1PKT(3) pkt 1.1 PKT(3)
2
3
4
6 packet.pkt - Pkt module
7
9 Provides the object for a packet and the string representation of the
10 packet. This object has an attribute for each of the layers in the
11 packet so each layer can be accessed directly instead of going through
12 each layer. To access the nfs layer object you can use 'x.nfs' instead
13 of using 'x.ethernet.ip.tcp.rpc.nfs' which would be very cumbersome to
14 use. Also, since NFS can be used with either TCP or UDP it would be
15 harder to access the nfs object independently of the protocol.
16
17 Packet object attributes:
18 Pkt(
19 record = Record information (frame number, etc.)
20 ethernet = ETHERNET II (RFC 894) object
21 ip = IPv4 object
22 tcp = TCP object
23 rpc = RPC object
24 nfs = NFS object
25 )
26
28 class Pkt(baseobj.BaseObj)
29 Packet object
30
31 Usage:
32 from packet.pkt import Pkt
33
34 x = Pkt()
35
36 # Check if this is an NFS packet
37 if x == 'nfs':
38 print x.nfs
39
40
41 Methods defined here:
42 ---------------------
43
44 __eq__(self, other)
45 Comparison method used to determine if object has a given layer
46
47 __init__(self)
48 Do not use BaseObj constructor to have a little bit of
49 performance improvement
50
51 __ne__(self, other)
52 Comparison method used to determine if object does not have a given layer
53
54 __str__(self)
55 String representation of object
56
57 The representation depends on the verbose level set by debug_repr().
58 If set to 0 the generic object representation is returned.
59 If set to 1 the representation of is condensed into a single line.
60 It contains, the frame number, IP source and destination and/or the
61 last layer:
62 '1 0.386615 192.168.0.62 -> 192.168.0.17 TCP 2049 -> 708, seq: 3395733180, ack: 3294169773, ACK,SYN'
63 '5 0.530957 00:0c:29:54:09:ef -> ff:ff:ff:ff:ff:ff, type: 0x806'
64 '19 0.434370 192.168.0.17 -> 192.168.0.62 NFS v4 COMPOUND4 call SEQUENCE;PUTFH;GETATTR'
65
66 If set to 2 the representation of the object is a line for each layer:
67 'Pkt(
68 RECORD: frame 19 @ 0.434370 secs, 238 bytes on wire, 238 bytes captured
69 ETHERNET: 00:0c:29:54:09:ef -> e4:ce:8f:58:9f:f4, type: 0x800(IPv4)
70 IP: 192.168.0.17 -> 192.168.0.62, protocol: 6(TCP), len: 224
71 TCP: src port 708 -> dst port 2049, seq: 3294170673, ack: 3395734137, len: 172, flags: ACK,PSH
72 RPC: CALL(0), program: 100003, version: 4, procedure: 1, xid: 0x1437d3d5
73 NFS: COMPOUND4args(tag='', minorversion=1, argarray=[nfs_argop4(argop=OP_SEQUENCE, ...), ...])
74 )'
75
77 baseobj(3)
78
79
81 No known bugs.
82
84 Jorge Mora (mora@netapp.com)
85
86
87
88NFStest 2.1.5 14 February 2017 PKT(3)