1 /* -*- Mode: c; tab-width: 8; indent-tabs-mode: 1; c-basic-offset: 8; -*- */
3 * Copyright (c) 1994, 1995, 1996, 1997, 1998
4 * The Regents of the University of California. All rights reserved.
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions
9 * 1. Redistributions of source code must retain the above copyright
10 * notice, this list of conditions and the following disclaimer.
11 * 2. Redistributions in binary form must reproduce the above copyright
12 * notice, this list of conditions and the following disclaimer in the
13 * documentation and/or other materials provided with the distribution.
14 * 3. All advertising materials mentioning features or use of this software
15 * must display the following acknowledgement:
16 * This product includes software developed by the Computer Systems
17 * Engineering Group at Lawrence Berkeley Laboratory.
18 * 4. Neither the name of the University nor of the Laboratory may be used
19 * to endorse or promote products derived from this software without
20 * specific prior written permission.
22 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
23 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
24 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
25 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
26 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
27 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
28 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
29 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
30 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
31 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
36 static const char rcsid
[] _U_
=
37 "@(#) $Header: /tcpdump/master/libpcap/inet.c,v 1.66.2.6 2007/06/11 09:52:04 guy Exp $ (LBL)";
45 #include <pcap-stdinc.h>
48 #include <sys/param.h>
52 #include <sys/ioctl.h>
53 #include <sys/socket.h>
54 #ifdef HAVE_SYS_SOCKIO_H
55 #include <sys/sockio.h>
58 struct mbuf
; /* Squelch compiler warnings on some platforms for */
59 struct rtentry
; /* declarations in <net/if.h> */
61 #include <netinet/in.h>
70 #if !defined(WIN32) && !defined(__BORLANDC__)
72 #endif /* !WIN32 && !__BORLANDC__ */
76 #define INT_MAX 2147483647
81 #ifdef HAVE_OS_PROTO_H
85 /* Not all systems have IFF_LOOPBACK */
87 #define ISLOOPBACK(name, flags) ((flags) & IFF_LOOPBACK)
89 #define ISLOOPBACK(name, flags) ((name)[0] == 'l' && (name)[1] == 'o' && \
90 (isdigit((unsigned char)((name)[2])) || (name)[2] == '\0'))
94 dup_sockaddr(struct sockaddr
*sa
, size_t sa_length
)
96 struct sockaddr
*newsa
;
98 if ((newsa
= malloc(sa_length
)) == NULL
)
100 return (memcpy(newsa
, sa
, sa_length
));
104 get_instance(const char *name
)
106 const char *cp
, *endcp
;
109 if (strcmp(name
, "any") == 0) {
111 * Give the "any" device an artificially high instance
112 * number, so it shows up after all other non-loopback
118 endcp
= name
+ strlen(name
);
119 for (cp
= name
; cp
< endcp
&& !isdigit((unsigned char)*cp
); ++cp
)
122 if (isdigit((unsigned char)*cp
))
130 add_or_find_if(pcap_if_t
**curdev_ret
, pcap_if_t
**alldevs
, const char *name
,
131 u_int flags
, const char *description
, char *errbuf
)
134 pcap_if_t
*curdev
, *prevdev
, *nextdev
;
138 * Is there already an entry in the list for this interface?
140 for (curdev
= *alldevs
; curdev
!= NULL
; curdev
= curdev
->next
) {
141 if (strcmp(name
, curdev
->name
) == 0)
142 break; /* yes, we found it */
145 if (curdev
== NULL
) {
147 * No, we didn't find it.
149 * Can we open this interface for live capture?
151 * We do this check so that interfaces that are
152 * supplied by the interface enumeration mechanism
153 * we're using but that don't support packet capture
154 * aren't included in the list. Loopback interfaces
155 * on Solaris are an example of this; we don't just
156 * omit loopback interfaces on all platforms because
157 * you *can* capture on loopback interfaces on some
160 * On OS X, we don't do this check if the device
161 * name begins with "wlt"; at least some versions
162 * of OS X offer monitor mode capturing by having
163 * a separate "monitor mode" device for each wireless
164 * adapter, rather than by implementing the ioctls
165 * that {Free,Net,Open,DragonFly}BSD provide.
