) == 2 : return bounds = sorted ( self . boundary_table ) new_ivs = set ( ) for lbound , ubound in zip ( bounds [ : - 1 ] , bounds [ 1 : ] ) : for iv in self [ lbound ] : new_ivs . add ( Interval ( lbound , ubound , iv . data ) ) self . __init__ ( new_ivs ) | Finds all intervals with overlapping ranges and splits them along the range boundaries . |
53,073 | def at ( self , p ) : root = self . top_node if not root : return set ( ) return root . search_point ( p , set ( ) ) | Returns the set of all intervals that contain p . |
53,074 | def envelop ( self , begin , end = None ) : root = self . top_node if not root : return set ( ) if end is None : iv = begin return self . envelop ( iv . begin , iv . end ) elif begin >= end : return set ( ) result = root . search_point ( begin , set ( ) ) boundary_table = self . boundary_table bound_begin = boundary_table . bisect_left ( begin ) bound_end = boundary_table . bisect_left ( end ) result . update ( root . search_overlap ( boundary_table . keys ( ) [ index ] for index in xrange ( bound_begin , bound_end ) ) ) result = set ( iv for iv in result if iv . begin >= begin and iv . end <= end ) return result | Returns the set of all intervals fully contained in the range [ begin end ) . |
53,075 | def defnoun ( self , singular , plural ) : self . checkpat ( singular ) self . checkpatplural ( plural ) self . pl_sb_user_defined . extend ( ( singular , plural ) ) self . si_sb_user_defined . extend ( ( plural , singular ) ) return 1 | Set the noun plural of singular to plural . |
53,076 | def defverb ( self , s1 , p1 , s2 , p2 , s3 , p3 ) : self . checkpat ( s1 ) self . checkpat ( s2 ) self . checkpat ( s3 ) self . checkpatplural ( p1 ) self . checkpatplural ( p2 ) self . checkpatplural ( p3 ) self . pl_v_user_defined . extend ( ( s1 , p1 , s2 , p2 , s3 , p3 ) ) return 1 | Set the verb plurals for s1 s2 and s3 to p1 p2 and p3 respectively . |
53,077 | def defadj ( self , singular , plural ) : self . checkpat ( singular ) self . checkpatplural ( plural ) self . pl_adj_user_defined . extend ( ( singular , plural ) ) return 1 | Set the adjective plural of singular to plural . |
53,078 | def defa ( self , pattern ) : self . checkpat ( pattern ) self . A_a_user_defined . extend ( ( pattern , "a" ) ) return 1 | Define the indefinate article as a for words matching pattern . |
53,079 | def defan ( self , pattern ) : self . checkpat ( pattern ) self . A_a_user_defined . extend ( ( pattern , "an" ) ) return 1 | Define the indefinate article as an for words matching pattern . |
53,080 | def checkpat ( self , pattern ) : if pattern is None : return try : re . match ( pattern , "" ) except re . error : print3 ( "\nBad user-defined singular pattern:\n\t%s\n" % pattern ) raise BadUserDefinedPatternError | check for errors in a regex pattern |
53,081 | def classical ( self , ** kwargs ) : classical_mode = list ( def_classical . keys ( ) ) if not kwargs : self . classical_dict = all_classical . copy ( ) return if "all" in kwargs : if kwargs [ "all" ] : self . classical_dict = all_classical . copy ( ) else : self . classical_dict = no_classical . copy ( ) for k , v in list ( kwargs . items ( ) ) : if k in classical_mode : self . classical_dict [ k ] = v else : raise UnknownClassicalModeError | turn classical mode on and off for various categories |
53,082 | def num ( self , count = None , show = None ) : if count is not None : try : self . persistent_count = int ( count ) except ValueError : raise BadNumValueError if ( show is None ) or show : return str ( count ) else : self . persistent_count = None return "" | Set the number to be used in other method calls . |
