summaryrefslogtreecommitdiffstats
path: root/external_libs/python/dpkt-1.8.6.2
diff options
context:
space:
mode:
Diffstat (limited to 'external_libs/python/dpkt-1.8.6.2')
-rw-r--r--external_libs/python/dpkt-1.8.6.2/AUTHORS60
-rw-r--r--external_libs/python/dpkt-1.8.6.2/CHANGES71
-rw-r--r--external_libs/python/dpkt-1.8.6.2/LICENSE28
-rw-r--r--external_libs/python/dpkt-1.8.6.2/MANIFEST.in7
-rw-r--r--external_libs/python/dpkt-1.8.6.2/PKG-INFO82
-rw-r--r--external_libs/python/dpkt-1.8.6.2/README.md39
-rw-r--r--external_libs/python/dpkt-1.8.6.2/README.rst64
-rw-r--r--external_libs/python/dpkt-1.8.6.2/docs/Makefile153
-rw-r--r--external_libs/python/dpkt-1.8.6.2/docs/api/api_auto.rst545
-rw-r--r--external_libs/python/dpkt-1.8.6.2/docs/api/index.rst11
-rw-r--r--external_libs/python/dpkt-1.8.6.2/docs/authors.rst7
-rw-r--r--external_libs/python/dpkt-1.8.6.2/docs/badges.rst41
-rw-r--r--external_libs/python/dpkt-1.8.6.2/docs/changelog.rst4
-rw-r--r--external_libs/python/dpkt-1.8.6.2/docs/conf.py76
-rw-r--r--external_libs/python/dpkt-1.8.6.2/docs/contributing.rst45
-rw-r--r--external_libs/python/dpkt-1.8.6.2/docs/examples.rst80
-rw-r--r--external_libs/python/dpkt-1.8.6.2/docs/index.rst32
-rw-r--r--external_libs/python/dpkt-1.8.6.2/docs/installation.rst21
-rw-r--r--external_libs/python/dpkt-1.8.6.2/docs/license.rst4
-rw-r--r--external_libs/python/dpkt-1.8.6.2/docs/plans.rst13
-rw-r--r--external_libs/python/dpkt-1.8.6.2/docs/requirements.txt3
-rw-r--r--external_libs/python/dpkt-1.8.6.2/dpkt.egg-info/PKG-INFO82
-rw-r--r--external_libs/python/dpkt-1.8.6.2/dpkt.egg-info/SOURCES.txt96
-rw-r--r--external_libs/python/dpkt-1.8.6.2/dpkt.egg-info/dependency_links.txt1
-rw-r--r--external_libs/python/dpkt-1.8.6.2/dpkt.egg-info/not-zip-safe1
-rw-r--r--external_libs/python/dpkt-1.8.6.2/dpkt.egg-info/top_level.txt1
-rw-r--r--external_libs/python/dpkt-1.8.6.2/dpkt/__init__.py71
-rw-r--r--external_libs/python/dpkt-1.8.6.2/dpkt/ah.py35
-rw-r--r--external_libs/python/dpkt-1.8.6.2/dpkt/aim.py52
-rw-r--r--external_libs/python/dpkt-1.8.6.2/dpkt/aoe.py90
-rw-r--r--external_libs/python/dpkt-1.8.6.2/dpkt/aoeata.py35
-rw-r--r--external_libs/python/dpkt-1.8.6.2/dpkt/aoecfg.py25
-rw-r--r--external_libs/python/dpkt-1.8.6.2/dpkt/arp.py32
-rw-r--r--external_libs/python/dpkt-1.8.6.2/dpkt/asn1.py121
-rw-r--r--external_libs/python/dpkt-1.8.6.2/dpkt/bgp.py789
-rw-r--r--external_libs/python/dpkt-1.8.6.2/dpkt/cdp.py99
-rw-r--r--external_libs/python/dpkt-1.8.6.2/dpkt/crc32c.py83
-rw-r--r--external_libs/python/dpkt-1.8.6.2/dpkt/decorators.py91
-rw-r--r--external_libs/python/dpkt-1.8.6.2/dpkt/dhcp.py169
-rw-r--r--external_libs/python/dpkt-1.8.6.2/dpkt/diameter.py243
-rw-r--r--external_libs/python/dpkt-1.8.6.2/dpkt/dns.py462
-rw-r--r--external_libs/python/dpkt-1.8.6.2/dpkt/dpkt.py176
-rw-r--r--external_libs/python/dpkt-1.8.6.2/dpkt/dtp.py26
-rw-r--r--external_libs/python/dpkt-1.8.6.2/dpkt/esp.py12
-rw-r--r--external_libs/python/dpkt-1.8.6.2/dpkt/ethernet.py145
-rw-r--r--external_libs/python/dpkt-1.8.6.2/dpkt/gre.py127
-rw-r--r--external_libs/python/dpkt-1.8.6.2/dpkt/gzip.py123
-rw-r--r--external_libs/python/dpkt-1.8.6.2/dpkt/h225.py213
-rw-r--r--external_libs/python/dpkt-1.8.6.2/dpkt/hsrp.py33
-rw-r--r--external_libs/python/dpkt-1.8.6.2/dpkt/http.py259
-rw-r--r--external_libs/python/dpkt-1.8.6.2/dpkt/icmp.py127
-rw-r--r--external_libs/python/dpkt-1.8.6.2/dpkt/icmp6.py77
-rw-r--r--external_libs/python/dpkt-1.8.6.2/dpkt/ieee80211.py875
-rw-r--r--external_libs/python/dpkt-1.8.6.2/dpkt/igmp.py19
-rw-r--r--external_libs/python/dpkt-1.8.6.2/dpkt/ip.py359
-rw-r--r--external_libs/python/dpkt-1.8.6.2/dpkt/ip6.py383
-rw-r--r--external_libs/python/dpkt-1.8.6.2/dpkt/ipx.py18
-rw-r--r--external_libs/python/dpkt-1.8.6.2/dpkt/llc.py56
-rw-r--r--external_libs/python/dpkt-1.8.6.2/dpkt/loopback.py25
-rw-r--r--external_libs/python/dpkt-1.8.6.2/dpkt/mrt.py96
-rw-r--r--external_libs/python/dpkt-1.8.6.2/dpkt/netbios.py166
-rw-r--r--external_libs/python/dpkt-1.8.6.2/dpkt/netflow.py219
-rw-r--r--external_libs/python/dpkt-1.8.6.2/dpkt/ntp.py113
-rw-r--r--external_libs/python/dpkt-1.8.6.2/dpkt/ospf.py27
-rw-r--r--external_libs/python/dpkt-1.8.6.2/dpkt/pcap.py172
-rw-r--r--external_libs/python/dpkt-1.8.6.2/dpkt/pim.py46
-rw-r--r--external_libs/python/dpkt-1.8.6.2/dpkt/pmap.py18
-rw-r--r--external_libs/python/dpkt-1.8.6.2/dpkt/ppp.py66
-rw-r--r--external_libs/python/dpkt-1.8.6.2/dpkt/pppoe.py61
-rw-r--r--external_libs/python/dpkt-1.8.6.2/dpkt/qq.py224
-rw-r--r--external_libs/python/dpkt-1.8.6.2/dpkt/radiotap.py532
-rw-r--r--external_libs/python/dpkt-1.8.6.2/dpkt/radius.py91
-rw-r--r--external_libs/python/dpkt-1.8.6.2/dpkt/rfb.py90
-rw-r--r--external_libs/python/dpkt-1.8.6.2/dpkt/rip.py89
-rw-r--r--external_libs/python/dpkt-1.8.6.2/dpkt/rpc.py161
-rw-r--r--external_libs/python/dpkt-1.8.6.2/dpkt/rtp.py127
-rw-r--r--external_libs/python/dpkt-1.8.6.2/dpkt/rx.py45
-rw-r--r--external_libs/python/dpkt-1.8.6.2/dpkt/sccp.py214
-rw-r--r--external_libs/python/dpkt-1.8.6.2/dpkt/sctp.py95
-rw-r--r--external_libs/python/dpkt-1.8.6.2/dpkt/sip.py33
-rw-r--r--external_libs/python/dpkt-1.8.6.2/dpkt/sll.py26
-rw-r--r--external_libs/python/dpkt-1.8.6.2/dpkt/smb.py20
-rw-r--r--external_libs/python/dpkt-1.8.6.2/dpkt/snoop.py122
-rw-r--r--external_libs/python/dpkt-1.8.6.2/dpkt/ssl.py579
-rw-r--r--external_libs/python/dpkt-1.8.6.2/dpkt/ssl_ciphersuites.py76
-rw-r--r--external_libs/python/dpkt-1.8.6.2/dpkt/stp.py22
-rw-r--r--external_libs/python/dpkt-1.8.6.2/dpkt/stun.py47
-rw-r--r--external_libs/python/dpkt-1.8.6.2/dpkt/tcp.py152
-rw-r--r--external_libs/python/dpkt-1.8.6.2/dpkt/telnet.py80
-rw-r--r--external_libs/python/dpkt-1.8.6.2/dpkt/tftp.py56
-rw-r--r--external_libs/python/dpkt-1.8.6.2/dpkt/tns.py26
-rw-r--r--external_libs/python/dpkt-1.8.6.2/dpkt/tpkt.py16
-rw-r--r--external_libs/python/dpkt-1.8.6.2/dpkt/udp.py17
-rw-r--r--external_libs/python/dpkt-1.8.6.2/dpkt/vrrp.py70
-rw-r--r--external_libs/python/dpkt-1.8.6.2/dpkt/yahoo.py30
-rw-r--r--external_libs/python/dpkt-1.8.6.2/setup.cfg20
-rw-r--r--external_libs/python/dpkt-1.8.6.2/setup.py67
97 files changed, 11128 insertions, 0 deletions
diff --git a/external_libs/python/dpkt-1.8.6.2/AUTHORS b/external_libs/python/dpkt-1.8.6.2/AUTHORS
new file mode 100644
index 00000000..dcefbef9
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/AUTHORS
@@ -0,0 +1,60 @@
+
+Original author
+---------------
+
+Dug Song <dugsong@monkey.org>
+
+
+Contributors
+------------
+
+Timur Alperovich <timuralp@umich.edu>
+ radiotap module
+
+Nic Bellamy <nic.bellamy@vadacom.co.nz>
+ HTTP header parsing fix
+
+the grugq <thegrugq@gmail.com>
+ better RTP module
+
+David Helder <dhelder@gizmolabs.org>
+ bug fixes
+
+Przemyslaw Karwasiecki <karwas@gmail.com>
+ TABLE_DUMP in MRT module
+
+Reza Lotun <rlotun@cs.ubc.ca>
+ MetaPacket cleanup
+
+Jeff Nathan <jeff@snort.org>
+ bug fixes
+
+Tim Newsham <newsham@lava.net>
+ IPv6 bugfixing and improvements
+
+keisuke.nishimoto@gmail.com
+ Snoop file parser
+
+Jon Oberheide <jon@oberheide.org>
+ STUN, H.225, TPKT, NTP, RIP, Diameter, SCTP, BGP, MRT, RX modules
+
+plotnikoff@gmail.com
+ handle dynamic imports from py2exe/freeze.py/zipped egg packages
+
+simdream@gmail.com
+ handle multiple cookie values in HTTP
+
+Owen Stephens <owen@owenstephens.co.uk>
+ IP6 extension header support
+
+Robert Stone <otaku@monkey.org>
+ Netflow and QQ modules
+
+Thomas Taranowski <thomastaranowski@yahoo.com>
+ dnet IP checksum bug on i386
+
+Jirka Vejrazka
+ bug fixes
+
+Tim Yardley <yardley@gmail.com>
+ DHCP definitions
diff --git a/external_libs/python/dpkt-1.8.6.2/CHANGES b/external_libs/python/dpkt-1.8.6.2/CHANGES
new file mode 100644
index 00000000..a5f05121
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/CHANGES
@@ -0,0 +1,71 @@
+dpkg-1.8:
+ - fix a typo in vrrp.py
+ - fix IPv4 and IPv6 packet to correctly handle zero payload length
+ - store cipher_suite as int in TLSServerHello to allow app-specific messages
+ - improve SSL parsing
+
+dpkt-1.7:
+ - handle dynamic imports from py2exe/freeze.py/zipped egg
+ packages, from plotnikoff
+ - decode Ethernet MPLS labels, Cisco ISL VLAN tags, 802.2 LLC fields
+ - handle multiply-defined HTTP headers from simdream
+ - add IPv6 extension header support (minus ESP) from Owen Stephens
+ - add radiotap module from Timur Alperovich
+ - add IEEE80211 module from Jon Oberheide
+ - add RFB module from Jon Oberheide
+ - fix IP6 checksum to include options
+ - rename 'as' to 'asn' field in BGP header
+ - fix transport-layer checksum in IP6
+ - handle improper TCP header offset
+ - fix SSL typo
+ - handle malformed ICMP headers
+ - added RX module from Jon Oberheide
+ - fixed loopback module IP/IP6 decoding
+ - set transport-layer (TCP, UDP) checksum in IP
+ - MRT module fixes
+ - fix pcap.Writer timestamp calculation
+
+dpkt-1.6:
+ - DNS RR packing fixed
+ - added STUN, H.225, TPKT, NTP, RIP, Diameter, SCTP,
+ BGP, and MRT modules from Jon Oberheide
+ - new dpkt.NeedData exception
+
+dpkt-1.5:
+ - IP6 checksum fix
+ - __getitem__() interface to Packet (e.g. ip['src'] == ip.src)
+ - faster Ethernet, IP, PPP module loading
+ - support any endianness capture file in pcap module,
+ and export a pypcap-compatible Reader
+ - additional CDP definitions
+ - replaced rtp module with the grugq's version
+ - added QQ module from Robert Stone
+ - added gzip module
+ - added PPPoE module
+ - added RADIUS module
+
+dpkt-1.4:
+ - fix IP checksum bug on i386, caught by Thomas Taranowski
+
+dpkt-1.3:
+ - autoload IP, Ethernet dispatch tables
+ - IP6 bugfixes from Tim Newsham
+ - additional DHCP definitions from Tim Yardley
+ - HTTP bugfixes and abstraction (see SIP)
+ - RPC bugfixes
+ - added pypcap-compatible PcapReader
+ - added Linux libpcap "cooked" capture module
+ - added preliminary SSL module
+ - added SIP module
+ - added SCCP module
+ - added RTP module
+ - added Portmap module
+
+dpkt-1.2:
+ - changed license from GPL to BSD
+ - added DTP module
+ - added HTTP module
+ - added DNS RR decodes
+ - added enough PPP to decode PPTP GRE encapsulation
+
+# $Id: CHANGES 379 2006-07-27 05:23:19Z dugsong $
diff --git a/external_libs/python/dpkt-1.8.6.2/LICENSE b/external_libs/python/dpkt-1.8.6.2/LICENSE
new file mode 100644
index 00000000..99d14371
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/LICENSE
@@ -0,0 +1,28 @@
+
+ Copyright (c) 2004 Dug Song <dugsong@monkey.org>
+ All rights reserved, all wrongs reversed.
+
+ Redistribution and use in source and binary forms, with or without
+ modification, are permitted provided that the following conditions
+ are met:
+
+ 1. Redistributions of source code must retain the above copyright
+ notice, this list of conditions and the following disclaimer.
+ 2. Redistributions in binary form must reproduce the above copyright
+ notice, this list of conditions and the following disclaimer in the
+ documentation and/or other materials provided with the distribution.
+ 3. The names of the authors and copyright holders may not be used to
+ endorse or promote products derived from this software without
+ specific prior written permission.
+
+ THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES,
+ INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY
+ AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
+ THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
+ EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
+ PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;
+ OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
+ WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
+ OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
+ ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+
diff --git a/external_libs/python/dpkt-1.8.6.2/MANIFEST.in b/external_libs/python/dpkt-1.8.6.2/MANIFEST.in
new file mode 100644
index 00000000..2d5c155a
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/MANIFEST.in
@@ -0,0 +1,7 @@
+
+include AUTHORS CHANGES README.rst LICENSE
+
+recursive-include docs *
+prune docs/_build
+
+global-exclude __pycache__/*
diff --git a/external_libs/python/dpkt-1.8.6.2/PKG-INFO b/external_libs/python/dpkt-1.8.6.2/PKG-INFO
new file mode 100644
index 00000000..baf82a26
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/PKG-INFO
@@ -0,0 +1,82 @@
+Metadata-Version: 1.1
+Name: dpkt
+Version: 1.8.6.2
+Summary: fast, simple packet creation / parsing, with definitions for the basic TCP/IP protocols
+Home-page: http://dpkt.googlecode.com/
+Author: Dug Song
+Author-email: dugsong@monkey.org
+License: BSD
+Description:
+ ====
+ dpkt
+ ====
+
+ | |travis| |coveralls| |landscape| |downloads|
+ | |version| |wheel| |supported-versions| |supported-implementations|
+
+ .. |travis| image:: http://img.shields.io/travis/kbandla/dpkt.svg
+ :alt: Travis-CI Build Status
+ :target: https://travis-ci.org/kbandla/dpkt
+
+ .. |coveralls| image:: http://img.shields.io/coveralls/kbandla/dpkt.svg
+ :alt: Coverage Status
+ :target: https://coveralls.io/r/kbandla/dpkt
+
+ .. |landscape| image:: https://landscape.io/github/kbandla/dpkt/master/landscape.svg
+ :target: https://landscape.io/github/kbandla/dpkt/master
+ :alt: Code Quality Status
+
+ .. |version| image:: http://img.shields.io/pypi/v/dpkt.svg
+ :alt: PyPI Package latest release
+ :target: https://pypi.python.org/pypi/dpkt
+
+ .. |downloads| image:: http://img.shields.io/pypi/dm/dpkt.svg
+ :alt: PyPI Package monthly downloads
+ :target: https://pypi.python.org/pypi/dpkt
+
+ .. |wheel| image:: https://img.shields.io/pypi/wheel/dpkt.svg
+ :alt: PyPI Wheel
+ :target: https://pypi.python.org/pypi/dpkt
+
+ .. |supported-versions| image:: https://img.shields.io/pypi/pyversions/dpkt.svg
+ :alt: Supported versions
+ :target: https://pypi.python.org/pypi/dpkt
+
+ .. |supported-implementations| image:: https://img.shields.io/pypi/implementation/dpkt.svg
+ :alt: Supported implementations
+ :target: https://pypi.python.org/pypi/dpkt
+
+ Installation
+ ============
+
+ ::
+
+ pip install dpkt
+
+ Documentation
+ =============
+
+ https://dpkt.readthedocs.org/
+
+ About
+ =====
+
+ This code is based on `dpkt code <https://code.google.com/p/dpkt/>`__ lead by Dug Song and
+ is now being maintained and improved by an extended set of
+ `contributors <https://dpkt.readthedocs.org/en/latest/authors.html>`__
+ and `developers <https://github.com/kbandla/dpkt/graphs/contributors>`__.
+
+ LICENSE
+ -------
+
+ BSD 3-Clause
+
+Platform: UNKNOWN
+Classifier: Development Status :: 4 - Beta
+Classifier: Intended Audience :: Developers
+Classifier: License :: OSI Approved :: BSD License
+Classifier: Natural Language :: English
+Classifier: Programming Language :: Python :: 2.6
+Classifier: Programming Language :: Python :: 2.7
+Classifier: Programming Language :: Python :: Implementation :: CPython
+Classifier: Programming Language :: Python :: Implementation :: PyPy
diff --git a/external_libs/python/dpkt-1.8.6.2/README.md b/external_libs/python/dpkt-1.8.6.2/README.md
new file mode 100644
index 00000000..fc637836
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/README.md
@@ -0,0 +1,39 @@
+dpkt
+====
+
+**A fast, simple packet creation/parsing python module with definitions for the basic TCP/IP protocols.**
+
+[![travis](http://img.shields.io/travis/kbandla/dpkt.svg)](https://travis-ci.org/kbandla/dpkt)
+[![coveralls](http://img.shields.io/coveralls/kbandla/dpkt.svg)](https://coveralls.io/r/kbandla/dpkt)
+[![landscape](https://landscape.io/github/kbandla/dpkt/master/landscape.svg)](https://landscape.io/github/kbandla/dpkt/master)
+[![version](http://img.shields.io/pypi/v/dpkt.svg)](https://pypi.python.org/pypi/dpkt)
+[![downloads](https://img.shields.io/pypi/dm/dpkt.svg)](https://pypi.python.org/pypi/dpkt)
+
+[![wheel](https://img.shields.io/pypi/wheel/dpkt.svg)](https://pypi.python.org/pypi/dpkt)
+[![supported-versions](https://img.shields.io/pypi/pyversions/dpkt.svg)](https://pypi.python.org/pypi/dpkt)
+[![supported-implementations](https://img.shields.io/pypi/implementation/dpkt.svg)](https://pypi.python.org/pypi/dpkt)
+[![On Deck](https://badge.waffle.io/kbandla/dpkt.svg?label=on%20deck&title=On%20Deck)](http://waffle.io/kbandla/dpkt)
+[![In Progress](https://badge.waffle.io/kbandla/dpkt.svg?label=in%20progress&title=In%20Progress)](http://waffle.io/kbandla/dpkt)
+
+Installation
+------------
+
+ pip install dpkt
+
+Documentation
+-------------
+
+**[dpkt.readthedocs.org](https://dpkt.readthedocs.org/)**
+
+
+About
+-----
+
+This code is based on [dpkt code](https://code.google.com/p/dpkt/) lead
+by Dug Song and is now being maintained and improved by an extended set of [contributors](https://dpkt.readthedocs.org/en/latest/authors.html)
+ and [developers](https://github.com/kbandla/dpkt/graphs/contributors).
+
+
+#### LICENSE
+
+BSD 3-Clause \ No newline at end of file
diff --git a/external_libs/python/dpkt-1.8.6.2/README.rst b/external_libs/python/dpkt-1.8.6.2/README.rst
new file mode 100644
index 00000000..b4e1b966
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/README.rst
@@ -0,0 +1,64 @@
+
+====
+dpkt
+====
+
+| |travis| |coveralls| |landscape| |downloads|
+| |version| |wheel| |supported-versions| |supported-implementations|
+
+.. |travis| image:: http://img.shields.io/travis/kbandla/dpkt.svg
+ :alt: Travis-CI Build Status
+ :target: https://travis-ci.org/kbandla/dpkt
+
+.. |coveralls| image:: http://img.shields.io/coveralls/kbandla/dpkt.svg
+ :alt: Coverage Status
+ :target: https://coveralls.io/r/kbandla/dpkt
+
+.. |landscape| image:: https://landscape.io/github/kbandla/dpkt/master/landscape.svg
+ :target: https://landscape.io/github/kbandla/dpkt/master
+ :alt: Code Quality Status
+
+.. |version| image:: http://img.shields.io/pypi/v/dpkt.svg
+ :alt: PyPI Package latest release
+ :target: https://pypi.python.org/pypi/dpkt
+
+.. |downloads| image:: http://img.shields.io/pypi/dm/dpkt.svg
+ :alt: PyPI Package monthly downloads
+ :target: https://pypi.python.org/pypi/dpkt
+
+.. |wheel| image:: https://img.shields.io/pypi/wheel/dpkt.svg
+ :alt: PyPI Wheel
+ :target: https://pypi.python.org/pypi/dpkt
+
+.. |supported-versions| image:: https://img.shields.io/pypi/pyversions/dpkt.svg
+ :alt: Supported versions
+ :target: https://pypi.python.org/pypi/dpkt
+
+.. |supported-implementations| image:: https://img.shields.io/pypi/implementation/dpkt.svg
+ :alt: Supported implementations
+ :target: https://pypi.python.org/pypi/dpkt
+
+Installation
+============
+
+::
+
+ pip install dpkt
+
+Documentation
+=============
+
+https://dpkt.readthedocs.org/
+
+About
+=====
+
+This code is based on `dpkt code <https://code.google.com/p/dpkt/>`__ lead by Dug Song and
+is now being maintained and improved by an extended set of
+`contributors <https://dpkt.readthedocs.org/en/latest/authors.html>`__
+and `developers <https://github.com/kbandla/dpkt/graphs/contributors>`__.
+
+LICENSE
+-------
+
+BSD 3-Clause
diff --git a/external_libs/python/dpkt-1.8.6.2/docs/Makefile b/external_libs/python/dpkt-1.8.6.2/docs/Makefile
new file mode 100644
index 00000000..2687c750
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/docs/Makefile
@@ -0,0 +1,153 @@
+# Makefile for Sphinx documentation
+#
+
+# You can set these variables from the command line.
+SPHINXOPTS =
+SPHINXBUILD = sphinx-build
+PAPER =
+BUILDDIR = _build
+
+# Internal variables.
+PAPEROPT_a4 = -D latex_paper_size=a4
+PAPEROPT_letter = -D latex_paper_size=letter
+ALLSPHINXOPTS = -d $(BUILDDIR)/doctrees $(PAPEROPT_$(PAPER)) $(SPHINXOPTS) .
+# the i18n builder cannot share the environment and doctrees with the others
+I18NSPHINXOPTS = $(PAPEROPT_$(PAPER)) $(SPHINXOPTS) .
+
+.PHONY: help clean html dirhtml singlehtml pickle json htmlhelp qthelp devhelp epub latex latexpdf text man changes linkcheck doctest gettext
+
+help:
+ @echo "Please use \`make <target>' where <target> is one of"
+ @echo " html to make standalone HTML files"
+ @echo " dirhtml to make HTML files named index.html in directories"
+ @echo " singlehtml to make a single large HTML file"
+ @echo " pickle to make pickle files"
+ @echo " json to make JSON files"
+ @echo " htmlhelp to make HTML files and a HTML help project"
+ @echo " qthelp to make HTML files and a qthelp project"
+ @echo " devhelp to make HTML files and a Devhelp project"
+ @echo " epub to make an epub"
+ @echo " latex to make LaTeX files, you can set PAPER=a4 or PAPER=letter"
+ @echo " latexpdf to make LaTeX files and run them through pdflatex"
+ @echo " text to make text files"
+ @echo " man to make manual pages"
+ @echo " texinfo to make Texinfo files"
+ @echo " info to make Texinfo files and run them through makeinfo"
+ @echo " gettext to make PO message catalogs"
+ @echo " changes to make an overview of all changed/added/deprecated items"
+ @echo " linkcheck to check all external links for integrity"
+ @echo " doctest to run all doctests embedded in the documentation (if enabled)"
+
+clean:
+ -rm -rf $(BUILDDIR)/*
+
+html:
+ $(SPHINXBUILD) -b html $(ALLSPHINXOPTS) $(BUILDDIR)/html
+ @echo
+ @echo "Build finished. The HTML pages are in $(BUILDDIR)/html."
+
+dirhtml:
+ $(SPHINXBUILD) -b dirhtml $(ALLSPHINXOPTS) $(BUILDDIR)/dirhtml
+ @echo
+ @echo "Build finished. The HTML pages are in $(BUILDDIR)/dirhtml."
+
+singlehtml:
+ $(SPHINXBUILD) -b singlehtml $(ALLSPHINXOPTS) $(BUILDDIR)/singlehtml
+ @echo
+ @echo "Build finished. The HTML page is in $(BUILDDIR)/singlehtml."
+
+pickle:
+ $(SPHINXBUILD) -b pickle $(ALLSPHINXOPTS) $(BUILDDIR)/pickle
+ @echo
+ @echo "Build finished; now you can process the pickle files."
+
+json:
+ $(SPHINXBUILD) -b json $(ALLSPHINXOPTS) $(BUILDDIR)/json
+ @echo
+ @echo "Build finished; now you can process the JSON files."
+
+htmlhelp:
+ $(SPHINXBUILD) -b htmlhelp $(ALLSPHINXOPTS) $(BUILDDIR)/htmlhelp
+ @echo
+ @echo "Build finished; now you can run HTML Help Workshop with the" \
+ ".hhp project file in $(BUILDDIR)/htmlhelp."
+
+qthelp:
+ $(SPHINXBUILD) -b qthelp $(ALLSPHINXOPTS) $(BUILDDIR)/qthelp
+ @echo
+ @echo "Build finished; now you can run "qcollectiongenerator" with the" \
+ ".qhcp project file in $(BUILDDIR)/qthelp, like this:"
+ @echo "# qcollectiongenerator $(BUILDDIR)/qthelp/pyspotify.qhcp"
+ @echo "To view the help file:"
+ @echo "# assistant -collectionFile $(BUILDDIR)/qthelp/pyspotify.qhc"
+
+devhelp:
+ $(SPHINXBUILD) -b devhelp $(ALLSPHINXOPTS) $(BUILDDIR)/devhelp
+ @echo
+ @echo "Build finished."
+ @echo "To view the help file:"
+ @echo "# mkdir -p $$HOME/.local/share/devhelp/pyspotify"
+ @echo "# ln -s $(BUILDDIR)/devhelp $$HOME/.local/share/devhelp/pyspotify"
+ @echo "# devhelp"
+
+epub:
+ $(SPHINXBUILD) -b epub $(ALLSPHINXOPTS) $(BUILDDIR)/epub
+ @echo
+ @echo "Build finished. The epub file is in $(BUILDDIR)/epub."
+
+latex:
+ $(SPHINXBUILD) -b latex $(ALLSPHINXOPTS) $(BUILDDIR)/latex
+ @echo
+ @echo "Build finished; the LaTeX files are in $(BUILDDIR)/latex."
+ @echo "Run \`make' in that directory to run these through (pdf)latex" \
+ "(use \`make latexpdf' here to do that automatically)."
+
+latexpdf:
+ $(SPHINXBUILD) -b latex $(ALLSPHINXOPTS) $(BUILDDIR)/latex
+ @echo "Running LaTeX files through pdflatex..."
+ $(MAKE) -C $(BUILDDIR)/latex all-pdf
+ @echo "pdflatex finished; the PDF files are in $(BUILDDIR)/latex."
+
+text:
+ $(SPHINXBUILD) -b text $(ALLSPHINXOPTS) $(BUILDDIR)/text
+ @echo
+ @echo "Build finished. The text files are in $(BUILDDIR)/text."
+
+man:
+ $(SPHINXBUILD) -b man $(ALLSPHINXOPTS) $(BUILDDIR)/man
+ @echo
+ @echo "Build finished. The manual pages are in $(BUILDDIR)/man."
+
+texinfo:
+ $(SPHINXBUILD) -b texinfo $(ALLSPHINXOPTS) $(BUILDDIR)/texinfo
+ @echo
+ @echo "Build finished. The Texinfo files are in $(BUILDDIR)/texinfo."
+ @echo "Run \`make' in that directory to run these through makeinfo" \
+ "(use \`make info' here to do that automatically)."
+
+info:
+ $(SPHINXBUILD) -b texinfo $(ALLSPHINXOPTS) $(BUILDDIR)/texinfo
+ @echo "Running Texinfo files through makeinfo..."
+ make -C $(BUILDDIR)/texinfo info
+ @echo "makeinfo finished; the Info files are in $(BUILDDIR)/texinfo."
+
+gettext:
+ $(SPHINXBUILD) -b gettext $(I18NSPHINXOPTS) $(BUILDDIR)/locale
+ @echo
+ @echo "Build finished. The message catalogs are in $(BUILDDIR)/locale."
+
+changes:
+ $(SPHINXBUILD) -b changes $(ALLSPHINXOPTS) $(BUILDDIR)/changes
+ @echo
+ @echo "The overview file is in $(BUILDDIR)/changes."
+
+linkcheck:
+ $(SPHINXBUILD) -b linkcheck $(ALLSPHINXOPTS) $(BUILDDIR)/linkcheck
+ @echo
+ @echo "Link check complete; look for any errors in the above output " \
+ "or in $(BUILDDIR)/linkcheck/output.txt."
+
+doctest:
+ $(SPHINXBUILD) -b doctest $(ALLSPHINXOPTS) $(BUILDDIR)/doctest
+ @echo "Testing of doctests in the sources finished, look at the " \
+ "results in $(BUILDDIR)/doctest/output.txt."
diff --git a/external_libs/python/dpkt-1.8.6.2/docs/api/api_auto.rst b/external_libs/python/dpkt-1.8.6.2/docs/api/api_auto.rst
new file mode 100644
index 00000000..3837c903
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/docs/api/api_auto.rst
@@ -0,0 +1,545 @@
+
+dpkt.ah module
+--------------
+
+.. automodule:: dpkt.ah
+ :members:
+ :undoc-members:
+ :show-inheritance:
+
+dpkt.aim module
+---------------
+
+.. automodule:: dpkt.aim
+ :members:
+ :undoc-members:
+ :show-inheritance:
+
+dpkt.aoe module
+---------------
+
+.. automodule:: dpkt.aoe
+ :members:
+ :undoc-members:
+ :show-inheritance:
+
+dpkt.aoeata module
+------------------
+
+.. automodule:: dpkt.aoeata
+ :members:
+ :undoc-members:
+ :show-inheritance:
+
+dpkt.aoecfg module
+------------------
+
+.. automodule:: dpkt.aoecfg
+ :members:
+ :undoc-members:
+ :show-inheritance:
+
+dpkt.arp module
+---------------
+
+.. automodule:: dpkt.arp
+ :members:
+ :undoc-members:
+ :show-inheritance:
+
+dpkt.asn1 module
+----------------
+
+.. automodule:: dpkt.asn1
+ :members:
+ :undoc-members:
+ :show-inheritance:
+
+dpkt.bgp module
+---------------
+
+.. automodule:: dpkt.bgp
+ :members:
+ :undoc-members:
+ :show-inheritance:
+
+dpkt.cdp module
+---------------
+
+.. automodule:: dpkt.cdp
+ :members:
+ :undoc-members:
+ :show-inheritance:
+
+dpkt.crc32c module
+------------------
+
+.. automodule:: dpkt.crc32c
+ :members:
+ :undoc-members:
+ :show-inheritance:
+
+dpkt.decorators module
+----------------------
+
+.. automodule:: dpkt.decorators
+ :members:
+ :undoc-members:
+ :show-inheritance:
+
+dpkt.dhcp module
+----------------
+
+.. automodule:: dpkt.dhcp
+ :members:
+ :undoc-members:
+ :show-inheritance:
+
+dpkt.diameter module
+--------------------
+
+.. automodule:: dpkt.diameter
+ :members:
+ :undoc-members:
+ :show-inheritance:
+
+dpkt.dns module
+---------------
+
+.. automodule:: dpkt.dns
+ :members:
+ :undoc-members:
+ :show-inheritance:
+
+dpkt.dpkt module
+----------------
+
+.. automodule:: dpkt.dpkt
+ :members:
+ :undoc-members:
+ :show-inheritance:
+
+dpkt.dtp module
+---------------
+
+.. automodule:: dpkt.dtp
+ :members:
+ :undoc-members:
+ :show-inheritance:
+
+dpkt.esp module
+---------------
+
+.. automodule:: dpkt.esp
+ :members:
+ :undoc-members:
+ :show-inheritance:
+
+dpkt.ethernet module
+--------------------
+
+.. automodule:: dpkt.ethernet
+ :members:
+ :undoc-members:
+ :show-inheritance:
+
+dpkt.gre module
+---------------
+
+.. automodule:: dpkt.gre
+ :members:
+ :undoc-members:
+ :show-inheritance:
+
+dpkt.gzip module
+----------------
+
+.. automodule:: dpkt.gzip
+ :members:
+ :undoc-members:
+ :show-inheritance:
+
+dpkt.h225 module
+----------------
+
+.. automodule:: dpkt.h225
+ :members:
+ :undoc-members:
+ :show-inheritance:
+
+dpkt.hsrp module
+----------------
+
+.. automodule:: dpkt.hsrp
+ :members:
+ :undoc-members:
+ :show-inheritance:
+
+dpkt.http module
+----------------
+
+.. automodule:: dpkt.http
+ :members:
+ :undoc-members:
+ :show-inheritance:
+
+dpkt.icmp module
+----------------
+
+.. automodule:: dpkt.icmp
+ :members:
+ :undoc-members:
+ :show-inheritance:
+
+dpkt.icmp6 module
+-----------------
+
+.. automodule:: dpkt.icmp6
+ :members:
+ :undoc-members:
+ :show-inheritance:
+
+dpkt.ieee80211 module
+---------------------
+
+.. automodule:: dpkt.ieee80211
+ :members:
+ :undoc-members:
+ :show-inheritance:
+
+dpkt.igmp module
+----------------
+
+.. automodule:: dpkt.igmp
+ :members:
+ :undoc-members:
+ :show-inheritance:
+
+dpkt.ip module
+--------------
+
+.. automodule:: dpkt.ip
+ :members:
+ :undoc-members:
+ :show-inheritance:
+
+dpkt.ip6 module
+---------------
+
+.. automodule:: dpkt.ip6
+ :members:
+ :undoc-members:
+ :show-inheritance:
+
+dpkt.ipx module
+---------------
+
+.. automodule:: dpkt.ipx
+ :members:
+ :undoc-members:
+ :show-inheritance:
+
+dpkt.llc module
+---------------
+
+.. automodule:: dpkt.llc
+ :members:
+ :undoc-members:
+ :show-inheritance:
+
+dpkt.loopback module
+--------------------
+
+.. automodule:: dpkt.loopback
+ :members:
+ :undoc-members:
+ :show-inheritance:
+
+dpkt.mrt module
+---------------
+
+.. automodule:: dpkt.mrt
+ :members:
+ :undoc-members:
+ :show-inheritance:
+
+dpkt.netbios module
+-------------------
+
+.. automodule:: dpkt.netbios
+ :members:
+ :undoc-members:
+ :show-inheritance:
+
+dpkt.netflow module
+-------------------
+
+.. automodule:: dpkt.netflow
+ :members:
+ :undoc-members:
+ :show-inheritance:
+
+dpkt.ntp module
+---------------
+
+.. automodule:: dpkt.ntp
+ :members:
+ :undoc-members:
+ :show-inheritance:
+
+dpkt.ospf module
+----------------
+
+.. automodule:: dpkt.ospf
+ :members:
+ :undoc-members:
+ :show-inheritance:
+
+dpkt.pcap module
+----------------
+
+.. automodule:: dpkt.pcap
+ :members:
+ :undoc-members:
+ :show-inheritance:
+
+dpkt.pim module
+---------------
+
+.. automodule:: dpkt.pim
+ :members:
+ :undoc-members:
+ :show-inheritance:
+
+dpkt.pmap module
+----------------
+
+.. automodule:: dpkt.pmap
+ :members:
+ :undoc-members:
+ :show-inheritance:
+
+dpkt.ppp module
+---------------
+
+.. automodule:: dpkt.ppp
+ :members:
+ :undoc-members:
+ :show-inheritance:
+
+dpkt.pppoe module
+-----------------
+
+.. automodule:: dpkt.pppoe
+ :members:
+ :undoc-members:
+ :show-inheritance:
+
+dpkt.qq module
+--------------
+
+.. automodule:: dpkt.qq
+ :members:
+ :undoc-members:
+ :show-inheritance:
+
+dpkt.radiotap module
+--------------------
+
+.. automodule:: dpkt.radiotap
+ :members:
+ :undoc-members:
+ :show-inheritance:
+
+dpkt.radius module
+------------------
+
+.. automodule:: dpkt.radius
+ :members:
+ :undoc-members:
+ :show-inheritance:
+
+dpkt.rfb module
+---------------
+
+.. automodule:: dpkt.rfb
+ :members:
+ :undoc-members:
+ :show-inheritance:
+
+dpkt.rip module
+---------------
+
+.. automodule:: dpkt.rip
+ :members:
+ :undoc-members:
+ :show-inheritance:
+
+dpkt.rpc module
+---------------
+
+.. automodule:: dpkt.rpc
+ :members:
+ :undoc-members:
+ :show-inheritance:
+
+dpkt.rtp module
+---------------
+
+.. automodule:: dpkt.rtp
+ :members:
+ :undoc-members:
+ :show-inheritance:
+
+dpkt.rx module
+--------------
+
+.. automodule:: dpkt.rx
+ :members:
+ :undoc-members:
+ :show-inheritance:
+
+dpkt.sccp module
+----------------
+
+.. automodule:: dpkt.sccp
+ :members:
+ :undoc-members:
+ :show-inheritance:
+
+dpkt.sctp module
+----------------
+
+.. automodule:: dpkt.sctp
+ :members:
+ :undoc-members:
+ :show-inheritance:
+
+dpkt.sip module
+---------------
+
+.. automodule:: dpkt.sip
+ :members:
+ :undoc-members:
+ :show-inheritance:
+
+dpkt.sll module
+---------------
+
+.. automodule:: dpkt.sll
+ :members:
+ :undoc-members:
+ :show-inheritance:
+
+dpkt.smb module
+---------------
+
+.. automodule:: dpkt.smb
+ :members:
+ :undoc-members:
+ :show-inheritance:
+
+dpkt.snoop module
+-----------------
+
+.. automodule:: dpkt.snoop
+ :members:
+ :undoc-members:
+ :show-inheritance:
+
+dpkt.ssl module
+---------------
+
+.. automodule:: dpkt.ssl
+ :members:
+ :undoc-members:
+ :show-inheritance:
+
+dpkt.ssl_ciphersuites module
+----------------------------
+
+.. automodule:: dpkt.ssl_ciphersuites
+ :members:
+ :undoc-members:
+ :show-inheritance:
+
+dpkt.stp module
+---------------
+
+.. automodule:: dpkt.stp
+ :members:
+ :undoc-members:
+ :show-inheritance:
+
+dpkt.stun module
+----------------
+
+.. automodule:: dpkt.stun
+ :members:
+ :undoc-members:
+ :show-inheritance:
+
+dpkt.tcp module
+---------------
+
+.. automodule:: dpkt.tcp
+ :members:
+ :undoc-members:
+ :show-inheritance:
+
+dpkt.telnet module
+------------------
+
+.. automodule:: dpkt.telnet
+ :members:
+ :undoc-members:
+ :show-inheritance:
+
+dpkt.tftp module
+----------------
+
+.. automodule:: dpkt.tftp
+ :members:
+ :undoc-members:
+ :show-inheritance:
+
+dpkt.tns module
+---------------
+
+.. automodule:: dpkt.tns
+ :members:
+ :undoc-members:
+ :show-inheritance:
+
+dpkt.tpkt module
+----------------
+
+.. automodule:: dpkt.tpkt
+ :members:
+ :undoc-members:
+ :show-inheritance:
+
+dpkt.udp module
+---------------
+
+.. automodule:: dpkt.udp
+ :members:
+ :undoc-members:
+ :show-inheritance:
+
+dpkt.vrrp module
+----------------
+
+.. automodule:: dpkt.vrrp
+ :members:
+ :undoc-members:
+ :show-inheritance:
+
+dpkt.yahoo module
+-----------------
+
+.. automodule:: dpkt.yahoo
+ :members:
+ :undoc-members:
+ :show-inheritance:
+
diff --git a/external_libs/python/dpkt-1.8.6.2/docs/api/index.rst b/external_libs/python/dpkt-1.8.6.2/docs/api/index.rst
new file mode 100644
index 00000000..7d44785d
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/docs/api/index.rst
@@ -0,0 +1,11 @@
+
+API Reference
+=============
+The dpkt API reference section is currently a work in progress, please have patience as we fill in and improve the documentation.
+
+**dpkt Modules**
+
+.. toctree::
+ :maxdepth: 4
+
+ api_auto
diff --git a/external_libs/python/dpkt-1.8.6.2/docs/authors.rst b/external_libs/python/dpkt-1.8.6.2/docs/authors.rst
new file mode 100644
index 00000000..238aa6bb
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/docs/authors.rst
@@ -0,0 +1,7 @@
+*******
+Authors
+*******
+
+.. include:: ../AUTHORS
+
+If you want to contribute to dpkt, see :doc:`contributing`.
diff --git a/external_libs/python/dpkt-1.8.6.2/docs/badges.rst b/external_libs/python/dpkt-1.8.6.2/docs/badges.rst
new file mode 100644
index 00000000..906f8b7f
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/docs/badges.rst
@@ -0,0 +1,41 @@
+
+
+| |docs| |travis| |coveralls| |landscape| |version|
+| |downloads| |wheel| |supported-versions| |supported-implementations|
+
+.. |docs| image:: https://readthedocs.org/projects/dpkt/badge/?style=flat
+ :target: https://readthedocs.org/projects/dpkt
+ :alt: Documentation Status
+
+.. |travis| image:: http://img.shields.io/travis/kbandla/dpkt/master.png?style=flat
+ :alt: Travis-CI Build Status
+ :target: https://travis-ci.org/kbandla/dpkt
+
+.. |coveralls| image:: http://img.shields.io/coveralls/kbandla/dpkt/master.png?style=flat
+ :alt: Coverage Status
+ :target: https://coveralls.io/r/kbandla/dpkt
+
+.. |landscape| image:: https://landscape.io/github/kbandla/dpkt/master/landscape.svg?style=flat
+ :target: https://landscape.io/github/kbandla/dpkt/master
+ :alt: Code Quality Status
+
+.. |version| image:: http://img.shields.io/pypi/v/dpkt.svg
+ :alt: PyPI Package latest release
+ :target: https://pypi.python.org/pypi/dpkt
+
+.. |downloads| image:: http://img.shields.io/pypi/dm/dpkt.svg
+ :alt: PyPI Package monthly downloads
+ :target: https://pypi.python.org/pypi/dpkt
+
+.. |wheel| image:: https://img.shields.io/pypi/wheel/dpkt.svg
+ :alt: PyPI Wheel
+ :target: https://pypi.python.org/pypi/dpkt
+
+.. |supported-versions| image:: https://img.shields.io/pypi/pyversions/dpkt.svg
+ :alt: Supported versions
+ :target: https://pypi.python.org/pypi/dpkt
+
+.. |supported-implementations| image:: https://img.shields.io/pypi/implementation/dpkt.svg
+ :alt: Supported implementations
+ :target: https://pypi.python.org/pypi/dpkt
+
diff --git a/external_libs/python/dpkt-1.8.6.2/docs/changelog.rst b/external_libs/python/dpkt-1.8.6.2/docs/changelog.rst
new file mode 100644
index 00000000..ac7e2371
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/docs/changelog.rst
@@ -0,0 +1,4 @@
+*********
+Changelog
+*********
+
diff --git a/external_libs/python/dpkt-1.8.6.2/docs/conf.py b/external_libs/python/dpkt-1.8.6.2/docs/conf.py
new file mode 100644
index 00000000..6dfc9fc4
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/docs/conf.py
@@ -0,0 +1,76 @@
+# encoding: utf-8
+
+"""dpkt documentation build configuration file"""
+
+from __future__ import unicode_literals
+
+import os
+import re
+import sys
+import types
+import mock
+
+
+def get_version(filename):
+ init_py = open(filename).read()
+ metadata = dict(re.findall("__([a-z]+)__ = '([^']+)'", init_py))
+ return metadata['version']
+
+
+# -- Workarounds to have autodoc generate API docs ----------------------------
+
+sys.path.insert(0, os.path.abspath('..'))
+
+
+# Mock any objects that we might need to
+foo = mock.Mock()
+foo.__version__ = '0.1.1'
+sys.modules['foo'] = foo
+
+
+# -- General configuration ----------------------------------------------------
+needs_sphinx = '1.0'
+extensions = [
+ 'sphinx.ext.autodoc',
+ 'sphinx.ext.extlinks',
+ 'sphinx.ext.intersphinx',
+ 'sphinx.ext.viewcode',
+ 'sphinx.ext.autosummary',
+ 'sphinxcontrib.napoleon'
+]
+
+templates_path = ['_templates']
+source_suffix = '.rst'
+master_doc = 'index'
+
+project = 'dpkt'
+copyright = '2009-2015 Dug Song and contributors'
+
+release = get_version('../dpkt/__init__.py')
+version = '.'.join(release.split('.')[:2])
+
+exclude_patterns = ['_build']
+
+pygments_style = 'sphinx'
+
+modindex_common_prefix = ['dpkt.']
+
+autodoc_default_flags = ['members', 'undoc-members', 'show-inheritance']
+autodoc_member_order = 'bysource'
+
+
+# -- Options for HTML output --------------------------------------------------
+html_theme = 'default'
+html_static_path = ['_static']
+
+html_use_modindex = True
+html_use_index = True
+html_split_index = False
+html_show_sourcelink = True
+
+htmlhelp_basename = 'dpkt'
+
+# -- Options for extlink extension --------------------------------------------
+extlinks = {
+ 'issue': ('https://github.com/kbandla/dpkt/issues/%s', '#'),
+}
diff --git a/external_libs/python/dpkt-1.8.6.2/docs/contributing.rst b/external_libs/python/dpkt-1.8.6.2/docs/contributing.rst
new file mode 100644
index 00000000..cae4acfe
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/docs/contributing.rst
@@ -0,0 +1,45 @@
+============
+Contributing
+============
+
+Report a Bug or Make a Feature Request
+--------------------------------------
+Please go to the GitHub Issues page: https://github.com/kbandla/dpkt/issues.
+
+Checkout the Code
+-----------------
+
+::
+
+ git clone https://github.com/kblandla/dpkt.git
+
+
+Become a Developer
+------------------
+dpkt uses the 'GitHub Flow' model: `GitHub Flow <http://scottchacon.com/2011/08/31/github-flow.html>`_
+
+- To work on something new, create a descriptively named branch off of master (ie: my-awesome)
+- Commit to that branch locally and regularly push your work to the same named branch on the server
+- When you need feedback or help, or you think the branch is ready for merging, open a pull request
+- After someone else has reviewed and signed off on the feature, you can merge it into master
+
+Getting Started
+~~~~~~~~~~~~~~~
+ - Fork the repo on GitHub
+ - git clone git@github.com:your_name_here/dpkt.git
+
+New Feature or Bug
+~~~~~~~~~~~~~~~~~~
+
+ ::
+
+ $ git checkout -b my-awesome
+ $ git push -u origin my-awesome
+ $ <code for a bit>; git push
+ $ <code for a bit>; git push
+ $ tox (this will run all the tests)
+
+ - Go to github and hit 'New pull request'
+ - Someone reviews it and says 'AOK'
+ - Merge the pull request (green button)
+
diff --git a/external_libs/python/dpkt-1.8.6.2/docs/examples.rst b/external_libs/python/dpkt-1.8.6.2/docs/examples.rst
new file mode 100644
index 00000000..d99a0c2f
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/docs/examples.rst
@@ -0,0 +1,80 @@
+
+Examples
+========
+
+Examples in dpkt/examples
+-------------------------
+
+print_packets.py
+~~~~~~~~~~~~~~~~
+.. automodule:: examples.print_packets
+
+**Code Excerpt**
+
+.. code-block:: python
+
+ # For each packet in the pcap process the contents
+ for timestamp, buf in pcap:
+
+ # Print out the timestamp in UTC
+ print 'Timestamp: ', str(datetime.datetime.utcfromtimestamp(timestamp))
+
+ # Unpack the Ethernet frame (mac src/dst, ethertype)
+ eth = dpkt.ethernet.Ethernet(buf)
+ print 'Ethernet Frame: ', mac_addr(eth.src), mac_addr(eth.dst), eth.type
+
+ # Make sure the Ethernet frame contains an IP packet
+ # EtherType (IP, ARP, PPPoE, IP6... see http://en.wikipedia.org/wiki/EtherType)
+ if eth.type != dpkt.ethernet.ETH_TYPE_IP:
+ print 'Non IP Packet type not supported %s\n' % eth.data.__class__.__name__
+ continue
+
+ # Now unpack the data within the Ethernet frame (the IP packet)
+ # Pulling out src, dst, length, fragment info, TTL, and Protocol
+ ip = eth.data
+
+ # Pull out fragment information (flags and offset all packed into off field, so use bitmasks)
+ do_not_fragment = bool(ip.off & dpkt.ip.IP_DF)
+ more_fragments = bool(ip.off & dpkt.ip.IP_MF)
+ fragment_offset = ip.off & dpkt.ip.IP_OFFMASK
+
+ # Print out the info
+ print 'IP: %s -> %s (len=%d ttl=%d DF=%d MF=%d offset=%d)\n' % \
+ (ip_to_str(ip.src), ip_to_str(ip.dst), ip.len, ip.ttl, do_not_fragment, more_fragments, fragment_offset)
+
+**Example Output**
+
+.. code-block:: json
+
+ Timestamp: 2004-05-13 10:17:07.311224
+ Ethernet Frame: 00:00:01:00:00:00 fe:ff:20:00:01:00 2048
+ IP: 145.254.160.237 -> 65.208.228.223 (len=48 ttl=128 DF=1 MF=0 offset=0)
+
+ Timestamp: 2004-05-13 10:17:08.222534
+ Ethernet Frame: fe:ff:20:00:01:00 00:00:01:00:00:00 2048
+ IP: 65.208.228.223 -> 145.254.160.237 (len=48 ttl=47 DF=1 MF=0 offset=0)
+
+ ...
+
+
+
+Jon Oberheide's Examples
+-------------------------
+[@jonoberheide's](https://twitter.com/jonoberheide) old examples still
+apply:
+
+- `dpkt Tutorial #1: ICMP
+ Echo <https://jon.oberheide.org/blog/2008/08/25/dpkt-tutorial-1-icmp-echo/>`__
+- `dpkt Tutorial #2: Parsing a PCAP
+ File <https://jon.oberheide.org/blog/2008/10/15/dpkt-tutorial-2-parsing-a-pcap-file/>`__
+- `dpkt Tutorial #3: dns
+ spoofing <https://jon.oberheide.org/blog/2008/12/20/dpkt-tutorial-3-dns-spoofing/>`__
+- `dpkt Tutorial #4: AS Paths from
+ MRT/BGP <https://jon.oberheide.org/blog/2009/03/25/dpkt-tutorial-4-as-paths-from-mrt-bgp/>`__
+
+Jeff Silverman Docs/Code
+------------------------
+`Jeff Silverman <https://github.com/jeffsilverm>`__ has some
+`code <https://github.com/jeffsilverm/dpkt_doc>`__ and
+`documentation <http://www.commercialventvac.com/dpkt.html>`__.
+
diff --git a/external_libs/python/dpkt-1.8.6.2/docs/index.rst b/external_libs/python/dpkt-1.8.6.2/docs/index.rst
new file mode 100644
index 00000000..31ef9251
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/docs/index.rst
@@ -0,0 +1,32 @@
+dpkt
+====
+.. include:: badges.rst
+dpkt is a python module for fast, simple packet creation / parsing, with definitions for the basic TCP/IP protocols
+
+
+Getting Started
+===============
+.. toctree::
+ :maxdepth: 2
+
+ installation
+ examples
+
+API Reference
+=============
+.. toctree::
+ :maxdepth: 1
+
+ api/index
+
+About dpkt
+==========
+.. toctree::
+ :maxdepth: 2
+
+ authors
+ changelog
+ plans
+ contributing
+ license
+
diff --git a/external_libs/python/dpkt-1.8.6.2/docs/installation.rst b/external_libs/python/dpkt-1.8.6.2/docs/installation.rst
new file mode 100644
index 00000000..2c93001b
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/docs/installation.rst
@@ -0,0 +1,21 @@
+============
+Installation
+============
+
+DKPT is now available directly from pypi :)
+
+Install the Code
+----------------
+
+::
+
+ pip install dpkt
+
+Checkout the Code
+-----------------
+
+::
+
+ git clone https://github.com/kblandla/dpkt.git
+
+
diff --git a/external_libs/python/dpkt-1.8.6.2/docs/license.rst b/external_libs/python/dpkt-1.8.6.2/docs/license.rst
new file mode 100644
index 00000000..56c72381
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/docs/license.rst
@@ -0,0 +1,4 @@
+
+License
+=======
+BSD 3-Clause License, as the upstream project
diff --git a/external_libs/python/dpkt-1.8.6.2/docs/plans.rst b/external_libs/python/dpkt-1.8.6.2/docs/plans.rst
new file mode 100644
index 00000000..a6b1ca35
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/docs/plans.rst
@@ -0,0 +1,13 @@
+*****************
+Development plans
+*****************
+
+Current plans
+=============
+
+- Be Awesome
+
+Future plans
+============
+
+- Maintain the Awesome
diff --git a/external_libs/python/dpkt-1.8.6.2/docs/requirements.txt b/external_libs/python/dpkt-1.8.6.2/docs/requirements.txt
new file mode 100644
index 00000000..0e912345
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/docs/requirements.txt
@@ -0,0 +1,3 @@
+mock >= 1.0
+Sphinx >= 1.0
+sphinxcontrib-napoleon
diff --git a/external_libs/python/dpkt-1.8.6.2/dpkt.egg-info/PKG-INFO b/external_libs/python/dpkt-1.8.6.2/dpkt.egg-info/PKG-INFO
new file mode 100644
index 00000000..baf82a26
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/dpkt.egg-info/PKG-INFO
@@ -0,0 +1,82 @@
+Metadata-Version: 1.1
+Name: dpkt
+Version: 1.8.6.2
+Summary: fast, simple packet creation / parsing, with definitions for the basic TCP/IP protocols
+Home-page: http://dpkt.googlecode.com/
+Author: Dug Song
+Author-email: dugsong@monkey.org
+License: BSD
+Description:
+ ====
+ dpkt
+ ====
+
+ | |travis| |coveralls| |landscape| |downloads|
+ | |version| |wheel| |supported-versions| |supported-implementations|
+
+ .. |travis| image:: http://img.shields.io/travis/kbandla/dpkt.svg
+ :alt: Travis-CI Build Status
+ :target: https://travis-ci.org/kbandla/dpkt
+
+ .. |coveralls| image:: http://img.shields.io/coveralls/kbandla/dpkt.svg
+ :alt: Coverage Status
+ :target: https://coveralls.io/r/kbandla/dpkt
+
+ .. |landscape| image:: https://landscape.io/github/kbandla/dpkt/master/landscape.svg
+ :target: https://landscape.io/github/kbandla/dpkt/master
+ :alt: Code Quality Status
+
+ .. |version| image:: http://img.shields.io/pypi/v/dpkt.svg
+ :alt: PyPI Package latest release
+ :target: https://pypi.python.org/pypi/dpkt
+
+ .. |downloads| image:: http://img.shields.io/pypi/dm/dpkt.svg
+ :alt: PyPI Package monthly downloads
+ :target: https://pypi.python.org/pypi/dpkt
+
+ .. |wheel| image:: https://img.shields.io/pypi/wheel/dpkt.svg
+ :alt: PyPI Wheel
+ :target: https://pypi.python.org/pypi/dpkt
+
+ .. |supported-versions| image:: https://img.shields.io/pypi/pyversions/dpkt.svg
+ :alt: Supported versions
+ :target: https://pypi.python.org/pypi/dpkt
+
+ .. |supported-implementations| image:: https://img.shields.io/pypi/implementation/dpkt.svg
+ :alt: Supported implementations
+ :target: https://pypi.python.org/pypi/dpkt
+
+ Installation
+ ============
+
+ ::
+
+ pip install dpkt
+
+ Documentation
+ =============
+
+ https://dpkt.readthedocs.org/
+
+ About
+ =====
+
+ This code is based on `dpkt code <https://code.google.com/p/dpkt/>`__ lead by Dug Song and
+ is now being maintained and improved by an extended set of
+ `contributors <https://dpkt.readthedocs.org/en/latest/authors.html>`__
+ and `developers <https://github.com/kbandla/dpkt/graphs/contributors>`__.
+
+ LICENSE
+ -------
+
+ BSD 3-Clause
+
+Platform: UNKNOWN
+Classifier: Development Status :: 4 - Beta
+Classifier: Intended Audience :: Developers
+Classifier: License :: OSI Approved :: BSD License
+Classifier: Natural Language :: English
+Classifier: Programming Language :: Python :: 2.6
+Classifier: Programming Language :: Python :: 2.7
+Classifier: Programming Language :: Python :: Implementation :: CPython
+Classifier: Programming Language :: Python :: Implementation :: PyPy
diff --git a/external_libs/python/dpkt-1.8.6.2/dpkt.egg-info/SOURCES.txt b/external_libs/python/dpkt-1.8.6.2/dpkt.egg-info/SOURCES.txt
new file mode 100644
index 00000000..8ac474c8
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/dpkt.egg-info/SOURCES.txt
@@ -0,0 +1,96 @@
+AUTHORS
+CHANGES
+LICENSE
+MANIFEST.in
+README.md
+README.rst
+setup.cfg
+setup.py
+docs/Makefile
+docs/authors.rst
+docs/badges.rst
+docs/changelog.rst
+docs/conf.py
+docs/contributing.rst
+docs/examples.rst
+docs/index.rst
+docs/installation.rst
+docs/license.rst
+docs/plans.rst
+docs/requirements.txt
+docs/api/api_auto.rst
+docs/api/index.rst
+dpkt/__init__.py
+dpkt/ah.py
+dpkt/aim.py
+dpkt/aoe.py
+dpkt/aoeata.py
+dpkt/aoecfg.py
+dpkt/arp.py
+dpkt/asn1.py
+dpkt/bgp.py
+dpkt/cdp.py
+dpkt/crc32c.py
+dpkt/decorators.py
+dpkt/dhcp.py
+dpkt/diameter.py
+dpkt/dns.py
+dpkt/dpkt.py
+dpkt/dtp.py
+dpkt/esp.py
+dpkt/ethernet.py
+dpkt/gre.py
+dpkt/gzip.py
+dpkt/h225.py
+dpkt/hsrp.py
+dpkt/http.py
+dpkt/icmp.py
+dpkt/icmp6.py
+dpkt/ieee80211.py
+dpkt/igmp.py
+dpkt/ip.py
+dpkt/ip6.py
+dpkt/ipx.py
+dpkt/llc.py
+dpkt/loopback.py
+dpkt/mrt.py
+dpkt/netbios.py
+dpkt/netflow.py
+dpkt/ntp.py
+dpkt/ospf.py
+dpkt/pcap.py
+dpkt/pim.py
+dpkt/pmap.py
+dpkt/ppp.py
+dpkt/pppoe.py
+dpkt/qq.py
+dpkt/radiotap.py
+dpkt/radius.py
+dpkt/rfb.py
+dpkt/rip.py
+dpkt/rpc.py
+dpkt/rtp.py
+dpkt/rx.py
+dpkt/sccp.py
+dpkt/sctp.py
+dpkt/sip.py
+dpkt/sll.py
+dpkt/smb.py
+dpkt/snoop.py
+dpkt/ssl.py
+dpkt/ssl_ciphersuites.py
+dpkt/stp.py
+dpkt/stun.py
+dpkt/tcp.py
+dpkt/telnet.py
+dpkt/tftp.py
+dpkt/tns.py
+dpkt/tpkt.py
+dpkt/udp.py
+dpkt/vrrp.py
+dpkt/yahoo.py
+dpkt.egg-info/PKG-INFO
+dpkt.egg-info/SOURCES.txt
+dpkt.egg-info/dependency_links.txt
+dpkt.egg-info/not-zip-safe
+dpkt.egg-info/top_level.txt \ No newline at end of file
diff --git a/external_libs/python/dpkt-1.8.6.2/dpkt.egg-info/dependency_links.txt b/external_libs/python/dpkt-1.8.6.2/dpkt.egg-info/dependency_links.txt
new file mode 100644
index 00000000..8b137891
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/dpkt.egg-info/dependency_links.txt
@@ -0,0 +1 @@
+
diff --git a/external_libs/python/dpkt-1.8.6.2/dpkt.egg-info/not-zip-safe b/external_libs/python/dpkt-1.8.6.2/dpkt.egg-info/not-zip-safe
new file mode 100644
index 00000000..8b137891
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/dpkt.egg-info/not-zip-safe
@@ -0,0 +1 @@
+
diff --git a/external_libs/python/dpkt-1.8.6.2/dpkt.egg-info/top_level.txt b/external_libs/python/dpkt-1.8.6.2/dpkt.egg-info/top_level.txt
new file mode 100644
index 00000000..4daab81a
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/dpkt.egg-info/top_level.txt
@@ -0,0 +1 @@
+dpkt
diff --git a/external_libs/python/dpkt-1.8.6.2/dpkt/__init__.py b/external_libs/python/dpkt-1.8.6.2/dpkt/__init__.py
new file mode 100644
index 00000000..09d28fb3
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/dpkt/__init__.py
@@ -0,0 +1,71 @@
+"""fast, simple packet creation and parsing."""
+
+__author__ = 'Dug Song'
+__author_email__ = 'dugsong@monkey.org'
+__license__ = 'BSD'
+__url__ = 'http://dpkt.googlecode.com/'
+__version__ = '1.8.6.2'
+
+from dpkt import *
+
+import ah
+import aoe
+import aim
+import arp
+import asn1
+import bgp
+import cdp
+import dhcp
+import diameter
+import dns
+import dtp
+import esp
+import ethernet
+import gre
+import gzip
+import h225
+import hsrp
+import http
+import icmp
+import icmp6
+import ieee80211
+import igmp
+import ip
+import ip6
+import ipx
+import llc
+import loopback
+import mrt
+import netbios
+import netflow
+import ntp
+import ospf
+import pcap
+import pim
+import pmap
+import ppp
+import pppoe
+import qq
+import radiotap
+import radius
+import rfb
+import rip
+import rpc
+import rtp
+import rx
+import sccp
+import sctp
+import sip
+import sll
+import smb
+import ssl
+import stp
+import stun
+import tcp
+import telnet
+import tftp
+import tns
+import tpkt
+import udp
+import vrrp
+import yahoo
diff --git a/external_libs/python/dpkt-1.8.6.2/dpkt/ah.py b/external_libs/python/dpkt-1.8.6.2/dpkt/ah.py
new file mode 100644
index 00000000..5ad29ad5
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/dpkt/ah.py
@@ -0,0 +1,35 @@
+# $Id: ah.py 34 2007-01-28 07:54:20Z dugsong $
+# -*- coding: utf-8 -*-
+
+"""Authentication Header."""
+
+import dpkt
+
+
+class AH(dpkt.Packet):
+ __hdr__ = (
+ ('nxt', 'B', 0),
+ ('len', 'B', 0), # payload length
+ ('rsvd', 'H', 0),
+ ('spi', 'I', 0),
+ ('seq', 'I', 0)
+ )
+ auth = ''
+
+ def unpack(self, buf):
+ dpkt.Packet.unpack(self, buf)
+ self.auth = self.data[:self.len]
+ buf = self.data[self.len:]
+ import ip
+
+ try:
+ self.data = ip.IP.get_proto(self.nxt)(buf)
+ setattr(self, self.data.__class__.__name__.lower(), self.data)
+ except (KeyError, dpkt.UnpackError):
+ self.data = buf
+
+ def __len__(self):
+ return self.__hdr_len__ + len(self.auth) + len(self.data)
+
+ def __str__(self):
+ return self.pack_hdr() + str(self.auth) + str(self.data)
diff --git a/external_libs/python/dpkt-1.8.6.2/dpkt/aim.py b/external_libs/python/dpkt-1.8.6.2/dpkt/aim.py
new file mode 100644
index 00000000..8250d69e
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/dpkt/aim.py
@@ -0,0 +1,52 @@
+# $Id: aim.py 23 2006-11-08 15:45:33Z dugsong $
+# -*- coding: utf-8 -*-
+
+"""AOL Instant Messenger."""
+
+import dpkt
+import struct
+
+# OSCAR: http://iserverd1.khstu.ru/oscar/
+
+
+class FLAP(dpkt.Packet):
+ __hdr__ = (
+ ('ast', 'B', 0x2a), # '*'
+ ('type', 'B', 0),
+ ('seq', 'H', 0),
+ ('len', 'H', 0)
+ )
+
+ def unpack(self, buf):
+ dpkt.Packet.unpack(self, buf)
+ if self.ast != 0x2a:
+ raise dpkt.UnpackError('invalid FLAP header')
+ if len(self.data) < self.len:
+ raise dpkt.NeedData, '%d left, %d needed' % (len(self.data), self.len)
+
+
+class SNAC(dpkt.Packet):
+ __hdr__ = (
+ ('family', 'H', 0),
+ ('subtype', 'H', 0),
+ ('flags', 'H', 0),
+ ('reqid', 'I', 0)
+ )
+
+
+def tlv(buf):
+ n = 4
+ try:
+ t, l = struct.unpack('>HH', buf[:n])
+ except struct.error:
+ raise dpkt.UnpackError
+ v = buf[n:n + l]
+ if len(v) < l:
+ raise dpkt.NeedData
+ buf = buf[n + l:]
+ return t, l, v, buf
+
+# TOC 1.0: http://jamwt.com/Py-TOC/PROTOCOL
+
+# TOC 2.0: http://www.firestuff.org/projects/firetalk/doc/toc2.txt
+
diff --git a/external_libs/python/dpkt-1.8.6.2/dpkt/aoe.py b/external_libs/python/dpkt-1.8.6.2/dpkt/aoe.py
new file mode 100644
index 00000000..8fcf7c63
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/dpkt/aoe.py
@@ -0,0 +1,90 @@
+# -*- coding: utf-8 -*-
+"""ATA over Ethernet Protocol."""
+
+import struct
+import dpkt
+from decorators import deprecated
+
+
+class AOE(dpkt.Packet):
+ __hdr__ = (
+ ('ver_fl', 'B', 0x10),
+ ('err', 'B', 0),
+ ('maj', 'H', 0),
+ ('min', 'B', 0),
+ ('cmd', 'B', 0),
+ ('tag', 'I', 0),
+ )
+ _cmdsw = {}
+
+ @property
+ def ver(self): return self.ver_fl >> 4
+
+ @ver.setter
+ def ver(self, ver): self.ver_fl = (ver << 4) | (self.ver_fl & 0xf)
+
+ @property
+ def fl(self): return self.ver_fl & 0xf
+
+ @fl.setter
+ def fl(self, fl): self.ver_fl = (self.ver_fl & 0xf0) | fl
+
+ @classmethod
+ def set_cmd(cls, cmd, pktclass):
+ cls._cmdsw[cmd] = pktclass
+
+ @classmethod
+ def get_cmd(cls, cmd):
+ return cls._cmdsw[cmd]
+
+ def unpack(self, buf):
+ dpkt.Packet.unpack(self, buf)
+ try:
+ self.data = self._cmdsw[self.cmd](self.data)
+ setattr(self, self.data.__class__.__name__.lower(), self.data)
+ except (KeyError, struct.error, dpkt.UnpackError):
+ pass
+
+ def pack_hdr(self):
+ try:
+ return dpkt.Packet.pack_hdr(self)
+ except struct.error, e:
+ raise dpkt.PackError(str(e))
+
+ # Deprecated methods, will be removed in the future
+ # =================================================
+ @deprecated
+ def _get_ver(self): return self.ver
+
+ @deprecated
+ def _set_ver(self, ver): self.ver = ver
+
+ @deprecated
+ def _get_fl(self): return self.fl
+
+ @deprecated
+ def _set_fl(self, fl): self.fl = fl
+ # =================================================
+
+
+
+AOE_CMD_ATA = 0
+AOE_CMD_CFG = 1
+AOE_FLAG_RSP = 1 << 3
+
+
+def __load_cmds():
+ prefix = 'AOE_CMD_'
+ g = globals()
+ for k, v in g.iteritems():
+ if k.startswith(prefix):
+ name = 'aoe' + k[len(prefix):].lower()
+ try:
+ mod = __import__(name, g)
+ except ImportError:
+ continue
+ AOE.set_cmd(v, getattr(mod, name.upper()))
+
+
+if not AOE._cmdsw:
+ __load_cmds()
diff --git a/external_libs/python/dpkt-1.8.6.2/dpkt/aoeata.py b/external_libs/python/dpkt-1.8.6.2/dpkt/aoeata.py
new file mode 100644
index 00000000..1be917d3
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/dpkt/aoeata.py
@@ -0,0 +1,35 @@
+# -*- coding: utf-8 -*-
+"""ATA over Ethernet ATA command"""
+
+import dpkt
+
+ATA_DEVICE_IDENTIFY = 0xec
+
+
+class AOEATA(dpkt.Packet):
+ __hdr__ = (
+ ('aflags', 'B', 0),
+ ('errfeat', 'B', 0),
+ ('scnt', 'B', 0),
+ ('cmdstat', 'B', ATA_DEVICE_IDENTIFY),
+ ('lba0', 'B', 0),
+ ('lba1', 'B', 0),
+ ('lba2', 'B', 0),
+ ('lba3', 'B', 0),
+ ('lba4', 'B', 0),
+ ('lba5', 'B', 0),
+ ('res', 'H', 0),
+ )
+
+ # XXX: in unpack, switch on ATA command like icmp does on type
+
+
+def test_aoeata():
+ s = '\x03\x0a\x6b\x19\x00\x00\x00\x00\x45\x00\x00\x28\x94\x1f\x00\x00\xe3\x06\x99\xb4\x23\x2b\x24\x00\xde\x8e\x84\x42\xab\xd1\x00\x50\x00\x35\xe1\x29\x20\xd9\x00\x00\x00\x22\x9b\xf0\xe2\x04\x65\x6b'
+ aoeata = AOEATA(s)
+ assert (str(aoeata) == s)
+
+
+if __name__ == '__main__':
+ test_aoeata()
+ print 'Tests Successful...'
diff --git a/external_libs/python/dpkt-1.8.6.2/dpkt/aoecfg.py b/external_libs/python/dpkt-1.8.6.2/dpkt/aoecfg.py
new file mode 100644
index 00000000..7643eddf
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/dpkt/aoecfg.py
@@ -0,0 +1,25 @@
+# -*- coding: utf-8 -*-
+"""ATA over Ethernet ATA command"""
+
+import dpkt
+
+
+class AOECFG(dpkt.Packet):
+ __hdr__ = (
+ ('bufcnt', 'H', 0),
+ ('fwver', 'H', 0),
+ ('scnt', 'B', 0),
+ ('aoeccmd', 'B', 0),
+ ('cslen', 'H', 0),
+ )
+
+
+def test_aoecfg():
+ s = '\x01\x02\x03\x04\x05\x06\x11\x12\x13\x14\x15\x16\x88\xa2\x10\x00\x00\x01\x02\x01\x80\x00\x00\x00\x12\x34\x00\x00\x00\x00\x04\x00' + '\0xed' * 1024
+ aoecfg = AOECFG(s[14 + 10:])
+ assert (aoecfg.bufcnt == 0x1234)
+
+
+if __name__ == '__main__':
+ test_aoecfg()
+ print 'Tests Successful...' \ No newline at end of file
diff --git a/external_libs/python/dpkt-1.8.6.2/dpkt/arp.py b/external_libs/python/dpkt-1.8.6.2/dpkt/arp.py
new file mode 100644
index 00000000..a6ae62f4
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/dpkt/arp.py
@@ -0,0 +1,32 @@
+# $Id: arp.py 23 2006-11-08 15:45:33Z dugsong $
+# -*- coding: utf-8 -*-
+"""Address Resolution Protocol."""
+
+import dpkt
+
+# Hardware address format
+ARP_HRD_ETH = 0x0001 # ethernet hardware
+ARP_HRD_IEEE802 = 0x0006 # IEEE 802 hardware
+
+# Protocol address format
+ARP_PRO_IP = 0x0800 # IP protocol
+
+# ARP operation
+ARP_OP_REQUEST = 1 # request to resolve ha given pa
+ARP_OP_REPLY = 2 # response giving hardware address
+ARP_OP_REVREQUEST = 3 # request to resolve pa given ha
+ARP_OP_REVREPLY = 4 # response giving protocol address
+
+
+class ARP(dpkt.Packet):
+ __hdr__ = (
+ ('hrd', 'H', ARP_HRD_ETH),
+ ('pro', 'H', ARP_PRO_IP),
+ ('hln', 'B', 6), # hardware address length
+ ('pln', 'B', 4), # protocol address length
+ ('op', 'H', ARP_OP_REQUEST),
+ ('sha', '6s', ''),
+ ('spa', '4s', ''),
+ ('tha', '6s', ''),
+ ('tpa', '4s', '')
+ )
diff --git a/external_libs/python/dpkt-1.8.6.2/dpkt/asn1.py b/external_libs/python/dpkt-1.8.6.2/dpkt/asn1.py
new file mode 100644
index 00000000..7acae041
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/dpkt/asn1.py
@@ -0,0 +1,121 @@
+# $Id: asn1.py 23 2006-11-08 15:45:33Z dugsong $
+# -*- coding: utf-8 -*-
+"""Abstract Syntax Notation #1."""
+
+import struct
+import time
+import dpkt
+
+# Type class
+CLASSMASK = 0xc0
+UNIVERSAL = 0x00
+APPLICATION = 0x40
+CONTEXT = 0x80
+PRIVATE = 0xc0
+
+# Constructed (vs. primitive)
+CONSTRUCTED = 0x20
+
+# Universal-class tags
+TAGMASK = 0x1f
+INTEGER = 2
+BIT_STRING = 3 # arbitrary bit string
+OCTET_STRING = 4 # arbitrary octet string
+NULL = 5
+OID = 6 # object identifier
+SEQUENCE = 16 # ordered collection of types
+SET = 17 # unordered collection of types
+PRINT_STRING = 19 # printable string
+T61_STRING = 20 # T.61 (8-bit) character string
+IA5_STRING = 22 # ASCII
+UTC_TIME = 23
+
+
+def utctime(buf):
+ """Convert ASN.1 UTCTime string to UTC float."""
+ yy = int(buf[:2])
+ mn = int(buf[2:4])
+ dd = int(buf[4:6])
+ hh = int(buf[6:8])
+ mm = int(buf[8:10])
+ try:
+ ss = int(buf[10:12])
+ buf = buf[12:]
+ except TypeError:
+ ss = 0
+ buf = buf[10:]
+ if buf[0] == '+':
+ hh -= int(buf[1:3])
+ mm -= int(buf[3:5])
+ elif buf[0] == '-':
+ hh += int(buf[1:3])
+ mm += int(buf[3:5])
+ return time.mktime((2000 + yy, mn, dd, hh, mm, ss, 0, 0, 0))
+
+
+def decode(buf):
+ """Sleazy ASN.1 decoder.
+ Return list of (id, value) tuples from ASN.1 BER/DER encoded buffer.
+ """
+ msg = []
+ while buf:
+ t = ord(buf[0])
+ constructed = t & CONSTRUCTED
+ tag = t & TAGMASK
+ l = ord(buf[1])
+ c = 0
+ if constructed and l == 128:
+ # XXX - constructed, indefinite length
+ msg.append((t, decode(buf[2:])))
+ elif l >= 128:
+ c = l & 127
+ if c == 1:
+ l = ord(buf[2])
+ elif c == 2:
+ l = struct.unpack('>H', buf[2:4])[0]
+ elif c == 3:
+ l = struct.unpack('>I', buf[1:5])[0] & 0xfff
+ c = 2
+ elif c == 4:
+ l = struct.unpack('>I', buf[2:6])[0]
+ else:
+ # XXX - can be up to 127 bytes, but...
+ raise dpkt.UnpackError('excessive long-form ASN.1 length %d' % l)
+
+ # Skip type, length
+ buf = buf[2 + c:]
+
+ # Parse content
+ if constructed:
+ msg.append((t, decode(buf)))
+ elif tag == INTEGER:
+ if l == 0:
+ n = 0
+ elif l == 1:
+ n = ord(buf[0])
+ elif l == 2:
+ n = struct.unpack('>H', buf[:2])[0]
+ elif l == 3:
+ n = struct.unpack('>I', buf[:4])[0] >> 8
+ elif l == 4:
+ n = struct.unpack('>I', buf[:4])[0]
+ else:
+ raise dpkt.UnpackError('excessive integer length > %d bytes' % l)
+ msg.append((t, n))
+ elif tag == UTC_TIME:
+ msg.append((t, utctime(buf[:l])))
+ else:
+ msg.append((t, buf[:l]))
+
+ # Skip content
+ buf = buf[l:]
+ return msg
+
+
+def test_asn1():
+ s = '0\x82\x02Q\x02\x01\x0bc\x82\x02J\x04xcn=Douglas J Song 1, ou=Information Technology Division, ou=Faculty and Staff, ou=People, o=University of Michigan, c=US\n\x01\x00\n\x01\x03\x02\x01\x00\x02\x01\x00\x01\x01\x00\x87\x0bobjectclass0\x82\x01\xb0\x04\rmemberOfGroup\x04\x03acl\x04\x02cn\x04\x05title\x04\rpostalAddress\x04\x0ftelephoneNumber\x04\x04mail\x04\x06member\x04\thomePhone\x04\x11homePostalAddress\x04\x0bobjectClass\x04\x0bdescription\x04\x18facsimileTelephoneNumber\x04\x05pager\x04\x03uid\x04\x0cuserPassword\x04\x08joinable\x04\x10associatedDomain\x04\x05owner\x04\x0erfc822ErrorsTo\x04\x08ErrorsTo\x04\x10rfc822RequestsTo\x04\nRequestsTo\x04\tmoderator\x04\nlabeledURL\x04\nonVacation\x04\x0fvacationMessage\x04\x05drink\x04\x0elastModifiedBy\x04\x10lastModifiedTime\x04\rmodifiersname\x04\x0fmodifytimestamp\x04\x0ccreatorsname\x04\x0fcreatetimestamp'
+ assert (decode(s) == [(48, [(2, 11), (99, [(4, 'cn=Douglas J Song 1, ou=Information Technology Division, ou=Faculty and Staff, ou=People, o=University of Michigan, c=US'), (10, '\x00'), (10, '\x03'), (2, 0), (2, 0), (1, '\x00'), (135, 'objectclass'), (48, [(4, 'memberOfGroup'), (4, 'acl'), (4, 'cn'), (4, 'title'), (4, 'postalAddress'), (4, 'telephoneNumber'), (4, 'mail'), (4, 'member'), (4, 'homePhone'), (4, 'homePostalAddress'), (4, 'objectClass'), (4, 'description'), (4, 'facsimileTelephoneNumber'), (4, 'pager'), (4, 'uid'), (4, 'userPassword'), (4, 'joinable'), (4, 'associatedDomain'), (4, 'owner'), (4, 'rfc822ErrorsTo'), (4, 'ErrorsTo'), (4, 'rfc822RequestsTo'), (4, 'RequestsTo'), (4, 'moderator'), (4, 'labeledURL'), (4, 'onVacation'), (4, 'vacationMessage'), (4, 'drink'), (4, 'lastModifiedBy'), (4, 'lastModifiedTime'), (4, 'modifiersname'), (4, 'modifytimestamp'), (4, 'creatorsname'), (4, 'createtimestamp')])])])])
+
+if __name__ == '__main__':
+ test_asn1()
+ print 'Tests Successful...' \ No newline at end of file
diff --git a/external_libs/python/dpkt-1.8.6.2/dpkt/bgp.py b/external_libs/python/dpkt-1.8.6.2/dpkt/bgp.py
new file mode 100644
index 00000000..7439a0e3
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/dpkt/bgp.py
@@ -0,0 +1,789 @@
+# $Id: bgp.py 76 2011-01-06 15:51:30Z dugsong $
+# -*- coding: utf-8 -*-
+"""Border Gateway Protocol."""
+
+import struct
+import socket
+import dpkt
+from decorators import deprecated
+
+
+# Border Gateway Protocol 4 - RFC 4271
+# Communities Attribute - RFC 1997
+# Capabilities - RFC 3392
+# Route Refresh - RFC 2918
+# Route Reflection - RFC 4456
+# Confederations - RFC 3065
+# Cease Subcodes - RFC 4486
+# NOPEER Community - RFC 3765
+# Multiprotocol Extensions - 2858
+
+# Message Types
+OPEN = 1
+UPDATE = 2
+NOTIFICATION = 3
+KEEPALIVE = 4
+ROUTE_REFRESH = 5
+
+# Attribute Types
+ORIGIN = 1
+AS_PATH = 2
+NEXT_HOP = 3
+MULTI_EXIT_DISC = 4
+LOCAL_PREF = 5
+ATOMIC_AGGREGATE = 6
+AGGREGATOR = 7
+COMMUNITIES = 8
+ORIGINATOR_ID = 9
+CLUSTER_LIST = 10
+MP_REACH_NLRI = 14
+MP_UNREACH_NLRI = 15
+
+# Origin Types
+ORIGIN_IGP = 0
+ORIGIN_EGP = 1
+INCOMPLETE = 2
+
+# AS Path Types
+AS_SET = 1
+AS_SEQUENCE = 2
+AS_CONFED_SEQUENCE = 3
+AS_CONFED_SET = 4
+
+# Reserved Communities Types
+NO_EXPORT = 0xffffff01L
+NO_ADVERTISE = 0xffffff02L
+NO_EXPORT_SUBCONFED = 0xffffff03L
+NO_PEER = 0xffffff04L
+
+# Common AFI types
+AFI_IPV4 = 1
+AFI_IPV6 = 2
+
+# Multiprotocol SAFI types
+SAFI_UNICAST = 1
+SAFI_MULTICAST = 2
+SAFI_UNICAST_MULTICAST = 3
+
+# OPEN Message Optional Parameters
+AUTHENTICATION = 1
+CAPABILITY = 2
+
+# Capability Types
+CAP_MULTIPROTOCOL = 1
+CAP_ROUTE_REFRESH = 2
+
+# NOTIFICATION Error Codes
+MESSAGE_HEADER_ERROR = 1
+OPEN_MESSAGE_ERROR = 2
+UPDATE_MESSAGE_ERROR = 3
+HOLD_TIMER_EXPIRED = 4
+FSM_ERROR = 5
+CEASE = 6
+
+# Message Header Error Subcodes
+CONNECTION_NOT_SYNCHRONIZED = 1
+BAD_MESSAGE_LENGTH = 2
+BAD_MESSAGE_TYPE = 3
+
+# OPEN Message Error Subcodes
+UNSUPPORTED_VERSION_NUMBER = 1
+BAD_PEER_AS = 2
+BAD_BGP_IDENTIFIER = 3
+UNSUPPORTED_OPTIONAL_PARAMETER = 4
+AUTHENTICATION_FAILURE = 5
+UNACCEPTABLE_HOLD_TIME = 6
+UNSUPPORTED_CAPABILITY = 7
+
+# UPDATE Message Error Subcodes
+MALFORMED_ATTRIBUTE_LIST = 1
+UNRECOGNIZED_ATTRIBUTE = 2
+MISSING_ATTRIBUTE = 3
+ATTRIBUTE_FLAGS_ERROR = 4
+ATTRIBUTE_LENGTH_ERROR = 5
+INVALID_ORIGIN_ATTRIBUTE = 6
+AS_ROUTING_LOOP = 7
+INVALID_NEXT_HOP_ATTRIBUTE = 8
+OPTIONAL_ATTRIBUTE_ERROR = 9
+INVALID_NETWORK_FIELD = 10
+MALFORMED_AS_PATH = 11
+
+# Cease Error Subcodes
+MAX_NUMBER_OF_PREFIXES_REACHED = 1
+ADMINISTRATIVE_SHUTDOWN = 2
+PEER_DECONFIGURED = 3
+ADMINISTRATIVE_RESET = 4
+CONNECTION_REJECTED = 5
+OTHER_CONFIGURATION_CHANGE = 6
+CONNECTION_COLLISION_RESOLUTION = 7
+OUT_OF_RESOURCES = 8
+
+
+class BGP(dpkt.Packet):
+ __hdr__ = (
+ ('marker', '16s', '\xff' * 16),
+ ('len', 'H', 0),
+ ('type', 'B', OPEN)
+ )
+
+ def unpack(self, buf):
+ dpkt.Packet.unpack(self, buf)
+ self.data = self.data[:self.len - self.__hdr_len__]
+ if self.type == OPEN:
+ self.data = self.open = self.Open(self.data)
+ elif self.type == UPDATE:
+ self.data = self.update = self.Update(self.data)
+ elif self.type == NOTIFICATION:
+ self.data = self.notifiation = self.Notification(self.data)
+ elif self.type == KEEPALIVE:
+ self.data = self.keepalive = self.Keepalive(self.data)
+ elif self.type == ROUTE_REFRESH:
+ self.data = self.route_refresh = self.RouteRefresh(self.data)
+
+ class Open(dpkt.Packet):
+ __hdr__ = (
+ ('v', 'B', 4),
+ ('asn', 'H', 0),
+ ('holdtime', 'H', 0),
+ ('identifier', 'I', 0),
+ ('param_len', 'B', 0)
+ )
+ __hdr_defaults__ = {
+ 'parameters': []
+ }
+
+ def unpack(self, buf):
+ dpkt.Packet.unpack(self, buf)
+ l = []
+ plen = self.param_len
+ while plen > 0:
+ param = self.Parameter(self.data)
+ self.data = self.data[len(param):]
+ plen -= len(param)
+ l.append(param)
+ self.data = self.parameters = l
+
+ def __len__(self):
+ return self.__hdr_len__ + sum(map(len, self.parameters))
+
+ def __str__(self):
+ params = ''.join(map(str, self.parameters))
+ self.param_len = len(params)
+ return self.pack_hdr() + params
+
+ class Parameter(dpkt.Packet):
+ __hdr__ = (
+ ('type', 'B', 0),
+ ('len', 'B', 0)
+ )
+
+ def unpack(self, buf):
+ dpkt.Packet.unpack(self, buf)
+ self.data = self.data[:self.len]
+
+ if self.type == AUTHENTICATION:
+ self.data = self.authentication = self.Authentication(self.data)
+ elif self.type == CAPABILITY:
+ self.data = self.capability = self.Capability(self.data)
+
+ class Authentication(dpkt.Packet):
+ __hdr__ = (
+ ('code', 'B', 0),
+ )
+
+ class Capability(dpkt.Packet):
+ __hdr__ = (
+ ('code', 'B', 0),
+ ('len', 'B', 0)
+ )
+
+ def unpack(self, buf):
+ dpkt.Packet.unpack(self, buf)
+ self.data = self.data[:self.len]
+
+ class Update(dpkt.Packet):
+ __hdr_defaults__ = {
+ 'withdrawn': [],
+ 'attributes': [],
+ 'announced': []
+ }
+
+ def unpack(self, buf):
+ self.data = buf
+
+ # Withdrawn Routes
+ wlen = struct.unpack('>H', self.data[:2])[0]
+ self.data = self.data[2:]
+ l = []
+ while wlen > 0:
+ route = RouteIPV4(self.data)
+ self.data = self.data[len(route):]
+ wlen -= len(route)
+ l.append(route)
+ self.withdrawn = l
+
+ # Path Attributes
+ plen = struct.unpack('>H', self.data[:2])[0]
+ self.data = self.data[2:]
+ l = []
+ while plen > 0:
+ attr = self.Attribute(self.data)
+ self.data = self.data[len(attr):]
+ plen -= len(attr)
+ l.append(attr)
+ self.attributes = l
+
+ # Announced Routes
+ l = []
+ while self.data:
+ route = RouteIPV4(self.data)
+ self.data = self.data[len(route):]
+ l.append(route)
+ self.announced = l
+
+ def __len__(self):
+ return 2 + sum(map(len, self.withdrawn)) + \
+ 2 + sum(map(len, self.attributes)) + \
+ sum(map(len, self.announced))
+
+ def __str__(self):
+ return struct.pack('>H', sum(map(len, self.withdrawn))) + \
+ ''.join(map(str, self.withdrawn)) + \
+ struct.pack('>H', sum(map(len, self.attributes))) + \
+ ''.join(map(str, self.attributes)) + \
+ ''.join(map(str, self.announced))
+
+ class Attribute(dpkt.Packet):
+ __hdr__ = (
+ ('flags', 'B', 0),
+ ('type', 'B', 0)
+ )
+
+ @property
+ def optional(self):
+ return (self.flags >> 7) & 0x1
+
+ @optional.setter
+ def optional(self, o):
+ self.flags = (self.flags & ~0x80) | ((o & 0x1) << 7)
+
+ @property
+ def transitive(self):
+ return (self.flags >> 6) & 0x1
+
+ @transitive.setter
+ def transitive(self, t):
+ self.flags = (self.flags & ~0x40) | ((t & 0x1) << 6)
+
+ @property
+ def partial(self):
+ return (self.flags >> 5) & 0x1
+
+ @partial.setter
+ def partial(self, p):
+ self.flags = (self.flags & ~0x20) | ((p & 0x1) << 5)
+
+ @property
+ def extended_length(self):
+ return (self.flags >> 4) & 0x1
+
+ @extended_length.setter
+ def extended_length(self, e):
+ self.flags = (self.flags & ~0x10) | ((e & 0x1) << 4)
+
+ # Deprecated methods, will be removed in the future
+ # ======================================================
+ @deprecated
+ def _get_o(self):
+ return self.optional
+
+ @deprecated
+ def _set_o(self, o):
+ self.optional = o
+
+ @deprecated
+ def _get_t(self):
+ return self.transitive
+
+ @deprecated
+ def _set_t(self, t):
+ self.transitive = t
+
+ @deprecated
+ def _get_p(self):
+ return self.partial
+
+ @deprecated
+ def _set_p(self, p):
+ self.partial = p
+
+ @deprecated
+ def _get_e(self):
+ return self.extended_length
+
+ @deprecated
+ def _set_e(self, e):
+ self.extended_length = e
+
+ # ======================================================
+
+ def unpack(self, buf):
+ dpkt.Packet.unpack(self, buf)
+
+ if self.extended_length:
+ self.len = struct.unpack('>H', self.data[:2])[0]
+ self.data = self.data[2:]
+ else:
+ self.len = struct.unpack('B', self.data[:1])[0]
+ self.data = self.data[1:]
+
+ self.data = self.data[:self.len]
+
+ if self.type == ORIGIN:
+ self.data = self.origin = self.Origin(self.data)
+ elif self.type == AS_PATH:
+ self.data = self.as_path = self.ASPath(self.data)
+ elif self.type == NEXT_HOP:
+ self.data = self.next_hop = self.NextHop(self.data)
+ elif self.type == MULTI_EXIT_DISC:
+ self.data = self.multi_exit_disc = self.MultiExitDisc(self.data)
+ elif self.type == LOCAL_PREF:
+ self.data = self.local_pref = self.LocalPref(self.data)
+ elif self.type == ATOMIC_AGGREGATE:
+ self.data = self.atomic_aggregate = self.AtomicAggregate(self.data)
+ elif self.type == AGGREGATOR:
+ self.data = self.aggregator = self.Aggregator(self.data)
+ elif self.type == COMMUNITIES:
+ self.data = self.communities = self.Communities(self.data)
+ elif self.type == ORIGINATOR_ID:
+ self.data = self.originator_id = self.OriginatorID(self.data)
+ elif self.type == CLUSTER_LIST:
+ self.data = self.cluster_list = self.ClusterList(self.data)
+ elif self.type == MP_REACH_NLRI:
+ self.data = self.mp_reach_nlri = self.MPReachNLRI(self.data)
+ elif self.type == MP_UNREACH_NLRI:
+ self.data = self.mp_unreach_nlri = self.MPUnreachNLRI(self.data)
+
+ def __len__(self):
+ if self.extended_length:
+ attr_len = 2
+ else:
+ attr_len = 1
+ return self.__hdr_len__ + attr_len + len(self.data)
+
+ def __str__(self):
+ if self.extended_length:
+ attr_len_str = struct.pack('>H', self.len)
+ else:
+ attr_len_str = struct.pack('B', self.len)
+ return self.pack_hdr() + attr_len_str + str(self.data)
+
+ class Origin(dpkt.Packet):
+ __hdr__ = (
+ ('type', 'B', ORIGIN_IGP),
+ )
+
+ class ASPath(dpkt.Packet):
+ __hdr_defaults__ = {
+ 'segments': []
+ }
+
+ def unpack(self, buf):
+ self.data = buf
+ l = []
+ while self.data:
+ seg = self.ASPathSegment(self.data)
+ self.data = self.data[len(seg):]
+ l.append(seg)
+ self.data = self.segments = l
+
+ def __len__(self):
+ return sum(map(len, self.data))
+
+ def __str__(self):
+ return ''.join(map(str, self.data))
+
+ class ASPathSegment(dpkt.Packet):
+ __hdr__ = (
+ ('type', 'B', 0),
+ ('len', 'B', 0)
+ )
+
+ def unpack(self, buf):
+ dpkt.Packet.unpack(self, buf)
+ l = []
+ for i in range(self.len):
+ AS = struct.unpack('>H', self.data[:2])[0]
+ self.data = self.data[2:]
+ l.append(AS)
+ self.data = self.path = l
+
+ def __len__(self):
+ return self.__hdr_len__ + 2 * len(self.path)
+
+ def __str__(self):
+ as_str = ''
+ for AS in self.path:
+ as_str += struct.pack('>H', AS)
+ return self.pack_hdr() + as_str
+
+ class NextHop(dpkt.Packet):
+ __hdr__ = (
+ ('ip', 'I', 0),
+ )
+
+ class MultiExitDisc(dpkt.Packet):
+ __hdr__ = (
+ ('value', 'I', 0),
+ )
+
+ class LocalPref(dpkt.Packet):
+ __hdr__ = (
+ ('value', 'I', 0),
+ )
+
+ class AtomicAggregate(dpkt.Packet):
+ def unpack(self, buf):
+ pass
+
+ def __len__(self):
+ return 0
+
+ def __str__(self):
+ return ''
+
+ class Aggregator(dpkt.Packet):
+ __hdr__ = (
+ ('asn', 'H', 0),
+ ('ip', 'I', 0)
+ )
+
+ class Communities(dpkt.Packet):
+ __hdr_defaults__ = {
+ 'list': []
+ }
+
+ def unpack(self, buf):
+ self.data = buf
+ l = []
+ while self.data:
+ val = struct.unpack('>I', self.data[:4])[0]
+ if (0x00000000L <= val <= 0x0000ffffL) or (0xffff0000L <= val <= 0xffffffffL):
+ comm = self.ReservedCommunity(self.data[:4])
+ else:
+ comm = self.Community(self.data[:4])
+ self.data = self.data[len(comm):]
+ l.append(comm)
+ self.data = self.list = l
+
+ def __len__(self):
+ return sum(map(len, self.data))
+
+ def __str__(self):
+ return ''.join(map(str, self.data))
+
+ class Community(dpkt.Packet):
+ __hdr__ = (
+ ('asn', 'H', 0),
+ ('value', 'H', 0)
+ )
+
+ class ReservedCommunity(dpkt.Packet):
+ __hdr__ = (
+ ('value', 'I', 0),
+ )
+
+ class OriginatorID(dpkt.Packet):
+ __hdr__ = (
+ ('value', 'I', 0),
+ )
+
+ class ClusterList(dpkt.Packet):
+ __hdr_defaults__ = {
+ 'list': []
+ }
+
+ def unpack(self, buf):
+ self.data = buf
+ l = []
+ while self.data:
+ id = struct.unpack('>I', self.data[:4])[0]
+ self.data = self.data[4:]
+ l.append(id)
+ self.data = self.list = l
+
+ def __len__(self):
+ return 4 * len(self.list)
+
+ def __str__(self):
+ cluster_str = ''
+ for val in self.list:
+ cluster_str += struct.pack('>I', val)
+ return cluster_str
+
+ class MPReachNLRI(dpkt.Packet):
+ __hdr__ = (
+ ('afi', 'H', AFI_IPV4),
+ ('safi', 'B', SAFI_UNICAST),
+ )
+
+ def unpack(self, buf):
+ dpkt.Packet.unpack(self, buf)
+
+ # Next Hop
+ nlen = struct.unpack('B', self.data[:1])[0]
+ self.data = self.data[1:]
+ self.next_hop = self.data[:nlen]
+ self.data = self.data[nlen:]
+
+ # SNPAs
+ l = []
+ num_snpas = struct.unpack('B', self.data[:1])[0]
+ self.data = self.data[1:]
+ for i in range(num_snpas):
+ snpa = self.SNPA(self.data)
+ self.data = self.data[len(snpa):]
+ l.append(snpa)
+ self.snpas = l
+
+ if self.afi == AFI_IPV4:
+ Route = RouteIPV4
+ elif self.afi == AFI_IPV6:
+ Route = RouteIPV6
+ else:
+ Route = RouteGeneric
+
+ # Announced Routes
+ l = []
+ while self.data:
+ route = Route(self.data)
+ self.data = self.data[len(route):]
+ l.append(route)
+ self.data = self.announced = l
+
+ def __len__(self):
+ return self.__hdr_len__ + \
+ 1 + len(self.next_hop) + \
+ 1 + sum(map(len, self.snpas)) + \
+ sum(map(len, self.announced))
+
+ def __str__(self):
+ return self.pack_hdr() + \
+ struct.pack('B', len(self.next_hop)) + \
+ str(self.next_hop) + \
+ struct.pack('B', len(self.snpas)) + \
+ ''.join(map(str, self.snpas)) + \
+ ''.join(map(str, self.announced))
+
+ class SNPA(object):
+ __hdr__ = (
+ ('len', 'B', 0),
+ )
+
+ def unpack(self, buf):
+ dpkt.Packet.unpack(self, buf)
+ self.data = self.data[:(self.len + 1) / 2]
+
+ class MPUnreachNLRI(dpkt.Packet):
+ __hdr__ = (
+ ('afi', 'H', AFI_IPV4),
+ ('safi', 'B', SAFI_UNICAST),
+ )
+
+ def unpack(self, buf):
+ dpkt.Packet.unpack(self, buf)
+
+ if self.afi == AFI_IPV4:
+ Route = RouteIPV4
+ elif self.afi == AFI_IPV6:
+ Route = RouteIPV6
+ else:
+ Route = RouteGeneric
+
+ # Withdrawn Routes
+ l = []
+ while self.data:
+ route = Route(self.data)
+ self.data = self.data[len(route):]
+ l.append(route)
+ self.data = self.withdrawn = l
+
+ def __len__(self):
+ return self.__hdr_len__ + sum(map(len, self.data))
+
+ def __str__(self):
+ return self.pack_hdr() + ''.join(map(str, self.data))
+
+ class Notification(dpkt.Packet):
+ __hdr__ = (
+ ('code', 'B', 0),
+ ('subcode', 'B', 0),
+ )
+
+ def unpack(self, buf):
+ dpkt.Packet.unpack(self, buf)
+ self.error = self.data
+
+ class Keepalive(dpkt.Packet):
+ def unpack(self, buf):
+ pass
+
+ def __len__(self):
+ return 0
+
+ def __str__(self):
+ return ''
+
+ class RouteRefresh(dpkt.Packet):
+ __hdr__ = (
+ ('afi', 'H', AFI_IPV4),
+ ('rsvd', 'B', 0),
+ ('safi', 'B', SAFI_UNICAST)
+ )
+
+
+class RouteGeneric(dpkt.Packet):
+ __hdr__ = (
+ ('len', 'B', 0),
+ )
+
+ def unpack(self, buf):
+ dpkt.Packet.unpack(self, buf)
+ self.data = self.prefix = self.data[:(self.len + 7) / 8]
+
+
+class RouteIPV4(dpkt.Packet):
+ __hdr__ = (
+ ('len', 'B', 0),
+ )
+
+ def unpack(self, buf):
+ dpkt.Packet.unpack(self, buf)
+ tmp = self.data[:(self.len + 7) / 8]
+ tmp += (4 - len(tmp)) * '\x00'
+ self.data = self.prefix = tmp
+
+ def __repr__(self):
+ cidr = '%s/%d' % (socket.inet_ntoa(self.prefix), self.len)
+ return '%s(%s)' % (self.__class__.__name__, cidr)
+
+ def __len__(self):
+ return self.__hdr_len__ + (self.len + 7) / 8
+
+ def __str__(self):
+ return self.pack_hdr() + self.prefix[:(self.len + 7) / 8]
+
+
+class RouteIPV6(dpkt.Packet):
+ __hdr__ = (
+ ('len', 'B', 0),
+ )
+
+ def unpack(self, buf):
+ dpkt.Packet.unpack(self, buf)
+ tmp = self.data[:(self.len + 7) / 8]
+ tmp += (16 - len(tmp)) * '\x00'
+ self.data = self.prefix = tmp
+
+ def __len__(self):
+ return self.__hdr_len__ + (self.len + 7) / 8
+
+ def __str__(self):
+ return self.pack_hdr() + self.prefix[:(self.len + 7) / 8]
+
+
+__bgp1 = '\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\x00\x13\x04'
+__bgp2 = '\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\x00\x63\x02\x00\x00\x00\x48\x40\x01\x01\x00\x40\x02\x0a\x01\x02\x01\xf4\x01\xf4\x02\x01\xfe\xbb\x40\x03\x04\xc0\xa8\x00\x0f\x40\x05\x04\x00\x00\x00\x64\x40\x06\x00\xc0\x07\x06\xfe\xba\xc0\xa8\x00\x0a\xc0\x08\x0c\xfe\xbf\x00\x01\x03\x16\x00\x04\x01\x54\x00\xfa\x80\x09\x04\xc0\xa8\x00\x0f\x80\x0a\x04\xc0\xa8\x00\xfa\x16\xc0\xa8\x04'
+__bgp3 = '\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\x00\x79\x02\x00\x00\x00\x62\x40\x01\x01\x00\x40\x02\x00\x40\x05\x04\x00\x00\x00\x64\xc0\x10\x08\x00\x02\x01\x2c\x00\x00\x01\x2c\xc0\x80\x24\x00\x00\xfd\xe9\x40\x01\x01\x00\x40\x02\x04\x02\x01\x15\xb3\x40\x05\x04\x00\x00\x00\x2c\x80\x09\x04\x16\x05\x05\x05\x80\x0a\x04\x16\x05\x05\x05\x90\x0e\x00\x1e\x00\x01\x80\x0c\x00\x00\x00\x00\x00\x00\x00\x00\x0c\x04\x04\x04\x00\x60\x18\x77\x01\x00\x00\x01\xf4\x00\x00\x01\xf4\x85'
+__bgp4 = '\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\x00\x2d\x01\x04\x00\xed\x00\x5a\xc6\x6e\x83\x7d\x10\x02\x06\x01\x04\x00\x01\x00\x01\x02\x02\x80\x00\x02\x02\x02\x00'
+
+
+def test_pack():
+ assert (__bgp1 == str(BGP(__bgp1)))
+ assert (__bgp2 == str(BGP(__bgp2)))
+ assert (__bgp3 == str(BGP(__bgp3)))
+ assert (__bgp4 == str(BGP(__bgp4)))
+
+
+def test_unpack():
+ b1 = BGP(__bgp1)
+ assert (b1.len == 19)
+ assert (b1.type == KEEPALIVE)
+ assert (b1.keepalive is not None)
+
+ b2 = BGP(__bgp2)
+ assert (b2.type == UPDATE)
+ assert (len(b2.update.withdrawn) == 0)
+ assert (len(b2.update.announced) == 1)
+ assert (len(b2.update.attributes) == 9)
+ a = b2.update.attributes[1]
+ assert (a.type == AS_PATH)
+ assert (a.len == 10)
+ assert (len(a.as_path.segments) == 2)
+ s = a.as_path.segments[0]
+ assert (s.type == AS_SET)
+ assert (s.len == 2)
+ assert (len(s.path) == 2)
+ assert (s.path[0] == 500)
+
+ a = b2.update.attributes[6]
+ assert (a.type == COMMUNITIES)
+ assert (a.len == 12)
+ assert (len(a.communities.list) == 3)
+ c = a.communities.list[0]
+ assert (c.asn == 65215)
+ assert (c.value == 1)
+ r = b2.update.announced[0]
+ assert (r.len == 22)
+ assert (r.prefix == '\xc0\xa8\x04\x00')
+
+ b3 = BGP(__bgp3)
+ assert (b3.type == UPDATE)
+ assert (len(b3.update.withdrawn) == 0)
+ assert (len(b3.update.announced) == 0)
+ assert (len(b3.update.attributes) == 6)
+ a = b3.update.attributes[0]
+ assert (a.optional == False)
+ assert (a.transitive == True)
+ assert (a.partial == False)
+ assert (a.extended_length == False)
+ assert (a.type == ORIGIN)
+ assert (a.len == 1)
+ o = a.origin
+ assert (o.type == ORIGIN_IGP)
+ a = b3.update.attributes[5]
+ assert (a.optional == True)
+ assert (a.transitive == False)
+ assert (a.partial == False)
+ assert (a.extended_length == True)
+ assert (a.type == MP_REACH_NLRI)
+ assert (a.len == 30)
+ m = a.mp_reach_nlri
+ assert (m.afi == AFI_IPV4)
+ assert (len(m.snpas) == 0)
+ assert (len(m.announced) == 1)
+ p = m.announced[0]
+ assert (p.len == 96)
+
+ b4 = BGP(__bgp4)
+ assert (b4.len == 45)
+ assert (b4.type == OPEN)
+ assert (b4.open.asn == 237)
+ assert (b4.open.param_len == 16)
+ assert (len(b4.open.parameters) == 3)
+ p = b4.open.parameters[0]
+ assert (p.type == CAPABILITY)
+ assert (p.len == 6)
+ c = p.capability
+ assert (c.code == CAP_MULTIPROTOCOL)
+ assert (c.len == 4)
+ assert (c.data == '\x00\x01\x00\x01')
+ c = b4.open.parameters[2].capability
+ assert (c.code == CAP_ROUTE_REFRESH)
+ assert (c.len == 0)
+
+
+if __name__ == '__main__':
+ test_pack()
+ test_unpack()
+ print 'Tests Successful...'
diff --git a/external_libs/python/dpkt-1.8.6.2/dpkt/cdp.py b/external_libs/python/dpkt-1.8.6.2/dpkt/cdp.py
new file mode 100644
index 00000000..43c6a564
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/dpkt/cdp.py
@@ -0,0 +1,99 @@
+# $Id: cdp.py 23 2006-11-08 15:45:33Z dugsong $
+# -*- coding: utf-8 -*-
+"""Cisco Discovery Protocol."""
+
+import struct
+import dpkt
+
+CDP_DEVID = 1 # string
+CDP_ADDRESS = 2
+CDP_PORTID = 3 # string
+CDP_CAPABILITIES = 4 # 32-bit bitmask
+CDP_VERSION = 5 # string
+CDP_PLATFORM = 6 # string
+CDP_IPPREFIX = 7
+
+CDP_VTP_MGMT_DOMAIN = 9 # string
+CDP_NATIVE_VLAN = 10 # 16-bit integer
+CDP_DUPLEX = 11 # 8-bit boolean
+CDP_TRUST_BITMAP = 18 # 8-bit bitmask0x13
+CDP_UNTRUST_COS = 19 # 8-bit port
+CDP_SYSTEM_NAME = 20 # string
+CDP_SYSTEM_OID = 21 # 10-byte binary string
+CDP_MGMT_ADDRESS = 22 # 32-bit number of addrs, Addresses
+CDP_LOCATION = 23 # string
+
+
+class CDP(dpkt.Packet):
+ __hdr__ = (
+ ('version', 'B', 2),
+ ('ttl', 'B', 180),
+ ('sum', 'H', 0)
+ )
+
+ class Address(dpkt.Packet):
+ # XXX - only handle NLPID/IP for now
+ __hdr__ = (
+ ('ptype', 'B', 1), # protocol type (NLPID)
+ ('plen', 'B', 1), # protocol length
+ ('p', 'B', 0xcc), # IP
+ ('alen', 'H', 4) # address length
+ )
+
+ def unpack(self, buf):
+ dpkt.Packet.unpack(self, buf)
+ self.data = self.data[:self.alen]
+
+ class TLV(dpkt.Packet):
+ __hdr__ = (
+ ('type', 'H', 0),
+ ('len', 'H', 4)
+ )
+
+ def unpack(self, buf):
+ dpkt.Packet.unpack(self, buf)
+ self.data = self.data[:self.len - 4]
+ if self.type == CDP_ADDRESS:
+ n = struct.unpack('>I', self.data[:4])[0]
+ buf = self.data[4:]
+ l = []
+ for i in range(n):
+ a = CDP.Address(buf)
+ l.append(a)
+ buf = buf[len(a):]
+ self.data = l
+
+ def __len__(self):
+ if self.type == CDP_ADDRESS:
+ n = 4 + sum(map(len, self.data))
+ else:
+ n = len(self.data)
+ return self.__hdr_len__ + n
+
+ def __str__(self):
+ self.len = len(self)
+ if self.type == CDP_ADDRESS:
+ s = struct.pack('>I', len(self.data)) + \
+ ''.join(map(str, self.data))
+ else:
+ s = self.data
+ return self.pack_hdr() + s
+
+ def unpack(self, buf):
+ dpkt.Packet.unpack(self, buf)
+ buf = self.data
+ l = []
+ while buf:
+ tlv = self.TLV(buf)
+ l.append(tlv)
+ buf = buf[len(tlv):]
+ self.data = l
+
+ def __len__(self):
+ return self.__hdr_len__ + sum(map(len, self.data))
+
+ def __str__(self):
+ data = ''.join(map(str, self.data))
+ if not self.sum:
+ self.sum = dpkt.in_cksum(self.pack_hdr() + data)
+ return self.pack_hdr() + data
diff --git a/external_libs/python/dpkt-1.8.6.2/dpkt/crc32c.py b/external_libs/python/dpkt-1.8.6.2/dpkt/crc32c.py
new file mode 100644
index 00000000..aaf40e1f
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/dpkt/crc32c.py
@@ -0,0 +1,83 @@
+# $Id: crc32c.py 23 2006-11-08 15:45:33Z dugsong $
+# -*- coding: utf-8 -*-
+import array
+
+# CRC-32C Checksum
+# http://tools.ietf.org/html/rfc3309
+
+crc32c_table = (
+ 0x00000000L, 0xF26B8303L, 0xE13B70F7L, 0x1350F3F4L, 0xC79A971FL,
+ 0x35F1141CL, 0x26A1E7E8L, 0xD4CA64EBL, 0x8AD958CFL, 0x78B2DBCCL,
+ 0x6BE22838L, 0x9989AB3BL, 0x4D43CFD0L, 0xBF284CD3L, 0xAC78BF27L,
+ 0x5E133C24L, 0x105EC76FL, 0xE235446CL, 0xF165B798L, 0x030E349BL,
+ 0xD7C45070L, 0x25AFD373L, 0x36FF2087L, 0xC494A384L, 0x9A879FA0L,
+ 0x68EC1CA3L, 0x7BBCEF57L, 0x89D76C54L, 0x5D1D08BFL, 0xAF768BBCL,
+ 0xBC267848L, 0x4E4DFB4BL, 0x20BD8EDEL, 0xD2D60DDDL, 0xC186FE29L,
+ 0x33ED7D2AL, 0xE72719C1L, 0x154C9AC2L, 0x061C6936L, 0xF477EA35L,
+ 0xAA64D611L, 0x580F5512L, 0x4B5FA6E6L, 0xB93425E5L, 0x6DFE410EL,
+ 0x9F95C20DL, 0x8CC531F9L, 0x7EAEB2FAL, 0x30E349B1L, 0xC288CAB2L,
+ 0xD1D83946L, 0x23B3BA45L, 0xF779DEAEL, 0x05125DADL, 0x1642AE59L,
+ 0xE4292D5AL, 0xBA3A117EL, 0x4851927DL, 0x5B016189L, 0xA96AE28AL,
+ 0x7DA08661L, 0x8FCB0562L, 0x9C9BF696L, 0x6EF07595L, 0x417B1DBCL,
+ 0xB3109EBFL, 0xA0406D4BL, 0x522BEE48L, 0x86E18AA3L, 0x748A09A0L,
+ 0x67DAFA54L, 0x95B17957L, 0xCBA24573L, 0x39C9C670L, 0x2A993584L,
+ 0xD8F2B687L, 0x0C38D26CL, 0xFE53516FL, 0xED03A29BL, 0x1F682198L,
+ 0x5125DAD3L, 0xA34E59D0L, 0xB01EAA24L, 0x42752927L, 0x96BF4DCCL,
+ 0x64D4CECFL, 0x77843D3BL, 0x85EFBE38L, 0xDBFC821CL, 0x2997011FL,
+ 0x3AC7F2EBL, 0xC8AC71E8L, 0x1C661503L, 0xEE0D9600L, 0xFD5D65F4L,
+ 0x0F36E6F7L, 0x61C69362L, 0x93AD1061L, 0x80FDE395L, 0x72966096L,
+ 0xA65C047DL, 0x5437877EL, 0x4767748AL, 0xB50CF789L, 0xEB1FCBADL,
+ 0x197448AEL, 0x0A24BB5AL, 0xF84F3859L, 0x2C855CB2L, 0xDEEEDFB1L,
+ 0xCDBE2C45L, 0x3FD5AF46L, 0x7198540DL, 0x83F3D70EL, 0x90A324FAL,
+ 0x62C8A7F9L, 0xB602C312L, 0x44694011L, 0x5739B3E5L, 0xA55230E6L,
+ 0xFB410CC2L, 0x092A8FC1L, 0x1A7A7C35L, 0xE811FF36L, 0x3CDB9BDDL,
+ 0xCEB018DEL, 0xDDE0EB2AL, 0x2F8B6829L, 0x82F63B78L, 0x709DB87BL,
+ 0x63CD4B8FL, 0x91A6C88CL, 0x456CAC67L, 0xB7072F64L, 0xA457DC90L,
+ 0x563C5F93L, 0x082F63B7L, 0xFA44E0B4L, 0xE9141340L, 0x1B7F9043L,
+ 0xCFB5F4A8L, 0x3DDE77ABL, 0x2E8E845FL, 0xDCE5075CL, 0x92A8FC17L,
+ 0x60C37F14L, 0x73938CE0L, 0x81F80FE3L, 0x55326B08L, 0xA759E80BL,
+ 0xB4091BFFL, 0x466298FCL, 0x1871A4D8L, 0xEA1A27DBL, 0xF94AD42FL,
+ 0x0B21572CL, 0xDFEB33C7L, 0x2D80B0C4L, 0x3ED04330L, 0xCCBBC033L,
+ 0xA24BB5A6L, 0x502036A5L, 0x4370C551L, 0xB11B4652L, 0x65D122B9L,
+ 0x97BAA1BAL, 0x84EA524EL, 0x7681D14DL, 0x2892ED69L, 0xDAF96E6AL,
+ 0xC9A99D9EL, 0x3BC21E9DL, 0xEF087A76L, 0x1D63F975L, 0x0E330A81L,
+ 0xFC588982L, 0xB21572C9L, 0x407EF1CAL, 0x532E023EL, 0xA145813DL,
+ 0x758FE5D6L, 0x87E466D5L, 0x94B49521L, 0x66DF1622L, 0x38CC2A06L,
+ 0xCAA7A905L, 0xD9F75AF1L, 0x2B9CD9F2L, 0xFF56BD19L, 0x0D3D3E1AL,
+ 0x1E6DCDEEL, 0xEC064EEDL, 0xC38D26C4L, 0x31E6A5C7L, 0x22B65633L,
+ 0xD0DDD530L, 0x0417B1DBL, 0xF67C32D8L, 0xE52CC12CL, 0x1747422FL,
+ 0x49547E0BL, 0xBB3FFD08L, 0xA86F0EFCL, 0x5A048DFFL, 0x8ECEE914L,
+ 0x7CA56A17L, 0x6FF599E3L, 0x9D9E1AE0L, 0xD3D3E1ABL, 0x21B862A8L,
+ 0x32E8915CL, 0xC083125FL, 0x144976B4L, 0xE622F5B7L, 0xF5720643L,
+ 0x07198540L, 0x590AB964L, 0xAB613A67L, 0xB831C993L, 0x4A5A4A90L,
+ 0x9E902E7BL, 0x6CFBAD78L, 0x7FAB5E8CL, 0x8DC0DD8FL, 0xE330A81AL,
+ 0x115B2B19L, 0x020BD8EDL, 0xF0605BEEL, 0x24AA3F05L, 0xD6C1BC06L,
+ 0xC5914FF2L, 0x37FACCF1L, 0x69E9F0D5L, 0x9B8273D6L, 0x88D28022L,
+ 0x7AB90321L, 0xAE7367CAL, 0x5C18E4C9L, 0x4F48173DL, 0xBD23943EL,
+ 0xF36E6F75L, 0x0105EC76L, 0x12551F82L, 0xE03E9C81L, 0x34F4F86AL,
+ 0xC69F7B69L, 0xD5CF889DL, 0x27A40B9EL, 0x79B737BAL, 0x8BDCB4B9L,
+ 0x988C474DL, 0x6AE7C44EL, 0xBE2DA0A5L, 0x4C4623A6L, 0x5F16D052L,
+ 0xAD7D5351L
+)
+
+
+def add(crc, buf):
+ buf = array.array('B', buf)
+ for b in buf:
+ crc = (crc >> 8) ^ crc32c_table[(crc ^ b) & 0xff]
+ return crc
+
+
+def done(crc):
+ tmp = ~crc & 0xffffffffL
+ b0 = tmp & 0xff
+ b1 = (tmp >> 8) & 0xff
+ b2 = (tmp >> 16) & 0xff
+ b3 = (tmp >> 24) & 0xff
+ crc = (b0 << 24) | (b1 << 16) | (b2 << 8) | b3
+ return crc
+
+
+def cksum(buf):
+ """Return computed CRC-32c checksum."""
+ return done(add(0xffffffffL, buf))
diff --git a/external_libs/python/dpkt-1.8.6.2/dpkt/decorators.py b/external_libs/python/dpkt-1.8.6.2/dpkt/decorators.py
new file mode 100644
index 00000000..08f78161
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/dpkt/decorators.py
@@ -0,0 +1,91 @@
+# -*- coding: utf-8 -*-
+import warnings
+from timeit import Timer
+from test import pystone
+from time import sleep
+
+
+def decorator_with_args(decorator_to_enhance):
+ """
+ This is decorator for decorator. It allows any decorator to get additional arguments
+ """
+ def decorator_maker(*args, **kwargs):
+ def decorator_wrapper(func):
+ return decorator_to_enhance(func, *args, **kwargs)
+ return decorator_wrapper
+ return decorator_maker
+
+
+def deprecated(deprecated_method):
+ def _deprecated(*args, **kwargs):
+ # Print only the first occurrence of the DeprecationWarning, regardless of location
+ warnings.simplefilter('once', DeprecationWarning)
+ # Display the deprecation warning message
+ warnings.warn("Call to deprecated method %s" % deprecated_method.__name__,
+ category=DeprecationWarning, stacklevel=2)
+ return deprecated_method(*args, **kwargs) # actually call the method
+
+ return _deprecated
+
+
+@decorator_with_args
+def duration(function, repeat=10000):
+ def _duration(*args, **kwargs):
+ time = 0
+ try:
+ time = Timer(lambda: function(*args, **kwargs)).timeit(repeat)
+ finally:
+ benchtime, pystones = pystone.pystones()
+ kstones = (pystones * time) / 1000
+ print '%s : time = %f kstones = %f' % (function.__name__, time, kstones)
+ return function(*args, **kwargs)
+
+ return _duration
+
+
+class TestDeprecatedDecorator(object):
+ @deprecated
+ def deprecated_decorator(self):
+ return
+
+ def test_deprecated_decorator(self):
+ import sys
+ from StringIO import StringIO
+
+ saved_stderr = sys.stderr
+ try:
+ out = StringIO()
+ sys.stderr = out
+ self.deprecated_decorator()
+ assert ('DeprecationWarning: Call to deprecated method deprecated_decorator' in out.getvalue())
+ # 'in' because message contains the filename, line, etc
+ finally:
+ sys.stderr = saved_stderr
+
+
+class TestDurationDecorator(object):
+ @duration(1)
+ def duration_decorator(self):
+ sleep(0.05)
+ return
+
+ def test_duration_decorator(self):
+ import sys
+ import re
+ from StringIO import StringIO
+
+ saved_stdout = sys.stdout
+ try:
+ out = StringIO()
+ sys.stdout = out
+ self.duration_decorator()
+ assert (re.match('((.+?[0-9]+\.[0-9]+)\s?){2}', out.getvalue()))
+ finally:
+ sys.stdout = saved_stdout
+
+if __name__ == '__main__':
+ a = TestDeprecatedDecorator()
+ a.test_deprecated_decorator()
+ a = TestDurationDecorator()
+ a.test_duration_decorator()
+ print 'Tests Successful...' \ No newline at end of file
diff --git a/external_libs/python/dpkt-1.8.6.2/dpkt/dhcp.py b/external_libs/python/dpkt-1.8.6.2/dpkt/dhcp.py
new file mode 100644
index 00000000..5332a1fc
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/dpkt/dhcp.py
@@ -0,0 +1,169 @@
+# $Id: dhcp.py 23 2006-11-08 15:45:33Z dugsong $
+# -*- coding: utf-8 -*-
+"""Dynamic Host Configuration Protocol."""
+
+import arp
+import dpkt
+
+DHCP_OP_REQUEST = 1
+DHCP_OP_REPLY = 2
+
+DHCP_MAGIC = 0x63825363
+
+# DHCP option codes
+DHCP_OPT_NETMASK = 1 # I: subnet mask
+DHCP_OPT_TIMEOFFSET = 2
+DHCP_OPT_ROUTER = 3 # s: list of router ips
+DHCP_OPT_TIMESERVER = 4
+DHCP_OPT_NAMESERVER = 5
+DHCP_OPT_DNS_SVRS = 6 # s: list of DNS servers
+DHCP_OPT_LOGSERV = 7
+DHCP_OPT_COOKIESERV = 8
+DHCP_OPT_LPRSERV = 9
+DHCP_OPT_IMPSERV = 10
+DHCP_OPT_RESSERV = 11
+DHCP_OPT_HOSTNAME = 12 # s: client hostname
+DHCP_OPT_BOOTFILESIZE = 13
+DHCP_OPT_DUMPFILE = 14
+DHCP_OPT_DOMAIN = 15 # s: domain name
+DHCP_OPT_SWAPSERV = 16
+DHCP_OPT_ROOTPATH = 17
+DHCP_OPT_EXTENPATH = 18
+DHCP_OPT_IPFORWARD = 19
+DHCP_OPT_SRCROUTE = 20
+DHCP_OPT_POLICYFILTER = 21
+DHCP_OPT_MAXASMSIZE = 22
+DHCP_OPT_IPTTL = 23
+DHCP_OPT_MTUTIMEOUT = 24
+DHCP_OPT_MTUTABLE = 25
+DHCP_OPT_MTUSIZE = 26
+DHCP_OPT_LOCALSUBNETS = 27
+DHCP_OPT_BROADCASTADDR = 28
+DHCP_OPT_DOMASKDISCOV = 29
+DHCP_OPT_MASKSUPPLY = 30
+DHCP_OPT_DOROUTEDISC = 31
+DHCP_OPT_ROUTERSOLICIT = 32
+DHCP_OPT_STATICROUTE = 33
+DHCP_OPT_TRAILERENCAP = 34
+DHCP_OPT_ARPTIMEOUT = 35
+DHCP_OPT_ETHERENCAP = 36
+DHCP_OPT_TCPTTL = 37
+DHCP_OPT_TCPKEEPALIVE = 38
+DHCP_OPT_TCPALIVEGARBAGE = 39
+DHCP_OPT_NISDOMAIN = 40
+DHCP_OPT_NISSERVERS = 41
+DHCP_OPT_NISTIMESERV = 42
+DHCP_OPT_VENDSPECIFIC = 43
+DHCP_OPT_NBNS = 44
+DHCP_OPT_NBDD = 45
+DHCP_OPT_NBTCPIP = 46
+DHCP_OPT_NBTCPSCOPE = 47
+DHCP_OPT_XFONT = 48
+DHCP_OPT_XDISPLAYMGR = 49
+DHCP_OPT_REQ_IP = 50 # I: IP address
+DHCP_OPT_LEASE_SEC = 51 # I: lease seconds
+DHCP_OPT_OPTIONOVERLOAD = 52
+DHCP_OPT_MSGTYPE = 53 # B: message type
+DHCP_OPT_SERVER_ID = 54 # I: server IP address
+DHCP_OPT_PARAM_REQ = 55 # s: list of option codes
+DHCP_OPT_MESSAGE = 56
+DHCP_OPT_MAXMSGSIZE = 57
+DHCP_OPT_RENEWTIME = 58
+DHCP_OPT_REBINDTIME = 59
+DHCP_OPT_VENDOR_ID = 60 # s: vendor class id
+DHCP_OPT_CLIENT_ID = 61 # Bs: idtype, id (idtype 0: FQDN, idtype 1: MAC)
+DHCP_OPT_NISPLUSDOMAIN = 64
+DHCP_OPT_NISPLUSSERVERS = 65
+DHCP_OPT_MOBILEIPAGENT = 68
+DHCP_OPT_SMTPSERVER = 69
+DHCP_OPT_POP3SERVER = 70
+DHCP_OPT_NNTPSERVER = 71
+DHCP_OPT_WWWSERVER = 72
+DHCP_OPT_FINGERSERVER = 73
+DHCP_OPT_IRCSERVER = 74
+DHCP_OPT_STSERVER = 75
+DHCP_OPT_STDASERVER = 76
+
+# DHCP message type values
+DHCPDISCOVER = 1
+DHCPOFFER = 2
+DHCPREQUEST = 3
+DHCPDECLINE = 4
+DHCPACK = 5
+DHCPNAK = 6
+DHCPRELEASE = 7
+DHCPINFORM = 8
+
+
+class DHCP(dpkt.Packet):
+ __hdr__ = (
+ ('op', 'B', DHCP_OP_REQUEST),
+ ('hrd', 'B', arp.ARP_HRD_ETH), # just like ARP.hrd
+ ('hln', 'B', 6), # and ARP.hln
+ ('hops', 'B', 0),
+ ('xid', 'I', 0xdeadbeefL),
+ ('secs', 'H', 0),
+ ('flags', 'H', 0),
+ ('ciaddr', 'I', 0),
+ ('yiaddr', 'I', 0),
+ ('siaddr', 'I', 0),
+ ('giaddr', 'I', 0),
+ ('chaddr', '16s', 16 * '\x00'),
+ ('sname', '64s', 64 * '\x00'),
+ ('file', '128s', 128 * '\x00'),
+ ('magic', 'I', DHCP_MAGIC),
+ )
+ opts = (
+ (DHCP_OPT_MSGTYPE, chr(DHCPDISCOVER)),
+ (DHCP_OPT_PARAM_REQ, ''.join(map(chr, (DHCP_OPT_REQ_IP,
+ DHCP_OPT_ROUTER,
+ DHCP_OPT_NETMASK,
+ DHCP_OPT_DNS_SVRS))))
+ ) # list of (type, data) tuples
+
+ def __len__(self):
+ return self.__hdr_len__ + \
+ sum([2 + len(o[1]) for o in self.opts]) + 1 + len(self.data)
+
+ def __str__(self):
+ return self.pack_hdr() + self.pack_opts() + str(self.data)
+
+ def pack_opts(self):
+ """Return packed options string."""
+ if not self.opts:
+ return ''
+ l = []
+ for t, data in self.opts:
+ l.append('%s%s%s' % (chr(t), chr(len(data)), data))
+ l.append('\xff')
+ return ''.join(l)
+
+ def unpack(self, buf):
+ dpkt.Packet.unpack(self, buf)
+ self.chaddr = self.chaddr[:self.hln]
+ buf = self.data
+ l = []
+ while buf:
+ t = ord(buf[0])
+ if t == 0xff:
+ buf = buf[1:]
+ break
+ elif t == 0:
+ buf = buf[1:]
+ else:
+ n = ord(buf[1])
+ l.append((t, buf[2:2 + n]))
+ buf = buf[2 + n:]
+ self.opts = l
+ self.data = buf
+
+
+def test_dhcp():
+ s = '\x01\x01\x06\x00\xadS\xc8c\xb8\x87\x80\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02U\x82\xf3\xa6\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00c\x82Sc5\x01\x01\xfb\x01\x01=\x07\x01\x00\x02U\x82\xf3\xa62\x04\n\x00\x01e\x0c\tGuinevere<\x08MSFT 5.07\n\x01\x0f\x03\x06,./\x1f!+\xff\x00\x00\x00\x00\x00'
+ dhcp = DHCP(s)
+ assert (s == str(dhcp))
+
+
+if __name__ == '__main__':
+ test_dhcp()
+ print 'Tests Successful...' \ No newline at end of file
diff --git a/external_libs/python/dpkt-1.8.6.2/dpkt/diameter.py b/external_libs/python/dpkt-1.8.6.2/dpkt/diameter.py
new file mode 100644
index 00000000..a6994276
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/dpkt/diameter.py
@@ -0,0 +1,243 @@
+# $Id: diameter.py 23 2006-11-08 15:45:33Z dugsong $
+# -*- coding: utf-8 -*-
+"""Diameter."""
+
+import struct
+import dpkt
+from decorators import deprecated
+
+# Diameter Base Protocol - RFC 3588
+# http://tools.ietf.org/html/rfc3588
+
+# Request/Answer Command Codes
+ABORT_SESSION = 274
+ACCOUTING = 271
+CAPABILITIES_EXCHANGE = 257
+DEVICE_WATCHDOG = 280
+DISCONNECT_PEER = 282
+RE_AUTH = 258
+SESSION_TERMINATION = 275
+
+
+class Diameter(dpkt.Packet):
+ __hdr__ = (
+ ('v', 'B', 1),
+ ('len', '3s', 0),
+ ('flags', 'B', 0),
+ ('cmd', '3s', 0),
+ ('app_id', 'I', 0),
+ ('hop_id', 'I', 0),
+ ('end_id', 'I', 0)
+ )
+
+ @property
+ def request_flag(self):
+ return (self.flags >> 7) & 0x1
+
+ @request_flag.setter
+ def request_flag(self, r):
+ self.flags = (self.flags & ~0x80) | ((r & 0x1) << 7)
+
+ @property
+ def proxiable_flag(self):
+ return (self.flags >> 6) & 0x1
+
+ @proxiable_flag.setter
+ def proxiable_flag(self, p):
+ self.flags = (self.flags & ~0x40) | ((p & 0x1) << 6)
+
+ @property
+ def error_flag(self):
+ return (self.flags >> 5) & 0x1
+
+ @error_flag.setter
+ def error_flag(self, e):
+ self.flags = (self.flags & ~0x20) | ((e & 0x1) << 5)
+
+ @property
+ def retransmit_flag(self):
+ return (self.flags >> 4) & 0x1
+
+ @retransmit_flag.setter
+ def retransmit_flag(self, t):
+ self.flags = (self.flags & ~0x10) | ((t & 0x1) << 4)
+
+ # Deprecated methods, will be removed in the future
+ # ======================================================
+ @deprecated
+ def _get_r(self): return self.request_flag
+
+ @deprecated
+ def _set_r(self, r): self.request_flag = r
+
+ @deprecated
+ def _get_p(self): return self.proxiable_flag
+
+ @deprecated
+ def _set_p(self, p): self.proxiable_flag = p
+
+ @deprecated
+ def _get_e(self): return self.error_flag
+
+ @deprecated
+ def _set_e(self, e): self.error_flag = e
+
+ @deprecated
+ def _get_t(self): return self.request_flag
+
+ @deprecated
+ def _set_t(self, t): self.request_flag = t
+
+ # ======================================================
+
+ def unpack(self, buf):
+ dpkt.Packet.unpack(self, buf)
+ self.cmd = (ord(self.cmd[0]) << 16) | (ord(self.cmd[1]) << 8) | (ord(self.cmd[2]))
+ self.len = (ord(self.len[0]) << 16) | (ord(self.len[1]) << 8) | (ord(self.len[2]))
+ self.data = self.data[:self.len - self.__hdr_len__]
+
+ l = []
+ while self.data:
+ avp = AVP(self.data)
+ l.append(avp)
+ self.data = self.data[len(avp):]
+ self.data = self.avps = l
+
+ def pack_hdr(self):
+ self.len = chr((self.len >> 16) & 0xff) + chr((self.len >> 8) & 0xff) + chr(self.len & 0xff)
+ self.cmd = chr((self.cmd >> 16) & 0xff) + chr((self.cmd >> 8) & 0xff) + chr(self.cmd & 0xff)
+ return dpkt.Packet.pack_hdr(self)
+
+ def __len__(self):
+ return self.__hdr_len__ + sum(map(len, self.data))
+
+ def __str__(self):
+ return self.pack_hdr() + ''.join(map(str, self.data))
+
+
+class AVP(dpkt.Packet):
+ __hdr__ = (
+ ('code', 'I', 0),
+ ('flags', 'B', 0),
+ ('len', '3s', 0),
+ )
+
+ @property
+ def vendor_flag(self):
+ return (self.flags >> 7) & 0x1
+
+ @vendor_flag.setter
+ def vendor_flag(self, v):
+ self.flags = (self.flags & ~0x80) | ((v & 0x1) << 7)
+
+ @property
+ def mandatory_flag(self):
+ return (self.flags >> 6) & 0x1
+
+ @mandatory_flag.setter
+ def mandatory_flag(self, m):
+ self.flags = (self.flags & ~0x40) | ((m & 0x1) << 6)
+
+ @property
+ def protected_flag(self):
+ return (self.flags >> 5) & 0x1
+
+ @protected_flag.setter
+ def protected_flag(self, p):
+ self.flags = (self.flags & ~0x20) | ((p & 0x1) << 5)
+
+ # Deprecated methods, will be removed in the future
+ # ======================================================
+ @deprecated
+ def _get_v(self):
+ return self.vendor_flag
+
+ @deprecated
+ def _set_v(self, v):
+ self.vendor_flag = v
+
+ @deprecated
+ def _get_m(self):
+ return self.mandatory_flag
+
+ @deprecated
+ def _set_m(self, m):
+ self.mandatory_flag = m
+
+ @deprecated
+ def _get_p(self):
+ return self.protected_flag
+
+ @deprecated
+ def _set_p(self, p):
+ self.protected_flag = p
+
+ # ======================================================
+
+ def unpack(self, buf):
+ dpkt.Packet.unpack(self, buf)
+ self.len = (ord(self.len[0]) << 16) | (ord(self.len[1]) << 8) | (ord(self.len[2]))
+
+ if self.vendor_flag:
+ self.vendor = struct.unpack('>I', self.data[:4])[0]
+ self.data = self.data[4:self.len - self.__hdr_len__]
+ else:
+ self.data = self.data[:self.len - self.__hdr_len__]
+
+ def pack_hdr(self):
+ self.len = chr((self.len >> 16) & 0xff) + chr((self.len >> 8) & 0xff) + chr(self.len & 0xff)
+ data = dpkt.Packet.pack_hdr(self)
+ if self.vendor_flag:
+ data += struct.pack('>I', self.vendor)
+ return data
+
+ def __len__(self):
+ length = self.__hdr_len__ + sum(map(len, self.data))
+ if self.vendor_flag:
+ length += 4
+ return length
+
+
+__s = '\x01\x00\x00\x28\x80\x00\x01\x18\x00\x00\x00\x00\x00\x00\x41\xc8\x00\x00\x00\x0c\x00\x00\x01\x08\x40\x00\x00\x0c\x68\x30\x30\x32\x00\x00\x01\x28\x40\x00\x00\x08'
+__t = '\x01\x00\x00\x2c\x80\x00\x01\x18\x00\x00\x00\x00\x00\x00\x41\xc8\x00\x00\x00\x0c\x00\x00\x01\x08\xc0\x00\x00\x10\xde\xad\xbe\xef\x68\x30\x30\x32\x00\x00\x01\x28\x40\x00\x00\x08'
+
+
+def test_pack():
+ d = Diameter(__s)
+ assert (__s == str(d))
+ d = Diameter(__t)
+ assert (__t == str(d))
+
+
+def test_unpack():
+ d = Diameter(__s)
+ assert (d.len == 40)
+ # assert (d.cmd == DEVICE_WATCHDOG_REQUEST)
+ assert (d.request_flag == 1)
+ assert (d.error_flag == 0)
+ assert (len(d.avps) == 2)
+
+ avp = d.avps[0]
+ # assert (avp.code == ORIGIN_HOST)
+ assert (avp.mandatory_flag == 1)
+ assert (avp.vendor_flag == 0)
+ assert (avp.len == 12)
+ assert (len(avp) == 12)
+ assert (avp.data == '\x68\x30\x30\x32')
+
+ # also test the optional vendor id support
+ d = Diameter(__t)
+ assert (d.len == 44)
+ avp = d.avps[0]
+ assert (avp.vendor_flag == 1)
+ assert (avp.len == 16)
+ assert (len(avp) == 16)
+ assert (avp.vendor == 3735928559)
+ assert (avp.data == '\x68\x30\x30\x32')
+
+
+if __name__ == '__main__':
+ test_pack()
+ test_unpack()
+ print 'Tests Successful...'
+
diff --git a/external_libs/python/dpkt-1.8.6.2/dpkt/dns.py b/external_libs/python/dpkt-1.8.6.2/dpkt/dns.py
new file mode 100644
index 00000000..d4d08e47
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/dpkt/dns.py
@@ -0,0 +1,462 @@
+# $Id: dns.py 27 2006-11-21 01:22:52Z dahelder $
+# -*- coding: utf-8 -*-
+"""Domain Name System."""
+
+import struct
+import dpkt
+from decorators import deprecated
+
+DNS_Q = 0
+DNS_R = 1
+
+# Opcodes
+DNS_QUERY = 0
+DNS_IQUERY = 1
+DNS_STATUS = 2
+DNS_NOTIFY = 4
+DNS_UPDATE = 5
+
+# Flags
+DNS_CD = 0x0010 # checking disabled
+DNS_AD = 0x0020 # authenticated data
+DNS_Z = 0x0040 # unused
+DNS_RA = 0x0080 # recursion available
+DNS_RD = 0x0100 # recursion desired
+DNS_TC = 0x0200 # truncated
+DNS_AA = 0x0400 # authoritative answer
+DNS_QR = 0x8000 # response ( query / response )
+
+# Response codes
+DNS_RCODE_NOERR = 0
+DNS_RCODE_FORMERR = 1
+DNS_RCODE_SERVFAIL = 2
+DNS_RCODE_NXDOMAIN = 3
+DNS_RCODE_NOTIMP = 4
+DNS_RCODE_REFUSED = 5
+DNS_RCODE_YXDOMAIN = 6
+DNS_RCODE_YXRRSET = 7
+DNS_RCODE_NXRRSET = 8
+DNS_RCODE_NOTAUTH = 9
+DNS_RCODE_NOTZONE = 10
+
+# RR types
+DNS_A = 1
+DNS_NS = 2
+DNS_CNAME = 5
+DNS_SOA = 6
+DNS_PTR = 12
+DNS_HINFO = 13
+DNS_MX = 15
+DNS_TXT = 16
+DNS_AAAA = 28
+DNS_SRV = 33
+
+# RR classes
+DNS_IN = 1
+DNS_CHAOS = 3
+DNS_HESIOD = 4
+DNS_ANY = 255
+
+
+def pack_name(name, off, label_ptrs):
+ if name:
+ labels = name.split('.')
+ else:
+ labels = []
+ labels.append('')
+ buf = ''
+ for i, label in enumerate(labels):
+ key = '.'.join(labels[i:]).upper()
+ ptr = label_ptrs.get(key)
+ if not ptr:
+ if len(key) > 1:
+ ptr = off + len(buf)
+ if ptr < 0xc000:
+ label_ptrs[key] = ptr
+ i = len(label)
+ buf += chr(i) + label
+ else:
+ buf += struct.pack('>H', (0xc000 | ptr))
+ break
+ return buf
+
+
+def unpack_name(buf, off):
+ name = ''
+ saved_off = 0
+ for _ in range(100): # XXX
+ n = ord(buf[off])
+ if n == 0:
+ off += 1
+ break
+ elif (n & 0xc0) == 0xc0:
+ ptr = struct.unpack('>H', buf[off:off + 2])[0] & 0x3fff
+ off += 2
+ if not saved_off:
+ saved_off = off
+ # XXX - don't use recursion!@#$
+ name = name + unpack_name(buf, ptr)[0] + '.'
+ break
+ else:
+ off += 1
+ name = name + buf[off:off + n] + '.'
+ if len(name) > 255:
+ raise dpkt.UnpackError('name longer than 255 bytes')
+ off += n
+ return name.strip('.'), off
+
+
+class DNS(dpkt.Packet):
+ __hdr__ = (
+ ('id', 'H', 0),
+ ('op', 'H', DNS_RD), # recursive query
+ # XXX - lists of query, RR objects
+ ('qd', 'H', []),
+ ('an', 'H', []),
+ ('ns', 'H', []),
+ ('ar', 'H', [])
+ )
+
+ @property
+ def qr(self):
+ return int((self.op & DNS_QR) == DNS_QR)
+
+ @qr.setter
+ def qr(self, v):
+ if v:
+ self.op |= DNS_QR
+ else:
+ self.op &= ~DNS_QR
+
+ @property
+ def opcode(self):
+ return (self.op >> 11) & 0xf
+
+ @opcode.setter
+ def opcode(self, v):
+ self.op = (self.op & ~0x7800) | ((v & 0xf) << 11)
+
+ @property
+ def aa(self):
+ return int((self.op & DNS_AA) == DNS_AA)
+
+ @aa.setter
+ def aa(self, v):
+ if v:
+ self.op |= DNS_AA
+ else:
+ self.op &= ~DNS_AA
+
+ @property
+ def rd(self):
+ return int((self.op & DNS_RD) == DNS_RD)
+
+ @rd.setter
+ def rd(self, v):
+ if v:
+ self.op |= DNS_RD
+ else:
+ self.op &= ~DNS_RD
+
+ @property
+ def ra(self):
+ return int((self.op & DNS_RA) == DNS_RA)
+
+ @ra.setter
+ def ra(self, v):
+ if v:
+ self.op |= DNS_RA
+ else:
+ self.op &= ~DNS_RA
+
+ @property
+ def zero(self):
+ return int((self.op & DNS_Z) == DNS_Z)
+
+ @zero.setter
+ def zero(self, v):
+ if v:
+ self.op |= DNS_Z
+ else:
+ self.op &= ~DNS_Z
+
+ @property
+ def rcode(self):
+ return self.op & 0xf
+
+ @rcode.setter
+ def rcode(self, v):
+ self.op = (self.op & ~0xf) | (v & 0xf)
+
+ # Deprecated methods, will be removed in the future
+ # ======================================================
+ @deprecated
+ def get_qr(self):
+ return self.qr
+
+ @deprecated
+ def set_qr(self, v):
+ self.qr = v
+
+ @deprecated
+ def get_opcode(self):
+ return self.opcode
+
+ @deprecated
+ def set_opcode(self, v):
+ self.opcode = v
+
+ @deprecated
+ def get_aa(self):
+ return self.aa
+
+ @deprecated
+ def set_aa(self, v):
+ self.aa = v
+
+ @deprecated
+ def get_rd(self):
+ return self.rd
+
+ @deprecated
+ def set_rd(self, v):
+ self.rd = v
+
+ @deprecated
+ def get_ra(self):
+ return self.ra
+
+ @deprecated
+ def set_ra(self, v):
+ self.ra = v
+
+ @deprecated
+ def get_zero(self):
+ return self.zero
+
+ @deprecated
+ def set_zero(self, v):
+ self.zero = v
+
+ @deprecated
+ def get_rcode(self):
+ return self.rcode
+
+ @deprecated
+ def set_rcode(self, v):
+ self.rcode = v
+
+ # ======================================================
+
+ class Q(dpkt.Packet):
+ """DNS question."""
+ __hdr__ = (
+ ('name', '1025s', ''),
+ ('type', 'H', DNS_A),
+ ('cls', 'H', DNS_IN)
+ )
+
+ # XXX - suk
+ def __len__(self):
+ raise NotImplementedError
+
+ __str__ = __len__
+
+ def unpack(self, buf):
+ raise NotImplementedError
+
+ class RR(Q):
+ """DNS resource record."""
+ __hdr__ = (
+ ('name', '1025s', ''),
+ ('type', 'H', DNS_A),
+ ('cls', 'H', DNS_IN),
+ ('ttl', 'I', 0),
+ ('rlen', 'H', 4),
+ ('rdata', 's', '')
+ )
+
+ def pack_rdata(self, off, label_ptrs):
+ # XXX - yeah, this sux
+ if self.rdata:
+ return self.rdata
+ if self.type == DNS_A:
+ return self.ip
+ elif self.type == DNS_NS:
+ return pack_name(self.nsname, off, label_ptrs)
+ elif self.type == DNS_CNAME:
+ return pack_name(self.cname, off, label_ptrs)
+ elif self.type == DNS_PTR:
+ return pack_name(self.ptrname, off, label_ptrs)
+ elif self.type == DNS_SOA:
+ l = []
+ l.append(pack_name(self.mname, off, label_ptrs))
+ l.append(pack_name(self.rname, off + len(l[0]), label_ptrs))
+ l.append(struct.pack('>IIIII', self.serial, self.refresh,
+ self.retry, self.expire, self.minimum))
+ return ''.join(l)
+ elif self.type == DNS_MX:
+ return struct.pack('>H', self.preference) + \
+ pack_name(self.mxname, off + 2, label_ptrs)
+ elif self.type == DNS_TXT or self.type == DNS_HINFO:
+ return ''.join(['%s%s' % (chr(len(x)), x)
+ for x in self.text])
+ elif self.type == DNS_AAAA:
+ return self.ip6
+ elif self.type == DNS_SRV:
+ return struct.pack('>HHH', self.priority, self.weight, self.port) + \
+ pack_name(self.srvname, off + 6, label_ptrs)
+
+ def unpack_rdata(self, buf, off):
+ if self.type == DNS_A:
+ self.ip = self.rdata
+ elif self.type == DNS_NS:
+ self.nsname, off = unpack_name(buf, off)
+ elif self.type == DNS_CNAME:
+ self.cname, off = unpack_name(buf, off)
+ elif self.type == DNS_PTR:
+ self.ptrname, off = unpack_name(buf, off)
+ elif self.type == DNS_SOA:
+ self.mname, off = unpack_name(buf, off)
+ self.rname, off = unpack_name(buf, off)
+ self.serial, self.refresh, self.retry, self.expire, \
+ self.minimum = struct.unpack('>IIIII', buf[off:off + 20])
+ elif self.type == DNS_MX:
+ self.preference = struct.unpack('>H', self.rdata[:2])
+ self.mxname, off = unpack_name(buf, off + 2)
+ elif self.type == DNS_TXT or self.type == DNS_HINFO:
+ self.text = []
+ buf = self.rdata
+ while buf:
+ n = ord(buf[0])
+ self.text.append(buf[1:1 + n])
+ buf = buf[1 + n:]
+ elif self.type == DNS_AAAA:
+ self.ip6 = self.rdata
+ elif self.type == DNS_SRV:
+ self.priority, self.weight, self.port = struct.unpack('>HHH', self.rdata[:6])
+ self.srvname, off = unpack_name(buf, off + 6)
+
+ def pack_q(self, buf, q):
+ """Append packed DNS question and return buf."""
+ return buf + pack_name(q.name, len(buf), self.label_ptrs) + struct.pack('>HH', q.type, q.cls)
+
+ def unpack_q(self, buf, off):
+ """Return DNS question and new offset."""
+ q = self.Q()
+ q.name, off = unpack_name(buf, off)
+ q.type, q.cls = struct.unpack('>HH', buf[off:off + 4])
+ off += 4
+ return q, off
+
+ def pack_rr(self, buf, rr):
+ """Append packed DNS RR and return buf."""
+ name = pack_name(rr.name, len(buf), self.label_ptrs)
+ rdata = rr.pack_rdata(len(buf) + len(name) + 10, self.label_ptrs)
+ return buf + name + struct.pack('>HHIH', rr.type, rr.cls, rr.ttl, len(rdata)) + rdata
+
+ def unpack_rr(self, buf, off):
+ """Return DNS RR and new offset."""
+ rr = self.RR()
+ rr.name, off = unpack_name(buf, off)
+ rr.type, rr.cls, rr.ttl, rdlen = struct.unpack('>HHIH', buf[off:off + 10])
+ off += 10
+ rr.rdata = buf[off:off + rdlen]
+ rr.unpack_rdata(buf, off)
+ off += rdlen
+ return rr, off
+
+ def unpack(self, buf):
+ dpkt.Packet.unpack(self, buf)
+ off = self.__hdr_len__
+ cnt = self.qd # FIXME: This relies on this being properly set somewhere else
+ self.qd = []
+ for _ in range(cnt):
+ q, off = self.unpack_q(buf, off)
+ self.qd.append(q)
+ for x in ('an', 'ns', 'ar'):
+ cnt = getattr(self, x, 0)
+ setattr(self, x, [])
+ for _ in range(cnt):
+ rr, off = self.unpack_rr(buf, off)
+ getattr(self, x).append(rr)
+ self.data = ''
+
+ def __len__(self):
+ # XXX - cop out
+ return len(str(self))
+
+ def __str__(self):
+ # XXX - compress names on the fly
+ self.label_ptrs = {}
+ buf = struct.pack(self.__hdr_fmt__, self.id, self.op, len(self.qd),
+ len(self.an), len(self.ns), len(self.ar))
+ for q in self.qd:
+ buf = self.pack_q(buf, q)
+ for x in ('an', 'ns', 'ar'):
+ for rr in getattr(self, x):
+ buf = self.pack_rr(buf, rr)
+ del self.label_ptrs
+ return buf
+
+
+def test_basic():
+ from ip import IP
+
+ s = 'E\x00\x02\x08\xc15\x00\x00\x80\x11\x92aBk0\x01Bk0w\x005\xc07\x01\xf4\xda\xc2d\xd2\x81\x80\x00\x01\x00\x03\x00\x0b\x00\x0b\x03www\x06google\x03com\x00\x00\x01\x00\x01\xc0\x0c\x00\x05\x00\x01\x00\x00\x03V\x00\x17\x03www\x06google\x06akadns\x03net\x00\xc0,\x00\x01\x00\x01\x00\x00\x01\xa3\x00\x04@\xe9\xabh\xc0,\x00\x01\x00\x01\x00\x00\x01\xa3\x00\x04@\xe9\xabc\xc07\x00\x02\x00\x01\x00\x00KG\x00\x0c\x04usw5\x04akam\xc0>\xc07\x00\x02\x00\x01\x00\x00KG\x00\x07\x04usw6\xc0t\xc07\x00\x02\x00\x01\x00\x00KG\x00\x07\x04usw7\xc0t\xc07\x00\x02\x00\x01\x00\x00KG\x00\x08\x05asia3\xc0t\xc07\x00\x02\x00\x01\x00\x00KG\x00\x05\x02za\xc07\xc07\x00\x02\x00\x01\x00\x00KG\x00\x0f\x02zc\x06akadns\x03org\x00\xc07\x00\x02\x00\x01\x00\x00KG\x00\x05\x02zf\xc07\xc07\x00\x02\x00\x01\x00\x00KG\x00\x05\x02zh\xc0\xd5\xc07\x00\x02\x00\x01\x00\x00KG\x00\x07\x04eur3\xc0t\xc07\x00\x02\x00\x01\x00\x00KG\x00\x07\x04use2\xc0t\xc07\x00\x02\x00\x01\x00\x00KG\x00\x07\x04use4\xc0t\xc0\xc1\x00\x01\x00\x01\x00\x00\xfb4\x00\x04\xd0\xb9\x84\xb0\xc0\xd2\x00\x01\x00\x01\x00\x001\x0c\x00\x04?\xf1\xc76\xc0\xed\x00\x01\x00\x01\x00\x00\xfb4\x00\x04?\xd7\xc6S\xc0\xfe\x00\x01\x00\x01\x00\x001\x0c\x00\x04?\xd00.\xc1\x0f\x00\x01\x00\x01\x00\x00\n\xdf\x00\x04\xc1-\x01g\xc1"\x00\x01\x00\x01\x00\x00\x101\x00\x04?\xd1\xaa\x88\xc15\x00\x01\x00\x01\x00\x00\r\x1a\x00\x04PCC\xb6\xc0o\x00\x01\x00\x01\x00\x00\x10\x7f\x00\x04?\xf1I\xd6\xc0\x87\x00\x01\x00\x01\x00\x00\n\xdf\x00\x04\xce\x84dl\xc0\x9a\x00\x01\x00\x01\x00\x00\n\xdf\x00\x04A\xcb\xea\x1b\xc0\xad\x00\x01\x00\x01\x00\x00\x0b)\x00\x04\xc1l\x9a\t'
+ ip = IP(s)
+ my_dns = DNS(ip.udp.data)
+ assert my_dns.qd[0].name == 'www.google.com' and my_dns.an[1].name == 'www.google.akadns.net'
+ s = '\x05\xf5\x01\x00\x00\x01\x00\x00\x00\x00\x00\x00\x03www\x03cnn\x03com\x00\x00\x01\x00\x01'
+ my_dns = DNS(s)
+ assert s == str(my_dns)
+
+
+def test_PTR():
+ s = 'g\x02\x81\x80\x00\x01\x00\x01\x00\x03\x00\x00\x011\x011\x03211\x03141\x07in-addr\x04arpa\x00\x00\x0c\x00\x01\xc0\x0c\x00\x0c\x00\x01\x00\x00\r6\x00$\x07default\nv-umce-ifs\x05umnet\x05umich\x03edu\x00\xc0\x0e\x00\x02\x00\x01\x00\x00\r6\x00\r\x06shabby\x03ifs\xc0O\xc0\x0e\x00\x02\x00\x01\x00\x00\r6\x00\x0f\x0cfish-license\xc0m\xc0\x0e\x00\x02\x00\x01\x00\x00\r6\x00\x0b\x04dns2\x03itd\xc0O'
+ my_dns = DNS(s)
+ assert my_dns.qd[0].name == '1.1.211.141.in-addr.arpa' and \
+ my_dns.an[0].ptrname == 'default.v-umce-ifs.umnet.umich.edu' and \
+ my_dns.ns[0].nsname == 'shabby.ifs.umich.edu' and \
+ my_dns.ns[1].ttl == 3382L and \
+ my_dns.ns[2].nsname == 'dns2.itd.umich.edu'
+ assert s == str(my_dns)
+
+
+def test_pack_name():
+ # Empty name is \0
+ x = pack_name('', 0, {})
+ assert x == '\0'
+
+
+def test_deprecated_methods():
+ """Test deprecated methods. Note: when they are removed so should this test"""
+ s = 'g\x02\x81\x80\x00\x01\x00\x01\x00\x03\x00\x00\x011\x011\x03211\x03141\x07in-addr\x04arpa\x00\x00\x0c\x00\x01\xc0\x0c\x00\x0c\x00\x01\x00\x00\r6\x00$\x07default\nv-umce-ifs\x05umnet\x05umich\x03edu\x00\xc0\x0e\x00\x02\x00\x01\x00\x00\r6\x00\r\x06shabby\x03ifs\xc0O\xc0\x0e\x00\x02\x00\x01\x00\x00\r6\x00\x0f\x0cfish-license\xc0m\xc0\x0e\x00\x02\x00\x01\x00\x00\r6\x00\x0b\x04dns2\x03itd\xc0O'
+ my_dns = DNS(s)
+ my_dns.get_aa()
+ my_dns.get_opcode()
+ qr = my_dns.get_qr()
+ my_dns.set_qr(qr)
+ qr2 = my_dns.get_qr()
+ assert qr == qr2
+
+
+def test_deprecated_method_performance():
+ """Test the performance hit for the deprecation decorator"""
+ from timeit import Timer
+
+ s = 'g\x02\x81\x80\x00\x01\x00\x01\x00\x03\x00\x00\x011\x011\x03211\x03141\x07in-addr\x04arpa\x00\x00\x0c\x00\x01\xc0\x0c\x00\x0c\x00\x01\x00\x00\r6\x00$\x07default\nv-umce-ifs\x05umnet\x05umich\x03edu\x00\xc0\x0e\x00\x02\x00\x01\x00\x00\r6\x00\r\x06shabby\x03ifs\xc0O\xc0\x0e\x00\x02\x00\x01\x00\x00\r6\x00\x0f\x0cfish-license\xc0m\xc0\x0e\x00\x02\x00\x01\x00\x00\r6\x00\x0b\x04dns2\x03itd\xc0O'
+ my_dns = DNS(s)
+ t1 = Timer(lambda: my_dns.aa).timeit(10000)
+ t2 = Timer(my_dns.get_aa).timeit(10000)
+ print 'Performance of dns.aa vs. dns.get_aa(): %f %f' % (t1, t2)
+
+
+if __name__ == '__main__':
+ # Runs all the test associated with this class/file
+ test_basic()
+ test_PTR()
+ test_pack_name()
+ test_deprecated_methods()
+ test_deprecated_method_performance()
+ print 'Tests Successful...'
diff --git a/external_libs/python/dpkt-1.8.6.2/dpkt/dpkt.py b/external_libs/python/dpkt-1.8.6.2/dpkt/dpkt.py
new file mode 100644
index 00000000..0ed3780f
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/dpkt/dpkt.py
@@ -0,0 +1,176 @@
+# $Id: dpkt.py 43 2007-08-02 22:42:59Z jon.oberheide $
+# -*- coding: utf-8 -*-
+"""Simple packet creation and parsing."""
+
+import copy
+import itertools
+import socket
+import struct
+import array
+
+
+class Error(Exception): pass
+
+
+class UnpackError(Error): pass
+
+
+class NeedData(UnpackError): pass
+
+
+class PackError(Error): pass
+
+
+class _MetaPacket(type):
+ def __new__(cls, clsname, clsbases, clsdict):
+ t = type.__new__(cls, clsname, clsbases, clsdict)
+ st = getattr(t, '__hdr__', None)
+ if st is not None:
+ # XXX - __slots__ only created in __new__()
+ clsdict['__slots__'] = [x[0] for x in st] + ['data']
+ t = type.__new__(cls, clsname, clsbases, clsdict)
+ t.__hdr_fields__ = [x[0] for x in st]
+ t.__hdr_fmt__ = getattr(t, '__byte_order__', '>') + \
+ ''.join([x[1] for x in st])
+ t.__hdr_len__ = struct.calcsize(t.__hdr_fmt__)
+ t.__hdr_defaults__ = dict(zip(
+ t.__hdr_fields__, [x[2] for x in st]))
+ return t
+
+
+class Packet(object):
+ """Base packet class, with metaclass magic to generate members from
+ self.__hdr__.
+
+ __hdr__ should be defined as a list of (name, structfmt, default) tuples
+ __byte_order__ can be set to override the default ('>')
+
+ Example::
+
+ >>> class Foo(Packet):
+ ... __hdr__ = (('foo', 'I', 1), ('bar', 'H', 2), ('baz', '4s', 'quux'))
+ ...
+ >>> foo = Foo(bar=3)
+ >>> foo
+ Foo(bar=3)
+ >>> str(foo)
+ '\x00\x00\x00\x01\x00\x03quux'
+ >>> foo.bar
+ 3
+ >>> foo.baz
+ 'quux'
+ >>> foo.foo = 7
+ >>> foo.baz = 'whee'
+ >>> foo
+ Foo(baz='whee', foo=7, bar=3)
+ >>> Foo('hello, world!')
+ Foo(baz=' wor', foo=1751477356L, bar=28460, data='ld!')
+ """
+ __metaclass__ = _MetaPacket
+
+ def __init__(self, *args, **kwargs):
+ """Packet constructor with ([buf], [field=val,...]) prototype.
+
+ Arguments:
+
+ buf -- optional packet buffer to unpack
+
+ Optional keyword arguments correspond to members to set
+ (matching fields in self.__hdr__, or 'data').
+ """
+ self.data = ''
+ if args:
+ try:
+ self.unpack(args[0])
+ except struct.error:
+ if len(args[0]) < self.__hdr_len__:
+ raise NeedData
+ raise UnpackError('invalid %s: %r' %
+ (self.__class__.__name__, args[0]))
+ else:
+ for k in self.__hdr_fields__:
+ setattr(self, k, copy.copy(self.__hdr_defaults__[k]))
+ for k, v in kwargs.iteritems():
+ setattr(self, k, v)
+
+ def __len__(self):
+ return self.__hdr_len__ + len(self.data)
+
+ def __getitem__(self, k):
+ try:
+ return getattr(self, k)
+ except AttributeError:
+ raise KeyError
+
+ def __repr__(self):
+ l = ['%s=%r' % (k, getattr(self, k))
+ for k in self.__hdr_defaults__
+ if getattr(self, k) != self.__hdr_defaults__[k]]
+ if self.data:
+ l.append('data=%r' % self.data)
+ return '%s(%s)' % (self.__class__.__name__, ', '.join(l))
+
+ def __str__(self):
+ return self.pack_hdr() + str(self.data)
+
+ def pack_hdr(self):
+ """Return packed header string."""
+ try:
+ return struct.pack(self.__hdr_fmt__,
+ *[getattr(self, k) for k in self.__hdr_fields__])
+ except struct.error:
+ vals = []
+ for k in self.__hdr_fields__:
+ v = getattr(self, k)
+ if isinstance(v, tuple):
+ vals.extend(v)
+ else:
+ vals.append(v)
+ try:
+ return struct.pack(self.__hdr_fmt__, *vals)
+ except struct.error, e:
+ raise PackError(str(e))
+
+ def pack(self):
+ """Return packed header + self.data string."""
+ return str(self)
+
+ def unpack(self, buf):
+ """Unpack packet header fields from buf, and set self.data."""
+ for k, v in itertools.izip(self.__hdr_fields__,
+ struct.unpack(self.__hdr_fmt__, buf[:self.__hdr_len__])):
+ setattr(self, k, v)
+ self.data = buf[self.__hdr_len__:]
+
+# XXX - ''.join([(len(`chr(x)`)==3) and chr(x) or '.' for x in range(256)])
+__vis_filter = """................................ !"#$%&\'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[.]^_`abcdefghijklmnopqrstuvwxyz{|}~................................................................................................................................."""
+
+
+def hexdump(buf, length=16):
+ """Return a hexdump output string of the given buffer."""
+ n = 0
+ res = []
+ while buf:
+ line, buf = buf[:length], buf[length:]
+ hexa = ' '.join(['%02x' % ord(x) for x in line])
+ line = line.translate(__vis_filter)
+ res.append(' %04d: %-*s %s' % (n, length * 3, hexa, line))
+ n += length
+ return '\n'.join(res)
+
+def in_cksum_add(s, buf):
+ n = len(buf)
+ cnt = (n / 2) * 2
+ a = array.array('H', buf[:cnt])
+ if cnt != n:
+ a.append(struct.unpack('H', buf[-1] + '\x00')[0])
+ return s + sum(a)
+
+def in_cksum_done(s):
+ s = (s >> 16) + (s & 0xffff)
+ s += (s >> 16)
+ return socket.ntohs(~s & 0xffff)
+
+def in_cksum(buf):
+ """Return computed Internet checksum."""
+ return in_cksum_done(in_cksum_add(0, buf))
diff --git a/external_libs/python/dpkt-1.8.6.2/dpkt/dtp.py b/external_libs/python/dpkt-1.8.6.2/dpkt/dtp.py
new file mode 100644
index 00000000..9fc7ec9f
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/dpkt/dtp.py
@@ -0,0 +1,26 @@
+# $Id: dtp.py 23 2006-11-08 15:45:33Z dugsong $
+# -*- coding: utf-8 -*-
+"""Dynamic Trunking Protocol."""
+
+import struct
+import dpkt
+
+
+class DTP(dpkt.Packet):
+ __hdr__ = (
+ ('v', 'B', 0),
+ ) # rest is TLVs
+
+ def unpack(self, buf):
+ dpkt.Packet.unpack(self, buf)
+ buf = self.data
+ tvs = []
+ while buf:
+ t, l = struct.unpack('>HH', buf[:4])
+ v, buf = buf[4:4 + l], buf[4 + l:]
+ tvs.append((t, v))
+ self.data = tvs
+
+
+TRUNK_NAME = 0x01
+MAC_ADDR = 0x04
diff --git a/external_libs/python/dpkt-1.8.6.2/dpkt/esp.py b/external_libs/python/dpkt-1.8.6.2/dpkt/esp.py
new file mode 100644
index 00000000..94295d39
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/dpkt/esp.py
@@ -0,0 +1,12 @@
+# $Id: esp.py 23 2006-11-08 15:45:33Z dugsong $
+# -*- coding: utf-8 -*-
+"""Encapsulated Security Protocol."""
+
+import dpkt
+
+
+class ESP(dpkt.Packet):
+ __hdr__ = (
+ ('spi', 'I', 0),
+ ('seq', 'I', 0)
+ )
diff --git a/external_libs/python/dpkt-1.8.6.2/dpkt/ethernet.py b/external_libs/python/dpkt-1.8.6.2/dpkt/ethernet.py
new file mode 100644
index 00000000..d8d8700f
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/dpkt/ethernet.py
@@ -0,0 +1,145 @@
+# $Id: ethernet.py 65 2010-03-26 02:53:51Z dugsong $
+# -*- coding: utf-8 -*-
+"""Ethernet II, LLC (802.3+802.2), LLC/SNAP, and Novell raw 802.3,
+with automatic 802.1q, MPLS, PPPoE, and Cisco ISL decapsulation."""
+
+import struct
+import dpkt
+import stp
+
+
+ETH_CRC_LEN = 4
+ETH_HDR_LEN = 14
+
+ETH_LEN_MIN = 64 # minimum frame length with CRC
+ETH_LEN_MAX = 1518 # maximum frame length with CRC
+
+ETH_MTU = (ETH_LEN_MAX - ETH_HDR_LEN - ETH_CRC_LEN)
+ETH_MIN = (ETH_LEN_MIN - ETH_HDR_LEN - ETH_CRC_LEN)
+
+# Ethernet payload types - http://standards.ieee.org/regauth/ethertype
+ETH_TYPE_PUP = 0x0200 # PUP protocol
+ETH_TYPE_IP = 0x0800 # IP protocol
+ETH_TYPE_ARP = 0x0806 # address resolution protocol
+ETH_TYPE_AOE = 0x88a2 # AoE protocol
+ETH_TYPE_CDP = 0x2000 # Cisco Discovery Protocol
+ETH_TYPE_DTP = 0x2004 # Cisco Dynamic Trunking Protocol
+ETH_TYPE_REVARP = 0x8035 # reverse addr resolution protocol
+ETH_TYPE_8021Q = 0x8100 # IEEE 802.1Q VLAN tagging
+ETH_TYPE_IPX = 0x8137 # Internetwork Packet Exchange
+ETH_TYPE_IP6 = 0x86DD # IPv6 protocol
+ETH_TYPE_PPP = 0x880B # PPP
+ETH_TYPE_MPLS = 0x8847 # MPLS
+ETH_TYPE_MPLS_MCAST = 0x8848 # MPLS Multicast
+ETH_TYPE_PPPoE_DISC = 0x8863 # PPP Over Ethernet Discovery Stage
+ETH_TYPE_PPPoE = 0x8864 # PPP Over Ethernet Session Stage
+ETH_TYPE_LLDP = 0x88CC # Link Layer Discovery Protocol
+
+# MPLS label stack fields
+MPLS_LABEL_MASK = 0xfffff000
+MPLS_QOS_MASK = 0x00000e00
+MPLS_TTL_MASK = 0x000000ff
+MPLS_LABEL_SHIFT = 12
+MPLS_QOS_SHIFT = 9
+MPLS_TTL_SHIFT = 0
+MPLS_STACK_BOTTOM = 0x0100
+
+
+class Ethernet(dpkt.Packet):
+ __hdr__ = (
+ ('dst', '6s', ''),
+ ('src', '6s', ''),
+ ('type', 'H', ETH_TYPE_IP)
+ )
+ _typesw = {}
+
+ def _unpack_data(self, buf):
+ if self.type == ETH_TYPE_8021Q:
+ self.tag, self.type = struct.unpack('>HH', buf[:4])
+ buf = buf[4:]
+ elif self.type == ETH_TYPE_MPLS or self.type == ETH_TYPE_MPLS_MCAST:
+ # XXX - skip labels (max # of labels is undefined, just use 24)
+ self.labels = []
+ for i in range(24):
+ entry = struct.unpack('>I', buf[i * 4:i * 4 + 4])[0]
+ label = ((entry & MPLS_LABEL_MASK) >> MPLS_LABEL_SHIFT,
+ (entry & MPLS_QOS_MASK) >> MPLS_QOS_SHIFT,
+ (entry & MPLS_TTL_MASK) >> MPLS_TTL_SHIFT)
+ self.labels.append(label)
+ if entry & MPLS_STACK_BOTTOM:
+ break
+ self.type = ETH_TYPE_IP
+ buf = buf[(i + 1) * 4:]
+ try:
+ self.data = self._typesw[self.type](buf)
+ setattr(self, self.data.__class__.__name__.lower(), self.data)
+ except (KeyError, dpkt.UnpackError):
+ self.data = buf
+
+ def unpack(self, buf):
+ dpkt.Packet.unpack(self, buf)
+ if self.type > 1500:
+ # Ethernet II
+ self._unpack_data(self.data)
+ elif self.dst.startswith('\x01\x00\x0c\x00\x00') or \
+ self.dst.startswith('\x03\x00\x0c\x00\x00'):
+ # Cisco ISL
+ self.vlan = struct.unpack('>H', self.data[6:8])[0]
+ self.unpack(self.data[12:])
+ elif self.data.startswith('\xff\xff'):
+ # Novell "raw" 802.3
+ self.type = ETH_TYPE_IPX
+ self.data = self.ipx = self._typesw[ETH_TYPE_IPX](self.data[2:])
+ else:
+ # 802.2 LLC
+ self.dsap, self.ssap, self.ctl = struct.unpack('BBB', self.data[:3])
+ if self.data.startswith('\xaa\xaa'):
+ # SNAP
+ self.type = struct.unpack('>H', self.data[6:8])[0]
+ self._unpack_data(self.data[8:])
+ else:
+ # non-SNAP
+ dsap = ord(self.data[0])
+ if dsap == 0x06: # SAP_IP
+ self.data = self.ip = self._typesw[ETH_TYPE_IP](self.data[3:])
+ elif dsap == 0x10 or dsap == 0xe0: # SAP_NETWARE{1,2}
+ self.data = self.ipx = self._typesw[ETH_TYPE_IPX](self.data[3:])
+ elif dsap == 0x42: # SAP_STP
+ self.data = self.stp = stp.STP(self.data[3:])
+
+ @classmethod
+ def set_type(cls, t, pktclass):
+ cls._typesw[t] = pktclass
+
+ @classmethod
+ def get_type(cls, t):
+ return cls._typesw[t]
+
+
+# XXX - auto-load Ethernet dispatch table from ETH_TYPE_* definitions
+def __load_types():
+ g = globals()
+ for k, v in g.iteritems():
+ if k.startswith('ETH_TYPE_'):
+ name = k[9:]
+ modname = name.lower()
+ try:
+ mod = __import__(modname, g)
+ except ImportError:
+ continue
+ Ethernet.set_type(v, getattr(mod, name))
+
+
+if not Ethernet._typesw:
+ __load_types()
+
+
+def test_eth(): # TODO recheck this test
+ s = '\x00\xb0\xd0\xe1\x80r\x00\x11$\x8c\x11\xde\x86\xdd`\x00\x00\x00\x00(\x06@\xfe\x80\x00\x00\x00\x00\x00\x00\x02\x11$\xff\xfe\x8c\x11\xde\xfe\x80\x00\x00\x00\x00\x00\x00\x02\xb0\xd0\xff\xfe\xe1\x80r\xcd\xd3\x00\x16\xffP\xd7\x13\x00\x00\x00\x00\xa0\x02\xff\xffg\xd3\x00\x00\x02\x04\x05\xa0\x01\x03\x03\x00\x01\x01\x08\n}\x18:a\x00\x00\x00\x00'
+ # eth = Ethernet(s) # Variable eth is not used
+ Ethernet(s)
+
+
+if __name__ == '__main__':
+ test_eth()
+ print 'Tests Successful...' \ No newline at end of file
diff --git a/external_libs/python/dpkt-1.8.6.2/dpkt/gre.py b/external_libs/python/dpkt-1.8.6.2/dpkt/gre.py
new file mode 100644
index 00000000..d61e56ff
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/dpkt/gre.py
@@ -0,0 +1,127 @@
+# $Id: gre.py 75 2010-08-03 14:42:19Z jon.oberheide $
+# -*- coding: utf-8 -*-
+"""Generic Routing Encapsulation."""
+
+import struct
+import dpkt
+from decorators import deprecated
+
+GRE_CP = 0x8000 # Checksum Present
+GRE_RP = 0x4000 # Routing Present
+GRE_KP = 0x2000 # Key Present
+GRE_SP = 0x1000 # Sequence Present
+GRE_SS = 0x0800 # Strict Source Route
+GRE_AP = 0x0080 # Acknowledgment Present
+
+GRE_opt_fields = (
+ (GRE_CP | GRE_RP, 'sum', 'H'), (GRE_CP | GRE_RP, 'off', 'H'),
+ (GRE_KP, 'key', 'I'), (GRE_SP, 'seq', 'I'), (GRE_AP, 'ack', 'I')
+)
+
+
+class GRE(dpkt.Packet):
+ __hdr__ = (
+ ('flags', 'H', 0),
+ ('p', 'H', 0x0800), # ETH_TYPE_IP
+ )
+ _protosw = {}
+ sre = ()
+
+ @property
+ def v(self):
+ return self.flags & 0x7
+
+ @v.setter
+ def v(self, v):
+ self.flags = (self.flags & ~0x7) | (v & 0x7)
+
+ @property
+ def recur(self):
+ return (self.flags >> 5) & 0x7
+
+ @recur.setter
+ def recur(self, v):
+ self.flags = (self.flags & ~0xe0) | ((v & 0x7) << 5)
+
+ # Deprecated methods, will be removed in the future
+ # =================================================
+ @deprecated
+ def get_v(self): return self.v
+
+ @deprecated
+ def set_v(self, v): self.v = v
+
+ @deprecated
+ def get_recur(self): return self.recur
+
+ @deprecated
+ def set_recur(self, v): self.recur = v
+ # =================================================
+
+
+ class SRE(dpkt.Packet):
+ __hdr__ = [
+ ('family', 'H', 0),
+ ('off', 'B', 0),
+ ('len', 'B', 0)
+ ]
+
+ def unpack(self, buf):
+ dpkt.Packet.unpack(self, buf)
+ self.data = self.data[:self.len]
+
+ def opt_fields_fmts(self):
+ if self.v == 0:
+ fields, fmts = [], []
+ opt_fields = GRE_opt_fields
+ else:
+ fields, fmts = ['len', 'callid'], ['H', 'H']
+ opt_fields = GRE_opt_fields[-2:]
+ for flags, field, fmt in opt_fields:
+ if self.flags & flags:
+ fields.append(field)
+ fmts.append(fmt)
+ return fields, fmts
+
+ def unpack(self, buf):
+ dpkt.Packet.unpack(self, buf)
+ fields, fmts = self.opt_fields_fmts()
+ if fields:
+ fmt = ''.join(fmts)
+ fmtlen = struct.calcsize(fmt)
+ vals = struct.unpack(fmt, self.data[:fmtlen])
+ self.data = self.data[fmtlen:]
+ self.__dict__.update(dict(zip(fields, vals)))
+ if self.flags & GRE_RP:
+ l = []
+ while True:
+ sre = self.SRE(self.data)
+ self.data = self.data[len(sre):]
+ l.append(sre)
+ if not sre.len:
+ break
+ self.sre = l
+ self.data = ethernet.Ethernet._typesw[self.p](self.data)
+ setattr(self, self.data.__class__.__name__.lower(), self.data)
+
+ def __len__(self):
+ opt_fmtlen = struct.calcsize(''.join(self.opt_fields_fmts()[1]))
+ return self.__hdr_len__ + opt_fmtlen + sum(map(len, self.sre)) + len(self.data)
+
+ # XXX - need to fix up repr to display optional fields...
