Python socket.sendall() Examples
The following are 30
code examples of socket.sendall().
You can vote up the ones you like or vote down the ones you don't like,
and go to the original project or source file by following the links above each example.
You may also want to check out all available functions/classes of the module
socket
, or try the search function
.
Example #1
Source File: rfc2217.py From android_universal with MIT License | 6 votes |
def escape(self, data): """\ This generator function is for the user. All outgoing data has to be properly escaped, so that no IAC character in the data stream messes up the Telnet state machine in the server. socket.sendall(escape(data)) """ for byte in iterbytes(data): if byte == IAC: yield IAC yield IAC else: yield byte # - incoming data filter
Example #2
Source File: rfc2217.py From android3dblendermouse with Apache License 2.0 | 6 votes |
def escape(self, data): """\ This generator function is for the user. All outgoing data has to be properly escaped, so that no IAC character in the data stream messes up the Telnet state machine in the server. socket.sendall(escape(data)) """ for byte in iterbytes(data): if byte == IAC: yield IAC yield IAC else: yield byte # - incoming data filter
Example #3
Source File: visualstudio_py_debugger.py From iot-utilities with BSD 3-Clause "New" or "Revised" License | 6 votes |
def should_block_on_frame(self, frame): if not should_debug_code(frame.f_code): return False # It is still possible that we're somewhere in standard library code, but that code was invoked by our # internal debugger machinery (e.g. socket.sendall or text encoding while tee'ing print output to VS). # We don't want to block on any of that, either, so walk the stack and see if we hit debugger frames # at some point below the non-debugger ones. while frame is not None: # There is usually going to be a debugger frame at the very bottom of the stack - the one that # invoked user code on this thread when starting debugging. If we reached that, then everything # above is user code, so we know that we do want to block here. if frame.f_code in DEBUG_ENTRYPOINTS: break # Otherwise, check if it's some other debugger code. filename = path.normcase(frame.f_code.co_filename) is_debugger_frame = False for debugger_file in DONT_DEBUG: if is_same_py_file(filename, debugger_file): # If it is, then the frames above it on the stack that we have just walked through # were for debugger internal purposes, and we do not want to block here. return False frame = frame.f_back return True
Example #4
Source File: threading-CNVD-2020-10487-Tomcat-Ajp-lfi.py From POC-EXP with GNU General Public License v3.0 | 6 votes |
def send_and_receive(self, socket, stream, save_cookies=False): res = [] i = socket.sendall(self.serialize()) if self.method == AjpForwardRequest.POST: return res r = AjpResponse.receive(stream) assert r.prefix_code == AjpResponse.SEND_HEADERS res.append(r) if save_cookies and 'Set-Cookie' in r.response_headers: self.headers['SC_REQ_COOKIE'] = r.response_headers['Set-Cookie'] # read body chunks and end response packets while True: r = AjpResponse.receive(stream) res.append(r) if r.prefix_code == AjpResponse.END_RESPONSE: break elif r.prefix_code == AjpResponse.SEND_BODY_CHUNK: continue else: raise NotImplementedError break return res
Example #5
Source File: CNVD-2020-10487-Tomcat-Ajp-lfi.py From POC-EXP with GNU General Public License v3.0 | 6 votes |
def send_and_receive(self, socket, stream, save_cookies=False): res = [] i = socket.sendall(self.serialize()) if self.method == AjpForwardRequest.POST: return res r = AjpResponse.receive(stream) assert r.prefix_code == AjpResponse.SEND_HEADERS res.append(r) if save_cookies and 'Set-Cookie' in r.response_headers: self.headers['SC_REQ_COOKIE'] = r.response_headers['Set-Cookie'] # read body chunks and end response packets while True: r = AjpResponse.receive(stream) res.append(r) if r.prefix_code == AjpResponse.END_RESPONSE: break elif r.prefix_code == AjpResponse.SEND_BODY_CHUNK: continue else: raise NotImplementedError break return res
Example #6
Source File: rfc2217.py From Jandroid with BSD 3-Clause "New" or "Revised" License | 6 votes |
def escape(self, data): """\ this generator function is for the user. all outgoing data has to be properly escaped, so that no IAC character in the data stream messes up the Telnet state machine in the server. socket.sendall(escape(data)) """ for byte in data: if byte == IAC: yield IAC yield IAC else: yield byte # - incoming data filter
Example #7
Source File: rfc2217.py From Jandroid with BSD 3-Clause "New" or "Revised" License | 6 votes |
def write(self, data): """\ Output the given string over the serial port. Can block if the connection is blocked. May raise SerialException if the connection is closed. """ if not self._isOpen: raise portNotOpenError self._write_lock.acquire() try: try: self._socket.sendall(to_bytes(data).replace(IAC, IAC_DOUBLED)) except socket.error, e: raise SerialException("connection failed (socket error): %s" % e) # XXX what exception if socket connection fails finally: self._write_lock.release() return len(data)
Example #8
Source File: TomcatUnauthorizedCommandExecutionVulnerability.py From Medusa with GNU General Public License v3.0 | 6 votes |
def send_and_receive(self, socket, stream, save_cookies=False): res = [] i = socket.sendall(self.serialize()) if self.method == AjpForwardRequest.POST: return res r = AjpResponse.receive(stream) assert r.prefix_code == AjpResponse.SEND_HEADERS res.append(r) if save_cookies and 'Set-Cookie' in r.response_headers: self.headers['SC_REQ_COOKIE'] = r.response_headers['Set-Cookie'] # read body chunks and end response packets while True: r = AjpResponse.receive(stream) res.append(r) if r.prefix_code == AjpResponse.END_RESPONSE: break elif r.prefix_code == AjpResponse.SEND_BODY_CHUNK: continue else: raise NotImplementedError break return res
Example #9
Source File: rfc2217.py From Jandroid with BSD 3-Clause "New" or "Revised" License | 6 votes |
def write(self, data): """\ Output the given string over the serial port. Can block if the connection is blocked. May raise SerialException if the connection is closed. """ if not self._isOpen: raise portNotOpenError self._write_lock.acquire() try: try: self._socket.sendall(to_bytes(data).replace(IAC, IAC_DOUBLED)) except socket.error, e: raise SerialException("connection failed (socket error): %s" % e) # XXX what exception if socket connection fails finally: self._write_lock.release() return len(data)
Example #10
Source File: visualstudio_py_debugger.py From iot-utilities with BSD 3-Clause "New" or "Revised" License | 6 votes |
def should_block_on_frame(self, frame): if not should_debug_code(frame.f_code): return False # It is still possible that we're somewhere in standard library code, but that code was invoked by our # internal debugger machinery (e.g. socket.sendall or text encoding while tee'ing print output to VS). # We don't want to block on any of that, either, so walk the stack and see if we hit debugger frames # at some point below the non-debugger ones. while frame is not None: # There is usually going to be a debugger frame at the very bottom of the stack - the one that # invoked user code on this thread when starting debugging. If we reached that, then everything # above is user code, so we know that we do want to block here. if frame.f_code in DEBUG_ENTRYPOINTS: break # Otherwise, check if it's some other debugger code. filename = path.normcase(frame.f_code.co_filename) is_debugger_frame = False for debugger_file in DONT_DEBUG: if is_same_py_file(filename, debugger_file): # If it is, then the frames above it on the stack that we have just walked through # were for debugger internal purposes, and we do not want to block here. return False frame = frame.f_back return True
Example #11
Source File: rfc2217.py From Jandroid with BSD 3-Clause "New" or "Revised" License | 6 votes |
def escape(self, data): """\ this generator function is for the user. all outgoing data has to be properly escaped, so that no IAC character in the data stream messes up the Telnet state machine in the server. socket.sendall(escape(data)) """ for byte in data: if byte == IAC: yield IAC yield IAC else: yield byte # - incoming data filter
Example #12
Source File: visualstudio_py_debugger.py From iot-utilities with BSD 3-Clause "New" or "Revised" License | 6 votes |
def should_block_on_frame(self, frame): if not should_debug_code(frame.f_code): return False # It is still possible that we're somewhere in standard library code, but that code was invoked by our # internal debugger machinery (e.g. socket.sendall or text encoding while tee'ing print output to VS). # We don't want to block on any of that, either, so walk the stack and see if we hit debugger frames # at some point below the non-debugger ones. while frame is not None: # There is usually going to be a debugger frame at the very bottom of the stack - the one that # invoked user code on this thread when starting debugging. If we reached that, then everything # above is user code, so we know that we do want to block here. if frame.f_code in DEBUG_ENTRYPOINTS: break # Otherwise, check if it's some other debugger code. filename = path.normcase(frame.f_code.co_filename) is_debugger_frame = False for debugger_file in DONT_DEBUG: if is_same_py_file(filename, debugger_file): # If it is, then the frames above it on the stack that we have just walked through # were for debugger internal purposes, and we do not want to block here. return False frame = frame.f_back return True
Example #13
Source File: visualstudio_py_debugger.py From iot-utilities with BSD 3-Clause "New" or "Revised" License | 6 votes |
def should_block_on_frame(self, frame): if not should_debug_code(frame.f_code): return False # It is still possible that we're somewhere in standard library code, but that code was invoked by our # internal debugger machinery (e.g. socket.sendall or text encoding while tee'ing print output to VS). # We don't want to block on any of that, either, so walk the stack and see if we hit debugger frames # at some point below the non-debugger ones. while frame is not None: # There is usually going to be a debugger frame at the very bottom of the stack - the one that # invoked user code on this thread when starting debugging. If we reached that, then everything # above is user code, so we know that we do want to block here. if frame.f_code in DEBUG_ENTRYPOINTS: break # Otherwise, check if it's some other debugger code. filename = path.normcase(frame.f_code.co_filename) is_debugger_frame = False for debugger_file in DONT_DEBUG: if is_same_py_file(filename, debugger_file): # If it is, then the frames above it on the stack that we have just walked through # were for debugger internal purposes, and we do not want to block here. return False frame = frame.f_back return True
Example #14
Source File: Blender.py From pyrobotlab with Apache License 2.0 | 5 votes |
def client(ip, port, message): sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM) sock.connect((ip, port)) try: sock.sendall(message) response = sock.recv(1024).encode print ("Received: {}".format(response)) finally: sock.close()
Example #15
Source File: net_ctrl.py From ryu with Apache License 2.0 | 5 votes |
def _send_error_response(rpc_session, socket, request, emsg): response = rpc_session.create_error_response(request[RPC_IDX_MSG_ID], str(emsg)) socket.sendall(response) # Network controller singleton
Example #16
Source File: Blender.py From pyrobotlab with Apache License 2.0 | 5 votes |
def sendMRLCOMMMsg(self, method, value): socket = bpy.mrl.virtualDevices[self.name].serialHandler.request print("sending bytes") print(bytes([170, method, 1, value])) # MRLCOMM PROTOCOL # MAGIC_NUMBER|NUM_BYTES|FUNCTION|DATA0|DATA1|....|DATA(N) # NUM_BYTES - is the number of bytes after NUM_BYTES to the end socket.sendall(bytes([170, 2, method, value]))
Example #17
Source File: Blender.py From pyrobotlab with Apache License 2.0 | 5 votes |
def attach(name, type): global readyToAttach # adding name an type to new virtual device newDevice = VirtualDevice(name, type) # constructing the correct type newDevice.service = eval(type + "('" + name + "')") bpy.mrl.virtualDevices[name] = newDevice readyToAttach = name print("onAttach " + str(name) + " " + str(type) + " SUCCESS - ready for serial connection") # print("<--- sending control onAttach(" + str(name) + ")") # control.request.sendall(createJsonMsg("onAttach", name)) return name
Example #18
Source File: Blender.py From pyrobotlab with Apache License 2.0 | 5 votes |
def onError(msg): print(msg) request = bpy.mrl.control.request request.sendall(createJsonMsg("onError", msg))
Example #19
Source File: connection.py From wampy with Mozilla Public License 2.0 | 5 votes |
def _send_raw(self, websocket_message): logger.debug('send raw: %s', websocket_message) self.socket.sendall(websocket_message)
Example #20
Source File: socket.py From acsploit with BSD 3-Clause "New" or "Revised" License | 5 votes |
def output(self, output_list): """Create a socket stream and send the payload as output.""" separator = output_common.get_separator(self.options['separator'], self._SEPARATORS) line = separator.join([self.convert_item(item) for item in output_list]) if self.options['final_separator']: line += separator protocol = Socket._VERSIONS[self.options['ip_version']] # TODO: handle exceptions? s = socket.socket(protocol, socket.SOCK_STREAM) s.connect((self.options['host'], self.options['port'])) if self.options['await_banner']: s.recv(Socket._BANNER_LENGTH) s.sendall(line) s.close()
Example #21
Source File: Blender.3.py From pyrobotlab with Apache License 2.0 | 5 votes |
def onError(msg): print(msg) request = bpy.mrl.control.request request.sendall(createJsonMsg("onError", msg))
Example #22
Source File: Blender.3.py From pyrobotlab with Apache License 2.0 | 5 votes |
def sendMRLCOMMMsg(self, method, value): socket = bpy.mrl.virtualDevices[self.name].serialHandler.request print("sending bytes") print(bytes([170, method, 1, value])) # MRLCOMM PROTOCOL # MAGIC_NUMBER|NUM_BYTES|FUNCTION|DATA0|DATA1|....|DATA(N) # NUM_BYTES - is the number of bytes after NUM_BYTES to the end socket.sendall(bytes([170, 2, method, value]))
Example #23
Source File: Blender.3.py From pyrobotlab with Apache License 2.0 | 5 votes |
def client(ip, port, message): sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM) sock.connect((ip, port)) try: sock.sendall(message) response = sock.recv(1024).encode print ("Received: {}".format(response)) finally: sock.close()
Example #24
Source File: process_level.py From SMAC-M with MIT License | 5 votes |
def send_progress(socket, min, max, current): if socket: s = "p:min={},max={},current={}\n".format(min, max, current) try: r = socket.sendall(s) except: print("Error sending progress information")
Example #25
Source File: rfc2217.py From android_universal with MIT License | 5 votes |
def write(self, data): """\ Output the given byte string over the serial port. Can block if the connection is blocked. May raise SerialException if the connection is closed. """ if not self.is_open: raise portNotOpenError # XXX use protocol_socket's write with self._write_lock: try: self._socket.sendall(to_bytes(data).replace(IAC, IAC_DOUBLED)) except socket.error as e: raise SerialException("connection failed (socket error): {}".format(e)) return len(data)
Example #26
Source File: rfc2217.py From android_universal with MIT License | 5 votes |
def _internal_raw_write(self, data): """internal socket write with no data escaping. used to send telnet stuff.""" with self._write_lock: self._socket.sendall(data)
Example #27
Source File: python_socket.py From ffai with Apache License 2.0 | 5 votes |
def send_data(data, socket, timeout=None): if timeout is not None and timeout < 0: raise Exception("Timeout cannot be lower than 0") msg = pickle.dumps(data) msg = bytes(f"{len(msg):<{HEADERSIZE}}", 'utf-8') + msg socket.settimeout(timeout) socket.sendall(msg)
Example #28
Source File: net_ctrl.py From ryu with Apache License 2.0 | 5 votes |
def _sendall(self, msg): return self._sock_wrap(self._socket.sendall)(msg)
Example #29
Source File: rfc2217.py From ddt4all with GNU General Public License v3.0 | 5 votes |
def write(self, data): """\ Output the given byte string over the serial port. Can block if the connection is blocked. May raise SerialException if the connection is closed. """ if not self.is_open: raise portNotOpenError with self._write_lock: try: self._socket.sendall(to_bytes(data).replace(IAC, IAC_DOUBLED)) except socket.error as e: raise SerialException("connection failed (socket error): {}".format(e)) return len(data)
Example #30
Source File: rfc2217.py From ddt4all with GNU General Public License v3.0 | 5 votes |
def _internal_raw_write(self, data): """internal socket write with no data escaping. used to send telnet stuff.""" with self._write_lock: self._socket.sendall(data)