Secure your code as it's written. Use Snyk Code to scan source code in minutes - no build needed - and fix issues immediately.
def test_is_protocol():
session = [['0', '12345678901234567890123456789012345678901234567890']]
protocol = is_protocol(session, '78')
assert protocol == True
protocol = is_protocol(session, 78)
assert protocol == False
def test_is_protocol():
session = [['0', '12345678901234567890123456789012345678901234567890']]
protocol = is_protocol(session, '78')
assert protocol == True
protocol = is_protocol(session, 78)
assert protocol == False
address_2, port_2 = get_ip_port(key[1])
# Get the first packet and grab the macs from it
first_packet = session[0][1]
source_mac, destination_mac = extract_macs(first_packet)
# If the source is the cpature source
if (source_mac == capture_source
or address_1 == capture_source):
if is_private(address_2):
other_ips[address_2] += 1
num_sessions_init += 1
num_external_init += is_external(address_1, address_2)
num_tcp_sess_init += is_protocol(session, '06')
num_udp_sess_init += is_protocol(session, '11')
num_icmp_sess_init += is_protocol(session, '01')
if int(port_1) < max_port:
num_sport_init[int(port_1)] += 1
if int(port_2) < max_port:
num_dport_init[int(port_2)] += 1
# If the destination is the capture source
if (destination_mac == capture_source
or address_2 == capture_source):
if is_private(address_1):
other_ips[address_1] += 1
num_sessions_rec += 1
# Get the first packet and grab the macs from it
first_packet = session[0][1]
source_mac, destination_mac = extract_macs(first_packet)
# If the source is the cpature source
if (source_mac == capture_source
or address_1 == capture_source):
if is_private(address_2):
other_ips[address_2] += 1
num_sessions_init += 1
num_external_init += is_external(address_1, address_2)
num_tcp_sess_init += is_protocol(session, '06')
num_udp_sess_init += is_protocol(session, '11')
num_icmp_sess_init += is_protocol(session, '01')
if int(port_1) < max_port:
num_sport_init[int(port_1)] += 1
if int(port_2) < max_port:
num_dport_init[int(port_2)] += 1
# If the destination is the capture source
if (destination_mac == capture_source
or address_2 == capture_source):
if is_private(address_1):
other_ips[address_1] += 1
num_sessions_rec += 1
num_external_rec += is_external(address_2, address_1)
num_tcp_sess_rec += is_protocol(session, '06')
# Get the first packet and grab the macs from it
first_packet = session[0][1]
source_mac, destination_mac = extract_macs(first_packet)
# If the source is the cpature source
if (source_mac == capture_source
or address_1 == capture_source):
if is_private(address_2):
other_ips[address_2] += 1
num_sessions_init += 1
num_external_init += is_external(address_1, address_2)
num_tcp_sess_init += is_protocol(session, '06')
num_udp_sess_init += is_protocol(session, '11')
num_icmp_sess_init += is_protocol(session, '01')
if int(port_1) < max_port:
num_sport_init[int(port_1)] += 1
if int(port_2) < max_port:
num_dport_init[int(port_2)] += 1
# If the destination is the capture source
if (destination_mac == capture_source
or address_2 == capture_source):
if is_private(address_1):
other_ips[address_1] += 1
num_sessions_rec += 1
num_external_rec += is_external(address_2, address_1)