id
int32
0
252k
repo
stringlengths
7
55
path
stringlengths
4
127
func_name
stringlengths
1
88
original_string
stringlengths
75
19.8k
language
stringclasses
1 value
code
stringlengths
51
19.8k
code_tokens
list
docstring
stringlengths
3
17.3k
docstring_tokens
list
sha
stringlengths
40
40
url
stringlengths
87
242
1,200
JarryShaw/PyPCAPKit
src/protocols/internet/hip.py
HIP._read_para_reg_from
def _read_para_reg_from(self, code, cbit, clen, *, desc, length, version): """Read HIP REG_FROM parameter. Structure of HIP REG_FROM parameter [RFC 5770]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Type | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Port | Protocol | Reserved | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | | Address | | | | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Octets Bits Name Description 0 0 reg_from.type Parameter Type 1 15 reg_from.critical Critical Bit 2 16 reg_from.length Length of Contents 4 32 reg_from.port Port 6 48 reg_from.protocol Protocol 7 56 - Reserved 8 64 reg_from.ip Address (IPv6) """ if clen != 20: raise ProtocolError(f'HIPv{version}: [Parano {code}] invalid format') _port = self._read_unpack(2) _ptcl = self._read_unpack(1) _resv = self._read_fileng(1) _addr = self._read_fileng(16) reg_from = dict( type=desc, critical=cbit, length=clen, port=_port, protocol=TP_PROTO.get(_ptcl), ip=ipaddress.ip_address(_addr), ) return reg_from
python
def _read_para_reg_from(self, code, cbit, clen, *, desc, length, version): if clen != 20: raise ProtocolError(f'HIPv{version}: [Parano {code}] invalid format') _port = self._read_unpack(2) _ptcl = self._read_unpack(1) _resv = self._read_fileng(1) _addr = self._read_fileng(16) reg_from = dict( type=desc, critical=cbit, length=clen, port=_port, protocol=TP_PROTO.get(_ptcl), ip=ipaddress.ip_address(_addr), ) return reg_from
[ "def", "_read_para_reg_from", "(", "self", ",", "code", ",", "cbit", ",", "clen", ",", "*", ",", "desc", ",", "length", ",", "version", ")", ":", "if", "clen", "!=", "20", ":", "raise", "ProtocolError", "(", "f'HIPv{version}: [Parano {code}] invalid format'", ")", "_port", "=", "self", ".", "_read_unpack", "(", "2", ")", "_ptcl", "=", "self", ".", "_read_unpack", "(", "1", ")", "_resv", "=", "self", ".", "_read_fileng", "(", "1", ")", "_addr", "=", "self", ".", "_read_fileng", "(", "16", ")", "reg_from", "=", "dict", "(", "type", "=", "desc", ",", "critical", "=", "cbit", ",", "length", "=", "clen", ",", "port", "=", "_port", ",", "protocol", "=", "TP_PROTO", ".", "get", "(", "_ptcl", ")", ",", "ip", "=", "ipaddress", ".", "ip_address", "(", "_addr", ")", ",", ")", "return", "reg_from" ]
Read HIP REG_FROM parameter. Structure of HIP REG_FROM parameter [RFC 5770]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Type | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Port | Protocol | Reserved | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | | Address | | | | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Octets Bits Name Description 0 0 reg_from.type Parameter Type 1 15 reg_from.critical Critical Bit 2 16 reg_from.length Length of Contents 4 32 reg_from.port Port 6 48 reg_from.protocol Protocol 7 56 - Reserved 8 64 reg_from.ip Address (IPv6)
[ "Read", "HIP", "REG_FROM", "parameter", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/protocols/internet/hip.py#L1477-L1521
1,201
JarryShaw/PyPCAPKit
src/protocols/internet/hip.py
HIP._read_para_echo_response_signed
def _read_para_echo_response_signed(self, code, cbit, clen, *, desc, length, version): """Read HIP ECHO_RESPONSE_SIGNED parameter. Structure of HIP ECHO_RESPONSE_SIGNED parameter [RFC 7401]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Type | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Opaque data (variable length) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Octets Bits Name Description 0 0 echo_response_signed.type Parameter Type 1 15 echo_response_signed.critical Critical Bit 2 16 echo_response_signed.length Length of Contents 4 32 echo_response_signed.data Opaque Data """ _data = self._read_fileng(clen) echo_response_signed = dict( type=desc, critical=cbit, length=clen, data=_data, ) _plen = length - clen if _plen: self._read_fileng(_plen) return echo_response_signed
python
def _read_para_echo_response_signed(self, code, cbit, clen, *, desc, length, version): _data = self._read_fileng(clen) echo_response_signed = dict( type=desc, critical=cbit, length=clen, data=_data, ) _plen = length - clen if _plen: self._read_fileng(_plen) return echo_response_signed
[ "def", "_read_para_echo_response_signed", "(", "self", ",", "code", ",", "cbit", ",", "clen", ",", "*", ",", "desc", ",", "length", ",", "version", ")", ":", "_data", "=", "self", ".", "_read_fileng", "(", "clen", ")", "echo_response_signed", "=", "dict", "(", "type", "=", "desc", ",", "critical", "=", "cbit", ",", "length", "=", "clen", ",", "data", "=", "_data", ",", ")", "_plen", "=", "length", "-", "clen", "if", "_plen", ":", "self", ".", "_read_fileng", "(", "_plen", ")", "return", "echo_response_signed" ]
Read HIP ECHO_RESPONSE_SIGNED parameter. Structure of HIP ECHO_RESPONSE_SIGNED parameter [RFC 7401]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Type | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Opaque data (variable length) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Octets Bits Name Description 0 0 echo_response_signed.type Parameter Type 1 15 echo_response_signed.critical Critical Bit 2 16 echo_response_signed.length Length of Contents 4 32 echo_response_signed.data Opaque Data
[ "Read", "HIP", "ECHO_RESPONSE_SIGNED", "parameter", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/protocols/internet/hip.py#L1523-L1555
1,202
JarryShaw/PyPCAPKit
src/protocols/internet/hip.py
HIP._read_para_transport_format_list
def _read_para_transport_format_list(self, code, cbit, clen, *, desc, length, version): """Read HIP TRANSPORT_FORMAT_LIST parameter. Structure of HIP TRANSPORT_FORMAT_LIST parameter [RFC 7401]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Type | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | TF type #1 | TF type #2 / +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ / TF type #n | Padding | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Octets Bits Name Description 0 0 transport_format_list.type Parameter Type 1 15 transport_format_list.critical Critical Bit 2 16 transport_format_list.length Length of Contents 4 32 transport_format_list.tf_type TF Type ............ ? ? - Padding """ if clen % 2 != 0: raise ProtocolError(f'HIPv{version}: [Parano {code}] invalid format') _tfid = list() for _ in range(clen // 2): _tfid.append(self._read_unpack(2)) transport_format_list = dict( type=desc, critical=cbit, length=clen, tf_type=tuple(_tfid), ) _plen = length - clen if _plen: self._read_fileng(_plen) return transport_format_list
python
def _read_para_transport_format_list(self, code, cbit, clen, *, desc, length, version): if clen % 2 != 0: raise ProtocolError(f'HIPv{version}: [Parano {code}] invalid format') _tfid = list() for _ in range(clen // 2): _tfid.append(self._read_unpack(2)) transport_format_list = dict( type=desc, critical=cbit, length=clen, tf_type=tuple(_tfid), ) _plen = length - clen if _plen: self._read_fileng(_plen) return transport_format_list
[ "def", "_read_para_transport_format_list", "(", "self", ",", "code", ",", "cbit", ",", "clen", ",", "*", ",", "desc", ",", "length", ",", "version", ")", ":", "if", "clen", "%", "2", "!=", "0", ":", "raise", "ProtocolError", "(", "f'HIPv{version}: [Parano {code}] invalid format'", ")", "_tfid", "=", "list", "(", ")", "for", "_", "in", "range", "(", "clen", "//", "2", ")", ":", "_tfid", ".", "append", "(", "self", ".", "_read_unpack", "(", "2", ")", ")", "transport_format_list", "=", "dict", "(", "type", "=", "desc", ",", "critical", "=", "cbit", ",", "length", "=", "clen", ",", "tf_type", "=", "tuple", "(", "_tfid", ")", ",", ")", "_plen", "=", "length", "-", "clen", "if", "_plen", ":", "self", ".", "_read_fileng", "(", "_plen", ")", "return", "transport_format_list" ]
Read HIP TRANSPORT_FORMAT_LIST parameter. Structure of HIP TRANSPORT_FORMAT_LIST parameter [RFC 7401]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Type | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | TF type #1 | TF type #2 / +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ / TF type #n | Padding | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Octets Bits Name Description 0 0 transport_format_list.type Parameter Type 1 15 transport_format_list.critical Critical Bit 2 16 transport_format_list.length Length of Contents 4 32 transport_format_list.tf_type TF Type ............ ? ? - Padding
[ "Read", "HIP", "TRANSPORT_FORMAT_LIST", "parameter", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/protocols/internet/hip.py#L1557-L1598
1,203
JarryShaw/PyPCAPKit
src/protocols/internet/hip.py
HIP._read_para_esp_transform
def _read_para_esp_transform(self, code, cbit, clen, *, desc, length, version): """Read HIP ESP_TRANSFORM parameter. Structure of HIP ESP_TRANSFORM parameter [RFC 7402]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Type | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Reserved | Suite ID #1 | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Suite ID #2 | Suite ID #3 | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Suite ID #n | Padding | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Octets Bits Name Description 0 0 esp_transform.type Parameter Type 1 15 esp_transform.critical Critical Bit 2 16 esp_transform.length Length of Contents 4 32 - Reserved 6 48 esp_transform.id Suite ID ............ ? ? - Padding """ if clen % 2 != 0: raise ProtocolError(f'HIPv{version}: [Parano {code}] invalid format') _resv = self._read_fileng(2) _stid = list() for _ in range((clen - 2) // 2): _stid.append(_ESP_SUITE_ID.get(self._read_unpack(2), 'Unassigned')) esp_transform = dict( type=desc, critical=cbit, length=clen, id=tuple(_stid), ) _plen = length - clen if _plen: self._read_fileng(_plen) return esp_transform
python
def _read_para_esp_transform(self, code, cbit, clen, *, desc, length, version): if clen % 2 != 0: raise ProtocolError(f'HIPv{version}: [Parano {code}] invalid format') _resv = self._read_fileng(2) _stid = list() for _ in range((clen - 2) // 2): _stid.append(_ESP_SUITE_ID.get(self._read_unpack(2), 'Unassigned')) esp_transform = dict( type=desc, critical=cbit, length=clen, id=tuple(_stid), ) _plen = length - clen if _plen: self._read_fileng(_plen) return esp_transform
[ "def", "_read_para_esp_transform", "(", "self", ",", "code", ",", "cbit", ",", "clen", ",", "*", ",", "desc", ",", "length", ",", "version", ")", ":", "if", "clen", "%", "2", "!=", "0", ":", "raise", "ProtocolError", "(", "f'HIPv{version}: [Parano {code}] invalid format'", ")", "_resv", "=", "self", ".", "_read_fileng", "(", "2", ")", "_stid", "=", "list", "(", ")", "for", "_", "in", "range", "(", "(", "clen", "-", "2", ")", "//", "2", ")", ":", "_stid", ".", "append", "(", "_ESP_SUITE_ID", ".", "get", "(", "self", ".", "_read_unpack", "(", "2", ")", ",", "'Unassigned'", ")", ")", "esp_transform", "=", "dict", "(", "type", "=", "desc", ",", "critical", "=", "cbit", ",", "length", "=", "clen", ",", "id", "=", "tuple", "(", "_stid", ")", ",", ")", "_plen", "=", "length", "-", "clen", "if", "_plen", ":", "self", ".", "_read_fileng", "(", "_plen", ")", "return", "esp_transform" ]
Read HIP ESP_TRANSFORM parameter. Structure of HIP ESP_TRANSFORM parameter [RFC 7402]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Type | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Reserved | Suite ID #1 | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Suite ID #2 | Suite ID #3 | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Suite ID #n | Padding | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Octets Bits Name Description 0 0 esp_transform.type Parameter Type 1 15 esp_transform.critical Critical Bit 2 16 esp_transform.length Length of Contents 4 32 - Reserved 6 48 esp_transform.id Suite ID ............ ? ? - Padding
[ "Read", "HIP", "ESP_TRANSFORM", "parameter", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/protocols/internet/hip.py#L1600-L1645
1,204
JarryShaw/PyPCAPKit
src/protocols/internet/hip.py
HIP._read_para_seq_data
def _read_para_seq_data(self, code, cbit, clen, *, desc, length, version): """Read HIP SEQ_DATA parameter. Structure of HIP SEQ_DATA parameter [RFC 6078]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Type | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Sequence number | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Octets Bits Name Description 0 0 seq_data.type Parameter Type 1 15 seq_data.critical Critical Bit 2 16 seq_data.length Length of Contents 4 32 seq_data.seq Sequence number """ if clen != 4: raise ProtocolError(f'HIPv{version}: [Parano {code}] invalid format') _seqn = self._read_unpack(4) seq_data = dict( type=desc, critical=cbit, length=clen, seq=_seqn, ) return seq_data
python
def _read_para_seq_data(self, code, cbit, clen, *, desc, length, version): if clen != 4: raise ProtocolError(f'HIPv{version}: [Parano {code}] invalid format') _seqn = self._read_unpack(4) seq_data = dict( type=desc, critical=cbit, length=clen, seq=_seqn, ) return seq_data
[ "def", "_read_para_seq_data", "(", "self", ",", "code", ",", "cbit", ",", "clen", ",", "*", ",", "desc", ",", "length", ",", "version", ")", ":", "if", "clen", "!=", "4", ":", "raise", "ProtocolError", "(", "f'HIPv{version}: [Parano {code}] invalid format'", ")", "_seqn", "=", "self", ".", "_read_unpack", "(", "4", ")", "seq_data", "=", "dict", "(", "type", "=", "desc", ",", "critical", "=", "cbit", ",", "length", "=", "clen", ",", "seq", "=", "_seqn", ",", ")", "return", "seq_data" ]
Read HIP SEQ_DATA parameter. Structure of HIP SEQ_DATA parameter [RFC 6078]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Type | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Sequence number | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Octets Bits Name Description 0 0 seq_data.type Parameter Type 1 15 seq_data.critical Critical Bit 2 16 seq_data.length Length of Contents 4 32 seq_data.seq Sequence number
[ "Read", "HIP", "SEQ_DATA", "parameter", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/protocols/internet/hip.py#L1647-L1678
1,205
JarryShaw/PyPCAPKit
src/protocols/internet/hip.py
HIP._read_para_route_dst
def _read_para_route_dst(self, code, cbit, clen, *, desc, length, version): """Read HIP ROUTE_DST parameter. Structure of HIP ROUTE_DST parameter [RFC 6028]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Type | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Flags | Reserved | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | | HIT #1 | | | | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ . . . . . . +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | | HIT #n | | | | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Octets Bits Name Description 0 0 route_dst.type Parameter Type 1 15 route_dst.critical Critical Bit 2 16 route_dst.length Length of Contents 4 32 route_dst.flags Flags 4 32 route_dst.flags.symmetric SYMMETRIC [RFC 6028] 4 33 route_dst.flags.must_follow MUST_FOLLOW [RFC 6028] 6 48 - Reserved 8 64 route_dst.ip HIT ............ """ if (clen - 4) % 16 != 0: raise ProtocolError(f'HIPv{version}: [Parano {code}] invalid format') _flag = self._read_binary(2) _resv = self._read_fileng(2) _addr = list() for _ in range((clen - 4) // 16): _addr.append(ipaddress.ip_address(self._read_fileng(16))) route_dst = dict( type=desc, critical=cbit, length=clen, flags=dict( symmetric=True if int(_flag[0], base=2) else False, must_follow=True if int(_flag[1], base=2) else False, ), ip=tuple(_addr), ) return route_dst
python
def _read_para_route_dst(self, code, cbit, clen, *, desc, length, version): if (clen - 4) % 16 != 0: raise ProtocolError(f'HIPv{version}: [Parano {code}] invalid format') _flag = self._read_binary(2) _resv = self._read_fileng(2) _addr = list() for _ in range((clen - 4) // 16): _addr.append(ipaddress.ip_address(self._read_fileng(16))) route_dst = dict( type=desc, critical=cbit, length=clen, flags=dict( symmetric=True if int(_flag[0], base=2) else False, must_follow=True if int(_flag[1], base=2) else False, ), ip=tuple(_addr), ) return route_dst
[ "def", "_read_para_route_dst", "(", "self", ",", "code", ",", "cbit", ",", "clen", ",", "*", ",", "desc", ",", "length", ",", "version", ")", ":", "if", "(", "clen", "-", "4", ")", "%", "16", "!=", "0", ":", "raise", "ProtocolError", "(", "f'HIPv{version}: [Parano {code}] invalid format'", ")", "_flag", "=", "self", ".", "_read_binary", "(", "2", ")", "_resv", "=", "self", ".", "_read_fileng", "(", "2", ")", "_addr", "=", "list", "(", ")", "for", "_", "in", "range", "(", "(", "clen", "-", "4", ")", "//", "16", ")", ":", "_addr", ".", "append", "(", "ipaddress", ".", "ip_address", "(", "self", ".", "_read_fileng", "(", "16", ")", ")", ")", "route_dst", "=", "dict", "(", "type", "=", "desc", ",", "critical", "=", "cbit", ",", "length", "=", "clen", ",", "flags", "=", "dict", "(", "symmetric", "=", "True", "if", "int", "(", "_flag", "[", "0", "]", ",", "base", "=", "2", ")", "else", "False", ",", "must_follow", "=", "True", "if", "int", "(", "_flag", "[", "1", "]", ",", "base", "=", "2", ")", "else", "False", ",", ")", ",", "ip", "=", "tuple", "(", "_addr", ")", ",", ")", "return", "route_dst" ]
Read HIP ROUTE_DST parameter. Structure of HIP ROUTE_DST parameter [RFC 6028]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Type | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Flags | Reserved | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | | HIT #1 | | | | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ . . . . . . +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | | HIT #n | | | | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Octets Bits Name Description 0 0 route_dst.type Parameter Type 1 15 route_dst.critical Critical Bit 2 16 route_dst.length Length of Contents 4 32 route_dst.flags Flags 4 32 route_dst.flags.symmetric SYMMETRIC [RFC 6028] 4 33 route_dst.flags.must_follow MUST_FOLLOW [RFC 6028] 6 48 - Reserved 8 64 route_dst.ip HIT ............
[ "Read", "HIP", "ROUTE_DST", "parameter", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/protocols/internet/hip.py#L1838-L1895
1,206
JarryShaw/PyPCAPKit
src/protocols/internet/hip.py
HIP._read_para_hip_transport_mode
def _read_para_hip_transport_mode(self, code, cbit, clen, *, desc, length, version): """Read HIP HIP_TRANSPORT_MODE parameter. Structure of HIP HIP_TRANSPORT_MODE parameter [RFC 6261]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Type | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Port | Mode ID #1 | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Mode ID #2 | Mode ID #3 | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Mode ID #n | Padding | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Octets Bits Name Description 0 0 hip_transport_mode.type Parameter Type 1 15 hip_transport_mode.critical Critical Bit 2 16 hip_transport_mode.length Length of Contents 4 32 hip_transport_mode.port Port 6 48 hip_transport_mode.id Mode ID ............ ? ? - Padding """ if clen % 2 != 0: raise ProtocolError(f'HIPv{version}: [Parano {code}] invalid format') _port = self._read_unpack(2) _mdid = list() for _ in range((clen - 2) // 2): _mdid.append(_TP_MODE_ID.get(self._read_unpack(2), 'Unassigned')) hip_transport_mode = dict( type=desc, critical=cbit, length=clen, port=_port, id=tuple(_mdid), ) _plen = length - clen if _plen: self._read_fileng(_plen) return hip_transport_mode
python
def _read_para_hip_transport_mode(self, code, cbit, clen, *, desc, length, version): if clen % 2 != 0: raise ProtocolError(f'HIPv{version}: [Parano {code}] invalid format') _port = self._read_unpack(2) _mdid = list() for _ in range((clen - 2) // 2): _mdid.append(_TP_MODE_ID.get(self._read_unpack(2), 'Unassigned')) hip_transport_mode = dict( type=desc, critical=cbit, length=clen, port=_port, id=tuple(_mdid), ) _plen = length - clen if _plen: self._read_fileng(_plen) return hip_transport_mode
[ "def", "_read_para_hip_transport_mode", "(", "self", ",", "code", ",", "cbit", ",", "clen", ",", "*", ",", "desc", ",", "length", ",", "version", ")", ":", "if", "clen", "%", "2", "!=", "0", ":", "raise", "ProtocolError", "(", "f'HIPv{version}: [Parano {code}] invalid format'", ")", "_port", "=", "self", ".", "_read_unpack", "(", "2", ")", "_mdid", "=", "list", "(", ")", "for", "_", "in", "range", "(", "(", "clen", "-", "2", ")", "//", "2", ")", ":", "_mdid", ".", "append", "(", "_TP_MODE_ID", ".", "get", "(", "self", ".", "_read_unpack", "(", "2", ")", ",", "'Unassigned'", ")", ")", "hip_transport_mode", "=", "dict", "(", "type", "=", "desc", ",", "critical", "=", "cbit", ",", "length", "=", "clen", ",", "port", "=", "_port", ",", "id", "=", "tuple", "(", "_mdid", ")", ",", ")", "_plen", "=", "length", "-", "clen", "if", "_plen", ":", "self", ".", "_read_fileng", "(", "_plen", ")", "return", "hip_transport_mode" ]
Read HIP HIP_TRANSPORT_MODE parameter. Structure of HIP HIP_TRANSPORT_MODE parameter [RFC 6261]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Type | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Port | Mode ID #1 | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Mode ID #2 | Mode ID #3 | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Mode ID #n | Padding | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Octets Bits Name Description 0 0 hip_transport_mode.type Parameter Type 1 15 hip_transport_mode.critical Critical Bit 2 16 hip_transport_mode.length Length of Contents 4 32 hip_transport_mode.port Port 6 48 hip_transport_mode.id Mode ID ............ ? ? - Padding
[ "Read", "HIP", "HIP_TRANSPORT_MODE", "parameter", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/protocols/internet/hip.py#L1897-L1943
1,207
JarryShaw/PyPCAPKit
src/protocols/internet/hip.py
HIP._read_para_hip_mac
def _read_para_hip_mac(self, code, cbit, clen, *, desc, length, version): """Read HIP HIP_MAC parameter. Structure of HIP HIP_MAC parameter [RFC 7401]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Type | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | | HMAC | / / / +-------------------------------+ | | Padding | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Octets Bits Name Description 0 0 hip_mac.type Parameter Type 1 15 hip_mac.critical Critical Bit 2 16 hip_mac.length Length of Contents 4 32 hip_mac.hmac HMAC ? ? - Padding """ _hmac = self._read_fileng(clen) hip_mac = dict( type=desc, critical=cbit, length=clen, hmac=_hmac, ) _plen = length - clen if _plen: self._read_fileng(_plen) return hip_mac
python
def _read_para_hip_mac(self, code, cbit, clen, *, desc, length, version): _hmac = self._read_fileng(clen) hip_mac = dict( type=desc, critical=cbit, length=clen, hmac=_hmac, ) _plen = length - clen if _plen: self._read_fileng(_plen) return hip_mac
[ "def", "_read_para_hip_mac", "(", "self", ",", "code", ",", "cbit", ",", "clen", ",", "*", ",", "desc", ",", "length", ",", "version", ")", ":", "_hmac", "=", "self", ".", "_read_fileng", "(", "clen", ")", "hip_mac", "=", "dict", "(", "type", "=", "desc", ",", "critical", "=", "cbit", ",", "length", "=", "clen", ",", "hmac", "=", "_hmac", ",", ")", "_plen", "=", "length", "-", "clen", "if", "_plen", ":", "self", ".", "_read_fileng", "(", "_plen", ")", "return", "hip_mac" ]
Read HIP HIP_MAC parameter. Structure of HIP HIP_MAC parameter [RFC 7401]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Type | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | | HMAC | / / / +-------------------------------+ | | Padding | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Octets Bits Name Description 0 0 hip_mac.type Parameter Type 1 15 hip_mac.critical Critical Bit 2 16 hip_mac.length Length of Contents 4 32 hip_mac.hmac HMAC ? ? - Padding
[ "Read", "HIP", "HIP_MAC", "parameter", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/protocols/internet/hip.py#L1945-L1982
1,208
JarryShaw/PyPCAPKit
src/protocols/internet/hip.py
HIP._read_para_hip_mac_2
def _read_para_hip_mac_2(self, code, cbit, clen, *, desc, length, version): """Read HIP HIP_MAC_2 parameter. Structure of HIP HIP_MAC_2 parameter [RFC 7401]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Type | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | | HMAC | / / / +-------------------------------+ | | Padding | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Octets Bits Name Description 0 0 hip_mac_2.type Parameter Type 1 15 hip_mac_2.critical Critical Bit 2 16 hip_mac_2.length Length of Contents 4 32 hip_mac_2.hmac HMAC ? ? - Padding """ _hmac = self._read_fileng(clen) hip_mac_2 = dict( type=desc, critical=cbit, length=clen, hmac=_hmac, ) _plen = length - clen if _plen: self._read_fileng(_plen) return hip_mac_2
python
def _read_para_hip_mac_2(self, code, cbit, clen, *, desc, length, version): _hmac = self._read_fileng(clen) hip_mac_2 = dict( type=desc, critical=cbit, length=clen, hmac=_hmac, ) _plen = length - clen if _plen: self._read_fileng(_plen) return hip_mac_2
[ "def", "_read_para_hip_mac_2", "(", "self", ",", "code", ",", "cbit", ",", "clen", ",", "*", ",", "desc", ",", "length", ",", "version", ")", ":", "_hmac", "=", "self", ".", "_read_fileng", "(", "clen", ")", "hip_mac_2", "=", "dict", "(", "type", "=", "desc", ",", "critical", "=", "cbit", ",", "length", "=", "clen", ",", "hmac", "=", "_hmac", ",", ")", "_plen", "=", "length", "-", "clen", "if", "_plen", ":", "self", ".", "_read_fileng", "(", "_plen", ")", "return", "hip_mac_2" ]
Read HIP HIP_MAC_2 parameter. Structure of HIP HIP_MAC_2 parameter [RFC 7401]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Type | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | | HMAC | / / / +-------------------------------+ | | Padding | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Octets Bits Name Description 0 0 hip_mac_2.type Parameter Type 1 15 hip_mac_2.critical Critical Bit 2 16 hip_mac_2.length Length of Contents 4 32 hip_mac_2.hmac HMAC ? ? - Padding
[ "Read", "HIP", "HIP_MAC_2", "parameter", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/protocols/internet/hip.py#L1984-L2021
1,209
JarryShaw/PyPCAPKit
src/protocols/internet/hip.py
HIP._read_para_hip_signature_2
def _read_para_hip_signature_2(self, code, cbit, clen, *, desc, length, version): """Read HIP HIP_SIGNATURE_2 parameter. Structure of HIP HIP_SIGNATURE_2 parameter [RFC 7401]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Type | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | SIG alg | Signature / +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ / | Padding | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Octets Bits Name Description 0 0 hip_signature_2.type Parameter Type 1 15 hip_signature_2.critical Critical Bit 2 16 hip_signature_2.length Length of Contents 4 32 hip_signature_2.algorithm SIG Algorithm 6 48 hip_signature_2.signature Signature ? ? - Padding """ _algo = self._read_unpack(2) _sign = self._read_fileng(clen-2) hip_signature_2 = dict( type=desc, critical=cbit, length=clen, algorithm=_HI_ALGORITHM.get(_algo, 'Unassigned'), signature=_sign, ) _plen = length - clen if _plen: self._read_fileng(_plen) return hip_signature_2
python
def _read_para_hip_signature_2(self, code, cbit, clen, *, desc, length, version): _algo = self._read_unpack(2) _sign = self._read_fileng(clen-2) hip_signature_2 = dict( type=desc, critical=cbit, length=clen, algorithm=_HI_ALGORITHM.get(_algo, 'Unassigned'), signature=_sign, ) _plen = length - clen if _plen: self._read_fileng(_plen) return hip_signature_2
[ "def", "_read_para_hip_signature_2", "(", "self", ",", "code", ",", "cbit", ",", "clen", ",", "*", ",", "desc", ",", "length", ",", "version", ")", ":", "_algo", "=", "self", ".", "_read_unpack", "(", "2", ")", "_sign", "=", "self", ".", "_read_fileng", "(", "clen", "-", "2", ")", "hip_signature_2", "=", "dict", "(", "type", "=", "desc", ",", "critical", "=", "cbit", ",", "length", "=", "clen", ",", "algorithm", "=", "_HI_ALGORITHM", ".", "get", "(", "_algo", ",", "'Unassigned'", ")", ",", "signature", "=", "_sign", ",", ")", "_plen", "=", "length", "-", "clen", "if", "_plen", ":", "self", ".", "_read_fileng", "(", "_plen", ")", "return", "hip_signature_2" ]
Read HIP HIP_SIGNATURE_2 parameter. Structure of HIP HIP_SIGNATURE_2 parameter [RFC 7401]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Type | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | SIG alg | Signature / +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ / | Padding | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Octets Bits Name Description 0 0 hip_signature_2.type Parameter Type 1 15 hip_signature_2.critical Critical Bit 2 16 hip_signature_2.length Length of Contents 4 32 hip_signature_2.algorithm SIG Algorithm 6 48 hip_signature_2.signature Signature ? ? - Padding
[ "Read", "HIP", "HIP_SIGNATURE_2", "parameter", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/protocols/internet/hip.py#L2023-L2061
1,210
JarryShaw/PyPCAPKit
src/protocols/internet/hip.py
HIP._read_para_echo_request_unsigned
def _read_para_echo_request_unsigned(self, code, cbit, clen, *, desc, length, version): """Read HIP ECHO_REQUEST_UNSIGNED parameter. Structure of HIP ECHO_REQUEST_UNSIGNED parameter [RFC 7401]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Type | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Opaque data (variable length) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Octets Bits Name Description 0 0 echo_request_unsigned.type Parameter Type 1 15 echo_request_unsigned.critical Critical Bit 2 16 echo_request_unsigned.length Length of Contents 4 32 echo_request_unsigned.data Opaque Data """ _data = self._read_fileng(clen) echo_request_unsigned = dict( type=desc, critical=cbit, length=clen, data=_data, ) _plen = length - clen if _plen: self._read_fileng(_plen) return echo_request_unsigned
python
def _read_para_echo_request_unsigned(self, code, cbit, clen, *, desc, length, version): _data = self._read_fileng(clen) echo_request_unsigned = dict( type=desc, critical=cbit, length=clen, data=_data, ) _plen = length - clen if _plen: self._read_fileng(_plen) return echo_request_unsigned
[ "def", "_read_para_echo_request_unsigned", "(", "self", ",", "code", ",", "cbit", ",", "clen", ",", "*", ",", "desc", ",", "length", ",", "version", ")", ":", "_data", "=", "self", ".", "_read_fileng", "(", "clen", ")", "echo_request_unsigned", "=", "dict", "(", "type", "=", "desc", ",", "critical", "=", "cbit", ",", "length", "=", "clen", ",", "data", "=", "_data", ",", ")", "_plen", "=", "length", "-", "clen", "if", "_plen", ":", "self", ".", "_read_fileng", "(", "_plen", ")", "return", "echo_request_unsigned" ]
Read HIP ECHO_REQUEST_UNSIGNED parameter. Structure of HIP ECHO_REQUEST_UNSIGNED parameter [RFC 7401]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Type | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Opaque data (variable length) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Octets Bits Name Description 0 0 echo_request_unsigned.type Parameter Type 1 15 echo_request_unsigned.critical Critical Bit 2 16 echo_request_unsigned.length Length of Contents 4 32 echo_request_unsigned.data Opaque Data
[ "Read", "HIP", "ECHO_REQUEST_UNSIGNED", "parameter", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/protocols/internet/hip.py#L2103-L2135
1,211
JarryShaw/PyPCAPKit
src/protocols/internet/hip.py
HIP._read_para_echo_response_unsigned
def _read_para_echo_response_unsigned(self, code, cbit, clen, *, desc, length, version): """Read HIP ECHO_RESPONSE_UNSIGNED parameter. Structure of HIP ECHO_RESPONSE_UNSIGNED parameter [RFC 7401]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Type | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Opaque data (variable length) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Octets Bits Name Description 0 0 echo_response_unsigned.type Parameter Type 1 15 echo_response_unsigned.critical Critical Bit 2 16 echo_response_unsigned.length Length of Contents 4 32 echo_response_unsigned.data Opaque Data """ _data = self._read_fileng(clen) echo_response_unsigned = dict( type=desc, critical=cbit, length=clen, data=_data, ) _plen = length - clen if _plen: self._read_fileng(_plen) return echo_response_unsigned
python
def _read_para_echo_response_unsigned(self, code, cbit, clen, *, desc, length, version): _data = self._read_fileng(clen) echo_response_unsigned = dict( type=desc, critical=cbit, length=clen, data=_data, ) _plen = length - clen if _plen: self._read_fileng(_plen) return echo_response_unsigned
[ "def", "_read_para_echo_response_unsigned", "(", "self", ",", "code", ",", "cbit", ",", "clen", ",", "*", ",", "desc", ",", "length", ",", "version", ")", ":", "_data", "=", "self", ".", "_read_fileng", "(", "clen", ")", "echo_response_unsigned", "=", "dict", "(", "type", "=", "desc", ",", "critical", "=", "cbit", ",", "length", "=", "clen", ",", "data", "=", "_data", ",", ")", "_plen", "=", "length", "-", "clen", "if", "_plen", ":", "self", ".", "_read_fileng", "(", "_plen", ")", "return", "echo_response_unsigned" ]
Read HIP ECHO_RESPONSE_UNSIGNED parameter. Structure of HIP ECHO_RESPONSE_UNSIGNED parameter [RFC 7401]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Type | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Opaque data (variable length) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Octets Bits Name Description 0 0 echo_response_unsigned.type Parameter Type 1 15 echo_response_unsigned.critical Critical Bit 2 16 echo_response_unsigned.length Length of Contents 4 32 echo_response_unsigned.data Opaque Data
[ "Read", "HIP", "ECHO_RESPONSE_UNSIGNED", "parameter", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/protocols/internet/hip.py#L2137-L2169
1,212
JarryShaw/PyPCAPKit
src/protocols/internet/hip.py
HIP._read_para_overlay_ttl
def _read_para_overlay_ttl(self, code, cbit, clen, *, desc, length, version): """Read HIP OVERLAY_TTL parameter. Structure of HIP OVERLAY_TTL parameter [RFC 6078]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Type | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | TTL | Reserved | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Octets Bits Name Description 0 0 overlay_ttl.type Parameter Type 1 15 overlay_ttl.critical Critical Bit 2 16 overlay_ttl.length Length of Contents 4 32 overlay_ttl.ttl TTL 6 48 - Reserved """ if clen != 4: raise ProtocolError(f'HIPv{version}: [Parano {code}] invalid format') _ttln = self._read_unpack(2) overlay_ttl = dict( type=desc, critical=cbit, length=clen, ttl=_ttln, ) return overlay_ttl
python
def _read_para_overlay_ttl(self, code, cbit, clen, *, desc, length, version): if clen != 4: raise ProtocolError(f'HIPv{version}: [Parano {code}] invalid format') _ttln = self._read_unpack(2) overlay_ttl = dict( type=desc, critical=cbit, length=clen, ttl=_ttln, ) return overlay_ttl
[ "def", "_read_para_overlay_ttl", "(", "self", ",", "code", ",", "cbit", ",", "clen", ",", "*", ",", "desc", ",", "length", ",", "version", ")", ":", "if", "clen", "!=", "4", ":", "raise", "ProtocolError", "(", "f'HIPv{version}: [Parano {code}] invalid format'", ")", "_ttln", "=", "self", ".", "_read_unpack", "(", "2", ")", "overlay_ttl", "=", "dict", "(", "type", "=", "desc", ",", "critical", "=", "cbit", ",", "length", "=", "clen", ",", "ttl", "=", "_ttln", ",", ")", "return", "overlay_ttl" ]
Read HIP OVERLAY_TTL parameter. Structure of HIP OVERLAY_TTL parameter [RFC 6078]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Type | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | TTL | Reserved | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Octets Bits Name Description 0 0 overlay_ttl.type Parameter Type 1 15 overlay_ttl.critical Critical Bit 2 16 overlay_ttl.length Length of Contents 4 32 overlay_ttl.ttl TTL 6 48 - Reserved
[ "Read", "HIP", "OVERLAY_TTL", "parameter", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/protocols/internet/hip.py#L2263-L2295
1,213
JarryShaw/PyPCAPKit
src/protocols/internet/hip.py
HIP._read_para_from
def _read_para_from(self, code, cbit, clen, *, desc, length, version): """Read HIP FROM parameter. Structure of HIP FROM parameter [RFC 8004]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Type | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | | Address | | | | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Octets Bits Name Description 0 0 from.type Parameter Type 1 15 from.critical Critical Bit 2 16 from.length Length of Contents 4 32 from.ip Address """ if clen != 16: raise ProtocolError(f'HIPv{version}: [Parano {code}] invalid format') _addr = self._read_fileng(16) from_ = dict( type=desc, critical=cbit, length=clen, ip=ipaddress.ip_address(_addr), ) return from_
python
def _read_para_from(self, code, cbit, clen, *, desc, length, version): if clen != 16: raise ProtocolError(f'HIPv{version}: [Parano {code}] invalid format') _addr = self._read_fileng(16) from_ = dict( type=desc, critical=cbit, length=clen, ip=ipaddress.ip_address(_addr), ) return from_
[ "def", "_read_para_from", "(", "self", ",", "code", ",", "cbit", ",", "clen", ",", "*", ",", "desc", ",", "length", ",", "version", ")", ":", "if", "clen", "!=", "16", ":", "raise", "ProtocolError", "(", "f'HIPv{version}: [Parano {code}] invalid format'", ")", "_addr", "=", "self", ".", "_read_fileng", "(", "16", ")", "from_", "=", "dict", "(", "type", "=", "desc", ",", "critical", "=", "cbit", ",", "length", "=", "clen", ",", "ip", "=", "ipaddress", ".", "ip_address", "(", "_addr", ")", ",", ")", "return", "from_" ]
Read HIP FROM parameter. Structure of HIP FROM parameter [RFC 8004]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Type | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | | Address | | | | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Octets Bits Name Description 0 0 from.type Parameter Type 1 15 from.critical Critical Bit 2 16 from.length Length of Contents 4 32 from.ip Address
[ "Read", "HIP", "FROM", "parameter", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/protocols/internet/hip.py#L2356-L2390
1,214
JarryShaw/PyPCAPKit
src/protocols/internet/hip.py
HIP._read_para_rvs_hmac
def _read_para_rvs_hmac(self, code, cbit, clen, *, desc, length, version): """Read HIP RVS_HMAC parameter. Structure of HIP RVS_HMAC parameter [RFC 8004]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | | HMAC | / / / +-------------------------------+ | | Padding | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Octets Bits Name Description 0 0 rvs_hmac.type Parameter Type 1 15 rvs_hmac.critical Critical Bit 2 16 rvs_hmac.length Length of Contents 4 32 rvs_hmac.hmac HMAC ? ? - Padding """ _hmac = self._read_fileng(clen) rvs_hmac = dict( type=desc, critical=cbit, length=clen, hmac=_hmac, ) _plen = length - clen if _plen: self._read_fileng(_plen) return rvs_hmac
python
def _read_para_rvs_hmac(self, code, cbit, clen, *, desc, length, version): _hmac = self._read_fileng(clen) rvs_hmac = dict( type=desc, critical=cbit, length=clen, hmac=_hmac, ) _plen = length - clen if _plen: self._read_fileng(_plen) return rvs_hmac
[ "def", "_read_para_rvs_hmac", "(", "self", ",", "code", ",", "cbit", ",", "clen", ",", "*", ",", "desc", ",", "length", ",", "version", ")", ":", "_hmac", "=", "self", ".", "_read_fileng", "(", "clen", ")", "rvs_hmac", "=", "dict", "(", "type", "=", "desc", ",", "critical", "=", "cbit", ",", "length", "=", "clen", ",", "hmac", "=", "_hmac", ",", ")", "_plen", "=", "length", "-", "clen", "if", "_plen", ":", "self", ".", "_read_fileng", "(", "_plen", ")", "return", "rvs_hmac" ]
Read HIP RVS_HMAC parameter. Structure of HIP RVS_HMAC parameter [RFC 8004]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | | HMAC | / / / +-------------------------------+ | | Padding | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Octets Bits Name Description 0 0 rvs_hmac.type Parameter Type 1 15 rvs_hmac.critical Critical Bit 2 16 rvs_hmac.length Length of Contents 4 32 rvs_hmac.hmac HMAC ? ? - Padding
[ "Read", "HIP", "RVS_HMAC", "parameter", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/protocols/internet/hip.py#L2392-L2427
1,215
JarryShaw/PyPCAPKit
src/protocols/internet/hip.py
HIP._read_para_via_rvs
def _read_para_via_rvs(self, code, cbit, clen, *, desc, length, version): """Read HIP VIA_RVS parameter. Structure of HIP VIA_RVS parameter [RFC 6028]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Type | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | | Address | | | | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ . . . . . . +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | | Address | | | | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Octets Bits Name Description 0 0 via_rvs.type Parameter Type 1 15 via_rvs.critical Critical Bit 2 16 via_rvs.length Length of Contents 4 32 via_rvs.ip Address ............ """ if clen % 16 != 0: raise ProtocolError(f'HIPv{version}: [Parano {code}] invalid format') _addr = list() for _ in range(clen // 16): _addr.append(ipaddress.ip_address(self._read_fileng(16))) via_rvs = dict( type=desc, critical=cbit, length=clen, ip=tuple(_addr), ) return via_rvs
python
def _read_para_via_rvs(self, code, cbit, clen, *, desc, length, version): if clen % 16 != 0: raise ProtocolError(f'HIPv{version}: [Parano {code}] invalid format') _addr = list() for _ in range(clen // 16): _addr.append(ipaddress.ip_address(self._read_fileng(16))) via_rvs = dict( type=desc, critical=cbit, length=clen, ip=tuple(_addr), ) return via_rvs
[ "def", "_read_para_via_rvs", "(", "self", ",", "code", ",", "cbit", ",", "clen", ",", "*", ",", "desc", ",", "length", ",", "version", ")", ":", "if", "clen", "%", "16", "!=", "0", ":", "raise", "ProtocolError", "(", "f'HIPv{version}: [Parano {code}] invalid format'", ")", "_addr", "=", "list", "(", ")", "for", "_", "in", "range", "(", "clen", "//", "16", ")", ":", "_addr", ".", "append", "(", "ipaddress", ".", "ip_address", "(", "self", ".", "_read_fileng", "(", "16", ")", ")", ")", "via_rvs", "=", "dict", "(", "type", "=", "desc", ",", "critical", "=", "cbit", ",", "length", "=", "clen", ",", "ip", "=", "tuple", "(", "_addr", ")", ",", ")", "return", "via_rvs" ]
Read HIP VIA_RVS parameter. Structure of HIP VIA_RVS parameter [RFC 6028]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Type | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | | Address | | | | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ . . . . . . +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | | Address | | | | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Octets Bits Name Description 0 0 via_rvs.type Parameter Type 1 15 via_rvs.critical Critical Bit 2 16 via_rvs.length Length of Contents 4 32 via_rvs.ip Address ............
[ "Read", "HIP", "VIA_RVS", "parameter", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/protocols/internet/hip.py#L2429-L2474
1,216
JarryShaw/PyPCAPKit
src/protocols/internet/hip.py
HIP._read_para_relay_hmac
def _read_para_relay_hmac(self, code, cbit, clen, *, desc, length, version): """Read HIP RELAY_HMAC parameter. Structure of HIP RELAY_HMAC parameter [RFC 5770]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | | HMAC | / / / +-------------------------------+ | | Padding | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Octets Bits Name Description 0 0 relay_hmac.type Parameter Type 1 15 relay_hmac.critical Critical Bit 2 16 relay_hmac.length Length of Contents 4 32 relay_hmac.hmac HMAC ? ? - Padding """ _hmac = self._read_fileng(clen) relay_hmac = dict( type=desc, critical=cbit, length=clen, hmac=_hmac, ) _plen = length - clen if _plen: self._read_fileng(_plen) return relay_hmac
python
def _read_para_relay_hmac(self, code, cbit, clen, *, desc, length, version): _hmac = self._read_fileng(clen) relay_hmac = dict( type=desc, critical=cbit, length=clen, hmac=_hmac, ) _plen = length - clen if _plen: self._read_fileng(_plen) return relay_hmac
[ "def", "_read_para_relay_hmac", "(", "self", ",", "code", ",", "cbit", ",", "clen", ",", "*", ",", "desc", ",", "length", ",", "version", ")", ":", "_hmac", "=", "self", ".", "_read_fileng", "(", "clen", ")", "relay_hmac", "=", "dict", "(", "type", "=", "desc", ",", "critical", "=", "cbit", ",", "length", "=", "clen", ",", "hmac", "=", "_hmac", ",", ")", "_plen", "=", "length", "-", "clen", "if", "_plen", ":", "self", ".", "_read_fileng", "(", "_plen", ")", "return", "relay_hmac" ]
Read HIP RELAY_HMAC parameter. Structure of HIP RELAY_HMAC parameter [RFC 5770]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | | HMAC | / / / +-------------------------------+ | | Padding | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Octets Bits Name Description 0 0 relay_hmac.type Parameter Type 1 15 relay_hmac.critical Critical Bit 2 16 relay_hmac.length Length of Contents 4 32 relay_hmac.hmac HMAC ? ? - Padding
[ "Read", "HIP", "RELAY_HMAC", "parameter", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/protocols/internet/hip.py#L2476-L2511
1,217
JarryShaw/PyPCAPKit
src/utilities/exceptions.py
stacklevel
def stacklevel(): """Fetch current stack level.""" pcapkit = f'{os.path.sep}pcapkit{os.path.sep}' tb = traceback.extract_stack() for index, tbitem in enumerate(tb): if pcapkit in tbitem[0]: break else: index = len(tb) return (index-1)
python
def stacklevel(): pcapkit = f'{os.path.sep}pcapkit{os.path.sep}' tb = traceback.extract_stack() for index, tbitem in enumerate(tb): if pcapkit in tbitem[0]: break else: index = len(tb) return (index-1)
[ "def", "stacklevel", "(", ")", ":", "pcapkit", "=", "f'{os.path.sep}pcapkit{os.path.sep}'", "tb", "=", "traceback", ".", "extract_stack", "(", ")", "for", "index", ",", "tbitem", "in", "enumerate", "(", "tb", ")", ":", "if", "pcapkit", "in", "tbitem", "[", "0", "]", ":", "break", "else", ":", "index", "=", "len", "(", "tb", ")", "return", "(", "index", "-", "1", ")" ]
Fetch current stack level.
[ "Fetch", "current", "stack", "level", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/utilities/exceptions.py#L46-L55
1,218
JarryShaw/PyPCAPKit
src/utilities/decorators.py
seekset_ng
def seekset_ng(func): """Read file from start then set back to original.""" @functools.wraps(func) def seekcur(file, *args, seekset=os.SEEK_SET, **kw): # seek_cur = file.tell() file.seek(seekset, os.SEEK_SET) return_ = func(file, *args, seekset=seekset, **kw) # file.seek(seek_cur, os.SEEK_SET) return return_ return seekcur
python
def seekset_ng(func): @functools.wraps(func) def seekcur(file, *args, seekset=os.SEEK_SET, **kw): # seek_cur = file.tell() file.seek(seekset, os.SEEK_SET) return_ = func(file, *args, seekset=seekset, **kw) # file.seek(seek_cur, os.SEEK_SET) return return_ return seekcur
[ "def", "seekset_ng", "(", "func", ")", ":", "@", "functools", ".", "wraps", "(", "func", ")", "def", "seekcur", "(", "file", ",", "*", "args", ",", "seekset", "=", "os", ".", "SEEK_SET", ",", "*", "*", "kw", ")", ":", "# seek_cur = file.tell()", "file", ".", "seek", "(", "seekset", ",", "os", ".", "SEEK_SET", ")", "return_", "=", "func", "(", "file", ",", "*", "args", ",", "seekset", "=", "seekset", ",", "*", "*", "kw", ")", "# file.seek(seek_cur, os.SEEK_SET)", "return", "return_", "return", "seekcur" ]
Read file from start then set back to original.
[ "Read", "file", "from", "start", "then", "set", "back", "to", "original", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/utilities/decorators.py#L33-L42
1,219
JarryShaw/PyPCAPKit
src/utilities/decorators.py
beholder_ng
def beholder_ng(func): """Behold analysis procedure.""" @functools.wraps(func) def behold(file, length, *args, **kwargs): seek_cur = file.tell() try: return func(file, length, *args, **kwargs) except Exception: # from pcapkit.foundation.analysis import analyse from pcapkit.protocols.raw import Raw error = traceback.format_exc(limit=1).strip().split(os.linesep)[-1] # error = traceback.format_exc() file.seek(seek_cur, os.SEEK_SET) # raw = Raw(file, length, error=str(error)) # return analyse(raw.info, raw.protochain, raw.alias) next_ = Raw(file, length, error=error) return next_ return behold
python
def beholder_ng(func): @functools.wraps(func) def behold(file, length, *args, **kwargs): seek_cur = file.tell() try: return func(file, length, *args, **kwargs) except Exception: # from pcapkit.foundation.analysis import analyse from pcapkit.protocols.raw import Raw error = traceback.format_exc(limit=1).strip().split(os.linesep)[-1] # error = traceback.format_exc() file.seek(seek_cur, os.SEEK_SET) # raw = Raw(file, length, error=str(error)) # return analyse(raw.info, raw.protochain, raw.alias) next_ = Raw(file, length, error=error) return next_ return behold
[ "def", "beholder_ng", "(", "func", ")", ":", "@", "functools", ".", "wraps", "(", "func", ")", "def", "behold", "(", "file", ",", "length", ",", "*", "args", ",", "*", "*", "kwargs", ")", ":", "seek_cur", "=", "file", ".", "tell", "(", ")", "try", ":", "return", "func", "(", "file", ",", "length", ",", "*", "args", ",", "*", "*", "kwargs", ")", "except", "Exception", ":", "# from pcapkit.foundation.analysis import analyse", "from", "pcapkit", ".", "protocols", ".", "raw", "import", "Raw", "error", "=", "traceback", ".", "format_exc", "(", "limit", "=", "1", ")", ".", "strip", "(", ")", ".", "split", "(", "os", ".", "linesep", ")", "[", "-", "1", "]", "# error = traceback.format_exc()", "file", ".", "seek", "(", "seek_cur", ",", "os", ".", "SEEK_SET", ")", "# raw = Raw(file, length, error=str(error))", "# return analyse(raw.info, raw.protochain, raw.alias)", "next_", "=", "Raw", "(", "file", ",", "length", ",", "error", "=", "error", ")", "return", "next_", "return", "behold" ]
Behold analysis procedure.
[ "Behold", "analysis", "procedure", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/utilities/decorators.py#L63-L82
1,220
JarryShaw/PyPCAPKit
src/protocols/link/l2tp.py
L2TP.read_l2tp
def read_l2tp(self, length): """Read Layer Two Tunnelling Protocol. Structure of L2TP header [RFC 2661]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |T|L|x|x|S|x|O|P|x|x|x|x| Ver | Length (opt) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Tunnel ID | Session ID | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Ns (opt) | Nr (opt) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Offset Size (opt) | Offset pad... (opt) +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Octets Bits Name Description 0 0 l2tp.flags Flags and Version Info 0 0 l2tp.flags.type Type (0/1) 0 1 l2tp.flags.len Length 0 2 - Reserved (must be zero) 0 4 l2tp.flags.seq Sequence 0 5 - Reserved (must be zero) 0 6 l2tp.flags.offset Offset 0 7 l2tp.flags.prio Priority 1 8 - Reserved (must be zero) 1 12 l2tp.ver Version (2) 2 16 l2tp.length Length (optional by len) 4 32 l2tp.tunnelid Tunnel ID 6 48 l2tp.sessionid Session ID 8 64 l2tp.ns Sequence Number (optional by seq) 10 80 l2tp.nr Next Sequence Number (optional by seq) 12 96 l2tp.offset Offset Size (optional by offset) """ if length is None: length = len(self) _flag = self._read_binary(1) _vers = self._read_fileng(1).hex()[1] _hlen = self._read_unpack(2) if int(_flag[1]) else None _tnnl = self._read_unpack(2) _sssn = self._read_unpack(2) _nseq = self._read_unpack(2) if int(_flag[4]) else None _nrec = self._read_unpack(2) if int(_flag[4]) else None _size = self._read_unpack(2) if int(_flag[6]) else 0 l2tp = dict( flags=dict( type='Control' if int(_flag[0]) else 'Data', len=True if int(_flag[1]) else False, seq=True if int(_flag[4]) else False, offset=True if int(_flag[6]) else False, prio=True if int(_flag[7]) else False, ), ver=int(_vers, base=16), length=_hlen, tunnelid=_tnnl, sessionid=_sssn, ns=_nseq, nr=_nrec, offset=8*_size or None, ) hdr_len = _hlen or (6 + 2*(int(_flag[1]) + 2*int(_flag[4]) + int(_flag[6]))) l2tp['hdr_len'] = hdr_len + _size * 8 # if _size: # l2tp['padding'] = self._read_fileng(_size * 8) length -= l2tp['hdr_len'] l2tp['packet'] = self._read_packet(header=l2tp['hdr_len'], payload=length) return self._decode_next_layer(l2tp, length)
python
def read_l2tp(self, length): if length is None: length = len(self) _flag = self._read_binary(1) _vers = self._read_fileng(1).hex()[1] _hlen = self._read_unpack(2) if int(_flag[1]) else None _tnnl = self._read_unpack(2) _sssn = self._read_unpack(2) _nseq = self._read_unpack(2) if int(_flag[4]) else None _nrec = self._read_unpack(2) if int(_flag[4]) else None _size = self._read_unpack(2) if int(_flag[6]) else 0 l2tp = dict( flags=dict( type='Control' if int(_flag[0]) else 'Data', len=True if int(_flag[1]) else False, seq=True if int(_flag[4]) else False, offset=True if int(_flag[6]) else False, prio=True if int(_flag[7]) else False, ), ver=int(_vers, base=16), length=_hlen, tunnelid=_tnnl, sessionid=_sssn, ns=_nseq, nr=_nrec, offset=8*_size or None, ) hdr_len = _hlen or (6 + 2*(int(_flag[1]) + 2*int(_flag[4]) + int(_flag[6]))) l2tp['hdr_len'] = hdr_len + _size * 8 # if _size: # l2tp['padding'] = self._read_fileng(_size * 8) length -= l2tp['hdr_len'] l2tp['packet'] = self._read_packet(header=l2tp['hdr_len'], payload=length) return self._decode_next_layer(l2tp, length)
[ "def", "read_l2tp", "(", "self", ",", "length", ")", ":", "if", "length", "is", "None", ":", "length", "=", "len", "(", "self", ")", "_flag", "=", "self", ".", "_read_binary", "(", "1", ")", "_vers", "=", "self", ".", "_read_fileng", "(", "1", ")", ".", "hex", "(", ")", "[", "1", "]", "_hlen", "=", "self", ".", "_read_unpack", "(", "2", ")", "if", "int", "(", "_flag", "[", "1", "]", ")", "else", "None", "_tnnl", "=", "self", ".", "_read_unpack", "(", "2", ")", "_sssn", "=", "self", ".", "_read_unpack", "(", "2", ")", "_nseq", "=", "self", ".", "_read_unpack", "(", "2", ")", "if", "int", "(", "_flag", "[", "4", "]", ")", "else", "None", "_nrec", "=", "self", ".", "_read_unpack", "(", "2", ")", "if", "int", "(", "_flag", "[", "4", "]", ")", "else", "None", "_size", "=", "self", ".", "_read_unpack", "(", "2", ")", "if", "int", "(", "_flag", "[", "6", "]", ")", "else", "0", "l2tp", "=", "dict", "(", "flags", "=", "dict", "(", "type", "=", "'Control'", "if", "int", "(", "_flag", "[", "0", "]", ")", "else", "'Data'", ",", "len", "=", "True", "if", "int", "(", "_flag", "[", "1", "]", ")", "else", "False", ",", "seq", "=", "True", "if", "int", "(", "_flag", "[", "4", "]", ")", "else", "False", ",", "offset", "=", "True", "if", "int", "(", "_flag", "[", "6", "]", ")", "else", "False", ",", "prio", "=", "True", "if", "int", "(", "_flag", "[", "7", "]", ")", "else", "False", ",", ")", ",", "ver", "=", "int", "(", "_vers", ",", "base", "=", "16", ")", ",", "length", "=", "_hlen", ",", "tunnelid", "=", "_tnnl", ",", "sessionid", "=", "_sssn", ",", "ns", "=", "_nseq", ",", "nr", "=", "_nrec", ",", "offset", "=", "8", "*", "_size", "or", "None", ",", ")", "hdr_len", "=", "_hlen", "or", "(", "6", "+", "2", "*", "(", "int", "(", "_flag", "[", "1", "]", ")", "+", "2", "*", "int", "(", "_flag", "[", "4", "]", ")", "+", "int", "(", "_flag", "[", "6", "]", ")", ")", ")", "l2tp", "[", "'hdr_len'", "]", "=", "hdr_len", "+", "_size", "*", "8", "# if _size:", "# l2tp['padding'] = self._read_fileng(_size * 8)", "length", "-=", "l2tp", "[", "'hdr_len'", "]", "l2tp", "[", "'packet'", "]", "=", "self", ".", "_read_packet", "(", "header", "=", "l2tp", "[", "'hdr_len'", "]", ",", "payload", "=", "length", ")", "return", "self", ".", "_decode_next_layer", "(", "l2tp", ",", "length", ")" ]
Read Layer Two Tunnelling Protocol. Structure of L2TP header [RFC 2661]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |T|L|x|x|S|x|O|P|x|x|x|x| Ver | Length (opt) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Tunnel ID | Session ID | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Ns (opt) | Nr (opt) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Offset Size (opt) | Offset pad... (opt) +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Octets Bits Name Description 0 0 l2tp.flags Flags and Version Info 0 0 l2tp.flags.type Type (0/1) 0 1 l2tp.flags.len Length 0 2 - Reserved (must be zero) 0 4 l2tp.flags.seq Sequence 0 5 - Reserved (must be zero) 0 6 l2tp.flags.offset Offset 0 7 l2tp.flags.prio Priority 1 8 - Reserved (must be zero) 1 12 l2tp.ver Version (2) 2 16 l2tp.length Length (optional by len) 4 32 l2tp.tunnelid Tunnel ID 6 48 l2tp.sessionid Session ID 8 64 l2tp.ns Sequence Number (optional by seq) 10 80 l2tp.nr Next Sequence Number (optional by seq) 12 96 l2tp.offset Offset Size (optional by offset)
[ "Read", "Layer", "Two", "Tunnelling", "Protocol", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/protocols/link/l2tp.py#L84-L156
1,221
JarryShaw/PyPCAPKit
src/protocols/link/vlan.py
VLAN.read_vlan
def read_vlan(self, length): """Read 802.1Q Customer VLAN Tag Type. Structure of 802.1Q Customer VLAN Tag Type [RFC 7042]: Octets Bits Name Description 1 0 vlan.tci Tag Control Information 1 0 vlan.tci.pcp Priority Code Point 1 3 vlan.tci.dei Drop Eligible Indicator 1 4 vlan.tci.vid VLAN Identifier 3 24 vlan.type Protocol (Internet Layer) """ if length is None: length = len(self) _tcif = self._read_binary(2) _type = self._read_protos(2) vlan = dict( tci=dict( pcp=_PCP.get(int(_tcif[:3], base=2)), dei=True if _tcif[3] else False, vid=int(_tcif[4:], base=2), ), type=_type, ) length -= 4 vlan['packet'] = self._read_packet(header=4, payload=length) return self._decode_next_layer(vlan, _type, length)
python
def read_vlan(self, length): if length is None: length = len(self) _tcif = self._read_binary(2) _type = self._read_protos(2) vlan = dict( tci=dict( pcp=_PCP.get(int(_tcif[:3], base=2)), dei=True if _tcif[3] else False, vid=int(_tcif[4:], base=2), ), type=_type, ) length -= 4 vlan['packet'] = self._read_packet(header=4, payload=length) return self._decode_next_layer(vlan, _type, length)
[ "def", "read_vlan", "(", "self", ",", "length", ")", ":", "if", "length", "is", "None", ":", "length", "=", "len", "(", "self", ")", "_tcif", "=", "self", ".", "_read_binary", "(", "2", ")", "_type", "=", "self", ".", "_read_protos", "(", "2", ")", "vlan", "=", "dict", "(", "tci", "=", "dict", "(", "pcp", "=", "_PCP", ".", "get", "(", "int", "(", "_tcif", "[", ":", "3", "]", ",", "base", "=", "2", ")", ")", ",", "dei", "=", "True", "if", "_tcif", "[", "3", "]", "else", "False", ",", "vid", "=", "int", "(", "_tcif", "[", "4", ":", "]", ",", "base", "=", "2", ")", ",", ")", ",", "type", "=", "_type", ",", ")", "length", "-=", "4", "vlan", "[", "'packet'", "]", "=", "self", ".", "_read_packet", "(", "header", "=", "4", ",", "payload", "=", "length", ")", "return", "self", ".", "_decode_next_layer", "(", "vlan", ",", "_type", ",", "length", ")" ]
Read 802.1Q Customer VLAN Tag Type. Structure of 802.1Q Customer VLAN Tag Type [RFC 7042]: Octets Bits Name Description 1 0 vlan.tci Tag Control Information 1 0 vlan.tci.pcp Priority Code Point 1 3 vlan.tci.dei Drop Eligible Indicator 1 4 vlan.tci.vid VLAN Identifier 3 24 vlan.type Protocol (Internet Layer)
[ "Read", "802", ".", "1Q", "Customer", "VLAN", "Tag", "Type", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/protocols/link/vlan.py#L83-L113
1,222
JarryShaw/PyPCAPKit
src/protocols/transport/tcp.py
TCP._read_tcp_options
def _read_tcp_options(self, size): """Read TCP option list. Positional arguments: * size -- int, length of option list Returns: * tuple -- TCP option list * dict -- extracted TCP option """ counter = 0 # length of read option list optkind = list() # option kind list options = dict() # dict of option data while counter < size: # get option kind kind = self._read_unpack(1) # fetch corresponding option tuple opts = TCP_OPT.get(kind) enum = OPT_TYPE.get(kind) if opts is None: len_ = size - counter counter = size optkind.append(enum) options[enum.name] = self._read_fileng(len_) break # extract option dscp = opts[1] if opts[0]: len_ = self._read_unpack(1) byte = opts[2](len_) if byte: # check option process mode data = process_opt[opts[3]](self, byte, kind) else: # permission options (length is 2) data = dict( kind=kind, # option kind length=2, # option length flag=True, # permission flag ) else: # 1-bytes options len_ = 1 data = dict( kind=kind, # option kind length=1, # option length ) # record option data counter += len_ if enum in optkind: if isinstance(options[dscp], tuple): options[dscp] += (Info(data),) else: options[dscp] = (Info(options[dscp]), Info(data)) else: optkind.append(enum) options[dscp] = data # break when eol triggered if not kind: break # get padding if counter < size: len_ = size - counter options['padding'] = self._read_fileng(len_) return tuple(optkind), options
python
def _read_tcp_options(self, size): counter = 0 # length of read option list optkind = list() # option kind list options = dict() # dict of option data while counter < size: # get option kind kind = self._read_unpack(1) # fetch corresponding option tuple opts = TCP_OPT.get(kind) enum = OPT_TYPE.get(kind) if opts is None: len_ = size - counter counter = size optkind.append(enum) options[enum.name] = self._read_fileng(len_) break # extract option dscp = opts[1] if opts[0]: len_ = self._read_unpack(1) byte = opts[2](len_) if byte: # check option process mode data = process_opt[opts[3]](self, byte, kind) else: # permission options (length is 2) data = dict( kind=kind, # option kind length=2, # option length flag=True, # permission flag ) else: # 1-bytes options len_ = 1 data = dict( kind=kind, # option kind length=1, # option length ) # record option data counter += len_ if enum in optkind: if isinstance(options[dscp], tuple): options[dscp] += (Info(data),) else: options[dscp] = (Info(options[dscp]), Info(data)) else: optkind.append(enum) options[dscp] = data # break when eol triggered if not kind: break # get padding if counter < size: len_ = size - counter options['padding'] = self._read_fileng(len_) return tuple(optkind), options
[ "def", "_read_tcp_options", "(", "self", ",", "size", ")", ":", "counter", "=", "0", "# length of read option list", "optkind", "=", "list", "(", ")", "# option kind list", "options", "=", "dict", "(", ")", "# dict of option data", "while", "counter", "<", "size", ":", "# get option kind", "kind", "=", "self", ".", "_read_unpack", "(", "1", ")", "# fetch corresponding option tuple", "opts", "=", "TCP_OPT", ".", "get", "(", "kind", ")", "enum", "=", "OPT_TYPE", ".", "get", "(", "kind", ")", "if", "opts", "is", "None", ":", "len_", "=", "size", "-", "counter", "counter", "=", "size", "optkind", ".", "append", "(", "enum", ")", "options", "[", "enum", ".", "name", "]", "=", "self", ".", "_read_fileng", "(", "len_", ")", "break", "# extract option", "dscp", "=", "opts", "[", "1", "]", "if", "opts", "[", "0", "]", ":", "len_", "=", "self", ".", "_read_unpack", "(", "1", ")", "byte", "=", "opts", "[", "2", "]", "(", "len_", ")", "if", "byte", ":", "# check option process mode", "data", "=", "process_opt", "[", "opts", "[", "3", "]", "]", "(", "self", ",", "byte", ",", "kind", ")", "else", ":", "# permission options (length is 2)", "data", "=", "dict", "(", "kind", "=", "kind", ",", "# option kind", "length", "=", "2", ",", "# option length", "flag", "=", "True", ",", "# permission flag", ")", "else", ":", "# 1-bytes options", "len_", "=", "1", "data", "=", "dict", "(", "kind", "=", "kind", ",", "# option kind", "length", "=", "1", ",", "# option length", ")", "# record option data", "counter", "+=", "len_", "if", "enum", "in", "optkind", ":", "if", "isinstance", "(", "options", "[", "dscp", "]", ",", "tuple", ")", ":", "options", "[", "dscp", "]", "+=", "(", "Info", "(", "data", ")", ",", ")", "else", ":", "options", "[", "dscp", "]", "=", "(", "Info", "(", "options", "[", "dscp", "]", ")", ",", "Info", "(", "data", ")", ")", "else", ":", "optkind", ".", "append", "(", "enum", ")", "options", "[", "dscp", "]", "=", "data", "# break when eol triggered", "if", "not", "kind", ":", "break", "# get padding", "if", "counter", "<", "size", ":", "len_", "=", "size", "-", "counter", "options", "[", "'padding'", "]", "=", "self", ".", "_read_fileng", "(", "len_", ")", "return", "tuple", "(", "optkind", ")", ",", "options" ]
Read TCP option list. Positional arguments: * size -- int, length of option list Returns: * tuple -- TCP option list * dict -- extracted TCP option
[ "Read", "TCP", "option", "list", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/protocols/transport/tcp.py#L345-L414
1,223
JarryShaw/PyPCAPKit
src/protocols/transport/tcp.py
TCP._read_mode_tsopt
def _read_mode_tsopt(self, size, kind): """Read Timestamps option. Positional arguments: * size - int, length of option * kind - int, 8 (Timestamps) Returns: * dict -- extracted Timestamps (TS) option Structure of TCP TSopt [RFC 7323]: +-------+-------+---------------------+---------------------+ |Kind=8 | 10 | TS Value (TSval) |TS Echo Reply (TSecr)| +-------+-------+---------------------+---------------------+ 1 1 4 4 Octets Bits Name Description 0 0 tcp.ts.kind Kind (8) 1 8 tcp.ts.length Length (10) 2 16 tcp.ts.val Timestamp Value 6 48 tcp.ts.ecr Timestamps Echo Reply """ temp = struct.unpack('>II', self._read_fileng(size)) data = dict( kind=kind, length=size, val=temp[0], ecr=temp[1], ) return data
python
def _read_mode_tsopt(self, size, kind): temp = struct.unpack('>II', self._read_fileng(size)) data = dict( kind=kind, length=size, val=temp[0], ecr=temp[1], ) return data
[ "def", "_read_mode_tsopt", "(", "self", ",", "size", ",", "kind", ")", ":", "temp", "=", "struct", ".", "unpack", "(", "'>II'", ",", "self", ".", "_read_fileng", "(", "size", ")", ")", "data", "=", "dict", "(", "kind", "=", "kind", ",", "length", "=", "size", ",", "val", "=", "temp", "[", "0", "]", ",", "ecr", "=", "temp", "[", "1", "]", ",", ")", "return", "data" ]
Read Timestamps option. Positional arguments: * size - int, length of option * kind - int, 8 (Timestamps) Returns: * dict -- extracted Timestamps (TS) option Structure of TCP TSopt [RFC 7323]: +-------+-------+---------------------+---------------------+ |Kind=8 | 10 | TS Value (TSval) |TS Echo Reply (TSecr)| +-------+-------+---------------------+---------------------+ 1 1 4 4 Octets Bits Name Description 0 0 tcp.ts.kind Kind (8) 1 8 tcp.ts.length Length (10) 2 16 tcp.ts.val Timestamp Value 6 48 tcp.ts.ecr Timestamps Echo Reply
[ "Read", "Timestamps", "option", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/protocols/transport/tcp.py#L464-L494
1,224
JarryShaw/PyPCAPKit
src/protocols/transport/tcp.py
TCP._read_mode_pocsp
def _read_mode_pocsp(self, size, kind): """Read Partial Order Connection Service Profile option. Positional arguments: * size - int, length of option * kind - int, 10 (POC-Serv Profile) Returns: * dict -- extracted Partial Order Connection Service Profile (POC-SP) option Structure of TCP POC-SP Option [RFC 1693][RFC 6247]: 1 bit 1 bit 6 bits +----------+----------+------------+----------+--------+ | Kind=10 | Length=3 | Start_flag | End_flag | Filler | +----------+----------+------------+----------+--------+ Octets Bits Name Description 0 0 tcp.pocsp.kind Kind (10) 1 8 tcp.pocsp.length Length (3) 2 16 tcp.pocsp.start Start Flag 2 17 tcp.pocsp.end End Flag 2 18 tcp.pocsp.filler Filler """ temp = self._read_binary(size) data = dict( kind=kind, length=size, start=True if int(temp[0]) else False, end=True if int(temp[1]) else False, filler=bytes(chr(int(temp[2:], base=2)), encoding='utf-8'), ) return data
python
def _read_mode_pocsp(self, size, kind): temp = self._read_binary(size) data = dict( kind=kind, length=size, start=True if int(temp[0]) else False, end=True if int(temp[1]) else False, filler=bytes(chr(int(temp[2:], base=2)), encoding='utf-8'), ) return data
[ "def", "_read_mode_pocsp", "(", "self", ",", "size", ",", "kind", ")", ":", "temp", "=", "self", ".", "_read_binary", "(", "size", ")", "data", "=", "dict", "(", "kind", "=", "kind", ",", "length", "=", "size", ",", "start", "=", "True", "if", "int", "(", "temp", "[", "0", "]", ")", "else", "False", ",", "end", "=", "True", "if", "int", "(", "temp", "[", "1", "]", ")", "else", "False", ",", "filler", "=", "bytes", "(", "chr", "(", "int", "(", "temp", "[", "2", ":", "]", ",", "base", "=", "2", ")", ")", ",", "encoding", "=", "'utf-8'", ")", ",", ")", "return", "data" ]
Read Partial Order Connection Service Profile option. Positional arguments: * size - int, length of option * kind - int, 10 (POC-Serv Profile) Returns: * dict -- extracted Partial Order Connection Service Profile (POC-SP) option Structure of TCP POC-SP Option [RFC 1693][RFC 6247]: 1 bit 1 bit 6 bits +----------+----------+------------+----------+--------+ | Kind=10 | Length=3 | Start_flag | End_flag | Filler | +----------+----------+------------+----------+--------+ Octets Bits Name Description 0 0 tcp.pocsp.kind Kind (10) 1 8 tcp.pocsp.length Length (3) 2 16 tcp.pocsp.start Start Flag 2 17 tcp.pocsp.end End Flag 2 18 tcp.pocsp.filler Filler
[ "Read", "Partial", "Order", "Connection", "Service", "Profile", "option", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/protocols/transport/tcp.py#L496-L530
1,225
JarryShaw/PyPCAPKit
src/protocols/transport/tcp.py
TCP._read_mode_acopt
def _read_mode_acopt(self, size, kind): """Read Alternate Checksum Request option. Positional arguments: size - int, length of option kind - int, 14 (Alt-Chksum Request) Returns: * dict -- extracted Alternate Checksum Request (CHKSUM-REQ) option Structure of TCP CHKSUM-REQ [RFC 1146][RFC 6247]: +----------+----------+----------+ | Kind=14 | Length=3 | chksum | +----------+----------+----------+ Octets Bits Name Description 0 0 tcp.chksumreq.kind Kind (14) 1 8 tcp.chksumreq.length Length (3) 2 16 tcp.chksumreq.ac Checksum Algorithm """ temp = self._read_unpack(size) algo = chksum_opt.get(temp) data = dict( kind=kind, length=size, ac=algo, ) return data
python
def _read_mode_acopt(self, size, kind): temp = self._read_unpack(size) algo = chksum_opt.get(temp) data = dict( kind=kind, length=size, ac=algo, ) return data
[ "def", "_read_mode_acopt", "(", "self", ",", "size", ",", "kind", ")", ":", "temp", "=", "self", ".", "_read_unpack", "(", "size", ")", "algo", "=", "chksum_opt", ".", "get", "(", "temp", ")", "data", "=", "dict", "(", "kind", "=", "kind", ",", "length", "=", "size", ",", "ac", "=", "algo", ",", ")", "return", "data" ]
Read Alternate Checksum Request option. Positional arguments: size - int, length of option kind - int, 14 (Alt-Chksum Request) Returns: * dict -- extracted Alternate Checksum Request (CHKSUM-REQ) option Structure of TCP CHKSUM-REQ [RFC 1146][RFC 6247]: +----------+----------+----------+ | Kind=14 | Length=3 | chksum | +----------+----------+----------+ Octets Bits Name Description 0 0 tcp.chksumreq.kind Kind (14) 1 8 tcp.chksumreq.length Length (3) 2 16 tcp.chksumreq.ac Checksum Algorithm
[ "Read", "Alternate", "Checksum", "Request", "option", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/protocols/transport/tcp.py#L532-L562
1,226
JarryShaw/PyPCAPKit
src/protocols/transport/tcp.py
TCP._read_mode_qsopt
def _read_mode_qsopt(self, size, kind): """Read Quick-Start Response option. Positional arguments: * size - int, length of option * kind - int, 27 (Quick-Start Response) Returns: * dict -- extracted Quick-Start Response (QS) option Structure of TCP QSopt [RFC 4782]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Kind | Length=8 | Resv. | Rate | TTL Diff | | | | |Request| | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | QS Nonce | R | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Octets Bits Name Description 0 0 tcp.qs.kind Kind (27) 1 8 tcp.qs.length Length (8) 2 16 - Reserved (must be zero) 2 20 tcp.qs.req_rate Request Rate 3 24 tcp.qs.ttl_diff TTL Difference 4 32 tcp.qs.nounce QS Nounce 7 62 - Reserved (must be zero) """ rvrr = self._read_binary(1) ttld = self._read_unpack(1) noun = self._read_fileng(4) data = dict( kind=kind, length=size, req_rate=int(rvrr[4:], base=2), ttl_diff=ttld, nounce=noun[:-2], ) return data
python
def _read_mode_qsopt(self, size, kind): rvrr = self._read_binary(1) ttld = self._read_unpack(1) noun = self._read_fileng(4) data = dict( kind=kind, length=size, req_rate=int(rvrr[4:], base=2), ttl_diff=ttld, nounce=noun[:-2], ) return data
[ "def", "_read_mode_qsopt", "(", "self", ",", "size", ",", "kind", ")", ":", "rvrr", "=", "self", ".", "_read_binary", "(", "1", ")", "ttld", "=", "self", ".", "_read_unpack", "(", "1", ")", "noun", "=", "self", ".", "_read_fileng", "(", "4", ")", "data", "=", "dict", "(", "kind", "=", "kind", ",", "length", "=", "size", ",", "req_rate", "=", "int", "(", "rvrr", "[", "4", ":", "]", ",", "base", "=", "2", ")", ",", "ttl_diff", "=", "ttld", ",", "nounce", "=", "noun", "[", ":", "-", "2", "]", ",", ")", "return", "data" ]
Read Quick-Start Response option. Positional arguments: * size - int, length of option * kind - int, 27 (Quick-Start Response) Returns: * dict -- extracted Quick-Start Response (QS) option Structure of TCP QSopt [RFC 4782]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Kind | Length=8 | Resv. | Rate | TTL Diff | | | | |Request| | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | QS Nonce | R | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Octets Bits Name Description 0 0 tcp.qs.kind Kind (27) 1 8 tcp.qs.length Length (8) 2 16 - Reserved (must be zero) 2 20 tcp.qs.req_rate Request Rate 3 24 tcp.qs.ttl_diff TTL Difference 4 32 tcp.qs.nounce QS Nounce 7 62 - Reserved (must be zero)
[ "Read", "Quick", "-", "Start", "Response", "option", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/protocols/transport/tcp.py#L564-L606
1,227
JarryShaw/PyPCAPKit
src/protocols/transport/tcp.py
TCP._read_mode_utopt
def _read_mode_utopt(self, size, kind): """Read User Timeout option. Positional arguments: * size - int, length of option * kind - int, 28 (User Timeout Option) Returns: * dict -- extracted User Timeout (TIMEOUT) option Structure of TCP TIMEOUT [RFC 5482]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Kind = 28 | Length = 4 |G| User Timeout | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Octets Bits Name Description 0 0 tcp.timeout.kind Kind (28) 1 8 tcp.timeout.length Length (4) 2 16 tcp.timeout.granularity Granularity 2 17 tcp.timeout.timeout User Timeout """ temp = self._read_fileng(size) data = dict( kind=kind, length=size, granularity='minutes' if int(temp[0]) else 'seconds', timeout=bytes(chr(int(temp[0:], base=2)), encoding='utf-8'), ) return data
python
def _read_mode_utopt(self, size, kind): temp = self._read_fileng(size) data = dict( kind=kind, length=size, granularity='minutes' if int(temp[0]) else 'seconds', timeout=bytes(chr(int(temp[0:], base=2)), encoding='utf-8'), ) return data
[ "def", "_read_mode_utopt", "(", "self", ",", "size", ",", "kind", ")", ":", "temp", "=", "self", ".", "_read_fileng", "(", "size", ")", "data", "=", "dict", "(", "kind", "=", "kind", ",", "length", "=", "size", ",", "granularity", "=", "'minutes'", "if", "int", "(", "temp", "[", "0", "]", ")", "else", "'seconds'", ",", "timeout", "=", "bytes", "(", "chr", "(", "int", "(", "temp", "[", "0", ":", "]", ",", "base", "=", "2", ")", ")", ",", "encoding", "=", "'utf-8'", ")", ",", ")", "return", "data" ]
Read User Timeout option. Positional arguments: * size - int, length of option * kind - int, 28 (User Timeout Option) Returns: * dict -- extracted User Timeout (TIMEOUT) option Structure of TCP TIMEOUT [RFC 5482]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Kind = 28 | Length = 4 |G| User Timeout | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Octets Bits Name Description 0 0 tcp.timeout.kind Kind (28) 1 8 tcp.timeout.length Length (4) 2 16 tcp.timeout.granularity Granularity 2 17 tcp.timeout.timeout User Timeout
[ "Read", "User", "Timeout", "option", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/protocols/transport/tcp.py#L608-L641
1,228
JarryShaw/PyPCAPKit
src/protocols/transport/tcp.py
TCP._read_mode_tcpao
def _read_mode_tcpao(self, size, kind): """Read Authentication option. Positional arguments: * size - int, length of option * kind - int, 29 (TCP Authentication Option) Returns: * dict -- extracted Authentication (AO) option Structure of TCP AOopt [RFC 5925]: +------------+------------+------------+------------+ | Kind=29 | Length | KeyID | RNextKeyID | +------------+------------+------------+------------+ | MAC ... +-----------------------------------... ...-----------------+ ... MAC (con't) | ...-----------------+ Octets Bits Name Description 0 0 tcp.ao.kind Kind (29) 1 8 tcp.ao.length Length 2 16 tcp.ao.keyid KeyID 3 24 tcp.ao.rnextkeyid RNextKeyID 4 32 tcp.ao.mac Message Authentication Code """ key_ = self._read_unpack(1) rkey = self._read_unpack(1) mac_ = self._read_fileng(size - 2) data = dict( kind=kind, length=size, keyid=key_, rnextkeyid=rkey, mac=mac_, ) return data
python
def _read_mode_tcpao(self, size, kind): key_ = self._read_unpack(1) rkey = self._read_unpack(1) mac_ = self._read_fileng(size - 2) data = dict( kind=kind, length=size, keyid=key_, rnextkeyid=rkey, mac=mac_, ) return data
[ "def", "_read_mode_tcpao", "(", "self", ",", "size", ",", "kind", ")", ":", "key_", "=", "self", ".", "_read_unpack", "(", "1", ")", "rkey", "=", "self", ".", "_read_unpack", "(", "1", ")", "mac_", "=", "self", ".", "_read_fileng", "(", "size", "-", "2", ")", "data", "=", "dict", "(", "kind", "=", "kind", ",", "length", "=", "size", ",", "keyid", "=", "key_", ",", "rnextkeyid", "=", "rkey", ",", "mac", "=", "mac_", ",", ")", "return", "data" ]
Read Authentication option. Positional arguments: * size - int, length of option * kind - int, 29 (TCP Authentication Option) Returns: * dict -- extracted Authentication (AO) option Structure of TCP AOopt [RFC 5925]: +------------+------------+------------+------------+ | Kind=29 | Length | KeyID | RNextKeyID | +------------+------------+------------+------------+ | MAC ... +-----------------------------------... ...-----------------+ ... MAC (con't) | ...-----------------+ Octets Bits Name Description 0 0 tcp.ao.kind Kind (29) 1 8 tcp.ao.length Length 2 16 tcp.ao.keyid KeyID 3 24 tcp.ao.rnextkeyid RNextKeyID 4 32 tcp.ao.mac Message Authentication Code
[ "Read", "Authentication", "option", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/protocols/transport/tcp.py#L643-L684
1,229
JarryShaw/PyPCAPKit
src/protocols/transport/tcp.py
TCP._read_mode_mptcp
def _read_mode_mptcp(self, size, kind): """Read Multipath TCP option. Positional arguments: * size - int, length of option * kind - int, 30 (Multipath TCP) Returns: * dict -- extracted Multipath TCP (MP-TCP) option Structure of MP-TCP [RFC 6824]: 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +---------------+---------------+-------+-----------------------+ | Kind | Length |Subtype| | +---------------+---------------+-------+ | | Subtype-specific data | | (variable length) | +---------------------------------------------------------------+ Octets Bits Name Description 0 0 tcp.mp.kind Kind (30) 1 8 tcp.mp.length Length 2 16 tcp.mp.subtype Subtype 2 20 tcp.mp.data Subtype-specific Data """ bins = self._read_binary(1) subt = int(bins[:4], base=2) # subtype number bits = bins[4:] # 4-bit data dlen = size - 1 # length of remaining data # fetch subtype-specific data func = mptcp_opt.get(subt) if func is None: # if subtype not exist, directly read all data temp = self._read_fileng(dlen) data = dict( kind=kind, length=size, subtype='Unknown', data=bytes(chr(int(bits[:4], base=2)), encoding='utf-8') + temp, ) else: # fetch corresponding subtype data dict data = func(self, bits, dlen, kind) return data
python
def _read_mode_mptcp(self, size, kind): bins = self._read_binary(1) subt = int(bins[:4], base=2) # subtype number bits = bins[4:] # 4-bit data dlen = size - 1 # length of remaining data # fetch subtype-specific data func = mptcp_opt.get(subt) if func is None: # if subtype not exist, directly read all data temp = self._read_fileng(dlen) data = dict( kind=kind, length=size, subtype='Unknown', data=bytes(chr(int(bits[:4], base=2)), encoding='utf-8') + temp, ) else: # fetch corresponding subtype data dict data = func(self, bits, dlen, kind) return data
[ "def", "_read_mode_mptcp", "(", "self", ",", "size", ",", "kind", ")", ":", "bins", "=", "self", ".", "_read_binary", "(", "1", ")", "subt", "=", "int", "(", "bins", "[", ":", "4", "]", ",", "base", "=", "2", ")", "# subtype number", "bits", "=", "bins", "[", "4", ":", "]", "# 4-bit data", "dlen", "=", "size", "-", "1", "# length of remaining data", "# fetch subtype-specific data", "func", "=", "mptcp_opt", ".", "get", "(", "subt", ")", "if", "func", "is", "None", ":", "# if subtype not exist, directly read all data", "temp", "=", "self", ".", "_read_fileng", "(", "dlen", ")", "data", "=", "dict", "(", "kind", "=", "kind", ",", "length", "=", "size", ",", "subtype", "=", "'Unknown'", ",", "data", "=", "bytes", "(", "chr", "(", "int", "(", "bits", "[", ":", "4", "]", ",", "base", "=", "2", ")", ")", ",", "encoding", "=", "'utf-8'", ")", "+", "temp", ",", ")", "else", ":", "# fetch corresponding subtype data dict", "data", "=", "func", "(", "self", ",", "bits", ",", "dlen", ",", "kind", ")", "return", "data" ]
Read Multipath TCP option. Positional arguments: * size - int, length of option * kind - int, 30 (Multipath TCP) Returns: * dict -- extracted Multipath TCP (MP-TCP) option Structure of MP-TCP [RFC 6824]: 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +---------------+---------------+-------+-----------------------+ | Kind | Length |Subtype| | +---------------+---------------+-------+ | | Subtype-specific data | | (variable length) | +---------------------------------------------------------------+ Octets Bits Name Description 0 0 tcp.mp.kind Kind (30) 1 8 tcp.mp.length Length 2 16 tcp.mp.subtype Subtype 2 20 tcp.mp.data Subtype-specific Data
[ "Read", "Multipath", "TCP", "option", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/protocols/transport/tcp.py#L686-L730
1,230
JarryShaw/PyPCAPKit
src/protocols/transport/tcp.py
TCP._read_mptcp_capable
def _read_mptcp_capable(self, bits, size, kind): """Read Multipath Capable option. Positional arguments: * bits - str, 4-bit data * size - int, length of option * kind - int, 30 (Multipath TCP) Returns: * dict -- extracted Multipath Capable (MP_CAPABLE) option Structure of MP_CAPABLE [RFC 6824]: 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +---------------+---------------+-------+-------+---------------+ | Kind | Length |Subtype|Version|A|B|C|D|E|F|G|H| +---------------+---------------+-------+-------+---------------+ | Option Sender's Key (64 bits) | | | | | +---------------------------------------------------------------+ | Option Receiver's Key (64 bits) | | (if option Length == 20) | | | +---------------------------------------------------------------+ Octets Bits Name Description 0 0 tcp.mp.kind Kind (30) 1 8 tcp.mp.length Length (12/20) 2 16 tcp.mp.subtype Subtype (0) 2 20 tcp.mp.capable.version Version 3 24 tcp.mp.capable.flags.req Checksum Require Flag (A) 3 25 tcp.mp.capable.flags.ext Extensibility Flag (B) 3 26 tcp.mp.capable.flags.res Unassigned (C-G) 3 31 tcp.mp.capable.flags.hsa HMAC-SHA1 Flag (H) 4 32 tcp.mp.capable.skey Option Sender's Key 12 96 tcp.mp.capable.rkey Option Receiver's Key (if option Length == 20) """ vers = int(bits, base=2) bins = self._read_binary(1) skey = self._read_fileng(8) rkey = self._read_fileng(8) if size == 17 else None data = dict( kind=kind, length=size + 1, subtype='MP_CAPABLE', capable=dict( version=vers, flags=dict( req=True if int(bins[0]) else False, ext=True if int(bins[1]) else False, res=bytes(chr(int(bits[2:7], base=2)), encoding='utf-8'), hsa=True if int(bins[7]) else False, ), skey=skey, rkey=rkey, ), ) return data
python
def _read_mptcp_capable(self, bits, size, kind): vers = int(bits, base=2) bins = self._read_binary(1) skey = self._read_fileng(8) rkey = self._read_fileng(8) if size == 17 else None data = dict( kind=kind, length=size + 1, subtype='MP_CAPABLE', capable=dict( version=vers, flags=dict( req=True if int(bins[0]) else False, ext=True if int(bins[1]) else False, res=bytes(chr(int(bits[2:7], base=2)), encoding='utf-8'), hsa=True if int(bins[7]) else False, ), skey=skey, rkey=rkey, ), ) return data
