source_code
stringlengths
45
7.24k
function_name
stringlengths
1
111
messages
list
def x(self, when=0): for iss in list(self.owners()): _kbl = [] for kb in self.issuer_keys[iss]: kb.remove_outdated(self.remove_after, when=when) if len(kb): _kbl.append(kb) if _kbl: self.issuer_keys[iss] = _kbl else: del self.issuer_keys[iss]
remove_outdated
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, when=0):\n for iss in list(self.owners()):\n _kbl = []\n for kb in self.issuer_keys[iss]:\n kb.remove_outdated(self.remove_after, when=when)\n if len(kb):\n _kbl.append(kb)\n if _kbl:\n self.issuer_keys[iss] = _kbl\n else:\n del self.issuer_keys[iss]\n", "role": "user" }, { "content": "remove_outdated", "role": "assistant" } ]
def x(self, jwt, **kwargs): try: _key_type = jwe_alg2keytype(jwt.headers['alg']) except KeyError: _key_type = '' try: _kid = jwt.headers['kid'] except KeyError: logger.info('Missing kid') _kid = '' keys = self.get(key_use='enc', owner='', key_type=_key_type) try: _aud = kwargs['aud'] except KeyError: _aud = '' if _aud: try: allow_missing_kid = kwargs['allow_missing_kid'] except KeyError: allow_missing_kid = False try: nki = kwargs['no_kid_issuer'] except KeyError: nki = {} keys = self._add_key(keys, _aud, 'enc', _key_type, _kid, nki, allow_missing_kid) keys = [k for k in keys if k.appropriate_for('decrypt')] return keys
get_jwt_decrypt_keys
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, jwt, **kwargs):\n try:\n _key_type = jwe_alg2keytype(jwt.headers['alg'])\n except KeyError:\n _key_type = ''\n try:\n _kid = jwt.headers['kid']\n except KeyError:\n logger.info('Missing kid')\n _kid = ''\n keys = self.get(key_use='enc', owner='', key_type=_key_type)\n try:\n _aud = kwargs['aud']\n except KeyError:\n _aud = ''\n if _aud:\n try:\n allow_missing_kid = kwargs['allow_missing_kid']\n except KeyError:\n allow_missing_kid = False\n try:\n nki = kwargs['no_kid_issuer']\n except KeyError:\n nki = {}\n keys = self._add_key(keys, _aud, 'enc', _key_type, _kid, nki,\n allow_missing_kid)\n keys = [k for k in keys if k.appropriate_for('decrypt')]\n return keys\n", "role": "user" }, { "content": "get_jwt_decrypt_keys", "role": "assistant" } ]
def x(self, jwt, **kwargs): try: allow_missing_kid = kwargs['allow_missing_kid'] except KeyError: allow_missing_kid = False try: _key_type = jws_alg2keytype(jwt.headers['alg']) except KeyError: _key_type = '' try: _kid = jwt.headers['kid'] except KeyError: logger.info('Missing kid') _kid = '' try: nki = kwargs['no_kid_issuer'] except KeyError: nki = {} _payload = jwt.payload() try: _iss = _payload['iss'] except KeyError: try: _iss = kwargs['iss'] except KeyError: _iss = '' if _iss: if 'jku' in jwt.headers and _iss: if not self.find(jwt.headers['jku'], _iss): try: if kwargs['trusting']: self.add_url(_iss, jwt.headers['jku']) except KeyError: pass keys = self._add_key([], _iss, 'sig', _key_type, _kid, nki, allow_missing_kid) if _key_type == 'oct': keys.extend(self.get(key_use='sig', owner='', key_type=_key_type)) else: keys = self.get(key_use='sig', owner='', key_type=_key_type) keys = [k for k in keys if k.appropriate_for('verify')] return keys
get_jwt_verify_keys
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, jwt, **kwargs):\n try:\n allow_missing_kid = kwargs['allow_missing_kid']\n except KeyError:\n allow_missing_kid = False\n try:\n _key_type = jws_alg2keytype(jwt.headers['alg'])\n except KeyError:\n _key_type = ''\n try:\n _kid = jwt.headers['kid']\n except KeyError:\n logger.info('Missing kid')\n _kid = ''\n try:\n nki = kwargs['no_kid_issuer']\n except KeyError:\n nki = {}\n _payload = jwt.payload()\n try:\n _iss = _payload['iss']\n except KeyError:\n try:\n _iss = kwargs['iss']\n except KeyError:\n _iss = ''\n if _iss:\n if 'jku' in jwt.headers and _iss:\n if not self.find(jwt.headers['jku'], _iss):\n try:\n if kwargs['trusting']:\n self.add_url(_iss, jwt.headers['jku'])\n except KeyError:\n pass\n keys = self._add_key([], _iss, 'sig', _key_type, _kid, nki,\n allow_missing_kid)\n if _key_type == 'oct':\n keys.extend(self.get(key_use='sig', owner='', key_type=_key_type))\n else:\n keys = self.get(key_use='sig', owner='', key_type=_key_type)\n keys = [k for k in keys if k.appropriate_for('verify')]\n return keys\n", "role": "user" }, { "content": "get_jwt_verify_keys", "role": "assistant" } ]
def x(self): kj = KeyJar() for issuer in self.owners(): kj[issuer] = [kb.copy() for kb in self[issuer]] kj.verify_ssl = self.verify_ssl return kj
copy
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n kj = KeyJar()\n for issuer in self.owners():\n kj[issuer] = [kb.copy() for kb in self[issuer]]\n kj.verify_ssl = self.verify_ssl\n return kj\n", "role": "user" }, { "content": "copy", "role": "assistant" } ]
def x(keys, use, alg='', key_type='', kid=''): res = [] if not key_type: if use == 'sig': key_type = jws_alg2keytype(alg) else: key_type = jwe_alg2keytype(alg) for key in keys: if key.use and key.use != use: continue if key.kty == key_type: if key.kid and kid: if key.kid == kid: res.append(key) else: continue if key.alg == '': if alg: if key_type == 'EC': if key.crv == 'P-{}'.format(alg[2:]): res.append(key) continue res.append(key) elif alg and key.alg == alg: res.append(key) else: res.append(key) return res
pick_key
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(keys, use, alg='', key_type='', kid=''):\n res = []\n if not key_type:\n if use == 'sig':\n key_type = jws_alg2keytype(alg)\n else:\n key_type = jwe_alg2keytype(alg)\n for key in keys:\n if key.use and key.use != use:\n continue\n if key.kty == key_type:\n if key.kid and kid:\n if key.kid == kid:\n res.append(key)\n else:\n continue\n if key.alg == '':\n if alg:\n if key_type == 'EC':\n if key.crv == 'P-{}'.format(alg[2:]):\n res.append(key)\n continue\n res.append(key)\n elif alg and key.alg == alg:\n res.append(key)\n else:\n res.append(key)\n return res\n", "role": "user" }, { "content": "pick_key", "role": "assistant" } ]
def x(self, recv, aud): argv = {'iss': self.iss, 'iat': utc_time_sans_frac()} if self.lifetime: argv['exp'] = argv['iat'] + self.lifetime _aud = self.put_together_aud(recv, aud) if _aud: argv['aud'] = _aud return argv
pack_init
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, recv, aud):\n argv = {'iss': self.iss, 'iat': utc_time_sans_frac()}\n if self.lifetime:\n argv['exp'] = argv['iat'] + self.lifetime\n _aud = self.put_together_aud(recv, aud)\n if _aud:\n argv['aud'] = _aud\n return argv\n", "role": "user" }, { "content": "pack_init", "role": "assistant" } ]
def x(self, owner_id='', kid=''): keys = pick_key(self.my_keys(owner_id, 'sig'), 'sig', alg=self.alg, kid=kid ) if not keys: raise NoSuitableSigningKeys('kid={}'.format(kid)) return keys[0]
pack_key
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, owner_id='', kid=''):\n keys = pick_key(self.my_keys(owner_id, 'sig'), 'sig', alg=self.alg, kid=kid\n )\n if not keys:\n raise NoSuitableSigningKeys('kid={}'.format(kid))\n return keys[0]\n", "role": "user" }, { "content": "pack_key", "role": "assistant" } ]
def x(self, rj, token): keys = self.key_jar.get_jwt_verify_keys(rj.jwt) return rj.verify_compact(token, keys)
verify
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, rj, token):\n keys = self.key_jar.get_jwt_verify_keys(rj.jwt)\n return rj.verify_compact(token, keys)\n", "role": "user" }, { "content": "verify", "role": "assistant" } ]
def x(self, rj, token): if self.iss: keys = self.key_jar.get_jwt_decrypt_keys(rj.jwt, aud=self.iss) else: keys = self.key_jar.get_jwt_decrypt_keys(rj.jwt) return rj.decrypt(token, keys=keys)
decrypt
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, rj, token):\n if self.iss:\n keys = self.key_jar.get_jwt_decrypt_keys(rj.jwt, aud=self.iss)\n else:\n keys = self.key_jar.get_jwt_decrypt_keys(rj.jwt)\n return rj.decrypt(token, keys=keys)\n", "role": "user" }, { "content": "decrypt", "role": "assistant" } ]
def x(msg_cls, info, **kwargs): _msg = msg_cls(**info) if not _msg.verify(**kwargs): raise VerificationError() return _msg
verify_profile
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(msg_cls, info, **kwargs):\n _msg = msg_cls(**info)\n if not _msg.verify(**kwargs):\n raise VerificationError()\n return _msg\n", "role": "user" }, { "content": "verify_profile", "role": "assistant" } ]
def x(self, token): if not token: raise KeyError _jwe_header = _jws_header = None darg = {} if self.allowed_enc_encs: darg['enc'] = self.allowed_enc_encs if self.allowed_enc_algs: darg['alg'] = self.allowed_enc_algs try: _decryptor = jwe_factory(token, **darg) except (KeyError, HeaderError): _decryptor = None if _decryptor: _info = self._decrypt(_decryptor, token) _jwe_header = _decryptor.jwt.headers try: _content_type = _decryptor.jwt.headers['cty'] except KeyError: _content_type = '' else: _content_type = 'jwt' _info = token if _content_type.lower() == 'jwt': if self.allowed_sign_algs: _verifier = jws_factory(_info, alg=self.allowed_sign_algs) else: _verifier = jws_factory(_info) if _verifier: _info = self._verify(_verifier, _info) else: raise Exception() _jws_header = _verifier.jwt.headers else: try: _info = json.loads(_info) except JSONDecodeError: return _info except TypeError: try: _info = as_unicode(_info) _info = json.loads(_info) except JSONDecodeError: return _info if self.msg_cls: _msg_cls = self.msg_cls else: try: _msg_cls = self.iss2msg_cls[_info['iss']] except KeyError: _msg_cls = None if _msg_cls: vp_args = {'skew': self.skew} if self.iss: vp_args['aud'] = self.iss _info = self.verify_profile(_msg_cls, _info, **vp_args) _info.jwe_header = _jwe_header _info.jws_header = _jws_header return _info else: return _info
unpack
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, token):\n if not token:\n raise KeyError\n _jwe_header = _jws_header = None\n darg = {}\n if self.allowed_enc_encs:\n darg['enc'] = self.allowed_enc_encs\n if self.allowed_enc_algs:\n darg['alg'] = self.allowed_enc_algs\n try:\n _decryptor = jwe_factory(token, **darg)\n except (KeyError, HeaderError):\n _decryptor = None\n if _decryptor:\n _info = self._decrypt(_decryptor, token)\n _jwe_header = _decryptor.jwt.headers\n try:\n _content_type = _decryptor.jwt.headers['cty']\n except KeyError:\n _content_type = ''\n else:\n _content_type = 'jwt'\n _info = token\n if _content_type.lower() == 'jwt':\n if self.allowed_sign_algs:\n _verifier = jws_factory(_info, alg=self.allowed_sign_algs)\n else:\n _verifier = jws_factory(_info)\n if _verifier:\n _info = self._verify(_verifier, _info)\n else:\n raise Exception()\n _jws_header = _verifier.jwt.headers\n else:\n try:\n _info = json.loads(_info)\n except JSONDecodeError:\n return _info\n except TypeError:\n try:\n _info = as_unicode(_info)\n _info = json.loads(_info)\n except JSONDecodeError:\n return _info\n if self.msg_cls:\n _msg_cls = self.msg_cls\n else:\n try:\n _msg_cls = self.iss2msg_cls[_info['iss']]\n except KeyError:\n _msg_cls = None\n if _msg_cls:\n vp_args = {'skew': self.skew}\n if self.iss:\n vp_args['aud'] = self.iss\n _info = self.verify_profile(_msg_cls, _info, **vp_args)\n _info.jwe_header = _jwe_header\n _info.jws_header = _jws_header\n return _info\n else:\n return _info\n", "role": "user" }, { "content": "unpack", "role": "assistant" } ]
def x(token, alg=''): _jw = JWS(alg=alg) if _jw.is_jws(token): return _jw else: return None
factory
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(token, alg=''):\n _jw = JWS(alg=alg)\n if _jw.is_jws(token):\n return _jw\n else:\n return None\n", "role": "user" }, { "content": "factory", "role": "assistant" } ]
