summaryrefslogtreecommitdiffstats
path: root/scripts/external_libs/scapy-2.3.1/python2/scapy/contrib/ospf.py
diff options
context:
space:
mode:
Diffstat (limited to 'scripts/external_libs/scapy-2.3.1/python2/scapy/contrib/ospf.py')
-rw-r--r--scripts/external_libs/scapy-2.3.1/python2/scapy/contrib/ospf.py833
1 files changed, 833 insertions, 0 deletions
diff --git a/scripts/external_libs/scapy-2.3.1/python2/scapy/contrib/ospf.py b/scripts/external_libs/scapy-2.3.1/python2/scapy/contrib/ospf.py
new file mode 100644
index 00000000..a6422bd8
--- /dev/null
+++ b/scripts/external_libs/scapy-2.3.1/python2/scapy/contrib/ospf.py
@@ -0,0 +1,833 @@
+#!/usr/bin/env python
+
+# scapy.contrib.description = OSPF
+# scapy.contrib.status = loads
+
+"""
+OSPF extension for Scapy <http://www.secdev.org/scapy>
+
+This module provides Scapy layers for the Open Shortest Path First
+routing protocol as defined in RFC 2328 and RFC 5340.
+
+Copyright (c) 2008 Dirk Loss : mail dirk-loss de
+Copyright (c) 2010 Jochen Bartl : jochen.bartl gmail com
+
+This program is free software; you can redistribute it and/or
+modify it under the terms of the GNU General Public License
+as published by the Free Software Foundation; either version 2
+of the License, or (at your option) any later version.
+
+This program is distributed in the hope that it will be useful,
+but WITHOUT ANY WARRANTY; without even the implied warranty of
+MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+GNU General Public License for more details.
+"""
+
+
+from scapy.all import *
+
+EXT_VERSION = "v0.9.2"
+
+
+class OSPFOptionsField(FlagsField):
+
+ def __init__(self, name="options", default=0, size=8,
+ names=["MT", "E", "MC", "NP", "L", "DC", "O", "DN"]):
+ FlagsField.__init__(self, name, default, size, names)
+
+
+_OSPF_types = {1: "Hello",
+ 2: "DBDesc",
+ 3: "LSReq",
+ 4: "LSUpd",
+ 5: "LSAck"}
+
+
+class OSPF_Hdr(Packet):
+ name = "OSPF Header"
+ fields_desc = [
+ ByteField("version", 2),
+ ByteEnumField("type", 1, _OSPF_types),
+ ShortField("len", None),
+ IPField("src", "1.1.1.1"),
+ IPField("area", "0.0.0.0"), # default: backbone
+ XShortField("chksum", None),
+ ShortEnumField("authtype", 0, {0:"Null", 1:"Simple", 2:"Crypto"}),
+ # Null or Simple Authentication
+ ConditionalField(XLongField("authdata", 0), lambda pkt:pkt.authtype != 2),
+ # Crypto Authentication
+ ConditionalField(XShortField("reserved", 0), lambda pkt:pkt.authtype == 2),
+ ConditionalField(ByteField("keyid", 1), lambda pkt:pkt.authtype == 2),
+ ConditionalField(ByteField("authdatalen", 0), lambda pkt:pkt.authtype == 2),
+ ConditionalField(XIntField("seq", 0), lambda pkt:pkt.authtype == 2),
+ # TODO: Support authdata (which is appended to the packets as if it were padding)
+ ]
+
+ def post_build(self, p, pay):
+ # TODO: Remove LLS data from pay
+ # LLS data blocks may be attached to OSPF Hello and DD packets
+ # The length of the LLS block shall not be included into the length of OSPF packet
+ # See <http://tools.ietf.org/html/rfc5613>
+ p += pay
+ l = self.len
+ if l is None:
+ l = len(p)
+ p = p[:2] + struct.pack("!H", l) + p[4:]
+ if self.chksum is None:
+ if self.authtype == 2:
+ ck = 0 # Crypto, see RFC 2328, D.4.3
+ else:
+ # Checksum is calculated without authentication data
+ # Algorithm is the same as in IP()
+ ck = checksum(p[:16] + p[24:])
+ p = p[:12] + chr(ck >> 8) + chr(ck & 0xff) + p[14:]
+ # TODO: Handle Crypto: Add message digest (RFC 2328, D.4.3)
+ return p
+
+ def hashret(self):
+ return struct.pack("H", self.area) + self.payload.hashret()
+
+ def answers(self, other):
+ if (isinstance(other, OSPF_Hdr) and
+ self.area == other.area and
+ self.type == 5): # Only acknowledgements answer other packets
+ return self.payload.answers(other.payload)
+ return 0
+
+
+class OSPF_Hello(Packet):
+ name = "OSPF Hello"
+ fields_desc = [IPField("mask", "255.255.255.0"),
+ ShortField("hellointerval", 10),
+ OSPFOptionsField(),
+ ByteField("prio", 1),
+ IntField("deadinterval", 40),
+ IPField("router", "0.0.0.0"),
+ IPField("backup", "0.0.0.0"),
+ FieldListField("neighbors", [], IPField("", "0.0.0.0"), length_from=lambda pkt: (pkt.underlayer.len - 44))]
+
+ def guess_payload_class(self, payload):
+ # check presence of LLS data block flag
+ if self.options & 0x10 == 0x10:
+ return OSPF_LLS_Hdr
+ else:
+ return Packet.guess_payload_class(self, payload)
+
+
+class LLS_Generic_TLV(Packet):
+ name = "LLS Generic"
+ fields_desc = [ShortField("type", 1),
+ FieldLenField("len", None, length_of=lambda x: x.val),
+ StrLenField("val", "", length_from=lambda x: x.len)]
+
+ def guess_payload_class(self, p):
+ return conf.padding_layer
+
+
+class LLS_ExtendedOptionsField(FlagsField):
+
+ def __init__(self, name="options", default=0, size=32,
+ names=["LR", "RS"]):
+ FlagsField.__init__(self, name, default, size, names)
+
+
+class LLS_Extended_Options(LLS_Generic_TLV):
+ name = "LLS Extended Options and Flags"
+ fields_desc = [ShortField("type", 1),
+ ShortField("len", 4),
+ LLS_ExtendedOptionsField()]
+
+
+class LLS_Crypto_Auth(LLS_Generic_TLV):
+ name = "LLS Cryptographic Authentication"
+ fields_desc = [ShortField("type", 2),
+ FieldLenField("len", 20, fmt="B", length_of=lambda x: x.authdata),
+ XIntField("sequence", "\x00\x00\x00\x00"),
+ StrLenField("authdata", "\x00" * 16, length_from=lambda x: x.len)]
+
+ def post_build(self, p, pay):
+ p += pay
+ l = self.len
+
+ if l is None:
+ # length = len(sequence) + len(authdata) + len(payload)
+ l = len(p[3:])
+ p = p[:2] + struct.pack("!H", l) + p[3:]
+
+ return p
+
+_OSPF_LLSclasses = {1: "LLS_Extended_Options",
+ 2: "LLS_Crypto_Auth"}
+
+
+def _LLSGuessPayloadClass(p, **kargs):
+ """ Guess the correct LLS class for a given payload """
+
+ cls = conf.raw_layer
+ if len(p) >= 4:
+ typ = struct.unpack("!H", p[0:2])[0]
+ clsname = _OSPF_LLSclasses.get(typ, "LLS_Generic_TLV")
+ cls = globals()[clsname]
+ return cls(p, **kargs)
+
+
+class OSPF_LLS_Hdr(Packet):
+ name = "OSPF Link-local signaling"
+ fields_desc = [XShortField("chksum", None),
+ # FIXME Length should be displayed in 32-bit words
+ ShortField("len", None),
+ PacketListField("llstlv", [], _LLSGuessPayloadClass)]
+
+ def post_build(self, p, pay):
+ p += pay
+ l = self.len
+ if l is None:
+ # Length in 32-bit words
+ l = len(p) / 4
+ p = p[:2] + struct.pack("!H", l) + p[4:]
+ if self.chksum is None:
+ c = checksum(p)
+ p = chr((c >> 8) & 0xff) + chr(c & 0xff) + p[2:]
+ return p
+
+_OSPF_LStypes = {1: "router",
+ 2: "network",
+ 3: "summaryIP",
+ 4: "summaryASBR",
+ 5: "external",
+ 7: "NSSAexternal"}
+
+_OSPF_LSclasses = {1: "OSPF_Router_LSA",
+ 2: "OSPF_Network_LSA",
+ 3: "OSPF_SummaryIP_LSA",
+ 4: "OSPF_SummaryASBR_LSA",
+ 5: "OSPF_External_LSA",
+ 7: "OSPF_NSSA_External_LSA"}
+
+
+def ospf_lsa_checksum(lsa):
+ """ Fletcher checksum for OSPF LSAs, returned as a 2 byte string.
+
+ Give the whole LSA packet as argument.
+ For details on the algorithm, see RFC 2328 chapter 12.1.7 and RFC 905 Annex B.
+ """
+ # This is based on the GPLed C implementation in Zebra <http://www.zebra.org/>
+
+ CHKSUM_OFFSET = 16
+
+ if len(lsa) < CHKSUM_OFFSET:
+ raise Exception("LSA Packet too short (%s bytes)" % len(lsa))
+
+ c0 = c1 = 0
+ # Calculation is done with checksum set to zero
+ lsa = lsa[:CHKSUM_OFFSET] + "\x00\x00" + lsa[CHKSUM_OFFSET + 2:]
+ for char in lsa[2:]: # leave out age
+ c0 += ord(char)
+ c1 += c0
+
+ c0 %= 255
+ c1 %= 255
+
+ x = ((len(lsa) - CHKSUM_OFFSET - 1) * c0 - c1) % 255
+
+ if (x <= 0):
+ x += 255
+
+ y = 510 - c0 - x
+
+ if (y > 255):
+ y -= 255
+ #checksum = (x << 8) + y
+
+ return chr(x) + chr(y)
+
+
+class OSPF_LSA_Hdr(Packet):
+ name = "OSPF LSA Header"
+ fields_desc = [ShortField("age", 1),
+ OSPFOptionsField(),
+ ByteEnumField("type", 1, _OSPF_LStypes),
+ IPField("id", "192.168.0.0"),
+ IPField("adrouter", "1.1.1.1"),
+ XIntField("seq", 0x80000001),
+ XShortField("chksum", 0),
+ ShortField("len", 36)]
+
+ def extract_padding(self, s):
+ return "", s
+
+
+_OSPF_Router_LSA_types = {1: "p2p",
+ 2: "transit",
+ 3: "stub",
+ 4: "virtual"}
+
+
+class OSPF_Link(Packet):
+ name = "OSPF Link"
+ fields_desc = [IPField("id", "192.168.0.0"),
+ IPField("data", "255.255.255.0"),
+ ByteEnumField("type", 3, _OSPF_Router_LSA_types),
+ ByteField("toscount", 0),
+ ShortField("metric", 10),
+ # TODO: define correct conditions
+ ConditionalField(ByteField("tos", 0), lambda pkt: False),
+ ConditionalField(ByteField("reserved", 0), lambda pkt: False),
+ ConditionalField(ShortField("tosmetric", 0), lambda pkt: False)]
+
+ def extract_padding(self, s):
+ return "", s
+
+
+def _LSAGuessPayloadClass(p, **kargs):
+ """ Guess the correct LSA class for a given payload """
+ # This is heavily based on scapy-cdp.py by Nicolas Bareil and Arnaud Ebalard
+ # XXX: This only works if all payload
+ cls = conf.raw_layer
+ if len(p) >= 4:
+ typ = struct.unpack("!B", p[3])[0]
+ clsname = _OSPF_LSclasses.get(typ, "Raw")
+ cls = globals()[clsname]
+ return cls(p, **kargs)
+
+
+class OSPF_BaseLSA(Packet):
+ """ An abstract base class for Link State Advertisements """
+
+ def post_build(self, p, pay):
+ length = self.len
+ if length is None:
+ length = len(p)
+ p = p[:18] + struct.pack("!H", length) + p[20:]
+ if self.chksum is None:
+ chksum = ospf_lsa_checksum(p)
+ p = p[:16] + chksum + p[18:]
+ return p # p+pay?