[ "def", "_read_mptcp_capable", "(", "self", ",", "bits", ",", "size", ",", "kind", ")", ":", "vers", "=", "int", "(", "bits", ",", "base", "=", "2", ")", "bins", "=", "self", ".", "_read_binary", "(", "1", ")", "skey", "=", "self", ".", "_read_fileng", "(", "8", ")", "rkey", "=", "self", ".", "_read_fileng", "(", "8", ")", "if", "size", "==", "17", "else", "None", "data", "=", "dict", "(", "kind", "=", "kind", ",", "length", "=", "size", "+", "1", ",", "subtype", "=", "'MP_CAPABLE'", ",", "capable", "=", "dict", "(", "version", "=", "vers", ",", "flags", "=", "dict", "(", "req", "=", "True", "if", "int", "(", "bins", "[", "0", "]", ")", "else", "False", ",", "ext", "=", "True", "if", "int", "(", "bins", "[", "1", "]", ")", "else", "False", ",", "res", "=", "bytes", "(", "chr", "(", "int", "(", "bits", "[", "2", ":", "7", "]", ",", "base", "=", "2", ")", ")", ",", "encoding", "=", "'utf-8'", ")", ",", "hsa", "=", "True", "if", "int", "(", "bins", "[", "7", "]", ")", "else", "False", ",", ")", ",", "skey", "=", "skey", ",", "rkey", "=", "rkey", ",", ")", ",", ")", "return", "data" ]
Read Multipath Capable option. Positional arguments: * bits - str, 4-bit data * size - int, length of option * kind - int, 30 (Multipath TCP) Returns: * dict -- extracted Multipath Capable (MP_CAPABLE) option Structure of MP_CAPABLE [RFC 6824]: 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +---------------+---------------+-------+-------+---------------+ | Kind | Length |Subtype|Version|A|B|C|D|E|F|G|H| +---------------+---------------+-------+-------+---------------+ | Option Sender's Key (64 bits) | | | | | +---------------------------------------------------------------+ | Option Receiver's Key (64 bits) | | (if option Length == 20) | | | +---------------------------------------------------------------+ Octets Bits Name Description 0 0 tcp.mp.kind Kind (30) 1 8 tcp.mp.length Length (12/20) 2 16 tcp.mp.subtype Subtype (0) 2 20 tcp.mp.capable.version Version 3 24 tcp.mp.capable.flags.req Checksum Require Flag (A) 3 25 tcp.mp.capable.flags.ext Extensibility Flag (B) 3 26 tcp.mp.capable.flags.res Unassigned (C-G) 3 31 tcp.mp.capable.flags.hsa HMAC-SHA1 Flag (H) 4 32 tcp.mp.capable.skey Option Sender's Key 12 96 tcp.mp.capable.rkey Option Receiver's Key (if option Length == 20)
[ "Read", "Multipath", "Capable", "option", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/protocols/transport/tcp.py#L732-L794
1,231
JarryShaw/PyPCAPKit
src/protocols/transport/tcp.py
TCP._read_mptcp_join
def _read_mptcp_join(self, bits, size, kind): """Read Join Connection option. Positional arguments: * bits - str, 4-bit data * size - int, length of option * kind - int, 30 (Multipath TCP) Returns: * dict -- extracted Join Connection (MP_JOIN) option Structure of MP_JOIN [RFC 6824]: Octets Bits Name Description 0 0 tcp.mp.kind Kind (30) 1 8 tcp.mp.length Length 2 16 tcp.mp.subtype Subtype (1) 2 20 tcp.mp.data Handshake-specific Data """ if self._syn and self._ack: # MP_JOIN-SYN/ACK return self._read_join_synack(bits, size, kind) elif self._syn: # MP_JOIN-SYN return self._read_join_syn(bits, size, kind) elif self._ack: # MP_JOIN-ACK return self._read_join_ack(bits, size, kind) else: # illegal MP_JOIN occurred temp = self._read_fileng(size) data = dict( kind=kind, length=size + 1, subtype='MP_JOIN-Unknown', data=bytes(chr(int(bits[:4], base=2)), encoding='utf-8') + temp, ) return data
python
def _read_mptcp_join(self, bits, size, kind): if self._syn and self._ack: # MP_JOIN-SYN/ACK return self._read_join_synack(bits, size, kind) elif self._syn: # MP_JOIN-SYN return self._read_join_syn(bits, size, kind) elif self._ack: # MP_JOIN-ACK return self._read_join_ack(bits, size, kind) else: # illegal MP_JOIN occurred temp = self._read_fileng(size) data = dict( kind=kind, length=size + 1, subtype='MP_JOIN-Unknown', data=bytes(chr(int(bits[:4], base=2)), encoding='utf-8') + temp, ) return data
[ "def", "_read_mptcp_join", "(", "self", ",", "bits", ",", "size", ",", "kind", ")", ":", "if", "self", ".", "_syn", "and", "self", ".", "_ack", ":", "# MP_JOIN-SYN/ACK", "return", "self", ".", "_read_join_synack", "(", "bits", ",", "size", ",", "kind", ")", "elif", "self", ".", "_syn", ":", "# MP_JOIN-SYN", "return", "self", ".", "_read_join_syn", "(", "bits", ",", "size", ",", "kind", ")", "elif", "self", ".", "_ack", ":", "# MP_JOIN-ACK", "return", "self", ".", "_read_join_ack", "(", "bits", ",", "size", ",", "kind", ")", "else", ":", "# illegal MP_JOIN occurred", "temp", "=", "self", ".", "_read_fileng", "(", "size", ")", "data", "=", "dict", "(", "kind", "=", "kind", ",", "length", "=", "size", "+", "1", ",", "subtype", "=", "'MP_JOIN-Unknown'", ",", "data", "=", "bytes", "(", "chr", "(", "int", "(", "bits", "[", ":", "4", "]", ",", "base", "=", "2", ")", ")", ",", "encoding", "=", "'utf-8'", ")", "+", "temp", ",", ")", "return", "data" ]
Read Join Connection option. Positional arguments: * bits - str, 4-bit data * size - int, length of option * kind - int, 30 (Multipath TCP) Returns: * dict -- extracted Join Connection (MP_JOIN) option Structure of MP_JOIN [RFC 6824]: Octets Bits Name Description 0 0 tcp.mp.kind Kind (30) 1 8 tcp.mp.length Length 2 16 tcp.mp.subtype Subtype (1) 2 20 tcp.mp.data Handshake-specific Data
[ "Read", "Join", "Connection", "option", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/protocols/transport/tcp.py#L796-L829
1,232
JarryShaw/PyPCAPKit
src/protocols/transport/tcp.py
TCP._read_join_syn
def _read_join_syn(self, bits, size, kind): """Read Join Connection option for Initial SYN. Positional arguments: * bits - str, 4-bit data * size - int, length of option * kind - int, 30 (Multipath TCP) Returns: * dict -- extracted Join Connection (MP_JOIN-SYN) option for Initial SYN Structure of MP_JOIN-SYN [RFC 6824]: 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +---------------+---------------+-------+-----+-+---------------+ | Kind | Length = 12 |Subtype| |B| Address ID | +---------------+---------------+-------+-----+-+---------------+ | Receiver's Token (32 bits) | +---------------------------------------------------------------+ | Sender's Random Number (32 bits) | +---------------------------------------------------------------+ Octets Bits Name Description 0 0 tcp.mp.kind Kind (30) 1 8 tcp.mp.length Length (12) 2 16 tcp.mp.subtype Subtype (1|SYN) 2 20 - Reserved (must be zero) 2 23 tcp.mp.join.syn.backup Backup Path (B) 3 24 tcp.mp.join.syn.addrid Address ID 4 32 tcp.mp.join.syn.token Receiver's Token 8 64 tcp.mp.join.syn.randnum Sender's Random Number """ adid = self._read_unpack(1) rtkn = self._read_fileng(4) srno = self._read_unpack(4) data = dict( kind=kind, length=size + 1, subtype='MP_JOIN-SYN', join=dict( syn=dict( backup=True if int(bits[3]) else False, addrid=adid, token=rtkn, randnum=srno, ), ), ) return data
python
def _read_join_syn(self, bits, size, kind): adid = self._read_unpack(1) rtkn = self._read_fileng(4) srno = self._read_unpack(4) data = dict( kind=kind, length=size + 1, subtype='MP_JOIN-SYN', join=dict( syn=dict( backup=True if int(bits[3]) else False, addrid=adid, token=rtkn, randnum=srno, ), ), ) return data
[ "def", "_read_join_syn", "(", "self", ",", "bits", ",", "size", ",", "kind", ")", ":", "adid", "=", "self", ".", "_read_unpack", "(", "1", ")", "rtkn", "=", "self", ".", "_read_fileng", "(", "4", ")", "srno", "=", "self", ".", "_read_unpack", "(", "4", ")", "data", "=", "dict", "(", "kind", "=", "kind", ",", "length", "=", "size", "+", "1", ",", "subtype", "=", "'MP_JOIN-SYN'", ",", "join", "=", "dict", "(", "syn", "=", "dict", "(", "backup", "=", "True", "if", "int", "(", "bits", "[", "3", "]", ")", "else", "False", ",", "addrid", "=", "adid", ",", "token", "=", "rtkn", ",", "randnum", "=", "srno", ",", ")", ",", ")", ",", ")", "return", "data" ]
Read Join Connection option for Initial SYN. Positional arguments: * bits - str, 4-bit data * size - int, length of option * kind - int, 30 (Multipath TCP) Returns: * dict -- extracted Join Connection (MP_JOIN-SYN) option for Initial SYN Structure of MP_JOIN-SYN [RFC 6824]: 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +---------------+---------------+-------+-----+-+---------------+ | Kind | Length = 12 |Subtype| |B| Address ID | +---------------+---------------+-------+-----+-+---------------+ | Receiver's Token (32 bits) | +---------------------------------------------------------------+ | Sender's Random Number (32 bits) | +---------------------------------------------------------------+ Octets Bits Name Description 0 0 tcp.mp.kind Kind (30) 1 8 tcp.mp.length Length (12) 2 16 tcp.mp.subtype Subtype (1|SYN) 2 20 - Reserved (must be zero) 2 23 tcp.mp.join.syn.backup Backup Path (B) 3 24 tcp.mp.join.syn.addrid Address ID 4 32 tcp.mp.join.syn.token Receiver's Token 8 64 tcp.mp.join.syn.randnum Sender's Random Number
[ "Read", "Join", "Connection", "option", "for", "Initial", "SYN", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/protocols/transport/tcp.py#L831-L882
1,233
JarryShaw/PyPCAPKit
src/protocols/transport/tcp.py
TCP._read_join_ack
def _read_join_ack(self, bits, size, kind): """Read Join Connection option for Third ACK. Positional arguments: * bits - str, 4-bit data * size - int, length of option * kind - int, 30 (Multipath TCP) Returns: * dict -- extracted Join Connection (MP_JOIN-ACK) option for Third ACK Structure of MP_JOIN-ACK [RFC 6824]: 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +---------------+---------------+-------+-----------------------+ | Kind | Length = 24 |Subtype| (reserved) | +---------------+---------------+-------+-----------------------+ | | | | | Sender's HMAC (160 bits) | | | | | +---------------------------------------------------------------+ Octets Bits Name Description 0 0 tcp.mp.kind Kind (30) 1 8 tcp.mp.length Length (24) 2 16 tcp.mp.subtype Subtype (1|ACK) 2 20 - Reserved (must be zero) 4 32 tcp.mp.join.ack.hmac Sender's HMAC """ temp = self._read_fileng(20) data = dict( kind=kind, length=size + 1, subtype='MP_JOIN-ACK', join=dict( ack=dict( hmac=temp, ), ), ) return data
python
def _read_join_ack(self, bits, size, kind): temp = self._read_fileng(20) data = dict( kind=kind, length=size + 1, subtype='MP_JOIN-ACK', join=dict( ack=dict( hmac=temp, ), ), ) return data
[ "def", "_read_join_ack", "(", "self", ",", "bits", ",", "size", ",", "kind", ")", ":", "temp", "=", "self", ".", "_read_fileng", "(", "20", ")", "data", "=", "dict", "(", "kind", "=", "kind", ",", "length", "=", "size", "+", "1", ",", "subtype", "=", "'MP_JOIN-ACK'", ",", "join", "=", "dict", "(", "ack", "=", "dict", "(", "hmac", "=", "temp", ",", ")", ",", ")", ",", ")", "return", "data" ]
Read Join Connection option for Third ACK. Positional arguments: * bits - str, 4-bit data * size - int, length of option * kind - int, 30 (Multipath TCP) Returns: * dict -- extracted Join Connection (MP_JOIN-ACK) option for Third ACK Structure of MP_JOIN-ACK [RFC 6824]: 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +---------------+---------------+-------+-----------------------+ | Kind | Length = 24 |Subtype| (reserved) | +---------------+---------------+-------+-----------------------+ | | | | | Sender's HMAC (160 bits) | | | | | +---------------------------------------------------------------+ Octets Bits Name Description 0 0 tcp.mp.kind Kind (30) 1 8 tcp.mp.length Length (24) 2 16 tcp.mp.subtype Subtype (1|ACK) 2 20 - Reserved (must be zero) 4 32 tcp.mp.join.ack.hmac Sender's HMAC
[ "Read", "Join", "Connection", "option", "for", "Third", "ACK", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/protocols/transport/tcp.py#L939-L984
1,234
JarryShaw/PyPCAPKit
src/protocols/transport/tcp.py
TCP._read_mptcp_add
def _read_mptcp_add(self, bits, size, kind): """Read Add Address option. Positional arguments: * bits - str, 4-bit data * size - int, length of option * kind - int, 30 (Multipath TCP) Returns: * dict -- extracted Add Address (ADD_ADDR) option Structure of ADD_ADDR [RFC 6824]: 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +---------------+---------------+-------+-------+---------------+ | Kind | Length |Subtype| IPVer | Address ID | +---------------+---------------+-------+-------+---------------+ | Address (IPv4 - 4 octets / IPv6 - 16 octets) | +-------------------------------+-------------------------------+ | Port (2 octets, optional) | +-------------------------------+ Octets Bits Name Description 0 0 tcp.mp.kind Kind (30) 1 8 tcp.mp.length Length 2 16 tcp.mp.subtype Subtype (3) 2 20 tcp.mp.addaddr.ipver IP Version 3 24 tcp.mp.addaddr.addrid Address ID 4 32 tcp.mp.addaddr.addr IP Address (4/16) 8-20 64-160 tcp.mp.addaddr.port Port (optional) """ vers = int(bits, base=2) adid = self._read_unpack(1) ipad = self._read_fileng(4) if vers == 4 else self._read_fileng(16) ip_l = 4 if vers == 4 else 16 pt_l = size - 1 - ip_l port = self._read_unpack(2) if pt_l else None data = dict( kind=kind, length=size + 1, subtype='ADD_ADDR', addaddr=dict( ipver=vers, addrid=adid, addr=ipaddress.ip_address(ipad), port=port, ), ) return data
python
def _read_mptcp_add(self, bits, size, kind): vers = int(bits, base=2) adid = self._read_unpack(1) ipad = self._read_fileng(4) if vers == 4 else self._read_fileng(16) ip_l = 4 if vers == 4 else 16 pt_l = size - 1 - ip_l port = self._read_unpack(2) if pt_l else None data = dict( kind=kind, length=size + 1, subtype='ADD_ADDR', addaddr=dict( ipver=vers, addrid=adid, addr=ipaddress.ip_address(ipad), port=port, ), ) return data
[ "def", "_read_mptcp_add", "(", "self", ",", "bits", ",", "size", ",", "kind", ")", ":", "vers", "=", "int", "(", "bits", ",", "base", "=", "2", ")", "adid", "=", "self", ".", "_read_unpack", "(", "1", ")", "ipad", "=", "self", ".", "_read_fileng", "(", "4", ")", "if", "vers", "==", "4", "else", "self", ".", "_read_fileng", "(", "16", ")", "ip_l", "=", "4", "if", "vers", "==", "4", "else", "16", "pt_l", "=", "size", "-", "1", "-", "ip_l", "port", "=", "self", ".", "_read_unpack", "(", "2", ")", "if", "pt_l", "else", "None", "data", "=", "dict", "(", "kind", "=", "kind", ",", "length", "=", "size", "+", "1", ",", "subtype", "=", "'ADD_ADDR'", ",", "addaddr", "=", "dict", "(", "ipver", "=", "vers", ",", "addrid", "=", "adid", ",", "addr", "=", "ipaddress", ".", "ip_address", "(", "ipad", ")", ",", "port", "=", "port", ",", ")", ",", ")", "return", "data" ]
Read Add Address option. Positional arguments: * bits - str, 4-bit data * size - int, length of option * kind - int, 30 (Multipath TCP) Returns: * dict -- extracted Add Address (ADD_ADDR) option Structure of ADD_ADDR [RFC 6824]: 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +---------------+---------------+-------+-------+---------------+ | Kind | Length |Subtype| IPVer | Address ID | +---------------+---------------+-------+-------+---------------+ | Address (IPv4 - 4 octets / IPv6 - 16 octets) | +-------------------------------+-------------------------------+ | Port (2 octets, optional) | +-------------------------------+ Octets Bits Name Description 0 0 tcp.mp.kind Kind (30) 1 8 tcp.mp.length Length 2 16 tcp.mp.subtype Subtype (3) 2 20 tcp.mp.addaddr.ipver IP Version 3 24 tcp.mp.addaddr.addrid Address ID 4 32 tcp.mp.addaddr.addr IP Address (4/16) 8-20 64-160 tcp.mp.addaddr.port Port (optional)
[ "Read", "Add", "Address", "option", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/protocols/transport/tcp.py#L1074-L1125
1,235
JarryShaw/PyPCAPKit
src/protocols/transport/tcp.py
TCP._read_mptcp_remove
def _read_mptcp_remove(self, bits, size): """Read Remove Address option. Positional arguments: * bits - str, 4-bit data * size - int, length of option Returns: * dict -- extracted Remove Address (REMOVE_ADDR) option Structure of REMOVE_ADDR [RFC 6824]: 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +---------------+---------------+-------+-------+---------------+ | Kind | Length = 3+n |Subtype|(resvd)| Address ID | ... +---------------+---------------+-------+-------+---------------+ (followed by n-1 Address IDs, if required) Octets Bits Name Description 0 0 tcp.opt.kind Kind (30) 1 8 tcp.opt.length Length 2 16 tcp.opt.mp.subtype Subtype (4) 2 20 - Reserved (must be zero) 3 24 tcp.opt.mp.removeaddr.addrid Address ID (optional list) """ adid = [] for _ in size: adid.append(self._read_unpack(1)) data = dict( subtype='REMOVE_ADDR', removeaddr=dict( addrid=adid or None, ), ) return data
python
def _read_mptcp_remove(self, bits, size): adid = [] for _ in size: adid.append(self._read_unpack(1)) data = dict( subtype='REMOVE_ADDR', removeaddr=dict( addrid=adid or None, ), ) return data
[ "def", "_read_mptcp_remove", "(", "self", ",", "bits", ",", "size", ")", ":", "adid", "=", "[", "]", "for", "_", "in", "size", ":", "adid", ".", "append", "(", "self", ".", "_read_unpack", "(", "1", ")", ")", "data", "=", "dict", "(", "subtype", "=", "'REMOVE_ADDR'", ",", "removeaddr", "=", "dict", "(", "addrid", "=", "adid", "or", "None", ",", ")", ",", ")", "return", "data" ]
Read Remove Address option. Positional arguments: * bits - str, 4-bit data * size - int, length of option Returns: * dict -- extracted Remove Address (REMOVE_ADDR) option Structure of REMOVE_ADDR [RFC 6824]: 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +---------------+---------------+-------+-------+---------------+ | Kind | Length = 3+n |Subtype|(resvd)| Address ID | ... +---------------+---------------+-------+-------+---------------+ (followed by n-1 Address IDs, if required) Octets Bits Name Description 0 0 tcp.opt.kind Kind (30) 1 8 tcp.opt.length Length 2 16 tcp.opt.mp.subtype Subtype (4) 2 20 - Reserved (must be zero) 3 24 tcp.opt.mp.removeaddr.addrid Address ID (optional list)
[ "Read", "Remove", "Address", "option", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/protocols/transport/tcp.py#L1173-L1210
1,236
JarryShaw/PyPCAPKit
src/protocols/transport/tcp.py
TCP._read_mptcp_prio
def _read_mptcp_prio(self, bits, size): """Read Change Subflow Priority option. Positional arguments: * bits - str, 4-bit data * size - int, length of option Returns: * dict -- extracted Change Subflow Priority (MP_PRIO) option Structure of MP_PRIO [RFC 6824]: 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +---------------+---------------+-------+-----+-+--------------+ | Kind | Length |Subtype| |B| AddrID (opt) | +---------------+---------------+-------+-----+-+--------------+ Octets Bits Name Description 0 0 tcp.opt.kind Kind (30) 1 8 tcp.opt.length Length (3/4) 2 16 tcp.opt.mp.subtype Subtype (5) 2 23 tcp.opt.mp.prio.backup Backup Path (B) 3 24 tcp.opt.mp.prio.addrid Address ID (optional) """ temp = self._read_unpack(1) if size else None data = dict( subtype='MP_PRIO', prio=dict( res=b'\x00' * 3, backup=True if int(bits[3]) else False, addrid=temp, ), ) return data
python
def _read_mptcp_prio(self, bits, size): temp = self._read_unpack(1) if size else None data = dict( subtype='MP_PRIO', prio=dict( res=b'\x00' * 3, backup=True if int(bits[3]) else False, addrid=temp, ), ) return data
[ "def", "_read_mptcp_prio", "(", "self", ",", "bits", ",", "size", ")", ":", "temp", "=", "self", ".", "_read_unpack", "(", "1", ")", "if", "size", "else", "None", "data", "=", "dict", "(", "subtype", "=", "'MP_PRIO'", ",", "prio", "=", "dict", "(", "res", "=", "b'\\x00'", "*", "3", ",", "backup", "=", "True", "if", "int", "(", "bits", "[", "3", "]", ")", "else", "False", ",", "addrid", "=", "temp", ",", ")", ",", ")", "return", "data" ]
Read Change Subflow Priority option. Positional arguments: * bits - str, 4-bit data * size - int, length of option Returns: * dict -- extracted Change Subflow Priority (MP_PRIO) option Structure of MP_PRIO [RFC 6824]: 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +---------------+---------------+-------+-----+-+--------------+ | Kind | Length |Subtype| |B| AddrID (opt) | +---------------+---------------+-------+-----+-+--------------+ Octets Bits Name Description 0 0 tcp.opt.kind Kind (30) 1 8 tcp.opt.length Length (3/4) 2 16 tcp.opt.mp.subtype Subtype (5) 2 23 tcp.opt.mp.prio.backup Backup Path (B) 3 24 tcp.opt.mp.prio.addrid Address ID (optional)
[ "Read", "Change", "Subflow", "Priority", "option", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/protocols/transport/tcp.py#L1212-L1248
1,237
JarryShaw/PyPCAPKit
src/interface/__init__.py
extract
def extract(fin=None, fout=None, format=None, # basic settings auto=True, extension=True, store=True, # internal settings files=False, nofile=False, verbose=False, # output settings engine=None, layer=None, protocol=None, # extraction settings ip=False, ipv4=False, ipv6=False, tcp=False, strict=True, # reassembly settings trace=False, trace_fout=None, trace_format=None, # trace settings trace_byteorder=sys.byteorder, trace_nanosecond=False): # trace settings """Extract a PCAP file. Keyword arguments: * fin -- str, file name to be read; if file not exist, raise an error * fout -- str, file name to be written * format -- str, file format of output <keyword> 'plist' / 'json' / 'tree' / 'html' * auto -- bool, if automatically run till EOF (default is True) <keyword> True / False * extension -- bool, if check and append extensions to output file (default is True) <keyword> True / False * store -- bool, if store extracted packet info (default is True) <keyword> True / False * files -- bool, if split each frame into different files (default is False) <keyword> True / False * nofile -- bool, if no output file is to be dumped (default is False) <keyword> True / False * verbose -- bool, if print verbose output information (default is False) <keyword> True / False * engine -- str, extraction engine to be used <keyword> 'default | pcapkit' * layer -- str, extract til which layer <keyword> 'Link' / 'Internet' / 'Transport' / 'Application' * protocol -- str, extract til which protocol <keyword> available protocol name * ip -- bool, if record data for IPv4 & IPv6 reassembly (default is False) <keyword> True / False * ipv4 -- bool, if perform IPv4 reassembly (default is False) <keyword> True / False * ipv6 -- bool, if perform IPv6 reassembly (default is False) <keyword> True / False * tcp -- bool, if perform TCP reassembly (default is False) <keyword> True / False * strict -- bool, if set strict flag for reassembly (default is True) <keyword> True / False * trace -- bool, if trace TCP traffic flows (default is False) <keyword> True / False * trace_fout -- str, path name for flow tracer if necessary * trace_format -- str, output file format of flow tracer <keyword> 'plist' / 'json' / 'tree' / 'html' / 'pcap' * trace_byteorder -- str, output file byte order <keyword> 'little' / 'big' * trace_nanosecond -- bool, output nanosecond-resolution file flag <keyword> True / False Returns: * Extractor -- an Extractor object form `pcapkit.extractor` """ if isinstance(layer, type) and issubclass(layer, Protocol): layer = layer.__layer__ if isinstance(protocol, type) and issubclass(protocol, Protocol): protocol = protocol.__index__() str_check(fin or '', fout or '', format or '', trace_fout or '', trace_format or '', engine or '', layer or '', *(protocol or '')) bool_check(files, nofile, verbose, auto, extension, store, ip, ipv4, ipv6, tcp, strict, trace) return Extractor(fin=fin, fout=fout, format=format, store=store, files=files, nofile=nofile, auto=auto, verbose=verbose, extension=extension, engine=engine, layer=layer, protocol=protocol, ip=ip, ipv4=ipv4, ipv6=ipv6, tcp=tcp, strict=strict, trace=trace, trace_fout=trace_fout, trace_format=trace_format, trace_byteorder=trace_byteorder, trace_nanosecond=trace_nanosecond)
python
def extract(fin=None, fout=None, format=None, # basic settings auto=True, extension=True, store=True, # internal settings files=False, nofile=False, verbose=False, # output settings engine=None, layer=None, protocol=None, # extraction settings ip=False, ipv4=False, ipv6=False, tcp=False, strict=True, # reassembly settings trace=False, trace_fout=None, trace_format=None, # trace settings trace_byteorder=sys.byteorder, trace_nanosecond=False): # trace settings if isinstance(layer, type) and issubclass(layer, Protocol): layer = layer.__layer__ if isinstance(protocol, type) and issubclass(protocol, Protocol): protocol = protocol.__index__() str_check(fin or '', fout or '', format or '', trace_fout or '', trace_format or '', engine or '', layer or '', *(protocol or '')) bool_check(files, nofile, verbose, auto, extension, store, ip, ipv4, ipv6, tcp, strict, trace) return Extractor(fin=fin, fout=fout, format=format, store=store, files=files, nofile=nofile, auto=auto, verbose=verbose, extension=extension, engine=engine, layer=layer, protocol=protocol, ip=ip, ipv4=ipv4, ipv6=ipv6, tcp=tcp, strict=strict, trace=trace, trace_fout=trace_fout, trace_format=trace_format, trace_byteorder=trace_byteorder, trace_nanosecond=trace_nanosecond)
[ "def", "extract", "(", "fin", "=", "None", ",", "fout", "=", "None", ",", "format", "=", "None", ",", "# basic settings", "auto", "=", "True", ",", "extension", "=", "True", ",", "store", "=", "True", ",", "# internal settings", "files", "=", "False", ",", "nofile", "=", "False", ",", "verbose", "=", "False", ",", "# output settings", "engine", "=", "None", ",", "layer", "=", "None", ",", "protocol", "=", "None", ",", "# extraction settings", "ip", "=", "False", ",", "ipv4", "=", "False", ",", "ipv6", "=", "False", ",", "tcp", "=", "False", ",", "strict", "=", "True", ",", "# reassembly settings", "trace", "=", "False", ",", "trace_fout", "=", "None", ",", "trace_format", "=", "None", ",", "# trace settings", "trace_byteorder", "=", "sys", ".", "byteorder", ",", "trace_nanosecond", "=", "False", ")", ":", "# trace settings", "if", "isinstance", "(", "layer", ",", "type", ")", "and", "issubclass", "(", "layer", ",", "Protocol", ")", ":", "layer", "=", "layer", ".", "__layer__", "if", "isinstance", "(", "protocol", ",", "type", ")", "and", "issubclass", "(", "protocol", ",", "Protocol", ")", ":", "protocol", "=", "protocol", ".", "__index__", "(", ")", "str_check", "(", "fin", "or", "''", ",", "fout", "or", "''", ",", "format", "or", "''", ",", "trace_fout", "or", "''", ",", "trace_format", "or", "''", ",", "engine", "or", "''", ",", "layer", "or", "''", ",", "*", "(", "protocol", "or", "''", ")", ")", "bool_check", "(", "files", ",", "nofile", ",", "verbose", ",", "auto", ",", "extension", ",", "store", ",", "ip", ",", "ipv4", ",", "ipv6", ",", "tcp", ",", "strict", ",", "trace", ")", "return", "Extractor", "(", "fin", "=", "fin", ",", "fout", "=", "fout", ",", "format", "=", "format", ",", "store", "=", "store", ",", "files", "=", "files", ",", "nofile", "=", "nofile", ",", "auto", "=", "auto", ",", "verbose", "=", "verbose", ",", "extension", "=", "extension", ",", "engine", "=", "engine", ",", "layer", "=", "layer", ",", "protocol", "=", "protocol", ",", "ip", "=", "ip", ",", "ipv4", "=", "ipv4", ",", "ipv6", "=", "ipv6", ",", "tcp", "=", "tcp", ",", "strict", "=", "strict", ",", "trace", "=", "trace", ",", "trace_fout", "=", "trace_fout", ",", "trace_format", "=", "trace_format", ",", "trace_byteorder", "=", "trace_byteorder", ",", "trace_nanosecond", "=", "trace_nanosecond", ")" ]
Extract a PCAP file. Keyword arguments: * fin -- str, file name to be read; if file not exist, raise an error * fout -- str, file name to be written * format -- str, file format of output <keyword> 'plist' / 'json' / 'tree' / 'html' * auto -- bool, if automatically run till EOF (default is True) <keyword> True / False * extension -- bool, if check and append extensions to output file (default is True) <keyword> True / False * store -- bool, if store extracted packet info (default is True) <keyword> True / False * files -- bool, if split each frame into different files (default is False) <keyword> True / False * nofile -- bool, if no output file is to be dumped (default is False) <keyword> True / False * verbose -- bool, if print verbose output information (default is False) <keyword> True / False * engine -- str, extraction engine to be used <keyword> 'default | pcapkit' * layer -- str, extract til which layer <keyword> 'Link' / 'Internet' / 'Transport' / 'Application' * protocol -- str, extract til which protocol <keyword> available protocol name * ip -- bool, if record data for IPv4 & IPv6 reassembly (default is False) <keyword> True / False * ipv4 -- bool, if perform IPv4 reassembly (default is False) <keyword> True / False * ipv6 -- bool, if perform IPv6 reassembly (default is False) <keyword> True / False * tcp -- bool, if perform TCP reassembly (default is False) <keyword> True / False * strict -- bool, if set strict flag for reassembly (default is True) <keyword> True / False * trace -- bool, if trace TCP traffic flows (default is False) <keyword> True / False * trace_fout -- str, path name for flow tracer if necessary * trace_format -- str, output file format of flow tracer <keyword> 'plist' / 'json' / 'tree' / 'html' / 'pcap' * trace_byteorder -- str, output file byte order <keyword> 'little' / 'big' * trace_nanosecond -- bool, output nanosecond-resolution file flag <keyword> True / False Returns: * Extractor -- an Extractor object form `pcapkit.extractor`
[ "Extract", "a", "PCAP", "file", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/interface/__init__.py#L53-L131
1,238
JarryShaw/PyPCAPKit
src/interface/__init__.py
reassemble
def reassemble(protocol, strict=False): """Reassemble fragmented datagrams. Keyword arguments: * protocol -- str, protocol to be reassembled * strict -- bool, if return all datagrams (including those not implemented) when submit (default is False) <keyword> True / False Returns: * [if protocol is IPv4] IPv4_Reassembly -- a Reassembly object from `pcapkit.reassembly` * [if protocol is IPv6] IPv6_Reassembly -- a Reassembly object from `pcapkit.reassembly` * [if protocol is TCP] TCP_Reassembly -- a Reassembly object from `pcapkit.reassembly` """ if isinstance(protocol, type) and issubclass(protocol, Protocol): protocol = protocol.__index__() str_check(protocol) bool_check(strict) if protocol == 'IPv4': return IPv4_Reassembly(strict=strict) elif protocol == 'IPv6': return IPv6_Reassembly(strict=strict) elif protocol == 'TCP': return TCP_Reassembly(strict=strict) else: raise FormatError(f'Unsupported reassembly protocol: {protocol}')
python
def reassemble(protocol, strict=False): if isinstance(protocol, type) and issubclass(protocol, Protocol): protocol = protocol.__index__() str_check(protocol) bool_check(strict) if protocol == 'IPv4': return IPv4_Reassembly(strict=strict) elif protocol == 'IPv6': return IPv6_Reassembly(strict=strict) elif protocol == 'TCP': return TCP_Reassembly(strict=strict) else: raise FormatError(f'Unsupported reassembly protocol: {protocol}')
[ "def", "reassemble", "(", "protocol", ",", "strict", "=", "False", ")", ":", "if", "isinstance", "(", "protocol", ",", "type", ")", "and", "issubclass", "(", "protocol", ",", "Protocol", ")", ":", "protocol", "=", "protocol", ".", "__index__", "(", ")", "str_check", "(", "protocol", ")", "bool_check", "(", "strict", ")", "if", "protocol", "==", "'IPv4'", ":", "return", "IPv4_Reassembly", "(", "strict", "=", "strict", ")", "elif", "protocol", "==", "'IPv6'", ":", "return", "IPv6_Reassembly", "(", "strict", "=", "strict", ")", "elif", "protocol", "==", "'TCP'", ":", "return", "TCP_Reassembly", "(", "strict", "=", "strict", ")", "else", ":", "raise", "FormatError", "(", "f'Unsupported reassembly protocol: {protocol}'", ")" ]
Reassemble fragmented datagrams. Keyword arguments: * protocol -- str, protocol to be reassembled * strict -- bool, if return all datagrams (including those not implemented) when submit (default is False) <keyword> True / False Returns: * [if protocol is IPv4] IPv4_Reassembly -- a Reassembly object from `pcapkit.reassembly` * [if protocol is IPv6] IPv6_Reassembly -- a Reassembly object from `pcapkit.reassembly` * [if protocol is TCP] TCP_Reassembly -- a Reassembly object from `pcapkit.reassembly`
[ "Reassemble", "fragmented", "datagrams", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/interface/__init__.py#L154-L181
1,239
JarryShaw/PyPCAPKit
src/interface/__init__.py
trace
def trace(fout=None, format=None, byteorder=sys.byteorder, nanosecond=False): """Trace TCP flows. Keyword arguments: * fout -- str, output path * format -- str, output format * byteorder -- str, output file byte order * nanosecond -- bool, output nanosecond-resolution file flag """ str_check(fout or '', format or '') return TraceFlow(fout=fout, format=format, byteorder=byteorder, nanosecond=nanosecond)
python
def trace(fout=None, format=None, byteorder=sys.byteorder, nanosecond=False): str_check(fout or '', format or '') return TraceFlow(fout=fout, format=format, byteorder=byteorder, nanosecond=nanosecond)
[ "def", "trace", "(", "fout", "=", "None", ",", "format", "=", "None", ",", "byteorder", "=", "sys", ".", "byteorder", ",", "nanosecond", "=", "False", ")", ":", "str_check", "(", "fout", "or", "''", ",", "format", "or", "''", ")", "return", "TraceFlow", "(", "fout", "=", "fout", ",", "format", "=", "format", ",", "byteorder", "=", "byteorder", ",", "nanosecond", "=", "nanosecond", ")" ]
Trace TCP flows. Keyword arguments: * fout -- str, output path * format -- str, output format * byteorder -- str, output file byte order * nanosecond -- bool, output nanosecond-resolution file flag
[ "Trace", "TCP", "flows", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/interface/__init__.py#L184-L195
1,240
JarryShaw/PyPCAPKit
src/protocols/internet/ipv6_frag.py
IPv6_Frag.read_ipv6_frag
def read_ipv6_frag(self, length, extension): """Read Fragment Header for IPv6. Structure of IPv6-Frag header [RFC 8200]: +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Next Header | Reserved | Fragment Offset |Res|M| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Identification | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Octets Bits Name Description 0 0 frag.next Next Header 1 8 - Reserved 2 16 frag.offset Fragment Offset 3 29 - Reserved 3 31 frag.mf More Flag 4 32 frag.id Identification """ if length is None: length = len(self) _next = self._read_protos(1) _temp = self._read_fileng(1) _offm = self._read_binary(2) _ipid = self._read_unpack(4) ipv6_frag = dict( next=_next, length=8, offset=int(_offm[:13], base=2), mf=True if int(_offm[15], base=2) else False, id=_ipid, ) length -= ipv6_frag['length'] ipv6_frag['packet'] = self._read_packet(header=8, payload=length) if extension: self._protos = None return ipv6_frag return self._decode_next_layer(ipv6_frag, _next, length)
python
def read_ipv6_frag(self, length, extension): if length is None: length = len(self) _next = self._read_protos(1) _temp = self._read_fileng(1) _offm = self._read_binary(2) _ipid = self._read_unpack(4) ipv6_frag = dict( next=_next, length=8, offset=int(_offm[:13], base=2), mf=True if int(_offm[15], base=2) else False, id=_ipid, ) length -= ipv6_frag['length'] ipv6_frag['packet'] = self._read_packet(header=8, payload=length) if extension: self._protos = None return ipv6_frag return self._decode_next_layer(ipv6_frag, _next, length)
[ "def", "read_ipv6_frag", "(", "self", ",", "length", ",", "extension", ")", ":", "if", "length", "is", "None", ":", "length", "=", "len", "(", "self", ")", "_next", "=", "self", ".", "_read_protos", "(", "1", ")", "_temp", "=", "self", ".", "_read_fileng", "(", "1", ")", "_offm", "=", "self", ".", "_read_binary", "(", "2", ")", "_ipid", "=", "self", ".", "_read_unpack", "(", "4", ")", "ipv6_frag", "=", "dict", "(", "next", "=", "_next", ",", "length", "=", "8", ",", "offset", "=", "int", "(", "_offm", "[", ":", "13", "]", ",", "base", "=", "2", ")", ",", "mf", "=", "True", "if", "int", "(", "_offm", "[", "15", "]", ",", "base", "=", "2", ")", "else", "False", ",", "id", "=", "_ipid", ",", ")", "length", "-=", "ipv6_frag", "[", "'length'", "]", "ipv6_frag", "[", "'packet'", "]", "=", "self", ".", "_read_packet", "(", "header", "=", "8", ",", "payload", "=", "length", ")", "if", "extension", ":", "self", ".", "_protos", "=", "None", "return", "ipv6_frag", "return", "self", ".", "_decode_next_layer", "(", "ipv6_frag", ",", "_next", ",", "length", ")" ]
Read Fragment Header for IPv6. Structure of IPv6-Frag header [RFC 8200]: +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Next Header | Reserved | Fragment Offset |Res|M| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Identification | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Octets Bits Name Description 0 0 frag.next Next Header 1 8 - Reserved 2 16 frag.offset Fragment Offset 3 29 - Reserved 3 31 frag.mf More Flag 4 32 frag.id Identification
[ "Read", "Fragment", "Header", "for", "IPv6", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/protocols/internet/ipv6_frag.py#L87-L128
1,241
JarryShaw/PyPCAPKit
src/protocols/internet/ipv4.py
IPv4._read_ipv4_options
def _read_ipv4_options(self, size=None): """Read IPv4 option list. Positional arguments: * size -- int, buffer size Returns: * tuple -- IPv4 option list * dict -- extracted IPv4 option """ counter = 0 # length of read option list optkind = list() # option kind list options = dict() # dict of option data while counter < size: # get option kind kind = self._read_unpack(1) # fetch corresponding option tuple opts = IPv4_OPT.get(kind) if opts is None: len_ = size - counter counter = size options['Unknown'] = self._read_fileng(len_) break # extract option dscp = OPT_TYPE.get(kind) desc = dscp.name if opts[0]: byte = self._read_unpack(1) if byte: # check option process mode data = process_opt[opts[2]](self, byte, kind) else: # permission options (length is 2) data = dict( kind=kind, # option kind type=self._read_opt_type(kind), # option type info length=2, # option length flag=True, # permission flag ) else: # 1-bytes options byte = 1 data = dict( kind=kind, # option kind type=self._read_opt_type(kind), # option type info length=1, # option length ) # record option data counter += byte if dscp in optkind: if isinstance(options[desc], tuple): options[desc] += (Info(data),) else: options[desc] = (Info(options[desc]), Info(data)) else: optkind.append(dscp) options[desc] = data # break when eol triggered if not kind: break # get padding if counter < size: len_ = size - counter self._read_binary(len_) return tuple(optkind), options
python
def _read_ipv4_options(self, size=None): counter = 0 # length of read option list optkind = list() # option kind list options = dict() # dict of option data while counter < size: # get option kind kind = self._read_unpack(1) # fetch corresponding option tuple opts = IPv4_OPT.get(kind) if opts is None: len_ = size - counter counter = size options['Unknown'] = self._read_fileng(len_) break # extract option dscp = OPT_TYPE.get(kind) desc = dscp.name if opts[0]: byte = self._read_unpack(1) if byte: # check option process mode data = process_opt[opts[2]](self, byte, kind) else: # permission options (length is 2) data = dict( kind=kind, # option kind type=self._read_opt_type(kind), # option type info length=2, # option length flag=True, # permission flag ) else: # 1-bytes options byte = 1 data = dict( kind=kind, # option kind type=self._read_opt_type(kind), # option type info length=1, # option length ) # record option data counter += byte if dscp in optkind: if isinstance(options[desc], tuple): options[desc] += (Info(data),) else: options[desc] = (Info(options[desc]), Info(data)) else: optkind.append(dscp) options[desc] = data # break when eol triggered if not kind: break # get padding if counter < size: len_ = size - counter self._read_binary(len_) return tuple(optkind), options
[ "def", "_read_ipv4_options", "(", "self", ",", "size", "=", "None", ")", ":", "counter", "=", "0", "# length of read option list", "optkind", "=", "list", "(", ")", "# option kind list", "options", "=", "dict", "(", ")", "# dict of option data", "while", "counter", "<", "size", ":", "# get option kind", "kind", "=", "self", ".", "_read_unpack", "(", "1", ")", "# fetch corresponding option tuple", "opts", "=", "IPv4_OPT", ".", "get", "(", "kind", ")", "if", "opts", "is", "None", ":", "len_", "=", "size", "-", "counter", "counter", "=", "size", "options", "[", "'Unknown'", "]", "=", "self", ".", "_read_fileng", "(", "len_", ")", "break", "# extract option", "dscp", "=", "OPT_TYPE", ".", "get", "(", "kind", ")", "desc", "=", "dscp", ".", "name", "if", "opts", "[", "0", "]", ":", "byte", "=", "self", ".", "_read_unpack", "(", "1", ")", "if", "byte", ":", "# check option process mode", "data", "=", "process_opt", "[", "opts", "[", "2", "]", "]", "(", "self", ",", "byte", ",", "kind", ")", "else", ":", "# permission options (length is 2)", "data", "=", "dict", "(", "kind", "=", "kind", ",", "# option kind", "type", "=", "self", ".", "_read_opt_type", "(", "kind", ")", ",", "# option type info", "length", "=", "2", ",", "# option length", "flag", "=", "True", ",", "# permission flag", ")", "else", ":", "# 1-bytes options", "byte", "=", "1", "data", "=", "dict", "(", "kind", "=", "kind", ",", "# option kind", "type", "=", "self", ".", "_read_opt_type", "(", "kind", ")", ",", "# option type info", "length", "=", "1", ",", "# option length", ")", "# record option data", "counter", "+=", "byte", "if", "dscp", "in", "optkind", ":", "if", "isinstance", "(", "options", "[", "desc", "]", ",", "tuple", ")", ":", "options", "[", "desc", "]", "+=", "(", "Info", "(", "data", ")", ",", ")", "else", ":", "options", "[", "desc", "]", "=", "(", "Info", "(", "options", "[", "desc", "]", ")", ",", "Info", "(", "data", ")", ")", "else", ":", "optkind", ".", "append", "(", "dscp", ")", "options", "[", "desc", "]", "=", "data", "# break when eol triggered", "if", "not", "kind", ":", "break", "# get padding", "if", "counter", "<", "size", ":", "len_", "=", "size", "-", "counter", "self", ".", "_read_binary", "(", "len_", ")", "return", "tuple", "(", "optkind", ")", ",", "options" ]
Read IPv4 option list. Positional arguments: * size -- int, buffer size Returns: * tuple -- IPv4 option list * dict -- extracted IPv4 option
[ "Read", "IPv4", "option", "list", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/protocols/internet/ipv4.py#L312-L382
1,242
JarryShaw/PyPCAPKit
src/protocols/internet/ipv4.py
IPv4._read_mode_route
def _read_mode_route(self, size, kind): """Read options with route data. Positional arguments: * size - int, length of option * kind - int, 7/131/137 (RR/LSR/SSR) Returns: * dict -- extracted option with route data Structure of these options: * [RFC 791] Loose Source Route +--------+--------+--------+---------//--------+ |10000011| length | pointer| route data | +--------+--------+--------+---------//--------+ * [RFC 791] Strict Source Route +--------+--------+--------+---------//--------+ |10001001| length | pointer| route data | +--------+--------+--------+---------//--------+ * [RFC 791] Record Route +--------+--------+--------+---------//--------+ |00000111| length | pointer| route data | +--------+--------+--------+---------//--------+ Octets Bits Name Description 0 0 ip.opt.kind Kind (7/131/137) 0 0 ip.opt.type.copy Copied Flag (0) 0 1 ip.opt.type.class Option Class (0/1) 0 3 ip.opt.type.number Option Number (3/7/9) 1 8 ip.opt.length Length 2 16 ip.opt.pointer Pointer (≥4) 3 24 ip.opt.data Route Data """ if size < 3 or (size - 3) % 4 != 0: raise ProtocolError(f'{self.alias}: [Optno {kind}] invalid format') _rptr = self._read_unpack(1) if _rptr < 4: raise ProtocolError(f'{self.alias}: [Optno {kind}] invalid format') data = dict( kind=kind, type=self._read_opt_type(kind), length=size, pointer=_rptr, ) counter = 4 address = list() endpoint = min(_rptr, size) while counter < endpoint: counter += 4 address.append(self._read_ipv4_addr()) data['ip'] = address or None return data
python
def _read_mode_route(self, size, kind): if size < 3 or (size - 3) % 4 != 0: raise ProtocolError(f'{self.alias}: [Optno {kind}] invalid format') _rptr = self._read_unpack(1) if _rptr < 4: raise ProtocolError(f'{self.alias}: [Optno {kind}] invalid format') data = dict( kind=kind, type=self._read_opt_type(kind), length=size, pointer=_rptr, ) counter = 4 address = list() endpoint = min(_rptr, size) while counter < endpoint: counter += 4 address.append(self._read_ipv4_addr()) data['ip'] = address or None return data
[ "def", "_read_mode_route", "(", "self", ",", "size", ",", "kind", ")", ":", "if", "size", "<", "3", "or", "(", "size", "-", "3", ")", "%", "4", "!=", "0", ":", "raise", "ProtocolError", "(", "f'{self.alias}: [Optno {kind}] invalid format'", ")", "_rptr", "=", "self", ".", "_read_unpack", "(", "1", ")", "if", "_rptr", "<", "4", ":", "raise", "ProtocolError", "(", "f'{self.alias}: [Optno {kind}] invalid format'", ")", "data", "=", "dict", "(", "kind", "=", "kind", ",", "type", "=", "self", ".", "_read_opt_type", "(", "kind", ")", ",", "length", "=", "size", ",", "pointer", "=", "_rptr", ",", ")", "counter", "=", "4", "address", "=", "list", "(", ")", "endpoint", "=", "min", "(", "_rptr", ",", "size", ")", "while", "counter", "<", "endpoint", ":", "counter", "+=", "4", "address", ".", "append", "(", "self", ".", "_read_ipv4_addr", "(", ")", ")", "data", "[", "'ip'", "]", "=", "address", "or", "None", "return", "data" ]
Read options with route data. Positional arguments: * size - int, length of option * kind - int, 7/131/137 (RR/LSR/SSR) Returns: * dict -- extracted option with route data Structure of these options: * [RFC 791] Loose Source Route +--------+--------+--------+---------//--------+ |10000011| length | pointer| route data | +--------+--------+--------+---------//--------+ * [RFC 791] Strict Source Route +--------+--------+--------+---------//--------+ |10001001| length | pointer| route data | +--------+--------+--------+---------//--------+ * [RFC 791] Record Route +--------+--------+--------+---------//--------+ |00000111| length | pointer| route data | +--------+--------+--------+---------//--------+ Octets Bits Name Description 0 0 ip.opt.kind Kind (7/131/137) 0 0 ip.opt.type.copy Copied Flag (0) 0 1 ip.opt.type.class Option Class (0/1) 0 3 ip.opt.type.number Option Number (3/7/9) 1 8 ip.opt.length Length 2 16 ip.opt.pointer Pointer (≥4) 3 24 ip.opt.data Route Data
[ "Read", "options", "with", "route", "data", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/protocols/internet/ipv4.py#L448-L505
1,243
JarryShaw/PyPCAPKit
src/protocols/internet/ipv4.py
IPv4._read_mode_qs
def _read_mode_qs(self, size, kind): """Read Quick Start option. Positional arguments: * size - int, length of option * kind - int, 25 (QS) Returns: * dict -- extracted Quick Start (QS) option Structure of Quick-Start (QS) option [RFC 4782]: * A Quick-Start Request. 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Option | Length=8 | Func. | Rate | QS TTL | | | | 0000 |Request| | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | QS Nonce | R | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ * Report of Approved Rate. 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Option | Length=8 | Func. | Rate | Not Used | | | | 1000 | Report| | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | QS Nonce | R | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Octets Bits Name Description 0 0 ip.qs.kind Kind (25) 0 0 ip.qs.type.copy Copied Flag (0) 0 1 ip.qs.type.class Option Class (0) 0 3 ip.qs.type.number Option Number (25) 1 8 ip.qs.length Length (8) 2 16 ip.qs.func Function (0/8) 2 20 ip.qs.rate Rate Request / Report (in Kbps) 3 24 ip.qs.ttl QS TTL / None 4 32 ip.qs.nounce QS Nounce 7 62 - Reserved (\x00\x00) """ if size != 8: raise ProtocolError(f'{self.alias}: [Optno {kind}] invalid format') _type = self._read_opt_type(kind) _fcrr = self._read_binary(1) _func = int(_fcrr[:4], base=2) _rate = int(_fcrr[4:], base=2) _ttlv = self._read_unpack(1) _nonr = self._read_binary(4) _qsnn = int(_nonr[:30], base=2) if _func != 0 and _func != 8: raise ProtocolError(f'{self.alias}: [Optno {kind}] invalid format') data = dict( kind=kind, type=_type, length=size, func=QS_FUNC.get(_func), rate=40000 * (2 ** _rate) / 1000, ttl=None if _func else _rate, nounce=_qsnn, ) return data
python
def _read_mode_qs(self, size, kind): if size != 8: raise ProtocolError(f'{self.alias}: [Optno {kind}] invalid format') _type = self._read_opt_type(kind) _fcrr = self._read_binary(1) _func = int(_fcrr[:4], base=2) _rate = int(_fcrr[4:], base=2) _ttlv = self._read_unpack(1) _nonr = self._read_binary(4) _qsnn = int(_nonr[:30], base=2) if _func != 0 and _func != 8: raise ProtocolError(f'{self.alias}: [Optno {kind}] invalid format') data = dict( kind=kind, type=_type, length=size, func=QS_FUNC.get(_func), rate=40000 * (2 ** _rate) / 1000, ttl=None if _func else _rate, nounce=_qsnn, ) return data
[ "def", "_read_mode_qs", "(", "self", ",", "size", ",", "kind", ")", ":", "if", "size", "!=", "8", ":", "raise", "ProtocolError", "(", "f'{self.alias}: [Optno {kind}] invalid format'", ")", "_type", "=", "self", ".", "_read_opt_type", "(", "kind", ")", "_fcrr", "=", "self", ".", "_read_binary", "(", "1", ")", "_func", "=", "int", "(", "_fcrr", "[", ":", "4", "]", ",", "base", "=", "2", ")", "_rate", "=", "int", "(", "_fcrr", "[", "4", ":", "]", ",", "base", "=", "2", ")", "_ttlv", "=", "self", ".", "_read_unpack", "(", "1", ")", "_nonr", "=", "self", ".", "_read_binary", "(", "4", ")", "_qsnn", "=", "int", "(", "_nonr", "[", ":", "30", "]", ",", "base", "=", "2", ")", "if", "_func", "!=", "0", "and", "_func", "!=", "8", ":", "raise", "ProtocolError", "(", "f'{self.alias}: [Optno {kind}] invalid format'", ")", "data", "=", "dict", "(", "kind", "=", "kind", ",", "type", "=", "_type", ",", "length", "=", "size", ",", "func", "=", "QS_FUNC", ".", "get", "(", "_func", ")", ",", "rate", "=", "40000", "*", "(", "2", "**", "_rate", ")", "/", "1000", ",", "ttl", "=", "None", "if", "_func", "else", "_rate", ",", "nounce", "=", "_qsnn", ",", ")", "return", "data" ]
Read Quick Start option. Positional arguments: * size - int, length of option * kind - int, 25 (QS) Returns: * dict -- extracted Quick Start (QS) option Structure of Quick-Start (QS) option [RFC 4782]: * A Quick-Start Request. 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Option | Length=8 | Func. | Rate | QS TTL | | | | 0000 |Request| | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | QS Nonce | R | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ * Report of Approved Rate. 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Option | Length=8 | Func. | Rate | Not Used | | | | 1000 | Report| | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | QS Nonce | R | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Octets Bits Name Description 0 0 ip.qs.kind Kind (25) 0 0 ip.qs.type.copy Copied Flag (0) 0 1 ip.qs.type.class Option Class (0) 0 3 ip.qs.type.number Option Number (25) 1 8 ip.qs.length Length (8) 2 16 ip.qs.func Function (0/8) 2 20 ip.qs.rate Rate Request / Report (in Kbps) 3 24 ip.qs.ttl QS TTL / None 4 32 ip.qs.nounce QS Nounce 7 62 - Reserved (\x00\x00)
[ "Read", "Quick", "Start", "option", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/protocols/internet/ipv4.py#L507-L574
1,244
JarryShaw/PyPCAPKit
src/protocols/internet/ipv4.py
IPv4._read_mode_ts
def _read_mode_ts(self, size, kind): """Read Time Stamp option. Positional arguments: * size - int, length of option * kind - int, 68 (TS) Returns: * dict -- extracted Time Stamp (TS) option Structure of Timestamp (TS) option [RFC 791]: +--------+--------+--------+--------+ |01000100| length | pointer|oflw|flg| +--------+--------+--------+--------+ | internet address | +--------+--------+--------+--------+ | timestamp | +--------+--------+--------+--------+ | . | . . Octets Bits Name Description 0 0 ip.ts.kind Kind (25) 0 0 ip.ts.type.copy Copied Flag (0) 0 1 ip.ts.type.class Option Class (0) 0 3 ip.ts.type.number Option Number (25) 1 8 ip.ts.length Length (≤40) 2 16 ip.ts.pointer Pointer (≥5) 3 24 ip.ts.overflow Overflow Octets 3 28 ip.ts.flag Flag 4 32 ip.ts.ip Internet Address 8 64 ip.ts.timestamp Timestamp """ if size > 40 or size < 4: raise ProtocolError(f'{self.alias}: [Optno {kind}] invalid format') _tptr = self._read_unpack(1) _oflg = self._read_binary(1) _oflw = int(_oflg[:4], base=2) _flag = int(_oflg[4:], base=2) if _tptr < 5: raise ProtocolError(f'{self.alias}: [Optno {kind}] invalid format') data = dict( kind=kind, type=self._read_opt_type(kind), length=size, pointer=_tptr, overflow=_oflw, flag=_flag, ) endpoint = min(_tptr, size) if _flag == 0: if (size - 4) % 4 != 0: raise ProtocolError(f'{self.alias}: [Optno {kind}] invalid format') counter = 5 timestamp = list() while counter < endpoint: counter += 4 time = self._read_unpack(4, lilendian=True) timestamp.append(datetime.datetime.fromtimestamp(time)) data['timestamp'] = timestamp or None elif _flag == 1 or _flag == 3: if (size - 4) % 8 != 0: raise ProtocolError(f'{self.alias}: [Optno {kind}] invalid format') counter = 5 ipaddress = list() timestamp = list() while counter < endpoint: counter += 8 ipaddress.append(self._read_ipv4_addr()) time = self._read_unpack(4, lilendian=True) timestamp.append(datetime.datetime.fromtimestamp(time)) data['ip'] = ipaddress or None data['timestamp'] = timestamp or None else: data['data'] = self._read_fileng(size - 4) or None return data
python
def _read_mode_ts(self, size, kind): if size > 40 or size < 4: raise ProtocolError(f'{self.alias}: [Optno {kind}] invalid format') _tptr = self._read_unpack(1) _oflg = self._read_binary(1) _oflw = int(_oflg[:4], base=2) _flag = int(_oflg[4:], base=2) if _tptr < 5: raise ProtocolError(f'{self.alias}: [Optno {kind}] invalid format') data = dict( kind=kind, type=self._read_opt_type(kind), length=size, pointer=_tptr, overflow=_oflw, flag=_flag, ) endpoint = min(_tptr, size) if _flag == 0: if (size - 4) % 4 != 0: raise ProtocolError(f'{self.alias}: [Optno {kind}] invalid format') counter = 5 timestamp = list() while counter < endpoint: counter += 4 time = self._read_unpack(4, lilendian=True) timestamp.append(datetime.datetime.fromtimestamp(time)) data['timestamp'] = timestamp or None elif _flag == 1 or _flag == 3: if (size - 4) % 8 != 0: raise ProtocolError(f'{self.alias}: [Optno {kind}] invalid format') counter = 5 ipaddress = list() timestamp = list() while counter < endpoint: counter += 8 ipaddress.append(self._read_ipv4_addr()) time = self._read_unpack(4, lilendian=True) timestamp.append(datetime.datetime.fromtimestamp(time)) data['ip'] = ipaddress or None data['timestamp'] = timestamp or None else: data['data'] = self._read_fileng(size - 4) or None return data
[ "def", "_read_mode_ts", "(", "self", ",", "size", ",", "kind", ")", ":", "if", "size", ">", "40", "or", "size", "<", "4", ":", "raise", "ProtocolError", "(", "f'{self.alias}: [Optno {kind}] invalid format'", ")", "_tptr", "=", "self", ".", "_read_unpack", "(", "1", ")", "_oflg", "=", "self", ".", "_read_binary", "(", "1", ")", "_oflw", "=", "int", "(", "_oflg", "[", ":", "4", "]", ",", "base", "=", "2", ")", "_flag", "=", "int", "(", "_oflg", "[", "4", ":", "]", ",", "base", "=", "2", ")", "if", "_tptr", "<", "5", ":", "raise", "ProtocolError", "(", "f'{self.alias}: [Optno {kind}] invalid format'", ")", "data", "=", "dict", "(", "kind", "=", "kind", ",", "type", "=", "self", ".", "_read_opt_type", "(", "kind", ")", ",", "length", "=", "size", ",", "pointer", "=", "_tptr", ",", "overflow", "=", "_oflw", ",", "flag", "=", "_flag", ",", ")", "endpoint", "=", "min", "(", "_tptr", ",", "size", ")", "if", "_flag", "==", "0", ":", "if", "(", "size", "-", "4", ")", "%", "4", "!=", "0", ":", "raise", "ProtocolError", "(", "f'{self.alias}: [Optno {kind}] invalid format'", ")", "counter", "=", "5", "timestamp", "=", "list", "(", ")", "while", "counter", "<", "endpoint", ":", "counter", "+=", "4", "time", "=", "self", ".", "_read_unpack", "(", "4", ",", "lilendian", "=", "True", ")", "timestamp", ".", "append", "(", "datetime", ".", "datetime", ".", "fromtimestamp", "(", "time", ")", ")", "data", "[", "'timestamp'", "]", "=", "timestamp", "or", "None", "elif", "_flag", "==", "1", "or", "_flag", "==", "3", ":", "if", "(", "size", "-", "4", ")", "%", "8", "!=", "0", ":", "raise", "ProtocolError", "(", "f'{self.alias}: [Optno {kind}] invalid format'", ")", "counter", "=", "5", "ipaddress", "=", "list", "(", ")", "timestamp", "=", "list", "(", ")", "while", "counter", "<", "endpoint", ":", "counter", "+=", "8", "ipaddress", ".", "append", "(", "self", ".", "_read_ipv4_addr", "(", ")", ")", "time", "=", "self", ".", "_read_unpack", "(", "4", ",", "lilendian", "=", "True", ")", "timestamp", ".", "append", "(", "datetime", ".", "datetime", ".", "fromtimestamp", "(", "time", ")", ")", "data", "[", "'ip'", "]", "=", "ipaddress", "or", "None", "data", "[", "'timestamp'", "]", "=", "timestamp", "or", "None", "else", ":", "data", "[", "'data'", "]", "=", "self", ".", "_read_fileng", "(", "size", "-", "4", ")", "or", "None", "return", "data" ]
Read Time Stamp option. Positional arguments: * size - int, length of option * kind - int, 68 (TS) Returns: * dict -- extracted Time Stamp (TS) option Structure of Timestamp (TS) option [RFC 791]: +--------+--------+--------+--------+ |01000100| length | pointer|oflw|flg| +--------+--------+--------+--------+ | internet address | +--------+--------+--------+--------+ | timestamp | +--------+--------+--------+--------+ | . | . . Octets Bits Name Description 0 0 ip.ts.kind Kind (25) 0 0 ip.ts.type.copy Copied Flag (0) 0 1 ip.ts.type.class Option Class (0) 0 3 ip.ts.type.number Option Number (25) 1 8 ip.ts.length Length (≤40) 2 16 ip.ts.pointer Pointer (≥5) 3 24 ip.ts.overflow Overflow Octets 3 28 ip.ts.flag Flag 4 32 ip.ts.ip Internet Address 8 64 ip.ts.timestamp Timestamp
[ "Read", "Time", "Stamp", "option", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/protocols/internet/ipv4.py#L576-L658
1,245
JarryShaw/PyPCAPKit
src/protocols/internet/ipv4.py
IPv4._read_mode_tr
def _read_mode_tr(self, size, kind): """Read Traceroute option. Positional arguments: size - int, length of option kind - int, 82 (TR) Returns: * dict -- extracted Traceroute (TR) option Structure of Traceroute (TR) option [RFC 1393][RFC 6814]: 0 8 16 24 +-+-+-+-+-+-+-+-+---------------+---------------+---------------+ |F| C | Number | Length | ID Number | +-+-+-+-+-+-+-+-+---------------+---------------+---------------+ | Outbound Hop Count | Return Hop Count | +---------------+---------------+---------------+---------------+ | Originator IP Address | +---------------+---------------+---------------+---------------+ Octets Bits Name Description 0 0 ip.tr.kind Kind (82) 0 0 ip.tr.type.copy Copied Flag (0) 0 1 ip.tr.type.class Option Class (0) 0 3 ip.tr.type.number Option Number (18) 1 8 ip.tr.length Length (12) 2 16 ip.tr.id ID Number 4 32 ip.tr.ohc Outbound Hop Count 6 48 ip.tr.rhc Return Hop Count 8 64 ip.tr.ip Originator IP Address """ if size != 12: raise ProtocolError(f'{self.alias}: [Optno {kind}] invalid format') _idnm = self._read_unpack(2) _ohcn = self._read_unpack(2) _rhcn = self._read_unpack(2) _ipad = self._read_ipv4_addr() data = dict( kind=kind, type=self._read_opt_type(kind), length=size, id=_idnm, ohc=_ohcn, rhc=_rhcn, ip=_ipad, ) return data
python
def _read_mode_tr(self, size, kind): if size != 12: raise ProtocolError(f'{self.alias}: [Optno {kind}] invalid format') _idnm = self._read_unpack(2) _ohcn = self._read_unpack(2) _rhcn = self._read_unpack(2) _ipad = self._read_ipv4_addr() data = dict( kind=kind, type=self._read_opt_type(kind), length=size, id=_idnm, ohc=_ohcn, rhc=_rhcn, ip=_ipad, ) return data
[ "def", "_read_mode_tr", "(", "self", ",", "size", ",", "kind", ")", ":", "if", "size", "!=", "12", ":", "raise", "ProtocolError", "(", "f'{self.alias}: [Optno {kind}] invalid format'", ")", "_idnm", "=", "self", ".", "_read_unpack", "(", "2", ")", "_ohcn", "=", "self", ".", "_read_unpack", "(", "2", ")", "_rhcn", "=", "self", ".", "_read_unpack", "(", "2", ")", "_ipad", "=", "self", ".", "_read_ipv4_addr", "(", ")", "data", "=", "dict", "(", "kind", "=", "kind", ",", "type", "=", "self", ".", "_read_opt_type", "(", "kind", ")", ",", "length", "=", "size", ",", "id", "=", "_idnm", ",", "ohc", "=", "_ohcn", ",", "rhc", "=", "_rhcn", ",", "ip", "=", "_ipad", ",", ")", "return", "data" ]
Read Traceroute option. Positional arguments: size - int, length of option kind - int, 82 (TR) Returns: * dict -- extracted Traceroute (TR) option Structure of Traceroute (TR) option [RFC 1393][RFC 6814]: 0 8 16 24 +-+-+-+-+-+-+-+-+---------------+---------------+---------------+ |F| C | Number | Length | ID Number | +-+-+-+-+-+-+-+-+---------------+---------------+---------------+ | Outbound Hop Count | Return Hop Count | +---------------+---------------+---------------+---------------+ | Originator IP Address | +---------------+---------------+---------------+---------------+ Octets Bits Name Description 0 0 ip.tr.kind Kind (82) 0 0 ip.tr.type.copy Copied Flag (0) 0 1 ip.tr.type.class Option Class (0) 0 3 ip.tr.type.number Option Number (18) 1 8 ip.tr.length Length (12) 2 16 ip.tr.id ID Number 4 32 ip.tr.ohc Outbound Hop Count 6 48 ip.tr.rhc Return Hop Count 8 64 ip.tr.ip Originator IP Address
[ "Read", "Traceroute", "option", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/protocols/internet/ipv4.py#L660-L710
1,246
JarryShaw/PyPCAPKit
src/protocols/internet/ipv4.py
IPv4._read_mode_sec
def _read_mode_sec(self, size, kind): """Read options with security info. Positional arguments: size - int, length of option kind - int, 130 (SEC )/ 133 (ESEC) Returns: * dict -- extracted option with security info (E/SEC) Structure of these options: * [RFC 1108] Security (SEC) +------------+------------+------------+-------------//----------+ | 10000010 | XXXXXXXX | SSSSSSSS | AAAAAAA[1] AAAAAAA0 | | | | | [0] | +------------+------------+------------+-------------//----------+ TYPE = 130 LENGTH CLASSIFICATION PROTECTION LEVEL AUTHORITY FLAGS * [RFC 1108] Extended Security (ESEC): +------------+------------+------------+-------//-------+ | 10000101 | 000LLLLL | AAAAAAAA | add sec info | +------------+------------+------------+-------//-------+ TYPE = 133 LENGTH ADDITIONAL ADDITIONAL SECURITY INFO SECURITY FORMAT CODE INFO Octets Bits Name Description 0 0 ip.sec.kind Kind (130) 0 0 ip.sec.type.copy Copied Flag (1) 0 1 ip.sec.type.class Option Class (0) 0 3 ip.sec.type.number Option Number (2) 1 8 ip.sec.length Length (≥3) 2 16 ip.sec.level Classification Level 3 24 ip.sec.flags Protection Authority Flags """ if size < 3: raise ProtocolError(f'{self.alias}: [Optno {kind}] invalid format') _clvl = self._read_unpack(1) data = dict( kind=kind, type=self._read_opt_type(kind), length=size, level=_CLASSIFICATION_LEVEL.get(_clvl, _clvl), ) if size > 3: _list = list() for counter in range(3, size): _flag = self._read_binary(1) if (counter < size - 1 and not int(_flag[7], base=2)) \ or (counter == size - 1 and int(_flag[7], base=2)): raise ProtocolError(f'{self.alias}: [Optno {kind}] invalid format') _dict = dict() for (index, bit) in enumerate(_flag[:5]): _auth = _PROTECTION_AUTHORITY.get(index) _dict[_auth] = True if int(bit, base=2) else False _list.append(Info(_dict)) data['flags'] = tuple(_list) return data
python
def _read_mode_sec(self, size, kind): if size < 3: raise ProtocolError(f'{self.alias}: [Optno {kind}] invalid format') _clvl = self._read_unpack(1) data = dict( kind=kind, type=self._read_opt_type(kind), length=size, level=_CLASSIFICATION_LEVEL.get(_clvl, _clvl), ) if size > 3: _list = list() for counter in range(3, size): _flag = self._read_binary(1) if (counter < size - 1 and not int(_flag[7], base=2)) \ or (counter == size - 1 and int(_flag[7], base=2)): raise ProtocolError(f'{self.alias}: [Optno {kind}] invalid format') _dict = dict() for (index, bit) in enumerate(_flag[:5]): _auth = _PROTECTION_AUTHORITY.get(index) _dict[_auth] = True if int(bit, base=2) else False _list.append(Info(_dict)) data['flags'] = tuple(_list) return data
[ "def", "_read_mode_sec", "(", "self", ",", "size", ",", "kind", ")", ":", "if", "size", "<", "3", ":", "raise", "ProtocolError", "(", "f'{self.alias}: [Optno {kind}] invalid format'", ")", "_clvl", "=", "self", ".", "_read_unpack", "(", "1", ")", "data", "=", "dict", "(", "kind", "=", "kind", ",", "type", "=", "self", ".", "_read_opt_type", "(", "kind", ")", ",", "length", "=", "size", ",", "level", "=", "_CLASSIFICATION_LEVEL", ".", "get", "(", "_clvl", ",", "_clvl", ")", ",", ")", "if", "size", ">", "3", ":", "_list", "=", "list", "(", ")", "for", "counter", "in", "range", "(", "3", ",", "size", ")", ":", "_flag", "=", "self", ".", "_read_binary", "(", "1", ")", "if", "(", "counter", "<", "size", "-", "1", "and", "not", "int", "(", "_flag", "[", "7", "]", ",", "base", "=", "2", ")", ")", "or", "(", "counter", "==", "size", "-", "1", "and", "int", "(", "_flag", "[", "7", "]", ",", "base", "=", "2", ")", ")", ":", "raise", "ProtocolError", "(", "f'{self.alias}: [Optno {kind}] invalid format'", ")", "_dict", "=", "dict", "(", ")", "for", "(", "index", ",", "bit", ")", "in", "enumerate", "(", "_flag", "[", ":", "5", "]", ")", ":", "_auth", "=", "_PROTECTION_AUTHORITY", ".", "get", "(", "index", ")", "_dict", "[", "_auth", "]", "=", "True", "if", "int", "(", "bit", ",", "base", "=", "2", ")", "else", "False", "_list", ".", "append", "(", "Info", "(", "_dict", ")", ")", "data", "[", "'flags'", "]", "=", "tuple", "(", "_list", ")", "return", "data" ]
Read options with security info. Positional arguments: size - int, length of option kind - int, 130 (SEC )/ 133 (ESEC) Returns: * dict -- extracted option with security info (E/SEC) Structure of these options: * [RFC 1108] Security (SEC) +------------+------------+------------+-------------//----------+ | 10000010 | XXXXXXXX | SSSSSSSS | AAAAAAA[1] AAAAAAA0 | | | | | [0] | +------------+------------+------------+-------------//----------+ TYPE = 130 LENGTH CLASSIFICATION PROTECTION LEVEL AUTHORITY FLAGS * [RFC 1108] Extended Security (ESEC): +------------+------------+------------+-------//-------+ | 10000101 | 000LLLLL | AAAAAAAA | add sec info | +------------+------------+------------+-------//-------+ TYPE = 133 LENGTH ADDITIONAL ADDITIONAL SECURITY INFO SECURITY FORMAT CODE INFO Octets Bits Name Description 0 0 ip.sec.kind Kind (130) 0 0 ip.sec.type.copy Copied Flag (1) 0 1 ip.sec.type.class Option Class (0) 0 3 ip.sec.type.number Option Number (2) 1 8 ip.sec.length Length (≥3) 2 16 ip.sec.level Classification Level 3 24 ip.sec.flags Protection Authority Flags
[ "Read", "options", "with", "security", "info", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/protocols/internet/ipv4.py#L712-L776
1,247
JarryShaw/PyPCAPKit
src/protocols/internet/ipv4.py
IPv4._read_mode_rsralt
def _read_mode_rsralt(self, size, kind): """Read Router Alert option. Positional arguments: size - int, length of option kind - int, 148 (RTRALT) Returns: * dict -- extracted Router Alert (RTRALT) option Structure of Router Alert (RTRALT) option [RFC 2113]: +--------+--------+--------+--------+ |10010100|00000100| 2 octet value | +--------+--------+--------+--------+ Octets Bits Name Description 0 0 ip.rsralt.kind Kind (148) 0 0 ip.rsralt.type.copy Copied Flag (1) 0 1 ip.rsralt.type.class Option Class (0) 0 3 ip.rsralt.type.number Option Number (20) 1 8 ip.rsralt.length Length (4) 2 16 ip.rsralt.alert Alert 2 16 ip.rsralt.code Alert Code """ if size != 4: raise ProtocolError(f'{self.alias}: [Optno {kind}] invalid format') _code = self._read_unpack(2) data = dict( kind=kind, type=self._read_opt_type(kind), length=size, alert=_ROUTER_ALERT.get(_code, 'Reserved'), code=_code, ) return data
python
def _read_mode_rsralt(self, size, kind): if size != 4: raise ProtocolError(f'{self.alias}: [Optno {kind}] invalid format') _code = self._read_unpack(2) data = dict( kind=kind, type=self._read_opt_type(kind), length=size, alert=_ROUTER_ALERT.get(_code, 'Reserved'), code=_code, ) return data
[ "def", "_read_mode_rsralt", "(", "self", ",", "size", ",", "kind", ")", ":", "if", "size", "!=", "4", ":", "raise", "ProtocolError", "(", "f'{self.alias}: [Optno {kind}] invalid format'", ")", "_code", "=", "self", ".", "_read_unpack", "(", "2", ")", "data", "=", "dict", "(", "kind", "=", "kind", ",", "type", "=", "self", ".", "_read_opt_type", "(", "kind", ")", ",", "length", "=", "size", ",", "alert", "=", "_ROUTER_ALERT", ".", "get", "(", "_code", ",", "'Reserved'", ")", ",", "code", "=", "_code", ",", ")", "return", "data" ]
Read Router Alert option. Positional arguments: size - int, length of option kind - int, 148 (RTRALT) Returns: * dict -- extracted Router Alert (RTRALT) option Structure of Router Alert (RTRALT) option [RFC 2113]: +--------+--------+--------+--------+ |10010100|00000100| 2 octet value | +--------+--------+--------+--------+ Octets Bits Name Description 0 0 ip.rsralt.kind Kind (148) 0 0 ip.rsralt.type.copy Copied Flag (1) 0 1 ip.rsralt.type.class Option Class (0) 0 3 ip.rsralt.type.number Option Number (20) 1 8 ip.rsralt.length Length (4) 2 16 ip.rsralt.alert Alert 2 16 ip.rsralt.code Alert Code
[ "Read", "Router", "Alert", "option", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/protocols/internet/ipv4.py#L778-L816
1,248
JarryShaw/PyPCAPKit
src/protocols/pcap/header.py
Header.read_header
def read_header(self): """Read global header of PCAP file. Structure of global header (C): typedef struct pcap_hdr_s { guint32 magic_number; /* magic number */ guint16 version_major; /* major version number */ guint16 version_minor; /* minor version number */ gint32 thiszone; /* GMT to local correction */ guint32 sigfigs; /* accuracy of timestamps */ guint32 snaplen; /* max length of captured packets, in octets */ guint32 network; /* data link type */ } pcap_hdr_t; """ _magn = self._read_fileng(4) if _magn == b'\xd4\xc3\xb2\xa1': lilendian = True self._nsec = False self._byte = 'little' elif _magn == b'\xa1\xb2\xc3\xd4': lilendian = False self._nsec = False self._byte = 'big' elif _magn == b'\x4d\x3c\xb2\xa1': lilendian = True self._nsec = True self._byte = 'little' elif _magn == b'\xa1\xb2\x3c\x4d': lilendian = False self._nsec = True self._byte = 'big' else: raise FileError(5, 'Unknown file format', self._file.name) _vmaj = self._read_unpack(2, lilendian=lilendian) _vmin = self._read_unpack(2, lilendian=lilendian) _zone = self._read_unpack(4, lilendian=lilendian, signed=True) _acts = self._read_unpack(4, lilendian=lilendian) _slen = self._read_unpack(4, lilendian=lilendian) _type = self._read_protos(4) _byte = self._read_packet(24) self._file = io.BytesIO(_byte) header = dict( magic_number=dict( data=_magn, byteorder=self._byte, nanosecond=self._nsec, ), version_major=_vmaj, version_minor=_vmin, thiszone=_zone, sigfigs=_acts, snaplen=_slen, network=_type, packet=_byte, ) return header
python
def read_header(self): _magn = self._read_fileng(4) if _magn == b'\xd4\xc3\xb2\xa1': lilendian = True self._nsec = False self._byte = 'little' elif _magn == b'\xa1\xb2\xc3\xd4': lilendian = False self._nsec = False self._byte = 'big' elif _magn == b'\x4d\x3c\xb2\xa1': lilendian = True self._nsec = True self._byte = 'little' elif _magn == b'\xa1\xb2\x3c\x4d': lilendian = False self._nsec = True self._byte = 'big' else: raise FileError(5, 'Unknown file format', self._file.name) _vmaj = self._read_unpack(2, lilendian=lilendian) _vmin = self._read_unpack(2, lilendian=lilendian) _zone = self._read_unpack(4, lilendian=lilendian, signed=True) _acts = self._read_unpack(4, lilendian=lilendian) _slen = self._read_unpack(4, lilendian=lilendian) _type = self._read_protos(4) _byte = self._read_packet(24) self._file = io.BytesIO(_byte) header = dict( magic_number=dict( data=_magn, byteorder=self._byte, nanosecond=self._nsec, ), version_major=_vmaj, version_minor=_vmin, thiszone=_zone, sigfigs=_acts, snaplen=_slen, network=_type, packet=_byte, ) return header
[ "def", "read_header", "(", "self", ")", ":", "_magn", "=", "self", ".", "_read_fileng", "(", "4", ")", "if", "_magn", "==", "b'\\xd4\\xc3\\xb2\\xa1'", ":", "lilendian", "=", "True", "self", ".", "_nsec", "=", "False", "self", ".", "_byte", "=", "'little'", "elif", "_magn", "==", "b'\\xa1\\xb2\\xc3\\xd4'", ":", "lilendian", "=", "False", "self", ".", "_nsec", "=", "False", "self", ".", "_byte", "=", "'big'", "elif", "_magn", "==", "b'\\x4d\\x3c\\xb2\\xa1'", ":", "lilendian", "=", "True", "self", ".", "_nsec", "=", "True", "self", ".", "_byte", "=", "'little'", "elif", "_magn", "==", "b'\\xa1\\xb2\\x3c\\x4d'", ":", "lilendian", "=", "False", "self", ".", "_nsec", "=", "True", "self", ".", "_byte", "=", "'big'", "else", ":", "raise", "FileError", "(", "5", ",", "'Unknown file format'", ",", "self", ".", "_file", ".", "name", ")", "_vmaj", "=", "self", ".", "_read_unpack", "(", "2", ",", "lilendian", "=", "lilendian", ")", "_vmin", "=", "self", ".", "_read_unpack", "(", "2", ",", "lilendian", "=", "lilendian", ")", "_zone", "=", "self", ".", "_read_unpack", "(", "4", ",", "lilendian", "=", "lilendian", ",", "signed", "=", "True", ")", "_acts", "=", "self", ".", "_read_unpack", "(", "4", ",", "lilendian", "=", "lilendian", ")", "_slen", "=", "self", ".", "_read_unpack", "(", "4", ",", "lilendian", "=", "lilendian", ")", "_type", "=", "self", ".", "_read_protos", "(", "4", ")", "_byte", "=", "self", ".", "_read_packet", "(", "24", ")", "self", ".", "_file", "=", "io", ".", "BytesIO", "(", "_byte", ")", "header", "=", "dict", "(", "magic_number", "=", "dict", "(", "data", "=", "_magn", ",", "byteorder", "=", "self", ".", "_byte", ",", "nanosecond", "=", "self", ".", "_nsec", ",", ")", ",", "version_major", "=", "_vmaj", ",", "version_minor", "=", "_vmin", ",", "thiszone", "=", "_zone", ",", "sigfigs", "=", "_acts", ",", "snaplen", "=", "_slen", ",", "network", "=", "_type", ",", "packet", "=", "_byte", ",", ")", "return", "header" ]
Read global header of PCAP file. Structure of global header (C): typedef struct pcap_hdr_s { guint32 magic_number; /* magic number */ guint16 version_major; /* major version number */ guint16 version_minor; /* minor version number */ gint32 thiszone; /* GMT to local correction */ guint32 sigfigs; /* accuracy of timestamps */ guint32 snaplen; /* max length of captured packets, in octets */ guint32 network; /* data link type */ } pcap_hdr_t;
[ "Read", "global", "header", "of", "PCAP", "file", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/protocols/pcap/header.py#L110-L170
1,249
JarryShaw/PyPCAPKit
src/protocols/pcap/frame.py
Frame.read_frame
def read_frame(self): """Read each block after global header. Structure of record/package header (C): typedef struct pcaprec_hdr_s { guint32 ts_sec; /* timestamp seconds */ guint32 ts_usec; /* timestamp microseconds */ guint32 incl_len; /* number of octets of packet saved in file */ guint32 orig_len; /* actual length of packet */ } pcaprec_hdr_t; """ # _scur = self._file.tell() _temp = self._read_unpack(4, lilendian=True, quiet=True) if _temp is None: raise EOFError _tsss = _temp _tsus = self._read_unpack(4, lilendian=True) _ilen = self._read_unpack(4, lilendian=True) _olen = self._read_unpack(4, lilendian=True) if self._nsec: _epch = _tsss + _tsus / 1000000000 else: _epch = _tsss + _tsus / 1000000 _time = datetime.datetime.fromtimestamp(_epch) frame = dict( frame_info=dict( ts_sec=_tsss, ts_usec=_tsus, incl_len=_ilen, orig_len=_olen, ), time=_time, number=self._fnum, time_epoch=_epch, len=_ilen, cap_len=_olen, ) # load packet data length = frame['len'] bytes_ = self._file.read(length) # record file pointer if self._mpkt and self._mpfp: # print(self._fnum, 'ready') self._mpfp.put(self._file.tell()) self._mpkt.pool += 1 # make BytesIO from frame packet data frame['packet'] = bytes_ self._file = io.BytesIO(bytes_) # frame['packet'] = self._read_packet(header=0, payload=length, discard=True) return self._decode_next_layer(frame, length)
python
def read_frame(self): # _scur = self._file.tell() _temp = self._read_unpack(4, lilendian=True, quiet=True) if _temp is None: raise EOFError _tsss = _temp _tsus = self._read_unpack(4, lilendian=True) _ilen = self._read_unpack(4, lilendian=True) _olen = self._read_unpack(4, lilendian=True) if self._nsec: _epch = _tsss + _tsus / 1000000000 else: _epch = _tsss + _tsus / 1000000 _time = datetime.datetime.fromtimestamp(_epch) frame = dict( frame_info=dict( ts_sec=_tsss, ts_usec=_tsus, incl_len=_ilen, orig_len=_olen, ), time=_time, number=self._fnum, time_epoch=_epch, len=_ilen, cap_len=_olen, ) # load packet data length = frame['len'] bytes_ = self._file.read(length) # record file pointer if self._mpkt and self._mpfp: # print(self._fnum, 'ready') self._mpfp.put(self._file.tell()) self._mpkt.pool += 1 # make BytesIO from frame packet data frame['packet'] = bytes_ self._file = io.BytesIO(bytes_) # frame['packet'] = self._read_packet(header=0, payload=length, discard=True) return self._decode_next_layer(frame, length)
[ "def", "read_frame", "(", "self", ")", ":", "# _scur = self._file.tell()", "_temp", "=", "self", ".", "_read_unpack", "(", "4", ",", "lilendian", "=", "True", ",", "quiet", "=", "True", ")", "if", "_temp", "is", "None", ":", "raise", "EOFError", "_tsss", "=", "_temp", "_tsus", "=", "self", ".", "_read_unpack", "(", "4", ",", "lilendian", "=", "True", ")", "_ilen", "=", "self", ".", "_read_unpack", "(", "4", ",", "lilendian", "=", "True", ")", "_olen", "=", "self", ".", "_read_unpack", "(", "4", ",", "lilendian", "=", "True", ")", "if", "self", ".", "_nsec", ":", "_epch", "=", "_tsss", "+", "_tsus", "/", "1000000000", "else", ":", "_epch", "=", "_tsss", "+", "_tsus", "/", "1000000", "_time", "=", "datetime", ".", "datetime", ".", "fromtimestamp", "(", "_epch", ")", "frame", "=", "dict", "(", "frame_info", "=", "dict", "(", "ts_sec", "=", "_tsss", ",", "ts_usec", "=", "_tsus", ",", "incl_len", "=", "_ilen", ",", "orig_len", "=", "_olen", ",", ")", ",", "time", "=", "_time", ",", "number", "=", "self", ".", "_fnum", ",", "time_epoch", "=", "_epch", ",", "len", "=", "_ilen", ",", "cap_len", "=", "_olen", ",", ")", "# load packet data", "length", "=", "frame", "[", "'len'", "]", "bytes_", "=", "self", ".", "_file", ".", "read", "(", "length", ")", "# record file pointer", "if", "self", ".", "_mpkt", "and", "self", ".", "_mpfp", ":", "# print(self._fnum, 'ready')", "self", ".", "_mpfp", ".", "put", "(", "self", ".", "_file", ".", "tell", "(", ")", ")", "self", ".", "_mpkt", ".", "pool", "+=", "1", "# make BytesIO from frame packet data", "frame", "[", "'packet'", "]", "=", "bytes_", "self", ".", "_file", "=", "io", ".", "BytesIO", "(", "bytes_", ")", "# frame['packet'] = self._read_packet(header=0, payload=length, discard=True)", "return", "self", ".", "_decode_next_layer", "(", "frame", ",", "length", ")" ]
Read each block after global header. Structure of record/package header (C): typedef struct pcaprec_hdr_s { guint32 ts_sec; /* timestamp seconds */ guint32 ts_usec; /* timestamp microseconds */ guint32 incl_len; /* number of octets of packet saved in file */ guint32 orig_len; /* actual length of packet */ } pcaprec_hdr_t;
[ "Read", "each", "block", "after", "global", "header", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/protocols/pcap/frame.py#L88-L145
1,250
JarryShaw/PyPCAPKit
src/protocols/pcap/frame.py
Frame._decode_next_layer
def _decode_next_layer(self, dict_, length=None): """Decode next layer protocol. Positional arguments: dict_ -- dict, info buffer proto -- str, next layer protocol name length -- int, valid (not padding) length Returns: * dict -- current protocol with packet extracted """ seek_cur = self._file.tell() try: next_ = self._import_next_layer(self._prot, length) except Exception: dict_['error'] = traceback.format_exc(limit=1).strip().split(os.linesep)[-1] self._file.seek(seek_cur, os.SEEK_SET) next_ = beholder(self._import_next_layer)(self, self._prot, length, error=True) info, chain = next_.info, next_.protochain # make next layer protocol name layer = next_.alias.lower() # proto = next_.__class__.__name__ # write info and protocol chain into dict self._next = next_ self._protos = chain dict_[layer] = info dict_['protocols'] = self._protos.chain return dict_
python
def _decode_next_layer(self, dict_, length=None): seek_cur = self._file.tell() try: next_ = self._import_next_layer(self._prot, length) except Exception: dict_['error'] = traceback.format_exc(limit=1).strip().split(os.linesep)[-1] self._file.seek(seek_cur, os.SEEK_SET) next_ = beholder(self._import_next_layer)(self, self._prot, length, error=True) info, chain = next_.info, next_.protochain # make next layer protocol name layer = next_.alias.lower() # proto = next_.__class__.__name__ # write info and protocol chain into dict self._next = next_ self._protos = chain dict_[layer] = info dict_['protocols'] = self._protos.chain return dict_
[ "def", "_decode_next_layer", "(", "self", ",", "dict_", ",", "length", "=", "None", ")", ":", "seek_cur", "=", "self", ".", "_file", ".", "tell", "(", ")", "try", ":", "next_", "=", "self", ".", "_import_next_layer", "(", "self", ".", "_prot", ",", "length", ")", "except", "Exception", ":", "dict_", "[", "'error'", "]", "=", "traceback", ".", "format_exc", "(", "limit", "=", "1", ")", ".", "strip", "(", ")", ".", "split", "(", "os", ".", "linesep", ")", "[", "-", "1", "]", "self", ".", "_file", ".", "seek", "(", "seek_cur", ",", "os", ".", "SEEK_SET", ")", "next_", "=", "beholder", "(", "self", ".", "_import_next_layer", ")", "(", "self", ",", "self", ".", "_prot", ",", "length", ",", "error", "=", "True", ")", "info", ",", "chain", "=", "next_", ".", "info", ",", "next_", ".", "protochain", "# make next layer protocol name", "layer", "=", "next_", ".", "alias", ".", "lower", "(", ")", "# proto = next_.__class__.__name__", "# write info and protocol chain into dict", "self", ".", "_next", "=", "next_", "self", ".", "_protos", "=", "chain", "dict_", "[", "layer", "]", "=", "info", "dict_", "[", "'protocols'", "]", "=", "self", ".", "_protos", ".", "chain", "return", "dict_" ]
Decode next layer protocol. Positional arguments: dict_ -- dict, info buffer proto -- str, next layer protocol name length -- int, valid (not padding) length Returns: * dict -- current protocol with packet extracted
[ "Decode", "next", "layer", "protocol", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/protocols/pcap/frame.py#L229-L259
1,251
JarryShaw/PyPCAPKit
src/protocols/raw.py
Raw.read_raw
def read_raw(self, length, *, error=None): """Read raw packet data.""" if length is None: length = len(self) raw = dict( packet=self._read_fileng(length), error=error or None, ) return raw
python
def read_raw(self, length, *, error=None): if length is None: length = len(self) raw = dict( packet=self._read_fileng(length), error=error or None, ) return raw
[ "def", "read_raw", "(", "self", ",", "length", ",", "*", ",", "error", "=", "None", ")", ":", "if", "length", "is", "None", ":", "length", "=", "len", "(", "self", ")", "raw", "=", "dict", "(", "packet", "=", "self", ".", "_read_fileng", "(", "length", ")", ",", "error", "=", "error", "or", "None", ",", ")", "return", "raw" ]
Read raw packet data.
[ "Read", "raw", "packet", "data", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/protocols/raw.py#L73-L83
1,252
JarryShaw/PyPCAPKit
src/toolkit/dpkt.py
ipv6_hdr_len
def ipv6_hdr_len(ipv6): """Calculate length of headers before IPv6-Frag""" hdr_len = ipv6.__hdr_len__ for code in (0, 60, 43): ext_hdr = ipv6.extension_hdrs.get(code) if ext_hdr is not None: hdr_len += ext_hdr.length return hdr_len
python
def ipv6_hdr_len(ipv6): hdr_len = ipv6.__hdr_len__ for code in (0, 60, 43): ext_hdr = ipv6.extension_hdrs.get(code) if ext_hdr is not None: hdr_len += ext_hdr.length return hdr_len
[ "def", "ipv6_hdr_len", "(", "ipv6", ")", ":", "hdr_len", "=", "ipv6", ".", "__hdr_len__", "for", "code", "in", "(", "0", ",", "60", ",", "43", ")", ":", "ext_hdr", "=", "ipv6", ".", "extension_hdrs", ".", "get", "(", "code", ")", "if", "ext_hdr", "is", "not", "None", ":", "hdr_len", "+=", "ext_hdr", ".", "length", "return", "hdr_len" ]
Calculate length of headers before IPv6-Frag
[ "Calculate", "length", "of", "headers", "before", "IPv6", "-", "Frag" ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/toolkit/dpkt.py#L20-L27
1,253
JarryShaw/PyPCAPKit
src/toolkit/dpkt.py
packet2chain
def packet2chain(packet): """Fetch DPKT packet protocol chain.""" chain = [type(packet).__name__] payload = packet.data while not isinstance(payload, bytes): chain.append(type(payload).__name__) payload = payload.data return ':'.join(chain)
python
def packet2chain(packet): chain = [type(packet).__name__] payload = packet.data while not isinstance(payload, bytes): chain.append(type(payload).__name__) payload = payload.data return ':'.join(chain)
[ "def", "packet2chain", "(", "packet", ")", ":", "chain", "=", "[", "type", "(", "packet", ")", ".", "__name__", "]", "payload", "=", "packet", ".", "data", "while", "not", "isinstance", "(", "payload", ",", "bytes", ")", ":", "chain", ".", "append", "(", "type", "(", "payload", ")", ".", "__name__", ")", "payload", "=", "payload", ".", "data", "return", "':'", ".", "join", "(", "chain", ")" ]
Fetch DPKT packet protocol chain.
[ "Fetch", "DPKT", "packet", "protocol", "chain", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/toolkit/dpkt.py#L30-L37
1,254
JarryShaw/PyPCAPKit
src/toolkit/dpkt.py
packet2dict
def packet2dict(packet, timestamp, *, data_link): """Convert DPKT packet into dict.""" def wrapper(packet): dict_ = dict() for field in packet.__hdr_fields__: dict_[field] = getattr(packet, field, None) payload = packet.data if not isinstance(payload, bytes): dict_[type(payload).__name__] = wrapper(payload) return dict_ return { 'timestamp': timestamp, 'packet': packet.pack(), data_link.name: wrapper(packet), }
python
def packet2dict(packet, timestamp, *, data_link): def wrapper(packet): dict_ = dict() for field in packet.__hdr_fields__: dict_[field] = getattr(packet, field, None) payload = packet.data if not isinstance(payload, bytes): dict_[type(payload).__name__] = wrapper(payload) return dict_ return { 'timestamp': timestamp, 'packet': packet.pack(), data_link.name: wrapper(packet), }
[ "def", "packet2dict", "(", "packet", ",", "timestamp", ",", "*", ",", "data_link", ")", ":", "def", "wrapper", "(", "packet", ")", ":", "dict_", "=", "dict", "(", ")", "for", "field", "in", "packet", ".", "__hdr_fields__", ":", "dict_", "[", "field", "]", "=", "getattr", "(", "packet", ",", "field", ",", "None", ")", "payload", "=", "packet", ".", "data", "if", "not", "isinstance", "(", "payload", ",", "bytes", ")", ":", "dict_", "[", "type", "(", "payload", ")", ".", "__name__", "]", "=", "wrapper", "(", "payload", ")", "return", "dict_", "return", "{", "'timestamp'", ":", "timestamp", ",", "'packet'", ":", "packet", ".", "pack", "(", ")", ",", "data_link", ".", "name", ":", "wrapper", "(", "packet", ")", ",", "}" ]
Convert DPKT packet into dict.
[ "Convert", "DPKT", "packet", "into", "dict", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/toolkit/dpkt.py#L40-L54
1,255
JarryShaw/PyPCAPKit
src/protocols/application/httpv2.py
HTTPv2._read_http_none
def _read_http_none(self, size, kind, flag): """Read HTTP packet with unsigned type.""" if any((int(bit, base=2) for bit in flag)): raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True) data = dict( flags=None, payload=self._read_fileng(size - 9) or None, ) return data
python
def _read_http_none(self, size, kind, flag): if any((int(bit, base=2) for bit in flag)): raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True) data = dict( flags=None, payload=self._read_fileng(size - 9) or None, ) return data
[ "def", "_read_http_none", "(", "self", ",", "size", ",", "kind", ",", "flag", ")", ":", "if", "any", "(", "(", "int", "(", "bit", ",", "base", "=", "2", ")", "for", "bit", "in", "flag", ")", ")", ":", "raise", "ProtocolError", "(", "f'HTTP/2: [Type {kind}] invalid format'", ",", "quiet", "=", "True", ")", "data", "=", "dict", "(", "flags", "=", "None", ",", "payload", "=", "self", ".", "_read_fileng", "(", "size", "-", "9", ")", "or", "None", ",", ")", "return", "data" ]
Read HTTP packet with unsigned type.
[ "Read", "HTTP", "packet", "with", "unsigned", "type", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/protocols/application/httpv2.py#L172-L182
1,256
JarryShaw/PyPCAPKit
src/foundation/extraction.py
Extractor.run
def run(self): """Start extraction.""" flag = True if self._exeng == 'dpkt': flag, engine = self.import_test('dpkt', name='DPKT') if flag: return self._run_dpkt(engine) elif self._exeng == 'scapy': flag, engine = self.import_test('scapy.all', name='Scapy') if flag: return self._run_scapy(engine) elif self._exeng == 'pyshark': flag, engine = self.import_test('pyshark', name='PyShark') if flag: return self._run_pyshark(engine) elif self._exeng == 'pipeline': flag, engine = self.import_test('multiprocessing', name='Pipeline Multiprocessing') self._flag_m = flag = bool(flag and (self._flag_a and CPU_CNT > 1)) if self._flag_m: return self._run_pipeline(engine) warnings.warn(f'extraction engine Pipeline Multiprocessing is not available; ' 'using default engine instead', EngineWarning, stacklevel=stacklevel()) elif self._exeng == 'server': flag, engine = self.import_test('multiprocessing', name='Server Multiprocessing') self._flag_m = flag = bool(flag and (self._flag_a and CPU_CNT > 2)) if self._flag_m: return self._run_server(engine) warnings.warn(f'extraction engine Server Multiprocessing is not available; ' 'using default engine instead', EngineWarning, stacklevel=stacklevel()) elif self._exeng not in ('default', 'pcapkit'): flag = False warnings.warn(f'unsupported extraction engine: {self._exeng}; ' 'using default engine instead', EngineWarning, stacklevel=stacklevel()) # using default/pcapkit engine self._exeng = self._exeng if flag else 'default' self.record_header() # read PCAP global header self.record_frames()
python
def run(self): flag = True if self._exeng == 'dpkt': flag, engine = self.import_test('dpkt', name='DPKT') if flag: return self._run_dpkt(engine) elif self._exeng == 'scapy': flag, engine = self.import_test('scapy.all', name='Scapy') if flag: return self._run_scapy(engine) elif self._exeng == 'pyshark': flag, engine = self.import_test('pyshark', name='PyShark') if flag: return self._run_pyshark(engine) elif self._exeng == 'pipeline': flag, engine = self.import_test('multiprocessing', name='Pipeline Multiprocessing') self._flag_m = flag = bool(flag and (self._flag_a and CPU_CNT > 1)) if self._flag_m: return self._run_pipeline(engine) warnings.warn(f'extraction engine Pipeline Multiprocessing is not available; ' 'using default engine instead', EngineWarning, stacklevel=stacklevel()) elif self._exeng == 'server': flag, engine = self.import_test('multiprocessing', name='Server Multiprocessing') self._flag_m = flag = bool(flag and (self._flag_a and CPU_CNT > 2)) if self._flag_m: return self._run_server(engine) warnings.warn(f'extraction engine Server Multiprocessing is not available; ' 'using default engine instead', EngineWarning, stacklevel=stacklevel()) elif self._exeng not in ('default', 'pcapkit'): flag = False warnings.warn(f'unsupported extraction engine: {self._exeng}; ' 'using default engine instead', EngineWarning, stacklevel=stacklevel()) # using default/pcapkit engine self._exeng = self._exeng if flag else 'default' self.record_header() # read PCAP global header self.record_frames()
[ "def", "run", "(", "self", ")", ":", "flag", "=", "True", "if", "self", ".", "_exeng", "==", "'dpkt'", ":", "flag", ",", "engine", "=", "self", ".", "import_test", "(", "'dpkt'", ",", "name", "=", "'DPKT'", ")", "if", "flag", ":", "return", "self", ".", "_run_dpkt", "(", "engine", ")", "elif", "self", ".", "_exeng", "==", "'scapy'", ":", "flag", ",", "engine", "=", "self", ".", "import_test", "(", "'scapy.all'", ",", "name", "=", "'Scapy'", ")", "if", "flag", ":", "return", "self", ".", "_run_scapy", "(", "engine", ")", "elif", "self", ".", "_exeng", "==", "'pyshark'", ":", "flag", ",", "engine", "=", "self", ".", "import_test", "(", "'pyshark'", ",", "name", "=", "'PyShark'", ")", "if", "flag", ":", "return", "self", ".", "_run_pyshark", "(", "engine", ")", "elif", "self", ".", "_exeng", "==", "'pipeline'", ":", "flag", ",", "engine", "=", "self", ".", "import_test", "(", "'multiprocessing'", ",", "name", "=", "'Pipeline Multiprocessing'", ")", "self", ".", "_flag_m", "=", "flag", "=", "bool", "(", "flag", "and", "(", "self", ".", "_flag_a", "and", "CPU_CNT", ">", "1", ")", ")", "if", "self", ".", "_flag_m", ":", "return", "self", ".", "_run_pipeline", "(", "engine", ")", "warnings", ".", "warn", "(", "f'extraction engine Pipeline Multiprocessing is not available; '", "'using default engine instead'", ",", "EngineWarning", ",", "stacklevel", "=", "stacklevel", "(", ")", ")", "elif", "self", ".", "_exeng", "==", "'server'", ":", "flag", ",", "engine", "=", "self", ".", "import_test", "(", "'multiprocessing'", ",", "name", "=", "'Server Multiprocessing'", ")", "self", ".", "_flag_m", "=", "flag", "=", "bool", "(", "flag", "and", "(", "self", ".", "_flag_a", "and", "CPU_CNT", ">", "2", ")", ")", "if", "self", ".", "_flag_m", ":", "return", "self", ".", "_run_server", "(", "engine", ")", "warnings", ".", "warn", "(", "f'extraction engine Server Multiprocessing is not available; '", "'using default engine instead'", ",", "EngineWarning", ",", "stacklevel", "=", "stacklevel", "(", ")", ")", "elif", "self", ".", "_exeng", "not", "in", "(", "'default'", ",", "'pcapkit'", ")", ":", "flag", "=", "False", "warnings", ".", "warn", "(", "f'unsupported extraction engine: {self._exeng}; '", "'using default engine instead'", ",", "EngineWarning", ",", "stacklevel", "=", "stacklevel", "(", ")", ")", "# using default/pcapkit engine", "self", ".", "_exeng", "=", "self", ".", "_exeng", "if", "flag", "else", "'default'", "self", ".", "record_header", "(", ")", "# read PCAP global header", "self", ".", "record_frames", "(", ")" ]
Start extraction.
[ "Start", "extraction", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/foundation/extraction.py#L224-L261
1,257
JarryShaw/PyPCAPKit
src/foundation/extraction.py
Extractor.record_header
def record_header(self): """Read global header. - Extract global header. - Make Info object out of header properties. - Append Info. - Write plist file. """ self._gbhdr = Header(self._ifile) self._vinfo = self._gbhdr.version self._dlink = self._gbhdr.protocol self._nnsec = self._gbhdr.nanosecond if self._trace is not NotImplemented: self._trace._endian = self._gbhdr.byteorder self._trace._nnsecd = self._gbhdr.nanosecond if not self._flag_q: if self._flag_f: ofile = self._ofile(f'{self._ofnm}/Global Header.{self._fext}') ofile(self._gbhdr.info, name='Global Header') self._type = ofile.kind else: self._ofile(self._gbhdr.info, name='Global Header') self._type = self._ofile.kind
python
def record_header(self): self._gbhdr = Header(self._ifile) self._vinfo = self._gbhdr.version self._dlink = self._gbhdr.protocol self._nnsec = self._gbhdr.nanosecond if self._trace is not NotImplemented: self._trace._endian = self._gbhdr.byteorder self._trace._nnsecd = self._gbhdr.nanosecond if not self._flag_q: if self._flag_f: ofile = self._ofile(f'{self._ofnm}/Global Header.{self._fext}') ofile(self._gbhdr.info, name='Global Header') self._type = ofile.kind else: self._ofile(self._gbhdr.info, name='Global Header') self._type = self._ofile.kind
[ "def", "record_header", "(", "self", ")", ":", "self", ".", "_gbhdr", "=", "Header", "(", "self", ".", "_ifile", ")", "self", ".", "_vinfo", "=", "self", ".", "_gbhdr", ".", "version", "self", ".", "_dlink", "=", "self", ".", "_gbhdr", ".", "protocol", "self", ".", "_nnsec", "=", "self", ".", "_gbhdr", ".", "nanosecond", "if", "self", ".", "_trace", "is", "not", "NotImplemented", ":", "self", ".", "_trace", ".", "_endian", "=", "self", ".", "_gbhdr", ".", "byteorder", "self", ".", "_trace", ".", "_nnsecd", "=", "self", ".", "_gbhdr", ".", "nanosecond", "if", "not", "self", ".", "_flag_q", ":", "if", "self", ".", "_flag_f", ":", "ofile", "=", "self", ".", "_ofile", "(", "f'{self._ofnm}/Global Header.{self._fext}'", ")", "ofile", "(", "self", ".", "_gbhdr", ".", "info", ",", "name", "=", "'Global Header'", ")", "self", ".", "_type", "=", "ofile", ".", "kind", "else", ":", "self", ".", "_ofile", "(", "self", ".", "_gbhdr", ".", "info", ",", "name", "=", "'Global Header'", ")", "self", ".", "_type", "=", "self", ".", "_ofile", ".", "kind" ]
Read global header. - Extract global header. - Make Info object out of header properties. - Append Info. - Write plist file.
[ "Read", "global", "header", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/foundation/extraction.py#L345-L370
1,258
JarryShaw/PyPCAPKit
src/foundation/extraction.py
Extractor._cleanup
def _cleanup(self): """Cleanup after extraction & analysis.""" self._expkg = None self._extmp = None self._flag_e = True self._ifile.close()
python
def _cleanup(self): self._expkg = None self._extmp = None self._flag_e = True self._ifile.close()
[ "def", "_cleanup", "(", "self", ")", ":", "self", ".", "_expkg", "=", "None", "self", ".", "_extmp", "=", "None", "self", ".", "_flag_e", "=", "True", "self", ".", "_ifile", ".", "close", "(", ")" ]
Cleanup after extraction & analysis.
[ "Cleanup", "after", "extraction", "&", "analysis", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/foundation/extraction.py#L566-L571
1,259
JarryShaw/PyPCAPKit
src/foundation/extraction.py
Extractor._aftermathmp
def _aftermathmp(self): """Aftermath for multiprocessing.""" if not self._flag_e and self._flag_m: # join processes [proc.join() for proc in self._mpprc] if self._exeng == 'server': self._mpsvc.join() # restore attributes if self._exeng == 'server': self._frame = list(self._mpfrm) self._reasm = list(self._mprsm) self._trace = copy.deepcopy(self._mpkit.trace) if self._exeng == 'pipeline': self._frame = [self._mpkit.frames[x] for x in sorted(self._mpkit.frames)] self._reasm = copy.deepcopy(self._mpkit.reassembly) self._trace = copy.deepcopy(self._mpkit.trace) # shutdown & cleanup self._mpmng.shutdown() [delattr(self, attr) for attr in filter(lambda s: s.startswith('_mp'), dir(self))] self._frnum -= 2
python
def _aftermathmp(self): if not self._flag_e and self._flag_m: # join processes [proc.join() for proc in self._mpprc] if self._exeng == 'server': self._mpsvc.join() # restore attributes if self._exeng == 'server': self._frame = list(self._mpfrm) self._reasm = list(self._mprsm) self._trace = copy.deepcopy(self._mpkit.trace) if self._exeng == 'pipeline': self._frame = [self._mpkit.frames[x] for x in sorted(self._mpkit.frames)] self._reasm = copy.deepcopy(self._mpkit.reassembly) self._trace = copy.deepcopy(self._mpkit.trace) # shutdown & cleanup self._mpmng.shutdown() [delattr(self, attr) for attr in filter(lambda s: s.startswith('_mp'), dir(self))] self._frnum -= 2
[ "def", "_aftermathmp", "(", "self", ")", ":", "if", "not", "self", ".", "_flag_e", "and", "self", ".", "_flag_m", ":", "# join processes", "[", "proc", ".", "join", "(", ")", "for", "proc", "in", "self", ".", "_mpprc", "]", "if", "self", ".", "_exeng", "==", "'server'", ":", "self", ".", "_mpsvc", ".", "join", "(", ")", "# restore attributes", "if", "self", ".", "_exeng", "==", "'server'", ":", "self", ".", "_frame", "=", "list", "(", "self", ".", "_mpfrm", ")", "self", ".", "_reasm", "=", "list", "(", "self", ".", "_mprsm", ")", "self", ".", "_trace", "=", "copy", ".", "deepcopy", "(", "self", ".", "_mpkit", ".", "trace", ")", "if", "self", ".", "_exeng", "==", "'pipeline'", ":", "self", ".", "_frame", "=", "[", "self", ".", "_mpkit", ".", "frames", "[", "x", "]", "for", "x", "in", "sorted", "(", "self", ".", "_mpkit", ".", "frames", ")", "]", "self", ".", "_reasm", "=", "copy", ".", "deepcopy", "(", "self", ".", "_mpkit", ".", "reassembly", ")", "self", ".", "_trace", "=", "copy", ".", "deepcopy", "(", "self", ".", "_mpkit", ".", "trace", ")", "# shutdown & cleanup", "self", ".", "_mpmng", ".", "shutdown", "(", ")", "[", "delattr", "(", "self", ",", "attr", ")", "for", "attr", "in", "filter", "(", "lambda", "s", ":", "s", ".", "startswith", "(", "'_mp'", ")", ",", "dir", "(", "self", ")", ")", "]", "self", ".", "_frnum", "-=", "2" ]
Aftermath for multiprocessing.
[ "Aftermath", "for", "multiprocessing", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/foundation/extraction.py#L573-L594
1,260
JarryShaw/PyPCAPKit
src/foundation/extraction.py
Extractor._update_eof
def _update_eof(self): """Update EOF flag.""" self._aftermathmp() self._ifile.close() self._flag_e = True
python
def _update_eof(self): self._aftermathmp() self._ifile.close() self._flag_e = True
[ "def", "_update_eof", "(", "self", ")", ":", "self", ".", "_aftermathmp", "(", ")", "self", ".", "_ifile", ".", "close", "(", ")", "self", ".", "_flag_e", "=", "True" ]
Update EOF flag.
[ "Update", "EOF", "flag", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/foundation/extraction.py#L597-L601
1,261
JarryShaw/PyPCAPKit
src/foundation/extraction.py
Extractor._read_frame
def _read_frame(self): """Headquarters for frame reader.""" if self._exeng == 'scapy': return self._scapy_read_frame() elif self._exeng == 'dpkt': return self._dpkt_read_frame() elif self._exeng == 'pyshark': return self._pyshark_read_frame() else: return self._default_read_frame()
python
def _read_frame(self): if self._exeng == 'scapy': return self._scapy_read_frame() elif self._exeng == 'dpkt': return self._dpkt_read_frame() elif self._exeng == 'pyshark': return self._pyshark_read_frame() else: return self._default_read_frame()
[ "def", "_read_frame", "(", "self", ")", ":", "if", "self", ".", "_exeng", "==", "'scapy'", ":", "return", "self", ".", "_scapy_read_frame", "(", ")", "elif", "self", ".", "_exeng", "==", "'dpkt'", ":", "return", "self", ".", "_dpkt_read_frame", "(", ")", "elif", "self", ".", "_exeng", "==", "'pyshark'", ":", "return", "self", ".", "_pyshark_read_frame", "(", ")", "else", ":", "return", "self", ".", "_default_read_frame", "(", ")" ]
Headquarters for frame reader.
[ "Headquarters", "for", "frame", "reader", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/foundation/extraction.py#L603-L612
1,262
JarryShaw/PyPCAPKit
src/foundation/extraction.py
Extractor._default_read_frame
def _default_read_frame(self, *, frame=None, mpkit=None): """Read frames with default engine. - Extract frames and each layer of packets. - Make Info object out of frame properties. - Append Info. - Write plist & append Info. """ from pcapkit.toolkit.default import (ipv4_reassembly, ipv6_reassembly, tcp_reassembly, tcp_traceflow) # read frame header if not self._flag_m: frame = Frame(self._ifile, num=self._frnum+1, proto=self._dlink, layer=self._exlyr, protocol=self._exptl, nanosecond=self._nnsec) self._frnum += 1 # verbose output if self._flag_v: print(f' - Frame {self._frnum:>3d}: {frame.protochain}') # write plist frnum = f'Frame {self._frnum}' if not self._flag_q: if self._flag_f: ofile = self._ofile(f'{self._ofnm}/{frnum}.{self._fext}') ofile(frame.info, name=frnum) else: self._ofile(frame.info, name=frnum) # record fragments if self._ipv4: flag, data = ipv4_reassembly(frame) if flag: self._reasm[0](data) # pylint: disable=E1102 if self._ipv6: flag, data = ipv6_reassembly(frame) if flag: self._reasm[1](data) # pylint: disable=E1102 if self._tcp: flag, data = tcp_reassembly(frame) if flag: self._reasm[2](data) # pylint: disable=E1102 # trace flows if self._flag_t: flag, data = tcp_traceflow(frame, data_link=self._dlink) if flag: self._trace(data) # record frames if self._exeng == 'pipeline': if self._flag_d: # frame._file = NotImplemented mpkit.frames[self._frnum] = frame # print(self._frnum, 'stored') mpkit.current += 1 elif self._exeng == 'server': # record frames if self._flag_d: # frame._file = NotImplemented self._frame.append(frame) # print(self._frnum, 'stored') self._frnum += 1 else: if self._flag_d: self._frame.append(frame) self._proto = frame.protochain.chain # return frame record return frame
python
def _default_read_frame(self, *, frame=None, mpkit=None): from pcapkit.toolkit.default import (ipv4_reassembly, ipv6_reassembly, tcp_reassembly, tcp_traceflow) # read frame header if not self._flag_m: frame = Frame(self._ifile, num=self._frnum+1, proto=self._dlink, layer=self._exlyr, protocol=self._exptl, nanosecond=self._nnsec) self._frnum += 1 # verbose output if self._flag_v: print(f' - Frame {self._frnum:>3d}: {frame.protochain}') # write plist frnum = f'Frame {self._frnum}' if not self._flag_q: if self._flag_f: ofile = self._ofile(f'{self._ofnm}/{frnum}.{self._fext}') ofile(frame.info, name=frnum) else: self._ofile(frame.info, name=frnum) # record fragments if self._ipv4: flag, data = ipv4_reassembly(frame) if flag: self._reasm[0](data) # pylint: disable=E1102 if self._ipv6: flag, data = ipv6_reassembly(frame) if flag: self._reasm[1](data) # pylint: disable=E1102 if self._tcp: flag, data = tcp_reassembly(frame) if flag: self._reasm[2](data) # pylint: disable=E1102 # trace flows if self._flag_t: flag, data = tcp_traceflow(frame, data_link=self._dlink) if flag: self._trace(data) # record frames if self._exeng == 'pipeline': if self._flag_d: # frame._file = NotImplemented mpkit.frames[self._frnum] = frame # print(self._frnum, 'stored') mpkit.current += 1 elif self._exeng == 'server': # record frames if self._flag_d: # frame._file = NotImplemented self._frame.append(frame) # print(self._frnum, 'stored') self._frnum += 1 else: if self._flag_d: self._frame.append(frame) self._proto = frame.protochain.chain # return frame record return frame
[ "def", "_default_read_frame", "(", "self", ",", "*", ",", "frame", "=", "None", ",", "mpkit", "=", "None", ")", ":", "from", "pcapkit", ".", "toolkit", ".", "default", "import", "(", "ipv4_reassembly", ",", "ipv6_reassembly", ",", "tcp_reassembly", ",", "tcp_traceflow", ")", "# read frame header", "if", "not", "self", ".", "_flag_m", ":", "frame", "=", "Frame", "(", "self", ".", "_ifile", ",", "num", "=", "self", ".", "_frnum", "+", "1", ",", "proto", "=", "self", ".", "_dlink", ",", "layer", "=", "self", ".", "_exlyr", ",", "protocol", "=", "self", ".", "_exptl", ",", "nanosecond", "=", "self", ".", "_nnsec", ")", "self", ".", "_frnum", "+=", "1", "# verbose output", "if", "self", ".", "_flag_v", ":", "print", "(", "f' - Frame {self._frnum:>3d}: {frame.protochain}'", ")", "# write plist", "frnum", "=", "f'Frame {self._frnum}'", "if", "not", "self", ".", "_flag_q", ":", "if", "self", ".", "_flag_f", ":", "ofile", "=", "self", ".", "_ofile", "(", "f'{self._ofnm}/{frnum}.{self._fext}'", ")", "ofile", "(", "frame", ".", "info", ",", "name", "=", "frnum", ")", "else", ":", "self", ".", "_ofile", "(", "frame", ".", "info", ",", "name", "=", "frnum", ")", "# record fragments", "if", "self", ".", "_ipv4", ":", "flag", ",", "data", "=", "ipv4_reassembly", "(", "frame", ")", "if", "flag", ":", "self", ".", "_reasm", "[", "0", "]", "(", "data", ")", "# pylint: disable=E1102", "if", "self", ".", "_ipv6", ":", "flag", ",", "data", "=", "ipv6_reassembly", "(", "frame", ")", "if", "flag", ":", "self", ".", "_reasm", "[", "1", "]", "(", "data", ")", "# pylint: disable=E1102", "if", "self", ".", "_tcp", ":", "flag", ",", "data", "=", "tcp_reassembly", "(", "frame", ")", "if", "flag", ":", "self", ".", "_reasm", "[", "2", "]", "(", "data", ")", "# pylint: disable=E1102", "# trace flows", "if", "self", ".", "_flag_t", ":", "flag", ",", "data", "=", "tcp_traceflow", "(", "frame", ",", "data_link", "=", "self", ".", "_dlink", ")", "if", "flag", ":", "self", ".", "_trace", "(", "data", ")", "# record frames", "if", "self", ".", "_exeng", "==", "'pipeline'", ":", "if", "self", ".", "_flag_d", ":", "# frame._file = NotImplemented", "mpkit", ".", "frames", "[", "self", ".", "_frnum", "]", "=", "frame", "# print(self._frnum, 'stored')", "mpkit", ".", "current", "+=", "1", "elif", "self", ".", "_exeng", "==", "'server'", ":", "# record frames", "if", "self", ".", "_flag_d", ":", "# frame._file = NotImplemented", "self", ".", "_frame", ".", "append", "(", "frame", ")", "# print(self._frnum, 'stored')", "self", ".", "_frnum", "+=", "1", "else", ":", "if", "self", ".", "_flag_d", ":", "self", ".", "_frame", ".", "append", "(", "frame", ")", "self", ".", "_proto", "=", "frame", ".", "protochain", ".", "chain", "# return frame record", "return", "frame" ]
Read frames with default engine. - Extract frames and each layer of packets. - Make Info object out of frame properties. - Append Info. - Write plist & append Info.
[ "Read", "frames", "with", "default", "engine", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/foundation/extraction.py#L614-L685
1,263
JarryShaw/PyPCAPKit
src/foundation/extraction.py
Extractor._run_scapy
def _run_scapy(self, scapy_all): """Call scapy.all.sniff to extract PCAP files.""" # if not self._flag_a: # self._flag_a = True # warnings.warn(f"'Extractor(engine=scapy)' object is not iterable; " # "so 'auto=False' will be ignored", AttributeWarning, stacklevel=stacklevel()) if self._exlyr != 'None' or self._exptl != 'null': warnings.warn("'Extractor(engine=scapy)' does not support protocol and layer threshold; " f"'layer={self._exlyr}' and 'protocol={self._exptl}' ignored", AttributeWarning, stacklevel=stacklevel()) # extract & analyse file self._expkg = scapy_all self._extmp = iter(scapy_all.sniff(offline=self._ifnm)) # start iteration self.record_frames()
python
def _run_scapy(self, scapy_all): # if not self._flag_a: # self._flag_a = True # warnings.warn(f"'Extractor(engine=scapy)' object is not iterable; " # "so 'auto=False' will be ignored", AttributeWarning, stacklevel=stacklevel()) if self._exlyr != 'None' or self._exptl != 'null': warnings.warn("'Extractor(engine=scapy)' does not support protocol and layer threshold; " f"'layer={self._exlyr}' and 'protocol={self._exptl}' ignored", AttributeWarning, stacklevel=stacklevel()) # extract & analyse file self._expkg = scapy_all self._extmp = iter(scapy_all.sniff(offline=self._ifnm)) # start iteration self.record_frames()
[ "def", "_run_scapy", "(", "self", ",", "scapy_all", ")", ":", "# if not self._flag_a:", "# self._flag_a = True", "# warnings.warn(f\"'Extractor(engine=scapy)' object is not iterable; \"", "# \"so 'auto=False' will be ignored\", AttributeWarning, stacklevel=stacklevel())", "if", "self", ".", "_exlyr", "!=", "'None'", "or", "self", ".", "_exptl", "!=", "'null'", ":", "warnings", ".", "warn", "(", "\"'Extractor(engine=scapy)' does not support protocol and layer threshold; \"", "f\"'layer={self._exlyr}' and 'protocol={self._exptl}' ignored\"", ",", "AttributeWarning", ",", "stacklevel", "=", "stacklevel", "(", ")", ")", "# extract & analyse file", "self", ".", "_expkg", "=", "scapy_all", "self", ".", "_extmp", "=", "iter", "(", "scapy_all", ".", "sniff", "(", "offline", "=", "self", ".", "_ifnm", ")", ")", "# start iteration", "self", ".", "record_frames", "(", ")" ]
Call scapy.all.sniff to extract PCAP files.
[ "Call", "scapy", ".", "all", ".", "sniff", "to", "extract", "PCAP", "files", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/foundation/extraction.py#L687-L704
1,264
JarryShaw/PyPCAPKit
src/foundation/extraction.py
Extractor._scapy_read_frame
def _scapy_read_frame(self): """Read frames with Scapy.""" from pcapkit.toolkit.scapy import (ipv4_reassembly, ipv6_reassembly, packet2chain, packet2dict, tcp_reassembly, tcp_traceflow) # fetch Scapy packet packet = next(self._extmp) # verbose output self._frnum += 1 self._proto = packet2chain(packet) if self._flag_v: print(f' - Frame {self._frnum:>3d}: {self._proto}') # write plist frnum = f'Frame {self._frnum}' if not self._flag_q: info = packet2dict(packet) if self._flag_f: ofile = self._ofile(f'{self._ofnm}/{frnum}.{self._fext}') ofile(info, name=frnum) else: self._ofile(info, name=frnum) # record frames if self._flag_d: # setattr(packet, 'packet2dict', packet2dict) # setattr(packet, 'packet2chain', packet2chain) self._frame.append(packet) # record fragments if self._ipv4: flag, data = ipv4_reassembly(packet, count=self._frnum) if flag: self._reasm[0](data) # pylint: disable=E1102 if self._ipv6: flag, data = ipv6_reassembly(packet, count=self._frnum) if flag: self._reasm[1](data) # pylint: disable=E1102 if self._tcp: flag, data = tcp_reassembly(packet, count=self._frnum) if flag: self._reasm[2](data) # pylint: disable=E1102 # trace flows if self._flag_t: flag, data = tcp_traceflow(packet, count=self._frnum) if flag: self._trace(data) return packet
python
def _scapy_read_frame(self): from pcapkit.toolkit.scapy import (ipv4_reassembly, ipv6_reassembly, packet2chain, packet2dict, tcp_reassembly, tcp_traceflow) # fetch Scapy packet packet = next(self._extmp) # verbose output self._frnum += 1 self._proto = packet2chain(packet) if self._flag_v: print(f' - Frame {self._frnum:>3d}: {self._proto}') # write plist frnum = f'Frame {self._frnum}' if not self._flag_q: info = packet2dict(packet) if self._flag_f: ofile = self._ofile(f'{self._ofnm}/{frnum}.{self._fext}') ofile(info, name=frnum) else: self._ofile(info, name=frnum) # record frames if self._flag_d: # setattr(packet, 'packet2dict', packet2dict) # setattr(packet, 'packet2chain', packet2chain) self._frame.append(packet) # record fragments if self._ipv4: flag, data = ipv4_reassembly(packet, count=self._frnum) if flag: self._reasm[0](data) # pylint: disable=E1102 if self._ipv6: flag, data = ipv6_reassembly(packet, count=self._frnum) if flag: self._reasm[1](data) # pylint: disable=E1102 if self._tcp: flag, data = tcp_reassembly(packet, count=self._frnum) if flag: self._reasm[2](data) # pylint: disable=E1102 # trace flows if self._flag_t: flag, data = tcp_traceflow(packet, count=self._frnum) if flag: self._trace(data) return packet
[ "def", "_scapy_read_frame", "(", "self", ")", ":", "from", "pcapkit", ".", "toolkit", ".", "scapy", "import", "(", "ipv4_reassembly", ",", "ipv6_reassembly", ",", "packet2chain", ",", "packet2dict", ",", "tcp_reassembly", ",", "tcp_traceflow", ")", "# fetch Scapy packet", "packet", "=", "next", "(", "self", ".", "_extmp", ")", "# verbose output", "self", ".", "_frnum", "+=", "1", "self", ".", "_proto", "=", "packet2chain", "(", "packet", ")", "if", "self", ".", "_flag_v", ":", "print", "(", "f' - Frame {self._frnum:>3d}: {self._proto}'", ")", "# write plist", "frnum", "=", "f'Frame {self._frnum}'", "if", "not", "self", ".", "_flag_q", ":", "info", "=", "packet2dict", "(", "packet", ")", "if", "self", ".", "_flag_f", ":", "ofile", "=", "self", ".", "_ofile", "(", "f'{self._ofnm}/{frnum}.{self._fext}'", ")", "ofile", "(", "info", ",", "name", "=", "frnum", ")", "else", ":", "self", ".", "_ofile", "(", "info", ",", "name", "=", "frnum", ")", "# record frames", "if", "self", ".", "_flag_d", ":", "# setattr(packet, 'packet2dict', packet2dict)", "# setattr(packet, 'packet2chain', packet2chain)", "self", ".", "_frame", ".", "append", "(", "packet", ")", "# record fragments", "if", "self", ".", "_ipv4", ":", "flag", ",", "data", "=", "ipv4_reassembly", "(", "packet", ",", "count", "=", "self", ".", "_frnum", ")", "if", "flag", ":", "self", ".", "_reasm", "[", "0", "]", "(", "data", ")", "# pylint: disable=E1102", "if", "self", ".", "_ipv6", ":", "flag", ",", "data", "=", "ipv6_reassembly", "(", "packet", ",", "count", "=", "self", ".", "_frnum", ")", "if", "flag", ":", "self", ".", "_reasm", "[", "1", "]", "(", "data", ")", "# pylint: disable=E1102", "if", "self", ".", "_tcp", ":", "flag", ",", "data", "=", "tcp_reassembly", "(", "packet", ",", "count", "=", "self", ".", "_frnum", ")", "if", "flag", ":", "self", ".", "_reasm", "[", "2", "]", "(", "data", ")", "# pylint: disable=E1102", "# trace flows", "if", "self", ".", "_flag_t", ":", "flag", ",", "data", "=", "tcp_traceflow", "(", "packet", ",", "count", "=", "self", ".", "_frnum", ")", "if", "flag", ":", "self", ".", "_trace", "(", "data", ")", "return", "packet" ]
Read frames with Scapy.
[ "Read", "frames", "with", "Scapy", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/foundation/extraction.py#L706-L757
1,265
JarryShaw/PyPCAPKit
src/foundation/extraction.py
Extractor._run_dpkt
def _run_dpkt(self, dpkt): """Call dpkt.pcap.Reader to extract PCAP files.""" # if not self._flag_a: # self._flag_a = True # warnings.warn(f"'Extractor(engine=dpkt)' object is not iterable; " # "so 'auto=False' will be ignored", AttributeWarning, stacklevel=stacklevel()) if self._exlyr != 'None' or self._exptl != 'null': warnings.warn("'Extractor(engine=dpkt)' does not support protocol and layer threshold; " f"'layer={self._exlyr}' and 'protocol={self._exptl}' ignored", AttributeWarning, stacklevel=stacklevel()) # extract global header self.record_header() self._ifile.seek(0, os.SEEK_SET) # extract & analyse file self._expkg = dpkt self._extmp = iter(dpkt.pcap.Reader(self._ifile)) # start iteration self.record_frames()
python
def _run_dpkt(self, dpkt): # if not self._flag_a: # self._flag_a = True # warnings.warn(f"'Extractor(engine=dpkt)' object is not iterable; " # "so 'auto=False' will be ignored", AttributeWarning, stacklevel=stacklevel()) if self._exlyr != 'None' or self._exptl != 'null': warnings.warn("'Extractor(engine=dpkt)' does not support protocol and layer threshold; " f"'layer={self._exlyr}' and 'protocol={self._exptl}' ignored", AttributeWarning, stacklevel=stacklevel()) # extract global header self.record_header() self._ifile.seek(0, os.SEEK_SET) # extract & analyse file self._expkg = dpkt self._extmp = iter(dpkt.pcap.Reader(self._ifile)) # start iteration self.record_frames()
[ "def", "_run_dpkt", "(", "self", ",", "dpkt", ")", ":", "# if not self._flag_a:", "# self._flag_a = True", "# warnings.warn(f\"'Extractor(engine=dpkt)' object is not iterable; \"", "# \"so 'auto=False' will be ignored\", AttributeWarning, stacklevel=stacklevel())", "if", "self", ".", "_exlyr", "!=", "'None'", "or", "self", ".", "_exptl", "!=", "'null'", ":", "warnings", ".", "warn", "(", "\"'Extractor(engine=dpkt)' does not support protocol and layer threshold; \"", "f\"'layer={self._exlyr}' and 'protocol={self._exptl}' ignored\"", ",", "AttributeWarning", ",", "stacklevel", "=", "stacklevel", "(", ")", ")", "# extract global header", "self", ".", "record_header", "(", ")", "self", ".", "_ifile", ".", "seek", "(", "0", ",", "os", ".", "SEEK_SET", ")", "# extract & analyse file", "self", ".", "_expkg", "=", "dpkt", "self", ".", "_extmp", "=", "iter", "(", "dpkt", ".", "pcap", ".", "Reader", "(", "self", ".", "_ifile", ")", ")", "# start iteration", "self", ".", "record_frames", "(", ")" ]
Call dpkt.pcap.Reader to extract PCAP files.
[ "Call", "dpkt", ".", "pcap", ".", "Reader", "to", "extract", "PCAP", "files", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/foundation/extraction.py#L759-L780
1,266
JarryShaw/PyPCAPKit
src/foundation/extraction.py
Extractor._run_pyshark
def _run_pyshark(self, pyshark): """Call pyshark.FileCapture to extract PCAP files.""" # if not self._flag_a: # self._flag_a = True # warnings.warn(f"'Extractor(engine=pyshark)' object is not iterable; " # "so 'auto=False' will be ignored", AttributeWarning, stacklevel=stacklevel()) if self._exlyr != 'None' or self._exptl != 'null': warnings.warn("'Extractor(engine=pyshark)' does not support protocol and layer threshold; " f"'layer={self._exlyr}' and 'protocol={self._exptl}' ignored", AttributeWarning, stacklevel=stacklevel()) if (self._ipv4 or self._ipv6 or self._tcp): self._ipv4 = self._ipv6 = self._tcp = False self._reasm = [None] * 3 warnings.warn("'Extractor(engine=pyshark)' object dose not support reassembly; " f"so 'ipv4={self._ipv4}', 'ipv6={self._ipv6}' and 'tcp={self._tcp}' will be ignored", AttributeWarning, stacklevel=stacklevel()) # extract & analyse file self._expkg = pyshark self._extmp = iter(pyshark.FileCapture(self._ifnm, keep_packets=False)) # start iteration self.record_frames()
python
def _run_pyshark(self, pyshark): # if not self._flag_a: # self._flag_a = True # warnings.warn(f"'Extractor(engine=pyshark)' object is not iterable; " # "so 'auto=False' will be ignored", AttributeWarning, stacklevel=stacklevel()) if self._exlyr != 'None' or self._exptl != 'null': warnings.warn("'Extractor(engine=pyshark)' does not support protocol and layer threshold; " f"'layer={self._exlyr}' and 'protocol={self._exptl}' ignored", AttributeWarning, stacklevel=stacklevel()) if (self._ipv4 or self._ipv6 or self._tcp): self._ipv4 = self._ipv6 = self._tcp = False self._reasm = [None] * 3 warnings.warn("'Extractor(engine=pyshark)' object dose not support reassembly; " f"so 'ipv4={self._ipv4}', 'ipv6={self._ipv6}' and 'tcp={self._tcp}' will be ignored", AttributeWarning, stacklevel=stacklevel()) # extract & analyse file self._expkg = pyshark self._extmp = iter(pyshark.FileCapture(self._ifnm, keep_packets=False)) # start iteration self.record_frames()
[ "def", "_run_pyshark", "(", "self", ",", "pyshark", ")", ":", "# if not self._flag_a:", "# self._flag_a = True", "# warnings.warn(f\"'Extractor(engine=pyshark)' object is not iterable; \"", "# \"so 'auto=False' will be ignored\", AttributeWarning, stacklevel=stacklevel())", "if", "self", ".", "_exlyr", "!=", "'None'", "or", "self", ".", "_exptl", "!=", "'null'", ":", "warnings", ".", "warn", "(", "\"'Extractor(engine=pyshark)' does not support protocol and layer threshold; \"", "f\"'layer={self._exlyr}' and 'protocol={self._exptl}' ignored\"", ",", "AttributeWarning", ",", "stacklevel", "=", "stacklevel", "(", ")", ")", "if", "(", "self", ".", "_ipv4", "or", "self", ".", "_ipv6", "or", "self", ".", "_tcp", ")", ":", "self", ".", "_ipv4", "=", "self", ".", "_ipv6", "=", "self", ".", "_tcp", "=", "False", "self", ".", "_reasm", "=", "[", "None", "]", "*", "3", "warnings", ".", "warn", "(", "\"'Extractor(engine=pyshark)' object dose not support reassembly; \"", "f\"so 'ipv4={self._ipv4}', 'ipv6={self._ipv6}' and 'tcp={self._tcp}' will be ignored\"", ",", "AttributeWarning", ",", "stacklevel", "=", "stacklevel", "(", ")", ")", "# extract & analyse file", "self", ".", "_expkg", "=", "pyshark", "self", ".", "_extmp", "=", "iter", "(", "pyshark", ".", "FileCapture", "(", "self", ".", "_ifnm", ",", "keep_packets", "=", "False", ")", ")", "# start iteration", "self", ".", "record_frames", "(", ")" ]
Call pyshark.FileCapture to extract PCAP files.
[ "Call", "pyshark", ".", "FileCapture", "to", "extract", "PCAP", "files", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/foundation/extraction.py#L850-L874
1,267
JarryShaw/PyPCAPKit
src/foundation/extraction.py
Extractor._run_pipeline
def _run_pipeline(self, multiprocessing): """Use pipeline multiprocessing to extract PCAP files.""" if not self._flag_m: raise UnsupportedCall(f"Extractor(engine={self._exeng})' has no attribute '_run_pipline'") if not self._flag_q: self._flag_q = True warnings.warn("'Extractor(engine=pipeline)' does not support output; " f"'fout={self._ofnm}' ignored", AttributeWarning, stacklevel=stacklevel()) self._frnum = 1 # frame number (revised) self._expkg = multiprocessing # multiprocessing module self._mpprc = list() # multiprocessing process list self._mpfdp = collections.defaultdict(multiprocessing.Queue) # multiprocessing file pointer self._mpmng = multiprocessing.Manager() # multiprocessing manager self._mpkit = self._mpmng.Namespace() # multiprocessing work kit self._mpkit.counter = 0 # work count (on duty) self._mpkit.pool = 1 # work pool (ready) self._mpkit.current = 1 # current frame number self._mpkit.eof = False # EOF flag self._mpkit.frames = dict() # frame storage self._mpkit.trace = self._trace # flow tracer self._mpkit.reassembly = copy.deepcopy(self._reasm) # reassembly buffers # preparation self.record_header() self._mpfdp[0].put(self._gbhdr.length) # extraction while True: # check EOF if self._mpkit.eof: self._update_eof() break # check counter if self._mpkit.pool and self._mpkit.counter < CPU_CNT: # update file offset self._ifile.seek(self._mpfdp.pop(self._frnum-1).get(), os.SEEK_SET) # create worker # print(self._frnum, 'start') proc = multiprocessing.Process( target=self._pipeline_read_frame, kwargs={'mpkit': self._mpkit, 'mpfdp': self._mpfdp[self._frnum]} ) # update status self._mpkit.pool -= 1 self._mpkit.counter += 1 # start and record proc.start() self._frnum += 1 self._mpprc.append(proc) # check buffer if len(self._mpprc) >= CPU_CNT: [proc.join() for proc in self._mpprc[:-4]] del self._mpprc[:-4]
python
def _run_pipeline(self, multiprocessing): if not self._flag_m: raise UnsupportedCall(f"Extractor(engine={self._exeng})' has no attribute '_run_pipline'") if not self._flag_q: self._flag_q = True warnings.warn("'Extractor(engine=pipeline)' does not support output; " f"'fout={self._ofnm}' ignored", AttributeWarning, stacklevel=stacklevel()) self._frnum = 1 # frame number (revised) self._expkg = multiprocessing # multiprocessing module self._mpprc = list() # multiprocessing process list self._mpfdp = collections.defaultdict(multiprocessing.Queue) # multiprocessing file pointer self._mpmng = multiprocessing.Manager() # multiprocessing manager self._mpkit = self._mpmng.Namespace() # multiprocessing work kit self._mpkit.counter = 0 # work count (on duty) self._mpkit.pool = 1 # work pool (ready) self._mpkit.current = 1 # current frame number self._mpkit.eof = False # EOF flag self._mpkit.frames = dict() # frame storage self._mpkit.trace = self._trace # flow tracer self._mpkit.reassembly = copy.deepcopy(self._reasm) # reassembly buffers # preparation self.record_header() self._mpfdp[0].put(self._gbhdr.length) # extraction while True: # check EOF if self._mpkit.eof: self._update_eof() break # check counter if self._mpkit.pool and self._mpkit.counter < CPU_CNT: # update file offset self._ifile.seek(self._mpfdp.pop(self._frnum-1).get(), os.SEEK_SET) # create worker # print(self._frnum, 'start') proc = multiprocessing.Process( target=self._pipeline_read_frame, kwargs={'mpkit': self._mpkit, 'mpfdp': self._mpfdp[self._frnum]} ) # update status self._mpkit.pool -= 1 self._mpkit.counter += 1 # start and record proc.start() self._frnum += 1 self._mpprc.append(proc) # check buffer if len(self._mpprc) >= CPU_CNT: [proc.join() for proc in self._mpprc[:-4]] del self._mpprc[:-4]
[ "def", "_run_pipeline", "(", "self", ",", "multiprocessing", ")", ":", "if", "not", "self", ".", "_flag_m", ":", "raise", "UnsupportedCall", "(", "f\"Extractor(engine={self._exeng})' has no attribute '_run_pipline'\"", ")", "if", "not", "self", ".", "_flag_q", ":", "self", ".", "_flag_q", "=", "True", "warnings", ".", "warn", "(", "\"'Extractor(engine=pipeline)' does not support output; \"", "f\"'fout={self._ofnm}' ignored\"", ",", "AttributeWarning", ",", "stacklevel", "=", "stacklevel", "(", ")", ")", "self", ".", "_frnum", "=", "1", "# frame number (revised)", "self", ".", "_expkg", "=", "multiprocessing", "# multiprocessing module", "self", ".", "_mpprc", "=", "list", "(", ")", "# multiprocessing process list", "self", ".", "_mpfdp", "=", "collections", ".", "defaultdict", "(", "multiprocessing", ".", "Queue", ")", "# multiprocessing file pointer", "self", ".", "_mpmng", "=", "multiprocessing", ".", "Manager", "(", ")", "# multiprocessing manager", "self", ".", "_mpkit", "=", "self", ".", "_mpmng", ".", "Namespace", "(", ")", "# multiprocessing work kit", "self", ".", "_mpkit", ".", "counter", "=", "0", "# work count (on duty)", "self", ".", "_mpkit", ".", "pool", "=", "1", "# work pool (ready)", "self", ".", "_mpkit", ".", "current", "=", "1", "# current frame number", "self", ".", "_mpkit", ".", "eof", "=", "False", "# EOF flag", "self", ".", "_mpkit", ".", "frames", "=", "dict", "(", ")", "# frame storage", "self", ".", "_mpkit", ".", "trace", "=", "self", ".", "_trace", "# flow tracer", "self", ".", "_mpkit", ".", "reassembly", "=", "copy", ".", "deepcopy", "(", "self", ".", "_reasm", ")", "# reassembly buffers", "# preparation", "self", ".", "record_header", "(", ")", "self", ".", "_mpfdp", "[", "0", "]", ".", "put", "(", "self", ".", "_gbhdr", ".", "length", ")", "# extraction", "while", "True", ":", "# check EOF", "if", "self", ".", "_mpkit", ".", "eof", ":", "self", ".", "_update_eof", "(", ")", "break", "# check counter", "if", "self", ".", "_mpkit", ".", "pool", "and", "self", ".", "_mpkit", ".", "counter", "<", "CPU_CNT", ":", "# update file offset", "self", ".", "_ifile", ".", "seek", "(", "self", ".", "_mpfdp", ".", "pop", "(", "self", ".", "_frnum", "-", "1", ")", ".", "get", "(", ")", ",", "os", ".", "SEEK_SET", ")", "# create worker", "# print(self._frnum, 'start')", "proc", "=", "multiprocessing", ".", "Process", "(", "target", "=", "self", ".", "_pipeline_read_frame", ",", "kwargs", "=", "{", "'mpkit'", ":", "self", ".", "_mpkit", ",", "'mpfdp'", ":", "self", ".", "_mpfdp", "[", "self", ".", "_frnum", "]", "}", ")", "# update status", "self", ".", "_mpkit", ".", "pool", "-=", "1", "self", ".", "_mpkit", ".", "counter", "+=", "1", "# start and record", "proc", ".", "start", "(", ")", "self", ".", "_frnum", "+=", "1", "self", ".", "_mpprc", ".", "append", "(", "proc", ")", "# check buffer", "if", "len", "(", "self", ".", "_mpprc", ")", ">=", "CPU_CNT", ":", "[", "proc", ".", "join", "(", ")", "for", "proc", "in", "self", ".", "_mpprc", "[", ":", "-", "4", "]", "]", "del", "self", ".", "_mpprc", "[", ":", "-", "4", "]" ]
Use pipeline multiprocessing to extract PCAP files.
[ "Use", "pipeline", "multiprocessing", "to", "extract", "PCAP", "files", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/foundation/extraction.py#L916-L977
1,268
JarryShaw/PyPCAPKit
src/foundation/extraction.py
Extractor._run_server
def _run_server(self, multiprocessing): """Use server multiprocessing to extract PCAP files.""" if not self._flag_m: raise UnsupportedCall(f"Extractor(engine={self._exeng})' has no attribute '_run_server'") if not self._flag_q: self._flag_q = True warnings.warn("'Extractor(engine=pipeline)' does not support output; " f"'fout={self._ofnm}' ignored", AttributeWarning, stacklevel=stacklevel()) self._frnum = 1 # frame number (revised) self._expkg = multiprocessing # multiprocessing module self._mpsvc = NotImplemented # multiprocessing server process self._mpprc = list() # multiprocessing process list self._mpfdp = collections.defaultdict(multiprocessing.Queue) # multiprocessing file pointer self._mpmng = multiprocessing.Manager() # multiprocessing manager self._mpbuf = self._mpmng.dict() # multiprocessing frame dict self._mpfrm = self._mpmng.list() # multiprocessing frame storage self._mprsm = self._mpmng.list() # multiprocessing reassembly buffer self._mpkit = self._mpmng.Namespace() # multiprocessing work kit self._mpkit.counter = 0 # work count (on duty) self._mpkit.pool = 1 # work pool (ready) self._mpkit.eof = False # EOF flag self._mpkit.trace = None # flow tracer # preparation self.record_header() self._mpfdp[0].put(self._gbhdr.length) self._mpsvc = multiprocessing.Process( target=self._server_analyse_frame, kwargs={'mpfrm': self._mpfrm, 'mprsm': self._mprsm, 'mpbuf': self._mpbuf, 'mpkit': self._mpkit} ) self._mpsvc.start() # extraction while True: # check EOF if self._mpkit.eof: self._update_eof() break # check counter if self._mpkit.pool and self._mpkit.counter < CPU_CNT - 1: # update file offset self._ifile.seek(self._mpfdp.pop(self._frnum-1).get(), os.SEEK_SET) # create worker # print(self._frnum, 'start') proc = multiprocessing.Process( target=self._server_extract_frame, kwargs={'mpkit': self._mpkit, 'mpbuf': self._mpbuf, 'mpfdp': self._mpfdp[self._frnum]} ) # update status self._mpkit.pool -= 1 self._mpkit.counter += 1 # start and record proc.start() self._frnum += 1 self._mpprc.append(proc) # check buffer if len(self._mpprc) >= CPU_CNT - 1: [proc.join() for proc in self._mpprc[:-4]] del self._mpprc[:-4]
python
def _run_server(self, multiprocessing): if not self._flag_m: raise UnsupportedCall(f"Extractor(engine={self._exeng})' has no attribute '_run_server'") if not self._flag_q: self._flag_q = True warnings.warn("'Extractor(engine=pipeline)' does not support output; " f"'fout={self._ofnm}' ignored", AttributeWarning, stacklevel=stacklevel()) self._frnum = 1 # frame number (revised) self._expkg = multiprocessing # multiprocessing module self._mpsvc = NotImplemented # multiprocessing server process self._mpprc = list() # multiprocessing process list self._mpfdp = collections.defaultdict(multiprocessing.Queue) # multiprocessing file pointer self._mpmng = multiprocessing.Manager() # multiprocessing manager self._mpbuf = self._mpmng.dict() # multiprocessing frame dict self._mpfrm = self._mpmng.list() # multiprocessing frame storage self._mprsm = self._mpmng.list() # multiprocessing reassembly buffer self._mpkit = self._mpmng.Namespace() # multiprocessing work kit self._mpkit.counter = 0 # work count (on duty) self._mpkit.pool = 1 # work pool (ready) self._mpkit.eof = False # EOF flag self._mpkit.trace = None # flow tracer # preparation self.record_header() self._mpfdp[0].put(self._gbhdr.length) self._mpsvc = multiprocessing.Process( target=self._server_analyse_frame, kwargs={'mpfrm': self._mpfrm, 'mprsm': self._mprsm, 'mpbuf': self._mpbuf, 'mpkit': self._mpkit} ) self._mpsvc.start() # extraction while True: # check EOF if self._mpkit.eof: self._update_eof() break # check counter if self._mpkit.pool and self._mpkit.counter < CPU_CNT - 1: # update file offset self._ifile.seek(self._mpfdp.pop(self._frnum-1).get(), os.SEEK_SET) # create worker # print(self._frnum, 'start') proc = multiprocessing.Process( target=self._server_extract_frame, kwargs={'mpkit': self._mpkit, 'mpbuf': self._mpbuf, 'mpfdp': self._mpfdp[self._frnum]} ) # update status self._mpkit.pool -= 1 self._mpkit.counter += 1 # start and record proc.start() self._frnum += 1 self._mpprc.append(proc) # check buffer if len(self._mpprc) >= CPU_CNT - 1: [proc.join() for proc in self._mpprc[:-4]] del self._mpprc[:-4]
[ "def", "_run_server", "(", "self", ",", "multiprocessing", ")", ":", "if", "not", "self", ".", "_flag_m", ":", "raise", "UnsupportedCall", "(", "f\"Extractor(engine={self._exeng})' has no attribute '_run_server'\"", ")", "if", "not", "self", ".", "_flag_q", ":", "self", ".", "_flag_q", "=", "True", "warnings", ".", "warn", "(", "\"'Extractor(engine=pipeline)' does not support output; \"", "f\"'fout={self._ofnm}' ignored\"", ",", "AttributeWarning", ",", "stacklevel", "=", "stacklevel", "(", ")", ")", "self", ".", "_frnum", "=", "1", "# frame number (revised)", "self", ".", "_expkg", "=", "multiprocessing", "# multiprocessing module", "self", ".", "_mpsvc", "=", "NotImplemented", "# multiprocessing server process", "self", ".", "_mpprc", "=", "list", "(", ")", "# multiprocessing process list", "self", ".", "_mpfdp", "=", "collections", ".", "defaultdict", "(", "multiprocessing", ".", "Queue", ")", "# multiprocessing file pointer", "self", ".", "_mpmng", "=", "multiprocessing", ".", "Manager", "(", ")", "# multiprocessing manager", "self", ".", "_mpbuf", "=", "self", ".", "_mpmng", ".", "dict", "(", ")", "# multiprocessing frame dict", "self", ".", "_mpfrm", "=", "self", ".", "_mpmng", ".", "list", "(", ")", "# multiprocessing frame storage", "self", ".", "_mprsm", "=", "self", ".", "_mpmng", ".", "list", "(", ")", "# multiprocessing reassembly buffer", "self", ".", "_mpkit", "=", "self", ".", "_mpmng", ".", "Namespace", "(", ")", "# multiprocessing work kit", "self", ".", "_mpkit", ".", "counter", "=", "0", "# work count (on duty)", "self", ".", "_mpkit", ".", "pool", "=", "1", "# work pool (ready)", "self", ".", "_mpkit", ".", "eof", "=", "False", "# EOF flag", "self", ".", "_mpkit", ".", "trace", "=", "None", "# flow tracer", "# preparation", "self", ".", "record_header", "(", ")", "self", ".", "_mpfdp", "[", "0", "]", ".", "put", "(", "self", ".", "_gbhdr", ".", "length", ")", "self", ".", "_mpsvc", "=", "multiprocessing", ".", "Process", "(", "target", "=", "self", ".", "_server_analyse_frame", ",", "kwargs", "=", "{", "'mpfrm'", ":", "self", ".", "_mpfrm", ",", "'mprsm'", ":", "self", ".", "_mprsm", ",", "'mpbuf'", ":", "self", ".", "_mpbuf", ",", "'mpkit'", ":", "self", ".", "_mpkit", "}", ")", "self", ".", "_mpsvc", ".", "start", "(", ")", "# extraction", "while", "True", ":", "# check EOF", "if", "self", ".", "_mpkit", ".", "eof", ":", "self", ".", "_update_eof", "(", ")", "break", "# check counter", "if", "self", ".", "_mpkit", ".", "pool", "and", "self", ".", "_mpkit", ".", "counter", "<", "CPU_CNT", "-", "1", ":", "# update file offset", "self", ".", "_ifile", ".", "seek", "(", "self", ".", "_mpfdp", ".", "pop", "(", "self", ".", "_frnum", "-", "1", ")", ".", "get", "(", ")", ",", "os", ".", "SEEK_SET", ")", "# create worker", "# print(self._frnum, 'start')", "proc", "=", "multiprocessing", ".", "Process", "(", "target", "=", "self", ".", "_server_extract_frame", ",", "kwargs", "=", "{", "'mpkit'", ":", "self", ".", "_mpkit", ",", "'mpbuf'", ":", "self", ".", "_mpbuf", ",", "'mpfdp'", ":", "self", ".", "_mpfdp", "[", "self", ".", "_frnum", "]", "}", ")", "# update status", "self", ".", "_mpkit", ".", "pool", "-=", "1", "self", ".", "_mpkit", ".", "counter", "+=", "1", "# start and record", "proc", ".", "start", "(", ")", "self", ".", "_frnum", "+=", "1", "self", ".", "_mpprc", ".", "append", "(", "proc", ")", "# check buffer", "if", "len", "(", "self", ".", "_mpprc", ")", ">=", "CPU_CNT", "-", "1", ":", "[", "proc", ".", "join", "(", ")", "for", "proc", "in", "self", ".", "_mpprc", "[", ":", "-", "4", "]", "]", "del", "self", ".", "_mpprc", "[", ":", "-", "4", "]" ]
Use server multiprocessing to extract PCAP files.
[ "Use", "server", "multiprocessing", "to", "extract", "PCAP", "files", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/foundation/extraction.py#L1015-L1082
1,269
JarryShaw/PyPCAPKit
src/foundation/extraction.py
Extractor._server_analyse_frame
def _server_analyse_frame(self, *, mpkit, mpfrm, mprsm, mpbuf): """Analyse frame.""" while True: # fetch frame # print(self._frnum, 'trying') frame = mpbuf.pop(self._frnum, None) if frame is EOFError: break if frame is None: continue # print(self._frnum, 'get') self._default_read_frame(frame=frame) mpfrm += self._frame mprsm += self._reasm mpkit.trace = copy.deepcopy(self._trace)
python
def _server_analyse_frame(self, *, mpkit, mpfrm, mprsm, mpbuf): while True: # fetch frame # print(self._frnum, 'trying') frame = mpbuf.pop(self._frnum, None) if frame is EOFError: break if frame is None: continue # print(self._frnum, 'get') self._default_read_frame(frame=frame) mpfrm += self._frame mprsm += self._reasm mpkit.trace = copy.deepcopy(self._trace)
[ "def", "_server_analyse_frame", "(", "self", ",", "*", ",", "mpkit", ",", "mpfrm", ",", "mprsm", ",", "mpbuf", ")", ":", "while", "True", ":", "# fetch frame", "# print(self._frnum, 'trying')", "frame", "=", "mpbuf", ".", "pop", "(", "self", ".", "_frnum", ",", "None", ")", "if", "frame", "is", "EOFError", ":", "break", "if", "frame", "is", "None", ":", "continue", "# print(self._frnum, 'get')", "self", ".", "_default_read_frame", "(", "frame", "=", "frame", ")", "mpfrm", "+=", "self", ".", "_frame", "mprsm", "+=", "self", ".", "_reasm", "mpkit", ".", "trace", "=", "copy", ".", "deepcopy", "(", "self", ".", "_trace", ")" ]
Analyse frame.
[ "Analyse", "frame", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/foundation/extraction.py#L1104-L1119
1,270
JarryShaw/PyPCAPKit
src/protocols/application/NotImplemented/httpv2.py
HTTPv2.read_http
def read_http(self, length): """Read Hypertext Transfer Protocol version 2. Structure of HTTP/2 packet [RFC 7230]: +-----------------------------------------------+ | Length (24) | +---------------+---------------+---------------+ | Type (8) | Flags (8) | +-+-------------+---------------+-------------------------------+ |R| Stream Identifier (31) | +=+=============================================================+ | Frame Payload (0...) ... +---------------------------------------------------------------+ """ _plen = self._read_binary(3) _type = self._read_unpack(1) _flag = self._read_binary(1) _stid = self._read_binary(4)
python
def read_http(self, length): _plen = self._read_binary(3) _type = self._read_unpack(1) _flag = self._read_binary(1) _stid = self._read_binary(4)
[ "def", "read_http", "(", "self", ",", "length", ")", ":", "_plen", "=", "self", ".", "_read_binary", "(", "3", ")", "_type", "=", "self", ".", "_read_unpack", "(", "1", ")", "_flag", "=", "self", ".", "_read_binary", "(", "1", ")", "_stid", "=", "self", ".", "_read_binary", "(", "4", ")" ]
Read Hypertext Transfer Protocol version 2. Structure of HTTP/2 packet [RFC 7230]: +-----------------------------------------------+ | Length (24) | +---------------+---------------+---------------+ | Type (8) | Flags (8) | +-+-------------+---------------+-------------------------------+ |R| Stream Identifier (31) | +=+=============================================================+ | Frame Payload (0...) ... +---------------------------------------------------------------+
[ "Read", "Hypertext", "Transfer", "Protocol", "version", "2", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/protocols/application/NotImplemented/httpv2.py#L57-L75
1,271
JarryShaw/PyPCAPKit
src/foundation/traceflow.py
TraceFlow.make_fout
def make_fout(fout='./tmp', fmt='pcap'): """Make root path for output. Positional arguments: * fout -- str, root path for output * fmt -- str, output format Returns: * output -- dumper of specified format """ if fmt == 'pcap': # output PCAP file from pcapkit.dumpkit import PCAP as output elif fmt == 'plist': # output PLIST file from dictdumper import PLIST as output elif fmt == 'json': # output JSON file from dictdumper import JSON as output elif fmt == 'tree': # output treeview text file from dictdumper import Tree as output fmt = 'txt' elif fmt == 'html': # output JavaScript file from dictdumper import JavaScript as output fmt = 'js' elif fmt == 'xml': # output XML file from dictdumper import XML as output else: # no output file from pcapkit.dumpkit import NotImplementedIO as output if fmt is not None: warnings.warn(f'Unsupported output format: {fmt}; disabled file output feature', FormatWarning, stacklevel=stacklevel()) return output, '' try: pathlib.Path(fout).mkdir(parents=True, exist_ok=True) except FileExistsError as error: if fmt is None: warnings.warn(error.strerror, FileWarning, stacklevel=stacklevel()) else: raise FileExists(*error.args) from None return output, fmt
python
def make_fout(fout='./tmp', fmt='pcap'): if fmt == 'pcap': # output PCAP file from pcapkit.dumpkit import PCAP as output elif fmt == 'plist': # output PLIST file from dictdumper import PLIST as output elif fmt == 'json': # output JSON file from dictdumper import JSON as output elif fmt == 'tree': # output treeview text file from dictdumper import Tree as output fmt = 'txt' elif fmt == 'html': # output JavaScript file from dictdumper import JavaScript as output fmt = 'js' elif fmt == 'xml': # output XML file from dictdumper import XML as output else: # no output file from pcapkit.dumpkit import NotImplementedIO as output if fmt is not None: warnings.warn(f'Unsupported output format: {fmt}; disabled file output feature', FormatWarning, stacklevel=stacklevel()) return output, '' try: pathlib.Path(fout).mkdir(parents=True, exist_ok=True) except FileExistsError as error: if fmt is None: warnings.warn(error.strerror, FileWarning, stacklevel=stacklevel()) else: raise FileExists(*error.args) from None return output, fmt
[ "def", "make_fout", "(", "fout", "=", "'./tmp'", ",", "fmt", "=", "'pcap'", ")", ":", "if", "fmt", "==", "'pcap'", ":", "# output PCAP file", "from", "pcapkit", ".", "dumpkit", "import", "PCAP", "as", "output", "elif", "fmt", "==", "'plist'", ":", "# output PLIST file", "from", "dictdumper", "import", "PLIST", "as", "output", "elif", "fmt", "==", "'json'", ":", "# output JSON file", "from", "dictdumper", "import", "JSON", "as", "output", "elif", "fmt", "==", "'tree'", ":", "# output treeview text file", "from", "dictdumper", "import", "Tree", "as", "output", "fmt", "=", "'txt'", "elif", "fmt", "==", "'html'", ":", "# output JavaScript file", "from", "dictdumper", "import", "JavaScript", "as", "output", "fmt", "=", "'js'", "elif", "fmt", "==", "'xml'", ":", "# output XML file", "from", "dictdumper", "import", "XML", "as", "output", "else", ":", "# no output file", "from", "pcapkit", ".", "dumpkit", "import", "NotImplementedIO", "as", "output", "if", "fmt", "is", "not", "None", ":", "warnings", ".", "warn", "(", "f'Unsupported output format: {fmt}; disabled file output feature'", ",", "FormatWarning", ",", "stacklevel", "=", "stacklevel", "(", ")", ")", "return", "output", ",", "''", "try", ":", "pathlib", ".", "Path", "(", "fout", ")", ".", "mkdir", "(", "parents", "=", "True", ",", "exist_ok", "=", "True", ")", "except", "FileExistsError", "as", "error", ":", "if", "fmt", "is", "None", ":", "warnings", ".", "warn", "(", "error", ".", "strerror", ",", "FileWarning", ",", "stacklevel", "=", "stacklevel", "(", ")", ")", "else", ":", "raise", "FileExists", "(", "*", "error", ".", "args", ")", "from", "None", "return", "output", ",", "fmt" ]
Make root path for output. Positional arguments: * fout -- str, root path for output * fmt -- str, output format Returns: * output -- dumper of specified format
[ "Make", "root", "path", "for", "output", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/foundation/traceflow.py#L55-L95
1,272
JarryShaw/PyPCAPKit
src/foundation/traceflow.py
TraceFlow.dump
def dump(self, packet): """Dump frame to output files. Positional arguments: * packet -- dict, a flow packet |-- (str) protocol -- data link type from global header |-- (int) index -- frame number |-- (Info) frame -- extracted frame info |-- (bool) syn -- TCP synchronise (SYN) flag |-- (bool) fin -- TCP finish (FIN) flag |-- (str) src -- source IP |-- (int) srcport -- TCP source port |-- (str) dst -- destination IP |-- (int) dstport -- TCP destination port |-- (numbers.Real) timestamp -- frame timestamp """ # fetch flow label output = self.trace(packet, _check=False, _output=True) # dump files output(packet['frame'], name=f"Frame {packet['index']}", byteorder=self._endian, nanosecond=self._nnsecd)
python
def dump(self, packet): # fetch flow label output = self.trace(packet, _check=False, _output=True) # dump files output(packet['frame'], name=f"Frame {packet['index']}", byteorder=self._endian, nanosecond=self._nnsecd)
[ "def", "dump", "(", "self", ",", "packet", ")", ":", "# fetch flow label", "output", "=", "self", ".", "trace", "(", "packet", ",", "_check", "=", "False", ",", "_output", "=", "True", ")", "# dump files", "output", "(", "packet", "[", "'frame'", "]", ",", "name", "=", "f\"Frame {packet['index']}\"", ",", "byteorder", "=", "self", ".", "_endian", ",", "nanosecond", "=", "self", ".", "_nnsecd", ")" ]
Dump frame to output files. Positional arguments: * packet -- dict, a flow packet |-- (str) protocol -- data link type from global header |-- (int) index -- frame number |-- (Info) frame -- extracted frame info |-- (bool) syn -- TCP synchronise (SYN) flag |-- (bool) fin -- TCP finish (FIN) flag |-- (str) src -- source IP |-- (int) srcport -- TCP source port |-- (str) dst -- destination IP |-- (int) dstport -- TCP destination port |-- (numbers.Real) timestamp -- frame timestamp
[ "Dump", "frame", "to", "output", "files", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/foundation/traceflow.py#L97-L119
1,273
JarryShaw/PyPCAPKit
src/foundation/traceflow.py
TraceFlow.trace
def trace(self, packet, *, _check=True, _output=False): """Trace packets. Positional arguments: * packet -- dict, a flow packet Keyword arguments: * _check -- bool, flag if run validations * _output -- bool, flag if has formatted dumper """ self._newflg = True if _check: pkt_check(packet) info = Info(packet) # Buffer Identifier BUFID = tuple(sorted([str(info.src), str(info.srcport), # pylint: disable=E1101 str(info.dst), str(info.dstport)])) # pylint: disable=E1101 # SYN = info.syn # Synchronise Flag (Establishment) # Finish Flag (Termination) FIN = info.fin # pylint: disable=E1101 # # when SYN is set, reset buffer of this seesion # if SYN and BUFID in self._buffer: # temp = self._buffer.pop(BUFID) # temp['fpout'] = (self._fproot, self._fdpext) # temp['index'] = tuple(temp['index']) # self._stream.append(Info(temp)) # initialise buffer with BUFID if BUFID not in self._buffer: label = f'{info.src}_{info.srcport}-{info.dst}_{info.dstport}-{info.timestamp}' # pylint: disable=E1101 self._buffer[BUFID] = dict( fpout=self._foutio(f'{self._fproot}/{label}.{self._fdpext}', protocol=info.protocol), # pylint: disable=E1101 index=list(), label=label, ) # trace frame record self._buffer[BUFID]['index'].append(info.index) # pylint: disable=E1101 fpout = self._buffer[BUFID]['fpout'] label = self._buffer[BUFID]['label'] # when FIN is set, submit buffer of this session if FIN: buf = self._buffer.pop(BUFID) # fpout, label = buf['fpout'], buf['label'] if self._fdpext: buf['fpout'] = f'{self._fproot}/{label}.{self._fdpext}' else: del buf['fpout'] buf['index'] = tuple(buf['index']) self._stream.append(Info(buf)) # return label or output object return fpout if _output else label
python
def trace(self, packet, *, _check=True, _output=False): self._newflg = True if _check: pkt_check(packet) info = Info(packet) # Buffer Identifier BUFID = tuple(sorted([str(info.src), str(info.srcport), # pylint: disable=E1101 str(info.dst), str(info.dstport)])) # pylint: disable=E1101 # SYN = info.syn # Synchronise Flag (Establishment) # Finish Flag (Termination) FIN = info.fin # pylint: disable=E1101 # # when SYN is set, reset buffer of this seesion # if SYN and BUFID in self._buffer: # temp = self._buffer.pop(BUFID) # temp['fpout'] = (self._fproot, self._fdpext) # temp['index'] = tuple(temp['index']) # self._stream.append(Info(temp)) # initialise buffer with BUFID if BUFID not in self._buffer: label = f'{info.src}_{info.srcport}-{info.dst}_{info.dstport}-{info.timestamp}' # pylint: disable=E1101 self._buffer[BUFID] = dict( fpout=self._foutio(f'{self._fproot}/{label}.{self._fdpext}', protocol=info.protocol), # pylint: disable=E1101 index=list(), label=label, ) # trace frame record self._buffer[BUFID]['index'].append(info.index) # pylint: disable=E1101 fpout = self._buffer[BUFID]['fpout'] label = self._buffer[BUFID]['label'] # when FIN is set, submit buffer of this session if FIN: buf = self._buffer.pop(BUFID) # fpout, label = buf['fpout'], buf['label'] if self._fdpext: buf['fpout'] = f'{self._fproot}/{label}.{self._fdpext}' else: del buf['fpout'] buf['index'] = tuple(buf['index']) self._stream.append(Info(buf)) # return label or output object return fpout if _output else label
[ "def", "trace", "(", "self", ",", "packet", ",", "*", ",", "_check", "=", "True", ",", "_output", "=", "False", ")", ":", "self", ".", "_newflg", "=", "True", "if", "_check", ":", "pkt_check", "(", "packet", ")", "info", "=", "Info", "(", "packet", ")", "# Buffer Identifier", "BUFID", "=", "tuple", "(", "sorted", "(", "[", "str", "(", "info", ".", "src", ")", ",", "str", "(", "info", ".", "srcport", ")", ",", "# pylint: disable=E1101", "str", "(", "info", ".", "dst", ")", ",", "str", "(", "info", ".", "dstport", ")", "]", ")", ")", "# pylint: disable=E1101", "# SYN = info.syn # Synchronise Flag (Establishment)", "# Finish Flag (Termination)", "FIN", "=", "info", ".", "fin", "# pylint: disable=E1101", "# # when SYN is set, reset buffer of this seesion", "# if SYN and BUFID in self._buffer:", "# temp = self._buffer.pop(BUFID)", "# temp['fpout'] = (self._fproot, self._fdpext)", "# temp['index'] = tuple(temp['index'])", "# self._stream.append(Info(temp))", "# initialise buffer with BUFID", "if", "BUFID", "not", "in", "self", ".", "_buffer", ":", "label", "=", "f'{info.src}_{info.srcport}-{info.dst}_{info.dstport}-{info.timestamp}'", "# pylint: disable=E1101", "self", ".", "_buffer", "[", "BUFID", "]", "=", "dict", "(", "fpout", "=", "self", ".", "_foutio", "(", "f'{self._fproot}/{label}.{self._fdpext}'", ",", "protocol", "=", "info", ".", "protocol", ")", ",", "# pylint: disable=E1101", "index", "=", "list", "(", ")", ",", "label", "=", "label", ",", ")", "# trace frame record", "self", ".", "_buffer", "[", "BUFID", "]", "[", "'index'", "]", ".", "append", "(", "info", ".", "index", ")", "# pylint: disable=E1101", "fpout", "=", "self", ".", "_buffer", "[", "BUFID", "]", "[", "'fpout'", "]", "label", "=", "self", ".", "_buffer", "[", "BUFID", "]", "[", "'label'", "]", "# when FIN is set, submit buffer of this session", "if", "FIN", ":", "buf", "=", "self", ".", "_buffer", ".", "pop", "(", "BUFID", ")", "# fpout, label = buf['fpout'], buf['label']", "if", "self", ".", "_fdpext", ":", "buf", "[", "'fpout'", "]", "=", "f'{self._fproot}/{label}.{self._fdpext}'", "else", ":", "del", "buf", "[", "'fpout'", "]", "buf", "[", "'index'", "]", "=", "tuple", "(", "buf", "[", "'index'", "]", ")", "self", ".", "_stream", ".", "append", "(", "Info", "(", "buf", ")", ")", "# return label or output object", "return", "fpout", "if", "_output", "else", "label" ]
Trace packets. Positional arguments: * packet -- dict, a flow packet Keyword arguments: * _check -- bool, flag if run validations * _output -- bool, flag if has formatted dumper
[ "Trace", "packets", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/foundation/traceflow.py#L121-L178
1,274
JarryShaw/PyPCAPKit
src/foundation/traceflow.py
TraceFlow.submit
def submit(self): """Submit traced TCP flows.""" self._newflg = False ret = list() for buf in self._buffer.values(): buf = copy.deepcopy(buf) if self._fdpext: buf['fpout'] = f"{self._fproot}/{buf['label']}.{self._fdpext}" else: del buf['fpout'] buf['index'] = tuple(buf['index']) ret.append(Info(buf)) ret += self._stream return tuple(ret)
python
def submit(self): self._newflg = False ret = list() for buf in self._buffer.values(): buf = copy.deepcopy(buf) if self._fdpext: buf['fpout'] = f"{self._fproot}/{buf['label']}.{self._fdpext}" else: del buf['fpout'] buf['index'] = tuple(buf['index']) ret.append(Info(buf)) ret += self._stream return tuple(ret)
[ "def", "submit", "(", "self", ")", ":", "self", ".", "_newflg", "=", "False", "ret", "=", "list", "(", ")", "for", "buf", "in", "self", ".", "_buffer", ".", "values", "(", ")", ":", "buf", "=", "copy", ".", "deepcopy", "(", "buf", ")", "if", "self", ".", "_fdpext", ":", "buf", "[", "'fpout'", "]", "=", "f\"{self._fproot}/{buf['label']}.{self._fdpext}\"", "else", ":", "del", "buf", "[", "'fpout'", "]", "buf", "[", "'index'", "]", "=", "tuple", "(", "buf", "[", "'index'", "]", ")", "ret", ".", "append", "(", "Info", "(", "buf", ")", ")", "ret", "+=", "self", ".", "_stream", "return", "tuple", "(", "ret", ")" ]
Submit traced TCP flows.
[ "Submit", "traced", "TCP", "flows", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/foundation/traceflow.py#L180-L193
1,275
JarryShaw/PyPCAPKit
src/protocols/internet/ah.py
AH.read_ah
def read_ah(self, length, version, extension): """Read Authentication Header. Structure of AH header [RFC 4302]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Next Header | Payload Len | RESERVED | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Security Parameters Index (SPI) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Sequence Number Field | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | + Integrity Check Value-ICV (variable) | | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Octets Bits Name Description 0 0 ah.next Next Header 1 8 ah.length Payload Length 2 16 - Reserved (must be zero) 4 32 ah.spi Security Parameters Index (SPI) 8 64 ah.seq Sequence Number Field 12 96 ah.icv Integrity Check Value (ICV) """ if length is None: length = len(self) _next = self._read_protos(1) _plen = self._read_unpack(1) _resv = self._read_fileng(2) _scpi = self._read_unpack(4) _dsnf = self._read_unpack(4) # ICV length & value _tlen = _plen * 4 - 2 _vlen = _tlen - 12 _chkv = self._read_fileng(_vlen) ah = dict( next=_next, length=_tlen, spi=_scpi, seq=_dsnf, icv=_chkv, ) if version == 6: _plen = 8 - (_tlen % 8) elif version == 4: _plen = 4 - (_tlen % 4) else: raise VersionError(f'Unknown IP version {version}') if _plen: # explicit padding in need padding = self._read_binary(_plen) if any((int(bit, base=2) for bit in padding)): raise ProtocolError(f'{self.alias}: invalid format') length -= ah['length'] ah['packet'] = self._read_packet(header=ah['length'], payload=length) if extension: self._protos = None return ah return self._decode_next_layer(ah, _next, length)
python
def read_ah(self, length, version, extension): if length is None: length = len(self) _next = self._read_protos(1) _plen = self._read_unpack(1) _resv = self._read_fileng(2) _scpi = self._read_unpack(4) _dsnf = self._read_unpack(4) # ICV length & value _tlen = _plen * 4 - 2 _vlen = _tlen - 12 _chkv = self._read_fileng(_vlen) ah = dict( next=_next, length=_tlen, spi=_scpi, seq=_dsnf, icv=_chkv, ) if version == 6: _plen = 8 - (_tlen % 8) elif version == 4: _plen = 4 - (_tlen % 4) else: raise VersionError(f'Unknown IP version {version}') if _plen: # explicit padding in need padding = self._read_binary(_plen) if any((int(bit, base=2) for bit in padding)): raise ProtocolError(f'{self.alias}: invalid format') length -= ah['length'] ah['packet'] = self._read_packet(header=ah['length'], payload=length) if extension: self._protos = None return ah return self._decode_next_layer(ah, _next, length)
[ "def", "read_ah", "(", "self", ",", "length", ",", "version", ",", "extension", ")", ":", "if", "length", "is", "None", ":", "length", "=", "len", "(", "self", ")", "_next", "=", "self", ".", "_read_protos", "(", "1", ")", "_plen", "=", "self", ".", "_read_unpack", "(", "1", ")", "_resv", "=", "self", ".", "_read_fileng", "(", "2", ")", "_scpi", "=", "self", ".", "_read_unpack", "(", "4", ")", "_dsnf", "=", "self", ".", "_read_unpack", "(", "4", ")", "# ICV length & value", "_tlen", "=", "_plen", "*", "4", "-", "2", "_vlen", "=", "_tlen", "-", "12", "_chkv", "=", "self", ".", "_read_fileng", "(", "_vlen", ")", "ah", "=", "dict", "(", "next", "=", "_next", ",", "length", "=", "_tlen", ",", "spi", "=", "_scpi", ",", "seq", "=", "_dsnf", ",", "icv", "=", "_chkv", ",", ")", "if", "version", "==", "6", ":", "_plen", "=", "8", "-", "(", "_tlen", "%", "8", ")", "elif", "version", "==", "4", ":", "_plen", "=", "4", "-", "(", "_tlen", "%", "4", ")", "else", ":", "raise", "VersionError", "(", "f'Unknown IP version {version}'", ")", "if", "_plen", ":", "# explicit padding in need", "padding", "=", "self", ".", "_read_binary", "(", "_plen", ")", "if", "any", "(", "(", "int", "(", "bit", ",", "base", "=", "2", ")", "for", "bit", "in", "padding", ")", ")", ":", "raise", "ProtocolError", "(", "f'{self.alias}: invalid format'", ")", "length", "-=", "ah", "[", "'length'", "]", "ah", "[", "'packet'", "]", "=", "self", ".", "_read_packet", "(", "header", "=", "ah", "[", "'length'", "]", ",", "payload", "=", "length", ")", "if", "extension", ":", "self", ".", "_protos", "=", "None", "return", "ah", "return", "self", ".", "_decode_next_layer", "(", "ah", ",", "_next", ",", "length", ")" ]
Read Authentication Header. Structure of AH header [RFC 4302]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Next Header | Payload Len | RESERVED | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Security Parameters Index (SPI) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Sequence Number Field | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | + Integrity Check Value-ICV (variable) | | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Octets Bits Name Description 0 0 ah.next Next Header 1 8 ah.length Payload Length 2 16 - Reserved (must be zero) 4 32 ah.spi Security Parameters Index (SPI) 8 64 ah.seq Sequence Number Field 12 96 ah.icv Integrity Check Value (ICV)
[ "Read", "Authentication", "Header", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/protocols/internet/ah.py#L91-L158
1,276
JarryShaw/PyPCAPKit
src/protocols/link/ethernet.py
Ethernet.read_ethernet
def read_ethernet(self, length): """Read Ethernet Protocol. Structure of Ethernet Protocol header [RFC 7042]: Octets Bits Name Description 0 0 eth.dst Destination MAC Address 1 8 eth.src Source MAC Address 2 16 eth.type Protocol (Internet Layer) """ if length is None: length = len(self) _dstm = self._read_mac_addr() _srcm = self._read_mac_addr() _type = self._read_protos(2) ethernet = dict( dst=_dstm, src=_srcm, type=_type, ) length -= 14 ethernet['packet'] = self._read_packet(header=14, payload=length) return self._decode_next_layer(ethernet, _type, length)
python
def read_ethernet(self, length): if length is None: length = len(self) _dstm = self._read_mac_addr() _srcm = self._read_mac_addr() _type = self._read_protos(2) ethernet = dict( dst=_dstm, src=_srcm, type=_type, ) length -= 14 ethernet['packet'] = self._read_packet(header=14, payload=length) return self._decode_next_layer(ethernet, _type, length)
[ "def", "read_ethernet", "(", "self", ",", "length", ")", ":", "if", "length", "is", "None", ":", "length", "=", "len", "(", "self", ")", "_dstm", "=", "self", ".", "_read_mac_addr", "(", ")", "_srcm", "=", "self", ".", "_read_mac_addr", "(", ")", "_type", "=", "self", ".", "_read_protos", "(", "2", ")", "ethernet", "=", "dict", "(", "dst", "=", "_dstm", ",", "src", "=", "_srcm", ",", "type", "=", "_type", ",", ")", "length", "-=", "14", "ethernet", "[", "'packet'", "]", "=", "self", ".", "_read_packet", "(", "header", "=", "14", ",", "payload", "=", "length", ")", "return", "self", ".", "_decode_next_layer", "(", "ethernet", ",", "_type", ",", "length", ")" ]
Read Ethernet Protocol. Structure of Ethernet Protocol header [RFC 7042]: Octets Bits Name Description 0 0 eth.dst Destination MAC Address 1 8 eth.src Source MAC Address 2 16 eth.type Protocol (Internet Layer)
[ "Read", "Ethernet", "Protocol", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/protocols/link/ethernet.py#L92-L118
1,277
JarryShaw/PyPCAPKit
src/protocols/link/ethernet.py
Ethernet._read_mac_addr
def _read_mac_addr(self): """Read MAC address.""" _byte = self._read_fileng(6) _addr = '-'.join(textwrap.wrap(_byte.hex(), 2)) return _addr
python
def _read_mac_addr(self): _byte = self._read_fileng(6) _addr = '-'.join(textwrap.wrap(_byte.hex(), 2)) return _addr
[ "def", "_read_mac_addr", "(", "self", ")", ":", "_byte", "=", "self", ".", "_read_fileng", "(", "6", ")", "_addr", "=", "'-'", ".", "join", "(", "textwrap", ".", "wrap", "(", "_byte", ".", "hex", "(", ")", ",", "2", ")", ")", "return", "_addr" ]
Read MAC address.