def x(self, keys=None, protected=None, **kwargs): _headers = self._header _headers.update(kwargs) key, xargs, _alg = self.alg_keys(keys, 'sig', protected) if 'typ' in self: xargs['typ'] = self['typ'] _headers.update(xargs) jwt = JWSig(**_headers) if _alg == 'none': return jwt.pack(parts=[self.msg, '']) try: _signer = SIGNER_ALGS[_alg] except KeyError: raise UnknownAlgorithm(_alg) _input = jwt.pack(parts=[self.msg]) if isinstance(key, AsymmetricKey): sig = _signer.sign(_input.encode('utf-8'), key.private_key()) else: sig = _signer.sign(_input.encode('utf-8'), key.key) logger.debug('Signed message using key with kid=%s' % key.kid) return '.'.join([_input, b64encode_item(sig).decode('utf-8')])
sign_compact
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, keys=None, protected=None, **kwargs):\n _headers = self._header\n _headers.update(kwargs)\n key, xargs, _alg = self.alg_keys(keys, 'sig', protected)\n if 'typ' in self:\n xargs['typ'] = self['typ']\n _headers.update(xargs)\n jwt = JWSig(**_headers)\n if _alg == 'none':\n return jwt.pack(parts=[self.msg, ''])\n try:\n _signer = SIGNER_ALGS[_alg]\n except KeyError:\n raise UnknownAlgorithm(_alg)\n _input = jwt.pack(parts=[self.msg])\n if isinstance(key, AsymmetricKey):\n sig = _signer.sign(_input.encode('utf-8'), key.private_key())\n else:\n sig = _signer.sign(_input.encode('utf-8'), key.key)\n logger.debug('Signed message using key with kid=%s' % key.kid)\n return '.'.join([_input, b64encode_item(sig).decode('utf-8')])\n", "role": "user" }, { "content": "sign_compact", "role": "assistant" } ]
def x(self, jws=None, keys=None, allow_none=False, sigalg=None): return self.verify_compact_verbose(jws, keys, allow_none, sigalg)['msg']
verify_compact
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, jws=None, keys=None, allow_none=False, sigalg=None):\n return self.verify_compact_verbose(jws, keys, allow_none, sigalg)['msg']\n", "role": "user" }, { "content": "verify_compact", "role": "assistant" } ]
def x(self, jws=None, keys=None, allow_none=False, sigalg=None): if jws: jwt = JWSig().unpack(jws) if len(jwt) != 3: raise WrongNumberOfParts(len(jwt)) self.jwt = jwt elif not self.jwt: raise ValueError('Missing singed JWT') else: jwt = self.jwt try: _alg = jwt.headers['alg'] except KeyError: _alg = None else: if _alg is None or _alg.lower() == 'none': if allow_none: self.msg = jwt.payload() return {'msg': self.msg} else: raise SignerAlgError('none not allowed') if 'alg' in self and self['alg'] and _alg: if isinstance(self['alg'], list): if _alg not in self['alg']: raise SignerAlgError( 'Wrong signing algorithm, expected {} got {}'.format( self['alg'], _alg)) elif _alg != self['alg']: raise SignerAlgError('Wrong signing algorithm, expected {} got {}' .format(self['alg'], _alg)) if sigalg and sigalg != _alg: raise SignerAlgError('Expected {0} got {1}'.format(sigalg, jwt. headers['alg'])) self['alg'] = _alg if keys: _keys = self.pick_keys(keys) else: _keys = self.pick_keys(self._get_keys()) if not _keys: if 'kid' in self: raise NoSuitableSigningKeys('No key with kid: %s' % self['kid']) elif 'kid' in self.jwt.headers: raise NoSuitableSigningKeys('No key with kid: %s' % self.jwt. headers['kid']) else: raise NoSuitableSigningKeys('No key for algorithm: %s' % _alg) verifier = SIGNER_ALGS[_alg] for key in _keys: if isinstance(key, AsymmetricKey): _key = key.public_key() else: _key = key.key try: if not verifier.verify(jwt.sign_input(), jwt.signature(), _key): continue except (BadSignature, IndexError): pass except (ValueError, TypeError) as err: logger.warning('Exception "{}" caught'.format(err)) else: logger.debug('Verified message using key with kid=%s' % key.kid) self.msg = jwt.payload() self.key = key return {'msg': self.msg, 'key': key} raise BadSignature()
verify_compact_verbose
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, jws=None, keys=None, allow_none=False, sigalg=None):\n if jws:\n jwt = JWSig().unpack(jws)\n if len(jwt) != 3:\n raise WrongNumberOfParts(len(jwt))\n self.jwt = jwt\n elif not self.jwt:\n raise ValueError('Missing singed JWT')\n else:\n jwt = self.jwt\n try:\n _alg = jwt.headers['alg']\n except KeyError:\n _alg = None\n else:\n if _alg is None or _alg.lower() == 'none':\n if allow_none:\n self.msg = jwt.payload()\n return {'msg': self.msg}\n else:\n raise SignerAlgError('none not allowed')\n if 'alg' in self and self['alg'] and _alg:\n if isinstance(self['alg'], list):\n if _alg not in self['alg']:\n raise SignerAlgError(\n 'Wrong signing algorithm, expected {} got {}'.format(\n self['alg'], _alg))\n elif _alg != self['alg']:\n raise SignerAlgError('Wrong signing algorithm, expected {} got {}'\n .format(self['alg'], _alg))\n if sigalg and sigalg != _alg:\n raise SignerAlgError('Expected {0} got {1}'.format(sigalg, jwt.\n headers['alg']))\n self['alg'] = _alg\n if keys:\n _keys = self.pick_keys(keys)\n else:\n _keys = self.pick_keys(self._get_keys())\n if not _keys:\n if 'kid' in self:\n raise NoSuitableSigningKeys('No key with kid: %s' % self['kid'])\n elif 'kid' in self.jwt.headers:\n raise NoSuitableSigningKeys('No key with kid: %s' % self.jwt.\n headers['kid'])\n else:\n raise NoSuitableSigningKeys('No key for algorithm: %s' % _alg)\n verifier = SIGNER_ALGS[_alg]\n for key in _keys:\n if isinstance(key, AsymmetricKey):\n _key = key.public_key()\n else:\n _key = key.key\n try:\n if not verifier.verify(jwt.sign_input(), jwt.signature(), _key):\n continue\n except (BadSignature, IndexError):\n pass\n except (ValueError, TypeError) as err:\n logger.warning('Exception \"{}\" caught'.format(err))\n else:\n logger.debug('Verified message using key with kid=%s' % key.kid)\n self.msg = jwt.payload()\n self.key = key\n return {'msg': self.msg, 'key': key}\n raise BadSignature()\n", "role": "user" }, { "content": "verify_compact_verbose", "role": "assistant" } ]
def x(self, keys=None, headers=None, flatten=False): def x(protected, unprotected): protected_headers = protected or {} protected_headers.setdefault('alg', self.alg) _jws = JWS(self.msg, **protected_headers) encoded_header, payload, signature = _jws.sign_compact(protected= protected, keys=keys).split('.') signature_entry = {'signature': signature} if unprotected: signature_entry['header'] = unprotected if encoded_header: signature_entry['protected'] = encoded_header return signature_entry res = {'payload': b64e_enc_dec(self.msg, 'utf-8', 'ascii')} if headers is None: headers = [(dict(alg=self.alg), None)] if flatten and len(headers) == 1: signature_entry = create_signature(*headers[0]) res.update(signature_entry) else: res['signatures'] = [] for protected, unprotected in headers: signature_entry = create_signature(protected, unprotected) res['signatures'].append(signature_entry) return json.dumps(res)
sign_json
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, keys=None, headers=None, flatten=False):\n\n def x(protected, unprotected):\n protected_headers = protected or {}\n protected_headers.setdefault('alg', self.alg)\n _jws = JWS(self.msg, **protected_headers)\n encoded_header, payload, signature = _jws.sign_compact(protected=\n protected, keys=keys).split('.')\n signature_entry = {'signature': signature}\n if unprotected:\n signature_entry['header'] = unprotected\n if encoded_header:\n signature_entry['protected'] = encoded_header\n return signature_entry\n res = {'payload': b64e_enc_dec(self.msg, 'utf-8', 'ascii')}\n if headers is None:\n headers = [(dict(alg=self.alg), None)]\n if flatten and len(headers) == 1:\n signature_entry = create_signature(*headers[0])\n res.update(signature_entry)\n else:\n res['signatures'] = []\n for protected, unprotected in headers:\n signature_entry = create_signature(protected, unprotected)\n res['signatures'].append(signature_entry)\n return json.dumps(res)\n", "role": "user" }, { "content": "sign_json", "role": "assistant" } ]
def x(self, json_jws): json_ser_keys = {'payload', 'signatures'} flattened_json_ser_keys = {'payload', 'signature'} if not json_ser_keys.issubset(json_jws.keys() ) and not flattened_json_ser_keys.issubset(json_jws.keys()): return False return True
is_json_serialized_jws
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, json_jws):\n json_ser_keys = {'payload', 'signatures'}\n flattened_json_ser_keys = {'payload', 'signature'}\n if not json_ser_keys.issubset(json_jws.keys()\n ) and not flattened_json_ser_keys.issubset(json_jws.keys()):\n return False\n return True\n", "role": "user" }, { "content": "is_json_serialized_jws", "role": "assistant" } ]
def x(self, jws): try: jwt = JWSig().unpack(jws) except Exception as err: logger.warning('Could not parse JWS: {}'.format(err)) return False if 'alg' not in jwt.headers: return False if jwt.headers['alg'] is None: jwt.headers['alg'] = 'none' if jwt.headers['alg'] not in SIGNER_ALGS: logger.debug('UnknownSignerAlg: %s' % jwt.headers['alg']) return False self.jwt = jwt return True
is_compact_jws
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, jws):\n try:\n jwt = JWSig().unpack(jws)\n except Exception as err:\n logger.warning('Could not parse JWS: {}'.format(err))\n return False\n if 'alg' not in jwt.headers:\n return False\n if jwt.headers['alg'] is None:\n jwt.headers['alg'] = 'none'\n if jwt.headers['alg'] not in SIGNER_ALGS:\n logger.debug('UnknownSignerAlg: %s' % jwt.headers['alg'])\n return False\n self.jwt = jwt\n return True\n", "role": "user" }, { "content": "is_compact_jws", "role": "assistant" } ]
def x(self, usage, alg='HS256'): try: _use = USE[usage] except: raise ValueError('Unknown key usage') else: if not self.use or self.use == _use: if _use == 'sig': return self.get_key() else: return self.encryption_key(alg) raise WrongUsage("This key can't be used for {}".format(usage))
appropriate_for
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, usage, alg='HS256'):\n try:\n _use = USE[usage]\n except:\n raise ValueError('Unknown key usage')\n else:\n if not self.use or self.use == _use:\n if _use == 'sig':\n return self.get_key()\n else:\n return self.encryption_key(alg)\n raise WrongUsage(\"This key can't be used for {}\".format(usage))\n", "role": "user" }, { "content": "appropriate_for", "role": "assistant" } ]
def x(self, alg, **kwargs): if not self.key: self.deserialize() try: tsize = ALG2KEYLEN[alg] except KeyError: raise UnsupportedAlgorithm(alg) if tsize <= 32: _enc_key = sha256_digest(self.key)[:tsize] elif tsize <= 48: _enc_key = sha384_digest(self.key)[:tsize] elif tsize <= 64: _enc_key = sha512_digest(self.key)[:tsize] else: raise JWKException('No support for symmetric keys > 512 bits') logger.debug('Symmetric encryption key: {}'.format(as_unicode(b64e( _enc_key)))) return _enc_key
encryption_key
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, alg, **kwargs):\n if not self.key:\n self.deserialize()\n try:\n tsize = ALG2KEYLEN[alg]\n except KeyError:\n raise UnsupportedAlgorithm(alg)\n if tsize <= 32:\n _enc_key = sha256_digest(self.key)[:tsize]\n elif tsize <= 48:\n _enc_key = sha384_digest(self.key)[:tsize]\n elif tsize <= 64:\n _enc_key = sha512_digest(self.key)[:tsize]\n else:\n raise JWKException('No support for symmetric keys > 512 bits')\n logger.debug('Symmetric encryption key: {}'.format(as_unicode(b64e(\n _enc_key))))\n return _enc_key\n", "role": "user" }, { "content": "encryption_key", "role": "assistant" } ]
def x(self, msg, key): if not isinstance(key, rsa.RSAPrivateKey): raise TypeError('The key must be an instance of rsa.RSAPrivateKey') sig = key.sign(msg, self.padding, self.hash) return sig
sign
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, msg, key):\n if not isinstance(key, rsa.RSAPrivateKey):\n raise TypeError('The key must be an instance of rsa.RSAPrivateKey')\n sig = key.sign(msg, self.padding, self.hash)\n return sig\n", "role": "user" }, { "content": "sign", "role": "assistant" } ]
def x(self, msg, signature, key): if not isinstance(key, rsa.RSAPublicKey): raise TypeError('The public key must be an instance of RSAPublicKey') try: key.verify(signature, msg, self.padding, self.hash) except InvalidSignature as err: raise BadSignature(str(err)) except AttributeError: return False else: return True
verify
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, msg, signature, key):\n if not isinstance(key, rsa.RSAPublicKey):\n raise TypeError('The public key must be an instance of RSAPublicKey')\n try:\n key.verify(signature, msg, self.padding, self.hash)\n except InvalidSignature as err:\n raise BadSignature(str(err))\n except AttributeError:\n return False\n else:\n return True\n", "role": "user" }, { "content": "verify", "role": "assistant" } ]
def x(self, usage, **kwargs): try: _use = USE[usage] except KeyError: raise ValueError('Unknown key usage') else: if usage in ['sign', 'decrypt']: if not self.use or _use == self.use: if self.priv_key: return self.priv_key return None else: if not self.use or _use == self.use: if self.pub_key: return self.pub_key return None
appropriate_for
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, usage, **kwargs):\n try:\n _use = USE[usage]\n except KeyError:\n raise ValueError('Unknown key usage')\n else:\n if usage in ['sign', 'decrypt']:\n if not self.use or _use == self.use:\n if self.priv_key:\n return self.priv_key\n return None\n else:\n if not self.use or _use == self.use:\n if self.pub_key:\n return self.pub_key\n return None\n", "role": "user" }, { "content": "appropriate_for", "role": "assistant" } ]
def x(key_size=2048, filename='rsa.key', passphrase=''): private_key = rsa.generate_private_key(public_exponent=65537, key_size= key_size, backend=default_backend()) with open(filename, 'wb') as keyfile: if passphrase: pem = private_key.private_bytes(encoding=serialization.Encoding .PEM, format=serialization.PrivateFormat.PKCS8, encryption_algorithm=serialization.BestAvailableEncryption( passphrase)) else: pem = private_key.private_bytes(encoding=serialization.Encoding .PEM, format=serialization.PrivateFormat.PKCS8, encryption_algorithm=serialization.NoEncryption()) keyfile.write(pem) keyfile.close() return private_key
generate_and_store_rsa_key
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(key_size=2048, filename='rsa.key', passphrase=''):\n private_key = rsa.generate_private_key(public_exponent=65537, key_size=\n key_size, backend=default_backend())\n with open(filename, 'wb') as keyfile:\n if passphrase:\n pem = private_key.private_bytes(encoding=serialization.Encoding\n .PEM, format=serialization.PrivateFormat.PKCS8,\n encryption_algorithm=serialization.BestAvailableEncryption(\n passphrase))\n else:\n pem = private_key.private_bytes(encoding=serialization.Encoding\n .PEM, format=serialization.PrivateFormat.PKCS8,\n encryption_algorithm=serialization.NoEncryption())\n keyfile.write(pem)\n keyfile.close()\n return private_key\n", "role": "user" }, { "content": "generate_and_store_rsa_key", "role": "assistant" } ]
def x(filename): with open(filename, 'rb') as key_file: public_key = serialization.load_pem_public_key(key_file.read(), backend=default_backend()) return public_key
import_public_rsa_key_from_file
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(filename):\n with open(filename, 'rb') as key_file:\n public_key = serialization.load_pem_public_key(key_file.read(),\n backend=default_backend())\n return public_key\n", "role": "user" }, { "content": "import_public_rsa_key_from_file", "role": "assistant" } ]
def x(pem_data): if not pem_data.startswith(PREFIX): pem_data = bytes('{}\n{}\n{}'.format(PREFIX, pem_data, POSTFIX), 'utf-8') else: pem_data = bytes(pem_data, 'utf-8') cert = x509.load_pem_x509_certificate(pem_data, default_backend()) return cert.public_key()
import_rsa_key
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(pem_data):\n if not pem_data.startswith(PREFIX):\n pem_data = bytes('{}\\n{}\\n{}'.format(PREFIX, pem_data, POSTFIX),\n 'utf-8')\n else:\n pem_data = bytes(pem_data, 'utf-8')\n cert = x509.load_pem_x509_certificate(pem_data, default_backend())\n return cert.public_key()\n", "role": "user" }, { "content": "import_rsa_key", "role": "assistant" } ]
def x(key1, key2): pn1 = key1.public_numbers() pn2 = key2.public_numbers() if pn1 == pn2: return True else: return False
rsa_eq
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(key1, key2):\n pn1 = key1.public_numbers()\n pn2 = key2.public_numbers()\n if pn1 == pn2:\n return True\n else:\n return False\n", "role": "user" }, { "content": "rsa_eq", "role": "assistant" } ]
def x(txt): pub_key = import_rsa_key(txt) if isinstance(pub_key, rsa.RSAPublicKey): return [('rsa', pub_key)]
x509_rsa_load
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(txt):\n pub_key = import_rsa_key(txt)\n if isinstance(pub_key, rsa.RSAPublicKey):\n return [('rsa', pub_key)]\n", "role": "user" }, { "content": "x509_rsa_load", "role": "assistant" } ]
def x(der_data): if isinstance(der_data, str): der_data = bytes(der_data, 'utf-8') return x509.load_der_x509_certificate(der_data, default_backend())
der_cert
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(der_data):\n if isinstance(der_data, str):\n der_data = bytes(der_data, 'utf-8')\n return x509.load_der_x509_certificate(der_data, default_backend())\n", "role": "user" }, { "content": "der_cert", "role": "assistant" } ]
def x(url, httpc, spec2key, **get_args): try: r = httpc('GET', url, allow_redirects=True, **get_args) if r.status_code == 200: cert = str(r.text) try: public_key = spec2key[cert] except KeyError: public_key = import_rsa_key(cert) spec2key[cert] = public_key if isinstance(public_key, rsa.RSAPublicKey): return {'rsa': public_key} else: raise Exception('HTTP Get error: %s' % r.status_code) except Exception as err: logger.warning("Can't load key: %s" % err) return []
load_x509_cert
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(url, httpc, spec2key, **get_args):\n try:\n r = httpc('GET', url, allow_redirects=True, **get_args)\n if r.status_code == 200:\n cert = str(r.text)\n try:\n public_key = spec2key[cert]\n except KeyError:\n public_key = import_rsa_key(cert)\n spec2key[cert] = public_key\n if isinstance(public_key, rsa.RSAPublicKey):\n return {'rsa': public_key}\n else:\n raise Exception('HTTP Get error: %s' % r.status_code)\n except Exception as err:\n logger.warning(\"Can't load key: %s\" % err)\n return []\n", "role": "user" }, { "content": "load_x509_cert", "role": "assistant" } ]
def x(pn1, pn2): if pn1.n == pn2.n: if pn1.e == pn2.e: return True return False
cmp_public_numbers
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(pn1, pn2):\n if pn1.n == pn2.n:\n if pn1.e == pn2.e:\n return True\n return False\n", "role": "user" }, { "content": "cmp_public_numbers", "role": "assistant" } ]
def x(pn1, pn2): if not cmp_public_numbers(pn1.public_numbers, pn2.public_numbers): return False for param in ['d', 'p', 'q']: if getattr(pn1, param) != getattr(pn2, param): return False return True
cmp_private_numbers
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(pn1, pn2):\n if not cmp_public_numbers(pn1.public_numbers, pn2.public_numbers):\n return False\n for param in ['d', 'p', 'q']:\n if getattr(pn1, param) != getattr(pn2, param):\n return False\n return True\n", "role": "user" }, { "content": "cmp_private_numbers", "role": "assistant" } ]
def x(cert): if isinstance(cert, str): der_cert = base64.b64decode(cert.encode('ascii')) else: der_cert = base64.b64decode(cert) return b64e(hashlib.sha1(der_cert).digest())
x5t_calculation
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(cert):\n if isinstance(cert, str):\n der_cert = base64.b64decode(cert.encode('ascii'))\n else:\n der_cert = base64.b64decode(cert)\n return b64e(hashlib.sha1(der_cert).digest())\n", "role": "user" }, { "content": "x5t_calculation", "role": "assistant" } ]
def x(key_size=2048, kid='', use='', public_exponent=65537): _key = rsa.generate_private_key(public_exponent=public_exponent, key_size=key_size, backend=default_backend()) _rk = RSAKey(priv_key=_key, use=use, kid=kid) if not kid: _rk.add_kid() return _rk
new_rsa_key
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(key_size=2048, kid='', use='', public_exponent=65537):\n _key = rsa.generate_private_key(public_exponent=public_exponent,\n key_size=key_size, backend=default_backend())\n _rk = RSAKey(priv_key=_key, use=use, kid=kid)\n if not kid:\n _rk.add_kid()\n return _rk\n", "role": "user" }, { "content": "new_rsa_key", "role": "assistant" } ]
def x(self): if self.n and self.e: try: numbers = {} for param in self.longs: item = getattr(self, param) if not item: continue else: try: val = int(deser(item)) except Exception: raise else: numbers[param] = val if 'd' in numbers: self.priv_key = rsa_construct_private(numbers) self.pub_key = self.priv_key.public_key() else: self.pub_key = rsa_construct_public(numbers) except ValueError as err: raise DeSerializationNotPossible('%s' % err) if self.x5c: _cert_chain = [] for der_data in self.x5c: _cert_chain.append(der_cert(base64.b64decode(der_data))) if self.x5t: if isinstance(self.x5t, bytes): _x5t = self.x5t else: _x5t = self.x5t.encode('ascii') if _x5t != x5t_calculation(self.x5c[0]): raise DeSerializationNotPossible( "The thumbprint 'x5t' does not match the certificate.") if self.pub_key: if not rsa_eq(self.pub_key, _cert_chain[0].public_key()): raise ValueError( 'key described by components and key in x5c not equal') else: self.pub_key = _cert_chain[0].public_key() self._serialize(self.pub_key) if len(self.x5c) > 1: pass if not self.priv_key and not self.pub_key: raise DeSerializationNotPossible()
deserialize
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n if self.n and self.e:\n try:\n numbers = {}\n for param in self.longs:\n item = getattr(self, param)\n if not item:\n continue\n else:\n try:\n val = int(deser(item))\n except Exception:\n raise\n else:\n numbers[param] = val\n if 'd' in numbers:\n self.priv_key = rsa_construct_private(numbers)\n self.pub_key = self.priv_key.public_key()\n else:\n self.pub_key = rsa_construct_public(numbers)\n except ValueError as err:\n raise DeSerializationNotPossible('%s' % err)\n if self.x5c:\n _cert_chain = []\n for der_data in self.x5c:\n _cert_chain.append(der_cert(base64.b64decode(der_data)))\n if self.x5t:\n if isinstance(self.x5t, bytes):\n _x5t = self.x5t\n else:\n _x5t = self.x5t.encode('ascii')\n if _x5t != x5t_calculation(self.x5c[0]):\n raise DeSerializationNotPossible(\n \"The thumbprint 'x5t' does not match the certificate.\")\n if self.pub_key:\n if not rsa_eq(self.pub_key, _cert_chain[0].public_key()):\n raise ValueError(\n 'key described by components and key in x5c not equal')\n else:\n self.pub_key = _cert_chain[0].public_key()\n self._serialize(self.pub_key)\n if len(self.x5c) > 1:\n pass\n if not self.priv_key and not self.pub_key:\n raise DeSerializationNotPossible()\n", "role": "user" }, { "content": "deserialize", "role": "assistant" } ]
def x(self, private=False): if not self.priv_key and not self.pub_key: raise SerializationNotPossible() res = self.common() public_longs = list(set(self.public_members) & set(self.longs)) for param in public_longs: item = getattr(self, param) if item: res[param] = item if private: for param in self.longs: if not private and param in ['d', 'p', 'q', 'dp', 'dq', 'di', 'qi' ]: continue item = getattr(self, param) if item: res[param] = item if self.x5c: res['x5c'] = [x.decode('utf-8') for x in self.x5c] return res
serialize
