]> The Tcpdump Group git mirrors - libpcap/blob - inet.c
Update to work with FreeBSD flavor of SIOCGIFDESCR.
[libpcap] / inet.c
1 /* -*- Mode: c; tab-width: 8; indent-tabs-mode: 1; c-basic-offset: 8; -*- */
2 /*
3 * Copyright (c) 1994, 1995, 1996, 1997, 1998
4 * The Regents of the University of California. All rights reserved.
5 *
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions
8 * are met:
9 * 1. Redistributions of source code must retain the above copyright
10 * notice, this list of conditions and the following disclaimer.
11 * 2. Redistributions in binary form must reproduce the above copyright
12 * notice, this list of conditions and the following disclaimer in the
13 * documentation and/or other materials provided with the distribution.
14 * 3. All advertising materials mentioning features or use of this software
15 * must display the following acknowledgement:
16 * This product includes software developed by the Computer Systems
17 * Engineering Group at Lawrence Berkeley Laboratory.
18 * 4. Neither the name of the University nor of the Laboratory may be used
19 * to endorse or promote products derived from this software without
20 * specific prior written permission.
21 *
22 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
23 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
24 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
25 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
26 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
27 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
28 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
29 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
30 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
31 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
32 * SUCH DAMAGE.
33 */
34
35 #ifndef lint
36 static const char rcsid[] _U_ =
37 "@(#) $Header: /tcpdump/master/libpcap/inet.c,v 1.79 2008-04-20 18:19:02 guy Exp $ (LBL)";
38 #endif
39
40 #ifdef HAVE_CONFIG_H
41 #include "config.h"
42 #endif
43
44 #ifdef WIN32
45 #include <pcap-stdinc.h>
46 #else /* WIN32 */
47
48 #include <sys/param.h>
49 #ifndef MSDOS
50 #include <sys/file.h>
51 #endif
52 #include <sys/ioctl.h>
53 #include <sys/socket.h>
54 #ifdef HAVE_SYS_SOCKIO_H
55 #include <sys/sockio.h>
56 #endif
57
58 struct mbuf; /* Squelch compiler warnings on some platforms for */
59 struct rtentry; /* declarations in <net/if.h> */
60 #include <net/if.h>
61 #include <netinet/in.h>
62 #endif /* WIN32 */
63
64 #include <ctype.h>
65 #include <errno.h>
66 #include <memory.h>
67 #include <stdio.h>
68 #include <stdlib.h>
69 #include <string.h>
70 #if !defined(WIN32) && !defined(__BORLANDC__)
71 #include <unistd.h>
72 #endif /* !WIN32 && !__BORLANDC__ */
73 #ifdef HAVE_LIMITS_H
74 #include <limits.h>
75 #else
76 #define INT_MAX 2147483647
77 #endif
78
79 #include "pcap-int.h"
80
81 #ifdef HAVE_OS_PROTO_H
82 #include "os-proto.h"
83 #endif
84
85 /* Not all systems have IFF_LOOPBACK */
86 #ifdef IFF_LOOPBACK
87 #define ISLOOPBACK(name, flags) ((flags) & IFF_LOOPBACK)
88 #else
89 #define ISLOOPBACK(name, flags) ((name)[0] == 'l' && (name)[1] == 'o' && \
90 (isdigit((unsigned char)((name)[2])) || (name)[2] == '\0'))
91 #endif
92
93 struct sockaddr *
94 dup_sockaddr(struct sockaddr *sa, size_t sa_length)
95 {
96 struct sockaddr *newsa;
97
98 if ((newsa = malloc(sa_length)) == NULL)
99 return (NULL);
100 return (memcpy(newsa, sa, sa_length));
101 }
102
103 static int
104 get_instance(const char *name)
105 {
106 const char *cp, *endcp;
107 int n;
108
109 if (strcmp(name, "any") == 0) {
110 /*
111 * Give the "any" device an artificially high instance
112 * number, so it shows up after all other non-loopback
113 * interfaces.
