Drop main() prototype. Syncs with NetBSD-8
[minix.git] / external / bsd / libpcap / dist / pcap-septel.c
blob9c547c7c941d4517e0d93c8bf0ac368386bb712e
1 /* $NetBSD: pcap-septel.c,v 1.3 2015/03/31 21:39:42 christos Exp $ */
3 /*
4 * pcap-septel.c: Packet capture interface for Intel/Septel card.
6 * The functionality of this code attempts to mimic that of pcap-linux as much
7 * as possible. This code is compiled in several different ways depending on
8 * whether SEPTEL_ONLY and HAVE_SEPTEL_API are defined. If HAVE_SEPTEL_API is
9 * not defined it should not get compiled in, otherwise if SEPTEL_ONLY is
10 * defined then the 'septel_' function calls are renamed to 'pcap_'
11 * equivalents. If SEPTEL_ONLY is not defined then nothing is altered - the
12 * septel_ functions will be called as required from their
13 * pcap-linux/equivalents.
15 * Authors: Gilbert HOYEK (gil_hoyek@hotmail.com), Elias M. KHOURY
16 * (+961 3 485243)
19 #include <sys/cdefs.h>
20 __RCSID("$NetBSD: pcap-septel.c,v 1.3 2015/03/31 21:39:42 christos Exp $");
22 #ifdef HAVE_CONFIG_H
23 #include "config.h"
24 #endif
26 #include <sys/param.h>
28 #include <stdlib.h>
29 #include <string.h>
30 #include <errno.h>
32 #include "pcap-int.h"
34 #include <ctype.h>
35 #include <netinet/in.h>
36 #include <sys/mman.h>
37 #include <sys/socket.h>
38 #include <sys/types.h>
39 #include <unistd.h>
41 #include <msg.h>
42 #include <ss7_inc.h>
43 #include <sysgct.h>
44 #include <pack.h>
45 #include <system.h>
47 #include "pcap-septel.h"
49 static int septel_setfilter(pcap_t *p, struct bpf_program *fp);
50 static int septel_stats(pcap_t *p, struct pcap_stat *ps);
51 static int septel_setnonblock(pcap_t *p, int nonblock, char *errbuf);
54 * Private data for capturing on Septel devices.
56 struct pcap_septel {
57 struct pcap_stat stat;
61 * Read at most max_packets from the capture queue and call the callback
62 * for each of them. Returns the number of packets handled, -1 if an
63 * error occured, or -2 if we were told to break out of the loop.
65 static int septel_read(pcap_t *p, int cnt, pcap_handler callback, u_char *user) {
67 struct pcap_septel *ps = p->priv;
68 HDR *h;
69 MSG *m;
70 int processed = 0 ;
71 int t = 0 ;
73 /* identifier for the message queue of the module(upe) from which we are capturing
74 * packets.These IDs are defined in system.txt . By default it is set to 0x2d
75 * so change it to 0xdd for technical reason and therefore the module id for upe becomes:
76 * LOCAL 0xdd * upe - Example user part task */
77 unsigned int id = 0xdd;
79 /* process the packets */
80 do {
82 unsigned short packet_len = 0;
83 int caplen = 0;
84 int counter = 0;
85 struct pcap_pkthdr pcap_header;
86 u_char *dp ;
89 * Has "pcap_breakloop()" been called?
91 loop:
92 if (p->break_loop) {
94 * Yes - clear the flag that indicates that
95 * it has, and return -2 to indicate that
96 * we were told to break out of the loop.
98 p->break_loop = 0;
99 return -2;
102 /*repeat until a packet is read
103 *a NULL message means :
104 * when no packet is in queue or all packets in queue already read */
105 do {
106 /* receive packet in non-blocking mode
107 * GCT_grab is defined in the septel library software */
108 h = GCT_grab(id);
110 m = (MSG*)h;
111 /* a couter is added here to avoid an infinite loop
112 * that will cause our capture program GUI to freeze while waiting
113 * for a packet*/
114 counter++ ;
117 while ((m == NULL)&& (counter< 100)) ;
119 if (m != NULL) {
121 t = h->type ;
123 /* catch only messages with type = 0xcf00 or 0x8f01 corrsponding to ss7 messages*/
124 /* XXX = why not use API_MSG_TX_REQ for 0xcf00 and API_MSG_RX_IND
125 * for 0x8f01? */
126 if ((t != 0xcf00) && (t != 0x8f01)) {
127 relm(h);
128 goto loop ;
131 /* XXX - is API_MSG_RX_IND for an MTP2 or MTP3 message? */
132 dp = get_param(m);/* get pointer to MSG parameter area (m->param) */
133 packet_len = m->len;
134 caplen = p->snapshot ;
137 if (caplen > packet_len) {
139 caplen = packet_len;
141 /* Run the packet filter if there is one. */
142 if ((p->fcode.bf_insns == NULL) || bpf_filter(p->fcode.bf_insns, dp, packet_len, caplen)) {
145 /* get a time stamp , consisting of :
147 * pcap_header.ts.tv_sec:
148 * ----------------------
149 * a UNIX format time-in-seconds when he packet was captured,
150 * i.e. the number of seconds since Epoch time (January 1,1970, 00:00:00 GMT)
152 * pcap_header.ts.tv_usec :
153 * ------------------------
154 * the number of microseconds since that second
155 * when the packet was captured
158 (void)gettimeofday(&pcap_header.ts, NULL);
160 /* Fill in our own header data */
161 pcap_header.caplen = caplen;
162 pcap_header.len = packet_len;
164 /* Count the packet. */
165 ps->stat.ps_recv++;
167 /* Call the user supplied callback function */
168 callback(user, &pcap_header, dp);
170 processed++ ;
173 /* after being processed the packet must be
174 *released in order to receive another one */
175 relm(h);
176 }else
177 processed++;
180 while (processed < cnt) ;
182 return processed ;
186 static int
187 septel_inject(pcap_t *handle, const void *buf _U_, size_t size _U_)
189 strlcpy(handle->errbuf, "Sending packets isn't supported on Septel cards",
190 PCAP_ERRBUF_SIZE);
191 return (-1);
195 * Activate a handle for a live capture from the given Septel device. Always pass a NULL device
196 * The promisc flag is ignored because Septel cards have built-in tracing.
197 * The timeout is also ignored as it is not supported in hardware.
199 * See also pcap(3).
201 static pcap_t *septel_activate(pcap_t* handle) {
202 /* Initialize some components of the pcap structure. */
203 handle->linktype = DLT_MTP2;
205 handle->bufsize = 0;
208 * "select()" and "poll()" don't work on Septel queues
210 handle->selectable_fd = -1;
212 handle->read_op = septel_read;
213 handle->inject_op = septel_inject;
214 handle->setfilter_op = septel_setfilter;
215 handle->set_datalink_op = NULL; /* can't change data link type */
216 handle->getnonblock_op = pcap_getnonblock_fd;
217 handle->setnonblock_op = septel_setnonblock;
218 handle->stats_op = septel_stats;
220 return 0;
223 pcap_t *septel_create(const char *device, char *ebuf, int *is_ours) {
224 const char *cp;
225 pcap_t *p;
227 /* Does this look like the Septel device? */
228 cp = strrchr(device, '/');
229 if (cp == NULL)
230 cp = device;
231 if (strcmp(cp, "septel") != 0) {
232 /* Nope, it's not "septel" */
233 *is_ours = 0;
234 return NULL;
237 /* OK, it's probably ours. */
238 *is_ours = 1;
240 p = pcap_create_common(device, ebuf, sizeof (struct pcap_septel));
241 if (p == NULL)
242 return NULL;
244 p->activate_op = septel_activate;
245 return p;
248 static int septel_stats(pcap_t *p, struct pcap_stat *ps) {
249 struct pcap_septel *handlep = p->priv;
250 /*handlep->stat.ps_recv = 0;*/
251 /*handlep->stat.ps_drop = 0;*/
253 *ps = handlep->stat;
255 return 0;
260 septel_findalldevs(pcap_if_t **devlistp, char *errbuf)
262 return (pcap_add_if(devlistp,"septel",0,
263 "Intel/Septel device",errbuf));
268 * Installs the given bpf filter program in the given pcap structure. There is
269 * no attempt to store the filter in kernel memory as that is not supported
270 * with Septel cards.
272 static int septel_setfilter(pcap_t *p, struct bpf_program *fp) {
273 if (!p)
274 return -1;
275 if (!fp) {
276 strncpy(p->errbuf, "setfilter: No filter specified",
277 sizeof(p->errbuf));
278 return -1;
281 /* Make our private copy of the filter */
283 if (install_bpf_program(p, fp) < 0) {
284 snprintf(p->errbuf, sizeof(p->errbuf),
285 "malloc: %s", pcap_strerror(errno));
286 return -1;
289 return (0);
293 static int
294 septel_setnonblock(pcap_t *p, int nonblock, char *errbuf)
296 fprintf(errbuf, PCAP_ERRBUF_SIZE, "Non-blocking mode not supported on Septel devices");
297 return (-1);