diff options
author | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-10 20:34:10 +0000 |
---|---|---|
committer | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-10 20:34:10 +0000 |
commit | e4ba6dbc3f1e76890b22773807ea37fe8fa2b1bc (patch) | |
tree | 68cb5ef9081156392f1dd62a00c6ccc1451b93df /ui/tap-tcp-stream.c | |
parent | Initial commit. (diff) | |
download | wireshark-e4ba6dbc3f1e76890b22773807ea37fe8fa2b1bc.tar.xz wireshark-e4ba6dbc3f1e76890b22773807ea37fe8fa2b1bc.zip |
Adding upstream version 4.2.2.upstream/4.2.2
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'ui/tap-tcp-stream.c')
-rw-r--r-- | ui/tap-tcp-stream.c | 400 |
1 files changed, 400 insertions, 0 deletions
diff --git a/ui/tap-tcp-stream.c b/ui/tap-tcp-stream.c new file mode 100644 index 00000000..2f96441a --- /dev/null +++ b/ui/tap-tcp-stream.c @@ -0,0 +1,400 @@ +/* tap-tcp-stream.c + * TCP stream statistics + * Originally from tcp_graph.c by Pavel Mores <pvl@uh.cz> + * Win32 port: rwh@unifiedtech.com + * + * Wireshark - Network traffic analyzer + * By Gerald Combs <gerald@wireshark.org> + * Copyright 1998 Gerald Combs + * + * SPDX-License-Identifier: GPL-2.0-or-later + */ + +#include "config.h" + + +#include <stdlib.h> + +#include <file.h> +#include <frame_tvbuff.h> + +#include <epan/epan_dissect.h> +#include <epan/packet.h> +#include <epan/tap.h> + +#include <epan/dissectors/packet-tcp.h> + +#include "ui/simple_dialog.h" + +#include "tap-tcp-stream.h" + +typedef struct _tcp_scan_t { + int direction; + struct tcp_graph *tg; + struct segment *last; +} tcp_scan_t; + + +static tap_packet_status +tapall_tcpip_packet(void *pct, packet_info *pinfo, epan_dissect_t *edt _U_, const void *vip, tap_flags_t flags _U_) +{ + tcp_scan_t *ts = (tcp_scan_t *)pct; + struct tcp_graph *tg = ts->tg; + const struct tcpheader *tcphdr = (const struct tcpheader *)vip; + + if (tg->stream == tcphdr->th_stream + && (tg->src_address.type == AT_NONE || tg->dst_address.type == AT_NONE)) { + /* + * We only know the stream number. Fill in our connection data. + * We assume that the server response is more interesting. + */ + copy_address(&tg->src_address, &tcphdr->ip_dst); + tg->src_port = tcphdr->th_dport; + copy_address(&tg->dst_address, &tcphdr->ip_src); + tg->dst_port = tcphdr->th_sport; + } + + if (compare_headers(&tg->src_address, &tg->dst_address, + tg->src_port, tg->dst_port, + &tcphdr->ip_src, &tcphdr->ip_dst, + tcphdr->th_sport, tcphdr->th_dport, + ts->direction) + && tg->stream == tcphdr->th_stream) + { + struct segment *segment = g_new(struct segment, 1); + segment->next = NULL; + segment->num = pinfo->num; + segment->rel_secs = (guint32)pinfo->rel_ts.secs; + segment->rel_usecs = pinfo->rel_ts.nsecs/1000; + /* Currently unused + segment->abs_secs = pinfo->abs_ts.secs; + segment->abs_usecs = pinfo->abs_ts.nsecs/1000; + */ + segment->th_seq = tcphdr->th_seq; + segment->th_ack = tcphdr->th_ack; + segment->th_win = tcphdr->th_win; + segment->th_flags = tcphdr->th_flags; + segment->th_sport = tcphdr->th_sport; + segment->th_dport = tcphdr->th_dport; + segment->th_seglen = tcphdr->th_seglen; + copy_address(&segment->ip_src, &tcphdr->ip_src); + copy_address(&segment->ip_dst, &tcphdr->ip_dst); + + segment->num_sack_ranges = MIN(MAX_TCP_SACK_RANGES, tcphdr->num_sack_ranges); + if (segment->num_sack_ranges > 0) { + /* Copy entries in the order they happen */ + memcpy(&segment->sack_left_edge, &tcphdr->sack_left_edge, sizeof(segment->sack_left_edge)); + memcpy(&segment->sack_right_edge, &tcphdr->sack_right_edge, sizeof(segment->sack_right_edge)); + } + + if (ts->tg->segments) { + ts->last->next = segment; + } else { + ts->tg->segments = segment; + } + ts->last = segment; + } + + return TAP_PACKET_DONT_REDRAW; +} + +/* here we collect all the external data we will ever need */ +void +graph_segment_list_get(capture_file *cf, struct tcp_graph *tg) +{ + GString *error_string; + tcp_scan_t ts; + + if (!cf || !tg) { + return; + } + + /* rescan all the packets and pick up all interesting tcp headers. + * we only filter for TCP here for speed and do the actual compare + * in the tap listener + */ + ts.direction = COMPARE_ANY_DIR; + ts.tg = tg; + ts.last = NULL; + error_string = register_tap_listener("tcp", &ts, "tcp", 0, NULL, tapall_tcpip_packet, NULL, NULL); + if (error_string) { + fprintf(stderr, "wireshark: Couldn't register tcp_graph tap: %s\n", + error_string->str); + g_string_free(error_string, TRUE); + exit(1); /* XXX: fix this */ + } + cf_retap_packets(cf); + remove_tap_listener(&ts); +} + +void +graph_segment_list_free(struct tcp_graph *tg) +{ + struct segment *segment; + + free_address(&tg->src_address); + free_address(&tg->dst_address); + + while (tg->segments) { + segment = tg->segments->next; + free_address(&tg->segments->ip_src); + free_address(&tg->segments->ip_dst); + g_free(tg->segments); + tg->segments = segment; + } +} + +int +compare_headers(address *saddr1, address *daddr1, guint16 sport1, guint16 dport1, const address *saddr2, const address *daddr2, guint16 sport2, guint16 dport2, int dir) +{ + int dir1, dir2; + + dir1 = ((!(cmp_address(saddr1, saddr2))) && + (!(cmp_address(daddr1, daddr2))) && + (sport1==sport2) && + (dport1==dport2)); + + if (dir == COMPARE_CURR_DIR) { + return dir1; + } else { + dir2 = ((!(cmp_address(saddr1, daddr2))) && + (!(cmp_address(daddr1, saddr2))) && + (sport1 == dport2) && + (dport1 == sport2)); + return dir1 || dir2; + } +} + +int +get_num_dsegs(struct tcp_graph *tg) +{ + int count; + struct segment *tmp; + + for (tmp=tg->segments, count=0; tmp; tmp=tmp->next) { + if (compare_headers(&tg->src_address, &tg->dst_address, + tg->src_port, tg->dst_port, + &tmp->ip_src, &tmp->ip_dst, + tmp->th_sport, tmp->th_dport, + COMPARE_CURR_DIR)) { + count++; + } + } + return count; +} + +int +get_num_acks(struct tcp_graph *tg, int *num_sack_ranges) +{ + int count; + struct segment *tmp; + + for (tmp = tg->segments, count=0; tmp; tmp = tmp->next) { + if (!compare_headers(&tg->src_address, &tg->dst_address, + tg->src_port, tg->dst_port, + &tmp->ip_src, &tmp->ip_dst, + tmp->th_sport, tmp->th_dport, + COMPARE_CURR_DIR)) { + count++; + *num_sack_ranges += tmp->num_sack_ranges; + } + } + return count; +} + +typedef struct _th_t { + int num_hdrs; + #define MAX_SUPPORTED_TCP_HEADERS 8 + struct tcpheader *tcphdrs[MAX_SUPPORTED_TCP_HEADERS]; +} th_t; + +static tap_packet_status +tap_tcpip_packet(void *pct, packet_info *pinfo _U_, epan_dissect_t *edt _U_, const void *vip, tap_flags_t flags _U_) +{ + int n; + gboolean is_unique = TRUE; + th_t *th = (th_t *)pct; + const struct tcpheader *header = (const struct tcpheader *)vip; + + /* Check new header details against any/all stored ones */ + for (n=0; n < th->num_hdrs; n++) { + struct tcpheader *stored = th->tcphdrs[n]; + + if (compare_headers(&stored->ip_src, &stored->ip_dst, + stored->th_sport, stored->th_dport, + &header->ip_src, &header->ip_dst, + header->th_sport, stored->th_dport, + COMPARE_CURR_DIR)) { + is_unique = FALSE; + break; + } + } + + /* Add address if unique and have space for it */ + if (is_unique && (th->num_hdrs < MAX_SUPPORTED_TCP_HEADERS)) { + /* Need to take a deep copy of the tap struct, it may not be valid + to read after this function returns? */ + th->tcphdrs[th->num_hdrs] = g_new(struct tcpheader, 1); + *(th->tcphdrs[th->num_hdrs]) = *header; + copy_address(&th->tcphdrs[th->num_hdrs]->ip_src, &header->ip_src); + copy_address(&th->tcphdrs[th->num_hdrs]->ip_dst, &header->ip_dst); + + th->num_hdrs++; + } + + return TAP_PACKET_DONT_REDRAW; +} + +/* XXX should be enhanced so that if we have multiple TCP layers in the trace + * then present the user with a dialog where the user can select WHICH tcp + * session to graph. + */ +guint32 +select_tcpip_session(capture_file *cf) +{ + frame_data *fdata; + epan_dissect_t edt; + dfilter_t *sfcode; + guint32 th_stream; + df_error_t *df_err; + GString *error_string; + th_t th = {0, {NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL}}; + + if (!cf) { + return G_MAXUINT32; + } + + /* no real filter yet */ + if (!dfilter_compile("tcp", &sfcode, &df_err)) { + simple_dialog(ESD_TYPE_ERROR, ESD_BTN_OK, "%s", df_err->msg); + df_error_free(&df_err); + return G_MAXUINT32; + } + + /* dissect the current record */ + if (!cf_read_current_record(cf)) { + return G_MAXUINT32; /* error reading the record */ + } + + fdata = cf->current_frame; + + error_string = register_tap_listener("tcp", &th, NULL, 0, NULL, tap_tcpip_packet, NULL, NULL); + if (error_string) { + fprintf(stderr, "wireshark: Couldn't register tcp_graph tap: %s\n", + error_string->str); + g_string_free(error_string, TRUE); + exit(1); + } + + epan_dissect_init(&edt, cf->epan, TRUE, FALSE); + epan_dissect_prime_with_dfilter(&edt, sfcode); + epan_dissect_run_with_taps(&edt, cf->cd_t, &cf->rec, + frame_tvbuff_new_buffer(&cf->provider, fdata, &cf->buf), + fdata, NULL); + epan_dissect_cleanup(&edt); + remove_tap_listener(&th); + dfilter_free(sfcode); + + if (th.num_hdrs == 0) { + /* This "shouldn't happen", as our menu items shouldn't + * even be enabled if the selected packet isn't a TCP + * segment, as tcp_graph_selected_packet_enabled() is used + * to determine whether to enable any of our menu items. */ + simple_dialog(ESD_TYPE_ERROR, ESD_BTN_OK, + "Selected packet isn't a TCP segment or is truncated"); + return G_MAXUINT32; + } + /* XXX fix this later, we should show a dialog allowing the user + to select which session he wants here + */ + if (th.num_hdrs > 1) { + /* can only handle a single tcp layer yet */ + simple_dialog(ESD_TYPE_ERROR, ESD_BTN_OK, + "The selected packet has more than one TCP unique conversation " + "in it."); + return G_MAXUINT32; + } + + /* For now, still always choose the first/only one */ + th_stream = th.tcphdrs[0]->th_stream; + + for (int n = 0; n < th.num_hdrs; n++) { + free_address(&th.tcphdrs[n]->ip_src); + free_address(&th.tcphdrs[n]->ip_dst); + g_free(th.tcphdrs[n]); + } + + return th_stream; +} + +int rtt_is_retrans(struct rtt_unack *list, unsigned int seqno) +{ + struct rtt_unack *u; + + for (u=list; u; u=u->next) { + if (tcp_seq_eq_or_after(seqno, u->seqno) && + tcp_seq_before(seqno, u->end_seqno)) { + return TRUE; + } + } + return FALSE; +} + +struct rtt_unack * +rtt_get_new_unack(double time_val, unsigned int seqno, unsigned int seglen) +{ + struct rtt_unack *u; + + u = g_new(struct rtt_unack, 1); + u->next = NULL; + u->time = time_val; + u->seqno = seqno; + u->end_seqno = seqno + seglen; + return u; +} + +void rtt_put_unack_on_list(struct rtt_unack **l, struct rtt_unack *new_unack) +{ + struct rtt_unack *u, *list = *l; + + for (u=list; u; u=u->next) { + if (!u->next) { + break; + } + } + if (u) { + u->next = new_unack; + } else { + *l = new_unack; + } +} + +void rtt_delete_unack_from_list(struct rtt_unack **l, struct rtt_unack *dead) +{ + struct rtt_unack *u, *list = *l; + + if (!dead || !list) { + return; + } + + if (dead == list) { + *l = list->next; + g_free(list); + } else { + for (u=list; u; u=u->next) { + if (u->next == dead) { + u->next = u->next->next; + g_free(dead); + break; + } + } + } +} + +void rtt_destroy_unack_list(struct rtt_unack **l ) { + while (*l) { + struct rtt_unack *head = *l; + *l = head->next; + g_free(head); + } +} |