source_code stringlengths 45 7.24k | function_name stringlengths 1 111 | messages list |
|---|---|---|
def x(self, size, kind):
if size < 3:
raise ProtocolError(f'{self.alias}: [Optno {kind}] invalid format')
_clvl = self._read_unpack(1)
data = dict(kind=kind, type=self._read_opt_type(kind), length=size,
level=_CLASSIFICATION_LEVEL.get(_clvl, _clvl))
if size > 3:
_list = list()
for counter in range(3, size):
_flag = self._read_binary(1)
if counter < size - 1 and not int(_flag[7], base=2
) or counter == size - 1 and int(_flag[7], base=2):
raise ProtocolError(
f'{self.alias}: [Optno {kind}] invalid format')
_dict = dict()
for index, bit in enumerate(_flag[:5]):
_auth = _PROTECTION_AUTHORITY.get(index)
_dict[_auth] = True if int(bit, base=2) else False
_list.append(Info(_dict))
data['flags'] = tuple(_list)
return data
| read_mode_sec | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, size, kind):\n if size < 3:\n raise ProtocolError(f'{self.alias}: [Optno {kind}] invalid format')\n _clvl = self._read_unpack(1)\n data = dict(kind=kind, type=self._read_opt_type(kind), length=size,\n level=_CLASSIFICATION_LEVEL.get(_clvl, _clvl))\n if size > 3:\n _list = list()\n for counter in range(3, size):\n _flag = self._read_binary(1)\n if counter < size - 1 and not int(_flag[7], base=2\n ) or counter == size - 1 and int(_flag[7], base=2):\n raise ProtocolError(\n f'{self.alias}: [Optno {kind}] invalid format')\n _dict = dict()\n for index, bit in enumerate(_flag[:5]):\n _auth = _PROTECTION_AUTHORITY.get(index)\n _dict[_auth] = True if int(bit, base=2) else False\n _list.append(Info(_dict))\n data['flags'] = tuple(_list)\n return data\n",
"role": "user"
},
{
"content": "read_mode_sec",
"role": "assistant"
}
] |
def x(self, size, kind):
if size != 4:
raise ProtocolError(f'{self.alias}: [Optno {kind}] invalid format')
_code = self._read_unpack(2)
data = dict(kind=kind, type=self._read_opt_type(kind), length=size,
alert=_ROUTER_ALERT.get(_code, 'Reserved'), code=_code)
return data
| read_mode_rsralt | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, size, kind):\n if size != 4:\n raise ProtocolError(f'{self.alias}: [Optno {kind}] invalid format')\n _code = self._read_unpack(2)\n data = dict(kind=kind, type=self._read_opt_type(kind), length=size,\n alert=_ROUTER_ALERT.get(_code, 'Reserved'), code=_code)\n return data\n",
"role": "user"
},
{
"content": "read_mode_rsralt",
"role": "assistant"
}
] |
def x(self):
_magn = self._read_fileng(4)
if _magn == b'\xd4\xc3\xb2\xa1':
lilendian = True
self._nsec = False
self._byte = 'little'
elif _magn == b'\xa1\xb2\xc3\xd4':
lilendian = False
self._nsec = False
self._byte = 'big'
elif _magn == b'M<\xb2\xa1':
lilendian = True
self._nsec = True
self._byte = 'little'
elif _magn == b'\xa1\xb2<M':
lilendian = False
self._nsec = True
self._byte = 'big'
else:
raise FileError(5, 'Unknown file format', self._file.name)
_vmaj = self._read_unpack(2, lilendian=lilendian)
_vmin = self._read_unpack(2, lilendian=lilendian)
_zone = self._read_unpack(4, lilendian=lilendian, signed=True)
_acts = self._read_unpack(4, lilendian=lilendian)
_slen = self._read_unpack(4, lilendian=lilendian)
_type = self._read_protos(4)
_byte = self._read_packet(24)
self._file = io.BytesIO(_byte)
header = dict(magic_number=dict(data=_magn, byteorder=self._byte,
nanosecond=self._nsec), version_major=_vmaj, version_minor=_vmin,
thiszone=_zone, sigfigs=_acts, snaplen=_slen, network=_type, packet
=_byte)
return header
| read_header | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n _magn = self._read_fileng(4)\n if _magn == b'\\xd4\\xc3\\xb2\\xa1':\n lilendian = True\n self._nsec = False\n self._byte = 'little'\n elif _magn == b'\\xa1\\xb2\\xc3\\xd4':\n lilendian = False\n self._nsec = False\n self._byte = 'big'\n elif _magn == b'M<\\xb2\\xa1':\n lilendian = True\n self._nsec = True\n self._byte = 'little'\n elif _magn == b'\\xa1\\xb2<M':\n lilendian = False\n self._nsec = True\n self._byte = 'big'\n else:\n raise FileError(5, 'Unknown file format', self._file.name)\n _vmaj = self._read_unpack(2, lilendian=lilendian)\n _vmin = self._read_unpack(2, lilendian=lilendian)\n _zone = self._read_unpack(4, lilendian=lilendian, signed=True)\n _acts = self._read_unpack(4, lilendian=lilendian)\n _slen = self._read_unpack(4, lilendian=lilendian)\n _type = self._read_protos(4)\n _byte = self._read_packet(24)\n self._file = io.BytesIO(_byte)\n header = dict(magic_number=dict(data=_magn, byteorder=self._byte,\n nanosecond=self._nsec), version_major=_vmaj, version_minor=_vmin,\n thiszone=_zone, sigfigs=_acts, snaplen=_slen, network=_type, packet\n =_byte)\n return header\n",
"role": "user"
},
{
"content": "read_header",
"role": "assistant"
}
] |
def x(self, size):
_byte = self._read_unpack(4, lilendian=True)
_prot = LINKTYPE.get(_byte)
return _prot
| read_protos | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, size):\n _byte = self._read_unpack(4, lilendian=True)\n _prot = LINKTYPE.get(_byte)\n return _prot\n",
"role": "user"
},
{
"content": "read_protos",
"role": "assistant"
}
] |
def x(self):
_temp = self._read_unpack(4, lilendian=True, quiet=True)
if _temp is None:
raise EOFError
_tsss = _temp
_tsus = self._read_unpack(4, lilendian=True)
_ilen = self._read_unpack(4, lilendian=True)
_olen = self._read_unpack(4, lilendian=True)
if self._nsec:
_epch = _tsss + _tsus / 1000000000
else:
_epch = _tsss + _tsus / 1000000
_time = datetime.datetime.fromtimestamp(_epch)
frame = dict(frame_info=dict(ts_sec=_tsss, ts_usec=_tsus, incl_len=
_ilen, orig_len=_olen), time=_time, number=self._fnum, time_epoch=
_epch, len=_ilen, cap_len=_olen)
length = frame['len']
bytes_ = self._file.read(length)
if self._mpkt and self._mpfp:
self._mpfp.put(self._file.tell())
self._mpkt.pool += 1
frame['packet'] = bytes_
self._file = io.BytesIO(bytes_)
return self._decode_next_layer(frame, length)
| read_frame | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n _temp = self._read_unpack(4, lilendian=True, quiet=True)\n if _temp is None:\n raise EOFError\n _tsss = _temp\n _tsus = self._read_unpack(4, lilendian=True)\n _ilen = self._read_unpack(4, lilendian=True)\n _olen = self._read_unpack(4, lilendian=True)\n if self._nsec:\n _epch = _tsss + _tsus / 1000000000\n else:\n _epch = _tsss + _tsus / 1000000\n _time = datetime.datetime.fromtimestamp(_epch)\n frame = dict(frame_info=dict(ts_sec=_tsss, ts_usec=_tsus, incl_len=\n _ilen, orig_len=_olen), time=_time, number=self._fnum, time_epoch=\n _epch, len=_ilen, cap_len=_olen)\n length = frame['len']\n bytes_ = self._file.read(length)\n if self._mpkt and self._mpfp:\n self._mpfp.put(self._file.tell())\n self._mpkt.pool += 1\n frame['packet'] = bytes_\n self._file = io.BytesIO(bytes_)\n return self._decode_next_layer(frame, length)\n",
"role": "user"
},
{
"content": "read_frame",
"role": "assistant"
}
] |
def x(self, dict_, length=None):
seek_cur = self._file.tell()
try:
next_ = self._import_next_layer(self._prot, length)
except Exception:
dict_['error'] = traceback.format_exc(limit=1).strip().split(os.linesep
)[-1]
self._file.seek(seek_cur, os.SEEK_SET)
next_ = beholder(self._import_next_layer)(self, self._prot, length,
error=True)
info, chain = next_.info, next_.protochain
layer = next_.alias.lower()
self._next = next_
self._protos = chain
dict_[layer] = info
dict_['protocols'] = self._protos.chain
return dict_
| decode_next_layer | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, dict_, length=None):\n seek_cur = self._file.tell()\n try:\n next_ = self._import_next_layer(self._prot, length)\n except Exception:\n dict_['error'] = traceback.format_exc(limit=1).strip().split(os.linesep\n )[-1]\n self._file.seek(seek_cur, os.SEEK_SET)\n next_ = beholder(self._import_next_layer)(self, self._prot, length,\n error=True)\n info, chain = next_.info, next_.protochain\n layer = next_.alias.lower()\n self._next = next_\n self._protos = chain\n dict_[layer] = info\n dict_['protocols'] = self._protos.chain\n return dict_\n",
"role": "user"
},
{
"content": "decode_next_layer",
"role": "assistant"
}
] |
def x(self, proto, length, error=False):
if proto == 1:
from pcapkit.protocols.link import Ethernet as Protocol
elif proto == 228:
from pcapkit.protocols.internet import IPv4 as Protocol
elif proto == 229:
from pcapkit.protocols.internet import IPv6 as Protocol
else:
from pcapkit.protocols.raw import Raw as Protocol
next_ = Protocol(self._file, length, error=error, layer=self._exlayer,
protocol=self._exproto)
return next_
| import_next_layer | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, proto, length, error=False):\n if proto == 1:\n from pcapkit.protocols.link import Ethernet as Protocol\n elif proto == 228:\n from pcapkit.protocols.internet import IPv4 as Protocol\n elif proto == 229:\n from pcapkit.protocols.internet import IPv6 as Protocol\n else:\n from pcapkit.protocols.raw import Raw as Protocol\n next_ = Protocol(self._file, length, error=error, layer=self._exlayer,\n protocol=self._exproto)\n return next_\n",
"role": "user"
},
{
"content": "import_next_layer",
"role": "assistant"
}
] |
def x(key, default=-1):
if isinstance(key, int):
return RegistrationFailure(key)
if key not in RegistrationFailure._member_map_:
extend_enum(RegistrationFailure, key, default)
return RegistrationFailure[key]
| get | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(key, default=-1):\n if isinstance(key, int):\n return RegistrationFailure(key)\n if key not in RegistrationFailure._member_map_:\n extend_enum(RegistrationFailure, key, default)\n return RegistrationFailure[key]\n",
"role": "user"
},
{
"content": "get",
"role": "assistant"
}
] |
def x(key, default=-1):
if isinstance(key, int):
return TOS_PRE(key)
if key not in TOS_PRE._member_map_:
extend_enum(TOS_PRE, key, default)
return TOS_PRE[key]
| get | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(key, default=-1):\n if isinstance(key, int):\n return TOS_PRE(key)\n if key not in TOS_PRE._member_map_:\n extend_enum(TOS_PRE, key, default)\n return TOS_PRE[key]\n",
"role": "user"
},
{
"content": "get",
"role": "assistant"
}
] |
def x(self, length, *, error=None):
if length is None:
length = len(self)
raw = dict(packet=self._read_fileng(length), error=error or None)
return raw
| read_raw | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, length, *, error=None):\n if length is None:\n length = len(self)\n raw = dict(packet=self._read_fileng(length), error=error or None)\n return raw\n",
"role": "user"
},
{
"content": "read_raw",
"role": "assistant"
}
] |
def x(key, default=-1):
if isinstance(key, int):
return NotifyMessage(key)
if key not in NotifyMessage._member_map_:
extend_enum(NotifyMessage, key, default)
return NotifyMessage[key]
| get | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(key, default=-1):\n if isinstance(key, int):\n return NotifyMessage(key)\n if key not in NotifyMessage._member_map_:\n extend_enum(NotifyMessage, key, default)\n return NotifyMessage[key]\n",
"role": "user"
},
{
"content": "get",
"role": "assistant"
}
] |
def x(cls, value):
if not (isinstance(value, int) and 0 <= value <= 65535):
raise ValueError('%r is not a valid %s' % (value, cls.__name__))
if 2 <= value <= 6:
extend_enum(cls, 'Unassigned [%d]' % value, value)
return cls(value)
if 8 <= value <= 13:
extend_enum(cls, 'Unassigned [%d]' % value, value)
return cls(value)
if 21 <= value <= 23:
extend_enum(cls, 'Unassigned [%d]' % value, value)
return cls(value)
if 29 <= value <= 31:
extend_enum(cls, 'Unassigned [%d]' % value, value)
return cls(value)
if 33 <= value <= 39:
extend_enum(cls, 'Unassigned [%d]' % value, value)
return cls(value)
if 52 <= value <= 59:
extend_enum(cls, 'Unassigned [%d]' % value, value)
return cls(value)
if 63 <= value <= 69:
extend_enum(cls, 'Unassigned [%d]' % value, value)
return cls(value)
if 71 <= value <= 89:
extend_enum(cls, 'Unassigned [%d]' % value, value)
return cls(value)
if 91 <= value <= 99:
extend_enum(cls, 'Unassigned [%d]' % value, value)
return cls(value)
if 101 <= value <= 8191:
extend_enum(cls, 'Unassigned [%d]' % value, value)
return cls(value)
if 8192 <= value <= 16383:
extend_enum(cls, 'Reserved for Private Use [%d]' % value, value)
return cls(value)
if 16385 <= value <= 40959:
extend_enum(cls, 'Unassigned [%d]' % value, value)
return cls(value)
if 40960 <= value <= 65535:
extend_enum(cls, 'Reserved for Private Use [%d]' % value, value)
return cls(value)
super()._missing_(value)
| missing_ | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(cls, value):\n if not (isinstance(value, int) and 0 <= value <= 65535):\n raise ValueError('%r is not a valid %s' % (value, cls.__name__))\n if 2 <= value <= 6:\n extend_enum(cls, 'Unassigned [%d]' % value, value)\n return cls(value)\n if 8 <= value <= 13:\n extend_enum(cls, 'Unassigned [%d]' % value, value)\n return cls(value)\n if 21 <= value <= 23:\n extend_enum(cls, 'Unassigned [%d]' % value, value)\n return cls(value)\n if 29 <= value <= 31:\n extend_enum(cls, 'Unassigned [%d]' % value, value)\n return cls(value)\n if 33 <= value <= 39:\n extend_enum(cls, 'Unassigned [%d]' % value, value)\n return cls(value)\n if 52 <= value <= 59:\n extend_enum(cls, 'Unassigned [%d]' % value, value)\n return cls(value)\n if 63 <= value <= 69:\n extend_enum(cls, 'Unassigned [%d]' % value, value)\n return cls(value)\n if 71 <= value <= 89:\n extend_enum(cls, 'Unassigned [%d]' % value, value)\n return cls(value)\n if 91 <= value <= 99:\n extend_enum(cls, 'Unassigned [%d]' % value, value)\n return cls(value)\n if 101 <= value <= 8191:\n extend_enum(cls, 'Unassigned [%d]' % value, value)\n return cls(value)\n if 8192 <= value <= 16383:\n extend_enum(cls, 'Reserved for Private Use [%d]' % value, value)\n return cls(value)\n if 16385 <= value <= 40959:\n extend_enum(cls, 'Unassigned [%d]' % value, value)\n return cls(value)\n if 40960 <= value <= 65535:\n extend_enum(cls, 'Reserved for Private Use [%d]' % value, value)\n return cls(value)\n super()._missing_(value)\n",
"role": "user"
},
{
"content": "missing_",
"role": "assistant"
}
] |
def x(ipv6):
hdr_len = ipv6.__hdr_len__
for code in (0, 60, 43):
ext_hdr = ipv6.extension_hdrs.get(code)
if ext_hdr is not None:
hdr_len += ext_hdr.length
return hdr_len
| ipv6_hdr_len | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(ipv6):\n hdr_len = ipv6.__hdr_len__\n for code in (0, 60, 43):\n ext_hdr = ipv6.extension_hdrs.get(code)\n if ext_hdr is not None:\n hdr_len += ext_hdr.length\n return hdr_len\n",
"role": "user"
},
{
"content": "ipv6_hdr_len",
"role": "assistant"
}
] |
def x(packet):
chain = [type(packet).__name__]
payload = packet.data
while not isinstance(payload, bytes):
chain.append(type(payload).__name__)
payload = payload.data
return ':'.join(chain)
| packet2chain | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(packet):\n chain = [type(packet).__name__]\n payload = packet.data\n while not isinstance(payload, bytes):\n chain.append(type(payload).__name__)\n payload = payload.data\n return ':'.join(chain)\n",
"role": "user"
},
{
"content": "packet2chain",
"role": "assistant"
}
] |
def x(packet, timestamp, *, data_link):
def x(packet):
dict_ = dict()
for field in packet.__hdr_fields__:
dict_[field] = getattr(packet, field, None)
payload = packet.data
if not isinstance(payload, bytes):
dict_[type(payload).__name__] = wrapper(payload)
return dict_
return {'timestamp': timestamp, 'packet': packet.pack(), data_link.name:
wrapper(packet)}
| packet2dict | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(packet, timestamp, *, data_link):\n\n def x(packet):\n dict_ = dict()\n for field in packet.__hdr_fields__:\n dict_[field] = getattr(packet, field, None)\n payload = packet.data\n if not isinstance(payload, bytes):\n dict_[type(payload).__name__] = wrapper(payload)\n return dict_\n return {'timestamp': timestamp, 'packet': packet.pack(), data_link.name:\n wrapper(packet)}\n",
"role": "user"
},
{
"content": "packet2dict",
"role": "assistant"
}
] |
def x(packet, *, count=NotImplemented):
ipv4 = getattr(packet, 'ip', None)
if ipv4 is not None:
if ipv4.df:
return False, None
data = dict(bufid=(ipaddress.ip_address(ipv4.src), ipaddress.
