2 * Reports capture file information including # of packets, duration, others
4 * Copyright 2004 Ian Schorr
8 * Wireshark - Network traffic analyzer
9 * By Gerald Combs <gerald@wireshark.org>
10 * Copyright 1998 Gerald Combs
12 * This program is free software; you can redistribute it and/or
13 * modify it under the terms of the GNU General Public License
14 * as published by the Free Software Foundation; either version 2
15 * of the License, or (at your option) any later version.
17 * This program is distributed in the hope that it will be useful,
18 * but WITHOUT ANY WARRANTY; without even the implied warranty of
19 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
20 * GNU General Public License for more details.
22 * You should have received a copy of the GNU General Public License
23 * along with this program; if not, write to the Free Software
24 * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
30 * New capinfos features
32 * Continue processing additional files after
33 * a wiretap open failure. The new -C option
34 * reverts to capinfos' original behavior which
35 * is to cancels any further file processing at
36 * first file open failure.
38 * Change the behavior of how the default display
39 * of all infos is initiated. This gets rid of a
40 * special post getopt() argument count test.
42 * Add new table output format (with related options)
43 * This feature allows outputting the various infos
44 * into a tab delimited text file, or to a comma
45 * separated variables file (*.csv) instead of the
46 * original "long" format.
64 #ifdef HAVE_SYS_TIME_H
70 #include <epan/packet.h>
71 #include <epan/filesystem.h>
72 #include <epan/plugins.h>
73 #include <epan/report_err.h>
75 #include <wsutil/privileges.h>
79 #include <wsutil/file_util.h>
85 #include "wsutil/wsgetopt.h"
92 #include "svnversion.h"
95 * By default capinfos now continues processing
96 * the next filename if and when wiretap detects
97 * a problem opening a file.
98 * Use the '-C' option to revert back to original
99 * capinfos behavior which is to abort any
100 * additional file processing at first open file
104 static gboolean continue_after_wtap_open_offline_failure = TRUE;
107 * table report variables
110 static gboolean long_report = TRUE; /* By default generate long report */
111 static gchar table_report_header = TRUE; /* Generate column header by default */
112 static gchar field_separator = '\t'; /* Use TAB as field separator by default */
113 static gchar quote_char = '\0'; /* Do NOT quote fields by default */
116 * capinfos has the ability to report on a number of
117 * various characteristics ("infos") for each input file.
119 * By default reporting of all info fields is enabled.
121 * Optionally the reporting of any specific info field
122 * or combination of info fields can be enabled with
123 * individual options.
126 static gboolean report_all_infos = TRUE; /* Report all infos */
128 static gboolean cap_file_type = TRUE; /* Report capture type */
129 static gboolean cap_file_encap = TRUE; /* Report encapsulation */