+
+ def __str__(self):
+ fields, fmts = self.opt_fields_fmts()
+ if fields:
+ vals = []
+ for f in fields:
+ vals.append(getattr(self, f))
+ opt_s = struct.pack(''.join(fmts), *vals)
+ else:
+ opt_s = ''
+ return self.pack_hdr() + opt_s + ''.join(map(str, self.sre)) + str(self.data)
+
+# XXX - auto-load GRE dispatch table from Ethernet dispatch table
+import ethernet
+
+GRE._protosw.update(ethernet.Ethernet._typesw)
diff --git a/external_libs/python/dpkt-1.8.6.2/dpkt/gzip.py b/external_libs/python/dpkt-1.8.6.2/dpkt/gzip.py
new file mode 100644
index 00000000..e41165b2
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/dpkt/gzip.py
@@ -0,0 +1,123 @@
+# $Id: gzip.py 23 2006-11-08 15:45:33Z dugsong $
+# -*- coding: utf-8 -*-
+"""GNU zip."""
+
+import struct
+import zlib
+import dpkt
+
+
+# RFC 1952
+GZIP_MAGIC = '\x1f\x8b'
+
+# Compression methods
+GZIP_MSTORED = 0
+GZIP_MCOMPRESS = 1
+GZIP_MPACKED = 2
+GZIP_MLZHED = 3
+GZIP_MDEFLATE = 8
+
+# Flags
+GZIP_FTEXT = 0x01
+GZIP_FHCRC = 0x02
+GZIP_FEXTRA = 0x04
+GZIP_FNAME = 0x08
+GZIP_FCOMMENT = 0x10
+GZIP_FENCRYPT = 0x20
+GZIP_FRESERVED = 0xC0
+
+# OS
+GZIP_OS_MSDOS = 0
+GZIP_OS_AMIGA = 1
+GZIP_OS_VMS = 2
+GZIP_OS_UNIX = 3
+GZIP_OS_VMCMS = 4
+GZIP_OS_ATARI = 5
+GZIP_OS_OS2 = 6
+GZIP_OS_MACOS = 7
+GZIP_OS_ZSYSTEM = 8
+GZIP_OS_CPM = 9
+GZIP_OS_TOPS20 = 10
+GZIP_OS_WIN32 = 11
+GZIP_OS_QDOS = 12
+GZIP_OS_RISCOS = 13
+GZIP_OS_UNKNOWN = 255
+
+GZIP_FENCRYPT_LEN = 12
+
+
+class GzipExtra(dpkt.Packet):
+ __hdr__ = (
+ ('id', '2s', ''),
+ ('len', 'H', 0)
+ )
+
+
+class Gzip(dpkt.Packet):
+ __hdr__ = (
+ ('magic', '2s', GZIP_MAGIC),
+ ('method', 'B', GZIP_MDEFLATE),
+ ('flags', 'B', 0),
+ ('mtime', 'I', 0),
+ ('xflags', 'B', 0),
+ ('os', 'B', GZIP_OS_UNIX),
+
+ ('extra', '0s', ''), # XXX - GZIP_FEXTRA
+ ('filename', '0s', ''), # XXX - GZIP_FNAME
+ ('comment', '0s', '') # XXX - GZIP_FCOMMENT
+ )
+
+ def unpack(self, buf):
+ super(Gzip, self).unpack(buf)
+ if self.flags & GZIP_FEXTRA:
+ n = struct.unpack(self.data[:2], '>H')[0]
+ self.extra = GzipExtra(self.data[2:2 + n])
+ self.data = self.data[2 + n:]
+ if self.flags & GZIP_FNAME:
+ n = self.data.find('\x00')
+ self.filename = self.data[:n]
+ self.data = self.data[n + 1:]
+ if self.flags & GZIP_FCOMMENT:
+ n = self.data.find('\x00')
+ self.comment = self.data[:n]
+ self.data = self.data[n + 1:]
+ if self.flags & GZIP_FENCRYPT:
+ self.data = self.data[GZIP_FENCRYPT_LEN:] # XXX - skip
+ if self.flags & GZIP_FHCRC:
+ self.data = self.data[2:] # XXX - skip
+
+ def pack_hdr(self):
+ l = []
+ if self.extra:
+ self.flags |= GZIP_FEXTRA
+ s = str(self.extra)
+ l.append(struct.pack('>H', len(s)))
+ l.append(s)
+ if self.filename:
+ self.flags |= GZIP_FNAME
+ l.append(self.filename)
+ l.append('\x00')
+ if self.comment:
+ self.flags |= GZIP_FCOMMENT
+ l.append(self.comment)
+ l.append('\x00')
+ l.insert(0, super(Gzip, self).pack_hdr())
+ return ''.join(l)
+
+ def compress(self):
+ """Compress self.data."""
+ c = zlib.compressobj(9, zlib.DEFLATED, -zlib.MAX_WBITS,
+ zlib.DEF_MEM_LEVEL, 0)
+ self.data = c.compress(self.data)
+
+ def decompress(self):
+ """Return decompressed payload."""
+ d = zlib.decompressobj(-zlib.MAX_WBITS)
+ return d.decompress(self.data)
+
+
+if __name__ == '__main__':
+ import sys
+
+ gz = Gzip(open(sys.argv[1]).read())
+ print `gz`, `gz.decompress()`
diff --git a/external_libs/python/dpkt-1.8.6.2/dpkt/h225.py b/external_libs/python/dpkt-1.8.6.2/dpkt/h225.py
new file mode 100644
index 00000000..d8b2d51f
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/dpkt/h225.py
@@ -0,0 +1,213 @@
+# $Id: h225.py 23 2006-11-08 15:45:33Z dugsong $
+# -*- coding: utf-8 -*-
+"""ITU-T H.225.0 Call Signaling."""
+
+import struct
+import dpkt
+import tpkt
+
+
+# H225 Call Signaling
+#
+# Call messages and information elements (IEs) are defined by Q.931:
+# http://cvsup.de.openbsd.org/historic/comp/doc/standards/itu/Q/Q.931.ps.gz
+#
+# The User-to-User IEs of H225 are encoded by PER of ASN.1.
+
+# Call Establishment Messages
+ALERTING = 1
+CALL_PROCEEDING = 2
+CONNECT = 7
+CONNECT_ACKNOWLEDGE = 15
+PROGRESS = 3
+SETUP = 5
+SETUP_ACKNOWLEDGE = 13
+
+# Call Information Phase Messages
+RESUME = 38
+RESUME_ACKNOWLEDGE = 46
+RESUME_REJECT = 34
+SUSPEND = 37
+SUSPEND_ACKNOWLEDGE = 45
+SUSPEND_REJECT = 33
+USER_INFORMATION = 32
+
+# Call Clearing Messages
+DISCONNECT = 69
+RELEASE = 77
+RELEASE_COMPLETE = 90
+RESTART = 70
+RESTART_ACKNOWLEDGE = 78
+
+# Miscellaneous Messages
+SEGMENT = 96
+CONGESTION_CONTROL = 121
+INFORMATION = 123
+NOTIFY = 110
+STATUS = 125
+STATUS_ENQUIRY = 117
+
+# Type 1 Single Octet Information Element IDs
+RESERVED = 128
+SHIFT = 144
+CONGESTION_LEVEL = 176
+REPEAT_INDICATOR = 208
+
+# Type 2 Single Octet Information Element IDs
+MORE_DATA = 160
+SENDING_COMPLETE = 161
+
+# Variable Length Information Element IDs
+SEGMENTED_MESSAGE = 0
+BEARER_CAPABILITY = 4
+CAUSE = 8
+CALL_IDENTITY = 16
+CALL_STATE = 20
+CHANNEL_IDENTIFICATION = 24
+PROGRESS_INDICATOR = 30
+NETWORK_SPECIFIC_FACILITIES = 32
+NOTIFICATION_INDICATOR = 39
+DISPLAY = 40
+DATE_TIME = 41
+KEYPAD_FACILITY = 44
+SIGNAL = 52
+INFORMATION_RATE = 64
+END_TO_END_TRANSIT_DELAY = 66
+TRANSIT_DELAY_SELECTION_AND_INDICATION = 67
+PACKET_LAYER_BINARY_PARAMETERS = 68
+PACKET_LAYER_WINDOW_SIZE = 69
+PACKET_SIZE = 70
+CLOSED_USER_GROUP = 71
+REVERSE_CHARGE_INDICATION = 74
+CALLING_PARTY_NUMBER = 108
+CALLING_PARTY_SUBADDRESS = 109
+CALLED_PARTY_NUMBER = 112
+CALLED_PARTY_SUBADDRESS = 113
+REDIRECTING_NUMBER = 116
+TRANSIT_NETWORK_SELECTION = 120
+RESTART_INDICATOR = 121
+LOW_LAYER_COMPATIBILITY = 124
+HIGH_LAYER_COMPATIBILITY = 125
+USER_TO_USER = 126
+ESCAPE_FOR_EXTENSION = 127
+
+
+class H225(dpkt.Packet):
+ __hdr__ = (
+ ('proto', 'B', 8),
+ ('ref_len', 'B', 2)
+ )
+
+ def unpack(self, buf):
+ # TPKT header
+ self.tpkt = tpkt.TPKT(buf)
+ if self.tpkt.v != 3:
+ raise dpkt.UnpackError('invalid TPKT version')
+ if self.tpkt.rsvd != 0:
+ raise dpkt.UnpackError('invalid TPKT reserved value')
+ n = self.tpkt.len - self.tpkt.__hdr_len__
+ if n > len(self.tpkt.data):
+ raise dpkt.UnpackError('invalid TPKT length')
+ buf = self.tpkt.data
+
+ # Q.931 payload
+ dpkt.Packet.unpack(self, buf)
+ buf = buf[self.__hdr_len__:]
+ self.ref_val = buf[:self.ref_len]
+ buf = buf[self.ref_len:]
+ self.type = struct.unpack('B', buf[:1])[0]
+ buf = buf[1:]
+
+ # Information Elements
+ l = []
+ while buf:
+ ie = self.IE(buf)
+ l.append(ie)
+ buf = buf[len(ie):]
+ self.data = l
+
+ def __len__(self):
+ return self.tpkt.__hdr_len__ + self.__hdr_len__ + sum(map(len, self.data))
+
+ def __str__(self):
+ return self.tpkt.pack_hdr() + self.pack_hdr() + self.ref_val + \
+ struct.pack('B', self.type) + ''.join(map(str, self.data))
+
+ class IE(dpkt.Packet):
+ __hdr__ = (
+ ('type', 'B', 0),
+ )
+
+ def unpack(self, buf):
+ dpkt.Packet.unpack(self, buf)
+ buf = buf[self.__hdr_len__:]
+
+ # single-byte IE
+ if self.type & 0x80:
+ self.len = 0
+ self.data = None
+ # multi-byte IE
+ else:
+ # special PER-encoded UUIE
+ if self.type == USER_TO_USER:
+ self.len = struct.unpack('>H', buf[:2])[0]
+ buf = buf[2:]
+ # normal TLV-like IE
+ else:
+ self.len = struct.unpack('B', buf[:1])[0]
+ buf = buf[1:]
+ self.data = buf[:self.len]
+
+ def __len__(self):
+ if self.type & 0x80:
+ n = 0
+ else:
+ if self.type == USER_TO_USER:
+ n = 2
+ else:
+ n = 1
+ return self.__hdr_len__ + self.len + n
+
+ def __str__(self):
+ if self.type & 0x80:
+ length_str = None
+ else:
+ if self.type == USER_TO_USER:
+ length_str = struct.pack('>H', self.len)
+ else:
+ length_str = struct.pack('B', self.len)
+ return struct.pack('B', self.type) + length_str + self.data
+
+
+__s = '\x03\x00\x04\x11\x08\x02\x54\x2b\x05\x04\x03\x88\x93\xa5\x28\x0e\x4a\x6f\x6e\x20\x4f\x62\x65\x72\x68\x65\x69\x64\x65\x00\x7e\x03\xf0\x05\x20\xb8\x06\x00\x08\x91\x4a\x00\x04\x01\x40\x0c\x00\x4a\x00\x6f\x00\x6e\x00\x20\x00\x4f\x00\x62\x00\x65\x00\x72\x00\x68\x00\x65\x00\x69\x00\x64\x00\x65\x22\xc0\x09\x00\x00\x3d\x06\x65\x6b\x69\x67\x61\x00\x00\x14\x32\x2e\x30\x2e\x32\x20\x28\x4f\x50\x41\x4c\x20\x76\x32\x2e\x32\x2e\x32\x29\x00\x00\x00\x01\x40\x15\x00\x74\x00\x63\x00\x70\x00\x24\x00\x68\x00\x33\x00\x32\x00\x33\x00\x2e\x00\x76\x00\x6f\x00\x78\x00\x67\x00\x72\x00\x61\x00\x74\x00\x69\x00\x61\x00\x2e\x00\x6f\x00\x72\x00\x67\x00\x42\x87\x23\x2c\x06\xb8\x00\x6a\x8b\x1d\x0c\xb7\x06\xdb\x11\x9e\xca\x00\x10\xa4\x89\x6d\x6a\x00\xc5\x1d\x80\x04\x07\x00\x0a\x00\x01\x7a\x75\x30\x11\x00\x5e\x88\x1d\x0c\xb7\x06\xdb\x11\x9e\xca\x00\x10\xa4\x89\x6d\x6a\x82\x2b\x0e\x30\x40\x00\x00\x06\x04\x01\x00\x4c\x10\x09\x00\x00\x3d\x0f\x53\x70\x65\x65\x78\x20\x62\x73\x34\x20\x57\x69\x64\x65\x36\x80\x11\x1c\x00\x01\x00\x98\xa0\x26\x41\x13\x8a\x00\x98\xa0\x26\x41\x13\x8b\x26\x00\x00\x64\x0c\x10\x09\x00\x00\x3d\x0f\x53\x70\x65\x65\x78\x20\x62\x73\x34\x20\x57\x69\x64\x65\x36\x80\x0b\x0d\x00\x01\x00\x98\xa0\x26\x41\x13\x8b\x00\x2a\x40\x00\x00\x06\x04\x01\x00\x4c\x10\x09\x00\x00\x3d\x09\x69\x4c\x42\x43\x2d\x31\x33\x6b\x33\x80\x11\x1c\x00\x01\x00\x98\xa0\x26\x41\x13\x8a\x00\x98\xa0\x26\x41\x13\x8b\x20\x00\x00\x65\x0c\x10\x09\x00\x00\x3d\x09\x69\x4c\x42\x43\x2d\x31\x33\x6b\x33\x80\x0b\x0d\x00\x01\x00\x98\xa0\x26\x41\x13\x8b\x00\x20\x40\x00\x00\x06\x04\x01\x00\x4e\x0c\x03\x00\x83\x00\x80\x11\x1c\x00\x01\x00\x98\xa0\x26\x41\x13\x8a\x00\x98\xa0\x26\x41\x13\x8b\x16\x00\x00\x66\x0e\x0c\x03\x00\x83\x00\x80\x0b\x0d\x00\x01\x00\x98\xa0\x26\x41\x13\x8b\x00\x4b\x40\x00\x00\x06\x04\x01\x00\x4c\x10\xb5\x00\x53\x4c\x2a\x02\x00\x00\x00\x00\x00\x40\x01\x00\x00\x40\x01\x02\x00\x08\x00\x00\x00\x00\x00\x31\x00\x01\x00\x40\x1f\x00\x00\x59\x06\x00\x00\x41\x00\x00\x00\x02\x00\x40\x01\x00\x00\x80\x11\x1c\x00\x01\x00\x98\xa0\x26\x41\x13\x8a\x00\x98\xa0\x26\x41\x13\x8b\x41\x00\x00\x67\x0c\x10\xb5\x00\x53\x4c\x2a\x02\x00\x00\x00\x00\x00\x40\x01\x00\x00\x40\x01\x02\x00\x08\x00\x00\x00\x00\x00\x31\x00\x01\x00\x40\x1f\x00\x00\x59\x06\x00\x00\x41\x00\x00\x00\x02\x00\x40\x01\x00\x00\x80\x0b\x0d\x00\x01\x00\x98\xa0\x26\x41\x13\x8b\x00\x32\x40\x00\x00\x06\x04\x01\x00\x4c\x10\x09\x00\x00\x3d\x11\x53\x70\x65\x65\x78\x20\x62\x73\x34\x20\x4e\x61\x72\x72\x6f\x77\x33\x80\x11\x1c\x00\x01\x00\x98\xa0\x26\x41\x13\x8a\x00\x98\xa0\x26\x41\x13\x8b\x28\x00\x00\x68\x0c\x10\x09\x00\x00\x3d\x11\x53\x70\x65\x65\x78\x20\x62\x73\x34\x20\x4e\x61\x72\x72\x6f\x77\x33\x80\x0b\x0d\x00\x01\x00\x98\xa0\x26\x41\x13\x8b\x00\x1d\x40\x00\x00\x06\x04\x01\x00\x4c\x60\x1d\x80\x11\x1c\x00\x01\x00\x98\xa0\x26\x41\x13\x8a\x00\x98\xa0\x26\x41\x13\x8b\x13\x00\x00\x69\x0c\x60\x1d\x80\x0b\x0d\x00\x01\x00\x98\xa0\x26\x41\x13\x8b\x00\x1d\x40\x00\x00\x06\x04\x01\x00\x4c\x20\x1d\x80\x11\x1c\x00\x01\x00\x98\xa0\x26\x41\x13\x8a\x00\x98\xa0\x26\x41\x13\x8b\x13\x00\x00\x6a\x0c\x20\x1d\x80\x0b\x0d\x00\x01\x00\x98\xa0\x26\x41\x13\x8b\x00\x01\x00\x01\x00\x01\x00\x01\x00\x81\x03\x02\x80\xf8\x02\x70\x01\x06\x00\x08\x81\x75\x00\x0b\x80\x13\x80\x01\xf4\x00\x01\x00\x00\x01\x00\x00\x01\x00\x00\x0c\xc0\x01\x00\x01\x80\x0b\x80\x00\x00\x20\x20\x09\x00\x00\x3d\x0f\x53\x70\x65\x65\x78\x20\x62\x73\x34\x20\x57\x69\x64\x65\x36\x80\x00\x01\x20\x20\x09\x00\x00\x3d\x09\x69\x4c\x42\x43\x2d\x31\x33\x6b\x33\x80\x00\x02\x24\x18\x03\x00\xe6\x00\x80\x00\x03\x20\x20\xb5\x00\x53\x4c\x2a\x02\x00\x00\x00\x00\x00\x40\x01\x00\x00\x40\x01\x02\x00\x08\x00\x00\x00\x00\x00\x31\x00\x01\x00\x40\x1f\x00\x00\x59\x06\x00\x00\x41\x00\x00\x00\x02\x00\x40\x01\x00\x00\x80\x00\x04\x20\x20\x09\x00\x00\x3d\x11\x53\x70\x65\x65\x78\x20\x62\x73\x34\x20\x4e\x61\x72\x72\x6f\x77\x33\x80\x00\x05\x20\xc0\xef\x80\x00\x06\x20\x40\xef\x80\x00\x07\x08\xe0\x03\x51\x00\x80\x01\x00\x80\x00\x08\x08\xd0\x03\x51\x00\x80\x01\x00\x80\x00\x09\x83\x01\x50\x80\x00\x0a\x83\x01\x10\x80\x00\x0b\x83\x01\x40\x00\x80\x01\x03\x06\x00\x00\x00\x01\x00\x02\x00\x03\x00\x04\x00\x05\x00\x06\x01\x00\x07\x00\x08\x00\x00\x09\x01\x00\x0a\x00\x0b\x07\x01\x00\x32\x80\xa6\xff\x4c\x02\x80\x01\x80'
+
+
+def test_pack():
+ h = H225(__s)
+ assert (__s == str(h))
+
+
+def test_unpack():
+ h = H225(__s)
+ assert (h.tpkt.v == 3)
+ assert (h.tpkt.rsvd == 0)
+ assert (h.tpkt.len == 1041)
+ assert (h.proto == 8)
+ assert (h.type == SETUP)
+ assert (len(h.data) == 3)
+
+ ie = h.data[0]
+ assert (ie.type == BEARER_CAPABILITY)
+ assert (ie.len == 3)
+ ie = h.data[1]
+ assert (ie.type == DISPLAY)
+ assert (ie.len == 14)
+ ie = h.data[2]
+ assert (ie.type == USER_TO_USER)
+ assert (ie.len == 1008)
+
+
+if __name__ == '__main__':
+ test_pack()
+ test_unpack()
+ print 'Tests Successful...' \ No newline at end of file
diff --git a/external_libs/python/dpkt-1.8.6.2/dpkt/hsrp.py b/external_libs/python/dpkt-1.8.6.2/dpkt/hsrp.py
new file mode 100644
index 00000000..7581d3e4
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/dpkt/hsrp.py
@@ -0,0 +1,33 @@
+# $Id: hsrp.py 23 2006-11-08 15:45:33Z dugsong $
+# -*- coding: utf-8 -*-
+"""Cisco Hot Standby Router Protocol."""
+
+import dpkt
+
+# Opcodes
+HELLO = 0
+COUP = 1
+RESIGN = 2
+
+# States
+INITIAL = 0x00
+LEARN = 0x01
+LISTEN = 0x02
+SPEAK = 0x04
+STANDBY = 0x08
+ACTIVE = 0x10
+
+
+class HSRP(dpkt.Packet):
+ __hdr__ = (
+ ('version', 'B', 0),
+ ('opcode', 'B', 0),
+ ('state', 'B', 0),
+ ('hello', 'B', 0),
+ ('hold', 'B', 0),
+ ('priority', 'B', 0),
+ ('group', 'B', 0),
+ ('rsvd', 'B', 0),
+ ('auth', '8s', 'cisco'),
+ ('vip', '4s', '')
+ )
diff --git a/external_libs/python/dpkt-1.8.6.2/dpkt/http.py b/external_libs/python/dpkt-1.8.6.2/dpkt/http.py
new file mode 100644
index 00000000..59759ac6
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/dpkt/http.py
@@ -0,0 +1,259 @@
+# $Id: http.py 86 2013-03-05 19:25:19Z andrewflnr@gmail.com $
+# -*- coding: utf-8 -*-
+"""Hypertext Transfer Protocol."""
+
+import cStringIO
+import dpkt
+
+
+def parse_headers(f):
+ """Return dict of HTTP headers parsed from a file object."""
+ d = {}
+ while 1:
+ line = f.readline()
+ if not line:
+ raise dpkt.NeedData('premature end of headers')
+ line = line.strip()
+ if not line:
+ break
+ l = line.split(':', 1)
+ if len(l[0].split()) != 1:
+ raise dpkt.UnpackError('invalid header: %r' % line)
+ k = l[0].lower()
+ v = len(l) != 1 and l[1].lstrip() or ''
+ if k in d:
+ if not type(d[k]) is list:
+ d[k] = [d[k]]
+ d[k].append(v)
+ else:
+ d[k] = v
+ return d
+
+
+def parse_body(f, headers):
+ """Return HTTP body parsed from a file object, given HTTP header dict."""
+ if headers.get('transfer-encoding', '').lower() == 'chunked':
+ l = []
+ found_end = False
+ while 1:
+ try:
+ sz = f.readline().split(None, 1)[0]
+ except IndexError:
+ raise dpkt.UnpackError('missing chunk size')
+ n = int(sz, 16)
+ if n == 0:
+ found_end = True
+ buf = f.read(n)
+ if f.readline().strip():
+ break
+ if n and len(buf) == n:
+ l.append(buf)
+ else:
+ break
+ if not found_end:
+ raise dpkt.NeedData('premature end of chunked body')
+ body = ''.join(l)
+ elif 'content-length' in headers:
+ n = int(headers['content-length'])
+ body = f.read(n)
+ if len(body) != n:
+ raise dpkt.NeedData('short body (missing %d bytes)' % (n - len(body)))
+ elif 'content-type' in headers:
+ body = f.read()
+ else:
+ # XXX - need to handle HTTP/0.9
+ body = ''
+ return body
+
+
+class Message(dpkt.Packet):
+ """Hypertext Transfer Protocol headers + body."""
+ __metaclass__ = type
+ __hdr_defaults__ = {}
+ headers = None
+ body = None
+
+ def __init__(self, *args, **kwargs):
+ if args:
+ self.unpack(args[0])
+ else:
+ self.headers = {}
+ self.body = ''
+ for k, v in self.__hdr_defaults__.iteritems():
+ setattr(self, k, v)
+ for k, v in kwargs.iteritems():
+ setattr(self, k, v)
+
+ def unpack(self, buf):
+ f = cStringIO.StringIO(buf)
+ # Parse headers
+ self.headers = parse_headers(f)
+ # Parse body
+ self.body = parse_body(f, self.headers)
+ # Save the rest
+ self.data = f.read()
+
+ def pack_hdr(self):
+ return ''.join(['%s: %s\r\n' % t for t in self.headers.iteritems()])
+
+ def __len__(self):
+ return len(str(self))
+
+ def __str__(self):
+ return '%s\r\n%s' % (self.pack_hdr(), self.body)
+
+
+class Request(Message):
+ """Hypertext Transfer Protocol Request."""
+ __hdr_defaults__ = {
+ 'method': 'GET',
+ 'uri': '/',
+ 'version': '1.0',
+ }
+ __methods = dict.fromkeys((
+ 'GET', 'PUT', 'ICY',
+ 'COPY', 'HEAD', 'LOCK', 'MOVE', 'POLL', 'POST',
+ 'BCOPY', 'BMOVE', 'MKCOL', 'TRACE', 'LABEL', 'MERGE',
+ 'DELETE', 'SEARCH', 'UNLOCK', 'REPORT', 'UPDATE', 'NOTIFY',
+ 'BDELETE', 'CONNECT', 'OPTIONS', 'CHECKIN',
+ 'PROPFIND', 'CHECKOUT', 'CCM_POST',
+ 'SUBSCRIBE', 'PROPPATCH', 'BPROPFIND',
+ 'BPROPPATCH', 'UNCHECKOUT', 'MKACTIVITY',
+ 'MKWORKSPACE', 'UNSUBSCRIBE', 'RPC_CONNECT',
+ 'VERSION-CONTROL',
+ 'BASELINE-CONTROL'
+ ))
+ __proto = 'HTTP'
+
+ def unpack(self, buf):
+ f = cStringIO.StringIO(buf)
+ line = f.readline()
+ l = line.strip().split()
+ if len(l) < 2:
+ raise dpkt.UnpackError('invalid request: %r' % line)
+ if l[0] not in self.__methods:
+ raise dpkt.UnpackError('invalid http method: %r' % l[0])
+ if len(l) == 2:
+ # HTTP/0.9 does not specify a version in the request line
+ self.version = '0.9'
+ else:
+ if not l[2].startswith(self.__proto):
+ raise dpkt.UnpackError('invalid http version: %r' % l[2])
+ self.version = l[2][len(self.__proto) + 1:]
+ self.method = l[0]
+ self.uri = l[1]
+ Message.unpack(self, f.read())
+
+ def __str__(self):
+ return '%s %s %s/%s\r\n' % (self.method, self.uri, self.__proto,
+ self.version) + Message.__str__(self)
+
+
+class Response(Message):
+ """Hypertext Transfer Protocol Response."""
+ __hdr_defaults__ = {
+ 'version': '1.0',
+ 'status': '200',
+ 'reason': 'OK'
+ }
+ __proto = 'HTTP'
+
+ def unpack(self, buf):
+ f = cStringIO.StringIO(buf)
+ line = f.readline()
+ l = line.strip().split(None, 2)
+ if len(l) < 2 or not l[0].startswith(self.__proto) or not l[1].isdigit():
+ raise dpkt.UnpackError('invalid response: %r' % line)
+ self.version = l[0][len(self.__proto) + 1:]
+ self.status = l[1]
+ self.reason = l[2] if len(l) > 2 else ''
+ Message.unpack(self, f.read())
+
+ def __str__(self):
+ return '%s/%s %s %s\r\n' % (self.__proto, self.version, self.status,
+ self.reason) + Message.__str__(self)
+
+
+def test_parse_request():
+ s = """POST /main/redirect/ab/1,295,,00.html HTTP/1.0\r\nReferer: http://www.email.com/login/snap/login.jhtml\r\nConnection: Keep-Alive\r\nUser-Agent: Mozilla/4.75 [en] (X11; U; OpenBSD 2.8 i386; Nav)\r\nHost: ltd.snap.com\r\nAccept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*\r\nAccept-Encoding: gzip\r\nAccept-Language: en\r\nAccept-Charset: iso-8859-1,*,utf-8\r\nContent-type: application/x-www-form-urlencoded\r\nContent-length: 61\r\n\r\nsn=em&mn=dtest4&pw=this+is+atest&fr=true&login=Sign+in&od=www"""
+ r = Request(s)
+ assert r.method == 'POST'
+ assert r.uri == '/main/redirect/ab/1,295,,00.html'
+ assert r.body == 'sn=em&mn=dtest4&pw=this+is+atest&fr=true&login=Sign+in&od=www'
+ assert r.headers['content-type'] == 'application/x-www-form-urlencoded'
+ try:
+ Request(s[:60])
+ assert 'invalid headers parsed!'
+ except dpkt.UnpackError:
+ pass
+
+
+def test_format_request():
+ r = Request()
+ assert str(r) == 'GET / HTTP/1.0\r\n\r\n'
+ r.method = 'POST'
+ r.uri = '/foo/bar/baz.html'
+ r.headers['content-type'] = 'text/plain'
+ r.headers['content-length'] = '5'
+ r.body = 'hello'
+ s = str(r)
+ assert s.startswith('POST /foo/bar/baz.html HTTP/1.0\r\n')
+ assert s.endswith('\r\n\r\nhello')
+ assert '\r\ncontent-length: 5\r\n' in s
+ assert '\r\ncontent-type: text/plain\r\n' in s
+ r = Request(str(r))
+ assert str(r) == s
+
+
+def test_chunked_response():
+ s = """HTTP/1.1 200 OK\r\nCache-control: no-cache\r\nPragma: no-cache\r\nContent-Type: text/javascript; charset=utf-8\r\nContent-Encoding: gzip\r\nTransfer-Encoding: chunked\r\nSet-Cookie: S=gmail=agg:gmail_yj=v2s:gmproxy=JkU; Domain=.google.com; Path=/\r\nServer: GFE/1.3\r\nDate: Mon, 12 Dec 2005 22:33:23 GMT\r\n\r\na\r\n\x1f\x8b\x08\x00\x00\x00\x00\x00\x00\x00\r\n152\r\nm\x91MO\xc4 \x10\x86\xef\xfe\n\x82\xc9\x9eXJK\xe9\xb6\xee\xc1\xe8\x1e6\x9e4\xf1\xe0a5\x86R\xda\x12Yh\x80\xba\xfa\xef\x85\xee\x1a/\xf21\x99\x0c\xef0<\xc3\x81\xa0\xc3\x01\xe6\x10\xc1<\xa7eYT5\xa1\xa4\xac\xe1\xdb\x15:\xa4\x9d\x0c\xfa5K\x00\xf6.\xaa\xeb\x86\xd5y\xcdHY\x954\x8e\xbc*h\x8c\x8e!L7Y\xe6\'\xeb\x82WZ\xcf>8\x1ed\x87\x851X\xd8c\xe6\xbc\x17Z\x89\x8f\xac \x84e\xde\n!]\x96\x17i\xb5\x02{{\xc2z0\x1e\x0f#7\x9cw3v\x992\x9d\xfc\xc2c8\xea[/EP\xd6\xbc\xce\x84\xd0\xce\xab\xf7`\'\x1f\xacS\xd2\xc7\xd2\xfb\x94\x02N\xdc\x04\x0f\xee\xba\x19X\x03TtW\xd7\xb4\xd9\x92\n\xbcX\xa7;\xb0\x9b\'\x10$?F\xfd\xf3CzPt\x8aU\xef\xb8\xc8\x8b-\x18\xed\xec<\xe0\x83\x85\x08!\xf8"[\xb0\xd3j\x82h\x93\xb8\xcf\xd8\x9b\xba\xda\xd0\x92\x14\xa4a\rc\reM\xfd\x87=X;h\xd9j;\xe0db\x17\xc2\x02\xbd\xb0F\xc2in#\xfb:\xb6\xc4x\x15\xd6\x9f\x8a\xaf\xcf)\x0b^\xbc\xe7i\x11\x80\x8b\x00D\x01\xd8/\x82x\xf6\xd8\xf7J(\xae/\x11p\x1f+\xc4p\t:\xfe\xfd\xdf\xa3Y\xfa\xae4\x7f\x00\xc5\xa5\x95\xa1\xe2\x01\x00\x00\r\n0\r\n\r\n"""
+ r = Response(s)
+ assert r.version == '1.1'
+ assert r.status == '200'
+ assert r.reason == 'OK'
+
+
+def test_multicookie_response():
+ s = """HTTP/1.x 200 OK\r\nSet-Cookie: first_cookie=cookie1; path=/; domain=.example.com\r\nSet-Cookie: second_cookie=cookie2; path=/; domain=.example.com\r\nContent-Length: 0\r\n\r\n"""
+ r = Response(s)
+ assert type(r.headers['set-cookie']) is list
+ assert len(r.headers['set-cookie']) == 2
+
+
+def test_noreason_response():
+ s = """HTTP/1.1 200 \r\n\r\n"""
+ r = Response(s)
+ assert r.reason == ''
+ assert str(r) == s
+
+
+def test_request_version():
+ s = """GET / HTTP/1.0\r\n\r\n"""
+ r = Request(s)
+ assert r.method == 'GET'
+ assert r.uri == '/'
+ assert r.version == '1.0'
+
+ s = """GET /\r\n\r\n"""
+ r = Request(s)
+ assert r.method == 'GET'
+ assert r.uri == '/'
+ assert r.version == '0.9'
+
+ s = """GET / CHEESE/1.0\r\n\r\n"""
+ try:
+ Request(s)
+ assert "invalid protocol version parsed!"
+ except:
+ pass
+
+
+if __name__ == '__main__':
+ # Runs all the test associated with this class/file
+ test_parse_request()
+ test_format_request()
+ test_chunked_response()
+ test_multicookie_response()
+ test_noreason_response()
+ test_request_version()
+ print 'Tests Successful...'
diff --git a/external_libs/python/dpkt-1.8.6.2/dpkt/icmp.py b/external_libs/python/dpkt-1.8.6.2/dpkt/icmp.py
new file mode 100644
index 00000000..12e73728
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/dpkt/icmp.py
@@ -0,0 +1,127 @@
+# $Id: icmp.py 45 2007-08-03 00:05:22Z jon.oberheide $
+# -*- coding: utf-8 -*-
+"""Internet Control Message Protocol."""
+
+import dpkt
+import ip
+
+# Types (icmp_type) and codes (icmp_code) -
+# http://www.iana.org/assignments/icmp-parameters
+
+ICMP_CODE_NONE = 0 # for types without codes
+ICMP_ECHOREPLY = 0 # echo reply
+ICMP_UNREACH = 3 # dest unreachable, codes:
+ICMP_UNREACH_NET = 0 # bad net
+ICMP_UNREACH_HOST = 1 # bad host
+ICMP_UNREACH_PROTO = 2 # bad protocol
+ICMP_UNREACH_PORT = 3 # bad port
+ICMP_UNREACH_NEEDFRAG = 4 # IP_DF caused drop
+ICMP_UNREACH_SRCFAIL = 5 # src route failed
+ICMP_UNREACH_NET_UNKNOWN = 6 # unknown net
+ICMP_UNREACH_HOST_UNKNOWN = 7 # unknown host
+ICMP_UNREACH_ISOLATED = 8 # src host isolated
+ICMP_UNREACH_NET_PROHIB = 9 # for crypto devs
+ICMP_UNREACH_HOST_PROHIB = 10 # ditto
+ICMP_UNREACH_TOSNET = 11 # bad tos for net
+ICMP_UNREACH_TOSHOST = 12 # bad tos for host
+ICMP_UNREACH_FILTER_PROHIB = 13 # prohibited access
+ICMP_UNREACH_HOST_PRECEDENCE = 14 # precedence error
+ICMP_UNREACH_PRECEDENCE_CUTOFF = 15 # precedence cutoff
+ICMP_SRCQUENCH = 4 # packet lost, slow down
+ICMP_REDIRECT = 5 # shorter route, codes:
+ICMP_REDIRECT_NET = 0 # for network
+ICMP_REDIRECT_HOST = 1 # for host
+ICMP_REDIRECT_TOSNET = 2 # for tos and net
+ICMP_REDIRECT_TOSHOST = 3 # for tos and host
+ICMP_ALTHOSTADDR = 6 # alternate host address
+ICMP_ECHO = 8 # echo service
+ICMP_RTRADVERT = 9 # router advertise, codes:
+ICMP_RTRADVERT_NORMAL = 0 # normal
+ICMP_RTRADVERT_NOROUTE_COMMON = 16 # selective routing
+ICMP_RTRSOLICIT = 10 # router solicitation
+ICMP_TIMEXCEED = 11 # time exceeded, code:
+ICMP_TIMEXCEED_INTRANS = 0 # ttl==0 in transit
+ICMP_TIMEXCEED_REASS = 1 # ttl==0 in reass
+ICMP_PARAMPROB = 12 # ip header bad
+ICMP_PARAMPROB_ERRATPTR = 0 # req. opt. absent
+ICMP_PARAMPROB_OPTABSENT = 1 # req. opt. absent
+ICMP_PARAMPROB_LENGTH = 2 # bad length
+ICMP_TSTAMP = 13 # timestamp request
+ICMP_TSTAMPREPLY = 14 # timestamp reply
+ICMP_INFO = 15 # information request
+ICMP_INFOREPLY = 16 # information reply
+ICMP_MASK = 17 # address mask request
+ICMP_MASKREPLY = 18 # address mask reply
+ICMP_TRACEROUTE = 30 # traceroute
+ICMP_DATACONVERR = 31 # data conversion error
+ICMP_MOBILE_REDIRECT = 32 # mobile host redirect
+ICMP_IP6_WHEREAREYOU = 33 # IPv6 where-are-you
+ICMP_IP6_IAMHERE = 34 # IPv6 i-am-here
+ICMP_MOBILE_REG = 35 # mobile registration req
+ICMP_MOBILE_REGREPLY = 36 # mobile registration reply
+ICMP_DNS = 37 # domain name request
+ICMP_DNSREPLY = 38 # domain name reply
+ICMP_SKIP = 39 # SKIP
+ICMP_PHOTURIS = 40 # Photuris
+ICMP_PHOTURIS_UNKNOWN_INDEX = 0 # unknown sec index
+ICMP_PHOTURIS_AUTH_FAILED = 1 # auth failed
+ICMP_PHOTURIS_DECOMPRESS_FAILED = 2 # decompress failed
+ICMP_PHOTURIS_DECRYPT_FAILED = 3 # decrypt failed
+ICMP_PHOTURIS_NEED_AUTHN = 4 # no authentication
+ICMP_PHOTURIS_NEED_AUTHZ = 5 # no authorization
+ICMP_TYPE_MAX = 40
+
+
+class ICMP(dpkt.Packet):
+ __hdr__ = (
+ ('type', 'B', 8),
+ ('code', 'B', 0),
+ ('sum', 'H', 0)
+ )
+
+ class Echo(dpkt.Packet):
+ __hdr__ = (('id', 'H', 0), ('seq', 'H', 0))
+
+ class Quote(dpkt.Packet):
+ __hdr__ = (('pad', 'I', 0),)
+
+ def unpack(self, buf):
+ dpkt.Packet.unpack(self, buf)
+ self.data = self.ip = ip.IP(self.data)
+
+ class Unreach(Quote):
+ __hdr__ = (('pad', 'H', 0), ('mtu', 'H', 0))
+
+ class Quench(Quote): pass
+
+ class Redirect(Quote):
+ __hdr__ = (('gw', 'I', 0),)
+
+ class ParamProbe(Quote):
+ __hdr__ = (('ptr', 'B', 0), ('pad1', 'B', 0), ('pad2', 'H', 0))
+
+ class TimeExceed(Quote): pass
+
+ _typesw = {0: Echo, 3: Unreach, 4: Quench, 5: Redirect, 8: Echo, 11: TimeExceed}
+
+ def unpack(self, buf):
+ dpkt.Packet.unpack(self, buf)
+ try:
+ self.data = self._typesw[self.type](self.data)
+ setattr(self, self.data.__class__.__name__.lower(), self.data)
+ except (KeyError, dpkt.UnpackError):
+ pass
+
+ def __str__(self):
+ if not self.sum:
+ self.sum = dpkt.in_cksum(dpkt.Packet.__str__(self))
+ return dpkt.Packet.__str__(self)
+
+
+def test_icmp():
+ s = '\x03\x0a\x6b\x19\x00\x00\x00\x00\x45\x00\x00\x28\x94\x1f\x00\x00\xe3\x06\x99\xb4\x23\x2b\x24\x00\xde\x8e\x84\x42\xab\xd1\x00\x50\x00\x35\xe1\x29\x20\xd9\x00\x00\x00\x22\x9b\xf0\xe2\x04\x65\x6b'
+ assert (str(ICMP(s)) == s)
+
+if __name__ == '__main__':
+ test_icmp()
+ print 'Tests Successful...'
diff --git a/external_libs/python/dpkt-1.8.6.2/dpkt/icmp6.py b/external_libs/python/dpkt-1.8.6.2/dpkt/icmp6.py
new file mode 100644
index 00000000..679bc6b4
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/dpkt/icmp6.py
@@ -0,0 +1,77 @@
+# $Id: icmp6.py 23 2006-11-08 15:45:33Z dugsong $
+# -*- coding: utf-8 -*-
+"""Internet Control Message Protocol for IPv6."""
+
+import dpkt
+import ip6
+
+ICMP6_DST_UNREACH = 1 # dest unreachable, codes:
+ICMP6_PACKET_TOO_BIG = 2 # packet too big
+ICMP6_TIME_EXCEEDED = 3 # time exceeded, code:
+ICMP6_PARAM_PROB = 4 # ip6 header bad
+
+ICMP6_ECHO_REQUEST = 128 # echo service
+ICMP6_ECHO_REPLY = 129 # echo reply
+MLD_LISTENER_QUERY = 130 # multicast listener query
+MLD_LISTENER_REPORT = 131 # multicast listener report
+MLD_LISTENER_DONE = 132 # multicast listener done
+
+# RFC2292 decls
+ICMP6_MEMBERSHIP_QUERY = 130 # group membership query
+ICMP6_MEMBERSHIP_REPORT = 131 # group membership report
+ICMP6_MEMBERSHIP_REDUCTION = 132 # group membership termination
+
+ND_ROUTER_SOLICIT = 133 # router solicitation
+ND_ROUTER_ADVERT = 134 # router advertisment
+ND_NEIGHBOR_SOLICIT = 135 # neighbor solicitation
+ND_NEIGHBOR_ADVERT = 136 # neighbor advertisment
+ND_REDIRECT = 137 # redirect
+
+ICMP6_ROUTER_RENUMBERING = 138 # router renumbering
+
+ICMP6_WRUREQUEST = 139 # who are you request
+ICMP6_WRUREPLY = 140 # who are you reply
+ICMP6_FQDN_QUERY = 139 # FQDN query
+ICMP6_FQDN_REPLY = 140 # FQDN reply
+ICMP6_NI_QUERY = 139 # node information request
+ICMP6_NI_REPLY = 140 # node information reply
+
+ICMP6_MAXTYPE = 201
+
+
+class ICMP6(dpkt.Packet):
+ __hdr__ = (
+ ('type', 'B', 0),
+ ('code', 'B', 0),
+ ('sum', 'H', 0)
+ )
+
+ class Error(dpkt.Packet):
+ __hdr__ = (('pad', 'I', 0), )
+
+ def unpack(self, buf):
+ dpkt.Packet.unpack(self, buf)
+ self.data = self.ip6 = ip6.IP6(self.data)
+
+ class Unreach(Error): pass
+
+ class TooBig(Error):
+ __hdr__ = (('mtu', 'I', 1232), )
+
+ class TimeExceed(Error): pass
+
+ class ParamProb(Error):
+ __hdr__ = (('ptr', 'I', 0), )
+
+ class Echo(dpkt.Packet):
+ __hdr__ = (('id', 'H', 0), ('seq', 'H', 0))
+
+ _typesw = {1: Unreach, 2: TooBig, 3: TimeExceed, 4: ParamProb, 128: Echo, 129: Echo}
+
+ def unpack(self, buf):
+ dpkt.Packet.unpack(self, buf)
+ try:
+ self.data = self._typesw[self.type](self.data)
+ setattr(self, self.data.__class__.__name__.lower(), self.data)
+ except (KeyError, dpkt.UnpackError):
+ self.data = buf
diff --git a/external_libs/python/dpkt-1.8.6.2/dpkt/ieee80211.py b/external_libs/python/dpkt-1.8.6.2/dpkt/ieee80211.py
new file mode 100644
index 00000000..e18833fb
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/dpkt/ieee80211.py
@@ -0,0 +1,875 @@
+# $Id: 80211.py 53 2008-12-18 01:22:57Z jon.oberheide $
+# -*- coding: utf-8 -*-
+"""IEEE 802.11."""
