summaryrefslogtreecommitdiffstats
path: root/capinfos.c
diff options
context:
space:
mode:
Diffstat (limited to 'capinfos.c')
-rw-r--r--capinfos.c1795
1 files changed, 1795 insertions, 0 deletions
diff --git a/capinfos.c b/capinfos.c
new file mode 100644
index 00000000..286532d0
--- /dev/null
+++ b/capinfos.c
@@ -0,0 +1,1795 @@
+/* capinfos.c
+ * Reports capture file information including # of packets, duration, others
+ *
+ * Copyright 2004 Ian Schorr
+ *
+ * Wireshark - Network traffic analyzer
+ * By Gerald Combs <gerald@wireshark.org>
+ * Copyright 1998 Gerald Combs
+ *
+ * SPDX-License-Identifier: GPL-2.0-or-later
+ */
+
+/*
+ * 2009-09-19: jyoung
+ *
+ * New capinfos features
+ *
+ * Continue processing additional files after
+ * a wiretap open failure. The new -C option
+ * reverts to capinfos' original behavior which
+ * is to cancel any further file processing at
+ * first file open failure.
+ *
+ * Change the behavior of how the default display
+ * of all infos is initiated. This gets rid of a
+ * special post getopt() argument count test.
+ *
+ * Add new table output format (with related options)
+ * This feature allows outputting the various infos
+ * into a tab delimited text file, or to a comma
+ * separated variables file (*.csv) instead of the
+ * original "long" format.
+ *
+ * 2011-04-05: wmeier
+ * behaviour changed: Upon exit capinfos will return
+ * an error status if an error occurred at any
+ * point during "continuous" file processing.
+ * (Previously a success status was always
+ * returned if the -C option was not used).
+ *
+ */
+
+
+#include <config.h>
+#define WS_LOG_DOMAIN LOG_DOMAIN_MAIN
+
+#include <stdio.h>
+#include <stdlib.h>
+#include <string.h>
+#include <stdarg.h>
+#include <locale.h>
+
+#include <ws_exit_codes.h>
+#include <wsutil/ws_getopt.h>
+
+#include <glib.h>
+
+#include <wiretap/wtap.h>
+
+#include <wsutil/cmdarg_err.h>
+#include <wsutil/filesystem.h>
+#include <wsutil/privileges.h>
+#include <cli_main.h>
+#include <wsutil/version_info.h>
+#include <wiretap/wtap_opttypes.h>
+
+#ifdef HAVE_PLUGINS
+#include <wsutil/plugins.h>
+#endif
+
+#include <wsutil/report_message.h>
+#include <wsutil/str_util.h>
+#include <wsutil/to_str.h>
+#include <wsutil/file_util.h>
+#include <wsutil/ws_assert.h>
+#include <wsutil/wslog.h>
+
+#include <gcrypt.h>
+
+#include "ui/failure_message.h"
+
+/*
+ * By default capinfos now continues processing
+ * the next filename if and when wiretap detects
+ * a problem opening or reading a file.
+ * Use the '-C' option to revert back to original
+ * capinfos behavior which is to abort any
+ * additional file processing at the first file
+ * open or read failure.
+ */
+
+static gboolean stop_after_failure = FALSE;
+
+/*
+ * table report variables
+ */
+
+static gboolean long_report = TRUE; /* By default generate long report */
+static gchar table_report_header = TRUE; /* Generate column header by default */
+static gchar field_separator = '\t'; /* Use TAB as field separator by default */
+static gchar quote_char = '\0'; /* Do NOT quote fields by default */
+static gboolean machine_readable = FALSE; /* Display machine-readable numbers */
+
+/*
+ * capinfos has the ability to report on a number of
+ * various characteristics ("infos") for each input file.
+ *
+ * By default reporting of all info fields is enabled.
+ *
+ * Optionally the reporting of any specific info field
+ * or combination of info fields can be enabled with
+ * individual options.
+ */
+
+static gboolean report_all_infos = TRUE; /* Report all infos */
+
+static gboolean cap_file_type = TRUE; /* Report capture type */
+static gboolean cap_file_encap = TRUE; /* Report encapsulation */
+static gboolean cap_snaplen = TRUE; /* Packet size limit (snaplen)*/
+static gboolean cap_packet_count = TRUE; /* Report packet count */
+static gboolean cap_file_size = TRUE; /* Report file size */
+static gboolean cap_comment = TRUE; /* Display the capture comment */
+static gboolean cap_file_more_info = TRUE; /* Report more file info */
+static gboolean cap_file_idb = TRUE; /* Report Interface info */
+static gboolean cap_file_nrb = TRUE; /* Report Name Resolution Block info */
+static gboolean cap_file_dsb = TRUE; /* Report Decryption Secrets Block info */
+
+static gboolean cap_data_size = TRUE; /* Report packet byte size */
+static gboolean cap_duration = TRUE; /* Report capture duration */
+static gboolean cap_start_time = TRUE; /* Report capture start time */
+static gboolean cap_end_time = TRUE; /* Report capture end time */
+static gboolean time_as_secs = FALSE; /* Report time values as raw seconds */
+
+static gboolean cap_data_rate_byte = TRUE; /* Report data rate bytes/sec */
+static gboolean cap_data_rate_bit = TRUE; /* Report data rate bites/sec */
+static gboolean cap_packet_size = TRUE; /* Report average packet size */
+static gboolean cap_packet_rate = TRUE; /* Report average packet rate */
+static gboolean cap_order = TRUE; /* Report if packets are in chronological order (True/False) */
+static gboolean pkt_comments = TRUE; /* Report individual packet comments */
+
+static gboolean cap_file_hashes = TRUE; /* Calculate file hashes */
+
+// Strongest to weakest
+#define HASH_SIZE_SHA256 32
+#define HASH_SIZE_SHA1 20
+
+#define HASH_STR_SIZE (65) /* Max hash size * 2 + '\0' */
+#define HASH_BUF_SIZE (1024 * 1024)
+
+
+static gchar file_sha256[HASH_STR_SIZE];
+static gchar file_sha1[HASH_STR_SIZE];
+
+static char *hash_buf = NULL;
+static gcry_md_hd_t hd = NULL;
+
+static guint num_ipv4_addresses;
+static guint num_ipv6_addresses;
+static guint num_decryption_secrets;
+
+/*
+ * If we have at least two packets with time stamps, and they're not in
+ * order - i.e., the later packet has a time stamp older than the earlier
+ * packet - the time stamps are known not to be in order.
+ *
+ * If every packet has a time stamp, and they're all in order, the time
+ * stamp is known to be in order.
+ *
+ * Otherwise, we have no idea.
+ */
+typedef enum {
+ IN_ORDER,
+ NOT_IN_ORDER,
+ ORDER_UNKNOWN
+} order_t;
+
+typedef struct _pkt_cmt {
+ int recno;
+ gchar *cmt;
+ struct _pkt_cmt *next;
+} pkt_cmt;
+
+typedef struct _capture_info {
+ const char *filename;
+ guint16 file_type;
+ wtap_compression_type compression_type;
+ int file_encap;
+ int file_tsprec;
+ wtap *wth;
+ gint64 filesize;
+ guint64 packet_bytes;
+ gboolean times_known;
+ nstime_t start_time;
+ int start_time_tsprec;
+ nstime_t stop_time;
+ int stop_time_tsprec;
+ guint32 packet_count;
+ gboolean snap_set; /* If set in capture file header */
+ guint32 snaplen; /* value from the capture file header */
+ guint32 snaplen_min_inferred; /* If caplen < len for 1 or more rcds */
+ guint32 snaplen_max_inferred; /* ... */
+ gboolean drops_known;
+ guint32 drop_count;
+
+ nstime_t duration;
+ int duration_tsprec;
+ double packet_rate;
+ double packet_size;
+ double data_rate; /* in bytes/s */
+ gboolean know_order;
+ order_t order;
+
+ int *encap_counts; /* array of per_packet encap counts; array has one entry per wtap_encap type */
+ pkt_cmt *pkt_cmts; /* list of packet comments */
+
+ guint num_interfaces; /* number of IDBs, and thus size of interface_packet_counts array */
+ GArray *interface_packet_counts; /* array of per_packet interface_id counts; one entry per file IDB */
+ guint32 pkt_interface_id_unknown; /* counts if packet interface_id didn't match a known one */
+ GArray *idb_info_strings; /* array of IDB info strings */
+} capture_info;
+
+static char *decimal_point;
+
+static void
+enable_all_infos(void)
+{
+ report_all_infos = TRUE;
+
+ cap_file_type = TRUE;
+ cap_file_encap = TRUE;
+ cap_snaplen = TRUE;
+ cap_packet_count = TRUE;
+ cap_file_size = TRUE;
+ cap_comment = TRUE;
+ pkt_comments = TRUE;
+ cap_file_more_info = TRUE;
+ cap_file_idb = TRUE;
+ cap_file_nrb = TRUE;
+ cap_file_dsb = TRUE;
+
+ cap_data_size = TRUE;
+ cap_duration = TRUE;
+ cap_start_time = TRUE;
+ cap_end_time = TRUE;
+ cap_order = TRUE;
+
+ cap_data_rate_byte = TRUE;
+ cap_data_rate_bit = TRUE;
+ cap_packet_size = TRUE;
+ cap_packet_rate = TRUE;
+
+ cap_file_hashes = TRUE;
+}
+
+static void
+disable_all_infos(void)
+{
+ report_all_infos = FALSE;
+
+ cap_file_type = FALSE;
+ cap_file_encap = FALSE;
+ cap_snaplen = FALSE;
+ cap_packet_count = FALSE;
+ cap_file_size = FALSE;
+ cap_comment = FALSE;
+ pkt_comments = FALSE;
+ cap_file_more_info = FALSE;
+ cap_file_idb = FALSE;
+ cap_file_nrb = FALSE;
+ cap_file_dsb = FALSE;
+
+ cap_data_size = FALSE;
+ cap_duration = FALSE;
+ cap_start_time = FALSE;
+ cap_end_time = FALSE;
+ cap_order = FALSE;
+
+ cap_data_rate_byte = FALSE;
+ cap_data_rate_bit = FALSE;
+ cap_packet_size = FALSE;
+ cap_packet_rate = FALSE;
+
+ cap_file_hashes = FALSE;
+}
+
+static const gchar *
+order_string(order_t order)
+{
+ switch (order) {
+
+ case IN_ORDER:
+ return "True";
+
+ case NOT_IN_ORDER:
+ return "False";
+
+ case ORDER_UNKNOWN:
+ return "Unknown";
+
+ default:
+ return "???"; /* "cannot happen" (the next step is "Profit!") */
+ }
+}
+
+static gchar *
+absolute_time_string(nstime_t *timer, int tsprecision, capture_info *cf_info)
+{
+ /*
+ * https://web.archive.org/web/20120513133703/http://www.idrbt.ac.in/publications/workingpapers/Working%20Paper%20No.%209.pdf
+ *
+ * says:
+ *
+ * A 64-bit Unix time would be safe for the indefinite future, as
+ * this variable would not overflow until 2**63 or
+ * 9,223,372,036,854,775,808 (over nine quintillion) seconds
+ * after the beginning of the Unix epoch - corresponding to
+ * GMT 15:30:08, Sunday, 4th December, 292,277,026,596.
+ *
+ * So, if we're displaying the time as YYYY-MM-DD HH:MM:SS.SSSSSSSSS,
+ * we'll have the buffer be large enough for a date of the format
+ * 292277026596-MM-DD HH:MM:SS.SSSSSSSSS, which is the biggest value
+ * you'll get with a 64-bit time_t and a nanosecond-resolution
+ * fraction-of-a-second.
+ *
+ * That's 12+1+2+1+2+1+2+1+2+2+2+1+9+1, including the terminating
+ * \0, or 39.
+ *
+ * If we're displaying the time as epoch time, and the time is
+ * unsigned, 2^64-1 is 18446744073709551615, so the buffer has
+ * to be big enough for 18446744073709551615.999999999. That's
+ * 20+1+9+1, including the terminating '\0', or 31. If it's
+ * signed, 2^63 is 9223372036854775808, so the buffer has to
+ * be big enough for -9223372036854775808.999999999, which is
+ * again 20+1+9+1, or 31.
+ *
+ * So we go with 39.
+ */
+ static gchar time_string_buf[39];
+
+ if (cf_info->times_known && cf_info->packet_count > 0) {
+ if (time_as_secs) {
+ display_epoch_time(time_string_buf, sizeof time_string_buf, timer, tsprecision);
+ } else {
+ format_nstime_as_iso8601(time_string_buf, sizeof time_string_buf, timer, decimal_point, TRUE, tsprecision);
+ }
+ } else {
+ snprintf(time_string_buf, sizeof time_string_buf, "n/a");
+ }
+ return time_string_buf;
+}
+
+static gchar *
+relative_time_string(nstime_t *timer, int tsprecision, capture_info *cf_info, gboolean want_seconds)
+{
+ const gchar *second = want_seconds ? " second" : "";
+ const gchar *plural = want_seconds ? "s" : "";
+ /*
+ * If we're displaying the time as epoch time, and the time is
+ * unsigned, 2^64-1 is 18446744073709551615, so the buffer has
+ * to be big enough for "18446744073709551615.999999999 seconds".
+ * That's 20+1+9+1+7+1, including the terminating '\0', or 39.
+ * If it'ssigned, 2^63 is 9223372036854775808, so the buffer has to
+ * be big enough for "-9223372036854775808.999999999 seconds",
+ * which is again 20+1+9+1+7+1, or 39.
+ */
+ static gchar time_string_buf[39];
+
+ if (cf_info->times_known && cf_info->packet_count > 0) {
+ char *ptr;
+ size_t remaining;
+ int num_bytes;
+
+ ptr = time_string_buf;
+ remaining = sizeof time_string_buf;
+ num_bytes = snprintf(ptr, remaining,
+ "%"PRId64,
+ (gint64)timer->secs);
+ if (num_bytes < 0) {
+ /*
+ * That got an error.
+ * Not much else we can do.
+ */
+ snprintf(ptr, remaining, "snprintf() failed");
+ return time_string_buf;
+ }
+ if ((unsigned int)num_bytes >= remaining) {
+ /*
+ * That filled up or would have overflowed the buffer.
+ * Nothing more we can do.
+ */
+ return time_string_buf;
+ }
+ ptr += num_bytes;
+ remaining -= num_bytes;
+
+ if (tsprecision != 0) {
+ /*
+ * Append the fractional part.
+ */
+ num_bytes = format_fractional_part_nsecs(ptr, remaining, timer->nsecs, decimal_point, tsprecision);
+ if ((unsigned int)num_bytes >= remaining) {
+ /*
+ * That filled up or would have overflowed the buffer.
+ * Nothing more we can do.
+ */
+ return time_string_buf;
+ }
+ ptr += num_bytes;
+ remaining -= num_bytes;
+ }
+
+ /*
+ * Append the units.
+ */
+ snprintf(ptr, remaining, "%s%s",
+ second,
+ timer->secs == 1 ? "" : plural);
+
+ return time_string_buf;
+ }
+
+ snprintf(time_string_buf, sizeof time_string_buf, "n/a");
+ return time_string_buf;
+}
+
+static void print_value(const gchar *text_p1, gint width, const gchar *text_p2, double value)
+{
+ if (value > 0.0)
+ printf("%s%.*f%s\n", text_p1, width, value, text_p2);
+ else
+ printf("%sn/a\n", text_p1);
+}
+
+/* multi-line comments would conflict with the formatting that capinfos uses
+ we replace linefeeds with spaces */
+static void
+string_replace_newlines(gchar *str)
+{
+ gchar *p;
+
+ if (str) {
+ p = str;
+ while (*p != '\0') {
+ if (*p == '\n')
+ *p = ' ';
+ if (*p == '\r')
+ *p = ' ';
+ p++;
+ }
+ }
+}
+
+static void
+show_option_string(const char *prefix, const char *option_str)
+{
+ char *str;
+
+ if (option_str != NULL && option_str[0] != '\0') {
+ str = g_strdup(option_str);
+ string_replace_newlines(str);
+ printf("%s%s\n", prefix, str);
+ g_free(str);
+ }
+}
+
+static void
+print_stats(const gchar *filename, capture_info *cf_info)
+{
+ const gchar *file_type_string, *file_encap_string;
+ gchar *size_string;
+ pkt_cmt *p, *prev;
+
+ /* Build printable strings for various stats */
+ if (machine_readable) {
+ file_type_string = wtap_file_type_subtype_name(cf_info->file_type);
+ file_encap_string = wtap_encap_name(cf_info->file_encap);
+ }
+ else {
+ file_type_string = wtap_file_type_subtype_description(cf_info->file_type);
+ file_encap_string = wtap_encap_description(cf_info->file_encap);
+ }
+
+ if (filename) printf ("File name: %s\n", filename);
+ if (cap_file_type) {
+ const char *compression_type_description;
+ compression_type_description = wtap_compression_type_description(cf_info->compression_type);
+ if (compression_type_description == NULL)
+ printf ("File type: %s\n",
+ file_type_string);
+ else
+ printf ("File type: %s (%s)\n",
+ file_type_string, compression_type_description);
+ }
+ if (cap_file_encap) {
+ printf ("File encapsulation: %s\n", file_encap_string);
+ if (cf_info->file_encap == WTAP_ENCAP_PER_PACKET) {
+ int i;
+ printf ("Encapsulation in use by packets (# of pkts):\n");
+ for (i=0; i<WTAP_NUM_ENCAP_TYPES; i++) {
+ if (cf_info->encap_counts[i] > 0)
+ printf(" %s (%d)\n",
+ wtap_encap_description(i), cf_info->encap_counts[i]);
+ }
+ }
+ }
+ if (cap_file_more_info) {
+ printf ("File timestamp precision: %s (%d)\n",
+ wtap_tsprec_string(cf_info->file_tsprec), cf_info->file_tsprec);
+ }
+
+ if (cap_snaplen && cf_info->snap_set)
+ printf ("Packet size limit: file hdr: %u bytes\n", cf_info->snaplen);
+ else if (cap_snaplen && !cf_info->snap_set)
+ printf ("Packet size limit: file hdr: (not set)\n");
+ if (cf_info->snaplen_max_inferred > 0) {
+ if (cf_info->snaplen_min_inferred == cf_info->snaplen_max_inferred)
+ printf ("Packet size limit: inferred: %u bytes\n", cf_info->snaplen_min_inferred);
+ else
+ printf ("Packet size limit: inferred: %u bytes - %u bytes (range)\n",
+ cf_info->snaplen_min_inferred, cf_info->snaplen_max_inferred);
+ }
+ if (cap_packet_count) {
+ printf ("Number of packets: ");
+ if (machine_readable) {
+ printf ("%u\n", cf_info->packet_count);
+ } else {
+ size_string = format_size(cf_info->packet_count, FORMAT_SIZE_UNIT_NONE, 0);
+ printf ("%s\n", size_string);
+ g_free(size_string);
+ }
+ }
+ if (cap_file_size) {
+ printf ("File size: ");
+ if (machine_readable) {
+ printf ("%" PRId64 " bytes\n", cf_info->filesize);
+ } else {
+ size_string = format_size(cf_info->filesize, FORMAT_SIZE_UNIT_BYTES, 0);
+ printf ("%s\n", size_string);
+ g_free(size_string);
+ }
+ }
+ if (cap_data_size) {
+ printf ("Data size: ");
+ if (machine_readable) {
+ printf ("%" PRIu64 " bytes\n", cf_info->packet_bytes);
+ } else {
+ size_string = format_size(cf_info->packet_bytes, FORMAT_SIZE_UNIT_BYTES, 0);
+ printf ("%s\n", size_string);
+ g_free(size_string);
+ }
+ }
+ if (cf_info->times_known) {
+ if (cap_duration) /* XXX - shorten to hh:mm:ss */
+ printf("Capture duration: %s\n", relative_time_string(&cf_info->duration, cf_info->duration_tsprec, cf_info, TRUE));
+ if (cap_start_time)
+ printf("First packet time: %s\n", absolute_time_string(&cf_info->start_time, cf_info->start_time_tsprec, cf_info));
+ if (cap_end_time)
+ printf("Last packet time: %s\n", absolute_time_string(&cf_info->stop_time, cf_info->stop_time_tsprec, cf_info));
+ if (cap_data_rate_byte) {
+ printf("Data byte rate: ");
+ if (machine_readable) {
+ print_value("", 2, " bytes/sec", cf_info->data_rate);
+ } else {
+ size_string = format_size((int64_t)cf_info->data_rate, FORMAT_SIZE_UNIT_BYTES_S, 0);
+ printf ("%s\n", size_string);
+ g_free(size_string);
+ }
+ }
+ if (cap_data_rate_bit) {
+ printf("Data bit rate: ");
+ if (machine_readable) {
+ print_value("", 2, " bits/sec", cf_info->data_rate*8);
+ } else {
+ size_string = format_size((int64_t)(cf_info->data_rate*8), FORMAT_SIZE_UNIT_BITS_S, 0);
+ printf ("%s\n", size_string);
+ g_free(size_string);
+ }
+ }
+ }
+ if (cap_packet_size) printf("Average packet size: %.2f bytes\n", cf_info->packet_size);
+ if (cf_info->times_known) {
+ if (cap_packet_rate) {
+ printf("Average packet rate: ");
+ if (machine_readable) {
+ print_value("", 2, " packets/sec", cf_info->packet_rate);
+ } else {
+ size_string = format_size((int64_t)cf_info->packet_rate, FORMAT_SIZE_UNIT_PACKETS_S, 0);
+ printf ("%s\n", size_string);
+ g_free(size_string);
+ }
+ }
+ }
+ if (cap_file_hashes) {
+ printf ("SHA256: %s\n", file_sha256);
+ printf ("SHA1: %s\n", file_sha1);
+ }
+ if (cap_order) printf ("Strict time order: %s\n", order_string(cf_info->order));
+
+ gboolean has_multiple_sections = (wtap_file_get_num_shbs(cf_info->wth) > 1);
+
+ for (guint section_number = 0;
+ section_number < wtap_file_get_num_shbs(cf_info->wth);
+ section_number++) {
+ wtap_block_t shb;
+
+ // If we have more than one section, add headers for each section.
+ if (has_multiple_sections)
+ printf("Section %u:\n\n", section_number);
+
+ shb = wtap_file_get_shb(cf_info->wth, section_number);
+ if (shb != NULL) {
+ if (cap_file_more_info) {
+ char *str;
+
+ if (wtap_block_get_string_option_value(shb, OPT_SHB_HARDWARE, &str) == WTAP_OPTTYPE_SUCCESS)
+ show_option_string("Capture hardware: ", str);
+ if (wtap_block_get_string_option_value(shb, OPT_SHB_OS, &str) == WTAP_OPTTYPE_SUCCESS)
+ show_option_string("Capture oper-sys: ", str);
+ if (wtap_block_get_string_option_value(shb, OPT_SHB_USERAPPL, &str) == WTAP_OPTTYPE_SUCCESS)
+ show_option_string("Capture application: ", str);
+ }
+ if (cap_comment) {
+ unsigned int i;
+ char *str;
+
+ for (i = 0; wtap_block_get_nth_string_option_value(shb, OPT_COMMENT, i, &str) == WTAP_OPTTYPE_SUCCESS; i++) {
+ show_option_string("Capture comment: ", str);
+ }
+ }
+
+ if (pkt_comments && cf_info->pkt_cmts != NULL) {
+ for (p = cf_info->pkt_cmts; p != NULL; prev = p, p = p->next, g_free(prev)) {
+ if (machine_readable){
+ printf("Packet %d Comment: %s\n", p->recno, g_strescape(p->cmt, NULL));
+ } else {
+ printf("Packet %d Comment: %s\n", p->recno, p->cmt);
+ }
+ g_free(p->cmt);
+ }
+ }
+
+ if (cap_file_idb && cf_info->num_interfaces != 0) {
+ guint i;
+ ws_assert(cf_info->num_interfaces == cf_info->idb_info_strings->len);
+ printf ("Number of interfaces in file: %u\n", cf_info->num_interfaces);
+ for (i = 0; i < cf_info->idb_info_strings->len; i++) {
+ gchar *s = g_array_index(cf_info->idb_info_strings, gchar*, i);
+ guint32 packet_count = 0;
+ if (i < cf_info->interface_packet_counts->len)
+ packet_count = g_array_index(cf_info->interface_packet_counts, guint32, i);
+ printf ("Interface #%u info:\n", i);
+ printf ("%s", s);
+ printf (" Number of packets = %u\n", packet_count);
+ }
+ }
+ }
+
+ if (cap_file_nrb) {
+ if (num_ipv4_addresses != 0)
+ printf ("Number of resolved IPv4 addresses in file: %u\n", num_ipv4_addresses);
+ if (num_ipv6_addresses != 0)
+ printf ("Number of resolved IPv6 addresses in file: %u\n", num_ipv6_addresses);
+ }
+ if (cap_file_dsb) {
+ if (num_decryption_secrets != 0)
+ printf ("Number of decryption secrets in file: %u\n", num_decryption_secrets);
+ }
+ }
+}
+
+static void
+putsep(void)
+{
+ if (field_separator) putchar(field_separator);
+}
+
+static void
+putquote(void)
+{
+ if (quote_char) putchar(quote_char);
+}
+
+static void
+print_stats_table_header_label(const gchar *label)
+{
+ putsep();
+ putquote();
+ printf("%s", label);
+ putquote();
+}
+
+static void
+print_stats_table_header(capture_info *cf_info)
+{
+ pkt_cmt *p;
+ char *buf;
+
+ putquote();
+ printf("File name");
+ putquote();
+
+ if (cap_file_type) print_stats_table_header_label("File type");
+ if (cap_file_encap) print_stats_table_header_label("File encapsulation");
+ if (cap_file_more_info) print_stats_table_header_label("File time precision");
+ if (cap_snaplen) {
+ print_stats_table_header_label("Packet size limit");
+ print_stats_table_header_label("Packet size limit min (inferred)");
+ print_stats_table_header_label("Packet size limit max (inferred)");
+ }
+ if (cap_packet_count) print_stats_table_header_label("Number of packets");
+ if (cap_file_size) print_stats_table_header_label("File size (bytes)");
+ if (cap_data_size) print_stats_table_header_label("Data size (bytes)");
+ if (cap_duration) print_stats_table_header_label("Capture duration (seconds)");
+ if (cap_start_time) print_stats_table_header_label("Start time");
+ if (cap_end_time) print_stats_table_header_label("End time");
+ if (cap_data_rate_byte) print_stats_table_header_label("Data byte rate (bytes/sec)");
+ if (cap_data_rate_bit) print_stats_table_header_label("Data bit rate (bits/sec)");
+ if (cap_packet_size) print_stats_table_header_label("Average packet size (bytes)");
+ if (cap_packet_rate) print_stats_table_header_label("Average packet rate (packets/sec)");
+ if (cap_file_hashes) {
+ print_stats_table_header_label("SHA256");
+ print_stats_table_header_label("SHA1");
+ }
+ if (cap_order) print_stats_table_header_label("Strict time order");
+ if (cap_file_more_info) {
+ print_stats_table_header_label("Capture hardware");
+ print_stats_table_header_label("Capture oper-sys");
+ print_stats_table_header_label("Capture application");
+ }
+ if (cap_comment) print_stats_table_header_label("Capture comment");
+
+ if (pkt_comments && cf_info->pkt_cmts != NULL) {
+ /* Packet 2^64 Comment" + NULL */
+ buf = (char *)g_malloc0(strlen("Packet 18446744073709551616 Comment") + 1);
+
+ for (p = cf_info->pkt_cmts; p != NULL; p = p->next) {
+ snprintf(buf, strlen(buf), "Packet %d Comment", p->recno);
+ print_stats_table_header_label(buf);
+ }
+ }
+
+ printf("\n");
+}
+
+static void
+print_stats_table(const gchar *filename, capture_info *cf_info)
+{
+ const gchar *file_type_string, *file_encap_string;
+ pkt_cmt *p, *prev;
+
+ /* Build printable strings for various stats */
+ file_type_string = wtap_file_type_subtype_name(cf_info->file_type);
+ file_encap_string = wtap_encap_name(cf_info->file_encap);
+
+ if (filename) {
+ putquote();
+ printf("%s", filename);
+ putquote();
+ }
+
+ if (cap_file_type) {
+ putsep();
+ putquote();
+ printf("%s", file_type_string);
+ putquote();
+ }
+
+ /* ToDo: If WTAP_ENCAP_PER_PACKET, show the list of encapsulations encountered;
+ * Output a line for each different encap with all fields repeated except
+ * the encapsulation field which has "Per Packet: ..." for each
+ * encapsulation type seen ?
+ */
+ if (cap_file_encap) {
+ putsep();
+ putquote();
+ printf("%s", file_encap_string);
+ putquote();
+ }
+
+ if (cap_file_more_info) {
+ putsep();
+ putquote();
+ printf("%s", wtap_tsprec_string(cf_info->file_tsprec));
+ putquote();
+ }
+
+ if (cap_snaplen) {
+ putsep();
+ putquote();
+ if (cf_info->snap_set)
+ printf("%u", cf_info->snaplen);
+ else
+ printf("(not set)");
+ putquote();
+ if (cf_info->snaplen_max_inferred > 0) {
+ putsep();
+ putquote();
+ printf("%u", cf_info->snaplen_min_inferred);
+ putquote();
+ putsep();
+ putquote();
+ printf("%u", cf_info->snaplen_max_inferred);
+ putquote();
+ }
+ else {
+ putsep();
+ putquote();
+ printf("n/a");
+ putquote();
+ putsep();
+ putquote();
+ printf("n/a");
+ putquote();
+ }
+ }
+
+ if (cap_packet_count) {
+ putsep();
+ putquote();
+ printf("%u", cf_info->packet_count);
+ putquote();
+ }
+
+ if (cap_file_size) {
+ putsep();
+ putquote();
+ printf("%" PRId64, cf_info->filesize);
+ putquote();
+ }
+
+ if (cap_data_size) {
+ putsep();
+ putquote();
+ printf("%" PRIu64, cf_info->packet_bytes);
+ putquote();
+ }
+
+ if (cap_duration) {
+ putsep();
+ putquote();
+ printf("%s", relative_time_string(&cf_info->duration, cf_info->duration_tsprec, cf_info, FALSE));
+ putquote();
+ }
+
+ if (cap_start_time) {
+ putsep();
+ putquote();
+ printf("%s", absolute_time_string(&cf_info->start_time, cf_info->start_time_tsprec, cf_info));
+ putquote();
+ }
+
+ if (cap_end_time) {
+ putsep();
+ putquote();
+ printf("%s", absolute_time_string(&cf_info->stop_time, cf_info->stop_time_tsprec, cf_info));
+ putquote();
+ }
+
+ if (cap_data_rate_byte) {
+ putsep();
+ putquote();
+ if (cf_info->times_known)
+ printf("%.2f", cf_info->data_rate);
+ else
+ printf("n/a");
+ putquote();
+ }
+
+ if (cap_data_rate_bit) {
+ putsep();
+ putquote();
+ if (cf_info->times_known)
+ printf("%.2f", cf_info->data_rate*8);
+ else
+ printf("n/a");
+ putquote();
+ }
+
+ if (cap_packet_size) {
+ putsep();
+ putquote();
+ printf("%.2f", cf_info->packet_size);
+ putquote();
+ }
+
+ if (cap_packet_rate) {
+ putsep();
+ putquote();
+ if (cf_info->times_known)
+ printf("%.2f", cf_info->packet_rate);
+ else
+ printf("n/a");
+ putquote();
+ }
+
+ if (cap_file_hashes) {
+ putsep();
+ putquote();
+ printf("%s", file_sha256);
+ putquote();
+
+ putsep();
+ putquote();
+ printf("%s", file_sha1);
+ putquote();
+ }
+
+ if (cap_order) {
+ putsep();
+ putquote();
+ printf("%s", order_string(cf_info->order));
+ putquote();
+ }
+
+ for (guint section_number = 0;
+ section_number < wtap_file_get_num_shbs(cf_info->wth);
+ section_number++) {
+ wtap_block_t shb;
+
+ shb = wtap_file_get_shb(cf_info->wth, section_number);
+ if (cap_file_more_info) {
+ char *str;
+
+ putsep();
+ putquote();
+ if (wtap_block_get_string_option_value(shb, OPT_SHB_HARDWARE, &str) == WTAP_OPTTYPE_SUCCESS) {
+ printf("%s", str);
+ }
+ putquote();
+
+ putsep();
+ putquote();
+ if (wtap_block_get_string_option_value(shb, OPT_SHB_OS, &str) == WTAP_OPTTYPE_SUCCESS) {
+ printf("%s", str);
+ }
+ putquote();
+
+ putsep();
+ putquote();
+ if (wtap_block_get_string_option_value(shb, OPT_SHB_USERAPPL, &str) == WTAP_OPTTYPE_SUCCESS) {
+ printf("%s", str);
+ }
+ putquote();
+ }
+
+ /*
+ * One might argue that the following is silly to put into a table format,
+ * but oh well note that there may be *more than one* of each of these types
+ * of options. To mitigate some of the potential silliness the if(cap_comment)
+ * block is moved AFTER the if(cap_file_more_info) block. This will make any
+ * comments the last item(s) in each row. We now have a new -K option to
+ * disable cap_comment to more easily manage the potential silliness.
+ * Potential silliness includes multiple comments (therefore resulting in
+ * more than one additional column and/or comments with embedded newlines
+ * and/or possible delimiters).
+ *
+ * To mitigate embedded newlines and other special characters, use -M
+ */
+ if (cap_comment) {
+ unsigned int i;
+ char *opt_comment;
+ gboolean have_cap = FALSE;
+
+ for (i = 0; wtap_block_get_nth_string_option_value(shb, OPT_COMMENT, i, &opt_comment) == WTAP_OPTTYPE_SUCCESS; i++) {
+ have_cap = TRUE;
+ putsep();
+ putquote();
+ if (machine_readable){
+ printf("%s", g_strescape(opt_comment, NULL));
+ } else {
+ printf("%s", opt_comment);
+ }
+ putquote();
+ }
+ if(!have_cap) {
+ /* Maintain column alignment when we have no OPT_COMMENT */
+ putsep();
+ putquote();
+ putquote();
+ }
+ }
+
+ }
+
+ if (pkt_comments && cf_info->pkt_cmts != NULL) {
+ for(p = cf_info->pkt_cmts; p != NULL; prev = p, p = p->next, g_free(prev)) {
+ putsep();
+ putquote();
+ if (machine_readable) {
+ printf("%s", g_strescape(p->cmt, NULL));
+ } else {
+ printf("%s", p->cmt);
+ }
+ g_free(p->cmt);
+ putquote();
+ }
+ }
+
+ printf("\n");
+}
+
+static void
+cleanup_capture_info(capture_info *cf_info)
+{
+ guint i;
+ ws_assert(cf_info != NULL);
+
+ g_free(cf_info->encap_counts);
+ cf_info->encap_counts = NULL;
+
+ g_array_free(cf_info->interface_packet_counts, TRUE);
+ cf_info->interface_packet_counts = NULL;
+
+ if (cf_info->idb_info_strings) {
+ for (i = 0; i < cf_info->idb_info_strings->len; i++) {
+ gchar *s = g_array_index(cf_info->idb_info_strings, gchar*, i);
+ g_free(s);
+ }
+ g_array_free(cf_info->idb_info_strings, TRUE);
+ }
+ cf_info->idb_info_strings = NULL;
+}
+
+static void
+count_ipv4_address(const guint addr _U_, const gchar *name _U_, const gboolean static_entry _U_)
+{
+ num_ipv4_addresses++;
+}
+
+static void
+count_ipv6_address(const void *addrp _U_, const gchar *name _U_, const gboolean static_entry _U_)
+{
+ num_ipv6_addresses++;
+}
+
+static void
+count_decryption_secret(guint32 secrets_type _U_, const void *secrets _U_, guint size _U_)
+{
+ /* XXX - count them based on the secrets type (which is an opaque code,
+ not a small integer)? */
+ num_decryption_secrets++;
+}
+
+static void
+hash_to_str(const unsigned char *hash, size_t length, char *str)
+{
+ int i;
+
+ for (i = 0; i < (int) length; i++) {
+ snprintf(str+(i*2), 3, "%02x", hash[i]);
+ }
+}
+
+static void
+calculate_hashes(const char *filename)
+{
+ FILE *fh;
+ size_t hash_bytes;
+
+ (void) g_strlcpy(file_sha256, "<unknown>", HASH_STR_SIZE);
+ (void) g_strlcpy(file_sha1, "<unknown>", HASH_STR_SIZE);
+
+ if (cap_file_hashes) {
+ fh = ws_fopen(filename, "rb");
+ if (fh && hd) {
+ while((hash_bytes = fread(hash_buf, 1, HASH_BUF_SIZE, fh)) > 0) {
+ gcry_md_write(hd, hash_buf, hash_bytes);
+ }
+ gcry_md_final(hd);
+ hash_to_str(gcry_md_read(hd, GCRY_MD_SHA256), HASH_SIZE_SHA256, file_sha256);
+ hash_to_str(gcry_md_read(hd, GCRY_MD_SHA1), HASH_SIZE_SHA1, file_sha1);
+ }
+ if (fh) fclose(fh);
+ if (hd) gcry_md_reset(hd);
+ }
+}
+
+static int
+process_cap_file(const char *filename, gboolean need_separator)
+{
+ int status = 0;
+ int err;
+ gchar *err_info;
+ gint64 size;
+ gint64 data_offset;
+
+ guint32 packet = 0;
+ gint64 bytes = 0;
+ guint32 snaplen_min_inferred = 0xffffffff;
+ guint32 snaplen_max_inferred = 0;
+ wtap_rec rec;
+ Buffer buf;
+ capture_info cf_info;
+ gboolean have_times = TRUE;
+ nstime_t start_time;
+ int start_time_tsprec;
+ nstime_t stop_time;
+ int stop_time_tsprec;
+ nstime_t cur_time;
+ nstime_t prev_time;
+ gboolean know_order = FALSE;
+ order_t order = IN_ORDER;
+ guint i;
+ wtapng_iface_descriptions_t *idb_info;
+
+ pkt_cmt *pc = NULL, *prev = NULL;
+
+ cf_info.wth = wtap_open_offline(filename, WTAP_TYPE_AUTO, &err, &err_info, FALSE);
+ if (!cf_info.wth) {
+ cfile_open_failure_message(filename, err, err_info);
+ return 2;
+ }
+
+ /*
+ * Calculate the checksums. Do this after wtap_open_offline, so we don't
+ * bother calculating them for files that are not known capture types
+ * where we wouldn't print them anyway.
+ */
+ calculate_hashes(filename);
+
+ if (need_separator && long_report) {
+ printf("\n");
+ }
+
+ nstime_set_zero(&start_time);
+ start_time_tsprec = WTAP_TSPREC_UNKNOWN;
+ nstime_set_zero(&stop_time);
+ stop_time_tsprec = WTAP_TSPREC_UNKNOWN;
+ nstime_set_zero(&cur_time);
+ nstime_set_zero(&prev_time);
+
+ cf_info.encap_counts = g_new0(int,WTAP_NUM_ENCAP_TYPES);
+
+ idb_info = wtap_file_get_idb_info(cf_info.wth);
+
+ ws_assert(idb_info->interface_data != NULL);
+
+ cf_info.pkt_cmts = NULL;
+ cf_info.num_interfaces = idb_info->interface_data->len;
+ cf_info.interface_packet_counts = g_array_sized_new(FALSE, TRUE, sizeof(guint32), cf_info.num_interfaces);
+ g_array_set_size(cf_info.interface_packet_counts, cf_info.num_interfaces);
+ cf_info.pkt_interface_id_unknown = 0;
+
+ g_free(idb_info);
+ idb_info = NULL;
+
+ /* Zero out the counters for the callbacks. */
+ num_ipv4_addresses = 0;
+ num_ipv6_addresses = 0;
+ num_decryption_secrets = 0;
+
+ /* Register callbacks for new name<->address maps from the file and
+ decryption secrets from the file. */
+ wtap_set_cb_new_ipv4(cf_info.wth, count_ipv4_address);
+ wtap_set_cb_new_ipv6(cf_info.wth, count_ipv6_address);
+ wtap_set_cb_new_secrets(cf_info.wth, count_decryption_secret);
+
+ /* Tally up data that we need to parse through the file to find */
+ wtap_rec_init(&rec);
+ ws_buffer_init(&buf, 1514);
+ while (wtap_read(cf_info.wth, &rec, &buf, &err, &err_info, &data_offset)) {
+ if (rec.presence_flags & WTAP_HAS_TS) {
+ prev_time = cur_time;
+ cur_time = rec.ts;
+ if (packet == 0) {
+ start_time = rec.ts;
+ start_time_tsprec = rec.tsprec;
+ stop_time = rec.ts;
+ stop_time_tsprec = rec.tsprec;
+ prev_time = rec.ts;
+ }
+ if (nstime_cmp(&cur_time, &prev_time) < 0) {
+ order = NOT_IN_ORDER;
+ }
+ if (nstime_cmp(&cur_time, &start_time) < 0) {
+ start_time = cur_time;
+ start_time_tsprec = rec.tsprec;
+ }
+ if (nstime_cmp(&cur_time, &stop_time) > 0) {
+ stop_time = cur_time;
+ stop_time_tsprec = rec.tsprec;
+ }
+ } else {
+ have_times = FALSE; /* at least one packet has no time stamp */
+ if (order != NOT_IN_ORDER)
+ order = ORDER_UNKNOWN;
+ }
+
+ if (rec.rec_type == REC_TYPE_PACKET) {
+ bytes += rec.rec_header.packet_header.len;
+ packet++;
+ /* packet comments */
+ if (pkt_comments && wtap_block_count_option(rec.block, OPT_COMMENT) > 0) {
+ char *cmt_buff;
+ for (i = 0; wtap_block_get_nth_string_option_value(rec.block, OPT_COMMENT, i, &cmt_buff) == WTAP_OPTTYPE_SUCCESS; i++) {
+ pc = g_new0(pkt_cmt, 1);
+
+ pc->recno = packet;
+ pc->cmt = g_strdup(cmt_buff);
+ pc->next = NULL;
+
+ if (prev == NULL)
+ cf_info.pkt_cmts = pc;
+ else
+ prev->next = pc;
+
+ prev = pc;
+ }
+ }
+
+ /* If caplen < len for a rcd, then presumably */
+ /* 'Limit packet capture length' was done for this rcd. */
+ /* Keep track as to the min/max actual snapshot lengths */
+ /* seen for this file. */
+ if (rec.rec_header.packet_header.caplen < rec.rec_header.packet_header.len) {
+ if (rec.rec_header.packet_header.caplen < snaplen_min_inferred)
+ snaplen_min_inferred = rec.rec_header.packet_header.caplen;
+ if (rec.rec_header.packet_header.caplen > snaplen_max_inferred)
+ snaplen_max_inferred = rec.rec_header.packet_header.caplen;
+ }
+
+ if ((rec.rec_header.packet_header.pkt_encap > 0) &&
+ (rec.rec_header.packet_header.pkt_encap < WTAP_NUM_ENCAP_TYPES)) {
+ cf_info.encap_counts[rec.rec_header.packet_header.pkt_encap] += 1;
+ } else {
+ fprintf(stderr, "capinfos: Unknown packet encapsulation %d in frame %u of file \"%s\"\n",
+ rec.rec_header.packet_header.pkt_encap, packet, filename);
+ }
+
+ /* Packet interface_id info */
+ if (rec.presence_flags & WTAP_HAS_INTERFACE_ID) {
+ /* cf_info.num_interfaces is size, not index, so it's one more than max index */
+ if (rec.rec_header.packet_header.interface_id >= cf_info.num_interfaces) {
+ /*
+ * OK, re-fetch the number of interfaces, as there might have
+ * been an interface that was in the middle of packets, and
+ * grow the array to be big enough for the new number of
+ * interfaces.
+ */
+ idb_info = wtap_file_get_idb_info(cf_info.wth);
+
+ cf_info.num_interfaces = idb_info->interface_data->len;
+ g_array_set_size(cf_info.interface_packet_counts, cf_info.num_interfaces);
+
+ g_free(idb_info);
+ idb_info = NULL;
+ }
+ if (rec.rec_header.packet_header.interface_id < cf_info.num_interfaces) {
+ g_array_index(cf_info.interface_packet_counts, guint32,
+ rec.rec_header.packet_header.interface_id) += 1;
+ }
+ else {
+ cf_info.pkt_interface_id_unknown += 1;
+ }
+ }
+ else {
+ /* it's for interface_id 0 */
+ if (cf_info.num_interfaces != 0) {
+ g_array_index(cf_info.interface_packet_counts, guint32, 0) += 1;
+ }
+ else {
+ cf_info.pkt_interface_id_unknown += 1;
+ }
+ }
+ }
+
+ wtap_rec_reset(&rec);
+ } /* while */
+ wtap_rec_cleanup(&rec);
+ ws_buffer_free(&buf);
+
+ /*
+ * Get IDB info strings.
+ * We do this at the end, so we can get information for all IDBs in
+ * the file, even those that come after packet records, and so that
+ * we get, for example, a count of the number of statistics entries
+ * for each interface as of the *end* of the file.
+ */
+ idb_info = wtap_file_get_idb_info(cf_info.wth);
+
+ cf_info.idb_info_strings = g_array_sized_new(FALSE, FALSE, sizeof(gchar*), cf_info.num_interfaces);
+ cf_info.num_interfaces = idb_info->interface_data->len;
+ for (i = 0; i < cf_info.num_interfaces; i++) {
+ const wtap_block_t if_descr = g_array_index(idb_info->interface_data, wtap_block_t, i);
+ gchar *s = wtap_get_debug_if_descr(if_descr, 21, "\n");
+ g_array_append_val(cf_info.idb_info_strings, s);
+ }
+
+ g_free(idb_info);
+ idb_info = NULL;
+
+ if (err != 0) {
+ fprintf(stderr,
+ "capinfos: An error occurred after reading %u packets from \"%s\".\n",
+ packet, filename);
+ cfile_read_failure_message(filename, err, err_info);
+ if (err == WTAP_ERR_SHORT_READ) {
+ /* Don't give up completely with this one. */
+ status = 1;
+ fprintf(stderr,
+ " (will continue anyway, checksums might be incorrect)\n");
+ } else {
+ cleanup_capture_info(&cf_info);
+ wtap_close(cf_info.wth);
+ return 2;
+ }
+ }
+
+ /* File size */
+ size = wtap_file_size(cf_info.wth, &err);
+ if (size == -1) {
+ fprintf(stderr,
+ "capinfos: Can't get size of \"%s\": %s.\n",
+ filename, g_strerror(err));
+ cleanup_capture_info(&cf_info);
+ wtap_close(cf_info.wth);
+ return 2;
+ }
+
+ cf_info.filesize = size;
+
+ /* File Type */
+ cf_info.file_type = wtap_file_type_subtype(cf_info.wth);
+ cf_info.compression_type = wtap_get_compression_type(cf_info.wth);
+
+ /* File Encapsulation */
+ cf_info.file_encap = wtap_file_encap(cf_info.wth);
+
+ cf_info.file_tsprec = wtap_file_tsprec(cf_info.wth);
+
+ /* Packet size limit (snaplen) */
+ cf_info.snaplen = wtap_snapshot_length(cf_info.wth);
+ if (cf_info.snaplen > 0)
+ cf_info.snap_set = TRUE;
+ else
+ cf_info.snap_set = FALSE;
+
+ cf_info.snaplen_min_inferred = snaplen_min_inferred;
+ cf_info.snaplen_max_inferred = snaplen_max_inferred;
+
+ /* # of packets */
+ cf_info.packet_count = packet;
+
+ /* File Times */
+ cf_info.times_known = have_times;
+ cf_info.start_time = start_time;
+ cf_info.start_time_tsprec = start_time_tsprec;
+ cf_info.stop_time = stop_time;
+ cf_info.stop_time_tsprec = stop_time_tsprec;
+ nstime_delta(&cf_info.duration, &stop_time, &start_time);
+ /* Duration precision is the higher of the start and stop time precisions. */
+ if (cf_info.stop_time_tsprec > cf_info.start_time_tsprec)
+ cf_info.duration_tsprec = cf_info.stop_time_tsprec;
+ else
+ cf_info.duration_tsprec = cf_info.start_time_tsprec;
+ cf_info.know_order = know_order;
+ cf_info.order = order;
+
+ /* Number of packet bytes */
+ cf_info.packet_bytes = bytes;
+
+ cf_info.data_rate = 0.0;
+ cf_info.packet_rate = 0.0;
+ cf_info.packet_size = 0.0;
+
+ if (packet > 0) {
+ double delta_time = nstime_to_sec(&stop_time) - nstime_to_sec(&start_time);
+ if (delta_time > 0.0) {
+ cf_info.data_rate = (double)bytes / delta_time; /* Data rate per second */
+ cf_info.packet_rate = (double)packet / delta_time; /* packet rate per second */
+ }
+ cf_info.packet_size = (double)bytes / packet; /* Avg packet size */
+ }
+
+ if (!long_report && table_report_header) {
+ print_stats_table_header(&cf_info);
+ }
+
+ if (long_report) {
+ print_stats(filename, &cf_info);
+ } else {
+ print_stats_table(filename, &cf_info);
+ }
+
+ cleanup_capture_info(&cf_info);
+ wtap_close(cf_info.wth);
+
+ return status;
+}
+
+static void
+print_usage(FILE *output)
+{
+ fprintf(output, "\n");
+ fprintf(output, "Usage: capinfos [options] <infile> ...\n");
+ fprintf(output, "\n");
+ fprintf(output, "General infos:\n");
+ fprintf(output, " -t display the capture file type\n");
+ fprintf(output, " -E display the capture file encapsulation\n");
+ fprintf(output, " -I display the capture file interface information\n");
+ fprintf(output, " -F display additional capture file information\n");
+ fprintf(output, " -H display the SHA256 and SHA1 hashes of the file\n");
+ fprintf(output, " -k display the capture comment\n");
+ fprintf(output, " -p display individual packet comments\n");
+ fprintf(output, "\n");
+ fprintf(output, "Size infos:\n");
+ fprintf(output, " -c display the number of packets\n");
+ fprintf(output, " -s display the size of the file (in bytes)\n");
+ fprintf(output, " -d display the total length of all packets (in bytes)\n");
+ fprintf(output, " -l display the packet size limit (snapshot length)\n");
+ fprintf(output, "\n");
+ fprintf(output, "Time infos:\n");
+ fprintf(output, " -u display the capture duration (in seconds)\n");
+ fprintf(output, " -a display the capture start time\n");
+ fprintf(output, " -e display the capture end time\n");
+ fprintf(output, " -o display the capture file chronological status (True/False)\n");
+ fprintf(output, " -S display start and end times as seconds\n");
+ fprintf(output, "\n");
+ fprintf(output, "Statistic infos:\n");
+ fprintf(output, " -y display average data rate (in bytes/sec)\n");
+ fprintf(output, " -i display average data rate (in bits/sec)\n");
+ fprintf(output, " -z display average packet size (in bytes)\n");
+ fprintf(output, " -x display average packet rate (in packets/sec)\n");
+ fprintf(output, "\n");
+ fprintf(output, "Metadata infos:\n");
+ fprintf(output, " -n display number of resolved IPv4 and IPv6 addresses\n");
+ fprintf(output, " -D display number of decryption secrets\n");
+ fprintf(output, "\n");
+ fprintf(output, "Output format:\n");
+ fprintf(output, " -L generate long report (default)\n");
+ fprintf(output, " -T generate table report\n");
+ fprintf(output, " -M display machine-readable values in long reports\n");
+ fprintf(output, "\n");
+ fprintf(output, "Table report options:\n");
+ fprintf(output, " -R generate header record (default)\n");
+ fprintf(output, " -r do not generate header record\n");
+ fprintf(output, "\n");
+ fprintf(output, " -B separate infos with TAB character (default)\n");
+ fprintf(output, " -m separate infos with comma (,) character\n");
+ fprintf(output, " -b separate infos with SPACE character\n");
+ fprintf(output, "\n");
+ fprintf(output, " -N do not quote infos (default)\n");
+ fprintf(output, " -q quote infos with single quotes (')\n");
+ fprintf(output, " -Q quote infos with double quotes (\")\n");
+ fprintf(output, "\n");
+ fprintf(output, "Miscellaneous:\n");
+ fprintf(output, " -h, --help display this help and exit\n");
+ fprintf(output, " -v, --version display version info and exit\n");
+ fprintf(output, " -C cancel processing if file open fails (default is to continue)\n");
+ fprintf(output, " -A generate all infos (default)\n");
+ fprintf(output, " -K disable displaying the capture comment\n");
+ fprintf(output, " -P disable displaying individual packet comments\n");
+ fprintf(output, "\n");
+ fprintf(output, "Options are processed from left to right order with later options superseding\n");
+ fprintf(output, "or adding to earlier options.\n");
+ fprintf(output, "\n");
+ fprintf(output, "If no options are given the default is to display all infos in long report\n");
+ fprintf(output, "output format.\n");
+}
+
+/*
+ * Report an error in command-line arguments.
+ */
+static void
+capinfos_cmdarg_err(const char *msg_format, va_list ap)
+{
+ fprintf(stderr, "capinfos: ");
+ vfprintf(stderr, msg_format, ap);
+ fprintf(stderr, "\n");
+}
+
+/*
+ * Report additional information for an error in command-line arguments.
+ */
+static void
+capinfos_cmdarg_err_cont(const char *msg_format, va_list ap)
+{
+ vfprintf(stderr, msg_format, ap);
+ fprintf(stderr, "\n");
+}
+
+int
+main(int argc, char *argv[])
+{
+ char *configuration_init_error;
+ static const struct report_message_routines capinfos_report_routines = {
+ failure_message,
+ failure_message,
+ open_failure_message,
+ read_failure_message,
+ write_failure_message,
+ cfile_open_failure_message,
+ cfile_dump_open_failure_message,
+ cfile_read_failure_message,
+ cfile_write_failure_message,
+ cfile_close_failure_message
+ };
+ gboolean need_separator = FALSE;
+ int opt;
+ int overall_error_status = EXIT_SUCCESS;
+ static const struct ws_option long_options[] = {
+ {"help", ws_no_argument, NULL, 'h'},
+ {"version", ws_no_argument, NULL, 'v'},
+ {0, 0, 0, 0 }
+ };
+
+ int status = 0;
+
+ /*
+ * Set the C-language locale to the native environment and set the
+ * code page to UTF-8 on Windows.
+ */
+#ifdef _WIN32
+ setlocale(LC_ALL, ".UTF-8");
+#else
+ setlocale(LC_ALL, "");
+#endif
+
+ cmdarg_err_init(capinfos_cmdarg_err, capinfos_cmdarg_err_cont);
+
+ /* Initialize log handler early so we can have proper logging during startup. */
+ ws_log_init("capinfos", vcmdarg_err);
+
+ /* Early logging command-line initialization. */
+ ws_log_parse_args(&argc, argv, vcmdarg_err, WS_EXIT_INVALID_OPTION);
+
+ ws_noisy("Finished log init and parsing command line log arguments");
+
+ /* Get the decimal point. */
+ decimal_point = g_strdup(localeconv()->decimal_point);
+
+ /* Initialize the version information. */
+ ws_init_version_info("Capinfos", NULL, NULL);
+
+#ifdef _WIN32
+ create_app_running_mutex();
+#endif /* _WIN32 */
+
+ /*
+ * Get credential information for later use.
+ */
+ init_process_policies();
+
+ /*
+ * Attempt to get the pathname of the directory containing the
+ * executable file.
+ */
+ configuration_init_error = configuration_init(argv[0], NULL);
+ if (configuration_init_error != NULL) {
+ fprintf(stderr,
+ "capinfos: Can't get pathname of directory containing the capinfos program: %s.\n",
+ configuration_init_error);
+ g_free(configuration_init_error);
+ }
+
+ init_report_message("capinfos", &capinfos_report_routines);
+
+ wtap_init(TRUE);
+
+ /* Process the options */
+ while ((opt = ws_getopt_long(argc, argv, "abcdehiklmnopqrstuvxyzABCDEFHIKLMNPQRST", long_options, NULL)) !=-1) {
+
+ switch (opt) {
+
+ case 't':
+ if (report_all_infos) disable_all_infos();
+ cap_file_type = TRUE;
+ break;
+
+ case 'E':
+ if (report_all_infos) disable_all_infos();
+ cap_file_encap = TRUE;
+ break;
+
+ case 'l':
+ if (report_all_infos) disable_all_infos();
+ cap_snaplen = TRUE;
+ break;
+
+ case 'c':
+ if (report_all_infos) disable_all_infos();
+ cap_packet_count = TRUE;
+ break;
+
+ case 's':
+ if (report_all_infos) disable_all_infos();
+ cap_file_size = TRUE;
+ break;
+
+ case 'd':
+ if (report_all_infos) disable_all_infos();
+ cap_data_size = TRUE;
+ break;
+
+ case 'u':
+ if (report_all_infos) disable_all_infos();
+ cap_duration = TRUE;
+ break;
+
+ case 'a':
+ if (report_all_infos) disable_all_infos();
+ cap_start_time = TRUE;
+ break;
+
+ case 'e':
+ if (report_all_infos) disable_all_infos();
+ cap_end_time = TRUE;
+ break;
+
+ case 'S':
+ time_as_secs = TRUE;
+ break;
+
+ case 'y':
+ if (report_all_infos) disable_all_infos();
+ cap_data_rate_byte = TRUE;
+ break;
+
+ case 'i':
+ if (report_all_infos) disable_all_infos();
+ cap_data_rate_bit = TRUE;
+ break;
+
+ case 'z':
+ if (report_all_infos) disable_all_infos();
+ cap_packet_size = TRUE;
+ break;
+
+ case 'x':
+ if (report_all_infos) disable_all_infos();
+ cap_packet_rate = TRUE;
+ break;
+
+ case 'H':
+ if (report_all_infos) disable_all_infos();
+ cap_file_hashes = TRUE;
+ break;
+
+ case 'o':
+ if (report_all_infos) disable_all_infos();
+ cap_order = TRUE;
+ break;
+
+ case 'k':
+ if (report_all_infos) disable_all_infos();
+ cap_comment = TRUE;
+ break;
+
+ case 'p':
+ if (report_all_infos) disable_all_infos();
+ pkt_comments = TRUE;
+ break;
+
+ case 'K':
+ cap_comment = FALSE;
+ break;
+
+ case 'P':
+ pkt_comments = FALSE;
+ break;
+
+ case 'F':
+ if (report_all_infos) disable_all_infos();
+ cap_file_more_info = TRUE;
+ break;
+
+ case 'I':
+ if (report_all_infos) disable_all_infos();
+ cap_file_idb = TRUE;
+ break;
+
+ case 'n':
+ if (report_all_infos) disable_all_infos();
+ cap_file_nrb = TRUE;
+ break;
+
+ case 'D':
+ if (report_all_infos) disable_all_infos();
+ cap_file_dsb = TRUE;
+ break;
+
+ case 'C':
+ stop_after_failure = TRUE;
+ break;
+
+ case 'A':
+ enable_all_infos();
+ break;
+
+ case 'L':
+ long_report = TRUE;
+ break;
+
+ case 'T':
+ long_report = FALSE;
+ break;
+
+ case 'M':
+ machine_readable = TRUE;
+ break;
+
+ case 'R':
+ table_report_header = TRUE;
+ break;
+
+ case 'r':
+ table_report_header = FALSE;
+ break;
+
+ case 'N':
+ quote_char = '\0';
+ break;
+
+ case 'q':
+ quote_char = '\'';
+ break;
+
+ case 'Q':
+ quote_char = '"';
+ break;
+
+ case 'B':
+ field_separator = '\t';
+ break;
+
+ case 'm':
+ field_separator = ',';
+ break;
+
+ case 'b':
+ field_separator = ' ';
+ break;
+
+ case 'h':
+ show_help_header("Print various information (infos) about capture files.");
+ print_usage(stdout);
+ goto exit;
+ break;
+
+ case 'v':
+ show_version();
+ goto exit;
+ break;
+
+ case '?': /* Bad flag - print usage message */
+ print_usage(stderr);
+ overall_error_status = WS_EXIT_INVALID_OPTION;
+ goto exit;
+ break;
+ }
+ }
+
+ if ((argc - ws_optind) < 1) {
+ print_usage(stderr);
+ overall_error_status = WS_EXIT_INVALID_OPTION;
+ goto exit;
+ }
+
+ if (cap_file_hashes) {
+ gcry_check_version(NULL);
+ gcry_md_open(&hd, GCRY_MD_SHA256, 0);
+ if (hd)
+ gcry_md_enable(hd, GCRY_MD_SHA1);
+
+ hash_buf = (char *)g_malloc(HASH_BUF_SIZE);
+ }
+
+ overall_error_status = 0;
+
+ for (opt = ws_optind; opt < argc; opt++) {
+
+ status = process_cap_file(argv[opt], need_separator);
+ if (status) {
+ /* Something failed. It's been reported; remember that processing
+ one file failed and, if -C was specified, stop. */
+ overall_error_status = status;
+ if (stop_after_failure)
+ goto exit;
+ }
+ if (status != 2) {
+ /* Either it succeeded or it got a "short read" but printed
+ information anyway. Note that we need a blank line before
+ the next file's information, to separate it from the
+ previous file. */
+ need_separator = TRUE;
+ }
+ }
+
+exit:
+ g_free(hash_buf);
+ gcry_md_close(hd);
+ wtap_cleanup();
+ free_progdirs();
+ return overall_error_status;
+}