esp32_bluetooth_classic_sni.../libs/scapy/contrib/http2.py
Matheus Eduardo Garbelini 86890704fd initial commit
todo: add documentation & wireshark dissector
2021-08-31 19:51:03 +08:00

2749 lines
106 KiB
Python
Executable file

#############################################################################
# #
# http2.py --- HTTP/2 support for Scapy #
# see RFC7540 and RFC7541 #
# for more information #
# #
# Copyright (C) 2016 Florian Maury <florian.maury@ssi.gouv.fr> #
# #
# This file is part of Scapy #
# Scapy is free software: you can redistribute it and/or modify it #
# under the terms of the GNU General Public License version 2 as #
# published by the Free Software Foundation. #
# #
# This program is distributed in the hope that it will be useful, but #
# WITHOUT ANY WARRANTY; without even the implied warranty of #
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU #
# General Public License for more details. #
# #
#############################################################################
"""http2 Module
Implements packets and fields required to encode/decode HTTP/2 Frames
and HPack encoded headers
"""
# scapy.contrib.status=loads
# scapy.contrib.description=HTTP/2 (RFC 7540, RFC 7541)
# base_classes triggers an unwanted import warning
from __future__ import absolute_import
from __future__ import print_function
import abc
import re
import sys
from io import BytesIO
import struct
import scapy.modules.six as six
from scapy.compat import raw, plain_str, bytes_hex, orb, chb, bytes_encode
# Only required if using mypy-lang for static typing
# Most symbols are used in mypy-interpreted "comments".
# Sized must be one of the superclasses of a class implementing __len__
from scapy.compat import Optional, List, Union, Callable, Any, \
Tuple, Sized, Pattern # noqa: F401
from scapy.base_classes import Packet_metaclass # noqa: F401
import scapy.fields as fields
import scapy.packet as packet
import scapy.config as config
import scapy.volatile as volatile
import scapy.error as error
###############################################################################
# HPACK Integer Fields #
###############################################################################
class HPackMagicBitField(fields.BitField):
""" HPackMagicBitField is a BitField variant that cannot be assigned another
value than the default one. This field must not be used where there is
potential for fuzzing. OTOH, this field makes sense (for instance, if the
magic bits are used by a dispatcher to select the payload class)
"""
__slots__ = ['_magic']
def __init__(self, name, default, size):
# type: (str, int, int) -> None
"""
:param str name: this field instance name.
:param int default: this field only valid value.
:param int size: this bitfield bitlength.
:return: None
:raises: AssertionError
"""
assert(default >= 0)
# size can be negative if encoding is little-endian (see rev property of bitfields) # noqa: E501
assert(size != 0)
self._magic = default
super(HPackMagicBitField, self).__init__(name, default, size)
def addfield(self, pkt, s, val):
# type: (Optional[packet.Packet], Union[str, Tuple[str, int, int]], int) -> Union[str, Tuple[str, int, int]] # noqa: E501
"""
:param packet.Packet|None pkt: the packet instance containing this field instance; probably unused. # noqa: E501
:param str|(str, int, long) s: either a str if 0 == size%8 or a tuple with the string to add this field to, the # noqa: E501
number of bits already generated and the generated value so far.
:param int val: unused; must be equal to default value
:return: str|(str, int, long): the s string extended with this field machine representation # noqa: E501
:raises: AssertionError
"""
assert val == self._magic, 'val parameter must value {}; received: {}'.format(self._magic, val) # noqa: E501
return super(HPackMagicBitField, self).addfield(pkt, s, self._magic)
def getfield(self, pkt, s):
# type: (Optional[packet.Packet], Union[str, Tuple[str, int]]) -> Tuple[Union[Tuple[str, int], str], int] # noqa: E501
"""
:param packet.Packet|None pkt: the packet instance containing this field instance; probably unused. # noqa: E501
:param str|(str, int) s: either a str if size%8==0 or a tuple with the string to parse from and the number of # noqa: E501
bits already consumed by previous bitfield-compatible fields.
:return: (str|(str, int), int): Returns the remaining string and the parsed value. May return a tuple if there # noqa: E501
are remaining bits to parse in the first byte. Returned value is equal to default value # noqa: E501
:raises: AssertionError
"""
r = super(HPackMagicBitField, self).getfield(pkt, s)
assert (
isinstance(r, tuple) and
len(r) == 2 and
isinstance(r[1], six.integer_types)
), 'Second element of BitField.getfield return value expected to be an int or a long; API change detected' # noqa: E501
assert r[1] == self._magic, 'Invalid value parsed from s; error in class guessing detected!' # noqa: E501
return r
def h2i(self, pkt, x):
# type: (Optional[packet.Packet], int) -> int
"""
:param packet.Packet|None pkt: the packet instance containing this field instance; probably unused # noqa: E501
:param int x: unused; must be equal to default value
:return: int; default value
:raises: AssertionError
"""
assert x == self._magic, \
'EINVAL: x: This field is magic. Do not attempt to modify it. Expected value: {}'.format(self._magic) # noqa: E501
return super(HPackMagicBitField, self).h2i(pkt, self._magic)
def i2h(self, pkt, x):
# type: (Optional[packet.Packet], int) -> int
"""
:param packet.Packet|None pkt: the packet instance containing this field instance; probably unused # noqa: E501
:param int x: unused; must be equal to default value
:return: int; default value
:raises: AssertionError
"""
assert x == self._magic, \
'EINVAL: x: This field is magic. Do not attempt to modify it. Expected value: {}'.format(self._magic) # noqa: E501
return super(HPackMagicBitField, self).i2h(pkt, self._magic)
def m2i(self, pkt, x):
# type: (Optional[packet.Packet], int) -> int
"""
:param packet.Packet|None pkt: the packet instance containing this field instance; probably unused # noqa: E501
:param int x: must be the machine representatino of the default value
:return: int; default value
:raises: AssertionError
"""
r = super(HPackMagicBitField, self).m2i(pkt, x)
assert r == self._magic, 'Invalid value parsed from m2i; error in class guessing detected!' # noqa: E501
return r
def i2m(self, pkt, x):
# type: (Optional[packet.Packet], int) -> int
"""
:param packet.Packet|None pkt: the packet instance containing this field instance; probably unused # noqa: E501
:param int x: unused; must be equal to default value
:return: int; default value
:raises: AssertionError
"""
assert x == self._magic, \
'EINVAL: x: This field is magic. Do not attempt to modify it. Expected value: {}'.format(self._magic) # noqa: E501
return super(HPackMagicBitField, self).i2m(pkt, self._magic)
def any2i(self, pkt, x):
# type: (Optional[packet.Packet], int) -> int
"""
:param packet.Packet|None pkt: the packet instance containing this field instance; probably unused # noqa: E501
:param int x: unused; must be equal to default value
:return: int; default value
:raises: AssertionError
"""
assert x == self._magic, \
'EINVAL: x: This field is magic. Do not attempt to modify it. Expected value: {}'.format(self._magic) # noqa: E501
return super(HPackMagicBitField, self).any2i(pkt, self._magic)
class AbstractUVarIntField(fields.Field):
"""AbstractUVarIntField represents an integer as defined in RFC7541
"""
__slots__ = ['_max_value', 'size', 'rev']
"""
:var int size: the bit length of the prefix of this AbstractUVarIntField. It # noqa: E501
represents the complement of the number of MSB that are used in the
current byte for other purposes by some other BitFields
:var int _max_value: the maximum value that can be stored in the
sole prefix. If the integer equals or exceeds this value, the max prefix
value is assigned to the size first bits and the multibyte representation
is used
:var bool rev: is a fake property, also emulated for the sake of
compatibility with Bitfields
"""
def __init__(self, name, default, size):
# type: (str, Optional[int], int) -> None
"""
:param str name: the name of this field instance
:param int|None default: positive, null or None default value for this field instance. # noqa: E501
:param int size: the number of bits to consider in the first byte. Valid range is ]0;8] # noqa: E501
:return: None
:raises: AssertionError
"""
assert(default is None or (isinstance(default, six.integer_types) and default >= 0)) # noqa: E501
assert(0 < size <= 8)
super(AbstractUVarIntField, self).__init__(name, default)
self.size = size
self._max_value = (1 << self.size) - 1
# Configuring the fake property that is useless for this class but that is # noqa: E501
# expected from BitFields
self.rev = False
def h2i(self, pkt, x):
# type: (Optional[packet.Packet], Optional[int]) -> Optional[int]
"""
:param packet.Packet|None pkt: unused.
:param int|None x: the value to convert.
:return: int|None: the converted value.
:raises: AssertionError
"""
assert(not isinstance(x, six.integer_types) or x >= 0)
return x
def i2h(self, pkt, x):
# type: (Optional[packet.Packet], Optional[int]) -> Optional[int]
"""
:param packet.Packet|None pkt: unused.
:param int|None x: the value to convert.
:return:: int|None: the converted value.
"""
return x
def _detect_multi_byte(self, fb):
# type: (str) -> bool
""" _detect_multi_byte returns whether the AbstractUVarIntField is represented on # noqa: E501
multiple bytes or not.
A multibyte representation is indicated by all of the first size bits being set # noqa: E501
:param str fb: first byte, as a character.
:return: bool: True if multibyte repr detected, else False.
:raises: AssertionError
"""
assert(isinstance(fb, int) or len(fb) == 1)
return (orb(fb) & self._max_value) == self._max_value
def _parse_multi_byte(self, s):
# type: (str) -> int
""" _parse_multi_byte parses x as a multibyte representation to get the
int value of this AbstractUVarIntField.
:param str s: the multibyte string to parse.
:return: int: The parsed int value represented by this AbstractUVarIntField. # noqa: E501
:raises:: AssertionError
:raises:: Scapy_Exception if the input value encodes an integer larger than 1<<64 # noqa: E501
"""
assert(len(s) >= 2)
tmp_len = len(s)
value = 0
i = 1
byte = orb(s[i])
# For CPU sake, stops at an arbitrary large number!
max_value = 1 << 64
# As long as the MSG is set, an another byte must be read
while byte & 0x80:
value += (byte ^ 0x80) << (7 * (i - 1))
if value > max_value:
raise error.Scapy_Exception(
'out-of-bound value: the string encodes a value that is too large (>2^{{64}}): {}'.format(value) # noqa: E501
)
i += 1
assert i < tmp_len, 'EINVAL: x: out-of-bound read: the string ends before the AbstractUVarIntField!' # noqa: E501
byte = orb(s[i])
value += byte << (7 * (i - 1))
value += self._max_value
assert(value >= 0)
return value
def m2i(self, pkt, x):
# type: (Optional[packet.Packet], Union[str, Tuple[str, int]]) -> int
"""
A tuple is expected for the "x" param only if "size" is different than 8. If a tuple is received, some bits # noqa: E501
were consumed by another field. This field consumes the remaining bits, therefore the int of the tuple must # noqa: E501
equal "size".
:param packet.Packet|None pkt: unused.
:param str|(str, int) x: the string to convert. If bits were consumed by a previous bitfield-compatible field. # noqa: E501
:raises: AssertionError
"""
assert(isinstance(x, bytes) or (isinstance(x, tuple) and x[1] >= 0))
if isinstance(x, tuple):
assert (8 - x[1]) == self.size, 'EINVAL: x: not enough bits remaining in current byte to read the prefix' # noqa: E501
val = x[0]
else:
assert isinstance(x, bytes) and self.size == 8, 'EINVAL: x: tuple expected when prefix_len is not a full byte' # noqa: E501
val = x
if self._detect_multi_byte(val[0]):
ret = self._parse_multi_byte(val)
else:
ret = orb(val[0]) & self._max_value
assert(ret >= 0)
return ret
def i2m(self, pkt, x):
# type: (Optional[packet.Packet], int) -> str
"""
:param packet.Packet|None pkt: unused.
:param int x: the value to convert.
:return: str: the converted value.
:raises: AssertionError
"""
assert(x >= 0)
if x < self._max_value:
return chb(x)
else:
# The sl list join is a performance trick, because string
# concatenation is not efficient with Python immutable strings
sl = [chb(self._max_value)]
x -= self._max_value
while x >= 0x80:
sl.append(chb(0x80 | (x & 0x7F)))
x >>= 7
sl.append(chb(x))
return b''.join(sl)
def any2i(self, pkt, x):
# type: (Optional[packet.Packet], Union[None, str, int]) -> Optional[int] # noqa: E501
"""
A "x" value as a string is parsed as a binary encoding of a UVarInt. An int is considered an internal value. # noqa: E501
None is returned as is.
:param packet.Packet|None pkt: the packet containing this field; probably unused. # noqa: E501
:param str|int|None x: the value to convert.
:return: int|None: the converted value.
:raises: AssertionError
"""
if isinstance(x, type(None)):
return x
if isinstance(x, six.integer_types):
assert(x >= 0)
ret = self.h2i(pkt, x)
assert(isinstance(ret, six.integer_types) and ret >= 0)
return ret
elif isinstance(x, bytes):
ret = self.m2i(pkt, x)
assert (isinstance(ret, six.integer_types) and ret >= 0)
return ret
assert False, 'EINVAL: x: No idea what the parameter format is'
def i2repr(self, pkt, x):
# type: (Optional[packet.Packet], Optional[int]) -> str
"""
:param packet.Packet|None pkt: probably unused.
:param x: int|None: the positive, null or none value to convert.
:return: str: the representation of the value.
"""
return repr(self.i2h(pkt, x))
def addfield(self, pkt, s, val):
# type: (Optional[packet.Packet], Union[str, Tuple[str, int, int]], int) -> str # noqa: E501
"""
An AbstractUVarIntField prefix always consumes the remaining bits
of a BitField;if no current BitField is in use (no tuple in
entry) then the prefix length is 8 bits and the whole byte is to
be consumed
:param packet.Packet|None pkt: the packet containing this field.
Probably unused.
:param str|(str, int, long) s: the string to append this field to.
A tuple indicates that some bits were already generated by another
bitfield-compatible field. This MUST be the case if "size" is not 8.
The int is the number of bits already generated in the first byte of
the str. The long is the value that was generated by the previous
bitfield-compatible fields.
:param int val: the positive or null value to be added.
:return: str: s concatenated with the machine representation of this
field.
:raises: AssertionError
"""
assert(val >= 0)
if isinstance(s, bytes):
assert self.size == 8, 'EINVAL: s: tuple expected when prefix_len is not a full byte' # noqa: E501
return s + self.i2m(pkt, val)
# s is a tuple
# assert(s[1] >= 0)
# assert(s[2] >= 0)
# assert (8 - s[1]) == self.size, 'EINVAL: s: not enough bits remaining in current byte to read the prefix' # noqa: E501
if val >= self._max_value:
return s[0] + chb((s[2] << self.size) + self._max_value) + self.i2m(pkt, val)[1:] # noqa: E501
# This AbstractUVarIntField is only one byte long; setting the prefix value # noqa: E501
# and appending the resulting byte to the string
return s[0] + chb((s[2] << self.size) + orb(self.i2m(pkt, val)))
@staticmethod
def _detect_bytelen_from_str(s):
# type: (str) -> int
""" _detect_bytelen_from_str returns the length of the machine
representation of an AbstractUVarIntField starting at the beginning
of s and which is assumed to expand over multiple bytes
(value > _max_prefix_value).
:param str s: the string to parse. It is assumed that it is a multibyte int. # noqa: E501
:return: The bytelength of the AbstractUVarIntField.
:raises: AssertionError
"""
assert(len(s) >= 2)
tmp_len = len(s)
i = 1
while orb(s[i]) & 0x80 > 0:
i += 1
assert i < tmp_len, 'EINVAL: s: out-of-bound read: unfinished AbstractUVarIntField detected' # noqa: E501
ret = i + 1
assert(ret >= 0)
return ret
def i2len(self, pkt, x):
# type: (Optional[packet.Packet], int) -> int
"""
:param packet.Packet|None pkt: unused.
:param int x: the positive or null value whose binary size if requested. # noqa: E501
:raises: AssertionError
"""
assert(x >= 0)
if x < self._max_value:
return 1
# x is expressed over multiple bytes
x -= self._max_value
i = 1
if x == 0:
i += 1
while x > 0:
x >>= 7
i += 1
ret = i
assert(ret >= 0)
return ret
def getfield(self, pkt, s):
# type: (Optional[packet.Packet], Union[str, Tuple[str, int]]) -> Tuple[str, int] # noqa: E501
"""
:param packet.Packet|None pkt: the packet instance containing this
field; probably unused.
:param str|(str, int) s: the input value to get this field value from.
If size is 8, s is a string, else it is a tuple containing the value
and an int indicating the number of bits already consumed in the
first byte of the str. The number of remaining bits to consume in the
first byte must be equal to "size".
:return: (str, int): the remaining bytes of s and the parsed value.
:raises: AssertionError
"""
if isinstance(s, tuple):
assert(len(s) == 2)
temp = s # type: Tuple[str, int]
ts, ti = temp
assert(ti >= 0)
assert 8 - ti == self.size, 'EINVAL: s: not enough bits remaining in current byte to read the prefix' # noqa: E501
val = ts
else:
assert isinstance(s, bytes) and self.size == 8, 'EINVAL: s: tuple expected when prefix_len is not a full byte' # noqa: E501
val = s
if self._detect_multi_byte(val[0]):
tmp_len = self._detect_bytelen_from_str(val)
else:
tmp_len = 1
ret = val[tmp_len:], self.m2i(pkt, s)
assert(ret[1] >= 0)
return ret
def randval(self):
# type: () -> volatile.VolatileValue
"""
:return: volatile.VolatileValue: a volatile value for this field "long"-compatible internal value. # noqa: E501
"""
return volatile.RandLong()
class UVarIntField(AbstractUVarIntField):
def __init__(self, name, default, size):
# type: (str, int, int) -> None
"""
:param str name: the name of this field instance.
:param default: the default value for this field instance. default must be positive or null. # noqa: E501
:raises: AssertionError
"""
assert(default >= 0)
assert(0 < size <= 8)
super(UVarIntField, self).__init__(name, default, size)
self.size = size
self._max_value = (1 << self.size) - 1
# Configuring the fake property that is useless for this class but that is # noqa: E501
# expected from BitFields
self.rev = False
def h2i(self, pkt, x):
# type: (Optional[packet.Packet], int) -> int
""" h2i is overloaded to restrict the acceptable x values (not None)
:param packet.Packet|None pkt: the packet instance containing this field instance; probably unused. # noqa: E501
:param int x: the value to convert.
:return: int: the converted value.
:raises: AssertionError
"""
ret = super(UVarIntField, self).h2i(pkt, x)
assert(not isinstance(ret, type(None)) and ret >= 0)
return ret
def i2h(self, pkt, x):
# type: (Optional[packet.Packet], int) -> int
""" i2h is overloaded to restrict the acceptable x values (not None)
:param packet.Packet|None pkt: the packet instance containing this field instance; probably unused. # noqa: E501
:param int x: the value to convert.
:return: int: the converted value.
:raises: AssertionError
"""
ret = super(UVarIntField, self).i2h(pkt, x)
assert(not isinstance(ret, type(None)) and ret >= 0)
return ret
def any2i(self, pkt, x):
# type: (Optional[packet.Packet], Union[str, int]) -> int
""" any2i is overloaded to restrict the acceptable x values (not None)
:param packet.Packet|None pkt: the packet instance containing this field instance; probably unused. # noqa: E501
:param str|int x: the value to convert.
:return: int: the converted value.
:raises: AssertionError
"""
ret = super(UVarIntField, self).any2i(pkt, x)
assert(not isinstance(ret, type(None)) and ret >= 0)
return ret
def i2repr(self, pkt, x):
# type: (Optional[packet.Packet], int) -> str
""" i2repr is overloaded to restrict the acceptable x values (not None)
:param packet.Packet|None pkt: the packet instance containing this field instance; probably unused. # noqa: E501
:param int x: the value to convert.
:return: str: the converted value.
"""
return super(UVarIntField, self).i2repr(pkt, x)
class FieldUVarLenField(AbstractUVarIntField):
__slots__ = ['_length_of', '_adjust']
def __init__(self, name, default, size, length_of, adjust=lambda x: x):
# type: (str, Optional[int], int, str, Callable[[int], int]) -> None
""" Initializes a FieldUVarLenField
:param str name: The name of this field instance.
:param int|None default: the default value of this field instance.
:param int size: the number of bits that are occupied by this field in the first byte of a binary string. # noqa: E501
size must be in the range ]0;8].
:param str length_of: The name of the field this field value is measuring/representing. # noqa: E501
:param callable adjust: A function that modifies the value computed from the "length_of" field. # noqa: E501
adjust can be used for instance to add a constant to the length_of field # noqa: E501
length. For instance, let's say that i2len of the length_of field
returns 2. If adjust is lambda x: x+1 In that case, this field will
value 3 at build time.
:return: None
:raises: AssertionError
"""
assert(default is None or default >= 0)
assert(0 < size <= 8)
super(FieldUVarLenField, self).__init__(name, default, size)
self._length_of = length_of
self._adjust = adjust
def addfield(self, pkt, s, val):
# type: (Optional[packet.Packet], Union[str, Tuple[str, int, int]], Optional[int]) -> str # noqa: E501
"""
:param packet.Packet|None pkt: the packet instance containing this field instance. This parameter must not be # noqa: E501
None if the val parameter is.
:param str|(str, int, long) s: the string to append this field to. A tuple indicates that some bits were already # noqa: E501
generated by another bitfield-compatible field. This MUST be the case if "size" is not 8. The int is the # noqa: E501
number of bits already generated in the first byte of the str. The long is the value that was generated by the # noqa: E501
previous bitfield-compatible fields.
:param int|None val: the positive or null value to be added. If None, the value is computed from pkt. # noqa: E501
:return: str: s concatenated with the machine representation of this field. # noqa: E501
:raises: AssertionError
"""
if val is None:
assert isinstance(pkt, packet.Packet), \
'EINVAL: pkt: Packet expected when val is None; received {}'.format(type(pkt)) # noqa: E501
val = self._compute_value(pkt)
return super(FieldUVarLenField, self).addfield(pkt, s, val)
def i2m(self, pkt, x):
# type: (Optional[packet.Packet], Optional[int]) -> str
"""
:param packet.Packet|None pkt: the packet instance containing this field instance. This parameter must not be # noqa: E501
None if the x parameter is.
:param int|None x: the positive or null value to be added. If None, the value is computed from pkt. # noqa: E501
:return: str
:raises: AssertionError
"""
if x is None:
assert isinstance(pkt, packet.Packet), \
'EINVAL: pkt: Packet expected when x is None; received {}'.format(type(pkt)) # noqa: E501
x = self._compute_value(pkt)
return super(FieldUVarLenField, self).i2m(pkt, x)
def _compute_value(self, pkt):
# type: (packet.Packet) -> int
""" Computes the value of this field based on the provided packet and
the length_of field and the adjust callback
:param packet.Packet pkt: the packet from which is computed this field value. # noqa: E501
:return: int: the computed value for this field.
:raises: KeyError: the packet nor its payload do not contain an attribute
with the length_of name.
