2 * Copyright (c) 1993, 1994, 1995, 1996, 1997
3 * The Regents of the University of California. All rights reserved.
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that: (1) source code distributions
7 * retain the above copyright notice and this paragraph in its entirety, (2)
8 * distributions including binary code include the above copyright notice and
9 * this paragraph in its entirety in the documentation or other materials
10 * provided with the distribution, and (3) all advertising materials mentioning
11 * features or use of this software display the following acknowledgement:
12 * ``This product includes software developed by the University of California,
13 * Lawrence Berkeley Laboratory and its contributors.'' Neither the name of
14 * the University nor the names of its contributors may be used to endorse
15 * or promote products derived from this software without specific prior
17 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED
18 * WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF
19 * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
21 * sf-pcap.c - libpcap-file-format-specific code from savefile.c
22 * Extraction/creation by Jeffrey Mogul, DECWRL
23 * Modified by Steve McCanne, LBL.
25 * Used to save the received packet headers, after filtering, to
26 * a file, and then read them later.
27 * The first record in the file contains saved values for the machine
28 * dependent values so we can print the dump file on any architecture.
35 #include <pcap-types.h>
46 #include <limits.h> /* for INT_MAX */
50 #include "pcap-common.h"
52 #ifdef HAVE_OS_PROTO_H
59 * Setting O_BINARY on DOS/Windows is a bit tricky
62 #define SET_BINMODE(f) _setmode(_fileno(f), _O_BINARY)
64 #if defined(__HIGHC__)
65 #define SET_BINMODE(f) setmode(f, O_BINARY)
67 #define SET_BINMODE(f) setmode(fileno(f), O_BINARY)
72 * Standard libpcap format.
74 #define TCPDUMP_MAGIC 0xa1b2c3d4
77 * Alexey Kuznetzov's modified libpcap format.
79 #define KUZNETZOV_TCPDUMP_MAGIC 0xa1b2cd34
82 * Reserved for Francisco Mesquita <francisco.mesquita@radiomovel.pt>
83 * for another modified format.
85 #define FMESQUITA_TCPDUMP_MAGIC 0xa1b234cd
88 * Navtel Communcations' format, with nanosecond timestamps,
89 * as per a request from Dumas Hwang <dumas.hwang@navtelcom.com>.
91 #define NAVTEL_TCPDUMP_MAGIC 0xa12b3c4d
94 * Normal libpcap format, except for seconds/nanoseconds timestamps,
95 * as per a request by Ulf Lamping <ulf.lamping@web.de>
97 #define NSEC_TCPDUMP_MAGIC 0xa1b23c4d
100 * Mechanism for storing information about a capture in the upper
101 * 6 bits of a linktype value in a capture file.
103 * LT_LINKTYPE_EXT(x) extracts the additional information.
105 * The rest of the bits are for a value describing the link-layer
106 * value. LT_LINKTYPE(x) extracts that value.
108 #define LT_LINKTYPE(x) ((x) & 0x03FFFFFF)
109 #define LT_LINKTYPE_EXT(x) ((x) & 0xFC000000)
111 static int pcap_next_packet(pcap_t
*p
, struct pcap_pkthdr
*hdr
, u_char
**datap
);
114 * Private data for reading pcap savefiles.
126 } tstamp_scale_type_t
;
130 swapped_type_t lengths_swapped
;
131 tstamp_scale_type_t scale_type
;
135 * Check whether this is a pcap savefile and, if it is, extract the
136 * relevant information from the header.
139 pcap_check_header(bpf_u_int32 magic
, FILE *fp
, u_int precision
, char *errbuf
,
142 struct pcap_file_header hdr
;
149 * Assume no read errors.
154 * Check whether the first 4 bytes of the file are the magic
155 * number for a pcap savefile, or for a byte-swapped pcap
158 if (magic
!= TCPDUMP_MAGIC
&& magic
!= KUZNETZOV_TCPDUMP_MAGIC
&&
159 magic
!= NSEC_TCPDUMP_MAGIC
) {
160 magic
= SWAPLONG(magic
);
161 if (magic
!= TCPDUMP_MAGIC
&& magic
!= KUZNETZOV_TCPDUMP_MAGIC
&&
162 magic
!= NSEC_TCPDUMP_MAGIC
)
163 return (NULL
); /* nope */
168 * They are. Put the magic number in the header, and read
169 * the rest of the header.
