20800366dd
Change all wireshark.org URLs to use https. Fix some broken links while we're at it. Change-Id: I161bf8eeca43b8027605acea666032da86f5ea1c Reviewed-on: https://code.wireshark.org/review/34089 Reviewed-by: Guy Harris <guy@alum.mit.edu>
2775 lines
110 KiB
C
2775 lines
110 KiB
C
/* androiddump.c
|
|
* androiddump is extcap tool used to capture Android specific stuff
|
|
*
|
|
* Copyright 2015, Michal Labedzki for Tieto Corporation
|
|
*
|
|
* Wireshark - Network traffic analyzer
|
|
* By Gerald Combs <gerald@wireshark.org>
|
|
* Copyright 1998 Gerald Combs
|
|
*
|
|
* SPDX-License-Identifier: GPL-2.0-or-later
|
|
*/
|
|
#include "config.h"
|
|
|
|
#include "extcap-base.h"
|
|
|
|
#include <stdio.h>
|
|
#include <stdint.h>
|
|
#include <string.h>
|
|
#include <errno.h>
|
|
#include <time.h>
|
|
#include <wsutil/strtoi.h>
|
|
#include <wsutil/filesystem.h>
|
|
#include <wsutil/privileges.h>
|
|
#include <wsutil/please_report_bug.h>
|
|
#include <ui/cmdarg_err.h>
|
|
#include <wsutil/inet_addr.h>
|
|
|
|
#include "ui/failure_message.h"
|
|
|
|
#ifdef HAVE_NETINET_IN_H
|
|
# include <netinet/in.h>
|
|
#endif
|
|
|
|
#ifdef HAVE_UNISTD_H
|
|
#include <unistd.h>
|
|
#endif
|
|
|
|
#ifdef HAVE_SYS_SOCKET_H
|
|
#include <sys/socket.h>
|
|
#endif
|
|
|
|
#ifdef HAVE_ARPA_INET_H
|
|
#include <arpa/inet.h>
|
|
#endif
|
|
|
|
#ifdef HAVE_SYS_TIME_H
|
|
#include <sys/time.h>
|
|
#endif
|
|
|
|
/* Configuration options */
|
|
/* #define ANDROIDDUMP_USE_LIBPCAP */
|
|
|
|
#define PCAP_GLOBAL_HEADER_LENGTH 24
|
|
#define PCAP_RECORD_HEADER_LENGTH 16
|
|
|
|
#ifdef ANDROIDDUMP_USE_LIBPCAP
|
|
#include "wspcap.h"
|
|
#include <pcap-bpf.h>
|
|
#include <pcap/bluetooth.h>
|
|
|
|
#ifndef DLT_BLUETOOTH_H4_WITH_PHDR
|
|
#define DLT_BLUETOOTH_H4_WITH_PHDR 201
|
|
#endif
|
|
|
|
#ifndef DLT_WIRESHARK_UPPER_PDU
|
|
#define DLT_WIRESHARK_UPPER_PDU 252
|
|
#endif
|
|
|
|
#ifndef PCAP_TSTAMP_PRECISION_MICRO
|
|
#define PCAP_TSTAMP_PRECISION_MICRO 0
|
|
#endif
|
|
|
|
#ifndef PCAP_TSTAMP_PRECISION_NANO
|
|
#define PCAP_TSTAMP_PRECISION_NANO 1
|
|
#endif
|
|
#else
|
|
#include "wiretap/wtap.h"
|
|
#include "wiretap/pcap-encap.h"
|
|
#endif
|
|
|
|
#include <cli_main.h>
|
|
|
|
#ifdef ANDROIDDUMP_USE_LIBPCAP
|
|
#define EXTCAP_ENCAP_BLUETOOTH_H4_WITH_PHDR DLT_BLUETOOTH_H4_WITH_PHDR
|
|
#define EXTCAP_ENCAP_WIRESHARK_UPPER_PDU DLT_WIRESHARK_UPPER_PDU
|
|
#define EXTCAP_ENCAP_ETHERNET DLT_EN10MB
|
|
#define EXTCAP_ENCAP_LINUX_SLL DLT_LINUX_SLL
|
|
#define EXTCAP_ENCAP_IEEE802_11_RADIO DLT_IEEE802_11_RADIO
|
|
#define EXTCAP_ENCAP_NETLINK DLT_NETLINK
|
|
#else
|
|
#define EXTCAP_ENCAP_BLUETOOTH_H4_WITH_PHDR WTAP_ENCAP_BLUETOOTH_H4_WITH_PHDR
|
|
#define EXTCAP_ENCAP_WIRESHARK_UPPER_PDU WTAP_ENCAP_WIRESHARK_UPPER_PDU
|
|
#define EXTCAP_ENCAP_ETHERNET WTAP_ENCAP_ETHERNET
|
|
#define EXTCAP_ENCAP_LINUX_SLL WTAP_ENCAP_SLL
|
|
#define EXTCAP_ENCAP_IEEE802_11_RADIO WTAP_ENCAP_IEEE_802_11_RADIOTAP
|
|
#define EXTCAP_ENCAP_NETLINK WTAP_ENCAP_NETLINK
|
|
#endif
|
|
|
|
#define WIRESHARK_UPPER_PDU_TAG_DISSECTOR_NAME 0x000C
|
|
|
|
#define INTERFACE_ANDROID_LOGCAT_MAIN "android-logcat-main"
|
|
#define INTERFACE_ANDROID_LOGCAT_SYSTEM "android-logcat-system"
|
|
#define INTERFACE_ANDROID_LOGCAT_RADIO "android-logcat-radio"
|
|
#define INTERFACE_ANDROID_LOGCAT_EVENTS "android-logcat-events"
|
|
#define INTERFACE_ANDROID_LOGCAT_TEXT_MAIN "android-logcat-text-main"
|
|
#define INTERFACE_ANDROID_LOGCAT_TEXT_SYSTEM "android-logcat-text-system"
|
|
#define INTERFACE_ANDROID_LOGCAT_TEXT_RADIO "android-logcat-text-radio"
|
|
#define INTERFACE_ANDROID_LOGCAT_TEXT_EVENTS "android-logcat-text-events"
|
|
#define INTERFACE_ANDROID_LOGCAT_TEXT_CRASH "android-logcat-text-crash"
|
|
#define INTERFACE_ANDROID_BLUETOOTH_HCIDUMP "android-bluetooth-hcidump"
|
|
#define INTERFACE_ANDROID_BLUETOOTH_EXTERNAL_PARSER "android-bluetooth-external-parser"
|
|
#define INTERFACE_ANDROID_BLUETOOTH_BTSNOOP_NET "android-bluetooth-btsnoop-net"
|
|
#define INTERFACE_ANDROID_TCPDUMP "android-tcpdump"
|
|
#define INTERFACE_ANDROID_TCPDUMP_FORMAT INTERFACE_ANDROID_TCPDUMP "-%s"
|
|
#define INTERFACE_ANDROID_TCPDUMP_SERIAL_FORMAT INTERFACE_ANDROID_TCPDUMP_FORMAT "-%s"
|
|
|
|
#define ANDROIDDUMP_VERSION_MAJOR "1"
|
|
#define ANDROIDDUMP_VERSION_MINOR "1"
|
|
#define ANDROIDDUMP_VERSION_RELEASE "0"
|
|
|
|
#define SERIAL_NUMBER_LENGTH_MAX 512
|
|
#define MODEL_NAME_LENGTH_MAX 64
|
|
|
|
#define PACKET_LENGTH 65535
|
|
|
|
#define SOCKET_RW_TIMEOUT_MS 2000
|
|
#define SOCKET_CONNECT_TIMEOUT_TRIES 10
|
|
#define SOCKET_CONNECT_DELAY_US 1000 /* (1000us = 1ms) * SOCKET_CONNECT_TIMEOUT_TRIES (10) = 10ms worst-case */
|
|
|
|
#define ADB_HEX4_FORMAT "%04zx"
|
|
#define ADB_HEX4_LEN 4
|
|
|
|
#define BTSNOOP_HDR_LEN 16
|
|
|
|
enum exit_code {
|
|
EXIT_CODE_SUCCESS = 0,
|
|
EXIT_CODE_CANNOT_GET_INTERFACES_LIST = 1,
|
|
EXIT_CODE_UNKNOWN_ENCAPSULATION_WIRETAP,
|
|
EXIT_CODE_UNKNOWN_ENCAPSULATION_LIBPCAP,
|
|
EXIT_CODE_CANNOT_SAVE_WIRETAP_DUMP,
|
|
EXIT_CODE_CANNOT_SAVE_LIBPCAP_DUMP,
|
|
EXIT_CODE_NO_INTERFACE_SPECIFIED,
|
|
EXIT_CODE_INVALID_INTERFACE,
|
|
EXIT_CODE_BAD_SIZE_OF_ASSEMBLED_ADB_PACKET_1,
|
|
EXIT_CODE_BAD_SIZE_OF_ASSEMBLED_ADB_PACKET_2,
|
|
EXIT_CODE_BAD_SIZE_OF_ASSEMBLED_ADB_PACKET_3,
|
|
EXIT_CODE_BAD_SIZE_OF_ASSEMBLED_ADB_PACKET_4,
|
|
EXIT_CODE_BAD_SIZE_OF_ASSEMBLED_ADB_PACKET_5,
|
|
EXIT_CODE_BAD_SIZE_OF_ASSEMBLED_ADB_PACKET_6,
|
|
EXIT_CODE_BAD_SIZE_OF_ASSEMBLED_ADB_PACKET_7,
|
|
EXIT_CODE_BAD_SIZE_OF_ASSEMBLED_ADB_PACKET_8,
|
|
EXIT_CODE_BAD_SIZE_OF_ASSEMBLED_ADB_PACKET_9,
|
|
EXIT_CODE_BAD_SIZE_OF_ASSEMBLED_ADB_PACKET_10,
|
|
EXIT_CODE_BAD_SIZE_OF_ASSEMBLED_ADB_PACKET_11,
|
|
EXIT_CODE_BAD_SIZE_OF_ASSEMBLED_ADB_PACKET_12,
|
|
EXIT_CODE_BAD_SIZE_OF_ASSEMBLED_ADB_PACKET_13,
|
|
EXIT_CODE_BAD_SIZE_OF_ASSEMBLED_ADB_PACKET_14,
|
|
EXIT_CODE_BAD_SIZE_OF_ASSEMBLED_ADB_PACKET_15,
|
|
EXIT_CODE_BAD_SIZE_OF_ASSEMBLED_ADB_PACKET_16,
|
|
EXIT_CODE_BAD_SIZE_OF_ASSEMBLED_ADB_PACKET_17,
|
|
EXIT_CODE_BAD_SIZE_OF_ASSEMBLED_ADB_PACKET_18,
|
|
EXIT_CODE_BAD_SIZE_OF_ASSEMBLED_ADB_PACKET_19,
|
|
EXIT_CODE_BAD_SIZE_OF_ASSEMBLED_ADB_PACKET_20,
|
|
EXIT_CODE_ERROR_WHILE_SENDING_ADB_PACKET_1,
|
|
EXIT_CODE_ERROR_WHILE_SENDING_ADB_PACKET_2,
|
|
EXIT_CODE_ERROR_WHILE_SENDING_ADB_PACKET_3,
|
|
EXIT_CODE_ERROR_WHILE_SENDING_ADB_PACKET_4,
|
|
EXIT_CODE_ERROR_WHILE_RECEIVING_ADB_PACKET_STATUS,
|
|
EXIT_CODE_ERROR_WHILE_RECEIVING_ADB_PACKET_DATA,
|
|
EXIT_CODE_INVALID_SOCKET_INTERFACES_LIST,
|
|
EXIT_CODE_INVALID_SOCKET_1,
|
|
EXIT_CODE_INVALID_SOCKET_2,
|
|
EXIT_CODE_INVALID_SOCKET_3,
|
|
EXIT_CODE_INVALID_SOCKET_4,
|
|
EXIT_CODE_INVALID_SOCKET_5,
|
|
EXIT_CODE_INVALID_SOCKET_6,
|
|
EXIT_CODE_INVALID_SOCKET_7,
|
|
EXIT_CODE_INVALID_SOCKET_8,
|
|
EXIT_CODE_INVALID_SOCKET_9,
|
|
EXIT_CODE_INVALID_SOCKET_10,
|
|
EXIT_CODE_INVALID_SOCKET_11,
|
|
EXIT_CODE_GENERIC = -1
|
|
};
|
|
|
|
enum {
|
|
EXTCAP_BASE_OPTIONS_ENUM,
|
|
OPT_HELP,
|
|
OPT_VERSION,
|
|
OPT_CONFIG_ADB_SERVER_IP,
|
|
OPT_CONFIG_ADB_SERVER_TCP_PORT,
|
|
OPT_CONFIG_LOGCAT_TEXT,
|
|
OPT_CONFIG_LOGCAT_IGNORE_LOG_BUFFER,
|
|
OPT_CONFIG_LOGCAT_CUSTOM_OPTIONS,
|
|
OPT_CONFIG_BT_SERVER_TCP_PORT,
|
|
OPT_CONFIG_BT_FORWARD_SOCKET,
|
|
OPT_CONFIG_BT_LOCAL_IP,
|
|
OPT_CONFIG_BT_LOCAL_TCP_PORT
|
|
};
|
|
|
|
static struct option longopts[] = {
|
|
EXTCAP_BASE_OPTIONS,
|
|
{ "help", no_argument, NULL, OPT_HELP},
|
|
{ "version", no_argument, NULL, OPT_VERSION},
|
|
{ "adb-server-ip", required_argument, NULL, OPT_CONFIG_ADB_SERVER_IP},
|
|
{ "adb-server-tcp-port", required_argument, NULL, OPT_CONFIG_ADB_SERVER_TCP_PORT},
|
|
{ "logcat-text", optional_argument, NULL, OPT_CONFIG_LOGCAT_TEXT},
|
|
{ "logcat-ignore-log-buffer", optional_argument, NULL, OPT_CONFIG_LOGCAT_IGNORE_LOG_BUFFER},
|
|
{ "logcat-custom-options", required_argument, NULL, OPT_CONFIG_LOGCAT_CUSTOM_OPTIONS},
|
|
{ "bt-server-tcp-port", required_argument, NULL, OPT_CONFIG_BT_SERVER_TCP_PORT},
|
|
{ "bt-forward-socket", required_argument, NULL, OPT_CONFIG_BT_FORWARD_SOCKET},
|
|
{ "bt-local-ip", required_argument, NULL, OPT_CONFIG_BT_LOCAL_IP},
|
|
{ "bt-local-tcp-port", required_argument, NULL, OPT_CONFIG_BT_LOCAL_TCP_PORT},
|
|
{ 0, 0, 0, 0 }
|
|
};
|
|
|
|
struct interface_t {
|
|
const char *display_name;
|
|
const char *interface_name;
|
|
struct interface_t *next;
|
|
};
|
|
|
|
struct exported_pdu_header {
|
|
uint16_t tag;
|
|
uint16_t length;
|
|
/* unsigned char value[0]; */
|
|
};
|
|
|
|
|
|
typedef struct _own_pcap_bluetooth_h4_header {
|
|
uint32_t direction;
|
|
} own_pcap_bluetooth_h4_header;
|
|
|
|
typedef struct pcap_hdr_s {
|
|
guint32 magic_number; /* magic number */
|
|
guint16 version_major; /* major version number */
|
|
guint16 version_minor; /* minor version number */
|
|
gint32 thiszone; /* GMT to local correction */
|
|
guint32 sigfigs; /* accuracy of timestamps */
|
|
guint32 snaplen; /* max length of captured packets, in octets */
|
|
guint32 network; /* data link type */
|
|
} pcap_hdr_t;
|
|
|
|
|
|
typedef struct pcaprec_hdr_s {
|
|
guint32 ts_sec; /* timestamp seconds */
|
|
guint32 ts_usec; /* timestamp microseconds */
|
|
guint32 incl_len; /* number of octets of packet saved in file */
|
|
guint32 orig_len; /* actual length of packet */
|
|
} pcaprec_hdr_t;
|
|
|
|
/* This fix compilator warning like "warning: cast from 'char *' to 'uint32_t *' (aka 'unsigned int *') increases required alignment from 1 to 4 " */
|
|
typedef union {
|
|
char *value_char;
|
|
uint8_t *value_u8;
|
|
uint16_t *value_u16;
|
|
uint32_t *value_u32;
|
|
uint64_t *value_u64;
|
|
int8_t *value_i8;
|
|
int16_t *value_i16;
|
|
int32_t *value_i32;
|
|
int64_t *value_i64;
|
|
own_pcap_bluetooth_h4_header *value_own_pcap_bluetooth_h4_header;
|
|
} data_aligned_t;
|
|
|
|
#define SET_DATA(dest, type, src) \
|
|
{ \
|
|
data_aligned_t data_aligned; \
|
|
\
|
|
data_aligned.value_char = src; \
|
|
dest = data_aligned.type; \
|
|
}
|
|
|
|
struct extcap_dumper {
|
|
int encap;
|
|
union {
|
|
#ifdef ANDROIDDUMP_USE_LIBPCAP
|
|
pcap_dumper_t *pcap;
|
|
#else
|
|
wtap_dumper *wtap;
|
|
#endif
|
|
} dumper;
|
|
};
|
|
|
|
/* Globals */
|
|
static int endless_loop = 1;
|
|
|
|
/* Functions */
|
|
static inline int is_specified_interface(const char *interface, const char *interface_prefix) {
|
|
return !strncmp(interface, interface_prefix, strlen(interface_prefix));
|
|
}
|
|
|
|
static gboolean is_logcat_interface(const char *interface) {
|
|
return is_specified_interface(interface, INTERFACE_ANDROID_LOGCAT_MAIN) ||
|
|
is_specified_interface(interface, INTERFACE_ANDROID_LOGCAT_SYSTEM) ||
|
|
is_specified_interface(interface, INTERFACE_ANDROID_LOGCAT_RADIO) ||
|
|
is_specified_interface(interface, INTERFACE_ANDROID_LOGCAT_EVENTS);
|
|
}
|
|
|
|
static gboolean is_logcat_text_interface(const char *interface) {
|
|
return is_specified_interface(interface, INTERFACE_ANDROID_LOGCAT_TEXT_MAIN) ||
|
|
is_specified_interface(interface, INTERFACE_ANDROID_LOGCAT_TEXT_SYSTEM) ||
|
|
is_specified_interface(interface, INTERFACE_ANDROID_LOGCAT_TEXT_RADIO) ||
|
|
is_specified_interface(interface, INTERFACE_ANDROID_LOGCAT_TEXT_EVENTS) ||
|
|
is_specified_interface(interface, INTERFACE_ANDROID_LOGCAT_TEXT_CRASH);
|
|
}
|
|
|
|
static char* get_serial_from_interface(char *interface)
|
|
{
|
|
static const char* const iface_prefix[] = {
|
|
INTERFACE_ANDROID_LOGCAT_MAIN,
|
|
INTERFACE_ANDROID_LOGCAT_SYSTEM,
|
|
INTERFACE_ANDROID_LOGCAT_RADIO,
|
|
INTERFACE_ANDROID_LOGCAT_EVENTS,
|
|
INTERFACE_ANDROID_LOGCAT_TEXT_MAIN,
|
|
INTERFACE_ANDROID_LOGCAT_TEXT_SYSTEM,
|
|
INTERFACE_ANDROID_LOGCAT_TEXT_RADIO,
|
|
INTERFACE_ANDROID_LOGCAT_TEXT_EVENTS,
|
|
INTERFACE_ANDROID_LOGCAT_TEXT_CRASH,
|
|
INTERFACE_ANDROID_BLUETOOTH_HCIDUMP,
|
|
INTERFACE_ANDROID_BLUETOOTH_EXTERNAL_PARSER,
|
|
INTERFACE_ANDROID_BLUETOOTH_BTSNOOP_NET,
|
|
NULL
|
|
};
|
|
int i;
|
|
const char* curr = NULL;
|
|
for (i = 0; (curr = iface_prefix[i]); i++) {
|
|
if (is_specified_interface(interface, curr) &&
|
|
strlen(interface) > strlen(curr) + 1) {
|
|
return interface + strlen(curr) + 1;
|
|
}
|
|
}
|
|
return NULL;
|
|
}
|
|
|
|
static const char* interface_to_logbuf(char* interface)
|
|
{
|
|
const char *const adb_log_main = "log:main";
|
|
const char *const adb_log_system = "log:system";
|
|
const char *const adb_log_radio = "log:radio";
|
|
const char *const adb_log_events = "log:events";
|
|
const char *logbuf = NULL;
|
|
|
|
if (is_specified_interface(interface, INTERFACE_ANDROID_LOGCAT_MAIN))
|
|
logbuf = adb_log_main;
|
|
else if (is_specified_interface(interface, INTERFACE_ANDROID_LOGCAT_SYSTEM))
|
|
logbuf = adb_log_system;
|
|
else if (is_specified_interface(interface, INTERFACE_ANDROID_LOGCAT_RADIO))
|
|
logbuf = adb_log_radio;
|
|
else if (is_specified_interface(interface, INTERFACE_ANDROID_LOGCAT_EVENTS))
|
|
logbuf = adb_log_events;
|
|
return logbuf;
|
|
}
|
|
|
|
/*
|
|
* General errors and warnings are reported through g_warning() in
|
|
* androiddump.
|
|
*
|
|
* Unfortunately, g_warning() may be a macro, so we do it by calling
|
|
* g_logv() with the appropriate arguments.
|
|
*/
|
|
static void
|
|
failure_warning_message(const char *msg_format, va_list ap)
|
|
{
|
|
g_logv(G_LOG_DOMAIN, G_LOG_LEVEL_WARNING, msg_format, ap);
|
|
}
|
|
|
|
static void useSndTimeout(socket_handle_t sock) {
|
|
int res;
|
|
#ifdef _WIN32
|
|
const DWORD socket_timeout = SOCKET_RW_TIMEOUT_MS;
|
|
|
|
res = setsockopt(sock, SOL_SOCKET, SO_SNDTIMEO, (const char *) &socket_timeout, (socklen_t)sizeof(socket_timeout));
|
|
#else
|
|
const struct timeval socket_timeout = {
|
|
.tv_sec = SOCKET_RW_TIMEOUT_MS / 1000,
|
|
.tv_usec = (SOCKET_RW_TIMEOUT_MS % 1000) * 1000
|
|
};
|
|
|
|
res = setsockopt(sock, SOL_SOCKET, SO_SNDTIMEO, &socket_timeout, (socklen_t)sizeof(socket_timeout));
|
|
#endif
|
|
if (res != 0)
|
|
g_debug("Can't set socket timeout, using default");
|
|
}
|
|
|
|
static void useNonBlockingConnectTimeout(socket_handle_t sock) {
|
|
int res_snd;
|
|
int res_rcv;
|
|
#ifdef _WIN32
|
|
const DWORD socket_timeout = SOCKET_RW_TIMEOUT_MS;
|
|
unsigned long non_blocking = 1;
|
|
|
|
res_snd = setsockopt(sock, SOL_SOCKET, SO_SNDTIMEO, (const char *) &socket_timeout, sizeof(socket_timeout));
|
|
res_rcv = setsockopt(sock, SOL_SOCKET, SO_RCVTIMEO, (const char *) &socket_timeout, sizeof(socket_timeout));
|
|
|
|
/* set socket to non-blocking */
|
|
ioctlsocket(sock, FIONBIO, &non_blocking);
|
|
#else
|
|
const struct timeval socket_timeout = {
|
|
.tv_sec = SOCKET_RW_TIMEOUT_MS / 1000,
|
|
.tv_usec = (SOCKET_RW_TIMEOUT_MS % 1000) * 1000
|
|
};
|
|
|
|
res_snd = setsockopt(sock, SOL_SOCKET, SO_SNDTIMEO, &socket_timeout, sizeof(socket_timeout));
|
|
res_rcv = setsockopt(sock, SOL_SOCKET, SO_RCVTIMEO, &socket_timeout, sizeof(socket_timeout));
|
|
#endif
|
|
if (res_snd != 0)
|
|
g_debug("Can't set socket timeout, using default");
|
|
if (res_rcv != 0)
|
|
g_debug("Can't set socket timeout, using default");
|
|
}
|
|
|
|
static void useNormalConnectTimeout(socket_handle_t sock) {
|
|
int res_rcv;
|
|
#ifdef _WIN32
|
|
const DWORD socket_timeout = 0;
|
|
unsigned long non_blocking = 0;
|
|
|
|
res_rcv = setsockopt(sock, SOL_SOCKET, SO_RCVTIMEO, (const char *) &socket_timeout, sizeof(socket_timeout));
|
|
ioctlsocket(sock, FIONBIO, &non_blocking);
|
|
#else
|
|
const struct timeval socket_timeout = {
|
|
.tv_sec = SOCKET_RW_TIMEOUT_MS / 1000,
|
|
.tv_usec = (SOCKET_RW_TIMEOUT_MS % 1000) * 1000
|
|
};
|
|
|
|
res_rcv = setsockopt(sock, SOL_SOCKET, SO_RCVTIMEO, &socket_timeout, sizeof(socket_timeout));
|
|
#endif
|
|
if (res_rcv != 0)
|
|
g_debug("Can't set socket timeout, using default");
|
|
}
|
|
|
|
static struct extcap_dumper extcap_dumper_open(char *fifo, int encap) {
|
|
struct extcap_dumper extcap_dumper;
|
|
|
|
#ifdef ANDROIDDUMP_USE_LIBPCAP
|
|
pcap_t *pcap;
|
|
|
|
pcap = pcap_open_dead_with_tstamp_precision(encap, PACKET_LENGTH, PCAP_TSTAMP_PRECISION_NANO);
|
|
extcap_dumper.dumper.pcap = pcap_dump_open(pcap, fifo);
|
|
if (!extcap_dumper.dumper.pcap) {
|
|
g_warning("Can't open %s for saving packets: %s", pcap_geterr(pcap));
|
|
pcap_close(pcap);
|
|
exit(EXIT_CODE_CANNOT_SAVE_LIBPCAP_DUMP);
|
|
}
|
|
extcap_dumper.encap = encap;
|
|
if (pcap_dump_flush(extcap_dumper.dumper.pcap) == -1) {
|
|
g_warning("Write to %s failed: %s", g_strerror(errno));
|
|
}
|
|
#else
|
|
wtap_dump_params params = WTAP_DUMP_PARAMS_INIT;
|
|
int err = 0;
|
|
|
|
wtap_init(FALSE);
|
|
|
|
params.encap = encap;
|
|
params.snaplen = PACKET_LENGTH;
|
|
extcap_dumper.dumper.wtap = wtap_dump_open(fifo, WTAP_FILE_TYPE_SUBTYPE_PCAP_NSEC, WTAP_UNCOMPRESSED, ¶ms, &err);
|
|
if (!extcap_dumper.dumper.wtap) {
|
|
cfile_dump_open_failure_message("androiddump", fifo, err, WTAP_FILE_TYPE_SUBTYPE_PCAP_NSEC);
|
|
exit(EXIT_CODE_CANNOT_SAVE_WIRETAP_DUMP);
|
|
}
|
|
extcap_dumper.encap = encap;
|
|
wtap_dump_flush(extcap_dumper.dumper.wtap);
|
|
#endif
|
|
|
|
return extcap_dumper;
|
|
}
|
|
|
|
static gboolean extcap_dumper_dump(struct extcap_dumper extcap_dumper,
|
|
char *fifo, char *buffer,
|
|
gssize captured_length, gssize reported_length,
|
|
time_t seconds, int nanoseconds) {
|
|
#ifdef ANDROIDDUMP_USE_LIBPCAP
|
|
struct pcap_pkthdr pcap_header;
|
|
|
|
pcap_header.caplen = (bpf_u_int32) captured_length;
|
|
pcap_header.len = (bpf_u_int32) reported_length;
|
|
pcap_header.ts.tv_sec = seconds;
|
|
pcap_header.ts.tv_usec = nanoseconds / 1000;
|
|
|
|
pcap_dump((u_char *) extcap_dumper.dumper.pcap, &pcap_header, buffer);
|
|
if (pcap_dump_flush(extcap_dumper.dumper.pcap) == -1) {
|
|
g_warning("Write to %s failed: %s", g_strerror(errno));
|
|
}
|
|
#else
|
|
int err = 0;
|
|
char *err_info;
|
|
wtap_rec rec;
|
|
|
|
rec.rec_type = REC_TYPE_PACKET;
|
|
rec.presence_flags = WTAP_HAS_TS;
|
|
rec.rec_header.packet_header.caplen = (guint32) captured_length;
|
|
rec.rec_header.packet_header.len = (guint32) reported_length;
|
|
|
|
rec.ts.secs = seconds;
|
|
rec.ts.nsecs = (int) nanoseconds;
|
|
|
|
rec.opt_comment = 0;
|
|
rec.opt_comment = NULL;
|
|
rec.rec_header.packet_header.drop_count = 0;
|
|
rec.rec_header.packet_header.pack_flags = 0;
|
|
|
|
/* NOTE: Try to handle pseudoheaders manually */
|
|
if (extcap_dumper.encap == EXTCAP_ENCAP_BLUETOOTH_H4_WITH_PHDR) {
|
|
uint32_t *direction;
|
|
|
|
SET_DATA(direction, value_u32, buffer)
|
|
|
|
rec.rec_header.packet_header.pseudo_header.bthci.sent = GINT32_FROM_BE(*direction) ? 0 : 1;
|
|
|
|
rec.rec_header.packet_header.len -= (guint32)sizeof(own_pcap_bluetooth_h4_header);
|
|
rec.rec_header.packet_header.caplen -= (guint32)sizeof(own_pcap_bluetooth_h4_header);
|
|
|
|
buffer += sizeof(own_pcap_bluetooth_h4_header);
|
|
}
|
|
rec.rec_header.packet_header.pkt_encap = extcap_dumper.encap;
|
|
|
|
if (!wtap_dump(extcap_dumper.dumper.wtap, &rec, (const guint8 *) buffer, &err, &err_info)) {
|
|
cfile_write_failure_message("androiddump", NULL, fifo, err, err_info,
|
|
0, WTAP_FILE_TYPE_SUBTYPE_PCAP_NSEC);
|
|
return FALSE;
|
|
}
|
|
|
|
wtap_dump_flush(extcap_dumper.dumper.wtap);
|
|
#endif
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
|
|
static socket_handle_t adb_connect(const char *server_ip, unsigned short *server_tcp_port) {
|
|
socket_handle_t sock;
|
|
socklen_t length;
|
|
struct sockaddr_in server;
|
|
struct sockaddr_in client;
|
|
int status;
|
|
int tries = 0;
|
|
|
|
memset(&server, 0x0, sizeof(server));
|
|
|
|
server.sin_family = AF_INET;
|
|
server.sin_port = GINT16_TO_BE(*server_tcp_port);
|
|
ws_inet_pton4(server_ip, &(server.sin_addr.s_addr));
|
|
|
|
if ((sock = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP)) == INVALID_SOCKET) {
|
|
g_warning("Cannot open system TCP socket: %s", strerror(errno));
|
|
return INVALID_SOCKET;
|
|
}
|
|
|
|
useNonBlockingConnectTimeout(sock);
|
|
while (tries < SOCKET_CONNECT_TIMEOUT_TRIES) {
|
|
status = connect(sock, (struct sockaddr *) &server, (socklen_t)sizeof(server));
|
|
tries += 1;
|
|
|
|
#ifdef _WIN32
|
|
if ((status == SOCKET_ERROR) && (WSAGetLastError() == WSAEWOULDBLOCK)) {
|
|
const struct timeval timeout = {
|
|
.tv_sec = 0,
|
|
.tv_usec = SOCKET_CONNECT_DELAY_US,
|
|
};
|
|
fd_set fdset;
|
|
FD_ZERO(&fdset);
|
|
FD_SET(sock, &fdset);
|
|
if ((select(0, NULL, &fdset, NULL, &timeout) != 0) && (FD_ISSET(sock, &fdset))) {
|
|
status = 0;
|
|
}
|
|
}
|
|
#endif
|
|
|
|
if (status != SOCKET_ERROR)
|
|
break;
|
|
g_usleep(SOCKET_CONNECT_DELAY_US);
|
|
}
|
|
useNormalConnectTimeout(sock);
|
|
|
|
if (status == SOCKET_ERROR) {
|
|
#if 0
|
|
/* NOTE: This does not work well - make significant delay while initializing Wireshark.
|
|
Do fork() then call "adb" also does not make sense, because there is need to
|
|
do something like sleep(1) to ensure adb is started... system() cannot be used
|
|
on Windows, because open console window. This helper does not work as expected,
|
|
so disable it and user must ensure that adb is started (adb start-server,
|
|
but also all other command start-server automatically)
|
|
*/
|
|
#ifdef _WIN32
|
|
if (_execlp("adb", "adb", "start-server", NULL)) {
|
|
#else
|
|
if (execlp("adb", "adb", "start-server", NULL)) {
|
|
#endif
|
|
errmsg("WARNING: Cannot execute system command to start adb: %s", strerror(errno));
|
|
closesocket(sock);
|
|
return INVALID_SOCKET;
|
|
};
|
|
|
|
if (connect(sock, (struct sockaddr *) &server, (socklen_t)sizeof(server)) == SOCKET_ERROR) {
|
|
g_warning("Cannot connect to ADB: <%s> Please check that adb daemon is running.", strerror(errno));
|
|
closesocket(sock);
|
|
return INVALID_SOCKET;
|
|
}
|
|
#else
|
|
g_debug("Cannot connect to ADB: <%s> Please check that adb daemon is running.", strerror(errno));
|
|
closesocket(sock);
|
|
return INVALID_SOCKET;
|
|
#endif
|
|
}
|
|
|
|
length = sizeof(client);
|
|
if (getsockname(sock, (struct sockaddr *) &client, &length)) {
|
|
g_warning("getsockname: %s", strerror(errno));
|
|
closesocket(sock);
|
|
return INVALID_SOCKET;
|
|
}
|
|
|
|
if (length != sizeof(client)) {
|
|
g_warning("incorrect length");
|
|
closesocket(sock);
|
|
return INVALID_SOCKET;
|
|
}
|
|
|
|
g_debug("Client port %u", GUINT16_FROM_BE(client.sin_port));
|
|
|
|
return sock;
|
|
}
|
|
|
|
|
|
static char *adb_send_and_receive(socket_handle_t sock, const char *adb_service,
|
|
char *buffer, size_t buffer_length, size_t *data_length) {
|
|
size_t used_buffer_length;
|
|
size_t bytes_to_read;
|
|
guint32 length;
|
|
gssize result;
|
|
char status[4];
|
|
char tmp_buffer;
|
|
size_t adb_service_length;
|
|
|
|
adb_service_length = strlen(adb_service);
|
|
if (adb_service_length > INT_MAX) {
|
|
g_warning("Service name too long when sending <%s> to ADB daemon", adb_service);
|
|
if (data_length)
|
|
*data_length = 0;
|
|
return NULL;
|
|
}
|
|
|
|
/* 8 bytes of hex length + terminating NUL */
|
|
if (buffer_length < 9) {
|
|
g_warning("Buffer for response too short while sending <%s> to ADB daemon", adb_service);
|
|
if (data_length)
|
|
*data_length = 0;
|
|
return NULL;
|
|
}
|
|
|
|
g_snprintf(buffer, (gulong)buffer_length, ADB_HEX4_FORMAT, adb_service_length);
|
|
result = send(sock, buffer, ADB_HEX4_LEN, 0);
|
|
if (result < ADB_HEX4_LEN) {
|
|
g_warning("Error while sending <%s> length to ADB daemon", adb_service);
|
|
return NULL;
|
|
}
|
|
|
|
result = send(sock, adb_service, (int) adb_service_length, 0);
|
|
if (result != (gssize) adb_service_length) {
|
|
g_warning("Error while sending <%s> to ADB daemon", adb_service);
|
|
if (data_length)
|
|
*data_length = 0;
|
|
return NULL;
|
|
}
|
|
|
|
used_buffer_length = 0;
|
|
while (used_buffer_length < 8) {
|
|
bytes_to_read = buffer_length - used_buffer_length;
|
|
if (bytes_to_read > INT_MAX)
|
|
bytes_to_read = INT_MAX;
|
|
result = recv(sock, buffer + used_buffer_length, (int)bytes_to_read, 0);
|
|
|
|
if (result <= 0) {
|
|
g_warning("Broken socket connection while fetching reply status for <%s>", adb_service);
|
|
if (data_length)
|
|
*data_length = 0;
|
|
return NULL;
|
|
}
|
|
|
|
used_buffer_length += result;
|
|
}
|
|
|
|
memcpy(status, buffer, 4);
|
|
tmp_buffer = buffer[8];
|
|
buffer[8] = '\0';
|
|
if (!ws_hexstrtou32(buffer + 4, NULL, &length)) {
|
|
g_warning("Invalid reply length <%s> while reading reply for <%s>", buffer + 4, adb_service);
|
|
if (data_length)
|
|
*data_length = 0;
|
|
return NULL;
|
|
}
|
|
buffer[8] = tmp_buffer;
|
|
|
|
if (buffer_length < length + 8) {
|
|
g_warning("Buffer for response too short while sending <%s> to ADB daemon", adb_service);
|
|
if (data_length)
|
|
*data_length = 0;
|
|
return NULL;
|
|
}
|
|
|
|
while (used_buffer_length < length + 8) {
|
|
bytes_to_read = buffer_length - used_buffer_length;
|
|
if (bytes_to_read > INT_MAX)
|
|
bytes_to_read = INT_MAX;
|
|
result = recv(sock, buffer + used_buffer_length, (int)bytes_to_read, 0);
|
|
|
|
if (result <= 0) {
|
|
g_warning("Broken socket connection while reading reply for <%s>", adb_service);
|
|
if (data_length)
|
|
*data_length = 0;
|
|
return NULL;
|
|
}
|
|
|
|
used_buffer_length += result;
|
|
}
|
|
|
|
if (data_length)
|
|
*data_length = used_buffer_length - 8;
|
|
|
|
if (memcmp(status, "OKAY", 4)) {
|
|
g_warning("Error while receiving by ADB for <%s>", adb_service);
|
|
if (data_length)
|
|
*data_length = 0;
|
|
return NULL;
|
|
}
|
|
|
|
return buffer + 8;
|
|
}
|
|
|
|
|
|
static char *adb_send_and_read(socket_handle_t sock, const char *adb_service, char *buffer,
|
|
int buffer_length, gssize *data_length) {
|
|
gssize used_buffer_length;
|
|
gssize result;
|
|
char status[4];
|
|
size_t adb_service_length;
|
|
|
|
adb_service_length = strlen(adb_service);
|
|
g_snprintf(buffer, buffer_length, ADB_HEX4_FORMAT, adb_service_length);
|
|
|
|
result = send(sock, buffer, ADB_HEX4_LEN, 0);
|
|
if (result < ADB_HEX4_LEN) {
|
|
g_warning("Error while sending <%s> to ADB daemon", adb_service);
|
|
return NULL;
|
|
}
|
|
|
|
result = send(sock, adb_service, (int) adb_service_length, 0);
|
|
if (result != (gssize) adb_service_length) {
|
|
g_warning("Error while sending <%s> to ADB", adb_service);
|
|
if (data_length)
|
|
*data_length = 0;
|
|
return NULL;
|
|
}
|
|
|
|
used_buffer_length = 0;
|
|
while (used_buffer_length < 4) {
|
|
result = recv(sock, buffer + used_buffer_length, (int)(buffer_length - used_buffer_length), 0);
|
|
|
|
if (result <= 0) {
|
|
g_warning("Broken socket connection while fetching reply status for <%s>", adb_service);
|
|
|
|
return NULL;
|
|
}
|
|
|
|
used_buffer_length += result;
|
|
}
|
|
|
|
memcpy(status, buffer, 4);
|
|
|
|
while (result > 0) {
|
|
result= recv(sock, buffer + used_buffer_length, (int)(buffer_length - used_buffer_length), 0);
|
|
|
|
if (result < 0) {
|
|
g_warning("Broken socket connection while reading reply for <%s>", adb_service);
|
|
|
|
return NULL;
|
|
} else if (result == 0) {
|
|
break;
|
|
}
|
|
|
|
used_buffer_length += result;
|
|
}
|
|
|
|
if (data_length)
|
|
*data_length = used_buffer_length - 4;
|
|
|
|
if (memcmp(status, "OKAY", 4)) {
|
|
g_warning("Error while receiving by ADB for <%s>", adb_service);
|
|
if (data_length)
|
|
*data_length = 0;
|
|
return NULL;
|
|
}
|
|
|
|
return buffer + 4;
|
|
}
|
|
|
|
|
|
static int adb_send(socket_handle_t sock, const char *adb_service) {
|
|
char buffer[5];
|
|
int used_buffer_length;
|
|
gssize result;
|
|
size_t adb_service_length;
|
|
|
|
adb_service_length = strlen(adb_service);
|
|
g_snprintf(buffer, sizeof(buffer), ADB_HEX4_FORMAT, adb_service_length);
|
|
|
|
result = send(sock, buffer, ADB_HEX4_LEN, 0);
|
|
if (result < ADB_HEX4_LEN) {
|
|
g_warning("Error while sending <%s> to ADB daemon", adb_service);
|
|
return EXIT_CODE_ERROR_WHILE_SENDING_ADB_PACKET_1;
|
|
}
|
|
|
|
result = send(sock, adb_service, (int) adb_service_length, 0);
|
|
if (result != (gssize) adb_service_length) {
|
|
g_warning("Error while sending <%s> to ADB", adb_service);
|
|
return EXIT_CODE_ERROR_WHILE_SENDING_ADB_PACKET_1;
|
|
}
|
|
|
|
used_buffer_length = 0;
|
|
while (used_buffer_length < 4) {
|
|
result = recv(sock, buffer + used_buffer_length, 4 - used_buffer_length, 0);
|
|
|
|
if (result <= 0) {
|
|
g_warning("Broken socket connection while fetching reply status for <%s>", adb_service);
|
|
|
|
return EXIT_CODE_ERROR_WHILE_RECEIVING_ADB_PACKET_STATUS;
|
|
}
|
|
|
|
used_buffer_length += (int)result;
|
|
}
|
|
|
|
if (memcmp(buffer, "OKAY", 4)) {
|
|
g_debug("Error while receiving by ADB for <%s>", adb_service);
|
|
|
|
return EXIT_CODE_ERROR_WHILE_RECEIVING_ADB_PACKET_DATA;
|
|
}
|
|
|
|
return EXIT_CODE_SUCCESS;
|
|
}
|
|
|
|
|
|
static socket_handle_t
|
|
adb_connect_transport(const char *server_ip, unsigned short *server_tcp_port,
|
|
const char* serial_number)
|
|
{
|
|
static const char *const adb_transport_serial_templace = "host:transport:%s";
|
|
static const char *const adb_transport_any = "host:transport-any";
|
|
char transport_buf[80];
|
|
const char* transport = transport_buf;
|
|
socket_handle_t sock;
|
|
gssize result;
|
|
|
|
sock = adb_connect(server_ip, server_tcp_port);
|
|
if (sock == INVALID_SOCKET) {
|
|
g_warning("Error while connecting to adb server");
|
|
return sock;
|
|
}
|
|
|
|
if (!serial_number) {
|
|
transport = adb_transport_any;
|
|
} else {
|
|
result = g_snprintf(transport_buf, sizeof(transport_buf), adb_transport_serial_templace, serial_number);
|
|
if (result <= 0 || result > (int)sizeof(transport_buf)) {
|
|
g_warning("Error while completing adb packet for transport");
|
|
closesocket(sock);
|
|
return INVALID_SOCKET;
|
|
}
|
|
}
|
|
|
|
result = adb_send(sock, transport);
|
|
if (result) {
|
|
g_warning("Error while setting adb transport for <%s>", transport_buf);
|
|
closesocket(sock);
|
|
return INVALID_SOCKET;
|
|
}
|
|
return sock;
|
|
}
|
|
|
|
|
|
static void new_interface(extcap_parameters * extcap_conf, const gchar *interface_id,
|
|
const gchar *model_name, const gchar *serial_number, const gchar *display_name)
|
|
{
|
|
char *interface = g_strdup_printf("%s-%s", interface_id, serial_number);
|
|
char *ifdisplay = g_strdup_printf("%s %s %s", display_name, model_name, serial_number);
|
|
|
|
if (is_specified_interface(interface, INTERFACE_ANDROID_BLUETOOTH_HCIDUMP) ||
|
|
is_specified_interface(interface, INTERFACE_ANDROID_BLUETOOTH_EXTERNAL_PARSER) ||
|
|
is_specified_interface(interface, INTERFACE_ANDROID_BLUETOOTH_BTSNOOP_NET)) {
|
|
|
|
extcap_base_register_interface_ext(extcap_conf, interface, ifdisplay, 99, "BluetoothH4", "Bluetooth HCI UART transport layer plus pseudo-header" );
|
|
} else if (is_logcat_interface(interface) || is_logcat_text_interface(interface)) {
|
|
extcap_base_register_interface(extcap_conf, interface, ifdisplay, 252, "Upper PDU" );
|
|
} else if (is_specified_interface(interface, INTERFACE_ANDROID_TCPDUMP)) {
|
|
extcap_base_register_interface(extcap_conf, interface, ifdisplay, 1, "Ethernet");
|
|
}
|
|
g_free(interface);
|
|
g_free(ifdisplay);
|
|
}
|
|
|
|
|
|
static void new_fake_interface_for_list_dlts(extcap_parameters * extcap_conf,
|
|
const gchar *ifname)
|
|
{
|
|
if (is_specified_interface(ifname, INTERFACE_ANDROID_BLUETOOTH_HCIDUMP) ||
|
|
is_specified_interface(ifname, INTERFACE_ANDROID_BLUETOOTH_EXTERNAL_PARSER) ||
|
|
is_specified_interface(ifname, INTERFACE_ANDROID_BLUETOOTH_BTSNOOP_NET)) {
|
|
extcap_base_register_interface_ext(extcap_conf, ifname, ifname, 99, "BluetoothH4", "Bluetooth HCI UART transport layer plus pseudo-header" );
|
|
} else if (is_logcat_interface(ifname) || is_logcat_text_interface(ifname)) {
|
|
extcap_base_register_interface(extcap_conf, ifname, ifname, 252, "Upper PDU" );
|
|
} else if (is_specified_interface(ifname, INTERFACE_ANDROID_TCPDUMP)) {
|
|
extcap_base_register_interface(extcap_conf, ifname, ifname, 1, "Ethernet");
|
|
}
|
|
}
|
|
|
|
|
|
static int add_tcpdump_interfaces(extcap_parameters * extcap_conf, const char *adb_server_ip, unsigned short *adb_server_tcp_port, const char *serial_number)
|
|
{
|
|
static const char *const adb_tcpdump_list = "shell:tcpdump -D";
|
|
static const char *const regex_ifaces = "\\d+\\.(?<iface>\\S+)(\\s+?(?:(?:\\(.*\\))*)(\\s*?\\[(?<flags>.*?)\\])?)?";
|
|
static char recv_buffer[PACKET_LENGTH];
|
|
char *response;
|
|
gssize data_length;
|
|
socket_handle_t sock;
|
|
GRegex* regex = NULL;
|
|
GError *err = NULL;
|
|
GMatchInfo *match = NULL;
|
|
char* tok;
|
|
char iface_name[80];
|
|
gboolean flags_supported;
|
|
|
|
sock = adb_connect_transport(adb_server_ip, adb_server_tcp_port, serial_number);
|
|
if (sock == INVALID_SOCKET) {
|
|
g_warning("Failed to connect to adb server");
|
|
return EXIT_CODE_GENERIC;
|
|
}
|
|
|
|
response = adb_send_and_read(sock, adb_tcpdump_list, recv_buffer, sizeof(recv_buffer), &data_length);
|
|
closesocket(sock);
|
|
|
|
if (!response) {
|
|
g_warning("Failed to get list of available tcpdump interfaces");
|
|
return EXIT_CODE_GENERIC;
|
|
}
|
|
response[data_length] = '\0';
|
|
|
|
regex = g_regex_new(regex_ifaces, G_REGEX_RAW, (GRegexMatchFlags)0, &err);
|
|
if (!regex) {
|
|
g_warning("Failed to compile regex for tcpdump interface matching");
|
|
return EXIT_CODE_GENERIC;
|
|
}
|
|
|
|
flags_supported = (strstr(response, "[") != 0) && (strstr(response, "]") != 0);
|
|
|
|
tok = strtok(response, "\n");
|
|
while (tok != NULL) {
|
|
g_regex_match(regex, tok, (GRegexMatchFlags)0, &match);
|
|
if (g_match_info_matches(match)) {
|
|
gchar *iface = g_match_info_fetch_named(match, "iface");
|
|
gchar *flags = g_match_info_fetch_named(match, "flags");
|
|
|
|
if (!flags_supported || (flags && strstr(flags, "Up"))) {
|
|
g_snprintf(iface_name, sizeof(iface_name), INTERFACE_ANDROID_TCPDUMP_FORMAT, iface);
|
|
new_interface(extcap_conf, iface_name, iface, serial_number, "Android tcpdump");
|
|
}
|
|
g_free(flags);
|
|
g_free(iface);
|
|
}
|
|
g_match_info_free(match);
|
|
tok = strtok(NULL, "\n");
|
|
}
|
|
g_regex_unref(regex);
|
|
return 0;
|
|
}
|
|
|
|
|
|
static int register_interfaces(extcap_parameters * extcap_conf, const char *adb_server_ip, unsigned short *adb_server_tcp_port) {
|
|
static char packet[PACKET_LENGTH];
|
|
static char helpful_packet[PACKET_LENGTH];
|
|
char check_port_buf[80];
|
|
char *response;
|
|
char *device_list;
|
|
gssize data_length;
|
|
size_t device_length;
|
|
socket_handle_t sock;
|
|
const char *adb_check_port_templace = "shell:cat /proc/%s/net/tcp";
|
|
const char *adb_devices = "host:devices-l";
|
|
const char *adb_api_level = "shell:getprop ro.build.version.sdk";
|
|
const char *adb_hcidump_version = "shell:hcidump --version";
|
|
const char *adb_ps_droid_bluetooth = "shell:ps droid.bluetooth";
|
|
const char *adb_ps_bluetooth_app = "shell:ps com.android.bluetooth";
|
|
const char *adb_ps_with_grep = "shell:ps | grep com.android.bluetooth";
|
|
const char *adb_ps_all_with_grep = "shell:ps -A | grep com.android.bluetooth";
|
|
char serial_number[SERIAL_NUMBER_LENGTH_MAX];
|
|
char model_name[MODEL_NAME_LENGTH_MAX];
|
|
int result;
|
|
char *pos;
|
|
char *i_pos;
|
|
char *model_pos;
|
|
char *device_pos;
|
|
char *prev_pos;
|
|
int api_level;
|
|
int disable_interface;
|
|
|
|
/* NOTE: It seems that "adb devices" and "adb shell" closed connection
|
|
so cannot send next command after them, there is need to reconnect */
|
|
|
|
sock = adb_connect(adb_server_ip, adb_server_tcp_port);
|
|
if (sock == INVALID_SOCKET)
|
|
return EXIT_CODE_INVALID_SOCKET_INTERFACES_LIST;
|
|
|
|
device_list = adb_send_and_receive(sock, adb_devices, packet, sizeof(packet), &device_length);
|
|
closesocket(sock);
|
|
|
|
if (!device_list) {
|
|
g_warning("Cannot get list of interfaces from devices");
|
|
|
|
return EXIT_CODE_CANNOT_GET_INTERFACES_LIST;
|
|
}
|
|
|
|
device_list[device_length] = '\0';
|
|
pos = (char *) device_list;
|
|
|
|
while (pos < (char *) (device_list + device_length)) {
|
|
prev_pos = pos;
|
|
pos = strchr(pos, ' ');
|
|
i_pos = pos;
|
|
result = (int) (pos - prev_pos);
|
|
pos = strchr(pos, '\n') + 1;
|
|
if (result >= (int) sizeof(serial_number)) {
|
|
g_warning("Serial number too long, ignore device");
|
|
continue;
|
|
}
|
|
memcpy(serial_number, prev_pos, result);
|
|
serial_number[result] = '\0';
|
|
|
|
model_name[0] = '\0';
|
|
model_pos = g_strstr_len(i_pos, pos - i_pos, "model:");
|
|
if (model_pos) {
|
|
device_pos = g_strstr_len(i_pos, pos - i_pos, "device:");
|
|
if (device_pos && device_pos - model_pos - 6 - 1 < MODEL_NAME_LENGTH_MAX) {
|
|
memcpy(model_name, model_pos + 6, device_pos - model_pos - 6 - 1);
|
|
model_name[device_pos - model_pos - 6 - 1] = '\0';
|
|
}
|
|
}
|
|
|
|
if (model_name[0] == '\0')
|
|
strcpy(model_name, "unknown");
|
|
|
|
g_debug("Processing device: \"%s\" <%s>" , serial_number, model_name);
|
|
|
|
/* Function will only add tcpdump interfaces if tcpdump is present on the device */
|
|
result = add_tcpdump_interfaces(extcap_conf, adb_server_ip, adb_server_tcp_port, serial_number );
|
|
if (result) {
|
|
g_warning("Error while adding tcpdump interfaces");
|
|
}
|
|
|
|
sock = adb_connect_transport(adb_server_ip, adb_server_tcp_port, serial_number);
|
|
if (sock == INVALID_SOCKET) continue;
|
|
|
|
response = adb_send_and_read(sock, adb_api_level, helpful_packet, sizeof(helpful_packet), &data_length);
|
|
closesocket(sock);
|
|
|
|
if (!response) {
|
|
g_warning("Error on socket: <%s>", helpful_packet);
|
|
continue;
|
|
}
|
|
|
|
response[data_length] = '\0';
|
|
api_level = (int) g_ascii_strtoll(response, NULL, 10);
|
|
g_debug("Android API Level for %s is %i", serial_number, api_level);
|
|
|
|
if (api_level < 21) {
|
|
new_interface(extcap_conf, INTERFACE_ANDROID_LOGCAT_MAIN, model_name, serial_number, "Android Logcat Main");
|
|
new_interface(extcap_conf, INTERFACE_ANDROID_LOGCAT_SYSTEM, model_name, serial_number, "Android Logcat System");
|
|
new_interface(extcap_conf, INTERFACE_ANDROID_LOGCAT_RADIO, model_name, serial_number, "Android Logcat Radio");
|
|
new_interface(extcap_conf, INTERFACE_ANDROID_LOGCAT_EVENTS, model_name, serial_number, "Android Logcat Events");
|
|
|
|
new_interface(extcap_conf, INTERFACE_ANDROID_LOGCAT_TEXT_MAIN, model_name, serial_number, "Android Logcat Main");
|
|
new_interface(extcap_conf, INTERFACE_ANDROID_LOGCAT_TEXT_SYSTEM, model_name, serial_number, "Android Logcat System");
|
|
new_interface(extcap_conf, INTERFACE_ANDROID_LOGCAT_TEXT_RADIO, model_name, serial_number, "Android Logcat Radio");
|
|
new_interface(extcap_conf, INTERFACE_ANDROID_LOGCAT_TEXT_EVENTS, model_name, serial_number, "Android Logcat Events");
|
|
} else {
|
|
new_interface(extcap_conf, INTERFACE_ANDROID_LOGCAT_TEXT_MAIN, model_name, serial_number, "Android Logcat Main");
|
|
new_interface(extcap_conf, INTERFACE_ANDROID_LOGCAT_TEXT_SYSTEM, model_name, serial_number, "Android Logcat System");
|
|
new_interface(extcap_conf, INTERFACE_ANDROID_LOGCAT_TEXT_RADIO, model_name, serial_number, "Android Logcat Radio");
|
|
new_interface(extcap_conf, INTERFACE_ANDROID_LOGCAT_TEXT_EVENTS, model_name, serial_number, "Android Logcat Events");
|
|
new_interface(extcap_conf, INTERFACE_ANDROID_LOGCAT_TEXT_CRASH, model_name, serial_number, "Android Logcat Crash");
|
|
}
|
|
|
|
if (api_level >= 5 && api_level < 17) {
|
|
disable_interface = 0;
|
|
|
|
sock = adb_connect_transport(adb_server_ip, adb_server_tcp_port, serial_number);
|
|
if (sock == INVALID_SOCKET) continue;
|
|
|
|
response = adb_send_and_read(sock, adb_hcidump_version, helpful_packet, sizeof(helpful_packet), &data_length);
|
|
closesocket(sock);
|
|
|
|
if (!response || data_length < 1) {
|
|
g_warning("Error while getting hcidump version by <%s> (%p len=%"G_GSSIZE_FORMAT")",
|
|
adb_hcidump_version, (void*)response, data_length);
|
|
g_debug("Android hcidump version for %s is unknown", serial_number);
|
|
disable_interface = 1;
|
|
} else {
|
|
response[data_length] = '\0';
|
|
|
|
if (g_ascii_strtoull(response, NULL, 10) == 0) {
|
|
g_debug("Android hcidump version for %s is unknown", serial_number);
|
|
disable_interface = 1;
|
|
} else {
|
|
g_debug("Android hcidump version for %s is %s", serial_number, response);
|
|
}
|
|
}
|
|
|
|
if (!disable_interface) {
|
|
new_interface(extcap_conf, INTERFACE_ANDROID_BLUETOOTH_HCIDUMP, model_name, serial_number, "Android Bluetooth Hcidump");
|
|
}
|
|
}
|
|
|
|
if (api_level >= 17 && api_level < 21) {
|
|
disable_interface = 0;
|
|
sock = adb_connect_transport(adb_server_ip, adb_server_tcp_port, serial_number);
|
|
if (sock == INVALID_SOCKET) continue;
|
|
|
|
response = adb_send_and_read(sock, adb_ps_droid_bluetooth, helpful_packet, sizeof(helpful_packet), &data_length);
|
|
closesocket(sock);
|
|
if (!response || data_length < 1) {
|
|
g_warning("Error while getting Bluetooth application process id by <%s> "
|
|
"(%p len=%"G_GSSIZE_FORMAT")", adb_ps_droid_bluetooth, (void*)response, data_length);
|
|
g_debug( "Android Bluetooth application PID for %s is unknown", serial_number);
|
|
disable_interface = 1;
|
|
} else {
|
|
char *data_str;
|
|
char pid[16];
|
|
|
|
memset(pid, 0, sizeof(pid));
|
|
response[data_length] = '\0';
|
|
|
|
data_str = strchr(response, '\n');
|
|
if (data_str && sscanf(data_str, "%*s %15s", pid) == 1) {
|
|
g_debug("Android Bluetooth application PID for %s is %s", serial_number, pid);
|
|
|
|
result = g_snprintf(check_port_buf, sizeof(check_port_buf), adb_check_port_templace, pid);
|
|
if (result <= 0 || result > (int)sizeof(check_port_buf)) {
|
|
g_warning("Error while completing adb packet");
|
|
return EXIT_CODE_BAD_SIZE_OF_ASSEMBLED_ADB_PACKET_6;
|
|
}
|
|
|
|
sock = adb_connect_transport(adb_server_ip, adb_server_tcp_port, serial_number);
|
|
if (sock == INVALID_SOCKET) continue;
|
|
|
|
response = adb_send_and_read(sock, check_port_buf, helpful_packet, sizeof(helpful_packet), &data_length);
|
|
closesocket(sock);
|
|
|
|
if (!response) {
|
|
disable_interface = 1;
|
|
} else {
|
|
response[data_length] = '\0';
|
|
|
|
data_str = strchr(response, '\n');
|
|
if (data_str && sscanf(data_str, "%*s %15s", pid) == 1 && strlen(pid) > 10 && strcmp(pid + 9, "10EA") == 0) {
|
|
g_debug("Bluedroid External Parser Port for %s is %s", serial_number, pid + 9);
|
|
} else {
|
|
disable_interface = 1;
|
|
g_debug("Bluedroid External Parser Port for %s is unknown", serial_number);
|
|
}
|
|
}
|
|
} else {
|
|
disable_interface = 1;
|
|
g_debug("Android Bluetooth application PID for %s is unknown", serial_number);
|
|
}
|
|
}
|
|
|
|
if (!disable_interface) {
|
|
new_interface(extcap_conf, INTERFACE_ANDROID_BLUETOOTH_EXTERNAL_PARSER, model_name, serial_number, "Android Bluetooth External Parser");
|
|
}
|
|
}
|
|
|
|
if (api_level >= 21) {
|
|
const char* ps_cmd;
|
|
disable_interface = 0;
|
|
|
|
if (api_level >= 26) {
|
|
ps_cmd = adb_ps_all_with_grep;
|
|
} else if (api_level >= 24) {
|
|
ps_cmd = adb_ps_with_grep;
|
|
} else if (api_level >= 23) {
|
|
ps_cmd = adb_ps_bluetooth_app;
|
|
} else {
|
|
ps_cmd = adb_ps_droid_bluetooth;
|
|
}
|
|
sock = adb_connect_transport(adb_server_ip, adb_server_tcp_port, serial_number);
|
|
if (sock == INVALID_SOCKET) continue;
|
|
|
|
response = adb_send_and_read(sock, ps_cmd, helpful_packet, sizeof(helpful_packet), &data_length);
|
|
closesocket(sock);
|
|
|
|
if (!response || data_length < 1) {
|
|
g_warning("Error while getting Bluetooth application process id by <%s> "
|
|
"(%p len=%"G_GSSIZE_FORMAT")", ps_cmd, (void*)response, data_length);
|
|
g_debug("Android Bluetooth application PID for %s is unknown", serial_number);
|
|
disable_interface = 1;
|
|
} else {
|
|
char *data_str;
|
|
char pid[16];
|
|
|
|
memset(pid, 0, sizeof(pid));
|
|
response[data_length] = '\0';
|
|
|
|
if (api_level >= 24)
|
|
data_str = response;
|
|
else
|
|
data_str = strchr(response, '\n');
|
|
|
|
if (data_str && sscanf(data_str, "%*s %15s", pid) == 1) {
|
|
g_debug("Android Bluetooth application PID for %s is %s", serial_number, pid);
|
|
|
|
result = g_snprintf(check_port_buf, sizeof(check_port_buf), adb_check_port_templace, pid);
|
|
if (result <= 0 || result > (int)sizeof(check_port_buf)) {
|
|
g_warning("Error while completing adb packet");
|
|
return EXIT_CODE_BAD_SIZE_OF_ASSEMBLED_ADB_PACKET_9;
|
|
}
|
|
|
|
sock = adb_connect_transport(adb_server_ip, adb_server_tcp_port, serial_number);
|
|
if (sock == INVALID_SOCKET) continue;
|
|
|
|
response = adb_send_and_read(sock, check_port_buf, helpful_packet, sizeof(helpful_packet), &data_length);
|
|
closesocket(sock);
|
|
|
|
if (!response) {
|
|
disable_interface = 1;
|
|
} else {
|
|
response[data_length] = '\0';
|
|
data_str = strtok(response, "\n");
|
|
while (data_str != NULL) {
|
|
if (data_str && sscanf(data_str, "%*s %15s", pid) == 1 && strlen(pid) > 10 && strcmp(pid + 9, "22A8") == 0) {
|
|
g_debug("Btsnoop Net Port for %s is %s", serial_number, pid + 9);
|
|
break;
|
|
}
|
|
data_str = strtok(NULL, "\n");
|
|
}
|
|
if (data_str == NULL) {
|
|
disable_interface = 1;
|
|
g_debug("Btsnoop Net Port for %s is unknown", serial_number);
|
|
}
|
|
}
|
|
} else {
|
|
disable_interface = 1;
|
|
g_debug("Android Bluetooth application PID for %s is unknown", serial_number);
|
|
}
|
|
}
|
|
|
|
if (!disable_interface) {
|
|
new_interface(extcap_conf, INTERFACE_ANDROID_BLUETOOTH_BTSNOOP_NET, model_name, serial_number, "Android Bluetooth Btsnoop Net");
|
|
}
|
|
}
|
|
}
|
|
|
|
return EXIT_CODE_SUCCESS;
|
|
}
|
|
|
|
static int list_config(char *interface) {
|
|
int ret = EXIT_CODE_INVALID_INTERFACE;
|
|
unsigned inc = 0;
|
|
|
|
if (!interface) {
|
|
g_warning("No interface specified.");
|
|
return EXIT_CODE_NO_INTERFACE_SPECIFIED;
|
|
}
|
|
|
|
if (is_specified_interface(interface, INTERFACE_ANDROID_BLUETOOTH_EXTERNAL_PARSER)) {
|
|
printf("arg {number=%u}{call=--adb-server-ip}{display=ADB Server IP Address}{type=string}{default=127.0.0.1}\n", inc++);
|
|
printf("arg {number=%u}{call=--adb-server-tcp-port}{display=ADB Server TCP Port}{type=integer}{range=0,65535}{default=5037}\n", inc++);
|
|
printf("arg {number=%u}{call=--bt-server-tcp-port}{display=Bluetooth Server TCP Port}{type=integer}{range=0,65535}{default=4330}\n", inc++);
|
|
printf("arg {number=%u}{call=--bt-forward-socket}{display=Forward Bluetooth Socket}{type=boolean}{default=false}\n", inc++);
|
|
printf("arg {number=%u}{call=--bt-local-ip}{display=Bluetooth Local IP Address}{type=string}{default=127.0.0.1}\n", inc++);
|
|
printf("arg {number=%u}{call=--bt-local-tcp-port}{display=Bluetooth Local TCP Port}{type=integer}{range=0,65535}{default=4330}{tooltip=Used to do \"adb forward tcp:LOCAL_TCP_PORT tcp:SERVER_TCP_PORT\"}\n", inc++);
|
|
ret = EXIT_CODE_SUCCESS;
|
|
} else if (is_specified_interface(interface, INTERFACE_ANDROID_BLUETOOTH_HCIDUMP) ||
|
|
is_specified_interface(interface, INTERFACE_ANDROID_BLUETOOTH_BTSNOOP_NET) ||
|
|
is_specified_interface(interface, INTERFACE_ANDROID_TCPDUMP)) {
|
|
printf("arg {number=%u}{call=--adb-server-ip}{display=ADB Server IP Address}{type=string}{default=127.0.0.1}\n", inc++);
|
|
printf("arg {number=%u}{call=--adb-server-tcp-port}{display=ADB Server TCP Port}{type=integer}{range=0,65535}{default=5037}\n", inc++);
|
|
ret = EXIT_CODE_SUCCESS;
|
|
} else if (is_logcat_interface(interface)) {
|
|
printf("arg {number=%u}{call=--adb-server-ip}{display=ADB Server IP Address}{type=string}{default=127.0.0.1}\n", inc++);
|
|
printf("arg {number=%u}{call=--adb-server-tcp-port}{display=ADB Server TCP Port}{type=integer}{range=0,65535}{default=5037}\n", inc++);
|
|
printf("arg {number=%u}{call=--logcat-text}{display=Use text logcat}{type=boolean}{default=false}\n", inc++);
|
|
printf("arg {number=%u}{call=--logcat-ignore-log-buffer}{display=Ignore log buffer}{type=boolean}{default=false}\n", inc++);
|
|
printf("arg {number=%u}{call=--logcat-custom-options}{display=Custom logcat parameters}{type=string}\n", inc++);
|
|
ret = EXIT_CODE_SUCCESS;
|
|
} else if (is_logcat_text_interface(interface)) {
|
|
printf("arg {number=%u}{call=--adb-server-ip}{display=ADB Server IP Address}{type=string}{default=127.0.0.1}\n", inc++);
|
|
printf("arg {number=%u}{call=--adb-server-tcp-port}{display=ADB Server TCP Port}{type=integer}{range=0,65535}{default=5037}\n", inc++);
|
|
printf("arg {number=%u}{call=--logcat-ignore-log-buffer}{display=Ignore log buffer}{type=boolean}{default=false}\n", inc++);
|
|
printf("arg {number=%u}{call=--logcat-custom-options}{display=Custom logcat parameters}{type=string}\n", inc++);
|
|
ret = EXIT_CODE_SUCCESS;
|
|
}
|
|
|
|
if (ret != EXIT_CODE_SUCCESS)
|
|
g_warning("Invalid interface: <%s>", interface);
|
|
else
|
|
extcap_config_debug(&inc);
|
|
|
|
return ret;
|
|
}
|
|
|
|
/*----------------------------------------------------------------------------*/
|
|
/* Android Bluetooth Hcidump */
|
|
/*----------------------------------------------------------------------------*/
|
|
|
|
static int capture_android_bluetooth_hcidump(char *interface, char *fifo,
|
|
const char *adb_server_ip, unsigned short *adb_server_tcp_port) {
|
|
struct extcap_dumper extcap_dumper;
|
|
static char data[PACKET_LENGTH];
|
|
static char packet[PACKET_LENGTH];
|
|
gssize length;
|
|
gssize used_buffer_length = 0;
|
|
socket_handle_t sock = INVALID_SOCKET;
|
|
const char *adb_shell_hcidump = "shell:hcidump -R -t";
|
|
const char *adb_shell_su_hcidump = "shell:su -c hcidump -R -t";
|
|
int result;
|
|
char *serial_number;
|
|
time_t ts = 0;
|
|
unsigned int captured_length;
|
|
gint64 hex;
|
|
char *hex_data;
|
|
char *new_hex_data;
|
|
own_pcap_bluetooth_h4_header *h4_header;
|
|
gint64 raw_length = 0;
|
|
gint64 frame_length;
|
|
int ms = 0;
|
|
struct tm date;
|
|
char direction_character;
|
|
|
|
SET_DATA(h4_header, value_own_pcap_bluetooth_h4_header, packet);
|
|
|
|
extcap_dumper = extcap_dumper_open(fifo, EXTCAP_ENCAP_BLUETOOTH_H4_WITH_PHDR);
|
|
|
|
serial_number = get_serial_from_interface(interface);
|
|
sock = adb_connect_transport(adb_server_ip, adb_server_tcp_port, serial_number);
|
|
if (sock == INVALID_SOCKET)
|
|
return EXIT_CODE_INVALID_SOCKET_3;
|
|
|
|
result = adb_send(sock, adb_shell_hcidump);
|
|
if (result) {
|
|
g_warning("Error while starting capture by sending command: %s", adb_shell_hcidump);
|
|
closesocket(sock);
|
|
return EXIT_CODE_GENERIC;
|
|
}
|
|
|
|
while (endless_loop) {
|
|
char *i_position;
|
|
|
|
errno = 0;
|
|
length = recv(sock, data + used_buffer_length, (int)(PACKET_LENGTH - used_buffer_length), 0);
|
|
if (errno == EAGAIN
|
|
#if EWOULDBLOCK != EAGAIN
|
|
|| errno == EWOULDBLOCK
|
|
#endif
|
|
) {
|
|
continue;
|
|
}
|
|
else if (errno != 0) {
|
|
g_warning("ERROR capture: %s", strerror(errno));
|
|
closesocket(sock);
|
|
return EXIT_CODE_GENERIC;
|
|
}
|
|
|
|
if (length <= 0) {
|
|
g_warning("Broken socket connection.");
|
|
closesocket(sock);
|
|
return EXIT_CODE_GENERIC;
|
|
}
|
|
|
|
used_buffer_length += length;
|
|
i_position = (char *) memchr(data, '\n', used_buffer_length);
|
|
if (i_position && i_position < data + used_buffer_length) {
|
|
char *state_line_position = i_position + 1;
|
|
|
|
if (!strncmp(data, "/system/bin/sh: hcidump: not found", 34)) {
|
|
g_warning("Command not found for <%s>", adb_shell_hcidump);
|
|
closesocket(sock);
|
|
return EXIT_CODE_GENERIC;
|
|
}
|
|
|
|
i_position = (char *) memchr(i_position + 1, '\n', used_buffer_length);
|
|
if (i_position) {
|
|
i_position += 1;
|
|
if (!strncmp(state_line_position, "Can't access device: Permission denied", 38)) {
|
|
g_warning("No permission for command <%s>", adb_shell_hcidump);
|
|
used_buffer_length = 0;
|
|
closesocket(sock);
|
|
sock = INVALID_SOCKET;
|
|
break;
|
|
}
|
|
memmove(data, i_position, used_buffer_length - (i_position - data));
|
|
used_buffer_length = used_buffer_length - (gssize)(i_position - data);
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
|
|
if (sock == INVALID_SOCKET) {
|
|
sock = adb_connect_transport(adb_server_ip, adb_server_tcp_port, serial_number);
|
|
if (sock == INVALID_SOCKET)
|
|
return EXIT_CODE_INVALID_SOCKET_4;
|
|
|
|
result = adb_send(sock, adb_shell_su_hcidump);
|
|
if (result) {
|
|
g_warning("Error while starting capture by sending command: <%s>", adb_shell_su_hcidump);
|
|
closesocket(sock);
|
|
return EXIT_CODE_GENERIC;
|
|
}
|
|
|
|
used_buffer_length = 0;
|
|
while (endless_loop) {
|
|
char *i_position;
|
|
|
|
errno = 0;
|
|
length = recv(sock, data + used_buffer_length, (int)(PACKET_LENGTH - used_buffer_length), 0);
|
|
if (errno == EAGAIN
|
|
#if EWOULDBLOCK != EAGAIN
|
|
|| errno == EWOULDBLOCK
|
|
#endif
|
|
) {
|
|
continue;
|
|
}
|
|
else if (errno != 0) {
|
|
g_warning("ERROR capture: %s", strerror(errno));
|
|
closesocket(sock);
|
|
return EXIT_CODE_GENERIC;
|
|
}
|
|
|
|
if (length <= 0) {
|
|
g_warning("Broken socket connection.");
|
|
closesocket(sock);
|
|
return EXIT_CODE_GENERIC;
|
|
}
|
|
|
|
used_buffer_length += length;
|
|
i_position = (char *) memchr(data, '\n', used_buffer_length);
|
|
if (i_position && i_position < data + used_buffer_length) {
|
|
if (!strncmp(data, "/system/bin/sh: su: not found", 29)) {
|
|
g_warning("Command 'su' not found for <%s>", adb_shell_su_hcidump);
|
|
closesocket(sock);
|
|
return EXIT_CODE_GENERIC;
|
|
}
|
|
|
|
i_position = (char *) memchr(i_position + 1, '\n', used_buffer_length);
|
|
if (i_position) {
|
|
i_position += 1;
|
|
memmove(data, i_position, used_buffer_length - (i_position - data));
|
|
used_buffer_length = used_buffer_length - (gssize)(i_position - data);
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
while (endless_loop) {
|
|
errno = 0;
|
|
length = recv(sock, data + used_buffer_length, (int)(PACKET_LENGTH - used_buffer_length), 0);
|
|
if (errno == EAGAIN
|
|
#if EWOULDBLOCK != EAGAIN
|
|
|| errno == EWOULDBLOCK
|
|
#endif
|
|
) {
|
|
continue;
|
|
}
|
|
else if (errno != 0) {
|
|
g_warning("ERROR capture: %s", strerror(errno));
|
|
closesocket(sock);
|
|
return EXIT_CODE_GENERIC;
|
|
}
|
|
|
|
if (length <= 0) {
|
|
g_warning("Broken socket connection.");
|
|
closesocket(sock);
|
|
return EXIT_CODE_GENERIC;
|
|
}
|
|
|
|
while (endless_loop) {
|
|
if (used_buffer_length + length >= 1) {
|
|
hex_data = data + 29;
|
|
hex = g_ascii_strtoll(hex_data, &new_hex_data, 16);
|
|
|
|
if ((hex == 0x01 && used_buffer_length + length >= 4) ||
|
|
(hex == 0x02 && used_buffer_length + length >= 5) ||
|
|
(hex == 0x04 && used_buffer_length + length >= 3)) {
|
|
|
|
if (hex == 0x01) {
|
|
hex_data = new_hex_data;
|
|
hex = g_ascii_strtoll(hex_data, &new_hex_data, 16);
|
|
if (hex < 0 || hex >= 256 || hex_data == new_hex_data) {
|
|
g_warning("data format %s", strerror(errno));
|
|
closesocket(sock);
|
|
return EXIT_CODE_GENERIC;
|
|
}
|
|
|
|
hex_data = new_hex_data;
|
|
hex = g_ascii_strtoll(hex_data, &new_hex_data, 16);
|
|
if (hex < 0 || hex >= 256 || hex_data == new_hex_data) {
|
|
g_warning("data format %s", strerror(errno));
|
|
closesocket(sock);
|
|
return EXIT_CODE_GENERIC;
|
|
}
|
|
|
|
hex_data = new_hex_data;
|
|
hex = g_ascii_strtoll(hex_data, &new_hex_data, 16);
|
|
|
|
raw_length = hex + 4;
|
|
} else if (hex == 0x04) {
|
|
hex_data = new_hex_data;
|
|
hex = g_ascii_strtoll(hex_data, &new_hex_data, 16);
|
|
if (hex < 0 || hex >= 256 || hex_data == new_hex_data) {
|
|
g_warning("data format %s", strerror(errno));
|
|
closesocket(sock);
|
|
return EXIT_CODE_GENERIC;
|
|
}
|
|
|
|
hex_data = new_hex_data;
|
|
hex = g_ascii_strtoll(hex_data, &new_hex_data, 16);
|
|
|
|
raw_length = hex + 3;
|
|
} else if (hex == 0x02) {
|
|
hex_data = new_hex_data;
|
|
hex = g_ascii_strtoll(hex_data, &new_hex_data, 16);
|
|
if (hex < 0 || hex >= 256 || hex_data == new_hex_data) {
|
|
g_warning("data format %s", strerror(errno));
|
|
closesocket(sock);
|
|
return EXIT_CODE_GENERIC;
|
|
}
|
|
|
|
hex_data = new_hex_data;
|
|
hex = g_ascii_strtoll(hex_data, &new_hex_data, 16);
|
|
if (hex < 0 || hex >= 256 || hex_data == new_hex_data) {
|
|
g_warning("data format %s", strerror(errno));
|
|
closesocket(sock);
|
|
return EXIT_CODE_GENERIC;
|
|
}
|
|
|
|
hex_data = new_hex_data;
|
|
hex = g_ascii_strtoll(hex_data, &new_hex_data, 16);
|
|
raw_length = hex + 5;
|
|
|
|
hex_data = new_hex_data;
|
|
hex = g_ascii_strtoll(hex_data, &new_hex_data, 16);
|
|
raw_length += hex << 8;
|
|
}
|
|
|
|
} else {
|
|
g_warning("bad raw stream");
|
|
closesocket(sock);
|
|
return EXIT_CODE_GENERIC;
|
|
}
|
|
} else {
|
|
used_buffer_length += length;
|
|
break;
|
|
}
|
|
|
|
frame_length = raw_length * 3 + (raw_length / 20) * 4 + ((raw_length % 20) ? 2 : -2) + 29;
|
|
|
|
if (used_buffer_length + length < frame_length) {
|
|
used_buffer_length += length;
|
|
break;
|
|
}
|
|
|
|
if (8 == sscanf(data, "%04d-%02d-%02d %02d:%02d:%02d.%06d %c",
|
|
&date.tm_year, &date.tm_mon, &date.tm_mday, &date.tm_hour,
|
|
&date.tm_min, &date.tm_sec, &ms, &direction_character)) {
|
|
|
|
g_debug("time %04d-%02d-%02d %02d:%02d:%02d.%06d %c",
|
|
date.tm_year, date.tm_mon, date.tm_mday, date.tm_hour,
|
|
date.tm_min, date.tm_sec, ms, direction_character);
|
|
date.tm_mon -= 1;
|
|
date.tm_year -= 1900;
|
|
date.tm_isdst = -1;
|
|
ts = mktime(&date);
|
|
|
|
new_hex_data = data + 29;
|
|
}
|
|
|
|
captured_length = 0;
|
|
|
|
while ((long)(new_hex_data - data + sizeof(own_pcap_bluetooth_h4_header)) < frame_length) {
|
|
hex_data = new_hex_data;
|
|
hex = g_ascii_strtoll(hex_data, &new_hex_data, 16);
|
|
|
|
packet[sizeof(own_pcap_bluetooth_h4_header) + captured_length] = (char) hex;
|
|
captured_length += 1;
|
|
}
|
|
|
|
h4_header->direction = GINT32_TO_BE(direction_character == '>');
|
|
|
|
endless_loop = extcap_dumper_dump(extcap_dumper, fifo, packet,
|
|
captured_length + sizeof(own_pcap_bluetooth_h4_header),
|
|
captured_length + sizeof(own_pcap_bluetooth_h4_header),
|
|
ts,
|
|
ms * 1000);
|
|
|
|
if (used_buffer_length + length >= frame_length) {
|
|
memmove(data, data + frame_length, (size_t)(used_buffer_length + length - frame_length));
|
|
used_buffer_length = (gssize)(used_buffer_length + length - frame_length);
|
|
length = 0;
|
|
continue;
|
|
}
|
|
length = 0;
|
|
}
|
|
}
|
|
|
|
closesocket(sock);
|
|
return EXIT_CODE_SUCCESS;
|
|
}
|
|
|
|
/*----------------------------------------------------------------------------*/
|
|
/* Android Bluetooth External Parser */
|
|
/*----------------------------------------------------------------------------*/
|
|
|
|
#define BLUEDROID_H4_PACKET_TYPE 0
|
|
#define BLUEDROID_TIMESTAMP_SIZE 8
|
|
#define BLUEDROID_H4_SIZE 1
|
|
|
|
static const uint64_t BLUEDROID_TIMESTAMP_BASE = G_GUINT64_CONSTANT(0x00dcddb30f2f8000);
|
|
|
|
#define BLUEDROID_H4_PACKET_TYPE_HCI_CMD 0x01
|
|
#define BLUEDROID_H4_PACKET_TYPE_ACL 0x02
|
|
#define BLUEDROID_H4_PACKET_TYPE_SCO 0x03
|
|
#define BLUEDROID_H4_PACKET_TYPE_HCI_EVT 0x04
|
|
|
|
#define BLUEDROID_DIRECTION_SENT 0
|
|
#define BLUEDROID_DIRECTION_RECV 1
|
|
|
|
static int adb_forward(char *serial_number, const char *adb_server_ip, unsigned short *adb_server_tcp_port,
|
|
unsigned short local_tcp_port, unsigned short server_tcp_port) {
|
|
socket_handle_t sock;
|
|
int result;
|
|
static char helpful_packet[PACKET_LENGTH];
|
|
static const char *adb_forward_template = "%s%s:forward:tcp:%05u;tcp:%05u";
|
|
|
|
sock = adb_connect(adb_server_ip, adb_server_tcp_port);
|
|
if (sock == INVALID_SOCKET)
|
|
return EXIT_CODE_INVALID_SOCKET_5;
|
|
|
|
result = g_snprintf(helpful_packet, PACKET_LENGTH, adb_forward_template, (serial_number) ? "host-serial:" : "host", (serial_number) ? serial_number: "", local_tcp_port, server_tcp_port);
|
|
if (result <= 0 || result > PACKET_LENGTH) {
|
|
g_warning("Error while completing adb packet");
|
|
closesocket(sock);
|
|
return EXIT_CODE_BAD_SIZE_OF_ASSEMBLED_ADB_PACKET_12;
|
|
}
|
|
|
|
result = adb_send(sock, helpful_packet);
|
|
closesocket(sock);
|
|
|
|
return result;
|
|
}
|
|
|
|
static int capture_android_bluetooth_external_parser(char *interface,
|
|
char *fifo, const char *adb_server_ip, unsigned short *adb_server_tcp_port,
|
|
unsigned short *bt_server_tcp_port, unsigned int bt_forward_socket, const char *bt_local_ip,
|
|
unsigned short *bt_local_tcp_port) {
|
|
struct extcap_dumper extcap_dumper;
|
|
static char buffer[PACKET_LENGTH];
|
|
uint64_t *timestamp;
|
|
char *packet = buffer + BLUEDROID_TIMESTAMP_SIZE - sizeof(own_pcap_bluetooth_h4_header); /* skip timestamp (8 bytes) and reuse its space for header */
|
|
own_pcap_bluetooth_h4_header *h4_header;
|
|
guint8 *payload = packet + sizeof(own_pcap_bluetooth_h4_header);
|
|
const char *adb_tcp_bluedroid_external_parser_template = "tcp:%05u";
|
|
socklen_t slen;
|
|
gssize length;
|
|
gssize used_buffer_length = 0;
|
|
uint64_t ts;
|
|
socket_handle_t sock;
|
|
struct sockaddr_in server;
|
|
int captured_length;
|
|
char *serial_number;
|
|
static unsigned int id = 1;
|
|
struct sockaddr_in client;
|
|
|
|
SET_DATA(timestamp, value_u64, buffer);
|
|
SET_DATA(h4_header, value_own_pcap_bluetooth_h4_header, packet);
|
|
|
|
extcap_dumper = extcap_dumper_open(fifo, EXTCAP_ENCAP_BLUETOOTH_H4_WITH_PHDR);
|
|
serial_number = get_serial_from_interface(interface);
|
|
|
|
if (bt_forward_socket) {
|
|
if ((sock = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP)) == INVALID_SOCKET) {
|
|
g_warning("Cannot open system TCP socket: %s", strerror(errno));
|
|
return EXIT_CODE_GENERIC;
|
|
}
|
|
|
|
g_debug("Using config: Server TCP Port=%u, Local IP=%s, Local TCP Port=%u",
|
|
*bt_server_tcp_port, bt_local_ip, *bt_local_tcp_port);
|
|
|
|
if (*bt_local_tcp_port != 0) {
|
|
int result;
|
|
|
|
result = adb_forward(serial_number, adb_server_ip, adb_server_tcp_port, *bt_local_tcp_port, *bt_server_tcp_port);
|
|
g_debug("DO: adb forward tcp:%u (local) tcp:%u (remote) result=%i",
|
|
*bt_local_tcp_port, *bt_server_tcp_port, result);
|
|
}
|
|
|
|
memset(&server, 0 , sizeof(server));
|
|
server.sin_family = AF_INET;
|
|
server.sin_port = GINT16_TO_BE(*bt_local_tcp_port);
|
|
ws_inet_pton4(bt_local_ip, &(server.sin_addr.s_addr));
|
|
|
|
useSndTimeout(sock);
|
|
|
|
if (connect(sock, (struct sockaddr *) &server, sizeof(server)) == SOCKET_ERROR) {
|
|
g_warning("<%s> Please check that adb daemon is running.", strerror(errno));
|
|
closesocket(sock);
|
|
return EXIT_CODE_GENERIC;
|
|
}
|
|
|
|
slen = (socklen_t)sizeof(client);
|
|
if (getsockname(sock, (struct sockaddr *) &client, &slen)) {
|
|
g_warning("getsockname: %s", strerror(errno));
|
|
closesocket(sock);
|
|
return EXIT_CODE_GENERIC;
|
|
}
|
|
|
|
if (slen != sizeof(client)) {
|
|
g_warning("incorrect length");
|
|
closesocket(sock);
|
|
return EXIT_CODE_GENERIC;
|
|
}
|
|
|
|
g_debug("Client port %u", GUINT16_FROM_BE(client.sin_port));
|
|
} else {
|
|
int result;
|
|
|
|
sock = adb_connect_transport(adb_server_ip, adb_server_tcp_port, serial_number);
|
|
if (sock == INVALID_SOCKET)
|
|
return EXIT_CODE_INVALID_SOCKET_6;
|
|
|
|
result = g_snprintf((char *) buffer, PACKET_LENGTH, adb_tcp_bluedroid_external_parser_template, *bt_server_tcp_port);
|
|
if (result <= 0 || result > PACKET_LENGTH) {
|
|
g_warning("Error while completing adb packet");
|
|
closesocket(sock);
|
|
return EXIT_CODE_BAD_SIZE_OF_ASSEMBLED_ADB_PACKET_14;
|
|
}
|
|
|
|
result = adb_send(sock, buffer);
|
|
if (result) {
|
|
g_warning("Error while forwarding adb port");
|
|
closesocket(sock);
|
|
return EXIT_CODE_GENERIC;
|
|
}
|
|
}
|
|
|
|
while (endless_loop) {
|
|
errno = 0;
|
|
length = recv(sock, buffer + used_buffer_length, (int)(PACKET_LENGTH - used_buffer_length), 0);
|
|
if (errno == EAGAIN
|
|
#if EWOULDBLOCK != EAGAIN
|
|
|| errno == EWOULDBLOCK
|
|
#endif
|
|
) {
|
|
continue;
|
|
}
|
|
else if (errno != 0) {
|
|
g_warning("ERROR capture: %s", strerror(errno));
|
|
closesocket(sock);
|
|
return EXIT_CODE_GENERIC;
|
|
}
|
|
|
|
if (length <= 0) {
|
|
if (bt_forward_socket) {
|
|
/* NOTE: Workaround... It seems that Bluedroid is slower and we can connect to socket that are not really ready... */
|
|
g_warning("Broken socket connection. Try reconnect.");
|
|
closesocket(sock);
|
|
|
|
if ((sock = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP)) == INVALID_SOCKET) {
|
|
g_warning("%s", strerror(errno));
|
|
return EXIT_CODE_GENERIC;
|
|
}
|
|
|
|
server.sin_family = AF_INET;
|
|
server.sin_port = GINT16_TO_BE(*bt_local_tcp_port);
|
|
ws_inet_pton4(bt_local_ip, &(server.sin_addr.s_addr));
|
|
|
|
useSndTimeout(sock);
|
|
|
|
if (connect(sock, (struct sockaddr *) &server, sizeof(server)) == SOCKET_ERROR) {
|
|
g_warning("ERROR reconnect: <%s> Please check that adb daemon is running.", strerror(errno));
|
|
closesocket(sock);
|
|
return EXIT_CODE_GENERIC;
|
|
}
|
|
} else {
|
|
g_warning("Broken socket connection.");
|
|
closesocket(sock);
|
|
return EXIT_CODE_GENERIC;
|
|
}
|
|
|
|
continue;
|
|
}
|
|
|
|
used_buffer_length += length;
|
|
|
|
g_debug("Received: length=%"G_GSSIZE_FORMAT"", length);
|
|
|
|
while (((payload[BLUEDROID_H4_PACKET_TYPE] == BLUEDROID_H4_PACKET_TYPE_HCI_CMD || payload[BLUEDROID_H4_PACKET_TYPE] == BLUEDROID_H4_PACKET_TYPE_SCO) &&
|
|
used_buffer_length >= BLUEDROID_TIMESTAMP_SIZE + BLUEDROID_H4_SIZE + 2 + 1 &&
|
|
BLUEDROID_TIMESTAMP_SIZE + BLUEDROID_H4_SIZE + 2 + payload[BLUEDROID_H4_SIZE + 2] + 1 <= used_buffer_length) ||
|
|
(payload[BLUEDROID_H4_PACKET_TYPE] == BLUEDROID_H4_PACKET_TYPE_ACL &&
|
|
used_buffer_length >= BLUEDROID_TIMESTAMP_SIZE + BLUEDROID_H4_SIZE + 2 + 2 &&
|
|
BLUEDROID_TIMESTAMP_SIZE + BLUEDROID_H4_SIZE + 2 + payload[BLUEDROID_H4_SIZE + 2] + (payload[BLUEDROID_H4_SIZE + 2 + 1] << 8) + 2 <= used_buffer_length) ||
|
|
(payload[BLUEDROID_H4_PACKET_TYPE] == BLUEDROID_H4_PACKET_TYPE_SCO &&
|
|
used_buffer_length >= BLUEDROID_TIMESTAMP_SIZE + BLUEDROID_H4_SIZE + 2 + 1 &&
|
|
BLUEDROID_TIMESTAMP_SIZE + BLUEDROID_H4_SIZE + 2 + payload[BLUEDROID_H4_SIZE + 2] + 1 <= used_buffer_length) ||
|
|
(payload[BLUEDROID_H4_PACKET_TYPE] == BLUEDROID_H4_PACKET_TYPE_HCI_EVT &&
|
|
used_buffer_length >= BLUEDROID_TIMESTAMP_SIZE + BLUEDROID_H4_SIZE + 1 + 1 &&
|
|
BLUEDROID_TIMESTAMP_SIZE + BLUEDROID_H4_SIZE + 1 + payload[BLUEDROID_H4_SIZE + 1] + 1 <= used_buffer_length)) {
|
|
|
|
ts = GINT64_FROM_BE(*timestamp);
|
|
|
|
switch (payload[BLUEDROID_H4_PACKET_TYPE]) {
|
|
case BLUEDROID_H4_PACKET_TYPE_HCI_CMD:
|
|
h4_header->direction = GINT32_TO_BE(BLUEDROID_DIRECTION_SENT);
|
|
|
|
captured_length = (unsigned int)sizeof(own_pcap_bluetooth_h4_header) + payload[3] + 4;
|
|
|
|
length = sizeof(own_pcap_bluetooth_h4_header) + BLUEDROID_H4_SIZE + 2 + 1 + payload[3];
|
|
|
|
break;
|
|
case BLUEDROID_H4_PACKET_TYPE_ACL:
|
|
h4_header->direction = (payload[2] & 0x80) ? GINT32_TO_BE(BLUEDROID_DIRECTION_RECV) : GINT32_TO_BE(BLUEDROID_DIRECTION_SENT);
|
|
|
|
captured_length = (unsigned int)sizeof(own_pcap_bluetooth_h4_header) + payload[3] + (payload[3 + 1] << 8) + 5;
|
|
|
|
length = sizeof(own_pcap_bluetooth_h4_header) + BLUEDROID_H4_SIZE + 2 + 2 + payload[3] + (gssize)(payload[3 + 1] << 8);
|
|
|
|
break;
|
|
case BLUEDROID_H4_PACKET_TYPE_SCO:
|
|
h4_header->direction = (payload[2] & 0x80) ? GINT32_TO_BE(BLUEDROID_DIRECTION_RECV) : GINT32_TO_BE(BLUEDROID_DIRECTION_SENT);
|
|
|
|
captured_length = (unsigned int)sizeof(own_pcap_bluetooth_h4_header) + payload[3] + 4;
|
|
|
|
length = sizeof(own_pcap_bluetooth_h4_header) + BLUEDROID_H4_SIZE + 2 + 1 + payload[3];
|
|
|
|
break;
|
|
case BLUEDROID_H4_PACKET_TYPE_HCI_EVT:
|
|
h4_header->direction = GINT32_TO_BE(BLUEDROID_DIRECTION_RECV);
|
|
|
|
captured_length = (unsigned int)sizeof(own_pcap_bluetooth_h4_header) + payload[2] + 3;
|
|
|
|
length = sizeof(own_pcap_bluetooth_h4_header) + BLUEDROID_H4_SIZE + 1 + 1 + payload[2];
|
|
|
|
break;
|
|
default:
|
|
g_warning("Invalid stream");
|
|
closesocket(sock);
|
|
return EXIT_CODE_GENERIC;
|
|
}
|
|
|
|
g_debug("\t Packet %u: used_buffer_length=%"G_GSSIZE_FORMAT" length=%"G_GSSIZE_FORMAT" captured_length=%i type=0x%02x", id, used_buffer_length, length, captured_length, payload[BLUEDROID_H4_PACKET_TYPE]);
|
|
if (payload[BLUEDROID_H4_PACKET_TYPE] == BLUEDROID_H4_PACKET_TYPE_HCI_EVT)
|
|
g_debug("\t Packet: %02x %02x %02x", (unsigned int) payload[0], (unsigned int) payload[1], (unsigned int)payload[2]);
|
|
id +=1;
|
|
|
|
ts -= BLUEDROID_TIMESTAMP_BASE;
|
|
|
|
endless_loop = extcap_dumper_dump(extcap_dumper, fifo, packet,
|
|
captured_length,
|
|
captured_length,
|
|
(uint32_t)(ts / 1000000),
|
|
((uint32_t)(ts % 1000000)) * 1000);
|
|
|
|
used_buffer_length -= length - sizeof(own_pcap_bluetooth_h4_header) + BLUEDROID_TIMESTAMP_SIZE;
|
|
if (used_buffer_length < 0) {
|
|
g_warning("Internal Negative used buffer length.");
|
|
closesocket(sock);
|
|
return EXIT_CODE_GENERIC;
|
|
}
|
|
memmove(buffer, packet + length, used_buffer_length);
|
|
}
|
|
}
|
|
|
|
closesocket(sock);
|
|
return EXIT_CODE_SUCCESS;
|
|
}
|
|
|
|
/*----------------------------------------------------------------------------*/
|
|
/* Android Btsnoop Net */
|
|
/*----------------------------------------------------------------------------*/
|
|
|
|
static int capture_android_bluetooth_btsnoop_net(char *interface, char *fifo,
|
|
const char *adb_server_ip, unsigned short *adb_server_tcp_port) {
|
|
struct extcap_dumper extcap_dumper;
|
|
static char packet[PACKET_LENGTH];
|
|
gssize length;
|
|
gssize used_buffer_length = 0;
|
|
socket_handle_t sock;
|
|
const char *adb_tcp_btsnoop_net = "tcp:8872";
|
|
int result;
|
|
char *serial_number;
|
|
uint64_t ts;
|
|
static const uint64_t BTSNOOP_TIMESTAMP_BASE = G_GUINT64_CONSTANT(0x00dcddb30f2f8000);
|
|
uint32_t *reported_length;
|
|
uint32_t *captured_length;
|
|
uint32_t *flags;
|
|
/* uint32_t *cumulative_dropped_packets; */
|
|
uint64_t *timestamp;
|
|
char *payload = packet + sizeof(own_pcap_bluetooth_h4_header) + 24;
|
|
own_pcap_bluetooth_h4_header *h4_header;
|
|
|
|
SET_DATA(reported_length, value_u32, packet + sizeof(own_pcap_bluetooth_h4_header) + 0);
|
|
SET_DATA(captured_length, value_u32, packet + sizeof(own_pcap_bluetooth_h4_header) + 4);
|
|
SET_DATA(flags, value_u32, packet + sizeof(own_pcap_bluetooth_h4_header) + 8);
|
|
/* SET_DATA(cumulative_dropped_packets, value_u32, packet + sizeof(own_pcap_bluetooth_h4_header) + 12); */
|
|
SET_DATA(timestamp, value_u64, packet + sizeof(own_pcap_bluetooth_h4_header) + 16);
|
|
SET_DATA(h4_header, value_own_pcap_bluetooth_h4_header, payload - sizeof(own_pcap_bluetooth_h4_header));
|
|
|
|
extcap_dumper = extcap_dumper_open(fifo, EXTCAP_ENCAP_BLUETOOTH_H4_WITH_PHDR);
|
|
serial_number = get_serial_from_interface(interface);
|
|
sock = adb_connect_transport(adb_server_ip, adb_server_tcp_port, serial_number);
|
|
if (sock == INVALID_SOCKET)
|
|
return EXIT_CODE_INVALID_SOCKET_7;
|
|
|
|
result = adb_send(sock, adb_tcp_btsnoop_net);
|
|
if (result) {
|
|
g_warning("Error while sending command <%s>", adb_tcp_btsnoop_net);
|
|
closesocket(sock);
|
|
return EXIT_CODE_ERROR_WHILE_SENDING_ADB_PACKET_2;
|
|
}
|
|
|
|
/* Read "btsnoop" header - 16 bytes */
|
|
while (used_buffer_length < BTSNOOP_HDR_LEN) {
|
|
length = recv(sock, packet + used_buffer_length, (int)(BTSNOOP_HDR_LEN - used_buffer_length), 0);
|
|
if (length <= 0) {
|
|
g_warning("Broken socket connection.");
|
|
closesocket(sock);
|
|
return EXIT_CODE_GENERIC;
|
|
}
|
|
used_buffer_length += length;
|
|
}
|
|
used_buffer_length = 0;
|
|
|
|
while (endless_loop) {
|
|
errno = 0;
|
|
length = recv(sock, packet + used_buffer_length + sizeof(own_pcap_bluetooth_h4_header),
|
|
(int)(PACKET_LENGTH - sizeof(own_pcap_bluetooth_h4_header) - used_buffer_length), 0);
|
|
if (errno == EAGAIN
|
|
#if EWOULDBLOCK != EAGAIN
|
|
|| errno == EWOULDBLOCK
|
|
#endif
|
|
) {
|
|
continue;
|
|
}
|
|
else if (errno != 0) {
|
|
g_warning("ERROR capture: %s", strerror(errno));
|
|
closesocket(sock);
|
|
return EXIT_CODE_GENERIC;
|
|
}
|
|
|
|
if (length <= 0) {
|
|
g_warning("Broken socket connection.");
|
|
closesocket(sock);
|
|
return EXIT_CODE_GENERIC;
|
|
}
|
|
|
|
used_buffer_length += length;
|
|
|
|
while (used_buffer_length >= 24 &&
|
|
used_buffer_length >= (int) (24 + GINT32_FROM_BE(*captured_length))) {
|
|
gint32 direction;
|
|
|
|
ts = GINT64_FROM_BE(*timestamp);
|
|
ts -= BTSNOOP_TIMESTAMP_BASE;
|
|
|
|
direction = GINT32_FROM_BE(*flags) & 0x01;
|
|
h4_header->direction = GINT32_TO_BE(direction);
|
|
|
|
endless_loop = extcap_dumper_dump(extcap_dumper, fifo,
|
|
payload - sizeof(own_pcap_bluetooth_h4_header),
|
|
GINT32_FROM_BE(*captured_length) + sizeof(own_pcap_bluetooth_h4_header),
|
|
GINT32_FROM_BE(*reported_length) + sizeof(own_pcap_bluetooth_h4_header),
|
|
(uint32_t)(ts / 1000000),
|
|
((uint32_t)(ts % 1000000)) * 1000);
|
|
|
|
used_buffer_length -= 24 + GINT32_FROM_BE(*captured_length);
|
|
if (used_buffer_length < 0) {
|
|
g_warning("Internal Negative used buffer length.");
|
|
closesocket(sock);
|
|
return EXIT_CODE_GENERIC;
|
|
}
|
|
|
|
if (used_buffer_length > 0)
|
|
memmove(packet + sizeof(own_pcap_bluetooth_h4_header), payload + GINT32_FROM_BE(*captured_length), used_buffer_length);
|
|
}
|
|
}
|
|
|
|
closesocket(sock);
|
|
return EXIT_CODE_SUCCESS;
|
|
}
|
|
|
|
/*----------------------------------------------------------------------------*/
|
|
/* Android Logcat Text*/
|
|
/*----------------------------------------------------------------------------*/
|
|
|
|
|
|
static int capture_android_logcat_text(char *interface, char *fifo,
|
|
const char *adb_server_ip, unsigned short *adb_server_tcp_port,
|
|
int logcat_ignore_log_buffer, const char *logcat_custom_parameter) {
|
|
struct extcap_dumper extcap_dumper;
|
|
static char packet[PACKET_LENGTH];
|
|
gssize length;
|
|
size_t used_buffer_length = 0;
|
|
socket_handle_t sock;
|
|
const char *protocol_name;
|
|
size_t exported_pdu_headers_size = 0;
|
|
struct exported_pdu_header exported_pdu_header_protocol_normal;
|
|
struct exported_pdu_header *exported_pdu_header_protocol;
|
|
struct exported_pdu_header exported_pdu_header_end = {0, 0};
|
|
static const char *wireshark_protocol_logcat_text = "logcat_text_threadtime";
|
|
const char *adb_logcat_template = "shell:export ANDROID_LOG_TAGS=\"\" ; exec logcat -v threadtime%s%s %s";
|
|
char *serial_number = NULL;
|
|
int result;
|
|
char *pos;
|
|
const char *logcat_buffer;
|
|
const char *logcat_log_buffer;
|
|
|
|
extcap_dumper = extcap_dumper_open(fifo, EXTCAP_ENCAP_WIRESHARK_UPPER_PDU);
|
|
|
|
exported_pdu_header_protocol_normal.tag = GUINT16_TO_BE(WIRESHARK_UPPER_PDU_TAG_DISSECTOR_NAME);
|
|
exported_pdu_header_protocol_normal.length = GUINT16_TO_BE(strlen(wireshark_protocol_logcat_text) + 2);
|
|
|
|
serial_number = get_serial_from_interface(interface);
|
|
sock = adb_connect_transport(adb_server_ip, adb_server_tcp_port, serial_number);
|
|
if (sock == INVALID_SOCKET)
|
|
return EXIT_CODE_INVALID_SOCKET_8;
|
|
|
|
if (is_specified_interface(interface, INTERFACE_ANDROID_LOGCAT_MAIN) || is_specified_interface(interface, INTERFACE_ANDROID_LOGCAT_TEXT_MAIN))
|
|
logcat_buffer = " -b main";
|
|
else if (is_specified_interface(interface, INTERFACE_ANDROID_LOGCAT_SYSTEM) || is_specified_interface(interface, INTERFACE_ANDROID_LOGCAT_TEXT_SYSTEM))
|
|
logcat_buffer = " -b system";
|
|
else if (is_specified_interface(interface, INTERFACE_ANDROID_LOGCAT_RADIO) || is_specified_interface(interface, INTERFACE_ANDROID_LOGCAT_TEXT_RADIO))
|
|
logcat_buffer = " -b radio";
|
|
else if (is_specified_interface(interface, INTERFACE_ANDROID_LOGCAT_EVENTS) || is_specified_interface(interface, INTERFACE_ANDROID_LOGCAT_TEXT_EVENTS))
|
|
logcat_buffer = " -b events";
|
|
else if (is_specified_interface(interface, INTERFACE_ANDROID_LOGCAT_TEXT_CRASH))
|
|
logcat_buffer = " -b crash";
|
|
else {
|
|
g_warning("Unknown interface: <%s>", interface);
|
|
closesocket(sock);
|
|
return EXIT_CODE_GENERIC;
|
|
}
|
|
|
|
if (logcat_ignore_log_buffer)
|
|
logcat_log_buffer = " -T 1";
|
|
else
|
|
logcat_log_buffer = "";
|
|
|
|
if (!logcat_custom_parameter)
|
|
logcat_custom_parameter = "";
|
|
|
|
result = g_snprintf((char *) packet, PACKET_LENGTH, adb_logcat_template, logcat_buffer, logcat_log_buffer, logcat_custom_parameter);
|
|
if (result <= 0 || result > PACKET_LENGTH) {
|
|
g_warning("Error while completing adb packet");
|
|
closesocket(sock);
|
|
return EXIT_CODE_BAD_SIZE_OF_ASSEMBLED_ADB_PACKET_17;
|
|
}
|
|
|
|
result = adb_send(sock, packet);
|
|
if (result) {
|
|
g_warning("Error while sending command <%s>", packet);
|
|
closesocket(sock);
|
|
return EXIT_CODE_ERROR_WHILE_SENDING_ADB_PACKET_3;
|
|
}
|
|
|
|
protocol_name = wireshark_protocol_logcat_text;
|
|
exported_pdu_header_protocol = &exported_pdu_header_protocol_normal;
|
|
|
|
memcpy(packet, exported_pdu_header_protocol, sizeof(struct exported_pdu_header));
|
|
exported_pdu_headers_size += sizeof(struct exported_pdu_header);
|
|
|
|
memcpy(packet + exported_pdu_headers_size, protocol_name, GUINT16_FROM_BE(exported_pdu_header_protocol->length) - 2);
|
|
exported_pdu_headers_size += GUINT16_FROM_BE(exported_pdu_header_protocol->length);
|
|
|
|
packet[exported_pdu_headers_size - 1] = 0;
|
|
packet[exported_pdu_headers_size - 2] = 0;
|
|
|
|
memcpy(packet + exported_pdu_headers_size, &exported_pdu_header_end, sizeof(struct exported_pdu_header));
|
|
exported_pdu_headers_size += sizeof(struct exported_pdu_header) + GUINT16_FROM_BE(exported_pdu_header_end.length);
|
|
|
|
used_buffer_length = 0;
|
|
while (endless_loop) {
|
|
errno = 0;
|
|
length = recv(sock, packet + exported_pdu_headers_size + used_buffer_length, (int)(PACKET_LENGTH - exported_pdu_headers_size - used_buffer_length), 0);
|
|
if (errno == EAGAIN
|
|
#if EWOULDBLOCK != EAGAIN
|
|
|| errno == EWOULDBLOCK
|
|
#endif
|
|
) {
|
|
continue;
|
|
}
|
|
else if (errno != 0) {
|
|
g_warning("ERROR capture: %s", strerror(errno));
|
|
closesocket(sock);
|
|
return EXIT_CODE_GENERIC;
|
|
}
|
|
|
|
if (length <= 0) {
|
|
g_warning("Broken socket connection. Try reconnect.");
|
|
closesocket(sock);
|
|
return EXIT_CODE_GENERIC;
|
|
}
|
|
|
|
used_buffer_length += length;
|
|
|
|
while (used_buffer_length > 0 && (pos = (char *) memchr(packet + exported_pdu_headers_size, '\n', used_buffer_length))) {
|
|
int ms;
|
|
struct tm* date;
|
|
time_t seconds;
|
|
time_t secs = 0;
|
|
int nsecs = 0;
|
|
time_t t;
|
|
|
|
length = (gssize)(pos - packet) + 1;
|
|
|
|
t = time(NULL);
|
|
date = localtime(&t);
|
|
if (!date)
|
|
continue;
|
|
if (6 == sscanf(packet + exported_pdu_headers_size, "%d-%d %d:%d:%d.%d", &date->tm_mon, &date->tm_mday, &date->tm_hour,
|
|
&date->tm_min, &date->tm_sec, &ms)) {
|
|
date->tm_mon -= 1;
|
|
date->tm_isdst = -1;
|
|
seconds = mktime(date);
|
|
secs = (time_t) seconds;
|
|
nsecs = (int) (ms * 1e6);
|
|
}
|
|
|
|
endless_loop = extcap_dumper_dump(extcap_dumper, fifo, packet,
|
|
length,
|
|
length,
|
|
secs, nsecs);
|
|
|
|
memmove(packet + exported_pdu_headers_size, packet + length, used_buffer_length + exported_pdu_headers_size - length);
|
|
used_buffer_length -= length - exported_pdu_headers_size;
|
|
}
|
|
}
|
|
|
|
closesocket(sock);
|
|
return EXIT_CODE_SUCCESS;
|
|
}
|
|
|
|
/*----------------------------------------------------------------------------*/
|
|
/* Android Logger / Logcat */
|
|
/*----------------------------------------------------------------------------*/
|
|
|
|
static int capture_android_logcat(char *interface, char *fifo,
|
|
const char *adb_server_ip, unsigned short *adb_server_tcp_port) {
|
|
struct extcap_dumper extcap_dumper;
|
|
static char packet[PACKET_LENGTH];
|
|
gssize length;
|
|
size_t used_buffer_length = 0;
|
|
socket_handle_t sock;
|
|
const char *protocol_name;
|
|
size_t exported_pdu_headers_size = 0;
|
|
struct exported_pdu_header exported_pdu_header_protocol_events;
|
|
struct exported_pdu_header exported_pdu_header_protocol_normal;
|
|
struct exported_pdu_header *exported_pdu_header_protocol;
|
|
struct exported_pdu_header exported_pdu_header_end = {0, 0};
|
|
static const char *wireshark_protocol_logcat = "logcat";
|
|
static const char *wireshark_protocol_logcat_events = "logcat_events";
|
|
const char *adb_command;
|
|
uint16_t *payload_length;
|
|
uint16_t *try_header_size;
|
|
uint32_t *timestamp_secs;
|
|
uint32_t *timestamp_nsecs;
|
|
uint16_t header_size;
|
|
int result;
|
|
char *serial_number = NULL;
|
|
|
|
extcap_dumper = extcap_dumper_open(fifo, EXTCAP_ENCAP_WIRESHARK_UPPER_PDU);
|
|
|
|
exported_pdu_header_protocol_events.tag = GUINT16_TO_BE(WIRESHARK_UPPER_PDU_TAG_DISSECTOR_NAME);
|
|
exported_pdu_header_protocol_events.length = GUINT16_TO_BE(strlen(wireshark_protocol_logcat_events) + 2);
|
|
|
|
exported_pdu_header_protocol_normal.tag = GUINT16_TO_BE(WIRESHARK_UPPER_PDU_TAG_DISSECTOR_NAME);
|
|
exported_pdu_header_protocol_normal.length = GUINT16_TO_BE(strlen(wireshark_protocol_logcat) + 2);
|
|
|
|
serial_number = get_serial_from_interface(interface);
|
|
sock = adb_connect_transport(adb_server_ip, adb_server_tcp_port, serial_number);
|
|
if (sock == INVALID_SOCKET)
|
|
return EXIT_CODE_INVALID_SOCKET_9;
|
|
|
|
adb_command = interface_to_logbuf(interface);
|
|
if (!adb_command) {
|
|
g_warning("Unknown interface: <%s>", interface);
|
|
closesocket(sock);
|
|
return EXIT_CODE_GENERIC;
|
|
}
|
|
|
|
result = adb_send(sock, adb_command);
|
|
if (result) {
|
|
g_warning("Error while sending command <%s>", adb_command);
|
|
closesocket(sock);
|
|
return EXIT_CODE_ERROR_WHILE_SENDING_ADB_PACKET_4;
|
|
}
|
|
|
|
if (is_specified_interface(interface, INTERFACE_ANDROID_LOGCAT_EVENTS))
|
|
{
|
|
protocol_name = wireshark_protocol_logcat_events;
|
|
exported_pdu_header_protocol = &exported_pdu_header_protocol_events;
|
|
} else {
|
|
protocol_name = wireshark_protocol_logcat;
|
|
exported_pdu_header_protocol = &exported_pdu_header_protocol_normal;
|
|
}
|
|
|
|
memcpy(packet, exported_pdu_header_protocol, sizeof(struct exported_pdu_header));
|
|
exported_pdu_headers_size += sizeof(struct exported_pdu_header);
|
|
|
|
memcpy(packet + exported_pdu_headers_size, protocol_name, GUINT16_FROM_BE(exported_pdu_header_protocol->length) - 2);
|
|
exported_pdu_headers_size += GUINT16_FROM_BE(exported_pdu_header_protocol->length);
|
|
|
|
packet[exported_pdu_headers_size - 1] = 0;
|
|
packet[exported_pdu_headers_size - 2] = 0;
|
|
|
|
memcpy(packet + exported_pdu_headers_size, &exported_pdu_header_end, sizeof(struct exported_pdu_header));
|
|
exported_pdu_headers_size += sizeof(struct exported_pdu_header) + GUINT16_FROM_BE(exported_pdu_header_end.length);
|
|
|
|
SET_DATA(payload_length, value_u16, packet + exported_pdu_headers_size + 0);
|
|
SET_DATA(try_header_size, value_u16, packet + exported_pdu_headers_size + 2);
|
|
SET_DATA(timestamp_secs, value_u32, packet + exported_pdu_headers_size + 12);
|
|
SET_DATA(timestamp_nsecs, value_u32, packet + exported_pdu_headers_size + 16);
|
|
|
|
while (endless_loop) {
|
|
errno = 0;
|
|
length = recv(sock, packet + exported_pdu_headers_size + used_buffer_length, (int)(PACKET_LENGTH - exported_pdu_headers_size - used_buffer_length), 0);
|
|
if (errno == EAGAIN
|
|
#if EWOULDBLOCK != EAGAIN
|
|
|| errno == EWOULDBLOCK
|
|
#endif
|
|
) {
|
|
continue;
|
|
}
|
|
else if (errno != 0) {
|
|
g_warning("ERROR capture: %s", strerror(errno));
|
|
closesocket(sock);
|
|
return EXIT_CODE_GENERIC;
|
|
}
|
|
|
|
if (length <= 0) {
|
|
while (endless_loop) {
|
|
g_warning("Broken socket connection. Try reconnect.");
|
|
used_buffer_length = 0;
|
|
closesocket(sock);
|
|
|
|
sock = adb_connect_transport(adb_server_ip, adb_server_tcp_port, serial_number);
|
|
if (sock == INVALID_SOCKET)
|
|
return EXIT_CODE_INVALID_SOCKET_10;
|
|
|
|
result = adb_send(sock, adb_command);
|
|
if (result) {
|
|
g_warning("WARNIG: Error while sending command <%s>", adb_command);
|
|
continue;
|
|
}
|
|
|
|
break;
|
|
}
|
|
}
|
|
|
|
used_buffer_length += length + exported_pdu_headers_size;
|
|
|
|
if (*try_header_size != 24)
|
|
header_size = 20;
|
|
else
|
|
header_size = *try_header_size;
|
|
|
|
length = (*payload_length) + header_size + (gssize)exported_pdu_headers_size;
|
|
|
|
while (used_buffer_length >= exported_pdu_headers_size + header_size && (size_t)length <= used_buffer_length) {
|
|
endless_loop = extcap_dumper_dump(extcap_dumper, fifo, packet,
|
|
length,
|
|
length,
|
|
*timestamp_secs, *timestamp_nsecs);
|
|
|
|
memmove(packet + exported_pdu_headers_size, packet + length, used_buffer_length - length);
|
|
used_buffer_length -= length;
|
|
used_buffer_length += exported_pdu_headers_size;
|
|
|
|
|
|
length = (*payload_length) + header_size + (gssize)exported_pdu_headers_size;
|
|
|
|
if (*try_header_size != 24)
|
|
header_size = 20;
|
|
else
|
|
header_size = *try_header_size;
|
|
}
|
|
used_buffer_length -= exported_pdu_headers_size;
|
|
}
|
|
|
|
closesocket(sock);
|
|
|
|
return EXIT_CODE_SUCCESS;
|
|
}
|
|
|
|
|
|
/*----------------------------------------------------------------------------*/
|
|
/* Android Wifi Tcpdump */
|
|
/* The Tcpdump sends data in pcap format. So for using the extcap_dumper we */
|
|
/* need to unpack the pcap and then send the packet data to the dumper. */
|
|
/*----------------------------------------------------------------------------*/
|
|
static int capture_android_tcpdump(char *interface, char *fifo,
|
|
const char *adb_server_ip, unsigned short *adb_server_tcp_port) {
|
|
static const char *const adb_shell_tcpdump_format = "exec:tcpdump -U -n -s 0 -u -i %s -w - 2>/dev/null";
|
|
static const char *const regex_interface = INTERFACE_ANDROID_TCPDUMP "-(?<iface>.*?)-(?<serial>.*)";
|
|
struct extcap_dumper extcap_dumper;
|
|
static char data[PACKET_LENGTH];
|
|
gssize length;
|
|
gssize used_buffer_length = 0;
|
|
gssize frame_length=0;
|
|
socket_handle_t sock;
|
|
gint result;
|
|
char *iface = NULL;
|
|
char *serial_number = NULL;
|
|
gboolean nanosecond_timestamps;
|
|
gboolean swap_byte_order;
|
|
pcap_hdr_t *global_header;
|
|
pcaprec_hdr_t p_header;
|
|
GRegex *regex = NULL;
|
|
GError *err = NULL;
|
|
GMatchInfo *match = NULL;
|
|
char tcpdump_cmd[80];
|
|
|
|
regex = g_regex_new(regex_interface, G_REGEX_RAW, (GRegexMatchFlags)0, &err);
|
|
if (!regex) {
|
|
g_warning("Failed to compile regex for tcpdump interface");
|
|
return EXIT_CODE_GENERIC;
|
|
}
|
|
|
|
g_regex_match(regex, interface, (GRegexMatchFlags)0, &match);
|
|
if (!g_match_info_matches(match)) {
|
|
g_warning("Failed to determine iface name and serial number");
|
|
g_regex_unref(regex);
|
|
return EXIT_CODE_GENERIC;
|
|
}
|
|
|
|
iface = g_match_info_fetch_named(match, "iface");
|
|
serial_number = g_match_info_fetch_named(match, "serial");
|
|
g_match_info_free(match);
|
|
g_regex_unref(regex);
|
|
|
|
/* First check for the device if it is connected or not */
|
|
sock = adb_connect_transport(adb_server_ip, adb_server_tcp_port, serial_number);
|
|
g_free(serial_number);
|
|
if (sock == INVALID_SOCKET) {
|
|
g_free(iface);
|
|
return EXIT_CODE_INVALID_SOCKET_11;
|
|
}
|
|
|
|
g_snprintf(tcpdump_cmd, sizeof(tcpdump_cmd), adb_shell_tcpdump_format, iface);
|
|
g_free(iface);
|
|
result = adb_send(sock, tcpdump_cmd);
|
|
if (result) {
|
|
g_warning("Error while setting adb transport");
|
|
closesocket(sock);
|
|
return EXIT_CODE_GENERIC;
|
|
}
|
|
|
|
while (used_buffer_length < PCAP_GLOBAL_HEADER_LENGTH) {
|
|
errno = 0;
|
|
length = recv(sock, data + used_buffer_length, (int)(PCAP_GLOBAL_HEADER_LENGTH - used_buffer_length), 0);
|
|
if (errno == EAGAIN
|
|
#if EWOULDBLOCK != EAGAIN
|
|
|| errno == EWOULDBLOCK
|
|
#endif
|
|
) {
|
|
continue;
|
|
}
|
|
else if (errno != 0) {
|
|
g_warning("ERROR capture: %s", strerror(errno));
|
|
closesocket(sock);
|
|
return EXIT_CODE_GENERIC;
|
|
}
|
|
|
|
if (length <= 0) {
|
|
g_warning("Broken socket connection.");
|
|
closesocket(sock);
|
|
return EXIT_CODE_GENERIC;
|
|
}
|
|
|
|
used_buffer_length += length;
|
|
}
|
|
|
|
global_header = (pcap_hdr_t*) data;
|
|
switch (global_header->magic_number) {
|
|
case 0xa1b2c3d4:
|
|
swap_byte_order = FALSE;
|
|
nanosecond_timestamps = FALSE;
|
|
break;
|
|
case 0xd4c3b2a1:
|
|
swap_byte_order = TRUE;
|
|
nanosecond_timestamps = FALSE;
|
|
break;
|
|
case 0xa1b23c4d:
|
|
swap_byte_order = FALSE;
|
|
nanosecond_timestamps = TRUE;
|
|
break;
|
|
case 0x4d3cb2a1:
|
|
swap_byte_order = TRUE;
|
|
nanosecond_timestamps = TRUE;
|
|
break;
|
|
default:
|
|
g_warning("Received incorrect magic");
|
|
closesocket(sock);
|
|
return EXIT_CODE_GENERIC;
|
|
}
|
|
int encap = (int)data[20];
|
|
#ifndef ANDROIDDUMP_USE_LIBPCAP
|
|
encap = wtap_pcap_encap_to_wtap_encap(encap);
|
|
#endif
|
|
extcap_dumper = extcap_dumper_open(fifo, encap);
|
|
|
|
used_buffer_length = 0;
|
|
while (endless_loop) {
|
|
gssize offset = 0;
|
|
|
|
errno = 0;
|
|
length = recv(sock, data + used_buffer_length, (int)(PACKET_LENGTH - used_buffer_length), 0);
|
|
if (errno == EAGAIN
|
|
#if EWOULDBLOCK != EAGAIN
|
|
|| errno == EWOULDBLOCK
|
|
#endif
|
|
) {
|
|
continue;
|
|
}
|
|
else if (errno != 0) {
|
|
g_warning("ERROR capture: %s", strerror(errno));
|
|
closesocket(sock);
|
|
return EXIT_CODE_GENERIC;
|
|
}
|
|
|
|
if (length <= 0) {
|
|
g_warning("Broken socket connection.");
|
|
closesocket(sock);
|
|
return EXIT_CODE_GENERIC;
|
|
}
|
|
|
|
used_buffer_length += length;
|
|
|
|
while ((used_buffer_length - offset) > PCAP_RECORD_HEADER_LENGTH) {
|
|
p_header = *((pcaprec_hdr_t*) (data + offset));
|
|
if (swap_byte_order) {
|
|
p_header.ts_sec = GUINT32_SWAP_LE_BE(p_header.ts_sec);
|
|
p_header.ts_usec = GUINT32_SWAP_LE_BE(p_header.ts_usec);
|
|
p_header.incl_len = GUINT32_SWAP_LE_BE(p_header.incl_len);
|
|
p_header.orig_len = GUINT32_SWAP_LE_BE(p_header.orig_len);
|
|
}
|
|
if (!nanosecond_timestamps) {
|
|
p_header.ts_usec = p_header.ts_usec * 1000;
|
|
}
|
|
|
|
frame_length = p_header.incl_len + PCAP_RECORD_HEADER_LENGTH;
|
|
if ((used_buffer_length - offset) < frame_length) {
|
|
break; /* wait for complete packet */
|
|
}
|
|
|
|
/* It was observed that some times tcpdump reports the length of packet as '0' and that leads to the
|
|
* ( Warn Error "Less data was read than was expected" while reading )
|
|
* So to avoid this error we are checking for length of packet before passing it to dumper.
|
|
*/
|
|
if (p_header.incl_len > 0) {
|
|
endless_loop = extcap_dumper_dump(extcap_dumper, fifo, data + offset + PCAP_RECORD_HEADER_LENGTH,
|
|
p_header.incl_len, p_header.orig_len, p_header.ts_sec, p_header.ts_usec);
|
|
}
|
|
|
|
offset += frame_length;
|
|
}
|
|
|
|
if (offset < used_buffer_length) {
|
|
memmove(data, data + offset, used_buffer_length - offset);
|
|
}
|
|
used_buffer_length -= offset;
|
|
}
|
|
|
|
closesocket(sock);
|
|
return EXIT_CODE_SUCCESS;
|
|
}
|
|
|
|
int main(int argc, char *argv[]) {
|
|
char *err_msg;
|
|
int ret = EXIT_CODE_GENERIC;
|
|
int option_idx = 0;
|
|
int result;
|
|
const char *adb_server_ip = NULL;
|
|
unsigned short *adb_server_tcp_port = NULL;
|
|
unsigned int logcat_text = 0;
|
|
unsigned int logcat_ignore_log_buffer = 0;
|
|
const char *logcat_custom_parameter = NULL;
|
|
const char *default_adb_server_ip = "127.0.0.1";
|
|
unsigned short default_adb_server_tcp_port = 5037;
|
|
unsigned short local_adb_server_tcp_port;
|
|
unsigned short local_bt_server_tcp_port;
|
|
unsigned short local_bt_local_tcp_port;
|
|
unsigned short *bt_server_tcp_port = NULL;
|
|
unsigned int bt_forward_socket = 0;
|
|
const char *bt_local_ip = NULL;
|
|
unsigned short *bt_local_tcp_port = NULL;
|
|
unsigned short default_bt_server_tcp_port = 4330;
|
|
const char *default_bt_local_ip = "127.0.0.1";
|
|
unsigned short default_bt_local_tcp_port = 4330;
|
|
extcap_parameters * extcap_conf = NULL;
|
|
char *help_url;
|
|
char *help_header = NULL;
|
|
|
|
cmdarg_err_init(failure_warning_message, failure_warning_message);
|
|
|
|
/*
|
|
* Get credential information for later use.
|
|
*/
|
|
init_process_policies();
|
|
|
|
/*
|
|
* Attempt to get the pathname of the directory containing the
|
|
* executable file.
|
|
*/
|
|
err_msg = init_progfile_dir(argv[0]);
|
|
if (err_msg != NULL) {
|
|
g_warning("Can't get pathname of directory containing the captype program: %s.",
|
|
err_msg);
|
|
g_free(err_msg);
|
|
}
|
|
|
|
extcap_conf = g_new0(extcap_parameters, 1);
|
|
|
|
help_url = data_file_url("androiddump.html");
|
|
extcap_base_set_util_info(extcap_conf, argv[0], ANDROIDDUMP_VERSION_MAJOR, ANDROIDDUMP_VERSION_MINOR,
|
|
ANDROIDDUMP_VERSION_RELEASE, help_url);
|
|
g_free(help_url);
|
|
|
|
help_header = g_strdup_printf(
|
|
" %s --extcap-interfaces [--adb-server-ip=<arg>] [--adb-server-tcp-port=<arg>]\n"
|
|
" %s --extcap-interface=INTERFACE --extcap-dlts\n"
|
|
" %s --extcap-interface=INTERFACE --extcap-config\n"
|
|
" %s --extcap-interface=INTERFACE --fifo=PATH_FILENAME --capture\n"
|
|
"\nINTERFACE has the form TYPE-DEVICEID:\n"
|
|
"\t""For example: "INTERFACE_ANDROID_BLUETOOTH_BTSNOOP_NET"-W3D7N15C29005648""\n"
|
|
"\n"
|
|
"\tTYPE is one of:\n"
|
|
"\t"INTERFACE_ANDROID_LOGCAT_MAIN"\n"
|
|
"\t"INTERFACE_ANDROID_LOGCAT_SYSTEM"\n"
|
|
"\t"INTERFACE_ANDROID_LOGCAT_RADIO"\n"
|
|
"\t"INTERFACE_ANDROID_LOGCAT_EVENTS"\n"
|
|
"\t"INTERFACE_ANDROID_LOGCAT_TEXT_MAIN"\n"
|
|
"\t"INTERFACE_ANDROID_LOGCAT_TEXT_SYSTEM"\n"
|
|
"\t"INTERFACE_ANDROID_LOGCAT_TEXT_RADIO"\n"
|
|
"\t"INTERFACE_ANDROID_LOGCAT_TEXT_EVENTS"\n"
|
|
"\t"INTERFACE_ANDROID_LOGCAT_TEXT_CRASH"\n"
|
|
"\t"INTERFACE_ANDROID_BLUETOOTH_HCIDUMP"\n"
|
|
"\t"INTERFACE_ANDROID_BLUETOOTH_EXTERNAL_PARSER"\n"
|
|
"\t"INTERFACE_ANDROID_BLUETOOTH_BTSNOOP_NET"\n"
|
|
"\t"INTERFACE_ANDROID_TCPDUMP"\n"
|
|
"\n"
|
|
"\t""DEVICEID is the identifier of the device provided by Android SDK (see \"adb devices\")\n"
|
|
"\t""For example: W3D7N15C29005648""\n",
|
|
|
|
argv[0], argv[0], argv[0], argv[0]);
|
|
extcap_help_add_header(extcap_conf, help_header);
|
|
g_free(help_header);
|
|
|
|
extcap_help_add_option(extcap_conf, "--help", "print this help");
|
|
extcap_help_add_option(extcap_conf, "--adb-server-ip <IP>", "the IP address of the ADB server");
|
|
extcap_help_add_option(extcap_conf, "--adb-server-tcp-port <port>", "the TCP port of the ADB server");
|
|
extcap_help_add_option(extcap_conf, "--logcat-text", "use logcat text format");
|
|
extcap_help_add_option(extcap_conf, "--logcat-ignore-log-buffer", "ignore log buffer");
|
|
extcap_help_add_option(extcap_conf, "--logcat-custom-options <text>", "use custom logcat parameters");
|
|
extcap_help_add_option(extcap_conf, "--bt-server-tcp-port <port>", "bluetooth server TCP port");
|
|
extcap_help_add_option(extcap_conf, "--bt-forward-socket <path>", "bluetooth forward socket");
|
|
extcap_help_add_option(extcap_conf, "--bt-local-ip <IP>", "the bluetooth local IP");
|
|
extcap_help_add_option(extcap_conf, "--bt-local-tcp-port <port>", "the bluetooth local TCP port");
|
|
|
|
opterr = 0;
|
|
optind = 0;
|
|
|
|
if (argc == 1) {
|
|
extcap_help_print(extcap_conf);
|
|
ret = EXIT_CODE_SUCCESS;
|
|
goto end;
|
|
}
|
|
|
|
while ((result = getopt_long(argc, argv, "", longopts, &option_idx)) != -1) {
|
|
switch (result) {
|
|
|
|
case OPT_VERSION:
|
|
printf("%s\n", extcap_conf->version);
|
|
ret = EXIT_CODE_SUCCESS;
|
|
goto end;
|
|
case OPT_HELP:
|
|
extcap_help_print(extcap_conf);
|
|
ret = EXIT_CODE_SUCCESS;
|
|
goto end;
|
|
case OPT_CONFIG_ADB_SERVER_IP:
|
|
adb_server_ip = optarg;
|
|
break;
|
|
case OPT_CONFIG_ADB_SERVER_TCP_PORT:
|
|
adb_server_tcp_port = &local_adb_server_tcp_port;
|
|
if (!optarg){
|
|
g_warning("Impossible exception. Parameter required argument, but there is no it right now.");
|
|
goto end;
|
|
}
|
|
if (!ws_strtou16(optarg, NULL, adb_server_tcp_port)) {
|
|
g_warning("Invalid adb server TCP port: %s", optarg);
|
|
goto end;
|
|
}
|
|
break;
|
|
case OPT_CONFIG_LOGCAT_TEXT:
|
|
if (optarg && !*optarg)
|
|
logcat_text = TRUE;
|
|
else
|
|
logcat_text = (g_ascii_strncasecmp(optarg, "TRUE", 4) == 0);
|
|
break;
|
|
case OPT_CONFIG_LOGCAT_IGNORE_LOG_BUFFER:
|
|
if (optarg == NULL || (optarg && !*optarg))
|
|
logcat_ignore_log_buffer = TRUE;
|
|
else
|
|
logcat_ignore_log_buffer = (g_ascii_strncasecmp(optarg, "TRUE", 4) == 0);
|
|
break;
|
|
case OPT_CONFIG_LOGCAT_CUSTOM_OPTIONS:
|
|
if (optarg == NULL || (optarg && *optarg == '\0')) {
|
|
logcat_custom_parameter = NULL;
|
|
break;
|
|
}
|
|
|
|
if (g_regex_match_simple("(^|\\s)-[bBcDfgLnpPrv]", optarg, G_REGEX_RAW, (GRegexMatchFlags)0)) {
|
|
g_error("Found prohibited option in logcat-custom-options");
|
|
return EXIT_CODE_GENERIC;
|
|
}
|
|
|
|
logcat_custom_parameter = optarg;
|
|
|
|
break;
|
|
case OPT_CONFIG_BT_SERVER_TCP_PORT:
|
|
bt_server_tcp_port = &local_bt_server_tcp_port;
|
|
if (!optarg){
|
|
g_warning("Impossible exception. Parameter required argument, but there is no it right now.");
|
|
goto end;
|
|
}
|
|
if (!ws_strtou16(optarg, NULL, bt_server_tcp_port)) {
|
|
g_warning("Invalid bluetooth server TCP port: %s", optarg);
|
|
goto end;
|
|
}
|
|
break;
|
|
case OPT_CONFIG_BT_FORWARD_SOCKET:
|
|
bt_forward_socket = (g_ascii_strncasecmp(optarg, "TRUE", 4) == 0);
|
|
break;
|
|
case OPT_CONFIG_BT_LOCAL_IP:
|
|
bt_local_ip = optarg;
|
|
break;
|
|
case OPT_CONFIG_BT_LOCAL_TCP_PORT:
|
|
bt_local_tcp_port = &local_bt_local_tcp_port;
|
|
if (!optarg){
|
|
g_warning("Impossible exception. Parameter required argument, but there is no it right now.");
|
|
goto end;
|
|
}
|
|
if (!ws_strtou16(optarg, NULL, bt_local_tcp_port)) {
|
|
g_warning("Invalid bluetooth local tcp port: %s", optarg);
|
|
goto end;
|
|
}
|
|
break;
|
|
default:
|
|
if (!extcap_base_parse_options(extcap_conf, result - EXTCAP_OPT_LIST_INTERFACES, optarg))
|
|
{
|
|
g_warning("Invalid argument <%s>. Try --help.\n", argv[optind - 1]);
|
|
goto end;
|
|
}
|
|
}
|
|
}
|
|
|
|
if (!adb_server_ip)
|
|
adb_server_ip = default_adb_server_ip;
|
|
|
|
if (!adb_server_tcp_port)
|
|
adb_server_tcp_port = &default_adb_server_tcp_port;
|
|
|
|
if (!bt_server_tcp_port)
|
|
bt_server_tcp_port = &default_bt_server_tcp_port;
|
|
|
|
if (!bt_local_ip)
|
|
bt_local_ip = default_bt_local_ip;
|
|
|
|
if (!bt_local_tcp_port)
|
|
bt_local_tcp_port = &default_bt_local_tcp_port;
|
|
|
|
err_msg = ws_init_sockets();
|
|
if (err_msg != NULL) {
|
|
g_warning("ERROR: %s", err_msg);
|
|
g_free(err_msg);
|
|
g_warning("%s", please_report_bug());
|
|
goto end;
|
|
}
|
|
|
|
extcap_cmdline_debug(argv, argc);
|
|
|
|
if (extcap_conf->do_list_interfaces)
|
|
register_interfaces(extcap_conf, adb_server_ip, adb_server_tcp_port);
|
|
|
|
/* NOTE:
|
|
* extcap implementation calls androiddump --extcap-dlts for each interface.
|
|
* The only way to know whether an interface exists or not is to go through the
|
|
* whole process of listing all interfaces (i.e. calling register_interfaces
|
|
* function). Since being a system resource heavy operation and repeated for
|
|
* each interface instead register a fake interface to be returned for dlt
|
|
* listing only purpose
|
|
*/
|
|
if (extcap_conf->do_list_dlts) {
|
|
new_fake_interface_for_list_dlts(extcap_conf, extcap_conf->interface);
|
|
}
|
|
|
|
if (extcap_base_handle_interface(extcap_conf)) {
|
|
ret = EXIT_CODE_SUCCESS;
|
|
goto end;
|
|
}
|
|
|
|
if (extcap_conf->show_config) {
|
|
ret = list_config(extcap_conf->interface);
|
|
goto end;
|
|
}
|
|
|
|
if (extcap_conf->capture) {
|
|
if (extcap_conf->interface && is_logcat_interface(extcap_conf->interface))
|
|
if (logcat_text)
|
|
ret = capture_android_logcat_text(extcap_conf->interface,
|
|
extcap_conf->fifo, adb_server_ip, adb_server_tcp_port,
|
|
logcat_ignore_log_buffer, logcat_custom_parameter);
|
|
else
|
|
ret = capture_android_logcat(extcap_conf->interface,
|
|
extcap_conf->fifo, adb_server_ip, adb_server_tcp_port);
|
|
else if (extcap_conf->interface && is_logcat_text_interface(extcap_conf->interface))
|
|
ret = capture_android_logcat_text(extcap_conf->interface,
|
|
extcap_conf->fifo, adb_server_ip, adb_server_tcp_port,
|
|
logcat_ignore_log_buffer, logcat_custom_parameter);
|
|
else if (extcap_conf->interface && is_specified_interface(extcap_conf->interface, INTERFACE_ANDROID_BLUETOOTH_HCIDUMP))
|
|
ret = capture_android_bluetooth_hcidump(extcap_conf->interface, extcap_conf->fifo, adb_server_ip, adb_server_tcp_port);
|
|
else if (extcap_conf->interface && is_specified_interface(extcap_conf->interface, INTERFACE_ANDROID_BLUETOOTH_EXTERNAL_PARSER))
|
|
ret = capture_android_bluetooth_external_parser(extcap_conf->interface, extcap_conf->fifo, adb_server_ip, adb_server_tcp_port,
|
|
bt_server_tcp_port, bt_forward_socket, bt_local_ip, bt_local_tcp_port);
|
|
else if (extcap_conf->interface && (is_specified_interface(extcap_conf->interface, INTERFACE_ANDROID_BLUETOOTH_BTSNOOP_NET)))
|
|
ret = capture_android_bluetooth_btsnoop_net(extcap_conf->interface, extcap_conf->fifo, adb_server_ip, adb_server_tcp_port);
|
|
else if (extcap_conf->interface && (is_specified_interface(extcap_conf->interface,INTERFACE_ANDROID_TCPDUMP)))
|
|
ret = capture_android_tcpdump(extcap_conf->interface, extcap_conf->fifo, adb_server_ip, adb_server_tcp_port);
|
|
|
|
goto end;
|
|
}
|
|
|
|
/* no action was given, assume success */
|
|
ret = EXIT_CODE_SUCCESS;
|
|
|
|
end:
|
|
/* clean up stuff */
|
|
extcap_base_cleanup(&extcap_conf);
|
|
#ifndef ANDROIDDUMP_USE_LIBPCAP
|
|
wtap_cleanup();
|
|
#endif
|
|
|
|
return ret;
|
|
}
|
|
|
|
/*
|
|
* Editor modelines - https://www.wireshark.org/tools/modelines.html
|
|
*
|
|
* Local variables:
|
|
* c-basic-offset: 4
|
|
* tab-width: 8
|
|
* indent-tabs-mode: nil
|
|
* End:
|
|
*
|
|
* vi: set shiftwidth=4 tabstop=8 expandtab:
|
|
* :indentSize=4:tabSize=8:noTabs=true:
|
|
*/
|