ip_address(ipv4.dst), ipv4.id, TP_PROTO.get(ipv4.p).name), num=
count, fo=ipv4.off, ihl=ipv4.__hdr_len__, mf=bool(ipv4.mf), tl=
ipv4.len, header=bytearray(ipv4.pack()[:ipv4.__hdr_len__]),
payload=bytearray(ipv4.pack()[ipv4.__hdr_len__:]))
return True, data
return False, None
| ipv4_reassembly | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(packet, *, count=NotImplemented):\n ipv4 = getattr(packet, 'ip', None)\n if ipv4 is not None:\n if ipv4.df:\n return False, None\n data = dict(bufid=(ipaddress.ip_address(ipv4.src), ipaddress.\n ip_address(ipv4.dst), ipv4.id, TP_PROTO.get(ipv4.p).name), num=\n count, fo=ipv4.off, ihl=ipv4.__hdr_len__, mf=bool(ipv4.mf), tl=\n ipv4.len, header=bytearray(ipv4.pack()[:ipv4.__hdr_len__]),\n payload=bytearray(ipv4.pack()[ipv4.__hdr_len__:]))\n return True, data\n return False, None\n",
"role": "user"
},
{
"content": "ipv4_reassembly",
"role": "assistant"
}
] |
def x(packet, *, count=NotImplemented):
ipv6 = getattr(packet, 'ip6', None)
if ipv6 is not None:
ipv6_frag = ipv6.extension_hdrs.get(44)
if ipv6_frag is None:
return False, None
hdr_len = ipv6_hdr_len(ipv6)
data = dict(bufid=(ipaddress.ip_address(ipv6.src), ipaddress.
ip_address(ipv6.dst), ipv6.flow, TP_PROTO.get(ipv6_frag.nh).
name), num=count, fo=ipv6_frag.nxt, ihl=hdr_len, mf=bool(
ipv6_frag.m_flag), tl=len(ipv6), header=bytearray(ipv6.pack()[:
hdr_len]), payload=bytearray(ipv6.pack()[hdr_len + ipv6_frag:]))
return True, data
return False, None
| ipv6_reassembly | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(packet, *, count=NotImplemented):\n ipv6 = getattr(packet, 'ip6', None)\n if ipv6 is not None:\n ipv6_frag = ipv6.extension_hdrs.get(44)\n if ipv6_frag is None:\n return False, None\n hdr_len = ipv6_hdr_len(ipv6)\n data = dict(bufid=(ipaddress.ip_address(ipv6.src), ipaddress.\n ip_address(ipv6.dst), ipv6.flow, TP_PROTO.get(ipv6_frag.nh).\n name), num=count, fo=ipv6_frag.nxt, ihl=hdr_len, mf=bool(\n ipv6_frag.m_flag), tl=len(ipv6), header=bytearray(ipv6.pack()[:\n hdr_len]), payload=bytearray(ipv6.pack()[hdr_len + ipv6_frag:]))\n return True, data\n return False, None\n",
"role": "user"
},
{
"content": "ipv6_reassembly",
"role": "assistant"
}
] |
def x(packet, *, count=NotImplemented):
if getattr(packet, 'ip', None):
ip = packet['ip']
elif getattr(packet, 'ip6', None):
ip = packet['ip6']
else:
return False, None
tcp = getattr(ip, 'tcp', None)
if tcp is not None:
flags = bin(tcp.flags)[2:].zfill(8)
data = dict(bufid=(ipaddress.ip_address(ip.src), ipaddress.
ip_address(ip.dst), tcp.sport, tcp.dport), num=count, ack=tcp.
ack, dsn=tcp.seq, rst=bool(int(flags[5])), syn=bool(int(flags[6
])), fin=bool(int(flags[7])), payload=bytearray(tcp.pack()[tcp.
__hdr_len__:]))
raw_len = len(tcp.data)
data['first'] = tcp.seq
data['last'] = tcp.seq + raw_len
data['len'] = raw_len
return True, data
return False, None
| tcp_reassembly | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(packet, *, count=NotImplemented):\n if getattr(packet, 'ip', None):\n ip = packet['ip']\n elif getattr(packet, 'ip6', None):\n ip = packet['ip6']\n else:\n return False, None\n tcp = getattr(ip, 'tcp', None)\n if tcp is not None:\n flags = bin(tcp.flags)[2:].zfill(8)\n data = dict(bufid=(ipaddress.ip_address(ip.src), ipaddress.\n ip_address(ip.dst), tcp.sport, tcp.dport), num=count, ack=tcp.\n ack, dsn=tcp.seq, rst=bool(int(flags[5])), syn=bool(int(flags[6\n ])), fin=bool(int(flags[7])), payload=bytearray(tcp.pack()[tcp.\n __hdr_len__:]))\n raw_len = len(tcp.data)\n data['first'] = tcp.seq\n data['last'] = tcp.seq + raw_len\n data['len'] = raw_len\n return True, data\n return False, None\n",
"role": "user"
},
{
"content": "tcp_reassembly",
"role": "assistant"
}
] |
def x(packet, timestamp, *, data_link, count=NotImplemented):
if getattr(packet, 'ip', None):
ip = packet['ip']
elif getattr(packet, 'ip6', None):
ip = packet['ip6']
else:
return False, None
tcp = getattr(ip, 'tcp', None)
if tcp is not None:
flags = bin(tcp.flags)[2:].zfill(8)
data = dict(protocol=data_link, index=count, frame=packet2dict(
packet, timestamp, data_link=data_link), syn=bool(int(flags[6])
), fin=bool(int(flags[7])), src=ipaddress.ip_address(ip.src),
dst=ipaddress.ip_address(ip.dst), srcport=tcp.sport, dstport=
tcp.dport, timestamp=timestamp)
return True, data
return False, None
| tcp_traceflow | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(packet, timestamp, *, data_link, count=NotImplemented):\n if getattr(packet, 'ip', None):\n ip = packet['ip']\n elif getattr(packet, 'ip6', None):\n ip = packet['ip6']\n else:\n return False, None\n tcp = getattr(ip, 'tcp', None)\n if tcp is not None:\n flags = bin(tcp.flags)[2:].zfill(8)\n data = dict(protocol=data_link, index=count, frame=packet2dict(\n packet, timestamp, data_link=data_link), syn=bool(int(flags[6])\n ), fin=bool(int(flags[7])), src=ipaddress.ip_address(ip.src),\n dst=ipaddress.ip_address(ip.dst), srcport=tcp.sport, dstport=\n tcp.dport, timestamp=timestamp)\n return True, data\n return False, None\n",
"role": "user"
},
{
"content": "tcp_traceflow",
"role": "assistant"
}
] |
def x(self, length):
if length is None:
length = len(self)
if length < 9:
raise ProtocolError(f'HTTP/2: invalid format', quiet=True)
_tlen = self._read_unpack(3)
_type = self._read_unpack(1)
_flag = self._read_binary(1)
_rsid = self._read_binary(4)
if _tlen != length:
raise ProtocolError(f'HTTP/2: [Type {_type}] invalid format', quiet
=True)
if int(_rsid[0], base=2):
raise ProtocolError(f'HTTP/2: [Type {_type}] invalid format', quiet
=True)
http = dict(length=_tlen, type=_HTTP_TYPE.get(_type), sid=int(_rsid[1:],
base=2), packet=self._read_packet(_tlen))
if http['type'] is None:
raise ProtocolError(f'HTTP/2: [Type {_type}] invalid format', quiet
=True)
if http['type'] in ('SETTINGS', 'PING') and http['sid'] != 0:
raise ProtocolError(f'HTTP/2: [Type {_type}] invalid format', quiet
=True)
_http = _HTTP_FUNC[_type](self, _tlen, _type, _flag)
http.update(_http)
return http
| read_http | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, length):\n if length is None:\n length = len(self)\n if length < 9:\n raise ProtocolError(f'HTTP/2: invalid format', quiet=True)\n _tlen = self._read_unpack(3)\n _type = self._read_unpack(1)\n _flag = self._read_binary(1)\n _rsid = self._read_binary(4)\n if _tlen != length:\n raise ProtocolError(f'HTTP/2: [Type {_type}] invalid format', quiet\n =True)\n if int(_rsid[0], base=2):\n raise ProtocolError(f'HTTP/2: [Type {_type}] invalid format', quiet\n =True)\n http = dict(length=_tlen, type=_HTTP_TYPE.get(_type), sid=int(_rsid[1:],\n base=2), packet=self._read_packet(_tlen))\n if http['type'] is None:\n raise ProtocolError(f'HTTP/2: [Type {_type}] invalid format', quiet\n =True)\n if http['type'] in ('SETTINGS', 'PING') and http['sid'] != 0:\n raise ProtocolError(f'HTTP/2: [Type {_type}] invalid format', quiet\n =True)\n _http = _HTTP_FUNC[_type](self, _tlen, _type, _flag)\n http.update(_http)\n return http\n",
"role": "user"
},
{
"content": "read_http",
"role": "assistant"
}
] |
def x(self, size, kind, flag):
if any(int(bit, base=2) for bit in flag):
raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True
)
data = dict(flags=None, payload=self._read_fileng(size - 9) or None)
return data
| read_http_none | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, size, kind, flag):\n if any(int(bit, base=2) for bit in flag):\n raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True\n )\n data = dict(flags=None, payload=self._read_fileng(size - 9) or None)\n return data\n",
"role": "user"
},
{
"content": "read_http_none",
"role": "assistant"
}
] |
def x(self, size, kind, flag):
_plen = 0
_flag = dict(END_STREAM=False, PADDED=False)
for index, bit in enumerate(flag):
if index == 0 and bit:
_flag['END_STREAM'] = True
elif index == 3 and bit:
_flag['PADDED'] = True
_plen = self._read_unpack(1)
elif bit:
raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format',
quiet=True)
else:
continue
if _plen > size - 10:
raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True
)
if _flag['PADDED']:
_dlen = size - _plen - 1
else:
_dlen = size - _plen
if _dlen < 0:
raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True
)
_data = self._read_fileng(_dlen)
padding = self._read_binary(_plen)
if any(int(bit, base=2) for bit in padding):
raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True
)
data = dict(flags=_flag, data=_data)
if _flag['PADDED']:
data['ped_len'] = _plen
return data
| read_http_data | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, size, kind, flag):\n _plen = 0\n _flag = dict(END_STREAM=False, PADDED=False)\n for index, bit in enumerate(flag):\n if index == 0 and bit:\n _flag['END_STREAM'] = True\n elif index == 3 and bit:\n _flag['PADDED'] = True\n _plen = self._read_unpack(1)\n elif bit:\n raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format',\n quiet=True)\n else:\n continue\n if _plen > size - 10:\n raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True\n )\n if _flag['PADDED']:\n _dlen = size - _plen - 1\n else:\n _dlen = size - _plen\n if _dlen < 0:\n raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True\n )\n _data = self._read_fileng(_dlen)\n padding = self._read_binary(_plen)\n if any(int(bit, base=2) for bit in padding):\n raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True\n )\n data = dict(flags=_flag, data=_data)\n if _flag['PADDED']:\n data['ped_len'] = _plen\n return data\n",
"role": "user"
},
{
"content": "read_http_data",
"role": "assistant"
}
] |
def x(self, size, kind, flag):
_plen = 0
_elen = 0
_flag = dict(END_STREAM=False, END_HEADERS=False, PADDED=False,
PRIORITY=False)
for index, bit in enumerate(flag):
if index == 0 and bit:
_flag['END_STREAM'] = True
elif index == 2 and bit:
_flag['END_HEADERS'] = True
elif index == 3 and bit:
_flag['PADDED'] = True
_plen = self._read_unpack(1)
elif index == 5 and bit:
_flag['PRIORITY'] = True
_edep = self._read_binary(4)
_wght = self._read_unpack(1)
_elen = 5
elif bit:
raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format',
quiet=True)
else:
continue
if _flag['PADDED']:
_dlen = size - _plen - _elen - 1
else:
_dlen = size - _plen - _elen
if _dlen < 0:
raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True
)
_frag = self._read_fileng(_dlen) or None
padding = self._read_binary(_plen)
if any(int(bit, base=2) for bit in padding):
raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True
)
data = dict(flags=_flag, frag=_frag)
if _flag['PADDED']:
data['ped_len'] = _plen
if _flag['PRIORITY']:
data['exclusive'] = True if int(_edep[0], base=2) else False
data['deps'] = int(_edep[1:], base=2)
data['weight'] = _wght + 1
return data
| read_http_headers | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, size, kind, flag):\n _plen = 0\n _elen = 0\n _flag = dict(END_STREAM=False, END_HEADERS=False, PADDED=False,\n PRIORITY=False)\n for index, bit in enumerate(flag):\n if index == 0 and bit:\n _flag['END_STREAM'] = True\n elif index == 2 and bit:\n _flag['END_HEADERS'] = True\n elif index == 3 and bit:\n _flag['PADDED'] = True\n _plen = self._read_unpack(1)\n elif index == 5 and bit:\n _flag['PRIORITY'] = True\n _edep = self._read_binary(4)\n _wght = self._read_unpack(1)\n _elen = 5\n elif bit:\n raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format',\n quiet=True)\n else:\n continue\n if _flag['PADDED']:\n _dlen = size - _plen - _elen - 1\n else:\n _dlen = size - _plen - _elen\n if _dlen < 0:\n raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True\n )\n _frag = self._read_fileng(_dlen) or None\n padding = self._read_binary(_plen)\n if any(int(bit, base=2) for bit in padding):\n raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True\n )\n data = dict(flags=_flag, frag=_frag)\n if _flag['PADDED']:\n data['ped_len'] = _plen\n if _flag['PRIORITY']:\n data['exclusive'] = True if int(_edep[0], base=2) else False\n data['deps'] = int(_edep[1:], base=2)\n data['weight'] = _wght + 1\n return data\n",
"role": "user"
},
{
"content": "read_http_headers",
"role": "assistant"
}
] |
def x(self, size, kind, flag):
if size != 9:
raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True
)
if any(int(bit, base=2) for bit in flag):
raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True
)
_edep = self._read_binary(4)
_wght = self._read_unpack(1)
data = dict(flags=None, exclusive=True if int(_edep[0], base=2) else
False, deps=int(_edep[1:], base=2), weight=_wght + 1)
return data
| read_http_priority | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, size, kind, flag):\n if size != 9:\n raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True\n )\n if any(int(bit, base=2) for bit in flag):\n raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True\n )\n _edep = self._read_binary(4)\n _wght = self._read_unpack(1)\n data = dict(flags=None, exclusive=True if int(_edep[0], base=2) else \n False, deps=int(_edep[1:], base=2), weight=_wght + 1)\n return data\n",
"role": "user"
},
{
"content": "read_http_priority",
"role": "assistant"
}
] |
def x(self, size, kind, flag):
if size != 8:
raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True
)
if any(int(bit, base=2) for bit in flag):
raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True
)
_code = self._read_unpack(4)
data = dict(flags=None, error=_ERROR_CODE.get(_code, _code))
return data
| read_http_rst_stream | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, size, kind, flag):\n if size != 8:\n raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True\n )\n if any(int(bit, base=2) for bit in flag):\n raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True\n )\n _code = self._read_unpack(4)\n data = dict(flags=None, error=_ERROR_CODE.get(_code, _code))\n return data\n",
"role": "user"
},
{
"content": "read_http_rst_stream",
"role": "assistant"
}
] |
def x(self, size, kind, flag):
if size % 5 != 0:
raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True
)
_flag = dict(ACK=False)
for index, bit in enumerate(flag):
if index == 0 and bit:
_flag['ACK'] = True
elif bit:
raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format',
quiet=True)
else:
continue
if _flag['ACK'] and size:
raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True
)
_para = dict()
counter = 0
while counter < size:
_stid = self._read_unpack(1)
_pval = self._read_unpack(4)
_pkey = _PARA_NAME.get(_stid, 'Unsigned')
if _pkey in _para:
if isinstance(_para[_pkey], tuple):
_para[_pkey] += _pval,
else:
_para[_pkey] = _para[_pkey], _pval
else:
_para[_pkey] = _pval
data = dict(flags=_flag)
data.update(_para)
return data
| read_http_settings | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, size, kind, flag):\n if size % 5 != 0:\n raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True\n )\n _flag = dict(ACK=False)\n for index, bit in enumerate(flag):\n if index == 0 and bit:\n _flag['ACK'] = True\n elif bit:\n raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format',\n quiet=True)\n else:\n continue\n if _flag['ACK'] and size:\n raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True\n )\n _para = dict()\n counter = 0\n while counter < size:\n _stid = self._read_unpack(1)\n _pval = self._read_unpack(4)\n _pkey = _PARA_NAME.get(_stid, 'Unsigned')\n if _pkey in _para:\n if isinstance(_para[_pkey], tuple):\n _para[_pkey] += _pval,\n else:\n _para[_pkey] = _para[_pkey], _pval\n else:\n _para[_pkey] = _pval\n data = dict(flags=_flag)\n data.update(_para)\n return data\n",
"role": "user"
},
{
"content": "read_http_settings",
"role": "assistant"
}
] |
def x(self, size, kind, flag):
if size < 4:
raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True
)
_plen = 0
_flag = dict(END_HEADERS=False, PADDED=False)
for index, bit in enumerate(flag):
if index == 2 and bit:
_flag['END_HEADERS'] = True
elif index == 3 and bit:
_flag['PADDED'] = True
_plen = self._read_unpack(1)
elif bit:
raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format',
quiet=True)
else:
continue
if _flag['PADDED']:
_dlen = size - _plen - 5
else:
_dlen = size - _plen - 4
if _dlen < 0:
raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True
)
_rpid = self._read_binary(4)
_frag = self._read_fileng(_dlen) or None
if int(_rpid[0], base=2):
raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True
)
padding = self._read_binary(_plen)
if any(int(bit, base=2) for bit in padding):
raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True
)
data = dict(flags=_flag, pid=int(_rpid[1:], base=2), frag=_frag)
if _flag['PADDED']:
data['ped_len'] = _plen
return data
| read_http_push_promise | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, size, kind, flag):\n if size < 4:\n raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True\n )\n _plen = 0\n _flag = dict(END_HEADERS=False, PADDED=False)\n for index, bit in enumerate(flag):\n if index == 2 and bit:\n _flag['END_HEADERS'] = True\n elif index == 3 and bit:\n _flag['PADDED'] = True\n _plen = self._read_unpack(1)\n elif bit:\n raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format',\n quiet=True)\n else:\n continue\n if _flag['PADDED']:\n _dlen = size - _plen - 5\n else:\n _dlen = size - _plen - 4\n if _dlen < 0:\n raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True\n )\n _rpid = self._read_binary(4)\n _frag = self._read_fileng(_dlen) or None\n if int(_rpid[0], base=2):\n raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True\n )\n padding = self._read_binary(_plen)\n if any(int(bit, base=2) for bit in padding):\n raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True\n )\n data = dict(flags=_flag, pid=int(_rpid[1:], base=2), frag=_frag)\n if _flag['PADDED']:\n data['ped_len'] = _plen\n return data\n",
"role": "user"
},
{
"content": "read_http_push_promise",
"role": "assistant"
}
] |
def x(self, size, kind, flag):
if size != 8:
raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True
)
_flag = dict(ACK=False)
for index, bit in enumerate(flag):
if index == 0 and bit:
_flag['ACK'] = True
elif bit:
raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format',
quiet=True)
else:
continue
_data = self._read_fileng(8)
data = dict(flags=_flag, data=_data)
return data
| read_http_ping | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, size, kind, flag):\n if size != 8:\n raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True\n )\n _flag = dict(ACK=False)\n for index, bit in enumerate(flag):\n if index == 0 and bit:\n _flag['ACK'] = True\n elif bit:\n raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format',\n quiet=True)\n else:\n continue\n _data = self._read_fileng(8)\n data = dict(flags=_flag, data=_data)\n return data\n",
"role": "user"
},
{
"content": "read_http_ping",
"role": "assistant"
}
] |
def x(self, size, kind, flag):
_dlen = size - 8
if _dlen < 0:
raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True
)
if any(int(bit, base=2) for bit in flag):
raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True
)
_rsid = self._read_binary(4)
_code = self._read_unpack(4)
_data = self._read_fileng(_dlen) or None
if int(_rsid[0], base=2):
raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True
)
data = dict(flags=None, last_sid=int(_rsid[1:], base=2), error=
_ERROR_CODE.get(_code, _code), data=_data)
return data
| read_http_goaway | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, size, kind, flag):\n _dlen = size - 8\n if _dlen < 0:\n raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True\n )\n if any(int(bit, base=2) for bit in flag):\n raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True\n )\n _rsid = self._read_binary(4)\n _code = self._read_unpack(4)\n _data = self._read_fileng(_dlen) or None\n if int(_rsid[0], base=2):\n raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True\n )\n data = dict(flags=None, last_sid=int(_rsid[1:], base=2), error=\n _ERROR_CODE.get(_code, _code), data=_data)\n return data\n",
"role": "user"
},
{
"content": "read_http_goaway",
"role": "assistant"
}
] |
def x(self, size, kind, flag):
if size != 4:
raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True
)
if any(int(bit, base=2) for bit in flag):
raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True
)
_size = self._read_binary(4)
if int(_size[0], base=2):
raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True
)
data = dict(flags=None, window=int(_size[1:], base=2))
return data
| read_http_window_update | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, size, kind, flag):\n if size != 4:\n raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True\n )\n if any(int(bit, base=2) for bit in flag):\n raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True\n )\n _size = self._read_binary(4)\n if int(_size[0], base=2):\n raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True\n )\n data = dict(flags=None, window=int(_size[1:], base=2))\n return data\n",
"role": "user"
},
{
"content": "read_http_window_update",
"role": "assistant"
}
] |
def x(self, size, kind, flag):
_flag = dict(END_HEADERS=False)
for index, bit in enumerate(flag):
if index == 2 and bit:
_flag['END_HEADERS'] = True
elif bit:
raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format',
quiet=True)
else:
continue
_frag = self._read_fileng(size) or None
data = dict(flags=_flag, frag=_frag)
return data
| read_http_continuation | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, size, kind, flag):\n _flag = dict(END_HEADERS=False)\n for index, bit in enumerate(flag):\n if index == 2 and bit:\n _flag['END_HEADERS'] = True\n elif bit:\n raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format',\n quiet=True)\n else:\n continue\n _frag = self._read_fileng(size) or None\n data = dict(flags=_flag, frag=_frag)\n return data\n",
"role": "user"
},
{
"content": "read_http_continuation",
"role": "assistant"
}
] |
def x(key, default=-1):
if isinstance(key, int):
return OptionNumber(key)
if key not in OptionNumber._member_map_:
extend_enum(OptionNumber, key, default)
return OptionNumber[key]
| get | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(key, default=-1):\n if isinstance(key, int):\n return OptionNumber(key)\n if key not in OptionNumber._member_map_:\n extend_enum(OptionNumber, key, default)\n return OptionNumber[key]\n",
"role": "user"
},
{
"content": "get",
"role": "assistant"
}
] |
def x(self, proto, length):
if self._exproto == 'null' and self._exlayer == 'None':
from pcapkit.protocols.raw import Raw as NextLayer
else:
from pcapkit.foundation.analysis import analyse as NextLayer
if length == 0:
next_ = NoPayload()
elif self._onerror:
next_ = beholder_ng(NextLayer)(self._file, length, _termination=
self._sigterm)
else:
next_ = NextLayer(self._file, length, _termination=self._sigterm)
return next_
| import_next_layer | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, proto, length):\n if self._exproto == 'null' and self._exlayer == 'None':\n from pcapkit.protocols.raw import Raw as NextLayer\n else:\n from pcapkit.foundation.analysis import analyse as NextLayer\n if length == 0:\n next_ = NoPayload()\n elif self._onerror:\n next_ = beholder_ng(NextLayer)(self._file, length, _termination=\n self._sigterm)\n else:\n next_ = NextLayer(self._file, length, _termination=self._sigterm)\n return next_\n",
"role": "user"
},
{
"content": "import_next_layer",
"role": "assistant"
}
] |
def x(key, default=-1):
if isinstance(key, int):
return ProtectionAuthority(key)
if key not in ProtectionAuthority._member_map_:
extend_enum(ProtectionAuthority, key, default)
return ProtectionAuthority[key]
| get | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(key, default=-1):\n if isinstance(key, int):\n return ProtectionAuthority(key)\n if key not in ProtectionAuthority._member_map_:\n extend_enum(ProtectionAuthority, key, default)\n return ProtectionAuthority[key]\n",
"role": "user"
},
{
"content": "get",
"role": "assistant"
}
] |
def x(key, default=-1):
if isinstance(key, int):
return RouterAlert(key)
if key not in RouterAlert._member_map_:
extend_enum(RouterAlert, key, default)
return RouterAlert[key]
| get | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(key, default=-1):\n if isinstance(key, int):\n return RouterAlert(key)\n if key not in RouterAlert._member_map_:\n extend_enum(RouterAlert, key, default)\n return RouterAlert[key]\n",
"role": "user"
},
{
"content": "get",
"role": "assistant"
}
] |
def x(key, default=-1):
if isinstance(key, int):
return QS_Function(key)
if key not in QS_Function._member_map_:
extend_enum(QS_Function, key, default)
return QS_Function[key]
| get | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(key, default=-1):\n if isinstance(key, int):\n return QS_Function(key)\n if key not in QS_Function._member_map_:\n extend_enum(QS_Function, key, default)\n return QS_Function[key]\n",
"role": "user"
},
{
"content": "get",
"role": "assistant"
}
] |
def x(self):
flag = True
if self._exeng == 'dpkt':
flag, engine = self.import_test('dpkt', name='DPKT')
if flag:
return self._run_dpkt(engine)
elif self._exeng == 'scapy':
flag, engine = self.import_test('scapy.all', name='Scapy')
if flag:
return self._run_scapy(engine)
elif self._exeng == 'pyshark':
flag, engine = self.import_test('pyshark', name='PyShark')
if flag:
return self._run_pyshark(engine)
elif self._exeng == 'pipeline':
flag, engine = self.import_test('multiprocessing', name=
'Pipeline Multiprocessing')
self._flag_m = flag = bool(flag and (self._flag_a and CPU_CNT > 1))
if self._flag_m:
return self._run_pipeline(engine)
warnings.warn(
f'extraction engine Pipeline Multiprocessing is not available; using default engine instead'
, EngineWarning, stacklevel=stacklevel())
elif self._exeng == 'server':
flag, engine = self.import_test('multiprocessing', name=
'Server Multiprocessing')
self._flag_m = flag = bool(flag and (self._flag_a and CPU_CNT > 2))
if self._flag_m:
return self._run_server(engine)
warnings.warn(
f'extraction engine Server Multiprocessing is not available; using default engine instead'
, EngineWarning, stacklevel=stacklevel())
elif self._exeng not in ('default', 'pcapkit'):
flag = False
warnings.warn(
f'unsupported extraction engine: {self._exeng}; using default engine instead'
, EngineWarning, stacklevel=stacklevel())
self._exeng = self._exeng if flag else 'default'
self.record_header()
self.record_frames()
| run | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n flag = True\n if self._exeng == 'dpkt':\n flag, engine = self.import_test('dpkt', name='DPKT')\n if flag:\n return self._run_dpkt(engine)\n elif self._exeng == 'scapy':\n flag, engine = self.import_test('scapy.all', name='Scapy')\n if flag:\n return self._run_scapy(engine)\n elif self._exeng == 'pyshark':\n flag, engine = self.import_test('pyshark', name='PyShark')\n if flag:\n return self._run_pyshark(engine)\n elif self._exeng == 'pipeline':\n flag, engine = self.import_test('multiprocessing', name=\n 'Pipeline Multiprocessing')\n self._flag_m = flag = bool(flag and (self._flag_a and CPU_CNT > 1))\n if self._flag_m:\n return self._run_pipeline(engine)\n warnings.warn(\n f'extraction engine Pipeline Multiprocessing is not available; using default engine instead'\n , EngineWarning, stacklevel=stacklevel())\n elif self._exeng == 'server':\n flag, engine = self.import_test('multiprocessing', name=\n 'Server Multiprocessing')\n self._flag_m = flag = bool(flag and (self._flag_a and CPU_CNT > 2))\n if self._flag_m:\n return self._run_server(engine)\n warnings.warn(\n f'extraction engine Server Multiprocessing is not available; using default engine instead'\n , EngineWarning, stacklevel=stacklevel())\n elif self._exeng not in ('default', 'pcapkit'):\n flag = False\n warnings.warn(\n f'unsupported extraction engine: {self._exeng}; using default engine instead'\n , EngineWarning, stacklevel=stacklevel())\n self._exeng = self._exeng if flag else 'default'\n self.record_header()\n self.record_frames()\n",
"role": "user"
},
{
"content": "run",
"role": "assistant"
}
] |
def x(self):
self._gbhdr = Header(self._ifile)
self._vinfo = self._gbhdr.version
self._dlink = self._gbhdr.protocol
self._nnsec = self._gbhdr.nanosecond
if self._trace is not NotImplemented:
self._trace._endian = self._gbhdr.byteorder
self._trace._nnsecd = self._gbhdr.nanosecond
if not self._flag_q:
if self._flag_f:
ofile = self._ofile(f'{self._ofnm}/Global Header.{self._fext}')
ofile(self._gbhdr.info, name='Global Header')
self._type = ofile.kind
else:
self._ofile(self._gbhdr.info, name='Global Header')
self._type = self._ofile.kind
| record_header | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n self._gbhdr = Header(self._ifile)\n self._vinfo = self._gbhdr.version\n self._dlink = self._gbhdr.protocol\n self._nnsec = self._gbhdr.nanosecond\n if self._trace is not NotImplemented:\n self._trace._endian = self._gbhdr.byteorder\n self._trace._nnsecd = self._gbhdr.nanosecond\n if not self._flag_q:\n if self._flag_f:\n ofile = self._ofile(f'{self._ofnm}/Global Header.{self._fext}')\n ofile(self._gbhdr.info, name='Global Header')\n self._type = ofile.kind\n else:\n self._ofile(self._gbhdr.info, name='Global Header')\n self._type = self._ofile.kind\n",
"role": "user"
},
{
"content": "record_header",
"role": "assistant"
}
] |
def x(self):
self._expkg = None
self._extmp = None
self._flag_e = True
self._ifile.close()
| cleanup | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n self._expkg = None\n self._extmp = None\n self._flag_e = True\n self._ifile.close()\n",
"role": "user"
},
{
"content": "cleanup",
"role": "assistant"
}
] |
def x(self):
if not self._flag_e and self._flag_m:
[proc.join() for proc in self._mpprc]
if self._exeng == 'server':
self._mpsvc.join()
if self._exeng == 'server':
self._frame = list(self._mpfrm)
self._reasm = list(self._mprsm)
self._trace = copy.deepcopy(self._mpkit.trace)
if self._exeng == 'pipeline':
self._frame = [self._mpkit.frames[x] for x in sorted(self.