172 amt_read
= fread(((char *)&hdr
) + sizeof hdr
.magic
, 1,
173 sizeof(hdr
) - sizeof(hdr
.magic
), fp
);
174 if (amt_read
!= sizeof(hdr
) - sizeof(hdr
.magic
)) {
176 pcap_fmt_errmsg_for_errno(errbuf
, PCAP_ERRBUF_SIZE
,
177 errno
, "error reading dump file");
179 pcap_snprintf(errbuf
, PCAP_ERRBUF_SIZE
,
180 "truncated dump file; tried to read %" PRIsize
" file header bytes, only got %" PRIsize
,
181 sizeof(hdr
), amt_read
);
188 * If it's a byte-swapped capture file, byte-swap the header.
191 hdr
.version_major
= SWAPSHORT(hdr
.version_major
);
192 hdr
.version_minor
= SWAPSHORT(hdr
.version_minor
);
193 hdr
.thiszone
= SWAPLONG(hdr
.thiszone
);
194 hdr
.sigfigs
= SWAPLONG(hdr
.sigfigs
);
195 hdr
.snaplen
= SWAPLONG(hdr
.snaplen
);
196 hdr
.linktype
= SWAPLONG(hdr
.linktype
);
199 if (hdr
.version_major
< PCAP_VERSION_MAJOR
) {
200 pcap_snprintf(errbuf
, PCAP_ERRBUF_SIZE
,
201 "archaic pcap savefile format");
207 * currently only versions 2.[0-4] are supported with
208 * the exception of 543.0 for DG/UX tcpdump.
210 if (! ((hdr
.version_major
== PCAP_VERSION_MAJOR
&&
211 hdr
.version_minor
<= PCAP_VERSION_MINOR
) ||
212 (hdr
.version_major
== 543 &&
213 hdr
.version_minor
== 0))) {
214 pcap_snprintf(errbuf
, PCAP_ERRBUF_SIZE
,
215 "unsupported pcap savefile version %u.%u",
216 hdr
.version_major
, hdr
.version_minor
);
222 * OK, this is a good pcap file.
223 * Allocate a pcap_t for it.
225 p
= pcap_open_offline_common(errbuf
, sizeof (struct pcap_sf
));
227 /* Allocation failed. */
231 p
->swapped
= swapped
;
232 p
->version_major
= hdr
.version_major
;
233 p
->version_minor
= hdr
.version_minor
;
234 p
->snapshot
= hdr
.snaplen
;
235 if (p
->snapshot
<= 0) {
237 * Bogus snapshot length; use the maximum for this
238 * link-layer type as a fallback.
240 * XXX - the only reason why snapshot is signed is
241 * that pcap_snapshot() returns an int, not an
244 p
->snapshot
= max_snaplen_for_dlt(hdr
.linktype
);
246 p
->linktype
= linktype_to_dlt(LT_LINKTYPE(hdr
.linktype
));
247 p
->linktype_ext
= LT_LINKTYPE_EXT(hdr
.linktype
);
249 p
->next_packet_op
= pcap_next_packet
;
253 p
->opt
.tstamp_precision
= precision
;
256 * Will we need to scale the timestamps to match what the
261 case PCAP_TSTAMP_PRECISION_MICRO
:
262 if (magic
== NSEC_TCPDUMP_MAGIC
) {
264 * The file has nanoseconds, the user
265 * wants microseconds; scale the
268 ps
->scale_type
= SCALE_DOWN
;
271 * The file has microseconds, the
272 * user wants microseconds; nothing to do.
274 ps
->scale_type
= PASS_THROUGH
;
278 case PCAP_TSTAMP_PRECISION_NANO
:
279 if (magic
== NSEC_TCPDUMP_MAGIC
) {
281 * The file has nanoseconds, the
282 * user wants nanoseconds; nothing to do.
