1*d56f51eaSDavid van Moolenbroek /* $NetBSD: fad-gifc.c,v 1.3 2015/03/31 21:39:42 christos Exp $ */
2*d56f51eaSDavid van Moolenbroek
3*d56f51eaSDavid van Moolenbroek /* -*- Mode: c; tab-width: 8; indent-tabs-mode: 1; c-basic-offset: 8; -*- */
4*d56f51eaSDavid van Moolenbroek /*
5*d56f51eaSDavid van Moolenbroek * Copyright (c) 1994, 1995, 1996, 1997, 1998
6*d56f51eaSDavid van Moolenbroek * The Regents of the University of California. All rights reserved.
7*d56f51eaSDavid van Moolenbroek *
8*d56f51eaSDavid van Moolenbroek * Redistribution and use in source and binary forms, with or without
9*d56f51eaSDavid van Moolenbroek * modification, are permitted provided that the following conditions
10*d56f51eaSDavid van Moolenbroek * are met:
11*d56f51eaSDavid van Moolenbroek * 1. Redistributions of source code must retain the above copyright
12*d56f51eaSDavid van Moolenbroek * notice, this list of conditions and the following disclaimer.
13*d56f51eaSDavid van Moolenbroek * 2. Redistributions in binary form must reproduce the above copyright
14*d56f51eaSDavid van Moolenbroek * notice, this list of conditions and the following disclaimer in the
15*d56f51eaSDavid van Moolenbroek * documentation and/or other materials provided with the distribution.
16*d56f51eaSDavid van Moolenbroek * 3. All advertising materials mentioning features or use of this software
17*d56f51eaSDavid van Moolenbroek * must display the following acknowledgement:
18*d56f51eaSDavid van Moolenbroek * This product includes software developed by the Computer Systems
19*d56f51eaSDavid van Moolenbroek * Engineering Group at Lawrence Berkeley Laboratory.
20*d56f51eaSDavid van Moolenbroek * 4. Neither the name of the University nor of the Laboratory may be used
21*d56f51eaSDavid van Moolenbroek * to endorse or promote products derived from this software without
22*d56f51eaSDavid van Moolenbroek * specific prior written permission.
23*d56f51eaSDavid van Moolenbroek *
24*d56f51eaSDavid van Moolenbroek * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
25*d56f51eaSDavid van Moolenbroek * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
26*d56f51eaSDavid van Moolenbroek * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
27*d56f51eaSDavid van Moolenbroek * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
28*d56f51eaSDavid van Moolenbroek * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
29*d56f51eaSDavid van Moolenbroek * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
30*d56f51eaSDavid van Moolenbroek * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
31*d56f51eaSDavid van Moolenbroek * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
32*d56f51eaSDavid van Moolenbroek * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
33*d56f51eaSDavid van Moolenbroek * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
34*d56f51eaSDavid van Moolenbroek * SUCH DAMAGE.
35*d56f51eaSDavid van Moolenbroek */
36*d56f51eaSDavid van Moolenbroek
37*d56f51eaSDavid van Moolenbroek #include <sys/cdefs.h>
38*d56f51eaSDavid van Moolenbroek __RCSID("$NetBSD: fad-gifc.c,v 1.3 2015/03/31 21:39:42 christos Exp $");
39*d56f51eaSDavid van Moolenbroek
40*d56f51eaSDavid van Moolenbroek #ifdef HAVE_CONFIG_H
41*d56f51eaSDavid van Moolenbroek #include "config.h"
42*d56f51eaSDavid van Moolenbroek #endif
43*d56f51eaSDavid van Moolenbroek
44*d56f51eaSDavid van Moolenbroek #include <sys/param.h>
45*d56f51eaSDavid van Moolenbroek #include <sys/ioctl.h>
46*d56f51eaSDavid van Moolenbroek #include <sys/socket.h>
47*d56f51eaSDavid van Moolenbroek #ifdef HAVE_SYS_SOCKIO_H
48*d56f51eaSDavid van Moolenbroek #include <sys/sockio.h>
49*d56f51eaSDavid van Moolenbroek #endif
50*d56f51eaSDavid van Moolenbroek #include <sys/time.h> /* concession to AIX */
51*d56f51eaSDavid van Moolenbroek
52*d56f51eaSDavid van Moolenbroek struct mbuf; /* Squelch compiler warnings on some platforms for */
53*d56f51eaSDavid van Moolenbroek struct rtentry; /* declarations in <net/if.h> */
54*d56f51eaSDavid van Moolenbroek #include <net/if.h>
55*d56f51eaSDavid van Moolenbroek #include <netinet/in.h>
56*d56f51eaSDavid van Moolenbroek
57*d56f51eaSDavid van Moolenbroek #include <ctype.h>
58*d56f51eaSDavid van Moolenbroek #include <errno.h>
59*d56f51eaSDavid van Moolenbroek #include <memory.h>
60*d56f51eaSDavid van Moolenbroek #include <stdio.h>
61*d56f51eaSDavid van Moolenbroek #include <stdlib.h>
62*d56f51eaSDavid van Moolenbroek #include <string.h>
63*d56f51eaSDavid van Moolenbroek #include <unistd.h>
64*d56f51eaSDavid van Moolenbroek
65*d56f51eaSDavid van Moolenbroek #include "pcap-int.h"
66*d56f51eaSDavid van Moolenbroek
67*d56f51eaSDavid van Moolenbroek #ifdef HAVE_OS_PROTO_H
68*d56f51eaSDavid van Moolenbroek #include "os-proto.h"
69*d56f51eaSDavid van Moolenbroek #endif
70*d56f51eaSDavid van Moolenbroek
71*d56f51eaSDavid van Moolenbroek /*
72*d56f51eaSDavid van Moolenbroek * This is fun.
73*d56f51eaSDavid van Moolenbroek *
74*d56f51eaSDavid van Moolenbroek * In older BSD systems, socket addresses were fixed-length, and
75*d56f51eaSDavid van Moolenbroek * "sizeof (struct sockaddr)" gave the size of the structure.
76*d56f51eaSDavid van Moolenbroek * All addresses fit within a "struct sockaddr".
77*d56f51eaSDavid van Moolenbroek *
78*d56f51eaSDavid van Moolenbroek * In newer BSD systems, the socket address is variable-length, and
79*d56f51eaSDavid van Moolenbroek * there's an "sa_len" field giving the length of the structure;
80*d56f51eaSDavid van Moolenbroek * this allows socket addresses to be longer than 2 bytes of family
81*d56f51eaSDavid van Moolenbroek * and 14 bytes of data.
82*d56f51eaSDavid van Moolenbroek *
83*d56f51eaSDavid van Moolenbroek * Some commercial UNIXes use the old BSD scheme, some use the RFC 2553
84*d56f51eaSDavid van Moolenbroek * variant of the old BSD scheme (with "struct sockaddr_storage" rather
85*d56f51eaSDavid van Moolenbroek * than "struct sockaddr"), and some use the new BSD scheme.
86*d56f51eaSDavid van Moolenbroek *
87*d56f51eaSDavid van Moolenbroek * Some versions of GNU libc use neither scheme, but has an "SA_LEN()"
88*d56f51eaSDavid van Moolenbroek * macro that determines the size based on the address family. Other
89*d56f51eaSDavid van Moolenbroek * versions don't have "SA_LEN()" (as it was in drafts of RFC 2553
90*d56f51eaSDavid van Moolenbroek * but not in the final version).
91*d56f51eaSDavid van Moolenbroek *
92*d56f51eaSDavid van Moolenbroek * We assume that a UNIX that doesn't have "getifaddrs()" and doesn't have
93*d56f51eaSDavid van Moolenbroek * SIOCGLIFCONF, but has SIOCGIFCONF, uses "struct sockaddr" for the
94*d56f51eaSDavid van Moolenbroek * address in an entry returned by SIOCGIFCONF.
95*d56f51eaSDavid van Moolenbroek */
96*d56f51eaSDavid van Moolenbroek #ifndef SA_LEN
97*d56f51eaSDavid van Moolenbroek #ifdef HAVE_SOCKADDR_SA_LEN
98*d56f51eaSDavid van Moolenbroek #define SA_LEN(addr) ((addr)->sa_len)
99*d56f51eaSDavid van Moolenbroek #else /* HAVE_SOCKADDR_SA_LEN */
100*d56f51eaSDavid van Moolenbroek #define SA_LEN(addr) (sizeof (struct sockaddr))
101*d56f51eaSDavid van Moolenbroek #endif /* HAVE_SOCKADDR_SA_LEN */
102*d56f51eaSDavid van Moolenbroek #endif /* SA_LEN */
103*d56f51eaSDavid van Moolenbroek
104*d56f51eaSDavid van Moolenbroek /*
105*d56f51eaSDavid van Moolenbroek * This is also fun.
106*d56f51eaSDavid van Moolenbroek *
107*d56f51eaSDavid van Moolenbroek * There is no ioctl that returns the amount of space required for all
108*d56f51eaSDavid van Moolenbroek * the data that SIOCGIFCONF could return, and if a buffer is supplied
109*d56f51eaSDavid van Moolenbroek * that's not large enough for all the data SIOCGIFCONF could return,
110*d56f51eaSDavid van Moolenbroek * on at least some platforms it just returns the data that'd fit with
111*d56f51eaSDavid van Moolenbroek * no indication that there wasn't enough room for all the data, much
112*d56f51eaSDavid van Moolenbroek * less an indication of how much more room is required.
113*d56f51eaSDavid van Moolenbroek *
114*d56f51eaSDavid van Moolenbroek * The only way to ensure that we got all the data is to pass a buffer
115*d56f51eaSDavid van Moolenbroek * large enough that the amount of space in the buffer *not* filled in
116*d56f51eaSDavid van Moolenbroek * is greater than the largest possible entry.
117*d56f51eaSDavid van Moolenbroek *
118*d56f51eaSDavid van Moolenbroek * We assume that's "sizeof(ifreq.ifr_name)" plus 255, under the assumption
119*d56f51eaSDavid van Moolenbroek * that no address is more than 255 bytes (on systems where the "sa_len"
120*d56f51eaSDavid van Moolenbroek * field in a "struct sockaddr" is 1 byte, e.g. newer BSDs, that's the
121*d56f51eaSDavid van Moolenbroek * case, and addresses are unlikely to be bigger than that in any case).
122*d56f51eaSDavid van Moolenbroek */
123*d56f51eaSDavid van Moolenbroek #define MAX_SA_LEN 255
124*d56f51eaSDavid van Moolenbroek
125*d56f51eaSDavid van Moolenbroek /*
126*d56f51eaSDavid van Moolenbroek * Get a list of all interfaces that are up and that we can open.
127*d56f51eaSDavid van Moolenbroek * Returns -1 on error, 0 otherwise.
128*d56f51eaSDavid van Moolenbroek * The list, as returned through "alldevsp", may be null if no interfaces
129*d56f51eaSDavid van Moolenbroek * were up and could be opened.
130*d56f51eaSDavid van Moolenbroek *
131*d56f51eaSDavid van Moolenbroek * This is the implementation used on platforms that have SIOCGIFCONF but
132*d56f51eaSDavid van Moolenbroek * don't have any other mechanism for getting a list of interfaces.
133*d56f51eaSDavid van Moolenbroek *
134*d56f51eaSDavid van Moolenbroek * XXX - or platforms that have other, better mechanisms but for which
135*d56f51eaSDavid van Moolenbroek * we don't yet have code to use that mechanism; I think there's a better
136*d56f51eaSDavid van Moolenbroek * way on Linux, for example, but if that better way is "getifaddrs()",
137*d56f51eaSDavid van Moolenbroek * we already have that.
138*d56f51eaSDavid van Moolenbroek */
139*d56f51eaSDavid van Moolenbroek int
pcap_findalldevs_interfaces(pcap_if_t ** alldevsp,char * errbuf)140*d56f51eaSDavid van Moolenbroek pcap_findalldevs_interfaces(pcap_if_t **alldevsp, char *errbuf)
141*d56f51eaSDavid van Moolenbroek {
142*d56f51eaSDavid van Moolenbroek pcap_if_t *devlist = NULL;
143*d56f51eaSDavid van Moolenbroek register int fd;
144*d56f51eaSDavid van Moolenbroek register struct ifreq *ifrp, *ifend, *ifnext;
145*d56f51eaSDavid van Moolenbroek int n;
146*d56f51eaSDavid van Moolenbroek struct ifconf ifc;
147*d56f51eaSDavid van Moolenbroek char *buf = NULL;
148*d56f51eaSDavid van Moolenbroek unsigned buf_size;
149*d56f51eaSDavid van Moolenbroek #if defined (HAVE_SOLARIS) || defined (HAVE_HPUX10_20_OR_LATER)
150*d56f51eaSDavid van Moolenbroek char *p, *q;
151*d56f51eaSDavid van Moolenbroek #endif
152*d56f51eaSDavid van Moolenbroek struct ifreq ifrflags, ifrnetmask, ifrbroadaddr, ifrdstaddr;
153*d56f51eaSDavid van Moolenbroek struct sockaddr *netmask, *broadaddr, *dstaddr;
154*d56f51eaSDavid van Moolenbroek size_t netmask_size, broadaddr_size, dstaddr_size;
155*d56f51eaSDavid van Moolenbroek int ret = 0;
156*d56f51eaSDavid van Moolenbroek
157*d56f51eaSDavid van Moolenbroek /*
158*d56f51eaSDavid van Moolenbroek * Create a socket from which to fetch the list of interfaces.
159*d56f51eaSDavid van Moolenbroek */
160*d56f51eaSDavid van Moolenbroek fd = socket(AF_INET, SOCK_DGRAM, 0);
161*d56f51eaSDavid van Moolenbroek if (fd < 0) {
162*d56f51eaSDavid van Moolenbroek (void)snprintf(errbuf, PCAP_ERRBUF_SIZE,
163*d56f51eaSDavid van Moolenbroek "socket: %s", pcap_strerror(errno));
164*d56f51eaSDavid van Moolenbroek return (-1);
165*d56f51eaSDavid van Moolenbroek }
166*d56f51eaSDavid van Moolenbroek
167*d56f51eaSDavid van Moolenbroek /*
168*d56f51eaSDavid van Moolenbroek * Start with an 8K buffer, and keep growing the buffer until
169*d56f51eaSDavid van Moolenbroek * we have more than "sizeof(ifrp->ifr_name) + MAX_SA_LEN"
170*d56f51eaSDavid van Moolenbroek * bytes left over in the buffer or we fail to get the
171*d56f51eaSDavid van Moolenbroek * interface list for some reason other than EINVAL (which is
172*d56f51eaSDavid van Moolenbroek * presumed here to mean "buffer is too small").
173*d56f51eaSDavid van Moolenbroek */
174*d56f51eaSDavid van Moolenbroek buf_size = 8192;
175*d56f51eaSDavid van Moolenbroek for (;;) {
176*d56f51eaSDavid van Moolenbroek buf = malloc(buf_size);
177*d56f51eaSDavid van Moolenbroek if (buf == NULL) {
178*d56f51eaSDavid van Moolenbroek (void)snprintf(errbuf, PCAP_ERRBUF_SIZE,
179*d56f51eaSDavid van Moolenbroek "malloc: %s", pcap_strerror(errno));
180*d56f51eaSDavid van Moolenbroek (void)close(fd);
181*d56f51eaSDavid van Moolenbroek return (-1);
182*d56f51eaSDavid van Moolenbroek }
183*d56f51eaSDavid van Moolenbroek
184*d56f51eaSDavid van Moolenbroek ifc.ifc_len = buf_size;
185*d56f51eaSDavid van Moolenbroek ifc.ifc_buf = buf;
186*d56f51eaSDavid van Moolenbroek memset(buf, 0, buf_size);
187*d56f51eaSDavid van Moolenbroek if (ioctl(fd, SIOCGIFCONF, (char *)&ifc) < 0
188*d56f51eaSDavid van Moolenbroek && errno != EINVAL) {
189*d56f51eaSDavid van Moolenbroek (void)snprintf(errbuf, PCAP_ERRBUF_SIZE,
190*d56f51eaSDavid van Moolenbroek "SIOCGIFCONF: %s", pcap_strerror(errno));
191*d56f51eaSDavid van Moolenbroek (void)close(fd);
192*d56f51eaSDavid van Moolenbroek free(buf);
193*d56f51eaSDavid van Moolenbroek return (-1);
194*d56f51eaSDavid van Moolenbroek }
195*d56f51eaSDavid van Moolenbroek if (ifc.ifc_len < buf_size &&
196*d56f51eaSDavid van Moolenbroek (buf_size - ifc.ifc_len) > sizeof(ifrp->ifr_name) + MAX_SA_LEN)
197*d56f51eaSDavid van Moolenbroek break;
198*d56f51eaSDavid van Moolenbroek free(buf);
199*d56f51eaSDavid van Moolenbroek buf_size *= 2;
200*d56f51eaSDavid van Moolenbroek }
201*d56f51eaSDavid van Moolenbroek
202*d56f51eaSDavid van Moolenbroek ifrp = (struct ifreq *)buf;
203*d56f51eaSDavid van Moolenbroek ifend = (struct ifreq *)(buf + ifc.ifc_len);
204*d56f51eaSDavid van Moolenbroek
205*d56f51eaSDavid van Moolenbroek for (; ifrp < ifend; ifrp = ifnext) {
206*d56f51eaSDavid van Moolenbroek /*
207*d56f51eaSDavid van Moolenbroek * XXX - what if this isn't an IPv4 address? Can
208*d56f51eaSDavid van Moolenbroek * we still get the netmask, etc. with ioctls on
209*d56f51eaSDavid van Moolenbroek * an IPv4 socket?
210*d56f51eaSDavid van Moolenbroek *
211*d56f51eaSDavid van Moolenbroek * The answer is probably platform-dependent, and
212*d56f51eaSDavid van Moolenbroek * if the answer is "no" on more than one platform,
213*d56f51eaSDavid van Moolenbroek * the way you work around it is probably platform-
214*d56f51eaSDavid van Moolenbroek * dependent as well.
215*d56f51eaSDavid van Moolenbroek */
216*d56f51eaSDavid van Moolenbroek n = SA_LEN(&ifrp->ifr_addr) + sizeof(ifrp->ifr_name);
217*d56f51eaSDavid van Moolenbroek if (n < sizeof(*ifrp))
218*d56f51eaSDavid van Moolenbroek ifnext = ifrp + 1;
219*d56f51eaSDavid van Moolenbroek else
220*d56f51eaSDavid van Moolenbroek ifnext = (struct ifreq *)((char *)ifrp + n);
221*d56f51eaSDavid van Moolenbroek
222*d56f51eaSDavid van Moolenbroek /*
223*d56f51eaSDavid van Moolenbroek * XXX - The 32-bit compatibility layer for Linux on IA-64
224*d56f51eaSDavid van Moolenbroek * is slightly broken. It correctly converts the structures
225*d56f51eaSDavid van Moolenbroek * to and from kernel land from 64 bit to 32 bit but
226*d56f51eaSDavid van Moolenbroek * doesn't update ifc.ifc_len, leaving it larger than the
227*d56f51eaSDavid van Moolenbroek * amount really used. This means we read off the end
228*d56f51eaSDavid van Moolenbroek * of the buffer and encounter an interface with an
229*d56f51eaSDavid van Moolenbroek * "empty" name. Since this is highly unlikely to ever
230*d56f51eaSDavid van Moolenbroek * occur in a valid case we can just finish looking for
231*d56f51eaSDavid van Moolenbroek * interfaces if we see an empty name.
232*d56f51eaSDavid van Moolenbroek */
233*d56f51eaSDavid van Moolenbroek if (!(*ifrp->ifr_name))
234*d56f51eaSDavid van Moolenbroek break;
235*d56f51eaSDavid van Moolenbroek
236*d56f51eaSDavid van Moolenbroek /*
237*d56f51eaSDavid van Moolenbroek * Skip entries that begin with "dummy".
238*d56f51eaSDavid van Moolenbroek * XXX - what are these? Is this Linux-specific?
239*d56f51eaSDavid van Moolenbroek * Are there platforms on which we shouldn't do this?
240*d56f51eaSDavid van Moolenbroek */
241*d56f51eaSDavid van Moolenbroek if (strncmp(ifrp->ifr_name, "dummy", 5) == 0)
242*d56f51eaSDavid van Moolenbroek continue;
243*d56f51eaSDavid van Moolenbroek
244*d56f51eaSDavid van Moolenbroek /*
245*d56f51eaSDavid van Moolenbroek * Get the flags for this interface.
246*d56f51eaSDavid van Moolenbroek */
247*d56f51eaSDavid van Moolenbroek strncpy(ifrflags.ifr_name, ifrp->ifr_name,
248*d56f51eaSDavid van Moolenbroek sizeof(ifrflags.ifr_name));
249*d56f51eaSDavid van Moolenbroek if (ioctl(fd, SIOCGIFFLAGS, (char *)&ifrflags) < 0) {
250*d56f51eaSDavid van Moolenbroek if (errno == ENXIO)
251*d56f51eaSDavid van Moolenbroek continue;
252*d56f51eaSDavid van Moolenbroek (void)snprintf(errbuf, PCAP_ERRBUF_SIZE,
253*d56f51eaSDavid van Moolenbroek "SIOCGIFFLAGS: %.*s: %s",
254*d56f51eaSDavid van Moolenbroek (int)sizeof(ifrflags.ifr_name),
255*d56f51eaSDavid van Moolenbroek ifrflags.ifr_name,
256*d56f51eaSDavid van Moolenbroek pcap_strerror(errno));
257*d56f51eaSDavid van Moolenbroek ret = -1;
258*d56f51eaSDavid van Moolenbroek break;
259*d56f51eaSDavid van Moolenbroek }
260*d56f51eaSDavid van Moolenbroek
261*d56f51eaSDavid van Moolenbroek /*
262*d56f51eaSDavid van Moolenbroek * Get the netmask for this address on this interface.
263*d56f51eaSDavid van Moolenbroek */
264*d56f51eaSDavid van Moolenbroek strncpy(ifrnetmask.ifr_name, ifrp->ifr_name,
265*d56f51eaSDavid van Moolenbroek sizeof(ifrnetmask.ifr_name));
266*d56f51eaSDavid van Moolenbroek memcpy(&ifrnetmask.ifr_addr, &ifrp->ifr_addr,
267*d56f51eaSDavid van Moolenbroek sizeof(ifrnetmask.ifr_addr));
268*d56f51eaSDavid van Moolenbroek if (ioctl(fd, SIOCGIFNETMASK, (char *)&ifrnetmask) < 0) {
269*d56f51eaSDavid van Moolenbroek if (errno == EADDRNOTAVAIL) {
270*d56f51eaSDavid van Moolenbroek /*
271*d56f51eaSDavid van Moolenbroek * Not available.
272*d56f51eaSDavid van Moolenbroek */
273*d56f51eaSDavid van Moolenbroek netmask = NULL;
274*d56f51eaSDavid van Moolenbroek netmask_size = 0;
275*d56f51eaSDavid van Moolenbroek } else {
276*d56f51eaSDavid van Moolenbroek (void)snprintf(errbuf, PCAP_ERRBUF_SIZE,
277*d56f51eaSDavid van Moolenbroek "SIOCGIFNETMASK: %.*s: %s",
278*d56f51eaSDavid van Moolenbroek (int)sizeof(ifrnetmask.ifr_name),
279*d56f51eaSDavid van Moolenbroek ifrnetmask.ifr_name,
280*d56f51eaSDavid van Moolenbroek pcap_strerror(errno));
281*d56f51eaSDavid van Moolenbroek ret = -1;
282*d56f51eaSDavid van Moolenbroek break;
283*d56f51eaSDavid van Moolenbroek }
284*d56f51eaSDavid van Moolenbroek } else {
285*d56f51eaSDavid van Moolenbroek netmask = &ifrnetmask.ifr_addr;
286*d56f51eaSDavid van Moolenbroek netmask_size = SA_LEN(netmask);
287*d56f51eaSDavid van Moolenbroek }
288*d56f51eaSDavid van Moolenbroek
289*d56f51eaSDavid van Moolenbroek /*
290*d56f51eaSDavid van Moolenbroek * Get the broadcast address for this address on this
291*d56f51eaSDavid van Moolenbroek * interface (if any).
292*d56f51eaSDavid van Moolenbroek */
293*d56f51eaSDavid van Moolenbroek if (ifrflags.ifr_flags & IFF_BROADCAST) {
294*d56f51eaSDavid van Moolenbroek strncpy(ifrbroadaddr.ifr_name, ifrp->ifr_name,
295*d56f51eaSDavid van Moolenbroek sizeof(ifrbroadaddr.ifr_name));
296*d56f51eaSDavid van Moolenbroek memcpy(&ifrbroadaddr.ifr_addr, &ifrp->ifr_addr,
297*d56f51eaSDavid van Moolenbroek sizeof(ifrbroadaddr.ifr_addr));
298*d56f51eaSDavid van Moolenbroek if (ioctl(fd, SIOCGIFBRDADDR,
299*d56f51eaSDavid van Moolenbroek (char *)&ifrbroadaddr) < 0) {
300*d56f51eaSDavid van Moolenbroek if (errno == EADDRNOTAVAIL) {
301*d56f51eaSDavid van Moolenbroek /*
302*d56f51eaSDavid van Moolenbroek * Not available.
303*d56f51eaSDavid van Moolenbroek */
304*d56f51eaSDavid van Moolenbroek broadaddr = NULL;
305*d56f51eaSDavid van Moolenbroek broadaddr_size = 0;
306*d56f51eaSDavid van Moolenbroek } else {
307*d56f51eaSDavid van Moolenbroek (void)snprintf(errbuf, PCAP_ERRBUF_SIZE,
308*d56f51eaSDavid van Moolenbroek "SIOCGIFBRDADDR: %.*s: %s",
309*d56f51eaSDavid van Moolenbroek (int)sizeof(ifrbroadaddr.ifr_name),
310*d56f51eaSDavid van Moolenbroek ifrbroadaddr.ifr_name,
311*d56f51eaSDavid van Moolenbroek pcap_strerror(errno));
312*d56f51eaSDavid van Moolenbroek ret = -1;
313*d56f51eaSDavid van Moolenbroek break;
314*d56f51eaSDavid van Moolenbroek }
315*d56f51eaSDavid van Moolenbroek } else {
316*d56f51eaSDavid van Moolenbroek broadaddr = &ifrbroadaddr.ifr_broadaddr;
317*d56f51eaSDavid van Moolenbroek broadaddr_size = SA_LEN(broadaddr);
318*d56f51eaSDavid van Moolenbroek }
319*d56f51eaSDavid van Moolenbroek } else {
320*d56f51eaSDavid van Moolenbroek /*
321*d56f51eaSDavid van Moolenbroek * Not a broadcast interface, so no broadcast
322*d56f51eaSDavid van Moolenbroek * address.
323*d56f51eaSDavid van Moolenbroek */
324*d56f51eaSDavid van Moolenbroek broadaddr = NULL;
325*d56f51eaSDavid van Moolenbroek broadaddr_size = 0;
326*d56f51eaSDavid van Moolenbroek }
327*d56f51eaSDavid van Moolenbroek
328*d56f51eaSDavid van Moolenbroek /*
329*d56f51eaSDavid van Moolenbroek * Get the destination address for this address on this
330*d56f51eaSDavid van Moolenbroek * interface (if any).
331*d56f51eaSDavid van Moolenbroek */
332*d56f51eaSDavid van Moolenbroek if (ifrflags.ifr_flags & IFF_POINTOPOINT) {
333*d56f51eaSDavid van Moolenbroek strncpy(ifrdstaddr.ifr_name, ifrp->ifr_name,
334*d56f51eaSDavid van Moolenbroek sizeof(ifrdstaddr.ifr_name));
335*d56f51eaSDavid van Moolenbroek memcpy(&ifrdstaddr.ifr_addr, &ifrp->ifr_addr,
336*d56f51eaSDavid van Moolenbroek sizeof(ifrdstaddr.ifr_addr));
337*d56f51eaSDavid van Moolenbroek if (ioctl(fd, SIOCGIFDSTADDR,
338*d56f51eaSDavid van Moolenbroek (char *)&ifrdstaddr) < 0) {
339*d56f51eaSDavid van Moolenbroek if (errno == EADDRNOTAVAIL) {
340*d56f51eaSDavid van Moolenbroek /*
341*d56f51eaSDavid van Moolenbroek * Not available.
342*d56f51eaSDavid van Moolenbroek */
343*d56f51eaSDavid van Moolenbroek dstaddr = NULL;
344*d56f51eaSDavid van Moolenbroek dstaddr_size = 0;
345*d56f51eaSDavid van Moolenbroek } else {
346*d56f51eaSDavid van Moolenbroek (void)snprintf(errbuf, PCAP_ERRBUF_SIZE,
347*d56f51eaSDavid van Moolenbroek "SIOCGIFDSTADDR: %.*s: %s",
348*d56f51eaSDavid van Moolenbroek (int)sizeof(ifrdstaddr.ifr_name),
349*d56f51eaSDavid van Moolenbroek ifrdstaddr.ifr_name,
350*d56f51eaSDavid van Moolenbroek pcap_strerror(errno));
351*d56f51eaSDavid van Moolenbroek ret = -1;
352*d56f51eaSDavid van Moolenbroek break;
353*d56f51eaSDavid van Moolenbroek }
354*d56f51eaSDavid van Moolenbroek } else {
355*d56f51eaSDavid van Moolenbroek dstaddr = &ifrdstaddr.ifr_dstaddr;
356*d56f51eaSDavid van Moolenbroek dstaddr_size = SA_LEN(dstaddr);
357*d56f51eaSDavid van Moolenbroek }
358*d56f51eaSDavid van Moolenbroek } else {
359*d56f51eaSDavid van Moolenbroek /*
360*d56f51eaSDavid van Moolenbroek * Not a point-to-point interface, so no destination
361*d56f51eaSDavid van Moolenbroek * address.
362*d56f51eaSDavid van Moolenbroek */
363*d56f51eaSDavid van Moolenbroek dstaddr = NULL;
364*d56f51eaSDavid van Moolenbroek dstaddr_size = 0;
365*d56f51eaSDavid van Moolenbroek }
366*d56f51eaSDavid van Moolenbroek
367*d56f51eaSDavid van Moolenbroek #if defined (HAVE_SOLARIS) || defined (HAVE_HPUX10_20_OR_LATER)
368*d56f51eaSDavid van Moolenbroek /*
369*d56f51eaSDavid van Moolenbroek * If this entry has a colon followed by a number at
370*d56f51eaSDavid van Moolenbroek * the end, it's a logical interface. Those are just
371*d56f51eaSDavid van Moolenbroek * the way you assign multiple IP addresses to a real
372*d56f51eaSDavid van Moolenbroek * interface, so an entry for a logical interface should
373*d56f51eaSDavid van Moolenbroek * be treated like the entry for the real interface;
374*d56f51eaSDavid van Moolenbroek * we do that by stripping off the ":" and the number.
375*d56f51eaSDavid van Moolenbroek */
376*d56f51eaSDavid van Moolenbroek p = strchr(ifrp->ifr_name, ':');
377*d56f51eaSDavid van Moolenbroek if (p != NULL) {
378*d56f51eaSDavid van Moolenbroek /*
379*d56f51eaSDavid van Moolenbroek * We have a ":"; is it followed by a number?
380*d56f51eaSDavid van Moolenbroek */
381*d56f51eaSDavid van Moolenbroek q = p + 1;
382*d56f51eaSDavid van Moolenbroek while (isdigit((unsigned char)*q))
383*d56f51eaSDavid van Moolenbroek q++;
384*d56f51eaSDavid van Moolenbroek if (*q == '\0') {
385*d56f51eaSDavid van Moolenbroek /*
386*d56f51eaSDavid van Moolenbroek * All digits after the ":" until the end.
387*d56f51eaSDavid van Moolenbroek * Strip off the ":" and everything after
388*d56f51eaSDavid van Moolenbroek * it.
389*d56f51eaSDavid van Moolenbroek */
390*d56f51eaSDavid van Moolenbroek *p = '\0';
391*d56f51eaSDavid van Moolenbroek }
392*d56f51eaSDavid van Moolenbroek }
393*d56f51eaSDavid van Moolenbroek #endif
394*d56f51eaSDavid van Moolenbroek
395*d56f51eaSDavid van Moolenbroek /*
396*d56f51eaSDavid van Moolenbroek * Add information for this address to the list.
397*d56f51eaSDavid van Moolenbroek */
398*d56f51eaSDavid van Moolenbroek if (add_addr_to_iflist(&devlist, ifrp->ifr_name,
399*d56f51eaSDavid van Moolenbroek ifrflags.ifr_flags, &ifrp->ifr_addr,
400*d56f51eaSDavid van Moolenbroek SA_LEN(&ifrp->ifr_addr), netmask, netmask_size,
401*d56f51eaSDavid van Moolenbroek broadaddr, broadaddr_size, dstaddr, dstaddr_size,
402*d56f51eaSDavid van Moolenbroek errbuf) < 0) {
403*d56f51eaSDavid van Moolenbroek ret = -1;
404*d56f51eaSDavid van Moolenbroek break;
405*d56f51eaSDavid van Moolenbroek }
406*d56f51eaSDavid van Moolenbroek }
407*d56f51eaSDavid van Moolenbroek free(buf);
408*d56f51eaSDavid van Moolenbroek (void)close(fd);
409*d56f51eaSDavid van Moolenbroek
410*d56f51eaSDavid van Moolenbroek if (ret == -1) {
411*d56f51eaSDavid van Moolenbroek /*
412*d56f51eaSDavid van Moolenbroek * We had an error; free the list we've been constructing.
413*d56f51eaSDavid van Moolenbroek */
414*d56f51eaSDavid van Moolenbroek if (devlist != NULL) {
415*d56f51eaSDavid van Moolenbroek pcap_freealldevs(devlist);
416*d56f51eaSDavid van Moolenbroek devlist = NULL;
417*d56f51eaSDavid van Moolenbroek }
418*d56f51eaSDavid van Moolenbroek }
419*d56f51eaSDavid van Moolenbroek
420*d56f51eaSDavid van Moolenbroek *alldevsp = devlist;
421*d56f51eaSDavid van Moolenbroek return (ret);
422*d56f51eaSDavid van Moolenbroek }
423