diff --git a/src/core/lib/Delim.mjs b/src/core/lib/Delim.mjs
index 192d3582..5ad3ddb3 100644
--- a/src/core/lib/Delim.mjs
+++ b/src/core/lib/Delim.mjs
@@ -41,6 +41,11 @@ export const ARITHMETIC_DELIM_OPTIONS = ["Line feed", "Space", "Comma", "Semi-co
*/
export const HASH_DELIM_OPTIONS = ["Line feed", "CRLF", "Space", "Comma"];
+/**
+ * IP delimiters
+ */
+export const IP_DELIM_OPTIONS = ["Line feed", "CRLF", "Space", "Comma", "Semi-colon"];
+
/**
* Split delimiters.
*/
diff --git a/src/core/lib/IP.mjs b/src/core/lib/IP.mjs
new file mode 100644
index 00000000..8a8301a6
--- /dev/null
+++ b/src/core/lib/IP.mjs
@@ -0,0 +1,557 @@
+/**
+ * IP resources.
+ *
+ * @author picapi
+ * @author n1474335 [n1474335@gmail.com]
+ * @copyright Crown Copyright 2016
+ * @license Apache-2.0
+ */
+
+import Utils from "../Utils";
+import OperationError from "../errors/OperationError";
+
+/**
+ * Parses an IPv4 CIDR range (e.g. 192.168.0.0/24) and displays information about it.
+ *
+ * @param {RegExp} cidr
+ * @param {boolean} includeNetworkInfo
+ * @param {boolean} enumerateAddresses
+ * @param {boolean} allowLargeList
+ * @returns {string}
+ */
+export function ipv4CidrRange(cidr, includeNetworkInfo, enumerateAddresses, allowLargeList) {
+ const network = strToIpv4(cidr[1]),
+ cidrRange = parseInt(cidr[2], 10);
+ let output = "";
+
+ if (cidrRange < 0 || cidrRange > 31) {
+ return "IPv4 CIDR must be less than 32";
+ }
+
+ const mask = ~(0xFFFFFFFF >>> cidrRange),
+ ip1 = network & mask,
+ ip2 = ip1 | ~mask;
+
+ if (includeNetworkInfo) {
+ output += "Network: " + ipv4ToStr(network) + "\n";
+ output += "CIDR: " + cidrRange + "\n";
+ output += "Mask: " + ipv4ToStr(mask) + "\n";
+ output += "Range: " + ipv4ToStr(ip1) + " - " + ipv4ToStr(ip2) + "\n";
+ output += "Total addresses in range: " + (((ip2 - ip1) >>> 0) + 1) + "\n\n";
+ }
+
+ if (enumerateAddresses) {
+ if (cidrRange >= 16 || allowLargeList) {
+ output += generateIpv4Range(ip1, ip2).join("\n");
+ } else {
+ output += _LARGE_RANGE_ERROR;
+ }
+ }
+ return output;
+}
+
+/**
+ * Parses an IPv6 CIDR range (e.g. ff00::/48) and displays information about it.
+ *
+ * @param {RegExp} cidr
+ * @param {boolean} includeNetworkInfo
+ * @returns {string}
+ */
+export function ipv6CidrRange(cidr, includeNetworkInfo) {
+ let output = "";
+ const network = strToIpv6(cidr[1]),
+ cidrRange = parseInt(cidr[cidr.length-1], 10);
+
+ if (cidrRange < 0 || cidrRange > 127) {
+ return "IPv6 CIDR must be less than 128";
+ }
+
+ const ip1 = new Array(8),
+ ip2 = new Array(8),
+ total = new Array(128);
+
+ const mask = genIpv6Mask(cidrRange);
+ let totalDiff = "";
+
+
+ for (let i = 0; i < 8; i++) {
+ ip1[i] = network[i] & mask[i];
+ ip2[i] = ip1[i] | (~mask[i] & 0x0000FFFF);
+ totalDiff = (ip2[i] - ip1[i]).toString(2);
+
+ if (totalDiff !== "0") {
+ for (let n = 0; n < totalDiff.length; n++) {
+ total[i*16 + 16-(totalDiff.length-n)] = totalDiff[n];
+ }
+ }
+ }
+
+ if (includeNetworkInfo) {
+ output += "Network: " + ipv6ToStr(network) + "\n";
+ output += "Shorthand: " + ipv6ToStr(network, true) + "\n";
+ output += "CIDR: " + cidrRange + "\n";
+ output += "Mask: " + ipv6ToStr(mask) + "\n";
+ output += "Range: " + ipv6ToStr(ip1) + " - " + ipv6ToStr(ip2) + "\n";
+ output += "Total addresses in range: " + (parseInt(total.join(""), 2) + 1) + "\n\n";
+ }
+
+ return output;
+}
+
+/**
+ * Parses an IPv4 hyphenated range (e.g. 192.168.0.0 - 192.168.0.255) and displays information
+ * about it.
