📄 pcap-new.c
字号:
}
}
return 0;
}
// Look for a 'file://' identifier
if ( (ptr= strstr(source, PCAP_SRC_FILE_STRING)) != NULL)
{
ptr+= strlen(PCAP_SRC_FILE_STRING);
if (*ptr)
{
if (name)
strncpy(name, ptr, PCAP_BUF_SIZE);
if (type)
*type= PCAP_SRC_FILE;
return 0;
}
else
{
if (errbuf)
snprintf(errbuf, PCAP_ERRBUF_SIZE, "The file name has not been specified in the source string.");
return -1;
}
}
// Backward compatibility; the user didn't use the 'rpcap://, file://' specifiers
if ( (source) && (*source) )
{
if (name)
strncpy(name, source, PCAP_BUF_SIZE);
if (type)
*type= PCAP_SRC_IFLOCAL;
return 0;
}
else
{
if (errbuf)
snprintf(errbuf, PCAP_ERRBUF_SIZE, "The interface name has not been specified in the source string.");
return -1;
}
};
pcap_t *pcap_open(const char *source, int snaplen, int flags, int read_timeout, struct pcap_rmtauth *auth, char *errbuf)
{
char host[PCAP_BUF_SIZE], port[PCAP_BUF_SIZE], name[PCAP_BUF_SIZE];
int type;
pcap_t *fp;
if (strlen(source) > PCAP_BUF_SIZE)
{
snprintf(errbuf, PCAP_ERRBUF_SIZE, "The source string is too long. Cannot handle it correctly.");
return NULL;
}
// determine the type of the source (file, local, remote)
if (pcap_parsesrcstr(source, &type, host, port, name, errbuf) == -1)
return NULL;
switch (type)
{
case PCAP_SRC_FILE:
fp = pcap_open_offline(name, errbuf);
break;
case PCAP_SRC_IFREMOTE:
// Although we already have host, port and iface, we prefer TO PASS only 'pars' to the
// pcap_open_remote() so that it has to call the pcap_parsesrcstr() again.
// This is less optimized, but much clearer.
fp= pcap_opensource_remote(source, auth, errbuf);
if (fp == NULL)
return NULL;
fp->snapshot= snaplen;
#ifdef linux
fp->md.timeout= read_timeout;
#else
fp->timeout= read_timeout;
#endif
fp->rmt_flags= flags;
break;
case PCAP_SRC_IFLOCAL:
#ifdef WIN32
//
// these flags are supported on Windows only
//
fp = pcap_open_live(name, snaplen, (flags & PCAP_OPENFLAG_PROMISCUOUS), read_timeout, errbuf);
/* disable loopback capture if requested */
if(flags & PCAP_OPENFLAG_NOCAPTURE_LOCAL)
{
if(!PacketSetLoopbackBehavior(fp->adapter, NPF_DISABLE_LOOPBACK))
{
snprintf(errbuf, PCAP_ERRBUF_SIZE, "Unable to disable the capture of loopback packets.");
pcap_close(fp);
return NULL;
}
}
/* set mintocopy to zero if requested */
if(flags & PCAP_OPENFLAG_MAX_RESPONSIVENESS)
{
if(!PacketSetMinToCopy(fp->adapter, 0))
{
snprintf(errbuf, PCAP_ERRBUF_SIZE, "Unable to set max responsiveness.");
pcap_close(fp);
return NULL;
}
}
#endif //WIN32
break;
default:
strcpy(errbuf, "Source type not supported");
return NULL;
}
return fp;
}
struct pcap_samp *pcap_setsampling(pcap_t *p)
{
return &(p->rmt_samp);
}
SOCKET pcap_remoteact_accept(const char *address, const char *port, const char *hostlist, char *connectinghost, struct pcap_rmtauth *auth, char *errbuf)
{
// socket-related variables
struct addrinfo hints; // temporary struct to keep settings needed to open the new socket
struct addrinfo *addrinfo; // keeps the addrinfo chain; required to open a new socket
struct sockaddr_storage from; // generic sockaddr_storage variable
socklen_t fromlen; // keeps the length of the sockaddr_storage variable
SOCKET sockctrl; // keeps the main socket identifier
struct activehosts *temp, *prev; // temp var needed to scan he host list chain
*connectinghost= 0; // just in case
// Prepare to open a new server socket
memset(&hints, 0, sizeof(struct addrinfo));
// WARNING Currently it supports only ONE socket family among ipv4 and IPv6
hints.ai_family = AF_INET; // PF_UNSPEC to have both IPv4 and IPv6 server
hints.ai_flags = AI_PASSIVE; // Ready to a bind() socket
hints.ai_socktype = SOCK_STREAM;
// Warning: this call can be the first one called by the user.
// For this reason, we have to initialize the WinSock support.
if (sock_init(errbuf, PCAP_ERRBUF_SIZE) == -1)
return -1;
// Do the work
if ((port == NULL) || (port[0] == 0) )
{
if (sock_initaddress(address, RPCAP_DEFAULT_NETPORT_ACTIVE, &hints, &addrinfo, errbuf, PCAP_ERRBUF_SIZE) == -1)
{
SOCK_ASSERT(errbuf, 1);
return -2;
}
}
else
{
if (sock_initaddress(address, port, &hints, &addrinfo, errbuf, PCAP_ERRBUF_SIZE) == -1)
{
SOCK_ASSERT(errbuf, 1);
return -2;
}
}
if ( (sockmain= sock_open(addrinfo, SOCKOPEN_SERVER, 1, errbuf, PCAP_ERRBUF_SIZE)) == -1)
{
SOCK_ASSERT(errbuf, 1);
return -2;
}
// Connection creation
fromlen = sizeof(struct sockaddr_storage);
sockctrl= accept(sockmain, (struct sockaddr *) &from, &fromlen);
// We're not using sock_close, since we do not want to send a shutdown
// (which is not allowed on a non-connected socket)
closesocket(sockmain);
sockmain= 0;
if (sockctrl == -1)
{
sock_geterror("accept(): ", errbuf, PCAP_ERRBUF_SIZE);
return -2;
}
// Get the numeric for of the name of the connecting host
if (getnameinfo( (struct sockaddr *) &from, fromlen, connectinghost, RPCAP_HOSTLIST_SIZE, NULL, 0, NI_NUMERICHOST) )
{
sock_geterror("getnameinfo(): ", errbuf, PCAP_ERRBUF_SIZE);
rpcap_senderror(sockctrl, errbuf, PCAP_ERR_REMOTEACCEPT, NULL);
sock_close(sockctrl, NULL, 0);
return -1;
}
// checks if the connecting host is among the ones allowed
if (sock_check_hostlist((char *) hostlist, RPCAP_HOSTLIST_SEP, &from, errbuf, PCAP_ERRBUF_SIZE) < 0)
{
rpcap_senderror(sockctrl, errbuf, PCAP_ERR_REMOTEACCEPT, NULL);
sock_close(sockctrl, NULL, 0);
return -1;
}
// Send authentication to the remote machine
if ( rpcap_sendauth(sockctrl, auth, errbuf) == -1)
{
rpcap_senderror(sockctrl, errbuf, PCAP_ERR_REMOTEACCEPT, NULL);
sock_close(sockctrl, NULL, 0);
return -3;
}
// Checks that this host does not already have a cntrl connection in place
// Initialize pointers
temp= activeHosts;
prev= NULL;
while (temp)
{
// This host already has an active connection in place, so I don't have to update the host list
if (sock_cmpaddr(&temp->host, &from) == 0)
return sockctrl;
prev= temp;
temp= temp->next;
}
// The host does not exist in the list; so I have to update the list
if (prev)
{
prev->next= (struct activehosts *) malloc (sizeof (struct activehosts) );
temp= prev->next;
}
else
{
activeHosts= (struct activehosts *) malloc (sizeof (struct activehosts) );
temp= activeHosts;
}
if (temp == NULL)
{
snprintf(errbuf, PCAP_ERRBUF_SIZE, "malloc() failed: %s", pcap_strerror(errno));
rpcap_senderror(sockctrl, errbuf, PCAP_ERR_REMOTEACCEPT, NULL);
sock_close(sockctrl, NULL, 0);
return -1;
}
memcpy(&temp->host, &from, fromlen);
temp->sockctrl= sockctrl;
temp->next= NULL;
return sockctrl;
}
int pcap_remoteact_close(const char *host, char *errbuf)
{
struct activehosts *temp, *prev; // temp var needed to scan the host list chain
