mirror of
https://github.com/nmap/nmap.git
synced 2025-12-06 04:31:29 +00:00
lookup. The hash table used linear probing which got very slow as the hash table got full. Using std::map is about 10 times faster. The hash table was slow enough that it took the majority of the time for me in an ARP scan of a single address. # nmap -sP 192.168.0.190 mac_prefix_init took 0.49261 s. Nmap done: 1 IP address (1 host up) scanned in 0.59 seconds # nmap -sP 192.168.0.190 mac_prefix_init took 0.04392 s. Nmap done: 1 IP address (1 host up) scanned in 0.13 seconds The memory usage of std::map is probably greater. The hash table used 19037 pointers and about 13000 structures of size 8 (on a 32-bit architecture), or about 176 KB. Assuming the map has left, right, and parent pointers, and a red-black indicator per node, the usage is 16 bytes per prefix plus 8 bytes for the structure data, or 304 KB total. But this makes fingerdiff so much faster, I want to leave it in place at least until this round of OS integration is done.
214 lines
10 KiB
C++
214 lines
10 KiB
C++
|
|
/***************************************************************************
|
|
* MACLookup.cc -- This relatively simple system handles looking up the *
|
|
* vendor registered to a MAC address using the nmap-mac-prefixes *
|
|
* database. *
|
|
* *
|
|
***********************IMPORTANT NMAP LICENSE TERMS************************
|
|
* *
|
|
* The Nmap Security Scanner is (C) 1996-2009 Insecure.Com LLC. Nmap is *
|
|
* also a registered trademark of Insecure.Com LLC. This program is free *
|
|
* software; you may redistribute and/or modify it under the terms of the *
|
|
* GNU General Public License as published by the Free Software *
|
|
* Foundation; Version 2 with the clarifications and exceptions described *
|
|
* below. This guarantees your right to use, modify, and redistribute *
|
|
* this software under certain conditions. If you wish to embed Nmap *
|
|
* technology into proprietary software, we sell alternative licenses *
|
|
* (contact sales@insecure.com). Dozens of software vendors already *
|
|
* license Nmap technology such as host discovery, port scanning, OS *
|
|
* detection, and version detection. *
|
|
* *
|
|
* Note that the GPL places important restrictions on "derived works", yet *
|
|
* it does not provide a detailed definition of that term. To avoid *
|
|
* misunderstandings, we consider an application to constitute a *
|
|
* "derivative work" for the purpose of this license if it does any of the *
|
|
* following: *
|
|
* o Integrates source code from Nmap *
|
|
* o Reads or includes Nmap copyrighted data files, such as *
|
|
* nmap-os-db or nmap-service-probes. *
|
|
* o Executes Nmap and parses the results (as opposed to typical shell or *
|
|
* execution-menu apps, which simply display raw Nmap output and so are *
|
|
* not derivative works.) *
|
|
* o Integrates/includes/aggregates Nmap into a proprietary executable *
|
|
* installer, such as those produced by InstallShield. *
|
|
* o Links to a library or executes a program that does any of the above *
|
|
* *
|
|
* The term "Nmap" should be taken to also include any portions or derived *
|
|
* works of Nmap. This list is not exclusive, but is meant to clarify our *
|
|
* interpretation of derived works with some common examples. Our *
|
|
* interpretation applies only to Nmap--we don't speak for other people's *
|
|
* GPL works. *
|
|
* *
|
|
* If you have any questions about the GPL licensing restrictions on using *
|
|
* Nmap in non-GPL works, we would be happy to help. As mentioned above, *
|
|
* we also offer alternative license to integrate Nmap into proprietary *
|
|
* applications and appliances. These contracts have been sold to dozens *
|
|
* of software vendors, and generally include a perpetual license as well *
|
|
* as providing for priority support and updates as well as helping to *
|
|
* fund the continued development of Nmap technology. Please email *
|
|
* sales@insecure.com for further information. *
|
|
* *
|
|
* As a special exception to the GPL terms, Insecure.Com LLC grants *
|
|
* permission to link the code of this program with any version of the *
|
|
* OpenSSL library which is distributed under a license identical to that *
|
|
* listed in the included COPYING.OpenSSL file, and distribute linked *
|
|
* combinations including the two. You must obey the GNU GPL in all *
|
|
* respects for all of the code used other than OpenSSL. If you modify *
|
|
* this file, you may extend this exception to your version of the file, *
|
|
* but you are not obligated to do so. *
|
|
* *
|
|
* If you received these files with a written license agreement or *
|
|
* contract stating terms other than the terms above, then that *
|
|
* alternative license agreement takes precedence over these comments. *
|
|
* *
|
|
* Source is provided to this software because we believe users have a *
|
|
* right to know exactly what a program is going to do before they run it. *
|
|
* This also allows you to audit the software for security holes (none *
|
|
* have been found so far). *
|
|
* *
|
|
* Source code also allows you to port Nmap to new platforms, fix bugs, *
|
|
* and add new features. You are highly encouraged to send your changes *
|
|
* to nmap-dev@insecure.org for possible incorporation into the main *
|
|
* distribution. By sending these changes to Fyodor or one of the *
|
|
* Insecure.Org development mailing lists, it is assumed that you are *
|
|
* offering the Nmap Project (Insecure.Com LLC) the unlimited, *
|
|
* non-exclusive right to reuse, modify, and relicense the code. Nmap *
|
|
* will always be available Open Source, but this is important because the *
|
|
* inability to relicense code has caused devastating problems for other *
|
|
* Free Software projects (such as KDE and NASM). We also occasionally *
|
|
* relicense the code to third parties as discussed above. If you wish to *
|
|
* specify special license conditions of your contributions, just say so *
|
|
* when you send them. *
|
|
* *
|
|
* This program is distributed in the hope that it will be useful, but *
|
|
* WITHOUT ANY WARRANTY; without even the implied warranty of *
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU *
|
|
* General Public License v2.0 for more details at *
|
|
* http://www.gnu.org/licenses/gpl-2.0.html , or in the COPYING file *
|
|
* included with Nmap. *
|
|
* *
|
|
***************************************************************************/
|
|
|
|
/* $Id$ */
|
|
|
|
#include <map>
|
|
|
|
/* Character pool memory allocation */
|
|
#include "MACLookup.h"
|
|
#include "NmapOps.h"
|
|
#include "nmap.h"
|
|
#include "nmap_error.h"
|
|
#include "charpool.h"
|
|
|
|
extern NmapOps o;
|
|
|
|
std::map<int, char *> MacTable;
|
|
|
|
static inline int MacCharPrefix2Key(const u8 *prefix) {
|
|
return (prefix[0] << 16) + (prefix[1] << 8) + prefix[2];
|
|
}
|
|
|
|
static void mac_prefix_init() {
|
|
static int initialized = 0;
|
|
if (initialized) return;
|
|
initialized = 1;
|
|
char filename[256];
|
|
FILE *fp;
|
|
char line[128];
|
|
int pfx;
|
|
char *endptr, *vendor;
|
|
int lineno = 0;
|
|
|
|
/* Now it is time to read in all of the entries ... */
|
|
if (nmap_fetchfile(filename, sizeof(filename), "nmap-mac-prefixes") != 1){
|
|
error("Cannot find nmap-mac-prefixes: Ethernet vendor correlation will not be performed");
|
|
return;
|
|
}
|
|
|
|
fp = fopen(filename, "r");
|
|
if (!fp) {
|
|
error("Unable to open %s. Ethernet vendor correlation will not be performed ", filename);
|
|
return;
|
|
}
|
|
/* Record where this data file was found. */
|
|
o.loaded_data_files["nmap-mac-prefixes"] = filename;
|
|
|
|
while(fgets(line, sizeof(line), fp)) {
|
|
lineno++;
|
|
if (*line == '#') continue;
|
|
if (!isxdigit((int) (unsigned char) *line)) {
|
|
error("Parse error one line #%d of %s. Giving up parsing.", lineno, filename);
|
|
break;
|
|
}
|
|
/* First grab the prefix */
|
|
pfx = strtol(line, &endptr, 16);
|
|
if (!endptr || !isspace((int) (unsigned char) *endptr)) {
|
|
error("Parse error one line #%d of %s. Giving up parsing.", lineno, filename);
|
|
break;
|
|
}
|
|
/* Now grab the vendor */
|
|
while(*endptr && isspace((int) (unsigned char) *endptr)) endptr++;
|
|
assert(*endptr);
|
|
vendor = endptr;
|
|
while(*endptr && *endptr != '\n' && *endptr != '\r') endptr++;
|
|
*endptr = '\0';
|
|
|
|
if (MacTable.find(pfx) == MacTable.end()) {
|
|
MacTable[pfx] = cp_strdup(vendor);
|
|
} else {
|
|
if (o.debugging > 1)
|
|
error("MAC prefix %06X is duplicated in %s; ignoring duplicates.", pfx, filename);
|
|
}
|
|
|
|
}
|
|
|
|
fclose(fp);
|
|
return;
|
|
}
|
|
|
|
|
|
static const char *findMACEntry(int prefix) {
|
|
std::map<int, char *>::iterator i;
|
|
|
|
i = MacTable.find(prefix);
|
|
if (i == MacTable.end())
|
|
return NULL;
|
|
|
|
return i->second;
|
|
}
|
|
|
|
/* Takes a three byte MAC address prefix (passing the whole MAC is OK
|
|
too) and returns the company which has registered the prefix.
|
|
NULL is returned if no vendor is found for the given prefix or if there
|
|
is some other error. */
|
|
const char *MACPrefix2Corp(const u8 *prefix) {
|
|
if (!prefix) fatal("%s called with a NULL prefix", __func__);
|
|
mac_prefix_init();
|
|
|
|
return findMACEntry(MacCharPrefix2Key(prefix));
|
|
}
|
|
|
|
/* Takes a string and looks through the table for a vendor name which
|
|
contains that string. Sets the first three bytes in mac_data and
|
|
returns true for the first matching entry found. If no entries
|
|
match, leaves mac_data untouched and returns false. Note that this
|
|
is not particularly efficient and so should be rewriteen if it is
|
|
called often */
|
|
bool MACCorp2Prefix(const char *vendorstr, u8 *mac_data) {
|
|
std::map<int, char *>::iterator i;
|
|
|
|
if (!vendorstr) fatal("%s: vendorstr is NULL", __func__);
|
|
if (!mac_data) fatal("%s: mac_data is NULL", __func__);
|
|
mac_prefix_init();
|
|
|
|
for (i = MacTable.begin(); i != MacTable.end(); i++) {
|
|
if (strcasestr(i->second, vendorstr)) {
|
|
mac_data[0] = i->first >> 16;
|
|
mac_data[1] = (i->first >> 8) & 0xFF;
|
|
mac_data[2] = i->first & 0xFF;
|
|
return true;
|
|
}
|
|
}
|
|
return false;
|
|
}
|