]> The Tcpdump Group git mirrors - libpcap/blob - inet.c
updates to CHANGES for libpcap 1.7
[libpcap] / inet.c
1 /* -*- Mode: c; tab-width: 8; indent-tabs-mode: 1; c-basic-offset: 8; -*- */
2 /*
3 * Copyright (c) 1994, 1995, 1996, 1997, 1998
4 * The Regents of the University of California. All rights reserved.
5 *
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions
8 * are met:
9 * 1. Redistributions of source code must retain the above copyright
10 * notice, this list of conditions and the following disclaimer.
11 * 2. Redistributions in binary form must reproduce the above copyright
12 * notice, this list of conditions and the following disclaimer in the
13 * documentation and/or other materials provided with the distribution.
14 * 3. All advertising materials mentioning features or use of this software
15 * must display the following acknowledgement:
16 * This product includes software developed by the Computer Systems
17 * Engineering Group at Lawrence Berkeley Laboratory.
18 * 4. Neither the name of the University nor of the Laboratory may be used
19 * to endorse or promote products derived from this software without
20 * specific prior written permission.
21 *
22 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
23 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
24 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
25 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
26 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
27 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
28 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
29 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
30 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
31 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
32 * SUCH DAMAGE.
33 */
34
35 #ifdef HAVE_CONFIG_H
36 #include "config.h"
37 #endif
38
39 #ifdef WIN32
40 #include <pcap-stdinc.h>
41 #else /* WIN32 */
42
43 #include <sys/param.h>
44 #ifndef MSDOS
45 #include <sys/file.h>
46 #endif
47 #include <sys/ioctl.h>
48 #include <sys/socket.h>
49 #ifdef HAVE_SYS_SOCKIO_H
50 #include <sys/sockio.h>
51 #endif
52
53 struct mbuf; /* Squelch compiler warnings on some platforms for */
54 struct rtentry; /* declarations in <net/if.h> */
55 #include <net/if.h>
56 #include <netinet/in.h>
57 #endif /* WIN32 */
58
59 #include <ctype.h>
60 #include <errno.h>
61 #include <memory.h>
62 #include <stdio.h>
63 #include <stdlib.h>
64 #include <string.h>
65 #if !defined(WIN32) && !defined(__BORLANDC__)
66 #include <unistd.h>
67 #endif /* !WIN32 && !__BORLANDC__ */
68 #ifdef HAVE_LIMITS_H
69 #include <limits.h>
70 #else
71 #define INT_MAX 2147483647
72 #endif
73
74 #include "pcap-int.h"
75
76 #ifdef HAVE_OS_PROTO_H
77 #include "os-proto.h"
78 #endif
79
80 /* Not all systems have IFF_LOOPBACK */
81 #ifdef IFF_LOOPBACK
82 #define ISLOOPBACK(name, flags) ((flags) & IFF_LOOPBACK)
83 #else
84 #define ISLOOPBACK(name, flags) ((name)[0] == 'l' && (name)[1] == 'o' && \
85 (isdigit((unsigned char)((name)[2])) || (name)[2] == '\0'))
86 #endif
87
88 #ifdef IFF_UP
89 #define ISUP(flags) ((flags) & IFF_UP)
90 #else
91 #define ISUP(flags) 0
92 #endif
93
94 #ifdef IFF_RUNNING
95 #define ISRUNNING(flags) ((flags) & IFF_RUNNING)
96 #else
97 #define ISRUNNING(flags) 0
98 #endif
99
100 struct sockaddr *
101 dup_sockaddr(struct sockaddr *sa, size_t sa_length)
102 {
103 struct sockaddr *newsa;
104
105 if ((newsa = malloc(sa_length)) == NULL)
106 return (NULL);
107 return (memcpy(newsa, sa, sa_length));
108 }
109
110 /*
111 * Construct a "figure of merit" for an interface, for use when sorting
112 * the list of interfaces, in which interfaces that are up are superior
113 * to interfaces that aren't up, interfaces that are up and running are
114 * superior to interfaces that are up but not running, and non-loopback
115 * interfaces that are up and running are superior to loopback interfaces,
116 * and interfaces with the same flags have a figure of merit that's higher
117 * the lower the instance number.
118 *
119 * The goal is to try to put the interfaces most likely to be useful for
120 * capture at the beginning of the list.
121 *
122 * The figure of merit, which is lower the "better" the interface is,
123 * has the uppermost bit set if the interface isn't running, the bit
124 * below that set if the interface isn't up, the bit below that set
125 * if the interface is a loopback interface, and the interface index
126 * in the 29 bits below that. (Yes, we assume u_int is 32 bits.)
127 */
128 static u_int
129 get_figure_of_merit(pcap_if_t *dev)
130 {
131 const char *cp;
132 u_int n;
133
134 if (strcmp(dev->name, "any") == 0) {
135 /*
136 * Give the "any" device an artificially high instance
137 * number, so it shows up after all other non-loopback
138 * interfaces.
139 */
140 n = 0x1FFFFFFF; /* 29 all-1 bits */
141 } else {
142 /*
143 * A number at the end of the device name string is
144 * assumed to be a unit number.
145 */
146 cp = dev->name + strlen(dev->name) - 1;
147 while (cp-1 >= dev->name && *(cp-1) >= '0' && *(cp-1) <= '9')
148 cp--;
149 if (*cp >= '0' && *cp <= '9')
150 n = atoi(cp);
151 else
152 n = 0;
153 }
154 if (!(dev->flags & PCAP_IF_RUNNING))
155 n |= 0x80000000;
156 if (!(dev->flags & PCAP_IF_UP))
157 n |= 0x40000000;
158 if (dev->flags & PCAP_IF_LOOPBACK)
159 n |= 0x20000000;
160 return (n);
161 }
162
163 /*
164 * Look for a given device in the specified list of devices.
165 *
166 * If we find it, return 0 and set *curdev_ret to point to it.
167 *
168 * If we don't find it, check whether we can open it:
169 *
170 * If that fails with PCAP_ERROR_NO_SUCH_DEVICE or
171 * PCAP_ERROR_IFACE_NOT_UP, don't attempt to add an entry for
172 * it, as that probably means it exists but doesn't support
173 * packet capture.
174 *
175 * Otherwise, attempt to add an entry for it, with the specified
176 * ifnet flags and description, and, if that succeeds, return 0
177 * and set *curdev_ret to point to the new entry, otherwise
178 * return PCAP_ERROR and set errbuf to an error message.
179 */
180 int
181 add_or_find_if(pcap_if_t **curdev_ret, pcap_if_t **alldevs, const char *name,
182 u_int flags, const char *description, char *errbuf)
183 {
184 pcap_t *p;
185 pcap_if_t *curdev, *prevdev, *nextdev;
186 u_int this_figure_of_merit, nextdev_figure_of_merit;
187 char open_errbuf[PCAP_ERRBUF_SIZE];
188 int ret;
189
190 /*
191 * Is there already an entry in the list for this interface?
192 */
193 for (curdev = *alldevs; curdev != NULL; curdev = curdev->next) {
194 if (strcmp(name, curdev->name) == 0)
195 break; /* yes, we found it */
196 }
197
198 if (curdev == NULL) {
199 /*
200 * No, we didn't find it.
201 *
202 * Can we open this interface for live capture?
203 *
204 * We do this check so that interfaces that are
205 * supplied by the interface enumeration mechanism
206 * we're using but that don't support packet capture
207 * aren't included in the list. Loopback interfaces
208 * on Solaris are an example of this; we don't just
209 * omit loopback interfaces on all platforms because
210 * you *can* capture on loopback interfaces on some
211 * OSes.
212 *
213 * On OS X, we don't do this check if the device
214 * name begins with "wlt"; at least some versions
215 * of OS X offer monitor mode capturing by having
216 * a separate "monitor mode" device for each wireless
217 * adapter, rather than by implementing the ioctls
218 * that {Free,Net,Open,DragonFly}BSD provide.
219 * Opening that device puts the adapter into monitor
220 * mode, which, at least for some adapters, causes
221 * them to deassociate from the network with which
222 * they're associated.
223 *
224 * Instead, we try to open the corresponding "en"
225 * device (so that we don't end up with, for users
226 * without sufficient privilege to open capture
227 * devices, a list of adapters that only includes
228 * the wlt devices).
229 */
230 #ifdef __APPLE__
231 if (strncmp(name, "wlt", 3) == 0) {
232 char *en_name;
233 size_t en_name_len;
234
235 /*
236 * Try to allocate a buffer for the "en"
237 * device's name.
238 */
239 en_name_len = strlen(name) - 1;
240 en_name = malloc(en_name_len + 1);
241 if (en_name == NULL) {
242 (void)snprintf(errbuf, PCAP_ERRBUF_SIZE,
243 "malloc: %s", pcap_strerror(errno));
244 return (-1);
245 }
246 strcpy(en_name, "en");
247 strcat(en_name, name + 3);
248 p = pcap_create(en_name, open_errbuf);
249 free(en_name);
250 } else
251 #endif /* __APPLE */
252 p = pcap_create(name, open_errbuf);
253 if (p == NULL) {
254 /*
255 * The attempt to create the pcap_t failed;
256 * that's probably an indication that we're
257 * out of memory.
258 *
259 * Don't bother including this interface,
260 * but don't treat it as an error.
261 */
262 *curdev_ret = NULL;
263 return (0);
264 }
265 /* Small snaplen, so we don't try to allocate much memory. */
266 pcap_set_snaplen(p, 68);
267 ret = pcap_activate(p);
268 pcap_close(p);
269 switch (ret) {
270
271 case PCAP_ERROR_NO_SUCH_DEVICE:
272 case PCAP_ERROR_IFACE_NOT_UP:
273 /*
274 * We expect these two errors - they're the
275 * reason we try to open the device.
276 *
277 * PCAP_ERROR_NO_SUCH_DEVICE typically means
278 * "there's no such device *known to the
279 * OS's capture mechanism*", so, even though
280 * it might be a valid network interface, you
281 * can't capture on it (e.g., the loopback
282 * device in Solaris up to Solaris 10, or
283 * the vmnet devices in OS X with VMware
284 * Fusion). We don't include those devices
285 * in our list of devices, as there's no
286 * point in doing so - they're not available
287 * for capture.
288 *
289 * PCAP_ERROR_IFACE_NOT_UP means that the
290 * OS's capture mechanism doesn't work on
291 * interfaces not marked as up; some capture
292 * mechanisms *do* support that, so we no
293 * longer reject those interfaces out of hand,
294 * but we *do* want to reject them if they
295 * can't be opened for capture.
296 */
297 *curdev_ret = NULL;
298 return (0);
299 }
300
301 /*
302 * Yes, we can open it, or we can't, for some other
303 * reason.
304 *
305 * If we can open it, we want to offer it for
306 * capture, as you can capture on it. If we can't,
307 * we want to offer it for capture, so that, if
308 * the user tries to capture on it, they'll get
309 * an error and they'll know why they can't
310 * capture on it (e.g., insufficient permissions)
311 * or they'll report it as a problem (and then
312 * have the error message to provide as information).
313 *
314 * Allocate a new entry.
315 */
316 curdev = malloc(sizeof(pcap_if_t));
317 if (curdev == NULL) {
318 (void)snprintf(errbuf, PCAP_ERRBUF_SIZE,
319 "malloc: %s", pcap_strerror(errno));
320 return (-1);
321 }
322
323 /*
324 * Fill in the entry.
325 */
326 curdev->next = NULL;
327 curdev->name = strdup(name);
328 if (curdev->name == NULL) {
329 (void)snprintf(errbuf, PCAP_ERRBUF_SIZE,
330 "malloc: %s", pcap_strerror(errno));
331 free(curdev);
332 return (-1);
333 }
334 if (description != NULL) {
335 /*
336 * We have a description for this interface.
337 */
338 curdev->description = strdup(description);
339 if (curdev->description == NULL) {
340 (void)snprintf(errbuf, PCAP_ERRBUF_SIZE,
341 "malloc: %s", pcap_strerror(errno));
342 free(curdev->name);
343 free(curdev);
344 return (-1);
345 }
346 } else {
347 /*
348 * We don't.
349 */
350 curdev->description = NULL;
351 }
352 curdev->addresses = NULL; /* list starts out as empty */
353 curdev->flags = 0;
354 if (ISLOOPBACK(name, flags))
355 curdev->flags |= PCAP_IF_LOOPBACK;
356 if (ISUP(flags))
357 curdev->flags |= PCAP_IF_UP;
358 if (ISRUNNING(flags))
359 curdev->flags |= PCAP_IF_RUNNING;
360
361 /*
362 * Add it to the list, in the appropriate location.
363 * First, get the "figure of merit" for this
364 * interface.
365 */
366 this_figure_of_merit = get_figure_of_merit(curdev);
367
368 /*
369 * Now look for the last interface with an figure of merit
370 * less than or equal to the new interface's figure of
371 * merit.
372 *
373 * We start with "prevdev" being NULL, meaning we're before
374 * the first element in the list.
375 */
376 prevdev = NULL;
377 for (;;) {
378 /*
379 * Get the interface after this one.
380 */
381 if (prevdev == NULL) {
382 /*
383 * The next element is the first element.
384 */
385 nextdev = *alldevs;
386 } else
387 nextdev = prevdev->next;
388
389 /*
390 * Are we at the end of the list?
391 */
392 if (nextdev == NULL) {
393 /*
394 * Yes - we have to put the new entry
395 * after "prevdev".
396 */
397 break;
398 }
399
400 /*
401 * Is the new interface's figure of merit less
402 * than the next interface's figure of merit,
403 * meaning that the new interface is better
404 * than the next interface?
405 */
406 nextdev_figure_of_merit = get_figure_of_merit(nextdev);
407 if (this_figure_of_merit < nextdev_figure_of_merit) {
408 /*
409 * Yes - we should put the new entry
410 * before "nextdev", i.e. after "prevdev".
411 */
412 break;
413 }
414
415 prevdev = nextdev;
416 }
417
418 /*
419 * Insert before "nextdev".
420 */
421 curdev->next = nextdev;
422
423 /*
424 * Insert after "prevdev" - unless "prevdev" is null,
425 * in which case this is the first interface.
426 */
427 if (prevdev == NULL) {
428 /*
429 * This is the first interface. Pass back a
430 * pointer to it, and put "curdev" before
431 * "nextdev".
432 */
433 *alldevs = curdev;
434 } else
435 prevdev->next = curdev;
436 }
437
438 *curdev_ret = curdev;
439 return (0);
440 }
441
442 /*
443 * Try to get a description for a given device.
444 * Returns a mallocated description if it could and NULL if it couldn't.
445 *
446 * XXX - on FreeBSDs that support it, should it get the sysctl named
447 * "dev.{adapter family name}.{adapter unit}.%desc" to get a description
448 * of the adapter? Note that "dev.an.0.%desc" is "Aironet PC4500/PC4800"
449 * with my Cisco 350 card, so the name isn't entirely descriptive. The
450 * "dev.an.0.%pnpinfo" has a better description, although one might argue
451 * that the problem is really a driver bug - if it can find out that it's
452 * a Cisco 340 or 350, rather than an old Aironet card, it should use
453 * that in the description.
454 *
455 * Do NetBSD, DragonflyBSD, or OpenBSD support this as well? FreeBSD
456 * and OpenBSD let you get a description, but it's not generated by the OS,
457 * it's set with another ioctl that ifconfig supports; we use that to get
458 * a description in FreeBSD and OpenBSD, but if there is no such
459 * description available, it still might be nice to get some description
460 * string based on the device type or something such as that.
461 *
462 * In OS X, the System Configuration framework can apparently return
463 * names in 10.4 and later.
464 *
465 * It also appears that freedesktop.org's HAL offers an "info.product"
466 * string, but the HAL specification says it "should not be used in any
467 * UI" and "subsystem/capability specific properties" should be used
468 * instead and, in any case, I think HAL is being deprecated in
469 * favor of other stuff such as DeviceKit. DeviceKit doesn't appear
470 * to have any obvious product information for devices, but maybe
471 * I haven't looked hard enough.
472 *
473 * Using the System Configuration framework, or HAL, or DeviceKit, or
474 * whatever, would require that libpcap applications be linked with
475 * the frameworks/libraries in question. That shouldn't be a problem
476 * for programs linking with the shared version of libpcap (unless
477 * you're running on AIX - which I think is the only UN*X that doesn't
478 * support linking a shared library with other libraries on which it
479 * depends, and having an executable linked only with the first shared
480 * library automatically pick up the other libraries when started -
481 * and using HAL or whatever). Programs linked with the static
482 * version of libpcap would have to use pcap-config with the --static
483 * flag in order to get the right linker flags in order to pick up
484 * the additional libraries/frameworks; those programs need that anyway
485 * for libpcap 1.1 and beyond on Linux, as, by default, it requires
486 * -lnl.
487 *
488 * Do any other UN*Xes, or desktop environments support getting a
489 * description?
490 */
491 static char *
492 get_if_description(const char *name)
493 {
494 #ifdef SIOCGIFDESCR
495 char *description = NULL;
496 int s;
497 struct ifreq ifrdesc;
498 #ifndef IFDESCRSIZE
499 size_t descrlen = 64;
500 #else
501 size_t descrlen = IFDESCRSIZE;
502 #endif /* IFDESCRSIZE */
503
504 /*
505 * Get the description for the interface.
506 */
507 memset(&ifrdesc, 0, sizeof ifrdesc);
508 strlcpy(ifrdesc.ifr_name, name, sizeof ifrdesc.ifr_name);
509 s = socket(AF_INET, SOCK_DGRAM, 0);
510 if (s >= 0) {
511 #ifdef __FreeBSD__
512 /*
513 * On FreeBSD, if the buffer isn't big enough for the
514 * description, the ioctl succeeds, but the description
515 * isn't copied, ifr_buffer.length is set to the description
516 * length, and ifr_buffer.buffer is set to NULL.
517 */
518 for (;;) {
519 free(description);
520 if ((description = malloc(descrlen)) != NULL) {
521 ifrdesc.ifr_buffer.buffer = description;
522 ifrdesc.ifr_buffer.length = descrlen;
523 if (ioctl(s, SIOCGIFDESCR, &ifrdesc) == 0) {
524 if (ifrdesc.ifr_buffer.buffer ==
525 description)
526 break;
527 else
528 descrlen = ifrdesc.ifr_buffer.length;
529 } else {
530 /*
531 * Failed to get interface description.
