1999-10-08 07:47:09 +08:00
|
|
|
/*
|
2001-07-05 06:03:13 +08:00
|
|
|
* Copyright (c) 1988, 1989, 1990, 1991, 1992, 1993, 1994, 1995, 1996, 1997, 2000
|
1999-10-08 07:47:09 +08:00
|
|
|
* The Regents of the University of California. All rights reserved.
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that: (1) source code distributions
|
|
|
|
* retain the above copyright notice and this paragraph in its entirety, (2)
|
|
|
|
* distributions including binary code include the above copyright notice and
|
|
|
|
* this paragraph in its entirety in the documentation or other materials
|
|
|
|
* provided with the distribution, and (3) all advertising materials mentioning
|
|
|
|
* features or use of this software display the following acknowledgement:
|
|
|
|
* ``This product includes software developed by the University of California,
|
|
|
|
* Lawrence Berkeley Laboratory and its contributors.'' Neither the name of
|
|
|
|
* the University nor the names of its contributors may be used to endorse
|
|
|
|
* or promote products derived from this software without specific prior
|
|
|
|
* written permission.
|
|
|
|
* THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED
|
|
|
|
* WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF
|
|
|
|
* MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
|
2001-10-03 15:35:42 +08:00
|
|
|
*
|
|
|
|
* Support for splitting captures into multiple files with a maximum
|
|
|
|
* file size:
|
|
|
|
*
|
|
|
|
* Copyright (c) 2001
|
|
|
|
* Seth Webster <swebster@sst.ll.mit.edu>
|
1999-10-08 07:47:09 +08:00
|
|
|
*/
|
|
|
|
|
2003-11-16 17:36:07 +08:00
|
|
|
#ifndef lint
|
|
|
|
static const char copyright[] _U_ =
|
|
|
|
"@(#) Copyright (c) 1988, 1989, 1990, 1991, 1992, 1993, 1994, 1995, 1996, 1997, 2000\n\
|
|
|
|
The Regents of the University of California. All rights reserved.\n";
|
|
|
|
static const char rcsid[] _U_ =
|
2008-09-26 05:45:50 +08:00
|
|
|
"@(#) $Header: /tcpdump/master/tcpdump/tcpdump.c,v 1.283 2008-09-25 21:45:50 guy Exp $ (LBL)";
|
2003-11-16 17:36:07 +08:00
|
|
|
#endif
|
1999-10-08 07:47:09 +08:00
|
|
|
|
|
|
|
/*
|
|
|
|
* tcpdump - monitor tcp/ip traffic on an ethernet.
|
|
|
|
*
|
|
|
|
* First written in 1987 by Van Jacobson, Lawrence Berkeley Laboratory.
|
|
|
|
* Mercilessly hacked and occasionally improved since then via the
|
|
|
|
* combined efforts of Van, Steve McCanne and Craig Leres of LBL.
|
|
|
|
*/
|
|
|
|
|
1999-11-21 17:36:43 +08:00
|
|
|
#ifdef HAVE_CONFIG_H
|
|
|
|
#include "config.h"
|
|
|
|
#endif
|
|
|
|
|
2002-08-01 16:52:55 +08:00
|
|
|
#include <tcpdump-stdinc.h>
|
1999-10-08 07:47:09 +08:00
|
|
|
|
2002-08-01 16:52:55 +08:00
|
|
|
#ifdef WIN32
|
|
|
|
#include "getopt.h"
|
|
|
|
#include "w32_fzs.h"
|
|
|
|
extern int strcasecmp (const char *__s1, const char *__s2);
|
|
|
|
extern int SIZE_BUF;
|
|
|
|
#define off_t long
|
|
|
|
#define uint UINT
|
|
|
|
#endif /* WIN32 */
|
1999-10-08 07:47:09 +08:00
|
|
|
|
2004-01-16 03:53:48 +08:00
|
|
|
#ifdef HAVE_SMI_H
|
|
|
|
#include <smi.h>
|
|
|
|
#endif
|
|
|
|
|
1999-10-08 07:47:09 +08:00
|
|
|
#include <pcap.h>
|
|
|
|
#include <signal.h>
|
|
|
|
#include <stdio.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <string.h>
|
2006-03-24 01:33:01 +08:00
|
|
|
#include <limits.h>
|
2004-03-20 05:36:35 +08:00
|
|
|
#ifndef WIN32
|
2007-10-13 08:46:16 +08:00
|
|
|
#include <sys/wait.h>
|
|
|
|
#include <sys/resource.h>
|
2004-01-22 17:35:50 +08:00
|
|
|
#include <pwd.h>
|
|
|
|
#include <grp.h>
|
2004-04-07 16:14:10 +08:00
|
|
|
#include <errno.h>
|
2004-03-20 05:36:35 +08:00
|
|
|
#endif /* WIN32 */
|
1999-10-08 07:47:09 +08:00
|
|
|
|
2012-05-25 22:26:17 +08:00
|
|
|
/* capabilities convinience library */
|
|
|
|
#ifdef HAVE_CAP_NG_H
|
|
|
|
#include <cap-ng.h>
|
|
|
|
#endif /* HAVE_CAP_NG_H */
|
2007-10-13 08:46:16 +08:00
|
|
|
|
2004-03-30 22:42:38 +08:00
|
|
|
#include "netdissect.h"
|
1999-10-08 07:47:09 +08:00
|
|
|
#include "interface.h"
|
|
|
|
#include "addrtoname.h"
|
|
|
|
#include "machdep.h"
|
|
|
|
#include "setsignal.h"
|
|
|
|
#include "gmt2local.h"
|
2002-12-19 17:27:54 +08:00
|
|
|
#include "pcap-missing.h"
|
1999-10-08 07:47:09 +08:00
|
|
|
|
2012-09-28 11:44:34 +08:00
|
|
|
#ifndef PATH_MAX
|
|
|
|
#define PATH_MAX 1024
|
2005-10-20 15:43:51 +08:00
|
|
|
#endif
|
|
|
|
|
2012-02-07 21:16:19 +08:00
|
|
|
#ifdef SIGINFO
|
|
|
|
#define SIGNAL_REQ_INFO SIGINFO
|
|
|
|
#elif SIGUSR1
|
|
|
|
#define SIGNAL_REQ_INFO SIGUSR1
|
|
|
|
#endif
|
|
|
|
|
2004-03-30 22:42:38 +08:00
|
|
|
netdissect_options Gndo;
|
|
|
|
netdissect_options *gndo = &Gndo;
|
From Chris Cogdon <chris@cogdon.org>:
Fix a segfault with the -C option when the number of files grows
to 1000. Limit has been increased to 1,000,000, and the code
will check for exceeding this.
Also, add a -W option which will limit the number of files
created before 'wrapping around' and writing to the first file
again, creating a 'loop tape'. Very useful if you want to have
this running permanently to capture traffic up to a irregular
event.
Change the way that output files with -C are numbered. -C alone
goes <none>, 1, 2, 3.... -C with -W will number 0, 1, 2 ... or
00, 01, 02 ... etc, depending on the value of -W. I.e., it
sorts properly. (Old behaviour was to go <none>, 2, 3...)
Close the current capture file before trying to allocate the buffer for
the new file's name, so that if that allocation fails we've at least
written out all of the previous file.
Make some variables for command-line arguments, and some functions not
used outside tcpdump.c, static.
2004-01-26 10:05:17 +08:00
|
|
|
|
2010-02-20 16:02:00 +08:00
|
|
|
static int dflag; /* print filter code */
|
|
|
|
static int Lflag; /* list available data link types and exit */
|
2010-08-23 08:32:26 +08:00
|
|
|
#ifdef HAVE_PCAP_SET_TSTAMP_TYPE
|
|
|
|
static int Jflag; /* list available time stamp types */
|
|
|
|
#endif
|
2010-02-20 16:02:00 +08:00
|
|
|
static char *zflag = NULL; /* compress each savefile using a specified command (like gzip or bzip2) */
|
1999-10-08 07:47:09 +08:00
|
|
|
|
2002-12-19 17:39:10 +08:00
|
|
|
static int infodelay;
|
|
|
|
static int infoprint;
|
1999-10-08 07:47:09 +08:00
|
|
|
|
|
|
|
char *program_name;
|
|
|
|
|
|
|
|
int32_t thiszone; /* seconds offset from gmt to local time */
|
|
|
|
|
|
|
|
/* Forwards */
|
2000-06-18 19:12:06 +08:00
|
|
|
static RETSIGTYPE cleanup(int);
|
2006-03-24 01:33:01 +08:00
|
|
|
static RETSIGTYPE child_cleanup(int);
|
2000-07-11 08:49:02 +08:00
|
|
|
static void usage(void) __attribute__((noreturn));
|
2009-12-01 16:39:54 +08:00
|
|
|
static void show_dlts_and_exit(const char *device, pcap_t *pd) __attribute__((noreturn));
|
2001-10-01 09:12:00 +08:00
|
|
|
|
2002-12-19 17:39:10 +08:00
|
|
|
static void print_packet(u_char *, const struct pcap_pkthdr *, const u_char *);
|
2004-12-23 18:43:12 +08:00
|
|
|
static void ndo_default_print(netdissect_options *, const u_char *, u_int);
|
2002-11-12 03:54:40 +08:00
|
|
|
static void dump_packet_and_trunc(u_char *, const struct pcap_pkthdr *, const u_char *);
|
|
|
|
static void dump_packet(u_char *, const struct pcap_pkthdr *, const u_char *);
|
2004-02-25 22:23:32 +08:00
|
|
|
static void droproot(const char *, const char *);
|
2011-06-25 09:24:11 +08:00
|
|
|
static void ndo_error(netdissect_options *ndo, const char *fmt, ...)
|
|
|
|
__attribute__ ((noreturn, format (printf, 2, 3)));
|
2004-04-05 08:15:50 +08:00
|
|
|
static void ndo_warning(netdissect_options *ndo, const char *fmt, ...);
|
2001-10-01 09:12:00 +08:00
|
|
|
|
2012-02-07 21:16:19 +08:00
|
|
|
#ifdef SIGNAL_REQ_INFO
|
2001-07-05 06:03:13 +08:00
|
|
|
RETSIGTYPE requestinfo(int);
|
|
|
|
#endif
|
1999-10-08 07:47:09 +08:00
|
|
|
|
2004-01-16 03:53:48 +08:00
|
|
|
#if defined(USE_WIN32_MM_TIMER)
|
|
|
|
#include <MMsystem.h>
|
|
|
|
static UINT timer_id;
|
|
|
|
static void CALLBACK verbose_stats_dump(UINT, UINT, DWORD_PTR, DWORD_PTR, DWORD_PTR);
|
|
|
|
#elif defined(HAVE_ALARM)
|
|
|
|
static void verbose_stats_dump(int sig);
|
|
|
|
#endif
|
|
|
|
|
2002-12-19 17:39:10 +08:00
|
|
|
static void info(int);
|
2003-09-17 05:02:51 +08:00
|
|
|
static u_int packets_captured;
|
2002-12-19 17:39:10 +08:00
|
|
|
|
1999-10-08 07:47:09 +08:00
|
|
|
struct printer {
|
2010-01-11 03:27:33 +08:00
|
|
|
if_printer f;
|
1999-10-08 07:47:09 +08:00
|
|
|
int type;
|
|
|
|
};
|
|
|
|
|
2010-01-11 03:27:33 +08:00
|
|
|
|
|
|
|
struct ndo_printer {
|
|
|
|
if_ndo_printer f;
|
|
|
|
int type;
|
|
|
|
};
|
|
|
|
|
|
|
|
|
1999-10-08 07:47:09 +08:00
|
|
|
static struct printer printers[] = {
|
2001-04-17 16:39:17 +08:00
|
|
|
{ arcnet_if_print, DLT_ARCNET },
|
2003-01-23 17:05:37 +08:00
|
|
|
#ifdef DLT_ARCNET_LINUX
|
|
|
|
{ arcnet_linux_if_print, DLT_ARCNET_LINUX },
|
|
|
|
#endif
|
Get rid of the PCAP_ENCAP_ values - if an application uses them, that
application won't build with any other version of libpcap, which means
that a lot of applications won't use them. In addition,
"pcap_linktype()" needs to return DLT_ values, so that platforms that
build libpcap as a shared library won't break binary compatibility if
they update to this version of libpcap.
Instead, we map from DLT_ values to LINKTYPE_ values when writing
savefiles, and map from LINKTYPE_ values to DLT_ values when reading
savefiles, so that savefiles don't have platform-dependent DLT_ values
in the header as the link type, they have platform-independent LINKTYPE_
values.
This means we don't need to make DLT_ATM_RFC1483, DLT_RAW, etc. have
platform-independent values starting at 100 - only the values in the
savefile header need to be like that.
2000-10-12 11:57:13 +08:00
|
|
|
{ token_if_print, DLT_IEEE802 },
|
|
|
|
#ifdef DLT_LANE8023
|
|
|
|
{ lane_if_print, DLT_LANE8023 },
|
1999-10-30 13:11:06 +08:00
|
|
|
#endif
|
2000-09-17 12:13:13 +08:00
|
|
|
#ifdef DLT_CIP
|
|
|
|
{ cip_if_print, DLT_CIP },
|
|
|
|
#endif
|
2000-12-09 10:58:45 +08:00
|
|
|
#ifdef DLT_ATM_CLIP
|
2010-01-05 04:11:04 +08:00
|
|
|
{ cip_if_print, DLT_ATM_CLIP },
|
2000-12-09 10:58:45 +08:00
|
|
|
#endif
|
Get rid of the PCAP_ENCAP_ values - if an application uses them, that
application won't build with any other version of libpcap, which means
that a lot of applications won't use them. In addition,
"pcap_linktype()" needs to return DLT_ values, so that platforms that
build libpcap as a shared library won't break binary compatibility if
they update to this version of libpcap.
Instead, we map from DLT_ values to LINKTYPE_ values when writing
savefiles, and map from LINKTYPE_ values to DLT_ values when reading
savefiles, so that savefiles don't have platform-dependent DLT_ values
in the header as the link type, they have platform-independent LINKTYPE_
values.
This means we don't need to make DLT_ATM_RFC1483, DLT_RAW, etc. have
platform-independent values starting at 100 - only the values in the
savefile header need to be like that.
2000-10-12 11:57:13 +08:00
|
|
|
{ sl_if_print, DLT_SLIP },
|
2003-05-02 16:46:28 +08:00
|
|
|
#ifdef DLT_SLIP_BSDOS
|
Get rid of the PCAP_ENCAP_ values - if an application uses them, that
application won't build with any other version of libpcap, which means
that a lot of applications won't use them. In addition,
"pcap_linktype()" needs to return DLT_ values, so that platforms that
build libpcap as a shared library won't break binary compatibility if
they update to this version of libpcap.
Instead, we map from DLT_ values to LINKTYPE_ values when writing
savefiles, and map from LINKTYPE_ values to DLT_ values when reading
savefiles, so that savefiles don't have platform-dependent DLT_ values
in the header as the link type, they have platform-independent LINKTYPE_
values.
This means we don't need to make DLT_ATM_RFC1483, DLT_RAW, etc. have
platform-independent values starting at 100 - only the values in the
savefile header need to be like that.
2000-10-12 11:57:13 +08:00
|
|
|
{ sl_bsdos_if_print, DLT_SLIP_BSDOS },
|
2003-05-02 16:46:28 +08:00
|
|
|
#endif
|
Get rid of the PCAP_ENCAP_ values - if an application uses them, that
application won't build with any other version of libpcap, which means
that a lot of applications won't use them. In addition,
"pcap_linktype()" needs to return DLT_ values, so that platforms that
build libpcap as a shared library won't break binary compatibility if
they update to this version of libpcap.
Instead, we map from DLT_ values to LINKTYPE_ values when writing
savefiles, and map from LINKTYPE_ values to DLT_ values when reading
savefiles, so that savefiles don't have platform-dependent DLT_ values
in the header as the link type, they have platform-independent LINKTYPE_
values.
This means we don't need to make DLT_ATM_RFC1483, DLT_RAW, etc. have
platform-independent values starting at 100 - only the values in the
savefile header need to be like that.
2000-10-12 11:57:13 +08:00
|
|
|
{ ppp_if_print, DLT_PPP },
|
2004-08-18 22:56:27 +08:00
|
|
|
#ifdef DLT_PPP_WITHDIRECTION
|
|
|
|
{ ppp_if_print, DLT_PPP_WITHDIRECTION },
|
|
|
|
#endif
|
2003-05-02 16:46:28 +08:00
|
|
|
#ifdef DLT_PPP_BSDOS
|
Get rid of the PCAP_ENCAP_ values - if an application uses them, that
application won't build with any other version of libpcap, which means
that a lot of applications won't use them. In addition,
"pcap_linktype()" needs to return DLT_ values, so that platforms that
build libpcap as a shared library won't break binary compatibility if
they update to this version of libpcap.
Instead, we map from DLT_ values to LINKTYPE_ values when writing
savefiles, and map from LINKTYPE_ values to DLT_ values when reading
savefiles, so that savefiles don't have platform-dependent DLT_ values
in the header as the link type, they have platform-independent LINKTYPE_
values.
This means we don't need to make DLT_ATM_RFC1483, DLT_RAW, etc. have
platform-independent values starting at 100 - only the values in the
savefile header need to be like that.
2000-10-12 11:57:13 +08:00
|
|
|
{ ppp_bsdos_if_print, DLT_PPP_BSDOS },
|
2003-05-02 16:46:28 +08:00
|
|
|
#endif
|
Get rid of the PCAP_ENCAP_ values - if an application uses them, that
application won't build with any other version of libpcap, which means
that a lot of applications won't use them. In addition,
"pcap_linktype()" needs to return DLT_ values, so that platforms that
build libpcap as a shared library won't break binary compatibility if
they update to this version of libpcap.
Instead, we map from DLT_ values to LINKTYPE_ values when writing
savefiles, and map from LINKTYPE_ values to DLT_ values when reading
savefiles, so that savefiles don't have platform-dependent DLT_ values
in the header as the link type, they have platform-independent LINKTYPE_
values.
This means we don't need to make DLT_ATM_RFC1483, DLT_RAW, etc. have
platform-independent values starting at 100 - only the values in the
savefile header need to be like that.
2000-10-12 11:57:13 +08:00
|
|
|
{ fddi_if_print, DLT_FDDI },
|
|
|
|
{ null_if_print, DLT_NULL },
|
Handle DLT_NULL correctly - the AF_ value is in host byte order, which
may not be *our* byte order if we're reading a capture file from another
machine; we currently handle that by checking whether it looks like an
integer < 65536 or not and, if it's not, byte-swap it.
This also lets us handle OpenBSD DLT_LOOP as well - it's like DLT_NULL
except that the AF_ value is in *network* byte order.
(Old-style Linux loopback captures were also DLT_NULL, but the header
had an Ethernet type in it; there have also been captures where the
header was a PPP header. For now, we just continue to assume that all
DLT_NULL packets are IP, and check the IP version field to decide
whether it's IPv4, IPv6, or something else.
