1
0
mirror of https://github.com/nmap/nmap.git synced 2025-12-06 04:31:29 +00:00
Files
nmap/nping/ArgParser.cc
2022-06-27 02:38:51 +00:00

1826 lines
78 KiB
C++

/***************************************************************************
* ArgParser.cc -- The ArgParser Class is the one in charge of command line*
* argument parsing. Essentially it contains method parseArguments() that *
* takes the usual argc and *argv[] parameters and fills the general *
* NpingOps class with all the information needed for the execution of *
* Nping. *
* *
***********************IMPORTANT NMAP LICENSE TERMS************************
* *
* The Nmap Security Scanner is (C) 1996-2022 Nmap Software LLC ("The Nmap *
* Project"). Nmap is also a registered trademark of the Nmap Project. *
* *
* This program is distributed under the terms of the Nmap Public Source *
* License (NPSL). The exact license text applying to a particular Nmap *
* release or source code control revision is contained in the LICENSE *
* file distributed with that version of Nmap or source code control *
* revision. More Nmap copyright/legal information is available from *
* https://nmap.org/book/man-legal.html, and further information on the *
* NPSL license itself can be found at https://nmap.org/npsl/ . This *
* header summarizes some key points from the Nmap license, but is no *
* substitute for the actual license text. *
* *
* Nmap is generally free for end users to download and use themselves, *
* including commercial use. It is available from https://nmap.org. *
* *
* The Nmap license generally prohibits companies from using and *
* redistributing Nmap in commercial products, but we sell a special Nmap *
* OEM Edition with a more permissive license and special features for *
* this purpose. See https://nmap.org/oem/ *
* *
* If you have received a written Nmap license agreement or contract *
* stating terms other than these (such as an Nmap OEM license), you may *
* choose to use and redistribute Nmap under those terms instead. *
* *
* The official Nmap Windows builds include the Npcap software *
* (https://npcap.com) for packet capture and transmission. It is under *
* separate license terms which forbid redistribution without special *
* permission. So the official Nmap Windows builds may not be *
* redistributed without special permission (such as an Nmap OEM *
* license). *
* *
* Source is provided to this software because we believe users have a *
* right to know exactly what a program is going to do before they run it. *
* This also allows you to audit the software for security holes. *
* *
* Source code also allows you to port Nmap to new platforms, fix bugs, *
* and add new features. You are highly encouraged to submit your *
* changes as a Github PR or by email to the dev@nmap.org mailing list *
* for possible incorporation into the main distribution. Unless you *
* specify otherwise, it is understood that you are offering us very *
* broad rights to use your submissions as described in the Nmap Public *
* Source License Contributor Agreement. This is important because we *
* fund the project by selling licenses with various terms, and also *
* because the inability to relicense code has caused devastating *
* problems for other Free Software projects (such as KDE and NASM). *
* *
* The free version of Nmap is distributed in the hope that it will be *
* useful, but WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. Warranties, *
* indemnification and commercial support are all available through the *
* Npcap OEM program--see https://nmap.org/oem/ *
* *
***************************************************************************/
#include "nping.h"
#include "ArgParser.h"
#include "NpingOps.h"
#include "common.h"
#include "nbase.h"
#include "utils.h"
#include "utils_net.h"
#include "output.h"
extern NpingOps o;
ArgParser::ArgParser() {
} /* End of ArgParser constructor */
ArgParser::~ArgParser() {
} /* End of ArgParser destructor */
int ArgParser::parseArguments(int argc, char *argv[]) {
int arg=0;
int auxint=0;
long l=0;
int option_index=0;
struct in_addr aux_ip4;
u32 aux32=0;
u16 aux16=0;
u8 aux8=0;
u8 auxmac[6];
u8 *auxbuff=NULL;
u16 *portlist=NULL;
char errstr[256];
char *script_kiddie;
struct option long_options[] = {
/* Probe modes */
{"tcp-connect", no_argument, 0, 0},
{"tcp", no_argument, 0, 0},
{"udp", no_argument, 0, 0},
{"icmp", no_argument, 0, 0},
{"arp", no_argument, 0, 0},
{"tr", no_argument, 0, 0},
{"traceroute", no_argument, 0, 0},
/* Mode shortcuts */
{"echo-request", no_argument, 0, 0},
{"destination-unreachable", no_argument, 0, 0},
{"dest-unr", no_argument, 0, 0},
{"timestamp", no_argument, 0, 0},
{"timestamp-request", no_argument, 0, 0},
{"information", no_argument, 0, 0},
{"information-request", no_argument, 0, 0},
{"netmask", no_argument, 0, 0},
{"netmask-request", no_argument, 0, 0},
{"arp-request", no_argument, 0, 0},
{"arp-reply", no_argument, 0, 0},
{"rarp-request", no_argument, 0, 0},
{"rarp-reply", no_argument, 0, 0},
/* TCP/UDP */
{"source-port", required_argument, 0, 'g'},
{"dest-port", required_argument, 0, 'p'},
{"seq", required_argument, 0, 0},
{"flags", required_argument, 0, 0},
{"ack", required_argument, 0, 0},
{"win", required_argument, 0, 0},
{"badsum", no_argument, 0, 0},
/* ICMP */
{"icmp-type", required_argument, 0, 0},
{"icmp-code", required_argument, 0, 0},
{"icmp-id", required_argument, 0, 0},
{"icmp-seq", required_argument, 0, 0},
{"icmp-redirect-addr", required_argument, 0, 0},
{"icmp-param-pointer", required_argument, 0, 0},
{"icmp-advert-lifetime", required_argument, 0, 0},
{"icmp-advert-entry", required_argument, 0, 0},
{"icmp-orig-time", required_argument, 0, 0},
{"icmp-recv-time", required_argument, 0, 0},
{"icmp-trans-time", required_argument, 0, 0},
/* TODO: Add relevant flags for different ICMP options */
/* ARP/RARP */
/* 1) ARP operation codes. */
{"arp-type", required_argument, 0, 0},
{"rarp-type", required_argument, 0, 0},
{"arp-code", required_argument, 0, 0},
{"rarp-code", required_argument, 0, 0},
{"arp-operation", required_argument, 0, 0},
{"arp-op", required_argument, 0, 0},
{"rarp-operation", required_argument, 0, 0},
{"rarp-op", required_argument, 0, 0},
/* 2) Rest of the fields */
{"arp-sender-mac", required_argument, 0, 0},
{"arp-sender-ip", required_argument, 0, 0},
{"arp-target-mac", required_argument, 0, 0},
{"arp-target-ip", required_argument, 0, 0},
{"rarp-sender-mac", required_argument, 0, 0},
{"rarp-sender-ip", required_argument, 0, 0},
{"rarp-target-mac", required_argument, 0, 0},
{"rarp-target-ip", required_argument, 0, 0},
/* Ethernet */
{"dest-mac", required_argument, 0, 0},
{"source-mac", required_argument, 0, 0},
{"spoof-mac", required_argument, 0, 0},
{"ethertype", required_argument, 0, 0},
{"ethtype", required_argument, 0, 0},
{"ether-type", required_argument, 0, 0},
/* IPv4 */
{"IPv4", no_argument, 0, '4'},
{"ipv4", no_argument, 0, '4'},
{"source-ip", required_argument, 0, 'S'},
{"dest-ip", required_argument, 0, 0},
{"tos", required_argument, 0, 0},
{"id", required_argument, 0, 0},
{"df", no_argument, 0, 0},
{"mf", no_argument, 0, 0},
{"evil", no_argument, 0, 0},
{"ttl", required_argument, 0, 0},
{"badsum-ip", no_argument, 0, 0},
{"ip-options", required_argument, 0, 0},
{"mtu", required_argument, 0, 0},
/* Remember also: "-f" : Fragment packets*/
/* IPv6 */
{"IPv6", no_argument, 0, '6'},
{"ipv6", no_argument, 0, '6'},
{"hop-limit", required_argument, 0, 0},
{"tc", required_argument, 0, 0},
{"traffic-class", required_argument, 0, 0},
{"flow", required_argument, 0, 0},
/* Payload */
{"data", required_argument, 0, 0},
{"data-length", required_argument, 0, 0},
{"data-string", required_argument, 0, 0},
/* Echo client/server */
{"echo-client", required_argument, 0, 0},
{"ec", required_argument, 0, 0},
{"echo-server", required_argument, 0, 0},
{"es", required_argument, 0, 0},
{"echo-port", required_argument, 0, 0},
{"ep", required_argument, 0, 0},
{"no-crypto", no_argument, 0, 0},
{"nc", no_argument, 0, 0},
{"once", no_argument, 0, 0},
{"safe-payloads", no_argument, 0, 0},
{"include-payloads", no_argument, 0, 0},
/* Timing and performance */
{"delay", required_argument, 0, 0},
{"rate", required_argument, 0, 0},
/* Misc */
{"help", no_argument, 0, 'h'},
{"version", no_argument, 0, 'V'},
{"count", required_argument, 0, 'c'},
{"interface", required_argument, 0, 'e'},
{"privileged", no_argument, 0, 0},
{"unprivileged", no_argument, 0, 0},
{"send-eth", no_argument, 0, 0},
{"send-ip", no_argument, 0, 0},
{"bpf-filter", required_argument, 0, 0},
{"filter", required_argument, 0, 0},
