aboutsummaryrefslogtreecommitdiff
path: root/rpcap-protocol.c
diff options
context:
space:
mode:
authorGuy Harris <guy@alum.mit.edu>2017-09-30 14:13:36 -0700
committerGuy Harris <guy@alum.mit.edu>2017-09-30 14:13:36 -0700
commitedd9fb622ac112438e0631ebf5ae054099c208f0 (patch)
treebd3e15bfdda70998f0cb230a9903596411c69c28 /rpcap-protocol.c
parent7f450f6aaabc0fe41e4b9ac5e323327a97138501 (diff)
Put rpcap protocol routines common to client and server in rpcap-protocol.c
That way, rpcapd doesn't depend on them being exported from libpcap (which they shouldn't be).
Diffstat (limited to 'rpcap-protocol.c')
-rw-r--r--rpcap-protocol.c312
1 files changed, 312 insertions, 0 deletions
diff --git a/rpcap-protocol.c b/rpcap-protocol.c
new file mode 100644
index 00000000..b0a9652a
--- /dev/null
+++ b/rpcap-protocol.c
@@ -0,0 +1,312 @@
+/*
+ * Copyright (c) 2002 - 2005 NetGroup, Politecnico di Torino (Italy)
+ * Copyright (c) 2005 - 2008 CACE Technologies, Davis (California)
+ * All rights reserved.
+ *
+ * Redistribution and use in source and binary forms, with or without
+ * modification, are permitted provided that the following conditions
+ * are met:
+ *
+ * 1. Redistributions of source code must retain the above copyright
+ * notice, this list of conditions and the following disclaimer.
+ * 2. Redistributions in binary form must reproduce the above copyright
+ * notice, this list of conditions and the following disclaimer in the
+ * documentation and/or other materials provided with the distribution.
+ * 3. Neither the name of the Politecnico di Torino, CACE Technologies
+ * nor the names of its contributors may be used to endorse or promote
+ * products derived from this software without specific prior written
+ * permission.
+ *
+ * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
+ * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
+ * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
+ * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
+ * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
+ * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
+ * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
+ * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
+ * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
+ * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
+ * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+ *
+ */
+
+#ifdef HAVE_CONFIG_H
+#include <config.h>
+#endif
+
+#include <string.h> /* for strlen(), ... */
+#include <stdlib.h> /* for malloc(), free(), ... */
+#include <stdarg.h> /* for functions with variable number of arguments */
+#include <errno.h> /* for the errno variable */
+#include "sockutils.h"
+#include "rpcap-protocol.h"
+#include <pcap/pcap.h>
+#if 0
+#include "pcap-rpcap.h"
+#include "pcap-rpcap-int.h"
+#endif
+
+/*
+ * This file contains functions used both by the rpcap client and the
+ * rpcap daemon.
+ */
+
+/*
+ * This function checks whether the version contained into the message is
+ * compatible with the one handled by this implementation.
+ *
+ * Right now, this function does not have any sophisticated task: if the
+ * versions are different, it returns -1 and it discards the message.
+ * If new versions of the protocol are created, there will need to be
+ * a negotiation phase early in the process of connecting to our peer,
+ * so that the highest version supported by both sides can be used.
+ *
+ * \param sock: the socket that has to be used to receive data. This
+ * function can read data from socket in case the version contained into
+ * the message is not compatible with ours. In that case, all the message
+ * is purged from the socket, so that the following recv() calls will
+ * return a new (clean) message.
+ *
+ * \param header: a pointer to and 'rpcap_header' structure that keeps
+ * the data received from the network (still in network byte order) and
+ * that has to be checked.
+ *
+ * \param errbuf: a pointer to a user-allocated buffer (of size
+ * PCAP_ERRBUF_SIZE) that will contain the error message (in case there
+ * is one). The error message is "incompatible version".
+ *
+ * \return '0' if everything is fine, '-1' if some errors occurred. The
+ * error message is returned in the 'errbuf' variable.
+ */
+int
+rpcap_checkver(SOCKET sock, struct rpcap_header *header, char *errbuf)
+{
+ /*
+ * This is a sample function.
+ *
+ * In the real world, you have to check the type code,
+ * and decide accordingly.
+ */
+ if (header->ver != RPCAP_VERSION)
+ {
+ pcap_snprintf(errbuf, PCAP_ERRBUF_SIZE, "Incompatible version number: message discarded.");
+
+ /* we already have an error, so please discard this one */
+ sock_discard(sock, ntohl(header->plen), NULL, 0);
+ return -1;
+ }
+
+ return 0;
+}
+
+/*
+ * This function sends a RPCAP error to our peer.
+ *
+ * It has to be called when the main program detects an error.
+ * It will send to our peer the 'buffer' specified by the user.
+ * This function *does not* request a RPCAP CLOSE connection. A CLOSE
+ * command must be sent explicitly by the program, since we do not know
+ * whether the error can be recovered in some way or if it is a
+ * non-recoverable one.
+ *
+ * \param sock: the socket we are currently using.
+ *
+ * \param error: an user-allocated (and '0' terminated) buffer that contains
+ * the error description that has to be transmitted to our peer. The
+ * error message cannot be longer than PCAP_ERRBUF_SIZE.
+ *
+ * \param errcode: a integer which tells the other party the type of error
+ * we had; currently is is not too much used.
+ *
+ * \param errbuf: a pointer to a user-allocated buffer (of size
+ * PCAP_ERRBUF_SIZE) that will contain the error message (in case there
+ * is one). It could be network problem.
+ *
+ * \return '0' if everything is fine, '-1' if some errors occurred. The
+ * error message is returned in the 'errbuf' variable.
+ */
+int
+rpcap_senderror(SOCKET sock, char *error, unsigned short errcode, char *errbuf)
+{
+ char sendbuf[RPCAP_NETBUF_SIZE]; /* temporary buffer in which data to be sent is buffered */
+ int sendbufidx = 0; /* index which keeps the number of bytes currently buffered */
+ uint16 length;
+
+ length = (uint16)strlen(error);
+
+ if (length > PCAP_ERRBUF_SIZE)
+ length = PCAP_ERRBUF_SIZE;
+
+ rpcap_createhdr((struct rpcap_header *) sendbuf, RPCAP_MSG_ERROR, errcode, length);
+
+ if (sock_bufferize(NULL, sizeof(struct rpcap_header), NULL, &sendbufidx,
+ RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errbuf, PCAP_ERRBUF_SIZE))
+ return -1;
+
+ if (sock_bufferize(error, length, sendbuf, &sendbufidx,
+ RPCAP_NETBUF_SIZE, SOCKBUF_BUFFERIZE, errbuf, PCAP_ERRBUF_SIZE))
+ return -1;
+
+ if (sock_send(sock, sendbuf, sendbufidx, errbuf, PCAP_ERRBUF_SIZE))
+ return -1;
+
+ return 0;
+}
+
+/*
+ * This function fills in a structure of type rpcap_header.
+ *
+ * It is provided just because the creation of an rpcap header is a common
+ * task. It accepts all the values that appears into an rpcap_header, and
+ * it puts them in place using the proper hton() calls.
+ *
+ * \param header: a pointer to a user-allocated buffer which will contain
+ * the serialized header, ready to be sent on the network.
+ *
+ * \param type: a value (in the host by order) which will be placed into the
+ * header.type field and that represents the type of the current message.
+ *
+ * \param value: a value (in the host by order) which will be placed into
+ * the header.value field and that has a message-dependent meaning.
+ *
+ * \param length: a value (in the host by order) which will be placed into
+ * the header.length field, representing the payload length of the message.
+ *
+ * \return Nothing. The serialized header is returned into the 'header'
+ * variable.
+ */
+void
+rpcap_createhdr(struct rpcap_header *header, uint8 type, uint16 value, uint32 length)
+{
+ memset(header, 0, sizeof(struct rpcap_header));
+
+ header->ver = RPCAP_VERSION;
+ header->type = type;
+ header->value = htons(value);
+ header->plen = htonl(length);
+}
+
+/*
+ * This function checks whether the header of the received message is correct.
+ *
+ * It is a way to easily check if the message received, in a certain state
+ * of the RPCAP protocol Finite State Machine, is valid. This function accepts,
+ * as a parameter, the list of message types that are allowed in a certain
+ * situation, and it returns the one that occurs.
+ *
+ * \param errbuf: a pointer to a user-allocated buffer (of size
+ * PCAP_ERRBUF_SIZE) that will contain the error message (in case there
+ * is one). It could either be a problem that occurred inside this function
+ * (e.g. a network problem in case it tries to send an error to our peer
+ * and the send() call fails), an error message thathas been sent to us
+ * from the other party, or a version error (the message received has a
+ * version number that is incompatible with ours).
+ *
+ * \param sock: the socket that has to be used to receive data. This
+ * function can read data from socket in case the version contained into
+ * the message is not compatible with ours. In that case, all the message
+ * is purged from the socket, so that the following recv() calls will
+ * return a new message.
+ *
+ * \param header: a pointer to and 'rpcap_header' structure that keeps
+ * the data received from the network (still in network byte order) and
+ * that has to be checked.
+ *
+ * \param first: this function has a variable number of parameters. From
+ * this point on, all the messages that are valid in this context must be
+ * passed as parameters. The message type list must be terminated with a
+ * '0' value, the null message type, which means 'no more types to check'.
+ * The RPCAP protocol does not define anything with message type equal to
+ * zero, so there is no ambiguity in using this value as a list terminator.
+ *
+ * \return The message type of the message that has been detected. In case
+ * of errors (e.g. the header contains a type that is not listed among the
+ * allowed types), this function will return the following codes:
+ * - (-1) if the version is incompatible.
+ * - (-2) if the code is not among the one listed into the parameters list
+ * - (-3) if a network error (connection reset, ...)
+ * - RPCAP_MSG_ERROR if the message is an error message (it follows that
+ * the RPCAP_MSG_ERROR could not be present in the allowed message-types
+ * list, because this function checks for errors anyway)
+ *
+ * In case either the version is incompatible or nothing matches (i.e. it
+ * returns '-1' or '-2'), it discards the message body (i.e. it reads the
+ * remaining part of the message from the network and it discards it) so
+ * that the application is ready to receive a new message.
+ */
+int
+rpcap_checkmsg(char *errbuf, SOCKET sock, struct rpcap_header *header, uint8 first, ...)
+{
+ va_list ap;
+ uint8 type;
+ int32 len;
+
+ va_start(ap, first);
+
+ /* Check if the present version of the protocol can handle this message */
+ if (rpcap_checkver(sock, header, errbuf))
+ {
+ SOCK_ASSERT(errbuf, 1);
+
+ va_end(ap);
+ return -1;
+ }
+
+ type = first;
+
+ while (type != 0)
+ {
+ /*
+ * The message matches with one of the types listed
+ * There is no need of conversions since both values are uint8
+ *
+ * Check if the other side reported an error.
+ * If yes, it retrieves it and it returns it back to the caller
+ */
+ if (header->type == RPCAP_MSG_ERROR)
+ {
+ len = ntohl(header->plen);
+
+ if (len >= PCAP_ERRBUF_SIZE)
+ {
+ if (sock_recv(sock, errbuf, PCAP_ERRBUF_SIZE - 1, SOCK_RECEIVEALL_YES, errbuf, PCAP_ERRBUF_SIZE))
+ return -3;
+
+ sock_discard(sock, len - (PCAP_ERRBUF_SIZE - 1), NULL, 0);
+
+ /* Put '\0' at the end of the string */
+ errbuf[PCAP_ERRBUF_SIZE - 1] = 0;
+ }
+ else
+ {
+ if (sock_recv(sock, errbuf, len, SOCK_RECEIVEALL_YES, errbuf, PCAP_ERRBUF_SIZE) == -1)
+ return -3;
+
+ /* Put '\0' at the end of the string */
+ errbuf[len] = 0;
+ }
+
+ va_end(ap);
+ return header->type;
+ }
+
+ if (header->type == type)
+ {
+ va_end(ap);
+ return header->type;
+ }
+
+ /* get next argument */
+ type = va_arg(ap, int);
+ }
+
+ /* we already have an error, so please discard this one */
+ sock_discard(sock, ntohl(header->plen), NULL, 0);
+
+ pcap_snprintf(errbuf, PCAP_ERRBUF_SIZE, "The other endpoint sent a message that is not allowed here.");
+ SOCK_ASSERT(errbuf, 1);
+
+ va_end(ap);
+ return -2;
+}