_mpkit.frames)]
self._reasm = copy.deepcopy(self._mpkit.reassembly)
self._trace = copy.deepcopy(self._mpkit.trace)
self._mpmng.shutdown()
[delattr(self, attr) for attr in filter(lambda s: s.startswith(
'_mp'), dir(self))]
self._frnum -= 2
| aftermathmp | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n if not self._flag_e and self._flag_m:\n [proc.join() for proc in self._mpprc]\n if self._exeng == 'server':\n self._mpsvc.join()\n if self._exeng == 'server':\n self._frame = list(self._mpfrm)\n self._reasm = list(self._mprsm)\n self._trace = copy.deepcopy(self._mpkit.trace)\n if self._exeng == 'pipeline':\n self._frame = [self._mpkit.frames[x] for x in sorted(self.\n _mpkit.frames)]\n self._reasm = copy.deepcopy(self._mpkit.reassembly)\n self._trace = copy.deepcopy(self._mpkit.trace)\n self._mpmng.shutdown()\n [delattr(self, attr) for attr in filter(lambda s: s.startswith(\n '_mp'), dir(self))]\n self._frnum -= 2\n",
"role": "user"
},
{
"content": "aftermathmp",
"role": "assistant"
}
] |
def x(self):
self._aftermathmp()
self._ifile.close()
self._flag_e = True
| update_eof | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n self._aftermathmp()\n self._ifile.close()\n self._flag_e = True\n",
"role": "user"
},
{
"content": "update_eof",
"role": "assistant"
}
] |
def x(self):
if self._exeng == 'scapy':
return self._scapy_read_frame()
elif self._exeng == 'dpkt':
return self._dpkt_read_frame()
elif self._exeng == 'pyshark':
return self._pyshark_read_frame()
else:
return self._default_read_frame()
| read_frame | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n if self._exeng == 'scapy':\n return self._scapy_read_frame()\n elif self._exeng == 'dpkt':\n return self._dpkt_read_frame()\n elif self._exeng == 'pyshark':\n return self._pyshark_read_frame()\n else:\n return self._default_read_frame()\n",
"role": "user"
},
{
"content": "read_frame",
"role": "assistant"
}
] |
def x(self, *, frame=None, mpkit=None):
from pcapkit.toolkit.default import ipv4_reassembly, ipv6_reassembly, tcp_reassembly, tcp_traceflow
if not self._flag_m:
frame = Frame(self._ifile, num=self._frnum + 1, proto=self._dlink,
layer=self._exlyr, protocol=self._exptl, nanosecond=self._nnsec)
self._frnum += 1
if self._flag_v:
print(f' - Frame {self._frnum:>3d}: {frame.protochain}')
frnum = f'Frame {self._frnum}'
if not self._flag_q:
if self._flag_f:
ofile = self._ofile(f'{self._ofnm}/{frnum}.{self._fext}')
ofile(frame.info, name=frnum)
else:
self._ofile(frame.info, name=frnum)
if self._ipv4:
flag, data = ipv4_reassembly(frame)
if flag:
self._reasm[0](data)
if self._ipv6:
flag, data = ipv6_reassembly(frame)
if flag:
self._reasm[1](data)
if self._tcp:
flag, data = tcp_reassembly(frame)
if flag:
self._reasm[2](data)
if self._flag_t:
flag, data = tcp_traceflow(frame, data_link=self._dlink)
if flag:
self._trace(data)
if self._exeng == 'pipeline':
if self._flag_d:
mpkit.frames[self._frnum] = frame
mpkit.current += 1
elif self._exeng == 'server':
if self._flag_d:
self._frame.append(frame)
self._frnum += 1
else:
if self._flag_d:
self._frame.append(frame)
self._proto = frame.protochain.chain
return frame
| default_read_frame | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, *, frame=None, mpkit=None):\n from pcapkit.toolkit.default import ipv4_reassembly, ipv6_reassembly, tcp_reassembly, tcp_traceflow\n if not self._flag_m:\n frame = Frame(self._ifile, num=self._frnum + 1, proto=self._dlink,\n layer=self._exlyr, protocol=self._exptl, nanosecond=self._nnsec)\n self._frnum += 1\n if self._flag_v:\n print(f' - Frame {self._frnum:>3d}: {frame.protochain}')\n frnum = f'Frame {self._frnum}'\n if not self._flag_q:\n if self._flag_f:\n ofile = self._ofile(f'{self._ofnm}/{frnum}.{self._fext}')\n ofile(frame.info, name=frnum)\n else:\n self._ofile(frame.info, name=frnum)\n if self._ipv4:\n flag, data = ipv4_reassembly(frame)\n if flag:\n self._reasm[0](data)\n if self._ipv6:\n flag, data = ipv6_reassembly(frame)\n if flag:\n self._reasm[1](data)\n if self._tcp:\n flag, data = tcp_reassembly(frame)\n if flag:\n self._reasm[2](data)\n if self._flag_t:\n flag, data = tcp_traceflow(frame, data_link=self._dlink)\n if flag:\n self._trace(data)\n if self._exeng == 'pipeline':\n if self._flag_d:\n mpkit.frames[self._frnum] = frame\n mpkit.current += 1\n elif self._exeng == 'server':\n if self._flag_d:\n self._frame.append(frame)\n self._frnum += 1\n else:\n if self._flag_d:\n self._frame.append(frame)\n self._proto = frame.protochain.chain\n return frame\n",
"role": "user"
},
{
"content": "default_read_frame",
"role": "assistant"
}
] |
def x(self, scapy_all):
if self._exlyr != 'None' or self._exptl != 'null':
warnings.warn(
f"'Extractor(engine=scapy)' does not support protocol and layer threshold; 'layer={self._exlyr}' and 'protocol={self._exptl}' ignored"
, AttributeWarning, stacklevel=stacklevel())
self._expkg = scapy_all
self._extmp = iter(scapy_all.sniff(offline=self._ifnm))
self.record_frames()
| run_scapy | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, scapy_all):\n if self._exlyr != 'None' or self._exptl != 'null':\n warnings.warn(\n f\"'Extractor(engine=scapy)' does not support protocol and layer threshold; 'layer={self._exlyr}' and 'protocol={self._exptl}' ignored\"\n , AttributeWarning, stacklevel=stacklevel())\n self._expkg = scapy_all\n self._extmp = iter(scapy_all.sniff(offline=self._ifnm))\n self.record_frames()\n",
"role": "user"
},
{
"content": "run_scapy",
"role": "assistant"
}
] |
def x(self):
from pcapkit.toolkit.scapy import ipv4_reassembly, ipv6_reassembly, packet2chain, packet2dict, tcp_reassembly, tcp_traceflow
packet = next(self._extmp)
self._frnum += 1
self._proto = packet2chain(packet)
if self._flag_v:
print(f' - Frame {self._frnum:>3d}: {self._proto}')
frnum = f'Frame {self._frnum}'
if not self._flag_q:
info = packet2dict(packet)
if self._flag_f:
ofile = self._ofile(f'{self._ofnm}/{frnum}.{self._fext}')
ofile(info, name=frnum)
else:
self._ofile(info, name=frnum)
if self._flag_d:
self._frame.append(packet)
if self._ipv4:
flag, data = ipv4_reassembly(packet, count=self._frnum)
if flag:
self._reasm[0](data)
if self._ipv6:
flag, data = ipv6_reassembly(packet, count=self._frnum)
if flag:
self._reasm[1](data)
if self._tcp:
flag, data = tcp_reassembly(packet, count=self._frnum)
if flag:
self._reasm[2](data)
if self._flag_t:
flag, data = tcp_traceflow(packet, count=self._frnum)
if flag:
self._trace(data)
return packet
| scapy_read_frame | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n from pcapkit.toolkit.scapy import ipv4_reassembly, ipv6_reassembly, packet2chain, packet2dict, tcp_reassembly, tcp_traceflow\n packet = next(self._extmp)\n self._frnum += 1\n self._proto = packet2chain(packet)\n if self._flag_v:\n print(f' - Frame {self._frnum:>3d}: {self._proto}')\n frnum = f'Frame {self._frnum}'\n if not self._flag_q:\n info = packet2dict(packet)\n if self._flag_f:\n ofile = self._ofile(f'{self._ofnm}/{frnum}.{self._fext}')\n ofile(info, name=frnum)\n else:\n self._ofile(info, name=frnum)\n if self._flag_d:\n self._frame.append(packet)\n if self._ipv4:\n flag, data = ipv4_reassembly(packet, count=self._frnum)\n if flag:\n self._reasm[0](data)\n if self._ipv6:\n flag, data = ipv6_reassembly(packet, count=self._frnum)\n if flag:\n self._reasm[1](data)\n if self._tcp:\n flag, data = tcp_reassembly(packet, count=self._frnum)\n if flag:\n self._reasm[2](data)\n if self._flag_t:\n flag, data = tcp_traceflow(packet, count=self._frnum)\n if flag:\n self._trace(data)\n return packet\n",
"role": "user"
},
{
"content": "scapy_read_frame",
"role": "assistant"
}
] |
def x(self, dpkt):
if self._exlyr != 'None' or self._exptl != 'null':
warnings.warn(
f"'Extractor(engine=dpkt)' does not support protocol and layer threshold; 'layer={self._exlyr}' and 'protocol={self._exptl}' ignored"
, AttributeWarning, stacklevel=stacklevel())
self.record_header()
self._ifile.seek(0, os.SEEK_SET)
self._expkg = dpkt
self._extmp = iter(dpkt.pcap.Reader(self._ifile))
self.record_frames()
| run_dpkt | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, dpkt):\n if self._exlyr != 'None' or self._exptl != 'null':\n warnings.warn(\n f\"'Extractor(engine=dpkt)' does not support protocol and layer threshold; 'layer={self._exlyr}' and 'protocol={self._exptl}' ignored\"\n , AttributeWarning, stacklevel=stacklevel())\n self.record_header()\n self._ifile.seek(0, os.SEEK_SET)\n self._expkg = dpkt\n self._extmp = iter(dpkt.pcap.Reader(self._ifile))\n self.record_frames()\n",
"role": "user"
},
{
"content": "run_dpkt",
"role": "assistant"
}
] |
def x(self):
from pcapkit.toolkit.dpkt import ipv4_reassembly, ipv6_reassembly, packet2chain, packet2dict, tcp_reassembly, tcp_traceflow
timestamp, packet = next(self._extmp)
if self._dlink.value == 1:
packet = self._expkg.ethernet.Ethernet(packet)
elif self._dlink.value == 228:
packet = self._expkg.ip.IP(packet)
elif self._dlink.value == 229:
packet = self._expkg.ip6.IP6(packet)
else:
warnings.warn(
'unrecognised link layer protocol; all analysis functions ignored',
DPKTWarning, stacklevel=stacklevel())
self._frnum += 1
if self._flag_d:
self._frame.append(packet)
return packet
self._frnum += 1
self._proto = packet2chain(packet)
if self._flag_v:
print(f' - Frame {self._frnum:>3d}: {self._proto}')
frnum = f'Frame {self._frnum}'
if not self._flag_q:
info = packet2dict(packet, timestamp, data_link=self._dlink)
if self._flag_f:
ofile = self._ofile(f'{self._ofnm}/{frnum}.{self._fext}')
ofile(info, name=frnum)
else:
self._ofile(info, name=frnum)
if self._flag_d:
setattr(packet, 'packet2dict', packet2dict)
setattr(packet, 'packet2chain', packet2chain)
self._frame.append(packet)
if self._ipv4:
flag, data = ipv4_reassembly(packet, count=self._frnum)
if flag:
self._reasm[0](data)
if self._ipv6:
flag, data = ipv6_reassembly(packet, count=self._frnum)
if flag:
self._reasm[1](data)
if self._tcp:
flag, data = tcp_reassembly(packet, count=self._frnum)
if flag:
self._reasm[2](data)
if self._flag_t:
flag, data = tcp_traceflow(packet, timestamp, data_link=self._dlink,
count=self._frnum)
if flag:
self._trace(data)
return packet
| dpkt_read_frame | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n from pcapkit.toolkit.dpkt import ipv4_reassembly, ipv6_reassembly, packet2chain, packet2dict, tcp_reassembly, tcp_traceflow\n timestamp, packet = next(self._extmp)\n if self._dlink.value == 1:\n packet = self._expkg.ethernet.Ethernet(packet)\n elif self._dlink.value == 228:\n packet = self._expkg.ip.IP(packet)\n elif self._dlink.value == 229:\n packet = self._expkg.ip6.IP6(packet)\n else:\n warnings.warn(\n 'unrecognised link layer protocol; all analysis functions ignored',\n DPKTWarning, stacklevel=stacklevel())\n self._frnum += 1\n if self._flag_d:\n self._frame.append(packet)\n return packet\n self._frnum += 1\n self._proto = packet2chain(packet)\n if self._flag_v:\n print(f' - Frame {self._frnum:>3d}: {self._proto}')\n frnum = f'Frame {self._frnum}'\n if not self._flag_q:\n info = packet2dict(packet, timestamp, data_link=self._dlink)\n if self._flag_f:\n ofile = self._ofile(f'{self._ofnm}/{frnum}.{self._fext}')\n ofile(info, name=frnum)\n else:\n self._ofile(info, name=frnum)\n if self._flag_d:\n setattr(packet, 'packet2dict', packet2dict)\n setattr(packet, 'packet2chain', packet2chain)\n self._frame.append(packet)\n if self._ipv4:\n flag, data = ipv4_reassembly(packet, count=self._frnum)\n if flag:\n self._reasm[0](data)\n if self._ipv6:\n flag, data = ipv6_reassembly(packet, count=self._frnum)\n if flag:\n self._reasm[1](data)\n if self._tcp:\n flag, data = tcp_reassembly(packet, count=self._frnum)\n if flag:\n self._reasm[2](data)\n if self._flag_t:\n flag, data = tcp_traceflow(packet, timestamp, data_link=self._dlink,\n count=self._frnum)\n if flag:\n self._trace(data)\n return packet\n",
"role": "user"
},
{
"content": "dpkt_read_frame",
"role": "assistant"
}
] |
def x(self, pyshark):
if self._exlyr != 'None' or self._exptl != 'null':
warnings.warn(
f"'Extractor(engine=pyshark)' does not support protocol and layer threshold; 'layer={self._exlyr}' and 'protocol={self._exptl}' ignored"
, AttributeWarning, stacklevel=stacklevel())
if self._ipv4 or self._ipv6 or self._tcp:
self._ipv4 = self._ipv6 = self._tcp = False
self._reasm = [None] * 3
warnings.warn(
f"'Extractor(engine=pyshark)' object dose not support reassembly; so 'ipv4={self._ipv4}', 'ipv6={self._ipv6}' and 'tcp={self._tcp}' will be ignored"
, AttributeWarning, stacklevel=stacklevel())
self._expkg = pyshark
self._extmp = iter(pyshark.FileCapture(self._ifnm, keep_packets=False))
self.record_frames()
| run_pyshark | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, pyshark):\n if self._exlyr != 'None' or self._exptl != 'null':\n warnings.warn(\n f\"'Extractor(engine=pyshark)' does not support protocol and layer threshold; 'layer={self._exlyr}' and 'protocol={self._exptl}' ignored\"\n , AttributeWarning, stacklevel=stacklevel())\n if self._ipv4 or self._ipv6 or self._tcp:\n self._ipv4 = self._ipv6 = self._tcp = False\n self._reasm = [None] * 3\n warnings.warn(\n f\"'Extractor(engine=pyshark)' object dose not support reassembly; so 'ipv4={self._ipv4}', 'ipv6={self._ipv6}' and 'tcp={self._tcp}' will be ignored\"\n , AttributeWarning, stacklevel=stacklevel())\n self._expkg = pyshark\n self._extmp = iter(pyshark.FileCapture(self._ifnm, keep_packets=False))\n self.record_frames()\n",
"role": "user"
},
{
"content": "run_pyshark",
"role": "assistant"
}
] |
def x(self):
from pcapkit.toolkit.pyshark import packet2dict, tcp_traceflow
packet = next(self._extmp)
self._frnum = int(packet.number)
self._proto = packet.frame_info.protocols
if self._flag_v:
print(f' - Frame {self._frnum:>3d}: {self._proto}')
frnum = f'Frame {self._frnum}'
if not self._flag_q:
info = packet2dict(packet)
if self._flag_f:
ofile = self._ofile(f'{self._ofnm}/{frnum}.{self._fext}')
ofile(info, name=frnum)
else:
self._ofile(info, name=frnum)
if self._flag_d:
setattr(packet, 'packet2dict', packet2dict)
self._frame.append(packet)
if self._flag_t:
flag, data = tcp_traceflow(packet)
if flag:
self._trace(data)
return packet
| pyshark_read_frame | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n from pcapkit.toolkit.pyshark import packet2dict, tcp_traceflow\n packet = next(self._extmp)\n self._frnum = int(packet.number)\n self._proto = packet.frame_info.protocols\n if self._flag_v:\n print(f' - Frame {self._frnum:>3d}: {self._proto}')\n frnum = f'Frame {self._frnum}'\n if not self._flag_q:\n info = packet2dict(packet)\n if self._flag_f:\n ofile = self._ofile(f'{self._ofnm}/{frnum}.{self._fext}')\n ofile(info, name=frnum)\n else:\n self._ofile(info, name=frnum)\n if self._flag_d:\n setattr(packet, 'packet2dict', packet2dict)\n self._frame.append(packet)\n if self._flag_t:\n flag, data = tcp_traceflow(packet)\n if flag:\n self._trace(data)\n return packet\n",
"role": "user"
},
{
"content": "pyshark_read_frame",
"role": "assistant"
}
] |
def x(self, multiprocessing):
if not self._flag_m:
raise UnsupportedCall(
f"Extractor(engine={self._exeng})' has no attribute '_run_pipline'"
)
if not self._flag_q:
self._flag_q = True
warnings.warn(
f"'Extractor(engine=pipeline)' does not support output; 'fout={self._ofnm}' ignored"
, AttributeWarning, stacklevel=stacklevel())
self._frnum = 1
self._expkg = multiprocessing
self._mpprc = list()
self._mpfdp = collections.defaultdict(multiprocessing.Queue)
self._mpmng = multiprocessing.Manager()
self._mpkit = self._mpmng.Namespace()
self._mpkit.counter = 0
self._mpkit.pool = 1
self._mpkit.current = 1
self._mpkit.eof = False
self._mpkit.frames = dict()
self._mpkit.trace = self._trace
self._mpkit.reassembly = copy.deepcopy(self._reasm)
self.record_header()
self._mpfdp[0].put(self._gbhdr.length)
while True:
if self._mpkit.eof:
self._update_eof()
break
if self._mpkit.pool and self._mpkit.counter < CPU_CNT:
self._ifile.seek(self._mpfdp.pop(self._frnum - 1).get(), os.
SEEK_SET)
proc = multiprocessing.Process(target=self._pipeline_read_frame,
kwargs={'mpkit': self._mpkit, 'mpfdp': self._mpfdp[self.
_frnum]})
self._mpkit.pool -= 1
self._mpkit.counter += 1
proc.start()
self._frnum += 1
self._mpprc.append(proc)
if len(self._mpprc) >= CPU_CNT:
[proc.join() for proc in self._mpprc[:-4]]
del self._mpprc[:-4]
| run_pipeline | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, multiprocessing):\n if not self._flag_m:\n raise UnsupportedCall(\n f\"Extractor(engine={self._exeng})' has no attribute '_run_pipline'\"\n )\n if not self._flag_q:\n self._flag_q = True\n warnings.warn(\n f\"'Extractor(engine=pipeline)' does not support output; 'fout={self._ofnm}' ignored\"\n , AttributeWarning, stacklevel=stacklevel())\n self._frnum = 1\n self._expkg = multiprocessing\n self._mpprc = list()\n self._mpfdp = collections.defaultdict(multiprocessing.Queue)\n self._mpmng = multiprocessing.Manager()\n self._mpkit = self._mpmng.Namespace()\n self._mpkit.counter = 0\n self._mpkit.pool = 1\n self._mpkit.current = 1\n self._mpkit.eof = False\n self._mpkit.frames = dict()\n self._mpkit.trace = self._trace\n self._mpkit.reassembly = copy.deepcopy(self._reasm)\n self.record_header()\n self._mpfdp[0].put(self._gbhdr.length)\n while True:\n if self._mpkit.eof:\n self._update_eof()\n break\n if self._mpkit.pool and self._mpkit.counter < CPU_CNT:\n self._ifile.seek(self._mpfdp.pop(self._frnum - 1).get(), os.\n SEEK_SET)\n proc = multiprocessing.Process(target=self._pipeline_read_frame,\n kwargs={'mpkit': self._mpkit, 'mpfdp': self._mpfdp[self.\n _frnum]})\n self._mpkit.pool -= 1\n self._mpkit.counter += 1\n proc.start()\n self._frnum += 1\n self._mpprc.append(proc)\n if len(self._mpprc) >= CPU_CNT:\n [proc.join() for proc in self._mpprc[:-4]]\n del self._mpprc[:-4]\n",
"role": "user"
},
{
"content": "run_pipeline",
"role": "assistant"
}
] |
def x(self, *, mpfdp, mpkit):
if self._flag_e:
raise EOFError
def x(*, frame, mpkit):
while mpkit.current != self._frnum:
time.sleep(random.randint(0, datetime.datetime.now().second) // 600
)
self._trace = mpkit.trace
self._reasm = mpkit.reassembly
self._default_read_frame(frame=frame, mpkit=mpkit)
mpkit.trace = copy.deepcopy(self._trace)
mpkit.reassembly = copy.deepcopy(self._reasm)
try:
frame = Frame(self._ifile, num=self._frnum, proto=self._dlink,
layer=self._exlyr, protocol=self._exptl, nanosecond=self._nnsec,
mpkit=mpkit, mpfdp=mpfdp)
_analyse_frame(frame=frame, mpkit=mpkit)
except EOFError:
mpkit.eof = True
finally:
mpkit.counter -= 1
self._ifile.close()
| pipeline_read_frame | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, *, mpfdp, mpkit):\n if self._flag_e:\n raise EOFError\n\n def x(*, frame, mpkit):\n while mpkit.current != self._frnum:\n time.sleep(random.randint(0, datetime.datetime.now().second) // 600\n )\n self._trace = mpkit.trace\n self._reasm = mpkit.reassembly\n self._default_read_frame(frame=frame, mpkit=mpkit)\n mpkit.trace = copy.deepcopy(self._trace)\n mpkit.reassembly = copy.deepcopy(self._reasm)\n try:\n frame = Frame(self._ifile, num=self._frnum, proto=self._dlink,\n layer=self._exlyr, protocol=self._exptl, nanosecond=self._nnsec,\n mpkit=mpkit, mpfdp=mpfdp)\n _analyse_frame(frame=frame, mpkit=mpkit)\n except EOFError:\n mpkit.eof = True\n finally:\n mpkit.counter -= 1\n self._ifile.close()\n",
"role": "user"
},
{
"content": "pipeline_read_frame",
"role": "assistant"
}
] |
def x(self, multiprocessing):
if not self._flag_m:
raise UnsupportedCall(
f"Extractor(engine={self._exeng})' has no attribute '_run_server'")
if not self._flag_q:
self._flag_q = True
warnings.warn(
f"'Extractor(engine=pipeline)' does not support output; 'fout={self._ofnm}' ignored"
, AttributeWarning, stacklevel=stacklevel())
self._frnum = 1
self._expkg = multiprocessing
self._mpsvc = NotImplemented
self._mpprc = list()
self._mpfdp = collections.defaultdict(multiprocessing.Queue)
self._mpmng = multiprocessing.Manager()
self._mpbuf = self._mpmng.dict()
self._mpfrm = self._mpmng.list()
self._mprsm = self._mpmng.list()
self._mpkit = self._mpmng.Namespace()
self._mpkit.counter = 0
self._mpkit.pool = 1
self._mpkit.eof = False
self._mpkit.trace = None
self.record_header()
self._mpfdp[0].put(self._gbhdr.length)
self._mpsvc = multiprocessing.Process(target=self._server_analyse_frame,
kwargs={'mpfrm': self._mpfrm, 'mprsm': self._mprsm, 'mpbuf': self.
_mpbuf, 'mpkit': self._mpkit})
self._mpsvc.start()
while True:
if self._mpkit.eof:
self._update_eof()
break
if self._mpkit.pool and self._mpkit.counter < CPU_CNT - 1:
self._ifile.seek(self._mpfdp.pop(self._frnum - 1).get(), os.
SEEK_SET)
proc = multiprocessing.Process(target=self.
_server_extract_frame, kwargs={'mpkit': self._mpkit,
'mpbuf': self._mpbuf, 'mpfdp': self._mpfdp[self._frnum]})
self._mpkit.pool -= 1
self._mpkit.counter += 1
proc.start()
self._frnum += 1
self._mpprc.append(proc)
if len(self._mpprc) >= CPU_CNT - 1:
[proc.join() for proc in self._mpprc[:-4]]
del self._mpprc[:-4]
| run_server | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, multiprocessing):\n if not self._flag_m:\n raise UnsupportedCall(\n f\"Extractor(engine={self._exeng})' has no attribute '_run_server'\")\n if not self._flag_q:\n self._flag_q = True\n warnings.warn(\n f\"'Extractor(engine=pipeline)' does not support output; 'fout={self._ofnm}' ignored\"\n , AttributeWarning, stacklevel=stacklevel())\n self._frnum = 1\n self._expkg = multiprocessing\n self._mpsvc = NotImplemented\n self._mpprc = list()\n self._mpfdp = collections.defaultdict(multiprocessing.Queue)\n self._mpmng = multiprocessing.Manager()\n self._mpbuf = self._mpmng.dict()\n self._mpfrm = self._mpmng.list()\n self._mprsm = self._mpmng.list()\n self._mpkit = self._mpmng.Namespace()\n self._mpkit.counter = 0\n self._mpkit.pool = 1\n self._mpkit.eof = False\n self._mpkit.trace = None\n self.record_header()\n self._mpfdp[0].put(self._gbhdr.length)\n self._mpsvc = multiprocessing.Process(target=self._server_analyse_frame,\n kwargs={'mpfrm': self._mpfrm, 'mprsm': self._mprsm, 'mpbuf': self.\n _mpbuf, 'mpkit': self._mpkit})\n self._mpsvc.start()\n while True:\n if self._mpkit.eof:\n self._update_eof()\n break\n if self._mpkit.pool and self._mpkit.counter < CPU_CNT - 1:\n self._ifile.seek(self._mpfdp.pop(self._frnum - 1).get(), os.\n SEEK_SET)\n proc = multiprocessing.Process(target=self.\n _server_extract_frame, kwargs={'mpkit': self._mpkit,\n 'mpbuf': self._mpbuf, 'mpfdp': self._mpfdp[self._frnum]})\n self._mpkit.pool -= 1\n self._mpkit.counter += 1\n proc.start()\n self._frnum += 1\n self._mpprc.append(proc)\n if len(self._mpprc) >= CPU_CNT - 1:\n [proc.join() for proc in self._mpprc[:-4]]\n del self._mpprc[:-4]\n",
"role": "user"
},
{
"content": "run_server",
"role": "assistant"
}
] |
def x(self, *, mpfdp, mpkit, mpbuf):
if self._flag_e:
raise EOFError
try:
frame = Frame(self._ifile, num=self._frnum, proto=self._dlink,
layer=self._exlyr, protocol=self._exptl, nanosecond=self._nnsec,
mpkit=mpkit, mpfdp=mpfdp)
mpbuf[self._frnum] = frame
except EOFError:
mpbuf[self._frnum] = EOFError
mpkit.eof = True
finally:
mpkit.counter -= 1
self._ifile.close()
| server_extract_frame | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, *, mpfdp, mpkit, mpbuf):\n if self._flag_e:\n raise EOFError\n try:\n frame = Frame(self._ifile, num=self._frnum, proto=self._dlink,\n layer=self._exlyr, protocol=self._exptl, nanosecond=self._nnsec,\n mpkit=mpkit, mpfdp=mpfdp)\n mpbuf[self._frnum] = frame\n except EOFError:\n mpbuf[self._frnum] = EOFError\n mpkit.eof = True\n finally:\n mpkit.counter -= 1\n self._ifile.close()\n",
"role": "user"
},
{
"content": "server_extract_frame",
"role": "assistant"
}
] |
def x(self, *, mpkit, mpfrm, mprsm, mpbuf):
while True:
frame = mpbuf.pop(self._frnum, None)
if frame is EOFError:
break
if frame is None:
continue
self._default_read_frame(frame=frame)
mpfrm += self._frame
mprsm += self._reasm
mpkit.trace = copy.deepcopy(self._trace)
| server_analyse_frame | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, *, mpkit, mpfrm, mprsm, mpbuf):\n while True:\n frame = mpbuf.pop(self._frnum, None)\n if frame is EOFError:\n break\n if frame is None:\n continue\n self._default_read_frame(frame=frame)\n mpfrm += self._frame\n mprsm += self._reasm\n mpkit.trace = copy.deepcopy(self._trace)\n",
"role": "user"
},
{
"content": "server_analyse_frame",
"role": "assistant"
}
] |
def x(key, default=-1):
if isinstance(key, int):
return Checksum(key)
if key not in Checksum._member_map_:
extend_enum(Checksum, key, default)
return Checksum[key]
| get | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(key, default=-1):\n if isinstance(key, int):\n return Checksum(key)\n if key not in Checksum._member_map_:\n extend_enum(Checksum, key, default)\n return Checksum[key]\n",
"role": "user"
},
{
"content": "get",
"role": "assistant"
}
] |
def x(key, default=-1):
if isinstance(key, int):
return Operation(key)
if key not in Operation._member_map_:
extend_enum(Operation, key, default)
return Operation[key]
| get | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(key, default=-1):\n if isinstance(key, int):\n return Operation(key)\n if key not in Operation._member_map_:\n extend_enum(Operation, key, default)\n return Operation[key]\n",
"role": "user"
},
{
"content": "get",
"role": "assistant"
}
] |
def x(self, length):
_plen = self._read_binary(3)
_type = self._read_unpack(1)
_flag = self._read_binary(1)
_stid = self._read_binary(4)
| read_http | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, length):\n _plen = self._read_binary(3)\n _type = self._read_unpack(1)\n _flag = self._read_binary(1)\n _stid = self._read_binary(4)\n",
"role": "user"
},
{
"content": "read_http",
"role": "assistant"
}
] |
def x(file, length=None, *, _termination=False):
seekset = file.tell()
if not _termination:
flag, ftp = _analyse_ftp(file, length, seekset=seekset)
if flag:
return ftp
flag, http = _analyse_httpv1(file, length, seekset=seekset)
if flag:
return http
flag, http = _analyse_httpv2(file, length, seekset=seekset)
if flag:
return http
file.seek(seekset, os.SEEK_SET)
return Raw(file, length)
| analyse | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(file, length=None, *, _termination=False):\n seekset = file.tell()\n if not _termination:\n flag, ftp = _analyse_ftp(file, length, seekset=seekset)\n if flag:\n return ftp\n flag, http = _analyse_httpv1(file, length, seekset=seekset)\n if flag:\n return http\n flag, http = _analyse_httpv2(file, length, seekset=seekset)\n if flag:\n return http\n file.seek(seekset, os.SEEK_SET)\n return Raw(file, length)\n",
"role": "user"
},
{
"content": "analyse",
"role": "assistant"
}
] |
def x(key, default=-1):
if isinstance(key, int):
return Routing(key)
if key not in Routing._member_map_:
extend_enum(Routing, key, default)
return Routing[key]
| get | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(key, default=-1):\n if isinstance(key, int):\n return Routing(key)\n if key not in Routing._member_map_:\n extend_enum(Routing, key, default)\n return Routing[key]\n",
"role": "user"
},
{
"content": "get",
"role": "assistant"
}
] |
def x(self, size):
_byte = self._read_unpack(size)
_prot = ETHERTYPE.get(_byte)
return _prot
| read_protos | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, size):\n _byte = self._read_unpack(size)\n _prot = ETHERTYPE.get(_byte)\n return _prot\n",
"role": "user"
},
{
"content": "read_protos",
"role": "assistant"
}
] |
def x(self, proto, length):
if length == 0:
from pcapkit.protocols.null import NoPayload as Protocol
elif self._sigterm:
from pcapkit.protocols.raw import Raw as Protocol
elif proto == 2054:
from pcapkit.protocols.link.arp import ARP as Protocol
elif proto == 32821:
from pcapkit.protocols.link.rarp import RARP as Protocol
elif proto == 33024:
from pcapkit.protocols.link.vlan import VLAN as Protocol
elif proto == 2048:
from pcapkit.protocols.internet.ipv4 import IPv4 as Protocol
elif proto == 34525:
from pcapkit.protocols.internet.ipv6 import IPv6 as Protocol
elif proto == 33079:
from pcapkit.protocols.internet.ipx import IPX as Protocol
else:
from pcapkit.protocols.raw import Raw as Protocol
next_ = Protocol(self._file, length, error=self._onerror, layer=self.
_exlayer, protocol=self._exproto)
return next_
| import_next_layer | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, proto, length):\n if length == 0:\n from pcapkit.protocols.null import NoPayload as Protocol\n elif self._sigterm:\n from pcapkit.protocols.raw import Raw as Protocol\n elif proto == 2054:\n from pcapkit.protocols.link.arp import ARP as Protocol\n elif proto == 32821:\n from pcapkit.protocols.link.rarp import RARP as Protocol\n elif proto == 33024:\n from pcapkit.protocols.link.vlan import VLAN as Protocol\n elif proto == 2048:\n from pcapkit.protocols.internet.ipv4 import IPv4 as Protocol\n elif proto == 34525:\n from pcapkit.protocols.internet.ipv6 import IPv6 as Protocol\n elif proto == 33079:\n from pcapkit.protocols.internet.ipx import IPX as Protocol\n else:\n from pcapkit.protocols.raw import Raw as Protocol\n next_ = Protocol(self._file, length, error=self._onerror, layer=self.\n _exlayer, protocol=self._exproto)\n return next_\n",
"role": "user"
},
{
"content": "import_next_layer",
"role": "assistant"
}
] |
def x(key, default=-1):
if isinstance(key, int):
return HIT_Suite(key)
if key not in HIT_Suite._member_map_:
extend_enum(HIT_Suite, key, default)
return HIT_Suite[key]
| get | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(key, default=-1):\n if isinstance(key, int):\n return HIT_Suite(key)\n if key not in HIT_Suite._member_map_:\n extend_enum(HIT_Suite, key, default)\n return HIT_Suite[key]\n",
"role": "user"
},
{
"content": "get",
"role": "assistant"
}
] |
def x(key, default=-1):
if isinstance(key, int):
return Authentication(key)
if key not in Authentication._member_map_:
extend_enum(Authentication, key, default)
return Authentication[key]
| get | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(key, default=-1):\n if isinstance(key, int):\n return Authentication(key)\n if key not in Authentication._member_map_:\n extend_enum(Authentication, key, default)\n return Authentication[key]\n",
"role": "user"
},
{
"content": "get",
"role": "assistant"
}
] |
def x(fout='./tmp', fmt='pcap'):
if fmt == 'pcap':
from pcapkit.dumpkit import PCAP as output
elif fmt == 'plist':
from dictdumper import PLIST as output
elif fmt == 'json':
from dictdumper import JSON as output
elif fmt == 'tree':
from dictdumper import Tree as output
fmt = 'txt'
elif fmt == 'html':
from dictdumper import JavaScript as output
fmt = 'js'
elif fmt == 'xml':
from dictdumper import XML as output
else:
from pcapkit.dumpkit import NotImplementedIO as output
if fmt is not None:
warnings.warn(
f'Unsupported output format: {fmt}; disabled file output feature'
, FormatWarning, stacklevel=stacklevel())
return output, ''
try:
pathlib.Path(fout).mkdir(parents=True, exist_ok=True)
except FileExistsError as error:
if fmt is None:
warnings.warn(error.strerror, FileWarning, stacklevel=stacklevel())
else:
raise FileExists(*error.args) from None
return output, fmt
| make_fout | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(fout='./tmp', fmt='pcap'):\n if fmt == 'pcap':\n from pcapkit.dumpkit import PCAP as output\n elif fmt == 'plist':\n from dictdumper import PLIST as output\n elif fmt == 'json':\n from dictdumper import JSON as output\n elif fmt == 'tree':\n from dictdumper import Tree as output\n fmt = 'txt'\n elif fmt == 'html':\n from dictdumper import JavaScript as output\n fmt = 'js'\n elif fmt == 'xml':\n from dictdumper import XML as output\n else:\n from pcapkit.dumpkit import NotImplementedIO as output\n if fmt is not None:\n warnings.warn(\n f'Unsupported output format: {fmt}; disabled file output feature'\n , FormatWarning, stacklevel=stacklevel())\n return output, ''\n try:\n pathlib.Path(fout).mkdir(parents=True, exist_ok=True)\n except FileExistsError as error:\n if fmt is None:\n warnings.warn(error.strerror, FileWarning, stacklevel=stacklevel())\n else:\n raise FileExists(*error.args) from None\n return output, fmt\n",
"role": "user"
},
{
"content": "make_fout",
"role": "assistant"
}
] |
def x(self, packet):
output = self.trace(packet, _check=False, _output=True)
output(packet['frame'], name=f"Frame {packet['index']}", byteorder=self
._endian, nanosecond=self._nnsecd)
| dump | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, packet):\n output = self.trace(packet, _check=False, _output=True)\n output(packet['frame'], name=f\"Frame {packet['index']}\", byteorder=self\n ._endian, nanosecond=self._nnsecd)\n",
"role": "user"
},
{
"content": "dump",
"role": "assistant"
}
] |
def x(self, packet, *, _check=True, _output=False):
self._newflg = True
if _check:
pkt_check(packet)
info = Info(packet)
BUFID = tuple(sorted([str(info.src), str(info.srcport), str(info.dst),
str(info.dstport)]))
FIN = info.fin
if BUFID not in self._buffer:
label = (
f'{info.src}_{info.srcport}-{info.dst}_{info.dstport}-{info.timestamp}'
)
self._buffer[BUFID] = dict(fpout=self._foutio(
f'{self._fproot}/{label}.{self._fdpext}', protocol=info.
protocol), index=list(), label=label)
self._buffer[BUFID]['index'].append(info.index)
fpout = self._buffer[BUFID]['fpout']
label = self._buffer[BUFID]['label']
if FIN:
buf = self._buffer.pop(BUFID)
if self._fdpext:
buf['fpout'] = f'{self._fproot}/{label}.{self._fdpext}'
else:
del buf['fpout']
buf['index'] = tuple(buf['index'])
self._stream.append(Info(buf))
return fpout if _output else label
| trace | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, packet, *, _check=True, _output=False):\n self._newflg = True\n if _check:\n pkt_check(packet)\n info = Info(packet)\n BUFID = tuple(sorted([str(info.src), str(info.srcport), str(info.dst),\n str(info.dstport)]))\n FIN = info.fin\n if BUFID not in self._buffer:\n label = (\n f'{info.src}_{info.srcport}-{info.dst}_{info.dstport}-{info.timestamp}'\n )\n self._buffer[BUFID] = dict(fpout=self._foutio(\n f'{self._fproot}/{label}.{self._fdpext}', protocol=info.\n protocol), index=list(), label=label)\n self._buffer[BUFID]['index'].append(info.index)\n fpout = self._buffer[BUFID]['fpout']\n label = self._buffer[BUFID]['label']\n if FIN:\n buf = self._buffer.pop(BUFID)\n if self._fdpext:\n buf['fpout'] = f'{self._fproot}/{label}.{self._fdpext}'\n else:\n del buf['fpout']\n buf['index'] = tuple(buf['index'])\n self._stream.append(Info(buf))\n return fpout if _output else label\n",
"role": "user"
},
{
"content": "trace",
"role": "assistant"
}
] |
def x(self):
self._newflg = False
ret = list()
for buf in self._buffer.values():
buf = copy.deepcopy(buf)
if self._fdpext:
buf['fpout'] = f"{self._fproot}/{buf['label']}.{self._fdpext}"
else:
del buf['fpout']
buf['index'] = tuple(buf['index'])
ret.append(Info(buf))
ret += self._stream
return tuple(ret)
| submit | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n self._newflg = False\n ret = list()\n for buf in self._buffer.values():\n buf = copy.deepcopy(buf)\n if self._fdpext:\n buf['fpout'] = f\"{self._fproot}/{buf['label']}.{self._fdpext}\"\n else:\n del buf['fpout']\n buf['index'] = tuple(buf['index'])\n ret.append(Info(buf))\n ret += self._stream\n return tuple(ret)\n",
"role": "user"
},
{
"content": "submit",
"role": "assistant"
}
] |
def x(self, length, version, extension):
if length is None:
length = len(self)
_next = self._read_protos(1)
_plen = self._read_unpack(1)
_resv = self._read_fileng(2)
_scpi = self._read_unpack(4)
_dsnf = self._read_unpack(4)
_tlen = _plen * 4 - 2
_vlen = _tlen - 12
_chkv = self._read_fileng(_vlen)
ah = dict(next=_next, length=_tlen, spi=_scpi, seq=_dsnf, icv=_chkv)
if version == 6:
_plen = 8 - _tlen % 8
elif version == 4:
_plen = 4 - _tlen % 4
else:
raise VersionError(f'Unknown IP version {version}')
if _plen:
padding = self._read_binary(_plen)
if any(int(bit, base=2) for bit in padding):
raise ProtocolError(f'{self.alias}: invalid format')
length -= ah['length']
ah['packet'] = self._read_packet(header=ah['length'], payload=length)
if extension:
self._protos = None
return ah
return self._decode_next_layer(ah, _next, length)
| read_ah | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, length, version, extension):\n if length is None:\n length = len(self)\n _next = self._read_protos(1)\n _plen = self._read_unpack(1)\n _resv = self._read_fileng(2)\n _scpi = self._read_unpack(4)\n _dsnf = self._read_unpack(4)\n _tlen = _plen * 4 - 2\n _vlen = _tlen - 12\n _chkv = self._read_fileng(_vlen)\n ah = dict(next=_next, length=_tlen, spi=_scpi, seq=_dsnf, icv=_chkv)\n if version == 6:\n _plen = 8 - _tlen % 8\n elif version == 4:\n _plen = 4 - _tlen % 4\n else:\n raise VersionError(f'Unknown IP version {version}')\n if _plen:\n padding = self._read_binary(_plen)\n if any(int(bit, base=2) for bit in padding):\n raise ProtocolError(f'{self.alias}: invalid format')\n length -= ah['length']\n ah['packet'] = self._read_packet(header=ah['length'], payload=length)\n if extension:\n self._protos = None\n return ah\n return self._decode_next_layer(ah, _next, length)\n",
"role": "user"
},
{
"content": "read_ah",
"role": "assistant"
}
] |
def x(self, length):
if length is None:
length = len(self)
_dstm = self._read_mac_addr()
_srcm = self._read_mac_addr()
_type = self._read_protos(2)
ethernet = dict(dst=_dstm, src=_srcm, type=_type)
length -= 14
ethernet['packet'] = self._read_packet(header=14, payload=length)
return self._decode_next_layer(ethernet, _type, length)
| read_ethernet | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, length):\n if length is None:\n length = len(self)\n _dstm = self._read_mac_addr()\n _srcm = self._read_mac_addr()\n _type = self._read_protos(2)\n ethernet = dict(dst=_dstm, src=_srcm, type=_type)\n length -= 14\n ethernet['packet'] = self._read_packet(header=14, payload=length)\n return self._decode_next_layer(ethernet, _type, length)\n",
"role": "user"
},
{
"content": "read_ethernet",
"role": "assistant"
}
] |
def x(self):
_byte = self._read_fileng(6)
_addr = '-'.join(textwrap.wrap(_byte.hex(), 2))
return _addr
| read_mac_addr | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self):\n _byte = self._read_fileng(6)\n _addr = '-'.join(textwrap.wrap(_byte.hex(), 2))\n return _addr\n",
"role": "user"
},
{
"content": "read_mac_addr",
"role": "assistant"
}
] |
def x(key, default=-1):
if isinstance(key, int):
return Suite(key)
if key not in Suite._member_map_:
extend_enum(Suite, key, default)
return Suite[key]
| get | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(key, default=-1):\n if isinstance(key, int):\n return Suite(key)\n if key not in Suite._member_map_:\n extend_enum(Suite, key, default)\n return Suite[key]\n",
"role": "user"
},
{
"content": "get",
"role": "assistant"
}
] |
def x(key, default=-1):
if isinstance(key, int):
return ECDSA_Curve(key)
if key not in ECDSA_Curve._member_map_:
extend_enum(ECDSA_Curve, key, default)
return ECDSA_Curve[key]
| get | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(key, default=-1):\n if isinstance(key, int):\n return ECDSA_Curve(key)\n if key not in ECDSA_Curve._member_map_:\n extend_enum(ECDSA_Curve, key, default)\n return ECDSA_Curve[key]\n",
"role": "user"
},
{
"content": "get",
"role": "assistant"
}
] |
def x(packet):
dict_ = dict()
frame = packet.frame_info
for field in frame.field_names:
dict_[field] = getattr(frame, field)
tempdict = dict_
for layer in packet.layers:
tempdict[layer.layer_name.upper()] = dict()
tempdict = tempdict[layer.layer_name.upper()]
for field in layer.field_names:
tempdict[field] = getattr(layer, field)
return dict_
| packet2dict | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(packet):\n dict_ = dict()\n frame = packet.frame_info\n for field in frame.field_names:\n dict_[field] = getattr(frame, field)\n tempdict = dict_\n for layer in packet.layers:\n tempdict[layer.layer_name.upper()] = dict()\n tempdict = tempdict[layer.layer_name.upper()]\n for field in layer.field_names:\n tempdict[field] = getattr(layer, field)\n return dict_\n",
"role": "user"
},
{
"content": "packet2dict",
"role": "assistant"
}
] |
def x(packet):
if 'TCP' in packet:
ip = packet.ip if 'IP' in packet else packet.ipv6
tcp = packet.tcp
data = dict(protocol=LINKTYPE.get(packet.layers[0].layer_name.upper
()), index=int(packet.number), frame=packet2dict(packet), syn=
bool(int(tcp.flags_syn)), fin=bool(int(tcp.flags_fin)), src=
ipaddress.ip_address(ip.src), dst=ipaddress.ip_address(ip.dst),
srcport=int(tcp.srcport), dstport=int(tcp.dstport), timestamp=
packet.frame_info.time_epoch)
return True, data
return False, None
| tcp_traceflow | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(packet):\n if 'TCP' in packet:\n ip = packet.ip if 'IP' in packet else packet.ipv6\n tcp = packet.tcp\n data = dict(protocol=LINKTYPE.get(packet.layers[0].layer_name.upper\n ()), index=int(packet.number), frame=packet2dict(packet), syn=\n bool(int(tcp.flags_syn)), fin=bool(int(tcp.flags_fin)), src=\n ipaddress.ip_address(ip.src), dst=ipaddress.ip_address(ip.dst),\n srcport=int(tcp.srcport), dstport=int(tcp.dstport), timestamp=\n packet.frame_info.time_epoch)\n return True, data\n return False, None\n",
"role": "user"
},
{
"content": "tcp_traceflow",
"role": "assistant"
}
] |
def x(self, info):
BUFID = info.bufid
DSN = info.dsn
ACK = info.ack
FIN = info.fin
RST = info.rst
SYN = info.syn
if SYN and BUFID in self._buffer:
self._dtgram += self.submit(self._buffer[BUFID], bufid=BUFID)
del self._buffer[BUFID]
if BUFID not in self._buffer:
self._buffer[BUFID] = {'hdl': [Info(first=info.len, last=sys.
maxsize)], ACK: dict(ind=[info.num], isn=info.dsn, len=info.len,
raw=info.payload)}
else:
if ACK not in self._buffer[BUFID]:
self._buffer[BUFID][ACK] = dict(ind=[info.num], isn=info.dsn,
len=info.len, raw=info.payload)
else:
self._buffer[BUFID][ACK]['ind'].append(info.num)
ISN = self._buffer[BUFID][ACK]['isn']
RAW = self._buffer[BUFID][ACK]['raw']
if DSN >= ISN:
LEN = self._buffer[BUFID][ACK]['len']
GAP = DSN - (ISN + LEN)
if GAP >= 0:
RAW += bytearray(GAP) + info.payload
else:
RAW[DSN - ISN:] = info.payload
else:
LEN = info.len
GAP = ISN - (DSN + LEN)
self._buffer[BUFID][ACK]['isn'] = DSN
if GAP >= 0:
RAW = info.payload + bytearray(GAP) + RAW
else:
RAW = info.payload + RAW[ISN - GAP:]
self._buffer[BUFID][ACK]['raw'] = RAW
self._buffer[BUFID][ACK]['len'] = len(RAW)
HDL = self._buffer[BUFID]['hdl']
for index, hole in enumerate(HDL):
if info.first > hole.last:
continue
if info.last < hole.first:
continue
del HDL[index]
if info.first > hole.first:
new_hole = Info(first=hole.first, last=info.first - 1)
HDL.insert(index, new_hole)
index += 1
if info.last < hole.last and not FIN and not RST:
new_hole = Info(first=info.last + 1, last=hole.last)
HDL.insert(index, new_hole)
break
self._buffer[BUFID]['hdl'] = HDL
if FIN or RST:
self._dtgram += self.submit(self._buffer[BUFID], bufid=BUFID)
del self._buffer[BUFID]
| reassembly | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, info):\n BUFID = info.bufid\n DSN = info.dsn\n ACK = info.ack\n FIN = info.fin\n RST = info.rst\n SYN = info.syn\n if SYN and BUFID in self._buffer:\n self._dtgram += self.submit(self._buffer[BUFID], bufid=BUFID)\n del self._buffer[BUFID]\n if BUFID not in self._buffer:\n self._buffer[BUFID] = {'hdl': [Info(first=info.len, last=sys.\n maxsize)], ACK: dict(ind=[info.num], isn=info.dsn, len=info.len,\n raw=info.payload)}\n else:\n if ACK not in self._buffer[BUFID]:\n self._buffer[BUFID][ACK] = dict(ind=[info.num], isn=info.dsn,\n len=info.len, raw=info.payload)\n else:\n self._buffer[BUFID][ACK]['ind'].append(info.num)\n ISN = self._buffer[BUFID][ACK]['isn']\n RAW = self._buffer[BUFID][ACK]['raw']\n if DSN >= ISN:\n LEN = self._buffer[BUFID][ACK]['len']\n GAP = DSN - (ISN + LEN)\n if GAP >= 0:\n RAW += bytearray(GAP) + info.payload\n else:\n RAW[DSN - ISN:] = info.payload\n else:\n LEN = info.len\n GAP = ISN - (DSN + LEN)\n self._buffer[BUFID][ACK]['isn'] = DSN\n if GAP >= 0:\n RAW = info.payload + bytearray(GAP) + RAW\n else:\n RAW = info.payload + RAW[ISN - GAP:]\n self._buffer[BUFID][ACK]['raw'] = RAW\n self._buffer[BUFID][ACK]['len'] = len(RAW)\n HDL = self._buffer[BUFID]['hdl']\n for index, hole in enumerate(HDL):\n if info.first > hole.last:\n continue\n if info.last < hole.first:\n continue\n del HDL[index]\n if info.first > hole.first:\n new_hole = Info(first=hole.first, last=info.first - 1)\n HDL.insert(index, new_hole)\n index += 1\n if info.last < hole.last and not FIN and not RST:\n new_hole = Info(first=info.last + 1, last=hole.last)\n HDL.insert(index, new_hole)\n break\n self._buffer[BUFID]['hdl'] = HDL\n if FIN or RST:\n self._dtgram += self.submit(self._buffer[BUFID], bufid=BUFID)\n del self._buffer[BUFID]\n",
"role": "user"
},
{
"content": "reassembly",
"role": "assistant"
}
] |
def x(self, buf, *, bufid):
datagram = []
HDL = buf.pop('hdl')
for ack, buffer in buf.items():
if len(HDL) > 2 and self._strflg:
data = []
start = stop = 0
for hole in HDL:
stop = hole.first
byte = buffer['raw'][start:stop]
start = hole.last
if byte:
data.append(byte)
byte = buffer['raw'][start:]
if byte:
data.append(byte)
if data:
packet = Info(NotImplemented=True, id=Info(src=(bufid[0],
bufid[2]), dst=(bufid[1], bufid[3]), ack=ack), index=
tuple(buffer['ind']), payload=tuple(data) or None,
packets=tuple(analyse(io.BytesIO(frag), len(frag)) for
frag in data))
datagram.append(packet)
else:
data = buffer['raw']
if data:
packet = Info(NotImplemented=False, id=Info(src=(bufid[0],
bufid[2]), dst=(bufid[1], bufid[3]), ack=ack), index=
tuple(buffer['ind']), payload=bytes(data) or None,
packets=(analyse(io.BytesIO(data), len(data)),))
datagram.append(packet)
return datagram
| submit | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, buf, *, bufid):\n datagram = []\n HDL = buf.pop('hdl')\n for ack, buffer in buf.items():\n if len(HDL) > 2 and self._strflg:\n data = []\n start = stop = 0\n for hole in HDL:\n stop = hole.first\n byte = buffer['raw'][start:stop]\n start = hole.last\n if byte:\n data.append(byte)\n byte = buffer['raw'][start:]\n if byte:\n data.append(byte)\n if data:\n packet = Info(NotImplemented=True, id=Info(src=(bufid[0],\n bufid[2]), dst=(bufid[1], bufid[3]), ack=ack), index=\n tuple(buffer['ind']), payload=tuple(data) or None,\n packets=tuple(analyse(io.BytesIO(frag), len(frag)) for\n frag in data))\n datagram.append(packet)\n else:\n data = buffer['raw']\n if data:\n packet = Info(NotImplemented=False, id=Info(src=(bufid[0],\n bufid[2]), dst=(bufid[1], bufid[3]), ack=ack), index=\n tuple(buffer['ind']), payload=bytes(data) or None,\n packets=(analyse(io.BytesIO(data), len(data)),))\n datagram.append(packet)\n return datagram\n",
"role": "user"
},
{
"content": "submit",
"role": "assistant"
}
] |
def x(packet):
if scapy_all is None:
raise ModuleNotFound("No module named 'scapy'", name='scapy')
chain = [packet.name]
payload = packet.payload
while not isinstance(payload, scapy_all.packet.NoPayload):
chain.append(payload.name)
payload = payload.payload
return ':'.join(chain)
| packet2chain | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(packet):\n if scapy_all is None:\n raise ModuleNotFound(\"No module named 'scapy'\", name='scapy')\n chain = [packet.name]\n payload = packet.payload\n while not isinstance(payload, scapy_all.packet.NoPayload):\n chain.append(payload.name)\n payload = payload.payload\n return ':'.join(chain)\n",
"role": "user"
},
{
"content": "packet2chain",
"role": "assistant"
}
] |
def x(packet, *, count=NotImplemented):
if scapy_all is None:
raise ModuleNotFound("No module named 'scapy'", name='scapy')
def x(packet):
dict_ = packet.fields
payload = packet.payload
if not isinstance(payload, scapy_all.packet.NoPayload):
dict_[payload.name] = wrapper(payload)
return dict_
return {'packet': bytes(packet), packet.name: wrapper(packet)}
| packet2dict | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(packet, *, count=NotImplemented):\n if scapy_all is None:\n raise ModuleNotFound(\"No module named 'scapy'\", name='scapy')\n\n def x(packet):\n dict_ = packet.fields\n payload = packet.payload\n if not isinstance(payload, scapy_all.packet.NoPayload):\n dict_[payload.name] = wrapper(payload)\n return dict_\n return {'packet': bytes(packet), packet.name: wrapper(packet)}\n",
"role": "user"
},
{
"content": "packet2dict",
"role": "assistant"
}
] |
def x(packet, *, count=NotImplemented):
if 'IP' in packet:
ipv4 = packet['IP']
if ipv4.flags.DF:
return False, None
data = dict(bufid=(ipaddress.ip_address(ipv4.src), ipaddress.
ip_address(ipv4.dst), ipv4.id, TP_PROTO.get(ipv4.proto).name),
num=count, fo=ipv4.frag, ihl=ipv4.ihl, mf=bool(ipv4.flags.MF),
tl=ipv4.len, header=bytearray(ipv4.raw_packet_cache), payload=
bytearray(bytes(ipv4.payload)))
return True, data
return False, None
| ipv4_reassembly | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(packet, *, count=NotImplemented):\n if 'IP' in packet:\n ipv4 = packet['IP']\n if ipv4.flags.DF:\n return False, None\n data = dict(bufid=(ipaddress.ip_address(ipv4.src), ipaddress.\n ip_address(ipv4.dst), ipv4.id, TP_PROTO.get(ipv4.proto).name),\n num=count, fo=ipv4.frag, ihl=ipv4.ihl, mf=bool(ipv4.flags.MF),\n tl=ipv4.len, header=bytearray(ipv4.raw_packet_cache), payload=\n bytearray(bytes(ipv4.payload)))\n return True, data\n return False, None\n",
"role": "user"
},
{
"content": "ipv4_reassembly",
"role": "assistant"
}
] |
def x(packet, *, count=NotImplemented):
if scapy_all is None:
raise ModuleNotFound("No module named 'scapy'", name='scapy')
if 'IPv6' in packet:
ipv6 = packet['IPv6']
if scapy_all.IPv6ExtHdrFragment not in ipv6:
return False, None
ipv6_frag = ipv6['IPv6ExtHdrFragment']
data = dict(bufid=(ipaddress.ip_address(ipv6.src), ipaddress.
ip_address(ipv6.dst), ipv6.fl, TP_PROTO.get(ipv6_frag.nh).name),
num=count, fo=ipv6_frag.offset, ihl=len(ipv6) - len(ipv6_frag),
mf=bool(ipv6_frag.m), tl=len(ipv6), header=bytearray(bytes(ipv6
)[:-len(ipv6_frag)]), payload=bytearray(bytes(ipv6_frag.payload)))
return True, data
return False, None
| ipv6_reassembly | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(packet, *, count=NotImplemented):\n if scapy_all is None:\n raise ModuleNotFound(\"No module named 'scapy'\", name='scapy')\n if 'IPv6' in packet:\n ipv6 = packet['IPv6']\n if scapy_all.IPv6ExtHdrFragment not in ipv6:\n return False, None\n ipv6_frag = ipv6['IPv6ExtHdrFragment']\n data = dict(bufid=(ipaddress.ip_address(ipv6.src), ipaddress.\n ip_address(ipv6.dst), ipv6.fl, TP_PROTO.get(ipv6_frag.nh).name),\n num=count, fo=ipv6_frag.offset, ihl=len(ipv6) - len(ipv6_frag),\n mf=bool(ipv6_frag.m), tl=len(ipv6), header=bytearray(bytes(ipv6\n )[:-len(ipv6_frag)]), payload=bytearray(bytes(ipv6_frag.payload)))\n return True, data\n return False, None\n",
"role": "user"
},
{
"content": "ipv6_reassembly",
"role": "assistant"
}
] |
def x(packet, *, count=NotImplemented):
if 'TCP' in packet:
ip = packet['IP'] if 'IP' in packet else packet['IPv6']
tcp = packet['TCP']
data = dict(bufid=(ipaddress.ip_address(ip.src), ipaddress.
ip_address(ip.dst), tcp.sport, tcp.dport), num=count, ack=tcp.
ack, dsn=tcp.seq, syn=bool(tcp.flags.S), fin=bool(tcp.flags.F),
rst=bool(tcp.flags.R), payload=bytearray(bytes(tcp.payload)))
raw_len = len(tcp.payload)
data['first'] = tcp.seq
data['last'] = tcp.seq + raw_len
data['len'] = raw_len
return True, data
return False, None
| tcp_reassembly | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(packet, *, count=NotImplemented):\n if 'TCP' in packet:\n ip = packet['IP'] if 'IP' in packet else packet['IPv6']\n tcp = packet['TCP']\n data = dict(bufid=(ipaddress.ip_address(ip.src), ipaddress.\n ip_address(ip.dst), tcp.sport, tcp.dport), num=count, ack=tcp.\n ack, dsn=tcp.seq, syn=bool(tcp.flags.S), fin=bool(tcp.flags.F),\n rst=bool(tcp.flags.R), payload=bytearray(bytes(tcp.payload)))\n raw_len = len(tcp.payload)\n data['first'] = tcp.seq\n data['last'] = tcp.seq + raw_len\n data['len'] = raw_len\n return True, data\n return False, None\n",
"role": "user"
},
{
"content": "tcp_reassembly",
"role": "assistant"
}
] |
def x(packet, *, count=NotImplemented):
if 'TCP' in packet:
ip = packet['IP'] if 'IP' in packet else packet['IPv6']
tcp = packet['TCP']
data = dict(protocol=LINKTYPE.get(packet.name.upper()), index=count,
frame=packet2dict(packet), syn=bool(tcp.flags.S), fin=bool(tcp.
flags.F), src=ipaddress.ip_address(ip.src), dst=ipaddress.
ip_address(ip.dst), srcport=tcp.sport, dstport=tcp.dport,
timestamp=time.time())
return True, data
return False, None
| tcp_traceflow | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(packet, *, count=NotImplemented):\n if 'TCP' in packet:\n ip = packet['IP'] if 'IP' in packet else packet['IPv6']\n tcp = packet['TCP']\n data = dict(protocol=LINKTYPE.get(packet.name.upper()), index=count,\n frame=packet2dict(packet), syn=bool(tcp.flags.S), fin=bool(tcp.\n flags.F), src=ipaddress.ip_address(ip.src), dst=ipaddress.\n ip_address(ip.dst), srcport=tcp.sport, dstport=tcp.dport,\n timestamp=time.time())\n return True, data\n return False, None\n",
"role": "user"
},
{
"content": "tcp_traceflow",
"role": "assistant"
}
] |
def x(self, length, extension):
if length is None:
length = len(self)
_next = self._read_protos(1)
_hlen = self._read_unpack(1)
hopopt = dict(next=_next, length=(_hlen + 1) * 8)
options = self._read_hopopt_options(_hlen * 8 + 6)
hopopt['options'] = options[0]
hopopt.update(options[1])
length -= hopopt['length']
hopopt['packet'] = self._read_packet(header=hopopt['length'], payload=
length)
if extension:
self._protos = None
return hopopt
return self._decode_next_layer(hopopt, _next, length)
| read_hopopt | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, length, extension):\n if length is None:\n length = len(self)\n _next = self._read_protos(1)\n _hlen = self._read_unpack(1)\n hopopt = dict(next=_next, length=(_hlen + 1) * 8)\n options = self._read_hopopt_options(_hlen * 8 + 6)\n hopopt['options'] = options[0]\n hopopt.update(options[1])\n length -= hopopt['length']\n hopopt['packet'] = self._read_packet(header=hopopt['length'], payload=\n length)\n if extension:\n self._protos = None\n return hopopt\n return self._decode_next_layer(hopopt, _next, length)\n",
"role": "user"
},
{
"content": "read_hopopt",
"role": "assistant"
}
] |
def x(self, length):
counter = 0
optkind = list()
options = dict()
while counter < length:
code = self._read_unpack(1)
if not code:
break
abbr, desc = _HOPOPT_OPT.get(code, ('none', 'Unassigned'))
data = _HOPOPT_PROC(abbr)(self, code, desc=desc)
enum = _OPT_TYPE.get(code)
counter += data['length']
if enum in optkind:
if isinstance(options[abbr], tuple):
options[abbr] += Info(data),
else:
options[abbr] = Info(options[abbr]), Info(data)
else:
optkind.append(enum)
options[abbr] = data
if counter != length:
raise ProtocolError(f'{self.alias}: invalid format')
return tuple(optkind), options
| read_hopopt_options | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, length):\n counter = 0\n optkind = list()\n options = dict()\n while counter < length:\n code = self._read_unpack(1)\n if not code:\n break\n abbr, desc = _HOPOPT_OPT.get(code, ('none', 'Unassigned'))\n data = _HOPOPT_PROC(abbr)(self, code, desc=desc)\n enum = _OPT_TYPE.get(code)\n counter += data['length']\n if enum in optkind:\n if isinstance(options[abbr], tuple):\n options[abbr] += Info(data),\n else:\n options[abbr] = Info(options[abbr]), Info(data)\n else:\n optkind.append(enum)\n options[abbr] = data\n if counter != length:\n raise ProtocolError(f'{self.alias}: invalid format')\n return tuple(optkind), options\n",
"role": "user"
},
{
"content": "read_hopopt_options",
"role": "assistant"
}
] |
def x(self, code, *, desc):
_type = self._read_opt_type(code)
if code == 0:
opt = dict(desc=desc, type=_type, length=1)
elif code == 1:
_size = self._read_unpack(1)
_padn = self._read_fileng(_size)
opt = dict(desc=desc, type=_type, length=_size + 2, padding=_padn)
else:
raise ProtocolError(f'{self.alias}: [Optno {code}] invalid format')
return opt
| read_opt_pad | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, code, *, desc):\n _type = self._read_opt_type(code)\n if code == 0:\n opt = dict(desc=desc, type=_type, length=1)\n elif code == 1:\n _size = self._read_unpack(1)\n _padn = self._read_fileng(_size)\n opt = dict(desc=desc, type=_type, length=_size + 2, padding=_padn)\n else:\n raise ProtocolError(f'{self.alias}: [Optno {code}] invalid format')\n return opt\n",
"role": "user"
},
{
"content": "read_opt_pad",
"role": "assistant"
}
] |
def x(self, code, *, desc):
_type = self._read_opt_type(code)
_size = self._read_unpack(1)
if _size != 1:
raise ProtocolError(f'{self.alias}: [Optno {code}] invalid format')
_limt = self._read_unpack(1)
opt = dict(desc=desc, type=_type, length=_size + 2, limit=_limt)
return opt
| read_opt_tun | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, code, *, desc):\n _type = self._read_opt_type(code)\n _size = self._read_unpack(1)\n if _size != 1:\n raise ProtocolError(f'{self.alias}: [Optno {code}] invalid format')\n _limt = self._read_unpack(1)\n opt = dict(desc=desc, type=_type, length=_size + 2, limit=_limt)\n return opt\n",
"role": "user"
},
{
"content": "read_opt_tun",
"role": "assistant"
}
] |
def x(self, code, *, desc):
_type = self._read_opt_type(code)
_size = self._read_unpack(1)
if _size != 2:
raise ProtocolError(f'{self.alias}: [Optno {code}] invalid format')
_rval = self._read_unpack(2)
if 4 <= _rval <= 35:
_dscp = f'Aggregated Reservation Nesting Level {_rval - 4}'
elif 36 <= _rval <= 67:
_dscp = f'QoS NSLP Aggregation Level {_rval - 36}'
elif 65503 <= _rval <= 65534:
_dscp = 'Reserved for experimental use'
else:
_dscp = _ROUTER_ALERT.get(_rval, 'Unassigned')
opt = dict(desc=desc, type=_type, length=_size + 2, value=_rval, alert=
_dscp)
return opt
| read_opt_ra | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, code, *, desc):\n _type = self._read_opt_type(code)\n _size = self._read_unpack(1)\n if _size != 2:\n raise ProtocolError(f'{self.alias}: [Optno {code}] invalid format')\n _rval = self._read_unpack(2)\n if 4 <= _rval <= 35:\n _dscp = f'Aggregated Reservation Nesting Level {_rval - 4}'\n elif 36 <= _rval <= 67:\n _dscp = f'QoS NSLP Aggregation Level {_rval - 36}'\n elif 65503 <= _rval <= 65534:\n _dscp = 'Reserved for experimental use'\n else:\n _dscp = _ROUTER_ALERT.get(_rval, 'Unassigned')\n opt = dict(desc=desc, type=_type, length=_size + 2, value=_rval, alert=\n _dscp)\n return opt\n",
"role": "user"
},
{
"content": "read_opt_ra",
"role": "assistant"
}
] |
def x(self, code, *, desc):
_type = self._read_opt_type(code)
_size = self._read_unpack(1)
if _size < 8 and _size % 8 != 0:
raise ProtocolError(f'{self.alias}: [Optno {code}] invalid format')
_cmpt = self._read_unpack(4)
_clen = self._read_unpack(1)
if _clen % 2 != 0:
raise ProtocolError(f'{self.alias}: [Optno {code}] invalid format')
_sens = self._read_unpack(1)
_csum = self._read_fileng(2)
opt = dict(desc=desc, type=_type, length=_size + 2, domain=_cmpt,
cmpt_len=_clen * 4, level=_sens, chksum=_csum)
if _clen:
_bmap = list()
for _ in range(_clen // 2):
_bmap.append(self._read_binary(8))
opt['bitmap'] = tuple(_bmap)
_plen = _size - _clen * 4 - 8
if _plen:
self._read_fileng(_plen)
return opt
| read_opt_calipso | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, code, *, desc):\n _type = self._read_opt_type(code)\n _size = self._read_unpack(1)\n if _size < 8 and _size % 8 != 0:\n raise ProtocolError(f'{self.alias}: [Optno {code}] invalid format')\n _cmpt = self._read_unpack(4)\n _clen = self._read_unpack(1)\n if _clen % 2 != 0:\n raise ProtocolError(f'{self.alias}: [Optno {code}] invalid format')\n _sens = self._read_unpack(1)\n _csum = self._read_fileng(2)\n opt = dict(desc=desc, type=_type, length=_size + 2, domain=_cmpt,\n cmpt_len=_clen * 4, level=_sens, chksum=_csum)\n if _clen:\n _bmap = list()\n for _ in range(_clen // 2):\n _bmap.append(self._read_binary(8))\n opt['bitmap'] = tuple(_bmap)\n _plen = _size - _clen * 4 - 8\n if _plen:\n self._read_fileng(_plen)\n return opt\n",
"role": "user"
},
{
"content": "read_opt_calipso",
"role": "assistant"
}
] |
def x(self, code, *, desc):
_type = self._read_opt_type(code)
_size = self._read_unpack(1)
_tidd = self._read_binary(1)
if _tidd[0] == '0':
_mode = 'I-DPD'
_tidt = _TID_TYPE.get(_tidd[1:4], 'Unassigned')
_tidl = int(_tidd[4:], base=2)
if _tidt == 'NULL':
if _tidl != 0:
raise ProtocolError(
f'{self.alias}: [Optno {code}] invalid format')
_iden = self._read_fileng(_size - 1)
opt = dict(desc=desc, type=_type, length=_size + 2, dpd_type=
_mode, tid_type=_tidt, tid_len=_tidl, id=_iden)
elif _tidt == 'IPv4':
if _tidl != 3:
raise ProtocolError(
f'{self.alias}: [Optno {code}] invalid format')
_tidf = self._read_fileng(4)
_iden = self._read_fileng(_size - 4)
opt = dict(desc=desc, type=_type, length=_size + 2, dpd_type=
_mode, tid_type=_tidt, tid_len=_tidl, tid=ipaddress.
