source_code
stringlengths
45
7.24k
function_name
stringlengths
1
111
messages
list
def x(self, size, kind): if size < 3: raise ProtocolError(f'{self.alias}: [Optno {kind}] invalid format') _clvl = self._read_unpack(1) data = dict(kind=kind, type=self._read_opt_type(kind), length=size, level=_CLASSIFICATION_LEVEL.get(_clvl, _clvl)) if size > 3: _list = list() for counter in range(3, size): _flag = self._read_binary(1) if counter < size - 1 and not int(_flag[7], base=2 ) or counter == size - 1 and int(_flag[7], base=2): raise ProtocolError( f'{self.alias}: [Optno {kind}] invalid format') _dict = dict() for index, bit in enumerate(_flag[:5]): _auth = _PROTECTION_AUTHORITY.get(index) _dict[_auth] = True if int(bit, base=2) else False _list.append(Info(_dict)) data['flags'] = tuple(_list) return data
read_mode_sec
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, size, kind):\n if size < 3:\n raise ProtocolError(f'{self.alias}: [Optno {kind}] invalid format')\n _clvl = self._read_unpack(1)\n data = dict(kind=kind, type=self._read_opt_type(kind), length=size,\n level=_CLASSIFICATION_LEVEL.get(_clvl, _clvl))\n if size > 3:\n _list = list()\n for counter in range(3, size):\n _flag = self._read_binary(1)\n if counter < size - 1 and not int(_flag[7], base=2\n ) or counter == size - 1 and int(_flag[7], base=2):\n raise ProtocolError(\n f'{self.alias}: [Optno {kind}] invalid format')\n _dict = dict()\n for index, bit in enumerate(_flag[:5]):\n _auth = _PROTECTION_AUTHORITY.get(index)\n _dict[_auth] = True if int(bit, base=2) else False\n _list.append(Info(_dict))\n data['flags'] = tuple(_list)\n return data\n", "role": "user" }, { "content": "read_mode_sec", "role": "assistant" } ]
def x(self, size, kind): if size != 4: raise ProtocolError(f'{self.alias}: [Optno {kind}] invalid format') _code = self._read_unpack(2) data = dict(kind=kind, type=self._read_opt_type(kind), length=size, alert=_ROUTER_ALERT.get(_code, 'Reserved'), code=_code) return data
read_mode_rsralt
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, size, kind):\n if size != 4:\n raise ProtocolError(f'{self.alias}: [Optno {kind}] invalid format')\n _code = self._read_unpack(2)\n data = dict(kind=kind, type=self._read_opt_type(kind), length=size,\n alert=_ROUTER_ALERT.get(_code, 'Reserved'), code=_code)\n return data\n", "role": "user" }, { "content": "read_mode_rsralt", "role": "assistant" } ]
def x(self): _magn = self._read_fileng(4) if _magn == b'\xd4\xc3\xb2\xa1': lilendian = True self._nsec = False self._byte = 'little' elif _magn == b'\xa1\xb2\xc3\xd4': lilendian = False self._nsec = False self._byte = 'big' elif _magn == b'M<\xb2\xa1': lilendian = True self._nsec = True self._byte = 'little' elif _magn == b'\xa1\xb2<M': lilendian = False self._nsec = True self._byte = 'big' else: raise FileError(5, 'Unknown file format', self._file.name) _vmaj = self._read_unpack(2, lilendian=lilendian) _vmin = self._read_unpack(2, lilendian=lilendian) _zone = self._read_unpack(4, lilendian=lilendian, signed=True) _acts = self._read_unpack(4, lilendian=lilendian) _slen = self._read_unpack(4, lilendian=lilendian) _type = self._read_protos(4) _byte = self._read_packet(24) self._file = io.BytesIO(_byte) header = dict(magic_number=dict(data=_magn, byteorder=self._byte, nanosecond=self._nsec), version_major=_vmaj, version_minor=_vmin, thiszone=_zone, sigfigs=_acts, snaplen=_slen, network=_type, packet =_byte) return header
read_header
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n _magn = self._read_fileng(4)\n if _magn == b'\\xd4\\xc3\\xb2\\xa1':\n lilendian = True\n self._nsec = False\n self._byte = 'little'\n elif _magn == b'\\xa1\\xb2\\xc3\\xd4':\n lilendian = False\n self._nsec = False\n self._byte = 'big'\n elif _magn == b'M<\\xb2\\xa1':\n lilendian = True\n self._nsec = True\n self._byte = 'little'\n elif _magn == b'\\xa1\\xb2<M':\n lilendian = False\n self._nsec = True\n self._byte = 'big'\n else:\n raise FileError(5, 'Unknown file format', self._file.name)\n _vmaj = self._read_unpack(2, lilendian=lilendian)\n _vmin = self._read_unpack(2, lilendian=lilendian)\n _zone = self._read_unpack(4, lilendian=lilendian, signed=True)\n _acts = self._read_unpack(4, lilendian=lilendian)\n _slen = self._read_unpack(4, lilendian=lilendian)\n _type = self._read_protos(4)\n _byte = self._read_packet(24)\n self._file = io.BytesIO(_byte)\n header = dict(magic_number=dict(data=_magn, byteorder=self._byte,\n nanosecond=self._nsec), version_major=_vmaj, version_minor=_vmin,\n thiszone=_zone, sigfigs=_acts, snaplen=_slen, network=_type, packet\n =_byte)\n return header\n", "role": "user" }, { "content": "read_header", "role": "assistant" } ]
def x(self, size): _byte = self._read_unpack(4, lilendian=True) _prot = LINKTYPE.get(_byte) return _prot
read_protos
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, size):\n _byte = self._read_unpack(4, lilendian=True)\n _prot = LINKTYPE.get(_byte)\n return _prot\n", "role": "user" }, { "content": "read_protos", "role": "assistant" } ]
def x(self): _temp = self._read_unpack(4, lilendian=True, quiet=True) if _temp is None: raise EOFError _tsss = _temp _tsus = self._read_unpack(4, lilendian=True) _ilen = self._read_unpack(4, lilendian=True) _olen = self._read_unpack(4, lilendian=True) if self._nsec: _epch = _tsss + _tsus / 1000000000 else: _epch = _tsss + _tsus / 1000000 _time = datetime.datetime.fromtimestamp(_epch) frame = dict(frame_info=dict(ts_sec=_tsss, ts_usec=_tsus, incl_len= _ilen, orig_len=_olen), time=_time, number=self._fnum, time_epoch= _epch, len=_ilen, cap_len=_olen) length = frame['len'] bytes_ = self._file.read(length) if self._mpkt and self._mpfp: self._mpfp.put(self._file.tell()) self._mpkt.pool += 1 frame['packet'] = bytes_ self._file = io.BytesIO(bytes_) return self._decode_next_layer(frame, length)
read_frame
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n _temp = self._read_unpack(4, lilendian=True, quiet=True)\n if _temp is None:\n raise EOFError\n _tsss = _temp\n _tsus = self._read_unpack(4, lilendian=True)\n _ilen = self._read_unpack(4, lilendian=True)\n _olen = self._read_unpack(4, lilendian=True)\n if self._nsec:\n _epch = _tsss + _tsus / 1000000000\n else:\n _epch = _tsss + _tsus / 1000000\n _time = datetime.datetime.fromtimestamp(_epch)\n frame = dict(frame_info=dict(ts_sec=_tsss, ts_usec=_tsus, incl_len=\n _ilen, orig_len=_olen), time=_time, number=self._fnum, time_epoch=\n _epch, len=_ilen, cap_len=_olen)\n length = frame['len']\n bytes_ = self._file.read(length)\n if self._mpkt and self._mpfp:\n self._mpfp.put(self._file.tell())\n self._mpkt.pool += 1\n frame['packet'] = bytes_\n self._file = io.BytesIO(bytes_)\n return self._decode_next_layer(frame, length)\n", "role": "user" }, { "content": "read_frame", "role": "assistant" } ]
def x(self, dict_, length=None): seek_cur = self._file.tell() try: next_ = self._import_next_layer(self._prot, length) except Exception: dict_['error'] = traceback.format_exc(limit=1).strip().split(os.linesep )[-1] self._file.seek(seek_cur, os.SEEK_SET) next_ = beholder(self._import_next_layer)(self, self._prot, length, error=True) info, chain = next_.info, next_.protochain layer = next_.alias.lower() self._next = next_ self._protos = chain dict_[layer] = info dict_['protocols'] = self._protos.chain return dict_
decode_next_layer
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, dict_, length=None):\n seek_cur = self._file.tell()\n try:\n next_ = self._import_next_layer(self._prot, length)\n except Exception:\n dict_['error'] = traceback.format_exc(limit=1).strip().split(os.linesep\n )[-1]\n self._file.seek(seek_cur, os.SEEK_SET)\n next_ = beholder(self._import_next_layer)(self, self._prot, length,\n error=True)\n info, chain = next_.info, next_.protochain\n layer = next_.alias.lower()\n self._next = next_\n self._protos = chain\n dict_[layer] = info\n dict_['protocols'] = self._protos.chain\n return dict_\n", "role": "user" }, { "content": "decode_next_layer", "role": "assistant" } ]
def x(self, proto, length, error=False): if proto == 1: from pcapkit.protocols.link import Ethernet as Protocol elif proto == 228: from pcapkit.protocols.internet import IPv4 as Protocol elif proto == 229: from pcapkit.protocols.internet import IPv6 as Protocol else: from pcapkit.protocols.raw import Raw as Protocol next_ = Protocol(self._file, length, error=error, layer=self._exlayer, protocol=self._exproto) return next_
import_next_layer
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, proto, length, error=False):\n if proto == 1:\n from pcapkit.protocols.link import Ethernet as Protocol\n elif proto == 228:\n from pcapkit.protocols.internet import IPv4 as Protocol\n elif proto == 229:\n from pcapkit.protocols.internet import IPv6 as Protocol\n else:\n from pcapkit.protocols.raw import Raw as Protocol\n next_ = Protocol(self._file, length, error=error, layer=self._exlayer,\n protocol=self._exproto)\n return next_\n", "role": "user" }, { "content": "import_next_layer", "role": "assistant" } ]
def x(key, default=-1): if isinstance(key, int): return RegistrationFailure(key) if key not in RegistrationFailure._member_map_: extend_enum(RegistrationFailure, key, default) return RegistrationFailure[key]
get
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(key, default=-1):\n if isinstance(key, int):\n return RegistrationFailure(key)\n if key not in RegistrationFailure._member_map_:\n extend_enum(RegistrationFailure, key, default)\n return RegistrationFailure[key]\n", "role": "user" }, { "content": "get", "role": "assistant" } ]
def x(key, default=-1): if isinstance(key, int): return TOS_PRE(key) if key not in TOS_PRE._member_map_: extend_enum(TOS_PRE, key, default) return TOS_PRE[key]
get
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(key, default=-1):\n if isinstance(key, int):\n return TOS_PRE(key)\n if key not in TOS_PRE._member_map_:\n extend_enum(TOS_PRE, key, default)\n return TOS_PRE[key]\n", "role": "user" }, { "content": "get", "role": "assistant" } ]
def x(self, length, *, error=None): if length is None: length = len(self) raw = dict(packet=self._read_fileng(length), error=error or None) return raw
read_raw
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, length, *, error=None):\n if length is None:\n length = len(self)\n raw = dict(packet=self._read_fileng(length), error=error or None)\n return raw\n", "role": "user" }, { "content": "read_raw", "role": "assistant" } ]
def x(key, default=-1): if isinstance(key, int): return NotifyMessage(key) if key not in NotifyMessage._member_map_: extend_enum(NotifyMessage, key, default) return NotifyMessage[key]
get
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(key, default=-1):\n if isinstance(key, int):\n return NotifyMessage(key)\n if key not in NotifyMessage._member_map_:\n extend_enum(NotifyMessage, key, default)\n return NotifyMessage[key]\n", "role": "user" }, { "content": "get", "role": "assistant" } ]
def x(cls, value): if not (isinstance(value, int) and 0 <= value <= 65535): raise ValueError('%r is not a valid %s' % (value, cls.__name__)) if 2 <= value <= 6: extend_enum(cls, 'Unassigned [%d]' % value, value) return cls(value) if 8 <= value <= 13: extend_enum(cls, 'Unassigned [%d]' % value, value) return cls(value) if 21 <= value <= 23: extend_enum(cls, 'Unassigned [%d]' % value, value) return cls(value) if 29 <= value <= 31: extend_enum(cls, 'Unassigned [%d]' % value, value) return cls(value) if 33 <= value <= 39: extend_enum(cls, 'Unassigned [%d]' % value, value) return cls(value) if 52 <= value <= 59: extend_enum(cls, 'Unassigned [%d]' % value, value) return cls(value) if 63 <= value <= 69: extend_enum(cls, 'Unassigned [%d]' % value, value) return cls(value) if 71 <= value <= 89: extend_enum(cls, 'Unassigned [%d]' % value, value) return cls(value) if 91 <= value <= 99: extend_enum(cls, 'Unassigned [%d]' % value, value) return cls(value) if 101 <= value <= 8191: extend_enum(cls, 'Unassigned [%d]' % value, value) return cls(value) if 8192 <= value <= 16383: extend_enum(cls, 'Reserved for Private Use [%d]' % value, value) return cls(value) if 16385 <= value <= 40959: extend_enum(cls, 'Unassigned [%d]' % value, value) return cls(value) if 40960 <= value <= 65535: extend_enum(cls, 'Reserved for Private Use [%d]' % value, value) return cls(value) super()._missing_(value)
missing_
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(cls, value):\n if not (isinstance(value, int) and 0 <= value <= 65535):\n raise ValueError('%r is not a valid %s' % (value, cls.__name__))\n if 2 <= value <= 6:\n extend_enum(cls, 'Unassigned [%d]' % value, value)\n return cls(value)\n if 8 <= value <= 13:\n extend_enum(cls, 'Unassigned [%d]' % value, value)\n return cls(value)\n if 21 <= value <= 23:\n extend_enum(cls, 'Unassigned [%d]' % value, value)\n return cls(value)\n if 29 <= value <= 31:\n extend_enum(cls, 'Unassigned [%d]' % value, value)\n return cls(value)\n if 33 <= value <= 39:\n extend_enum(cls, 'Unassigned [%d]' % value, value)\n return cls(value)\n if 52 <= value <= 59:\n extend_enum(cls, 'Unassigned [%d]' % value, value)\n return cls(value)\n if 63 <= value <= 69:\n extend_enum(cls, 'Unassigned [%d]' % value, value)\n return cls(value)\n if 71 <= value <= 89:\n extend_enum(cls, 'Unassigned [%d]' % value, value)\n return cls(value)\n if 91 <= value <= 99:\n extend_enum(cls, 'Unassigned [%d]' % value, value)\n return cls(value)\n if 101 <= value <= 8191:\n extend_enum(cls, 'Unassigned [%d]' % value, value)\n return cls(value)\n if 8192 <= value <= 16383:\n extend_enum(cls, 'Reserved for Private Use [%d]' % value, value)\n return cls(value)\n if 16385 <= value <= 40959:\n extend_enum(cls, 'Unassigned [%d]' % value, value)\n return cls(value)\n if 40960 <= value <= 65535:\n extend_enum(cls, 'Reserved for Private Use [%d]' % value, value)\n return cls(value)\n super()._missing_(value)\n", "role": "user" }, { "content": "missing_", "role": "assistant" } ]
def x(ipv6): hdr_len = ipv6.__hdr_len__ for code in (0, 60, 43): ext_hdr = ipv6.extension_hdrs.get(code) if ext_hdr is not None: hdr_len += ext_hdr.length return hdr_len
ipv6_hdr_len
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(ipv6):\n hdr_len = ipv6.__hdr_len__\n for code in (0, 60, 43):\n ext_hdr = ipv6.extension_hdrs.get(code)\n if ext_hdr is not None:\n hdr_len += ext_hdr.length\n return hdr_len\n", "role": "user" }, { "content": "ipv6_hdr_len", "role": "assistant" } ]
def x(packet): chain = [type(packet).__name__] payload = packet.data while not isinstance(payload, bytes): chain.append(type(payload).__name__) payload = payload.data return ':'.join(chain)
packet2chain
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(packet):\n chain = [type(packet).__name__]\n payload = packet.data\n while not isinstance(payload, bytes):\n chain.append(type(payload).__name__)\n payload = payload.data\n return ':'.join(chain)\n", "role": "user" }, { "content": "packet2chain", "role": "assistant" } ]
