mirror of
https://dev.iopsys.eu/bbf/bbfdm.git
synced 2025-12-10 07:44:39 +01:00
618 lines
22 KiB
C
618 lines
22 KiB
C
/*
|
|
* Copyright (C) 2019 iopsys Software Solutions AB
|
|
*
|
|
* This program is free software; you can redistribute it and/or modify
|
|
* it under the terms of the GNU Lesser General Public License version 2.1
|
|
* as published by the Free Software Foundation
|
|
*
|
|
* Author: Amin Ben Ramdhane <amin.benramdhane@pivasoftware.com>
|
|
*
|
|
*/
|
|
|
|
#include <libtrace.h>
|
|
#include "dmdiagnostics.h"
|
|
|
|
int read_next;
|
|
struct download_diag download_stats = {0};
|
|
struct upload_diagnostic_stats upload_stats = {0};
|
|
|
|
char *get_param_diagnostics(char *diag, char *option)
|
|
{
|
|
char buf[32] = {0}, *value;
|
|
|
|
snprintf(buf, sizeof(buf), "@%s[0]", diag);
|
|
dmuci_get_varstate_string("cwmp", buf, option, &value);
|
|
return value;
|
|
}
|
|
|
|
void set_param_diagnostics(char *diag, char *option, char *value)
|
|
{
|
|
struct uci_section *curr_section = NULL;
|
|
char buf[32] = {0}, *tmp;
|
|
|
|
curr_section = dmuci_walk_state_section("cwmp", diag, NULL, NULL, CMP_SECTION, NULL, NULL, GET_FIRST_SECTION);
|
|
if(!curr_section)
|
|
{
|
|
dmuci_add_state_section("cwmp", diag, &curr_section, &tmp);
|
|
}
|
|
snprintf(buf, sizeof(buf), "@%s[0]", diag);
|
|
dmuci_set_varstate_value("cwmp", buf, option, value);
|
|
}
|
|
|
|
void init_download_stats(void)
|
|
{
|
|
memset(&download_stats, 0, sizeof(download_stats));
|
|
}
|
|
|
|
void init_upload_stats(void)
|
|
{
|
|
memset(&upload_stats, 0, sizeof(upload_stats));
|
|
}
|
|
|
|
static void ftp_download_per_packet(libtrace_packet_t *packet)
|
|
{
|
|
struct tm lt;
|
|
struct timeval ts;
|
|
libtrace_tcp_t *tcp;
|
|
char tcp_flag[16] = "";
|
|
char *nexthdr;
|
|
char s_now[default_date_size];
|
|
uint8_t proto;
|
|
uint32_t remaining;
|
|
|
|
tcp = trace_get_transport(packet, &proto, &remaining);
|
|
if (tcp == NULL)
|
|
return;
|
|
else
|
|
nexthdr = trace_get_payload_from_tcp(tcp, &remaining);
|
|
|
|
if (tcp->ecn_ns) strncat(tcp_flag, "ECN_NS ", 7);
|
|
if (tcp->cwr) strncat(tcp_flag, "CWR ", 4);
|
|
if (tcp->ece) strncat(tcp_flag, "ECE ", 4);
|
|
if (tcp->fin) strncat(tcp_flag, "FIN ", 4);
|
|
if (tcp->syn) strncat(tcp_flag, "SYN ", 4);
|
|
if (tcp->rst) strncat(tcp_flag, "RST ", 4);
|
|
if (tcp->psh) strncat(tcp_flag, "PSH ", 4);
|
|
if (tcp->ack) strncat(tcp_flag, "ACK ", 4);
|
|
if (tcp->urg) strncat(tcp_flag, "URG ", 4);
|
|
|
|
if (strcmp(tcp_flag, "PSH ACK ") == 0 && strlen(nexthdr) > strlen(FTP_SIZE_RESPONSE) && strncmp(nexthdr, FTP_SIZE_RESPONSE, strlen(FTP_SIZE_RESPONSE)) == 0)
|
|
{
|
|
char *val = strstr(nexthdr,"213");
|
|
char *pch, *pchr;
|
|
val += strlen("213 ");
|
|
pch=strtok_r(val, " \r\n\t", &pchr);
|
|
download_stats.test_bytes_received = atoi(pch);
|
|
}
|
|
if(strcmp(tcp_flag, "PSH ACK ") == 0 && strlen(nexthdr) > strlen(FTP_PASV_RESPONSE) && strncmp(nexthdr, FTP_PASV_RESPONSE, strlen(FTP_PASV_RESPONSE)) == 0)
|
|
{
|
|
download_stats.ftp_syn = 1;
|
|
return;
|
|
}
|
|
if (download_stats.random_seq == 0 && strcmp(tcp_flag, "SYN ") == 0 && download_stats.ftp_syn == 1)
|
|
{
|
|
ts = trace_get_timeval(packet);
|
|
(void) localtime_r(&(ts.tv_sec), <);
|
|
strftime(s_now, sizeof s_now, "%Y-%m-%dT%H:%M:%S", <);
|
|
download_stats.random_seq = ntohl(tcp->seq);
|
|
snprintf(download_stats.tcpopenrequesttime, sizeof(download_stats.tcpopenrequesttime), "%s.%06ldZ", s_now, (long) ts.tv_usec);
|
|
}
|
|
if (strcmp(tcp_flag, "SYN ACK ") == 0 && download_stats.random_seq != 0 && (ntohl(tcp->ack_seq) - 1 ) == download_stats.random_seq)
|
|
{
|
|
ts = trace_get_timeval(packet);
|
|
(void) localtime_r(&(ts.tv_sec), <);
|
|
strftime(s_now, sizeof s_now, "%Y-%m-%dT%H:%M:%S", <);
|
|
snprintf(download_stats.tcpopenresponsetime, sizeof(download_stats.tcpopenresponsetime), "%s.%06ldZ", s_now, (long) ts.tv_usec);
|
|
download_stats.random_seq = ntohl(tcp->ack_seq);
|
|
snprintf(download_stats.tcpopenresponsetime, sizeof(download_stats.tcpopenresponsetime), "%s.%06ldZ", s_now, (long) ts.tv_usec);
|
|
}
|
|
if (strcmp(tcp_flag, "PSH ACK ") == 0 && strlen(nexthdr) > strlen(FTP_RETR_REQUEST) && strncmp(nexthdr, FTP_RETR_REQUEST, strlen(FTP_RETR_REQUEST)) == 0)
|
|
{
|
|
ts = trace_get_timeval(packet);
|
|
(void) localtime_r(&(ts.tv_sec), <);
|
|
strftime(s_now, sizeof s_now, "%Y-%m-%dT%H:%M:%S", <);
|
|
snprintf(download_stats.romtime, sizeof(download_stats.romtime), "%s.%06ldZ", s_now, (long) ts.tv_usec);
|
|
}
|
|
if(strcmp(tcp_flag, "ACK ") == 0 && ntohl(tcp->seq) == download_stats.random_seq && download_stats.ack_seq == 0)
|
|
{
|
|
download_stats.ack_seq = ntohl(tcp->seq);
|
|
return;
|
|
}
|
|
if(strcmp(tcp_flag, "ACK ") == 0 && ntohl(tcp->ack_seq) == download_stats.ack_seq )
|
|
{
|
|
ts = trace_get_timeval(packet);
|
|
(void) localtime_r(&(ts.tv_sec), <);
|
|
strftime(s_now, sizeof s_now, "%Y-%m-%dT%H:%M:%S", <);
|
|
if (download_stats.first_data == 0)
|
|
{
|
|
snprintf(download_stats.bomtime, sizeof(download_stats.bomtime), "%s.%06ldZ", s_now, (long) ts.tv_usec);
|
|
}
|
|
download_stats.first_data = 1;
|
|
}
|
|
if ( (strcmp(tcp_flag, "PSH ACK ") == 0 || strcmp(tcp_flag, "FIN PSH ACK ") == 0) && ntohl(tcp->ack_seq) == download_stats.ack_seq)
|
|
{
|
|
ts = trace_get_timeval(packet);
|
|
(void) localtime_r(&(ts.tv_sec), <);
|
|
strftime(s_now, sizeof s_now, "%Y-%m-%dT%H:%M:%S", <);
|
|
if (download_stats.first_data == 0)
|
|
{
|
|
snprintf(download_stats.bomtime, sizeof(download_stats.bomtime), "%s.%06ldZ", s_now, (long) ts.tv_usec);
|
|
download_stats.first_data = 1;
|
|
}
|
|
snprintf(download_stats.eomtime, sizeof(download_stats.eomtime), "%s.%06ldZ", s_now, (long) ts.tv_usec);
|
|
}
|
|
}
|
|
|
|
static void http_download_per_packet(libtrace_packet_t *packet)
|
|
{
|
|
struct tm lt;
|
|
struct timeval ts;
|
|
libtrace_tcp_t *tcp;
|
|
char *nexthdr, tcp_flag[16] = "", s_now[default_date_size];
|
|
uint8_t proto;
|
|
uint32_t remaining;
|
|
|
|
tcp = trace_get_transport(packet, &proto, &remaining);
|
|
if (tcp == NULL)
|
|
return;
|
|
else
|
|
nexthdr = trace_get_payload_from_tcp(tcp, &remaining);
|
|
|
|
if (tcp->ecn_ns) strncat(tcp_flag, "ECN_NS ", 7);
|
|
if (tcp->cwr) strncat(tcp_flag, "CWR ", 4);
|
|
if (tcp->ece) strncat(tcp_flag, "ECE ", 4);
|
|
if (tcp->fin) strncat(tcp_flag, "FIN ", 4);
|
|
if (tcp->syn) strncat(tcp_flag, "SYN ", 4);
|
|
if (tcp->rst) strncat(tcp_flag, "RST ", 4);
|
|
if (tcp->psh) strncat(tcp_flag, "PSH ", 4);
|
|
if (tcp->ack) strncat(tcp_flag, "ACK ", 4);
|
|
if (tcp->urg) strncat(tcp_flag, "URG ", 4);
|
|
|
|
if (strcmp(tcp_flag, "SYN ") == 0 && download_stats.random_seq == 0) {
|
|
ts = trace_get_timeval(packet);
|
|
(void) localtime_r(&(ts.tv_sec), <);
|
|
strftime(s_now, sizeof s_now, "%Y-%m-%dT%H:%M:%S", <);
|
|
snprintf(download_stats.tcpopenrequesttime, sizeof(download_stats.tcpopenrequesttime), "%s.%06ldZ", s_now, (long) ts.tv_usec);
|
|
download_stats.random_seq = ntohl(tcp->seq);
|
|
return;
|
|
}
|
|
|
|
if (strcmp(tcp_flag, "SYN ACK ") == 0 && download_stats.random_seq != 0 && (ntohl(tcp->ack_seq) - 1 ) == download_stats.random_seq) {
|
|
ts = trace_get_timeval(packet);
|
|
(void) localtime_r(&(ts.tv_sec), <);
|
|
strftime(s_now, sizeof s_now, "%Y-%m-%dT%H:%M:%S", <);
|
|
snprintf(download_stats.tcpopenresponsetime, sizeof(download_stats.tcpopenresponsetime), "%s.%06ldZ", s_now, (long) ts.tv_usec);
|
|
download_stats.random_seq = ntohl(tcp->seq);
|
|
return;
|
|
}
|
|
|
|
if (strcmp(tcp_flag, "PSH ACK ") == 0 && strncmp(nexthdr, "GET", 3) == 0) {
|
|
ts = trace_get_timeval(packet);
|
|
(void) localtime_r(&(ts.tv_sec), <);
|
|
strftime(s_now, sizeof s_now, "%Y-%m-%dT%H:%M:%S", <);
|
|
snprintf(download_stats.romtime, sizeof(download_stats.romtime), "%s.%06ldZ", s_now, (long) ts.tv_usec);
|
|
download_stats.get_ack = ntohl(tcp->ack_seq);
|
|
return;
|
|
}
|
|
|
|
if(strcmp(tcp_flag, "ACK ") == 0 && ntohl(tcp->seq) == download_stats.get_ack && download_stats.ack_seq == 0) {
|
|
download_stats.ack_seq = ntohl(tcp->ack_seq);
|
|
return;
|
|
}
|
|
|
|
if(strcmp(tcp_flag, "ACK ") == 0 && ntohl(tcp->ack_seq) == download_stats.ack_seq ) {
|
|
ts = trace_get_timeval(packet);
|
|
(void) localtime_r(&(ts.tv_sec), <);
|
|
strftime(s_now, sizeof s_now, "%Y-%m-%dT%H:%M:%S", <);
|
|
if (download_stats.first_data == 0) {
|
|
snprintf(download_stats.bomtime, sizeof(download_stats.bomtime), "%s.%06ldZ", s_now, (long) ts.tv_usec);
|
|
char *val = strstr(nexthdr,"Content-Length");
|
|
char *pch, *pchr;
|
|
val += strlen("Content-Length: ");
|
|
pch=strtok_r(val, " \r\n\t", &pchr);
|
|
download_stats.test_bytes_received = atoi(pch);
|
|
download_stats.first_data = 1;
|
|
}
|
|
return;
|
|
}
|
|
|
|
if ( (strcmp(tcp_flag, "PSH ACK ") == 0 || strcmp(tcp_flag, "FIN PSH ACK ") == 0) && ntohl(tcp->ack_seq) == download_stats.ack_seq) {
|
|
ts = trace_get_timeval(packet);
|
|
(void) localtime_r(&(ts.tv_sec), <);
|
|
strftime(s_now, sizeof s_now, "%Y-%m-%dT%H:%M:%S", <);
|
|
if (download_stats.first_data == 0) {
|
|
snprintf(download_stats.bomtime, sizeof(download_stats.bomtime), "%s.%06ldZ", s_now, (long) ts.tv_usec);
|
|
char *val = strstr(nexthdr,"Content-Length");
|
|
char *pch, *pchr;
|
|
val += strlen("Content-Length: ");
|
|
pch=strtok_r(val, " \r\n\t", &pchr);
|
|
download_stats.test_bytes_received = atoi(pch);
|
|
download_stats.first_data = 1;
|
|
}
|
|
snprintf(download_stats.eomtime, sizeof(download_stats.eomtime), "%s.%06ldZ", s_now, (long) ts.tv_usec);
|
|
return;
|
|
}
|
|
}
|
|
|
|
static void libtrace_cleanup(libtrace_t *trace, libtrace_packet_t *packet)
|
|
{
|
|
if (trace)
|
|
trace_destroy(trace);
|
|
|
|
if (packet)
|
|
trace_destroy_packet(packet);
|
|
}
|
|
|
|
static void set_download_stats(char *protocol)
|
|
{
|
|
char buf[16] = {0};
|
|
|
|
if(strcmp(protocol, "cwmp")== 0)
|
|
init_uci_varstate_ctx();
|
|
|
|
set_param_diagnostics("downloaddiagnostic", "ROMtime", download_stats.romtime);
|
|
set_param_diagnostics("downloaddiagnostic", "BOMtime", download_stats.bomtime);
|
|
set_param_diagnostics("downloaddiagnostic", "EOMtime", download_stats.eomtime);
|
|
set_param_diagnostics("downloaddiagnostic", "TCPOpenRequestTime", download_stats.tcpopenrequesttime);
|
|
set_param_diagnostics("downloaddiagnostic", "TCPOpenResponseTime", download_stats.tcpopenresponsetime);
|
|
snprintf(buf, sizeof(buf), "%d", download_stats.test_bytes_received);
|
|
set_param_diagnostics("downloaddiagnostic", "TestBytesReceived", buf);
|
|
|
|
if(strcmp(protocol, "cwmp")== 0)
|
|
end_uci_varstate_ctx();
|
|
}
|
|
|
|
static void set_upload_stats(char *protocol)
|
|
{
|
|
if(strcmp(protocol, "cwmp")== 0)
|
|
init_uci_varstate_ctx();
|
|
|
|
set_param_diagnostics("uploaddiagnostic", "ROMtime", upload_stats.romtime);
|
|
set_param_diagnostics("uploaddiagnostic", "BOMtime", upload_stats.bomtime);
|
|
set_param_diagnostics("uploaddiagnostic", "EOMtime", upload_stats.eomtime);
|
|
set_param_diagnostics("uploaddiagnostic", "TCPOpenRequestTime", upload_stats.tcpopenrequesttime);
|
|
set_param_diagnostics("uploaddiagnostic", "TCPOpenResponseTime", upload_stats.tcpopenresponsetime);
|
|
|
|
if(strcmp(protocol, "cwmp")== 0)
|
|
end_uci_varstate_ctx();
|
|
}
|
|
|
|
static void http_upload_per_packet(libtrace_packet_t *packet)
|
|
{
|
|
struct tm lt;
|
|
struct timeval ts;
|
|
libtrace_tcp_t *tcp;
|
|
char tcp_flag[16] = "";
|
|
char *nexthdr;
|
|
char s_now[default_date_size];
|
|
uint8_t proto;
|
|
uint32_t remaining;
|
|
|
|
tcp = trace_get_transport(packet, &proto, &remaining);
|
|
if (tcp == NULL)
|
|
return;
|
|
else
|
|
nexthdr = trace_get_payload_from_tcp(tcp, &remaining);
|
|
|
|
if (tcp->ecn_ns) strncat(tcp_flag, "ECN_NS ", 7);
|
|
if (tcp->cwr) strncat(tcp_flag, "CWR ", 4);
|
|
if (tcp->ece) strncat(tcp_flag, "ECE ", 4);
|
|
if (tcp->fin) strncat(tcp_flag, "FIN ", 4);
|
|
if (tcp->syn) strncat(tcp_flag, "SYN ", 4);
|
|
if (tcp->rst) strncat(tcp_flag, "RST ", 4);
|
|
if (tcp->psh) strncat(tcp_flag, "PSH ", 4);
|
|
if (tcp->ack) strncat(tcp_flag, "ACK ", 4);
|
|
if (tcp->urg) strncat(tcp_flag, "URG ", 4);
|
|
|
|
if (strcmp(tcp_flag, "SYN ") == 0 && download_stats.random_seq == 0)
|
|
{
|
|
ts = trace_get_timeval(packet);
|
|
(void) localtime_r(&(ts.tv_sec), <);
|
|
strftime(s_now, sizeof s_now, "%Y-%m-%dT%H:%M:%S", <);
|
|
snprintf(upload_stats.tcpopenrequesttime, sizeof(upload_stats.tcpopenrequesttime), "%s.%06ldZ", s_now, (long) ts.tv_usec);
|
|
upload_stats.random_seq = ntohl(tcp->seq);
|
|
}
|
|
if (strcmp(tcp_flag, "SYN ACK ") == 0 && upload_stats.random_seq != 0 && (ntohl(tcp->ack_seq) - 1 ) == upload_stats.random_seq)
|
|
{
|
|
ts = trace_get_timeval(packet);
|
|
(void) localtime_r(&(ts.tv_sec), <);
|
|
strftime(s_now, sizeof s_now, "%Y-%m-%dT%H:%M:%S", <);
|
|
snprintf(upload_stats.tcpopenresponsetime, sizeof(upload_stats.tcpopenresponsetime), "%s.%06ldZ", s_now, (long) ts.tv_usec);
|
|
upload_stats.random_seq = ntohl(tcp->seq);
|
|
}
|
|
if (strcmp(tcp_flag, "PSH ACK ") == 0 && strncmp(nexthdr, "PUT", 3) == 0)
|
|
{
|
|
ts = trace_get_timeval(packet);
|
|
(void) localtime_r(&(ts.tv_sec), <);
|
|
strftime(s_now, sizeof s_now, "%Y-%m-%dT%H:%M:%S", <);
|
|
snprintf(upload_stats.romtime, sizeof(upload_stats.romtime), "%s.%06ldZ", s_now, (long) ts.tv_usec);
|
|
if (strstr(nexthdr, "Expect: 100-continue"))
|
|
{
|
|
upload_stats.tmp=1;
|
|
upload_stats.ack_seq = ntohl(tcp->ack_seq);
|
|
}
|
|
else
|
|
upload_stats.ack_seq = ntohl(tcp->ack_seq);
|
|
return;
|
|
}
|
|
if (strcmp(tcp_flag, "PSH ACK ") == 0 && upload_stats.tmp == 1 && strstr(nexthdr, "100 Continue"))
|
|
{
|
|
upload_stats.tmp = 2;
|
|
upload_stats.ack_seq = ntohl(tcp->ack_seq);
|
|
return;
|
|
}
|
|
if (strcmp(tcp_flag, "ACK ") == 0 && upload_stats.tmp == 2 && ntohl(tcp->seq) == upload_stats.ack_seq)
|
|
{
|
|
upload_stats.tmp = 0;
|
|
upload_stats.ack_seq = ntohl(tcp->ack_seq);
|
|
return;
|
|
}
|
|
if(strcmp(tcp_flag, "ACK ") == 0 && ntohl(tcp->ack_seq) == upload_stats.ack_seq && upload_stats.tmp == 0)
|
|
{
|
|
ts = trace_get_timeval(packet);
|
|
(void) localtime_r(&(ts.tv_sec), <);
|
|
strftime(s_now, sizeof s_now, "%Y-%m-%dT%H:%M:%S", <);
|
|
if (upload_stats.first_data == 0)
|
|
{
|
|
snprintf(upload_stats.bomtime, sizeof(upload_stats.bomtime), "%s.%06ldZ", s_now, (long) ts.tv_usec);
|
|
upload_stats.first_data = 1;
|
|
}
|
|
}
|
|
if ( (strcmp(tcp_flag, "PSH ACK ") == 0 || strcmp(tcp_flag, "FIN PSH ACK ") == 0) && ntohl(tcp->ack_seq) == upload_stats.ack_seq && upload_stats.tmp == 0)
|
|
{
|
|
ts = trace_get_timeval(packet);
|
|
(void) localtime_r(&(ts.tv_sec), <);
|
|
strftime(s_now, sizeof s_now, "%Y-%m-%dT%H:%M:%S", <);
|
|
if (upload_stats.first_data == 0)
|
|
{
|
|
snprintf(upload_stats.bomtime, sizeof(upload_stats.bomtime), "%s.%06ldZ", s_now, (long) ts.tv_usec);
|
|
upload_stats.first_data = 1;
|
|
}
|
|
}
|
|
if ( (strcmp(tcp_flag, "PSH ACK ") == 0 || strcmp(tcp_flag, "FIN PSH ACK ") == 0) && ntohl(tcp->seq) == upload_stats.ack_seq && upload_stats.tmp == 0)
|
|
{
|
|
ts = trace_get_timeval(packet);
|
|
(void) localtime_r(&(ts.tv_sec), <);
|
|
strftime(s_now, sizeof s_now, "%Y-%m-%dT%H:%M:%S", <);
|
|
snprintf(upload_stats.eomtime, sizeof(upload_stats.eomtime), "%s.%06ldZ", s_now, (long) ts.tv_usec);
|
|
}
|
|
}
|
|
|
|
static void ftp_upload_per_packet(libtrace_packet_t *packet)
|
|
{
|
|
struct tm lt;
|
|
struct timeval ts;
|
|
libtrace_tcp_t *tcp;
|
|
uint8_t proto;
|
|
uint32_t remaining;
|
|
char tcp_flag[16] = "";
|
|
char *nexthdr;
|
|
char s_now[default_date_size];
|
|
|
|
tcp = trace_get_transport(packet, &proto, &remaining);
|
|
if (tcp == NULL)
|
|
return;
|
|
else
|
|
nexthdr = trace_get_payload_from_tcp(tcp, &remaining);
|
|
|
|
if (tcp->ecn_ns) strncat(tcp_flag, "ECN_NS ", 7);
|
|
if (tcp->cwr) strncat(tcp_flag, "CWR ", 4);
|
|
if (tcp->ece) strncat(tcp_flag, "ECE ", 4);
|
|
if (tcp->fin) strncat(tcp_flag, "FIN ", 4);
|
|
if (tcp->syn) strncat(tcp_flag, "SYN ", 4);
|
|
if (tcp->rst) strncat(tcp_flag, "RST ", 4);
|
|
if (tcp->psh) strncat(tcp_flag, "PSH ", 4);
|
|
if (tcp->ack) strncat(tcp_flag, "ACK ", 4);
|
|
if (tcp->urg) strncat(tcp_flag, "URG ", 4);
|
|
|
|
if(strcmp(tcp_flag, "PSH ACK ") == 0 && strlen(nexthdr) > strlen(FTP_PASV_RESPONSE) && strncmp(nexthdr, FTP_PASV_RESPONSE, strlen(FTP_PASV_RESPONSE)) == 0)
|
|
{
|
|
upload_stats.ftp_syn = 1;
|
|
return;
|
|
}
|
|
if (strcmp(tcp_flag, "SYN ") == 0 && upload_stats.ftp_syn == 1)
|
|
{
|
|
ts = trace_get_timeval(packet);
|
|
(void) localtime_r(&(ts.tv_sec), <);
|
|
strftime(s_now, sizeof s_now, "%Y-%m-%dT%H:%M:%S", <);
|
|
upload_stats.random_seq = ntohl(tcp->seq);
|
|
snprintf(upload_stats.tcpopenrequesttime, sizeof(upload_stats.tcpopenrequesttime), "%s.%06ldZ", s_now, (long) ts.tv_usec);
|
|
}
|
|
if (strcmp(tcp_flag, "SYN ACK ") == 0 && upload_stats.random_seq != 0 && (ntohl(tcp->ack_seq) - 1 ) == upload_stats.random_seq)
|
|
{
|
|
ts = trace_get_timeval(packet);
|
|
(void) localtime_r(&(ts.tv_sec), <);
|
|
strftime(s_now, sizeof s_now, "%Y-%m-%dT%H:%M:%S", <);
|
|
snprintf(upload_stats.tcpopenresponsetime, sizeof(upload_stats.tcpopenresponsetime), "%s.%06ldZ", s_now, (long) ts.tv_usec);
|
|
upload_stats.random_seq = ntohl(tcp->ack_seq);
|
|
}
|
|
if (strcmp(tcp_flag, "PSH ACK ") == 0 && strlen(nexthdr) > strlen(FTP_STOR_REQUEST) && strncmp(nexthdr, FTP_STOR_REQUEST, strlen(FTP_STOR_REQUEST)) == 0)
|
|
{
|
|
ts = trace_get_timeval(packet);
|
|
(void) localtime_r(&(ts.tv_sec), <);
|
|
strftime(s_now, sizeof s_now, "%Y-%m-%dT%H:%M:%S", <);
|
|
snprintf(upload_stats.romtime, sizeof(upload_stats.romtime), "%s.%06ldZ", s_now, (long) ts.tv_usec);
|
|
}
|
|
if(strcmp(tcp_flag, "ACK ") == 0 && ntohl(tcp->seq) == upload_stats.random_seq && upload_stats.ack_seq == 0)
|
|
{
|
|
upload_stats.ack_seq = ntohl(tcp->ack_seq);
|
|
return;
|
|
}
|
|
if(strcmp(tcp_flag, "ACK ") == 0 && ntohl(tcp->ack_seq) == upload_stats.ack_seq )
|
|
{
|
|
ts = trace_get_timeval(packet);
|
|
(void) localtime_r(&(ts.tv_sec), <);
|
|
strftime(s_now, sizeof s_now, "%Y-%m-%dT%H:%M:%S", <);
|
|
if (upload_stats.first_data == 0)
|
|
{
|
|
snprintf(upload_stats.bomtime, sizeof(upload_stats.bomtime), "%s.%06ldZ", s_now, (long) ts.tv_usec);
|
|
upload_stats.first_data = 1;
|
|
}
|
|
}
|
|
if ( (strcmp(tcp_flag, "PSH ACK ") == 0 || strcmp(tcp_flag, "FIN PSH ACK ") == 0) && ntohl(tcp->ack_seq) == upload_stats.ack_seq) //&& strlen(nexthdr) > 16 && strncmp(nexthdr, "HTTP/1.1 200 OK", 16) == 0
|
|
{
|
|
ts = trace_get_timeval(packet);
|
|
(void) localtime_r(&(ts.tv_sec), <);
|
|
strftime(s_now, sizeof s_now, "%Y-%m-%dT%H:%M:%S", <);
|
|
if (upload_stats.first_data == 0)
|
|
{
|
|
snprintf(upload_stats.bomtime, sizeof(upload_stats.bomtime), "%s.%06ldZ", s_now, (long) ts.tv_usec);
|
|
upload_stats.first_data = 1;
|
|
}
|
|
}
|
|
if ( (strcmp(tcp_flag, "PSH ACK ") == 0 || strcmp(tcp_flag, "FIN PSH ACK ") == 0) && strlen(nexthdr) > strlen(FTP_TRANSFERT_COMPLETE) && strncmp(nexthdr, FTP_TRANSFERT_COMPLETE, strlen(FTP_TRANSFERT_COMPLETE)) == 0) //&& strlen(nexthdr) > 16 && strncmp(nexthdr, "HTTP/1.1 200 OK", 16) == 0
|
|
{
|
|
ts = trace_get_timeval(packet);
|
|
(void) localtime_r(&(ts.tv_sec), <);
|
|
strftime(s_now, sizeof s_now, "%Y-%m-%dT%H:%M:%S", <);
|
|
snprintf(upload_stats.eomtime, sizeof(upload_stats.eomtime), "%s.%06ldZ", s_now, (long) ts.tv_usec);
|
|
read_next = 0;
|
|
}
|
|
}
|
|
|
|
int extract_stats(char *dump_file, int proto, int diagnostic_type, char *protocol)
|
|
{
|
|
libtrace_t *trace = NULL;
|
|
libtrace_packet_t *packet = NULL;
|
|
read_next = 1;
|
|
packet = trace_create_packet();
|
|
if (packet == NULL) {
|
|
perror("Creating libtrace packet");
|
|
libtrace_cleanup(trace, packet);
|
|
return 1;
|
|
}
|
|
|
|
trace = trace_create(dump_file);
|
|
if (!trace) {
|
|
return -1;
|
|
}
|
|
|
|
if (trace_is_err(trace)) {
|
|
trace_perror(trace,"Opening trace file");
|
|
libtrace_cleanup(trace, packet);
|
|
return 1;
|
|
}
|
|
|
|
if (trace_start(trace) == -1) {
|
|
trace_perror(trace,"Starting trace");
|
|
libtrace_cleanup(trace, packet);
|
|
return 1;
|
|
}
|
|
if (proto == DOWNLOAD_DIAGNOSTIC_HTTP && diagnostic_type == DOWNLOAD_DIAGNOSTIC)
|
|
{
|
|
while (trace_read_packet(trace,packet)>0 && read_next == 1) {
|
|
http_download_per_packet(packet);
|
|
continue;
|
|
}
|
|
set_download_stats(protocol);
|
|
}
|
|
else if (proto == DOWNLOAD_DIAGNOSTIC_FTP && diagnostic_type == DOWNLOAD_DIAGNOSTIC)
|
|
{
|
|
while (trace_read_packet(trace,packet)>0 && read_next == 1) {
|
|
ftp_download_per_packet(packet);
|
|
continue;
|
|
}
|
|
set_download_stats(protocol);
|
|
}
|
|
else if (proto == DOWNLOAD_DIAGNOSTIC_HTTP && diagnostic_type == UPLOAD_DIAGNOSTIC)
|
|
{
|
|
while (trace_read_packet(trace,packet)>0 && read_next == 1) {
|
|
http_upload_per_packet(packet);
|
|
continue;
|
|
}
|
|
set_upload_stats(protocol);
|
|
}
|
|
else
|
|
{
|
|
while (trace_read_packet(trace,packet)>0 && read_next == 1) {
|
|
ftp_upload_per_packet(packet);
|
|
continue;
|
|
}
|
|
set_upload_stats(protocol);
|
|
}
|
|
libtrace_cleanup(trace, packet);
|
|
return 0;
|
|
}
|
|
|
|
int get_default_gateway_device(char **gw)
|
|
{
|
|
FILE *f = fopen("/proc/net/route" , "r");
|
|
if (f != NULL) {
|
|
char line[100], *p, *c, *saveptr;
|
|
while(fgets(line , 100 , f)) {
|
|
p = strtok_r(line, " \t", &saveptr);
|
|
c = strtok_r(NULL, " \t", &saveptr);
|
|
if(p!=NULL && c!=NULL) {
|
|
if(strcmp(c, "00000000") == 0) {
|
|
dmasprintf(gw, "%s", p);
|
|
fclose(f);
|
|
return 0;
|
|
}
|
|
}
|
|
}
|
|
fclose(f);
|
|
}
|
|
return -1;
|
|
}
|
|
|
|
int start_upload_download_diagnostic(int diagnostic_type)
|
|
{
|
|
char *url, *interface, *size, *status;
|
|
int error;
|
|
|
|
if (diagnostic_type == DOWNLOAD_DIAGNOSTIC) {
|
|
dmuci_get_varstate_string("cwmp", "@downloaddiagnostic[0]", "url", &url);
|
|
dmuci_get_varstate_string("cwmp", "@downloaddiagnostic[0]", "device", &interface);
|
|
} else {
|
|
dmuci_get_varstate_string("cwmp", "@uploaddiagnostic[0]", "url", &url);
|
|
dmuci_get_varstate_string("cwmp", "@uploaddiagnostic[0]", "TestFileLength", &size);
|
|
dmuci_get_varstate_string("cwmp", "@uploaddiagnostic[0]", "device", &interface);
|
|
}
|
|
|
|
if (interface[0] == '\0') {
|
|
error = get_default_gateway_device(&interface);
|
|
if (error == -1)
|
|
return -1;
|
|
}
|
|
|
|
if (diagnostic_type == DOWNLOAD_DIAGNOSTIC) {
|
|
//Free uci_varstate_ctx
|
|
end_uci_varstate_ctx();
|
|
|
|
dmcmd("/bin/sh", 5, DOWNLOAD_DIAGNOSTIC_PATH, "run", "usp", url, interface);
|
|
|
|
//Allocate uci_varstate_ctx
|
|
init_uci_varstate_ctx();
|
|
|
|
dmuci_get_varstate_string("cwmp", "@downloaddiagnostic[0]", "url", &url);
|
|
dmuci_get_varstate_string("cwmp", "@downloaddiagnostic[0]", "DiagnosticState", &status);
|
|
if (status && strcmp(status, "Complete") == 0) {
|
|
init_download_stats();
|
|
if(strncmp(url, DOWNLOAD_UPLOAD_PROTOCOL_HTTP, strlen(DOWNLOAD_UPLOAD_PROTOCOL_HTTP)) == 0)
|
|
extract_stats(DOWNLOAD_DUMP_FILE, DOWNLOAD_DIAGNOSTIC_HTTP, DOWNLOAD_DIAGNOSTIC, "usp");
|
|
if(strncmp(url, DOWNLOAD_UPLOAD_PROTOCOL_FTP, strlen(DOWNLOAD_UPLOAD_PROTOCOL_FTP)) == 0)
|
|
extract_stats(DOWNLOAD_DUMP_FILE, DOWNLOAD_DIAGNOSTIC_FTP, DOWNLOAD_DIAGNOSTIC, "usp");
|
|
} else if (status && strncmp(status, "Error_", strlen("Error_")) == 0)
|
|
return -1;
|
|
} else {
|
|
//Free uci_varstate_ctx
|
|
end_uci_varstate_ctx();
|
|
|
|
dmcmd("/bin/sh", 6, UPLOAD_DIAGNOSTIC_PATH, "run", "usp", url, interface, size);
|
|
|
|
//Allocate uci_varstate_ctx
|
|
init_uci_varstate_ctx();
|
|
|
|
dmuci_get_varstate_string("cwmp", "@uploaddiagnostic[0]", "url", &url);
|
|
dmuci_get_varstate_string("cwmp", "@uploaddiagnostic[0]", "DiagnosticState", &status);
|
|
if (status && strcmp(status, "Complete") == 0) {
|
|
init_upload_stats();
|
|
if(strncmp(url, DOWNLOAD_UPLOAD_PROTOCOL_HTTP, strlen(DOWNLOAD_UPLOAD_PROTOCOL_HTTP)) == 0)
|
|
extract_stats(UPLOAD_DUMP_FILE, DOWNLOAD_DIAGNOSTIC_HTTP, UPLOAD_DIAGNOSTIC, "usp");
|
|
if(strncmp(url, DOWNLOAD_UPLOAD_PROTOCOL_FTP, strlen(DOWNLOAD_UPLOAD_PROTOCOL_FTP)) == 0)
|
|
extract_stats(UPLOAD_DUMP_FILE, DOWNLOAD_DIAGNOSTIC_FTP, UPLOAD_DIAGNOSTIC, "usp");
|
|
} else if (status && strncmp(status, "Error_", strlen("Error_")) == 0)
|
|
return -1;
|
|
}
|
|
return 0;
|
|
}
|