ip_address(_tidf), id=_iden)
elif _tidt == 'IPv6':
if _tidl != 15:
raise ProtocolError(
f'{self.alias}: [Optno {code}] invalid format')
_tidf = self._read_fileng(15)
_iden = self._read_fileng(_size - 15)
opt = dict(desc=desc, type=_type, length=_size + 2, dpd_type=
_mode, tid_type=_tidt, tid_len=_tidl, tid=ipaddress.
ip_address(_tidf), id=_iden)
else:
_tidf = self._read_unpack(_tidl + 1)
_iden = self._read_fileng(_size - _tidl - 2)
opt = dict(desc=desc, type=_type, length=_size + 2, dpd_type=
_mode, tid_type=_tidt, tid_len=_tidl, tid=_tidf, id=_iden)
elif _tidd[0] == '1':
_data = self._read_binary(_size - 1)
opt = dict(desc=desc, type=_type, length=_size + 2, dpd_type=_mode,
tid_type=_tidt, hav=_tidd[1:] + _data)
else:
raise ProtocolError(f'{self.alias}: [Optno {code}] invalid format')
return opt
| read_opt_smf_dpd | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, code, *, desc):\n _type = self._read_opt_type(code)\n _size = self._read_unpack(1)\n _tidd = self._read_binary(1)\n if _tidd[0] == '0':\n _mode = 'I-DPD'\n _tidt = _TID_TYPE.get(_tidd[1:4], 'Unassigned')\n _tidl = int(_tidd[4:], base=2)\n if _tidt == 'NULL':\n if _tidl != 0:\n raise ProtocolError(\n f'{self.alias}: [Optno {code}] invalid format')\n _iden = self._read_fileng(_size - 1)\n opt = dict(desc=desc, type=_type, length=_size + 2, dpd_type=\n _mode, tid_type=_tidt, tid_len=_tidl, id=_iden)\n elif _tidt == 'IPv4':\n if _tidl != 3:\n raise ProtocolError(\n f'{self.alias}: [Optno {code}] invalid format')\n _tidf = self._read_fileng(4)\n _iden = self._read_fileng(_size - 4)\n opt = dict(desc=desc, type=_type, length=_size + 2, dpd_type=\n _mode, tid_type=_tidt, tid_len=_tidl, tid=ipaddress.\n ip_address(_tidf), id=_iden)\n elif _tidt == 'IPv6':\n if _tidl != 15:\n raise ProtocolError(\n f'{self.alias}: [Optno {code}] invalid format')\n _tidf = self._read_fileng(15)\n _iden = self._read_fileng(_size - 15)\n opt = dict(desc=desc, type=_type, length=_size + 2, dpd_type=\n _mode, tid_type=_tidt, tid_len=_tidl, tid=ipaddress.\n ip_address(_tidf), id=_iden)\n else:\n _tidf = self._read_unpack(_tidl + 1)\n _iden = self._read_fileng(_size - _tidl - 2)\n opt = dict(desc=desc, type=_type, length=_size + 2, dpd_type=\n _mode, tid_type=_tidt, tid_len=_tidl, tid=_tidf, id=_iden)\n elif _tidd[0] == '1':\n _data = self._read_binary(_size - 1)\n opt = dict(desc=desc, type=_type, length=_size + 2, dpd_type=_mode,\n tid_type=_tidt, hav=_tidd[1:] + _data)\n else:\n raise ProtocolError(f'{self.alias}: [Optno {code}] invalid format')\n return opt\n",
"role": "user"
},
{
"content": "read_opt_smf_dpd",
"role": "assistant"
}
] |
def x(self, code, *, desc):
_type = self._read_opt_type(code)
_size = self._read_unpack(1)
if _size != 10:
raise ProtocolError(f'{self.alias}: [Optno {code}] invalid format')
_stlr = self._read_unpack(1)
_stls = self._read_unpack(1)
_psnt = self._read_unpack(2)
_psnl = self._read_unpack(2)
_dtlr = self._read_unpack(2)
_dtls = self._read_unpack(2)
opt = dict(desc=desc, type=_type, length=_size + 2, scaledtlr=datetime.
timedelta(seconds=_stlr), scaledtls=datetime.timedelta(seconds=
_stls), psntp=_psnt, psnlr=_psnl, deltatlr=datetime.timedelta(
seconds=_dtlr), deltatls=datetime.timedelta(seconds=_dtls))
return opt
| read_opt_pdm | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, code, *, desc):\n _type = self._read_opt_type(code)\n _size = self._read_unpack(1)\n if _size != 10:\n raise ProtocolError(f'{self.alias}: [Optno {code}] invalid format')\n _stlr = self._read_unpack(1)\n _stls = self._read_unpack(1)\n _psnt = self._read_unpack(2)\n _psnl = self._read_unpack(2)\n _dtlr = self._read_unpack(2)\n _dtls = self._read_unpack(2)\n opt = dict(desc=desc, type=_type, length=_size + 2, scaledtlr=datetime.\n timedelta(seconds=_stlr), scaledtls=datetime.timedelta(seconds=\n _stls), psntp=_psnt, psnlr=_psnl, deltatlr=datetime.timedelta(\n seconds=_dtlr), deltatls=datetime.timedelta(seconds=_dtls))\n return opt\n",
"role": "user"
},
{
"content": "read_opt_pdm",
"role": "assistant"
}
] |
def x(self, code, *, desc):
_type = self._read_opt_type(code)
_size = self._read_unpack(1)
if _size != 6:
raise ProtocolError(f'{self.alias}: [Optno {code}] invalid format')
_fcrr = self._read_binary(1)
_func = int(_fcrr[:4], base=2)
_rate = int(_fcrr[4:], base=2)
_ttlv = self._read_unpack(1)
_nonr = self._read_binary(4)
_qsnn = int(_nonr[:30], base=2)
if _func != 0 and _func != 8:
raise ProtocolError(f'{self.alias}: [Optno {code}] invalid format')
data = dict(type=_type, length=_size + 2, func=_QS_FUNC.get(_func),
rate=40000 * 2 ** _rate / 1000, ttl=None if _func else _rate,
nounce=_qsnn)
return data
| read_opt_qs | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, code, *, desc):\n _type = self._read_opt_type(code)\n _size = self._read_unpack(1)\n if _size != 6:\n raise ProtocolError(f'{self.alias}: [Optno {code}] invalid format')\n _fcrr = self._read_binary(1)\n _func = int(_fcrr[:4], base=2)\n _rate = int(_fcrr[4:], base=2)\n _ttlv = self._read_unpack(1)\n _nonr = self._read_binary(4)\n _qsnn = int(_nonr[:30], base=2)\n if _func != 0 and _func != 8:\n raise ProtocolError(f'{self.alias}: [Optno {code}] invalid format')\n data = dict(type=_type, length=_size + 2, func=_QS_FUNC.get(_func),\n rate=40000 * 2 ** _rate / 1000, ttl=None if _func else _rate,\n nounce=_qsnn)\n return data\n",
"role": "user"
},
{
"content": "read_opt_qs",
"role": "assistant"
}
] |
def x(self, code, *, desc):
_type = self._read_opt_type(code)
_size = self._read_unpack(1)
if _size < 4:
raise ProtocolError(f'{self.alias}: [Optno {code}] invalid format')
_flag = self._read_binary(1)
_rpld = self._read_unpack(1)
_rank = self._read_unpack(2)
opt = dict(desc=desc, type=_type, length=_size + 2, flags=dict(down=
True if int(_flag[0], base=2) else False, rank_error=True if int(
_flag[1], base=2) else False, fwd_error=True if int(_flag[2], base=
2) else False), id=_rpld, rank=_rank)
if _size > 4:
opt['data'] = self._read_fileng(_size - 4)
return opt
| read_opt_rpl | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, code, *, desc):\n _type = self._read_opt_type(code)\n _size = self._read_unpack(1)\n if _size < 4:\n raise ProtocolError(f'{self.alias}: [Optno {code}] invalid format')\n _flag = self._read_binary(1)\n _rpld = self._read_unpack(1)\n _rank = self._read_unpack(2)\n opt = dict(desc=desc, type=_type, length=_size + 2, flags=dict(down=\n True if int(_flag[0], base=2) else False, rank_error=True if int(\n _flag[1], base=2) else False, fwd_error=True if int(_flag[2], base=\n 2) else False), id=_rpld, rank=_rank)\n if _size > 4:\n opt['data'] = self._read_fileng(_size - 4)\n return opt\n",
"role": "user"
},
{
"content": "read_opt_rpl",
"role": "assistant"
}
] |
def x(self, code, *, desc):
_type = self._read_opt_type(code)
_size = self._read_unpack(1)
_nval = self._read_fileng(_size)
opt = dict(desc=desc, type=_type, length=_size + 2, value=_nval)
return opt
| read_opt_ilnp | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, code, *, desc):\n _type = self._read_opt_type(code)\n _size = self._read_unpack(1)\n _nval = self._read_fileng(_size)\n opt = dict(desc=desc, type=_type, length=_size + 2, value=_nval)\n return opt\n",
"role": "user"
},
{
"content": "read_opt_ilnp",
"role": "assistant"
}
] |
def x(self, code, *, desc):
_type = self._read_opt_type(code)
_size = self._read_unpack(1)
_llen = self._read_unpack(1)
_line = self._read_fileng(_llen)
opt = dict(desc=desc, type=_type, length=_size + 2, lid_len=_llen, lid=
_line)
_plen = _size - _llen
if _plen:
self._read_fileng(_plen)
return opt
| read_opt_lio | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, code, *, desc):\n _type = self._read_opt_type(code)\n _size = self._read_unpack(1)\n _llen = self._read_unpack(1)\n _line = self._read_fileng(_llen)\n opt = dict(desc=desc, type=_type, length=_size + 2, lid_len=_llen, lid=\n _line)\n _plen = _size - _llen\n if _plen:\n self._read_fileng(_plen)\n return opt\n",
"role": "user"
},
{
"content": "read_opt_lio",
"role": "assistant"
}
] |
def x(self, code, *, desc):
_type = self._read_opt_type(code)
_size = self._read_unpack(1)
if _size != 4:
raise ProtocolError(f'{self.alias}: [Optno {code}] invalid format')
_jlen = self._read_unpack(4)
opt = dict(desc=desc, type=_type, length=_size + 2, payload_len=_jlen)
return opt
| read_opt_jumbo | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, code, *, desc):\n _type = self._read_opt_type(code)\n _size = self._read_unpack(1)\n if _size != 4:\n raise ProtocolError(f'{self.alias}: [Optno {code}] invalid format')\n _jlen = self._read_unpack(4)\n opt = dict(desc=desc, type=_type, length=_size + 2, payload_len=_jlen)\n return opt\n",
"role": "user"
},
{
"content": "read_opt_jumbo",
"role": "assistant"
}
] |
def x(self, code, *, desc):
_type = self._read_opt_type(code)
_size = self._read_unpack(1)
if _size != 16:
raise ProtocolError(f'{self.alias}: [Optno {code}] invalid format')
_addr = self._read_fileng(16)
opt = dict(desc=desc, type=_type, length=_size + 2, ip=ipaddress.
ip_address(_addr))
return opt
| read_opt_home | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, code, *, desc):\n _type = self._read_opt_type(code)\n _size = self._read_unpack(1)\n if _size != 16:\n raise ProtocolError(f'{self.alias}: [Optno {code}] invalid format')\n _addr = self._read_fileng(16)\n opt = dict(desc=desc, type=_type, length=_size + 2, ip=ipaddress.\n ip_address(_addr))\n return opt\n",
"role": "user"
},
{
"content": "read_opt_home",
"role": "assistant"
}
] |
def x(self, code, *, desc):
_type = self._read_opt_type(code)
_size = self._read_unpack(1)
if _size != 2:
raise ProtocolError(f'{self.alias}: [Optno {code}] invalid format')
_verf = self._read_binary(1)
_seqn = self._read_unpack(2)
opt = dict(desc=desc, type=_type, length=_size + 2, version=_verf[:2],
flags=dict(dup=True if int(_verf[2], base=2) else False, ret=True if
int(_verf[3], base=2) else False), seq=_seqn)
return opt
| read_opt_ip_dff | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, code, *, desc):\n _type = self._read_opt_type(code)\n _size = self._read_unpack(1)\n if _size != 2:\n raise ProtocolError(f'{self.alias}: [Optno {code}] invalid format')\n _verf = self._read_binary(1)\n _seqn = self._read_unpack(2)\n opt = dict(desc=desc, type=_type, length=_size + 2, version=_verf[:2],\n flags=dict(dup=True if int(_verf[2], base=2) else False, ret=True if\n int(_verf[3], base=2) else False), seq=_seqn)\n return opt\n",
"role": "user"
},
{
"content": "read_opt_ip_dff",
"role": "assistant"
}
] |
def x(key, default=-1):
if isinstance(key, int):
return Socket(key)
if key not in Socket._member_map_:
extend_enum(Socket, key, default)
return Socket[key]
| get | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(key, default=-1):\n if isinstance(key, int):\n return Socket(key)\n if key not in Socket._member_map_:\n extend_enum(Socket, key, default)\n return Socket[key]\n",
"role": "user"
},
{
"content": "get",
"role": "assistant"
}
] |
def x(cls, value):
if not (isinstance(value, int) and 0 <= value <= 65535):
raise ValueError('%r is not a valid %s' % (value, cls.__name__))
if 1 <= value <= 3000:
extend_enum(cls, 'Registered by Xerox [0x%s]' % hex(value)[2:].
upper().zfill(4), value)
return cls(value)
if 32 <= value <= 63:
extend_enum(cls, 'Experimental [0x%s]' % hex(value)[2:].upper().
zfill(4), value)
return cls(value)
if 3001 <= value <= 65535:
extend_enum(cls, 'Dynamically Assigned [0x%s]' % hex(value)[2:].
upper().zfill(4), value)
return cls(value)
if 16384 <= value <= 20479:
extend_enum(cls, 'Dynamically Assigned Socket Numbers [0x%s]' % hex
(value)[2:].upper().zfill(4), value)
return cls(value)
if 32768 <= value <= 65535:
extend_enum(cls, 'Statically Assigned Socket Numbers [0x%s]' % hex(
value)[2:].upper().zfill(4), value)
return cls(value)
super()._missing_(value)
| missing_ | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(cls, value):\n if not (isinstance(value, int) and 0 <= value <= 65535):\n raise ValueError('%r is not a valid %s' % (value, cls.__name__))\n if 1 <= value <= 3000:\n extend_enum(cls, 'Registered by Xerox [0x%s]' % hex(value)[2:].\n upper().zfill(4), value)\n return cls(value)\n if 32 <= value <= 63:\n extend_enum(cls, 'Experimental [0x%s]' % hex(value)[2:].upper().\n zfill(4), value)\n return cls(value)\n if 3001 <= value <= 65535:\n extend_enum(cls, 'Dynamically Assigned [0x%s]' % hex(value)[2:].\n upper().zfill(4), value)\n return cls(value)\n if 16384 <= value <= 20479:\n extend_enum(cls, 'Dynamically Assigned Socket Numbers [0x%s]' % hex\n (value)[2:].upper().zfill(4), value)\n return cls(value)\n if 32768 <= value <= 65535:\n extend_enum(cls, 'Statically Assigned Socket Numbers [0x%s]' % hex(\n value)[2:].upper().zfill(4), value)\n return cls(value)\n super()._missing_(value)\n",
"role": "user"
},
{
"content": "missing_",
"role": "assistant"
}
] |
def x(self, length, extension):
if length is None:
length = len(self)
_next = self._read_protos(1)
_hlen = self._read_unpack(1)
ipv6_opts = dict(next=_next, length=(_hlen + 1) * 8)
options = self._read_ipv6_opts_options(_hlen * 8 + 6)
ipv6_opts['options'] = options[0]
ipv6_opts.update(options[1])
length -= ipv6_opts['length']
ipv6_opts['packet'] = self._read_packet(header=ipv6_opts['length'],
payload=length)
if extension:
self._protos = None
return ipv6_opts
return self._decode_next_layer(ipv6_opts, _next, length)
| read_ipv6_opts | [
{
"content": "Given the source code of a python function, suggest a fitting name for the function.",
"role": "system"
},
{
"content": "def x(self, length, extension):\n if length is None:\n length = len(self)\n _next = self._read_protos(1)\n _hlen = self._read_unpack(1)\n ipv6_opts = dict(next=_next, length=(_hlen + 1) * 8)\n options = self._read_ipv6_opts_options(_hlen * 8 + 6)\n ipv6_opts['options'] = options[0]\n ipv6_opts.update(options[1])\n length -= ipv6_opts['length']\n ipv6_opts['packet'] = self._read_packet(header=ipv6_opts['length'],\n payload=length)\n if extension:\n self._protos = None\n return ipv6_opts\n return self._decode_next_layer(ipv6_opts, _next, length)\n",
"role": "user"
},
{
"content": "read_ipv6_opts",
"role": "assistant"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.