Move make-manuf to the tools directory.
[obnox/wireshark/wip.git] / capinfos.c
index da32dceb74b0067489678f2aa200cb3edc35293d..08017999b4e4306a3c74ab97995f0e359b65d88d 100644 (file)
@@ -82,7 +82,7 @@
 #ifdef HAVE_GETOPT_H
 #include <getopt.h>
 #else
-#include "wsgetopt.h"
+#include "wsutil/wsgetopt.h"
 #endif
 
 #include "svnversion.h"
@@ -123,6 +123,7 @@ static gboolean report_all_infos = TRUE;    /* Report all infos           */
 
 static gboolean cap_file_type = TRUE;       /* Report capture type        */
 static gboolean cap_file_encap = TRUE;      /* Report encapsulation       */
+static gboolean cap_snaplen = TRUE;         /* Packet size limit (snaplen)*/
 static gboolean cap_packet_count = TRUE;    /* Report packet count        */
 static gboolean cap_file_size = TRUE;       /* Report file size           */
 
@@ -136,6 +137,8 @@ static gboolean cap_data_rate_byte = TRUE;  /* Report data rate bytes/sec */
 static gboolean cap_data_rate_bit = TRUE;   /* Report data rate bites/sec */
 static gboolean cap_packet_size = TRUE;     /* Report average packet size */
 static gboolean cap_packet_rate = TRUE;     /* Report average packet rate */
+static gboolean cap_in_order = TRUE;        /* Report if packets are in chronological order (True/False) */
+
 #ifdef HAVE_LIBGCRYPT
 static gboolean cap_file_hashes = TRUE;     /* Calculate file hashes */
 #endif
@@ -159,24 +162,27 @@ static gchar file_md5[HASH_STR_SIZE];
 #endif /* HAVE_LIBGCRYPT */
 
 typedef struct _capture_info {
-       const char              *filename;
-       guint16                 file_type;
-       int                     file_encap;
-       gint64                  filesize;
-
-       guint64                 packet_bytes;
-       double                  start_time;
-       double                  stop_time;
-       guint32                 packet_count;
-       gboolean                snap_set;
-       guint32                 snaplen;
-       gboolean                drops_known;
-       guint32                 drop_count;
-
-       double                  duration;
-       double                  packet_rate;
-       double                  packet_size;
-       double                  data_rate;              /* in bytes */
+  const char    *filename;
+  guint16       file_type;
+  int           file_encap;
+  gint64        filesize;
+
+  guint64       packet_bytes;
+  double        start_time;
+  double        stop_time;
+  guint32       packet_count;
+  gboolean      snap_set;                /* If set in capture file header      */
+  guint32       snaplen;                 /* value from the capture file header */
+  guint32       snaplen_min_inferred;    /* If caplen < len for 1 or more rcds */
+  guint32       snaplen_max_inferred;    /*  ...                               */
+  gboolean      drops_known;
+  guint32       drop_count;
+
+  double        duration;
+  double        packet_rate;
+  double        packet_size;
+  double        data_rate;              /* in bytes */
+  gboolean      in_order;
 } capture_info;
 
 static void
@@ -186,6 +192,7 @@ enable_all_infos(void)
 
   cap_file_type = TRUE;
   cap_file_encap = TRUE;
+  cap_snaplen = TRUE;
   cap_packet_count = TRUE;
   cap_file_size = TRUE;
 
@@ -193,6 +200,7 @@ enable_all_infos(void)
   cap_duration = TRUE;
   cap_start_time = TRUE;
   cap_end_time = TRUE;
+  cap_in_order = TRUE;
 
   cap_data_rate_byte = TRUE;
   cap_data_rate_bit = TRUE;
@@ -207,22 +215,24 @@ enable_all_infos(void)
 static void
 disable_all_infos(void)
 {
-  report_all_infos = FALSE;
+  report_all_infos   = FALSE;
 
-  cap_file_type = FALSE;
-  cap_file_encap = FALSE;
-  cap_packet_count = FALSE;
-  cap_file_size = FALSE;
+  cap_file_type      = FALSE;
+  cap_file_encap     = FALSE;
+  cap_snaplen        = FALSE;
+  cap_packet_count   = FALSE;
+  cap_file_size      = FALSE;
 
