Add 'dtds' and 'fix' directories to the checklicense whitelist, they don't
[metze/wireshark/wip.git] / wiretap / iptrace.c
index 9281b6b80ceb7063ab56f8491bb7473932a7dbec..6fc466afd4b304c4ca170f8dc72198f02f59dd21 100644 (file)
  *
  * You should have received a copy of the GNU General Public License
  * along with this program; if not, write to the Free Software
- * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA  02111-1307, USA.
+ * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
  *
  */
-#ifdef HAVE_CONFIG_H
 #include "config.h"
-#endif
 #include <stdlib.h>
 #include <errno.h>
 #include <string.h>
 #include "atm.h"
 #include "iptrace.h"
 
+#define IPTRACE_IFT_HF 0x3d    /* Support for PERCS IP-HFI*/
+#define IPTRACE_IFT_IB  0xc7    /* IP over Infiniband. Number by IANA */
+
 static gboolean iptrace_read_1_0(wtap *wth, int *err, gchar **err_info,
-    long *data_offset);
-static gboolean iptrace_seek_read_1_0(wtap *wth, long seek_off,
-    union wtap_pseudo_header *pseudo_header, guchar *pd, int packet_size,
+    gint64 *data_offset);
+static gboolean iptrace_seek_read_1_0(wtap *wth, gint64 seek_off,
+    struct wtap_pkthdr *phdr, guint8 *pd, int packet_size,
     int *err, gchar **err_info);
 
 static gboolean iptrace_read_2_0(wtap *wth, int *err, gchar **err_info,
-    long *data_offset);
-static gboolean iptrace_seek_read_2_0(wtap *wth, long seek_off,
-    union wtap_pseudo_header *pseudo_header, guchar *pd, int packet_size,
+    gint64 *data_offset);
+static gboolean iptrace_seek_read_2_0(wtap *wth, gint64 seek_off,
+    struct wtap_pkthdr *phdr, guint8 *pd, int packet_size,
     int *err, gchar **err_info);
 
 static int iptrace_read_rec_header(FILE_T fh, guint8 *header, int header_len,
-    int *err);
+    int *err, gchar **err_info);
 static gboolean iptrace_read_rec_data(FILE_T fh, guint8 *data_ptr,
-    int packet_size, int *err);
+    int packet_size, int *err, gchar **err_info);
 static void fill_in_pseudo_header(int encap, const guint8 *pd, guint32 len,
     union wtap_pseudo_header *pseudo_header, guint8 *header);
 static int wtap_encap_ift(unsigned int  ift);
 
-int iptrace_open(wtap *wth, int *err, gchar **err_info _U_)
+int iptrace_open(wtap *wth, int *err, gchar **err_info)
 {
        int bytes_read;
        char name[12];
 
        errno = WTAP_ERR_CANT_READ;
-       bytes_read = file_read(name, 1, 11, wth->fh);
+       bytes_read = file_read(name, 11, wth->fh);
        if (bytes_read != 11) {
-               *err = file_error(wth->fh);
-               if (*err != 0)
+               *err = file_error(wth->fh, err_info);
+               if (*err != 0 && *err != WTAP_ERR_SHORT_READ)
                        return -1;
                return 0;
        }
-       wth->data_offset += 11;
-       name[11] = 0;
+       name[11] = '\0';
 
        if (strcmp(name, "iptrace 1.0") == 0) {
                wth->file_type = WTAP_FILE_IPTRACE_1_0;
                wth->subtype_read = iptrace_read_1_0;
                wth->subtype_seek_read = iptrace_seek_read_1_0;
+               wth->tsprecision = WTAP_FILE_TSPREC_SEC;
        }
        else if (strcmp(name, "iptrace 2.0") == 0) {
                wth->file_type = WTAP_FILE_IPTRACE_2_0;
                wth->subtype_read = iptrace_read_2_0;
                wth->subtype_seek_read = iptrace_seek_read_2_0;
+               wth->tsprecision = WTAP_FILE_TSPREC_NSEC;
        }
        else {
                return 0;
@@ -121,25 +123,24 @@ typedef struct {
 #define IPTRACE_1_0_PDATA_SIZE 22      /* packet data */
 
 /* Read the next packet */
-static gboolean iptrace_read_1_0(wtap *wth, int *err, gchar **err_info _U_,
-    long *data_offset)
+static gboolean iptrace_read_1_0(wtap *wth, int *err, gchar **err_info,
+    gint64 *data_offset)
 {
        int                     ret;
        guint32                 packet_size;
        guint8                  header[IPTRACE_1_0_PHDR_SIZE];
        guint8                  *data_ptr;
        iptrace_1_0_phdr        pkt_hdr;
-       guchar                  fddi_padding[3];
+       guint8                  fddi_padding[3];
 
        /* Read the descriptor data */
-       *data_offset = wth->data_offset;
+       *data_offset = file_tell(wth->fh);
        ret = iptrace_read_rec_header(wth->fh, header, IPTRACE_1_0_PHDR_SIZE,
-           err);
+           err, err_info);
        if (ret <= 0) {
                /* Read error or EOF */
                return FALSE;
        }
-       wth->data_offset += IPTRACE_1_0_PHDR_SIZE;
 
        /*
         * Byte 28 of the frame header appears to be a BSD-style IFT_xxx
@@ -150,7 +151,18 @@ static gboolean iptrace_read_1_0(wtap *wth, int *err, gchar **err_info _U_,
        wth->phdr.pkt_encap = wtap_encap_ift(pkt_hdr.if_type);
 
        /* Read the packet data */
-       packet_size = pntohl(&header[0]) - IPTRACE_1_0_PDATA_SIZE;
+       packet_size = pntohl(&header[0]);
+       if (packet_size < IPTRACE_1_0_PDATA_SIZE) {
+               /*
+                * Uh-oh, the record isn't big enough to even have a
+                * packet meta-data header.
+                */
+               *err = WTAP_ERR_BAD_FILE;
+               *err_info = g_strdup_printf("iptrace: file has a %u-byte record, too small to have even a packet meta-data header",
+                   packet_size);
+               return FALSE;
+       }
+       packet_size -= IPTRACE_1_0_PDATA_SIZE;
 
        /*
         * AIX appears to put 3 bytes of padding in front of FDDI
@@ -161,22 +173,43 @@ static gboolean iptrace_read_1_0(wtap *wth, int *err, gchar **err_info _U_,
                 * The packet size is really a record size and includes
                 * the padding.
                 */
+               if (packet_size < 3) {
+                       /*
+                        * Uh-oh, the record isn't big enough to even have
+                        * the padding.
+                        */
+                       *err = WTAP_ERR_BAD_FILE;
+                       *err_info = g_strdup_printf("iptrace: file has a %u-byte record, too small to have even a packet meta-data header",
+                           packet_size + IPTRACE_1_0_PDATA_SIZE);
+                       return FALSE;
+               }
                packet_size -= 3;
-               wth->data_offset += 3;
 
                /*
                 * Read the padding.
                 */
-               if (!iptrace_read_rec_data(wth->fh, fddi_padding, 3, err))
+               if (!iptrace_read_rec_data(wth->fh, fddi_padding, 3, err,
+                   err_info))
                        return FALSE;   /* Read error */
        }
+       if (packet_size > WTAP_MAX_PACKET_SIZE) {
+               /*
+                * Probably a corrupt capture file; don't blow up trying
+                * to allocate space for an immensely-large packet.
+                */
+               *err = WTAP_ERR_BAD_FILE;
+               *err_info = g_strdup_printf("iptrace: File has %u-byte packet, bigger than maximum of %u",
+                   packet_size, WTAP_MAX_PACKET_SIZE);
+               return FALSE;
+       }
 
        buffer_assure_space( wth->frame_buffer, packet_size );
        data_ptr = buffer_start_ptr( wth->frame_buffer );
-       if (!iptrace_read_rec_data(wth->fh, data_ptr, packet_size, err))
+       if (!iptrace_read_rec_data(wth->fh, data_ptr, packet_size, err,
+           err_info))
                return FALSE;   /* Read error */
-       wth->data_offset += packet_size;
 
+       wth->phdr.presence_flags = WTAP_HAS_TS;
        wth->phdr.len = packet_size;
        wth->phdr.caplen = packet_size;
        wth->phdr.ts.secs = pntohl(&header[4]);
@@ -191,7 +224,7 @@ static gboolean iptrace_read_1_0(wtap *wth, int *err, gchar **err_info _U_,
 
        /* Fill in the pseudo-header. */
        fill_in_pseudo_header(wth->phdr.pkt_encap, data_ptr, wth->phdr.caplen,
-           &wth->pseudo_header, header);
+           &wth->phdr.pseudo_header, header);
 
        /* If the per-file encapsulation isn't known, set it to this
           packet's encapsulation.
@@ -209,21 +242,22 @@ static gboolean iptrace_read_1_0(wtap *wth, int *err, gchar **err_info _U_,
        return TRUE;
 }
 
-static gboolean iptrace_seek_read_1_0(wtap *wth, long seek_off,
-    union wtap_pseudo_header *pseudo_header, guchar *pd, int packet_size,
-    int *err, gchar **err_info _U_)
+static gboolean iptrace_seek_read_1_0(wtap *wth, gint64 seek_off,
+    struct wtap_pkthdr *phdr, guint8 *pd, int packet_size,
+    int *err, gchar **err_info)
 {
+       union wtap_pseudo_header *pseudo_header = &phdr->pseudo_header;
        int                     ret;
        guint8                  header[IPTRACE_1_0_PHDR_SIZE];
        int                     pkt_encap;
-       guchar                  fddi_padding[3];
+       guint8                  fddi_padding[3];
 
        if (file_seek(wth->random_fh, seek_off, SEEK_SET, err) == -1)
                return FALSE;
 
        /* Read the descriptor data */
        ret = iptrace_read_rec_header(wth->random_fh, header,
-           IPTRACE_1_0_PHDR_SIZE, err);
+           IPTRACE_1_0_PHDR_SIZE, err, err_info);
        if (ret <= 0) {
                /* Read error or EOF */
                if (ret == 0) {
@@ -246,12 +280,14 @@ static gboolean iptrace_seek_read_1_0(wtap *wth, long seek_off,
                /*
                 * Read the padding.
                 */
-               if (!iptrace_read_rec_data(wth->random_fh, fddi_padding, 3, err))
+               if (!iptrace_read_rec_data(wth->random_fh, fddi_padding, 3,
+                   err, err_info))
                        return FALSE;   /* Read error */
        }
 
        /* Get the packet data */
-       if (!iptrace_read_rec_data(wth->random_fh, pd, packet_size, err))
+       if (!iptrace_read_rec_data(wth->random_fh, pd, packet_size, err,
+           err_info))
                return FALSE;
 
        /* Fill in the pseudo_header. */
@@ -300,25 +336,24 @@ typedef struct {
 #define IPTRACE_2_0_PDATA_SIZE 32      /* packet data */
 
 /* Read the next packet */
-static gboolean iptrace_read_2_0(wtap *wth, int *err, gchar **err_info _U_,
-    long *data_offset)
+static gboolean iptrace_read_2_0(wtap *wth, int *err, gchar **err_info,
+    gint64 *data_offset)
 {
        int                     ret;
        guint32                 packet_size;
        guint8                  header[IPTRACE_2_0_PHDR_SIZE];
        guint8                  *data_ptr;
        iptrace_2_0_phdr        pkt_hdr;
-       guchar                  fddi_padding[3];
+       guint8                  fddi_padding[3];
 
        /* Read the descriptor data */
-       *data_offset = wth->data_offset;
+       *data_offset = file_tell(wth->fh);
        ret = iptrace_read_rec_header(wth->fh, header, IPTRACE_2_0_PHDR_SIZE,
-           err);
+           err, err_info);
        if (ret <= 0) {
                /* Read error or EOF */
                return FALSE;
        }
-       wth->data_offset += IPTRACE_2_0_PHDR_SIZE;
 
        /*
         * Byte 28 of the frame header appears to be a BSD-style IFT_xxx
@@ -329,7 +364,18 @@ static gboolean iptrace_read_2_0(wtap *wth, int *err, gchar **err_info _U_,
        wth->phdr.pkt_encap = wtap_encap_ift(pkt_hdr.if_type);
 
        /* Read the packet data */
-       packet_size = pntohl(&header[0]) - IPTRACE_2_0_PDATA_SIZE;
+       packet_size = pntohl(&header[0]);
+       if (packet_size < IPTRACE_2_0_PDATA_SIZE) {
+               /*
+                * Uh-oh, the record isn't big enough to even have a
+                * packet meta-data header.
+                */
+               *err = WTAP_ERR_BAD_FILE;
+               *err_info = g_strdup_printf("iptrace: file has a %u-byte record, too small to have even a packet meta-data header",
+                   packet_size);
+               return FALSE;
+       }
+       packet_size -= IPTRACE_2_0_PDATA_SIZE;
 
        /*
         * AIX appears to put 3 bytes of padding in front of FDDI
@@ -340,41 +386,67 @@ static gboolean iptrace_read_2_0(wtap *wth, int *err, gchar **err_info _U_,
                 * The packet size is really a record size and includes
                 * the padding.
                 */
+               if (packet_size < 3) {
+                       /*
+                        * Uh-oh, the record isn't big enough to even have
+                        * the padding.
+                        */
+                       *err = WTAP_ERR_BAD_FILE;
+                       *err_info = g_strdup_printf("iptrace: file has a %u-byte record, too small to have even a packet meta-data header",
+                           packet_size + IPTRACE_2_0_PDATA_SIZE);
+                       return FALSE;
+               }
                packet_size -= 3;
-               wth->data_offset += 3;
 
                /*
                 * Read the padding.
                 */
-               if (!iptrace_read_rec_data(wth->fh, fddi_padding, 3, err))
+               if (!iptrace_read_rec_data(wth->fh, fddi_padding, 3, err,
+                   err_info))
                        return FALSE;   /* Read error */
        }
+       if (packet_size > WTAP_MAX_PACKET_SIZE) {
+               /*
+                * Probably a corrupt capture file; don't blow up trying
+                * to allocate space for an immensely-large packet.
+                */
+               *err = WTAP_ERR_BAD_FILE;
+               *err_info = g_strdup_printf("iptrace: File has %u-byte packet, bigger than maximum of %u",
+                   packet_size, WTAP_MAX_PACKET_SIZE);
+               return FALSE;
+       }
 
        buffer_assure_space( wth->frame_buffer, packet_size );
        data_ptr = buffer_start_ptr( wth->frame_buffer );
-       if (!iptrace_read_rec_data(wth->fh, data_ptr, packet_size, err))
+       if (!iptrace_read_rec_data(wth->fh, data_ptr, packet_size, err,
+           err_info))
                return FALSE;   /* Read error */
-       wth->data_offset += packet_size;
-
-       /* AIX saves time in nsec, not usec. It's easier to make iptrace
-        * files more Unix-compliant here than try to get the calling
-        * program to know when to use nsec or usec */
 
+       wth->phdr.presence_flags = WTAP_HAS_TS;
        wth->phdr.len = packet_size;
        wth->phdr.caplen = packet_size;
        wth->phdr.ts.secs = pntohl(&header[32]);
        wth->phdr.ts.nsecs = pntohl(&header[36]);
 
+/* We used to error out if the interface in iptrace was unknown/unhandled,
+ * but an iptrace may contain packets from a variety of interfaces, ome known,
+ * and others unknown. It is better to display the data even for unknown interface
+ * types, isntead of erroring out. In the future, it would be nice to be able to
+ * flag which frames are shown as data because their interface type is unknown,
+ * and also preset the interface type number to the user so that it can be
+ * reported easily back to the Wireshark develoer.
+
        if (wth->phdr.pkt_encap == WTAP_ENCAP_UNKNOWN) {
                *err = WTAP_ERR_UNSUPPORTED_ENCAP;
                *err_info = g_strdup_printf("iptrace: interface type IFT=0x%02x unknown or unsupported",
                    pkt_hdr.if_type);
                return FALSE;
        }
+*/
 
        /* Fill in the pseudo-header. */
        fill_in_pseudo_header(wth->phdr.pkt_encap, data_ptr, wth->phdr.caplen,
-           &wth->pseudo_header, header);
+           &wth->phdr.pseudo_header, header);
 
        /* If the per-file encapsulation isn't known, set it to this
           packet's encapsulation.
@@ -392,21 +464,22 @@ static gboolean iptrace_read_2_0(wtap *wth, int *err, gchar **err_info _U_,
        return TRUE;
 }
 
-static gboolean iptrace_seek_read_2_0(wtap *wth, long seek_off,
-    union wtap_pseudo_header *pseudo_header, guchar *pd, int packet_size,
-    int *err, gchar **err_info _U_)
+static gboolean iptrace_seek_read_2_0(wtap *wth, gint64 seek_off,
+    struct wtap_pkthdr *phdr, guint8 *pd, int packet_size,
+    int *err, gchar **err_info)
 {
+       union wtap_pseudo_header *pseudo_header = &phdr->pseudo_header;
        int                     ret;
        guint8                  header[IPTRACE_2_0_PHDR_SIZE];
        int                     pkt_encap;
-       guchar                  fddi_padding[3];
+       guint8                  fddi_padding[3];
 
        if (file_seek(wth->random_fh, seek_off, SEEK_SET, err) == -1)
                return FALSE;
 
        /* Read the descriptor data */
        ret = iptrace_read_rec_header(wth->random_fh, header,
-           IPTRACE_2_0_PHDR_SIZE, err);
+           IPTRACE_2_0_PHDR_SIZE, err, err_info);
        if (ret <= 0) {
                /* Read error or EOF */
                if (ret == 0) {
@@ -429,12 +502,14 @@ static gboolean iptrace_seek_read_2_0(wtap *wth, long seek_off,
                /*
                 * Read the padding.
                 */
-               if (!iptrace_read_rec_data(wth->random_fh, fddi_padding, 3, err))
+               if (!iptrace_read_rec_data(wth->random_fh, fddi_padding, 3,
+                   err, err_info))
                        return FALSE;   /* Read error */
        }
 
        /* Get the packet data */
-       if (!iptrace_read_rec_data(wth->random_fh, pd, packet_size, err))
+       if (!iptrace_read_rec_data(wth->random_fh, pd, packet_size, err,
+           err_info))
                return FALSE;
 
        /* Fill in the pseudo-header. */
@@ -445,14 +520,15 @@ static gboolean iptrace_seek_read_2_0(wtap *wth, long seek_off,
 }
 
 static int
-iptrace_read_rec_header(FILE_T fh, guint8 *header, int header_len, int *err)
+iptrace_read_rec_header(FILE_T fh, guint8 *header, int header_len, int *err,
+    gchar **err_info)
 {
        int     bytes_read;
 
        errno = WTAP_ERR_CANT_READ;
-       bytes_read = file_read(header, 1, header_len, fh);
+       bytes_read = file_read(header, header_len, fh);
        if (bytes_read != header_len) {
-               *err = file_error(fh);
+               *err = file_error(fh, err_info);
                if (*err != 0)
                        return -1;
                if (bytes_read != 0) {
@@ -465,15 +541,16 @@ iptrace_read_rec_header(FILE_T fh, guint8 *header, int header_len, int *err)
 }
 
 static gboolean
-iptrace_read_rec_data(FILE_T fh, guint8 *data_ptr, int packet_size, int *err)
+iptrace_read_rec_data(FILE_T fh, guint8 *data_ptr, int packet_size, int *err,
+    gchar **err_info)
 {
        int     bytes_read;
 
        errno = WTAP_ERR_CANT_READ;
-       bytes_read = file_read( data_ptr, 1, packet_size, fh );
+       bytes_read = file_read( data_ptr, packet_size, fh );
 
        if (bytes_read != packet_size) {
-               *err = file_error(fh);
+               *err = file_error(fh, err_info);
                if (*err == 0)
                        *err = WTAP_ERR_SHORT_READ;
                return FALSE;
@@ -516,9 +593,9 @@ fill_in_pseudo_header(int encap, const guint8 *pd, guint32 len,
                decimal = strchr(if_text, '.');
                if (decimal) {
                        *decimal = '\0';
-                       Vpi = strtoul(if_text, NULL, 10);
+                       Vpi = (int)strtoul(if_text, NULL, 10);
                        decimal++;
-                       Vci = strtoul(decimal, NULL, 10);
+                       Vci = (int)strtoul(decimal, NULL, 10);
                }
 
                /*
@@ -604,6 +681,28 @@ wtap_encap_ift(unsigned int  ift)
                return ift_encap[ift];
        }
        else {
-               return WTAP_ENCAP_UNKNOWN;
+               switch(ift) {
+                       /* Infiniband*/
+                       case IPTRACE_IFT_IB:
+                               return WTAP_ENCAP_INFINIBAND;
+                               break;
+
+                       /* Host Fabric Interface */
+                       case IPTRACE_IFT_HF:
+                               /* The HFI interface on AIX provides raw IP
+                               in the packet trace. It's unclear if the HFI
+                               can be configured for any other protocol, and if
+                               any field in the iptrace header indicates what
+                               that protocol is. For now, we are hard-coding
+                               this as RAW_IP, but if we find another iptrace file
+                               using HFI that provides another protocol, we will
+                               have to figure out which field in the iptrace file
+                               encodes it. */
+                               return WTAP_ENCAP_RAW_IP;
+                               break;
+
+                       default:
+                               return WTAP_ENCAP_UNKNOWN;
+               }
        }
 }