def x(packet, timestamp, *, data_link): def x(packet): dict_ = dict() for field in packet.__hdr_fields__: dict_[field] = getattr(packet, field, None) payload = packet.data if not isinstance(payload, bytes): dict_[type(payload).__name__] = wrapper(payload) return dict_ return {'timestamp': timestamp, 'packet': packet.pack(), data_link.name: wrapper(packet)}
packet2dict
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(packet, timestamp, *, data_link):\n\n def x(packet):\n dict_ = dict()\n for field in packet.__hdr_fields__:\n dict_[field] = getattr(packet, field, None)\n payload = packet.data\n if not isinstance(payload, bytes):\n dict_[type(payload).__name__] = wrapper(payload)\n return dict_\n return {'timestamp': timestamp, 'packet': packet.pack(), data_link.name:\n wrapper(packet)}\n", "role": "user" }, { "content": "packet2dict", "role": "assistant" } ]
def x(packet, *, count=NotImplemented): ipv4 = getattr(packet, 'ip', None) if ipv4 is not None: if ipv4.df: return False, None data = dict(bufid=(ipaddress.ip_address(ipv4.src), ipaddress. ip_address(ipv4.dst), ipv4.id, TP_PROTO.get(ipv4.p).name), num= count, fo=ipv4.off, ihl=ipv4.__hdr_len__, mf=bool(ipv4.mf), tl= ipv4.len, header=bytearray(ipv4.pack()[:ipv4.__hdr_len__]), payload=bytearray(ipv4.pack()[ipv4.__hdr_len__:])) return True, data return False, None
ipv4_reassembly
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(packet, *, count=NotImplemented):\n ipv4 = getattr(packet, 'ip', None)\n if ipv4 is not None:\n if ipv4.df:\n return False, None\n data = dict(bufid=(ipaddress.ip_address(ipv4.src), ipaddress.\n ip_address(ipv4.dst), ipv4.id, TP_PROTO.get(ipv4.p).name), num=\n count, fo=ipv4.off, ihl=ipv4.__hdr_len__, mf=bool(ipv4.mf), tl=\n ipv4.len, header=bytearray(ipv4.pack()[:ipv4.__hdr_len__]),\n payload=bytearray(ipv4.pack()[ipv4.__hdr_len__:]))\n return True, data\n return False, None\n", "role": "user" }, { "content": "ipv4_reassembly", "role": "assistant" } ]
def x(packet, *, count=NotImplemented): ipv6 = getattr(packet, 'ip6', None) if ipv6 is not None: ipv6_frag = ipv6.extension_hdrs.get(44) if ipv6_frag is None: return False, None hdr_len = ipv6_hdr_len(ipv6) data = dict(bufid=(ipaddress.ip_address(ipv6.src), ipaddress. ip_address(ipv6.dst), ipv6.flow, TP_PROTO.get(ipv6_frag.nh). name), num=count, fo=ipv6_frag.nxt, ihl=hdr_len, mf=bool( ipv6_frag.m_flag), tl=len(ipv6), header=bytearray(ipv6.pack()[: hdr_len]), payload=bytearray(ipv6.pack()[hdr_len + ipv6_frag:])) return True, data return False, None
ipv6_reassembly
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(packet, *, count=NotImplemented):\n ipv6 = getattr(packet, 'ip6', None)\n if ipv6 is not None:\n ipv6_frag = ipv6.extension_hdrs.get(44)\n if ipv6_frag is None:\n return False, None\n hdr_len = ipv6_hdr_len(ipv6)\n data = dict(bufid=(ipaddress.ip_address(ipv6.src), ipaddress.\n ip_address(ipv6.dst), ipv6.flow, TP_PROTO.get(ipv6_frag.nh).\n name), num=count, fo=ipv6_frag.nxt, ihl=hdr_len, mf=bool(\n ipv6_frag.m_flag), tl=len(ipv6), header=bytearray(ipv6.pack()[:\n hdr_len]), payload=bytearray(ipv6.pack()[hdr_len + ipv6_frag:]))\n return True, data\n return False, None\n", "role": "user" }, { "content": "ipv6_reassembly", "role": "assistant" } ]
def x(packet, *, count=NotImplemented): if getattr(packet, 'ip', None): ip = packet['ip'] elif getattr(packet, 'ip6', None): ip = packet['ip6'] else: return False, None tcp = getattr(ip, 'tcp', None) if tcp is not None: flags = bin(tcp.flags)[2:].zfill(8) data = dict(bufid=(ipaddress.ip_address(ip.src), ipaddress. ip_address(ip.dst), tcp.sport, tcp.dport), num=count, ack=tcp. ack, dsn=tcp.seq, rst=bool(int(flags[5])), syn=bool(int(flags[6 ])), fin=bool(int(flags[7])), payload=bytearray(tcp.pack()[tcp. __hdr_len__:])) raw_len = len(tcp.data) data['first'] = tcp.seq data['last'] = tcp.seq + raw_len data['len'] = raw_len return True, data return False, None
tcp_reassembly
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(packet, *, count=NotImplemented):\n if getattr(packet, 'ip', None):\n ip = packet['ip']\n elif getattr(packet, 'ip6', None):\n ip = packet['ip6']\n else:\n return False, None\n tcp = getattr(ip, 'tcp', None)\n if tcp is not None:\n flags = bin(tcp.flags)[2:].zfill(8)\n data = dict(bufid=(ipaddress.ip_address(ip.src), ipaddress.\n ip_address(ip.dst), tcp.sport, tcp.dport), num=count, ack=tcp.\n ack, dsn=tcp.seq, rst=bool(int(flags[5])), syn=bool(int(flags[6\n ])), fin=bool(int(flags[7])), payload=bytearray(tcp.pack()[tcp.\n __hdr_len__:]))\n raw_len = len(tcp.data)\n data['first'] = tcp.seq\n data['last'] = tcp.seq + raw_len\n data['len'] = raw_len\n return True, data\n return False, None\n", "role": "user" }, { "content": "tcp_reassembly", "role": "assistant" } ]
def x(packet, timestamp, *, data_link, count=NotImplemented): if getattr(packet, 'ip', None): ip = packet['ip'] elif getattr(packet, 'ip6', None): ip = packet['ip6'] else: return False, None tcp = getattr(ip, 'tcp', None) if tcp is not None: flags = bin(tcp.flags)[2:].zfill(8) data = dict(protocol=data_link, index=count, frame=packet2dict( packet, timestamp, data_link=data_link), syn=bool(int(flags[6]) ), fin=bool(int(flags[7])), src=ipaddress.ip_address(ip.src), dst=ipaddress.ip_address(ip.dst), srcport=tcp.sport, dstport= tcp.dport, timestamp=timestamp) return True, data return False, None
tcp_traceflow
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(packet, timestamp, *, data_link, count=NotImplemented):\n if getattr(packet, 'ip', None):\n ip = packet['ip']\n elif getattr(packet, 'ip6', None):\n ip = packet['ip6']\n else:\n return False, None\n tcp = getattr(ip, 'tcp', None)\n if tcp is not None:\n flags = bin(tcp.flags)[2:].zfill(8)\n data = dict(protocol=data_link, index=count, frame=packet2dict(\n packet, timestamp, data_link=data_link), syn=bool(int(flags[6])\n ), fin=bool(int(flags[7])), src=ipaddress.ip_address(ip.src),\n dst=ipaddress.ip_address(ip.dst), srcport=tcp.sport, dstport=\n tcp.dport, timestamp=timestamp)\n return True, data\n return False, None\n", "role": "user" }, { "content": "tcp_traceflow", "role": "assistant" } ]
def x(self, length): if length is None: length = len(self) if length < 9: raise ProtocolError(f'HTTP/2: invalid format', quiet=True) _tlen = self._read_unpack(3) _type = self._read_unpack(1) _flag = self._read_binary(1) _rsid = self._read_binary(4) if _tlen != length: raise ProtocolError(f'HTTP/2: [Type {_type}] invalid format', quiet =True) if int(_rsid[0], base=2): raise ProtocolError(f'HTTP/2: [Type {_type}] invalid format', quiet =True) http = dict(length=_tlen, type=_HTTP_TYPE.get(_type), sid=int(_rsid[1:], base=2), packet=self._read_packet(_tlen)) if http['type'] is None: raise ProtocolError(f'HTTP/2: [Type {_type}] invalid format', quiet =True) if http['type'] in ('SETTINGS', 'PING') and http['sid'] != 0: raise ProtocolError(f'HTTP/2: [Type {_type}] invalid format', quiet =True) _http = _HTTP_FUNC[_type](self, _tlen, _type, _flag) http.update(_http) return http
read_http
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, length):\n if length is None:\n length = len(self)\n if length < 9:\n raise ProtocolError(f'HTTP/2: invalid format', quiet=True)\n _tlen = self._read_unpack(3)\n _type = self._read_unpack(1)\n _flag = self._read_binary(1)\n _rsid = self._read_binary(4)\n if _tlen != length:\n raise ProtocolError(f'HTTP/2: [Type {_type}] invalid format', quiet\n =True)\n if int(_rsid[0], base=2):\n raise ProtocolError(f'HTTP/2: [Type {_type}] invalid format', quiet\n =True)\n http = dict(length=_tlen, type=_HTTP_TYPE.get(_type), sid=int(_rsid[1:],\n base=2), packet=self._read_packet(_tlen))\n if http['type'] is None:\n raise ProtocolError(f'HTTP/2: [Type {_type}] invalid format', quiet\n =True)\n if http['type'] in ('SETTINGS', 'PING') and http['sid'] != 0:\n raise ProtocolError(f'HTTP/2: [Type {_type}] invalid format', quiet\n =True)\n _http = _HTTP_FUNC[_type](self, _tlen, _type, _flag)\n http.update(_http)\n return http\n", "role": "user" }, { "content": "read_http", "role": "assistant" } ]
def x(self, size, kind, flag): if any(int(bit, base=2) for bit in flag): raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True ) data = dict(flags=None, payload=self._read_fileng(size - 9) or None) return data
read_http_none
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, size, kind, flag):\n if any(int(bit, base=2) for bit in flag):\n raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True\n )\n data = dict(flags=None, payload=self._read_fileng(size - 9) or None)\n return data\n", "role": "user" }, { "content": "read_http_none", "role": "assistant" } ]
def x(self, size, kind, flag): _plen = 0 _flag = dict(END_STREAM=False, PADDED=False) for index, bit in enumerate(flag): if index == 0 and bit: _flag['END_STREAM'] = True elif index == 3 and bit: _flag['PADDED'] = True _plen = self._read_unpack(1) elif bit: raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True) else: continue if _plen > size - 10: raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True ) if _flag['PADDED']: _dlen = size - _plen - 1 else: _dlen = size - _plen if _dlen < 0: raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True ) _data = self._read_fileng(_dlen) padding = self._read_binary(_plen) if any(int(bit, base=2) for bit in padding): raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True ) data = dict(flags=_flag, data=_data) if _flag['PADDED']: data['ped_len'] = _plen return data
read_http_data
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, size, kind, flag):\n _plen = 0\n _flag = dict(END_STREAM=False, PADDED=False)\n for index, bit in enumerate(flag):\n if index == 0 and bit:\n _flag['END_STREAM'] = True\n elif index == 3 and bit:\n _flag['PADDED'] = True\n _plen = self._read_unpack(1)\n elif bit:\n raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format',\n quiet=True)\n else:\n continue\n if _plen > size - 10:\n raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True\n )\n if _flag['PADDED']:\n _dlen = size - _plen - 1\n else:\n _dlen = size - _plen\n if _dlen < 0:\n raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True\n )\n _data = self._read_fileng(_dlen)\n padding = self._read_binary(_plen)\n if any(int(bit, base=2) for bit in padding):\n raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True\n )\n data = dict(flags=_flag, data=_data)\n if _flag['PADDED']:\n data['ped_len'] = _plen\n return data\n", "role": "user" }, { "content": "read_http_data", "role": "assistant" } ]
def x(self, size, kind, flag): _plen = 0 _elen = 0 _flag = dict(END_STREAM=False, END_HEADERS=False, PADDED=False, PRIORITY=False) for index, bit in enumerate(flag): if index == 0 and bit: _flag['END_STREAM'] = True elif index == 2 and bit: _flag['END_HEADERS'] = True elif index == 3 and bit: _flag['PADDED'] = True _plen = self._read_unpack(1) elif index == 5 and bit: _flag['PRIORITY'] = True _edep = self._read_binary(4) _wght = self._read_unpack(1) _elen = 5 elif bit: raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True) else: continue if _flag['PADDED']: _dlen = size - _plen - _elen - 1 else: _dlen = size - _plen - _elen if _dlen < 0: raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True ) _frag = self._read_fileng(_dlen) or None padding = self._read_binary(_plen) if any(int(bit, base=2) for bit in padding): raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True ) data = dict(flags=_flag, frag=_frag) if _flag['PADDED']: data['ped_len'] = _plen if _flag['PRIORITY']: data['exclusive'] = True if int(_edep[0], base=2) else False data['deps'] = int(_edep[1:], base=2) data['weight'] = _wght + 1 return data
read_http_headers
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, size, kind, flag):\n _plen = 0\n _elen = 0\n _flag = dict(END_STREAM=False, END_HEADERS=False, PADDED=False,\n PRIORITY=False)\n for index, bit in enumerate(flag):\n if index == 0 and bit:\n _flag['END_STREAM'] = True\n elif index == 2 and bit:\n _flag['END_HEADERS'] = True\n elif index == 3 and bit:\n _flag['PADDED'] = True\n _plen = self._read_unpack(1)\n elif index == 5 and bit:\n _flag['PRIORITY'] = True\n _edep = self._read_binary(4)\n _wght = self._read_unpack(1)\n _elen = 5\n elif bit:\n raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format',\n quiet=True)\n else:\n continue\n if _flag['PADDED']:\n _dlen = size - _plen - _elen - 1\n else:\n _dlen = size - _plen - _elen\n if _dlen < 0:\n raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True\n )\n _frag = self._read_fileng(_dlen) or None\n padding = self._read_binary(_plen)\n if any(int(bit, base=2) for bit in padding):\n raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True\n )\n data = dict(flags=_flag, frag=_frag)\n if _flag['PADDED']:\n data['ped_len'] = _plen\n if _flag['PRIORITY']:\n data['exclusive'] = True if int(_edep[0], base=2) else False\n data['deps'] = int(_edep[1:], base=2)\n data['weight'] = _wght + 1\n return data\n", "role": "user" }, { "content": "read_http_headers", "role": "assistant" } ]
def x(self, size, kind, flag): if size != 9: raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True ) if any(int(bit, base=2) for bit in flag): raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True ) _edep = self._read_binary(4) _wght = self._read_unpack(1) data = dict(flags=None, exclusive=True if int(_edep[0], base=2) else False, deps=int(_edep[1:], base=2), weight=_wght + 1) return data
read_http_priority
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, size, kind, flag):\n if size != 9:\n raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True\n )\n if any(int(bit, base=2) for bit in flag):\n raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True\n )\n _edep = self._read_binary(4)\n _wght = self._read_unpack(1)\n data = dict(flags=None, exclusive=True if int(_edep[0], base=2) else \n False, deps=int(_edep[1:], base=2), weight=_wght + 1)\n return data\n", "role": "user" }, { "content": "read_http_priority", "role": "assistant" } ]
def x(self, size, kind, flag): if size != 8: raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True ) if any(int(bit, base=2) for bit in flag): raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True ) _code = self._read_unpack(4) data = dict(flags=None, error=_ERROR_CODE.get(_code, _code)) return data
read_http_rst_stream
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, size, kind, flag):\n if size != 8:\n raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True\n )\n if any(int(bit, base=2) for bit in flag):\n raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True\n )\n _code = self._read_unpack(4)\n data = dict(flags=None, error=_ERROR_CODE.get(_code, _code))\n return data\n", "role": "user" }, { "content": "read_http_rst_stream", "role": "assistant" } ]
