forked from osmocom/wireshark
Add sharkd - daemon variant
sharkd listens on UNIX socket and allows external clients to run commands like: loading file, analysing frames or running TAP(s). Change-Id: I443b2865e4adfd1c11f4f57d09ff7fce6b1e8766 Reviewed-on: https://code.wireshark.org/review/18208 Petri-Dish: Jakub Zawadzki <darkjames-ws@darkjames.pl> Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org> Reviewed-by: Peter Wu <peter@lekensteyn.nl> Reviewed-by: Jakub Zawadzki <darkjames-ws@darkjames.pl>pespin/osmux-stats
parent
11574208e7
commit
e2930f3b78
|
@ -1383,7 +1383,7 @@ if(WIN32)
|
|||
)
|
||||
endif()
|
||||
|
||||
# sources common for wireshark, tshark, and rawshark
|
||||
# sources common for wireshark, tshark, rawshark and sharkd
|
||||
set(SHARK_COMMON_SRC
|
||||
cfile.c
|
||||
frame_tvbuff.c
|
||||
|
@ -2290,6 +2290,28 @@ if(BUILD_rawshark AND PCAP_FOUND)
|
|||
install(TARGETS rawshark RUNTIME DESTINATION ${CMAKE_INSTALL_BINDIR})
|
||||
endif()
|
||||
|
||||
if(BUILD_sharkd)
|
||||
set(sharkd_LIBS
|
||||
ui
|
||||
${LIBEPAN_LIBS}
|
||||
${APPLE_CORE_FOUNDATION_LIBRARY}
|
||||
${APPLE_SYSTEM_CONFIGURATION_LIBRARY}
|
||||
)
|
||||
set(sharkd_FILES
|
||||
capture_opts.c
|
||||
filter_files.c
|
||||
sharkd.c
|
||||
sharkd_daemon.c
|
||||
sharkd_session.c
|
||||
${SHARK_COMMON_SRC}
|
||||
)
|
||||
add_executable(sharkd ${sharkd_FILES})
|
||||
add_dependencies(sharkd version)
|
||||
set_extra_executable_properties(sharkd "Executables")
|
||||
target_link_libraries(sharkd ${sharkd_LIBS})
|
||||
install(TARGETS sharkd RUNTIME DESTINATION ${CMAKE_INSTALL_BINDIR})
|
||||
endif()
|
||||
|
||||
if(BUILD_dftest)
|
||||
set(dftest_LIBS
|
||||
${LIBEPAN_LIBS}
|
||||
|
|
31
Makefile.am
31
Makefile.am
|
@ -45,11 +45,12 @@ bin_PROGRAMS = \
|
|||
@dumpcap_bin@ \
|
||||
@reordercap_bin@ \
|
||||
@rawshark_bin@ \
|
||||
@sharkd_bin@ \
|
||||
@echld_test_bin@
|
||||
|
||||
EXTRA_PROGRAMS = wireshark-gtk wireshark tshark tfshark capinfos captype \
|
||||
editcap mergecap dftest randpkt text2pcap dumpcap reordercap \
|
||||
rawshark echld_test
|
||||
rawshark sharkd echld_test
|
||||
|
||||
#
|
||||
# Wireshark configuration files are put in $(pkgdatadir).
|
||||
|
@ -577,6 +578,34 @@ rawshark_LDADD = \
|
|||
@SYSTEMCONFIGURATION_FRAMEWORKS@ \
|
||||
@COREFOUNDATION_FRAMEWORKS@
|
||||
|
||||
sharkd_SOURCES = \
|
||||
$(SHARK_COMMON_SRC) \
|
||||
filter_files.c \
|
||||
sharkd.c \
|
||||
sharkd_daemon.c \
|
||||
sharkd_session.c \
|
||||
ws_version_info.c
|
||||
|
||||
sharkd_CPPFLAGS = $(AM_CPPFLAGS) $(GLIB_CFLAGS)
|
||||
|
||||
sharkd_LDFLAGS = $(AM_LDFLAGS) $(EXTRALINKFLAGS)
|
||||
|
||||
# Libraries and plugin flags with which to link sharkd.
|
||||
sharkd_LDADD = \
|
||||
capchild/libcapchild.a \
|
||||
caputils/libcaputils.a \
|
||||
ui/cli/libcliui.a \
|
||||
ui/libui.a \
|
||||
wiretap/libwiretap.la \
|
||||
epan/libwireshark.la \
|
||||
wsutil/libwsutil.la \
|
||||
$(plugin_ldadd) \
|
||||
@GLIB_LIBS@ \
|
||||
@PCAP_LIBS@ \
|
||||
${EPAN_EXTRA_LIBS} \
|
||||
@SYSTEMCONFIGURATION_FRAMEWORKS@ \
|
||||
@COREFOUNDATION_FRAMEWORKS@
|
||||
|
||||
text2pcap_SOURCES = \
|
||||
text2pcap.c \
|
||||
text2pcap-scanner.l \
|
||||
|
|
14
configure.ac
14
configure.ac
|
@ -1888,6 +1888,19 @@ fi
|
|||
AC_SUBST(rawshark_bin)
|
||||
AC_SUBST(rawshark_man)
|
||||
|
||||
# Enable/disable sharkd
|
||||
AC_ARG_ENABLE(sharkd,
|
||||
AC_HELP_STRING( [--enable-sharkd],
|
||||
[build sharkd @<:@default=yes@:>@]),
|
||||
sharkd=$enableval,enable_sharkd=yes)
|
||||
|
||||
if test "x$enable_sharkd" = "xyes" ; then
|
||||
sharkd_bin="sharkd\$(EXEEXT)"
|
||||
else
|
||||
sharkd_bin=""
|
||||
fi
|
||||
AC_SUBST(sharkd_bin)
|
||||
|
||||
# Enable/disable echld
|
||||
AC_ARG_ENABLE(echld,
|
||||
AC_HELP_STRING( [--enable-echld],
|
||||
|
@ -3167,6 +3180,7 @@ echo " Build text2pcap : $enable_text2pcap"
|
|||
echo " Build randpkt : $enable_randpkt"
|
||||
echo " Build dftest : $enable_dftest"
|
||||
echo " Build rawshark : $enable_rawshark"
|
||||
echo " Build sharkd : $enable_sharkd"
|
||||
echo " Build androiddump : $enable_androiddump"
|
||||
echo " Build sshdump : $enable_sshdump"
|
||||
echo " Build ciscodump : $enable_ciscodump"
|
||||
|
|
|
@ -0,0 +1,997 @@
|
|||
/* sharkd.c
|
||||
*
|
||||
* Daemon variant of Wireshark
|
||||
*
|
||||
* Wireshark - Network traffic analyzer
|
||||
* By Gerald Combs <gerald@wireshark.org>
|
||||
* Copyright 1998 Gerald Combs
|
||||
*
|
||||
* This program is free software; you can redistribute it and/or
|
||||
* modify it under the terms of the GNU General Public License
|
||||
* as published by the Free Software Foundation; either version 2
|
||||
* of the License, or (at your option) any later version.
|
||||
*
|
||||
* This program is distributed in the hope that it will be useful,
|
||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
* GNU General Public License for more details.