+
+ def extract_padding(self, s):
+ length = self.len
+ return "", s
+
+
+class OSPF_Router_LSA(OSPF_BaseLSA):
+ name = "OSPF Router LSA"
+ fields_desc = [ShortField("age", 1),
+ OSPFOptionsField(),
+ ByteField("type", 1),
+ IPField("id", "1.1.1.1"),
+ IPField("adrouter", "1.1.1.1"),
+ XIntField("seq", 0x80000001),
+ XShortField("chksum", None),
+ ShortField("len", None),
+ FlagsField("flags", 0, 8, ["B", "E", "V", "W", "Nt"]),
+ ByteField("reserved", 0),
+ FieldLenField("linkcount", None, count_of="linklist"),
+ PacketListField("linklist", [], OSPF_Link,
+ count_from=lambda pkt: pkt.linkcount,
+ length_from=lambda pkt: pkt.linkcount * 12)]
+
+
+class OSPF_Network_LSA(OSPF_BaseLSA):
+ name = "OSPF Network LSA"
+ fields_desc = [ShortField("age", 1),
+ OSPFOptionsField(),
+ ByteField("type", 2),
+ IPField("id", "192.168.0.0"),
+ IPField("adrouter", "1.1.1.1"),
+ XIntField("seq", 0x80000001),
+ XShortField("chksum", None),
+ ShortField("len", None),
+ IPField("mask", "255.255.255.0"),
+ FieldListField("routerlist", [], IPField("", "1.1.1.1"),
+ length_from=lambda pkt: pkt.len - 24)]
+
+
+class OSPF_SummaryIP_LSA(OSPF_BaseLSA):
+ name = "OSPF Summary LSA (IP Network)"
+ fields_desc = [ShortField("age", 1),
+ OSPFOptionsField(),
+ ByteField("type", 3),
+ IPField("id", "192.168.0.0"),
+ IPField("adrouter", "1.1.1.1"),
+ XIntField("seq", 0x80000001),
+ XShortField("chksum", None),
+ ShortField("len", None),
+ IPField("mask", "255.255.255.0"),
+ ByteField("reserved", 0),
+ X3BytesField("metric", 10),
+ # TODO: Define correct conditions
+ ConditionalField(ByteField("tos", 0), lambda pkt:False),
+ ConditionalField(X3BytesField("tosmetric", 0), lambda pkt:False)]
+
+
+class OSPF_SummaryASBR_LSA(OSPF_SummaryIP_LSA):
+ name = "OSPF Summary LSA (AS Boundary Router)"
+ type = 4
+ id = "2.2.2.2"
+ mask = "0.0.0.0"
+ metric = 20
+
+
+class OSPF_External_LSA(OSPF_BaseLSA):
+ name = "OSPF External LSA (ASBR)"
+ fields_desc = [ShortField("age", 1),
+ OSPFOptionsField(),
+ ByteField("type", 5),
+ IPField("id", "192.168.0.0"),
+ IPField("adrouter", "2.2.2.2"),
+ XIntField("seq", 0x80000001),
+ XShortField("chksum", None),
+ ShortField("len", None),
+ IPField("mask", "255.255.255.0"),
+ FlagsField("ebit", 0, 1, ["E"]),
+ BitField("reserved", 0, 7),
+ X3BytesField("metric", 20),
+ IPField("fwdaddr", "0.0.0.0"),
+ XIntField("tag", 0),
+ # TODO: Define correct conditions
+ ConditionalField(ByteField("tos", 0), lambda pkt:False),
+ ConditionalField(X3BytesField("tosmetric", 0), lambda pkt:False)]
+
+
+class OSPF_NSSA_External_LSA(OSPF_External_LSA):
+ name = "OSPF NSSA External LSA"
+ type = 7
+
+
+class OSPF_DBDesc(Packet):
+ name = "OSPF Database Description"
+ fields_desc = [ShortField("mtu", 1500),
+ OSPFOptionsField(),
+ FlagsField("dbdescr", 0, 8, ["MS", "M", "I", "R", "4", "3", "2", "1"]),
+ IntField("ddseq", 1),
+ PacketListField("lsaheaders", None, OSPF_LSA_Hdr,
+ count_from = lambda pkt: None,
+ length_from = lambda pkt: pkt.underlayer.len - 24 - 8)]
+
+ def guess_payload_class(self, payload):
+ # check presence of LLS data block flag
+ if self.options & 0x10 == 0x10:
+ return OSPF_LLS_Hdr
+ else:
+ return Packet.guess_payload_class(self, payload)
+
+
+class OSPF_LSReq_Item(Packet):
+ name = "OSPF Link State Request (item)"
+ fields_desc = [IntEnumField("type", 1, _OSPF_LStypes),
+ IPField("id", "1.1.1.1"),
+ IPField("adrouter", "1.1.1.1")]
+
+ def extract_padding(self, s):
+ return "", s
+
+
+class OSPF_LSReq(Packet):
+ name = "OSPF Link State Request (container)"
+ fields_desc = [PacketListField("requests", None, OSPF_LSReq_Item,
+ count_from = lambda pkt:None,
+ length_from = lambda pkt:pkt.underlayer.len - 24)]
+
+
+class OSPF_LSUpd(Packet):
+ name = "OSPF Link State Update"
+ fields_desc = [FieldLenField("lsacount", None, fmt="!I", count_of="lsalist"),
+ PacketListField("lsalist", [], _LSAGuessPayloadClass,
+ count_from = lambda pkt: pkt.lsacount,
+ length_from = lambda pkt: pkt.underlayer.len - 24)]
+
+
+class OSPF_LSAck(Packet):
+ name = "OSPF Link State Acknowledgement"
+ fields_desc = [PacketListField("lsaheaders", None, OSPF_LSA_Hdr,
+ count_from = lambda pkt: None,
+ length_from = lambda pkt: pkt.underlayer.len - 24)]
+
+ def answers(self, other):
+ if isinstance(other, OSPF_LSUpd):
+ for reqLSA in other.lsalist:
+ for ackLSA in self.lsaheaders:
+ if (reqLSA.type == ackLSA.type and
+ reqLSA.seq == ackLSA.seq):
+ return 1
+ return 0
+
+
+#------------------------------------------------------------------------------
+# OSPFv3
+#------------------------------------------------------------------------------
+# TODO: Add length_from / adjust functionality to IP6Field and remove this class
+class OspfIP6Field(StrField, IP6Field):
+ """
+ Special IP6Field for prefix fields in OSPFv3 LSAs
+ """
+
+ def __init__(self, name, default, length=None, length_from=None):
+ StrField.__init__(self, name, default)
+ self.length_from = length_from
+ if length is not None:
+ self.length_from = lambda pkt, length = length: length
+
+ def any2i(self, pkt, x):
+ return IP6Field.any2i(self, pkt, x)
+
+ def i2repr(self, pkt, x):
+ return IP6Field.i2repr(self, pkt, x)
+
+ def h2i(self, pkt, x):
+ return IP6Field.h2i(self, pkt, x)
+
+ def i2m(self, pkt, x):
+ x = inet_pton(socket.AF_INET6, x)
+ l = self.length_from(pkt)
+ l = self.prefixlen_to_bytelen(l)
+
+ return x[:l]
+
+ def m2i(self, pkt, x):
+ l = self.length_from(pkt)
+
+ prefixlen = self.prefixlen_to_bytelen(l)
+ if l > 128:
+ warning("OspfIP6Field: Prefix length is > 128. Dissection of this packet will fail")
+ else:
+ pad = "\x00" * (16 - prefixlen)
+ x += pad
+
+ return inet_ntop(socket.AF_INET6, x)
+
+ def prefixlen_to_bytelen(self, l):
+ if l <= 32:
+ return 4
+ elif l <= 64:
+ return 8
+ elif l <= 96:
+ return 12
+ else:
+ return 16
+
+ def i2len(self, pkt, x):
+ l = self.length_from(pkt)
+ l = self.prefixlen_to_bytelen(l)
+
+ return l
+
+ def getfield(self, pkt, s):
+ l = self.length_from(pkt)
+ l = self.prefixlen_to_bytelen(l)
+
+ return s[l:], self.m2i(pkt, s[:l])
+
+
+class OSPFv3_Hdr(Packet):
+ name = "OSPFv3 Header"
+ fields_desc = [ByteField("version", 3),
+ ByteEnumField("type", 1, _OSPF_types),