def x(self, size, kind, flag): if size % 5 != 0: raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True ) _flag = dict(ACK=False) for index, bit in enumerate(flag): if index == 0 and bit: _flag['ACK'] = True elif bit: raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True) else: continue if _flag['ACK'] and size: raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True ) _para = dict() counter = 0 while counter < size: _stid = self._read_unpack(1) _pval = self._read_unpack(4) _pkey = _PARA_NAME.get(_stid, 'Unsigned') if _pkey in _para: if isinstance(_para[_pkey], tuple): _para[_pkey] += _pval, else: _para[_pkey] = _para[_pkey], _pval else: _para[_pkey] = _pval data = dict(flags=_flag) data.update(_para) return data
read_http_settings
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, size, kind, flag):\n if size % 5 != 0:\n raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True\n )\n _flag = dict(ACK=False)\n for index, bit in enumerate(flag):\n if index == 0 and bit:\n _flag['ACK'] = True\n elif bit:\n raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format',\n quiet=True)\n else:\n continue\n if _flag['ACK'] and size:\n raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True\n )\n _para = dict()\n counter = 0\n while counter < size:\n _stid = self._read_unpack(1)\n _pval = self._read_unpack(4)\n _pkey = _PARA_NAME.get(_stid, 'Unsigned')\n if _pkey in _para:\n if isinstance(_para[_pkey], tuple):\n _para[_pkey] += _pval,\n else:\n _para[_pkey] = _para[_pkey], _pval\n else:\n _para[_pkey] = _pval\n data = dict(flags=_flag)\n data.update(_para)\n return data\n", "role": "user" }, { "content": "read_http_settings", "role": "assistant" } ]
def x(self, size, kind, flag): if size < 4: raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True ) _plen = 0 _flag = dict(END_HEADERS=False, PADDED=False) for index, bit in enumerate(flag): if index == 2 and bit: _flag['END_HEADERS'] = True elif index == 3 and bit: _flag['PADDED'] = True _plen = self._read_unpack(1) elif bit: raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True) else: continue if _flag['PADDED']: _dlen = size - _plen - 5 else: _dlen = size - _plen - 4 if _dlen < 0: raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True ) _rpid = self._read_binary(4) _frag = self._read_fileng(_dlen) or None if int(_rpid[0], base=2): raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True ) padding = self._read_binary(_plen) if any(int(bit, base=2) for bit in padding): raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True ) data = dict(flags=_flag, pid=int(_rpid[1:], base=2), frag=_frag) if _flag['PADDED']: data['ped_len'] = _plen return data
read_http_push_promise
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, size, kind, flag):\n if size < 4:\n raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True\n )\n _plen = 0\n _flag = dict(END_HEADERS=False, PADDED=False)\n for index, bit in enumerate(flag):\n if index == 2 and bit:\n _flag['END_HEADERS'] = True\n elif index == 3 and bit:\n _flag['PADDED'] = True\n _plen = self._read_unpack(1)\n elif bit:\n raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format',\n quiet=True)\n else:\n continue\n if _flag['PADDED']:\n _dlen = size - _plen - 5\n else:\n _dlen = size - _plen - 4\n if _dlen < 0:\n raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True\n )\n _rpid = self._read_binary(4)\n _frag = self._read_fileng(_dlen) or None\n if int(_rpid[0], base=2):\n raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True\n )\n padding = self._read_binary(_plen)\n if any(int(bit, base=2) for bit in padding):\n raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True\n )\n data = dict(flags=_flag, pid=int(_rpid[1:], base=2), frag=_frag)\n if _flag['PADDED']:\n data['ped_len'] = _plen\n return data\n", "role": "user" }, { "content": "read_http_push_promise", "role": "assistant" } ]
def x(self, size, kind, flag): if size != 8: raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True ) _flag = dict(ACK=False) for index, bit in enumerate(flag): if index == 0 and bit: _flag['ACK'] = True elif bit: raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True) else: continue _data = self._read_fileng(8) data = dict(flags=_flag, data=_data) return data
read_http_ping
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, size, kind, flag):\n if size != 8:\n raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True\n )\n _flag = dict(ACK=False)\n for index, bit in enumerate(flag):\n if index == 0 and bit:\n _flag['ACK'] = True\n elif bit:\n raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format',\n quiet=True)\n else:\n continue\n _data = self._read_fileng(8)\n data = dict(flags=_flag, data=_data)\n return data\n", "role": "user" }, { "content": "read_http_ping", "role": "assistant" } ]
def x(self, size, kind, flag): _dlen = size - 8 if _dlen < 0: raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True ) if any(int(bit, base=2) for bit in flag): raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True ) _rsid = self._read_binary(4) _code = self._read_unpack(4) _data = self._read_fileng(_dlen) or None if int(_rsid[0], base=2): raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True ) data = dict(flags=None, last_sid=int(_rsid[1:], base=2), error= _ERROR_CODE.get(_code, _code), data=_data) return data
read_http_goaway
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, size, kind, flag):\n _dlen = size - 8\n if _dlen < 0:\n raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True\n )\n if any(int(bit, base=2) for bit in flag):\n raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True\n )\n _rsid = self._read_binary(4)\n _code = self._read_unpack(4)\n _data = self._read_fileng(_dlen) or None\n if int(_rsid[0], base=2):\n raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True\n )\n data = dict(flags=None, last_sid=int(_rsid[1:], base=2), error=\n _ERROR_CODE.get(_code, _code), data=_data)\n return data\n", "role": "user" }, { "content": "read_http_goaway", "role": "assistant" } ]
def x(self, size, kind, flag): if size != 4: raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True ) if any(int(bit, base=2) for bit in flag): raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True ) _size = self._read_binary(4) if int(_size[0], base=2): raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True ) data = dict(flags=None, window=int(_size[1:], base=2)) return data
read_http_window_update
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, size, kind, flag):\n if size != 4:\n raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True\n )\n if any(int(bit, base=2) for bit in flag):\n raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True\n )\n _size = self._read_binary(4)\n if int(_size[0], base=2):\n raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True\n )\n data = dict(flags=None, window=int(_size[1:], base=2))\n return data\n", "role": "user" }, { "content": "read_http_window_update", "role": "assistant" } ]
def x(self, size, kind, flag): _flag = dict(END_HEADERS=False) for index, bit in enumerate(flag): if index == 2 and bit: _flag['END_HEADERS'] = True elif bit: raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format', quiet=True) else: continue _frag = self._read_fileng(size) or None data = dict(flags=_flag, frag=_frag) return data
read_http_continuation
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, size, kind, flag):\n _flag = dict(END_HEADERS=False)\n for index, bit in enumerate(flag):\n if index == 2 and bit:\n _flag['END_HEADERS'] = True\n elif bit:\n raise ProtocolError(f'HTTP/2: [Type {kind}] invalid format',\n quiet=True)\n else:\n continue\n _frag = self._read_fileng(size) or None\n data = dict(flags=_flag, frag=_frag)\n return data\n", "role": "user" }, { "content": "read_http_continuation", "role": "assistant" } ]
def x(key, default=-1): if isinstance(key, int): return OptionNumber(key) if key not in OptionNumber._member_map_: extend_enum(OptionNumber, key, default) return OptionNumber[key]
get
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(key, default=-1):\n if isinstance(key, int):\n return OptionNumber(key)\n if key not in OptionNumber._member_map_:\n extend_enum(OptionNumber, key, default)\n return OptionNumber[key]\n", "role": "user" }, { "content": "get", "role": "assistant" } ]
def x(self, proto, length): if self._exproto == 'null' and self._exlayer == 'None': from pcapkit.protocols.raw import Raw as NextLayer else: from pcapkit.foundation.analysis import analyse as NextLayer if length == 0: next_ = NoPayload() elif self._onerror: next_ = beholder_ng(NextLayer)(self._file, length, _termination= self._sigterm) else: next_ = NextLayer(self._file, length, _termination=self._sigterm) return next_
import_next_layer
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, proto, length):\n if self._exproto == 'null' and self._exlayer == 'None':\n from pcapkit.protocols.raw import Raw as NextLayer\n else:\n from pcapkit.foundation.analysis import analyse as NextLayer\n if length == 0:\n next_ = NoPayload()\n elif self._onerror:\n next_ = beholder_ng(NextLayer)(self._file, length, _termination=\n self._sigterm)\n else:\n next_ = NextLayer(self._file, length, _termination=self._sigterm)\n return next_\n", "role": "user" }, { "content": "import_next_layer", "role": "assistant" } ]
def x(key, default=-1): if isinstance(key, int): return ProtectionAuthority(key) if key not in ProtectionAuthority._member_map_: extend_enum(ProtectionAuthority, key, default) return ProtectionAuthority[key]
get
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(key, default=-1):\n if isinstance(key, int):\n return ProtectionAuthority(key)\n if key not in ProtectionAuthority._member_map_:\n extend_enum(ProtectionAuthority, key, default)\n return ProtectionAuthority[key]\n", "role": "user" }, { "content": "get", "role": "assistant" } ]
def x(key, default=-1): if isinstance(key, int): return RouterAlert(key) if key not in RouterAlert._member_map_: extend_enum(RouterAlert, key, default) return RouterAlert[key]
get
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(key, default=-1):\n if isinstance(key, int):\n return RouterAlert(key)\n if key not in RouterAlert._member_map_:\n extend_enum(RouterAlert, key, default)\n return RouterAlert[key]\n", "role": "user" }, { "content": "get", "role": "assistant" } ]
def x(key, default=-1): if isinstance(key, int): return QS_Function(key) if key not in QS_Function._member_map_: extend_enum(QS_Function, key, default) return QS_Function[key]
get
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(key, default=-1):\n if isinstance(key, int):\n return QS_Function(key)\n if key not in QS_Function._member_map_:\n extend_enum(QS_Function, key, default)\n return QS_Function[key]\n", "role": "user" }, { "content": "get", "role": "assistant" } ]
def x(self): flag = True if self._exeng == 'dpkt': flag, engine = self.import_test('dpkt', name='DPKT') if flag: return self._run_dpkt(engine) elif self._exeng == 'scapy': flag, engine = self.import_test('scapy.all', name='Scapy') if flag: return self._run_scapy(engine) elif self._exeng == 'pyshark': flag, engine = self.import_test('pyshark', name='PyShark') if flag: return self._run_pyshark(engine) elif self._exeng == 'pipeline': flag, engine = self.import_test('multiprocessing', name= 'Pipeline Multiprocessing') self._flag_m = flag = bool(flag and (self._flag_a and CPU_CNT > 1)) if self._flag_m: return self._run_pipeline(engine) warnings.warn( f'extraction engine Pipeline Multiprocessing is not available; using default engine instead' , EngineWarning, stacklevel=stacklevel()) elif self._exeng == 'server': flag, engine = self.import_test('multiprocessing', name= 'Server Multiprocessing') self._flag_m = flag = bool(flag and (self._flag_a and CPU_CNT > 2)) if self._flag_m: return self._run_server(engine) warnings.warn( f'extraction engine Server Multiprocessing is not available; using default engine instead' , EngineWarning, stacklevel=stacklevel()) elif self._exeng not in ('default', 'pcapkit'): flag = False warnings.warn( f'unsupported extraction engine: {self._exeng}; using default engine instead' , EngineWarning, stacklevel=stacklevel()) self._exeng = self._exeng if flag else 'default' self.record_header() self.record_frames()
run
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n flag = True\n if self._exeng == 'dpkt':\n flag, engine = self.import_test('dpkt', name='DPKT')\n if flag:\n return self._run_dpkt(engine)\n elif self._exeng == 'scapy':\n flag, engine = self.import_test('scapy.all', name='Scapy')\n if flag:\n return self._run_scapy(engine)\n elif self._exeng == 'pyshark':\n flag, engine = self.import_test('pyshark', name='PyShark')\n if flag:\n return self._run_pyshark(engine)\n elif self._exeng == 'pipeline':\n flag, engine = self.import_test('multiprocessing', name=\n 'Pipeline Multiprocessing')\n self._flag_m = flag = bool(flag and (self._flag_a and CPU_CNT > 1))\n if self._flag_m:\n return self._run_pipeline(engine)\n warnings.warn(\n f'extraction engine Pipeline Multiprocessing is not available; using default engine instead'\n , EngineWarning, stacklevel=stacklevel())\n elif self._exeng == 'server':\n flag, engine = self.import_test('multiprocessing', name=\n 'Server Multiprocessing')\n self._flag_m = flag = bool(flag and (self._flag_a and CPU_CNT > 2))\n if self._flag_m:\n return self._run_server(engine)\n warnings.warn(\n f'extraction engine Server Multiprocessing is not available; using default engine instead'\n , EngineWarning, stacklevel=stacklevel())\n elif self._exeng not in ('default', 'pcapkit'):\n flag = False\n warnings.warn(\n f'unsupported extraction engine: {self._exeng}; using default engine instead'\n , EngineWarning, stacklevel=stacklevel())\n self._exeng = self._exeng if flag else 'default'\n self.record_header()\n self.record_frames()\n", "role": "user" }, { "content": "run", "role": "assistant" } ]
def x(self): self._gbhdr = Header(self._ifile) self._vinfo = self._gbhdr.version self._dlink = self._gbhdr.protocol self._nnsec = self._gbhdr.nanosecond if self._trace is not NotImplemented: self._trace._endian = self._gbhdr.byteorder self._trace._nnsecd = self._gbhdr.nanosecond if not self._flag_q: if self._flag_f: ofile = self._ofile(f'{self._ofnm}/Global Header.{self._fext}') ofile(self._gbhdr.info, name='Global Header') self._type = ofile.kind else: self._ofile(self._gbhdr.info, name='Global Header') self._type = self._ofile.kind
record_header
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n self._gbhdr = Header(self._ifile)\n self._vinfo = self._gbhdr.version\n self._dlink = self._gbhdr.protocol\n self._nnsec = self._gbhdr.nanosecond\n if self._trace is not NotImplemented:\n self._trace._endian = self._gbhdr.byteorder\n self._trace._nnsecd = self._gbhdr.nanosecond\n if not self._flag_q:\n if self._flag_f:\n ofile = self._ofile(f'{self._ofnm}/Global Header.{self._fext}')\n ofile(self._gbhdr.info, name='Global Header')\n self._type = ofile.kind\n else:\n self._ofile(self._gbhdr.info, name='Global Header')\n self._type = self._ofile.kind\n", "role": "user" }, { "content": "record_header", "role": "assistant" } ]
def x(self): self._expkg = None self._extmp = None self._flag_e = True self._ifile.close()
cleanup