284 ps
->scale_type
= PASS_THROUGH
;
287 * The file has microoseconds, the user
288 * wants nanoseconds; scale the
291 ps
->scale_type
= SCALE_UP
;
296 pcap_snprintf(errbuf
, PCAP_ERRBUF_SIZE
,
297 "unknown time stamp resolution %u", precision
);
304 * We interchanged the caplen and len fields at version 2.3,
305 * in order to match the bpf header layout. But unfortunately
306 * some files were written with version 2.3 in their headers
307 * but without the interchanged fields.
309 * In addition, DG/UX tcpdump writes out files with a version
310 * number of 543.0, and with the caplen and len fields in the
313 switch (hdr
.version_major
) {
316 if (hdr
.version_minor
< 3)
317 ps
->lengths_swapped
= SWAPPED
;
318 else if (hdr
.version_minor
== 3)
319 ps
->lengths_swapped
= MAYBE_SWAPPED
;
321 ps
->lengths_swapped
= NOT_SWAPPED
;
325 ps
->lengths_swapped
= SWAPPED
;
329 ps
->lengths_swapped
= NOT_SWAPPED
;
333 if (magic
== KUZNETZOV_TCPDUMP_MAGIC
) {
335 * XXX - the patch that's in some versions of libpcap
336 * changes the packet header but not the magic number,
337 * and some other versions with this magic number have
338 * some extra debugging information in the packet header;
339 * we'd have to use some hacks^H^H^H^H^Hheuristics to
340 * detect those variants.
342 * Ethereal does that, but it does so by trying to read
343 * the first two packets of the file with each of the
344 * record header formats. That currently means it seeks
345 * backwards and retries the reads, which doesn't work
346 * on pipes. We want to be able to read from a pipe, so
347 * that strategy won't work; we'd have to buffer some
348 * data ourselves and read from that buffer in order to
351 ps
->hdrsize
= sizeof(struct pcap_sf_patched_pkthdr
);
353 if (p
->linktype
== DLT_EN10MB
) {
355 * This capture might have been done in raw mode
358 * If it was done in cooked mode, p->snapshot was
359 * passed to recvfrom() as the buffer size, meaning
360 * that the most packet data that would be copied
361 * would be p->snapshot. However, a faked Ethernet
362 * header would then have been added to it, so the
363 * most data that would be in a packet in the file
364 * would be p->snapshot + 14.
366 * We can't easily tell whether the capture was done
367 * in raw mode or cooked mode, so we'll assume it was
368 * cooked mode, and add 14 to the snapshot length.
369 * That means that, for a raw capture, the snapshot
370 * length will be misleading if you use it to figure
371 * out why a capture doesn't have all the packet data,
372 * but there's not much we can do to avoid that.
374 * But don't grow the snapshot length past the
375 * maximum value of an int.
377 if (p
->snapshot
<= INT_MAX
- 14)
380 p
->snapshot
= INT_MAX
;
383 ps
->hdrsize
= sizeof(struct pcap_sf_pkthdr
);
386 * Allocate a buffer for the packet data.
387 * Choose the minimum of the file's snapshot length and 2K bytes;
388 * that should be enough for most network packets - we'll grow it
389 * if necessary. That way, we don't allocate a huge chunk of
390 * memory just because there's a huge snapshot length, as the
391 * snapshot length might be larger than the size of the largest
394 p
->bufsize
= p
->snapshot
;
395 if (p
->bufsize
> 2048)
397 p
->buffer
= malloc(p
->bufsize
);
398 if (p
->buffer
== NULL
) {
399 pcap_snprintf(errbuf
, PCAP_ERRBUF_SIZE
, "out of memory");
405 p
->cleanup_op
= sf_cleanup
;
411 * Grow the packet buffer to the specified size.
