func_code_string
stringlengths
52
1.94M
func_documentation_string
stringlengths
1
47.2k
def reassembly(self, info): BUFID = info.bufid # Buffer Identifier FO = info.fo # Fragment Offset IHL = info.ihl # Internet Header Length MF = info.mf # More Fragments flag TL = info.tl # Total Length # when non-fragmented (possibly dis...
Reassembly procedure. Positional arguments: * info -- Info, info dict of packets to be reassembled
def submit(self, buf, *, checked=False): TDL = buf['TDL'] RCVBT = buf['RCVBT'] index = buf['index'] header = buf['header'] datagram = buf['datagram'] start = 0 stop = (TDL + 7) // 8 flag = checked or (TDL and all(RCVBT[start:stop])) # if d...
Submit reassembled payload. Positional arguments: * buf -- dict, buffer dict of reassembled packets Keyword arguments: * bufid -- tuple, buffer identifier Returns: * list -- reassembled packets
def read_ipv6(self, length): if length is None: length = len(self) _htet = self._read_ip_hextet() _plen = self._read_unpack(2) _next = self._read_protos(1) _hlmt = self._read_unpack(1) _srca = self._read_ip_addr() _dsta = self._read_ip_addr() ...
Read Internet Protocol version 6 (IPv6). Structure of IPv6 header [RFC 2460]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ...
def _read_ip_hextet(self): _htet = self._read_fileng(4).hex() _vers = _htet[0] # version number (6) _tcls = int(_htet[0:2], base=16) # traffic class _flow = int(_htet[2:], base=16) # flow label return (_vers, _tcls, _flow)
Read first four hextets of IPv6.
def _decode_next_layer(self, ipv6, proto=None, length=None): hdr_len = 40 # header length raw_len = ipv6['payload'] # payload length _protos = list() # ProtoChain buffer # traverse if next header is an extensive header while proto in EXT_HDR: ...
Decode next layer extractor. Positional arguments: * ipv6 -- dict, info buffer * proto -- str, next layer protocol name * length -- int, valid (not padding) length Returns: * dict -- current protocol with next layer extracted
def _read_protos(self, size): _byte = self._read_unpack(size) _prot = TP_PROTO.get(_byte) return _prot
Read next layer protocol type. Positional arguments: * size -- int, buffer size Returns: * str -- next layer's protocol name
def _decode_next_layer(self, dict_, proto=None, length=None, *, version=4, ipv6_exthdr=None): if self._onerror: next_ = beholder(self._import_next_layer)(self, proto, length, version=version) else: next_ = self._import_next_layer(proto, length, version=version) i...
Decode next layer extractor. Positional arguments: * dict_ -- dict, info buffer * proto -- str, next layer protocol name * length -- int, valid (not padding) length Keyword Arguments: * version -- int, IP version (4 in default) ...
def _import_next_layer(self, proto, length=None, *, version=4, extension=False): if length == 0: from pcapkit.protocols.null import NoPayload as Protocol elif self._sigterm or proto == 59: from pcapkit.protocols.raw import Raw as Protocol elif proto == 51: ...
Import next layer extractor. Positional arguments: * proto -- str, next layer protocol name * length -- int, valid (not padding) length Keyword Arguments: * version -- int, IP version (4 in default) <keyword> 4 / 6 * extension...
def read_hip(self, length, extension): if length is None: length = len(self) _next = self._read_protos(1) _hlen = self._read_unpack(1) _type = self._read_binary(1) if _type[0] != '0': raise ProtocolError('HIP: invalid format') _vers = self...
Read Host Identity Protocol. Structure of HIP header [RFC 5201][RFC 7401]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ...
def _read_hip_para(self, length, *, version): counter = 0 # length of read parameters optkind = list() # parameter type list options = dict() # dict of parameter data while counter < length: # break when eol triggered kind = self._read_binar...
Read HIP parameters. Positional arguments: * length -- int, length of parameters Keyword arguments: * version -- int, HIP version Returns: * dict -- extracted HIP parameters
def _read_para_unassigned(self, code, cbit, clen, *, desc, length, version): unassigned = dict( type=desc, critical=cbit, length=clen, contents=self._read_fileng(clen), ) plen = length - clen if plen: self._read_fileng(...
Read HIP unassigned parameters. Structure of HIP unassigned parameters [RFC 5201][RFC 7401]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-...
def _read_para_esp_info(self, code, cbit, clen, *, desc, length, version): if clen != 12: raise ProtocolError(f'HIPv{version}: [Parano {code}] invalid format') _resv = self._read_fileng(2) _kind = self._read_unpack(2) _olds = self._read_unpack(2) _news = self...
Read HIP ESP_INFO parameter. Structure of HIP ESP_INFO parameter [RFC 7402]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ...
def _read_para_r1_counter(self, code, cbit, clen, *, desc, length, version): if clen != 12: raise ProtocolError(f'HIPv{version}: [Parano {code}] invalid format') if code == 128 and version != 1: raise ProtocolError(f'HIPv{version}: [Parano {code}] invalid parameter') ...
