1 /* 2 * Copyright (c) 1994, 1995, 1996 3 * The Regents of the University of California. All rights reserved. 4 * 5 * Redistribution and use in source and binary forms, with or without 6 * modification, are permitted provided that the following conditions 7 * are met: 8 * 1. Redistributions of source code must retain the above copyright 9 * notice, this list of conditions and the following disclaimer. 10 * 2. Redistributions in binary form must reproduce the above copyright 11 * notice, this list of conditions and the following disclaimer in the 12 * documentation and/or other materials provided with the distribution. 13 * 3. All advertising materials mentioning features or use of this software 14 * must display the following acknowledgement: 15 * This product includes software developed by the Computer Systems 16 * Engineering Group at Lawrence Berkeley Laboratory. 17 * 4. Neither the name of the University nor of the Laboratory may be used 18 * to endorse or promote products derived from this software without 19 * specific prior written permission. 20 * 21 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 24 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 31 * SUCH DAMAGE. 32 */ 33 34 #ifndef pcap_int_h 35 #define pcap_int_h 36 37 #include <stddef.h> 38 39 #include <signal.h> 40 41 #include <pcap/pcap.h> 42 43 #ifdef MSDOS 44 #include <fcntl.h> 45 #include <io.h> 46 #endif 47 48 #include "varattrs.h" 49 #include "fmtutils.h" 50 51 #include <stdarg.h> 52 53 #include "portability.h" 54 55 #define PCAP_DEBUG {printf(" [%s:%d %s] ", __FILE__, __LINE__, __func__); fflush(stdout);} 56 57 /* 58 * If we're compiling with Visual Studio, make sure we have at least 59 * VS 2015 or later, so we have sufficient C99 support. 60 * 61 * XXX - verify that we have at least C99 support on UN*Xes? 62 * 63 * What about MinGW or various DOS toolchains? We're currently assuming 64 * sufficient C99 support there. 65 */ 66 #if defined(_MSC_VER) 67 /* 68 * Compiler is MSVC. Make sure we have VS 2015 or later. 69 */ 70 #if _MSC_VER < 1900 71 #error "Building libpcap requires VS 2015 or later" 72 #endif 73 #endif 74 75 /* 76 * Version string trailer. 77 * Uses SIZEOF_TIME_T from config.h. 78 * (There's no need to announce the pointer size; if it doesn't 79 * match the pointer size in code linked with libpcap, either 80 * build-time linking or run-time linking will fail.) 81 */ 82 #if SIZEOF_TIME_T == 8 83 #define PCAP_SIZEOF_TIME_T_BITS_STRING "64" 84 #elif SIZEOF_TIME_T == 4 85 #define PCAP_SIZEOF_TIME_T_BITS_STRING "32" 86 #else 87 #error Unknown time_t size 88 #endif 89 90 /* 91 * Version string. 92 * Uses PACKAGE_VERSION from config.h and PCAP_SIZEOF_TIME_T_BITS_STRING. 93 */ 94 #define PCAP_VERSION_STRING \ 95 "libpcap version " PACKAGE_VERSION " (" PCAP_SIZEOF_TIME_T_BITS_STRING "-bit time_t)" 96 #define PCAP_VERSION_STRING_WITH_ADDITIONAL_INFO(additional_info) \ 97 "libpcap version " PACKAGE_VERSION " (" PCAP_SIZEOF_TIME_T_BITS_STRING "-bit time_t, " additional_info ")" 98 99 #ifdef __cplusplus 100 extern "C" { 101 #endif 102 103 /* 104 * If pcapint_new_api is set, we disable pcap_lookupdev(), because: 105 * 106 * it's not thread-safe, and is marked as deprecated, on all 107 * platforms; 108 * 109 * on Windows, it may return UTF-16LE strings, which the program 110 * might then pass to pcap_create() (or to pcap_open_live(), which 111 * then passes them to pcap_create()), requiring pcap_create() to 112 * check for UTF-16LE strings using a hack, and that hack 1) 113 * *cannot* be 100% reliable and 2) runs the risk of going past the 114 * end of the string. 