+ ShortField("len", None),
+ IPField("src", "1.1.1.1"),
+ IPField("area", "0.0.0.0"),
+ XShortField("chksum", None),
+ ByteField("instance", 0),
+ ByteField("reserved", 0)]
+
+ def post_build(self, p, pay):
+ p += pay
+ l = self.len
+
+ if l is None:
+ l = len(p)
+ p = p[:2] + struct.pack("!H", l) + p[4:]
+
+ if self.chksum is None:
+ chksum = in6_chksum(89, self.underlayer, p)
+ p = p[:12] + chr(chksum >> 8) + chr(chksum & 0xff) + p[14:]
+
+ return p
+
+
+class OSPFv3OptionsField(FlagsField):
+
+ def __init__(self, name="options", default=0, size=24,
+ names=["V6", "E", "MC", "N", "R", "DC", "AF", "L", "I", "F"]):
+ FlagsField.__init__(self, name, default, size, names)
+
+
+class OSPFv3_Hello(Packet):
+ name = "OSPFv3 Hello"
+ fields_desc = [IntField("intid", 0),
+ ByteField("prio", 1),
+ OSPFv3OptionsField(),
+ ShortField("hellointerval", 10),
+ ShortField("deadinterval", 40),
+ IPField("router", "0.0.0.0"),
+ IPField("backup", "0.0.0.0"),
+ FieldListField("neighbors", [], IPField("", "0.0.0.0"),
+ length_from=lambda pkt: (pkt.underlayer.len - 36))]
+
+
+_OSPFv3_LStypes = {0x2001: "router",
+ 0x2002: "network",
+ 0x2003: "interAreaPrefix",
+ 0x2004: "interAreaRouter",
+ 0x4005: "asExternal",
+ 0x2007: "type7",
+ 0x0008: "link",
+ 0x2009: "intraAreaPrefix"}
+
+_OSPFv3_LSclasses = {0x2001: "OSPFv3_Router_LSA",
+ 0x2002: "OSPFv3_Network_LSA",
+ 0x2003: "OSPFv3_Inter_Area_Prefix_LSA",
+ 0x2004: "OSPFv3_Inter_Area_Router_LSA",
+ 0x4005: "OSPFv3_AS_External_LSA",
+ 0x2007: "OSPFv3_Type_7_LSA",
+ 0x0008: "OSPFv3_Link_LSA",
+ 0x2009: "OSPFv3_Intra_Area_Prefix_LSA"}
+
+
+class OSPFv3_LSA_Hdr(Packet):
+ name = "OSPFv3 LSA Header"
+ fields_desc = [ShortField("age", 1),
+ ShortEnumField("type", 0x2001, _OSPFv3_LStypes),
+ IPField("id", "0.0.0.0"),
+ IPField("adrouter", "1.1.1.1"),
+ XIntField("seq", 0x80000001),
+ XShortField("chksum", 0),
+ ShortField("len", 36)]
+
+ def extract_padding(self, s):
+ return "", s
+
+
+def _OSPFv3_LSAGuessPayloadClass(p, **kargs):
+ """ Guess the correct OSPFv3 LSA class for a given payload """
+
+ cls = conf.raw_layer
+
+ if len(p) >= 6:
+ typ = struct.unpack("!H", p[2:4])[0]
+ clsname = _OSPFv3_LSclasses.get(typ, "Raw")
+ cls = globals()[clsname]
+
+ return cls(p, **kargs)
+
+
+_OSPFv3_Router_LSA_types = {1: "p2p",
+ 2: "transit",
+ 3: "reserved",
+ 4: "virtual"}
+
+
+class OSPFv3_Link(Packet):
+ name = "OSPFv3 Link"
+ fields_desc = [ByteEnumField("type", 1, _OSPFv3_Router_LSA_types),
+ ByteField("reserved", 0),
+ ShortField("metric", 10),
+ IntField("intid", 0),
+ IntField("neighintid", 0),
+ IPField("neighbor", "2.2.2.2")]
+
+ def extract_padding(self, s):
+ return "", s
+
+
+class OSPFv3_Router_LSA(OSPF_BaseLSA):
+ name = "OSPFv3 Router LSA"
+ fields_desc = [ShortField("age", 1),
+ ShortEnumField("type", 0x2001, _OSPFv3_LStypes),
+ IPField("id", "0.0.0.0"),
+ IPField("adrouter", "1.1.1.1"),
+ XIntField("seq", 0x80000001),
+ XShortField("chksum", None),
+ ShortField("len", None),
+ FlagsField("flags", 0, 8, ["B", "E", "V", "W"]),
+ OSPFv3OptionsField(),
+ PacketListField("linklist", [], OSPFv3_Link,
+ length_from=lambda pkt:pkt.len - 24)]
+
+
+class OSPFv3_Network_LSA(OSPF_BaseLSA):
+ name = "OSPFv3 Network LSA"
+ fields_desc = [ShortField("age", 1),
+ ShortEnumField("type", 0x2002, _OSPFv3_LStypes),
+ IPField("id", "0.0.0.0"),
+ IPField("adrouter", "1.1.1.1"),
+ XIntField("seq", 0x80000001),
+ XShortField("chksum", None),
+ ShortField("len", None),
+ ByteField("reserved", 0),
+ OSPFv3OptionsField(),
+ FieldListField("routerlist", [], IPField("", "0.0.0.1"),
+ length_from=lambda pkt: pkt.len - 24)]
+
+
+class OSPFv3PrefixOptionsField(FlagsField):
+
+ def __init__(self, name="prefixoptions", default=0, size=8,
+ names=["NU", "LA", "MC", "P"]):
+ FlagsField.__init__(self, name, default, size, names)
+
+
+class OSPFv3_Inter_Area_Prefix_LSA(OSPF_BaseLSA):
+ name = "OSPFv3 Inter Area Prefix LSA"
+ fields_desc = [ShortField("age", 1),
+ ShortEnumField("type", 0x2003, _OSPFv3_LStypes),
+ IPField("id", "0.0.0.0"),
+ IPField("adrouter", "1.1.1.1"),
+ XIntField("seq", 0x80000001),
+ XShortField("chksum", None),
+ ShortField("len", None),
+ ByteField("reserved", 0),
+ X3BytesField("metric", 10),
+ ByteField("prefixlen", 64),
+ OSPFv3PrefixOptionsField(),
+ ShortField("reserved2", 0),
+ OspfIP6Field("prefix", "2001:db8:0:42::", length_from=lambda pkt: pkt.prefixlen)]
+
+
+class OSPFv3_Inter_Area_Router_LSA(OSPF_BaseLSA):
+ name = "OSPFv3 Inter Area Router LSA"
+ fields_desc = [ShortField("age", 1),
+ ShortEnumField("type", 0x2004, _OSPFv3_LStypes),
+ IPField("id", "0.0.0.0"),
+ IPField("adrouter", "1.1.1.1"),
+ XIntField("seq", 0x80000001),
+ XShortField("chksum", None),
+ ShortField("len", None),
+ ByteField("reserved", 0),
+ X3BytesField("metric", 1),
+ IPField("router", "2.2.2.2")]
+
+
+class OSPFv3_AS_External_LSA(OSPF_BaseLSA):
+ name = "OSPFv3 AS External LSA"
+ fields_desc = [ShortField("age", 1),
+ ShortEnumField("type", 0x4005, _OSPFv3_LStypes),
+ IPField("id", "0.0.0.0"),
+ IPField("adrouter", "1.1.1.1"),
+ XIntField("seq", 0x80000001),
+ XShortField("chksum", None),
+ ShortField("len", None),
+ FlagsField("flags", 0, 8, ["T", "F", "E"]),
+ X3BytesField("metric", 20),
+ ByteField("prefixlen", 64),
+ OSPFv3PrefixOptionsField(),
+ ShortEnumField("reflstype", 0, _OSPFv3_LStypes),
+ OspfIP6Field("prefix", "2001:db8:0:42::", length_from=lambda pkt: pkt.prefixlen),
+ ConditionalField(IP6Field("fwaddr", "::"), lambda pkt: pkt.flags & 0x02 == 0x02),
+ ConditionalField(IntField("tag", 0), lambda pkt: pkt.flags & 0x01 == 0x01),
+ ConditionalField(IPField("reflsid", 0), lambda pkt: pkt.reflstype != 0)]
+
+
+class OSPFv3_Type_7_LSA(OSPFv3_AS_External_LSA):
+ name = "OSPFv3 Type 7 LSA"
+ type = 0x2007
+
+
+class OSPFv3_Prefix_Item(Packet):
+ name = "OSPFv3 Link Prefix Item"
+ fields_desc = [ByteField("prefixlen", 64),
+ OSPFv3PrefixOptionsField(),
+ ShortField("metric", 10),
+ OspfIP6Field("prefix", "2001:db8:0:42::", length_from=lambda pkt: pkt.prefixlen)]
+
+ def extract_padding(self, s):
+ return "", s
+
+
+class OSPFv3_Link_LSA(OSPF_BaseLSA):
+ name = "OSPFv3 Link LSA"
+ fields_desc = [ShortField("age", 1),
+ ShortEnumField("type", 0x0008, _OSPFv3_LStypes),
