import pyloxi @ 56db3af912fd38fe3789e7629a823788b94f463d
diff --git a/src/python/loxi/of10/message.py b/src/python/loxi/of10/message.py
index d80dac3..f12fe1d 100644
--- a/src/python/loxi/of10/message.py
+++ b/src/python/loxi/of10/message.py
@@ -1,17 +1,6 @@
-#
-# Copyright 2012, 2013, Big Switch Networks, Inc.
-#
-# Licensed under the Apache License, Version 2.0 (the "License"); you may
-# not use this file except in compliance with the License. You may obtain
-# a copy of the License at
-#
-# http://www.apache.org/licenses/LICENSE-2.0
-#
-# Unless required by applicable law or agreed to in writing, software
-# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
-# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
-# License for the specific language governing permissions and limitations
-# under the License.
+# Copyright (c) 2008 The Board of Trustees of The Leland Stanford Junior University
+# Copyright (c) 2011, 2012 Open Networking Foundation
+# Copyright (c) 2012, 2013 Big Switch Networks, Inc.
# Automatically generated by LOXI from template message.py
# Do not modify
@@ -22,6 +11,7 @@
import common
import action # for unpack_list
import util
+import loxi.generic_util
class Message(object):
version = const.OFP_VERSION
@@ -33,7 +23,7 @@
type = const.OFPT_STATS_REPLY
stats_type = const.OFPST_AGGREGATE
- def __init__(self, xid=None, flags=None, packet_count=None, byte_count=None, flow_count=None, pad=None):
+ def __init__(self, xid=None, flags=None, packet_count=None, byte_count=None, flow_count=None):
self.xid = xid
if flags != None:
self.flags = flags
@@ -51,10 +41,6 @@
self.flow_count = flow_count
else:
self.flow_count = 0
- if pad != None:
- self.pad = pad
- else:
- self.pad = [0,0,0,0]
def pack(self):
packed = []
@@ -67,7 +53,7 @@
packed.append(struct.pack("!Q", self.packet_count))
packed.append(struct.pack("!Q", self.byte_count))
packed.append(struct.pack("!L", self.flow_count))
- packed.append(struct.pack("!4B", *self.pad))
+ packed.append('\x00' * 4)
length = sum([len(x) for x in packed])
packed[2] = struct.pack("!H", length)
return ''.join(packed)
@@ -76,21 +62,23 @@
def unpack(buf):
if len(buf) < 8: raise loxi.ProtocolError("buffer too short to contain an OpenFlow message")
obj = aggregate_stats_reply()
- version = struct.unpack_from('!B', buf, 0)[0]
- assert(version == const.OFP_VERSION)
- type = struct.unpack_from('!B', buf, 1)[0]
- assert(type == const.OFPT_STATS_REPLY)
- _length = struct.unpack_from('!H', buf, 2)[0]
- assert(_length == len(buf))
- if _length != 36: raise loxi.ProtocolError("aggregate_stats_reply length is %d, should be 36" % _length)
- obj.xid = struct.unpack_from('!L', buf, 4)[0]
- stats_type = struct.unpack_from('!H', buf, 8)[0]
- assert(stats_type == const.OFPST_AGGREGATE)
- obj.flags = struct.unpack_from('!H', buf, 10)[0]
- obj.packet_count = struct.unpack_from('!Q', buf, 12)[0]
- obj.byte_count = struct.unpack_from('!Q', buf, 20)[0]
- obj.flow_count = struct.unpack_from('!L', buf, 28)[0]
- obj.pad = list(struct.unpack_from('!4B', buf, 32))
+ if type(buf) == loxi.generic_util.OFReader:
+ reader = buf
+ else:
+ reader = loxi.generic_util.OFReader(buf)
+ _version = reader.read('!B')[0]
+ assert(_version == const.OFP_VERSION)
+ _type = reader.read('!B')[0]
+ assert(_type == const.OFPT_STATS_REPLY)
+ _length = reader.read('!H')[0]
+ obj.xid = reader.read('!L')[0]
+ _stats_type = reader.read('!H')[0]
+ assert(_stats_type == const.OFPST_AGGREGATE)
+ obj.flags = reader.read('!H')[0]
+ obj.packet_count = reader.read('!Q')[0]
+ obj.byte_count = reader.read('!Q')[0]
+ obj.flow_count = reader.read('!L')[0]
+ reader.skip(4)
return obj
def __eq__(self, other):
@@ -102,7 +90,6 @@
if self.packet_count != other.packet_count: return False
if self.byte_count != other.byte_count: return False
if self.flow_count != other.flow_count: return False
- if self.pad != other.pad: return False
return True
def __ne__(self, other):
@@ -137,9 +124,6 @@
q.text(","); q.breakable()
q.text("flow_count = ");
q.text("%#x" % self.flow_count)
- q.text(","); q.breakable()
- q.text("pad = ");
- q.pp(self.pad)
q.breakable()
q.text('}')
@@ -148,7 +132,7 @@
type = const.OFPT_STATS_REQUEST
stats_type = const.OFPST_AGGREGATE
- def __init__(self, xid=None, flags=None, match=None, table_id=None, pad=None, out_port=None):
+ def __init__(self, xid=None, flags=None, match=None, table_id=None, out_port=None):
self.xid = xid
if flags != None:
self.flags = flags
@@ -162,10 +146,6 @@
self.table_id = table_id
else:
self.table_id = 0
- if pad != None:
- self.pad = pad
- else:
- self.pad = 0
if out_port != None:
self.out_port = out_port
else:
@@ -181,7 +161,7 @@
packed.append(struct.pack("!H", self.flags))
packed.append(self.match.pack())
packed.append(struct.pack("!B", self.table_id))
- packed.append(struct.pack("!B", self.pad))
+ packed.append('\x00' * 1)
packed.append(struct.pack("!H", self.out_port))
length = sum([len(x) for x in packed])
packed[2] = struct.pack("!H", length)
@@ -191,21 +171,23 @@
def unpack(buf):
if len(buf) < 8: raise loxi.ProtocolError("buffer too short to contain an OpenFlow message")
obj = aggregate_stats_request()
- version = struct.unpack_from('!B', buf, 0)[0]
- assert(version == const.OFP_VERSION)
- type = struct.unpack_from('!B', buf, 1)[0]
- assert(type == const.OFPT_STATS_REQUEST)
- _length = struct.unpack_from('!H', buf, 2)[0]
- assert(_length == len(buf))
- if _length != 56: raise loxi.ProtocolError("aggregate_stats_request length is %d, should be 56" % _length)
- obj.xid = struct.unpack_from('!L', buf, 4)[0]
- stats_type = struct.unpack_from('!H', buf, 8)[0]
- assert(stats_type == const.OFPST_AGGREGATE)
- obj.flags = struct.unpack_from('!H', buf, 10)[0]
- obj.match = common.match.unpack(buffer(buf, 12))
- obj.table_id = struct.unpack_from('!B', buf, 52)[0]
- obj.pad = struct.unpack_from('!B', buf, 53)[0]
- obj.out_port = struct.unpack_from('!H', buf, 54)[0]
+ if type(buf) == loxi.generic_util.OFReader:
+ reader = buf
+ else:
+ reader = loxi.generic_util.OFReader(buf)
+ _version = reader.read('!B')[0]
+ assert(_version == const.OFP_VERSION)
+ _type = reader.read('!B')[0]
+ assert(_type == const.OFPT_STATS_REQUEST)
+ _length = reader.read('!H')[0]
+ obj.xid = reader.read('!L')[0]
+ _stats_type = reader.read('!H')[0]
+ assert(_stats_type == const.OFPST_AGGREGATE)
+ obj.flags = reader.read('!H')[0]
+ obj.match = common.match.unpack(reader)
+ obj.table_id = reader.read('!B')[0]
+ reader.skip(1)
+ obj.out_port = reader.read('!H')[0]
return obj
def __eq__(self, other):
@@ -216,7 +198,6 @@
if self.flags != other.flags: return False
if self.match != other.match: return False
if self.table_id != other.table_id: return False
- if self.pad != other.pad: return False
if self.out_port != other.out_port: return False
return True
@@ -250,9 +231,6 @@
q.text("table_id = ");
q.text("%#x" % self.table_id)
q.text(","); q.breakable()
- q.text("pad = ");
- q.text("%#x" % self.pad)
- q.text(","); q.breakable()
q.text("out_port = ");
q.text(util.pretty_port(self.out_port))
q.breakable()
@@ -279,14 +257,16 @@
def unpack(buf):
if len(buf) < 8: raise loxi.ProtocolError("buffer too short to contain an OpenFlow message")
obj = barrier_reply()
- version = struct.unpack_from('!B', buf, 0)[0]
- assert(version == const.OFP_VERSION)
- type = struct.unpack_from('!B', buf, 1)[0]
- assert(type == const.OFPT_BARRIER_REPLY)
- _length = struct.unpack_from('!H', buf, 2)[0]
- assert(_length == len(buf))
- if _length != 8: raise loxi.ProtocolError("barrier_reply length is %d, should be 8" % _length)
- obj.xid = struct.unpack_from('!L', buf, 4)[0]
+ if type(buf) == loxi.generic_util.OFReader:
+ reader = buf
+ else:
+ reader = loxi.generic_util.OFReader(buf)
+ _version = reader.read('!B')[0]
+ assert(_version == const.OFP_VERSION)
+ _type = reader.read('!B')[0]
+ assert(_type == const.OFPT_BARRIER_REPLY)
+ _length = reader.read('!H')[0]
+ obj.xid = reader.read('!L')[0]
return obj
def __eq__(self, other):
@@ -340,14 +320,16 @@
def unpack(buf):
if len(buf) < 8: raise loxi.ProtocolError("buffer too short to contain an OpenFlow message")
obj = barrier_request()
- version = struct.unpack_from('!B', buf, 0)[0]
- assert(version == const.OFP_VERSION)
- type = struct.unpack_from('!B', buf, 1)[0]
- assert(type == const.OFPT_BARRIER_REQUEST)
- _length = struct.unpack_from('!H', buf, 2)[0]
- assert(_length == len(buf))
- if _length != 8: raise loxi.ProtocolError("barrier_request length is %d, should be 8" % _length)
- obj.xid = struct.unpack_from('!L', buf, 4)[0]
+ if type(buf) == loxi.generic_util.OFReader:
+ reader = buf
+ else:
+ reader = loxi.generic_util.OFReader(buf)
+ _version = reader.read('!B')[0]
+ assert(_version == const.OFP_VERSION)
+ _type = reader.read('!B')[0]
+ assert(_type == const.OFPT_BARRIER_REQUEST)
+ _length = reader.read('!H')[0]
+ obj.xid = reader.read('!L')[0]
return obj
def __eq__(self, other):
@@ -410,19 +392,21 @@
def unpack(buf):
if len(buf) < 8: raise loxi.ProtocolError("buffer too short to contain an OpenFlow message")
obj = bsn_get_interfaces_reply()
- version = struct.unpack_from('!B', buf, 0)[0]
- assert(version == const.OFP_VERSION)
- type = struct.unpack_from('!B', buf, 1)[0]
- assert(type == const.OFPT_VENDOR)
- _length = struct.unpack_from('!H', buf, 2)[0]
- assert(_length == len(buf))
- if _length < 16: raise loxi.ProtocolError("bsn_get_interfaces_reply length is %d, should be at least 16" % _length)
- obj.xid = struct.unpack_from('!L', buf, 4)[0]
- experimenter = struct.unpack_from('!L', buf, 8)[0]
- assert(experimenter == 0x5c16c7)
- subtype = struct.unpack_from('!L', buf, 12)[0]
- assert(subtype == 10)
- obj.interfaces = util.unpack_array(common.bsn_interface.unpack, 32, buffer(buf, 16))
+ if type(buf) == loxi.generic_util.OFReader:
+ reader = buf
+ else:
+ reader = loxi.generic_util.OFReader(buf)
+ _version = reader.read('!B')[0]
+ assert(_version == const.OFP_VERSION)
+ _type = reader.read('!B')[0]
+ assert(_type == const.OFPT_VENDOR)
+ _length = reader.read('!H')[0]
+ obj.xid = reader.read('!L')[0]
+ _experimenter = reader.read('!L')[0]
+ assert(_experimenter == 0x5c16c7)
+ _subtype = reader.read('!L')[0]
+ assert(_subtype == 10)
+ obj.interfaces = loxi.generic_util.unpack_list(reader, common.bsn_interface.unpack)
return obj
def __eq__(self, other):
@@ -484,18 +468,20 @@
def unpack(buf):
if len(buf) < 8: raise loxi.ProtocolError("buffer too short to contain an OpenFlow message")
obj = bsn_get_interfaces_request()
- version = struct.unpack_from('!B', buf, 0)[0]
- assert(version == const.OFP_VERSION)
- type = struct.unpack_from('!B', buf, 1)[0]
- assert(type == const.OFPT_VENDOR)
- _length = struct.unpack_from('!H', buf, 2)[0]
- assert(_length == len(buf))
- if _length != 16: raise loxi.ProtocolError("bsn_get_interfaces_request length is %d, should be 16" % _length)
- obj.xid = struct.unpack_from('!L', buf, 4)[0]
- experimenter = struct.unpack_from('!L', buf, 8)[0]
- assert(experimenter == 0x5c16c7)
- subtype = struct.unpack_from('!L', buf, 12)[0]
- assert(subtype == 9)
+ if type(buf) == loxi.generic_util.OFReader:
+ reader = buf
+ else:
+ reader = loxi.generic_util.OFReader(buf)
+ _version = reader.read('!B')[0]
+ assert(_version == const.OFP_VERSION)
+ _type = reader.read('!B')[0]
+ assert(_type == const.OFPT_VENDOR)
+ _length = reader.read('!H')[0]
+ obj.xid = reader.read('!L')[0]
+ _experimenter = reader.read('!L')[0]
+ assert(_experimenter == 0x5c16c7)
+ _subtype = reader.read('!L')[0]
+ assert(_subtype == 9)
return obj
def __eq__(self, other):
@@ -534,16 +520,12 @@
experimenter = 0x5c16c7
subtype = 2
- def __init__(self, xid=None, index=None, pad=None, mask=None):
+ def __init__(self, xid=None, index=None, mask=None):
self.xid = xid
if index != None:
self.index = index
else:
self.index = 0
- if pad != None:
- self.pad = pad
- else:
- self.pad = [0,0,0]
if mask != None:
self.mask = mask
else:
@@ -558,7 +540,7 @@
packed.append(struct.pack("!L", self.experimenter))
packed.append(struct.pack("!L", self.subtype))
packed.append(struct.pack("!B", self.index))
- packed.append(struct.pack("!3B", *self.pad))
+ packed.append('\x00' * 3)
packed.append(struct.pack("!L", self.mask))
length = sum([len(x) for x in packed])
packed[2] = struct.pack("!H", length)
@@ -568,21 +550,23 @@
def unpack(buf):
if len(buf) < 8: raise loxi.ProtocolError("buffer too short to contain an OpenFlow message")
obj = bsn_get_ip_mask_reply()
- version = struct.unpack_from('!B', buf, 0)[0]
- assert(version == const.OFP_VERSION)
- type = struct.unpack_from('!B', buf, 1)[0]
- assert(type == const.OFPT_VENDOR)
- _length = struct.unpack_from('!H', buf, 2)[0]