115 * 116 * We keep it around in legacy mode for compatibility. 117 * 118 * We also disable the aforementioned hack in pcap_create(). 119 */ 120 extern int pcapint_new_api; 121 122 /* 123 * If pcapint_utf_8_mode is set, on Windows we treat strings as UTF-8. 124 * 125 * On UN*Xes, we assume all strings are and should be in UTF-8, regardless 126 * of the setting of this flag. 127 */ 128 extern int pcapint_utf_8_mode; 129 130 /* 131 * Swap byte ordering of unsigned long long timestamp on a big endian 132 * machine. 133 */ 134 #define SWAPLL(ull) ((ull & 0xff00000000000000ULL) >> 56) | \ 135 ((ull & 0x00ff000000000000ULL) >> 40) | \ 136 ((ull & 0x0000ff0000000000ULL) >> 24) | \ 137 ((ull & 0x000000ff00000000ULL) >> 8) | \ 138 ((ull & 0x00000000ff000000ULL) << 8) | \ 139 ((ull & 0x0000000000ff0000ULL) << 24) | \ 140 ((ull & 0x000000000000ff00ULL) << 40) | \ 141 ((ull & 0x00000000000000ffULL) << 56) 142 143 /* 144 * Maximum snapshot length. 145 * 146 * Somewhat arbitrary, but chosen to be: 147 * 148 * 1) big enough for maximum-size Linux loopback packets (65549) 149 * and some USB packets captured with USBPcap: 150 * 151 * https://desowin.org/usbpcap/ 152 * 153 * (> 131072, < 262144) 154 * 155 * and 156 * 157 * 2) small enough not to cause attempts to allocate huge amounts of 158 * memory; some applications might use the snapshot length in a 159 * savefile header to control the size of the buffer they allocate, 160 * so a size of, say, 2^31-1 might not work well. (libpcap uses it 161 * as a hint, but doesn't start out allocating a buffer bigger than 162 * 2 KiB, and grows the buffer as necessary, but not beyond the 163 * per-linktype maximum snapshot length. Other code might naively 164 * use it; we want to avoid writing a too-large snapshot length, 165 * in order not to cause that code problems.) 166 * 167 * We don't enforce this in pcap_set_snaplen(), but we use it internally. 168 */ 169 #define MAXIMUM_SNAPLEN 262144 170 171 /* 172 * Locale-independent macros for testing character types. 173 * These can be passed any integral value, without worrying about, for 174 * example, sign-extending char values, unlike the C macros. 175 */ 176 #define PCAP_ISDIGIT(c) \ 177 ((c) >= '0' && (c) <= '9') 178 #define PCAP_ISXDIGIT(c) \ 179 (((c) >= '0' && (c) <= '9') || \ 180 ((c) >= 'A' && (c) <= 'F') || \ 181 ((c) >= 'a' && (c) <= 'f')) 182 183 struct pcap_opt { 184 char *device; 185 int timeout; /* timeout for buffering */ 186 u_int buffer_size; 187 int promisc; 188 int rfmon; /* monitor mode */ 189 int immediate; /* immediate mode - deliver packets as soon as they arrive */ 190 int nonblock; /* non-blocking mode - don't wait for packets to be delivered, return "no packets available" */ 191 int tstamp_type; 192 int tstamp_precision; 193 194 /* 195 * Platform-dependent options. 196 */ 197 #ifdef __linux__ 198 int protocol; /* protocol to use when creating PF_PACKET socket */ 199 #endif 200 #ifdef _WIN32 201 int nocapture_local;/* disable NPF loopback */ 202 #endif 203 }; 204 205 typedef int (*activate_op_t)(pcap_t *); 206 typedef int (*can_set_rfmon_op_t)(pcap_t *); 207 typedef int (*read_op_t)(pcap_t *, int cnt, pcap_handler, u_char *); 208 typedef int (*next_packet_op_t)(pcap_t *, struct pcap_pkthdr *, u_char **); 209 typedef int (*inject_op_t)(pcap_t *, const void *, int); 210 typedef void (*save_current_filter_op_t)(pcap_t *, const char *); 211 typedef int (*setfilter_op_t)(pcap_t *, struct bpf_program *); 212 typedef int (*setdirection_op_t)(pcap_t *, pcap_direction_t); 213 typedef int (*set_datalink_op_t)(pcap_t *, int); 214 typedef