source_code
stringlengths 45
7.24k
| function_name
stringlengths 1
111
| messages
list |
---|---|---|
def x(self, when=0):
for iss in list(self.owners()):
_kbl = []
for kb in self.issuer_keys[iss]:
kb.remove_outdated(self.remove_after, when=when)
if len(kb):
_kbl.append(kb)
if _kbl:
self.issuer_keys[iss] = _kbl
else:
del self.issuer_keys[iss]
|
remove_outdated
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, when=0):\n for iss in list(self.owners()):\n _kbl = []\n for kb in self.issuer_keys[iss]:\n kb.remove_outdated(self.remove_after, when=when)\n if len(kb):\n _kbl.append(kb)\n if _kbl:\n self.issuer_keys[iss] = _kbl\n else:\n del self.issuer_keys[iss]\n",
"role": "user"
},
{
"content": "remove_outdated",
"role": "assistant"
}
] |
def x(self, jwt, **kwargs):
try:
_key_type = jwe_alg2keytype(jwt.headers['alg'])
except KeyError:
_key_type = ''
try:
_kid = jwt.headers['kid']
except KeyError:
logger.info('Missing kid')
_kid = ''
keys = self.get(key_use='enc', owner='', key_type=_key_type)
try:
_aud = kwargs['aud']
except KeyError:
_aud = ''
if _aud:
try:
allow_missing_kid = kwargs['allow_missing_kid']
except KeyError:
allow_missing_kid = False
try:
nki = kwargs['no_kid_issuer']
except KeyError:
nki = {}
keys = self._add_key(keys, _aud, 'enc', _key_type, _kid, nki,
allow_missing_kid)
keys = [k for k in keys if k.appropriate_for('decrypt')]
return keys
|
get_jwt_decrypt_keys
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, jwt, **kwargs):\n try:\n _key_type = jwe_alg2keytype(jwt.headers['alg'])\n except KeyError:\n _key_type = ''\n try:\n _kid = jwt.headers['kid']\n except KeyError:\n logger.info('Missing kid')\n _kid = ''\n keys = self.get(key_use='enc', owner='', key_type=_key_type)\n try:\n _aud = kwargs['aud']\n except KeyError:\n _aud = ''\n if _aud:\n try:\n allow_missing_kid = kwargs['allow_missing_kid']\n except KeyError:\n allow_missing_kid = False\n try:\n nki = kwargs['no_kid_issuer']\n except KeyError:\n nki = {}\n keys = self._add_key(keys, _aud, 'enc', _key_type, _kid, nki,\n allow_missing_kid)\n keys = [k for k in keys if k.appropriate_for('decrypt')]\n return keys\n",
"role": "user"
},
{
"content": "get_jwt_decrypt_keys",
"role": "assistant"
}
] |
def x(self, jwt, **kwargs):
try:
allow_missing_kid = kwargs['allow_missing_kid']
except KeyError:
allow_missing_kid = False
try:
_key_type = jws_alg2keytype(jwt.headers['alg'])
except KeyError:
_key_type = ''
try:
_kid = jwt.headers['kid']
except KeyError:
logger.info('Missing kid')
_kid = ''
try:
nki = kwargs['no_kid_issuer']
except KeyError:
nki = {}
_payload = jwt.payload()
try:
_iss = _payload['iss']
except KeyError:
try:
_iss = kwargs['iss']
except KeyError:
_iss = ''
if _iss:
if 'jku' in jwt.headers and _iss:
if not self.find(jwt.headers['jku'], _iss):
try:
if kwargs['trusting']:
self.add_url(_iss, jwt.headers['jku'])
except KeyError:
pass
keys = self._add_key([], _iss, 'sig', _key_type, _kid, nki,
allow_missing_kid)
if _key_type == 'oct':
keys.extend(self.get(key_use='sig', owner='', key_type=_key_type))
else:
keys = self.get(key_use='sig', owner='', key_type=_key_type)
keys = [k for k in keys if k.appropriate_for('verify')]
return keys
|
get_jwt_verify_keys
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, jwt, **kwargs):\n try:\n allow_missing_kid = kwargs['allow_missing_kid']\n except KeyError:\n allow_missing_kid = False\n try:\n _key_type = jws_alg2keytype(jwt.headers['alg'])\n except KeyError:\n _key_type = ''\n try:\n _kid = jwt.headers['kid']\n except KeyError:\n logger.info('Missing kid')\n _kid = ''\n try:\n nki = kwargs['no_kid_issuer']\n except KeyError:\n nki = {}\n _payload = jwt.payload()\n try:\n _iss = _payload['iss']\n except KeyError:\n try:\n _iss = kwargs['iss']\n except KeyError:\n _iss = ''\n if _iss:\n if 'jku' in jwt.headers and _iss:\n if not self.find(jwt.headers['jku'], _iss):\n try:\n if kwargs['trusting']:\n self.add_url(_iss, jwt.headers['jku'])\n except KeyError:\n pass\n keys = self._add_key([], _iss, 'sig', _key_type, _kid, nki,\n allow_missing_kid)\n if _key_type == 'oct':\n keys.extend(self.get(key_use='sig', owner='', key_type=_key_type))\n else:\n keys = self.get(key_use='sig', owner='', key_type=_key_type)\n keys = [k for k in keys if k.appropriate_for('verify')]\n return keys\n",
"role": "user"
},
{
"content": "get_jwt_verify_keys",
"role": "assistant"
}
] |
def x(self):
kj = KeyJar()
for issuer in self.owners():
kj[issuer] = [kb.copy() for kb in self[issuer]]
kj.verify_ssl = self.verify_ssl
return kj
|
copy
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n kj = KeyJar()\n for issuer in self.owners():\n kj[issuer] = [kb.copy() for kb in self[issuer]]\n kj.verify_ssl = self.verify_ssl\n return kj\n",
"role": "user"
},
{
"content": "copy",
"role": "assistant"
}
] |
def x(keys, use, alg='', key_type='', kid=''):
res = []
if not key_type:
if use == 'sig':
key_type = jws_alg2keytype(alg)
else:
key_type = jwe_alg2keytype(alg)
for key in keys:
if key.use and key.use != use:
continue
if key.kty == key_type:
if key.kid and kid:
if key.kid == kid:
res.append(key)
else:
continue
if key.alg == '':
if alg:
if key_type == 'EC':
if key.crv == 'P-{}'.format(alg[2:]):
res.append(key)
continue
res.append(key)
elif alg and key.alg == alg:
res.append(key)
else:
res.append(key)
return res
|
pick_key
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(keys, use, alg='', key_type='', kid=''):\n res = []\n if not key_type:\n if use == 'sig':\n key_type = jws_alg2keytype(alg)\n else:\n key_type = jwe_alg2keytype(alg)\n for key in keys:\n if key.use and key.use != use:\n continue\n if key.kty == key_type:\n if key.kid and kid:\n if key.kid == kid:\n res.append(key)\n else:\n continue\n if key.alg == '':\n if alg:\n if key_type == 'EC':\n if key.crv == 'P-{}'.format(alg[2:]):\n res.append(key)\n continue\n res.append(key)\n elif alg and key.alg == alg:\n res.append(key)\n else:\n res.append(key)\n return res\n",
"role": "user"
},
{
"content": "pick_key",
"role": "assistant"
}
] |
def x(self, recv, aud):
argv = {'iss': self.iss, 'iat': utc_time_sans_frac()}
if self.lifetime:
argv['exp'] = argv['iat'] + self.lifetime
_aud = self.put_together_aud(recv, aud)
if _aud:
argv['aud'] = _aud
return argv
|
pack_init
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, recv, aud):\n argv = {'iss': self.iss, 'iat': utc_time_sans_frac()}\n if self.lifetime:\n argv['exp'] = argv['iat'] + self.lifetime\n _aud = self.put_together_aud(recv, aud)\n if _aud:\n argv['aud'] = _aud\n return argv\n",
"role": "user"
},
{
"content": "pack_init",
"role": "assistant"
}
] |
def x(self, owner_id='', kid=''):
keys = pick_key(self.my_keys(owner_id, 'sig'), 'sig', alg=self.alg, kid=kid
)
if not keys:
raise NoSuitableSigningKeys('kid={}'.format(kid))
return keys[0]
|
pack_key
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, owner_id='', kid=''):\n keys = pick_key(self.my_keys(owner_id, 'sig'), 'sig', alg=self.alg, kid=kid\n )\n if not keys:\n raise NoSuitableSigningKeys('kid={}'.format(kid))\n return keys[0]\n",
"role": "user"
},
{
"content": "pack_key",
"role": "assistant"
}
] |
def x(self, rj, token):
keys = self.key_jar.get_jwt_verify_keys(rj.jwt)
return rj.verify_compact(token, keys)
|
verify
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, rj, token):\n keys = self.key_jar.get_jwt_verify_keys(rj.jwt)\n return rj.verify_compact(token, keys)\n",
"role": "user"
},
{
"content": "verify",
"role": "assistant"
}
] |
def x(self, rj, token):
if self.iss:
keys = self.key_jar.get_jwt_decrypt_keys(rj.jwt, aud=self.iss)
else:
keys = self.key_jar.get_jwt_decrypt_keys(rj.jwt)
return rj.decrypt(token, keys=keys)
|
decrypt
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, rj, token):\n if self.iss:\n keys = self.key_jar.get_jwt_decrypt_keys(rj.jwt, aud=self.iss)\n else:\n keys = self.key_jar.get_jwt_decrypt_keys(rj.jwt)\n return rj.decrypt(token, keys=keys)\n",
"role": "user"
},
{
"content": "decrypt",
"role": "assistant"
}
] |
def x(msg_cls, info, **kwargs):
_msg = msg_cls(**info)
if not _msg.verify(**kwargs):
raise VerificationError()
return _msg
|
verify_profile
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(msg_cls, info, **kwargs):\n _msg = msg_cls(**info)\n if not _msg.verify(**kwargs):\n raise VerificationError()\n return _msg\n",
"role": "user"
},
{
"content": "verify_profile",
"role": "assistant"
}
] |
def x(self, token):
if not token:
raise KeyError
_jwe_header = _jws_header = None
darg = {}
if self.allowed_enc_encs:
darg['enc'] = self.allowed_enc_encs
if self.allowed_enc_algs:
darg['alg'] = self.allowed_enc_algs
try:
_decryptor = jwe_factory(token, **darg)
except (KeyError, HeaderError):
_decryptor = None
if _decryptor:
_info = self._decrypt(_decryptor, token)
_jwe_header = _decryptor.jwt.headers
try:
_content_type = _decryptor.jwt.headers['cty']
except KeyError:
_content_type = ''
else:
_content_type = 'jwt'
_info = token
if _content_type.lower() == 'jwt':
if self.allowed_sign_algs:
_verifier = jws_factory(_info, alg=self.allowed_sign_algs)
else:
_verifier = jws_factory(_info)
if _verifier:
_info = self._verify(_verifier, _info)
else:
raise Exception()
_jws_header = _verifier.jwt.headers
else:
try:
_info = json.loads(_info)
except JSONDecodeError:
return _info
except TypeError:
try:
_info = as_unicode(_info)
_info = json.loads(_info)
except JSONDecodeError:
return _info
if self.msg_cls:
_msg_cls = self.msg_cls
else:
try:
_msg_cls = self.iss2msg_cls[_info['iss']]
except KeyError:
_msg_cls = None
if _msg_cls:
vp_args = {'skew': self.skew}
if self.iss:
vp_args['aud'] = self.iss
_info = self.verify_profile(_msg_cls, _info, **vp_args)
_info.jwe_header = _jwe_header
_info.jws_header = _jws_header
return _info
else:
return _info
|
unpack
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, token):\n if not token:\n raise KeyError\n _jwe_header = _jws_header = None\n darg = {}\n if self.allowed_enc_encs:\n darg['enc'] = self.allowed_enc_encs\n if self.allowed_enc_algs:\n darg['alg'] = self.allowed_enc_algs\n try:\n _decryptor = jwe_factory(token, **darg)\n except (KeyError, HeaderError):\n _decryptor = None\n if _decryptor:\n _info = self._decrypt(_decryptor, token)\n _jwe_header = _decryptor.jwt.headers\n try:\n _content_type = _decryptor.jwt.headers['cty']\n except KeyError:\n _content_type = ''\n else:\n _content_type = 'jwt'\n _info = token\n if _content_type.lower() == 'jwt':\n if self.allowed_sign_algs:\n _verifier = jws_factory(_info, alg=self.allowed_sign_algs)\n else:\n _verifier = jws_factory(_info)\n if _verifier:\n _info = self._verify(_verifier, _info)\n else:\n raise Exception()\n _jws_header = _verifier.jwt.headers\n else:\n try:\n _info = json.loads(_info)\n except JSONDecodeError:\n return _info\n except TypeError:\n try:\n _info = as_unicode(_info)\n _info = json.loads(_info)\n except JSONDecodeError:\n return _info\n if self.msg_cls:\n _msg_cls = self.msg_cls\n else:\n try:\n _msg_cls = self.iss2msg_cls[_info['iss']]\n except KeyError:\n _msg_cls = None\n if _msg_cls:\n vp_args = {'skew': self.skew}\n if self.iss:\n vp_args['aud'] = self.iss\n _info = self.verify_profile(_msg_cls, _info, **vp_args)\n _info.jwe_header = _jwe_header\n _info.jws_header = _jws_header\n return _info\n else:\n return _info\n",
"role": "user"
},
{
"content": "unpack",
"role": "assistant"
}
] |
def x(token, alg=''):
_jw = JWS(alg=alg)
if _jw.is_jws(token):
return _jw
else:
return None
|
factory
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(token, alg=''):\n _jw = JWS(alg=alg)\n if _jw.is_jws(token):\n return _jw\n else:\n return None\n",
"role": "user"
},
{
"content": "factory",
"role": "assistant"
}
] |
def x(self, keys=None, protected=None, **kwargs):
_headers = self._header
_headers.update(kwargs)
key, xargs, _alg = self.alg_keys(keys, 'sig', protected)
if 'typ' in self:
xargs['typ'] = self['typ']
_headers.update(xargs)
jwt = JWSig(**_headers)
if _alg == 'none':
return jwt.pack(parts=[self.msg, ''])
try:
_signer = SIGNER_ALGS[_alg]
except KeyError:
raise UnknownAlgorithm(_alg)
_input = jwt.pack(parts=[self.msg])
if isinstance(key, AsymmetricKey):
sig = _signer.sign(_input.encode('utf-8'), key.private_key())
else:
sig = _signer.sign(_input.encode('utf-8'), key.key)
logger.debug('Signed message using key with kid=%s' % key.kid)
return '.'.join([_input, b64encode_item(sig).decode('utf-8')])
|
sign_compact
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, keys=None, protected=None, **kwargs):\n _headers = self._header\n _headers.update(kwargs)\n key, xargs, _alg = self.alg_keys(keys, 'sig', protected)\n if 'typ' in self:\n xargs['typ'] = self['typ']\n _headers.update(xargs)\n jwt = JWSig(**_headers)\n if _alg == 'none':\n return jwt.pack(parts=[self.msg, ''])\n try:\n _signer = SIGNER_ALGS[_alg]\n except KeyError:\n raise UnknownAlgorithm(_alg)\n _input = jwt.pack(parts=[self.msg])\n if isinstance(key, AsymmetricKey):\n sig = _signer.sign(_input.encode('utf-8'), key.private_key())\n else:\n sig = _signer.sign(_input.encode('utf-8'), key.key)\n logger.debug('Signed message using key with kid=%s' % key.kid)\n return '.'.join([_input, b64encode_item(sig).decode('utf-8')])\n",
"role": "user"
},
{
"content": "sign_compact",
"role": "assistant"
}
] |
def x(self, jws=None, keys=None, allow_none=False, sigalg=None):
return self.verify_compact_verbose(jws, keys, allow_none, sigalg)['msg']
|
verify_compact
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, jws=None, keys=None, allow_none=False, sigalg=None):\n return self.verify_compact_verbose(jws, keys, allow_none, sigalg)['msg']\n",
"role": "user"
},
{
"content": "verify_compact",
"role": "assistant"
}
] |
def x(self, jws=None, keys=None, allow_none=False, sigalg=None):
if jws:
jwt = JWSig().unpack(jws)
if len(jwt) != 3:
raise WrongNumberOfParts(len(jwt))
self.jwt = jwt
elif not self.jwt:
raise ValueError('Missing singed JWT')
else:
jwt = self.jwt
try:
_alg = jwt.headers['alg']
except KeyError:
_alg = None
else:
if _alg is None or _alg.lower() == 'none':
if allow_none:
self.msg = jwt.payload()
return {'msg': self.msg}
else:
raise SignerAlgError('none not allowed')
if 'alg' in self and self['alg'] and _alg:
if isinstance(self['alg'], list):
if _alg not in self['alg']:
raise SignerAlgError(
'Wrong signing algorithm, expected {} got {}'.format(
self['alg'], _alg))
elif _alg != self['alg']:
raise SignerAlgError('Wrong signing algorithm, expected {} got {}'
.format(self['alg'], _alg))
if sigalg and sigalg != _alg:
raise SignerAlgError('Expected {0} got {1}'.format(sigalg, jwt.
headers['alg']))
self['alg'] = _alg
if keys:
_keys = self.pick_keys(keys)
else:
_keys = self.pick_keys(self._get_keys())
if not _keys:
if 'kid' in self:
raise NoSuitableSigningKeys('No key with kid: %s' % self['kid'])
elif 'kid' in self.jwt.headers:
raise NoSuitableSigningKeys('No key with kid: %s' % self.jwt.
headers['kid'])
else:
raise NoSuitableSigningKeys('No key for algorithm: %s' % _alg)
verifier = SIGNER_ALGS[_alg]
for key in _keys:
if isinstance(key, AsymmetricKey):
_key = key.public_key()
else:
_key = key.key
try:
if not verifier.verify(jwt.sign_input(), jwt.signature(), _key):
continue
except (BadSignature, IndexError):
pass
except (ValueError, TypeError) as err:
logger.warning('Exception "{}" caught'.format(err))
else:
logger.debug('Verified message using key with kid=%s' % key.kid)
self.msg = jwt.payload()
self.key = key
return {'msg': self.msg, 'key': key}
raise BadSignature()
|
verify_compact_verbose
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, jws=None, keys=None, allow_none=False, sigalg=None):\n if jws:\n jwt = JWSig().unpack(jws)\n if len(jwt) != 3:\n raise WrongNumberOfParts(len(jwt))\n self.jwt = jwt\n elif not self.jwt:\n raise ValueError('Missing singed JWT')\n else:\n jwt = self.jwt\n try:\n _alg = jwt.headers['alg']\n except KeyError:\n _alg = None\n else:\n if _alg is None or _alg.lower() == 'none':\n if allow_none:\n self.msg = jwt.payload()\n return {'msg': self.msg}\n else:\n raise SignerAlgError('none not allowed')\n if 'alg' in self and self['alg'] and _alg:\n if isinstance(self['alg'], list):\n if _alg not in self['alg']:\n raise SignerAlgError(\n 'Wrong signing algorithm, expected {} got {}'.format(\n self['alg'], _alg))\n elif _alg != self['alg']:\n raise SignerAlgError('Wrong signing algorithm, expected {} got {}'\n .format(self['alg'], _alg))\n if sigalg and sigalg != _alg:\n raise SignerAlgError('Expected {0} got {1}'.format(sigalg, jwt.\n headers['alg']))\n self['alg'] = _alg\n if keys:\n _keys = self.pick_keys(keys)\n else:\n _keys = self.pick_keys(self._get_keys())\n if not _keys:\n if 'kid' in self:\n raise NoSuitableSigningKeys('No key with kid: %s' % self['kid'])\n elif 'kid' in self.jwt.headers:\n raise NoSuitableSigningKeys('No key with kid: %s' % self.jwt.\n headers['kid'])\n else:\n raise NoSuitableSigningKeys('No key for algorithm: %s' % _alg)\n verifier = SIGNER_ALGS[_alg]\n for key in _keys:\n if isinstance(key, AsymmetricKey):\n _key = key.public_key()\n else:\n _key = key.key\n try:\n if not verifier.verify(jwt.sign_input(), jwt.signature(), _key):\n continue\n except (BadSignature, IndexError):\n pass\n except (ValueError, TypeError) as err:\n logger.warning('Exception \"{}\" caught'.format(err))\n else:\n logger.debug('Verified message using key with kid=%s' % key.kid)\n self.msg = jwt.payload()\n self.key = key\n return {'msg': self.msg, 'key': key}\n raise BadSignature()\n",
"role": "user"
},
{
"content": "verify_compact_verbose",
"role": "assistant"
}
] |
def x(self, keys=None, headers=None, flatten=False):
def x(protected, unprotected):
protected_headers = protected or {}
protected_headers.setdefault('alg', self.alg)
_jws = JWS(self.msg, **protected_headers)
encoded_header, payload, signature = _jws.sign_compact(protected=
protected, keys=keys).split('.')
signature_entry = {'signature': signature}
if unprotected:
signature_entry['header'] = unprotected
if encoded_header:
signature_entry['protected'] = encoded_header
return signature_entry
res = {'payload': b64e_enc_dec(self.msg, 'utf-8', 'ascii')}
if headers is None:
headers = [(dict(alg=self.alg), None)]
if flatten and len(headers) == 1:
signature_entry = create_signature(*headers[0])
res.update(signature_entry)
else:
res['signatures'] = []
for protected, unprotected in headers:
signature_entry = create_signature(protected, unprotected)
res['signatures'].append(signature_entry)
return json.dumps(res)
|
sign_json
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, keys=None, headers=None, flatten=False):\n\n def x(protected, unprotected):\n protected_headers = protected or {}\n protected_headers.setdefault('alg', self.alg)\n _jws = JWS(self.msg, **protected_headers)\n encoded_header, payload, signature = _jws.sign_compact(protected=\n protected, keys=keys).split('.')\n signature_entry = {'signature': signature}\n if unprotected:\n signature_entry['header'] = unprotected\n if encoded_header:\n signature_entry['protected'] = encoded_header\n return signature_entry\n res = {'payload': b64e_enc_dec(self.msg, 'utf-8', 'ascii')}\n if headers is None:\n headers = [(dict(alg=self.alg), None)]\n if flatten and len(headers) == 1:\n signature_entry = create_signature(*headers[0])\n res.update(signature_entry)\n else:\n res['signatures'] = []\n for protected, unprotected in headers:\n signature_entry = create_signature(protected, unprotected)\n res['signatures'].append(signature_entry)\n return json.dumps(res)\n",
"role": "user"
},
{
"content": "sign_json",
"role": "assistant"
}
] |
def x(self, json_jws):
json_ser_keys = {'payload', 'signatures'}
flattened_json_ser_keys = {'payload', 'signature'}
if not json_ser_keys.issubset(json_jws.keys()
) and not flattened_json_ser_keys.issubset(json_jws.keys()):
return False
return True
|
is_json_serialized_jws
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, json_jws):\n json_ser_keys = {'payload', 'signatures'}\n flattened_json_ser_keys = {'payload', 'signature'}\n if not json_ser_keys.issubset(json_jws.keys()\n ) and not flattened_json_ser_keys.issubset(json_jws.keys()):\n return False\n return True\n",
"role": "user"
},
{
"content": "is_json_serialized_jws",
"role": "assistant"
}
] |
def x(self, jws):
try:
jwt = JWSig().unpack(jws)
except Exception as err:
logger.warning('Could not parse JWS: {}'.format(err))
return False
if 'alg' not in jwt.headers:
return False
if jwt.headers['alg'] is None:
jwt.headers['alg'] = 'none'
if jwt.headers['alg'] not in SIGNER_ALGS:
logger.debug('UnknownSignerAlg: %s' % jwt.headers['alg'])
return False
self.jwt = jwt
return True
|
is_compact_jws
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, jws):\n try:\n jwt = JWSig().unpack(jws)\n except Exception as err:\n logger.warning('Could not parse JWS: {}'.format(err))\n return False\n if 'alg' not in jwt.headers:\n return False\n if jwt.headers['alg'] is None:\n jwt.headers['alg'] = 'none'\n if jwt.headers['alg'] not in SIGNER_ALGS:\n logger.debug('UnknownSignerAlg: %s' % jwt.headers['alg'])\n return False\n self.jwt = jwt\n return True\n",
"role": "user"
},
{
"content": "is_compact_jws",
"role": "assistant"
}
] |
def x(self, usage, alg='HS256'):
try:
_use = USE[usage]
except:
raise ValueError('Unknown key usage')
else:
if not self.use or self.use == _use:
if _use == 'sig':
return self.get_key()
else:
return self.encryption_key(alg)
raise WrongUsage("This key can't be used for {}".format(usage))
|
appropriate_for
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, usage, alg='HS256'):\n try:\n _use = USE[usage]\n except:\n raise ValueError('Unknown key usage')\n else:\n if not self.use or self.use == _use:\n if _use == 'sig':\n return self.get_key()\n else:\n return self.encryption_key(alg)\n raise WrongUsage(\"This key can't be used for {}\".format(usage))\n",
"role": "user"
},
{
"content": "appropriate_for",
"role": "assistant"
}
] |
def x(self, alg, **kwargs):
if not self.key:
self.deserialize()
try:
tsize = ALG2KEYLEN[alg]
