From cdcc62972d42f009f55e6aeb2ca5c60c3acd75eb Mon Sep 17 00:00:00 2001 From: Dan Klein Date: Wed, 26 Aug 2015 14:27:43 +0300 Subject: added dpkt package, initial stateless client implementation --- .../python_lib/dpkt-1.8.6.2/docs/examples.rst | 80 ---------------------- 1 file changed, 80 deletions(-) delete mode 100644 scripts/automation/trex_control_plane/python_lib/dpkt-1.8.6.2/docs/examples.rst (limited to 'scripts/automation/trex_control_plane/python_lib/dpkt-1.8.6.2/docs/examples.rst') diff --git a/scripts/automation/trex_control_plane/python_lib/dpkt-1.8.6.2/docs/examples.rst b/scripts/automation/trex_control_plane/python_lib/dpkt-1.8.6.2/docs/examples.rst deleted file mode 100644 index d99a0c2f..00000000 --- a/scripts/automation/trex_control_plane/python_lib/dpkt-1.8.6.2/docs/examples.rst +++ /dev/null @@ -1,80 +0,0 @@ - -Examples -======== - -Examples in dpkt/examples -------------------------- - -print_packets.py -~~~~~~~~~~~~~~~~ -.. automodule:: examples.print_packets - -**Code Excerpt** - -.. code-block:: python - - # For each packet in the pcap process the contents - for timestamp, buf in pcap: - - # Print out the timestamp in UTC - print 'Timestamp: ', str(datetime.datetime.utcfromtimestamp(timestamp)) - - # Unpack the Ethernet frame (mac src/dst, ethertype) - eth = dpkt.ethernet.Ethernet(buf) - print 'Ethernet Frame: ', mac_addr(eth.src), mac_addr(eth.dst), eth.type - - # Make sure the Ethernet frame contains an IP packet - # EtherType (IP, ARP, PPPoE, IP6... see http://en.wikipedia.org/wiki/EtherType) - if eth.type != dpkt.ethernet.ETH_TYPE_IP: - print 'Non IP Packet type not supported %s\n' % eth.data.__class__.__name__ - continue - - # Now unpack the data within the Ethernet frame (the IP packet) - # Pulling out src, dst, length, fragment info, TTL, and Protocol - ip = eth.data - - # Pull out fragment information (flags and offset all packed into off field, so use bitmasks) - do_not_fragment = bool(ip.off & dpkt.ip.IP_DF) - more_fragments = bool(ip.off & dpkt.ip.IP_MF) - fragment_offset = ip.off & dpkt.ip.IP_OFFMASK - - # Print out the info - print 'IP: %s -> %s (len=%d ttl=%d DF=%d MF=%d offset=%d)\n' % \ - (ip_to_str(ip.src), ip_to_str(ip.dst), ip.len, ip.ttl, do_not_fragment, more_fragments, fragment_offset) - -**Example Output** - -.. code-block:: json - - Timestamp: 2004-05-13 10:17:07.311224 - Ethernet Frame: 00:00:01:00:00:00 fe:ff:20:00:01:00 2048 - IP: 145.254.160.237 -> 65.208.228.223 (len=48 ttl=128 DF=1 MF=0 offset=0) - - Timestamp: 2004-05-13 10:17:08.222534 - Ethernet Frame: fe:ff:20:00:01:00 00:00:01:00:00:00 2048 - IP: 65.208.228.223 -> 145.254.160.237 (len=48 ttl=47 DF=1 MF=0 offset=0) - - ... - - - -Jon Oberheide's Examples -------------------------- -[@jonoberheide's](https://twitter.com/jonoberheide) old examples still -apply: - -- `dpkt Tutorial #1: ICMP - Echo `__ -- `dpkt Tutorial #2: Parsing a PCAP - File `__ -- `dpkt Tutorial #3: dns - spoofing `__ -- `dpkt Tutorial #4: AS Paths from - MRT/BGP `__ - -Jeff Silverman Docs/Code ------------------------- -`Jeff Silverman `__ has some -`code `__ and -`documentation `__. - -- cgit