130 static gboolean cap_snaplen = TRUE; /* Packet size limit (snaplen)*/
131 static gboolean cap_packet_count = TRUE; /* Report packet count */
132 static gboolean cap_file_size = TRUE; /* Report file size */
134 static gboolean cap_data_size = TRUE; /* Report packet byte size */
135 static gboolean cap_duration = TRUE; /* Report capture duration */
136 static gboolean cap_start_time = TRUE; /* Report capture start time */
137 static gboolean cap_end_time = TRUE; /* Report capture end time */
138 static gboolean time_as_secs = FALSE; /* Report time values as raw seconds */
140 static gboolean cap_data_rate_byte = TRUE; /* Report data rate bytes/sec */
141 static gboolean cap_data_rate_bit = TRUE; /* Report data rate bites/sec */
142 static gboolean cap_packet_size = TRUE; /* Report average packet size */
143 static gboolean cap_packet_rate = TRUE; /* Report average packet rate */
144 static gboolean cap_in_order = TRUE; /* Report if packets are in chronological order (True/False) */
146 #ifdef HAVE_LIBGCRYPT
147 static gboolean cap_file_hashes = TRUE; /* Calculate file hashes */
150 #ifdef HAVE_LIBGCRYPT
151 #define HASH_SIZE_SHA1 20
152 #define HASH_SIZE_RMD160 20
153 #define HASH_SIZE_MD5 16
155 #define HASH_STR_SIZE (41) /* Max hash size * 2 + '\0' */
156 #define HASH_BUF_SIZE (1024 * 1024)
159 static gchar file_sha1[HASH_STR_SIZE];
160 static gchar file_rmd160[HASH_STR_SIZE];
161 static gchar file_md5[HASH_STR_SIZE];
163 #define FILE_HASH_OPT "H"
165 #define FILE_HASH_OPT ""
166 #endif /* HAVE_LIBGCRYPT */
168 typedef struct _capture_info {
169 const char *filename;
174 guint64 packet_bytes;
177 guint32 packet_count;
178 gboolean snap_set; /* If set in capture file header */
179 guint32 snaplen; /* value from the capture file header */
180 guint32 snaplen_min_inferred; /* If caplen < len for 1 or more rcds */
181 guint32 snaplen_max_inferred; /* ... */
182 gboolean drops_known;
188 double data_rate; /* in bytes */
193 enable_all_infos(void)
195 report_all_infos = TRUE;
197 cap_file_type = TRUE;
198 cap_file_encap = TRUE;
200 cap_packet_count = TRUE;
201 cap_file_size = TRUE;
203 cap_data_size = TRUE;
205 cap_start_time = TRUE;
209 cap_data_rate_byte = TRUE;
210 cap_data_rate_bit = TRUE;
211 cap_packet_size = TRUE;
212 cap_packet_rate = TRUE;
214 #ifdef HAVE_LIBGCRYPT
215 cap_file_hashes = TRUE;
216 #endif /* HAVE_LIBGCRYPT */
220 disable_all_infos(void)
222 report_all_infos = FALSE;
224 cap_file_type = FALSE;
225 cap_file_encap = FALSE;
227 cap_packet_count = FALSE;
228 cap_file_size = FALSE;
230 cap_data_size = FALSE;
231 cap_duration = FALSE;
232 cap_start_time = FALSE;
233 cap_end_time = FALSE;
234 cap_in_order = FALSE;
236 cap_data_rate_byte = FALSE;
237 cap_data_rate_bit = FALSE;
238 cap_packet_size = FALSE;
239 cap_packet_rate = FALSE;
241 #ifdef HAVE_LIBGCRYPT
242 cap_file_hashes = FALSE;
243 #endif /* HAVE_LIBGCRYPT */
249 * This function simply truncates the string returned
250 * from the ctime() function to remove the trailing
253 * The ctime() function returns a string formatted as:
254 * "Www Mmm dd hh:mm:ss yyyy\n"
255 * The unwanted '\n' is the 24th character.
259 ctime_no_lf(const time_t* timer)
262 time_string = ctime(timer);
263 time_string[24] = '\0';
268 time_string(const time_t *timer, capture_info *cf_info, gboolean want_lf)
270 const gchar *lf = want_lf ? "\n" : "";
271 static gchar time_string_buf[15];
273 if (cf_info->packet_count > 0) {
275 /* XXX - Would it be useful to show sub-second precision? */
276 g_snprintf(time_string_buf, 15, "%lu%s", (unsigned long) *timer, lf);
277 return time_string_buf;
278 } else if (want_lf) {
281 return ctime_no_lf(timer);
285 g_snprintf(time_string_buf, 15, "n/a%s", lf);
286 return time_string_buf;
290 secs_nsecs(const struct wtap_nstime * nstime)
292 return (nstime->nsecs / 1000000000.0) + (double)nstime->secs;
295 static void print_value(const gchar *text_p1, gint width, const gchar *text_p2, double value) {
297 printf("%s%.*f%s\n", text_p1, width, value, text_p2);
299 printf("%sn/a\n", text_p1);
303 print_stats(const gchar *filename, capture_info *cf_info)
305 const gchar *file_type_string, *file_encap_string;
309 /* Build printable strings for various stats */
310 file_type_string = wtap_file_type_string(cf_info->file_type);
311 file_encap_string = wtap_encap_string(cf_info->file_encap);
312 start_time_t = (time_t)cf_info->start_time;
313 stop_time_t = (time_t)cf_info->stop_time;
315 if (filename) printf ("File name: %s\n", filename);
316 if (cap_file_type) printf ("File type: %s\n", file_type_string);
317 if (cap_file_encap) printf ("File encapsulation: %s\n", file_encap_string);
318 if (cap_snaplen && cf_info->snap_set)
319 printf ("Packet size limit: file hdr: %u bytes\n", cf_info->snaplen);
320 else if(cap_snaplen && !cf_info->snap_set)
321 printf ("Packet size limit: file hdr: (not set)\n");
322 if (cf_info->snaplen_max_inferred > 0) {
323 if (cf_info->snaplen_min_inferred == cf_info->snaplen_max_inferred)
324 printf ("Packet size limit: inferred: %u bytes\n", cf_info->snaplen_min_inferred);
326 printf ("Packet size limit: inferred: %u bytes - %u bytes (range)\n",
327 cf_info->snaplen_min_inferred, cf_info->snaplen_max_inferred);
329 if (cap_packet_count) printf ("Number of packets: %u\n", cf_info->packet_count);
330 if (cap_file_size) printf ("File size: %" G_GINT64_MODIFIER "d bytes\n", cf_info->filesize);
331 if (cap_data_size) printf ("Data size: %" G_GINT64_MODIFIER "u bytes\n", cf_info->packet_bytes);
332 if (cap_duration) print_value("Capture duration: ", 0, " seconds", cf_info->duration);
333 if (cap_start_time) printf ("Start time: %s", time_string(&start_time_t, cf_info, TRUE));
334 if (cap_end_time) printf ("End time: %s", time_string(&stop_time_t, cf_info, TRUE));
335 if (cap_data_rate_byte) print_value("Data byte rate: ", 2, " bytes/sec", cf_info->data_rate);
336 if (cap_data_rate_bit) print_value("Data bit rate: ", 2, " bits/sec", cf_info->data_rate*8);
337 if (cap_packet_size) printf ("Average packet size: %.2f bytes\n", cf_info->packet_size);
338 if (cap_packet_rate) print_value("Average packet rate: ", 2, " packets/sec", cf_info->packet_rate);
339 #ifdef HAVE_LIBGCRYPT
340 if (cap_file_hashes) {
341 printf ("SHA1: %s\n", file_sha1);
342 printf ("RIPEMD160: %s\n", file_rmd160);
343 printf ("MD5: %s\n", file_md5);
345 if (cap_in_order) printf ("Strict time order: %s\n", (cf_info->in_order) ? "True" : "False");
346 #endif /* HAVE_LIBGCRYPT */
352 if (field_separator) putchar(field_separator);
358 if (quote_char) putchar(quote_char);
362 print_stats_table_header_label(const gchar *label)
371 print_stats_table_header(void)
377 if (cap_file_type) print_stats_table_header_label("File type");
378 if (cap_file_encap) print_stats_table_header_label("File encapsulation");
379 if (cap_snaplen) print_stats_table_header_label("Packet size limit");
380 if (cap_snaplen) print_stats_table_header_label("Packet size limit min (inferred)");
381 if (cap_snaplen) print_stats_table_header_label("Packet size limit max (inferred)");
382 if (cap_packet_count) print_stats_table_header_label("Number of packets");
383 if (cap_file_size) print_stats_table_header_label("File size (bytes)");
384 if (cap_data_size) print_stats_table_header_label("Data size (bytes)");
385 if (cap_duration) print_stats_table_header_label("Capture duration (seconds)");
386 if (cap_start_time) print_stats_table_header_label("Start time");
387 if (cap_end_time) print_stats_table_header_label("End time");
388 if (cap_data_rate_byte) print_stats_table_header_label("Data byte rate (bytes/sec)");
389 if (cap_data_rate_bit) print_stats_table_header_label("Data bit rate (bits/sec)");
390 if (cap_packet_size) print_stats_table_header_label("Average packet size (bytes)");
391 if (cap_packet_rate) print_stats_table_header_label("Average packet rate (packets/sec)");
392 #ifdef HAVE_LIBGCRYPT
393 if (cap_file_hashes) {
394 print_stats_table_header_label("SHA1");
395 print_stats_table_header_label("RIPEMD160");
396 print_stats_table_header_label("MD5");
398 if (cap_in_order) print_stats_table_header_label("Strict time order");
399 #endif /* HAVE_LIBGCRYPT */
405 print_stats_table(const gchar *filename, capture_info *cf_info)
407 const gchar *file_type_string, *file_encap_string;
411 /* Build printable strings for various stats */
412 file_type_string = wtap_file_type_string(cf_info->file_type);
413 file_encap_string = wtap_encap_string(cf_info->file_encap);
414 start_time_t = (time_t)cf_info->start_time;
415 stop_time_t = (time_t)cf_info->stop_time;
419 printf("%s", filename);
426 printf("%s", file_type_string);
430 if (cap_file_encap) {
433 printf("%s", file_encap_string);
440 if(cf_info->snap_set)
441 printf("%u", cf_info->snaplen);
445 if (cf_info->snaplen_max_inferred > 0) {
448 printf("%u", cf_info->snaplen_min_inferred);
452 printf("%u", cf_info->snaplen_max_inferred);
467 if (cap_packet_count) {
470 printf("%u", cf_info->packet_count);
477 printf("%" G_GINT64_MODIFIER "d", cf_info->filesize);
484 printf("%" G_GINT64_MODIFIER "u", cf_info->packet_bytes);
491 printf("%f", cf_info->duration);
495 if (cap_start_time) {
498 printf("%s", time_string(&start_time_t, cf_info, FALSE));
505 printf("%s", time_string(&stop_time_t, cf_info, FALSE));
509 if (cap_data_rate_byte) {
512 printf("%.2f", cf_info->data_rate);
516 if (cap_data_rate_bit) {
519 printf("%.2f", cf_info->data_rate*8);
523 if (cap_packet_size) {
526 printf("%.2f", cf_info->packet_size);
530 if (cap_packet_rate) {
533 printf("%.2f", cf_info->packet_rate);
537 #ifdef HAVE_LIBGCRYPT
538 if (cap_file_hashes) {
541 printf("%s", file_sha1);
546 printf("%s", file_rmd160);
551 printf("%s", file_md5);
554 #endif /* HAVE_LIBGCRYPT */
559 printf("%s", (cf_info->in_order) ? "True" : "False");
567 process_cap_file(wtap *wth, const char *filename)
576 guint32 snaplen_min_inferred = 0xffffffff;
577 guint32 snaplen_max_inferred = 0;
578 const struct wtap_pkthdr *phdr;
579 capture_info cf_info;
580 double start_time = 0;
581 double stop_time = 0;
583 double prev_time = 0;
584 gboolean in_order = TRUE;
586 /* Tally up data that we need to parse through the file to find */
587 while (wtap_read(wth, &err, &err_info, &data_offset)) {
588 phdr = wtap_phdr(wth);
589 prev_time = cur_time;
590 cur_time = secs_nsecs(&phdr->ts);
592 start_time = cur_time;
593 stop_time = cur_time;
594 prev_time = cur_time;
596 if (cur_time < prev_time) {
599 if (cur_time < start_time) {
600 start_time = cur_time;
602 if (cur_time > stop_time) {
603 stop_time = cur_time;
609 /* If caplen < len for a rcd, then presumably */
610 /* 'Limit packet capture length' was done for this rcd. */
611 /* Keep track as to the min/max actual snapshot lengths */
612 /* seen for this file. */
613 if (phdr->caplen < phdr->len) {
614 if (phdr->caplen < snaplen_min_inferred)
615 snaplen_min_inferred = phdr->caplen;
616 if (phdr->caplen > snaplen_max_inferred)
617 snaplen_max_inferred = phdr->caplen;
624 "capinfos: An error occurred after reading %u packets from \"%s\": %s.\n",
625 packet, filename, wtap_strerror(err));
628 case WTAP_ERR_UNSUPPORTED:
629 case WTAP_ERR_UNSUPPORTED_ENCAP:
630 case WTAP_ERR_BAD_RECORD:
631 fprintf(stderr, "(%s)\n", err_info);
639 size = wtap_file_size(wth, &err);
642 "capinfos: Can't get size of \"%s\": %s.\n",
643 filename, strerror(err));
647 cf_info.filesize = size;
650 cf_info.file_type = wtap_file_type(wth);
652 /* File Encapsulation */
653 cf_info.file_encap = wtap_file_encap(wth);
655 /* Packet size limit (snaplen) */
656 cf_info.snaplen = wtap_snapshot_length(wth);
657 if(cf_info.snaplen > 0)
658 cf_info.snap_set = TRUE;
660 cf_info.snap_set = FALSE;
662 cf_info.snaplen_min_inferred = snaplen_min_inferred;
663 cf_info.snaplen_max_inferred = snaplen_max_inferred;
666 cf_info.packet_count = packet;
669 cf_info.start_time = start_time;
670 cf_info.stop_time = stop_time;
671 cf_info.duration = stop_time-start_time;
672 cf_info.in_order = in_order;
674 /* Number of packet bytes */
675 cf_info.packet_bytes = bytes;
677 cf_info.data_rate = 0.0;
678 cf_info.packet_rate = 0.0;
679 cf_info.packet_size = 0.0;
682 if (cf_info.duration > 0.0) {
683 cf_info.data_rate = (double)bytes / (stop_time-start_time); /* Data rate per second */
684 cf_info.packet_rate = (double)packet / (stop_time-start_time); /* packet rate per second */
686 cf_info.packet_size = (double)bytes / packet; /* Avg packet size */
690 print_stats(filename, &cf_info);
692 print_stats_table(filename, &cf_info);
699 usage(gboolean is_error)
705 /* XXX - add capinfos header info here */
711 fprintf(output, "Capinfos %s"
713 " (" SVNVERSION " from " SVNPATH ")"
716 fprintf(output, "Prints various information (infos) about capture files.\n");
717 fprintf(output, "See http://www.wireshark.org for more information.\n");
718 fprintf(output, "\n");
719 fprintf(output, "Usage: capinfos [options] <infile> ...\n");
720 fprintf(output, "\n");
721 fprintf(output, "General infos:\n");
722 fprintf(output, " -t display the capture file type\n");
723 fprintf(output, " -E display the capture file encapsulation\n");
724 #ifdef HAVE_LIBGCRYPT
725 fprintf(output, " -H display the SHA1, RMD160, and MD5 hashes of the file\n");
727 fprintf(output, "\n");
728 fprintf(output, "Size infos:\n");
729 fprintf(output, " -c display the number of packets\n");
730 fprintf(output, " -s display the size of the file (in bytes)\n");
731 fprintf(output, " -d display the total length of all packets (in bytes)\n");
732 fprintf(output, " -l display the packet size limit (snapshot length)\n");
733 fprintf(output, "\n");
734 fprintf(output, "Time infos:\n");
735 fprintf(output, " -u display the capture duration (in seconds)\n");
736 fprintf(output, " -a display the capture start time\n");
737 fprintf(output, " -e display the capture end time\n");
738 fprintf(output, " -o display the capture file chronological status (True/False)\n");
739 fprintf(output, " -S display start and end times as seconds\n");
740 fprintf(output, "\n");
741 fprintf(output, "Statistic infos:\n");
742 fprintf(output, " -y display average data rate (in bytes/sec)\n");
743 fprintf(output, " -i display average data rate (in bits/sec)\n");
744 fprintf(output, " -z display average packet size (in bytes)\n");
745 fprintf(output, " -x display average packet rate (in packets/sec)\n");
746 fprintf(output, "\n");
747 fprintf(output, "Output format:\n");
748 fprintf(output, " -L generate long report (default)\n");
749 fprintf(output, " -T generate table report\n");
750 fprintf(output, "\n");
751 fprintf(output, "Table report options:\n");
752 fprintf(output, " -R generate header record (default)\n");
753 fprintf(output, " -r do not generate header record\n");
754 fprintf(output, "\n");
755 fprintf(output, " -B separate infos with TAB character (default)\n");
756 fprintf(output, " -m separate infos with comma (,) character\n");
757 fprintf(output, " -b separate infos with SPACE character\n");
758 fprintf(output, "\n");
759 fprintf(output, " -N do not quote infos (default)\n");
760 fprintf(output, " -q quote infos with single quotes (')\n");
761 fprintf(output, " -Q quote infos with double quotes (\")\n");
762 fprintf(output, "\n");
763 fprintf(output, "Miscellaneous:\n");
764 fprintf(output, " -h display this help and exit\n");
765 fprintf(output, " -C cancel processing if file open fails (default is to continue)\n");
766 fprintf(output, " -A generate all infos (default)\n");
767 fprintf(output, "\n");
768 fprintf(output, "Options are processed from left to right order with later options superceeding\n");
769 fprintf(output, "or adding to earlier options.\n");
770 fprintf(output, "\n");
771 fprintf(output, "If no options are given the default is to display all infos in long report\n");
772 fprintf(output, "output format.\n");
773 #ifndef HAVE_LIBGCRYPT
774 fprintf(output, "\nFile hashing support (-H) is not present.\n");
780 * Don't report failures to load plugins because most (non-wiretap) plugins
781 * *should* fail to load (because we're not linked against libwireshark and
782 * dissector plugins need libwireshark).
785 failure_message(const char *msg_format _U_, va_list ap _U_)
791 #ifdef HAVE_LIBGCRYPT
793 hash_to_str(const unsigned char *hash, size_t length, char *str) {
796 for (i = 0; i < (int) length; i++) {
797 sprintf(str+(i*2), "%02x", hash[i]);
800 #endif /* HAVE_LIBGCRYPT */
803 main(int argc, char *argv[])
817 char* init_progfile_dir_error;
819 #ifdef HAVE_LIBGCRYPT
821 char *hash_buf = NULL;
822 gcry_md_hd_t hd = NULL;
827 /* Convert our arg list to UTF-8. */
828 wc_argv = CommandLineToArgvW(GetCommandLineW(), &wc_argc);
829 if (wc_argv && wc_argc == argc) {
830 for (i = 0; i < argc; i++) {
831 argv[i] = g_utf16_to_utf8(wc_argv[i], -1, NULL, NULL, NULL);
833 } /* XXX else bail because something is horribly, horribly wrong? */
837 * Get credential information for later use.