We may want to consider adopting Ethereal's heuristics, which would at
least mean we wouldn't be reporting bogus packet types for old-style
Linux loopback captures and those weird PPP - ISDN4BSD? - captures,
although the version of libpcap that goes with this version of tcpdump
doesn't produce bogus DLT_NULL captures for Linux loopback devices.)
2000-12-17 06:00:50 +08:00
|
|
|
#ifdef DLT_LOOP
|
|
|
|
{ null_if_print, DLT_LOOP },
|
|
|
|
#endif
|
Get rid of the PCAP_ENCAP_ values - if an application uses them, that
application won't build with any other version of libpcap, which means
that a lot of applications won't use them. In addition,
"pcap_linktype()" needs to return DLT_ values, so that platforms that
build libpcap as a shared library won't break binary compatibility if
they update to this version of libpcap.
Instead, we map from DLT_ values to LINKTYPE_ values when writing
savefiles, and map from LINKTYPE_ values to DLT_ values when reading
savefiles, so that savefiles don't have platform-dependent DLT_ values
in the header as the link type, they have platform-independent LINKTYPE_
values.
This means we don't need to make DLT_ATM_RFC1483, DLT_RAW, etc. have
platform-independent values starting at 100 - only the values in the
savefile header need to be like that.
2000-10-12 11:57:13 +08:00
|
|
|
{ raw_if_print, DLT_RAW },
|
|
|
|
{ atm_if_print, DLT_ATM_RFC1483 },
|
2000-12-09 10:58:45 +08:00
|
|
|
#ifdef DLT_C_HDLC
|
Get rid of the PCAP_ENCAP_ values - if an application uses them, that
application won't build with any other version of libpcap, which means
that a lot of applications won't use them. In addition,
"pcap_linktype()" needs to return DLT_ values, so that platforms that
build libpcap as a shared library won't break binary compatibility if
they update to this version of libpcap.
Instead, we map from DLT_ values to LINKTYPE_ values when writing
savefiles, and map from LINKTYPE_ values to DLT_ values when reading
savefiles, so that savefiles don't have platform-dependent DLT_ values
in the header as the link type, they have platform-independent LINKTYPE_
values.
This means we don't need to make DLT_ATM_RFC1483, DLT_RAW, etc. have
platform-independent values starting at 100 - only the values in the
savefile header need to be like that.
2000-10-12 11:57:13 +08:00
|
|
|
{ chdlc_if_print, DLT_C_HDLC },
|
2000-12-09 10:58:45 +08:00
|
|
|
#endif
|
2001-03-11 10:45:28 +08:00
|
|
|
#ifdef DLT_HDLC
|
|
|
|
{ chdlc_if_print, DLT_HDLC },
|
|
|
|
#endif
|
2000-12-09 10:58:45 +08:00
|
|
|
#ifdef DLT_PPP_SERIAL
|
2010-01-05 04:11:04 +08:00
|
|
|
{ ppp_hdlc_if_print, DLT_PPP_SERIAL },
|
2000-12-21 18:43:19 +08:00
|
|
|
#endif
|
2001-06-20 15:40:44 +08:00
|
|
|
#ifdef DLT_PPP_ETHER
|
|
|
|
{ pppoe_if_print, DLT_PPP_ETHER },
|
|
|
|
#endif
|
2000-12-21 18:43:19 +08:00
|
|
|
#ifdef DLT_LINUX_SLL
|
|
|
|
{ sll_if_print, DLT_LINUX_SLL },
|
2001-06-12 13:17:16 +08:00
|
|
|
#endif
|
|
|
|
#ifdef DLT_IEEE802_11
|
|
|
|
{ ieee802_11_if_print, DLT_IEEE802_11},
|
2001-06-18 16:52:51 +08:00
|
|
|
#endif
|
|
|
|
#ifdef DLT_LTALK
|
|
|
|
{ ltalk_if_print, DLT_LTALK },
|
2000-12-09 10:58:45 +08:00
|
|
|
#endif
|
2007-09-13 03:36:18 +08:00
|
|
|
#if defined(DLT_PFLOG) && defined(HAVE_NET_PFVAR_H)
|
2010-01-05 04:11:04 +08:00
|
|
|
{ pflog_if_print, DLT_PFLOG },
|
2002-07-11 16:09:45 +08:00
|
|
|
#endif
|
|
|
|
#ifdef DLT_FR
|
|
|
|
{ fr_if_print, DLT_FR },
|
|
|
|
#endif
|
|
|
|
#ifdef DLT_FRELAY
|
|
|
|
{ fr_if_print, DLT_FRELAY },
|
2002-07-11 17:17:21 +08:00
|
|
|
#endif
|
|
|
|
#ifdef DLT_SUNATM
|
|
|
|
{ sunatm_if_print, DLT_SUNATM },
|
2002-10-18 17:17:46 +08:00
|
|
|
#endif
|
|
|
|
#ifdef DLT_IP_OVER_FC
|
|
|
|
{ ipfc_if_print, DLT_IP_OVER_FC },
|
2002-12-12 15:28:35 +08:00
|
|
|
#endif
|
|
|
|
#ifdef DLT_PRISM_HEADER
|
|
|
|
{ prism_if_print, DLT_PRISM_HEADER },
|
|
|
|
#endif
|
|
|
|
#ifdef DLT_IEEE802_11_RADIO
|
|
|
|
{ ieee802_11_radio_if_print, DLT_IEEE802_11_RADIO },
|
2003-03-08 16:55:32 +08:00
|
|
|
#endif
|
|
|
|
#ifdef DLT_ENC
|
2010-01-05 04:11:04 +08:00
|
|
|
{ enc_if_print, DLT_ENC },
|
2004-03-11 17:36:14 +08:00
|
|
|
#endif
|
|
|
|
#ifdef DLT_SYMANTEC_FIREWALL
|
2010-01-05 04:11:04 +08:00
|
|
|
{ symantec_if_print, DLT_SYMANTEC_FIREWALL },
|
2004-03-18 03:40:41 +08:00
|
|
|
#endif
|
|
|
|
#ifdef DLT_APPLE_IP_OVER_IEEE1394
|
|
|
|
{ ap1394_if_print, DLT_APPLE_IP_OVER_IEEE1394 },
|
2004-10-19 23:59:39 +08:00
|
|
|
#endif
|
2007-12-20 16:13:35 +08:00
|
|
|
#ifdef DLT_IEEE802_11_RADIO_AVS
|
|
|
|
{ ieee802_11_radio_avs_if_print, DLT_IEEE802_11_RADIO_AVS },
|
|
|
|
#endif
|
2004-10-19 23:59:39 +08:00
|
|
|
#ifdef DLT_JUNIPER_ATM1
|
|
|
|
{ juniper_atm1_print, DLT_JUNIPER_ATM1 },
|
|
|
|
#endif
|
|
|
|
#ifdef DLT_JUNIPER_ATM2
|
|
|
|
{ juniper_atm2_print, DLT_JUNIPER_ATM2 },
|
2005-01-27 18:17:58 +08:00
|
|
|
#endif
|
2005-04-20 20:41:44 +08:00
|
|
|
#ifdef DLT_JUNIPER_MFR
|
|
|
|
{ juniper_mfr_print, DLT_JUNIPER_MFR },
|
|
|
|
#endif
|
2005-01-27 18:17:58 +08:00
|
|
|
#ifdef DLT_JUNIPER_MLFR
|
|
|
|
{ juniper_mlfr_print, DLT_JUNIPER_MLFR },
|
2005-01-28 02:30:36 +08:00
|
|
|
#endif
|
|
|
|
#ifdef DLT_JUNIPER_MLPPP
|
|
|
|
{ juniper_mlppp_print, DLT_JUNIPER_MLPPP },
|
2005-05-04 04:35:41 +08:00
|
|
|
#endif
|
|
|
|
#ifdef DLT_JUNIPER_PPPOE
|
|
|
|
{ juniper_pppoe_print, DLT_JUNIPER_PPPOE },
|
2005-05-12 15:10:55 +08:00
|
|
|
#endif
|
|
|
|
#ifdef DLT_JUNIPER_PPPOE_ATM
|
|
|
|
{ juniper_pppoe_atm_print, DLT_JUNIPER_PPPOE_ATM },
|
2005-05-23 05:18:17 +08:00
|
|
|
#endif
|
|
|
|
#ifdef DLT_JUNIPER_GGSN
|
|
|
|
{ juniper_ggsn_print, DLT_JUNIPER_GGSN },
|
|
|
|
#endif
|
|
|
|
#ifdef DLT_JUNIPER_ES
|
|
|
|
{ juniper_es_print, DLT_JUNIPER_ES },
|
|
|
|
#endif
|
|
|
|
#ifdef DLT_JUNIPER_MONITOR
|
|
|
|
{ juniper_monitor_print, DLT_JUNIPER_MONITOR },
|
|
|
|
#endif
|
|
|
|
#ifdef DLT_JUNIPER_SERVICES
|
|
|
|
{ juniper_services_print, DLT_JUNIPER_SERVICES },
|
2005-08-23 18:24:58 +08:00
|
|
|
#endif
|
|
|
|
#ifdef DLT_JUNIPER_ETHER
|
2010-01-05 04:11:04 +08:00
|
|
|
{ juniper_ether_print, DLT_JUNIPER_ETHER },
|
2005-08-23 18:24:58 +08:00
|
|
|
#endif
|
|
|
|
#ifdef DLT_JUNIPER_PPP
|
2010-01-05 04:11:04 +08:00
|
|
|
{ juniper_ppp_print, DLT_JUNIPER_PPP },
|
2005-08-23 18:24:58 +08:00
|
|
|
#endif
|
|
|
|
#ifdef DLT_JUNIPER_FRELAY
|
2010-01-05 04:11:04 +08:00
|
|
|
{ juniper_frelay_print, DLT_JUNIPER_FRELAY },
|
2005-08-23 18:24:58 +08:00
|
|
|
#endif
|
|
|
|
#ifdef DLT_JUNIPER_CHDLC
|
2010-01-05 04:11:04 +08:00
|
|
|
{ juniper_chdlc_print, DLT_JUNIPER_CHDLC },
|
2005-12-13 21:44:29 +08:00
|
|
|
#endif
|
|
|
|
#ifdef DLT_MFR
|
2010-01-05 04:11:04 +08:00
|
|
|
{ mfr_if_print, DLT_MFR },
|
2007-09-25 07:46:26 +08:00
|
|
|
#endif
|
2008-09-26 05:45:50 +08:00
|
|
|
#if defined(DLT_BLUETOOTH_HCI_H4_WITH_PHDR) && defined(HAVE_PCAP_BLUETOOTH_H)
|
2010-01-05 04:11:04 +08:00
|
|
|
{ bt_if_print, DLT_BLUETOOTH_HCI_H4_WITH_PHDR},
|
2009-04-05 03:30:27 +08:00
|
|
|
#endif
|
2010-01-26 07:25:33 +08:00
|
|
|
#ifdef HAVE_PCAP_USB_H
|
|
|
|
#ifdef DLT_USB_LINUX
|
|
|
|
{ usb_linux_48_byte_print, DLT_USB_LINUX},
|
|
|
|
#endif /* DLT_USB_LINUX */
|
|
|
|
#ifdef DLT_USB_LINUX_MMAPPED
|
|
|
|
{ usb_linux_64_byte_print, DLT_USB_LINUX_MMAPPED},
|
|
|
|
#endif /* DLT_USB_LINUX_MMAPPED */
|
|
|
|
#endif /* HAVE_PCAP_USB_H */
|
2010-01-11 05:34:22 +08:00
|
|
|
#ifdef DLT_IPV4
|
|
|
|
{ raw_if_print, DLT_IPV4 },
|
|
|
|
#endif
|
|
|
|
#ifdef DLT_IPV6
|
|
|
|
{ raw_if_print, DLT_IPV6 },
|
2009-04-05 03:30:27 +08:00
|
|
|
#endif
|
2010-01-11 03:27:33 +08:00
|
|
|
{ NULL, 0 },
|
|
|
|
};
|
|
|
|
|
|
|
|
static struct ndo_printer ndo_printers[] = {
|
2010-10-08 02:36:49 +08:00
|
|
|
{ ether_if_print, DLT_EN10MB },
|
2009-11-25 10:20:25 +08:00
|
|
|
#ifdef DLT_IPNET
|
2010-01-05 04:11:04 +08:00
|
|
|
{ ipnet_if_print, DLT_IPNET },
|
2010-05-14 02:30:59 +08:00
|
|
|
#endif
|
|
|
|
#ifdef DLT_IEEE802_15_4
|
|
|
|
{ ieee802_15_4_if_print, DLT_IEEE802_15_4 },
|
2010-08-23 09:00:27 +08:00
|
|
|
#endif
|
|
|
|
#ifdef DLT_IEEE802_15_4_NOFCS
|
|
|
|
{ ieee802_15_4_if_print, DLT_IEEE802_15_4_NOFCS },
|
2011-05-04 06:58:32 +08:00
|
|
|
#endif
|
|
|
|
#ifdef DLT_PPI
|
|
|
|
{ ppi_if_print, DLT_PPI },
|
2011-09-16 03:56:17 +08:00
|
|
|
#endif
|
2011-09-16 08:39:56 +08:00
|
|
|
#ifdef DLT_NETANALYZER
|
|
|
|
{ netanalyzer_if_print, DLT_NETANALYZER },
|
2011-09-16 03:56:17 +08:00
|
|
|
#endif
|
2011-09-16 08:39:56 +08:00
|
|
|
#ifdef DLT_NETANALYZER_TRANSPARENT
|
|
|
|
{ netanalyzer_transparent_if_print, DLT_NETANALYZER_TRANSPARENT },
|
2002-02-05 18:07:38 +08:00
|
|
|
#endif
|
1999-10-08 07:47:09 +08:00
|
|
|
{ NULL, 0 },
|
|
|
|
};
|
|
|
|
|
2011-05-04 06:58:32 +08:00
|
|
|
if_printer
|
1999-10-08 07:47:09 +08:00
|
|
|
lookup_printer(int type)
|
|
|
|
{
|
|
|
|
struct printer *p;
|
|
|
|
|
|
|
|
for (p = printers; p->f; ++p)
|
|
|
|
if (type == p->type)
|
|
|
|
return p->f;
|
|
|
|
|
2002-12-19 17:27:54 +08:00
|
|
|
return NULL;
|
1999-10-08 07:47:09 +08:00
|
|
|
/* NOTREACHED */
|
|
|
|
}
|
|
|
|
|
2011-05-04 06:58:32 +08:00
|
|
|
if_ndo_printer
|
2010-01-11 03:27:33 +08:00
|
|
|
lookup_ndo_printer(int type)
|
|
|
|
{
|
|
|
|
struct ndo_printer *p;
|
|
|
|
|
|
|
|
for (p = ndo_printers; p->f; ++p)
|
|
|
|
if (type == p->type)
|
|
|
|
return p->f;
|
|
|
|
|
|
|
|
return NULL;
|
|
|
|
/* NOTREACHED */
|
|
|
|
}
|
|
|
|
|
2001-10-03 15:35:42 +08:00
|
|
|
static pcap_t *pd;
|
1999-10-08 07:47:09 +08:00
|
|
|
|
2009-12-01 16:39:54 +08:00
|
|
|
static int supports_monitor_mode;
|
|
|
|
|
1999-10-08 07:47:09 +08:00
|
|
|
extern int optind;
|
|
|
|
extern int opterr;
|
|
|
|
extern char *optarg;
|
|
|
|
|
2002-12-19 17:39:10 +08:00
|
|
|
struct print_info {
|
2010-01-11 03:27:33 +08:00
|
|
|
netdissect_options *ndo;
|
|
|
|
union {
|
|
|
|
if_printer printer;
|
|
|
|
if_ndo_printer ndo_printer;
|
|
|
|
} p;
|
|
|
|
int ndo_type;
|
2002-12-19 17:39:10 +08:00
|
|
|
};
|
|
|
|
|
2001-10-03 15:35:42 +08:00
|
|
|
struct dump_info {
|
|
|
|
char *WFileName;
|
2006-03-24 01:33:01 +08:00
|
|
|
char *CurrentFileName;
|
2001-10-03 15:35:42 +08:00
|
|
|
pcap_t *pd;
|
|
|
|
pcap_dumper_t *p;
|
|
|
|
};
|
|
|
|
|
2010-08-23 08:32:26 +08:00
|
|
|
#ifdef HAVE_PCAP_SET_TSTAMP_TYPE
|
|
|
|
static void
|
|
|
|
show_tstamp_types_and_exit(const char *device, pcap_t *pd)
|
|
|
|
{
|
|
|
|
int n_tstamp_types;
|
|
|
|
int *tstamp_types = 0;
|
|
|
|
const char *tstamp_type_name;
|
|
|
|
int i;
|
|
|
|
|
|
|
|
n_tstamp_types = pcap_list_tstamp_types(pd, &tstamp_types);
|
|
|
|
if (n_tstamp_types < 0)
|
|
|
|
error("%s", pcap_geterr(pd));
|
|
|
|
|
2010-08-23 08:59:00 +08:00
|
|
|
if (n_tstamp_types == 0) {
|
|
|
|
fprintf(stderr, "Time stamp type cannot be set for %s\n",
|
|
|
|
device);
|
|
|
|
exit(0);
|
|
|
|
}
|
|
|
|
fprintf(stderr, "Time stamp types for %s (use option -j to set):\n",
|
|
|
|
device);
|
2010-08-23 08:32:26 +08:00
|
|
|
for (i = 0; i < n_tstamp_types; i++) {
|
|
|
|
tstamp_type_name = pcap_tstamp_type_val_to_name(tstamp_types[i]);
|
|
|
|
if (tstamp_type_name != NULL) {
|
|
|
|
(void) fprintf(stderr, " %s (%s)\n", tstamp_type_name,
|
|
|
|
pcap_tstamp_type_val_to_description(tstamp_types[i]));
|
|
|
|
} else {
|
|
|
|
(void) fprintf(stderr, " %d\n", tstamp_types[i]);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
pcap_free_tstamp_types(tstamp_types);
|
|
|
|
exit(0);
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2002-12-19 17:27:54 +08:00
|
|
|
static void
|
2009-12-01 16:39:54 +08:00
|
|
|
show_dlts_and_exit(const char *device, pcap_t *pd)
|
2002-12-19 17:27:54 +08:00
|
|
|
{
|
|
|
|
int n_dlts;
|
|
|
|
int *dlts = 0;
|
|
|
|
const char *dlt_name;
|
|
|
|
|
|
|
|
n_dlts = pcap_list_datalinks(pd, &dlts);
|
|
|
|
if (n_dlts < 0)
|
|
|
|
error("%s", pcap_geterr(pd));
|
|
|
|
else if (n_dlts == 0 || !dlts)
|
|
|
|
error("No data link types.");
|
|
|
|
|
2009-12-01 16:39:54 +08:00
|
|
|
/*
|
|
|
|
* If the interface is known to support monitor mode, indicate
|
|
|
|
* whether these are the data link types available when not in
|
|
|
|
* monitor mode, if -I wasn't specified, or when in monitor mode,
|
|
|
|
* when -I was specified (the link-layer types available in
|
|
|
|
* monitor mode might be different from the ones available when
|
|
|
|
* not in monitor mode).