53,083 | def _get_value_from_ast ( self , obj ) : if isinstance ( obj , ast . Num ) : return obj . n elif isinstance ( obj , ast . Str ) : return obj . s elif isinstance ( obj , ast . List ) : return [ self . _get_value_from_ast ( e ) for e in obj . elts ] elif isinstance ( obj , ast . Tuple ) : return tuple ( [ self . _get_value_from_ast ( e ) for e in obj . elts ] ) elif sys . version_info . major >= 3 and isinstance ( obj , ast . NameConstant ) : return obj . value elif isinstance ( obj , ast . Name ) and ( obj . id in [ "True" , "False" , "None" ] ) : return string_to_constant [ obj . id ] raise NameError ( "name '%s' is not defined" % obj . id ) | Return the value of the ast object . |
53,084 | def _string_to_substitute ( self , mo , methods_dict ) : matched_text , f_name = mo . groups ( ) if f_name not in methods_dict : return matched_text a_tree = ast . parse ( matched_text ) args_list = [ self . _get_value_from_ast ( a ) for a in a_tree . body [ 0 ] . value . args ] kwargs_list = { kw . arg : self . _get_value_from_ast ( kw . value ) for kw in a_tree . body [ 0 ] . value . keywords } return methods_dict [ f_name ] ( * args_list , ** kwargs_list ) | Return the string to be substituted for the match . |
53,085 | def inflect ( self , text ) : save_persistent_count = self . persistent_count methods_dict = { "plural" : self . plural , "plural_adj" : self . plural_adj , "plural_noun" : self . plural_noun , "plural_verb" : self . plural_verb , "singular_noun" : self . singular_noun , "a" : self . a , "an" : self . a , "no" : self . no , "ordinal" : self . ordinal , "number_to_words" : self . number_to_words , "present_participle" : self . present_participle , "num" : self . num , } functions_re = re . compile ( r"((\w+)\([^)]*\)*)" , re . IGNORECASE ) output = functions_re . sub ( lambda mo : self . _string_to_substitute ( mo , methods_dict ) , text ) self . persistent_count = save_persistent_count return output | Perform inflections in a string . |
53,086 | def plural ( self , text , count = None ) : pre , word , post = self . partition_word ( text ) if not word : return text plural = self . postprocess ( word , self . _pl_special_adjective ( word , count ) or self . _pl_special_verb ( word , count ) or self . _plnoun ( word , count ) , ) return "{}{}{}" . format ( pre , plural , post ) | Return the plural of text . |
53,087 | def plural_noun ( self , text , count = None ) : pre , word , post = self . partition_word ( text ) if not word : return text plural = self . postprocess ( word , self . _plnoun ( word , count ) ) return "{}{}{}" . format ( pre , plural , post ) | Return the plural of text where text is a noun . |
53,088 | def plural_verb ( self , text , count = None ) : pre , word , post = self . partition_word ( text ) if not word : return text plural = self . postprocess ( word , self . _pl_special_verb ( word , count ) or self . _pl_general_verb ( word , count ) , ) return "{}{}{}" . format ( pre , plural , post ) | Return the plural of text where text is a verb . |
53,089 | def plural_adj ( self , text , count = None ) : pre , word , post = self . partition_word ( text ) if not word : return text plural = self . postprocess ( word , self . _pl_special_adjective ( word , count ) or word ) return "{}{}{}" . format ( pre , plural , post ) | Return the plural of text where text is an adjective . |
53,090 | def compare ( self , word1 , word2 ) : return ( self . _plequal ( word1 , word2 , self . plural_noun ) or self . _plequal ( word1 , word2 , self . plural_verb ) or self . _plequal ( word1 , word2 , self . plural_adj ) ) | compare word1 and word2 for equality regardless of plurality |
53,091 | def compare_nouns ( self , word1 , word2 ) : return self . _plequal ( word1 , word2 , self . plural_noun ) | compare word1 and word2 for equality regardless of plurality word1 and word2 are to be treated as nouns |
53,092 | def compare_verbs ( self , word1 , word2 ) : return self . _plequal ( word1 , word2 , self . plural_verb ) | compare word1 and word2 for equality regardless of plurality word1 and word2 are to be treated as verbs |
53,093 | def compare_adjs ( self , word1 , word2 ) : return self . _plequal ( word1 , word2 , self . plural_adj ) | compare word1 and word2 for equality regardless of plurality word1 and word2 are to be treated as adjectives |
53,094 | def singular_noun ( self , text , count = None , gender = None ) : pre , word , post = self . partition_word ( text ) if not word : return text sing = self . _sinoun ( word , count = count , gender = gender ) if sing is not False : plural = self . postprocess ( word , self . _sinoun ( word , count = count , gender = gender ) ) return "{}{}{}" . format ( pre , plural , post ) return False | Return the singular of text where text is a plural noun . |
53,095 | def a ( self , text , count = 1 ) : mo = re . search ( r"\A(\s*)(?:an?\s+)?(.+?)(\s*)\Z" , text , re . IGNORECASE ) if mo : word = mo . group ( 2 ) if not word : return text pre = mo . group ( 1 ) post = mo . group ( 3 ) result = self . _indef_article ( word , count ) return "{}{}{}" . format ( pre , result , post ) return "" | Return the appropriate indefinite article followed by text . |
53,096 | def no ( self , text , count = None ) : if count is None and self . persistent_count is not None : count = self . persistent_count if count is None : count = 0 mo = re . search ( r"\A(\s*)(.+?)(\s*)\Z" , text ) pre = mo . group ( 1 ) word = mo . group ( 2 ) post = mo . group ( 3 ) if str ( count ) . lower ( ) in pl_count_zero : return "{}no {}{}" . format ( pre , self . plural ( word , 0 ) , post ) else : return "{}{} {}{}" . format ( pre , count , self . plural ( word , count ) , post ) | If count is 0 no zero or nil return no followed by the plural of text . |
53,097 | def present_participle ( self , word ) : plv = self . plural_verb ( word , 2 ) for pat , repl in ( ( r"ie$" , r"y" ) , ( r"ue$" , r"u" ) , ( r"([auy])e$" , r"\g<1>" ) , ( r"ski$" , r"ski" ) , ( r"[^b]i$" , r"" ) , ( r"^(are|were)$" , r"be" ) , ( r"^(had)$" , r"hav" ) , ( r"^(hoe)$" , r"\g<1>" ) , ( r"([^e])e$" , r"\g<1>" ) , ( r"er$" , r"er" ) , ( r"([^aeiou][aeiouy]([bdgmnprst]))$" , r"\g<1>\g<2>" ) , ) : ( ans , num ) = re . subn ( pat , repl , plv ) if num : return "%sing" % ans return "%sing" % ans | Return the present participle for word . |
53,098 | def ordinal ( self , num ) : if re . match ( r"\d" , str ( num ) ) : try : num % 2 n = num except TypeError : if "." in str ( num ) : try : n = int ( num [ - 1 ] ) except ValueError : n = int ( num [ : - 1 ] ) else : n = int ( num ) try : post = nth [ n % 100 ] except KeyError : post = nth [ n % 10 ] return "{}{}" . format ( num , post ) else : mo = re . search ( r"(%s)\Z" % ordinal_suff , num ) try : post = ordinal [ mo . group ( 1 ) ] return re . sub ( r"(%s)\Z" % ordinal_suff , post , num ) except AttributeError : return "%sth" % num | Return the ordinal of num . |
53,099 | def join ( self , words , sep = None , sep_spaced = True , final_sep = None , conj = "and" , conj_spaced = True , ) : if not words : return "" if len ( words ) == 1 : return words [ 0 ] if conj_spaced : if conj == "" : conj = " " else : conj = " %s " % conj if len ( words ) == 2 : return "{}{}{}" . format ( words [ 0 ] , conj , words [ 1 ] ) if sep is None : if "," in "" . join ( words ) : sep = ";" else : sep = "," if final_sep is None : final_sep = sep final_sep = "{}{}" . format ( final_sep , conj ) if sep_spaced : sep += " " return "{}{}{}" . format ( sep . join ( words [ 0 : - 1 ] ) , final_sep , words [ - 1 ] ) | Join words into a list . |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.