source_code stringlengths 45 7.24k | function_name stringlengths 1 111 | messages list |
|---|---|---|
def x(self, when=0):
for iss in list(self.owners()):
_kbl = []
for kb in self.issuer_keys[iss]:
kb.remove_outdated(self.remove_after, when=when)
if len(kb):
_kbl.append(kb)
if _kbl:
self.issuer_keys[iss] = _kbl
else:
del self.issuer_keys[iss]
| remove_outdated | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, when=0):\n for iss in list(self.owners()):\n _kbl = []\n for kb in self.issuer_keys[iss]:\n kb.remove_outdated(self.remove_af... |
def x(self, jwt, **kwargs):
try:
_key_type = jwe_alg2keytype(jwt.headers['alg'])
except KeyError:
_key_type = ''
try:
_kid = jwt.headers['kid']
except KeyError:
logger.info('Missing kid')
_kid = ''
keys = self.get(key_use='enc', owner='', key_type=_key_type)
try:
_aud = kwargs['aud']
except KeyError:
_aud = ''
if _aud:
try:
allow_missing_kid = kwargs['allow_missing_kid']
except KeyError:
allow_missing_kid = False
try:
nki = kwargs['no_kid_issuer']
except KeyError:
nki = {}
keys = self._add_key(keys, _aud, 'enc', _key_type, _kid, nki,
allow_missing_kid)
keys = [k for k in keys if k.appropriate_for('decrypt')]
return keys
| get_jwt_decrypt_keys | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, jwt, **kwargs):\n try:\n _key_type = jwe_alg2keytype(jwt.headers['alg'])\n except KeyError:\n _key_type = ''\n try:\n _kid ... |
def x(self, jwt, **kwargs):
try:
allow_missing_kid = kwargs['allow_missing_kid']
except KeyError:
allow_missing_kid = False
try:
_key_type = jws_alg2keytype(jwt.headers['alg'])
except KeyError:
_key_type = ''
try:
_kid = jwt.headers['kid']
except KeyError:
logger.info('Missing kid')
_kid = ''
try:
nki = kwargs['no_kid_issuer']
except KeyError:
nki = {}
_payload = jwt.payload()
try:
_iss = _payload['iss']
except KeyError:
try:
_iss = kwargs['iss']
except KeyError:
_iss = ''
if _iss:
if 'jku' in jwt.headers and _iss:
if not self.find(jwt.headers['jku'], _iss):
try:
if kwargs['trusting']:
self.add_url(_iss, jwt.headers['jku'])
except KeyError:
pass
keys = self._add_key([], _iss, 'sig', _key_type, _kid, nki,
allow_missing_kid)
if _key_type == 'oct':
keys.extend(self.get(key_use='sig', owner='', key_type=_key_type))
else:
keys = self.get(key_use='sig', owner='', key_type=_key_type)
keys = [k for k in keys if k.appropriate_for('verify')]
return keys
| get_jwt_verify_keys | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, jwt, **kwargs):\n try:\n allow_missing_kid = kwargs['allow_missing_kid']\n except KeyError:\n allow_missing_kid = False\n try:\n ... |
def x(self):
kj = KeyJar()
for issuer in self.owners():
kj[issuer] = [kb.copy() for kb in self[issuer]]
kj.verify_ssl = self.verify_ssl
return kj
| copy | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n kj = KeyJar()\n for issuer in self.owners():\n kj[issuer] = [kb.copy() for kb in self[issuer]]\n kj.verify_ssl = self.verify_ssl\n ... |
def x(keys, use, alg='', key_type='', kid=''):
res = []
if not key_type:
if use == 'sig':
key_type = jws_alg2keytype(alg)
else:
key_type = jwe_alg2keytype(alg)
for key in keys:
if key.use and key.use != use:
continue
if key.kty == key_type:
if key.kid and kid:
if key.kid == kid:
res.append(key)
else:
continue
if key.alg == '':
if alg:
if key_type == 'EC':
if key.crv == 'P-{}'.format(alg[2:]):
res.append(key)
continue
res.append(key)
elif alg and key.alg == alg:
res.append(key)
else:
res.append(key)
return res
| pick_key | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(keys, use, alg='', key_type='', kid=''):\n res = []\n if not key_type:\n if use == 'sig':\n key_type = jws_alg2keytype(alg)\n el... |
def x(self, recv, aud):
argv = {'iss': self.iss, 'iat': utc_time_sans_frac()}
if self.lifetime:
argv['exp'] = argv['iat'] + self.lifetime
_aud = self.put_together_aud(recv, aud)
if _aud:
argv['aud'] = _aud
return argv
| pack_init | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, recv, aud):\n argv = {'iss': self.iss, 'iat': utc_time_sans_frac()}\n if self.lifetime:\n argv['exp'] = argv['iat'] + self.lifetime\n _au... |
def x(self, owner_id='', kid=''):
keys = pick_key(self.my_keys(owner_id, 'sig'), 'sig', alg=self.alg, kid=kid
)
if not keys:
raise NoSuitableSigningKeys('kid={}'.format(kid))
return keys[0]
| pack_key | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, owner_id='', kid=''):\n keys = pick_key(self.my_keys(owner_id, 'sig'), 'sig', alg=self.alg, kid=kid\n )\n if not keys:\n raise NoSuit... |
def x(self, rj, token):
keys = self.key_jar.get_jwt_verify_keys(rj.jwt)
return rj.verify_compact(token, keys)
| verify | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, rj, token):\n keys = self.key_jar.get_jwt_verify_keys(rj.jwt)\n return rj.verify_compact(token, keys)\n",
"role": "user"
},
{
"content"... |
def x(self, rj, token):
if self.iss:
keys = self.key_jar.get_jwt_decrypt_keys(rj.jwt, aud=self.iss)
else:
keys = self.key_jar.get_jwt_decrypt_keys(rj.jwt)
return rj.decrypt(token, keys=keys)
| decrypt | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, rj, token):\n if self.iss:\n keys = self.key_jar.get_jwt_decrypt_keys(rj.jwt, aud=self.iss)\n else:\n keys = self.key_jar.get_jwt_dec... |
def x(msg_cls, info, **kwargs):
_msg = msg_cls(**info)
if not _msg.verify(**kwargs):
raise VerificationError()
return _msg
| verify_profile | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(msg_cls, info, **kwargs):\n _msg = msg_cls(**info)\n if not _msg.verify(**kwargs):\n raise VerificationError()\n return _msg\n",
"role": "u... |
def x(self, token):
if not token:
raise KeyError
_jwe_header = _jws_header = None
darg = {}
if self.allowed_enc_encs:
darg['enc'] = self.allowed_enc_encs
if self.allowed_enc_algs:
darg['alg'] = self.allowed_enc_algs
try:
_decryptor = jwe_factory(token, **darg)
except (KeyError, HeaderError):
_decryptor = None
if _decryptor:
_info = self._decrypt(_decryptor, token)
_jwe_header = _decryptor.jwt.headers
try:
_content_type = _decryptor.jwt.headers['cty']
except KeyError:
_content_type = ''
else:
_content_type = 'jwt'
_info = token
if _content_type.lower() == 'jwt':
if self.allowed_sign_algs:
_verifier = jws_factory(_info, alg=self.allowed_sign_algs)
else:
_verifier = jws_factory(_info)
if _verifier:
_info = self._verify(_verifier, _info)
else:
raise Exception()
_jws_header = _verifier.jwt.headers
else:
try:
_info = json.loads(_info)
except JSONDecodeError:
return _info
except TypeError:
try:
_info = as_unicode(_info)
_info = json.loads(_info)
except JSONDecodeError:
return _info
if self.msg_cls:
_msg_cls = self.msg_cls
else:
try:
_msg_cls = self.iss2msg_cls[_info['iss']]
except KeyError:
_msg_cls = None
if _msg_cls:
vp_args = {'skew': self.skew}
if self.iss:
vp_args['aud'] = self.iss
_info = self.verify_profile(_msg_cls, _info, **vp_args)
_info.jwe_header = _jwe_header
_info.jws_header = _jws_header
return _info
else:
return _info
| unpack | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, token):\n if not token:\n raise KeyError\n _jwe_header = _jws_header = None\n darg = {}\n if self.allowed_enc_encs:\n darg['enc... |
def x(token, alg=''):
_jw = JWS(alg=alg)
if _jw.is_jws(token):
return _jw
else:
return None
| factory | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(token, alg=''):\n _jw = JWS(alg=alg)\n if _jw.is_jws(token):\n return _jw\n else:\n return None\n",
"role": "user"
},
{
"con... |
def x(self, keys=None, protected=None, **kwargs):
_headers = self._header
_headers.update(kwargs)
key, xargs, _alg = self.alg_keys(keys, 'sig', protected)
if 'typ' in self:
xargs['typ'] = self['typ']
_headers.update(xargs)
jwt = JWSig(**_headers)
if _alg == 'none':
return jwt.pack(parts=[self.msg, ''])
try:
_signer = SIGNER_ALGS[_alg]
except KeyError:
raise UnknownAlgorithm(_alg)
_input = jwt.pack(parts=[self.msg])
if isinstance(key, AsymmetricKey):
sig = _signer.sign(_input.encode('utf-8'), key.private_key())
else:
sig = _signer.sign(_input.encode('utf-8'), key.key)
logger.debug('Signed message using key with kid=%s' % key.kid)
return '.'.join([_input, b64encode_item(sig).decode('utf-8')])
| sign_compact | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, keys=None, protected=None, **kwargs):\n _headers = self._header\n _headers.update(kwargs)\n key, xargs, _alg = self.alg_keys(keys, 'sig', protec... |
def x(self, jws=None, keys=None, allow_none=False, sigalg=None):
return self.verify_compact_verbose(jws, keys, allow_none, sigalg)['msg']
| verify_compact | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, jws=None, keys=None, allow_none=False, sigalg=None):\n return self.verify_compact_verbose(jws, keys, allow_none, sigalg)['msg']\n",
"role": "user"... |
def x(self, jws=None, keys=None, allow_none=False, sigalg=None):
if jws:
jwt = JWSig().unpack(jws)
if len(jwt) != 3:
raise WrongNumberOfParts(len(jwt))
self.jwt = jwt
elif not self.jwt:
raise ValueError('Missing singed JWT')
else:
jwt = self.jwt
try:
_alg = jwt.headers['alg']
except KeyError:
_alg = None
else:
if _alg is None or _alg.lower() == 'none':
if allow_none:
self.msg = jwt.payload()
return {'msg': self.msg}
else:
raise SignerAlgError('none not allowed')
if 'alg' in self and self['alg'] and _alg:
if isinstance(self['alg'], list):
if _alg not in self['alg']:
raise SignerAlgError(
'Wrong signing algorithm, expected {} got {}'.format(
self['alg'], _alg))
elif _alg != self['alg']:
raise SignerAlgError('Wrong signing algorithm, expected {} got {}'
.format(self['alg'], _alg))
if sigalg and sigalg != _alg:
raise SignerAlgError('Expected {0} got {1}'.format(sigalg, jwt.
headers['alg']))
self['alg'] = _alg
if keys:
_keys = self.pick_keys(keys)
else:
_keys = self.pick_keys(self._get_keys())
if not _keys:
if 'kid' in self:
raise NoSuitableSigningKeys('No key with kid: %s' % self['kid'])
elif 'kid' in self.jwt.headers:
raise NoSuitableSigningKeys('No key with kid: %s' % self.jwt.
headers['kid'])
else:
raise NoSuitableSigningKeys('No key for algorithm: %s' % _alg)
verifier = SIGNER_ALGS[_alg]
for key in _keys:
if isinstance(key, AsymmetricKey):
_key = key.public_key()
else:
_key = key.key
try:
if not verifier.verify(jwt.sign_input(), jwt.signature(), _key):
continue
except (BadSignature, IndexError):
pass
except (ValueError, TypeError) as err:
logger.warning('Exception "{}" caught'.format(err))
else:
logger.debug('Verified message using key with kid=%s' % key.kid)
self.msg = jwt.payload()
self.key = key
return {'msg': self.msg, 'key': key}
raise BadSignature()
| verify_compact_verbose | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, jws=None, keys=None, allow_none=False, sigalg=None):\n if jws:\n jwt = JWSig().unpack(jws)\n if len(jwt) != 3:\n raise WrongN... |
def x(self, keys=None, headers=None, flatten=False):
def x(protected, unprotected):
protected_headers = protected or {}
protected_headers.setdefault('alg', self.alg)
_jws = JWS(self.msg, **protected_headers)
encoded_header, payload, signature = _jws.sign_compact(protected=
protected, keys=keys).split('.')
signature_entry = {'signature': signature}
if unprotected:
signature_entry['header'] = unprotected
if encoded_header:
signature_entry['protected'] = encoded_header
return signature_entry
res = {'payload': b64e_enc_dec(self.msg, 'utf-8', 'ascii')}
if headers is None:
headers = [(dict(alg=self.alg), None)]
if flatten and len(headers) == 1:
signature_entry = create_signature(*headers[0])
res.update(signature_entry)
else:
res['signatures'] = []
for protected, unprotected in headers:
signature_entry = create_signature(protected, unprotected)
res['signatures'].append(signature_entry)
return json.dumps(res)
| sign_json | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, keys=None, headers=None, flatten=False):\n\n def x(protected, unprotected):\n protected_headers = protected or {}\n protected_headers.se... |
def x(self, json_jws):
json_ser_keys = {'payload', 'signatures'}
flattened_json_ser_keys = {'payload', 'signature'}
if not json_ser_keys.issubset(json_jws.keys()
) and not flattened_json_ser_keys.issubset(json_jws.keys()):
return False
return True
| is_json_serialized_jws | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, json_jws):\n json_ser_keys = {'payload', 'signatures'}\n flattened_json_ser_keys = {'payload', 'signature'}\n if not json_ser_keys.issubset(json... |
def x(self, jws):
try:
jwt = JWSig().unpack(jws)
except Exception as err:
logger.warning('Could not parse JWS: {}'.format(err))
return False
if 'alg' not in jwt.headers:
return False
if jwt.headers['alg'] is None:
jwt.headers['alg'] = 'none'
if jwt.headers['alg'] not in SIGNER_ALGS:
logger.debug('UnknownSignerAlg: %s' % jwt.headers['alg'])
return False
self.jwt = jwt
return True
| is_compact_jws | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, jws):\n try:\n jwt = JWSig().unpack(jws)\n except Exception as err:\n logger.warning('Could not parse JWS: {}'.format(err))\n ... |
def x(self, usage, alg='HS256'):
try:
_use = USE[usage]
except:
raise ValueError('Unknown key usage')
else:
if not self.use or self.use == _use:
if _use == 'sig':
return self.get_key()
else:
return self.encryption_key(alg)
raise WrongUsage("This key can't be used for {}".format(usage))
| appropriate_for | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, usage, alg='HS256'):\n try:\n _use = USE[usage]\n except:\n raise ValueError('Unknown key usage')\n else:\n if not self.use... |
def x(self, alg, **kwargs):
if not self.key:
self.deserialize()
try:
tsize = ALG2KEYLEN[alg]
except KeyError:
raise UnsupportedAlgorithm(alg)
if tsize <= 32:
_enc_key = sha256_digest(self.key)[:tsize]
elif tsize <= 48:
_enc_key = sha384_digest(self.key)[:tsize]
elif tsize <= 64:
_enc_key = sha512_digest(self.key)[:tsize]
else:
raise JWKException('No support for symmetric keys > 512 bits')
logger.debug('Symmetric encryption key: {}'.format(as_unicode(b64e(
_enc_key))))
return _enc_key
| encryption_key | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, alg, **kwargs):\n if not self.key:\n self.deserialize()\n try:\n tsize = ALG2KEYLEN[alg]\n except KeyError:\n raise Unsuppo... |
def x(self, msg, key):
if not isinstance(key, rsa.RSAPrivateKey):
raise TypeError('The key must be an instance of rsa.RSAPrivateKey')
sig = key.sign(msg, self.padding, self.hash)
return sig
| sign | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, msg, key):\n if not isinstance(key, rsa.RSAPrivateKey):\n raise TypeError('The key must be an instance of rsa.RSAPrivateKey')\n sig = key.si... |
def x(self, msg, signature, key):
if not isinstance(key, rsa.RSAPublicKey):
raise TypeError('The public key must be an instance of RSAPublicKey')
try:
key.verify(signature, msg, self.padding, self.hash)
except InvalidSignature as err:
raise BadSignature(str(err))
except AttributeError:
return False
else:
return True
| verify | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, msg, signature, key):\n if not isinstance(key, rsa.RSAPublicKey):\n raise TypeError('The public key must be an instance of RSAPublicKey')\n ... |
def x(self, usage, **kwargs):
try:
_use = USE[usage]
except KeyError:
raise ValueError('Unknown key usage')
else:
if usage in ['sign', 'decrypt']:
if not self.use or _use == self.use:
if self.priv_key:
return self.priv_key
return None
else:
if not self.use or _use == self.use:
if self.pub_key:
return self.pub_key
return None
| appropriate_for | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, usage, **kwargs):\n try:\n _use = USE[usage]\n except KeyError:\n raise ValueError('Unknown key usage')\n else:\n if usage ... |
def x(key_size=2048, filename='rsa.key', passphrase=''):
private_key = rsa.generate_private_key(public_exponent=65537, key_size=
key_size, backend=default_backend())
with open(filename, 'wb') as keyfile:
if passphrase:
pem = private_key.private_bytes(encoding=serialization.Encoding
.PEM, format=serialization.PrivateFormat.PKCS8,
encryption_algorithm=serialization.BestAvailableEncryption(
passphrase))
else:
pem = private_key.private_bytes(encoding=serialization.Encoding
.PEM, format=serialization.PrivateFormat.PKCS8,
encryption_algorithm=serialization.NoEncryption())
keyfile.write(pem)
keyfile.close()
return private_key
| generate_and_store_rsa_key | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(key_size=2048, filename='rsa.key', passphrase=''):\n private_key = rsa.generate_private_key(public_exponent=65537, key_size=\n key_size, backend=defa... |
def x(filename):
with open(filename, 'rb') as key_file:
public_key = serialization.load_pem_public_key(key_file.read(),
backend=default_backend())
return public_key
| import_public_rsa_key_from_file | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(filename):\n with open(filename, 'rb') as key_file:\n public_key = serialization.load_pem_public_key(key_file.read(),\n backend=default_ba... |
def x(pem_data):
if not pem_data.startswith(PREFIX):
pem_data = bytes('{}\n{}\n{}'.format(PREFIX, pem_data, POSTFIX),
'utf-8')
else:
pem_data = bytes(pem_data, 'utf-8')
cert = x509.load_pem_x509_certificate(pem_data, default_backend())
return cert.public_key()
| import_rsa_key | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(pem_data):\n if not pem_data.startswith(PREFIX):\n pem_data = bytes('{}\\n{}\\n{}'.format(PREFIX, pem_data, POSTFIX),\n 'utf-8')\n else... |
def x(key1, key2):
pn1 = key1.public_numbers()
pn2 = key2.public_numbers()
if pn1 == pn2:
return True
else:
return False
| rsa_eq | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(key1, key2):\n pn1 = key1.public_numbers()\n pn2 = key2.public_numbers()\n if pn1 == pn2:\n return True\n else:\n return False\n",
... |
def x(txt):
pub_key = import_rsa_key(txt)
if isinstance(pub_key, rsa.RSAPublicKey):
return [('rsa', pub_key)]
| x509_rsa_load | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(txt):\n pub_key = import_rsa_key(txt)\n if isinstance(pub_key, rsa.RSAPublicKey):\n return [('rsa', pub_key)]\n",
"role": "user"
},
{
... |
def x(der_data):
if isinstance(der_data, str):
der_data = bytes(der_data, 'utf-8')
return x509.load_der_x509_certificate(der_data, default_backend())
| der_cert | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(der_data):\n if isinstance(der_data, str):\n der_data = bytes(der_data, 'utf-8')\n return x509.load_der_x509_certificate(der_data, default_backend... |
def x(url, httpc, spec2key, **get_args):
try:
r = httpc('GET', url, allow_redirects=True, **get_args)
if r.status_code == 200:
cert = str(r.text)
try:
public_key = spec2key[cert]
except KeyError:
public_key = import_rsa_key(cert)
spec2key[cert] = public_key
if isinstance(public_key, rsa.RSAPublicKey):
return {'rsa': public_key}
else:
raise Exception('HTTP Get error: %s' % r.status_code)
except Exception as err:
logger.warning("Can't load key: %s" % err)
return []
| load_x509_cert | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(url, httpc, spec2key, **get_args):\n try:\n r = httpc('GET', url, allow_redirects=True, **get_args)\n if r.status_code == 200:\n ce... |
def x(pn1, pn2):
if pn1.n == pn2.n:
if pn1.e == pn2.e:
return True
return False
| cmp_public_numbers | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(pn1, pn2):\n if pn1.n == pn2.n:\n if pn1.e == pn2.e:\n return True\n return False\n",
"role": "user"
},
{
"content": "cmp_p... |
def x(pn1, pn2):
if not cmp_public_numbers(pn1.public_numbers, pn2.public_numbers):
return False
for param in ['d', 'p', 'q']:
if getattr(pn1, param) != getattr(pn2, param):
return False
return True
| cmp_private_numbers | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(pn1, pn2):\n if not cmp_public_numbers(pn1.public_numbers, pn2.public_numbers):\n return False\n for param in ['d', 'p', 'q']:\n if getattr... |
def x(cert):
if isinstance(cert, str):
der_cert = base64.b64decode(cert.encode('ascii'))
else:
der_cert = base64.b64decode(cert)
return b64e(hashlib.sha1(der_cert).digest())
| x5t_calculation | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(cert):\n if isinstance(cert, str):\n der_cert = base64.b64decode(cert.encode('ascii'))\n else:\n der_cert = base64.b64decode(cert)\n ret... |
def x(key_size=2048, kid='', use='', public_exponent=65537):
_key = rsa.generate_private_key(public_exponent=public_exponent,
key_size=key_size, backend=default_backend())
_rk = RSAKey(priv_key=_key, use=use, kid=kid)
if not kid:
_rk.add_kid()
return _rk
| new_rsa_key | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(key_size=2048, kid='', use='', public_exponent=65537):\n _key = rsa.generate_private_key(public_exponent=public_exponent,\n key_size=key_size, backen... |
def x(self):
if self.n and self.e:
try:
numbers = {}
for param in self.longs:
item = getattr(self, param)
if not item:
continue
else:
try:
val = int(deser(item))
except Exception:
raise
else:
numbers[param] = val
if 'd' in numbers:
self.priv_key = rsa_construct_private(numbers)
self.pub_key = self.priv_key.public_key()
else:
self.pub_key = rsa_construct_public(numbers)
except ValueError as err:
raise DeSerializationNotPossible('%s' % err)
if self.x5c:
_cert_chain = []
for der_data in self.x5c:
_cert_chain.append(der_cert(base64.b64decode(der_data)))
if self.x5t:
if isinstance(self.x5t, bytes):
_x5t = self.x5t
else:
_x5t = self.x5t.encode('ascii')
if _x5t != x5t_calculation(self.x5c[0]):
raise DeSerializationNotPossible(
"The thumbprint 'x5t' does not match the certificate.")
if self.pub_key:
if not rsa_eq(self.pub_key, _cert_chain[0].public_key()):
raise ValueError(
'key described by components and key in x5c not equal')
else:
self.pub_key = _cert_chain[0].public_key()
self._serialize(self.pub_key)
if len(self.x5c) > 1:
pass
if not self.priv_key and not self.pub_key:
raise DeSerializationNotPossible()
| deserialize | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n if self.n and self.e:\n try:\n numbers = {}\n for param in self.longs:\n item = getattr(self, param)\n ... |
def x(self, private=False):
if not self.priv_key and not self.pub_key:
raise SerializationNotPossible()
res = self.common()
public_longs = list(set(self.public_members) & set(self.longs))
for param in public_longs:
item = getattr(self, param)
if item:
res[param] = item
if private:
for param in self.longs:
if not private and param in ['d', 'p', 'q', 'dp', 'dq', 'di', 'qi'
]:
continue
item = getattr(self, param)
if item:
res[param] = item
if self.x5c:
res['x5c'] = [x.decode('utf-8') for x in self.x5c]
return res
| serialize | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, private=False):\n if not self.priv_key and not self.pub_key:\n raise SerializationNotPossible()\n res = self.common()\n public_longs = li... |
def x(self, key):
self._serialize(key)
if isinstance(key, rsa.RSAPrivateKey):
self.priv_key = key
self.pub_key = key.public_key()
else:
self.pub_key = key
return self
| load_key | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, key):\n self._serialize(key)\n if isinstance(key, rsa.RSAPrivateKey):\n self.priv_key = key\n self.pub_key = key.public_key()\n el... |
def x(self, msg, key):
if not isinstance(key, ec.EllipticCurvePrivateKey):
raise TypeError(
'The private key must be an instance of ec.EllipticCurvePrivateKey'
)
self._cross_check(key.public_key())
num_bits = key.curve.key_size
num_bytes = (num_bits + 7) // 8
asn1sig = key.sign(msg, ec.ECDSA(self.hash_algorithm()))
r, s = decode_dss_signature(asn1sig)
return int_to_bytes(r, num_bytes) + int_to_bytes(s, num_bytes)
| sign | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, msg, key):\n if not isinstance(key, ec.EllipticCurvePrivateKey):\n raise TypeError(\n 'The private key must be an instance of ec.Ell... |
def x(self, msg, sig, key):
if not isinstance(key, ec.EllipticCurvePublicKey):
raise TypeError(
'The public key must be an instance of ec.EllipticCurvePublicKey')
self._cross_check(key)
num_bits = key.curve.key_size
num_bytes = (num_bits + 7) // 8
if len(sig) != 2 * num_bytes:
raise ValueError('Invalid signature')
try:
r, s = self._split_raw_signature(sig)
asn1sig = encode_dss_signature(r, s)
key.verify(asn1sig, msg, ec.ECDSA(self.hash_algorithm()))
except InvalidSignature as err:
raise BadSignature(err)
else:
return True
| verify | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, msg, sig, key):\n if not isinstance(key, ec.EllipticCurvePublicKey):\n raise TypeError(\n 'The public key must be an instance of ec.... |
def x(self, pub_key):
if self.curve_name != pub_key.curve.name:
raise ValueError(
"The curve in private key {} and in algorithm {} don't match".
format(pub_key.curve.name, self.curve_name))
| cross_check | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, pub_key):\n if self.curve_name != pub_key.curve.name:\n raise ValueError(\n \"The curve in private key {} and in algorithm {} don't ... |
def x(sig):
c_length = len(sig) // 2
r = int_from_bytes(sig[:c_length], byteorder='big')
s = int_from_bytes(sig[c_length:], byteorder='big')
return r, s
| split_raw_signature | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(sig):\n c_length = len(sig) // 2\n r = int_from_bytes(sig[:c_length], byteorder='big')\n s = int_from_bytes(sig[c_length:], byteorder='big')\n retu... |
def x(msg, func='HS256'):
if func == 'HS256':
return as_unicode(b64e(sha256_digest(msg)[:16]))
elif func == 'HS384':
return as_unicode(b64e(sha384_digest(msg)[:24]))
elif func == 'HS512':
return as_unicode(b64e(sha512_digest(msg)[:32]))
| left_hash | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(msg, func='HS256'):\n if func == 'HS256':\n return as_unicode(b64e(sha256_digest(msg)[:16]))\n elif func == 'HS384':\n return as_unicode(b6... |
def x(alg):
if not alg or alg.lower() == 'none':
return 'none'
elif alg.startswith('RS') or alg.startswith('PS'):
return 'RSA'
elif alg.startswith('HS') or alg.startswith('A'):
return 'oct'
elif alg.startswith('ES') or alg.startswith('ECDH-ES'):
return 'EC'
else:
return None
| alg2keytype | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(alg):\n if not alg or alg.lower() == 'none':\n return 'none'\n elif alg.startswith('RS') or alg.startswith('PS'):\n return 'RSA'\n elif ... |
def x(algorithm):
if algorithm == 'RS256':
return hashes.SHA256(), padding.PKCS1v15()
elif algorithm == 'RS384':
return hashes.SHA384(), padding.PKCS1v15()
elif algorithm == 'RS512':
return hashes.SHA512(), padding.PKCS1v15()
elif algorithm == 'PS256':
return hashes.SHA256(), padding.PSS(mgf=padding.MGF1(hashes.SHA256(
)), salt_length=padding.PSS.MAX_LENGTH)
elif algorithm == 'PS384':
return hashes.SHA384(), padding.PSS(mgf=padding.MGF1(hashes.SHA384(
)), salt_length=padding.PSS.MAX_LENGTH)
elif algorithm == 'PS512':
return hashes.SHA512(), padding.PSS(mgf=padding.MGF1(hashes.SHA512(
)), salt_length=padding.PSS.MAX_LENGTH)
else:
raise UnsupportedAlgorithm('Unknown algorithm: {}'.format(algorithm))
| parse_rsa_algorithm | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(algorithm):\n if algorithm == 'RS256':\n return hashes.SHA256(), padding.PKCS1v15()\n elif algorithm == 'RS384':\n return hashes.SHA384(), ... |
def x(key, epk, apu, apv, alg, dk_len):
shared_key = key.exchange(ec.ECDH(), epk)
otherInfo = bytes(alg) + struct.pack('!I', len(apu)) + apu + struct.pack(
'!I', len(apv)) + apv + struct.pack('!I', dk_len)
return concat_sha256(shared_key, dk_len, otherInfo)
| ecdh_derive_key | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(key, epk, apu, apv, alg, dk_len):\n shared_key = key.exchange(ec.ECDH(), epk)\n otherInfo = bytes(alg) + struct.pack('!I', len(apu)) + apu + struct.pack(... |
def x(self, key=None, iv='', cek='', **kwargs):
_msg = as_bytes(self.msg)
_args = self._dict
try:
_args['kid'] = kwargs['kid']
except KeyError:
pass
if 'params' in kwargs:
if 'apu' in kwargs['params']:
_args['apu'] = kwargs['params']['apu']
if 'apv' in kwargs['params']:
_args['apv'] = kwargs['params']['apv']
if 'epk' in kwargs['params']:
_args['epk'] = kwargs['params']['epk']
jwe = JWEnc(**_args)
ctxt, tag, cek = super(JWE_EC, self).enc_setup(self['enc'], _msg,
auth_data=jwe.b64_encode_header(), key=cek, iv=iv)
if 'encrypted_key' in kwargs:
return jwe.pack(parts=[kwargs['encrypted_key'], iv, ctxt, tag])
return jwe.pack(parts=[iv, ctxt, tag])
| encrypt | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, key=None, iv='', cek='', **kwargs):\n _msg = as_bytes(self.msg)\n _args = self._dict\n try:\n _args['kid'] = kwargs['kid']\n except Ke... |
def x(self, key, iv='', cek='', **kwargs):
_msg = as_bytes(self.msg)
if 'zip' in self:
if self['zip'] == 'DEF':
_msg = zlib.compress(_msg)
else:
raise ParameterError('Zip has unknown value: %s' % self['zip'])
kwarg_cek = cek or None
_enc = self['enc']
iv = self._generate_iv(_enc, iv)
cek = self._generate_key(_enc, cek)
self['cek'] = cek
logger.debug('cek: %s, iv: %s' % ([c for c in cek], [c for c in iv]))
_encrypt = RSAEncrypter(self.with_digest).encrypt
_alg = self['alg']
if kwarg_cek:
jwe_enc_key = ''
elif _alg == 'RSA-OAEP':
jwe_enc_key = _encrypt(cek, key, 'pkcs1_oaep_padding')
elif _alg == 'RSA-OAEP-256':
jwe_enc_key = _encrypt(cek, key, 'pkcs1_oaep_256_padding')
elif _alg == 'RSA1_5':
jwe_enc_key = _encrypt(cek, key)
else:
raise NotSupportedAlgorithm(_alg)
jwe = JWEnc(**self.headers())
try:
_auth_data = kwargs['auth_data']
except KeyError:
_auth_data = jwe.b64_encode_header()
ctxt, tag, key = self.enc_setup(_enc, _msg, key=cek, iv=iv, auth_data=
_auth_data)
return jwe.pack(parts=[jwe_enc_key, iv, ctxt, tag])
| encrypt | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, key, iv='', cek='', **kwargs):\n _msg = as_bytes(self.msg)\n if 'zip' in self:\n if self['zip'] == 'DEF':\n _msg = zlib.compress(... |
def x(self, token, key, cek=None):
if not isinstance(token, JWEnc):
jwe = JWEnc().unpack(token)
else:
jwe = token
self.jwt = jwe.encrypted_key()
jek = jwe.encrypted_key()
_decrypt = RSAEncrypter(self.with_digest).decrypt
_alg = jwe.headers['alg']
if cek:
pass
elif _alg == 'RSA-OAEP':
cek = _decrypt(jek, key, 'pkcs1_oaep_padding')
elif _alg == 'RSA-OAEP-256':
cek = _decrypt(jek, key, 'pkcs1_oaep_256_padding')
elif _alg == 'RSA1_5':
cek = _decrypt(jek, key)
else:
raise NotSupportedAlgorithm(_alg)
self['cek'] = cek
enc = jwe.headers['enc']
if enc not in SUPPORTED['enc']:
raise NotSupportedAlgorithm(enc)
auth_data = jwe.b64_protected_header()
msg = self._decrypt(enc, cek, jwe.ciphertext(), auth_data=auth_data, iv
=jwe.initialization_vector(), tag=jwe.authentication_tag())
if 'zip' in jwe.headers and jwe.headers['zip'] == 'DEF':
msg = zlib.decompress(msg)
return msg
| decrypt | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, token, key, cek=None):\n if not isinstance(token, JWEnc):\n jwe = JWEnc().unpack(token)\n else:\n jwe = token\n self.jwt = jwe.enc... |
def x(self, keys=None, cek='', iv='', **kwargs):
_alg = self['alg']
if keys:
keys = self.pick_keys(keys, use='enc')
else:
keys = self.pick_keys(self._get_keys(), use='enc')
if not keys:
logger.error(KEY_ERR.format(_alg))
raise NoSuitableEncryptionKey(_alg)
if _alg in ['RSA-OAEP', 'RSA-OAEP-256', 'RSA1_5']:
encrypter = JWE_RSA(self.msg, **self._dict)
elif _alg.startswith('A') and _alg.endswith('KW'):
encrypter = JWE_SYM(self.msg, **self._dict)
else:
encrypter = JWE_EC(**self._dict)
cek, encrypted_key, iv, params, eprivk = encrypter.enc_setup(self.
msg, key=keys[0], **self._dict)
kwargs['encrypted_key'] = encrypted_key
kwargs['params'] = params
if cek:
kwargs['cek'] = cek
if iv:
kwargs['iv'] = iv
for key in keys:
if isinstance(key, SYMKey):
_key = key.key
elif isinstance(key, ECKey):
_key = key.public_key()
else:
_key = key.public_key()
if key.kid:
encrypter['kid'] = key.kid
try:
token = encrypter.encrypt(key=_key, **kwargs)
self['cek'] = encrypter.cek if 'cek' in encrypter else None
except TypeError as err:
raise err
else:
logger.debug('Encrypted message using key with kid={}'.format(
key.kid))
return token
| encrypt | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, keys=None, cek='', iv='', **kwargs):\n _alg = self['alg']\n if keys:\n keys = self.pick_keys(keys, use='enc')\n else:\n keys = sel... |
def x(data):
_data = as_bytes(data)
_d = base64.urlsafe_b64decode(_data + b'==')
if [e for e in [b'+', b'/', b'='] if e in _data]:
raise ValueError('Not base64url encoded')
return intarr2long(struct.unpack('%sB' % len(_d), _d))
| base64url_to_long | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(data):\n _data = as_bytes(data)\n _d = base64.urlsafe_b64decode(_data + b'==')\n if [e for e in [b'+', b'/', b'='] if e in _data]:\n raise Valu... |
def x(b):
cb = b.rstrip(b'=')
if not _b64_re.match(cb):
raise BadSyntax(cb, 'base64-encoded data contains illegal characters')
if cb == b:
b = add_padding(b)
return base64.urlsafe_b64decode(b)
| b64d | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(b):\n cb = b.rstrip(b'=')\n if not _b64_re.match(cb):\n raise BadSyntax(cb, 'base64-encoded data contains illegal characters')\n if cb == b:\n ... |
def x(val):
if isinstance(val, str):
_val = val.encode('utf-8')
else:
_val = val
return base64_to_long(_val)
| deser | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(val):\n if isinstance(val, str):\n _val = val.encode('utf-8')\n else:\n _val = val\n return base64_to_long(_val)\n",
"role": "user"
... |
def x(self):
res = self.serialize(private=True)
res.update(self.extra_args)
return res
| to_dict | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n res = self.serialize(private=True)\n res.update(self.extra_args)\n return res\n",
"role": "user"
},
{
"content": "to_dict",
"... |
def x(self):
res = {'kty': self.kty}
if self.use:
res['use'] = self.use
if self.kid:
res['kid'] = self.kid
if self.alg:
res['alg'] = self.alg
return res
| common | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n res = {'kty': self.kty}\n if self.use:\n res['use'] = self.use\n if self.kid:\n res['kid'] = self.kid\n if self.alg:\n ... |
def x(self):
for param in self.longs:
item = getattr(self, param)
if not item or isinstance(item, str):
continue
if isinstance(item, bytes):
item = item.decode('utf-8')
setattr(self, param, item)
try:
_ = base64url_to_long(item)
except Exception:
return False
else:
if [e for e in ['+', '/', '='] if e in item]:
return False
if self.kid:
if not isinstance(self.kid, str):
raise ValueError('kid of wrong value type')
return True
| verify | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n for param in self.longs:\n item = getattr(self, param)\n if not item or isinstance(item, str):\n continue\n if isin... |
def x(self, hash_function, members=None):
if members is None:
members = self.required
members.sort()
ser = self.serialize()
_se = []
for elem in members:
try:
_val = ser[elem]
except KeyError:
pass
else:
if isinstance(_val, bytes):
_val = as_unicode(_val)
_se.append('"{}":{}'.format(elem, json.dumps(_val)))
_json = '{{{}}}'.format(','.join(_se))
return b64e(DIGEST_HASH[hash_function](_json))
| thumbprint | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, hash_function, members=None):\n if members is None:\n members = self.required\n members.sort()\n ser = self.serialize()\n _se = []\n ... |
def x(secret, dk_len, other_info):
dkm = b''
dk_bytes = int(ceil(dk_len / 8.0))
counter = 0
while len(dkm) < dk_bytes:
counter += 1
counter_bytes = struct.pack('!I', counter)
digest = hashes.Hash(hashes.SHA256(), backend=default_backend())
digest.update(counter_bytes)
digest.update(secret)
digest.update(other_info)
dkm += digest.finalize()
return dkm[:dk_bytes]
| concat_sha256 | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(secret, dk_len, other_info):\n dkm = b''\n dk_bytes = int(ceil(dk_len / 8.0))\n counter = 0\n while len(dkm) < dk_bytes:\n counter += 1\n ... |
def x(self, keys, use='', alg=''):
if not alg:
alg = self['alg']
if alg == 'none':
return []
_k = self.alg2keytype(alg)
if _k is None:
logger.error("Unknown algorithm '%s'" % alg)
raise ValueError('Unknown cryptography algorithm')
logger.debug('Picking key by key type={0}'.format(_k))
_kty = [_k.lower(), _k.upper(), _k.lower().encode('utf-8'), _k.upper().
encode('utf-8')]
_keys = [k for k in keys if k.kty in _kty]
try:
_kid = self['kid']
except KeyError:
try:
_kid = self.jwt.headers['kid']
except (AttributeError, KeyError):
_kid = None
logger.debug('Picking key based on alg={0}, kid={1} and use={2}'.format
(alg, _kid, use))
pkey = []
for _key in _keys:
logger.debug('Picked: kid:{}, use:{}, kty:{}'.format(_key.kid, _key
.use, _key.kty))
if _kid:
if _kid != _key.kid:
continue
if use and _key.use and _key.use != use:
continue
if alg and _key.alg and _key.alg != alg:
continue
pkey.append(_key)
return pkey
| pick_keys | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, keys, use='', alg=''):\n if not alg:\n alg = self['alg']\n if alg == 'none':\n return []\n _k = self.alg2keytype(alg)\n if _k i... |
def x(self):
self._add_result = Sensor.float('add.result', 'Last ?add result.', '',
[-10000, 10000])
self._add_result.set_value(0, Sensor.UNREACHABLE)
self._time_result = Sensor.timestamp('time.result',
'Last ?time result.', '')
self._time_result.set_value(0, Sensor.INACTIVE)
self._eval_result = Sensor.string('eval.result', 'Last ?eval result.', '')
self._eval_result.set_value('', Sensor.UNKNOWN)
self._fruit_result = Sensor.discrete('fruit.result',
'Last ?pick-fruit result.', '', self.FRUIT)
self._fruit_result.set_value('apple', Sensor.ERROR)
self.add_sensor(self._add_result)
self.add_sensor(self._time_result)
self.add_sensor(self._eval_result)
self.add_sensor(self._fruit_result)
| setup_sensors | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n self._add_result = Sensor.float('add.result', 'Last ?add result.', '',\n [-10000, 10000])\n self._add_result.set_value(0, Sensor.UNREACHA... |
def x(self, req, x, y):
r = x + y
self._add_result.set_value(r)
return 'ok', r
| request_add | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, req, x, y):\n r = x + y\n self._add_result.set_value(r)\n return 'ok', r\n",
"role": "user"
},
{
"content": "request_add",
"role... |
def x(self, req):
r = time.time()
self._time_result.set_value(r)
return 'ok', r
| request_time | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, req):\n r = time.time()\n self._time_result.set_value(r)\n return 'ok', r\n",
"role": "user"
},
{
"content": "request_time",
"ro... |
def x(self, req, expression):
r = str(eval(expression))
self._eval_result.set_value(r)
return 'ok', r
| request_eval | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, req, expression):\n r = str(eval(expression))\n self._eval_result.set_value(r)\n return 'ok', r\n",
"role": "user"
},
{
"content": "... |
def x(self, req):
r = random.choice(self.FRUIT + [None])
if r is None:
return 'fail', 'No fruit.'
delay = random.randrange(1, 5)
req.inform('Picking will take %d seconds' % delay)
def x():
self._fruit_result.set_value(r)
req.reply('ok', r)
handle_timer = threading.Timer(delay, pick_handler)
handle_timer.start()
raise AsyncReply
| request_pick_fruit | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, req):\n r = random.choice(self.FRUIT + [None])\n if r is None:\n return 'fail', 'No fruit.'\n delay = random.randrange(1, 5)\n req.inf... |
def x(self, req, sensor_name):
sensor = self.get_sensor(sensor_name)
ts, status, value = sensor.read()
sensor.set_value(value, sensor.INACTIVE, ts)
return 'ok',
| request_set_sensor_inactive | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, req, sensor_name):\n sensor = self.get_sensor(sensor_name)\n ts, status, value = sensor.read()\n sensor.set_value(value, sensor.INACTIVE, ts)\n ... |
def x(self, req, sensor_name):
sensor = self.get_sensor(sensor_name)
ts, status, value = sensor.read()
sensor.set_value(value, sensor.UNREACHABLE, ts)
return 'ok',
| request_set_sensor_unreachable | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, req, sensor_name):\n sensor = self.get_sensor(sensor_name)\n ts, status, value = sensor.read()\n sensor.set_value(value, sensor.UNREACHABLE, ts)... |
def x(self, req, msg):
reversed_args = msg.arguments[::-1]
return req.make_reply(*reversed_args)
| request_raw_reverse | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, req, msg):\n reversed_args = msg.arguments[::-1]\n return req.make_reply(*reversed_args)\n",
"role": "user"
},
{
"content": "request_ra... |
def x(transformation, future):
new_future = tornado_Future()
def x(f):
assert f is future
if f.exc_info() is not None:
new_future.set_exc_info(f.exc_info())
else:
try:
new_future.set_result(transformation(f.result()))
except Exception:
new_future.set_exc_info(sys.exc_info())
future.add_done_callback(_transform)
return new_future
| transform_future | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(transformation, future):\n new_future = tornado_Future()\n\n def x(f):\n assert f is future\n if f.exc_info() is not None:\n new... |
def x(parent_class, sensor_items, filter, strategy, status,
use_python_identifiers, tuple, refresh):
filter_re = re.compile(filter)
found_sensors = []
none_strat = resource.normalize_strategy_parameters('none')
sensor_dict = dict(sensor_items)
for sensor_identifier in sorted(sensor_dict.keys()):
sensor_obj = sensor_dict[sensor_identifier]
search_name = (sensor_identifier if use_python_identifiers else
sensor_obj.name)
name_match = filter_re.search(search_name)
strat_match = (not strategy or sensor_obj.sampling_strategy !=
none_strat)
if name_match and strat_match:
if refresh:
yield sensor_obj.get_value()
prefix = ''
if isinstance(parent_class, KATCPClientResourceContainer):
if sensor_obj.name.startswith('agg_'):
prefix = ''
else:
prefix = sensor_obj.parent_name + '.'
if not status or sensor_obj.reading.status in status:
if tuple:
found_sensors.append((prefix + sensor_obj.name,
sensor_obj.reading.value, sensor_obj.reading.
timestamp, sensor_obj.type, sensor_obj.units,
sensor_obj.reading.received_timestamp, sensor_obj.
reading.status, sensor_obj.sampling_strategy))
else:
found_sensors.append(resource.SensorResultTuple(object=
sensor_obj, name=prefix + sensor_obj.name,
python_identifier=sensor_identifier, description=
sensor_obj.description, units=sensor_obj.units,
type=sensor_obj.type, reading=sensor_obj.reading))
raise tornado.gen.Return(found_sensors)
| list_sensors | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(parent_class, sensor_items, filter, strategy, status,\n use_python_identifiers, tuple, refresh):\n filter_re = re.compile(filter)\n found_sensors = []... |
def x(resource, callback, exit_event=None):
exit_event = exit_event or AsyncEvent()
callback(False)
while not exit_event.is_set():
yield until_any(resource.until_synced(), exit_event.until_set())
if exit_event.is_set():
break
else:
callback(True)
yield until_any(resource.until_not_synced(), exit_event.until_set())
if exit_event.is_set():
break
else:
callback(False)
| monitor_resource_sync_state | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(resource, callback, exit_event=None):\n exit_event = exit_event or AsyncEvent()\n callback(False)\n while not exit_event.is_set():\n yield unti... |
def x(self, request, *args, **kwargs):
f = tornado_Future()
try:
use_mid = kwargs.get('use_mid')
timeout = kwargs.get('timeout')
mid = kwargs.get('mid')
msg = Message.request(request, *args, mid=mid)
except Exception:
f.set_exc_info(sys.exc_info())
return f
return transform_future(self.reply_wrapper, self.katcp_client.
future_request(msg, timeout, use_mid))
| wrapped_request | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, request, *args, **kwargs):\n f = tornado_Future()\n try:\n use_mid = kwargs.get('use_mid')\n timeout = kwargs.get('timeout')\n ... |
def x(self, state, timeout=None):
return self._state.until_state(state, timeout=timeout)
| until_state | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, state, timeout=None):\n return self._state.until_state(state, timeout=timeout)\n",
"role": "user"
},
{
"content": "until_state",
"role... |
def x(self):
host, port = self.address
ic = self._inspecting_client = self.inspecting_client_factory(host,
port, self._ioloop_set_to)
self.ioloop = ic.ioloop
if self._preset_protocol_flags:
ic.preset_protocol_flags(self._preset_protocol_flags)
ic.katcp_client.auto_reconnect_delay = self.auto_reconnect_delay
ic.set_state_callback(self._inspecting_client_state_callback)
ic.request_factory = self._request_factory
self._sensor_manager = KATCPClientResourceSensorsManager(ic, self.name,
logger=self._logger)
ic.handle_sensor_value()
ic.sensor_factory = self._sensor_manager.sensor_factory
self.reapply_sampling_strategies = (self._sensor_manager.
reapply_sampling_strategies)
log_future_exceptions(self._logger, ic.connect())
| start | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n host, port = self.address\n ic = self._inspecting_client = self.inspecting_client_factory(host,\n port, self._ioloop_set_to)\n self.io... |
def x(self, host, port, ioloop_set_to):
return ReplyWrappedInspectingClientAsync(host, port, ioloop=
ioloop_set_to, auto_reconnect=self.auto_reconnect)
| inspecting_client_factory | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, host, port, ioloop_set_to):\n return ReplyWrappedInspectingClientAsync(host, port, ioloop=\n ioloop_set_to, auto_reconnect=self.auto_reconnect)... |
def x(self, timeout=None):
not_synced_states = [state for state in self._state.valid_states if
state != 'synced']
not_synced_futures = [self._state.until_state(state) for state in
not_synced_states]
return until_any(*not_synced_futures, timeout=timeout)
| until_not_synced | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, timeout=None):\n not_synced_states = [state for state in self._state.valid_states if \n state != 'synced']\n not_synced_futures = [self._sta... |
def x(self, filter, strategy_and_parms):
sensor_list = yield self.list_sensors(filter=filter)
sensor_dict = {}
for sens in sensor_list:
try:
sensor_name = sens.object.normalised_name
yield self.set_sampling_strategy(sensor_name, strategy_and_parms)
sensor_dict[sensor_name] = strategy_and_parms
except Exception as exc:
self._logger.exception(
'Unhandled exception trying to set sensor strategies {!r} for {} ({})'
.format(strategy_and_parms, sens, exc))
sensor_dict[sensor_name] = None
raise tornado.gen.Return(sensor_dict)
| set_sampling_strategies | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, filter, strategy_and_parms):\n sensor_list = yield self.list_sensors(filter=filter)\n sensor_dict = {}\n for sens in sensor_list:\n try:\... |
def x(self, sensor_name, strategy_and_parms):
sensor_name = resource.escape_name(sensor_name)
sensor_obj = dict.get(self._sensor, sensor_name)
self._sensor_strategy_cache[sensor_name] = strategy_and_parms
sensor_dict = {}
self._logger.debug('Cached strategy {} for sensor {}'.format(
strategy_and_parms, sensor_name))
if sensor_obj:
try:
yield sensor_obj.set_sampling_strategy(strategy_and_parms)
sensor_dict[sensor_name] = strategy_and_parms
except Exception as exc:
self._logger.exception(
'Unhandled exception trying to set sensor strategy {!r} for sensor {} ({})'
.format(strategy_and_parms, sensor_name, exc))
sensor_dict[sensor_name] = str(exc)
raise tornado.gen.Return(sensor_dict)
| set_sampling_strategy | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, sensor_name, strategy_and_parms):\n sensor_name = resource.escape_name(sensor_name)\n sensor_obj = dict.get(self._sensor, sensor_name)\n self._s... |
def x(self, sensor_name):
sensor_name = resource.escape_name(sensor_name)
self._sensor_strategy_cache.pop(sensor_name, None)
self._sensor_manager.drop_sampling_strategy(sensor_name)
| drop_sampling_strategy | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, sensor_name):\n sensor_name = resource.escape_name(sensor_name)\n self._sensor_strategy_cache.pop(sensor_name, None)\n self._sensor_manager.drop... |
def x(self, sensor_name, listener):
sensor_name = resource.escape_name(sensor_name)
sensor_obj = dict.get(self._sensor, sensor_name)
self._sensor_listener_cache[sensor_name].append(listener)
sensor_dict = {}
self._logger.debug('Cached listener {} for sensor {}'.format(listener,
sensor_name))
if sensor_obj:
try:
sensor_obj.register_listener(listener, reading=True)
sensor_dict[sensor_name] = listener
self._logger.debug('Registered listener {} for sensor {}'.
format(listener, sensor_name))
except Exception as exc:
self._logger.exception(
'Unhandled exception trying to set sensor listener {} for sensor {} ({})'
.format(listener, sensor_name, exc))
sensor_dict[sensor_name] = str(exc)
raise tornado.gen.Return(sensor_dict)
| set_sensor_listener | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, sensor_name, listener):\n sensor_name = resource.escape_name(sensor_name)\n sensor_obj = dict.get(self._sensor, sensor_name)\n self._sensor_list... |
def x(self, sensor_name):
if sensor_name in self._strategy_cache:
return sensor_name
else:
escaped_name = resource.escape_name(sensor_name)
for key in self._strategy_cache:
escaped_key = resource.escape_name(key)
if escaped_key == escaped_name:
return key
return sensor_name
| get_strategy_cache_key | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, sensor_name):\n if sensor_name in self._strategy_cache:\n return sensor_name\n else:\n escaped_name = resource.escape_name(sensor_nam... |
def x(self, sensor_name):
cache_key = self._get_strategy_cache_key(sensor_name)
cached = self._strategy_cache.get(cache_key)
if not cached:
return resource.normalize_strategy_parameters('none')
else:
return cached
| get_sampling_strategy | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, sensor_name):\n cache_key = self._get_strategy_cache_key(sensor_name)\n cached = self._strategy_cache.get(cache_key)\n if not cached:\n r... |
def x(self, sensor_name, strategy_and_params):
try:
strategy_and_params = resource.normalize_strategy_parameters(
strategy_and_params)
self._strategy_cache[sensor_name] = strategy_and_params
reply = yield self._inspecting_client.wrapped_request('sensor-sampling'
, sensor_name, *strategy_and_params)
if not reply.succeeded:
raise KATCPSensorError(
'Error setting strategy for sensor {0}: \n{1!s}'.format(
sensor_name, reply))
sensor_strategy = True, strategy_and_params
except Exception as e:
self._logger.exception('Exception found!')
sensor_strategy = False, str(e)
raise tornado.gen.Return(sensor_strategy)
| set_sampling_strategy | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, sensor_name, strategy_and_params):\n try:\n strategy_and_params = resource.normalize_strategy_parameters(\n strategy_and_params)\n ... |
def x(self, sensor_name):
cache_key = self._get_strategy_cache_key(sensor_name)
self._strategy_cache.pop(cache_key, None)
| drop_sampling_strategy | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, sensor_name):\n cache_key = self._get_strategy_cache_key(sensor_name)\n self._strategy_cache.pop(cache_key, None)\n",
"role": "user"
},
{
... |
def x(self):
check_sensor = self._inspecting_client.future_check_sensor
for sensor_name, strategy in list(self._strategy_cache.items()):
try:
sensor_exists = yield check_sensor(sensor_name)
if not sensor_exists:
self._logger.warn(
'Did not set strategy for non-existing sensor {}'.
format(sensor_name))
continue
result = yield self.set_sampling_strategy(sensor_name, strategy)
except KATCPSensorError as e:
self._logger.error(
'Error reapplying strategy for sensor {0}: {1!s}'.format(
sensor_name, e))
except Exception:
self._logger.exception(
'Unhandled exception reapplying strategy for sensor {}'.
format(sensor_name), exc_info=True)
| reapply_sampling_strategies | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n check_sensor = self._inspecting_client.future_check_sensor\n for sensor_name, strategy in list(self._strategy_cache.items()):\n try:\n ... |
def x(self, *args, **kwargs):
timeout = kwargs.pop('timeout', None)
if timeout is None:
timeout = self.timeout_hint
kwargs['timeout'] = timeout
return self._client.wrapped_request(self.name, *args, **kwargs)
| issue_request | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, *args, **kwargs):\n timeout = kwargs.pop('timeout', None)\n if timeout is None:\n timeout = self.timeout_hint\n kwargs['timeout'] = timeo... |
def x(self, filter, strategy_and_params):
futures_dict = {}
for res_obj in self.clients:
futures_dict[res_obj.name] = res_obj.set_sampling_strategies(filter,
strategy_and_params)
sensors_strategies = yield futures_dict
raise tornado.gen.Return(sensors_strategies)
| set_sampling_strategies | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, filter, strategy_and_params):\n futures_dict = {}\n for res_obj in self.clients:\n futures_dict[res_obj.name] = res_obj.set_sampling_strateg... |
def x(self, sensor_name, strategy_and_params):
futures_dict = {}
for res_obj in self.clients:
futures_dict[res_obj.name] = res_obj.set_sampling_strategy(sensor_name,
strategy_and_params)
sensors_strategies = yield futures_dict
raise tornado.gen.Return(sensors_strategies)
| set_sampling_strategy | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, sensor_name, strategy_and_params):\n futures_dict = {}\n for res_obj in self.clients:\n futures_dict[res_obj.name] = res_obj.set_sampling_st... |
def x(self, sensor_name, condition_or_value, timeout=5.0, quorum=None,
max_grace_period=1.0):
if quorum is None:
quorum = len(self.clients)
elif quorum > 1:
if not isinstance(quorum, int):
raise TypeError(
'Quorum parameter %r must be an integer if outside range [0, 1]'
% (quorum,))
elif isinstance(quorum, float):
quorum = int(math.ceil(quorum * len(self.clients)))
if timeout and max_grace_period:
grace_period = min(max_grace_period, timeout / 2.0)
initial_timeout = timeout - grace_period
else:
grace_period = max_grace_period
initial_timeout = timeout
futures = {}
for client in self.clients:
f = client.wait(sensor_name, condition_or_value, initial_timeout)
futures[client.name] = f
initial_results = yield until_some(done_at_least=quorum, **futures)
results = dict(initial_results)
stragglers = {}
for client in self.clients:
if not results.get(client.name, False):
f = client.wait(sensor_name, condition_or_value, grace_period)
stragglers[client.name] = f
rest_of_results = yield until_some(**stragglers)
results.update(dict(rest_of_results))
class TestableDict(dict):
"""Dictionary of results that can be tested for overall success."""
def x(self):
return sum(self.values()) >= quorum
if sys.version_info[0] == 2:
__nonzero__ = __bool__
raise tornado.gen.Return(TestableDict(results))
| wait | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, sensor_name, condition_or_value, timeout=5.0, quorum=None,\n max_grace_period=1.0):\n if quorum is None:\n quorum = len(self.clients)\n e... |
def x(self, res_spec, parent, logger):
return KATCPClientResource(res_spec, parent=self, logger=logger)
| client_resource_factory | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, res_spec, parent, logger):\n return KATCPClientResource(res_spec, parent=self, logger=logger)\n",
"role": "user"
},
{
"content": "client_r... |
def x(self, group_name, group_client_names):
group_configs = self._resources_spec.get('groups', {})
group_configs[group_name] = group_client_names
self._resources_spec['groups'] = group_configs
self._init_groups()
| add_group | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, group_name, group_client_names):\n group_configs = self._resources_spec.get('groups', {})\n group_configs[group_name] = group_client_names\n sel... |
def x(self, ioloop=None):
ioloop = ioloop or tornado.ioloop.IOLoop.current()
self.ioloop = ioloop
for res in dict.values(self.children):
res.set_ioloop(ioloop)
| set_ioloop | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, ioloop=None):\n ioloop = ioloop or tornado.ioloop.IOLoop.current()\n self.ioloop = ioloop\n for res in dict.values(self.children):\n res.... |
def x(self):
return all([r.is_connected() for r in dict.values(self.children)])
| is_connected | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n return all([r.is_connected() for r in dict.values(self.children)])\n",
"role": "user"
},
{
"content": "is_connected",
"role": "assi... |
def x(self, timeout=None):
futures = [r.until_synced(timeout) for r in dict.values(self.children)]
yield tornado.gen.multi(futures, quiet_exceptions=tornado.gen.TimeoutError)
| until_synced | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, timeout=None):\n futures = [r.until_synced(timeout) for r in dict.values(self.children)]\n yield tornado.gen.multi(futures, quiet_exceptions=tornad... |
def x(self, timeout=None):
yield until_any(*[r.until_not_synced() for r in dict.values(self.
children)], timeout=timeout)
| until_not_synced | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, timeout=None):\n yield until_any(*[r.until_not_synced() for r in dict.values(self.\n children)], timeout=timeout)\n",
"role": "user"
},
... |
def x(self, state, timeout=None):
return until_any(*[r.until_state(state) for r in dict.values(self.
children)], timeout=timeout)
| until_any_child_in_state | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, state, timeout=None):\n return until_any(*[r.until_state(state) for r in dict.values(self.\n children)], timeout=timeout)\n",
"role": "user... |
def x(self, state, timeout=None):
futures = [r.until_state(state, timeout=timeout) for r in dict.values(
self.children)]
yield tornado.gen.multi(futures, quiet_exceptions=tornado.gen.TimeoutError)
| until_all_children_in_state | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, state, timeout=None):\n futures = [r.until_state(state, timeout=timeout) for r in dict.values(\n self.children)]\n yield tornado.gen.multi(f... |
def x(self, filter, strategy_and_parms):
result_list = yield self.list_sensors(filter=filter)
sensor_dict = {}
for result in result_list:
sensor_name = result.object.normalised_name
resource_name = result.object.parent_name
if resource_name not in sensor_dict:
sensor_dict[resource_name] = {}
try:
resource_obj = self.children[resource_name]
yield resource_obj.set_sampling_strategy(sensor_name,
strategy_and_parms)
sensor_dict[resource_name][sensor_name] = strategy_and_parms
self._logger.debug(
'Set sampling strategy on resource %s for %s' % (
resource_name, sensor_name))
except Exception as exc:
self._logger.error(
'Cannot set sampling strategy on resource %s for %s (%s)' %
(resource_name, sensor_name, exc))
sensor_dict[resource_name][sensor_name] = None
raise tornado.gen.Return(sensor_dict)
| set_sampling_strategies | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, filter, strategy_and_parms):\n result_list = yield self.list_sensors(filter=filter)\n sensor_dict = {}\n for result in result_list:\n sen... |
def x(self, res_name, res_spec):
res_spec = dict(res_spec)
res_spec['name'] = res_name
res = self.client_resource_factory(res_spec, parent=self, logger=self.
_logger)
self.children[resource.escape_name(res_name)] = res
self._children_dirty = True
res.set_ioloop(self.ioloop)
res.start()
return res
| add_child_resource_client | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, res_name, res_spec):\n res_spec = dict(res_spec)\n res_spec['name'] = res_name\n res = self.client_resource_factory(res_spec, parent=self, logge... |
def x(self):
for child_name, child in dict.items(self.children):
try:
child.stop()
except Exception:
self._logger.exception('Exception stopping child {!r}'.format(
child_name))
| stop | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n for child_name, child in dict.items(self.children):\n try:\n child.stop()\n except Exception:\n self._logger.ex... |
def x(b):
i = 8
while i < len(b):
data_len, = struct.unpack('!I', b[i:i + 4])
type_ = b[i + 4:i + 8].decode('latin-1')
yield Chunk(type_, b[i:i + data_len + 12])
i += data_len + 12
| parse_chunks | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(b):\n i = 8\n while i < len(b):\n data_len, = struct.unpack('!I', b[i:i + 4])\n type_ = b[i + 4:i + 8].decode('latin-1')\n yield Chu... |
def x(chunk_type, chunk_data):
out = struct.pack('!I', len(chunk_data))
chunk_data = chunk_type.encode('latin-1') + chunk_data
out += chunk_data + struct.pack('!I', binascii.crc32(chunk_data) &
4294967295)
return out
| make_chunk | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(chunk_type, chunk_data):\n out = struct.pack('!I', len(chunk_data))\n chunk_data = chunk_type.encode('latin-1') + chunk_data\n out += chunk_data + str... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.