text_prompt
stringlengths
100
17.7k
code_prompt
stringlengths
7
9.86k
<SYSTEM_TASK:> Initialize each fields of the fields_desc dict, or use the cached <END_TASK> <USER_TASK:> Description: def do_init_cached_fields(self): """ Initialize each fields of the fields_desc dict, or use the cached fields information """
cls_name = self.__class__ # Build the fields information if Packet.class_default_fields.get(cls_name, None) is None: self.prepare_cached_fields(self.fields_desc) # Use fields information from cache if not Packet.class_default_fields.get(cls_name, None) is None: ...
<SYSTEM_TASK:> Prepare the cached fields of the fields_desc dict <END_TASK> <USER_TASK:> Description: def prepare_cached_fields(self, flist): """ Prepare the cached fields of the fields_desc dict """
cls_name = self.__class__ # Fields cache initialization if flist: Packet.class_default_fields[cls_name] = dict() Packet.class_default_fields_ref[cls_name] = list() Packet.class_fieldtype[cls_name] = dict() Packet.class_packetfields[cls_name] = l...
<SYSTEM_TASK:> Return a list of slots and methods, including those from subclasses. <END_TASK> <USER_TASK:> Description: def _superdir(self): """ Return a list of slots and methods, including those from subclasses. """
attrs = set() cls = self.__class__ if hasattr(cls, '__all_slots__'): attrs.update(cls.__all_slots__) for bcls in cls.__mro__: if hasattr(bcls, '__dict__'): attrs.update(bcls.__dict__) return attrs
<SYSTEM_TASK:> Clear the raw packet cache for the field and all its subfields <END_TASK> <USER_TASK:> Description: def clear_cache(self): """Clear the raw packet cache for the field and all its subfields"""
self.raw_packet_cache = None for _, fval in six.iteritems(self.fields): if isinstance(fval, Packet): fval.clear_cache() self.payload.clear_cache()
<SYSTEM_TASK:> Create the default layer regarding fields_desc dict <END_TASK> <USER_TASK:> Description: def self_build(self, field_pos_list=None): """ Create the default layer regarding fields_desc dict :param field_pos_list: """
if self.raw_packet_cache is not None: for fname, fval in six.iteritems(self.raw_packet_cache_fields): if self.getfieldval(fname) != fval: self.raw_packet_cache = None self.raw_packet_cache_fields = None self.wirelen = None ...
<SYSTEM_TASK:> Create the default version of the layer <END_TASK> <USER_TASK:> Description: def do_build(self): """ Create the default version of the layer :return: a string of the packet with the payload """
if not self.explicit: self = next(iter(self)) pkt = self.self_build() for t in self.post_transforms: pkt = t(pkt) pay = self.do_build_payload() if self.raw_packet_cache is None: return self.post_build(pkt, pay) else: return...
<SYSTEM_TASK:> Create the current layer <END_TASK> <USER_TASK:> Description: def build(self): """ Create the current layer :return: string of the packet with the payload """
p = self.do_build() p += self.build_padding() p = self.build_done(p) return p
<SYSTEM_TASK:> Perform the dissection of the layer's payload <END_TASK> <USER_TASK:> Description: def do_dissect_payload(self, s): """ Perform the dissection of the layer's payload :param str s: the raw layer """
if s: cls = self.guess_payload_class(s) try: p = cls(s, _internal=1, _underlayer=self) except KeyboardInterrupt: raise except Exception: if conf.debug_dissector: if issubtype(cls, Packet): ...
<SYSTEM_TASK:> Return the nb^th layer that is an instance of cls, matching flt <END_TASK> <USER_TASK:> Description: def getlayer(self, cls, nb=1, _track=None, _subclass=None, **flt): """Return the nb^th layer that is an instance of cls, matching flt values. """
if _subclass is None: _subclass = self.match_subclass or None if _subclass: match = lambda cls1, cls2: issubclass(cls1, cls2) else: match = lambda cls1, cls2: cls1 == cls2 if isinstance(cls, int): nb = cls + 1 cls = None ...
<SYSTEM_TASK:> Internal method that shows or dumps a hierarchical view of a packet. <END_TASK> <USER_TASK:> Description: def _show_or_dump(self, dump=False, indent=3, lvl="", label_lvl="", first_call=True): # noqa: E501 """ Internal method that shows or dumps a hierarchical view of a packet. Ca...
if dump: from scapy.themes import AnsiColorTheme ct = AnsiColorTheme() # No color for dump output else: ct = conf.color_theme s = "%s%s %s %s \n" % (label_lvl, ct.punct("###["), ct.layer_name(sel...
<SYSTEM_TASK:> XXX We should offer the right key according to the client's suites. For <END_TASK> <USER_TASK:> Description: def INIT_TLS_SESSION(self): """ XXX We should offer the right key according to the client's suites. For now server_rsa_key is only used for RSAkx, but we should try to repl...
self.cur_session = tlsSession(connection_end="server") self.cur_session.server_certs = [self.mycert] self.cur_session.server_key = self.mykey if isinstance(self.mykey, PrivKeyRSA): self.cur_session.server_rsa_key = self.mykey # elif isinstance(self.mykey, PrivKeyECDS...
<SYSTEM_TASK:> We extract cipher suites candidates from the client's proposition. <END_TASK> <USER_TASK:> Description: def should_check_ciphersuites(self): """ We extract cipher suites candidates from the client's proposition. """
if isinstance(self.mykey, PrivKeyRSA): kx = "RSA" elif isinstance(self.mykey, PrivKeyECDSA): kx = "ECDSA" if get_usable_ciphersuites(self.cur_pkt.ciphers, kx): return raise self.NO_USABLE_CIPHERSUITE()
<SYSTEM_TASK:> Selecting a cipher suite should be no trouble as we already caught <END_TASK> <USER_TASK:> Description: def should_add_ServerHello(self): """ Selecting a cipher suite should be no trouble as we already caught the None case previously. Also, we do not manage extensions at ...
if isinstance(self.mykey, PrivKeyRSA): kx = "RSA" elif isinstance(self.mykey, PrivKeyECDSA): kx = "ECDSA" usable_suites = get_usable_ciphersuites(self.cur_pkt.ciphers, kx) c = usable_suites[0] if self.preferred_ciphersuite in usable_suites: c ...
<SYSTEM_TASK:> Compute and install the PMK <END_TASK> <USER_TASK:> Description: def install_PMK(self): """Compute and install the PMK"""
self.pmk = PBKDF2HMAC( algorithm=hashes.SHA1(), length=32, salt=self.ssid.encode(), iterations=4096, backend=default_backend(), ).derive(self.passphrase.encode())
<SYSTEM_TASK:> Use the client nonce @client_nonce to compute and install <END_TASK> <USER_TASK:> Description: def install_unicast_keys(self, client_nonce): """Use the client nonce @client_nonce to compute and install PTK, KCK, KEK, TK, MIC (AP -> STA), MIC (STA -> AP) """
pmk = self.pmk anonce = self.anonce snonce = client_nonce amac = mac2str(self.mac) smac = mac2str(self.client) # Compute PTK self.ptk = customPRF512(pmk, amac, smac, anonce, snonce) # Extract derivated keys self.kck = self.ptk[:16] self....
<SYSTEM_TASK:> Send an encrypted packet with content @data, using IV @iv, <END_TASK> <USER_TASK:> Description: def send_wpa_enc(self, data, iv, seqnum, dest, mic_key, key_idx=0, additionnal_flag=["from-DS"], encrypt_key=None): """Send an encrypted packet with content @d...
if encrypt_key is None: encrypt_key = self.tk rep = RadioTap() rep /= Dot11( addr1=dest, addr2=self.mac, addr3=self.mac, FCfield="+".join(['protected'] + additionnal_flag), SC=(next(self.seq_num) << 4), subtyp...
<SYSTEM_TASK:> Send an Ethernet packet using the WPA channel <END_TASK> <USER_TASK:> Description: def send_ether_over_wpa(self, pkt, **kwargs): """Send an Ethernet packet using the WPA channel Extra arguments will be ignored, and are just left for compatibility """
payload = LLC() / SNAP() / pkt[Ether].payload dest = pkt.dst if dest == "ff:ff:ff:ff:ff:ff": self.send_wpa_to_group(payload, dest) else: assert dest == self.client self.send_wpa_to_client(payload)
<SYSTEM_TASK:> If the next message to be processed has type 'pkt_cls', raise 'state'. <END_TASK> <USER_TASK:> Description: def raise_on_packet(self, pkt_cls, state, get_next_msg=True): """ If the next message to be processed has type 'pkt_cls', raise 'state'. If there is no message waiting to be...
# Maybe we already parsed the expected packet, maybe not. if get_next_msg: self.get_next_msg() if (not self.buffer_in or not isinstance(self.buffer_in[0], pkt_cls)): return self.cur_pkt = self.buffer_in[0] self.buffer_in = self.buffer_in[1...
<SYSTEM_TASK:> Add a new TLS or SSLv2 or TLS 1.3 record to the packets buffered out. <END_TASK> <USER_TASK:> Description: def add_record(self, is_sslv2=None, is_tls13=None): """ Add a new TLS or SSLv2 or TLS 1.3 record to the packets buffered out. """
if is_sslv2 is None and is_tls13 is None: v = (self.cur_session.tls_version or self.cur_session.advertised_tls_version) if v in [0x0200, 0x0002]: is_sslv2 = True elif v >= 0x0304: is_tls13 = True if is_sslv2: ...
<SYSTEM_TASK:> Send all buffered records and update the session accordingly. <END_TASK> <USER_TASK:> Description: def flush_records(self): """ Send all buffered records and update the session accordingly. """
s = b"".join(p.raw_stateful() for p in self.buffer_out) self.socket.send(s) self.buffer_out = []
<SYSTEM_TASK:> Return the 48-byte master_secret, computed from pre_master_secret, <END_TASK> <USER_TASK:> Description: def compute_master_secret(self, pre_master_secret, client_random, server_random): """ Return the 48-byte master_secret, computed from pre_master_secret, ...
seed = client_random + server_random if self.tls_version < 0x0300: return None elif self.tls_version == 0x0300: return self.prf(pre_master_secret, seed, 48) else: return self.prf(pre_master_secret, b"master secret", seed, 48)
<SYSTEM_TASK:> Perform the derivation of master_secret into a key_block of req_len <END_TASK> <USER_TASK:> Description: def derive_key_block(self, master_secret, server_random, client_random, req_len): """ Perform the derivation of master_secret into a key_block of req_len ...
seed = server_random + client_random if self.tls_version <= 0x0300: return self.prf(master_secret, seed, req_len) else: return self.prf(master_secret, b"key expansion", seed, req_len)
<SYSTEM_TASK:> Return verify_data based on handshake messages, connection end, <END_TASK> <USER_TASK:> Description: def compute_verify_data(self, con_end, read_or_write, handshake_msg, master_secret): """ Return verify_data based on handshake messages, connection end, ...
if self.tls_version < 0x0300: return None elif self.tls_version == 0x0300: if read_or_write == "write": d = {"client": b"CLNT", "server": b"SRVR"} else: d = {"client": b"SRVR", "server": b"CLNT"} label = d[con_end] ...
<SYSTEM_TASK:> Postprocess cipher key for EXPORT ciphersuite, i.e. weakens it. <END_TASK> <USER_TASK:> Description: def postprocess_key_for_export(self, key, client_random, server_random, con_end, read_or_write, req_len): """ Postprocess cipher key for EXPORT ciphersui...
s = con_end + read_or_write s = (s == "clientwrite" or s == "serverread") if self.tls_version < 0x0300: return None elif self.tls_version == 0x0300: if s: tbh = key + client_random + server_random else: tbh = key + ser...