def dissect(self, data, payload_auto_decode=True): data = Protocol.dissect( self, data, payload_auto_decode=payload_auto_decode ) self.padding = data return b""
def dissect(self, data, payload_auto_decode=True): data = Protocol.dissect(self, data, payload_auto_decode=payload_auto_decode) cipher_data = data[:self.cipher_suites_length] data = data[self.cipher_suites_length:] while len(cipher_data) > 0: if len(cipher_data) < 3: # ToDo: error break cipher = SSLv2CipherSuiteField() cipher_data = cipher.dissect(cipher_data) self.cipher_suites.append(cipher) self.session_id = data[:self.session_id_length] data = data[self.session_id_length:] self.challenge = data[:self.challenge_length] data = data[self.challenge_length:] return data
def dissect(self, data, payload_auto_decode=True): data = Protocol.dissect( self, data, payload_auto_decode=payload_auto_decode ) cipher_data = data[:self.cipher_suites_length] data = data[self.cipher_suites_length:] while len(cipher_data) > 0: if len(cipher_data) < 3: # ToDo: error break cipher = SSLv2CipherSuiteField() cipher_data = cipher.dissect(cipher_data) self.cipher_suites.append(cipher) self.session_id = data[:self.session_id_length] data = data[self.session_id_length:] self.challenge = data[:self.challenge_length] data = data[self.challenge_length:] return data