except KeyError:
raise UnsupportedAlgorithm(alg)
if tsize <= 32:
_enc_key = sha256_digest(self.key)[:tsize]
elif tsize <= 48:
_enc_key = sha384_digest(self.key)[:tsize]
elif tsize <= 64:
_enc_key = sha512_digest(self.key)[:tsize]
else:
raise JWKException('No support for symmetric keys > 512 bits')
logger.debug('Symmetric encryption key: {}'.format(as_unicode(b64e(
_enc_key))))
return _enc_key
|
encryption_key
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, alg, **kwargs):\n if not self.key:\n self.deserialize()\n try:\n tsize = ALG2KEYLEN[alg]\n except KeyError:\n raise UnsupportedAlgorithm(alg)\n if tsize <= 32:\n _enc_key = sha256_digest(self.key)[:tsize]\n elif tsize <= 48:\n _enc_key = sha384_digest(self.key)[:tsize]\n elif tsize <= 64:\n _enc_key = sha512_digest(self.key)[:tsize]\n else:\n raise JWKException('No support for symmetric keys > 512 bits')\n logger.debug('Symmetric encryption key: {}'.format(as_unicode(b64e(\n _enc_key))))\n return _enc_key\n",
"role": "user"
},
{
"content": "encryption_key",
"role": "assistant"
}
] |
def x(self, msg, key):
if not isinstance(key, rsa.RSAPrivateKey):
raise TypeError('The key must be an instance of rsa.RSAPrivateKey')
sig = key.sign(msg, self.padding, self.hash)
return sig
|
sign
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, msg, key):\n if not isinstance(key, rsa.RSAPrivateKey):\n raise TypeError('The key must be an instance of rsa.RSAPrivateKey')\n sig = key.sign(msg, self.padding, self.hash)\n return sig\n",
"role": "user"
},
{
"content": "sign",
"role": "assistant"
}
] |
def x(self, msg, signature, key):
if not isinstance(key, rsa.RSAPublicKey):
raise TypeError('The public key must be an instance of RSAPublicKey')
try:
key.verify(signature, msg, self.padding, self.hash)
except InvalidSignature as err:
raise BadSignature(str(err))
except AttributeError:
return False
else:
return True
|
verify
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, msg, signature, key):\n if not isinstance(key, rsa.RSAPublicKey):\n raise TypeError('The public key must be an instance of RSAPublicKey')\n try:\n key.verify(signature, msg, self.padding, self.hash)\n except InvalidSignature as err:\n raise BadSignature(str(err))\n except AttributeError:\n return False\n else:\n return True\n",
"role": "user"
},
{
"content": "verify",
"role": "assistant"
}
] |
def x(self, usage, **kwargs):
try:
_use = USE[usage]
except KeyError:
raise ValueError('Unknown key usage')
else:
if usage in ['sign', 'decrypt']:
if not self.use or _use == self.use:
if self.priv_key:
return self.priv_key
return None
else:
if not self.use or _use == self.use:
if self.pub_key:
return self.pub_key
return None
|
appropriate_for
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, usage, **kwargs):\n try:\n _use = USE[usage]\n except KeyError:\n raise ValueError('Unknown key usage')\n else:\n if usage in ['sign', 'decrypt']:\n if not self.use or _use == self.use:\n if self.priv_key:\n return self.priv_key\n return None\n else:\n if not self.use or _use == self.use:\n if self.pub_key:\n return self.pub_key\n return None\n",
"role": "user"
},
{
"content": "appropriate_for",
"role": "assistant"
}
] |
def x(key_size=2048, filename='rsa.key', passphrase=''):
private_key = rsa.generate_private_key(public_exponent=65537, key_size=
key_size, backend=default_backend())
with open(filename, 'wb') as keyfile:
if passphrase:
pem = private_key.private_bytes(encoding=serialization.Encoding
.PEM, format=serialization.PrivateFormat.PKCS8,
encryption_algorithm=serialization.BestAvailableEncryption(
passphrase))
else:
pem = private_key.private_bytes(encoding=serialization.Encoding
.PEM, format=serialization.PrivateFormat.PKCS8,
encryption_algorithm=serialization.NoEncryption())
keyfile.write(pem)
keyfile.close()
return private_key
|
generate_and_store_rsa_key
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(key_size=2048, filename='rsa.key', passphrase=''):\n private_key = rsa.generate_private_key(public_exponent=65537, key_size=\n key_size, backend=default_backend())\n with open(filename, 'wb') as keyfile:\n if passphrase:\n pem = private_key.private_bytes(encoding=serialization.Encoding\n .PEM, format=serialization.PrivateFormat.PKCS8,\n encryption_algorithm=serialization.BestAvailableEncryption(\n passphrase))\n else:\n pem = private_key.private_bytes(encoding=serialization.Encoding\n .PEM, format=serialization.PrivateFormat.PKCS8,\n encryption_algorithm=serialization.NoEncryption())\n keyfile.write(pem)\n keyfile.close()\n return private_key\n",
"role": "user"
},
{
"content": "generate_and_store_rsa_key",
"role": "assistant"
}
] |
def x(filename):
with open(filename, 'rb') as key_file:
public_key = serialization.load_pem_public_key(key_file.read(),
backend=default_backend())
return public_key
|
import_public_rsa_key_from_file
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(filename):\n with open(filename, 'rb') as key_file:\n public_key = serialization.load_pem_public_key(key_file.read(),\n backend=default_backend())\n return public_key\n",
"role": "user"
},
{
"content": "import_public_rsa_key_from_file",
"role": "assistant"
}
] |
def x(pem_data):
if not pem_data.startswith(PREFIX):
pem_data = bytes('{}\n{}\n{}'.format(PREFIX, pem_data, POSTFIX),
'utf-8')
else:
pem_data = bytes(pem_data, 'utf-8')
cert = x509.load_pem_x509_certificate(pem_data, default_backend())
return cert.public_key()
|
import_rsa_key
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(pem_data):\n if not pem_data.startswith(PREFIX):\n pem_data = bytes('{}\\n{}\\n{}'.format(PREFIX, pem_data, POSTFIX),\n 'utf-8')\n else:\n pem_data = bytes(pem_data, 'utf-8')\n cert = x509.load_pem_x509_certificate(pem_data, default_backend())\n return cert.public_key()\n",
"role": "user"
},
{
"content": "import_rsa_key",
"role": "assistant"
}
] |
def x(key1, key2):
pn1 = key1.public_numbers()
pn2 = key2.public_numbers()
if pn1 == pn2:
return True
else:
return False
|
rsa_eq
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(key1, key2):\n pn1 = key1.public_numbers()\n pn2 = key2.public_numbers()\n if pn1 == pn2:\n return True\n else:\n return False\n",
"role": "user"
},
{
"content": "rsa_eq",
"role": "assistant"
}
] |
def x(txt):
pub_key = import_rsa_key(txt)
if isinstance(pub_key, rsa.RSAPublicKey):
return [('rsa', pub_key)]
|
x509_rsa_load
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(txt):\n pub_key = import_rsa_key(txt)\n if isinstance(pub_key, rsa.RSAPublicKey):\n return [('rsa', pub_key)]\n",
"role": "user"
},
{
"content": "x509_rsa_load",
"role": "assistant"
}
] |
def x(der_data):
if isinstance(der_data, str):
der_data = bytes(der_data, 'utf-8')
return x509.load_der_x509_certificate(der_data, default_backend())
|
der_cert
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(der_data):\n if isinstance(der_data, str):\n der_data = bytes(der_data, 'utf-8')\n return x509.load_der_x509_certificate(der_data, default_backend())\n",
"role": "user"
},
{
"content": "der_cert",
"role": "assistant"
}
] |
def x(url, httpc, spec2key, **get_args):
try:
r = httpc('GET', url, allow_redirects=True, **get_args)
if r.status_code == 200:
cert = str(r.text)
try:
public_key = spec2key[cert]
except KeyError:
public_key = import_rsa_key(cert)
spec2key[cert] = public_key
if isinstance(public_key, rsa.RSAPublicKey):
return {'rsa': public_key}
else:
raise Exception('HTTP Get error: %s' % r.status_code)
except Exception as err:
logger.warning("Can't load key: %s" % err)
return []
|
load_x509_cert
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(url, httpc, spec2key, **get_args):\n try:\n r = httpc('GET', url, allow_redirects=True, **get_args)\n if r.status_code == 200:\n cert = str(r.text)\n try:\n public_key = spec2key[cert]\n except KeyError:\n public_key = import_rsa_key(cert)\n spec2key[cert] = public_key\n if isinstance(public_key, rsa.RSAPublicKey):\n return {'rsa': public_key}\n else:\n raise Exception('HTTP Get error: %s' % r.status_code)\n except Exception as err:\n logger.warning(\"Can't load key: %s\" % err)\n return []\n",
"role": "user"
},
{
"content": "load_x509_cert",
"role": "assistant"
}
] |
def x(pn1, pn2):
if pn1.n == pn2.n:
if pn1.e == pn2.e:
return True
return False
|
cmp_public_numbers
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(pn1, pn2):\n if pn1.n == pn2.n:\n if pn1.e == pn2.e:\n return True\n return False\n",
"role": "user"
},
{
"content": "cmp_public_numbers",
"role": "assistant"
}
] |
def x(pn1, pn2):
if not cmp_public_numbers(pn1.public_numbers, pn2.public_numbers):
return False
for param in ['d', 'p', 'q']:
if getattr(pn1, param) != getattr(pn2, param):
return False
return True
|
cmp_private_numbers
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(pn1, pn2):\n if not cmp_public_numbers(pn1.public_numbers, pn2.public_numbers):\n return False\n for param in ['d', 'p', 'q']:\n if getattr(pn1, param) != getattr(pn2, param):\n return False\n return True\n",
"role": "user"
},
{
"content": "cmp_private_numbers",
"role": "assistant"
}
] |
def x(cert):
if isinstance(cert, str):
der_cert = base64.b64decode(cert.encode('ascii'))
else:
der_cert = base64.b64decode(cert)
return b64e(hashlib.sha1(der_cert).digest())
|
x5t_calculation
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(cert):\n if isinstance(cert, str):\n der_cert = base64.b64decode(cert.encode('ascii'))\n else:\n der_cert = base64.b64decode(cert)\n return b64e(hashlib.sha1(der_cert).digest())\n",
"role": "user"
},
{
"content": "x5t_calculation",
"role": "assistant"
}
] |
def x(key_size=2048, kid='', use='', public_exponent=65537):
_key = rsa.generate_private_key(public_exponent=public_exponent,
key_size=key_size, backend=default_backend())
_rk = RSAKey(priv_key=_key, use=use, kid=kid)
if not kid:
_rk.add_kid()
return _rk
|
new_rsa_key
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(key_size=2048, kid='', use='', public_exponent=65537):\n _key = rsa.generate_private_key(public_exponent=public_exponent,\n key_size=key_size, backend=default_backend())\n _rk = RSAKey(priv_key=_key, use=use, kid=kid)\n if not kid:\n _rk.add_kid()\n return _rk\n",
"role": "user"
},
{
"content": "new_rsa_key",
"role": "assistant"
}
] |
def x(self):
if self.n and self.e:
try:
numbers = {}
for param in self.longs:
item = getattr(self, param)
if not item:
continue
else:
try:
val = int(deser(item))
except Exception:
raise
else:
numbers[param] = val
if 'd' in numbers:
self.priv_key = rsa_construct_private(numbers)
self.pub_key = self.priv_key.public_key()
else:
self.pub_key = rsa_construct_public(numbers)
except ValueError as err:
raise DeSerializationNotPossible('%s' % err)
if self.x5c:
_cert_chain = []
for der_data in self.x5c:
_cert_chain.append(der_cert(base64.b64decode(der_data)))
if self.x5t:
if isinstance(self.x5t, bytes):
_x5t = self.x5t
else:
_x5t = self.x5t.encode('ascii')
if _x5t != x5t_calculation(self.x5c[0]):
raise DeSerializationNotPossible(
"The thumbprint 'x5t' does not match the certificate.")