532 */
533 free(description);
534 description = NULL;
535 break;
536 }
537 } else
538 break;
539 }
540 #else /* __FreeBSD__ */
541 /*
542 * The only other OS that currently supports
543 * SIOCGIFDESCR is OpenBSD, and it has no way
544 * to get the description length - it's clamped
545 * to a maximum of IFDESCRSIZE.
546 */
547 if ((description = malloc(descrlen)) != NULL) {
548 ifrdesc.ifr_data = (caddr_t)description;
549 if (ioctl(s, SIOCGIFDESCR, &ifrdesc) != 0) {
550 /*
551 * Failed to get interface description.
552 */
553 free(description);
554 description = NULL;
555 }
556 }
557 #endif /* __FreeBSD__ */
558 close(s);
559 if (description != NULL && strlen(description) == 0) {
560 free(description);
561 description = NULL;
562 }
563 }
564
565 return (description);
566 #else /* SIOCGIFDESCR */
567 return (NULL);
568 #endif /* SIOCGIFDESCR */
569 }
570
571 /*
572 * Try to get a description for a given device, and then look for that
573 * device in the specified list of devices.
574 *
575 * If we find it, add the specified address to it and return 0.
576 *
577 * If we don't find it, check whether we can open it:
578 *
579 * If that fails with PCAP_ERROR_NO_SUCH_DEVICE or
580 * PCAP_ERROR_IFACE_NOT_UP, don't attempt to add an entry for
581 * it, as that probably means it exists but doesn't support
582 * packet capture.
583 *
584 * Otherwise, attempt to add an entry for it, with the specified
585 * ifnet flags and description, and, if that succeeds, add the
586 * specified address to it, set *curdev_ret to point to the new
587 * entry, and return 0, otherwise return PCAP_ERROR and set errbuf
588 * to an error message.
589 */
590 int
591 add_addr_to_iflist(pcap_if_t **alldevs, const char *name, u_int flags,
592 struct sockaddr *addr, size_t addr_size,
593 struct sockaddr *netmask, size_t netmask_size,
594 struct sockaddr *broadaddr, size_t broadaddr_size,
595 struct sockaddr *dstaddr, size_t dstaddr_size,
596 char *errbuf)
597 {
598 char *description;
599 pcap_if_t *curdev;
600
601 description = get_if_description(name);
602 if (add_or_find_if(&curdev, alldevs, name, flags, description,
603 errbuf) == -1) {
604 free(description);
605 /*
606 * Error - give up.
607 */
608 return (-1);
609 }
610 free(description);
611 if (curdev == NULL) {
612 /*
613 * Device wasn't added because it can't be opened.
614 * Not a fatal error.
615 */
616 return (0);
617 }
618
619 /*
620 * "curdev" is an entry for this interface; add an entry for this
621 * address to its list of addresses.
622 *
623 * Allocate the new entry and fill it in.
624 */
625 return (add_addr_to_dev(curdev, addr, addr_size, netmask, netmask_size,
626 broadaddr, broadaddr_size, dstaddr, dstaddr_size, errbuf));
627 }
628
629 /*
630 * Add an entry to the list of addresses for an interface.
631 * "curdev" is the entry for that interface.
632 * If this is the first IP address added to the interface, move it
633 * in the list as appropriate.
634 */
635 int
636 add_addr_to_dev(pcap_if_t *curdev,
637 struct sockaddr *addr, size_t addr_size,
638 struct sockaddr *netmask, size_t netmask_size,
639 struct sockaddr *broadaddr, size_t broadaddr_size,
640 struct sockaddr *dstaddr, size_t dstaddr_size,
641 char *errbuf)
642 {
643 pcap_addr_t *curaddr, *prevaddr, *nextaddr;
644
645 curaddr = malloc(sizeof(pcap_addr_t));
646 if (curaddr == NULL) {
647 (void)snprintf(errbuf, PCAP_ERRBUF_SIZE,
648 "malloc: %s", pcap_strerror(errno));
649 return (-1);
650 }
651
652 curaddr->next = NULL;
653 if (addr != NULL) {
654 curaddr->addr = dup_sockaddr(addr, addr_size);
655 if (curaddr->addr == NULL) {
656 (void)snprintf(errbuf, PCAP_ERRBUF_SIZE,
657 "malloc: %s", pcap_strerror(errno));
658 free(curaddr);
659 return (-1);
660 }
661 } else
662 curaddr->addr = NULL;
663
664 if (netmask != NULL) {
665 curaddr->netmask = dup_sockaddr(netmask, netmask_size);
666 if (curaddr->netmask == NULL) {
667 (void)snprintf(errbuf, PCAP_ERRBUF_SIZE,
668 "malloc: %s", pcap_strerror(errno));
669 if (curaddr->addr != NULL)
670 free(curaddr->addr);
671 free(curaddr);
672 return (-1);
673 }
674 } else
675 curaddr->netmask = NULL;
676
677 if (broadaddr != NULL) {
678 curaddr->broadaddr = dup_sockaddr(broadaddr, broadaddr_size);
679 if (curaddr->broadaddr == NULL) {
680 (void)snprintf(errbuf, PCAP_ERRBUF_SIZE,
681 "malloc: %s", pcap_strerror(errno));
682 if (curaddr->netmask != NULL)
683 free(curaddr->netmask);
684 if (curaddr->addr != NULL)
685 free(curaddr->addr);
686 free(curaddr);
687 return (-1);
688 }
689 } else
690 curaddr->broadaddr = NULL;
691
692 if (dstaddr != NULL) {
693 curaddr->dstaddr = dup_sockaddr(dstaddr, dstaddr_size);
694 if (curaddr->dstaddr == NULL) {
695 (void)snprintf(errbuf, PCAP_ERRBUF_SIZE,
696 "malloc: %s", pcap_strerror(errno));
697 if (curaddr->broadaddr != NULL)
698 free(curaddr->broadaddr);
699 if (curaddr->netmask != NULL)
700 free(curaddr->netmask);
701 if (curaddr->addr != NULL)
702 free(curaddr->addr);
703 free(curaddr);
704 return (-1);
705 }
706 } else
707 curaddr->dstaddr = NULL;
708
709 /*
710 * Find the end of the list of addresses.
711 */
712 for (prevaddr = curdev->addresses; prevaddr != NULL; prevaddr = nextaddr) {
713 nextaddr = prevaddr->next;
714 if (nextaddr == NULL) {
715 /*
716 * This is the end of the list.
717 */
718 break;
719 }
720 }
721
722 if (prevaddr == NULL) {
723 /*
724 * The list was empty; this is the first member.
725 */
726 curdev->addresses = curaddr;
727 } else {
728 /*
729 * "prevaddr" is the last member of the list; append
730 * this member to it.
731 */
732 prevaddr->next = curaddr;
733 }
734
735 return (0);
736 }
737
738 /*
739 * Look for a given device in the specified list of devices.
740 *
741 * If we find it, return 0.
742 *
743 * If we don't find it, check whether we can open it:
744 *
745 * If that fails with PCAP_ERROR_NO_SUCH_DEVICE or
746 * PCAP_ERROR_IFACE_NOT_UP, don't attempt to add an entry for
747 * it, as that probably means it exists but doesn't support
748 * packet capture.
749 *
750 * Otherwise, attempt to add an entry for it, with the specified
751 * ifnet flags and description, and, if that succeeds, return 0
752 * and set *curdev_ret to point to the new entry, otherwise
753 * return PCAP_ERROR and set errbuf to an error message.
754 */
755 int
756 pcap_add_if(pcap_if_t **devlist, const char *name, u_int flags,
757 const char *description, char *errbuf)
758 {
759 pcap_if_t *curdev;
760
761 return (add_or_find_if(&curdev, devlist, name, flags, description,
762 errbuf));
763 }
764
765
766 /*
767 * Free a list of interfaces.
768 */
769 void
770 pcap_freealldevs(pcap_if_t *alldevs)
771 {
772 pcap_if_t *curdev, *nextdev;
773 pcap_addr_t *curaddr, *nextaddr;
774
775 for (curdev = alldevs; curdev != NULL; curdev = nextdev) {
776 nextdev = curdev->next;
777
778 /*
779 * Free all addresses.
780 */
781 for (curaddr = curdev->addresses; curaddr != NULL; curaddr = nextaddr) {
782 nextaddr = curaddr->next;
783 if (curaddr->addr)
784 free(curaddr->addr);
785 if (curaddr->netmask)
786 free(curaddr->netmask);
787 if (curaddr->broadaddr)
788 free(curaddr->broadaddr);
789 if (curaddr->dstaddr)
790 free(curaddr->dstaddr);
791 free(curaddr);
792 }
793
794 /*
795 * Free the name string.
796 */
797 free(curdev->name);
798
799 /*
800 * Free the description string, if any.
801 */
802 if (curdev->description != NULL)
803 free(curdev->description);
804
805 /*
806 * Free the interface.
807 */
808 free(curdev);
809 }
810 }
811
812 #if !defined(WIN32) && !defined(MSDOS)
813
814 /*
815 * Return the name of a network interface attached to the system, or NULL
816 * if none can be found. The interface must be configured up; the
817 * lowest unit number is preferred; loopback is ignored.
818 */
819 char *
820 pcap_lookupdev(errbuf)
821 register char *errbuf;
822 {
823 pcap_if_t *alldevs;
824 /* for old BSD systems, including bsdi3 */
825 #ifndef IF_NAMESIZE
826 #define IF_NAMESIZE IFNAMSIZ
827 #endif
828 static char device[IF_NAMESIZE + 1];
829 char *ret;
830
831 if (pcap_findalldevs(&alldevs, errbuf) == -1)
832 return (NULL);
833
834 if (alldevs == NULL || (alldevs->flags & PCAP_IF_LOOPBACK)) {
835 /*
836 * There are no devices on the list, or the first device
837 * on the list is a loopback device, which means there
838 * are no non-loopback devices on the list. This means
839 * we can't return any device.
840 *
841 * XXX - why not return a loopback device? If we can't
842 * capture on it, it won't be on the list, and if it's
843 * on the list, there aren't any non-loopback devices,
844 * so why not just supply it as the default device?
845 */
846 (void)strlcpy(errbuf, "no suitable device found",
847 PCAP_ERRBUF_SIZE);
848 ret = NULL;
849 } else {
850 /*
851 * Return the name of the first device on the list.
852 */
853 (void)strlcpy(device, alldevs->name, sizeof(device));
854 ret = device;
855 }
856
857 pcap_freealldevs(alldevs);
858 return (ret);
859 }
860
861 int
862 pcap_lookupnet(device, netp, maskp, errbuf)
863 register const char *device;
864 register bpf_u_int32 *netp, *maskp;
865 register char *errbuf;
866 {
867 register int fd;
868 register struct sockaddr_in *sin4;
869 struct ifreq ifr;
870
871 /*
872 * The pseudo-device "any" listens on all interfaces and therefore
873 * has the network address and -mask "0.0.0.0" therefore catching
874 * all traffic. Using NULL for the interface is the same as "any".
875 */
876 if (!device || strcmp(device, "any") == 0
877 #ifdef HAVE_DAG_API
878 || strstr(device, "dag") != NULL
879 #endif
880 #ifdef HAVE_SEPTEL_API
881 || strstr(device, "septel") != NULL
882 #endif
883 #ifdef PCAP_SUPPORT_BT
884 || strstr(device, "bluetooth") != NULL
885 #endif
886 #ifdef PCAP_SUPPORT_USB
887 || strstr(device, "usbmon") != NULL
888 #endif
889 #ifdef HAVE_SNF_API
890 || strstr(device, "snf") != NULL
891 #endif
892 ) {
893 *netp = *maskp = 0;
894 return 0;
895 }
896
897 fd = socket(AF_INET, SOCK_DGRAM, 0);
898 if (fd < 0) {
899 (void)snprintf(errbuf, PCAP_ERRBUF_SIZE, "socket: %s",
900 pcap_strerror(errno));
901 return (-1);
902 }
903 memset(&ifr, 0, sizeof(ifr));
904 #ifdef linux
905 /* XXX Work around Linux kernel bug */
906 ifr.ifr_addr.sa_family = AF_INET;
907 #endif
908 (void)strncpy(ifr.ifr_name, device, sizeof(ifr.ifr_name));
909 if (ioctl(fd, SIOCGIFADDR, (char *)&ifr) < 0) {
910 if (errno == EADDRNOTAVAIL) {
911 (void)snprintf(errbuf, PCAP_ERRBUF_SIZE,
912 "%s: no IPv4 address assigned", device);
913 } else {
914 (void)snprintf(errbuf, PCAP_ERRBUF_SIZE,
915 "SIOCGIFADDR: %s: %s",
916 device, pcap_strerror(errno));
917 }
918 (void)close(fd);
919 return (-1);
920 }
921 sin4 = (struct sockaddr_in *)&ifr.ifr_addr;
922 *netp = sin4->sin_addr.s_addr;
923 memset(&ifr, 0, sizeof(ifr));
924 #ifdef linux
925 /* XXX Work around Linux kernel bug */
926 ifr.ifr_addr.sa_family = AF_INET;
927 #endif
928 (void)strncpy(ifr.ifr_name, device, sizeof(ifr.ifr_name));
929 if (ioctl(fd, SIOCGIFNETMASK, (char *)&ifr) < 0) {
930 (void)snprintf(errbuf, PCAP_ERRBUF_SIZE,
931 "SIOCGIFNETMASK: %s: %s", device, pcap_strerror(errno));
932 (void)close(fd);
933 return (-1);
934 }
935 (void)close(fd);
936 *maskp = sin4->sin_addr.s_addr;
937 if (*maskp == 0) {
938 if (IN_CLASSA(*netp))
939 *maskp = IN_CLASSA_NET;
940 else if (IN_CLASSB(*netp))
941 *maskp = IN_CLASSB_NET;
942 else if (IN_CLASSC(*netp))
943 *maskp = IN_CLASSC_NET;
944 else {
945 (void)snprintf(errbuf, PCAP_ERRBUF_SIZE,
946 "inet class for 0x%x unknown", *netp);
947 return (-1);
948 }
949 }
950 *netp &= *maskp;
951 return (0);
952 }
953
954 #elif defined(WIN32)
955
956 /*
957 * Return the name of a network interface attached to the system, or NULL
958 * if none can be found. The interface must be configured up; the
959 * lowest unit number is preferred; loopback is ignored.