Read HIP R1_COUNTER parameter. Structure of HIP R1_COUNTER parameter [RFC 5201][RFC 7401]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-...
def _read_para_locator_set(self, code, cbit, clen, *, desc, length, version): def _read_locator(kind, size): if kind == 0 and size == 16: return ipaddress.ip_address(self._read_fileng(16)) elif kind == 1 and size == 20: return dict( ...
Read HIP LOCATOR_SET parameter. Structure of HIP LOCATOR_SET parameter [RFC 8046]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-...
def _read_para_puzzle(self, code, cbit, clen, *, desc, length, version): if version == 1 and clen != 12: raise ProtocolError(f'HIPv{version}: [Parano {code}] invalid format') _numk = self._read_unpack(1) _time = self._read_unpack(1) _opak = self._read_fileng(2) ...
Read HIP PUZZLE parameter. Structure of HIP PUZZLE parameter [RFC 5201][RFC 7401]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-...
def _read_para_seq(self, code, cbit, clen, *, desc, length, version): if clen != 4: raise ProtocolError(f'HIPv{version}: [Parano {code}] invalid format') _upid = self._read_unpack(4) seq = dict( type=desc, critical=cbit, length=clen, ...
Read HIP SEQ parameter. Structure of HIP SEQ parameter [RFC 7401]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | ...
def _read_para_ack(self, code, cbit, clen, *, desc, length, version): if clen % 4 != 0: raise ProtocolError(f'HIPv{version}: [Parano {code}] invalid format') _upid = list() for _ in range(clen // 4): _upid.append(self._read_unpack(4)) ack = dict( ...
Read HIP ACK parameter. Structure of HIP ACK parameter [RFC 7401]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | ...
def _read_para_dh_group_list(self, code, cbit, clen, *, desc, length, version): _dhid = list() for _ in range(clen): _dhid.append(_GROUP_ID.get(self._read_unpack(1), 'Unassigned')) dh_group_list = dict( type=desc, critical=cbit, length=cle...
Read HIP DH_GROUP_LIST parameter. Structure of HIP DH_GROUP_LIST parameter [RFC 7401]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-...
def _read_para_diffie_hellman(self, code, cbit, clen, *, desc, length, version): _gpid = self._read_unpack(1) _vlen = self._read_unpack(2) _pval = self._read_fileng(_vlen) diffie_hellman = dict( type=desc, critical=cbit, length=clen, ...
Read HIP DIFFIE_HELLMAN parameter. Structure of HIP DIFFIE_HELLMAN parameter [RFC 7401]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-...
def _read_para_hip_transform(self, code, cbit, clen, *, desc, length, version): if version != 1: raise ProtocolError(f'HIPv{version}: [Parano {code}] invalid parameter') if clen % 2 != 0: raise ProtocolError(f'HIPv{version}: [Parano {code}] invalid format') _stid...
Read HIP HIP_TRANSFORM parameter. Structure of HIP HIP_TRANSFORM parameter [RFC 5201]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-...
def _read_para_hip_cipher(self, code, cbit, clen, *, desc, length, version): if clen % 2 != 0: raise ProtocolError(f'HIPv{version}: [Parano {code}] invalid format') _cpid = list() for _ in range(clen // 2): _cpid.append(_CIPHER_ID.get(self._read_unpack(2), 'Unass...
Read HIP HIP_CIPHER parameter. Structure of HIP HIP_CIPHER parameter [RFC 7401]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ...
def _read_para_nat_traversal_mode(self, code, cbit, clen, *, desc, length, version): if clen % 2 != 0: raise ProtocolError(f'HIPv{version}: [Parano {code}] invalid format') _resv = self._read_fileng(2) _mdid = list() for _ in range((clen - 2) // 2): _mdid...
Read HIP NAT_TRAVERSAL_MODE parameter. Structure of HIP NAT_TRAVERSAL_MODE parameter [RFC 5770]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-...
def _read_para_transaction_pacing(self, code, cbit, clen, *, desc, length, version): if clen != 4: raise ProtocolError(f'HIPv{version}: [Parano {code}] invalid format') _data = self._read_unpack(4) transaction_pacing = dict( type=desc, critical=cbit, ...
Read HIP TRANSACTION_PACING parameter. Structure of HIP TRANSACTION_PACING parameter [RFC 5770]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-...
def _read_para_encrypted(self, code, cbit, clen, *, desc, length, version): _resv = self._read_fileng(4) _data = self._read_fileng(clen-4) encrypted = dict( type=desc, critical=cbit, length=clen, raw=_data, ) _plen = length...
Read HIP ENCRYPTED parameter. Structure of HIP ENCRYPTED parameter [RFC 7401]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ...
def _read_para_host_id(self, code, cbit, clen, *, desc, length, version): def _read_host_identifier(length, code): algorithm = _HI_ALGORITHM.get(code, 'Unassigned') if algorithm == 'ECDSA': host_id = dict( curve=_ECDSA_CURVE.get(self._read_unp...
Read HIP HOST_ID parameter. Structure of HIP HOST_ID parameter [RFC 7401]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ...
def _read_para_hit_suite_list(self, code, cbit, clen, *, desc, length, version): _hsid = list() for _ in range(clen): _hsid.append(_HIT_SUITE_ID.get(self._read_unpack(1), 'Unassigned')) hit_suite_list = dict( type=desc, critical=cbit, leng...
Read HIP HIT_SUITE_LIST parameter. Structure of HIP HIT_SUITE_LIST parameter [RFC 7401]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-...
def _read_para_cert(self, code, cbit, clen, *, desc, length, version): _ctgp = self._read_unpack(1) _ctct = self._read_unpack(1) _ctid = self._read_unpack(1) _cttp = self._read_unpack(1) _ctdt = self._read_fileng(clen-4) cert = dict( type=desc, ...
Read HIP CERT parameter. Structure of HIP CERT parameter [RFC 7401]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ...
def _read_para_notification(self, code, cbit, clen, *, desc, length, version): _resv = self._read_fileng(2) _code = self._read_unpack(2) _data = self._read_fileng(2) _type = _NOTIFICATION_TYPE.get(_code) if _type is None: if 1 <= _code <= 50: ...
Read HIP NOTIFICATION parameter. Structure of HIP NOTIFICATION parameter [RFC 7401]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-...
def _read_para_echo_request_signed(self, code, cbit, clen, *, desc, length, version): _data = self._read_fileng(clen) echo_request_signed = dict( type=desc, critical=cbit, length=clen, data=_data, ) _plen = length - clen if...
Read HIP ECHO_REQUEST_SIGNED parameter. Structure of HIP ECHO_REQUEST_SIGNED parameter [RFC 7401]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-...
def _read_para_reg_failed(self, code, cbit, clen, *, desc, length, version): _life = collections.namedtuple('Lifetime', ('min', 'max')) _mint = self._read_unpack(1) _maxt = self._read_unpack(1) _type = list() for _ in range(clen-2): _code = self._read_unpack(...
Read HIP REG_FAILED parameter. Structure of HIP REG_FAILED parameter [RFC 8003]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ...
def _read_para_reg_from(self, code, cbit, clen, *, desc, length, version): if clen != 20: raise ProtocolError(f'HIPv{version}: [Parano {code}] invalid format') _port = self._read_unpack(2) _ptcl = self._read_unpack(1) _resv = self._read_fileng(1) _addr = self...
Read HIP REG_FROM parameter. Structure of HIP REG_FROM parameter [RFC 5770]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ...
def _read_para_echo_response_signed(self, code, cbit, clen, *, desc, length, version): _data = self._read_fileng(clen) echo_response_signed = dict( type=desc, critical=cbit, length=clen, data=_data, ) _plen = length - clen ...
Read HIP ECHO_RESPONSE_SIGNED parameter. Structure of HIP ECHO_RESPONSE_SIGNED parameter [RFC 7401]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-...
def _read_para_transport_format_list(self, code, cbit, clen, *, desc, length, version): if clen % 2 != 0: raise ProtocolError(f'HIPv{version}: [Parano {code}] invalid format') _tfid = list() for _ in range(clen // 2): _tfid.append(self._read_unpack(2)) tr...
Read HIP TRANSPORT_FORMAT_LIST parameter. Structure of HIP TRANSPORT_FORMAT_LIST parameter [RFC 7401]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-...
def _read_para_esp_transform(self, code, cbit, clen, *, desc, length, version): if clen % 2 != 0: raise ProtocolError(f'HIPv{version}: [Parano {code}] invalid format') _resv = self._read_fileng(2) _stid = list() for _ in range((clen - 2) // 2): _stid.appe...
Read HIP ESP_TRANSFORM parameter. Structure of HIP ESP_TRANSFORM parameter [RFC 7402]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-...
def _read_para_seq_data(self, code, cbit, clen, *, desc, length, version): if clen != 4: raise ProtocolError(f'HIPv{version}: [Parano {code}] invalid format') _seqn = self._read_unpack(4) seq_data = dict( type=desc, critical=cbit, length=c...
Read HIP SEQ_DATA parameter. Structure of HIP SEQ_DATA parameter [RFC 6078]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ...
def _read_para_ack_data(self, code, cbit, clen, *, desc, length, version): if clen % 4 != 0: raise ProtocolError(f'HIPv{version}: [Parano {code}] invalid format') _ackn = list() for _ in range(clen // 4): _ackn.append(self._read_unpack(4)) ack_data = dict...
Read HIP ACK_DATA parameter. Structure of HIP ACK_DATA parameter [RFC 6078]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ...
def _read_para_payload_mic(self, code, cbit, clen, *, desc, length, version): _next = self._read_unpack(1) _resv = self._read_fileng(3) _data = self._read_fileng(4) _micv = self._read_fileng(clen-8) payload_mic = dict( type=desc, critical=cbit, ...
Read HIP ACK_DATA parameter. Structure of HIP ACK_DATA parameter [RFC 6078]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ...
def _read_para_transaction_id(self, code, cbit, clen, *, desc, length, version): _tsid = self._read_unpack(clen) transaction_id = dict( type=desc, critical=cbit, length=clen, id=_tsid, ) _plen = length - clen if _plen: ...
Read HIP TRANSACTION_ID parameter. Structure of HIP TRANSACTION_ID parameter [RFC 6078]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-...
def _read_para_overlay_id(self, code, cbit, clen, *, desc, length, version): _olid = self._read_unpack(clen) overlay_id = dict( type=desc, critical=cbit, length=clen, id=_olid, ) _plen = length - clen if _plen: ...
Read HIP TRANSACTION_ID parameter. Structure of HIP TRANSACTION_ID parameter [RFC 6079]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-...
def _read_para_route_dst(self, code, cbit, clen, *, desc, length, version): if (clen - 4) % 16 != 0: raise ProtocolError(f'HIPv{version}: [Parano {code}] invalid format') _flag = self._read_binary(2) _resv = self._read_fileng(2) _addr = list() for _ in range(...
Read HIP ROUTE_DST parameter. Structure of HIP ROUTE_DST parameter [RFC 6028]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ...
def _read_para_hip_transport_mode(self, code, cbit, clen, *, desc, length, version): if clen % 2 != 0: raise ProtocolError(f'HIPv{version}: [Parano {code}] invalid format') _port = self._read_unpack(2) _mdid = list() for _ in range((clen - 2) // 2): _mdid...
Read HIP HIP_TRANSPORT_MODE parameter. Structure of HIP HIP_TRANSPORT_MODE parameter [RFC 6261]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-...
def _read_para_hip_mac(self, code, cbit, clen, *, desc, length, version): _hmac = self._read_fileng(clen) hip_mac = dict( type=desc, critical=cbit, length=clen, hmac=_hmac, ) _plen = length - clen if _plen: self...
Read HIP HIP_MAC parameter. Structure of HIP HIP_MAC parameter [RFC 7401]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ...
def _read_para_hip_mac_2(self, code, cbit, clen, *, desc, length, version): _hmac = self._read_fileng(clen) hip_mac_2 = dict( type=desc, critical=cbit, length=clen, hmac=_hmac, ) _plen = length - clen if _plen: ...
Read HIP HIP_MAC_2 parameter. Structure of HIP HIP_MAC_2 parameter [RFC 7401]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ...
def _read_para_hip_signature_2(self, code, cbit, clen, *, desc, length, version): _algo = self._read_unpack(2) _sign = self._read_fileng(clen-2) hip_signature_2 = dict( type=desc, critical=cbit, length=clen, algorithm=_HI_ALGORITHM.get(_al...
Read HIP HIP_SIGNATURE_2 parameter. Structure of HIP HIP_SIGNATURE_2 parameter [RFC 7401]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-...
def _read_para_echo_request_unsigned(self, code, cbit, clen, *, desc, length, version): _data = self._read_fileng(clen) echo_request_unsigned = dict( type=desc, critical=cbit, length=clen, data=_data, ) _plen = length - clen ...
Read HIP ECHO_REQUEST_UNSIGNED parameter. Structure of HIP ECHO_REQUEST_UNSIGNED parameter [RFC 7401]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-...
def _read_para_echo_response_unsigned(self, code, cbit, clen, *, desc, length, version): _data = self._read_fileng(clen) echo_response_unsigned = dict( type=desc, critical=cbit, length=clen, data=_data, ) _plen = length - clen ...
Read HIP ECHO_RESPONSE_UNSIGNED parameter. Structure of HIP ECHO_RESPONSE_UNSIGNED parameter [RFC 7401]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-...
def _read_para_overlay_ttl(self, code, cbit, clen, *, desc, length, version): if clen != 4: raise ProtocolError(f'HIPv{version}: [Parano {code}] invalid format') _ttln = self._read_unpack(2) overlay_ttl = dict( type=desc, critical=cbit, le...
Read HIP OVERLAY_TTL parameter. Structure of HIP OVERLAY_TTL parameter [RFC 6078]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-...
def _read_para_from(self, code, cbit, clen, *, desc, length, version): if clen != 16: raise ProtocolError(f'HIPv{version}: [Parano {code}] invalid format') _addr = self._read_fileng(16) from_ = dict( type=desc, critical=cbit, length=clen, ...
Read HIP FROM parameter. Structure of HIP FROM parameter [RFC 8004]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ...
def _read_para_rvs_hmac(self, code, cbit, clen, *, desc, length, version): _hmac = self._read_fileng(clen) rvs_hmac = dict( type=desc, critical=cbit, length=clen, hmac=_hmac, ) _plen = length - clen if _plen: se...
Read HIP RVS_HMAC parameter. Structure of HIP RVS_HMAC parameter [RFC 8004]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ...
def _read_para_via_rvs(self, code, cbit, clen, *, desc, length, version): if clen % 16 != 0: raise ProtocolError(f'HIPv{version}: [Parano {code}] invalid format') _addr = list() for _ in range(clen // 16): _addr.append(ipaddress.ip_address(self._read_fileng(16)))...
Read HIP VIA_RVS parameter. Structure of HIP VIA_RVS parameter [RFC 6028]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ...
def _read_para_relay_hmac(self, code, cbit, clen, *, desc, length, version): _hmac = self._read_fileng(clen) relay_hmac = dict( type=desc, critical=cbit, length=clen, hmac=_hmac, ) _plen = length - clen if _plen: ...
Read HIP RELAY_HMAC parameter. Structure of HIP RELAY_HMAC parameter [RFC 5770]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ...
def stacklevel(): pcapkit = f'{os.path.sep}pcapkit{os.path.sep}' tb = traceback.extract_stack() for index, tbitem in enumerate(tb): if pcapkit in tbitem[0]: break else: index = len(tb) return (index-1)
Fetch current stack level.
def get(key, default=-1): if isinstance(key, int): return LinkType(key) if key not in LinkType._member_map_: extend_enum(LinkType, key, default) return LinkType[key]
Backport support for original codes.
def seekset(func): @functools.wraps(func) def seekcur(self, *args, **kw): seek_cur = self._file.tell() self._file.seek(self._seekset, os.SEEK_SET) return_ = func(self, *args, **kw) self._file.seek(seek_cur, os.SEEK_SET) return return_ return seekcur
[ClassMethod] Read file from start then set back to original.
def seekset_ng(func): @functools.wraps(func) def seekcur(file, *args, seekset=os.SEEK_SET, **kw): # seek_cur = file.tell() file.seek(seekset, os.SEEK_SET) return_ = func(file, *args, seekset=seekset, **kw) # file.seek(seek_cur, os.SEEK_SET) return return_ return ...
Read file from start then set back to original.
def beholder(func): @functools.wraps(func) def behold(self, proto, length, *args, **kwargs): seek_cur = self._file.tell() try: return func(proto, length, *args, **kwargs) except Exception: from pcapkit.protocols.raw import Raw error = traceback.fo...
[ClassMethod] Behold extraction procedure.
def beholder_ng(func): @functools.wraps(func) def behold(file, length, *args, **kwargs): seek_cur = file.tell() try: return func(file, length, *args, **kwargs) except Exception: # from pcapkit.foundation.analysis import analyse from pcapkit.protoc...
Behold analysis procedure.
def read_l2tp(self, length): if length is None: length = len(self) _flag = self._read_binary(1) _vers = self._read_fileng(1).hex()[1] _hlen = self._read_unpack(2) if int(_flag[1]) else None _tnnl = self._read_unpack(2) _sssn = self._read_unpack(2) ...
Read Layer Two Tunnelling Protocol. Structure of L2TP header [RFC 2661]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ...
def get(key, default=-1): if isinstance(key, int): return ECDSA_LOW_Curve(key) if key not in ECDSA_LOW_Curve._member_map_: extend_enum(ECDSA_LOW_Curve, key, default) return ECDSA_LOW_Curve[key]
Backport support for original codes.
def get(key, default=-1): if isinstance(key, int): return Hardware(key) if key not in Hardware._member_map_: extend_enum(Hardware, key, default) return Hardware[key]
Backport support for original codes.
def read_vlan(self, length): if length is None: length = len(self) _tcif = self._read_binary(2) _type = self._read_protos(2) vlan = dict( tci=dict( pcp=_PCP.get(int(_tcif[:3], base=2)), dei=True if _tcif[3] else False, ...
Read 802.1Q Customer VLAN Tag Type. Structure of 802.1Q Customer VLAN Tag Type [RFC 7042]: Octets Bits Name Description 1 0 vlan.tci Tag Control Information 1 0 vlan.tci.pcp Priority Cod...
def get(key, default=-1): if isinstance(key, int): return TaggerId(key) if key not in TaggerId._member_map_: extend_enum(TaggerId, key, default) return TaggerId[key]
Backport support for original codes.
def read_tcp(self, length): if length is None: length = len(self) _srcp = self._read_unpack(2) _dstp = self._read_unpack(2) _seqn = self._read_unpack(4) _ackn = self._read_unpack(4) _lenf = self._read_binary(1) _flag = self._read_binary(1) ...
Read Transmission Control Protocol (TCP). Structure of TCP header [RFC 793]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ...
def _read_tcp_options(self, size): counter = 0 # length of read option list optkind = list() # option kind list options = dict() # dict of option data while counter < size: # get option kind kind = self._read_unpack(1) # fetch co...
Read TCP option list. Positional arguments: * size -- int, length of option list Returns: * tuple -- TCP option list * dict -- extracted TCP option
def _read_mode_donone(self, size, kind): data = dict( kind=kind, length=size, data=self._read_fileng(size), ) return data
Read options request no process. Positional arguments: * size - int, length of option * kind - int, option kind value Returns: * dict -- extracted option with no operation Structure of TCP options: Octets Bits Name ...
def _read_mode_unpack(self, size, kind): data = dict( kind=kind, length=size, data=self._read_unpack(size), ) return data
Read options request unpack process. Keyword arguments: size - int, length of option kind - int, option kind value Returns: * dict -- extracted option which unpacked Structure of TCP options: Octets Bits Name Descr...
def _read_mode_tsopt(self, size, kind): temp = struct.unpack('>II', self._read_fileng(size)) data = dict( kind=kind, length=size, val=temp[0], ecr=temp[1], ) return data
Read Timestamps option. Positional arguments: * size - int, length of option * kind - int, 8 (Timestamps) Returns: * dict -- extracted Timestamps (TS) option Structure of TCP TSopt [RFC 7323]: +-------+-------+---------------------+-------------...
def _read_mode_pocsp(self, size, kind): temp = self._read_binary(size) data = dict( kind=kind, length=size, start=True if int(temp[0]) else False, end=True if int(temp[1]) else False, filler=bytes(chr(int(temp[2:], base=2)), encoding='...
Read Partial Order Connection Service Profile option. Positional arguments: * size - int, length of option * kind - int, 10 (POC-Serv Profile) Returns: * dict -- extracted Partial Order Connection Service Profile (POC-SP) option Structure of TCP POC-SP Opti...
def _read_mode_acopt(self, size, kind): temp = self._read_unpack(size) algo = chksum_opt.get(temp) data = dict( kind=kind, length=size, ac=algo, ) return data
Read Alternate Checksum Request option. Positional arguments: size - int, length of option kind - int, 14 (Alt-Chksum Request) Returns: * dict -- extracted Alternate Checksum Request (CHKSUM-REQ) option Structure of TCP CHKSUM-REQ [RFC 1146][RFC 6247]: ...
def _read_mode_qsopt(self, size, kind): rvrr = self._read_binary(1) ttld = self._read_unpack(1) noun = self._read_fileng(4) data = dict( kind=kind, length=size, req_rate=int(rvrr[4:], base=2), ttl_diff=ttld, nounce=noun...
Read Quick-Start Response option. Positional arguments: * size - int, length of option * kind - int, 27 (Quick-Start Response) Returns: * dict -- extracted Quick-Start Response (QS) option Structure of TCP QSopt [RFC 4782]: 0 ...
def _read_mode_utopt(self, size, kind): temp = self._read_fileng(size) data = dict( kind=kind, length=size, granularity='minutes' if int(temp[0]) else 'seconds', timeout=bytes(chr(int(temp[0:], base=2)), encoding='utf-8'), ) return...
Read User Timeout option. Positional arguments: * size - int, length of option * kind - int, 28 (User Timeout Option) Returns: * dict -- extracted User Timeout (TIMEOUT) option Structure of TCP TIMEOUT [RFC 5482]: 0 1 ...
def _read_mode_tcpao(self, size, kind): key_ = self._read_unpack(1) rkey = self._read_unpack(1) mac_ = self._read_fileng(size - 2) data = dict( kind=kind, length=size, keyid=key_, rnextkeyid=rkey, mac=mac_, ) ...
Read Authentication option. Positional arguments: * size - int, length of option * kind - int, 29 (TCP Authentication Option) Returns: * dict -- extracted Authentication (AO) option Structure of TCP AOopt [RFC 5925]: +------------+------------+-...
def _read_mode_mptcp(self, size, kind): bins = self._read_binary(1) subt = int(bins[:4], base=2) # subtype number bits = bins[4:] # 4-bit data dlen = size - 1 # length of remaining data # fetch subtype-specific data func = mptcp...
Read Multipath TCP option. Positional arguments: * size - int, length of option * kind - int, 30 (Multipath TCP) Returns: * dict -- extracted Multipath TCP (MP-TCP) option Structure of MP-TCP [RFC 6824]: 1 ...
def _read_mptcp_capable(self, bits, size, kind): vers = int(bits, base=2) bins = self._read_binary(1) skey = self._read_fileng(8) rkey = self._read_fileng(8) if size == 17 else None data = dict( kind=kind, length=size + 1, subtype='MP_...
Read Multipath Capable option. Positional arguments: * bits - str, 4-bit data * size - int, length of option * kind - int, 30 (Multipath TCP) Returns: * dict -- extracted Multipath Capable (MP_CAPABLE) option Structure of MP_CAPABLE [RFC 6824]: ...
def _read_mptcp_join(self, bits, size, kind): if self._syn and self._ack: # MP_JOIN-SYN/ACK return self._read_join_synack(bits, size, kind) elif self._syn: # MP_JOIN-SYN return self._read_join_syn(bits, size, kind) elif self._ack: ...
Read Join Connection option. Positional arguments: * bits - str, 4-bit data * size - int, length of option * kind - int, 30 (Multipath TCP) Returns: * dict -- extracted Join Connection (MP_JOIN) option Structure of MP_JOIN [RFC 6824]: ...
def _read_join_syn(self, bits, size, kind): adid = self._read_unpack(1) rtkn = self._read_fileng(4) srno = self._read_unpack(4) data = dict( kind=kind, length=size + 1, subtype='MP_JOIN-SYN', join=dict( syn=dict( ...
Read Join Connection option for Initial SYN. Positional arguments: * bits - str, 4-bit data * size - int, length of option * kind - int, 30 (Multipath TCP) Returns: * dict -- extracted Join Connection (MP_JOIN-SYN) option for Initial SYN Structu...
def _read_join_synack(self, bits, size, kind): adid = self._read_unpack(1) hmac = self._read_fileng(8) srno = self._read_unpack(4) data = dict( kind=kind, length=size + 1, subtype='MP_JOIN-SYN/ACK', join=dict( synac...
Read Join Connection option for Responding SYN/ACK. Positional arguments: * bits - str, 4-bit data * size - int, length of option * kind - int, 30 (Multipath TCP) Returns: * dict -- extracted Join Connection (MP_JOIN-SYN/ACK) option for Responding SYN/AC...
def _read_join_ack(self, bits, size, kind): temp = self._read_fileng(20) data = dict( kind=kind, length=size + 1, subtype='MP_JOIN-ACK', join=dict( ack=dict( hmac=temp, ), ), ...
Read Join Connection option for Third ACK. Positional arguments: * bits - str, 4-bit data * size - int, length of option * kind - int, 30 (Multipath TCP) Returns: * dict -- extracted Join Connection (MP_JOIN-ACK) option for Third ACK Structure o...
def _read_mptcp_dss(self, bits, size, kind): bits = self._read_binary(1) mflg = 8 if int(bits[4]) else 4 Mflg = True if int(bits[5]) else False aflg = 8 if int(bits[6]) else 4 Aflg = True if int(bits[7]) else False ack_ = self._read_fileng(aflg) if Aflg else None...
Read Data Sequence Signal (Data ACK and Data Sequence Mapping) option. Positional arguments: * bits - str, 4-bit data * size - int, length of option * kind - int, 30 (Multipath TCP) Returns: * dict -- extracted Data Sequence Signal (DSS) option ...
def _read_mptcp_add(self, bits, size, kind): vers = int(bits, base=2) adid = self._read_unpack(1) ipad = self._read_fileng(4) if vers == 4 else self._read_fileng(16) ip_l = 4 if vers == 4 else 16 pt_l = size - 1 - ip_l port = self._read_unpack(2) if pt_l else Non...
Read Add Address option. Positional arguments: * bits - str, 4-bit data * size - int, length of option * kind - int, 30 (Multipath TCP) Returns: * dict -- extracted Add Address (ADD_ADDR) option Structure of ADD_ADDR [RFC 6824]: ...
def _read_mptcp_remove(self, bits, size): adid = [] for _ in size: adid.append(self._read_unpack(1)) data = dict( subtype='REMOVE_ADDR', removeaddr=dict( addrid=adid or None, ), ) return data
Read Remove Address option. Positional arguments: * bits - str, 4-bit data * size - int, length of option Returns: * dict -- extracted Remove Address (REMOVE_ADDR) option Structure of REMOVE_ADDR [RFC 6824]: 1 ...
def _read_mptcp_prio(self, bits, size): temp = self._read_unpack(1) if size else None data = dict( subtype='MP_PRIO', prio=dict( res=b'\x00' * 3, backup=True if int(bits[3]) else False, addrid=temp, ), )...
Read Change Subflow Priority option. Positional arguments: * bits - str, 4-bit data * size - int, length of option Returns: * dict -- extracted Change Subflow Priority (MP_PRIO) option Structure of MP_PRIO [RFC 6824]: 1 ...
def _read_mptcp_fail(self, bits, size): ____ = self._read_fileng(1) dsn_ = self._read_unpack(8) data = dict( subtype='MP_FAIL', fail=dict( dsn=dsn_, ), ) return data
Read Fallback option. Positional arguments: * bits - str, 4-bit data * size - int, length of option Returns: * dict -- extracted Fallback (MP_FAIL) option Structure of MP_FAIL [RFC 6824]: 1 2 ...
def _read_mptcp_fastclose(self, bits, size): ____ = self._read_fileng(1) rkey = self._read_fileng(8) data = dict( subtype='MP_FASTCLOSE', fastclose=dict( rkey=rkey, ), ) return data
Read Fast Close option. Positional arguments: * bits - str, 4-bit data * size - int, length of option Returns: * dict -- extracted Fast Close (MP_FASTCLOSE) option Structure of MP_FASTCLOSE [RFC 6824]: 1 2 ...
def get(key, default=-1): if isinstance(key, int): return ESP_TransformSuite(key) if key not in ESP_TransformSuite._member_map_: extend_enum(ESP_TransformSuite, key, default) return ESP_TransformSuite[key]
Backport support for original codes.
def get(key, default=-1): if isinstance(key, int): return ClassificationLevel(key) if key not in ClassificationLevel._member_map_: extend_enum(ClassificationLevel, key, default) return ClassificationLevel[key]
Backport support for original codes.
def extract(fin=None, fout=None, format=None, # basic settings auto=True, extension=True, store=True, # internal settings files=False, nofile=False, verbose=False, # output settings engine=None, layer=None, protocol=Non...
Extract a PCAP file. Keyword arguments: * fin -- str, file name to be read; if file not exist, raise an error * fout -- str, file name to be written * format -- str, file format of output <keyword> 'plist' / 'json' / 'tree' / 'html' * auto -- bool, if auto...
def analyse(file, length=None): if isinstance(file, bytes): file = io.BytesIO(file) io_check(file) int_check(length or sys.maxsize) return analyse2(file, length)
Analyse application layer packets. Keyword arguments: * file -- bytes or file-like object, packet to be analysed * length -- int, length of the analysing packet Returns: * Analysis -- an Analysis object from `pcapkit.analyser`
def reassemble(protocol, strict=False): if isinstance(protocol, type) and issubclass(protocol, Protocol): protocol = protocol.__index__() str_check(protocol) bool_check(strict) if protocol == 'IPv4': return IPv4_Reassembly(strict=strict) elif protocol == 'IPv6': return I...
Reassemble fragmented datagrams. Keyword arguments: * protocol -- str, protocol to be reassembled * strict -- bool, if return all datagrams (including those not implemented) when submit (default is False) <keyword> True / False Returns: * [if protocol is IPv4] I...
def trace(fout=None, format=None, byteorder=sys.byteorder, nanosecond=False): str_check(fout or '', format or '') return TraceFlow(fout=fout, format=format, byteorder=byteorder, nanosecond=nanosecond)
Trace TCP flows. Keyword arguments: * fout -- str, output path * format -- str, output format * byteorder -- str, output file byte order * nanosecond -- bool, output nanosecond-resolution file flag
def get(key, default=-1): if isinstance(key, int): return TransType(key) if key not in TransType._member_map_: extend_enum(TransType, key, default) return TransType[key]
Backport support for original codes.
def read_ipv6_frag(self, length, extension): if length is None: length = len(self) _next = self._read_protos(1) _temp = self._read_fileng(1) _offm = self._read_binary(2) _ipid = self._read_unpack(4) ipv6_frag = dict( next=_next, ...
Read Fragment Header for IPv6. Structure of IPv6-Frag header [RFC 8200]: +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Next Header | Reserved | Fragment Offset |Res|M| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ...
def get(key, default=-1): if isinstance(key, int): return HI_Algorithm(key) if key not in HI_Algorithm._member_map_: extend_enum(HI_Algorithm, key, default) return HI_Algorithm[key]
Backport support for original codes.
def get(key, default=-1): if isinstance(key, int): return Parameter(key) if key not in Parameter._member_map_: extend_enum(Parameter, key, default) return Parameter[key]
Backport support for original codes.
def _missing_(cls, value): if not (isinstance(value, int) and 0 <= value <= 65535): raise ValueError('%r is not a valid %s' % (value, cls.__name__)) if 0 <= value <= 64: extend_enum(cls, 'Unassigned [%d]' % value, value) return cls(value) if 66 <= val...
Lookup function used when value is not found.
def read_ipv4(self, length): if length is None: length = len(self) _vihl = self._read_fileng(1).hex() _dscp = self._read_binary(1) _tlen = self._read_unpack(2) _iden = self._read_unpack(2) _frag = self._read_binary(2) _ttol = self._read_unpack...
Read Internet Protocol version 4 (IPv4). Structure of IPv4 header [RFC 791]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ...
def _read_opt_type(self, kind): bin_ = bin(kind)[2:].zfill(8) type_ = { 'copy': bool(int(bin_[0], base=2)), 'class': opt_class.get(int(bin_[1:3], base=2)), 'number': int(bin_[3:], base=2), } return type_
Read option type field. Positional arguments: * kind -- int, option kind value Returns: * dict -- extracted IPv4 option Structure of option type field [RFC 791]: Octets Bits Name Descriptions 0 0 i...
def _read_ipv4_options(self, size=None): counter = 0 # length of read option list optkind = list() # option kind list options = dict() # dict of option data while counter < size: # get option kind kind = self._read_unpack(1) # fe...
Read IPv4 option list. Positional arguments: * size -- int, buffer size Returns: * tuple -- IPv4 option list * dict -- extracted IPv4 option
def _read_mode_donone(self, size, kind): if size < 3: raise ProtocolError(f'{self.alias}: [Optno {kind}] invalid format') data = dict( kind=kind, type=self._read_opt_type(kind), length=size, data=self._read_fileng(size), ) ...
Read options request no process. Positional arguments: * size - int, length of option * kind - int, option kind value Returns: * dict -- extracted option Structure of IPv4 options: Octets Bits Name Description ...
def _read_mode_unpack(self, size, kind): if size < 3: raise ProtocolError(f'{self.alias}: [Optno {kind}] invalid format') data = dict( kind=kind, type=self._read_opt_type(kind), length=size, data=self._read_unpack(size), ) ...
Read options request unpack process. Positional arguments: * size - int, length of option * kind - int, option kind value Returns: * dict -- extracted option Structure of IPv4 options: Octets Bits Name Description ...