-
Notifications
You must be signed in to change notification settings - Fork 2
/
Copy pathreceive.py
executable file
·104 lines (79 loc) · 2.48 KB
/
receive.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
#!/usr/bin/env python
import sys
import struct
from scapy.all import sniff, sendp, hexdump, get_if_list, get_if_hwaddr, srp1
from scapy.all import Packet, IPOption
from scapy.all import ShortField, IntField, LongField, BitField, FieldListField, FieldLenField
from scapy.all import Ether, IP, UDP, Raw
from scapy.layers.inet import _IPOption_HDR
from scapy.all import Packet, hexdump
from scapy.all import StrFixedLenField, XByteField, IntField, BitField
from scapy.all import bind_layers
'''
TENANT HEADER
bit<32> id;
bit<32> enq_timestamp; // 32 bit
bit<32> enq_qdepth; // 19 typecast
bit<32>deq_timedelta; // 32
bit<32> deq_qdepth; // 19 typecast
bit<32> total_packet_length;
bit<48> inter_packet_gap;
'''
iface = 'h2-eth0'
class tenant(Packet):
name = "tenant"
fields_desc = [ IntField("id", 10),
IntField("enq_timestamp",0),
IntField("enq_qdepth",0),
IntField("deq_timedelta",0),
IntField("deq_qdepth",0),
IntField("total_pkt_count",0),
IntField("total_packet_length",0),
BitField("inter_packet_gap",0x0000000000000,48)
]
bind_layers(UDP, tenant, )
def get_if():
ifs=get_if_list()
iface=None
for i in get_if_list():
if "eth0" in i:
iface=i
break;
if not iface:
print "Cannot find eth0 interface"
exit(1)
return iface
class IPOption_MRI(IPOption):
name = "MRI"
option = 31
fields_desc = [ _IPOption_HDR,
FieldLenField("length", None, fmt="B",
length_of="swids",
adjust=lambda pkt,l:l+4),
ShortField("count", 0),
FieldListField("swids",
[],
IntField("", 0),
length_from=lambda pkt:pkt.count*4) ]
def expand(x):
yield x.name
while x.payload:
x = x.payload
yield x.name
def handle_pkt(pkt):
print "got a packet"
pkt.show2()
# print "llllllll\n"
# data = pkt[Raw].load
# print "\n data", data
print "\nHeaders: ", list(expand(pkt))
# hexdump(pkt)
sys.stdout.flush()
def main():
#iface = 'h2-eth0'
print "sniffing on %s" % iface
sys.stdout.flush()
sniff(filter="udp and port 4321", iface = iface,
prn = lambda x: handle_pkt(x))
if __name__ == '__main__':
main()