414 grow_buffer(pcap_t
*p
, u_int bufsize
)
418 bigger_buffer
= realloc(p
->buffer
, bufsize
);
419 if (bigger_buffer
== NULL
) {
420 pcap_snprintf(p
->errbuf
, PCAP_ERRBUF_SIZE
, "out of memory");
423 p
->buffer
= bigger_buffer
;
424 p
->bufsize
= bufsize
;
429 * Read and return the next packet from the savefile. Return the header
430 * in hdr and a pointer to the contents in data. Return 0 on success, 1
431 * if there were no more packets, and -1 on an error.
434 pcap_next_packet(pcap_t
*p
, struct pcap_pkthdr
*hdr
, u_char
**data
)
436 struct pcap_sf
*ps
= p
->priv
;
437 struct pcap_sf_patched_pkthdr sf_hdr
;
443 * Read the packet header; the structure we use as a buffer
444 * is the longer structure for files generated by the patched
445 * libpcap, but if the file has the magic number for an
446 * unpatched libpcap we only read as many bytes as the regular
449 amt_read
= fread(&sf_hdr
, 1, ps
->hdrsize
, fp
);
450 if (amt_read
!= ps
->hdrsize
) {
452 pcap_fmt_errmsg_for_errno(p
->errbuf
, PCAP_ERRBUF_SIZE
,
453 errno
, "error reading dump file");
457 pcap_snprintf(p
->errbuf
, PCAP_ERRBUF_SIZE
,
458 "truncated dump file; tried to read %" PRIsize
" header bytes, only got %" PRIsize
,
459 ps
->hdrsize
, amt_read
);
468 /* these were written in opposite byte order */
469 hdr
->caplen
= SWAPLONG(sf_hdr
.caplen
);
470 hdr
->len
= SWAPLONG(sf_hdr
.len
);
471 hdr
->ts
.tv_sec
= SWAPLONG(sf_hdr
.ts
.tv_sec
);
472 hdr
->ts
.tv_usec
= SWAPLONG(sf_hdr
.ts
.tv_usec
);
474 hdr
->caplen
= sf_hdr
.caplen
;
475 hdr
->len
= sf_hdr
.len
;
476 hdr
->ts
.tv_sec
= sf_hdr
.ts
.tv_sec
;
477 hdr
->ts
.tv_usec
= sf_hdr
.ts
.tv_usec
;
480 switch (ps
->scale_type
) {
484 * Just pass the time stamp through.
490 * File has microseconds, user wants nanoseconds; convert
493 hdr
->ts
.tv_usec
= hdr
->ts
.tv_usec
* 1000;
498 * File has nanoseconds, user wants microseconds; convert
501 hdr
->ts
.tv_usec
= hdr
->ts
.tv_usec
/ 1000;
505 /* Swap the caplen and len fields, if necessary. */
506 switch (ps
->lengths_swapped
) {
512 if (hdr
->caplen
<= hdr
->len
) {
514 * The captured length is <= the actual length,
515 * so presumably they weren't swapped.
523 hdr
->caplen
= hdr
->len
;
529 * Is the packet bigger than we consider sane?
531 if (hdr
->caplen
> max_snaplen_for_dlt(p
->linktype
)) {
533 * Yes. This may be a damaged or fuzzed file.
535 * Is it bigger than the snapshot length?
536 * (We don't treat that as an error if it's not
537 * bigger than the maximum we consider sane; see
540 if (hdr
->caplen
> (bpf_u_int32
)p
->snapshot
) {
541 pcap_snprintf(p
->errbuf
, PCAP_ERRBUF_SIZE
,
542 "invalid packet capture length %u, bigger than "
543 "snaplen of %d", hdr
->caplen
, p
->snapshot
);
545 pcap_snprintf(p
->errbuf
, PCAP_ERRBUF_SIZE
,
546 "invalid packet capture length %u, bigger than "
547 "maximum of %u", hdr
->caplen
,
548 max_snaplen_for_dlt(p
->linktype
));
553 if (hdr
->caplen
> (bpf_u_int32
)p
->snapshot
) {
555 * The packet is bigger than the snapshot length
558 * This can happen due to Solaris 2.3 systems tripping
559 * over the BUFMOD problem and not setting the snapshot
560 * length correctly in the savefile header.
562 * libpcap 0.4 and later on Solaris 2.3 should set the
563 * snapshot length correctly in the pcap file header,
564 * even though they don't set a snapshot length in bufmod
565 * (the buggy bufmod chops off the *beginning* of the
566 * packet if a snapshot length is specified); they should
567 * also reduce the captured length, as supplied to the
568 * per-packet callback, to the snapshot length if it's
569 * greater than the snapshot length, so the code using
570 * libpcap should see the packet cut off at the snapshot
571 * length, even though the full packet is copied up to
574 * However, perhaps some versions of libpcap failed to
575 * set the snapshot length currectly in the file header
576 * or the per-packet header, or perhaps this is a
577 * corrupted safefile or a savefile built/modified by a
578 * fuzz tester, so we check anyway. We grow the buffer
579 * to be big enough for the snapshot length, read up
580 * to the snapshot length, discard the rest of the
581 * packet, and report the snapshot length as the captured
582 * length; we don't want to hand our caller a packet
583 * bigger than the snapshot length, because they might
584 * be assuming they'll never be handed such a packet,
585 * and might copy the packet into a snapshot-length-
586 * sized buffer, assuming it'll fit.
588 size_t bytes_to_discard
;
589 size_t bytes_to_read
, bytes_read
;
590 char discard_buf
[4096];
592 if (hdr
->caplen
> p
->bufsize
) {
594 * Grow the buffer to the snapshot length.
596 if (!grow_buffer(p
, p
->snapshot
))
601 * Read the first p->snapshot bytes into the buffer.
603 amt_read
= fread(p
->buffer
, 1, p
->snapshot
, fp
);
604 if (amt_read
!= (bpf_u_int32
)p
->snapshot
) {
606 pcap_fmt_errmsg_for_errno(p
->errbuf
,
607 PCAP_ERRBUF_SIZE
, errno
,
608 "error reading dump file");
611 * Yes, this uses hdr->caplen; technically,
612 * it's true, because we would try to read
613 * and discard the rest of those bytes, and
614 * that would fail because we got EOF before
617 pcap_snprintf(p
->errbuf
, PCAP_ERRBUF_SIZE
,
618 "truncated dump file; tried to read %u captured bytes, only got %" PRIsize
,
619 p
->snapshot
, amt_read
);
625 * Now read and discard what's left.
627 bytes_to_discard
= hdr
->caplen
- p
->snapshot
;
628 bytes_read
= amt_read
;
629 while (bytes_to_discard
!= 0) {
630 bytes_to_read
= bytes_to_discard
;
631 if (bytes_to_read
> sizeof (discard_buf
))
632 bytes_to_read
= sizeof (discard_buf
);
633 amt_read
= fread(discard_buf
, 1, bytes_to_read
, fp
);
634 bytes_read
+= amt_read
;
635 if (amt_read
!= bytes_to_read
) {
637 pcap_fmt_errmsg_for_errno(p
->errbuf
,
638 PCAP_ERRBUF_SIZE
, errno
,
639 "error reading dump file");
641 pcap_snprintf(p
->errbuf
, PCAP_ERRBUF_SIZE
,
642 "truncated dump file; tried to read %u captured bytes, only got %" PRIsize
,
643 hdr
->caplen
, bytes_read
);
647 bytes_to_discard
-= amt_read
;
651 * Adjust caplen accordingly, so we don't get confused later
652 * as to how many bytes we have to play with.
654 hdr
->caplen
= p
->snapshot
;
657 * The packet is within the snapshot length for this file.
659 if (hdr
->caplen
> p
->bufsize
) {
661 * Grow the buffer to the next power of 2, or
662 * the snaplen, whichever is lower.
666 new_bufsize
= hdr
->caplen
;
668 * http://graphics.stanford.edu/~seander/bithacks.html#RoundUpPowerOf2
671 new_bufsize
|= new_bufsize
>> 1;
672 new_bufsize
|= new_bufsize
>> 2;
673 new_bufsize
|= new_bufsize
>> 4;
674 new_bufsize
|= new_bufsize
>> 8;
675 new_bufsize
|= new_bufsize
>> 16;
678 if (new_bufsize
> (u_int
)p
->snapshot
)
679 new_bufsize
= p
->snapshot
;
681 if (!grow_buffer(p
, new_bufsize
))
685 /* read the packet itself */
686 amt_read
= fread(p
->buffer
, 1, hdr
->caplen
, fp
);
687 if (amt_read
!= hdr
->caplen
) {
689 pcap_fmt_errmsg_for_errno(p
->errbuf
,
690 PCAP_ERRBUF_SIZE
, errno
,
691 "error reading dump file");
693 pcap_snprintf(p
->errbuf
, PCAP_ERRBUF_SIZE
,
694 "truncated dump file; tried to read %u captured bytes, only got %" PRIsize
,
695 hdr
->caplen
, amt_read
);
703 swap_pseudo_headers(p
->linktype
, hdr
, *data
);
709 sf_write_header(pcap_t
*p
, FILE *fp
, int linktype
, int snaplen
)
711 struct pcap_file_header hdr
;
713 hdr
.magic
= p
->opt
.tstamp_precision
== PCAP_TSTAMP_PRECISION_NANO
? NSEC_TCPDUMP_MAGIC
: TCPDUMP_MAGIC
;
714 hdr
.version_major
= PCAP_VERSION_MAJOR
;
715 hdr
.version_minor
= PCAP_VERSION_MINOR
;
718 * https://www.tcpdump.org/manpages/pcap-savefile.5.txt states:
719 * thiszone: 4-byte time zone offset; this is always 0.
720 * sigfigs: 4-byte number giving the accuracy of time stamps
721 * in the file; this is always 0.
725 hdr
.snaplen
= snaplen
;
726 hdr
.linktype
= linktype
;
728 if (fwrite((char *)&hdr
, sizeof(hdr
), 1, fp
) != 1)
735 * Output a packet to the initialized dump file.
738 pcap_dump(u_char
*user
, const struct pcap_pkthdr
*h
, const u_char
*sp
)
741 struct pcap_sf_pkthdr sf_hdr
;
745 * Better not try writing pcap files after
746 * 2038-01-19 03:14:07 UTC; switch to pcapng.
748 sf_hdr
.ts
.tv_sec
= (bpf_int32
)h
->ts
.tv_sec
;
749 sf_hdr
.ts
.tv_usec
= (bpf_int32
)h
->ts
.tv_usec
;
750 sf_hdr
.caplen
= h
->caplen
;
752 /* XXX we should check the return status */
753 (void)fwrite(&sf_hdr
, sizeof(sf_hdr
), 1, f
);
754 (void)fwrite(sp
, h
->caplen
, 1, f
);
757 static pcap_dumper_t
*
758 pcap_setup_dump(pcap_t
*p
, int linktype
, FILE *f
, const char *fname
)
761 #if defined(_WIN32) || defined(MSDOS)
763 * If we're writing to the standard output, put it in binary
764 * mode, as savefiles are binary files.
766 * Otherwise, we turn off buffering.
767 * XXX - why? And why not on the standard output?
772 setvbuf(f
, NULL
, _IONBF
, 0);
774 if (sf_write_header(p
, f
, linktype
, p
->snapshot
) == -1) {
775 pcap_fmt_errmsg_for_errno(p
->errbuf
, PCAP_ERRBUF_SIZE
,
776 errno
, "Can't write to %s", fname
);
781 return ((pcap_dumper_t
*)f
);
785 * Initialize so that sf_write() will output to the file named 'fname'.
788 pcap_dump_open(pcap_t
*p
, const char *fname
)
794 * If this pcap_t hasn't been activated, it doesn't have a
795 * link-layer type, so we can't use it.
798 pcap_snprintf(p
->errbuf
, PCAP_ERRBUF_SIZE
,
799 "%s: not-yet-activated pcap_t passed to pcap_dump_open",
803 linktype
= dlt_to_linktype(p
->linktype
);
804 if (linktype
== -1) {
805 pcap_snprintf(p
->errbuf
, PCAP_ERRBUF_SIZE
,
806 "%s: link-layer type %d isn't supported in savefiles",
810 linktype
|= p
->linktype_ext
;
813 pcap_snprintf(p
->errbuf
, PCAP_ERRBUF_SIZE
,
814 "A null pointer was supplied as the file name");
817 if (fname
[0] == '-' && fname
[1] == '\0') {
819 fname
= "standard output";
822 * "b" is supported as of C90, so *all* UN*Xes should
823 * support it, even though it does nothing. It's
824 * required on Windows, as the file is a binary file
825 * and must be written in binary mode.
827 f
= fopen(fname
, "wb");
829 pcap_fmt_errmsg_for_errno(p
->errbuf
, PCAP_ERRBUF_SIZE
,
834 return (pcap_setup_dump(p
, linktype
, f
, fname
));
838 * Initialize so that sf_write() will output to the given stream.
841 pcap_dump_fopen(pcap_t
*p
, FILE *f
)
845 linktype
= dlt_to_linktype(p
->linktype
);
846 if (linktype
== -1) {
847 pcap_snprintf(p
->errbuf
, PCAP_ERRBUF_SIZE
,
848 "stream: link-layer type %d isn't supported in savefiles",
852 linktype
|= p
->linktype_ext
;
854 return (pcap_setup_dump(p
, linktype
, f
, "stream"));
858 pcap_dump_open_append(pcap_t
*p
, const char *fname
)
863 struct pcap_file_header ph
;
865 linktype
= dlt_to_linktype(p
->linktype
);
866 if (linktype
== -1) {
867 pcap_snprintf(p
->errbuf
, PCAP_ERRBUF_SIZE
,
868 "%s: link-layer type %d isn't supported in savefiles",
874 pcap_snprintf(p
->errbuf
, PCAP_ERRBUF_SIZE
,
875 "A null pointer was supplied as the file name");
878 if (fname
[0] == '-' && fname
[1] == '\0')
879 return (pcap_setup_dump(p
, linktype
, stdout
, "standard output"));
882 * "b" is supported as of C90, so *all* UN*Xes should support it,
883 * even though it does nothing. It's required on Windows, as the
884 * file is a binary file and must be read in binary mode.
886 f
= fopen(fname
, "rb+");
888 pcap_fmt_errmsg_for_errno(p
->errbuf
, PCAP_ERRBUF_SIZE
,
894 * Try to read a pcap header.
896 amt_read
= fread(&ph
, 1, sizeof (ph
), f
);
897 if (amt_read
!= sizeof (ph
)) {
899 pcap_fmt_errmsg_for_errno(p
->errbuf
, PCAP_ERRBUF_SIZE
,
903 } else if (feof(f
) && amt_read
> 0) {
904 pcap_snprintf(p
->errbuf
, PCAP_ERRBUF_SIZE
,
905 "%s: truncated pcap file header", fname
);
911 #if defined(_WIN32) || defined(MSDOS)
913 * We turn off buffering.
914 * XXX - why? And why not on the standard output?
916 setvbuf(f
, NULL
, _IONBF
, 0);
920 * If a header is already present and:
922 * it's not for a pcap file of the appropriate resolution
923 * and the right byte order for this machine;
925 * the link-layer header types don't match;
927 * the snapshot lengths don't match;
933 * A header is already present.
939 if (p
->opt
.tstamp_precision
!= PCAP_TSTAMP_PRECISION_MICRO
) {
940 pcap_snprintf(p
->errbuf
, PCAP_ERRBUF_SIZE
,
941 "%s: different time stamp precision, cannot append to file", fname
);
947 case NSEC_TCPDUMP_MAGIC
:
948 if (p
->opt
.tstamp_precision
!= PCAP_TSTAMP_PRECISION_NANO
) {
949 pcap_snprintf(p
->errbuf
, PCAP_ERRBUF_SIZE
,
950 "%s: different time stamp precision, cannot append to file", fname
);
956 case SWAPLONG(TCPDUMP_MAGIC
):
957 case SWAPLONG(NSEC_TCPDUMP_MAGIC
):
958 pcap_snprintf(p
->errbuf
, PCAP_ERRBUF_SIZE
,
959 "%s: different byte order, cannot append to file", fname
);
963 case KUZNETZOV_TCPDUMP_MAGIC
:
964 case SWAPLONG(KUZNETZOV_TCPDUMP_MAGIC
):
965 case NAVTEL_TCPDUMP_MAGIC
:
966 case SWAPLONG(NAVTEL_TCPDUMP_MAGIC
):
967 pcap_snprintf(p
->errbuf
, PCAP_ERRBUF_SIZE
,
968 "%s: not a pcap file to which we can append", fname
);
973 pcap_snprintf(p
->errbuf
, PCAP_ERRBUF_SIZE
,
974 "%s: not a pcap file", fname
);
982 if (ph
.version_major
!= PCAP_VERSION_MAJOR
||
983 ph
.version_minor
!= PCAP_VERSION_MINOR
) {
984 pcap_snprintf(p
->errbuf
, PCAP_ERRBUF_SIZE
,
985 "%s: version is %u.%u, cannot append to file", fname
,
986 ph
.version_major
, ph
.version_minor
);
990 if ((bpf_u_int32
)linktype
!= ph
.linktype
) {
991 pcap_snprintf(p
->errbuf
, PCAP_ERRBUF_SIZE
,
992 "%s: different linktype, cannot append to file", fname
);
996 if ((bpf_u_int32
)p
->snapshot
!= ph
.snaplen
) {
997 pcap_snprintf(p
->errbuf
, PCAP_ERRBUF_SIZE
,
998 "%s: different snaplen, cannot append to file", fname
);
1004 * A header isn't present; attempt to write it.
1006 if (sf_write_header(p
, f
, linktype
, p
->snapshot
) == -1) {
1007 pcap_fmt_errmsg_for_errno(p
->errbuf
, PCAP_ERRBUF_SIZE
,
1008 errno
, "Can't write to %s", fname
);
1015 * Start writing at the end of the file.
1017 if (fseek(f
, 0, SEEK_END
) == -1) {
1018 pcap_fmt_errmsg_for_errno(p
->errbuf
, PCAP_ERRBUF_SIZE
,
1019 errno
, "Can't seek to end of %s", fname
);
1023 return ((pcap_dumper_t
*)f
);
1027 pcap_dump_file(pcap_dumper_t
*p
)
1033 pcap_dump_ftell(pcap_dumper_t
*p
)
1035 return (ftell((FILE *)p
));
1038 #if defined(HAVE_FSEEKO)
1040 * We have fseeko(), so we have ftello().
1041 * If we have large file support (files larger than 2^31-1 bytes),
1042 * ftello() will give us a current file position with more than 32
1046 pcap_dump_ftell64(pcap_dumper_t
*p
)
1048 return (ftello((FILE *)p
));
1050 #elif defined(_MSC_VER)
1052 * We have Visual Studio; we support only 2005 and later, so we have
1056 pcap_dump_ftell64(pcap_dumper_t
*p
)
1058 return (_ftelli64((FILE *)p
));
1062 * We don't have ftello() or _ftelli64(), so fall back on ftell().
1063 * Either long is 64 bits, in which case ftell() should suffice,
1064 * or this is probably an older 32-bit UN*X without large file
1065 * support, which means you'll probably get errors trying to
1066 * write files > 2^31-1, so it won't matter anyway.
1068 * XXX - what about MinGW?
1071 pcap_dump_ftell64(pcap_dumper_t
*p
)
1073 return (ftell((FILE *)p
));
1078 pcap_dump_flush(pcap_dumper_t
*p
)
1081 if (fflush((FILE *)p
) == EOF
)
1088 pcap_dump_close(pcap_dumper_t
*p
)
1092 if (ferror((FILE *)p
))
1094 /* XXX should check return from fclose() too */
1096 (void)fclose((FILE *)p
);