if self.pub_key:
if not rsa_eq(self.pub_key, _cert_chain[0].public_key()):
raise ValueError(
'key described by components and key in x5c not equal')
else:
self.pub_key = _cert_chain[0].public_key()
self._serialize(self.pub_key)
if len(self.x5c) > 1:
pass
if not self.priv_key and not self.pub_key:
raise DeSerializationNotPossible()
|
deserialize
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n if self.n and self.e:\n try:\n numbers = {}\n for param in self.longs:\n item = getattr(self, param)\n if not item:\n continue\n else:\n try:\n val = int(deser(item))\n except Exception:\n raise\n else:\n numbers[param] = val\n if 'd' in numbers:\n self.priv_key = rsa_construct_private(numbers)\n self.pub_key = self.priv_key.public_key()\n else:\n self.pub_key = rsa_construct_public(numbers)\n except ValueError as err:\n raise DeSerializationNotPossible('%s' % err)\n if self.x5c:\n _cert_chain = []\n for der_data in self.x5c:\n _cert_chain.append(der_cert(base64.b64decode(der_data)))\n if self.x5t:\n if isinstance(self.x5t, bytes):\n _x5t = self.x5t\n else:\n _x5t = self.x5t.encode('ascii')\n if _x5t != x5t_calculation(self.x5c[0]):\n raise DeSerializationNotPossible(\n \"The thumbprint 'x5t' does not match the certificate.\")\n if self.pub_key:\n if not rsa_eq(self.pub_key, _cert_chain[0].public_key()):\n raise ValueError(\n 'key described by components and key in x5c not equal')\n else:\n self.pub_key = _cert_chain[0].public_key()\n self._serialize(self.pub_key)\n if len(self.x5c) > 1:\n pass\n if not self.priv_key and not self.pub_key:\n raise DeSerializationNotPossible()\n",
"role": "user"
},
{
"content": "deserialize",
"role": "assistant"
}
] |
def x(self, private=False):
if not self.priv_key and not self.pub_key:
raise SerializationNotPossible()
res = self.common()
public_longs = list(set(self.public_members) & set(self.longs))
for param in public_longs:
item = getattr(self, param)
if item:
res[param] = item
if private:
for param in self.longs:
if not private and param in ['d', 'p', 'q', 'dp', 'dq', 'di', 'qi'
]:
continue
item = getattr(self, param)
if item:
res[param] = item
if self.x5c:
res['x5c'] = [x.decode('utf-8') for x in self.x5c]
return res
|
serialize
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, private=False):\n if not self.priv_key and not self.pub_key:\n raise SerializationNotPossible()\n res = self.common()\n public_longs = list(set(self.public_members) & set(self.longs))\n for param in public_longs:\n item = getattr(self, param)\n if item:\n res[param] = item\n if private:\n for param in self.longs:\n if not private and param in ['d', 'p', 'q', 'dp', 'dq', 'di', 'qi'\n ]:\n continue\n item = getattr(self, param)\n if item:\n res[param] = item\n if self.x5c:\n res['x5c'] = [x.decode('utf-8') for x in self.x5c]\n return res\n",
"role": "user"
},
{
"content": "serialize",
"role": "assistant"
}
] |
def x(self, key):
self._serialize(key)
if isinstance(key, rsa.RSAPrivateKey):
self.priv_key = key
self.pub_key = key.public_key()
else:
self.pub_key = key
return self
|
load_key
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, key):\n self._serialize(key)\n if isinstance(key, rsa.RSAPrivateKey):\n self.priv_key = key\n self.pub_key = key.public_key()\n else:\n self.pub_key = key\n return self\n",
"role": "user"
},
{
"content": "load_key",
"role": "assistant"
}
] |
def x(self, msg, key):
if not isinstance(key, ec.EllipticCurvePrivateKey):
raise TypeError(
'The private key must be an instance of ec.EllipticCurvePrivateKey'
)
self._cross_check(key.public_key())
num_bits = key.curve.key_size
num_bytes = (num_bits + 7) // 8
asn1sig = key.sign(msg, ec.ECDSA(self.hash_algorithm()))
r, s = decode_dss_signature(asn1sig)
return int_to_bytes(r, num_bytes) + int_to_bytes(s, num_bytes)
|
sign
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, msg, key):\n if not isinstance(key, ec.EllipticCurvePrivateKey):\n raise TypeError(\n 'The private key must be an instance of ec.EllipticCurvePrivateKey'\n )\n self._cross_check(key.public_key())\n num_bits = key.curve.key_size\n num_bytes = (num_bits + 7) // 8\n asn1sig = key.sign(msg, ec.ECDSA(self.hash_algorithm()))\n r, s = decode_dss_signature(asn1sig)\n return int_to_bytes(r, num_bytes) + int_to_bytes(s, num_bytes)\n",
"role": "user"
},
{
"content": "sign",
"role": "assistant"
}
] |
def x(self, msg, sig, key):
if not isinstance(key, ec.EllipticCurvePublicKey):
raise TypeError(
'The public key must be an instance of ec.EllipticCurvePublicKey')
self._cross_check(key)
num_bits = key.curve.key_size
num_bytes = (num_bits + 7) // 8
if len(sig) != 2 * num_bytes:
raise ValueError('Invalid signature')
try:
r, s = self._split_raw_signature(sig)
asn1sig = encode_dss_signature(r, s)
key.verify(asn1sig, msg, ec.ECDSA(self.hash_algorithm()))
except InvalidSignature as err:
raise BadSignature(err)
else:
return True
|
verify
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, msg, sig, key):\n if not isinstance(key, ec.EllipticCurvePublicKey):\n raise TypeError(\n 'The public key must be an instance of ec.EllipticCurvePublicKey')\n self._cross_check(key)\n num_bits = key.curve.key_size\n num_bytes = (num_bits + 7) // 8\n if len(sig) != 2 * num_bytes:\n raise ValueError('Invalid signature')\n try:\n r, s = self._split_raw_signature(sig)\n asn1sig = encode_dss_signature(r, s)\n key.verify(asn1sig, msg, ec.ECDSA(self.hash_algorithm()))\n except InvalidSignature as err:\n raise BadSignature(err)\n else:\n return True\n",
"role": "user"
},
{
"content": "verify",
"role": "assistant"
}
] |
def x(self, pub_key):
if self.curve_name != pub_key.curve.name:
raise ValueError(
"The curve in private key {} and in algorithm {} don't match".
format(pub_key.curve.name, self.curve_name))
|
cross_check
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, pub_key):\n if self.curve_name != pub_key.curve.name:\n raise ValueError(\n \"The curve in private key {} and in algorithm {} don't match\".\n format(pub_key.curve.name, self.curve_name))\n",
"role": "user"
},
{
"content": "cross_check",
"role": "assistant"
}
] |
def x(sig):
c_length = len(sig) // 2
r = int_from_bytes(sig[:c_length], byteorder='big')
s = int_from_bytes(sig[c_length:], byteorder='big')
return r, s
|
split_raw_signature
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(sig):\n c_length = len(sig) // 2\n r = int_from_bytes(sig[:c_length], byteorder='big')\n s = int_from_bytes(sig[c_length:], byteorder='big')\n return r, s\n",
"role": "user"
},
{
"content": "split_raw_signature",
"role": "assistant"
}
] |
def x(msg, func='HS256'):
if func == 'HS256':
return as_unicode(b64e(sha256_digest(msg)[:16]))
elif func == 'HS384':
return as_unicode(b64e(sha384_digest(msg)[:24]))
elif func == 'HS512':
return as_unicode(b64e(sha512_digest(msg)[:32]))
|
left_hash
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(msg, func='HS256'):\n if func == 'HS256':\n return as_unicode(b64e(sha256_digest(msg)[:16]))\n elif func == 'HS384':\n return as_unicode(b64e(sha384_digest(msg)[:24]))\n elif func == 'HS512':\n return as_unicode(b64e(sha512_digest(msg)[:32]))\n",
"role": "user"
},
{
"content": "left_hash",
"role": "assistant"
}
] |
def x(alg):
if not alg or alg.lower() == 'none':
return 'none'
elif alg.startswith('RS') or alg.startswith('PS'):
return 'RSA'
elif alg.startswith('HS') or alg.startswith('A'):
return 'oct'
elif alg.startswith('ES') or alg.startswith('ECDH-ES'):
return 'EC'
else:
return None
|
alg2keytype
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(alg):\n if not alg or alg.lower() == 'none':\n return 'none'\n elif alg.startswith('RS') or alg.startswith('PS'):\n return 'RSA'\n elif alg.startswith('HS') or alg.startswith('A'):\n return 'oct'\n elif alg.startswith('ES') or alg.startswith('ECDH-ES'):\n return 'EC'\n else:\n return None\n",
"role": "user"
},
{
"content": "alg2keytype",
"role": "assistant"
}
] |
def x(algorithm):
if algorithm == 'RS256':
return hashes.SHA256(), padding.PKCS1v15()
elif algorithm == 'RS384':
return hashes.SHA384(), padding.PKCS1v15()
elif algorithm == 'RS512':
return hashes.SHA512(), padding.PKCS1v15()
elif algorithm == 'PS256':
return hashes.SHA256(), padding.PSS(mgf=padding.MGF1(hashes.SHA256(
)), salt_length=padding.PSS.MAX_LENGTH)
elif algorithm == 'PS384':
return hashes.SHA384(), padding.PSS(mgf=padding.MGF1(hashes.SHA384(
)), salt_length=padding.PSS.MAX_LENGTH)
elif algorithm == 'PS512':
return hashes.SHA512(), padding.PSS(mgf=padding.MGF1(hashes.SHA512(
)), salt_length=padding.PSS.MAX_LENGTH)
else:
raise UnsupportedAlgorithm('Unknown algorithm: {}'.format(algorithm))
|
parse_rsa_algorithm
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(algorithm):\n if algorithm == 'RS256':\n return hashes.SHA256(), padding.PKCS1v15()\n elif algorithm == 'RS384':\n return hashes.SHA384(), padding.PKCS1v15()\n elif algorithm == 'RS512':\n return hashes.SHA512(), padding.PKCS1v15()\n elif algorithm == 'PS256':\n return hashes.SHA256(), padding.PSS(mgf=padding.MGF1(hashes.SHA256(\n )), salt_length=padding.PSS.MAX_LENGTH)\n elif algorithm == 'PS384':\n return hashes.SHA384(), padding.PSS(mgf=padding.MGF1(hashes.SHA384(\n )), salt_length=padding.PSS.MAX_LENGTH)\n elif algorithm == 'PS512':\n return hashes.SHA512(), padding.PSS(mgf=padding.MGF1(hashes.SHA512(\n )), salt_length=padding.PSS.MAX_LENGTH)\n else:\n raise UnsupportedAlgorithm('Unknown algorithm: {}'.format(algorithm))\n",
"role": "user"
},
{
"content": "parse_rsa_algorithm",
"role": "assistant"
}
] |
def x(key, epk, apu, apv, alg, dk_len):
shared_key = key.exchange(ec.ECDH(), epk)
otherInfo = bytes(alg) + struct.pack('!I', len(apu)) + apu + struct.pack(
'!I', len(apv)) + apv + struct.pack('!I', dk_len)
return concat_sha256(shared_key, dk_len, otherInfo)
|
ecdh_derive_key
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(key, epk, apu, apv, alg, dk_len):\n shared_key = key.exchange(ec.ECDH(), epk)\n otherInfo = bytes(alg) + struct.pack('!I', len(apu)) + apu + struct.pack(\n '!I', len(apv)) + apv + struct.pack('!I', dk_len)\n return concat_sha256(shared_key, dk_len, otherInfo)\n",
"role": "user"
},
{
"content": "ecdh_derive_key",
"role": "assistant"
}
] |
def x(self, key=None, iv='', cek='', **kwargs):
_msg = as_bytes(self.msg)
_args = self._dict
try:
_args['kid'] = kwargs['kid']
except KeyError:
pass
if 'params' in kwargs:
if 'apu' in kwargs['params']:
_args['apu'] = kwargs['params']['apu']
if 'apv' in kwargs['params']:
_args['apv'] = kwargs['params']['apv']
if 'epk' in kwargs['params']:
_args['epk'] = kwargs['params']['epk']
jwe = JWEnc(**_args)
ctxt, tag, cek = super(JWE_EC, self).enc_setup(self['enc'], _msg,
auth_data=jwe.b64_encode_header(), key=cek, iv=iv)
if 'encrypted_key' in kwargs:
return jwe.pack(parts=[kwargs['encrypted_key'], iv, ctxt, tag])
return jwe.pack(parts=[iv, ctxt, tag])
|
encrypt
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, key=None, iv='', cek='', **kwargs):\n _msg = as_bytes(self.msg)\n _args = self._dict\n try:\n _args['kid'] = kwargs['kid']\n except KeyError:\n pass\n if 'params' in kwargs:\n if 'apu' in kwargs['params']:\n _args['apu'] = kwargs['params']['apu']\n if 'apv' in kwargs['params']:\n _args['apv'] = kwargs['params']['apv']\n if 'epk' in kwargs['params']:\n _args['epk'] = kwargs['params']['epk']\n jwe = JWEnc(**_args)\n ctxt, tag, cek = super(JWE_EC, self).enc_setup(self['enc'], _msg,\n auth_data=jwe.b64_encode_header(), key=cek, iv=iv)\n if 'encrypted_key' in kwargs:\n return jwe.pack(parts=[kwargs['encrypted_key'], iv, ctxt, tag])\n return jwe.pack(parts=[iv, ctxt, tag])\n",
"role": "user"
},
{
"content": "encrypt",
"role": "assistant"
}
] |
def x(self, key, iv='', cek='', **kwargs):
_msg = as_bytes(self.msg)
if 'zip' in self:
if self['zip'] == 'DEF':
_msg = zlib.compress(_msg)
else:
raise ParameterError('Zip has unknown value: %s' % self['zip'])
kwarg_cek = cek or None
_enc = self['enc']
