File: | builds/wireshark/wireshark/capinfos.c |
Warning: | line 743, column 5 Potential leak of memory pointed to by 'buf' |
Press '?' to see keyboard shortcuts
Keyboard shortcuts:
1 | /* capinfos.c | |||
2 | * Reports capture file information including # of packets, duration, others | |||
3 | * | |||
4 | * Copyright 2004 Ian Schorr | |||
5 | * | |||
6 | * Wireshark - Network traffic analyzer | |||
7 | * By Gerald Combs <[email protected]> | |||
8 | * Copyright 1998 Gerald Combs | |||
9 | * | |||
10 | * SPDX-License-Identifier: GPL-2.0-or-later | |||
11 | */ | |||
12 | ||||
13 | /* | |||
14 | * 2009-09-19: jyoung | |||
15 | * | |||
16 | * New capinfos features | |||
17 | * | |||
18 | * Continue processing additional files after | |||
19 | * a wiretap open failure. The new -C option | |||
20 | * reverts to capinfos' original behavior which | |||
21 | * is to cancel any further file processing at | |||
22 | * first file open failure. | |||
23 | * | |||
24 | * Change the behavior of how the default display | |||
25 | * of all infos is initiated. This gets rid of a | |||
26 | * special post getopt() argument count test. | |||
27 | * | |||
28 | * Add new table output format (with related options) | |||
29 | * This feature allows outputting the various infos | |||
30 | * into a tab delimited text file, or to a comma | |||
31 | * separated variables file (*.csv) instead of the | |||
32 | * original "long" format. | |||
33 | * | |||
34 | * 2011-04-05: wmeier | |||
35 | * behaviour changed: Upon exit capinfos will return | |||
36 | * an error status if an error occurred at any | |||
37 | * point during "continuous" file processing. | |||
38 | * (Previously a success status was always | |||
39 | * returned if the -C option was not used). | |||
40 | * | |||
41 | */ | |||
42 | ||||
43 | ||||
44 | #include <config.h> | |||
45 | #define WS_LOG_DOMAIN"Main" LOG_DOMAIN_MAIN"Main" | |||
46 | ||||
47 | #include <stdio.h> | |||
48 | #include <stdlib.h> | |||
49 | #include <string.h> | |||
50 | #include <stdarg.h> | |||
51 | #include <locale.h> | |||
52 | ||||
53 | #include <ws_exit_codes.h> | |||
54 | #include <wsutil/ws_getopt.h> | |||
55 | ||||
56 | #include <glib.h> | |||
57 | ||||
58 | #include <wiretap/wtap.h> | |||
59 | ||||
60 | #include <wsutil/cmdarg_err.h> | |||
61 | #include <wsutil/filesystem.h> | |||
62 | #include <wsutil/privileges.h> | |||
63 | #include <cli_main.h> | |||
64 | #include <wsutil/version_info.h> | |||
65 | #include <wiretap/wtap_opttypes.h> | |||
66 | ||||
67 | #ifdef HAVE_PLUGINS1 | |||
68 | #include <wsutil/plugins.h> | |||
69 | #endif | |||
70 | ||||
71 | #include <wsutil/str_util.h> | |||
72 | #include <wsutil/to_str.h> | |||
73 | #include <wsutil/file_util.h> | |||
74 | #include <wsutil/ws_assert.h> | |||
75 | #include <wsutil/wslog.h> | |||
76 | ||||
77 | #include <gcrypt.h> | |||
78 | ||||
79 | #include "ui/failure_message.h" | |||
80 | ||||
81 | /* | |||
82 | * By default capinfos now continues processing | |||
83 | * the next filename if and when wiretap detects | |||
84 | * a problem opening or reading a file. | |||
85 | * Use the '-C' option to revert back to original | |||
86 | * capinfos behavior which is to abort any | |||
87 | * additional file processing at the first file | |||
88 | * open or read failure. | |||
89 | */ | |||
90 | ||||
91 | static bool_Bool stop_after_failure; | |||
92 | ||||
93 | /* | |||
94 | * table report variables | |||
95 | */ | |||
96 | ||||
97 | static bool_Bool long_report = true1; /* By default generate long report */ | |||
98 | static bool_Bool table_report_header = true1; /* Generate column header by default */ | |||
99 | static char field_separator = '\t'; /* Use TAB as field separator by default */ | |||
100 | static char quote_char = '\0'; /* Do NOT quote fields by default */ | |||
101 | static bool_Bool machine_readable; /* Display machine-readable numbers */ | |||
102 | ||||
103 | /* | |||
104 | * capinfos has the ability to report on a number of | |||
105 | * various characteristics ("infos") for each input file. | |||
106 | * | |||
107 | * By default reporting of all info fields is enabled. | |||
108 | * | |||
109 | * Optionally the reporting of any specific info field | |||
110 | * or combination of info fields can be enabled with | |||
111 | * individual options. | |||
112 | */ | |||
113 | ||||
114 | static bool_Bool report_all_infos = true1; /* Report all infos */ | |||
115 | ||||
116 | static bool_Bool cap_file_type = true1; /* Report capture type */ | |||
117 | static bool_Bool cap_file_encap = true1; /* Report encapsulation */ | |||
118 | static bool_Bool cap_snaplen = true1; /* Packet size limit (snaplen)*/ | |||
119 | static bool_Bool cap_packet_count = true1; /* Report packet count */ | |||
120 | static bool_Bool cap_file_size = true1; /* Report file size */ | |||
121 | static bool_Bool cap_comment = true1; /* Display the capture comment */ | |||
122 | static bool_Bool cap_file_more_info = true1; /* Report more file info */ | |||
123 | static bool_Bool cap_file_idb = true1; /* Report Interface info */ | |||
124 | static bool_Bool cap_file_nrb = true1; /* Report Name Resolution Block info */ | |||
125 | static bool_Bool cap_file_dsb = true1; /* Report Decryption Secrets Block info */ | |||
126 | ||||
127 | static bool_Bool cap_data_size = true1; /* Report packet byte size */ | |||
128 | static bool_Bool cap_duration = true1; /* Report capture duration */ | |||
129 | static bool_Bool cap_earliest_packet_time = true1; /* Report timestamp of earliest packet */ | |||
130 | static bool_Bool cap_latest_packet_time = true1; /* Report timestamp of latest packet */ | |||
131 | static bool_Bool time_as_secs; /* Report time values as raw seconds */ | |||
132 | ||||
133 | static bool_Bool cap_data_rate_byte = true1; /* Report data rate bytes/sec */ | |||
134 | static bool_Bool cap_data_rate_bit = true1; /* Report data rate bites/sec */ | |||
135 | static bool_Bool cap_packet_size = true1; /* Report average packet size */ | |||
136 | static bool_Bool cap_packet_rate = true1; /* Report average packet rate */ | |||
137 | static bool_Bool cap_order = true1; /* Report if packets are in chronological order (True/False) */ | |||
138 | static bool_Bool pkt_comments = true1; /* Report individual packet comments */ | |||
139 | ||||
140 | static bool_Bool cap_file_hashes = true1; /* Calculate file hashes */ | |||
141 | ||||
142 | // Strongest to weakest | |||
143 | #define HASH_SIZE_SHA25632 32 | |||
144 | #define HASH_SIZE_SHA120 20 | |||
145 | ||||
146 | #define HASH_STR_SIZE(65) (65) /* Max hash size * 2 + '\0' */ | |||
147 | #define HASH_BUF_SIZE(1024 * 1024) (1024 * 1024) | |||
148 | ||||
149 | ||||
150 | static char file_sha256[HASH_STR_SIZE(65)]; | |||
151 | static char file_sha1[HASH_STR_SIZE(65)]; | |||
152 | ||||
153 | static char *hash_buf; | |||
154 | static gcry_md_hd_t hd; | |||
155 | ||||
156 | static unsigned int num_ipv4_addresses; | |||
157 | static unsigned int num_ipv6_addresses; | |||
158 | static unsigned int num_decryption_secrets; | |||
159 | ||||
160 | /* | |||
161 | * If we have at least two packets with time stamps, and they're not in | |||
162 | * order - i.e., the later packet has a time stamp older than the earlier | |||
163 | * packet - the time stamps are known not to be in order. | |||
164 | * | |||
165 | * If every packet has a time stamp, and they're all in order, the time | |||
166 | * stamp is known to be in order. | |||
167 | * | |||
168 | * Otherwise, we have no idea. | |||
169 | */ | |||
170 | typedef enum { | |||
171 | IN_ORDER, | |||
172 | NOT_IN_ORDER, | |||
173 | ORDER_UNKNOWN | |||
174 | } order_t; | |||
175 | ||||
176 | typedef struct _pkt_cmt { | |||
177 | int recno; | |||
178 | char *cmt; | |||
179 | struct _pkt_cmt *next; | |||
180 | } pkt_cmt; | |||
181 | ||||
182 | typedef struct _capture_info { | |||
183 | const char *filename; | |||
184 | uint16_t file_type; | |||
185 | wtap_compression_type compression_type; | |||
186 | int file_encap; | |||
187 | int file_tsprec; | |||
188 | wtap *wth; | |||
189 | int64_t filesize; | |||
190 | uint64_t packet_bytes; | |||
191 | bool_Bool times_known; | |||
192 | nstime_t earliest_packet_time; | |||
193 | int earliest_packet_time_tsprec; | |||
194 | nstime_t latest_packet_time; | |||
195 | int latest_packet_time_tsprec; | |||
196 | uint32_t packet_count; | |||
197 | bool_Bool snap_set; /* If set in capture file header */ | |||
198 | uint32_t snaplen; /* value from the capture file header */ | |||
199 | uint32_t snaplen_min_inferred; /* If caplen < len for 1 or more rcds */ | |||
200 | uint32_t snaplen_max_inferred; /* ... */ | |||
201 | bool_Bool drops_known; | |||
202 | uint32_t drop_count; | |||
203 | ||||
204 | nstime_t duration; | |||
205 | int duration_tsprec; | |||
206 | double packet_rate; | |||
207 | double packet_size; | |||
208 | double data_rate; /* in bytes/s */ | |||
209 | bool_Bool know_order; | |||
210 | order_t order; | |||
211 | ||||
212 | int *encap_counts; /* array of per_packet encap counts; array has one entry per wtap_encap type */ | |||
213 | pkt_cmt *pkt_cmts; /* list of packet comments */ | |||
214 | ||||
215 | unsigned int num_interfaces; /* number of IDBs, and thus size of interface_packet_counts array */ | |||
216 | GArray *interface_packet_counts; /* array of per_packet interface_id counts; one entry per file IDB */ | |||
217 | uint32_t pkt_interface_id_unknown; /* counts if packet interface_id didn't match a known one */ | |||
218 | GArray *idb_info_strings; /* array of IDB info strings */ | |||
219 | } capture_info; | |||
220 | ||||
221 | static char *decimal_point; | |||
222 | ||||
223 | static void | |||
224 | enable_all_infos(void) | |||
225 | { | |||
226 | report_all_infos = true1; | |||
227 | ||||
228 | cap_file_type = true1; | |||
229 | cap_file_encap = true1; | |||
230 | cap_snaplen = true1; | |||
231 | cap_packet_count = true1; | |||
232 | cap_file_size = true1; | |||
233 | cap_comment = true1; | |||
234 | pkt_comments = true1; | |||
235 | cap_file_more_info = true1; | |||
236 | cap_file_idb = true1; | |||
237 | cap_file_nrb = true1; | |||
238 | cap_file_dsb = true1; | |||
239 | ||||
240 | cap_data_size = true1; | |||
241 | cap_duration = true1; | |||
242 | cap_earliest_packet_time = true1; | |||
243 | cap_latest_packet_time = true1; | |||
244 | cap_order = true1; | |||
245 | ||||
246 | cap_data_rate_byte = true1; | |||
247 | cap_data_rate_bit = true1; | |||
248 | cap_packet_size = true1; | |||
249 | cap_packet_rate = true1; | |||
250 | ||||
251 | cap_file_hashes = true1; | |||
252 | } | |||
253 | ||||
254 | static void | |||
255 | disable_all_infos(void) | |||
256 | { | |||
257 | report_all_infos = false0; | |||
258 | ||||
259 | cap_file_type = false0; | |||
260 | cap_file_encap = false0; | |||
261 | cap_snaplen = false0; | |||
262 | cap_packet_count = false0; | |||
263 | cap_file_size = false0; | |||
264 | cap_comment = false0; | |||
265 | pkt_comments = false0; | |||
266 | cap_file_more_info = false0; | |||
267 | cap_file_idb = false0; | |||
268 | cap_file_nrb = false0; | |||
269 | cap_file_dsb = false0; | |||
270 | ||||
271 | cap_data_size = false0; | |||
272 | cap_duration = false0; | |||
273 | cap_earliest_packet_time = false0; | |||
274 | cap_latest_packet_time = false0; | |||
275 | cap_order = false0; | |||
276 | ||||
277 | cap_data_rate_byte = false0; | |||
278 | cap_data_rate_bit = false0; | |||
279 | cap_packet_size = false0; | |||
280 | cap_packet_rate = false0; | |||
281 | ||||
282 | cap_file_hashes = false0; | |||
283 | } | |||
284 | ||||
285 | static const char * | |||
286 | order_string(order_t order) | |||
287 | { | |||
288 | switch (order) { | |||
289 | ||||
290 | case IN_ORDER: | |||
291 | return "True"; | |||
292 | ||||
293 | case NOT_IN_ORDER: | |||
294 | return "False"; | |||
295 | ||||
296 | case ORDER_UNKNOWN: | |||
297 | return "Unknown"; | |||
298 | ||||
299 | default: | |||
300 | return "???"; /* "cannot happen" (the next step is "Profit!") */ | |||
301 | } | |||
302 | } | |||
303 | ||||
304 | static char * | |||
305 | absolute_time_string(nstime_t *timer, int tsprecision, capture_info *cf_info) | |||
306 | { | |||
307 | /* | |||
308 | * https://web.archive.org/web/20120513133703/http://www.idrbt.ac.in/publications/workingpapers/Working%20Paper%20No.%209.pdf | |||
309 | * | |||
310 | * says: | |||
311 | * | |||
312 | * A 64-bit Unix time would be safe for the indefinite future, as | |||
313 | * this variable would not overflow until 2**63 or | |||
314 | * 9,223,372,036,854,775,808 (over nine quintillion) seconds | |||
315 | * after the beginning of the Unix epoch - corresponding to | |||
316 | * GMT 15:30:08, Sunday, 4th December, 292,277,026,596. | |||
317 | * | |||
318 | * So, if we're displaying the time as YYYY-MM-DD HH:MM:SS.SSSSSSSSS, | |||
319 | * we'll have the buffer be large enough for a date of the format | |||
320 | * 292277026596-MM-DD HH:MM:SS.SSSSSSSSS, which is the biggest value | |||
321 | * you'll get with a 64-bit time_t and a nanosecond-resolution | |||
322 | * fraction-of-a-second. | |||
323 | * | |||
324 | * That's 12+1+2+1+2+1+2+1+2+2+2+1+9+1, including the terminating | |||
325 | * \0, or 39. | |||
326 | * | |||
327 | * If we're displaying the time as epoch time, and the time is | |||
328 | * unsigned, 2^64-1 is 18446744073709551615, so the buffer has | |||
329 | * to be big enough for 18446744073709551615.999999999. That's | |||
330 | * 20+1+9+1, including the terminating '\0', or 31. If it's | |||
331 | * signed, 2^63 is 9223372036854775808, so the buffer has to | |||
332 | * be big enough for -9223372036854775808.999999999, which is | |||
333 | * again 20+1+9+1, or 31. | |||
334 | * | |||
335 | * So we go with 39. | |||
336 | */ | |||
337 | static char time_string_buf[39]; | |||
338 | ||||
339 | if (cf_info->times_known && cf_info->packet_count > 0) { | |||
340 | if (time_as_secs) { | |||
341 | display_epoch_time(time_string_buf, sizeof time_string_buf, timer, tsprecision); | |||
342 | } else { | |||
343 | format_nstime_as_iso8601(time_string_buf, sizeof time_string_buf, timer, decimal_point, true1, tsprecision); | |||
344 | } | |||
345 | } else { | |||
346 | snprintf(time_string_buf, sizeof time_string_buf, "n/a"); | |||
347 | } | |||
348 | return time_string_buf; | |||
349 | } | |||
350 | ||||
351 | static char * | |||
352 | relative_time_string(nstime_t *timer, int tsprecision, capture_info *cf_info, bool_Bool want_seconds) | |||
353 | { | |||
354 | const char *second = want_seconds ? " second" : ""; | |||
355 | const char *plural = want_seconds ? "s" : ""; | |||
356 | /* | |||
357 | * If we're displaying the time as epoch time, and the time is | |||
358 | * unsigned, 2^64-1 is 18446744073709551615, so the buffer has | |||
359 | * to be big enough for "18446744073709551615.999999999 seconds". | |||
360 | * That's 20+1+9+1+7+1, including the terminating '\0', or 39. | |||
361 | * If it'ssigned, 2^63 is 9223372036854775808, so the buffer has to | |||
362 | * be big enough for "-9223372036854775808.999999999 seconds", | |||
363 | * which is again 20+1+9+1+7+1, or 39. | |||
364 | */ | |||
365 | static char time_string_buf[39]; | |||
366 | ||||
367 | if (cf_info->times_known && cf_info->packet_count > 0) { | |||
368 | char *ptr; | |||
369 | size_t remaining; | |||
370 | int num_bytes; | |||
371 | ||||
372 | ptr = time_string_buf; | |||
373 | remaining = sizeof time_string_buf; | |||
374 | num_bytes = snprintf(ptr, remaining, | |||
375 | "%"PRId64"l" "d", | |||
376 | (int64_t)timer->secs); | |||
377 | if (num_bytes < 0) { | |||
378 | /* | |||
379 | * That got an error. | |||
380 | * Not much else we can do. | |||
381 | */ | |||
382 | snprintf(ptr, remaining, "snprintf() failed"); | |||
383 | return time_string_buf; | |||
384 | } | |||
385 | if ((unsigned int)num_bytes >= remaining) { | |||
386 | /* | |||
387 | * That filled up or would have overflowed the buffer. | |||
388 | * Nothing more we can do. | |||
389 | */ | |||
390 | return time_string_buf; | |||
391 | } | |||
392 | ptr += num_bytes; | |||
393 | remaining -= num_bytes; | |||
394 | ||||
395 | if (tsprecision != 0) { | |||
396 | /* | |||
397 | * Append the fractional part. | |||
398 | */ | |||
399 | num_bytes = format_fractional_part_nsecs(ptr, remaining, timer->nsecs, decimal_point, tsprecision); | |||
400 | if ((unsigned int)num_bytes >= remaining) { | |||
401 | /* | |||
402 | * That filled up or would have overflowed the buffer. | |||
403 | * Nothing more we can do. | |||
404 | */ | |||
405 | return time_string_buf; | |||
406 | } | |||
407 | ptr += num_bytes; | |||
408 | remaining -= num_bytes; | |||
409 | } | |||
410 | ||||
411 | /* | |||
412 | * Append the units. | |||
413 | */ | |||
414 | snprintf(ptr, remaining, "%s%s", | |||
415 | second, | |||
416 | timer->secs == 1 ? "" : plural); | |||
417 | ||||
418 | return time_string_buf; | |||
419 | } | |||
420 | ||||
421 | snprintf(time_string_buf, sizeof time_string_buf, "n/a"); | |||
422 | return time_string_buf; | |||
423 | } | |||
424 | ||||
425 | static void print_value(const char *text_p1, int width, const char *text_p2, double value) | |||
426 | { | |||
427 | if (value > 0.0) | |||
428 | printf("%s%.*f%s\n", text_p1, width, value, text_p2); | |||
429 | else | |||
430 | printf("%sn/a\n", text_p1); | |||
431 | } | |||
432 | ||||
433 | /* multi-line comments would conflict with the formatting that capinfos uses | |||
434 | we replace linefeeds with spaces */ | |||
435 | static void | |||
436 | string_replace_newlines(char *str) | |||
437 | { | |||
438 | char *p; | |||
439 | ||||
440 | if (str) { | |||
441 | p = str; | |||
442 | while (*p != '\0') { | |||
443 | if (*p == '\n') | |||
444 | *p = ' '; | |||
445 | if (*p == '\r') | |||
446 | *p = ' '; | |||
447 | p++; | |||
448 | } | |||
449 | } | |||
450 | } | |||
451 | ||||
452 | static void | |||
453 | show_option_string(const char *prefix, const char *option_str) | |||
454 | { | |||
455 | char *str; | |||
456 | ||||
457 | if (option_str != NULL((void*)0) && option_str[0] != '\0') { | |||
458 | str = g_strdup(option_str)g_strdup_inline (option_str); | |||
459 | string_replace_newlines(str); | |||
460 | printf("%s%s\n", prefix, str); | |||
461 | g_free(str); | |||
462 | } | |||
463 | } | |||
464 | ||||
465 | static void | |||
466 | print_stats(const char *filename, capture_info *cf_info) | |||
467 | { | |||
468 | const char *file_type_string, *file_encap_string; | |||
469 | char *size_string; | |||
470 | pkt_cmt *p, *prev; | |||
471 | ||||
472 | /* Build printable strings for various stats */ | |||
473 | if (machine_readable) { | |||
474 | file_type_string = wtap_file_type_subtype_name(cf_info->file_type); | |||
475 | file_encap_string = wtap_encap_name(cf_info->file_encap); | |||
476 | } | |||
477 | else { | |||
478 | file_type_string = wtap_file_type_subtype_description(cf_info->file_type); | |||
479 | file_encap_string = wtap_encap_description(cf_info->file_encap); | |||
480 | } | |||
481 | ||||
482 | if (filename) printf ("File name: %s\n", filename); | |||
483 | if (cap_file_type) { | |||
484 | const char *compression_type_description; | |||
485 | compression_type_description = wtap_compression_type_description(cf_info->compression_type); | |||
486 | if (compression_type_description == NULL((void*)0)) | |||
487 | printf ("File type: %s\n", | |||
488 | file_type_string); | |||
489 | else | |||
490 | printf ("File type: %s (%s)\n", | |||
491 | file_type_string, compression_type_description); | |||
492 | } | |||
493 | if (cap_file_encap) { | |||
494 | printf ("File encapsulation: %s\n", file_encap_string); | |||
495 | if (cf_info->file_encap == WTAP_ENCAP_PER_PACKET-1) { | |||
496 | int i; | |||
497 | printf ("Encapsulation in use by packets (# of pkts):\n"); | |||
498 | for (i=0; i<WTAP_NUM_ENCAP_TYPESwtap_get_num_encap_types(); i++) { | |||
499 | if (cf_info->encap_counts[i] > 0) | |||
500 | printf(" %s (%d)\n", | |||
501 | wtap_encap_description(i), cf_info->encap_counts[i]); | |||
502 | } | |||
503 | } | |||
504 | } | |||
505 | if (cap_file_more_info) { | |||
506 | printf ("File timestamp precision: %s (%d)\n", | |||
507 | wtap_tsprec_string(cf_info->file_tsprec), cf_info->file_tsprec); | |||
508 | } | |||
509 | ||||
510 | if (cap_snaplen && cf_info->snap_set) | |||
511 | printf ("Packet size limit: file hdr: %u bytes\n", cf_info->snaplen); | |||
512 | else if (cap_snaplen && !cf_info->snap_set) | |||
513 | printf ("Packet size limit: file hdr: (not set)\n"); | |||
514 | if (cf_info->snaplen_max_inferred > 0) { | |||
515 | if (cf_info->snaplen_min_inferred == cf_info->snaplen_max_inferred) | |||
516 | printf ("Packet size limit: inferred: %u bytes\n", cf_info->snaplen_min_inferred); | |||
517 | else | |||
518 | printf ("Packet size limit: inferred: %u bytes - %u bytes (range)\n", | |||
519 | cf_info->snaplen_min_inferred, cf_info->snaplen_max_inferred); | |||
520 | } | |||
521 | if (cap_packet_count) { | |||
522 | printf ("Number of packets: "); | |||
523 | if (machine_readable) { | |||
524 | printf ("%u\n", cf_info->packet_count); | |||
525 | } else { | |||
526 | size_string = format_size(cf_info->packet_count, FORMAT_SIZE_UNIT_NONE, 0)format_size_wmem(((void*)0), cf_info->packet_count, FORMAT_SIZE_UNIT_NONE , 0); | |||
527 | printf ("%s\n", size_string); | |||
528 | g_free(size_string); | |||
529 | } | |||
530 | } | |||
531 | if (cap_file_size) { | |||
532 | printf ("File size: "); | |||
533 | if (machine_readable) { | |||
534 | printf ("%" PRId64"l" "d" " bytes\n", cf_info->filesize); | |||
535 | } else { | |||
536 | size_string = format_size(cf_info->filesize, FORMAT_SIZE_UNIT_BYTES, 0)format_size_wmem(((void*)0), cf_info->filesize, FORMAT_SIZE_UNIT_BYTES , 0); | |||
537 | printf ("%s\n", size_string); | |||
538 | g_free(size_string); | |||
539 | } | |||
540 | } | |||
541 | if (cap_data_size) { | |||
542 | printf ("Data size: "); | |||
543 | if (machine_readable) { | |||
544 | printf ("%" PRIu64"l" "u" " bytes\n", cf_info->packet_bytes); | |||
545 | } else { | |||
546 | size_string = format_size(cf_info->packet_bytes, FORMAT_SIZE_UNIT_BYTES, 0)format_size_wmem(((void*)0), cf_info->packet_bytes, FORMAT_SIZE_UNIT_BYTES , 0); | |||
547 | printf ("%s\n", size_string); | |||
548 | g_free(size_string); | |||
549 | } | |||
550 | } | |||
551 | if (cf_info->times_known) { | |||
552 | if (cap_duration) /* XXX - shorten to hh:mm:ss */ | |||
553 | printf("Capture duration: %s\n", relative_time_string(&cf_info->duration, cf_info->duration_tsprec, cf_info, true1)); | |||
554 | if (cap_earliest_packet_time) | |||
555 | printf("Earliest packet time: %s\n", absolute_time_string(&cf_info->earliest_packet_time, cf_info->earliest_packet_time_tsprec, cf_info)); | |||
556 | if (cap_latest_packet_time) | |||
557 | printf("Latest packet time: %s\n", absolute_time_string(&cf_info->latest_packet_time, cf_info->latest_packet_time_tsprec, cf_info)); | |||
558 | if (cap_data_rate_byte) { | |||
559 | printf("Data byte rate: "); | |||
560 | if (machine_readable) { | |||
561 | print_value("", 2, " bytes/sec", cf_info->data_rate); | |||
562 | } else { | |||
563 | size_string = format_size((int64_t)cf_info->data_rate, FORMAT_SIZE_UNIT_BYTES_S, 0)format_size_wmem(((void*)0), (int64_t)cf_info->data_rate, FORMAT_SIZE_UNIT_BYTES_S , 0); | |||
564 | printf ("%s\n", size_string); | |||
565 | g_free(size_string); | |||
566 | } | |||
567 | } | |||
568 | if (cap_data_rate_bit) { | |||
569 | printf("Data bit rate: "); | |||
570 | if (machine_readable) { | |||
571 | print_value("", 2, " bits/sec", cf_info->data_rate*8); | |||
572 | } else { | |||
573 | size_string = format_size((int64_t)(cf_info->data_rate*8), FORMAT_SIZE_UNIT_BITS_S, 0)format_size_wmem(((void*)0), (int64_t)(cf_info->data_rate* 8), FORMAT_SIZE_UNIT_BITS_S, 0); | |||
574 | printf ("%s\n", size_string); | |||
575 | g_free(size_string); | |||
576 | } | |||
577 | } | |||
578 | } | |||
579 | if (cap_packet_size) printf("Average packet size: %.2f bytes\n", cf_info->packet_size); | |||
580 | if (cf_info->times_known) { | |||
581 | if (cap_packet_rate) { | |||
582 | printf("Average packet rate: "); | |||
583 | if (machine_readable) { | |||
584 | print_value("", 2, " packets/sec", cf_info->packet_rate); | |||
585 | } else { | |||
586 | size_string = format_size((int64_t)cf_info->packet_rate, FORMAT_SIZE_UNIT_PACKETS_S, 0)format_size_wmem(((void*)0), (int64_t)cf_info->packet_rate , FORMAT_SIZE_UNIT_PACKETS_S, 0); | |||
587 | printf ("%s\n", size_string); | |||
588 | g_free(size_string); | |||
589 | } | |||
590 | } | |||
591 | } | |||
592 | if (cap_file_hashes) { | |||
593 | printf ("SHA256: %s\n", file_sha256); | |||
594 | printf ("SHA1: %s\n", file_sha1); | |||
595 | } | |||
596 | if (cap_order) printf ("Strict time order: %s\n", order_string(cf_info->order)); | |||
597 | ||||
598 | bool_Bool has_multiple_sections = (wtap_file_get_num_shbs(cf_info->wth) > 1); | |||
599 | ||||
600 | for (unsigned int section_number = 0; | |||
601 | section_number < wtap_file_get_num_shbs(cf_info->wth); | |||
602 | section_number++) { | |||
603 | wtap_block_t shb; | |||
604 | ||||
605 | // If we have more than one section, add headers for each section. | |||
606 | if (has_multiple_sections) | |||
607 | printf("Section %u:\n\n", section_number); | |||
608 | ||||
609 | shb = wtap_file_get_shb(cf_info->wth, section_number); | |||
610 | if (shb != NULL((void*)0)) { | |||
611 | if (cap_file_more_info) { | |||
612 | char *str; | |||
613 | ||||
614 | if (wtap_block_get_string_option_value(shb, OPT_SHB_HARDWARE2, &str) == WTAP_OPTTYPE_SUCCESS) | |||
615 | show_option_string("Capture hardware: ", str); | |||
616 | if (wtap_block_get_string_option_value(shb, OPT_SHB_OS3, &str) == WTAP_OPTTYPE_SUCCESS) | |||
617 | show_option_string("Capture oper-sys: ", str); | |||
618 | if (wtap_block_get_string_option_value(shb, OPT_SHB_USERAPPL4, &str) == WTAP_OPTTYPE_SUCCESS) | |||
619 | show_option_string("Capture application: ", str); | |||
620 | } | |||
621 | if (cap_comment) { | |||
622 | unsigned int i; | |||
623 | char *str; | |||
624 | ||||
625 | for (i = 0; wtap_block_get_nth_string_option_value(shb, OPT_COMMENT1, i, &str) == WTAP_OPTTYPE_SUCCESS; i++) { | |||
626 | show_option_string("Capture comment: ", str); | |||
627 | } | |||
628 | } | |||
629 | } | |||
630 | } | |||
631 | ||||
632 | if (pkt_comments && cf_info->pkt_cmts != NULL((void*)0)) { | |||
633 | for (p = cf_info->pkt_cmts; p != NULL((void*)0); prev = p, p = p->next, g_free(prev)) { | |||
634 | if (machine_readable){ | |||
635 | printf("Packet %d Comment: %s\n", p->recno, g_strescape(p->cmt, NULL((void*)0))); | |||
636 | } else { | |||
637 | printf("Packet %d Comment: %s\n", p->recno, p->cmt); | |||
638 | } | |||
639 | g_free(p->cmt); | |||
640 | } | |||
641 | } | |||
642 | ||||
643 | if (cap_file_idb && cf_info->num_interfaces != 0) { | |||
644 | unsigned int i; | |||
645 | ws_assert(cf_info->num_interfaces == cf_info->idb_info_strings->len)do { if ((1) && !(cf_info->num_interfaces == cf_info ->idb_info_strings->len)) ws_log_fatal_full("Main", LOG_LEVEL_ERROR , "capinfos.c", 645, __func__, "assertion failed: %s", "cf_info->num_interfaces == cf_info->idb_info_strings->len" ); } while (0); | |||
646 | printf ("Number of interfaces in file: %u\n", cf_info->num_interfaces); | |||
647 | for (i = 0; i < cf_info->idb_info_strings->len; i++) { | |||
648 | char *s = g_array_index(cf_info->idb_info_strings, char*, i)(((char**) (void *) (cf_info->idb_info_strings)->data) [ (i)]); | |||
649 | uint32_t packet_count = 0; | |||
650 | if (i < cf_info->interface_packet_counts->len) | |||
651 | packet_count = g_array_index(cf_info->interface_packet_counts, uint32_t, i)(((uint32_t*) (void *) (cf_info->interface_packet_counts)-> data) [(i)]); | |||
652 | printf ("Interface #%u info:\n", i); | |||
653 | printf ("%s", s); | |||
654 | printf (" Number of packets = %u\n", packet_count); | |||
655 | } | |||
656 | } | |||
657 | ||||
658 | if (cap_file_nrb) { | |||
659 | if (num_ipv4_addresses != 0) | |||
660 | printf ("Number of resolved IPv4 addresses in file: %u\n", num_ipv4_addresses); | |||
661 | if (num_ipv6_addresses != 0) | |||
662 | printf ("Number of resolved IPv6 addresses in file: %u\n", num_ipv6_addresses); | |||
663 | } | |||
664 | if (cap_file_dsb) { | |||
665 | if (num_decryption_secrets != 0) | |||
666 | printf ("Number of decryption secrets in file: %u\n", num_decryption_secrets); | |||
667 | } | |||
668 | } | |||
669 | ||||
670 | static void | |||
671 | putsep(void) | |||
672 | { | |||
673 | if (field_separator) putchar(field_separator); | |||
674 | } | |||
675 | ||||
676 | static void | |||
677 | putquote(void) | |||
678 | { | |||
679 | if (quote_char) putchar(quote_char); | |||
680 | } | |||
681 | ||||
682 | static void | |||
683 | print_stats_table_header_label(const char *label) | |||
684 | { | |||
685 | putsep(); | |||
686 | putquote(); | |||
687 | printf("%s", label); | |||
688 | putquote(); | |||
689 | } | |||
690 | ||||
691 | static void | |||
692 | print_stats_table_header(capture_info *cf_info) | |||
693 | { | |||
694 | pkt_cmt *p; | |||
695 | char *buf; | |||
696 | size_t buf_len; | |||
697 | ||||
698 | putquote(); | |||
699 | printf("File name"); | |||
700 | putquote(); | |||
701 | ||||
702 | if (cap_file_type) print_stats_table_header_label("File type"); | |||
703 | if (cap_file_encap) print_stats_table_header_label("File encapsulation"); | |||
704 | if (cap_file_more_info) print_stats_table_header_label("File time precision"); | |||
705 | if (cap_snaplen) { | |||
706 | print_stats_table_header_label("Packet size limit"); | |||
707 | print_stats_table_header_label("Packet size limit min (inferred)"); | |||
708 | print_stats_table_header_label("Packet size limit max (inferred)"); | |||
709 | } | |||
710 | if (cap_packet_count) print_stats_table_header_label("Number of packets"); | |||
711 | if (cap_file_size) print_stats_table_header_label("File size (bytes)"); | |||
712 | if (cap_data_size) print_stats_table_header_label("Data size (bytes)"); | |||
713 | if (cap_duration) print_stats_table_header_label("Capture duration (seconds)"); | |||
714 | if (cap_earliest_packet_time) print_stats_table_header_label("Start time"); | |||
715 | if (cap_latest_packet_time) print_stats_table_header_label("End time"); | |||
716 | if (cap_data_rate_byte) print_stats_table_header_label("Data byte rate (bytes/sec)"); | |||
717 | if (cap_data_rate_bit) print_stats_table_header_label("Data bit rate (bits/sec)"); | |||
718 | if (cap_packet_size) print_stats_table_header_label("Average packet size (bytes)"); | |||
719 | if (cap_packet_rate) print_stats_table_header_label("Average packet rate (packets/sec)"); | |||
720 | if (cap_file_hashes) { | |||
721 | print_stats_table_header_label("SHA256"); | |||
722 | print_stats_table_header_label("SHA1"); | |||
723 | } | |||
724 | if (cap_order) print_stats_table_header_label("Strict time order"); | |||
725 | if (cap_file_more_info
| |||
726 | print_stats_table_header_label("Capture hardware"); | |||
727 | print_stats_table_header_label("Capture oper-sys"); | |||
728 | print_stats_table_header_label("Capture application"); | |||
729 | } | |||
730 | if (cap_comment) print_stats_table_header_label("Capture comment"); | |||
731 | ||||
732 | if (pkt_comments && cf_info->pkt_cmts != NULL((void*)0)) { | |||
733 | /* Packet 2^64 Comment" + NULL */ | |||
734 | buf_len = strlen("Packet 18446744073709551616 Comment") + 1; | |||
735 | buf = (char *)g_malloc0(buf_len); | |||
736 | ||||
737 | for (p = cf_info->pkt_cmts; p
| |||
738 | snprintf(buf, buf_len, "Packet %d Comment", p->recno); | |||
739 | print_stats_table_header_label(buf); | |||
740 | } | |||
741 | } | |||
742 | ||||
743 | printf("\n"); | |||
| ||||
744 | } | |||
745 | ||||
746 | static void | |||
747 | print_stats_table(const char *filename, capture_info *cf_info) | |||
748 | { | |||
749 | const char *file_type_string, *file_encap_string; | |||
750 | pkt_cmt *p, *prev; | |||
751 | ||||
752 | /* Build printable strings for various stats */ | |||
753 | file_type_string = wtap_file_type_subtype_name(cf_info->file_type); | |||
754 | file_encap_string = wtap_encap_name(cf_info->file_encap); | |||
755 | ||||
756 | if (filename) { | |||
757 | putquote(); | |||
758 | printf("%s", filename); | |||
759 | putquote(); | |||
760 | } | |||
761 | ||||
762 | if (cap_file_type) { | |||
763 | putsep(); | |||
764 | putquote(); | |||
765 | printf("%s", file_type_string); | |||
766 | putquote(); | |||
767 | } | |||
768 | ||||
769 | /* ToDo: If WTAP_ENCAP_PER_PACKET, show the list of encapsulations encountered; | |||
770 | * Output a line for each different encap with all fields repeated except | |||
771 | * the encapsulation field which has "Per Packet: ..." for each | |||
772 | * encapsulation type seen ? | |||
773 | */ | |||
774 | if (cap_file_encap) { | |||
775 | putsep(); | |||
776 | putquote(); | |||
777 | printf("%s", file_encap_string); | |||
778 | putquote(); | |||
779 | } | |||
780 | ||||
781 | if (cap_file_more_info) { | |||
782 | putsep(); | |||
783 | putquote(); | |||
784 | printf("%s", wtap_tsprec_string(cf_info->file_tsprec)); | |||
785 | putquote(); | |||
786 | } | |||
787 | ||||
788 | if (cap_snaplen) { | |||
789 | putsep(); | |||
790 | putquote(); | |||
791 | if (cf_info->snap_set) | |||
792 | printf("%u", cf_info->snaplen); | |||
793 | else | |||
794 | printf("(not set)"); | |||
795 | putquote(); | |||
796 | if (cf_info->snaplen_max_inferred > 0) { | |||
797 | putsep(); | |||
798 | putquote(); | |||
799 | printf("%u", cf_info->snaplen_min_inferred); | |||
800 | putquote(); | |||
801 | putsep(); | |||
802 | putquote(); | |||
803 | printf("%u", cf_info->snaplen_max_inferred); | |||
804 | putquote(); | |||
805 | } | |||
806 | else { | |||
807 | putsep(); | |||
808 | putquote(); | |||
809 | printf("n/a"); | |||
810 | putquote(); | |||
811 | putsep(); | |||
812 | putquote(); | |||
813 | printf("n/a"); | |||
814 | putquote(); | |||
815 | } | |||
816 | } | |||
817 | ||||
818 | if (cap_packet_count) { | |||
819 | putsep(); | |||
820 | putquote(); | |||
821 | printf("%u", cf_info->packet_count); | |||
822 | putquote(); | |||
823 | } | |||
824 | ||||
825 | if (cap_file_size) { | |||
826 | putsep(); | |||
827 | putquote(); | |||
828 | printf("%" PRId64"l" "d", cf_info->filesize); | |||
829 | putquote(); | |||
830 | } | |||
831 | ||||
832 | if (cap_data_size) { | |||
833 | putsep(); | |||
834 | putquote(); | |||
835 | printf("%" PRIu64"l" "u", cf_info->packet_bytes); | |||
836 | putquote(); | |||
837 | } | |||
838 | ||||
839 | if (cap_duration) { | |||
840 | putsep(); | |||
841 | putquote(); | |||
842 | printf("%s", relative_time_string(&cf_info->duration, cf_info->duration_tsprec, cf_info, false0)); | |||
843 | putquote(); | |||
844 | } | |||
845 | ||||
846 | if (cap_earliest_packet_time) { | |||
847 | putsep(); | |||
848 | putquote(); | |||
849 | printf("%s", absolute_time_string(&cf_info->earliest_packet_time, cf_info->earliest_packet_time_tsprec, cf_info)); | |||
850 | putquote(); | |||
851 | } | |||
852 | ||||
853 | if (cap_latest_packet_time) { | |||
854 | putsep(); | |||
855 | putquote(); | |||
856 | printf("%s", absolute_time_string(&cf_info->latest_packet_time, cf_info->latest_packet_time_tsprec, cf_info)); | |||
857 | putquote(); | |||
858 | } | |||
859 | ||||
860 | if (cap_data_rate_byte) { | |||
861 | putsep(); | |||
862 | putquote(); | |||
863 | if (cf_info->times_known) | |||
864 | printf("%.2f", cf_info->data_rate); | |||
865 | else | |||
866 | printf("n/a"); | |||
867 | putquote(); | |||
868 | } | |||
869 | ||||
870 | if (cap_data_rate_bit) { | |||
871 | putsep(); | |||
872 | putquote(); | |||
873 | if (cf_info->times_known) | |||
874 | printf("%.2f", cf_info->data_rate*8); | |||
875 | else | |||
876 | printf("n/a"); | |||
877 | putquote(); | |||
878 | } | |||
879 | ||||
880 | if (cap_packet_size) { | |||
881 | putsep(); | |||
882 | putquote(); | |||
883 | printf("%.2f", cf_info->packet_size); | |||
884 | putquote(); | |||
885 | } | |||
886 | ||||
887 | if (cap_packet_rate) { | |||
888 | putsep(); | |||
889 | putquote(); | |||
890 | if (cf_info->times_known) | |||
891 | printf("%.2f", cf_info->packet_rate); | |||
892 | else | |||
893 | printf("n/a"); | |||
894 | putquote(); | |||
895 | } | |||
896 | ||||
897 | if (cap_file_hashes) { | |||
898 | putsep(); | |||
899 | putquote(); | |||
900 | printf("%s", file_sha256); | |||
901 | putquote(); | |||
902 | ||||
903 | putsep(); | |||
904 | putquote(); | |||
905 | printf("%s", file_sha1); | |||
906 | putquote(); | |||
907 | } | |||
908 | ||||
909 | if (cap_order) { | |||
910 | putsep(); | |||
911 | putquote(); | |||
912 | printf("%s", order_string(cf_info->order)); | |||
913 | putquote(); | |||
914 | } | |||
915 | ||||
916 | for (unsigned section_number = 0; | |||
917 | section_number < wtap_file_get_num_shbs(cf_info->wth); | |||
918 | section_number++) { | |||
919 | wtap_block_t shb; | |||
920 | ||||
921 | shb = wtap_file_get_shb(cf_info->wth, section_number); | |||
922 | if (cap_file_more_info) { | |||
923 | char *str; | |||
924 | ||||
925 | putsep(); | |||
926 | putquote(); | |||
927 | if (wtap_block_get_string_option_value(shb, OPT_SHB_HARDWARE2, &str) == WTAP_OPTTYPE_SUCCESS) { | |||
928 | printf("%s", str); | |||
929 | } | |||
930 | putquote(); | |||
931 | ||||
932 | putsep(); | |||
933 | putquote(); | |||
934 | if (wtap_block_get_string_option_value(shb, OPT_SHB_OS3, &str) == WTAP_OPTTYPE_SUCCESS) { | |||
935 | printf("%s", str); | |||
936 | } | |||
937 | putquote(); | |||
938 | ||||
939 | putsep(); | |||
940 | putquote(); | |||
941 | if (wtap_block_get_string_option_value(shb, OPT_SHB_USERAPPL4, &str) == WTAP_OPTTYPE_SUCCESS) { | |||
942 | printf("%s", str); | |||
943 | } | |||
944 | putquote(); | |||
945 | } | |||
946 | ||||
947 | /* | |||
948 | * One might argue that the following is silly to put into a table format, | |||
949 | * but oh well note that there may be *more than one* of each of these types | |||
950 | * of options. To mitigate some of the potential silliness the if(cap_comment) | |||
951 | * block is moved AFTER the if(cap_file_more_info) block. This will make any | |||
952 | * comments the last item(s) in each row. We now have a new -K option to | |||
953 | * disable cap_comment to more easily manage the potential silliness. | |||
954 | * Potential silliness includes multiple comments (therefore resulting in | |||
955 | * more than one additional column and/or comments with embedded newlines | |||
956 | * and/or possible delimiters). | |||
957 | * | |||
958 | * To mitigate embedded newlines and other special characters, use -M | |||
959 | */ | |||
960 | if (cap_comment) { | |||
961 | unsigned int i; | |||
962 | char *opt_comment; | |||
963 | bool_Bool have_cap = false0; | |||
964 | ||||
965 | for (i = 0; wtap_block_get_nth_string_option_value(shb, OPT_COMMENT1, i, &opt_comment) == WTAP_OPTTYPE_SUCCESS; i++) { | |||
966 | have_cap = true1; | |||
967 | putsep(); | |||
968 | putquote(); | |||
969 | if (machine_readable){ | |||
970 | printf("%s", g_strescape(opt_comment, NULL((void*)0))); | |||
971 | } else { | |||
972 | printf("%s", opt_comment); | |||
973 | } | |||
974 | putquote(); | |||
975 | } | |||
976 | if(!have_cap) { | |||
977 | /* Maintain column alignment when we have no OPT_COMMENT */ | |||
978 | putsep(); | |||
979 | putquote(); | |||
980 | putquote(); | |||
981 | } | |||
982 | } | |||
983 | ||||
984 | } | |||
985 | ||||
986 | if (pkt_comments && cf_info->pkt_cmts != NULL((void*)0)) { | |||
987 | for(p = cf_info->pkt_cmts; p != NULL((void*)0); prev = p, p = p->next, g_free(prev)) { | |||
988 | putsep(); | |||
989 | putquote(); | |||
990 | if (machine_readable) { | |||
991 | printf("%s", g_strescape(p->cmt, NULL((void*)0))); | |||
992 | } else { | |||
993 | printf("%s", p->cmt); | |||
994 | } | |||
995 | g_free(p->cmt); | |||
996 | putquote(); | |||
997 | } | |||
998 | } | |||
999 | ||||
1000 | printf("\n"); | |||
1001 | } | |||
1002 | ||||
1003 | static void | |||
1004 | cleanup_capture_info(capture_info *cf_info) | |||
1005 | { | |||
1006 | unsigned int i; | |||
1007 | ws_assert(cf_info != NULL)do { if ((1) && !(cf_info != ((void*)0))) ws_log_fatal_full ("Main", LOG_LEVEL_ERROR, "capinfos.c", 1007, __func__, "assertion failed: %s" , "cf_info != ((void*)0)"); } while (0); | |||
1008 | ||||
1009 | g_free(cf_info->encap_counts); | |||
1010 | cf_info->encap_counts = NULL((void*)0); | |||
1011 | ||||
1012 | g_array_free(cf_info->interface_packet_counts, true1); | |||
1013 | cf_info->interface_packet_counts = NULL((void*)0); | |||
1014 | ||||
1015 | if (cf_info->idb_info_strings) { | |||
1016 | for (i = 0; i < cf_info->idb_info_strings->len; i++) { | |||
1017 | char *s = g_array_index(cf_info->idb_info_strings, char*, i)(((char**) (void *) (cf_info->idb_info_strings)->data) [ (i)]); | |||
1018 | g_free(s); | |||
1019 | } | |||
1020 | g_array_free(cf_info->idb_info_strings, true1); | |||
1021 | } | |||
1022 | cf_info->idb_info_strings = NULL((void*)0); | |||
1023 | } | |||
1024 | ||||
1025 | static void | |||
1026 | count_ipv4_address(const unsigned int addr _U___attribute__((unused)), const char *name _U___attribute__((unused)), const bool_Bool static_entry _U___attribute__((unused))) | |||
1027 | { | |||
1028 | num_ipv4_addresses++; | |||
1029 | } | |||
1030 | ||||
1031 | static void | |||
1032 | count_ipv6_address(const ws_in6_addr *addrp _U___attribute__((unused)), const char *name _U___attribute__((unused)), const bool_Bool static_entry _U___attribute__((unused))) | |||
1033 | { | |||
1034 | num_ipv6_addresses++; | |||
1035 | } | |||
1036 | ||||
1037 | static void | |||
1038 | count_decryption_secret(uint32_t secrets_type _U___attribute__((unused)), const void *secrets _U___attribute__((unused)), unsigned int size _U___attribute__((unused))) | |||
1039 | { | |||
1040 | /* XXX - count them based on the secrets type (which is an opaque code, | |||
1041 | not a small integer)? */ | |||
1042 | num_decryption_secrets++; | |||
1043 | } | |||
1044 | ||||
1045 | static void | |||
1046 | hash_to_str(const unsigned char *hash, size_t length, char *str) | |||
1047 | { | |||
1048 | int i; | |||
1049 | ||||
1050 | for (i = 0; i < (int) length; i++) { | |||
1051 | snprintf(str+(i*2), 3, "%02x", hash[i]); | |||
1052 | } | |||
1053 | } | |||
1054 | ||||
1055 | static void | |||
1056 | calculate_hashes(const char *filename) | |||
1057 | { | |||
1058 | FILE *fh; | |||
1059 | size_t hash_bytes; | |||
1060 | ||||
1061 | (void) g_strlcpy(file_sha256, "<unknown>", HASH_STR_SIZE(65)); | |||
1062 | (void) g_strlcpy(file_sha1, "<unknown>", HASH_STR_SIZE(65)); | |||
1063 | ||||
1064 | if (cap_file_hashes) { | |||
1065 | fh = ws_fopenfopen(filename, "rb"); | |||
1066 | if (fh && hd) { | |||
1067 | while((hash_bytes = fread(hash_buf, 1, HASH_BUF_SIZE(1024 * 1024), fh)) > 0) { | |||
1068 | gcry_md_write(hd, hash_buf, hash_bytes); | |||
1069 | } | |||
1070 | gcry_md_final(hd)gcry_md_ctl ((hd), GCRYCTL_FINALIZE, ((void*)0), 0); | |||
1071 | hash_to_str(gcry_md_read(hd, GCRY_MD_SHA256), HASH_SIZE_SHA25632, file_sha256); | |||
1072 | hash_to_str(gcry_md_read(hd, GCRY_MD_SHA1), HASH_SIZE_SHA120, file_sha1); | |||
1073 | } | |||
1074 | if (fh) fclose(fh); | |||
1075 | if (hd) gcry_md_reset(hd); | |||
1076 | } | |||
1077 | } | |||
1078 | ||||
1079 | static int | |||
1080 | process_cap_file(const char *filename, bool_Bool need_separator) | |||
1081 | { | |||
1082 | int status = 0; | |||
1083 | int err; | |||
1084 | char *err_info; | |||
1085 | int64_t size; | |||
1086 | int64_t data_offset; | |||
1087 | ||||
1088 | uint32_t packet = 0; | |||
1089 | int64_t bytes = 0; | |||
1090 | uint32_t snaplen_min_inferred = 0xffffffff; | |||
1091 | uint32_t snaplen_max_inferred = 0; | |||
1092 | wtap_rec rec; | |||
1093 | Buffer buf; | |||
1094 | capture_info cf_info; | |||
1095 | bool_Bool have_times = true1; | |||
1096 | nstime_t earliest_packet_time; | |||
1097 | int earliest_packet_time_tsprec; | |||
1098 | nstime_t latest_packet_time; | |||
1099 | int latest_packet_time_tsprec; | |||
1100 | nstime_t cur_time; | |||
1101 | nstime_t prev_time; | |||
1102 | bool_Bool know_order = false0; | |||
1103 | order_t order = IN_ORDER; | |||
1104 | unsigned int i; | |||
1105 | wtapng_iface_descriptions_t *idb_info; | |||
1106 | ||||
1107 | pkt_cmt *pc = NULL((void*)0), *prev = NULL((void*)0); | |||
1108 | ||||
1109 | cf_info.wth = wtap_open_offline(filename, WTAP_TYPE_AUTO0, &err, &err_info, false0); | |||
1110 | if (!cf_info.wth) { | |||
1111 | cfile_open_failure_message(filename, err, err_info); | |||
1112 | return 2; | |||
1113 | } | |||
1114 | ||||
1115 | /* | |||
1116 | * Calculate the checksums. Do this after wtap_open_offline, so we don't | |||
1117 | * bother calculating them for files that are not known capture types | |||
1118 | * where we wouldn't print them anyway. | |||
1119 | */ | |||
1120 | calculate_hashes(filename); | |||
1121 | ||||
1122 | if (need_separator
| |||
1123 | printf("\n"); | |||
1124 | } | |||
1125 | ||||
1126 | nstime_set_zero(&earliest_packet_time); | |||
1127 | earliest_packet_time_tsprec = WTAP_TSPREC_UNKNOWN-2; | |||
1128 | nstime_set_zero(&latest_packet_time); | |||
1129 | latest_packet_time_tsprec = WTAP_TSPREC_UNKNOWN-2; | |||
1130 | nstime_set_zero(&cur_time); | |||
1131 | nstime_set_zero(&prev_time); | |||
1132 | ||||
1133 | cf_info.encap_counts = g_new0(int,WTAP_NUM_ENCAP_TYPES)((int *) g_malloc0_n ((wtap_get_num_encap_types()), sizeof (int ))); | |||
1134 | ||||
1135 | idb_info = wtap_file_get_idb_info(cf_info.wth); | |||
1136 | ||||
1137 | ws_assert(idb_info->interface_data != NULL)do { if ((1) && !(idb_info->interface_data != ((void *)0))) ws_log_fatal_full("Main", LOG_LEVEL_ERROR, "capinfos.c" , 1137, __func__, "assertion failed: %s", "idb_info->interface_data != ((void*)0)" ); } while (0); | |||
1138 | ||||
1139 | cf_info.pkt_cmts = NULL((void*)0); | |||
1140 | cf_info.num_interfaces = idb_info->interface_data->len; | |||
1141 | cf_info.interface_packet_counts = g_array_sized_new(false0, true1, sizeof(uint32_t), cf_info.num_interfaces); | |||
1142 | g_array_set_size(cf_info.interface_packet_counts, cf_info.num_interfaces); | |||
1143 | cf_info.pkt_interface_id_unknown = 0; | |||
1144 | ||||
1145 | g_free(idb_info); | |||
1146 | idb_info = NULL((void*)0); | |||
1147 | ||||
1148 | /* Zero out the counters for the callbacks. */ | |||
1149 | num_ipv4_addresses = 0; | |||
1150 | num_ipv6_addresses = 0; | |||
1151 | num_decryption_secrets = 0; | |||
1152 | ||||
1153 | /* Register callbacks for new name<->address maps from the file and | |||
1154 | decryption secrets from the file. */ | |||
1155 | wtap_set_cb_new_ipv4(cf_info.wth, count_ipv4_address); | |||
1156 | wtap_set_cb_new_ipv6(cf_info.wth, count_ipv6_address); | |||
1157 | wtap_set_cb_new_secrets(cf_info.wth, count_decryption_secret); | |||
1158 | ||||
1159 | /* Tally up data that we need to parse through the file to find */ | |||
1160 | wtap_rec_init(&rec); | |||
1161 | ws_buffer_init(&buf, 1514); | |||
1162 | while (wtap_read(cf_info.wth, &rec, &buf, &err, &err_info, &data_offset)) { | |||
1163 | if (rec.presence_flags & WTAP_HAS_TS0x00000001) { | |||
1164 | prev_time = cur_time; | |||
1165 | cur_time = rec.ts; | |||
1166 | if (packet == 0) { | |||
1167 | earliest_packet_time = rec.ts; | |||
1168 | earliest_packet_time_tsprec = rec.tsprec; | |||
1169 | latest_packet_time = rec.ts; | |||
1170 | latest_packet_time_tsprec = rec.tsprec; | |||
1171 | prev_time = rec.ts; | |||
1172 | } | |||
1173 | if (nstime_cmp(&cur_time, &prev_time) < 0) { | |||
1174 | order = NOT_IN_ORDER; | |||
1175 | } | |||
1176 | if (nstime_cmp(&cur_time, &earliest_packet_time) < 0) { | |||
1177 | earliest_packet_time = cur_time; | |||
1178 | earliest_packet_time_tsprec = rec.tsprec; | |||
1179 | } | |||
1180 | if (nstime_cmp(&cur_time, &latest_packet_time) > 0) { | |||
1181 | latest_packet_time = cur_time; | |||
1182 | latest_packet_time_tsprec = rec.tsprec; | |||
1183 | } | |||
1184 | } else { | |||
1185 | have_times = false0; /* at least one packet has no time stamp */ | |||
1186 | if (order != NOT_IN_ORDER) | |||
1187 | order = ORDER_UNKNOWN; | |||
1188 | } | |||
1189 | ||||
1190 | if (rec.rec_type == REC_TYPE_PACKET0) { | |||
1191 | bytes += rec.rec_header.packet_header.len; | |||
1192 | packet++; | |||
1193 | /* packet comments */ | |||
1194 | if (pkt_comments && wtap_block_count_option(rec.block, OPT_COMMENT1) > 0) { | |||
1195 | char *cmt_buff; | |||
1196 | for (i = 0; wtap_block_get_nth_string_option_value(rec.block, OPT_COMMENT1, i, &cmt_buff) == WTAP_OPTTYPE_SUCCESS; i++) { | |||
1197 | pc = g_new0(pkt_cmt, 1)((pkt_cmt *) g_malloc0_n ((1), sizeof (pkt_cmt))); | |||
1198 | ||||
1199 | pc->recno = packet; | |||
1200 | pc->cmt = g_strdup(cmt_buff)g_strdup_inline (cmt_buff); | |||
1201 | pc->next = NULL((void*)0); | |||
1202 | ||||
1203 | if (prev == NULL((void*)0)) | |||
1204 | cf_info.pkt_cmts = pc; | |||
1205 | else | |||
1206 | prev->next = pc; | |||
1207 | ||||
1208 | prev = pc; | |||
1209 | } | |||
1210 | } | |||
1211 | ||||
1212 | /* If caplen < len for a rcd, then presumably */ | |||
1213 | /* 'Limit packet capture length' was done for this rcd. */ | |||
1214 | /* Keep track as to the min/max actual snapshot lengths */ | |||
1215 | /* seen for this file. */ | |||
1216 | if (rec.rec_header.packet_header.caplen < rec.rec_header.packet_header.len) { | |||
1217 | if (rec.rec_header.packet_header.caplen < snaplen_min_inferred) | |||
1218 | snaplen_min_inferred = rec.rec_header.packet_header.caplen; | |||
1219 | if (rec.rec_header.packet_header.caplen > snaplen_max_inferred) | |||
1220 | snaplen_max_inferred = rec.rec_header.packet_header.caplen; | |||
1221 | } | |||
1222 | ||||
1223 | if ((rec.rec_header.packet_header.pkt_encap > 0) && | |||
1224 | (rec.rec_header.packet_header.pkt_encap < WTAP_NUM_ENCAP_TYPESwtap_get_num_encap_types())) { | |||
1225 | cf_info.encap_counts[rec.rec_header.packet_header.pkt_encap] += 1; | |||
1226 | } else { | |||
1227 | fprintf(stderrstderr, "capinfos: Unknown packet encapsulation %d in frame %u of file \"%s\"\n", | |||
1228 | rec.rec_header.packet_header.pkt_encap, packet, filename); | |||
1229 | } | |||
1230 | ||||
1231 | /* Packet interface_id info */ | |||
1232 | if (rec.presence_flags & WTAP_HAS_INTERFACE_ID0x00000004) { | |||
1233 | /* cf_info.num_interfaces is size, not index, so it's one more than max index */ | |||
1234 | if (rec.rec_header.packet_header.interface_id >= cf_info.num_interfaces) { | |||
1235 | /* | |||
1236 | * OK, re-fetch the number of interfaces, as there might have | |||
1237 | * been an interface that was in the middle of packets, and | |||
1238 | * grow the array to be big enough for the new number of | |||
1239 | * interfaces. | |||
1240 | */ | |||
1241 | idb_info = wtap_file_get_idb_info(cf_info.wth); | |||
1242 | ||||
1243 | cf_info.num_interfaces = idb_info->interface_data->len; | |||
1244 | g_array_set_size(cf_info.interface_packet_counts, cf_info.num_interfaces); | |||
1245 | ||||
1246 | g_free(idb_info); | |||
1247 | idb_info = NULL((void*)0); | |||
1248 | } | |||
1249 | if (rec.rec_header.packet_header.interface_id < cf_info.num_interfaces) { | |||
1250 | g_array_index(cf_info.interface_packet_counts, uint32_t,(((uint32_t*) (void *) (cf_info.interface_packet_counts)-> data) [(rec.rec_header.packet_header.interface_id)]) | |||
1251 | rec.rec_header.packet_header.interface_id)(((uint32_t*) (void *) (cf_info.interface_packet_counts)-> data) [(rec.rec_header.packet_header.interface_id)]) += 1; | |||
1252 | } | |||
1253 | else { | |||
1254 | cf_info.pkt_interface_id_unknown += 1; | |||
1255 | } | |||
1256 | } | |||
1257 | else { | |||
1258 | /* it's for interface_id 0 */ | |||
1259 | if (cf_info.num_interfaces != 0) { | |||
1260 | g_array_index(cf_info.interface_packet_counts, uint32_t, 0)(((uint32_t*) (void *) (cf_info.interface_packet_counts)-> data) [(0)]) += 1; | |||
1261 | } | |||
1262 | else { | |||
1263 | cf_info.pkt_interface_id_unknown += 1; | |||
1264 | } | |||
1265 | } | |||
1266 | } | |||
1267 | ||||
1268 | wtap_rec_reset(&rec); | |||
1269 | } /* while */ | |||
1270 | wtap_rec_cleanup(&rec); | |||
1271 | ws_buffer_free(&buf); | |||
1272 | ||||
1273 | /* | |||
1274 | * Get IDB info strings. | |||
1275 | * We do this at the end, so we can get information for all IDBs in | |||
1276 | * the file, even those that come after packet records, and so that | |||
1277 | * we get, for example, a count of the number of statistics entries | |||
1278 | * for each interface as of the *end* of the file. | |||
1279 | */ | |||
1280 | idb_info = wtap_file_get_idb_info(cf_info.wth); | |||
1281 | ||||
1282 | cf_info.idb_info_strings = g_array_sized_new(false0, false0, sizeof(char*), cf_info.num_interfaces); | |||
1283 | cf_info.num_interfaces = idb_info->interface_data->len; | |||
1284 | for (i = 0; i < cf_info.num_interfaces; i++) { | |||
1285 | const wtap_block_t if_descr = g_array_index(idb_info->interface_data, wtap_block_t, i)(((wtap_block_t*) (void *) (idb_info->interface_data)-> data) [(i)]); | |||
1286 | char *s = wtap_get_debug_if_descr(if_descr, 21, "\n"); | |||
1287 | g_array_append_val(cf_info.idb_info_strings, s)g_array_append_vals (cf_info.idb_info_strings, &(s), 1); | |||
1288 | } | |||
1289 | ||||
1290 | g_free(idb_info); | |||
1291 | idb_info = NULL((void*)0); | |||
1292 | ||||
1293 | if (err != 0) { | |||
1294 | fprintf(stderrstderr, | |||
1295 | "capinfos: An error occurred after reading %u packets from \"%s\".\n", | |||
1296 | packet, filename); | |||
1297 | cfile_read_failure_message(filename, err, err_info); | |||
1298 | if (err == WTAP_ERR_SHORT_READ-12) { | |||
1299 | /* Don't give up completely with this one. */ | |||
1300 | status = 1; | |||
1301 | fprintf(stderrstderr, | |||
1302 | " (will continue anyway, checksums might be incorrect)\n"); | |||
1303 | } else { | |||
1304 | cleanup_capture_info(&cf_info); | |||
1305 | wtap_close(cf_info.wth); | |||
1306 | return 2; | |||
1307 | } | |||
1308 | } | |||
1309 | ||||
1310 | /* File size */ | |||
1311 | size = wtap_file_size(cf_info.wth, &err); | |||
1312 | if (size == -1) { | |||
1313 | fprintf(stderrstderr, | |||
1314 | "capinfos: Can't get size of \"%s\": %s.\n", | |||
1315 | filename, g_strerror(err)); | |||
1316 | cleanup_capture_info(&cf_info); | |||
1317 | wtap_close(cf_info.wth); | |||
1318 | return 2; | |||
1319 | } | |||
1320 | ||||
1321 | cf_info.filesize = size; | |||
1322 | ||||
1323 | /* File Type */ | |||
1324 | cf_info.file_type = wtap_file_type_subtype(cf_info.wth); | |||
1325 | cf_info.compression_type = wtap_get_compression_type(cf_info.wth); | |||
1326 | ||||
1327 | /* File Encapsulation */ | |||
1328 | cf_info.file_encap = wtap_file_encap(cf_info.wth); | |||
1329 | ||||
1330 | cf_info.file_tsprec = wtap_file_tsprec(cf_info.wth); | |||
1331 | ||||
1332 | /* Packet size limit (snaplen) */ | |||
1333 | cf_info.snaplen = wtap_snapshot_length(cf_info.wth); | |||
1334 | if (cf_info.snaplen > 0) | |||
1335 | cf_info.snap_set = true1; | |||
1336 | else | |||
1337 | cf_info.snap_set = false0; | |||
1338 | ||||
1339 | cf_info.snaplen_min_inferred = snaplen_min_inferred; | |||
1340 | cf_info.snaplen_max_inferred = snaplen_max_inferred; | |||
1341 | ||||
1342 | /* # of packets */ | |||
1343 | cf_info.packet_count = packet; | |||
1344 | ||||
1345 | /* File Times */ | |||
1346 | cf_info.times_known = have_times; | |||
1347 | cf_info.earliest_packet_time = earliest_packet_time; | |||
1348 | cf_info.earliest_packet_time_tsprec = earliest_packet_time_tsprec; | |||
1349 | cf_info.latest_packet_time = latest_packet_time; | |||
1350 | cf_info.latest_packet_time_tsprec = latest_packet_time_tsprec; | |||
1351 | nstime_delta(&cf_info.duration, &latest_packet_time, &earliest_packet_time); | |||
1352 | /* Duration precision is the higher of the earliest and latest packet timestamp precisions. */ | |||
1353 | if (cf_info.latest_packet_time_tsprec > cf_info.earliest_packet_time_tsprec) | |||
1354 | cf_info.duration_tsprec = cf_info.latest_packet_time_tsprec; | |||
1355 | else | |||
1356 | cf_info.duration_tsprec = cf_info.earliest_packet_time_tsprec; | |||
1357 | cf_info.know_order = know_order; | |||
1358 | cf_info.order = order; | |||
1359 | ||||
1360 | /* Number of packet bytes */ | |||
1361 | cf_info.packet_bytes = bytes; | |||
1362 | ||||
1363 | cf_info.data_rate = 0.0; | |||
1364 | cf_info.packet_rate = 0.0; | |||
1365 | cf_info.packet_size = 0.0; | |||
1366 | ||||
1367 | if (packet
| |||
1368 | double delta_time = nstime_to_sec(&latest_packet_time) - nstime_to_sec(&earliest_packet_time); | |||
1369 | if (delta_time > 0.0) { | |||
1370 | cf_info.data_rate = (double)bytes / delta_time; /* Data rate per second */ | |||
1371 | cf_info.packet_rate = (double)packet / delta_time; /* packet rate per second */ | |||
1372 | } | |||
1373 | cf_info.packet_size = (double)bytes / packet; /* Avg packet size */ | |||
1374 | } | |||
1375 | ||||
1376 | if (!long_report && table_report_header) { | |||
1377 | print_stats_table_header(&cf_info); | |||
1378 | } | |||
1379 | ||||
1380 | if (long_report) { | |||
1381 | print_stats(filename, &cf_info); | |||
1382 | } else { | |||
1383 | print_stats_table(filename, &cf_info); | |||
1384 | } | |||
1385 | ||||
1386 | cleanup_capture_info(&cf_info); | |||
1387 | wtap_close(cf_info.wth); | |||
1388 | ||||
1389 | return status; | |||
1390 | } | |||
1391 | ||||
1392 | static void | |||
1393 | print_usage(FILE *output) | |||
1394 | { | |||
1395 | fprintf(output, "\n"); | |||
1396 | fprintf(output, "Usage: capinfos [options] <infile> ...\n"); | |||
1397 | fprintf(output, "\n"); | |||
1398 | fprintf(output, "General infos:\n"); | |||
1399 | fprintf(output, " -t display the capture file type\n"); | |||
1400 | fprintf(output, " -E display the capture file encapsulation\n"); | |||
1401 | fprintf(output, " -I display the capture file interface information\n"); | |||
1402 | fprintf(output, " -F display additional capture file information\n"); | |||
1403 | fprintf(output, " -H display the SHA256 and SHA1 hashes of the file\n"); | |||
1404 | fprintf(output, " -k display the capture comment\n"); | |||
1405 | fprintf(output, " -p display individual packet comments\n"); | |||
1406 | fprintf(output, "\n"); | |||
1407 | fprintf(output, "Size infos:\n"); | |||
1408 | fprintf(output, " -c display the number of packets\n"); | |||
1409 | fprintf(output, " -s display the size of the file (in bytes)\n"); | |||
1410 | fprintf(output, " -d display the total length of all packets (in bytes)\n"); | |||
1411 | fprintf(output, " -l display the packet size limit (snapshot length)\n"); | |||
1412 | fprintf(output, "\n"); | |||
1413 | fprintf(output, "Time infos:\n"); | |||
1414 | fprintf(output, " -u display the capture duration (in seconds)\n"); | |||
1415 | fprintf(output, " -a display the timestamp of the earliest packet\n"); | |||
1416 | fprintf(output, " -e display the timestamp of the latest packet\n"); | |||
1417 | fprintf(output, " -o display the capture file chronological status (True/False)\n"); | |||
1418 | fprintf(output, " -S display earliest and latest packet timestamps as seconds\n"); | |||
1419 | fprintf(output, "\n"); | |||
1420 | fprintf(output, "Statistic infos:\n"); | |||
1421 | fprintf(output, " -y display average data rate (in bytes/sec)\n"); | |||
1422 | fprintf(output, " -i display average data rate (in bits/sec)\n"); | |||
1423 | fprintf(output, " -z display average packet size (in bytes)\n"); | |||
1424 | fprintf(output, " -x display average packet rate (in packets/sec)\n"); | |||
1425 | fprintf(output, "\n"); | |||
1426 | fprintf(output, "Metadata infos:\n"); | |||
1427 | fprintf(output, " -n display number of resolved IPv4 and IPv6 addresses\n"); | |||
1428 | fprintf(output, " -D display number of decryption secrets\n"); | |||
1429 | fprintf(output, "\n"); | |||
1430 | fprintf(output, "Output format:\n"); | |||
1431 | fprintf(output, " -L generate long report (default)\n"); | |||
1432 | fprintf(output, " -T generate table report\n"); | |||
1433 | fprintf(output, " -M display machine-readable values in long reports\n"); | |||
1434 | fprintf(output, "\n"); | |||
1435 | fprintf(output, "Table report options:\n"); | |||
1436 | fprintf(output, " -R generate header record (default)\n"); | |||
1437 | fprintf(output, " -r do not generate header record\n"); | |||
1438 | fprintf(output, "\n"); | |||
1439 | fprintf(output, " -B separate infos with TAB character (default)\n"); | |||
1440 | fprintf(output, " -m separate infos with comma (,) character\n"); | |||
1441 | fprintf(output, " -b separate infos with SPACE character\n"); | |||
1442 | fprintf(output, "\n"); | |||
1443 | fprintf(output, " -N do not quote infos (default)\n"); | |||
1444 | fprintf(output, " -q quote infos with single quotes (')\n"); | |||
1445 | fprintf(output, " -Q quote infos with double quotes (\")\n"); | |||
1446 | fprintf(output, "\n"); | |||
1447 | fprintf(output, "Miscellaneous:\n"); | |||
1448 | fprintf(output, " -h, --help display this help and exit\n"); | |||
1449 | fprintf(output, " -v, --version display version info and exit\n"); | |||
1450 | fprintf(output, " -C cancel processing if file open fails (default is to continue)\n"); | |||
1451 | fprintf(output, " -A generate all infos (default)\n"); | |||
1452 | fprintf(output, " -K disable displaying the capture comment\n"); | |||
1453 | fprintf(output, " -P disable displaying individual packet comments\n"); | |||
1454 | fprintf(output, "\n"); | |||
1455 | fprintf(output, "Options are processed from left to right order with later options superseding\n"); | |||
1456 | fprintf(output, "or adding to earlier options.\n"); | |||
1457 | fprintf(output, "\n"); | |||
1458 | fprintf(output, "If no options are given the default is to display all infos in long report\n"); | |||
1459 | fprintf(output, "output format.\n"); | |||
1460 | } | |||
1461 | ||||
1462 | int | |||
1463 | main(int argc, char *argv[]) | |||
1464 | { | |||
1465 | char *configuration_init_error; | |||
1466 | bool_Bool need_separator = false0; | |||
1467 | int opt; | |||
1468 | int overall_error_status = EXIT_SUCCESS0; | |||
1469 | static const struct ws_option long_options[] = { | |||
1470 | {"help", ws_no_argument0, NULL((void*)0), 'h'}, | |||
1471 | {"version", ws_no_argument0, NULL((void*)0), 'v'}, | |||
1472 | {0, 0, 0, 0 } | |||
1473 | }; | |||
1474 | ||||
1475 | int status = 0; | |||
1476 | ||||
1477 | /* Set the program name. */ | |||
1478 | g_set_prgname("capinfos"); | |||
1479 | ||||
1480 | /* | |||
1481 | * Set the C-language locale to the native environment and set the | |||
1482 | * code page to UTF-8 on Windows. | |||
1483 | */ | |||
1484 | #ifdef _WIN32 | |||
1485 | setlocale(LC_ALL6, ".UTF-8"); | |||
1486 | #else | |||
1487 | setlocale(LC_ALL6, ""); | |||
1488 | #endif | |||
1489 | ||||
1490 | cmdarg_err_init(stderr_cmdarg_err, stderr_cmdarg_err_cont); | |||
1491 | ||||
1492 | /* Initialize log handler early so we can have proper logging during startup. */ | |||
1493 | ws_log_init(vcmdarg_err); | |||
1494 | ||||
1495 | /* Early logging command-line initialization. */ | |||
1496 | ws_log_parse_args(&argc, argv, vcmdarg_err, WS_EXIT_INVALID_OPTION1); | |||
1497 | ||||
1498 | ws_noisy("Finished log init and parsing command line log arguments")do { if (1) { ws_log_full("Main", LOG_LEVEL_NOISY, "capinfos.c" , 1498, __func__, "Finished log init and parsing command line log arguments" ); } } while (0); | |||
| ||||
1499 | ||||
1500 | /* Get the decimal point. */ | |||
1501 | decimal_point = g_strdup(localeconv()->decimal_point)g_strdup_inline (localeconv()->decimal_point); | |||
1502 | ||||
1503 | #ifdef _WIN32 | |||
1504 | create_app_running_mutex(); | |||
1505 | #endif /* _WIN32 */ | |||
1506 | ||||
1507 | /* | |||
1508 | * Get credential information for later use. | |||
1509 | */ | |||
1510 | init_process_policies(); | |||
1511 | ||||
1512 | /* | |||
1513 | * Attempt to get the pathname of the directory containing the | |||
1514 | * executable file. | |||
1515 | */ | |||
1516 | configuration_init_error = configuration_init(argv[0]); | |||
1517 | if (configuration_init_error != NULL((void*)0)) { | |||
1518 | fprintf(stderrstderr, | |||
1519 | "capinfos: Can't get pathname of directory containing the capinfos program: %s.\n", | |||
1520 | configuration_init_error); | |||
1521 | g_free(configuration_init_error); | |||
1522 | } | |||
1523 | ||||
1524 | /* Initialize the version information. */ | |||
1525 | ws_init_version_info("Capinfos", NULL((void*)0), NULL((void*)0)); | |||
1526 | ||||
1527 | init_report_failure_message("capinfos"); | |||
1528 | ||||
1529 | wtap_init(true1); | |||
1530 | ||||
1531 | /* Process the options */ | |||
1532 | while ((opt = ws_getopt_long(argc, argv, "abcdehiklmnopqrstuvxyzABCDEFHIKLMNPQRST", long_options, NULL((void*)0))) !=-1) { | |||
1533 | ||||
1534 | switch (opt) { | |||
1535 | ||||
1536 | case 't': | |||
1537 | if (report_all_infos) disable_all_infos(); | |||
1538 | cap_file_type = true1; | |||
1539 | break; | |||
1540 | ||||
1541 | case 'E': | |||
1542 | if (report_all_infos) disable_all_infos(); | |||
1543 | cap_file_encap = true1; | |||
1544 | break; | |||
1545 | ||||
1546 | case 'l': | |||
1547 | if (report_all_infos) disable_all_infos(); | |||
1548 | cap_snaplen = true1; | |||
1549 | break; | |||
1550 | ||||
1551 | case 'c': | |||
1552 | if (report_all_infos) disable_all_infos(); | |||
1553 | cap_packet_count = true1; | |||
1554 | break; | |||
1555 | ||||
1556 | case 's': | |||
1557 | if (report_all_infos) disable_all_infos(); | |||
1558 | cap_file_size = true1; | |||
1559 | break; | |||
1560 | ||||
1561 | case 'd': | |||
1562 | if (report_all_infos) disable_all_infos(); | |||
1563 | cap_data_size = true1; | |||
1564 | break; | |||
1565 | ||||
1566 | case 'u': | |||
1567 | if (report_all_infos) disable_all_infos(); | |||
1568 | cap_duration = true1; | |||
1569 | break; | |||
1570 | ||||
1571 | case 'a': | |||
1572 | if (report_all_infos) disable_all_infos(); | |||
1573 | cap_earliest_packet_time = true1; | |||
1574 | break; | |||
1575 | ||||
1576 | case 'e': | |||
1577 | if (report_all_infos) disable_all_infos(); | |||
1578 | cap_latest_packet_time = true1; | |||
1579 | break; | |||
1580 | ||||
1581 | case 'S': | |||
1582 | time_as_secs = true1; | |||
1583 | break; | |||
1584 | ||||
1585 | case 'y': | |||
1586 | if (report_all_infos) disable_all_infos(); | |||
1587 | cap_data_rate_byte = true1; | |||
1588 | break; | |||
1589 | ||||
1590 | case 'i': | |||
1591 | if (report_all_infos) disable_all_infos(); | |||
1592 | cap_data_rate_bit = true1; | |||
1593 | break; | |||
1594 | ||||
1595 | case 'z': | |||
1596 | if (report_all_infos) disable_all_infos(); | |||
1597 | cap_packet_size = true1; | |||
1598 | break; | |||
1599 | ||||
1600 | case 'x': | |||
1601 | if (report_all_infos) disable_all_infos(); | |||
1602 | cap_packet_rate = true1; | |||
1603 | break; | |||
1604 | ||||
1605 | case 'H': | |||
1606 | if (report_all_infos) disable_all_infos(); | |||
1607 | cap_file_hashes = true1; | |||
1608 | break; | |||
1609 | ||||
1610 | case 'o': | |||
1611 | if (report_all_infos) disable_all_infos(); | |||
1612 | cap_order = true1; | |||
1613 | break; | |||
1614 | ||||
1615 | case 'k': | |||
1616 | if (report_all_infos) disable_all_infos(); | |||
1617 | cap_comment = true1; | |||
1618 | break; | |||
1619 | ||||
1620 | case 'p': | |||
1621 | if (report_all_infos) disable_all_infos(); | |||
1622 | pkt_comments = true1; | |||
1623 | break; | |||
1624 | ||||
1625 | case 'K': | |||
1626 | cap_comment = false0; | |||
1627 | break; | |||
1628 | ||||
1629 | case 'P': | |||
1630 | pkt_comments = false0; | |||
1631 | break; | |||
1632 | ||||
1633 | case 'F': | |||
1634 | if (report_all_infos) disable_all_infos(); | |||
1635 | cap_file_more_info = true1; | |||
1636 | break; | |||
1637 | ||||
1638 | case 'I': | |||
1639 | if (report_all_infos) disable_all_infos(); | |||
1640 | cap_file_idb = true1; | |||
1641 | break; | |||
1642 | ||||
1643 | case 'n': | |||
1644 | if (report_all_infos) disable_all_infos(); | |||
1645 | cap_file_nrb = true1; | |||
1646 | break; | |||
1647 | ||||
1648 | case 'D': | |||
1649 | if (report_all_infos) disable_all_infos(); | |||
1650 | cap_file_dsb = true1; | |||
1651 | break; | |||
1652 | ||||
1653 | case 'C': | |||
1654 | stop_after_failure = true1; | |||
1655 | break; | |||
1656 | ||||
1657 | case 'A': | |||
1658 | enable_all_infos(); | |||
1659 | break; | |||
1660 | ||||
1661 | case 'L': | |||
1662 | long_report = true1; | |||
1663 | break; | |||
1664 | ||||
1665 | case 'T': | |||
1666 | long_report = false0; | |||
1667 | break; | |||
1668 | ||||
1669 | case 'M': | |||
1670 | machine_readable = true1; | |||
1671 | break; | |||
1672 | ||||
1673 | case 'R': | |||
1674 | table_report_header = true1; | |||
1675 | break; | |||
1676 | ||||
1677 | case 'r': | |||
1678 | table_report_header = false0; | |||
1679 | break; | |||
1680 | ||||
1681 | case 'N': | |||
1682 | quote_char = '\0'; | |||
1683 | break; | |||
1684 | ||||
1685 | case 'q': | |||
1686 | quote_char = '\''; | |||
1687 | break; | |||
1688 | ||||
1689 | case 'Q': | |||
1690 | quote_char = '"'; | |||
1691 | break; | |||
1692 | ||||
1693 | case 'B': | |||
1694 | field_separator = '\t'; | |||
1695 | break; | |||
1696 | ||||
1697 | case 'm': | |||
1698 | field_separator = ','; | |||
1699 | break; | |||
1700 | ||||
1701 | case 'b': | |||
1702 | field_separator = ' '; | |||
1703 | break; | |||
1704 | ||||
1705 | case 'h': | |||
1706 | show_help_header("Print various information (infos) about capture files."); | |||
1707 | print_usage(stdoutstdout); | |||
1708 | goto exit; | |||
1709 | break; | |||
1710 | ||||
1711 | case 'v': | |||
1712 | show_version(); | |||
1713 | goto exit; | |||
1714 | break; | |||
1715 | ||||
1716 | case '?': /* Bad flag - print usage message */ | |||
1717 | print_usage(stderrstderr); | |||
1718 | overall_error_status = WS_EXIT_INVALID_OPTION1; | |||
1719 | goto exit; | |||
1720 | break; | |||
1721 | } | |||
1722 | } | |||
1723 | ||||
1724 | if ((argc - ws_optind) < 1) { | |||
1725 | print_usage(stderrstderr); | |||
1726 | overall_error_status = WS_EXIT_INVALID_OPTION1; | |||
1727 | goto exit; | |||
1728 | } | |||
1729 | ||||
1730 | if (cap_file_hashes
| |||
1731 | gcry_check_version(NULL((void*)0)); | |||
1732 | gcry_md_open(&hd, GCRY_MD_SHA256, 0); | |||
1733 | if (hd) | |||
1734 | gcry_md_enable(hd, GCRY_MD_SHA1); | |||
1735 | ||||
1736 | hash_buf = (char *)g_malloc(HASH_BUF_SIZE(1024 * 1024)); | |||
1737 | } | |||
1738 | ||||
1739 | overall_error_status = 0; | |||
1740 | ||||
1741 | for (opt = ws_optind; opt < argc; opt++) { | |||
1742 | ||||
1743 | status = process_cap_file(argv[opt], need_separator); | |||
1744 | if (status) { | |||
1745 | /* Something failed. It's been reported; remember that processing | |||
1746 | one file failed and, if -C was specified, stop. */ | |||
1747 | overall_error_status = status; | |||
1748 | if (stop_after_failure) | |||
1749 | goto exit; | |||
1750 | } | |||
1751 | if (status != 2) { | |||
1752 | /* Either it succeeded or it got a "short read" but printed | |||
1753 | information anyway. Note that we need a blank line before | |||
1754 | the next file's information, to separate it from the | |||
1755 | previous file. */ | |||
1756 | need_separator = true1; | |||
1757 | } | |||
1758 | } | |||
1759 | ||||
1760 | exit: | |||
1761 | g_free(hash_buf); | |||
1762 | gcry_md_close(hd); | |||
1763 | wtap_cleanup(); | |||
1764 | free_progdirs(); | |||
1765 | return overall_error_status; | |||
1766 | } |