def parse_p2(file_name): port_pattern = pattern_gen(G.regex_port); netlines = list(p1.read_file(S.argv[1], ';|\ |\=')); ips = locate_netelem(netlines, pattern_gen(G.regex_ip)); ports = locate_netelem(netlines, pattern_gen(G.regex_port)); for i in range(0, len(ips), 1): check_netstat(map(int, RE.split('\.', ips[i])), ports[i]);
def analyze_action(self): [atype, adesc] = self.description.split('-'); ttokens = atype.replace('"', '').strip().split(); if (G.div in ttokens): self.type = G.div; self.amount = float(RE.split('\ |\/', adesc.strip().replace('"', ''))[0]); #print div, self.amount, atype, adesc; elif (G.spl in ttokens): self.type = G.spl; self.denom = float(adesc.strip().split()[0]); self.numer = float(adesc.strip().split()[2]); #print spl, self.denom, self.numer, adesc; elif (G.chg in ttokens): self.type = G.chg; if (G.sym in ttokens): self.key = G.sym; elif ("Name" in ttokens): self.key = G.dsc; else: print "unknown change elem:", atype; S.exit(1); self.val = (adesc.strip().split()[-1]).replace('"', ''); #print G.chg, self.key, self.val; else: print "unknown action type", self.description; S.exit(1);