1 /* -*- Mode: c; tab-width: 8; indent-tabs-mode: 1; c-basic-offset: 8; -*- */
3 * Copyright (c) 1994, 1995, 1996, 1997, 1998
4 * The Regents of the University of California. All rights reserved.
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions
9 * 1. Redistributions of source code must retain the above copyright
10 * notice, this list of conditions and the following disclaimer.
11 * 2. Redistributions in binary form must reproduce the above copyright
12 * notice, this list of conditions and the following disclaimer in the
13 * documentation and/or other materials provided with the distribution.
14 * 3. All advertising materials mentioning features or use of this software
15 * must display the following acknowledgement:
16 * This product includes software developed by the Computer Systems
17 * Engineering Group at Lawrence Berkeley Laboratory.
18 * 4. Neither the name of the University nor of the Laboratory may be used
19 * to endorse or promote products derived from this software without
20 * specific prior written permission.
22 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
23 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
24 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
25 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
26 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
27 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
28 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
29 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
30 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
31 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
36 static const char rcsid[] _U_ =
37 "@(#) $Header: /tcpdump/master/libpcap/inet.c,v 1.79 2008-04-20 18:19:02 guy Exp $ (LBL)";
45 #include <pcap-stdinc.h>
48 #include <sys/param.h>
52 #include <sys/ioctl.h>
53 #include <sys/socket.h>
54 #ifdef HAVE_SYS_SOCKIO_H
55 #include <sys/sockio.h>
58 struct mbuf; /* Squelch compiler warnings on some platforms for */
59 struct rtentry; /* declarations in <net/if.h> */
61 #include <netinet/in.h>
70 #if !defined(WIN32) && !defined(__BORLANDC__)
72 #endif /* !WIN32 && !__BORLANDC__ */
76 #define INT_MAX 2147483647
81 #ifdef HAVE_OS_PROTO_H
85 /* Not all systems have IFF_LOOPBACK */
87 #define ISLOOPBACK(name, flags) ((flags) & IFF_LOOPBACK)
89 #define ISLOOPBACK(name, flags) ((name)[0] == 'l' && (name)[1] == 'o' && \
90 (isdigit((unsigned char)((name)[2])) || (name)[2] == '\0'))
94 dup_sockaddr(struct sockaddr *sa, size_t sa_length)
96 struct sockaddr *newsa;
98 if ((newsa = malloc(sa_length)) == NULL)
100 return (memcpy(newsa, sa, sa_length));
104 get_instance(const char *name)
106 const char *cp, *endcp;
109 if (strcmp(name, "any") == 0) {
111 * Give the "any" device an artificially high instance
112 * number, so it shows up after all other non-loopback
118 endcp = name + strlen(name);
119 for (cp = name; cp < endcp && !isdigit((unsigned char)*cp); ++cp)
122 if (isdigit((unsigned char)*cp))
130 add_or_find_if(pcap_if_t **curdev_ret, pcap_if_t **alldevs, const char *name,
131 u_int flags, const char *description, char *errbuf)
134 pcap_if_t *curdev, *prevdev, *nextdev;
138 * Is there already an entry in the list for this interface?
140 for (curdev = *alldevs; curdev != NULL; curdev = curdev->next) {
141 if (strcmp(name, curdev->name) == 0)
142 break; /* yes, we found it */
145 if (curdev == NULL) {
147 * No, we didn't find it.
149 * Can we open this interface for live capture?
151 * We do this check so that interfaces that are
152 * supplied by the interface enumeration mechanism
153 * we're using but that don't support packet capture
154 * aren't included in the list. Loopback interfaces
155 * on Solaris are an example of this; we don't just
156 * omit loopback interfaces on all platforms because
157 * you *can* capture on loopback interfaces on some
160 * On OS X, we don't do this check if the device
161 * name begins with "wlt"; at least some versions
162 * of OS X offer monitor mode capturing by having
163 * a separate "monitor mode" device for each wireless
164 * adapter, rather than by implementing the ioctls
165 * that {Free,Net,Open,DragonFly}BSD provide.
