2 * Copyright (c) 1993, 1994, 1995, 1996, 1997
3 * The Regents of the University of California. All rights reserved.
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that: (1) source code distributions
7 * retain the above copyright notice and this paragraph in its entirety, (2)
8 * distributions including binary code include the above copyright notice and
9 * this paragraph in its entirety in the documentation or other materials
10 * provided with the distribution, and (3) all advertising materials mentioning
11 * features or use of this software display the following acknowledgement:
12 * ``This product includes software developed by the University of California,
13 * Lawrence Berkeley Laboratory and its contributors.'' Neither the name of
14 * the University nor the names of its contributors may be used to endorse
15 * or promote products derived from this software without specific prior
17 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED
18 * WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF
19 * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
21 * sf-pcap.c - libpcap-file-format-specific code from savefile.c
22 * Extraction/creation by Jeffrey Mogul, DECWRL
23 * Modified by Steve McCanne, LBL.
25 * Used to save the received packet headers, after filtering, to
26 * a file, and then read them later.
27 * The first record in the file contains saved values for the machine
28 * dependent values so we can print the dump file on any architecture.
35 #include <pcap-types.h>
46 #include <limits.h> /* for INT_MAX */
50 #include "pcap-common.h"
52 #ifdef HAVE_OS_PROTO_H
59 * Setting O_BINARY on DOS/Windows is a bit tricky
62 #define SET_BINMODE(f) _setmode(_fileno(f), _O_BINARY)
64 #if defined(__HIGHC__)
65 #define SET_BINMODE(f) setmode(f, O_BINARY)
67 #define SET_BINMODE(f) setmode(fileno(f), O_BINARY)
72 * Standard libpcap format.
74 #define TCPDUMP_MAGIC 0xa1b2c3d4
77 * Alexey Kuznetzov's modified libpcap format.
79 #define KUZNETZOV_TCPDUMP_MAGIC 0xa1b2cd34
82 * Reserved for Francisco Mesquita <francisco.mesquita@radiomovel.pt>
83 * for another modified format.
85 #define FMESQUITA_TCPDUMP_MAGIC 0xa1b234cd
88 * Navtel Communcations' format, with nanosecond timestamps,
89 * as per a request from Dumas Hwang <dumas.hwang@navtelcom.com>.
91 #define NAVTEL_TCPDUMP_MAGIC 0xa12b3c4d
94 * Normal libpcap format, except for seconds/nanoseconds timestamps,
95 * as per a request by Ulf Lamping <ulf.lamping@web.de>
97 #define NSEC_TCPDUMP_MAGIC 0xa1b23c4d
100 * Mechanism for storing information about a capture in the upper
101 * 6 bits of a linktype value in a capture file.
103 * LT_LINKTYPE_EXT(x) extracts the additional information.
105 * The rest of the bits are for a value describing the link-layer
106 * value. LT_LINKTYPE(x) extracts that value.
108 #define LT_LINKTYPE(x) ((x) & 0x03FFFFFF)
109 #define LT_LINKTYPE_EXT(x) ((x) & 0xFC000000)
111 static int pcap_next_packet(pcap_t *p, struct pcap_pkthdr *hdr, u_char **datap);
115 * This isn't exported on Windows, because it would only work if both
116 * libpcap and the code using it were using the same C runtime; otherwise they
117 * would be using different definitions of a FILE structure.
119 * Instead we define this as a macro in pcap/pcap.h that wraps the hopen
120 * version that we do export, passing it a raw OS HANDLE, as defined by the
121 * Win32 / Win64 ABI, obtained from the _fileno() and _get_osfhandle()
122 * functions of the appropriate CRT.
124 static pcap_dumper_t *pcap_dump_fopen(pcap_t *p, FILE *f);
128 * Private data for reading pcap savefiles.
140 } tstamp_scale_type_t;
144 swapped_type_t lengths_swapped;
145 tstamp_scale_type_t scale_type;
149 * Check whether this is a pcap savefile and, if it is, extract the
150 * relevant information from the header.
153 pcap_check_header(const uint8_t *magic, FILE *fp, u_int precision, char *errbuf,
156 bpf_u_int32 magic_int;
157 struct pcap_file_header hdr;
164 * Assume no read errors.
169 * Check whether the first 4 bytes of the file are the magic
170 * number for a pcap savefile, or for a byte-swapped pcap
173 memcpy(&magic_int, magic, sizeof(magic_int));
174 if (magic_int != TCPDUMP_MAGIC &&
175 magic_int != KUZNETZOV_TCPDUMP_MAGIC &&
176 magic_int != NSEC_TCPDUMP_MAGIC) {
177 magic_int = SWAPLONG(magic_int);
178 if (magic_int != TCPDUMP_MAGIC &&
179 magic_int != KUZNETZOV_TCPDUMP_MAGIC &&
180 magic_int != NSEC_TCPDUMP_MAGIC)
181 return (NULL); /* nope */
186 * They are. Put the magic number in the header, and read
187 * the rest of the header.
189 hdr.magic = magic_int;
190 amt_read = fread(((char *)&hdr) + sizeof hdr.magic, 1,
191 sizeof(hdr) - sizeof(hdr.magic), fp);
192 if (amt_read != sizeof(hdr) - sizeof(hdr.magic)) {
194 pcap_fmt_errmsg_for_errno(errbuf, PCAP_ERRBUF_SIZE,
195 errno, "error reading dump file");
197 snprintf(errbuf, PCAP_ERRBUF_SIZE,
198 "truncated dump file; tried to read %zu file header bytes, only got %zu",
199 sizeof(hdr), amt_read);
206 * If it's a byte-swapped capture file, byte-swap the header.
209 hdr.version_major = SWAPSHORT(hdr.version_major);
210 hdr.version_minor = SWAPSHORT(hdr.version_minor);
211 hdr.thiszone = SWAPLONG(hdr.thiszone);
212 hdr.sigfigs = SWAPLONG(hdr.sigfigs);
213 hdr.snaplen = SWAPLONG(hdr.snaplen);
214 hdr.linktype = SWAPLONG(hdr.linktype);
217 if (hdr.version_major < PCAP_VERSION_MAJOR) {
218 snprintf(errbuf, PCAP_ERRBUF_SIZE,
219 "archaic pcap savefile format");
225 * currently only versions 2.[0-4] are supported with
226 * the exception of 543.0 for DG/UX tcpdump.
228 if (! ((hdr.version_major == PCAP_VERSION_MAJOR &&
229 hdr.version_minor <= PCAP_VERSION_MINOR) ||
230 (hdr.version_major == 543 &&
231 hdr.version_minor == 0))) {
232 snprintf(errbuf, PCAP_ERRBUF_SIZE,
233 "unsupported pcap savefile version %u.%u",
234 hdr.version_major, hdr.version_minor);
240 * OK, this is a good pcap file.
241 * Allocate a pcap_t for it.
243 p = PCAP_OPEN_OFFLINE_COMMON(errbuf, struct pcap_sf);
245 /* Allocation failed. */
249 p->swapped = swapped;
250 p->version_major = hdr.version_major;
251 p->version_minor = hdr.version_minor;
252 p->linktype = linktype_to_dlt(LT_LINKTYPE(hdr.linktype));
253 p->linktype_ext = LT_LINKTYPE_EXT(hdr.linktype);
254 p->snapshot = pcap_adjust_snapshot(p->linktype, hdr.snaplen);
256 p->next_packet_op = pcap_next_packet;
260 p->opt.tstamp_precision = precision;
263 * Will we need to scale the timestamps to match what the
268 case PCAP_TSTAMP_PRECISION_MICRO:
269 if (magic_int == NSEC_TCPDUMP_MAGIC) {
271 * The file has nanoseconds, the user
272 * wants microseconds; scale the
275 ps->scale_type = SCALE_DOWN;
278 * The file has microseconds, the
279 * user wants microseconds; nothing to do.
281 ps->scale_type = PASS_THROUGH;
285 case PCAP_TSTAMP_PRECISION_NANO:
286 if (magic_int == NSEC_TCPDUMP_MAGIC) {
288 * The file has nanoseconds, the
289 * user wants nanoseconds; nothing to do.
291 ps->scale_type = PASS_THROUGH;
294 * The file has microseconds, the user
295 * wants nanoseconds; scale the
298 ps->scale_type = SCALE_UP;
303 snprintf(errbuf, PCAP_ERRBUF_SIZE,
304 "unknown time stamp resolution %u", precision);
311 * We interchanged the caplen and len fields at version 2.3,
312 * in order to match the bpf header layout. But unfortunately
313 * some files were written with version 2.3 in their headers
314 * but without the interchanged fields.
316 * In addition, DG/UX tcpdump writes out files with a version
317 * number of 543.0, and with the caplen and len fields in the
320 switch (hdr.version_major) {
323 if (hdr.version_minor < 3)
324 ps->lengths_swapped = SWAPPED;
325 else if (hdr.version_minor == 3)
326 ps->lengths_swapped = MAYBE_SWAPPED;
328 ps->lengths_swapped = NOT_SWAPPED;
332 ps->lengths_swapped = SWAPPED;
336 ps->lengths_swapped = NOT_SWAPPED;
340 if (magic_int == KUZNETZOV_TCPDUMP_MAGIC) {
342 * XXX - the patch that's in some versions of libpcap
343 * changes the packet header but not the magic number,
344 * and some other versions with this magic number have
345 * some extra debugging information in the packet header;
346 * we'd have to use some hacks^H^H^H^H^Hheuristics to
347 * detect those variants.
349 * Ethereal does that, but it does so by trying to read
350 * the first two packets of the file with each of the
351 * record header formats. That currently means it seeks
352 * backwards and retries the reads, which doesn't work
353 * on pipes. We want to be able to read from a pipe, so
354 * that strategy won't work; we'd have to buffer some
355 * data ourselves and read from that buffer in order to
358 ps->hdrsize = sizeof(struct pcap_sf_patched_pkthdr);
360 if (p->linktype == DLT_EN10MB) {
362 * This capture might have been done in raw mode
365 * If it was done in cooked mode, p->snapshot was
366 * passed to recvfrom() as the buffer size, meaning
367 * that the most packet data that would be copied
368 * would be p->snapshot. However, a faked Ethernet
369 * header would then have been added to it, so the
370 * most data that would be in a packet in the file
371 * would be p->snapshot + 14.
373 * We can't easily tell whether the capture was done
374 * in raw mode or cooked mode, so we'll assume it was
375 * cooked mode, and add 14 to the snapshot length.
376 * That means that, for a raw capture, the snapshot
377 * length will be misleading if you use it to figure
378 * out why a capture doesn't have all the packet data,
379 * but there's not much we can do to avoid that.
381 * But don't grow the snapshot length past the
382 * maximum value of an int.
384 if (p->snapshot <= INT_MAX - 14)
387 p->snapshot = INT_MAX;
390 ps->hdrsize = sizeof(struct pcap_sf_pkthdr);
393 * Allocate a buffer for the packet data.
394 * Choose the minimum of the file's snapshot length and 2K bytes;
395 * that should be enough for most network packets - we'll grow it
396 * if necessary. That way, we don't allocate a huge chunk of
397 * memory just because there's a huge snapshot length, as the
398 * snapshot length might be larger than the size of the largest
401 p->bufsize = p->snapshot;
402 if (p->bufsize > 2048)
404 p->buffer = malloc(p->bufsize);
405 if (p->buffer == NULL) {
406 snprintf(errbuf, PCAP_ERRBUF_SIZE, "out of memory");
412 p->cleanup_op = sf_cleanup;
418 * Grow the packet buffer to the specified size.
421 grow_buffer(pcap_t *p, u_int bufsize)
425 bigger_buffer = realloc(p->buffer, bufsize);
426 if (bigger_buffer == NULL) {
427 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, "out of memory");
430 p->buffer = bigger_buffer;
431 p->bufsize = bufsize;
436 * Read and return the next packet from the savefile. Return the header
437 * in hdr and a pointer to the contents in data. Return 0 on success, 1
438 * if there were no more packets, and -1 on an error.
441 pcap_next_packet(pcap_t *p, struct pcap_pkthdr *hdr, u_char **data)
443 struct pcap_sf *ps = p->priv;
444 struct pcap_sf_patched_pkthdr sf_hdr;
450 * Read the packet header; the structure we use as a buffer
451 * is the longer structure for files generated by the patched
452 * libpcap, but if the file has the magic number for an
453 * unpatched libpcap we only read as many bytes as the regular
456 amt_read = fread(&sf_hdr, 1, ps->hdrsize, fp);
457 if (amt_read != ps->hdrsize) {
459 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE,
460 errno, "error reading dump file");
464 snprintf(p->errbuf, PCAP_ERRBUF_SIZE,
465 "truncated dump file; tried to read %zu header bytes, only got %zu",
466 ps->hdrsize, amt_read);
475 /* these were written in opposite byte order */
476 hdr->caplen = SWAPLONG(sf_hdr.caplen);
477 hdr->len = SWAPLONG(sf_hdr.len);
478 hdr->ts.tv_sec = SWAPLONG(sf_hdr.ts.tv_sec);
479 hdr->ts.tv_usec = SWAPLONG(sf_hdr.ts.tv_usec);
481 hdr->caplen = sf_hdr.caplen;
482 hdr->len = sf_hdr.len;
483 hdr->ts.tv_sec = sf_hdr.ts.tv_sec;
484 hdr->ts.tv_usec = sf_hdr.ts.tv_usec;
487 switch (ps->scale_type) {
491 * Just pass the time stamp through.
497 * File has microseconds, user wants nanoseconds; convert
500 hdr->ts.tv_usec = hdr->ts.tv_usec * 1000;
505 * File has nanoseconds, user wants microseconds; convert
508 hdr->ts.tv_usec = hdr->ts.tv_usec / 1000;
512 /* Swap the caplen and len fields, if necessary. */
513 switch (ps->lengths_swapped) {
519 if (hdr->caplen <= hdr->len) {
521 * The captured length is <= the actual length,
522 * so presumably they weren't swapped.
530 hdr->caplen = hdr->len;
536 * Is the packet bigger than we consider sane?
538 if (hdr->caplen > max_snaplen_for_dlt(p->linktype)) {
540 * Yes. This may be a damaged or fuzzed file.
542 * Is it bigger than the snapshot length?
543 * (We don't treat that as an error if it's not
544 * bigger than the maximum we consider sane; see
547 if (hdr->caplen > (bpf_u_int32)p->snapshot) {
548 snprintf(p->errbuf, PCAP_ERRBUF_SIZE,
549 "invalid packet capture length %u, bigger than "
550 "snaplen of %d", hdr->caplen, p->snapshot);
552 snprintf(p->errbuf, PCAP_ERRBUF_SIZE,
553 "invalid packet capture length %u, bigger than "
554 "maximum of %u", hdr->caplen,
555 max_snaplen_for_dlt(p->linktype));
560 if (hdr->caplen > (bpf_u_int32)p->snapshot) {
562 * The packet is bigger than the snapshot length
565 * This can happen due to Solaris 2.3 systems tripping
566 * over the BUFMOD problem and not setting the snapshot
567 * length correctly in the savefile header.
569 * libpcap 0.4 and later on Solaris 2.3 should set the
570 * snapshot length correctly in the pcap file header,
571 * even though they don't set a snapshot length in bufmod
572 * (the buggy bufmod chops off the *beginning* of the
573 * packet if a snapshot length is specified); they should
574 * also reduce the captured length, as supplied to the
575 * per-packet callback, to the snapshot length if it's
576 * greater than the snapshot length, so the code using
577 * libpcap should see the packet cut off at the snapshot
578 * length, even though the full packet is copied up to
581 * However, perhaps some versions of libpcap failed to
582 * set the snapshot length currectly in the file header
583 * or the per-packet header, or perhaps this is a
584 * corrupted safefile or a savefile built/modified by a
585 * fuzz tester, so we check anyway. We grow the buffer
586 * to be big enough for the snapshot length, read up
587 * to the snapshot length, discard the rest of the
588 * packet, and report the snapshot length as the captured
589 * length; we don't want to hand our caller a packet
590 * bigger than the snapshot length, because they might
591 * be assuming they'll never be handed such a packet,
592 * and might copy the packet into a snapshot-length-
593 * sized buffer, assuming it'll fit.
595 size_t bytes_to_discard;
596 size_t bytes_to_read, bytes_read;
597 char discard_buf[4096];
599 if (hdr->caplen > p->bufsize) {
601 * Grow the buffer to the snapshot length.
603 if (!grow_buffer(p, p->snapshot))
608 * Read the first p->snapshot bytes into the buffer.
610 amt_read = fread(p->buffer, 1, p->snapshot, fp);
611 if (amt_read != (bpf_u_int32)p->snapshot) {
613 pcap_fmt_errmsg_for_errno(p->errbuf,
614 PCAP_ERRBUF_SIZE, errno,
615 "error reading dump file");
618 * Yes, this uses hdr->caplen; technically,
619 * it's true, because we would try to read
620 * and discard the rest of those bytes, and
621 * that would fail because we got EOF before
624 snprintf(p->errbuf, PCAP_ERRBUF_SIZE,
625 "truncated dump file; tried to read %u captured bytes, only got %zu",
626 p->snapshot, amt_read);
632 * Now read and discard what's left.
634 bytes_to_discard = hdr->caplen - p->snapshot;
635 bytes_read = amt_read;
636 while (bytes_to_discard != 0) {
637 bytes_to_read = bytes_to_discard;
638 if (bytes_to_read > sizeof (discard_buf))
639 bytes_to_read = sizeof (discard_buf);
640 amt_read = fread(discard_buf, 1, bytes_to_read, fp);
641 bytes_read += amt_read;
642 if (amt_read != bytes_to_read) {
644 pcap_fmt_errmsg_for_errno(p->errbuf,
645 PCAP_ERRBUF_SIZE, errno,
646 "error reading dump file");
648 snprintf(p->errbuf, PCAP_ERRBUF_SIZE,
649 "truncated dump file; tried to read %u captured bytes, only got %zu",
650 hdr->caplen, bytes_read);
654 bytes_to_discard -= amt_read;
658 * Adjust caplen accordingly, so we don't get confused later
659 * as to how many bytes we have to play with.
661 hdr->caplen = p->snapshot;
664 * The packet is within the snapshot length for this file.
666 if (hdr->caplen > p->bufsize) {
668 * Grow the buffer to the next power of 2, or
669 * the snaplen, whichever is lower.
673 new_bufsize = hdr->caplen;
675 * https://graphics.stanford.edu/~seander/bithacks.html#RoundUpPowerOf2
678 new_bufsize |= new_bufsize >> 1;
679 new_bufsize |= new_bufsize >> 2;
680 new_bufsize |= new_bufsize >> 4;
681 new_bufsize |= new_bufsize >> 8;
682 new_bufsize |= new_bufsize >> 16;
685 if (new_bufsize > (u_int)p->snapshot)
686 new_bufsize = p->snapshot;
688 if (!grow_buffer(p, new_bufsize))
692 /* read the packet itself */
693 amt_read = fread(p->buffer, 1, hdr->caplen, fp);
694 if (amt_read != hdr->caplen) {
696 pcap_fmt_errmsg_for_errno(p->errbuf,
697 PCAP_ERRBUF_SIZE, errno,
698 "error reading dump file");
700 snprintf(p->errbuf, PCAP_ERRBUF_SIZE,
701 "truncated dump file; tried to read %u captured bytes, only got %zu",
702 hdr->caplen, amt_read);
710 swap_pseudo_headers(p->linktype, hdr, *data);
716 sf_write_header(pcap_t *p, FILE *fp, int linktype, int snaplen)
718 struct pcap_file_header hdr;
720 hdr.magic = p->opt.tstamp_precision == PCAP_TSTAMP_PRECISION_NANO ? NSEC_TCPDUMP_MAGIC : TCPDUMP_MAGIC;
721 hdr.version_major = PCAP_VERSION_MAJOR;
722 hdr.version_minor = PCAP_VERSION_MINOR;
725 * https://www.tcpdump.org/manpages/pcap-savefile.5.txt states:
726 * thiszone: 4-byte time zone offset; this is always 0.
727 * sigfigs: 4-byte number giving the accuracy of time stamps
728 * in the file; this is always 0.
732 hdr.snaplen = snaplen;
733 hdr.linktype = linktype;
735 if (fwrite((char *)&hdr, sizeof(hdr), 1, fp) != 1)
742 * Output a packet to the initialized dump file.
745 pcap_dump(u_char *user, const struct pcap_pkthdr *h, const u_char *sp)
748 struct pcap_sf_pkthdr sf_hdr;
752 * Better not try writing pcap files after
753 * 2038-01-19 03:14:07 UTC; switch to pcapng.
755 sf_hdr.ts.tv_sec = (bpf_int32)h->ts.tv_sec;
756 sf_hdr.ts.tv_usec = (bpf_int32)h->ts.tv_usec;
757 sf_hdr.caplen = h->caplen;
759 /* XXX we should check the return status */
760 (void)fwrite(&sf_hdr, sizeof(sf_hdr), 1, f);
761 (void)fwrite(sp, h->caplen, 1, f);
764 static pcap_dumper_t *
765 pcap_setup_dump(pcap_t *p, int linktype, FILE *f, const char *fname)
768 #if defined(_WIN32) || defined(MSDOS)
770 * If we're writing to the standard output, put it in binary
771 * mode, as savefiles are binary files.
773 * Otherwise, we turn off buffering.
774 * XXX - why? And why not on the standard output?
779 setvbuf(f, NULL, _IONBF, 0);
781 if (sf_write_header(p, f, linktype, p->snapshot) == -1) {
782 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE,
783 errno, "Can't write to %s", fname);
788 return ((pcap_dumper_t *)f);
792 * Initialize so that sf_write() will output to the file named 'fname'.
795 pcap_dump_open(pcap_t *p, const char *fname)
801 * If this pcap_t hasn't been activated, it doesn't have a
802 * link-layer type, so we can't use it.
805 snprintf(p->errbuf, PCAP_ERRBUF_SIZE,
806 "%s: not-yet-activated pcap_t passed to pcap_dump_open",
810 linktype = dlt_to_linktype(p->linktype);
811 if (linktype == -1) {
812 snprintf(p->errbuf, PCAP_ERRBUF_SIZE,
813 "%s: link-layer type %d isn't supported in savefiles",
817 linktype |= p->linktype_ext;
820 snprintf(p->errbuf, PCAP_ERRBUF_SIZE,
821 "A null pointer was supplied as the file name");
824 if (fname[0] == '-' && fname[1] == '\0') {
826 fname = "standard output";
829 * "b" is supported as of C90, so *all* UN*Xes should
830 * support it, even though it does nothing. It's
831 * required on Windows, as the file is a binary file
832 * and must be written in binary mode.
834 f = charset_fopen(fname, "wb");
836 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE,
841 return (pcap_setup_dump(p, linktype, f, fname));
846 * Initialize so that sf_write() will output to a stream wrapping the given raw
850 pcap_dump_hopen(pcap_t *p, intptr_t osfd)
855 fd = _open_osfhandle(osfd, _O_APPEND);
857 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE,
858 errno, "_open_osfhandle");
862 file = _fdopen(fd, "wb");
864 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE,
870 return pcap_dump_fopen(p, file);
875 * Initialize so that sf_write() will output to the given stream.
881 pcap_dump_fopen(pcap_t *p, FILE *f)
885 linktype = dlt_to_linktype(p->linktype);
886 if (linktype == -1) {
887 snprintf(p->errbuf, PCAP_ERRBUF_SIZE,
888 "stream: link-layer type %d isn't supported in savefiles",
892 linktype |= p->linktype_ext;
894 return (pcap_setup_dump(p, linktype, f, "stream"));
898 pcap_dump_open_append(pcap_t *p, const char *fname)
903 struct pcap_file_header ph;
905 linktype = dlt_to_linktype(p->linktype);
906 if (linktype == -1) {
907 snprintf(p->errbuf, PCAP_ERRBUF_SIZE,
908 "%s: link-layer type %d isn't supported in savefiles",
914 snprintf(p->errbuf, PCAP_ERRBUF_SIZE,
915 "A null pointer was supplied as the file name");
918 if (fname[0] == '-' && fname[1] == '\0')
919 return (pcap_setup_dump(p, linktype, stdout, "standard output"));
922 * "a" will cause the file *not* to be truncated if it exists
923 * but will cause it to be created if it doesn't. It will
924 * also cause all writes to be done at the end of the file,
925 * but will allow reads to be done anywhere in the file. This
926 * is what we need, because we need to read from the beginning
927 * of the file to see if it already has a header and packets
930 * "b" is supported as of C90, so *all* UN*Xes should support it,
931 * even though it does nothing. It's required on Windows, as the
932 * file is a binary file and must be read in binary mode.
934 f = charset_fopen(fname, "ab+");
936 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE,
942 * Try to read a pcap header.
944 * We do not assume that the file will be positioned at the
945 * beginning immediately after we've opened it - we seek to
946 * the beginning. ISO C says it's implementation-defined
947 * whether the file position indicator is at the beginning
948 * or the end of the file after an append-mode open, and
949 * it wasn't obvious from the Single UNIX Specification
950 * or the Microsoft documentation how that works on SUS-
951 * compliant systems or on Windows.
953 if (fseek(f, 0, SEEK_SET) == -1) {
954 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE,
955 errno, "Can't seek to the beginning of %s", fname);
959 amt_read = fread(&ph, 1, sizeof (ph), f);
960 if (amt_read != sizeof (ph)) {
962 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE,
966 } else if (feof(f) && amt_read > 0) {
967 snprintf(p->errbuf, PCAP_ERRBUF_SIZE,
968 "%s: truncated pcap file header", fname);
974 #if defined(_WIN32) || defined(MSDOS)
976 * We turn off buffering.
977 * XXX - why? And why not on the standard output?
979 setvbuf(f, NULL, _IONBF, 0);
983 * If a header is already present and:
985 * it's not for a pcap file of the appropriate resolution
986 * and the right byte order for this machine;
988 * the link-layer header types don't match;
990 * the snapshot lengths don't match;
996 * A header is already present.
1002 if (p->opt.tstamp_precision != PCAP_TSTAMP_PRECISION_MICRO) {
1003 snprintf(p->errbuf, PCAP_ERRBUF_SIZE,
1004 "%s: different time stamp precision, cannot append to file", fname);
1010 case NSEC_TCPDUMP_MAGIC:
1011 if (p->opt.tstamp_precision != PCAP_TSTAMP_PRECISION_NANO) {
1012 snprintf(p->errbuf, PCAP_ERRBUF_SIZE,
1013 "%s: different time stamp precision, cannot append to file", fname);
1019 case SWAPLONG(TCPDUMP_MAGIC):
1020 case SWAPLONG(NSEC_TCPDUMP_MAGIC):
1021 snprintf(p->errbuf, PCAP_ERRBUF_SIZE,
1022 "%s: different byte order, cannot append to file", fname);
1026 case KUZNETZOV_TCPDUMP_MAGIC:
1027 case SWAPLONG(KUZNETZOV_TCPDUMP_MAGIC):
1028 case NAVTEL_TCPDUMP_MAGIC:
1029 case SWAPLONG(NAVTEL_TCPDUMP_MAGIC):
1030 snprintf(p->errbuf, PCAP_ERRBUF_SIZE,
1031 "%s: not a pcap file to which we can append", fname);
1036 snprintf(p->errbuf, PCAP_ERRBUF_SIZE,
1037 "%s: not a pcap file", fname);
1045 if (ph.version_major != PCAP_VERSION_MAJOR ||
1046 ph.version_minor != PCAP_VERSION_MINOR) {
1047 snprintf(p->errbuf, PCAP_ERRBUF_SIZE,
1048 "%s: version is %u.%u, cannot append to file", fname,
1049 ph.version_major, ph.version_minor);
1053 if ((bpf_u_int32)linktype != ph.linktype) {
1054 snprintf(p->errbuf, PCAP_ERRBUF_SIZE,
1055 "%s: different linktype, cannot append to file", fname);
1059 if ((bpf_u_int32)p->snapshot != ph.snaplen) {
1060 snprintf(p->errbuf, PCAP_ERRBUF_SIZE,
1061 "%s: different snaplen, cannot append to file", fname);
1067 * A header isn't present; attempt to write it.
1069 if (sf_write_header(p, f, linktype, p->snapshot) == -1) {
1070 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE,
1071 errno, "Can't write to %s", fname);
1078 * Start writing at the end of the file.
1080 * XXX - this shouldn't be necessary, given that we're opening
1081 * the file in append mode, and ISO C specifies that all writes
1082 * are done at the end of the file in that mode.
1084 if (fseek(f, 0, SEEK_END) == -1) {
1085 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE,
1086 errno, "Can't seek to the end of %s", fname);
1090 return ((pcap_dumper_t *)f);
1094 pcap_dump_file(pcap_dumper_t *p)
1100 pcap_dump_ftell(pcap_dumper_t *p)
1102 return (ftell((FILE *)p));
1105 #if defined(HAVE_FSEEKO)
1107 * We have fseeko(), so we have ftello().
1108 * If we have large file support (files larger than 2^31-1 bytes),
1109 * ftello() will give us a current file position with more than 32
1113 pcap_dump_ftell64(pcap_dumper_t *p)
1115 return (ftello((FILE *)p));
1117 #elif defined(_MSC_VER)
1119 * We have Visual Studio; we support only 2005 and later, so we have
1123 pcap_dump_ftell64(pcap_dumper_t *p)
1125 return (_ftelli64((FILE *)p));
1129 * We don't have ftello() or _ftelli64(), so fall back on ftell().
1130 * Either long is 64 bits, in which case ftell() should suffice,
1131 * or this is probably an older 32-bit UN*X without large file
1132 * support, which means you'll probably get errors trying to
1133 * write files > 2^31-1, so it won't matter anyway.
1135 * XXX - what about MinGW?
1138 pcap_dump_ftell64(pcap_dumper_t *p)
1140 return (ftell((FILE *)p));
1145 pcap_dump_flush(pcap_dumper_t *p)
1148 if (fflush((FILE *)p) == EOF)
1155 pcap_dump_close(pcap_dumper_t *p)
1159 if (ferror((FILE *)p))
1161 /* XXX should check return from fclose() too */
1163 (void)fclose((FILE *)p);