[ "Read", "MAC", "address", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/protocols/link/ethernet.py#L135-L139
1,278
JarryShaw/PyPCAPKit
src/toolkit/pyshark.py
packet2dict
def packet2dict(packet): """Convert PyShark packet into dict.""" dict_ = dict() frame = packet.frame_info for field in frame.field_names: dict_[field] = getattr(frame, field) tempdict = dict_ for layer in packet.layers: tempdict[layer.layer_name.upper()] = dict() tempdict = tempdict[layer.layer_name.upper()] for field in layer.field_names: tempdict[field] = getattr(layer, field) return dict_
python
def packet2dict(packet): dict_ = dict() frame = packet.frame_info for field in frame.field_names: dict_[field] = getattr(frame, field) tempdict = dict_ for layer in packet.layers: tempdict[layer.layer_name.upper()] = dict() tempdict = tempdict[layer.layer_name.upper()] for field in layer.field_names: tempdict[field] = getattr(layer, field) return dict_
[ "def", "packet2dict", "(", "packet", ")", ":", "dict_", "=", "dict", "(", ")", "frame", "=", "packet", ".", "frame_info", "for", "field", "in", "frame", ".", "field_names", ":", "dict_", "[", "field", "]", "=", "getattr", "(", "frame", ",", "field", ")", "tempdict", "=", "dict_", "for", "layer", "in", "packet", ".", "layers", ":", "tempdict", "[", "layer", ".", "layer_name", ".", "upper", "(", ")", "]", "=", "dict", "(", ")", "tempdict", "=", "tempdict", "[", "layer", ".", "layer_name", ".", "upper", "(", ")", "]", "for", "field", "in", "layer", ".", "field_names", ":", "tempdict", "[", "field", "]", "=", "getattr", "(", "layer", ",", "field", ")", "return", "dict_" ]
Convert PyShark packet into dict.
[ "Convert", "PyShark", "packet", "into", "dict", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/toolkit/pyshark.py#L17-L31
1,279
JarryShaw/PyPCAPKit
src/toolkit/scapy.py
packet2chain
def packet2chain(packet): """Fetch Scapy packet protocol chain.""" if scapy_all is None: raise ModuleNotFound("No module named 'scapy'", name='scapy') chain = [packet.name] payload = packet.payload while not isinstance(payload, scapy_all.packet.NoPayload): chain.append(payload.name) payload = payload.payload return ':'.join(chain)
python
def packet2chain(packet): if scapy_all is None: raise ModuleNotFound("No module named 'scapy'", name='scapy') chain = [packet.name] payload = packet.payload while not isinstance(payload, scapy_all.packet.NoPayload): chain.append(payload.name) payload = payload.payload return ':'.join(chain)
[ "def", "packet2chain", "(", "packet", ")", ":", "if", "scapy_all", "is", "None", ":", "raise", "ModuleNotFound", "(", "\"No module named 'scapy'\"", ",", "name", "=", "'scapy'", ")", "chain", "=", "[", "packet", ".", "name", "]", "payload", "=", "packet", ".", "payload", "while", "not", "isinstance", "(", "payload", ",", "scapy_all", ".", "packet", ".", "NoPayload", ")", ":", "chain", ".", "append", "(", "payload", ".", "name", ")", "payload", "=", "payload", ".", "payload", "return", "':'", ".", "join", "(", "chain", ")" ]
Fetch Scapy packet protocol chain.
[ "Fetch", "Scapy", "packet", "protocol", "chain", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/toolkit/scapy.py#L36-L45
1,280
JarryShaw/PyPCAPKit
src/toolkit/scapy.py
packet2dict
def packet2dict(packet, *, count=NotImplemented): """Convert Scapy packet into dict.""" if scapy_all is None: raise ModuleNotFound("No module named 'scapy'", name='scapy') def wrapper(packet): dict_ = packet.fields payload = packet.payload if not isinstance(payload, scapy_all.packet.NoPayload): dict_[payload.name] = wrapper(payload) return dict_ return { 'packet': bytes(packet), packet.name: wrapper(packet), }
python
def packet2dict(packet, *, count=NotImplemented): if scapy_all is None: raise ModuleNotFound("No module named 'scapy'", name='scapy') def wrapper(packet): dict_ = packet.fields payload = packet.payload if not isinstance(payload, scapy_all.packet.NoPayload): dict_[payload.name] = wrapper(payload) return dict_ return { 'packet': bytes(packet), packet.name: wrapper(packet), }
[ "def", "packet2dict", "(", "packet", ",", "*", ",", "count", "=", "NotImplemented", ")", ":", "if", "scapy_all", "is", "None", ":", "raise", "ModuleNotFound", "(", "\"No module named 'scapy'\"", ",", "name", "=", "'scapy'", ")", "def", "wrapper", "(", "packet", ")", ":", "dict_", "=", "packet", ".", "fields", "payload", "=", "packet", ".", "payload", "if", "not", "isinstance", "(", "payload", ",", "scapy_all", ".", "packet", ".", "NoPayload", ")", ":", "dict_", "[", "payload", ".", "name", "]", "=", "wrapper", "(", "payload", ")", "return", "dict_", "return", "{", "'packet'", ":", "bytes", "(", "packet", ")", ",", "packet", ".", "name", ":", "wrapper", "(", "packet", ")", ",", "}" ]
Convert Scapy packet into dict.
[ "Convert", "Scapy", "packet", "into", "dict", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/toolkit/scapy.py#L48-L63
1,281
JarryShaw/PyPCAPKit
src/toolkit/scapy.py
tcp_reassembly
def tcp_reassembly(packet, *, count=NotImplemented): """Store data for TCP reassembly.""" if 'TCP' in packet: ip = packet['IP'] if 'IP' in packet else packet['IPv6'] tcp = packet['TCP'] data = dict( bufid=( ipaddress.ip_address(ip.src), # source IP address ipaddress.ip_address(ip.dst), # destination IP address tcp.sport, # source port tcp.dport, # destination port ), num=count, # original packet range number ack=tcp.ack, # acknowledgement dsn=tcp.seq, # data sequence number syn=bool(tcp.flags.S), # synchronise flag fin=bool(tcp.flags.F), # finish flag rst=bool(tcp.flags.R), # reset connection flag payload=bytearray(bytes(tcp.payload)), # raw bytearray type payload ) raw_len = len(tcp.payload) # payload length, header excludes data['first'] = tcp.seq # this sequence number data['last'] = tcp.seq + raw_len # next (wanted) sequence number data['len'] = raw_len # payload length, header excludes return True, data return False, None
python
def tcp_reassembly(packet, *, count=NotImplemented): if 'TCP' in packet: ip = packet['IP'] if 'IP' in packet else packet['IPv6'] tcp = packet['TCP'] data = dict( bufid=( ipaddress.ip_address(ip.src), # source IP address ipaddress.ip_address(ip.dst), # destination IP address tcp.sport, # source port tcp.dport, # destination port ), num=count, # original packet range number ack=tcp.ack, # acknowledgement dsn=tcp.seq, # data sequence number syn=bool(tcp.flags.S), # synchronise flag fin=bool(tcp.flags.F), # finish flag rst=bool(tcp.flags.R), # reset connection flag payload=bytearray(bytes(tcp.payload)), # raw bytearray type payload ) raw_len = len(tcp.payload) # payload length, header excludes data['first'] = tcp.seq # this sequence number data['last'] = tcp.seq + raw_len # next (wanted) sequence number data['len'] = raw_len # payload length, header excludes return True, data return False, None
[ "def", "tcp_reassembly", "(", "packet", ",", "*", ",", "count", "=", "NotImplemented", ")", ":", "if", "'TCP'", "in", "packet", ":", "ip", "=", "packet", "[", "'IP'", "]", "if", "'IP'", "in", "packet", "else", "packet", "[", "'IPv6'", "]", "tcp", "=", "packet", "[", "'TCP'", "]", "data", "=", "dict", "(", "bufid", "=", "(", "ipaddress", ".", "ip_address", "(", "ip", ".", "src", ")", ",", "# source IP address", "ipaddress", ".", "ip_address", "(", "ip", ".", "dst", ")", ",", "# destination IP address", "tcp", ".", "sport", ",", "# source port", "tcp", ".", "dport", ",", "# destination port", ")", ",", "num", "=", "count", ",", "# original packet range number", "ack", "=", "tcp", ".", "ack", ",", "# acknowledgement", "dsn", "=", "tcp", ".", "seq", ",", "# data sequence number", "syn", "=", "bool", "(", "tcp", ".", "flags", ".", "S", ")", ",", "# synchronise flag", "fin", "=", "bool", "(", "tcp", ".", "flags", ".", "F", ")", ",", "# finish flag", "rst", "=", "bool", "(", "tcp", ".", "flags", ".", "R", ")", ",", "# reset connection flag", "payload", "=", "bytearray", "(", "bytes", "(", "tcp", ".", "payload", ")", ")", ",", "# raw bytearray type payload", ")", "raw_len", "=", "len", "(", "tcp", ".", "payload", ")", "# payload length, header excludes", "data", "[", "'first'", "]", "=", "tcp", ".", "seq", "# this sequence number", "data", "[", "'last'", "]", "=", "tcp", ".", "seq", "+", "raw_len", "# next (wanted) sequence number", "data", "[", "'len'", "]", "=", "raw_len", "# payload length, header excludes", "return", "True", ",", "data", "return", "False", ",", "None" ]
Store data for TCP reassembly.
[ "Store", "data", "for", "TCP", "reassembly", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/toolkit/scapy.py#L119-L144
1,282
JarryShaw/PyPCAPKit
src/protocols/internet/hopopt.py
HOPOPT.read_hopopt
def read_hopopt(self, length, extension): """Read IPv6 Hop-by-Hop Options. Structure of HOPOPT header [RFC 8200]: +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Next Header | Hdr Ext Len | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | | . . . Options . . . | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Octets Bits Name Description 0 0 hopopt.next Next Header 1 8 hopopt.length Header Extensive Length 2 16 hopopt.options Options """ if length is None: length = len(self) _next = self._read_protos(1) _hlen = self._read_unpack(1) # _opts = self._read_fileng(_hlen*8+6) hopopt = dict( next=_next, length=(_hlen + 1) * 8, ) options = self._read_hopopt_options(_hlen * 8 + 6) hopopt['options'] = options[0] # tuple of option acronyms hopopt.update(options[1]) # merge option info to buffer length -= hopopt['length'] hopopt['packet'] = self._read_packet(header=hopopt['length'], payload=length) if extension: self._protos = None return hopopt return self._decode_next_layer(hopopt, _next, length)
python
def read_hopopt(self, length, extension): if length is None: length = len(self) _next = self._read_protos(1) _hlen = self._read_unpack(1) # _opts = self._read_fileng(_hlen*8+6) hopopt = dict( next=_next, length=(_hlen + 1) * 8, ) options = self._read_hopopt_options(_hlen * 8 + 6) hopopt['options'] = options[0] # tuple of option acronyms hopopt.update(options[1]) # merge option info to buffer length -= hopopt['length'] hopopt['packet'] = self._read_packet(header=hopopt['length'], payload=length) if extension: self._protos = None return hopopt return self._decode_next_layer(hopopt, _next, length)
[ "def", "read_hopopt", "(", "self", ",", "length", ",", "extension", ")", ":", "if", "length", "is", "None", ":", "length", "=", "len", "(", "self", ")", "_next", "=", "self", ".", "_read_protos", "(", "1", ")", "_hlen", "=", "self", ".", "_read_unpack", "(", "1", ")", "# _opts = self._read_fileng(_hlen*8+6)", "hopopt", "=", "dict", "(", "next", "=", "_next", ",", "length", "=", "(", "_hlen", "+", "1", ")", "*", "8", ",", ")", "options", "=", "self", ".", "_read_hopopt_options", "(", "_hlen", "*", "8", "+", "6", ")", "hopopt", "[", "'options'", "]", "=", "options", "[", "0", "]", "# tuple of option acronyms", "hopopt", ".", "update", "(", "options", "[", "1", "]", ")", "# merge option info to buffer", "length", "-=", "hopopt", "[", "'length'", "]", "hopopt", "[", "'packet'", "]", "=", "self", ".", "_read_packet", "(", "header", "=", "hopopt", "[", "'length'", "]", ",", "payload", "=", "length", ")", "if", "extension", ":", "self", ".", "_protos", "=", "None", "return", "hopopt", "return", "self", ".", "_decode_next_layer", "(", "hopopt", ",", "_next", ",", "length", ")" ]
Read IPv6 Hop-by-Hop Options. Structure of HOPOPT header [RFC 8200]: +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Next Header | Hdr Ext Len | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | | . . . Options . . . | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Octets Bits Name Description 0 0 hopopt.next Next Header 1 8 hopopt.length Header Extensive Length 2 16 hopopt.options Options
[ "Read", "IPv6", "Hop", "-", "by", "-", "Hop", "Options", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/protocols/internet/hopopt.py#L147-L189
1,283
JarryShaw/PyPCAPKit
src/protocols/internet/hopopt.py
HOPOPT._read_hopopt_options
def _read_hopopt_options(self, length): """Read HOPOPT options. Positional arguments: * length -- int, length of options Returns: * dict -- extracted HOPOPT options """ counter = 0 # length of read options optkind = list() # option type list options = dict() # dict of option data while counter < length: # break when eol triggered code = self._read_unpack(1) if not code: break # extract parameter abbr, desc = _HOPOPT_OPT.get(code, ('none', 'Unassigned')) data = _HOPOPT_PROC(abbr)(self, code, desc=desc) enum = _OPT_TYPE.get(code) # record parameter data counter += data['length'] if enum in optkind: if isinstance(options[abbr], tuple): options[abbr] += (Info(data),) else: options[abbr] = (Info(options[abbr]), Info(data)) else: optkind.append(enum) options[abbr] = data # check threshold if counter != length: raise ProtocolError(f'{self.alias}: invalid format') return tuple(optkind), options
python
def _read_hopopt_options(self, length): counter = 0 # length of read options optkind = list() # option type list options = dict() # dict of option data while counter < length: # break when eol triggered code = self._read_unpack(1) if not code: break # extract parameter abbr, desc = _HOPOPT_OPT.get(code, ('none', 'Unassigned')) data = _HOPOPT_PROC(abbr)(self, code, desc=desc) enum = _OPT_TYPE.get(code) # record parameter data counter += data['length'] if enum in optkind: if isinstance(options[abbr], tuple): options[abbr] += (Info(data),) else: options[abbr] = (Info(options[abbr]), Info(data)) else: optkind.append(enum) options[abbr] = data # check threshold if counter != length: raise ProtocolError(f'{self.alias}: invalid format') return tuple(optkind), options
[ "def", "_read_hopopt_options", "(", "self", ",", "length", ")", ":", "counter", "=", "0", "# length of read options", "optkind", "=", "list", "(", ")", "# option type list", "options", "=", "dict", "(", ")", "# dict of option data", "while", "counter", "<", "length", ":", "# break when eol triggered", "code", "=", "self", ".", "_read_unpack", "(", "1", ")", "if", "not", "code", ":", "break", "# extract parameter", "abbr", ",", "desc", "=", "_HOPOPT_OPT", ".", "get", "(", "code", ",", "(", "'none'", ",", "'Unassigned'", ")", ")", "data", "=", "_HOPOPT_PROC", "(", "abbr", ")", "(", "self", ",", "code", ",", "desc", "=", "desc", ")", "enum", "=", "_OPT_TYPE", ".", "get", "(", "code", ")", "# record parameter data", "counter", "+=", "data", "[", "'length'", "]", "if", "enum", "in", "optkind", ":", "if", "isinstance", "(", "options", "[", "abbr", "]", ",", "tuple", ")", ":", "options", "[", "abbr", "]", "+=", "(", "Info", "(", "data", ")", ",", ")", "else", ":", "options", "[", "abbr", "]", "=", "(", "Info", "(", "options", "[", "abbr", "]", ")", ",", "Info", "(", "data", ")", ")", "else", ":", "optkind", ".", "append", "(", "enum", ")", "options", "[", "abbr", "]", "=", "data", "# check threshold", "if", "counter", "!=", "length", ":", "raise", "ProtocolError", "(", "f'{self.alias}: invalid format'", ")", "return", "tuple", "(", "optkind", ")", ",", "options" ]
Read HOPOPT options. Positional arguments: * length -- int, length of options Returns: * dict -- extracted HOPOPT options
[ "Read", "HOPOPT", "options", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/protocols/internet/hopopt.py#L234-L274
1,284
JarryShaw/PyPCAPKit
src/protocols/internet/hopopt.py
HOPOPT._read_opt_pad
def _read_opt_pad(self, code, *, desc): """Read HOPOPT padding options. Structure of HOPOPT padding options [RFC 8200]: * Pad1 Option: +-+-+-+-+-+-+-+-+ | 0 | +-+-+-+-+-+-+-+-+ Octets Bits Name Description 0 0 hopopt.pad.type Option Type 0 0 hopopt.pad.type.value Option Number 0 0 hopopt.pad.type.action Action (00) 0 2 hopopt.pad.type.change Change Flag (0) * PadN Option: +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+- - - - - - - - - | 1 | Opt Data Len | Option Data +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+- - - - - - - - - Octets Bits Name Description 0 0 hopopt.pad.type Option Type 0 0 hopopt.pad.type.value Option Number 0 0 hopopt.pad.type.action Action (00) 0 2 hopopt.pad.type.change Change Flag (0) 1 8 hopopt.opt.length Length of Option Data 2 16 hopopt.pad.padding Padding """ _type = self._read_opt_type(code) if code == 0: opt = dict( desc=desc, type=_type, length=1, ) elif code == 1: _size = self._read_unpack(1) _padn = self._read_fileng(_size) opt = dict( desc=desc, type=_type, length=_size + 2, padding=_padn, ) else: raise ProtocolError(f'{self.alias}: [Optno {code}] invalid format') return opt
python
def _read_opt_pad(self, code, *, desc): _type = self._read_opt_type(code) if code == 0: opt = dict( desc=desc, type=_type, length=1, ) elif code == 1: _size = self._read_unpack(1) _padn = self._read_fileng(_size) opt = dict( desc=desc, type=_type, length=_size + 2, padding=_padn, ) else: raise ProtocolError(f'{self.alias}: [Optno {code}] invalid format') return opt
[ "def", "_read_opt_pad", "(", "self", ",", "code", ",", "*", ",", "desc", ")", ":", "_type", "=", "self", ".", "_read_opt_type", "(", "code", ")", "if", "code", "==", "0", ":", "opt", "=", "dict", "(", "desc", "=", "desc", ",", "type", "=", "_type", ",", "length", "=", "1", ",", ")", "elif", "code", "==", "1", ":", "_size", "=", "self", ".", "_read_unpack", "(", "1", ")", "_padn", "=", "self", ".", "_read_fileng", "(", "_size", ")", "opt", "=", "dict", "(", "desc", "=", "desc", ",", "type", "=", "_type", ",", "length", "=", "_size", "+", "2", ",", "padding", "=", "_padn", ",", ")", "else", ":", "raise", "ProtocolError", "(", "f'{self.alias}: [Optno {code}] invalid format'", ")", "return", "opt" ]
Read HOPOPT padding options. Structure of HOPOPT padding options [RFC 8200]: * Pad1 Option: +-+-+-+-+-+-+-+-+ | 0 | +-+-+-+-+-+-+-+-+ Octets Bits Name Description 0 0 hopopt.pad.type Option Type 0 0 hopopt.pad.type.value Option Number 0 0 hopopt.pad.type.action Action (00) 0 2 hopopt.pad.type.change Change Flag (0) * PadN Option: +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+- - - - - - - - - | 1 | Opt Data Len | Option Data +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+- - - - - - - - - Octets Bits Name Description 0 0 hopopt.pad.type Option Type 0 0 hopopt.pad.type.value Option Number 0 0 hopopt.pad.type.action Action (00) 0 2 hopopt.pad.type.change Change Flag (0) 1 8 hopopt.opt.length Length of Option Data 2 16 hopopt.pad.padding Padding
[ "Read", "HOPOPT", "padding", "options", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/protocols/internet/hopopt.py#L306-L356
1,285
JarryShaw/PyPCAPKit
src/protocols/internet/hopopt.py
HOPOPT._read_opt_tun
def _read_opt_tun(self, code, *, desc): """Read HOPOPT Tunnel Encapsulation Limit option. Structure of HOPOPT Tunnel Encapsulation Limit option [RFC 2473]: +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Next Header |Hdr Ext Len = 0| Opt Type = 4 |Opt Data Len=1 | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Tun Encap Lim |PadN Opt Type=1|Opt Data Len=1 | 0 | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Octets Bits Name Description 0 0 hopopt.tun.type Option Type 0 0 hopopt.tun.type.value Option Number 0 0 hopopt.tun.type.action Action (00) 0 2 hopopt.tun.type.change Change Flag (0) 1 8 hopopt.tun.length Length of Option Data 2 16 hopopt.tun.limit Tunnel Encapsulation Limit """ _type = self._read_opt_type(code) _size = self._read_unpack(1) if _size != 1: raise ProtocolError(f'{self.alias}: [Optno {code}] invalid format') _limt = self._read_unpack(1) opt = dict( desc=desc, type=_type, length=_size + 2, limit=_limt, ) return opt
python
def _read_opt_tun(self, code, *, desc): _type = self._read_opt_type(code) _size = self._read_unpack(1) if _size != 1: raise ProtocolError(f'{self.alias}: [Optno {code}] invalid format') _limt = self._read_unpack(1) opt = dict( desc=desc, type=_type, length=_size + 2, limit=_limt, ) return opt
[ "def", "_read_opt_tun", "(", "self", ",", "code", ",", "*", ",", "desc", ")", ":", "_type", "=", "self", ".", "_read_opt_type", "(", "code", ")", "_size", "=", "self", ".", "_read_unpack", "(", "1", ")", "if", "_size", "!=", "1", ":", "raise", "ProtocolError", "(", "f'{self.alias}: [Optno {code}] invalid format'", ")", "_limt", "=", "self", ".", "_read_unpack", "(", "1", ")", "opt", "=", "dict", "(", "desc", "=", "desc", ",", "type", "=", "_type", ",", "length", "=", "_size", "+", "2", ",", "limit", "=", "_limt", ",", ")", "return", "opt" ]
Read HOPOPT Tunnel Encapsulation Limit option. Structure of HOPOPT Tunnel Encapsulation Limit option [RFC 2473]: +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Next Header |Hdr Ext Len = 0| Opt Type = 4 |Opt Data Len=1 | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Tun Encap Lim |PadN Opt Type=1|Opt Data Len=1 | 0 | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Octets Bits Name Description 0 0 hopopt.tun.type Option Type 0 0 hopopt.tun.type.value Option Number 0 0 hopopt.tun.type.action Action (00) 0 2 hopopt.tun.type.change Change Flag (0) 1 8 hopopt.tun.length Length of Option Data 2 16 hopopt.tun.limit Tunnel Encapsulation Limit
[ "Read", "HOPOPT", "Tunnel", "Encapsulation", "Limit", "option", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/protocols/internet/hopopt.py#L358-L390
1,286
JarryShaw/PyPCAPKit
src/protocols/internet/hopopt.py
HOPOPT._read_opt_ra
def _read_opt_ra(self, code, *, desc): """Read HOPOPT Router Alert option. Structure of HOPOPT Router Alert option [RFC 2711]: +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |0 0 0|0 0 1 0 1|0 0 0 0 0 0 1 0| Value (2 octets) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Octets Bits Name Description 0 0 hopopt.ra.type Option Type 0 0 hopopt.ra.type.value Option Number 0 0 hopopt.ra.type.action Action (00) 0 2 hopopt.ra.type.change Change Flag (0) 1 8 hopopt.opt.length Length of Option Data 2 16 hopopt.ra.value Value """ _type = self._read_opt_type(code) _size = self._read_unpack(1) if _size != 2: raise ProtocolError(f'{self.alias}: [Optno {code}] invalid format') _rval = self._read_unpack(2) if 4 <= _rval <= 35: _dscp = f'Aggregated Reservation Nesting Level {_rval-4}' # [RFC 3175] elif 36 <= _rval <= 67: _dscp = f'QoS NSLP Aggregation Level {_rval-36}' # [RFC 5974] elif 65503 <= _rval <= 65534: _dscp = 'Reserved for experimental use' # [RFC 5350] else: _dscp = _ROUTER_ALERT.get(_rval, 'Unassigned') opt = dict( desc=desc, type=_type, length=_size + 2, value=_rval, alert=_dscp, ) return opt
python
def _read_opt_ra(self, code, *, desc): _type = self._read_opt_type(code) _size = self._read_unpack(1) if _size != 2: raise ProtocolError(f'{self.alias}: [Optno {code}] invalid format') _rval = self._read_unpack(2) if 4 <= _rval <= 35: _dscp = f'Aggregated Reservation Nesting Level {_rval-4}' # [RFC 3175] elif 36 <= _rval <= 67: _dscp = f'QoS NSLP Aggregation Level {_rval-36}' # [RFC 5974] elif 65503 <= _rval <= 65534: _dscp = 'Reserved for experimental use' # [RFC 5350] else: _dscp = _ROUTER_ALERT.get(_rval, 'Unassigned') opt = dict( desc=desc, type=_type, length=_size + 2, value=_rval, alert=_dscp, ) return opt
[ "def", "_read_opt_ra", "(", "self", ",", "code", ",", "*", ",", "desc", ")", ":", "_type", "=", "self", ".", "_read_opt_type", "(", "code", ")", "_size", "=", "self", ".", "_read_unpack", "(", "1", ")", "if", "_size", "!=", "2", ":", "raise", "ProtocolError", "(", "f'{self.alias}: [Optno {code}] invalid format'", ")", "_rval", "=", "self", ".", "_read_unpack", "(", "2", ")", "if", "4", "<=", "_rval", "<=", "35", ":", "_dscp", "=", "f'Aggregated Reservation Nesting Level {_rval-4}'", "# [RFC 3175]", "elif", "36", "<=", "_rval", "<=", "67", ":", "_dscp", "=", "f'QoS NSLP Aggregation Level {_rval-36}'", "# [RFC 5974]", "elif", "65503", "<=", "_rval", "<=", "65534", ":", "_dscp", "=", "'Reserved for experimental use'", "# [RFC 5350]", "else", ":", "_dscp", "=", "_ROUTER_ALERT", ".", "get", "(", "_rval", ",", "'Unassigned'", ")", "opt", "=", "dict", "(", "desc", "=", "desc", ",", "type", "=", "_type", ",", "length", "=", "_size", "+", "2", ",", "value", "=", "_rval", ",", "alert", "=", "_dscp", ",", ")", "return", "opt" ]
Read HOPOPT Router Alert option. Structure of HOPOPT Router Alert option [RFC 2711]: +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |0 0 0|0 0 1 0 1|0 0 0 0 0 0 1 0| Value (2 octets) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Octets Bits Name Description 0 0 hopopt.ra.type Option Type 0 0 hopopt.ra.type.value Option Number 0 0 hopopt.ra.type.action Action (00) 0 2 hopopt.ra.type.change Change Flag (0) 1 8 hopopt.opt.length Length of Option Data 2 16 hopopt.ra.value Value
[ "Read", "HOPOPT", "Router", "Alert", "option", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/protocols/internet/hopopt.py#L392-L432
1,287
JarryShaw/PyPCAPKit
src/protocols/internet/hopopt.py
HOPOPT._read_opt_calipso
def _read_opt_calipso(self, code, *, desc): """Read HOPOPT CALIPSO option. Structure of HOPOPT CALIPSO option [RFC 5570]: ------------------------------------------------------------ | Next Header | Hdr Ext Len | Option Type | Option Length| +-------------+---------------+-------------+--------------+ | CALIPSO Domain of Interpretation | +-------------+---------------+-------------+--------------+ | Cmpt Length | Sens Level | Checksum (CRC-16) | +-------------+---------------+-------------+--------------+ | Compartment Bitmap (Optional; variable length) | +-------------+---------------+-------------+--------------+ Octets Bits Name Description 0 0 hopopt.calipso.type Option Type 0 0 hopopt.calipso.type.value Option Number 0 0 hopopt.calipso.type.action Action (00) 0 2 hopopt.calipso.type.change Change Flag (0) 1 8 hopopt.calipso.length Length of Option Data 2 16 hopopt.calipso.domain CALIPSO Domain of Interpretation 6 48 hopopt.calipso.cmpt_len Cmpt Length 7 56 hopopt.calipso.level Sens Level 8 64 hopopt.calipso.chksum Checksum (CRC-16) 9 72 hopopt.calipso.bitmap Compartment Bitmap """ _type = self._read_opt_type(code) _size = self._read_unpack(1) if _size < 8 and _size % 8 != 0: raise ProtocolError(f'{self.alias}: [Optno {code}] invalid format') _cmpt = self._read_unpack(4) _clen = self._read_unpack(1) if _clen % 2 != 0: raise ProtocolError(f'{self.alias}: [Optno {code}] invalid format') _sens = self._read_unpack(1) _csum = self._read_fileng(2) opt = dict( desc=desc, type=_type, length=_size + 2, domain=_cmpt, cmpt_len=_clen * 4, level=_sens, chksum=_csum, ) if _clen: _bmap = list() for _ in range(_clen // 2): _bmap.append(self._read_binary(8)) opt['bitmap'] = tuple(_bmap) _plen = _size - _clen * 4 - 8 if _plen: self._read_fileng(_plen) return opt
python
def _read_opt_calipso(self, code, *, desc): _type = self._read_opt_type(code) _size = self._read_unpack(1) if _size < 8 and _size % 8 != 0: raise ProtocolError(f'{self.alias}: [Optno {code}] invalid format') _cmpt = self._read_unpack(4) _clen = self._read_unpack(1) if _clen % 2 != 0: raise ProtocolError(f'{self.alias}: [Optno {code}] invalid format') _sens = self._read_unpack(1) _csum = self._read_fileng(2) opt = dict( desc=desc, type=_type, length=_size + 2, domain=_cmpt, cmpt_len=_clen * 4, level=_sens, chksum=_csum, ) if _clen: _bmap = list() for _ in range(_clen // 2): _bmap.append(self._read_binary(8)) opt['bitmap'] = tuple(_bmap) _plen = _size - _clen * 4 - 8 if _plen: self._read_fileng(_plen) return opt
[ "def", "_read_opt_calipso", "(", "self", ",", "code", ",", "*", ",", "desc", ")", ":", "_type", "=", "self", ".", "_read_opt_type", "(", "code", ")", "_size", "=", "self", ".", "_read_unpack", "(", "1", ")", "if", "_size", "<", "8", "and", "_size", "%", "8", "!=", "0", ":", "raise", "ProtocolError", "(", "f'{self.alias}: [Optno {code}] invalid format'", ")", "_cmpt", "=", "self", ".", "_read_unpack", "(", "4", ")", "_clen", "=", "self", ".", "_read_unpack", "(", "1", ")", "if", "_clen", "%", "2", "!=", "0", ":", "raise", "ProtocolError", "(", "f'{self.alias}: [Optno {code}] invalid format'", ")", "_sens", "=", "self", ".", "_read_unpack", "(", "1", ")", "_csum", "=", "self", ".", "_read_fileng", "(", "2", ")", "opt", "=", "dict", "(", "desc", "=", "desc", ",", "type", "=", "_type", ",", "length", "=", "_size", "+", "2", ",", "domain", "=", "_cmpt", ",", "cmpt_len", "=", "_clen", "*", "4", ",", "level", "=", "_sens", ",", "chksum", "=", "_csum", ",", ")", "if", "_clen", ":", "_bmap", "=", "list", "(", ")", "for", "_", "in", "range", "(", "_clen", "//", "2", ")", ":", "_bmap", ".", "append", "(", "self", ".", "_read_binary", "(", "8", ")", ")", "opt", "[", "'bitmap'", "]", "=", "tuple", "(", "_bmap", ")", "_plen", "=", "_size", "-", "_clen", "*", "4", "-", "8", "if", "_plen", ":", "self", ".", "_read_fileng", "(", "_plen", ")", "return", "opt" ]
Read HOPOPT CALIPSO option. Structure of HOPOPT CALIPSO option [RFC 5570]: ------------------------------------------------------------ | Next Header | Hdr Ext Len | Option Type | Option Length| +-------------+---------------+-------------+--------------+ | CALIPSO Domain of Interpretation | +-------------+---------------+-------------+--------------+ | Cmpt Length | Sens Level | Checksum (CRC-16) | +-------------+---------------+-------------+--------------+ | Compartment Bitmap (Optional; variable length) | +-------------+---------------+-------------+--------------+ Octets Bits Name Description 0 0 hopopt.calipso.type Option Type 0 0 hopopt.calipso.type.value Option Number 0 0 hopopt.calipso.type.action Action (00) 0 2 hopopt.calipso.type.change Change Flag (0) 1 8 hopopt.calipso.length Length of Option Data 2 16 hopopt.calipso.domain CALIPSO Domain of Interpretation 6 48 hopopt.calipso.cmpt_len Cmpt Length 7 56 hopopt.calipso.level Sens Level 8 64 hopopt.calipso.chksum Checksum (CRC-16) 9 72 hopopt.calipso.bitmap Compartment Bitmap
[ "Read", "HOPOPT", "CALIPSO", "option", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/protocols/internet/hopopt.py#L434-L492
1,288
JarryShaw/PyPCAPKit
src/protocols/internet/hopopt.py
HOPOPT._read_opt_smf_dpd
def _read_opt_smf_dpd(self, code, *, desc): """Read HOPOPT SMF_DPD option. Structure of HOPOPT SMF_DPD option [RFC 5570]: * IPv6 SMF_DPD Option Header in I-DPD mode 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ... |0|0|0| 01000 | Opt. Data Len | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |0|TidTy| TidLen| TaggerId (optional) ... | +-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | Identifier ... +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Octets Bits Name Description 0 0 hopopt.smf_dpd.type Option Type 0 0 hopopt.smf_dpd.type.value Option Number 0 0 hopopt.smf_dpd.type.action Action (00) 0 2 hopopt.smf_dpd.type.change Change Flag (0) 1 8 hopopt.smf_dpd.length Length of Option Data 2 16 hopopt.smf_dpd.dpd_type DPD Type (0) 2 17 hopopt.smf_dpd.tid_type TaggerID Type 2 20 hopopt.smf_dpd.tid_len TaggerID Length 3 24 hopopt.smf_dpd.tid TaggerID ? ? hopopt.smf_dpd.id Identifier * IPv6 SMF_DPD Option Header in H-DPD Mode 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ... |0|0|0| OptType | Opt. Data Len | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |1| Hash Assist Value (HAV) ... +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Octets Bits Name Description 0 0 hopopt.smf_dpd.type Option Type 0 0 hopopt.smf_dpd.type.value Option Number 0 0 hopopt.smf_dpd.type.action Action (00) 0 2 hopopt.smf_dpd.type.change Change Flag (0) 1 8 hopopt.smf_dpd.length Length of Option Data 2 16 hopopt.smf_dpd.dpd_type DPD Type (1) 2 17 hopopt.smf_dpd.hav Hash Assist Value """ _type = self._read_opt_type(code) _size = self._read_unpack(1) _tidd = self._read_binary(1) if _tidd[0] == '0': _mode = 'I-DPD' _tidt = _TID_TYPE.get(_tidd[1:4], 'Unassigned') _tidl = int(_tidd[4:], base=2) if _tidt == 'NULL': if _tidl != 0: raise ProtocolError(f'{self.alias}: [Optno {code}] invalid format') _iden = self._read_fileng(_size-1) opt = dict( desc=desc, type=_type, length=_size + 2, dpd_type=_mode, tid_type=_tidt, tid_len=_tidl, id=_iden, ) elif _tidt == 'IPv4': if _tidl != 3: raise ProtocolError(f'{self.alias}: [Optno {code}] invalid format') _tidf = self._read_fileng(4) _iden = self._read_fileng(_size-4) opt = dict( desc=desc, type=_type, length=_size + 2, dpd_type=_mode, tid_type=_tidt, tid_len=_tidl, tid=ipaddress.ip_address(_tidf), id=_iden, ) elif _tidt == 'IPv6': if _tidl != 15: raise ProtocolError(f'{self.alias}: [Optno {code}] invalid format') _tidf = self._read_fileng(15) _iden = self._read_fileng(_size-15) opt = dict( desc=desc, type=_type, length=_size + 2, dpd_type=_mode, tid_type=_tidt, tid_len=_tidl, tid=ipaddress.ip_address(_tidf), id=_iden, ) else: _tidf = self._read_unpack(_tidl+1) _iden = self._read_fileng(_size-_tidl-2) opt = dict( desc=desc, type=_type, length=_size + 2, dpd_type=_mode, tid_type=_tidt, tid_len=_tidl, tid=_tidf, id=_iden, ) elif _tidd[0] == '1': _data = self._read_binary(_size-1) opt = dict( desc=desc, type=_type, length=_size + 2, dpd_type=_mode, tid_type=_tidt, hav=_tidd[1:] + _data, ) else: raise ProtocolError(f'{self.alias}: [Optno {code}] invalid format') return opt
python
def _read_opt_smf_dpd(self, code, *, desc): _type = self._read_opt_type(code) _size = self._read_unpack(1) _tidd = self._read_binary(1) if _tidd[0] == '0': _mode = 'I-DPD' _tidt = _TID_TYPE.get(_tidd[1:4], 'Unassigned') _tidl = int(_tidd[4:], base=2) if _tidt == 'NULL': if _tidl != 0: raise ProtocolError(f'{self.alias}: [Optno {code}] invalid format') _iden = self._read_fileng(_size-1) opt = dict( desc=desc, type=_type, length=_size + 2, dpd_type=_mode, tid_type=_tidt, tid_len=_tidl, id=_iden, ) elif _tidt == 'IPv4': if _tidl != 3: raise ProtocolError(f'{self.alias}: [Optno {code}] invalid format') _tidf = self._read_fileng(4) _iden = self._read_fileng(_size-4) opt = dict( desc=desc, type=_type, length=_size + 2, dpd_type=_mode, tid_type=_tidt, tid_len=_tidl, tid=ipaddress.ip_address(_tidf), id=_iden, ) elif _tidt == 'IPv6': if _tidl != 15: raise ProtocolError(f'{self.alias}: [Optno {code}] invalid format') _tidf = self._read_fileng(15) _iden = self._read_fileng(_size-15) opt = dict( desc=desc, type=_type, length=_size + 2, dpd_type=_mode, tid_type=_tidt, tid_len=_tidl, tid=ipaddress.ip_address(_tidf), id=_iden, ) else: _tidf = self._read_unpack(_tidl+1) _iden = self._read_fileng(_size-_tidl-2) opt = dict( desc=desc, type=_type, length=_size + 2, dpd_type=_mode, tid_type=_tidt, tid_len=_tidl, tid=_tidf, id=_iden, ) elif _tidd[0] == '1': _data = self._read_binary(_size-1) opt = dict( desc=desc, type=_type, length=_size + 2, dpd_type=_mode, tid_type=_tidt, hav=_tidd[1:] + _data, ) else: raise ProtocolError(f'{self.alias}: [Optno {code}] invalid format') return opt
[ "def", "_read_opt_smf_dpd", "(", "self", ",", "code", ",", "*", ",", "desc", ")", ":", "_type", "=", "self", ".", "_read_opt_type", "(", "code", ")", "_size", "=", "self", ".", "_read_unpack", "(", "1", ")", "_tidd", "=", "self", ".", "_read_binary", "(", "1", ")", "if", "_tidd", "[", "0", "]", "==", "'0'", ":", "_mode", "=", "'I-DPD'", "_tidt", "=", "_TID_TYPE", ".", "get", "(", "_tidd", "[", "1", ":", "4", "]", ",", "'Unassigned'", ")", "_tidl", "=", "int", "(", "_tidd", "[", "4", ":", "]", ",", "base", "=", "2", ")", "if", "_tidt", "==", "'NULL'", ":", "if", "_tidl", "!=", "0", ":", "raise", "ProtocolError", "(", "f'{self.alias}: [Optno {code}] invalid format'", ")", "_iden", "=", "self", ".", "_read_fileng", "(", "_size", "-", "1", ")", "opt", "=", "dict", "(", "desc", "=", "desc", ",", "type", "=", "_type", ",", "length", "=", "_size", "+", "2", ",", "dpd_type", "=", "_mode", ",", "tid_type", "=", "_tidt", ",", "tid_len", "=", "_tidl", ",", "id", "=", "_iden", ",", ")", "elif", "_tidt", "==", "'IPv4'", ":", "if", "_tidl", "!=", "3", ":", "raise", "ProtocolError", "(", "f'{self.alias}: [Optno {code}] invalid format'", ")", "_tidf", "=", "self", ".", "_read_fileng", "(", "4", ")", "_iden", "=", "self", ".", "_read_fileng", "(", "_size", "-", "4", ")", "opt", "=", "dict", "(", "desc", "=", "desc", ",", "type", "=", "_type", ",", "length", "=", "_size", "+", "2", ",", "dpd_type", "=", "_mode", ",", "tid_type", "=", "_tidt", ",", "tid_len", "=", "_tidl", ",", "tid", "=", "ipaddress", ".", "ip_address", "(", "_tidf", ")", ",", "id", "=", "_iden", ",", ")", "elif", "_tidt", "==", "'IPv6'", ":", "if", "_tidl", "!=", "15", ":", "raise", "ProtocolError", "(", "f'{self.alias}: [Optno {code}] invalid format'", ")", "_tidf", "=", "self", ".", "_read_fileng", "(", "15", ")", "_iden", "=", "self", ".", "_read_fileng", "(", "_size", "-", "15", ")", "opt", "=", "dict", "(", "desc", "=", "desc", ",", "type", "=", "_type", ",", "length", "=", "_size", "+", "2", ",", "dpd_type", "=", "_mode", ",", "tid_type", "=", "_tidt", ",", "tid_len", "=", "_tidl", ",", "tid", "=", "ipaddress", ".", "ip_address", "(", "_tidf", ")", ",", "id", "=", "_iden", ",", ")", "else", ":", "_tidf", "=", "self", ".", "_read_unpack", "(", "_tidl", "+", "1", ")", "_iden", "=", "self", ".", "_read_fileng", "(", "_size", "-", "_tidl", "-", "2", ")", "opt", "=", "dict", "(", "desc", "=", "desc", ",", "type", "=", "_type", ",", "length", "=", "_size", "+", "2", ",", "dpd_type", "=", "_mode", ",", "tid_type", "=", "_tidt", ",", "tid_len", "=", "_tidl", ",", "tid", "=", "_tidf", ",", "id", "=", "_iden", ",", ")", "elif", "_tidd", "[", "0", "]", "==", "'1'", ":", "_data", "=", "self", ".", "_read_binary", "(", "_size", "-", "1", ")", "opt", "=", "dict", "(", "desc", "=", "desc", ",", "type", "=", "_type", ",", "length", "=", "_size", "+", "2", ",", "dpd_type", "=", "_mode", ",", "tid_type", "=", "_tidt", ",", "hav", "=", "_tidd", "[", "1", ":", "]", "+", "_data", ",", ")", "else", ":", "raise", "ProtocolError", "(", "f'{self.alias}: [Optno {code}] invalid format'", ")", "return", "opt" ]
Read HOPOPT SMF_DPD option. Structure of HOPOPT SMF_DPD option [RFC 5570]: * IPv6 SMF_DPD Option Header in I-DPD mode 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ... |0|0|0| 01000 | Opt. Data Len | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |0|TidTy| TidLen| TaggerId (optional) ... | +-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | Identifier ... +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Octets Bits Name Description 0 0 hopopt.smf_dpd.type Option Type 0 0 hopopt.smf_dpd.type.value Option Number 0 0 hopopt.smf_dpd.type.action Action (00) 0 2 hopopt.smf_dpd.type.change Change Flag (0) 1 8 hopopt.smf_dpd.length Length of Option Data 2 16 hopopt.smf_dpd.dpd_type DPD Type (0) 2 17 hopopt.smf_dpd.tid_type TaggerID Type 2 20 hopopt.smf_dpd.tid_len TaggerID Length 3 24 hopopt.smf_dpd.tid TaggerID ? ? hopopt.smf_dpd.id Identifier * IPv6 SMF_DPD Option Header in H-DPD Mode 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ... |0|0|0| OptType | Opt. Data Len | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |1| Hash Assist Value (HAV) ... +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Octets Bits Name Description 0 0 hopopt.smf_dpd.type Option Type 0 0 hopopt.smf_dpd.type.value Option Number 0 0 hopopt.smf_dpd.type.action Action (00) 0 2 hopopt.smf_dpd.type.change Change Flag (0) 1 8 hopopt.smf_dpd.length Length of Option Data 2 16 hopopt.smf_dpd.dpd_type DPD Type (1) 2 17 hopopt.smf_dpd.hav Hash Assist Value
[ "Read", "HOPOPT", "SMF_DPD", "option", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/protocols/internet/hopopt.py#L494-L622
1,289
JarryShaw/PyPCAPKit
src/protocols/internet/hopopt.py
HOPOPT._read_opt_pdm
def _read_opt_pdm(self, code, *, desc): """Read HOPOPT PDM option. Structure of HOPOPT PDM option [RFC 8250]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Option Type | Option Length | ScaleDTLR | ScaleDTLS | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | PSN This Packet | PSN Last Received | |-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Delta Time Last Received | Delta Time Last Sent | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Octets Bits Name Description 0 0 hopopt.pdm.type Option Type 0 0 hopopt.pdm.type.value Option Number 0 0 hopopt.pdm.type.action Action (00) 0 2 hopopt.pdm.type.change Change Flag (0) 1 8 hopopt.pdm.length Length of Option Data 2 16 hopopt.pdm.scaledtlr Scale Delta Time Last Received 3 24 hopopt.pdm.scaledtls Scale Delta Time Last Sent 4 32 hopopt.pdm.psntp Packet Sequence Number This Packet 6 48 hopopt.pdm.psnlr Packet Sequence Number Last Received 8 64 hopopt.pdm.deltatlr Delta Time Last Received 10 80 hopopt.pdm.deltatls Delta Time Last Sent """ _type = self._read_opt_type(code) _size = self._read_unpack(1) if _size != 10: raise ProtocolError(f'{self.alias}: [Optno {code}] invalid format') _stlr = self._read_unpack(1) _stls = self._read_unpack(1) _psnt = self._read_unpack(2) _psnl = self._read_unpack(2) _dtlr = self._read_unpack(2) _dtls = self._read_unpack(2) opt = dict( desc=desc, type=_type, length=_size + 2, scaledtlr=datetime.timedelta(seconds=_stlr), scaledtls=datetime.timedelta(seconds=_stls), psntp=_psnt, psnlr=_psnl, deltatlr=datetime.timedelta(seconds=_dtlr), deltatls=datetime.timedelta(seconds=_dtls), ) return opt
python
def _read_opt_pdm(self, code, *, desc): _type = self._read_opt_type(code) _size = self._read_unpack(1) if _size != 10: raise ProtocolError(f'{self.alias}: [Optno {code}] invalid format') _stlr = self._read_unpack(1) _stls = self._read_unpack(1) _psnt = self._read_unpack(2) _psnl = self._read_unpack(2) _dtlr = self._read_unpack(2) _dtls = self._read_unpack(2) opt = dict( desc=desc, type=_type, length=_size + 2, scaledtlr=datetime.timedelta(seconds=_stlr), scaledtls=datetime.timedelta(seconds=_stls), psntp=_psnt, psnlr=_psnl, deltatlr=datetime.timedelta(seconds=_dtlr), deltatls=datetime.timedelta(seconds=_dtls), ) return opt
[ "def", "_read_opt_pdm", "(", "self", ",", "code", ",", "*", ",", "desc", ")", ":", "_type", "=", "self", ".", "_read_opt_type", "(", "code", ")", "_size", "=", "self", ".", "_read_unpack", "(", "1", ")", "if", "_size", "!=", "10", ":", "raise", "ProtocolError", "(", "f'{self.alias}: [Optno {code}] invalid format'", ")", "_stlr", "=", "self", ".", "_read_unpack", "(", "1", ")", "_stls", "=", "self", ".", "_read_unpack", "(", "1", ")", "_psnt", "=", "self", ".", "_read_unpack", "(", "2", ")", "_psnl", "=", "self", ".", "_read_unpack", "(", "2", ")", "_dtlr", "=", "self", ".", "_read_unpack", "(", "2", ")", "_dtls", "=", "self", ".", "_read_unpack", "(", "2", ")", "opt", "=", "dict", "(", "desc", "=", "desc", ",", "type", "=", "_type", ",", "length", "=", "_size", "+", "2", ",", "scaledtlr", "=", "datetime", ".", "timedelta", "(", "seconds", "=", "_stlr", ")", ",", "scaledtls", "=", "datetime", ".", "timedelta", "(", "seconds", "=", "_stls", ")", ",", "psntp", "=", "_psnt", ",", "psnlr", "=", "_psnl", ",", "deltatlr", "=", "datetime", ".", "timedelta", "(", "seconds", "=", "_dtlr", ")", ",", "deltatls", "=", "datetime", ".", "timedelta", "(", "seconds", "=", "_dtls", ")", ",", ")", "return", "opt" ]
Read HOPOPT PDM option. Structure of HOPOPT PDM option [RFC 8250]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Option Type | Option Length | ScaleDTLR | ScaleDTLS | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | PSN This Packet | PSN Last Received | |-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Delta Time Last Received | Delta Time Last Sent | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Octets Bits Name Description 0 0 hopopt.pdm.type Option Type 0 0 hopopt.pdm.type.value Option Number 0 0 hopopt.pdm.type.action Action (00) 0 2 hopopt.pdm.type.change Change Flag (0) 1 8 hopopt.pdm.length Length of Option Data 2 16 hopopt.pdm.scaledtlr Scale Delta Time Last Received 3 24 hopopt.pdm.scaledtls Scale Delta Time Last Sent 4 32 hopopt.pdm.psntp Packet Sequence Number This Packet 6 48 hopopt.pdm.psnlr Packet Sequence Number Last Received 8 64 hopopt.pdm.deltatlr Delta Time Last Received 10 80 hopopt.pdm.deltatls Delta Time Last Sent
[ "Read", "HOPOPT", "PDM", "option", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/protocols/internet/hopopt.py#L624-L675
1,290
JarryShaw/PyPCAPKit
src/protocols/internet/hopopt.py
HOPOPT._read_opt_qs
def _read_opt_qs(self, code, *, desc): """Read HOPOPT Quick Start option. Structure of HOPOPT Quick-Start option [RFC 4782]: * A Quick-Start Request. 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Option | Length=6 | Func. | Rate | QS TTL | | | | 0000 |Request| | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | QS Nonce | R | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ * Report of Approved Rate. 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Option | Length=6 | Func. | Rate | Not Used | | | | 1000 | Report| | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | QS Nonce | R | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Octets Bits Name Description 0 0 hopopt.qs.type Option Type 0 0 hopopt.qs.type.value Option Number 0 0 hopopt.qs.type.action Action (00) 0 2 hopopt.qs.type.change Change Flag (1) 1 8 hopopt.qs.length Length of Option Data 2 16 hopopt.qs.func Function (0/8) 2 20 hopopt.qs.rate Rate Request / Report (in Kbps) 3 24 hopopt.qs.ttl QS TTL / None 4 32 hopopt.qs.nounce QS Nounce 7 62 - Reserved """ _type = self._read_opt_type(code) _size = self._read_unpack(1) if _size != 6: raise ProtocolError(f'{self.alias}: [Optno {code}] invalid format') _fcrr = self._read_binary(1) _func = int(_fcrr[:4], base=2) _rate = int(_fcrr[4:], base=2) _ttlv = self._read_unpack(1) _nonr = self._read_binary(4) _qsnn = int(_nonr[:30], base=2) if _func != 0 and _func != 8: raise ProtocolError(f'{self.alias}: [Optno {code}] invalid format') data = dict( type=_type, length=_size + 2, func=_QS_FUNC.get(_func), rate=40000 * (2 ** _rate) / 1000, ttl=None if _func else _rate, nounce=_qsnn, ) return data
python
def _read_opt_qs(self, code, *, desc): _type = self._read_opt_type(code) _size = self._read_unpack(1) if _size != 6: raise ProtocolError(f'{self.alias}: [Optno {code}] invalid format') _fcrr = self._read_binary(1) _func = int(_fcrr[:4], base=2) _rate = int(_fcrr[4:], base=2) _ttlv = self._read_unpack(1) _nonr = self._read_binary(4) _qsnn = int(_nonr[:30], base=2) if _func != 0 and _func != 8: raise ProtocolError(f'{self.alias}: [Optno {code}] invalid format') data = dict( type=_type, length=_size + 2, func=_QS_FUNC.get(_func), rate=40000 * (2 ** _rate) / 1000, ttl=None if _func else _rate, nounce=_qsnn, ) return data
[ "def", "_read_opt_qs", "(", "self", ",", "code", ",", "*", ",", "desc", ")", ":", "_type", "=", "self", ".", "_read_opt_type", "(", "code", ")", "_size", "=", "self", ".", "_read_unpack", "(", "1", ")", "if", "_size", "!=", "6", ":", "raise", "ProtocolError", "(", "f'{self.alias}: [Optno {code}] invalid format'", ")", "_fcrr", "=", "self", ".", "_read_binary", "(", "1", ")", "_func", "=", "int", "(", "_fcrr", "[", ":", "4", "]", ",", "base", "=", "2", ")", "_rate", "=", "int", "(", "_fcrr", "[", "4", ":", "]", ",", "base", "=", "2", ")", "_ttlv", "=", "self", ".", "_read_unpack", "(", "1", ")", "_nonr", "=", "self", ".", "_read_binary", "(", "4", ")", "_qsnn", "=", "int", "(", "_nonr", "[", ":", "30", "]", ",", "base", "=", "2", ")", "if", "_func", "!=", "0", "and", "_func", "!=", "8", ":", "raise", "ProtocolError", "(", "f'{self.alias}: [Optno {code}] invalid format'", ")", "data", "=", "dict", "(", "type", "=", "_type", ",", "length", "=", "_size", "+", "2", ",", "func", "=", "_QS_FUNC", ".", "get", "(", "_func", ")", ",", "rate", "=", "40000", "*", "(", "2", "**", "_rate", ")", "/", "1000", ",", "ttl", "=", "None", "if", "_func", "else", "_rate", ",", "nounce", "=", "_qsnn", ",", ")", "return", "data" ]
Read HOPOPT Quick Start option. Structure of HOPOPT Quick-Start option [RFC 4782]: * A Quick-Start Request. 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Option | Length=6 | Func. | Rate | QS TTL | | | | 0000 |Request| | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | QS Nonce | R | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ * Report of Approved Rate. 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Option | Length=6 | Func. | Rate | Not Used | | | | 1000 | Report| | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | QS Nonce | R | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Octets Bits Name Description 0 0 hopopt.qs.type Option Type 0 0 hopopt.qs.type.value Option Number 0 0 hopopt.qs.type.action Action (00) 0 2 hopopt.qs.type.change Change Flag (1) 1 8 hopopt.qs.length Length of Option Data 2 16 hopopt.qs.func Function (0/8) 2 20 hopopt.qs.rate Rate Request / Report (in Kbps) 3 24 hopopt.qs.ttl QS TTL / None 4 32 hopopt.qs.nounce QS Nounce 7 62 - Reserved
[ "Read", "HOPOPT", "Quick", "Start", "option", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/protocols/internet/hopopt.py#L677-L737
1,291
JarryShaw/PyPCAPKit
src/protocols/internet/hopopt.py
HOPOPT._read_opt_rpl
def _read_opt_rpl(self, code, *, desc): """Read HOPOPT RPL option. Structure of HOPOPT RPL option [RFC 6553]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Option Type | Opt Data Len | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |O|R|F|0|0|0|0|0| RPLInstanceID | SenderRank | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | (sub-TLVs) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Octets Bits Name Description 0 0 hopopt.rpl.type Option Type 0 0 hopopt.rpl.type.value Option Number 0 0 hopopt.rpl.type.action Action (01) 0 2 hopopt.rpl.type.change Change Flag (1) 1 8 hopopt.rpl.length Length of Option Data 2 16 hopopt.rpl.flags RPL Option Flags 2 16 hopopt.rpl.flags.down Down Flag 2 17 hopopt.rpl.flags.rank_error Rank-Error Flag 2 18 hopopt.rpl.flags.fwd_error Forwarding-Error Flag 3 24 hopopt.rpl.id RPLInstanceID 4 32 hopopt.rpl.rank SenderRank 6 48 hopopt.rpl.data Sub-TLVs """ _type = self._read_opt_type(code) _size = self._read_unpack(1) if _size < 4: raise ProtocolError(f'{self.alias}: [Optno {code}] invalid format') _flag = self._read_binary(1) _rpld = self._read_unpack(1) _rank = self._read_unpack(2) opt = dict( desc=desc, type=_type, length=_size + 2, flags=dict( down=True if int(_flag[0], base=2) else False, rank_error=True if int(_flag[1], base=2) else False, fwd_error=True if int(_flag[2], base=2) else False, ), id=_rpld, rank=_rank, ) if _size > 4: opt['data'] = self._read_fileng(_size-4) return opt
python
def _read_opt_rpl(self, code, *, desc): _type = self._read_opt_type(code) _size = self._read_unpack(1) if _size < 4: raise ProtocolError(f'{self.alias}: [Optno {code}] invalid format') _flag = self._read_binary(1) _rpld = self._read_unpack(1) _rank = self._read_unpack(2) opt = dict( desc=desc, type=_type, length=_size + 2, flags=dict( down=True if int(_flag[0], base=2) else False, rank_error=True if int(_flag[1], base=2) else False, fwd_error=True if int(_flag[2], base=2) else False, ), id=_rpld, rank=_rank, ) if _size > 4: opt['data'] = self._read_fileng(_size-4) return opt
[ "def", "_read_opt_rpl", "(", "self", ",", "code", ",", "*", ",", "desc", ")", ":", "_type", "=", "self", ".", "_read_opt_type", "(", "code", ")", "_size", "=", "self", ".", "_read_unpack", "(", "1", ")", "if", "_size", "<", "4", ":", "raise", "ProtocolError", "(", "f'{self.alias}: [Optno {code}] invalid format'", ")", "_flag", "=", "self", ".", "_read_binary", "(", "1", ")", "_rpld", "=", "self", ".", "_read_unpack", "(", "1", ")", "_rank", "=", "self", ".", "_read_unpack", "(", "2", ")", "opt", "=", "dict", "(", "desc", "=", "desc", ",", "type", "=", "_type", ",", "length", "=", "_size", "+", "2", ",", "flags", "=", "dict", "(", "down", "=", "True", "if", "int", "(", "_flag", "[", "0", "]", ",", "base", "=", "2", ")", "else", "False", ",", "rank_error", "=", "True", "if", "int", "(", "_flag", "[", "1", "]", ",", "base", "=", "2", ")", "else", "False", ",", "fwd_error", "=", "True", "if", "int", "(", "_flag", "[", "2", "]", ",", "base", "=", "2", ")", "else", "False", ",", ")", ",", "id", "=", "_rpld", ",", "rank", "=", "_rank", ",", ")", "if", "_size", ">", "4", ":", "opt", "[", "'data'", "]", "=", "self", ".", "_read_fileng", "(", "_size", "-", "4", ")", "return", "opt" ]
Read HOPOPT RPL option. Structure of HOPOPT RPL option [RFC 6553]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Option Type | Opt Data Len | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |O|R|F|0|0|0|0|0| RPLInstanceID | SenderRank | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | (sub-TLVs) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Octets Bits Name Description 0 0 hopopt.rpl.type Option Type 0 0 hopopt.rpl.type.value Option Number 0 0 hopopt.rpl.type.action Action (01) 0 2 hopopt.rpl.type.change Change Flag (1) 1 8 hopopt.rpl.length Length of Option Data 2 16 hopopt.rpl.flags RPL Option Flags 2 16 hopopt.rpl.flags.down Down Flag 2 17 hopopt.rpl.flags.rank_error Rank-Error Flag 2 18 hopopt.rpl.flags.fwd_error Forwarding-Error Flag 3 24 hopopt.rpl.id RPLInstanceID 4 32 hopopt.rpl.rank SenderRank 6 48 hopopt.rpl.data Sub-TLVs
[ "Read", "HOPOPT", "RPL", "option", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/protocols/internet/hopopt.py#L739-L792
1,292
JarryShaw/PyPCAPKit
src/protocols/internet/hopopt.py
HOPOPT._read_opt_ilnp
def _read_opt_ilnp(self, code, *, desc): """Read HOPOPT ILNP Nonce option. Structure of HOPOPT ILNP Nonce option [RFC 6744]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Next Header | Hdr Ext Len | Option Type | Option Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ / Nonce Value / +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Octets Bits Name Description 0 0 hopopt.ilnp.type Option Type 0 0 hopopt.ilnp.type.value Option Number 0 0 hopopt.ilnp.type.action Action (10) 0 2 hopopt.ilnp.type.change Change Flag (0) 1 8 hopopt.ilnp.length Length of Option Data 2 16 hopopt.ilnp.value Nonce Value """ _type = self._read_opt_type(code) _size = self._read_unpack(1) _nval = self._read_fileng(_size) opt = dict( desc=desc, type=_type, length=_size + 2, value=_nval, ) return opt
python
def _read_opt_ilnp(self, code, *, desc): _type = self._read_opt_type(code) _size = self._read_unpack(1) _nval = self._read_fileng(_size) opt = dict( desc=desc, type=_type, length=_size + 2, value=_nval, ) return opt
[ "def", "_read_opt_ilnp", "(", "self", ",", "code", ",", "*", ",", "desc", ")", ":", "_type", "=", "self", ".", "_read_opt_type", "(", "code", ")", "_size", "=", "self", ".", "_read_unpack", "(", "1", ")", "_nval", "=", "self", ".", "_read_fileng", "(", "_size", ")", "opt", "=", "dict", "(", "desc", "=", "desc", ",", "type", "=", "_type", ",", "length", "=", "_size", "+", "2", ",", "value", "=", "_nval", ",", ")", "return", "opt" ]
Read HOPOPT ILNP Nonce option. Structure of HOPOPT ILNP Nonce option [RFC 6744]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Next Header | Hdr Ext Len | Option Type | Option Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ / Nonce Value / +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Octets Bits Name Description 0 0 hopopt.ilnp.type Option Type 0 0 hopopt.ilnp.type.value Option Number 0 0 hopopt.ilnp.type.action Action (10) 0 2 hopopt.ilnp.type.change Change Flag (0) 1 8 hopopt.ilnp.length Length of Option Data 2 16 hopopt.ilnp.value Nonce Value
[ "Read", "HOPOPT", "ILNP", "Nonce", "option", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/protocols/internet/hopopt.py#L865-L897
1,293
JarryShaw/PyPCAPKit
src/protocols/internet/hopopt.py
HOPOPT._read_opt_lio
def _read_opt_lio(self, code, *, desc): """Read HOPOPT Line-Identification option. Structure of HOPOPT Line-Identification option [RFC 6788]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Option Type | Option Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | LineIDLen | Line ID... +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Octets Bits Name Description 0 0 hopopt.lio.type Option Type 0 0 hopopt.lio.type.value Option Number 0 0 hopopt.lio.type.action Action (10) 0 2 hopopt.lio.type.change Change Flag (0) 1 8 hopopt.lio.length Length of Option Data 2 16 hopopt.lio.lid_len Line ID Length 3 24 hopopt.lio.lid Line ID """ _type = self._read_opt_type(code) _size = self._read_unpack(1) _llen = self._read_unpack(1) _line = self._read_fileng(_llen) opt = dict( desc=desc, type=_type, length=_size + 2, lid_len=_llen, lid=_line, ) _plen = _size - _llen if _plen: self._read_fileng(_plen) return opt
python
def _read_opt_lio(self, code, *, desc): _type = self._read_opt_type(code) _size = self._read_unpack(1) _llen = self._read_unpack(1) _line = self._read_fileng(_llen) opt = dict( desc=desc, type=_type, length=_size + 2, lid_len=_llen, lid=_line, ) _plen = _size - _llen if _plen: self._read_fileng(_plen) return opt
[ "def", "_read_opt_lio", "(", "self", ",", "code", ",", "*", ",", "desc", ")", ":", "_type", "=", "self", ".", "_read_opt_type", "(", "code", ")", "_size", "=", "self", ".", "_read_unpack", "(", "1", ")", "_llen", "=", "self", ".", "_read_unpack", "(", "1", ")", "_line", "=", "self", ".", "_read_fileng", "(", "_llen", ")", "opt", "=", "dict", "(", "desc", "=", "desc", ",", "type", "=", "_type", ",", "length", "=", "_size", "+", "2", ",", "lid_len", "=", "_llen", ",", "lid", "=", "_line", ",", ")", "_plen", "=", "_size", "-", "_llen", "if", "_plen", ":", "self", ".", "_read_fileng", "(", "_plen", ")", "return", "opt" ]
Read HOPOPT Line-Identification option. Structure of HOPOPT Line-Identification option [RFC 6788]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Option Type | Option Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | LineIDLen | Line ID... +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Octets Bits Name Description 0 0 hopopt.lio.type Option Type 0 0 hopopt.lio.type.value Option Number 0 0 hopopt.lio.type.action Action (10) 0 2 hopopt.lio.type.change Change Flag (0) 1 8 hopopt.lio.length Length of Option Data 2 16 hopopt.lio.lid_len Line ID Length 3 24 hopopt.lio.lid Line ID
[ "Read", "HOPOPT", "Line", "-", "Identification", "option", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/protocols/internet/hopopt.py#L899-L938
1,294
JarryShaw/PyPCAPKit
src/protocols/internet/hopopt.py
HOPOPT._read_opt_jumbo
def _read_opt_jumbo(self, code, *, desc): """Read HOPOPT Jumbo Payload option. Structure of HOPOPT Jumbo Payload option [RFC 2675]: +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Option Type | Opt Data Len | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Jumbo Payload Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Octets Bits Name Description 0 0 hopopt.jumbo.type Option Type 0 0 hopopt.jumbo.type.value Option Number 0 0 hopopt.jumbo.type.action Action (11) 0 2 hopopt.jumbo.type.change Change Flag (0) 1 8 hopopt.jumbo.length Length of Option Data 2 16 hopopt.jumbo.payload_len Jumbo Payload Length """ _type = self._read_opt_type(code) _size = self._read_unpack(1) if _size != 4: raise ProtocolError(f'{self.alias}: [Optno {code}] invalid format') _jlen = self._read_unpack(4) opt = dict( desc=desc, type=_type, length=_size + 2, payload_len=_jlen, ) return opt
python
def _read_opt_jumbo(self, code, *, desc): _type = self._read_opt_type(code) _size = self._read_unpack(1) if _size != 4: raise ProtocolError(f'{self.alias}: [Optno {code}] invalid format') _jlen = self._read_unpack(4) opt = dict( desc=desc, type=_type, length=_size + 2, payload_len=_jlen, ) return opt
[ "def", "_read_opt_jumbo", "(", "self", ",", "code", ",", "*", ",", "desc", ")", ":", "_type", "=", "self", ".", "_read_opt_type", "(", "code", ")", "_size", "=", "self", ".", "_read_unpack", "(", "1", ")", "if", "_size", "!=", "4", ":", "raise", "ProtocolError", "(", "f'{self.alias}: [Optno {code}] invalid format'", ")", "_jlen", "=", "self", ".", "_read_unpack", "(", "4", ")", "opt", "=", "dict", "(", "desc", "=", "desc", ",", "type", "=", "_type", ",", "length", "=", "_size", "+", "2", ",", "payload_len", "=", "_jlen", ",", ")", "return", "opt" ]
Read HOPOPT Jumbo Payload option. Structure of HOPOPT Jumbo Payload option [RFC 2675]: +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Option Type | Opt Data Len | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Jumbo Payload Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Octets Bits Name Description 0 0 hopopt.jumbo.type Option Type 0 0 hopopt.jumbo.type.value Option Number 0 0 hopopt.jumbo.type.action Action (11) 0 2 hopopt.jumbo.type.change Change Flag (0) 1 8 hopopt.jumbo.length Length of Option Data 2 16 hopopt.jumbo.payload_len Jumbo Payload Length
[ "Read", "HOPOPT", "Jumbo", "Payload", "option", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/protocols/internet/hopopt.py#L940-L972
1,295
JarryShaw/PyPCAPKit
src/protocols/internet/hopopt.py
HOPOPT._read_opt_home
def _read_opt_home(self, code, *, desc): """Read HOPOPT Home Address option. Structure of HOPOPT Home Address option [RFC 6275]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Option Type | Option Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | + + | | + Home Address + | | + + | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Octets Bits Name Description 0 0 hopopt.home.type Option Type 0 0 hopopt.home.type.value Option Number 0 0 hopopt.home.type.action Action (11) 0 2 hopopt.home.type.change Change Flag (0) 1 8 hopopt.home.length Length of Option Data 2 16 hopopt.home.ip Home Address """ _type = self._read_opt_type(code) _size = self._read_unpack(1) if _size != 16: raise ProtocolError(f'{self.alias}: [Optno {code}] invalid format') _addr = self._read_fileng(16) opt = dict( desc=desc, type=_type, length=_size + 2, ip=ipaddress.ip_address(_addr), ) return opt
python
def _read_opt_home(self, code, *, desc): _type = self._read_opt_type(code) _size = self._read_unpack(1) if _size != 16: raise ProtocolError(f'{self.alias}: [Optno {code}] invalid format') _addr = self._read_fileng(16) opt = dict( desc=desc, type=_type, length=_size + 2, ip=ipaddress.ip_address(_addr), ) return opt
[ "def", "_read_opt_home", "(", "self", ",", "code", ",", "*", ",", "desc", ")", ":", "_type", "=", "self", ".", "_read_opt_type", "(", "code", ")", "_size", "=", "self", ".", "_read_unpack", "(", "1", ")", "if", "_size", "!=", "16", ":", "raise", "ProtocolError", "(", "f'{self.alias}: [Optno {code}] invalid format'", ")", "_addr", "=", "self", ".", "_read_fileng", "(", "16", ")", "opt", "=", "dict", "(", "desc", "=", "desc", ",", "type", "=", "_type", ",", "length", "=", "_size", "+", "2", ",", "ip", "=", "ipaddress", ".", "ip_address", "(", "_addr", ")", ",", ")", "return", "opt" ]
Read HOPOPT Home Address option. Structure of HOPOPT Home Address option [RFC 6275]: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Option Type | Option Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | + + | | + Home Address + | | + + | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Octets Bits Name Description 0 0 hopopt.home.type Option Type 0 0 hopopt.home.type.value Option Number 0 0 hopopt.home.type.action Action (11) 0 2 hopopt.home.type.change Change Flag (0) 1 8 hopopt.home.length Length of Option Data 2 16 hopopt.home.ip Home Address
[ "Read", "HOPOPT", "Home", "Address", "option", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/protocols/internet/hopopt.py#L974-L1014
1,296
JarryShaw/PyPCAPKit
src/protocols/internet/hopopt.py
HOPOPT._read_opt_ip_dff
def _read_opt_ip_dff(self, code, *, desc): """Read HOPOPT IP_DFF option. Structure of HOPOPT IP_DFF option [RFC 6971]: 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Next Header | Hdr Ext Len | OptTypeDFF | OptDataLenDFF | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |VER|D|R|0|0|0|0| Sequence Number | Pad1 | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Octets Bits Name Description 0 0 hopopt.ip_dff.type Option Type 0 0 hopopt.ip_dff.type.value Option Number 0 0 hopopt.ip_dff.type.action Action (11) 0 2 hopopt.ip_dff.type.change Change Flag (1) 1 8 hopopt.ip_dff.length Length of Option Data 2 16 hopopt.ip_dff.version Version 2 18 hopopt.ip_dff.flags Flags 2 18 hopopt.ip_dff.flags.dup DUP Flag 2 19 hopopt.ip_dff.flags.ret RET Flag 2 20 - Reserved 3 24 hopopt.ip_dff.seq Sequence Number """ _type = self._read_opt_type(code) _size = self._read_unpack(1) if _size != 2: raise ProtocolError(f'{self.alias}: [Optno {code}] invalid format') _verf = self._read_binary(1) _seqn = self._read_unpack(2) opt = dict( desc=desc, type=_type, length=_size + 2, version=_verf[:2], flags=dict( dup=True if int(_verf[2], base=2) else False, ret=True if int(_verf[3], base=2) else False, ), seq=_seqn, ) return opt
python
def _read_opt_ip_dff(self, code, *, desc): _type = self._read_opt_type(code) _size = self._read_unpack(1) if _size != 2: raise ProtocolError(f'{self.alias}: [Optno {code}] invalid format') _verf = self._read_binary(1) _seqn = self._read_unpack(2) opt = dict( desc=desc, type=_type, length=_size + 2, version=_verf[:2], flags=dict( dup=True if int(_verf[2], base=2) else False, ret=True if int(_verf[3], base=2) else False, ), seq=_seqn, ) return opt
[ "def", "_read_opt_ip_dff", "(", "self", ",", "code", ",", "*", ",", "desc", ")", ":", "_type", "=", "self", ".", "_read_opt_type", "(", "code", ")", "_size", "=", "self", ".", "_read_unpack", "(", "1", ")", "if", "_size", "!=", "2", ":", "raise", "ProtocolError", "(", "f'{self.alias}: [Optno {code}] invalid format'", ")", "_verf", "=", "self", ".", "_read_binary", "(", "1", ")", "_seqn", "=", "self", ".", "_read_unpack", "(", "2", ")", "opt", "=", "dict", "(", "desc", "=", "desc", ",", "type", "=", "_type", ",", "length", "=", "_size", "+", "2", ",", "version", "=", "_verf", "[", ":", "2", "]", ",", "flags", "=", "dict", "(", "dup", "=", "True", "if", "int", "(", "_verf", "[", "2", "]", ",", "base", "=", "2", ")", "else", "False", ",", "ret", "=", "True", "if", "int", "(", "_verf", "[", "3", "]", ",", "base", "=", "2", ")", "else", "False", ",", ")", ",", "seq", "=", "_seqn", ",", ")", "return", "opt" ]
Read HOPOPT IP_DFF option. Structure of HOPOPT IP_DFF option [RFC 6971]: 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Next Header | Hdr Ext Len | OptTypeDFF | OptDataLenDFF | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |VER|D|R|0|0|0|0| Sequence Number | Pad1 | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Octets Bits Name Description 0 0 hopopt.ip_dff.type Option Type 0 0 hopopt.ip_dff.type.value Option Number 0 0 hopopt.ip_dff.type.action Action (11) 0 2 hopopt.ip_dff.type.change Change Flag (1) 1 8 hopopt.ip_dff.length Length of Option Data 2 16 hopopt.ip_dff.version Version 2 18 hopopt.ip_dff.flags Flags 2 18 hopopt.ip_dff.flags.dup DUP Flag 2 19 hopopt.ip_dff.flags.ret RET Flag 2 20 - Reserved 3 24 hopopt.ip_dff.seq Sequence Number
[ "Read", "HOPOPT", "IP_DFF", "option", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/protocols/internet/hopopt.py#L1016-L1061
1,297
JarryShaw/PyPCAPKit
src/protocols/internet/ipv6_opts.py
IPv6_Opts.read_ipv6_opts
def read_ipv6_opts(self, length, extension): """Read Destination Options for IPv6. Structure of IPv6-Opts header [RFC 8200]: +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Next Header | Hdr Ext Len | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | | . . . Options . . . | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Octets Bits Name Description 0 0 opt.next Next Header 1 8 opt.length Header Extensive Length 2 16 opt.options Options """ if length is None: length = len(self) _next = self._read_protos(1) _hlen = self._read_unpack(1) # _opts = self._read_fileng(_hlen*8+6) ipv6_opts = dict( next=_next, length=(_hlen + 1) * 8, ) options = self._read_ipv6_opts_options(_hlen * 8 + 6) ipv6_opts['options'] = options[0] # tuple of option acronyms ipv6_opts.update(options[1]) # merge option info to buffer length -= ipv6_opts['length'] ipv6_opts['packet'] = self._read_packet(header=ipv6_opts['length'], payload=length) if extension: self._protos = None return ipv6_opts return self._decode_next_layer(ipv6_opts, _next, length)
python
def read_ipv6_opts(self, length, extension): if length is None: length = len(self) _next = self._read_protos(1) _hlen = self._read_unpack(1) # _opts = self._read_fileng(_hlen*8+6) ipv6_opts = dict( next=_next, length=(_hlen + 1) * 8, ) options = self._read_ipv6_opts_options(_hlen * 8 + 6) ipv6_opts['options'] = options[0] # tuple of option acronyms ipv6_opts.update(options[1]) # merge option info to buffer length -= ipv6_opts['length'] ipv6_opts['packet'] = self._read_packet(header=ipv6_opts['length'], payload=length) if extension: self._protos = None return ipv6_opts return self._decode_next_layer(ipv6_opts, _next, length)
[ "def", "read_ipv6_opts", "(", "self", ",", "length", ",", "extension", ")", ":", "if", "length", "is", "None", ":", "length", "=", "len", "(", "self", ")", "_next", "=", "self", ".", "_read_protos", "(", "1", ")", "_hlen", "=", "self", ".", "_read_unpack", "(", "1", ")", "# _opts = self._read_fileng(_hlen*8+6)", "ipv6_opts", "=", "dict", "(", "next", "=", "_next", ",", "length", "=", "(", "_hlen", "+", "1", ")", "*", "8", ",", ")", "options", "=", "self", ".", "_read_ipv6_opts_options", "(", "_hlen", "*", "8", "+", "6", ")", "ipv6_opts", "[", "'options'", "]", "=", "options", "[", "0", "]", "# tuple of option acronyms", "ipv6_opts", ".", "update", "(", "options", "[", "1", "]", ")", "# merge option info to buffer", "length", "-=", "ipv6_opts", "[", "'length'", "]", "ipv6_opts", "[", "'packet'", "]", "=", "self", ".", "_read_packet", "(", "header", "=", "ipv6_opts", "[", "'length'", "]", ",", "payload", "=", "length", ")", "if", "extension", ":", "self", ".", "_protos", "=", "None", "return", "ipv6_opts", "return", "self", ".", "_decode_next_layer", "(", "ipv6_opts", ",", "_next", ",", "length", ")" ]
Read Destination Options for IPv6. Structure of IPv6-Opts header [RFC 8200]: +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Next Header | Hdr Ext Len | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | | . . . Options . . . | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Octets Bits Name Description 0 0 opt.next Next Header 1 8 opt.length Header Extensive Length 2 16 opt.options Options
[ "Read", "Destination", "Options", "for", "IPv6", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/protocols/internet/ipv6_opts.py#L152-L194
1,298
JarryShaw/PyPCAPKit
src/protocols/internet/ipv6_opts.py
IPv6_Opts._read_ipv6_opts_options
def _read_ipv6_opts_options(self, length): """Read IPv6_Opts options. Positional arguments: * length -- int, length of options Returns: * dict -- extracted IPv6_Opts options """ counter = 0 # length of read options optkind = list() # option type list options = dict() # dict of option data while counter < length: # break when eol triggered code = self._read_unpack(1) if not code: break # extract parameter abbr, desc = _IPv6_Opts_OPT.get(code, ('None', 'Unassigned')) data = _IPv6_Opts_PROC(abbr)(self, code, desc=desc) enum = _OPT_TYPE.get(code) # record parameter data counter += data['length'] if enum in optkind: if isinstance(options[abbr], tuple): options[abbr] += (Info(data),) else: options[abbr] = (Info(options[abbr]), Info(data)) else: optkind.append(enum) options[abbr] = data # check threshold if counter != length: raise ProtocolError(f'{self.alias}: invalid format') return tuple(optkind), options
python
def _read_ipv6_opts_options(self, length): counter = 0 # length of read options optkind = list() # option type list options = dict() # dict of option data while counter < length: # break when eol triggered code = self._read_unpack(1) if not code: break # extract parameter abbr, desc = _IPv6_Opts_OPT.get(code, ('None', 'Unassigned')) data = _IPv6_Opts_PROC(abbr)(self, code, desc=desc) enum = _OPT_TYPE.get(code) # record parameter data counter += data['length'] if enum in optkind: if isinstance(options[abbr], tuple): options[abbr] += (Info(data),) else: options[abbr] = (Info(options[abbr]), Info(data)) else: optkind.append(enum) options[abbr] = data # check threshold if counter != length: raise ProtocolError(f'{self.alias}: invalid format') return tuple(optkind), options
[ "def", "_read_ipv6_opts_options", "(", "self", ",", "length", ")", ":", "counter", "=", "0", "# length of read options", "optkind", "=", "list", "(", ")", "# option type list", "options", "=", "dict", "(", ")", "# dict of option data", "while", "counter", "<", "length", ":", "# break when eol triggered", "code", "=", "self", ".", "_read_unpack", "(", "1", ")", "if", "not", "code", ":", "break", "# extract parameter", "abbr", ",", "desc", "=", "_IPv6_Opts_OPT", ".", "get", "(", "code", ",", "(", "'None'", ",", "'Unassigned'", ")", ")", "data", "=", "_IPv6_Opts_PROC", "(", "abbr", ")", "(", "self", ",", "code", ",", "desc", "=", "desc", ")", "enum", "=", "_OPT_TYPE", ".", "get", "(", "code", ")", "# record parameter data", "counter", "+=", "data", "[", "'length'", "]", "if", "enum", "in", "optkind", ":", "if", "isinstance", "(", "options", "[", "abbr", "]", ",", "tuple", ")", ":", "options", "[", "abbr", "]", "+=", "(", "Info", "(", "data", ")", ",", ")", "else", ":", "options", "[", "abbr", "]", "=", "(", "Info", "(", "options", "[", "abbr", "]", ")", ",", "Info", "(", "data", ")", ")", "else", ":", "optkind", ".", "append", "(", "enum", ")", "options", "[", "abbr", "]", "=", "data", "# check threshold", "if", "counter", "!=", "length", ":", "raise", "ProtocolError", "(", "f'{self.alias}: invalid format'", ")", "return", "tuple", "(", "optkind", ")", ",", "options" ]
Read IPv6_Opts options. Positional arguments: * length -- int, length of options Returns: * dict -- extracted IPv6_Opts options
[ "Read", "IPv6_Opts", "options", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/protocols/internet/ipv6_opts.py#L237-L277
1,299
JarryShaw/PyPCAPKit
src/protocols/internet/ipv6_opts.py
IPv6_Opts._read_opt_none
def _read_opt_none(self, code, *, desc): """Read IPv6_Opts unassigned options. Structure of IPv6_Opts unassigned options [RFC 8200]: +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+- - - - - - - - - | Option Type | Opt Data Len | Option Data +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+- - - - - - - - - Octets Bits Name Description 0 0 ipv6_opts.opt.type Option Type 0 0 ipv6_opts.opt.type.value Option Number 0 0 ipv6_opts.opt.type.action Action (00-11) 0 2 ipv6_opts.opt.type.change Change Flag (0/1) 1 8 ipv6_opts.opt.length Length of Option Data 2 16 ipv6_opts.opt.data Option Data """ _type = self._read_opt_type(code) _size = self._read_unpack(1) _data = self._read_fileng(_size) opt = dict( desc=_IPv6_Opts_NULL.get(code, desc), type=_type, length=_size + 2, data=_data, ) return opt
python
def _read_opt_none(self, code, *, desc): _type = self._read_opt_type(code) _size = self._read_unpack(1) _data = self._read_fileng(_size) opt = dict( desc=_IPv6_Opts_NULL.get(code, desc), type=_type, length=_size + 2, data=_data, ) return opt
[ "def", "_read_opt_none", "(", "self", ",", "code", ",", "*", ",", "desc", ")", ":", "_type", "=", "self", ".", "_read_opt_type", "(", "code", ")", "_size", "=", "self", ".", "_read_unpack", "(", "1", ")", "_data", "=", "self", ".", "_read_fileng", "(", "_size", ")", "opt", "=", "dict", "(", "desc", "=", "_IPv6_Opts_NULL", ".", "get", "(", "code", ",", "desc", ")", ",", "type", "=", "_type", ",", "length", "=", "_size", "+", "2", ",", "data", "=", "_data", ",", ")", "return", "opt" ]
Read IPv6_Opts unassigned options. Structure of IPv6_Opts unassigned options [RFC 8200]: +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+- - - - - - - - - | Option Type | Opt Data Len | Option Data +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+- - - - - - - - - Octets Bits Name Description 0 0 ipv6_opts.opt.type Option Type 0 0 ipv6_opts.opt.type.value Option Number 0 0 ipv6_opts.opt.type.action Action (00-11) 0 2 ipv6_opts.opt.type.change Change Flag (0/1) 1 8 ipv6_opts.opt.length Length of Option Data 2 16 ipv6_opts.opt.data Option Data
[ "Read", "IPv6_Opts", "unassigned", "options", "." ]
c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e
https://github.com/JarryShaw/PyPCAPKit/blob/c7f0da9aebc2cf210bf8f8b912f7d3cbb98ca10e/src/protocols/internet/ipv6_opts.py#L279-L307