10 def bladecode(filename):
11 with open(filename, 'rb') as csvfile:
12 spamreader = csv.reader(csvfile, delimiter=',', quotechar='"')
18 for row in spamreader:
26 # if source != 192.168.67.84
27 if row[2] != '192.168.67.84':
30 from pprint import pprint
31 pprint("SRC: %s, DSCP: %s" % (row[2], row[10]))
32 # pprint ('diff:%f' % (float(row[1])-float(last_send[1])))
33 va = str(int((float(row[1])-float(last[1]))*10))
34 # print row[0]+"-"+row[1]+"-"+row[10]
35 # print str(float(row[1])-float(last[1]))+"-"+str(int(row[10])-int(last[10]))
36 #print " "+str(unichr(int(row[10])-int(last[10])+ord('A'))),
37 # va = str(int((float(row[1])-float(last[1]))*10))
38 if va not in ["0","1"]:
39 print "error: "+va+row[0]+"-"+row[10]
49 # print "dec: "+binascii.unhexlify('%x' % n)
50 # print " "+binascii.unhexlify('%x' % n),
56 if __name__ == "__main__":
57 def signal_handler(signal, frame):
58 print('SIG received. exitting!')
60 signal.signal(signal.SIGINT, signal_handler)
62 bladecode("cool.dehexed.csv")