1 | /* $NetBSD: pcap.h,v 1.8 2018/09/03 15:26:44 christos Exp $ */ |
2 | |
3 | /* -*- Mode: c; tab-width: 8; indent-tabs-mode: 1; c-basic-offset: 8; -*- */ |
4 | /* |
5 | * Copyright (c) 1993, 1994, 1995, 1996, 1997 |
6 | * The Regents of the University of California. All rights reserved. |
7 | * |
8 | * Redistribution and use in source and binary forms, with or without |
9 | * modification, are permitted provided that the following conditions |
10 | * are met: |
11 | * 1. Redistributions of source code must retain the above copyright |
12 | * notice, this list of conditions and the following disclaimer. |
13 | * 2. Redistributions in binary form must reproduce the above copyright |
14 | * notice, this list of conditions and the following disclaimer in the |
15 | * documentation and/or other materials provided with the distribution. |
16 | * 3. All advertising materials mentioning features or use of this software |
17 | * must display the following acknowledgement: |
18 | * This product includes software developed by the Computer Systems |
19 | * Engineering Group at Lawrence Berkeley Laboratory. |
20 | * 4. Neither the name of the University nor of the Laboratory may be used |
21 | * to endorse or promote products derived from this software without |
22 | * specific prior written permission. |
23 | * |
24 | * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND |
25 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
26 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE |
27 | * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE |
28 | * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL |
29 | * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS |
30 | * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) |
31 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT |
32 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY |
33 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF |
34 | * SUCH DAMAGE. |
35 | */ |
36 | |
37 | /* |
38 | * Remote packet capture mechanisms and extensions from WinPcap: |
39 | * |
40 | * Copyright (c) 2002 - 2003 |
41 | * NetGroup, Politecnico di Torino (Italy) |
42 | * All rights reserved. |
43 | * |
44 | * Redistribution and use in source and binary forms, with or without |
45 | * modification, are permitted provided that the following conditions |
46 | * are met: |
47 | * |
48 | * 1. Redistributions of source code must retain the above copyright |
49 | * notice, this list of conditions and the following disclaimer. |
50 | * 2. Redistributions in binary form must reproduce the above copyright |
51 | * notice, this list of conditions and the following disclaimer in the |
52 | * documentation and/or other materials provided with the distribution. |
53 | * 3. Neither the name of the Politecnico di Torino nor the names of its |
54 | * contributors may be used to endorse or promote products derived from |
55 | * this software without specific prior written permission. |
56 | * |
57 | * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS |
58 | * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT |
59 | * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR |
60 | * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT |
61 | * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, |
62 | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT |
63 | * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, |
64 | * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY |
65 | * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT |
66 | * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE |
67 | * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
68 | * |
69 | */ |
70 | |
71 | #ifndef lib_pcap_pcap_h |
72 | #define lib_pcap_pcap_h |
73 | |
74 | #include <pcap/funcattrs.h> |
75 | |
76 | #include <pcap/pcap-inttypes.h> |
77 | |
78 | #if defined(_WIN32) |
79 | #include <winsock2.h> /* u_int, u_char etc. */ |
80 | #include <io.h> /* _get_osfhandle() */ |
81 | #elif defined(MSDOS) |
82 | #include <sys/types.h> /* u_int, u_char etc. */ |
83 | #include <sys/socket.h> |
84 | #else /* UN*X */ |
85 | #include <sys/types.h> /* u_int, u_char etc. */ |
86 | #include <sys/time.h> |
87 | #endif /* _WIN32/MSDOS/UN*X */ |
88 | |
89 | #ifndef PCAP_DONT_INCLUDE_PCAP_BPF_H |
90 | #include <pcap/bpf.h> |
91 | #else |
92 | #include <net/bpf.h> |
93 | #endif |
94 | |
95 | #include <stdio.h> |
96 | |
97 | #ifdef __cplusplus |
98 | extern "C" { |
99 | #endif |
100 | |
101 | /* |
102 | * Version number of the current version of the pcap file format. |
103 | * |
104 | * NOTE: this is *NOT* the version number of the libpcap library. |
105 | * To fetch the version information for the version of libpcap |
106 | * you're using, use pcap_lib_version(). |
107 | */ |
108 | #define PCAP_VERSION_MAJOR 2 |
109 | #define PCAP_VERSION_MINOR 4 |
110 | |
111 | #define PCAP_ERRBUF_SIZE 256 |
112 | |
113 | /* |
114 | * Compatibility for systems that have a bpf.h that |
115 | * predates the bpf typedefs for 64-bit support. |
116 | */ |
117 | #if BPF_RELEASE - 0 < 199406 |
118 | typedef int bpf_int32; |
119 | typedef u_int bpf_u_int32; |
120 | #endif |
121 | |
122 | typedef struct pcap pcap_t; |
123 | typedef struct pcap_dumper pcap_dumper_t; |
124 | typedef struct pcap_if pcap_if_t; |
125 | typedef struct pcap_addr pcap_addr_t; |
126 | |
127 | /* |
128 | * The first record in the file contains saved values for some |
129 | * of the flags used in the printout phases of tcpdump. |
130 | * Many fields here are 32 bit ints so compilers won't insert unwanted |
131 | * padding; these files need to be interchangeable across architectures. |
132 | * |
133 | * Do not change the layout of this structure, in any way (this includes |
134 | * changes that only affect the length of fields in this structure). |
135 | * |
136 | * Also, do not change the interpretation of any of the members of this |
137 | * structure, in any way (this includes using values other than |
138 | * LINKTYPE_ values, as defined in "savefile.c", in the "linktype" |
139 | * field). |
140 | * |
141 | * Instead: |
142 | * |
143 | * introduce a new structure for the new format, if the layout |
144 | * of the structure changed; |
145 | * |
146 | * send mail to "tcpdump-workers@lists.tcpdump.org", requesting |
147 | * a new magic number for your new capture file format, and, when |
148 | * you get the new magic number, put it in "savefile.c"; |
149 | * |
150 | * use that magic number for save files with the changed file |
151 | * header; |
152 | * |
153 | * make the code in "savefile.c" capable of reading files with |
154 | * the old file header as well as files with the new file header |
155 | * (using the magic number to determine the header format). |
156 | * |
157 | * Then supply the changes by forking the branch at |
158 | * |
159 | * https://github.com/the-tcpdump-group/libpcap/issues |
160 | * |
161 | * and issuing a pull request, so that future versions of libpcap and |
162 | * programs that use it (such as tcpdump) will be able to read your new |
163 | * capture file format. |
164 | */ |
165 | struct { |
166 | bpf_u_int32 ; |
167 | u_short ; |
168 | u_short ; |
169 | bpf_int32 ; /* gmt to local correction */ |
170 | bpf_u_int32 ; /* accuracy of timestamps */ |
171 | bpf_u_int32 ; /* max length saved portion of each pkt */ |
172 | bpf_u_int32 ; /* data link type (LINKTYPE_*) */ |
173 | }; |
174 | |
175 | /* |
176 | * Macros for the value returned by pcap_datalink_ext(). |
177 | * |
178 | * If LT_FCS_LENGTH_PRESENT(x) is true, the LT_FCS_LENGTH(x) macro |
179 | * gives the FCS length of packets in the capture. |
180 | */ |
181 | #define LT_FCS_LENGTH_PRESENT(x) ((x) & 0x04000000) |
182 | #define LT_FCS_LENGTH(x) (((x) & 0xF0000000) >> 28) |
183 | #define LT_FCS_DATALINK_EXT(x) ((((x) & 0xF) << 28) | 0x04000000) |
184 | |
185 | typedef enum { |
186 | PCAP_D_INOUT = 0, |
187 | PCAP_D_IN, |
188 | PCAP_D_OUT |
189 | } pcap_direction_t; |
190 | |
191 | /* |
192 | * Generic per-packet information, as supplied by libpcap. |
193 | * |
194 | * The time stamp can and should be a "struct timeval", regardless of |
195 | * whether your system supports 32-bit tv_sec in "struct timeval", |
196 | * 64-bit tv_sec in "struct timeval", or both if it supports both 32-bit |
197 | * and 64-bit applications. The on-disk format of savefiles uses 32-bit |
198 | * tv_sec (and tv_usec); this structure is irrelevant to that. 32-bit |
199 | * and 64-bit versions of libpcap, even if they're on the same platform, |
200 | * should supply the appropriate version of "struct timeval", even if |
201 | * that's not what the underlying packet capture mechanism supplies. |
202 | */ |
203 | struct pcap_pkthdr { |
204 | struct timeval ts; /* time stamp */ |
205 | bpf_u_int32 caplen; /* length of portion present */ |
206 | bpf_u_int32 len; /* length this packet (off wire) */ |
207 | }; |
208 | |
209 | /* |
210 | * As returned by the pcap_stats() |
211 | */ |
212 | struct pcap_stat { |
213 | u_int ps_recv; /* number of packets received */ |
214 | u_int ps_drop; /* number of packets dropped */ |
215 | u_int ps_ifdrop; /* drops by interface -- only supported on some platforms */ |
216 | #ifdef _WIN32 |
217 | u_int ps_capt; /* number of packets that reach the application */ |
218 | u_int ps_sent; /* number of packets sent by the server on the network */ |
219 | u_int ps_netdrop; /* number of packets lost on the network */ |
220 | #endif /* _WIN32 */ |
221 | }; |
222 | |
223 | #ifdef MSDOS |
224 | /* |
225 | * As returned by the pcap_stats_ex() |
226 | */ |
227 | struct pcap_stat_ex { |
228 | u_long rx_packets; /* total packets received */ |
229 | u_long tx_packets; /* total packets transmitted */ |
230 | u_long rx_bytes; /* total bytes received */ |
231 | u_long tx_bytes; /* total bytes transmitted */ |
232 | u_long rx_errors; /* bad packets received */ |
233 | u_long tx_errors; /* packet transmit problems */ |
234 | u_long rx_dropped; /* no space in Rx buffers */ |
235 | u_long tx_dropped; /* no space available for Tx */ |
236 | u_long multicast; /* multicast packets received */ |
237 | u_long collisions; |
238 | |
239 | /* detailed rx_errors: */ |
240 | u_long rx_length_errors; |
241 | u_long rx_over_errors; /* receiver ring buff overflow */ |
242 | u_long rx_crc_errors; /* recv'd pkt with crc error */ |
243 | u_long rx_frame_errors; /* recv'd frame alignment error */ |
244 | u_long rx_fifo_errors; /* recv'r fifo overrun */ |
245 | u_long rx_missed_errors; /* recv'r missed packet */ |
246 | |
247 | /* detailed tx_errors */ |
248 | u_long tx_aborted_errors; |
249 | u_long tx_carrier_errors; |
250 | u_long tx_fifo_errors; |
251 | u_long tx_heartbeat_errors; |
252 | u_long tx_window_errors; |
253 | }; |
254 | #endif |
255 | |
256 | /* |
257 | * Item in a list of interfaces. |
258 | */ |
259 | struct pcap_if { |
260 | struct pcap_if *next; |
261 | char *name; /* name to hand to "pcap_open_live()" */ |
262 | char *description; /* textual description of interface, or NULL */ |
263 | struct pcap_addr *addresses; |
264 | bpf_u_int32 flags; /* PCAP_IF_ interface flags */ |
265 | }; |
266 | |
267 | #define PCAP_IF_LOOPBACK 0x00000001 /* interface is loopback */ |
268 | #define PCAP_IF_UP 0x00000002 /* interface is up */ |
269 | #define PCAP_IF_RUNNING 0x00000004 /* interface is running */ |
270 | #define PCAP_IF_WIRELESS 0x00000008 /* interface is wireless (*NOT* necessarily Wi-Fi!) */ |
271 | #define PCAP_IF_CONNECTION_STATUS 0x00000030 /* connection status: */ |
272 | #define PCAP_IF_CONNECTION_STATUS_UNKNOWN 0x00000000 /* unknown */ |
273 | #define PCAP_IF_CONNECTION_STATUS_CONNECTED 0x00000010 /* connected */ |
274 | #define PCAP_IF_CONNECTION_STATUS_DISCONNECTED 0x00000020 /* disconnected */ |
275 | #define PCAP_IF_CONNECTION_STATUS_NOT_APPLICABLE 0x00000030 /* not applicable */ |
276 | |
277 | /* |
278 | * Representation of an interface address. |
279 | */ |
280 | struct pcap_addr { |
281 | struct pcap_addr *next; |
282 | struct sockaddr *addr; /* address */ |
283 | struct sockaddr *netmask; /* netmask for that address */ |
284 | struct sockaddr *broadaddr; /* broadcast address for that address */ |
285 | struct sockaddr *dstaddr; /* P2P destination address for that address */ |
286 | }; |
287 | |
288 | typedef void (*pcap_handler)(u_char *, const struct pcap_pkthdr *, |
289 | const u_char *); |
290 | |
291 | /* |
292 | * Error codes for the pcap API. |
293 | * These will all be negative, so you can check for the success or |
294 | * failure of a call that returns these codes by checking for a |
295 | * negative value. |
296 | */ |
297 | #define PCAP_ERROR -1 /* generic error code */ |
298 | #define PCAP_ERROR_BREAK -2 /* loop terminated by pcap_breakloop */ |
299 | #define PCAP_ERROR_NOT_ACTIVATED -3 /* the capture needs to be activated */ |
300 | #define PCAP_ERROR_ACTIVATED -4 /* the operation can't be performed on already activated captures */ |
301 | #define PCAP_ERROR_NO_SUCH_DEVICE -5 /* no such device exists */ |
302 | #define PCAP_ERROR_RFMON_NOTSUP -6 /* this device doesn't support rfmon (monitor) mode */ |
303 | #define PCAP_ERROR_NOT_RFMON -7 /* operation supported only in monitor mode */ |
304 | #define PCAP_ERROR_PERM_DENIED -8 /* no permission to open the device */ |
305 | #define PCAP_ERROR_IFACE_NOT_UP -9 /* interface isn't up */ |
306 | #define PCAP_ERROR_CANTSET_TSTAMP_TYPE -10 /* this device doesn't support setting the time stamp type */ |
307 | #define PCAP_ERROR_PROMISC_PERM_DENIED -11 /* you don't have permission to capture in promiscuous mode */ |
308 | #define PCAP_ERROR_TSTAMP_PRECISION_NOTSUP -12 /* the requested time stamp precision is not supported */ |
309 | |
310 | /* |
311 | * Warning codes for the pcap API. |
312 | * These will all be positive and non-zero, so they won't look like |
313 | * errors. |
314 | */ |
315 | #define PCAP_WARNING 1 /* generic warning code */ |
316 | #define PCAP_WARNING_PROMISC_NOTSUP 2 /* this device doesn't support promiscuous mode */ |
317 | #define PCAP_WARNING_TSTAMP_TYPE_NOTSUP 3 /* the requested time stamp type is not supported */ |
318 | |
319 | /* |
320 | * Value to pass to pcap_compile() as the netmask if you don't know what |
321 | * the netmask is. |
322 | */ |
323 | #define PCAP_NETMASK_UNKNOWN 0xffffffff |
324 | |
325 | /* |
326 | * We're deprecating pcap_lookupdev() for various reasons (not |
327 | * thread-safe, can behave weirdly with WinPcap). Callers |
328 | * should use pcap_findalldevs() and use the first device. |
329 | */ |
330 | PCAP_API char *pcap_lookupdev(char *) |
331 | PCAP_DEPRECATED(pcap_lookupdev, "use 'pcap_findalldevs' and use the first device" ); |
332 | |
333 | PCAP_API int pcap_lookupnet(const char *, bpf_u_int32 *, bpf_u_int32 *, char *); |
334 | |
335 | PCAP_API pcap_t *pcap_create(const char *, char *); |
336 | PCAP_API int pcap_set_snaplen(pcap_t *, int); |
337 | PCAP_API int pcap_set_promisc(pcap_t *, int); |
338 | PCAP_API int pcap_can_set_rfmon(pcap_t *); |
339 | PCAP_API int pcap_set_rfmon(pcap_t *, int); |
340 | PCAP_API int pcap_set_timeout(pcap_t *, int); |
341 | PCAP_API int pcap_set_tstamp_type(pcap_t *, int); |
342 | PCAP_API int pcap_set_immediate_mode(pcap_t *, int); |
343 | PCAP_API int pcap_set_buffer_size(pcap_t *, int); |
344 | PCAP_API int pcap_set_tstamp_precision(pcap_t *, int); |
345 | PCAP_API int pcap_get_tstamp_precision(pcap_t *); |
346 | PCAP_API int pcap_activate(pcap_t *); |
347 | |
348 | PCAP_API int pcap_list_tstamp_types(pcap_t *, int **); |
349 | PCAP_API void pcap_free_tstamp_types(int *); |
350 | PCAP_API int pcap_tstamp_type_name_to_val(const char *); |
351 | PCAP_API const char *pcap_tstamp_type_val_to_name(int); |
352 | PCAP_API const char *pcap_tstamp_type_val_to_description(int); |
353 | |
354 | #ifdef __linux__ |
355 | PCAP_API int pcap_set_protocol_linux(pcap_t *, int); |
356 | #endif |
357 | |
358 | /* |
359 | * Time stamp types. |
360 | * Not all systems and interfaces will necessarily support all of these. |
361 | * |
362 | * A system that supports PCAP_TSTAMP_HOST is offering time stamps |
363 | * provided by the host machine, rather than by the capture device, |
364 | * but not committing to any characteristics of the time stamp; |
365 | * it will not offer any of the PCAP_TSTAMP_HOST_ subtypes. |
366 | * |
367 | * PCAP_TSTAMP_HOST_LOWPREC is a time stamp, provided by the host machine, |
368 | * that's low-precision but relatively cheap to fetch; it's normally done |
369 | * using the system clock, so it's normally synchronized with times you'd |
370 | * fetch from system calls. |
371 | * |
372 | * PCAP_TSTAMP_HOST_HIPREC is a time stamp, provided by the host machine, |
373 | * that's high-precision; it might be more expensive to fetch. It might |
374 | * or might not be synchronized with the system clock, and might have |
375 | * problems with time stamps for packets received on different CPUs, |
376 | * depending on the platform. |
377 | * |
378 | * PCAP_TSTAMP_ADAPTER is a high-precision time stamp supplied by the |
379 | * capture device; it's synchronized with the system clock. |
380 | * |
381 | * PCAP_TSTAMP_ADAPTER_UNSYNCED is a high-precision time stamp supplied by |
382 | * the capture device; it's not synchronized with the system clock. |
383 | * |
384 | * Note that time stamps synchronized with the system clock can go |
385 | * backwards, as the system clock can go backwards. If a clock is |
386 | * not in sync with the system clock, that could be because the |
387 | * system clock isn't keeping accurate time, because the other |
388 | * clock isn't keeping accurate time, or both. |
389 | * |
390 | * Note that host-provided time stamps generally correspond to the |
391 | * time when the time-stamping code sees the packet; this could |
392 | * be some unknown amount of time after the first or last bit of |
393 | * the packet is received by the network adapter, due to batching |
394 | * of interrupts for packet arrival, queueing delays, etc.. |
395 | */ |
396 | #define PCAP_TSTAMP_HOST 0 /* host-provided, unknown characteristics */ |
397 | #define PCAP_TSTAMP_HOST_LOWPREC 1 /* host-provided, low precision */ |
398 | #define PCAP_TSTAMP_HOST_HIPREC 2 /* host-provided, high precision */ |
399 | #define PCAP_TSTAMP_ADAPTER 3 /* device-provided, synced with the system clock */ |
400 | #define PCAP_TSTAMP_ADAPTER_UNSYNCED 4 /* device-provided, not synced with the system clock */ |
401 | |
402 | /* |
403 | * Time stamp resolution types. |
404 | * Not all systems and interfaces will necessarily support all of these |
405 | * resolutions when doing live captures; all of them can be requested |
406 | * when reading a savefile. |
407 | */ |
408 | #define PCAP_TSTAMP_PRECISION_MICRO 0 /* use timestamps with microsecond precision, default */ |
409 | #define PCAP_TSTAMP_PRECISION_NANO 1 /* use timestamps with nanosecond precision */ |
410 | |
411 | PCAP_API pcap_t *pcap_open_live(const char *, int, int, int, char *); |
412 | PCAP_API pcap_t *pcap_open_dead(int, int); |
413 | PCAP_API pcap_t *pcap_open_dead_with_tstamp_precision(int, int, u_int); |
414 | PCAP_API pcap_t *pcap_open_offline_with_tstamp_precision(const char *, u_int, char *); |
415 | PCAP_API pcap_t *pcap_open_offline(const char *, char *); |
416 | #ifdef _WIN32 |
417 | PCAP_API pcap_t *pcap_hopen_offline_with_tstamp_precision(intptr_t, u_int, char *); |
418 | PCAP_API pcap_t *pcap_hopen_offline(intptr_t, char *); |
419 | /* |
420 | * If we're building libpcap, these are internal routines in savefile.c, |
421 | * so we must not define them as macros. |
422 | * |
423 | * If we're not building libpcap, given that the version of the C runtime |
424 | * with which libpcap was built might be different from the version |
425 | * of the C runtime with which an application using libpcap was built, |
426 | * and that a FILE structure may differ between the two versions of the |
427 | * C runtime, calls to _fileno() must use the version of _fileno() in |
428 | * the C runtime used to open the FILE *, not the version in the C |
429 | * runtime with which libpcap was built. (Maybe once the Universal CRT |
430 | * rules the world, this will cease to be a problem.) |
431 | */ |
432 | #ifndef BUILDING_PCAP |
433 | #define pcap_fopen_offline_with_tstamp_precision(f,p,b) \ |
434 | pcap_hopen_offline_with_tstamp_precision(_get_osfhandle(_fileno(f)), p, b) |
435 | #define pcap_fopen_offline(f,b) \ |
436 | pcap_hopen_offline(_get_osfhandle(_fileno(f)), b) |
437 | #endif |
438 | #else /*_WIN32*/ |
439 | PCAP_API pcap_t *pcap_fopen_offline_with_tstamp_precision(FILE *, u_int, char *); |
440 | PCAP_API pcap_t *pcap_fopen_offline(FILE *, char *); |
441 | #endif /*_WIN32*/ |
442 | |
443 | PCAP_API void pcap_close(pcap_t *); |
444 | PCAP_API int pcap_loop(pcap_t *, int, pcap_handler, u_char *); |
445 | PCAP_API int pcap_dispatch(pcap_t *, int, pcap_handler, u_char *); |
446 | PCAP_API const u_char *pcap_next(pcap_t *, struct pcap_pkthdr *); |
447 | PCAP_API int pcap_next_ex(pcap_t *, struct pcap_pkthdr **, const u_char **); |
448 | PCAP_API void pcap_breakloop(pcap_t *); |
449 | PCAP_API int pcap_stats(pcap_t *, struct pcap_stat *); |
450 | PCAP_API int pcap_setfilter(pcap_t *, struct bpf_program *); |
451 | PCAP_API int pcap_setdirection(pcap_t *, pcap_direction_t); |
452 | PCAP_API int pcap_getnonblock(pcap_t *, char *); |
453 | PCAP_API int pcap_setnonblock(pcap_t *, int, char *); |
454 | PCAP_API int pcap_inject(pcap_t *, const void *, size_t); |
455 | PCAP_API int pcap_sendpacket(pcap_t *, const u_char *, int); |
456 | PCAP_API const char *pcap_statustostr(int); |
457 | PCAP_API const char *pcap_strerror(int); |
458 | PCAP_API char *pcap_geterr(pcap_t *); |
459 | PCAP_API void pcap_perror(pcap_t *, const char *); |
460 | PCAP_API int pcap_compile(pcap_t *, struct bpf_program *, const char *, int, |
461 | bpf_u_int32); |
462 | PCAP_API int pcap_compile_nopcap(int, int, struct bpf_program *, |
463 | const char *, int, bpf_u_int32); |
464 | PCAP_API void pcap_freecode(struct bpf_program *); |
465 | PCAP_API int pcap_offline_filter(const struct bpf_program *, |
466 | const struct pcap_pkthdr *, const u_char *); |
467 | PCAP_API int pcap_datalink(pcap_t *); |
468 | PCAP_API int pcap_datalink_ext(pcap_t *); |
469 | PCAP_API int pcap_list_datalinks(pcap_t *, int **); |
470 | PCAP_API int pcap_set_datalink(pcap_t *, int); |
471 | PCAP_API void pcap_free_datalinks(int *); |
472 | PCAP_API int pcap_datalink_name_to_val(const char *); |
473 | PCAP_API const char *pcap_datalink_val_to_name(int); |
474 | PCAP_API const char *pcap_datalink_val_to_description(int); |
475 | PCAP_API int pcap_snapshot(pcap_t *); |
476 | PCAP_API int pcap_is_swapped(pcap_t *); |
477 | PCAP_API int pcap_major_version(pcap_t *); |
478 | PCAP_API int pcap_minor_version(pcap_t *); |
479 | PCAP_API int pcap_bufsize(pcap_t *); |
480 | |
481 | /* XXX */ |
482 | PCAP_API FILE *pcap_file(pcap_t *); |
483 | PCAP_API int pcap_fileno(pcap_t *); |
484 | |
485 | #ifdef _WIN32 |
486 | PCAP_API int pcap_wsockinit(void); |
487 | #endif |
488 | |
489 | PCAP_API pcap_dumper_t *pcap_dump_open(pcap_t *, const char *); |
490 | PCAP_API pcap_dumper_t *pcap_dump_fopen(pcap_t *, FILE *fp); |
491 | PCAP_API pcap_dumper_t *pcap_dump_open_append(pcap_t *, const char *); |
492 | PCAP_API FILE *pcap_dump_file(pcap_dumper_t *); |
493 | PCAP_API long pcap_dump_ftell(pcap_dumper_t *); |
494 | PCAP_API int64_t pcap_dump_ftell64(pcap_dumper_t *); |
495 | PCAP_API int pcap_dump_flush(pcap_dumper_t *); |
496 | PCAP_API void pcap_dump_close(pcap_dumper_t *); |
497 | PCAP_API void pcap_dump(u_char *, const struct pcap_pkthdr *, const u_char *); |
498 | |
499 | PCAP_API int pcap_findalldevs(pcap_if_t **, char *); |
500 | PCAP_API void pcap_freealldevs(pcap_if_t *); |
501 | |
502 | /* |
503 | * We return a pointer to the version string, rather than exporting the |
504 | * version string directly. |
505 | * |
506 | * On at least some UNIXes, if you import data from a shared library into |
507 | * an program, the data is bound into the program binary, so if the string |
508 | * in the version of the library with which the program was linked isn't |
509 | * the same as the string in the version of the library with which the |
510 | * program is being run, various undesirable things may happen (warnings, |
511 | * the string being the one from the version of the library with which the |
512 | * program was linked, or even weirder things, such as the string being the |
513 | * one from the library but being truncated). |
514 | * |
515 | * On Windows, the string is constructed at run time. |
516 | */ |
517 | PCAP_API const char *pcap_lib_version(void); |
518 | |
519 | /* |
520 | * On at least some versions of NetBSD and QNX, we don't want to declare |
521 | * bpf_filter() here, as it's also be declared in <net/bpf.h>, with a |
522 | * different signature, but, on other BSD-flavored UN*Xes, it's not |
523 | * declared in <net/bpf.h>, so we *do* want to declare it here, so it's |
524 | * declared when we build pcap-bpf.c. |
525 | */ |
526 | #if !defined(__NetBSD__) && !defined(__QNX__) |
527 | PCAP_API u_int bpf_filter(const struct bpf_insn *, const u_char *, u_int, u_int); |
528 | #endif |
529 | PCAP_API int bpf_validate(const struct bpf_insn *f, int len); |
530 | PCAP_API char *bpf_image(const struct bpf_insn *, int); |
531 | PCAP_API void bpf_dump(const struct bpf_program *, int); |
532 | |
533 | #if defined(_WIN32) |
534 | |
535 | /* |
536 | * Win32 definitions |
537 | */ |
538 | |
539 | /*! |
540 | \brief A queue of raw packets that will be sent to the network with pcap_sendqueue_transmit(). |
541 | */ |
542 | struct pcap_send_queue |
543 | { |
544 | u_int maxlen; /* Maximum size of the queue, in bytes. This |
545 | variable contains the size of the buffer field. */ |
546 | u_int len; /* Current size of the queue, in bytes. */ |
547 | char *buffer; /* Buffer containing the packets to be sent. */ |
548 | }; |
549 | |
550 | typedef struct pcap_send_queue pcap_send_queue; |
551 | |
552 | /*! |
553 | \brief This typedef is a support for the pcap_get_airpcap_handle() function |
554 | */ |
555 | #if !defined(AIRPCAP_HANDLE__EAE405F5_0171_9592_B3C2_C19EC426AD34__DEFINED_) |
556 | #define AIRPCAP_HANDLE__EAE405F5_0171_9592_B3C2_C19EC426AD34__DEFINED_ |
557 | typedef struct _AirpcapHandle *PAirpcapHandle; |
558 | #endif |
559 | |
560 | PCAP_API int pcap_setbuff(pcap_t *p, int dim); |
561 | PCAP_API int pcap_setmode(pcap_t *p, int mode); |
562 | PCAP_API int pcap_setmintocopy(pcap_t *p, int size); |
563 | |
564 | PCAP_API HANDLE pcap_getevent(pcap_t *p); |
565 | |
566 | PCAP_API int pcap_oid_get_request(pcap_t *, bpf_u_int32, void *, size_t *); |
567 | PCAP_API int pcap_oid_set_request(pcap_t *, bpf_u_int32, const void *, size_t *); |
568 | |
569 | PCAP_API pcap_send_queue* pcap_sendqueue_alloc(u_int memsize); |
570 | |
571 | PCAP_API void pcap_sendqueue_destroy(pcap_send_queue* queue); |
572 | |
573 | PCAP_API int pcap_sendqueue_queue(pcap_send_queue* queue, const struct pcap_pkthdr *pkt_header, const u_char *pkt_data); |
574 | |
575 | PCAP_API u_int pcap_sendqueue_transmit(pcap_t *p, pcap_send_queue* queue, int sync); |
576 | |
577 | PCAP_API struct pcap_stat *pcap_stats_ex(pcap_t *p, int *pcap_stat_size); |
578 | |
579 | PCAP_API int pcap_setuserbuffer(pcap_t *p, int size); |
580 | |
581 | PCAP_API int pcap_live_dump(pcap_t *p, char *filename, int maxsize, int maxpacks); |
582 | |
583 | PCAP_API int pcap_live_dump_ended(pcap_t *p, int sync); |
584 | |
585 | PCAP_API int pcap_start_oem(char* err_str, int flags); |
586 | |
587 | PCAP_API PAirpcapHandle pcap_get_airpcap_handle(pcap_t *p); |
588 | |
589 | #define MODE_CAPT 0 |
590 | #define MODE_STAT 1 |
591 | #define MODE_MON 2 |
592 | |
593 | #elif defined(MSDOS) |
594 | |
595 | /* |
596 | * MS-DOS definitions |
597 | */ |
598 | |
599 | PCAP_API int pcap_stats_ex (pcap_t *, struct pcap_stat_ex *); |
600 | PCAP_API void pcap_set_wait (pcap_t *p, void (*yield)(void), int wait); |
601 | PCAP_API u_long pcap_mac_packets (void); |
602 | |
603 | #else /* UN*X */ |
604 | |
605 | /* |
606 | * UN*X definitions |
607 | */ |
608 | |
609 | PCAP_API int pcap_get_selectable_fd(pcap_t *); |
610 | PCAP_API struct timeval *pcap_get_required_select_timeout(pcap_t *); |
611 | |
612 | #endif /* _WIN32/MSDOS/UN*X */ |
613 | |
614 | /* |
615 | * Remote capture definitions. |
616 | * |
617 | * These routines are only present if libpcap has been configured to |
618 | * include remote capture support. |
619 | */ |
620 | |
621 | /* |
622 | * The maximum buffer size in which address, port, interface names are kept. |
623 | * |
624 | * In case the adapter name or such is larger than this value, it is truncated. |
625 | * This is not used by the user; however it must be aware that an hostname / interface |
626 | * name longer than this value will be truncated. |
627 | */ |
628 | #define PCAP_BUF_SIZE 1024 |
629 | |
630 | /* |
631 | * The type of input source, passed to pcap_open(). |
632 | */ |
633 | #define PCAP_SRC_FILE 2 /* local savefile */ |
634 | #define PCAP_SRC_IFLOCAL 3 /* local network interface */ |
635 | #define PCAP_SRC_IFREMOTE 4 /* interface on a remote host, using RPCAP */ |
636 | |
637 | /* |
638 | * The formats allowed by pcap_open() are the following: |
639 | * - file://path_and_filename [opens a local file] |
640 | * - rpcap://devicename [opens the selected device devices available on the local host, without using the RPCAP protocol] |
641 | * - rpcap://host/devicename [opens the selected device available on a remote host] |
642 | * - rpcap://host:port/devicename [opens the selected device available on a remote host, using a non-standard port for RPCAP] |
643 | * - adaptername [to open a local adapter; kept for compability, but it is strongly discouraged] |
644 | * - (NULL) [to open the first local adapter; kept for compability, but it is strongly discouraged] |
645 | * |
646 | * The formats allowed by the pcap_findalldevs_ex() are the following: |
647 | * - file://folder/ [lists all the files in the given folder] |
648 | * - rpcap:// [lists all local adapters] |
649 | * - rpcap://host:port/ [lists the devices available on a remote host] |
650 | * |
651 | * Referring to the 'host' and 'port' parameters, they can be either numeric or literal. Since |
652 | * IPv6 is fully supported, these are the allowed formats: |
653 | * |
654 | * - host (literal): e.g. host.foo.bar |
655 | * - host (numeric IPv4): e.g. 10.11.12.13 |
656 | * - host (numeric IPv4, IPv6 style): e.g. [10.11.12.13] |
657 | * - host (numeric IPv6): e.g. [1:2:3::4] |
658 | * - port: can be either numeric (e.g. '80') or literal (e.g. 'http') |
659 | * |
660 | * Here you find some allowed examples: |
661 | * - rpcap://host.foo.bar/devicename [everything literal, no port number] |
662 | * - rpcap://host.foo.bar:1234/devicename [everything literal, with port number] |
663 | * - rpcap://10.11.12.13/devicename [IPv4 numeric, no port number] |
664 | * - rpcap://10.11.12.13:1234/devicename [IPv4 numeric, with port number] |
665 | * - rpcap://[10.11.12.13]:1234/devicename [IPv4 numeric with IPv6 format, with port number] |
666 | * - rpcap://[1:2:3::4]/devicename [IPv6 numeric, no port number] |
667 | * - rpcap://[1:2:3::4]:1234/devicename [IPv6 numeric, with port number] |
668 | * - rpcap://[1:2:3::4]:http/devicename [IPv6 numeric, with literal port number] |
669 | */ |
670 | |
671 | /* |
672 | * URL schemes for capture source. |
673 | */ |
674 | /* |
675 | * This string indicates that the user wants to open a capture from a |
676 | * local file. |
677 | */ |
678 | #define PCAP_SRC_FILE_STRING "file://" |
679 | /* |
680 | * This string indicates that the user wants to open a capture from a |
681 | * network interface. This string does not necessarily involve the use |
682 | * of the RPCAP protocol. If the interface required resides on the local |
683 | * host, the RPCAP protocol is not involved and the local functions are used. |
684 | */ |
685 | #define PCAP_SRC_IF_STRING "rpcap://" |
686 | |
687 | /* |
688 | * Flags to pass to pcap_open(). |
689 | */ |
690 | |
691 | /* |
692 | * Specifies whether promiscuous mode is to be used. |
693 | */ |
694 | #define PCAP_OPENFLAG_PROMISCUOUS 0x00000001 |
695 | |
696 | /* |
697 | * Specifies, for an RPCAP capture, whether the data transfer (in |
698 | * case of a remote capture) has to be done with UDP protocol. |
699 | * |
700 | * If it is '1' if you want a UDP data connection, '0' if you want |
701 | * a TCP data connection; control connection is always TCP-based. |
702 | * A UDP connection is much lighter, but it does not guarantee that all |
703 | * the captured packets arrive to the client workstation. Moreover, |
704 | * it could be harmful in case of network congestion. |
705 | * This flag is meaningless if the source is not a remote interface. |
706 | * In that case, it is simply ignored. |
707 | */ |
708 | #define PCAP_OPENFLAG_DATATX_UDP 0x00000002 |
709 | |
710 | /* |
711 | * Specifies wheether the remote probe will capture its own generated |
712 | * traffic. |
713 | * |
714 | * In case the remote probe uses the same interface to capture traffic |
715 | * and to send data back to the caller, the captured traffic includes |
716 | * the RPCAP traffic as well. If this flag is turned on, the RPCAP |
717 | * traffic is excluded from the capture, so that the trace returned |
718 | * back to the collector is does not include this traffic. |
719 | * |
720 | * Has no effect on local interfaces or savefiles. |
721 | */ |
722 | #define PCAP_OPENFLAG_NOCAPTURE_RPCAP 0x00000004 |
723 | |
724 | /* |
725 | * Specifies whether the local adapter will capture its own generated traffic. |
726 | * |
727 | * This flag tells the underlying capture driver to drop the packets |
728 | * that were sent by itself. This is useful when building applications |
729 | * such as bridges that should ignore the traffic they just sent. |
730 | * |
731 | * Supported only on Windows. |
732 | */ |
733 | #define PCAP_OPENFLAG_NOCAPTURE_LOCAL 0x00000008 |
734 | |
735 | /* |
736 | * This flag configures the adapter for maximum responsiveness. |
737 | * |
738 | * In presence of a large value for nbytes, WinPcap waits for the arrival |
739 | * of several packets before copying the data to the user. This guarantees |
740 | * a low number of system calls, i.e. lower processor usage, i.e. better |
741 | * performance, which is good for applications like sniffers. If the user |
742 | * sets the PCAP_OPENFLAG_MAX_RESPONSIVENESS flag, the capture driver will |
743 | * copy the packets as soon as the application is ready to receive them. |
744 | * This is suggested for real time applications (such as, for example, |
745 | * a bridge) that need the best responsiveness. |
746 | * |
747 | * The equivalent with pcap_create()/pcap_activate() is "immediate mode". |
748 | */ |
749 | #define PCAP_OPENFLAG_MAX_RESPONSIVENESS 0x00000010 |
750 | |
751 | /* |
752 | * Remote authentication methods. |
753 | * These are used in the 'type' member of the pcap_rmtauth structure. |
754 | */ |
755 | |
756 | /* |
757 | * NULL authentication. |
758 | * |
759 | * The 'NULL' authentication has to be equal to 'zero', so that old |
760 | * applications can just put every field of struct pcap_rmtauth to zero, |
761 | * and it does work. |
762 | */ |
763 | #define RPCAP_RMTAUTH_NULL 0 |
764 | /* |
765 | * Username/password authentication. |
766 | * |
767 | * With this type of authentication, the RPCAP protocol will use the username/ |
768 | * password provided to authenticate the user on the remote machine. If the |
769 | * authentication is successful (and the user has the right to open network |
770 | * devices) the RPCAP connection will continue; otherwise it will be dropped. |
771 | * |
772 | * *******NOTE********: the username and password are sent over the network |
773 | * to the capture server *IN CLEAR TEXT*. Don't use this on a network |
774 | * that you don't completely control! (And be *really* careful in your |
775 | * definition of "completely"!) |
776 | */ |
777 | #define RPCAP_RMTAUTH_PWD 1 |
778 | |
779 | /* |
780 | * This structure keeps the information needed to autheticate the user |
781 | * on a remote machine. |
782 | * |
783 | * The remote machine can either grant or refuse the access according |
784 | * to the information provided. |
785 | * In case the NULL authentication is required, both 'username' and |
786 | * 'password' can be NULL pointers. |
787 | * |
788 | * This structure is meaningless if the source is not a remote interface; |
789 | * in that case, the functions which requires such a structure can accept |
790 | * a NULL pointer as well. |
791 | */ |
792 | struct pcap_rmtauth |
793 | { |
794 | /* |
795 | * \brief Type of the authentication required. |
796 | * |
797 | * In order to provide maximum flexibility, we can support different types |
798 | * of authentication based on the value of this 'type' variable. The currently |
799 | * supported authentication methods are defined into the |
800 | * \link remote_auth_methods Remote Authentication Methods Section\endlink. |
801 | */ |
802 | int type; |
803 | /* |
804 | * \brief Zero-terminated string containing the username that has to be |
805 | * used on the remote machine for authentication. |
806 | * |
807 | * This field is meaningless in case of the RPCAP_RMTAUTH_NULL authentication |
808 | * and it can be NULL. |
809 | */ |
810 | char *username; |
811 | /* |
812 | * \brief Zero-terminated string containing the password that has to be |
813 | * used on the remote machine for authentication. |
814 | * |
815 | * This field is meaningless in case of the RPCAP_RMTAUTH_NULL authentication |
816 | * and it can be NULL. |
817 | */ |
818 | char *password; |
819 | }; |
820 | |
821 | /* |
822 | * This routine can open a savefile, a local device, or a device on |
823 | * a remote machine running an RPCAP server. |
824 | * |
825 | * For opening a savefile, the pcap_open_offline routines can be used, |
826 | * and will work just as well; code using them will work on more |
827 | * platforms than code using pcap_open() to open savefiles. |
828 | * |
829 | * For opening a local device, pcap_open_live() can be used; it supports |
830 | * most of the capabilities that pcap_open() supports, and code using it |
831 | * will work on more platforms than code using pcap_open(). pcap_create() |
832 | * and pcap_activate() can also be used; they support all capabilities |
833 | * that pcap_open() supports, except for the Windows-only |
834 | * PCAP_OPENFLAG_NOCAPTURE_LOCAL, and support additional capabilities. |
835 | * |
836 | * For opening a remote capture, pcap_open() is currently the only |
837 | * API available. |
838 | */ |
839 | PCAP_API pcap_t *pcap_open(const char *source, int snaplen, int flags, |
840 | int read_timeout, struct pcap_rmtauth *auth, char *errbuf); |
841 | PCAP_API int pcap_createsrcstr(char *source, int type, const char *host, |
842 | const char *port, const char *name, char *errbuf); |
843 | PCAP_API int pcap_parsesrcstr(const char *source, int *type, char *host, |
844 | char *port, char *name, char *errbuf); |
845 | |
846 | /* |
847 | * This routine can scan a directory for savefiles, list local capture |
848 | * devices, or list capture devices on a remote machine running an RPCAP |
849 | * server. |
850 | * |
851 | * For scanning for savefiles, it can be used on both UN*X systems and |
852 | * Windows systems; for each directory entry it sees, it tries to open |
853 | * the file as a savefile using pcap_open_offline(), and only includes |
854 | * it in the list of files if the open succeeds, so it filters out |
855 | * files for which the user doesn't have read permission, as well as |
856 | * files that aren't valid savefiles readable by libpcap. |
857 | * |
858 | * For listing local capture devices, it's just a wrapper around |
859 | * pcap_findalldevs(); code using pcap_findalldevs() will work on more |
860 | * platforms than code using pcap_findalldevs_ex(). |
861 | * |
862 | * For listing remote capture devices, pcap_findalldevs_ex() is currently |
863 | * the only API available. |
864 | */ |
865 | PCAP_API int pcap_findalldevs_ex(char *source, struct pcap_rmtauth *auth, |
866 | pcap_if_t **alldevs, char *errbuf); |
867 | |
868 | /* |
869 | * Sampling methods. |
870 | * |
871 | * These allow pcap_loop(), pcap_dispatch(), pcap_next(), and pcap_next_ex() |
872 | * to see only a sample of packets, rather than all packets. |
873 | * |
874 | * Currently, they work only on Windows local captures. |
875 | */ |
876 | |
877 | /* |
878 | * Specifies that no sampling is to be done on the current capture. |
879 | * |
880 | * In this case, no sampling algorithms are applied to the current capture. |
881 | */ |
882 | #define PCAP_SAMP_NOSAMP 0 |
883 | |
884 | /* |
885 | * Specifies that only 1 out of N packets must be returned to the user. |
886 | * |
887 | * In this case, the 'value' field of the 'pcap_samp' structure indicates the |
888 | * number of packets (minus 1) that must be discarded before one packet got |
889 | * accepted. |
890 | * In other words, if 'value = 10', the first packet is returned to the |
891 | * caller, while the following 9 are discarded. |
892 | */ |
893 | #define PCAP_SAMP_1_EVERY_N 1 |
894 | |
895 | /* |
896 | * Specifies that we have to return 1 packet every N milliseconds. |
897 | * |
898 | * In this case, the 'value' field of the 'pcap_samp' structure indicates |
899 | * the 'waiting time' in milliseconds before one packet got accepted. |
900 | * In other words, if 'value = 10', the first packet is returned to the |
901 | * caller; the next returned one will be the first packet that arrives |
902 | * when 10ms have elapsed. |
903 | */ |
904 | #define PCAP_SAMP_FIRST_AFTER_N_MS 2 |
905 | |
906 | /* |
907 | * This structure defines the information related to sampling. |
908 | * |
909 | * In case the sampling is requested, the capturing device should read |
910 | * only a subset of the packets coming from the source. The returned packets |
911 | * depend on the sampling parameters. |
912 | * |
913 | * WARNING: The sampling process is applied *after* the filtering process. |
914 | * In other words, packets are filtered first, then the sampling process |
915 | * selects a subset of the 'filtered' packets and it returns them to the |
916 | * caller. |
917 | */ |
918 | struct pcap_samp |
919 | { |
920 | /* |
921 | * Method used for sampling; see above. |
922 | */ |
923 | int method; |
924 | |
925 | /* |
926 | * This value depends on the sampling method defined. |
927 | * For its meaning, see above. |
928 | */ |
929 | int value; |
930 | }; |
931 | |
932 | /* |
933 | * New functions. |
934 | */ |
935 | PCAP_API struct pcap_samp *pcap_setsampling(pcap_t *p); |
936 | |
937 | /* |
938 | * RPCAP active mode. |
939 | */ |
940 | |
941 | /* Maximum length of an host name (needed for the RPCAP active mode) */ |
942 | #define RPCAP_HOSTLIST_SIZE 1024 |
943 | |
944 | /* |
945 | * Some minor differences between UN*X sockets and and Winsock sockets. |
946 | */ |
947 | #ifndef _WIN32 |
948 | /*! |
949 | * \brief In Winsock, a socket handle is of type SOCKET; in UN*X, it's |
950 | * a file descriptor, and therefore a signed integer. |
951 | * We define SOCKET to be a signed integer on UN*X, so that it can |
952 | * be used on both platforms. |
953 | */ |
954 | #define SOCKET int |
955 | |
956 | /*! |
957 | * \brief In Winsock, the error return if socket() fails is INVALID_SOCKET; |
958 | * in UN*X, it's -1. |
959 | * We define INVALID_SOCKET to be -1 on UN*X, so that it can be used on |
960 | * both platforms. |
961 | */ |
962 | #define INVALID_SOCKET -1 |
963 | #endif |
964 | |
965 | PCAP_API SOCKET pcap_remoteact_accept(const char *address, const char *port, |
966 | const char *hostlist, char *connectinghost, |
967 | struct pcap_rmtauth *auth, char *errbuf); |
968 | PCAP_API int pcap_remoteact_list(char *hostlist, char sep, int size, |
969 | char *errbuf); |
970 | PCAP_API int pcap_remoteact_close(const char *host, char *errbuf); |
971 | PCAP_API void pcap_remoteact_cleanup(void); |
972 | |
973 | #ifdef __cplusplus |
974 | } |
975 | #endif |
976 | |
977 | #endif /* lib_pcap_pcap_h */ |
978 | |