166 * Opening that device puts the adapter into monitor
167 * mode, which, at least for some adapters, causes
168 * them to deassociate from the network with which
169 * they're associated.
171 * Instead, we try to open the corresponding "en"
172 * device (so that we don't end up with, for users
173 * without sufficient privilege to open capture
174 * devices, a list of adapters that only includes
178 if (strncmp(name, "wlt", 3) == 0) {
183 * Try to allocate a buffer for the "en"
186 en_name_len = strlen(name) - 1;
187 en_name = malloc(en_name_len + 1);
188 if (en_name == NULL) {
189 (void)snprintf(errbuf, PCAP_ERRBUF_SIZE,
190 "malloc: %s", pcap_strerror(errno));
193 strcpy(en_name, "en");
194 strcat(en_name, name + 3);
195 p = pcap_open_live(en_name, 68, 0, 0, errbuf);
199 p = pcap_open_live(name, 68, 0, 0, errbuf);
202 * No. Don't bother including it.
203 * Don't treat this as an error, though.
211 * Yes, we can open it.
212 * Allocate a new entry.
214 curdev = malloc(sizeof(pcap_if_t));
215 if (curdev == NULL) {
216 (void)snprintf(errbuf, PCAP_ERRBUF_SIZE,
217 "malloc: %s", pcap_strerror(errno));
225 curdev->name = strdup(name);
226 if (curdev->name == NULL) {
227 (void)snprintf(errbuf, PCAP_ERRBUF_SIZE,
228 "malloc: %s", pcap_strerror(errno));
232 if (description != NULL) {
234 * We have a description for this interface.
236 curdev->description = strdup(description);
237 if (curdev->description == NULL) {
238 (void)snprintf(errbuf, PCAP_ERRBUF_SIZE,
239 "malloc: %s", pcap_strerror(errno));
248 curdev->description = NULL;
250 curdev->addresses = NULL; /* list starts out as empty */
252 if (ISLOOPBACK(name, flags))
253 curdev->flags |= PCAP_IF_LOOPBACK;
256 * Add it to the list, in the appropriate location.
257 * First, get the instance number of this interface.
259 this_instance = get_instance(name);
262 * Now look for the last interface with an instance number
263 * less than or equal to the new interface's instance
264 * number - except that non-loopback interfaces are
265 * arbitrarily treated as having interface numbers less
266 * than those of loopback interfaces, so the loopback
267 * interfaces are put at the end of the list.
269 * We start with "prevdev" being NULL, meaning we're before
270 * the first element in the list.
275 * Get the interface after this one.
277 if (prevdev == NULL) {
279 * The next element is the first element.
283 nextdev = prevdev->next;
286 * Are we at the end of the list?
288 if (nextdev == NULL) {
290 * Yes - we have to put the new entry
297 * Is the new interface a non-loopback interface
298 * and the next interface a loopback interface?
300 if (!(curdev->flags & PCAP_IF_LOOPBACK) &&
301 (nextdev->flags & PCAP_IF_LOOPBACK)) {
303 * Yes, we should put the new entry
304 * before "nextdev", i.e. after "prevdev".
310 * Is the new interface's instance number less
311 * than the next interface's instance number,
312 * and is it the case that the new interface is a
313 * non-loopback interface or the next interface is
314 * a loopback interface?
316 * (The goal of both loopback tests is to make
317 * sure that we never put a loopback interface
318 * before any non-loopback interface and that we
319 * always put a non-loopback interface before all
320 * loopback interfaces.)
322 if (this_instance < get_instance(nextdev->name) &&
323 (!(curdev->flags & PCAP_IF_LOOPBACK) ||
324 (nextdev->flags & PCAP_IF_LOOPBACK))) {
326 * Yes - we should put the new entry
327 * before "nextdev", i.e. after "prevdev".
336 * Insert before "nextdev".
338 curdev->next = nextdev;
341 * Insert after "prevdev" - unless "prevdev" is null,
342 * in which case this is the first interface.
344 if (prevdev == NULL) {
346 * This is the first interface. Pass back a
347 * pointer to it, and put "curdev" before
352 prevdev->next = curdev;
355 *curdev_ret = curdev;
360 * XXX - on FreeBSDs that support it, should it get the sysctl named
361 * "dev.{adapter family name}.{adapter unit}.%desc" to get a description
362 * of the adapter? Note that "dev.an.0.%desc" is "Aironet PC4500/PC4800"
363 * with my Cisco 350 card, so the name isn't entirely descriptive. The
364 * "dev.an.0.%pnpinfo" has a better description, although one might argue
365 * that the problem is really a driver bug - if it can find out that it's
366 * a Cisco 340 or 350, rather than an old Aironet card, it should use
367 * that in the description.
369 * Do NetBSD, DragonflyBSD, or OpenBSD support this as well? FreeBSD
370 * and OpenBSD let you get a description, but it's not generated by the OS,
371 * it's set with another ioctl that ifconfig supports; we use that to get
372 * a description in FreeBSD and OpenBSD, but if there is no such
373 * description available, it still might be nice to get some description
374 * string based on the device type or something such as that.
376 * In OS X, the System Configuration framework can apparently return
377 * names in 10.4 and later.
379 * It also appears that freedesktop.org's HAL offers an "info.product"
380 * string, but the HAL specification says it "should not be used in any
381 * UI" and "subsystem/capability specific properties" should be used
382 * instead and, in any case, I think HAL is being deprecated in
383 * favor of other stuff such as DeviceKit. DeviceKit doesn't appear
384 * to have any obvious product information for devices, but maybe
385 * I haven't looked hard enough.
387 * Using the System Configuration framework, or HAL, or DeviceKit, or
388 * whatever, would require that libpcap applications be linked with
389 * the frameworks/libraries in question. That shouldn't be a problem
390 * for programs linking with the shared version of libpcap (unless
391 * you're running on AIX - which I think is the only UN*X that doesn't
392 * support linking a shared library with other libraries on which it
393 * depends, and having an executable linked only with the first shared
394 * library automatically pick up the other libraries when started -
395 * and using HAL or whatever). Programs linked with the static
396 * version of libpcap would have to use pcap-config with the --static
397 * flag in order to get the right linker flags in order to pick up
398 * the additional libraries/frameworks; those programs need that anyway
399 * for libpcap 1.1 and beyond on Linux, as, by default, it requires
402 * Do any other UN*Xes, or desktop environments support getting a
406 add_addr_to_iflist(pcap_if_t **alldevs, const char *name, u_int flags,
407 struct sockaddr *addr, size_t addr_size,
408 struct sockaddr *netmask, size_t netmask_size,
409 struct sockaddr *broadaddr, size_t broadaddr_size,
410 struct sockaddr *dstaddr, size_t dstaddr_size,
414 char *description = NULL;
415 pcap_addr_t *curaddr, *prevaddr, *nextaddr;
418 struct ifreq ifrdesc;
420 size_t descrlen = 64;
422 size_t descrlen = IFDESCRSIZE;
423 #endif /* IFDESCRSIZE */
424 #endif /* SIOCGIFDESCR */
428 * Get the description for the interface.
430 memset(&ifrdesc, 0, sizeof ifrdesc);
431 strlcpy(ifrdesc.ifr_name, name, sizeof ifrdesc.ifr_name);
432 s = socket(AF_INET, SOCK_DGRAM, 0);
436 if ((description = malloc(descrlen)) != NULL) {
438 ifrdesc.ifr_buffer.buffer = description;
439 ifrdesc.ifr_buffer.length = descrlen;
440 #else /* __FreeBSD__ */
441 ifrdesc.ifr_data = (caddr_t)description;
442 #endif /* __FreeBSD__ */
443 if (ioctl(s, SIOCGIFDESCR, &ifrdesc) == 0)
446 else if (errno == ENAMETOOLONG)
447 descrlen = ifrdesc.ifr_buffer.length;
448 #endif /* __FreeBSD__ */
455 if (description != NULL && strlen(description) == 0) {
460 #endif /* SIOCGIFDESCR */
462 if (add_or_find_if(&curdev, alldevs, name, flags, description,
471 if (curdev == NULL) {
473 * Device wasn't added because it can't be opened.
480 * "curdev" is an entry for this interface; add an entry for this
481 * address to its list of addresses.
483 * Allocate the new entry and fill it in.
485 curaddr = malloc(sizeof(pcap_addr_t));
486 if (curaddr == NULL) {
487 (void)snprintf(errbuf, PCAP_ERRBUF_SIZE,
488 "malloc: %s", pcap_strerror(errno));
492 curaddr->next = NULL;
494 curaddr->addr = dup_sockaddr(addr, addr_size);
495 if (curaddr->addr == NULL) {
496 (void)snprintf(errbuf, PCAP_ERRBUF_SIZE,
497 "malloc: %s", pcap_strerror(errno));
502 curaddr->addr = NULL;
504 if (netmask != NULL) {
505 curaddr->netmask = dup_sockaddr(netmask, netmask_size);
506 if (curaddr->netmask == NULL) {
507 (void)snprintf(errbuf, PCAP_ERRBUF_SIZE,
508 "malloc: %s", pcap_strerror(errno));
509 if (curaddr->addr != NULL)
515 curaddr->netmask = NULL;
517 if (broadaddr != NULL) {
518 curaddr->broadaddr = dup_sockaddr(broadaddr, broadaddr_size);
519 if (curaddr->broadaddr == NULL) {
520 (void)snprintf(errbuf, PCAP_ERRBUF_SIZE,
521 "malloc: %s", pcap_strerror(errno));
522 if (curaddr->netmask != NULL)
523 free(curaddr->netmask);
524 if (curaddr->addr != NULL)
530 curaddr->broadaddr = NULL;
532 if (dstaddr != NULL) {
533 curaddr->dstaddr = dup_sockaddr(dstaddr, dstaddr_size);
534 if (curaddr->dstaddr == NULL) {
535 (void)snprintf(errbuf, PCAP_ERRBUF_SIZE,
536 "malloc: %s", pcap_strerror(errno));
537 if (curaddr->broadaddr != NULL)
538 free(curaddr->broadaddr);
539 if (curaddr->netmask != NULL)
540 free(curaddr->netmask);
541 if (curaddr->addr != NULL)
547 curaddr->dstaddr = NULL;
550 * Find the end of the list of addresses.
552 for (prevaddr = curdev->addresses; prevaddr != NULL; prevaddr = nextaddr) {
553 nextaddr = prevaddr->next;
554 if (nextaddr == NULL) {
556 * This is the end of the list.
562 if (prevaddr == NULL) {
564 * The list was empty; this is the first member.
566 curdev->addresses = curaddr;
569 * "prevaddr" is the last member of the list; append
572 prevaddr->next = curaddr;
579 pcap_add_if(pcap_if_t **devlist, const char *name, u_int flags,
580 const char *description, char *errbuf)
584 return (add_or_find_if(&curdev, devlist, name, flags, description,
590 * Free a list of interfaces.
593 pcap_freealldevs(pcap_if_t *alldevs)
595 pcap_if_t *curdev, *nextdev;
596 pcap_addr_t *curaddr, *nextaddr;
598 for (curdev = alldevs; curdev != NULL; curdev = nextdev) {
599 nextdev = curdev->next;
602 * Free all addresses.
604 for (curaddr = curdev->addresses; curaddr != NULL; curaddr = nextaddr) {
605 nextaddr = curaddr->next;
608 if (curaddr->netmask)
609 free(curaddr->netmask);
610 if (curaddr->broadaddr)
611 free(curaddr->broadaddr);
612 if (curaddr->dstaddr)
613 free(curaddr->dstaddr);
618 * Free the name string.
623 * Free the description string, if any.
625 if (curdev->description != NULL)
626 free(curdev->description);
629 * Free the interface.
635 #if !defined(WIN32) && !defined(MSDOS)
638 * Return the name of a network interface attached to the system, or NULL
639 * if none can be found. The interface must be configured up; the
640 * lowest unit number is preferred; loopback is ignored.
643 pcap_lookupdev(errbuf)
644 register char *errbuf;
647 /* for old BSD systems, including bsdi3 */
649 #define IF_NAMESIZE IFNAMSIZ
651 static char device[IF_NAMESIZE + 1];
654 if (pcap_findalldevs(&alldevs, errbuf) == -1)
657 if (alldevs == NULL || (alldevs->flags & PCAP_IF_LOOPBACK)) {
659 * There are no devices on the list, or the first device
660 * on the list is a loopback device, which means there
661 * are no non-loopback devices on the list. This means
662 * we can't return any device.
664 * XXX - why not return a loopback device? If we can't
665 * capture on it, it won't be on the list, and if it's
666 * on the list, there aren't any non-loopback devices,
667 * so why not just supply it as the default device?
669 (void)strlcpy(errbuf, "no suitable device found",
674 * Return the name of the first device on the list.
676 (void)strlcpy(device, alldevs->name, sizeof(device));
680 pcap_freealldevs(alldevs);
685 pcap_lookupnet(device, netp, maskp, errbuf)
686 register const char *device;
687 register bpf_u_int32 *netp, *maskp;
688 register char *errbuf;
691 register struct sockaddr_in *sin4;
695 * The pseudo-device "any" listens on all interfaces and therefore
696 * has the network address and -mask "0.0.0.0" therefore catching
697 * all traffic. Using NULL for the interface is the same as "any".
699 if (!device || strcmp(device, "any") == 0
701 || strstr(device, "dag") != NULL
703 #ifdef HAVE_SEPTEL_API
704 || strstr(device, "septel") != NULL
706 #ifdef PCAP_SUPPORT_BT
707 || strstr(device, "bluetooth") != NULL
709 #ifdef PCAP_SUPPORT_USB
710 || strstr(device, "usbmon") != NULL
713 || strstr(device, "snf") != NULL
720 fd = socket(AF_INET, SOCK_DGRAM, 0);
722 (void)snprintf(errbuf, PCAP_ERRBUF_SIZE, "socket: %s",
723 pcap_strerror(errno));
726 memset(&ifr, 0, sizeof(ifr));
728 /* XXX Work around Linux kernel bug */
729 ifr.ifr_addr.sa_family = AF_INET;
731 (void)strncpy(ifr.ifr_name, device, sizeof(ifr.ifr_name));
732 if (ioctl(fd, SIOCGIFADDR, (char *)&ifr) < 0) {
733 if (errno == EADDRNOTAVAIL) {
734 (void)snprintf(errbuf, PCAP_ERRBUF_SIZE,
735 "%s: no IPv4 address assigned", device);
737 (void)snprintf(errbuf, PCAP_ERRBUF_SIZE,
738 "SIOCGIFADDR: %s: %s",
739 device, pcap_strerror(errno));
744 sin4 = (struct sockaddr_in *)&ifr.ifr_addr;
745 *netp = sin4->sin_addr.s_addr;
746 memset(&ifr, 0, sizeof(ifr));
748 /* XXX Work around Linux kernel bug */
749 ifr.ifr_addr.sa_family = AF_INET;
751 (void)strncpy(ifr.ifr_name, device, sizeof(ifr.ifr_name));
752 if (ioctl(fd, SIOCGIFNETMASK, (char *)&ifr) < 0) {
753 (void)snprintf(errbuf, PCAP_ERRBUF_SIZE,
754 "SIOCGIFNETMASK: %s: %s", device, pcap_strerror(errno));
759 *maskp = sin4->sin_addr.s_addr;
761 if (IN_CLASSA(*netp))
762 *maskp = IN_CLASSA_NET;
763 else if (IN_CLASSB(*netp))
764 *maskp = IN_CLASSB_NET;
765 else if (IN_CLASSC(*netp))
766 *maskp = IN_CLASSC_NET;
768 (void)snprintf(errbuf, PCAP_ERRBUF_SIZE,
769 "inet class for 0x%x unknown", *netp);
780 * Return the name of a network interface attached to the system, or NULL
781 * if none can be found. The interface must be configured up; the
782 * lowest unit number is preferred; loopback is ignored.
785 pcap_lookupdev(errbuf)
786 register char *errbuf;
789 DWORD dwWindowsMajorVersion;
790 dwVersion = GetVersion(); /* get the OS version */
791 dwWindowsMajorVersion = (DWORD)(LOBYTE(LOWORD(dwVersion)));
793 if (dwVersion >= 0x80000000 && dwWindowsMajorVersion >= 4) {
795 * Windows 95, 98, ME.
797 ULONG NameLength = 8192;
798 static char AdaptersName[8192];
800 if (PacketGetAdapterNames(AdaptersName,&NameLength) )
801 return (AdaptersName);
806 * Windows NT (NT 4.0, W2K, WXP). Convert the names to UNICODE for backward compatibility
808 ULONG NameLength = 8192;
809 static WCHAR AdaptersName[8192];
812 WCHAR *TAdaptersName = (WCHAR*)malloc(8192 * sizeof(WCHAR));
815 if(TAdaptersName == NULL)
817 (void)snprintf(errbuf, PCAP_ERRBUF_SIZE, "memory allocation failure");
821 if ( !PacketGetAdapterNames((PTSTR)TAdaptersName,&NameLength) )
823 (void)snprintf(errbuf, PCAP_ERRBUF_SIZE,
824 "PacketGetAdapterNames: %s",
825 pcap_win32strerror());
831 tAstr = (char*)TAdaptersName;
832 tUstr = (WCHAR*)AdaptersName;
835 * Convert and copy the device names
837 while(sscanf(tAstr, "%S", tUstr) > 0)
839 tAstr += strlen(tAstr) + 1;
840 tUstr += wcslen(tUstr) + 1;
849 * Copy the descriptions
853 strcpy((char*)tUstr, tAstr);
854 (char*)tUstr += strlen(tAstr) + 1;;
855 tAstr += strlen(tAstr) + 1;
859 return (char *)(AdaptersName);
865 pcap_lookupnet(device, netp, maskp, errbuf)
866 register const char *device;
867 register bpf_u_int32 *netp, *maskp;
868 register char *errbuf;
871 * We need only the first IPv4 address, so we must scan the array returned by PacketGetNetInfo()
872 * in order to skip non IPv4 (i.e. IPv6 addresses)
874 npf_if_addr if_addrs[MAX_NETWORK_ADDRESSES];
875 LONG if_addr_size = 1;
876 struct sockaddr_in *t_addr;
879 if (!PacketGetNetInfoEx((void *)device, if_addrs, &if_addr_size)) {
884 for(i=0; i<MAX_NETWORK_ADDRESSES; i++)
886 if(if_addrs[i].IPAddress.ss_family == AF_INET)
888 t_addr = (struct sockaddr_in *) &(if_addrs[i].IPAddress);
889 *netp = t_addr->sin_addr.S_un.S_addr;
890 t_addr = (struct sockaddr_in *) &(if_addrs[i].SubnetMask);
891 *maskp = t_addr->sin_addr.S_un.S_addr;
903 #endif /* !WIN32 && !MSDOS */