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, private=False):\n if not self.priv_key and not self.pub_key:\n raise SerializationNotPossible()\n res = self.common()\n public_longs = list(set(self.public_members) & set(self.longs))\n for param in public_longs:\n item = getattr(self, param)\n if item:\n res[param] = item\n if private:\n for param in self.longs:\n if not private and param in ['d', 'p', 'q', 'dp', 'dq', 'di', 'qi'\n ]:\n continue\n item = getattr(self, param)\n if item:\n res[param] = item\n if self.x5c:\n res['x5c'] = [x.decode('utf-8') for x in self.x5c]\n return res\n", "role": "user" }, { "content": "serialize", "role": "assistant" } ]
def x(self, key): self._serialize(key) if isinstance(key, rsa.RSAPrivateKey): self.priv_key = key self.pub_key = key.public_key() else: self.pub_key = key return self
load_key
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, key):\n self._serialize(key)\n if isinstance(key, rsa.RSAPrivateKey):\n self.priv_key = key\n self.pub_key = key.public_key()\n else:\n self.pub_key = key\n return self\n", "role": "user" }, { "content": "load_key", "role": "assistant" } ]
def x(self, msg, key): if not isinstance(key, ec.EllipticCurvePrivateKey): raise TypeError( 'The private key must be an instance of ec.EllipticCurvePrivateKey' ) self._cross_check(key.public_key()) num_bits = key.curve.key_size num_bytes = (num_bits + 7) // 8 asn1sig = key.sign(msg, ec.ECDSA(self.hash_algorithm())) r, s = decode_dss_signature(asn1sig) return int_to_bytes(r, num_bytes) + int_to_bytes(s, num_bytes)
sign
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, msg, key):\n if not isinstance(key, ec.EllipticCurvePrivateKey):\n raise TypeError(\n 'The private key must be an instance of ec.EllipticCurvePrivateKey'\n )\n self._cross_check(key.public_key())\n num_bits = key.curve.key_size\n num_bytes = (num_bits + 7) // 8\n asn1sig = key.sign(msg, ec.ECDSA(self.hash_algorithm()))\n r, s = decode_dss_signature(asn1sig)\n return int_to_bytes(r, num_bytes) + int_to_bytes(s, num_bytes)\n", "role": "user" }, { "content": "sign", "role": "assistant" } ]
def x(self, msg, sig, key): if not isinstance(key, ec.EllipticCurvePublicKey): raise TypeError( 'The public key must be an instance of ec.EllipticCurvePublicKey') self._cross_check(key) num_bits = key.curve.key_size num_bytes = (num_bits + 7) // 8 if len(sig) != 2 * num_bytes: raise ValueError('Invalid signature') try: r, s = self._split_raw_signature(sig) asn1sig = encode_dss_signature(r, s) key.verify(asn1sig, msg, ec.ECDSA(self.hash_algorithm())) except InvalidSignature as err: raise BadSignature(err) else: return True
verify
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, msg, sig, key):\n if not isinstance(key, ec.EllipticCurvePublicKey):\n raise TypeError(\n 'The public key must be an instance of ec.EllipticCurvePublicKey')\n self._cross_check(key)\n num_bits = key.curve.key_size\n num_bytes = (num_bits + 7) // 8\n if len(sig) != 2 * num_bytes:\n raise ValueError('Invalid signature')\n try:\n r, s = self._split_raw_signature(sig)\n asn1sig = encode_dss_signature(r, s)\n key.verify(asn1sig, msg, ec.ECDSA(self.hash_algorithm()))\n except InvalidSignature as err:\n raise BadSignature(err)\n else:\n return True\n", "role": "user" }, { "content": "verify", "role": "assistant" } ]
def x(self, pub_key): if self.curve_name != pub_key.curve.name: raise ValueError( "The curve in private key {} and in algorithm {} don't match". format(pub_key.curve.name, self.curve_name))
cross_check
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, pub_key):\n if self.curve_name != pub_key.curve.name:\n raise ValueError(\n \"The curve in private key {} and in algorithm {} don't match\".\n format(pub_key.curve.name, self.curve_name))\n", "role": "user" }, { "content": "cross_check", "role": "assistant" } ]
def x(sig): c_length = len(sig) // 2 r = int_from_bytes(sig[:c_length], byteorder='big') s = int_from_bytes(sig[c_length:], byteorder='big') return r, s
split_raw_signature
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(sig):\n c_length = len(sig) // 2\n r = int_from_bytes(sig[:c_length], byteorder='big')\n s = int_from_bytes(sig[c_length:], byteorder='big')\n return r, s\n", "role": "user" }, { "content": "split_raw_signature", "role": "assistant" } ]
def x(msg, func='HS256'): if func == 'HS256': return as_unicode(b64e(sha256_digest(msg)[:16])) elif func == 'HS384': return as_unicode(b64e(sha384_digest(msg)[:24])) elif func == 'HS512': return as_unicode(b64e(sha512_digest(msg)[:32]))
left_hash
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(msg, func='HS256'):\n if func == 'HS256':\n return as_unicode(b64e(sha256_digest(msg)[:16]))\n elif func == 'HS384':\n return as_unicode(b64e(sha384_digest(msg)[:24]))\n elif func == 'HS512':\n return as_unicode(b64e(sha512_digest(msg)[:32]))\n", "role": "user" }, { "content": "left_hash", "role": "assistant" } ]
def x(alg): if not alg or alg.lower() == 'none': return 'none' elif alg.startswith('RS') or alg.startswith('PS'): return 'RSA' elif alg.startswith('HS') or alg.startswith('A'): return 'oct' elif alg.startswith('ES') or alg.startswith('ECDH-ES'): return 'EC' else: return None
alg2keytype
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(alg):\n if not alg or alg.lower() == 'none':\n return 'none'\n elif alg.startswith('RS') or alg.startswith('PS'):\n return 'RSA'\n elif alg.startswith('HS') or alg.startswith('A'):\n return 'oct'\n elif alg.startswith('ES') or alg.startswith('ECDH-ES'):\n return 'EC'\n else:\n return None\n", "role": "user" }, { "content": "alg2keytype", "role": "assistant" } ]
def x(algorithm): if algorithm == 'RS256': return hashes.SHA256(), padding.PKCS1v15() elif algorithm == 'RS384': return hashes.SHA384(), padding.PKCS1v15() elif algorithm == 'RS512': return hashes.SHA512(), padding.PKCS1v15() elif algorithm == 'PS256': return hashes.SHA256(), padding.PSS(mgf=padding.MGF1(hashes.SHA256( )), salt_length=padding.PSS.MAX_LENGTH) elif algorithm == 'PS384': return hashes.SHA384(), padding.PSS(mgf=padding.MGF1(hashes.SHA384( )), salt_length=padding.PSS.MAX_LENGTH) elif algorithm == 'PS512': return hashes.SHA512(), padding.PSS(mgf=padding.MGF1(hashes.SHA512( )), salt_length=padding.PSS.MAX_LENGTH) else: raise UnsupportedAlgorithm('Unknown algorithm: {}'.format(algorithm))
parse_rsa_algorithm
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(algorithm):\n if algorithm == 'RS256':\n return hashes.SHA256(), padding.PKCS1v15()\n elif algorithm == 'RS384':\n return hashes.SHA384(), padding.PKCS1v15()\n elif algorithm == 'RS512':\n return hashes.SHA512(), padding.PKCS1v15()\n elif algorithm == 'PS256':\n return hashes.SHA256(), padding.PSS(mgf=padding.MGF1(hashes.SHA256(\n )), salt_length=padding.PSS.MAX_LENGTH)\n elif algorithm == 'PS384':\n return hashes.SHA384(), padding.PSS(mgf=padding.MGF1(hashes.SHA384(\n )), salt_length=padding.PSS.MAX_LENGTH)\n elif algorithm == 'PS512':\n return hashes.SHA512(), padding.PSS(mgf=padding.MGF1(hashes.SHA512(\n )), salt_length=padding.PSS.MAX_LENGTH)\n else:\n raise UnsupportedAlgorithm('Unknown algorithm: {}'.format(algorithm))\n", "role": "user" }, { "content": "parse_rsa_algorithm", "role": "assistant" } ]
def x(key, epk, apu, apv, alg, dk_len): shared_key = key.exchange(ec.ECDH(), epk) otherInfo = bytes(alg) + struct.pack('!I', len(apu)) + apu + struct.pack( '!I', len(apv)) + apv + struct.pack('!I', dk_len) return concat_sha256(shared_key, dk_len, otherInfo)
ecdh_derive_key
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(key, epk, apu, apv, alg, dk_len):\n shared_key = key.exchange(ec.ECDH(), epk)\n otherInfo = bytes(alg) + struct.pack('!I', len(apu)) + apu + struct.pack(\n '!I', len(apv)) + apv + struct.pack('!I', dk_len)\n return concat_sha256(shared_key, dk_len, otherInfo)\n", "role": "user" }, { "content": "ecdh_derive_key", "role": "assistant" } ]
def x(self, key=None, iv='', cek='', **kwargs): _msg = as_bytes(self.msg) _args = self._dict try: _args['kid'] = kwargs['kid'] except KeyError: pass if 'params' in kwargs: if 'apu' in kwargs['params']: _args['apu'] = kwargs['params']['apu'] if 'apv' in kwargs['params']: _args['apv'] = kwargs['params']['apv'] if 'epk' in kwargs['params']: _args['epk'] = kwargs['params']['epk'] jwe = JWEnc(**_args) ctxt, tag, cek = super(JWE_EC, self).enc_setup(self['enc'], _msg, auth_data=jwe.b64_encode_header(), key=cek, iv=iv) if 'encrypted_key' in kwargs: return jwe.pack(parts=[kwargs['encrypted_key'], iv, ctxt, tag]) return jwe.pack(parts=[iv, ctxt, tag])
encrypt
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, key=None, iv='', cek='', **kwargs):\n _msg = as_bytes(self.msg)\n _args = self._dict\n try:\n _args['kid'] = kwargs['kid']\n except KeyError:\n pass\n if 'params' in kwargs:\n if 'apu' in kwargs['params']:\n _args['apu'] = kwargs['params']['apu']\n if 'apv' in kwargs['params']:\n _args['apv'] = kwargs['params']['apv']\n if 'epk' in kwargs['params']:\n _args['epk'] = kwargs['params']['epk']\n jwe = JWEnc(**_args)\n ctxt, tag, cek = super(JWE_EC, self).enc_setup(self['enc'], _msg,\n auth_data=jwe.b64_encode_header(), key=cek, iv=iv)\n if 'encrypted_key' in kwargs:\n return jwe.pack(parts=[kwargs['encrypted_key'], iv, ctxt, tag])\n return jwe.pack(parts=[iv, ctxt, tag])\n", "role": "user" }, { "content": "encrypt", "role": "assistant" } ]
def x(self, key, iv='', cek='', **kwargs): _msg = as_bytes(self.msg) if 'zip' in self: if self['zip'] == 'DEF': _msg = zlib.compress(_msg) else: raise ParameterError('Zip has unknown value: %s' % self['zip']) kwarg_cek = cek or None _enc = self['enc'] iv = self._generate_iv(_enc, iv) cek = self._generate_key(_enc, cek) self['cek'] = cek logger.debug('cek: %s, iv: %s' % ([c for c in cek], [c for c in iv])) _encrypt = RSAEncrypter(self.with_digest).encrypt _alg = self['alg'] if kwarg_cek: jwe_enc_key = '' elif _alg == 'RSA-OAEP': jwe_enc_key = _encrypt(cek, key, 'pkcs1_oaep_padding') elif _alg == 'RSA-OAEP-256': jwe_enc_key = _encrypt(cek, key, 'pkcs1_oaep_256_padding') elif _alg == 'RSA1_5': jwe_enc_key = _encrypt(cek, key) else: raise NotSupportedAlgorithm(_alg) jwe = JWEnc(**self.headers()) try: _auth_data = kwargs['auth_data'] except KeyError: _auth_data = jwe.b64_encode_header() ctxt, tag, key = self.enc_setup(_enc, _msg, key=cek, iv=iv, auth_data= _auth_data) return jwe.pack(parts=[jwe_enc_key, iv, ctxt, tag])
encrypt
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, key, iv='', cek='', **kwargs):\n _msg = as_bytes(self.msg)\n if 'zip' in self:\n if self['zip'] == 'DEF':\n _msg = zlib.compress(_msg)\n else:\n raise ParameterError('Zip has unknown value: %s' % self['zip'])\n kwarg_cek = cek or None\n _enc = self['enc']\n iv = self._generate_iv(_enc, iv)\n cek = self._generate_key(_enc, cek)\n self['cek'] = cek\n logger.debug('cek: %s, iv: %s' % ([c for c in cek], [c for c in iv]))\n _encrypt = RSAEncrypter(self.with_digest).encrypt\n _alg = self['alg']\n if kwarg_cek:\n jwe_enc_key = ''\n elif _alg == 'RSA-OAEP':\n jwe_enc_key = _encrypt(cek, key, 'pkcs1_oaep_padding')\n elif _alg == 'RSA-OAEP-256':\n jwe_enc_key = _encrypt(cek, key, 'pkcs1_oaep_256_padding')\n elif _alg == 'RSA1_5':\n jwe_enc_key = _encrypt(cek, key)\n else:\n raise NotSupportedAlgorithm(_alg)\n jwe = JWEnc(**self.headers())\n try:\n _auth_data = kwargs['auth_data']\n except KeyError:\n _auth_data = jwe.b64_encode_header()\n ctxt, tag, key = self.enc_setup(_enc, _msg, key=cek, iv=iv, auth_data=\n _auth_data)\n return jwe.pack(parts=[jwe_enc_key, iv, ctxt, tag])\n", "role": "user" }, { "content": "encrypt", "role": "assistant" } ]
def x(self, token, key, cek=None): if not isinstance(token, JWEnc): jwe = JWEnc().unpack(token) else: jwe = token self.jwt = jwe.encrypted_key() jek = jwe.encrypted_key() _decrypt = RSAEncrypter(self.with_digest).decrypt _alg = jwe.headers['alg'] if cek: pass elif _alg == 'RSA-OAEP': cek = _decrypt(jek, key, 'pkcs1_oaep_padding') elif _alg == 'RSA-OAEP-256': cek = _decrypt(jek, key, 'pkcs1_oaep_256_padding') elif _alg == 'RSA1_5': cek = _decrypt(jek, key) else: raise NotSupportedAlgorithm(_alg) self['cek'] = cek enc = jwe.headers['enc'] if enc not in SUPPORTED['enc']: raise NotSupportedAlgorithm(enc) auth_data = jwe.b64_protected_header() msg = self._decrypt(enc, cek, jwe.ciphertext(), auth_data=auth_data, iv =jwe.initialization_vector(), tag=jwe.authentication_tag()) if 'zip' in jwe.headers and jwe.headers['zip'] == 'DEF': msg = zlib.decompress(msg) return msg
decrypt
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, token, key, cek=None):\n if not isinstance(token, JWEnc):\n jwe = JWEnc().unpack(token)\n else:\n jwe = token\n self.jwt = jwe.encrypted_key()\n jek = jwe.encrypted_key()\n _decrypt = RSAEncrypter(self.with_digest).decrypt\n _alg = jwe.headers['alg']\n if cek:\n pass\n elif _alg == 'RSA-OAEP':\n cek = _decrypt(jek, key, 'pkcs1_oaep_padding')\n elif _alg == 'RSA-OAEP-256':\n cek = _decrypt(jek, key, 'pkcs1_oaep_256_padding')\n elif _alg == 'RSA1_5':\n cek = _decrypt(jek, key)\n else:\n raise NotSupportedAlgorithm(_alg)\n self['cek'] = cek\n enc = jwe.headers['enc']\n if enc not in SUPPORTED['enc']:\n raise NotSupportedAlgorithm(enc)\n auth_data = jwe.b64_protected_header()\n msg = self._decrypt(enc, cek, jwe.ciphertext(), auth_data=auth_data, iv\n =jwe.initialization_vector(), tag=jwe.authentication_tag())\n if 'zip' in jwe.headers and jwe.headers['zip'] == 'DEF':\n msg = zlib.decompress(msg)\n return msg\n", "role": "user" }, { "content": "decrypt", "role": "assistant" } ]
def x(self, keys=None, cek='', iv='', **kwargs): _alg = self['alg'] if keys: keys = self.pick_keys(keys, use='enc') else: keys = self.pick_keys(self._get_keys(), use='enc') if not keys: logger.error(KEY_ERR.format(_alg)) raise NoSuitableEncryptionKey(_alg) if _alg in ['RSA-OAEP', 'RSA-OAEP-256', 'RSA1_5']: encrypter = JWE_RSA(self.msg, **self._dict) elif _alg.startswith('A') and _alg.endswith('KW'): encrypter = JWE_SYM(self.msg, **self._dict) else: encrypter = JWE_EC(**self._dict) cek, encrypted_key, iv, params, eprivk = encrypter.enc_setup(self. msg, key=keys[0], **self._dict) kwargs['encrypted_key'] = encrypted_key kwargs['params'] = params if cek: kwargs['cek'] = cek if iv: kwargs['iv'] = iv for key in keys: if isinstance(key, SYMKey): _key = key.key elif isinstance(key, ECKey): _key = key.public_key() else: _key = key.public_key() if key.kid: encrypter['kid'] = key.kid try: token = encrypter.encrypt(key=_key, **kwargs) self['cek'] = encrypter.cek if 'cek' in encrypter else None except TypeError as err: raise err else: logger.debug('Encrypted message using key with kid={}'.format( key.kid)) return token
encrypt
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, keys=None, cek='', iv='', **kwargs):\n _alg = self['alg']\n if keys:\n keys = self.pick_keys(keys, use='enc')\n else:\n keys = self.pick_keys(self._get_keys(), use='enc')\n if not keys:\n logger.error(KEY_ERR.format(_alg))\n raise NoSuitableEncryptionKey(_alg)\n if _alg in ['RSA-OAEP', 'RSA-OAEP-256', 'RSA1_5']:\n encrypter = JWE_RSA(self.msg, **self._dict)\n elif _alg.startswith('A') and _alg.endswith('KW'):\n encrypter = JWE_SYM(self.msg, **self._dict)\n else:\n encrypter = JWE_EC(**self._dict)\n cek, encrypted_key, iv, params, eprivk = encrypter.enc_setup(self.\n msg, key=keys[0], **self._dict)\n kwargs['encrypted_key'] = encrypted_key\n kwargs['params'] = params\n if cek:\n kwargs['cek'] = cek\n if iv:\n kwargs['iv'] = iv\n for key in keys:\n if isinstance(key, SYMKey):\n _key = key.key\n elif isinstance(key, ECKey):\n _key = key.public_key()\n else:\n _key = key.public_key()\n if key.kid:\n encrypter['kid'] = key.kid\n try:\n token = encrypter.encrypt(key=_key, **kwargs)\n self['cek'] = encrypter.cek if 'cek' in encrypter else None\n except TypeError as err:\n raise err\n else:\n logger.debug('Encrypted message using key with kid={}'.format(\n key.kid))\n return token\n", "role": "user" }, { "content": "encrypt", "role": "assistant" } ]
def x(data): _data = as_bytes(data) _d = base64.urlsafe_b64decode(_data + b'==') if [e for e in [b'+', b'/', b'='] if e in _data]: raise ValueError('Not base64url encoded') return intarr2long(struct.unpack('%sB' % len(_d), _d))
base64url_to_long
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(data):\n _data = as_bytes(data)\n _d = base64.urlsafe_b64decode(_data + b'==')\n if [e for e in [b'+', b'/', b'='] if e in _data]:\n raise ValueError('Not base64url encoded')\n return intarr2long(struct.unpack('%sB' % len(_d), _d))\n", "role": "user" }, { "content": "base64url_to_long", "role": "assistant" } ]
def x(b): cb = b.rstrip(b'=') if not _b64_re.match(cb): raise BadSyntax(cb, 'base64-encoded data contains illegal characters') if cb == b: b = add_padding(b) return base64.urlsafe_b64decode(b)
b64d
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(b):\n cb = b.rstrip(b'=')\n if not _b64_re.match(cb):\n raise BadSyntax(cb, 'base64-encoded data contains illegal characters')\n if cb == b:\n b = add_padding(b)\n return base64.urlsafe_b64decode(b)\n", "role": "user" }, { "content": "b64d", "role": "assistant" } ]
def x(val): if isinstance(val, str): _val = val.encode('utf-8') else: _val = val return base64_to_long(_val)
deser
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(val):\n if isinstance(val, str):\n _val = val.encode('utf-8')\n else:\n _val = val\n return base64_to_long(_val)\n", "role": "user" }, { "content": "deser", "role": "assistant" } ]
def x(self): res = self.serialize(private=True) res.update(self.extra_args) return res
to_dict
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n res = self.serialize(private=True)\n res.update(self.extra_args)\n return res\n", "role": "user" }, { "content": "to_dict", "role": "assistant" } ]
def x(self): res = {'kty': self.kty} if self.use: res['use'] = self.use if self.kid: res['kid'] = self.kid if self.alg: res['alg'] = self.alg return res
common
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n res = {'kty': self.kty}\n if self.use:\n res['use'] = self.use\n if self.kid:\n res['kid'] = self.kid\n if self.alg:\n res['alg'] = self.alg\n return res\n", "role": "user" }, { "content": "common", "role": "assistant" } ]
def x(self): for param in self.longs: item = getattr(self, param) if not item or isinstance(item, str): continue if isinstance(item, bytes): item = item.decode('utf-8') setattr(self, param, item) try: _ = base64url_to_long(item) except Exception: return False else: if [e for e in ['+', '/', '='] if e in item]: return False if self.kid: if not isinstance(self.kid, str): raise ValueError('kid of wrong value type') return True
verify
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n for param in self.longs:\n item = getattr(self, param)\n if not item or isinstance(item, str):\n continue\n if isinstance(item, bytes):\n item = item.decode('utf-8')\n setattr(self, param, item)\n try:\n _ = base64url_to_long(item)\n except Exception:\n return False\n else:\n if [e for e in ['+', '/', '='] if e in item]:\n return False\n if self.kid:\n if not isinstance(self.kid, str):\n raise ValueError('kid of wrong value type')\n return True\n", "role": "user" }, { "content": "verify", "role": "assistant" } ]
def x(self, hash_function, members=None): if members is None: members = self.required members.sort() ser = self.serialize() _se = [] for elem in members: try: _val = ser[elem] except KeyError: pass else: if isinstance(_val, bytes): _val = as_unicode(_val) _se.append('"{}":{}'.format(elem, json.dumps(_val))) _json = '{{{}}}'.format(','.join(_se)) return b64e(DIGEST_HASH[hash_function](_json))
thumbprint
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, hash_function, members=None):\n if members is None:\n members = self.required\n members.sort()\n ser = self.serialize()\n _se = []\n for elem in members:\n try:\n _val = ser[elem]\n except KeyError:\n pass\n else:\n if isinstance(_val, bytes):\n _val = as_unicode(_val)\n _se.append('\"{}\":{}'.format(elem, json.dumps(_val)))\n _json = '{{{}}}'.format(','.join(_se))\n return b64e(DIGEST_HASH[hash_function](_json))\n", "role": "user" }, { "content": "thumbprint", "role": "assistant" } ]
def x(secret, dk_len, other_info): dkm = b'' dk_bytes = int(ceil(dk_len / 8.0)) counter = 0 while len(dkm) < dk_bytes: counter += 1 counter_bytes = struct.pack('!I', counter) digest = hashes.Hash(hashes.SHA256(), backend=default_backend()) digest.update(counter_bytes) digest.update(secret) digest.update(other_info) dkm += digest.finalize() return dkm[:dk_bytes]
concat_sha256
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(secret, dk_len, other_info):\n dkm = b''\n dk_bytes = int(ceil(dk_len / 8.0))\n counter = 0\n while len(dkm) < dk_bytes:\n counter += 1\n counter_bytes = struct.pack('!I', counter)\n digest = hashes.Hash(hashes.SHA256(), backend=default_backend())\n digest.update(counter_bytes)\n digest.update(secret)\n digest.update(other_info)\n dkm += digest.finalize()\n return dkm[:dk_bytes]\n", "role": "user" }, { "content": "concat_sha256", "role": "assistant" } ]
def x(self, keys, use='', alg=''): if not alg: alg = self['alg'] if alg == 'none': return [] _k = self.alg2keytype(alg) if _k is None: logger.error("Unknown algorithm '%s'" % alg) raise ValueError('Unknown cryptography algorithm') logger.debug('Picking key by key type={0}'.format(_k)) _kty = [_k.lower(), _k.upper(), _k.lower().encode('utf-8'), _k.upper(). encode('utf-8')] _keys = [k for k in keys if k.kty in _kty] try: _kid = self['kid'] except KeyError: try: _kid = self.jwt.headers['kid'] except (AttributeError, KeyError): _kid = None logger.debug('Picking key based on alg={0}, kid={1} and use={2}'.format (alg, _kid, use)) pkey = [] for _key in _keys: logger.debug('Picked: kid:{}, use:{}, kty:{}'.format(_key.kid, _key .use, _key.kty)) if _kid: if _kid != _key.kid: continue if use and _key.use and _key.use != use: continue if alg and _key.alg and _key.alg != alg: continue pkey.append(_key) return pkey
pick_keys
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, keys, use='', alg=''):\n if not alg:\n alg = self['alg']\n if alg == 'none':\n return []\n _k = self.alg2keytype(alg)\n if _k is None:\n logger.error(\"Unknown algorithm '%s'\" % alg)\n raise ValueError('Unknown cryptography algorithm')\n logger.debug('Picking key by key type={0}'.format(_k))\n _kty = [_k.lower(), _k.upper(), _k.lower().encode('utf-8'), _k.upper().\n encode('utf-8')]\n _keys = [k for k in keys if k.kty in _kty]\n try:\n _kid = self['kid']\n except KeyError:\n try:\n _kid = self.jwt.headers['kid']\n except (AttributeError, KeyError):\n _kid = None\n logger.debug('Picking key based on alg={0}, kid={1} and use={2}'.format\n (alg, _kid, use))\n pkey = []\n for _key in _keys:\n logger.debug('Picked: kid:{}, use:{}, kty:{}'.format(_key.kid, _key\n .use, _key.kty))\n if _kid:\n if _kid != _key.kid:\n continue\n if use and _key.use and _key.use != use:\n continue\n if alg and _key.alg and _key.alg != alg:\n continue\n pkey.append(_key)\n return pkey\n", "role": "user" }, { "content": "pick_keys", "role": "assistant" } ]
def x(self): self._add_result = Sensor.float('add.result', 'Last ?add result.', '', [-10000, 10000]) self._add_result.set_value(0, Sensor.UNREACHABLE) self._time_result = Sensor.timestamp('time.result', 'Last ?time result.', '') self._time_result.set_value(0, Sensor.INACTIVE) self._eval_result = Sensor.string('eval.result', 'Last ?eval result.', '') self._eval_result.set_value('', Sensor.UNKNOWN) self._fruit_result = Sensor.discrete('fruit.result', 'Last ?pick-fruit result.', '', self.FRUIT) self._fruit_result.set_value('apple', Sensor.ERROR) self.add_sensor(self._add_result) self.add_sensor(self._time_result) self.add_sensor(self._eval_result) self.add_sensor(self._fruit_result)
setup_sensors
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n self._add_result = Sensor.float('add.result', 'Last ?add result.', '',\n [-10000, 10000])\n self._add_result.set_value(0, Sensor.UNREACHABLE)\n self._time_result = Sensor.timestamp('time.result',\n 'Last ?time result.', '')\n self._time_result.set_value(0, Sensor.INACTIVE)\n self._eval_result = Sensor.string('eval.result', 'Last ?eval result.', '')\n self._eval_result.set_value('', Sensor.UNKNOWN)\n self._fruit_result = Sensor.discrete('fruit.result',\n 'Last ?pick-fruit result.', '', self.FRUIT)\n self._fruit_result.set_value('apple', Sensor.ERROR)\n self.add_sensor(self._add_result)\n self.add_sensor(self._time_result)\n self.add_sensor(self._eval_result)\n self.add_sensor(self._fruit_result)\n", "role": "user" }, { "content": "setup_sensors", "role": "assistant" } ]
def x(self, req, x, y): r = x + y self._add_result.set_value(r) return 'ok', r
request_add
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, req, x, y):\n r = x + y\n self._add_result.set_value(r)\n return 'ok', r\n", "role": "user" }, { "content": "request_add", "role": "assistant" } ]
def x(self, req): r = time.time() self._time_result.set_value(r) return 'ok', r
request_time
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, req):\n r = time.time()\n self._time_result.set_value(r)\n return 'ok', r\n", "role": "user" }, { "content": "request_time", "role": "assistant" } ]
def x(self, req, expression): r = str(eval(expression)) self._eval_result.set_value(r) return 'ok', r
request_eval
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, req, expression):\n r = str(eval(expression))\n self._eval_result.set_value(r)\n return 'ok', r\n", "role": "user" }, { "content": "request_eval", "role": "assistant" } ]
def x(self, req): r = random.choice(self.FRUIT + [None]) if r is None: return 'fail', 'No fruit.' delay = random.randrange(1, 5) req.inform('Picking will take %d seconds' % delay) def x(): self._fruit_result.set_value(r) req.reply('ok', r) handle_timer = threading.Timer(delay, pick_handler) handle_timer.start() raise AsyncReply
request_pick_fruit
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, req):\n r = random.choice(self.FRUIT + [None])\n if r is None:\n return 'fail', 'No fruit.'\n delay = random.randrange(1, 5)\n req.inform('Picking will take %d seconds' % delay)\n\n def x():\n self._fruit_result.set_value(r)\n req.reply('ok', r)\n handle_timer = threading.Timer(delay, pick_handler)\n handle_timer.start()\n raise AsyncReply\n", "role": "user" }, { "content": "request_pick_fruit", "role": "assistant" } ]
def x(self, req, sensor_name): sensor = self.get_sensor(sensor_name) ts, status, value = sensor.read() sensor.set_value(value, sensor.INACTIVE, ts) return 'ok',
request_set_sensor_inactive
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, req, sensor_name):\n sensor = self.get_sensor(sensor_name)\n ts, status, value = sensor.read()\n sensor.set_value(value, sensor.INACTIVE, ts)\n return 'ok',\n", "role": "user" }, { "content": "request_set_sensor_inactive", "role": "assistant" } ]
def x(self, req, sensor_name): sensor = self.get_sensor(sensor_name) ts, status, value = sensor.read() sensor.set_value(value, sensor.UNREACHABLE, ts) return 'ok',
request_set_sensor_unreachable
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, req, sensor_name):\n sensor = self.get_sensor(sensor_name)\n ts, status, value = sensor.read()\n sensor.set_value(value, sensor.UNREACHABLE, ts)\n return 'ok',\n", "role": "user" }, { "content": "request_set_sensor_unreachable", "role": "assistant" } ]
def x(self, req, msg): reversed_args = msg.arguments[::-1] return req.make_reply(*reversed_args)
request_raw_reverse
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, req, msg):\n reversed_args = msg.arguments[::-1]\n return req.make_reply(*reversed_args)\n", "role": "user" }, { "content": "request_raw_reverse", "role": "assistant" } ]
def x(transformation, future): new_future = tornado_Future() def x(f): assert f is future if f.exc_info() is not None: new_future.set_exc_info(f.exc_info()) else: try: new_future.set_result(transformation(f.result())) except Exception: new_future.set_exc_info(sys.exc_info()) future.add_done_callback(_transform) return new_future
transform_future
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(transformation, future):\n new_future = tornado_Future()\n\n def x(f):\n assert f is future\n if f.exc_info() is not None:\n new_future.set_exc_info(f.exc_info())\n else:\n try:\n new_future.set_result(transformation(f.result()))\n except Exception:\n new_future.set_exc_info(sys.exc_info())\n future.add_done_callback(_transform)\n return new_future\n", "role": "user" }, { "content": "transform_future", "role": "assistant" } ]
def x(parent_class, sensor_items, filter, strategy, status, use_python_identifiers, tuple, refresh): filter_re = re.compile(filter) found_sensors = [] none_strat = resource.normalize_strategy_parameters('none') sensor_dict = dict(sensor_items) for sensor_identifier in sorted(sensor_dict.keys()): sensor_obj = sensor_dict[sensor_identifier] search_name = (sensor_identifier if use_python_identifiers else sensor_obj.name) name_match = filter_re.search(search_name) strat_match = (not strategy or sensor_obj.sampling_strategy != none_strat) if name_match and strat_match: if refresh: yield sensor_obj.get_value() prefix = '' if isinstance(parent_class, KATCPClientResourceContainer): if sensor_obj.name.startswith('agg_'): prefix = '' else: prefix = sensor_obj.parent_name + '.' if not status or sensor_obj.reading.status in status: if tuple: found_sensors.append((prefix + sensor_obj.name, sensor_obj.reading.value, sensor_obj.reading. timestamp, sensor_obj.type, sensor_obj.units, sensor_obj.reading.received_timestamp, sensor_obj. reading.status, sensor_obj.sampling_strategy)) else: found_sensors.append(resource.SensorResultTuple(object= sensor_obj, name=prefix + sensor_obj.name, python_identifier=sensor_identifier, description= sensor_obj.description, units=sensor_obj.units, type=sensor_obj.type, reading=sensor_obj.reading)) raise tornado.gen.Return(found_sensors)
list_sensors
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(parent_class, sensor_items, filter, strategy, status,\n use_python_identifiers, tuple, refresh):\n filter_re = re.compile(filter)\n found_sensors = []\n none_strat = resource.normalize_strategy_parameters('none')\n sensor_dict = dict(sensor_items)\n for sensor_identifier in sorted(sensor_dict.keys()):\n sensor_obj = sensor_dict[sensor_identifier]\n search_name = (sensor_identifier if use_python_identifiers else\n sensor_obj.name)\n name_match = filter_re.search(search_name)\n strat_match = (not strategy or sensor_obj.sampling_strategy !=\n none_strat)\n if name_match and strat_match:\n if refresh:\n yield sensor_obj.get_value()\n prefix = ''\n if isinstance(parent_class, KATCPClientResourceContainer):\n if sensor_obj.name.startswith('agg_'):\n prefix = ''\n else:\n prefix = sensor_obj.parent_name + '.'\n if not status or sensor_obj.reading.status in status:\n if tuple:\n found_sensors.append((prefix + sensor_obj.name,\n sensor_obj.reading.value, sensor_obj.reading.\n timestamp, sensor_obj.type, sensor_obj.units,\n sensor_obj.reading.received_timestamp, sensor_obj.\n reading.status, sensor_obj.sampling_strategy))\n else:\n found_sensors.append(resource.SensorResultTuple(object=\n sensor_obj, name=prefix + sensor_obj.name,\n python_identifier=sensor_identifier, description=\n sensor_obj.description, units=sensor_obj.units,\n type=sensor_obj.type, reading=sensor_obj.reading))\n raise tornado.gen.Return(found_sensors)\n", "role": "user" }, { "content": "list_sensors", "role": "assistant" } ]
def x(resource, callback, exit_event=None): exit_event = exit_event or AsyncEvent() callback(False) while not exit_event.is_set(): yield until_any(resource.until_synced(), exit_event.until_set()) if exit_event.is_set(): break else: callback(True) yield until_any(resource.until_not_synced(), exit_event.until_set()) if exit_event.is_set(): break else: callback(False)
monitor_resource_sync_state
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(resource, callback, exit_event=None):\n exit_event = exit_event or AsyncEvent()\n callback(False)\n while not exit_event.is_set():\n yield until_any(resource.until_synced(), exit_event.until_set())\n if exit_event.is_set():\n break\n else:\n callback(True)\n yield until_any(resource.until_not_synced(), exit_event.until_set())\n if exit_event.is_set():\n break\n else:\n callback(False)\n", "role": "user" }, { "content": "monitor_resource_sync_state", "role": "assistant" } ]
def x(self, request, *args, **kwargs): f = tornado_Future() try: use_mid = kwargs.get('use_mid') timeout = kwargs.get('timeout') mid = kwargs.get('mid') msg = Message.request(request, *args, mid=mid) except Exception: f.set_exc_info(sys.exc_info()) return f return transform_future(self.reply_wrapper, self.katcp_client. future_request(msg, timeout, use_mid))
wrapped_request
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, request, *args, **kwargs):\n f = tornado_Future()\n try:\n use_mid = kwargs.get('use_mid')\n timeout = kwargs.get('timeout')\n mid = kwargs.get('mid')\n msg = Message.request(request, *args, mid=mid)\n except Exception:\n f.set_exc_info(sys.exc_info())\n return f\n return transform_future(self.reply_wrapper, self.katcp_client.\n future_request(msg, timeout, use_mid))\n", "role": "user" }, { "content": "wrapped_request", "role": "assistant" } ]
def x(self, state, timeout=None): return self._state.until_state(state, timeout=timeout)
until_state
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, state, timeout=None):\n return self._state.until_state(state, timeout=timeout)\n", "role": "user" }, { "content": "until_state", "role": "assistant" } ]
def x(self): host, port = self.address ic = self._inspecting_client = self.inspecting_client_factory(host, port, self._ioloop_set_to) self.ioloop = ic.ioloop if self._preset_protocol_flags: ic.preset_protocol_flags(self._preset_protocol_flags) ic.katcp_client.auto_reconnect_delay = self.auto_reconnect_delay ic.set_state_callback(self._inspecting_client_state_callback) ic.request_factory = self._request_factory self._sensor_manager = KATCPClientResourceSensorsManager(ic, self.name, logger=self._logger) ic.handle_sensor_value() ic.sensor_factory = self._sensor_manager.sensor_factory self.reapply_sampling_strategies = (self._sensor_manager. reapply_sampling_strategies) log_future_exceptions(self._logger, ic.connect())
start
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n host, port = self.address\n ic = self._inspecting_client = self.inspecting_client_factory(host,\n port, self._ioloop_set_to)\n self.ioloop = ic.ioloop\n if self._preset_protocol_flags:\n ic.preset_protocol_flags(self._preset_protocol_flags)\n ic.katcp_client.auto_reconnect_delay = self.auto_reconnect_delay\n ic.set_state_callback(self._inspecting_client_state_callback)\n ic.request_factory = self._request_factory\n self._sensor_manager = KATCPClientResourceSensorsManager(ic, self.name,\n logger=self._logger)\n ic.handle_sensor_value()\n ic.sensor_factory = self._sensor_manager.sensor_factory\n self.reapply_sampling_strategies = (self._sensor_manager.\n reapply_sampling_strategies)\n log_future_exceptions(self._logger, ic.connect())\n", "role": "user" }, { "content": "start", "role": "assistant" } ]
def x(self, host, port, ioloop_set_to): return ReplyWrappedInspectingClientAsync(host, port, ioloop= ioloop_set_to, auto_reconnect=self.auto_reconnect)
inspecting_client_factory
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, host, port, ioloop_set_to):\n return ReplyWrappedInspectingClientAsync(host, port, ioloop=\n ioloop_set_to, auto_reconnect=self.auto_reconnect)\n", "role": "user" }, { "content": "inspecting_client_factory", "role": "assistant" } ]
def x(self, timeout=None): not_synced_states = [state for state in self._state.valid_states if state != 'synced'] not_synced_futures = [self._state.until_state(state) for state in not_synced_states] return until_any(*not_synced_futures, timeout=timeout)
until_not_synced
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, timeout=None):\n not_synced_states = [state for state in self._state.valid_states if \n state != 'synced']\n not_synced_futures = [self._state.until_state(state) for state in\n not_synced_states]\n return until_any(*not_synced_futures, timeout=timeout)\n", "role": "user" }, { "content": "until_not_synced", "role": "assistant" } ]
def x(self, filter, strategy_and_parms): sensor_list = yield self.list_sensors(filter=filter) sensor_dict = {} for sens in sensor_list: try: sensor_name = sens.object.normalised_name yield self.set_sampling_strategy(sensor_name, strategy_and_parms) sensor_dict[sensor_name] = strategy_and_parms except Exception as exc: self._logger.exception( 'Unhandled exception trying to set sensor strategies {!r} for {} ({})' .format(strategy_and_parms, sens, exc)) sensor_dict[sensor_name] = None raise tornado.gen.Return(sensor_dict)
set_sampling_strategies
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, filter, strategy_and_parms):\n sensor_list = yield self.list_sensors(filter=filter)\n sensor_dict = {}\n for sens in sensor_list:\n try:\n sensor_name = sens.object.normalised_name\n yield self.set_sampling_strategy(sensor_name, strategy_and_parms)\n sensor_dict[sensor_name] = strategy_and_parms\n except Exception as exc:\n self._logger.exception(\n 'Unhandled exception trying to set sensor strategies {!r} for {} ({})'\n .format(strategy_and_parms, sens, exc))\n sensor_dict[sensor_name] = None\n raise tornado.gen.Return(sensor_dict)\n", "role": "user" }, { "content": "set_sampling_strategies", "role": "assistant" } ]
def x(self, sensor_name, strategy_and_parms): sensor_name = resource.escape_name(sensor_name) sensor_obj = dict.get(self._sensor, sensor_name) self._sensor_strategy_cache[sensor_name] = strategy_and_parms sensor_dict = {} self._logger.debug('Cached strategy {} for sensor {}'.format( strategy_and_parms, sensor_name)) if sensor_obj: try: yield sensor_obj.set_sampling_strategy(strategy_and_parms) sensor_dict[sensor_name] = strategy_and_parms except Exception as exc: self._logger.exception( 'Unhandled exception trying to set sensor strategy {!r} for sensor {} ({})' .format(strategy_and_parms, sensor_name, exc)) sensor_dict[sensor_name] = str(exc) raise tornado.gen.Return(sensor_dict)
set_sampling_strategy
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, sensor_name, strategy_and_parms):\n sensor_name = resource.escape_name(sensor_name)\n sensor_obj = dict.get(self._sensor, sensor_name)\n self._sensor_strategy_cache[sensor_name] = strategy_and_parms\n sensor_dict = {}\n self._logger.debug('Cached strategy {} for sensor {}'.format(\n strategy_and_parms, sensor_name))\n if sensor_obj:\n try:\n yield sensor_obj.set_sampling_strategy(strategy_and_parms)\n sensor_dict[sensor_name] = strategy_and_parms\n except Exception as exc:\n self._logger.exception(\n 'Unhandled exception trying to set sensor strategy {!r} for sensor {} ({})'\n .format(strategy_and_parms, sensor_name, exc))\n sensor_dict[sensor_name] = str(exc)\n raise tornado.gen.Return(sensor_dict)\n", "role": "user" }, { "content": "set_sampling_strategy", "role": "assistant" } ]
def x(self, sensor_name): sensor_name = resource.escape_name(sensor_name) self._sensor_strategy_cache.pop(sensor_name, None) self._sensor_manager.drop_sampling_strategy(sensor_name)
drop_sampling_strategy
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, sensor_name):\n sensor_name = resource.escape_name(sensor_name)\n self._sensor_strategy_cache.pop(sensor_name, None)\n self._sensor_manager.drop_sampling_strategy(sensor_name)\n", "role": "user" }, { "content": "drop_sampling_strategy", "role": "assistant" } ]
def x(self, sensor_name, listener): sensor_name = resource.escape_name(sensor_name) sensor_obj = dict.get(self._sensor, sensor_name) self._sensor_listener_cache[sensor_name].append(listener) sensor_dict = {} self._logger.debug('Cached listener {} for sensor {}'.format(listener, sensor_name)) if sensor_obj: try: sensor_obj.register_listener(listener, reading=True) sensor_dict[sensor_name] = listener self._logger.debug('Registered listener {} for sensor {}'. format(listener, sensor_name)) except Exception as exc: self._logger.exception( 'Unhandled exception trying to set sensor listener {} for sensor {} ({})' .format(listener, sensor_name, exc)) sensor_dict[sensor_name] = str(exc) raise tornado.gen.Return(sensor_dict)
set_sensor_listener
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, sensor_name, listener):\n sensor_name = resource.escape_name(sensor_name)\n sensor_obj = dict.get(self._sensor, sensor_name)\n self._sensor_listener_cache[sensor_name].append(listener)\n sensor_dict = {}\n self._logger.debug('Cached listener {} for sensor {}'.format(listener,\n sensor_name))\n if sensor_obj:\n try:\n sensor_obj.register_listener(listener, reading=True)\n sensor_dict[sensor_name] = listener\n self._logger.debug('Registered listener {} for sensor {}'.\n format(listener, sensor_name))\n except Exception as exc:\n self._logger.exception(\n 'Unhandled exception trying to set sensor listener {} for sensor {} ({})'\n .format(listener, sensor_name, exc))\n sensor_dict[sensor_name] = str(exc)\n raise tornado.gen.Return(sensor_dict)\n", "role": "user" }, { "content": "set_sensor_listener", "role": "assistant" } ]
def x(self, sensor_name): if sensor_name in self._strategy_cache: return sensor_name else: escaped_name = resource.escape_name(sensor_name) for key in self._strategy_cache: escaped_key = resource.escape_name(key) if escaped_key == escaped_name: return key return sensor_name
get_strategy_cache_key
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, sensor_name):\n if sensor_name in self._strategy_cache:\n return sensor_name\n else:\n escaped_name = resource.escape_name(sensor_name)\n for key in self._strategy_cache:\n escaped_key = resource.escape_name(key)\n if escaped_key == escaped_name:\n return key\n return sensor_name\n", "role": "user" }, { "content": "get_strategy_cache_key", "role": "assistant" } ]
def x(self, sensor_name): cache_key = self._get_strategy_cache_key(sensor_name) cached = self._strategy_cache.get(cache_key) if not cached: return resource.normalize_strategy_parameters('none') else: return cached
get_sampling_strategy
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, sensor_name):\n cache_key = self._get_strategy_cache_key(sensor_name)\n cached = self._strategy_cache.get(cache_key)\n if not cached:\n return resource.normalize_strategy_parameters('none')\n else:\n return cached\n", "role": "user" }, { "content": "get_sampling_strategy", "role": "assistant" } ]
def x(self, sensor_name, strategy_and_params): try: strategy_and_params = resource.normalize_strategy_parameters( strategy_and_params) self._strategy_cache[sensor_name] = strategy_and_params reply = yield self._inspecting_client.wrapped_request('sensor-sampling' , sensor_name, *strategy_and_params) if not reply.succeeded: raise KATCPSensorError( 'Error setting strategy for sensor {0}: \n{1!s}'.format( sensor_name, reply)) sensor_strategy = True, strategy_and_params except Exception as e: self._logger.exception('Exception found!') sensor_strategy = False, str(e) raise tornado.gen.Return(sensor_strategy)
set_sampling_strategy
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, sensor_name, strategy_and_params):\n try:\n strategy_and_params = resource.normalize_strategy_parameters(\n strategy_and_params)\n self._strategy_cache[sensor_name] = strategy_and_params\n reply = yield self._inspecting_client.wrapped_request('sensor-sampling'\n , sensor_name, *strategy_and_params)\n if not reply.succeeded:\n raise KATCPSensorError(\n 'Error setting strategy for sensor {0}: \\n{1!s}'.format(\n sensor_name, reply))\n sensor_strategy = True, strategy_and_params\n except Exception as e:\n self._logger.exception('Exception found!')\n sensor_strategy = False, str(e)\n raise tornado.gen.Return(sensor_strategy)\n", "role": "user" }, { "content": "set_sampling_strategy", "role": "assistant" } ]
def x(self, sensor_name): cache_key = self._get_strategy_cache_key(sensor_name) self._strategy_cache.pop(cache_key, None)
drop_sampling_strategy
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, sensor_name):\n cache_key = self._get_strategy_cache_key(sensor_name)\n self._strategy_cache.pop(cache_key, None)\n", "role": "user" }, { "content": "drop_sampling_strategy", "role": "assistant" } ]
def x(self): check_sensor = self._inspecting_client.future_check_sensor for sensor_name, strategy in list(self._strategy_cache.items()): try: sensor_exists = yield check_sensor(sensor_name) if not sensor_exists: self._logger.warn( 'Did not set strategy for non-existing sensor {}'. format(sensor_name)) continue result = yield self.set_sampling_strategy(sensor_name, strategy) except KATCPSensorError as e: self._logger.error( 'Error reapplying strategy for sensor {0}: {1!s}'.format( sensor_name, e)) except Exception: self._logger.exception( 'Unhandled exception reapplying strategy for sensor {}'. format(sensor_name), exc_info=True)
reapply_sampling_strategies
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n check_sensor = self._inspecting_client.future_check_sensor\n for sensor_name, strategy in list(self._strategy_cache.items()):\n try:\n sensor_exists = yield check_sensor(sensor_name)\n if not sensor_exists:\n self._logger.warn(\n 'Did not set strategy for non-existing sensor {}'.\n format(sensor_name))\n continue\n result = yield self.set_sampling_strategy(sensor_name, strategy)\n except KATCPSensorError as e:\n self._logger.error(\n 'Error reapplying strategy for sensor {0}: {1!s}'.format(\n sensor_name, e))\n except Exception:\n self._logger.exception(\n 'Unhandled exception reapplying strategy for sensor {}'.\n format(sensor_name), exc_info=True)\n", "role": "user" }, { "content": "reapply_sampling_strategies", "role": "assistant" } ]
def x(self, *args, **kwargs): timeout = kwargs.pop('timeout', None) if timeout is None: timeout = self.timeout_hint kwargs['timeout'] = timeout return self._client.wrapped_request(self.name, *args, **kwargs)
issue_request
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, *args, **kwargs):\n timeout = kwargs.pop('timeout', None)\n if timeout is None:\n timeout = self.timeout_hint\n kwargs['timeout'] = timeout\n return self._client.wrapped_request(self.name, *args, **kwargs)\n", "role": "user" }, { "content": "issue_request", "role": "assistant" } ]
def x(self, filter, strategy_and_params): futures_dict = {} for res_obj in self.clients: futures_dict[res_obj.name] = res_obj.set_sampling_strategies(filter, strategy_and_params) sensors_strategies = yield futures_dict raise tornado.gen.Return(sensors_strategies)
set_sampling_strategies
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, filter, strategy_and_params):\n futures_dict = {}\n for res_obj in self.clients:\n futures_dict[res_obj.name] = res_obj.set_sampling_strategies(filter,\n strategy_and_params)\n sensors_strategies = yield futures_dict\n raise tornado.gen.Return(sensors_strategies)\n", "role": "user" }, { "content": "set_sampling_strategies", "role": "assistant" } ]
def x(self, sensor_name, strategy_and_params): futures_dict = {} for res_obj in self.clients: futures_dict[res_obj.name] = res_obj.set_sampling_strategy(sensor_name, strategy_and_params) sensors_strategies = yield futures_dict raise tornado.gen.Return(sensors_strategies)
set_sampling_strategy
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, sensor_name, strategy_and_params):\n futures_dict = {}\n for res_obj in self.clients:\n futures_dict[res_obj.name] = res_obj.set_sampling_strategy(sensor_name,\n strategy_and_params)\n sensors_strategies = yield futures_dict\n raise tornado.gen.Return(sensors_strategies)\n", "role": "user" }, { "content": "set_sampling_strategy", "role": "assistant" } ]
def x(self, sensor_name, condition_or_value, timeout=5.0, quorum=None, max_grace_period=1.0): if quorum is None: quorum = len(self.clients) elif quorum > 1: if not isinstance(quorum, int): raise TypeError( 'Quorum parameter %r must be an integer if outside range [0, 1]' % (quorum,)) elif isinstance(quorum, float): quorum = int(math.ceil(quorum * len(self.clients))) if timeout and max_grace_period: grace_period = min(max_grace_period, timeout / 2.0) initial_timeout = timeout - grace_period else: grace_period = max_grace_period initial_timeout = timeout futures = {} for client in self.clients: f = client.wait(sensor_name, condition_or_value, initial_timeout) futures[client.name] = f initial_results = yield until_some(done_at_least=quorum, **futures) results = dict(initial_results) stragglers = {} for client in self.clients: if not results.get(client.name, False): f = client.wait(sensor_name, condition_or_value, grace_period) stragglers[client.name] = f rest_of_results = yield until_some(**stragglers) results.update(dict(rest_of_results)) class TestableDict(dict): """Dictionary of results that can be tested for overall success.""" def x(self): return sum(self.values()) >= quorum if sys.version_info[0] == 2: __nonzero__ = __bool__ raise tornado.gen.Return(TestableDict(results))
wait
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, sensor_name, condition_or_value, timeout=5.0, quorum=None,\n max_grace_period=1.0):\n if quorum is None:\n quorum = len(self.clients)\n elif quorum > 1:\n if not isinstance(quorum, int):\n raise TypeError(\n 'Quorum parameter %r must be an integer if outside range [0, 1]'\n % (quorum,))\n elif isinstance(quorum, float):\n quorum = int(math.ceil(quorum * len(self.clients)))\n if timeout and max_grace_period:\n grace_period = min(max_grace_period, timeout / 2.0)\n initial_timeout = timeout - grace_period\n else:\n grace_period = max_grace_period\n initial_timeout = timeout\n futures = {}\n for client in self.clients:\n f = client.wait(sensor_name, condition_or_value, initial_timeout)\n futures[client.name] = f\n initial_results = yield until_some(done_at_least=quorum, **futures)\n results = dict(initial_results)\n stragglers = {}\n for client in self.clients:\n if not results.get(client.name, False):\n f = client.wait(sensor_name, condition_or_value, grace_period)\n stragglers[client.name] = f\n rest_of_results = yield until_some(**stragglers)\n results.update(dict(rest_of_results))\n\n\n class TestableDict(dict):\n \"\"\"Dictionary of results that can be tested for overall success.\"\"\"\n\n def x(self):\n return sum(self.values()) >= quorum\n if sys.version_info[0] == 2:\n __nonzero__ = __bool__\n raise tornado.gen.Return(TestableDict(results))\n", "role": "user" }, { "content": "wait", "role": "assistant" } ]
def x(self, res_spec, parent, logger): return KATCPClientResource(res_spec, parent=self, logger=logger)
client_resource_factory
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, res_spec, parent, logger):\n return KATCPClientResource(res_spec, parent=self, logger=logger)\n", "role": "user" }, { "content": "client_resource_factory", "role": "assistant" } ]
def x(self, group_name, group_client_names): group_configs = self._resources_spec.get('groups', {}) group_configs[group_name] = group_client_names self._resources_spec['groups'] = group_configs self._init_groups()
add_group
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, group_name, group_client_names):\n group_configs = self._resources_spec.get('groups', {})\n group_configs[group_name] = group_client_names\n self._resources_spec['groups'] = group_configs\n self._init_groups()\n", "role": "user" }, { "content": "add_group", "role": "assistant" } ]
def x(self, ioloop=None): ioloop = ioloop or tornado.ioloop.IOLoop.current() self.ioloop = ioloop for res in dict.values(self.children): res.set_ioloop(ioloop)
set_ioloop
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, ioloop=None):\n ioloop = ioloop or tornado.ioloop.IOLoop.current()\n self.ioloop = ioloop\n for res in dict.values(self.children):\n res.set_ioloop(ioloop)\n", "role": "user" }, { "content": "set_ioloop", "role": "assistant" } ]
def x(self): return all([r.is_connected() for r in dict.values(self.children)])
is_connected
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n return all([r.is_connected() for r in dict.values(self.children)])\n", "role": "user" }, { "content": "is_connected", "role": "assistant" } ]
def x(self, timeout=None): futures = [r.until_synced(timeout) for r in dict.values(self.children)] yield tornado.gen.multi(futures, quiet_exceptions=tornado.gen.TimeoutError)
until_synced
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, timeout=None):\n futures = [r.until_synced(timeout) for r in dict.values(self.children)]\n yield tornado.gen.multi(futures, quiet_exceptions=tornado.gen.TimeoutError)\n", "role": "user" }, { "content": "until_synced", "role": "assistant" } ]
def x(self, timeout=None): yield until_any(*[r.until_not_synced() for r in dict.values(self. children)], timeout=timeout)
until_not_synced
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, timeout=None):\n yield until_any(*[r.until_not_synced() for r in dict.values(self.\n children)], timeout=timeout)\n", "role": "user" }, { "content": "until_not_synced", "role": "assistant" } ]
def x(self, state, timeout=None): return until_any(*[r.until_state(state) for r in dict.values(self. children)], timeout=timeout)
until_any_child_in_state
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, state, timeout=None):\n return until_any(*[r.until_state(state) for r in dict.values(self.\n children)], timeout=timeout)\n", "role": "user" }, { "content": "until_any_child_in_state", "role": "assistant" } ]
def x(self, state, timeout=None): futures = [r.until_state(state, timeout=timeout) for r in dict.values( self.children)] yield tornado.gen.multi(futures, quiet_exceptions=tornado.gen.TimeoutError)
until_all_children_in_state
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, state, timeout=None):\n futures = [r.until_state(state, timeout=timeout) for r in dict.values(\n self.children)]\n yield tornado.gen.multi(futures, quiet_exceptions=tornado.gen.TimeoutError)\n", "role": "user" }, { "content": "until_all_children_in_state", "role": "assistant" } ]
def x(self, filter, strategy_and_parms): result_list = yield self.list_sensors(filter=filter) sensor_dict = {} for result in result_list: sensor_name = result.object.normalised_name resource_name = result.object.parent_name if resource_name not in sensor_dict: sensor_dict[resource_name] = {} try: resource_obj = self.children[resource_name] yield resource_obj.set_sampling_strategy(sensor_name, strategy_and_parms) sensor_dict[resource_name][sensor_name] = strategy_and_parms self._logger.debug( 'Set sampling strategy on resource %s for %s' % ( resource_name, sensor_name)) except Exception as exc: self._logger.error( 'Cannot set sampling strategy on resource %s for %s (%s)' % (resource_name, sensor_name, exc)) sensor_dict[resource_name][sensor_name] = None raise tornado.gen.Return(sensor_dict)
set_sampling_strategies
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, filter, strategy_and_parms):\n result_list = yield self.list_sensors(filter=filter)\n sensor_dict = {}\n for result in result_list:\n sensor_name = result.object.normalised_name\n resource_name = result.object.parent_name\n if resource_name not in sensor_dict:\n sensor_dict[resource_name] = {}\n try:\n resource_obj = self.children[resource_name]\n yield resource_obj.set_sampling_strategy(sensor_name,\n strategy_and_parms)\n sensor_dict[resource_name][sensor_name] = strategy_and_parms\n self._logger.debug(\n 'Set sampling strategy on resource %s for %s' % (\n resource_name, sensor_name))\n except Exception as exc:\n self._logger.error(\n 'Cannot set sampling strategy on resource %s for %s (%s)' %\n (resource_name, sensor_name, exc))\n sensor_dict[resource_name][sensor_name] = None\n raise tornado.gen.Return(sensor_dict)\n", "role": "user" }, { "content": "set_sampling_strategies", "role": "assistant" } ]
def x(self, res_name, res_spec): res_spec = dict(res_spec) res_spec['name'] = res_name res = self.client_resource_factory(res_spec, parent=self, logger=self. _logger) self.children[resource.escape_name(res_name)] = res self._children_dirty = True res.set_ioloop(self.ioloop) res.start() return res
add_child_resource_client
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, res_name, res_spec):\n res_spec = dict(res_spec)\n res_spec['name'] = res_name\n res = self.client_resource_factory(res_spec, parent=self, logger=self.\n _logger)\n self.children[resource.escape_name(res_name)] = res\n self._children_dirty = True\n res.set_ioloop(self.ioloop)\n res.start()\n return res\n", "role": "user" }, { "content": "add_child_resource_client", "role": "assistant" } ]
def x(self): for child_name, child in dict.items(self.children): try: child.stop() except Exception: self._logger.exception('Exception stopping child {!r}'.format( child_name))
stop
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n for child_name, child in dict.items(self.children):\n try:\n child.stop()\n except Exception:\n self._logger.exception('Exception stopping child {!r}'.format(\n child_name))\n", "role": "user" }, { "content": "stop", "role": "assistant" } ]
def x(b): i = 8 while i < len(b): data_len, = struct.unpack('!I', b[i:i + 4]) type_ = b[i + 4:i + 8].decode('latin-1') yield Chunk(type_, b[i:i + data_len + 12]) i += data_len + 12
parse_chunks
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(b):\n i = 8\n while i < len(b):\n data_len, = struct.unpack('!I', b[i:i + 4])\n type_ = b[i + 4:i + 8].decode('latin-1')\n yield Chunk(type_, b[i:i + data_len + 12])\n i += data_len + 12\n", "role": "user" }, { "content": "parse_chunks", "role": "assistant" } ]
def x(chunk_type, chunk_data): out = struct.pack('!I', len(chunk_data)) chunk_data = chunk_type.encode('latin-1') + chunk_data out += chunk_data + struct.pack('!I', binascii.crc32(chunk_data) & 4294967295) return out
make_chunk
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(chunk_type, chunk_data):\n out = struct.pack('!I', len(chunk_data))\n chunk_data = chunk_type.encode('latin-1') + chunk_data\n out += chunk_data + struct.pack('!I', binascii.crc32(chunk_data) & \n 4294967295)\n return out\n", "role": "user" }, { "content": "make_chunk", "role": "assistant" } ]