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n self._expkg = None\n self._extmp = None\n self._flag_e = True\n self._ifile.close()\n", "role": "user" }, { "content": "cleanup", "role": "assistant" } ]
def x(self): if not self._flag_e and self._flag_m: [proc.join() for proc in self._mpprc] if self._exeng == 'server': self._mpsvc.join() if self._exeng == 'server': self._frame = list(self._mpfrm) self._reasm = list(self._mprsm) self._trace = copy.deepcopy(self._mpkit.trace) if self._exeng == 'pipeline': self._frame = [self._mpkit.frames[x] for x in sorted(self. _mpkit.frames)] self._reasm = copy.deepcopy(self._mpkit.reassembly) self._trace = copy.deepcopy(self._mpkit.trace) self._mpmng.shutdown() [delattr(self, attr) for attr in filter(lambda s: s.startswith( '_mp'), dir(self))] self._frnum -= 2
aftermathmp
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n if not self._flag_e and self._flag_m:\n [proc.join() for proc in self._mpprc]\n if self._exeng == 'server':\n self._mpsvc.join()\n if self._exeng == 'server':\n self._frame = list(self._mpfrm)\n self._reasm = list(self._mprsm)\n self._trace = copy.deepcopy(self._mpkit.trace)\n if self._exeng == 'pipeline':\n self._frame = [self._mpkit.frames[x] for x in sorted(self.\n _mpkit.frames)]\n self._reasm = copy.deepcopy(self._mpkit.reassembly)\n self._trace = copy.deepcopy(self._mpkit.trace)\n self._mpmng.shutdown()\n [delattr(self, attr) for attr in filter(lambda s: s.startswith(\n '_mp'), dir(self))]\n self._frnum -= 2\n", "role": "user" }, { "content": "aftermathmp", "role": "assistant" } ]
def x(self): self._aftermathmp() self._ifile.close() self._flag_e = True
update_eof
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n self._aftermathmp()\n self._ifile.close()\n self._flag_e = True\n", "role": "user" }, { "content": "update_eof", "role": "assistant" } ]
def x(self): if self._exeng == 'scapy': return self._scapy_read_frame() elif self._exeng == 'dpkt': return self._dpkt_read_frame() elif self._exeng == 'pyshark': return self._pyshark_read_frame() else: return self._default_read_frame()
read_frame
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n if self._exeng == 'scapy':\n return self._scapy_read_frame()\n elif self._exeng == 'dpkt':\n return self._dpkt_read_frame()\n elif self._exeng == 'pyshark':\n return self._pyshark_read_frame()\n else:\n return self._default_read_frame()\n", "role": "user" }, { "content": "read_frame", "role": "assistant" } ]
def x(self, *, frame=None, mpkit=None): from pcapkit.toolkit.default import ipv4_reassembly, ipv6_reassembly, tcp_reassembly, tcp_traceflow if not self._flag_m: frame = Frame(self._ifile, num=self._frnum + 1, proto=self._dlink, layer=self._exlyr, protocol=self._exptl, nanosecond=self._nnsec) self._frnum += 1 if self._flag_v: print(f' - Frame {self._frnum:>3d}: {frame.protochain}') frnum = f'Frame {self._frnum}' if not self._flag_q: if self._flag_f: ofile = self._ofile(f'{self._ofnm}/{frnum}.{self._fext}') ofile(frame.info, name=frnum) else: self._ofile(frame.info, name=frnum) if self._ipv4: flag, data = ipv4_reassembly(frame) if flag: self._reasm[0](data) if self._ipv6: flag, data = ipv6_reassembly(frame) if flag: self._reasm[1](data) if self._tcp: flag, data = tcp_reassembly(frame) if flag: self._reasm[2](data) if self._flag_t: flag, data = tcp_traceflow(frame, data_link=self._dlink) if flag: self._trace(data) if self._exeng == 'pipeline': if self._flag_d: mpkit.frames[self._frnum] = frame mpkit.current += 1 elif self._exeng == 'server': if self._flag_d: self._frame.append(frame) self._frnum += 1 else: if self._flag_d: self._frame.append(frame) self._proto = frame.protochain.chain return frame
default_read_frame
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, *, frame=None, mpkit=None):\n from pcapkit.toolkit.default import ipv4_reassembly, ipv6_reassembly, tcp_reassembly, tcp_traceflow\n if not self._flag_m:\n frame = Frame(self._ifile, num=self._frnum + 1, proto=self._dlink,\n layer=self._exlyr, protocol=self._exptl, nanosecond=self._nnsec)\n self._frnum += 1\n if self._flag_v:\n print(f' - Frame {self._frnum:>3d}: {frame.protochain}')\n frnum = f'Frame {self._frnum}'\n if not self._flag_q:\n if self._flag_f:\n ofile = self._ofile(f'{self._ofnm}/{frnum}.{self._fext}')\n ofile(frame.info, name=frnum)\n else:\n self._ofile(frame.info, name=frnum)\n if self._ipv4:\n flag, data = ipv4_reassembly(frame)\n if flag:\n self._reasm[0](data)\n if self._ipv6:\n flag, data = ipv6_reassembly(frame)\n if flag:\n self._reasm[1](data)\n if self._tcp:\n flag, data = tcp_reassembly(frame)\n if flag:\n self._reasm[2](data)\n if self._flag_t:\n flag, data = tcp_traceflow(frame, data_link=self._dlink)\n if flag:\n self._trace(data)\n if self._exeng == 'pipeline':\n if self._flag_d:\n mpkit.frames[self._frnum] = frame\n mpkit.current += 1\n elif self._exeng == 'server':\n if self._flag_d:\n self._frame.append(frame)\n self._frnum += 1\n else:\n if self._flag_d:\n self._frame.append(frame)\n self._proto = frame.protochain.chain\n return frame\n", "role": "user" }, { "content": "default_read_frame", "role": "assistant" } ]
def x(self, scapy_all): if self._exlyr != 'None' or self._exptl != 'null': warnings.warn( f"'Extractor(engine=scapy)' does not support protocol and layer threshold; 'layer={self._exlyr}' and 'protocol={self._exptl}' ignored" , AttributeWarning, stacklevel=stacklevel()) self._expkg = scapy_all self._extmp = iter(scapy_all.sniff(offline=self._ifnm)) self.record_frames()
run_scapy
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, scapy_all):\n if self._exlyr != 'None' or self._exptl != 'null':\n warnings.warn(\n f\"'Extractor(engine=scapy)' does not support protocol and layer threshold; 'layer={self._exlyr}' and 'protocol={self._exptl}' ignored\"\n , AttributeWarning, stacklevel=stacklevel())\n self._expkg = scapy_all\n self._extmp = iter(scapy_all.sniff(offline=self._ifnm))\n self.record_frames()\n", "role": "user" }, { "content": "run_scapy", "role": "assistant" } ]
def x(self): from pcapkit.toolkit.scapy import ipv4_reassembly, ipv6_reassembly, packet2chain, packet2dict, tcp_reassembly, tcp_traceflow packet = next(self._extmp) self._frnum += 1 self._proto = packet2chain(packet) if self._flag_v: print(f' - Frame {self._frnum:>3d}: {self._proto}') frnum = f'Frame {self._frnum}' if not self._flag_q: info = packet2dict(packet) if self._flag_f: ofile = self._ofile(f'{self._ofnm}/{frnum}.{self._fext}') ofile(info, name=frnum) else: self._ofile(info, name=frnum) if self._flag_d: self._frame.append(packet) if self._ipv4: flag, data = ipv4_reassembly(packet, count=self._frnum) if flag: self._reasm[0](data) if self._ipv6: flag, data = ipv6_reassembly(packet, count=self._frnum) if flag: self._reasm[1](data) if self._tcp: flag, data = tcp_reassembly(packet, count=self._frnum) if flag: self._reasm[2](data) if self._flag_t: flag, data = tcp_traceflow(packet, count=self._frnum) if flag: self._trace(data) return packet
scapy_read_frame
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n from pcapkit.toolkit.scapy import ipv4_reassembly, ipv6_reassembly, packet2chain, packet2dict, tcp_reassembly, tcp_traceflow\n packet = next(self._extmp)\n self._frnum += 1\n self._proto = packet2chain(packet)\n if self._flag_v:\n print(f' - Frame {self._frnum:>3d}: {self._proto}')\n frnum = f'Frame {self._frnum}'\n if not self._flag_q:\n info = packet2dict(packet)\n if self._flag_f:\n ofile = self._ofile(f'{self._ofnm}/{frnum}.{self._fext}')\n ofile(info, name=frnum)\n else:\n self._ofile(info, name=frnum)\n if self._flag_d:\n self._frame.append(packet)\n if self._ipv4:\n flag, data = ipv4_reassembly(packet, count=self._frnum)\n if flag:\n self._reasm[0](data)\n if self._ipv6:\n flag, data = ipv6_reassembly(packet, count=self._frnum)\n if flag:\n self._reasm[1](data)\n if self._tcp:\n flag, data = tcp_reassembly(packet, count=self._frnum)\n if flag:\n self._reasm[2](data)\n if self._flag_t:\n flag, data = tcp_traceflow(packet, count=self._frnum)\n if flag:\n self._trace(data)\n return packet\n", "role": "user" }, { "content": "scapy_read_frame", "role": "assistant" } ]
def x(self, dpkt): if self._exlyr != 'None' or self._exptl != 'null': warnings.warn( f"'Extractor(engine=dpkt)' does not support protocol and layer threshold; 'layer={self._exlyr}' and 'protocol={self._exptl}' ignored" , AttributeWarning, stacklevel=stacklevel()) self.record_header() self._ifile.seek(0, os.SEEK_SET) self._expkg = dpkt self._extmp = iter(dpkt.pcap.Reader(self._ifile)) self.record_frames()
run_dpkt
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, dpkt):\n if self._exlyr != 'None' or self._exptl != 'null':\n warnings.warn(\n f\"'Extractor(engine=dpkt)' does not support protocol and layer threshold; 'layer={self._exlyr}' and 'protocol={self._exptl}' ignored\"\n , AttributeWarning, stacklevel=stacklevel())\n self.record_header()\n self._ifile.seek(0, os.SEEK_SET)\n self._expkg = dpkt\n self._extmp = iter(dpkt.pcap.Reader(self._ifile))\n self.record_frames()\n", "role": "user" }, { "content": "run_dpkt", "role": "assistant" } ]
def x(self): from pcapkit.toolkit.dpkt import ipv4_reassembly, ipv6_reassembly, packet2chain, packet2dict, tcp_reassembly, tcp_traceflow timestamp, packet = next(self._extmp) if self._dlink.value == 1: packet = self._expkg.ethernet.Ethernet(packet) elif self._dlink.value == 228: packet = self._expkg.ip.IP(packet) elif self._dlink.value == 229: packet = self._expkg.ip6.IP6(packet) else: warnings.warn( 'unrecognised link layer protocol; all analysis functions ignored', DPKTWarning, stacklevel=stacklevel()) self._frnum += 1 if self._flag_d: self._frame.append(packet) return packet self._frnum += 1 self._proto = packet2chain(packet) if self._flag_v: print(f' - Frame {self._frnum:>3d}: {self._proto}') frnum = f'Frame {self._frnum}' if not self._flag_q: info = packet2dict(packet, timestamp, data_link=self._dlink) if self._flag_f: ofile = self._ofile(f'{self._ofnm}/{frnum}.{self._fext}') ofile(info, name=frnum) else: self._ofile(info, name=frnum) if self._flag_d: setattr(packet, 'packet2dict', packet2dict) setattr(packet, 'packet2chain', packet2chain) self._frame.append(packet) if self._ipv4: flag, data = ipv4_reassembly(packet, count=self._frnum) if flag: self._reasm[0](data) if self._ipv6: flag, data = ipv6_reassembly(packet, count=self._frnum) if flag: self._reasm[1](data) if self._tcp: flag, data = tcp_reassembly(packet, count=self._frnum) if flag: self._reasm[2](data) if self._flag_t: flag, data = tcp_traceflow(packet, timestamp, data_link=self._dlink, count=self._frnum) if flag: self._trace(data) return packet
dpkt_read_frame
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n from pcapkit.toolkit.dpkt import ipv4_reassembly, ipv6_reassembly, packet2chain, packet2dict, tcp_reassembly, tcp_traceflow\n timestamp, packet = next(self._extmp)\n if self._dlink.value == 1:\n packet = self._expkg.ethernet.Ethernet(packet)\n elif self._dlink.value == 228:\n packet = self._expkg.ip.IP(packet)\n elif self._dlink.value == 229:\n packet = self._expkg.ip6.IP6(packet)\n else:\n warnings.warn(\n 'unrecognised link layer protocol; all analysis functions ignored',\n DPKTWarning, stacklevel=stacklevel())\n self._frnum += 1\n if self._flag_d:\n self._frame.append(packet)\n return packet\n self._frnum += 1\n self._proto = packet2chain(packet)\n if self._flag_v:\n print(f' - Frame {self._frnum:>3d}: {self._proto}')\n frnum = f'Frame {self._frnum}'\n if not self._flag_q:\n info = packet2dict(packet, timestamp, data_link=self._dlink)\n if self._flag_f:\n ofile = self._ofile(f'{self._ofnm}/{frnum}.{self._fext}')\n ofile(info, name=frnum)\n else:\n self._ofile(info, name=frnum)\n if self._flag_d:\n setattr(packet, 'packet2dict', packet2dict)\n setattr(packet, 'packet2chain', packet2chain)\n self._frame.append(packet)\n if self._ipv4:\n flag, data = ipv4_reassembly(packet, count=self._frnum)\n if flag:\n self._reasm[0](data)\n if self._ipv6:\n flag, data = ipv6_reassembly(packet, count=self._frnum)\n if flag:\n self._reasm[1](data)\n if self._tcp:\n flag, data = tcp_reassembly(packet, count=self._frnum)\n if flag:\n self._reasm[2](data)\n if self._flag_t:\n flag, data = tcp_traceflow(packet, timestamp, data_link=self._dlink,\n count=self._frnum)\n if flag:\n self._trace(data)\n return packet\n", "role": "user" }, { "content": "dpkt_read_frame", "role": "assistant" } ]
def x(self, pyshark): if self._exlyr != 'None' or self._exptl != 'null': warnings.warn( f"'Extractor(engine=pyshark)' does not support protocol and layer threshold; 'layer={self._exlyr}' and 'protocol={self._exptl}' ignored" , AttributeWarning, stacklevel=stacklevel()) if self._ipv4 or self._ipv6 or self._tcp: self._ipv4 = self._ipv6 = self._tcp = False self._reasm = [None] * 3 warnings.warn( f"'Extractor(engine=pyshark)' object dose not support reassembly; so 'ipv4={self._ipv4}', 'ipv6={self._ipv6}' and 'tcp={self._tcp}' will be ignored" , AttributeWarning, stacklevel=stacklevel()) self._expkg = pyshark self._extmp = iter(pyshark.FileCapture(self._ifnm, keep_packets=False)) self.record_frames()
run_pyshark
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, pyshark):\n if self._exlyr != 'None' or self._exptl != 'null':\n warnings.warn(\n f\"'Extractor(engine=pyshark)' does not support protocol and layer threshold; 'layer={self._exlyr}' and 'protocol={self._exptl}' ignored\"\n , AttributeWarning, stacklevel=stacklevel())\n if self._ipv4 or self._ipv6 or self._tcp:\n self._ipv4 = self._ipv6 = self._tcp = False\n self._reasm = [None] * 3\n warnings.warn(\n f\"'Extractor(engine=pyshark)' object dose not support reassembly; so 'ipv4={self._ipv4}', 'ipv6={self._ipv6}' and 'tcp={self._tcp}' will be ignored\"\n , AttributeWarning, stacklevel=stacklevel())\n self._expkg = pyshark\n self._extmp = iter(pyshark.FileCapture(self._ifnm, keep_packets=False))\n self.record_frames()\n", "role": "user" }, { "content": "run_pyshark", "role": "assistant" } ]
def x(self): from pcapkit.toolkit.pyshark import packet2dict, tcp_traceflow packet = next(self._extmp) self._frnum = int(packet.number) self._proto = packet.frame_info.protocols if self._flag_v: print(f' - Frame {self._frnum:>3d}: {self._proto}') frnum = f'Frame {self._frnum}' if not self._flag_q: info = packet2dict(packet) if self._flag_f: ofile = self._ofile(f'{self._ofnm}/{frnum}.{self._fext}') ofile(info, name=frnum) else: self._ofile(info, name=frnum) if self._flag_d: setattr(packet, 'packet2dict', packet2dict) self._frame.append(packet) if self._flag_t: flag, data = tcp_traceflow(packet) if flag: self._trace(data) return packet
pyshark_read_frame
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n from pcapkit.toolkit.pyshark import packet2dict, tcp_traceflow\n packet = next(self._extmp)\n self._frnum = int(packet.number)\n self._proto = packet.frame_info.protocols\n if self._flag_v:\n print(f' - Frame {self._frnum:>3d}: {self._proto}')\n frnum = f'Frame {self._frnum}'\n if not self._flag_q:\n info = packet2dict(packet)\n if self._flag_f:\n ofile = self._ofile(f'{self._ofnm}/{frnum}.{self._fext}')\n ofile(info, name=frnum)\n else:\n self._ofile(info, name=frnum)\n if self._flag_d:\n setattr(packet, 'packet2dict', packet2dict)\n self._frame.append(packet)\n if self._flag_t:\n flag, data = tcp_traceflow(packet)\n if flag:\n self._trace(data)\n return packet\n", "role": "user" }, { "content": "pyshark_read_frame", "role": "assistant" } ]
def x(self, multiprocessing): if not self._flag_m: raise UnsupportedCall( f"Extractor(engine={self._exeng})' has no attribute '_run_pipline'" ) if not self._flag_q: self._flag_q = True warnings.warn( f"'Extractor(engine=pipeline)' does not support output; 'fout={self._ofnm}' ignored" , AttributeWarning, stacklevel=stacklevel()) self._frnum = 1 self._expkg = multiprocessing self._mpprc = list() self._mpfdp = collections.defaultdict(multiprocessing.Queue) self._mpmng = multiprocessing.Manager() self._mpkit = self._mpmng.Namespace() self._mpkit.counter = 0 self._mpkit.pool = 1 self._mpkit.current = 1 self._mpkit.eof = False self._mpkit.frames = dict() self._mpkit.trace = self._trace self._mpkit.reassembly = copy.deepcopy(self._reasm) self.record_header() self._mpfdp[0].put(self._gbhdr.length) while True: if self._mpkit.eof: self._update_eof() break if self._mpkit.pool and self._mpkit.counter < CPU_CNT: self._ifile.seek(self._mpfdp.pop(self._frnum - 1).get(), os. SEEK_SET) proc = multiprocessing.Process(target=self._pipeline_read_frame, kwargs={'mpkit': self._mpkit, 'mpfdp': self._mpfdp[self. _frnum]}) self._mpkit.pool -= 1 self._mpkit.counter += 1 proc.start() self._frnum += 1 self._mpprc.append(proc) if len(self._mpprc) >= CPU_CNT: [proc.join() for proc in self._mpprc[:-4]] del self._mpprc[:-4]
run_pipeline
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, multiprocessing):\n if not self._flag_m:\n raise UnsupportedCall(\n f\"Extractor(engine={self._exeng})' has no attribute '_run_pipline'\"\n )\n if not self._flag_q:\n self._flag_q = True\n warnings.warn(\n f\"'Extractor(engine=pipeline)' does not support output; 'fout={self._ofnm}' ignored\"\n , AttributeWarning, stacklevel=stacklevel())\n self._frnum = 1\n self._expkg = multiprocessing\n self._mpprc = list()\n self._mpfdp = collections.defaultdict(multiprocessing.Queue)\n self._mpmng = multiprocessing.Manager()\n self._mpkit = self._mpmng.Namespace()\n self._mpkit.counter = 0\n self._mpkit.pool = 1\n self._mpkit.current = 1\n self._mpkit.eof = False\n self._mpkit.frames = dict()\n self._mpkit.trace = self._trace\n self._mpkit.reassembly = copy.deepcopy(self._reasm)\n self.record_header()\n self._mpfdp[0].put(self._gbhdr.length)\n while True:\n if self._mpkit.eof:\n self._update_eof()\n break\n if self._mpkit.pool and self._mpkit.counter < CPU_CNT:\n self._ifile.seek(self._mpfdp.pop(self._frnum - 1).get(), os.\n SEEK_SET)\n proc = multiprocessing.Process(target=self._pipeline_read_frame,\n kwargs={'mpkit': self._mpkit, 'mpfdp': self._mpfdp[self.\n _frnum]})\n self._mpkit.pool -= 1\n self._mpkit.counter += 1\n proc.start()\n self._frnum += 1\n self._mpprc.append(proc)\n if len(self._mpprc) >= CPU_CNT:\n [proc.join() for proc in self._mpprc[:-4]]\n del self._mpprc[:-4]\n", "role": "user" }, { "content": "run_pipeline", "role": "assistant" } ]
def x(self, *, mpfdp, mpkit): if self._flag_e: raise EOFError def x(*, frame, mpkit): while mpkit.current != self._frnum: time.sleep(random.randint(0, datetime.datetime.now().second) // 600 ) self._trace = mpkit.trace self._reasm = mpkit.reassembly self._default_read_frame(frame=frame, mpkit=mpkit) mpkit.trace = copy.deepcopy(self._trace) mpkit.reassembly = copy.deepcopy(self._reasm) try: frame = Frame(self._ifile, num=self._frnum, proto=self._dlink, layer=self._exlyr, protocol=self._exptl, nanosecond=self._nnsec, mpkit=mpkit, mpfdp=mpfdp) _analyse_frame(frame=frame, mpkit=mpkit) except EOFError: mpkit.eof = True finally: mpkit.counter -= 1 self._ifile.close()
pipeline_read_frame
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, *, mpfdp, mpkit):\n if self._flag_e:\n raise EOFError\n\n def x(*, frame, mpkit):\n while mpkit.current != self._frnum:\n time.sleep(random.randint(0, datetime.datetime.now().second) // 600\n )\n self._trace = mpkit.trace\n self._reasm = mpkit.reassembly\n self._default_read_frame(frame=frame, mpkit=mpkit)\n mpkit.trace = copy.deepcopy(self._trace)\n mpkit.reassembly = copy.deepcopy(self._reasm)\n try:\n frame = Frame(self._ifile, num=self._frnum, proto=self._dlink,\n layer=self._exlyr, protocol=self._exptl, nanosecond=self._nnsec,\n mpkit=mpkit, mpfdp=mpfdp)\n _analyse_frame(frame=frame, mpkit=mpkit)\n except EOFError:\n mpkit.eof = True\n finally:\n mpkit.counter -= 1\n self._ifile.close()\n", "role": "user" }, { "content": "pipeline_read_frame", "role": "assistant" } ]
def x(self, multiprocessing): if not self._flag_m: raise UnsupportedCall( f"Extractor(engine={self._exeng})' has no attribute '_run_server'") if not self._flag_q: self._flag_q = True warnings.warn( f"'Extractor(engine=pipeline)' does not support output; 'fout={self._ofnm}' ignored" , AttributeWarning, stacklevel=stacklevel()) self._frnum = 1 self._expkg = multiprocessing self._mpsvc = NotImplemented self._mpprc = list() self._mpfdp = collections.defaultdict(multiprocessing.Queue) self._mpmng = multiprocessing.Manager() self._mpbuf = self._mpmng.dict() self._mpfrm = self._mpmng.list() self._mprsm = self._mpmng.list() self._mpkit = self._mpmng.Namespace() self._mpkit.counter = 0 self._mpkit.pool = 1 self._mpkit.eof = False self._mpkit.trace = None self.record_header() self._mpfdp[0].put(self._gbhdr.length) self._mpsvc = multiprocessing.Process(target=self._server_analyse_frame, kwargs={'mpfrm': self._mpfrm, 'mprsm': self._mprsm, 'mpbuf': self. _mpbuf, 'mpkit': self._mpkit}) self._mpsvc.start() while True: if self._mpkit.eof: self._update_eof() break if self._mpkit.pool and self._mpkit.counter < CPU_CNT - 1: self._ifile.seek(self._mpfdp.pop(self._frnum - 1).get(), os. SEEK_SET) proc = multiprocessing.Process(target=self. _server_extract_frame, kwargs={'mpkit': self._mpkit, 'mpbuf': self._mpbuf, 'mpfdp': self._mpfdp[self._frnum]}) self._mpkit.pool -= 1 self._mpkit.counter += 1 proc.start() self._frnum += 1 self._mpprc.append(proc) if len(self._mpprc) >= CPU_CNT - 1: [proc.join() for proc in self._mpprc[:-4]] del self._mpprc[:-4]
run_server
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, multiprocessing):\n if not self._flag_m:\n raise UnsupportedCall(\n f\"Extractor(engine={self._exeng})' has no attribute '_run_server'\")\n if not self._flag_q:\n self._flag_q = True\n warnings.warn(\n f\"'Extractor(engine=pipeline)' does not support output; 'fout={self._ofnm}' ignored\"\n , AttributeWarning, stacklevel=stacklevel())\n self._frnum = 1\n self._expkg = multiprocessing\n self._mpsvc = NotImplemented\n self._mpprc = list()\n self._mpfdp = collections.defaultdict(multiprocessing.Queue)\n self._mpmng = multiprocessing.Manager()\n self._mpbuf = self._mpmng.dict()\n self._mpfrm = self._mpmng.list()\n self._mprsm = self._mpmng.list()\n self._mpkit = self._mpmng.Namespace()\n self._mpkit.counter = 0\n self._mpkit.pool = 1\n self._mpkit.eof = False\n self._mpkit.trace = None\n self.record_header()\n self._mpfdp[0].put(self._gbhdr.length)\n self._mpsvc = multiprocessing.Process(target=self._server_analyse_frame,\n kwargs={'mpfrm': self._mpfrm, 'mprsm': self._mprsm, 'mpbuf': self.\n _mpbuf, 'mpkit': self._mpkit})\n self._mpsvc.start()\n while True:\n if self._mpkit.eof:\n self._update_eof()\n break\n if self._mpkit.pool and self._mpkit.counter < CPU_CNT - 1:\n self._ifile.seek(self._mpfdp.pop(self._frnum - 1).get(), os.\n SEEK_SET)\n proc = multiprocessing.Process(target=self.\n _server_extract_frame, kwargs={'mpkit': self._mpkit,\n 'mpbuf': self._mpbuf, 'mpfdp': self._mpfdp[self._frnum]})\n self._mpkit.pool -= 1\n self._mpkit.counter += 1\n proc.start()\n self._frnum += 1\n self._mpprc.append(proc)\n if len(self._mpprc) >= CPU_CNT - 1:\n [proc.join() for proc in self._mpprc[:-4]]\n del self._mpprc[:-4]\n", "role": "user" }, { "content": "run_server", "role": "assistant" } ]
def x(self, *, mpfdp, mpkit, mpbuf): if self._flag_e: raise EOFError try: frame = Frame(self._ifile, num=self._frnum, proto=self._dlink, layer=self._exlyr, protocol=self._exptl, nanosecond=self._nnsec, mpkit=mpkit, mpfdp=mpfdp) mpbuf[self._frnum] = frame except EOFError: mpbuf[self._frnum] = EOFError mpkit.eof = True finally: mpkit.counter -= 1 self._ifile.close()
server_extract_frame
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, *, mpfdp, mpkit, mpbuf):\n if self._flag_e:\n raise EOFError\n try:\n frame = Frame(self._ifile, num=self._frnum, proto=self._dlink,\n layer=self._exlyr, protocol=self._exptl, nanosecond=self._nnsec,\n mpkit=mpkit, mpfdp=mpfdp)\n mpbuf[self._frnum] = frame\n except EOFError:\n mpbuf[self._frnum] = EOFError\n mpkit.eof = True\n finally:\n mpkit.counter -= 1\n self._ifile.close()\n", "role": "user" }, { "content": "server_extract_frame", "role": "assistant" } ]
def x(self, *, mpkit, mpfrm, mprsm, mpbuf): while True: frame = mpbuf.pop(self._frnum, None) if frame is EOFError: break if frame is None: continue self._default_read_frame(frame=frame) mpfrm += self._frame mprsm += self._reasm mpkit.trace = copy.deepcopy(self._trace)
server_analyse_frame
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, *, mpkit, mpfrm, mprsm, mpbuf):\n while True:\n frame = mpbuf.pop(self._frnum, None)\n if frame is EOFError:\n break\n if frame is None:\n continue\n self._default_read_frame(frame=frame)\n mpfrm += self._frame\n mprsm += self._reasm\n mpkit.trace = copy.deepcopy(self._trace)\n", "role": "user" }, { "content": "server_analyse_frame", "role": "assistant" } ]
def x(key, default=-1): if isinstance(key, int): return Checksum(key) if key not in Checksum._member_map_: extend_enum(Checksum, key, default) return Checksum[key]
get
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(key, default=-1):\n if isinstance(key, int):\n return Checksum(key)\n if key not in Checksum._member_map_:\n extend_enum(Checksum, key, default)\n return Checksum[key]\n", "role": "user" }, { "content": "get", "role": "assistant" } ]
def x(key, default=-1): if isinstance(key, int): return Operation(key) if key not in Operation._member_map_: extend_enum(Operation, key, default) return Operation[key]
get
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(key, default=-1):\n if isinstance(key, int):\n return Operation(key)\n if key not in Operation._member_map_:\n extend_enum(Operation, key, default)\n return Operation[key]\n", "role": "user" }, { "content": "get", "role": "assistant" } ]
def x(self, length): _plen = self._read_binary(3) _type = self._read_unpack(1) _flag = self._read_binary(1) _stid = self._read_binary(4)
read_http
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, length):\n _plen = self._read_binary(3)\n _type = self._read_unpack(1)\n _flag = self._read_binary(1)\n _stid = self._read_binary(4)\n", "role": "user" }, { "content": "read_http", "role": "assistant" } ]
def x(file, length=None, *, _termination=False): seekset = file.tell() if not _termination: flag, ftp = _analyse_ftp(file, length, seekset=seekset) if flag: return ftp flag, http = _analyse_httpv1(file, length, seekset=seekset) if flag: return http flag, http = _analyse_httpv2(file, length, seekset=seekset) if flag: return http file.seek(seekset, os.SEEK_SET) return Raw(file, length)
analyse
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(file, length=None, *, _termination=False):\n seekset = file.tell()\n if not _termination:\n flag, ftp = _analyse_ftp(file, length, seekset=seekset)\n if flag:\n return ftp\n flag, http = _analyse_httpv1(file, length, seekset=seekset)\n if flag:\n return http\n flag, http = _analyse_httpv2(file, length, seekset=seekset)\n if flag:\n return http\n file.seek(seekset, os.SEEK_SET)\n return Raw(file, length)\n", "role": "user" }, { "content": "analyse", "role": "assistant" } ]
def x(key, default=-1): if isinstance(key, int): return Routing(key) if key not in Routing._member_map_: extend_enum(Routing, key, default) return Routing[key]
get
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(key, default=-1):\n if isinstance(key, int):\n return Routing(key)\n if key not in Routing._member_map_:\n extend_enum(Routing, key, default)\n return Routing[key]\n", "role": "user" }, { "content": "get", "role": "assistant" } ]
def x(self, size): _byte = self._read_unpack(size) _prot = ETHERTYPE.get(_byte) return _prot
read_protos
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, size):\n _byte = self._read_unpack(size)\n _prot = ETHERTYPE.get(_byte)\n return _prot\n", "role": "user" }, { "content": "read_protos", "role": "assistant" } ]
def x(self, proto, length): if length == 0: from pcapkit.protocols.null import NoPayload as Protocol elif self._sigterm: from pcapkit.protocols.raw import Raw as Protocol elif proto == 2054: from pcapkit.protocols.link.arp import ARP as Protocol elif proto == 32821: from pcapkit.protocols.link.rarp import RARP as Protocol elif proto == 33024: from pcapkit.protocols.link.vlan import VLAN as Protocol elif proto == 2048: from pcapkit.protocols.internet.ipv4 import IPv4 as Protocol elif proto == 34525: from pcapkit.protocols.internet.ipv6 import IPv6 as Protocol elif proto == 33079: from pcapkit.protocols.internet.ipx import IPX as Protocol else: from pcapkit.protocols.raw import Raw as Protocol next_ = Protocol(self._file, length, error=self._onerror, layer=self. _exlayer, protocol=self._exproto) return next_
import_next_layer
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, proto, length):\n if length == 0:\n from pcapkit.protocols.null import NoPayload as Protocol\n elif self._sigterm:\n from pcapkit.protocols.raw import Raw as Protocol\n elif proto == 2054:\n from pcapkit.protocols.link.arp import ARP as Protocol\n elif proto == 32821:\n from pcapkit.protocols.link.rarp import RARP as Protocol\n elif proto == 33024:\n from pcapkit.protocols.link.vlan import VLAN as Protocol\n elif proto == 2048:\n from pcapkit.protocols.internet.ipv4 import IPv4 as Protocol\n elif proto == 34525:\n from pcapkit.protocols.internet.ipv6 import IPv6 as Protocol\n elif proto == 33079:\n from pcapkit.protocols.internet.ipx import IPX as Protocol\n else:\n from pcapkit.protocols.raw import Raw as Protocol\n next_ = Protocol(self._file, length, error=self._onerror, layer=self.\n _exlayer, protocol=self._exproto)\n return next_\n", "role": "user" }, { "content": "import_next_layer", "role": "assistant" } ]
def x(key, default=-1): if isinstance(key, int): return HIT_Suite(key) if key not in HIT_Suite._member_map_: extend_enum(HIT_Suite, key, default) return HIT_Suite[key]
get
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(key, default=-1):\n if isinstance(key, int):\n return HIT_Suite(key)\n if key not in HIT_Suite._member_map_:\n extend_enum(HIT_Suite, key, default)\n return HIT_Suite[key]\n", "role": "user" }, { "content": "get", "role": "assistant" } ]
def x(key, default=-1): if isinstance(key, int): return Authentication(key) if key not in Authentication._member_map_: extend_enum(Authentication, key, default) return Authentication[key]
get
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(key, default=-1):\n if isinstance(key, int):\n return Authentication(key)\n if key not in Authentication._member_map_:\n extend_enum(Authentication, key, default)\n return Authentication[key]\n", "role": "user" }, { "content": "get", "role": "assistant" } ]
def x(fout='./tmp', fmt='pcap'): if fmt == 'pcap': from pcapkit.dumpkit import PCAP as output elif fmt == 'plist': from dictdumper import PLIST as output elif fmt == 'json': from dictdumper import JSON as output elif fmt == 'tree': from dictdumper import Tree as output fmt = 'txt' elif fmt == 'html': from dictdumper import JavaScript as output fmt = 'js' elif fmt == 'xml': from dictdumper import XML as output else: from pcapkit.dumpkit import NotImplementedIO as output if fmt is not None: warnings.warn( f'Unsupported output format: {fmt}; disabled file output feature' , FormatWarning, stacklevel=stacklevel()) return output, '' try: pathlib.Path(fout).mkdir(parents=True, exist_ok=True) except FileExistsError as error: if fmt is None: warnings.warn(error.strerror, FileWarning, stacklevel=stacklevel()) else: raise FileExists(*error.args) from None return output, fmt
make_fout
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(fout='./tmp', fmt='pcap'):\n if fmt == 'pcap':\n from pcapkit.dumpkit import PCAP as output\n elif fmt == 'plist':\n from dictdumper import PLIST as output\n elif fmt == 'json':\n from dictdumper import JSON as output\n elif fmt == 'tree':\n from dictdumper import Tree as output\n fmt = 'txt'\n elif fmt == 'html':\n from dictdumper import JavaScript as output\n fmt = 'js'\n elif fmt == 'xml':\n from dictdumper import XML as output\n else:\n from pcapkit.dumpkit import NotImplementedIO as output\n if fmt is not None:\n warnings.warn(\n f'Unsupported output format: {fmt}; disabled file output feature'\n , FormatWarning, stacklevel=stacklevel())\n return output, ''\n try:\n pathlib.Path(fout).mkdir(parents=True, exist_ok=True)\n except FileExistsError as error:\n if fmt is None:\n warnings.warn(error.strerror, FileWarning, stacklevel=stacklevel())\n else:\n raise FileExists(*error.args) from None\n return output, fmt\n", "role": "user" }, { "content": "make_fout", "role": "assistant" } ]
def x(self, packet): output = self.trace(packet, _check=False, _output=True) output(packet['frame'], name=f"Frame {packet['index']}", byteorder=self ._endian, nanosecond=self._nnsecd)
dump
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, packet):\n output = self.trace(packet, _check=False, _output=True)\n output(packet['frame'], name=f\"Frame {packet['index']}\", byteorder=self\n ._endian, nanosecond=self._nnsecd)\n", "role": "user" }, { "content": "dump", "role": "assistant" } ]
def x(self, packet, *, _check=True, _output=False): self._newflg = True if _check: pkt_check(packet) info = Info(packet) BUFID = tuple(sorted([str(info.src), str(info.srcport), str(info.dst), str(info.dstport)])) FIN = info.fin if BUFID not in self._buffer: label = ( f'{info.src}_{info.srcport}-{info.dst}_{info.dstport}-{info.timestamp}' ) self._buffer[BUFID] = dict(fpout=self._foutio( f'{self._fproot}/{label}.{self._fdpext}', protocol=info. protocol), index=list(), label=label) self._buffer[BUFID]['index'].append(info.index) fpout = self._buffer[BUFID]['fpout'] label = self._buffer[BUFID]['label'] if FIN: buf = self._buffer.pop(BUFID) if self._fdpext: buf['fpout'] = f'{self._fproot}/{label}.{self._fdpext}' else: del buf['fpout'] buf['index'] = tuple(buf['index']) self._stream.append(Info(buf)) return fpout if _output else label
trace
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, packet, *, _check=True, _output=False):\n self._newflg = True\n if _check:\n pkt_check(packet)\n info = Info(packet)\n BUFID = tuple(sorted([str(info.src), str(info.srcport), str(info.dst),\n str(info.dstport)]))\n FIN = info.fin\n if BUFID not in self._buffer:\n label = (\n f'{info.src}_{info.srcport}-{info.dst}_{info.dstport}-{info.timestamp}'\n )\n self._buffer[BUFID] = dict(fpout=self._foutio(\n f'{self._fproot}/{label}.{self._fdpext}', protocol=info.\n protocol), index=list(), label=label)\n self._buffer[BUFID]['index'].append(info.index)\n fpout = self._buffer[BUFID]['fpout']\n label = self._buffer[BUFID]['label']\n if FIN:\n buf = self._buffer.pop(BUFID)\n if self._fdpext:\n buf['fpout'] = f'{self._fproot}/{label}.{self._fdpext}'\n else:\n del buf['fpout']\n buf['index'] = tuple(buf['index'])\n self._stream.append(Info(buf))\n return fpout if _output else label\n", "role": "user" }, { "content": "trace", "role": "assistant" } ]
def x(self): self._newflg = False ret = list() for buf in self._buffer.values(): buf = copy.deepcopy(buf) if self._fdpext: buf['fpout'] = f"{self._fproot}/{buf['label']}.{self._fdpext}" else: del buf['fpout'] buf['index'] = tuple(buf['index']) ret.append(Info(buf)) ret += self._stream return tuple(ret)
submit
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n self._newflg = False\n ret = list()\n for buf in self._buffer.values():\n buf = copy.deepcopy(buf)\n if self._fdpext:\n buf['fpout'] = f\"{self._fproot}/{buf['label']}.{self._fdpext}\"\n else:\n del buf['fpout']\n buf['index'] = tuple(buf['index'])\n ret.append(Info(buf))\n ret += self._stream\n return tuple(ret)\n", "role": "user" }, { "content": "submit", "role": "assistant" } ]
def x(self, length, version, extension): if length is None: length = len(self) _next = self._read_protos(1) _plen = self._read_unpack(1) _resv = self._read_fileng(2) _scpi = self._read_unpack(4) _dsnf = self._read_unpack(4) _tlen = _plen * 4 - 2 _vlen = _tlen - 12 _chkv = self._read_fileng(_vlen) ah = dict(next=_next, length=_tlen, spi=_scpi, seq=_dsnf, icv=_chkv) if version == 6: _plen = 8 - _tlen % 8 elif version == 4: _plen = 4 - _tlen % 4 else: raise VersionError(f'Unknown IP version {version}') if _plen: padding = self._read_binary(_plen) if any(int(bit, base=2) for bit in padding): raise ProtocolError(f'{self.alias}: invalid format') length -= ah['length'] ah['packet'] = self._read_packet(header=ah['length'], payload=length) if extension: self._protos = None return ah return self._decode_next_layer(ah, _next, length)
read_ah
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, length, version, extension):\n if length is None:\n length = len(self)\n _next = self._read_protos(1)\n _plen = self._read_unpack(1)\n _resv = self._read_fileng(2)\n _scpi = self._read_unpack(4)\n _dsnf = self._read_unpack(4)\n _tlen = _plen * 4 - 2\n _vlen = _tlen - 12\n _chkv = self._read_fileng(_vlen)\n ah = dict(next=_next, length=_tlen, spi=_scpi, seq=_dsnf, icv=_chkv)\n if version == 6:\n _plen = 8 - _tlen % 8\n elif version == 4:\n _plen = 4 - _tlen % 4\n else:\n raise VersionError(f'Unknown IP version {version}')\n if _plen:\n padding = self._read_binary(_plen)\n if any(int(bit, base=2) for bit in padding):\n raise ProtocolError(f'{self.alias}: invalid format')\n length -= ah['length']\n ah['packet'] = self._read_packet(header=ah['length'], payload=length)\n if extension:\n self._protos = None\n return ah\n return self._decode_next_layer(ah, _next, length)\n", "role": "user" }, { "content": "read_ah", "role": "assistant" } ]
def x(self, length): if length is None: length = len(self) _dstm = self._read_mac_addr() _srcm = self._read_mac_addr() _type = self._read_protos(2) ethernet = dict(dst=_dstm, src=_srcm, type=_type) length -= 14 ethernet['packet'] = self._read_packet(header=14, payload=length) return self._decode_next_layer(ethernet, _type, length)
read_ethernet
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, length):\n if length is None:\n length = len(self)\n _dstm = self._read_mac_addr()\n _srcm = self._read_mac_addr()\n _type = self._read_protos(2)\n ethernet = dict(dst=_dstm, src=_srcm, type=_type)\n length -= 14\n ethernet['packet'] = self._read_packet(header=14, payload=length)\n return self._decode_next_layer(ethernet, _type, length)\n", "role": "user" }, { "content": "read_ethernet", "role": "assistant" } ]
def x(self): _byte = self._read_fileng(6) _addr = '-'.join(textwrap.wrap(_byte.hex(), 2)) return _addr
read_mac_addr
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self):\n _byte = self._read_fileng(6)\n _addr = '-'.join(textwrap.wrap(_byte.hex(), 2))\n return _addr\n", "role": "user" }, { "content": "read_mac_addr", "role": "assistant" } ]
def x(key, default=-1): if isinstance(key, int): return Suite(key) if key not in Suite._member_map_: extend_enum(Suite, key, default) return Suite[key]
get
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(key, default=-1):\n if isinstance(key, int):\n return Suite(key)\n if key not in Suite._member_map_:\n extend_enum(Suite, key, default)\n return Suite[key]\n", "role": "user" }, { "content": "get", "role": "assistant" } ]
def x(key, default=-1): if isinstance(key, int): return ECDSA_Curve(key) if key not in ECDSA_Curve._member_map_: extend_enum(ECDSA_Curve, key, default) return ECDSA_Curve[key]
get
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(key, default=-1):\n if isinstance(key, int):\n return ECDSA_Curve(key)\n if key not in ECDSA_Curve._member_map_:\n extend_enum(ECDSA_Curve, key, default)\n return ECDSA_Curve[key]\n", "role": "user" }, { "content": "get", "role": "assistant" } ]
def x(packet): dict_ = dict() frame = packet.frame_info for field in frame.field_names: dict_[field] = getattr(frame, field) tempdict = dict_ for layer in packet.layers: tempdict[layer.layer_name.upper()] = dict() tempdict = tempdict[layer.layer_name.upper()] for field in layer.field_names: tempdict[field] = getattr(layer, field) return dict_
packet2dict
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(packet):\n dict_ = dict()\n frame = packet.frame_info\n for field in frame.field_names:\n dict_[field] = getattr(frame, field)\n tempdict = dict_\n for layer in packet.layers:\n tempdict[layer.layer_name.upper()] = dict()\n tempdict = tempdict[layer.layer_name.upper()]\n for field in layer.field_names:\n tempdict[field] = getattr(layer, field)\n return dict_\n", "role": "user" }, { "content": "packet2dict", "role": "assistant" } ]
def x(packet): if 'TCP' in packet: ip = packet.ip if 'IP' in packet else packet.ipv6 tcp = packet.tcp data = dict(protocol=LINKTYPE.get(packet.layers[0].layer_name.upper ()), index=int(packet.number), frame=packet2dict(packet), syn= bool(int(tcp.flags_syn)), fin=bool(int(tcp.flags_fin)), src= ipaddress.ip_address(ip.src), dst=ipaddress.ip_address(ip.dst), srcport=int(tcp.srcport), dstport=int(tcp.dstport), timestamp= packet.frame_info.time_epoch) return True, data return False, None
tcp_traceflow
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(packet):\n if 'TCP' in packet:\n ip = packet.ip if 'IP' in packet else packet.ipv6\n tcp = packet.tcp\n data = dict(protocol=LINKTYPE.get(packet.layers[0].layer_name.upper\n ()), index=int(packet.number), frame=packet2dict(packet), syn=\n bool(int(tcp.flags_syn)), fin=bool(int(tcp.flags_fin)), src=\n ipaddress.ip_address(ip.src), dst=ipaddress.ip_address(ip.dst),\n srcport=int(tcp.srcport), dstport=int(tcp.dstport), timestamp=\n packet.frame_info.time_epoch)\n return True, data\n return False, None\n", "role": "user" }, { "content": "tcp_traceflow", "role": "assistant" } ]
def x(self, info): BUFID = info.bufid DSN = info.dsn ACK = info.ack FIN = info.fin RST = info.rst SYN = info.syn if SYN and BUFID in self._buffer: self._dtgram += self.submit(self._buffer[BUFID], bufid=BUFID) del self._buffer[BUFID] if BUFID not in self._buffer: self._buffer[BUFID] = {'hdl': [Info(first=info.len, last=sys. maxsize)], ACK: dict(ind=[info.num], isn=info.dsn, len=info.len, raw=info.payload)} else: if ACK not in self._buffer[BUFID]: self._buffer[BUFID][ACK] = dict(ind=[info.num], isn=info.dsn, len=info.len, raw=info.payload) else: self._buffer[BUFID][ACK]['ind'].append(info.num) ISN = self._buffer[BUFID][ACK]['isn'] RAW = self._buffer[BUFID][ACK]['raw'] if DSN >= ISN: LEN = self._buffer[BUFID][ACK]['len'] GAP = DSN - (ISN + LEN) if GAP >= 0: RAW += bytearray(GAP) + info.payload else: RAW[DSN - ISN:] = info.payload else: LEN = info.len GAP = ISN - (DSN + LEN) self._buffer[BUFID][ACK]['isn'] = DSN if GAP >= 0: RAW = info.payload + bytearray(GAP) + RAW else: RAW = info.payload + RAW[ISN - GAP:] self._buffer[BUFID][ACK]['raw'] = RAW self._buffer[BUFID][ACK]['len'] = len(RAW) HDL = self._buffer[BUFID]['hdl'] for index, hole in enumerate(HDL): if info.first > hole.last: continue if info.last < hole.first: continue del HDL[index] if info.first > hole.first: new_hole = Info(first=hole.first, last=info.first - 1) HDL.insert(index, new_hole) index += 1 if info.last < hole.last and not FIN and not RST: new_hole = Info(first=info.last + 1, last=hole.last) HDL.insert(index, new_hole) break self._buffer[BUFID]['hdl'] = HDL if FIN or RST: self._dtgram += self.submit(self._buffer[BUFID], bufid=BUFID) del self._buffer[BUFID]
reassembly
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, info):\n BUFID = info.bufid\n DSN = info.dsn\n ACK = info.ack\n FIN = info.fin\n RST = info.rst\n SYN = info.syn\n if SYN and BUFID in self._buffer:\n self._dtgram += self.submit(self._buffer[BUFID], bufid=BUFID)\n del self._buffer[BUFID]\n if BUFID not in self._buffer:\n self._buffer[BUFID] = {'hdl': [Info(first=info.len, last=sys.\n maxsize)], ACK: dict(ind=[info.num], isn=info.dsn, len=info.len,\n raw=info.payload)}\n else:\n if ACK not in self._buffer[BUFID]:\n self._buffer[BUFID][ACK] = dict(ind=[info.num], isn=info.dsn,\n len=info.len, raw=info.payload)\n else:\n self._buffer[BUFID][ACK]['ind'].append(info.num)\n ISN = self._buffer[BUFID][ACK]['isn']\n RAW = self._buffer[BUFID][ACK]['raw']\n if DSN >= ISN:\n LEN = self._buffer[BUFID][ACK]['len']\n GAP = DSN - (ISN + LEN)\n if GAP >= 0:\n RAW += bytearray(GAP) + info.payload\n else:\n RAW[DSN - ISN:] = info.payload\n else:\n LEN = info.len\n GAP = ISN - (DSN + LEN)\n self._buffer[BUFID][ACK]['isn'] = DSN\n if GAP >= 0:\n RAW = info.payload + bytearray(GAP) + RAW\n else:\n RAW = info.payload + RAW[ISN - GAP:]\n self._buffer[BUFID][ACK]['raw'] = RAW\n self._buffer[BUFID][ACK]['len'] = len(RAW)\n HDL = self._buffer[BUFID]['hdl']\n for index, hole in enumerate(HDL):\n if info.first > hole.last:\n continue\n if info.last < hole.first:\n continue\n del HDL[index]\n if info.first > hole.first:\n new_hole = Info(first=hole.first, last=info.first - 1)\n HDL.insert(index, new_hole)\n index += 1\n if info.last < hole.last and not FIN and not RST:\n new_hole = Info(first=info.last + 1, last=hole.last)\n HDL.insert(index, new_hole)\n break\n self._buffer[BUFID]['hdl'] = HDL\n if FIN or RST:\n self._dtgram += self.submit(self._buffer[BUFID], bufid=BUFID)\n del self._buffer[BUFID]\n", "role": "user" }, { "content": "reassembly", "role": "assistant" } ]
def x(self, buf, *, bufid): datagram = [] HDL = buf.pop('hdl') for ack, buffer in buf.items(): if len(HDL) > 2 and self._strflg: data = [] start = stop = 0 for hole in HDL: stop = hole.first byte = buffer['raw'][start:stop] start = hole.last if byte: data.append(byte) byte = buffer['raw'][start:] if byte: data.append(byte) if data: packet = Info(NotImplemented=True, id=Info(src=(bufid[0], bufid[2]), dst=(bufid[1], bufid[3]), ack=ack), index= tuple(buffer['ind']), payload=tuple(data) or None, packets=tuple(analyse(io.BytesIO(frag), len(frag)) for frag in data)) datagram.append(packet) else: data = buffer['raw'] if data: packet = Info(NotImplemented=False, id=Info(src=(bufid[0], bufid[2]), dst=(bufid[1], bufid[3]), ack=ack), index= tuple(buffer['ind']), payload=bytes(data) or None, packets=(analyse(io.BytesIO(data), len(data)),)) datagram.append(packet) return datagram
submit
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, buf, *, bufid):\n datagram = []\n HDL = buf.pop('hdl')\n for ack, buffer in buf.items():\n if len(HDL) > 2 and self._strflg:\n data = []\n start = stop = 0\n for hole in HDL:\n stop = hole.first\n byte = buffer['raw'][start:stop]\n start = hole.last\n if byte:\n data.append(byte)\n byte = buffer['raw'][start:]\n if byte:\n data.append(byte)\n if data:\n packet = Info(NotImplemented=True, id=Info(src=(bufid[0],\n bufid[2]), dst=(bufid[1], bufid[3]), ack=ack), index=\n tuple(buffer['ind']), payload=tuple(data) or None,\n packets=tuple(analyse(io.BytesIO(frag), len(frag)) for\n frag in data))\n datagram.append(packet)\n else:\n data = buffer['raw']\n if data:\n packet = Info(NotImplemented=False, id=Info(src=(bufid[0],\n bufid[2]), dst=(bufid[1], bufid[3]), ack=ack), index=\n tuple(buffer['ind']), payload=bytes(data) or None,\n packets=(analyse(io.BytesIO(data), len(data)),))\n datagram.append(packet)\n return datagram\n", "role": "user" }, { "content": "submit", "role": "assistant" } ]
def x(packet): if scapy_all is None: raise ModuleNotFound("No module named 'scapy'", name='scapy') chain = [packet.name] payload = packet.payload while not isinstance(payload, scapy_all.packet.NoPayload): chain.append(payload.name) payload = payload.payload return ':'.join(chain)
packet2chain
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(packet):\n if scapy_all is None:\n raise ModuleNotFound(\"No module named 'scapy'\", name='scapy')\n chain = [packet.name]\n payload = packet.payload\n while not isinstance(payload, scapy_all.packet.NoPayload):\n chain.append(payload.name)\n payload = payload.payload\n return ':'.join(chain)\n", "role": "user" }, { "content": "packet2chain", "role": "assistant" } ]
def x(packet, *, count=NotImplemented): if scapy_all is None: raise ModuleNotFound("No module named 'scapy'", name='scapy') def x(packet): dict_ = packet.fields payload = packet.payload if not isinstance(payload, scapy_all.packet.NoPayload): dict_[payload.name] = wrapper(payload) return dict_ return {'packet': bytes(packet), packet.name: wrapper(packet)}
packet2dict
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(packet, *, count=NotImplemented):\n if scapy_all is None:\n raise ModuleNotFound(\"No module named 'scapy'\", name='scapy')\n\n def x(packet):\n dict_ = packet.fields\n payload = packet.payload\n if not isinstance(payload, scapy_all.packet.NoPayload):\n dict_[payload.name] = wrapper(payload)\n return dict_\n return {'packet': bytes(packet), packet.name: wrapper(packet)}\n", "role": "user" }, { "content": "packet2dict", "role": "assistant" } ]
def x(packet, *, count=NotImplemented): if 'IP' in packet: ipv4 = packet['IP'] if ipv4.flags.DF: return False, None data = dict(bufid=(ipaddress.ip_address(ipv4.src), ipaddress. ip_address(ipv4.dst), ipv4.id, TP_PROTO.get(ipv4.proto).name), num=count, fo=ipv4.frag, ihl=ipv4.ihl, mf=bool(ipv4.flags.MF), tl=ipv4.len, header=bytearray(ipv4.raw_packet_cache), payload= bytearray(bytes(ipv4.payload))) return True, data return False, None
ipv4_reassembly
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(packet, *, count=NotImplemented):\n if 'IP' in packet:\n ipv4 = packet['IP']\n if ipv4.flags.DF:\n return False, None\n data = dict(bufid=(ipaddress.ip_address(ipv4.src), ipaddress.\n ip_address(ipv4.dst), ipv4.id, TP_PROTO.get(ipv4.proto).name),\n num=count, fo=ipv4.frag, ihl=ipv4.ihl, mf=bool(ipv4.flags.MF),\n tl=ipv4.len, header=bytearray(ipv4.raw_packet_cache), payload=\n bytearray(bytes(ipv4.payload)))\n return True, data\n return False, None\n", "role": "user" }, { "content": "ipv4_reassembly", "role": "assistant" } ]
def x(packet, *, count=NotImplemented): if scapy_all is None: raise ModuleNotFound("No module named 'scapy'", name='scapy') if 'IPv6' in packet: ipv6 = packet['IPv6'] if scapy_all.IPv6ExtHdrFragment not in ipv6: return False, None ipv6_frag = ipv6['IPv6ExtHdrFragment'] data = dict(bufid=(ipaddress.ip_address(ipv6.src), ipaddress. ip_address(ipv6.dst), ipv6.fl, TP_PROTO.get(ipv6_frag.nh).name), num=count, fo=ipv6_frag.offset, ihl=len(ipv6) - len(ipv6_frag), mf=bool(ipv6_frag.m), tl=len(ipv6), header=bytearray(bytes(ipv6 )[:-len(ipv6_frag)]), payload=bytearray(bytes(ipv6_frag.payload))) return True, data return False, None
ipv6_reassembly
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(packet, *, count=NotImplemented):\n if scapy_all is None:\n raise ModuleNotFound(\"No module named 'scapy'\", name='scapy')\n if 'IPv6' in packet:\n ipv6 = packet['IPv6']\n if scapy_all.IPv6ExtHdrFragment not in ipv6:\n return False, None\n ipv6_frag = ipv6['IPv6ExtHdrFragment']\n data = dict(bufid=(ipaddress.ip_address(ipv6.src), ipaddress.\n ip_address(ipv6.dst), ipv6.fl, TP_PROTO.get(ipv6_frag.nh).name),\n num=count, fo=ipv6_frag.offset, ihl=len(ipv6) - len(ipv6_frag),\n mf=bool(ipv6_frag.m), tl=len(ipv6), header=bytearray(bytes(ipv6\n )[:-len(ipv6_frag)]), payload=bytearray(bytes(ipv6_frag.payload)))\n return True, data\n return False, None\n", "role": "user" }, { "content": "ipv6_reassembly", "role": "assistant" } ]
def x(packet, *, count=NotImplemented): if 'TCP' in packet: ip = packet['IP'] if 'IP' in packet else packet['IPv6'] tcp = packet['TCP'] data = dict(bufid=(ipaddress.ip_address(ip.src), ipaddress. ip_address(ip.dst), tcp.sport, tcp.dport), num=count, ack=tcp. ack, dsn=tcp.seq, syn=bool(tcp.flags.S), fin=bool(tcp.flags.F), rst=bool(tcp.flags.R), payload=bytearray(bytes(tcp.payload))) raw_len = len(tcp.payload) data['first'] = tcp.seq data['last'] = tcp.seq + raw_len data['len'] = raw_len return True, data return False, None
tcp_reassembly
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(packet, *, count=NotImplemented):\n if 'TCP' in packet:\n ip = packet['IP'] if 'IP' in packet else packet['IPv6']\n tcp = packet['TCP']\n data = dict(bufid=(ipaddress.ip_address(ip.src), ipaddress.\n ip_address(ip.dst), tcp.sport, tcp.dport), num=count, ack=tcp.\n ack, dsn=tcp.seq, syn=bool(tcp.flags.S), fin=bool(tcp.flags.F),\n rst=bool(tcp.flags.R), payload=bytearray(bytes(tcp.payload)))\n raw_len = len(tcp.payload)\n data['first'] = tcp.seq\n data['last'] = tcp.seq + raw_len\n data['len'] = raw_len\n return True, data\n return False, None\n", "role": "user" }, { "content": "tcp_reassembly", "role": "assistant" } ]
def x(packet, *, count=NotImplemented): if 'TCP' in packet: ip = packet['IP'] if 'IP' in packet else packet['IPv6'] tcp = packet['TCP'] data = dict(protocol=LINKTYPE.get(packet.name.upper()), index=count, frame=packet2dict(packet), syn=bool(tcp.flags.S), fin=bool(tcp. flags.F), src=ipaddress.ip_address(ip.src), dst=ipaddress. ip_address(ip.dst), srcport=tcp.sport, dstport=tcp.dport, timestamp=time.time()) return True, data return False, None
tcp_traceflow
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(packet, *, count=NotImplemented):\n if 'TCP' in packet:\n ip = packet['IP'] if 'IP' in packet else packet['IPv6']\n tcp = packet['TCP']\n data = dict(protocol=LINKTYPE.get(packet.name.upper()), index=count,\n frame=packet2dict(packet), syn=bool(tcp.flags.S), fin=bool(tcp.\n flags.F), src=ipaddress.ip_address(ip.src), dst=ipaddress.\n ip_address(ip.dst), srcport=tcp.sport, dstport=tcp.dport,\n timestamp=time.time())\n return True, data\n return False, None\n", "role": "user" }, { "content": "tcp_traceflow", "role": "assistant" } ]
def x(self, length, extension): if length is None: length = len(self) _next = self._read_protos(1) _hlen = self._read_unpack(1) hopopt = dict(next=_next, length=(_hlen + 1) * 8) options = self._read_hopopt_options(_hlen * 8 + 6) hopopt['options'] = options[0] hopopt.update(options[1]) length -= hopopt['length'] hopopt['packet'] = self._read_packet(header=hopopt['length'], payload= length) if extension: self._protos = None return hopopt return self._decode_next_layer(hopopt, _next, length)
read_hopopt
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, length, extension):\n if length is None:\n length = len(self)\n _next = self._read_protos(1)\n _hlen = self._read_unpack(1)\n hopopt = dict(next=_next, length=(_hlen + 1) * 8)\n options = self._read_hopopt_options(_hlen * 8 + 6)\n hopopt['options'] = options[0]\n hopopt.update(options[1])\n length -= hopopt['length']\n hopopt['packet'] = self._read_packet(header=hopopt['length'], payload=\n length)\n if extension:\n self._protos = None\n return hopopt\n return self._decode_next_layer(hopopt, _next, length)\n", "role": "user" }, { "content": "read_hopopt", "role": "assistant" } ]
def x(self, length): counter = 0 optkind = list() options = dict() while counter < length: code = self._read_unpack(1) if not code: break abbr, desc = _HOPOPT_OPT.get(code, ('none', 'Unassigned')) data = _HOPOPT_PROC(abbr)(self, code, desc=desc) enum = _OPT_TYPE.get(code) counter += data['length'] if enum in optkind: if isinstance(options[abbr], tuple): options[abbr] += Info(data), else: options[abbr] = Info(options[abbr]), Info(data) else: optkind.append(enum) options[abbr] = data if counter != length: raise ProtocolError(f'{self.alias}: invalid format') return tuple(optkind), options
read_hopopt_options
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, length):\n counter = 0\n optkind = list()\n options = dict()\n while counter < length:\n code = self._read_unpack(1)\n if not code:\n break\n abbr, desc = _HOPOPT_OPT.get(code, ('none', 'Unassigned'))\n data = _HOPOPT_PROC(abbr)(self, code, desc=desc)\n enum = _OPT_TYPE.get(code)\n counter += data['length']\n if enum in optkind:\n if isinstance(options[abbr], tuple):\n options[abbr] += Info(data),\n else:\n options[abbr] = Info(options[abbr]), Info(data)\n else:\n optkind.append(enum)\n options[abbr] = data\n if counter != length:\n raise ProtocolError(f'{self.alias}: invalid format')\n return tuple(optkind), options\n", "role": "user" }, { "content": "read_hopopt_options", "role": "assistant" } ]
def x(self, code, *, desc): _type = self._read_opt_type(code) if code == 0: opt = dict(desc=desc, type=_type, length=1) elif code == 1: _size = self._read_unpack(1) _padn = self._read_fileng(_size) opt = dict(desc=desc, type=_type, length=_size + 2, padding=_padn) else: raise ProtocolError(f'{self.alias}: [Optno {code}] invalid format') return opt
read_opt_pad
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, code, *, desc):\n _type = self._read_opt_type(code)\n if code == 0:\n opt = dict(desc=desc, type=_type, length=1)\n elif code == 1:\n _size = self._read_unpack(1)\n _padn = self._read_fileng(_size)\n opt = dict(desc=desc, type=_type, length=_size + 2, padding=_padn)\n else:\n raise ProtocolError(f'{self.alias}: [Optno {code}] invalid format')\n return opt\n", "role": "user" }, { "content": "read_opt_pad", "role": "assistant" } ]
def x(self, code, *, desc): _type = self._read_opt_type(code) _size = self._read_unpack(1) if _size != 1: raise ProtocolError(f'{self.alias}: [Optno {code}] invalid format') _limt = self._read_unpack(1) opt = dict(desc=desc, type=_type, length=_size + 2, limit=_limt) return opt
read_opt_tun
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, code, *, desc):\n _type = self._read_opt_type(code)\n _size = self._read_unpack(1)\n if _size != 1:\n raise ProtocolError(f'{self.alias}: [Optno {code}] invalid format')\n _limt = self._read_unpack(1)\n opt = dict(desc=desc, type=_type, length=_size + 2, limit=_limt)\n return opt\n", "role": "user" }, { "content": "read_opt_tun", "role": "assistant" } ]
def x(self, code, *, desc): _type = self._read_opt_type(code) _size = self._read_unpack(1) if _size != 2: raise ProtocolError(f'{self.alias}: [Optno {code}] invalid format') _rval = self._read_unpack(2) if 4 <= _rval <= 35: _dscp = f'Aggregated Reservation Nesting Level {_rval - 4}' elif 36 <= _rval <= 67: _dscp = f'QoS NSLP Aggregation Level {_rval - 36}' elif 65503 <= _rval <= 65534: _dscp = 'Reserved for experimental use' else: _dscp = _ROUTER_ALERT.get(_rval, 'Unassigned') opt = dict(desc=desc, type=_type, length=_size + 2, value=_rval, alert= _dscp) return opt
read_opt_ra
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, code, *, desc):\n _type = self._read_opt_type(code)\n _size = self._read_unpack(1)\n if _size != 2:\n raise ProtocolError(f'{self.alias}: [Optno {code}] invalid format')\n _rval = self._read_unpack(2)\n if 4 <= _rval <= 35:\n _dscp = f'Aggregated Reservation Nesting Level {_rval - 4}'\n elif 36 <= _rval <= 67:\n _dscp = f'QoS NSLP Aggregation Level {_rval - 36}'\n elif 65503 <= _rval <= 65534:\n _dscp = 'Reserved for experimental use'\n else:\n _dscp = _ROUTER_ALERT.get(_rval, 'Unassigned')\n opt = dict(desc=desc, type=_type, length=_size + 2, value=_rval, alert=\n _dscp)\n return opt\n", "role": "user" }, { "content": "read_opt_ra", "role": "assistant" } ]
def x(self, code, *, desc): _type = self._read_opt_type(code) _size = self._read_unpack(1) if _size < 8 and _size % 8 != 0: raise ProtocolError(f'{self.alias}: [Optno {code}] invalid format') _cmpt = self._read_unpack(4) _clen = self._read_unpack(1) if _clen % 2 != 0: raise ProtocolError(f'{self.alias}: [Optno {code}] invalid format') _sens = self._read_unpack(1) _csum = self._read_fileng(2) opt = dict(desc=desc, type=_type, length=_size + 2, domain=_cmpt, cmpt_len=_clen * 4, level=_sens, chksum=_csum) if _clen: _bmap = list() for _ in range(_clen // 2): _bmap.append(self._read_binary(8)) opt['bitmap'] = tuple(_bmap) _plen = _size - _clen * 4 - 8 if _plen: self._read_fileng(_plen) return opt
read_opt_calipso
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, code, *, desc):\n _type = self._read_opt_type(code)\n _size = self._read_unpack(1)\n if _size < 8 and _size % 8 != 0:\n raise ProtocolError(f'{self.alias}: [Optno {code}] invalid format')\n _cmpt = self._read_unpack(4)\n _clen = self._read_unpack(1)\n if _clen % 2 != 0:\n raise ProtocolError(f'{self.alias}: [Optno {code}] invalid format')\n _sens = self._read_unpack(1)\n _csum = self._read_fileng(2)\n opt = dict(desc=desc, type=_type, length=_size + 2, domain=_cmpt,\n cmpt_len=_clen * 4, level=_sens, chksum=_csum)\n if _clen:\n _bmap = list()\n for _ in range(_clen // 2):\n _bmap.append(self._read_binary(8))\n opt['bitmap'] = tuple(_bmap)\n _plen = _size - _clen * 4 - 8\n if _plen:\n self._read_fileng(_plen)\n return opt\n", "role": "user" }, { "content": "read_opt_calipso", "role": "assistant" } ]
def x(self, code, *, desc): _type = self._read_opt_type(code) _size = self._read_unpack(1) _tidd = self._read_binary(1) if _tidd[0] == '0': _mode = 'I-DPD' _tidt = _TID_TYPE.get(_tidd[1:4], 'Unassigned') _tidl = int(_tidd[4:], base=2) if _tidt == 'NULL': if _tidl != 0: raise ProtocolError( f'{self.alias}: [Optno {code}] invalid format') _iden = self._read_fileng(_size - 1) opt = dict(desc=desc, type=_type, length=_size + 2, dpd_type= _mode, tid_type=_tidt, tid_len=_tidl, id=_iden) elif _tidt == 'IPv4': if _tidl != 3: raise ProtocolError( f'{self.alias}: [Optno {code}] invalid format') _tidf = self._read_fileng(4) _iden = self._read_fileng(_size - 4) opt = dict(desc=desc, type=_type, length=_size + 2, dpd_type= _mode, tid_type=_tidt, tid_len=_tidl, tid=ipaddress. ip_address(_tidf), id=_iden) elif _tidt == 'IPv6': if _tidl != 15: raise ProtocolError( f'{self.alias}: [Optno {code}] invalid format') _tidf = self._read_fileng(15) _iden = self._read_fileng(_size - 15) opt = dict(desc=desc, type=_type, length=_size + 2, dpd_type= _mode, tid_type=_tidt, tid_len=_tidl, tid=ipaddress. ip_address(_tidf), id=_iden) else: _tidf = self._read_unpack(_tidl + 1) _iden = self._read_fileng(_size - _tidl - 2) opt = dict(desc=desc, type=_type, length=_size + 2, dpd_type= _mode, tid_type=_tidt, tid_len=_tidl, tid=_tidf, id=_iden) elif _tidd[0] == '1': _data = self._read_binary(_size - 1) opt = dict(desc=desc, type=_type, length=_size + 2, dpd_type=_mode, tid_type=_tidt, hav=_tidd[1:] + _data) else: raise ProtocolError(f'{self.alias}: [Optno {code}] invalid format') return opt
read_opt_smf_dpd
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, code, *, desc):\n _type = self._read_opt_type(code)\n _size = self._read_unpack(1)\n _tidd = self._read_binary(1)\n if _tidd[0] == '0':\n _mode = 'I-DPD'\n _tidt = _TID_TYPE.get(_tidd[1:4], 'Unassigned')\n _tidl = int(_tidd[4:], base=2)\n if _tidt == 'NULL':\n if _tidl != 0:\n raise ProtocolError(\n f'{self.alias}: [Optno {code}] invalid format')\n _iden = self._read_fileng(_size - 1)\n opt = dict(desc=desc, type=_type, length=_size + 2, dpd_type=\n _mode, tid_type=_tidt, tid_len=_tidl, id=_iden)\n elif _tidt == 'IPv4':\n if _tidl != 3:\n raise ProtocolError(\n f'{self.alias}: [Optno {code}] invalid format')\n _tidf = self._read_fileng(4)\n _iden = self._read_fileng(_size - 4)\n opt = dict(desc=desc, type=_type, length=_size + 2, dpd_type=\n _mode, tid_type=_tidt, tid_len=_tidl, tid=ipaddress.\n ip_address(_tidf), id=_iden)\n elif _tidt == 'IPv6':\n if _tidl != 15:\n raise ProtocolError(\n f'{self.alias}: [Optno {code}] invalid format')\n _tidf = self._read_fileng(15)\n _iden = self._read_fileng(_size - 15)\n opt = dict(desc=desc, type=_type, length=_size + 2, dpd_type=\n _mode, tid_type=_tidt, tid_len=_tidl, tid=ipaddress.\n ip_address(_tidf), id=_iden)\n else:\n _tidf = self._read_unpack(_tidl + 1)\n _iden = self._read_fileng(_size - _tidl - 2)\n opt = dict(desc=desc, type=_type, length=_size + 2, dpd_type=\n _mode, tid_type=_tidt, tid_len=_tidl, tid=_tidf, id=_iden)\n elif _tidd[0] == '1':\n _data = self._read_binary(_size - 1)\n opt = dict(desc=desc, type=_type, length=_size + 2, dpd_type=_mode,\n tid_type=_tidt, hav=_tidd[1:] + _data)\n else:\n raise ProtocolError(f'{self.alias}: [Optno {code}] invalid format')\n return opt\n", "role": "user" }, { "content": "read_opt_smf_dpd", "role": "assistant" } ]
def x(self, code, *, desc): _type = self._read_opt_type(code) _size = self._read_unpack(1) if _size != 10: raise ProtocolError(f'{self.alias}: [Optno {code}] invalid format') _stlr = self._read_unpack(1) _stls = self._read_unpack(1) _psnt = self._read_unpack(2) _psnl = self._read_unpack(2) _dtlr = self._read_unpack(2) _dtls = self._read_unpack(2) opt = dict(desc=desc, type=_type, length=_size + 2, scaledtlr=datetime. timedelta(seconds=_stlr), scaledtls=datetime.timedelta(seconds= _stls), psntp=_psnt, psnlr=_psnl, deltatlr=datetime.timedelta( seconds=_dtlr), deltatls=datetime.timedelta(seconds=_dtls)) return opt
read_opt_pdm
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, code, *, desc):\n _type = self._read_opt_type(code)\n _size = self._read_unpack(1)\n if _size != 10:\n raise ProtocolError(f'{self.alias}: [Optno {code}] invalid format')\n _stlr = self._read_unpack(1)\n _stls = self._read_unpack(1)\n _psnt = self._read_unpack(2)\n _psnl = self._read_unpack(2)\n _dtlr = self._read_unpack(2)\n _dtls = self._read_unpack(2)\n opt = dict(desc=desc, type=_type, length=_size + 2, scaledtlr=datetime.\n timedelta(seconds=_stlr), scaledtls=datetime.timedelta(seconds=\n _stls), psntp=_psnt, psnlr=_psnl, deltatlr=datetime.timedelta(\n seconds=_dtlr), deltatls=datetime.timedelta(seconds=_dtls))\n return opt\n", "role": "user" }, { "content": "read_opt_pdm", "role": "assistant" } ]
def x(self, code, *, desc): _type = self._read_opt_type(code) _size = self._read_unpack(1) if _size != 6: raise ProtocolError(f'{self.alias}: [Optno {code}] invalid format') _fcrr = self._read_binary(1) _func = int(_fcrr[:4], base=2) _rate = int(_fcrr[4:], base=2) _ttlv = self._read_unpack(1) _nonr = self._read_binary(4) _qsnn = int(_nonr[:30], base=2) if _func != 0 and _func != 8: raise ProtocolError(f'{self.alias}: [Optno {code}] invalid format') data = dict(type=_type, length=_size + 2, func=_QS_FUNC.get(_func), rate=40000 * 2 ** _rate / 1000, ttl=None if _func else _rate, nounce=_qsnn) return data
read_opt_qs
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, code, *, desc):\n _type = self._read_opt_type(code)\n _size = self._read_unpack(1)\n if _size != 6:\n raise ProtocolError(f'{self.alias}: [Optno {code}] invalid format')\n _fcrr = self._read_binary(1)\n _func = int(_fcrr[:4], base=2)\n _rate = int(_fcrr[4:], base=2)\n _ttlv = self._read_unpack(1)\n _nonr = self._read_binary(4)\n _qsnn = int(_nonr[:30], base=2)\n if _func != 0 and _func != 8:\n raise ProtocolError(f'{self.alias}: [Optno {code}] invalid format')\n data = dict(type=_type, length=_size + 2, func=_QS_FUNC.get(_func),\n rate=40000 * 2 ** _rate / 1000, ttl=None if _func else _rate,\n nounce=_qsnn)\n return data\n", "role": "user" }, { "content": "read_opt_qs", "role": "assistant" } ]
def x(self, code, *, desc): _type = self._read_opt_type(code) _size = self._read_unpack(1) if _size < 4: raise ProtocolError(f'{self.alias}: [Optno {code}] invalid format') _flag = self._read_binary(1) _rpld = self._read_unpack(1) _rank = self._read_unpack(2) opt = dict(desc=desc, type=_type, length=_size + 2, flags=dict(down= True if int(_flag[0], base=2) else False, rank_error=True if int( _flag[1], base=2) else False, fwd_error=True if int(_flag[2], base= 2) else False), id=_rpld, rank=_rank) if _size > 4: opt['data'] = self._read_fileng(_size - 4) return opt
read_opt_rpl
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, code, *, desc):\n _type = self._read_opt_type(code)\n _size = self._read_unpack(1)\n if _size < 4:\n raise ProtocolError(f'{self.alias}: [Optno {code}] invalid format')\n _flag = self._read_binary(1)\n _rpld = self._read_unpack(1)\n _rank = self._read_unpack(2)\n opt = dict(desc=desc, type=_type, length=_size + 2, flags=dict(down=\n True if int(_flag[0], base=2) else False, rank_error=True if int(\n _flag[1], base=2) else False, fwd_error=True if int(_flag[2], base=\n 2) else False), id=_rpld, rank=_rank)\n if _size > 4:\n opt['data'] = self._read_fileng(_size - 4)\n return opt\n", "role": "user" }, { "content": "read_opt_rpl", "role": "assistant" } ]
def x(self, code, *, desc): _type = self._read_opt_type(code) _size = self._read_unpack(1) _nval = self._read_fileng(_size) opt = dict(desc=desc, type=_type, length=_size + 2, value=_nval) return opt
read_opt_ilnp
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, code, *, desc):\n _type = self._read_opt_type(code)\n _size = self._read_unpack(1)\n _nval = self._read_fileng(_size)\n opt = dict(desc=desc, type=_type, length=_size + 2, value=_nval)\n return opt\n", "role": "user" }, { "content": "read_opt_ilnp", "role": "assistant" } ]
def x(self, code, *, desc): _type = self._read_opt_type(code) _size = self._read_unpack(1) _llen = self._read_unpack(1) _line = self._read_fileng(_llen) opt = dict(desc=desc, type=_type, length=_size + 2, lid_len=_llen, lid= _line) _plen = _size - _llen if _plen: self._read_fileng(_plen) return opt
read_opt_lio
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, code, *, desc):\n _type = self._read_opt_type(code)\n _size = self._read_unpack(1)\n _llen = self._read_unpack(1)\n _line = self._read_fileng(_llen)\n opt = dict(desc=desc, type=_type, length=_size + 2, lid_len=_llen, lid=\n _line)\n _plen = _size - _llen\n if _plen:\n self._read_fileng(_plen)\n return opt\n", "role": "user" }, { "content": "read_opt_lio", "role": "assistant" } ]
def x(self, code, *, desc): _type = self._read_opt_type(code) _size = self._read_unpack(1) if _size != 4: raise ProtocolError(f'{self.alias}: [Optno {code}] invalid format') _jlen = self._read_unpack(4) opt = dict(desc=desc, type=_type, length=_size + 2, payload_len=_jlen) return opt
read_opt_jumbo
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, code, *, desc):\n _type = self._read_opt_type(code)\n _size = self._read_unpack(1)\n if _size != 4:\n raise ProtocolError(f'{self.alias}: [Optno {code}] invalid format')\n _jlen = self._read_unpack(4)\n opt = dict(desc=desc, type=_type, length=_size + 2, payload_len=_jlen)\n return opt\n", "role": "user" }, { "content": "read_opt_jumbo", "role": "assistant" } ]
def x(self, code, *, desc): _type = self._read_opt_type(code) _size = self._read_unpack(1) if _size != 16: raise ProtocolError(f'{self.alias}: [Optno {code}] invalid format') _addr = self._read_fileng(16) opt = dict(desc=desc, type=_type, length=_size + 2, ip=ipaddress. ip_address(_addr)) return opt
read_opt_home
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, code, *, desc):\n _type = self._read_opt_type(code)\n _size = self._read_unpack(1)\n if _size != 16:\n raise ProtocolError(f'{self.alias}: [Optno {code}] invalid format')\n _addr = self._read_fileng(16)\n opt = dict(desc=desc, type=_type, length=_size + 2, ip=ipaddress.\n ip_address(_addr))\n return opt\n", "role": "user" }, { "content": "read_opt_home", "role": "assistant" } ]
def x(self, code, *, desc): _type = self._read_opt_type(code) _size = self._read_unpack(1) if _size != 2: raise ProtocolError(f'{self.alias}: [Optno {code}] invalid format') _verf = self._read_binary(1) _seqn = self._read_unpack(2) opt = dict(desc=desc, type=_type, length=_size + 2, version=_verf[:2], flags=dict(dup=True if int(_verf[2], base=2) else False, ret=True if int(_verf[3], base=2) else False), seq=_seqn) return opt
read_opt_ip_dff
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, code, *, desc):\n _type = self._read_opt_type(code)\n _size = self._read_unpack(1)\n if _size != 2:\n raise ProtocolError(f'{self.alias}: [Optno {code}] invalid format')\n _verf = self._read_binary(1)\n _seqn = self._read_unpack(2)\n opt = dict(desc=desc, type=_type, length=_size + 2, version=_verf[:2],\n flags=dict(dup=True if int(_verf[2], base=2) else False, ret=True if\n int(_verf[3], base=2) else False), seq=_seqn)\n return opt\n", "role": "user" }, { "content": "read_opt_ip_dff", "role": "assistant" } ]
def x(key, default=-1): if isinstance(key, int): return Socket(key) if key not in Socket._member_map_: extend_enum(Socket, key, default) return Socket[key]
get
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(key, default=-1):\n if isinstance(key, int):\n return Socket(key)\n if key not in Socket._member_map_:\n extend_enum(Socket, key, default)\n return Socket[key]\n", "role": "user" }, { "content": "get", "role": "assistant" } ]
def x(cls, value): if not (isinstance(value, int) and 0 <= value <= 65535): raise ValueError('%r is not a valid %s' % (value, cls.__name__)) if 1 <= value <= 3000: extend_enum(cls, 'Registered by Xerox [0x%s]' % hex(value)[2:]. upper().zfill(4), value) return cls(value) if 32 <= value <= 63: extend_enum(cls, 'Experimental [0x%s]' % hex(value)[2:].upper(). zfill(4), value) return cls(value) if 3001 <= value <= 65535: extend_enum(cls, 'Dynamically Assigned [0x%s]' % hex(value)[2:]. upper().zfill(4), value) return cls(value) if 16384 <= value <= 20479: extend_enum(cls, 'Dynamically Assigned Socket Numbers [0x%s]' % hex (value)[2:].upper().zfill(4), value) return cls(value) if 32768 <= value <= 65535: extend_enum(cls, 'Statically Assigned Socket Numbers [0x%s]' % hex( value)[2:].upper().zfill(4), value) return cls(value) super()._missing_(value)
missing_
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(cls, value):\n if not (isinstance(value, int) and 0 <= value <= 65535):\n raise ValueError('%r is not a valid %s' % (value, cls.__name__))\n if 1 <= value <= 3000:\n extend_enum(cls, 'Registered by Xerox [0x%s]' % hex(value)[2:].\n upper().zfill(4), value)\n return cls(value)\n if 32 <= value <= 63:\n extend_enum(cls, 'Experimental [0x%s]' % hex(value)[2:].upper().\n zfill(4), value)\n return cls(value)\n if 3001 <= value <= 65535:\n extend_enum(cls, 'Dynamically Assigned [0x%s]' % hex(value)[2:].\n upper().zfill(4), value)\n return cls(value)\n if 16384 <= value <= 20479:\n extend_enum(cls, 'Dynamically Assigned Socket Numbers [0x%s]' % hex\n (value)[2:].upper().zfill(4), value)\n return cls(value)\n if 32768 <= value <= 65535:\n extend_enum(cls, 'Statically Assigned Socket Numbers [0x%s]' % hex(\n value)[2:].upper().zfill(4), value)\n return cls(value)\n super()._missing_(value)\n", "role": "user" }, { "content": "missing_", "role": "assistant" } ]
def x(self, length, extension): if length is None: length = len(self) _next = self._read_protos(1) _hlen = self._read_unpack(1) ipv6_opts = dict(next=_next, length=(_hlen + 1) * 8) options = self._read_ipv6_opts_options(_hlen * 8 + 6) ipv6_opts['options'] = options[0] ipv6_opts.update(options[1]) length -= ipv6_opts['length'] ipv6_opts['packet'] = self._read_packet(header=ipv6_opts['length'], payload=length) if extension: self._protos = None return ipv6_opts return self._decode_next_layer(ipv6_opts, _next, length)
read_ipv6_opts
[ { "content": "Given the source code of a python function, suggest a fitting name for the function.", "role": "system" }, { "content": "def x(self, length, extension):\n if length is None:\n length = len(self)\n _next = self._read_protos(1)\n _hlen = self._read_unpack(1)\n ipv6_opts = dict(next=_next, length=(_hlen + 1) * 8)\n options = self._read_ipv6_opts_options(_hlen * 8 + 6)\n ipv6_opts['options'] = options[0]\n ipv6_opts.update(options[1])\n length -= ipv6_opts['length']\n ipv6_opts['packet'] = self._read_packet(header=ipv6_opts['length'],\n payload=length)\n if extension:\n self._protos = None\n return ipv6_opts\n return self._decode_next_layer(ipv6_opts, _next, length)\n", "role": "user" }, { "content": "read_ipv6_opts", "role": "assistant" } ]