+
+import socket
+import struct
+import dpkt
+from decorators import deprecated
+
+# Frame Types
+MGMT_TYPE = 0
+CTL_TYPE = 1
+DATA_TYPE = 2
+
+# Frame Sub-Types
+M_ASSOC_REQ = 0
+M_ASSOC_RESP = 1
+M_REASSOC_REQ = 2
+M_REASSOC_RESP = 3
+M_PROBE_REQ = 4
+M_PROBE_RESP = 5
+M_BEACON = 8
+M_ATIM = 9
+M_DISASSOC = 10
+M_AUTH = 11
+M_DEAUTH = 12
+M_ACTION = 13
+C_BLOCK_ACK_REQ = 8
+C_BLOCK_ACK = 9
+C_PS_POLL = 10
+C_RTS = 11
+C_CTS = 12
+C_ACK = 13
+C_CF_END = 14
+C_CF_END_ACK = 15
+D_DATA = 0
+D_DATA_CF_ACK = 1
+D_DATA_CF_POLL = 2
+D_DATA_CF_ACK_POLL = 3
+D_NULL = 4
+D_CF_ACK = 5
+D_CF_POLL = 6
+D_CF_ACK_POLL = 7
+D_QOS_DATA = 8
+D_QOS_CF_ACK = 9
+D_QOS_CF_POLL = 10
+D_QOS_CF_ACK_POLL = 11
+D_QOS_NULL = 12
+D_QOS_CF_POLL_EMPTY = 14
+
+TO_DS_FLAG = 10
+FROM_DS_FLAG = 1
+INTER_DS_FLAG = 11
+
+# Bitshifts for Frame Control
+_VERSION_MASK = 0x0300
+_TYPE_MASK = 0x0c00
+_SUBTYPE_MASK = 0xf000
+_TO_DS_MASK = 0x0001
+_FROM_DS_MASK = 0x0002
+_MORE_FRAG_MASK = 0x0004
+_RETRY_MASK = 0x0008
+_PWR_MGT_MASK = 0x0010
+_MORE_DATA_MASK = 0x0020
+_WEP_MASK = 0x0040
+_ORDER_MASK = 0x0080
+_VERSION_SHIFT = 8
+_TYPE_SHIFT = 10
+_SUBTYPE_SHIFT = 12
+_TO_DS_SHIFT = 0
+_FROM_DS_SHIFT = 1
+_MORE_FRAG_SHIFT = 2
+_RETRY_SHIFT = 3
+_PWR_MGT_SHIFT = 4
+_MORE_DATA_SHIFT = 5
+_WEP_SHIFT = 6
+_ORDER_SHIFT = 7
+
+# IEs
+IE_SSID = 0
+IE_RATES = 1
+IE_FH = 2
+IE_DS = 3
+IE_CF = 4
+IE_TIM = 5
+IE_IBSS = 6
+IE_HT_CAPA = 45
+IE_ESR = 50
+IE_HT_INFO = 61
+
+FCS_LENGTH = 4
+
+FRAMES_WITH_CAPABILITY = [M_BEACON, M_ASSOC_RESP, M_ASSOC_REQ, M_REASSOC_REQ, ]
+
+# Block Ack control constants
+_ACK_POLICY_SHIFT = 0
+_MULTI_TID_SHIFT = 1
+_COMPRESSED_SHIFT = 2
+_TID_SHIFT = 12
+
+_ACK_POLICY_MASK = 0x0001
+_MULTI_TID_MASK = 0x0002
+_COMPRESSED_MASK = 0x0004
+_TID_MASK = 0xf000
+
+_COMPRESSED_BMP_LENGTH = 8
+_BMP_LENGTH = 128
+
+# Action frame categories
+BLOCK_ACK = 3
+
+# Block ack category action codes
+BLOCK_ACK_CODE_REQUEST = 0
+BLOCK_ACK_CODE_RESPONSE = 1
+
+
+class IEEE80211(dpkt.Packet):
+ __hdr__ = (
+ ('framectl', 'H', 0),
+ ('duration', 'H', 0)
+ )
+
+ @property
+ def version(self):
+ return (self.framectl & _VERSION_MASK) >> _VERSION_SHIFT
+
+ @version.setter
+ def version(self, val):
+ self.framectl = (val << _VERSION_SHIFT) | (self.framectl & ~_VERSION_MASK)
+
+ @property
+ def type(self):
+ return (self.framectl & _TYPE_MASK) >> _TYPE_SHIFT
+
+ @type.setter
+ def type(self, val):
+ self.framectl = (val << _TYPE_SHIFT) | (self.framectl & ~_TYPE_MASK)
+
+ @property
+ def subtype(self):
+ return (self.framectl & _SUBTYPE_MASK) >> _SUBTYPE_SHIFT
+
+ @subtype.setter
+ def subtype(self, val):
+ self.framectl = (val << _SUBTYPE_SHIFT) | (self.framectl & ~_SUBTYPE_MASK)
+
+ @property
+ def to_ds(self):
+ return (self.framectl & _TO_DS_MASK) >> _TO_DS_SHIFT
+
+ @to_ds.setter
+ def to_ds(self, val):
+ self.framectl = (val << _TO_DS_SHIFT) | (self.framectl & ~_TO_DS_MASK)
+
+ @property
+ def from_ds(self):
+ return (self.framectl & _FROM_DS_MASK) >> _FROM_DS_SHIFT
+
+ @from_ds.setter
+ def from_ds(self, val):
+ self.framectl = (val << _FROM_DS_SHIFT) | (self.framectl & ~_FROM_DS_MASK)
+
+ @property
+ def more_frag(self):
+ return (self.framectl & _MORE_FRAG_MASK) >> _MORE_FRAG_SHIFT
+
+ @more_frag.setter
+ def more_frag(self, val):
+ self.framectl = (val << _MORE_FRAG_SHIFT) | (self.framectl & ~_MORE_FRAG_MASK)
+
+ @property
+ def retry(self):
+ return (self.framectl & _RETRY_MASK) >> _RETRY_SHIFT
+
+ @retry.setter
+ def retry(self, val):
+ self.framectl = (val << _RETRY_SHIFT) | (self.framectl & ~_RETRY_MASK)
+
+ @property
+ def pwr_mgt(self):
+ return (self.framectl & _PWR_MGT_MASK) >> _PWR_MGT_SHIFT
+
+ @pwr_mgt.setter
+ def pwr_mgt(self, val):
+ self.framectl = (val << _PWR_MGT_SHIFT) | (self.framectl & ~_PWR_MGT_MASK)
+
+ @property
+ def more_data(self):
+ return (self.framectl & _MORE_DATA_MASK) >> _MORE_DATA_SHIFT
+
+ @more_data.setter
+ def more_data(self, val):
+ self.framectl = (val << _MORE_DATA_SHIFT) | (self.framectl & ~_MORE_DATA_MASK)
+
+ @property
+ def wep(self):
+ return (self.framectl & _WEP_MASK) >> _WEP_SHIFT
+
+ @wep.setter
+ def wep(self, val):
+ self.framectl = (val << _WEP_SHIFT) | (self.framectl & ~_WEP_MASK)
+
+ @property
+ def order(self):
+ return (self.framectl & _ORDER_MASK) >> _ORDER_SHIFT
+
+ @order.setter
+ def order(self, val):
+ self.framectl = (val << _ORDER_SHIFT) | (self.framectl & ~_ORDER_MASK)
+
+ # Deprecated methods, will be removed in the future
+ # =================================================
+ @deprecated
+ def _get_version(self): return self.version
+
+ @deprecated
+ def _set_version(self, val): self.version = val
+
+ @deprecated
+ def _get_type(self): return self.type
+
+ @deprecated
+ def _set_type(self, val): self.type = val
+
+ @deprecated
+ def _get_subtype(self): return self.subtype
+
+ @deprecated
+ def _set_subtype(self, val): self.subtype = val
+
+ @deprecated
+ def _get_to_ds(self): return self.to_ds
+
+ @deprecated
+ def _set_to_ds(self, val): self.to_ds = val
+
+ @deprecated
+ def _get_from_ds(self): return self.from_ds
+
+ @deprecated
+ def _set_from_ds(self, val): self.from_ds = val
+
+ @deprecated
+ def _get_more_frag(self): return self.more_frag
+
+ @deprecated
+ def _set_more_frag(self, val): self.more_frag = val
+
+ @deprecated
+ def _get_retry(self): return self.retry
+
+ @deprecated
+ def _set_retry(self, val): self.retry = val
+
+ @deprecated
+ def _get_pwr_mgt(self): return self.pwr_mgt
+
+ @deprecated
+ def _set_pwr_mgt(self, val): self.pwr_mgt = val
+
+ @deprecated
+ def _get_more_data(self): return self.more_data
+
+ @deprecated
+ def _set_more_data(self, val): self.more_data = val
+
+ @deprecated
+ def _get_wep(self): return self.wep
+
+ @deprecated
+ def _set_wep(self, val): self.wep = val
+
+ @deprecated
+ def _get_order(self): return self.order
+
+ @deprecated
+ def _set_order(self, val): self.order = val
+ # =================================================
+
+ def unpack_ies(self, buf):
+ self.ies = []
+
+ ie_decoder = {
+ IE_SSID: ('ssid', self.IE),
+ IE_RATES: ('rate', self.IE),
+ IE_FH: ('fh', self.FH),
+ IE_DS: ('ds', self.DS),
+ IE_CF: ('cf', self.CF),
+ IE_TIM: ('tim', self.TIM),
+ IE_IBSS: ('ibss', self.IBSS),
+ IE_HT_CAPA: ('ht_capa', self.IE),
+ IE_ESR: ('esr', self.IE),
+ IE_HT_INFO: ('ht_info', self.IE)
+ }
+
+ # each IE starts with an ID and a length
+ while len(buf) > FCS_LENGTH:
+ ie_id = struct.unpack('B', (buf[0]))[0]
+ try:
+ parser = ie_decoder[ie_id][1]
+ name = ie_decoder[ie_id][0]
+ except KeyError:
+ parser = self.IE
+ name = 'ie_' + str(ie_id)
+ ie = parser(buf)
+
+ ie.data = buf[2:2 + ie.len]
+ setattr(self, name, ie)
+ self.ies.append(ie)
+ buf = buf[2 + ie.len:]
+
+ class Capability(object):
+ def __init__(self, field):
+ self.ess = field & 1
+ self.ibss = (field >> 1) & 1
+ self.cf_poll = (field >> 2) & 1
+ self.cf_poll_req = (field >> 3) & 1
+ self.privacy = (field >> 4) & 1
+ self.short_preamble = (field >> 5) & 1
+ self.pbcc = (field >> 6) & 1
+ self.hopping = (field >> 7) & 1
+ self.spec_mgmt = (field >> 8) & 1
+ self.qos = (field >> 9) & 1
+ self.short_slot = (field >> 10) & 1
+ self.apsd = (field >> 11) & 1
+ self.dsss = (field >> 13) & 1
+ self.delayed_blk_ack = (field >> 14) & 1
+ self.imm_blk_ack = (field >> 15) & 1
+
+ def __init__(self, *args, **kwargs):
+ if kwargs and 'fcs' in kwargs:
+ self.fcs_present = kwargs.pop('fcs')
+ else:
+ self.fcs_present = False
+
+ super(IEEE80211, self).__init__(*args, **kwargs)
+
+ def unpack(self, buf):
+ dpkt.Packet.unpack(self, buf)
+ self.data = buf[self.__hdr_len__:]
+
+ m_decoder = {
+ M_BEACON: ('beacon', self.Beacon),
+ M_ASSOC_REQ: ('assoc_req', self.Assoc_Req),
+ M_ASSOC_RESP: ('assoc_resp', self.Assoc_Resp),
+ M_DISASSOC: ('diassoc', self.Disassoc),
+ M_REASSOC_REQ: ('reassoc_req', self.Reassoc_Req),
+ M_REASSOC_RESP: ('reassoc_resp', self.Assoc_Resp),
+ M_AUTH: ('auth', self.Auth),
+ M_PROBE_RESP: ('probe_resp', self.Beacon),
+ M_DEAUTH: ('deauth', self.Deauth),
+ M_ACTION: ('action', self.Action)
+ }
+
+ c_decoder = {
+ C_RTS: ('rts', self.RTS),
+ C_CTS: ('cts', self.CTS),
+ C_ACK: ('ack', self.ACK),
+ C_BLOCK_ACK_REQ: ('bar', self.BlockAckReq),
+ C_BLOCK_ACK: ('back', self.BlockAck),
+ C_CF_END: ('cf_end', self.CFEnd),
+ }
+
+ d_dsData = {
+ 0: self.Data,
+ FROM_DS_FLAG: self.DataFromDS,
+ TO_DS_FLAG: self.DataToDS,
+ INTER_DS_FLAG: self.DataInterDS
+ }
+
+ # For now decode everything with DATA. Haven't checked about other QoS
+ # additions
+ d_decoder = {
+ # modified the decoder to consider the ToDS and FromDS flags
+ # Omitting the 11 case for now
+ D_DATA: ('data_frame', d_dsData),
+ D_NULL: ('data_frame', d_dsData),
+ D_QOS_DATA: ('data_frame', d_dsData),
+ D_QOS_NULL: ('data_frame', d_dsData)
+ }
+
+ decoder = {
+ MGMT_TYPE: m_decoder,
+ CTL_TYPE: c_decoder,
+ DATA_TYPE: d_decoder
+ }
+
+ # Strip off the FCS field
+ if self.fcs_present:
+ self.fcs = struct.unpack('I', self.data[-1 * FCS_LENGTH:])[0]
+ self.data = self.data[0: -1 * FCS_LENGTH]
+
+ if self.type == MGMT_TYPE:
+ self.mgmt = self.MGMT_Frame(self.data)
+ self.data = self.mgmt.data
+ if self.subtype == M_PROBE_REQ:
+ self.unpack_ies(self.data)
+ return
+ if self.subtype == M_ATIM:
+ return
+
+ try:
+ parser = decoder[self.type][self.subtype][1]
+ name = decoder[self.type][self.subtype][0]
+ except KeyError:
+ print "Key error:", self.type, self.subtype
+ return
+
+ if self.type == DATA_TYPE:
+ # need to grab the ToDS/FromDS info
+ parser = parser[self.to_ds * 10 + self.from_ds]
+
+ if self.type == MGMT_TYPE:
+ field = parser(self.mgmt.data)
+ else:
+ field = parser(self.data)
+ self.data = field
+
+ setattr(self, name, field)
+
+ if self.type == MGMT_TYPE:
+ self.ies = self.unpack_ies(field.data)
+ if self.subtype in FRAMES_WITH_CAPABILITY:
+ self.capability = self.Capability(socket.ntohs(field.capability))
+
+ if self.type == DATA_TYPE and self.subtype == D_QOS_DATA:
+ self.qos_data = self.QoS_Data(field.data)
+ field.data = self.qos_data.data
+
+ self.data = field.data
+
+ class BlockAckReq(dpkt.Packet):
+ __hdr__ = (
+ ('dst', '6s', '\x00' * 6),
+ ('src', '6s', '\x00' * 6),
+ ('ctl', 'H', 0),
+ ('seq', 'H', 0),
+ )
+
+ class BlockAck(dpkt.Packet):
+ __hdr__ = (
+ ('dst', '6s', '\x00' * 6),
+ ('src', '6s', '\x00' * 6),
+ ('ctl', 'H', 0),
+ ('seq', 'H', 0),
+ )
+
+ @property
+ def compressed(self):
+ return (self.ctl & _COMPRESSED_MASK) >> _COMPRESSED_SHIFT
+
+ @compressed.setter
+ def compressed(self, val):
+ self.ctl = (val << _COMPRESSED_SHIFT) | (self.ctl & ~_COMPRESSED_MASK)
+
+ @property
+ def ack_policy(self):
+ return (self.ctl & _ACK_POLICY_MASK) >> _ACK_POLICY_SHIFT
+
+ @ack_policy.setter
+ def ack_policy(self, val):
+ self.ctl = (val << _ACK_POLICY_SHIFT) | (self.ctl & ~_ACK_POLICY_MASK)
+
+ @property
+ def multi_tid(self):
+ return (self.ctl & _MULTI_TID_MASK) >> _MULTI_TID_SHIFT
+
+ @multi_tid.setter
+ def multi_tid(self, val):
+ self.ctl = (val << _MULTI_TID_SHIFT) | (self.ctl & ~_MULTI_TID_MASK)
+
+ @property
+ def tid(self):
+ return (self.ctl & _TID_MASK) >> _TID_SHIFT
+
+ @tid.setter
+ def tid(self, val):
+ self.ctl = (val << _TID_SHIFT) | (self.ctl & ~_TID_MASK)
+
+ # Deprecated methods, will be removed in the future
+ # =================================================
+ @deprecated
+ def _get_compressed(self): return self.compressed
+
+ @deprecated
+ def _set_compressed(self, val): self.compressed = val
+
+ @deprecated
+ def _get_ack_policy(self): return self.ack_policy
+
+ @deprecated
+ def _set_ack_policy(self, val): self.ack_policy = val
+
+ @deprecated
+ def _get_multi_tid(self): return self.multi_tid
+
+ @deprecated
+ def _set_multi_tid(self, val): self.multi_tid = val
+
+ @deprecated
+ def _get_tid(self): return self.tid
+
+ @deprecated
+ def _set_tid(self, val): self.tid = val
+ # =================================================
+
+ def unpack(self, buf):
+ dpkt.Packet.unpack(self, buf)
+ self.data = buf[self.__hdr_len__:]
+ self.ctl = socket.ntohs(self.ctl)
+
+ if self.compressed:
+ self.bmp = struct.unpack('8s', self.data[0:_COMPRESSED_BMP_LENGTH])[0]
+ else:
+ self.bmp = struct.unpack('128s', self.data[0:_BMP_LENGTH])[0]
+ self.data = self.data[len(self.__hdr__) + len(self.bmp):]
+
+ class RTS(dpkt.Packet):
+ __hdr__ = (
+ ('dst', '6s', '\x00' * 6),
+ ('src', '6s', '\x00' * 6)
+ )
+
+ class CTS(dpkt.Packet):
+ __hdr__ = (
+ ('dst', '6s', '\x00' * 6),
+ )
+
+ class ACK(dpkt.Packet):
+ __hdr__ = (
+ ('dst', '6s', '\x00' * 6),
+ )
+
+ class CFEnd(dpkt.Packet):
+ __hdr__ = (
+ ('dst', '6s', '\x00' * 6),
+ ('src', '6s', '\x00' * 6),
+ )
+
+ class MGMT_Frame(dpkt.Packet):
+ __hdr__ = (
+ ('dst', '6s', '\x00' * 6),
+ ('src', '6s', '\x00' * 6),
+ ('bssid', '6s', '\x00' * 6),
+ ('frag_seq', 'H', 0)
+ )
+
+ class Beacon(dpkt.Packet):
+ __hdr__ = (
+ ('timestamp', 'Q', 0),
+ ('interval', 'H', 0),
+ ('capability', 'H', 0)
+ )
+
+ class Disassoc(dpkt.Packet):
+ __hdr__ = (
+ ('reason', 'H', 0),
+ )
+
+ class Assoc_Req(dpkt.Packet):
+ __hdr__ = (
+ ('capability', 'H', 0),
+ ('interval', 'H', 0)
+ )
+
+ class Assoc_Resp(dpkt.Packet):
+ __hdr__ = (
+ ('capability', 'H', 0),
+ ('status', 'H', 0),
+ ('aid', 'H', 0)
+ )
+
+ class Reassoc_Req(dpkt.Packet):
+ __hdr__ = (
+ ('capability', 'H', 0),
+ ('interval', 'H', 0),
+ ('current_ap', '6s', '\x00' * 6)
+ )
+
+ # This obviously doesn't support any of AUTH frames that use encryption
+ class Auth(dpkt.Packet):
+ __hdr__ = (
+ ('algorithm', 'H', 0),
+ ('auth_seq', 'H', 0),
+ )
+
+ class Deauth(dpkt.Packet):
+ __hdr__ = (
+ ('reason', 'H', 0),
+ )
+
+ class Action(dpkt.Packet):
+ __hdr__ = (
+ ('category', 'B', 0),
+ ('code', 'B', 0),
+ )
+
+ def unpack(self, buf):
+ dpkt.Packet.unpack(self, buf)
+
+ action_parser = {
+ BLOCK_ACK: {BLOCK_ACK_CODE_REQUEST: ('block_ack_request', IEEE80211.BlockAckActionRequest),
+ BLOCK_ACK_CODE_RESPONSE: ('block_ack_response', IEEE80211.BlockAckActionResponse),
+ },
+ }
+
+ decoder = action_parser[self.category][self.code][1]
+ field_name = action_parser[self.category][self.code][0]
+ field = decoder(self.data)
+ setattr(self, field_name, field)
+ self.data = field.data
+
+ class BlockAckActionRequest(dpkt.Packet):
+ __hdr__ = (
+ ('dialog', 'B', 0),
+ ('parameters', 'H', 0),
+ ('timeout', 'H', 0),
+ ('starting_seq', 'H', 0),
+ )
+
+ class BlockAckActionResponse(dpkt.Packet):
+ __hdr__ = (
+ ('dialog', 'B', 0),
+ ('status_code', 'H', 0),
+ ('parameters', 'H', 0),
+ ('timeout', 'H', 0),
+ )
+
+ class Data(dpkt.Packet):
+ __hdr__ = (
+ ('dst', '6s', '\x00' * 6),
+ ('src', '6s', '\x00' * 6),
+ ('bssid', '6s', '\x00' * 6),
+ ('frag_seq', 'H', 0)
+ )
+
+ class DataFromDS(dpkt.Packet):
+ __hdr__ = (
+ ('dst', '6s', '\x00' * 6),
+ ('bssid', '6s', '\x00' * 6),
+ ('src', '6s', '\x00' * 6),
+ ('frag_seq', 'H', 0)
+ )
+
+ class DataToDS(dpkt.Packet):
+ __hdr__ = (
+ ('bssid', '6s', '\x00' * 6),
+ ('src', '6s', '\x00' * 6),
+ ('dst', '6s', '\x00' * 6),
+ ('frag_seq', 'H', 0)
+ )
+
+ class DataInterDS(dpkt.Packet):
+ __hdr__ = (
+ ('dst', '6s', '\x00' * 6),
+ ('src', '6s', '\x00' * 6),
+ ('da', '6s', '\x00' * 6),
+ ('frag_seq', 'H', 0),
+ ('sa', '6s', '\x00' * 6)
+ )
+
+ class QoS_Data(dpkt.Packet):
+ __hdr__ = (
+ ('control', 'H', 0),
+ )
+
+ class IE(dpkt.Packet):
+ __hdr__ = (
+ ('id', 'B', 0),
+ ('len', 'B', 0)
+ )
+
+ def unpack(self, buf):
+ dpkt.Packet.unpack(self, buf)
+ self.info = buf[2:self.len + 2]
+
+ class FH(dpkt.Packet):
+ __hdr__ = (
+ ('id', 'B', 0),
+ ('len', 'B', 0),
+ ('tu', 'H', 0),
+ ('hopset', 'B', 0),
+ ('hoppattern', 'B', 0),
+ ('hopindex', 'B', 0)
+ )
+
+ class DS(dpkt.Packet):
+ __hdr__ = (
+ ('id', 'B', 0),
+ ('len', 'B', 0),
+ ('ch', 'B', 0)
+ )
+
+ class CF(dpkt.Packet):
+ __hdr__ = (
+ ('id', 'B', 0),
+ ('len', 'B', 0),
+ ('count', 'B', 0),
+ ('period', 'B', 0),
+ ('max', 'H', 0),
+ ('dur', 'H', 0)
+ )
+
+ class TIM(dpkt.Packet):
+ __hdr__ = (
+ ('id', 'B', 0),
+ ('len', 'B', 0),
+ ('count', 'B', 0),
+ ('period', 'B', 0),
+ ('ctrl', 'H', 0)
+ )
+
+ def unpack(self, buf):
+ dpkt.Packet.unpack(self, buf)
+ self.bitmap = buf[5:self.len + 2]
+
+ class IBSS(dpkt.Packet):
+ __hdr__ = (
+ ('id', 'B', 0),
+ ('len', 'B', 0),
+ ('atim', 'H', 0)
+ )
+
+def test_802211_ack():
+ s = '\xd4\x00\x00\x00\x00\x12\xf0\xb6\x1c\xa4\xff\xff\xff\xff'
+ ieee = IEEE80211(s, fcs=True)
+ assert ieee.version == 0
+ assert ieee.type == CTL_TYPE
+ assert ieee.subtype == C_ACK
+ assert ieee.to_ds == 0
+ assert ieee.from_ds == 0
+ assert ieee.pwr_mgt == 0
+ assert ieee.more_data == 0
+ assert ieee.wep == 0
+ assert ieee.order == 0
+ assert ieee.ack.dst == '\x00\x12\xf0\xb6\x1c\xa4'
+ fcs = struct.unpack('I', s[-4:])[0]
+ assert ieee.fcs == fcs
+
+def test_80211_beacon():
+ s = '\x80\x00\x00\x00\xff\xff\xff\xff\xff\xff\x00\x26\xcb\x18\x6a\x30\x00\x26\xcb\x18\x6a\x30\xa0\xd0\x77\x09\x32\x03\x8f\x00\x00\x00\x66\x00\x31\x04\x00\x04\x43\x41\x45\x4e\x01\x08\x82\x84\x8b\x0c\x12\x96\x18\x24\x03\x01\x01\x05\x04\x00\x01\x00\x00\x07\x06\x55\x53\x20\x01\x0b\x1a\x0b\x05\x00\x00\x6e\x00\x00\x2a\x01\x02\x2d\x1a\x6e\x18\x1b\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x30\x14\x01\x00\x00\x0f\xac\x04\x01\x00\x00\x0f\xac\x04\x01\x00\x00\x0f\xac\x01\x28\x00\x32\x04\x30\x48\x60\x6c\x36\x03\x51\x63\x03\x3d\x16\x01\x00\x05\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x85\x1e\x05\x00\x8f\x00\x0f\x00\xff\x03\x59\x00\x63\x73\x65\x2d\x33\x39\x31\x32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x36\x96\x06\x00\x40\x96\x00\x14\x00\xdd\x18\x00\x50\xf2\x02\x01\x01\x80\x00\x03\xa4\x00\x00\x27\xa4\x00\x00\x42\x43\x5e\x00\x62\x32\x2f\x00\xdd\x06\x00\x40\x96\x01\x01\x04\xdd\x05\x00\x40\x96\x03\x05\xdd\x05\x00\x40\x96\x0b\x09\xdd\x08\x00\x40\x96\x13\x01\x00\x34\x01\xdd\x05\x00\x40\x96\x14\x05'
+ ieee = IEEE80211(s, fcs=True)
+ assert ieee.version == 0
+ assert ieee.type == MGMT_TYPE
+ assert ieee.subtype == M_BEACON
+ assert ieee.to_ds == 0
+ assert ieee.from_ds == 0
+ assert ieee.pwr_mgt == 0
+ assert ieee.more_data == 0
+ assert ieee.wep == 0
+ assert ieee.order == 0
+ assert ieee.mgmt.dst == '\xff\xff\xff\xff\xff\xff'
+ assert ieee.mgmt.src == '\x00\x26\xcb\x18\x6a\x30'
+ assert ieee.beacon.capability == 0x3104
+ assert ieee.capability.privacy == 1
+ assert ieee.ssid.data == 'CAEN'
+ assert ieee.rate.data == '\x82\x84\x8b\x0c\x12\x96\x18\x24'
+ assert ieee.ds.data == '\x01'
+ assert ieee.tim.data == '\x00\x01\x00\x00'
+ fcs = struct.unpack('I', s[-4:])[0]
+ assert ieee.fcs == fcs
+
+def test_80211_data():
+ s = '\x08\x09\x20\x00\x00\x26\xcb\x17\x3d\x91\x00\x16\x44\xb0\xae\xc6\x00\x02\xb3\xd6\x26\x3c\x80\x7e\xaa\xaa\x03\x00\x00\x00\x08\x00\x45\x00\x00\x28\x07\x27\x40\x00\x80\x06\x1d\x39\x8d\xd4\x37\x3d\x3f\xf5\xd1\x69\xc0\x5f\x01\xbb\xb2\xd6\xef\x23\x38\x2b\x4f\x08\x50\x10\x42\x04\xac\x17\x00\x00'
+ ieee = IEEE80211(s, fcs=True)
+ assert ieee.type == DATA_TYPE
+ assert ieee.subtype == D_DATA
+ assert ieee.data_frame.dst == '\x00\x02\xb3\xd6\x26\x3c'
+ assert ieee.data_frame.src == '\x00\x16\x44\xb0\xae\xc6'
+ assert ieee.data_frame.frag_seq == 0x807e
+ assert ieee.data == '\xaa\xaa\x03\x00\x00\x00\x08\x00\x45\x00\x00\x28\x07\x27\x40\x00\x80\x06\x1d\x39\x8d\xd4\x37\x3d\x3f\xf5\xd1\x69\xc0\x5f\x01\xbb\xb2\xd6\xef\x23\x38\x2b\x4f\x08\x50\x10\x42\x04'
+ assert ieee.fcs == struct.unpack('I', '\xac\x17\x00\x00')[0]
+
+ import llc, ip
+
+ llc_pkt = llc.LLC(ieee.data_frame.data)
+ ip_pkt = ip.IP(llc_pkt.data)
+ assert ip_pkt.dst == '\x3f\xf5\xd1\x69'
+
+def test_80211_data_qos():
+ s = '\x88\x01\x3a\x01\x00\x26\xcb\x17\x44\xf0\x00\x23\xdf\xc9\xc0\x93\x00\x26\xcb\x17\x44\xf0\x20\x7b\x00\x00\xaa\xaa\x03\x00\x00\x00\x88\x8e\x01\x00\x00\x74\x02\x02\x00\x74\x19\x80\x00\x00\x00\x6a\x16\x03\x01\x00\x65\x01\x00\x00\x61\x03\x01\x4b\x4c\xa7\x7e\x27\x61\x6f\x02\x7b\x3c\x72\x39\xe3\x7b\xd7\x43\x59\x91\x7f\xaa\x22\x47\x51\xb6\x88\x9f\x85\x90\x87\x5a\xd1\x13\x20\xe0\x07\x00\x00\x68\xbd\xa4\x13\xb0\xd5\x82\x7e\xc7\xfb\xe7\xcc\xab\x6e\x5d\x5a\x51\x50\xd4\x45\xc5\xa1\x65\x53\xad\xb5\x88\x5b\x00\x1a\x00\x2f\x00\x05\x00\x04\x00\x35\x00\x0a\x00\x09\x00\x03\x00\x08\x00\x33\x00\x39\x00\x16\x00\x15\x00\x14\x01\x00\xff\xff\xff\xff'
+ ieee = IEEE80211(s, fcs=True)
+ assert ieee.type == DATA_TYPE
+ assert ieee.subtype == D_QOS_DATA
+ assert ieee.data_frame.dst == '\x00\x26\xcb\x17\x44\xf0'
+ assert ieee.data_frame.src == '\x00\x23\xdf\xc9\xc0\x93'
+ assert ieee.data_frame.frag_seq == 0x207b
+ assert ieee.data == '\xaa\xaa\x03\x00\x00\x00\x88\x8e\x01\x00\x00\x74\x02\x02\x00\x74\x19\x80\x00\x00\x00\x6a\x16\x03\x01\x00\x65\x01\x00\x00\x61\x03\x01\x4b\x4c\xa7\x7e\x27\x61\x6f\x02\x7b\x3c\x72\x39\xe3\x7b\xd7\x43\x59\x91\x7f\xaa\x22\x47\x51\xb6\x88\x9f\x85\x90\x87\x5a\xd1\x13\x20\xe0\x07\x00\x00\x68\xbd\xa4\x13\xb0\xd5\x82\x7e\xc7\xfb\xe7\xcc\xab\x6e\x5d\x5a\x51\x50\xd4\x45\xc5\xa1\x65\x53\xad\xb5\x88\x5b\x00\x1a\x00\x2f\x00\x05\x00\x04\x00\x35\x00\x0a\x00\x09\x00\x03\x00\x08\x00\x33\x00\x39\x00\x16\x00\x15\x00\x14\x01\x00'
+ assert ieee.qos_data.control == 0x0
+ assert ieee.fcs == struct.unpack('I', '\xff\xff\xff\xff')[0]
+
+def test_bug():
+ s = '\x88\x41\x2c\x00\x00\x26\xcb\x17\x44\xf0\x00\x1e\x52\x97\x14\x11\x00\x1f\x6d\xe8\x18\x00\xd0\x07\x00\x00\x6f\x00\x00\x20\x00\x00\x00\x00'
+ ieee = IEEE80211(s)
+ assert ieee.wep == 1
+
+def test_data_ds():
+ # verifying the ToDS and FromDS fields and that we're getting the
+ # correct values
+
+ s = '\x08\x03\x00\x00\x01\x0b\x85\x00\x00\x00\x00\x26\xcb\x18\x73\x50\x01\x0b\x85\x00\x00\x00\x00\x89\x00\x26\xcb\x18\x73\x50'
+ ieee = IEEE80211(s)
+ assert ieee.type == DATA_TYPE
+ assert ieee.to_ds == 1
+ assert ieee.from_ds == 1
+ assert ieee.data_frame.sa == '\x00\x26\xcb\x18\x73\x50'
+ assert ieee.data_frame.src == '\x00\x26\xcb\x18\x73\x50'
+ assert ieee.data_frame.dst == '\x01\x0b\x85\x00\x00\x00'
+ assert ieee.data_frame.da == '\x01\x0b\x85\x00\x00\x00'
+
+ s = '\x88\x41\x50\x01\x00\x26\xcb\x17\x48\xc1\x00\x24\x2c\xe7\xfe\x8a\xff\xff\xff\xff\xff\xff\x80\xa0\x00\x00\x09\x1a\x00\x20\x00\x00\x00\x00'
+ ieee = IEEE80211(s)
+ assert ieee.type == DATA_TYPE
+ assert ieee.to_ds == 1
+ assert ieee.from_ds == 0
+ assert ieee.data_frame.bssid == '\x00\x26\xcb\x17\x48\xc1'
+ assert ieee.data_frame.src == '\x00\x24\x2c\xe7\xfe\x8a'
+ assert ieee.data_frame.dst == '\xff\xff\xff\xff\xff\xff'
+
+ s = '\x08\x02\x02\x01\x00\x02\x44\xac\x27\x70\x00\x1f\x33\x39\x75\x44\x00\x1f\x33\x39\x75\x44\x90\xa4'
+ ieee = IEEE80211(s)
+ assert ieee.type == DATA_TYPE
+ assert ieee.to_ds == 0
+ assert ieee.from_ds == 1
+ assert ieee.data_frame.bssid == '\x00\x1f\x33\x39\x75\x44'
+ assert ieee.data_frame.src == '\x00\x1f\x33\x39\x75\x44'
+ assert ieee.data_frame.dst == '\x00\x02\x44\xac\x27\x70'
+
+def test_compressed_block_ack():
+ s = '\x94\x00\x00\x00\x34\xc0\x59\xd6\x3f\x62\xb4\x75\x0e\x46\x83\xc1\x05\x50\x80\xee\x03\x00\x00\x00\x00\x00\x00\x00\xa2\xe4\x98\x45'
+ ieee = IEEE80211(s, fcs=True)
+ assert ieee.type == CTL_TYPE
+ assert ieee.subtype == C_BLOCK_ACK
+ assert ieee.back.dst == '\x34\xc0\x59\xd6\x3f\x62'
+ assert ieee.back.src == '\xb4\x75\x0e\x46\x83\xc1'
+ assert ieee.back.compressed == 1
+ assert len(ieee.back.bmp) == 8
+ assert ieee.back.ack_policy == 1
+ assert ieee.back.tid == 5
+
+def test_action_block_ack_request():
+ s = '\xd0\x00\x3a\x01\x00\x23\x14\x36\x52\x30\xb4\x75\x0e\x46\x83\xc1\xb4\x75\x0e\x46\x83\xc1\x70\x14\x03\x00\x0d\x02\x10\x00\x00\x40\x29\x06\x50\x33\x9e'
+ ieee = IEEE80211(s, fcs=True)
+ assert ieee.type == MGMT_TYPE
+ assert ieee.subtype == M_ACTION
+ assert ieee.action.category == BLOCK_ACK
+ assert ieee.action.code == BLOCK_ACK_CODE_REQUEST
+ assert ieee.action.block_ack_request.timeout == 0
+ parameters = struct.unpack('H', '\x10\x02')[0]
+ assert ieee.action.block_ack_request.parameters == parameters
+
+def test_action_block_ack_response():
+ s = '\xd0\x00\x3c\x00\xb4\x75\x0e\x46\x83\xc1\x00\x23\x14\x36\x52\x30\xb4\x75\x0e\x46\x83\xc1\xd0\x68\x03\x01\x0d\x00\x00\x02\x10\x88\x13\x9f\xc0\x0b\x75'
+ ieee = IEEE80211(s, fcs=True)
+ assert ieee.type == MGMT_TYPE
+ assert ieee.subtype == M_ACTION
+ assert ieee.action.category == BLOCK_ACK
+ assert ieee.action.code == BLOCK_ACK_CODE_RESPONSE
+ timeout = struct.unpack('H', '\x13\x88')[0]
+ assert ieee.action.block_ack_response.timeout == timeout
+ parameters = struct.unpack('H', '\x10\x02')[0]
+ assert ieee.action.block_ack_response.parameters == parameters
+
+if __name__ == '__main__':
+ # Runs all the test associated with this class/file
+ test_802211_ack()
+ test_80211_beacon()
+ test_80211_data()
+ test_80211_data_qos()
+ test_bug()
+ test_data_ds()
+ test_compressed_block_ack()
+ test_action_block_ack_request()
+ test_action_block_ack_response()
+ print 'Tests Successful...'
diff --git a/external_libs/python/dpkt-1.8.6.2/dpkt/igmp.py b/external_libs/python/dpkt-1.8.6.2/dpkt/igmp.py
new file mode 100644
index 00000000..5e5cb166
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/dpkt/igmp.py
@@ -0,0 +1,19 @@
+# $Id: igmp.py 23 2006-11-08 15:45:33Z dugsong $
+# -*- coding: utf-8 -*-
+"""Internet Group Management Protocol."""
+
+import dpkt
+
+
+class IGMP(dpkt.Packet):
+ __hdr__ = (
+ ('type', 'B', 0),
+ ('maxresp', 'B', 0),
+ ('sum', 'H', 0),
+ ('group', 'I', 0)
+ )
+
+ def __str__(self):
+ if not self.sum:
+ self.sum = dpkt.in_cksum(dpkt.Packet.__str__(self))
+ return dpkt.Packet.__str__(self)
diff --git a/external_libs/python/dpkt-1.8.6.2/dpkt/ip.py b/external_libs/python/dpkt-1.8.6.2/dpkt/ip.py
new file mode 100644
index 00000000..0658ff6a
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/dpkt/ip.py
@@ -0,0 +1,359 @@
+# $Id: ip.py 87 2013-03-05 19:41:04Z andrewflnr@gmail.com $
+# -*- coding: utf-8 -*-
+"""Internet Protocol."""
+
+import dpkt
+from decorators import deprecated
+
+
+class IP(dpkt.Packet):
+ __hdr__ = (
+ ('v_hl', 'B', (4 << 4) | (20 >> 2)),
+ ('tos', 'B', 0),
+ ('len', 'H', 20),
+ ('id', 'H', 0),
+ ('off', 'H', 0),
+ ('ttl', 'B', 64),
+ ('p', 'B', 0),
+ ('sum', 'H', 0),
+ ('src', '4s', '\x00' * 4),
+ ('dst', '4s', '\x00' * 4)
+ )
+ _protosw = {}
+ opts = ''
+
+ @property
+ def v(self):
+ return self.v_hl >> 4
+
+ @v.setter
+ def v(self, v):
+ self.v_hl = (v << 4) | (self.v_hl & 0xf)
+
+ @property
+ def hl(self):
+ return self.v_hl & 0xf
+
+ @hl.setter
+ def hl(self, hl):
+ self.v_hl = (self.v_hl & 0xf0) | hl
+
+ # Deprecated methods, will be removed in the future
+ # =================================================
+ @deprecated
+ def _get_v(self):
+ return self.v
+
+ @deprecated
+ def _set_v(self, v):
+ self.v = v
+
+ @deprecated
+ def _get_hl(self):
+ return self.hl
+
+ @deprecated
+ def _set_hl(self, hl):
+ self.hl = hl
+
+ # =================================================
+
+ def __len__(self):
+ return self.__hdr_len__ + len(self.opts) + len(self.data)
+
+ def __str__(self):
+ if self.sum == 0:
+ self.sum = dpkt.in_cksum(self.pack_hdr() + self.opts)
+ if (self.p == 6 or self.p == 17) and (self.off & (IP_MF | IP_OFFMASK)) == 0 and \
+ isinstance(self.data, dpkt.Packet) and self.data.sum == 0:
+ # Set zeroed TCP and UDP checksums for non-fragments.
+ p = str(self.data)
+ s = dpkt.struct.pack('>4s4sxBH', self.src, self.dst,
+ self.p, len(p))
+ s = dpkt.in_cksum_add(0, s)
+ s = dpkt.in_cksum_add(s, p)
+ self.data.sum = dpkt.in_cksum_done(s)
+ if self.p == 17 and self.data.sum == 0:
+ self.data.sum = 0xffff # RFC 768
+ # XXX - skip transports which don't need the pseudoheader
+ return self.pack_hdr() + self.opts + str(self.data)
+
+ def unpack(self, buf):
+ dpkt.Packet.unpack(self, buf)
+ ol = ((self.v_hl & 0xf) << 2) - self.__hdr_len__
+ if ol < 0:
+ raise dpkt.UnpackError, 'invalid header length'
+ self.opts = buf[self.__hdr_len__:self.__hdr_len__ + ol]
+ if self.len:
+ buf = buf[self.__hdr_len__ + ol:self.len]
+ else: # very likely due to TCP segmentation offload
+ buf = buf[self.__hdr_len__ + ol:]
+ try:
+ self.data = self._protosw[self.p](buf)
+ setattr(self, self.data.__class__.__name__.lower(), self.data)
+ except (KeyError, dpkt.UnpackError):
+ self.data = buf
+
+ @classmethod
+ def set_proto(cls, p, pktclass):
+ cls._protosw[p] = pktclass
+
+ @classmethod
+ def get_proto(cls, p):
+ return cls._protosw[p]
+
+# IP Headers
+IP_ADDR_LEN = 0x04
+IP_ADDR_BITS = 0x20
+
+IP_HDR_LEN = 0x14
+IP_OPT_LEN = 0x02
+IP_OPT_LEN_MAX = 0x28
+IP_HDR_LEN_MAX = IP_HDR_LEN + IP_OPT_LEN_MAX
+
+IP_LEN_MAX = 0xffff
+IP_LEN_MIN = IP_HDR_LEN
+
+# Reserved Addresses
+IP_ADDR_ANY = "\x00\x00\x00\x00" # 0.0.0.0
+IP_ADDR_BROADCAST = "\xff\xff\xff\xff" # 255.255.255.255
+IP_ADDR_LOOPBACK = "\x7f\x00\x00\x01" # 127.0.0.1
+IP_ADDR_MCAST_ALL = "\xe0\x00\x00\x01" # 224.0.0.1
+IP_ADDR_MCAST_LOCAL = "\xe0\x00\x00\xff" # 224.0.0.255
+
+# Type of service (ip_tos), RFC 1349 ("obsoleted by RFC 2474")
+IP_TOS_DEFAULT = 0x00 # default
+IP_TOS_LOWDELAY = 0x10 # low delay
+IP_TOS_THROUGHPUT = 0x08 # high throughput
+IP_TOS_RELIABILITY = 0x04 # high reliability
+IP_TOS_LOWCOST = 0x02 # low monetary cost - XXX
+IP_TOS_ECT = 0x02 # ECN-capable transport
+IP_TOS_CE = 0x01 # congestion experienced
+
+# IP precedence (high 3 bits of ip_tos), hopefully unused
+IP_TOS_PREC_ROUTINE = 0x00
+IP_TOS_PREC_PRIORITY = 0x20
+IP_TOS_PREC_IMMEDIATE = 0x40
+IP_TOS_PREC_FLASH = 0x60
+IP_TOS_PREC_FLASHOVERRIDE = 0x80
+IP_TOS_PREC_CRITIC_ECP = 0xa0
+IP_TOS_PREC_INTERNETCONTROL = 0xc0
+IP_TOS_PREC_NETCONTROL = 0xe0
+
+# Fragmentation flags (ip_off)
+IP_RF = 0x8000 # reserved
+IP_DF = 0x4000 # don't fragment
+IP_MF = 0x2000 # more fragments (not last frag)
+IP_OFFMASK = 0x1fff # mask for fragment offset
+
+# Time-to-live (ip_ttl), seconds
+IP_TTL_DEFAULT = 64 # default ttl, RFC 1122, RFC 1340
+IP_TTL_MAX = 255 # maximum ttl
+
+# Protocol (ip_p) - http://www.iana.org/assignments/protocol-numbers
+IP_PROTO_IP = 0 # dummy for IP
+IP_PROTO_HOPOPTS = IP_PROTO_IP # IPv6 hop-by-hop options
+IP_PROTO_ICMP = 1 # ICMP
+IP_PROTO_IGMP = 2 # IGMP
+IP_PROTO_GGP = 3 # gateway-gateway protocol
+IP_PROTO_IPIP = 4 # IP in IP
+IP_PROTO_ST = 5 # ST datagram mode
+IP_PROTO_TCP = 6 # TCP
+IP_PROTO_CBT = 7 # CBT
+IP_PROTO_EGP = 8 # exterior gateway protocol
+IP_PROTO_IGP = 9 # interior gateway protocol
+IP_PROTO_BBNRCC = 10 # BBN RCC monitoring
+IP_PROTO_NVP = 11 # Network Voice Protocol
+IP_PROTO_PUP = 12 # PARC universal packet
+IP_PROTO_ARGUS = 13 # ARGUS
+IP_PROTO_EMCON = 14 # EMCON
+IP_PROTO_XNET = 15 # Cross Net Debugger
+IP_PROTO_CHAOS = 16 # Chaos
+IP_PROTO_UDP = 17 # UDP
+IP_PROTO_MUX = 18 # multiplexing
+IP_PROTO_DCNMEAS = 19 # DCN measurement
+IP_PROTO_HMP = 20 # Host Monitoring Protocol
+IP_PROTO_PRM = 21 # Packet Radio Measurement
+IP_PROTO_IDP = 22 # Xerox NS IDP
+IP_PROTO_TRUNK1 = 23 # Trunk-1
+IP_PROTO_TRUNK2 = 24 # Trunk-2
+IP_PROTO_LEAF1 = 25 # Leaf-1
+IP_PROTO_LEAF2 = 26 # Leaf-2
+IP_PROTO_RDP = 27 # "Reliable Datagram" proto
+IP_PROTO_IRTP = 28 # Inet Reliable Transaction
+IP_PROTO_TP = 29 # ISO TP class 4
+IP_PROTO_NETBLT = 30 # Bulk Data Transfer
+IP_PROTO_MFPNSP = 31 # MFE Network Services
+IP_PROTO_MERITINP = 32 # Merit Internodal Protocol
+IP_PROTO_SEP = 33 # Sequential Exchange proto
+IP_PROTO_3PC = 34 # Third Party Connect proto
+IP_PROTO_IDPR = 35 # Interdomain Policy Route
+IP_PROTO_XTP = 36 # Xpress Transfer Protocol
+IP_PROTO_DDP = 37 # Datagram Delivery Proto
+IP_PROTO_CMTP = 38 # IDPR Ctrl Message Trans
+IP_PROTO_TPPP = 39 # TP++ Transport Protocol
+IP_PROTO_IL = 40 # IL Transport Protocol
+IP_PROTO_IP6 = 41 # IPv6
+IP_PROTO_SDRP = 42 # Source Demand Routing
+IP_PROTO_ROUTING = 43 # IPv6 routing header
+IP_PROTO_FRAGMENT = 44 # IPv6 fragmentation header
+IP_PROTO_RSVP = 46 # Reservation protocol
+IP_PROTO_GRE = 47 # General Routing Encap
+IP_PROTO_MHRP = 48 # Mobile Host Routing
+IP_PROTO_ENA = 49 # ENA
+IP_PROTO_ESP = 50 # Encap Security Payload
+IP_PROTO_AH = 51 # Authentication Header
+IP_PROTO_INLSP = 52 # Integated Net Layer Sec
+IP_PROTO_SWIPE = 53 # SWIPE
+IP_PROTO_NARP = 54 # NBMA Address Resolution
+IP_PROTO_MOBILE = 55 # Mobile IP, RFC 2004
+IP_PROTO_TLSP = 56 # Transport Layer Security
+IP_PROTO_SKIP = 57 # SKIP
+IP_PROTO_ICMP6 = 58 # ICMP for IPv6
+IP_PROTO_NONE = 59 # IPv6 no next header
+IP_PROTO_DSTOPTS = 60 # IPv6 destination options
+IP_PROTO_ANYHOST = 61 # any host internal proto
+IP_PROTO_CFTP = 62 # CFTP
+IP_PROTO_ANYNET = 63 # any local network
+IP_PROTO_EXPAK = 64 # SATNET and Backroom EXPAK
+IP_PROTO_KRYPTOLAN = 65 # Kryptolan
+IP_PROTO_RVD = 66 # MIT Remote Virtual Disk
+IP_PROTO_IPPC = 67 # Inet Pluribus Packet Core
+IP_PROTO_DISTFS = 68 # any distributed fs
+IP_PROTO_SATMON = 69 # SATNET Monitoring
+IP_PROTO_VISA = 70 # VISA Protocol
+IP_PROTO_IPCV = 71 # Inet Packet Core Utility
+IP_PROTO_CPNX = 72 # Comp Proto Net Executive
+IP_PROTO_CPHB = 73 # Comp Protocol Heart Beat
+IP_PROTO_WSN = 74 # Wang Span Network
+IP_PROTO_PVP = 75 # Packet Video Protocol
+IP_PROTO_BRSATMON = 76 # Backroom SATNET Monitor
+IP_PROTO_SUNND = 77 # SUN ND Protocol
+IP_PROTO_WBMON = 78 # WIDEBAND Monitoring
+IP_PROTO_WBEXPAK = 79 # WIDEBAND EXPAK
+IP_PROTO_EON = 80 # ISO CNLP
+IP_PROTO_VMTP = 81 # Versatile Msg Transport
+IP_PROTO_SVMTP = 82 # Secure VMTP
+IP_PROTO_VINES = 83 # VINES
+IP_PROTO_TTP = 84 # TTP
+IP_PROTO_NSFIGP = 85 # NSFNET-IGP
+IP_PROTO_DGP = 86 # Dissimilar Gateway Proto
+IP_PROTO_TCF = 87 # TCF
+IP_PROTO_EIGRP = 88 # EIGRP
+IP_PROTO_OSPF = 89 # Open Shortest Path First
+IP_PROTO_SPRITERPC = 90 # Sprite RPC Protocol
+IP_PROTO_LARP = 91 # Locus Address Resolution
+IP_PROTO_MTP = 92 # Multicast Transport Proto
+IP_PROTO_AX25 = 93 # AX.25 Frames
+IP_PROTO_IPIPENCAP = 94 # yet-another IP encap
+IP_PROTO_MICP = 95 # Mobile Internet Ctrl
+IP_PROTO_SCCSP = 96 # Semaphore Comm Sec Proto
+IP_PROTO_ETHERIP = 97 # Ethernet in IPv4
+IP_PROTO_ENCAP = 98 # encapsulation header
+IP_PROTO_ANYENC = 99 # private encryption scheme
+IP_PROTO_GMTP = 100 # GMTP
+IP_PROTO_IFMP = 101 # Ipsilon Flow Mgmt Proto
+IP_PROTO_PNNI = 102 # PNNI over IP
+IP_PROTO_PIM = 103 # Protocol Indep Multicast
+IP_PROTO_ARIS = 104 # ARIS
+IP_PROTO_SCPS = 105 # SCPS
+IP_PROTO_QNX = 106 # QNX
+IP_PROTO_AN = 107 # Active Networks
+IP_PROTO_IPCOMP = 108 # IP Payload Compression
+IP_PROTO_SNP = 109 # Sitara Networks Protocol
+IP_PROTO_COMPAQPEER = 110 # Compaq Peer Protocol
+IP_PROTO_IPXIP = 111 # IPX in IP
+IP_PROTO_VRRP = 112 # Virtual Router Redundancy
+IP_PROTO_PGM = 113 # PGM Reliable Transport
+IP_PROTO_ANY0HOP = 114 # 0-hop protocol
+IP_PROTO_L2TP = 115 # Layer 2 Tunneling Proto
+IP_PROTO_DDX = 116 # D-II Data Exchange (DDX)
+IP_PROTO_IATP = 117 # Interactive Agent Xfer
+IP_PROTO_STP = 118 # Schedule Transfer Proto
+IP_PROTO_SRP = 119 # SpectraLink Radio Proto
+IP_PROTO_UTI = 120 # UTI
+IP_PROTO_SMP = 121 # Simple Message Protocol
+IP_PROTO_SM = 122 # SM
+IP_PROTO_PTP = 123 # Performance Transparency
+IP_PROTO_ISIS = 124 # ISIS over IPv4
+IP_PROTO_FIRE = 125 # FIRE
+IP_PROTO_CRTP = 126 # Combat Radio Transport
+IP_PROTO_CRUDP = 127 # Combat Radio UDP
+IP_PROTO_SSCOPMCE = 128 # SSCOPMCE
+IP_PROTO_IPLT = 129 # IPLT
+IP_PROTO_SPS = 130 # Secure Packet Shield
+IP_PROTO_PIPE = 131 # Private IP Encap in IP
+IP_PROTO_SCTP = 132 # Stream Ctrl Transmission
+IP_PROTO_FC = 133 # Fibre Channel
+IP_PROTO_RSVPIGN = 134 # RSVP-E2E-IGNORE
+IP_PROTO_RAW = 255 # Raw IP packets
+IP_PROTO_RESERVED = IP_PROTO_RAW # Reserved
+IP_PROTO_MAX = 255
+
+# XXX - auto-load IP dispatch table from IP_PROTO_* definitions
+
+
+def __load_protos():
+ g = globals()
+ for k, v in g.iteritems():
+ if k.startswith('IP_PROTO_'):
+ name = k[9:].lower()
+ try:
+ mod = __import__(name, g)
+ except ImportError:
+ continue
+ IP.set_proto(v, getattr(mod, name.upper()))
+
+
+if not IP._protosw:
+ __load_protos()
+
+
+def test_ip():
+ import udp
+
+ s = 'E\x00\x00"\x00\x00\x00\x00@\x11r\xc0\x01\x02\x03\x04\x01\x02\x03\x04\x00o\x00\xde\x00\x0e\xbf5foobar'
+ ip = IP(id=0, src='\x01\x02\x03\x04', dst='\x01\x02\x03\x04', p=17)
+ u = udp.UDP(sport=111, dport=222)
+ u.data = 'foobar'
+ u.ulen += len(u.data)
+ ip.data = u
+ ip.len += len(u)
+ assert (str(ip) == s)
+
+ ip = IP(s)
+ assert (str(ip) == s)
+ assert (ip.udp.sport == 111)
+ assert (ip.udp.data == 'foobar')
+
+
+def test_hl(): # Todo chack this test method
+ s = 'BB\x03\x00\x00\x00\x00\x00\x00\x00\xd0\x00\xec\xbc\xa5\x00\x00\x00\x03\x80\x00\x00\xd0\x01\xf2\xac\xa5"0\x01\x00\x14\x00\x02\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00'
+ try:
+ IP(s)
+ except dpkt.UnpackError:
+ pass
+
+
+def test_opt():
+ s = '\x4f\x00\x00\x50\xae\x08\x00\x00\x40\x06\x17\xfc\xc0\xa8\x0a\x26\xc0\xa8\x0a\x01\x07\x27\x08\x01\x02\x03\x04\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'
+ ip = IP(s)
+ ip.sum = 0
+ assert (str(ip) == s)
+
+
+def test_zerolen():
+ import tcp
+ d = 'X' * 2048
+ s = 'E\x00\x00\x004\xce@\x00\x80\x06\x00\x00\x7f\x00\x00\x01\x7f\x00\x00\x01\xccN\x0c8`\xff\xc6N_\x8a\x12\x98P\x18@):\xa3\x00\x00' + d
+ ip = IP(s)
+ assert (isinstance(ip.data, tcp.TCP))
+ assert (ip.tcp.data == d)
+
+
+if __name__ == '__main__':
+ test_ip()
+ test_hl()
+ test_opt()
+ test_zerolen()
+ print 'Tests Successful...'
diff --git a/external_libs/python/dpkt-1.8.6.2/dpkt/ip6.py b/external_libs/python/dpkt-1.8.6.2/dpkt/ip6.py
new file mode 100644
index 00000000..099abfcb
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/dpkt/ip6.py
@@ -0,0 +1,383 @@
+# $Id: ip6.py 87 2013-03-05 19:41:04Z andrewflnr@gmail.com $
+# -*- coding: utf-8 -*-
+"""Internet Protocol, version 6."""
+
+import dpkt
+from decorators import deprecated
+
+
+class IP6(dpkt.Packet):
+ __hdr__ = (
+ ('v_fc_flow', 'I', 0x60000000L),
+ ('plen', 'H', 0), # payload length (not including header)
+ ('nxt', 'B', 0), # next header protocol
+ ('hlim', 'B', 0), # hop limit
+ ('src', '16s', ''),
+ ('dst', '16s', '')
+ )
+
+ # XXX - to be shared with IP. We cannot refer to the ip module
+ # right now because ip.__load_protos() expects the IP6 class to be
+ # defined.
+ _protosw = None
+
+ @property
+ def v(self):
+ return self.v_fc_flow >> 28
+
+ @v.setter
+ def v(self, v):
+ self.v_fc_flow = (self.v_fc_flow & ~0xf0000000L) | (v << 28)
+
+ @property
+ def fc(self):
+ return (self.v_fc_flow >> 20) & 0xff
+
+ @fc.setter
+ def fc(self, v):
+ self.v_fc_flow = (self.v_fc_flow & ~0xff00000L) | (v << 20)
+
+ @property
+ def flow(self):
+ return self.v_fc_flow & 0xfffff
+
+ @flow.setter
+ def flow(self, v):
+ self.v_fc_flow = (self.v_fc_flow & ~0xfffff) | (v & 0xfffff)
+
+
+ # Deprecated methods, will be removed in the future
+ # =================================================
+ @deprecated
+ def _get_v(self):
+ return self.v
+
+ @deprecated
+ def _set_v(self, v):
+ self.v = v
+
+ @deprecated
+ def _get_fc(self):
+ return self.fc
+
+ @deprecated
+ def _set_fc(self, v):
+ self.rc = v
+
+ @deprecated
+ def _get_flow(self):
+ return self.flow
+
+ @deprecated
+ def _set_flow(self, v):
+ self.flow = v
+
+ # =================================================
+
+ def unpack(self, buf):
+ dpkt.Packet.unpack(self, buf)
+ self.extension_hdrs = dict(((i, None) for i in ext_hdrs))
+
+ if self.plen:
+ buf = self.data[:self.plen]
+ else: # due to jumbo payload or TSO
+ buf = self.data
+
+ next = self.nxt
+
+ while next in ext_hdrs:
+ ext = ext_hdrs_cls[next](buf)
+ self.extension_hdrs[next] = ext
+ buf = buf[ext.length:]
+ next = ext.nxt
+
+ # set the payload protocol id
+ setattr(self, 'p', next)
+
+ try:
+ self.data = self._protosw[next](buf)
+ setattr(self, self.data.__class__.__name__.lower(), self.data)
+ except (KeyError, dpkt.UnpackError):
+ self.data = buf
+
+ def headers_str(self):
+ """Output extension headers in order defined in RFC1883 (except dest opts)"""
+
+ header_str = ""
+
+ for hdr in ext_hdrs:
+ if not self.extension_hdrs[hdr] is None:
+ header_str += str(self.extension_hdrs[hdr])
+ return header_str
+
+ def __str__(self):
+ if (self.nxt == 6 or self.nxt == 17 or self.nxt == 58) and not self.data.sum:
+ # XXX - set TCP, UDP, and ICMPv6 checksums
+ p = str(self.data)
+ s = dpkt.struct.pack('>16s16sxBH', self.src, self.dst, self.nxt, len(p))
+ s = dpkt.in_cksum_add(0, s)
+ s = dpkt.in_cksum_add(s, p)
+ try:
+ self.data.sum = dpkt.in_cksum_done(s)
+ except AttributeError:
+ pass
+ return self.pack_hdr() + self.headers_str() + str(self.data)
+
+ @classmethod
+ def set_proto(cls, p, pktclass):
+ cls._protosw[p] = pktclass
+
+ @classmethod
+ def get_proto(cls, p):
+ return cls._protosw[p]
+
+
+import ip
+# We are most likely still in the middle of ip.__load_protos() which
+# implicitly loads this module through __import__(), so the content of
+# ip.IP._protosw is still incomplete at the moment. By sharing the
+# same dictionary by reference as opposed to making a copy, when
+# ip.__load_protos() finishes, we will also automatically get the most
+# up-to-date dictionary.
+IP6._protosw = ip.IP._protosw
+
+
+class IP6ExtensionHeader(dpkt.Packet):
+ """
+ An extension header is very similar to a 'sub-packet'.
+ We just want to re-use all the hdr unpacking etc.
+ """
+ pass
+
+
+class IP6OptsHeader(IP6ExtensionHeader):
+ __hdr__ = (
+ ('nxt', 'B', 0), # next extension header protocol
+ ('len', 'B', 0) # option data length in 8 octect units (ignoring first 8 octets) so, len 0 == 64bit header
+ )
+
+ def unpack(self, buf):
+ dpkt.Packet.unpack(self, buf)
+ setattr(self, 'length', (self.len + 1) * 8)
+ options = []
+
+ index = 0
+
+ while index < self.length - 2:
+ opt_type = ord(self.data[index])
+
+ # PAD1 option
+ if opt_type == 0:
+ index += 1
+ continue
+
+ opt_length = ord(self.data[index + 1])
+
+ if opt_type == 1: # PADN option
+ # PADN uses opt_length bytes in total
+ index += opt_length + 2
+ continue
+
+ options.append(
+ {'type': opt_type, 'opt_length': opt_length, 'data': self.data[index + 2:index + 2 + opt_length]})
+
+ # add the two chars and the option_length, to move to the next option
+ index += opt_length + 2
+
+ setattr(self, 'options', options)
+
+
+class IP6HopOptsHeader(IP6OptsHeader): pass
+
+
+class IP6DstOptsHeader(IP6OptsHeader): pass
+
+
+class IP6RoutingHeader(IP6ExtensionHeader):
+ __hdr__ = (
+ ('nxt', 'B', 0), # next extension header protocol
+ ('len', 'B', 0), # extension data length in 8 octect units (ignoring first 8 octets) (<= 46 for type 0)
+ ('type', 'B', 0), # routing type (currently, only 0 is used)
+ ('segs_left', 'B', 0), # remaining segments in route, until destination (<= 23)
+ ('rsvd_sl_bits', 'I', 0), # reserved (1 byte), strict/loose bitmap for addresses
+ )
+
+ @property
+ def sl_bits(self):
+ return self.rsvd_sl_bits & 0xffffff
+
+ @sl_bits.setter
+ def sl_bits(self, v):
+ self.rsvd_sl_bits = (self.rsvd_sl_bits & ~0xfffff) | (v & 0xfffff)
+
+ # Deprecated methods, will be removed in the future
+ # =================================================
+ def _get_sl_bits(self): return self.sl_bits
+
+ def _set_sl_bits(self, v): self.sl_bits = v
+
+ # =================================================
+
+ def unpack(self, buf):
+ hdr_size = 8
+ addr_size = 16
+
+ dpkt.Packet.unpack(self, buf)
+
+ addresses = []
+ num_addresses = self.len / 2
+ buf = buf[hdr_size:hdr_size + num_addresses * addr_size]
+
+ for i in range(num_addresses):
+ addresses.append(buf[i * addr_size: i * addr_size + addr_size])
+
+ self.data = buf
+ setattr(self, 'addresses', addresses)
+ setattr(self, 'length', self.len * 8 + 8)
+
+
+class IP6FragmentHeader(IP6ExtensionHeader):
+ __hdr__ = (
+ ('nxt', 'B', 0), # next extension header protocol
+ ('resv', 'B', 0), # reserved, set to 0
+ ('frag_off_resv_m', 'H', 0), # frag offset (13 bits), reserved zero (2 bits), More frags flag
+ ('id', 'I', 0) # fragments id
+ )
+
+ def unpack(self, buf):
+ dpkt.Packet.unpack(self, buf)
+ setattr(self, 'length', self.__hdr_len__)
+
+ @property
+ def frag_off(self):
+ return self.frag_off_resv_m >> 3
+
+ @frag_off.setter
+ def frag_off(self, v):
+ self.frag_off_resv_m = (self.frag_off_resv_m & ~0xfff8) | (v << 3)
+
+ @property
+ def m_flag(self):
+ return self.frag_off_resv_m & 1
+
+ @m_flag.setter
+ def m_flag(self, v):
+ self.frag_off_resv_m = (self.frag_off_resv_m & ~0xfffe) | v
+
+ # Deprecated methods, will be removed in the future
+ # =================================================
+ @deprecated
+ def _get_frag_off(self): return self.flag_off
+
+ @deprecated
+ def _set_frag_off(self, v): self.flag_off = v
+
+ @deprecated
+ def _get_m_flag(self): return self.m_flag
+
+ @deprecated
+ def _set_m_flag(self, v): self.m_flag = v
+
+ # =================================================
+
+
+class IP6AHHeader(IP6ExtensionHeader):
+ __hdr__ = (
+ ('nxt', 'B', 0), # next extension header protocol
+ ('len', 'B', 0), # length of header in 4 octet units (ignoring first 2 units)
+ ('resv', 'H', 0), # reserved, 2 bytes of 0
+ ('spi', 'I', 0), # SPI security parameter index
+ ('seq', 'I', 0) # sequence no.
+ )
+
+ def unpack(self, buf):
+ dpkt.Packet.unpack(self, buf)
+ setattr(self, 'length', (self.len + 2) * 4)
+ setattr(self, 'auth_data', self.data[:(self.len - 1) * 4])
+
+
+class IP6ESPHeader(IP6ExtensionHeader):
+ def unpack(self, buf):
+ raise NotImplementedError("ESP extension headers are not supported.")
+
+
+ext_hdrs = [ip.IP_PROTO_HOPOPTS, ip.IP_PROTO_ROUTING, ip.IP_PROTO_FRAGMENT, ip.IP_PROTO_AH, ip.IP_PROTO_ESP,
+ ip.IP_PROTO_DSTOPTS]
+ext_hdrs_cls = {ip.IP_PROTO_HOPOPTS: IP6HopOptsHeader,
+ ip.IP_PROTO_ROUTING: IP6RoutingHeader,
+ ip.IP_PROTO_FRAGMENT: IP6FragmentHeader,
+ ip.IP_PROTO_ESP: IP6ESPHeader,
+ ip.IP_PROTO_AH: IP6AHHeader,
+ ip.IP_PROTO_DSTOPTS: IP6DstOptsHeader}
+
+
+def test_ipg():
+ s = '`\x00\x00\x00\x00(\x06@\xfe\x80\x00\x00\x00\x00\x00\x00\x02\x11$\xff\xfe\x8c\x11\xde\xfe\x80\x00\x00\x00\x00\x00\x00\x02\xb0\xd0\xff\xfe\xe1\x80r\xcd\xca\x00\x16\x04\x84F\xd5\x00\x00\x00\x00\xa0\x02\xff\xff\xf8\t\x00\x00\x02\x04\x05\xa0\x01\x03\x03\x00\x01\x01\x08\n}\x185?\x00\x00\x00\x00'
+ _ip = IP6(s)
+ # print `ip`
+ _ip.data.sum = 0
+ s2 = str(_ip)
+ IP6(s)
+ # print `ip2`
+ assert (s == s2)
+
+
+def test_ip6_routing_header():
+ s = '`\x00\x00\x00\x00<+@ H\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xde\xca G\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xca\xfe\x06\x04\x00\x02\x00\x00\x00\x00 \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xde\xca "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xde\xca\x00\x14\x00P\x00\x00\x00\x00\x00\x00\x00\x00P\x02 \x00\x91\x7f\x00\x00'
+ ip = IP6(s)
+ s2 = str(ip)
+ # 43 is Routing header id
+ assert (len(ip.extension_hdrs[43].addresses) == 2)
+ assert (ip.tcp)
+ assert (s == s2)
+
+
+def test_ip6_fragment_header():
+ s = '\x06\xee\xff\xfb\x00\x00\xff\xff'
+ fh = IP6FragmentHeader(s)
+ # s2 = str(fh) variable 's2' is not used
+ str(fh)
+ assert (fh.nxt == 6)
+ assert (fh.id == 65535)
+ assert (fh.frag_off == 8191)
+ assert (fh.m_flag == 1)
+
+
+def test_ip6_options_header():
+ s = ';\x04\x01\x02\x00\x00\xc9\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\xc2\x04\x00\x00\x00\x00\x05\x02\x00\x00\x01\x02\x00\x00'
+ options = IP6OptsHeader(s).options
+ assert (len(options) == 3)
+
+
+def test_ip6_ah_header():
+ s = ';\x04\x00\x00\x02\x02\x02\x02\x01\x01\x01\x01\x78\x78\x78\x78\x78\x78\x78\x78'
+ ah = IP6AHHeader(s)
+ assert (ah.length == 24)
+ assert (ah.auth_data == 'xxxxxxxx')
+ assert (ah.spi == 0x2020202)
+ assert (ah.seq == 0x1010101)
+
+
+def test_ip6_extension_headers():
+ p = '`\x00\x00\x00\x00<+@ H\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xde\xca G\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xca\xfe\x06\x04\x00\x02\x00\x00\x00\x00 \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xde\xca "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xde\xca\x00\x14\x00P\x00\x00\x00\x00\x00\x00\x00\x00P\x02 \x00\x91\x7f\x00\x00'
+ ip = IP6(p)
+ o = ';\x04\x01\x02\x00\x00\xc9\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\xc2\x04\x00\x00\x00\x00\x05\x02\x00\x00\x01\x02\x00\x00'
+ options = IP6HopOptsHeader(o)
+ ip.extension_hdrs[0] = options
+ fh = '\x06\xee\xff\xfb\x00\x00\xff\xff'
+ ip.extension_hdrs[44] = IP6FragmentHeader(fh)
+ ah = ';\x04\x00\x00\x02\x02\x02\x02\x01\x01\x01\x01\x78\x78\x78\x78\x78\x78\x78\x78'
+ ip.extension_hdrs[51] = IP6AHHeader(ah)
+ do = ';\x02\x01\x02\x00\x00\xc9\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'
+ ip.extension_hdrs[60] = IP6DstOptsHeader(do)
+ assert (len([k for k in ip.extension_hdrs if (not ip.extension_hdrs[k] is None)]) == 5)
+
+
+if __name__ == '__main__':
+ test_ipg()
+ test_ip6_routing_header()
+ test_ip6_fragment_header()
+ test_ip6_options_header()
+ test_ip6_ah_header()
+ test_ip6_extension_headers()
+ print 'Tests Successful...' \ No newline at end of file
diff --git a/external_libs/python/dpkt-1.8.6.2/dpkt/ipx.py b/external_libs/python/dpkt-1.8.6.2/dpkt/ipx.py
new file mode 100644
index 00000000..b95ff0d9
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/dpkt/ipx.py
@@ -0,0 +1,18 @@
+# $Id: ipx.py 23 2006-11-08 15:45:33Z dugsong $
+# -*- coding: utf-8 -*-
+"""Internetwork Packet Exchange."""
+
+import dpkt
+
+IPX_HDR_LEN = 30
+
+
+class IPX(dpkt.Packet):
+ __hdr__ = (
+ ('sum', 'H', 0xffff),
+ ('len', 'H', IPX_HDR_LEN),
+ ('tc', 'B', 0),
+ ('pt', 'B', 0),
+ ('dst', '12s', ''),
+ ('src', '12s', '')
+ )
diff --git a/external_libs/python/dpkt-1.8.6.2/dpkt/llc.py b/external_libs/python/dpkt-1.8.6.2/dpkt/llc.py
new file mode 100644
index 00000000..ce7429f6
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/dpkt/llc.py
@@ -0,0 +1,56 @@
+# -*- coding: utf-8 -*-
+
+import struct
+import dpkt
+import stp
+import ethernet
+
+
+class LLC(dpkt.Packet):
+ _typesw = {}
+
+ def _unpack_data(self, buf):
+ if self.type == ethernet.ETH_TYPE_8021Q:
+ self.tag, self.type = struct.unpack('>HH', buf[:4])
+ buf = buf[4:]
+ elif self.type == ethernet.ETH_TYPE_MPLS or self.type == ethernet.ETH_TYPE_MPLS_MCAST:
+ # XXX - skip labels
+ for i in range(24):
+ if struct.unpack('>I', buf[i:i + 4])[0] & 0x0100: # MPLS_STACK_BOTTOM
+ break
+ self.type = ethernet.ETH_TYPE_IP
+ buf = buf[(i + 1) * 4:]
+ try:
+ self.data = self._typesw[self.type](buf)
+ setattr(self, self.data.__class__.__name__.lower(), self.data)
+ except (KeyError, dpkt.UnpackError):
+ self.data = buf
+
+ def unpack(self, buf):
+ self.data = buf
+ if self.data.startswith('\xaa\xaa'):
+ # SNAP
+ self.type = struct.unpack('>H', self.data[6:8])[0]
+ self._unpack_data(self.data[8:])
+ else:
+ # non-SNAP
+ dsap = ord(self.data[0])
+ if dsap == 0x06: # SAP_IP
+ self.data = self.ip = self._typesw[ethernet.ETH_TYPE_IP](self.data[3:])
+ elif dsap == 0x10 or dsap == 0xe0: # SAP_NETWARE{1,2}
+ self.data = self.ipx = self._typesw[ethernet.ETH_TYPE_IPX](self.data[3:])
+ elif dsap == 0x42: # SAP_STP
+ self.data = self.stp = stp.STP(self.data[3:])
+
+
+def test_llc():
+ s = '\xaa\xaa\x03\x00\x00\x00\x08\x00\x45\x00\x00\x28\x07\x27\x40\x00\x80\x06\x1d\x39\x8d\xd4\x37\x3d\x3f\xf5\xd1\x69\xc0\x5f\x01\xbb\xb2\xd6\xef\x23\x38\x2b\x4f\x08\x50\x10\x42\x04\xac\x17\x00\x00'
+ import ip
+ llc_pkt = LLC(s)
+ ip_pkt = ip.IP(llc_pkt.data)
+ assert (llc_pkt.type == ethernet.ETH_TYPE_IP)
+ assert (ip_pkt.dst == '\x3f\xf5\xd1\x69')
+
+if __name__ == '__main__':
+ test_llc()
+ print 'Tests Successful...' \ No newline at end of file
diff --git a/external_libs/python/dpkt-1.8.6.2/dpkt/loopback.py b/external_libs/python/dpkt-1.8.6.2/dpkt/loopback.py
new file mode 100644
index 00000000..5bf24bf5
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/dpkt/loopback.py
@@ -0,0 +1,25 @@
+# $Id: loopback.py 38 2007-03-17 03:33:16Z dugsong $
+# -*- coding: utf-8 -*-
+"""Platform-dependent loopback header."""
+
+import dpkt
+import ethernet
+import ip
+import ip6
+
+
+class Loopback(dpkt.Packet):
+ __hdr__ = (('family', 'I', 0), )
+ __byte_order__ = '@'
+
+ def unpack(self, buf):
+ dpkt.Packet.unpack(self, buf)
+ if self.family == 2:
+ self.data = ip.IP(self.data)
+ elif self.family == 0x02000000:
+ self.family = 2
+ self.data = ip.IP(self.data)
+ elif self.family in (24, 28, 30):
+ self.data = ip6.IP6(self.data)
+ elif self.family > 1500:
+ self.data = ethernet.Ethernet(self.data)
diff --git a/external_libs/python/dpkt-1.8.6.2/dpkt/mrt.py b/external_libs/python/dpkt-1.8.6.2/dpkt/mrt.py
new file mode 100644
index 00000000..aa1dc78a
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/dpkt/mrt.py
@@ -0,0 +1,96 @@
+# $Id: mrt.py 29 2007-01-26 02:29:07Z jon.oberheide $
+# -*- coding: utf-8 -*-
+"""Multi-threaded Routing Toolkit."""
+
+import dpkt
+import bgp
+
+# Multi-threaded Routing Toolkit
+# http://www.ietf.org/internet-drafts/draft-ietf-grow-mrt-03.txt
+
+# MRT Types
+NULL = 0
+START = 1
+DIE = 2
+I_AM_DEAD = 3
+PEER_DOWN = 4
+BGP = 5 # Deprecated by BGP4MP
+RIP = 6
+IDRP = 7
+RIPNG = 8
+BGP4PLUS = 9 # Deprecated by BGP4MP
+BGP4PLUS_01 = 10 # Deprecated by BGP4MP
+OSPF = 11
+TABLE_DUMP = 12
+BGP4MP = 16
+BGP4MP_ET = 17
+ISIS = 32
+ISIS_ET = 33
+OSPF_ET = 64
+
+# BGP4MP Subtypes
+BGP4MP_STATE_CHANGE = 0
+BGP4MP_MESSAGE = 1
+BGP4MP_ENTRY = 2
+BGP4MP_SNAPSHOT = 3
+BGP4MP_MESSAGE_32BIT_AS = 4
+
+# Address Family Types
+AFI_IPv4 = 1
+AFI_IPv6 = 2
+
+
+class MRTHeader(dpkt.Packet):
+ __hdr__ = (
+ ('ts', 'I', 0),
+ ('type', 'H', 0),
+ ('subtype', 'H', 0),
+ ('len', 'I', 0)
+ )
+
+
+class TableDump(dpkt.Packet):
+ __hdr__ = (
+ ('view', 'H', 0),
+ ('seq', 'H', 0),
+ ('prefix', 'I', 0),
+ ('prefix_len', 'B', 0),
+ ('status', 'B', 1),
+ ('originated_ts', 'I', 0),
+ ('peer_ip', 'I', 0),
+ ('peer_as', 'H', 0),
+ ('attr_len', 'H', 0)
+ )
+
+ def unpack(self, buf):
+ dpkt.Packet.unpack(self, buf)
+ plen = self.attr_len
+ l = []
+ while plen > 0:
+ attr = bgp.BGP.Update.Attribute(self.data)
+ self.data = self.data[len(attr):]
+ plen -= len(attr)
+ l.append(attr)
+ self.attributes = l
+
+
+class BGP4MPMessage(dpkt.Packet):
+ __hdr__ = (
+ ('src_as', 'H', 0),
+ ('dst_as', 'H', 0),
+ ('intf', 'H', 0),
+ ('family', 'H', AFI_IPv4),
+ ('src_ip', 'I', 0),
+ ('dst_ip', 'I', 0)
+ )
+
+
+class BGP4MPMessage_32(dpkt.Packet):
+ __hdr__ = (
+ ('src_as', 'I', 0),
+ ('dst_as', 'I', 0),
+ ('intf', 'H', 0),
+ ('family', 'H', AFI_IPv4),
+ ('src_ip', 'I', 0),
+ ('dst_ip', 'I', 0)
+ )
diff --git a/external_libs/python/dpkt-1.8.6.2/dpkt/netbios.py b/external_libs/python/dpkt-1.8.6.2/dpkt/netbios.py
new file mode 100644
index 00000000..54586327
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/dpkt/netbios.py
@@ -0,0 +1,166 @@
+# $Id: netbios.py 23 2006-11-08 15:45:33Z dugsong $
+# -*- coding: utf-8 -*-
+"""Network Basic Input/Output System."""
+
+import struct
+import dpkt
+import dns
+
+
+def encode_name(name):
+ """Return the NetBIOS first-level encoded name."""
+ l = []
+ for c in struct.pack('16s', name):
+ c = ord(c)
+ l.append(chr((c >> 4) + 0x41))
+ l.append(chr((c & 0xf) + 0x41))
+ return ''.join(l)
+
+
+def decode_name(nbname):
+ """Return the NetBIOS first-level decoded nbname."""
+ if len(nbname) != 32:
+ return nbname
+ l = []
+ for i in range(0, 32, 2):
+ l.append(chr(((ord(nbname[i]) - 0x41) << 4) |
+ ((ord(nbname[i + 1]) - 0x41) & 0xf)))
+ return ''.join(l).split('\x00', 1)[0]
+
+# RR types
+NS_A = 0x01 # IP address
+NS_NS = 0x02 # Name Server
+NS_NULL = 0x0A # NULL
+NS_NB = 0x20 # NetBIOS general Name Service
+NS_NBSTAT = 0x21 # NetBIOS NODE STATUS
+
+# RR classes
+NS_IN = 1
+
+# NBSTAT name flags
+NS_NAME_G = 0x8000 # group name (as opposed to unique)
+NS_NAME_DRG = 0x1000 # deregister
+NS_NAME_CNF = 0x0800 # conflict
+NS_NAME_ACT = 0x0400 # active
+NS_NAME_PRM = 0x0200 # permanent
+
+# NBSTAT service names
+nbstat_svcs = {
+ # (service, unique): list of ordered (name prefix, service name) tuples
+ (0x00, 0): [('', 'Domain Name')],
+ (0x00, 1): [('IS~', 'IIS'), ('', 'Workstation Service')],
+ (0x01, 0): [('__MSBROWSE__', 'Master Browser')],
+ (0x01, 1): [('', 'Messenger Service')],
+ (0x03, 1): [('', 'Messenger Service')],
+ (0x06, 1): [('', 'RAS Server Service')],
+ (0x1B, 1): [('', 'Domain Master Browser')],
+ (0x1C, 0): [('INet~Services', 'IIS'), ('', 'Domain Controllers')],
+ (0x1D, 1): [('', 'Master Browser')],
+ (0x1E, 0): [('', 'Browser Service Elections')],
+ (0x1F, 1): [('', 'NetDDE Service')],
+ (0x20, 1): [('Forte_$ND800ZA', 'DCA IrmaLan Gateway Server Service'),
+ ('', 'File Server Service')],
+ (0x21, 1): [('', 'RAS Client Service')],
+ (0x22, 1): [('', 'Microsoft Exchange Interchange(MSMail Connector)')],
+ (0x23, 1): [('', 'Microsoft Exchange Store')],
+ (0x24, 1): [('', 'Microsoft Exchange Directory')],
+ (0x2B, 1): [('', 'Lotus Notes Server Service')],
+ (0x2F, 0): [('IRISMULTICAST', 'Lotus Notes')],
+ (0x30, 1): [('', 'Modem Sharing Server Service')],
+ (0x31, 1): [('', 'Modem Sharing Client Service')],
+ (0x33, 0): [('IRISNAMESERVER', 'Lotus Notes')],
+ (0x43, 1): [('', 'SMS Clients Remote Control')],
+ (0x44, 1): [('', 'SMS Administrators Remote Control Tool')],
+ (0x45, 1): [('', 'SMS Clients Remote Chat')],
+ (0x46, 1): [('', 'SMS Clients Remote Transfer')],
+ (0x4C, 1): [('', 'DEC Pathworks TCPIP service on Windows NT')],
+ (0x52, 1): [('', 'DEC Pathworks TCPIP service on Windows NT')],
+ (0x87, 1): [('', 'Microsoft Exchange MTA')],
+ (0x6A, 1): [('', 'Microsoft Exchange IMC')],
+ (0xBE, 1): [('', 'Network Monitor Agent')],
+ (0xBF, 1): [('', 'Network Monitor Application')]
+}
+
+
+def node_to_service_name((name, service, flags)):
+ try:
+ unique = int(flags & NS_NAME_G == 0)
+ for namepfx, svcname in nbstat_svcs[(service, unique)]:
+ if name.startswith(namepfx):
+ return svcname
+ except KeyError:
+ pass
+ return ''
+
+
+class NS(dns.DNS):
+ """NetBIOS Name Service."""
+
+ class Q(dns.DNS.Q):
+ pass
+
+ class RR(dns.DNS.RR):
+ """NetBIOS resource record."""
+
+ def unpack_rdata(self, buf, off):
+ if self.type == NS_A:
+ self.ip = self.rdata
+ elif self.type == NS_NBSTAT:
+ num = ord(self.rdata[0])
+ off = 1
+ l = []
+ for i in range(num):
+ name = self.rdata[off:off + 15].split(None, 1)[0].split('\x00', 1)[0]
+ service = ord(self.rdata[off + 15])
+ off += 16
+ flags = struct.unpack('>H', self.rdata[off:off + 2])[0]
+ off += 2
+ l.append((name, service, flags))
+ self.nodenames = l
+ # XXX - skip stats
+
+ def pack_name(self, buf, name):
+ return dns.DNS.pack_name(self, buf, encode_name(name))
+
+ def unpack_name(self, buf, off):
+ name, off = dns.DNS.unpack_name(self, buf, off)
+ return decode_name(name), off
+
+
+class Session(dpkt.Packet):
+ """NetBIOS Session Service."""
+ __hdr__ = (
+ ('type', 'B', 0),
+ ('flags', 'B', 0),
+ ('len', 'H', 0)
+ )
+
+
+SSN_MESSAGE = 0
+SSN_REQUEST = 1
+SSN_POSITIVE = 2
+SSN_NEGATIVE = 3
+SSN_RETARGET = 4
+SSN_KEEPALIVE = 5
+
+
+class Datagram(dpkt.Packet):
+ """NetBIOS Datagram Service."""
+ __hdr__ = (
+ ('type', 'B', 0),
+ ('flags', 'B', 0),
+ ('id', 'H', 0),
+ ('src', 'I', 0),
+ ('sport', 'H', 0),
+ ('len', 'H', 0),
+ ('off', 'H', 0)
+ )
+
+
+DGRAM_UNIQUE = 0x10
+DGRAM_GROUP = 0x11
+DGRAM_BROADCAST = 0x12
+DGRAM_ERROR = 0x13
+DGRAM_QUERY = 0x14
+DGRAM_POSITIVE = 0x15
+DGRAM_NEGATIVE = 0x16
diff --git a/external_libs/python/dpkt-1.8.6.2/dpkt/netflow.py b/external_libs/python/dpkt-1.8.6.2/dpkt/netflow.py
new file mode 100644
index 00000000..4e53ba79
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/dpkt/netflow.py
@@ -0,0 +1,219 @@
+# $Id: netflow.py 23 2006-11-08 15:45:33Z dugsong $
+# -*- coding: utf-8 -*-
+"""Cisco Netflow."""
+
+import itertools
+import struct
+import dpkt
+
+
+class NetflowBase(dpkt.Packet):
+ """Base class for Cisco Netflow packets."""
+
+ __hdr__ = (
+ ('version', 'H', 1),
+ ('count', 'H', 0),
+ ('sys_uptime', 'I', 0),
+ ('unix_sec', 'I', 0),
+ ('unix_nsec', 'I', 0)
+ )
+
+ def __len__(self):
+ return self.__hdr_len__ + (len(self.data[0]) * self.count)
+
+ def __str__(self):
+ # for now, don't try to enforce any size limits
+ self.count = len(self.data)
+ return self.pack_hdr() + ''.join(map(str, self.data))
+
+ def unpack(self, buf):
+ dpkt.Packet.unpack(self, buf)
+ buf = self.data
+ l = []
+ while buf:
+ flow = self.NetflowRecord(buf)
+ l.append(flow)
+ buf = buf[len(flow):]
+ self.data = l
+
+ class NetflowRecordBase(dpkt.Packet):
+ """Base class for netflow v1-v7 netflow records."""
+
+ # performance optimizations
+ def __len__(self):
+ # don't bother with data
+ return self.__hdr_len__
+
+ def __str__(self):
+ # don't bother with data
+ return self.pack_hdr()
+
+ def unpack(self, buf):
+ # don't bother with data
+ for k, v in itertools.izip(self.__hdr_fields__,
+ struct.unpack(self.__hdr_fmt__, buf[:self.__hdr_len__])):
+ setattr(self, k, v)
+ self.data = ""
+
+
+class Netflow1(NetflowBase):
+ """Netflow Version 1."""
+
+ class NetflowRecord(NetflowBase.NetflowRecordBase):
+ """Netflow v1 flow record."""
+ __hdr__ = (
+ ('src_addr', 'I', 0),
+ ('dst_addr', 'I', 0),
+ ('next_hop', 'I', 0),
+ ('input_iface', 'H', 0),
+ ('output_iface', 'H', 0),
+ ('pkts_sent', 'I', 0),
+ ('bytes_sent', 'I', 0),
+ ('start_time', 'I', 0),
+ ('end_time', 'I', 0),
+ ('src_port', 'H', 0),
+ ('dst_port', 'H', 0),
+ ('pad1', 'H', 0),
+ ('ip_proto', 'B', 0),
+ ('tos', 'B', 0),
+ ('tcp_flags', 'B', 0),
+ ('pad2', 'B', 0),
+ ('pad3', 'H', 0),
+ ('reserved', 'I', 0)
+ )
+
+
+# FYI, versions 2-4 don't appear to have ever seen the light of day.
+
+class Netflow5(NetflowBase):
+ """Netflow Version 5."""
+ __hdr__ = NetflowBase.__hdr__ + (
+ ('flow_sequence', 'I', 0),
+ ('engine_type', 'B', 0),
+ ('engine_id', 'B', 0),
+ ('reserved', 'H', 0),
+ )
+
+ class NetflowRecord(NetflowBase.NetflowRecordBase):
+ """Netflow v5 flow record."""
+ __hdr__ = (
+ ('src_addr', 'I', 0),
+ ('dst_addr', 'I', 0),
+ ('next_hop', 'I', 0),
+ ('input_iface', 'H', 0),
+ ('output_iface', 'H', 0),
+ ('pkts_sent', 'I', 0),
+ ('bytes_sent', 'I', 0),
+ ('start_time', 'I', 0),
+ ('end_time', 'I', 0),
+ ('src_port', 'H', 0),
+ ('dst_port', 'H', 0),
+ ('pad1', 'B', 0),
+ ('tcp_flags', 'B', 0),
+ ('ip_proto', 'B', 0),
+ ('tos', 'B', 0),
+ ('src_as', 'H', 0),
+ ('dst_as', 'H', 0),
+ ('src_mask', 'B', 0),
+ ('dst_mask', 'B', 0),
+ ('pad2', 'H', 0),
+ )
+
+
+class Netflow6(NetflowBase):
+ """Netflow Version 6.
+ XXX - unsupported by Cisco, but may be found in the field.
+ """
+ __hdr__ = Netflow5.__hdr__
+
+ class NetflowRecord(NetflowBase.NetflowRecordBase):
+ """Netflow v6 flow record."""
+ __hdr__ = (
+ ('src_addr', 'I', 0),
+ ('dst_addr', 'I', 0),
+ ('next_hop', 'I', 0),
+ ('input_iface', 'H', 0),
+ ('output_iface', 'H', 0),
+ ('pkts_sent', 'I', 0),
+ ('bytes_sent', 'I', 0),
+ ('start_time', 'I', 0),
+ ('end_time', 'I', 0),
+ ('src_port', 'H', 0),
+ ('dst_port', 'H', 0),
+ ('pad1', 'B', 0),
+ ('tcp_flags', 'B', 0),
+ ('ip_proto', 'B', 0),
+ ('tos', 'B', 0),
+ ('src_as', 'H', 0),
+ ('dst_as', 'H', 0),
+ ('src_mask', 'B', 0),
+ ('dst_mask', 'B', 0),
+ ('in_encaps', 'B', 0),
+ ('out_encaps', 'B', 0),
+ ('peer_nexthop', 'I', 0),
+ )
+
+
+class Netflow7(NetflowBase):
+ """Netflow Version 7."""
+ __hdr__ = NetflowBase.__hdr__ + (
+ ('flow_sequence', 'I', 0),
+ ('reserved', 'I', 0),
+ )
+
+ class NetflowRecord(NetflowBase.NetflowRecordBase):
+ """Netflow v7 flow record."""
+ __hdr__ = (
+ ('src_addr', 'I', 0),
+ ('dst_addr', 'I', 0),
+ ('next_hop', 'I', 0),
+ ('input_iface', 'H', 0),
+ ('output_iface', 'H', 0),
+ ('pkts_sent', 'I', 0),
+ ('bytes_sent', 'I', 0),
+ ('start_time', 'I', 0),
+ ('end_time', 'I', 0),
+ ('src_port', 'H', 0),
+ ('dst_port', 'H', 0),
+ ('flags', 'B', 0),
+ ('tcp_flags', 'B', 0),
+ ('ip_proto', 'B', 0),
+ ('tos', 'B', 0),
+ ('src_as', 'H', 0),
+ ('dst_as', 'H', 0),
+ ('src_mask', 'B', 0),
+ ('dst_mask', 'B', 0),
+ ('pad2', 'H', 0),
+ ('router_sc', 'I', 0),
+ )
+
+# No support for v8 or v9 yet.
+
+__sample_v1 = "\x00\x01\x00\x18gza<B\x00\xfc\x1c$\x93\x08p\xac\x01 W\xc0\xa8c\xf7\n\x00\x02\x01\x00\x03\x00\n\x00\x00\x00\x01\x00\x00\x02(gz7,gz7,\\\x1b\x00P\xac\x01\x11,\x10\x00\x00\x00\x00\x04\x00\x1b\xac\x01\x18S\xac\x18\xd9\xaa\xc0\xa82\x02\x00\x03\x00\x19\x00\x00\x00\x01\x00\x00\x05\xdcgz7|gz7|\xd8\xe3\x00P\xac\x01\x06,\x10\x00\x00\x00\x00\x04\x00\x1b\xac\x01\x14\x18\xac\x18\x8d\xcd\xc0\xa82f\x00\x03\x00\x07\x00\x00\x00\x01\x00\x00\x05\xdcgz7\x90gz7\x90\x8a\x81\x17o\xac\x01\x066\x10\x00\x00\x00\x00\x04\x00\x03\xac\x0f'$\xac\x01\xe5\x1d\xc0\xa82\x06\x00\x04\x00\x1b\x00\x00\x00\x01\x00\x00\x02(gz:8gz:8\xa3Q\x126\xac)\x06\xfd\x18\x00\x00\x00\x00\x04\x00\x1b\xac\x01\x16E\xac#\x17\x8e\xc0\xa82\x06\x00\x03\x00\x1b\x00\x00\x00\x01\x00\x00\x02(gz:Lgz:L\xc9\xff\x00P\xac\x1f\x06\x86\x02\x00\x00\x00\x00\x03\x00\x1b\xac\r\t\xff\xac\x01\x99\x95\xc0\xa82\x06\x00\x04\x00\x1b\x00\x00\x00\x01\x00\x00\x05\xdcgz:Xgz:X\xee9\x00\x17\xac\x01\x06\xde\x10\x00\x00\x00\x00\x04\x00\x03\xac\x0eJ\xd8\xac\x01\xae/\xc0\xa82\x06\x00\x04\x00\x1b\x00\x00\x00\x01\x00\x00\x05\xdcgz:hgz:h\xb3n\x00\x15\xac\x01\x06\x81\x10\x00\x00\x00\x00\x04\x00\x1b\xac\x01#8\xac\x01\xd9*\xc0\xa82\x06\x00\x03\x00\x1b\x00\x00\x00\x01\x00\x00\x05\xdcgz:tgz:t\x00\x00\x83P\xac!\x01\xab\x10\x00\x00\x00\x00\x03\x00\x1b\xac\n`7\xac*\x93J\xc0\xa82\x06\x00\x04\x00\x1b\x00\x00\x00\x01\x00\x00\x05\xdcgz:tgz:t\x00\x00\x00\x00\xac\x012\xa9\x10\x00\x00\x00\x00\x04\x00\x07\xac\nG\x1f\xac\x01\xfdJ\xc0\xa82\x06\x00\x04\x00\x1b\x00\x00\x00\x01\x00\x00\x00(gz:\x88gz:\x88!\x99i\x87\xac\x1e\x06~\x02\x00\x00\x00\x00\x03\x00\x1b\xac\x01(\xc9\xac\x01B\xc4\xc0\xa82\x02\x00\x03\x00\x19\x00\x00\x00\x01\x00\x00\x00(gz:\x88gz:\x88}6\x00P\xac\x01\x06\xfe\x10\x00\x00\x00\x00\x04\x00\x1b\xac\x0b\x08\xe8\xac\x01F\xe2\xc0\xa82\x02\x00\x04\x00\x19\x00\x00\x00\x01\x00\x00\x05\xdcgz:\x9cgz:\x9c`ii\x87\xac\x01\x06;\x10\x00\x00\x00\x00\x04\x00\x1b\xac\x01\x1d$\xac<\xf0\xc3\xc0\xa82\x06\x00\x03\x00\x1b\x00\x00\x00\x01\x00\x00\x05\xdcgz:\x9cgz:\x9cF2\x00\x14\xac\x01\x06s\x18\x00\x00\x00\x00\x04\x00\x03\xac\x0b\x11Q\xac\x01\xde\x06\xc0\xa82\x06\x00\x04\x00\x1b\x00\x00\x00\x01\x00\x00\x05\xdcgz:\xb0gz:\xb0\xef#\x1a+\xac)\x06\xe9\x10\x00\x00\x00\x00\x04\x00\x1b\xac\x0cR\xd9\xac\x01o\xe8\xc0\xa82\x02\x00\x04\x00\x19\x00\x00\x00\x01\x00\x00\x05\xdcgz:\xc4gz:\xc4\x13n\x00n\xac\x19\x06\xa8\x10\x00\x00\x00\x00\x03\x00\x19\xac\x01=\xdd\xac\x01}\xee\xc0\xa82f\x00\x03\x00\x07\x00\x00\x00\x01\x00\x00\x00(gz:\xc4gz:\xc4\x00\x00\xdc\xbb\xac\x01\x01\xd3\x10\x00\x00\x00\x00\x04\x00\x1b\xac\x0f(\xd1\xac\x01\xcc\xa5\xc0\xa82\x06\x00\x04\x00\x1b\x00\x00\x00\x01\x00\x00\x05\xdcgz:\xd8gz:\xd8\xc5s\x17o\xac\x19\x06#\x18\x00\x00\x00\x00\x03\x00\x07\xac\n\x85[\xc0\xa8cn\n\x00\x02\x01\x00\x04\x00\n\x00\x00\x00\x01\x00\x00\x05\xdcgz:\xe4gz:\xe4\xbfl\x00P\xac\x01\x06\xcf\x10\x00\x00\x00\x00\x04\x00\x07\xac\x010\x1f\xac\x18!E\xc0\xa82f\x00\x03\x00\x07\x00\x00\x00\x01\x00\x00\x05\xdcgz;\x00gz;\x00\x11\x95\x04\xbe\xc0\xa8\x06\xea\x10\x00\x00\x00\x00\x03\x00\n\xac\x010\xb6\xac\x1e\xf4\xaa\xc0\xa82\x06\x00\x03\x00\x1b\x00\x00\x00\x01\x00\x00\x05\xdcgz;4gz;4\x88d\x00\x17\xac\x01\x06\x1f\x10\x00\x00\x00\x00\x04\x00\x1b\xac\x01#_\xac\x1e\xb0\t\xc0\xa82\x06\x00\x03\x00\x1b\x00\x00\x00\x01\x00\x00\x05\xdcgz;Hgz;H\x81S\x00P\xac \x06N\x10\x00\x00\x00\x00\x03\x00\x1b\xac\x01\x04\xd9\xac\x01\x94c\xc0\xa82\x06\x00\x03\x00\x1b\x00\x00\x00\x01\x00\x00\x02(gz;\\gz;\\U\x10\x00P\xac\x01\x06P\x18\x00\x00\x00\x00\x04\x00\x1b\xac\x01<\xae\xac*\xac!\xc0\xa82\x06\x00\x03\x00\x1b\x00\x00\x00\x01\x00\x00\x00\xfagz;\x84gz;\x84\x0c\xe7\x00P\xac\x01\x11\xfd\x10\x00\x00\x00\x00\x04\x00\x1b\xac\x01\x1f\x1f\xac\x17\xedi\xc0\xa82\x02\x00\x03\x00\x19\x00\x00\x00\x01\x00\x00\x05\xdcgz;\x98gz;\x98\xba\x17\x00\x16\xac\x01\x06|\x10\x00\x00\x00\x00\x03\x00\x07"
+__sample_v5 = '\x00\x05\x00\x1d\xb5\xfa\xc9\xd0:\x0bAB&Vw\xde\x9bsv1\x00\x01\x00\x00\xac\n\x86\xa6\xac\x01\xaa\xf7\xc0\xa822\x02q\x00i\x00\x00\x00\x01\x00\x00\x02(\xb5\xfa\x81\x14\xb5\xfa\x81\x1452\x00P\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00\x00\x00\xac\x01\x91D\xac\x14C\xe4\xc0\xa82\x16\x00i\x02q\x00\x00\x00\x01\x00\x00\x00(\xb5\xfa\x9b\xbd\xb5\xfa\x9b\xbd\x00P\x85\xd7\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00\x00\x00\xac\x17\xe2\xd7\xac\x01\x8cV\xc0\xa822\x02q\x00i\x00\x00\x00\x01\x00\x00\x05\xdc\xb5\xfao\xb8\xb5\xfao\xb8v\xe8\x17o\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00\x00\x00\xac\x0e\xf2\xe5\xac\x01\x91\xb2\xc0\xa822\x02q\x00i\x00\x00\x00\x01\x00\x00\x00\xfa\xb5\xfa\x81\xee\xb5\xfa\x81\xee\xd0\xeb\x00\x15\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00\x00\x00\xac\nCj\xac)\xa7\t\n\x00\x02\x01\x02q\x00\xdb\x00\x00\x00\x01\x00\x00\x02(\xb5\xfa\x85\x92\xb5\xfa\x85\x92\x8c\xb0\x005\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00\x00\x00\xac\x01\x96=\xac\x15\x1a\xa8\xc0\xa82\x16\x00i\x02q\x00\x00\x00\x01\x00\x00\x05\xdc\xb5\xfa\x86\xe0\xb5\xfa\x86\xe0\xb4\xe7\x00\xc2\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00\x00\x00\xac\x01V\xd1\xac\x01\x86\x15\xc0\xa822\x02q\x00i\x00\x00\x00\x01\x00\x00\x05\xdc\xb5\xfa}:\xb5\xfa}:[Q\x00P\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00\x00\x00\xac2\xf1\xb1\xac)\x19\xca\n\x00\x02\x01\x02q\x00\xdb\x00\x00\x00\x01\x00\x00\x05\xdc\xb5\xfa\x83\xc3\xb5\xfa\x83\xc3\x16,\x00\x15\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00\x00\x00\xac\x0cA4\xac\x01\x9az\xc0\xa822\x02q\x00i\x00\x00\x00\x01\x00\x00\x05\xdc\xb5\xfa\x8d\xa7\xb5\xfa\x8d\xa7\x173\x00\x15\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00\x00\x00\xac\x1e\xd2\x84\xac)\xd8\xd2\n\x00\x02\x01\x02q\x00\xdb\x00\x00\x00\x01\x00\x00\x05\xdc\xb5\xfa\x8e\x97\xb5\xfa\x8e\x977*\x17o\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00\x00\x00\xac\x01\x85J\xac \x11\xfc\xc0\xa82\x16\x00i\x02q\x00\x00\x00\x01\x00\x00\x02(\xb5\xfa\x884\xb5\xfa\x884\xf5\xdd\x00\x8f\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00\x00\x00\xac\x01\x04\x80\xac<[n\n\x00\x02\x01\x02q\x00\xdb\x00\x00\x00\x01\x00\x00\x05\xdc\xb5\xfa\x9dr\xb5\xfa\x9drs$\x00\x16\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00\x00\x00\xac\x01\xb9J\xac"\xc9\xd7\xc0\xa82\x16\x00i\x02q\x00\x00\x00\x01\x00\x00\x00(\xb5\xfa\x90r\xb5\xfa\x90r\x0f\x8d\x00\xc2\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00\x00\x00\xac*\xa3\x10\xac\x01\xb4\x19\xc0\xa822\x02q\x00i\x00\x00\x00\x01\x00\x00\x00(\xb5\xfa\x92\x03\xb5\xfa\x92\x03pf\x00\x15\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00\x00\x00\xac\x01\xabo\xac\x1e\x7fi\xc0\xa82\x16\x00i\x02q\x00\x00\x00\x01\x00\x00\x05\xdc\xb5\xfa\x93\x7f\xb5\xfa\x93\x7f\x00P\x0b\x98\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00\x00\x00\xac\x0c\n\xea\xac\x01\xa1\x15\xc0\xa822\x02q\x00i\x00\x00\x00\x01\x00\x00\x05\xdc\xb5\xfay\xcf\xb5\xfay\xcf[3\x17\xe0\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00\x00\x00\xac\x01\xbb\xb3\xac)u\x8c\n\x00\x02\x01\x00i\x00\xdb\x00\x00\x00\x01\x00\x00\x00\xfa\xb5\xfa\x943\xb5\xfa\x943\x00P\x1e\xca\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00\x00\x00\xac\x0fJ`\xac\x01\xab\x94\xc0\xa822\x02q\x00i\x00\x00\x00\x01\x00\x00\x02(\xb5\xfa\x87[\xb5\xfa\x87[\x9a\xd6/\xab\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00\x00\x00\xac*\x0f\x93\xac\x01\xb8\xa3\xc0\xa822\x02q\x00i\x00\x00\x00\x01\x00\x00\x00(\xb5\xfa\x89\xbb\xb5\xfa\x89\xbbn\xe1\x00P\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00\x00\x00\xac\x01\x93\xa1\xac\x16\x80\x0c\xc0\xa82\x16\x00i\x02q\x00\x00\x00\x01\x00\x00\x00(\xb5\xfa\x87&\xb5\xfa\x87&\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\xac\x01\x83Z\xac\x1fR\xcd\xc0\xa82\x16\x00i\x02q\x00\x00\x00\x01\x00\x00\x05\xdc\xb5\xfa\x90\r\xb5\xfa\x90\r\xf7*\x00\x8a\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00\x00\x00\xac\x0c\xe0\xad\xac\x01\xa8V\xc0\xa822\x02q\x00i\x00\x00\x00\x01\x00\x00\x05\xdc\xb5\xfa\x9c\xf6\xb5\xfa\x9c\xf6\xe5|\x1a+\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00\x00\x00\xac\x1e\xccT\xac<x&\n\x00\x02\x01\x02q\x00\xdb\x00\x00\x00\x01\x00\x00\x05\xdc\xb5\xfa\x80\xea\xb5\xfa\x80\xea\x00\x00\x00\x00\x00\x00/\x00\x00\x00\x00\x00\x00\x00\x00\x00\xac\x01\xbb\x18\xac\x01|z\xc0\xa82\x16\x00i\x02q\x00\x00\x00\x01\x00\x00\x00\xfa\xb5\xfa\x88p\xb5\xfa\x88p\x00P\x0b}\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00\x00\x00\xac\x17\x0er\xac\x01\x8f\xdd\xc0\xa822\x02q\x00i\x00\x00\x00\x01\x00\x00\x02(\xb5\xfa\x89\xf7\xb5\xfa\x89\xf7\r\xf7\x00\x8a\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00\x00\x00\xac\n\xbb\x04\xac<\xb0\x15\n\x00\x02\x01\x02q\x00\xdb\x00\x00\x00\x01\x00\x00\x05\xdc\xb5\xfa\x90\xa9\xb5\xfa\x90\xa9\x9c\xd0\x00\x8f\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00\x00\x00\xac\nz?\xac)\x03\xc8\n\x00\x02\x01\x02q\x00\xdb\x00\x00\x00\x01\x00\x00\x05\xdc\xb5\xfaue\xb5\xfaue\xee\xa6\x00P\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00\x00\x00\xac\x01\xb5\x05\xc0\xa8c\x9f\n\x00\x02\x01\x00i\x00\xdb\x00\x00\x00\x01\x00\x00\x05\xdc\xb5\xfa{\xc7\xb5\xfa{\xc7\x00P\x86\xa9\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00\x00\x00\xac2\xa5\x1b\xac)0\xbf\n\x00\x02\x01\x02q\x00\xdb\x00\x00\x00\x01\x00\x00\x00\xfa\xb5\xfa\x9bZ\xb5\xfa\x9bZC\xf9\x17\xe0\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00\x00\x00'
+
+
+def test_net_flow_v1_pack(): pass
+
+
+def test_net_flow_v1_unpack():
+ nf = Netflow1(__sample_v1)
+ assert len(nf.data) == 24
+ # print repr(nfv1)
+
+
+def test_net_flow_v5_pack(): pass
+
+
+def test_net_flow_v5_unpack():
+ nf = Netflow5(__sample_v5)
+ assert len(nf.data) == 29
+ # print repr(nfv5)
+
+
+if __name__ == '__main__':
+ test_net_flow_v1_pack()
+ test_net_flow_v1_unpack()
+ test_net_flow_v5_pack()
+ test_net_flow_v5_unpack()
+ print 'Tests Successful...'
diff --git a/external_libs/python/dpkt-1.8.6.2/dpkt/ntp.py b/external_libs/python/dpkt-1.8.6.2/dpkt/ntp.py
new file mode 100644
index 00000000..c522c5e3
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/dpkt/ntp.py
@@ -0,0 +1,113 @@
+# $Id: ntp.py 48 2008-05-27 17:31:15Z yardley $
+# -*- coding: utf-8 -*-
+"""Network Time Protocol."""
+
+import dpkt
+from decorators import deprecated
+
+# NTP v4
+
+# Leap Indicator (LI) Codes
+NO_WARNING = 0
+LAST_MINUTE_61_SECONDS = 1
+LAST_MINUTE_59_SECONDS = 2
+ALARM_CONDITION = 3
+
+# Mode Codes
+RESERVED = 0
+SYMMETRIC_ACTIVE = 1
+SYMMETRIC_PASSIVE = 2
+CLIENT = 3
+SERVER = 4
+BROADCAST = 5
+CONTROL_MESSAGE = 6
+PRIVATE = 7
+
+
+class NTP(dpkt.Packet):
+ __hdr__ = (
+ ('flags', 'B', 0),
+ ('stratum', 'B', 0),
+ ('interval', 'B', 0),
+ ('precision', 'B', 0),
+ ('delay', 'I', 0),
+ ('dispersion', 'I', 0),
+ ('id', '4s', 0),
+ ('update_time', '8s', 0),
+ ('originate_time', '8s', 0),
+ ('receive_time', '8s', 0),
+ ('transmit_time', '8s', 0)
+ )
+
+ @property
+ def v(self):
+ return (self.flags >> 3) & 0x7
+
+ @v.setter
+ def v(self, v):
+ self.flags = (self.flags & ~0x38) | ((v & 0x7) << 3)
+
+ @property
+ def li(self):
+ return (self.flags >> 6) & 0x3
+
+ @li.setter
+ def li(self, li):
+ self.flags = (self.flags & ~0xc0) | ((li & 0x3) << 6)
+
+ @property
+ def mode(self):
+ return self.flags & 0x7
+
+ @mode.setter
+ def mode(self, mode):
+ self.flags = (self.flags & ~0x7) | (mode & 0x7)
+
+ # Deprecated methods, will be removed in the future
+ # =================================================
+ @deprecated
+ def _get_v(self): return self.v
+
+ @deprecated
+ def _set_v(self, v): self.v = v
+
+ @deprecated
+ def _get_li(self): return self.li
+
+ @deprecated
+ def _set_li(self, li): self.li = li
+
+ @deprecated
+ def _get_mode(self): return self.mode
+
+ @deprecated
+ def _set_mode(self, mode): self.mode = mode
+ # =================================================
+
+__s = '\x24\x02\x04\xef\x00\x00\x00\x84\x00\x00\x33\x27\xc1\x02\x04\x02\xc8\x90\xec\x11\x22\xae\x07\xe5\xc8\x90\xf9\xd9\xc0\x7e\x8c\xcd\xc8\x90\xf9\xd9\xda\xc5\xb0\x78\xc8\x90\xf9\xd9\xda\xc6\x8a\x93'
+
+
+def test_ntp_pack():
+ n = NTP(__s)
+ assert (__s == str(n))
+
+
+def test_ntp_unpack():
+ n = NTP(__s)
+ assert (n.li == NO_WARNING)
+ assert (n.v == 4)
+ assert (n.mode == SERVER)
+ assert (n.stratum == 2)
+ assert (n.id == '\xc1\x02\x04\x02')
+ # test get/set functions
+ n.li = ALARM_CONDITION
+ n.v = 3
+ n.mode = CLIENT
+ assert (n.li == ALARM_CONDITION)
+ assert (n.v == 3)
+ assert (n.mode == CLIENT)
+
+if __name__ == '__main__':
+ test_ntp_pack()
+ test_ntp_unpack()
+ print 'Tests Successful...' \ No newline at end of file
diff --git a/external_libs/python/dpkt-1.8.6.2/dpkt/ospf.py b/external_libs/python/dpkt-1.8.6.2/dpkt/ospf.py
new file mode 100644
index 00000000..cc47aae3
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/dpkt/ospf.py
@@ -0,0 +1,27 @@
+# $Id: ospf.py 23 2006-11-08 15:45:33Z dugsong $
+# -*- coding: utf-8 -*-
+"""Open Shortest Path First."""
+
+import dpkt
+
+AUTH_NONE = 0
+AUTH_PASSWORD = 1
+AUTH_CRYPTO = 2
+
+
+class OSPF(dpkt.Packet):
+ __hdr__ = (
+ ('v', 'B', 0),
+ ('type', 'B', 0),
+ ('len', 'H', 0),
+ ('router', 'I', 0),
+ ('area', 'I', 0),
+ ('sum', 'H', 0),
+ ('atype', 'H', 0),
+ ('auth', '8s', '')
+ )
+
+ def __str__(self):
+ if not self.sum:
+ self.sum = dpkt.in_cksum(dpkt.Packet.__str__(self))
+ return dpkt.Packet.__str__(self)
diff --git a/external_libs/python/dpkt-1.8.6.2/dpkt/pcap.py b/external_libs/python/dpkt-1.8.6.2/dpkt/pcap.py
new file mode 100644
index 00000000..c14ba6de
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/dpkt/pcap.py
@@ -0,0 +1,172 @@
+# $Id: pcap.py 77 2011-01-06 15:59:38Z dugsong $
+# -*- coding: utf-8 -*-
+"""Libpcap file format."""
+
+import sys
+import time
+import dpkt
+
+
+TCPDUMP_MAGIC = 0xa1b2c3d4L
+PMUDPCT_MAGIC = 0xd4c3b2a1L
+
+PCAP_VERSION_MAJOR = 2
+PCAP_VERSION_MINOR = 4
+
+DLT_NULL = 0
+DLT_EN10MB = 1
+DLT_EN3MB = 2
+DLT_AX25 = 3
+DLT_PRONET = 4
+DLT_CHAOS = 5
+DLT_IEEE802 = 6
+DLT_ARCNET = 7
+DLT_SLIP = 8
+DLT_PPP = 9
+DLT_FDDI = 10
+DLT_PFSYNC = 18
+DLT_IEEE802_11 = 105
+DLT_LINUX_SLL = 113
+DLT_PFLOG = 117
+DLT_IEEE802_11_RADIO = 127
+
+if sys.platform.find('openbsd') != -1:
+ DLT_LOOP = 12
+ DLT_RAW = 14
+else:
+ DLT_LOOP = 108
+ DLT_RAW = 12
+
+dltoff = {DLT_NULL: 4, DLT_EN10MB: 14, DLT_IEEE802: 22, DLT_ARCNET: 6,
+ DLT_SLIP: 16, DLT_PPP: 4, DLT_FDDI: 21, DLT_PFLOG: 48, DLT_PFSYNC: 4,
+ DLT_LOOP: 4, DLT_LINUX_SLL: 16}
+
+
+class PktHdr(dpkt.Packet):
+ """pcap packet header."""
+ __hdr__ = (
+ ('tv_sec', 'I', 0),
+ ('tv_usec', 'I', 0),
+ ('caplen', 'I', 0),
+ ('len', 'I', 0),
+ )
+
+
+class LEPktHdr(PktHdr):
+ __byte_order__ = '<'
+
+
+class FileHdr(dpkt.Packet):
+ """pcap file header."""
+ __hdr__ = (
+ ('magic', 'I', TCPDUMP_MAGIC),
+ ('v_major', 'H', PCAP_VERSION_MAJOR),
+ ('v_minor', 'H', PCAP_VERSION_MINOR),
+ ('thiszone', 'I', 0),
+ ('sigfigs', 'I', 0),
+ ('snaplen', 'I', 1500),
+ ('linktype', 'I', 1),
+ )
+
+
+class LEFileHdr(FileHdr):
+ __byte_order__ = '<'
+
+
+class Writer(object):
+ """Simple pcap dumpfile writer."""
+
+ def __init__(self, fileobj, snaplen=1500, linktype=DLT_EN10MB):
+ self.__f = fileobj
+ if sys.byteorder == 'little':
+ fh = LEFileHdr(snaplen=snaplen, linktype=linktype)
+ else:
+ fh = FileHdr(snaplen=snaplen, linktype=linktype)
+ self.__f.write(str(fh))
+
+ def writepkt(self, pkt, ts=None):
+ if ts is None:
+ ts = time.time()
+ s = str(pkt)
+ n = len(s)
+ if sys.byteorder == 'little':
+ ph = LEPktHdr(tv_sec=int(ts),
+ tv_usec=int((float(ts) - int(ts)) * 1000000.0),
+ caplen=n, len=n)
+ else:
+ ph = PktHdr(tv_sec=int(ts),
+ tv_usec=int((float(ts) - int(ts)) * 1000000.0),
+ caplen=n, len=n)
+ self.__f.write(str(ph))
+ self.__f.write(s)
+
+ def close(self):
+ self.__f.close()
+
+
+class Reader(object):
+ """Simple pypcap-compatible pcap file reader."""
+
+ def __init__(self, fileobj):
+ self.name = fileobj.name
+ self.fd = fileobj.fileno()
+ self.__f = fileobj
+ buf = self.__f.read(FileHdr.__hdr_len__)
+ self.__fh = FileHdr(buf)
+ self.__ph = PktHdr
+ if self.__fh.magic == PMUDPCT_MAGIC:
+ self.__fh = LEFileHdr(buf)
+ self.__ph = LEPktHdr
+ elif self.__fh.magic != TCPDUMP_MAGIC:
+ raise ValueError('invalid tcpdump header')
+ if self.__fh.linktype in dltoff:
+ self.dloff = dltoff[self.__fh.linktype]
+ else:
+ self.dloff = 0
+ self.snaplen = self.__fh.snaplen
+ self.filter = ''
+
+ def fileno(self):
+ return self.fd
+
+ def datalink(self):
+ return self.__fh.linktype
+
+ def setfilter(self, value, optimize=1):
+ return NotImplementedError
+
+ def readpkts(self):
+ return list(self)
+
+ def dispatch(self, cnt, callback, *args):
+ if cnt > 0:
+ for i in range(cnt):
+ ts, pkt = self.next()
+ callback(ts, pkt, *args)
+ else:
+ for ts, pkt in self:
+ callback(ts, pkt, *args)
+
+ def loop(self, callback, *args):
+ self.dispatch(0, callback, *args)
+
+ def __iter__(self):
+ self.__f.seek(FileHdr.__hdr_len__)
+ while 1:
+ buf = self.__f.read(PktHdr.__hdr_len__)
+ if not buf: break
+ hdr = self.__ph(buf)
+ buf = self.__f.read(hdr.caplen)
+ yield (hdr.tv_sec + (hdr.tv_usec / 1000000.0), buf)
+
+
+def test_pcap_endian():
+ be = '\xa1\xb2\xc3\xd4\x00\x02\x00\x04\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x60\x00\x00\x00\x01'
+ le = '\xd4\xc3\xb2\xa1\x02\x00\x04\x00\x00\x00\x00\x00\x00\x00\x00\x00\x60\x00\x00\x00\x01\x00\x00\x00'
+ befh = FileHdr(be)
+ lefh = LEFileHdr(le)
+ assert (befh.linktype == lefh.linktype)
+
+if __name__ == '__main__':
+ test_pcap_endian()
+ print 'Tests Successful...' \ No newline at end of file
diff --git a/external_libs/python/dpkt-1.8.6.2/dpkt/pim.py b/external_libs/python/dpkt-1.8.6.2/dpkt/pim.py
new file mode 100644
index 00000000..6cd16a42
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/dpkt/pim.py
@@ -0,0 +1,46 @@
+# $Id: pim.py 23 2006-11-08 15:45:33Z dugsong $
+# -*- coding: utf-8 -*-
+"""Protocol Independent Multicast."""
+
+import dpkt
+from decorators import deprecated
+
+
+class PIM(dpkt.Packet):
+ __hdr__ = (
+ ('v_type', 'B', 0x20),
+ ('rsvd', 'B', 0),
+ ('sum', 'H', 0)
+ )
+
+ @property
+ def v(self): return self.v_type >> 4
+
+ @v.setter
+ def v(self, v): self.v_type = (v << 4) | (self.v_type & 0xf)
+
+ @property
+ def type(self): return self.v_type & 0xf
+
+ @type.setter
+ def type(self, type): self.v_type = (self.v_type & 0xf0) | type
+
+ # Deprecated methods, will be removed in the future
+ # =================================================
+ @deprecated
+ def _get_v(self): return self.v
+
+ @deprecated
+ def _set_v(self, v): self.v = v
+
+ @deprecated
+ def _get_type(self): return self.type
+
+ @deprecated
+ def _set_type(self, type): self.type = type
+ # =================================================
+
+ def __str__(self):
+ if not self.sum:
+ self.sum = dpkt.in_cksum(dpkt.Packet.__str__(self))
+ return dpkt.Packet.__str__(self)
diff --git a/external_libs/python/dpkt-1.8.6.2/dpkt/pmap.py b/external_libs/python/dpkt-1.8.6.2/dpkt/pmap.py
new file mode 100644
index 00000000..0e57b64c
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/dpkt/pmap.py
@@ -0,0 +1,18 @@
+# $Id: pmap.py 23 2006-11-08 15:45:33Z dugsong $
+# -*- coding: utf-8 -*-
+"""Portmap / rpcbind."""
+
+import dpkt
+
+PMAP_PROG = 100000L
+PMAP_PROCDUMP = 4
+PMAP_VERS = 2
+
+
+class Pmap(dpkt.Packet):
+ __hdr__ = (
+ ('prog', 'I', 0),
+ ('vers', 'I', 0),
+ ('prot', 'I', 0),
+ ('port', 'I', 0),
+ )
diff --git a/external_libs/python/dpkt-1.8.6.2/dpkt/ppp.py b/external_libs/python/dpkt-1.8.6.2/dpkt/ppp.py
new file mode 100644
index 00000000..282bdd98
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/dpkt/ppp.py
@@ -0,0 +1,66 @@
+# $Id: ppp.py 65 2010-03-26 02:53:51Z dugsong $
+# -*- coding: utf-8 -*-
+"""Point-to-Point Protocol."""
+
+import struct
+import dpkt
+
+# XXX - finish later
+
+# http://www.iana.org/assignments/ppp-numbers
+PPP_IP = 0x21 # Internet Protocol
+PPP_IP6 = 0x57 # Internet Protocol v6
+
+# Protocol field compression
+PFC_BIT = 0x01
+
+
+class PPP(dpkt.Packet):
+ __hdr__ = (
+ ('p', 'B', PPP_IP),
+ )
+ _protosw = {}
+
+ @classmethod
+ def set_p(cls, p, pktclass):
+ cls._protosw[p] = pktclass
+
+ @classmethod
+ def get_p(cls, p):
+ return cls._protosw[p]
+
+ def unpack(self, buf):
+ dpkt.Packet.unpack(self, buf)
+ if self.p & PFC_BIT == 0:
+ self.p = struct.unpack('>H', buf[:2])[0]
+ self.data = self.data[1:]
+ try:
+ self.data = self._protosw[self.p](self.data)
+ setattr(self, self.data.__class__.__name__.lower(), self.data)
+ except (KeyError, struct.error, dpkt.UnpackError):
+ pass
+
+ def pack_hdr(self):
+ try:
+ if self.p > 0xff:
+ return struct.pack('>H', self.p)
+ return dpkt.Packet.pack_hdr(self)
+ except struct.error, e:
+ raise dpkt.PackError(str(e))
+
+
+def __load_protos():
+ g = globals()
+ for k, v in g.iteritems():
+ if k.startswith('PPP_'):
+ name = k[4:]
+ modname = name.lower()
+ try:
+ mod = __import__(modname, g)
+ except ImportError:
+ continue
+ PPP.set_p(v, getattr(mod, name))
+
+
+if not PPP._protosw:
+ __load_protos()
diff --git a/external_libs/python/dpkt-1.8.6.2/dpkt/pppoe.py b/external_libs/python/dpkt-1.8.6.2/dpkt/pppoe.py
new file mode 100644
index 00000000..72e7a31b
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/dpkt/pppoe.py
@@ -0,0 +1,61 @@
+# $Id: pppoe.py 23 2006-11-08 15:45:33Z dugsong $
+# -*- coding: utf-8 -*-
+"""PPP-over-Ethernet."""
+
+import dpkt
+import ppp
+from decorators import deprecated
+
+# RFC 2516 codes
+PPPoE_PADI = 0x09
+PPPoE_PADO = 0x07
+PPPoE_PADR = 0x19
+PPPoE_PADS = 0x65
+PPPoE_PADT = 0xA7
+PPPoE_SESSION = 0x00
+
+
+class PPPoE(dpkt.Packet):
+ __hdr__ = (
+ ('v_type', 'B', 0x11),
+ ('code', 'B', 0),
+ ('session', 'H', 0),
+ ('len', 'H', 0) # payload length
+ )
+
+ @property
+ def v(self): return self.v_type >> 4
+
+ @v.setter
+ def v(self, v): self.v_type = (v << 4) | (self.v_type & 0xf)
+
+ @property
+ def type(self): return self.v_type & 0xf
+
+ @type.setter
+ def type(self, t): self.v_type = (self.v_type & 0xf0) | t
+
+ # Deprecated methods, will be removed in the future
+ # =================================================
+ @deprecated
+ def _get_v(self): return self.v
+
+ @deprecated
+ def _set_v(self, v): self.v = v
+
+ @deprecated
+ def _get_type(self): return self.type
+
+ @deprecated
+ def _set_type(self, t): self.type = t
+ # =================================================
+
+ def unpack(self, buf):
+ dpkt.Packet.unpack(self, buf)
+ try:
+ if self.code == 0:
+ self.data = self.ppp = ppp.PPP(self.data)
+ except dpkt.UnpackError:
+ pass
+
+# XXX - TODO TLVs, etc.
diff --git a/external_libs/python/dpkt-1.8.6.2/dpkt/qq.py b/external_libs/python/dpkt-1.8.6.2/dpkt/qq.py
new file mode 100644
index 00000000..3399d882
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/dpkt/qq.py
@@ -0,0 +1,224 @@
+# $Id: qq.py 48 2008-05-27 17:31:15Z yardley $
+# -*- coding: utf-8 -*-
+from dpkt import Packet
+
+# header_type
+QQ_HEADER_BASIC_FAMILY = 0x02
+QQ_HEADER_P2P_FAMILY = 0x00
+QQ_HEADER_03_FAMILY = 0x03
+QQ_HEADER_04_FAMILY = 0x04
+QQ_HEADER_05_FAMILY = 0x05
+
+header_type_str = [
+ "QQ_HEADER_P2P_FAMILY",
+ "Unknown Type",
+ "QQ_HEADER_03_FAMILY",
+ "QQ_HEADER_04_FAMILY",
+ "QQ_HEADER_05_FAMILY",
+]
+
+# command
+QQ_CMD_LOGOUT = 0x0001
+QQ_CMD_KEEP_ALIVE = 0x0002
+QQ_CMD_MODIFY_INFO = 0x0004
+QQ_CMD_SEARCH_USER = 0x0005
+QQ_CMD_GET_USER_INFO = 0x0006
+QQ_CMD_ADD_FRIEND = 0x0009
+QQ_CMD_DELETE_FRIEND = 0x000A
+QQ_CMD_ADD_FRIEND_AUTH = 0x000B
+QQ_CMD_CHANGE_STATUS = 0x000D
+QQ_CMD_ACK_SYS_MSG = 0x0012
+QQ_CMD_SEND_IM = 0x0016
+QQ_CMD_RECV_IM = 0x0017
+QQ_CMD_REMOVE_SELF = 0x001C
+QQ_CMD_REQUEST_KEY = 0x001D
+QQ_CMD_LOGIN = 0x0022
+QQ_CMD_GET_FRIEND_LIST = 0x0026
+QQ_CMD_GET_ONLINE_OP = 0x0027
+QQ_CMD_SEND_SMS = 0x002D
+QQ_CMD_CLUSTER_CMD = 0x0030
+QQ_CMD_TEST = 0x0031
+QQ_CMD_GROUP_DATA_OP = 0x003C
+QQ_CMD_UPLOAD_GROUP_FRIEND = 0x003D
+QQ_CMD_FRIEND_DATA_OP = 0x003E
+QQ_CMD_DOWNLOAD_GROUP_FRIEND = 0x0058
+QQ_CMD_FRIEND_LEVEL_OP = 0x005C
+QQ_CMD_PRIVACY_DATA_OP = 0x005E
+QQ_CMD_CLUSTER_DATA_OP = 0x005F
+QQ_CMD_ADVANCED_SEARCH = 0x0061
+QQ_CMD_REQUEST_LOGIN_TOKEN = 0x0062
+QQ_CMD_USER_PROPERTY_OP = 0x0065
+QQ_CMD_TEMP_SESSION_OP = 0x0066
+QQ_CMD_SIGNATURE_OP = 0x0067
+QQ_CMD_RECV_MSG_SYS = 0x0080
+QQ_CMD_RECV_MSG_FRIEND_CHANGE_STATUS = 0x0081
+QQ_CMD_WEATHER_OP = 0x00A6
+QQ_CMD_ADD_FRIEND_EX = 0x00A7
+QQ_CMD_AUTHORIZE = 0X00A8
+QQ_CMD_UNKNOWN = 0xFFFF
+QQ_SUB_CMD_SEARCH_ME_BY_QQ_ONLY = 0x03
+QQ_SUB_CMD_SHARE_GEOGRAPHY = 0x04
+QQ_SUB_CMD_GET_FRIEND_LEVEL = 0x02
+QQ_SUB_CMD_GET_CLUSTER_ONLINE_MEMBER = 0x01
+QQ_05_CMD_REQUEST_AGENT = 0x0021
+QQ_05_CMD_REQUEST_FACE = 0x0022
+QQ_05_CMD_TRANSFER = 0x0023
+QQ_05_CMD_REQUEST_BEGIN = 0x0026
+QQ_CLUSTER_CMD_CREATE_CLUSTER = 0x01
+QQ_CLUSTER_CMD_MODIFY_MEMBER = 0x02
+QQ_CLUSTER_CMD_MODIFY_CLUSTER_INFO = 0x03
+QQ_CLUSTER_CMD_GET_CLUSTER_INFO = 0x04
+QQ_CLUSTER_CMD_ACTIVATE_CLUSTER = 0x05
+QQ_CLUSTER_CMD_SEARCH_CLUSTER = 0x06
+QQ_CLUSTER_CMD_JOIN_CLUSTER = 0x07
+QQ_CLUSTER_CMD_JOIN_CLUSTER_AUTH = 0x08
+QQ_CLUSTER_CMD_EXIT_CLUSTER = 0x09
+QQ_CLUSTER_CMD_SEND_IM = 0x0A
+QQ_CLUSTER_CMD_GET_ONLINE_MEMBER = 0x0B
+QQ_CLUSTER_CMD_GET_MEMBER_INFO = 0x0C
+QQ_CLUSTER_CMD_MODIFY_CARD = 0x0E
+QQ_CLUSTER_CMD_GET_CARD_BATCH = 0x0F
+QQ_CLUSTER_CMD_GET_CARD = 0x10
+QQ_CLUSTER_CMD_COMMIT_ORGANIZATION = 0x11
+QQ_CLUSTER_CMD_UPDATE_ORGANIZATION = 0x12
+QQ_CLUSTER_CMD_COMMIT_MEMBER_ORGANIZATION = 0x13
+QQ_CLUSTER_CMD_GET_VERSION_ID = 0x19
+QQ_CLUSTER_CMD_SEND_IM_EX = 0x1A
+QQ_CLUSTER_CMD_SET_ROLE = 0x1B
+QQ_CLUSTER_CMD_TRANSFER_ROLE = 0x1C
+QQ_CLUSTER_CMD_CREATE_TEMP = 0x30
+QQ_CLUSTER_CMD_MODIFY_TEMP_MEMBER = 0x31
+QQ_CLUSTER_CMD_EXIT_TEMP = 0x32
+QQ_CLUSTER_CMD_GET_TEMP_INFO = 0x33
+QQ_CLUSTER_CMD_MODIFY_TEMP_INFO = 0x34
+QQ_CLUSTER_CMD_SEND_TEMP_IM = 0x35
+QQ_CLUSTER_CMD_SUB_CLUSTER_OP = 0x36
+QQ_CLUSTER_CMD_ACTIVATE_TEMP = 0x37
+
+QQ_CLUSTER_SUB_CMD_ADD_MEMBER = 0x01
+QQ_CLUSTER_SUB_CMD_REMOVE_MEMBER = 0x02
+QQ_CLUSTER_SUB_CMD_GET_SUBJECT_LIST = 0x02
+QQ_CLUSTER_SUB_CMD_GET_DIALOG_LIST = 0x01
+
+QQ_SUB_CMD_GET_ONLINE_FRIEND = 0x2
+QQ_SUB_CMD_GET_ONLINE_SERVICE = 0x3
+QQ_SUB_CMD_UPLOAD_GROUP_NAME = 0x2
+QQ_SUB_CMD_DOWNLOAD_GROUP_NAME = 0x1
+QQ_SUB_CMD_SEND_TEMP_SESSION_IM = 0x01
+QQ_SUB_CMD_BATCH_DOWNLOAD_FRIEND_REMARK = 0x0
+QQ_SUB_CMD_UPLOAD_FRIEND_REMARK = 0x1
+QQ_SUB_CMD_REMOVE_FRIEND_FROM_LIST = 0x2
+QQ_SUB_CMD_DOWNLOAD_FRIEND_REMARK = 0x3
+QQ_SUB_CMD_MODIFY_SIGNATURE = 0x01
+QQ_SUB_CMD_DELETE_SIGNATURE = 0x02
+QQ_SUB_CMD_GET_SIGNATURE = 0x03
+QQ_SUB_CMD_GET_USER_PROPERTY = 0x01
+QQ_SUB_CMD_GET_WEATHER = 0x01
+
+QQ_FILE_CMD_HEART_BEAT = 0x0001
+QQ_FILE_CMD_HEART_BEAT_ACK = 0x0002
+QQ_FILE_CMD_TRANSFER_FINISHED = 0x0003
+QQ_FILE_CMD_FILE_OP = 0x0007
+QQ_FILE_CMD_FILE_OP_ACK = 0x0008
+QQ_FILE_CMD_SENDER_SAY_HELLO = 0x0031
+QQ_FILE_CMD_SENDER_SAY_HELLO_ACK = 0x0032
+QQ_FILE_CMD_RECEIVER_SAY_HELLO = 0x0033
+QQ_FILE_CMD_RECEIVER_SAY_HELLO_ACK = 0x0034
+QQ_FILE_CMD_NOTIFY_IP_ACK = 0x003C
+QQ_FILE_CMD_PING = 0x003D
+QQ_FILE_CMD_PONG = 0x003E
+QQ_FILE_CMD_YES_I_AM_BEHIND_FIREWALL = 0x0040
+QQ_FILE_CMD_REQUEST_AGENT = 0x0001
+QQ_FILE_CMD_CHECK_IN = 0x0002
+QQ_FILE_CMD_FORWARD = 0x0003
+QQ_FILE_CMD_FORWARD_FINISHED = 0x0004
+QQ_FILE_CMD_IT_IS_TIME = 0x0005
+QQ_FILE_CMD_I_AM_READY = 0x0006
+
+command_str = {
+ 0x0001: "QQ_CMD_LOGOUT",
+ 0x0002: "QQ_CMD_KEEP_ALIVE",
+ 0x0004: "QQ_CMD_MODIFY_INFO",
+ 0x0005: "QQ_CMD_SEARCH_USER",
+ 0x0006: "QQ_CMD_GET_USER_INFO",
+ 0x0009: "QQ_CMD_ADD_FRIEND",
+ 0x000A: "QQ_CMD_DELETE_FRIEND",
+ 0x000B: "QQ_CMD_ADD_FRIEND_AUTH",
+ 0x000D: "QQ_CMD_CHANGE_STATUS",
+ 0x0012: "QQ_CMD_ACK_SYS_MSG",
+ 0x0016: "QQ_CMD_SEND_IM",
+ 0x0017: "QQ_CMD_RECV_IM",
+ 0x001C: "QQ_CMD_REMOVE_SELF",
+ 0x001D: "QQ_CMD_REQUEST_KEY",
+ 0x0022: "QQ_CMD_LOGIN",
+ 0x0026: "QQ_CMD_GET_FRIEND_LIST",
+ 0x0027: "QQ_CMD_GET_ONLINE_OP",
+ 0x002D: "QQ_CMD_SEND_SMS",
+ 0x0030: "QQ_CMD_CLUSTER_CMD",
+ 0x0031: "QQ_CMD_TEST",
+ 0x003C: "QQ_CMD_GROUP_DATA_OP",
+ 0x003D: "QQ_CMD_UPLOAD_GROUP_FRIEND",
+ 0x003E: "QQ_CMD_FRIEND_DATA_OP",
+ 0x0058: "QQ_CMD_DOWNLOAD_GROUP_FRIEND",
+ 0x005C: "QQ_CMD_FRIEND_LEVEL_OP",
+ 0x005E: "QQ_CMD_PRIVACY_DATA_OP",
+ 0x005F: "QQ_CMD_CLUSTER_DATA_OP",
+ 0x0061: "QQ_CMD_ADVANCED_SEARCH",
+ 0x0062: "QQ_CMD_REQUEST_LOGIN_TOKEN",
+ 0x0065: "QQ_CMD_USER_PROPERTY_OP",
+ 0x0066: "QQ_CMD_TEMP_SESSION_OP",
+ 0x0067: "QQ_CMD_SIGNATURE_OP",
+ 0x0080: "QQ_CMD_RECV_MSG_SYS",
+ 0x0081: "QQ_CMD_RECV_MSG_FRIEND_CHANGE_STATUS",
+ 0x00A6: "QQ_CMD_WEATHER_OP",
+ 0x00A7: "QQ_CMD_ADD_FRIEND_EX",
+ 0x00A8: "QQ_CMD_AUTHORIZE",
+ 0xFFFF: "QQ_CMD_UNKNOWN",
+ 0x0021: "_CMD_REQUEST_AGENT",
+ 0x0022: "_CMD_REQUEST_FACE",
+ 0x0023: "_CMD_TRANSFER",
+ 0x0026: "_CMD_REQUEST_BEGIN",
+}
+
+
+class QQBasicPacket(Packet):
+ __hdr__ = (
+ ('header_type', 'B', 2),
+ ('source', 'H', 0),
+ ('command', 'H', 0),
+ ('sequence', 'H', 0),
+ ('qqNum', 'L', 0),
+ )
+
+
+class QQ3Packet(Packet):
+ __hdr__ = (
+ ('header_type', 'B', 3),
+ ('command', 'B', 0),
+ ('sequence', 'H', 0),
+ ('unknown1', 'L', 0),
+ ('unknown2', 'L', 0),
+ ('unknown3', 'L', 0),
+ ('unknown4', 'L', 0),
+ ('unknown5', 'L', 0),
+ ('unknown6', 'L', 0),
+ ('unknown7', 'L', 0),
+ ('unknown8', 'L', 0),
+ ('unknown9', 'L', 0),
+ ('unknown10', 'B', 1),
+ ('unknown11', 'B', 0),
+ ('unknown12', 'B', 0),
+ ('source', 'H', 0),
+ ('unknown13', 'B', 0),
+ )
+
+
+class QQ5Packet(Packet):
+ __hdr__ = (
+ ('header_type', 'B', 5),
+ ('source', 'H', 0),
+ ('unknown', 'H', 0),
+ ('command', 'H', 0),
+ ('sequence', 'H', 0),
+ ('qqNum', 'L', 0),
+ )
diff --git a/external_libs/python/dpkt-1.8.6.2/dpkt/radiotap.py b/external_libs/python/dpkt-1.8.6.2/dpkt/radiotap.py
new file mode 100644
index 00000000..76e6306b
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/dpkt/radiotap.py
@@ -0,0 +1,532 @@
+# -*- coding: utf-8 -*-
+"""Radiotap"""
+
+import dpkt
+import ieee80211
+import socket
+from decorators import deprecated
+
+# Ref: http://www.radiotap.org
+# Fields Ref: http://www.radiotap.org/defined-fields/all
+
+# Present flags
+_TSFT_MASK = 0x1000000
+_FLAGS_MASK = 0x2000000
+_RATE_MASK = 0x4000000
+_CHANNEL_MASK = 0x8000000
+_FHSS_MASK = 0x10000000
+_ANT_SIG_MASK = 0x20000000
+_ANT_NOISE_MASK = 0x40000000
+_LOCK_QUAL_MASK = 0x80000000
+_TX_ATTN_MASK = 0x10000
+_DB_TX_ATTN_MASK = 0x20000
+_DBM_TX_POWER_MASK = 0x40000
+_ANTENNA_MASK = 0x80000
+_DB_ANT_SIG_MASK = 0x100000
+_DB_ANT_NOISE_MASK = 0x200000
+_RX_FLAGS_MASK = 0x400000
+_CHANNELPLUS_MASK = 0x200
+_EXT_MASK = 0x1
+
+_TSFT_SHIFT = 24
+_FLAGS_SHIFT = 25
+_RATE_SHIFT = 26
+_CHANNEL_SHIFT = 27
+_FHSS_SHIFT = 28
+_ANT_SIG_SHIFT = 29
+_ANT_NOISE_SHIFT = 30
+_LOCK_QUAL_SHIFT = 31
+_TX_ATTN_SHIFT = 16
+_DB_TX_ATTN_SHIFT = 17
+_DBM_TX_POWER_SHIFT = 18
+_ANTENNA_SHIFT = 19
+_DB_ANT_SIG_SHIFT = 20
+_DB_ANT_NOISE_SHIFT = 21
+_RX_FLAGS_SHIFT = 22
+_CHANNELPLUS_SHIFT = 10
+_EXT_SHIFT = 0
+
+# Flags elements
+_FLAGS_SIZE = 2
+_CFP_FLAG_SHIFT = 0
+_PREAMBLE_SHIFT = 1
+_WEP_SHIFT = 2
+_FRAG_SHIFT = 3
+_FCS_SHIFT = 4
+_DATA_PAD_SHIFT = 5
+_BAD_FCS_SHIFT = 6
+_SHORT_GI_SHIFT = 7
+
+# Channel type
+_CHAN_TYPE_SIZE = 4
+_CHANNEL_TYPE_SHIFT = 4
+_CCK_SHIFT = 5
+_OFDM_SHIFT = 6
+_TWO_GHZ_SHIFT = 7
+_FIVE_GHZ_SHIFT = 8
+_PASSIVE_SHIFT = 9
+_DYN_CCK_OFDM_SHIFT = 10
+_GFSK_SHIFT = 11
+_GSM_SHIFT = 12
+_STATIC_TURBO_SHIFT = 13
+_HALF_RATE_SHIFT = 14
+_QUARTER_RATE_SHIFT = 15
+
+# Flags offsets and masks
+_FCS_SHIFT = 4
+_FCS_MASK = 0x10
+
+
+class Radiotap(dpkt.Packet):
+ __hdr__ = (
+ ('version', 'B', 0),
+ ('pad', 'B', 0),
+ ('length', 'H', 0),
+ ('present_flags', 'I', 0)
+ )
+
+ @property
+ def tsft_present(self):
+ return (self.present_flags & _TSFT_MASK) >> _TSFT_SHIFT
+
+ @tsft_present.setter
+ def tsft_present(self, val):
+ self.present_flags |= val << _TSFT_SHIFT
+
+ @property
+ def flags_present(self):
+ return (self.present_flags & _FLAGS_MASK) >> _FLAGS_SHIFT
+
+ @flags_present.setter
+ def flags_present(self, val):
+ self.present_flags |= val << _FLAGS_SHIFT
+
+ @property
+ def rate_present(self):
+ return (self.present_flags & _RATE_MASK) >> _RATE_SHIFT
+
+ @rate_present.setter
+ def rate_present(self, val):
+ self.present_flags |= val << _RATE_SHIFT
+
+ @property
+ def channel_present(self):
+ return (self.present_flags & _CHANNEL_MASK) >> _CHANNEL_SHIFT
+
+ @channel_present.setter
+ def channel_present(self, val):
+ self.present_flags |= val << _CHANNEL_SHIFT
+
+ @property
+ def fhss_present(self):
+ return (self.present_flags & _FHSS_MASK) >> _FHSS_SHIFT
+
+ @fhss_present.setter
+ def fhss_present(self, val):
+ self.present_flags |= val << _FHSS_SHIFT
+
+ @property
+ def ant_sig_present(self):
+ return (self.present_flags & _ANT_SIG_MASK) >> _ANT_SIG_SHIFT
+
+ @ant_sig_present.setter
+ def ant_sig_present(self, val):
+ self.present_flags |= val << _ANT_SIG_SHIFT
+
+ @property
+ def ant_noise_present(self):
+ return (self.present_flags & _ANT_NOISE_MASK) >> _ANT_NOISE_SHIFT
+
+ @ant_noise_present.setter
+ def ant_noise_present(self, val):
+ self.present_flags |= val << _ANT_NOISE_SHIFT
+
+ @property
+ def lock_qual_present(self):
+ return (self.present_flags & _LOCK_QUAL_MASK) >> _LOCK_QUAL_SHIFT
+
+ @lock_qual_present.setter
+ def lock_qual_present(self, val):
+ self.present_flags |= val << _LOCK_QUAL_SHIFT
+
+ @property
+ def tx_attn_present(self):
+ return (self.present_flags & _TX_ATTN_MASK) >> _TX_ATTN_SHIFT
+
+ @tx_attn_present.setter
+ def tx_attn_present(self, val):
+ self.present_flags |= val << _TX_ATTN_SHIFT
+
+ @property
+ def db_tx_attn_present(self):
+ return (self.present_flags & _DB_TX_ATTN_MASK) >> _DB_TX_ATTN_SHIFT
+
+ @db_tx_attn_present.setter
+ def db_tx_attn_present(self, val):
+ self.present_flags |= val << _DB_TX_ATTN_SHIFT
+
+ @property
+ def dbm_tx_power_present(self):
+ return (self.present_flags & _DBM_TX_POWER_MASK) >> _DBM_TX_POWER_SHIFT
+
+ @dbm_tx_power_present.setter
+ def dbm_tx_power_present(self, val):
+ self.present_flags |= val << _DBM_TX_POWER_SHIFT
+
+ @property
+ def ant_present(self):
+ return (self.present_flags & _ANTENNA_MASK) >> _ANTENNA_SHIFT
+
+ @ant_present.setter
+ def ant_present(self, val):
+ self.present_flags |= val << _ANTENNA_SHIFT
+
+ @property
+ def db_ant_sig_present(self):
+ return (self.present_flags & _DB_ANT_SIG_MASK) >> _DB_ANT_SIG_SHIFT
+
+ @db_ant_sig_present.setter
+ def db_ant_sig_present(self, val):
+ self.present_flags |= val << _DB_ANT_SIG_SHIFT
+
+ @property
+ def db_ant_noise_present(self):
+ return (self.present_flags & _DB_ANT_NOISE_MASK) >> _DB_ANT_NOISE_SHIFT
+
+ @db_ant_noise_present.setter
+ def db_ant_noise_present(self, val):
+ self.present_flags |= val << _DB_ANT_NOISE_SHIFT
+
+ @property
+ def rx_flags_present(self):
+ return (self.present_flags & _RX_FLAGS_MASK) >> _RX_FLAGS_SHIFT
+
+ @rx_flags_present.setter
+ def rx_flags_present(self, val):
+ self.present_flags |= val << _RX_FLAGS_SHIFT
+
+ @property
+ def chanplus_present(self):
+ return (self.present_flags & _CHANNELPLUS_MASK) >> _CHANNELPLUS_SHIFT
+
+ @chanplus_present.setter
+ def chanplus_present(self, val):
+ self.present_flags |= val << _CHANNELPLUS_SHIFT
+
+ @property
+ def ext_present(self):
+ return (self.present_flags & _EXT_MASK) >> _EXT_SHIFT
+
+ @ext_present.setter
+ def ext_present(self, val):
+ self.present_flags |= val << _EXT_SHIFT
+
+ # Deprecated methods, will be removed in the future
+ # =================================================
+ @deprecated
+ def _get_tsft_present(self):
+ return self.tsft_present
+
+ @deprecated
+ def _set_tsft_present(self, val):
+ self.tsft_present = val
+
+ @deprecated
+ def _get_flags_present(self):
+ return self.flags_present
+
+ @deprecated
+ def _set_flags_present(self, val):
+ self.flags_present = val
+
+ @deprecated
+ def _get_rate_present(self):
+ return self.rate_present
+
+ @deprecated
+ def _set_rate_present(self, val):
+ self.rate_present = val
+
+ @deprecated
+ def _get_channel_present(self):
+ return self.channel_present
+
+ @deprecated
+ def _set_channel_present(self, val):
+ self.channel_present = val
+
+ @deprecated
+ def _get_fhss_present(self):
+ return self.fhss_present
+
+ @deprecated
+ def _set_fhss_present(self, val):
+ self.fhss_present = val
+
+ @deprecated
+ def _get_ant_sig_present(self):
+ return self.ant_sig_present
+
+ @deprecated
+ def _set_ant_sig_present(self, val):
+ self.ant_sig_present = val
+
+ @deprecated
+ def _get_ant_noise_present(self):
+ return self.ant_noise_present
+
+ @deprecated
+ def _set_ant_noise_present(self, val):
+ self.ant_noise_present = val
+
+ @deprecated
+ def _get_lock_qual_present(self):
+ return self.lock_qual_present
+
+ @deprecated
+ def _set_lock_qual_present(self, val):
+ self.lock_qual_present = val
+
+ @deprecated
+ def _get_tx_attn_present(self):
+ return self.tx_attn_present
+
+ @deprecated
+ def _set_tx_attn_present(self, val):
+ self.tx_attn_present = val
+
+ @deprecated
+ def _get_db_tx_attn_present(self):
+ return self.db_tx_attn_present
+
+ @deprecated
+ def _set_db_tx_attn_present(self, val):
+ self.db_tx_attn_present = val
+
+ @deprecated
+ def _get_dbm_power_present(self):
+ return self.dbm_tx_power_present
+
+ @deprecated
+ def _set_dbm_power_present(self, val):
+ self.dbm_tx_power_present = val
+
+ @deprecated
+ def _get_ant_present(self):
+ return self.ant_present
+
+ @deprecated
+ def _set_ant_present(self, val):
+ self.ant_present = val
+
+ @deprecated
+ def _get_db_ant_sig_present(self):
+ return self.db_ant_sig_present
+
+ @deprecated
+ def _set_db_ant_sig_present(self, val):
+ self.db_ant_sig_present = val
+
+ @deprecated
+ def _get_db_ant_noise_present(self):
+ return self.db_ant_noise_present
+
+ @deprecated
+ def _set_db_ant_noise_present(self, val):
+ self.db_ant_noise_present = val
+
+ @deprecated
+ def _get_rx_flags_present(self):
+ return self.rx_flags_present
+
+ @deprecated
+ def _set_rx_flags_present(self, val):
+ self.rx_flags_present = val
+
+ @deprecated
+ def _get_chanplus_present(self):
+ return self.chanplus_present
+
+ @deprecated
+ def _set_chanplus_present(self, val):
+ self.chanplus_present = val
+
+ @deprecated
+ def _get_ext_present(self):
+ return self.ext_present
+
+ @deprecated
+ def _set_ext_present(self, val):
+ self.ext_present = val
+
+ # =================================================
+
+ def unpack(self, buf):
+ dpkt.Packet.unpack(self, buf)
+ self.data = buf[socket.ntohs(self.length):]
+
+ self.fields = []
+ buf = buf[self.__hdr_len__:]
+
+ # decode each field into self.<name> (eg. self.tsft) as well as append it self.fields list
+ field_decoder = [
+ ('tsft', self.tsft_present, self.TSFT),
+ ('flags', self.flags_present, self.Flags),
+ ('rate', self.rate_present, self.Rate),
+ ('channel', self.channel_present, self.Channel),
+ ('fhss', self.fhss_present, self.FHSS),
+ ('ant_sig', self.ant_sig_present, self.AntennaSignal),
+ ('ant_noise', self.ant_noise_present, self.AntennaNoise),
+ ('lock_qual', self.lock_qual_present, self.LockQuality),
+ ('tx_attn', self.tx_attn_present, self.TxAttenuation),
+ ('db_tx_attn', self.db_tx_attn_present, self.DbTxAttenuation),
+ ('dbm_tx_power', self.dbm_tx_power_present, self.DbmTxPower),
+ ('ant', self.ant_present, self.Antenna),
+ ('db_ant_sig', self.db_ant_sig_present, self.DbAntennaSignal),
+ ('db_ant_noise', self.db_ant_noise_present, self.DbAntennaNoise),
+ ('rx_flags', self.rx_flags_present, self.RxFlags)
+ ]
+ for name, present_bit, parser in field_decoder:
+ if present_bit:
+ field = parser(buf)
+ field.data = ''
+ setattr(self, name, field)
+ self.fields.append(field)
+ buf = buf[len(field):]
+
+ if len(self.data) > 0:
+ if self.flags_present and self.flags.fcs:
+ self.data = ieee80211.IEEE80211(self.data, fcs=self.flags.fcs)
+ else:
+ self.data = ieee80211.IEEE80211(self.data)
+
+ class Antenna(dpkt.Packet):
+ __hdr__ = (
+ ('index', 'B', 0),
+ )
+
+ class AntennaNoise(dpkt.Packet):
+ __hdr__ = (
+ ('db', 'B', 0),
+ )
+
+ class AntennaSignal(dpkt.Packet):
+ __hdr__ = (
+ ('db', 'B', 0),
+ )
+
+ class Channel(dpkt.Packet):
+ __hdr__ = (
+ ('freq', 'H', 0),
+ ('flags', 'H', 0),
+ )
+
+ class FHSS(dpkt.Packet):
+ __hdr__ = (
+ ('set', 'B', 0),
+ ('pattern', 'B', 0),
+ )
+
+ class Flags(dpkt.Packet):
+ __hdr__ = (
+ ('val', 'B', 0),
+ )
+
+ @property
+ def fcs(self): return (self.val & _FCS_MASK) >> _FCS_SHIFT
+
+ # TODO statement seems to have no effect
+ @fcs.setter
+ def fcs(self, v): (v << _FCS_SHIFT) | (self.val & ~_FCS_MASK)
+
+ # Deprecated methods, will be removed in the future
+ # =================================================
+ @deprecated
+ def _get_fcs_present(self): return self.fcs
+
+ @deprecated
+ def _set_fcs_present(self, v): self.fcs = v
+
+ # =================================================
+
+ class LockQuality(dpkt.Packet):
+ __hdr__ = (
+ ('val', 'H', 0),
+ )
+
+ class RxFlags(dpkt.Packet):
+ __hdr__ = (
+ ('val', 'H', 0),
+ )
+
+ class Rate(dpkt.Packet):
+ __hdr__ = (
+ ('val', 'B', 0),
+ )
+
+ class TSFT(dpkt.Packet):
+ __hdr__ = (
+ ('usecs', 'Q', 0),
+ )
+
+ class TxAttenuation(dpkt.Packet):
+ __hdr__ = (
+ ('val', 'H', 0),
+ )
+
+ class DbTxAttenuation(dpkt.Packet):
+ __hdr__ = (
+ ('db', 'H', 0),
+ )
+
+ class DbAntennaNoise(dpkt.Packet):
+ __hdr__ = (
+ ('db', 'B', 0),
+ )
+
+ class DbAntennaSignal(dpkt.Packet):
+ __hdr__ = (
+ ('db', 'B', 0),
+ )
+
+ class DbmTxPower(dpkt.Packet):
+ __hdr__ = (
+ ('dbm', 'B', 0),
+ )
+
+
+def test_Radiotap():
+ s = '\x00\x00\x00\x18\x6e\x48\x00\x00\x00\x02\x6c\x09\xa0\x00\xa8\x81\x02\x00\x00\x00\x00\x00\x00\x00'
+ rad = Radiotap(s)
+ assert(rad.version == 0)
+ assert(rad.present_flags == 0x6e480000)
+ assert(rad.tsft_present == 0)
+ assert(rad.flags_present == 1)
+ assert(rad.rate_present == 1)
+ assert(rad.channel_present == 1)
+ assert(rad.fhss_present == 0)
+ assert(rad.ant_sig_present == 1)
+ assert(rad.ant_noise_present == 1)
+ assert(rad.lock_qual_present == 0)
+ assert(rad.db_tx_attn_present == 0)
+ assert(rad.dbm_tx_power_present == 0)
+ assert(rad.ant_present == 1)
+ assert(rad.db_ant_sig_present == 0)
+ assert(rad.db_ant_noise_present == 0)
+ assert(rad.rx_flags_present == 1)
+ assert(rad.channel.freq == 0x6c09)
+ assert(rad.channel.flags == 0xa000)
+ assert(len(rad.fields) == 7)
+
+
+def test_fcs():
+ s = '\x00\x00\x1a\x00\x2f\x48\x00\x00\x34\x8f\x71\x09\x00\x00\x00\x00\x10\x0c\x85\x09\xc0\x00\xcc\x01\x00\x00'
+ rt = Radiotap(s)
+ assert(rt.flags_present == 1)
+ assert(rt.flags.fcs == 1)
+
+
+if __name__ == '__main__':
+ test_Radiotap()
+ test_fcs()
+ print 'Tests Successful...' \ No newline at end of file
diff --git a/external_libs/python/dpkt-1.8.6.2/dpkt/radius.py b/external_libs/python/dpkt-1.8.6.2/dpkt/radius.py
new file mode 100644
index 00000000..740d5cd7
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/dpkt/radius.py
@@ -0,0 +1,91 @@
+# $Id: radius.py 23 2006-11-08 15:45:33Z dugsong $
+# -*- coding: utf-8 -*-
+"""Remote Authentication Dial-In User Service."""
+
+import dpkt
+
+# http://www.untruth.org/~josh/security/radius/radius-auth.html
+# RFC 2865
+
+
+class RADIUS(dpkt.Packet):
+ __hdr__ = (
+ ('code', 'B', 0),
+ ('id', 'B', 0),
+ ('len', 'H', 4),
+ ('auth', '16s', '')
+ )
+ attrs = ''
+
+ def unpack(self, buf):
+ dpkt.Packet.unpack(self, buf)
+ self.attrs = parse_attrs(self.data)
+ self.data = ''
+
+
+def parse_attrs(buf):
+ """Parse attributes buffer into a list of (type, data) tuples."""
+ attrs = []
+ while buf:
+ t = ord(buf[0])
+ l = ord(buf[1])
+ if l < 2:
+ break
+ d, buf = buf[2:l], buf[l:]
+ attrs.append((t, d))
+ return attrs
+
+# Codes
+RADIUS_ACCESS_REQUEST = 1
+RADIUS_ACCESS_ACCEPT = 2
+RADIUS_ACCESS_REJECT = 3
+RADIUS_ACCT_REQUEST = 4
+RADIUS_ACCT_RESPONSE = 5
+RADIUS_ACCT_STATUS = 6
+RADIUS_ACCESS_CHALLENGE = 11
+
+# Attributes
+RADIUS_USER_NAME = 1
+RADIUS_USER_PASSWORD = 2
+RADIUS_CHAP_PASSWORD = 3
+RADIUS_NAS_IP_ADDR = 4
+RADIUS_NAS_PORT = 5
+RADIUS_SERVICE_TYPE = 6
+RADIUS_FRAMED_PROTOCOL = 7
+RADIUS_FRAMED_IP_ADDR = 8
+RADIUS_FRAMED_IP_NETMASK = 9
+RADIUS_FRAMED_ROUTING = 10
+RADIUS_FILTER_ID = 11
+RADIUS_FRAMED_MTU = 12
+RADIUS_FRAMED_COMPRESSION = 13
+RADIUS_LOGIN_IP_HOST = 14
+RADIUS_LOGIN_SERVICE = 15
+RADIUS_LOGIN_TCP_PORT = 16
+# unassigned
+RADIUS_REPLY_MESSAGE = 18
+RADIUS_CALLBACK_NUMBER = 19
+RADIUS_CALLBACK_ID = 20
+# unassigned
+RADIUS_FRAMED_ROUTE = 22
+RADIUS_FRAMED_IPX_NETWORK = 23
+RADIUS_STATE = 24
+RADIUS_CLASS = 25
+RADIUS_VENDOR_SPECIFIC = 26
+RADIUS_SESSION_TIMEOUT = 27
+RADIUS_IDLE_TIMEOUT = 28
+RADIUS_TERMINATION_ACTION = 29
+RADIUS_CALLED_STATION_ID = 30
+RADIUS_CALLING_STATION_ID = 31
+RADIUS_NAS_ID = 32
+RADIUS_PROXY_STATE = 33
+RADIUS_LOGIN_LAT_SERVICE = 34
+RADIUS_LOGIN_LAT_NODE = 35
+RADIUS_LOGIN_LAT_GROUP = 36
+RADIUS_FRAMED_ATALK_LINK = 37
+RADIUS_FRAMED_ATALK_NETWORK = 38
+RADIUS_FRAMED_ATALK_ZONE = 39
+# 40-59 reserved for accounting
+RADIUS_CHAP_CHALLENGE = 60
+RADIUS_NAS_PORT_TYPE = 61
+RADIUS_PORT_LIMIT = 62
+RADIUS_LOGIN_LAT_PORT = 63
diff --git a/external_libs/python/dpkt-1.8.6.2/dpkt/rfb.py b/external_libs/python/dpkt-1.8.6.2/dpkt/rfb.py
new file mode 100644
index 00000000..6a69892f
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/dpkt/rfb.py
@@ -0,0 +1,90 @@
+# $Id: rfb.py 47 2008-05-27 02:10:00Z jon.oberheide $
+# -*- coding: utf-8 -*-
+"""Remote Framebuffer Protocol."""
+
+import dpkt
+
+# Remote Framebuffer Protocol
+# http://www.realvnc.com/docs/rfbproto.pdf
+
+# Client to Server Messages
+CLIENT_SET_PIXEL_FORMAT = 0
+CLIENT_SET_ENCODINGS = 2
+CLIENT_FRAMEBUFFER_UPDATE_REQUEST = 3
+CLIENT_KEY_EVENT = 4
+CLIENT_POINTER_EVENT = 5
+CLIENT_CUT_TEXT = 6
+
+# Server to Client Messages
+SERVER_FRAMEBUFFER_UPDATE = 0
+SERVER_SET_COLOUR_MAP_ENTRIES = 1
+SERVER_BELL = 2
+SERVER_CUT_TEXT = 3
+
+
+class RFB(dpkt.Packet):
+ __hdr__ = (
+ ('type', 'B', 0),
+ )
+
+
+class SetPixelFormat(dpkt.Packet):
+ __hdr__ = (
+ ('pad', '3s', ''),
+ ('pixel_fmt', '16s', '')
+ )
+
+
+class SetEncodings(dpkt.Packet):
+ __hdr__ = (
+ ('pad', '1s', ''),
+ ('num_encodings', 'H', 0)
+ )
+
+
+class FramebufferUpdateRequest(dpkt.Packet):
+ __hdr__ = (
+ ('incremental', 'B', 0),
+ ('x_position', 'H', 0),
+ ('y_position', 'H', 0),
+ ('width', 'H', 0),
+ ('height', 'H', 0)
+ )
+
+
+class KeyEvent(dpkt.Packet):
+ __hdr__ = (
+ ('down_flag', 'B', 0),
+ ('pad', '2s', ''),
+ ('key', 'I', 0)
+ )
+
+
+class PointerEvent(dpkt.Packet):
+ __hdr__ = (
+ ('button_mask', 'B', 0),
+ ('x_position', 'H', 0),
+ ('y_position', 'H', 0)
+ )
+
+
+class FramebufferUpdate(dpkt.Packet):
+ __hdr__ = (
+ ('pad', '1s', ''),
+ ('num_rects', 'H', 0)
+ )
+
+
+class SetColourMapEntries(dpkt.Packet):
+ __hdr__ = (
+ ('pad', '1s', ''),
+ ('first_colour', 'H', 0),
+ ('num_colours', 'H', 0)
+ )
+
+
+class CutText(dpkt.Packet):
+ __hdr__ = (
+ ('pad', '3s', ''),
+ ('length', 'I', 0)
+ )
diff --git a/external_libs/python/dpkt-1.8.6.2/dpkt/rip.py b/external_libs/python/dpkt-1.8.6.2/dpkt/rip.py
new file mode 100644
index 00000000..83f29f62
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/dpkt/rip.py
@@ -0,0 +1,89 @@
+# $Id: rip.py 23 2006-11-08 15:45:33Z dugsong $
+# -*- coding: utf-8 -*-
+"""Routing Information Protocol."""
+
+import dpkt
+
+# RIP v2 - RFC 2453
+# http://tools.ietf.org/html/rfc2453
+
+REQUEST = 1
+RESPONSE = 2
+
+
+class RIP(dpkt.Packet):
+ __hdr__ = (
+ ('cmd', 'B', REQUEST),
+ ('v', 'B', 2),
+ ('rsvd', 'H', 0)
+ )
+
+ def unpack(self, buf):
+ dpkt.Packet.unpack(self, buf)
+ l = []
+ self.auth = None
+ while self.data:
+ rte = RTE(self.data[:20])
+ if rte.family == 0xFFFF:
+ self.auth = Auth(self.data[:20])
+ else:
+ l.append(rte)
+ self.data = self.data[20:]
+ self.data = self.rtes = l
+
+ def __len__(self):
+ len = self.__hdr_len__
+ if self.auth:
+ len += len(self.auth)
+ len += sum(map(len, self.rtes))
+ return len
+
+ def __str__(self):
+ auth = ''
+ if self.auth:
+ auth = str(self.auth)
+ return self.pack_hdr() + auth + ''.join(map(str, self.rtes))
+
+
+class RTE(dpkt.Packet):
+ __hdr__ = (
+ ('family', 'H', 2),
+ ('route_tag', 'H', 0),
+ ('addr', 'I', 0),
+ ('subnet', 'I', 0),
+ ('next_hop', 'I', 0),
+ ('metric', 'I', 1)
+ )
+
+
+class Auth(dpkt.Packet):
+ __hdr__ = (
+ ('rsvd', 'H', 0xFFFF),
+ ('type', 'H', 2),
+ ('auth', '16s', 0)
+ )
+
+
+__s = '\x02\x02\x00\x00\x00\x02\x00\x00\x01\x02\x03\x00\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x02\x00\x00\xc0\xa8\x01\x08\xff\xff\xff\xfc\x00\x00\x00\x00\x00\x00\x00\x01'
+
+
+def test_rtp_pack():
+ r = RIP(__s)
+ assert (__s == str(r))
+
+
+def test_rtp_unpack():
+ r = RIP(__s)
+ assert (r.auth is None)
+ assert (len(r.rtes) == 2)
+
+ rte = r.rtes[1]
+ assert (rte.family == 2)
+ assert (rte.route_tag == 0)
+ assert (rte.metric == 1)
+
+
+if __name__ == '__main__':
+ test_rtp_pack()
+ test_rtp_unpack()
+ print 'Tests Successful...' \ No newline at end of file
diff --git a/external_libs/python/dpkt-1.8.6.2/dpkt/rpc.py b/external_libs/python/dpkt-1.8.6.2/dpkt/rpc.py
new file mode 100644
index 00000000..f12bc83b
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/dpkt/rpc.py
@@ -0,0 +1,161 @@
+# $Id: rpc.py 23 2006-11-08 15:45:33Z dugsong $
+# -*- coding: utf-8 -*-
+"""Remote Procedure Call."""
+
+import struct
+import dpkt
+
+# RPC.dir
+CALL = 0
+REPLY = 1
+
+# RPC.Auth.flavor
+AUTH_NONE = AUTH_NULL = 0
+AUTH_UNIX = 1
+AUTH_SHORT = 2
+AUTH_DES = 3
+
+# RPC.Reply.stat
+MSG_ACCEPTED = 0
+MSG_DENIED = 1
+
+# RPC.Reply.Accept.stat
+SUCCESS = 0
+PROG_UNAVAIL = 1
+PROG_MISMATCH = 2
+PROC_UNAVAIL = 3
+GARBAGE_ARGS = 4
+SYSTEM_ERR = 5
+
+# RPC.Reply.Reject.stat
+RPC_MISMATCH = 0
+AUTH_ERROR = 1
+
+
+class RPC(dpkt.Packet):
+ __hdr__ = (
+ ('xid', 'I', 0),
+ ('dir', 'I', CALL)
+ )
+
+ class Auth(dpkt.Packet):
+ __hdr__ = (('flavor', 'I', AUTH_NONE), )
+
+ def unpack(self, buf):
+ dpkt.Packet.unpack(self, buf)
+ n = struct.unpack('>I', self.data[:4])[0]
+ self.data = self.data[4:4 + n]
+
+ def __len__(self):
+ return 8 + len(self.data)
+
+ def __str__(self):
+ return self.pack_hdr() + struct.pack('>I', len(self.data)) + \
+ str(self.data)
+
+ class Call(dpkt.Packet):
+ __hdr__ = (
+ ('rpcvers', 'I', 2),
+ ('prog', 'I', 0),
+ ('vers', 'I', 0),
+ ('proc', 'I', 0)
+ )
+
+ def unpack(self, buf):
+ dpkt.Packet.unpack(self, buf)
+ self.cred = RPC.Auth(self.data)
+ self.verf = RPC.Auth(self.data[len(self.cred):])
+ self.data = self.data[len(self.cred) + len(self.verf):]
+
+ def __len__(self):
+ return len(str(self)) # XXX
+
+ def __str__(self):
+ return dpkt.Packet.__str__(self) + \
+ str(getattr(self, 'cred', RPC.Auth())) + \
+ str(getattr(self, 'verf', RPC.Auth())) + \
+ str(self.data)
+
+ class Reply(dpkt.Packet):
+ __hdr__ = (('stat', 'I', MSG_ACCEPTED), )
+
+ class Accept(dpkt.Packet):
+ __hdr__ = (('stat', 'I', SUCCESS), )
+
+ def unpack(self, buf):
+ self.verf = RPC.Auth(buf)
+ buf = buf[len(self.verf):]
+ self.stat = struct.unpack('>I', buf[:4])[0]
+ if self.stat == SUCCESS:
+ self.data = buf[4:]
+ elif self.stat == PROG_MISMATCH:
+ self.low, self.high = struct.unpack('>II', buf[4:12])
+ self.data = buf[12:]
+
+ def __len__(self):
+ if self.stat == PROG_MISMATCH: n = 8
+ else: n = 0
+ return len(self.verf) + 4 + n + len(self.data)
+
+ def __str__(self):
+ if self.stat == PROG_MISMATCH:
+ return str(self.verf) + struct.pack('>III', self.stat,
+ self.low, self.high) + self.data
+ return str(self.verf) + dpkt.Packet.__str__(self)
+
+ class Reject(dpkt.Packet):
+ __hdr__ = (('stat', 'I', AUTH_ERROR), )
+
+ def unpack(self, buf):
+ dpkt.Packet.unpack(self, buf)
+ if self.stat == RPC_MISMATCH:
+ self.low, self.high = struct.unpack('>II', self.data[:8])
+ self.data = self.data[8:]
+ elif self.stat == AUTH_ERROR:
+ self.why = struct.unpack('>I', self.data[:4])[0]
+ self.data = self.data[4:]
+
+ def __len__(self):
+ if self.stat == RPC_MISMATCH: n = 8
+ elif self.stat == AUTH_ERROR: n = 4
+ else: n = 0
+ return 4 + n + len(self.data)
+
+ def __str__(self):
+ if self.stat == RPC_MISMATCH:
+ return struct.pack('>III', self.stat, self.low, self.high) + self.data
+ elif self.stat == AUTH_ERROR:
+ return struct.pack('>II', self.stat, self.why) + self.data
+ return dpkt.Packet.__str__(self)
+
+ def unpack(self, buf):
+ dpkt.Packet.unpack(self, buf)
+ if self.stat == MSG_ACCEPTED:
+ self.data = self.accept = self.Accept(self.data)
+ elif self.status == MSG_DENIED:
+ self.data = self.reject = self.Reject(self.data)
+
+ def unpack(self, buf):
+ dpkt.Packet.unpack(self, buf)
+ if self.dir == CALL:
+ self.data = self.call = self.Call(self.data)
+ elif self.dir == REPLY:
+ self.data = self.reply = self.Reply(self.data)
+
+
+def unpack_xdrlist(cls, buf):
+ l = []
+ while buf:
+ if buf.startswith('\x00\x00\x00\x01'):
+ p = cls(buf[4:])
+ l.append(p)
+ buf = p.data
+ elif buf.startswith('\x00\x00\x00\x00'):
+ break
+ else:
+ raise dpkt.UnpackError, 'invalid XDR list'
+ return l
+
+
+def pack_xdrlist(*args):
+ return '\x00\x00\x00\x01'.join(map(str, args)) + '\x00\x00\x00\x00'
diff --git a/external_libs/python/dpkt-1.8.6.2/dpkt/rtp.py b/external_libs/python/dpkt-1.8.6.2/dpkt/rtp.py
new file mode 100644
index 00000000..9426d8c4
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/dpkt/rtp.py
@@ -0,0 +1,127 @@
+# $Id: rtp.py 23 2006-11-08 15:45:33Z dugsong $
+# -*- coding: utf-8 -*-
+"""Real-Time Transport Protocol"""
+
+from dpkt import Packet
+from decorators import deprecated
+
+# version 1100 0000 0000 0000 ! 0xC000 14
+# p 0010 0000 0000 0000 ! 0x2000 13
+# x 0001 0000 0000 0000 ! 0x1000 12
+# cc 0000 1111 0000 0000 ! 0x0F00 8
+# m 0000 0000 1000 0000 ! 0x0080 7
+# pt 0000 0000 0111 1111 ! 0x007F 0
+#
+
+_VERSION_MASK = 0xC000
+_P_MASK = 0x2000
+_X_MASK = 0x1000
+_CC_MASK = 0x0F00
+_M_MASK = 0x0080
+_PT_MASK = 0x007F
+_VERSION_SHIFT = 14
+_P_SHIFT = 13
+_X_SHIFT = 12
+_CC_SHIFT = 8
+_M_SHIFT = 7
+_PT_SHIFT = 0
+
+VERSION = 2
+
+
+class RTP(Packet):
+ __hdr__ = (
+ ('_type', 'H', 0x8000),
+ ('seq', 'H', 0),
+ ('ts', 'I', 0),
+ ('ssrc', 'I', 0),
+ )
+ csrc = ''
+
+ @property
+ def version(self): return (self._type & _VERSION_MASK) >> _VERSION_SHIFT
+
+ @version.setter
+ def version(self, ver):
+ self._type = (ver << _VERSION_SHIFT) | (self._type & ~_VERSION_MASK)
+
+ @property
+ def p(self): return (self._type & _P_MASK) >> _P_SHIFT
+
+ @p.setter
+ def p(self, p): self._type = (p << _P_SHIFT) | (self._type & ~_P_MASK)
+
+ @property
+ def x(self): return (self._type & _X_MASK) >> _X_SHIFT
+
+ @x.setter
+ def x(self, x): self._type = (x << _X_SHIFT) | (self._type & ~_X_MASK)
+
+ @property
+ def cc(self): return (self._type & _CC_MASK) >> _CC_SHIFT
+
+ @cc.setter
+ def cc(self, cc): self._type = (cc << _CC_SHIFT) | (self._type & ~_CC_MASK)
+
+ @property
+ def m(self): return (self._type & _M_MASK) >> _M_SHIFT
+
+ @m.setter
+ def m(self, m): self._type = (m << _M_SHIFT) | (self._type & ~_M_MASK)
+
+ @property
+ def pt(self): return (self._type & _PT_MASK) >> _PT_SHIFT
+
+ @pt.setter
+ def pt(self, m): self._type = (m << _PT_SHIFT) | (self._type & ~_PT_MASK)
+
+ # Deprecated methods, will be removed in the future
+ # =================================================
+ @deprecated
+ def _get_version(self): return self.version
+
+ @deprecated
+ def _set_version(self, ver): self.version = ver
+
+ @deprecated
+ def _get_p(self): return self.p
+
+ @deprecated
+ def _set_p(self, p): self.p = p
+
+ @deprecated
+ def _get_x(self): return self.x
+
+ @deprecated
+ def _set_x(self, x): self.x = x
+
+ @deprecated
+ def _get_cc(self): return self.cc
+
+ @deprecated
+ def _set_cc(self, cc): self.cc = cc
+
+ @deprecated
+ def _get_m(self): return self.m
+
+ @deprecated
+ def _set_m(self, m): self.m = m
+
+ @deprecated
+ def _get_pt(self): return self.pt
+
+ @deprecated
+ def _set_pt(self, pt): self.pt = pt
+ # =================================================
+
+ def __len__(self):
+ return self.__hdr_len__ + len(self.csrc) + len(self.data)
+
+ def __str__(self):
+ return self.pack_hdr() + self.csrc + str(self.data)
+
+ def unpack(self, buf):
+ super(RTP, self).unpack(buf)
+ self.csrc = buf[self.__hdr_len__:self.__hdr_len__ + self.cc * 4]
+ self.data = buf[self.__hdr_len__ + self.cc * 4:]
+
diff --git a/external_libs/python/dpkt-1.8.6.2/dpkt/rx.py b/external_libs/python/dpkt-1.8.6.2/dpkt/rx.py
new file mode 100644
index 00000000..8535a350
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/dpkt/rx.py
@@ -0,0 +1,45 @@
+# $Id: rx.py 23 2006-11-08 15:45:33Z jonojono $
+# -*- coding: utf-8 -*-
+"""Rx Protocol."""
+
+import dpkt
+
+# Types
+DATA = 0x01
+ACK = 0x02
+BUSY = 0x03
+ABORT = 0x04
+ACKALL = 0x05
+CHALLENGE = 0x06
+RESPONSE = 0x07
+DEBUG = 0x08
+
+# Flags
+CLIENT_INITIATED = 0x01
+REQUEST_ACK = 0x02
+LAST_PACKET = 0x04
+MORE_PACKETS = 0x08
+SLOW_START_OK = 0x20
+JUMBO_PACKET = 0x20
+
+# Security
+SEC_NONE = 0x00
+SEC_BCRYPT = 0x01
+SEC_RXKAD = 0x02
+SEC_RXKAD_ENC = 0x03
+
+
+class Rx(dpkt.Packet):
+ __hdr__ = (
+ ('epoch', 'I', 0),
+ ('cid', 'I', 0),
+ ('call', 'I', 1),
+ ('seq', 'I', 0),
+ ('serial', 'I', 1),
+ ('type', 'B', 0),
+ ('flags', 'B', CLIENT_INITIATED),
+ ('status', 'B', 0),
+ ('security', 'B', 0),
+ ('sum', 'H', 0),
+ ('service', 'H', 0)
+ )
diff --git a/external_libs/python/dpkt-1.8.6.2/dpkt/sccp.py b/external_libs/python/dpkt-1.8.6.2/dpkt/sccp.py
new file mode 100644
index 00000000..df862df3
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/dpkt/sccp.py
@@ -0,0 +1,214 @@
+# $Id: sccp.py 23 2006-11-08 15:45:33Z dugsong $
+# -*- coding: utf-8 -*-
+"""Cisco Skinny Client Control Protocol."""
+
+import dpkt
+
+KEYPAD_BUTTON = 0x00000003
+OFF_HOOK = 0x00000006
+ON_HOOK = 0x00000007
+OPEN_RECEIVE_CHANNEL_ACK = 0x00000022
+START_TONE = 0x00000082
+STOP_TONE = 0x00000083
+SET_LAMP = 0x00000086
+SET_SPEAKER_MODE = 0x00000088
+START_MEDIA_TRANSMIT = 0x0000008A
+STOP_MEDIA_TRANSMIT = 0x0000008B
+CALL_INFO = 0x0000008F
+DEFINE_TIME_DATE = 0x00000094
+DISPLAY_TEXT = 0x00000099
+OPEN_RECEIVE_CHANNEL = 0x00000105
+CLOSE_RECEIVE_CHANNEL = 0x00000106
+SELECT_SOFTKEYS = 0x00000110
+CALL_STATE = 0x00000111
+DISPLAY_PROMPT_STATUS = 0x00000112
+CLEAR_PROMPT_STATUS = 0x00000113
+ACTIVATE_CALL_PLANE = 0x00000116
+
+
+class ActivateCallPlane(dpkt.Packet):
+ __byte_order__ = '<'
+ __hdr__ = (
+ ('line_instance', 'I', 0),
+ )
+
+
+class CallInfo(dpkt.Packet):
+ __byte_order__ = '<'
+ __hdr__ = (
+ ('calling_party_name', '40s', ''),
+ ('calling_party', '24s', ''),
+ ('called_party_name', '40s', ''),
+ ('called_party', '24s', ''),
+ ('line_instance', 'I', 0),
+ ('call_id', 'I', 0),
+ ('call_type', 'I', 0),
+ ('orig_called_party_name', '40s', ''),
+ ('orig_called_party', '24s', '')
+ )
+
+
+class CallState(dpkt.Packet):
+ __byte_order__ = '<'
+ __hdr__ = (
+ ('call_state', 'I', 12), # 12: Proceed, 15: Connected
+ ('line_instance', 'I', 1),
+ ('call_id', 'I', 0)
+ )
+
+
+class ClearPromptStatus(dpkt.Packet):
+ __byte_order__ = '<'
+ __hdr__ = (
+ ('line_instance', 'I', 1),
+ ('call_id', 'I', 0)
+ )
+
+
+class CloseReceiveChannel(dpkt.Packet):
+ __byte_order__ = '<'
+ __hdr__ = (
+ ('conference_id', 'I', 0),
+ ('passthruparty_id', 'I', 0),
+ )
+
+
+class DisplayPromptStatus(dpkt.Packet):
+ __byte_order__ = '<'
+ __hdr__ = (
+ ('msg_timeout', 'I', 0),
+ ('display_msg', '32s', ''),
+ ('line_instance', 'I', 1),
+ ('call_id', 'I', 0)
+ )
+
+
+class DisplayText(dpkt.Packet):
+ __byte_order__ = '<'
+ __hdr__ = (
+ ('display_msg', '36s', ''),
+ )
+
+
+class KeypadButton(dpkt.Packet):
+ __byte_order__ = '<'
+ __hdr__ = (
+ ('button', 'I', 0),
+ )
+
+
+class OpenReceiveChannel(dpkt.Packet):
+ __byte_order__ = '<'
+ __hdr__ = (
+ ('conference_id', 'I', 0),
+ ('passthruparty_id', 'I', 0),
+ ('ms_packet', 'I', 0),
+ ('payload_capability', 'I', 4), # 4: G.711 u-law 64k
+ ('echo_cancel_type', 'I', 4),
+ ('g723_bitrate', 'I', 0),
+ )
+
+
+class OpenReceiveChannelAck(dpkt.Packet):
+ __byte_order__ = '<'
+ __hdr__ = (
+ ('channel_status', 'I', 0),
+ ('ip', '4s', ''),
+ ('port', 'I', 0),
+ ('passthruparty_id', 'I', 0),
+ )
+
+
+class SelectStartKeys(dpkt.Packet):
+ __byte_order__ = '<'
+ __hdr__ = (
+ ('line_id', 'I', 1),
+ ('call_id', 'I', 0),
+ ('softkey_set', 'I', 8),
+ ('softkey_map', 'I', 0xffffffffL)
+ )
+
+
+class SetLamp(dpkt.Packet):
+ __byte_order__ = '<'
+ __hdr__ = (
+ ('stimulus', 'I', 9), # 9: Line
+ ('stimulus_instance', 'I', 1),
+ ('lamp_mode', 'I', 1),
+ )
+
+
+class SetSpeakerMode(dpkt.Packet):
+ __byte_order__ = '<'
+ __hdr__ = (
+ ('speaker', 'I', 2), # 2: SpeakerOff
+ )
+
+
+class StartMediaTransmission(dpkt.Packet):
+ __byte_order__ = '<'
+ __hdr__ = (
+ ('conference_id', 'I', 0),
+ ('passthruparty_id', 'I', 0),
+ ('remote_ip', '4s', ''),
+ ('remote_port', 'I', 0),
+ ('ms_packet', 'I', 0),
+ ('payload_capability', 'I', 4), # 4: G.711 u-law 64k
+ ('precedence', 'I', 0),
+ ('silence_suppression', 'I', 0),
+ ('max_frames_per_pkt', 'I', 1),
+ ('g723_bitrate', 'I', 0),
+ )
+
+
+class StartTone(dpkt.Packet):
+ __byte_order__ = '<'
+ __hdr__ = (
+ ('tone', 'I', 0x24), # 0x24: AlertingTone
+ )
+
+
+class StopMediaTransmission(dpkt.Packet):
+ __byte_order__ = '<'
+ __hdr__ = (
+ ('conference_id', 'I', 0),
+ ('passthruparty_id', 'I', 0),
+ )
+
+
+class SCCP(dpkt.Packet):
+ __byte_order__ = '<'
+ __hdr__ = (
+ ('len', 'I', 0),
+ ('rsvd', 'I', 0),
+ ('msgid', 'I', 0),
+ ('msg', '0s', ''),
+ )
+ _msgsw = {
+ KEYPAD_BUTTON: KeypadButton,
+ OPEN_RECEIVE_CHANNEL_ACK: OpenReceiveChannelAck,
+ START_TONE: StartTone,
+ SET_LAMP: SetLamp,
+ START_MEDIA_TRANSMIT: StartMediaTransmission,
+ STOP_MEDIA_TRANSMIT: StopMediaTransmission,
+ CALL_INFO: CallInfo,
+ DISPLAY_TEXT: DisplayText,
+ OPEN_RECEIVE_CHANNEL: OpenReceiveChannel,
+ CLOSE_RECEIVE_CHANNEL: CloseReceiveChannel,
+ CALL_STATE: CallState,
+ DISPLAY_PROMPT_STATUS: DisplayPromptStatus,
+ CLEAR_PROMPT_STATUS: ClearPromptStatus,
+ ACTIVATE_CALL_PLANE: ActivateCallPlane,
+ }
+
+ def unpack(self, buf):
+ dpkt.Packet.unpack(self, buf)
+ n = self.len - 4
+ if n > len(self.data):
+ raise dpkt.NeedData('not enough data')
+ self.msg, self.data = self.data[:n], self.data[n:]
+ try:
+ p = self._msgsw[self.msgid](self.msg)
+ setattr(self, p.__class__.__name__.lower(), p)
+ except (KeyError, dpkt.UnpackError):
+ pass
diff --git a/external_libs/python/dpkt-1.8.6.2/dpkt/sctp.py b/external_libs/python/dpkt-1.8.6.2/dpkt/sctp.py
new file mode 100644
index 00000000..4ef251c8
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/dpkt/sctp.py
@@ -0,0 +1,95 @@
+# $Id: sctp.py 23 2006-11-08 15:45:33Z dugsong $
+# -*- coding: utf-8 -*-
+"""Stream Control Transmission Protocol."""
+
+import dpkt
+import crc32c
+
+# Stream Control Transmission Protocol
+# http://tools.ietf.org/html/rfc2960
+
+# Chunk Types
+DATA = 0
+INIT = 1
+INIT_ACK = 2
+SACK = 3
+HEARTBEAT = 4
+HEARTBEAT_ACK = 5
+ABORT = 6
+SHUTDOWN = 7
+SHUTDOWN_ACK = 8
+ERROR = 9
+COOKIE_ECHO = 10
+COOKIE_ACK = 11
+ECNE = 12
+CWR = 13
+SHUTDOWN_COMPLETE = 14
+
+
+class SCTP(dpkt.Packet):
+ __hdr__ = (
+ ('sport', 'H', 0),
+ ('dport', 'H', 0),
+ ('vtag', 'I', 0),
+ ('sum', 'I', 0)
+ )
+
+ def unpack(self, buf):
+ dpkt.Packet.unpack(self, buf)
+ l = []
+ while self.data:
+ chunk = Chunk(self.data)
+ l.append(chunk)
+ self.data = self.data[len(chunk):]
+ self.data = self.chunks = l
+
+ def __len__(self):
+ return self.__hdr_len__ + sum(map(len, self.data))
+
+ def __str__(self):
+ l = [str(x) for x in self.data]
+ if self.sum == 0:
+ s = crc32c.add(0xffffffffL, self.pack_hdr())
+ for x in l:
+ s = crc32c.add(s, x)
+ self.sum = crc32c.done(s)
+ return self.pack_hdr() + ''.join(l)
+
+
+class Chunk(dpkt.Packet):
+ __hdr__ = (
+ ('type', 'B', INIT),
+ ('flags', 'B', 0),
+ ('len', 'H', 0)
+ )
+
+ def unpack(self, buf):
+ dpkt.Packet.unpack(self, buf)
+ self.data = self.data[:self.len - self.__hdr_len__]
+
+
+__s = '\x80\x44\x00\x50\x00\x00\x00\x00\x30\xba\xef\x54\x01\x00\x00\x3c\x3b\xb9\x9c\x46\x00\x01\xa0\x00\x00\x0a\xff\xff\x2b\x2d\x7e\xb2\x00\x05\x00\x08\x9b\xe6\x18\x9b\x00\x05\x00\x08\x9b\xe6\x18\x9c\x00\x0c\x00\x06\x00\x05\x00\x00\x80\x00\x00\x04\xc0\x00\x00\x04\xc0\x06\x00\x08\x00\x00\x00\x00'
+
+
+def test_sctp_pack():
+ sctp = SCTP(__s)
+ assert (__s == str(sctp))
+ sctp.sum = 0
+ assert (__s == str(sctp))
+
+
+def test_sctp_unpack():
+ sctp = SCTP(__s)
+ assert (sctp.sport == 32836)
+ assert (sctp.dport == 80)
+ assert (len(sctp.chunks) == 1)
+ assert (len(sctp) == 72)
+ chunk = sctp.chunks[0]
+ assert (chunk.type == INIT)
+ assert (chunk.len == 60)
+
+
+if __name__ == '__main__':
+ test_sctp_pack()
+ test_sctp_unpack()
+ print 'Tests Successful...' \ No newline at end of file
diff --git a/external_libs/python/dpkt-1.8.6.2/dpkt/sip.py b/external_libs/python/dpkt-1.8.6.2/dpkt/sip.py
new file mode 100644
index 00000000..fef476da
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/dpkt/sip.py
@@ -0,0 +1,33 @@
+# $Id: sip.py 48 2008-05-27 17:31:15Z yardley $
+# -*- coding: utf-8 -*-
+"""Session Initiation Protocol."""
+
+import http
+
+
+class Request(http.Request):
+ """SIP request."""
+ __hdr_defaults__ = {
+ 'method': 'INVITE',
+ 'uri': 'sip:user@example.com',
+ 'version': '2.0',
+ 'headers': {'To': '', 'From': '', 'Call-ID': '', 'CSeq': '', 'Contact': ''}
+ }
+ __methods = dict.fromkeys((
+ 'ACK', 'BYE', 'CANCEL', 'INFO', 'INVITE', 'MESSAGE', 'NOTIFY',
+ 'OPTIONS', 'PRACK', 'PUBLISH', 'REFER', 'REGISTER', 'SUBSCRIBE',
+ 'UPDATE'
+ ))
+ __proto = 'SIP'
+
+
+class Response(http.Response):
+ """SIP response."""
+ __hdr_defaults__ = {
+ 'version': '2.0',
+ 'status': '200',
+ 'reason': 'OK',
+ 'headers': {'To': '', 'From': '', 'Call-ID': '', 'CSeq': '', 'Contact': ''}
+ }
+ __proto = 'SIP'
+
diff --git a/external_libs/python/dpkt-1.8.6.2/dpkt/sll.py b/external_libs/python/dpkt-1.8.6.2/dpkt/sll.py
new file mode 100644
index 00000000..3d1a1204
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/dpkt/sll.py
@@ -0,0 +1,26 @@
+# $Id: sll.py 23 2006-11-08 15:45:33Z dugsong $
+# -*- coding: utf-8 -*-
+"""Linux libpcap "cooked" capture encapsulation."""
+
+import arp
+import dpkt
+import ethernet
+
+
+class SLL(dpkt.Packet):
+ __hdr__ = (
+ ('type', 'H', 0), # 0: to us, 1: bcast, 2: mcast, 3: other, 4: from us
+ ('hrd', 'H', arp.ARP_HRD_ETH),
+ ('hlen', 'H', 6), # hardware address length
+ ('hdr', '8s', ''), # first 8 bytes of link-layer header
+ ('ethtype', 'H', ethernet.ETH_TYPE_IP),
+ )
+ _typesw = ethernet.Ethernet._typesw
+
+ def unpack(self, buf):
+ dpkt.Packet.unpack(self, buf)
+ try:
+ self.data = self._typesw[self.ethtype](self.data)
+ setattr(self, self.data.__class__.__name__.lower(), self.data)
+ except (KeyError, dpkt.UnpackError):
+ pass
diff --git a/external_libs/python/dpkt-1.8.6.2/dpkt/smb.py b/external_libs/python/dpkt-1.8.6.2/dpkt/smb.py
new file mode 100644
index 00000000..8517e64b
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/dpkt/smb.py
@@ -0,0 +1,20 @@
+# $Id: smb.py 23 2006-11-08 15:45:33Z dugsong $
+# -*- coding: utf-8 -*-
+"""Server Message Block."""
+
+import dpkt
+
+
+class SMB(dpkt.Packet):
+ __hdr__ = [
+ ('proto', '4s', ''),
+ ('cmd', 'B', 0),
+ ('err', 'I', 0),
+ ('flags1', 'B', 0),
+ ('flags2', 'B', 0),
+ ('pad', '6s', ''),
+ ('tid', 'H', 0),
+ ('pid', 'H', 0),
+ ('uid', 'H', 0),
+ ('mid', 'H', 0)
+ ]
diff --git a/external_libs/python/dpkt-1.8.6.2/dpkt/snoop.py b/external_libs/python/dpkt-1.8.6.2/dpkt/snoop.py
new file mode 100644
index 00000000..8090e855
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/dpkt/snoop.py
@@ -0,0 +1,122 @@
+# $Id$
+# -*- coding: utf-8 -*-
+"""Snoop file format."""
+
+import sys, time
+import dpkt
+
+# RFC 1761
+
+SNOOP_MAGIC = 0x736E6F6F70000000L
+
+SNOOP_VERSION = 2
+
+SDL_8023 = 0
+SDL_8024 = 1
+SDL_8025 = 2
+SDL_8026 = 3
+SDL_ETHER = 4
+SDL_HDLC = 5
+SDL_CHSYNC = 6
+SDL_IBMCC = 7
+SDL_FDDI = 8
+SDL_OTHER = 9
+
+dltoff = {SDL_ETHER: 14}
+
+
+class PktHdr(dpkt.Packet):
+ """snoop packet header."""
+ __byte_order__ = '!'
+ __hdr__ = (
+ ('orig_len', 'I', 0),
+ ('incl_len', 'I', 0),
+ ('rec_len', 'I', 0),
+ ('cum_drops', 'I', 0),
+ ('ts_sec', 'I', 0),
+ ('ts_usec', 'I', 0),
+ )
+
+
+class FileHdr(dpkt.Packet):
+ """snoop file header."""
+ __byte_order__ = '!'
+ __hdr__ = (
+ ('magic', 'Q', SNOOP_MAGIC),
+ ('v', 'I', SNOOP_VERSION),
+ ('linktype', 'I', SDL_ETHER),
+ )
+
+
+class Writer(object):
+ """Simple snoop dumpfile writer."""
+
+ def __init__(self, fileobj, linktype=SDL_ETHER):
+ self.__f = fileobj
+ fh = FileHdr(linktype=linktype)
+ self.__f.write(str(fh))
+
+ def writepkt(self, pkt, ts=None):
+ if ts is None:
+ ts = time.time()
+ s = str(pkt)
+ n = len(s)
+ pad_len = 4 - n % 4 if n % 4 else 0
+ ph = PktHdr(orig_len=n, incl_len=n,
+ rec_len=PktHdr.__hdr_len__ + n + pad_len,
+ ts_sec=int(ts),
+ ts_usec=int((int(ts) - float(ts)) * 1000000.0))
+ self.__f.write(str(ph))
+ self.__f.write(s + '\0' * pad_len)
+
+ def close(self):
+ self.__f.close()
+
+
+class Reader(object):
+ """Simple pypcap-compatible snoop file reader."""
+
+ def __init__(self, fileobj):
+ self.name = fileobj.name
+ self.fd = fileobj.fileno()
+ self.__f = fileobj
+ buf = self.__f.read(FileHdr.__hdr_len__)
+ self.__fh = FileHdr(buf)
+ self.__ph = PktHdr
+ if self.__fh.magic != SNOOP_MAGIC:
+ raise ValueError('invalid snoop header')
+ self.dloff = dltoff[self.__fh.linktype]
+ self.filter = ''
+
+ def fileno(self):
+ return self.fd
+
+ def datalink(self):
+ return self.__fh.linktype
+
+ def setfilter(self, value, optimize=1):
+ return NotImplementedError
+
+ def readpkts(self):
+ return list(self)
+
+ def dispatch(self, cnt, callback, *args):
+ if cnt > 0:
+ for i in range(cnt):
+ ts, pkt = self.next()
+ callback(ts, pkt, *args)
+ else:
+ for ts, pkt in self:
+ callback(ts, pkt, *args)
+
+ def loop(self, callback, *args):
+ self.dispatch(0, callback, *args)
+
+ def __iter__(self):
+ self.__f.seek(FileHdr.__hdr_len__)
+ while 1:
+ buf = self.__f.read(PktHdr.__hdr_len__)
+ if not buf: break
+ hdr = self.__ph(buf)
+ buf = self.__f.read(hdr.rec_len - PktHdr.__hdr_len__)
+ yield (hdr.ts_sec + (hdr.ts_usec / 1000000.0), buf[:hdr.incl_len])
diff --git a/external_libs/python/dpkt-1.8.6.2/dpkt/ssl.py b/external_libs/python/dpkt-1.8.6.2/dpkt/ssl.py
new file mode 100644
index 00000000..ea761552
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/dpkt/ssl.py
@@ -0,0 +1,579 @@
+# $Id: ssl.py 90 2014-04-02 22:06:23Z andrewflnr@gmail.com $
+# Portion Copyright 2012 Google Inc. All rights reserved.
+# -*- coding: utf-8 -*-
+"""Secure Sockets Layer / Transport Layer Security."""
+
+import dpkt
+import ssl_ciphersuites
+import struct
+import binascii
+
+#
+# Note from April 2011: cde...@gmail.com added code that parses SSL3/TLS messages more in depth.
+#
+# Jul 2012: afleenor@google.com modified and extended SSL support further.
+#
+
+
+class SSL2(dpkt.Packet):
+ __hdr__ = (
+ ('len', 'H', 0),
+ ('msg', 's', ''),
+ ('pad', 's', ''),
+ )
+
+ def unpack(self, buf):
+ dpkt.Packet.unpack(self, buf)
+ if self.len & 0x8000:
+ n = self.len = self.len & 0x7FFF
+ self.msg, self.data = self.data[:n], self.data[n:]
+ else:
+ n = self.len = self.len & 0x3FFF
+ padlen = ord(self.data[0])
+ self.msg = self.data[1:1 + n]
+ self.pad = self.data[1 + n:1 + n + padlen]
+ self.data = self.data[1 + n + padlen:]
+
+
+# SSLv3/TLS versions
+SSL3_V = 0x0300
+TLS1_V = 0x0301
+TLS11_V = 0x0302
+TLS12_V = 0x0303
+
+ssl3_versions_str = {
+ SSL3_V: 'SSL3',
+ TLS1_V: 'TLS 1.0',
+ TLS11_V: 'TLS 1.1',
+ TLS12_V: 'TLS 1.2'
+}
+
+SSL3_VERSION_BYTES = set(('\x03\x00', '\x03\x01', '\x03\x02', '\x03\x03'))
+
+
+# Alert levels
+SSL3_AD_WARNING = 1
+SSL3_AD_FATAL = 2
+alert_level_str = {
+ SSL3_AD_WARNING: 'SSL3_AD_WARNING',
+ SSL3_AD_FATAL: 'SSL3_AD_FATAL'
+}
+
+# SSL3 alert descriptions
+SSL3_AD_CLOSE_NOTIFY = 0
+SSL3_AD_UNEXPECTED_MESSAGE = 10 # fatal
+SSL3_AD_BAD_RECORD_MAC = 20 # fatal
+SSL3_AD_DECOMPRESSION_FAILURE = 30 # fatal
+SSL3_AD_HANDSHAKE_FAILURE = 40 # fatal
+SSL3_AD_NO_CERTIFICATE = 41
+SSL3_AD_BAD_CERTIFICATE = 42
+SSL3_AD_UNSUPPORTED_CERTIFICATE = 43
+SSL3_AD_CERTIFICATE_REVOKED = 44
+SSL3_AD_CERTIFICATE_EXPIRED = 45
+SSL3_AD_CERTIFICATE_UNKNOWN = 46
+SSL3_AD_ILLEGAL_PARAMETER = 47 # fatal
+
+# TLS1 alert descriptions
+TLS1_AD_DECRYPTION_FAILED = 21
+TLS1_AD_RECORD_OVERFLOW = 22
+TLS1_AD_UNKNOWN_CA = 48 # fatal
+TLS1_AD_ACCESS_DENIED = 49 # fatal
+TLS1_AD_DECODE_ERROR = 50 # fatal
+TLS1_AD_DECRYPT_ERROR = 51
+TLS1_AD_EXPORT_RESTRICTION = 60 # fatal
+TLS1_AD_PROTOCOL_VERSION = 70 # fatal
+TLS1_AD_INSUFFICIENT_SECURITY = 71 # fatal
+TLS1_AD_INTERNAL_ERROR = 80 # fatal
+TLS1_AD_USER_CANCELLED = 90
+TLS1_AD_NO_RENEGOTIATION = 100
+# /* codes 110-114 are from RFC3546 */
+TLS1_AD_UNSUPPORTED_EXTENSION = 110
+TLS1_AD_CERTIFICATE_UNOBTAINABLE = 111
+TLS1_AD_UNRECOGNIZED_NAME = 112
+TLS1_AD_BAD_CERTIFICATE_STATUS_RESPONSE = 113
+TLS1_AD_BAD_CERTIFICATE_HASH_VALUE = 114
+TLS1_AD_UNKNOWN_PSK_IDENTITY = 115 # fatal
+
+
+# Mapping alert types to strings
+alert_description_str = {
+ SSL3_AD_CLOSE_NOTIFY: 'SSL3_AD_CLOSE_NOTIFY',
+ SSL3_AD_UNEXPECTED_MESSAGE: 'SSL3_AD_UNEXPECTED_MESSAGE',
+ SSL3_AD_BAD_RECORD_MAC: 'SSL3_AD_BAD_RECORD_MAC',
+ SSL3_AD_DECOMPRESSION_FAILURE: 'SSL3_AD_DECOMPRESSION_FAILURE',
+ SSL3_AD_HANDSHAKE_FAILURE: 'SSL3_AD_HANDSHAKE_FAILURE',
+ SSL3_AD_NO_CERTIFICATE: 'SSL3_AD_NO_CERTIFICATE',
+ SSL3_AD_BAD_CERTIFICATE: 'SSL3_AD_BAD_CERTIFICATE',
+ SSL3_AD_UNSUPPORTED_CERTIFICATE: 'SSL3_AD_UNSUPPORTED_CERTIFICATE',
+ SSL3_AD_CERTIFICATE_REVOKED: 'SSL3_AD_CERTIFICATE_REVOKED',
+ SSL3_AD_CERTIFICATE_EXPIRED: 'SSL3_AD_CERTIFICATE_EXPIRED',
+ SSL3_AD_CERTIFICATE_UNKNOWN: 'SSL3_AD_CERTIFICATE_UNKNOWN',
+ SSL3_AD_ILLEGAL_PARAMETER: 'SSL3_AD_ILLEGAL_PARAMETER',
+ TLS1_AD_DECRYPTION_FAILED: 'TLS1_AD_DECRYPTION_FAILED',
+ TLS1_AD_RECORD_OVERFLOW: 'TLS1_AD_RECORD_OVERFLOW',
+ TLS1_AD_UNKNOWN_CA: 'TLS1_AD_UNKNOWN_CA',
+ TLS1_AD_ACCESS_DENIED: 'TLS1_AD_ACCESS_DENIED',
+ TLS1_AD_DECODE_ERROR: 'TLS1_AD_DECODE_ERROR',
+ TLS1_AD_DECRYPT_ERROR: 'TLS1_AD_DECRYPT_ERROR',
+ TLS1_AD_EXPORT_RESTRICTION: 'TLS1_AD_EXPORT_RESTRICTION',
+ TLS1_AD_PROTOCOL_VERSION: 'TLS1_AD_PROTOCOL_VERSION',
+ TLS1_AD_INSUFFICIENT_SECURITY: 'TLS1_AD_INSUFFICIENT_SECURITY',
+ TLS1_AD_INTERNAL_ERROR: 'TLS1_AD_INTERNAL_ERROR',
+ TLS1_AD_USER_CANCELLED: 'TLS1_AD_USER_CANCELLED',
+ TLS1_AD_NO_RENEGOTIATION: 'TLS1_AD_NO_RENEGOTIATION',
+ TLS1_AD_UNSUPPORTED_EXTENSION: 'TLS1_AD_UNSUPPORTED_EXTENSION',
+ TLS1_AD_CERTIFICATE_UNOBTAINABLE: 'TLS1_AD_CERTIFICATE_UNOBTAINABLE',
+ TLS1_AD_UNRECOGNIZED_NAME: 'TLS1_AD_UNRECOGNIZED_NAME',
+ TLS1_AD_BAD_CERTIFICATE_STATUS_RESPONSE: 'TLS1_AD_BAD_CERTIFICATE_STATUS_RESPONSE',
+ TLS1_AD_BAD_CERTIFICATE_HASH_VALUE: 'TLS1_AD_BAD_CERTIFICATE_HASH_VALUE',
+ TLS1_AD_UNKNOWN_PSK_IDENTITY: 'TLS1_AD_UNKNOWN_PSK_IDENTITY'
+}
+
+
+# struct format strings for parsing buffer lengths
+# don't forget, you have to pad a 3-byte value with \x00
+_SIZE_FORMATS = ['!B', '!H', '!I', '!I']
+
+
+def parse_variable_array(buf, lenbytes):
+ """
+ Parse an array described using the 'Type name<x..y>' syntax from the spec
+ Read a length at the start of buf, and returns that many bytes
+ after, in a tuple with the TOTAL bytes consumed (including the size). This
+ does not check that the array is the right length for any given datatype.
+ """
+ # first have to figure out how to parse length
+ assert lenbytes <= 4 # pretty sure 4 is impossible, too
+ size_format = _SIZE_FORMATS[lenbytes - 1]
+ padding = '\x00' if lenbytes == 3 else ''
+ # read off the length
+ size = struct.unpack(size_format, padding + buf[:lenbytes])[0]
+ # read the actual data
+ data = buf[lenbytes:lenbytes + size]
+ # if len(data) != size: insufficient data
+ return data, size + lenbytes
+
+
+class SSL3Exception(Exception):
+ pass
+
+
+class TLSRecord(dpkt.Packet):
+
+ """
+ SSLv3 or TLSv1+ packet.
+
+ In addition to the fields specified in the header, there are
+ compressed and decrypted fields, indicating whether, in the language
+ of the spec, this is a TLSPlaintext, TLSCompressed, or
+ TLSCiphertext. The application will have to figure out when it's
+ appropriate to change these values.
+ """
+
+ __hdr__ = (
+ ('type', 'B', 0),
+ ('version', 'H', 0),
+ ('length', 'H', 0),
+ )
+
+ def __init__(self, *args, **kwargs):
+ # assume plaintext unless specified otherwise in arguments
+ self.compressed = kwargs.pop('compressed', False)
+ self.encrypted = kwargs.pop('encrypted', False)
+ # parent constructor
+ dpkt.Packet.__init__(self, *args, **kwargs)
+ # make sure length and data are consistent
+ self.length = len(self.data)
+
+ def unpack(self, buf):
+ dpkt.Packet.unpack(self, buf)
+ header_length = self.__hdr_len__
+ self.data = buf[header_length:header_length + self.length]
+ # make sure buffer was long enough
+ if len(self.data) != self.length:
+ raise dpkt.NeedData('TLSRecord data was too short.')
+ # assume compressed and encrypted when it's been parsed from
+ # raw data
+ self.compressed = True
+ self.encrypted = True
+
+
+class TLSChangeCipherSpec(dpkt.Packet):
+
+ """
+ ChangeCipherSpec message is just a single byte with value 1
+ """
+
+ __hdr__ = (('type', 'B', 1),)
+
+
+class TLSAppData(str):
+
+ """
+ As far as TLSRecord is concerned, AppData is just an opaque blob.
+ """
+
+ pass
+
+
+class TLSAlert(dpkt.Packet):
+ __hdr__ = (
+ ('level', 'B', 1),
+ ('description', 'B', 0),
+ )
+
+
+class TLSHelloRequest(dpkt.Packet):
+ __hdr__ = tuple()
+
+
+class TLSClientHello(dpkt.Packet):
+ __hdr__ = (
+ ('version', 'H', 0x0301),
+ ('random', '32s', '\x00' * 32),
+ ) # the rest is variable-length and has to be done manually
+
+ def unpack(self, buf):
+ dpkt.Packet.unpack(self, buf)
+ # now session, cipher suites, extensions are in self.data
+ self.session_id, pointer = parse_variable_array(self.data, 1)
+ # print 'pointer',pointer
+ # handle ciphersuites
+ ciphersuites, parsed = parse_variable_array(self.data[pointer:], 2)
+ pointer += parsed
+ self.num_ciphersuites = len(ciphersuites) / 2
+ # check len(ciphersuites) % 2 == 0 ?
+ # compression methods
+ compression_methods, parsed = parse_variable_array(
+ self.data[pointer:], 1)
+ pointer += parsed
+ self.num_compression_methods = parsed - 1
+ self.compression_methods = map(ord, compression_methods)
+ # extensions
+
+
+class TLSServerHello(dpkt.Packet):
+ __hdr__ = (
+ ('version', 'H', '0x0301'),
+ ('random', '32s', '\x00' * 32),
+ ) # session is variable, forcing rest to be manual
+
+ def unpack(self, buf):
+ try:
+ dpkt.Packet.unpack(self, buf)
+ self.session_id, pointer = parse_variable_array(self.data, 1)
+ # single cipher suite
+ self.cipher_suite = struct.unpack('!H', self.data[pointer:pointer + 2])[0]
+ pointer += 2
+ # single compression method
+ self.compression = struct.unpack('!B', self.data[pointer:pointer + 1])[0]
+ pointer += 1
+ # ignore extensions for now
+ except struct.error:
+ # probably data too short
+ raise dpkt.NeedData
+
+
+class TLSUnknownHandshake(dpkt.Packet):
+ __hdr__ = tuple()
+
+
+TLSCertificate = TLSUnknownHandshake
+TLSServerKeyExchange = TLSUnknownHandshake
+TLSCertificateRequest = TLSUnknownHandshake
+TLSServerHelloDone = TLSUnknownHandshake
+TLSCertificateVerify = TLSUnknownHandshake
+TLSClientKeyExchange = TLSUnknownHandshake
+TLSFinished = TLSUnknownHandshake
+
+
+# mapping of handshake type ids to their names
+# and the classes that implement them
+HANDSHAKE_TYPES = {
+ 0: ('HelloRequest', TLSHelloRequest),
+ 1: ('ClientHello', TLSClientHello),
+ 2: ('ServerHello', TLSServerHello),
+ 11: ('Certificate', TLSCertificate),
+ 12: ('ServerKeyExchange', TLSServerKeyExchange),
+ 13: ('CertificateRequest', TLSCertificateRequest),
+ 14: ('ServerHelloDone', TLSServerHelloDone),
+ 15: ('CertificateVerify', TLSCertificateVerify),
+ 16: ('ClientKeyExchange', TLSClientKeyExchange),
+ 20: ('Finished', TLSFinished),
+}
+
+
+class TLSHandshake(dpkt.Packet):
+
+ """
+ A TLS Handshake message
+
+ This goes for all messages encapsulated in the Record layer, but especially
+ important for handshakes and app data: A message may be spread across a
+ number of TLSRecords, in addition to the possibility of there being more
+ than one in a given Record. You have to put together the contents of
+ TLSRecord's yourself.
+ """
+
+ # struct.unpack can't handle the 3-byte int, so we parse it as bytes
+ # (and store it as bytes so dpkt doesn't get confused), and turn it into
+ # an int in a user-facing property
+ __hdr__ = (
+ ('type', 'B', 0),
+ ('length_bytes', '3s', 0),
+ )
+
+ def unpack(self, buf):
+ dpkt.Packet.unpack(self, buf)
+ # Wait, might there be more than one message of self.type?
+ embedded_type = HANDSHAKE_TYPES.get(self.type, None)
+ if embedded_type is None:
+ raise SSL3Exception('Unknown or invalid handshake type %d' %
+ self.type)
+ # only take the right number of bytes
+ self.data = self.data[:self.length]
+ if len(self.data) != self.length:
+ raise dpkt.NeedData
+ # get class out of embedded_type tuple
+ self.data = embedded_type[1](self.data)
+
+ @property
+ def length(self):
+ return struct.unpack('!I', '\x00' + self.length_bytes)[0]
+
+
+RECORD_TYPES = {
+ 20: TLSChangeCipherSpec,
+ 21: TLSAlert,
+ 22: TLSHandshake,
+ 23: TLSAppData,
+}
+
+
+class SSLFactory(object):
+ def __new__(cls, buf):
+ v = buf[1:3]
+ if v in SSL3_VERSION_BYTES:
+ return TLSRecord(buf)
+ # SSL2 has no characteristic header or magic bytes, so we just assume
+ # that the msg is an SSL2 msg if it is not detected as SSL3+
+ return SSL2(buf)
+
+
+def tls_multi_factory(buf):
+ """
+ Attempt to parse one or more TLSRecord's out of buf
+
+ Args:
+ buf: string containing SSL/TLS messages. May have an incomplete record
+ on the end
+
+ Returns:
+ [TLSRecord]
+ int, total bytes consumed, != len(buf) if an incomplete record was left at
+ the end.
+
+ Raises SSL3Exception.
+ """
+ i, n = 0, len(buf)
+ msgs = []
+ while i < n:
+ v = buf[i + 1:i + 3]
+ if v in SSL3_VERSION_BYTES:
+ try:
+ msg = TLSRecord(buf[i:])
+ msgs.append(msg)
+ except dpkt.NeedData:
+ break
+ else:
+ raise SSL3Exception('Bad TLS version in buf: %r' % buf[i:i + 5])
+ i += len(msg)
+ return msgs, i
+
+_hexdecode = binascii.a2b_hex
+
+
+class TestTLSRecord(object):
+
+ """
+ Test basic TLSRecord functionality
+ For this test, the contents of the record doesn't matter, since we're not parsing the next layer.
+ """
+
+ @classmethod
+ def setup_class(cls):
+ # add some extra data, to make sure length is parsed correctly
+ cls.p = TLSRecord('\x17\x03\x01\x00\x08abcdefghzzzzzzzzzzz')
+
+ def test_content_type(self):
+ assert (self.p.type == 23)
+
+ def test_version(self):
+ assert (self.p.version == 0x0301)
+
+ def test_length(self):
+ assert (self.p.length == 8)
+
+ def test_data(self):
+ assert (self.p.data == 'abcdefgh')
+
+ def test_initial_flags(self):
+ assert (self.p.compressed == True)
+ assert (self.p.encrypted == True)
+
+ def test_repack(self):
+ p2 = TLSRecord(type=23, version=0x0301, data='abcdefgh')
+ assert (p2.type == 23)
+ assert (p2.version == 0x0301)
+ assert (p2.length == 8)
+ assert (p2.data == 'abcdefgh')
+ assert (p2.pack() == self.p.pack())
+
+ def test_total_length(self):
+ # that len(p) includes header
+ assert (len(self.p) == 13)
+
+ def test_raises_need_data_when_buf_is_short(self):
+ import pytest
+ pytest.raises(dpkt.NeedData, TLSRecord, '\x16\x03\x01\x00\x10abc')
+
+
+class TestTLSChangeCipherSpec(object):
+
+ """It's just a byte. This will be quick, I promise"""
+
+ @classmethod
+ def setup_class(cls):
+ cls.p = TLSChangeCipherSpec('\x01')
+
+ def test_parses(self):
+ assert (self.p.type == 1)
+
+ def test_total_length(self):
+ assert (len(self.p) == 1)
+
+
+class TestTLSAppData(object):
+
+ """AppData is basically just a string"""
+
+ def test_value(self):
+ d = TLSAppData('abcdefgh')
+ assert (d == 'abcdefgh')
+
+
+class TestTLSHandshake(object):
+ @classmethod
+ def setup_class(cls):
+ cls.h = TLSHandshake('\x00\x00\x00\x01\xff')
+
+ def test_created_inside_message(self):
+ assert (isinstance(self.h.data, TLSHelloRequest) == True)
+
+ def test_length(self):
+ assert (self.h.length == 0x01)
+
+ def test_raises_need_data(self):
+ import pytest
+ pytest.raises(dpkt.NeedData, TLSHandshake, '\x00\x00\x01\x01')
+
+
+class TestClientHello(object):
+
+ """This data is extracted from and verified by Wireshark"""
+
+ @classmethod
+ def setup_class(cls):
+ cls.data = _hexdecode(
+ "01000199" # handshake header
+ "0301" # version
+ "5008220ce5e0e78b6891afe204498c9363feffbe03235a2d9e05b7d990eb708d" # rand
+ "2009bc0192e008e6fa8fe47998fca91311ba30ddde14a9587dc674b11c3d3e5ed1" # session id
+ # cipher suites
+ "005400ffc00ac0140088008700390038c00fc00500840035c007c009c011c0130045004400330032c00cc00ec002c0040096004100050004002fc008c01200160013c00dc003feff000ac006c010c00bc00100020001"
+ "0100" # compresssion methods
+ # extensions
+ "00fc0000000e000c0000096c6f63616c686f7374000a00080006001700180019000b00020100002300d0a50b2e9f618a9ea9bf493ef49b421835cd2f6b05bbe1179d8edf70d58c33d656e8696d36d7e7e0b9d3ecc0e4de339552fa06c64c0fcb550a334bc43944e2739ca342d15a9ebbe981ac87a0d38160507d47af09bdc16c5f0ee4cdceea551539382333226048a026d3a90a0535f4a64236467db8fee22b041af986ad0f253bc369137cd8d8cd061925461d7f4d7895ca9a4181ab554dad50360ac31860e971483877c9335ac1300c5e78f3e56f3b8e0fc16358fcaceefd5c8d8aaae7b35be116f8832856ca61144fcdd95e071b94d0cf7233740000"
+ "FFFFFFFFFFFFFFFF") # random garbage
+ cls.p = TLSHandshake(cls.data)
+
+ def test_client_hello_constructed(self):
+ """Make sure the correct class was constructed"""
+ # print self.p
+ assert (isinstance(self.p.data, TLSClientHello) == True)
+
+ # def testClientDateCorrect(self):
+ # self.assertEqual(self.p.random_unixtime, 1342710284)
+
+ def test_client_random_correct(self):
+ assert (self.p.data.random == _hexdecode('5008220ce5e0e78b6891afe204498c9363feffbe03235a2d9e05b7d990eb708d'))
+
+ def test_cipher_suite_length(self):
+ # we won't bother testing the identity of each cipher suite in the list.
+ assert (self.p.data.num_ciphersuites == 42)
+ # self.assertEqual(len(self.p.ciphersuites), 42)
+
+ def test_session_id(self):
+ assert (self.p.data.session_id == _hexdecode('09bc0192e008e6fa8fe47998fca91311ba30ddde14a9587dc674b11c3d3e5ed1'))
+
+ def test_compression_methods(self):
+ assert (self.p.data.num_compression_methods == 1)
+
+ def test_total_length(self):
+ assert (len(self.p) == 413)
+
+
+class TestServerHello(object):
+
+ """Again, from Wireshark"""
+
+ @classmethod
+ def setup_class(cls):
+ cls.data = _hexdecode(
+ '0200004d03015008220c8ec43c5462315a7c99f5d5b6bff009ad285b51dc18485f352e9fdecd2009bc0192e008e6fa8fe47998fca91311ba30ddde14a9587dc674b11c3d3e5ed10002000005ff01000100')
+ cls.p = TLSHandshake(cls.data)
+
+ def test_constructed(self):
+ assert (isinstance(self.p.data, TLSServerHello) == True)
+
+ # def testDateCorrect(self):
+ # self.assertEqual(self.p.random_unixtime, 1342710284)
+
+ def test_random_correct(self):
+ assert (self.p.data.random == _hexdecode('5008220c8ec43c5462315a7c99f5d5b6bff009ad285b51dc18485f352e9fdecd'))
+
+ def test_cipher_suite(self):
+ assert (ssl_ciphersuites.BY_CODE[self.p.data.cipher_suite].name == 'TLS_RSA_WITH_NULL_SHA')
+
+ def test_total_length(self):
+ assert (len(self.p) == 81)
+
+
+class TestTLSMultiFactory(object):
+
+ """Made up test data"""
+
+ @classmethod
+ def setup_class(cls):
+ cls.data = _hexdecode('1703010010' # header 1
+ 'AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA' # data 1
+ '1703010010' # header 2
+ 'BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB' # data 2
+ '1703010010' # header 3
+ 'CCCCCCCC') # data 3 (incomplete)
+ cls.msgs, cls.bytes_parsed = tls_multi_factory(cls.data)
+
+ def test_num_messages(self):
+ # only complete messages should be parsed, incomplete ones left
+ # in buffer
+ assert (len(self.msgs) == 2)
+
+ def test_bytes_parsed(self):
+ assert (self.bytes_parsed == (5 + 16) * 2)
+
+ def test_first_msg_data(self):
+ assert (self.msgs[0].data == _hexdecode('AA' * 16))
+
+ def test_second_msg_data(self):
+ assert (self.msgs[1].data == _hexdecode('BB' * 16))
+
diff --git a/external_libs/python/dpkt-1.8.6.2/dpkt/ssl_ciphersuites.py b/external_libs/python/dpkt-1.8.6.2/dpkt/ssl_ciphersuites.py
new file mode 100644
index 00000000..d5ee1b9d
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/dpkt/ssl_ciphersuites.py
@@ -0,0 +1,76 @@
+# Copyright 2012 Google Inc. All rights reserved.
+# -*- coding: utf-8 -*-
+"""
+Nicely formatted cipher suite definitions for TLS
+
+A list of cipher suites in the form of CipherSuite objects.
+These are supposed to be immutable; don't mess with them.
+"""
+
+
+class CipherSuite(object):
+ """
+ Encapsulates a cipher suite.
+
+ Members/args:
+ * code: two-byte ID code, as int
+ * name: as in 'TLS_RSA_WITH_RC4_40_MD5'
+ * kx: key exchange algorithm, string
+ * auth: authentication algorithm, string
+ * encoding: encoding algorithm
+ * mac: message authentication code algorithm
+ """
+
+ def __init__(self, code, name, kx, auth, encoding, mac):
+ self.code = code
+ self.name = name
+ self.kx = kx
+ self.auth = auth
+ self.encoding = encoding
+ self.mac = mac
+
+ def __repr__(self):
+ return 'CipherSuite(%s)' % self.name
+
+ MAC_SIZES = {
+ 'MD5': 16,
+ 'SHA': 20,
+ 'SHA256': 32, # I guess
+ }
+
+ BLOCK_SIZES = {
+ 'AES_256_CBC': 16,
+ }
+
+ @property
+ def mac_size(self):
+ """In bytes. Default to 0."""
+ return self.MAC_SIZES.get(self.mac, 0)
+
+ @property
+ def block_size(self):
+ """In bytes. Default to 1."""
+ return self.BLOCK_SIZES.get(self.encoding, 1)
+
+
+# master list of CipherSuite Objects
+CIPHERSUITES = [
+ # not a real cipher suite, can be ignored, see RFC5746
+ CipherSuite(0xff, 'TLS_EMPTY_RENEGOTIATION_INFO',
+ 'NULL', 'NULL', 'NULL', 'NULL'),
+ CipherSuite(0x00, 'TLS_NULL_WITH_NULL_NULL',
+ 'NULL', 'NULL', 'NULL', 'NULL'),
+ CipherSuite(0x01, 'TLS_RSA_WITH_NULL_MD5', 'RSA', 'RSA', 'NULL', 'MD5'),
+ CipherSuite(0x02, 'TLS_RSA_WITH_NULL_SHA', 'RSA', 'RSA', 'NULL', 'SHA'),
+ CipherSuite(0x0039, 'TLS_DHE_RSA_WITH_AES_256_CBC_SHA',
+ 'DHE', 'RSA', 'AES_256_CBC', 'SHA'), # not sure I got the kx/auth thing right.
+ CipherSuite(0xffff, 'UNKNOWN_CIPHER', '', '', '', '')
+]
+
+BY_CODE = dict(
+ (cipher.code, cipher) for cipher in CIPHERSUITES)
+
+BY_NAME = dict(
+ (suite.name, suite) for suite in CIPHERSUITES)
+
+NULL_SUITE = BY_CODE[0x00]
diff --git a/external_libs/python/dpkt-1.8.6.2/dpkt/stp.py b/external_libs/python/dpkt-1.8.6.2/dpkt/stp.py
new file mode 100644
index 00000000..382318a4
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/dpkt/stp.py
@@ -0,0 +1,22 @@
+# $Id: stp.py 23 2006-11-08 15:45:33Z dugsong $
+# -*- coding: utf-8 -*-
+"""Spanning Tree Protocol."""
+
+import dpkt
+
+
+class STP(dpkt.Packet):
+ __hdr__ = (
+ ('proto_id', 'H', 0),
+ ('v', 'B', 0),
+ ('type', 'B', 0),
+ ('flags', 'B', 0),
+ ('root_id', '8s', ''),
+ ('root_path', 'I', 0),
+ ('bridge_id', '8s', ''),
+ ('port_id', 'H', 0),
+ ('age', 'H', 0),
+ ('max_age', 'H', 0),
+ ('hello', 'H', 0),
+ ('fd', 'H', 0)
+ )
diff --git a/external_libs/python/dpkt-1.8.6.2/dpkt/stun.py b/external_libs/python/dpkt-1.8.6.2/dpkt/stun.py
new file mode 100644
index 00000000..e371350c
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/dpkt/stun.py
@@ -0,0 +1,47 @@
+# $Id: stun.py 47 2008-05-27 02:10:00Z jon.oberheide $
+# -*- coding: utf-8 -*-
+"""Simple Traversal of UDP through NAT."""
+
+import struct
+import dpkt
+
+# STUN - RFC 3489
+# http://tools.ietf.org/html/rfc3489
+# Each packet has a 20 byte header followed by 0 or more attribute TLVs.
+
+# Message Types
+BINDING_REQUEST = 0x0001
+BINDING_RESPONSE = 0x0101
+BINDING_ERROR_RESPONSE = 0x0111
+SHARED_SECRET_REQUEST = 0x0002
+SHARED_SECRET_RESPONSE = 0x0102
+SHARED_SECRET_ERROR_RESPONSE = 0x0112
+
+# Message Attributes
+MAPPED_ADDRESS = 0x0001
+RESPONSE_ADDRESS = 0x0002
+CHANGE_REQUEST = 0x0003
+SOURCE_ADDRESS = 0x0004
+CHANGED_ADDRESS = 0x0005
+USERNAME = 0x0006
+PASSWORD = 0x0007
+MESSAGE_INTEGRITY = 0x0008
+ERROR_CODE = 0x0009
+UNKNOWN_ATTRIBUTES = 0x000a
+REFLECTED_FROM = 0x000b
+
+
+class STUN(dpkt.Packet):
+ __hdr__ = (
+ ('type', 'H', 0),
+ ('len', 'H', 0),
+ ('xid', '16s', 0)
+ )
+
+
+def tlv(buf):
+ n = 4
+ t, l = struct.unpack('>HH', buf[:n])
+ v = buf[n:n + l]
+ buf = buf[n + l:]
+ return t, l, v, buf
diff --git a/external_libs/python/dpkt-1.8.6.2/dpkt/tcp.py b/external_libs/python/dpkt-1.8.6.2/dpkt/tcp.py
new file mode 100644
index 00000000..fe1a3b97
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/dpkt/tcp.py
@@ -0,0 +1,152 @@
+# $Id: tcp.py 42 2007-08-02 22:38:47Z jon.oberheide $
+# -*- coding: utf-8 -*-
+"""Transmission Control Protocol."""
+
+import dpkt
+from decorators import deprecated
+
+# TCP control flags
+TH_FIN = 0x01 # end of data
+TH_SYN = 0x02 # synchronize sequence numbers
+TH_RST = 0x04 # reset connection
+TH_PUSH = 0x08 # push
+TH_ACK = 0x10 # acknowledgment number set
+TH_URG = 0x20 # urgent pointer set
+TH_ECE = 0x40 # ECN echo, RFC 3168
+TH_CWR = 0x80 # congestion window reduced
+
+TCP_PORT_MAX = 65535 # maximum port
+TCP_WIN_MAX = 65535 # maximum (unscaled) window
+
+
+class TCP(dpkt.Packet):
+ __hdr__ = (
+ ('sport', 'H', 0xdead),
+ ('dport', 'H', 0),
+ ('seq', 'I', 0xdeadbeefL),
+ ('ack', 'I', 0),
+ ('off_x2', 'B', ((5 << 4) | 0)),
+ ('flags', 'B', TH_SYN),
+ ('win', 'H', TCP_WIN_MAX),
+ ('sum', 'H', 0),
+ ('urp', 'H', 0)
+ )
+ opts = ''
+
+ @property
+ def off(self): return self.off_x2 >> 4
+
+ @off.setter
+ def off(self, off): self.off_x2 = (off << 4) | (self.off_x2 & 0xf)
+
+ # Deprecated methods, will be removed in the future
+ # =================================================
+ @deprecated
+ def _get_off(self): return self.off
+
+ @deprecated
+ def _set_off(self, off): self.off = off
+ # =================================================
+
+ def __len__(self):
+ return self.__hdr_len__ + len(self.opts) + len(self.data)
+
+ def __str__(self):
+ return self.pack_hdr() + self.opts + str(self.data)
+
+ def unpack(self, buf):
+ dpkt.Packet.unpack(self, buf)
+ ol = ((self.off_x2 >> 4) << 2) - self.__hdr_len__
+ if ol < 0:
+ raise dpkt.UnpackError, 'invalid header length'
+ self.opts = buf[self.__hdr_len__:self.__hdr_len__ + ol]
+ self.data = buf[self.__hdr_len__ + ol:]
+
+# Options (opt_type) - http://www.iana.org/assignments/tcp-parameters
+TCP_OPT_EOL = 0 # end of option list
+TCP_OPT_NOP = 1 # no operation
+TCP_OPT_MSS = 2 # maximum segment size
+TCP_OPT_WSCALE = 3 # window scale factor, RFC 1072
+TCP_OPT_SACKOK = 4 # SACK permitted, RFC 2018
+TCP_OPT_SACK = 5 # SACK, RFC 2018
+TCP_OPT_ECHO = 6 # echo (obsolete), RFC 1072
+TCP_OPT_ECHOREPLY = 7 # echo reply (obsolete), RFC 1072
+TCP_OPT_TIMESTAMP = 8 # timestamp, RFC 1323
+TCP_OPT_POCONN = 9 # partial order conn, RFC 1693
+TCP_OPT_POSVC = 10 # partial order service, RFC 1693
+TCP_OPT_CC = 11 # connection count, RFC 1644
+TCP_OPT_CCNEW = 12 # CC.NEW, RFC 1644
+TCP_OPT_CCECHO = 13 # CC.ECHO, RFC 1644
+TCP_OPT_ALTSUM = 14 # alt checksum request, RFC 1146
+TCP_OPT_ALTSUMDATA = 15 # alt checksum data, RFC 1146
+TCP_OPT_SKEETER = 16 # Skeeter
+TCP_OPT_BUBBA = 17 # Bubba
+TCP_OPT_TRAILSUM = 18 # trailer checksum
+TCP_OPT_MD5 = 19 # MD5 signature, RFC 2385
+TCP_OPT_SCPS = 20 # SCPS capabilities
+TCP_OPT_SNACK = 21 # selective negative acks
+TCP_OPT_REC = 22 # record boundaries
+TCP_OPT_CORRUPT = 23 # corruption experienced
+TCP_OPT_SNAP = 24 # SNAP
+TCP_OPT_TCPCOMP = 26 # TCP compression filter
+TCP_OPT_MAX = 27
+
+
+def parse_opts(buf):
+ """Parse TCP option buffer into a list of (option, data) tuples."""
+ opts = []
+ while buf:
+ o = ord(buf[0])
+ if o > TCP_OPT_NOP:
+ try:
+ # advance buffer at least 2 bytes = 1 type + 1 length
+ l = max(2, ord(buf[1]))
+ d, buf = buf[2:l], buf[l:]
+ except (IndexError, ValueError):
+ # print 'bad option', repr(str(buf))
+ opts.append(None) # XXX
+ break
+ else:
+ # options 0 and 1 are not followed by length byte
+ d, buf = '', buf[1:]
+ opts.append((o, d))
+ return opts
+
+
+def test_parse_opts():
+ # normal scenarios
+ buf = '\x02\x04\x23\x00\x01\x01\x04\x02'
+ opts = parse_opts(buf)
+ assert opts == [
+ (TCP_OPT_MSS, '\x23\x00'),
+ (TCP_OPT_NOP, ''),
+ (TCP_OPT_NOP, ''),
+ (TCP_OPT_SACKOK, '')
+ ]
+
+ buf = '\x01\x01\x05\x0a\x37\xf8\x19\x70\x37\xf8\x29\x78'
+ opts = parse_opts(buf)
+ assert opts == [
+ (TCP_OPT_NOP, ''),
+ (TCP_OPT_NOP, ''),
+ (TCP_OPT_SACK, '\x37\xf8\x19\x70\x37\xf8\x29\x78')
+ ]
+
+ # test a zero-length option
+ buf = '\x02\x00\x01'
+ opts = parse_opts(buf)
+ assert opts == [
+ (TCP_OPT_MSS, ''),
+ (TCP_OPT_NOP, '')
+ ]
+
+ # test a one-byte malformed option
+ buf = '\xff'
+ opts = parse_opts(buf)
+ assert opts == [None]
+
+
+if __name__ == '__main__':
+ # Runs all the test associated with this class/file
+ test_parse_opts()
+ print 'Tests Successful...'
diff --git a/external_libs/python/dpkt-1.8.6.2/dpkt/telnet.py b/external_libs/python/dpkt-1.8.6.2/dpkt/telnet.py
new file mode 100644
index 00000000..9a1d7f4c
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/dpkt/telnet.py
@@ -0,0 +1,80 @@
+# $Id: telnet.py 23 2006-11-08 15:45:33Z dugsong $
+# -*- coding: utf-8 -*-
+"""Telnet."""
+
+IAC = 255 # interpret as command:
+DONT = 254 # you are not to use option
+DO = 253 # please, you use option
+WONT = 252 # I won't use option
+WILL = 251 # I will use option
+SB = 250 # interpret as subnegotiation
+GA = 249 # you may reverse the line
+EL = 248 # erase the current line
+EC = 247 # erase the current character
+AYT = 246 # are you there
+AO = 245 # abort output--but let prog finish
+IP = 244 # interrupt process--permanently
+BREAK = 243 # break
+DM = 242 # data mark--for connect. cleaning
+NOP = 241 # nop
+SE = 240 # end sub negotiation
+EOR = 239 # end of record (transparent mode)
+ABORT = 238 # Abort process
+SUSP = 237 # Suspend process
+xEOF = 236 # End of file: EOF is already used...
+
+SYNCH = 242 # for telfunc calls
+
+
+def strip_options(buf):
+ """Return a list of lines and dict of options from telnet data."""
+ l = buf.split(chr(IAC))
+ # print l
+ b = []
+ d = {}
+ subopt = False
+ for w in l:
+ if not w:
+ continue
+ o = ord(w[0])
+ if o > SB:
+ # print 'WILL/WONT/DO/DONT/IAC', `w`
+ w = w[2:]
+ elif o == SE:
+ # print 'SE', `w`
+ w = w[1:]
+ subopt = False
+ elif o == SB:
+ # print 'SB', `w`
+ subopt = True
+ for opt in ('USER', 'DISPLAY', 'TERM'):
+ p = w.find(opt + '\x01')
+ if p != -1:
+ d[opt] = w[p + len(opt) + 1:].split('\x00', 1)[0]
+ w = None
+ elif subopt:
+ w = None
+ if w:
+ w = w.replace('\x00', '\n').splitlines()
+ if not w[-1]: w.pop()
+ b.extend(w)
+ return b, d
+
+
+def test_telnet():
+ l = []
+ s = "\xff\xfb%\xff\xfa%\x00\x00\x00\xff\xf0\xff\xfd&\xff\xfa&\x05\xff\xf0\xff\xfa&\x01\x01\x02\xff\xf0\xff\xfb\x18\xff\xfb \xff\xfb#\xff\xfb'\xff\xfc$\xff\xfa \x0038400,38400\xff\xf0\xff\xfa#\x00doughboy.citi.umich.edu:0.0\xff\xf0\xff\xfa'\x00\x00DISPLAY\x01doughboy.citi.umich.edu:0.0\x00USER\x01dugsong\xff\xf0\xff\xfa\x18\x00XTERM\xff\xf0\xff\xfd\x03\xff\xfc\x01\xff\xfb\x1f\xff\xfa\x1f\x00P\x00(\xff\xf0\xff\xfd\x05\xff\xfb!\xff\xfd\x01fugly\r\x00yoda\r\x00bashtard\r\x00"
+ l.append(s)
+ s = '\xff\xfd\x01\xff\xfd\x03\xff\xfb\x18\xff\xfb\x1f\xff\xfa\x1f\x00X\x002\xff\xf0admin\r\x00\xff\xfa\x18\x00LINUX\xff\xf0foobar\r\x00enable\r\x00foobar\r\x00\r\x00show ip int Vlan 666\r\x00'
+ l.append(s)
+ s = '\xff\xfb%\xff\xfa%\x00\x00\x00\xff\xf0\xff\xfd&\xff\xfa&\x05\xff\xf0\xff\xfa&\x01\x01\x02\xff\xf0\xff\xfb&\xff\xfb\x18\xff\xfb \xff\xfb#\xff\xfb\'\xff\xfc$\xff\xfa \x0038400,38400\xff\xf0\xff\xfa#\x00doughboy.citi.umich.edu:0.0\xff\xf0\xff\xfa\'\x00\x00DISPLAY\x01doughboy.citi.umich.edu:0.0\x00USER\x01dugsong\xff\xf0\xff\xfa\x18\x00XTERM\xff\xf0\xff\xfd\x03\xff\xfc\x01\xff\xfb"\xff\xfa"\x03\x01\x03\x00\x03b\x03\x04\x02\x0f\x05\x00\xff\xff\x07b\x1c\x08\x02\x04\tB\x1a\n\x02\x7f\x0b\x02\x15\x0c\x02\x17\r\x02\x12\x0e\x02\x16\x0f\x02\x11\x10\x02\x13\x11\x00\xff\xff\x12\x00\xff\xff\xff\xf0\xff\xfb\x1f\xff\xfa\x1f\x00P\x00(\xff\xf0\xff\xfd\x05\xff\xfb!\xff\xfa"\x01\x0f\xff\xf0\xff\xfd\x01\xff\xfe\x01\xff\xfa"\x03\x01\x80\x00\xff\xf0\xff\xfd\x01werd\r\n\xff\xfe\x01yoda\r\n\xff\xfd\x01darthvader\r\n\xff\xfe\x01'
+ l.append(s)
+ exp = [(['fugly', 'yoda', 'bashtard'], {'USER': 'dugsong', 'DISPLAY': 'doughboy.citi.umich.edu:0.0'}),
+ (['admin', 'foobar', 'enable', 'foobar', '', 'show ip int Vlan 666'], {}),
+ (['werd', 'yoda', 'darthvader'], {'USER': 'dugsong', 'DISPLAY': 'doughboy.citi.umich.edu:0.0'})]
+ assert (map(strip_options, l) == exp)
+
+
+if __name__ == '__main__':
+ test_telnet()
+ print 'Tests Successful...' \ No newline at end of file
diff --git a/external_libs/python/dpkt-1.8.6.2/dpkt/tftp.py b/external_libs/python/dpkt-1.8.6.2/dpkt/tftp.py
new file mode 100644
index 00000000..928ee1e3
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/dpkt/tftp.py
@@ -0,0 +1,56 @@
+# $Id: tftp.py 23 2006-11-08 15:45:33Z dugsong $
+# -*- coding: utf-8 -*-
+"""Trivial File Transfer Protocol."""
+
+import struct
+import dpkt
+
+# Opcodes
+OP_RRQ = 1 # read request
+OP_WRQ = 2 # write request
+OP_DATA = 3 # data packet
+OP_ACK = 4 # acknowledgment
+OP_ERR = 5 # error code
+
+# Error codes
+EUNDEF = 0 # not defined
+ENOTFOUND = 1 # file not found
+EACCESS = 2 # access violation
+ENOSPACE = 3 # disk full or allocation exceeded
+EBADOP = 4 # illegal TFTP operation
+EBADID = 5 # unknown transfer ID
+EEXISTS = 6 # file already exists
+ENOUSER = 7 # no such user
+
+
+class TFTP(dpkt.Packet):
+ __hdr__ = (('opcode', 'H', 1), )
+
+ def unpack(self, buf):
+ dpkt.Packet.unpack(self, buf)
+ if self.opcode in (OP_RRQ, OP_WRQ):
+ l = self.data.split('\x00')
+ self.filename = l[0]
+ self.mode = l[1]
+ self.data = ''
+ elif self.opcode in (OP_DATA, OP_ACK):
+ self.block = struct.unpack('>H', self.data[:2])
+ self.data = self.data[2:]
+ elif self.opcode == OP_ERR:
+ self.errcode = struct.unpack('>H', self.data[:2])
+ self.errmsg = self.data[2:].split('\x00')[0]
+ self.data = ''
+
+ def __len__(self):
+ return len(str(self))
+
+ def __str__(self):
+ if self.opcode in (OP_RRQ, OP_WRQ):
+ s = '%s\x00%s\x00' % (self.filename, self.mode)
+ elif self.opcode in (OP_DATA, OP_ACK):
+ s = struct.pack('>H', self.block)
+ elif self.opcode == OP_ERR:
+ s = struct.pack('>H', self.errcode) + ('%s\x00' % self.errmsg)
+ else:
+ s = ''
+ return self.pack_hdr() + s + self.data
diff --git a/external_libs/python/dpkt-1.8.6.2/dpkt/tns.py b/external_libs/python/dpkt-1.8.6.2/dpkt/tns.py
new file mode 100644
index 00000000..931508e6
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/dpkt/tns.py
@@ -0,0 +1,26 @@
+# $Id: tns.py 23 2006-11-08 15:45:33Z dugsong $
+# -*- coding: utf-8 -*-
+"""Transparent Network Substrate."""
+
+import dpkt
+
+
+class TNS(dpkt.Packet):
+ __hdr__ = (
+ ('length', 'H', 0),
+ ('pktsum', 'H', 0),
+ ('type', 'B', 0),
+ ('rsvd', 'B', 0),
+ ('hdrsum', 'H', 0),
+ ('msg', '0s', ''),
+ )
+
+ def unpack(self, buf):
+ dpkt.Packet.unpack(self, buf)
+ n = self.length - self.__hdr_len__
+ if n > len(self.data):
+ raise dpkt.NeedData('short message (missing %d bytes)' %
+ (n - len(self.data)))
+ self.msg = self.data[:n]
+ self.data = self.data[n:]
+
diff --git a/external_libs/python/dpkt-1.8.6.2/dpkt/tpkt.py b/external_libs/python/dpkt-1.8.6.2/dpkt/tpkt.py
new file mode 100644
index 00000000..d235833b
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/dpkt/tpkt.py
@@ -0,0 +1,16 @@
+# $Id: tpkt.py 23 2006-11-08 15:45:33Z dugsong $
+# -*- coding: utf-8 -*-
+"""ISO Transport Service on top of the TCP (TPKT)."""
+
+import dpkt
+
+# TPKT - RFC 1006 Section 6
+# http://www.faqs.org/rfcs/rfc1006.html
+
+
+class TPKT(dpkt.Packet):
+ __hdr__ = (
+ ('v', 'B', 3),
+ ('rsvd', 'B', 0),
+ ('len', 'H', 0)
+ )
diff --git a/external_libs/python/dpkt-1.8.6.2/dpkt/udp.py b/external_libs/python/dpkt-1.8.6.2/dpkt/udp.py
new file mode 100644
index 00000000..41a00e78
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/dpkt/udp.py
@@ -0,0 +1,17 @@
+# $Id: udp.py 23 2006-11-08 15:45:33Z dugsong $
+# -*- coding: utf-8 -*-
+"""User Datagram Protocol."""
+
+import dpkt
+
+UDP_HDR_LEN = 8
+UDP_PORT_MAX = 65535
+
+
+class UDP(dpkt.Packet):
+ __hdr__ = (
+ ('sport', 'H', 0xdead),
+ ('dport', 'H', 0),
+ ('ulen', 'H', 8),
+ ('sum', 'H', 0)
+ )
diff --git a/external_libs/python/dpkt-1.8.6.2/dpkt/vrrp.py b/external_libs/python/dpkt-1.8.6.2/dpkt/vrrp.py
new file mode 100644
index 00000000..6bdff005
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/dpkt/vrrp.py
@@ -0,0 +1,70 @@
+# $Id: vrrp.py 88 2013-03-05 19:43:17Z andrewflnr@gmail.com $
+# -*- coding: utf-8 -*-
+"""Virtual Router Redundancy Protocol."""
+
+import dpkt
+from decorators import deprecated
+
+
+class VRRP(dpkt.Packet):
+ __hdr__ = (
+ ('vtype', 'B', 0x21),
+ ('vrid', 'B', 0),
+ ('priority', 'B', 0),
+ ('count', 'B', 0),
+ ('atype', 'B', 0),
+ ('advtime', 'B', 0),
+ ('sum', 'H', 0),
+ )
+ addrs = ()
+ auth = ''
+
+ @property
+ def v(self):
+ return self.vtype >> 4
+
+ @v.setter
+ def v(self, v):
+ self.vtype = (self.vtype & ~0xf) | (v << 4)
+
+ @property
+ def type(self):
+ return self.vtype & 0xf
+
+ @type.setter
+ def type(self, v):
+ self.vtype = (self.vtype & ~0xf0) | (v & 0xf)
+
+ # Deprecated methods, will be removed in the future
+ # =================================================
+ @deprecated
+ def _get_v(self): return self.v
+
+ @deprecated
+ def _set_v(self, v): self.v = v
+
+ @deprecated
+ def _get_type(self): return self.type
+
+ @deprecated
+ def _set_type(self, v): self.type = v
+ # =================================================
+
+ def unpack(self, buf):
+ dpkt.Packet.unpack(self, buf)
+ l = []
+ off = 0
+ for off in range(0, 4 * self.count, 4):
+ l.append(self.data[off:off + 4])
+ self.addrs = l
+ self.auth = self.data[off + 4:]
+ self.data = ''
+
+ def __len__(self):
+ return self.__hdr_len__ + (4 * self.count) + len(self.auth)
+
+ def __str__(self):
+ data = ''.join(self.addrs) + self.auth
+ if not self.sum:
+ self.sum = dpkt.in_cksum(self.pack_hdr() + data)
+ return self.pack_hdr() + data
diff --git a/external_libs/python/dpkt-1.8.6.2/dpkt/yahoo.py b/external_libs/python/dpkt-1.8.6.2/dpkt/yahoo.py
new file mode 100644
index 00000000..6b871115
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/dpkt/yahoo.py
@@ -0,0 +1,30 @@
+# $Id: yahoo.py 23 2006-11-08 15:45:33Z dugsong $
+# -*- coding: utf-8 -*-
+"""Yahoo Messenger."""
+
+import dpkt
+
+
+class YHOO(dpkt.Packet):
+ __hdr__ = [
+ ('version', '8s', ' ' * 8),
+ ('length', 'I', 0),
+ ('service', 'I', 0),
+ ('connid', 'I', 0),
+ ('magic', 'I', 0),
+ ('unknown', 'I', 0),
+ ('type', 'I', 0),
+ ('nick1', '36s', ' ' * 36),
+ ('nick2', '36s', ' ' * 36)
+ ]
+ __byte_order__ = '<'
+
+
+class YMSG(dpkt.Packet):
+ __hdr__ = [
+ ('version', '8s', ' ' * 8),
+ ('length', 'H', 0),
+ ('type', 'H', 0),
+ ('unknown1', 'I', 0),
+ ('unknown2', 'I', 0)
+ ]
diff --git a/external_libs/python/dpkt-1.8.6.2/setup.cfg b/external_libs/python/dpkt-1.8.6.2/setup.cfg
new file mode 100644
index 00000000..56ffc205
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/setup.cfg
@@ -0,0 +1,20 @@
+[bdist_wheel]
+universal = 1
+
+[aliases]
+release = register clean --all sdist bdist_wheel upload
+
+[flake8]
+max-line-length = 140
+
+[pytest]
+addopts = -v --cov-report term-missing
+python_files = *.py
+python_functions = test
+norecursedirs = .tox .git *.egg-info __pycache__ dist build
+
+[egg_info]
+tag_build =
+tag_date = 0
+tag_svn_revision = 0
+
diff --git a/external_libs/python/dpkt-1.8.6.2/setup.py b/external_libs/python/dpkt-1.8.6.2/setup.py
new file mode 100644
index 00000000..f77cd97e
--- /dev/null
+++ b/external_libs/python/dpkt-1.8.6.2/setup.py
@@ -0,0 +1,67 @@
+import os
+import sys
+
+try:
+ from setuptools import setup, Command
+except ImportError:
+ from distutils.core import setup, Command
+
+package_name = 'dpkt'
+description = 'fast, simple packet creation / parsing, with definitions for the basic TCP/IP protocols'
+readme = open('README.rst').read()
+requirements = []
+
+# PyPI Readme
+long_description = open('README.rst').read()
+
+# Pull in the package
+package = __import__(package_name)
+
+
+class BuildDebPackage(Command):
+ """Build a Debian Package out of this Python Package"""
+ try:
+ import stdeb
+ except ImportError as exc:
+ print 'To build a Debian Package you must install stdeb (pip install stdeb)'
+
+ description = "Build a Debian Package out of this Python Package"
+ user_options = []
+
+ def initialize_options(self):
+ pass
+
+ def finalize_options(self):
+ pass
+
+ def run(self):
+ os.system('python setup.py sdist')
+ sdist_file = os.path.join(os.path.join(os.path.dirname(os.path.realpath(__file__)), 'dist'),
+ package_name + '-' + package.__version__ + '.tar.gz')
+ print sdist_file
+ os.system('py2dsc-deb ' + sdist_file)
+
+
+setup(name=package_name,
+ version=package.__version__,
+ author=package.__author__,
+ author_email=package.__author_email__,
+ url=package.__url__,
+ description=description,
+ long_description=long_description,
+ packages=['dpkt'],
+ install_requires=requirements,
+ license='BSD',
+ zip_safe=False,
+ classifiers=[
+ 'Development Status :: 4 - Beta',
+ 'Intended Audience :: Developers',
+ 'License :: OSI Approved :: BSD License',
+ 'Natural Language :: English',
+ 'Programming Language :: Python :: 2.6',
+ 'Programming Language :: Python :: 2.7',
+ 'Programming Language :: Python :: Implementation :: CPython',
+ 'Programming Language :: Python :: Implementation :: PyPy',
+ ],
+ cmdclass={'debian': BuildDebPackage}
+)