114 */
115 return INT_MAX;
116 }
117
118 endcp = name + strlen(name);
119 for (cp = name; cp < endcp && !isdigit((unsigned char)*cp); ++cp)
120 continue;
121
122 if (isdigit((unsigned char)*cp))
123 n = atoi(cp);
124 else
125 n = 0;
126 return (n);
127 }
128
129 int
130 add_or_find_if(pcap_if_t **curdev_ret, pcap_if_t **alldevs, const char *name,
131 u_int flags, const char *description, char *errbuf)
132 {
133 pcap_t *p;
134 pcap_if_t *curdev, *prevdev, *nextdev;
135 int this_instance;
136
137 /*
138 * Is there already an entry in the list for this interface?
139 */
140 for (curdev = *alldevs; curdev != NULL; curdev = curdev->next) {
141 if (strcmp(name, curdev->name) == 0)
142 break; /* yes, we found it */
143 }
144
145 if (curdev == NULL) {
146 /*
147 * No, we didn't find it.
148 *
149 * Can we open this interface for live capture?
150 *
151 * We do this check so that interfaces that are
152 * supplied by the interface enumeration mechanism
153 * we're using but that don't support packet capture
154 * aren't included in the list. Loopback interfaces
155 * on Solaris are an example of this; we don't just
156 * omit loopback interfaces on all platforms because
157 * you *can* capture on loopback interfaces on some
158 * OSes.
159 *
160 * On OS X, we don't do this check if the device
161 * name begins with "wlt"; at least some versions
162 * of OS X offer monitor mode capturing by having
163 * a separate "monitor mode" device for each wireless
164 * adapter, rather than by implementing the ioctls
165 * that {Free,Net,Open,DragonFly}BSD provide.
166 * Opening that device puts the adapter into monitor
167 * mode, which, at least for some adapters, causes
168 * them to deassociate from the network with which
169 * they're associated.
170 *
171 * Instead, we try to open the corresponding "en"
172 * device (so that we don't end up with, for users
173 * without sufficient privilege to open capture
174 * devices, a list of adapters that only includes
175 * the wlt devices).
176 */
177 #ifdef __APPLE__
178 if (strncmp(name, "wlt", 3) == 0) {
179 char *en_name;
180 size_t en_name_len;
181
182 /*
183 * Try to allocate a buffer for the "en"
184 * device's name.
185 */
186 en_name_len = strlen(name) - 1;
187 en_name = malloc(en_name_len + 1);
188 if (en_name == NULL) {
189 (void)snprintf(errbuf, PCAP_ERRBUF_SIZE,
190 "malloc: %s", pcap_strerror(errno));
191 return (-1);
192 }
193 strcpy(en_name, "en");
194 strcat(en_name, name + 3);
195 p = pcap_open_live(en_name, 68, 0, 0, errbuf);
196 free(en_name);
197 } else
198 #endif /* __APPLE */
199 p = pcap_open_live(name, 68, 0, 0, errbuf);
200 if (p == NULL) {
201 /*
202 * No. Don't bother including it.
203 * Don't treat this as an error, though.
204 */
205 *curdev_ret = NULL;
206 return (0);
207 }
208 pcap_close(p);
209
210 /*
211 * Yes, we can open it.
212 * Allocate a new entry.
213 */
214 curdev = malloc(sizeof(pcap_if_t));
215 if (curdev == NULL) {
216 (void)snprintf(errbuf, PCAP_ERRBUF_SIZE,
217 "malloc: %s", pcap_strerror(errno));
218 return (-1);
219 }
220
221 /*
222 * Fill in the entry.
223 */
224 curdev->next = NULL;
225 curdev->name = strdup(name);
226 if (curdev->name == NULL) {
227 (void)snprintf(errbuf, PCAP_ERRBUF_SIZE,
228 "malloc: %s", pcap_strerror(errno));
229 free(curdev);
230 return (-1);
231 }
232 if (description != NULL) {
233 /*
234 * We have a description for this interface.
235 */
236 curdev->description = strdup(description);
237 if (curdev->description == NULL) {
238 (void)snprintf(errbuf, PCAP_ERRBUF_SIZE,
239 "malloc: %s", pcap_strerror(errno));
240 free(curdev->name);
241 free(curdev);
242 return (-1);
243 }
244 } else {
245 /*
246 * We don't.
247 */
248 curdev->description = NULL;
249 }
250 curdev->addresses = NULL; /* list starts out as empty */
251 curdev->flags = 0;
252 if (ISLOOPBACK(name, flags))
253 curdev->flags |= PCAP_IF_LOOPBACK;
254
255 /*
256 * Add it to the list, in the appropriate location.
257 * First, get the instance number of this interface.
258 */
259 this_instance = get_instance(name);
260
261 /*
262 * Now look for the last interface with an instance number
263 * less than or equal to the new interface's instance
264 * number - except that non-loopback interfaces are
265 * arbitrarily treated as having interface numbers less
266 * than those of loopback interfaces, so the loopback
267 * interfaces are put at the end of the list.
268 *
269 * We start with "prevdev" being NULL, meaning we're before
270 * the first element in the list.
271 */
272 prevdev = NULL;
273 for (;;) {
274 /*
275 * Get the interface after this one.
276 */
277 if (prevdev == NULL) {
278 /*
279 * The next element is the first element.
280 */
281 nextdev = *alldevs;
282 } else
283 nextdev = prevdev->next;
284
285 /*
286 * Are we at the end of the list?
287 */
288 if (nextdev == NULL) {
289 /*
290 * Yes - we have to put the new entry
291 * after "prevdev".
292 */
293 break;
294 }
295
296 /*
297 * Is the new interface a non-loopback interface
298 * and the next interface a loopback interface?
299 */
300 if (!(curdev->flags & PCAP_IF_LOOPBACK) &&
301 (nextdev->flags & PCAP_IF_LOOPBACK)) {
302 /*
303 * Yes, we should put the new entry
304 * before "nextdev", i.e. after "prevdev".
305 */
306 break;
307 }
308
309 /*
310 * Is the new interface's instance number less
311 * than the next interface's instance number,
312 * and is it the case that the new interface is a
313 * non-loopback interface or the next interface is
314 * a loopback interface?
315 *
316 * (The goal of both loopback tests is to make
317 * sure that we never put a loopback interface
318 * before any non-loopback interface and that we
319 * always put a non-loopback interface before all
320 * loopback interfaces.)
321 */
322 if (this_instance < get_instance(nextdev->name) &&
323 (!(curdev->flags & PCAP_IF_LOOPBACK) ||
324 (nextdev->flags & PCAP_IF_LOOPBACK))) {
325 /*
326 * Yes - we should put the new entry
327 * before "nextdev", i.e. after "prevdev".
328 */
329 break;
330 }
331
332 prevdev = nextdev;
333 }
334
335 /*
336 * Insert before "nextdev".
337 */
338 curdev->next = nextdev;
339
340 /*
341 * Insert after "prevdev" - unless "prevdev" is null,
342 * in which case this is the first interface.
343 */
344 if (prevdev == NULL) {
345 /*
346 * This is the first interface. Pass back a
347 * pointer to it, and put "curdev" before
348 * "nextdev".
349 */
350 *alldevs = curdev;
351 } else
352 prevdev->next = curdev;
353 }
354
355 *curdev_ret = curdev;
356 return (0);
357 }
358
359 /*
360 * XXX - on FreeBSDs that support it, should it get the sysctl named
361 * "dev.{adapter family name}.{adapter unit}.%desc" to get a description
362 * of the adapter? Note that "dev.an.0.%desc" is "Aironet PC4500/PC4800"
363 * with my Cisco 350 card, so the name isn't entirely descriptive. The
364 * "dev.an.0.%pnpinfo" has a better description, although one might argue
365 * that the problem is really a driver bug - if it can find out that it's
366 * a Cisco 340 or 350, rather than an old Aironet card, it should use
367 * that in the description.
368 *
369 * Do NetBSD, DragonflyBSD, or OpenBSD support this as well? OpenBSD
370 * lets you get a description, but it's not generated by the OS, it's
371 * set with another ioctl that ifconfig supports; we use that to get
372 * the description in OpenBSD.
373 *
374 * In OS X, the System Configuration framework can apparently return
375 * names in 10.4 and later; it also appears that freedesktop.org's HAL
376 * offers an "info.product" string, but the HAL specification says
377 * it "should not be used in any UI" and "subsystem/capability
378 * specific properties" should be used instead. Using that would
379 * require that libpcap applications be linked with the frameworks/
380 * libraries in question, which would be a bit of a pain unless we
381 * offer, for example, a pkg-config:
382 *
383 * http://pkg-config.freedesktop.org/wiki/
384 *
385 * script, so applications can just use that script to find out what
386 * libraries you need to link with when linking with libpcap.
