2 * Routines for network object lookup
6 * Laurent Deniel <laurent.deniel@free.fr>
8 * Wireshark - Network traffic analyzer
9 * By Gerald Combs <gerald@wireshark.org>
10 * Copyright 1998 Gerald Combs
12 * This program is free software; you can redistribute it and/or
13 * modify it under the terms of the GNU General Public License
14 * as published by the Free Software Foundation; either version 2
15 * of the License, or (at your option) any later version.
17 * This program is distributed in the hope that it will be useful,
18 * but WITHOUT ANY WARRANTY; without even the implied warranty of
19 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
20 * GNU General Public License for more details.
22 * You should have received a copy of the GNU General Public License
23 * along with this program; if not, write to the Free Software
24 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
36 * Win32 doesn't have SIGALRM (and it's the OS where name lookup calls
37 * are most likely to take a long time, given the way address-to-name
38 * lookups are done over NBNS).
40 * Mac OS X does have SIGALRM, but if you longjmp() out of a name resolution
41 * call in a signal handler, you might crash, because the state of the
42 * resolution code that sends messages to lookupd might be inconsistent
43 * if you jump out of it in middle of a call.
45 * In at least some Linux distributions (e.g., RedHat Linux 9), if ADNS
46 * is used, we appear to hang in host_name_lookup6() in a gethostbyaddr()
47 * call (and possibly in other gethostbyaddr() calls), because there's
48 * a mutex lock held in gethostbyaddr() and it doesn't get released
49 * if we longjmp out of it.
51 * There's no guarantee that longjmp()ing out of name resolution calls
52 * will work on *any* platform; OpenBSD got rid of the alarm/longjmp
53 * code in tcpdump, to avoid those sorts of problems, and that was
54 * picked up by tcpdump.org tcpdump.
56 * So, for now, we do not define AVOID_DNS_TIMEOUT. If we get a
57 * significantly more complaints about lookups taking a long time,
58 * we can reconsider that decision. (Note that tcpdump originally
59 * added that for the benefit of systems using NIS to look up host
60 * names; that might now be fixed in NIS implementations, for those
61 * sites still using NIS rather than DNS for that....)
68 #ifdef HAVE_NETINET_IN_H
69 # include <netinet/in.h>
76 #ifdef HAVE_ARPA_INET_H
77 #include <arpa/inet.h>
82 #ifdef HAVE_SYS_SOCKET_H
83 #include <sys/socket.h> /* needed to define AF_ values on UNIX */
86 #ifdef HAVE_WINSOCK2_H
87 #include <winsock2.h> /* needed to define AF_ values on Windows */
90 #ifndef HAVE_INET_ATON_H
91 # include "wsutil/inet_aton.h"
94 #ifdef NEED_INET_V6DEFS_H
95 # include "wsutil/inet_v6defs.h"
98 #if defined(_WIN32) && defined(INET6)
99 # include <ws2tcpip.h>
103 # if defined(_WIN32) && !defined(INET6)
104 # define socklen_t unsigned int
107 # include <ares_version.h>
109 # ifdef HAVE_GNU_ADNS
112 # if defined(inet_aton) && defined(_WIN32)
115 # endif /* HAVE_GNU_ADNS */
116 #endif /* HAVE_C_ARES */
122 #include "addr_and_mask.h"
123 #include "ipv6-utils.h"
124 #include "addr_resolv.h"
125 #include "wsutil/filesystem.h"
127 #include <wsutil/report_err.h>
128 #include <wsutil/file_util.h>
129 #include <wsutil/pint.h>
131 #include <epan/strutil.h>
132 #include <epan/to_str-int.h>
133 #include <epan/prefs.h>
134 #include <epan/emem.h>
136 #define ENAME_HOSTS "hosts"
137 #define ENAME_SUBNETS "subnets"
138 #define ENAME_ETHERS "ethers"
139 #define ENAME_IPXNETS "ipxnets"
140 #define ENAME_MANUF "manuf"
141 #define ENAME_SERVICES "services"
143 #define HASHETHSIZE 2048
144 #define HASHHOSTSIZE 2048
145 #define HASHIPXNETSIZE 256
146 #define SUBNETLENGTHSIZE 32 /*1-32 inc.*/
148 /* g_int64_hash() and g_int64_equal() first appear in GLib 2.22, make a local copy here */
149 #if !GLIB_CHECK_VERSION(2,22,0)
152 * @v1: a pointer to a #gint64 key
153 * @v2: a pointer to a #gint64 key to compare with @v1
155 * Compares the two #gint64 values being pointed to and returns
156 * %TRUE if they are equal.
157 * It can be passed to g_hash_table_new() as the @key_equal_func
158 * parameter, when using non-%NULL pointers to 64-bit integers as keys in a
161 * Returns: %TRUE if the two keys match.
166 g_int64_equal (gconstpointer v1,
169 return *((const gint64*) v1) == *((const gint64*) v2);
174 * @v: a pointer to a #gint64 key
176 * Converts a pointer to a #gint64 to a hash value.
178 * It can be passed to g_hash_table_new() as the @hash_func parameter,
179 * when using non-%NULL pointers to 64-bit integer values as keys in a
182 * Returns: a hash value corresponding to the key.
187 g_int64_hash (gconstpointer v)
189 return (guint) *(const gint64*) v;
192 #endif /* GLIB_CHECK_VERSION(2,22,0) */
193 /* hash table used for IPv4 lookup */
195 #define HASH_IPV4_ADDRESS(addr) (g_htonl(addr) & (HASHHOSTSIZE - 1))
198 typedef struct sub_net_hashipv4 {
200 guint8 flags; /* B0 dummy_entry, B1 resolve, B2 If the address is used in the trace */
201 struct sub_net_hashipv4 *next;
203 gchar name[MAXNAMELEN];
204 } sub_net_hashipv4_t;
206 /* Array of entries of subnets of different lengths */
208 gsize mask_length; /*1-32*/
209 guint32 mask; /* e.g. 255.255.255.*/
210 sub_net_hashipv4_t** subnet_addresses; /* Hash table of subnet addresses */
211 } subnet_length_entry_t;
215 typedef struct serv_port {
222 /* hash table used for IPX network lookup */
224 /* XXX - check goodness of hash function */
226 #define HASH_IPX_NET(net) ((net) & (HASHIPXNETSIZE - 1))
228 typedef struct hashipxnet {
230 struct hashipxnet *next;
231 gchar name[MAXNAMELEN];
234 /* hash tables used for ethernet and manufacturer lookup */
235 #define HASHETHER_STATUS_UNRESOLVED 1
236 #define HASHETHER_STATUS_RESOLVED_DUMMY 2
237 #define HASHETHER_STATUS_RESOLVED_NAME 3
240 typedef struct hashether {
241 struct hashether *next;
242 guint status; /* (See above) */
245 char resolved_name[MAXNAMELEN];
248 /* internal ethernet type */
250 typedef struct _ether
253 char name[MAXNAMELEN];
256 /* internal ipxnet type */
258 typedef struct _ipxnet
261 char name[MAXNAMELEN];
264 static GHashTable *ipxnet_hash_table = NULL;
265 static GHashTable *ipv4_hash_table = NULL;
266 static GHashTable *ipv6_hash_table = NULL;
268 static GSList *manually_resolved_ipv4_list = NULL;
269 static GSList *manually_resolved_ipv6_list = NULL;
271 typedef struct _resolved_ipv4
274 char name[MAXNAMELEN];
277 typedef struct _resolved_ipv6
279 struct e_in6_addr ip6_addr;
280 char name[MAXNAMELEN];
283 static addrinfo_lists_t addrinfo_lists = { NULL, NULL};
285 static gchar *cb_service;
286 static port_type cb_proto = PT_NONE;
289 static GHashTable *manuf_hashtable = NULL;
290 static GHashTable *wka_hashtable = NULL;
291 static GHashTable *eth_hashtable = NULL;
292 static GHashTable *serv_port_hashtable = NULL;
294 static subnet_length_entry_t subnet_length_entries[SUBNETLENGTHSIZE]; /* Ordered array of entries */
295 static gboolean have_subnet_entry = FALSE;
297 static gboolean new_resolved_objects = FALSE;
299 static GPtrArray* extra_hosts_files = NULL;
301 static hashether_t *add_eth_name(const guint8 *addr, const gchar *name);
302 static void add_serv_port_cb(const guint32 port);
305 /* http://eternallyconfuzzled.com/tuts/algorithms/jsw_tut_hashing.aspx#existing
309 ipv6_oat_hash(gconstpointer key)
312 const unsigned char *p = (const unsigned char *)key;
316 for ( i = 0; i < len; i++ ) {
330 ipv6_equal(gconstpointer v1, gconstpointer v2)
333 if( memcmp(v1, v2, sizeof (struct e_in6_addr)) == 0 ) {
341 * Flag controlling what names to resolve.
343 e_addr_resolve gbl_resolv_flags = {TRUE, FALSE, TRUE, TRUE, TRUE, FALSE};
344 #if defined(HAVE_C_ARES) || defined(HAVE_GNU_ADNS)
345 static guint name_resolve_concurrency = 500;
349 * Global variables (can be changed in GUI sections)
350 * XXX - they could be changed in GUI code, but there's currently no
351 * GUI code to change them.
354 gchar *g_ethers_path = NULL; /* global ethers file */
355 gchar *g_pethers_path = NULL; /* personal ethers file */
356 gchar *g_ipxnets_path = NULL; /* global ipxnets file */
357 gchar *g_pipxnets_path = NULL; /* personal ipxnets file */
358 gchar *g_services_path = NULL; /* global services file */
359 gchar *g_pservices_path = NULL; /* personal services file */
360 /* first resolving call */
365 * Submitted queries trigger a callback (c_ares_ghba_cb()).
366 * Queries are added to c_ares_queue_head. During processing, queries are
367 * popped off the front of c_ares_queue_head and submitted using
368 * ares_gethostbyaddr().
369 * The callback processes the response, then frees the request.
372 typedef struct _async_dns_queue_msg
376 struct e_in6_addr ip6;
379 } async_dns_queue_msg_t;
381 typedef struct _async_hostent {
387 #if ( ( ARES_VERSION_MAJOR < 1 ) \
388 || ( 1 == ARES_VERSION_MAJOR && ARES_VERSION_MINOR < 5 ) )
389 static void c_ares_ghba_cb(void *arg, int status, struct hostent *hostent);
391 static void c_ares_ghba_cb(void *arg, int status, int timeouts _U_, struct hostent *hostent);
394 ares_channel ghba_chan; /* ares_gethostbyaddr -- Usually non-interactive, no timeout */
395 ares_channel ghbn_chan; /* ares_gethostbyname -- Usually interactive, timeout */
402 * Submitted queries have to be checked individually using adns_check().
403 * Queries are added to adns_queue_head. During processing, the list is
404 * iterated twice: once to request queries up to the concurrency limit,
405 * and once to check the status of each query.
410 typedef struct _async_dns_queue_msg
416 } async_dns_queue_msg_t;
418 #endif /* HAVE_GNU_ADNS */
419 #endif /* HAVE_C_ARES */
421 static gboolean async_dns_initialized = FALSE;
422 static guint async_dns_in_flight = 0;
423 static GList *async_dns_queue_head = NULL;
425 /* push a dns request */
427 add_async_dns_ipv4(int type, guint32 addr)
429 async_dns_queue_msg_t *msg;
431 msg = g_new(async_dns_queue_msg_t,1);
434 msg->addr.ip4 = addr;
437 msg->ip4_addr = addr;
438 msg->submitted = FALSE;
440 async_dns_queue_head = g_list_append(async_dns_queue_head, (gpointer) msg);
448 const gchar* name; /* Shallow copy */
452 * Miscellaneous functions
456 fgetline(char **buf, int *size, FILE *fp)
461 if (fp == NULL || buf == NULL)
468 *buf = (char *)g_malloc(*size);
478 while ((c = getc(fp)) != EOF && c != '\r' && c != '\n') {
479 if (len+1 >= *size) {
480 *buf = (char *)g_realloc(*buf, *size += BUFSIZ);
485 if (len == 0 && c == EOF)
496 * Local function definitions
498 static subnet_entry_t subnet_lookup(const guint32 addr);
499 static void subnet_entry_set(guint32 subnet_addr, const guint32 mask_length, const gchar* name);
503 add_service_name(port_type proto, const guint port, const char *service_name)
505 serv_port_t *serv_port_table;
508 key = (int *)g_new(int, 1);
511 serv_port_table = (serv_port_t *)g_hash_table_lookup(serv_port_hashtable, &port);
512 if (serv_port_table == NULL) {
513 serv_port_table = g_new0(serv_port_t,1);
514 g_hash_table_insert(serv_port_hashtable, key, serv_port_table);
522 g_free(serv_port_table->tcp_name);
523 serv_port_table->tcp_name = g_strdup(service_name);
526 g_free(serv_port_table->udp_name);
527 serv_port_table->udp_name = g_strdup(service_name);
530 g_free(serv_port_table->sctp_name);
531 serv_port_table->sctp_name = g_strdup(service_name);
534 g_free(serv_port_table->dccp_name);
535 serv_port_table->dccp_name = g_strdup(service_name);
539 /* Should not happen */
542 new_resolved_objects = TRUE;
547 parse_service_line (char *line)
550 * See the services(4) or services(5) man page for services file format
551 * (not available on all systems).
559 range_t *port_rng = NULL;
560 guint32 max_port = MAX_UDP_PORT;
562 if ((cp = strchr(line, '#')))
565 if ((cp = strtok(line, " \t")) == NULL)
570 if ((cp = strtok(NULL, " \t")) == NULL)
575 if (strtok(cp, "/") == NULL)
578 if ((cp = strtok(NULL, "/")) == NULL)
581 /* seems we got all interesting things from the file */
582 if(strcmp(cp, "tcp") == 0) {
583 max_port = MAX_TCP_PORT;
586 else if(strcmp(cp, "udp") == 0) {
587 max_port = MAX_UDP_PORT;
590 else if(strcmp(cp, "sctp") == 0) {
591 max_port = MAX_SCTP_PORT;
594 else if(strcmp(cp, "dccp") == 0) {
595 max_port = MAX_DCCP_PORT;
601 if(CVT_NO_ERROR != range_convert_str(&port_rng, port, max_port) ) {
602 /* some assertion here? */
606 cb_service = service;
608 range_foreach(port_rng, add_serv_port_cb);
611 } /* parse_service_line */
615 add_serv_port_cb(const guint32 port)
618 add_service_name(cb_proto, port, cb_service);
624 parse_services_file(const char * path)
628 static char *buf = NULL;
630 /* services hash table initialization */
631 serv_p = ws_fopen(path, "r");
636 while (fgetline(&buf, &size, serv_p) >= 0) {
637 parse_service_line (buf);
644 * unsigned integer to ascii
649 gchar *bp = (gchar *)ep_alloc(MAXNAMELEN);
651 /* XXX, guint32_to_str() ? */
652 guint32_to_str_buf(port, bp, MAXNAMELEN);
658 *serv_name_lookup(const guint port, const port_type proto)
660 serv_port_t *serv_port_table;
663 serv_port_table = (serv_port_t *)g_hash_table_lookup(serv_port_hashtable, &port);
666 /* Set which table we should look up port in */
669 if(serv_port_table->udp_name){
670 return serv_port_table->udp_name;
674 if(serv_port_table->tcp_name){
675 return serv_port_table->tcp_name;
679 if(serv_port_table->sctp_name){
680 return serv_port_table->sctp_name;
684 if(serv_port_table->dccp_name){
685 return serv_port_table->dccp_name;
689 /* not yet implemented */
695 /* getservbyport() was used here but it was to expensive, if the functionality is desired
696 * it would be better to pre parse etc/services or C:\Windows\System32\drivers\etc at
699 name = (gchar*)g_malloc(16);
700 guint32_to_str_buf(port, name, 16);
702 if(serv_port_table == NULL){
705 key = (int *)g_new(int, 1);
707 serv_port_table = g_new0(serv_port_t,1);
708 g_hash_table_insert(serv_port_hashtable, key, serv_port_table);
712 serv_port_table->udp_name = name;
715 serv_port_table->tcp_name = name;
718 serv_port_table->sctp_name = name;
721 serv_port_table->dccp_name = name;
729 } /* serv_name_lookup */
732 destroy_serv_port(gpointer data)
734 serv_port_t *table = (serv_port_t*)data;
735 g_free(table->udp_name);
736 g_free(table->tcp_name);
737 g_free(table->sctp_name);
738 g_free(table->dccp_name);
743 initialize_services(void)
748 static char rootpath_nt[] = "\\system32\\drivers\\etc\\services";
751 /* the hash table won't ignore duplicates, so use the personal path first */
752 g_assert(serv_port_hashtable == NULL);
753 serv_port_hashtable = g_hash_table_new_full(g_int_hash, g_int_equal, g_free, destroy_serv_port);
755 /* Read the system services file first */
758 sysroot = getenv_utf8("WINDIR");
759 if (sysroot != NULL) {
761 * The file should be under WINDIR.
762 * If this is Windows NT (NT 4.0,2K,XP,Server2K3), it's in
763 * %WINDIR%\system32\drivers\etc\services.
765 hostspath = g_strconcat(sysroot, rootpath_nt, NULL);
766 parse_services_file(hostspath);
770 parse_services_file("/etc/services");
774 /* set personal services path */
775 if (g_pservices_path == NULL)
776 g_pservices_path = get_persconffile_path(ENAME_SERVICES, FALSE);
778 parse_services_file(g_pservices_path);
780 /* Compute the pathname of the services file. */
781 if (g_services_path == NULL) {
782 g_services_path = get_datafile_path(ENAME_SERVICES);
785 parse_services_file(g_services_path);
787 } /* initialize_services */
790 service_name_lookup_cleanup(void)
792 if(serv_port_hashtable){
793 g_hash_table_destroy(serv_port_hashtable);
794 serv_port_hashtable = NULL;
798 /* Fill in an IP4 structure with info from subnets file or just with the
799 * string form of the address.
802 fill_dummy_ip4(const guint addr, hashipv4_t* volatile tp)
804 subnet_entry_t subnet_entry;
806 if ((tp->flags & DUMMY_ADDRESS_ENTRY) == DUMMY_ADDRESS_ENTRY)
807 return; /* already done */
809 tp->flags = tp->flags | DUMMY_ADDRESS_ENTRY; /* Overwrite if we get async DNS reply */
811 /* Do we have a subnet for this address? */
812 subnet_entry = subnet_lookup(addr);
813 if(0 != subnet_entry.mask) {
814 /* Print name, then '.' then IP address after subnet mask */
816 gchar buffer[MAX_IP_STR_LEN];
820 host_addr = addr & (~(guint32)subnet_entry.mask);
821 ip_to_str_buf((guint8 *)&host_addr, buffer, MAX_IP_STR_LEN);
824 /* Skip to first octet that is not totally masked
825 * If length of mask is 32, we chomp the whole address.
826 * If the address string starts '.' (should not happen?),
829 i = subnet_entry.mask_length / 8;
830 while(*(paddr) != '\0' && i > 0) {
831 if(*(++paddr) == '.') {
836 /* There are more efficient ways to do this, but this is safe if we
837 * trust g_snprintf and MAXNAMELEN
839 g_snprintf(tp->name, MAXNAMELEN, "%s%s", subnet_entry.name, paddr);
841 ip_to_str_buf((const guint8 *)&addr, tp->name, MAXNAMELEN);
851 #if ( ( ARES_VERSION_MAJOR < 1 ) \
852 || ( 1 == ARES_VERSION_MAJOR && ARES_VERSION_MINOR < 5 ) )
860 async_dns_queue_msg_t *caqm = (async_dns_queue_msg_t *)arg;
864 /* XXX, what to do if async_dns_in_flight == 0? */
865 async_dns_in_flight--;
867 if (status == ARES_SUCCESS) {
868 for (p = he->h_addr_list; *p != NULL; p++) {
869 switch(caqm->family) {
871 add_ipv4_name(caqm->addr.ip4, he->h_name);
874 add_ipv6_name(&caqm->addr.ip6, he->h_name);
877 /* Throw an exception? */
884 #endif /* HAVE_C_ARES */
886 /* --------------- */
888 new_ipv4(const guint addr)
890 hashipv4_t *tp = g_new(hashipv4_t, 1);
893 ip_to_str_buf((const guint8 *)&addr, tp->ip, sizeof(tp->ip));
898 host_lookup(const guint addr, gboolean *found)
900 hashipv4_t * volatile tp;
904 tp = (hashipv4_t *)g_hash_table_lookup(ipv4_hash_table, &addr);
908 key = (int *)g_new(int, 1);
911 g_hash_table_insert(ipv4_hash_table, key, tp);
913 if ((tp->flags & DUMMY_AND_RESOLVE_FLGS) == DUMMY_ADDRESS_ENTRY){
916 if ((tp->flags & DUMMY_ADDRESS_ENTRY) == DUMMY_ADDRESS_ENTRY){
923 if (gbl_resolv_flags.network_name && gbl_resolv_flags.use_external_net_name_resolver) {
924 tp->flags = tp->flags|TRIED_RESOLVE_ADDRESS;
927 if (gbl_resolv_flags.concurrent_dns &&
928 name_resolve_concurrency > 0 &&
929 async_dns_initialized) {
930 add_async_dns_ipv4(AF_INET, addr);
931 /* XXX found is set to TRUE, which seems a bit odd, but I'm not
932 * going to risk changing the semantics.
934 fill_dummy_ip4(addr, tp);
937 #endif /* ASYNC_DNS */
939 /* unknown host or DNS timeout */
945 fill_dummy_ip4(addr, tp);
950 /* --------------- */
952 new_ipv6(const struct e_in6_addr *addr)
954 hashipv6_t *tp = g_new(hashipv6_t,1);
957 ip6_to_str_buf(addr, tp->ip6);
961 /* ------------------------------------ */
963 host_lookup6(const struct e_in6_addr *addr, gboolean *found)
965 hashipv6_t * volatile tp;
968 async_dns_queue_msg_t *caqm;
969 #endif /* HAVE_C_ARES */
974 tp = (hashipv6_t *)g_hash_table_lookup(ipv6_hash_table, addr);
976 struct e_in6_addr *addr_key;
978 addr_key = g_new(struct e_in6_addr,1);
980 memcpy(addr_key, addr, 16);
981 g_hash_table_insert(ipv6_hash_table, addr_key, tp);
983 if ((tp->flags & DUMMY_AND_RESOLVE_FLGS) == DUMMY_ADDRESS_ENTRY){
986 if ((tp->flags & DUMMY_ADDRESS_ENTRY) == DUMMY_ADDRESS_ENTRY){
993 if (gbl_resolv_flags.network_name &&
994 gbl_resolv_flags.use_external_net_name_resolver) {
995 tp->flags = tp->flags|TRIED_RESOLVE_ADDRESS;
999 if ((gbl_resolv_flags.concurrent_dns) &&
1000 name_resolve_concurrency > 0 &&
1001 async_dns_initialized) {
1002 caqm = g_new(async_dns_queue_msg_t,1);
1003 caqm->family = AF_INET6;
1004 memcpy(&caqm->addr.ip6, addr, sizeof(caqm->addr.ip6));
1005 async_dns_queue_head = g_list_append(async_dns_queue_head, (gpointer) caqm);
1007 /* XXX found is set to TRUE, which seems a bit odd, but I'm not
1008 * going to risk changing the semantics.
1010 if ((tp->flags & DUMMY_ADDRESS_ENTRY) == 0){
1011 g_strlcpy(tp->name, tp->ip6, MAXNAMELEN);
1012 ip6_to_str_buf(addr, tp->name);
1013 tp->flags = tp->flags | DUMMY_ADDRESS_ENTRY;
1017 #endif /* HAVE_C_ARES */
1022 /* unknown host or DNS timeout */
1023 if ((tp->flags & DUMMY_ADDRESS_ENTRY) == 0) {
1024 tp->flags = tp->flags | DUMMY_ADDRESS_ENTRY;
1025 g_strlcpy(tp->name, tp->ip6, MAXNAMELEN);
1030 } /* host_lookup6 */
1032 static const gchar *
1033 solve_address_to_name(const address *addr)
1035 switch (addr->type) {
1038 return get_ether_name((const guint8 *)addr->data);
1042 memcpy(&ip4_addr, addr->data, sizeof ip4_addr);
1043 return get_hostname(ip4_addr);
1047 struct e_in6_addr ip6_addr;
1048 memcpy(&ip6_addr.bytes, addr->data, sizeof ip6_addr.bytes);
1049 return get_hostname6(&ip6_addr);
1053 return (const gchar *)addr->data;
1060 static const gchar *
1061 se_solve_address_to_name(const address *addr)
1063 switch (addr->type) {
1066 return get_ether_name((const guint8 *)addr->data);
1070 memcpy(&ip4_addr, addr->data, sizeof ip4_addr);
1071 return get_hostname(ip4_addr);
1075 struct e_in6_addr ip6_addr;
1076 memcpy(&ip6_addr.bytes, addr->data, sizeof ip6_addr.bytes);
1077 return get_hostname6(&ip6_addr);
1081 return se_strdup((const gchar *)addr->data);
1089 * Ethernet / manufacturer resolution
1091 * The following functions implement ethernet address resolution and
1092 * ethers files parsing (see ethers(4)).
1094 * The manuf file has the same format as ethers(4) except that names are
1095 * truncated to MAXMANUFLEN-1 (8) characters and that an address contains
1096 * only 3 bytes (instead of 6).
1100 * I decide to not use the existing functions (see ethers(3) on some
1101 * operating systems) for the following reasons:
1102 * - performance gains (use of hash tables and some other enhancements),
1103 * - use of two ethers files (system-wide and per user),
1104 * - avoid the use of NIS maps,
1105 * - lack of these functions on some systems.
1107 * So the following functions do _not_ behave as the standard ones.
1114 * If "manuf_file" is FALSE, parse a 6-byte MAC address.
1115 * If "manuf_file" is TRUE, parse an up-to-6-byte sequence with an optional
1119 parse_ether_address(const char *cp, ether_t *eth, unsigned int *mask,
1120 const gboolean manuf_file)
1127 for (i = 0; i < 6; i++) {
1128 /* Get a hex number, 1 or 2 digits, no sign characters allowed. */
1129 if (!isxdigit((unsigned char)*cp))
1131 num = strtoul(cp, &p, 16);
1133 return FALSE; /* failed */
1135 return FALSE; /* not a valid octet */
1136 eth->addr[i] = (guint8) num;
1137 cp = p; /* skip past the number */
1139 /* OK, what character terminated the octet? */
1141 /* "/" - this has a mask. */
1143 /* Entries with masks are allowed only in the "manuf" files. */
1146 cp++; /* skip past the '/' to get to the mask */
1147 if (!isdigit((unsigned char)*cp))
1148 return FALSE; /* no sign allowed */
1149 num = strtoul(cp, &p, 10);
1151 return FALSE; /* failed */
1152 cp = p; /* skip past the number */
1153 if (*cp != '\0' && !isspace((unsigned char)*cp))
1154 return FALSE; /* bogus terminator */
1155 if (num == 0 || num >= 48)
1156 return FALSE; /* bogus mask */
1157 /* Mask out the bits not covered by the mask */
1159 for (i = 0; num >= 8; i++, num -= 8)
1160 ; /* skip octets entirely covered by the mask */
1161 /* Mask out the first masked octet */
1162 eth->addr[i] &= (0xFF << (8 - num));
1164 /* Mask out completely-masked-out octets */
1170 /* We're at the end of the address, and there's no mask. */
1172 /* We got 3 bytes, so this is a manufacturer ID. */
1174 /* Manufacturer IDs are only allowed in the "manuf"
1178 /* Indicate that this is a manufacturer ID (0 is not allowed
1185 /* We got 6 bytes, so this is a MAC address.
1186 If we're reading one of the "manuf" files, indicate that
1187 this is a MAC address (48 is not allowed as a mask). */
1193 /* We didn't get 3 or 6 bytes, and there's no mask; this is
1198 /* We don't know the separator used in this number; it can either
1199 be ':', '-', or '.'. */
1200 if (*cp != ':' && *cp != '-' && *cp != '.')
1202 sep = *cp; /* subsequent separators must be the same */
1204 /* It has to be the same as the first separator */
1216 parse_ether_line(char *line, ether_t *eth, unsigned int *mask,
1217 const gboolean manuf_file)
1220 * See the ethers(4) or ethers(5) man page for ethers file format
1221 * (not available on all systems).
1222 * We allow both ethernet address separators (':' and '-'),
1223 * as well as Wireshark's '.' separator.
1228 if ((cp = strchr(line, '#')))
1231 if ((cp = strtok(line, " \t")) == NULL)
1234 if (!parse_ether_address(cp, eth, mask, manuf_file))
1237 if ((cp = strtok(NULL, " \t")) == NULL)
1240 g_strlcpy(eth->name, cp, MAXNAMELEN);
1244 } /* parse_ether_line */
1246 static FILE *eth_p = NULL;
1249 set_ethent(char *path)
1254 eth_p = ws_fopen(path, "r");
1267 get_ethent(unsigned int *mask, const gboolean manuf_file)
1271 static int size = 0;
1272 static char *buf = NULL;
1277 while (fgetline(&buf, &size, eth_p) >= 0) {
1278 if (parse_ether_line(buf, ð, mask, manuf_file) == 0) {
1289 get_ethbyname(const gchar *name)
1293 set_ethent(g_pethers_path);
1295 while (((eth = get_ethent(NULL, FALSE)) != NULL) && strncmp(name, eth->name, MAXNAMELEN) != 0)
1301 set_ethent(g_ethers_path);
1303 while (((eth = get_ethent(NULL, FALSE)) != NULL) && strncmp(name, eth->name, MAXNAMELEN) != 0)
1311 } /* get_ethbyname */
1315 get_ethbyaddr(const guint8 *addr)
1320 set_ethent(g_pethers_path);
1322 while (((eth = get_ethent(NULL, FALSE)) != NULL) && memcmp(addr, eth->addr, 6) != 0)
1328 set_ethent(g_ethers_path);
1330 while (((eth = get_ethent(NULL, FALSE)) != NULL) && memcmp(addr, eth->addr, 6) != 0)
1338 } /* get_ethbyaddr */
1342 add_manuf_name(const guint8 *addr, unsigned int mask, gchar *name)
1345 gint64 eth_as_int64, *wka_key;
1346 int eth_as_int, *manuf_key;
1349 * XXX - can we use Standard Annotation Language annotations to
1350 * note that mask, as returned by parse_ethe)r_address() (and thus
1351 * by the routines that call it, and thus passed to us) cannot be > 48,
1352 * or is SAL too weak to express that?
1355 /* This is a well-known MAC address; just add this to the Ethernet
1357 add_eth_name(addr, name);
1361 eth_as_int64 = addr[0];
1362 eth_as_int64 = eth_as_int64<<8;
1364 eth_as_int64 = eth_as_int64 | oct;
1365 eth_as_int64 = eth_as_int64<<8;
1367 eth_as_int64 = eth_as_int64 | oct;
1368 eth_as_int64 = eth_as_int64<<8;
1370 eth_as_int64 = eth_as_int64 | oct;
1371 eth_as_int64 = eth_as_int64<<8;
1373 eth_as_int64 = eth_as_int64 | oct;
1374 eth_as_int64 = eth_as_int64<<8;
1376 eth_as_int64 = eth_as_int64 | oct;
1379 /* This is a manufacturer ID; add it to the manufacturer ID hash table */
1381 /* manuf needs only the 3 most significant octets of the ethernet address */
1382 manuf_key = (int *)g_new(int, 1);
1383 eth_as_int = (int)(eth_as_int64>>24)&0xffffff;
1384 *manuf_key = eth_as_int;
1386 g_hash_table_insert(manuf_hashtable, manuf_key, g_strdup(name));
1390 /* This is a range of well-known addresses; add it to the appropriate
1391 well-known-address table, creating that table if necessary. */
1393 wka_key = (gint64 *)g_new(gint64, 1);
1394 *wka_key = eth_as_int64;
1396 g_hash_table_insert(wka_hashtable, wka_key, g_strdup(name));
1398 } /* add_manuf_name */
1401 manuf_name_lookup(const guint8 *addr)
1403 gint32 manuf_key = 0;
1407 /* manuf needs only the 3 most significant octets of the ethernet address */
1408 manuf_key = addr[0];
1409 manuf_key = manuf_key<<8;
1411 manuf_key = manuf_key | oct;
1412 manuf_key = manuf_key<<8;
1414 manuf_key = manuf_key | oct;
1417 /* first try to find a "perfect match" */
1418 name = (gchar *)g_hash_table_lookup(manuf_hashtable, &manuf_key);
1423 /* Mask out the broadcast/multicast flag but not the locally
1424 * administered flag as localy administered means: not assigend
1425 * by the IEEE but the local administrator instead.
1426 * 0x01 multicast / broadcast bit
1427 * 0x02 locally administered bit */
1428 if((manuf_key & 0x00010000) != 0){
1429 manuf_key &= 0x00FEFFFF;
1430 name = (gchar *)g_hash_table_lookup(manuf_hashtable, &manuf_key);
1438 } /* manuf_name_lookup */
1441 wka_name_lookup(const guint8 *addr, const unsigned int mask)
1443 guint8 masked_addr[6];
1446 gint64 eth_as_int64;
1450 if(wka_hashtable == NULL){
1453 /* Get the part of the address covered by the mask. */
1454 for (i = 0, num = mask; num >= 8; i++, num -= 8)
1455 masked_addr[i] = addr[i]; /* copy octets entirely covered by the mask */
1456 /* Mask out the first masked octet */
1457 masked_addr[i] = addr[i] & (0xFF << (8 - num));
1459 /* Zero out completely-masked-out octets */
1463 eth_as_int64 = masked_addr[0];
1464 eth_as_int64 = eth_as_int64<<8;
1465 oct = masked_addr[1];
1466 eth_as_int64 = eth_as_int64 | oct;
1467 eth_as_int64 = eth_as_int64<<8;
1468 oct = masked_addr[2];
1469 eth_as_int64 = eth_as_int64 | oct;
1470 eth_as_int64 = eth_as_int64<<8;
1471 oct = masked_addr[3];
1472 eth_as_int64 = eth_as_int64 | oct;
1473 eth_as_int64 = eth_as_int64<<8;
1474 oct = masked_addr[4];
1475 eth_as_int64 = eth_as_int64 | oct;
1476 eth_as_int64 = eth_as_int64<<8;
1477 oct = masked_addr[5];
1478 eth_as_int64 = eth_as_int64 | oct;
1480 name = (gchar *)g_hash_table_lookup(wka_hashtable, ð_as_int64);
1484 } /* wka_name_lookup */
1487 initialize_ethers(void)
1493 /* hash table initialization */
1494 wka_hashtable = g_hash_table_new_full(g_int64_hash, g_int64_equal, g_free, g_free);
1495 manuf_hashtable = g_hash_table_new_full(g_int_hash, g_int_equal, g_free, g_free);
1496 eth_hashtable = g_hash_table_new_full(g_int64_hash, g_int64_equal, g_free, g_free);
1498 /* Compute the pathname of the ethers file. */
1499 if (g_ethers_path == NULL) {
1500 g_ethers_path = g_strdup_printf("%s" G_DIR_SEPARATOR_S "%s",
1501 get_systemfile_dir(), ENAME_ETHERS);
1504 /* Set g_pethers_path here, but don't actually do anything
1505 * with it. It's used in get_ethbyname() and get_ethbyaddr()
1507 if (g_pethers_path == NULL)
1508 g_pethers_path = get_persconffile_path(ENAME_ETHERS, FALSE);
1510 /* Compute the pathname of the manuf file */
1511 manuf_path = get_datafile_path(ENAME_MANUF);
1513 /* Read it and initialize the hash table */
1514 set_ethent(manuf_path);
1516 while ((eth = get_ethent(&mask, TRUE))) {
1517 add_manuf_name(eth->addr, mask, eth->name);
1524 } /* initialize_ethers */
1526 /* this is only needed when shuting down application (if at all) */
1528 eth_name_lookup_cleanup(void)
1531 if(manuf_hashtable) {
1532 g_hash_table_destroy(manuf_hashtable);
1533 manuf_hashtable = NULL;
1536 g_hash_table_destroy(wka_hashtable);
1537 wka_hashtable = NULL;
1541 g_hash_table_destroy(eth_hashtable);
1542 eth_hashtable = NULL;
1547 /* Resolve ethernet address */
1548 static hashether_t *
1549 eth_addr_resolve(hashether_t *tp) {
1551 const guint8 *addr = tp->addr;
1553 if ( (eth = get_ethbyaddr(addr)) != NULL) {
1554 g_strlcpy(tp->resolved_name, eth->name, MAXNAMELEN);
1555 tp->status = HASHETHER_STATUS_RESOLVED_NAME;
1561 /* Unknown name. Try looking for it in the well-known-address
1562 tables for well-known address ranges smaller than 2^24. */
1565 /* Only the topmost 5 bytes participate fully */
1566 if ((name = wka_name_lookup(addr, mask+40)) != NULL) {
1567 g_snprintf(tp->resolved_name, MAXNAMELEN, "%s_%02x",
1568 name, addr[5] & (0xFF >> mask));
1569 tp->status = HASHETHER_STATUS_RESOLVED_DUMMY;
1579 /* Only the topmost 4 bytes participate fully */
1580 if ((name = wka_name_lookup(addr, mask+32)) != NULL) {
1581 g_snprintf(tp->resolved_name, MAXNAMELEN, "%s_%02x:%02x",
1582 name, addr[4] & (0xFF >> mask), addr[5]);
1583 tp->status = HASHETHER_STATUS_RESOLVED_DUMMY;
1593 /* Only the topmost 3 bytes participate fully */
1594 if ((name = wka_name_lookup(addr, mask+24)) != NULL) {
1595 g_snprintf(tp->resolved_name, MAXNAMELEN, "%s_%02x:%02x:%02x",
1596 name, addr[3] & (0xFF >> mask), addr[4], addr[5]);
1597 tp->status = HASHETHER_STATUS_RESOLVED_DUMMY;
1605 /* Now try looking in the manufacturer table. */
1606 if ((name = manuf_name_lookup(addr)) != NULL) {
1607 g_snprintf(tp->resolved_name, MAXNAMELEN, "%s_%02x:%02x:%02x",
1608 name, addr[3], addr[4], addr[5]);
1609 tp->status = HASHETHER_STATUS_RESOLVED_DUMMY;
1613 /* Now try looking for it in the well-known-address
1614 tables for well-known address ranges larger than 2^24. */
1617 /* Only the topmost 2 bytes participate fully */
1618 if ((name = wka_name_lookup(addr, mask+16)) != NULL) {
1619 g_snprintf(tp->resolved_name, MAXNAMELEN, "%s_%02x:%02x:%02x:%02x",
1620 name, addr[2] & (0xFF >> mask), addr[3], addr[4],
1622 tp->status = HASHETHER_STATUS_RESOLVED_DUMMY;
1632 /* Only the topmost byte participates fully */
1633 if ((name = wka_name_lookup(addr, mask+8)) != NULL) {
1634 g_snprintf(tp->resolved_name, MAXNAMELEN, "%s_%02x:%02x:%02x:%02x:%02x",
1635 name, addr[1] & (0xFF >> mask), addr[2], addr[3],
1637 tp->status = HASHETHER_STATUS_RESOLVED_DUMMY;
1645 for (mask = 7; mask > 0; mask--) {
1646 /* Not even the topmost byte participates fully */
1647 if ((name = wka_name_lookup(addr, mask)) != NULL) {
1648 g_snprintf(tp->resolved_name, MAXNAMELEN, "%s_%02x:%02x:%02x:%02x:%02x:%02x",
1649 name, addr[0] & (0xFF >> mask), addr[1], addr[2],
1650 addr[3], addr[4], addr[5]);
1651 tp->status = HASHETHER_STATUS_RESOLVED_DUMMY;
1656 /* No match whatsoever. */
1657 g_snprintf(tp->resolved_name, MAXNAMELEN, "%s", ether_to_str(addr));
1658 tp->status = HASHETHER_STATUS_RESOLVED_DUMMY;
1661 g_assert_not_reached();
1662 } /* eth_addr_resolve */
1665 eth_to_int64(const guint8 *addr)
1668 gint64 eth_as_int64;
1670 eth_as_int64 = addr[0];
1671 eth_as_int64 = eth_as_int64<<8;
1673 eth_as_int64 = eth_as_int64 | oct;
1674 eth_as_int64 = eth_as_int64<<8;
1676 eth_as_int64 = eth_as_int64 | oct;
1677 eth_as_int64 = eth_as_int64<<8;
1679 eth_as_int64 = eth_as_int64 | oct;
1680 eth_as_int64 = eth_as_int64<<8;
1682 eth_as_int64 = eth_as_int64 | oct;
1683 eth_as_int64 = eth_as_int64<<8;
1685 eth_as_int64 = eth_as_int64 | oct;
1687 return eth_as_int64;
1690 static hashether_t *
1691 eth_hash_new_entry(const guint8 *addr, const gboolean resolve)
1694 gint64 eth_as_int64, *key;
1697 eth_as_int64 = eth_to_int64(addr);
1699 key = (gint64 *)g_new(gint64, 1);
1700 *key = eth_as_int64;
1702 tp = g_new(hashether_t, 1);
1703 memcpy(tp->addr, addr, sizeof(tp->addr));
1704 tp->status = HASHETHER_STATUS_UNRESOLVED;
1705 /* Values returned by bytes_to_hexstr_punct() are *not* null-terminated */
1706 endp = bytes_to_hexstr_punct(tp->hexaddr, addr, sizeof(tp->addr), ':');
1708 tp->resolved_name[0] = '\0';
1711 eth_addr_resolve(tp);
1713 g_hash_table_insert(eth_hashtable, key, tp);
1716 } /* eth_hash_new_entry */
1718 static hashether_t *
1719 add_eth_name(const guint8 *addr, const gchar *name)
1722 gint64 eth_as_int64;
1724 eth_as_int64 = eth_to_int64(addr);
1726 tp = (hashether_t *)g_hash_table_lookup(eth_hashtable, ð_as_int64);
1729 tp = eth_hash_new_entry(addr, FALSE);
1732 g_strlcpy(tp->resolved_name, name, MAXNAMELEN);
1733 tp->status = HASHETHER_STATUS_RESOLVED_NAME;
1734 new_resolved_objects = TRUE;
1737 } /* add_eth_name */
1739 static hashether_t *
1740 eth_name_lookup(const guint8 *addr, const gboolean resolve)
1743 gint64 eth_as_int64;
1745 eth_as_int64 = eth_to_int64(addr);
1747 tp = (hashether_t *)g_hash_table_lookup(eth_hashtable, ð_as_int64);
1749 tp = eth_hash_new_entry(addr, resolve);
1751 if (resolve && (tp->status == HASHETHER_STATUS_UNRESOLVED)){
1752 eth_addr_resolve(tp); /* Found but needs to be resolved */
1758 } /* eth_name_lookup */
1761 eth_addr_lookup(const gchar *name _U_)
1764 /* XXX Do we need reverse lookup??? */
1767 hashether_t **table = eth_table;
1770 /* to be optimized (hash table from name to addr) */
1771 for (i = 0; i < HASHETHSIZE; i++) {
1774 if (strcmp(tp->resolved_name, name) == 0)
1780 /* not in hash table : performs a file lookup */
1782 if ((eth = get_ethbyname(name)) == NULL)
1785 /* add new entry in hash table */
1787 tp = add_eth_name(eth->addr, name);
1793 } /* eth_addr_lookup */
1798 parse_ipxnets_line(char *line, ipxnet_t *ipxnet)
1801 * We allow three address separators (':', '-', and '.'),
1802 * as well as no separators
1806 guint32 a, a0, a1, a2, a3;
1807 gboolean found_single_number = FALSE;
1809 if ((cp = strchr(line, '#')))
1812 if ((cp = strtok(line, " \t\n")) == NULL)
1815 /* Either fill a0,a1,a2,a3 and found_single_number is FALSE,
1816 * fill a and found_single_number is TRUE,
1819 if (sscanf(cp, "%x:%x:%x:%x", &a0, &a1, &a2, &a3) != 4) {
1820 if (sscanf(cp, "%x-%x-%x-%x", &a0, &a1, &a2, &a3) != 4) {
1821 if (sscanf(cp, "%x.%x.%x.%x", &a0, &a1, &a2, &a3) != 4) {
1822 if (sscanf(cp, "%x", &a) == 1) {
1823 found_single_number = TRUE;
1832 if ((cp = strtok(NULL, " \t\n")) == NULL)
1835 if (found_single_number) {
1839 ipxnet->addr = (a0 << 24) | (a1 << 16) | (a2 << 8) | a3;
1842 g_strlcpy(ipxnet->name, cp, MAXNAMELEN);
1846 } /* parse_ipxnets_line */
1848 static FILE *ipxnet_p = NULL;
1851 set_ipxnetent(char *path)
1856 ipxnet_p = ws_fopen(path, "r");
1872 static ipxnet_t ipxnet;
1873 static int size = 0;
1874 static char *buf = NULL;
1876 if (ipxnet_p == NULL)
1879 while (fgetline(&buf, &size, ipxnet_p) >= 0) {
1880 if (parse_ipxnets_line(buf, &ipxnet) == 0) {
1887 } /* get_ipxnetent */
1892 get_ipxnetbyname(const gchar *name)
1896 set_ipxnetent(g_ipxnets_path);
1898 while (((ipxnet = get_ipxnetent()) != NULL) && strncmp(name, ipxnet->name, MAXNAMELEN) != 0)
1901 if (ipxnet == NULL) {
1904 set_ipxnetent(g_pipxnets_path);
1906 while (((ipxnet = get_ipxnetent()) != NULL) && strncmp(name, ipxnet->name, MAXNAMELEN) != 0)
1914 } /* get_ipxnetbyname */
1918 get_ipxnetbyaddr(guint32 addr)
1922 set_ipxnetent(g_ipxnets_path);
1924 while (((ipxnet = get_ipxnetent()) != NULL) && (addr != ipxnet->addr) ) ;
1926 if (ipxnet == NULL) {
1929 set_ipxnetent(g_pipxnets_path);
1931 while (((ipxnet = get_ipxnetent()) != NULL) && (addr != ipxnet->addr) )
1939 } /* get_ipxnetbyaddr */
1942 initialize_ipxnets(void)
1944 /* Compute the pathname of the ipxnets file.
1946 * XXX - is there a notion of an "ipxnets file" in any flavor of
1947 * UNIX, or with any add-on Netware package for UNIX? If not,
1948 * should the UNIX version of the ipxnets file be in the datafile
1949 * directory as well?
1951 if (g_ipxnets_path == NULL) {
1952 g_ipxnets_path = g_strdup_printf("%s" G_DIR_SEPARATOR_S "%s",
1953 get_systemfile_dir(), ENAME_IPXNETS);
1956 /* Set g_pipxnets_path here, but don't actually do anything
1957 * with it. It's used in get_ipxnetbyname() and get_ipxnetbyaddr()
1959 if (g_pipxnets_path == NULL)
1960 g_pipxnets_path = get_persconffile_path(ENAME_IPXNETS, FALSE);
1962 } /* initialize_ipxnets */
1965 ipx_name_lookup_cleanup(void)
1967 if(ipxnet_hash_table){
1968 g_hash_table_destroy(ipxnet_hash_table);
1969 ipxnet_hash_table = NULL;
1975 static hashipxnet_t *
1976 add_ipxnet_name(guint addr, const gchar *name)
1980 tp = (hashipxnet_t *)g_hash_table_lookup(ipxnet_hash_table, &addr);
1982 g_strlcpy(tp->name, name, MAXNAMELEN);
1986 key = (int *)g_new(int, 1);
1988 tp = g_new(hashipxnet_t,1);
1989 g_strlcpy(tp->name, name, MAXNAMELEN);
1990 g_hash_table_insert(ipxnet_hash_table, key, tp);
1994 g_strlcpy(tp->name, name, MAXNAMELEN);
1996 new_resolved_objects = TRUE;
2000 } /* add_ipxnet_name */
2004 ipxnet_name_lookup(const guint addr)
2009 tp = (hashipxnet_t *)g_hash_table_lookup(ipxnet_hash_table, &addr);
2013 key = (int *)g_new(int, 1);
2015 tp = g_new(hashipxnet_t, 1);
2016 g_hash_table_insert(ipxnet_hash_table, key, tp);
2021 /* fill in a new entry */
2025 if ( (ipxnet = get_ipxnetbyaddr(addr)) == NULL) {
2027 g_snprintf(tp->name, MAXNAMELEN, "%X", addr);
2030 g_strlcpy(tp->name, ipxnet->name, MAXNAMELEN);
2035 } /* ipxnet_name_lookup */
2038 ipxnet_addr_lookup(const gchar *name _U_, gboolean *success)
2043 /* XXX Do we need reverse lookup??? */
2046 hashipxnet_t **table = ipxnet_table;
2049 /* to be optimized (hash table from name to addr) */
2050 for (i = 0; i < HASHIPXNETSIZE; i++) {
2053 if (strcmp(tp->name, name) == 0) {
2061 /* not in hash table : performs a file lookup */
2063 if ((ipxnet = get_ipxnetbyname(name)) == NULL) {
2068 /* add new entry in hash table */
2070 tp = add_ipxnet_name(ipxnet->addr, name);
2075 } /* ipxnet_addr_lookup */
2078 read_hosts_file (const char *hostspath)
2084 guint32 host_addr[4]; /* IPv4 or IPv6 */
2085 struct e_in6_addr ip6_addr;
2090 * See the hosts(4) or hosts(5) man page for hosts file format
2091 * (not available on all systems).
2093 if ((hf = ws_fopen(hostspath, "r")) == NULL)
2096 while (fgetline(&line, &size, hf) >= 0) {
2097 if ((cp = strchr(line, '#')))
2100 if ((cp = strtok(line, " \t")) == NULL)
2101 continue; /* no tokens in the line */
2103 ret = inet_pton(AF_INET6, cp, &host_addr);
2105 continue; /* error parsing */
2110 /* Not valid IPv6 - valid IPv4? */
2111 if (!str_to_ip(cp, &host_addr))
2116 if ((cp = strtok(NULL, " \t")) == NULL)
2117 continue; /* no host name */
2120 memcpy(&ip6_addr, host_addr, sizeof ip6_addr);
2121 add_ipv6_name(&ip6_addr, cp);
2123 add_ipv4_name(host_addr[0], cp);
2126 * Add the aliases, too, if there are any.
2127 * XXX - host_lookup() only returns the first entry.
2129 while ((cp = strtok(NULL, " \t")) != NULL) {
2131 memcpy(&ip6_addr, host_addr, sizeof ip6_addr);
2132 add_ipv6_name(&ip6_addr, cp);
2134 add_ipv4_name(host_addr[0], cp);
2141 } /* read_hosts_file */
2144 add_hosts_file (const char *hosts_file)
2146 gboolean found = FALSE;
2152 if (!extra_hosts_files)
2153 extra_hosts_files = g_ptr_array_new();
2155 for (i = 0; i < extra_hosts_files->len; i++) {
2156 if (strcmp(hosts_file, (const char *) g_ptr_array_index(extra_hosts_files, i)) == 0)
2161 g_ptr_array_add(extra_hosts_files, g_strdup(hosts_file));
2162 return read_hosts_file (hosts_file);
2168 add_ip_name_from_string (const char *addr, const char *name)
2170 guint32 host_addr[4]; /* IPv4 */
2171 struct e_in6_addr ip6_addr; /* IPv6 */
2174 resolved_ipv4_t *resolved_ipv4_entry;
2175 resolved_ipv6_t *resolved_ipv6_entry;
2177 ret = inet_pton(AF_INET6, addr, &ip6_addr);
2179 /* Error parsing address */
2186 /* Not valid IPv6 - valid IPv4? */
2187 if (!str_to_ip(addr, &host_addr))
2188 return FALSE; /* no */
2193 resolved_ipv6_entry = g_new(resolved_ipv6_t, 1);
2194 memcpy(&(resolved_ipv6_entry->ip6_addr), &ip6_addr, 16);
2195 g_strlcpy(resolved_ipv6_entry->name, name, MAXNAMELEN);
2196 manually_resolved_ipv6_list = g_slist_prepend(manually_resolved_ipv6_list, resolved_ipv6_entry);
2198 resolved_ipv4_entry = g_new(resolved_ipv4_t, 1);
2199 resolved_ipv4_entry->host_addr = host_addr[0];
2200 g_strlcpy(resolved_ipv4_entry->name, name, MAXNAMELEN);
2201 manually_resolved_ipv4_list = g_slist_prepend(manually_resolved_ipv4_list, resolved_ipv4_entry);
2205 } /* add_ip_name_from_string */
2208 * Add the resolved addresses that are in use to the list used to create the NRB
2211 ipv4_hash_table_resolved_to_list(gpointer key _U_, gpointer value, gpointer user_data)
2213 addrinfo_lists_t *lists = (addrinfo_lists_t*)user_data;
2214 hashipv4_t *ipv4_hash_table_entry = (hashipv4_t *)value;
2216 if((ipv4_hash_table_entry->flags & USED_AND_RESOLVED_MASK) == RESOLVED_ADDRESS_USED){
2217 lists->ipv4_addr_list = g_list_prepend (lists->ipv4_addr_list, ipv4_hash_table_entry);
2223 * Add the resolved addresses that are in use to the list used to create the NRB
2227 ipv6_hash_table_resolved_to_list(gpointer key _U_, gpointer value, gpointer user_data)
2229 addrinfo_lists_t *lists = (addrinfo_lists_t*)user_data;
2230 hashipv6_t *ipv6_hash_table_entry = (hashipv6_t *)value;
2232 if((ipv6_hash_table_entry->flags & USED_AND_RESOLVED_MASK) == RESOLVED_ADDRESS_USED){
2233 lists->ipv6_addr_list = g_list_prepend (lists->ipv6_addr_list, ipv6_hash_table_entry);
2239 get_addrinfo_list(void) {
2241 if(ipv4_hash_table){
2242 g_hash_table_foreach(ipv4_hash_table, ipv4_hash_table_resolved_to_list, &addrinfo_lists);
2245 if(ipv6_hash_table){
2246 g_hash_table_foreach(ipv6_hash_table, ipv6_hash_table_resolved_to_list, &addrinfo_lists);
2249 return &addrinfo_lists;
2252 /* Read in a list of subnet definition - name pairs.
2253 * <line> = <comment> | <entry> | <whitespace>
2254 * <comment> = <whitespace>#<any>
2255 * <entry> = <subnet_definition> <whitespace> <subnet_name> [<comment>|<whitespace><any>]
2256 * <subnet_definition> = <ipv4_address> / <subnet_mask_length>
2257 * <ipv4_address> is a full address; it will be masked to get the subnet-ID.
2258 * <subnet_mask_length> is a decimal 1-31
2259 * <subnet_name> is a string containing no whitespace.
2260 * <whitespace> = (space | tab)+
2261 * Any malformed entries are ignored.
2262 * Any trailing data after the subnet_name is ignored.
2267 read_subnets_file (const char *subnetspath)
2273 guint32 host_addr; /* IPv4 ONLY */
2276 if ((hf = ws_fopen(subnetspath, "r")) == NULL)
2279 while (fgetline(&line, &size, hf) >= 0) {
2280 if ((cp = strchr(line, '#')))
2283 if ((cp = strtok(line, " \t")) == NULL)
2284 continue; /* no tokens in the line */
2287 /* Expected format is <IP4 address>/<subnet length> */
2288 cp2 = strchr(cp, '/');
2293 *cp2 = '\0'; /* Cut token */
2296 /* Check if this is a valid IPv4 address */
2297 if (!str_to_ip(cp, &host_addr)) {
2301 mask_length = atoi(cp2);
2302 if(0 >= mask_length || mask_length > 31) {
2303 continue; /* invalid mask length */
2306 if ((cp = strtok(NULL, " \t")) == NULL)
2307 continue; /* no subnet name */
2309 subnet_entry_set(host_addr, (guint32)mask_length, cp);
2315 } /* read_subnets_file */
2317 static subnet_entry_t
2318 subnet_lookup(const guint32 addr)
2320 subnet_entry_t subnet_entry;
2323 /* Search mask lengths linearly, longest first */
2325 i = SUBNETLENGTHSIZE;
2326 while(have_subnet_entry && i > 0) {
2327 guint32 masked_addr;
2328 subnet_length_entry_t* length_entry;
2330 /* Note that we run from 31 (length 32) to 0 (length 1) */
2332 g_assert(i < SUBNETLENGTHSIZE);
2335 length_entry = &subnet_length_entries[i];
2337 if(NULL != length_entry->subnet_addresses) {
2338 sub_net_hashipv4_t * tp;
2341 masked_addr = addr & length_entry->mask;
2342 hash_idx = HASH_IPV4_ADDRESS(masked_addr);
2344 tp = length_entry->subnet_addresses[hash_idx];
2345 while(tp != NULL && tp->addr != masked_addr) {
2350 subnet_entry.mask = length_entry->mask;
2351 subnet_entry.mask_length = i + 1; /* Length is offset + 1 */
2352 subnet_entry.name = tp->name;
2353 return subnet_entry;
2358 subnet_entry.mask = 0;
2359 subnet_entry.mask_length = 0;
2360 subnet_entry.name = NULL;
2362 return subnet_entry;
2365 /* Add a subnet-definition - name pair to the set.
2366 * The definition is taken by masking the address passed in with the mask of the
2370 subnet_entry_set(guint32 subnet_addr, const guint32 mask_length, const gchar* name)
2372 subnet_length_entry_t* entry;
2373 sub_net_hashipv4_t * tp;
2376 g_assert(mask_length > 0 && mask_length <= 32);
2378 entry = &subnet_length_entries[mask_length - 1];
2380 subnet_addr &= entry->mask;
2382 hash_idx = HASH_IPV4_ADDRESS(subnet_addr);
2384 if(NULL == entry->subnet_addresses) {
2385 entry->subnet_addresses = (sub_net_hashipv4_t**) se_alloc0(sizeof(sub_net_hashipv4_t*) * HASHHOSTSIZE);
2388 if(NULL != (tp = entry->subnet_addresses[hash_idx])) {
2389 if(tp->addr == subnet_addr) {
2390 return; /* XXX provide warning that an address was repeated? */
2392 sub_net_hashipv4_t * new_tp = se_new(sub_net_hashipv4_t);
2397 tp = entry->subnet_addresses[hash_idx] = se_new(sub_net_hashipv4_t);
2401 tp->addr = subnet_addr;
2402 /* Clear DUMMY_ADDRESS_ENTRY */
2403 tp->flags = tp->flags & 0xfe; /*Never used again...*/
2404 g_strlcpy(tp->name, name, MAXNAMELEN); /* This is longer than subnet names can actually be */
2405 have_subnet_entry = TRUE;
2409 subnet_name_lookup_init(void)
2414 for(i = 0; i < SUBNETLENGTHSIZE; ++i) {
2415 guint32 length = i + 1;
2417 subnet_length_entries[i].subnet_addresses = NULL;
2418 subnet_length_entries[i].mask_length = length;
2419 subnet_length_entries[i].mask = g_htonl(ip_get_subnet_mask(length));
2422 subnetspath = get_persconffile_path(ENAME_SUBNETS, FALSE);
2423 if (!read_subnets_file(subnetspath) && errno != ENOENT) {
2424 report_open_failure(subnetspath, errno, FALSE);
2426 g_free(subnetspath);
2429 * Load the global subnets file, if we have one.
2431 subnetspath = get_datafile_path(ENAME_SUBNETS);
2432 if (!read_subnets_file(subnetspath) && errno != ENOENT) {
2433 report_open_failure(subnetspath, errno, FALSE);
2435 g_free(subnetspath);
2440 * External Functions
2444 addr_resolve_pref_init(module_t *nameres)
2446 prefs_register_bool_preference(nameres, "mac_name",
2447 "Resolve MAC addresses",
2448 "Resolve Ethernet MAC address to manufacturer names",
2449 &gbl_resolv_flags.mac_name);
2451 prefs_register_bool_preference(nameres, "transport_name",
2452 "Resolve transport names",
2453 "Resolve TCP/UDP ports into service names",
2454 &gbl_resolv_flags.transport_name);
2456 prefs_register_bool_preference(nameres, "network_name",
2457 "Resolve network (IP) addresses",
2458 "Resolve IPv4, IPv6, and IPX addresses into host names."
2459 " The next set of check boxes determines how name resolution should be performed."
2460 " If no other options are checked name resolution is made from Wireshark's host file,"
2461 " capture file name resolution blocks and DNS packets in the capture.",
2462 &gbl_resolv_flags.network_name);
2464 prefs_register_bool_preference(nameres, "use_external_name_resolver",
2465 "Use an external network name resolver",
2466 "Use your system's configured name resolver"
2467 " (usually DNS) to resolve network names."
2468 " Only applies when network name resolution"
2470 &gbl_resolv_flags.use_external_net_name_resolver);
2472 #if defined(HAVE_C_ARES) || defined(HAVE_GNU_ADNS)
2473 prefs_register_bool_preference(nameres, "concurrent_dns",
2474 "Enable concurrent DNS name resolution",
2475 "Enable concurrent DNS name resolution. Only"
2476 " applies when network name resolution is"
2477 " enabled. You probably want to enable this.",
2478 &gbl_resolv_flags.concurrent_dns);
2480 prefs_register_uint_preference(nameres, "name_resolve_concurrency",
2481 "Maximum concurrent requests",
2482 "The maximum number of DNS requests that may"
2483 " be active at any time. A large value (many"
2484 " thousands) might overload the network or make"
2485 " your DNS server behave badly.",
2487 &name_resolve_concurrency);
2489 prefs_register_static_text_preference(nameres, "concurrent_dns",
2490 "Enable concurrent DNS name resolution: N/A",
2491 "Support for concurrent DNS name resolution was not"
2492 " compiled into this version of Wireshark");
2495 prefs_register_bool_preference(nameres, "hosts_file_handling",
2496 "Only use the profile \"hosts\" file",
2497 "By default \"hosts\" files will be loaded from multiple sources."
2498 " Checking this box only loads the \"hosts\" in the current profile.",
2499 &gbl_resolv_flags.load_hosts_file_from_profile_only);
2505 host_name_lookup_process(void) {
2506 async_dns_queue_msg_t *caqm;
2507 struct timeval tv = { 0, 0 };
2510 gboolean nro = new_resolved_objects;
2512 new_resolved_objects = FALSE;
2514 if (!async_dns_initialized)
2515 /* c-ares not initialized. Bail out and cancel timers. */
2518 async_dns_queue_head = g_list_first(async_dns_queue_head);
2520 while (async_dns_queue_head != NULL && async_dns_in_flight <= name_resolve_concurrency) {
2521 caqm = (async_dns_queue_msg_t *) async_dns_queue_head->data;
2522 async_dns_queue_head = g_list_remove(async_dns_queue_head, (void *) caqm);
2523 if (caqm->family == AF_INET) {
2524 ares_gethostbyaddr(ghba_chan, &caqm->addr.ip4, sizeof(guint32), AF_INET,
2525 c_ares_ghba_cb, caqm);
2526 async_dns_in_flight++;
2527 } else if (caqm->family == AF_INET6) {
2528 ares_gethostbyaddr(ghba_chan, &caqm->addr.ip6, sizeof(struct e_in6_addr),
2529 AF_INET6, c_ares_ghba_cb, caqm);
2530 async_dns_in_flight++;
2536 nfds = ares_fds(ghba_chan, &rfds, &wfds);
2538 if (select(nfds, &rfds, &wfds, NULL, &tv) == -1) { /* call to select() failed */
2539 fprintf(stderr, "Warning: call to select() failed, error is %s\n", strerror(errno));
2542 ares_process(ghba_chan, &rfds, &wfds);
2545 /* Any new entries? */
2550 _host_name_lookup_cleanup(void) {
2553 cur = g_list_first(async_dns_queue_head);
2556 cur = g_list_next (cur);
2559 g_list_free(async_dns_queue_head);
2560 async_dns_queue_head = NULL;
2562 if (async_dns_initialized) {
2563 ares_destroy(ghba_chan);
2564 ares_destroy(ghbn_chan);
2566 #ifdef CARES_HAVE_ARES_LIBRARY_INIT
2567 ares_library_cleanup();
2569 async_dns_initialized = FALSE;
2572 #elif defined(HAVE_GNU_ADNS)
2574 /* XXX - The ADNS "documentation" isn't very clear:
2575 * - Do we need to keep our query structures around?
2578 host_name_lookup_process(void) {
2579 async_dns_queue_msg_t *almsg;
2581 char addr_str[] = "111.222.333.444.in-addr.arpa.";
2586 gboolean nro = new_resolved_objects;
2588 new_resolved_objects = FALSE;
2589 async_dns_queue_head = g_list_first(async_dns_queue_head);
2591 cur = async_dns_queue_head;
2592 while (cur && async_dns_in_flight <= name_resolve_concurrency) {
2593 almsg = (async_dns_queue_msg_t *) cur->data;
2594 if (! almsg->submitted && almsg->type == AF_INET) {
2595 addr_bytes = (guint8 *) &almsg->ip4_addr;
2596 g_snprintf(addr_str, sizeof addr_str, "%u.%u.%u.%u.in-addr.arpa.", addr_bytes[3],
2597 addr_bytes[2], addr_bytes[1], addr_bytes[0]);
2598 /* XXX - what if it fails? */
2599 adns_submit (ads, addr_str, adns_r_ptr, adns_qf_none, NULL, &almsg->query);
2600 almsg->submitted = TRUE;
2601 async_dns_in_flight++;
2606 cur = async_dns_queue_head;
2609 almsg = (async_dns_queue_msg_t *) cur->data;
2610 if (almsg->submitted) {
2611 ret = adns_check(ads, &almsg->query, &ans, NULL);
2613 if (ans->status == adns_s_ok) {
2614 add_ipv4_name(almsg->ip4_addr, *ans->rrs.str);
2621 async_dns_queue_head = g_list_remove(async_dns_queue_head, (void *) almsg);
2623 /* XXX, what to do if async_dns_in_flight == 0? */
2624 async_dns_in_flight--;
2628 /* Keep the timeout in place */
2633 _host_name_lookup_cleanup(void) {
2636 async_dns_queue_head = g_list_first(async_dns_queue_head);
2637 while (async_dns_queue_head) {
2638 qdata = async_dns_queue_head->data;
2639 async_dns_queue_head = g_list_remove(async_dns_queue_head, qdata);
2643 if (async_dns_initialized)
2645 async_dns_initialized = FALSE;
2648 #else /* HAVE_GNU_ADNS */
2651 host_name_lookup_process(void) {
2652 gboolean nro = new_resolved_objects;
2654 new_resolved_objects = FALSE;
2660 _host_name_lookup_cleanup(void) {
2663 #endif /* HAVE_C_ARES */
2666 get_hostname(const guint addr)
2670 /* XXX why do we call this if we're not resolving? To create hash entries?
2673 hashipv4_t *tp = host_lookup(addr, &found);
2675 if (!gbl_resolv_flags.network_name)
2678 tp->flags = tp->flags | RESOLVED_ADDRESS_USED;
2683 /* -------------------------- */
2686 get_hostname6(const struct e_in6_addr *addr)
2690 /* XXX why do we call this if we're not resolving? To create hash entries?
2693 hashipv6_t *tp = host_lookup6(addr, &found);
2695 if (!gbl_resolv_flags.network_name)
2698 tp->flags = tp->flags | RESOLVED_ADDRESS_USED;
2703 /* -------------------------- */
2705 add_ipv4_name(const guint addr, const gchar *name)
2710 * Don't add zero-length names; apparently, some resolvers will return
2711 * them if they get them from DNS.
2713 if (name[0] == '\0')
2717 tp = (hashipv4_t *)g_hash_table_lookup(ipv4_hash_table, &addr);
2719 g_strlcpy(tp->name, name, MAXNAMELEN);
2723 key = (int *)g_new(int, 1);
2725 tp = new_ipv4(addr);
2726 g_strlcpy(tp->name, name, MAXNAMELEN);
2727 g_hash_table_insert(ipv4_hash_table, key, tp);
2730 g_strlcpy(tp->name, name, MAXNAMELEN);
2731 tp->flags = tp->flags | TRIED_RESOLVE_ADDRESS;
2732 new_resolved_objects = TRUE;
2734 } /* add_ipv4_name */
2736 /* -------------------------- */
2738 add_ipv6_name(const struct e_in6_addr *addrp, const gchar *name)
2743 * Don't add zero-length names; apparently, some resolvers will return
2744 * them if they get them from DNS.
2746 if (name[0] == '\0')
2749 tp = (hashipv6_t *)g_hash_table_lookup(ipv6_hash_table, addrp);
2751 g_strlcpy(tp->name, name, MAXNAMELEN);
2753 struct e_in6_addr *addr_key;
2755 addr_key = g_new(struct e_in6_addr,1);
2756 tp = new_ipv6(addrp);
2757 memcpy(addr_key, addrp, 16);
2758 g_strlcpy(tp->name, name, MAXNAMELEN);
2759 g_hash_table_insert(ipv6_hash_table, addr_key, tp);
2762 g_strlcpy(tp->name, name, MAXNAMELEN);
2763 tp->flags = tp->flags | TRIED_RESOLVE_ADDRESS;
2764 new_resolved_objects = TRUE;
2766 } /* add_ipv6_name */
2769 add_manually_resolved_ipv4(gpointer data, gpointer user_data _U_)
2771 resolved_ipv4_t *resolved_ipv4_entry = (resolved_ipv4_t *)data;
2773 add_ipv4_name(resolved_ipv4_entry->host_addr, resolved_ipv4_entry->name);
2777 add_manually_resolved_ipv6(gpointer data, gpointer user_data _U_)
2779 resolved_ipv6_t *resolved_ipv6_entry = (resolved_ipv6_t *)data;
2781 add_ipv6_name(&(resolved_ipv6_entry->ip6_addr), resolved_ipv6_entry->name);
2785 add_manually_resolved(void)
2787 if(manually_resolved_ipv4_list){
2788 g_slist_foreach(manually_resolved_ipv4_list, add_manually_resolved_ipv4, NULL);
2791 if(manually_resolved_ipv6_list){
2792 g_slist_foreach(manually_resolved_ipv6_list, add_manually_resolved_ipv6, NULL);
2797 host_name_lookup_init(void)
2802 #ifdef HAVE_GNU_ADNS
2805 static char rootpath_nt[] = "\\system32\\drivers\\etc\\hosts";
2806 static char rootpath_ot[] = "\\hosts";
2808 #endif /*GNU_ADNS */
2810 g_assert(ipxnet_hash_table == NULL);
2811 ipxnet_hash_table = g_hash_table_new_full(g_int_hash, g_int_equal, g_free, g_free);
2813 g_assert(ipv4_hash_table == NULL);
2814 ipv4_hash_table = g_hash_table_new_full(g_int_hash, g_int_equal, g_free, g_free);
2816 g_assert(ipv6_hash_table == NULL);
2817 ipv6_hash_table = g_hash_table_new_full(ipv6_oat_hash, ipv6_equal, g_free, g_free);
2820 * Load the global hosts file, if we have one.
2822 if(!gbl_resolv_flags.load_hosts_file_from_profile_only){
2823 hostspath = get_datafile_path(ENAME_HOSTS);
2824 if (!read_hosts_file(hostspath) && errno != ENOENT) {
2825 report_open_failure(hostspath, errno, FALSE);
2830 * Load the user's hosts file no matter what, if they have one.
2832 hostspath = get_persconffile_path(ENAME_HOSTS, TRUE);
2833 if (!read_hosts_file(hostspath) && errno != ENOENT) {
2834 report_open_failure(hostspath, errno, FALSE);
2838 #ifdef CARES_HAVE_ARES_LIBRARY_INIT
2839 if (ares_library_init(ARES_LIB_INIT_ALL) == ARES_SUCCESS) {
2841 if (ares_init(&ghba_chan) == ARES_SUCCESS && ares_init(&ghbn_chan) == ARES_SUCCESS) {
2842 async_dns_initialized = TRUE;
2844 #ifdef CARES_HAVE_ARES_LIBRARY_INIT
2848 #ifdef HAVE_GNU_ADNS
2850 * We're using GNU ADNS, which doesn't check the system hosts file;
2851 * we load that file ourselves.
2855 sysroot = getenv_utf8("WINDIR");
2856 if (sysroot != NULL) {
2858 * The file should be under WINDIR.
2859 * If this is Windows NT (NT 4.0,2K,XP,Server2K3), it's in
2860 * %WINDIR%\system32\drivers\etc\hosts.
2861 * If this is Windows OT (95,98,Me), it's in %WINDIR%\hosts.
2863 * XXX - should we base it on the dwPlatformId value from
2866 if(!gbl_resolv_flags.load_hosts_file_from_profile_only){
2867 hostspath = g_strconcat(sysroot, rootpath_nt, NULL);
2868 if (!read_hosts_file(hostspath)) {
2870 hostspath = g_strconcat(sysroot, rootpath_ot, NULL);
2871 read_hosts_file(hostspath);
2877 if(!gbl_resolv_flags.load_hosts_file_from_profile_only){
2878 read_hosts_file("/etc/hosts");
2882 /* XXX - Any flags we should be using? */
2883 /* XXX - We could provide config settings for DNS servers, and
2884 pass them to ADNS with adns_init_strcfg */
2885 if (adns_init(&ads, adns_if_none, 0 /*0=>stderr*/) != 0) {
2887 * XXX - should we report the error? I'm assuming that some crashes
2888 * reported on a Windows machine with TCP/IP not configured are due
2889 * to "adns_init()" failing (due to the lack of TCP/IP) and leaving
2890 * ADNS in a state where it crashes due to that. We'll still try
2891 * doing name resolution anyway.
2895 async_dns_initialized = TRUE;
2896 async_dns_in_flight = 0;
2897 #endif /* HAVE_GNU_ADNS */
2898 #endif /* HAVE_C_ARES */
2900 if(extra_hosts_files && !gbl_resolv_flags.load_hosts_file_from_profile_only){
2901 for (i = 0; i < extra_hosts_files->len; i++) {
2902 read_hosts_file((const char *) g_ptr_array_index(extra_hosts_files, i));
2906 subnet_name_lookup_init();
2908 add_manually_resolved();
2912 host_name_lookup_cleanup(void)
2914 _host_name_lookup_cleanup();
2916 if(ipxnet_hash_table){
2917 g_hash_table_destroy(ipxnet_hash_table);
2918 ipxnet_hash_table = NULL;
2921 if(ipv4_hash_table){
2922 g_hash_table_destroy(ipv4_hash_table);
2923 ipv4_hash_table = NULL;
2926 if(ipv6_hash_table){
2927 g_hash_table_destroy(ipv6_hash_table);
2928 ipv6_hash_table = NULL;
2931 memset(subnet_length_entries, 0, sizeof(subnet_length_entries));
2933 have_subnet_entry = FALSE;
2934 new_resolved_objects = FALSE;
2938 free_manually_resolved_ipv4(gpointer data, gpointer user_data _U_)
2940 resolved_ipv4_t *resolved_ipv4_entry = (resolved_ipv4_t *)data;
2942 g_free(resolved_ipv4_entry);
2947 free_manually_resolved_ipv6(gpointer data, gpointer user_data _U_)
2949 resolved_ipv6_t *resolved_ipv6_entry = (resolved_ipv6_t *)data;
2951 g_free(resolved_ipv6_entry);
2956 manually_resolve_cleanup(void)
2958 if(manually_resolved_ipv4_list){
2959 g_slist_foreach(manually_resolved_ipv4_list, free_manually_resolved_ipv4, NULL);
2960 g_slist_free(manually_resolved_ipv4_list);
2961 manually_resolved_ipv4_list = NULL;
2964 if(manually_resolved_ipv6_list){
2965 g_slist_foreach(manually_resolved_ipv6_list, free_manually_resolved_ipv6, NULL);
2966 g_slist_free(manually_resolved_ipv6_list);
2967 manually_resolved_ipv6_list = NULL;
2973 get_udp_port(guint port)
2976 if (!gbl_resolv_flags.transport_name) {
2977 return ep_utoa(port);
2980 return serv_name_lookup(port, PT_UDP);
2982 } /* get_udp_port */
2985 get_dccp_port(guint port)
2988 if (!gbl_resolv_flags.transport_name) {
2989 return ep_utoa(port);
2992 return serv_name_lookup(port, PT_DCCP);
2994 } /* get_dccp_port */
2997 get_tcp_port(guint port)
3000 if (!gbl_resolv_flags.transport_name) {
3001 return ep_utoa(port);
3004 return serv_name_lookup(port, PT_TCP);
3006 } /* get_tcp_port */
3009 get_sctp_port(guint port)
3012 if (!gbl_resolv_flags.transport_name) {
3013 return ep_utoa(port);
3016 return serv_name_lookup(port, PT_SCTP);
3018 } /* get_sctp_port */
3021 get_addr_name(const address *addr)
3023 const gchar *result;
3025 result = solve_address_to_name(addr);
3030 /* if it gets here, either it is of type AT_NONE, */
3031 /* or it should be solvable in address_to_str -unless addr->type is wrongly defined */
3033 if (addr->type == AT_NONE){
3037 /* We need an ephemeral allocated string */
3038 return ep_address_to_str(addr);
3042 se_get_addr_name(const address *addr)
3044 const gchar *result;
3046 result = se_solve_address_to_name(addr);
3051 /* if it gets here, either it is of type AT_NONE, */
3052 /* or it should be solvable in se_address_to_str -unless addr->type is wrongly defined */
3054 if (addr->type == AT_NONE){
3058 /* We need a "permanently" allocated string */
3059 return se_address_to_str(addr);
3063 get_addr_name_buf(const address *addr, gchar *buf, gsize size)
3065 const gchar *result = get_addr_name(addr);
3067 g_strlcpy(buf, result, size);
3068 } /* get_addr_name_buf */
3072 get_ether_name(const guint8 *addr)
3075 gboolean resolve = gbl_resolv_flags.mac_name;
3077 tp = eth_name_lookup(addr, resolve);
3079 return resolve ? tp->resolved_name : tp->hexaddr;
3081 } /* get_ether_name */
3083 /* Look for a (non-dummy) ether name in the hash, and return it if found.
3084 * If it's not found, simply return NULL.
3087 get_ether_name_if_known(const guint8 *addr)
3091 /* Initialize ether structs if we're the first
3092 * ether-related function called */
3093 if (!gbl_resolv_flags.mac_name)
3096 /* eth_name_lookup will create a (resolved) hash entry if it doesn't exist */
3097 tp = eth_name_lookup(addr, TRUE);
3098 g_assert(tp != NULL);
3100 if (tp->status == HASHETHER_STATUS_RESOLVED_NAME) {
3101 /* Name is from an ethers file (or is a "well-known" MAC address name from the manuf file) */
3102 return tp->resolved_name;
3105 /* Name was created */
3111 get_ether_addr(const gchar *name)
3114 /* force resolution (do not check gbl_resolv_flags) */
3115 return eth_addr_lookup(name);
3117 } /* get_ether_addr */
3120 add_ether_byip(const guint ip, const guint8 *eth)
3125 /* first check that IP address can be resolved */
3126 if (!gbl_resolv_flags.network_name)
3129 tp = host_lookup(ip, &found);
3131 /* ok, we can add this entry in the ethers hashtable */
3132 add_eth_name(eth, tp->name);
3135 } /* add_ether_byip */
3138 get_ipxnet_name(const guint32 addr)
3141 if (!gbl_resolv_flags.network_name) {
3142 return ipxnet_to_str_punct(addr, '\0');
3145 return ipxnet_name_lookup(addr);
3147 } /* get_ipxnet_name */
3150 get_ipxnet_addr(const gchar *name, gboolean *known)
3155 /* force resolution (do not check gbl_resolv_flags) */
3156 addr = ipxnet_addr_lookup(name, &success);
3161 } /* get_ipxnet_addr */
3164 get_manuf_name(const guint8 *addr)
3170 /* manuf needs only the 3 most significant octets of the ethernet address */
3171 manuf_key = addr[0];
3172 manuf_key = manuf_key<<8;
3174 manuf_key = manuf_key | oct;
3175 manuf_key = manuf_key<<8;
3177 manuf_key = manuf_key | oct;
3179 if (!gbl_resolv_flags.mac_name || ((cur = (gchar *)g_hash_table_lookup(manuf_hashtable, &manuf_key)) == NULL)) {
3180 cur=ep_strdup_printf("%02x:%02x:%02x", addr[0], addr[1], addr[2]);
3186 } /* get_manuf_name */
3189 uint_get_manuf_name(const guint oid)
3193 addr[0] = (oid >> 16) & 0xFF;
3194 addr[1] = (oid >> 8) & 0xFF;
3195 addr[2] = (oid >> 0) & 0xFF;
3196 return get_manuf_name(addr);
3200 tvb_get_manuf_name(tvbuff_t *tvb, gint offset)
3202 return get_manuf_name(tvb_get_ptr(tvb, offset, 3));
3206 get_manuf_name_if_known(const guint8 *addr)
3212 /* manuf needs only the 3 most significant octets of the ethernet address */
3213 manuf_key = addr[0];
3214 manuf_key = manuf_key<<8;
3216 manuf_key = manuf_key | oct;
3217 manuf_key = manuf_key<<8;
3219 manuf_key = manuf_key | oct;
3221 if ((cur = (gchar *)g_hash_table_lookup(manuf_hashtable, &manuf_key)) == NULL) {
3227 } /* get_manuf_name_if_known */
3230 uint_get_manuf_name_if_known(const guint manuf_key)
3234 if ((cur = (gchar *)g_hash_table_lookup(manuf_hashtable, &manuf_key)) == NULL) {
3242 tvb_get_manuf_name_if_known(tvbuff_t *tvb, gint offset)
3244 return get_manuf_name_if_known(tvb_get_ptr(tvb, offset, 3));
3248 get_eui64_name(const guint64 addr_eui64)
3251 guint8 *addr = (guint8 *)ep_alloc(8);
3253 /* Copy and convert the address to network byte order. */
3254 *(guint64 *)(void *)(addr) = pntoh64(&(addr_eui64));
3256 if (!gbl_resolv_flags.mac_name || ((name = manuf_name_lookup(addr)) == NULL)) {
3257 cur=ep_strdup_printf("%02x:%02x:%02x%02x:%02x:%02x%02x:%02x", addr[0], addr[1], addr[2], addr[3], addr[4], addr[5], addr[6], addr[7]);
3260 cur=ep_strdup_printf("%s_%02x:%02x:%02x:%02x:%02x", name, addr[3], addr[4], addr[5], addr[6], addr[7]);
3263 } /* get_eui64_name */
3267 get_eui64_name_if_known(const guint64 addr_eui64)
3270 guint8 *addr = (guint8 *)ep_alloc(8);
3272 /* Copy and convert the address to network byte order. */
3273 *(guint64 *)(void *)(addr) = pntoh64(&(addr_eui64));
3275 if ((name = manuf_name_lookup(addr)) == NULL) {
3279 cur=ep_strdup_printf("%s_%02x:%02x:%02x:%02x:%02x", name, addr[3], addr[4], addr[5], addr[6], addr[7]);
3282 } /* get_eui64_name_if_known */
3285 #define GHI_TIMEOUT (250 * 1000)
3290 #if ( ( ARES_VERSION_MAJOR < 1 ) \
3291 || ( 1 == ARES_VERSION_MAJOR && ARES_VERSION_MINOR < 5 ) )
3300 * XXX - If we wanted to be really fancy we could cache results here and
3301 * look them up in get_host_ipaddr* below.
3303 async_hostent_t *ahp = (async_hostent_t *)arg;
3304 if (status == ARES_SUCCESS && hp && ahp && hp->h_length == ahp->addr_size) {
3305 memcpy(ahp->addrp, hp->h_addr, hp->h_length);
3306 ahp->copied = hp->h_length;
3309 #endif /* HAVE_C_ARES */
3311 /* Translate a string, assumed either to be a dotted-quad IP address or
3312 * a host name, to a numeric IP address. Return TRUE if we succeed and
3313 * set "*addrp" to that numeric IP address; return FALSE if we fail.
3314 * Used more in the dfilter parser rather than in packet dissectors */
3316 get_host_ipaddr(const char *host, guint32 *addrp)
3318 struct in_addr ipaddr;
3320 struct timeval tv = { 0, GHI_TIMEOUT }, *tvp;
3323 async_hostent_t ahe;
3324 #else /* HAVE_C_ARES */
3326 #endif /* HAVE_C_ARES */
3329 * don't change it to inet_pton(AF_INET), they are not 100% compatible.
3330 * inet_pton(AF_INET) does not support hexadecimal notation nor
3331 * less-than-4 octet notation.
3333 if (!inet_aton(host, &ipaddr)) {
3335 /* It's not a valid dotted-quad IP address; is it a valid
3339 /* If we're not allowed to do name resolution, don't do name
3342 if (!gbl_resolv_flags.network_name ||
3343 !gbl_resolv_flags.use_external_net_name_resolver) {
3348 if (! (gbl_resolv_flags.concurrent_dns) ||
3349 name_resolve_concurrency < 1 ||
3350 ! async_dns_initialized) {
3353 ahe.addr_size = (int) sizeof (struct in_addr);
3356 ares_gethostbyname(ghbn_chan, host, AF_INET, c_ares_ghi_cb, &ahe);
3359 nfds = ares_fds(ghbn_chan, &rfds, &wfds);
3361 tvp = ares_timeout(ghbn_chan, &tv, &tv);
3362 if (select(nfds, &rfds, &wfds, NULL, tvp) == -1) { /* call to select() failed */
3363 fprintf(stderr, "Warning: call to select() failed, error is %s\n", strerror(errno));
3366 ares_process(ghbn_chan, &rfds, &wfds);
3368 ares_cancel(ghbn_chan);
3369 if (ahe.addr_size == ahe.copied) {
3373 #else /* ! HAVE_C_ARES */
3374 hp = gethostbyname(host);
3378 /* Apparently, some versions of gethostbyaddr can
3379 * return IPv6 addresses. */
3380 } else if (hp->h_length <= (int) sizeof (struct in_addr)) {
3381 memcpy(&ipaddr, hp->h_addr, hp->h_length);
3385 #endif /* HAVE_C_ARES */
3387 /* Does the string really contain dotted-quad IP?
3388 * Check against inet_atons that accept strings such as
3389 * "130.230" as valid addresses and try to convert them
3390 * to some form of a classful (host.net) notation.
3392 unsigned int a0, a1, a2, a3;
3393 if (sscanf(host, "%u.%u.%u.%u", &a0, &a1, &a2, &a3) != 4)
3397 *addrp = ipaddr.s_addr;
3402 * Translate IPv6 numeric address or FQDN hostname, into binary IPv6 address.
3403 * Return TRUE if we succeed and set "*addrp" to that numeric IP address;
3404 * return FALSE if we fail.
3407 get_host_ipaddr6(const char *host, struct e_in6_addr *addrp)
3410 struct timeval tv = { 0, GHI_TIMEOUT }, *tvp;
3413 async_hostent_t ahe;
3414 #elif defined(HAVE_GETHOSTBYNAME2)
3416 #endif /* HAVE_C_ARES */
3418 if (str_to_ip6(host, addrp))
3421 /* It's not a valid dotted-quad IP address; is it a valid
3425 /* If we're not allowed to do name resolution, don't do name
3428 if (!gbl_resolv_flags.network_name ||
3429 !gbl_resolv_flags.use_external_net_name_resolver) {
3435 if (! (gbl_resolv_flags.concurrent_dns) ||
3436 name_resolve_concurrency < 1 ||
3437 ! async_dns_initialized) {
3440 ahe.addr_size = (int) sizeof (struct e_in6_addr);
3443 ares_gethostbyname(ghbn_chan, host, AF_INET6, c_ares_ghi_cb, &ahe);
3446 nfds = ares_fds(ghbn_chan, &rfds, &wfds);
3448 tvp = ares_timeout(ghbn_chan, &tv, &tv);
3449 if (select(nfds, &rfds, &wfds, NULL, tvp) == -1) { /* call to select() failed */
3450 fprintf(stderr, "Warning: call to select() failed, error is %s\n", strerror(errno));
3453 ares_process(ghbn_chan, &rfds, &wfds);
3455 ares_cancel(ghbn_chan);
3456 if (ahe.addr_size == ahe.copied) {
3459 #elif defined(HAVE_GETHOSTBYNAME2)
3460 hp = gethostbyname2(host, AF_INET6);
3461 if (hp != NULL && hp->h_length == sizeof(struct e_in6_addr)) {
3462 memcpy(addrp, hp->h_addr, hp->h_length);
3471 * Find out whether a hostname resolves to an ip or ipv6 address
3472 * Return "ip6" if it is IPv6, "ip" otherwise (including the case
3473 * that we don't know)
3475 const char* host_ip_af(const char *host
3476 #ifndef HAVE_GETHOSTBYNAME2
3481 #ifdef HAVE_GETHOSTBYNAME2
3483 return (h = gethostbyname2(host, AF_INET6)) && h->h_addrtype == AF_INET6 ? "ip6" : "ip";
3490 get_manuf_hashtable(void)
3492 return manuf_hashtable;
3496 get_wka_hashtable(void)
3498 return wka_hashtable;
3502 get_eth_hashtable(void)
3504 return eth_hashtable;
3508 get_serv_port_hashtable(void)
3510 return serv_port_hashtable;
3514 get_ipxnet_hash_table(void)
3516 return ipxnet_hash_table;
3520 get_ipv4_hash_table(void)
3522 return ipv4_hash_table;
3526 get_ipv6_hash_table(void)
3528 return ipv6_hash_table;
3530 /* Initialize all the address resolution subsystems in this file */
3532 addr_resolv_init(void)
3534 initialize_services();
3535 initialize_ethers();
3536 initialize_ipxnets();
3537 /* host name initialization is done on a per-capture-file basis */
3538 /*host_name_lookup_init();*/
3541 /* Clean up all the address resolution subsystems in this file */
3543 addr_resolv_cleanup(void)
3545 service_name_lookup_cleanup();
3546 eth_name_lookup_cleanup();
3547 ipx_name_lookup_cleanup();
3548 /* host name initialization is done on a per-capture-file basis */
3549 /*host_name_lookup_cleanup();*/
3553 str_to_ip(const char *str, void *dst)
3555 return inet_pton(AF_INET, str, dst) > 0;
3559 str_to_ip6(const char *str, void *dst)
3561 return inet_pton(AF_INET6, str, dst) > 0;
3565 * Editor modelines - http://www.wireshark.org/tools/modelines.html
3570 * indent-tabs-mode: nil
3573 * vi: set shiftwidth=4 tabstop=8 expandtab:
3574 * :indentSize=4:tabSize=8:noTabs=true: