1 /* 2 * Copyright (c) 1990, 1991, 1992, 1993, 1994, 1995, 1996, 1997 3 * The Regents of the University of California. All rights reserved. 4 * 5 * Redistribution and use in source and binary forms, with or without 6 * modification, are permitted provided that: (1) source code distributions 7 * retain the above copyright notice and this paragraph in its entirety, (2) 8 * distributions including binary code include the above copyright notice and 9 * this paragraph in its entirety in the documentation or other materials 10 * provided with the distribution, and (3) all advertising materials mentioning 11 * features or use of this software display the following acknowledgement: 12 * ``This product includes software developed by the University of California, 13 * Lawrence Berkeley Laboratory and its contributors.'' Neither the name of 14 * the University nor the names of its contributors may be used to endorse 15 * or promote products derived from this software without specific prior 16 * written permission. 17 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED 18 * WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF 19 * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. 20 * 21 * Internet, ethernet, port, and protocol string to address 22 * and address to string conversion routines 23 */ 24 #include <sys/cdefs.h> 25 #ifndef lint 26 #if 0 27 static const char rcsid[] _U_ = 28 "@(#) Header: /tcpdump/master/tcpdump/addrtoname.c,v 1.119 2007-08-08 14:06:34 hannes Exp (LBL)"; 29 #else 30 __RCSID("$NetBSD: addrtoname.c,v 1.2 2010/12/05 05:11:30 christos Exp $"); 31 #endif 32 #endif 33 34 #ifdef HAVE_CONFIG_H 35 #include "config.h" 36 #endif 37 38 #include <tcpdump-stdinc.h> 39 40 #ifdef USE_ETHER_NTOHOST 41 #ifdef HAVE_NETINET_IF_ETHER_H 42 struct mbuf; /* Squelch compiler warnings on some platforms for */ 43 struct rtentry; /* declarations in <net/if.h> */ 44 #include <net/if.h> /* for "struct ifnet" in "struct arpcom" on Solaris */ 45 #include <netinet/if_ether.h> 46 #endif /* HAVE_NETINET_IF_ETHER_H */ 47 #ifdef NETINET_ETHER_H_DECLARES_ETHER_NTOHOST 48 #include <netinet/ether.h> 49 #endif /* NETINET_ETHER_H_DECLARES_ETHER_NTOHOST */ 50 51 #if !defined(HAVE_DECL_ETHER_NTOHOST) || !HAVE_DECL_ETHER_NTOHOST 52 #ifndef HAVE_STRUCT_ETHER_ADDR 53 struct ether_addr { 54 unsigned char ether_addr_octet[6]; 55 }; 56 #endif 57 extern int ether_ntohost(char *, const struct ether_addr *); 58 #endif 59 60 #endif /* USE_ETHER_NTOHOST */ 61 62 #include <pcap.h> 63 #include <pcap-namedb.h> 64 #include <signal.h> 65 #include <stdio.h> 66 #include <string.h> 67 #include <stdlib.h> 68 69 #include "interface.h" 70 #include "addrtoname.h" 71 #include "llc.h" 72 #include "setsignal.h" 73 #include "extract.h" 74 #include "oui.h" 75 76 #ifndef ETHER_ADDR_LEN 77 #define ETHER_ADDR_LEN 6 78 #endif 79 80 /* 81 * hash tables for whatever-to-name translations 82 * 83 * XXX there has to be error checks against strdup(3) failure 84 */ 85 86 #define HASHNAMESIZE 4096 87 88 struct hnamemem { 89 u_int32_t addr; 90 const char *name; 91 struct hnamemem *nxt; 92 }; 93 94 static struct hnamemem hnametable[HASHNAMESIZE]; 95 static struct hnamemem tporttable[HASHNAMESIZE]; 96 static struct hnamemem uporttable[HASHNAMESIZE]; 97 static struct hnamemem eprototable[HASHNAMESIZE]; 98 static struct hnamemem dnaddrtable[HASHNAMESIZE]; 99 static struct hnamemem ipxsaptable[HASHNAMESIZE]; 100 101 #if defined(INET6) && defined(WIN32) 102 /* 103 * fake gethostbyaddr for Win2k/XP 104 * gethostbyaddr() returns incorrect value when AF_INET6 is passed 105 * to 3rd argument. 106 * 107 * h_name in struct hostent is only valid. 108 */ 109 static struct hostent * 110 win32_gethostbyaddr(const char *addr, int len, int type) 111 { 112 static struct hostent host; 113 static char hostbuf[NI_MAXHOST]; 114 char hname[NI_MAXHOST]; 115 struct sockaddr_in6 addr6; 116 117 host.h_name = hostbuf; 118 switch (type) { 119 case AF_INET: 120 return gethostbyaddr(addr, len, type); 121 break; 122 case AF_INET6: 123 memset(&addr6, 0, sizeof(addr6)); 124 addr6.sin6_family = AF_INET6; 125 memcpy(&addr6.sin6_addr, addr, len); 126 if (getnameinfo((struct sockaddr *)&addr6, sizeof(addr6), 127 hname, sizeof(hname), NULL, 0, 0)) { 128 return NULL; 129 } else { 130 strcpy(host.h_name, hname); 131 return &host; 132 } 133 break; 134 default: 135 return NULL; 136 } 137 } 138 #define gethostbyaddr win32_gethostbyaddr 139 #endif /* INET6 & WIN32 */ 140 141 #ifdef INET6 142 struct h6namemem { 143 struct in6_addr addr; 144 char *name; 145 struct h6namemem *nxt; 146 }; 147 148 static struct h6namemem h6nametable[HASHNAMESIZE]; 149 #endif /* INET6 */ 150 151 struct enamemem { 152 u_short e_addr0; 153 u_short e_addr1; 154 u_short e_addr2; 155 const char *e_name; 156 u_char *e_nsap; /* used only for nsaptable[] */ 157 #define e_bs e_nsap /* for bytestringtable */ 158 struct enamemem *e_nxt; 159 }; 160 161 static struct enamemem enametable[HASHNAMESIZE]; 162 static struct enamemem nsaptable[HASHNAMESIZE]; 163 static struct enamemem bytestringtable[HASHNAMESIZE]; 164 165 struct protoidmem { 166 u_int32_t p_oui; 167 u_short p_proto; 168 const char *p_name; 169 struct protoidmem *p_nxt; 170 }; 171 172 static struct protoidmem protoidtable[HASHNAMESIZE]; 173 174 /* 175 * A faster replacement for inet_ntoa(). 176 */ 177 const char * 178 intoa(u_int32_t addr) 179 { 180 register char *cp; 181 register u_int byte; 182 register int n; 183 static char buf[sizeof(".xxx.xxx.xxx.xxx")]; 184 185 NTOHL(addr); 186 cp = buf + sizeof(buf); 187 *--cp = '\0'; 188 189 n = 4; 190 do { 191 byte = addr & 0xff; 192 *--cp = byte % 10 + '0'; 193 byte /= 10; 194 if (byte > 0) { 195 *--cp = byte % 10 + '0'; 196 byte /= 10; 197 if (byte > 0) 198 *--cp = byte + '0'; 199 } 200 *--cp = '.'; 201 addr >>= 8; 202 } while (--n > 0); 203 204 return cp + 1; 205 } 206 207 static u_int32_t f_netmask; 208 static u_int32_t f_localnet; 209 210 /* 211 * Return a name for the IP address pointed to by ap. This address 212 * is assumed to be in network byte order. 213 * 214 * NOTE: ap is *NOT* necessarily part of the packet data (not even if 215 * this is being called with the "ipaddr_string()" macro), so you 216 * *CANNOT* use the TCHECK{2}/TTEST{2} macros on it. Furthermore, 217 * even in cases where it *is* part of the packet data, the caller 218 * would still have to check for a null return value, even if it's 219 * just printing the return value with "%s" - not all versions of 220 * printf print "(null)" with "%s" and a null pointer, some of them 221 * don't check for a null pointer and crash in that case. 222 * 223 * The callers of this routine should, before handing this routine 224 * a pointer to packet data, be sure that the data is present in 225 * the packet buffer. They should probably do those checks anyway, 226 * as other data at that layer might not be IP addresses, and it 227 * also needs to check whether they're present in the packet buffer. 228 */ 229 const char * 230 getname(const u_char *ap) 231 { 232 register struct hostent *hp; 233 u_int32_t addr; 234 static struct hnamemem *p; /* static for longjmp() */ 235 236 memcpy(&addr, ap, sizeof(addr)); 237 p = &hnametable[addr & (HASHNAMESIZE-1)]; 238 for (; p->nxt; p = p->nxt) { 239 if (p->addr == addr) 240 return (p->name); 241 } 242 p->addr = addr; 243 p->nxt = newhnamemem(); 244 245 /* 246 * Print names unless: 247 * (1) -n was given. 248 * (2) Address is foreign and -f was given. (If -f was not 249 * given, f_netmask and f_localnet are 0 and the test 250 * evaluates to true) 251 */ 252 if (!nflag && 253 (addr & f_netmask) == f_localnet) { 254 hp = gethostbyaddr((char *)&addr, 4, AF_INET); 255 if (hp) { 256 char *dotp; 257 258 p->name = strdup(hp->h_name); 259 if (Nflag) { 260 /* Remove domain qualifications */ 261 dotp = strchr(p->name, '.'); 262 if (dotp) 263 *dotp = '\0'; 264 } 265 return (p->name); 266 } 267 } 268 p->name = strdup(intoa(addr)); 269 return (p->name); 270 } 271 272 #ifdef INET6 273 /* 274 * Return a name for the IP6 address pointed to by ap. This address 275 * is assumed to be in network byte order. 276 */ 277 const char * 278 getname6(const u_char *ap) 279 { 280 register struct hostent *hp; 281 struct in6_addr addr; 282 static struct h6namemem *p; /* static for longjmp() */ 283 register const char *cp; 284 char ntop_buf[INET6_ADDRSTRLEN]; 285 286 memcpy(&addr, ap, sizeof(addr)); 287 p = &h6nametable[*(u_int16_t *)&addr.s6_addr[14] & (HASHNAMESIZE-1)]; 288 for (; p->nxt; p = p->nxt) { 289 if (memcmp(&p->addr, &addr, sizeof(addr)) == 0) 290 return (p->name); 291 } 292 p->addr = addr; 293 p->nxt = newh6namemem(); 294 295 /* 296 * Do not print names if -n was given. 297 */ 298 if (!nflag) { 299 hp = gethostbyaddr((char *)&addr, sizeof(addr), AF_INET6); 300 if (hp) { 301 char *dotp; 302 303 p->name = strdup(hp->h_name); 304 if (Nflag) { 305 /* Remove domain qualifications */ 306 dotp = strchr(p->name, '.'); 307 if (dotp) 308 *dotp = '\0'; 309 } 310 return (p->name); 311 } 312 } 313 cp = inet_ntop(AF_INET6, &addr, ntop_buf, sizeof(ntop_buf)); 314 p->name = strdup(cp); 315 return (p->name); 316 } 317 #endif /* INET6 */ 318 319 static const char hex[] = "0123456789abcdef"; 320 321 322 /* Find the hash node that corresponds the ether address 'ep' */ 323 324 static inline struct enamemem * 325 lookup_emem(const u_char *ep) 326 { 327 register u_int i, j, k; 328 struct enamemem *tp; 329 330 k = (ep[0] << 8) | ep[1]; 331 j = (ep[2] << 8) | ep[3]; 332 i = (ep[4] << 8) | ep[5]; 333 334 tp = &enametable[(i ^ j) & (HASHNAMESIZE-1)]; 335 while (tp->e_nxt) 336 if (tp->e_addr0 == i && 337 tp->e_addr1 == j && 338 tp->e_addr2 == k) 339 return tp; 340 else 341 tp = tp->e_nxt; 342 tp->e_addr0 = i; 343 tp->e_addr1 = j; 344 tp->e_addr2 = k; 345 tp->e_nxt = (struct enamemem *)calloc(1, sizeof(*tp)); 346 if (tp->e_nxt == NULL) 347 error("lookup_emem: calloc"); 348 349 return tp; 350 } 351 352 /* 353 * Find the hash node that corresponds to the bytestring 'bs' 354 * with length 'nlen' 355 */ 356 357 static inline struct enamemem * 358 lookup_bytestring(register const u_char *bs, const unsigned int nlen) 359 { 360 struct enamemem *tp; 361 register u_int i, j, k; 362 363 if (nlen >= 6) { 364 k = (bs[0] << 8) | bs[1]; 365 j = (bs[2] << 8) | bs[3]; 366 i = (bs[4] << 8) | bs[5]; 367 } else if (nlen >= 4) { 368 k = (bs[0] << 8) | bs[1]; 369 j = (bs[2] << 8) | bs[3]; 370 i = 0; 371 } else 372 i = j = k = 0; 373 374 tp = &bytestringtable[(i ^ j) & (HASHNAMESIZE-1)]; 375 while (tp->e_nxt) 376 if (tp->e_addr0 == i && 377 tp->e_addr1 == j && 378 tp->e_addr2 == k && 379 memcmp((const char *)bs, (const char *)(tp->e_bs), nlen) == 0) 380 return tp; 381 else 382 tp = tp->e_nxt; 383 384 tp->e_addr0 = i; 385 tp->e_addr1 = j; 386 tp->e_addr2 = k; 387 388 tp->e_bs = (u_char *) calloc(1, nlen + 1); 389 memcpy(tp->e_bs, bs, nlen); 390 tp->e_nxt = (struct enamemem *)calloc(1, sizeof(*tp)); 391 if (tp->e_nxt == NULL) 392 error("lookup_bytestring: calloc"); 393 394 return tp; 395 } 396 397 /* Find the hash node that corresponds the NSAP 'nsap' */ 398 399 static inline struct enamemem * 400 lookup_nsap(register const u_char *nsap) 401 { 402 register u_int i, j, k; 403 unsigned int nlen = *nsap; 404 struct enamemem *tp; 405 const u_char *ensap = nsap + nlen - 6; 406 407 if (nlen > 6) { 408 k = (ensap[0] << 8) | ensap[1]; 409 j = (ensap[2] << 8) | ensap[3]; 410 i = (ensap[4] << 8) | ensap[5]; 411 } 412 else 413 i = j = k = 0; 414 415 tp = &nsaptable[(i ^ j) & (HASHNAMESIZE-1)]; 416 while (tp->e_nxt) 417 if (tp->e_addr0 == i && 418 tp->e_addr1 == j && 419 tp->e_addr2 == k && 420 tp->e_nsap[0] == nlen && 421 memcmp((const char *)&(nsap[1]), 422 (char *)&(tp->e_nsap[1]), nlen) == 0) 423 return tp; 424 else 425 tp = tp->e_nxt; 426 tp->e_addr0 = i; 427 tp->e_addr1 = j; 428 tp->e_addr2 = k; 429 tp->e_nsap = (u_char *)malloc(nlen + 1); 430 if (tp->e_nsap == NULL) 431 error("lookup_nsap: malloc"); 432 memcpy((char *)tp->e_nsap, (const char *)nsap, nlen + 1); 433 tp->e_nxt = (struct enamemem *)calloc(1, sizeof(*tp)); 434 if (tp->e_nxt == NULL) 435 error("lookup_nsap: calloc"); 436 437 return tp; 438 } 439 440 /* Find the hash node that corresponds the protoid 'pi'. */ 441 442 static inline struct protoidmem * 443 lookup_protoid(const u_char *pi) 444 { 445 register u_int i, j; 446 struct protoidmem *tp; 447 448 /* 5 octets won't be aligned */ 449 i = (((pi[0] << 8) + pi[1]) << 8) + pi[2]; 450 j = (pi[3] << 8) + pi[4]; 451 /* XXX should be endian-insensitive, but do big-endian testing XXX */ 452 453 tp = &protoidtable[(i ^ j) & (HASHNAMESIZE-1)]; 454 while (tp->p_nxt) 455 if (tp->p_oui == i && tp->p_proto == j) 456 return tp; 457 else 458 tp = tp->p_nxt; 459 tp->p_oui = i; 460 tp->p_proto = j; 461 tp->p_nxt = (struct protoidmem *)calloc(1, sizeof(*tp)); 462 if (tp->p_nxt == NULL) 463 error("lookup_protoid: calloc"); 464 465 return tp; 466 } 467 468 const char * 469 etheraddr_string(register const u_char *ep) 470 { 471 register int i; 472 register char *cp; 473 register struct enamemem *tp; 474 int oui; 475 char buf[BUFSIZE]; 476 477 tp = lookup_emem(ep); 478 if (tp->e_name) 479 return (tp->e_name); 480 #ifdef USE_ETHER_NTOHOST 481 if (!nflag) { 482 char buf2[BUFSIZE]; 483 484 /* 485 * We don't cast it to "const struct ether_addr *" 486 * because some systems fail to declare the second 487 * argument as a "const" pointer, even though they 488 * don't modify what it points to. 489 */ 490 if (ether_ntohost(buf2, (struct ether_addr *)ep) == 0) { 491 tp->e_name = strdup(buf2); 492 return (tp->e_name); 493 } 494 } 495 #endif 496 cp = buf; 497 oui = EXTRACT_24BITS(ep); 498 *cp++ = hex[*ep >> 4 ]; 499 *cp++ = hex[*ep++ & 0xf]; 500 for (i = 5; --i >= 0;) { 501 *cp++ = ':'; 502 *cp++ = hex[*ep >> 4 ]; 503 *cp++ = hex[*ep++ & 0xf]; 504 } 505 506 if (!nflag) { 507 snprintf(cp, BUFSIZE - (2 + 5*3), " (oui %s)", 508 tok2str(oui_values, "Unknown", oui)); 509 } else 510 *cp = '\0'; 511 tp->e_name = strdup(buf); 512 return (tp->e_name); 513 } 514 515 const char * 516 linkaddr_string(const u_char *ep, const unsigned int type, const unsigned int len) 517 { 518 register u_int i; 519 register char *cp; 520 register struct enamemem *tp; 521 522 if (len == 0) 523 return ("<empty>"); 524 525 if (type == LINKADDR_ETHER && len == ETHER_ADDR_LEN) 526 return (etheraddr_string(ep)); 527 528 if (type == LINKADDR_FRELAY) 529 return (q922_string(ep)); 530 531 tp = lookup_bytestring(ep, len); 532 if (tp->e_name) 533 return (tp->e_name); 534 535 tp->e_name = cp = (char *)malloc(len*3); 536 if (tp->e_name == NULL) 537 error("linkaddr_string: malloc"); 538 *cp++ = hex[*ep >> 4]; 539 *cp++ = hex[*ep++ & 0xf]; 540 for (i = len-1; i > 0 ; --i) { 541 *cp++ = ':'; 542 *cp++ = hex[*ep >> 4]; 543 *cp++ = hex[*ep++ & 0xf]; 544 } 545 *cp = '\0'; 546 return (tp->e_name); 547 } 548 549 const char * 550 etherproto_string(u_short port) 551 { 552 register char *cp; 553 register struct hnamemem *tp; 554 register u_int32_t i = port; 555 char buf[sizeof("0000")]; 556 557 for (tp = &eprototable[i & (HASHNAMESIZE-1)]; tp->nxt; tp = tp->nxt) 558 if (tp->addr == i) 559 return (tp->name); 560 561 tp->addr = i; 562 tp->nxt = newhnamemem(); 563 564 cp = buf; 565 NTOHS(port); 566 *cp++ = hex[port >> 12 & 0xf]; 567 *cp++ = hex[port >> 8 & 0xf]; 568 *cp++ = hex[port >> 4 & 0xf]; 569 *cp++ = hex[port & 0xf]; 570 *cp++ = '\0'; 571 tp->name = strdup(buf); 572 return (tp->name); 573 } 574 575 const char * 576 protoid_string(register const u_char *pi) 577 { 578 register u_int i, j; 579 register char *cp; 580 register struct protoidmem *tp; 581 char buf[sizeof("00:00:00:00:00")]; 582 583 tp = lookup_protoid(pi); 584 if (tp->p_name) 585 return tp->p_name; 586 587 cp = buf; 588 if ((j = *pi >> 4) != 0) 589 *cp++ = hex[j]; 590 *cp++ = hex[*pi++ & 0xf]; 591 for (i = 4; (int)--i >= 0;) { 592 *cp++ = ':'; 593 if ((j = *pi >> 4) != 0) 594 *cp++ = hex[j]; 595 *cp++ = hex[*pi++ & 0xf]; 596 } 597 *cp = '\0'; 598 tp->p_name = strdup(buf); 599 return (tp->p_name); 600 } 601 602 #define ISONSAP_MAX_LENGTH 20 603 const char * 604 isonsap_string(const u_char *nsap, register u_int nsap_length) 605 { 606 register u_int nsap_idx; 607 register char *cp; 608 register struct enamemem *tp; 609 610 if (nsap_length < 1 || nsap_length > ISONSAP_MAX_LENGTH) 611 return ("isonsap_string: illegal length"); 612 613 tp = lookup_nsap(nsap); 614 if (tp->e_name) 615 return tp->e_name; 616 617 tp->e_name = cp = (char *)malloc(sizeof("xx.xxxx.xxxx.xxxx.xxxx.xxxx.xxxx.xxxx.xxxx.xxxx.xx")); 618 if (cp == NULL) 619 error("isonsap_string: malloc"); 620 621 for (nsap_idx = 0; nsap_idx < nsap_length; nsap_idx++) { 622 *cp++ = hex[*nsap >> 4]; 623 *cp++ = hex[*nsap++ & 0xf]; 624 if (((nsap_idx & 1) == 0) && 625 (nsap_idx + 1 < nsap_length)) { 626 *cp++ = '.'; 627 } 628 } 629 *cp = '\0'; 630 return (tp->e_name); 631 } 632 633 const char * 634 tcpport_string(u_short port) 635 { 636 register struct hnamemem *tp; 637 register u_int32_t i = port; 638 char buf[sizeof("00000")]; 639 640 for (tp = &tporttable[i & (HASHNAMESIZE-1)]; tp->nxt; tp = tp->nxt) 641 if (tp->addr == i) 642 return (tp->name); 643 644 tp->addr = i; 645 tp->nxt = newhnamemem(); 646 647 (void)snprintf(buf, sizeof(buf), "%u", i); 648 tp->name = strdup(buf); 649 return (tp->name); 650 } 651 652 const char * 653 udpport_string(register u_short port) 654 { 655 register struct hnamemem *tp; 656 register u_int32_t i = port; 657 char buf[sizeof("00000")]; 658 659 for (tp = &uporttable[i & (HASHNAMESIZE-1)]; tp->nxt; tp = tp->nxt) 660 if (tp->addr == i) 661 return (tp->name); 662 663 tp->addr = i; 664 tp->nxt = newhnamemem(); 665 666 (void)snprintf(buf, sizeof(buf), "%u", i); 667 tp->name = strdup(buf); 668 return (tp->name); 669 } 670 671 const char * 672 ipxsap_string(u_short port) 673 { 674 register char *cp; 675 register struct hnamemem *tp; 676 register u_int32_t i = port; 677 char buf[sizeof("0000")]; 678 679 for (tp = &ipxsaptable[i & (HASHNAMESIZE-1)]; tp->nxt; tp = tp->nxt) 680 if (tp->addr == i) 681 return (tp->name); 682 683 tp->addr = i; 684 tp->nxt = newhnamemem(); 685 686 cp = buf; 687 NTOHS(port); 688 *cp++ = hex[port >> 12 & 0xf]; 689 *cp++ = hex[port >> 8 & 0xf]; 690 *cp++ = hex[port >> 4 & 0xf]; 691 *cp++ = hex[port & 0xf]; 692 *cp++ = '\0'; 693 tp->name = strdup(buf); 694 return (tp->name); 695 } 696 697 static void 698 init_servarray(void) 699 { 700 struct servent *sv; 701 register struct hnamemem *table; 702 register int i; 703 char buf[sizeof("0000000000")]; 704 705 while ((sv = getservent()) != NULL) { 706 int port = ntohs(sv->s_port); 707 i = port & (HASHNAMESIZE-1); 708 if (strcmp(sv->s_proto, "tcp") == 0) 709 table = &tporttable[i]; 710 else if (strcmp(sv->s_proto, "udp") == 0) 711 table = &uporttable[i]; 712 else 713 continue; 714 715 while (table->name) 716 table = table->nxt; 717 if (nflag) { 718 (void)snprintf(buf, sizeof(buf), "%d", port); 719 table->name = strdup(buf); 720 } else 721 table->name = strdup(sv->s_name); 722 table->addr = port; 723 table->nxt = newhnamemem(); 724 } 725 endservent(); 726 } 727 728 /* in libpcap.a (nametoaddr.c) */ 729 #if defined(WIN32) && !defined(USE_STATIC_LIBPCAP) 730 __declspec(dllimport) 731 #else 732 extern 733 #endif 734 const struct eproto { 735 const char *s; 736 u_short p; 737 } eproto_db[]; 738 739 static void 740 init_eprotoarray(void) 741 { 742 register int i; 743 register struct hnamemem *table; 744 745 for (i = 0; eproto_db[i].s; i++) { 746 int j = htons(eproto_db[i].p) & (HASHNAMESIZE-1); 747 table = &eprototable[j]; 748 while (table->name) 749 table = table->nxt; 750 table->name = eproto_db[i].s; 751 table->addr = htons(eproto_db[i].p); 752 table->nxt = newhnamemem(); 753 } 754 } 755 756 static const struct protoidlist { 757 const u_char protoid[5]; 758 const char *name; 759 } protoidlist[] = { 760 {{ 0x00, 0x00, 0x0c, 0x01, 0x07 }, "CiscoMLS" }, 761 {{ 0x00, 0x00, 0x0c, 0x20, 0x00 }, "CiscoCDP" }, 762 {{ 0x00, 0x00, 0x0c, 0x20, 0x01 }, "CiscoCGMP" }, 763 {{ 0x00, 0x00, 0x0c, 0x20, 0x03 }, "CiscoVTP" }, 764 {{ 0x00, 0xe0, 0x2b, 0x00, 0xbb }, "ExtremeEDP" }, 765 {{ 0x00, 0x00, 0x00, 0x00, 0x00 }, NULL } 766 }; 767 768 /* 769 * SNAP proto IDs with org code 0:0:0 are actually encapsulated Ethernet 770 * types. 771 */ 772 static void 773 init_protoidarray(void) 774 { 775 register int i; 776 register struct protoidmem *tp; 777 const struct protoidlist *pl; 778 u_char protoid[5]; 779 780 protoid[0] = 0; 781 protoid[1] = 0; 782 protoid[2] = 0; 783 for (i = 0; eproto_db[i].s; i++) { 784 u_short etype = htons(eproto_db[i].p); 785 786 memcpy((char *)&protoid[3], (char *)&etype, 2); 787 tp = lookup_protoid(protoid); 788 tp->p_name = strdup(eproto_db[i].s); 789 } 790 /* Hardwire some SNAP proto ID names */ 791 for (pl = protoidlist; pl->name != NULL; ++pl) { 792 tp = lookup_protoid(pl->protoid); 793 /* Don't override existing name */ 794 if (tp->p_name != NULL) 795 continue; 796 797 tp->p_name = pl->name; 798 } 799 } 800 801 static const struct etherlist { 802 const u_char addr[6]; 803 const char *name; 804 } etherlist[] = { 805 {{ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff }, "Broadcast" }, 806 {{ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, NULL } 807 }; 808 809 /* 810 * Initialize the ethers hash table. We take two different approaches 811 * depending on whether or not the system provides the ethers name 812 * service. If it does, we just wire in a few names at startup, 813 * and etheraddr_string() fills in the table on demand. If it doesn't, 814 * then we suck in the entire /etc/ethers file at startup. The idea 815 * is that parsing the local file will be fast, but spinning through 816 * all the ethers entries via NIS & next_etherent might be very slow. 817 * 818 * XXX pcap_next_etherent doesn't belong in the pcap interface, but 819 * since the pcap module already does name-to-address translation, 820 * it's already does most of the work for the ethernet address-to-name 821 * translation, so we just pcap_next_etherent as a convenience. 822 */ 823 static void 824 init_etherarray(void) 825 { 826 register const struct etherlist *el; 827 register struct enamemem *tp; 828 #ifdef USE_ETHER_NTOHOST 829 char name[256]; 830 #else 831 register struct pcap_etherent *ep; 832 register FILE *fp; 833 834 /* Suck in entire ethers file */ 835 fp = fopen(PCAP_ETHERS_FILE, "r"); 836 if (fp != NULL) { 837 while ((ep = pcap_next_etherent(fp)) != NULL) { 838 tp = lookup_emem(ep->addr); 839 tp->e_name = strdup(ep->name); 840 } 841 (void)fclose(fp); 842 } 843 #endif 844 845 /* Hardwire some ethernet names */ 846 for (el = etherlist; el->name != NULL; ++el) { 847 tp = lookup_emem(el->addr); 848 /* Don't override existing name */ 849 if (tp->e_name != NULL) 850 continue; 851 852 #ifdef USE_ETHER_NTOHOST 853 /* 854 * Use YP/NIS version of name if available. 855 * 856 * We don't cast it to "const struct ether_addr *" 857 * because some systems don't modify the Ethernet 858 * address but fail to declare the second argument 859 * as a "const" pointer. 860 */ 861 if (ether_ntohost(name, (struct ether_addr *)el->addr) == 0) { 862 tp->e_name = strdup(name); 863 continue; 864 } 865 #endif 866 tp->e_name = el->name; 867 } 868 } 869 870 static const struct tok ipxsap_db[] = { 871 { 0x0000, "Unknown" }, 872 { 0x0001, "User" }, 873 { 0x0002, "User Group" }, 874 { 0x0003, "PrintQueue" }, 875 { 0x0004, "FileServer" }, 876 { 0x0005, "JobServer" }, 877 { 0x0006, "Gateway" }, 878 { 0x0007, "PrintServer" }, 879 { 0x0008, "ArchiveQueue" }, 880 { 0x0009, "ArchiveServer" }, 881 { 0x000a, "JobQueue" }, 882 { 0x000b, "Administration" }, 883 { 0x000F, "Novell TI-RPC" }, 884 { 0x0017, "Diagnostics" }, 885 { 0x0020, "NetBIOS" }, 886 { 0x0021, "NAS SNA Gateway" }, 887 { 0x0023, "NACS AsyncGateway" }, 888 { 0x0024, "RemoteBridge/RoutingService" }, 889 { 0x0026, "BridgeServer" }, 890 { 0x0027, "TCP/IP Gateway" }, 891 { 0x0028, "Point-to-point X.25 BridgeServer" }, 892 { 0x0029, "3270 Gateway" }, 893 { 0x002a, "CHI Corp" }, 894 { 0x002c, "PC Chalkboard" }, 895 { 0x002d, "TimeSynchServer" }, 896 { 0x002e, "ARCserve5.0/PalindromeBackup" }, 897 { 0x0045, "DI3270 Gateway" }, 898 { 0x0047, "AdvertisingPrintServer" }, 899 { 0x004a, "NetBlazerModems" }, 900 { 0x004b, "BtrieveVAP" }, 901 { 0x004c, "NetwareSQL" }, 902 { 0x004d, "XtreeNetwork" }, 903 { 0x0050, "BtrieveVAP4.11" }, 904 { 0x0052, "QuickLink" }, 905 { 0x0053, "PrintQueueUser" }, 906 { 0x0058, "Multipoint X.25 Router" }, 907 { 0x0060, "STLB/NLM" }, 908 { 0x0064, "ARCserve" }, 909 { 0x0066, "ARCserve3.0" }, 910 { 0x0072, "WAN CopyUtility" }, 911 { 0x007a, "TES-NetwareVMS" }, 912 { 0x0092, "WATCOM Debugger/EmeraldTapeBackupServer" }, 913 { 0x0095, "DDA OBGYN" }, 914 { 0x0098, "NetwareAccessServer" }, 915 { 0x009a, "Netware for VMS II/NamedPipeServer" }, 916 { 0x009b, "NetwareAccessServer" }, 917 { 0x009e, "PortableNetwareServer/SunLinkNVT" }, 918 { 0x00a1, "PowerchuteAPC UPS" }, 919 { 0x00aa, "LAWserve" }, 920 { 0x00ac, "CompaqIDA StatusMonitor" }, 921 { 0x0100, "PIPE STAIL" }, 922 { 0x0102, "LAN ProtectBindery" }, 923 { 0x0103, "OracleDataBaseServer" }, 924 { 0x0107, "Netware386/RSPX RemoteConsole" }, 925 { 0x010f, "NovellSNA Gateway" }, 926 { 0x0111, "TestServer" }, 927 { 0x0112, "HP PrintServer" }, 928 { 0x0114, "CSA MUX" }, 929 { 0x0115, "CSA LCA" }, 930 { 0x0116, "CSA CM" }, 931 { 0x0117, "CSA SMA" }, 932 { 0x0118, "CSA DBA" }, 933 { 0x0119, "CSA NMA" }, 934 { 0x011a, "CSA SSA" }, 935 { 0x011b, "CSA STATUS" }, 936 { 0x011e, "CSA APPC" }, 937 { 0x0126, "SNA TEST SSA Profile" }, 938 { 0x012a, "CSA TRACE" }, 939 { 0x012b, "NetwareSAA" }, 940 { 0x012e, "IKARUS VirusScan" }, 941 { 0x0130, "CommunicationsExecutive" }, 942 { 0x0133, "NNS DomainServer/NetwareNamingServicesDomain" }, 943 { 0x0135, "NetwareNamingServicesProfile" }, 944 { 0x0137, "Netware386 PrintQueue/NNS PrintQueue" }, 945 { 0x0141, "LAN SpoolServer" }, 946 { 0x0152, "IRMALAN Gateway" }, 947 { 0x0154, "NamedPipeServer" }, 948 { 0x0166, "NetWareManagement" }, 949 { 0x0168, "Intel PICKIT CommServer/Intel CAS TalkServer" }, 950 { 0x0173, "Compaq" }, 951 { 0x0174, "Compaq SNMP Agent" }, 952 { 0x0175, "Compaq" }, 953 { 0x0180, "XTreeServer/XTreeTools" }, 954 { 0x018A, "NASI ServicesBroadcastServer" }, 955 { 0x01b0, "GARP Gateway" }, 956 { 0x01b1, "Binfview" }, 957 { 0x01bf, "IntelLanDeskManager" }, 958 { 0x01ca, "AXTEC" }, 959 { 0x01cb, "ShivaNetModem/E" }, 960 { 0x01cc, "ShivaLanRover/E" }, 961 { 0x01cd, "ShivaLanRover/T" }, 962 { 0x01ce, "ShivaUniversal" }, 963 { 0x01d8, "CastelleFAXPressServer" }, 964 { 0x01da, "CastelleLANPressPrintServer" }, 965 { 0x01dc, "CastelleFAX/Xerox7033 FaxServer/ExcelLanFax" }, 966 { 0x01f0, "LEGATO" }, 967 { 0x01f5, "LEGATO" }, 968 { 0x0233, "NMS Agent/NetwareManagementAgent" }, 969 { 0x0237, "NMS IPX Discovery/LANternReadWriteChannel" }, 970 { 0x0238, "NMS IP Discovery/LANternTrapAlarmChannel" }, 971 { 0x023a, "LANtern" }, 972 { 0x023c, "MAVERICK" }, 973 { 0x023f, "NovellSMDR" }, 974 { 0x024e, "NetwareConnect" }, 975 { 0x024f, "NASI ServerBroadcast Cisco" }, 976 { 0x026a, "NMS ServiceConsole" }, 977 { 0x026b, "TimeSynchronizationServer Netware 4.x" }, 978 { 0x0278, "DirectoryServer Netware 4.x" }, 979 { 0x027b, "NetwareManagementAgent" }, 980 { 0x0280, "Novell File and Printer Sharing Service for PC" }, 981 { 0x0304, "NovellSAA Gateway" }, 982 { 0x0308, "COM/VERMED" }, 983 { 0x030a, "GalacticommWorldgroupServer" }, 984 { 0x030c, "IntelNetport2/HP JetDirect/HP Quicksilver" }, 985 { 0x0320, "AttachmateGateway" }, 986 { 0x0327, "MicrosoftDiagnostiocs" }, 987 { 0x0328, "WATCOM SQL Server" }, 988 { 0x0335, "MultiTechSystems MultisynchCommServer" }, 989 { 0x0343, "Xylogics RemoteAccessServer/LANModem" }, 990 { 0x0355, "ArcadaBackupExec" }, 991 { 0x0358, "MSLCD1" }, 992 { 0x0361, "NETINELO" }, 993 { 0x037e, "Powerchute UPS Monitoring" }, 994 { 0x037f, "ViruSafeNotify" }, 995 { 0x0386, "HP Bridge" }, 996 { 0x0387, "HP Hub" }, 997 { 0x0394, "NetWare SAA Gateway" }, 998 { 0x039b, "LotusNotes" }, 999 { 0x03b7, "CertusAntiVirus" }, 1000 { 0x03c4, "ARCserve4.0" }, 1001 { 0x03c7, "LANspool3.5" }, 1002 { 0x03d7, "LexmarkPrinterServer" }, 1003 { 0x03d8, "LexmarkXLE PrinterServer" }, 1004 { 0x03dd, "BanyanENS NetwareClient" }, 1005 { 0x03de, "GuptaSequelBaseServer/NetWareSQL" }, 1006 { 0x03e1, "UnivelUnixware" }, 1007 { 0x03e4, "UnivelUnixware" }, 1008 { 0x03fc, "IntelNetport" }, 1009 { 0x03fd, "PrintServerQueue" }, 1010 { 0x040A, "ipnServer" }, 1011 { 0x040D, "LVERRMAN" }, 1012 { 0x040E, "LVLIC" }, 1013 { 0x0414, "NET Silicon (DPI)/Kyocera" }, 1014 { 0x0429, "SiteLockVirus" }, 1015 { 0x0432, "UFHELPR???" }, 1016 { 0x0433, "Synoptics281xAdvancedSNMPAgent" }, 1017 { 0x0444, "MicrosoftNT SNA Server" }, 1018 { 0x0448, "Oracle" }, 1019 { 0x044c, "ARCserve5.01" }, 1020 { 0x0457, "CanonGP55" }, 1021 { 0x045a, "QMS Printers" }, 1022 { 0x045b, "DellSCSI Array" }, 1023 { 0x0491, "NetBlazerModems" }, 1024 { 0x04ac, "OnTimeScheduler" }, 1025 { 0x04b0, "CD-Net" }, 1026 { 0x0513, "EmulexNQA" }, 1027 { 0x0520, "SiteLockChecks" }, 1028 { 0x0529, "SiteLockChecks" }, 1029 { 0x052d, "CitrixOS2 AppServer" }, 1030 { 0x0535, "Tektronix" }, 1031 { 0x0536, "Milan" }, 1032 { 0x055d, "Attachmate SNA gateway" }, 1033 { 0x056b, "IBM8235 ModemServer" }, 1034 { 0x056c, "ShivaLanRover/E PLUS" }, 1035 { 0x056d, "ShivaLanRover/T PLUS" }, 1036 { 0x0580, "McAfeeNetShield" }, 1037 { 0x05B8, "NLM to workstation communication (Revelation Software)" }, 1038 { 0x05BA, "CompatibleSystemsRouters" }, 1039 { 0x05BE, "CheyenneHierarchicalStorageManager" }, 1040 { 0x0606, "JCWatermarkImaging" }, 1041 { 0x060c, "AXISNetworkPrinter" }, 1042 { 0x0610, "AdaptecSCSIManagement" }, 1043 { 0x0621, "IBM AntiVirus" }, 1044 { 0x0640, "Windows95 RemoteRegistryService" }, 1045 { 0x064e, "MicrosoftIIS" }, 1046 { 0x067b, "Microsoft Win95/98 File and Print Sharing for NetWare" }, 1047 { 0x067c, "Microsoft Win95/98 File and Print Sharing for NetWare" }, 1048 { 0x076C, "Xerox" }, 1049 { 0x079b, "ShivaLanRover/E 115" }, 1050 { 0x079c, "ShivaLanRover/T 115" }, 1051 { 0x07B4, "CubixWorldDesk" }, 1052 { 0x07c2, "Quarterdeck IWare Connect V2.x NLM" }, 1053 { 0x07c1, "Quarterdeck IWare Connect V3.x NLM" }, 1054 { 0x0810, "ELAN License Server Demo" }, 1055 { 0x0824, "ShivaLanRoverAccessSwitch/E" }, 1056 { 0x086a, "ISSC Collector" }, 1057 { 0x087f, "ISSC DAS AgentAIX" }, 1058 { 0x0880, "Intel Netport PRO" }, 1059 { 0x0881, "Intel Netport PRO" }, 1060 { 0x0b29, "SiteLock" }, 1061 { 0x0c29, "SiteLockApplications" }, 1062 { 0x0c2c, "LicensingServer" }, 1063 { 0x2101, "PerformanceTechnologyInstantInternet" }, 1064 { 0x2380, "LAI SiteLock" }, 1065 { 0x238c, "MeetingMaker" }, 1066 { 0x4808, "SiteLockServer/SiteLockMetering" }, 1067 { 0x5555, "SiteLockUser" }, 1068 { 0x6312, "Tapeware" }, 1069 { 0x6f00, "RabbitGateway" }, 1070 { 0x7703, "MODEM" }, 1071 { 0x8002, "NetPortPrinters" }, 1072 { 0x8008, "WordPerfectNetworkVersion" }, 1073 { 0x85BE, "Cisco EIGRP" }, 1074 { 0x8888, "WordPerfectNetworkVersion/QuickNetworkManagement" }, 1075 { 0x9000, "McAfeeNetShield" }, 1076 { 0x9604, "CSA-NT_MON" }, 1077 { 0xb6a8, "OceanIsleReachoutRemoteControl" }, 1078 { 0xf11f, "SiteLockMetering" }, 1079 { 0xf1ff, "SiteLock" }, 1080 { 0xf503, "Microsoft SQL Server" }, 1081 { 0xF905, "IBM TimeAndPlace" }, 1082 { 0xfbfb, "TopCallIII FaxServer" }, 1083 { 0xffff, "AnyService/Wildcard" }, 1084 { 0, (char *)0 } 1085 }; 1086 1087 static void 1088 init_ipxsaparray(void) 1089 { 1090 register int i; 1091 register struct hnamemem *table; 1092 1093 for (i = 0; ipxsap_db[i].s != NULL; i++) { 1094 int j = htons(ipxsap_db[i].v) & (HASHNAMESIZE-1); 1095 table = &ipxsaptable[j]; 1096 while (table->name) 1097 table = table->nxt; 1098 table->name = ipxsap_db[i].s; 1099 table->addr = htons(ipxsap_db[i].v); 1100 table->nxt = newhnamemem(); 1101 } 1102 } 1103 1104 /* 1105 * Initialize the address to name translation machinery. We map all 1106 * non-local IP addresses to numeric addresses if fflag is true (i.e., 1107 * to prevent blocking on the nameserver). localnet is the IP address 1108 * of the local network. mask is its subnet mask. 1109 */ 1110 void 1111 init_addrtoname(u_int32_t localnet, u_int32_t mask) 1112 { 1113 if (fflag) { 1114 f_localnet = localnet; 1115 f_netmask = mask; 1116 } 1117 if (nflag) 1118 /* 1119 * Simplest way to suppress names. 1120 */ 1121 return; 1122 1123 init_etherarray(); 1124 init_servarray(); 1125 init_eprotoarray(); 1126 init_protoidarray(); 1127 init_ipxsaparray(); 1128 } 1129 1130 const char * 1131 dnaddr_string(u_short dnaddr) 1132 { 1133 register struct hnamemem *tp; 1134 1135 for (tp = &dnaddrtable[dnaddr & (HASHNAMESIZE-1)]; tp->nxt != 0; 1136 tp = tp->nxt) 1137 if (tp->addr == dnaddr) 1138 return (tp->name); 1139 1140 tp->addr = dnaddr; 1141 tp->nxt = newhnamemem(); 1142 if (nflag) 1143 tp->name = dnnum_string(dnaddr); 1144 else 1145 tp->name = dnname_string(dnaddr); 1146 1147 return(tp->name); 1148 } 1149 1150 /* Return a zero'ed hnamemem struct and cuts down on calloc() overhead */ 1151 struct hnamemem * 1152 newhnamemem(void) 1153 { 1154 register struct hnamemem *p; 1155 static struct hnamemem *ptr = NULL; 1156 static u_int num = 0; 1157 1158 if (num <= 0) { 1159 num = 64; 1160 ptr = (struct hnamemem *)calloc(num, sizeof (*ptr)); 1161 if (ptr == NULL) 1162 error("newhnamemem: calloc"); 1163 } 1164 --num; 1165 p = ptr++; 1166 return (p); 1167 } 1168 1169 #ifdef INET6 1170 /* Return a zero'ed h6namemem struct and cuts down on calloc() overhead */ 1171 struct h6namemem * 1172 newh6namemem(void) 1173 { 1174 register struct h6namemem *p; 1175 static struct h6namemem *ptr = NULL; 1176 static u_int num = 0; 1177 1178 if (num <= 0) { 1179 num = 64; 1180 ptr = (struct h6namemem *)calloc(num, sizeof (*ptr)); 1181 if (ptr == NULL) 1182 error("newh6namemem: calloc"); 1183 } 1184 --num; 1185 p = ptr++; 1186 return (p); 1187 } 1188 #endif /* INET6 */ 1189