387 * pkg-config is GPLed; I don't know whether that would prevent its
388 * use with a BSD-licensed library such as libpcap.
389 *
390 * Do any other UN*Xes, or desktop environments support getting a
391 * description?
392 */
393 int
394 add_addr_to_iflist(pcap_if_t **alldevs, const char *name, u_int flags,
395 struct sockaddr *addr, size_t addr_size,
396 struct sockaddr *netmask, size_t netmask_size,
397 struct sockaddr *broadaddr, size_t broadaddr_size,
398 struct sockaddr *dstaddr, size_t dstaddr_size,
399 char *errbuf)
400 {
401 pcap_if_t *curdev;
402 char *description = NULL;
403 pcap_addr_t *curaddr, *prevaddr, *nextaddr;
404 #ifdef SIOCGIFDESCR
405 int s;
406 struct ifreq ifrdesc;
407 #ifndef IFDESCRSIZE
408 #define _IFDESCRSIZE 64
409 char ifdescr[_IFDESCRSIZE];
410 #else /* IFDESCRSIZE */
411 char ifdescr[IFDESCRSIZE];
412 #endif /* IFDESCRSIZE */
413 #endif /* SIOCGIFDESCR */
414
415 #ifdef SIOCGIFDESCR
416 /*
417 * Get the description for the interface.
418 */
419 memset(&ifrdesc, 0, sizeof ifrdesc);
420 strlcpy(ifrdesc.ifr_name, name, sizeof ifrdesc.ifr_name);
421 #ifdef __FreeBSD__
422 ifrdesc.ifr_buffer.buffer = ifdescr;
423 ifrdesc.ifr_buffer.length = sizeof(ifdescr);
424 #else /* __FreeBSD__ */
425 ifrdesc.ifr_data = (caddr_t)ifdescr;
426 #endif /* __FreeBSD__ */
427 s = socket(AF_INET, SOCK_DGRAM, 0);
428 if (s >= 0) {
429 if (ioctl(s, SIOCGIFDESCR, &ifrdesc) == 0 &&
430 strlen(ifdescr) != 0)
431 description = ifdescr;
432 close(s);
433 }
434 #endif /* SIOCGIFDESCR */
435
436 if (add_or_find_if(&curdev, alldevs, name, flags, description,
437 errbuf) == -1) {
438 /*
439 * Error - give up.
440 */
441 return (-1);
442 }
443 if (curdev == NULL) {
444 /*
445 * Device wasn't added because it can't be opened.
446 * Not a fatal error.
447 */
448 return (0);
449 }
450
451 /*
452 * "curdev" is an entry for this interface; add an entry for this
453 * address to its list of addresses.
454 *
455 * Allocate the new entry and fill it in.
456 */
457 curaddr = malloc(sizeof(pcap_addr_t));
458 if (curaddr == NULL) {
459 (void)snprintf(errbuf, PCAP_ERRBUF_SIZE,
460 "malloc: %s", pcap_strerror(errno));
461 return (-1);
462 }
463
464 curaddr->next = NULL;
465 if (addr != NULL) {
466 curaddr->addr = dup_sockaddr(addr, addr_size);
467 if (curaddr->addr == NULL) {
468 (void)snprintf(errbuf, PCAP_ERRBUF_SIZE,
469 "malloc: %s", pcap_strerror(errno));
470 free(curaddr);
471 return (-1);
472 }
473 } else
474 curaddr->addr = NULL;
475
476 if (netmask != NULL) {
477 curaddr->netmask = dup_sockaddr(netmask, netmask_size);
478 if (curaddr->netmask == NULL) {
479 (void)snprintf(errbuf, PCAP_ERRBUF_SIZE,
480 "malloc: %s", pcap_strerror(errno));
481 if (curaddr->addr != NULL)
482 free(curaddr->addr);
483 free(curaddr);
484 return (-1);
485 }
486 } else
487 curaddr->netmask = NULL;
488
489 if (broadaddr != NULL) {
490 curaddr->broadaddr = dup_sockaddr(broadaddr, broadaddr_size);
491 if (curaddr->broadaddr == NULL) {
492 (void)snprintf(errbuf, PCAP_ERRBUF_SIZE,
493 "malloc: %s", pcap_strerror(errno));
494 if (curaddr->netmask != NULL)
495 free(curaddr->netmask);
496 if (curaddr->addr != NULL)
497 free(curaddr->addr);
498 free(curaddr);
499 return (-1);
500 }
501 } else
502 curaddr->broadaddr = NULL;
503
504 if (dstaddr != NULL) {
505 curaddr->dstaddr = dup_sockaddr(dstaddr, dstaddr_size);
506 if (curaddr->dstaddr == NULL) {
507 (void)snprintf(errbuf, PCAP_ERRBUF_SIZE,
508 "malloc: %s", pcap_strerror(errno));
509 if (curaddr->broadaddr != NULL)
510 free(curaddr->broadaddr);
511 if (curaddr->netmask != NULL)
512 free(curaddr->netmask);
513 if (curaddr->addr != NULL)
514 free(curaddr->addr);
515 free(curaddr);
516 return (-1);
517 }
518 } else
519 curaddr->dstaddr = NULL;
520
521 /*
522 * Find the end of the list of addresses.
