1 /******************************************************************************
2 Author: Samuel Jero <sj323707@ohio.edu>
6 Description: Program to ping hosts using DCCP REQ packets to test for DCCP connectivity.
7 ******************************************************************************/
16 #include <sys/types.h>
18 #include <sys/socket.h>
19 #include <sys/select.h>
20 #include <netinet/ip.h>
21 #include <netinet/ip6.h>
22 #include <netinet/in.h>
23 #include <netinet/ip_icmp.h>
24 #include <netinet/icmp6.h>
25 #include <arpa/inet.h>
29 #include <linux/dccp.h>
30 #include "checksums.h"
33 /*Use the DCCP source port to multiplex DCCP Ping streams by PID*/
34 #define SRC_PORT_AS_PID_MULTIPLEX 1
37 #define MAX(x,y) (x>y ? x : y)
41 /*Structure for simpler IPv4/IPv6 Address handling*/
44 struct sockaddr_in *ipv4;
45 struct sockaddr_in6 *ipv6;
48 /*Possible Responses to a Request*/
61 /*Output strings corresponding to enum responses*/
62 static const char* response_label[]= {
64 "Closed Port (Reset)",
65 "Open Port (Response)",
67 "Destination Unreachable",
70 "DCCP Not Supported (Parameter Problem)",
71 "Protocol Error (DCCP Reset)"
74 /*Structure to keep track of information about a request*/
82 enum responses reply_type;
87 /*Request Queue head structure*/
93 /*Statistics about the requests and replies sent*/
101 struct timeval start;
106 int count; /*Number of pings (-1 is infinity)*/
107 int dest_port; /*Destination port*/
108 int src_port; /*Source port---used to encode pid*/
110 long interval; /*Delay between pings in ms*/
111 int ip_type; /*IPv4 or IPv6*/
112 ipaddr_ptr_t dest_addr; /*Destination Address*/
113 ipaddr_ptr_t src_addr; /*Source Address*/
117 int debug=0; /*set to 1 to turn on debugging information*/
118 struct request_queue queue; /*Queue of requests to track RTT/duplicate information*/
119 struct stats ping_stats; /*Ping Statistics*/
120 struct params parms; /*Parameters for ping*/
123 void getAddresses(char *src, char* dst);
125 void handleDCCPpacket(int rcv_socket, int send_socket);
126 void handleICMP4packet(int rcv_socket);
127 void handleICMP6packet(int rcv_socket);
128 void buildRequestPacket(unsigned char* buffer, int *len, int seq);
129 void updateRequestPacket(unsigned char* buffer, int *len, int seq);
130 void sendClose(int seq, u_int16_t ack_h, u_int32_t ack_l, int socket);
131 void sendReset(int seq, u_int16_t ack_h, u_int32_t ack_l, int socket);
132 int logPacket(int req_seq, int packet_seq);
133 int logResponse(ipaddr_ptr_t *src, int seq, int type);
137 void sanitize_environment();
138 void dbgprintf(int level, const char *fmt, ...);
141 /*Parse commandline options*/
142 int main(int argc, char *argv[])
151 ping_stats.replies_received=0;
152 ping_stats.requests_sent=0;
153 ping_stats.rtt_avg=0;
154 ping_stats.rtt_max=0;
155 ping_stats.rtt_min=0;
158 parms.dest_port=33434;
160 parms. interval=1000;
161 parms.ip_type=AF_UNSPEC;
162 parms.dest_addr.gen=NULL;
163 parms.src_addr.gen=NULL;
165 sanitize_environment();
167 while ((c = getopt(argc, argv, "64c:p:i:dt:S:")) != -1) {
170 parms.ip_type=AF_INET6;
173 parms.ip_type=AF_INET;
176 parms.count = atoi(optarg);
178 dbgprintf(0, "Error: count must be positive");
183 parms.dest_port = atoi(optarg);
186 parms.interval = (long)(atof(optarg) * 1000.0);
187 if (parms.interval <= 0) {
188 dbgprintf(0, "Error: Invalid interval\n");
196 parms.ttl = atoi(optarg);
197 if (parms.ttl < 1 || parms.ttl > 255) {
198 dbgprintf(0,"Error: Invalid TTL\n");
218 #if SRC_PORT_AS_PID_MULTIPLEX
219 /*Encode PID in source port*/
220 parms.src_port=(getpid()+1024)%65535;
222 parms.src_port=parms.dest_port;
225 getAddresses(src, dst);
226 if(parms.src_addr.gen==NULL || parms.dest_addr.gen==NULL){
227 dbgprintf(0,"Error: Can't determine source or destination address\n");
231 signal(SIGINT, sigHandler);
234 free(parms.src_addr.gen);
235 free(parms.dest_addr.gen);
240 void getAddresses(char *src, char* dst){
241 struct addrinfo hint;
242 struct addrinfo *dtmp, *stmp;
243 struct ifaddrs *temp, *cur;
244 struct sockaddr_in6* iv6;
248 /*Lookup destination Address*/
249 memset(&hint,0,sizeof(struct addrinfo));
250 hint.ai_family=parms.ip_type;
251 hint.ai_flags=AI_V4MAPPED | AI_ADDRCONFIG;
253 if((err=getaddrinfo(dst,NULL,&hint,&dtmp))!=0){
254 dbgprintf(0,"Error: Couldn't lookup destination %s (%s)\n", dst, gai_strerror(err));
258 dbgprintf(0,"Error: Unknown Host %s\n", dst);
261 addrlen=dtmp->ai_addrlen;
262 hint.ai_family=parms.ip_type=dtmp->ai_family;
263 parms.dest_addr.gen=malloc(dtmp->ai_addrlen);
264 if(parms.dest_addr.gen==NULL){
265 dbgprintf(0,"Error: Can't allocate Memory\n");
268 memcpy(parms.dest_addr.gen,dtmp->ai_addr,dtmp->ai_addrlen);
272 /*Get a meaningful source address*/
274 /*Use Commandline arg*/
275 if((err=getaddrinfo(src,NULL,&hint,&stmp))!=0){
276 dbgprintf(0,"Error: Source Address %s is invalid (%s)\n", src, gai_strerror(err));
280 dbgprintf(0,"Error: Unknown Host %s\n", dst);
283 addrlen=stmp->ai_addrlen;
284 parms.src_addr.gen=malloc(stmp->ai_addrlen);
285 if(parms.src_addr.gen==NULL){
286 dbgprintf(0,"Error: Can't allocate Memory\n");
289 memcpy(parms.src_addr.gen,stmp->ai_addr,stmp->ai_addrlen);
293 /*Guess a good source address*/
297 if(cur->ifa_addr==NULL || cur->ifa_addr->sa_family!=parms.ip_type){
298 /*Not matching ipv4/ipv6 of dest*/
302 if(cur->ifa_flags & IFF_LOOPBACK){ /*Don't use loopback addresses*/
306 if(cur->ifa_addr!=NULL && cur->ifa_addr->sa_family==AF_INET6){
307 iv6=(struct sockaddr_in6*)cur->ifa_addr;
309 if(iv6->sin6_scope_id!=0){ /*Not globally valid address, if ipv6*/
315 parms.src_addr.gen=malloc(sizeof(struct sockaddr_storage));
316 if(parms.src_addr.gen==NULL){
317 dbgprintf(0,"Error: Can't allocate Memory\n");
320 parms.src_addr.gen->sa_family=parms.ip_type;
321 memcpy(parms.src_addr.gen,cur->ifa_addr,addrlen);
330 /*Preform the ping functionality*/
336 unsigned char sbuffer[slen];
338 struct timeval timeout;
339 struct timeval t,delay, add;
345 rs=socket(parms.ip_type, SOCK_RAW ,IPPROTO_RAW);
347 dbgprintf(0, "Error opening raw socket\n");
350 ds=socket(parms.ip_type, SOCK_RAW ,IPPROTO_DCCP);
352 dbgprintf(0, "Error opening raw DCCP socket\n");
355 is4=socket(parms.ip_type,SOCK_RAW,IPPROTO_ICMP);
357 dbgprintf(0,"Error opening raw ICMPv4 socket\n");
360 is6=socket(parms.ip_type,SOCK_RAW,IPPROTO_ICMPV6);
362 dbgprintf(0,"Error opening raw ICMPv6 socket\n");
367 /*Build DCCP packet*/
369 buildRequestPacket(sbuffer,&slen,packet_seq);
370 if(parms.ip_type==AF_INET){
371 addrlen=sizeof(struct sockaddr_in);
373 addrlen=sizeof(struct sockaddr_in6);
377 if(parms.ip_type==AF_INET){
378 printf("PINGING %s on DCCP port %i\n",
379 inet_ntop(parms.ip_type, (void*)&parms.dest_addr.ipv4->sin_addr, pbuf, 1000),
382 printf("PINGING %s on DCCP port %i\n",
383 inet_ntop(parms.ip_type, (void*)&parms.dest_addr.ipv6->sin6_addr, pbuf, 1000),
389 if(sendto(rs, &sbuffer, slen, MSG_DONTWAIT,(struct sockaddr*)parms.dest_addr.gen,addrlen)<0){
391 dbgprintf(0,"Error: sendto failed\n");
394 if(parms.count==0){done=1; break;}
396 if (logPacket(request_seq,packet_seq)<0){
397 dbgprintf(0,"Error: Couldn't record request!\n");
399 if(parms.ip_type==AF_INET){
400 dbgprintf(1, "Sending DCCP Request to %s\n",
401 inet_ntop(parms.ip_type, (void*)&parms.dest_addr.ipv4->sin_addr, pbuf, 1000));
403 dbgprintf(1, "Sending DCCP Request to %s\n",
404 inet_ntop(parms.ip_type, (void*)&parms.dest_addr.ipv6->sin6_addr, pbuf, 1000));
407 /*Use select to wait on packets or until interval has passed*/
408 add.tv_sec=parms.interval/1000;
409 add.tv_usec=(parms.interval%1000)*1000;
410 gettimeofday(&t,NULL);
411 timeradd(&t,&add,&delay);
412 while(timercmp(&t,&delay,<)){
413 /*Prepare for select*/
418 timersub(&delay,&t,&timeout);
421 if(select(MAX(ds+1,MAX(is4+1,is6+1)),&sel, NULL,NULL,&timeout)<0){
423 dbgprintf(0,"Select() error (%s)\n",strerror(errno));
426 if(parms.count==0){done=1;break;}
428 if(FD_ISSET(ds,&sel)){
429 /*Data on the DCCP socket*/
430 handleDCCPpacket(ds,rs);
433 if(FD_ISSET(is4,&sel) && parms.ip_type==AF_INET){
434 /*Data on the ICMPv4 socket*/
435 handleICMP4packet(is4);
437 if(FD_ISSET(is6,&sel) && parms.ip_type==AF_INET6){
438 /*Data on the ICMPv6 socket*/
439 handleICMP6packet(is6);
441 gettimeofday(&t,NULL);
450 updateRequestPacket(sbuffer,&slen, packet_seq);
459 void handleDCCPpacket(int rcv_socket, int send_socket){
461 unsigned char rbuffer[rlen];
462 ipaddr_ptr_t rcv_addr;
463 socklen_t rcv_addr_len;
464 struct dccp_hdr *dhdr;
465 struct dccp_hdr_reset *dhdr_re;
466 struct dccp_hdr_ext *dhdre;
467 struct dccp_hdr_response *dhdr_rp;
468 struct dccp_hdr_ack_bits *dhdr_sync;
472 /*Memory for socket address*/
473 rcv_addr_len=sizeof(struct sockaddr_storage);
474 rcv_addr.gen=malloc(rcv_addr_len);
475 if(rcv_addr.gen==NULL){
476 dbgprintf(0,"Error: Can't Allocate Memory!\n");
481 rcv_addr_len=sizeof(struct sockaddr_storage);
482 if((rlen=recvfrom(rcv_socket, &rbuffer, 1000,0,rcv_addr.gen,&rcv_addr_len))<0){
484 dbgprintf(0, "Error on receive from DCCP socket (%s)\n",strerror(errno));
491 if(rcv_addr.gen->sa_family!=parms.ip_type){ //confirm IP type
492 dbgprintf(1, "DCCP packet on %s. Tossing.\n", (parms.ip_type==AF_INET) ? "IPv4" : "IPv6");
497 if(rcv_addr.gen->sa_family==AF_INET){
499 if(memcmp(&rcv_addr.ipv4->sin_addr,&parms.dest_addr.ipv4->sin_addr,
500 sizeof(parms.dest_addr.ipv4->sin_addr))!=0){ //not from destination
501 dbgprintf(1,"DCCP packet from 3rd host\n");
505 if(rlen < sizeof(struct dccp_hdr)+sizeof(struct iphdr)){ //check packet size
507 dbgprintf(1, "Packet smaller than possible DCCP packet received on DCCP socket\n");
511 iph=(struct iphdr*)rbuffer;
512 ptr=rbuffer+iph->ihl*4;
515 if(memcmp(&rcv_addr.ipv6->sin6_addr, &parms.dest_addr.ipv6->sin6_addr,
516 sizeof(parms.dest_addr.ipv6->sin6_addr))!=0){ //not from destination
517 dbgprintf(1,"DCCP packet from 3rd host\n");
521 if(rlen < sizeof(struct dccp_hdr)){ //check packet size
523 dbgprintf(1, "Packet smaller than possible DCCP packet received on DCCP socket\n");
531 dhdr=(struct dccp_hdr*)ptr;
532 if(dhdr->dccph_sport!=htons(parms.dest_port)){
533 dbgprintf(1,"DCCP packet with wrong Source Port (%i)\n", ntohs(dhdr->dccph_sport));
537 if(dhdr->dccph_dport!=htons(parms.src_port)){
538 dbgprintf(1,"DCCP packet with wrong Destination Port\n");
544 if(dhdr->dccph_type==DCCP_PKT_RESET){
545 if(rlen < (ptr-rbuffer)+sizeof(struct dccp_hdr)+sizeof(struct dccp_hdr_ext)+sizeof(struct dccp_hdr_reset)){
546 dbgprintf(1, "Tossing DCCP Reset packet that's small!\n");
549 dhdr_re=(struct dccp_hdr_reset*)(ptr+sizeof(struct dccp_hdr)+sizeof(struct dccp_hdr_ext));
552 if(dhdr_re->dccph_reset_code==DCCP_RESET_CODE_NO_CONNECTION){
553 logResponse(&rcv_addr, ntohl(dhdr_re->dccph_reset_ack.dccph_ack_nr_low), RESET);
555 logResponse(&rcv_addr, ntohl(dhdr_re->dccph_reset_ack.dccph_ack_nr_low), DCCP_ERROR);
557 /*Nothing else to do*/
559 if(dhdr->dccph_type==DCCP_PKT_RESPONSE){
560 if(rlen < (ptr-rbuffer)+sizeof(struct dccp_hdr)+sizeof(struct dccp_hdr_ext)+sizeof(struct dccp_hdr_response)){
561 dbgprintf(1, "Tossing DCCP Response packet that's too small!\n");
566 dhdre=(struct dccp_hdr_ext*)(ptr+sizeof(struct dccp_hdr));
567 dhdr_rp=(struct dccp_hdr_response*)(ptr+sizeof(struct dccp_hdr)+sizeof(struct dccp_hdr_ext));
568 logResponse(&rcv_addr,ntohl(dhdr_rp->dccph_resp_ack.dccph_ack_nr_low),RESPONSE);
571 sendClose(ntohl(dhdr_rp->dccph_resp_ack.dccph_ack_nr_low),
572 dhdr->dccph_seq, dhdre->dccph_seq_low,send_socket);
574 if(dhdr->dccph_type==DCCP_PKT_SYNC || dhdr->dccph_type==DCCP_PKT_SYNCACK){
575 if(rlen < (ptr-rbuffer)+sizeof(struct dccp_hdr)+sizeof(struct dccp_hdr_ext)+sizeof(struct dccp_hdr_ack_bits)){
576 dbgprintf(1, "Tossing DCCP Sync/SyncAck packet that's too small!\n");
581 dhdre=(struct dccp_hdr_ext*)(ptr+sizeof(struct dccp_hdr));
582 dhdr_sync=(struct dccp_hdr_ack_bits*)(ptr+sizeof(struct dccp_hdr)+sizeof(struct dccp_hdr_ext));
583 logResponse(&rcv_addr,ntohl(dhdr_sync->dccph_ack_nr_low),SYNC);
586 sendReset(ntohl(dhdr_sync->dccph_ack_nr_low),
587 dhdr->dccph_seq, dhdre->dccph_seq_low,send_socket);
593 void handleICMP4packet(int rcv_socket){
595 unsigned char rbuffer[rlen];
596 ipaddr_ptr_t rcv_addr;
597 socklen_t rcv_addr_len;
598 struct icmphdr *icmp4;
599 struct dccp_hdr *dhdr;
600 struct dccp_hdr_ext *dhdre;
601 struct iphdr* ip4hdr;
604 /*Memory for socket address*/
605 rcv_addr_len=sizeof(struct sockaddr_storage);
606 rcv_addr.gen=malloc(rcv_addr_len);
607 if(rcv_addr.gen==NULL){
608 dbgprintf(0,"Error: Can't Allocate Memory!\n");
613 if((rlen=recvfrom(rcv_socket, &rbuffer, 1000,0,rcv_addr.gen,&rcv_addr_len))<0){
615 dbgprintf(0, "Error on receive from ICMPv4 socket (%s)\n",strerror(errno));
622 if(rlen < sizeof(struct icmphdr)){ //check packet size
623 dbgprintf(1, "Packet smaller than possible ICMPv4 packet!\n");
628 icmp4=(struct icmphdr*)rbuffer;
629 if(icmp4->type!=ICMP_DEST_UNREACH && icmp4->type!=ICMP_TIME_EXCEEDED){ //check icmp types
630 dbgprintf(1, "Tossing ICMPv4 packet of type %i\n", icmp4->type);
635 /*Check packet size again*/
636 if(rlen<sizeof(struct icmphdr)+sizeof(struct iphdr)+sizeof(struct dccp_hdr)+sizeof(struct dccp_hdr_ext)){
637 dbgprintf(1, "Tossing ICMPv4 packet that's too small to contain DCCP header!\n");
642 /*Decode IPv4 header*/
643 ip4hdr=(struct iphdr*)(rbuffer+sizeof(struct icmphdr));
644 if(memcmp(&parms.src_addr.ipv4->sin_addr,&ip4hdr->saddr,sizeof(parms.src_addr.ipv4->sin_addr))!=0){
645 /*Source address doesn't match*/
646 dbgprintf(1,"Tossing ICMPv4 packet because the embedded IPv4 source address isn't us\n");
650 if(memcmp(&parms.dest_addr.ipv4->sin_addr,&ip4hdr->daddr,sizeof(parms.dest_addr.ipv4->sin_addr))!=0){
651 /*Destination address doesn't match*/
652 dbgprintf(1,"Tossing ICMPv4 packet because the embedded IPv4 destination address isn't our target\n");
656 if(ip4hdr->protocol!=IPPROTO_DCCP){
658 dbgprintf(1,"Tossing ICMPv4 packet because the embedded packet isn't DCCP\n");
663 /*Decode DCCP header*/
664 dhdr=(struct dccp_hdr*)(rbuffer+sizeof(struct icmphdr)+ip4hdr->ihl*4);
665 if(dhdr->dccph_dport!=htons(parms.dest_port)){
666 /*DCCP Destination Ports don't match*/
667 dbgprintf(1,"Tossing ICMPv4 packet because the embedded packet doesn't have our DCCP destination port\n");
671 if(dhdr->dccph_sport!=htons(parms.src_port)){
672 /*DCCP Source Ports don't match*/
673 dbgprintf(1,"Tossing ICMPv4 packet because the embedded packet doesn't have our DCCP source port\n");
677 dhdre=(struct dccp_hdr_ext*)(rbuffer+sizeof(struct icmphdr)+ip4hdr->ihl*4+sizeof(struct dccp_hdr));
680 if(icmp4->type==ICMP_DEST_UNREACH){
681 type=DEST_UNREACHABLE;
683 if(icmp4->type==ICMP_TIME_EXCEEDED){
686 logResponse(&rcv_addr,ntohl(dhdre->dccph_seq_low),type);
691 void handleICMP6packet(int rcv_socket){
693 unsigned char rbuffer[rlen];
694 ipaddr_ptr_t rcv_addr;
695 socklen_t rcv_addr_len;
696 struct icmp6_hdr *icmp6;
697 struct ip6_hdr* ip6hdr;
698 struct dccp_hdr *dhdr;
699 struct dccp_hdr_ext *dhdre;
702 /*Memory for socket address*/
703 rcv_addr_len=sizeof(struct sockaddr_storage);
704 rcv_addr.gen=malloc(rcv_addr_len);
705 if(rcv_addr.gen==NULL){
706 dbgprintf(0,"Error: Can't Allocate Memory!\n");
711 if((rlen=recvfrom(rcv_socket, &rbuffer, 1000,0,rcv_addr.gen,&rcv_addr_len))<0){
712 dbgprintf(0, "Error on receive from ICMPv6 socket (%s)\n",strerror(errno));
715 if(rlen < sizeof(struct icmp6_hdr)){ //check packet size
716 dbgprintf(1, "Packet smaller than possible ICMPv6 packet!\n");
721 icmp6=(struct icmp6_hdr*)rbuffer;
722 if(icmp6->icmp6_type!=ICMP6_DST_UNREACH && icmp6->icmp6_type!=ICMP6_PACKET_TOO_BIG
723 && icmp6->icmp6_type!=ICMP6_TIME_EXCEEDED && icmp6->icmp6_type!=ICMP6_PARAM_PROB){ //check icmp types
724 dbgprintf(1, "Tossing ICMPv6 packet of type %i\n", icmp6->icmp6_type);
729 /*Check packet size again*/
730 if(rlen<sizeof(struct icmp6_hdr)+sizeof(struct ip6_hdr)+sizeof(struct dccp_hdr)+sizeof(struct dccp_hdr_ext)){
731 dbgprintf(1, "Tossing ICMPv6 packet that's too small to contain DCCP header!\n");
736 /*Decode IPv6 header*/
737 ip6hdr=(struct ip6_hdr*)(rbuffer+sizeof(struct icmp6_hdr));
738 if(memcmp(&parms.src_addr.ipv6->sin6_addr,&ip6hdr->ip6_src,sizeof(parms.src_addr.ipv6->sin6_addr))!=0){
739 dbgprintf(1,"Tossing ICMPv6 packet because the embedded IPv6 source address isn't us\n");
740 /*Source address doesn't match*/
744 if(memcmp(&parms.dest_addr.ipv6->sin6_addr,&ip6hdr->ip6_dst,sizeof(parms.dest_addr.ipv6->sin6_addr))!=0){
745 /*Destination address doesn't match*/
746 dbgprintf(1,"Tossing ICMPv6 packet because the embedded IPv6 destination address isn't our target\n");
750 if(ip6hdr->ip6_ctlun.ip6_un1.ip6_un1_nxt!=IPPROTO_DCCP){
752 dbgprintf(1,"Tossing ICMPv6 packet because the embedded packet isn't DCCP\n");
757 /*Decode DCCP header*/
758 dhdr=(struct dccp_hdr*)(rbuffer+sizeof(struct icmp6_hdr)+sizeof(struct ip6_hdr));
759 if(dhdr->dccph_dport!=htons(parms.dest_port)){
760 /*DCCP Destination Ports don't match*/
761 dbgprintf(1,"Tossing ICMPv6 packet because the embedded packet doesn't have our DCCP destination port\n");
765 if(dhdr->dccph_sport!=htons(parms.src_port)){
766 /*DCCP Source Ports don't match*/
767 dbgprintf(1,"Tossing ICMPv6 packet because the embedded packet doesn't have our DCCP source port\n");
771 dhdre=(struct dccp_hdr_ext*)(rbuffer+sizeof(struct icmp6_hdr)+sizeof(struct ip6_hdr)+sizeof(struct dccp_hdr));
774 if(icmp6->icmp6_type==ICMP6_DST_UNREACH){
775 type=DEST_UNREACHABLE;
777 if(icmp6->icmp6_type==ICMP6_PACKET_TOO_BIG){
780 if(icmp6->icmp6_type==ICMP6_TIME_EXCEEDED){
783 if(icmp6->icmp6_type==ICMP6_PARAM_PROB){
784 type=PARAMETER_PROBLEM;
786 logResponse(&rcv_addr,ntohl(dhdre->dccph_seq_low),type);
791 void buildRequestPacket(unsigned char* buffer, int *len, int seq){
792 struct dccp_hdr *dhdr;
793 struct dccp_hdr_ext *dhdre;
794 struct dccp_hdr_request *dhdrr;
795 struct iphdr* ip4hdr;
796 struct ip6_hdr* ip6hdr;
799 int dccp_hdr_len=sizeof(struct dccp_hdr)+sizeof(struct dccp_hdr_ext)+sizeof(struct dccp_hdr_request);
801 if(*len < dccp_hdr_len+sizeof(struct ip6_hdr)){
802 dbgprintf(0, "Error: Insufficient buffer space\n");
806 memset(buffer, 0, *len);
810 if(parms.ip_type==AF_INET){
811 ip_hdr_len=sizeof(struct iphdr);
812 ip4hdr=(struct iphdr*)buffer;
813 ip4hdr->check=htons(0);
814 memcpy(&ip4hdr->daddr, &parms.dest_addr.ipv4->sin_addr, sizeof(parms.dest_addr.ipv4->sin_addr));
815 ip4hdr->frag_off=htons(0);
816 ip4hdr->id=htons(1);//first
818 ip4hdr->protocol=IPPROTO_DCCP;
819 memcpy(&ip4hdr->saddr, &parms.src_addr.ipv4->sin_addr, sizeof(parms.src_addr.ipv4->sin_addr));
821 ip4hdr->tot_len=htons(ip_hdr_len+dccp_hdr_len);
822 ip4hdr->ttl=parms.ttl;
825 ip_hdr_len=sizeof(struct ip6_hdr);
826 ip6hdr=(struct ip6_hdr*)buffer;
827 memcpy(&ip6hdr->ip6_dst, &parms.dest_addr.ipv6->sin6_addr, sizeof(parms.dest_addr.ipv6->sin6_addr));
828 memcpy(&ip6hdr->ip6_src, &parms.src_addr.ipv6->sin6_addr, sizeof(parms.src_addr.ipv6->sin6_addr));
829 ip6hdr->ip6_ctlun.ip6_un1.ip6_un1_flow=htonl(6<<28); //version, traffic class, flow label
830 ip6hdr->ip6_ctlun.ip6_un1.ip6_un1_hlim=parms.ttl;
831 ip6hdr->ip6_ctlun.ip6_un1.ip6_un1_nxt=IPPROTO_DCCP;
832 ip6hdr->ip6_ctlun.ip6_un1.ip6_un1_plen=htons(dccp_hdr_len);
836 dhdr=(struct dccp_hdr*)(buffer+ip_hdr_len);
837 dhdre=(struct dccp_hdr_ext*)(buffer+ip_hdr_len+sizeof(struct dccp_hdr));
838 dhdrr=(struct dccp_hdr_request*)(buffer+ip_hdr_len+sizeof(struct dccp_hdr)+sizeof(struct dccp_hdr_ext));
840 dhdr->dccph_checksum=0;
842 dhdr->dccph_doff=dccp_hdr_len/4;
843 dhdr->dccph_dport=htons(parms.dest_port);
844 dhdr->dccph_reserved=0;
845 dhdr->dccph_sport=htons(parms.src_port);
847 dhdr->dccph_type=DCCP_PKT_REQUEST;
848 dhdr->dccph_seq2=htonl(0); //Reserved if using 48 bit sequence numbers
849 dhdr->dccph_seq=htonl(0); //High 16bits of sequence number. Always make 0 for simplicity.
850 dhdre->dccph_seq_low=htonl(seq);
851 dhdrr->dccph_req_service= htonl(0x50455246);
854 if(parms.ip_type==AF_INET){
855 dhdr->dccph_checksum=ipv4_pseudohdr_chksum((buffer+ip_hdr_len), dccp_hdr_len,
856 (unsigned char*) &parms.dest_addr.ipv4->sin_addr,
857 (unsigned char*)&parms.src_addr.ipv4->sin_addr, IPPROTO_DCCP);
858 ip4hdr->check=ipv4_chksum(buffer,ip_hdr_len);
860 dhdr->dccph_checksum=ipv6_pseudohdr_chksum((buffer+ip_hdr_len), dccp_hdr_len,
861 (unsigned char*) &parms.dest_addr.ipv6->sin6_addr,
862 (unsigned char*)&parms.src_addr.ipv6->sin6_addr, IPPROTO_DCCP);
864 *len=ip_hdr_len+dccp_hdr_len;
868 void updateRequestPacket(unsigned char* buffer, int *len, int seq){
869 struct dccp_hdr *dhdr;
870 struct dccp_hdr_ext *dhdre;
871 struct iphdr* ip4hdr;
874 int dccp_hdr_len=sizeof(struct dccp_hdr)+sizeof(struct dccp_hdr_ext)+sizeof(struct dccp_hdr_request);
878 if(parms.ip_type==AF_INET){
879 ip_hdr_len=sizeof(struct iphdr);
880 ip4hdr=(struct iphdr*)buffer;
881 ip4hdr->check=htons(0);
882 ip4hdr->id=htons(seq);
884 ip_hdr_len=sizeof(struct ip6_hdr);
888 dhdr=(struct dccp_hdr*)(buffer+ip_hdr_len);
889 dhdre=(struct dccp_hdr_ext*)(buffer+ip_hdr_len+sizeof(struct dccp_hdr));
890 dhdr->dccph_checksum=0;
891 dhdre->dccph_seq_low=htonl(seq);
894 if(parms.ip_type==AF_INET){
895 dhdr->dccph_checksum=ipv4_pseudohdr_chksum((buffer+ip_hdr_len), dccp_hdr_len,
896 (unsigned char*) &parms.dest_addr.ipv4->sin_addr,
897 (unsigned char*)&parms.src_addr.ipv4->sin_addr, IPPROTO_DCCP);
898 ip4hdr->check=ipv4_chksum(buffer,ip_hdr_len);
900 dhdr->dccph_checksum=ipv6_pseudohdr_chksum((buffer+ip_hdr_len), dccp_hdr_len,
901 (unsigned char*) &parms.dest_addr.ipv6->sin6_addr,
902 (unsigned char*)&parms.src_addr.ipv6->sin6_addr, IPPROTO_DCCP);
904 *len=ip_hdr_len+dccp_hdr_len;
908 void sendClose(int seq, u_int16_t ack_h, u_int32_t ack_l, int socket){
909 unsigned char buffer[1500];
910 struct dccp_hdr *dhdr;
911 struct dccp_hdr_ext *dhdre;
912 struct dccp_hdr_ack_bits *dhd_ack;
913 struct iphdr* ip4hdr;
914 struct ip6_hdr* ip6hdr;
919 int dccp_hdr_len=sizeof(struct dccp_hdr)+sizeof(struct dccp_hdr_ext)+sizeof(struct dccp_hdr_ack_bits);
921 memset(buffer, 0, 1500);
925 if(parms.ip_type==AF_INET){
926 ip_hdr_len=sizeof(struct iphdr);
927 ip4hdr=(struct iphdr*)buffer;
928 ip4hdr->check=htons(0);
929 memcpy(&ip4hdr->daddr, &parms.dest_addr.ipv4->sin_addr, sizeof(parms.dest_addr.ipv4->sin_addr));
930 ip4hdr->frag_off=htons(0);
931 ip4hdr->id=htons(1);//first
933 ip4hdr->protocol=IPPROTO_DCCP;
934 memcpy(&ip4hdr->saddr, &parms.src_addr.ipv4->sin_addr, sizeof(parms.src_addr.ipv4->sin_addr));
936 ip4hdr->tot_len=htons(ip_hdr_len+dccp_hdr_len);
937 ip4hdr->ttl=parms.ttl;
940 ip_hdr_len=sizeof(struct ip6_hdr);
941 ip6hdr=(struct ip6_hdr*)buffer;
942 memcpy(&ip6hdr->ip6_dst, &parms.dest_addr.ipv6->sin6_addr, sizeof(parms.dest_addr.ipv6->sin6_addr));
943 memcpy(&ip6hdr->ip6_src, &parms.src_addr.ipv6->sin6_addr, sizeof(parms.src_addr.ipv6->sin6_addr));
944 ip6hdr->ip6_ctlun.ip6_un1.ip6_un1_flow=htonl(6<<28); //version, traffic class, flow label
945 ip6hdr->ip6_ctlun.ip6_un1.ip6_un1_hlim=parms.ttl;
946 ip6hdr->ip6_ctlun.ip6_un1.ip6_un1_nxt=IPPROTO_DCCP;
947 ip6hdr->ip6_ctlun.ip6_un1.ip6_un1_plen=htons(dccp_hdr_len);
951 dhdr=(struct dccp_hdr*)(buffer+ip_hdr_len);
952 dhdre=(struct dccp_hdr_ext*)(buffer+ip_hdr_len+sizeof(struct dccp_hdr));
953 dhd_ack=(struct dccp_hdr_ack_bits*)(buffer+ip_hdr_len+sizeof(struct dccp_hdr)+sizeof(struct dccp_hdr_ext));
955 dhdr->dccph_checksum=0;
957 dhdr->dccph_doff=dccp_hdr_len/4;
958 dhdr->dccph_dport=htons(parms.dest_port);
959 dhdr->dccph_reserved=0;
960 dhdr->dccph_sport=htons(parms.src_port);
962 dhdr->dccph_type=DCCP_PKT_CLOSE;
963 dhdr->dccph_seq2=htonl(0); //Reserved if using 48 bit sequence numbers
964 dhdr->dccph_seq=htonl(0); //High 16bits of sequence number. Always make 0 for simplicity.
965 dhdre->dccph_seq_low=htonl(seq+1);
966 dhd_ack->dccph_ack_nr_high=ack_h;
967 dhd_ack->dccph_ack_nr_low=ack_l;
970 if(parms.ip_type==AF_INET){
971 dhdr->dccph_checksum=ipv4_pseudohdr_chksum((buffer+ip_hdr_len), dccp_hdr_len,
972 (unsigned char*) &parms.dest_addr.ipv4->sin_addr,
973 (unsigned char*)&parms.src_addr.ipv4->sin_addr, IPPROTO_DCCP);
974 ip4hdr->check=ipv4_chksum(buffer,ip_hdr_len);
976 dhdr->dccph_checksum=ipv6_pseudohdr_chksum((buffer+ip_hdr_len), dccp_hdr_len,
977 (unsigned char*) &parms.dest_addr.ipv6->sin6_addr,
978 (unsigned char*)&parms.src_addr.ipv6->sin6_addr, IPPROTO_DCCP);
980 len=ip_hdr_len+dccp_hdr_len;
983 if(parms.ip_type==AF_INET){
984 addrlen=sizeof(struct sockaddr_in);
986 addrlen=sizeof(struct sockaddr_in6);
988 if(sendto(socket, &buffer, len, MSG_DONTWAIT,(struct sockaddr*)parms.dest_addr.gen,addrlen)<0){
990 dbgprintf(0,"Error: sendto failed\n");
996 void sendReset(int seq, u_int16_t ack_h, u_int32_t ack_l, int socket){
997 unsigned char buffer[1500];
998 struct dccp_hdr *dhdr;
999 struct dccp_hdr_ext *dhdre;
1000 struct dccp_hdr_reset *dh_re;
1001 struct iphdr* ip4hdr;
1002 struct ip6_hdr* ip6hdr;
1007 int dccp_hdr_len=sizeof(struct dccp_hdr)+sizeof(struct dccp_hdr_ext)+sizeof(struct dccp_hdr_reset);
1009 memset(buffer, 0, 1500);
1013 if(parms.ip_type==AF_INET){
1014 ip_hdr_len=sizeof(struct iphdr);
1015 ip4hdr=(struct iphdr*)buffer;
1016 ip4hdr->check=htons(0);
1017 memcpy(&ip4hdr->daddr, &parms.dest_addr.ipv4->sin_addr, sizeof(parms.dest_addr.ipv4->sin_addr));
1018 ip4hdr->frag_off=htons(0);
1019 ip4hdr->id=htons(1);//first
1021 ip4hdr->protocol=IPPROTO_DCCP;
1022 memcpy(&ip4hdr->saddr, &parms.src_addr.ipv4->sin_addr, sizeof(parms.src_addr.ipv4->sin_addr));
1024 ip4hdr->tot_len=htons(ip_hdr_len+dccp_hdr_len);
1025 ip4hdr->ttl=parms.ttl;
1028 ip_hdr_len=sizeof(struct ip6_hdr);
1029 ip6hdr=(struct ip6_hdr*)buffer;
1030 memcpy(&ip6hdr->ip6_dst, &parms.dest_addr.ipv6->sin6_addr, sizeof(parms.dest_addr.ipv6->sin6_addr));
1031 memcpy(&ip6hdr->ip6_src, &parms.src_addr.ipv6->sin6_addr, sizeof(parms.src_addr.ipv6->sin6_addr));
1032 ip6hdr->ip6_ctlun.ip6_un1.ip6_un1_flow=htonl(6<<28); //version, traffic class, flow label
1033 ip6hdr->ip6_ctlun.ip6_un1.ip6_un1_hlim=parms.ttl;
1034 ip6hdr->ip6_ctlun.ip6_un1.ip6_un1_nxt=IPPROTO_DCCP;
1035 ip6hdr->ip6_ctlun.ip6_un1.ip6_un1_plen=htons(dccp_hdr_len);
1039 dhdr=(struct dccp_hdr*)(buffer+ip_hdr_len);
1040 dhdre=(struct dccp_hdr_ext*)(buffer+ip_hdr_len+sizeof(struct dccp_hdr));
1041 dh_re=(struct dccp_hdr_reset*)(buffer+ip_hdr_len+sizeof(struct dccp_hdr)+sizeof(struct dccp_hdr_ext));
1042 dhdr->dccph_ccval=0;
1043 dhdr->dccph_checksum=0;
1044 dhdr->dccph_cscov=0;
1045 dhdr->dccph_doff=dccp_hdr_len/4;
1046 dhdr->dccph_dport=htons(parms.dest_port);
1047 dhdr->dccph_reserved=0;
1048 dhdr->dccph_sport=htons(parms.src_port);
1050 dhdr->dccph_type=DCCP_PKT_RESET;
1051 dhdr->dccph_seq2=htonl(0); //Reserved if using 48 bit sequence numbers
1052 dhdr->dccph_seq=htonl(0); //High 16bits of sequence number. Always make 0 for simplicity.
1053 dhdre->dccph_seq_low=htonl(seq+1);
1054 dh_re->dccph_reset_ack.dccph_ack_nr_high=ack_h;
1055 dh_re->dccph_reset_ack.dccph_ack_nr_low=ack_l;
1056 dh_re->dccph_reset_code=DCCP_RESET_CODE_CLOSED;
1057 dh_re->dccph_reset_data[0]=0;
1058 dh_re->dccph_reset_data[1]=0;
1059 dh_re->dccph_reset_data[2]=0;
1062 if(parms.ip_type==AF_INET){
1063 dhdr->dccph_checksum=ipv4_pseudohdr_chksum((buffer+ip_hdr_len), dccp_hdr_len,
1064 (unsigned char*) &parms.dest_addr.ipv4->sin_addr,
1065 (unsigned char*)&parms.src_addr.ipv4->sin_addr, IPPROTO_DCCP);
1066 ip4hdr->check=ipv4_chksum(buffer,ip_hdr_len);
1068 dhdr->dccph_checksum=ipv6_pseudohdr_chksum((buffer+ip_hdr_len), dccp_hdr_len,
1069 (unsigned char*) &parms.dest_addr.ipv6->sin6_addr,
1070 (unsigned char*)&parms.src_addr.ipv6->sin6_addr, IPPROTO_DCCP);
1072 len=ip_hdr_len+dccp_hdr_len;
1075 if(parms.ip_type==AF_INET){
1076 addrlen=sizeof(struct sockaddr_in);
1078 addrlen=sizeof(struct sockaddr_in6);
1080 if(sendto(socket, &buffer, len, MSG_DONTWAIT,(struct sockaddr*)parms.dest_addr.gen,addrlen)<0){
1082 dbgprintf(0,"Error: sendto failed\n");
1088 int logPacket(int req_seq, int packet_seq){
1089 struct request *tmp;
1091 /*Add new request to queue*/
1092 tmp=malloc(sizeof(struct request));
1094 dbgprintf(0,"Error: Can't allocate Memory!\n");
1101 tmp->packet_seq=packet_seq;
1102 tmp->request_seq=req_seq;
1103 tmp->reply_type=UNKNOWN;
1104 gettimeofday(&tmp->sent,NULL);
1106 if(queue.head==NULL){
1107 queue.head=queue.tail=tmp;
1109 queue.head->prev=tmp;
1110 tmp->next=queue.head;
1114 /*Update Statistics*/
1115 if(ping_stats.requests_sent==0){
1116 gettimeofday(&ping_stats.start,NULL);
1118 ping_stats.requests_sent++;
1122 int logResponse(ipaddr_ptr_t *src, int seq, int type){
1123 struct request *cur;
1127 if(queue.tail==NULL){
1128 dbgprintf(1,"Response received but no requests sent!\n");
1135 if(cur->packet_seq==seq){
1136 gettimeofday(&cur->reply,NULL);
1137 if(cur->num_replies>0){
1138 printf("Duplicate packet detected! (%i)\n",cur->request_seq);
1140 if(type<DEST_UNREACHABLE && type!=UNKNOWN){
1145 cur->reply_type=type;
1152 dbgprintf(1,"Response received but no requests sent with sequence number %i!\n", seq);
1156 diff=(cur->reply.tv_usec + 1000000*cur->reply.tv_sec) - (cur->sent.tv_usec + 1000000*cur->sent.tv_sec);
1160 if(type<DEST_UNREACHABLE && type!=UNKNOWN){
1161 if(parms.ip_type==AF_INET){
1162 printf( "Response from %s : seq=%i time=%.1fms status=%s\n",
1163 inet_ntop(parms.ip_type, (void*)&src->ipv4->sin_addr, pbuf, 1000),
1164 cur->request_seq, diff,response_label[type]);
1166 printf("Response from %s : seq=%i time=%.1fms status=%s\n",
1167 inet_ntop(parms.ip_type, (void*)&src->ipv6->sin6_addr, pbuf, 1000),
1168 cur->request_seq, diff,response_label[type]);
1171 if(parms.ip_type==AF_INET){
1172 printf("%s from %s : seq=%i\n",response_label[type],
1173 inet_ntop(parms.ip_type, (void*)&src->ipv4->sin_addr, pbuf, 1000),
1176 printf("%s from %s : seq=%i\n",response_label[type],
1177 inet_ntop(parms.ip_type, (void*)&src->ipv6->sin6_addr, pbuf, 1000),
1182 /*Update statistics*/
1183 if(type<DEST_UNREACHABLE && type!=UNKNOWN){
1185 if(cur->num_replies==1){
1186 ping_stats.rtt_avg=((ping_stats.replies_received*ping_stats.rtt_avg)+(diff))/(ping_stats.replies_received+1);
1187 ping_stats.replies_received++;
1189 ping_stats.errors++;
1191 if(diff < ping_stats.rtt_min || ping_stats.rtt_min==0){
1192 ping_stats.rtt_min=diff;
1194 if(diff > ping_stats.rtt_max){
1195 ping_stats.rtt_max=diff;
1199 ping_stats.errors++;
1201 gettimeofday(&ping_stats.stop,NULL);
1206 struct request *cur;
1207 struct request *tmp;
1226 if(parms.ip_type==AF_INET){
1227 printf("-----------%s PING STATISTICS-----------\n",
1228 inet_ntop(parms.ip_type, (void*)&parms.dest_addr.ipv4->sin_addr, pbuf, 1000));
1229 }else if(parms.ip_type==AF_INET6){
1230 printf("-----------%s PING STATISTICS-----------\n",
1231 inet_ntop(parms.ip_type, (void*)&parms.dest_addr.ipv6->sin6_addr, pbuf, 1000));
1233 diff=(ping_stats.stop.tv_usec + 1000000*ping_stats.stop.tv_sec) -
1234 (ping_stats.start.tv_usec + 1000000*ping_stats.start.tv_sec);
1236 ploss=(1.0*(ping_stats.requests_sent-ping_stats.replies_received)/ping_stats.requests_sent*1.0)*100;
1237 printf("%i packets transmitted, %i received, %i errors, %.2f%% loss, time %ims\n",
1238 ping_stats.requests_sent,ping_stats.replies_received,ping_stats.errors,
1240 printf("rtt min/avg/max = %.1f/%.1f/%.1f ms\n",
1241 ping_stats.rtt_min,ping_stats.rtt_avg,ping_stats.rtt_max);
1248 /*Usage information for program*/
1251 dbgprintf(0, "dccpping: [-d] [-6|-4] [-c count] [-p port] [-i interval] [-t ttl] [-S srcaddress] remote_host\n");
1255 /*Program will probably be run setuid, so be extra careful*/
1256 void sanitize_environment()
1258 #if defined(_SVID_SOURCE) || defined(_XOPEN_SOURCE)
1261 extern char **environ;
1267 void dbgprintf(int level, const char *fmt, ...)
1271 va_start(args, fmt);
1272 vfprintf(stderr, fmt, args);