+ IPField("id", "0.0.0.0"),
+ IPField("adrouter", "1.1.1.1"),
+ XIntField("seq", 0x80000001),
+ XShortField("chksum", None),
+ ShortField("len", None),
+ ByteField("prio", 1),
+ OSPFv3OptionsField(),
+ IP6Field("lladdr", "fe80::"),
+ IntField("prefixes", 0),
+ PacketListField("prefixlist", None, OSPFv3_Prefix_Item,
+ count_from = lambda pkt: pkt.prefixes)]
+
+
+class OSPFv3_Intra_Area_Prefix_LSA(OSPF_BaseLSA):
+ name = "OSPFv3 Intra Area Prefix LSA"
+ fields_desc = [ShortField("age", 1),
+ ShortEnumField("type", 0x2009, _OSPFv3_LStypes),
+ IPField("id", "0.0.0.0"),
+ IPField("adrouter", "1.1.1.1"),
+ XIntField("seq", 0x80000001),
+ XShortField("chksum", None),
+ ShortField("len", None),
+ ShortField("prefixes", 0),
+ ShortEnumField("reflstype", 0, _OSPFv3_LStypes),
+ IPField("reflsid", "0.0.0.0"),
+ IPField("refadrouter", "0.0.0.0"),
+ PacketListField("prefixlist", None, OSPFv3_Prefix_Item,
+ count_from = lambda pkt: pkt.prefixes)]
+
+
+class OSPFv3_DBDesc(Packet):
+ name = "OSPFv3 Database Description"
+ fields_desc = [ByteField("reserved", 0),
+ OSPFv3OptionsField(),
+ ShortField("mtu", 1500),
+ ByteField("reserved2", 0),
+ FlagsField("dbdescr", 0, 8, ["MS", "M", "I", "R"]),
+ IntField("ddseq", 1),
+ PacketListField("lsaheaders", None, OSPFv3_LSA_Hdr,
+ count_from = lambda pkt:None,
+ length_from = lambda pkt:pkt.underlayer.len - 28)]
+
+
+class OSPFv3_LSReq_Item(Packet):
+ name = "OSPFv3 Link State Request (item)"
+ fields_desc = [ShortField("reserved", 0),
+ ShortEnumField("type", 0x2001, _OSPFv3_LStypes),
+ IPField("id", "1.1.1.1"),
+ IPField("adrouter", "1.1.1.1")]
+
+ def extract_padding(self, s):
+ return "", s
+
+
+class OSPFv3_LSReq(Packet):
+ name = "OSPFv3 Link State Request (container)"
+ fields_desc = [PacketListField("requests", None, OSPFv3_LSReq_Item,
+ count_from = lambda pkt:None,
+ length_from = lambda pkt:pkt.underlayer.len - 16)]
+
+
+class OSPFv3_LSUpd(Packet):
+ name = "OSPFv3 Link State Update"
+ fields_desc = [FieldLenField("lsacount", None, fmt="!I", count_of="lsalist"),
+ PacketListField("lsalist", [], _OSPFv3_LSAGuessPayloadClass,
+ count_from = lambda pkt:pkt.lsacount,
+ length_from = lambda pkt:pkt.underlayer.len - 16)]
+
+
+class OSPFv3_LSAck(Packet):
+ name = "OSPFv3 Link State Acknowledgement"
+ fields_desc = [PacketListField("lsaheaders", None, OSPFv3_LSA_Hdr,
+ count_from = lambda pkt:None,
+ length_from = lambda pkt:pkt.underlayer.len - 16)]
+
+
+bind_layers(IP, OSPF_Hdr, proto=89)
+bind_layers(OSPF_Hdr, OSPF_Hello, type=1)
+bind_layers(OSPF_Hdr, OSPF_DBDesc, type=2)
+bind_layers(OSPF_Hdr, OSPF_LSReq, type=3)
+bind_layers(OSPF_Hdr, OSPF_LSUpd, type=4)
+bind_layers(OSPF_Hdr, OSPF_LSAck, type=5)
+
+bind_layers(IPv6, OSPFv3_Hdr, nh=89)
+bind_layers(OSPFv3_Hdr, OSPFv3_Hello, type=1)
+bind_layers(OSPFv3_Hdr, OSPFv3_DBDesc, type=2)
+bind_layers(OSPFv3_Hdr, OSPFv3_LSReq, type=3)
+bind_layers(OSPFv3_Hdr, OSPFv3_LSUpd, type=4)
+bind_layers(OSPFv3_Hdr, OSPFv3_LSAck, type=5)
+
+
+if __name__ == "__main__":
+ interact(mydict=globals(), mybanner="OSPF extension %s" % EXT_VERSION)