960 */
961 char *
962 pcap_lookupdev(errbuf)
963 register char *errbuf;
964 {
965 DWORD dwVersion;
966 DWORD dwWindowsMajorVersion;
967 dwVersion = GetVersion(); /* get the OS version */
968 dwWindowsMajorVersion = (DWORD)(LOBYTE(LOWORD(dwVersion)));
969
970 if (dwVersion >= 0x80000000 && dwWindowsMajorVersion >= 4) {
971 /*
972 * Windows 95, 98, ME.
973 */
974 ULONG NameLength = 8192;
975 static char AdaptersName[8192];
976
977 if (PacketGetAdapterNames(AdaptersName,&NameLength) )
978 return (AdaptersName);
979 else
980 return NULL;
981 } else {
982 /*
983 * Windows NT (NT 4.0, W2K, WXP). Convert the names to UNICODE for backward compatibility
984 */
985 ULONG NameLength = 8192;
986 static WCHAR AdaptersName[8192];
987 char *tAstr;
988 WCHAR *tUstr;
989 WCHAR *TAdaptersName = (WCHAR*)malloc(8192 * sizeof(WCHAR));
990 int NAdapts = 0;
991
992 if(TAdaptersName == NULL)
993 {
994 (void)snprintf(errbuf, PCAP_ERRBUF_SIZE, "memory allocation failure");
995 return NULL;
996 }
997
998 if ( !PacketGetAdapterNames((PTSTR)TAdaptersName,&NameLength) )
999 {
1000 (void)snprintf(errbuf, PCAP_ERRBUF_SIZE,
1001 "PacketGetAdapterNames: %s",
1002 pcap_win32strerror());
1003 free(TAdaptersName);
1004 return NULL;
1005 }
1006
1007
1008 tAstr = (char*)TAdaptersName;
1009 tUstr = (WCHAR*)AdaptersName;
1010
1011 /*
1012 * Convert and copy the device names
1013 */
1014 while(sscanf(tAstr, "%S", tUstr) > 0)
1015 {
1016 tAstr += strlen(tAstr) + 1;
1017 tUstr += wcslen(tUstr) + 1;
1018 NAdapts ++;
1019 }
1020
1021 tAstr++;
1022 *tUstr = 0;
1023 tUstr++;
1024
1025 /*
1026 * Copy the descriptions
1027 */
1028 while(NAdapts--)
1029 {
1030 char* tmp = (char*)tUstr;
1031 strcpy(tmp, tAstr);
1032 tmp += strlen(tAstr) + 1;
1033 tUstr = (WCHAR*)tmp;
1034 tAstr += strlen(tAstr) + 1;
1035 }
1036
1037 free(TAdaptersName);
1038 return (char *)(AdaptersName);
1039 }
1040 }
1041
1042
1043 int
1044 pcap_lookupnet(device, netp, maskp, errbuf)
1045 register const char *device;
1046 register bpf_u_int32 *netp, *maskp;
1047 register char *errbuf;
1048 {
1049 /*
1050 * We need only the first IPv4 address, so we must scan the array returned by PacketGetNetInfo()
1051 * in order to skip non IPv4 (i.e. IPv6 addresses)
1052 */
1053 npf_if_addr if_addrs[MAX_NETWORK_ADDRESSES];
1054 LONG if_addr_size = 1;
1055 struct sockaddr_in *t_addr;
1056 unsigned int i;
1057
1058 if (!PacketGetNetInfoEx((void *)device, if_addrs, &if_addr_size)) {
1059 *netp = *maskp = 0;
1060 return (0);
1061 }
1062
1063 for(i=0; i<MAX_NETWORK_ADDRESSES; i++)
1064 {
1065 if(if_addrs[i].IPAddress.ss_family == AF_INET)
1066 {
1067 t_addr = (struct sockaddr_in *) &(if_addrs[i].IPAddress);
1068 *netp = t_addr->sin_addr.S_un.S_addr;
1069 t_addr = (struct sockaddr_in *) &(if_addrs[i].SubnetMask);
1070 *maskp = t_addr->sin_addr.S_un.S_addr;
1071
1072 *netp &= *maskp;
1073 return (0);
1074 }
1075
1076 }
1077
1078 *netp = *maskp = 0;
1079 return (0);
1080 }
1081
1082 #endif /* !WIN32 && !MSDOS */