iv = self._generate_iv(_enc, iv)
cek = self._generate_key(_enc, cek)
self['cek'] = cek
logger.debug('cek: %s, iv: %s' % ([c for c in cek], [c for c in iv]))
_encrypt = RSAEncrypter(self.with_digest).encrypt
_alg = self['alg']
if kwarg_cek:
jwe_enc_key = ''
elif _alg == 'RSA-OAEP':
jwe_enc_key = _encrypt(cek, key, 'pkcs1_oaep_padding')
elif _alg == 'RSA-OAEP-256':
jwe_enc_key = _encrypt(cek, key, 'pkcs1_oaep_256_padding')
elif _alg == 'RSA1_5':
jwe_enc_key = _encrypt(cek, key)
else:
raise NotSupportedAlgorithm(_alg)
jwe = JWEnc(**self.headers())
try:
_auth_data = kwargs['auth_data']
except KeyError:
_auth_data = jwe.b64_encode_header()
ctxt, tag, key = self.enc_setup(_enc, _msg, key=cek, iv=iv, auth_data=
_auth_data)
return jwe.pack(parts=[jwe_enc_key, iv, ctxt, tag])
|
encrypt
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, key, iv='', cek='', **kwargs):\n _msg = as_bytes(self.msg)\n if 'zip' in self:\n if self['zip'] == 'DEF':\n _msg = zlib.compress(_msg)\n else:\n raise ParameterError('Zip has unknown value: %s' % self['zip'])\n kwarg_cek = cek or None\n _enc = self['enc']\n iv = self._generate_iv(_enc, iv)\n cek = self._generate_key(_enc, cek)\n self['cek'] = cek\n logger.debug('cek: %s, iv: %s' % ([c for c in cek], [c for c in iv]))\n _encrypt = RSAEncrypter(self.with_digest).encrypt\n _alg = self['alg']\n if kwarg_cek:\n jwe_enc_key = ''\n elif _alg == 'RSA-OAEP':\n jwe_enc_key = _encrypt(cek, key, 'pkcs1_oaep_padding')\n elif _alg == 'RSA-OAEP-256':\n jwe_enc_key = _encrypt(cek, key, 'pkcs1_oaep_256_padding')\n elif _alg == 'RSA1_5':\n jwe_enc_key = _encrypt(cek, key)\n else:\n raise NotSupportedAlgorithm(_alg)\n jwe = JWEnc(**self.headers())\n try:\n _auth_data = kwargs['auth_data']\n except KeyError:\n _auth_data = jwe.b64_encode_header()\n ctxt, tag, key = self.enc_setup(_enc, _msg, key=cek, iv=iv, auth_data=\n _auth_data)\n return jwe.pack(parts=[jwe_enc_key, iv, ctxt, tag])\n",
"role": "user"
},
{
"content": "encrypt",
"role": "assistant"
}
] |
def x(self, token, key, cek=None):
if not isinstance(token, JWEnc):
jwe = JWEnc().unpack(token)
else:
jwe = token
self.jwt = jwe.encrypted_key()
jek = jwe.encrypted_key()
_decrypt = RSAEncrypter(self.with_digest).decrypt
_alg = jwe.headers['alg']
if cek:
pass
elif _alg == 'RSA-OAEP':
cek = _decrypt(jek, key, 'pkcs1_oaep_padding')
elif _alg == 'RSA-OAEP-256':
cek = _decrypt(jek, key, 'pkcs1_oaep_256_padding')
elif _alg == 'RSA1_5':
cek = _decrypt(jek, key)
else:
raise NotSupportedAlgorithm(_alg)
self['cek'] = cek
enc = jwe.headers['enc']
if enc not in SUPPORTED['enc']:
raise NotSupportedAlgorithm(enc)
auth_data = jwe.b64_protected_header()
msg = self._decrypt(enc, cek, jwe.ciphertext(), auth_data=auth_data, iv
=jwe.initialization_vector(), tag=jwe.authentication_tag())
if 'zip' in jwe.headers and jwe.headers['zip'] == 'DEF':
msg = zlib.decompress(msg)
return msg
|
decrypt
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, token, key, cek=None):\n if not isinstance(token, JWEnc):\n jwe = JWEnc().unpack(token)\n else:\n jwe = token\n self.jwt = jwe.encrypted_key()\n jek = jwe.encrypted_key()\n _decrypt = RSAEncrypter(self.with_digest).decrypt\n _alg = jwe.headers['alg']\n if cek:\n pass\n elif _alg == 'RSA-OAEP':\n cek = _decrypt(jek, key, 'pkcs1_oaep_padding')\n elif _alg == 'RSA-OAEP-256':\n cek = _decrypt(jek, key, 'pkcs1_oaep_256_padding')\n elif _alg == 'RSA1_5':\n cek = _decrypt(jek, key)\n else:\n raise NotSupportedAlgorithm(_alg)\n self['cek'] = cek\n enc = jwe.headers['enc']\n if enc not in SUPPORTED['enc']:\n raise NotSupportedAlgorithm(enc)\n auth_data = jwe.b64_protected_header()\n msg = self._decrypt(enc, cek, jwe.ciphertext(), auth_data=auth_data, iv\n =jwe.initialization_vector(), tag=jwe.authentication_tag())\n if 'zip' in jwe.headers and jwe.headers['zip'] == 'DEF':\n msg = zlib.decompress(msg)\n return msg\n",
"role": "user"
},
{
"content": "decrypt",
"role": "assistant"
}
] |
def x(self, keys=None, cek='', iv='', **kwargs):
_alg = self['alg']
if keys:
keys = self.pick_keys(keys, use='enc')
else:
keys = self.pick_keys(self._get_keys(), use='enc')
if not keys:
logger.error(KEY_ERR.format(_alg))
raise NoSuitableEncryptionKey(_alg)
if _alg in ['RSA-OAEP', 'RSA-OAEP-256', 'RSA1_5']:
encrypter = JWE_RSA(self.msg, **self._dict)
elif _alg.startswith('A') and _alg.endswith('KW'):
encrypter = JWE_SYM(self.msg, **self._dict)
else:
encrypter = JWE_EC(**self._dict)
cek, encrypted_key, iv, params, eprivk = encrypter.enc_setup(self.
msg, key=keys[0], **self._dict)
kwargs['encrypted_key'] = encrypted_key
kwargs['params'] = params
if cek:
kwargs['cek'] = cek
if iv:
kwargs['iv'] = iv
for key in keys:
if isinstance(key, SYMKey):
_key = key.key
elif isinstance(key, ECKey):
_key = key.public_key()
else:
_key = key.public_key()
if key.kid:
encrypter['kid'] = key.kid
try:
token = encrypter.encrypt(key=_key, **kwargs)
self['cek'] = encrypter.cek if 'cek' in encrypter else None
except TypeError as err:
raise err
else:
logger.debug('Encrypted message using key with kid={}'.format(
key.kid))
return token
|
encrypt
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, keys=None, cek='', iv='', **kwargs):\n _alg = self['alg']\n if keys:\n keys = self.pick_keys(keys, use='enc')\n else:\n keys = self.pick_keys(self._get_keys(), use='enc')\n if not keys:\n logger.error(KEY_ERR.format(_alg))\n raise NoSuitableEncryptionKey(_alg)\n if _alg in ['RSA-OAEP', 'RSA-OAEP-256', 'RSA1_5']:\n encrypter = JWE_RSA(self.msg, **self._dict)\n elif _alg.startswith('A') and _alg.endswith('KW'):\n encrypter = JWE_SYM(self.msg, **self._dict)\n else:\n encrypter = JWE_EC(**self._dict)\n cek, encrypted_key, iv, params, eprivk = encrypter.enc_setup(self.\n msg, key=keys[0], **self._dict)\n kwargs['encrypted_key'] = encrypted_key\n kwargs['params'] = params\n if cek:\n kwargs['cek'] = cek\n if iv:\n kwargs['iv'] = iv\n for key in keys:\n if isinstance(key, SYMKey):\n _key = key.key\n elif isinstance(key, ECKey):\n _key = key.public_key()\n else:\n _key = key.public_key()\n if key.kid:\n encrypter['kid'] = key.kid\n try:\n token = encrypter.encrypt(key=_key, **kwargs)\n self['cek'] = encrypter.cek if 'cek' in encrypter else None\n except TypeError as err:\n raise err\n else:\n logger.debug('Encrypted message using key with kid={}'.format(\n key.kid))\n return token\n",
"role": "user"
},
{
"content": "encrypt",
"role": "assistant"
}
] |
def x(data):
_data = as_bytes(data)
_d = base64.urlsafe_b64decode(_data + b'==')
if [e for e in [b'+', b'/', b'='] if e in _data]:
raise ValueError('Not base64url encoded')
return intarr2long(struct.unpack('%sB' % len(_d), _d))
|
base64url_to_long
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(data):\n _data = as_bytes(data)\n _d = base64.urlsafe_b64decode(_data + b'==')\n if [e for e in [b'+', b'/', b'='] if e in _data]:\n raise ValueError('Not base64url encoded')\n return intarr2long(struct.unpack('%sB' % len(_d), _d))\n",
"role": "user"
},
{
"content": "base64url_to_long",
"role": "assistant"
}
] |
def x(b):
cb = b.rstrip(b'=')
if not _b64_re.match(cb):
raise BadSyntax(cb, 'base64-encoded data contains illegal characters')
if cb == b:
b = add_padding(b)
return base64.urlsafe_b64decode(b)
|
b64d
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(b):\n cb = b.rstrip(b'=')\n if not _b64_re.match(cb):\n raise BadSyntax(cb, 'base64-encoded data contains illegal characters')\n if cb == b:\n b = add_padding(b)\n return base64.urlsafe_b64decode(b)\n",
"role": "user"
},
{
"content": "b64d",
"role": "assistant"
}
] |
def x(val):
if isinstance(val, str):
_val = val.encode('utf-8')
else:
_val = val
return base64_to_long(_val)
|
deser
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(val):\n if isinstance(val, str):\n _val = val.encode('utf-8')\n else:\n _val = val\n return base64_to_long(_val)\n",
"role": "user"
},
{
"content": "deser",
"role": "assistant"
}
] |
def x(self):
res = self.serialize(private=True)
res.update(self.extra_args)
return res
|
to_dict
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n res = self.serialize(private=True)\n res.update(self.extra_args)\n return res\n",
"role": "user"
},
{
"content": "to_dict",
"role": "assistant"
}
] |
def x(self):
res = {'kty': self.kty}
if self.use:
res['use'] = self.use
if self.kid:
res['kid'] = self.kid
if self.alg:
res['alg'] = self.alg
return res
|
common
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n res = {'kty': self.kty}\n if self.use:\n res['use'] = self.use\n if self.kid:\n res['kid'] = self.kid\n if self.alg:\n res['alg'] = self.alg\n return res\n",
"role": "user"
},
{
"content": "common",
"role": "assistant"
}
] |
def x(self):
for param in self.longs:
item = getattr(self, param)
if not item or isinstance(item, str):
continue
if isinstance(item, bytes):
item = item.decode('utf-8')
setattr(self, param, item)
try:
_ = base64url_to_long(item)
except Exception:
return False
else:
if [e for e in ['+', '/', '='] if e in item]:
return False
if self.kid:
if not isinstance(self.kid, str):
raise ValueError('kid of wrong value type')
return True
|
verify
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n for param in self.longs:\n item = getattr(self, param)\n if not item or isinstance(item, str):\n continue\n if isinstance(item, bytes):\n item = item.decode('utf-8')\n setattr(self, param, item)\n try:\n _ = base64url_to_long(item)\n except Exception:\n return False\n else:\n if [e for e in ['+', '/', '='] if e in item]:\n return False\n if self.kid:\n if not isinstance(self.kid, str):\n raise ValueError('kid of wrong value type')\n return True\n",
"role": "user"
},
{
"content": "verify",
"role": "assistant"
}
] |
def x(self, hash_function, members=None):
if members is None:
members = self.required
members.sort()
ser = self.serialize()
_se = []
for elem in members:
try:
_val = ser[elem]
except KeyError:
pass
else:
if isinstance(_val, bytes):
_val = as_unicode(_val)
_se.append('"{}":{}'.format(elem, json.dumps(_val)))
_json = '{{{}}}'.format(','.join(_se))
return b64e(DIGEST_HASH[hash_function](_json))
|
thumbprint
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, hash_function, members=None):\n if members is None:\n members = self.required\n members.sort()\n ser = self.serialize()\n _se = []\n for elem in members:\n try:\n _val = ser[elem]\n except KeyError:\n pass\n else:\n if isinstance(_val, bytes):\n _val = as_unicode(_val)\n _se.append('\"{}\":{}'.format(elem, json.dumps(_val)))\n _json = '{{{}}}'.format(','.join(_se))\n return b64e(DIGEST_HASH[hash_function](_json))\n",
"role": "user"
},
{
"content": "thumbprint",
"role": "assistant"
}
] |
def x(secret, dk_len, other_info):
dkm = b''
dk_bytes = int(ceil(dk_len / 8.0))
counter = 0
while len(dkm) < dk_bytes:
counter += 1
counter_bytes = struct.pack('!I', counter)
digest = hashes.Hash(hashes.SHA256(), backend=default_backend())
digest.update(counter_bytes)
digest.update(secret)
digest.update(other_info)
dkm += digest.finalize()
return dkm[:dk_bytes]
|
concat_sha256
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(secret, dk_len, other_info):\n dkm = b''\n dk_bytes = int(ceil(dk_len / 8.0))\n counter = 0\n while len(dkm) < dk_bytes:\n counter += 1\n counter_bytes = struct.pack('!I', counter)\n digest = hashes.Hash(hashes.SHA256(), backend=default_backend())\n digest.update(counter_bytes)\n digest.update(secret)\n digest.update(other_info)\n dkm += digest.finalize()\n return dkm[:dk_bytes]\n",
"role": "user"
},
{
"content": "concat_sha256",
"role": "assistant"
}
] |
def x(self, keys, use='', alg=''):
if not alg:
alg = self['alg']
if alg == 'none':
return []
_k = self.alg2keytype(alg)
if _k is None:
logger.error("Unknown algorithm '%s'" % alg)
raise ValueError('Unknown cryptography algorithm')
logger.debug('Picking key by key type={0}'.format(_k))
_kty = [_k.lower(), _k.upper(), _k.lower().encode('utf-8'), _k.upper().
encode('utf-8')]
_keys = [k for k in keys if k.kty in _kty]
try:
_kid = self['kid']
except KeyError:
try:
_kid = self.jwt.headers['kid']
except (AttributeError, KeyError):
_kid = None
logger.debug('Picking key based on alg={0}, kid={1} and use={2}'.format
(alg, _kid, use))
pkey = []
for _key in _keys:
logger.debug('Picked: kid:{}, use:{}, kty:{}'.format(_key.kid, _key
.use, _key.kty))
if _kid:
if _kid != _key.kid:
continue
if use and _key.use and _key.use != use:
continue
if alg and _key.alg and _key.alg != alg:
continue
pkey.append(_key)
return pkey
|
pick_keys
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, keys, use='', alg=''):\n if not alg:\n alg = self['alg']\n if alg == 'none':\n return []\n _k = self.alg2keytype(alg)\n if _k is None:\n logger.error(\"Unknown algorithm '%s'\" % alg)\n raise ValueError('Unknown cryptography algorithm')\n logger.debug('Picking key by key type={0}'.format(_k))\n _kty = [_k.lower(), _k.upper(), _k.lower().encode('utf-8'), _k.upper().\n encode('utf-8')]\n _keys = [k for k in keys if k.kty in _kty]\n try:\n _kid = self['kid']\n except KeyError:\n try:\n _kid = self.jwt.headers['kid']\n except (AttributeError, KeyError):\n _kid = None\n logger.debug('Picking key based on alg={0}, kid={1} and use={2}'.format\n (alg, _kid, use))\n pkey = []\n for _key in _keys:\n logger.debug('Picked: kid:{}, use:{}, kty:{}'.format(_key.kid, _key\n .use, _key.kty))\n if _kid:\n if _kid != _key.kid:\n continue\n if use and _key.use and _key.use != use:\n continue\n if alg and _key.alg and _key.alg != alg:\n continue\n pkey.append(_key)\n return pkey\n",
"role": "user"
},
{
"content": "pick_keys",
"role": "assistant"
}
] |
def x(self):
self._add_result = Sensor.float('add.result', 'Last ?add result.', '',
[-10000, 10000])
self._add_result.set_value(0, Sensor.UNREACHABLE)
self._time_result = Sensor.timestamp('time.result',
'Last ?time result.', '')
self._time_result.set_value(0, Sensor.INACTIVE)
self._eval_result = Sensor.string('eval.result', 'Last ?eval result.', '')
self._eval_result.set_value('', Sensor.UNKNOWN)
self._fruit_result = Sensor.discrete('fruit.result',
'Last ?pick-fruit result.', '', self.FRUIT)
self._fruit_result.set_value('apple', Sensor.ERROR)
self.add_sensor(self._add_result)
self.add_sensor(self._time_result)
self.add_sensor(self._eval_result)
self.add_sensor(self._fruit_result)
|
setup_sensors
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n self._add_result = Sensor.float('add.result', 'Last ?add result.', '',\n [-10000, 10000])\n self._add_result.set_value(0, Sensor.UNREACHABLE)\n self._time_result = Sensor.timestamp('time.result',\n 'Last ?time result.', '')\n self._time_result.set_value(0, Sensor.INACTIVE)\n self._eval_result = Sensor.string('eval.result', 'Last ?eval result.', '')\n self._eval_result.set_value('', Sensor.UNKNOWN)\n self._fruit_result = Sensor.discrete('fruit.result',\n 'Last ?pick-fruit result.', '', self.FRUIT)\n self._fruit_result.set_value('apple', Sensor.ERROR)\n self.add_sensor(self._add_result)\n self.add_sensor(self._time_result)\n self.add_sensor(self._eval_result)\n self.add_sensor(self._fruit_result)\n",
"role": "user"
},
{
"content": "setup_sensors",
"role": "assistant"
}
] |
def x(self, req, x, y):
r = x + y
self._add_result.set_value(r)
return 'ok', r
|
request_add
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, req, x, y):\n r = x + y\n self._add_result.set_value(r)\n return 'ok', r\n",
"role": "user"
},
{
"content": "request_add",
"role": "assistant"
}
] |
def x(self, req):
r = time.time()
self._time_result.set_value(r)
return 'ok', r
|
request_time
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, req):\n r = time.time()\n self._time_result.set_value(r)\n return 'ok', r\n",
"role": "user"
},
{
"content": "request_time",
"role": "assistant"
}
] |
def x(self, req, expression):
r = str(eval(expression))
self._eval_result.set_value(r)
return 'ok', r
|
request_eval
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, req, expression):\n r = str(eval(expression))\n self._eval_result.set_value(r)\n return 'ok', r\n",
"role": "user"
},
{
"content": "request_eval",
"role": "assistant"
}
] |
def x(self, req):
r = random.choice(self.FRUIT + [None])
if r is None:
return 'fail', 'No fruit.'
delay = random.randrange(1, 5)
req.inform('Picking will take %d seconds' % delay)
def x():
self._fruit_result.set_value(r)
req.reply('ok', r)
handle_timer = threading.Timer(delay, pick_handler)
handle_timer.start()
raise AsyncReply
|
request_pick_fruit
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, req):\n r = random.choice(self.FRUIT + [None])\n if r is None:\n return 'fail', 'No fruit.'\n delay = random.randrange(1, 5)\n req.inform('Picking will take %d seconds' % delay)\n\n def x():\n self._fruit_result.set_value(r)\n req.reply('ok', r)\n handle_timer = threading.Timer(delay, pick_handler)\n handle_timer.start()\n raise AsyncReply\n",
"role": "user"
},
{
"content": "request_pick_fruit",
"role": "assistant"
}
] |
def x(self, req, sensor_name):
sensor = self.get_sensor(sensor_name)
ts, status, value = sensor.read()
sensor.set_value(value, sensor.INACTIVE, ts)
return 'ok',
|
request_set_sensor_inactive
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, req, sensor_name):\n sensor = self.get_sensor(sensor_name)\n ts, status, value = sensor.read()\n sensor.set_value(value, sensor.INACTIVE, ts)\n return 'ok',\n",
"role": "user"
},
{
"content": "request_set_sensor_inactive",
"role": "assistant"
}
] |
def x(self, req, sensor_name):
sensor = self.get_sensor(sensor_name)
ts, status, value = sensor.read()
sensor.set_value(value, sensor.UNREACHABLE, ts)
return 'ok',
|
request_set_sensor_unreachable
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, req, sensor_name):\n sensor = self.get_sensor(sensor_name)\n ts, status, value = sensor.read()\n sensor.set_value(value, sensor.UNREACHABLE, ts)\n return 'ok',\n",
"role": "user"
},
{
"content": "request_set_sensor_unreachable",
"role": "assistant"
}
] |
def x(self, req, msg):
reversed_args = msg.arguments[::-1]
return req.make_reply(*reversed_args)
|
request_raw_reverse
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, req, msg):\n reversed_args = msg.arguments[::-1]\n return req.make_reply(*reversed_args)\n",
"role": "user"
},
{
"content": "request_raw_reverse",
"role": "assistant"
}
] |
def x(transformation, future):
new_future = tornado_Future()
def x(f):
assert f is future
if f.exc_info() is not None:
new_future.set_exc_info(f.exc_info())
else:
try:
new_future.set_result(transformation(f.result()))
except Exception:
new_future.set_exc_info(sys.exc_info())
future.add_done_callback(_transform)
return new_future
|
transform_future
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(transformation, future):\n new_future = tornado_Future()\n\n def x(f):\n assert f is future\n if f.exc_info() is not None:\n new_future.set_exc_info(f.exc_info())\n else:\n try:\n new_future.set_result(transformation(f.result()))\n except Exception:\n new_future.set_exc_info(sys.exc_info())\n future.add_done_callback(_transform)\n return new_future\n",
"role": "user"
},
{
"content": "transform_future",
"role": "assistant"
}
] |
def x(parent_class, sensor_items, filter, strategy, status,
use_python_identifiers, tuple, refresh):
filter_re = re.compile(filter)
found_sensors = []
none_strat = resource.normalize_strategy_parameters('none')
sensor_dict = dict(sensor_items)
for sensor_identifier in sorted(sensor_dict.keys()):
sensor_obj = sensor_dict[sensor_identifier]
search_name = (sensor_identifier if use_python_identifiers else
sensor_obj.name)
name_match = filter_re.search(search_name)
strat_match = (not strategy or sensor_obj.sampling_strategy !=
none_strat)
if name_match and strat_match:
if refresh:
yield sensor_obj.get_value()
prefix = ''
if isinstance(parent_class, KATCPClientResourceContainer):
if sensor_obj.name.startswith('agg_'):
prefix = ''
else:
prefix = sensor_obj.parent_name + '.'
if not status or sensor_obj.reading.status in status:
if tuple:
found_sensors.append((prefix + sensor_obj.name,
sensor_obj.reading.value, sensor_obj.reading.
timestamp, sensor_obj.type, sensor_obj.units,
sensor_obj.reading.received_timestamp, sensor_obj.
reading.status, sensor_obj.sampling_strategy))
else:
found_sensors.append(resource.SensorResultTuple(object=
sensor_obj, name=prefix + sensor_obj.name,
python_identifier=sensor_identifier, description=
sensor_obj.description, units=sensor_obj.units,
type=sensor_obj.type, reading=sensor_obj.reading))
raise tornado.gen.Return(found_sensors)
|
list_sensors
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(parent_class, sensor_items, filter, strategy, status,\n use_python_identifiers, tuple, refresh):\n filter_re = re.compile(filter)\n found_sensors = []\n none_strat = resource.normalize_strategy_parameters('none')\n sensor_dict = dict(sensor_items)\n for sensor_identifier in sorted(sensor_dict.keys()):\n sensor_obj = sensor_dict[sensor_identifier]\n search_name = (sensor_identifier if use_python_identifiers else\n sensor_obj.name)\n name_match = filter_re.search(search_name)\n strat_match = (not strategy or sensor_obj.sampling_strategy !=\n none_strat)\n if name_match and strat_match:\n if refresh:\n yield sensor_obj.get_value()\n prefix = ''\n if isinstance(parent_class, KATCPClientResourceContainer):\n if sensor_obj.name.startswith('agg_'):\n prefix = ''\n else:\n prefix = sensor_obj.parent_name + '.'\n if not status or sensor_obj.reading.status in status:\n if tuple:\n found_sensors.append((prefix + sensor_obj.name,\n sensor_obj.reading.value, sensor_obj.reading.\n timestamp, sensor_obj.type, sensor_obj.units,\n sensor_obj.reading.received_timestamp, sensor_obj.\n reading.status, sensor_obj.sampling_strategy))\n else:\n found_sensors.append(resource.SensorResultTuple(object=\n sensor_obj, name=prefix + sensor_obj.name,\n python_identifier=sensor_identifier, description=\n sensor_obj.description, units=sensor_obj.units,\n type=sensor_obj.type, reading=sensor_obj.reading))\n raise tornado.gen.Return(found_sensors)\n",
"role": "user"
},
{
"content": "list_sensors",
"role": "assistant"
}
] |
def x(resource, callback, exit_event=None):
exit_event = exit_event or AsyncEvent()
callback(False)
while not exit_event.is_set():
yield until_any(resource.until_synced(), exit_event.until_set())
if exit_event.is_set():
break
else:
callback(True)
yield until_any(resource.until_not_synced(), exit_event.until_set())
if exit_event.is_set():
break
else:
callback(False)
|
monitor_resource_sync_state
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(resource, callback, exit_event=None):\n exit_event = exit_event or AsyncEvent()\n callback(False)\n while not exit_event.is_set():\n yield until_any(resource.until_synced(), exit_event.until_set())\n if exit_event.is_set():\n break\n else:\n callback(True)\n yield until_any(resource.until_not_synced(), exit_event.until_set())\n if exit_event.is_set():\n break\n else:\n callback(False)\n",
"role": "user"
},
{
"content": "monitor_resource_sync_state",
"role": "assistant"
}
] |
def x(self, request, *args, **kwargs):
f = tornado_Future()
try:
use_mid = kwargs.get('use_mid')
timeout = kwargs.get('timeout')
mid = kwargs.get('mid')
msg = Message.request(request, *args, mid=mid)
except Exception:
f.set_exc_info(sys.exc_info())
return f
return transform_future(self.reply_wrapper, self.katcp_client.
future_request(msg, timeout, use_mid))
|
wrapped_request
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, request, *args, **kwargs):\n f = tornado_Future()\n try:\n use_mid = kwargs.get('use_mid')\n timeout = kwargs.get('timeout')\n mid = kwargs.get('mid')\n msg = Message.request(request, *args, mid=mid)\n except Exception:\n f.set_exc_info(sys.exc_info())\n return f\n return transform_future(self.reply_wrapper, self.katcp_client.\n future_request(msg, timeout, use_mid))\n",
"role": "user"
},
{
"content": "wrapped_request",
"role": "assistant"
}
] |
def x(self, state, timeout=None):
return self._state.until_state(state, timeout=timeout)
|
until_state
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, state, timeout=None):\n return self._state.until_state(state, timeout=timeout)\n",
"role": "user"
},
{
"content": "until_state",
"role": "assistant"
}
] |
def x(self):
host, port = self.address
ic = self._inspecting_client = self.inspecting_client_factory(host,
port, self._ioloop_set_to)
self.ioloop = ic.ioloop
if self._preset_protocol_flags:
ic.preset_protocol_flags(self._preset_protocol_flags)
ic.katcp_client.auto_reconnect_delay = self.auto_reconnect_delay
ic.set_state_callback(self._inspecting_client_state_callback)
ic.request_factory = self._request_factory
self._sensor_manager = KATCPClientResourceSensorsManager(ic, self.name,
logger=self._logger)
ic.handle_sensor_value()
ic.sensor_factory = self._sensor_manager.sensor_factory
self.reapply_sampling_strategies = (self._sensor_manager.
reapply_sampling_strategies)
log_future_exceptions(self._logger, ic.connect())
|
start
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n host, port = self.address\n ic = self._inspecting_client = self.inspecting_client_factory(host,\n port, self._ioloop_set_to)\n self.ioloop = ic.ioloop\n if self._preset_protocol_flags:\n ic.preset_protocol_flags(self._preset_protocol_flags)\n ic.katcp_client.auto_reconnect_delay = self.auto_reconnect_delay\n ic.set_state_callback(self._inspecting_client_state_callback)\n ic.request_factory = self._request_factory\n self._sensor_manager = KATCPClientResourceSensorsManager(ic, self.name,\n logger=self._logger)\n ic.handle_sensor_value()\n ic.sensor_factory = self._sensor_manager.sensor_factory\n self.reapply_sampling_strategies = (self._sensor_manager.\n reapply_sampling_strategies)\n log_future_exceptions(self._logger, ic.connect())\n",
"role": "user"
},
{
"content": "start",
"role": "assistant"
}
] |
def x(self, host, port, ioloop_set_to):
return ReplyWrappedInspectingClientAsync(host, port, ioloop=
ioloop_set_to, auto_reconnect=self.auto_reconnect)
|
inspecting_client_factory
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, host, port, ioloop_set_to):\n return ReplyWrappedInspectingClientAsync(host, port, ioloop=\n ioloop_set_to, auto_reconnect=self.auto_reconnect)\n",
"role": "user"
},
{
"content": "inspecting_client_factory",
"role": "assistant"
}
] |
def x(self, timeout=None):
not_synced_states = [state for state in self._state.valid_states if
state != 'synced']
not_synced_futures = [self._state.until_state(state) for state in
not_synced_states]
return until_any(*not_synced_futures, timeout=timeout)
|
until_not_synced
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, timeout=None):\n not_synced_states = [state for state in self._state.valid_states if \n state != 'synced']\n not_synced_futures = [self._state.until_state(state) for state in\n not_synced_states]\n return until_any(*not_synced_futures, timeout=timeout)\n",
"role": "user"
},
{
"content": "until_not_synced",
"role": "assistant"
}
] |
def x(self, filter, strategy_and_parms):
sensor_list = yield self.list_sensors(filter=filter)
sensor_dict = {}
for sens in sensor_list:
try:
sensor_name = sens.object.normalised_name
yield self.set_sampling_strategy(sensor_name, strategy_and_parms)
sensor_dict[sensor_name] = strategy_and_parms
except Exception as exc:
self._logger.exception(
'Unhandled exception trying to set sensor strategies {!r} for {} ({})'
.format(strategy_and_parms, sens, exc))
sensor_dict[sensor_name] = None
raise tornado.gen.Return(sensor_dict)
|
set_sampling_strategies
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, filter, strategy_and_parms):\n sensor_list = yield self.list_sensors(filter=filter)\n sensor_dict = {}\n for sens in sensor_list:\n try:\n sensor_name = sens.object.normalised_name\n yield self.set_sampling_strategy(sensor_name, strategy_and_parms)\n sensor_dict[sensor_name] = strategy_and_parms\n except Exception as exc:\n self._logger.exception(\n 'Unhandled exception trying to set sensor strategies {!r} for {} ({})'\n .format(strategy_and_parms, sens, exc))\n sensor_dict[sensor_name] = None\n raise tornado.gen.Return(sensor_dict)\n",
"role": "user"
},
{
"content": "set_sampling_strategies",
"role": "assistant"
}
] |
def x(self, sensor_name, strategy_and_parms):
sensor_name = resource.escape_name(sensor_name)
sensor_obj = dict.get(self._sensor, sensor_name)
self._sensor_strategy_cache[sensor_name] = strategy_and_parms
sensor_dict = {}
self._logger.debug('Cached strategy {} for sensor {}'.format(
strategy_and_parms, sensor_name))
if sensor_obj:
try:
yield sensor_obj.set_sampling_strategy(strategy_and_parms)
sensor_dict[sensor_name] = strategy_and_parms
except Exception as exc:
self._logger.exception(
'Unhandled exception trying to set sensor strategy {!r} for sensor {} ({})'
.format(strategy_and_parms, sensor_name, exc))
sensor_dict[sensor_name] = str(exc)
raise tornado.gen.Return(sensor_dict)
|
set_sampling_strategy
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, sensor_name, strategy_and_parms):\n sensor_name = resource.escape_name(sensor_name)\n sensor_obj = dict.get(self._sensor, sensor_name)\n self._sensor_strategy_cache[sensor_name] = strategy_and_parms\n sensor_dict = {}\n self._logger.debug('Cached strategy {} for sensor {}'.format(\n strategy_and_parms, sensor_name))\n if sensor_obj:\n try:\n yield sensor_obj.set_sampling_strategy(strategy_and_parms)\n sensor_dict[sensor_name] = strategy_and_parms\n except Exception as exc:\n self._logger.exception(\n 'Unhandled exception trying to set sensor strategy {!r} for sensor {} ({})'\n .format(strategy_and_parms, sensor_name, exc))\n sensor_dict[sensor_name] = str(exc)\n raise tornado.gen.Return(sensor_dict)\n",
"role": "user"
},
{
"content": "set_sampling_strategy",
"role": "assistant"
}
] |
def x(self, sensor_name):
sensor_name = resource.escape_name(sensor_name)
self._sensor_strategy_cache.pop(sensor_name, None)
self._sensor_manager.drop_sampling_strategy(sensor_name)
|
drop_sampling_strategy
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, sensor_name):\n sensor_name = resource.escape_name(sensor_name)\n self._sensor_strategy_cache.pop(sensor_name, None)\n self._sensor_manager.drop_sampling_strategy(sensor_name)\n",
"role": "user"
},
{
"content": "drop_sampling_strategy",
"role": "assistant"
}
] |
def x(self, sensor_name, listener):
sensor_name = resource.escape_name(sensor_name)
sensor_obj = dict.get(self._sensor, sensor_name)
self._sensor_listener_cache[sensor_name].append(listener)
sensor_dict = {}
self._logger.debug('Cached listener {} for sensor {}'.format(listener,
sensor_name))
if sensor_obj:
try:
sensor_obj.register_listener(listener, reading=True)
sensor_dict[sensor_name] = listener
self._logger.debug('Registered listener {} for sensor {}'.
format(listener, sensor_name))
except Exception as exc:
self._logger.exception(
'Unhandled exception trying to set sensor listener {} for sensor {} ({})'
.format(listener, sensor_name, exc))
sensor_dict[sensor_name] = str(exc)
raise tornado.gen.Return(sensor_dict)
|
set_sensor_listener
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, sensor_name, listener):\n sensor_name = resource.escape_name(sensor_name)\n sensor_obj = dict.get(self._sensor, sensor_name)\n self._sensor_listener_cache[sensor_name].append(listener)\n sensor_dict = {}\n self._logger.debug('Cached listener {} for sensor {}'.format(listener,\n sensor_name))\n if sensor_obj:\n try:\n sensor_obj.register_listener(listener, reading=True)\n sensor_dict[sensor_name] = listener\n self._logger.debug('Registered listener {} for sensor {}'.\n format(listener, sensor_name))\n except Exception as exc:\n self._logger.exception(\n 'Unhandled exception trying to set sensor listener {} for sensor {} ({})'\n .format(listener, sensor_name, exc))\n sensor_dict[sensor_name] = str(exc)\n raise tornado.gen.Return(sensor_dict)\n",
"role": "user"
},
{
"content": "set_sensor_listener",
"role": "assistant"
}
] |
def x(self, sensor_name):
if sensor_name in self._strategy_cache:
return sensor_name
else:
escaped_name = resource.escape_name(sensor_name)
for key in self._strategy_cache:
escaped_key = resource.escape_name(key)
if escaped_key == escaped_name:
return key
return sensor_name
|
get_strategy_cache_key
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, sensor_name):\n if sensor_name in self._strategy_cache:\n return sensor_name\n else:\n escaped_name = resource.escape_name(sensor_name)\n for key in self._strategy_cache:\n escaped_key = resource.escape_name(key)\n if escaped_key == escaped_name:\n return key\n return sensor_name\n",
"role": "user"
},
{
"content": "get_strategy_cache_key",
"role": "assistant"
}
] |
def x(self, sensor_name):
cache_key = self._get_strategy_cache_key(sensor_name)
cached = self._strategy_cache.get(cache_key)
if not cached:
return resource.normalize_strategy_parameters('none')
else:
return cached
|
get_sampling_strategy
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, sensor_name):\n cache_key = self._get_strategy_cache_key(sensor_name)\n cached = self._strategy_cache.get(cache_key)\n if not cached:\n return resource.normalize_strategy_parameters('none')\n else:\n return cached\n",
"role": "user"
},
{
"content": "get_sampling_strategy",
"role": "assistant"
}
] |
def x(self, sensor_name, strategy_and_params):
try:
strategy_and_params = resource.normalize_strategy_parameters(
strategy_and_params)
self._strategy_cache[sensor_name] = strategy_and_params
reply = yield self._inspecting_client.wrapped_request('sensor-sampling'
, sensor_name, *strategy_and_params)
if not reply.succeeded:
raise KATCPSensorError(
'Error setting strategy for sensor {0}: \n{1!s}'.format(
sensor_name, reply))
sensor_strategy = True, strategy_and_params
except Exception as e:
self._logger.exception('Exception found!')
sensor_strategy = False, str(e)
raise tornado.gen.Return(sensor_strategy)
|
set_sampling_strategy
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, sensor_name, strategy_and_params):\n try:\n strategy_and_params = resource.normalize_strategy_parameters(\n strategy_and_params)\n self._strategy_cache[sensor_name] = strategy_and_params\n reply = yield self._inspecting_client.wrapped_request('sensor-sampling'\n , sensor_name, *strategy_and_params)\n if not reply.succeeded:\n raise KATCPSensorError(\n 'Error setting strategy for sensor {0}: \\n{1!s}'.format(\n sensor_name, reply))\n sensor_strategy = True, strategy_and_params\n except Exception as e:\n self._logger.exception('Exception found!')\n sensor_strategy = False, str(e)\n raise tornado.gen.Return(sensor_strategy)\n",
"role": "user"
},
{
"content": "set_sampling_strategy",
"role": "assistant"
}
] |
def x(self, sensor_name):
cache_key = self._get_strategy_cache_key(sensor_name)
self._strategy_cache.pop(cache_key, None)
|
drop_sampling_strategy
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, sensor_name):\n cache_key = self._get_strategy_cache_key(sensor_name)\n self._strategy_cache.pop(cache_key, None)\n",
"role": "user"
},
{
"content": "drop_sampling_strategy",
"role": "assistant"
}
] |
def x(self):
check_sensor = self._inspecting_client.future_check_sensor
for sensor_name, strategy in list(self._strategy_cache.items()):
try:
sensor_exists = yield check_sensor(sensor_name)
if not sensor_exists:
self._logger.warn(
'Did not set strategy for non-existing sensor {}'.
format(sensor_name))
continue
result = yield self.set_sampling_strategy(sensor_name, strategy)
except KATCPSensorError as e:
self._logger.error(
'Error reapplying strategy for sensor {0}: {1!s}'.format(
sensor_name, e))
except Exception:
self._logger.exception(
'Unhandled exception reapplying strategy for sensor {}'.
format(sensor_name), exc_info=True)
|
reapply_sampling_strategies
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n check_sensor = self._inspecting_client.future_check_sensor\n for sensor_name, strategy in list(self._strategy_cache.items()):\n try:\n sensor_exists = yield check_sensor(sensor_name)\n if not sensor_exists:\n self._logger.warn(\n 'Did not set strategy for non-existing sensor {}'.\n format(sensor_name))\n continue\n result = yield self.set_sampling_strategy(sensor_name, strategy)\n except KATCPSensorError as e:\n self._logger.error(\n 'Error reapplying strategy for sensor {0}: {1!s}'.format(\n sensor_name, e))\n except Exception:\n self._logger.exception(\n 'Unhandled exception reapplying strategy for sensor {}'.\n format(sensor_name), exc_info=True)\n",
"role": "user"
},
{
"content": "reapply_sampling_strategies",
"role": "assistant"
}
] |
def x(self, *args, **kwargs):
timeout = kwargs.pop('timeout', None)
if timeout is None:
timeout = self.timeout_hint
kwargs['timeout'] = timeout
return self._client.wrapped_request(self.name, *args, **kwargs)
|
issue_request
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, *args, **kwargs):\n timeout = kwargs.pop('timeout', None)\n if timeout is None:\n timeout = self.timeout_hint\n kwargs['timeout'] = timeout\n return self._client.wrapped_request(self.name, *args, **kwargs)\n",
"role": "user"
},
{
"content": "issue_request",
"role": "assistant"
}
] |
def x(self, filter, strategy_and_params):
futures_dict = {}
for res_obj in self.clients:
futures_dict[res_obj.name] = res_obj.set_sampling_strategies(filter,
strategy_and_params)
sensors_strategies = yield futures_dict
raise tornado.gen.Return(sensors_strategies)
|
set_sampling_strategies
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, filter, strategy_and_params):\n futures_dict = {}\n for res_obj in self.clients:\n futures_dict[res_obj.name] = res_obj.set_sampling_strategies(filter,\n strategy_and_params)\n sensors_strategies = yield futures_dict\n raise tornado.gen.Return(sensors_strategies)\n",
"role": "user"
},
{
"content": "set_sampling_strategies",
"role": "assistant"
}
] |
def x(self, sensor_name, strategy_and_params):
futures_dict = {}
for res_obj in self.clients:
futures_dict[res_obj.name] = res_obj.set_sampling_strategy(sensor_name,
strategy_and_params)
sensors_strategies = yield futures_dict
raise tornado.gen.Return(sensors_strategies)
|
set_sampling_strategy
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, sensor_name, strategy_and_params):\n futures_dict = {}\n for res_obj in self.clients:\n futures_dict[res_obj.name] = res_obj.set_sampling_strategy(sensor_name,\n strategy_and_params)\n sensors_strategies = yield futures_dict\n raise tornado.gen.Return(sensors_strategies)\n",
"role": "user"
},
{
"content": "set_sampling_strategy",
"role": "assistant"
}
] |
def x(self, sensor_name, condition_or_value, timeout=5.0, quorum=None,
max_grace_period=1.0):
if quorum is None:
quorum = len(self.clients)
elif quorum > 1:
if not isinstance(quorum, int):
raise TypeError(
'Quorum parameter %r must be an integer if outside range [0, 1]'
% (quorum,))
elif isinstance(quorum, float):
quorum = int(math.ceil(quorum * len(self.clients)))
if timeout and max_grace_period:
grace_period = min(max_grace_period, timeout / 2.0)
initial_timeout = timeout - grace_period
else:
grace_period = max_grace_period
initial_timeout = timeout
futures = {}
for client in self.clients:
f = client.wait(sensor_name, condition_or_value, initial_timeout)
futures[client.name] = f
initial_results = yield until_some(done_at_least=quorum, **futures)
results = dict(initial_results)
stragglers = {}
for client in self.clients:
if not results.get(client.name, False):
f = client.wait(sensor_name, condition_or_value, grace_period)
stragglers[client.name] = f
rest_of_results = yield until_some(**stragglers)
results.update(dict(rest_of_results))
class TestableDict(dict):
"""Dictionary of results that can be tested for overall success."""
def x(self):
return sum(self.values()) >= quorum
if sys.version_info[0] == 2:
__nonzero__ = __bool__
raise tornado.gen.Return(TestableDict(results))
|
wait
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, sensor_name, condition_or_value, timeout=5.0, quorum=None,\n max_grace_period=1.0):\n if quorum is None:\n quorum = len(self.clients)\n elif quorum > 1:\n if not isinstance(quorum, int):\n raise TypeError(\n 'Quorum parameter %r must be an integer if outside range [0, 1]'\n % (quorum,))\n elif isinstance(quorum, float):\n quorum = int(math.ceil(quorum * len(self.clients)))\n if timeout and max_grace_period:\n grace_period = min(max_grace_period, timeout / 2.0)\n initial_timeout = timeout - grace_period\n else:\n grace_period = max_grace_period\n initial_timeout = timeout\n futures = {}\n for client in self.clients:\n f = client.wait(sensor_name, condition_or_value, initial_timeout)\n futures[client.name] = f\n initial_results = yield until_some(done_at_least=quorum, **futures)\n results = dict(initial_results)\n stragglers = {}\n for client in self.clients:\n if not results.get(client.name, False):\n f = client.wait(sensor_name, condition_or_value, grace_period)\n stragglers[client.name] = f\n rest_of_results = yield until_some(**stragglers)\n results.update(dict(rest_of_results))\n\n\n class TestableDict(dict):\n \"\"\"Dictionary of results that can be tested for overall success.\"\"\"\n\n def x(self):\n return sum(self.values()) >= quorum\n if sys.version_info[0] == 2:\n __nonzero__ = __bool__\n raise tornado.gen.Return(TestableDict(results))\n",
"role": "user"
},
{
"content": "wait",
"role": "assistant"
}
] |
def x(self, res_spec, parent, logger):
return KATCPClientResource(res_spec, parent=self, logger=logger)
|
client_resource_factory
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, res_spec, parent, logger):\n return KATCPClientResource(res_spec, parent=self, logger=logger)\n",
"role": "user"
},
{
"content": "client_resource_factory",
"role": "assistant"
}
] |
def x(self, group_name, group_client_names):
group_configs = self._resources_spec.get('groups', {})
group_configs[group_name] = group_client_names
self._resources_spec['groups'] = group_configs
self._init_groups()
|
add_group
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, group_name, group_client_names):\n group_configs = self._resources_spec.get('groups', {})\n group_configs[group_name] = group_client_names\n self._resources_spec['groups'] = group_configs\n self._init_groups()\n",
"role": "user"
},
{
"content": "add_group",
"role": "assistant"
}
] |
def x(self, ioloop=None):
ioloop = ioloop or tornado.ioloop.IOLoop.current()
self.ioloop = ioloop
for res in dict.values(self.children):
res.set_ioloop(ioloop)
|
set_ioloop
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, ioloop=None):\n ioloop = ioloop or tornado.ioloop.IOLoop.current()\n self.ioloop = ioloop\n for res in dict.values(self.children):\n res.set_ioloop(ioloop)\n",
"role": "user"
},
{
"content": "set_ioloop",
"role": "assistant"
}
] |
def x(self):
return all([r.is_connected() for r in dict.values(self.children)])
|
is_connected
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n return all([r.is_connected() for r in dict.values(self.children)])\n",
"role": "user"
},
{
"content": "is_connected",
"role": "assistant"
}
] |
def x(self, timeout=None):
futures = [r.until_synced(timeout) for r in dict.values(self.children)]
yield tornado.gen.multi(futures, quiet_exceptions=tornado.gen.TimeoutError)
|
until_synced
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, timeout=None):\n futures = [r.until_synced(timeout) for r in dict.values(self.children)]\n yield tornado.gen.multi(futures, quiet_exceptions=tornado.gen.TimeoutError)\n",
"role": "user"
},
{
"content": "until_synced",
"role": "assistant"
}
] |
def x(self, timeout=None):
yield until_any(*[r.until_not_synced() for r in dict.values(self.
children)], timeout=timeout)
|
until_not_synced
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, timeout=None):\n yield until_any(*[r.until_not_synced() for r in dict.values(self.\n children)], timeout=timeout)\n",
"role": "user"
},
{
"content": "until_not_synced",
"role": "assistant"
}
] |
def x(self, state, timeout=None):
return until_any(*[r.until_state(state) for r in dict.values(self.
children)], timeout=timeout)
|
until_any_child_in_state
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, state, timeout=None):\n return until_any(*[r.until_state(state) for r in dict.values(self.\n children)], timeout=timeout)\n",
"role": "user"
},
{
"content": "until_any_child_in_state",
"role": "assistant"
}
] |
def x(self, state, timeout=None):
futures = [r.until_state(state, timeout=timeout) for r in dict.values(
self.children)]
yield tornado.gen.multi(futures, quiet_exceptions=tornado.gen.TimeoutError)
|
until_all_children_in_state
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, state, timeout=None):\n futures = [r.until_state(state, timeout=timeout) for r in dict.values(\n self.children)]\n yield tornado.gen.multi(futures, quiet_exceptions=tornado.gen.TimeoutError)\n",
"role": "user"
},
{
"content": "until_all_children_in_state",
"role": "assistant"
}
] |
def x(self, filter, strategy_and_parms):
result_list = yield self.list_sensors(filter=filter)
sensor_dict = {}
for result in result_list:
sensor_name = result.object.normalised_name
resource_name = result.object.parent_name
if resource_name not in sensor_dict:
sensor_dict[resource_name] = {}
try:
resource_obj = self.children[resource_name]
yield resource_obj.set_sampling_strategy(sensor_name,
strategy_and_parms)
sensor_dict[resource_name][sensor_name] = strategy_and_parms
self._logger.debug(
'Set sampling strategy on resource %s for %s' % (
resource_name, sensor_name))
except Exception as exc:
self._logger.error(
'Cannot set sampling strategy on resource %s for %s (%s)' %
(resource_name, sensor_name, exc))
sensor_dict[resource_name][sensor_name] = None
raise tornado.gen.Return(sensor_dict)
|
set_sampling_strategies
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, filter, strategy_and_parms):\n result_list = yield self.list_sensors(filter=filter)\n sensor_dict = {}\n for result in result_list:\n sensor_name = result.object.normalised_name\n resource_name = result.object.parent_name\n if resource_name not in sensor_dict:\n sensor_dict[resource_name] = {}\n try:\n resource_obj = self.children[resource_name]\n yield resource_obj.set_sampling_strategy(sensor_name,\n strategy_and_parms)\n sensor_dict[resource_name][sensor_name] = strategy_and_parms\n self._logger.debug(\n 'Set sampling strategy on resource %s for %s' % (\n resource_name, sensor_name))\n except Exception as exc:\n self._logger.error(\n 'Cannot set sampling strategy on resource %s for %s (%s)' %\n (resource_name, sensor_name, exc))\n sensor_dict[resource_name][sensor_name] = None\n raise tornado.gen.Return(sensor_dict)\n",
"role": "user"
},
{
"content": "set_sampling_strategies",
"role": "assistant"
}
] |
def x(self, res_name, res_spec):
res_spec = dict(res_spec)
res_spec['name'] = res_name
res = self.client_resource_factory(res_spec, parent=self, logger=self.
_logger)
self.children[resource.escape_name(res_name)] = res
self._children_dirty = True
res.set_ioloop(self.ioloop)
res.start()
return res
|
add_child_resource_client
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, res_name, res_spec):\n res_spec = dict(res_spec)\n res_spec['name'] = res_name\n res = self.client_resource_factory(res_spec, parent=self, logger=self.\n _logger)\n self.children[resource.escape_name(res_name)] = res\n self._children_dirty = True\n res.set_ioloop(self.ioloop)\n res.start()\n return res\n",
"role": "user"
},
{
"content": "add_child_resource_client",
"role": "assistant"
}
] |
def x(self):
for child_name, child in dict.items(self.children):
try:
child.stop()
except Exception:
self._logger.exception('Exception stopping child {!r}'.format(
child_name))
|
stop
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n for child_name, child in dict.items(self.children):\n try:\n child.stop()\n except Exception:\n self._logger.exception('Exception stopping child {!r}'.format(\n child_name))\n",
"role": "user"
},
{
"content": "stop",
"role": "assistant"
}
] |
def x(b):
i = 8
while i < len(b):
data_len, = struct.unpack('!I', b[i:i + 4])
type_ = b[i + 4:i + 8].decode('latin-1')
yield Chunk(type_, b[i:i + data_len + 12])
i += data_len + 12
|
parse_chunks
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(b):\n i = 8\n while i < len(b):\n data_len, = struct.unpack('!I', b[i:i + 4])\n type_ = b[i + 4:i + 8].decode('latin-1')\n yield Chunk(type_, b[i:i + data_len + 12])\n i += data_len + 12\n",
"role": "user"
},
{
"content": "parse_chunks",
"role": "assistant"
}
] |
def x(chunk_type, chunk_data):
out = struct.pack('!I', len(chunk_data))
chunk_data = chunk_type.encode('latin-1') + chunk_data
out += chunk_data + struct.pack('!I', binascii.crc32(chunk_data) &
4294967295)
return out
|
make_chunk
|
[
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(chunk_type, chunk_data):\n out = struct.pack('!I', len(chunk_data))\n chunk_data = chunk_type.encode('latin-1') + chunk_data\n out += chunk_data + struct.pack('!I', binascii.crc32(chunk_data) & \n 4294967295)\n return out\n",
"role": "user"
},
{
"content": "make_chunk",
"role": "assistant"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.