- assert(_length == len(buf))
- if _length != 24: raise loxi.ProtocolError("bsn_get_ip_mask_reply length is %d, should be 24" % _length)
- obj.xid = struct.unpack_from('!L', buf, 4)[0]
- experimenter = struct.unpack_from('!L', buf, 8)[0]
- assert(experimenter == 0x5c16c7)
- subtype = struct.unpack_from('!L', buf, 12)[0]
- assert(subtype == 2)
- obj.index = struct.unpack_from('!B', buf, 16)[0]
- obj.pad = list(struct.unpack_from('!3B', buf, 17))
- obj.mask = struct.unpack_from('!L', buf, 20)[0]
+ if type(buf) == loxi.generic_util.OFReader:
+ reader = buf
+ else:
+ reader = loxi.generic_util.OFReader(buf)
+ _version = reader.read('!B')[0]
+ assert(_version == const.OFP_VERSION)
+ _type = reader.read('!B')[0]
+ assert(_type == const.OFPT_VENDOR)
+ _length = reader.read('!H')[0]
+ obj.xid = reader.read('!L')[0]
+ _experimenter = reader.read('!L')[0]
+ assert(_experimenter == 0x5c16c7)
+ _subtype = reader.read('!L')[0]
+ assert(_subtype == 2)
+ obj.index = reader.read('!B')[0]
+ reader.skip(3)
+ obj.mask = reader.read('!L')[0]
return obj
def __eq__(self, other):
@@ -591,7 +575,6 @@
if self.type != other.type: return False
if self.xid != other.xid: return False
if self.index != other.index: return False
- if self.pad != other.pad: return False
if self.mask != other.mask: return False
return True
@@ -619,9 +602,6 @@
q.text("index = ");
q.text("%#x" % self.index)
q.text(","); q.breakable()
- q.text("pad = ");
- q.pp(self.pad)
- q.text(","); q.breakable()
q.text("mask = ");
q.text("%#x" % self.mask)
q.breakable()
@@ -633,16 +613,12 @@
experimenter = 0x5c16c7
subtype = 1
- def __init__(self, xid=None, index=None, pad=None):
+ def __init__(self, xid=None, index=None):
self.xid = xid
if index != None:
self.index = index
else:
self.index = 0
- if pad != None:
- self.pad = pad
- else:
- self.pad = [0,0,0,0,0,0,0]
def pack(self):
packed = []
@@ -653,7 +629,7 @@
packed.append(struct.pack("!L", self.experimenter))
packed.append(struct.pack("!L", self.subtype))
packed.append(struct.pack("!B", self.index))
- packed.append(struct.pack("!7B", *self.pad))
+ packed.append('\x00' * 7)
length = sum([len(x) for x in packed])
packed[2] = struct.pack("!H", length)
return ''.join(packed)
@@ -662,20 +638,22 @@
def unpack(buf):
if len(buf) < 8: raise loxi.ProtocolError("buffer too short to contain an OpenFlow message")
obj = bsn_get_ip_mask_request()
- version = struct.unpack_from('!B', buf, 0)[0]
- assert(version == const.OFP_VERSION)
- type = struct.unpack_from('!B', buf, 1)[0]
- assert(type == const.OFPT_VENDOR)
- _length = struct.unpack_from('!H', buf, 2)[0]
- assert(_length == len(buf))
- if _length != 24: raise loxi.ProtocolError("bsn_get_ip_mask_request length is %d, should be 24" % _length)
- obj.xid = struct.unpack_from('!L', buf, 4)[0]
- experimenter = struct.unpack_from('!L', buf, 8)[0]
- assert(experimenter == 0x5c16c7)
- subtype = struct.unpack_from('!L', buf, 12)[0]
- assert(subtype == 1)
- obj.index = struct.unpack_from('!B', buf, 16)[0]
- obj.pad = list(struct.unpack_from('!7B', buf, 17))
+ if type(buf) == loxi.generic_util.OFReader:
+ reader = buf
+ else:
+ reader = loxi.generic_util.OFReader(buf)
+ _version = reader.read('!B')[0]
+ assert(_version == const.OFP_VERSION)
+ _type = reader.read('!B')[0]
+ assert(_type == const.OFPT_VENDOR)
+ _length = reader.read('!H')[0]
+ obj.xid = reader.read('!L')[0]
+ _experimenter = reader.read('!L')[0]
+ assert(_experimenter == 0x5c16c7)
+ _subtype = reader.read('!L')[0]
+ assert(_subtype == 1)
+ obj.index = reader.read('!B')[0]
+ reader.skip(7)
return obj
def __eq__(self, other):
@@ -684,7 +662,6 @@
if self.type != other.type: return False
if self.xid != other.xid: return False
if self.index != other.index: return False
- if self.pad != other.pad: return False
return True
def __ne__(self, other):
@@ -710,9 +687,6 @@
q.text(","); q.breakable()
q.text("index = ");
q.text("%#x" % self.index)
- q.text(","); q.breakable()
- q.text("pad = ");
- q.pp(self.pad)
q.breakable()
q.text('}')
@@ -722,16 +696,12 @@
experimenter = 0x5c16c7
subtype = 5
- def __init__(self, xid=None, report_mirror_ports=None, pad=None):
+ def __init__(self, xid=None, report_mirror_ports=None):
self.xid = xid
if report_mirror_ports != None:
self.report_mirror_ports = report_mirror_ports
else:
self.report_mirror_ports = 0
- if pad != None:
- self.pad = pad
- else:
- self.pad = [0,0,0]
def pack(self):
packed = []
@@ -742,7 +712,7 @@
packed.append(struct.pack("!L", self.experimenter))
packed.append(struct.pack("!L", self.subtype))
packed.append(struct.pack("!B", self.report_mirror_ports))
- packed.append(struct.pack("!3B", *self.pad))
+ packed.append('\x00' * 3)
length = sum([len(x) for x in packed])
packed[2] = struct.pack("!H", length)
return ''.join(packed)
@@ -751,20 +721,22 @@
def unpack(buf):
if len(buf) < 8: raise loxi.ProtocolError("buffer too short to contain an OpenFlow message")
obj = bsn_get_mirroring_reply()
- version = struct.unpack_from('!B', buf, 0)[0]
- assert(version == const.OFP_VERSION)
- type = struct.unpack_from('!B', buf, 1)[0]
- assert(type == const.OFPT_VENDOR)
- _length = struct.unpack_from('!H', buf, 2)[0]
- assert(_length == len(buf))
- if _length != 20: raise loxi.ProtocolError("bsn_get_mirroring_reply length is %d, should be 20" % _length)
- obj.xid = struct.unpack_from('!L', buf, 4)[0]
- experimenter = struct.unpack_from('!L', buf, 8)[0]
- assert(experimenter == 0x5c16c7)
- subtype = struct.unpack_from('!L', buf, 12)[0]
- assert(subtype == 5)
- obj.report_mirror_ports = struct.unpack_from('!B', buf, 16)[0]
- obj.pad = list(struct.unpack_from('!3B', buf, 17))
+ if type(buf) == loxi.generic_util.OFReader:
+ reader = buf
+ else:
+ reader = loxi.generic_util.OFReader(buf)
+ _version = reader.read('!B')[0]
+ assert(_version == const.OFP_VERSION)
+ _type = reader.read('!B')[0]
+ assert(_type == const.OFPT_VENDOR)
+ _length = reader.read('!H')[0]
+ obj.xid = reader.read('!L')[0]
+ _experimenter = reader.read('!L')[0]
+ assert(_experimenter == 0x5c16c7)
+ _subtype = reader.read('!L')[0]
+ assert(_subtype == 5)
+ obj.report_mirror_ports = reader.read('!B')[0]
+ reader.skip(3)
return obj
def __eq__(self, other):
@@ -773,7 +745,6 @@
if self.type != other.type: return False
if self.xid != other.xid: return False
if self.report_mirror_ports != other.report_mirror_ports: return False
- if self.pad != other.pad: return False
return True
def __ne__(self, other):
@@ -799,9 +770,6 @@
q.text(","); q.breakable()
q.text("report_mirror_ports = ");
q.text("%#x" % self.report_mirror_ports)
- q.text(","); q.breakable()
- q.text("pad = ");
- q.pp(self.pad)
q.breakable()
q.text('}')
@@ -811,16 +779,12 @@
experimenter = 0x5c16c7
subtype = 4
- def __init__(self, xid=None, report_mirror_ports=None, pad=None):
+ def __init__(self, xid=None, report_mirror_ports=None):
self.xid = xid
if report_mirror_ports != None:
self.report_mirror_ports = report_mirror_ports
else:
self.report_mirror_ports = 0
- if pad != None:
- self.pad = pad
- else:
- self.pad = [0,0,0]
def pack(self):
packed = []
@@ -831,7 +795,7 @@
packed.append(struct.pack("!L", self.experimenter))
packed.append(struct.pack("!L", self.subtype))
packed.append(struct.pack("!B", self.report_mirror_ports))
- packed.append(struct.pack("!3B", *self.pad))
+ packed.append('\x00' * 3)
length = sum([len(x) for x in packed])
packed[2] = struct.pack("!H", length)
return ''.join(packed)
@@ -840,20 +804,22 @@
def unpack(buf):
if len(buf) < 8: raise loxi.ProtocolError("buffer too short to contain an OpenFlow message")
obj = bsn_get_mirroring_request()
- version = struct.unpack_from('!B', buf, 0)[0]
- assert(version == const.OFP_VERSION)
- type = struct.unpack_from('!B', buf, 1)[0]
- assert(type == const.OFPT_VENDOR)
- _length = struct.unpack_from('!H', buf, 2)[0]
- assert(_length == len(buf))
- if _length != 20: raise loxi.ProtocolError("bsn_get_mirroring_request length is %d, should be 20" % _length)
- obj.xid = struct.unpack_from('!L', buf, 4)[0]
- experimenter = struct.unpack_from('!L', buf, 8)[0]
- assert(experimenter == 0x5c16c7)
- subtype = struct.unpack_from('!L', buf, 12)[0]
- assert(subtype == 4)
- obj.report_mirror_ports = struct.unpack_from('!B', buf, 16)[0]
- obj.pad = list(struct.unpack_from('!3B', buf, 17))
+ if type(buf) == loxi.generic_util.OFReader:
+ reader = buf
+ else:
+ reader = loxi.generic_util.OFReader(buf)
+ _version = reader.read('!B')[0]
+ assert(_version == const.OFP_VERSION)
+ _type = reader.read('!B')[0]
+ assert(_type == const.OFPT_VENDOR)
+ _length = reader.read('!H')[0]
+ obj.xid = reader.read('!L')[0]
+ _experimenter = reader.read('!L')[0]
+ assert(_experimenter == 0x5c16c7)
+ _subtype = reader.read('!L')[0]
+ assert(_subtype == 4)
+ obj.report_mirror_ports = reader.read('!B')[0]
+ reader.skip(3)
return obj
def __eq__(self, other):
@@ -862,7 +828,6 @@
if self.type != other.type: return False
if self.xid != other.xid: return False
if self.report_mirror_ports != other.report_mirror_ports: return False
- if self.pad != other.pad: return False
return True
def __ne__(self, other):
@@ -888,9 +853,6 @@
q.text(","); q.breakable()
q.text("report_mirror_ports = ");
q.text("%#x" % self.report_mirror_ports)
- q.text(","); q.breakable()
- q.text("pad = ");
- q.pp(self.pad)
q.breakable()
q.text('}')
@@ -900,16 +862,12 @@
experimenter = 0x5c16c7
subtype = 0
- def __init__(self, xid=None, index=None, pad=None, mask=None):
+ def __init__(self, xid=None, index=None, mask=None):
self.xid = xid
if index != None:
self.index = index
else:
self.index = 0
- if pad != None:
- self.pad = pad
- else:
- self.pad = [0,0,0]
if mask != None:
self.mask = mask
else:
@@ -924,7 +882,7 @@
packed.append(struct.pack("!L", self.experimenter))
packed.append(struct.pack("!L", self.subtype))
packed.append(struct.pack("!B", self.index))
- packed.append(struct.pack("!3B", *self.pad))
+ packed.append('\x00' * 3)
packed.append(struct.pack("!L", self.mask))
length = sum([len(x) for x in packed])
packed[2] = struct.pack("!H", length)
@@ -934,21 +892,23 @@
def unpack(buf):
if len(buf) < 8: raise loxi.ProtocolError("buffer too short to contain an OpenFlow message")
obj = bsn_set_ip_mask()
- version = struct.unpack_from('!B', buf, 0)[0]
- assert(version == const.OFP_VERSION)
- type = struct.unpack_from('!B', buf, 1)[0]
- assert(type == const.OFPT_VENDOR)
- _length = struct.unpack_from('!H', buf, 2)[0]
- assert(_length == len(buf))
- if _length != 24: raise loxi.ProtocolError("bsn_set_ip_mask length is %d, should be 24" % _length)
- obj.xid = struct.unpack_from('!L', buf, 4)[0]
- experimenter = struct.unpack_from('!L', buf, 8)[0]
- assert(experimenter == 0x5c16c7)
- subtype = struct.unpack_from('!L', buf, 12)[0]
- assert(subtype == 0)
- obj.index = struct.unpack_from('!B', buf, 16)[0]
- obj.pad = list(struct.unpack_from('!3B', buf, 17))
- obj.mask = struct.unpack_from('!L', buf, 20)[0]
+ if type(buf) == loxi.generic_util.OFReader:
+ reader = buf
+ else:
+ reader = loxi.generic_util.OFReader(buf)
+ _version = reader.read('!B')[0]
+ assert(_version == const.OFP_VERSION)
+ _type = reader.read('!B')[0]
+ assert(_type == const.OFPT_VENDOR)
+ _length = reader.read('!H')[0]
+ obj.xid = reader.read('!L')[0]
+ _experimenter = reader.read('!L')[0]
+ assert(_experimenter == 0x5c16c7)
+ _subtype = reader.read('!L')[0]
+ assert(_subtype == 0)
+ obj.index = reader.read('!B')[0]
+ reader.skip(3)
+ obj.mask = reader.read('!L')[0]
return obj
def __eq__(self, other):
@@ -957,7 +917,6 @@
if self.type != other.type: return False
if self.xid != other.xid: return False
if self.index != other.index: return False
- if self.pad != other.pad: return False
if self.mask != other.mask: return False
return True
@@ -985,9 +944,6 @@
q.text("index = ");
q.text("%#x" % self.index)
q.text(","); q.breakable()
- q.text("pad = ");
- q.pp(self.pad)
- q.text(","); q.breakable()
q.text("mask = ");
q.text("%#x" % self.mask)
q.breakable()
@@ -999,16 +955,12 @@
experimenter = 0x5c16c7
subtype = 3
- def __init__(self, xid=None, report_mirror_ports=None, pad=None):
+ def __init__(self, xid=None, report_mirror_ports=None):
self.xid = xid
if report_mirror_ports != None:
self.report_mirror_ports = report_mirror_ports
else:
self.report_mirror_ports = 0
- if pad != None:
- self.pad = pad
- else:
- self.pad = [0,0,0]
def pack(self):
packed = []
@@ -1019,7 +971,7 @@
packed.append(struct.pack("!L", self.experimenter))
packed.append(struct.pack("!L", self.subtype))
packed.append(struct.pack("!B", self.report_mirror_ports))
- packed.append(struct.pack("!3B", *self.pad))
+ packed.append('\x00' * 3)
length = sum([len(x) for x in packed])
packed[2] = struct.pack("!H", length)
return ''.join(packed)
@@ -1028,20 +980,22 @@
def unpack(buf):
if len(buf) < 8: raise loxi.ProtocolError("buffer too short to contain an OpenFlow message")
obj = bsn_set_mirroring()
- version = struct.unpack_from('!B', buf, 0)[0]
- assert(version == const.OFP_VERSION)
- type = struct.unpack_from('!B', buf, 1)[0]
- assert(type == const.OFPT_VENDOR)
- _length = struct.unpack_from('!H', buf, 2)[0]
- assert(_length == len(buf))
- if _length != 20: raise loxi.ProtocolError("bsn_set_mirroring length is %d, should be 20" % _length)
- obj.xid = struct.unpack_from('!L', buf, 4)[0]
- experimenter = struct.unpack_from('!L', buf, 8)[0]
- assert(experimenter == 0x5c16c7)
- subtype = struct.unpack_from('!L', buf, 12)[0]
- assert(subtype == 3)
- obj.report_mirror_ports = struct.unpack_from('!B', buf, 16)[0]
- obj.pad = list(struct.unpack_from('!3B', buf, 17))
+ if type(buf) == loxi.generic_util.OFReader:
+ reader = buf
+ else:
+ reader = loxi.generic_util.OFReader(buf)
+ _version = reader.read('!B')[0]
+ assert(_version == const.OFP_VERSION)
+ _type = reader.read('!B')[0]
+ assert(_type == const.OFPT_VENDOR)
+ _length = reader.read('!H')[0]
+ obj.xid = reader.read('!L')[0]
+ _experimenter = reader.read('!L')[0]
+ assert(_experimenter == 0x5c16c7)
+ _subtype = reader.read('!L')[0]
+ assert(_subtype == 3)
+ obj.report_mirror_ports = reader.read('!B')[0]
+ reader.skip(3)
return obj
def __eq__(self, other):
@@ -1050,7 +1004,6 @@
if self.type != other.type: return False
if self.xid != other.xid: return False
if self.report_mirror_ports != other.report_mirror_ports: return False
- if self.pad != other.pad: return False
return True
def __ne__(self, other):
@@ -1076,9 +1029,129 @@
q.text(","); q.breakable()
q.text("report_mirror_ports = ");
q.text("%#x" % self.report_mirror_ports)
+ q.breakable()
+ q.text('}')
+
+class bsn_set_pktin_suppression(Message):
+ version = const.OFP_VERSION
+ type = const.OFPT_VENDOR
+ experimenter = 0x5c16c7
+ subtype = 11
+
+ def __init__(self, xid=None, enabled=None, idle_timeout=None, hard_timeout=None, priority=None, cookie=None):
+ self.xid = xid
+ if enabled != None:
+ self.enabled = enabled
+ else:
+ self.enabled = 0
+ if idle_timeout != None:
+ self.idle_timeout = idle_timeout
+ else:
+ self.idle_timeout = 0
+ if hard_timeout != None:
+ self.hard_timeout = hard_timeout
+ else:
+ self.hard_timeout = 0
+ if priority != None:
+ self.priority = priority
+ else:
+ self.priority = 0
+ if cookie != None:
+ self.cookie = cookie
+ else:
+ self.cookie = 0
+
+ def pack(self):
+ packed = []
+ packed.append(struct.pack("!B", self.version))
+ packed.append(struct.pack("!B", self.type))
+ packed.append(struct.pack("!H", 0)) # placeholder for length at index 2
+ packed.append(struct.pack("!L", self.xid))
+ packed.append(struct.pack("!L", self.experimenter))
+ packed.append(struct.pack("!L", self.subtype))
+ packed.append(struct.pack("!B", self.enabled))
+ packed.append('\x00' * 1)
+ packed.append(struct.pack("!H", self.idle_timeout))
+ packed.append(struct.pack("!H", self.hard_timeout))
+ packed.append(struct.pack("!H", self.priority))
+ packed.append(struct.pack("!Q", self.cookie))
+ length = sum([len(x) for x in packed])
+ packed[2] = struct.pack("!H", length)
+ return ''.join(packed)
+
+ @staticmethod
+ def unpack(buf):
+ if len(buf) < 8: raise loxi.ProtocolError("buffer too short to contain an OpenFlow message")
+ obj = bsn_set_pktin_suppression()
+ if type(buf) == loxi.generic_util.OFReader:
+ reader = buf
+ else:
+ reader = loxi.generic_util.OFReader(buf)
+ _version = reader.read('!B')[0]
+ assert(_version == const.OFP_VERSION)
+ _type = reader.read('!B')[0]
+ assert(_type == const.OFPT_VENDOR)
+ _length = reader.read('!H')[0]
+ obj.xid = reader.read('!L')[0]
+ _experimenter = reader.read('!L')[0]
+ assert(_experimenter == 0x5c16c7)
+ _subtype = reader.read('!L')[0]
+ assert(_subtype == 11)
+ obj.enabled = reader.read('!B')[0]
+ reader.skip(1)
+ obj.idle_timeout = reader.read('!H')[0]
+ obj.hard_timeout = reader.read('!H')[0]
+ obj.priority = reader.read('!H')[0]
+ obj.cookie = reader.read('!Q')[0]
+ return obj
+
+ def __eq__(self, other):
+ if type(self) != type(other): return False
+ if self.version != other.version: return False
+ if self.type != other.type: return False
+ if self.xid != other.xid: return False
+ if self.enabled != other.enabled: return False
+ if self.idle_timeout != other.idle_timeout: return False
+ if self.hard_timeout != other.hard_timeout: return False
+ if self.priority != other.priority: return False
+ if self.cookie != other.cookie: return False
+ return True
+
+ def __ne__(self, other):
+ return not self.__eq__(other)
+
+ def __str__(self):
+ return self.show()
+
+ def show(self):
+ import loxi.pp
+ return loxi.pp.pp(self)
+
+ def pretty_print(self, q):
+ q.text("bsn_set_pktin_suppression {")
+ with q.group():
+ with q.indent(2):
+ q.breakable()
+ q.text("xid = ");
+ if self.xid != None:
+ q.text("%#x" % self.xid)
+ else:
+ q.text('None')
q.text(","); q.breakable()
- q.text("pad = ");
- q.pp(self.pad)
+ q.text("enabled = ");
+ q.text("%#x" % self.enabled)
+ q.text(","); q.breakable()
+ q.text("idle_timeout = ");
+ q.text("%#x" % self.idle_timeout)
+ q.text(","); q.breakable()
+ q.text("hard_timeout = ");
+ q.text("%#x" % self.hard_timeout)
+ q.text(","); q.breakable()
+ q.text("priority = ");
+ q.text("%#x" % self.priority)
+ q.text(","); q.breakable()
+ q.text("cookie = ");
+ q.text("%#x" % self.cookie)
q.breakable()
q.text('}')
@@ -1117,20 +1190,22 @@
def unpack(buf):
if len(buf) < 8: raise loxi.ProtocolError("buffer too short to contain an OpenFlow message")
obj = bsn_shell_command()
- version = struct.unpack_from('!B', buf, 0)[0]
- assert(version == const.OFP_VERSION)
- type = struct.unpack_from('!B', buf, 1)[0]
- assert(type == const.OFPT_VENDOR)
- _length = struct.unpack_from('!H', buf, 2)[0]
- assert(_length == len(buf))
- if _length < 20: raise loxi.ProtocolError("bsn_shell_command length is %d, should be at least 20" % _length)
- obj.xid = struct.unpack_from('!L', buf, 4)[0]
- experimenter = struct.unpack_from('!L', buf, 8)[0]
- assert(experimenter == 0x5c16c7)
- subtype = struct.unpack_from('!L', buf, 12)[0]
- assert(subtype == 6)
- obj.service = struct.unpack_from('!L', buf, 16)[0]
- obj.data = buf[20:]
+ if type(buf) == loxi.generic_util.OFReader:
+ reader = buf
+ else:
+ reader = loxi.generic_util.OFReader(buf)
+ _version = reader.read('!B')[0]
+ assert(_version == const.OFP_VERSION)
+ _type = reader.read('!B')[0]
+ assert(_type == const.OFPT_VENDOR)
+ _length = reader.read('!H')[0]
+ obj.xid = reader.read('!L')[0]
+ _experimenter = reader.read('!L')[0]
+ assert(_experimenter == 0x5c16c7)
+ _subtype = reader.read('!L')[0]
+ assert(_subtype == 6)
+ obj.service = reader.read('!L')[0]
+ obj.data = str(reader.read_all())
return obj
def __eq__(self, other):
@@ -1201,19 +1276,21 @@
def unpack(buf):
if len(buf) < 8: raise loxi.ProtocolError("buffer too short to contain an OpenFlow message")
obj = bsn_shell_output()
- version = struct.unpack_from('!B', buf, 0)[0]
- assert(version == const.OFP_VERSION)
- type = struct.unpack_from('!B', buf, 1)[0]
- assert(type == const.OFPT_VENDOR)
- _length = struct.unpack_from('!H', buf, 2)[0]
- assert(_length == len(buf))
- if _length < 16: raise loxi.ProtocolError("bsn_shell_output length is %d, should be at least 16" % _length)
- obj.xid = struct.unpack_from('!L', buf, 4)[0]
- experimenter = struct.unpack_from('!L', buf, 8)[0]
- assert(experimenter == 0x5c16c7)
- subtype = struct.unpack_from('!L', buf, 12)[0]
- assert(subtype == 7)
- obj.data = buf[16:]
+ if type(buf) == loxi.generic_util.OFReader:
+ reader = buf
+ else:
+ reader = loxi.generic_util.OFReader(buf)
+ _version = reader.read('!B')[0]
+ assert(_version == const.OFP_VERSION)
+ _type = reader.read('!B')[0]
+ assert(_type == const.OFPT_VENDOR)
+ _length = reader.read('!H')[0]
+ obj.xid = reader.read('!L')[0]
+ _experimenter = reader.read('!L')[0]
+ assert(_experimenter == 0x5c16c7)
+ _subtype = reader.read('!L')[0]
+ assert(_subtype == 7)
+ obj.data = str(reader.read_all())
return obj
def __eq__(self, other):
@@ -1280,19 +1357,21 @@
def unpack(buf):
if len(buf) < 8: raise loxi.ProtocolError("buffer too short to contain an OpenFlow message")
obj = bsn_shell_status()
- version = struct.unpack_from('!B', buf, 0)[0]
- assert(version == const.OFP_VERSION)
- type = struct.unpack_from('!B', buf, 1)[0]
- assert(type == const.OFPT_VENDOR)
- _length = struct.unpack_from('!H', buf, 2)[0]
- assert(_length == len(buf))
- if _length != 20: raise loxi.ProtocolError("bsn_shell_status length is %d, should be 20" % _length)
- obj.xid = struct.unpack_from('!L', buf, 4)[0]
- experimenter = struct.unpack_from('!L', buf, 8)[0]
- assert(experimenter == 0x5c16c7)
- subtype = struct.unpack_from('!L', buf, 12)[0]
- assert(subtype == 8)
- obj.status = struct.unpack_from('!L', buf, 16)[0]
+ if type(buf) == loxi.generic_util.OFReader:
+ reader = buf
+ else:
+ reader = loxi.generic_util.OFReader(buf)
+ _version = reader.read('!B')[0]
+ assert(_version == const.OFP_VERSION)
+ _type = reader.read('!B')[0]
+ assert(_type == const.OFPT_VENDOR)
+ _length = reader.read('!H')[0]
+ obj.xid = reader.read('!L')[0]
+ _experimenter = reader.read('!L')[0]
+ assert(_experimenter == 0x5c16c7)
+ _subtype = reader.read('!L')[0]
+ assert(_subtype == 8)
+ obj.status = reader.read('!L')[0]
return obj
def __eq__(self, other):
@@ -1382,22 +1461,24 @@
def unpack(buf):
if len(buf) < 8: raise loxi.ProtocolError("buffer too short to contain an OpenFlow message")
obj = desc_stats_reply()
- version = struct.unpack_from('!B', buf, 0)[0]
- assert(version == const.OFP_VERSION)
- type = struct.unpack_from('!B', buf, 1)[0]
- assert(type == const.OFPT_STATS_REPLY)
- _length = struct.unpack_from('!H', buf, 2)[0]
- assert(_length == len(buf))
- if _length != 1068: raise loxi.ProtocolError("desc_stats_reply length is %d, should be 1068" % _length)
- obj.xid = struct.unpack_from('!L', buf, 4)[0]
- stats_type = struct.unpack_from('!H', buf, 8)[0]
- assert(stats_type == const.OFPST_DESC)
- obj.flags = struct.unpack_from('!H', buf, 10)[0]
- obj.mfr_desc = str(buffer(buf, 12, 256)).rstrip("\x00")
- obj.hw_desc = str(buffer(buf, 268, 256)).rstrip("\x00")
- obj.sw_desc = str(buffer(buf, 524, 256)).rstrip("\x00")
- obj.serial_num = str(buffer(buf, 780, 32)).rstrip("\x00")
- obj.dp_desc = str(buffer(buf, 812, 256)).rstrip("\x00")
+ if type(buf) == loxi.generic_util.OFReader:
+ reader = buf
+ else:
+ reader = loxi.generic_util.OFReader(buf)
+ _version = reader.read('!B')[0]
+ assert(_version == const.OFP_VERSION)
+ _type = reader.read('!B')[0]
+ assert(_type == const.OFPT_STATS_REPLY)
+ _length = reader.read('!H')[0]
+ obj.xid = reader.read('!L')[0]
+ _stats_type = reader.read('!H')[0]
+ assert(_stats_type == const.OFPST_DESC)
+ obj.flags = reader.read('!H')[0]
+ obj.mfr_desc = reader.read("!256s")[0].rstrip("\x00")
+ obj.hw_desc = reader.read("!256s")[0].rstrip("\x00")
+ obj.sw_desc = reader.read("!256s")[0].rstrip("\x00")
+ obj.serial_num = reader.read("!32s")[0].rstrip("\x00")
+ obj.dp_desc = reader.read("!256s")[0].rstrip("\x00")
return obj
def __eq__(self, other):
@@ -1482,17 +1563,19 @@
def unpack(buf):
if len(buf) < 8: raise loxi.ProtocolError("buffer too short to contain an OpenFlow message")
obj = desc_stats_request()
- version = struct.unpack_from('!B', buf, 0)[0]
- assert(version == const.OFP_VERSION)
- type = struct.unpack_from('!B', buf, 1)[0]
- assert(type == const.OFPT_STATS_REQUEST)
- _length = struct.unpack_from('!H', buf, 2)[0]
- assert(_length == len(buf))
- if _length != 12: raise loxi.ProtocolError("desc_stats_request length is %d, should be 12" % _length)
- obj.xid = struct.unpack_from('!L', buf, 4)[0]
- stats_type = struct.unpack_from('!H', buf, 8)[0]
- assert(stats_type == const.OFPST_DESC)
- obj.flags = struct.unpack_from('!H', buf, 10)[0]
+ if type(buf) == loxi.generic_util.OFReader:
+ reader = buf
+ else:
+ reader = loxi.generic_util.OFReader(buf)
+ _version = reader.read('!B')[0]
+ assert(_version == const.OFP_VERSION)
+ _type = reader.read('!B')[0]
+ assert(_type == const.OFPT_STATS_REQUEST)
+ _length = reader.read('!H')[0]
+ obj.xid = reader.read('!L')[0]
+ _stats_type = reader.read('!H')[0]
+ assert(_stats_type == const.OFPST_DESC)
+ obj.flags = reader.read('!H')[0]
return obj
def __eq__(self, other):
@@ -1555,15 +1638,17 @@
def unpack(buf):
if len(buf) < 8: raise loxi.ProtocolError("buffer too short to contain an OpenFlow message")
obj = echo_reply()
- version = struct.unpack_from('!B', buf, 0)[0]
- assert(version == const.OFP_VERSION)