166 * Opening that device puts the adapter into monitor
167 * mode, which, at least for some adapters, causes
168 * them to deassociate from the network with which
169 * they're associated.
171 * Instead, we try to open the corresponding "en"
172 * device (so that we don't end up with, for users
173 * without sufficient privilege to open capture
174 * devices, a list of adapters that only includes
178 if (strncmp(name
, "wlt", 3) == 0) {
183 * Try to allocate a buffer for the "en"
186 en_name_len
= strlen(name
) - 1;
187 en_name
= malloc(en_name_len
+ 1);
188 if (en_name
== NULL
) {
189 (void)snprintf(errbuf
, PCAP_ERRBUF_SIZE
,
190 "malloc: %s", pcap_strerror(errno
));
193 strcpy(en_name
, "en");
194 strcat(en_name
, name
+ 3);
195 p
= pcap_open_live(en_name
, 68, 0, 0, errbuf
);
199 p
= pcap_open_live(name
, 68, 0, 0, errbuf
);
202 * No. Don't bother including it.
203 * Don't treat this as an error, though.
211 * Yes, we can open it.
212 * Allocate a new entry.
214 curdev
= malloc(sizeof(pcap_if_t
));
215 if (curdev
== NULL
) {
216 (void)snprintf(errbuf
, PCAP_ERRBUF_SIZE
,
217 "malloc: %s", pcap_strerror(errno
));
225 curdev
->name
= strdup(name
);
226 if (curdev
->name
== NULL
) {
227 (void)snprintf(errbuf
, PCAP_ERRBUF_SIZE
,
228 "malloc: %s", pcap_strerror(errno
));
232 if (description
!= NULL
) {
234 * We have a description for this interface.
236 curdev
->description
= strdup(description
);
237 if (curdev
->description
== NULL
) {
238 (void)snprintf(errbuf
, PCAP_ERRBUF_SIZE
,
239 "malloc: %s", pcap_strerror(errno
));
248 curdev
->description
= NULL
;
250 curdev
->addresses
= NULL
; /* list starts out as empty */
252 if (ISLOOPBACK(name
, flags
))
253 curdev
->flags
|= PCAP_IF_LOOPBACK
;
256 * Add it to the list, in the appropriate location.
257 * First, get the instance number of this interface.
259 this_instance
= get_instance(name
);
262 * Now look for the last interface with an instance number
263 * less than or equal to the new interface's instance
264 * number - except that non-loopback interfaces are
265 * arbitrarily treated as having interface numbers less
266 * than those of loopback interfaces, so the loopback
267 * interfaces are put at the end of the list.
269 * We start with "prevdev" being NULL, meaning we're before
270 * the first element in the list.
275 * Get the interface after this one.
277 if (prevdev
== NULL
) {
279 * The next element is the first element.
283 nextdev
= prevdev
->next
;
286 * Are we at the end of the list?
288 if (nextdev
== NULL
) {
290 * Yes - we have to put the new entry
297 * Is the new interface a non-loopback interface
298 * and the next interface a loopback interface?
300 if (!(curdev
->flags
& PCAP_IF_LOOPBACK
) &&
301 (nextdev
->flags
& PCAP_IF_LOOPBACK
)) {
303 * Yes, we should put the new entry
304 * before "nextdev", i.e. after "prevdev".
310 * Is the new interface's instance number less
311 * than the next interface's instance number,
312 * and is it the case that the new interface is a
313 * non-loopback interface or the next interface is
314 * a loopback interface?
316 * (The goal of both loopback tests is to make
317 * sure that we never put a loopback interface
318 * before any non-loopback interface and that we
319 * always put a non-loopback interface before all
320 * loopback interfaces.)
322 if (this_instance
< get_instance(nextdev
->name
) &&
323 (!(curdev
->flags
& PCAP_IF_LOOPBACK
) ||
324 (nextdev
->flags
& PCAP_IF_LOOPBACK
))) {
326 * Yes - we should put the new entry
327 * before "nextdev", i.e. after "prevdev".
336 * Insert before "nextdev".
338 curdev
->next
= nextdev
;
341 * Insert after "prevdev" - unless "prevdev" is null,
342 * in which case this is the first interface.
344 if (prevdev
== NULL
) {
346 * This is the first interface. Pass back a
347 * pointer to it, and put "curdev" before
352 prevdev
->next
= curdev
;
355 *curdev_ret
= curdev
;
360 add_addr_to_iflist(pcap_if_t
**alldevs
, const char *name
, u_int flags
,
361 struct sockaddr
*addr
, size_t addr_size
,
362 struct sockaddr
*netmask
, size_t netmask_size
,
363 struct sockaddr
*broadaddr
, size_t broadaddr_size
,
364 struct sockaddr
*dstaddr
, size_t dstaddr_size
,
368 pcap_addr_t
*curaddr
, *prevaddr
, *nextaddr
;
370 if (add_or_find_if(&curdev
, alldevs
, name
, flags
, NULL
, errbuf
) == -1) {
376 if (curdev
== NULL
) {
378 * Device wasn't added because it can't be opened.
385 * "curdev" is an entry for this interface; add an entry for this
386 * address to its list of addresses.
388 * Allocate the new entry and fill it in.
390 curaddr
= malloc(sizeof(pcap_addr_t
));
391 if (curaddr
== NULL
) {
392 (void)snprintf(errbuf
, PCAP_ERRBUF_SIZE
,
393 "malloc: %s", pcap_strerror(errno
));
397 curaddr
->next
= NULL
;
399 curaddr
->addr
= dup_sockaddr(addr
, addr_size
);
400 if (curaddr
->addr
== NULL
) {
401 (void)snprintf(errbuf
, PCAP_ERRBUF_SIZE
,
402 "malloc: %s", pcap_strerror(errno
));
407 curaddr
->addr
= NULL
;
409 if (netmask
!= NULL
) {
410 curaddr
->netmask
= dup_sockaddr(netmask
, netmask_size
);
411 if (curaddr
->netmask
== NULL
) {
412 (void)snprintf(errbuf
, PCAP_ERRBUF_SIZE
,
413 "malloc: %s", pcap_strerror(errno
));
414 if (curaddr
->addr
!= NULL
)
420 curaddr
->netmask
= NULL
;
422 if (broadaddr
!= NULL
) {
423 curaddr
->broadaddr
= dup_sockaddr(broadaddr
, broadaddr_size
);
424 if (curaddr
->broadaddr
== NULL
) {
425 (void)snprintf(errbuf
, PCAP_ERRBUF_SIZE
,
426 "malloc: %s", pcap_strerror(errno
));
427 if (curaddr
->netmask
!= NULL
)
428 free(curaddr
->netmask
);
429 if (curaddr
->addr
!= NULL
)
435 curaddr
->broadaddr
= NULL
;
437 if (dstaddr
!= NULL
) {
438 curaddr
->dstaddr
= dup_sockaddr(dstaddr
, dstaddr_size
);
439 if (curaddr
->dstaddr
== NULL
) {
440 (void)snprintf(errbuf
, PCAP_ERRBUF_SIZE
,
441 "malloc: %s", pcap_strerror(errno
));
442 if (curaddr
->broadaddr
!= NULL
)
443 free(curaddr
->broadaddr
);
444 if (curaddr
->netmask
!= NULL
)
445 free(curaddr
->netmask
);
446 if (curaddr
->addr
!= NULL
)
452 curaddr
->dstaddr
= NULL
;
455 * Find the end of the list of addresses.
457 for (prevaddr
= curdev
->addresses
; prevaddr
!= NULL
; prevaddr
= nextaddr
) {
458 nextaddr
= prevaddr
->next
;
459 if (nextaddr
== NULL
) {
461 * This is the end of the list.
467 if (prevaddr
== NULL
) {
469 * The list was empty; this is the first member.
471 curdev
->addresses
= curaddr
;
474 * "prevaddr" is the last member of the list; append
477 prevaddr
->next
= curaddr
;
484 pcap_add_if(pcap_if_t
**devlist
, const char *name
, u_int flags
,
485 const char *description
, char *errbuf
)
489 return (add_or_find_if(&curdev
, devlist
, name
, flags
, description
,
495 * Free a list of interfaces.
498 pcap_freealldevs(pcap_if_t
*alldevs
)
500 pcap_if_t
*curdev
, *nextdev
;
501 pcap_addr_t
*curaddr
, *nextaddr
;
503 for (curdev
= alldevs
; curdev
!= NULL
; curdev
= nextdev
) {
504 nextdev
= curdev
->next
;
507 * Free all addresses.
509 for (curaddr
= curdev
->addresses
; curaddr
!= NULL
; curaddr
= nextaddr
) {
510 nextaddr
= curaddr
->next
;
513 if (curaddr
->netmask
)
514 free(curaddr
->netmask
);
515 if (curaddr
->broadaddr
)
516 free(curaddr
->broadaddr
);
517 if (curaddr
->dstaddr
)
518 free(curaddr
->dstaddr
);
523 * Free the name string.
528 * Free the description string, if any.
530 if (curdev
->description
!= NULL
)
531 free(curdev
->description
);
534 * Free the interface.
540 #if !defined(WIN32) && !defined(MSDOS)
543 * Return the name of a network interface attached to the system, or NULL
544 * if none can be found. The interface must be configured up; the
545 * lowest unit number is preferred; loopback is ignored.
548 pcap_lookupdev(errbuf
)
549 register char *errbuf
;
552 /* for old BSD systems, including bsdi3 */
554 #define IF_NAMESIZE IFNAMSIZ
556 static char device
[IF_NAMESIZE
+ 1];
559 if (pcap_findalldevs(&alldevs
, errbuf
) == -1)
562 if (alldevs
== NULL
|| (alldevs
->flags
& PCAP_IF_LOOPBACK
)) {
564 * There are no devices on the list, or the first device
565 * on the list is a loopback device, which means there
566 * are no non-loopback devices on the list. This means
567 * we can't return any device.
569 * XXX - why not return a loopback device? If we can't
570 * capture on it, it won't be on the list, and if it's
571 * on the list, there aren't any non-loopback devices,
572 * so why not just supply it as the default device?
574 (void)strlcpy(errbuf
, "no suitable device found",
579 * Return the name of the first device on the list.
581 (void)strlcpy(device
, alldevs
->name
, sizeof(device
));
585 pcap_freealldevs(alldevs
);
590 pcap_lookupnet(device
, netp
, maskp
, errbuf
)
591 register const char *device
;
592 register bpf_u_int32
*netp
, *maskp
;
593 register char *errbuf
;
596 register struct sockaddr_in
*sin4
;
600 * The pseudo-device "any" listens on all interfaces and therefore
601 * has the network address and -mask "0.0.0.0" therefore catching
602 * all traffic. Using NULL for the interface is the same as "any".
604 if (!device
|| strcmp(device
, "any") == 0
606 || strstr(device
, "dag") != NULL
608 #ifdef HAVE_SEPTEL_API
609 || strstr(device
, "septel") != NULL
616 fd
= socket(AF_INET
, SOCK_DGRAM
, 0);
618 (void)snprintf(errbuf
, PCAP_ERRBUF_SIZE
, "socket: %s",
619 pcap_strerror(errno
));
622 memset(&ifr
, 0, sizeof(ifr
));
624 /* XXX Work around Linux kernel bug */
625 ifr
.ifr_addr
.sa_family
= AF_INET
;
627 (void)strncpy(ifr
.ifr_name
, device
, sizeof(ifr
.ifr_name
));
628 if (ioctl(fd
, SIOCGIFADDR
, (char *)&ifr
) < 0) {
629 if (errno
== EADDRNOTAVAIL
) {
630 (void)snprintf(errbuf
, PCAP_ERRBUF_SIZE
,
631 "%s: no IPv4 address assigned", device
);
633 (void)snprintf(errbuf
, PCAP_ERRBUF_SIZE
,
634 "SIOCGIFADDR: %s: %s",
635 device
, pcap_strerror(errno
));
640 sin4
= (struct sockaddr_in
*)&ifr
.ifr_addr
;
641 *netp
= sin4
->sin_addr
.s_addr
;
642 if (ioctl(fd
, SIOCGIFNETMASK
, (char *)&ifr
) < 0) {
643 (void)snprintf(errbuf
, PCAP_ERRBUF_SIZE
,
644 "SIOCGIFNETMASK: %s: %s", device
, pcap_strerror(errno
));
649 *maskp
= sin4
->sin_addr
.s_addr
;
651 if (IN_CLASSA(*netp
))
652 *maskp
= IN_CLASSA_NET
;
653 else if (IN_CLASSB(*netp
))
654 *maskp
= IN_CLASSB_NET
;
655 else if (IN_CLASSC(*netp
))
656 *maskp
= IN_CLASSC_NET
;
658 (void)snprintf(errbuf
, PCAP_ERRBUF_SIZE
,
659 "inet class for 0x%x unknown", *netp
);
670 * Return the name of a network interface attached to the system, or NULL
671 * if none can be found. The interface must be configured up; the
672 * lowest unit number is preferred; loopback is ignored.
675 pcap_lookupdev(errbuf
)
676 register char *errbuf
;
679 DWORD dwWindowsMajorVersion
;
680 dwVersion
= GetVersion(); /* get the OS version */
681 dwWindowsMajorVersion
= (DWORD
)(LOBYTE(LOWORD(dwVersion
)));
683 if (dwVersion
>= 0x80000000 && dwWindowsMajorVersion
>= 4) {
685 * Windows 95, 98, ME.
687 ULONG NameLength
= 8192;
688 static char AdaptersName
[8192];
690 if (PacketGetAdapterNames(AdaptersName
,&NameLength
) )
691 return (AdaptersName
);
696 * Windows NT (NT 4.0, W2K, WXP). Convert the names to UNICODE for backward compatibility
698 ULONG NameLength
= 8192;
699 static WCHAR AdaptersName
[8192];
702 WCHAR
*TAdaptersName
= (WCHAR
*)malloc(8192 * sizeof(WCHAR
));
705 if(TAdaptersName
== NULL
)
707 (void)snprintf(errbuf
, PCAP_ERRBUF_SIZE
, "memory allocation failure");
711 if ( !PacketGetAdapterNames((PTSTR
)TAdaptersName
,&NameLength
) )
713 (void)snprintf(errbuf
, PCAP_ERRBUF_SIZE
,
714 "PacketGetAdapterNames: %s",
715 pcap_win32strerror());
721 tAstr
= (char*)TAdaptersName
;
722 tUstr
= (WCHAR
*)AdaptersName
;
725 * Convert and copy the device names
727 while(sscanf(tAstr
, "%S", tUstr
) > 0)
729 tAstr
+= strlen(tAstr
) + 1;
730 tUstr
+= wcslen(tUstr
) + 1;
739 * Copy the descriptions
743 strcpy((char*)tUstr
, tAstr
);
744 (char*)tUstr
+= strlen(tAstr
) + 1;;
745 tAstr
+= strlen(tAstr
) + 1;
749 return (char *)(AdaptersName
);
755 pcap_lookupnet(device
, netp
, maskp
, errbuf
)
756 register const char *device
;
757 register bpf_u_int32
*netp
, *maskp
;
758 register char *errbuf
;
761 * We need only the first IPv4 address, so we must scan the array returned by PacketGetNetInfo()
762 * in order to skip non IPv4 (i.e. IPv6 addresses)
764 npf_if_addr if_addrs
[MAX_NETWORK_ADDRESSES
];
765 LONG if_addr_size
= 1;
766 struct sockaddr_in
*t_addr
;
769 if (!PacketGetNetInfoEx((void *)device
, if_addrs
, &if_addr_size
)) {
774 for(i
=0; i
<MAX_NETWORK_ADDRESSES
; i
++)
776 if(if_addrs
[i
].IPAddress
.ss_family
== AF_INET
)
778 t_addr
= (struct sockaddr_in
*) &(if_addrs
[i
].IPAddress
);
779 *netp
= t_addr
->sin_addr
.S_un
.S_addr
;
780 t_addr
= (struct sockaddr_in
*) &(if_addrs
[i
].SubnetMask
);
781 *maskp
= t_addr
->sin_addr
.S_un
.S_addr
;
793 #endif /* !WIN32 && !MSDOS */