"Fossies" - the Fresh Open Source Software Archive

Member "libpcap-1.10.1/./pcap-int.h" (7 Jun 2021, 21152 Bytes) of package /linux/misc/libpcap-1.10.1.tar.gz:


As a special service "Fossies" has tried to format the requested source page into HTML format using (guessed) C and C++ source code syntax highlighting (style: standard) with prefixed line numbers and code folding option. Alternatively you can here view or download the uninterpreted source code file. For more information about "pcap-int.h" see the Fossies "Dox" file reference documentation and the latest Fossies "Diffs" side-by-side code changes report: 1.10.0_vs_1.10.1.

    1 /*
    2  * Copyright (c) 1994, 1995, 1996
    3  *  The Regents of the University of California.  All rights reserved.
    4  *
    5  * Redistribution and use in source and binary forms, with or without
    6  * modification, are permitted provided that the following conditions
    7  * are met:
    8  * 1. Redistributions of source code must retain the above copyright
    9  *    notice, this list of conditions and the following disclaimer.
   10  * 2. Redistributions in binary form must reproduce the above copyright
   11  *    notice, this list of conditions and the following disclaimer in the
   12  *    documentation and/or other materials provided with the distribution.
   13  * 3. All advertising materials mentioning features or use of this software
   14  *    must display the following acknowledgement:
   15  *  This product includes software developed by the Computer Systems
   16  *  Engineering Group at Lawrence Berkeley Laboratory.
   17  * 4. Neither the name of the University nor of the Laboratory may be used
   18  *    to endorse or promote products derived from this software without
   19  *    specific prior written permission.
   20  *
   21  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
   22  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
   23  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
   24  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
   25  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
   26  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
   27  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
   28  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
   29  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
   30  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
   31  * SUCH DAMAGE.
   32  */
   33 
   34 #ifndef pcap_int_h
   35 #define pcap_int_h
   36 
   37 #include <stddef.h>
   38 
   39 #include <signal.h>
   40 
   41 #include <pcap/pcap.h>
   42 
   43 #ifdef MSDOS
   44   #include <fcntl.h>
   45   #include <io.h>
   46 #endif
   47 
   48 #include "varattrs.h"
   49 #include "fmtutils.h"
   50 
   51 #include <stdarg.h>
   52 
   53 #include "portability.h"
   54 
   55 /*
   56  * Version string.
   57  * Uses PACKAGE_VERSION from config.h.
   58  */
   59 #define PCAP_VERSION_STRING "libpcap version " PACKAGE_VERSION
   60 
   61 #ifdef __cplusplus
   62 extern "C" {
   63 #endif
   64 
   65 /*
   66  * If pcap_new_api is set, we disable pcap_lookupdev(), because:
   67  *
   68  *    it's not thread-safe, and is marked as deprecated, on all
   69  *    platforms;
   70  *
   71  *    on Windows, it may return UTF-16LE strings, which the program
   72  *    might then pass to pcap_create() (or to pcap_open_live(), which
   73  *    then passes them to pcap_create()), requiring pcap_create() to
   74  *    check for UTF-16LE strings using a hack, and that hack 1)
   75  *    *cannot* be 100% reliable and 2) runs the risk of going past the
   76  *    end of the string.
   77  *
   78  * We keep it around in legacy mode for compatibility.
   79  *
   80  * We also disable the aforementioned hack in pcap_create().
   81  */
   82 extern int pcap_new_api;
   83 
   84 /*
   85  * If pcap_utf_8_mode is set, on Windows we treat strings as UTF-8.
   86  *
   87  * On UN*Xes, we assume all strings are and should be in UTF-8, regardless
   88  * of the setting of this flag.
   89  */
   90 extern int pcap_utf_8_mode;
   91 
   92 /*
   93  * Swap byte ordering of unsigned long long timestamp on a big endian
   94  * machine.
   95  */
   96 #define SWAPLL(ull)  ((ull & 0xff00000000000000ULL) >> 56) | \
   97                       ((ull & 0x00ff000000000000ULL) >> 40) | \
   98                       ((ull & 0x0000ff0000000000ULL) >> 24) | \
   99                       ((ull & 0x000000ff00000000ULL) >> 8)  | \
  100                       ((ull & 0x00000000ff000000ULL) << 8)  | \
  101                       ((ull & 0x0000000000ff0000ULL) << 24) | \
  102                       ((ull & 0x000000000000ff00ULL) << 40) | \
  103                       ((ull & 0x00000000000000ffULL) << 56)
  104 
  105 /*
  106  * Maximum snapshot length.
  107  *
  108  * Somewhat arbitrary, but chosen to be:
  109  *
  110  *    1) big enough for maximum-size Linux loopback packets (65549)
  111  *       and some USB packets captured with USBPcap:
  112  *
  113  *           https://desowin.org/usbpcap/
  114  *
  115  *       (> 131072, < 262144)
  116  *
  117  * and
  118  *
  119  *    2) small enough not to cause attempts to allocate huge amounts of
  120  *       memory; some applications might use the snapshot length in a
  121  *       savefile header to control the size of the buffer they allocate,
  122  *       so a size of, say, 2^31-1 might not work well.  (libpcap uses it
  123  *       as a hint, but doesn't start out allocating a buffer bigger than
  124  *       2 KiB, and grows the buffer as necessary, but not beyond the
  125  *       per-linktype maximum snapshot length.  Other code might naively
  126  *       use it; we want to avoid writing a too-large snapshot length,
  127  *       in order not to cause that code problems.)
  128  *
  129  * We don't enforce this in pcap_set_snaplen(), but we use it internally.
  130  */
  131 #define MAXIMUM_SNAPLEN     262144
  132 
  133 /*
  134  * Locale-independent macros for testing character types.
  135  * These can be passed any integral value, without worrying about, for
  136  * example, sign-extending char values, unlike the C macros.
  137  */
  138 #define PCAP_ISDIGIT(c) \
  139     ((c) >= '0' && (c) <= '9')
  140 #define PCAP_ISXDIGIT(c) \
  141     (((c) >= '0' && (c) <= '9') || \
  142      ((c) >= 'A' && (c) <= 'F') || \
  143      ((c) >= 'a' && (c) <= 'f'))
  144 
  145 struct pcap_opt {
  146     char    *device;
  147     int timeout;    /* timeout for buffering */
  148     u_int   buffer_size;
  149     int promisc;
  150     int rfmon;      /* monitor mode */
  151     int immediate;  /* immediate mode - deliver packets as soon as they arrive */
  152     int nonblock;   /* non-blocking mode - don't wait for packets to be delivered, return "no packets available" */
  153     int tstamp_type;
  154     int tstamp_precision;
  155 
  156     /*
  157      * Platform-dependent options.
  158      */
  159 #ifdef __linux__
  160     int protocol;   /* protocol to use when creating PF_PACKET socket */
  161 #endif
  162 #ifdef _WIN32
  163     int nocapture_local;/* disable NPF loopback */
  164 #endif
  165 };
  166 
  167 typedef int (*activate_op_t)(pcap_t *);
  168 typedef int (*can_set_rfmon_op_t)(pcap_t *);
  169 typedef int (*read_op_t)(pcap_t *, int cnt, pcap_handler, u_char *);
  170 typedef int (*next_packet_op_t)(pcap_t *, struct pcap_pkthdr *, u_char **);
  171 typedef int (*inject_op_t)(pcap_t *, const void *, int);
  172 typedef void    (*save_current_filter_op_t)(pcap_t *, const char *);
  173 typedef int (*setfilter_op_t)(pcap_t *, struct bpf_program *);
  174 typedef int (*setdirection_op_t)(pcap_t *, pcap_direction_t);
  175 typedef int (*set_datalink_op_t)(pcap_t *, int);
  176 typedef int (*getnonblock_op_t)(pcap_t *);
  177 typedef int (*setnonblock_op_t)(pcap_t *, int);
  178 typedef int (*stats_op_t)(pcap_t *, struct pcap_stat *);
  179 typedef void    (*breakloop_op_t)(pcap_t *);
  180 #ifdef _WIN32
  181 typedef struct pcap_stat *(*stats_ex_op_t)(pcap_t *, int *);
  182 typedef int (*setbuff_op_t)(pcap_t *, int);
  183 typedef int (*setmode_op_t)(pcap_t *, int);
  184 typedef int (*setmintocopy_op_t)(pcap_t *, int);
  185 typedef HANDLE  (*getevent_op_t)(pcap_t *);
  186 typedef int (*oid_get_request_op_t)(pcap_t *, bpf_u_int32, void *, size_t *);
  187 typedef int (*oid_set_request_op_t)(pcap_t *, bpf_u_int32, const void *, size_t *);
  188 typedef u_int   (*sendqueue_transmit_op_t)(pcap_t *, pcap_send_queue *, int);
  189 typedef int (*setuserbuffer_op_t)(pcap_t *, int);
  190 typedef int (*live_dump_op_t)(pcap_t *, char *, int, int);
  191 typedef int (*live_dump_ended_op_t)(pcap_t *, int);
  192 typedef PAirpcapHandle  (*get_airpcap_handle_op_t)(pcap_t *);
  193 #endif
  194 typedef void    (*cleanup_op_t)(pcap_t *);
  195 
  196 /*
  197  * We put all the stuff used in the read code path at the beginning,
  198  * to try to keep it together in the same cache line or lines.
  199  */
  200 struct pcap {
  201     /*
  202      * Method to call to read packets on a live capture.
  203      */
  204     read_op_t read_op;
  205 
  206     /*
  207      * Method to call to read the next packet from a savefile.
  208      */
  209     next_packet_op_t next_packet_op;
  210 
  211 #ifdef _WIN32
  212     HANDLE handle;
  213 #else
  214     int fd;
  215 #endif /* _WIN32 */
  216 
  217     /*
  218      * Read buffer.
  219      */
  220     u_int bufsize;
  221     void *buffer;
  222     u_char *bp;
  223     int cc;
  224 
  225     sig_atomic_t break_loop; /* flag set to force break from packet-reading loop */
  226 
  227     void *priv;     /* private data for methods */
  228 
  229 #ifdef ENABLE_REMOTE
  230     struct pcap_samp rmt_samp;  /* parameters related to the sampling process. */
  231 #endif
  232 
  233     int swapped;
  234     FILE *rfile;        /* null if live capture, non-null if savefile */
  235     u_int fddipad;
  236     struct pcap *next;  /* list of open pcaps that need stuff cleared on close */
  237 
  238     /*
  239      * File version number; meaningful only for a savefile, but we
  240      * keep it here so that apps that (mistakenly) ask for the
  241      * version numbers will get the same zero values that they
  242      * always did.
  243      */
  244     int version_major;
  245     int version_minor;
  246 
  247     int snapshot;
  248     int linktype;       /* Network linktype */
  249     int linktype_ext;   /* Extended information stored in the linktype field of a file */
  250     int offset;     /* offset for proper alignment */
  251     int activated;      /* true if the capture is really started */
  252     int oldstyle;       /* if we're opening with pcap_open_live() */
  253 
  254     struct pcap_opt opt;
  255 
  256     /*
  257      * Place holder for pcap_next().
  258      */
  259     u_char *pkt;
  260 
  261 #ifdef _WIN32
  262     struct pcap_stat stat;  /* used for pcap_stats_ex() */
  263 #endif
  264 
  265     /* We're accepting only packets in this direction/these directions. */
  266     pcap_direction_t direction;
  267 
  268     /*
  269      * Flags to affect BPF code generation.
  270      */
  271     int bpf_codegen_flags;
  272 
  273 #if !defined(_WIN32) && !defined(MSDOS)
  274     int selectable_fd;  /* FD on which select()/poll()/epoll_wait()/kevent()/etc. can be done */
  275 
  276     /*
  277      * In case there either is no selectable FD, or there is but
  278      * it doesn't necessarily work (e.g., if it doesn't get notified
  279      * if the packet capture timeout expires before the buffer
  280      * fills up), this points to a timeout that should be used
  281      * in select()/poll()/epoll_wait()/kevent() call.  The pcap_t should
  282      * be put into non-blocking mode, and, if the timeout expires on
  283      * the call, an attempt should be made to read packets from all
  284      * pcap_t's with a required timeout, and the code must be
  285      * prepared not to see any packets from the attempt.
  286      */
  287     const struct timeval *required_select_timeout;
  288 #endif
  289 
  290     /*
  291      * Placeholder for filter code if bpf not in kernel.
  292      */
  293     struct bpf_program fcode;
  294 
  295     char errbuf[PCAP_ERRBUF_SIZE + 1];
  296 #ifdef _WIN32
  297     char acp_errbuf[PCAP_ERRBUF_SIZE + 1];  /* buffer for local code page error strings */
  298 #endif
  299     int dlt_count;
  300     u_int *dlt_list;
  301     int tstamp_type_count;
  302     u_int *tstamp_type_list;
  303     int tstamp_precision_count;
  304     u_int *tstamp_precision_list;
  305 
  306     struct pcap_pkthdr pcap_header; /* This is needed for the pcap_next_ex() to work */
  307 
  308     /*
  309      * More methods.
  310      */
  311     activate_op_t activate_op;
  312     can_set_rfmon_op_t can_set_rfmon_op;
  313     inject_op_t inject_op;
  314     save_current_filter_op_t save_current_filter_op;
  315     setfilter_op_t setfilter_op;
  316     setdirection_op_t setdirection_op;
  317     set_datalink_op_t set_datalink_op;
  318     getnonblock_op_t getnonblock_op;
  319     setnonblock_op_t setnonblock_op;
  320     stats_op_t stats_op;
  321     breakloop_op_t breakloop_op;
  322 
  323     /*
  324      * Routine to use as callback for pcap_next()/pcap_next_ex().
  325      */
  326     pcap_handler oneshot_callback;
  327 
  328 #ifdef _WIN32
  329     /*
  330      * These are, at least currently, specific to the Win32 NPF
  331      * driver.
  332      */
  333     stats_ex_op_t stats_ex_op;
  334     setbuff_op_t setbuff_op;
  335     setmode_op_t setmode_op;
  336     setmintocopy_op_t setmintocopy_op;
  337     getevent_op_t getevent_op;
  338     oid_get_request_op_t oid_get_request_op;
  339     oid_set_request_op_t oid_set_request_op;
  340     sendqueue_transmit_op_t sendqueue_transmit_op;
  341     setuserbuffer_op_t setuserbuffer_op;
  342     live_dump_op_t live_dump_op;
  343     live_dump_ended_op_t live_dump_ended_op;
  344     get_airpcap_handle_op_t get_airpcap_handle_op;
  345 #endif
  346     cleanup_op_t cleanup_op;
  347 };
  348 
  349 /*
  350  * BPF code generation flags.
  351  */
  352 #define BPF_SPECIAL_VLAN_HANDLING   0x00000001  /* special VLAN handling for Linux */
  353 
  354 /*
  355  * This is a timeval as stored in a savefile.
  356  * It has to use the same types everywhere, independent of the actual
  357  * `struct timeval'; `struct timeval' has 32-bit tv_sec values on some
  358  * platforms and 64-bit tv_sec values on other platforms, and writing
  359  * out native `struct timeval' values would mean files could only be
  360  * read on systems with the same tv_sec size as the system on which
  361  * the file was written.
  362  */
  363 
  364 struct pcap_timeval {
  365     bpf_int32 tv_sec;       /* seconds */
  366     bpf_int32 tv_usec;      /* microseconds */
  367 };
  368 
  369 /*
  370  * This is a `pcap_pkthdr' as actually stored in a savefile.
  371  *
  372  * Do not change the format of this structure, in any way (this includes
  373  * changes that only affect the length of fields in this structure),
  374  * and do not make the time stamp anything other than seconds and
  375  * microseconds (e.g., seconds and nanoseconds).  Instead:
  376  *
  377  *  introduce a new structure for the new format;
  378  *
  379  *  send mail to "tcpdump-workers@lists.tcpdump.org", requesting
  380  *  a new magic number for your new capture file format, and, when
  381  *  you get the new magic number, put it in "savefile.c";
  382  *
  383  *  use that magic number for save files with the changed record
  384  *  header;
  385  *
  386  *  make the code in "savefile.c" capable of reading files with
  387  *  the old record header as well as files with the new record header
  388  *  (using the magic number to determine the header format).
  389  *
  390  * Then supply the changes by forking the branch at
  391  *
  392  *  https://github.com/the-tcpdump-group/libpcap/tree/master
  393  *
  394  * and issuing a pull request, so that future versions of libpcap and
  395  * programs that use it (such as tcpdump) will be able to read your new
  396  * capture file format.
  397  */
  398 
  399 struct pcap_sf_pkthdr {
  400     struct pcap_timeval ts; /* time stamp */
  401     bpf_u_int32 caplen;     /* length of portion present */
  402     bpf_u_int32 len;        /* length of this packet (off wire) */
  403 };
  404 
  405 /*
  406  * How a `pcap_pkthdr' is actually stored in savefiles written
  407  * by some patched versions of libpcap (e.g. the ones in Red
  408  * Hat Linux 6.1 and 6.2).
  409  *
  410  * Do not change the format of this structure, in any way (this includes
  411  * changes that only affect the length of fields in this structure).
  412  * Instead, introduce a new structure, as per the above.
  413  */
  414 
  415 struct pcap_sf_patched_pkthdr {
  416     struct pcap_timeval ts; /* time stamp */
  417     bpf_u_int32 caplen;     /* length of portion present */
  418     bpf_u_int32 len;        /* length of this packet (off wire) */
  419     int     index;
  420     unsigned short protocol;
  421     unsigned char pkt_type;
  422 };
  423 
  424 /*
  425  * User data structure for the one-shot callback used for pcap_next()
  426  * and pcap_next_ex().
  427  */
  428 struct oneshot_userdata {
  429     struct pcap_pkthdr *hdr;
  430     const u_char **pkt;
  431     pcap_t *pd;
  432 };
  433 
  434 #ifndef min
  435 #define min(a, b) ((a) > (b) ? (b) : (a))
  436 #endif
  437 
  438 int pcap_offline_read(pcap_t *, int, pcap_handler, u_char *);
  439 
  440 /*
  441  * Does the packet count argument to a module's read routine say
  442  * "supply packets until you run out of packets"?
  443  */
  444 #define PACKET_COUNT_IS_UNLIMITED(count)    ((count) <= 0)
  445 
  446 /*
  447  * Routines that most pcap implementations can use for non-blocking mode.
  448  */
  449 #if !defined(_WIN32) && !defined(MSDOS)
  450 int pcap_getnonblock_fd(pcap_t *);
  451 int pcap_setnonblock_fd(pcap_t *p, int);
  452 #endif
  453 
  454 /*
  455  * Internal interfaces for "pcap_create()".
  456  *
  457  * "pcap_create_interface()" is the routine to do a pcap_create on
  458  * a regular network interface.  There are multiple implementations
  459  * of this, one for each platform type (Linux, BPF, DLPI, etc.),
  460  * with the one used chosen by the configure script.
  461  *
  462  * "pcap_create_common()" allocates and fills in a pcap_t, for use
  463  * by pcap_create routines.
  464  */
  465 pcap_t  *pcap_create_interface(const char *, char *);
  466 
  467 /*
  468  * This wrapper takes an error buffer pointer and a type to use for the
  469  * private data, and calls pcap_create_common(), passing it the error
  470  * buffer pointer, the size fo the private data type, in bytes, and the
  471  * offset of the private data from the beginning of the structure, in
  472  * bytes.
  473  */
  474 #define PCAP_CREATE_COMMON(ebuf, type) \
  475     pcap_create_common(ebuf, \
  476         sizeof (struct { pcap_t __common; type __private; }), \
  477         offsetof (struct { pcap_t __common; type __private; }, __private))
  478 pcap_t  *pcap_create_common(char *, size_t, size_t);
  479 int pcap_do_addexit(pcap_t *);
  480 void    pcap_add_to_pcaps_to_close(pcap_t *);
  481 void    pcap_remove_from_pcaps_to_close(pcap_t *);
  482 void    pcap_cleanup_live_common(pcap_t *);
  483 int pcap_check_activated(pcap_t *);
  484 void    pcap_breakloop_common(pcap_t *);
  485 
  486 /*
  487  * Internal interfaces for "pcap_findalldevs()".
  488  *
  489  * A pcap_if_list_t * is a reference to a list of devices.
  490  *
  491  * A get_if_flags_func is a platform-dependent function called to get
  492  * additional interface flags.
  493  *
  494  * "pcap_platform_finddevs()" is the platform-dependent routine to
  495  * find local network interfaces.
  496  *
  497  * "pcap_findalldevs_interfaces()" is a helper to find those interfaces
  498  * using the "standard" mechanisms (SIOCGIFCONF, "getifaddrs()", etc.).
  499  *
  500  * "add_dev()" adds an entry to a pcap_if_list_t.
  501  *
  502  * "find_dev()" tries to find a device, by name, in a pcap_if_list_t.
  503  *
  504  * "find_or_add_dev()" checks whether a device is already in a pcap_if_list_t
  505  * and, if not, adds an entry for it.
  506  */
  507 struct pcap_if_list;
  508 typedef struct pcap_if_list pcap_if_list_t;
  509 typedef int (*get_if_flags_func)(const char *, bpf_u_int32 *, char *);
  510 int pcap_platform_finddevs(pcap_if_list_t *, char *);
  511 #if !defined(_WIN32) && !defined(MSDOS)
  512 int pcap_findalldevs_interfaces(pcap_if_list_t *, char *,
  513         int (*)(const char *), get_if_flags_func);
  514 #endif
  515 pcap_if_t *find_or_add_dev(pcap_if_list_t *, const char *, bpf_u_int32,
  516         get_if_flags_func, const char *, char *);
  517 pcap_if_t *find_dev(pcap_if_list_t *, const char *);
  518 pcap_if_t *add_dev(pcap_if_list_t *, const char *, bpf_u_int32, const char *,
  519         char *);
  520 int add_addr_to_dev(pcap_if_t *, struct sockaddr *, size_t,
  521         struct sockaddr *, size_t, struct sockaddr *, size_t,
  522         struct sockaddr *dstaddr, size_t, char *errbuf);
  523 #ifndef _WIN32
  524 pcap_if_t *find_or_add_if(pcap_if_list_t *, const char *, bpf_u_int32,
  525         get_if_flags_func, char *);
  526 int add_addr_to_if(pcap_if_list_t *, const char *, bpf_u_int32,
  527         get_if_flags_func,
  528         struct sockaddr *, size_t, struct sockaddr *, size_t,
  529         struct sockaddr *, size_t, struct sockaddr *, size_t, char *);
  530 #endif
  531 
  532 /*
  533  * Internal interfaces for "pcap_open_offline()" and other savefile
  534  * I/O routines.
  535  *
  536  * "pcap_open_offline_common()" allocates and fills in a pcap_t, for use
  537  * by pcap_open_offline routines.
  538  *
  539  * "pcap_adjust_snapshot()" adjusts the snapshot to be non-zero and
  540  * fit within an int.
  541  *
  542  * "sf_cleanup()" closes the file handle associated with a pcap_t, if
  543  * appropriate, and frees all data common to all modules for handling
  544  * savefile types.
  545  *
  546  * "charset_fopen()", in UTF-8 mode on Windows, does an fopen() that
  547  * treats the pathname as being in UTF-8, rather than the local
  548  * code page, on Windows.
  549  */
  550 
  551 /*
  552  * This wrapper takes an error buffer pointer and a type to use for the
  553  * private data, and calls pcap_create_common(), passing it the error
  554  * buffer pointer, the size fo the private data type, in bytes, and the
  555  * offset of the private data from the beginning of the structure, in
  556  * bytes.
  557  */
  558 #define PCAP_OPEN_OFFLINE_COMMON(ebuf, type) \
  559     pcap_open_offline_common(ebuf, \
  560         sizeof (struct { pcap_t __common; type __private; }), \
  561         offsetof (struct { pcap_t __common; type __private; }, __private))
  562 pcap_t  *pcap_open_offline_common(char *ebuf, size_t total_size,
  563     size_t private_data);
  564 bpf_u_int32 pcap_adjust_snapshot(bpf_u_int32 linktype, bpf_u_int32 snaplen);
  565 void    sf_cleanup(pcap_t *p);
  566 #ifdef _WIN32
  567 FILE    *charset_fopen(const char *path, const char *mode);
  568 #else
  569 /*
  570  * On other OSes, just use Boring Old fopen().
  571  */
  572 #define charset_fopen(path, mode)   fopen((path), (mode))
  573 #endif
  574 
  575 /*
  576  * Internal interfaces for loading code at run time.
  577  */
  578 #ifdef _WIN32
  579 #define pcap_code_handle_t  HMODULE
  580 #define pcap_funcptr_t      FARPROC
  581 
  582 pcap_code_handle_t  pcap_load_code(const char *);
  583 pcap_funcptr_t      pcap_find_function(pcap_code_handle_t, const char *);
  584 #endif
  585 
  586 /*
  587  * Internal interfaces for doing user-mode filtering of packets and
  588  * validating filter programs.
  589  */
  590 /*
  591  * Auxiliary data, for use when interpreting a filter intended for the
  592  * Linux kernel when the kernel rejects the filter (requiring us to
  593  * run it in userland).  It contains VLAN tag information.
  594  */
  595 struct pcap_bpf_aux_data {
  596     u_short vlan_tag_present;
  597     u_short vlan_tag;
  598 };
  599 
  600 /*
  601  * Filtering routine that takes the auxiliary data as an additional
  602  * argument.
  603  */
  604 u_int   pcap_filter_with_aux_data(const struct bpf_insn *,
  605     const u_char *, u_int, u_int, const struct pcap_bpf_aux_data *);
  606 
  607 /*
  608  * Filtering routine that doesn't.
  609  */
  610 u_int   pcap_filter(const struct bpf_insn *, const u_char *, u_int, u_int);
  611 
  612 /*
  613  * Routine to validate a BPF program.
  614  */
  615 int pcap_validate_filter(const struct bpf_insn *, int);
  616 
  617 /*
  618  * Internal interfaces for both "pcap_create()" and routines that
  619  * open savefiles.
  620  *
  621  * "pcap_oneshot()" is the standard one-shot callback for "pcap_next()"
  622  * and "pcap_next_ex()".
  623  */
  624 void    pcap_oneshot(u_char *, const struct pcap_pkthdr *, const u_char *);
  625 
  626 int install_bpf_program(pcap_t *, struct bpf_program *);
  627 
  628 int pcap_strcasecmp(const char *, const char *);
  629 
  630 /*
  631  * Internal interfaces for pcap_createsrcstr and pcap_parsesrcstr with
  632  * the additional bit of information regarding SSL support (rpcap:// vs.
  633  * rpcaps://).
  634  */
  635 int pcap_createsrcstr_ex(char *, int, const char *, const char *,
  636     const char *, unsigned char, char *);
  637 int pcap_parsesrcstr_ex(const char *, int *, char *, char *,
  638     char *, unsigned char *, char *);
  639 
  640 #ifdef YYDEBUG
  641 extern int pcap_debug;
  642 #endif
  643 
  644 #ifdef __cplusplus
  645 }
  646 #endif
  647 
  648 #endif