:raises: AssertionError
:raises: KeyError if _length_of is not one of pkt fields
"""
fld, fval = pkt.getfield_and_val(self._length_of)
val = fld.i2len(pkt, fval)
ret = self._adjust(val)
assert(ret >= 0)
return ret
###############################################################################
# HPACK String Fields #
###############################################################################
# Welcome the magic of Python inconsistencies !
# https://stackoverflow.com/a/41622155
if sys.version_info >= (3, 4):
ABC = abc.ABC
else:
ABC = abc.ABCMeta('ABC', (), {})
class HPackStringsInterface(ABC, Sized): # type: ignore
@abc.abstractmethod
def __str__(self):
pass
def __bytes__(self):
r = self.__str__()
return bytes_encode(r)
@abc.abstractmethod
def origin(self):
pass
@abc.abstractmethod
def __len__(self):
pass
class HPackLiteralString(HPackStringsInterface):
""" HPackLiteralString is a string. This class is used as a marker and
implements an interface in common with HPackZString
"""
__slots__ = ['_s']
def __init__(self, s):
# type: (str) -> None
self._s = s
def __str__(self):
# type: () -> str
return self._s
def origin(self):
# type: () -> str
return plain_str(self._s)
def __len__(self):
# type: () -> int
return len(self._s)
class EOS(object):
""" Simple "marker" to designate the End Of String symbol in the huffman table
"""
class HuffmanNode(object):
""" HuffmanNode is an entry of the binary tree used for encoding/decoding
HPack compressed HTTP/2 headers
"""
__slots__ = ['left', 'right']
"""@var l: the left branch of this node
@var r: the right branch of this Node
These variables can value None (leaf node), another HuffmanNode, or a
symbol. Symbols are either a character or the End Of String symbol (class
EOS)
"""
def __init__(self, left, right):
# type: (Union[None, HuffmanNode, EOS, str], Union[None, HuffmanNode, EOS, str]) -> None # noqa: E501
self.left = left
self.right = right
def __getitem__(self, b):
# type: (int) -> Union[None, HuffmanNode, EOS, str]
return self.right if b else self.left
def __setitem__(self, b, val):
# type: (int, Union[None, HuffmanNode, EOS, str]) -> None
if b:
self.right = val
else:
self.left = val
def __str__(self):
# type: () -> str
return self.__repr__()
def __repr__(self):
# type: () -> str
return '({}, {})'.format(self.left, self.right)
class InvalidEncodingException(Exception):
""" InvalidEncodingException is raised when a supposedly huffman-encoded
string is decoded and a decoding error arises
"""
class HPackZString(HPackStringsInterface):
__slots__ = ['_s', '_encoded']
# From RFC 7541
# Tuple is (code,code bitlength)
# The bitlength is required to know how long the left padding
# (implicit 0's) there are
static_huffman_code = [
(0x1ff8, 13),
(0x7fffd8, 23),
(0xfffffe2, 28),
(0xfffffe3, 28),
(0xfffffe4, 28),
(0xfffffe5, 28),
(0xfffffe6, 28),
(0xfffffe7, 28),
(0xfffffe8, 28),
(0xffffea, 24),
(0x3ffffffc, 30),
(0xfffffe9, 28),
(0xfffffea, 28),
(0x3ffffffd, 30),
(0xfffffeb, 28),
(0xfffffec, 28),
(0xfffffed, 28),
(0xfffffee, 28),
(0xfffffef, 28),
(0xffffff0, 28),
(0xffffff1, 28),
(0xffffff2, 28),
(0x3ffffffe, 30),
(0xffffff3, 28),
(0xffffff4, 28),
(0xffffff5, 28),
(0xffffff6, 28),
(0xffffff7, 28),
(0xffffff8, 28),
(0xffffff9, 28),
(0xffffffa, 28),
(0xffffffb, 28),
(0x14, 6),
(0x3f8, 10),
(0x3f9, 10),
(0xffa, 12),
(0x1ff9, 13),
(0x15, 6),
(0xf8, 8),
(0x7fa, 11),
(0x3fa, 10),
(0x3fb, 10),
(0xf9, 8),
(0x7fb, 11),
(0xfa, 8),
(0x16, 6),
(0x17, 6),
(0x18, 6),
(0x0, 5),
(0x1, 5),
(0x2, 5),
(0x19, 6),
(0x1a, 6),
(0x1b, 6),
(0x1c, 6),
(0x1d, 6),
(0x1e, 6),
(0x1f, 6),
(0x5c, 7),
(0xfb, 8),
(0x7ffc, 15),
(0x20, 6),
(0xffb, 12),
(0x3fc, 10),
(0x1ffa, 13),
(0x21, 6),
(0x5d, 7),
(0x5e, 7),
(0x5f, 7),
(0x60, 7),
(0x61, 7),
(0x62, 7),
(0x63, 7),
(0x64, 7),
(0x65, 7),
(0x66, 7),
(0x67, 7),
(0x68, 7),
(0x69, 7),
(0x6a, 7),
(0x6b, 7),
(0x6c, 7),
(0x6d, 7),
(0x6e, 7),
(0x6f, 7),
(0x70, 7),
(0x71, 7),
(0x72, 7),
(0xfc, 8),
(0x73, 7),
(0xfd, 8),
(0x1ffb, 13),
(0x7fff0, 19),
(0x1ffc, 13),
(0x3ffc, 14),
(0x22, 6),
(0x7ffd, 15),
(0x3, 5),
(0x23, 6),
(0x4, 5),
(0x24, 6),
(0x5, 5),
(0x25, 6),
(0x26, 6),
(0x27, 6),
(0x6, 5),
(0x74, 7),
(0x75, 7),
(0x28, 6),
(0x29, 6),
(0x2a, 6),
(0x7, 5),
(0x2b, 6),
(0x76, 7),
(0x2c, 6),
(0x8, 5),
(0x9, 5),
(0x2d, 6),
(0x77, 7),
(0x78, 7),
(0x79, 7),
(0x7a, 7),
(0x7b, 7),
(0x7ffe, 15),
(0x7fc, 11),
(0x3ffd, 14),
(0x1ffd, 13),
(0xffffffc, 28),
(0xfffe6, 20),
(0x3fffd2, 22),
(0xfffe7, 20),
(0xfffe8, 20),
(0x3fffd3, 22),
(0x3fffd4, 22),
(0x3fffd5, 22),
(0x7fffd9, 23),
(0x3fffd6, 22),
(0x7fffda, 23),
(0x7fffdb, 23),
(0x7fffdc, 23),
(0x7fffdd, 23),
(0x7fffde, 23),
(0xffffeb, 24),
(0x7fffdf, 23),
(0xffffec, 24),
(0xffffed, 24),
(0x3fffd7, 22),
(0x7fffe0, 23),
(0xffffee, 24),
(0x7fffe1, 23),
(0x7fffe2, 23),
(0x7fffe3, 23),
(0x7fffe4, 23),
(0x1fffdc, 21),
(0x3fffd8, 22),
(0x7fffe5, 23),
(0x3fffd9, 22),
(0x7fffe6, 23),
(0x7fffe7, 23),
(0xffffef, 24),
(0x3fffda, 22),
(0x1fffdd, 21),
(0xfffe9, 20),
(0x3fffdb, 22),
(0x3fffdc, 22),
(0x7fffe8, 23),
(0x7fffe9, 23),
(0x1fffde, 21),
(0x7fffea, 23),
(0x3fffdd, 22),
(0x3fffde, 22),
(0xfffff0, 24),
(0x1fffdf, 21),
(0x3fffdf, 22),
(0x7fffeb, 23),
(0x7fffec, 23),
(0x1fffe0, 21),
(0x1fffe1, 21),
(0x3fffe0, 22),
(0x1fffe2, 21),
(0x7fffed, 23),
(0x3fffe1, 22),
(0x7fffee, 23),
(0x7fffef, 23),
(0xfffea, 20),
(0x3fffe2, 22),
(0x3fffe3, 22),
(0x3fffe4, 22),
(0x7ffff0, 23),
(0x3fffe5, 22),
(0x3fffe6, 22),
(0x7ffff1, 23),
(0x3ffffe0, 26),
(0x3ffffe1, 26),
(0xfffeb, 20),
(0x7fff1, 19),
(0x3fffe7, 22),
(0x7ffff2, 23),
(0x3fffe8, 22),
(0x1ffffec, 25),
(0x3ffffe2, 26),
(0x3ffffe3, 26),
(0x3ffffe4, 26),
(0x7ffffde, 27),
(0x7ffffdf, 27),
(0x3ffffe5, 26),
(0xfffff1, 24),
(0x1ffffed, 25),
(0x7fff2, 19),
(0x1fffe3, 21),
(0x3ffffe6, 26),
(0x7ffffe0, 27),
(0x7ffffe1, 27),
(0x3ffffe7, 26),
(0x7ffffe2, 27),
(0xfffff2, 24),
(0x1fffe4, 21),
(0x1fffe5, 21),
(0x3ffffe8, 26),
(0x3ffffe9, 26),
(0xffffffd, 28),
(0x7ffffe3, 27),
(0x7ffffe4, 27),
(0x7ffffe5, 27),
(0xfffec, 20),
(0xfffff3, 24),
(0xfffed, 20),
(0x1fffe6, 21),
(0x3fffe9, 22),
(0x1fffe7, 21),
(0x1fffe8, 21),
(0x7ffff3, 23),
(0x3fffea, 22),
(0x3fffeb, 22),
(0x1ffffee, 25),
(0x1ffffef, 25),
(0xfffff4, 24),
(0xfffff5, 24),
(0x3ffffea, 26),
(0x7ffff4, 23),
(0x3ffffeb, 26),
(0x7ffffe6, 27),
(0x3ffffec, 26),
(0x3ffffed, 26),
(0x7ffffe7, 27),
(0x7ffffe8, 27),
(0x7ffffe9, 27),
(0x7ffffea, 27),
(0x7ffffeb, 27),
(0xffffffe, 28),
(0x7ffffec, 27),
(0x7ffffed, 27),
(0x7ffffee, 27),
(0x7ffffef, 27),
(0x7fffff0, 27),
(0x3ffffee, 26),
(0x3fffffff, 30)
]
static_huffman_tree = None # type: HuffmanNode
@classmethod
def _huffman_encode_char(cls, c):
# type: (Union[str, EOS]) -> Tuple[int, int]
""" huffman_encode_char assumes that the static_huffman_tree was
previously initialized
:param str|EOS c: a symbol to encode
:return: (int, int): the bitstring of the symbol and its bitlength
:raises: AssertionError
"""
if isinstance(c, EOS):
return cls.static_huffman_code[-1]
else:
assert(isinstance(c, int) or len(c) == 1)
return cls.static_huffman_code[orb(c)]
@classmethod
def huffman_encode(cls, s):
# type: (str) -> Tuple[int, int]
""" huffman_encode returns the bitstring and the bitlength of the
bitstring representing the string provided as a parameter
:param str s: the string to encode
:return: (int, int): the bitstring of s and its bitlength
:raises: AssertionError
"""
i = 0
ibl = 0
for c in s:
val, bl = cls._huffman_encode_char(c)
i = (i << bl) + val
ibl += bl
padlen = 8 - (ibl % 8)
if padlen != 8:
val, bl = cls._huffman_encode_char(EOS())
i = (i << padlen) + (val >> (bl - padlen))
ibl += padlen
ret = i, ibl
assert(ret[0] >= 0)
assert (ret[1] >= 0)
return ret
@classmethod
def huffman_decode(cls, i, ibl):
# type: (int, int) -> str
""" huffman_decode decodes the bitstring provided as parameters.
:param int i: the bitstring to decode
:param int ibl: the bitlength of i
:return: str: the string decoded from the bitstring
:raises: AssertionError, InvalidEncodingException
"""
assert(i >= 0)
assert(ibl >= 0)
if isinstance(cls.static_huffman_tree, type(None)):
cls.huffman_compute_decode_tree()
assert(not isinstance(cls.static_huffman_tree, type(None)))
s = []
j = 0
interrupted = False
cur = cls.static_huffman_tree
cur_sym = 0
cur_sym_bl = 0
while j < ibl:
b = (i >> (ibl - j - 1)) & 1
cur_sym = (cur_sym << 1) + b
cur_sym_bl += 1
elmt = cur[b]
if isinstance(elmt, HuffmanNode):
interrupted = True
cur = elmt
if isinstance(cur, type(None)):
raise AssertionError()
elif isinstance(elmt, EOS):
raise InvalidEncodingException('Huffman decoder met the full EOS symbol') # noqa: E501
elif isinstance(elmt, bytes):
interrupted = False
s.append(elmt)
cur = cls.static_huffman_tree
cur_sym = 0
cur_sym_bl = 0
else:
raise InvalidEncodingException('Should never happen, so incidentally it will') # noqa: E501
j += 1
if interrupted:
# Interrupted values true if the bitstring ends in the middle of a
# symbol; this symbol must be, according to RFC7541 par5.2 the MSB
# of the EOS symbol
if cur_sym_bl > 7:
raise InvalidEncodingException('Huffman decoder is detecting padding longer than 7 bits') # noqa: E501
eos_symbol = cls.static_huffman_code[-1]
eos_msb = eos_symbol[0] >> (eos_symbol[1] - cur_sym_bl)
if eos_msb != cur_sym:
raise InvalidEncodingException('Huffman decoder is detecting unexpected padding format') # noqa: E501
return b''.join(s)
@classmethod
def huffman_conv2str(cls, bit_str, bit_len):
# type: (int, int) -> str
""" huffman_conv2str converts a bitstring of bit_len bitlength into a
binary string. It DOES NOT compress/decompress the bitstring!
:param int bit_str: the bitstring to convert.
:param int bit_len: the bitlength of bit_str.
:return: str: the converted bitstring as a bytestring.
:raises: AssertionError
"""
assert(bit_str >= 0)
assert(bit_len >= 0)
byte_len = bit_len // 8
rem_bit = bit_len % 8
if rem_bit != 0:
bit_str <<= 8 - rem_bit
byte_len += 1
# As usual the list/join tricks is a performance trick to build
# efficiently a Python string
s = [] # type: List[str]
i = 0
while i < byte_len:
s.insert(0, chb((bit_str >> (i * 8)) & 0xFF))
i += 1
return b''.join(s)
@classmethod
def huffman_conv2bitstring(cls, s):
# type: (str) -> Tuple[int, int]
""" huffman_conv2bitstring converts a string into its bitstring
representation. It returns a tuple: the bitstring and its bitlength.
This function DOES NOT compress/decompress the string!
:param str s: the bytestring to convert.
:return: (int, int): the bitstring of s, and its bitlength.
:raises: AssertionError
"""
i = 0
ibl = len(s) * 8
for c in s:
i = (i << 8) + orb(c)
ret = i, ibl
assert(ret[0] >= 0)
assert(ret[1] >= 0)
return ret
@classmethod
def huffman_compute_decode_tree(cls):
# type: () -> None
""" huffman_compute_decode_tree initializes/builds the static_huffman_tree
:return: None
:raises: InvalidEncodingException if there is an encoding problem
"""
cls.static_huffman_tree = HuffmanNode(None, None)
i = 0
for entry in cls.static_huffman_code:
parent = cls.static_huffman_tree
for idx in range(entry[1] - 1, -1, -1):
b = (entry[0] >> idx) & 1
if isinstance(parent[b], bytes):
raise InvalidEncodingException('Huffman unique prefix violation :/') # noqa: E501
if idx == 0:
parent[b] = chb(i) if i < 256 else EOS()
elif parent[b] is None:
parent[b] = HuffmanNode(None, None)
parent = parent[b]
i += 1
def __init__(self, s):
# type: (str) -> None
self._s = s
i, ibl = type(self).huffman_encode(s)
self._encoded = type(self).huffman_conv2str(i, ibl)
def __str__(self):
# type: () -> str
return self._encoded
def origin(self):
# type: () -> str
return plain_str(self._s)
def __len__(self):
# type: () -> int
return len(self._encoded)
class HPackStrLenField(fields.Field):
""" HPackStrLenField is a StrLenField variant specialized for HTTP/2 HPack
This variant uses an internal representation that implements HPackStringsInterface. # noqa: E501
"""
__slots__ = ['_length_from', '_type_from']
def __init__(self, name, default, length_from, type_from):
# type: (str, HPackStringsInterface, Callable[[packet.Packet], int], str) -> None # noqa: E501
super(HPackStrLenField, self).__init__(name, default)
self._length_from = length_from
self._type_from = type_from
def addfield(self, pkt, s, val):
# type: (Optional[packet.Packet], str, HPackStringsInterface) -> str
return s + self.i2m(pkt, val)
@staticmethod
def _parse(t, s):
# type: (bool, str) -> HPackStringsInterface
"""
:param bool t: whether this string is a huffman compressed string.
:param str s: the string to parse.
:return: HPackStringsInterface: either a HPackLiteralString or HPackZString, depending on t. # noqa: E501
:raises: InvalidEncodingException
"""
if t:
i, ibl = HPackZString.huffman_conv2bitstring(s)
return HPackZString(HPackZString.huffman_decode(i, ibl))
return HPackLiteralString(s)
def getfield(self, pkt, s):
# type: (packet.Packet, str) -> Tuple[str, HPackStringsInterface]
"""
:param packet.Packet pkt: the packet instance containing this field instance. # noqa: E501
:param str s: the string to parse this field from.
:return: (str, HPackStringsInterface): the remaining string after this field was carved out & the extracted # noqa: E501
value.
:raises: KeyError if "type_from" is not a field of pkt or its payloads.
:raises: InvalidEncodingException
"""
tmp_len = self._length_from(pkt)
t = pkt.getfieldval(self._type_from) == 1
return s[tmp_len:], self._parse(t, s[:tmp_len])
def i2h(self, pkt, x):
# type: (Optional[packet.Packet], HPackStringsInterface) -> str
fmt = ''
if isinstance(x, HPackLiteralString):
fmt = "HPackLiteralString({})"
elif isinstance(x, HPackZString):
fmt = "HPackZString({})"
return fmt.format(x.origin())
def h2i(self, pkt, x):
# type: (packet.Packet, str) -> HPackStringsInterface
return HPackLiteralString(x)
def m2i(self, pkt, x):
# type: (packet.Packet, str) -> HPackStringsInterface
"""
:param packet.Packet pkt: the packet instance containing this field instance. # noqa: E501
:param str x: the string to parse.
:return: HPackStringsInterface: the internal type of the value parsed from x. # noqa: E501
:raises: AssertionError
:raises: InvalidEncodingException
:raises: KeyError if _type_from is not one of pkt fields.
"""
t = pkt.getfieldval(self._type_from)
tmp_len = self._length_from(pkt)
assert t is not None and tmp_len is not None, 'Conversion from string impossible: no type or length specified' # noqa: E501
return self._parse(t == 1, x[:tmp_len])
def any2i(self, pkt, x):
# type: (Optional[packet.Packet], Union[str, HPackStringsInterface]) -> HPackStringsInterface # noqa: E501
"""
:param packet.Packet|None pkt: the packet instance containing this field instance. # noqa: E501
:param str|HPackStringsInterface x: the value to convert
:return: HPackStringsInterface: the Scapy internal value for this field
:raises: AssertionError, InvalidEncodingException
"""
if isinstance(x, bytes):
assert(isinstance(pkt, packet.Packet))
return self.m2i(pkt, x)
assert(isinstance(x, HPackStringsInterface))
return x
def i2m(self, pkt, x):
# type: (Optional[packet.Packet], HPackStringsInterface) -> str
return raw(x)
def i2len(self, pkt, x):
# type: (Optional[packet.Packet], HPackStringsInterface) -> int
return len(x)
def i2repr(self, pkt, x):
# type: (Optional[packet.Packet], HPackStringsInterface) -> str
return repr(self.i2h(pkt, x))
###############################################################################
# HPACK Packets #
###############################################################################
class HPackHdrString(packet.Packet):
""" HPackHdrString is a packet that that is serialized into a RFC7541 par5.2
string literal repr.
"""
name = 'HPack Header String'
fields_desc = [
fields.BitEnumField('type', None, 1, {0: 'Literal', 1: 'Compressed'}),
FieldUVarLenField('len', None, 7, length_of='data'),
HPackStrLenField(
'data', HPackLiteralString(''),
length_from=lambda pkt: pkt.getfieldval('len'),
type_from='type'
)
]
def guess_payload_class(self, payload):
# type: (str) -> Packet_metaclass
# Trick to tell scapy that the remaining bytes of the currently
# dissected string is not a payload of this packet but of some other
# underlayer packet
return config.conf.padding_layer
def self_build(self, field_pos_list=None):
# type: (Any) -> str
"""self_build is overridden because type and len are determined at
build time, based on the "data" field internal type
"""
if self.getfieldval('type') is None:
self.type = 1 if isinstance(self.getfieldval('data'), HPackZString) else 0 # noqa: E501
return super(HPackHdrString, self).self_build(field_pos_list)
class HPackHeaders(packet.Packet):
"""HPackHeaders uses the "dispatch_hook" trick of Packet_metaclass to select
the correct HPack header packet type. For this, the first byte of the string # noqa: E501
to dissect is snooped on.
"""
@classmethod
def dispatch_hook(cls, s=None, *_args, **_kwds):
# type: (Optional[str], *Any, **Any) -> Packet_metaclass
"""dispatch_hook returns the subclass of HPackHeaders that must be used
to dissect the string.
"""
if s is None:
return config.conf.raw_layer
fb = orb(s[0])
if fb & 0x80 != 0:
return HPackIndexedHdr
if fb & 0x40 != 0:
return HPackLitHdrFldWithIncrIndexing
if fb & 0x20 != 0:
return HPackDynamicSizeUpdate
return HPackLitHdrFldWithoutIndexing
def guess_payload_class(self, payload):
# type: (str) -> Packet_metaclass
return config.conf.padding_layer
class HPackIndexedHdr(HPackHeaders):
""" HPackIndexedHdr implements RFC 7541 par6.1
"""
name = 'HPack Indexed Header Field'
fields_desc = [
HPackMagicBitField('magic', 1, 1),
UVarIntField('index', 2, 7) # Default "2" is ":method GET"
]
class HPackLitHdrFldWithIncrIndexing(HPackHeaders):
""" HPackLitHdrFldWithIncrIndexing implements RFC 7541 par6.2.1
"""
name = 'HPack Literal Header With Incremental Indexing'
fields_desc = [
HPackMagicBitField('magic', 1, 2),
UVarIntField('index', 0, 6), # Default is New Name
fields.ConditionalField(
fields.PacketField('hdr_name', None, HPackHdrString),
lambda pkt: pkt.getfieldval('index') == 0
),
fields.PacketField('hdr_value', None, HPackHdrString)
]
class HPackLitHdrFldWithoutIndexing(HPackHeaders):
""" HPackLitHdrFldWithIncrIndexing implements RFC 7541 par6.2.2
and par6.2.3
"""
name = 'HPack Literal Header Without Indexing (or Never Indexing)'
fields_desc = [
HPackMagicBitField('magic', 0, 3),
fields.BitEnumField(
'never_index', 0, 1,
{0: "Don't Index", 1: 'Never Index'}
),
UVarIntField('index', 0, 4), # Default is New Name
fields.ConditionalField(
fields.PacketField('hdr_name', None, HPackHdrString),
lambda pkt: pkt.getfieldval('index') == 0
),
fields.PacketField('hdr_value', None, HPackHdrString)
]
class HPackDynamicSizeUpdate(HPackHeaders):
""" HPackDynamicSizeUpdate implements RFC 7541 par6.3
"""
name = 'HPack Dynamic Size Update'
fields_desc = [
HPackMagicBitField('magic', 1, 3),
UVarIntField('max_size', 0, 5)
]
###############################################################################
# HTTP/2 Frames #
###############################################################################
class H2FramePayload(packet.Packet):
""" H2FramePayload is an empty class that is a super class of all Scapy
HTTP/2 Frame Packets
"""
# HTTP/2 Data Frame Packets # # noqa: E501
class H2DataFrame(H2FramePayload):
""" H2DataFrame implements RFC7540 par6.1
This packet is the Data Frame to use when there is no padding.
"""
type_id = 0
END_STREAM_FLAG = 0 # 0x1
PADDED_FLAG = 3 # 0x8
flags = {
END_STREAM_FLAG: fields.MultiFlagsEntry('ES', 'End Stream'),
PADDED_FLAG: fields.MultiFlagsEntry('P', 'Padded')
}
name = 'HTTP/2 Data Frame'
fields_desc = [
fields.StrField('data', '')
]
class H2PaddedDataFrame(H2DataFrame):
""" H2DataFrame implements RFC7540 par6.1
This packet is the Data Frame to use when there is padding.
"""
__slots__ = ['s_len']
name = 'HTTP/2 Padded Data Frame'
fields_desc = [
fields.FieldLenField('padlen', None, length_of='padding', fmt="B"),
fields.StrLenField('data', '',
length_from=lambda pkt: pkt.get_data_len()
),
fields.StrLenField('padding', '',
length_from=lambda pkt: pkt.getfieldval('padlen')
)
]
def get_data_len(self):
# type: () -> int
""" get_data_len computes the length of the data field
To do this computation, the length of the padlen field and the actual
padding is subtracted to the string that was provided to the pre_dissect # noqa: E501
fun of the pkt parameter
:return: int; length of the data part of the HTTP/2 frame packet provided as parameter # noqa: E501
:raises: AssertionError
"""
padding_len = self.getfieldval('padlen')
fld, fval = self.getfield_and_val('padlen')
padding_len_len = fld.i2len(self, fval)
ret = self.s_len - padding_len_len - padding_len
assert(ret >= 0)
return ret
def pre_dissect(self, s):
# type: (str) -> str
"""pre_dissect is filling the s_len property of this instance. This
property is later used during the getfield call of the "data" field when # noqa: E501
trying to evaluate the length of the StrLenField! This "trick" works
because the underlayer packet (H2Frame) is assumed to override the
"extract_padding" method and to only provide to this packet the data
necessary for this packet. Tricky, tricky, will break some day probably! # noqa: E501
"""
self.s_len = len(s)
return s
# HTTP/2 Header Frame Packets # # noqa: E501
class H2AbstractHeadersFrame(H2FramePayload):
"""Superclass of all variants of HTTP/2 Header Frame Packets.
May be used for type checking.
"""
class H2HeadersFrame(H2AbstractHeadersFrame):
""" H2HeadersFrame implements RFC 7540 par6.2 Headers Frame
when there is no padding and no priority information
The choice of decomposing into four classes is probably preferable to having # noqa: E501
numerous conditional fields based on the underlayer :/
"""
type_id = 1
END_STREAM_FLAG = 0 # 0x1
END_HEADERS_FLAG = 2 # 0x4
PADDED_FLAG = 3 # 0x8
PRIORITY_FLAG = 5 # 0x20
flags = {
END_STREAM_FLAG: fields.MultiFlagsEntry('ES', 'End Stream'),
END_HEADERS_FLAG: fields.MultiFlagsEntry('EH', 'End Headers'),
PADDED_FLAG: fields.MultiFlagsEntry('P', 'Padded'),
PRIORITY_FLAG: fields.MultiFlagsEntry('+', 'Priority')
}
name = 'HTTP/2 Headers Frame'
fields_desc = [
fields.PacketListField('hdrs', [], HPackHeaders)
]
class H2PaddedHeadersFrame(H2AbstractHeadersFrame):
""" H2PaddedHeadersFrame is the variant of H2HeadersFrame where padding flag
is set and priority flag is cleared
"""
__slots__ = ['s_len']
name = 'HTTP/2 Headers Frame with Padding'
fields_desc = [
fields.FieldLenField('padlen', None, length_of='padding', fmt='B'),
fields.PacketListField('hdrs', [], HPackHeaders,
length_from=lambda pkt: pkt.get_hdrs_len()
),
fields.StrLenField('padding', '',
length_from=lambda pkt: pkt.getfieldval('padlen')
)
]
def get_hdrs_len(self):
# type: () -> int
""" get_hdrs_len computes the length of the hdrs field
To do this computation, the length of the padlen field and the actual
padding is subtracted to the string that was provided to the pre_dissect # noqa: E501
fun of the pkt parameter.
:return: int; length of the data part of the HTTP/2 frame packet provided as parameter # noqa: E501
:raises: AssertionError
"""
padding_len = self.getfieldval('padlen')
fld, fval = self.getfield_and_val('padlen')
padding_len_len = fld.i2len(self, fval)
ret = self.s_len - padding_len_len - padding_len
assert(ret >= 0)
return ret
def pre_dissect(self, s):
# type: (str) -> str
"""pre_dissect is filling the s_len property of this instance. This
property is later used during the parsing of the hdrs PacketListField
when trying to evaluate the length of the PacketListField! This "trick"
works because the underlayer packet (H2Frame) is assumed to override the # noqa: E501
"extract_padding" method and to only provide to this packet the data
necessary for this packet. Tricky, tricky, will break some day probably! # noqa: E501
"""
self.s_len = len(s)
return s
class H2PriorityHeadersFrame(H2AbstractHeadersFrame):
""" H2PriorityHeadersFrame is the variant of H2HeadersFrame where priority flag
is set and padding flag is cleared
"""
__slots__ = ['s_len']
name = 'HTTP/2 Headers Frame with Priority'
fields_desc = [
fields.BitField('exclusive', 0, 1),
fields.BitField('stream_dependency', 0, 31),
fields.ByteField('weight', 0),
# This PacketListField will consume all remaining bytes; not a problem
# because the underlayer (H2Frame) overrides "extract_padding" so that
# this Packet only get to parser what it needs to
fields.PacketListField('hdrs', [], HPackHeaders),
]
class H2PaddedPriorityHeadersFrame(H2AbstractHeadersFrame):
""" H2PaddedPriorityHeadersFrame is the variant of H2HeadersFrame where
both priority and padding flags are set
"""
__slots__ = ['s_len']
name = 'HTTP/2 Headers Frame with Padding and Priority'
fields_desc = [
fields.FieldLenField('padlen', None, length_of='padding', fmt='B'),
fields.BitField('exclusive', 0, 1),
fields.BitField('stream_dependency', 0, 31),
fields.ByteField('weight', 0),
fields.PacketListField('hdrs', [], HPackHeaders,
length_from=lambda pkt: pkt.get_hdrs_len()
),
fields.StrLenField('padding', '',
length_from=lambda pkt: pkt.getfieldval('padlen')
)
]
def get_hdrs_len(self):
# type: () -> int
""" get_hdrs_len computes the length of the hdrs field
To do this computation, the length of the padlen field, the priority
information fields and the actual padding is subtracted to the string
that was provided to the pre_dissect fun of the pkt parameter.
:return: int: the length of the hdrs field
:raises: AssertionError
"""
padding_len = self.getfieldval('padlen')
fld, fval = self.getfield_and_val('padlen')
padding_len_len = fld.i2len(self, fval)
bit_cnt = self.get_field('exclusive').size
bit_cnt += self.get_field('stream_dependency').size
fld, fval = self.getfield_and_val('weight')
weight_len = fld.i2len(self, fval)
ret = int(self.s_len -
padding_len_len -
padding_len -
(bit_cnt / 8) -
weight_len
)
assert(ret >= 0)
return ret
def pre_dissect(self, s):
# type: (str) -> str
"""pre_dissect is filling the s_len property of this instance. This
property is later used during the parsing of the hdrs PacketListField
when trying to evaluate the length of the PacketListField! This "trick"
works because the underlayer packet (H2Frame) is assumed to override the # noqa: E501
"extract_padding" method and to only provide to this packet the data
necessary for this packet. Tricky, tricky, will break some day probably! # noqa: E501
"""
self.s_len = len(s)
return s
# HTTP/2 Priority Frame Packets # # noqa: E501
class H2PriorityFrame(H2FramePayload):
""" H2PriorityFrame implements RFC 7540 par6.3
"""
type_id = 2
name = 'HTTP/2 Priority Frame'
fields_desc = [
fields.BitField('exclusive', 0, 1),
fields.BitField('stream_dependency', 0, 31),
fields.ByteField('weight', 0)
]
# HTTP/2 Errors # # noqa: E501
class H2ErrorCodes(object):
""" H2ErrorCodes is an enumeration of the error codes defined in
RFC7540 par7.
This enumeration is not part of any frame because the error codes are in
common with H2ResetFrame and H2GoAwayFrame.
"""
NO_ERROR = 0x0
PROTOCOL_ERROR = 0x1
INTERNAL_ERROR = 0x2
FLOW_CONTROL_ERROR = 0x3
SETTINGS_TIMEOUT = 0x4
STREAM_CLOSED = 0x5
FRAME_SIZE_ERROR = 0x6
REFUSED_STREAM = 0x7
CANCEL = 0x8
COMPRESSION_ERROR = 0x9
CONNECT_ERROR = 0xa
ENHANCE_YOUR_CALM = 0xb
INADEQUATE_SECURITY = 0xc
HTTP_1_1_REQUIRED = 0xd
literal = {
NO_ERROR: 'No error',
PROTOCOL_ERROR: 'Protocol error',
INTERNAL_ERROR: 'Internal error',
FLOW_CONTROL_ERROR: 'Flow control error',
SETTINGS_TIMEOUT: 'Settings timeout',
STREAM_CLOSED: 'Stream closed',
FRAME_SIZE_ERROR: 'Frame size error',
REFUSED_STREAM: 'Refused stream',
CANCEL: 'Cancel',
COMPRESSION_ERROR: 'Compression error',
CONNECT_ERROR: 'Control error',
ENHANCE_YOUR_CALM: 'Enhance your calm',
INADEQUATE_SECURITY: 'Inadequate security',
HTTP_1_1_REQUIRED: 'HTTP/1.1 required'
}
# HTTP/2 Reset Frame Packets # # noqa: E501
class H2ResetFrame(H2FramePayload):
""" H2ResetFrame implements RFC 7540 par6.4
"""
type_id = 3
name = 'HTTP/2 Reset Frame'
fields_desc = [
fields.EnumField('error', 0, H2ErrorCodes.literal, fmt='!I')
]
# HTTP/2 Settings Frame Packets # # noqa: E501
class H2Setting(packet.Packet):
""" H2Setting implements a setting, as defined in RFC7540 par6.5.1
"""
SETTINGS_HEADER_TABLE_SIZE = 0x1
SETTINGS_ENABLE_PUSH = 0x2
SETTINGS_MAX_CONCURRENT_STREAMS = 0x3
SETTINGS_INITIAL_WINDOW_SIZE = 0x4
SETTINGS_MAX_FRAME_SIZE = 0x5
SETTINGS_MAX_HEADER_LIST_SIZE = 0x6
name = 'HTTP/2 Setting'
fields_desc = [
fields.EnumField('id', 0, {
SETTINGS_HEADER_TABLE_SIZE: 'Header table size',
SETTINGS_ENABLE_PUSH: 'Enable push',
SETTINGS_MAX_CONCURRENT_STREAMS: 'Max concurrent streams',
SETTINGS_INITIAL_WINDOW_SIZE: 'Initial window size',
SETTINGS_MAX_FRAME_SIZE: 'Max frame size',
SETTINGS_MAX_HEADER_LIST_SIZE: 'Max header list size'
}, fmt='!H'),
fields.IntField('value', 0)
]
def guess_payload_class(self, payload):
# type: (str) -> Packet_metaclass
return config.conf.padding_layer
class H2SettingsFrame(H2FramePayload):
""" H2SettingsFrame implements RFC7540 par6.5
"""
type_id = 4
ACK_FLAG = 0 # 0x1
flags = {
ACK_FLAG: fields.MultiFlagsEntry('A', 'ACK')
}
name = 'HTTP/2 Settings Frame'
fields_desc = [
fields.PacketListField('settings', [], H2Setting)
]
def __init__(self, *args, **kwargs):
"""__init__ initializes this H2SettingsFrame
If a _pkt arg is provided (by keyword), then this is an initialization
from a string to dissect and therefore the length of the string to
dissect have distinctive characteristics that we might want to check.
This is possible because the underlayer packet (H2Frame) overrides
extract_padding method to provided only the string that must be parsed
by this packet!
:raises: AssertionError
"""
# RFC7540 par6.5 p36
assert(
len(args) == 0 or (
isinstance(args[0], bytes) and
len(args[0]) % 6 == 0
)
), 'Invalid settings frame; length is not a multiple of 6'
super(H2SettingsFrame, self).__init__(*args, **kwargs)
# HTTP/2 Push Promise Frame Packets # # noqa: E501
class H2PushPromiseFrame(H2FramePayload):
""" H2PushPromiseFrame implements RFC7540 par6.6. This packet
is the variant to use when the underlayer padding flag is cleared
"""
type_id = 5
END_HEADERS_FLAG = 2 # 0x4
PADDED_FLAG = 3 # 0x8
flags = {
END_HEADERS_FLAG: fields.MultiFlagsEntry('EH', 'End Headers'),
PADDED_FLAG: fields.MultiFlagsEntry('P', 'Padded')
}
name = 'HTTP/2 Push Promise Frame'
fields_desc = [
fields.BitField('reserved', 0, 1),
fields.BitField('stream_id', 0, 31),
fields.PacketListField('hdrs', [], HPackHeaders)
]
class H2PaddedPushPromiseFrame(H2PushPromiseFrame):
""" H2PaddedPushPromiseFrame implements RFC7540 par6.6. This
packet is the variant to use when the underlayer padding flag is set
"""
__slots__ = ['s_len']
name = 'HTTP/2 Padded Push Promise Frame'
fields_desc = [
fields.FieldLenField('padlen', None, length_of='padding', fmt='B'),
fields.BitField('reserved', 0, 1),
fields.BitField('stream_id', 0, 31),
fields.PacketListField('hdrs', [], HPackHeaders,
length_from=lambda pkt: pkt.get_hdrs_len()
),
fields.StrLenField('padding', '',
length_from=lambda pkt: pkt.getfieldval('padlen')
)
]
def get_hdrs_len(self):
# type: () -> int
""" get_hdrs_len computes the length of the hdrs field
To do this computation, the length of the padlen field, reserved,
stream_id and the actual padding is subtracted to the string that was
provided to the pre_dissect fun of the pkt parameter.
:return: int: the length of the hdrs field
:raises: AssertionError
"""
fld, padding_len = self.getfield_and_val('padlen')
padding_len_len = fld.i2len(self, padding_len)
bit_len = self.get_field('reserved').size
bit_len += self.get_field('stream_id').size
ret = int(self.s_len -
padding_len_len -
padding_len -
(bit_len / 8)
)
assert(ret >= 0)
return ret
def pre_dissect(self, s):
# type: (str) -> str
"""pre_dissect is filling the s_len property of this instance. This
property is later used during the parsing of the hdrs PacketListField
when trying to evaluate the length of the PacketListField! This "trick"
works because the underlayer packet (H2Frame) is assumed to override the # noqa: E501
"extract_padding" method and to only provide to this packet the data
necessary for this packet. Tricky, tricky, will break some day probably! # noqa: E501
"""
self.s_len = len(s)
return s
# HTTP/2 Ping Frame Packets # # noqa: E501
class H2PingFrame(H2FramePayload):
""" H2PingFrame implements the RFC 7540 par6.7
"""
type_id = 6
ACK_FLAG = 0 # 0x1
flags = {
ACK_FLAG: fields.MultiFlagsEntry('A', 'ACK')
}
name = 'HTTP/2 Ping Frame'
fields_desc = [
fields.LongField('opaque', 0)
]
def __init__(self, *args, **kwargs):
"""
:raises: AssertionError
"""
# RFC7540 par6.7 p42
assert(
len(args) == 0 or (
(isinstance(args[0], bytes) or
isinstance(args[0], str)) and
len(args[0]) == 8
)
), 'Invalid ping frame; length is not 8'
super(H2PingFrame, self).__init__(*args, **kwargs)
# HTTP/2 GoAway Frame Packets # # noqa: E501
class H2GoAwayFrame(H2FramePayload):
""" H2GoAwayFrame implements the RFC 7540 par6.8
"""
type_id = 7
name = 'HTTP/2 Go Away Frame'
fields_desc = [
fields.BitField('reserved', 0, 1),
fields.BitField('last_stream_id', 0, 31),
fields.EnumField('error', 0, H2ErrorCodes.literal, fmt='!I'),
fields.StrField('additional_data', '')
]
# HTTP/2 Window Update Frame Packets # # noqa: E501
class H2WindowUpdateFrame(H2FramePayload):
""" H2WindowUpdateFrame implements the RFC 7540 par6.9
"""
type_id = 8
name = 'HTTP/2 Window Update Frame'
fields_desc = [
fields.BitField('reserved', 0, 1),
fields.BitField('win_size_incr', 0, 31)
]
def __init__(self, *args, **kwargs):
"""
:raises: AssertionError
"""
# RFC7540 par6.9 p46
assert(
len(args) == 0 or (
(isinstance(args[0], bytes) or
isinstance(args[0], str)) and
len(args[0]) == 4
)
), 'Invalid window update frame; length is not 4'
super(H2WindowUpdateFrame, self).__init__(*args, **kwargs)
# HTTP/2 Continuation Frame Packets # # noqa: E501
class H2ContinuationFrame(H2FramePayload):
""" H2ContinuationFrame implements the RFC 7540 par6.10
"""
type_id = 9
END_HEADERS_FLAG = 2 # Ox4
flags = {
END_HEADERS_FLAG: fields.MultiFlagsEntry('EH', 'End Headers')
}
name = 'HTTP/2 Continuation Frame'
fields_desc = [
fields.PacketListField('hdrs', [], HPackHeaders)
]
# HTTP/2 Base Frame Packets # # noqa: E501
_HTTP2_types = {
0: 'DataFrm',
1: 'HdrsFrm',
2: 'PrioFrm',
3: 'RstFrm',
4: 'SetFrm',
5: 'PushFrm',
6: 'PingFrm',
7: 'GoawayFrm',
8: 'WinFrm',
9: 'ContFrm'
}
class H2Frame(packet.Packet):
""" H2Frame implements the frame structure as defined in RFC 7540 par4.1
This packet may have a payload (one of the H2FramePayload) or none, in some
rare cases such as settings acknowledgement)
"""
name = 'HTTP/2 Frame'
fields_desc = [
fields.X3BytesField('len', None),
fields.EnumField('type', None, _HTTP2_types, "b"),
fields.MultiFlagsField('flags', set(), 8, {
H2DataFrame.type_id: H2DataFrame.flags,
H2HeadersFrame.type_id: H2HeadersFrame.flags,
H2PushPromiseFrame.type_id: H2PushPromiseFrame.flags,
H2SettingsFrame.type_id: H2SettingsFrame.flags,
H2PingFrame.type_id: H2PingFrame.flags,
H2ContinuationFrame.type_id: H2ContinuationFrame.flags,
},
depends_on=lambda pkt: pkt.getfieldval('type')
),
fields.BitField('reserved', 0, 1),
fields.BitField('stream_id', 0, 31)
]
def guess_payload_class(self, payload):
# type: (str) -> Packet_metaclass
""" guess_payload_class returns the Class object to use for parsing a payload
This function uses the H2Frame.type field value to decide which payload to parse. The implement cannot be # noqa: E501
performed using the simple bind_layers helper because sometimes the selection of which Class object to return # noqa: E501
also depends on the H2Frame.flags value.
:param payload:
:return::
"""
if len(payload) == 0:
return packet.NoPayload
t = self.getfieldval('type')
if t == H2DataFrame.type_id:
if H2DataFrame.flags[H2DataFrame.PADDED_FLAG].short in self.getfieldval('flags'): # noqa: E501
return H2PaddedDataFrame
return H2DataFrame
if t == H2HeadersFrame.type_id:
if H2HeadersFrame.flags[H2HeadersFrame.PADDED_FLAG].short in self.getfieldval('flags'): # noqa: E501
if H2HeadersFrame.flags[H2HeadersFrame.PRIORITY_FLAG].short in self.getfieldval('flags'): # noqa: E501
return H2PaddedPriorityHeadersFrame
else:
return H2PaddedHeadersFrame
elif H2HeadersFrame.flags[H2HeadersFrame.PRIORITY_FLAG].short in self.getfieldval('flags'): # noqa: E501
return H2PriorityHeadersFrame
return H2HeadersFrame
if t == H2PriorityFrame.type_id:
return H2PriorityFrame
if t == H2ResetFrame.type_id:
return H2ResetFrame
if t == H2SettingsFrame.type_id:
return H2SettingsFrame
if t == H2PushPromiseFrame.type_id:
if H2PushPromiseFrame.flags[H2PushPromiseFrame.PADDED_FLAG].short in self.getfieldval('flags'): # noqa: E501
return H2PaddedPushPromiseFrame
return H2PushPromiseFrame
if t == H2PingFrame.type_id:
return H2PingFrame
if t == H2GoAwayFrame.type_id:
return H2GoAwayFrame
if t == H2WindowUpdateFrame.type_id:
return H2WindowUpdateFrame
if t == H2ContinuationFrame.type_id:
return H2ContinuationFrame
return config.conf.padding_layer
def extract_padding(self, s):
# type: (str) -> Tuple[str, str]
"""
:param str s: the string from which to tell the padding and the payload data apart # noqa: E501
:return: (str, str): the padding and the payload data strings
:raises: AssertionError
"""
assert isinstance(self.len, six.integer_types) and self.len >= 0, 'Invalid length: negative len?' # noqa: E501
assert len(s) >= self.len, 'Invalid length: string too short for this length' # noqa: E501
return s[:self.len], s[self.len:]
def post_build(self, p, pay):
# type: (str, str) -> str
"""
:param str p: the stringified packet
:param str pay: the stringified payload
:return: str: the stringified packet and payload, with the packet length field "patched" # noqa: E501
:raises: AssertionError
"""
# This logic, while awkward in the post_build and more reasonable in
# a self_build is implemented here for performance tricks reason
if self.getfieldval('len') is None:
assert(len(pay) < (1 << 24)), 'Invalid length: payload is too long'
p = struct.pack('!L', len(pay))[1:] + p[3:]
return super(H2Frame, self).post_build(p, pay)
class H2Seq(packet.Packet):
""" H2Seq is a helper packet that contains several H2Frames and their
payload. This packet can be used, for instance, while reading manually from
a TCP socket.
"""
name = 'HTTP/2 Frame Sequence'
fields_desc = [
fields.PacketListField('frames', [], H2Frame)
]
def guess_payload_class(self, payload):
# type: (str) -> Packet_metaclass
return config.conf.padding_layer
packet.bind_layers(H2Frame, H2DataFrame, {'type': H2DataFrame.type_id})
packet.bind_layers(H2Frame, H2PaddedDataFrame, {'type': H2DataFrame.type_id})
packet.bind_layers(H2Frame, H2HeadersFrame, {'type': H2HeadersFrame.type_id})
packet.bind_layers(H2Frame, H2PaddedHeadersFrame, {'type': H2HeadersFrame.type_id}) # noqa: E501
packet.bind_layers(H2Frame, H2PriorityHeadersFrame, {'type': H2HeadersFrame.type_id}) # noqa: E501
packet.bind_layers(H2Frame, H2PaddedPriorityHeadersFrame, {'type': H2HeadersFrame.type_id}) # noqa: E501
packet.bind_layers(H2Frame, H2PriorityFrame, {'type': H2PriorityFrame.type_id})
packet.bind_layers(H2Frame, H2ResetFrame, {'type': H2ResetFrame.type_id})
packet.bind_layers(H2Frame, H2SettingsFrame, {'type': H2SettingsFrame.type_id})
packet.bind_layers(H2Frame, H2PingFrame, {'type': H2PingFrame.type_id})
packet.bind_layers(H2Frame, H2PushPromiseFrame, {'type': H2PushPromiseFrame.type_id}) # noqa: E501
packet.bind_layers(H2Frame, H2PaddedPushPromiseFrame, {'type': H2PaddedPushPromiseFrame.type_id}) # noqa: E501
packet.bind_layers(H2Frame, H2GoAwayFrame, {'type': H2GoAwayFrame.type_id})
packet.bind_layers(H2Frame, H2WindowUpdateFrame, {'type': H2WindowUpdateFrame.type_id}) # noqa: E501
packet.bind_layers(H2Frame, H2ContinuationFrame, {'type': H2ContinuationFrame.type_id}) # noqa: E501
# HTTP/2 Connection Preface # # noqa: E501
# From RFC 7540 par3.5
H2_CLIENT_CONNECTION_PREFACE = bytes_hex('505249202a20485454502f322e300d0a0d0a534d0d0a0d0a') # noqa: E501
###############################################################################
# HTTP/2 Helpers #
###############################################################################
class HPackHdrEntry(Sized):
""" HPackHdrEntry is an entry of the HPackHdrTable helper
Each HPackHdrEntry instance is a header line (name and value). Names are
normalized (lowercase), according to RFC 7540 par8.1.2
"""
__slots__ = ['_name', '_len', '_value']
def __init__(self, name, value):
# type: (str, str) -> None
"""
:raises: AssertionError
"""
assert(len(name) > 0)
self._name = name.lower()
self._value = value
# 32 bytes is an RFC-hardcoded value: see RFC 7541 par4.1
self._len = (32 + len(self._name) + len(self._value))
def name(self):
# type: () -> str
return self._name
def value(self):
# type: () -> str
return self._value
def size(self):
# type: () -> int
""" size returns the "length" of the header entry, as defined in
RFC 7541 par4.1.
"""
return self._len
__len__ = size
def __str__(self):
# type: () -> str
""" __str__ returns the header as it would be formatted in textual format
"""
if self._name.startswith(':'):
return "{} {}".format(self._name, self._value)
else:
return "{}: {}".format(self._name, self._value)
def __bytes__(self):
return bytes_encode(self.__str__())
class HPackHdrTable(Sized):
""" HPackHdrTable is a helper class that implements some of the logic
associated with indexing of headers (read and write operations in this
"registry". THe HPackHdrTable also implements convenience functions to easily # noqa: E501
convert to and from textual representation and binary representation of
a HTTP/2 requests
"""
__slots__ = [
'_dynamic_table',
'_dynamic_table_max_size',
'_dynamic_table_cap_size',
'_regexp'
]
"""
:var _dynamic_table: the list containing entries requested to be added by
the peer and registered with a register() call
:var _dynamic_table_max_size: the current maximum size of the dynamic table
in bytes. This value is updated with the Dynamic Table Size Update
messages defined in RFC 7541 par6.3
:var _dynamic_table_cap_size: the maximum size of the dynamic table in
bytes. This value is updated with the SETTINGS_HEADER_TABLE_SIZE HTTP/2
setting.
"""
# Manually imported from RFC 7541 Appendix A
_static_entries = {
1: HPackHdrEntry(':authority', ''),
2: HPackHdrEntry(':method', 'GET'),
3: HPackHdrEntry(':method', 'POST'),
4: HPackHdrEntry(':path', '/'),
5: HPackHdrEntry(':path', '/index.html'),
6: HPackHdrEntry(':scheme', 'http'),
7: HPackHdrEntry(':scheme', 'https'),
8: HPackHdrEntry(':status', '200'),
9: HPackHdrEntry(':status', '204'),
10: HPackHdrEntry(':status', '206'),
11: HPackHdrEntry(':status', '304'),
12: HPackHdrEntry(':status', '400'),
13: HPackHdrEntry(':status', '404'),
14: HPackHdrEntry(':status', '500'),
15: HPackHdrEntry('accept-charset', ''),
16: HPackHdrEntry('accept-encoding', 'gzip, deflate'),
17: HPackHdrEntry('accept-language', ''),
18: HPackHdrEntry('accept-ranges', ''),
19: HPackHdrEntry('accept', ''),
20: HPackHdrEntry('access-control-allow-origin', ''),
21: HPackHdrEntry('age', ''),
22: HPackHdrEntry('allow', ''),
23: HPackHdrEntry('authorization', ''),
24: HPackHdrEntry('cache-control', ''),
25: HPackHdrEntry('content-disposition', ''),
26: HPackHdrEntry('content-encoding', ''),
27: HPackHdrEntry('content-language', ''),
28: HPackHdrEntry('content-length', ''),
29: HPackHdrEntry('content-location', ''),
30: HPackHdrEntry('content-range', ''),
31: HPackHdrEntry('content-type', ''),
32: HPackHdrEntry('cookie', ''),
33: HPackHdrEntry('date', ''),
34: HPackHdrEntry('etag', ''),
35: HPackHdrEntry('expect', ''),
36: HPackHdrEntry('expires', ''),
37: HPackHdrEntry('from', ''),
38: HPackHdrEntry('host', ''),
39: HPackHdrEntry('if-match', ''),
40: HPackHdrEntry('if-modified-since', ''),
41: HPackHdrEntry('if-none-match', ''),
42: HPackHdrEntry('if-range', ''),
43: HPackHdrEntry('if-unmodified-since', ''),
44: HPackHdrEntry('last-modified', ''),
45: HPackHdrEntry('link', ''),
46: HPackHdrEntry('location', ''),
47: HPackHdrEntry('max-forwards', ''),
48: HPackHdrEntry('proxy-authenticate', ''),
49: HPackHdrEntry('proxy-authorization', ''),
50: HPackHdrEntry('range', ''),
51: HPackHdrEntry('referer', ''),
52: HPackHdrEntry('refresh', ''),
53: HPackHdrEntry('retry-after', ''),
54: HPackHdrEntry('server', ''),
55: HPackHdrEntry('set-cookie', ''),
56: HPackHdrEntry('strict-transport-security', ''),
57: HPackHdrEntry('transfer-encoding', ''),
58: HPackHdrEntry('user-agent', ''),
59: HPackHdrEntry('vary', ''),
60: HPackHdrEntry('via', ''),
61: HPackHdrEntry('www-authenticate', ''),
}
# The value of this variable cannot be determined at declaration time. It is # noqa: E501
# initialized by an init_static_table call
_static_entries_last_idx = None # type: int
@classmethod
def init_static_table(cls):
# type: () -> None
cls._static_entries_last_idx = max(cls._static_entries)
def __init__(self, dynamic_table_max_size=4096, dynamic_table_cap_size=4096): # noqa: E501
# type: (int, int) -> None
"""
:param int dynamic_table_max_size: the current maximum size of the dynamic entry table in bytes # noqa: E501
:param int dynamic_table_cap_size: the maximum-maximum size of the dynamic entry table in bytes # noqa: E501
:raises:s AssertionError
"""
self._regexp = None # type: Pattern
if isinstance(type(self)._static_entries_last_idx, type(None)):
type(self).init_static_table()
assert dynamic_table_max_size <= dynamic_table_cap_size, \
'EINVAL: dynamic_table_max_size too large; expected value is less or equal to dynamic_table_cap_size' # noqa: E501
self._dynamic_table = [] # type: List[HPackHdrEntry]
self._dynamic_table_max_size = dynamic_table_max_size
self._dynamic_table_cap_size = dynamic_table_cap_size
def __getitem__(self, idx):
# type: (int) -> HPackHdrEntry
"""Gets an element from the header tables (static or dynamic indifferently)
:param int idx: the index number of the entry to retrieve. If the index
value is superior to the last index of the static entry table, then the
dynamic entry type is requested, following the procedure described in
RFC 7541 par2.3.3
:return: HPackHdrEntry: the entry defined at this requested index. If the entry does not exist, KeyError is # noqa: E501
raised
:raises: KeyError, AssertionError
"""
assert(idx >= 0)
if idx > type(self)._static_entries_last_idx:
idx -= type(self)._static_entries_last_idx + 1
if idx >= len(self._dynamic_table):
raise KeyError(
'EINVAL: idx: out-of-bound read: {}; maximum index: {}'.format(idx, len(self._dynamic_table)) # noqa: E501
)
return self._dynamic_table[idx]
return type(self)._static_entries[idx]
def resize(self, ns):
# type: (int) -> None
"""Resize the dynamic table. If the new size (ns) must be between 0 and
the cap size. If the new size is lower than the current size of the
dynamic table, entries are evicted.
:param int ns: the new size of the dynamic table
:raises: AssertionError
"""
assert 0 <= ns <= self._dynamic_table_cap_size, \
'EINVAL: ns: out-of-range value; expected value is in the range [0;{}['.format(self._dynamic_table_cap_size) # noqa: E501
old_size = self._dynamic_table_max_size
self._dynamic_table_max_size = ns
if old_size > self._dynamic_table_max_size:
self._reduce_dynamic_table()
def recap(self, nc):
# type: (int) -> None
"""recap changes the maximum size limit of the dynamic table. It also
proceeds to a resize(), if the new size is lower than the previous one.
:param int nc: the new cap of the dynamic table (that is the maximum-maximum size) # noqa: E501
:raises: AssertionError
"""
assert(nc >= 0)
t = self._dynamic_table_cap_size > nc
self._dynamic_table_cap_size = nc
if t:
# The RFC is not clear about whether this resize should happen;
# we do it anyway
self.resize(nc)
def _reduce_dynamic_table(self, new_entry_size=0):
# type: (int) -> None
"""_reduce_dynamic_table evicts entries from the dynamic table until it
fits in less than the current size limit. The optional parameter,
new_entry_size, allows the resize to happen so that a new entry of this
size fits in.
:param int new_entry_size: if called before adding a new entry, the size of the new entry in bytes (following # noqa: E501
the RFC7541 definition of the size of an entry)
:raises: AssertionError
"""
assert(new_entry_size >= 0)
cur_sz = len(self)
dyn_tbl_sz = len(self._dynamic_table)
while dyn_tbl_sz > 0 and cur_sz + new_entry_size > self._dynamic_table_max_size: # noqa: E501
last_elmt_sz = len(self._dynamic_table[-1])
self._dynamic_table.pop()
dyn_tbl_sz -= 1
cur_sz -= last_elmt_sz
def register(self, hdrs):
# type: (Union[HPackLitHdrFldWithIncrIndexing, H2Frame, List[HPackHeaders]]) -> None # noqa: E501
"""register adds to this table the instances of
HPackLitHdrFldWithIncrIndexing provided as parameters.
A H2Frame with a H2HeadersFrame payload can be provided, as much as a
python list of HPackHeaders or a single HPackLitHdrFldWithIncrIndexing
instance.
:param HPackLitHdrFldWithIncrIndexing|H2Frame|list of HPackHeaders hdrs: the header(s) to register # noqa: E501
:raises: AssertionError
"""
if isinstance(hdrs, H2Frame):
hdrs = [hdr for hdr in hdrs.payload.hdrs if isinstance(hdr, HPackLitHdrFldWithIncrIndexing)] # noqa: E501
elif isinstance(hdrs, HPackLitHdrFldWithIncrIndexing):
hdrs = [hdrs]
else:
hdrs = [hdr for hdr in hdrs if isinstance(hdr, HPackLitHdrFldWithIncrIndexing)] # noqa: E501
for hdr in hdrs:
if hdr.index == 0:
hdr_name = hdr.hdr_name.getfieldval('data').origin()
else:
idx = int(hdr.index)
hdr_name = self[idx].name()
hdr_value = hdr.hdr_value.getfieldval('data').origin()
# Note: we do not delete any existing hdrentry with the same names
# and values, as dictated by RFC 7541 par2.3.2
entry = HPackHdrEntry(hdr_name, hdr_value)
# According to RFC7541 par4.4, "Before a new entry is added to
# the dynamic table, entries are evicted
# from the end of the dynamic table until the size of the dynamic
# table is less than or equal to (maximum size - new entry size)
# or until the table is empty"
# Also, "It is not an error to attempt to add an entry that is
# larger than the maximum size; an attempt to add an entry larger
# than the maximum size causes the table to be emptied of all
# existing entries and results in an empty table"
# For this reason, we first call the _reduce_dynamic_table and
# then throw an assertion error if the new entry does not fit in
new_entry_len = len(entry)
self._reduce_dynamic_table(new_entry_len)
assert(new_entry_len <= self._dynamic_table_max_size)
self._dynamic_table.insert(0, entry)
def get_idx_by_name(self, name):
# type: (str) -> Optional[int]
""" get_idx_by_name returns the index of a matching registered header
This implementation will prefer returning a static entry index whenever
possible. If multiple matching header name are found in the static
table, there is insurance that the first entry (lowest index number)
will be returned.
If no matching header is found, this method returns None.
"""
name = name.lower()
for key, val in six.iteritems(type(self)._static_entries):
if val.name() == name:
return key
for idx, val in enumerate(self._dynamic_table):
if val.name() == name:
return type(self)._static_entries_last_idx + idx + 1
return None
def get_idx_by_name_and_value(self, name, value):
# type: (str, str) -> Optional[int]
""" get_idx_by_name_and_value returns the index of a matching registered
header
This implementation will prefer returning a static entry index whenever
possible. If multiple matching headers are found in the dynamic table,
the lowest index is returned
If no matching header is found, this method returns None.
"""
name = name.lower()
for key, val in six.iteritems(type(self)._static_entries):
if val.name() == name and val.value() == value:
return key
for idx, val in enumerate(self._dynamic_table):
if val.name() == name and val.value() == value:
return type(self)._static_entries_last_idx + idx + 1
return None
def __len__(self):
# type: () -> int
""" __len__ returns the summed length of all dynamic entries
"""
return sum(len(x) for x in self._dynamic_table)
def gen_txt_repr(self, hdrs, register=True):
# type: (Union[H2Frame, List[HPackHeaders]], Optional[bool]) -> str
"""
gen_txt_repr returns a "textual" representation of the provided
headers.
The output of this function is compatible with the input of
parse_txt_hdrs.
:param H2Frame|list of HPackHeaders hdrs: the list of headers to
convert to textual representation.
:param bool: whether incremental headers should be added to the dynamic
table as we generate the text representation
:return: str: the textual representation of the provided headers
:raises: AssertionError
"""
lst = []
if isinstance(hdrs, H2Frame):
hdrs = hdrs.payload.hdrs
for hdr in hdrs:
try:
if isinstance(hdr, HPackIndexedHdr):
lst.append('{}'.format(self[hdr.index]))
elif isinstance(hdr, (
HPackLitHdrFldWithIncrIndexing,
HPackLitHdrFldWithoutIndexing
)):
if hdr.index != 0:
name = self[hdr.index].name()
else:
name = hdr.hdr_name.getfieldval('data').origin()
if name.startswith(':'):
lst.append(
'{} {}'.format(
name,
hdr.hdr_value.getfieldval('data').origin()
)
)
else:
lst.append(
'{}: {}'.format(
name,
hdr.hdr_value.getfieldval('data').origin()
)
)
if register and isinstance(hdr, HPackLitHdrFldWithIncrIndexing): # noqa: E501
self.register(hdr)
except KeyError as e: # raised when an index is out-of-bound
print(e)
continue
return '\n'.join(lst)
@staticmethod
def _optimize_header_length_and_packetify(s):
# type: (str) -> HPackHdrString
zs = HPackZString(s)
if len(zs) >= len(s):
return HPackHdrString(data=HPackLiteralString(s))
return HPackHdrString(data=zs)
def _convert_a_header_to_a_h2_header(self, hdr_name, hdr_value, is_sensitive, should_index): # noqa: E501
# type: (str, str, Callable[[str, str], bool], Callable[[str], bool]) -> Tuple[HPackHeaders, int] # noqa: E501
""" _convert_a_header_to_a_h2_header builds a HPackHeaders from a header
name and a value. It returns a HPackIndexedHdr whenever possible. If not, # noqa: E501
it returns a HPackLitHdrFldWithoutIndexing or a
HPackLitHdrFldWithIncrIndexing, based on the should_index callback.
HPackLitHdrFldWithoutIndexing is forced if the is_sensitive callback
returns True and its never_index bit is set.
"""
# If both name and value are already indexed
idx = self.get_idx_by_name_and_value(hdr_name, hdr_value)
if idx is not None:
return HPackIndexedHdr(index=idx), len(self[idx])
# The value is not indexed for this headers
_hdr_value = self._optimize_header_length_and_packetify(hdr_value)
# Searching if the header name is indexed
idx = self.get_idx_by_name(hdr_name)
if idx is not None:
if is_sensitive(
hdr_name,
_hdr_value.getfieldval('data').origin()
):
return HPackLitHdrFldWithoutIndexing(
never_index=1,
index=idx,
hdr_value=_hdr_value
), len(
HPackHdrEntry(
self[idx].name(),
_hdr_value.getfieldval('data').origin()
)
)
if should_index(hdr_name):
return HPackLitHdrFldWithIncrIndexing(
index=idx,
hdr_value=_hdr_value
), len(
HPackHdrEntry(
self[idx].name(),
_hdr_value.getfieldval('data').origin()
)
)
return HPackLitHdrFldWithoutIndexing(
index=idx,
hdr_value=_hdr_value
), len(
HPackHdrEntry(
self[idx].name(),
_hdr_value.getfieldval('data').origin()
)
)
_hdr_name = self._optimize_header_length_and_packetify(hdr_name)
if is_sensitive(
_hdr_name.getfieldval('data').origin(),
_hdr_value.getfieldval('data').origin()
):
return HPackLitHdrFldWithoutIndexing(
never_index=1,
index=0,
hdr_name=_hdr_name,
hdr_value=_hdr_value
), len(
HPackHdrEntry(
_hdr_name.getfieldval('data').origin(),
_hdr_value.getfieldval('data').origin()
)
)
if should_index(_hdr_name.getfieldval('data').origin()):
return HPackLitHdrFldWithIncrIndexing(
index=0,
hdr_name=_hdr_name,
hdr_value=_hdr_value
), len(
HPackHdrEntry(
_hdr_name.getfieldval('data').origin(),
_hdr_value.getfieldval('data').origin()
)
)
return HPackLitHdrFldWithoutIndexing(
index=0,
hdr_name=_hdr_name,
hdr_value=_hdr_value
), len(
HPackHdrEntry(
_hdr_name.getfieldval('data').origin(),
_hdr_value.getfieldval('data').origin()
)
)
def _parse_header_line(self, l):
# type: (str) -> Union[Tuple[None, None], Tuple[str, str]]
if self._regexp is None:
self._regexp = re.compile(br'^(?::([a-z\-0-9]+)|([a-z\-0-9]+):)\s+(.+)$') # noqa: E501
hdr_line = l.rstrip()
grp = self._regexp.match(hdr_line)
if grp is None or len(grp.groups()) != 3:
return None, None
if grp.group(1) is not None:
hdr_name = b':' + grp.group(1)
else:
hdr_name = grp.group(2)
return plain_str(hdr_name.lower()), plain_str(grp.group(3))
def parse_txt_hdrs(self,
s, # type: str
stream_id=1, # type: int
body=None, # type: Optional[str]
max_frm_sz=4096, # type: int
max_hdr_lst_sz=0, # type: int
is_sensitive=lambda n, v: False, # type: Callable[[str, str], bool] # noqa: E501
should_index=lambda x: False, # type: Callable[[str], bool] # noqa: E501
register=True, # type: bool
):
# type: (...) -> H2Seq
"""
parse_txt_hdrs parses headers expressed in text and converts them
into a series of H2Frames with the "correct" flags. A body can be
provided in which case, the data frames are added, bearing the End
Stream flag, instead of the H2HeadersFrame/H2ContinuationFrame.
The generated frames may respect max_frm_sz (SETTINGS_MAX_FRAME_SIZE)
and max_hdr_lst_sz (SETTINGS_MAX_HEADER_LIST_SIZE) if provided.
The headers are split into multiple headers fragment (and H2Frames)
to respect these limits. Also, a callback can be provided to tell if
a header should be never indexed (sensitive headers, such as cookies),
and another callback say if the header should be registered into the
index table at all.
For an header to be registered, the is_sensitive callback must return
False AND the should_index callback should return True. This is the
default behavior.
:param str s: the string to parse for headers
:param int stream_id: the stream id to use in the generated H2Frames
:param str/None body: the eventual body of the request, that is added
to the generated frames
:param int max_frm_sz: the maximum frame size. This is used to split
the headers and data frames according to the maximum frame size
negotiated for this connection.
:param int max_hdr_lst_sz: the maximum size of a "header fragment" as
defined in RFC7540
:param callable is_sensitive: callback that returns True if the
provided header is sensible and must be stored in a header packet
requesting this header never to be indexed
:param callable should_index: callback that returns True if the
provided header should be stored in a header packet requesting
indexation in the dynamic header table.
:param bool register: whether to register new headers with incremental
indexing as we parse them
:raises: Exception
"""
sio = BytesIO(s)
base_frm_len = len(raw(H2Frame()))
ret = H2Seq()
cur_frm = H2HeadersFrame() # type: Union[H2HeadersFrame, H2ContinuationFrame] # noqa: E501
cur_hdr_sz = 0
# For each line in the headers str to parse
for hdr_line in sio:
hdr_name, hdr_value = self._parse_header_line(hdr_line)
if hdr_name is None:
continue
new_hdr, new_hdr_len = self._convert_a_header_to_a_h2_header(
hdr_name, hdr_value, is_sensitive, should_index
)
new_hdr_bin_len = len(raw(new_hdr))
if register and isinstance(new_hdr, HPackLitHdrFldWithIncrIndexing): # noqa: E501
self.register(new_hdr)
# The new header binary length (+ base frame size) must not exceed
# the maximum frame size or it will just never fit. Also, the
# header entry length (as specified in RFC7540 par6.5.2) must not
# exceed the maximum length of a header fragment or it will just
# never fit
if (new_hdr_bin_len + base_frm_len > max_frm_sz or
(max_hdr_lst_sz != 0 and new_hdr_len > max_hdr_lst_sz)):
raise Exception('Header too long: {}'.format(hdr_name))
if (max_frm_sz < len(raw(cur_frm)) + base_frm_len + new_hdr_len or
(
max_hdr_lst_sz != 0 and
max_hdr_lst_sz < cur_hdr_sz + new_hdr_len
)
):
flags = set()
if isinstance(cur_frm, H2HeadersFrame) and not body:
flags.add('ES')
ret.frames.append(H2Frame(stream_id=stream_id, flags=flags) / cur_frm) # noqa: E501
cur_frm = H2ContinuationFrame()
cur_hdr_sz = 0
hdr_list = cur_frm.hdrs
hdr_list += new_hdr
cur_hdr_sz += new_hdr_len
flags = {'EH'}
if isinstance(cur_frm, H2HeadersFrame) and not body:
flags.add('ES')
ret.frames.append(H2Frame(stream_id=stream_id, flags=flags) / cur_frm)
if body:
base_data_frm_len = len(raw(H2DataFrame()))
sio = BytesIO(body)
frgmt = sio.read(max_frm_sz - base_data_frm_len - base_frm_len)
while frgmt:
nxt_frgmt = sio.read(max_frm_sz - base_data_frm_len - base_frm_len) # noqa: E501
flags = set()
if len(nxt_frgmt) == 0:
flags.add('ES')
ret.frames.append(
H2Frame(stream_id=stream_id, flags=flags) / H2DataFrame(data=frgmt) # noqa: E501
)
frgmt = nxt_frgmt
return ret