1 /* capture-pcap-util-unix.c
2 * UN*X-specific utility routines for packet capture
6 * Wireshark - Network traffic analyzer
7 * By Gerald Combs <gerald@wireshark.org>
8 * Copyright 1998 Gerald Combs
10 * This program is free software; you can redistribute it and/or
11 * modify it under the terms of the GNU General Public License
12 * as published by the Free Software Foundation; either version 2
13 * of the License, or (at your option) any later version.
15 * This program is distributed in the hope that it will be useful,
16 * but WITHOUT ANY WARRANTY; without even the implied warranty of
17 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18 * GNU General Public License for more details.
20 * You should have received a copy of the GNU General Public License
21 * along with this program; if not, write to the Free Software
22 * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
42 #ifdef HAVE_SYS_SOCKET_H
43 #include <sys/socket.h>
46 #ifdef HAVE_SYS_IOCTL_H
47 #include <sys/ioctl.h>
51 * Keep Digital UNIX happy when including <net/if.h>.
57 #ifdef HAVE_SYS_SOCKIO_H
58 # include <sys/sockio.h>
61 #include "capture_ifinfo.h"
62 #include "capture-pcap-util.h"
63 #include "capture-pcap-util-int.h"
65 #ifndef HAVE_PCAP_FINDALLDEVS
66 struct search_user_data {
72 search_for_if_cb(gpointer data, gpointer user_data);
75 #ifdef HAVE_PCAP_REMOTE
77 get_remote_interface_list(const char *hostname, const char *port,
78 int auth_type, const char *username,
79 const char *passwd, int *err, char **err_str)
81 struct pcap_rmtauth auth;
82 char source[PCAP_BUF_SIZE];
83 char errbuf[PCAP_ERRBUF_SIZE];
86 if (pcap_createsrcstr(source, PCAP_SRC_IFREMOTE, hostname, port,
87 NULL, errbuf) == -1) {
88 *err = CANT_GET_INTERFACE_LIST;
90 *err_str = cant_get_if_list_error_message(errbuf);
94 auth.type = auth_type;
95 auth.username = g_strdup(username);
96 auth.password = g_strdup(passwd);
98 result = get_interface_list_findalldevs_ex(source, &auth, err, err_str);
99 g_free(auth.username);
100 g_free(auth.password);
107 get_interface_list(int *err, char **err_str)
109 #ifdef HAVE_PCAP_FINDALLDEVS
110 return get_interface_list_findalldevs(err, err_str);
113 gint nonloopback_pos = 0;
114 struct ifreq *ifr, *last;
116 struct ifreq ifrflags;
117 int sock = socket(AF_INET, SOCK_DGRAM, 0);
118 struct search_user_data user_data;
123 char errbuf[PCAP_ERRBUF_SIZE];
126 *err = CANT_GET_INTERFACE_LIST;
127 if (err_str != NULL) {
128 *err_str = g_strdup_printf(
129 "Can't get list of interfaces: error opening socket: %s",
136 * This code came from: W. Richard Stevens: "UNIX Network Programming",
137 * Networking APIs: Sockets and XTI, Vol 1, page 434.
140 len = 100 * sizeof(struct ifreq);
145 memset (buf, 0, len);
146 if (ioctl(sock, SIOCGIFCONF, &ifc) < 0) {
147 if (errno != EINVAL || lastlen != 0) {
148 if (err_str != NULL) {
149 *err_str = g_strdup_printf(
150 "Can't get list of interfaces: SIOCGIFCONF ioctl error: %s",
156 if ((unsigned) ifc.ifc_len < sizeof(struct ifreq)) {
157 if (err_str != NULL) {
159 "Can't get list of interfaces: SIOCGIFCONF ioctl gave too small return buffer");
163 if (ifc.ifc_len == lastlen)
164 break; /* success, len has not changed */
165 lastlen = ifc.ifc_len;
167 len += 10 * sizeof(struct ifreq); /* increment */
170 ifr = (struct ifreq *) ifc.ifc_req;
171 last = (struct ifreq *) ((char *) ifr + ifc.ifc_len);
174 * Skip entries that begin with "dummy", or that include
175 * a ":" (the latter are Solaris virtuals).
177 if (strncmp(ifr->ifr_name, "dummy", 5) == 0 ||
178 strchr(ifr->ifr_name, ':') != NULL)
182 * If we already have this interface name on the list,
183 * don't add it, but, if we don't already have an IP
184 * address for it, add that address (SIOCGIFCONF returns,
185 * at least on BSD-flavored systems, one entry per
186 * interface *address*; if an interface has multiple
187 * addresses, we get multiple entries for it).
189 user_data.name = ifr->ifr_name;
190 user_data.if_info = NULL;
191 g_list_foreach(il, search_for_if_cb, &user_data);
192 if (user_data.if_info != NULL) {
193 if_info_add_address(user_data.if_info, &ifr->ifr_addr);
198 * Get the interface flags.
200 memset(&ifrflags, 0, sizeof ifrflags);
201 g_strlcpy(ifrflags.ifr_name, ifr->ifr_name,
202 sizeof ifrflags.ifr_name);
203 if (ioctl(sock, SIOCGIFFLAGS, (char *)&ifrflags) < 0) {
206 if (err_str != NULL) {
207 *err_str = g_strdup_printf(
208 "Can't get list of interfaces: SIOCGIFFLAGS error getting flags for interface %s: %s",
209 ifr->ifr_name, strerror(errno));
215 * Skip interfaces that aren't up.
217 if (!(ifrflags.ifr_flags & IFF_UP))
221 * Skip interfaces that we can't open with "libpcap".
222 * Open with the minimum packet size - it appears that the
223 * IRIX SIOCSNOOPLEN "ioctl" may fail if the capture length
224 * supplied is too large, rather than just truncating it.
226 pch = pcap_open_live(ifr->ifr_name, MIN_PACKET_SIZE, 0, 0,
233 * If it's a loopback interface, add it at the end of the
234 * list, otherwise add it after the last non-loopback
235 * interface, so all loopback interfaces go at the end - we
236 * don't want a loopback interface to be the default capture
237 * device unless there are no non-loopback devices.
239 if_info = if_info_new(ifr->ifr_name, NULL);
240 if_info_add_address(if_info, &ifr->ifr_addr);
241 if ((ifrflags.ifr_flags & IFF_LOOPBACK) ||
242 strncmp(ifr->ifr_name, "lo", 2) == 0) {
243 if_info->loopback = TRUE;
244 il = g_list_append(il, if_info);
246 if_info->loopback = FALSE;
247 il = g_list_insert(il, if_info, nonloopback_pos);
249 * Insert the next non-loopback interface after this
257 ifr = (struct ifreq *) ((char *) ifr +
258 (ifr->ifr_addr.sa_len > sizeof(ifr->ifr_addr) ?
259 ifr->ifr_addr.sa_len : sizeof(ifr->ifr_addr)) +
262 ifr = (struct ifreq *) ((char *) ifr + sizeof(struct ifreq));
268 * OK, maybe we have support for the "any" device, to do a cooked
269 * capture on all interfaces at once.
270 * Try opening it and, if that succeeds, add it to the end of
271 * the list of interfaces.
273 pch = pcap_open_live("any", MIN_PACKET_SIZE, 0, 0, errbuf);
276 * It worked; we can use the "any" device.
278 if_info = if_info_new("any",
279 "Pseudo-device that captures on all interfaces");
280 il = g_list_insert(il, if_info, -1);
290 * No interfaces found.
292 *err = NO_INTERFACES_FOUND;
300 free_interface_list(il);
303 *err = CANT_GET_INTERFACE_LIST;
305 #endif /* HAVE_PCAP_FINDALLDEVS */
308 #ifndef HAVE_PCAP_FINDALLDEVS
310 search_for_if_cb(gpointer data, gpointer user_data)
312 struct search_user_data *search_user_data = user_data;
313 if_info_t *if_info = data;
315 if (strcmp(if_info->name, search_user_data->name) == 0)
316 search_user_data->if_info = if_info;
318 #endif /* HAVE_PCAP_FINDALLDEVS */
321 * Get an error message string for a CANT_GET_INTERFACE_LIST error from
322 * "get_interface_list()".
325 cant_get_if_list_error_message(const char *err_str)
327 return g_strdup_printf("Can't get list of interfaces: %s", err_str);
331 * Append the version of libpcap with which we were compiled to a GString.
334 get_compiled_pcap_version(GString *str)
336 #ifdef HAVE_PCAP_VERSION
337 extern char pcap_version[];
339 g_string_append_printf(str, "with libpcap %s", pcap_version);
341 g_string_append(str, "with libpcap (version unknown)");
346 * Append the version of libpcap with which we we're running to a GString.
349 get_runtime_pcap_version(GString *str)
351 g_string_append_printf(str, "with ");
352 #ifdef HAVE_PCAP_LIB_VERSION
353 g_string_append(str, pcap_lib_version());
355 g_string_append(str, "libpcap (version unknown)");
359 #else /* HAVE_LIBPCAP */
362 * Append an indication that we were not compiled with libpcap
366 get_compiled_pcap_version(GString *str)
368 g_string_append(str, "without libpcap");
372 * Don't append anything, as we weren't even compiled to use WinPcap.
375 get_runtime_pcap_version(GString *str _U_)
379 #endif /* HAVE_LIBPCAP */