int (*getnonblock_op_t)(pcap_t *); 215 typedef int (*setnonblock_op_t)(pcap_t *, int); 216 typedef int (*stats_op_t)(pcap_t *, struct pcap_stat *); 217 typedef void (*breakloop_op_t)(pcap_t *); 218 #ifdef _WIN32 219 typedef struct pcap_stat *(*stats_ex_op_t)(pcap_t *, int *); 220 typedef int (*setbuff_op_t)(pcap_t *, int); 221 typedef int (*setmode_op_t)(pcap_t *, int); 222 typedef int (*setmintocopy_op_t)(pcap_t *, int); 223 typedef HANDLE (*getevent_op_t)(pcap_t *); 224 typedef int (*oid_get_request_op_t)(pcap_t *, bpf_u_int32, void *, size_t *); 225 typedef int (*oid_set_request_op_t)(pcap_t *, bpf_u_int32, const void *, size_t *); 226 typedef u_int (*sendqueue_transmit_op_t)(pcap_t *, pcap_send_queue *, int); 227 typedef int (*setuserbuffer_op_t)(pcap_t *, int); 228 typedef int (*live_dump_op_t)(pcap_t *, char *, int, int); 229 typedef int (*live_dump_ended_op_t)(pcap_t *, int); 230 typedef PAirpcapHandle (*get_airpcap_handle_op_t)(pcap_t *); 231 #endif 232 typedef void (*cleanup_op_t)(pcap_t *); 233 234 /* 235 * We put all the stuff used in the read code path at the beginning, 236 * to try to keep it together in the same cache line or lines. 237 */ 238 struct pcap { 239 /* 240 * Method to call to read packets on a live capture. 241 */ 242 read_op_t read_op; 243 244 /* 245 * Method to call to read the next packet from a savefile. 246 */ 247 next_packet_op_t next_packet_op; 248 249 #ifdef _WIN32 250 HANDLE handle; 251 #else 252 int fd; 253 #endif /* _WIN32 */ 254 255 /* 256 * Read buffer. 257 */ 258 u_int bufsize; 259 void *buffer; 260 u_char *bp; 261 int cc; 262 263 sig_atomic_t break_loop; /* flag set to force break from packet-reading loop */ 264 265 void *priv; /* private data for methods */ 266 267 #ifdef ENABLE_REMOTE 268 struct pcap_samp rmt_samp; /* parameters related to the sampling process. */ 269 #endif 270 271 int swapped; 272 FILE *rfile; /* null if live capture, non-null if savefile */ 273 u_int fddipad; 274 struct pcap *next; /* list of open pcaps that need stuff cleared on close */ 275 276 /* 277 * File version number; meaningful only for a savefile, but we 278 * keep it here so that apps that (mistakenly) ask for the 279 * version numbers will get the same zero values that they 280 * always did. 281 */ 282 int version_major; 283 int version_minor; 284 285 int snapshot; 286 int linktype; /* Network linktype */ 287 int linktype_ext; /* Extended information stored in the linktype field of a file */ 288 int offset; /* offset for proper alignment */ 289 int activated; /* true if the capture is really started */ 290 int oldstyle; /* if we're opening with pcap_open_live() */ 291 292 struct pcap_opt opt; 293 294 /* 295 * Place holder for pcap_next(). 296 */ 297 u_char *pkt; 298 299 #ifdef _WIN32 300 struct pcap_stat stat; /* used for pcap_stats_ex() */ 301 #endif 302 303 /* We're accepting only packets in this direction/these directions. */ 304 pcap_direction_t direction; 305 306 /* 307 * Flags to affect BPF code generation. 308 */ 309 int bpf_codegen_flags; 310 311 #if !defined(_WIN32) && !defined(MSDOS) 312 int selectable_fd; /* FD on which select()/poll()/epoll_wait()/kevent()/etc. can be done */ 313 314 /* 315 * In case there either is no selectable FD, or there is but 316 * it doesn't necessarily work (e.g., if it doesn't get notified 317 * if the packet capture timeout expires before the buffer 318 * fills up), this points to a timeout that should be used 319 * in select()/poll()/epoll_wait()/kevent() call. The pcap_t should 320 * be put into non-blocking mode, and, if the timeout expires on 321 * the call, an attempt should be made to read packets from all 322 * pcap_t's with a required timeout, and the code must be 323 * prepared not to see any packets from the attempt. 324 */ 325 const struct timeval *required_select_timeout; 326 #endif 327 328 /* 329 * Placeholder for filter code if bpf not in kernel. 330 */ 331 struct bpf_program fcode; 332 333 char errbuf[PCAP_ERRBUF_SIZE + 1]; 334 #ifdef _WIN32 335 char acp_errbuf[PCAP_ERRBUF_SIZE + 1]; /* buffer for local code page error strings */ 336 #endif 337 int dlt_count; 338 u_int *dlt_list; 339 int tstamp_type_count; 340 u_int *tstamp_type_list; 341 int tstamp_precision_count; 342 u_int *tstamp_precision_list; 343 344 struct pcap_pkthdr pcap_header; /* This is needed for the pcap_next_ex() to work */ 345 346 /* 347 * More methods. 348 */ 349 activate_op_t activate_op; 350 can_set_rfmon_op_t can_set_rfmon_op; 351 inject_op_t inject_op; 352 save_current_filter_op_t save_current_filter_op; 353 setfilter_op_t setfilter_op; 354 setdirection_op_t setdirection_op; 355 set_datalink_op_t set_datalink_op; 356 getnonblock_op_t getnonblock_op; 357 setnonblock_op_t setnonblock_op; 358 stats_op_t stats_op; 359 breakloop_op_t breakloop_op; 360 361 /* 362 * Routine to use as callback for pcap_next()/pcap_next_ex(). 363 */ 364 pcap_handler oneshot_callback; 365 366 #ifdef _WIN32 367 /* 368 * These are, at least currently, specific to the Win32 NPF 369 * driver. 370 */ 371 stats_ex_op_t stats_ex_op; 372 setbuff_op_t setbuff_op; 373 setmode_op_t setmode_op; 374 setmintocopy_op_t setmintocopy_op; 375 getevent_op_t getevent_op; 376 oid_get_request_op_t oid_get_request_op; 377 oid_set_request_op_t oid_set_request_op; 378 sendqueue_transmit_op_t sendqueue_transmit_op; 379 setuserbuffer_op_t setuserbuffer_op; 380 live_dump_op_t live_dump_op; 381 live_dump_ended_op_t live_dump_ended_op; 382 get_airpcap_handle_op_t get_airpcap_handle_op; 383 #endif 384 cleanup_op_t cleanup_op; 385 }; 386 387 /* 388 * BPF code generation flags. 389 */ 390 #define BPF_SPECIAL_VLAN_HANDLING 0x00000001 /* special VLAN handling for Linux */ 391 392 /* 393 * User data structure for the one-shot callback used for pcap_next() 394 * and pcap_next_ex(). 395 */ 396 struct oneshot_userdata { 397 struct pcap_pkthdr *hdr; 398 const u_char **pkt; 399 pcap_t *pd; 400 }; 401 402 #ifndef min 403 #define min(a, b) ((a) > (b) ? (b) : (a)) 404 #endif 405 406 int pcapint_offline_read(pcap_t *, int, pcap_handler, u_char *); 407 408 /* 409 * Does the packet count argument to a module's read routine say 410 * "supply packets until you run out of packets"? 411 */ 412 #define PACKET_COUNT_IS_UNLIMITED(count) ((count) <= 0) 413 414 /* 415 * Routines that most pcap implementations can use for non-blocking mode. 416 */ 417 #if !defined(_WIN32) && !defined(MSDOS) 418 int pcapint_getnonblock_fd(pcap_t *); 419 int pcapint_setnonblock_fd(pcap_t *p, int); 420 #endif 421 422 /* 423 * Internal interfaces for "pcap_create()". 424 * 425 * "pcapint_create_interface()" is the routine to do a pcap_create on 426 * a regular network interface. There are multiple implementations 427 * of this, one for each platform type (Linux, BPF, DLPI, etc.), 428 * with the one used chosen by the configure script. 429 * 430 * "pcapint_create_common()" allocates and fills in a pcap_t, for use 431 * by pcap_create routines. 432 */ 433 pcap_t *pcapint_create_interface(const char *, char *); 434 /* 435 * A format string for something-only libpcap builds, which use a stub 436 * implementation of pcapint_create_interface(). It contains the substring 437 * "No such device" (one of the standard descriptions of ENODEV) -- this way 438 * tcpdump can detect a particular error condition even though pcap_create() 439 * returns NULL for all errors. 440 */ 441 #define PCAP_ENODEV_MESSAGE "No such device (this build of libpcap supports %s devices only)." 442 443 /* 444 * This wrapper takes an error buffer pointer and a type to use for the 445 * private data, and calls pcapint_create_common(), passing it the error 446 * buffer pointer, the size for the private data type, in bytes, and the 447 * offset of the private data from the beginning of the structure, in 448 * bytes. 449 */ 450 #define PCAP_CREATE_COMMON(ebuf, type) \ 451 pcapint_create_common(ebuf, \ 452 sizeof (struct { pcap_t __common; type __private; }), \ 453 offsetof (struct { pcap_t __common; type __private; }, __private)) 454 pcap_t *pcapint_create_common(char *, size_t, size_t); 455 int pcapint_do_addexit(pcap_t *); 456 void pcapint_add_to_pcaps_to_close(pcap_t *); 457 void pcapint_remove_from_pcaps_to_close(pcap_t *); 458 void pcapint_cleanup_live_common(pcap_t *); 459 int pcapint_check_activated(pcap_t *); 460 void pcapint_breakloop_common(pcap_t *); 461 462 /* 463 * Internal interfaces for "pcap_findalldevs()". 464 * 465 * A pcap_if_list_t * is a reference to a list of devices. 466 * 467 * A get_if_flags_func is a platform-dependent function called to get 468 * additional interface flags. 469 * 470 * "pcapint_platform_finddevs()" is the platform-dependent routine to 471 * find local network interfaces. 472 * 473 * "pcapint_findalldevs_interfaces()" is a helper to find those interfaces 474 * using the "standard" mechanisms (SIOCGIFCONF, "getifaddrs()", etc.). 475 * 476 * "pcapint_add_dev()" adds an entry to a pcap_if_list_t. 477 * 478 * "pcap_add_any_dev()" adds an entry for the "any" device to a pcap_if_list_t. 479 * 480 * "pcapint_find_dev()" tries to find a device, by name, in a pcap_if_list_t. 481 * 482 * "pcapint_find_or_add_dev()" checks whether a device is already in a 483 * pcap_if_list_t and, if not, adds an entry for it. 484 */ 485 struct pcap_if_list; 486 typedef struct pcap_if_list pcap_if_list_t; 487 typedef int (*get_if_flags_func)(const char *, bpf_u_int32 *, char *); 488 int pcapint_platform_finddevs(pcap_if_list_t *, char *); 489 #if !defined(_WIN32) && !defined(MSDOS) 490 int pcapint_findalldevs_interfaces(pcap_if_list_t *, char *, 491 int (*)(const char *), get_if_flags_func); 492 #endif 493 pcap_if_t *pcapint_find_or_add_dev(pcap_if_list_t *, const char *, bpf_u_int32, 494 get_if_flags_func, const char *, char *); 495 pcap_if_t *pcapint_find_dev(pcap_if_list_t *, const char *); 496 pcap_if_t *pcapint_add_dev(pcap_if_list_t *, const char *, bpf_u_int32, 497 const char *, char *); 498 pcap_if_t *pcap_add_any_dev(pcap_if_list_t *, char *); 499 int pcapint_add_addr_to_dev(pcap_if_t *, struct sockaddr *, size_t, 500 struct sockaddr *, size_t, struct sockaddr *, size_t, 501 struct sockaddr *dstaddr, size_t, char *errbuf); 502 #ifndef _WIN32 503 pcap_if_t *pcapint_find_or_add_if(pcap_if_list_t *, const char *, uint64_t, 504 get_if_flags_func, char *); 505 int pcapint_add_addr_to_if(pcap_if_list_t *, const char *, uint64_t, 506 get_if_flags_func, 507 struct sockaddr *, size_t, struct sockaddr *, size_t, 508 struct sockaddr *, size_t, struct sockaddr *, size_t, char *); 509 #endif 510 511 /* 512 * Internal interfaces for "pcap_open_offline()" and other savefile 513 * I/O routines. 514 * 515 * "pcapint_open_offline_common()" allocates and fills in a pcap_t, for use 516 * by pcap_open_offline routines. 517 * 518 * "pcapint_adjust_snapshot()" adjusts the snapshot to be non-zero and 519 * fit within an int. 520 * 521 * "pcapint_sf_cleanup()" closes the file handle associated with a pcap_t, if 522 * appropriate, and frees all data common to all modules for handling 523 * savefile types. 524 * 525 * "pcapint_charset_fopen()", in UTF-8 mode on Windows, does an fopen() that 526 * treats the pathname as being in UTF-8, rather than the local 527 * code page, on Windows. 528 */ 529 530 /* 531 * This wrapper takes an error buffer pointer and a type to use for the 532 * private data, and calls pcapint_create_common(), passing it the error 533 * buffer pointer, the size for the private data type, in bytes, and the 534 * offset of the private data from the beginning of the structure, in 535 * bytes. 536 */ 537 #define PCAP_OPEN_OFFLINE_COMMON(ebuf, type) \ 538 pcapint_open_offline_common(ebuf, \ 539 sizeof (struct { pcap_t __common; type __private; }), \ 540 offsetof (struct { pcap_t __common; type __private; }, __private)) 541 pcap_t *pcapint_open_offline_common(char *ebuf, size_t total_size, 542 size_t private_data); 543 bpf_u_int32 pcapint_adjust_snapshot(bpf_u_int32 linktype, bpf_u_int32 snaplen); 544 void pcapint_sf_cleanup(pcap_t *p); 545 #ifdef _WIN32 546 FILE *pcapint_charset_fopen(const char *path, const char *mode); 547 #else 548 /* 549 * On other OSes, just use Boring Old fopen(). 550 */ 551 #define pcapint_charset_fopen(path, mode) fopen((path), (mode)) 552 #endif 553 554 /* 555 * Internal interfaces for loading code at run time. 556 */ 557 #ifdef _WIN32 558 #define pcap_code_handle_t HMODULE 559 560 pcap_code_handle_t pcapint_load_code(const char *); 561 void *pcapint_find_function(pcap_code_handle_t, const char *); 562 #endif 563 564 /* 565 * Internal interfaces for doing user-mode filtering of packets and 566 * validating filter programs. 567 */ 568 /* 569 * Auxiliary data, for use when interpreting a filter intended for the 570 * Linux kernel when the kernel rejects the filter (requiring us to 571 * run it in userland). It contains VLAN tag information. 572 */ 573 struct pcap_bpf_aux_data { 574 u_short vlan_tag_present; 575 u_short vlan_tag; 576 }; 577 578 /* 579 * Filtering routine that takes the auxiliary data as an additional 580 * argument. 581 */ 582 u_int pcapint_filter_with_aux_data(const struct bpf_insn *, 583 const u_char *, u_int, u_int, const struct pcap_bpf_aux_data *); 584 585 /* 586 * Filtering routine that doesn't. 587 */ 588 u_int pcapint_filter(const struct bpf_insn *, const u_char *, u_int, u_int); 589 590 /* 591 * Routine to validate a BPF program. 592 */ 593 int pcapint_validate_filter(const struct bpf_insn *, int); 594 595 /* 596 * Internal interfaces for both "pcap_create()" and routines that 597 * open savefiles. 598 * 599 * "pcapint_oneshot()" is the standard one-shot callback for "pcap_next()" 600 * and "pcap_next_ex()". 601 */ 602 void pcapint_oneshot(u_char *, const struct pcap_pkthdr *, const u_char *); 603 604 int pcapint_install_bpf_program(pcap_t *, struct bpf_program *); 605 606 int pcapint_strcasecmp(const char *, const char *); 607 608 /* 609 * Internal interfaces for pcap_createsrcstr and pcap_parsesrcstr with 610 * the additional bit of information regarding SSL support (rpcap:// vs. 611 * rpcaps://). 612 */ 613 int pcapint_createsrcstr_ex(char *, int, const char *, const char *, 614 const char *, unsigned char, char *); 615 int pcapint_parsesrcstr_ex(const char *, int *, char *, char *, 616 char *, unsigned char *, char *); 617 618 #ifdef YYDEBUG 619 extern int pcap_debug; 620 #endif 621 622 #ifdef __cplusplus 623 } 624 #endif 625 626 #endif 627