1PKT(3)                              pkt 1.1                             PKT(3)
2
3
4

NAME

6       packet.pkt - Pkt module
7

DESCRIPTION

9       Provides  the  object for a packet and the string representation of the
10       packet.  This object has an attribute for each of  the  layers  in  the
11       packet  so each layer can be accessed directly instead of going through
12       each layer. To access the nfs layer object you can use 'x.nfs'  instead
13       of  using 'x.ethernet.ip.tcp.rpc.nfs' which would be very cumbersome to
14       use. Also, since NFS can be used with either TCP or  UDP  it  would  be
15       harder to access the nfs object independently of the protocol.
16
17       Packet object attributes:
18           Pkt(
19               record   = Record information (frame number, etc.)
20               ethernet = ETHERNET II (RFC 894) object
21               ip       = IPv4 object
22               tcp      = TCP object
23               rpc      = RPC object
24               nfs      = NFS object
25           )
26

CLASSES

28   class Pkt(baseobj.BaseObj)
29       Packet object
30
31       Usage:
32           from packet.pkt import Pkt
33
34           x = Pkt()
35
36           # Check if this is an NFS packet
37           if x == 'nfs':
38               print x.nfs
39
40
41       Methods defined here:
42       ---------------------
43
44       __eq__(self, other)
45       Comparison method used to determine if object has a given layer
46
47       __init__(self)
48        Do not use BaseObj constructor to have a little bit of
49        performance improvement
50
51       __ne__(self, other)
52       Comparison method used to determine if object does not have a given layer
53
54       __str__(self)
55       String representation of object
56
57       The representation depends on the verbose level set by debug_repr().
58       If set to 0 the generic object representation is returned.
59       If set to 1 the representation of is condensed into a single line.
60       It contains, the frame number, IP source and destination and/or the
61       last layer:
62           '1 0.386615 192.168.0.62 -> 192.168.0.17 TCP 2049 -> 708, seq: 3395733180, ack: 3294169773, ACK,SYN'
63           '5 0.530957 00:0c:29:54:09:ef -> ff:ff:ff:ff:ff:ff, type: 0x806'
64           '19 0.434370 192.168.0.17 -> 192.168.0.62 NFS v4 COMPOUND4 call  SEQUENCE;PUTFH;GETATTR'
65
66       If set to 2 the representation of the object is a line for each layer:
67           'Pkt(
68                RECORD:   frame 19 @ 0.434370 secs, 238 bytes on wire, 238 bytes captured
69                ETHERNET: 00:0c:29:54:09:ef -> e4:ce:8f:58:9f:f4, type: 0x800(IPv4)
70                IP:       192.168.0.17 -> 192.168.0.62, protocol: 6(TCP), len: 224
71                TCP:      src port 708 -> dst port 2049, seq: 3294170673, ack: 3395734137, len: 172, flags: ACK,PSH
72                RPC:      CALL(0), program: 100003, version: 4, procedure: 1, xid: 0x1437d3d5
73                NFS:      COMPOUND4args(tag='', minorversion=1, argarray=[nfs_argop4(argop=OP_SEQUENCE, ...), ...])
74            )'
75

SEE ALSO

77       baseobj(3)
78
79

BUGS

81       No known bugs.
82

AUTHOR

84       Jorge Mora (mora@netapp.com)
85
86
87
88NFStest 2.1.5                  14 February 2017                         PKT(3)
Impressum