523 */
524 for (prevaddr = curdev->addresses; prevaddr != NULL; prevaddr = nextaddr) {
525 nextaddr = prevaddr->next;
526 if (nextaddr == NULL) {
527 /*
528 * This is the end of the list.
529 */
530 break;
531 }
532 }
533
534 if (prevaddr == NULL) {
535 /*
536 * The list was empty; this is the first member.
537 */
538 curdev->addresses = curaddr;
539 } else {
540 /*
541 * "prevaddr" is the last member of the list; append
542 * this member to it.
543 */
544 prevaddr->next = curaddr;
545 }
546
547 return (0);
548 }
549
550 int
551 pcap_add_if(pcap_if_t **devlist, const char *name, u_int flags,
552 const char *description, char *errbuf)
553 {
554 pcap_if_t *curdev;
555
556 return (add_or_find_if(&curdev, devlist, name, flags, description,
557 errbuf));
558 }
559
560
561 /*
562 * Free a list of interfaces.
563 */
564 void
565 pcap_freealldevs(pcap_if_t *alldevs)
566 {
567 pcap_if_t *curdev, *nextdev;
568 pcap_addr_t *curaddr, *nextaddr;
569
570 for (curdev = alldevs; curdev != NULL; curdev = nextdev) {
571 nextdev = curdev->next;
572
573 /*
574 * Free all addresses.
575 */
576 for (curaddr = curdev->addresses; curaddr != NULL; curaddr = nextaddr) {
577 nextaddr = curaddr->next;
578 if (curaddr->addr)
579 free(curaddr->addr);
580 if (curaddr->netmask)
581 free(curaddr->netmask);
582 if (curaddr->broadaddr)
583 free(curaddr->broadaddr);
584 if (curaddr->dstaddr)
585 free(curaddr->dstaddr);
586 free(curaddr);
587 }
588
589 /*
590 * Free the name string.
591 */
592 free(curdev->name);
593
594 /*
595 * Free the description string, if any.
596 */
597 if (curdev->description != NULL)
598 free(curdev->description);
599
600 /*
601 * Free the interface.
602 */
603 free(curdev);
604 }
605 }
606
607 #if !defined(WIN32) && !defined(MSDOS)
608
609 /*
610 * Return the name of a network interface attached to the system, or NULL
611 * if none can be found. The interface must be configured up; the
612 * lowest unit number is preferred; loopback is ignored.
613 */
614 char *
615 pcap_lookupdev(errbuf)
616 register char *errbuf;
617 {
618 pcap_if_t *alldevs;
619 /* for old BSD systems, including bsdi3 */
620 #ifndef IF_NAMESIZE
621 #define IF_NAMESIZE IFNAMSIZ
622 #endif
623 static char device[IF_NAMESIZE + 1];
624 char *ret;
625
626 if (pcap_findalldevs(&alldevs, errbuf) == -1)
627 return (NULL);
628
629 if (alldevs == NULL || (alldevs->flags & PCAP_IF_LOOPBACK)) {
630 /*
631 * There are no devices on the list, or the first device
632 * on the list is a loopback device, which means there
633 * are no non-loopback devices on the list. This means
634 * we can't return any device.
635 *
636 * XXX - why not return a loopback device? If we can't
637 * capture on it, it won't be on the list, and if it's
638 * on the list, there aren't any non-loopback devices,
639 * so why not just supply it as the default device?
640 */
641 (void)strlcpy(errbuf, "no suitable device found",
642 PCAP_ERRBUF_SIZE);
643 ret = NULL;
644 } else {
645 /*
646 * Return the name of the first device on the list.
647 */
648 (void)strlcpy(device, alldevs->name, sizeof(device));
649 ret = device;
650 }
651
652 pcap_freealldevs(alldevs);
653 return (ret);
654 }
655
656 int
657 pcap_lookupnet(device, netp, maskp, errbuf)
658 register const char *device;
659 register bpf_u_int32 *netp, *maskp;
660 register char *errbuf;
661 {
662 register int fd;
663 register struct sockaddr_in *sin4;
664 struct ifreq ifr;
665
666 /*
667 * The pseudo-device "any" listens on all interfaces and therefore
668 * has the network address and -mask "0.0.0.0" therefore catching
669 * all traffic. Using NULL for the interface is the same as "any".
670 */
671 if (!device || strcmp(device, "any") == 0
672 #ifdef HAVE_DAG_API
673 || strstr(device, "dag") != NULL
674 #endif
675 #ifdef HAVE_SEPTEL_API
676 || strstr(device, "septel") != NULL
677 #endif
678 #ifdef PCAP_SUPPORT_BT
679 || strstr(device, "bluetooth") != NULL
680 #endif
681 #ifdef PCAP_SUPPORT_USB
682 || strstr(device, "usbmon") != NULL
683 #endif
684 #ifdef HAVE_SNF_API
685 || strstr(device, "snf") != NULL
686 #endif
687 ) {
688 *netp = *maskp = 0;
689 return 0;
690 }
691
692 fd = socket(AF_INET, SOCK_DGRAM, 0);
693 if (fd < 0) {
694 (void)snprintf(errbuf, PCAP_ERRBUF_SIZE, "socket: %s",
695 pcap_strerror(errno));
696 return (-1);
697 }
698 memset(&ifr, 0, sizeof(ifr));
699 #ifdef linux
700 /* XXX Work around Linux kernel bug */
701 ifr.ifr_addr.sa_family = AF_INET;
702 #endif
703 (void)strncpy(ifr.ifr_name, device, sizeof(ifr.ifr_name));
704 if (ioctl(fd, SIOCGIFADDR, (char *)&ifr) < 0) {
705 if (errno == EADDRNOTAVAIL) {
706 (void)snprintf(errbuf, PCAP_ERRBUF_SIZE,
707 "%s: no IPv4 address assigned", device);
708 } else {
709 (void)snprintf(errbuf, PCAP_ERRBUF_SIZE,
710 "SIOCGIFADDR: %s: %s",
711 device, pcap_strerror(errno));
712 }
713 (void)close(fd);
714 return (-1);
715 }
716 sin4 = (struct sockaddr_in *)&ifr.ifr_addr;
717 *netp = sin4->sin_addr.s_addr;
718 memset(&ifr, 0, sizeof(ifr));
719 #ifdef linux
720 /* XXX Work around Linux kernel bug */
721 ifr.ifr_addr.sa_family = AF_INET;
722 #endif
723 (void)strncpy(ifr.ifr_name, device, sizeof(ifr.ifr_name));
724 if (ioctl(fd, SIOCGIFNETMASK, (char *)&ifr) < 0) {
725 (void)snprintf(errbuf, PCAP_ERRBUF_SIZE,
726 "SIOCGIFNETMASK: %s: %s", device, pcap_strerror(errno));
727 (void)close(fd);
728 return (-1);
729 }
730 (void)close(fd);
731 *maskp = sin4->sin_addr.s_addr;
732 if (*maskp == 0) {
733 if (IN_CLASSA(*netp))
734 *maskp = IN_CLASSA_NET;
735 else if (IN_CLASSB(*netp))
736 *maskp = IN_CLASSB_NET;
737 else if (IN_CLASSC(*netp))
738 *maskp = IN_CLASSC_NET;
739 else {
740 (void)snprintf(errbuf, PCAP_ERRBUF_SIZE,
741 "inet class for 0x%x unknown", *netp);
742 return (-1);
743 }
744 }
745 *netp &= *maskp;
746 return (0);
747 }
748
749 #elif defined(WIN32)
750
751 /*
752 * Return the name of a network interface attached to the system, or NULL
753 * if none can be found. The interface must be configured up; the
754 * lowest unit number is preferred; loopback is ignored.
755 */
756 char *
757 pcap_lookupdev(errbuf)
758 register char *errbuf;
759 {
760 DWORD dwVersion;
761 DWORD dwWindowsMajorVersion;
762 dwVersion = GetVersion(); /* get the OS version */
763 dwWindowsMajorVersion = (DWORD)(LOBYTE(LOWORD(dwVersion)));
764
765 if (dwVersion >= 0x80000000 && dwWindowsMajorVersion >= 4) {
766 /*
767 * Windows 95, 98, ME.
768 */
769 ULONG NameLength = 8192;
770 static char AdaptersName[8192];
771
772 if (PacketGetAdapterNames(AdaptersName,&NameLength) )
773 return (AdaptersName);
774 else
775 return NULL;
776 } else {
777 /*
778 * Windows NT (NT 4.0, W2K, WXP). Convert the names to UNICODE for backward compatibility
779 */
780 ULONG NameLength = 8192;
781 static WCHAR AdaptersName[8192];
782 char *tAstr;
783 WCHAR *tUstr;
784 WCHAR *TAdaptersName = (WCHAR*)malloc(8192 * sizeof(WCHAR));
785 int NAdapts = 0;
786
787 if(TAdaptersName == NULL)
788 {
789 (void)snprintf(errbuf, PCAP_ERRBUF_SIZE, "memory allocation failure");
790 return NULL;
791 }
792
793 if ( !PacketGetAdapterNames((PTSTR)TAdaptersName,&NameLength) )
794 {
795 (void)snprintf(errbuf, PCAP_ERRBUF_SIZE,
796 "PacketGetAdapterNames: %s",
797 pcap_win32strerror());
798 free(TAdaptersName);
799 return NULL;
800 }
801
802
803 tAstr = (char*)TAdaptersName;
804 tUstr = (WCHAR*)AdaptersName;
805
806 /*
807 * Convert and copy the device names
808 */
809 while(sscanf(tAstr, "%S", tUstr) > 0)
810 {
811 tAstr += strlen(tAstr) + 1;
812 tUstr += wcslen(tUstr) + 1;
813 NAdapts ++;
814 }
815
816 tAstr++;
817 *tUstr = 0;
818 tUstr++;
819
820 /*
821 * Copy the descriptions
822 */
823 while(NAdapts--)
824 {
825 strcpy((char*)tUstr, tAstr);
826 (char*)tUstr += strlen(tAstr) + 1;;
827 tAstr += strlen(tAstr) + 1;
828 }
829
830 free(TAdaptersName);
831 return (char *)(AdaptersName);
832 }
833 }
834
835
836 int
837 pcap_lookupnet(device, netp, maskp, errbuf)
838 register const char *device;
839 register bpf_u_int32 *netp, *maskp;
840 register char *errbuf;
841 {
842 /*
843 * We need only the first IPv4 address, so we must scan the array returned by PacketGetNetInfo()
844 * in order to skip non IPv4 (i.e. IPv6 addresses)
845 */
846 npf_if_addr if_addrs[MAX_NETWORK_ADDRESSES];
847 LONG if_addr_size = 1;
848 struct sockaddr_in *t_addr;
849 unsigned int i;
850
851 if (!PacketGetNetInfoEx((void *)device, if_addrs, &if_addr_size)) {
852 *netp = *maskp = 0;
853 return (0);
854 }
855
856 for(i=0; i<MAX_NETWORK_ADDRESSES; i++)
857 {
858 if(if_addrs[i].IPAddress.ss_family == AF_INET)
859 {
860 t_addr = (struct sockaddr_in *) &(if_addrs[i].IPAddress);
861 *netp = t_addr->sin_addr.S_un.S_addr;
862 t_addr = (struct sockaddr_in *) &(if_addrs[i].SubnetMask);
863 *maskp = t_addr->sin_addr.S_un.S_addr;
864
865 *netp &= *maskp;
866 return (0);
867 }
868
869 }
870
871 *netp = *maskp = 0;
872 return (0);
873 }
874
875 #endif /* !WIN32 && !MSDOS */