|
||||
*
|
||||
* You should have received a copy of the GNU General Public License
|
||||
* along with this program; if not, write to the Free Software
|
||||
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
|
||||
*/
|
||||
|
||||
#include <config.h>
|
||||
|
||||
#include <stdlib.h>
|
||||
#include <stdio.h>
|
||||
#include <string.h>
|
||||
#include <limits.h>
|
||||
#include <errno.h>
|
||||
#include <signal.h>
|
||||
|
||||
#include <glib.h>
|
||||
|
||||
#include <epan/exceptions.h>
|
||||
#include <epan/epan-int.h>
|
||||
#include <epan/epan.h>
|
||||
|
||||
#include <wsutil/clopts_common.h>
|
||||
#include <wsutil/cmdarg_err.h>
|
||||
#include <wsutil/crash_info.h>
|
||||
#include <wsutil/filesystem.h>
|
||||
#include <wsutil/file_util.h>
|
||||
#include <wsutil/privileges.h>
|
||||
#include <wsutil/report_err.h>
|
||||
#include <ws_version_info.h>
|
||||
#include <wiretap/wtap_opttypes.h>
|
||||
#include <wiretap/pcapng.h>
|
||||
|
||||
#include "globals.h"
|
||||
#include <epan/decode_as.h>
|
||||
#include <epan/timestamp.h>
|
||||
#include <epan/packet.h>
|
||||
#include "frame_tvbuff.h"
|
||||
#include <epan/disabled_protos.h>
|
||||
#include <epan/prefs.h>
|
||||
#include <epan/column.h>
|
||||
#include <epan/print.h>
|
||||
#include <epan/addr_resolv.h>
|
||||
#include "ui/util.h"
|
||||
#include "ui/ui_util.h"
|
||||
#include "ui/decode_as_utils.h"
|
||||
#include "ui/tap_export_pdu.h"
|
||||
#include "register.h"
|
||||
#include "filter_files.h"
|
||||
#include <epan/epan_dissect.h>
|
||||
#include <epan/tap.h>
|
||||
|
||||
#include "log.h"
|
||||
|
||||
#include <wsutil/str_util.h>
|
||||
#include <wsutil/utf8_entities.h>
|
||||
|
||||
#ifdef HAVE_PLUGINS
|
||||
#include <wsutil/plugins.h>
|
||||
#endif
|
||||
|
||||
#include "sharkd.h"
|
||||
|
||||
static guint32 cum_bytes;
|
||||
static const frame_data *ref;
|
||||
static frame_data ref_frame;
|
||||
static frame_data *prev_dis;
|
||||
static frame_data *prev_cap;
|
||||
|
||||
static const char *cf_open_error_message(int err, gchar *err_info,
|
||||
gboolean for_writing, int file_type);
|
||||
|
||||
static void open_failure_message(const char *filename, int err,
|
||||
gboolean for_writing);
|
||||
static void failure_message(const char *msg_format, va_list ap);
|
||||
static void read_failure_message(const char *filename, int err);
|
||||
static void write_failure_message(const char *filename, int err);
|
||||
static void failure_message_cont(const char *msg_format, va_list ap);
|
||||
|
||||
capture_file cfile;
|
||||
|
||||
static void
|
||||
print_current_user(void) {
|
||||
gchar *cur_user, *cur_group;
|
||||
|
||||
if (started_with_special_privs()) {
|
||||
cur_user = get_cur_username();
|
||||
cur_group = get_cur_groupname();
|
||||
fprintf(stderr, "Running as user \"%s\" and group \"%s\".",
|
||||
cur_user, cur_group);
|
||||
g_free(cur_user);
|
||||
g_free(cur_group);
|
||||
if (running_with_special_privs()) {
|
||||
fprintf(stderr, " This could be dangerous.");
|
||||
}
|
||||
fprintf(stderr, "\n");
|
||||
}
|
||||
}
|
||||
|
||||
int
|
||||
main(int argc, char *argv[])
|
||||
{
|
||||
GString *comp_info_str;
|
||||
GString *runtime_info_str;
|
||||
char *init_progfile_dir_error;
|
||||
|
||||
char *gpf_path, *pf_path;
|
||||
char *gdp_path, *dp_path;
|
||||
char *cf_path;
|
||||
char *err_msg = NULL;
|
||||
int gpf_open_errno, gpf_read_errno;
|
||||
int pf_open_errno, pf_read_errno;
|
||||
int gdp_open_errno, gdp_read_errno;
|
||||
int dp_open_errno, dp_read_errno;
|
||||
int cf_open_errno;
|
||||
e_prefs *prefs_p;
|
||||
|
||||
cmdarg_err_init(failure_message, failure_message_cont);
|
||||
|
||||
/*
|
||||
* Get credential information for later use, and drop privileges
|
||||
* before doing anything else.
|
||||
* Let the user know if anything happened.
|
||||
*/
|
||||
init_process_policies();
|
||||
relinquish_special_privs_perm();
|
||||
print_current_user();
|
||||
|
||||
/*
|
||||
* Attempt to get the pathname of the executable file.
|
||||
*/
|
||||
init_progfile_dir_error = init_progfile_dir(argv[0], main);
|
||||
if (init_progfile_dir_error != NULL) {
|
||||
fprintf(stderr, "sharkd: Can't get pathname of sharkd program: %s.\n",
|
||||
init_progfile_dir_error);
|
||||
}
|
||||
|
||||
/* Get the compile-time version information string */
|
||||
comp_info_str = get_compiled_version_info(NULL, epan_get_compiled_version_info);
|
||||
|
||||
/* Get the run-time version information string */
|
||||
runtime_info_str = get_runtime_version_info(epan_get_runtime_version_info);
|
||||
|
||||
/* Add it to the information to be reported on a crash. */
|
||||
ws_add_crash_info("Sharkd (Wireshark) %s\n"
|
||||
"\n"
|
||||
"%s"
|
||||
"\n"
|
||||
"%s",
|
||||
get_ws_vcs_version_info(), comp_info_str->str, runtime_info_str->str);
|
||||
g_string_free(comp_info_str, TRUE);
|
||||
g_string_free(runtime_info_str, TRUE);
|
||||
|
||||
if (sharkd_init(argc, argv) < 0)
|
||||
{
|
||||
printf("cannot initialize sharkd\n");
|
||||
return 1;
|
||||
}
|
||||
|
||||
init_report_err(failure_message, open_failure_message, read_failure_message,
|
||||
write_failure_message);
|
||||
|
||||
timestamp_set_type(TS_RELATIVE);
|
||||
timestamp_set_precision(TS_PREC_AUTO);
|
||||
timestamp_set_seconds_type(TS_SECONDS_DEFAULT);
|
||||
|
||||
wtap_init();
|
||||
|
||||
#ifdef HAVE_PLUGINS
|
||||
/* Register all the plugin types we have. */
|
||||
epan_register_plugin_types(); /* Types known to libwireshark */
|
||||
|
||||
/* Scan for plugins. This does *not* call their registration routines;
|
||||
that's done later. */
|
||||
scan_plugins(REPORT_LOAD_FAILURE);
|
||||
|
||||
/* Register all libwiretap plugin modules. */
|
||||
register_all_wiretap_modules();
|
||||
#endif
|
||||
|
||||
/* Register all dissectors; we must do this before checking for the
|
||||
"-G" flag, as the "-G" flag dumps information registered by the
|
||||
dissectors, and we must do it before we read the preferences, in
|
||||
case any dissectors register preferences. */
|
||||
if (!epan_init(register_all_protocols, register_all_protocol_handoffs, NULL,
|
||||
NULL))
|
||||
return 2;
|
||||
|
||||
/* load the decode as entries of this profile */
|
||||
load_decode_as_entries();
|
||||
|
||||
prefs_p = read_prefs(&gpf_open_errno, &gpf_read_errno, &gpf_path,
|
||||
&pf_open_errno, &pf_read_errno, &pf_path);
|
||||
if (gpf_path != NULL) {
|
||||
if (gpf_open_errno != 0) {
|
||||
cmdarg_err("Can't open global preferences file \"%s\": %s.",
|
||||
pf_path, g_strerror(gpf_open_errno));
|
||||
}
|
||||
if (gpf_read_errno != 0) {
|
||||
cmdarg_err("I/O error reading global preferences file \"%s\": %s.",
|
||||
pf_path, g_strerror(gpf_read_errno));
|
||||
}
|
||||
}
|
||||
if (pf_path != NULL) {
|
||||
if (pf_open_errno != 0) {
|
||||
cmdarg_err("Can't open your preferences file \"%s\": %s.", pf_path,
|
||||
g_strerror(pf_open_errno));
|
||||
}
|
||||
if (pf_read_errno != 0) {
|
||||
cmdarg_err("I/O error reading your preferences file \"%s\": %s.",
|
||||
pf_path, g_strerror(pf_read_errno));
|
||||
}
|
||||
g_free(pf_path);
|
||||
pf_path = NULL;
|
||||
}
|
||||
|
||||
read_filter_list(CFILTER_LIST, &cf_path, &cf_open_errno);
|
||||
if (cf_path != NULL) {
|
||||
cmdarg_err("Could not open your capture filter file\n\"%s\": %s.",
|
||||
cf_path, g_strerror(cf_open_errno));
|
||||
g_free(cf_path);
|
||||
}
|
||||
|
||||
if (!color_filters_init(&err_msg, NULL)) {
|
||||
fprintf(stderr, "color_filters_init() failed %s\n", err_msg);
|
||||
g_free(err_msg);
|
||||
}
|
||||
|
||||
/* Read the disabled protocols file. */
|
||||
read_disabled_protos_list(&gdp_path, &gdp_open_errno, &gdp_read_errno,
|
||||
&dp_path, &dp_open_errno, &dp_read_errno);
|
||||
read_disabled_heur_dissector_list(&gdp_path, &gdp_open_errno, &gdp_read_errno,
|
||||
&dp_path, &dp_open_errno, &dp_read_errno);
|
||||
if (gdp_path != NULL) {
|
||||
if (gdp_open_errno != 0) {
|
||||
cmdarg_err("Could not open global disabled protocols file\n\"%s\": %s.",
|
||||
gdp_path, g_strerror(gdp_open_errno));
|
||||
}
|
||||
if (gdp_read_errno != 0) {
|
||||
cmdarg_err("I/O error reading global disabled protocols file\n\"%s\": %s.",
|
||||
gdp_path, g_strerror(gdp_read_errno));
|
||||
}
|
||||
g_free(gdp_path);
|
||||
}
|
||||
if (dp_path != NULL) {
|
||||
if (dp_open_errno != 0) {
|
||||
cmdarg_err(
|
||||
"Could not open your disabled protocols file\n\"%s\": %s.", dp_path,
|
||||
g_strerror(dp_open_errno));
|
||||
}
|
||||
if (dp_read_errno != 0) {
|
||||
cmdarg_err(
|
||||
"I/O error reading your disabled protocols file\n\"%s\": %s.", dp_path,
|
||||
g_strerror(dp_read_errno));
|
||||
}
|
||||
g_free(dp_path);
|
||||
}
|
||||
|
||||
cap_file_init(&cfile);
|
||||
|
||||
/* Notify all registered modules that have had any of their preferences
|
||||
changed either from one of the preferences file or from the command
|
||||
line that their preferences have changed. */
|
||||
prefs_apply_all();
|
||||
|
||||
/* disabled protocols as per configuration file */
|
||||
if (gdp_path == NULL && dp_path == NULL) {
|
||||
set_disabled_protos_list();
|
||||
set_disabled_heur_dissector_list();
|
||||
}
|
||||
|
||||
/* Build the column format array */
|
||||
build_column_format_array(&cfile.cinfo, prefs_p->num_cols, TRUE);
|
||||
|
||||
return sharkd_loop();
|
||||
}
|
||||
|
||||
static const nstime_t *
|
||||
sharkd_get_frame_ts(void *data, guint32 frame_num)
|
||||
{
|
||||
capture_file *cf = (capture_file *) data;
|
||||
|
||||
if (ref && ref->num == frame_num)
|
||||
return &ref->abs_ts;
|
||||
|
||||
if (prev_dis && prev_dis->num == frame_num)
|
||||
return &prev_dis->abs_ts;
|
||||
|
||||
if (prev_cap && prev_cap->num == frame_num)
|
||||
return &prev_cap->abs_ts;
|
||||
|
||||
if (cf->frames) {
|
||||
frame_data *fd = frame_data_sequence_find(cf->frames, frame_num);
|
||||
|
||||
return (fd) ? &fd->abs_ts : NULL;
|
||||
}
|
||||
|
||||
return NULL;
|
||||
}
|
||||
|
||||
static epan_t *
|
||||
sharkd_epan_new(capture_file *cf)
|
||||
{
|
||||
epan_t *epan = epan_new();
|
||||
|
||||
epan->data = cf;
|
||||
epan->get_frame_ts = sharkd_get_frame_ts;
|
||||
epan->get_interface_name = cap_file_get_interface_name;
|
||||
epan->get_user_comment = NULL;
|
||||
|
||||
return epan;
|
||||
}
|
||||
|
||||
static gboolean
|
||||
process_packet_first_pass(capture_file *cf, epan_dissect_t *edt,
|
||||
gint64 offset, struct wtap_pkthdr *whdr,
|
||||
const guchar *pd)
|
||||
{
|
||||
frame_data fdlocal;
|
||||
guint32 framenum;
|
||||
gboolean passed;
|
||||
|
||||
/* The frame number of this packet is one more than the count of
|
||||
frames in this packet. */
|
||||
framenum = cf->count + 1;
|
||||
|
||||
/* If we're not running a display filter and we're not printing any
|
||||
packet information, we don't need to do a dissection. This means
|
||||
that all packets can be marked as 'passed'. */
|
||||
passed = TRUE;
|
||||
|
||||
frame_data_init(&fdlocal, framenum, whdr, offset, cum_bytes);
|
||||
|
||||
/* If we're going to print packet information, or we're going to
|
||||
run a read filter, or display filter, or we're going to process taps, set up to
|
||||
do a dissection and do so. */
|
||||
if (edt) {
|
||||
if (gbl_resolv_flags.mac_name || gbl_resolv_flags.network_name ||
|
||||
gbl_resolv_flags.transport_name)
|
||||
/* Grab any resolved addresses */
|
||||
host_name_lookup_process();
|
||||
|
||||
/* If we're running a read filter, prime the epan_dissect_t with that
|
||||
filter. */
|
||||
if (cf->rfcode)
|
||||
epan_dissect_prime_dfilter(edt, cf->rfcode);
|
||||
|
||||
if (cf->dfcode)
|
||||
epan_dissect_prime_dfilter(edt, cf->dfcode);
|
||||
|
||||
frame_data_set_before_dissect(&fdlocal, &cf->elapsed_time,
|
||||
&ref, prev_dis);
|
||||
if (ref == &fdlocal) {
|
||||
ref_frame = fdlocal;
|
||||
ref = &ref_frame;
|
||||
}
|
||||
|
||||
epan_dissect_run(edt, cf->cd_t, whdr, frame_tvbuff_new(&fdlocal, pd), &fdlocal, NULL);
|
||||
|
||||
/* Run the read filter if we have one. */
|
||||
if (cf->rfcode)
|
||||
passed = dfilter_apply_edt(cf->rfcode, edt);
|
||||
}
|
||||
|
||||
if (passed) {
|
||||
frame_data_set_after_dissect(&fdlocal, &cum_bytes);
|
||||
prev_cap = prev_dis = frame_data_sequence_add(cf->frames, &fdlocal);
|
||||
|
||||
/* If we're not doing dissection then there won't be any dependent frames.
|
||||
* More importantly, edt.pi.dependent_frames won't be initialized because
|
||||
* epan hasn't been initialized.
|
||||
* if we *are* doing dissection, then mark the dependent frames, but only
|
||||
* if a display filter was given and it matches this packet.
|
||||
*/
|
||||
if (edt && cf->dfcode) {
|
||||
if (dfilter_apply_edt(cf->dfcode, edt)) {
|
||||
g_slist_foreach(edt->pi.dependent_frames, find_and_mark_frame_depended_upon, cf->frames);
|
||||
}
|
||||
}
|
||||
|
||||
cf->count++;
|
||||
} else {
|
||||
/* if we don't add it to the frame_data_sequence, clean it up right now
|
||||
* to avoid leaks */
|
||||
frame_data_destroy(&fdlocal);
|
||||
}
|
||||
|
||||
if (edt)
|
||||
epan_dissect_reset(edt);
|
||||
|
||||
return passed;
|
||||
}
|
||||
|
||||
|
||||
static int
|
||||
load_cap_file(capture_file *cf, int max_packet_count, gint64 max_byte_count)
|
||||
{
|
||||
int err;
|
||||
gchar *err_info = NULL;
|
||||
gint64 data_offset;
|
||||
epan_dissect_t *edt = NULL;
|
||||
|
||||
{
|
||||
/* Allocate a frame_data_sequence for all the frames. */
|
||||
cf->frames = new_frame_data_sequence();
|
||||
|
||||
{
|
||||
gboolean create_proto_tree = FALSE;
|
||||
|
||||
/* If we're going to be applying a filter, we'll need to
|
||||
create a protocol tree against which to apply the filter. */
|
||||
if (cf->rfcode || cf->dfcode)
|
||||
create_proto_tree = TRUE;
|
||||
|
||||
/* We're not going to display the protocol tree on this pass,
|
||||
so it's not going to be "visible". */
|
||||
edt = epan_dissect_new(cf->epan, create_proto_tree, FALSE);
|
||||
}
|
||||
|
||||
while (wtap_read(cf->wth, &err, &err_info, &data_offset)) {
|
||||
if (process_packet_first_pass(cf, edt, data_offset, wtap_phdr(cf->wth),
|
||||
wtap_buf_ptr(cf->wth))) {
|
||||
/* Stop reading if we have the maximum number of packets;
|
||||
* When the -c option has not been used, max_packet_count
|
||||
* starts at 0, which practically means, never stop reading.
|
||||
* (unless we roll over max_packet_count ?)
|
||||
*/
|
||||
if ( (--max_packet_count == 0) || (max_byte_count != 0 && data_offset >= max_byte_count)) {
|
||||
err = 0; /* This is not an error */
|
||||
break;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
if (edt) {
|
||||
epan_dissect_free(edt);
|
||||
edt = NULL;
|
||||
}
|
||||
|
||||
/* Close the sequential I/O side, to free up memory it requires. */
|
||||
wtap_sequential_close(cf->wth);
|
||||
|
||||
/* Allow the protocol dissectors to free up memory that they
|
||||
* don't need after the sequential run-through of the packets. */
|
||||
postseq_cleanup_all_protocols();
|
||||
|
||||
prev_dis = NULL;
|
||||
prev_cap = NULL;
|
||||
}
|
||||
|
||||
if (err != 0) {
|
||||
switch (err) {
|
||||
|
||||
case WTAP_ERR_UNSUPPORTED:
|
||||
cmdarg_err("The file \"%s\" contains record data that TShark doesn't support.\n(%s)",
|
||||
cf->filename,
|
||||
err_info != NULL ? err_info : "no information supplied");
|
||||
g_free(err_info);
|
||||
break;
|
||||
|
||||
case WTAP_ERR_SHORT_READ:
|
||||
cmdarg_err("The file \"%s\" appears to have been cut short in the middle of a packet.",
|
||||
cf->filename);
|
||||
break;
|
||||
|
||||
case WTAP_ERR_BAD_FILE:
|
||||
cmdarg_err("The file \"%s\" appears to be damaged or corrupt.\n(%s)",
|
||||
cf->filename,
|
||||
err_info != NULL ? err_info : "no information supplied");
|
||||
g_free(err_info);
|
||||
break;
|
||||
|
||||
case WTAP_ERR_DECOMPRESS:
|
||||
cmdarg_err("The compressed file \"%s\" appears to be damaged or corrupt.\n"
|
||||
"(%s)", cf->filename,
|
||||
err_info != NULL ? err_info : "no information supplied");
|
||||
g_free(err_info);
|
||||
break;
|
||||
|
||||
default:
|
||||
cmdarg_err("An error occurred while reading the file \"%s\": %s.",
|
||||
cf->filename, wtap_strerror(err));
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
return err;
|
||||
}
|
||||
|
||||
cf_status_t
|
||||
cf_open(capture_file *cf, const char *fname, unsigned int type, gboolean is_tempfile, int *err)
|
||||
{
|
||||
wtap *wth;
|
||||
gchar *err_info;
|
||||
char err_msg[2048+1];
|
||||
|
||||
wth = wtap_open_offline(fname, type, err, &err_info, TRUE);
|
||||
if (wth == NULL)
|
||||
goto fail;
|
||||
|
||||
/* The open succeeded. Fill in the information for this file. */
|
||||
|
||||
/* Create new epan session for dissection. */
|
||||
epan_free(cf->epan);
|
||||
cf->epan = sharkd_epan_new(cf);
|
||||
|
||||
cf->wth = wth;
|
||||
cf->f_datalen = 0; /* not used, but set it anyway */
|
||||
|
||||
/* Set the file name because we need it to set the follow stream filter.
|
||||
XXX - is that still true? We need it for other reasons, though,
|
||||
in any case. */
|
||||
cf->filename = g_strdup(fname);
|
||||
|
||||
/* Indicate whether it's a permanent or temporary file. */
|
||||
cf->is_tempfile = is_tempfile;
|
||||
|
||||
/* No user changes yet. */
|
||||
cf->unsaved_changes = FALSE;
|
||||
|
||||
cf->cd_t = wtap_file_type_subtype(cf->wth);
|
||||
cf->open_type = type;
|
||||
cf->count = 0;
|
||||
cf->drops_known = FALSE;
|
||||
cf->drops = 0;
|
||||
cf->snap = wtap_snapshot_length(cf->wth);
|
||||
if (cf->snap == 0) {
|
||||
/* Snapshot length not known. */
|
||||
cf->has_snap = FALSE;
|
||||
cf->snap = WTAP_MAX_PACKET_SIZE;
|
||||
} else
|
||||
cf->has_snap = TRUE;
|
||||
nstime_set_zero(&cf->elapsed_time);
|
||||
ref = NULL;
|
||||
prev_dis = NULL;
|
||||
prev_cap = NULL;
|
||||
|
||||
cf->state = FILE_READ_IN_PROGRESS;
|
||||
|
||||
wtap_set_cb_new_ipv4(cf->wth, add_ipv4_name);
|
||||
wtap_set_cb_new_ipv6(cf->wth, (wtap_new_ipv6_callback_t) add_ipv6_name);
|
||||
|
||||
return CF_OK;
|
||||
|
||||
fail:
|
||||
g_snprintf(err_msg, sizeof err_msg,
|
||||
cf_open_error_message(*err, err_info, FALSE, cf->cd_t), fname);
|
||||
cmdarg_err("%s", err_msg);
|
||||
return CF_ERROR;
|
||||
}
|
||||
|
||||
static const char *
|
||||
cf_open_error_message(int err, gchar *err_info, gboolean for_writing,
|
||||
int file_type)
|
||||
{
|
||||
const char *errmsg;
|
||||
static char errmsg_errno[1024+1];
|
||||
|
||||
if (err < 0) {
|
||||
/* Wiretap error. */
|
||||
switch (err) {
|
||||
|
||||
case WTAP_ERR_NOT_REGULAR_FILE:
|
||||
errmsg = "The file \"%s\" is a \"special file\" or socket or other non-regular file.";
|
||||
break;
|
||||
|
||||
case WTAP_ERR_RANDOM_OPEN_PIPE:
|
||||
/* Seen only when opening a capture file for reading. */
|
||||
errmsg = "The file \"%s\" is a pipe or FIFO; TShark can't read pipe or FIFO files in two-pass mode.";
|
||||
break;
|
||||
|
||||
case WTAP_ERR_FILE_UNKNOWN_FORMAT:
|
||||
/* Seen only when opening a capture file for reading. */
|
||||
errmsg = "The file \"%s\" isn't a capture file in a format TShark understands.";
|
||||
break;
|
||||
|
||||
case WTAP_ERR_UNSUPPORTED:
|
||||
/* Seen only when opening a capture file for reading. */
|
||||
g_snprintf(errmsg_errno, sizeof(errmsg_errno),
|
||||
"The file \"%%s\" contains record data that TShark doesn't support.\n"
|
||||
"(%s)",
|
||||
err_info != NULL ? err_info : "no information supplied");
|
||||
g_free(err_info);
|
||||
errmsg = errmsg_errno;
|
||||
break;
|
||||
|
||||
case WTAP_ERR_CANT_WRITE_TO_PIPE:
|
||||
/* Seen only when opening a capture file for writing. */
|
||||
g_snprintf(errmsg_errno, sizeof(errmsg_errno),
|
||||
"The file \"%%s\" is a pipe, and \"%s\" capture files can't be "
|
||||
"written to a pipe.", wtap_file_type_subtype_short_string(file_type));
|
||||
errmsg = errmsg_errno;
|
||||
break;
|
||||
|
||||
case WTAP_ERR_UNWRITABLE_FILE_TYPE:
|
||||
/* Seen only when opening a capture file for writing. */
|
||||
errmsg = "TShark doesn't support writing capture files in that format.";
|
||||
break;
|
||||
|
||||
case WTAP_ERR_UNWRITABLE_ENCAP:
|
||||
/* Seen only when opening a capture file for writing. */
|
||||
g_snprintf(errmsg_errno, sizeof(errmsg_errno),
|
||||
"TShark can't save this capture as a \"%s\" file.",
|
||||
wtap_file_type_subtype_short_string(file_type));
|
||||
errmsg = errmsg_errno;
|
||||
break;
|
||||
|
||||
case WTAP_ERR_ENCAP_PER_PACKET_UNSUPPORTED:
|
||||
if (for_writing) {
|
||||
g_snprintf(errmsg_errno, sizeof(errmsg_errno),
|
||||
"TShark can't save this capture as a \"%s\" file.",
|
||||
wtap_file_type_subtype_short_string(file_type));
|
||||
errmsg = errmsg_errno;
|
||||
} else
|
||||
errmsg = "The file \"%s\" is a capture for a network type that TShark doesn't support.";
|
||||
break;
|
||||
|
||||
case WTAP_ERR_BAD_FILE:
|
||||
/* Seen only when opening a capture file for reading. */
|
||||
g_snprintf(errmsg_errno, sizeof(errmsg_errno),
|
||||
"The file \"%%s\" appears to be damaged or corrupt.\n"
|
||||
"(%s)",
|
||||
err_info != NULL ? err_info : "no information supplied");
|
||||
g_free(err_info);
|
||||
errmsg = errmsg_errno;
|
||||
break;
|
||||
|
||||
case WTAP_ERR_CANT_OPEN:
|
||||
if (for_writing)
|
||||
errmsg = "The file \"%s\" could not be created for some unknown reason.";
|
||||
else
|
||||
errmsg = "The file \"%s\" could not be opened for some unknown reason.";
|
||||
break;
|
||||
|
||||
case WTAP_ERR_SHORT_READ:
|
||||
errmsg = "The file \"%s\" appears to have been cut short"
|
||||
" in the middle of a packet or other data.";
|
||||
break;
|
||||
|
||||
case WTAP_ERR_SHORT_WRITE:
|
||||
errmsg = "A full header couldn't be written to the file \"%s\".";
|
||||
break;
|
||||
|
||||
case WTAP_ERR_COMPRESSION_NOT_SUPPORTED:
|
||||
errmsg = "This file type cannot be written as a compressed file.";
|
||||
break;
|
||||
|
||||
case WTAP_ERR_DECOMPRESS:
|
||||
/* Seen only when opening a capture file for reading. */
|
||||
g_snprintf(errmsg_errno, sizeof(errmsg_errno),
|
||||
"The compressed file \"%%s\" appears to be damaged or corrupt.\n"
|
||||
"(%s)",
|
||||
err_info != NULL ? err_info : "no information supplied");
|
||||
g_free(err_info);
|
||||
errmsg = errmsg_errno;
|
||||
break;
|
||||
|
||||
default:
|
||||
g_snprintf(errmsg_errno, sizeof(errmsg_errno),
|
||||
"The file \"%%s\" could not be %s: %s.",
|
||||
for_writing ? "created" : "opened",
|
||||
wtap_strerror(err));
|
||||
errmsg = errmsg_errno;
|
||||
break;
|
||||
}
|
||||
} else
|
||||
errmsg = file_open_error_message(err, for_writing);
|
||||
return errmsg;
|
||||
}
|
||||
|
||||
/*
|
||||
* Open/create errors are reported with an console message in TShark.
|
||||
*/
|
||||
static void
|
||||
open_failure_message(const char *filename, int err, gboolean for_writing)
|
||||
{
|
||||
fprintf(stderr, "sharkd: ");
|
||||
fprintf(stderr, file_open_error_message(err, for_writing), filename);
|
||||
fprintf(stderr, "\n");
|
||||
}
|
||||
|
||||
/*
|
||||
* General errors are reported with an console message in TShark.
|
||||
*/
|
||||
static void
|
||||
failure_message(const char *msg_format, va_list ap)
|
||||
{
|
||||
fprintf(stderr, "sharkd: ");
|
||||
vfprintf(stderr, msg_format, ap);
|
||||
fprintf(stderr, "\n");
|
||||
}
|
||||
|
||||
/*
|
||||
* Read errors are reported with an console message in TShark.
|
||||
*/
|
||||
static void
|
||||
read_failure_message(const char *filename, int err)
|
||||
{
|
||||
cmdarg_err("An error occurred while reading from the file \"%s\": %s.",
|
||||
filename, g_strerror(err));
|
||||
}
|
||||
|
||||
/*
|
||||
* Write errors are reported with an console message in TShark.
|
||||
*/
|
||||
static void
|
||||
write_failure_message(const char *filename, int err)
|
||||
{
|
||||
cmdarg_err("An error occurred while writing to the file \"%s\": %s.",
|
||||
filename, g_strerror(err));
|
||||
}
|
||||
|
||||
/*
|
||||
* Report additional information for an error in command-line arguments.
|
||||
*/
|
||||
static void
|
||||
failure_message_cont(const char *msg_format, va_list ap)
|
||||
{
|
||||
vfprintf(stderr, msg_format, ap);
|
||||
fprintf(stderr, "\n");
|
||||
}
|
||||
|
||||
cf_status_t
|
||||
sharkd_cf_open(const char *fname, unsigned int type, gboolean is_tempfile, int *err)
|
||||
{
|
||||
return cf_open(&cfile, fname, type, is_tempfile, err);
|
||||
}
|
||||
|
||||
int
|
||||
sharkd_load_cap_file(void)
|
||||
{
|
||||
return load_cap_file(&cfile, 0, 0);
|
||||
}
|
||||
|
||||
int
|
||||
sharkd_dissect_request(unsigned int framenum, void (*cb)(packet_info *, proto_tree *, struct epan_column_info *, const GSList *, void *), int dissect_bytes, int dissect_columns, int dissect_tree, void *data)
|
||||
{
|
||||
frame_data *fdata;
|
||||
column_info *cinfo = (dissect_columns) ? &cfile.cinfo : NULL;
|
||||
epan_dissect_t edt;
|
||||
gboolean create_proto_tree;
|
||||
struct wtap_pkthdr phdr; /* Packet header */
|
||||
Buffer buf; /* Packet data */
|
||||
|
||||
int err;
|
||||
char *err_info = NULL;
|
||||
|
||||
fdata = frame_data_sequence_find(cfile.frames, framenum);
|
||||
if (fdata == NULL)
|
||||
return -1;
|
||||
|
||||
wtap_phdr_init(&phdr);
|
||||
ws_buffer_init(&buf, 1500);
|
||||
|
||||
if (!wtap_seek_read(cfile.wth, fdata->file_off, &phdr, &buf, &err, &err_info)) {
|
||||
ws_buffer_free(&buf);
|
||||
return -1; /* error reading the record */
|
||||
}
|
||||
|
||||
create_proto_tree = (dissect_tree) || (cinfo && have_custom_cols(cinfo));
|
||||
epan_dissect_init(&edt, cfile.epan, create_proto_tree, dissect_tree);
|
||||
|
||||
if (cinfo)
|
||||
col_custom_prime_edt(&edt, cinfo);
|
||||
|
||||
/*
|
||||
* XXX - need to catch an OutOfMemoryError exception and
|
||||
* attempt to recover from it.
|
||||
*/
|
||||
epan_dissect_run(&edt, cfile.cd_t, &phdr, frame_tvbuff_new_buffer(fdata, &buf), fdata, cinfo);
|
||||
|
||||
if (cinfo) {
|
||||
/* "Stringify" non frame_data vals */
|
||||
epan_dissect_fill_in_columns(&edt, FALSE, TRUE/* fill_fd_columns */);
|
||||
}
|
||||
|
||||
cb(&edt.pi, dissect_tree ? edt.tree : NULL, cinfo, dissect_bytes ? edt.pi.data_src : NULL, data);
|
||||
|
||||
epan_dissect_cleanup(&edt);
|
||||
wtap_phdr_cleanup(&phdr);
|
||||
ws_buffer_free(&buf);
|
||||
return 0;
|
||||
}
|
||||
|
||||
/* based on packet_list_dissect_and_cache_record */
|
||||
int
|
||||
sharkd_dissect_columns(int framenum, column_info *cinfo, gboolean dissect_color)
|
||||
{
|
||||
frame_data *fdata;
|
||||
epan_dissect_t edt;
|
||||
gboolean create_proto_tree;
|
||||
struct wtap_pkthdr phdr; /* Packet header */
|
||||
Buffer buf; /* Packet data */
|
||||
|
||||
int err;
|
||||
char *err_info = NULL;
|
||||
|
||||
fdata = frame_data_sequence_find(cfile.frames, framenum);
|
||||
if (fdata == NULL) {
|
||||
col_fill_in_error(cinfo, fdata, FALSE, TRUE/* fill_fd_columns */);
|
||||
return -1; /* error reading the record */
|
||||
}
|
||||
|
||||
wtap_phdr_init(&phdr);
|
||||
ws_buffer_init(&buf, 1500);
|
||||
|
||||
if (!wtap_seek_read(cfile.wth, fdata->file_off, &phdr, &buf, &err, &err_info)) {
|
||||
col_fill_in_error(cinfo, fdata, FALSE, FALSE /* fill_fd_columns */);
|
||||
ws_buffer_free(&buf);
|
||||
return -1; /* error reading the record */
|
||||
}
|
||||
|
||||
create_proto_tree = (dissect_color && color_filters_used()) || (cinfo && have_custom_cols(cinfo));
|
||||
|
||||
epan_dissect_init(&edt, cfile.epan, create_proto_tree, FALSE /* proto_tree_visible */);
|
||||
|
||||
if (dissect_color) {
|
||||
color_filters_prime_edt(&edt);
|
||||
fdata->flags.need_colorize = 1;
|
||||
}
|
||||
|
||||
if (cinfo)
|
||||
col_custom_prime_edt(&edt, cinfo);
|
||||
|
||||
/*
|
||||
* XXX - need to catch an OutOfMemoryError exception and
|
||||
* attempt to recover from it.
|
||||
*/
|
||||
epan_dissect_run(&edt, cfile.cd_t, &phdr, frame_tvbuff_new_buffer(fdata, &buf), fdata, cinfo);
|
||||
|
||||
if (cinfo) {
|
||||
/* "Stringify" non frame_data vals */
|
||||
epan_dissect_fill_in_columns(&edt, FALSE, TRUE/* fill_fd_columns */);
|
||||
}
|
||||
|
||||
epan_dissect_cleanup(&edt);
|
||||
wtap_phdr_cleanup(&phdr);
|
||||
ws_buffer_free(&buf);
|
||||
return 0;
|
||||
}
|
||||
|
||||
int
|
||||
sharkd_retap(void)
|
||||
{
|
||||
guint32 framenum;
|
||||
frame_data *fdata;
|
||||
Buffer buf;
|
||||
struct wtap_pkthdr phdr;
|
||||
int err;
|
||||
char *err_info = NULL;
|
||||
|
||||
gboolean filtering_tap_listeners;
|
||||
guint tap_flags;
|
||||
gboolean construct_protocol_tree;
|
||||
epan_dissect_t edt;
|
||||
column_info *cinfo;
|
||||
|
||||
filtering_tap_listeners = have_filtering_tap_listeners();
|
||||
tap_flags = union_of_tap_listener_flags();
|
||||
|
||||
construct_protocol_tree = filtering_tap_listeners || (tap_flags & TL_REQUIRES_PROTO_TREE);
|
||||
cinfo = (tap_flags & TL_REQUIRES_COLUMNS) ? &cfile.cinfo : NULL;
|
||||
|
||||
wtap_phdr_init(&phdr);
|
||||
ws_buffer_init(&buf, 1500);
|
||||
epan_dissect_init(&edt, cfile.epan, construct_protocol_tree, FALSE);
|
||||
|
||||
reset_tap_listeners();
|
||||
|
||||
for (framenum = 1; framenum <= cfile.count; framenum++) {
|
||||
fdata = frame_data_sequence_find(cfile.frames, framenum);
|
||||
|
||||
if (!wtap_seek_read(cfile.wth, fdata->file_off, &phdr, &buf, &err, &err_info))
|
||||
break;
|
||||
|
||||
epan_dissect_run_with_taps(&edt, cfile.cd_t, &phdr, frame_tvbuff_new(fdata, ws_buffer_start_ptr(&buf)), fdata, cinfo);
|
||||
epan_dissect_reset(&edt);
|
||||
}
|
||||
|
||||
wtap_phdr_cleanup(&phdr);
|
||||
ws_buffer_free(&buf);
|
||||
epan_dissect_cleanup(&edt);
|
||||
|
||||
draw_tap_listeners(TRUE);
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
int
|
||||
sharkd_filter(const char *dftext, guint8 **result)
|
||||
{
|
||||
dfilter_t *dfcode = NULL;
|
||||
|
||||
guint32 framenum;
|
||||
guint32 frames_count;
|
||||
Buffer buf;
|
||||
struct wtap_pkthdr phdr;
|
||||
int err;
|
||||
char *err_info = NULL;
|
||||
|
||||
guint8 *result_bits;
|
||||
guint8 passed_bits;
|
||||
|
||||
epan_dissect_t edt;
|
||||
|
||||
if (!dfilter_compile(dftext, &dfcode, &err_info)) {
|
||||
g_free(err_info);
|
||||
return -1;
|
||||
}
|
||||
|
||||
frames_count = cfile.count;
|
||||
|
||||
wtap_phdr_init(&phdr);
|
||||
ws_buffer_init(&buf, 1500);
|
||||
epan_dissect_init(&edt, cfile.epan, TRUE, FALSE);
|
||||
|
||||
passed_bits = 0;
|
||||
result_bits = (guint8 *) g_malloc(2 + (frames_count / 8));
|
||||
|
||||
for (framenum = 1; framenum <= frames_count; framenum++) {
|
||||
frame_data *fdata = frame_data_sequence_find(cfile.frames, framenum);
|
||||
|
||||
if ((framenum & 7) == 0) {
|
||||
result_bits[(framenum / 8) - 1] = passed_bits;
|
||||
passed_bits = 0;
|
||||
}
|
||||
|
||||
if (!wtap_seek_read(cfile.wth, fdata->file_off, &phdr, &buf, &err, &err_info))
|
||||
break;
|
||||
|
||||
/* frame_data_set_before_dissect */
|
||||
epan_dissect_prime_dfilter(&edt, dfcode);
|
||||
|
||||
epan_dissect_run(&edt, cfile.cd_t, &phdr, frame_tvbuff_new_buffer(fdata, &buf), fdata, NULL);
|
||||
|
||||
if (dfilter_apply_edt(dfcode, &edt))
|
||||
passed_bits |= (1 << (framenum % 8));
|
||||
|
||||
/* if passed or ref -> frame_data_set_after_dissect */
|
||||
|
||||
epan_dissect_reset(&edt);
|
||||
}
|
||||
|
||||
if ((framenum & 7) == 0)
|
||||
framenum--;
|
||||
result_bits[framenum / 8] = passed_bits;
|
||||
|
||||
wtap_phdr_cleanup(&phdr);
|
||||
ws_buffer_free(&buf);
|
||||
epan_dissect_cleanup(&edt);
|
||||
|
||||
dfilter_free(dfcode);
|
||||
|
||||
*result = result_bits;
|
||||
|
||||
return framenum;
|
||||
}
|
||||
|
||||
#include "version.h"
|
||||
const char *sharkd_version(void)
|
||||
{
|
||||
/* based on get_ws_vcs_version_info(), but shorter */
|
||||
#ifdef VCSVERSION
|
||||
return VCSVERSION;
|
||||
#else
|
||||
return VERSION;
|
||||
#endif
|
||||
}
|
||||
|
||||
/*
|
||||
* Editor modelines - https://www.wireshark.org/tools/modelines.html
|
||||
*
|
||||
* Local variables:
|
||||
* c-basic-offset: 2
|
||||
* tab-width: 8
|
||||
* indent-tabs-mode: nil
|
||||
* End:
|
||||
*
|
||||
* vi: set shiftwidth=2 tabstop=8 expandtab:
|
||||
* :indentSize=2:tabSize=8:noTabs=true:
|
||||
*/
|
|
@ -0,0 +1,60 @@
|
|||
/* sharkd.h
|
||||
*
|
||||
* Copyright (C) 2016 Jakub Zawadzki
|
||||
*
|
||||
* Wireshark - Network traffic analyzer
|
||||
* By Gerald Combs <gerald@wireshark.org>
|
||||
* Copyright 1998 Gerald Combs
|
||||
*
|
||||
* This program is free software; you can redistribute it and/or
|
||||
* modify it under the terms of the GNU General Public License
|
||||
* as published by the Free Software Foundation; either version 2
|
||||
* of the License, or (at your option) any later version.
|
||||
*
|
||||
* This program is distributed in the hope that it will be useful,
|
||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
* GNU General Public License for more details.
|
||||
*
|
||||
* You should have received a copy of the GNU General Public License
|
||||
* along with this program; if not, write to the Free Software
|
||||
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
|
||||
*/
|
||||
|
||||
#ifndef __SHARKD_H
|
||||
#define __SHARKD_H
|
||||
|
||||
#include <file.h>
|
||||
|
||||
/* sharkd.c */
|
||||
cf_status_t sharkd_cf_open(const char *fname, unsigned int type, gboolean is_tempfile, int *err);
|
||||
int sharkd_load_cap_file(void);
|
||||
int sharkd_retap(void);
|
||||
int sharkd_filter(const char *dftext, guint8 **result);
|
||||
int sharkd_dissect_columns(int framenum, column_info *cinfo, gboolean dissect_color);
|
||||
int sharkd_dissect_request(unsigned int framenum, void (*cb)(packet_info *, proto_tree *, struct epan_column_info *, const GSList *, void *), int dissect_bytes, int dissect_columns, int dissect_tree, void *data);
|
||||
const char *sharkd_version(void);
|
||||
|
||||
extern capture_file cfile;
|
||||
|
||||
/* sharkd_daemon.c */
|
||||
int sharkd_init(int argc, char **argv);
|
||||
int sharkd_loop(void);
|
||||
|
||||
/* sharkd_session.c */
|
||||
int sharkd_session_main(void);
|
||||
|
||||
#endif /* __SHARKD_H */
|
||||
|
||||
/*
|
||||
* Editor modelines - http://www.wireshark.org/tools/modelines.html
|
||||
*
|
||||
* Local variables:
|
||||
* c-basic-offset: 8
|
||||
* tab-width: 8
|
||||
* indent-tabs-mode: t
|
||||
* End:
|
||||
*
|
||||
* vi: set shiftwidth=8 tabstop=8 noexpandtab:
|
||||
* :indentSize=8:tabSize=8:noTabs=false:
|
||||
*/
|
|
@ -0,0 +1,223 @@
|
|||
/* sharkd_daemon.c
|
||||
*
|
||||
* Copyright (C) 2016 Jakub Zawadzki
|
||||
*
|
||||
* Wireshark - Network traffic analyzer
|
||||
* By Gerald Combs <gerald@wireshark.org>
|
||||
* Copyright 1998 Gerald Combs
|
||||
*
|
||||
* This program is free software; you can redistribute it and/or
|
||||
* modify it under the terms of the GNU General Public License
|
||||
* as published by the Free Software Foundation; either version 2
|
||||
* of the License, or (at your option) any later version.
|
||||
*
|
||||
* This program is distributed in the hope that it will be useful,
|
||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
* GNU General Public License for more details.
|
||||
*
|
||||
* You should have received a copy of the GNU General Public License
|
||||
* along with this program; if not, write to the Free Software
|
||||
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
|
||||
*/
|
||||
|
||||
#include <config.h>
|
||||
|
||||
#include <glib.h>
|
||||
|
||||
#include <stdio.h>
|
||||
#include <errno.h>
|
||||
#include <stddef.h>
|
||||
#include <stdlib.h>
|
||||
#include <signal.h>
|
||||
#include <unistd.h>
|
||||
|
||||
#include <sys/socket.h>
|
||||
#include <sys/un.h>
|
||||
#include <netinet/in.h>
|
||||
#include <netinet/tcp.h>
|
||||
#include <arpa/inet.h>
|
||||
|
||||
#include <wsutil/strtoi.h>
|
||||
|
||||
#include "sharkd.h"
|
||||
|
||||
static int _server_fd = -1;
|
||||
|
||||
static int
|
||||
socket_init(char *path)
|
||||
{
|
||||
int fd = -1;
|
||||
|
||||
if (!strncmp(path, "unix:", 5))
|
||||
{
|
||||
struct sockaddr_un s_un;
|
||||
size_t s_un_len;
|
||||
|
||||
path += 5;
|
||||
|
||||
if (strlen(path) + 1 > sizeof(s_un.sun_path))
|
||||
return -1;
|
||||
|
||||
fd = socket(AF_UNIX, SOCK_STREAM, 0);
|
||||
if (fd == -1)
|
||||
return -1;
|
||||
|
||||
memset(&s_un, 0, sizeof(s_un));
|
||||
s_un.sun_family = AF_UNIX;
|
||||
g_strlcpy(s_un.sun_path, path, sizeof(s_un.sun_path));
|
||||
|
||||
s_un_len = offsetof(struct sockaddr_un, sun_path) + strlen(s_un.sun_path);
|
||||
|
||||
if (s_un.sun_path[0] == '@')
|
||||
s_un.sun_path[0] = '\0';
|
||||
|
||||
if (bind(fd, (struct sockaddr *) &s_un, s_un_len))
|
||||
{
|
||||
close(fd);
|
||||
return -1;
|
||||
}
|
||||
|
||||
}
|
||||
#ifdef SHARKD_TCP_SUPPORT
|
||||
else if (!strncmp(path, "tcp:", 4))
|
||||
{
|
||||
struct sockaddr_in s_in;
|
||||
int one = 1;
|
||||
char *port_sep;
|
||||
guint16 port;
|
||||
|
||||
path += 4;
|
||||
|
||||
port_sep = strchr(path, ':');
|
||||
if (!port_sep)
|
||||
return -1;
|
||||
|
||||
*port_sep = '\0';
|
||||
|
||||
if (ws_strtou16(port_sep + 1, NULL, &port) == FALSE)
|
||||
return -1;
|
||||
|
||||
fd = socket(AF_INET, SOCK_STREAM, 0);
|
||||
if (fd == -1)
|
||||
return -1;
|
||||
|
||||
s_in.sin_family = AF_INET;
|
||||
s_in.sin_addr.s_addr = inet_addr(path);
|
||||
s_in.sin_port = g_htons(port);
|
||||
*port_sep = ':';
|
||||
|
||||
setsockopt(fd, SOL_SOCKET, SO_REUSEADDR, &one, sizeof(one));
|
||||
|
||||
if (bind(fd, (struct sockaddr *) &s_in, sizeof(struct sockaddr_in)))
|
||||
{
|
||||
close(fd);
|
||||
return -1;
|
||||
}
|
||||
}
|
||||
#endif
|
||||
else
|
||||
{
|
||||
return -1;
|
||||
}
|
||||
|
||||
if (listen(fd, SOMAXCONN))
|
||||
{
|
||||
close(fd);
|
||||
return -1;
|
||||
}
|
||||
|
||||
return fd;
|
||||
}
|
||||
|
||||
int
|
||||
sharkd_init(int argc, char **argv)
|
||||
{
|
||||
int fd;
|
||||
pid_t pid;
|
||||
|
||||
if (argc != 2)
|
||||
{
|
||||
fprintf(stderr, "Usage: %s <socket>\n", argv[0]);
|
||||
fprintf(stderr, "\n");
|
||||
|
||||
fprintf(stderr, "<socket> examples:\n");
|
||||
fprintf(stderr, " - unix:/tmp/sharkd.sock - listen on unix file /tmp/sharkd.sock\n");
|
||||
#ifdef SHARKD_TCP_SUPPORT
|
||||
fprintf(stderr, " - tcp:127.0.0.1:4446 - listen on TCP port 4446\n");
|
||||
#endif
|
||||
fprintf(stderr, "\n");
|
||||
return -1;
|
||||
}
|
||||
|
||||
signal(SIGCHLD, SIG_IGN);
|
||||
|
||||
fd = socket_init(argv[1]);
|
||||
if (fd == -1)
|
||||
return -1;
|
||||
|
||||
/* all good - try to daemonize */
|
||||
pid = fork();
|
||||
if (pid == -1)
|
||||
fprintf(stderr, "cannot go to background fork() failed: %s\n", g_strerror(errno));
|
||||
|
||||
if (pid != 0)
|
||||
{
|
||||
/* parent */
|
||||
exit(0);
|
||||
}
|
||||
|
||||
_server_fd = fd;
|
||||
return 0;
|
||||
}
|
||||
|
||||
int
|
||||
sharkd_loop(void)
|
||||
{
|
||||
while (1)
|
||||
{
|
||||
int fd;
|
||||
pid_t pid;
|
||||
|
||||
fd = accept(_server_fd, NULL, NULL);
|
||||
if (fd == -1)
|
||||
{
|
||||
fprintf(stderr, "cannot accept(): %s\n", g_strerror(errno));
|
||||
continue;
|
||||
}
|
||||
|
||||
/* wireshark is not ready for handling multiple capture files in single process, so fork(), and handle it in seperate process */
|
||||
pid = fork();
|
||||
if (pid == 0)
|
||||
{
|
||||
/* redirect stdin, stdout to socket */
|
||||
dup2(fd, 0);
|
||||
dup2(fd, 1);
|
||||
close(fd);
|
||||
|
||||
exit(sharkd_session_main());
|
||||
}
|
||||
|
||||
if (pid == -1)
|
||||
{
|
||||
fprintf(stderr, "cannot fork(): %s\n", g_strerror(errno));
|
||||
}
|
||||
|
||||
close(fd);
|
||||
}
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
/*
|
||||
* Editor modelines - http://www.wireshark.org/tools/modelines.html
|
||||
*
|
||||
* Local variables:
|
||||
* c-basic-offset: 8
|
||||
* tab-width: 8
|
||||
* indent-tabs-mode: t
|
||||
* End:
|
||||
*
|
||||
* vi: set shiftwidth=8 tabstop=8 noexpandtab:
|
||||
* :indentSize=8:tabSize=8:noTabs=false:
|
||||
*/
|
File diff suppressed because it is too large
Load Diff
|
@ -23,6 +23,8 @@
|
|||
*/
|
||||
|
||||
#include "wsjsmn.h"
|
||||
|
||||
#include <string.h>
|
||||
#include <wsutil/jsmn.h>
|
||||
#include "log.h"
|
||||
|
||||
|
@ -66,6 +68,14 @@ gboolean jsmn_is_json(const guint8* buf, const size_t len)
|
|||
return ret;
|
||||
}
|
||||
|
||||
int wsjsmn_parse(const char *buf, jsmntok_t *tokens, unsigned int max_tokens)
|
||||
{
|
||||
jsmn_parser p;
|
||||
|
||||
jsmn_init(&p);
|
||||
return jsmn_parse(&p, buf, strlen(buf), tokens, max_tokens);
|
||||
}
|
||||
|
||||
/*
|
||||
* Editor modelines - https://www.wireshark.org/tools/modelines.html
|
||||
*
|
||||
|
|
|
@ -28,6 +28,8 @@
|
|||
#include "ws_symbol_export.h"
|
||||
#include <glib.h>
|
||||
|
||||
#include "jsmn.h"
|
||||
|
||||
#ifdef __cplusplus
|
||||
extern "C" {
|
||||
#endif
|
||||
|
@ -37,6 +39,8 @@ extern "C" {
|
|||
*/
|
||||
WS_DLL_PUBLIC gboolean jsmn_is_json(const guint8* buf, const size_t len);
|
||||
|
||||
WS_DLL_PUBLIC int wsjsmn_parse(const char *buf, jsmntok_t *tokens, unsigned int max_tokens);
|
||||
|
||||
#ifdef __cplusplus
|
||||
}
|
||||
#endif
|
||||
|
|
Loading…
Reference in New Issue