|
|
|
|
*/
|
|
|
|
if (supports_monitor_mode)
|
|
|
|
(void) fprintf(stderr, "Data link types for %s %s (use option -y to set):\n",
|
|
|
|
device,
|
|
|
|
Iflag ? "when in monitor mode" : "when not in monitor mode");
|
|
|
|
else
|
|
|
|
(void) fprintf(stderr, "Data link types for %s (use option -y to set):\n",
|
|
|
|
device);
|
2002-12-19 17:27:54 +08:00
|
|
|
|
|
|
|
while (--n_dlts >= 0) {
|
|
|
|
dlt_name = pcap_datalink_val_to_name(dlts[n_dlts]);
|
|
|
|
if (dlt_name != NULL) {
|
2003-11-19 07:09:42 +08:00
|
|
|
(void) fprintf(stderr, " %s (%s)", dlt_name,
|
|
|
|
pcap_datalink_val_to_description(dlts[n_dlts]));
|
2002-12-19 17:27:54 +08:00
|
|
|
|
|
|
|
/*
|
|
|
|
* OK, does tcpdump handle that type?
|
|
|
|
*/
|
2010-01-11 03:27:33 +08:00
|
|
|
if (lookup_printer(dlts[n_dlts]) == NULL
|
|
|
|
&& lookup_ndo_printer(dlts[n_dlts]) == NULL)
|
2008-01-29 18:49:27 +08:00
|
|
|
(void) fprintf(stderr, " (printing not supported)");
|
2010-05-07 16:11:45 +08:00
|
|
|
fprintf(stderr, "\n");
|
2002-12-19 17:27:54 +08:00
|
|
|
} else {
|
2008-01-29 18:49:27 +08:00
|
|
|
(void) fprintf(stderr, " DLT %d (printing not supported)\n",
|
2002-12-19 17:27:54 +08:00
|
|
|
dlts[n_dlts]);
|
|
|
|
}
|
|
|
|
}
|
2012-07-01 06:59:18 +08:00
|
|
|
#ifdef HAVE_PCAP_FREE_DATALINKS
|
2010-08-23 08:32:26 +08:00
|
|
|
pcap_free_datalinks(dlts);
|
2012-07-01 06:59:18 +08:00
|
|
|
#endif
|
2002-12-19 17:27:54 +08:00
|
|
|
exit(0);
|
|
|
|
}
|
|
|
|
|
2002-12-22 08:15:26 +08:00
|
|
|
/*
|
|
|
|
* Set up flags that might or might not be supported depending on the
|
|
|
|
* version of libpcap we're using.
|
|
|
|
*/
|
2008-04-05 03:42:11 +08:00
|
|
|
#if defined(HAVE_PCAP_CREATE) || defined(WIN32)
|
2002-12-22 08:15:26 +08:00
|
|
|
#define B_FLAG "B:"
|
|
|
|
#define B_FLAG_USAGE " [ -B size ]"
|
2008-04-05 03:42:11 +08:00
|
|
|
#else /* defined(HAVE_PCAP_CREATE) || defined(WIN32) */
|
2002-12-22 08:15:26 +08:00
|
|
|
#define B_FLAG
|
|
|
|
#define B_FLAG_USAGE
|
2008-04-05 03:42:11 +08:00
|
|
|
#endif /* defined(HAVE_PCAP_CREATE) || defined(WIN32) */
|
|
|
|
|
|
|
|
#ifdef HAVE_PCAP_CREATE
|
|
|
|
#define I_FLAG "I"
|
|
|
|
#else /* HAVE_PCAP_CREATE */
|
|
|
|
#define I_FLAG
|
|
|
|
#endif /* HAVE_PCAP_CREATE */
|
2002-12-22 08:15:26 +08:00
|
|
|
|
2010-08-23 08:32:26 +08:00
|
|
|
#ifdef HAVE_PCAP_SET_TSTAMP_TYPE
|
|
|
|
#define j_FLAG "j:"
|
|
|
|
#define j_FLAG_USAGE " [ -j tstamptype ]"
|
|
|
|
#define J_FLAG "J"
|
|
|
|
#else /* PCAP_ERROR_TSTAMP_TYPE_NOTSUP */
|
|
|
|
#define j_FLAG
|
|
|
|
#define j_FLAG_USAGE
|
|
|
|
#define J_FLAG
|
|
|
|
#endif /* PCAP_ERROR_TSTAMP_TYPE_NOTSUP */
|
|
|
|
|
2004-03-24 02:57:33 +08:00
|
|
|
#ifdef HAVE_PCAP_FINDALLDEVS
|
|
|
|
#ifndef HAVE_PCAP_IF_T
|
|
|
|
#undef HAVE_PCAP_FINDALLDEVS
|
|
|
|
#endif
|
|
|
|
#endif
|
|
|
|
|
2002-12-22 08:15:26 +08:00
|
|
|
#ifdef HAVE_PCAP_FINDALLDEVS
|
|
|
|
#define D_FLAG "D"
|
|
|
|
#else
|
|
|
|
#define D_FLAG
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#ifdef HAVE_PCAP_DUMP_FLUSH
|
|
|
|
#define U_FLAG "U"
|
|
|
|
#else
|
|
|
|
#define U_FLAG
|
|
|
|
#endif
|
|
|
|
|
2004-03-20 05:36:35 +08:00
|
|
|
#ifndef WIN32
|
2004-02-25 22:23:32 +08:00
|
|
|
/* Drop root privileges and chroot if necessary */
|
From Chris Cogdon <chris@cogdon.org>:
Fix a segfault with the -C option when the number of files grows
to 1000. Limit has been increased to 1,000,000, and the code
will check for exceeding this.
Also, add a -W option which will limit the number of files
created before 'wrapping around' and writing to the first file
again, creating a 'loop tape'. Very useful if you want to have
this running permanently to capture traffic up to a irregular
event.
Change the way that output files with -C are numbered. -C alone
goes <none>, 1, 2, 3.... -C with -W will number 0, 1, 2 ... or
00, 01, 02 ... etc, depending on the value of -W. I.e., it
sorts properly. (Old behaviour was to go <none>, 2, 3...)
Close the current capture file before trying to allocate the buffer for
the new file's name, so that if that allocation fails we've at least
written out all of the previous file.
Make some variables for command-line arguments, and some functions not
used outside tcpdump.c, static.
2004-01-26 10:05:17 +08:00
|
|
|
static void
|
2004-02-25 22:23:32 +08:00
|
|
|
droproot(const char *username, const char *chroot_dir)
|
2004-01-22 17:35:50 +08:00
|
|
|
{
|
|
|
|
struct passwd *pw = NULL;
|
From Chris Cogdon <chris@cogdon.org>:
Fix a segfault with the -C option when the number of files grows
to 1000. Limit has been increased to 1,000,000, and the code
will check for exceeding this.
Also, add a -W option which will limit the number of files
created before 'wrapping around' and writing to the first file
again, creating a 'loop tape'. Very useful if you want to have
this running permanently to capture traffic up to a irregular
event.
Change the way that output files with -C are numbered. -C alone
goes <none>, 1, 2, 3.... -C with -W will number 0, 1, 2 ... or
00, 01, 02 ... etc, depending on the value of -W. I.e., it
sorts properly. (Old behaviour was to go <none>, 2, 3...)
Close the current capture file before trying to allocate the buffer for
the new file's name, so that if that allocation fails we've at least
written out all of the previous file.
Make some variables for command-line arguments, and some functions not
used outside tcpdump.c, static.
2004-01-26 10:05:17 +08:00
|
|
|
|
2004-02-25 22:23:32 +08:00
|
|
|
if (chroot_dir && !username) {
|
2004-04-07 16:14:10 +08:00
|
|
|
fprintf(stderr, "tcpdump: Chroot without dropping root is insecure\n");
|
2004-02-25 22:23:32 +08:00
|
|
|
exit(1);
|
|
|
|
}
|
|
|
|
|
2004-01-22 17:35:50 +08:00
|
|
|
pw = getpwnam(username);
|
|
|
|
if (pw) {
|
2004-02-25 22:23:32 +08:00
|
|
|
if (chroot_dir) {
|
|
|
|
if (chroot(chroot_dir) != 0 || chdir ("/") != 0) {
|
2004-04-07 16:14:10 +08:00
|
|
|
fprintf(stderr, "tcpdump: Couldn't chroot/chdir to '%.64s': %s\n",
|
|
|
|
chroot_dir, pcap_strerror(errno));
|
2004-02-25 22:23:32 +08:00
|
|
|
exit(1);
|
|
|
|
}
|
|
|
|
}
|
2012-05-25 22:26:17 +08:00
|
|
|
#ifdef HAVE_CAP_NG_H
|
|
|
|
int ret = capng_change_id(pw->pw_uid, pw->pw_gid, CAPNG_NO_FLAG);
|
|
|
|
if (ret < 0) {
|
|
|
|
printf("error : ret %d\n", ret);
|
|
|
|
}
|
|
|
|
/* We don't need CAP_SETUID and CAP_SETGID */
|
|
|
|
capng_update(CAPNG_DROP, CAPNG_EFFECTIVE, CAP_SETUID);
|
|
|
|
capng_update(CAPNG_DROP, CAPNG_EFFECTIVE, CAP_SETUID);
|
|
|
|
capng_update(CAPNG_DROP, CAPNG_PERMITTED, CAP_SETUID);
|
|
|
|
capng_update(CAPNG_DROP, CAPNG_PERMITTED, CAP_SETUID);
|
|
|
|
capng_apply(CAPNG_SELECT_BOTH);
|
|
|
|
|
|
|
|
#else
|
2004-04-07 16:14:10 +08:00
|
|
|
if (initgroups(pw->pw_name, pw->pw_gid) != 0 ||
|
|
|
|
setgid(pw->pw_gid) != 0 || setuid(pw->pw_uid) != 0) {
|
|
|
|
fprintf(stderr, "tcpdump: Couldn't change to '%.32s' uid=%lu gid=%lu: %s\n",
|
|
|
|
username,
|
|
|
|
(unsigned long)pw->pw_uid,
|
|
|
|
(unsigned long)pw->pw_gid,
|
|
|
|
pcap_strerror(errno));
|
2004-01-22 17:35:50 +08:00
|
|
|
exit(1);
|
|
|
|
}
|
2012-05-25 22:26:17 +08:00
|
|
|
#endif /* HAVE_CAP_NG_H */
|
2004-01-22 17:35:50 +08:00
|
|
|
}
|
|
|
|
else {
|
2004-04-07 16:14:10 +08:00
|
|
|
fprintf(stderr, "tcpdump: Couldn't find user '%.32s'\n",
|
|
|
|
username);
|
2004-01-22 17:35:50 +08:00
|
|
|
exit(1);
|
|
|
|
}
|
|
|
|
}
|
2004-03-20 05:36:35 +08:00
|
|
|
#endif /* WIN32 */
|
2004-01-22 17:35:50 +08:00
|
|
|
|
From Chris Cogdon <chris@cogdon.org>:
Fix a segfault with the -C option when the number of files grows
to 1000. Limit has been increased to 1,000,000, and the code
will check for exceeding this.
Also, add a -W option which will limit the number of files
created before 'wrapping around' and writing to the first file
again, creating a 'loop tape'. Very useful if you want to have
this running permanently to capture traffic up to a irregular
event.
Change the way that output files with -C are numbered. -C alone
goes <none>, 1, 2, 3.... -C with -W will number 0, 1, 2 ... or
00, 01, 02 ... etc, depending on the value of -W. I.e., it
sorts properly. (Old behaviour was to go <none>, 2, 3...)
Close the current capture file before trying to allocate the buffer for
the new file's name, so that if that allocation fails we've at least
written out all of the previous file.
Make some variables for command-line arguments, and some functions not
used outside tcpdump.c, static.
2004-01-26 10:05:17 +08:00
|
|
|
static int
|
|
|
|
getWflagChars(int x)
|
|
|
|
{
|
|
|
|
int c = 0;
|
|
|
|
|
|
|
|
x -= 1;
|
|
|
|
while (x > 0) {
|
|
|
|
c += 1;
|
|
|
|
x /= 10;
|
|
|
|
}
|
|
|
|
|
|
|
|
return c;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
MakeFilename(char *buffer, char *orig_name, int cnt, int max_chars)
|
|
|
|
{
|
2012-09-28 11:44:34 +08:00
|
|
|
char *filename = malloc(PATH_MAX + 1);
|
2012-09-05 02:15:29 +08:00
|
|
|
if (filename == NULL)
|
2012-09-11 01:29:20 +08:00
|
|
|
error("Makefilename: malloc");
|
2005-10-20 15:43:51 +08:00
|
|
|
|
|
|
|
/* Process with strftime if Gflag is set. */
|
|
|
|
if (Gflag != 0) {
|
|
|
|
struct tm *local_tm;
|
|
|
|
|
|
|
|
/* Convert Gflag_time to a usable format */
|
|
|
|
if ((local_tm = localtime(&Gflag_time)) == NULL) {
|
|
|
|
error("MakeTimedFilename: localtime");
|
|
|
|
}
|
|
|
|
|
|
|
|
/* There's no good way to detect an error in strftime since a return
|
|
|
|
* value of 0 isn't necessarily failure.
|
|
|
|
*/
|
2012-09-28 11:44:34 +08:00
|
|
|
strftime(filename, PATH_MAX, orig_name, local_tm);
|
2005-10-20 15:43:51 +08:00
|
|
|
} else {
|
2012-09-28 11:44:34 +08:00
|
|
|
strncpy(filename, orig_name, PATH_MAX);
|
2005-10-20 15:43:51 +08:00
|
|
|
}
|
|
|
|
|
From Chris Cogdon <chris@cogdon.org>:
Fix a segfault with the -C option when the number of files grows
to 1000. Limit has been increased to 1,000,000, and the code
will check for exceeding this.
Also, add a -W option which will limit the number of files
created before 'wrapping around' and writing to the first file
again, creating a 'loop tape'. Very useful if you want to have
this running permanently to capture traffic up to a irregular
event.
Change the way that output files with -C are numbered. -C alone
goes <none>, 1, 2, 3.... -C with -W will number 0, 1, 2 ... or
00, 01, 02 ... etc, depending on the value of -W. I.e., it
sorts properly. (Old behaviour was to go <none>, 2, 3...)
Close the current capture file before trying to allocate the buffer for
the new file's name, so that if that allocation fails we've at least
written out all of the previous file.
Make some variables for command-line arguments, and some functions not
used outside tcpdump.c, static.
2004-01-26 10:05:17 +08:00
|
|
|
if (cnt == 0 && max_chars == 0)
|
2012-09-28 11:44:34 +08:00
|
|
|
strncpy(buffer, filename, PATH_MAX + 1);
|
From Chris Cogdon <chris@cogdon.org>:
Fix a segfault with the -C option when the number of files grows
to 1000. Limit has been increased to 1,000,000, and the code
will check for exceeding this.
Also, add a -W option which will limit the number of files
created before 'wrapping around' and writing to the first file
again, creating a 'loop tape'. Very useful if you want to have
this running permanently to capture traffic up to a irregular
event.
Change the way that output files with -C are numbered. -C alone
goes <none>, 1, 2, 3.... -C with -W will number 0, 1, 2 ... or
00, 01, 02 ... etc, depending on the value of -W. I.e., it
sorts properly. (Old behaviour was to go <none>, 2, 3...)
Close the current capture file before trying to allocate the buffer for
the new file's name, so that if that allocation fails we've at least
written out all of the previous file.
Make some variables for command-line arguments, and some functions not
used outside tcpdump.c, static.
2004-01-26 10:05:17 +08:00
|
|
|
else
|
2012-09-28 11:44:34 +08:00
|
|
|
if (snprintf(buffer, PATH_MAX + 1, "%s%0*d", filename, max_chars, cnt) > PATH_MAX)
|
2005-10-20 15:43:51 +08:00
|
|
|
/* Report an error if the filename is too large */
|
2012-09-28 11:44:34 +08:00
|
|
|
error("too many output files or filename is too long (> %d)", PATH_MAX);
|
2005-10-25 17:29:44 +08:00
|
|
|
free(filename);
|
From Chris Cogdon <chris@cogdon.org>:
Fix a segfault with the -C option when the number of files grows
to 1000. Limit has been increased to 1,000,000, and the code
will check for exceeding this.
Also, add a -W option which will limit the number of files
created before 'wrapping around' and writing to the first file
again, creating a 'loop tape'. Very useful if you want to have
this running permanently to capture traffic up to a irregular
event.
Change the way that output files with -C are numbered. -C alone
goes <none>, 1, 2, 3.... -C with -W will number 0, 1, 2 ... or
00, 01, 02 ... etc, depending on the value of -W. I.e., it
sorts properly. (Old behaviour was to go <none>, 2, 3...)
Close the current capture file before trying to allocate the buffer for
the new file's name, so that if that allocation fails we've at least
written out all of the previous file.
Make some variables for command-line arguments, and some functions not
used outside tcpdump.c, static.
2004-01-26 10:05:17 +08:00
|
|
|
}
|
|
|
|
|
2004-03-30 22:42:38 +08:00
|
|
|
static int tcpdump_printf(netdissect_options *ndo _U_,
|
|
|
|
const char *fmt, ...)
|
|
|
|
{
|
|
|
|
|
|
|
|
va_list args;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
va_start(args, fmt);
|
|
|
|
ret=vfprintf(stdout, fmt, args);
|
|
|
|
va_end(args);
|
|
|
|
|
|
|
|
return ret;
|
2004-07-22 06:06:47 +08:00
|
|
|
}
|
2004-03-30 22:42:38 +08:00
|
|
|
|
2012-08-12 02:34:24 +08:00
|
|
|
struct print_info get_print_info(int type) {
|
|
|
|
struct print_info printinfo;
|
|
|
|
|
|
|
|
printinfo.ndo_type = 1;
|
|
|
|
printinfo.ndo = gndo;
|
|
|
|
printinfo.p.ndo_printer = lookup_ndo_printer(type);
|
|
|
|
if (printinfo.p.ndo_printer == NULL) {
|
|
|
|
printinfo.p.printer = lookup_printer(type);
|
|
|
|
printinfo.ndo_type = 0;
|
|
|
|
if (printinfo.p.printer == NULL) {
|
|
|
|
gndo->ndo_dltname = pcap_datalink_val_to_name(type);
|
|
|
|
if (gndo->ndo_dltname != NULL)
|
|
|
|
error("packet printing is not supported for link type %s: use -w",
|
|
|
|
gndo->ndo_dltname);
|
|
|
|
else
|
|
|
|
error("packet printing is not supported for link type %d: use -w", type);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return (printinfo);
|
|
|
|
}
|
|
|
|
|
2012-09-07 02:40:21 +08:00
|
|
|
char *get_next_file(FILE *VFile, char *ptr) {
|
|
|
|
char *ret;
|
|
|
|
|
|
|
|
ret = fgets(ptr, NAME_MAX, VFile);
|
|
|
|
if (!ret)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
if (ptr[strlen(ptr) - 1] == '\n')
|
|
|
|
ptr[strlen(ptr) - 1] = '\0';
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
1999-10-08 07:47:09 +08:00
|
|
|
int
|
|
|
|
main(int argc, char **argv)
|
|
|
|
{
|
|
|
|
register int cnt, op, i;
|
|
|
|
bpf_u_int32 localnet, netmask;
|
2012-08-11 09:43:54 +08:00
|
|
|
register char *cp, *infile, *cmdbuf, *device, *RFileName, *VFileName, *WFileName;
|
2002-12-19 17:39:10 +08:00
|
|
|
pcap_handler callback;
|
2002-12-19 17:27:54 +08:00
|
|
|
int type;
|
2012-08-11 09:43:54 +08:00
|
|
|
int dlt;
|
2012-08-12 02:19:31 +08:00
|
|
|
int new_dlt;
|
2012-08-11 09:43:54 +08:00
|
|
|
const char *dlt_name;
|
1999-10-08 07:47:09 +08:00
|
|
|
struct bpf_program fcode;
|
2002-08-01 16:52:55 +08:00
|
|
|
#ifndef WIN32
|
1999-10-08 07:47:09 +08:00
|
|
|
RETSIGTYPE (*oldhandler)(int);
|
2002-08-01 16:52:55 +08:00
|
|
|
#endif
|
2002-12-19 17:39:10 +08:00
|
|
|
struct print_info printinfo;
|
2001-12-23 06:12:23 +08:00
|
|
|
struct dump_info dumpinfo;
|
1999-10-08 07:47:09 +08:00
|
|
|
u_char *pcap_userdata;
|
|
|
|
char ebuf[PCAP_ERRBUF_SIZE];
|
2012-08-11 09:43:54 +08:00
|
|
|
char VFileLine[NAME_MAX + 1];
|
2004-01-22 17:35:50 +08:00
|
|
|
char *username = NULL;
|
2004-02-25 22:23:32 +08:00
|
|
|
char *chroot_dir = NULL;
|
2012-08-11 09:43:54 +08:00
|
|
|
char *ret = NULL;
|
2012-09-28 12:12:00 +08:00
|
|
|
char *end;
|
2002-08-04 06:37:01 +08:00
|
|
|
#ifdef HAVE_PCAP_FINDALLDEVS
|
2002-08-01 16:52:55 +08:00
|
|
|
pcap_if_t *devpointer;
|
|
|
|
int devnum;
|
2002-08-04 06:37:01 +08:00
|
|
|
#endif
|
2003-11-04 15:29:15 +08:00
|
|
|
int status;
|
2012-08-11 09:43:54 +08:00
|
|
|
FILE *VFile;
|
2002-08-01 16:52:55 +08:00
|
|
|
#ifdef WIN32
|
2003-08-08 17:47:45 +08:00
|
|
|
if(wsockinit() != 0) return 1;
|
2002-08-01 16:52:55 +08:00
|
|
|
#endif /* WIN32 */
|
1999-10-08 07:47:09 +08:00
|
|
|
|
2010-08-23 08:32:26 +08:00
|
|
|
jflag=-1; /* not set */
|
2004-03-30 22:42:38 +08:00
|
|
|
gndo->ndo_Oflag=1;
|
|
|
|
gndo->ndo_Rflag=1;
|
|
|
|
gndo->ndo_dlt=-1;
|
2004-12-23 18:43:12 +08:00
|
|
|
gndo->ndo_default_print=ndo_default_print;
|
2004-03-30 22:42:38 +08:00
|
|
|
gndo->ndo_printf=tcpdump_printf;
|
2004-04-05 08:15:50 +08:00
|
|
|
gndo->ndo_error=ndo_error;
|
|
|
|
gndo->ndo_warning=ndo_warning;
|
|
|
|
gndo->ndo_snaplen = DEFAULT_SNAPLEN;
|
2004-03-30 22:42:38 +08:00
|
|
|
|
1999-10-08 07:47:09 +08:00
|
|
|
cnt = -1;
|
|
|
|
device = NULL;
|
|
|
|
infile = NULL;
|
|
|
|
RFileName = NULL;
|
2012-08-11 09:43:54 +08:00
|
|
|
VFileName = NULL;
|
1999-10-08 07:47:09 +08:00
|
|
|
WFileName = NULL;
|
|
|
|
if ((cp = strrchr(argv[0], '/')) != NULL)
|
|
|
|
program_name = cp + 1;
|
|
|
|
else
|
|
|
|
program_name = argv[0];
|
|
|
|
|
2000-01-17 14:24:23 +08:00
|
|
|
if (abort_on_misalignment(ebuf, sizeof(ebuf)) < 0)
|
1999-10-08 07:47:09 +08:00
|
|
|
error("%s", ebuf);
|
|
|
|
|
1999-12-14 02:06:13 +08:00
|
|
|
#ifdef LIBSMI
|
|
|
|
smiInit("tcpdump");
|
|
|
|
#endif
|
2002-06-12 01:08:37 +08:00
|
|
|
|
1999-10-08 07:47:09 +08:00
|
|
|
while (
|
2012-08-11 09:43:54 +08:00
|
|
|
(op = getopt(argc, argv, "aAb" B_FLAG "c:C:d" D_FLAG "eE:fF:G:hHi:" I_FLAG j_FLAG J_FLAG "KlLm:M:nNOpqr:Rs:StT:u" U_FLAG "V:vw:W:xXy:Yz:Z:")) != -1)
|
1999-10-08 07:47:09 +08:00
|
|
|
switch (op) {
|
|
|
|
|
|
|
|
case 'a':
|
2003-08-01 06:36:43 +08:00
|
|
|
/* compatibility for old -a */
|
1999-10-08 07:47:09 +08:00
|
|
|
break;
|
|
|
|
|
2002-12-19 17:27:54 +08:00
|
|
|
case 'A':
|
|
|
|
++Aflag;
|
|
|
|
break;
|
2010-02-08 18:33:12 +08:00
|
|
|
|
2009-01-21 04:40:22 +08:00
|
|
|
case 'b':
|
|
|
|
++bflag;
|
|
|
|
break;
|
2002-04-24 14:55:54 +08:00
|
|
|
|
2008-04-05 03:42:11 +08:00
|
|
|
#if defined(HAVE_PCAP_CREATE) || defined(WIN32)
|
2002-08-01 16:52:55 +08:00
|
|
|
case 'B':
|
2008-04-05 03:42:11 +08:00
|
|
|
Bflag = atoi(optarg)*1024;
|
|
|
|
if (Bflag <= 0)
|
2002-08-01 16:52:55 +08:00
|
|
|
error("invalid packet buffer size %s", optarg);
|
|
|
|
break;
|
2008-04-05 03:42:11 +08:00
|
|
|
#endif /* defined(HAVE_PCAP_CREATE) || defined(WIN32) */
|
2002-08-01 16:52:55 +08:00
|
|
|
|
1999-10-08 07:47:09 +08:00
|
|
|
case 'c':
|
|
|
|
cnt = atoi(optarg);
|
|
|
|
if (cnt <= 0)
|
|
|
|
error("invalid packet count %s", optarg);
|
|
|
|
break;
|
|
|
|
|
2001-10-01 09:12:00 +08:00
|
|
|
case 'C':
|
|
|
|
Cflag = atoi(optarg) * 1000000;
|
2002-06-12 01:08:37 +08:00
|
|
|
if (Cflag < 0)
|
2001-10-01 09:12:00 +08:00
|
|
|
error("invalid file size %s", optarg);
|
|
|
|
break;
|
|
|
|
|
1999-10-08 07:47:09 +08:00
|
|
|
case 'd':
|
|
|
|
++dflag;
|
|
|
|
break;
|
|
|
|
|
2002-08-04 06:37:01 +08:00
|
|
|
#ifdef HAVE_PCAP_FINDALLDEVS
|
2002-08-01 16:52:55 +08:00
|
|
|
case 'D':
|
|
|
|
if (pcap_findalldevs(&devpointer, ebuf) < 0)
|
|
|
|
error("%s", ebuf);
|
|
|
|
else {
|
|
|
|
for (i = 0; devpointer != 0; i++) {
|
|
|
|
printf("%d.%s", i+1, devpointer->name);
|
|
|
|
if (devpointer->description != NULL)
|
|
|
|
printf(" (%s)", devpointer->description);
|
|
|
|
printf("\n");
|
|
|
|
devpointer = devpointer->next;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return 0;
|
2002-08-04 06:37:01 +08:00
|
|
|
#endif /* HAVE_PCAP_FINDALLDEVS */
|
2002-08-01 16:52:55 +08:00
|
|
|
|
2002-12-19 17:27:54 +08:00
|
|
|
case 'L':
|
|
|
|
Lflag++;
|
|
|
|
break;
|
|
|
|
|
1999-10-08 07:47:09 +08:00
|
|
|
case 'e':
|
|
|
|
++eflag;
|
|
|
|
break;
|
|
|
|
|
1999-10-30 13:11:06 +08:00
|
|
|
case 'E':
|
2000-01-15 10:33:06 +08:00
|
|
|
#ifndef HAVE_LIBCRYPTO
|
1999-10-30 13:11:06 +08:00
|
|
|
warning("crypto code not compiled in");
|
|
|
|
#endif
|
2004-04-05 08:15:50 +08:00
|
|
|
gndo->ndo_espsecret = optarg;
|
1999-10-30 13:11:06 +08:00
|
|
|
break;
|
|
|
|
|
1999-10-08 07:47:09 +08:00
|
|
|
case 'f':
|
|
|
|
++fflag;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case 'F':
|
|
|
|
infile = optarg;
|
|
|
|
break;
|
|
|
|
|
2005-10-20 15:43:51 +08:00
|
|
|
case 'G':
|
|
|
|
Gflag = atoi(optarg);
|
|
|
|
if (Gflag < 0)
|
|
|
|
error("invalid number of seconds %s", optarg);
|
2005-12-06 04:24:48 +08:00
|
|
|
|
|
|
|
/* We will create one file initially. */
|
|
|
|
Gflag_count = 0;
|
|
|
|
|
|
|
|
/* Grab the current time for rotation use. */
|
|
|
|
if ((Gflag_time = time(NULL)) == (time_t)-1) {
|
|
|
|
error("main: can't get current time: %s",
|
|
|
|
pcap_strerror(errno));
|
|
|
|
}
|
2005-10-20 15:43:51 +08:00
|
|
|
break;
|
|
|
|
|
2010-05-28 14:58:01 +08:00
|
|
|
case 'h':
|
2011-06-22 09:15:50 +08:00
|
|
|
usage();
|
|
|
|
break;
|
|
|
|
|
|
|
|
case 'H':
|
|
|
|
++Hflag;
|
2010-05-28 14:58:01 +08:00
|
|
|
break;
|
|
|
|
|
1999-10-08 07:47:09 +08:00
|
|
|
case 'i':
|
2002-08-01 16:52:55 +08:00
|
|
|
if (optarg[0] == '0' && optarg[1] == 0)
|
|
|
|
error("Invalid adapter index");
|
|
|
|
|
2002-08-04 06:37:01 +08:00
|
|
|
#ifdef HAVE_PCAP_FINDALLDEVS
|
2002-08-01 16:52:55 +08:00
|
|
|
/*
|
|
|
|
* If the argument is a number, treat it as
|
|
|
|
* an index into the list of adapters, as
|
|
|
|
* printed by "tcpdump -D".
|
|
|
|
*
|
|
|
|
* This should be OK on UNIX systems, as interfaces
|
|
|
|
* shouldn't have names that begin with digits.
|
|
|
|
* It can be useful on Windows, where more than
|
|
|
|
* one interface can have the same name.
|
|
|
|
*/
|
2012-09-28 12:12:00 +08:00
|
|
|
devnum = strtol(optarg, &end, 10);
|
|
|
|
if (optarg != end && *end == '\0') {
|
2002-08-01 16:52:55 +08:00
|
|
|
if (devnum < 0)
|
|
|
|
error("Invalid adapter index");
|
|
|
|
|
|
|
|
if (pcap_findalldevs(&devpointer, ebuf) < 0)
|
|
|
|
error("%s", ebuf);
|
|
|
|
else {
|
2009-04-28 16:20:38 +08:00
|
|
|
/*
|
|
|
|
* Look for the devnum-th entry
|
|
|
|
* in the list of devices
|
|
|
|
* (1-based).
|
|
|
|
*/
|
|
|
|
for (i = 0;
|
|
|
|
i < devnum-1 && devpointer != NULL;
|
|
|
|
i++, devpointer = devpointer->next)
|
|
|
|
;
|
|
|
|
if (devpointer == NULL)
|
|
|
|
error("Invalid adapter index");
|
2002-08-01 16:52:55 +08:00
|
|
|
}
|
|
|
|
device = devpointer->name;
|
|
|
|
break;
|
|
|
|
}
|
2002-08-04 06:37:01 +08:00
|
|
|
#endif /* HAVE_PCAP_FINDALLDEVS */
|
1999-10-08 07:47:09 +08:00
|
|
|
device = optarg;
|
|
|
|
break;
|
|
|
|
|
2008-04-05 03:42:11 +08:00
|
|
|
#ifdef HAVE_PCAP_CREATE
|
|
|
|
case 'I':
|
|
|
|
++Iflag;
|
|
|
|
break;
|
|
|
|
#endif /* HAVE_PCAP_CREATE */
|
|
|
|
|
2010-08-23 08:32:26 +08:00
|
|
|
#ifdef HAVE_PCAP_SET_TSTAMP_TYPE
|
|
|
|
case 'j':
|
|
|
|
jflag = pcap_tstamp_type_name_to_val(optarg);
|
|
|
|
if (jflag < 0)
|
|
|
|
error("invalid time stamp type %s", optarg);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case 'J':
|
|
|
|
Jflag++;
|
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
|
1999-10-08 07:47:09 +08:00
|
|
|
case 'l':
|
2003-11-18 16:53:19 +08:00
|
|
|
#ifdef WIN32
|
|
|
|
/*
|
|
|
|
* _IOLBF is the same as _IOFBF in Microsoft's C
|
|
|
|
* libraries; the only alternative they offer
|
|
|
|
* is _IONBF.
|
|
|
|
*
|
|
|
|
* XXX - this should really be checking for MSVC++,
|
|
|
|
* not WIN32, if, for example, MinGW has its own
|
|
|
|
* C library that is more UNIX-compatible.
|
|
|
|
*/
|
|
|
|
setvbuf(stdout, NULL, _IONBF, 0);
|
|
|
|
#else /* WIN32 */
|
1999-10-08 07:47:09 +08:00
|
|
|
#ifdef HAVE_SETLINEBUF
|
|
|
|
setlinebuf(stdout);
|
|
|
|
#else
|
|
|
|
setvbuf(stdout, NULL, _IOLBF, 0);
|
|
|
|
#endif
|
2003-11-18 16:53:19 +08:00
|
|
|
#endif /* WIN32 */
|
1999-10-08 07:47:09 +08:00
|
|
|
break;
|
|
|
|
|
2006-05-06 07:13:00 +08:00
|
|
|
case 'K':
|
|
|
|
++Kflag;
|
1999-10-08 07:47:09 +08:00
|
|
|
break;
|
|
|
|
|
1999-12-14 02:06:13 +08:00
|
|
|
case 'm':
|
|
|
|
#ifdef LIBSMI
|
2005-12-06 04:24:48 +08:00
|
|
|
if (smiLoadModule(optarg) == 0) {
|
1999-12-14 02:06:13 +08:00
|
|
|
error("could not load MIB module %s", optarg);
|
2005-12-06 04:24:48 +08:00
|
|
|
}
|
1999-12-14 02:06:13 +08:00
|
|
|
sflag = 1;
|
|
|
|
#else
|
|
|
|
(void)fprintf(stderr, "%s: ignoring option `-m %s' ",
|
|
|
|
program_name, optarg);
|
|
|
|
(void)fprintf(stderr, "(no libsmi support)\n");
|
|
|
|
#endif
|
2004-01-14 11:24:29 +08:00
|
|
|
break;
|
2002-06-12 01:08:37 +08:00
|
|
|
|
2004-03-23 15:15:36 +08:00
|
|
|
case 'M':
|
|
|
|
/* TCP-MD5 shared secret */
|
|
|
|
#ifndef HAVE_LIBCRYPTO
|
|
|
|
warning("crypto code not compiled in");
|
|
|
|
#endif
|
2008-08-16 19:36:20 +08:00
|
|
|
sigsecret = optarg;
|
2004-03-23 15:15:36 +08:00
|
|
|
break;
|
|
|
|
|
2006-05-06 07:13:00 +08:00
|
|
|
case 'n':
|
|
|
|
++nflag;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case 'N':
|
|
|
|
++Nflag;
|
|
|
|
break;
|
|
|
|
|
1999-10-08 07:47:09 +08:00
|
|
|
case 'O':
|
|
|
|
Oflag = 0;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case 'p':
|
|
|
|
++pflag;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case 'q':
|
|
|
|
++qflag;
|
2005-07-07 09:22:15 +08:00
|
|
|
++suppress_default_print;
|
1999-10-08 07:47:09 +08:00
|
|
|
break;
|
|
|
|
|
|
|
|
case 'r':
|
|
|
|
RFileName = optarg;
|
|
|
|
break;
|
|
|
|
|
1999-10-30 13:11:06 +08:00
|
|
|
case 'R':
|
|
|
|
Rflag = 0;
|
|
|
|
break;
|
|
|
|
|
2012-09-28 12:12:00 +08:00
|
|
|
case 's':
|
2000-04-21 18:32:03 +08:00
|
|
|
snaplen = strtol(optarg, &end, 0);
|
|
|
|
if (optarg == end || *end != '\0'
|
2009-03-05 17:01:29 +08:00
|
|
|
|| snaplen < 0 || snaplen > MAXIMUM_SNAPLEN)
|
1999-10-08 07:47:09 +08:00
|
|
|
error("invalid snaplen %s", optarg);
|
2000-04-21 18:32:03 +08:00
|
|
|
else if (snaplen == 0)
|
2009-03-05 17:01:29 +08:00
|
|
|
snaplen = MAXIMUM_SNAPLEN;
|
1999-10-08 07:47:09 +08:00
|
|
|
break;
|
|
|
|
|
|
|
|
case 'S':
|
|
|
|
++Sflag;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case 't':
|
2004-06-16 07:05:05 +08:00
|
|
|
++tflag;
|
1999-10-08 07:47:09 +08:00
|
|
|
break;
|
|
|
|
|
|
|
|
case 'T':
|
|
|
|
if (strcasecmp(optarg, "vat") == 0)
|
|
|
|
packettype = PT_VAT;
|
|
|
|
else if (strcasecmp(optarg, "wb") == 0)
|
|
|
|
packettype = PT_WB;
|
|
|
|
else if (strcasecmp(optarg, "rpc") == 0)
|
|
|
|
packettype = PT_RPC;
|
|
|
|
else if (strcasecmp(optarg, "rtp") == 0)
|
|
|
|
packettype = PT_RTP;
|
|
|
|
else if (strcasecmp(optarg, "rtcp") == 0)
|
|
|
|
packettype = PT_RTCP;
|
1999-10-18 05:37:10 +08:00
|
|
|
else if (strcasecmp(optarg, "snmp") == 0)
|
|
|
|
packettype = PT_SNMP;
|
2000-04-27 18:05:30 +08:00
|
|
|
else if (strcasecmp(optarg, "cnfp") == 0)
|
|
|
|
packettype = PT_CNFP;
|
2003-05-11 14:01:16 +08:00
|
|
|
else if (strcasecmp(optarg, "tftp") == 0)
|
|
|
|
packettype = PT_TFTP;
|
2003-08-06 14:49:38 +08:00
|
|
|
else if (strcasecmp(optarg, "aodv") == 0)
|
|
|
|
packettype = PT_AODV;
|
2011-11-24 03:53:13 +08:00
|
|
|
else if (strcasecmp(optarg, "carp") == 0)
|
|
|
|
packettype = PT_CARP;
|
2012-07-01 06:59:18 +08:00
|
|
|
else if (strcasecmp(optarg, "radius") == 0)
|
|
|
|
packettype = PT_RADIUS;
|
1999-10-08 07:47:09 +08:00
|
|
|
else
|
|
|
|
error("unknown packet type `%s'", optarg);
|
|
|
|
break;
|
|
|
|
|
2000-06-01 09:10:31 +08:00
|
|
|
case 'u':
|
|
|
|
++uflag;
|
|
|
|
break;
|
2002-06-12 01:08:37 +08:00
|
|
|
|
2002-12-22 08:15:26 +08:00
|
|
|
#ifdef HAVE_PCAP_DUMP_FLUSH
|
|
|
|
case 'U':
|
|
|
|
++Uflag;
|
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
|
1999-10-08 07:47:09 +08:00
|
|
|
case 'v':
|
|
|
|
++vflag;
|
|
|
|
break;
|
|
|
|
|
2012-08-11 09:43:54 +08:00
|
|
|
case 'V':
|
|
|
|
VFileName = optarg;
|
|
|
|
break;
|
|
|
|
|
1999-10-08 07:47:09 +08:00
|
|
|
case 'w':
|
|
|
|
WFileName = optarg;
|
|
|
|
break;
|
1999-12-22 23:44:09 +08:00
|
|
|
|
From Chris Cogdon <chris@cogdon.org>:
Fix a segfault with the -C option when the number of files grows
to 1000. Limit has been increased to 1,000,000, and the code
will check for exceeding this.
Also, add a -W option which will limit the number of files
created before 'wrapping around' and writing to the first file
again, creating a 'loop tape'. Very useful if you want to have
this running permanently to capture traffic up to a irregular
event.
Change the way that output files with -C are numbered. -C alone
goes <none>, 1, 2, 3.... -C with -W will number 0, 1, 2 ... or
00, 01, 02 ... etc, depending on the value of -W. I.e., it
sorts properly. (Old behaviour was to go <none>, 2, 3...)
Close the current capture file before trying to allocate the buffer for
the new file's name, so that if that allocation fails we've at least
written out all of the previous file.
Make some variables for command-line arguments, and some functions not
used outside tcpdump.c, static.
2004-01-26 10:05:17 +08:00
|
|
|
case 'W':
|
|
|
|
Wflag = atoi(optarg);
|
|
|
|
if (Wflag < 0)
|
|
|
|
error("invalid number of output files %s", optarg);
|
|
|
|
WflagChars = getWflagChars(Wflag);
|
|
|
|
break;
|
|
|
|
|
1999-12-22 23:44:09 +08:00
|
|
|
case 'x':
|
|
|
|
++xflag;
|
2005-07-07 09:22:15 +08:00
|
|
|
++suppress_default_print;
|
1999-12-22 23:44:09 +08:00
|
|
|
break;
|
|
|
|
|
|
|
|
case 'X':
|
|
|
|
++Xflag;
|
2005-07-07 09:22:15 +08:00
|
|
|
++suppress_default_print;
|
1999-12-22 23:44:09 +08:00
|
|
|
break;
|
|
|
|
|
2002-12-19 17:27:54 +08:00
|
|
|
case 'y':
|
2004-03-30 22:42:38 +08:00
|
|
|
gndo->ndo_dltname = optarg;
|
|
|
|
gndo->ndo_dlt =
|
|
|
|
pcap_datalink_name_to_val(gndo->ndo_dltname);
|
|
|
|
if (gndo->ndo_dlt < 0)
|
|
|
|
error("invalid data link type %s", gndo->ndo_dltname);
|
2002-12-19 17:27:54 +08:00
|
|
|
break;
|
|
|
|
|
2002-09-05 09:31:41 +08:00
|
|
|
#if defined(HAVE_PCAP_DEBUG) || defined(HAVE_YYDEBUG)
|
1999-10-08 07:47:09 +08:00
|
|
|
case 'Y':
|
|
|
|
{
|
|
|
|
/* Undocumented flag */
|
2002-09-05 09:31:41 +08:00
|
|
|
#ifdef HAVE_PCAP_DEBUG
|
|
|
|
extern int pcap_debug;
|
|
|
|
pcap_debug = 1;
|
|
|
|
#else
|
1999-10-08 07:47:09 +08:00
|
|
|
extern int yydebug;
|
|
|
|
yydebug = 1;
|
2002-09-05 09:31:41 +08:00
|
|
|
#endif
|
1999-10-08 07:47:09 +08:00
|
|
|
}
|
|
|
|
break;
|
|
|
|
#endif
|
2006-03-24 01:33:01 +08:00
|
|
|
case 'z':
|
|
|
|
if (optarg) {
|
|
|
|
zflag = strdup(optarg);
|
|
|
|
} else {
|
|
|
|
usage();
|
|
|
|
/* NOTREACHED */
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
|
2004-01-22 17:35:50 +08:00
|
|
|
case 'Z':
|
|
|
|
if (optarg) {
|
|
|
|
username = strdup(optarg);
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
usage();
|
|
|
|
/* NOTREACHED */
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
|
1999-10-08 07:47:09 +08:00
|
|
|
default:
|
|
|
|
usage();
|
|
|
|
/* NOTREACHED */
|
|
|
|
}
|
|
|
|
|
2004-06-16 07:05:05 +08:00
|
|
|
switch (tflag) {
|
|
|
|
|
|
|
|
case 0: /* Default */
|
|
|
|
case 4: /* Default + Date*/
|
1999-10-08 07:47:09 +08:00
|
|
|
thiszone = gmt2local(0);
|
2004-06-16 07:05:05 +08:00
|
|
|
break;
|
2004-06-16 07:09:46 +08:00
|
|
|
|
|
|
|
case 1: /* No time stamp */
|
|
|
|
case 2: /* Unix timeval style */
|
|
|
|
case 3: /* Microseconds since previous packet */
|
2005-12-13 16:37:22 +08:00
|
|
|
case 5: /* Microseconds since first packet */
|
2004-06-16 07:09:46 +08:00
|
|
|
break;
|
|
|
|
|
|
|
|
default: /* Not supported */
|
2005-12-13 16:37:22 +08:00
|
|
|
error("only -t, -tt, -ttt, -tttt and -ttttt are supported");
|
2004-06-16 07:09:46 +08:00
|
|
|
break;
|
2004-06-16 07:05:05 +08:00
|
|
|
}
|
1999-10-08 07:47:09 +08:00
|
|
|
|
2012-08-11 09:43:54 +08:00
|
|
|
if (fflag != 0 && (VFileName != NULL || RFileName != NULL))
|
|
|
|
error("-f can not be used with -V or -r");
|
|
|
|
|
|
|
|
if (VFileName != NULL && RFileName != NULL)
|
|
|
|
error("-V and -r are mutually exclusive.");
|
|
|
|
|
2004-02-25 22:23:32 +08:00
|
|
|
#ifdef WITH_CHROOT
|
|
|
|
/* if run as root, prepare for chrooting */
|
|
|
|
if (getuid() == 0 || geteuid() == 0) {
|
|
|
|
/* future extensibility for cmd-line arguments */
|
|
|
|
if (!chroot_dir)
|
|
|
|
chroot_dir = WITH_CHROOT;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2004-02-24 16:12:18 +08:00
|
|
|
#ifdef WITH_USER
|
|
|
|
/* if run as root, prepare for dropping root privileges */
|
|
|
|
if (getuid() == 0 || geteuid() == 0) {
|
|
|
|
/* Run with '-Z root' to restore old behaviour */
|
|
|
|
if (!username)
|
|
|
|
username = WITH_USER;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2012-08-11 09:43:54 +08:00
|
|
|
if (RFileName != NULL || VFileName != NULL) {
|
2003-06-04 07:32:42 +08:00
|
|
|
#ifndef WIN32
|
1999-10-08 07:47:09 +08:00
|
|
|
/*
|
2003-06-04 07:32:42 +08:00
|
|
|
* We don't need network access, so relinquish any set-UID
|
|
|
|
* or set-GID privileges we have (if any).
|
|
|
|
*
|
|
|
|
* We do *not* want set-UID privileges when opening a
|
|
|
|
* trace file, as that might let the user read other
|
|
|
|
* people's trace files (especially if we're set-UID
|
|
|
|
* root).
|
1999-10-08 07:47:09 +08:00
|
|
|
*/
|
2004-02-24 16:12:18 +08:00
|
|
|
if (setgid(getgid()) != 0 || setuid(getuid()) != 0 )
|
|
|
|
fprintf(stderr, "Warning: setgid/setuid failed !\n");
|
2002-08-01 16:52:55 +08:00
|
|
|
#endif /* WIN32 */
|
2012-08-11 09:43:54 +08:00
|
|
|
if (VFileName != NULL) {
|
|
|
|
if (VFileName[0] == '-' && VFileName[1] == '\0')
|
2012-09-07 02:40:21 +08:00
|
|
|
VFile = stdin;
|
2012-08-11 09:43:54 +08:00
|
|
|
else
|
|
|
|
VFile = fopen(VFileName, "r");
|
|
|
|
|
|
|
|
if (VFile == NULL)
|
|
|
|
error("Unable to open file: %s\n", strerror(errno));
|
|
|
|
|
2012-09-07 02:40:21 +08:00
|
|
|
ret = get_next_file(VFile, VFileLine);
|
2012-08-11 09:43:54 +08:00
|
|
|
if (!ret)
|
2012-09-07 02:40:21 +08:00
|
|
|
error("Nothing in %s\n", VFileName);
|
2012-08-11 09:43:54 +08:00
|
|
|
RFileName = VFileLine;
|
|
|
|
}
|
|
|
|
|
1999-10-08 07:47:09 +08:00
|
|
|
pd = pcap_open_offline(RFileName, ebuf);
|
2003-06-04 07:32:42 +08:00
|
|
|
if (pd == NULL)
|
|
|
|
error("%s", ebuf);
|
2003-08-01 09:01:40 +08:00
|
|
|
dlt = pcap_datalink(pd);
|
|
|
|
dlt_name = pcap_datalink_val_to_name(dlt);
|
2003-11-19 07:09:42 +08:00
|
|
|
if (dlt_name == NULL) {
|
2003-12-18 09:20:31 +08:00
|
|
|
fprintf(stderr, "reading from file %s, link-type %u\n",
|
2003-11-19 07:09:42 +08:00
|
|
|
RFileName, dlt);
|
|
|
|
} else {
|
2003-12-18 09:20:31 +08:00
|
|
|
fprintf(stderr,
|
|
|
|
"reading from file %s, link-type %s (%s)\n",
|
2003-11-19 07:09:42 +08:00
|
|
|
RFileName, dlt_name,
|
|
|
|
pcap_datalink_val_to_description(dlt));
|
|
|
|
}
|
1999-10-08 07:47:09 +08:00
|
|
|
localnet = 0;
|
|
|
|
netmask = 0;
|
|
|
|
} else {
|
|
|
|
if (device == NULL) {
|
|
|
|
device = pcap_lookupdev(ebuf);
|
|
|
|
if (device == NULL)
|
|
|
|
error("%s", ebuf);
|
|
|
|
}
|
2002-08-01 16:52:55 +08:00
|
|
|
#ifdef WIN32
|
2004-04-06 21:04:17 +08:00
|
|
|
if(strlen(device) == 1) //we assume that an ASCII string is always longer than 1 char
|
|
|
|
{ //a Unicode string has a \0 as second byte (so strlen() is 1)
|
2003-08-08 17:47:45 +08:00
|
|
|
fprintf(stderr, "%s: listening on %ws\n", program_name, device);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
fprintf(stderr, "%s: listening on %s\n", program_name, device);
|
|
|
|
}
|
|
|
|
|
|
|
|
fflush(stderr);
|
2002-08-01 16:52:55 +08:00
|
|
|
#endif /* WIN32 */
|
2008-04-05 03:42:11 +08:00
|
|
|
#ifdef HAVE_PCAP_CREATE
|
|
|
|
pd = pcap_create(device, ebuf);
|
|
|
|
if (pd == NULL)
|
|
|
|
error("%s", ebuf);
|
2010-08-23 08:32:26 +08:00
|
|
|
#ifdef HAVE_PCAP_SET_TSTAMP_TYPE
|
|
|
|
if (Jflag)
|
|
|
|
show_tstamp_types_and_exit(device, pd);
|
|
|
|
#endif
|
2009-12-01 16:39:54 +08:00
|
|
|
/*
|
|
|
|
* Is this an interface that supports monitor mode?
|
|
|
|
*/
|
|
|
|
if (pcap_can_set_rfmon(pd) == 1)
|
|
|
|
supports_monitor_mode = 1;
|
|
|
|
else
|
|
|
|
supports_monitor_mode = 0;
|
2008-04-05 03:42:11 +08:00
|
|
|
status = pcap_set_snaplen(pd, snaplen);
|
|
|
|
if (status != 0)
|
2010-08-23 08:32:26 +08:00
|
|
|
error("%s: Can't set snapshot length: %s",
|
2008-04-10 05:45:06 +08:00
|
|
|
device, pcap_statustostr(status));
|
2008-04-05 03:42:11 +08:00
|
|
|
status = pcap_set_promisc(pd, !pflag);
|
|
|
|
if (status != 0)
|
2010-08-23 08:32:26 +08:00
|
|
|
error("%s: Can't set promiscuous mode: %s",
|
2008-04-10 05:45:06 +08:00
|
|
|
device, pcap_statustostr(status));
|
2008-04-05 03:42:11 +08:00
|
|
|
if (Iflag) {
|
|
|
|
status = pcap_set_rfmon(pd, 1);
|
|
|
|
if (status != 0)
|
2010-08-23 08:32:26 +08:00
|
|
|
error("%s: Can't set monitor mode: %s",
|
2008-04-10 05:45:06 +08:00
|
|
|
device, pcap_statustostr(status));
|
2008-04-05 03:42:11 +08:00
|
|
|
}
|
|
|
|
status = pcap_set_timeout(pd, 1000);
|
|
|
|
if (status != 0)
|
|
|
|
error("%s: pcap_set_timeout failed: %s",
|
2008-04-10 05:45:06 +08:00
|
|
|
device, pcap_statustostr(status));
|
2008-04-05 03:42:11 +08:00
|
|
|
if (Bflag != 0) {
|
|
|
|
status = pcap_set_buffer_size(pd, Bflag);
|
|
|
|
if (status != 0)
|
2010-08-23 08:32:26 +08:00
|
|
|
error("%s: Can't set buffer size: %s",
|
2008-04-10 05:45:06 +08:00
|
|
|
device, pcap_statustostr(status));
|
2008-04-05 03:42:11 +08:00
|
|
|
}
|
2010-08-23 08:32:26 +08:00
|
|
|
#ifdef HAVE_PCAP_SET_TSTAMP_TYPE
|
|
|
|
if (jflag != -1) {
|
|
|
|
status = pcap_set_tstamp_type(pd, jflag);
|
|
|
|
if (status < 0)
|
|
|
|
error("%s: Can't set time stamp type: %s",
|
|
|
|
device, pcap_statustostr(status));
|
|
|
|
}
|
|
|
|
#endif
|
2008-04-05 03:42:11 +08:00
|
|
|
status = pcap_activate(pd);
|
2008-04-10 05:45:06 +08:00
|
|
|
if (status < 0) {
|
|
|
|
/*
|
|
|
|
* pcap_activate() failed.
|
|
|
|
*/
|
2008-04-10 04:01:01 +08:00
|
|
|
cp = pcap_geterr(pd);
|
2008-04-05 03:42:11 +08:00
|
|
|
if (status == PCAP_ERROR)
|
2008-04-10 04:01:01 +08:00
|
|
|
error("%s", cp);
|
|
|
|
else if ((status == PCAP_ERROR_NO_SUCH_DEVICE ||
|
|
|
|
status == PCAP_ERROR_PERM_DENIED) &&
|
|
|
|
*cp != '\0')
|
|
|
|
error("%s: %s\n(%s)", device,
|
2008-04-10 05:45:06 +08:00
|
|
|
pcap_statustostr(status), cp);
|
|
|
|
else
|
|
|
|
error("%s: %s", device,
|
|
|
|
pcap_statustostr(status));
|
|
|
|
} else if (status > 0) {
|
|
|
|
/*
|
|
|
|
* pcap_activate() succeeded, but it's warning us
|
|
|
|
* of a problem it had.
|
|
|
|
*/
|
|
|
|
cp = pcap_geterr(pd);
|
|
|
|
if (status == PCAP_WARNING)
|
|
|
|
warning("%s", cp);
|
|
|
|
else if (status == PCAP_WARNING_PROMISC_NOTSUP &&
|
|
|
|
*cp != '\0')
|
|
|
|
warning("%s: %s\n(%s)", device,
|
|
|
|
pcap_statustostr(status), cp);
|
2008-04-05 03:42:11 +08:00
|
|
|
else
|
2008-04-10 05:45:06 +08:00
|
|
|
warning("%s: %s", device,
|
|
|
|
pcap_statustostr(status));
|
2008-04-05 03:42:11 +08:00
|
|
|
}
|
|
|
|
#else
|
2001-05-01 00:08:43 +08:00
|
|
|
*ebuf = '\0';
|
2003-11-18 16:53:19 +08:00
|
|
|
pd = pcap_open_live(device, snaplen, !pflag, 1000, ebuf);
|
1999-10-08 07:47:09 +08:00
|
|
|
if (pd == NULL)
|
|
|
|
error("%s", ebuf);
|
2001-05-01 00:08:43 +08:00
|
|
|
else if (*ebuf)
|
|
|
|
warning("%s", ebuf);
|
2008-04-05 03:42:11 +08:00
|
|
|
#endif /* HAVE_PCAP_CREATE */
|
2004-02-24 16:12:18 +08:00
|
|
|
/*
|
|
|
|
* Let user own process after socket has been opened.
|
|
|
|
*/
|
|
|
|
#ifndef WIN32
|
|
|
|
if (setgid(getgid()) != 0 || setuid(getuid()) != 0)
|
|
|
|
fprintf(stderr, "Warning: setgid/setuid failed !\n");
|
|
|
|
#endif /* WIN32 */
|
2008-04-05 03:42:11 +08:00
|
|
|
#if !defined(HAVE_PCAP_CREATE) && defined(WIN32)
|
|
|
|
if(Bflag != 0)
|
|
|
|
if(pcap_setbuff(pd, Bflag)==-1){
|
2002-08-01 16:52:55 +08:00
|
|
|
error("%s", pcap_geterr(pd));
|
|
|
|
}
|
2008-04-05 03:42:11 +08:00
|
|
|
#endif /* !defined(HAVE_PCAP_CREATE) && defined(WIN32) */
|
2002-12-19 17:27:54 +08:00
|
|
|
if (Lflag)
|
2009-12-01 16:39:54 +08:00
|
|
|
show_dlts_and_exit(device, pd);
|
2004-03-30 22:42:38 +08:00
|
|
|
if (gndo->ndo_dlt >= 0) {
|
2002-12-19 17:27:54 +08:00
|
|
|
#ifdef HAVE_PCAP_SET_DATALINK
|
2004-03-30 22:42:38 +08:00
|
|
|
if (pcap_set_datalink(pd, gndo->ndo_dlt) < 0)
|
2002-12-19 17:27:54 +08:00
|
|
|
error("%s", pcap_geterr(pd));
|
|
|
|
#else
|
|
|
|
/*
|
|
|
|
* We don't actually support changing the
|
|
|
|
* data link type, so we only let them
|
|
|
|
* set it to what it already is.
|
|
|
|
*/
|
2004-03-30 22:42:38 +08:00
|
|
|
if (gndo->ndo_dlt != pcap_datalink(pd)) {
|
2002-12-19 17:27:54 +08:00
|
|
|
error("%s is not one of the DLTs supported by this device\n",
|
2004-03-30 22:42:38 +08:00
|
|
|
gndo->ndo_dltname);
|
2002-12-19 17:27:54 +08:00
|
|
|
}
|
|
|
|
#endif
|
|
|
|
(void)fprintf(stderr, "%s: data link type %s\n",
|
2005-12-06 04:24:48 +08:00
|
|
|
program_name, gndo->ndo_dltname);
|
2002-12-19 17:27:54 +08:00
|
|
|
(void)fflush(stderr);
|
|
|
|
}
|
1999-10-08 07:47:09 +08:00
|
|
|
i = pcap_snapshot(pd);
|
|
|
|
if (snaplen < i) {
|
|
|
|
warning("snaplen raised from %d to %d", snaplen, i);
|
|
|
|
snaplen = i;
|
|
|
|
}
|
|
|
|
if (pcap_lookupnet(device, &localnet, &netmask, ebuf) < 0) {
|
|
|
|
localnet = 0;
|
|
|
|
netmask = 0;
|
|
|
|
warning("%s", ebuf);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (infile)
|
|
|
|
cmdbuf = read_infile(infile);
|
|
|
|
else
|
|
|
|
cmdbuf = copy_argv(&argv[optind]);
|
|
|
|
|
|
|
|
if (pcap_compile(pd, &fcode, cmdbuf, Oflag, netmask) < 0)
|
|
|
|
error("%s", pcap_geterr(pd));
|
|
|
|
if (dflag) {
|
|
|
|
bpf_dump(&fcode, dflag);
|
2002-08-06 12:36:12 +08:00
|
|
|
pcap_close(pd);
|
2012-08-11 09:43:54 +08:00
|
|
|
free(cmdbuf);
|
1999-10-08 07:47:09 +08:00
|
|
|
exit(0);
|
|
|
|
}
|
|
|
|
init_addrtoname(localnet, netmask);
|
2006-02-10 04:33:49 +08:00
|
|
|
init_checksum();
|
1999-10-08 07:47:09 +08:00
|
|
|
|
2003-07-30 13:51:40 +08:00
|
|
|
#ifndef WIN32
|
|
|
|
(void)setsignal(SIGPIPE, cleanup);
|
1999-10-08 07:47:09 +08:00
|
|
|
(void)setsignal(SIGTERM, cleanup);
|
|
|
|
(void)setsignal(SIGINT, cleanup);
|
2007-10-13 08:46:16 +08:00
|
|
|
#endif /* WIN32 */
|
2010-12-01 08:18:32 +08:00
|
|
|
#if defined(HAVE_FORK) || defined(HAVE_VFORK)
|
|
|
|
(void)setsignal(SIGCHLD, child_cleanup);
|
|
|
|
#endif
|
1999-10-08 07:47:09 +08:00
|
|
|
/* Cooperate with nohup(1) */
|
2002-08-01 16:52:55 +08:00
|
|
|
#ifndef WIN32
|
1999-10-08 07:47:09 +08:00
|
|
|
if ((oldhandler = setsignal(SIGHUP, cleanup)) != SIG_DFL)
|
|
|
|
(void)setsignal(SIGHUP, oldhandler);
|
2002-08-01 16:52:55 +08:00
|
|
|
#endif /* WIN32 */
|
1999-10-08 07:47:09 +08:00
|
|
|
|
2010-11-07 10:28:10 +08:00
|
|
|
#ifndef WIN32
|
|
|
|
/*
|
|
|
|
* If a user name was specified with "-Z", attempt to switch to
|
|
|
|
* that user's UID. This would probably be used with sudo,
|
|
|
|
* to allow tcpdump to be run in a special restricted
|
|
|
|
* account (if you just want to allow users to open capture
|
|
|
|
* devices, and can't just give users that permission,
|
|
|
|
* you'd make tcpdump set-UID or set-GID).
|
|
|
|
*
|
|
|
|
* Tcpdump doesn't necessarily write only to one savefile;
|
|
|
|
* the general only way to allow a -Z instance to write to
|
|
|
|
* savefiles as the user under whose UID it's run, rather
|
|
|
|
* than as the user specified with -Z, would thus be to switch
|
|
|
|
* to the original user ID before opening a capture file and
|
|
|
|
* then switch back to the -Z user ID after opening the savefile.
|
|
|
|
* Switching to the -Z user ID only after opening the first
|
|
|
|
* savefile doesn't handle the general case.
|
|
|
|
*/
|
2012-05-25 22:26:17 +08:00
|
|
|
|
|
|
|
#ifdef HAVE_CAP_NG_H
|
|
|
|
/* We are running as root and we will be writing to savefile */
|
|
|
|
if ((getuid() == 0 || geteuid() == 0) && WFileName) {
|
|
|
|
if (username) {
|
|
|
|
/* Drop all capabilities from effective set */
|
|
|
|
capng_clear(CAPNG_EFFECTIVE);
|
|
|
|
/* Add capabilities we will need*/
|
|
|
|
capng_update(CAPNG_ADD, CAPNG_PERMITTED, CAP_SETUID);
|
|
|
|
capng_update(CAPNG_ADD, CAPNG_PERMITTED, CAP_SETGID);
|
|
|
|
capng_update(CAPNG_ADD, CAPNG_PERMITTED, CAP_DAC_OVERRIDE);
|
|
|
|
|
|
|
|
capng_update(CAPNG_ADD, CAPNG_EFFECTIVE, CAP_SETUID);
|
|
|
|
capng_update(CAPNG_ADD, CAPNG_EFFECTIVE, CAP_SETGID);
|
|
|
|
capng_update(CAPNG_ADD, CAPNG_EFFECTIVE, CAP_DAC_OVERRIDE);
|
|
|
|
|
|
|
|
capng_apply(CAPNG_SELECT_BOTH);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
#endif /* HAVE_CAP_NG_H */
|
|
|
|
|
2010-11-07 10:28:10 +08:00
|
|
|
if (getuid() == 0 || geteuid() == 0) {
|
|
|
|
if (username || chroot_dir)
|
|
|
|
droproot(username, chroot_dir);
|
2012-05-25 22:26:17 +08:00
|
|
|
|
2010-11-07 10:28:10 +08:00
|
|
|
}
|
|
|
|
#endif /* WIN32 */
|
|
|
|
|
1999-10-08 07:47:09 +08:00
|
|
|
if (pcap_setfilter(pd, &fcode) < 0)
|
|
|
|
error("%s", pcap_geterr(pd));
|
|
|
|
if (WFileName) {
|
From Chris Cogdon <chris@cogdon.org>:
Fix a segfault with the -C option when the number of files grows
to 1000. Limit has been increased to 1,000,000, and the code
will check for exceeding this.
Also, add a -W option which will limit the number of files
created before 'wrapping around' and writing to the first file
again, creating a 'loop tape'. Very useful if you want to have
this running permanently to capture traffic up to a irregular
event.
Change the way that output files with -C are numbered. -C alone
goes <none>, 1, 2, 3.... -C with -W will number 0, 1, 2 ... or
00, 01, 02 ... etc, depending on the value of -W. I.e., it
sorts properly. (Old behaviour was to go <none>, 2, 3...)
Close the current capture file before trying to allocate the buffer for
the new file's name, so that if that allocation fails we've at least
written out all of the previous file.
Make some variables for command-line arguments, and some functions not
used outside tcpdump.c, static.
2004-01-26 10:05:17 +08:00
|
|
|
pcap_dumper_t *p;
|
2012-09-28 11:44:34 +08:00
|
|
|
/* Do not exceed the default PATH_MAX for files. */
|
|
|
|
dumpinfo.CurrentFileName = (char *)malloc(PATH_MAX + 1);
|
From Chris Cogdon <chris@cogdon.org>:
Fix a segfault with the -C option when the number of files grows
to 1000. Limit has been increased to 1,000,000, and the code
will check for exceeding this.
Also, add a -W option which will limit the number of files
created before 'wrapping around' and writing to the first file
again, creating a 'loop tape'. Very useful if you want to have
this running permanently to capture traffic up to a irregular
event.
Change the way that output files with -C are numbered. -C alone
goes <none>, 1, 2, 3.... -C with -W will number 0, 1, 2 ... or
00, 01, 02 ... etc, depending on the value of -W. I.e., it
sorts properly. (Old behaviour was to go <none>, 2, 3...)
Close the current capture file before trying to allocate the buffer for
the new file's name, so that if that allocation fails we've at least
written out all of the previous file.
Make some variables for command-line arguments, and some functions not
used outside tcpdump.c, static.
2004-01-26 10:05:17 +08:00
|
|
|
|
2006-03-24 01:33:01 +08:00
|
|
|
if (dumpinfo.CurrentFileName == NULL)
|
|
|
|
error("malloc of dumpinfo.CurrentFileName");
|
2005-10-20 15:43:51 +08:00
|
|
|
|
2005-12-06 04:24:48 +08:00
|
|
|
/* We do not need numbering for dumpfiles if Cflag isn't set. */
|
|
|
|
if (Cflag != 0)
|
2006-03-24 01:33:01 +08:00
|
|
|
MakeFilename(dumpinfo.CurrentFileName, WFileName, 0, WflagChars);
|
2005-12-06 04:24:48 +08:00
|
|
|
else
|
2006-03-24 01:33:01 +08:00
|
|
|
MakeFilename(dumpinfo.CurrentFileName, WFileName, 0, 0);
|
2005-10-20 15:43:51 +08:00
|
|
|
|
2006-03-24 01:33:01 +08:00
|
|
|
p = pcap_dump_open(pd, dumpinfo.CurrentFileName);
|
2012-05-25 22:26:17 +08:00
|
|
|
#ifdef HAVE_CAP_NG_H
|
|
|
|
/* Give up capabilities, clear Effective set */
|
|
|
|
capng_clear(CAPNG_EFFECTIVE);
|
|
|
|
#endif
|
1999-10-08 07:47:09 +08:00
|
|
|
if (p == NULL)
|
|
|
|
error("%s", pcap_geterr(pd));
|
2005-10-20 15:43:51 +08:00
|
|
|
if (Cflag != 0 || Gflag != 0) {
|
2002-12-19 17:39:10 +08:00
|
|
|
callback = dump_packet_and_trunc;
|
2001-12-23 06:12:23 +08:00
|
|
|
dumpinfo.WFileName = WFileName;
|
|
|
|
dumpinfo.pd = pd;
|
|
|
|
dumpinfo.p = p;
|
|
|
|
pcap_userdata = (u_char *)&dumpinfo;
|
2001-10-03 16:05:47 +08:00
|
|
|
} else {
|
2002-12-19 17:39:10 +08:00
|
|
|
callback = dump_packet;
|
2001-10-03 16:05:47 +08:00
|
|
|
pcap_userdata = (u_char *)p;
|
|
|
|
}
|
2010-06-05 15:37:27 +08:00
|
|
|
#ifdef HAVE_PCAP_DUMP_FLUSH
|
|
|
|
if (Uflag)
|
|
|
|
pcap_dump_flush(p);
|
|
|
|
#endif
|
1999-10-08 07:47:09 +08:00
|
|
|
} else {
|
2002-12-19 17:27:54 +08:00
|
|
|
type = pcap_datalink(pd);
|
2012-08-12 02:34:24 +08:00
|
|
|
printinfo = get_print_info(type);
|
2002-12-19 17:39:10 +08:00
|
|
|
callback = print_packet;
|
|
|
|
pcap_userdata = (u_char *)&printinfo;
|
2002-11-12 03:54:40 +08:00
|
|
|
}
|
2010-11-07 10:28:10 +08:00
|
|
|
|
2012-02-07 21:16:19 +08:00
|
|
|
#ifdef SIGNAL_REQ_INFO
|
2007-11-22 04:39:24 +08:00
|
|
|
/*
|
|
|
|
* We can't get statistics when reading from a file rather
|
|
|
|
* than capturing from a device.
|
|
|
|
*/
|
|
|
|
if (RFileName == NULL)
|
2012-02-07 21:16:19 +08:00
|
|
|
(void)setsignal(SIGNAL_REQ_INFO, requestinfo);
|
2001-07-05 06:03:13 +08:00
|
|
|
#endif
|
2004-01-16 03:53:48 +08:00
|
|
|
|
|
|
|
if (vflag > 0 && WFileName) {
|
|
|
|
/*
|
|
|
|
* When capturing to a file, "-v" means tcpdump should,
|
|
|
|
* every 10 secodns, "v"erbosely report the number of
|
|
|
|
* packets captured.
|
|
|
|
*/
|
|
|
|
#ifdef USE_WIN32_MM_TIMER
|
2004-01-16 03:56:50 +08:00
|
|
|
/* call verbose_stats_dump() each 1000 +/-100msec */
|
2004-01-16 03:53:48 +08:00
|
|
|
timer_id = timeSetEvent(1000, 100, verbose_stats_dump, 0, TIME_PERIODIC);
|
|
|
|
setvbuf(stderr, NULL, _IONBF, 0);
|
|
|
|
#elif defined(HAVE_ALARM)
|
|
|
|
(void)setsignal(SIGALRM, verbose_stats_dump);
|
|
|
|
alarm(1);
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
2002-08-01 16:52:55 +08:00
|
|
|
#ifndef WIN32
|
1999-10-08 07:47:09 +08:00
|
|
|
if (RFileName == NULL) {
|
2003-01-08 12:33:27 +08:00
|
|
|
if (!vflag && !WFileName) {
|
|
|
|
(void)fprintf(stderr,
|
|
|
|
"%s: verbose output suppressed, use -v or -vv for full protocol decode\n",
|
|
|
|
program_name);
|
|
|
|
} else
|
|
|
|
(void)fprintf(stderr, "%s: ", program_name);
|
2003-08-01 09:01:40 +08:00
|
|
|
dlt = pcap_datalink(pd);
|
|
|
|
dlt_name = pcap_datalink_val_to_name(dlt);
|
2003-11-19 07:09:42 +08:00
|
|
|
if (dlt_name == NULL) {
|
|
|
|
(void)fprintf(stderr, "listening on %s, link-type %u, capture size %u bytes\n",
|
|
|
|
device, dlt, snaplen);
|
|
|
|
} else {
|
|
|
|
(void)fprintf(stderr, "listening on %s, link-type %s (%s), capture size %u bytes\n",
|
|
|
|
device, dlt_name,
|
|
|
|
pcap_datalink_val_to_description(dlt), snaplen);
|
|
|
|
}
|
2003-01-08 12:33:27 +08:00
|
|
|
(void)fflush(stderr);
|
1999-10-08 07:47:09 +08:00
|
|
|
}
|
2002-08-01 16:52:55 +08:00
|
|
|
#endif /* WIN32 */
|
2012-08-11 09:43:54 +08:00
|
|
|
do {
|
|
|
|
status = pcap_loop(pd, cnt, callback, pcap_userdata);
|
|
|
|
if (WFileName == NULL) {
|
2003-11-04 15:29:15 +08:00
|
|
|
/*
|
2012-08-11 09:43:54 +08:00
|
|
|
* We're printing packets. Flush the printed output,
|
|
|
|
* so it doesn't get intermingled with error output.
|
2003-11-04 15:29:15 +08:00
|
|
|
*/
|
2012-08-11 09:43:54 +08:00
|
|
|
if (status == -2) {
|
|
|
|
/*
|
|
|
|
* We got interrupted, so perhaps we didn't
|
|
|
|
* manage to finish a line we were printing.
|
|
|
|
* Print an extra newline, just in case.
|
|
|
|
*/
|
|
|
|
putchar('\n');
|
|
|
|
}
|
|
|
|
(void)fflush(stdout);
|
|
|
|
}
|
|
|
|
if (status == -1) {
|
|
|
|
/*
|
|
|
|
* Error. Report it.
|
|
|
|
*/
|
|
|
|
(void)fprintf(stderr, "%s: pcap_loop: %s\n",
|
|
|
|
program_name, pcap_geterr(pd));
|
|
|
|
}
|
|
|
|
if (RFileName == NULL) {
|
|
|
|
/*
|
|
|
|
* We're doing a live capture. Report the capture
|
|
|
|
* statistics.
|
|
|
|
*/
|
|
|
|
info(1);
|
|
|
|
}
|
|
|
|
pcap_close(pd);
|
|
|
|
if (VFileName != NULL) {
|
2012-09-07 02:40:21 +08:00
|
|
|
ret = get_next_file(VFile, VFileLine);
|
2012-08-11 09:43:54 +08:00
|
|
|
if (ret) {
|
|
|
|
RFileName = VFileLine;
|
|
|
|
pd = pcap_open_offline(RFileName, ebuf);
|
|
|
|
if (pd == NULL)
|
|
|
|
error("%s", ebuf);
|
2012-08-12 02:19:31 +08:00
|
|
|
new_dlt = pcap_datalink(pd);
|
|
|
|
if (WFileName && new_dlt != dlt)
|
|
|
|
error("%s: new dlt does not match original", RFileName);
|
2012-08-12 02:34:24 +08:00
|
|
|
printinfo = get_print_info(new_dlt);
|
2012-08-12 02:19:31 +08:00
|
|
|
dlt_name = pcap_datalink_val_to_name(new_dlt);
|
2012-08-11 09:43:54 +08:00
|
|
|
if (dlt_name == NULL) {
|
|
|
|
fprintf(stderr, "reading from file %s, link-type %u\n",
|
2012-08-12 02:19:31 +08:00
|
|
|
RFileName, new_dlt);
|
2012-08-11 09:43:54 +08:00
|
|
|
} else {
|
|
|
|
fprintf(stderr,
|
|
|
|
"reading from file %s, link-type %s (%s)\n",
|
|
|
|
RFileName, dlt_name,
|
2012-08-12 02:19:31 +08:00
|
|
|
pcap_datalink_val_to_description(new_dlt));
|
2012-08-11 09:43:54 +08:00
|
|
|
}
|
|
|
|
if (pcap_compile(pd, &fcode, cmdbuf, Oflag, netmask) < 0)
|
|
|
|
error("%s", pcap_geterr(pd));
|
|
|
|
if (pcap_setfilter(pd, &fcode) < 0)
|
|
|
|
error("%s", pcap_geterr(pd));
|
|
|
|
}
|
2003-11-04 15:29:15 +08:00
|
|
|
}
|
|
|
|
}
|
2012-08-11 09:43:54 +08:00
|
|
|
while (ret != NULL);
|
|
|
|
|
|
|
|
free(cmdbuf);
|
2003-11-04 15:29:15 +08:00
|
|
|
exit(status == -1 ? 1 : 0);
|
1999-10-08 07:47:09 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/* make a clean exit on interrupts */
|
2000-06-18 19:12:06 +08:00
|
|
|
static RETSIGTYPE
|
2003-11-04 15:29:15 +08:00
|
|
|
cleanup(int signo _U_)
|
1999-10-08 07:47:09 +08:00
|
|
|
{
|
2004-01-16 03:53:48 +08:00
|
|
|
#ifdef USE_WIN32_MM_TIMER
|
|
|
|
if (timer_id)
|
|
|
|
timeKillEvent(timer_id);
|
|
|
|
timer_id = 0;
|
|
|
|
#elif defined(HAVE_ALARM)
|
|
|
|
alarm(0);
|
|
|
|
#endif
|
|
|
|
|
2003-11-04 15:29:15 +08:00
|
|
|
#ifdef HAVE_PCAP_BREAKLOOP
|
|
|
|
/*
|
|
|
|
* We have "pcap_breakloop()"; use it, so that we do as little
|
|
|
|
* as possible in the signal handler (it's probably not safe
|
|
|
|
* to do anything with standard I/O streams in a signal handler -
|
|
|
|
* the ANSI C standard doesn't say it is).
|
|
|
|
*/
|
|
|
|
pcap_breakloop(pd);
|
|
|
|
#else
|
|
|
|
/*
|
|
|
|
* We don't have "pcap_breakloop()"; this isn't safe, but
|
|
|
|
* it's the best we can do. Print the summary if we're
|
|
|
|
* not reading from a savefile - i.e., if we're doing a
|
|
|
|
* live capture - and exit.
|
|
|
|
*/
|
1999-10-08 07:47:09 +08:00
|
|
|
if (pd != NULL && pcap_file(pd) == NULL) {
|
2003-11-04 15:29:15 +08:00
|
|
|
/*
|
|
|
|
* We got interrupted, so perhaps we didn't
|
|
|
|
* manage to finish a line we were printing.
|
|
|
|
* Print an extra newline, just in case.
|
|
|
|
*/
|
|
|
|
putchar('\n');
|
1999-10-08 07:47:09 +08:00
|
|
|
(void)fflush(stdout);
|
2001-07-05 06:03:13 +08:00
|
|
|
info(1);
|
1999-10-08 07:47:09 +08:00
|
|
|
}
|
2003-11-04 15:29:15 +08:00
|
|
|
exit(0);
|
|
|
|
#endif
|
1999-10-08 07:47:09 +08:00
|
|
|
}
|
|
|
|
|
2007-10-13 08:46:16 +08:00
|
|
|
/*
|
|
|
|
On windows, we do not use a fork, so we do not care less about
|
|
|
|
waiting a child processes to die
|
|
|
|
*/
|
2010-12-01 08:18:32 +08:00
|
|
|
#if defined(HAVE_FORK) || defined(HAVE_VFORK)
|
2006-03-24 01:33:01 +08:00
|
|
|
static RETSIGTYPE
|
|
|
|
child_cleanup(int signo _U_)
|
|
|
|
{
|
|
|
|
wait(NULL);
|
|
|
|
}
|
2010-12-01 08:18:32 +08:00
|
|
|
#endif /* HAVE_FORK && HAVE_VFORK */
|
2006-03-24 01:33:01 +08:00
|
|
|
|
2002-12-19 17:39:10 +08:00
|
|
|
static void
|
2001-07-05 06:03:13 +08:00
|
|
|
info(register int verbose)
|
|
|
|
{
|
|
|
|
struct pcap_stat stat;
|
|
|
|
|
2009-09-08 07:52:15 +08:00
|
|
|
/*
|
|
|
|
* Older versions of libpcap didn't set ps_ifdrop on some
|
|
|
|
* platforms; initialize it to 0 to handle that.
|
|
|
|
*/
|
|
|
|
stat.ps_ifdrop = 0;
|
2001-07-05 06:03:13 +08:00
|
|
|
if (pcap_stats(pd, &stat) < 0) {
|
|
|
|
(void)fprintf(stderr, "pcap_stats: %s\n", pcap_geterr(pd));
|
2007-11-22 04:31:31 +08:00
|
|
|
infoprint = 0;
|
2001-07-05 06:03:13 +08:00
|
|
|
return;
|
|
|
|
}
|
2002-08-01 16:52:55 +08:00
|
|
|
|
2001-07-05 06:03:13 +08:00
|
|
|
if (!verbose)
|
|
|
|
fprintf(stderr, "%s: ", program_name);
|
2002-08-01 16:52:55 +08:00
|
|
|
|
2011-03-09 01:11:25 +08:00
|
|
|
(void)fprintf(stderr, "%u packet%s captured", packets_captured,
|
|
|
|
PLURAL_SUFFIX(packets_captured));
|
2003-09-17 05:02:51 +08:00
|
|
|
if (!verbose)
|
|
|
|
fputs(", ", stderr);
|
|
|
|
else
|
|
|
|
putc('\n', stderr);
|
2011-03-09 01:11:25 +08:00
|
|
|
(void)fprintf(stderr, "%u packet%s received by filter", stat.ps_recv,
|
|
|
|
PLURAL_SUFFIX(stat.ps_recv));
|
2001-07-05 06:03:13 +08:00
|
|
|
if (!verbose)
|
|
|
|
fputs(", ", stderr);
|
|
|
|
else
|
|
|
|
putc('\n', stderr);
|
2011-03-09 01:11:25 +08:00
|
|
|
(void)fprintf(stderr, "%u packet%s dropped by kernel", stat.ps_drop,
|
|
|
|
PLURAL_SUFFIX(stat.ps_drop));
|
2009-09-08 07:52:15 +08:00
|
|
|
if (stat.ps_ifdrop != 0) {
|
|
|
|
if (!verbose)
|
|
|
|
fputs(", ", stderr);
|
|
|
|
else
|
|
|
|
putc('\n', stderr);
|
2011-03-09 01:11:25 +08:00
|
|
|
(void)fprintf(stderr, "%u packet%s dropped by interface\n",
|
|
|
|
stat.ps_ifdrop, PLURAL_SUFFIX(stat.ps_ifdrop));
|
2009-09-08 07:52:15 +08:00
|
|
|
} else
|
|
|
|
putc('\n', stderr);
|
2001-07-05 06:03:13 +08:00
|
|
|
infoprint = 0;
|
|
|
|
}
|
|
|
|
|
2010-12-01 08:18:32 +08:00
|
|
|
#if defined(HAVE_FORK) || defined(HAVE_VFORK)
|
2006-03-24 01:33:01 +08:00
|
|
|
static void
|
|
|
|
compress_savefile(const char *filename)
|
|
|
|
{
|
2010-12-01 08:18:32 +08:00
|
|
|
# ifdef HAVE_FORK
|
2006-03-24 01:33:01 +08:00
|
|
|
if (fork())
|
2010-12-01 08:18:32 +08:00
|
|
|
# else
|
|
|
|
if (vfork())
|
|
|
|
# endif
|
2006-03-24 01:33:01 +08:00
|
|
|
return;
|
|
|
|
/*
|
|
|
|
* Set to lowest priority so that this doesn't disturb the capture
|
|
|
|
*/
|
|
|
|
#ifdef NZERO
|
|
|
|
setpriority(PRIO_PROCESS, 0, NZERO - 1);
|
|
|
|
#else
|
|
|
|
setpriority(PRIO_PROCESS, 0, 19);
|
|
|
|
#endif
|
2009-06-10 06:05:28 +08:00
|
|
|
if (execlp(zflag, zflag, filename, (char *)NULL) == -1)
|
2006-03-24 01:33:01 +08:00
|
|
|
fprintf(stderr,
|
|
|
|
"compress_savefile:execlp(%s, %s): %s\n",
|
|
|
|
zflag,
|
|
|
|
filename,
|
|
|
|
strerror(errno));
|
2010-12-01 08:18:32 +08:00
|
|
|
# ifdef HAVE_FORK
|
|
|
|
exit(1);
|
|
|
|
# else
|
|
|
|
_exit(1);
|
|
|
|
# endif
|
2006-03-24 01:33:01 +08:00
|
|
|
}
|
2010-12-01 08:18:32 +08:00
|
|
|
#else /* HAVE_FORK && HAVE_VFORK */
|
2007-10-13 08:46:16 +08:00
|
|
|
static void
|
|
|
|
compress_savefile(const char *filename)
|
|
|
|
{
|
|
|
|
fprintf(stderr,
|
2010-12-01 08:18:32 +08:00
|
|
|
"compress_savefile failed. Functionality not implemented under your system\n");
|
2007-10-13 08:46:16 +08:00
|
|
|
}
|
2010-12-01 08:18:32 +08:00
|
|
|
#endif /* HAVE_FORK && HAVE_VFORK */
|
2006-03-24 01:33:01 +08:00
|
|
|
|
2001-10-03 15:35:42 +08:00
|
|
|
static void
|
2002-11-12 03:54:40 +08:00
|
|
|
dump_packet_and_trunc(u_char *user, const struct pcap_pkthdr *h, const u_char *sp)
|
2001-10-03 15:35:42 +08:00
|
|
|
{
|
2002-11-12 03:54:40 +08:00
|
|
|
struct dump_info *dump_info;
|
2001-10-03 15:35:42 +08:00
|
|
|
|
2003-09-17 05:02:51 +08:00
|
|
|
++packets_captured;
|
|
|
|
|
2002-11-12 03:54:40 +08:00
|
|
|
++infodelay;
|
|
|
|
|
|
|
|
dump_info = (struct dump_info *)user;
|
2002-06-12 01:08:37 +08:00
|
|
|
|
2005-10-20 15:43:51 +08:00
|
|
|
/*
|
2005-12-06 04:24:48 +08:00
|
|
|
* XXX - this won't force the file to rotate on the specified time
|
|
|
|
* boundary, but it will rotate on the first packet received after the
|
|
|
|
* specified Gflag number of seconds. Note: if a Gflag time boundary
|
|
|
|
* and a Cflag size boundary coincide, the time rotation will occur
|
|
|
|
* first thereby cancelling the Cflag boundary (since the file should
|
|
|
|
* be 0).
|
2005-10-20 15:43:51 +08:00
|
|
|
*/
|
2005-12-06 04:24:48 +08:00
|
|
|
if (Gflag != 0) {
|
|
|
|
/* Check if it is time to rotate */
|
|
|
|
time_t t;
|
2005-10-20 15:43:51 +08:00
|
|
|
|
2005-12-06 04:24:48 +08:00
|
|
|
/* Get the current time */
|
|
|
|
if ((t = time(NULL)) == (time_t)-1) {
|
|
|
|
error("dump_and_trunc_packet: can't get current_time: %s",
|
|
|
|
pcap_strerror(errno));
|
|
|
|
}
|
2005-10-20 15:43:51 +08:00
|
|
|
|
|
|
|
|
2005-12-06 04:24:48 +08:00
|
|
|
/* If the time is greater than the specified window, rotate */
|
|
|
|
if (t - Gflag_time >= Gflag) {
|
|
|
|
/* Update the Gflag_time */
|
|
|
|
Gflag_time = t;
|
|
|
|
/* Update Gflag_count */
|
|
|
|
Gflag_count++;
|
|
|
|
/*
|
|
|
|
* Close the current file and open a new one.
|
|
|
|
*/
|
|
|
|
pcap_dump_close(dump_info->p);
|
2005-10-20 15:43:51 +08:00
|
|
|
|
2006-03-24 01:33:01 +08:00
|
|
|
/*
|
|
|
|
* Compress the file we just closed, if the user asked for it
|
|
|
|
*/
|
|
|
|
if (zflag != NULL)
|
|
|
|
compress_savefile(dump_info->CurrentFileName);
|
|
|
|
|
2005-12-06 04:24:48 +08:00
|
|
|
/*
|
|
|
|
* Check to see if we've exceeded the Wflag (when
|
|
|
|
* not using Cflag).
|
|
|
|
*/
|
|
|
|
if (Cflag == 0 && Wflag > 0 && Gflag_count >= Wflag) {
|
|
|
|
(void)fprintf(stderr, "Maximum file limit reached: %d\n",
|
|
|
|
Wflag);
|
|
|
|
exit(0);
|
|
|
|
/* NOTREACHED */
|
|
|
|
}
|
2006-03-24 01:33:01 +08:00
|
|
|
if (dump_info->CurrentFileName != NULL)
|
|
|
|
free(dump_info->CurrentFileName);
|
2005-12-06 04:24:48 +08:00
|
|
|
/* Allocate space for max filename + \0. */
|
2012-09-28 11:44:34 +08:00
|
|
|
dump_info->CurrentFileName = (char *)malloc(PATH_MAX + 1);
|
2006-03-24 01:33:01 +08:00
|
|
|
if (dump_info->CurrentFileName == NULL)
|
2005-12-06 04:24:48 +08:00
|
|
|
error("dump_packet_and_trunc: malloc");
|
|
|
|
/*
|
|
|
|
* This is always the first file in the Cflag
|
|
|
|
* rotation: e.g. 0
|
|
|
|
* We also don't need numbering if Cflag is not set.
|
|
|
|
*/
|
|
|
|
if (Cflag != 0)
|
2006-03-24 01:33:01 +08:00
|
|
|
MakeFilename(dump_info->CurrentFileName, dump_info->WFileName, 0,
|
2005-12-06 04:24:48 +08:00
|
|
|
WflagChars);
|
|
|
|
else
|
2006-03-24 01:33:01 +08:00
|
|
|
MakeFilename(dump_info->CurrentFileName, dump_info->WFileName, 0, 0);
|
2005-12-06 04:24:48 +08:00
|
|
|
|
2012-05-25 22:26:17 +08:00
|
|
|
#ifdef HAVE_CAP_NG_H
|
|
|
|
capng_update(CAPNG_ADD, CAPNG_EFFECTIVE, CAP_DAC_OVERRIDE);
|
|
|
|
capng_apply(CAPNG_EFFECTIVE);
|
|
|
|
#endif /* HAVE_CAP_NG_H */
|
2006-03-24 01:33:01 +08:00
|
|
|
dump_info->p = pcap_dump_open(dump_info->pd, dump_info->CurrentFileName);
|
2012-05-25 22:26:17 +08:00
|
|
|
#ifdef HAVE_CAP_NG_H
|
|
|
|
capng_update(CAPNG_DROP, CAPNG_EFFECTIVE, CAP_DAC_OVERRIDE);
|
|
|
|
capng_apply(CAPNG_EFFECTIVE);
|
|
|
|
#endif /* HAVE_CAP_NG_H */
|
2005-12-06 04:24:48 +08:00
|
|
|
if (dump_info->p == NULL)
|
|
|
|
error("%s", pcap_geterr(pd));
|
|
|
|
}
|
|
|
|
}
|
2005-10-20 15:43:51 +08:00
|
|
|
|
2001-10-03 15:35:42 +08:00
|
|
|
/*
|
|
|
|
* XXX - this won't prevent capture files from getting
|
|
|
|
* larger than Cflag - the last packet written to the
|
|
|
|
* file could put it over Cflag.
|
|
|
|
*/
|
2005-10-20 15:43:51 +08:00
|
|
|
if (Cflag != 0 && pcap_dump_ftell(dump_info->p) > Cflag) {
|
From Chris Cogdon <chris@cogdon.org>:
Fix a segfault with the -C option when the number of files grows
to 1000. Limit has been increased to 1,000,000, and the code
will check for exceeding this.
Also, add a -W option which will limit the number of files
created before 'wrapping around' and writing to the first file
again, creating a 'loop tape'. Very useful if you want to have
this running permanently to capture traffic up to a irregular
event.
Change the way that output files with -C are numbered. -C alone
goes <none>, 1, 2, 3.... -C with -W will number 0, 1, 2 ... or
00, 01, 02 ... etc, depending on the value of -W. I.e., it
sorts properly. (Old behaviour was to go <none>, 2, 3...)
Close the current capture file before trying to allocate the buffer for
the new file's name, so that if that allocation fails we've at least
written out all of the previous file.
Make some variables for command-line arguments, and some functions not
used outside tcpdump.c, static.
2004-01-26 10:05:17 +08:00
|
|
|
/*
|
|
|
|
* Close the current file and open a new one.
|
|
|
|
*/
|
|
|
|
pcap_dump_close(dump_info->p);
|
2006-03-24 01:33:01 +08:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Compress the file we just closed, if the user asked for it
|
|
|
|
*/
|
|
|
|
if (zflag != NULL)
|
|
|
|
compress_savefile(dump_info->CurrentFileName);
|
|
|
|
|
From Chris Cogdon <chris@cogdon.org>:
Fix a segfault with the -C option when the number of files grows
to 1000. Limit has been increased to 1,000,000, and the code
will check for exceeding this.
Also, add a -W option which will limit the number of files
created before 'wrapping around' and writing to the first file
again, creating a 'loop tape'. Very useful if you want to have
this running permanently to capture traffic up to a irregular
event.
Change the way that output files with -C are numbered. -C alone
goes <none>, 1, 2, 3.... -C with -W will number 0, 1, 2 ... or
00, 01, 02 ... etc, depending on the value of -W. I.e., it
sorts properly. (Old behaviour was to go <none>, 2, 3...)
Close the current capture file before trying to allocate the buffer for
the new file's name, so that if that allocation fails we've at least
written out all of the previous file.
Make some variables for command-line arguments, and some functions not
used outside tcpdump.c, static.
2004-01-26 10:05:17 +08:00
|
|
|
Cflag_count++;
|
|
|
|
if (Wflag > 0) {
|
|
|
|
if (Cflag_count >= Wflag)
|
|
|
|
Cflag_count = 0;
|
|
|
|
}
|
2006-03-24 01:33:01 +08:00
|
|
|
if (dump_info->CurrentFileName != NULL)
|
|
|
|
free(dump_info->CurrentFileName);
|
2012-09-28 11:44:34 +08:00
|
|
|
dump_info->CurrentFileName = (char *)malloc(PATH_MAX + 1);
|
2006-03-24 01:33:01 +08:00
|
|
|
if (dump_info->CurrentFileName == NULL)
|
2002-11-12 03:54:40 +08:00
|
|
|
error("dump_packet_and_trunc: malloc");
|
2006-03-24 01:33:01 +08:00
|
|
|
MakeFilename(dump_info->CurrentFileName, dump_info->WFileName, Cflag_count, WflagChars);
|
|
|
|
dump_info->p = pcap_dump_open(dump_info->pd, dump_info->CurrentFileName);
|
2002-11-12 03:54:40 +08:00
|
|
|
if (dump_info->p == NULL)
|
2001-10-04 00:42:06 +08:00
|
|
|
error("%s", pcap_geterr(pd));
|
2001-10-03 15:35:42 +08:00
|
|
|
}
|
|
|
|
|
2002-11-12 03:54:40 +08:00
|
|
|
pcap_dump((u_char *)dump_info->p, h, sp);
|
2002-12-23 05:15:36 +08:00
|
|
|
#ifdef HAVE_PCAP_DUMP_FLUSH
|
2002-12-22 08:15:26 +08:00
|
|
|
if (Uflag)
|
|
|
|
pcap_dump_flush(dump_info->p);
|
|
|
|
#endif
|
2002-11-12 03:54:40 +08:00
|
|
|
|
|
|
|
--infodelay;
|
|
|
|
if (infoprint)
|
|
|
|
info(0);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
dump_packet(u_char *user, const struct pcap_pkthdr *h, const u_char *sp)
|
|
|
|
{
|
2003-09-17 05:02:51 +08:00
|
|
|
++packets_captured;
|
|
|
|
|
2002-11-12 03:54:40 +08:00
|
|
|
++infodelay;
|
|
|
|
|
|
|
|
pcap_dump(user, h, sp);
|
2002-12-23 05:15:36 +08:00
|
|
|
#ifdef HAVE_PCAP_DUMP_FLUSH
|
2002-12-22 08:15:26 +08:00
|
|
|
if (Uflag)
|
|
|
|
pcap_dump_flush((pcap_dumper_t *)user);
|
|
|
|
#endif
|
2002-11-12 03:54:40 +08:00
|
|
|
|
|
|
|
--infodelay;
|
|
|
|
if (infoprint)
|
|
|
|
info(0);
|
2001-10-03 15:35:42 +08:00
|
|
|
}
|
|
|
|
|
2002-12-19 17:39:10 +08:00
|
|
|
static void
|
|
|
|
print_packet(u_char *user, const struct pcap_pkthdr *h, const u_char *sp)
|
|
|
|
{
|
|
|
|
struct print_info *print_info;
|
|
|
|
u_int hdrlen;
|
|
|
|
|
2003-09-17 05:02:51 +08:00
|
|
|
++packets_captured;
|
|
|
|
|
2002-12-19 17:39:10 +08:00
|
|
|
++infodelay;
|
|
|
|
ts_print(&h->ts);
|
|
|
|
|
|
|
|
print_info = (struct print_info *)user;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Some printers want to check that they're not walking off the
|
|
|
|
* end of the packet.
|
|
|
|
* Rather than pass it all the way down, we set this global.
|
|
|
|
*/
|
|
|
|
snapend = sp + h->caplen;
|
|
|
|
|
2010-01-11 03:27:33 +08:00
|
|
|
if(print_info->ndo_type) {
|
|
|
|
hdrlen = (*print_info->p.ndo_printer)(print_info->ndo, h, sp);
|
|
|
|
} else {
|
|
|
|
hdrlen = (*print_info->p.printer)(h, sp);
|
|
|
|
}
|
|
|
|
|
2005-07-07 04:53:30 +08:00
|
|
|
if (Xflag) {
|
2002-12-19 17:39:10 +08:00
|
|
|
/*
|
2005-07-07 04:53:30 +08:00
|
|
|
* Print the raw packet data in hex and ASCII.
|
|
|
|
*/
|
|
|
|
if (Xflag > 1) {
|
|
|
|
/*
|
|
|
|
* Include the link-layer header.
|
|
|
|
*/
|
|
|
|
hex_and_ascii_print("\n\t", sp, h->caplen);
|
|
|
|
} else {
|
|
|
|
/*
|
|
|
|
* Don't include the link-layer header - and if
|
|
|
|
* we have nothing past the link-layer header,
|
|
|
|
* print nothing.
|
|
|
|
*/
|
|
|
|
if (h->caplen > hdrlen)
|
|
|
|
hex_and_ascii_print("\n\t", sp + hdrlen,
|
|
|
|
h->caplen - hdrlen);
|
|
|
|
}
|
|
|
|
} else if (xflag) {
|
|
|
|
/*
|
|
|
|
* Print the raw packet data in hex.
|
2002-12-19 17:39:10 +08:00
|
|
|
*/
|
|
|
|
if (xflag > 1) {
|
|
|
|
/*
|
|
|
|
* Include the link-layer header.
|
|
|
|
*/
|
2004-09-04 08:08:03 +08:00
|
|
|
hex_print("\n\t", sp, h->caplen);
|
2002-12-19 17:39:10 +08:00
|
|
|
} else {
|
|
|
|
/*
|
|
|
|
* Don't include the link-layer header - and if
|
|
|
|
* we have nothing past the link-layer header,
|
|
|
|
* print nothing.
|
|
|
|
*/
|
|
|
|
if (h->caplen > hdrlen)
|
2004-09-04 08:08:03 +08:00
|
|
|
hex_print("\n\t", sp + hdrlen,
|
|
|
|
h->caplen - hdrlen);
|
|
|
|
}
|
2005-07-07 04:53:30 +08:00
|
|
|
} else if (Aflag) {
|
2004-09-04 08:08:03 +08:00
|
|
|
/*
|
2005-07-07 04:53:30 +08:00
|
|
|
* Print the raw packet data in ASCII.
|
2004-09-04 08:08:03 +08:00
|
|
|
*/
|
2005-07-07 04:53:30 +08:00
|
|
|
if (Aflag > 1) {
|
2004-09-04 08:08:03 +08:00
|
|
|
/*
|
|
|
|
* Include the link-layer header.
|
|
|
|
*/
|
2005-07-07 04:53:30 +08:00
|
|
|
ascii_print(sp, h->caplen);
|
2004-09-04 08:08:03 +08:00
|
|
|
} else {
|
|
|
|
/*
|
|
|
|
* Don't include the link-layer header - and if
|
|
|
|
* we have nothing past the link-layer header,
|
|
|
|
* print nothing.
|
|
|
|
*/
|
|
|
|
if (h->caplen > hdrlen)
|
2005-07-07 04:53:30 +08:00
|
|
|
ascii_print(sp + hdrlen, h->caplen - hdrlen);
|
2002-12-19 17:39:10 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
putchar('\n');
|
|
|
|
|
|
|
|
--infodelay;
|
|
|
|
if (infoprint)
|
|
|
|
info(0);
|
|
|
|
}
|
|
|
|
|
2002-08-01 16:52:55 +08:00
|
|
|
#ifdef WIN32
|
2002-08-06 12:36:12 +08:00
|
|
|
/*
|
|
|
|
* XXX - there should really be libpcap calls to get the version
|
|
|
|
* number as a string (the string would be generated from #defines
|
|
|
|
* at run time, so that it's not generated from string constants
|
|
|
|
* in the library, as, on many UNIX systems, those constants would
|
|
|
|
* be statically linked into the application executable image, and
|
|
|
|
* would thus reflect the version of libpcap on the system on
|
|
|
|
* which the application was *linked*, not the system on which it's
|
|
|
|
* *running*.
|
|
|
|
*
|
|
|
|
* That routine should be documented, unlike the "version[]"
|
|
|
|
* string, so that UNIX vendors providing their own libpcaps
|
|
|
|
* don't omit it (as a couple of vendors have...).
|
|
|
|
*
|
|
|
|
* Packet.dll should perhaps also export a routine to return the
|
|
|
|
* version number of the Packet.dll code, to supply the
|
|
|
|
* "Wpcap_version" information on Windows.
|
|
|
|
*/
|
2002-08-01 16:52:55 +08:00
|
|
|
char WDversion[]="current-cvs.tcpdump.org";
|
2004-01-16 03:53:48 +08:00
|
|
|
#if !defined(HAVE_GENERATED_VERSION)
|
2002-08-01 16:52:55 +08:00
|
|
|
char version[]="current-cvs.tcpdump.org";
|
2004-01-16 03:53:48 +08:00
|
|
|
#endif
|
2002-08-01 16:52:55 +08:00
|
|
|
char pcap_version[]="current-cvs.tcpdump.org";
|
2004-04-06 21:04:17 +08:00
|
|
|
char Wpcap_version[]="3.1";
|
2002-08-01 16:52:55 +08:00
|
|
|
#endif
|
|
|
|
|
1999-10-08 07:47:09 +08:00
|
|
|
/*
|
2005-07-07 04:53:30 +08:00
|
|
|
* By default, print the specified data out in hex and ASCII.
|
1999-10-08 07:47:09 +08:00
|
|
|
*/
|
2004-12-23 18:43:12 +08:00
|
|
|
static void
|
|
|
|
ndo_default_print(netdissect_options *ndo _U_, const u_char *bp, u_int length)
|
1999-10-08 07:47:09 +08:00
|
|
|
{
|
2005-07-07 04:53:30 +08:00
|
|
|
hex_and_ascii_print("\n\t", bp, length); /* pass on lf and identation string */
|
1999-10-08 07:47:09 +08:00
|
|
|
}
|
|
|
|
|
2004-12-23 18:43:12 +08:00
|
|
|
void
|
|
|
|
default_print(const u_char *bp, u_int length)
|
|
|
|
{
|
|
|
|
ndo_default_print(gndo, bp, length);
|
|
|
|
}
|
|
|
|
|
2012-02-07 21:16:19 +08:00
|
|
|
#ifdef SIGNAL_REQ_INFO
|
2002-09-06 05:25:34 +08:00
|
|
|
RETSIGTYPE requestinfo(int signo _U_)
|
2001-07-05 06:03:13 +08:00
|
|
|
{
|
|
|
|
if (infodelay)
|
|
|
|
++infoprint;
|
|
|
|
else
|
|
|
|
info(0);
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2004-01-16 03:53:48 +08:00
|
|
|
/*
|
|
|
|
* Called once each second in verbose mode while dumping to file
|
|
|
|
*/
|
|
|
|
#ifdef USE_WIN32_MM_TIMER
|
|
|
|
void CALLBACK verbose_stats_dump (UINT timer_id _U_, UINT msg _U_, DWORD_PTR arg _U_,
|
2005-12-06 04:24:48 +08:00
|
|
|
DWORD_PTR dw1 _U_, DWORD_PTR dw2 _U_)
|
2004-01-16 03:53:48 +08:00
|
|
|
{
|
|
|
|
struct pcap_stat stat;
|
|
|
|
|
|
|
|
if (infodelay == 0 && pcap_stats(pd, &stat) >= 0)
|
|
|
|
fprintf(stderr, "Got %u\r", packets_captured);
|
|
|
|
}
|
|
|
|
#elif defined(HAVE_ALARM)
|
|
|
|
static void verbose_stats_dump(int sig _U_)
|
|
|
|
{
|
|
|
|
struct pcap_stat stat;
|
|
|
|
|
|
|
|
if (infodelay == 0 && pcap_stats(pd, &stat) >= 0)
|
|
|
|
fprintf(stderr, "Got %u\r", packets_captured);
|
|
|
|
alarm(1);
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2000-07-11 08:49:02 +08:00
|
|
|
static void
|
1999-10-08 07:47:09 +08:00
|
|
|
usage(void)
|
|
|
|
{
|
|
|
|
extern char version[];
|
2003-02-11 15:41:52 +08:00
|
|
|
#ifndef HAVE_PCAP_LIB_VERSION
|
2002-09-05 09:31:41 +08:00
|
|
|
#if defined(WIN32) || defined(HAVE_PCAP_VERSION)
|
1999-10-08 07:47:09 +08:00
|
|
|
extern char pcap_version[];
|
2003-02-11 15:41:52 +08:00
|
|
|
#else /* defined(WIN32) || defined(HAVE_PCAP_VERSION) */
|
2002-09-05 09:31:41 +08:00
|
|
|
static char pcap_version[] = "unknown";
|
2003-02-11 15:41:52 +08:00
|
|
|
#endif /* defined(WIN32) || defined(HAVE_PCAP_VERSION) */
|
|
|
|
#endif /* HAVE_PCAP_LIB_VERSION */
|
1999-10-08 07:47:09 +08:00
|
|
|
|
2003-02-11 15:41:52 +08:00
|
|
|
#ifdef HAVE_PCAP_LIB_VERSION
|
2004-04-06 21:04:17 +08:00
|
|
|
#ifdef WIN32
|
|
|
|
(void)fprintf(stderr, "%s version %s, based on tcpdump version %s\n", program_name, WDversion, version);
|
|
|
|
#else /* WIN32 */
|
2003-02-11 15:41:52 +08:00
|
|
|
(void)fprintf(stderr, "%s version %s\n", program_name, version);
|
2004-04-06 21:04:17 +08:00
|
|
|
#endif /* WIN32 */
|
|
|
|
(void)fprintf(stderr, "%s\n",pcap_lib_version());
|
2003-02-11 15:41:52 +08:00
|
|
|
#else /* HAVE_PCAP_LIB_VERSION */
|
2002-08-01 16:52:55 +08:00
|
|
|
#ifdef WIN32
|
|
|
|
(void)fprintf(stderr, "%s version %s, based on tcpdump version %s\n", program_name, WDversion, version);
|
|
|
|
(void)fprintf(stderr, "WinPcap version %s, based on libpcap version %s\n",Wpcap_version, pcap_version);
|
2003-02-11 15:41:52 +08:00
|
|
|
#else /* WIN32 */
|
1999-10-08 07:47:09 +08:00
|
|
|
(void)fprintf(stderr, "%s version %s\n", program_name, version);
|
|
|
|
(void)fprintf(stderr, "libpcap version %s\n", pcap_version);
|
2002-08-01 16:52:55 +08:00
|
|
|
#endif /* WIN32 */
|
2003-02-11 15:41:52 +08:00
|
|
|
#endif /* HAVE_PCAP_LIB_VERSION */
|
1999-10-08 07:47:09 +08:00
|
|
|
(void)fprintf(stderr,
|
2011-06-22 09:15:50 +08:00
|
|
|
"Usage: %s [-aAbd" D_FLAG "efhH" I_FLAG J_FLAG "KlLnNOpqRStu" U_FLAG "vxX]" B_FLAG_USAGE " [ -c count ]\n", program_name);
|
1999-10-08 07:47:09 +08:00
|
|
|
(void)fprintf(stderr,
|
2008-04-05 03:42:11 +08:00
|
|
|
"\t\t[ -C file_size ] [ -E algo:secret ] [ -F file ] [ -G seconds ]\n");
|
2002-12-19 17:27:54 +08:00
|
|
|
(void)fprintf(stderr,
|
2010-08-23 08:32:26 +08:00
|
|
|
"\t\t[ -i interface ]" j_FLAG_USAGE " [ -M secret ]\n");
|
2004-01-26 10:09:23 +08:00
|
|
|
(void)fprintf(stderr,
|
2012-08-11 09:43:54 +08:00
|
|
|
"\t\t[ -r file ] [ -s snaplen ] [ -T type ] [ -V file ] [ -w file ]\n");
|
2008-04-05 03:42:11 +08:00
|
|
|
(void)fprintf(stderr,
|
2010-08-23 08:32:26 +08:00
|
|
|
"\t\t[ -W filecount ] [ -y datalinktype ] [ -z command ]\n");
|
1999-10-08 07:47:09 +08:00
|
|
|
(void)fprintf(stderr,
|
2010-08-23 08:32:26 +08:00
|
|
|
"\t\t[ -Z user ] [ expression ]\n");
|
2001-06-25 04:38:52 +08:00
|
|
|
exit(1);
|
1999-10-08 07:47:09 +08:00
|
|
|
}
|
2004-04-05 08:15:50 +08:00
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
/* VARARGS */
|
2004-07-22 06:06:47 +08:00
|
|
|
static void
|
2004-04-05 08:15:50 +08:00
|
|
|
ndo_error(netdissect_options *ndo _U_, const char *fmt, ...)
|
|
|
|
{
|
|
|
|
va_list ap;
|
|
|
|
|
|
|
|
(void)fprintf(stderr, "%s: ", program_name);
|
|
|
|
va_start(ap, fmt);
|
|
|
|
(void)vfprintf(stderr, fmt, ap);
|
|
|
|
va_end(ap);
|
|
|
|
if (*fmt) {
|
|
|
|
fmt += strlen(fmt);
|
|
|
|
if (fmt[-1] != '\n')
|
|
|
|
(void)fputc('\n', stderr);
|
|
|
|
}
|
|
|
|
exit(1);
|
|
|
|
/* NOTREACHED */
|
|
|
|
}
|
|
|
|
|
|
|
|
/* VARARGS */
|
2004-07-22 06:06:47 +08:00
|
|
|
static void
|
2004-04-05 08:15:50 +08:00
|
|
|
ndo_warning(netdissect_options *ndo _U_, const char *fmt, ...)
|
|
|
|
{
|
|
|
|
va_list ap;
|
|
|
|
|
|
|
|
(void)fprintf(stderr, "%s: WARNING: ", program_name);
|
|
|
|
va_start(ap, fmt);
|
|
|
|
(void)vfprintf(stderr, fmt, ap);
|
|
|
|
va_end(ap);
|
|
|
|
if (*fmt) {
|
|
|
|
fmt += strlen(fmt);
|
|
|
|
if (fmt[-1] != '\n')
|
|
|
|
(void)fputc('\n', stderr);
|
|
|
|
}
|
|
|
|
}
|