struct addrinfo hints, *addrinfo, *ai_next; // temp var needed to translate between hostname to its address
int retval;
temp= activeHosts;
prev= NULL;
// retrieve the network address corresponding to 'host'
addrinfo = NULL;
memset(&hints, 0, sizeof (struct addrinfo) );
hints.ai_family = PF_UNSPEC;
hints.ai_socktype= SOCK_STREAM;
retval = getaddrinfo(host, "0", &hints, &addrinfo);
if (retval != 0)
{
snprintf(errbuf, PCAP_ERRBUF_SIZE, "getaddrinfo() %s", gai_strerror(retval));
return -1;
}
while (temp)
{
ai_next= addrinfo;
while(ai_next)
{
if (sock_cmpaddr(&temp->host, (struct sockaddr_storage *) ai_next->ai_addr ) == 0)
{
struct rpcap_header header;
// Close this connection
rpcap_createhdr( &header, RPCAP_MSG_CLOSE, 0, 0);
// I don't check for errors, since I'm going to close everything
sock_send(temp->sockctrl, (char *) &header, sizeof (struct rpcap_header), errbuf, PCAP_ERRBUF_SIZE);
if (sock_close(temp->sockctrl, errbuf, PCAP_ERRBUF_SIZE) )
{
// To avoid inconsistencies in the number of sock_init()
sock_cleanup();
return -1;
}
if (prev)
prev->next= temp->next;
else
activeHosts= temp->next;
freeaddrinfo(addrinfo);
free(temp);
// To avoid inconsistencies in the number of sock_init()
sock_cleanup();
return 0;
}
ai_next= ai_next->ai_next;
}
prev= temp;
temp= temp->next;
}
if (addrinfo)
freeaddrinfo(addrinfo);
// To avoid inconsistencies in the number of sock_init()
sock_cleanup();
snprintf(errbuf, PCAP_ERRBUF_SIZE, "The host you want to close the active connection is not known");
return -1;
}
void pcap_remoteact_cleanup()
{
// Very dirty, but it works
if (sockmain)
{
closesocket(sockmain);
// To avoid inconsistencies in the number of sock_init()
sock_cleanup();
}
}
int pcap_remoteact_list(char *hostlist, char sep, int size, char *errbuf)
{
struct activehosts *temp; // temp var needed to scan the host list chain
int len;
char hoststr[RPCAP_HOSTLIST_SIZE + 1];
temp= activeHosts;
len= 0;
*hostlist= 0;
while (temp)
{
//int sock_getascii_addrport(const struct sockaddr_storage *sockaddr, char *address, int addrlen, char *port, int portlen, int flags, char *errbuf, int errbuflen)
// Get the numeric form of the name of the connecting host
if (sock_getascii_addrport( (struct sockaddr_storage *) &temp->host,hoststr,
RPCAP_HOSTLIST_SIZE, NULL, 0, NI_NUMERICHOST, errbuf, PCAP_ERRBUF_SIZE) != -1)
// if (getnameinfo( (struct sockaddr *) &temp->host, sizeof (struct sockaddr_storage), hoststr,
// RPCAP_HOSTLIST_SIZE, NULL, 0, NI_NUMERICHOST) )
{
// sock_geterror("getnameinfo(): ", errbuf, PCAP_ERRBUF_SIZE);
return -1;
}
len= len + strlen(hoststr) + 1 /* the separator */;
if (len >= size)
{
snprintf(errbuf, PCAP_ERRBUF_SIZE, "The string you provided is not able to keep "
"the hostnames for all the active connections");
return -1;
}
strcat(hostlist, hoststr);
hostlist[len - 1]= sep;
hostlist[len]= 0;
temp= temp->next;
}
return 0;
}
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -