2 * Copyright (c) 1994, 1995, 1996
3 * The Regents of the University of California. All rights reserved.
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
13 * 3. All advertising materials mentioning features or use of this software
14 * must display the following acknowledgement:
15 * This product includes software developed by the Computer Systems
16 * Engineering Group at Lawrence Berkeley Laboratory.
17 * 4. Neither the name of the University nor of the Laboratory may be used
18 * to endorse or promote products derived from this software without
19 * specific prior written permission.
21 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
41 #include <pcap/pcap.h>
53 #include "portability.h"
57 * Uses PACKAGE_VERSION from config.h.
59 #define PCAP_VERSION_STRING "libpcap version " PACKAGE_VERSION
66 * If pcap_new_api is set, we disable pcap_lookupdev(), because:
68 * it's not thread-safe, and is marked as deprecated, on all
71 * on Windows, it may return UTF-16LE strings, which the program
72 * might then pass to pcap_create() (or to pcap_open_live(), which
73 * then passes them to pcap_create()), requiring pcap_create() to
74 * check for UTF-16LE strings using a hack, and that hack 1)
75 * *cannot* be 100% reliable and 2) runs the risk of going past the
78 * We keep it around in legacy mode for compatibility.
80 * We also disable the aforementioned hack in pcap_create().
82 extern int pcap_new_api
;
85 * If pcap_utf_8_mode is set, on Windows we treat strings as UTF-8.
87 * On UN*Xes, we assume all strings are and should be in UTF-8, regardless
88 * of the setting of this flag.
90 extern int pcap_utf_8_mode
;
93 * Swap byte ordering of unsigned long long timestamp on a big endian
96 #define SWAPLL(ull) ((ull & 0xff00000000000000ULL) >> 56) | \
97 ((ull & 0x00ff000000000000ULL) >> 40) | \
98 ((ull & 0x0000ff0000000000ULL) >> 24) | \
99 ((ull & 0x000000ff00000000ULL) >> 8) | \
100 ((ull & 0x00000000ff000000ULL) << 8) | \
101 ((ull & 0x0000000000ff0000ULL) << 24) | \
102 ((ull & 0x000000000000ff00ULL) << 40) | \
103 ((ull & 0x00000000000000ffULL) << 56)
106 * Maximum snapshot length.
108 * Somewhat arbitrary, but chosen to be:
110 * 1) big enough for maximum-size Linux loopback packets (65549)
111 * and some USB packets captured with USBPcap:
113 * https://desowin.org/usbpcap/
115 * (> 131072, < 262144)
119 * 2) small enough not to cause attempts to allocate huge amounts of
120 * memory; some applications might use the snapshot length in a
121 * savefile header to control the size of the buffer they allocate,
122 * so a size of, say, 2^31-1 might not work well. (libpcap uses it
123 * as a hint, but doesn't start out allocating a buffer bigger than
124 * 2 KiB, and grows the buffer as necessary, but not beyond the
125 * per-linktype maximum snapshot length. Other code might naively
126 * use it; we want to avoid writing a too-large snapshot length,
127 * in order not to cause that code problems.)
129 * We don't enforce this in pcap_set_snaplen(), but we use it internally.
131 #define MAXIMUM_SNAPLEN 262144
134 * Locale-independent macros for testing character types.
135 * These can be passed any integral value, without worrying about, for
136 * example, sign-extending char values, unlike the C macros.
138 #define PCAP_ISDIGIT(c) \
139 ((c) >= '0' && (c) <= '9')
140 #define PCAP_ISXDIGIT(c) \
141 (((c) >= '0' && (c) <= '9') || \
142 ((c) >= 'A' && (c) <= 'F') || \
143 ((c) >= 'a' && (c) <= 'f'))
147 int timeout
; /* timeout for buffering */
150 int rfmon
; /* monitor mode */
151 int immediate
; /* immediate mode - deliver packets as soon as they arrive */
152 int nonblock
; /* non-blocking mode - don't wait for packets to be delivered, return "no packets available" */
154 int tstamp_precision
;
157 * Platform-dependent options.
160 int protocol
; /* protocol to use when creating PF_PACKET socket */
163 int nocapture_local
;/* disable NPF loopback */
167 typedef int (*activate_op_t
)(pcap_t
*);
168 typedef int (*can_set_rfmon_op_t
)(pcap_t
*);
169 typedef int (*read_op_t
)(pcap_t
*, int cnt
, pcap_handler
, u_char
*);
170 typedef int (*next_packet_op_t
)(pcap_t
*, struct pcap_pkthdr
*, u_char
**);
171 typedef int (*inject_op_t
)(pcap_t
*, const void *, int);
172 typedef void (*save_current_filter_op_t
)(pcap_t
*, const char *);
173 typedef int (*setfilter_op_t
)(pcap_t
*, struct bpf_program
*);
174 typedef int (*setdirection_op_t
)(pcap_t
*, pcap_direction_t
);
175 typedef int (*set_datalink_op_t
)(pcap_t
*, int);
176 typedef int (*getnonblock_op_t
)(pcap_t
*);
177 typedef int (*setnonblock_op_t
)(pcap_t
*, int);
178 typedef int (*stats_op_t
)(pcap_t
*, struct pcap_stat
*);
179 typedef void (*breakloop_op_t
)(pcap_t
*);
181 typedef struct pcap_stat
*(*stats_ex_op_t
)(pcap_t
*, int *);
182 typedef int (*setbuff_op_t
)(pcap_t
*, int);
183 typedef int (*setmode_op_t
)(pcap_t
*, int);
184 typedef int (*setmintocopy_op_t
)(pcap_t
*, int);
185 typedef HANDLE (*getevent_op_t
)(pcap_t
*);
186 typedef int (*oid_get_request_op_t
)(pcap_t
*, bpf_u_int32
, void *, size_t *);
187 typedef int (*oid_set_request_op_t
)(pcap_t
*, bpf_u_int32
, const void *, size_t *);
188 typedef u_int (*sendqueue_transmit_op_t
)(pcap_t
*, pcap_send_queue
*, int);
189 typedef int (*setuserbuffer_op_t
)(pcap_t
*, int);
190 typedef int (*live_dump_op_t
)(pcap_t
*, char *, int, int);
191 typedef int (*live_dump_ended_op_t
)(pcap_t
*, int);
192 typedef PAirpcapHandle (*get_airpcap_handle_op_t
)(pcap_t
*);
194 typedef void (*cleanup_op_t
)(pcap_t
*);
197 * We put all the stuff used in the read code path at the beginning,
198 * to try to keep it together in the same cache line or lines.
202 * Method to call to read packets on a live capture.
207 * Method to call to read the next packet from a savefile.
209 next_packet_op_t next_packet_op
;
225 sig_atomic_t break_loop
; /* flag set to force break from packet-reading loop */
227 void *priv
; /* private data for methods */
230 struct pcap_samp rmt_samp
; /* parameters related to the sampling process. */
234 FILE *rfile
; /* null if live capture, non-null if savefile */
236 struct pcap
*next
; /* list of open pcaps that need stuff cleared on close */
239 * File version number; meaningful only for a savefile, but we
240 * keep it here so that apps that (mistakenly) ask for the
241 * version numbers will get the same zero values that they
248 int linktype
; /* Network linktype */
249 int linktype_ext
; /* Extended information stored in the linktype field of a file */
250 int offset
; /* offset for proper alignment */
251 int activated
; /* true if the capture is really started */
252 int oldstyle
; /* if we're opening with pcap_open_live() */
257 * Place holder for pcap_next().
262 struct pcap_stat stat
; /* used for pcap_stats_ex() */
265 /* We're accepting only packets in this direction/these directions. */
266 pcap_direction_t direction
;
269 * Flags to affect BPF code generation.
271 int bpf_codegen_flags
;
273 #if !defined(_WIN32) && !defined(MSDOS)
274 int selectable_fd
; /* FD on which select()/poll()/epoll_wait()/kevent()/etc. can be done */
277 * In case there either is no selectable FD, or there is but
278 * it doesn't necessarily work (e.g., if it doesn't get notified
279 * if the packet capture timeout expires before the buffer
280 * fills up), this points to a timeout that should be used
281 * in select()/poll()/epoll_wait()/kevent() call. The pcap_t should
282 * be put into non-blocking mode, and, if the timeout expires on
283 * the call, an attempt should be made to read packets from all
284 * pcap_t's with a required timeout, and the code must be
285 * prepared not to see any packets from the attempt.
287 const struct timeval
*required_select_timeout
;
291 * Placeholder for filter code if bpf not in kernel.
293 struct bpf_program fcode
;
295 char errbuf
[PCAP_ERRBUF_SIZE
+ 1];
297 char acp_errbuf
[PCAP_ERRBUF_SIZE
+ 1]; /* buffer for local code page error strings */
301 int tstamp_type_count
;
302 u_int
*tstamp_type_list
;
303 int tstamp_precision_count
;
304 u_int
*tstamp_precision_list
;
306 struct pcap_pkthdr pcap_header
; /* This is needed for the pcap_next_ex() to work */
311 activate_op_t activate_op
;
312 can_set_rfmon_op_t can_set_rfmon_op
;
313 inject_op_t inject_op
;
314 save_current_filter_op_t save_current_filter_op
;
315 setfilter_op_t setfilter_op
;
316 setdirection_op_t setdirection_op
;
317 set_datalink_op_t set_datalink_op
;
318 getnonblock_op_t getnonblock_op
;
319 setnonblock_op_t setnonblock_op
;
321 breakloop_op_t breakloop_op
;
324 * Routine to use as callback for pcap_next()/pcap_next_ex().
326 pcap_handler oneshot_callback
;
330 * These are, at least currently, specific to the Win32 NPF
333 stats_ex_op_t stats_ex_op
;
334 setbuff_op_t setbuff_op
;
335 setmode_op_t setmode_op
;
336 setmintocopy_op_t setmintocopy_op
;
337 getevent_op_t getevent_op
;
338 oid_get_request_op_t oid_get_request_op
;
339 oid_set_request_op_t oid_set_request_op
;
340 sendqueue_transmit_op_t sendqueue_transmit_op
;
341 setuserbuffer_op_t setuserbuffer_op
;
342 live_dump_op_t live_dump_op
;
343 live_dump_ended_op_t live_dump_ended_op
;
344 get_airpcap_handle_op_t get_airpcap_handle_op
;
346 cleanup_op_t cleanup_op
;
350 * BPF code generation flags.
352 #define BPF_SPECIAL_VLAN_HANDLING 0x00000001 /* special VLAN handling for Linux */
354 * Interface Error Codes
355 * It is likely that there are other devices which throw spurious errors, at which point
356 * this will need refactoring to efficiently check against a list, but for now we can just
357 * check this one value.
359 #define NPF_SURFACE_MOBILE_NONPROMISC 0xe00000bb
360 /* Attempting to set non-promiscuous mode on a noncompliant Microsoft Surface Pro
361 * Mobile Broadband Adapter returns an error that can safely be ignored, as it's
362 * always in non-promiscuous mode.
366 * This is a timeval as stored in a savefile.
367 * It has to use the same types everywhere, independent of the actual
368 * `struct timeval'; `struct timeval' has 32-bit tv_sec values on some
369 * platforms and 64-bit tv_sec values on other platforms, and writing
370 * out native `struct timeval' values would mean files could only be
371 * read on systems with the same tv_sec size as the system on which
372 * the file was written.
375 struct pcap_timeval
{
376 bpf_int32 tv_sec
; /* seconds */
377 bpf_int32 tv_usec
; /* microseconds */
381 * This is a `pcap_pkthdr' as actually stored in a savefile.
383 * Do not change the format of this structure, in any way (this includes
384 * changes that only affect the length of fields in this structure),
385 * and do not make the time stamp anything other than seconds and
386 * microseconds (e.g., seconds and nanoseconds). Instead:
388 * introduce a new structure for the new format;
390 * send mail to "tcpdump-workers@lists.tcpdump.org", requesting
391 * a new magic number for your new capture file format, and, when
392 * you get the new magic number, put it in "savefile.c";
394 * use that magic number for save files with the changed record
397 * make the code in "savefile.c" capable of reading files with
398 * the old record header as well as files with the new record header
399 * (using the magic number to determine the header format).
401 * Then supply the changes by forking the branch at
403 * https://github.com/the-tcpdump-group/libpcap/tree/master
405 * and issuing a pull request, so that future versions of libpcap and
406 * programs that use it (such as tcpdump) will be able to read your new
407 * capture file format.
410 struct pcap_sf_pkthdr
{
411 struct pcap_timeval ts
; /* time stamp */
412 bpf_u_int32 caplen
; /* length of portion present */
413 bpf_u_int32 len
; /* length of this packet (off wire) */
417 * How a `pcap_pkthdr' is actually stored in savefiles written
418 * by some patched versions of libpcap (e.g. the ones in Red
419 * Hat Linux 6.1 and 6.2).
421 * Do not change the format of this structure, in any way (this includes
422 * changes that only affect the length of fields in this structure).
423 * Instead, introduce a new structure, as per the above.
426 struct pcap_sf_patched_pkthdr
{
427 struct pcap_timeval ts
; /* time stamp */
428 bpf_u_int32 caplen
; /* length of portion present */
429 bpf_u_int32 len
; /* length of this packet (off wire) */
431 unsigned short protocol
;
432 unsigned char pkt_type
;
436 * User data structure for the one-shot callback used for pcap_next()
437 * and pcap_next_ex().
439 struct oneshot_userdata
{
440 struct pcap_pkthdr
*hdr
;
446 #define min(a, b) ((a) > (b) ? (b) : (a))
449 int pcap_offline_read(pcap_t
*, int, pcap_handler
, u_char
*);
452 * Does the packet count argument to a module's read routine say
453 * "supply packets until you run out of packets"?
455 #define PACKET_COUNT_IS_UNLIMITED(count) ((count) <= 0)
458 * Routines that most pcap implementations can use for non-blocking mode.
460 #if !defined(_WIN32) && !defined(MSDOS)
461 int pcap_getnonblock_fd(pcap_t
*);
462 int pcap_setnonblock_fd(pcap_t
*p
, int);
466 * Internal interfaces for "pcap_create()".
468 * "pcap_create_interface()" is the routine to do a pcap_create on
469 * a regular network interface. There are multiple implementations
470 * of this, one for each platform type (Linux, BPF, DLPI, etc.),
471 * with the one used chosen by the configure script.
473 * "pcap_create_common()" allocates and fills in a pcap_t, for use
474 * by pcap_create routines.
476 pcap_t
*pcap_create_interface(const char *, char *);
479 * This wrapper takes an error buffer pointer and a type to use for the
480 * private data, and calls pcap_create_common(), passing it the error
481 * buffer pointer, the size fo the private data type, in bytes, and the
482 * offset of the private data from the beginning of the structure, in
485 #define PCAP_CREATE_COMMON(ebuf, type) \
486 pcap_create_common(ebuf, \
487 sizeof (struct { pcap_t __common; type __private; }), \
488 offsetof (struct { pcap_t __common; type __private; }, __private))
489 pcap_t
*pcap_create_common(char *, size_t, size_t);
490 int pcap_do_addexit(pcap_t
*);
491 void pcap_add_to_pcaps_to_close(pcap_t
*);
492 void pcap_remove_from_pcaps_to_close(pcap_t
*);
493 void pcap_cleanup_live_common(pcap_t
*);
494 int pcap_check_activated(pcap_t
*);
495 void pcap_breakloop_common(pcap_t
*);
498 * Internal interfaces for "pcap_findalldevs()".
500 * A pcap_if_list_t * is a reference to a list of devices.
502 * A get_if_flags_func is a platform-dependent function called to get
503 * additional interface flags.
505 * "pcap_platform_finddevs()" is the platform-dependent routine to
506 * find local network interfaces.
508 * "pcap_findalldevs_interfaces()" is a helper to find those interfaces
509 * using the "standard" mechanisms (SIOCGIFCONF, "getifaddrs()", etc.).
511 * "add_dev()" adds an entry to a pcap_if_list_t.
513 * "find_dev()" tries to find a device, by name, in a pcap_if_list_t.
515 * "find_or_add_dev()" checks whether a device is already in a pcap_if_list_t
516 * and, if not, adds an entry for it.
519 typedef struct pcap_if_list pcap_if_list_t
;
520 typedef int (*get_if_flags_func
)(const char *, bpf_u_int32
*, char *);
521 int pcap_platform_finddevs(pcap_if_list_t
*, char *);
522 #if !defined(_WIN32) && !defined(MSDOS)
523 int pcap_findalldevs_interfaces(pcap_if_list_t
*, char *,
524 int (*)(const char *), get_if_flags_func
);
526 pcap_if_t
*find_or_add_dev(pcap_if_list_t
*, const char *, bpf_u_int32
,
527 get_if_flags_func
, const char *, char *);
528 pcap_if_t
*find_dev(pcap_if_list_t
*, const char *);
529 pcap_if_t
*add_dev(pcap_if_list_t
*, const char *, bpf_u_int32
, const char *,
531 int add_addr_to_dev(pcap_if_t
*, struct sockaddr
*, size_t,
532 struct sockaddr
*, size_t, struct sockaddr
*, size_t,
533 struct sockaddr
*dstaddr
, size_t, char *errbuf
);
535 pcap_if_t
*find_or_add_if(pcap_if_list_t
*, const char *, bpf_u_int32
,
536 get_if_flags_func
, char *);
537 int add_addr_to_if(pcap_if_list_t
*, const char *, bpf_u_int32
,
539 struct sockaddr
*, size_t, struct sockaddr
*, size_t,
540 struct sockaddr
*, size_t, struct sockaddr
*, size_t, char *);
544 * Internal interfaces for "pcap_open_offline()" and other savefile
547 * "pcap_open_offline_common()" allocates and fills in a pcap_t, for use
548 * by pcap_open_offline routines.
550 * "pcap_adjust_snapshot()" adjusts the snapshot to be non-zero and
553 * "sf_cleanup()" closes the file handle associated with a pcap_t, if
554 * appropriate, and frees all data common to all modules for handling
557 * "charset_fopen()", in UTF-8 mode on Windows, does an fopen() that
558 * treats the pathname as being in UTF-8, rather than the local
559 * code page, on Windows.
563 * This wrapper takes an error buffer pointer and a type to use for the
564 * private data, and calls pcap_create_common(), passing it the error
565 * buffer pointer, the size fo the private data type, in bytes, and the
566 * offset of the private data from the beginning of the structure, in
569 #define PCAP_OPEN_OFFLINE_COMMON(ebuf, type) \
570 pcap_open_offline_common(ebuf, \
571 sizeof (struct { pcap_t __common; type __private; }), \
572 offsetof (struct { pcap_t __common; type __private; }, __private))
573 pcap_t
*pcap_open_offline_common(char *ebuf
, size_t total_size
,
574 size_t private_data
);
575 bpf_u_int32
pcap_adjust_snapshot(bpf_u_int32 linktype
, bpf_u_int32 snaplen
);
576 void sf_cleanup(pcap_t
*p
);
578 FILE *charset_fopen(const char *path
, const char *mode
);
581 * On other OSes, just use Boring Old fopen().
583 #define charset_fopen(path, mode) fopen((path), (mode))
587 * Internal interfaces for loading code at run time.
590 #define pcap_code_handle_t HMODULE
591 #define pcap_funcptr_t FARPROC
593 pcap_code_handle_t
pcap_load_code(const char *);
594 pcap_funcptr_t
pcap_find_function(pcap_code_handle_t
, const char *);
598 * Internal interfaces for doing user-mode filtering of packets and
599 * validating filter programs.
602 * Auxiliary data, for use when interpreting a filter intended for the
603 * Linux kernel when the kernel rejects the filter (requiring us to
604 * run it in userland). It contains VLAN tag information.
606 struct pcap_bpf_aux_data
{
607 u_short vlan_tag_present
;
612 * Filtering routine that takes the auxiliary data as an additional
615 u_int
pcap_filter_with_aux_data(const struct bpf_insn
*,
616 const u_char
*, u_int
, u_int
, const struct pcap_bpf_aux_data
*);
619 * Filtering routine that doesn't.
621 u_int
pcap_filter(const struct bpf_insn
*, const u_char
*, u_int
, u_int
);
624 * Routine to validate a BPF program.
626 int pcap_validate_filter(const struct bpf_insn
*, int);
629 * Internal interfaces for both "pcap_create()" and routines that
632 * "pcap_oneshot()" is the standard one-shot callback for "pcap_next()"
633 * and "pcap_next_ex()".
635 void pcap_oneshot(u_char
*, const struct pcap_pkthdr
*, const u_char
*);
637 int install_bpf_program(pcap_t
*, struct bpf_program
*);
639 int pcap_strcasecmp(const char *, const char *);
642 * Internal interfaces for pcap_createsrcstr and pcap_parsesrcstr with
643 * the additional bit of information regarding SSL support (rpcap:// vs.
646 int pcap_createsrcstr_ex(char *, int, const char *, const char *,
647 const char *, unsigned char, char *);
648 int pcap_parsesrcstr_ex(const char *, int *, char *, char *,
649 char *, unsigned char *, char *);
652 extern int pcap_debug
;