57e22627f9
Update libpcap from 1.9.0 to 1.9.1. MFC after: 2 weeks
312 lines
7.6 KiB
C
312 lines
7.6 KiB
C
#ifdef HAVE_CONFIG_H
|
|
#include <config.h>
|
|
#endif
|
|
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
#include <sys/types.h>
|
|
#ifdef _WIN32
|
|
#include <winsock2.h>
|
|
#include <ws2tcpip.h>
|
|
#include <windows.h>
|
|
#else
|
|
#include <sys/socket.h>
|
|
#include <netinet/in.h>
|
|
#include <arpa/inet.h>
|
|
#include <netdb.h>
|
|
#include <unistd.h>
|
|
#endif
|
|
|
|
#include <pcap.h>
|
|
|
|
#include "pcap/funcattrs.h"
|
|
|
|
static int ifprint(pcap_if_t *d);
|
|
static char *iptos(bpf_u_int32 in);
|
|
|
|
#ifdef _WIN32
|
|
#include "portability.h"
|
|
|
|
/*
|
|
* Generate a string for a Win32-specific error (i.e. an error generated when
|
|
* calling a Win32 API).
|
|
* For errors occurred during standard C calls, we still use pcap_strerror()
|
|
*/
|
|
#define ERRBUF_SIZE 1024
|
|
static const char *
|
|
win32_strerror(DWORD error)
|
|
{
|
|
static char errbuf[ERRBUF_SIZE+1];
|
|
size_t errlen;
|
|
|
|
FormatMessage(FORMAT_MESSAGE_FROM_SYSTEM, NULL, error, 0, errbuf,
|
|
ERRBUF_SIZE, NULL);
|
|
|
|
/*
|
|
* "FormatMessage()" "helpfully" sticks CR/LF at the end of the
|
|
* message. Get rid of it.
|
|
*/
|
|
errlen = strlen(errbuf);
|
|
if (errlen >= 2) {
|
|
errbuf[errlen - 1] = '\0';
|
|
errbuf[errlen - 2] = '\0';
|
|
errlen -= 2;
|
|
}
|
|
return errbuf;
|
|
}
|
|
|
|
static char *
|
|
getpass(const char *prompt)
|
|
{
|
|
HANDLE console_handle = GetStdHandle(STD_INPUT_HANDLE);
|
|
DWORD console_mode, save_console_mode;
|
|
static char password[128+1];
|
|
char *p;
|
|
|
|
fprintf(stderr, "%s", prompt);
|
|
|
|
/*
|
|
* Turn off echoing.
|
|
*/
|
|
if (!GetConsoleMode(console_handle, &console_mode)) {
|
|
fprintf(stderr, "Can't get console mode: %s\n",
|
|
win32_strerror(GetLastError()));
|
|
exit(1);
|
|
}
|
|
save_console_mode = console_mode;
|
|
console_mode &= ~ENABLE_ECHO_INPUT;
|
|
if (!SetConsoleMode(console_handle, console_mode)) {
|
|
fprintf(stderr, "Can't set console mode: %s\n",
|
|
win32_strerror(GetLastError()));
|
|
exit(1);
|
|
}
|
|
if (fgets(password, sizeof password, stdin) == NULL) {
|
|
fprintf(stderr, "\n");
|
|
SetConsoleMode(console_handle, save_console_mode);
|
|
exit(1);
|
|
}
|
|
fprintf(stderr, "\n");
|
|
SetConsoleMode(console_handle, save_console_mode);
|
|
p = strchr(password, '\n');
|
|
if (p != NULL)
|
|
*p = '\0';
|
|
return password;
|
|
}
|
|
#endif
|
|
|
|
int main(int argc, char **argv)
|
|
{
|
|
pcap_if_t *alldevs;
|
|
pcap_if_t *d;
|
|
bpf_u_int32 net, mask;
|
|
int exit_status = 0;
|
|
char errbuf[PCAP_ERRBUF_SIZE+1];
|
|
#ifdef ENABLE_REMOTE
|
|
struct pcap_rmtauth auth;
|
|
char username[128+1];
|
|
char *p;
|
|
char *password;
|
|
#endif
|
|
|
|
#ifdef ENABLE_REMOTE
|
|
if (argc >= 2)
|
|
{
|
|
if (pcap_findalldevs_ex(argv[1], NULL, &alldevs, errbuf) == -1)
|
|
{
|
|
/*
|
|
* OK, try it with a user name and password.
|
|
*/
|
|
fprintf(stderr, "User name: ");
|
|
if (fgets(username, sizeof username, stdin) == NULL)
|
|
exit(1);
|
|
p = strchr(username, '\n');
|
|
if (p != NULL)
|
|
*p = '\0';
|
|
password = getpass("Password: ");
|
|
auth.type = RPCAP_RMTAUTH_PWD;
|
|
auth.username = username;
|
|
auth.password = password;
|
|
if (pcap_findalldevs_ex(argv[1], &auth, &alldevs, errbuf) == -1)
|
|
{
|
|
fprintf(stderr,"Error in pcap_findalldevs: %s\n",errbuf);
|
|
exit(1);
|
|
}
|
|
}
|
|
}
|
|
else
|
|
#endif
|
|
{
|
|
if (pcap_findalldevs(&alldevs, errbuf) == -1)
|
|
{
|
|
fprintf(stderr,"Error in pcap_findalldevs: %s\n",errbuf);
|
|
exit(1);
|
|
}
|
|
}
|
|
for(d=alldevs;d;d=d->next)
|
|
{
|
|
if (!ifprint(d))
|
|
exit_status = 2;
|
|
}
|
|
|
|
if (alldevs != NULL)
|
|
{
|
|
if (pcap_lookupnet(alldevs->name, &net, &mask, errbuf) < 0)
|
|
{
|
|
fprintf(stderr,"Error in pcap_lookupnet: %s\n",errbuf);
|
|
exit_status = 2;
|
|
}
|
|
else
|
|
{
|
|
printf("Preferred device is on network: %s/%s\n",iptos(net), iptos(mask));
|
|
}
|
|
}
|
|
|
|
pcap_freealldevs(alldevs);
|
|
exit(exit_status);
|
|
}
|
|
|
|
static int ifprint(pcap_if_t *d)
|
|
{
|
|
pcap_addr_t *a;
|
|
char ipv4_buf[INET_ADDRSTRLEN];
|
|
char ipv6_buf[INET6_ADDRSTRLEN];
|
|
const char *sep;
|
|
int status = 1; /* success */
|
|
|
|
printf("%s\n",d->name);
|
|
if (d->description)
|
|
printf("\tDescription: %s\n",d->description);
|
|
printf("\tFlags: ");
|
|
sep = "";
|
|
if (d->flags & PCAP_IF_UP) {
|
|
printf("%sUP", sep);
|
|
sep = ", ";
|
|
}
|
|
if (d->flags & PCAP_IF_RUNNING) {
|
|
printf("%sRUNNING", sep);
|
|
sep = ", ";
|
|
}
|
|
if (d->flags & PCAP_IF_LOOPBACK) {
|
|
printf("%sLOOPBACK", sep);
|
|
sep = ", ";
|
|
}
|
|
if (d->flags & PCAP_IF_WIRELESS) {
|
|
printf("%sWIRELESS", sep);
|
|
switch (d->flags & PCAP_IF_CONNECTION_STATUS) {
|
|
|
|
case PCAP_IF_CONNECTION_STATUS_UNKNOWN:
|
|
printf(" (association status unknown)");
|
|
break;
|
|
|
|
case PCAP_IF_CONNECTION_STATUS_CONNECTED:
|
|
printf(" (associated)");
|
|
break;
|
|
|
|
case PCAP_IF_CONNECTION_STATUS_DISCONNECTED:
|
|
printf(" (not associated)");
|
|
break;
|
|
|
|
case PCAP_IF_CONNECTION_STATUS_NOT_APPLICABLE:
|
|
break;
|
|
}
|
|
} else {
|
|
switch (d->flags & PCAP_IF_CONNECTION_STATUS) {
|
|
|
|
case PCAP_IF_CONNECTION_STATUS_UNKNOWN:
|
|
printf(" (connection status unknown)");
|
|
break;
|
|
|
|
case PCAP_IF_CONNECTION_STATUS_CONNECTED:
|
|
printf(" (connected)");
|
|
break;
|
|
|
|
case PCAP_IF_CONNECTION_STATUS_DISCONNECTED:
|
|
printf(" (disconnected)");
|
|
break;
|
|
|
|
case PCAP_IF_CONNECTION_STATUS_NOT_APPLICABLE:
|
|
break;
|
|
}
|
|
}
|
|
sep = ", ";
|
|
printf("\n");
|
|
|
|
for(a=d->addresses;a;a=a->next) {
|
|
if (a->addr != NULL)
|
|
switch(a->addr->sa_family) {
|
|
case AF_INET:
|
|
printf("\tAddress Family: AF_INET\n");
|
|
if (a->addr)
|
|
printf("\t\tAddress: %s\n",
|
|
inet_ntop(AF_INET,
|
|
&((struct sockaddr_in *)(a->addr))->sin_addr,
|
|
ipv4_buf, sizeof ipv4_buf));
|
|
if (a->netmask)
|
|
printf("\t\tNetmask: %s\n",
|
|
inet_ntop(AF_INET,
|
|
&((struct sockaddr_in *)(a->netmask))->sin_addr,
|
|
ipv4_buf, sizeof ipv4_buf));
|
|
if (a->broadaddr)
|
|
printf("\t\tBroadcast Address: %s\n",
|
|
inet_ntop(AF_INET,
|
|
&((struct sockaddr_in *)(a->broadaddr))->sin_addr,
|
|
ipv4_buf, sizeof ipv4_buf));
|
|
if (a->dstaddr)
|
|
printf("\t\tDestination Address: %s\n",
|
|
inet_ntop(AF_INET,
|
|
&((struct sockaddr_in *)(a->dstaddr))->sin_addr,
|
|
ipv4_buf, sizeof ipv4_buf));
|
|
break;
|
|
#ifdef INET6
|
|
case AF_INET6:
|
|
printf("\tAddress Family: AF_INET6\n");
|
|
if (a->addr)
|
|
printf("\t\tAddress: %s\n",
|
|
inet_ntop(AF_INET6,
|
|
((struct sockaddr_in6 *)(a->addr))->sin6_addr.s6_addr,
|
|
ipv6_buf, sizeof ipv6_buf));
|
|
if (a->netmask)
|
|
printf("\t\tNetmask: %s\n",
|
|
inet_ntop(AF_INET6,
|
|
((struct sockaddr_in6 *)(a->netmask))->sin6_addr.s6_addr,
|
|
ipv6_buf, sizeof ipv6_buf));
|
|
if (a->broadaddr)
|
|
printf("\t\tBroadcast Address: %s\n",
|
|
inet_ntop(AF_INET6,
|
|
((struct sockaddr_in6 *)(a->broadaddr))->sin6_addr.s6_addr,
|
|
ipv6_buf, sizeof ipv6_buf));
|
|
if (a->dstaddr)
|
|
printf("\t\tDestination Address: %s\n",
|
|
inet_ntop(AF_INET6,
|
|
((struct sockaddr_in6 *)(a->dstaddr))->sin6_addr.s6_addr,
|
|
ipv6_buf, sizeof ipv6_buf));
|
|
break;
|
|
#endif
|
|
default:
|
|
printf("\tAddress Family: Unknown (%d)\n", a->addr->sa_family);
|
|
break;
|
|
}
|
|
else
|
|
{
|
|
fprintf(stderr, "\tWarning: a->addr is NULL, skipping this address.\n");
|
|
status = 0;
|
|
}
|
|
}
|
|
printf("\n");
|
|
return status;
|
|
}
|
|
|
|
/* From tcptraceroute */
|
|
#define IPTOSBUFFERS 12
|
|
static char *iptos(bpf_u_int32 in)
|
|
{
|
|
static char output[IPTOSBUFFERS][3*4+3+1];
|
|
static short which;
|
|
u_char *p;
|
|
|
|
p = (u_char *)∈
|
|
which = (which + 1 == IPTOSBUFFERS ? 0 : which + 1);
|
|
sprintf(output[which], "%d.%d.%d.%d", p[0], p[1], p[2], p[3]);
|
|
return output[which];
|
|
}
|