6cbf6ce16c
by the gunzipping code. Have it also supply a err_info string, and report it. Have file_error() supply an err_info string. Put "the file" - or, for WTAP_ERR_DECOMPRESS, "the compressed file", to suggest a decompression error - into the rawshark and tshark errors, along the lines of what other programs print. Fix a case in the Netscaler code where we weren't fetching the error code on a read failure. svn path=/trunk/; revision=36748
256 lines
7.1 KiB
C
256 lines
7.1 KiB
C
/* csids.c
|
|
*
|
|
* $Id$
|
|
*
|
|
* Copyright (c) 2000 by Mike Hall <mlh@io.com>
|
|
* Copyright (c) 2000 by Cisco Systems
|
|
*
|
|
* This program is free software; you can redistribute it and/or
|
|
* modify it under the terms of the GNU General Public License
|
|
* as published by the Free Software Foundation; either version 2
|
|
* of the License, or (at your option) any later version.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with this program; if not, write to the Free Software
|
|
* Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
|
|
*/
|
|
|
|
#ifdef HAVE_CONFIG_H
|
|
#include "config.h"
|
|
#endif
|
|
#include "wtap-int.h"
|
|
#include "buffer.h"
|
|
#include "csids.h"
|
|
#include "file_wrappers.h"
|
|
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
|
|
/*
|
|
* This module reads the output from the Cisco Secure Intrustion Detection
|
|
* System iplogging facility. The term iplogging is misleading since this
|
|
* logger will only output TCP. There is no link layer information.
|
|
* Packet format is 4 byte timestamp (seconds since epoch), and a 4 byte size
|
|
* of data following for that packet.
|
|
*
|
|
* For a time there was an error in iplogging and the ip length, flags, and id
|
|
* were byteswapped. We will check for this and handle it before handing to
|
|
* wireshark.
|
|
*/
|
|
|
|
static gboolean csids_read(wtap *wth, int *err, gchar **err_info,
|
|
gint64 *data_offset);
|
|
static gboolean csids_seek_read(wtap *wth, gint64 seek_off,
|
|
union wtap_pseudo_header *pseudo_header, guint8 *pd, int len,
|
|
int *err, gchar **err_info);
|
|
|
|
struct csids_header {
|
|
guint32 seconds; /* seconds since epoch */
|
|
guint16 zeropad; /* 2 byte zero'ed pads */
|
|
guint16 caplen; /* the capture length */
|
|
};
|
|
|
|
typedef struct {
|
|
gboolean byteswapped;
|
|
} csids_t;
|
|
|
|
/* XXX - return -1 on I/O error and actually do something with 'err'. */
|
|
int csids_open(wtap *wth, int *err, gchar **err_info)
|
|
{
|
|
/* There is no file header. There is only a header for each packet
|
|
* so we read a packet header and compare the caplen with iplen. They
|
|
* should always be equal except with the wierd byteswap version.
|
|
*
|
|
* THIS IS BROKEN-- anytime the caplen is 0x0101 or 0x0202 up to 0x0505
|
|
* this will byteswap it. I need to fix this. XXX --mlh
|
|
*/
|
|
|
|
int tmp,iplen,bytesRead;
|
|
|
|
gboolean byteswap = FALSE;
|
|
struct csids_header hdr;
|
|
csids_t *csids;
|
|
|
|
/* check the file to make sure it is a csids file. */
|
|
bytesRead = file_read( &hdr, sizeof( struct csids_header), wth->fh );
|
|
if( bytesRead != sizeof( struct csids_header) ) {
|
|
*err = file_error( wth->fh, err_info );
|
|
if( *err != 0 ) {
|
|
return -1;
|
|
} else {
|
|
return 0;
|
|
}
|
|
}
|
|
if( hdr.zeropad != 0 || hdr.caplen == 0 ) {
|
|
return 0;
|
|
}
|
|
hdr.seconds = pntohl( &hdr.seconds );
|
|
hdr.caplen = pntohs( &hdr.caplen );
|
|
bytesRead = file_read( &tmp, 2, wth->fh );
|
|
if( bytesRead != 2 ) {
|
|
*err = file_error( wth->fh, err_info );
|
|
if( *err != 0 ) {
|
|
return -1;
|
|
} else {
|
|
return 0;
|
|
}
|
|
}
|
|
bytesRead = file_read( &iplen, 2, wth->fh );
|
|
if( bytesRead != 2 ) {
|
|
*err = file_error( wth->fh, err_info );
|
|
if( *err != 0 ) {
|
|
return -1;
|
|
} else {
|
|
return 0;
|
|
}
|
|
}
|
|
iplen = pntohs(&iplen);
|
|
|
|
if ( iplen == 0 )
|
|
return(0);
|
|
|
|
/* if iplen and hdr.caplen are equal, default to no byteswap. */
|
|
if( iplen > hdr.caplen ) {
|
|
/* maybe this is just a byteswapped version. the iplen ipflags */
|
|
/* and ipid are swapped. We cannot use the normal swaps because */
|
|
/* we don't know the host */
|
|
iplen = BSWAP16(iplen);
|
|
if( iplen <= hdr.caplen ) {
|
|
/* we know this format */
|
|
byteswap = TRUE;
|
|
} else {
|
|
/* don't know this one */
|
|
return 0;
|
|
}
|
|
} else {
|
|
byteswap = FALSE;
|
|
}
|
|
|
|
/* no file header. So reset the fh to 0 so we can read the first packet */
|
|
if (file_seek(wth->fh, 0, SEEK_SET, err) == -1)
|
|
return -1;
|
|
|
|
wth->data_offset = 0;
|
|
csids = (csids_t *)g_malloc(sizeof(csids_t));
|
|
wth->priv = (void *)csids;
|
|
csids->byteswapped = byteswap;
|
|
wth->file_encap = WTAP_ENCAP_RAW_IP;
|
|
wth->file_type = WTAP_FILE_CSIDS;
|
|
wth->snapshot_length = 0; /* not known */
|
|
wth->subtype_read = csids_read;
|
|
wth->subtype_seek_read = csids_seek_read;
|
|
wth->tsprecision = WTAP_FILE_TSPREC_SEC;
|
|
|
|
return 1;
|
|
}
|
|
|
|
/* Find the next packet and parse it; called from wtap_read(). */
|
|
static gboolean csids_read(wtap *wth, int *err, gchar **err_info,
|
|
gint64 *data_offset)
|
|
{
|
|
csids_t *csids = (csids_t *)wth->priv;
|
|
guint8 *buf;
|
|
int bytesRead = 0;
|
|
struct csids_header hdr;
|
|
|
|
*data_offset = wth->data_offset;
|
|
|
|
bytesRead = file_read( &hdr, sizeof( struct csids_header) , wth->fh );
|
|
if( bytesRead != sizeof( struct csids_header) ) {
|
|
*err = file_error( wth->fh, err_info );
|
|
if (*err == 0 && bytesRead != 0)
|
|
*err = WTAP_ERR_SHORT_READ;
|
|
return FALSE;
|
|
}
|
|
hdr.seconds = pntohl(&hdr.seconds);
|
|
hdr.caplen = pntohs(&hdr.caplen);
|
|
|
|
wth->data_offset += sizeof( struct csids_header );
|
|
|
|
/* Make sure we have enough room for the packet */
|
|
buffer_assure_space(wth->frame_buffer, hdr.caplen);
|
|
buf = buffer_start_ptr(wth->frame_buffer);
|
|
|
|
bytesRead = file_read( buf, hdr.caplen, wth->fh );
|
|
if( bytesRead != hdr.caplen ) {
|
|
*err = file_error( wth->fh, err_info );
|
|
if (*err == 0)
|
|
*err = WTAP_ERR_SHORT_READ;
|
|
return FALSE;
|
|
}
|
|
|
|
wth->data_offset += hdr.caplen;
|
|
|
|
wth->phdr.len = hdr.caplen;
|
|
wth->phdr.caplen = hdr.caplen;
|
|
wth->phdr.ts.secs = hdr.seconds;
|
|
wth->phdr.ts.nsecs = 0;
|
|
|
|
if( csids->byteswapped ) {
|
|
PBSWAP16(buf); /* the ip len */
|
|
PBSWAP16(buf+2); /* ip id */
|
|
PBSWAP16(buf+4); /* ip flags and fragoff */
|
|
}
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
/* Used to read packets in random-access fashion */
|
|
static gboolean
|
|
csids_seek_read (wtap *wth,
|
|
gint64 seek_off,
|
|
union wtap_pseudo_header *pseudo_header _U_,
|
|
guint8 *pd,
|
|
int len,
|
|
int *err,
|
|
gchar **err_info)
|
|
{
|
|
csids_t *csids = (csids_t *)wth->priv;
|
|
int bytesRead;
|
|
struct csids_header hdr;
|
|
|
|
if( file_seek( wth->random_fh, seek_off, SEEK_SET, err ) == -1 )
|
|
return FALSE;
|
|
|
|
bytesRead = file_read( &hdr, sizeof( struct csids_header), wth->random_fh );
|
|
if( bytesRead != sizeof( struct csids_header) ) {
|
|
*err = file_error( wth->random_fh, err_info );
|
|
if( *err == 0 ) {
|
|
*err = WTAP_ERR_SHORT_READ;
|
|
}
|
|
return FALSE;
|
|
}
|
|
hdr.seconds = pntohl(&hdr.seconds);
|
|
hdr.caplen = pntohs(&hdr.caplen);
|
|
|
|
if( len != hdr.caplen ) {
|
|
*err = WTAP_ERR_BAD_RECORD;
|
|
*err_info = g_strdup_printf("csids: record length %u doesn't match requested length %d",
|
|
hdr.caplen, len);
|
|
return FALSE;
|
|
}
|
|
|
|
bytesRead = file_read( pd, hdr.caplen, wth->random_fh );
|
|
if( bytesRead != hdr.caplen ) {
|
|
*err = file_error( wth->random_fh, err_info );
|
|
if( *err == 0 ) {
|
|
*err = WTAP_ERR_SHORT_READ;
|
|
}
|
|
return FALSE;
|
|
}
|
|
|
|
if( csids->byteswapped ) {
|
|
PBSWAP16(pd); /* the ip len */
|
|
PBSWAP16(pd+2); /* ip id */
|
|
PBSWAP16(pd+4); /* ip flags and fragoff */
|
|
}
|
|
|
|
return TRUE;
|
|
}
|