nfdump/bin/pcap_reader.c

299 lines
8.0 KiB
C
Executable File

/*
* Copyright (c) 2017, Peter Haag
* Copyright (c) 2014, Peter Haag
* Copyright (c) 2009, Peter Haag
* All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions are met:
*
* * Redistributions of source code must retain the above copyright notice,
* this list of conditions and the following disclaimer.
* * Redistributions in binary form must reproduce the above copyright notice,
* this list of conditions and the following disclaimer in the documentation
* and/or other materials provided with the distribution.
* * Neither the name of the author nor the names of its contributors may be
* used to endorse or promote products derived from this software without
* specific prior written permission.
*
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
* AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
* ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE
* LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
* CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
* SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
* INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
* CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
* POSSIBILITY OF SUCH DAMAGE.
*
*/
#include <config.h>
#include <stdio.h>
#include <unistd.h>
#include <stdlib.h>
#include <sys/types.h>
#include <sys/socket.h>
#include <signal.h>
#include <sys/time.h>
#define __FAVOR_BSD 1
#include <netinet/in_systm.h>
#include <netinet/in.h>
#include <netinet/ip.h>
#include <netinet/tcp.h>
#include <netinet/udp.h>
#include <netinet/ip_icmp.h>
#include <arpa/inet.h>
#include <stdint.h>
#include <string.h>
#include <pcap.h>
#include "pcap_reader.h"
#define NUMLISTS 5
#define HASHSIZE 8192
#define HASH_KEYLENGTH 4
enum { SRC_IP, DST_IP, UDP_PORT, TCP_PORT, ICMP_TYPE };
static pcap_t *pcap_handle;
static uint32_t tcp_count, udp_count, icmp_count, arp_count, unknow_count;
/*
* Function prototypes
*/
static pcap_t *setup_pcap(char *fname, char *filter, char *errbuf);
static ssize_t decode_packet(struct pcap_pkthdr *hdr, u_char *pkt, void *buffer, struct sockaddr *sock);
/*
* function definitions
*/
static pcap_t *setup_pcap(char *fname, char *filter, char *errbuf) {
struct bpf_program filter_code;
bpf_u_int32 netmask;
/*
* Open the packet capturing file
*
*/
pcap_handle = pcap_open_offline(fname, errbuf);
if ( !pcap_handle )
return NULL;
netmask = 0;
/* apply filters if any are requested */
if ( filter ) {
if (pcap_compile(pcap_handle, &filter_code, filter, 1, netmask) == -1) {
/* pcap does not fill in the error code on pcap_compile */
snprintf(errbuf, PCAP_ERRBUF_SIZE,
"pcap_compile() failed: %s\n", pcap_geterr(pcap_handle));
pcap_close(pcap_handle);
return NULL;
}
if (pcap_setfilter(pcap_handle, &filter_code) == -1) {
/* pcap does not fill in the error code on pcap_compile */
snprintf(errbuf, PCAP_ERRBUF_SIZE,
"pcap_setfilter() failed: %s\n", pcap_geterr(pcap_handle));
pcap_close(pcap_handle);
return NULL;
}
}
/*
* We need to make sure this is Ethernet. The DLTEN10MB specifies
* standard 10MB and higher Ethernet.
*/
if (pcap_datalink(pcap_handle) != DLT_EN10MB) {
snprintf(errbuf, PCAP_ERRBUF_SIZE-1, "Snooping not an an ethernet.\n");
pcap_close(pcap_handle);
return NULL;
}
return pcap_handle;
} /* setup_pcap */
static ssize_t decode_packet(struct pcap_pkthdr *hdr, u_char *pkt, void *buffer, struct sockaddr *sock) {
struct ip *ip;
struct udphdr *udp;
struct tcphdr *tcp;
u_char *payload;
int len, i;
u_int hlen,version;
u_int length = hdr->len;
u_int packet_len;
struct sockaddr_in *in_sock = (struct sockaddr_in *)sock;
ip = NULL;
/*
* Figure out which layer 2 protocol the frame belongs to and call
* the corresponding decoding module. The protocol field of an
* Ethernet II header is the 13th + 14th byte. This is an endian
* independent way of extracting a big endian short from memory. We
* extract the first byte and make it the big byte and then extract
* the next byte and make it the small byte.
*/
REDO_LINK:
switch (pkt[12] << 0x08 | pkt[13]) {
case 0x0800:
/* IPv4 */
ip = (struct ip *)&pkt[14];
in_sock->sin_family = AF_INET;
in_sock->sin_addr = ip->ip_src;
#ifdef HAVE_STRUCT_SOCKADDR_SA_LEN
in_sock->sin_len = sizeof(struct sockaddr_in);
#endif
break;
case 0x0806:
/* ARP */
arp_count++;
break;
case 0x8100: // VLAN
pkt += 4; // strip off vlan
printf("Skip VLAN labels\n");
goto REDO_LINK;
break;
default:
/* We're not bothering with 802.3 or anything else */
printf("PCAP unknown linktype %u%u\n", pkt[12], pkt[13]);
unknow_count++;
break;
}
/* for the moment we handle only IPv4 */
if ( !ip || ip->ip_v != 4 )
return 0;
len = ntohs(ip->ip_len);
hlen = ip->ip_hl; /* header length */
version = ip->ip_v;/* ip version */
/* check version */
if(version != 4) {
fprintf(stdout,"Unknown version %d\n",version);
return 0;
}
/* check header length */
if(hlen < 5 ) {
fprintf(stdout,"bad-hlen %d \n",hlen);
return 0;
}
/* see if we have as much packet as we should */
if(length < len) {
printf("\ntruncated IP - %d bytes missing\n",len - length);
return 0;
}
switch (ip->ip_p) {
case IPPROTO_UDP:
udp_count++;
udp = (struct udphdr *)((void *)ip + (ip->ip_hl << 0x02));
packet_len = ntohs(udp->uh_ulen) - 8;
payload = (u_char *)((void *)udp + sizeof(struct udphdr));
memcpy(buffer, payload, packet_len);
in_sock->sin_port = udp->uh_sport;
return packet_len;
printf("Len: %u, UDP_len: %u, UDP: SRC: %s:%i, DST: %s:%i\n",
len, packet_len, inet_ntoa(ip->ip_src), ntohs(udp->uh_sport), inet_ntoa(ip->ip_dst), ntohs(udp->uh_dport));
for ( i=0; i<10; i++ ) {
printf("%x ", payload[i]);
}
printf("\n");
break;
case IPPROTO_TCP:
tcp_count++;
tcp = (struct tcphdr *)((void *)ip + (ip->ip_hl << 0x02));
printf("TCP src %i, dst %i, flags %i : ", ntohs(tcp->th_sport), ntohs(tcp->th_dport), tcp->th_flags);
if ( tcp->th_flags & TH_SYN )
printf("SYN ");
if ( tcp->th_flags & TH_ACK )
printf("ACK ");
if ( tcp->th_flags & TH_URG )
printf("URG ");
if ( tcp->th_flags & TH_PUSH )
printf("PUSH ");
if ( tcp->th_flags & TH_FIN )
printf("FIN ");
if ( tcp->th_flags & TH_RST )
printf("RST ");
printf("\n");
break;
/*
case IPPROTO_ICMP: {
struct icmp *icmp;
icmp_count++;
icmp = (struct icmp *)((void *)ip + (ip->ip_hl << 0x02));
} break;
*/
default:
/* no default */
break;
}
return 0;
} /* decode_packet */
void setup_packethandler(char *fname, char *filter ) {
char errbuf[PCAP_ERRBUF_SIZE];
pcap_handle = setup_pcap(fname, filter, errbuf);
if ( !pcap_handle ) {
fprintf(stderr, "Can't init pcap: %s\n", errbuf);
exit(255);
}
/*
// pcap_loop(p, -1, decode_packet, NULL);
while ( pcap_next_ex(pcap_handle, &header, (const u_char**)&pkt_data) == 1 ) {
decode_packet(header, pkt_data);
}
*/
} /* End of setup_packethandler */
ssize_t NextPacket(int fill1, void *buffer, size_t buffer_size, int fill2,
struct sockaddr *sock, socklen_t *size) {
// ssize_t NextPacket(void *buffer, size_t buffer_size) {
struct pcap_pkthdr *header;
u_char *pkt_data;
int i;
i = pcap_next_ex(pcap_handle, &header, (const u_char**)&pkt_data);
if ( i != 1 )
return -2;
*size = sizeof(struct sockaddr_in);
return decode_packet(header, pkt_data, buffer, sock);
}
/*
int main( int argc, char **argv ) {
setup_packethandler("sflow.pack", NULL);
return 0;
}
*/