+ *
+ * @param {RegExp} range
+ * @param {boolean} includeNetworkInfo
+ * @param {boolean} enumerateAddresses
+ * @param {boolean} allowLargeList
+ * @returns {string}
+ */
+export function ipv4HyphenatedRange(range, includeNetworkInfo, enumerateAddresses, allowLargeList) {
+ const ip1 = strToIpv4(range[1]),
+ ip2 = strToIpv4(range[2]);
+
+ let output = "";
+
+ // Calculate mask
+ let diff = ip1 ^ ip2,
+ cidr = 32,
+ mask = 0;
+
+ while (diff !== 0) {
+ diff >>= 1;
+ cidr--;
+ mask = (mask << 1) | 1;
+ }
+
+ mask = ~mask >>> 0;
+ const network = ip1 & mask,
+ subIp1 = network & mask,
+ subIp2 = subIp1 | ~mask;
+
+ if (includeNetworkInfo) {
+ output += `Minimum subnet required to hold this range:
+\tNetwork: ${ipv4ToStr(network)}
+\tCIDR: ${cidr}
+\tMask: ${ipv4ToStr(mask)}
+\tSubnet range: ${ipv4ToStr(subIp1)} - ${ipv4ToStr(subIp2)}
+\tTotal addresses in subnet: ${(((subIp2 - subIp1) >>> 0) + 1)}
+
+Range: ${ipv4ToStr(ip1)} - ${ipv4ToStr(ip2)}
+Total addresses in range: ${(((ip2 - ip1) >>> 0) + 1)}
+
+`;
+ }
+
+ if (enumerateAddresses) {
+ if (((ip2 - ip1) >>> 0) <= 65536 || allowLargeList) {
+ output += generateIpv4Range(ip1, ip2).join("\n");
+ } else {
+ output += _LARGE_RANGE_ERROR;
+ }
+ }
+ return output;
+}
+
+/**
+ * Parses an IPv6 hyphenated range (e.g. ff00:: - ffff::) and displays information about it.
+ *
+ * @param {RegExp} range
+ * @param {boolean} includeNetworkInfo
+ * @returns {string}
+ */
+export function ipv6HyphenatedRange(range, includeNetworkInfo) {
+ const ip1 = strToIpv6(range[1]),
+ ip2 = strToIpv6(range[14]),
+ total = new Array(128).fill();
+
+ let output = "",
+ t = "",
+ i;
+
+ for (i = 0; i < 8; i++) {
+ t = (ip2[i] - ip1[i]).toString(2);
+ if (t !== "0") {
+ for (let n = 0; n < t.length; n++) {
+ total[i*16 + 16-(t.length-n)] = t[n];
+ }
+ }
+ }
+
+ if (includeNetworkInfo) {
+ output += "Range: " + ipv6ToStr(ip1) + " - " + ipv6ToStr(ip2) + "\n";
+ output += "Shorthand range: " + ipv6ToStr(ip1, true) + " - " + ipv6ToStr(ip2, true) + "\n";
+ output += "Total addresses in range: " + (parseInt(total.join(""), 2) + 1) + "\n\n";
+ }
+
+ return output;
+}
+
+/**
+ * Converts an IPv4 address from string format to numerical format.
+ *
+ * @param {string} ipStr
+ * @returns {number}
+ *
+ * @example
+ * // returns 168427520
+ * strToIpv4("10.10.0.0");
+ */
+export function strToIpv4(ipStr) {
+ const blocks = ipStr.split("."),
+ numBlocks = parseBlocks(blocks);
+ let result = 0;
+
+ result += numBlocks[0] << 24;
+ result += numBlocks[1] << 16;
+ result += numBlocks[2] << 8;
+ result += numBlocks[3];
+
+ return result;
+
+ /**
+ * Converts a list of 4 numeric strings in the range 0-255 to a list of numbers.
+ */
+ function parseBlocks(blocks) {
+ if (blocks.length !== 4)
+ throw new OperationError("More than 4 blocks.");
+
+ const numBlocks = [];
+ for (let i = 0; i < 4; i++) {
+ numBlocks[i] = parseInt(blocks[i], 10);
+ if (numBlocks[i] < 0 || numBlocks[i] > 255)
+ throw new OperationError("Block out of range.");
+ }
+ return numBlocks;
+ }
+}
+
+/**
+ * Converts an IPv4 address from numerical format to string format.
+ *
+ * @param {number} ipInt
+ * @returns {string}
+ *
+ * @example
+ * // returns "10.10.0.0"
+ * ipv4ToStr(168427520);
+ */
+export function ipv4ToStr(ipInt) {
+ const blockA = (ipInt >> 24) & 255,
+ blockB = (ipInt >> 16) & 255,
+ blockC = (ipInt >> 8) & 255,
+ blockD = ipInt & 255;
+
+ return blockA + "." + blockB + "." + blockC + "." + blockD;
+}
+
+
+/**
+ * Converts an IPv6 address from string format to numerical array format.
+ *
+ * @param {string} ipStr
+ * @returns {number[]}
+ *
+ * @example
+ * // returns [65280, 0, 0, 0, 0, 0, 4369, 8738]
+ * strToIpv6("ff00::1111:2222");
+ */
+export function strToIpv6(ipStr) {
+ let j = 0;
+ const blocks = ipStr.split(":"),
+ numBlocks = parseBlocks(blocks),
+ ipv6 = new Array(8);
+
+ for (let i = 0; i < 8; i++) {
+ if (isNaN(numBlocks[j])) {
+ ipv6[i] = 0;
+ if (i === (8-numBlocks.slice(j).length)) j++;
+ } else {
+ ipv6[i] = numBlocks[j];
+ j++;
+ }
+ }
+ return ipv6;
+
+ /**
+ * Converts a list of 3-8 numeric hex strings in the range 0-65535 to a list of numbers.
+ */
+ function parseBlocks(blocks) {
+ if (blocks.length < 3 || blocks.length > 8)
+ throw new OperationError("Badly formatted IPv6 address.");
+ const numBlocks = [];
+ for (let i = 0; i < blocks.length; i++) {
+ numBlocks[i] = parseInt(blocks[i], 16);
+ if (numBlocks[i] < 0 || numBlocks[i] > 65535)
+ throw new OperationError("Block out of range.");
+ }
+ return numBlocks;
+ }
+}
+
+/**
+ * Converts an IPv6 address from numerical array format to string format.
+ *
+ * @param {number[]} ipv6
+ * @param {boolean} compact - Whether or not to return the address in shorthand or not
+ * @returns {string}
+ *
+ * @example
+ * // returns "ff00::1111:2222"
+ * ipv6ToStr([65280, 0, 0, 0, 0, 0, 4369, 8738], true);
+ *
+ * // returns "ff00:0000:0000:0000:0000:0000:1111:2222"
+ * ipv6ToStr([65280, 0, 0, 0, 0, 0, 4369, 8738], false);
+ */
+export function ipv6ToStr(ipv6, compact) {
+ let output = "",
+ i = 0;
+
+ if (compact) {
+ let start = -1,
+ end = -1,
+ s = 0,
+ e = -1;
+
+ for (i = 0; i < 8; i++) {
+ if (ipv6[i] === 0 && e === (i-1)) {
+ e = i;
+ } else if (ipv6[i] === 0) {
+ s = i; e = i;
+ }
+ if (e >= 0 && (e-s) > (end - start)) {
+ start = s;
+ end = e;
+ }
+ }
+
+ for (i = 0; i < 8; i++) {
+ if (i !== start) {
+ output += Utils.hex(ipv6[i], 1) + ":";
+ } else {
+ output += ":";
+ i = end;
+ if (end === 7) output += ":";
+ }
+ }
+ if (output[0] === ":")
+ output = ":" + output;
+ } else {
+ for (i = 0; i < 8; i++) {
+ output += Utils.hex(ipv6[i], 4) + ":";
+ }
+ }
+ return output.slice(0, output.length-1);
+}
+
+/**
+ * Generates a list of IPv4 addresses in string format between two given numerical values.
+ *
+ * @param {number} ip
+ * @param {number} endIp
+ * @returns {string[]}
+ *
+ * @example
+ * // returns ["0.0.0.1", "0.0.0.2", "0.0.0.3"]
+ * IP.generateIpv4Range(1, 3);
+ */
+export function generateIpv4Range(ip, endIp) {
+ const range = [];
+ if (endIp >= ip) {
+ for (; ip <= endIp; ip++) {
+ range.push(ipv4ToStr(ip));
+ }
+ } else {
+ range[0] = "Second IP address smaller than first.";
+ }
+ return range;
+}
+
+/**
+ * Generates an IPv6 subnet mask given a CIDR value.
+ *
+ * @param {number} cidr
+ * @returns {number[]}
+ */
+export function genIpv6Mask(cidr) {
+ const mask = new Array(8);
+ let shift;
+
+ for (let i = 0; i < 8; i++) {
+ if (cidr > ((i+1)*16)) {
+ mask[i] = 0x0000FFFF;
+ } else {
+ shift = cidr-(i*16);
+ if (shift < 0) shift = 0;
+ mask[i] = ~((0x0000FFFF >>> shift) | 0xFFFF0000);
+ }
+ }
+
+ return mask;
+}
+
+const _LARGE_RANGE_ERROR = "The specified range contains more than 65,536 addresses. Running this query could crash your browser. If you want to run it, select the \"Allow large queries\" option. You are advised to turn off \"Auto Bake\" whilst editing large ranges.";
+
+/**
+ * A regular expression that matches an IPv4 address
+ */
+export const IPV4_REGEX = /^\s*((?:\d{1,3}\.){3}\d{1,3})\s*$/;
+
+/**
+ * A regular expression that matches an IPv6 address
+ */
+export const IPV6_REGEX = /^\s*(((?=.*::)(?!.*::.+::)(::)?([\dA-F]{1,4}:(:|\b)|){5}|([\dA-F]{1,4}:){6})((([\dA-F]{1,4}((?!\4)::|:\b|(?![\dA-F])))|(?!\3\4)){2}|(((2[0-4]|1\d|[1-9])?\d|25[0-5])\.?\b){4}))\s*$/i;
+
+/**
+ * Lookup table for Internet Protocols.
+ * Taken from https://www.iana.org/assignments/protocol-numbers/protocol-numbers.xhtml
+ */
+export const protocolLookup = {
+ 0: {keyword: "HOPOPT", protocol: "IPv6 Hop-by-Hop Option"},
+ 1: {keyword: "ICMP", protocol: "Internet Control Message"},
+ 2: {keyword: "IGMP", protocol: "Internet Group Management"},
+ 3: {keyword: "GGP", protocol: "Gateway-to-Gateway"},
+ 4: {keyword: "IPv4", protocol: "IPv4 encapsulation"},
+ 5: {keyword: "ST", protocol: "Stream"},
+ 6: {keyword: "TCP", protocol: "Transmission Control"},
+ 7: {keyword: "CBT", protocol: "CBT"},
+ 8: {keyword: "EGP", protocol: "Exterior Gateway Protocol"},
+ 9: {keyword: "IGP", protocol: "any private interior gateway (used by Cisco for their IGRP)"},
+ 10: {keyword: "BBN-RCC-MON", protocol: "BBN RCC Monitoring"},
+ 11: {keyword: "NVP-II", protocol: "Network Voice Protocol"},
+ 12: {keyword: "PUP", protocol: "PUP"},
+ 13: {keyword: "ARGUS (deprecated)", protocol: "ARGUS"},
+ 14: {keyword: "EMCON", protocol: "EMCON"},
+ 15: {keyword: "XNET", protocol: "Cross Net Debugger"},
+ 16: {keyword: "CHAOS", protocol: "Chaos"},
+ 17: {keyword: "UDP", protocol: "User Datagram"},
+ 18: {keyword: "MUX", protocol: "Multiplexing"},
+ 19: {keyword: "DCN-MEAS", protocol: "DCN Measurement Subsystems"},
+ 20: {keyword: "HMP", protocol: "Host Monitoring"},
+ 21: {keyword: "PRM", protocol: "Packet Radio Measurement"},
+ 22: {keyword: "XNS-IDP", protocol: "XEROX NS IDP"},
+ 23: {keyword: "TRUNK-1", protocol: "Trunk-1"},
+ 24: {keyword: "TRUNK-2", protocol: "Trunk-2"},
+ 25: {keyword: "LEAF-1", protocol: "Leaf-1"},
+ 26: {keyword: "LEAF-2", protocol: "Leaf-2"},
+ 27: {keyword: "RDP", protocol: "Reliable Data Protocol"},
+ 28: {keyword: "IRTP", protocol: "Internet Reliable Transaction"},
+ 29: {keyword: "ISO-TP4", protocol: "ISO Transport Protocol Class 4"},
+ 30: {keyword: "NETBLT", protocol: "Bulk Data Transfer Protocol"},
+ 31: {keyword: "MFE-NSP", protocol: "MFE Network Services Protocol"},
+ 32: {keyword: "MERIT-INP", protocol: "MERIT Internodal Protocol"},
+ 33: {keyword: "DCCP", protocol: "Datagram Congestion Control Protocol"},
+ 34: {keyword: "3PC", protocol: "Third Party Connect Protocol"},
+ 35: {keyword: "IDPR", protocol: "Inter-Domain Policy Routing Protocol"},
+ 36: {keyword: "XTP", protocol: "XTP"},
+ 37: {keyword: "DDP", protocol: "Datagram Delivery Protocol"},
+ 38: {keyword: "IDPR-CMTP", protocol: "IDPR Control Message Transport Proto"},
+ 39: {keyword: "TP++", protocol: "TP++ Transport Protocol"},
+ 40: {keyword: "IL", protocol: "IL Transport Protocol"},
+ 41: {keyword: "IPv6", protocol: "IPv6 encapsulation"},
+ 42: {keyword: "SDRP", protocol: "Source Demand Routing Protocol"},
+ 43: {keyword: "IPv6-Route", protocol: "Routing Header for IPv6"},
+ 44: {keyword: "IPv6-Frag", protocol: "Fragment Header for IPv6"},
+ 45: {keyword: "IDRP", protocol: "Inter-Domain Routing Protocol"},
+ 46: {keyword: "RSVP", protocol: "Reservation Protocol"},
+ 47: {keyword: "GRE", protocol: "Generic Routing Encapsulation"},
+ 48: {keyword: "DSR", protocol: "Dynamic Source Routing Protocol"},
+ 49: {keyword: "BNA", protocol: "BNA"},
+ 50: {keyword: "ESP", protocol: "Encap Security Payload"},
+ 51: {keyword: "AH", protocol: "Authentication Header"},
+ 52: {keyword: "I-NLSP", protocol: "Integrated Net Layer Security TUBA"},
+ 53: {keyword: "SWIPE (deprecated)", protocol: "IP with Encryption"},
+ 54: {keyword: "NARP", protocol: "NBMA Address Resolution Protocol"},
+ 55: {keyword: "MOBILE", protocol: "IP Mobility"},
+ 56: {keyword: "TLSP", protocol: "Transport Layer Security Protocol using Kryptonet key management"},
+ 57: {keyword: "SKIP", protocol: "SKIP"},
+ 58: {keyword: "IPv6-ICMP", protocol: "ICMP for IPv6"},
+ 59: {keyword: "IPv6-NoNxt", protocol: "No Next Header for IPv6"},
+ 60: {keyword: "IPv6-Opts", protocol: "Destination Options for IPv6"},
+ 61: {keyword: "", protocol: "any host internal protocol"},
+ 62: {keyword: "CFTP", protocol: "CFTP"},
+ 63: {keyword: "", protocol: "any local network"},
+ 64: {keyword: "SAT-EXPAK", protocol: "SATNET and Backroom EXPAK"},
+ 65: {keyword: "KRYPTOLAN", protocol: "Kryptolan"},
+ 66: {keyword: "RVD", protocol: "MIT Remote Virtual Disk Protocol"},
+ 67: {keyword: "IPPC", protocol: "Internet Pluribus Packet Core"},
+ 68: {keyword: "", protocol: "any distributed file system"},
+ 69: {keyword: "SAT-MON", protocol: "SATNET Monitoring"},
+ 70: {keyword: "VISA", protocol: "VISA Protocol"},
+ 71: {keyword: "IPCV", protocol: "Internet Packet Core Utility"},
+ 72: {keyword: "CPNX", protocol: "Computer Protocol Network Executive"},
+ 73: {keyword: "CPHB", protocol: "Computer Protocol Heart Beat"},
+ 74: {keyword: "WSN", protocol: "Wang Span Network"},
+ 75: {keyword: "PVP", protocol: "Packet Video Protocol"},
+ 76: {keyword: "BR-SAT-MON", protocol: "Backroom SATNET Monitoring"},
+ 77: {keyword: "SUN-ND", protocol: "SUN ND PROTOCOL-Temporary"},
+ 78: {keyword: "WB-MON", protocol: "WIDEBAND Monitoring"},
+ 79: {keyword: "WB-EXPAK", protocol: "WIDEBAND EXPAK"},
+ 80: {keyword: "ISO-IP", protocol: "ISO Internet Protocol"},
+ 81: {keyword: "VMTP", protocol: "VMTP"},
+ 82: {keyword: "SECURE-VMTP", protocol: "SECURE-VMTP"},
+ 83: {keyword: "VINES", protocol: "VINES"},
+ 84: {keyword: "TTP", protocol: "Transaction Transport Protocol"},
+ 85: {keyword: "NSFNET-IGP", protocol: "NSFNET-IGP"},
+ 86: {keyword: "DGP", protocol: "Dissimilar Gateway Protocol"},
+ 87: {keyword: "TCF", protocol: "TCF"},
+ 88: {keyword: "EIGRP", protocol: "EIGRP"},
+ 89: {keyword: "OSPFIGP", protocol: "OSPFIGP"},
+ 90: {keyword: "Sprite-RPC", protocol: "Sprite RPC Protocol"},
+ 91: {keyword: "LARP", protocol: "Locus Address Resolution Protocol"},
+ 92: {keyword: "MTP", protocol: "Multicast Transport Protocol"},
+ 93: {keyword: "AX.25", protocol: "AX.25 Frames"},
+ 94: {keyword: "IPIP", protocol: "IP-within-IP Encapsulation Protocol"},
+ 95: {keyword: "MICP (deprecated)", protocol: "Mobile Internetworking Control Pro."},
+ 96: {keyword: "SCC-SP", protocol: "Semaphore Communications Sec. Pro."},
+ 97: {keyword: "ETHERIP", protocol: "Ethernet-within-IP Encapsulation"},
+ 98: {keyword: "ENCAP", protocol: "Encapsulation Header"},
+ 99: {keyword: "", protocol: "any private encryption scheme"},
+ 100: {keyword: "GMTP", protocol: "GMTP"},
+ 101: {keyword: "IFMP", protocol: "Ipsilon Flow Management Protocol"},
+ 102: {keyword: "PNNI", protocol: "PNNI over IP"},
+ 103: {keyword: "PIM", protocol: "Protocol Independent Multicast"},
+ 104: {keyword: "ARIS", protocol: "ARIS"},
+ 105: {keyword: "SCPS", protocol: "SCPS"},
+ 106: {keyword: "QNX", protocol: "QNX"},
+ 107: {keyword: "A/N", protocol: "Active Networks"},
+ 108: {keyword: "IPComp", protocol: "IP Payload Compression Protocol"},
+ 109: {keyword: "SNP", protocol: "Sitara Networks Protocol"},
+ 110: {keyword: "Compaq-Peer", protocol: "Compaq Peer Protocol"},
+ 111: {keyword: "IPX-in-IP", protocol: "IPX in IP"},
+ 112: {keyword: "VRRP", protocol: "Virtual Router Redundancy Protocol"},
+ 113: {keyword: "PGM", protocol: "PGM Reliable Transport Protocol"},
+ 114: {keyword: "", protocol: "any 0-hop protocol"},
+ 115: {keyword: "L2TP", protocol: "Layer Two Tunneling Protocol"},
+ 116: {keyword: "DDX", protocol: "D-II Data Exchange (DDX)"},
+ 117: {keyword: "IATP", protocol: "Interactive Agent Transfer Protocol"},
+ 118: {keyword: "STP", protocol: "Schedule Transfer Protocol"},
+ 119: {keyword: "SRP", protocol: "SpectraLink Radio Protocol"},
+ 120: {keyword: "UTI", protocol: "UTI"},
+ 121: {keyword: "SMP", protocol: "Simple Message Protocol"},
+ 122: {keyword: "SM (deprecated)", protocol: "Simple Multicast Protocol"},
+ 123: {keyword: "PTP", protocol: "Performance Transparency Protocol"},
+ 124: {keyword: "ISIS over IPv4", protocol: ""},
+ 125: {keyword: "FIRE", protocol: ""},
+ 126: {keyword: "CRTP", protocol: "Combat Radio Transport Protocol"},
+ 127: {keyword: "CRUDP", protocol: "Combat Radio User Datagram"},
+ 128: {keyword: "SSCOPMCE", protocol: ""},
+ 129: {keyword: "IPLT", protocol: ""},
+ 130: {keyword: "SPS", protocol: "Secure Packet Shield"},
+ 131: {keyword: "PIPE", protocol: "Private IP Encapsulation within IP"},
+ 132: {keyword: "SCTP", protocol: "Stream Control Transmission Protocol"},
+ 133: {keyword: "FC", protocol: "Fibre Channel"},
+ 134: {keyword: "RSVP-E2E-IGNORE", protocol: ""},
+ 135: {keyword: "Mobility Header", protocol: ""},
+ 136: {keyword: "UDPLite", protocol: ""},
+ 137: {keyword: "MPLS-in-IP", protocol: ""},
+ 138: {keyword: "manet", protocol: "MANET Protocols"},
+ 139: {keyword: "HIP", protocol: "Host Identity Protocol"},
+ 140: {keyword: "Shim6", protocol: "Shim6 Protocol"},
+ 141: {keyword: "WESP", protocol: "Wrapped Encapsulating Security Payload"},
+ 142: {keyword: "ROHC", protocol: "Robust Header Compression"},
+ 253: {keyword: "", protocol: "Use for experimentation and testing"},
+ 254: {keyword: "", protocol: "Use for experimentation and testing"},
+ 255: {keyword: "Reserved", protocol: ""}
+};
diff --git a/src/core/operations/ChangeIPFormat.mjs b/src/core/operations/ChangeIPFormat.mjs
new file mode 100644
index 00000000..b985312a
--- /dev/null
+++ b/src/core/operations/ChangeIPFormat.mjs
@@ -0,0 +1,120 @@
+/**
+ * @author n1474335 [n1474335@gmail.com]
+ * @copyright Crown Copyright 2016
+ * @license Apache-2.0
+ */
+
+import Operation from "../Operation";
+import OperationError from "../errors/OperationError";
+import Utils from "../Utils";
+import {fromHex} from "../lib/Hex";
+
+/**
+ * Change IP format operation
+ */
+class ChangeIPFormat extends Operation {
+
+ /**
+ * ChangeIPFormat constructor
+ */
+ constructor() {
+ super();
+
+ this.name = "Change IP format";
+ this.module = "JSBN";
+ this.description = "Convert an IP address from one format to another, e.g. 172.20.23.54
to ac141736
";
+ this.inputType = "string";
+ this.outputType = "string";
+ this.args = [
+ {
+ "name": "Input format",
+ "type": "option",
+ "value": ["Hex", "Raw"]
+ },
+ {
+ "name": "Output format",
+ "type": "option",
+ "value": ["Hex", "Raw"]
+ }
+ ];
+ }
+
+ /**
+ * @param {string} input
+ * @param {Object[]} args
+ * @returns {string}
+ */
+ run(input, args) {
+ const [inFormat, outFormat] = args,
+ lines = input.split("\n");
+ let output = "",
+ j = 0;
+
+ for (let i = 0; i < lines.length; i++) {
+ if (lines[i] === "") continue;
+ let baIp = [];
+ let octets;
+ let decimal;
+
+ if (inFormat === outFormat) {
+ output += lines[i] + "\n";
+ continue;
+ }
+
+ // Convert to byte array IP from input format
+ switch (inFormat) {
+ case "Dotted Decimal":
+ octets = lines[i].split(".");
+ for (j = 0; j < octets.length; j++) {
+ baIp.push(parseInt(octets[j], 10));
+ }
+ break;
+ case "Decimal":
+ decimal = lines[i].toString();
+ baIp.push(decimal >> 24 & 255);
+ baIp.push(decimal >> 16 & 255);
+ baIp.push(decimal >> 8 & 255);
+ baIp.push(decimal & 255);
+ break;
+ case "Hex":
+ baIp = fromHex(lines[i]);
+ break;
+ default:
+ throw new OperationError("Unsupported input IP format");
+ }
+
+ let ddIp;
+ let decIp;
+ let hexIp;
+
+ // Convert byte array IP to output format
+ switch (outFormat) {
+ case "Dotted Decimal":
+ ddIp = "";
+ for (j = 0; j < baIp.length; j++) {
+ ddIp += baIp[j] + ".";
+ }
+ output += ddIp.slice(0, ddIp.length-1) + "\n";
+ break;
+ case "Decimal":
+ decIp = ((baIp[0] << 24) | (baIp[1] << 16) | (baIp[2] << 8) | baIp[3]) >>> 0;
+ output += decIp.toString() + "\n";
+ break;
+ case "Hex":
+ hexIp = "";
+ for (j = 0; j < baIp.length; j++) {
+ hexIp += Utils.hex(baIp[j]);
+ }
+ output += hexIp + "\n";
+ break;
+ default:
+ throw new OperationError("Unsupported output IP format");
+ }
+ }
+
+ return output.slice(0, output.length-1);
+ }
+
+}
+
+export default ChangeIPFormat;
diff --git a/src/core/operations/GroupIPAddresses.mjs b/src/core/operations/GroupIPAddresses.mjs
new file mode 100644
index 00000000..a5b7ea2d
--- /dev/null
+++ b/src/core/operations/GroupIPAddresses.mjs
@@ -0,0 +1,136 @@
+/**
+ * @author n1474335 [n1474335@gmail.com]
+ * @copyright Crown Copyright 2016
+ * @license Apache-2.0
+ */
+
+import Operation from "../Operation";
+import Utils from "../Utils";
+import OperationError from "../errors/OperationError";
+import {IP_DELIM_OPTIONS} from "../lib/Delim";
+import {ipv6ToStr, genIpv6Mask, IPV4_REGEX, strToIpv6, ipv4ToStr, IPV6_REGEX, strToIpv4} from "../lib/IP";
+
+/**
+ * Group IP addresses operation
+ */
+class GroupIPAddresses extends Operation {
+
+ /**
+ * GroupIPAddresses constructor
+ */
+ constructor() {
+ super();
+
+ this.name = "Group IP addresses";
+ this.module = "JSBN";
+ this.description = "Groups a list of IP addresses into subnets. Supports both IPv4 and IPv6 addresses.";
+ this.inputType = "string";
+ this.outputType = "string";
+ this.args = [
+ {
+ "name": "Delimiter",
+ "type": "option",
+ "value": IP_DELIM_OPTIONS
+ },
+ {
+ "name": "Subnet (CIDR)",
+ "type": "number",
+ "value": 24
+ },
+ {
+ "name": "Only show the subnets",
+ "type": "boolean",
+ "value": false,
+ }
+ ];
+ }
+
+ /**
+ * @param {string} input
+ * @param {Object[]} args
+ * @returns {string}
+ */
+ run(input, args) {
+ const delim = Utils.charRep(args[0]),
+ cidr = args[1],
+ onlySubnets = args[2],
+ ipv4Mask = cidr < 32 ? ~(0xFFFFFFFF >>> cidr) : 0xFFFFFFFF,
+ ipv6Mask = genIpv6Mask(cidr),
+ ips = input.split(delim),
+ ipv4Networks = {},
+ ipv6Networks = {};
+ let match = null,
+ output = "",
+ ip = null,
+ network = null,
+ networkStr = "",
+ i;
+
+ if (cidr < 0 || cidr > 127) {
+ throw new OperationError("CIDR must be less than 32 for IPv4 or 128 for IPv6");
+ }
+
+ // Parse all IPs and add to network dictionary
+ for (i = 0; i < ips.length; i++) {
+ if ((match = IPV4_REGEX.exec(ips[i]))) {
+ ip = strToIpv4(match[1]) >>> 0;
+ network = ip & ipv4Mask;
+
+ if (ipv4Networks.hasOwnProperty(network)) {
+ ipv4Networks[network].push(ip);
+ } else {
+ ipv4Networks[network] = [ip];
+ }
+ } else if ((match = IPV6_REGEX.exec(ips[i]))) {
+ ip = strToIpv6(match[1]);
+ network = [];
+ networkStr = "";
+
+ for (let j = 0; j < 8; j++) {
+ network.push(ip[j] & ipv6Mask[j]);
+ }
+
+ networkStr = ipv6ToStr(network, true);
+
+ if (ipv6Networks.hasOwnProperty(networkStr)) {
+ ipv6Networks[networkStr].push(ip);
+ } else {
+ ipv6Networks[networkStr] = [ip];
+ }
+ }
+ }
+
+ // Sort IPv4 network dictionaries and print
+ for (network in ipv4Networks) {
+ ipv4Networks[network] = ipv4Networks[network].sort();
+
+ output += ipv4ToStr(network) + "/" + cidr + "\n";
+
+ if (!onlySubnets) {
+ for (i = 0; i < ipv4Networks[network].length; i++) {
+ output += " " + ipv4ToStr(ipv4Networks[network][i]) + "\n";
+ }
+ output += "\n";
+ }
+ }
+
+ // Sort IPv6 network dictionaries and print
+ for (networkStr in ipv6Networks) {
+ //ipv6Networks[networkStr] = ipv6Networks[networkStr].sort(); TODO
+
+ output += networkStr + "/" + cidr + "\n";
+
+ if (!onlySubnets) {
+ for (i = 0; i < ipv6Networks[networkStr].length; i++) {
+ output += " " + ipv6ToStr(ipv6Networks[networkStr][i], true) + "\n";
+ }
+ output += "\n";
+ }
+ }
+
+ return output;
+ }
+
+}
+
+export default GroupIPAddresses;
diff --git a/src/core/operations/ParseIPRange.mjs b/src/core/operations/ParseIPRange.mjs
new file mode 100644
index 00000000..0063f320
--- /dev/null
+++ b/src/core/operations/ParseIPRange.mjs
@@ -0,0 +1,81 @@
+/**
+ * @author n1474335 [n1474335@gmail.com]
+ * @copyright Crown Copyright 2016
+ * @license Apache-2.0
+ */
+
+import Operation from "../Operation";
+import OperationError from "../errors/OperationError";
+import {ipv4CidrRange, ipv4HyphenatedRange, ipv6CidrRange, ipv6HyphenatedRange} from "../lib/IP";
+
+/**
+ * Parse IP range operation
+ */
+class ParseIPRange extends Operation {
+
+ /**
+ * ParseIPRange constructor
+ */
+ constructor() {
+ super();
+
+ this.name = "Parse IP range";
+ this.module = "JSBN";
+ this.description = "Given a CIDR range (e.g. 10.0.0.0/24
) or a hyphenated range (e.g. 10.0.0.0 - 10.0.1.0
), this operation provides network information and enumerates all IP addresses in the range.
IPv6 is supported but will not be enumerated.";
+ this.inputType = "string";
+ this.outputType = "string";
+ this.args = [
+ {
+ "name": "Include network info",
+ "type": "boolean",
+ "value": true
+ },
+ {
+ "name": "Enumerate IP addresses",
+ "type": "boolean",
+ "value": true
+ },
+ {
+ "name": "Allow large queries",
+ "type": "boolean",
+ "value": false
+ }
+ ];
+ }
+
+ /**
+ * @param {string} input
+ * @param {Object[]} args
+ * @returns {string}
+ */
+ run(input, args) {
+ const [
+ includeNetworkInfo,
+ enumerateAddresses,
+ allowLargeList
+ ] = args;
+
+ // Check what type of input we are looking at
+ const ipv4CidrRegex = /^\s*((?:\d{1,3}\.){3}\d{1,3})\/(\d\d?)\s*$/,
+ ipv4RangeRegex = /^\s*((?:\d{1,3}\.){3}\d{1,3})\s*-\s*((?:\d{1,3}\.){3}\d{1,3})\s*$/,
+ ipv6CidrRegex = /^\s*(((?=.*::)(?!.*::.+::)(::)?([\dA-F]{1,4}:(:|\b)|){5}|([\dA-F]{1,4}:){6})((([\dA-F]{1,4}((?!\4)::|:\b|(?![\dA-F])))|(?!\3\4)){2}|(((2[0-4]|1\d|[1-9])?\d|25[0-5])\.?\b){4}))\/(\d\d?\d?)\s*$/i,
+ ipv6RangeRegex = /^\s*(((?=.*::)(?!.*::[^-]+::)(::)?([\dA-F]{1,4}:(:|\b)|){5}|([\dA-F]{1,4}:){6})((([\dA-F]{1,4}((?!\4)::|:\b|(?![\dA-F])))|(?!\3\4)){2}|(((2[0-4]|1\d|[1-9])?\d|25[0-5])\.?\b){4}))\s*-\s*(((?=.*::)(?!.*::.+::)(::)?([\dA-F]{1,4}:(:|\b)|){5}|([\dA-F]{1,4}:){6})((([\dA-F]{1,4}((?!\17)::|:\b|(?![\dA-F])))|(?!\16\17)){2}|(((2[0-4]|1\d|[1-9])?\d|25[0-5])\.?\b){4}))\s*$/i;
+ let match;
+
+ if ((match = ipv4CidrRegex.exec(input))) {
+ return ipv4CidrRange(match, includeNetworkInfo, enumerateAddresses, allowLargeList);
+ } else if ((match = ipv4RangeRegex.exec(input))) {
+ return ipv4HyphenatedRange(match, includeNetworkInfo, enumerateAddresses, allowLargeList);
+ } else if ((match = ipv6CidrRegex.exec(input))) {
+ return ipv6CidrRange(match, includeNetworkInfo);
+ } else if ((match = ipv6RangeRegex.exec(input))) {
+ return ipv6HyphenatedRange(match, includeNetworkInfo);
+ } else {
+ throw new OperationError("Invalid input.\n\nEnter either a CIDR range (e.g. 10.0.0.0/24) or a hyphenated range (e.g. 10.0.0.0 - 10.0.1.0). IPv6 also supported.");
+ }
+ }
+
+}
+
+
+export default ParseIPRange;
diff --git a/src/core/operations/ParseIPv4Header.mjs b/src/core/operations/ParseIPv4Header.mjs
new file mode 100644
index 00000000..4c745eaa
--- /dev/null
+++ b/src/core/operations/ParseIPv4Header.mjs
@@ -0,0 +1,129 @@
+/**
+ * @author n1474335 [n1474335@gmail.com]
+ * @copyright Crown Copyright 2016
+ * @license Apache-2.0
+ */
+
+import Operation from "../Operation";
+import Utils from "../Utils";
+import OperationError from "../errors/OperationError";
+import {fromHex, toHex} from "../lib/Hex";
+import {ipv4ToStr, protocolLookup} from "../lib/IP";
+import TCPIPChecksum from "./TCPIPChecksum";
+
+/**
+ * Parse IPv4 header operation
+ */
+class ParseIPv4Header extends Operation {
+
+ /**
+ * ParseIPv4Header constructor
+ */
+ constructor() {
+ super();
+
+ this.name = "Parse IPv4 header";
+ this.module = "JSBN";
+ this.description = "Given an IPv4 header, this operations parses and displays each field in an easily readable format.";
+ this.inputType = "string";
+ this.outputType = "html";
+ this.args = [
+ {
+ "name": "Input format",
+ "type": "option",
+ "value": ["Hex", "Raw"]
+ }
+ ];
+ }
+
+ /**
+ * @param {string} input
+ * @param {Object[]} args
+ * @returns {html}
+ */
+ run(input, args) {
+ const format = args[0];
+ let output;
+
+ if (format === "Hex") {
+ input = fromHex(input);
+ } else if (format === "Raw") {
+ input = Utils.strToByteArray(input);
+ } else {
+ throw new OperationError("Unrecognised input format.");
+ }
+
+ let ihl = input[0] & 0x0f;
+ const dscp = (input[1] >>> 2) & 0x3f,
+ ecn = input[1] & 0x03,
+ length = input[2] << 8 | input[3],
+ identification = input[4] << 8 | input[5],
+ flags = (input[6] >>> 5) & 0x07,
+ fragOffset = (input[6] & 0x1f) << 8 | input[7],
+ ttl = input[8],
+ protocol = input[9],
+ checksum = input[10] << 8 | input[11],
+ srcIP = input[12] << 24 | input[13] << 16 | input[14] << 8 | input[15],
+ dstIP = input[16] << 24 | input[17] << 16 | input[18] << 8 | input[19],
+ checksumHeader = input.slice(0, 10).concat([0, 0]).concat(input.slice(12, 20));
+ let version = (input[0] >>> 4) & 0x0f,
+ options = [];
+
+
+ // Version
+ if (version !== 4) {
+ version = version + " (Error: for IPv4 headers, this should always be set to 4)";
+ }
+
+ // IHL
+ if (ihl < 5) {
+ ihl = ihl + " (Error: this should always be at least 5)";
+ } else if (ihl > 5) {
+ // sort out options...
+ const optionsLen = ihl * 4 - 20;
+ options = input.slice(20, optionsLen + 20);
+ }
+
+ // Protocol
+ const protocolInfo = protocolLookup[protocol] || {keyword: "", protocol: ""};
+
+ // Checksum
+ const correctChecksum = (new TCPIPChecksum).run(checksumHeader),
+ givenChecksum = Utils.hex(checksum);
+ let checksumResult;
+ if (correctChecksum === givenChecksum) {
+ checksumResult = givenChecksum + " (correct)";
+ } else {
+ checksumResult = givenChecksum + " (incorrect, should be " + correctChecksum + ")";
+ }
+
+ output = `
Field | Value |
---|---|
Version | ${version} |
Internet Header Length (IHL) | ${ihl} (${ihl * 4} bytes) |
Differentiated Services Code Point (DSCP) | ${dscp} |
Explicit Congestion Notification (ECN) | ${ecn} |
Total length | ${length} bytes + IP header: ${ihl * 4} bytes + Data: ${length - ihl * 4} bytes |
Identification | 0x${Utils.hex(identification)} (${identification}) |
Flags | 0x${Utils.hex(flags, 2)} + Reserved bit:${flags >> 2} (must be 0) + Don't fragment:${flags >> 1 & 1} + More fragments:${flags & 1} |
Fragment offset | ${fragOffset} |
Time-To-Live | ${ttl} |
Protocol | ${protocol}, ${protocolInfo.protocol} (${protocolInfo.keyword}) |
Header checksum | ${checksumResult} |
Source IP address | ${ipv4ToStr(srcIP)} |
Destination IP address | ${ipv4ToStr(dstIP)} |
Options | ${toHex(options)} |