839 init_process_policies();
842 /* Register wiretap plugins */
844 if ((init_progfile_dir_error = init_progfile_dir(argv[0], main))) {
845 g_warning("capinfos: init_progfile_dir(): %s", init_progfile_dir_error);
846 g_free(init_progfile_dir_error);
848 init_report_err(failure_message,NULL,NULL,NULL);
853 /* Process the options */
855 while ((opt = getopt(argc, argv, "tEcs" FILE_HASH_OPT "dluaeyizvhxoCALTRrSNqQBmb")) !=-1) {
860 if (report_all_infos) disable_all_infos();
861 cap_file_type = TRUE;
865 if (report_all_infos) disable_all_infos();
866 cap_file_encap = TRUE;
870 if (report_all_infos) disable_all_infos();
875 if (report_all_infos) disable_all_infos();
876 cap_packet_count = TRUE;
880 if (report_all_infos) disable_all_infos();
881 cap_file_size = TRUE;
885 if (report_all_infos) disable_all_infos();
886 cap_data_size = TRUE;
890 if (report_all_infos) disable_all_infos();
895 if (report_all_infos) disable_all_infos();
896 cap_start_time = TRUE;
900 if (report_all_infos) disable_all_infos();
909 if (report_all_infos) disable_all_infos();
910 cap_data_rate_byte = TRUE;
914 if (report_all_infos) disable_all_infos();
915 cap_data_rate_bit = TRUE;
919 if (report_all_infos) disable_all_infos();
920 cap_packet_size = TRUE;
924 if (report_all_infos) disable_all_infos();
925 cap_packet_rate = TRUE;
928 #ifdef HAVE_LIBGCRYPT
930 if (report_all_infos) disable_all_infos();
931 cap_file_hashes = TRUE;
936 if (report_all_infos) disable_all_infos();
941 continue_after_wtap_open_offline_failure = FALSE;
957 table_report_header = TRUE;
961 table_report_header = FALSE;
977 field_separator = '\t';
981 field_separator = ',';
985 field_separator = ' ';
993 case '?': /* Bad flag - print usage message */
1000 if ((argc - optind) < 1) {
1005 if(!long_report && table_report_header) {
1006 print_stats_table_header();
1009 #ifdef HAVE_LIBGCRYPT
1010 if (cap_file_hashes) {
1011 gcry_check_version(NULL);
1012 gcry_md_open(&hd, GCRY_MD_SHA1, 0);
1014 gcry_md_enable(hd, GCRY_MD_RMD160);
1015 gcry_md_enable(hd, GCRY_MD_MD5);
1017 hash_buf = (char *)g_malloc(HASH_BUF_SIZE);
1021 for (opt = optind; opt < argc; opt++) {
1023 #ifdef HAVE_LIBGCRYPT
1024 strcpy(file_sha1, "<unknown>");
1025 strcpy(file_rmd160, "<unknown>");
1026 strcpy(file_md5, "<unknown>");
1028 if (cap_file_hashes) {
1029 fh = ws_fopen(argv[opt], "rb");
1031 while((hash_bytes = fread(hash_buf, 1, HASH_BUF_SIZE, fh)) > 0) {
1032 gcry_md_write(hd, hash_buf, hash_bytes);
1035 hash_to_str(gcry_md_read(hd, GCRY_MD_SHA1), HASH_SIZE_SHA1, file_sha1);
1036 hash_to_str(gcry_md_read(hd, GCRY_MD_RMD160), HASH_SIZE_RMD160, file_rmd160);
1037 hash_to_str(gcry_md_read(hd, GCRY_MD_MD5), HASH_SIZE_MD5, file_md5);
1040 if (hd) gcry_md_reset(hd);
1042 #endif /* HAVE_LIBGCRYPT */
1044 wth = wtap_open_offline(argv[opt], &err, &err_info, FALSE);
1047 fprintf(stderr, "capinfos: Can't open %s: %s\n", argv[opt],
1048 wtap_strerror(err));
1051 case WTAP_ERR_UNSUPPORTED:
1052 case WTAP_ERR_UNSUPPORTED_ENCAP:
1053 case WTAP_ERR_BAD_RECORD:
1054 fprintf(stderr, "(%s)\n", err_info);
1058 if(!continue_after_wtap_open_offline_failure)
1063 if ((opt > optind) && (long_report))
1065 status = process_cap_file(wth, argv[opt]);