-  cap_data_size = FALSE;
-  cap_duration = FALSE;
-  cap_start_time = FALSE;
-  cap_end_time = FALSE;
+  cap_data_size      = FALSE;
+  cap_duration       = FALSE;
+  cap_start_time     = FALSE;
+  cap_end_time       = FALSE;
+  cap_in_order       = FALSE;
 
   cap_data_rate_byte = FALSE;
-  cap_data_rate_bit = FALSE;
-  cap_packet_size = FALSE;
-  cap_packet_rate = FALSE;
+  cap_data_rate_bit  = FALSE;
+  cap_packet_size    = FALSE;
+  cap_packet_rate    = FALSE;
 
 #ifdef HAVE_LIBGCRYPT
   cap_file_hashes = FALSE;
@@ -288,9 +298,9 @@ static void print_value(const gchar *text_p1, gint width, const gchar *text_p2,
 static void
 print_stats(const gchar *filename, capture_info *cf_info)
 {
-  const gchar          *file_type_string, *file_encap_string;
-  time_t               start_time_t;
-  time_t               stop_time_t;
+  const gchar           *file_type_string, *file_encap_string;
+  time_t                start_time_t;
+  time_t                stop_time_t;
 
   /* Build printable strings for various stats */
   file_type_string = wtap_file_type_string(cf_info->file_type);
@@ -301,6 +311,17 @@ print_stats(const gchar *filename, capture_info *cf_info)
   if (filename)           printf     ("File name:           %s\n", filename);
   if (cap_file_type)      printf     ("File type:           %s\n", file_type_string);
   if (cap_file_encap)     printf     ("File encapsulation:  %s\n", file_encap_string);
+  if (cap_snaplen && cf_info->snap_set)
+                          printf     ("Packet size limit:   file hdr: %u bytes\n", cf_info->snaplen);
+  else if(cap_snaplen && !cf_info->snap_set)
+                          printf     ("Packet size limit:   file hdr: (not set)\n");
+  if (cf_info->snaplen_max_inferred > 0) {
+    if (cf_info->snaplen_min_inferred == cf_info->snaplen_max_inferred)
+                          printf     ("Packet size limit:   inferred: %u bytes\n", cf_info->snaplen_min_inferred);
+    else
+                          printf     ("Packet size limit:   inferred: %u bytes - %u bytes (range)\n",
+                                      cf_info->snaplen_min_inferred, cf_info->snaplen_max_inferred);
+  }
   if (cap_packet_count)   printf     ("Number of packets:   %u\n", cf_info->packet_count);
   if (cap_file_size)      printf     ("File size:           %" G_GINT64_MODIFIER "d bytes\n", cf_info->filesize);
   if (cap_data_size)      printf     ("Data size:           %" G_GINT64_MODIFIER "u bytes\n", cf_info->packet_bytes);
@@ -317,6 +338,7 @@ print_stats(const gchar *filename, capture_info *cf_info)
                           printf     ("RIPEMD160:           %s\n", file_rmd160);
                           printf     ("MD5:                 %s\n", file_md5);
   }
+  if (cap_in_order)       printf     ("Strict time order:   %s\n", (cf_info->in_order) ? "True" : "False");
 #endif /* HAVE_LIBGCRYPT */
 }
 
@@ -350,6 +372,9 @@ print_stats_table_header(void)
 
   if (cap_file_type)      print_stats_table_header_label("File type");
   if (cap_file_encap)     print_stats_table_header_label("File encapsulation");
+  if (cap_snaplen)        print_stats_table_header_label("Packet size limit");
+  if (cap_snaplen)        print_stats_table_header_label("Packet size limit min (inferred)");
+  if (cap_snaplen)        print_stats_table_header_label("Packet size limit max (inferred)");
   if (cap_packet_count)   print_stats_table_header_label("Number of packets");
   if (cap_file_size)      print_stats_table_header_label("File size (bytes)");
   if (cap_data_size)      print_stats_table_header_label("Data size (bytes)");
@@ -366,6 +391,7 @@ print_stats_table_header(void)
                           print_stats_table_header_label("RIPEMD160");
                           print_stats_table_header_label("MD5");
   }
+  if (cap_in_order)       print_stats_table_header_label("Strict time order");
 #endif /* HAVE_LIBGCRYPT */
 
   printf("\n");
@@ -374,9 +400,9 @@ print_stats_table_header(void)
 static void
 print_stats_table(const gchar *filename, capture_info *cf_info)
 {
-  const gchar          *file_type_string, *file_encap_string;
-  time_t               start_time_t;
-  time_t               stop_time_t;
+  const gchar           *file_type_string, *file_encap_string;
+  time_t                start_time_t;
+  time_t                stop_time_t;
 
   /* Build printable strings for various stats */
   file_type_string = wtap_file_type_string(cf_info->file_type);
@@ -404,6 +430,36 @@ print_stats_table(const gchar *filename, capture_info *cf_info)
     putquote();
   }
 
+  if (cap_snaplen) {
+    putsep();
+    putquote();
+    if(cf_info->snap_set)
+      printf("%u", cf_info->snaplen);
+    else
+      printf("(not set)");
+    putquote();
+    if (cf_info->snaplen_max_inferred > 0) {
+      putsep();
+      putquote();
+      printf("%u", cf_info->snaplen_min_inferred);
+      putquote();
+      putsep();
+      putquote();
+      printf("%u", cf_info->snaplen_max_inferred);
+      putquote();
+    }
+    else {
+      putsep();
+      putquote();
+      printf("n/a");
+      putquote();
+      putsep();
+      putquote();
+      printf("n/a");
+      putquote();
+    }
+  }
+
   if (cap_packet_count) {
     putsep();
     putquote();
@@ -493,32 +549,48 @@ print_stats_table(const gchar *filename, capture_info *cf_info)
   }
 #endif /* HAVE_LIBGCRYPT */
 
+  if (cap_in_order) {
+    putsep();
+    putquote();
+    printf("%s", (cf_info->in_order) ? "True" : "False");
+    putquote();
+  }
+
   printf("\n");
 }
 
 static int
 process_cap_file(wtap *wth, const char *filename)
 {
-  int                  err;
-  gchar                        *err_info;
-  gint64               size;
-  gint64               data_offset;
-
-  guint32              packet = 0;
-  gint64               bytes = 0;
+  int                   err;
+  gchar                 *err_info;
+  gint64                size;
+  gint64                data_offset;
+
+  guint32               packet = 0;
+  gint64                bytes  = 0;
+  guint32               snaplen_min_inferred = 0xffffffff;
+  guint32               snaplen_max_inferred =          0;
   const struct wtap_pkthdr *phdr;
-  capture_info         cf_info;
-  double               start_time = 0;
-  double               stop_time = 0;
-  double               cur_time = 0;
+  capture_info          cf_info;
+  double                start_time = 0;
+  double                stop_time  = 0;
+  double                cur_time   = 0;
+  double               prev_time = 0;
+  gboolean             in_order = TRUE;
 
   /* Tally up data that we need to parse through the file to find */
   while (wtap_read(wth, &err, &err_info, &data_offset))  {
     phdr = wtap_phdr(wth);
+    prev_time = cur_time;
     cur_time = secs_nsecs(&phdr->ts);
     if(packet==0) {
       start_time = cur_time;
       stop_time = cur_time;
+      prev_time = cur_time;
+    }
+    if (cur_time < prev_time) {
+      in_order = FALSE;
     }
     if (cur_time < start_time) {
       start_time = cur_time;
@@ -526,14 +598,27 @@ process_cap_file(wtap *wth, const char *filename)
     if (cur_time > stop_time) {
       stop_time = cur_time;
     }
+
     bytes+=phdr->len;
     packet++;
+
+    /* If caplen < len for a rcd, then presumably           */
+    /* 'Limit packet capture length' was done for this rcd. */
+    /* Keep track as to the min/max actual snapshot lengths */
+    /*  seen for this file.                                 */
+    if (phdr->caplen < phdr->len) {
+      if (phdr->caplen < snaplen_min_inferred)
+        snaplen_min_inferred = phdr->caplen;
+      if (phdr->caplen > snaplen_max_inferred)
+        snaplen_max_inferred = phdr->caplen;
+    }
+
   }
 
   if (err != 0) {
     fprintf(stderr,
             "capinfos: An error occurred after reading %u packets from \"%s\": %s.\n",
-           packet, filename, wtap_strerror(err));
+            packet, filename, wtap_strerror(err));
     switch (err) {
 
     case WTAP_ERR_UNSUPPORTED:
@@ -551,7 +636,7 @@ process_cap_file(wtap *wth, const char *filename)
   if (size == -1) {
     fprintf(stderr,
             "capinfos: Can't get size of \"%s\": %s.\n",
-           filename, strerror(err));
+            filename, strerror(err));
     return 1;
   }
 
@@ -563,6 +648,16 @@ process_cap_file(wtap *wth, const char *filename)
   /* File Encapsulation */
   cf_info.file_encap = wtap_file_encap(wth);
 
+  /* Packet size limit (snaplen) */
+  cf_info.snaplen = wtap_snapshot_length(wth);
+  if(cf_info.snaplen > 0)
+    cf_info.snap_set = TRUE;
+  else
+    cf_info.snap_set = FALSE;
+
+  cf_info.snaplen_min_inferred = snaplen_min_inferred;
+  cf_info.snaplen_max_inferred = snaplen_max_inferred;
+
   /* # of packets */
   cf_info.packet_count = packet;
 
@@ -570,6 +665,7 @@ process_cap_file(wtap *wth, const char *filename)
   cf_info.start_time = start_time;
   cf_info.stop_time = stop_time;
   cf_info.duration = stop_time-start_time;
+  cf_info.in_order = in_order;
 
   /* Number of packet bytes */
   cf_info.packet_bytes = bytes;
@@ -610,9 +706,9 @@ usage(gboolean is_error)
 
   fprintf(output, "Capinfos %s"
 #ifdef SVNVERSION
-         " (" SVNVERSION " from " SVNPATH ")"
+          " (" SVNVERSION " from " SVNPATH ")"
 #endif
-         "\n", VERSION);
+          "\n", VERSION);
   fprintf(output, "Prints various information (infos) about capture files.\n");
   fprintf(output, "See http://www.wireshark.org for more information.\n");
   fprintf(output, "\n");
@@ -629,11 +725,13 @@ usage(gboolean is_error)
   fprintf(output, "  -c display the number of packets\n");
   fprintf(output, "  -s display the size of the file (in bytes)\n");
   fprintf(output, "  -d display the total length of all packets (in bytes)\n");
+  fprintf(output, "  -l display the packet size limit (snapshot length)\n");
   fprintf(output, "\n");
   fprintf(output, "Time infos:\n");
   fprintf(output, "  -u display the capture duration (in seconds)\n");
   fprintf(output, "  -a display the capture start time\n");
   fprintf(output, "  -e display the capture end time\n");
+  fprintf(output, "  -o display the capture file chronological status (True/False)\n");
   fprintf(output, "  -S display start and end times as seconds\n");
   fprintf(output, "\n");
   fprintf(output, "Statistic infos:\n");
@@ -682,7 +780,7 @@ usage(gboolean is_error)
 static void
 failure_message(const char *msg_format _U_, va_list ap _U_)
 {
-       return;
+  return;
 }
 #endif
 
@@ -718,23 +816,23 @@ main(int argc, char *argv[])
   /*
    * Get credential information for later use.
    */
-  get_credential_info();
+  init_process_policies();
 
 #ifdef HAVE_PLUGINS
   /* Register wiretap plugins */
 
-    if ((init_progfile_dir_error = init_progfile_dir(argv[0], main))) {
-               g_warning("capinfos: init_progfile_dir(): %s", init_progfile_dir_error);
-               g_free(init_progfile_dir_error);
-    } else {
-               init_report_err(failure_message,NULL,NULL,NULL);
-               init_plugins();
-    }
+  if ((init_progfile_dir_error = init_progfile_dir(argv[0], main))) {
+    g_warning("capinfos: init_progfile_dir(): %s", init_progfile_dir_error);
+    g_free(init_progfile_dir_error);
+  } else {
+    init_report_err(failure_message,NULL,NULL,NULL);
+    init_plugins();
+  }
 #endif
 
   /* Process the options */
 
-  while ((opt = getopt(argc, argv, "tEcs" FILE_HASH_OPT "duaeyizvhxCALTRrSNqQBmb")) !=-1) {
+  while ((opt = getopt(argc, argv, "tEcs" FILE_HASH_OPT "dluaeyizvhxoCALTRrSNqQBmb")) !=-1) {
 
     switch (opt) {
 
@@ -748,6 +846,11 @@ main(int argc, char *argv[])
       cap_file_encap = TRUE;
       break;
 
+    case 'l':
+      if (report_all_infos) disable_all_infos();
+      cap_snaplen = TRUE;
+      break;
+
     case 'c':
       if (report_all_infos) disable_all_infos();
       cap_packet_count = TRUE;
@@ -809,6 +912,11 @@ main(int argc, char *argv[])
       break;
 #endif
 
+    case 'o':
+      if (report_all_infos) disable_all_infos();
+      cap_in_order = TRUE;
+      break;
+
     case 'C':
       continue_after_wtap_open_offline_failure = FALSE;
       break;
@@ -917,7 +1025,7 @@ main(int argc, char *argv[])
 
     if (!wth) {
       fprintf(stderr, "capinfos: Can't open %s: %s\n", argv[opt],
-       wtap_strerror(err));
+        wtap_strerror(err));
       switch (err) {
 
       case WTAP_ERR_UNSUPPORTED: