6 * Copyright (c) 1998 by Gilbert Ramirez <gram@alumni.rice.edu>
8 * This program is free software; you can redistribute it and/or
9 * modify it under the terms of the GNU General Public License
10 * as published by the Free Software Foundation; either version 2
11 * of the License, or (at your option) any later version.
13 * This program is distributed in the hope that it will be useful,
14 * but WITHOUT ANY WARRANTY; without even the implied warranty of
15 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 * GNU General Public License for more details.
18 * You should have received a copy of the GNU General Public License
19 * along with this program; if not, write to the Free Software
20 * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
41 #include <wsutil/file_util.h>
44 #include "file_wrappers.h"
46 #include "lanalyzer.h"
47 #include "airopeek9.h"
48 #include "ngsniffer.h"
50 #include "ascendtext.h"
63 #include "etherpeek.h"
65 #include "dbs-etherwatch.h"
71 #include "network_instruments.h"
74 #include "catapult_dct2000.h"
76 #include "netscreen.h"
81 #include "dct3trace.h"
82 #include "packetlogger.h"
83 #include "daintree-sna.h"
84 #include "netscaler.h"
85 #include "jpeg_jfif.h"
89 /* The open_file_* routines should return:
93 * 1 if the file they're reading is one of the types it handles;
95 * 0 if the file they're reading isn't the type they're checking for.
97 * If the routine handles this type of file, it should set the "file_type"
98 * field in the "struct wtap" to the type of the file.
100 * Put the trace files that are merely saved telnet-sessions last, since it's
101 * possible that you could have captured someone a router telnet-session
102 * using another tool. So, a libpcap trace of an toshiba "snoop" session
103 * should be discovered as a libpcap file, not a toshiba file.
107 static wtap_open_routine_t open_routines_base[] = {
108 /* Files that have magic bytes in fixed locations. These
109 * are easy to identify.
122 network_instruments_open,
126 catapult_dct2000_open,
130 packetlogger_open, /* This type does not have a magic number, but its
131 * files are sometimes grabbed by mpeg_open. */
137 /* Files that don't have magic bytes at a fixed location,
138 * but that instead require a heuristic of some sort to
139 * identify them. This includes the ASCII trace files that
140 * would be, for example, saved copies of a Telnet session
144 /* I put NetScreen *before* erf, because there were some
145 * false positives with my test-files (Sake Blok, July 2007)
166 #define N_FILE_TYPES (sizeof open_routines_base / sizeof open_routines_base[0])
168 static wtap_open_routine_t* open_routines = NULL;
170 static GArray* open_routines_arr = NULL;
173 /* initialize the open routines array if it has not being initialized yet */
174 static void init_open_routines(void) {
176 if (open_routines_arr) return;
178 open_routines_arr = g_array_new(FALSE,TRUE,sizeof(wtap_open_routine_t));
180 g_array_append_vals(open_routines_arr,open_routines_base,N_FILE_TYPES);
182 open_routines = (wtap_open_routine_t*)open_routines_arr->data;
185 void wtap_register_open_routine(wtap_open_routine_t open_routine, gboolean has_magic) {
186 init_open_routines();
189 g_array_prepend_val(open_routines_arr,open_routine);
191 g_array_append_val(open_routines_arr,open_routine);
193 open_routines = (wtap_open_routine_t*)open_routines_arr->data;
197 * Visual C++ on Win32 systems doesn't define these. (Old UNIX systems don't
198 * define them either.)
200 * Visual C++ on Win32 systems doesn't define S_IFIFO, it defines _S_IFIFO.
203 #define S_ISREG(mode) (((mode) & S_IFMT) == S_IFREG)
206 #define S_IFIFO _S_IFIFO
209 #define S_ISFIFO(mode) (((mode) & S_IFMT) == S_IFIFO)
212 #define S_ISDIR(mode) (((mode) & S_IFMT) == S_IFDIR)
215 /* Opens a file and prepares a wtap struct.
216 If "do_random" is TRUE, it opens the file twice; the second open
217 allows the application to do random-access I/O without moving
218 the seek offset for sequential I/O, which is used by Wireshark
219 so that it can do sequential I/O to a capture file that's being
220 written to as new packets arrive independently of random I/O done
221 to display protocol trees for packets when they're selected. */
222 wtap* wtap_open_offline(const char *filename, int *err, char **err_info,
228 gboolean use_stdin = FALSE;
230 /* open standard input if filename is '-' */
231 if (strcmp(filename, "-") == 0)
234 /* First, make sure the file is valid */
236 if (fstat(0, &statb) < 0) {
241 if (ws_stat(filename, &statb) < 0) {
246 if (S_ISFIFO(statb.st_mode)) {
248 * Opens of FIFOs are allowed only when not opening
251 * XXX - currently, we do seeking when trying to find
252 * out the file type, so we don't actually support
253 * opening FIFOs. However, we may eventually
254 * do buffering that allows us to do at least some
255 * file type determination even on pipes, so we
256 * allow FIFO opens and let things fail later when
260 *err = WTAP_ERR_RANDOM_OPEN_PIPE;
263 } else if (S_ISDIR(statb.st_mode)) {
265 * Return different errors for "this is a directory"
266 * and "this is some random special file type", so
267 * the user can get a potentially more helpful error.
271 } else if (! S_ISREG(statb.st_mode)) {
272 *err = WTAP_ERR_NOT_REGULAR_FILE;
277 * We need two independent descriptors for random access, so
278 * they have different file positions. If we're opening the
279 * standard input, we can only dup it to get additional
280 * descriptors, so we can't have two independent descriptors,
281 * and thus can't do random access.
283 if (use_stdin && do_random) {
284 *err = WTAP_ERR_RANDOM_OPEN_STDIN;
289 wth = (wtap *)g_malloc(sizeof(wtap));
296 errno = WTAP_ERR_CANT_OPEN;
299 * We dup FD 0, so that we don't have to worry about
300 * an fclose or gzclose of wth->fh closing the standard
301 * input of the process.
305 _setmode(wth->fd, O_BINARY);
308 wth->fd = ws_open(filename, O_RDONLY|O_BINARY, 0000 /* no creation so don't matter */);
314 if (!(wth->fh = filed_open(wth->fd, "rb"))) {
322 if (!(wth->random_fh = file_open(filename, "rb"))) {
329 wth->random_fh = NULL;
332 wth->file_encap = WTAP_ENCAP_UNKNOWN;
333 wth->data_offset = 0;
334 wth->subtype_sequential_close = NULL;
335 wth->subtype_close = NULL;
336 wth->tsprecision = WTAP_FILE_TSPREC_USEC;
339 init_open_routines();
341 /* Try all file types */
342 for (i = 0; i < open_routines_arr->len; i++) {
343 /* Seek back to the beginning of the file; the open routine
344 for the previous file type may have left the file
345 position somewhere other than the beginning, and the
346 open routine for this file type will probably want
347 to start reading at the beginning.
349 Initialize the data offset while we're at it. */
350 if (file_seek(wth->fh, 0, SEEK_SET, err) == -1) {
351 /* I/O error - give up */
352 if (wth->random_fh != NULL)
353 file_close(wth->random_fh);
358 wth->data_offset = 0;
360 switch ((*open_routines[i])(wth, err, err_info)) {
363 /* I/O error - give up */
364 if (wth->random_fh != NULL)
365 file_close(wth->random_fh);
371 /* No I/O error, but not that type of file */
375 /* We found the file type */
380 /* Well, it's not one of the types of file we know about. */
381 if (wth->random_fh != NULL)
382 file_close(wth->random_fh);
385 *err = WTAP_ERR_FILE_UNKNOWN_FORMAT;
389 wth->frame_buffer = (struct Buffer *)g_malloc(sizeof(struct Buffer));
390 buffer_init(wth->frame_buffer, 1500);
394 /* Table of the file types we know about. */
395 static const struct file_type_info dump_open_table_base[] = {
396 /* WTAP_FILE_UNKNOWN (only used internally for initialization) */
397 { NULL, NULL, NULL, NULL, FALSE,
400 /* WTAP_FILE_WTAP (only used internally while capturing) */
401 { NULL, NULL, NULL, NULL, FALSE,
405 { "Wireshark/tcpdump/... - libpcap", "libpcap", "*.pcap;*.cap", ".pcap", TRUE,
406 libpcap_dump_can_write_encap, libpcap_dump_open },
408 /* WTAP_FILE_PCAP_NSEC */
409 { "Wireshark - nanosecond libpcap", "nseclibpcap", "*.pcap;*.cap", ".pcap", TRUE,
410 libpcap_dump_can_write_encap, libpcap_dump_open },
412 /* WTAP_FILE_PCAP_AIX */
413 { "AIX tcpdump - libpcap", "aixlibpcap", "*.pcap;*.cap", ".pcap", TRUE,
416 /* WTAP_FILE_PCAP_SS991029 */
417 { "Modified tcpdump - libpcap", "modlibpcap", "*.pcap;*.cap", ".pcap", TRUE,
418 libpcap_dump_can_write_encap, libpcap_dump_open },
420 /* WTAP_FILE_PCAP_NOKIA */
421 { "Nokia tcpdump - libpcap ", "nokialibpcap", "*.pcap;*.cap", ".pcap", TRUE,
422 libpcap_dump_can_write_encap, libpcap_dump_open },
424 /* WTAP_FILE_PCAP_SS990417 */
425 { "RedHat 6.1 tcpdump - libpcap", "rh6_1libpcap", "*.pcap;*.cap", ".pcap", TRUE,
426 libpcap_dump_can_write_encap, libpcap_dump_open },
428 /* WTAP_FILE_PCAP_SS990915 */
429 { "SuSE 6.3 tcpdump - libpcap", "suse6_3libpcap", "*.pcap;*.cap", ".pcap", TRUE,
430 libpcap_dump_can_write_encap, libpcap_dump_open },
432 /* WTAP_FILE_5VIEWS */
433 { "Accellent 5Views capture", "5views", "*.5vw", ".5vw", FALSE,
434 _5views_dump_can_write_encap, _5views_dump_open },
436 /* WTAP_FILE_IPTRACE_1_0 */
437 { "AIX iptrace 1.0", "iptrace_1", "*.*", NULL, FALSE,
440 /* WTAP_FILE_IPTRACE_2_0 */
441 { "AIX iptrace 2.0", "iptrace_2", "*.*", NULL, FALSE,
445 { "ASN.1 Basic Encoding Rules", "ber", "*.*", NULL, FALSE,
448 /* WTAP_FILE_HCIDUMP */
449 { "Bluetooth HCI dump", "hcidump", "*.*", NULL, FALSE,
452 /* WTAP_FILE_CATAPULT_DCT2000 */
453 { "Catapult DCT2000 trace (.out format)", "dct2000", "*.out", ".out", FALSE,
454 catapult_dct2000_dump_can_write_encap, catapult_dct2000_dump_open },
456 /* WTAP_FILE_NETXRAY_OLD */
457 { "Cinco Networks NetXRay 1.x", "netxray1", "*.cap", ".cap", FALSE,
460 /* WTAP_FILE_NETXRAY_1_0 */
461 { "Cinco Networks NetXRay 2.0 or later", "netxray2", "*.cap", ".cap", FALSE,
464 /* WTAP_FILE_COSINE */
465 { "CoSine IPSX L2 capture", "cosine", "*.*", NULL, FALSE,
468 /* WTAP_FILE_CSIDS */
469 { "CSIDS IPLog", "csids", "*.*", NULL, FALSE,
472 /* WTAP_FILE_DBS_ETHERWATCH */
473 { "DBS Etherwatch (VMS)", "etherwatch", "*.*", NULL, FALSE,
477 { "Endace ERF capture", "erf", "*.erf", ".erf", FALSE,
480 /* WTAP_FILE_EYESDN */
481 { "EyeSDN USB S0/E1 ISDN trace format", "eyesdn", "*.trc", ".trc", FALSE,
482 eyesdn_dump_can_write_encap, eyesdn_dump_open },
484 /* WTAP_FILE_NETTL */
485 { "HP-UX nettl trace", "nettl", "*.TRC0;*.TRC1", ".TRC0", FALSE,
486 nettl_dump_can_write_encap, nettl_dump_open },
488 /* WTAP_FILE_ISERIES */
489 { "IBM iSeries comm. trace (ASCII)", "iseries_ascii", "*.*", NULL, FALSE,
492 /* WTAP_FILE_ISERIES_UNICODE */
493 { "IBM iSeries comm. trace (UNICODE)", "iseries_unicode", "*.*", NULL, FALSE,
496 /* WTAP_FILE_I4BTRACE */
497 { "I4B ISDN trace", "i4btrace", "*.*", NULL, FALSE,
500 /* WTAP_FILE_ASCEND */
501 { "Lucent/Ascend access server trace", "ascend", "*.*", NULL, FALSE,
504 /* WTAP_FILE_NETMON_1_x */
505 { "Microsoft NetMon 1.x", "netmon1", "*.cap", ".cap", FALSE,
506 netmon_dump_can_write_encap, netmon_dump_open },
508 /* WTAP_FILE_NETMON_2_x */
509 { "Microsoft NetMon 2.x", "netmon2", "*.cap", ".cap", FALSE,
510 netmon_dump_can_write_encap, netmon_dump_open },
512 /* WTAP_FILE_NGSNIFFER_UNCOMPRESSED */
513 { "NA Sniffer (DOS)", "ngsniffer", "*.cap;*.enc;*.trc;*.fdc;*.syc", ".cap", FALSE,
514 ngsniffer_dump_can_write_encap, ngsniffer_dump_open },
516 /* WTAP_FILE_NGSNIFFER_COMPRESSED */
517 { "NA Sniffer (DOS), compressed", "ngsniffer_comp", "*.caz", ".caz", FALSE,
520 /* WTAP_FILE_NETXRAY_1_1 */
521 { "NA Sniffer (Windows) 1.1", "ngwsniffer_1_1", "*.cap", ".cap", FALSE,
522 netxray_dump_can_write_encap_1_1, netxray_dump_open_1_1 },
524 /* WTAP_FILE_NETXRAY_2_00x */
525 { "NA Sniffer (Windows) 2.00x", "ngwsniffer_2_0", "*.cap", ".cap", FALSE,
526 netxray_dump_can_write_encap_2_0, netxray_dump_open_2_0 },
528 /* WTAP_FILE_NETWORK_INSTRUMENTS_V9 */
529 { "Network Instruments Observer (V9)", "niobserverv9", "*.bfr", ".bfr", FALSE,
530 network_instruments_dump_can_write_encap, network_instruments_dump_open },
532 /* WTAP_FILE_LANALYZER */
533 { "Novell LANalyzer","lanalyzer", "*.tr1", ".tr1", FALSE,
534 lanalyzer_dump_can_write_encap, lanalyzer_dump_open },
536 /* WTAP_FILE_PPPDUMP */
537 { "pppd log (pppdump format)", "pppd", "*.*", NULL, FALSE,
540 /* WTAP_FILE_RADCOM */
541 { "RADCOM WAN/LAN analyzer", "radcom", "*.*", NULL, FALSE,
544 /* WTAP_FILE_SNOOP */
545 { "Sun snoop", "snoop", "*.snoop;*.cap", ".snoop", FALSE,
546 snoop_dump_can_write_encap, snoop_dump_open },
548 /* WTAP_FILE_SHOMITI */
549 { "Shomiti/Finisar Surveyor", "shomiti", "*.cap", ".cap", FALSE,
553 { "TCPIPtrace (VMS)", "tcpiptrace", "*.*", NULL, FALSE,
557 { "Tektronix K12xx 32-bit .rf5 format", "rf5", "*.rf5", ".rf5", TRUE,
558 k12_dump_can_write_encap, k12_dump_open },
560 /* WTAP_FILE_TOSHIBA */
561 { "Toshiba Compact ISDN Router snoop", "toshiba", "*.*", NULL, FALSE,
564 /* WTAP_FILE_VISUAL_NETWORKS */
565 { "Visual Networks traffic capture", "visual", "*.*", NULL, FALSE,
566 visual_dump_can_write_encap, visual_dump_open },
568 /* WTAP_FILE_ETHERPEEK_V56 */
569 { "WildPackets Ether/TokenPeek (V5 & V6)", "peek56", "*.tpc;*.apc;*.pkt;*.wpz", ".pkt", FALSE,
572 /* WTAP_FILE_ETHERPEEK_V7 */
573 { "WildPackets Ether/Token/AiroPeek (V7)", "peek7", "*.tpc;*.apc;*.pkt;*.wpz", ".pkt", FALSE,
576 /* WTAP_FILE_ETHERPEEK_V9 */
577 { "WildPackets Ether/AiroPeek (V9)", "peek9", "*.tpc;*.apc;*.pkt;*.wpz", ".pkt", FALSE,
581 { "MPEG", "mpeg", "*.mpeg;*.mpg;*.mp3", ".mpeg", FALSE,
584 /* WTAP_FILE_K12TEXT */
585 { "K12 text file", "k12text", "*.txt", ".txt", TRUE,
586 k12text_dump_can_write_encap, k12text_dump_open },
588 /* WTAP_FILE_NETSCREEN */
589 { "NetScreen snoop text file", "netscreen", "*.*", NULL, FALSE,
592 /* WTAP_FILE_COMMVIEW */
593 { "TamoSoft CommView", "commview", "*.ncf", ".ncf", TRUE,
594 commview_dump_can_write_encap, commview_dump_open },
596 /* WTAP_FILE_PCAPNG */
597 { "Wireshark - pcapng (experimental)", "pcapng", "*.pcapng", NULL, FALSE,
598 pcapng_dump_can_write_encap, pcapng_dump_open },
600 /* WTAP_FILE_BTSNOOP */
601 { "Symbian OS btsnoop", "btsnoop", "*.log", ".log", FALSE,
602 btsnoop_dump_can_write_encap, btsnoop_dump_open_h4 },
604 /* WTAP_FILE_X2E_XORAYA */
605 { NULL, NULL, NULL, NULL, FALSE, NULL, NULL },
608 { "Transport-Neutral Encapsulation Format", "tnef", "*.*", NULL, FALSE, NULL, NULL },
610 /* WTAP_FILE_DCT3TRACE */
611 { "Gammu DCT3 trace", "dct3trace", "*.xml", NULL, FALSE, NULL, NULL },
613 /* WTAP_FILE_PACKETLOGGER */
614 { "PacketLogger", "pklg", "*.pklg", NULL, FALSE, NULL, NULL },
616 /* WTAP_FILE_DAINTREE_SNA */
617 { "Daintree SNA", "dsna", "*.dcf", NULL, FALSE, NULL, NULL },
619 /* WTAP_FILE_NETSCALER_1_0 */
620 { "NetScaler Trace (Version 1.0)", "nstrace10", "*.*", "*.*", FALSE,
621 nstrace_10_dump_can_write_encap, nstrace_dump_open },
623 /* WTAP_FILE_NETSCALER_2_0 */
624 { "NetScaler Trace (Version 2.0)", "nstrace20", "*.cap", "*.cap", FALSE,
625 nstrace_20_dump_can_write_encap, nstrace_dump_open },
627 /* WTAP_FILE_JPEG_JFIF */
628 { "JPEG/JFIF", "jpeg", "*.jpg;*.jpeg;*.jfif", ".jpg", FALSE, NULL, NULL },
630 /* WTAP_FILE_IPFIX */
631 { "IPFIX File Format", "ipfix", "*.pfx;*.ipfix", NULL, FALSE,
635 gint wtap_num_file_types = sizeof(dump_open_table_base) / sizeof(struct file_type_info);
637 static GArray* dump_open_table_arr = NULL;
638 static const struct file_type_info* dump_open_table = dump_open_table_base;
640 /* initialize the open routines array if it has not being initialized yet */
641 static void init_file_types(void) {
643 if (dump_open_table_arr) return;
645 dump_open_table_arr = g_array_new(FALSE,TRUE,sizeof(struct file_type_info));
647 g_array_append_vals(dump_open_table_arr,dump_open_table_base,wtap_num_file_types);
649 dump_open_table = (const struct file_type_info*)dump_open_table_arr->data;
652 int wtap_register_file_type(const struct file_type_info* fi) {
655 g_array_append_val(dump_open_table_arr,*fi);
657 dump_open_table = (const struct file_type_info*)dump_open_table_arr->data;
659 return wtap_num_file_types++;
662 int wtap_get_num_file_types(void)
664 return wtap_num_file_types;
667 /* Name that should be somewhat descriptive. */
668 const char *wtap_file_type_string(int filetype)
670 if (filetype < 0 || filetype >= wtap_num_file_types) {
671 g_error("Unknown capture file type %d", filetype);
674 return dump_open_table[filetype].name;
677 /* Name to use in, say, a command-line flag specifying the type. */
678 const char *wtap_file_type_short_string(int filetype)
680 if (filetype < 0 || filetype >= wtap_num_file_types)
683 return dump_open_table[filetype].short_name;
686 /* Translate a short name to a capture file type. */
687 int wtap_short_string_to_file_type(const char *short_name)
691 for (filetype = 0; filetype < wtap_num_file_types; filetype++) {
692 if (dump_open_table[filetype].short_name != NULL &&
693 strcmp(short_name, dump_open_table[filetype].short_name) == 0)
696 return -1; /* no such file type, or we can't write it */
699 /* file extensions to use. */
700 const char *wtap_file_extensions_string(int filetype)
702 if (filetype < 0 || filetype >= wtap_num_file_types)
705 return dump_open_table[filetype].file_extensions;
708 /* default file extension to use. */
709 const char *wtap_file_extension_default_string(int filetype)
711 if (filetype < 0 || filetype >= wtap_num_file_types)
714 return dump_open_table[filetype].file_extension_default;
717 gboolean wtap_dump_can_open(int filetype)
719 if (filetype < 0 || filetype >= wtap_num_file_types
720 || dump_open_table[filetype].dump_open == NULL)
726 gboolean wtap_dump_can_write_encap(int filetype, int encap)
728 if (filetype < 0 || filetype >= wtap_num_file_types
729 || dump_open_table[filetype].can_write_encap == NULL)
732 if ((*dump_open_table[filetype].can_write_encap)(encap) != 0)
739 gboolean wtap_dump_can_compress(int filetype)
741 if (filetype < 0 || filetype >= wtap_num_file_types
742 || dump_open_table[filetype].can_compress == FALSE)
748 gboolean wtap_dump_can_compress(int filetype _U_)
755 static gboolean wtap_dump_open_check(int filetype, int encap, gboolean comressed, int *err);
756 static wtap_dumper* wtap_dump_alloc_wdh(int filetype, int encap, int snaplen,
757 gboolean compressed, int *err);
758 static gboolean wtap_dump_open_finish(wtap_dumper *wdh, int filetype, gboolean compressed, int *err);
760 static FILE_T wtap_dump_file_open(wtap_dumper *wdh, const char *filename);
761 static FILE_T wtap_dump_file_fdopen(wtap_dumper *wdh, int fd);
762 static int wtap_dump_file_close(wtap_dumper *wdh);
764 wtap_dumper* wtap_dump_open(const char *filename, int filetype, int encap,
765 int snaplen, gboolean compressed, int *err)
770 /* Check whether we can open a capture file with that file type
771 and that encapsulation. */
772 if (!wtap_dump_open_check(filetype, encap, compressed, err))
775 /* Allocate a data structure for the output stream. */
776 wdh = wtap_dump_alloc_wdh(filetype, encap, snaplen, compressed, err);
778 return NULL; /* couldn't allocate it */
780 /* "-" means stdout */
781 if (strcmp(filename, "-") == 0) {
784 return NULL; /* compress won't work on stdout */
787 setmode(fileno(stdout), O_BINARY);
791 /* In case "fopen()" fails but doesn't set "errno", set "errno"
792 to a generic "the open failed" error. */
793 errno = WTAP_ERR_CANT_OPEN;
794 fh = wtap_dump_file_open(wdh, filename);
798 return NULL; /* can't create file */
803 if (!wtap_dump_open_finish(wdh, filetype, compressed, err)) {
804 /* Get rid of the file we created; we couldn't finish
806 if (wdh->fh != stdout) {
807 wtap_dump_file_close(wdh);
816 wtap_dumper* wtap_dump_fdopen(int fd, int filetype, int encap, int snaplen,
817 gboolean compressed, int *err)
822 /* Check whether we can open a capture file with that file type
823 and that encapsulation. */
824 if (!wtap_dump_open_check(filetype, encap, compressed, err))
827 /* Allocate a data structure for the output stream. */
828 wdh = wtap_dump_alloc_wdh(filetype, encap, snaplen, compressed, err);
830 return NULL; /* couldn't allocate it */
834 setmode(fileno(stdout), O_BINARY);
838 /* In case "fopen()" fails but doesn't set "errno", set "errno"
839 to a generic "the open failed" error. */
840 errno = WTAP_ERR_CANT_OPEN;
841 fh = wtap_dump_file_fdopen(wdh, fd);
845 return NULL; /* can't create standard I/O stream */
849 if (!wtap_dump_open_finish(wdh, filetype, compressed, err)) {
850 wtap_dump_file_close(wdh);
857 static gboolean wtap_dump_open_check(int filetype, int encap, gboolean compressed, int *err)
859 if (!wtap_dump_can_open(filetype)) {
860 /* Invalid type, or type we don't know how to write. */
861 *err = WTAP_ERR_UNSUPPORTED_FILE_TYPE;
865 /* OK, we know how to write that type; can we write the specified
866 encapsulation type? */
867 *err = (*dump_open_table[filetype].can_write_encap)(encap);
871 /* if compression is wanted, do we support this for this filetype? */
872 if(compressed && !wtap_dump_can_compress(filetype)) {
873 *err = WTAP_ERR_COMPRESSION_NOT_SUPPORTED;
877 *err = (*dump_open_table[filetype].can_write_encap)(encap);
882 /* All systems go! */
886 static wtap_dumper* wtap_dump_alloc_wdh(int filetype, int encap, int snaplen,
887 gboolean compressed, int *err)
891 wdh = (wtap_dumper *)g_malloc(sizeof (wtap_dumper));
897 wdh->file_type = filetype;
898 wdh->snaplen = snaplen;
900 wdh->compressed = compressed;
901 wdh->bytes_dumped = 0;
903 wdh->subtype_write = NULL;
904 wdh->subtype_close = NULL;
908 static gboolean wtap_dump_open_finish(wtap_dumper *wdh, int filetype, gboolean compressed, int *err)
913 /* Can we do a seek on the file descriptor?
914 If not, note that fact. */
918 fd = fileno(wdh->fh);
919 if (lseek(fd, 1, SEEK_CUR) == -1)
923 lseek(fd, 0, SEEK_SET);
928 /* Now try to open the file for writing. */
929 if (!(*dump_open_table[filetype].dump_open)(wdh, cant_seek, err)) {
933 return TRUE; /* success! */
936 gboolean wtap_dump(wtap_dumper *wdh, const struct wtap_pkthdr *phdr,
937 const union wtap_pseudo_header *pseudo_header, const guchar *pd, int *err)
939 return (wdh->subtype_write)(wdh, phdr, pseudo_header, pd, err);
942 void wtap_dump_flush(wtap_dumper *wdh)
945 if(wdh->compressed) {
946 gzflush(wdh->fh, Z_SYNC_FLUSH); /* XXX - is Z_SYNC_FLUSH the right one? */
954 gboolean wtap_dump_close(wtap_dumper *wdh, int *err)
958 if (wdh->subtype_close != NULL) {
959 /* There's a close routine for this dump stream. */
960 if (!(wdh->subtype_close)(wdh, err))
963 errno = WTAP_ERR_CANT_CLOSE;
964 /* Don't close stdout */
965 if (wdh->fh != stdout) {
966 if (wtap_dump_file_close(wdh) == EOF) {
968 /* The per-format close function succeeded,
969 but the fclose didn't. Save the reason
970 why, if our caller asked for it. */
977 /* as we don't close stdout, at least try to flush it */
978 wtap_dump_flush(wdh);
980 if (wdh->priv != NULL)
986 gint64 wtap_get_bytes_dumped(wtap_dumper *wdh)
988 return wdh->bytes_dumped;
991 void wtap_set_bytes_dumped(wtap_dumper *wdh, gint64 bytes_dumped)
993 wdh->bytes_dumped = bytes_dumped;
997 /* internally open a file for writing (compressed or not) */
999 static FILE_T wtap_dump_file_open(wtap_dumper *wdh, const char *filename)
1001 if(wdh->compressed) {
1002 return gzopen(filename, "wb");
1004 return ws_fopen(filename, "wb");
1008 static FILE_T wtap_dump_file_open(wtap_dumper *wdh _U_, const char *filename)
1010 return ws_fopen(filename, "wb");
1014 /* internally open a file for writing (compressed or not) */
1016 static FILE_T wtap_dump_file_fdopen(wtap_dumper *wdh, int fd)
1018 if(wdh->compressed) {
1019 return gzdopen(fd, "wb");
1021 return fdopen(fd, "wb");
1025 static FILE_T wtap_dump_file_fdopen(wtap_dumper *wdh _U_, int fd)
1027 return fdopen(fd, "wb");
1031 /* internally writing raw bytes (compressed or not) */
1032 gboolean wtap_dump_file_write(wtap_dumper *wdh, const void *buf, size_t bufsize,
1041 if (wdh->compressed) {
1042 nwritten = gzwrite(wdh->fh, buf, (unsigned) bufsize);
1044 * At least according to zlib.h, gzwrite returns 0
1045 * on error; that appears to be the case in libz
1048 if (nwritten == 0) {
1049 gzerror(wdh->fh, &errnum);
1050 if (errnum == Z_ERRNO)
1054 * XXX - what to do with this zlib-specific
1064 nwritten = fwrite(buf, 1, bufsize, wdh->fh);
1066 * At least according to the Mac OS X man page,
1067 * this can return a short count on an error.
1069 if (nwritten != bufsize) {
1070 if (ferror(wdh->fh))
1073 *err = WTAP_ERR_SHORT_WRITE;
1080 /* internally close a file for writing (compressed or not) */
1081 static int wtap_dump_file_close(wtap_dumper *wdh)
1084 if(wdh->compressed) {
1085 return gzclose(wdh->fh);
1089 return fclose(wdh->fh);