{"nsock-engine", required_argument, 0, 0},
{"no-capture", no_argument, 0, 'N'},
{"hide-sent", no_argument, 0, 'H'},
/* Output */
{"verbose", optional_argument, 0, 'v'},
{"reduce-verbosity", optional_argument, 0, 'q'},
{"debug", no_argument, 0, 0},
{"quiet", no_argument, 0, 0},
{0, 0, 0, 0}
};
if( argc <= 1 ){
this->printUsage();
exit(1);
}
/* Let's get this parsing party started */
while((arg = getopt_long_only(argc,argv,"46c:d::e:fg:hHK:NP:q::p:S:Vv::", long_options, &option_index)) != EOF) {
aux8=aux16=aux32=aux_ip4.s_addr=0;
switch(arg) {
case 0:
/* PROBE MODES ***************************************************************/
if (strcmp(long_options[option_index].name, "tcp-connect") == 0) {
if( o.issetMode() && o.getMode()!=TCP_CONNECT)
nping_fatal(QT_3,"Cannot specify more than one probe mode. Choose either %s or %s.",
strdup( o.mode2Ascii(TCP_CONNECT) ), strdup( o.mode2Ascii(o.getMode()) ) );
o.setMode(TCP_CONNECT);
} else if (strcmp(long_options[option_index].name, "tcp") == 0) {
if( o.issetMode() && o.getMode()!=TCP)
nping_fatal(QT_3,"Cannot specify more than one probe mode. Choose either %s or %s.",
strdup( o.mode2Ascii(TCP) ), strdup( o.mode2Ascii(o.getMode()) ) );
o.setMode(TCP);
} else if (strcmp(long_options[option_index].name, "udp") == 0) {
if( o.issetMode() && o.getMode()!=UDP)
nping_fatal(QT_3,"Cannot specify more than one probe mode. Choose either %s or %s.",
strdup( o.mode2Ascii(UDP) ), strdup( o.mode2Ascii(o.getMode()) ) );
o.setMode(UDP);
} else if (strcmp(long_options[option_index].name, "icmp") == 0) {
if( o.issetMode() && o.getMode()!=ICMP)
nping_fatal(QT_3,"Cannot specify more than one probe mode. Choose either %s or %s.",
strdup( o.mode2Ascii(ICMP) ), strdup( o.mode2Ascii(o.getMode()) ) );
o.setMode(ICMP);
} else if (strcmp(long_options[option_index].name, "arp") == 0) {
if( o.issetMode() && o.getMode()!=ARP)
nping_fatal(QT_3,"Cannot specify more than one probe mode. Choose either %s or %s.",
strdup( o.mode2Ascii(ARP) ), strdup( o.mode2Ascii(o.getMode()) ) );
o.setMode(ARP);
} else if (strcmp(long_options[option_index].name, "traceroute") == 0 ||
strcmp(long_options[option_index].name, "tr") == 0) {
o.enableTraceroute();
/* Now shortcuts that we support but that are not actual modes */
} else if (strcmp(long_options[option_index].name, "arp-request") == 0) {
if( o.issetMode() && o.getMode()!=ARP)
nping_fatal(QT_3,"Cannot specify more than one probe mode. Choose either %s or %s.",
strdup( o.mode2Ascii(ARP) ), strdup( o.mode2Ascii(o.getMode()) ) );
o.setMode(ARP);
o.setARPOpCode(OP_ARP_REQUEST);
} else if (strcmp(long_options[option_index].name, "arp-reply") == 0) {
if( o.issetMode() && o.getMode()!=ARP)
nping_fatal(QT_3,"Cannot specify more than one probe mode. Choose either %s or %s.",
strdup( o.mode2Ascii(ARP) ), strdup( o.mode2Ascii(o.getMode()) ) );
o.setMode(ARP);
o.setARPOpCode(OP_ARP_REPLY);
} else if (strcmp(long_options[option_index].name, "rarp-request") == 0) {
if( o.issetMode() && o.getMode()!=ARP)
nping_fatal(QT_3,"Cannot specify more than one probe mode. Choose either %s or %s.",
strdup( o.mode2Ascii(ARP) ), strdup( o.mode2Ascii(o.getMode()) ) );
o.setMode(ARP);
o.setARPOpCode(OP_RARP_REQUEST);
} else if (strcmp(long_options[option_index].name, "rarp-reply") == 0) {
if( o.issetMode() && o.getMode()!=ARP)
nping_fatal(QT_3,"Cannot specify more than one probe mode. Choose either %s or %s.",
strdup( o.mode2Ascii(ARP) ), strdup( o.mode2Ascii(o.getMode()) ) );
o.setMode(ARP);
o.setARPOpCode(OP_RARP_REPLY);
} else if (strcmp(long_options[option_index].name, "destination-unreachable") == 0 ||
strcmp(long_options[option_index].name, "dest-unr") == 0) {
if ( o.issetMode() && o.getMode() != ICMP )
nping_fatal(QT_3,"You cannot specify mode %s if you want to send ICMP Destination unreachable messages.", o.mode2Ascii(o.getMode()));
o.setMode(ICMP);
o.setICMPType( ICMP_UNREACH );
} else if( strcmp(long_options[option_index].name, "echo-request") == 0) {
if ( o.issetMode() && o.getMode() != ICMP )
nping_fatal(QT_3,"You cannot specify mode %s if you want to send ICMP Echo request messages.", o.mode2Ascii(o.getMode()));
o.setMode(ICMP);
o.setICMPType( ICMP_ECHO );
} else if (strcmp(long_options[option_index].name, "timestamp") == 0 ||
strcmp(long_options[option_index].name, "timestamp-request") == 0) {
if ( o.issetMode() && o.getMode() != ICMP )
nping_fatal(QT_3,"You cannot specify mode %s if you want to send ICMP Timestamp request messages.", o.mode2Ascii(o.getMode()));
o.setMode(ICMP);
o.setICMPType( ICMP_TSTAMP );
} else if (strcmp(long_options[option_index].name, "information") == 0 ||
strcmp(long_options[option_index].name, "information-request") == 0 ) {
if ( o.issetMode() && o.getMode() != ICMP )
nping_fatal(QT_3,"You cannot specify mode %s if you want to send ICMP Information request messages.", o.mode2Ascii(o.getMode()));
o.setMode(ICMP);
o.setICMPType( ICMP_TSTAMP );
} else if (strcmp(long_options[option_index].name, "netmask") == 0 ||
strcmp(long_options[option_index].name, "netmask-request") == 0) {
if ( o.issetMode() && o.getMode() != ICMP )
nping_fatal(QT_3,"You cannot specify mode %s if you want to send ICMP Information request messages.", o.mode2Ascii(o.getMode()));
o.setMode(ICMP);
o.setICMPType( ICMP_MASK );
/* TCP/UDP OPTIONS ***********************************************************/
/* TCP Sequence number */
} else if (strcmp(long_options[option_index].name, "seq") == 0) {
if ( parse_u32(optarg, &aux32) != OP_SUCCESS )
nping_fatal(QT_3, "Invalid TCP Sequence number. Value must be 0<=N<2^32.");
else
o.setTCPSequence( aux32 );
/* TCP Flags */
} else if (strcmp(long_options[option_index].name, "flags") == 0) {
/* CASE 1: User is a freak and supplied a numeric value directly */
/* We initially parse it as an u32 so we give the proper error
* for values like 0x100. */
if ( parse_u32(optarg, &aux32) == OP_SUCCESS ){
if( meansRandom(optarg) ){
aux8=get_random_u8();
}else if(aux32>255){
nping_fatal(QT_3, "Invalid TCP flag specification. Numerical values must be in the range [0,255].");
}else{
aux8=(u8)aux32;
}
if(aux8==0){
o.unsetAllFlagsTCP();
}else{
if( aux8 & 0x80 )
o.setFlagTCP( FLAG_CWR );
if( aux8 & 0x40 )
o.setFlagTCP( FLAG_ECN );
if( aux8 & 0x20 )
o.setFlagTCP( FLAG_URG );
if( aux8 & 0x10 )
o.setFlagTCP( FLAG_ACK );
if( aux8 & 0x08 )
o.setFlagTCP( FLAG_PSH );
if( aux8 & 0x04 )
o.setFlagTCP( FLAG_RST );
if( aux8 & 0x02 )
o.setFlagTCP( FLAG_SYN );
if( aux8 & 0x01 )
o.setFlagTCP( FLAG_FIN );
}
/* CASE 2: User supplied a list of flags in the format "syn,ack,ecn" */
}else if( contains(optarg, ",") ){
if( ((strlen(optarg)+1)%4) !=0 )
nping_fatal(QT_3, "Invalid format in --flag. Make sure you specify a comma-separated list that contains 3-character flag names (e.g: --flags syn,ack,psh)");
for( size_t f=0; f< strlen(optarg); f+=4 ){
if(!strncasecmp((optarg+f), "CWR",3)){ o.setFlagTCP(FLAG_CWR); }
else if(!strncasecmp((optarg+f), "ECN",3)){ o.setFlagTCP(FLAG_ECN); }
else if(!strncasecmp((optarg+f), "ECE",3)){ o.setFlagTCP(FLAG_ECN); }
else if(!strncasecmp((optarg+f), "URG",3)){ o.setFlagTCP(FLAG_URG); }
else if(!strncasecmp((optarg+f), "ACK",3)){ o.setFlagTCP(FLAG_ACK); }
else if(!strncasecmp((optarg+f), "PSH",3)){ o.setFlagTCP(FLAG_PSH); }
else if(!strncasecmp((optarg+f), "RST",3)){ o.setFlagTCP(FLAG_RST); }
else if(!strncasecmp((optarg+f), "SYN",3)){ o.setFlagTCP(FLAG_SYN); }
else if(!strncasecmp((optarg+f), "FIN",3)){ o.setFlagTCP(FLAG_FIN); }
else if(!strncasecmp((optarg+f), "ALL",3)){ o.setAllFlagsTCP(); }
else if(!strncasecmp((optarg+f), "NIL",3)){ o.unsetAllFlagsTCP(); }
else{
char wrongopt[4];
memcpy(wrongopt, (optarg+f), 3);
wrongopt[3]='\0';
nping_fatal(QT_3, "Invalid TCP flag specification: \"%s\"", wrongopt);
}
}
/* CASE 3: User supplied flag initials in format "XYZ..." */
}else{
bool flag3_ok=false;
/* SPECIAL CASE: User entered exactly 3 chars so we don't know if
* only one flag was entered or three flags in format "XYZ..." */
if( strlen(optarg) == 3 ){
if(!strcasecmp(optarg, "CWR")){ o.setFlagTCP(FLAG_CWR); flag3_ok=true; }
else if(!strcasecmp(optarg, "ECN")){ o.setFlagTCP(FLAG_ECN); flag3_ok=true; }
else if(!strcasecmp(optarg, "ECE")){ o.setFlagTCP(FLAG_ECN); flag3_ok=true; }
else if(!strcasecmp(optarg, "URG")){ o.setFlagTCP(FLAG_URG); flag3_ok=true; }
else if(!strcasecmp(optarg, "ACK")){ o.setFlagTCP(FLAG_ACK); flag3_ok=true; }
else if(!strcasecmp(optarg, "PSH")){ o.setFlagTCP(FLAG_PSH); flag3_ok=true; }
else if(!strcasecmp(optarg, "RST")){ o.setFlagTCP(FLAG_RST); flag3_ok=true; }
else if(!strcasecmp(optarg, "SYN")){ o.setFlagTCP(FLAG_SYN); flag3_ok=true; }
else if(!strcasecmp(optarg, "FIN")){ o.setFlagTCP(FLAG_FIN); flag3_ok=true; }
else if(!strcasecmp(optarg, "ALL")){ o.setAllFlagsTCP(); flag3_ok=true; }
else if(!strcasecmp(optarg, "NIL")){ o.unsetAllFlagsTCP(); flag3_ok=true; }
else{
flag3_ok=false;
}
}else if( strlen(optarg) == 0 ){
o.unsetAllFlagsTCP();
}
/* SPECIAL CASE: User supplied special flag "NONE" */
if(!strcasecmp(optarg, "NONE") ){ o.unsetAllFlagsTCP(); flag3_ok=true; }
/* User definitely supplied flag initials in format "XYZ..."*/
if( flag3_ok==false ){
for(size_t f=0; f<strlen(optarg); f++){
switch( optarg[f] ){
case 'C': case 'c': o.setFlagTCP(FLAG_CWR); break;
case 'E': case 'e': o.setFlagTCP(FLAG_ECN); break;
case 'U': case 'u': o.setFlagTCP(FLAG_URG); break;
case 'A': case 'a': o.setFlagTCP(FLAG_ACK); break;
case 'P': case 'p': o.setFlagTCP(FLAG_PSH); break;
case 'R': case 'r': o.setFlagTCP(FLAG_RST); break;
case 'S': case 's': o.setFlagTCP(FLAG_SYN); break;
case 'F': case 'f': o.setFlagTCP(FLAG_FIN); break;
default:
if( isdigit(optarg[f]) )
nping_fatal(QT_3, "Invalid TCP flag supplied (%c). If you want to specify flags using a number you must add prefix \"0x\"", optarg[f]);
else
nping_fatal(QT_3, "Invalid TCP flag supplied: %c", optarg[f]);
}
}
}
}
/* TCP Acknowledgement number */
} else if (strcmp(long_options[option_index].name, "ack") == 0) {
if ( parse_u32(optarg, &aux32) != OP_SUCCESS )
nping_fatal(QT_3, "Invalid TCP ACK number. Value must be 0<=N<2^32.");
else
o.setTCPAck( aux32 );
/* TCP Window size */
} else if (strcmp(long_options[option_index].name, "win") == 0) {
if ( parse_u16(optarg, &aux16) != OP_SUCCESS )
nping_fatal(QT_3, "Invalid TCP Window size. Value must be 0<=N<65535.");
else
o.setTCPWindow( aux16 );
/* Set a bad TCP checksum */
} else if (strcmp(long_options[option_index].name, "badsum") == 0) {
o.enableBadsum();
/* ICMP OPTIONS **************************************************************/
/* ICMP Type */
} else if (strcmp(long_options[option_index].name, "icmp-type") == 0) {
if ( o.issetMode() && o.getMode() != ICMP )
nping_fatal(QT_3,"You cannot specify mode %s if you want to send ICMP messages.", o.mode2Ascii(o.getMode()));
/* User may have supplied type as a number */
if ( parse_u8(optarg, &aux8) == OP_SUCCESS )
o.setICMPType( aux8 );
/* Or maybe the supplied arg is a string that we can recognize */
else if ( atoICMPType(optarg, &aux8) == OP_SUCCESS )
o.setICMPType( aux8 );
/* Looks like user supplied a bogus value */
else
nping_fatal(QT_3, "Invalid ICMP Type. Value must be 0<=N<=255.");
/* Warn if ICMP Type is not RFC-compliant */
if( !isICMPType(aux8) )
nping_warning(QT_1, "Warning: Specified ICMP type (%d) is not RFC compliant.", aux8);
/* ICMP Code */
} else if (strcmp(long_options[option_index].name, "icmp-code") == 0) {
if ( o.issetMode() && o.getMode() != ICMP )
nping_fatal(QT_3,"You cannot specify mode %s if you want to send ICMP messages.", o.mode2Ascii(o.getMode()));
/* User may have supplied code as a number */
if ( parse_u8(optarg, &aux8) == OP_SUCCESS )
o.setICMPCode( aux8 );
/* Or maybe the supplied arg is a string that we can recognize */
else if ( atoICMPCode(optarg, &aux8) == OP_SUCCESS )
o.setICMPCode( aux8 );
/* Looks like user supplied a bogus value */
else
nping_fatal(QT_3, "Invalid ICMP Code. Value must be 0<=N<=255.");
/* ICMP Identification field */
} else if (strcmp(long_options[option_index].name, "icmp-id") == 0) {
if ( o.issetMode() && o.getMode() != ICMP )
nping_fatal(QT_3,"You cannot specify mode %s if you want to send ICMP messages.", o.mode2Ascii(o.getMode()));
if ( parse_u16(optarg, &aux16) == OP_SUCCESS )
o.setICMPIdentifier( aux16 );
else
nping_fatal(QT_3, "Invalid ICMP Identifier. Value must be 0<=N<2^16.");
/* ICMP Sequence number */
} else if (strcmp(long_options[option_index].name, "icmp-seq") == 0) {
if ( o.issetMode() && o.getMode() != ICMP )
nping_fatal(QT_3,"You cannot specify mode %s if you want to send ICMP messages.", o.mode2Ascii(o.getMode()));
if ( parse_u16(optarg, &aux16) == OP_SUCCESS )
o.setICMPSequence( aux16 );
else
nping_fatal(QT_3, "Invalid ICMP Sequence number. Value must be 0<=N<2^16.");
/* ICMP Redirect Address */
} else if (strcmp(long_options[option_index].name, "icmp-redirect-addr") == 0) {
if ( o.issetMode() && o.getMode() != ICMP )
nping_fatal(QT_3,"You cannot specify mode %s if you want to send ICMP messages.", o.mode2Ascii(o.getMode()));
if( meansRandom(optarg) ){
while ( (aux_ip4.s_addr=get_random_u32()) == 0 );
o.setICMPRedirectAddress( aux_ip4 );
}else{
if ( atoIP(optarg, &aux_ip4) != OP_SUCCESS)
nping_fatal(QT_3, "Could not resolve specified ICMP Redirect Address.");
else
o.setICMPRedirectAddress( aux_ip4 );
}
/* ICMP Parameter problem pointer */
} else if (strcmp(long_options[option_index].name, "icmp-param-pointer") == 0) {
if ( o.issetMode() && o.getMode() != ICMP )
nping_fatal(QT_3,"You cannot specify mode %s if you want to send ICMP messages.", o.mode2Ascii(o.getMode()));
if ( parse_u8(optarg, &aux8) == OP_SUCCESS )
o.setICMPParamProblemPointer( aux8 );
else
nping_fatal(QT_3, "Invalid ICMP Parameter problem pointer. Value must be 0<=N<=255..");
/* ICMP Router Advertisement lifetime */
} else if (strcmp(long_options[option_index].name, "icmp-advert-lifetime") == 0) {
if ( o.issetMode() && o.getMode() != ICMP )
nping_fatal(QT_3,"You cannot specify mode %s if you want to send ICMP messages.", o.mode2Ascii(o.getMode()));
if ( parse_u16(optarg, &aux16) == OP_SUCCESS )
o.setICMPRouterAdvLifetime( aux16 );
else
nping_fatal(QT_3, "Invalid ICMP Router advertisement lifetime. Value must be 0<=N<2^16..");
/* ICMP Router Advertisement entry */
} else if (strcmp(long_options[option_index].name, "icmp-advert-entry") == 0) {
if ( o.issetMode() && o.getMode() != ICMP )
nping_fatal(QT_3,"You cannot specify mode %s if you want to send ICMP messages.", o.mode2Ascii(o.getMode()));
/* Format should be "IPADDR,PREF": "192.168.10.99,31337" */
if( meansRandom(optarg) ){
while( (aux_ip4.s_addr=get_random_u32()) == 0);
o.addICMPAdvertEntry( aux_ip4, get_random_u32() );
}else{
struct in_addr aux_addr;
u32 aux_pref=0;
parseAdvertEntry(optarg, &aux_addr, &aux_pref); /* fatal()s on error */
o.addICMPAdvertEntry(aux_addr, aux_pref);
}
/* ICMP Timestamp originate timestamp */
} else if (strcmp(long_options[option_index].name, "icmp-orig-time") == 0) {
if ( o.issetMode() && o.getMode() != ICMP )
nping_fatal(QT_3,"You cannot specify mode %s if you want to send ICMP messages.", o.mode2Ascii(o.getMode()));
this->parseICMPTimestamp(optarg, &aux32);
o.setICMPOriginateTimestamp(aux32);
/* ICMP Timestamp receive timestamp */
} else if (strcmp(long_options[option_index].name, "icmp-recv-time") == 0) {
if ( o.issetMode() && o.getMode() != ICMP )
nping_fatal(QT_3,"You cannot specify mode %s if you want to send ICMP messages.", o.mode2Ascii(o.getMode()));
this->parseICMPTimestamp(optarg, &aux32);
o.setICMPReceiveTimestamp(aux32);
/* ICMP Timestamp transmit timestamp */
} else if (strcmp(long_options[option_index].name, "icmp-trans-time") == 0) {
if ( o.issetMode() && o.getMode() != ICMP )
nping_fatal(QT_3,"You cannot specify mode %s if you want to send ICMP messages.", o.mode2Ascii(o.getMode()));
this->parseICMPTimestamp(optarg, &aux32);
o.setICMPTransmitTimestamp(aux32);
/* TODO: Add more relevant flags for different ICMP options */
/* ARP/RARP OPTIONS **********************************************************/
/* Operation code */
} else if (strcmp(long_options[option_index].name, "arp-type") == 0 ||
strcmp(long_options[option_index].name, "rarp-type") == 0 ||
strcmp(long_options[option_index].name, "arp-code") == 0 ||
strcmp(long_options[option_index].name, "rarp-code") == 0 ||
strcmp(long_options[option_index].name, "arp-operation") == 0 ||
strcmp(long_options[option_index].name, "arp-op") == 0 ||
strcmp(long_options[option_index].name, "rarp-operation") == 0 ||
strcmp(long_options[option_index].name, "rarp-op") == 0 ){
if ( o.issetMode() && o.getMode() != ARP ){
nping_fatal(QT_3,"You cannot specify mode %s if you want to send ARP messages.", o.mode2Ascii(o.getMode()));
}else if( !o.issetMode() ){
o.setMode(ARP);
}
if( atoARPOpCode(optarg, &aux16) != OP_SUCCESS ){
nping_fatal(QT_3, "Invalid ARP type/operation code");
}else{
o.setARPOpCode(aux16);
}
/* ARP Sender MAC Address */
} else if (strcmp(long_options[option_index].name, "arp-sender-mac") == 0 ||
strcmp(long_options[option_index].name, "rarp-sender-mac") == 0 ){
if ( parseMAC(optarg, auxmac) != OP_SUCCESS ){
nping_fatal(QT_3, "Invalid ARP Sender MAC address.");
}else{
o.setARPSenderHwAddr(auxmac);
}
/* ARP Sender IP Address */
} else if (strcmp(long_options[option_index].name, "arp-sender-ip") == 0 ||
strcmp(long_options[option_index].name, "rarp-sender-ip") == 0 ){
if ( atoIP(optarg, &aux_ip4)!=OP_SUCCESS ){
nping_fatal(QT_3, "Invalid ARP Sender IP address.");
}else{
o.setARPSenderProtoAddr(aux_ip4);
}
/* ARP Target MAC Address */
} else if (strcmp(long_options[option_index].name, "arp-target-mac") == 0 ||
strcmp(long_options[option_index].name, "rarp-target-mac") == 0 ){
if ( parseMAC(optarg, auxmac) != OP_SUCCESS ){
nping_fatal(QT_3, "Invalid ARP Target MAC address.");
}else{
o.setARPTargetHwAddr(auxmac);
}
/* ARP Target IP Address */
} else if (strcmp(long_options[option_index].name, "arp-target-ip") == 0 ||
strcmp(long_options[option_index].name, "rarp-target-ip") == 0 ){
if ( atoIP(optarg, &aux_ip4)!=OP_SUCCESS ){
nping_fatal(QT_3, "Invalid ARP Target IP address.");
}else{
o.setARPTargetProtoAddr(aux_ip4);
}
/* ETHERNET OPTIONS **********************************************************/
/* Destination MAC address */
} else if (strcmp(long_options[option_index].name, "dest-mac") == 0 ){
if ( parseMAC(optarg, auxmac) != OP_SUCCESS ){
nping_fatal(QT_3, "Invalid Ethernet Destination MAC address.");
}else{
o.setDestMAC(auxmac);
}
if( !o.issetSendPreference() )
o.setSendPreference(PACKET_SEND_ETH_STRONG);
/* Source MAC address */
} else if (strcmp(long_options[option_index].name, "source-mac") == 0 ||
strcmp(long_options[option_index].name, "spoof-mac") == 0 ){
if ( parseMAC(optarg, auxmac) != OP_SUCCESS ){
nping_fatal(QT_3, "Invalid Ethernet Source MAC address.");
}else{
o.setSourceMAC(auxmac);
}
if( !o.issetSendPreference() )
o.setSendPreference(PACKET_SEND_ETH_STRONG);
/* Ethernet type field */
} else if (strcmp(long_options[option_index].name, "ethertype") == 0 ||
strcmp(long_options[option_index].name, "ethtype") == 0 ||
strcmp(long_options[option_index].name, "ether-type") == 0 ){
if ( parse_u16(optarg, &aux16) == OP_SUCCESS ){
o.setEtherType(aux16);
}else if ( atoEtherType(optarg, &aux16) == OP_SUCCESS ){
o.setEtherType(aux16);
}else{
nping_fatal(QT_3, "Invalid Ethernet Type.");
}
if( !o.issetSendPreference() )
o.setSendPreference(PACKET_SEND_ETH_STRONG);
/* IPv4 OPTIONS **************************************************************/
/* Destination IP address. This is just another way to specify targets,
* provided for consistency with the rest of the parameters. */
} else if (strcmp(long_options[option_index].name, "dest-ip") == 0 ){
o.targets.addSpec( strdup(optarg) );
/* IP Type of service*/
} else if (strcmp(long_options[option_index].name, "tos") == 0 ){
if ( parse_u8(optarg, &aux8) == OP_SUCCESS ){
o.setTOS(aux8);
}else{
nping_fatal(QT_3,"TOS option must be a number between 0 and 255 (inclusive)");
}
/* IP Identification field */
} else if (strcmp(long_options[option_index].name, "id") == 0 ){
if ( parse_u16(optarg, &aux16) == OP_SUCCESS ){
o.setIdentification(aux16);
}else{
nping_fatal(QT_3,"Identification must be a number between 0 and 65535 (inclusive)");
}
/* Don't fragment bit */
} else if (strcmp(long_options[option_index].name, "df") == 0 ){
o.setDF();
/* More fragments bit */
} else if (strcmp(long_options[option_index].name, "mf") == 0 ){
o.setMF();
/* Reserved / Evil bit */
} else if (strcmp(long_options[option_index].name, "evil") == 0 ){
o.setRF();
/* Time to live (hop-limit in IPv6) */
} else if (strcmp(long_options[option_index].name, "ttl") == 0 ||
strcmp(long_options[option_index].name, "hop-limit") == 0 ){
/* IPv6 TTL field is named "hop limit" but has exactly the same
* function as in IPv4 so handling of that option should be the
* same in both versions. */
if ( parse_u8(optarg, &aux8) == OP_SUCCESS ){
o.setTTL(aux8);
}else{
nping_fatal(QT_3,"%s option must be a number between 0 and 255 (inclusive)",
strcmp(long_options[option_index].name, "ttl")==0 ? "TTL" : "Hop Limit"
);
}
/* TODO: At some point we may want to let users specify TTLs like "linux",
* "bsd" etc, so the default TTL for those systems is used. Check
* http://members.cox.net/~ndav1/self_published/TTL_values.html
* for more information */
/* Set up a bad IP checksum */
} else if (strcmp(long_options[option_index].name, "badsum-ip") == 0 ){
o.enableBadsumIP();
/* IP Options */
} else if (strcmp(long_options[option_index].name, "ip-options") == 0 ){
/* We need to know if options specification is correct so we perform
* a little test here, instead of waiting until the IPv4Header
* complains and fatal()s we just call parse_ip_options() ourselves.
* The call should fatal if something is wrong with user-supplied opts */
int foo=0, bar=0;
u8 buffer[128];
if( parse_ip_options(optarg, buffer, 128, &foo, &bar, errstr, sizeof(errstr)) < 0 )
nping_fatal(QT_3, "Incorrect IP options specification.");
/* If we get here it's safe to store the options */
o.setIPOptions( optarg );
/* Maximum Transmission Unit */
} else if (strcmp(long_options[option_index].name, "mtu") == 0 ){
/* Special treatment for random here since the generated number must be n%8==0 */
if(!strcasecmp("rand", optarg) || !strcasecmp("random", optarg)){
aux16=get_random_u16(); /* We limit the random mtu to a max of 65535 */
/* Make sure generated number is multiple of 8, adding a few units */
if(aux16 > 8 )
aux16-=(aux16%8);
else
aux16+=(8-(aux16%8));
o.setMTU(aux16);
}else if ( (parse_u32(optarg, &aux32)==OP_SUCCESS) && aux32!=0 && aux32%8==0){
o.setMTU(aux32);
}else{
nping_fatal(QT_3,"MTU must be >0 and multiple of 8");
}
/* IPv6 OPTIONS **************************************************************/
/* IPv6 Traffic class */
} else if (strcmp(long_options[option_index].name, "traffic-class") == 0 ||
strcmp(long_options[option_index].name, "tc") == 0 ){
if ( parse_u8(optarg, &aux8) == OP_SUCCESS )
o.setTrafficClass(aux8);
else
nping_fatal(QT_3,"IPv6 Traffic Class must be a number between 0 and 255 (inclusive)");
/* IPv6 Flow label */
} else if (strcmp(long_options[option_index].name, "flow") == 0 ){
if( meansRandom(optarg) ){
o.setFlowLabel( get_random_u32()%1048575 ); /* Mod 2^20 so it doesn't exceed 20bits */
}else if ( parse_u32(optarg, &aux32) == OP_SUCCESS ){
if( aux32>1048575 )
nping_fatal(QT_3, "IPv6 Flow Label cannot be greater than 1048575 ");
else
o.setFlowLabel(aux32);
}else{
nping_fatal(QT_3,"IPv6 Flow Label must be a number between 0 and 1048575");
}
/* PACKET PAYLOAD OPTIONS ***************************************************/
/* Hexadecimal payload specification */
} else if (strcmp(long_options[option_index].name, "data") == 0 ){
u8 *tempbuff=NULL;
size_t len=0;
if( (tempbuff=parseBufferSpec(optarg, &len))==NULL)
nping_fatal(QT_3,"Invalid hex string specification\n");
else{
u8 *buff = (u8 *) safe_malloc(len);
memcpy(buff, tempbuff, len);
o.setPayloadBuffer(buff, len);
o.setPayloadType(PL_HEX);
}
/* Random payload */
} else if (strcmp(long_options[option_index].name, "data-length") == 0 ){
if( o.issetPayloadType() != false )
nping_fatal(QT_3,"Only one type of payload may be selected.");
if( meansRandom(optarg) ){
/* We do not generate more than Ethernet standard MTU */
aux32 = 1 + get_random_u16() % (MAX_RANDOM_PAYLOAD-1);
}else if ( parse_u32(optarg, &aux32) != OP_SUCCESS ){
nping_fatal(QT_3,"Invalid payload length specification");
}
if ( aux32 > MAX_PAYLOAD_ALLOWED )
nping_fatal(QT_3,"data-length must be a value between 0 and %d.", MAX_PAYLOAD_ALLOWED);
if ( aux32 > MAX_RECOMMENDED_PAYLOAD )
nping_print(QT_3, "WARNING: Payload exceeds maximum recommended payload (%d)", MAX_RECOMMENDED_PAYLOAD);
o.setPayloadType(PL_RAND);
/* Allocate a buffer big enough to hold the desired payload */
if( (auxbuff=(u8 *)safe_malloc(aux32)) == NULL )
nping_fatal(QT_3,"Not enough memory to store payload.");
/* Generate random data and store the payload */
get_random_bytes(auxbuff, aux32);
o.setPayloadBuffer(auxbuff, aux32);
/* ASCII string payload */
} else if (strcmp(long_options[option_index].name, "data-string") == 0 ){
o.setPayloadType(PL_STRING);
int plen=strlen(optarg);
if ( plen>MAX_PAYLOAD_ALLOWED )
nping_fatal(QT_3,"data-string must be between 0 and %d characters.", MAX_PAYLOAD_ALLOWED);
if ( plen > MAX_RECOMMENDED_PAYLOAD )
nping_print(QT_3, "WARNING: Payload exceeds maximum recommended payload (%d)", MAX_RECOMMENDED_PAYLOAD);
if( meansRandom(optarg) ){
auxbuff=(u8*)strdup(getRandomTextPayload());
plen=strlen((char*)auxbuff);
}else {
auxbuff=(u8*)safe_zalloc(plen);
memcpy(auxbuff, optarg, plen);
}
o.setPayloadBuffer((u8*)auxbuff, plen);
/* ECHO C/S MODE OPTIONS *****************************************************/
} else if (strcmp(long_options[option_index].name, "echo-client")==0 ||
strcmp(long_options[option_index].name, "ec")==0 ){
o.setRoleClient();
o.setEchoPassphrase(optarg);
} else if (strcmp(long_options[option_index].name, "echo-server")==0 ||
strcmp(long_options[option_index].name, "es")==0 ){
o.setRoleServer();
o.setEchoPassphrase(optarg);
} else if (strcmp(long_options[option_index].name, "echo-port")==0 ||
strcmp(long_options[option_index].name, "ep")==0 ){
if ( parse_u16(optarg, &aux16) == OP_SUCCESS ){
if(aux16==0)
nping_fatal(QT_3, "Invalid echo port. Port can't be zero.");
else
o.setEchoPort( aux16 );
}else{
nping_fatal(QT_3, "Invalid echo port. Value must be 0<N<2^16.");
}
} else if (strcmp(long_options[option_index].name, "once")==0 ){
o.setOnce(true);
} else if (strcmp(long_options[option_index].name, "no-crypto")==0 ||
strcmp(long_options[option_index].name, "nc")==0 ){
o.doCrypto(false);
} else if (strcmp(long_options[option_index].name, "safe-payloads")==0 ){
o.echoPayload(false);
} else if (strcmp(long_options[option_index].name, "include-payloads")==0 ){
o.echoPayload(true);
/* TIMING AND PERFORMANCE OPTIONS ********************************************/
/* Inter-packet delay */
} else if (strcmp(long_options[option_index].name, "delay") == 0 ){
if ( (l= tval2msecs(optarg)) == -1)
nping_fatal(QT_3,"Invalid delay supplied. Delay must be a valid, positive integer or floating point number.");
else if(l<0)
nping_fatal(QT_3,"Invalid delay supplied. Delays can never be negative.");
if (l >= 10 * 1000 && tval_unit(optarg) == NULL)
nping_fatal(QT_3,"Since April 2010, the default unit for --delay is seconds, so your time of \"%s\" is %g seconds. Use \"%sms\" for %g milliseconds.", optarg, l / 1000.0, optarg, l / 1000.0);
o.setDelay(l);
/* Tx rate */
} else if (strcmp(long_options[option_index].name, "rate") == 0 ){
if (parse_u32(optarg, &aux32)==OP_SUCCESS){
if(aux32==0){
nping_fatal(QT_3,"Invalid rate supplied. Rate can never be zero.");
}else{
/* Compute delay from rate: delay= 1000ms/rate*/
aux32 = 1000 / aux32;
o.setDelay(aux32);
}
}else{
nping_fatal(QT_3,"Invalid rate supplied. Rate must be a valid, positive integer");
}
/* MISC OPTIONS **************************************************************/
} else if (strcmp(long_options[option_index].name, "privileged") == 0 ){
o.setIsRoot();
} else if (strcmp(long_options[option_index].name, "unprivileged") == 0 ){
o.setIsRoot(0);
} else if (strcmp(long_options[option_index].name, "send-eth") == 0 ){
o.setSendPreference(PACKET_SEND_ETH_STRONG);
} else if (strcmp(long_options[option_index].name, "send-ip") == 0 ){
o.setSendPreference(PACKET_SEND_IP_STRONG);
} else if (strcmp(long_options[option_index].name, "bpf-filter") == 0 || strcmp(long_options[option_index].name, "filter") == 0){
o.setBPFFilterSpec( optarg );
if( o.issetDisablePacketCapture() && o.disablePacketCapture()==true )
nping_warning(QT_2, "Warning: There is no point on specifying a BPF filter if you disable packet capture. BPF filter will be ignored.");
} else if (strcmp(long_options[option_index].name, "nsock-engine") == 0){
if (nsock_set_default_engine(optarg) < 0)
nping_fatal(QT_3, "Unknown or non-available engine: %s", optarg);
/* Output Options */
} else if (strcmp(long_options[option_index].name, "quiet") == 0 ){
o.setVerbosity(-4);
o.setDebugging(0);
}else if (strcmp(long_options[option_index].name, "debug") == 0 ){
o.setVerbosity(4);
o.setDebugging(9);
}
break; /* case 0 */
/* OPTIONS THAT CAN BE SPECIFIED AS A SINGLE CHARACTER ***********************/
case '4': /* IPv4 */
o.setIPVersion(IP_VERSION_4);
break; /* case '4': */
case '6': /* IPv6 */
o.setIPVersion(IP_VERSION_6);
break; /* case '6': */
case 'f': /* Fragment packets */
if( o.issetMTU() == true ){
nping_warning(QT_3,"WARNING: -f is irrelevant if an MTU has been previously specified");
}
else{
nping_print(DBG_1, "Setting default MTU=%d", DEFAULT_MTU_FOR_FRAGMENTATION);
o.setMTU( DEFAULT_MTU_FOR_FRAGMENTATION );
}
break;
case 'g': /* Source port */
if( o.issetSourcePort() ){
nping_fatal(QT_3,"Cannot specify source port twice.");
}else if ( parse_u16(optarg, &aux16) == OP_SUCCESS ){
o.setSourcePort(aux16);
if(aux16==0)
nping_warning(QT_1, "WARNING: a source port of zero may not work on all systems.");
}else{
nping_fatal(QT_3,"Source port must be a number between 0 and 65535 (inclusive)");
}
break; /* case 'g': */
case 'p': /* Destination port */
/* Parse port spec */
nping_getpts_simple(optarg, &portlist, &auxint);
if( portlist == NULL || auxint <= 0 ){
nping_fatal(QT_3,"Invalid target ports specification.");
}else{
o.setTargetPorts(portlist, auxint);
}
break; /* case 'p': */
case 'S': /* Source IP */
if( o.getIPVersion() == IP_VERSION_6){
struct sockaddr_storage sourceaddr;
struct sockaddr_in6 *source6=(struct sockaddr_in6 *)&sourceaddr;
memset(&sourceaddr, 0, sizeof(struct sockaddr_storage));
struct in6_addr ipv6addr;
/* Set random address */
if( meansRandom(optarg) ){
for(int i6=0; i6<16; i6++)
ipv6addr.s6_addr[i6]=get_random_u8();
}
/* Set user supplied address (if we manage to resolve it) */
else if ( atoIP(optarg, &sourceaddr, PF_INET6) != OP_SUCCESS){
nping_fatal(QT_3, "Could not resolve source IPv6 address.");
}else{
ipv6addr = source6->sin6_addr;
}
o.setIPv6SourceAddress(ipv6addr);
o.setSpoofSource();
}
else{
if( meansRandom(optarg) )
while ( (aux_ip4.s_addr=get_random_u32()) == 0 );
else if ( atoIP(optarg, &aux_ip4) != OP_SUCCESS)
nping_fatal(QT_3, "Could not resolve source IPv4 address.");
o.setIPv4SourceAddress(aux_ip4);
o.setSpoofSource();
}
break; /* case 'S': */
case '?':
printUsage();
exit(1);
break; /* case 'h': */
case 'h': /* Help */
printUsage();
exit(0);
break; /* case 'h': */
case 'V': /* Version */
printVersion();
exit(0);
break; /* case 'V': */
case 'c': /* Packet count */
if( meansRandom(optarg) ){
o.setPacketCount( get_random_u32()%1024 );
}else if( parse_u32(optarg, &aux32) == OP_SUCCESS ){
o.setPacketCount(aux32);
}else{
nping_fatal(QT_3,"Packet count must be an integer greater than or equal to 0.");
}
break; /* case 'c': */
case 'e': /* Network interface */
if(strlen(optarg)==0)
nping_fatal(QT_3,"Invalid network interface supplied. Interface name cannot be NULL.");
else
o.setDevice( strdup(optarg) );
break; /* case 'e': */
case 'N': /* Don't capture packets */
o.setDisablePacketCapture(true);
if( o.issetBPFFilterSpec() )
nping_warning(QT_2, "Warning: A custom BPF filter was specified before disabling packet capture. BPF filter will be ignored.");
break; /* case 'N': */
case 'H': /* Hide sent packets */
o.setShowSentPackets(false);
break; /* case 'H': */
case 'd': /* Debug mode */
if (optarg){
if (isdigit(optarg[0]) || optarg[0]=='-'){
auxint = strtol( optarg, NULL, 10);
if ( ((auxint==0) && (optarg[0] != '0')) || auxint<0 || auxint > 9)
nping_fatal(QT_3,"Debugging level must be an integer between 0 and 9.");
else{
o.setDebugging( auxint );
/* When user specifies a debugging level, if no verbosity was specified,
* increase it automatically. If user specified a verbosity level, then leave
* it like it was. */
if(o.issetVerbosity()==false)
o.setVerbosity( (auxint>4) ? 4 : auxint );
}
}else {
const char *p;
o.increaseVerbosity();
o.increaseDebugging();
for (p = optarg != NULL ? optarg : ""; *p == 'd'; p++){
o.increaseVerbosity();
o.increaseDebugging();
}
if (*p != '\0')
nping_fatal(QT_3,"Invalid argument to -d: \"%s\".", optarg);
}
}else{
o.increaseVerbosity();
o.increaseDebugging();
}
break; /* case 'd': */
case 'v': /* Verbosity */
if (optarg){
if (isdigit(optarg[0]) || optarg[0]=='-'){
auxint = strtol( optarg, NULL, 10);
if ( ((auxint==0) && (optarg[0] != '0')) || auxint<(-4) || auxint > 4)
nping_fatal(QT_3,"Verbosity level must be an integer between -4 and +4.");
else
o.setVerbosity( auxint );
}else {
const char *p;
o.increaseVerbosity();
for (p = optarg != NULL ? optarg : ""; *p == 'v'; p++)
o.increaseVerbosity();
if (*p != '\0')
nping_fatal(QT_3,"Invalid argument to -v: \"%s\".", optarg);
}
}else{
o.increaseVerbosity();
}
break; /* case 'v': */
case 'q': /* Reduce verbosity */
if (optarg){
if (isdigit(optarg[0])){
auxint = strtol( optarg, NULL, 10);
if ( ((auxint==0) && (optarg[0] != '0')) || auxint<0 || auxint > 4)
nping_fatal(QT_3,"You can only reduce verbosity from level 0 to level -4.");
else
o.setVerbosity( -auxint );
}else {
const char *p;
o.decreaseVerbosity();
for (p = optarg != NULL ? optarg : ""; *p == 'q'; p++)
o.decreaseVerbosity();
if (*p != '\0')
nping_fatal(QT_3,"Invalid argument to -q: \"%s\".", optarg);
}
}else{
o.decreaseVerbosity();
}
break; /* case 'q': */
} /* End of switch */
} /* End of getopt while */
/* Option --evil is implied when SCRIPT_KIDDIE has a non-zero value */
script_kiddie = getenv("SCRIPT_KIDDIE");
if (script_kiddie != NULL && strcmp(script_kiddie, "0") != 0)
o.setRF();
/* Now it's time to parse target host specifications. As nmap does, Nping
* treats everything getopt() can't parse as a host specification. At this
* point, var optind should point to the argv[] position that contains the
* first unparsed argument. User may specify multiple target hosts so to
* handle this, function grab_next_host_spec() returns the next target
* specification available. This function will be called until there are no
* more target hosts to parse (returned NULL). Once we have a spec, we use
* class NpingTargets, that stores the specs and will provide the targets
* through calls to getNextTarget();
* */
const char *next_spec=NULL;
while ( (next_spec= grab_next_host_spec(NULL, false, argc, (const char **) argv)) != NULL )
o.targets.addSpec( (char *) next_spec );
return OP_SUCCESS;
} /* End of parseArguments() */
/** Prints version information to stdout */
void ArgParser::printVersion(void){
printf("\n%s version %s ( %s )\n", NPING_NAME, NPING_VERSION, NPING_URL);
return;
} /* End of printVersion() */
/** Prints usage information to stdout */
void ArgParser::printUsage(void){
printf("%s %s ( %s )\n"
"Usage: nping [Probe mode] [Options] {target specification}\n"
"\n"
"TARGET SPECIFICATION:\n"
" Targets may be specified as hostnames, IP addresses, networks, etc.\n"
" Ex: scanme.nmap.org, microsoft.com/24, 192.168.0.1; 10.0.*.1-24\n"
"PROBE MODES:\n"
" --tcp-connect : Unprivileged TCP connect probe mode.\n"
" --tcp : TCP probe mode.\n"
" --udp : UDP probe mode.\n"
" --icmp : ICMP probe mode.\n"
" --arp : ARP/RARP probe mode.\n"
" --tr, --traceroute : Traceroute mode (can only be used with \n"
" TCP/UDP/ICMP modes).\n"
"TCP CONNECT MODE:\n"
" -p, --dest-port <port spec> : Set destination port(s).\n"
" -g, --source-port <portnumber> : Try to use a custom source port.\n"
"TCP PROBE MODE:\n"
" -g, --source-port <portnumber> : Set source port.\n"
" -p, --dest-port <port spec> : Set destination port(s).\n"
" --seq <seqnumber> : Set sequence number.\n"
" --flags <flag list> : Set TCP flags (ACK,PSH,RST,SYN,FIN...)\n"
" --ack <acknumber> : Set ACK number.\n"
" --win <size> : Set window size.\n"
" --badsum : Use a random invalid checksum. \n"
"UDP PROBE MODE:\n"
" -g, --source-port <portnumber> : Set source port.\n"
" -p, --dest-port <port spec> : Set destination port(s).\n"
" --badsum : Use a random invalid checksum. \n"
"ICMP PROBE MODE:\n"
" --icmp-type <type> : ICMP type.\n"
" --icmp-code <code> : ICMP code.\n"
" --icmp-id <id> : Set identifier.\n"
" --icmp-seq <n> : Set sequence number.\n"
" --icmp-redirect-addr <addr> : Set redirect address.\n"
" --icmp-param-pointer <pnt> : Set parameter problem pointer.\n"
" --icmp-advert-lifetime <time> : Set router advertisement lifetime.\n"
" --icmp-advert-entry <IP,pref> : Add router advertisement entry.\n"
" --icmp-orig-time <timestamp> : Set originate timestamp.\n"
" --icmp-recv-time <timestamp> : Set receive timestamp.\n"
" --icmp-trans-time <timestamp> : Set transmit timestamp.\n"
"ARP/RARP PROBE MODE:\n"
" --arp-type <type> : Type: ARP, ARP-reply, RARP, RARP-reply.\n"
" --arp-sender-mac <mac> : Set sender MAC address.\n"
" --arp-sender-ip <addr> : Set sender IP address.\n"
" --arp-target-mac <mac> : Set target MAC address.\n"
" --arp-target-ip <addr> : Set target IP address.\n"
"IPv4 OPTIONS:\n"
" -S, --source-ip : Set source IP address.\n"
" --dest-ip <addr> : Set destination IP address (used as an \n"
" alternative to {target specification} ). \n"
" --tos <tos> : Set type of service field (8bits).\n"
" --id <id> : Set identification field (16 bits).\n"
" --df : Set Don't Fragment flag.\n"
" --mf : Set More Fragments flag.\n"
" --evil : Set Reserved / Evil flag.\n"
" --ttl <hops> : Set time to live [0-255].\n"
" --badsum-ip : Use a random invalid checksum. \n"
" --ip-options <S|R [route]|L [route]|T|U ...> : Set IP options\n"
" --ip-options <hex string> : Set IP options\n"
" --mtu <size> : Set MTU. Packets get fragmented if MTU is\n"
" small enough.\n"
"IPv6 OPTIONS:\n"
" -6, --IPv6 : Use IP version 6.\n"
" --dest-ip : Set destination IP address (used as an\n"
" alternative to {target specification}).\n"
" --hop-limit : Set hop limit (same as IPv4 TTL).\n"
" --traffic-class <class> : : Set traffic class.\n"
" --flow <label> : Set flow label.\n"
"ETHERNET OPTIONS:\n"
" --dest-mac <mac> : Set destination mac address. (Disables\n"
" ARP resolution)\n"
" --source-mac <mac> : Set source MAC address.\n"
" --ether-type <type> : Set EtherType value.\n"
"PAYLOAD OPTIONS:\n"
" --data <hex string> : Include a custom payload.\n"
" --data-string <text> : Include a custom ASCII text.\n"
" --data-length <len> : Include len random bytes as payload.\n"
"ECHO CLIENT/SERVER:\n"
" --echo-client <passphrase> : Run Nping in client mode.\n"
" --echo-server <passphrase> : Run Nping in server mode.\n"
" --echo-port <port> : Use custom <port> to listen or connect.\n"
" --no-crypto : Disable encryption and authentication.\n"
" --once : Stop the server after one connection.\n"
" --safe-payloads : Erase application data in echoed packets.\n"
"TIMING AND PERFORMANCE:\n"
" Options which take <time> are in seconds, or append 'ms' (milliseconds),\n"
" 's' (seconds), 'm' (minutes), or 'h' (hours) to the value (e.g. 30m, 0.25h).\n"
" --delay <time> : Adjust delay between probes.\n"
" --rate <rate> : Send num packets per second.\n"
"MISC:\n"
" -h, --help : Display help information.\n"
" -V, --version : Display current version number. \n"
" -c, --count <n> : Stop after <n> rounds.\n"
" -e, --interface <name> : Use supplied network interface.\n"
" -H, --hide-sent : Do not display sent packets.\n"
" -N, --no-capture : Do not try to capture replies.\n"
" --privileged : Assume user is fully privileged.\n"
" --unprivileged : Assume user lacks raw socket privileges.\n"
" --send-eth : Send packets at the raw Ethernet layer.\n"
" --send-ip : Send packets using raw IP sockets.\n"
" --bpf-filter <filter spec> : Specify custom BPF filter.\n"
"OUTPUT:\n"
" -v : Increment verbosity level by one.\n"
" -v[level] : Set verbosity level. E.g: -v4\n"
" -d : Increment debugging level by one.\n"
" -d[level] : Set debugging level. E.g: -d3\n"
" -q : Decrease verbosity level by one.\n"
" -q[N] : Decrease verbosity level N times\n"
" --quiet : Set verbosity and debug level to minimum.\n"
" --debug : Set verbosity and debug to the max level.\n"
"EXAMPLES:\n"
" nping scanme.nmap.org\n"
" nping --tcp -p 80 --flags rst --ttl 2 192.168.1.1\n"
" nping --icmp --icmp-type time --delay 500ms 192.168.254.254\n"
" nping --echo-server \"public\" -e wlan0 -vvv \n"
" nping --echo-client \"public\" echo.nmap.org --tcp -p1-1024 --flags ack\n"
"\n"
"SEE THE MAN PAGE FOR MANY MORE OPTIONS, DESCRIPTIONS, AND EXAMPLES\n\n",
NPING_NAME, NPING_VERSION, NPING_URL);
} /* End of printUsage() */
int ArgParser::parseAdvertEntry(char *str, struct in_addr *addr, u32 *pref){
char *aux=NULL;
struct in_addr auxIP;
u32 auxPref=0;
size_t len=0;
static char first[256];
static char last[256];
memset(first, 0, 256);
memset(last, 0, 256);
if (str==NULL || addr==NULL || pref==NULL)
return OP_FAILURE;
len =strlen(str);
/* I guess one can try to lookup something as short as a single char */
if ( len < strlen("a,1") )
nping_fatal(QT_3, "Invalid Router Advertising Entry specification: too short");
/* Im going to limit this to 255 chars. */
if( len > 255 )
nping_fatal(QT_3, "Invalid Router Advertising Entry specification: too long");
/* Let's find the comma */
aux=strstr(str, ",");
if(aux==NULL )
nping_fatal(QT_3, "Invalid Router Advertising Entry specification: Bad syntax, missing comma delimiter");
if(aux==str)
nping_fatal(QT_3, "Invalid Router Advertising Entry specification: Bad syntax, comma cannot be placed at start");
if(aux>=str+len-1 )
nping_fatal(QT_3, "Invalid Router Advertising Entry specification: Bad syntax, comma cannot be placed at the end");
/* Looks like at least the syntax is correct */
memcpy(first, str, aux-str);
memcpy(last, aux+1, len-(aux-str) );
if( atoIP(first, &auxIP) == OP_FAILURE )
nping_fatal(QT_3, "Invalid Router Advertising Entry specification: Unable to resolve %s", first);
if( isNumber_u32( last ) == false )
nping_fatal(QT_3, "Invalid Router Advertising Entry specification: %s is not a valid preference number", last);
auxPref=strtoul( last, NULL, 10);
*pref=auxPref;
*addr=auxIP;
return OP_SUCCESS;
} /* End of parseAdvertEntry() */
/* ALLOWED format:
*
* Full option name: destination-unreachable
* Four letters - three letters: dest-unr
* Initials: du
*
* In ICMP types that REQUEST something, the word "request" is always omitted.
* For example: Echo request should be specified as "echo" or "e",
* not "echo-request"/"echo-req"/"er"
*
* EXCEPTIONS. To avoid confusion:
* - Initials for "Timestamp" are "tm"
* - Initial for Traceroute are "tc"
* */
int ArgParser::atoICMPType(char *opt, u8 *type){
if(type==NULL)
return OP_FAILURE;
if ( !strcasecmp(opt, "echo-reply") ||
!strcasecmp(opt, "echo-rep") ||
!strcasecmp(opt, "er") )
*type=0;
else if ( !strcasecmp(opt, "destination-unreachable") ||
!strcasecmp(opt, "dest-unr") ||
!strcasecmp(opt, "du") )
*type=3;
else if ( !strcasecmp(opt, "source-quench") ||
!strcasecmp(opt, "sour-que") ||
!strcasecmp(opt, "sq") )
*type=4;
else if ( !strcasecmp(opt, "redirect") ||
!strcasecmp(opt, "redi") ||
!strcasecmp(opt, "r") )
*type=5;
else if ( !strcasecmp(opt, "echo-request") || /* Ok, I'll also allow this */
!strcasecmp(opt, "echo") ||
!strcasecmp(opt, "e") )
*type=8;
else if ( !strcasecmp(opt, "router-advertisement") ||
!strcasecmp(opt, "rout-adv") ||
!strcasecmp(opt, "ra") )
*type=9;
else if ( !strcasecmp(opt, "router-solicitation") ||
!strcasecmp(opt, "rout-sol") ||
!strcasecmp(opt, "rs") )
*type=10;
else if ( !strcasecmp(opt, "time-exceeded") ||
!strcasecmp(opt, "time-exc") ||
!strcasecmp(opt, "te") )
*type=11;
else if ( !strcasecmp(opt, "parameter-problem") ||
!strcasecmp(opt, "para-pro") ||
!strcasecmp(opt, "pp") )
*type=12;
else if ( !strcasecmp(opt, "timestamp") ||
!strcasecmp(opt, "time") ||
!strcasecmp(opt, "tm") )
*type=13;
else if ( !strcasecmp(opt, "timestamp-reply") ||
!strcasecmp(opt, "time-rep") ||
!strcasecmp(opt, "tr") )
*type=14;
else if ( !strcasecmp(opt, "information") ||
!strcasecmp(opt, "info") ||
!strcasecmp(opt, "i") )
*type=15;
else if ( !strcasecmp(opt, "information-reply") ||
!strcasecmp(opt, "info-rep") ||
!strcasecmp(opt, "ir") )
*type=16;
else if ( !strcasecmp(opt, "mask-request") ||
!strcasecmp(opt, "mask") ||
!strcasecmp(opt, "m") )
*type=17;
else if ( !strcasecmp(opt, "mask-reply") ||
!strcasecmp(opt, "mask-rep") ||
!strcasecmp(opt, "mr") )
*type=18;
else if ( !strcasecmp(opt, "traceroute") ||
!strcasecmp(opt, "trace") ||
!strcasecmp(opt, "tc") )
*type=30;
else
return OP_FAILURE;
/* TODO: They are not implemented but there are more types in
http://www.iana.org/assignments/icmp-parameters
31 Datagram Conversion Error [RFC1475]
32 Mobile Host Redirect [David Johnson]
33 IPv6 Where-Are-You [Bill Simpson]
34 IPv6 I-Am-Here [Bill Simpson]
35 Mobile Registration Request [Bill Simpson]
36 Mobile Registration Reply [Bill Simpson]
37 Domain Name Request [RFC1788]
38 Domain Name Reply [RFC1788]
39 SKIP [Markson]
40 Photuris [RFC2521]
41 ICMP messages utilized by experimental [RFC4065]
mobility protocols such as Seamoby
42-255 Reserved [JBP]
*/
return OP_SUCCESS;
} /* End of atoICMPType() */
/* Names are taken from http://www.iana.org/assignments/icmp-parameters */
/* ALLOWED format:
*
* Full option name: needs-fragmentation
* Four letters - three letters: need-fra
* Our own version (varies): frag
*
* In ICMP types that REQUEST something, the word "request" is always omitted.
* For example: Echo request should be specified as "echo" or "e",
* not "echo-request"/"echo-req"/"er"
*
* EXCEPTIONS. To avoid confusion:
* - Initials for "Timestamp" are "tm"
* - Initial for Traceroute are "tc"
* */
int ArgParser::atoICMPCode(char *opt, u8 *code){
if(code==NULL || opt==NULL)
return OP_FAILURE;
/* Destination Unreachable */
if ( !strcasecmp(opt, "network-unreachable") ||
!strcasecmp(opt, "netw-unr") ||
!strcasecmp(opt, "net") ) /**/
*code=0;
else if ( !strcasecmp(opt, "host-unreachable") ||
!strcasecmp(opt, "host-unr") ||
!strcasecmp(opt, "host") )
*code=1;
else if ( !strcasecmp(opt, "protocol-unreachable") ||
!strcasecmp(opt, "prot-unr") ||
!strcasecmp(opt, "proto") )
*code=2;
else if ( !strcasecmp(opt, "port-unreachable") ||
!strcasecmp(opt, "port-unr") ||
!strcasecmp(opt, "port") )
*code=3;
else if ( !strcasecmp(opt, "needs-fragmentation") ||
!strcasecmp(opt, "need-fra") ||
!strcasecmp(opt, "frag") )
*code=4;
else if ( !strcasecmp(opt, "source-route-failed") ||
!strcasecmp(opt, "sour-rou") ||
!strcasecmp(opt, "routefail") )
*code=5;
else if ( !strcasecmp(opt, "network-unknown") ||
!strcasecmp(opt, "netw-unk") ||
!strcasecmp(opt, "net?") )
*code=6;
else if ( !strcasecmp(opt, "host-unknown") ||
!strcasecmp(opt, "host-unk") ||
!strcasecmp(opt, "host?") )
*code=7;
else if ( !strcasecmp(opt, "host-isolated") ||
!strcasecmp(opt, "host-iso") ||
!strcasecmp(opt, "isolated") )
*code=8;
else if ( !strcasecmp(opt, "network-prohibited") ||
!strcasecmp(opt, "netw-pro") ||
!strcasecmp(opt, "!net") )
*code=9;
else if ( !strcasecmp(opt, "host-prohibited") ||
!strcasecmp(opt, "host-pro") ||
!strcasecmp(opt, "!host") )
*code=10;
else if ( !strcasecmp(opt, "network-tos") ||
!strcasecmp(opt, "unreachable-network-tos") ||
!strcasecmp(opt, "netw-tos") ||
!strcasecmp(opt, "tosnet") )
/* Not to be confused with redirect-network-tos*/
*code=11;
else if ( !strcasecmp(opt, "host-tos") ||
!strcasecmp(opt, "unreachable-host-tos") ||
!strcasecmp(opt, "toshost") )
/* Not to be confused with redirect-network-tos*/
*code=12;
else if ( !strcasecmp(opt, "communication-prohibited") ||
!strcasecmp(opt, "comm-pro") ||
!strcasecmp(opt, "!comm") )
*code=13;
else if ( !strcasecmp(opt, "host-precedence-violation") ||
!strcasecmp(opt, "precedence-violation") ||
!strcasecmp(opt, "prec-vio") ||
!strcasecmp(opt, "violation") )
*code=14;
else if ( !strcasecmp(opt, "precedence-cutoff") ||
!strcasecmp(opt, "prec-cut") ||
!strcasecmp(opt, "cutoff") )
*code=15;
/* Redirect */
else if ( !strcasecmp(opt, "redirect-network") ||
!strcasecmp(opt, "redi-net") ||
!strcasecmp(opt, "net") )
/* "net" is the same as in Destination unreachable and there is no
* conflict because both codes use value 0 */
*code=0;
else if ( !strcasecmp(opt, "redirect-host") ||
!strcasecmp(opt, "redi-host") ||
!strcasecmp(opt, "host") )
/* "host" is the same as in Destination unreachable and there is no
* conflict because both codes use value 0 */
*code=1;
else if ( !strcasecmp(opt, "redirect-network-tos") ||
!strcasecmp(opt, "redi-ntos") ||
!strcasecmp(opt, "redir-ntos") )
*code=2;
else if ( !strcasecmp(opt, "redirect-host-tos") ||
!strcasecmp(opt, "redi-htos") ||
!strcasecmp(opt, "redir-htos") )
*code=3;
/* Router Advertisement */
else if ( !strcasecmp(opt, "normal-advertisement") ||
!strcasecmp(opt, "norm-adv") ||
!strcasecmp(opt, "normal") ||
!strcasecmp(opt, "zero") ||
!strcasecmp(opt, "default") ||
!strcasecmp(opt, "def") )
/* This one corresponds with "Normal router advertisement" but
* with the word "normal", can be reused for any other code as
* 0 is the default value if the code field is unused. */
*code=0;
else if ( !strcasecmp(opt, "not-route-common-traffic") ||
!strcasecmp(opt, "not-rou") ||
!strcasecmp(opt, "mobile-ip") ||
!strcasecmp(opt, "!route") ||
!strcasecmp(opt, "!commontraffic") )
*code=16;
/* Time Exceeded */
else if ( !strcasecmp(opt, "ttl-exceeded-in-transit") ||
!strcasecmp(opt, "ttl-exc") ||
!strcasecmp(opt, "ttl-zero") ||
!strcasecmp(opt, "ttl-transit") ||
!strcasecmp(opt, "ttl-0") ||
!strcasecmp(opt, "!ttl") )
*code=0;
else if ( !strcasecmp(opt, "fragment-reassembly-time-exceeded") ||
!strcasecmp(opt, "frag-exc") ||
!strcasecmp(opt, "frag-time") ||
!strcasecmp(opt, "!timefrag") ||
!strcasecmp(opt, "!frag") )
*code=1;
/* Parameter problem */
else if ( !strcasecmp(opt, "pointer-indicates-error") ||
!strcasecmp(opt, "poin-ind") ||
!strcasecmp(opt, "pointer-indicates") ||
!strcasecmp(opt, "pointer") ||
!strcasecmp(opt, "pointertells") )
*code=0;
else if ( !strcasecmp(opt, "missing-required-option") ||
!strcasecmp(opt, "miss-req") ||
!strcasecmp(opt, "miss-option") ||
!strcasecmp(opt, "option-missing") ||
!strcasecmp(opt, "missing-option") ||
!strcasecmp(opt, "!option") )
*code=1;
else if ( !strcasecmp(opt, "bad-length") ||
!strcasecmp(opt, "bad-len") ||
!strcasecmp(opt, "badlen") ||
!strcasecmp(opt, "badlength") ||
!strcasecmp(opt, "!len") )
*code=2;
/* ICMP Security Failures Messages (Experimental) */
else if ( !strcasecmp(opt, "bad-spi") ||
!strcasecmp(opt, "badspi") ||
!strcasecmp(opt, "!spi") )
*code=0;
else if ( !strcasecmp(opt, "authentication-failed") ||
!strcasecmp(opt, "auth-fai") ||
!strcasecmp(opt, "auth-failed") ||
!strcasecmp(opt, "authfail") ||
!strcasecmp(opt, "!auth") )
*code=1;
else if ( !strcasecmp(opt, "decompression-failed") ||
!strcasecmp(opt, "deco-fai") ||
!strcasecmp(opt, "decom-failed") ||
!strcasecmp(opt, "!decompress") ||
!strcasecmp(opt, "!decompression") )
*code=2;
else if ( !strcasecmp(opt, "decryption-failed") ||
!strcasecmp(opt, "decr-fai") ||
!strcasecmp(opt, "decrypt-failed") ||
!strcasecmp(opt, "!decrypt") ||
!strcasecmp(opt, "!decryption") )
*code=3;
else if ( !strcasecmp(opt, "need-authentication") ||
!strcasecmp(opt, "need-aut") ||
!strcasecmp(opt, "need-auth") ||
!strcasecmp(opt, "auth-needed") ||
!strcasecmp(opt, "!auth") ||
!strcasecmp(opt, "") )
*code=4;
else if ( !strcasecmp(opt, "need-authorization") ||
!strcasecmp(opt, "need-author") ||
!strcasecmp(opt, "authorization-needed") ||
!strcasecmp(opt, "author-needed") ||
!strcasecmp(opt, "!author") ||
!strcasecmp(opt, "!authorization") )
*code=5;
/*
else if ( !strcasecmp(opt, "") ||
!strcasecmp(opt, "") ||
!strcasecmp(opt, "") )
*code=;
*/
else
return OP_FAILURE;
return OP_SUCCESS;
} /* End of atoICMPCode() */
/* Same as atoICMPCode() but for ARP operation codes */
int ArgParser::atoARPOpCode(char *opt, u16 *code){
if(code==NULL || opt==NULL)
return OP_FAILURE;
if ( !strcasecmp(opt, "arp-request") ||
!strcasecmp(opt, "arp") ||
!strcasecmp(opt, "a") ) /**/
*code=1;
else if ( !strcasecmp(opt, "arp-reply") ||
!strcasecmp(opt, "arp-rep") ||
!strcasecmp(opt, "ar") )
*code=2;
else if ( !strcasecmp(opt, "rarp-request") ||
!strcasecmp(opt, "rarp") ||
!strcasecmp(opt, "r") )
*code=3;
else if ( !strcasecmp(opt, "rarp-reply") ||
!strcasecmp(opt, "rarp-rep") ||
!strcasecmp(opt, "rr") )
*code=4;
else if ( !strcasecmp(opt, "drarp-request") ||
!strcasecmp(opt, "drarp") ||
!strcasecmp(opt, "d") )
*code=5;
else if ( !strcasecmp(opt, "drarp-reply") ||
!strcasecmp(opt, "drarp-rep") ||
!strcasecmp(opt, "dr") )
*code=6;
else if ( !strcasecmp(opt, "drarp-error") ||
!strcasecmp(opt, "drarp-err") ||
!strcasecmp(opt, "de") )
*code=7;
else if ( !strcasecmp(opt, "inarp-request") ||
!strcasecmp(opt, "inarp") ||
!strcasecmp(opt, "i") ) /**/
*code=8;
else if ( !strcasecmp(opt, "inarp-reply") ||
!strcasecmp(opt, "inarp-rep") ||
!strcasecmp(opt, "ir") ) /**/
*code=9;
else if ( !strcasecmp(opt, "arp-nak") ||
!strcasecmp(opt, "an") )
*code=10;
/*
else if ( !strcasecmp(opt, "") ||
!strcasecmp(opt, "") ||
!strcasecmp(opt, "") )
*code=;
*/
else
return OP_FAILURE;
return OP_SUCCESS;
} /* End of atoARPOpCode() */
int ArgParser::atoEtherType(char *opt, u16 *type){
if(type==NULL || opt==NULL)
return OP_FAILURE;
if ( !strcasecmp(opt, "ip") ||
!strcasecmp(opt, "ipv4") ||
!strcasecmp(opt, "4") ) /**/
*type=0x0800;
else if ( !strcasecmp(opt, "arp") )
*type=0x0806;
else if ( !strcasecmp(opt, "frame-relay") ||
!strcasecmp(opt, "frelay") ||
!strcasecmp(opt, "fr") )
*type=0x0808;
else if ( !strcasecmp(opt, "ppp") )
*type=0x880B;
else if ( !strcasecmp(opt, "gsmp") )
*type=0x880C;
else if ( !strcasecmp(opt, "rarp") )
*type=0x8035;
else if ( !strcasecmp(opt, "ipv6") ||
!strcasecmp(opt, "6") ) /**/
*type=0x86DD;
else if ( !strcasecmp(opt, "mpls") )
*type=0x8847;
else if ( !strcasecmp(opt, "mps-ual") ||
!strcasecmp(opt, "mps") )
*type=0x8848;
else if ( !strcasecmp(opt, "mcap") )
*type=0x8861;
else if ( !strcasecmp(opt, "pppoe-discovery")||
!strcasecmp(opt, "pppoe-d") )
*type=0x8863;
else if ( !strcasecmp(opt, "pppoe-session")||
!strcasecmp(opt, "pppoe-s") )
*type=0x8864;
else if ( !strcasecmp(opt, "ctag") )
*type=0x8100;
else if ( !strcasecmp(opt, "epon") )
*type=0x8808;
else if ( !strcasecmp(opt, "pbnac") )
*type=0x888E;
else if ( !strcasecmp(opt, "stag") )
*type=0x88A8;
else if ( !strcasecmp(opt, "ethexp1") )
*type=0x88B5;
else if ( !strcasecmp(opt, "ethexp2") )
*type=0x88B6;
else if ( !strcasecmp(opt, "ethoui") )
*type=0x88B7;
else if ( !strcasecmp(opt, "preauth") )
*type=0x88C7;
else if ( !strcasecmp(opt, "lldp") )
*type=0x88CC;
else if ( !strcasecmp(opt, "macsec") ||
!strcasecmp(opt, "mac-sec") ||
!strcasecmp(opt, "mac-security") )
*type=0x88E5;
else if ( !strcasecmp(opt, "mvrp") )
*type=0x88F5;
else if ( !strcasecmp(opt, "mmrp") )
*type=0x88F6;
else if ( !strcasecmp(opt, "frrr") )
*type=0x890D;
/*
else if ( !strcasecmp(opt, "") ||
!strcasecmp(opt, "") ||
!strcasecmp(opt, "") )
*type=;
*/
else
return OP_FAILURE;
return OP_SUCCESS;
} /* End of atoEtherType() */
int ArgParser::parseICMPTimestamp(char *optarg, u32 *dst){
long diff=0;
if(optarg==NULL || dst==NULL)
nping_fatal(QT_3, "parseICMPTimestamp(): NULL pointer supplied.");
if( meansRandom(optarg) ){
while( (*dst=get_random_u32()) == 0);
}
else if( !strncmp("now-", optarg, 4) ){
if ( (diff= tval2msecs(optarg+4)) < 0 )
nping_fatal(QT_3,"You must specify a valid time value after now- (e.g. 1000, 2s, 25m, etc.)");
struct timeval now;
gettimeofday(&now, NULL);
if( ((((u32)now.tv_sec)%86400)*1000) < (u32)diff )
nping_fatal(QT_3,"Value is %s is too high for current time.", optarg+4 );
else
*dst= ((((u32)now.tv_sec)%86400)*1000) - diff;
}
else if( !strncmp("now+", optarg, 4) ) {
if ( (diff= tval2msecs(optarg+4)) < 0 )
nping_fatal(QT_3,"You must specify a valid time value after now+ (e.g. 1000, 2s, 25m, etc.)");
struct timeval now;
gettimeofday(&now, NULL);
if( ((((u32)now.tv_sec)%86400)*1000) + diff > 0xFFFFFFFF )
nping_fatal(QT_3,"Value is %s is too high for current time.", optarg+4 );
else
*dst= ((((u32)now.tv_sec)%86400)*1000) + diff;
}
else if( !strcmp("now", optarg) ) {
struct timeval now;
gettimeofday(&now, NULL);
*dst = ((((u32)now.tv_sec)%86400)*1000);
}
else {
if ( (diff= tval2msecs(optarg)) == -1)
nping_fatal(QT_3,"Invalid time supplied");
else
*dst=diff;
}
return OP_SUCCESS;
} /* End of parseICMPTimestamp() */