- type = struct.unpack_from('!B', buf, 1)[0]
- assert(type == const.OFPT_ECHO_REPLY)
- _length = struct.unpack_from('!H', buf, 2)[0]
- assert(_length == len(buf))
- if _length < 8: raise loxi.ProtocolError("echo_reply length is %d, should be at least 8" % _length)
- obj.xid = struct.unpack_from('!L', buf, 4)[0]
- obj.data = buf[8:]
+ if type(buf) == loxi.generic_util.OFReader:
+ reader = buf
+ else:
+ reader = loxi.generic_util.OFReader(buf)
+ _version = reader.read('!B')[0]
+ assert(_version == const.OFP_VERSION)
+ _type = reader.read('!B')[0]
+ assert(_type == const.OFPT_ECHO_REPLY)
+ _length = reader.read('!H')[0]
+ obj.xid = reader.read('!L')[0]
+ obj.data = str(reader.read_all())
return obj
def __eq__(self, other):
@@ -1626,15 +1711,17 @@
def unpack(buf):
if len(buf) < 8: raise loxi.ProtocolError("buffer too short to contain an OpenFlow message")
obj = echo_request()
- version = struct.unpack_from('!B', buf, 0)[0]
- assert(version == const.OFP_VERSION)
- type = struct.unpack_from('!B', buf, 1)[0]
- assert(type == const.OFPT_ECHO_REQUEST)
- _length = struct.unpack_from('!H', buf, 2)[0]
- assert(_length == len(buf))
- if _length < 8: raise loxi.ProtocolError("echo_request length is %d, should be at least 8" % _length)
- obj.xid = struct.unpack_from('!L', buf, 4)[0]
- obj.data = buf[8:]
+ if type(buf) == loxi.generic_util.OFReader:
+ reader = buf
+ else:
+ reader = loxi.generic_util.OFReader(buf)
+ _version = reader.read('!B')[0]
+ assert(_version == const.OFP_VERSION)
+ _type = reader.read('!B')[0]
+ assert(_type == const.OFPT_ECHO_REQUEST)
+ _length = reader.read('!H')[0]
+ obj.xid = reader.read('!L')[0]
+ obj.data = str(reader.read_all())
return obj
def __eq__(self, other):
@@ -1707,17 +1794,19 @@
def unpack(buf):
if len(buf) < 8: raise loxi.ProtocolError("buffer too short to contain an OpenFlow message")
obj = error_msg()
- version = struct.unpack_from('!B', buf, 0)[0]
- assert(version == const.OFP_VERSION)
- type = struct.unpack_from('!B', buf, 1)[0]
- assert(type == const.OFPT_ERROR)
- _length = struct.unpack_from('!H', buf, 2)[0]
- assert(_length == len(buf))
- if _length < 12: raise loxi.ProtocolError("error_msg length is %d, should be at least 12" % _length)
- obj.xid = struct.unpack_from('!L', buf, 4)[0]
- obj.err_type = struct.unpack_from('!H', buf, 8)[0]
- obj.code = struct.unpack_from('!H', buf, 10)[0]
- obj.data = buf[12:]
+ if type(buf) == loxi.generic_util.OFReader:
+ reader = buf
+ else:
+ reader = loxi.generic_util.OFReader(buf)
+ _version = reader.read('!B')[0]
+ assert(_version == const.OFP_VERSION)
+ _type = reader.read('!B')[0]
+ assert(_type == const.OFPT_ERROR)
+ _length = reader.read('!H')[0]
+ obj.xid = reader.read('!L')[0]
+ obj.err_type = reader.read('!H')[0]
+ obj.code = reader.read('!H')[0]
+ obj.data = str(reader.read_all())
return obj
def __eq__(self, other):
@@ -1800,19 +1889,21 @@
def unpack(buf):
if len(buf) < 8: raise loxi.ProtocolError("buffer too short to contain an OpenFlow message")
obj = experimenter_stats_reply()
- version = struct.unpack_from('!B', buf, 0)[0]
- assert(version == const.OFP_VERSION)
- type = struct.unpack_from('!B', buf, 1)[0]
- assert(type == const.OFPT_STATS_REPLY)
- _length = struct.unpack_from('!H', buf, 2)[0]
- assert(_length == len(buf))
- if _length < 16: raise loxi.ProtocolError("experimenter_stats_reply length is %d, should be at least 16" % _length)
- obj.xid = struct.unpack_from('!L', buf, 4)[0]
- stats_type = struct.unpack_from('!H', buf, 8)[0]
- assert(stats_type == const.OFPST_VENDOR)
- obj.flags = struct.unpack_from('!H', buf, 10)[0]
- obj.experimenter = struct.unpack_from('!L', buf, 12)[0]
- obj.data = buf[16:]
+ if type(buf) == loxi.generic_util.OFReader:
+ reader = buf
+ else:
+ reader = loxi.generic_util.OFReader(buf)
+ _version = reader.read('!B')[0]
+ assert(_version == const.OFP_VERSION)
+ _type = reader.read('!B')[0]
+ assert(_type == const.OFPT_STATS_REPLY)
+ _length = reader.read('!H')[0]
+ obj.xid = reader.read('!L')[0]
+ _stats_type = reader.read('!H')[0]
+ assert(_stats_type == const.OFPST_VENDOR)
+ obj.flags = reader.read('!H')[0]
+ obj.experimenter = reader.read('!L')[0]
+ obj.data = str(reader.read_all())
return obj
def __eq__(self, other):
@@ -1895,19 +1986,21 @@
def unpack(buf):
if len(buf) < 8: raise loxi.ProtocolError("buffer too short to contain an OpenFlow message")
obj = experimenter_stats_request()
- version = struct.unpack_from('!B', buf, 0)[0]
- assert(version == const.OFP_VERSION)
- type = struct.unpack_from('!B', buf, 1)[0]
- assert(type == const.OFPT_STATS_REQUEST)
- _length = struct.unpack_from('!H', buf, 2)[0]
- assert(_length == len(buf))
- if _length < 16: raise loxi.ProtocolError("experimenter_stats_request length is %d, should be at least 16" % _length)
- obj.xid = struct.unpack_from('!L', buf, 4)[0]
- stats_type = struct.unpack_from('!H', buf, 8)[0]
- assert(stats_type == const.OFPST_VENDOR)
- obj.flags = struct.unpack_from('!H', buf, 10)[0]
- obj.experimenter = struct.unpack_from('!L', buf, 12)[0]
- obj.data = buf[16:]
+ if type(buf) == loxi.generic_util.OFReader:
+ reader = buf
+ else:
+ reader = loxi.generic_util.OFReader(buf)
+ _version = reader.read('!B')[0]
+ assert(_version == const.OFP_VERSION)
+ _type = reader.read('!B')[0]
+ assert(_type == const.OFPT_STATS_REQUEST)
+ _length = reader.read('!H')[0]
+ obj.xid = reader.read('!L')[0]
+ _stats_type = reader.read('!H')[0]
+ assert(_stats_type == const.OFPST_VENDOR)
+ obj.flags = reader.read('!H')[0]
+ obj.experimenter = reader.read('!L')[0]
+ obj.data = str(reader.read_all())
return obj
def __eq__(self, other):
@@ -1956,7 +2049,7 @@
version = const.OFP_VERSION
type = const.OFPT_FEATURES_REPLY
- def __init__(self, xid=None, datapath_id=None, n_buffers=None, n_tables=None, pad=None, capabilities=None, actions=None, ports=None):
+ def __init__(self, xid=None, datapath_id=None, n_buffers=None, n_tables=None, capabilities=None, actions=None, ports=None):
self.xid = xid
if datapath_id != None:
self.datapath_id = datapath_id
@@ -1970,10 +2063,6 @@
self.n_tables = n_tables
else:
self.n_tables = 0
- if pad != None:
- self.pad = pad
- else:
- self.pad = [0,0,0]
if capabilities != None:
self.capabilities = capabilities
else:
@@ -1996,7 +2085,7 @@
packed.append(struct.pack("!Q", self.datapath_id))
packed.append(struct.pack("!L", self.n_buffers))
packed.append(struct.pack("!B", self.n_tables))
- packed.append(struct.pack("!3B", *self.pad))
+ packed.append('\x00' * 3)
packed.append(struct.pack("!L", self.capabilities))
packed.append(struct.pack("!L", self.actions))
packed.append("".join([x.pack() for x in self.ports]))
@@ -2008,21 +2097,23 @@
def unpack(buf):
if len(buf) < 8: raise loxi.ProtocolError("buffer too short to contain an OpenFlow message")
obj = features_reply()
- version = struct.unpack_from('!B', buf, 0)[0]
- assert(version == const.OFP_VERSION)
- type = struct.unpack_from('!B', buf, 1)[0]
- assert(type == const.OFPT_FEATURES_REPLY)
- _length = struct.unpack_from('!H', buf, 2)[0]
- assert(_length == len(buf))
- if _length < 32: raise loxi.ProtocolError("features_reply length is %d, should be at least 32" % _length)
- obj.xid = struct.unpack_from('!L', buf, 4)[0]
- obj.datapath_id = struct.unpack_from('!Q', buf, 8)[0]
- obj.n_buffers = struct.unpack_from('!L', buf, 16)[0]
- obj.n_tables = struct.unpack_from('!B', buf, 20)[0]
- obj.pad = list(struct.unpack_from('!3B', buf, 21))
- obj.capabilities = struct.unpack_from('!L', buf, 24)[0]
- obj.actions = struct.unpack_from('!L', buf, 28)[0]
- obj.ports = util.unpack_array(common.port_desc.unpack, 48, buffer(buf, 32))
+ if type(buf) == loxi.generic_util.OFReader:
+ reader = buf
+ else:
+ reader = loxi.generic_util.OFReader(buf)
+ _version = reader.read('!B')[0]
+ assert(_version == const.OFP_VERSION)
+ _type = reader.read('!B')[0]
+ assert(_type == const.OFPT_FEATURES_REPLY)
+ _length = reader.read('!H')[0]
+ obj.xid = reader.read('!L')[0]
+ obj.datapath_id = reader.read('!Q')[0]
+ obj.n_buffers = reader.read('!L')[0]
+ obj.n_tables = reader.read('!B')[0]
+ reader.skip(3)
+ obj.capabilities = reader.read('!L')[0]
+ obj.actions = reader.read('!L')[0]
+ obj.ports = loxi.generic_util.unpack_list(reader, common.port_desc.unpack)
return obj
def __eq__(self, other):
@@ -2033,7 +2124,6 @@
if self.datapath_id != other.datapath_id: return False
if self.n_buffers != other.n_buffers: return False
if self.n_tables != other.n_tables: return False
- if self.pad != other.pad: return False
if self.capabilities != other.capabilities: return False
if self.actions != other.actions: return False
if self.ports != other.ports: return False
@@ -2069,9 +2159,6 @@
q.text("n_tables = ");
q.text("%#x" % self.n_tables)
q.text(","); q.breakable()
- q.text("pad = ");
- q.pp(self.pad)
- q.text(","); q.breakable()
q.text("capabilities = ");
q.text("%#x" % self.capabilities)
q.text(","); q.breakable()
@@ -2104,14 +2191,16 @@
def unpack(buf):
if len(buf) < 8: raise loxi.ProtocolError("buffer too short to contain an OpenFlow message")
obj = features_request()
- version = struct.unpack_from('!B', buf, 0)[0]
- assert(version == const.OFP_VERSION)
- type = struct.unpack_from('!B', buf, 1)[0]
- assert(type == const.OFPT_FEATURES_REQUEST)
- _length = struct.unpack_from('!H', buf, 2)[0]
- assert(_length == len(buf))
- if _length != 8: raise loxi.ProtocolError("features_request length is %d, should be 8" % _length)
- obj.xid = struct.unpack_from('!L', buf, 4)[0]
+ if type(buf) == loxi.generic_util.OFReader:
+ reader = buf
+ else:
+ reader = loxi.generic_util.OFReader(buf)
+ _version = reader.read('!B')[0]
+ assert(_version == const.OFP_VERSION)
+ _type = reader.read('!B')[0]
+ assert(_type == const.OFPT_FEATURES_REQUEST)
+ _length = reader.read('!H')[0]
+ obj.xid = reader.read('!L')[0]
return obj
def __eq__(self, other):
@@ -2212,25 +2301,27 @@
def unpack(buf):
if len(buf) < 8: raise loxi.ProtocolError("buffer too short to contain an OpenFlow message")
obj = flow_add()
- version = struct.unpack_from('!B', buf, 0)[0]
- assert(version == const.OFP_VERSION)
- type = struct.unpack_from('!B', buf, 1)[0]
- assert(type == const.OFPT_FLOW_MOD)
- _length = struct.unpack_from('!H', buf, 2)[0]
- assert(_length == len(buf))
- if _length < 72: raise loxi.ProtocolError("flow_add length is %d, should be at least 72" % _length)
- obj.xid = struct.unpack_from('!L', buf, 4)[0]
- obj.match = common.match.unpack(buffer(buf, 8))
- obj.cookie = struct.unpack_from('!Q', buf, 48)[0]
- _command = struct.unpack_from('!H', buf, 56)[0]
- assert(_command == const.OFPFC_ADD)
- obj.idle_timeout = struct.unpack_from('!H', buf, 58)[0]
- obj.hard_timeout = struct.unpack_from('!H', buf, 60)[0]
- obj.priority = struct.unpack_from('!H', buf, 62)[0]
- obj.buffer_id = struct.unpack_from('!L', buf, 64)[0]
- obj.out_port = struct.unpack_from('!H', buf, 68)[0]
- obj.flags = struct.unpack_from('!H', buf, 70)[0]
- obj.actions = action.unpack_list(buffer(buf, 72))
+ if type(buf) == loxi.generic_util.OFReader:
+ reader = buf
+ else:
+ reader = loxi.generic_util.OFReader(buf)
+ _version = reader.read('!B')[0]
+ assert(_version == const.OFP_VERSION)
+ _type = reader.read('!B')[0]
+ assert(_type == const.OFPT_FLOW_MOD)
+ _length = reader.read('!H')[0]
+ obj.xid = reader.read('!L')[0]
+ obj.match = common.match.unpack(reader)
+ obj.cookie = reader.read('!Q')[0]
+ __command = reader.read('!H')[0]
+ assert(__command == const.OFPFC_ADD)
+ obj.idle_timeout = reader.read('!H')[0]
+ obj.hard_timeout = reader.read('!H')[0]
+ obj.priority = reader.read('!H')[0]
+ obj.buffer_id = reader.read('!L')[0]
+ obj.out_port = reader.read('!H')[0]
+ obj.flags = reader.read('!H')[0]
+ obj.actions = action.unpack_list(reader)
return obj
def __eq__(self, other):
@@ -2367,25 +2458,27 @@
def unpack(buf):
if len(buf) < 8: raise loxi.ProtocolError("buffer too short to contain an OpenFlow message")
obj = flow_delete()
- version = struct.unpack_from('!B', buf, 0)[0]
- assert(version == const.OFP_VERSION)
- type = struct.unpack_from('!B', buf, 1)[0]
- assert(type == const.OFPT_FLOW_MOD)
- _length = struct.unpack_from('!H', buf, 2)[0]
- assert(_length == len(buf))
- if _length < 72: raise loxi.ProtocolError("flow_delete length is %d, should be at least 72" % _length)
- obj.xid = struct.unpack_from('!L', buf, 4)[0]
- obj.match = common.match.unpack(buffer(buf, 8))
- obj.cookie = struct.unpack_from('!Q', buf, 48)[0]
- _command = struct.unpack_from('!H', buf, 56)[0]
- assert(_command == const.OFPFC_DELETE)
- obj.idle_timeout = struct.unpack_from('!H', buf, 58)[0]
- obj.hard_timeout = struct.unpack_from('!H', buf, 60)[0]
- obj.priority = struct.unpack_from('!H', buf, 62)[0]
- obj.buffer_id = struct.unpack_from('!L', buf, 64)[0]
- obj.out_port = struct.unpack_from('!H', buf, 68)[0]
- obj.flags = struct.unpack_from('!H', buf, 70)[0]
- obj.actions = action.unpack_list(buffer(buf, 72))
+ if type(buf) == loxi.generic_util.OFReader:
+ reader = buf
+ else:
+ reader = loxi.generic_util.OFReader(buf)
+ _version = reader.read('!B')[0]
+ assert(_version == const.OFP_VERSION)
+ _type = reader.read('!B')[0]
+ assert(_type == const.OFPT_FLOW_MOD)
+ _length = reader.read('!H')[0]
+ obj.xid = reader.read('!L')[0]
+ obj.match = common.match.unpack(reader)
+ obj.cookie = reader.read('!Q')[0]
+ __command = reader.read('!H')[0]
+ assert(__command == const.OFPFC_DELETE)
+ obj.idle_timeout = reader.read('!H')[0]
+ obj.hard_timeout = reader.read('!H')[0]
+ obj.priority = reader.read('!H')[0]
+ obj.buffer_id = reader.read('!L')[0]
+ obj.out_port = reader.read('!H')[0]
+ obj.flags = reader.read('!H')[0]
+ obj.actions = action.unpack_list(reader)
return obj
def __eq__(self, other):
@@ -2522,25 +2615,27 @@
def unpack(buf):
if len(buf) < 8: raise loxi.ProtocolError("buffer too short to contain an OpenFlow message")
obj = flow_delete_strict()
- version = struct.unpack_from('!B', buf, 0)[0]
- assert(version == const.OFP_VERSION)
- type = struct.unpack_from('!B', buf, 1)[0]
- assert(type == const.OFPT_FLOW_MOD)
- _length = struct.unpack_from('!H', buf, 2)[0]
- assert(_length == len(buf))
- if _length < 72: raise loxi.ProtocolError("flow_delete_strict length is %d, should be at least 72" % _length)
- obj.xid = struct.unpack_from('!L', buf, 4)[0]
- obj.match = common.match.unpack(buffer(buf, 8))
- obj.cookie = struct.unpack_from('!Q', buf, 48)[0]
- _command = struct.unpack_from('!H', buf, 56)[0]
- assert(_command == const.OFPFC_DELETE_STRICT)
- obj.idle_timeout = struct.unpack_from('!H', buf, 58)[0]
- obj.hard_timeout = struct.unpack_from('!H', buf, 60)[0]
- obj.priority = struct.unpack_from('!H', buf, 62)[0]
- obj.buffer_id = struct.unpack_from('!L', buf, 64)[0]
- obj.out_port = struct.unpack_from('!H', buf, 68)[0]
- obj.flags = struct.unpack_from('!H', buf, 70)[0]
- obj.actions = action.unpack_list(buffer(buf, 72))
+ if type(buf) == loxi.generic_util.OFReader:
+ reader = buf
+ else:
+ reader = loxi.generic_util.OFReader(buf)
+ _version = reader.read('!B')[0]
+ assert(_version == const.OFP_VERSION)
+ _type = reader.read('!B')[0]
+ assert(_type == const.OFPT_FLOW_MOD)
+ _length = reader.read('!H')[0]
+ obj.xid = reader.read('!L')[0]
+ obj.match = common.match.unpack(reader)
+ obj.cookie = reader.read('!Q')[0]
+ __command = reader.read('!H')[0]
+ assert(__command == const.OFPFC_DELETE_STRICT)
+ obj.idle_timeout = reader.read('!H')[0]
+ obj.hard_timeout = reader.read('!H')[0]
+ obj.priority = reader.read('!H')[0]
+ obj.buffer_id = reader.read('!L')[0]
+ obj.out_port = reader.read('!H')[0]
+ obj.flags = reader.read('!H')[0]
+ obj.actions = action.unpack_list(reader)
return obj
def __eq__(self, other):
@@ -2677,25 +2772,27 @@
def unpack(buf):
if len(buf) < 8: raise loxi.ProtocolError("buffer too short to contain an OpenFlow message")
obj = flow_modify()
- version = struct.unpack_from('!B', buf, 0)[0]
- assert(version == const.OFP_VERSION)
- type = struct.unpack_from('!B', buf, 1)[0]
- assert(type == const.OFPT_FLOW_MOD)
- _length = struct.unpack_from('!H', buf, 2)[0]
- assert(_length == len(buf))
- if _length < 72: raise loxi.ProtocolError("flow_modify length is %d, should be at least 72" % _length)
- obj.xid = struct.unpack_from('!L', buf, 4)[0]
- obj.match = common.match.unpack(buffer(buf, 8))
- obj.cookie = struct.unpack_from('!Q', buf, 48)[0]
- _command = struct.unpack_from('!H', buf, 56)[0]
- assert(_command == const.OFPFC_MODIFY)
- obj.idle_timeout = struct.unpack_from('!H', buf, 58)[0]
- obj.hard_timeout = struct.unpack_from('!H', buf, 60)[0]
- obj.priority = struct.unpack_from('!H', buf, 62)[0]
- obj.buffer_id = struct.unpack_from('!L', buf, 64)[0]
- obj.out_port = struct.unpack_from('!H', buf, 68)[0]
- obj.flags = struct.unpack_from('!H', buf, 70)[0]
- obj.actions = action.unpack_list(buffer(buf, 72))
+ if type(buf) == loxi.generic_util.OFReader:
+ reader = buf
+ else:
+ reader = loxi.generic_util.OFReader(buf)
+ _version = reader.read('!B')[0]
+ assert(_version == const.OFP_VERSION)
+ _type = reader.read('!B')[0]
+ assert(_type == const.OFPT_FLOW_MOD)
+ _length = reader.read('!H')[0]
+ obj.xid = reader.read('!L')[0]
+ obj.match = common.match.unpack(reader)
+ obj.cookie = reader.read('!Q')[0]
+ __command = reader.read('!H')[0]
+ assert(__command == const.OFPFC_MODIFY)
+ obj.idle_timeout = reader.read('!H')[0]
+ obj.hard_timeout = reader.read('!H')[0]
+ obj.priority = reader.read('!H')[0]
+ obj.buffer_id = reader.read('!L')[0]
+ obj.out_port = reader.read('!H')[0]
+ obj.flags = reader.read('!H')[0]
+ obj.actions = action.unpack_list(reader)
return obj
def __eq__(self, other):
@@ -2832,25 +2929,27 @@
def unpack(buf):
if len(buf) < 8: raise loxi.ProtocolError("buffer too short to contain an OpenFlow message")
obj = flow_modify_strict()
- version = struct.unpack_from('!B', buf, 0)[0]
- assert(version == const.OFP_VERSION)
- type = struct.unpack_from('!B', buf, 1)[0]
- assert(type == const.OFPT_FLOW_MOD)
- _length = struct.unpack_from('!H', buf, 2)[0]
- assert(_length == len(buf))
- if _length < 72: raise loxi.ProtocolError("flow_modify_strict length is %d, should be at least 72" % _length)
- obj.xid = struct.unpack_from('!L', buf, 4)[0]
- obj.match = common.match.unpack(buffer(buf, 8))
- obj.cookie = struct.unpack_from('!Q', buf, 48)[0]
- _command = struct.unpack_from('!H', buf, 56)[0]
- assert(_command == const.OFPFC_MODIFY_STRICT)
- obj.idle_timeout = struct.unpack_from('!H', buf, 58)[0]
- obj.hard_timeout = struct.unpack_from('!H', buf, 60)[0]
- obj.priority = struct.unpack_from('!H', buf, 62)[0]
- obj.buffer_id = struct.unpack_from('!L', buf, 64)[0]
- obj.out_port = struct.unpack_from('!H', buf, 68)[0]
- obj.flags = struct.unpack_from('!H', buf, 70)[0]
- obj.actions = action.unpack_list(buffer(buf, 72))
+ if type(buf) == loxi.generic_util.OFReader:
+ reader = buf
+ else:
+ reader = loxi.generic_util.OFReader(buf)
+ _version = reader.read('!B')[0]
+ assert(_version == const.OFP_VERSION)
+ _type = reader.read('!B')[0]
+ assert(_type == const.OFPT_FLOW_MOD)
+ _length = reader.read('!H')[0]
+ obj.xid = reader.read('!L')[0]
+ obj.match = common.match.unpack(reader)
+ obj.cookie = reader.read('!Q')[0]
+ __command = reader.read('!H')[0]
+ assert(__command == const.OFPFC_MODIFY_STRICT)
+ obj.idle_timeout = reader.read('!H')[0]
+ obj.hard_timeout = reader.read('!H')[0]
+ obj.priority = reader.read('!H')[0]
+ obj.buffer_id = reader.read('!L')[0]
+ obj.out_port = reader.read('!H')[0]
+ obj.flags = reader.read('!H')[0]
+ obj.actions = action.unpack_list(reader)
return obj
def __eq__(self, other):
@@ -2923,7 +3022,7 @@
version = const.OFP_VERSION
type = const.OFPT_FLOW_REMOVED
- def __init__(self, xid=None, match=None, cookie=None, priority=None, reason=None, pad=None, duration_sec=None, duration_nsec=None, idle_timeout=None, pad2=None, packet_count=None, byte_count=None):
+ def __init__(self, xid=None, match=None, cookie=None, priority=None, reason=None, duration_sec=None, duration_nsec=None, idle_timeout=None, packet_count=None, byte_count=None):
self.xid = xid
if match != None:
self.match = match
@@ -2941,10 +3040,6 @@
self.reason = reason
else:
self.reason = 0
- if pad != None:
- self.pad = pad
- else:
- self.pad = 0
if duration_sec != None:
self.duration_sec = duration_sec
else:
@@ -2957,10 +3052,6 @@
self.idle_timeout = idle_timeout
else:
self.idle_timeout = 0
- if pad2 != None:
- self.pad2 = pad2
- else:
- self.pad2 = [0,0]
if packet_count != None:
self.packet_count = packet_count
else:
@@ -2980,11 +3071,11 @@
packed.append(struct.pack("!Q", self.cookie))
packed.append(struct.pack("!H", self.priority))
packed.append(struct.pack("!B", self.reason))
- packed.append(struct.pack("!B", self.pad))
+ packed.append('\x00' * 1)
packed.append(struct.pack("!L", self.duration_sec))
packed.append(struct.pack("!L", self.duration_nsec))
packed.append(struct.pack("!H", self.idle_timeout))
- packed.append(struct.pack("!2B", *self.pad2))
+ packed.append('\x00' * 2)
packed.append(struct.pack("!Q", self.packet_count))
packed.append(struct.pack("!Q", self.byte_count))
length = sum([len(x) for x in packed])
@@ -2995,25 +3086,27 @@
def unpack(buf):
if len(buf) < 8: raise loxi.ProtocolError("buffer too short to contain an OpenFlow message")
obj = flow_removed()
- version = struct.unpack_from('!B', buf, 0)[0]
- assert(version == const.OFP_VERSION)
- type = struct.unpack_from('!B', buf, 1)[0]
- assert(type == const.OFPT_FLOW_REMOVED)
- _length = struct.unpack_from('!H', buf, 2)[0]
- assert(_length == len(buf))
- if _length != 88: raise loxi.ProtocolError("flow_removed length is %d, should be 88" % _length)
- obj.xid = struct.unpack_from('!L', buf, 4)[0]
- obj.match = common.match.unpack(buffer(buf, 8))
- obj.cookie = struct.unpack_from('!Q', buf, 48)[0]
- obj.priority = struct.unpack_from('!H', buf, 56)[0]
- obj.reason = struct.unpack_from('!B', buf, 58)[0]
- obj.pad = struct.unpack_from('!B', buf, 59)[0]
- obj.duration_sec = struct.unpack_from('!L', buf, 60)[0]
- obj.duration_nsec = struct.unpack_from('!L', buf, 64)[0]
- obj.idle_timeout = struct.unpack_from('!H', buf, 68)[0]
- obj.pad2 = list(struct.unpack_from('!2B', buf, 70))
- obj.packet_count = struct.unpack_from('!Q', buf, 72)[0]
- obj.byte_count = struct.unpack_from('!Q', buf, 80)[0]
+ if type(buf) == loxi.generic_util.OFReader:
+ reader = buf
+ else:
+ reader = loxi.generic_util.OFReader(buf)
+ _version = reader.read('!B')[0]
+ assert(_version == const.OFP_VERSION)
+ _type = reader.read('!B')[0]
+ assert(_type == const.OFPT_FLOW_REMOVED)
+ _length = reader.read('!H')[0]
+ obj.xid = reader.read('!L')[0]
+ obj.match = common.match.unpack(reader)
+ obj.cookie = reader.read('!Q')[0]
+ obj.priority = reader.read('!H')[0]
+ obj.reason = reader.read('!B')[0]
+ reader.skip(1)
+ obj.duration_sec = reader.read('!L')[0]
+ obj.duration_nsec = reader.read('!L')[0]
+ obj.idle_timeout = reader.read('!H')[0]
+ reader.skip(2)
+ obj.packet_count = reader.read('!Q')[0]
+ obj.byte_count = reader.read('!Q')[0]
return obj
def __eq__(self, other):
@@ -3025,11 +3118,9 @@
if self.cookie != other.cookie: return False
if self.priority != other.priority: return False
if self.reason != other.reason: return False
- if self.pad != other.pad: return False
if self.duration_sec != other.duration_sec: return False
if self.duration_nsec != other.duration_nsec: return False
if self.idle_timeout != other.idle_timeout: return False
- if self.pad2 != other.pad2: return False
if self.packet_count != other.packet_count: return False
if self.byte_count != other.byte_count: return False
return True
@@ -3067,9 +3158,6 @@
q.text("reason = ");
q.text("%#x" % self.reason)
q.text(","); q.breakable()
- q.text("pad = ");
- q.text("%#x" % self.pad)
- q.text(","); q.breakable()
q.text("duration_sec = ");
q.text("%#x" % self.duration_sec)
q.text(","); q.breakable()
@@ -3079,9 +3167,6 @@
q.text("idle_timeout = ");
q.text("%#x" % self.idle_timeout)
q.text(","); q.breakable()
- q.text("pad2 = ");
- q.pp(self.pad2)
- q.text(","); q.breakable()
q.text("packet_count = ");
q.text("%#x" % self.packet_count)
q.text(","); q.breakable()
@@ -3123,18 +3208,20 @@
def unpack(buf):
if len(buf) < 8: raise loxi.ProtocolError("buffer too short to contain an OpenFlow message")
obj = flow_stats_reply()
- version = struct.unpack_from('!B', buf, 0)[0]
- assert(version == const.OFP_VERSION)
- type = struct.unpack_from('!B', buf, 1)[0]
- assert(type == const.OFPT_STATS_REPLY)
- _length = struct.unpack_from('!H', buf, 2)[0]
- assert(_length == len(buf))
- if _length < 12: raise loxi.ProtocolError("flow_stats_reply length is %d, should be at least 12" % _length)
- obj.xid = struct.unpack_from('!L', buf, 4)[0]
- stats_type = struct.unpack_from('!H', buf, 8)[0]
- assert(stats_type == const.OFPST_FLOW)
- obj.flags = struct.unpack_from('!H', buf, 10)[0]
- obj.entries = common.unpack_list_flow_stats_entry(buffer(buf, 12))
+ if type(buf) == loxi.generic_util.OFReader:
+ reader = buf
+ else:
+ reader = loxi.generic_util.OFReader(buf)
+ _version = reader.read('!B')[0]
+ assert(_version == const.OFP_VERSION)
+ _type = reader.read('!B')[0]
+ assert(_type == const.OFPT_STATS_REPLY)
+ _length = reader.read('!H')[0]
+ obj.xid = reader.read('!L')[0]
+ _stats_type = reader.read('!H')[0]
+ assert(_stats_type == const.OFPST_FLOW)
+ obj.flags = reader.read('!H')[0]
+ obj.entries = common.unpack_list_flow_stats_entry(reader)
return obj
def __eq__(self, other):
@@ -3180,7 +3267,7 @@
type = const.OFPT_STATS_REQUEST
stats_type = const.OFPST_FLOW
- def __init__(self, xid=None, flags=None, match=None, table_id=None, pad=None, out_port=None):
+ def __init__(self, xid=None, flags=None, match=None, table_id=None, out_port=None):
self.xid = xid
if flags != None:
self.flags = flags
@@ -3194,10 +3281,6 @@
self.table_id = table_id
else:
self.table_id = 0
- if pad != None:
- self.pad = pad
- else:
- self.pad = 0
if out_port != None:
self.out_port = out_port
else:
@@ -3213,7 +3296,7 @@
packed.append(struct.pack("!H", self.flags))
packed.append(self.match.pack())
packed.append(struct.pack("!B", self.table_id))
- packed.append(struct.pack("!B", self.pad))
+ packed.append('\x00' * 1)
packed.append(struct.pack("!H", self.out_port))
length = sum([len(x) for x in packed])
packed[2] = struct.pack("!H", length)
@@ -3223,21 +3306,23 @@
def unpack(buf):
if len(buf) < 8: raise loxi.ProtocolError("buffer too short to contain an OpenFlow message")
obj = flow_stats_request()
- version = struct.unpack_from('!B', buf, 0)[0]
- assert(version == const.OFP_VERSION)
- type = struct.unpack_from('!B', buf, 1)[0]
- assert(type == const.OFPT_STATS_REQUEST)
- _length = struct.unpack_from('!H', buf, 2)[0]
- assert(_length == len(buf))
- if _length != 56: raise loxi.ProtocolError("flow_stats_request length is %d, should be 56" % _length)
- obj.xid = struct.unpack_from('!L', buf, 4)[0]
- stats_type = struct.unpack_from('!H', buf, 8)[0]
- assert(stats_type == const.OFPST_FLOW)
- obj.flags = struct.unpack_from('!H', buf, 10)[0]
- obj.match = common.match.unpack(buffer(buf, 12))
- obj.table_id = struct.unpack_from('!B', buf, 52)[0]
- obj.pad = struct.unpack_from('!B', buf, 53)[0]
- obj.out_port = struct.unpack_from('!H', buf, 54)[0]
+ if type(buf) == loxi.generic_util.OFReader:
+ reader = buf
+ else:
+ reader = loxi.generic_util.OFReader(buf)
+ _version = reader.read('!B')[0]
+ assert(_version == const.OFP_VERSION)
+ _type = reader.read('!B')[0]
+ assert(_type == const.OFPT_STATS_REQUEST)
+ _length = reader.read('!H')[0]
+ obj.xid = reader.read('!L')[0]
+ _stats_type = reader.read('!H')[0]
+ assert(_stats_type == const.OFPST_FLOW)
+ obj.flags = reader.read('!H')[0]
+ obj.match = common.match.unpack(reader)
+ obj.table_id = reader.read('!B')[0]
+ reader.skip(1)
+ obj.out_port = reader.read('!H')[0]
return obj
def __eq__(self, other):
@@ -3248,7 +3333,6 @@
if self.flags != other.flags: return False
if self.match != other.match: return False
if self.table_id != other.table_id: return False
- if self.pad != other.pad: return False
if self.out_port != other.out_port: return False
return True
@@ -3282,9 +3366,6 @@
q.text("table_id = ");
q.text("%#x" % self.table_id)
q.text(","); q.breakable()
- q.text("pad = ");
- q.text("%#x" % self.pad)
- q.text(","); q.breakable()
q.text("out_port = ");
q.text(util.pretty_port(self.out_port))
q.breakable()
@@ -3321,16 +3402,18 @@
def unpack(buf):
if len(buf) < 8: raise loxi.ProtocolError("buffer too short to contain an OpenFlow message")
obj = get_config_reply()
- version = struct.unpack_from('!B', buf, 0)[0]
- assert(version == const.OFP_VERSION)
- type = struct.unpack_from('!B', buf, 1)[0]
- assert(type == const.OFPT_GET_CONFIG_REPLY)
- _length = struct.unpack_from('!H', buf, 2)[0]
- assert(_length == len(buf))
- if _length != 12: raise loxi.ProtocolError("get_config_reply length is %d, should be 12" % _length)
- obj.xid = struct.unpack_from('!L', buf, 4)[0]
- obj.flags = struct.unpack_from('!H', buf, 8)[0]
- obj.miss_send_len = struct.unpack_from('!H', buf, 10)[0]
+ if type(buf) == loxi.generic_util.OFReader:
+ reader = buf
+ else:
+ reader = loxi.generic_util.OFReader(buf)
+ _version = reader.read('!B')[0]
+ assert(_version == const.OFP_VERSION)
+ _type = reader.read('!B')[0]
+ assert(_type == const.OFPT_GET_CONFIG_REPLY)
+ _length = reader.read('!H')[0]
+ obj.xid = reader.read('!L')[0]
+ obj.flags = reader.read('!H')[0]
+ obj.miss_send_len = reader.read('!H')[0]
return obj
def __eq__(self, other):
@@ -3392,14 +3475,16 @@
def unpack(buf):
if len(buf) < 8: raise loxi.ProtocolError("buffer too short to contain an OpenFlow message")
obj = get_config_request()
- version = struct.unpack_from('!B', buf, 0)[0]
- assert(version == const.OFP_VERSION)
- type = struct.unpack_from('!B', buf, 1)[0]
- assert(type == const.OFPT_GET_CONFIG_REQUEST)
- _length = struct.unpack_from('!H', buf, 2)[0]
- assert(_length == len(buf))
- if _length != 8: raise loxi.ProtocolError("get_config_request length is %d, should be 8" % _length)
- obj.xid = struct.unpack_from('!L', buf, 4)[0]
+ if type(buf) == loxi.generic_util.OFReader:
+ reader = buf
+ else:
+ reader = loxi.generic_util.OFReader(buf)
+ _version = reader.read('!B')[0]
+ assert(_version == const.OFP_VERSION)
+ _type = reader.read('!B')[0]
+ assert(_type == const.OFPT_GET_CONFIG_REQUEST)
+ _length = reader.read('!H')[0]
+ obj.xid = reader.read('!L')[0]
return obj
def __eq__(self, other):
@@ -3453,14 +3538,16 @@
def unpack(buf):
if len(buf) < 8: raise loxi.ProtocolError("buffer too short to contain an OpenFlow message")
obj = hello()
- version = struct.unpack_from('!B', buf, 0)[0]
- assert(version == const.OFP_VERSION)
- type = struct.unpack_from('!B', buf, 1)[0]
- assert(type == const.OFPT_HELLO)
- _length = struct.unpack_from('!H', buf, 2)[0]
- assert(_length == len(buf))
- if _length != 8: raise loxi.ProtocolError("hello length is %d, should be 8" % _length)
- obj.xid = struct.unpack_from('!L', buf, 4)[0]
+ if type(buf) == loxi.generic_util.OFReader:
+ reader = buf
+ else:
+ reader = loxi.generic_util.OFReader(buf)
+ _version = reader.read('!B')[0]
+ assert(_version == const.OFP_VERSION)
+ _type = reader.read('!B')[0]
+ assert(_type == const.OFPT_HELLO)
+ _length = reader.read('!H')[0]
+ obj.xid = reader.read('!L')[0]
return obj
def __eq__(self, other):
@@ -3523,19 +3610,21 @@
def unpack(buf):
if len(buf) < 8: raise loxi.ProtocolError("buffer too short to contain an OpenFlow message")
obj = nicira_controller_role_reply()
- version = struct.unpack_from('!B', buf, 0)[0]
- assert(version == const.OFP_VERSION)
- type = struct.unpack_from('!B', buf, 1)[0]
- assert(type == const.OFPT_VENDOR)
- _length = struct.unpack_from('!H', buf, 2)[0]
- assert(_length == len(buf))
- if _length != 20: raise loxi.ProtocolError("nicira_controller_role_reply length is %d, should be 20" % _length)
- obj.xid = struct.unpack_from('!L', buf, 4)[0]
- experimenter = struct.unpack_from('!L', buf, 8)[0]
- assert(experimenter == 0x2320)
- subtype = struct.unpack_from('!L', buf, 12)[0]
- assert(subtype == 11)
- obj.role = struct.unpack_from('!L', buf, 16)[0]
+ if type(buf) == loxi.generic_util.OFReader:
+ reader = buf
+ else:
+ reader = loxi.generic_util.OFReader(buf)
+ _version = reader.read('!B')[0]
+ assert(_version == const.OFP_VERSION)
+ _type = reader.read('!B')[0]
+ assert(_type == const.OFPT_VENDOR)
+ _length = reader.read('!H')[0]
+ obj.xid = reader.read('!L')[0]
+ _experimenter = reader.read('!L')[0]
+ assert(_experimenter == 0x2320)
+ _subtype = reader.read('!L')[0]
+ assert(_subtype == 11)
+ obj.role = reader.read('!L')[0]
return obj
def __eq__(self, other):
@@ -3602,19 +3691,21 @@
def unpack(buf):
if len(buf) < 8: raise loxi.ProtocolError("buffer too short to contain an OpenFlow message")
obj = nicira_controller_role_request()
- version = struct.unpack_from('!B', buf, 0)[0]
- assert(version == const.OFP_VERSION)
- type = struct.unpack_from('!B', buf, 1)[0]
- assert(type == const.OFPT_VENDOR)
- _length = struct.unpack_from('!H', buf, 2)[0]
- assert(_length == len(buf))
- if _length != 20: raise loxi.ProtocolError("nicira_controller_role_request length is %d, should be 20" % _length)
- obj.xid = struct.unpack_from('!L', buf, 4)[0]
- experimenter = struct.unpack_from('!L', buf, 8)[0]
- assert(experimenter == 0x2320)
- subtype = struct.unpack_from('!L', buf, 12)[0]
- assert(subtype == 10)
- obj.role = struct.unpack_from('!L', buf, 16)[0]
+ if type(buf) == loxi.generic_util.OFReader:
+ reader = buf
+ else:
+ reader = loxi.generic_util.OFReader(buf)
+ _version = reader.read('!B')[0]
+ assert(_version == const.OFP_VERSION)
+ _type = reader.read('!B')[0]
+ assert(_type == const.OFPT_VENDOR)
+ _length = reader.read('!H')[0]
+ obj.xid = reader.read('!L')[0]
+ _experimenter = reader.read('!L')[0]
+ assert(_experimenter == 0x2320)
+ _subtype = reader.read('!L')[0]
+ assert(_subtype == 10)
+ obj.role = reader.read('!L')[0]
return obj
def __eq__(self, other):
@@ -3655,7 +3746,7 @@
version = const.OFP_VERSION
type = const.OFPT_PACKET_IN
- def __init__(self, xid=None, buffer_id=None, total_len=None, in_port=None, reason=None, pad=None, data=None):
+ def __init__(self, xid=None, buffer_id=None, total_len=None, in_port=None, reason=None, data=None):
self.xid = xid
if buffer_id != None:
self.buffer_id = buffer_id
@@ -3673,10 +3764,6 @@
self.reason = reason
else:
self.reason = 0
- if pad != None:
- self.pad = pad
- else:
- self.pad = 0
if data != None:
self.data = data
else:
@@ -3692,7 +3779,7 @@
packed.append(struct.pack("!H", self.total_len))
packed.append(struct.pack("!H", self.in_port))
packed.append(struct.pack("!B", self.reason))
- packed.append(struct.pack("!B", self.pad))
+ packed.append('\x00' * 1)
packed.append(self.data)
length = sum([len(x) for x in packed])
packed[2] = struct.pack("!H", length)
@@ -3702,20 +3789,22 @@
def unpack(buf):
if len(buf) < 8: raise loxi.ProtocolError("buffer too short to contain an OpenFlow message")
obj = packet_in()
- version = struct.unpack_from('!B', buf, 0)[0]
- assert(version == const.OFP_VERSION)
- type = struct.unpack_from('!B', buf, 1)[0]
- assert(type == const.OFPT_PACKET_IN)
- _length = struct.unpack_from('!H', buf, 2)[0]
- assert(_length == len(buf))
- if _length < 18: raise loxi.ProtocolError("packet_in length is %d, should be at least 18" % _length)
- obj.xid = struct.unpack_from('!L', buf, 4)[0]
- obj.buffer_id = struct.unpack_from('!L', buf, 8)[0]
- obj.total_len = struct.unpack_from('!H', buf, 12)[0]
- obj.in_port = struct.unpack_from('!H', buf, 14)[0]
- obj.reason = struct.unpack_from('!B', buf, 16)[0]
- obj.pad = struct.unpack_from('!B', buf, 17)[0]
- obj.data = buf[18:]
+ if type(buf) == loxi.generic_util.OFReader:
+ reader = buf
+ else:
+ reader = loxi.generic_util.OFReader(buf)
+ _version = reader.read('!B')[0]
+ assert(_version == const.OFP_VERSION)
+ _type = reader.read('!B')[0]
+ assert(_type == const.OFPT_PACKET_IN)
+ _length = reader.read('!H')[0]
+ obj.xid = reader.read('!L')[0]
+ obj.buffer_id = reader.read('!L')[0]
+ obj.total_len = reader.read('!H')[0]
+ obj.in_port = reader.read('!H')[0]
+ obj.reason = reader.read('!B')[0]
+ reader.skip(1)
+ obj.data = str(reader.read_all())
return obj
def __eq__(self, other):
@@ -3727,7 +3816,6 @@
if self.total_len != other.total_len: return False
if self.in_port != other.in_port: return False
if self.reason != other.reason: return False
- if self.pad != other.pad: return False
if self.data != other.data: return False
return True
@@ -3764,9 +3852,6 @@
q.text("reason = ");
q.text("%#x" % self.reason)
q.text(","); q.breakable()
- q.text("pad = ");
- q.text("%#x" % self.pad)
- q.text(","); q.breakable()
q.text("data = ");
q.pp(self.data)
q.breakable()
@@ -3799,13 +3884,13 @@
packed = []
packed.append(struct.pack("!B", self.version))
packed.append(struct.pack("!B", self.type))
- packed.append(struct.pack("!H", 0)) # placeholder for length at index 3
+ packed.append(struct.pack("!H", 0)) # placeholder for length at index 2
packed.append(struct.pack("!L", self.xid))
packed.append(struct.pack("!L", self.buffer_id))
packed.append(struct.pack("!H", self.in_port))
- packed_actions = "".join([x.pack() for x in self.actions])
- packed.append(struct.pack("!H", len(packed_actions)))
- packed.append(packed_actions)
+ packed.append(struct.pack("!H", 0)) # placeholder for actions_len at index 6
+ packed.append("".join([x.pack() for x in self.actions]))
+ packed[6] = struct.pack("!H", len(packed[-1]))
packed.append(self.data)
length = sum([len(x) for x in packed])
packed[2] = struct.pack("!H", length)
@@ -3815,19 +3900,21 @@
def unpack(buf):
if len(buf) < 8: raise loxi.ProtocolError("buffer too short to contain an OpenFlow message")
obj = packet_out()
- version = struct.unpack_from('!B', buf, 0)[0]
- assert(version == const.OFP_VERSION)
- type = struct.unpack_from('!B', buf, 1)[0]
- assert(type == const.OFPT_PACKET_OUT)
- _length = struct.unpack_from('!H', buf, 2)[0]
- assert(_length == len(buf))
- if _length < 16: raise loxi.ProtocolError("packet_out length is %d, should be at least 16" % _length)
- obj.xid = struct.unpack_from('!L', buf, 4)[0]
- obj.buffer_id = struct.unpack_from('!L', buf, 8)[0]
- obj.in_port = struct.unpack_from('!H', buf, 12)[0]
- actions_len = struct.unpack_from('!H', buf, 14)[0]
- obj.actions = action.unpack_list(buffer(buf, 16, actions_len))
- obj.data = str(buffer(buf, 16+actions_len))
+ if type(buf) == loxi.generic_util.OFReader:
+ reader = buf
+ else:
+ reader = loxi.generic_util.OFReader(buf)
+ _version = reader.read('!B')[0]
+ assert(_version == const.OFP_VERSION)
+ _type = reader.read('!B')[0]
+ assert(_type == const.OFPT_PACKET_OUT)
+ _length = reader.read('!H')[0]
+ obj.xid = reader.read('!L')[0]
+ obj.buffer_id = reader.read('!L')[0]
+ obj.in_port = reader.read('!H')[0]
+ _actions_len = reader.read('!H')[0]
+ obj.actions = action.unpack_list(reader.slice(_actions_len))
+ obj.data = str(reader.read_all())
return obj
def __eq__(self, other):
@@ -3880,7 +3967,7 @@
version = const.OFP_VERSION
type = const.OFPT_PORT_MOD
- def __init__(self, xid=None, port_no=None, hw_addr=None, config=None, mask=None, advertise=None, pad=None):
+ def __init__(self, xid=None, port_no=None, hw_addr=None, config=None, mask=None, advertise=None):
self.xid = xid
if port_no != None:
self.port_no = port_no
@@ -3902,10 +3989,6 @@
self.advertise = advertise
else:
self.advertise = 0
- if pad != None:
- self.pad = pad
- else:
- self.pad = [0,0,0,0]
def pack(self):
packed = []
@@ -3918,7 +4001,7 @@
packed.append(struct.pack("!L", self.config))
packed.append(struct.pack("!L", self.mask))
packed.append(struct.pack("!L", self.advertise))
- packed.append(struct.pack("!4B", *self.pad))
+ packed.append('\x00' * 4)
length = sum([len(x) for x in packed])
packed[2] = struct.pack("!H", length)
return ''.join(packed)
@@ -3927,20 +4010,22 @@
def unpack(buf):
if len(buf) < 8: raise loxi.ProtocolError("buffer too short to contain an OpenFlow message")
obj = port_mod()
- version = struct.unpack_from('!B', buf, 0)[0]
- assert(version == const.OFP_VERSION)
- type = struct.unpack_from('!B', buf, 1)[0]
- assert(type == const.OFPT_PORT_MOD)
- _length = struct.unpack_from('!H', buf, 2)[0]
- assert(_length == len(buf))
- if _length != 32: raise loxi.ProtocolError("port_mod length is %d, should be 32" % _length)
- obj.xid = struct.unpack_from('!L', buf, 4)[0]
- obj.port_no = struct.unpack_from('!H', buf, 8)[0]
- obj.hw_addr = list(struct.unpack_from('!6B', buf, 10))
- obj.config = struct.unpack_from('!L', buf, 16)[0]
- obj.mask = struct.unpack_from('!L', buf, 20)[0]
- obj.advertise = struct.unpack_from('!L', buf, 24)[0]
- obj.pad = list(struct.unpack_from('!4B', buf, 28))
+ if type(buf) == loxi.generic_util.OFReader:
+ reader = buf
+ else:
+ reader = loxi.generic_util.OFReader(buf)
+ _version = reader.read('!B')[0]
+ assert(_version == const.OFP_VERSION)
+ _type = reader.read('!B')[0]
+ assert(_type == const.OFPT_PORT_MOD)
+ _length = reader.read('!H')[0]
+ obj.xid = reader.read('!L')[0]
+ obj.port_no = reader.read('!H')[0]
+ obj.hw_addr = list(reader.read('!6B'))
+ obj.config = reader.read('!L')[0]
+ obj.mask = reader.read('!L')[0]
+ obj.advertise = reader.read('!L')[0]
+ reader.skip(4)
return obj
def __eq__(self, other):
@@ -3953,7 +4038,6 @@
if self.config != other.config: return False
if self.mask != other.mask: return False
if self.advertise != other.advertise: return False
- if self.pad != other.pad: return False
return True
def __ne__(self, other):
@@ -3991,9 +4075,6 @@
q.text(","); q.breakable()
q.text("advertise = ");
q.text("%#x" % self.advertise)
- q.text(","); q.breakable()
- q.text("pad = ");
- q.pp(self.pad)
q.breakable()
q.text('}')
@@ -4030,18 +4111,20 @@
def unpack(buf):
if len(buf) < 8: raise loxi.ProtocolError("buffer too short to contain an OpenFlow message")
obj = port_stats_reply()
- version = struct.unpack_from('!B', buf, 0)[0]
- assert(version == const.OFP_VERSION)
- type = struct.unpack_from('!B', buf, 1)[0]
- assert(type == const.OFPT_STATS_REPLY)
- _length = struct.unpack_from('!H', buf, 2)[0]
- assert(_length == len(buf))
- if _length < 12: raise loxi.ProtocolError("port_stats_reply length is %d, should be at least 12" % _length)
- obj.xid = struct.unpack_from('!L', buf, 4)[0]
- stats_type = struct.unpack_from('!H', buf, 8)[0]
- assert(stats_type == const.OFPST_PORT)
- obj.flags = struct.unpack_from('!H', buf, 10)[0]
- obj.entries = util.unpack_array(common.port_stats_entry.unpack, 104, buffer(buf, 12))
+ if type(buf) == loxi.generic_util.OFReader:
+ reader = buf
+ else:
+ reader = loxi.generic_util.OFReader(buf)
+ _version = reader.read('!B')[0]
+ assert(_version == const.OFP_VERSION)
+ _type = reader.read('!B')[0]
+ assert(_type == const.OFPT_STATS_REPLY)
+ _length = reader.read('!H')[0]
+ obj.xid = reader.read('!L')[0]
+ _stats_type = reader.read('!H')[0]
+ assert(_stats_type == const.OFPST_PORT)
+ obj.flags = reader.read('!H')[0]
+ obj.entries = loxi.generic_util.unpack_list(reader, common.port_stats_entry.unpack)
return obj
def __eq__(self, other):
@@ -4087,7 +4170,7 @@
type = const.OFPT_STATS_REQUEST
stats_type = const.OFPST_PORT
- def __init__(self, xid=None, flags=None, port_no=None, pad=None):
+ def __init__(self, xid=None, flags=None, port_no=None):
self.xid = xid
if flags != None:
self.flags = flags
@@ -4097,10 +4180,6 @@
self.port_no = port_no
else:
self.port_no = 0
- if pad != None:
- self.pad = pad
- else:
- self.pad = [0,0,0,0,0,0]
def pack(self):
packed = []
@@ -4111,7 +4190,7 @@
packed.append(struct.pack("!H", self.stats_type))
packed.append(struct.pack("!H", self.flags))
packed.append(struct.pack("!H", self.port_no))
- packed.append(struct.pack("!6B", *self.pad))
+ packed.append('\x00' * 6)
length = sum([len(x) for x in packed])
packed[2] = struct.pack("!H", length)
return ''.join(packed)
@@ -4120,19 +4199,21 @@
def unpack(buf):
if len(buf) < 8: raise loxi.ProtocolError("buffer too short to contain an OpenFlow message")
obj = port_stats_request()
- version = struct.unpack_from('!B', buf, 0)[0]
- assert(version == const.OFP_VERSION)
- type = struct.unpack_from('!B', buf, 1)[0]
- assert(type == const.OFPT_STATS_REQUEST)
- _length = struct.unpack_from('!H', buf, 2)[0]
- assert(_length == len(buf))
- if _length != 20: raise loxi.ProtocolError("port_stats_request length is %d, should be 20" % _length)
- obj.xid = struct.unpack_from('!L', buf, 4)[0]
- stats_type = struct.unpack_from('!H', buf, 8)[0]
- assert(stats_type == const.OFPST_PORT)
- obj.flags = struct.unpack_from('!H', buf, 10)[0]
- obj.port_no = struct.unpack_from('!H', buf, 12)[0]
- obj.pad = list(struct.unpack_from('!6B', buf, 14))
+ if type(buf) == loxi.generic_util.OFReader:
+ reader = buf
+ else:
+ reader = loxi.generic_util.OFReader(buf)
+ _version = reader.read('!B')[0]
+ assert(_version == const.OFP_VERSION)
+ _type = reader.read('!B')[0]
+ assert(_type == const.OFPT_STATS_REQUEST)
+ _length = reader.read('!H')[0]
+ obj.xid = reader.read('!L')[0]
+ _stats_type = reader.read('!H')[0]
+ assert(_stats_type == const.OFPST_PORT)
+ obj.flags = reader.read('!H')[0]
+ obj.port_no = reader.read('!H')[0]
+ reader.skip(6)
return obj
def __eq__(self, other):
@@ -4142,7 +4223,6 @@
if self.xid != other.xid: return False
if self.flags != other.flags: return False
if self.port_no != other.port_no: return False
- if self.pad != other.pad: return False
return True
def __ne__(self, other):
@@ -4171,9 +4251,6 @@
q.text(","); q.breakable()
q.text("port_no = ");
q.text(util.pretty_port(self.port_no))
- q.text(","); q.breakable()
- q.text("pad = ");
- q.pp(self.pad)
q.breakable()
q.text('}')
@@ -4181,16 +4258,12 @@
version = const.OFP_VERSION
type = const.OFPT_PORT_STATUS
- def __init__(self, xid=None, reason=None, pad=None, desc=None):
+ def __init__(self, xid=None, reason=None, desc=None):
self.xid = xid
if reason != None:
self.reason = reason
else:
self.reason = 0
- if pad != None:
- self.pad = pad
- else:
- self.pad = [0,0,0,0,0,0,0]
if desc != None:
self.desc = desc
else:
@@ -4203,7 +4276,7 @@
packed.append(struct.pack("!H", 0)) # placeholder for length at index 2
packed.append(struct.pack("!L", self.xid))
packed.append(struct.pack("!B", self.reason))
- packed.append(struct.pack("!7B", *self.pad))
+ packed.append('\x00' * 7)
packed.append(self.desc.pack())
length = sum([len(x) for x in packed])
packed[2] = struct.pack("!H", length)
@@ -4213,17 +4286,19 @@
def unpack(buf):
if len(buf) < 8: raise loxi.ProtocolError("buffer too short to contain an OpenFlow message")
obj = port_status()
- version = struct.unpack_from('!B', buf, 0)[0]
- assert(version == const.OFP_VERSION)
- type = struct.unpack_from('!B', buf, 1)[0]
- assert(type == const.OFPT_PORT_STATUS)
- _length = struct.unpack_from('!H', buf, 2)[0]
- assert(_length == len(buf))
- if _length != 64: raise loxi.ProtocolError("port_status length is %d, should be 64" % _length)
- obj.xid = struct.unpack_from('!L', buf, 4)[0]
- obj.reason = struct.unpack_from('!B', buf, 8)[0]
- obj.pad = list(struct.unpack_from('!7B', buf, 9))
- obj.desc = common.port_desc.unpack(buffer(buf, 16))
+ if type(buf) == loxi.generic_util.OFReader:
+ reader = buf
+ else:
+ reader = loxi.generic_util.OFReader(buf)
+ _version = reader.read('!B')[0]
+ assert(_version == const.OFP_VERSION)
+ _type = reader.read('!B')[0]
+ assert(_type == const.OFPT_PORT_STATUS)
+ _length = reader.read('!H')[0]
+ obj.xid = reader.read('!L')[0]
+ obj.reason = reader.read('!B')[0]
+ reader.skip(7)
+ obj.desc = common.port_desc.unpack(reader)
return obj
def __eq__(self, other):
@@ -4232,7 +4307,6 @@
if self.type != other.type: return False
if self.xid != other.xid: return False
if self.reason != other.reason: return False
- if self.pad != other.pad: return False
if self.desc != other.desc: return False
return True
@@ -4260,9 +4334,6 @@
q.text("reason = ");
q.text("%#x" % self.reason)
q.text(","); q.breakable()
- q.text("pad = ");
- q.pp(self.pad)
- q.text(","); q.breakable()
q.text("desc = ");
q.pp(self.desc)
q.breakable()
@@ -4272,16 +4343,12 @@
version = const.OFP_VERSION
type = const.OFPT_QUEUE_GET_CONFIG_REPLY
- def __init__(self, xid=None, port=None, pad=None, queues=None):
+ def __init__(self, xid=None, port=None, queues=None):
self.xid = xid
if port != None:
self.port = port
else:
self.port = 0
- if pad != None:
- self.pad = pad
- else:
- self.pad = [0,0,0,0,0,0]
if queues != None:
self.queues = queues
else:
@@ -4294,7 +4361,7 @@
packed.append(struct.pack("!H", 0)) # placeholder for length at index 2
packed.append(struct.pack("!L", self.xid))
packed.append(struct.pack("!H", self.port))
- packed.append(struct.pack("!6B", *self.pad))
+ packed.append('\x00' * 6)
packed.append("".join([x.pack() for x in self.queues]))
length = sum([len(x) for x in packed])
packed[2] = struct.pack("!H", length)
@@ -4304,17 +4371,19 @@
def unpack(buf):
if len(buf) < 8: raise loxi.ProtocolError("buffer too short to contain an OpenFlow message")
obj = queue_get_config_reply()
- version = struct.unpack_from('!B', buf, 0)[0]
- assert(version == const.OFP_VERSION)
- type = struct.unpack_from('!B', buf, 1)[0]
- assert(type == const.OFPT_QUEUE_GET_CONFIG_REPLY)
- _length = struct.unpack_from('!H', buf, 2)[0]
- assert(_length == len(buf))
- if _length < 16: raise loxi.ProtocolError("queue_get_config_reply length is %d, should be at least 16" % _length)
- obj.xid = struct.unpack_from('!L', buf, 4)[0]
- obj.port = struct.unpack_from('!H', buf, 8)[0]
- obj.pad = list(struct.unpack_from('!6B', buf, 10))
- obj.queues = common.unpack_list_packet_queue(buffer(buf, 16))
+ if type(buf) == loxi.generic_util.OFReader:
+ reader = buf
+ else:
+ reader = loxi.generic_util.OFReader(buf)
+ _version = reader.read('!B')[0]
+ assert(_version == const.OFP_VERSION)
+ _type = reader.read('!B')[0]
+ assert(_type == const.OFPT_QUEUE_GET_CONFIG_REPLY)
+ _length = reader.read('!H')[0]
+ obj.xid = reader.read('!L')[0]
+ obj.port = reader.read('!H')[0]
+ reader.skip(6)
+ obj.queues = common.unpack_list_packet_queue(reader)
return obj
def __eq__(self, other):
@@ -4323,7 +4392,6 @@
if self.type != other.type: return False
if self.xid != other.xid: return False
if self.port != other.port: return False
- if self.pad != other.pad: return False
if self.queues != other.queues: return False
return True
@@ -4351,9 +4419,6 @@
q.text("port = ");
q.text(util.pretty_port(self.port))
q.text(","); q.breakable()
- q.text("pad = ");
- q.pp(self.pad)
- q.text(","); q.breakable()
q.text("queues = ");
q.pp(self.queues)
q.breakable()
@@ -4363,16 +4428,12 @@
version = const.OFP_VERSION
type = const.OFPT_QUEUE_GET_CONFIG_REQUEST
- def __init__(self, xid=None, port=None, pad=None):
+ def __init__(self, xid=None, port=None):
self.xid = xid
if port != None:
self.port = port
else:
self.port = 0
- if pad != None:
- self.pad = pad
- else:
- self.pad = [0,0]
def pack(self):
packed = []
@@ -4381,7 +4442,7 @@
packed.append(struct.pack("!H", 0)) # placeholder for length at index 2
packed.append(struct.pack("!L", self.xid))
packed.append(struct.pack("!H", self.port))
- packed.append(struct.pack("!2B", *self.pad))
+ packed.append('\x00' * 2)
length = sum([len(x) for x in packed])
packed[2] = struct.pack("!H", length)
return ''.join(packed)
@@ -4390,16 +4451,18 @@
def unpack(buf):
if len(buf) < 8: raise loxi.ProtocolError("buffer too short to contain an OpenFlow message")
obj = queue_get_config_request()
- version = struct.unpack_from('!B', buf, 0)[0]
- assert(version == const.OFP_VERSION)
- type = struct.unpack_from('!B', buf, 1)[0]
- assert(type == const.OFPT_QUEUE_GET_CONFIG_REQUEST)
- _length = struct.unpack_from('!H', buf, 2)[0]
- assert(_length == len(buf))
- if _length != 12: raise loxi.ProtocolError("queue_get_config_request length is %d, should be 12" % _length)
- obj.xid = struct.unpack_from('!L', buf, 4)[0]
- obj.port = struct.unpack_from('!H', buf, 8)[0]
- obj.pad = list(struct.unpack_from('!2B', buf, 10))
+ if type(buf) == loxi.generic_util.OFReader:
+ reader = buf
+ else:
+ reader = loxi.generic_util.OFReader(buf)
+ _version = reader.read('!B')[0]
+ assert(_version == const.OFP_VERSION)
+ _type = reader.read('!B')[0]
+ assert(_type == const.OFPT_QUEUE_GET_CONFIG_REQUEST)
+ _length = reader.read('!H')[0]
+ obj.xid = reader.read('!L')[0]
+ obj.port = reader.read('!H')[0]
+ reader.skip(2)
return obj
def __eq__(self, other):
@@ -4408,7 +4471,6 @@
if self.type != other.type: return False
if self.xid != other.xid: return False
if self.port != other.port: return False
- if self.pad != other.pad: return False
return True
def __ne__(self, other):
@@ -4434,9 +4496,6 @@
q.text(","); q.breakable()
q.text("port = ");
q.text(util.pretty_port(self.port))
- q.text(","); q.breakable()
- q.text("pad = ");
- q.pp(self.pad)
q.breakable()
q.text('}')
@@ -4473,18 +4532,20 @@
def unpack(buf):
if len(buf) < 8: raise loxi.ProtocolError("buffer too short to contain an OpenFlow message")
obj = queue_stats_reply()
- version = struct.unpack_from('!B', buf, 0)[0]
- assert(version == const.OFP_VERSION)
- type = struct.unpack_from('!B', buf, 1)[0]
- assert(type == const.OFPT_STATS_REPLY)
- _length = struct.unpack_from('!H', buf, 2)[0]
- assert(_length == len(buf))
- if _length < 12: raise loxi.ProtocolError("queue_stats_reply length is %d, should be at least 12" % _length)
- obj.xid = struct.unpack_from('!L', buf, 4)[0]
- stats_type = struct.unpack_from('!H', buf, 8)[0]
- assert(stats_type == const.OFPST_QUEUE)
- obj.flags = struct.unpack_from('!H', buf, 10)[0]
- obj.entries = util.unpack_array(common.queue_stats_entry.unpack, 32, buffer(buf, 12))
+ if type(buf) == loxi.generic_util.OFReader:
+ reader = buf
+ else:
+ reader = loxi.generic_util.OFReader(buf)
+ _version = reader.read('!B')[0]
+ assert(_version == const.OFP_VERSION)
+ _type = reader.read('!B')[0]
+ assert(_type == const.OFPT_STATS_REPLY)
+ _length = reader.read('!H')[0]
+ obj.xid = reader.read('!L')[0]
+ _stats_type = reader.read('!H')[0]
+ assert(_stats_type == const.OFPST_QUEUE)
+ obj.flags = reader.read('!H')[0]
+ obj.entries = loxi.generic_util.unpack_list(reader, common.queue_stats_entry.unpack)
return obj
def __eq__(self, other):
@@ -4530,7 +4591,7 @@
type = const.OFPT_STATS_REQUEST
stats_type = const.OFPST_QUEUE
- def __init__(self, xid=None, flags=None, port_no=None, pad=None, queue_id=None):
+ def __init__(self, xid=None, flags=None, port_no=None, queue_id=None):
self.xid = xid
if flags != None:
self.flags = flags
@@ -4540,10 +4601,6 @@
self.port_no = port_no
else:
self.port_no = 0
- if pad != None:
- self.pad = pad
- else:
- self.pad = [0,0]
if queue_id != None:
self.queue_id = queue_id
else:
@@ -4558,7 +4615,7 @@
packed.append(struct.pack("!H", self.stats_type))
packed.append(struct.pack("!H", self.flags))
packed.append(struct.pack("!H", self.port_no))
- packed.append(struct.pack("!2B", *self.pad))
+ packed.append('\x00' * 2)
packed.append(struct.pack("!L", self.queue_id))
length = sum([len(x) for x in packed])
packed[2] = struct.pack("!H", length)
@@ -4568,20 +4625,22 @@
def unpack(buf):
if len(buf) < 8: raise loxi.ProtocolError("buffer too short to contain an OpenFlow message")
obj = queue_stats_request()
- version = struct.unpack_from('!B', buf, 0)[0]
- assert(version == const.OFP_VERSION)
- type = struct.unpack_from('!B', buf, 1)[0]
- assert(type == const.OFPT_STATS_REQUEST)
- _length = struct.unpack_from('!H', buf, 2)[0]
- assert(_length == len(buf))
- if _length != 20: raise loxi.ProtocolError("queue_stats_request length is %d, should be 20" % _length)
- obj.xid = struct.unpack_from('!L', buf, 4)[0]
- stats_type = struct.unpack_from('!H', buf, 8)[0]
- assert(stats_type == const.OFPST_QUEUE)
- obj.flags = struct.unpack_from('!H', buf, 10)[0]
- obj.port_no = struct.unpack_from('!H', buf, 12)[0]
- obj.pad = list(struct.unpack_from('!2B', buf, 14))
- obj.queue_id = struct.unpack_from('!L', buf, 16)[0]
+ if type(buf) == loxi.generic_util.OFReader:
+ reader = buf
+ else:
+ reader = loxi.generic_util.OFReader(buf)
+ _version = reader.read('!B')[0]
+ assert(_version == const.OFP_VERSION)
+ _type = reader.read('!B')[0]
+ assert(_type == const.OFPT_STATS_REQUEST)
+ _length = reader.read('!H')[0]
+ obj.xid = reader.read('!L')[0]
+ _stats_type = reader.read('!H')[0]
+ assert(_stats_type == const.OFPST_QUEUE)
+ obj.flags = reader.read('!H')[0]
+ obj.port_no = reader.read('!H')[0]
+ reader.skip(2)
+ obj.queue_id = reader.read('!L')[0]
return obj
def __eq__(self, other):
@@ -4591,7 +4650,6 @@
if self.xid != other.xid: return False
if self.flags != other.flags: return False
if self.port_no != other.port_no: return False
- if self.pad != other.pad: return False
if self.queue_id != other.queue_id: return False
return True
@@ -4622,9 +4680,6 @@
q.text("port_no = ");
q.text(util.pretty_port(self.port_no))
q.text(","); q.breakable()
- q.text("pad = ");
- q.pp(self.pad)
- q.text(","); q.breakable()
q.text("queue_id = ");
q.text("%#x" % self.queue_id)
q.breakable()
@@ -4661,16 +4716,18 @@
def unpack(buf):
if len(buf) < 8: raise loxi.ProtocolError("buffer too short to contain an OpenFlow message")
obj = set_config()
- version = struct.unpack_from('!B', buf, 0)[0]
- assert(version == const.OFP_VERSION)
- type = struct.unpack_from('!B', buf, 1)[0]
- assert(type == const.OFPT_SET_CONFIG)
- _length = struct.unpack_from('!H', buf, 2)[0]
- assert(_length == len(buf))
- if _length != 12: raise loxi.ProtocolError("set_config length is %d, should be 12" % _length)
- obj.xid = struct.unpack_from('!L', buf, 4)[0]
- obj.flags = struct.unpack_from('!H', buf, 8)[0]
- obj.miss_send_len = struct.unpack_from('!H', buf, 10)[0]
+ if type(buf) == loxi.generic_util.OFReader:
+ reader = buf
+ else:
+ reader = loxi.generic_util.OFReader(buf)
+ _version = reader.read('!B')[0]
+ assert(_version == const.OFP_VERSION)
+ _type = reader.read('!B')[0]
+ assert(_type == const.OFPT_SET_CONFIG)
+ _length = reader.read('!H')[0]
+ obj.xid = reader.read('!L')[0]
+ obj.flags = reader.read('!H')[0]
+ obj.miss_send_len = reader.read('!H')[0]
return obj
def __eq__(self, other):
@@ -4715,16 +4772,12 @@
version = const.OFP_VERSION
type = 22
- def __init__(self, xid=None, table_id=None, pad=None, config=None):
+ def __init__(self, xid=None, table_id=None, config=None):
self.xid = xid
if table_id != None:
self.table_id = table_id
else:
self.table_id = 0
- if pad != None:
- self.pad = pad
- else:
- self.pad = [0,0,0]
if config != None:
self.config = config
else:
@@ -4737,7 +4790,7 @@
packed.append(struct.pack("!H", 0)) # placeholder for length at index 2
packed.append(struct.pack("!L", self.xid))
packed.append(struct.pack("!B", self.table_id))
- packed.append(struct.pack("!3B", *self.pad))
+ packed.append('\x00' * 3)
packed.append(struct.pack("!L", self.config))
length = sum([len(x) for x in packed])
packed[2] = struct.pack("!H", length)
@@ -4747,17 +4800,19 @@
def unpack(buf):
if len(buf) < 8: raise loxi.ProtocolError("buffer too short to contain an OpenFlow message")
obj = table_mod()
- version = struct.unpack_from('!B', buf, 0)[0]
- assert(version == const.OFP_VERSION)
- type = struct.unpack_from('!B', buf, 1)[0]
- assert(type == 22)
- _length = struct.unpack_from('!H', buf, 2)[0]
- assert(_length == len(buf))
- if _length != 16: raise loxi.ProtocolError("table_mod length is %d, should be 16" % _length)
- obj.xid = struct.unpack_from('!L', buf, 4)[0]
- obj.table_id = struct.unpack_from('!B', buf, 8)[0]
- obj.pad = list(struct.unpack_from('!3B', buf, 9))
- obj.config = struct.unpack_from('!L', buf, 12)[0]
+ if type(buf) == loxi.generic_util.OFReader:
+ reader = buf
+ else:
+ reader = loxi.generic_util.OFReader(buf)
+ _version = reader.read('!B')[0]
+ assert(_version == const.OFP_VERSION)
+ _type = reader.read('!B')[0]
+ assert(_type == 22)
+ _length = reader.read('!H')[0]
+ obj.xid = reader.read('!L')[0]
+ obj.table_id = reader.read('!B')[0]
+ reader.skip(3)
+ obj.config = reader.read('!L')[0]
return obj
def __eq__(self, other):
@@ -4766,7 +4821,6 @@
if self.type != other.type: return False
if self.xid != other.xid: return False
if self.table_id != other.table_id: return False
- if self.pad != other.pad: return False
if self.config != other.config: return False
return True
@@ -4794,9 +4848,6 @@
q.text("table_id = ");
q.text("%#x" % self.table_id)
q.text(","); q.breakable()
- q.text("pad = ");
- q.pp(self.pad)
- q.text(","); q.breakable()
q.text("config = ");
q.text("%#x" % self.config)
q.breakable()
@@ -4835,18 +4886,20 @@
def unpack(buf):
if len(buf) < 8: raise loxi.ProtocolError("buffer too short to contain an OpenFlow message")
obj = table_stats_reply()
- version = struct.unpack_from('!B', buf, 0)[0]
- assert(version == const.OFP_VERSION)
- type = struct.unpack_from('!B', buf, 1)[0]
- assert(type == const.OFPT_STATS_REPLY)
- _length = struct.unpack_from('!H', buf, 2)[0]
- assert(_length == len(buf))
- if _length < 12: raise loxi.ProtocolError("table_stats_reply length is %d, should be at least 12" % _length)
- obj.xid = struct.unpack_from('!L', buf, 4)[0]
- stats_type = struct.unpack_from('!H', buf, 8)[0]
- assert(stats_type == const.OFPST_TABLE)
- obj.flags = struct.unpack_from('!H', buf, 10)[0]
- obj.entries = util.unpack_array(common.table_stats_entry.unpack, 64, buffer(buf, 12))
+ if type(buf) == loxi.generic_util.OFReader:
+ reader = buf
+ else:
+ reader = loxi.generic_util.OFReader(buf)
+ _version = reader.read('!B')[0]
+ assert(_version == const.OFP_VERSION)
+ _type = reader.read('!B')[0]
+ assert(_type == const.OFPT_STATS_REPLY)
+ _length = reader.read('!H')[0]
+ obj.xid = reader.read('!L')[0]
+ _stats_type = reader.read('!H')[0]
+ assert(_stats_type == const.OFPST_TABLE)
+ obj.flags = reader.read('!H')[0]
+ obj.entries = loxi.generic_util.unpack_list(reader, common.table_stats_entry.unpack)
return obj
def __eq__(self, other):
@@ -4915,17 +4968,19 @@
def unpack(buf):
if len(buf) < 8: raise loxi.ProtocolError("buffer too short to contain an OpenFlow message")
obj = table_stats_request()
- version = struct.unpack_from('!B', buf, 0)[0]
- assert(version == const.OFP_VERSION)
- type = struct.unpack_from('!B', buf, 1)[0]
- assert(type == const.OFPT_STATS_REQUEST)
- _length = struct.unpack_from('!H', buf, 2)[0]
- assert(_length == len(buf))
- if _length != 12: raise loxi.ProtocolError("table_stats_request length is %d, should be 12" % _length)
- obj.xid = struct.unpack_from('!L', buf, 4)[0]
- stats_type = struct.unpack_from('!H', buf, 8)[0]
- assert(stats_type == const.OFPST_TABLE)
- obj.flags = struct.unpack_from('!H', buf, 10)[0]
+ if type(buf) == loxi.generic_util.OFReader:
+ reader = buf
+ else:
+ reader = loxi.generic_util.OFReader(buf)
+ _version = reader.read('!B')[0]
+ assert(_version == const.OFP_VERSION)
+ _type = reader.read('!B')[0]
+ assert(_type == const.OFPT_STATS_REQUEST)
+ _length = reader.read('!H')[0]
+ obj.xid = reader.read('!L')[0]
+ _stats_type = reader.read('!H')[0]
+ assert(_stats_type == const.OFPST_TABLE)
+ obj.flags = reader.read('!H')[0]
return obj
def __eq__(self, other):
@@ -5091,6 +5146,7 @@
4: bsn_get_mirroring_request.unpack,
0: bsn_set_ip_mask.unpack,
3: bsn_set_mirroring.unpack,
+ 11: bsn_set_pktin_suppression.unpack,
6: bsn_shell_command.unpack,
7: bsn_shell_output.unpack,
8: bsn_shell_status.unpack,