1 /******************************************************************************
2 Author: Samuel Jero <sj323707@ohio.edu>
6 Description: Program to ping hosts using DCCP REQ packets to test for DCCP connectivity.
7 ******************************************************************************/
16 #include <sys/types.h>
18 #include <sys/socket.h>
19 #include <sys/select.h>
20 #include <netinet/ip.h>
21 #include <netinet/ip6.h>
22 #include <netinet/in.h>
23 #include <netinet/ip_icmp.h>
24 #include <netinet/icmp6.h>
25 #include <arpa/inet.h>
29 #include <linux/dccp.h>
30 #include "checksums.h"
33 #define MAX(x,y) (x>y ? x : y)
34 /*Structure for simpler IPv4/IPv6 Address handling*/
37 struct sockaddr_in *ipv4;
38 struct sockaddr_in6 *ipv6;
51 char* response_label[]= {
53 "Closed Port (Reset)",
54 "Open Port (Response)",
56 "Destination Unreachable",
59 "DCCP Not Supported (Parameter Problem)"
69 enum responses reply_type;
91 int debug=0; /*set to 1 to turn on debugging information*/
92 int count=-1; /*Default number of pings (-1 is infinity)*/
93 int dest_port=33434; /*Default port*/
94 int ttl=64; /*Default TTL*/
95 long interval=1000; /*Default delay between pings in ms*/
96 int ip_type=AF_UNSPEC; /*IPv4 or IPv6*/
97 ipaddr_ptr_t dest_addr; /*Destination Address*/
98 ipaddr_ptr_t src_addr; /*Source Address*/
99 struct request_queue queue;
100 struct stats ping_stats;
104 void getAddresses(char *src, char* dst);
106 void handleDCCPpacket(int rcv_socket, int send_socket);
107 void handleICMP4packet(int rcv_socket);
108 void handleICMP6packet(int rcv_socket);
109 void buildRequestPacket(unsigned char* buffer, int *len, int seq);
110 void updateRequestPacket(unsigned char* buffer, int *len, int seq);
111 int logPacket(int seq);
112 int logResponse(ipaddr_ptr_t *src, int seq, int type);
116 void sanitize_environment();
117 void dbgprintf(int level, const char *fmt, ...);
120 /*Parse commandline options*/
121 int main(int argc, char *argv[])
128 ping_stats.replies_received=0;
129 ping_stats.requests_sent=0;
130 ping_stats.rtt_avg=0;
131 ping_stats.rtt_max=0;
132 ping_stats.rtt_min=0;
135 sanitize_environment();
137 while ((c = getopt(argc, argv, "64c:p:i:dt:S:")) != -1) {
146 count = atoi(optarg);
148 dbgprintf(0, "Error: count must be positive");
153 dest_port = atoi(optarg);
156 interval = (long)(atof(optarg) * 1000.0);
158 fprintf(stderr, "Invalid interval\n");
167 if (ttl < 1 || ttl > 255) {
168 fprintf(stderr, "Invalid TTL\n");
188 getAddresses(src, dst);
189 if(src_addr.gen==NULL || dest_addr.gen==NULL){
190 dbgprintf(0,"Error: Can't determine source or destination address\n");
194 signal(SIGINT, sigHandler);
203 void getAddresses(char *src, char* dst){
204 struct addrinfo hint;
205 struct addrinfo *dtmp, *stmp;
206 struct ifaddrs *temp, *cur;
207 struct sockaddr_in6* iv6;
211 /*Lookup destination Address*/
212 memset(&hint,0,sizeof(struct addrinfo));
213 hint.ai_family=ip_type;
214 hint.ai_flags=AI_V4MAPPED | AI_ADDRCONFIG;
216 if((err=getaddrinfo(dst,NULL,&hint,&dtmp))!=0){
217 dbgprintf(0,"Error: Couldn't lookup destination %s (%s)\n", dst, gai_strerror(err));
221 dbgprintf(0,"Error: Unknown Host %s\n", dst);
224 addrlen=dtmp->ai_addrlen;
225 hint.ai_family=ip_type=dtmp->ai_family;
226 dest_addr.gen=malloc(dtmp->ai_addrlen);
227 if(dest_addr.gen==NULL){
228 dbgprintf(0,"Error: Can't allocate Memory\n");
231 memcpy(dest_addr.gen,dtmp->ai_addr,dtmp->ai_addrlen);
235 /*Get a meaningful source address*/
237 /*Use Commandline arg*/
238 if((err=getaddrinfo(src,NULL,&hint,&stmp))!=0){
239 dbgprintf(0,"Error: Source Address %s is invalid (%s)\n", src, gai_strerror(err));
243 dbgprintf(0,"Error: Unknown Host %s\n", dst);
246 addrlen=stmp->ai_addrlen;
247 src_addr.gen=malloc(stmp->ai_addrlen);
248 if(src_addr.gen==NULL){
249 dbgprintf(0,"Error: Can't allocate Memory\n");
252 memcpy(src_addr.gen,stmp->ai_addr,stmp->ai_addrlen);
256 /*Guess a good source address*/
260 if(cur->ifa_addr==NULL || cur->ifa_addr->sa_family!=ip_type){ /*Not matching ipv4/ipv6 of dest*/
264 if(cur->ifa_flags & IFF_LOOPBACK){ /*Don't use loopback addresses*/
268 if(cur->ifa_addr!=NULL && cur->ifa_addr->sa_family==AF_INET6){
269 iv6=(struct sockaddr_in6*)cur->ifa_addr;
271 if(iv6->sin6_scope_id!=0){ /*Not globally valid address, if ipv6*/
277 src_addr.gen=malloc(sizeof(struct sockaddr_storage));
278 if(src_addr.gen==NULL){
279 dbgprintf(0,"Error: Can't allocate Memory\n");
282 src_addr.gen->sa_family=ip_type;
283 memcpy(src_addr.gen,cur->ifa_addr,addrlen);
292 /*Preform the ping functionality*/
298 unsigned char sbuffer[slen];
300 struct timeval timeout;
301 struct timeval t,delay, add;
306 rs=socket(ip_type, SOCK_RAW ,IPPROTO_RAW);
308 dbgprintf(0, "Error opening raw socket\n");
311 ds=socket(ip_type, SOCK_RAW ,IPPROTO_DCCP);
313 dbgprintf(0, "Error opening raw DCCP socket\n");
316 is4=socket(ip_type,SOCK_RAW,IPPROTO_ICMP);
318 dbgprintf(0,"Error opening raw ICMPv4 socket\n");
321 is6=socket(ip_type,SOCK_RAW,IPPROTO_ICMPV6);
323 dbgprintf(0,"Error opening raw ICMPv6 socket\n");
328 /*Build DCCP packet*/
329 buildRequestPacket(sbuffer,&slen,seq);
330 if(ip_type==AF_INET){
331 addrlen=sizeof(struct sockaddr_in);
333 addrlen=sizeof(struct sockaddr_in6);
337 if(ip_type==AF_INET){
338 dbgprintf(0, "PINGING %s on DCCP port %i\n",
339 inet_ntop(ip_type, (void*)&dest_addr.ipv4->sin_addr, pbuf, 1000),dest_port);
341 dbgprintf(0, "PINGING %s on DCCP port %i\n",
342 inet_ntop(ip_type, (void*)&dest_addr.ipv6->sin6_addr, pbuf, 1000),dest_port);
347 if(sendto(rs, &sbuffer, slen, MSG_DONTWAIT,(struct sockaddr*)dest_addr.gen,addrlen)<0){
349 dbgprintf(0,"Error: sendto failed\n");
352 if(count==0){done=1; break;}
354 if (logPacket(seq)<0){
355 dbgprintf(0,"Error: Couldn't record request!\n");
357 if(ip_type==AF_INET){
358 dbgprintf(1, "Sending DCCP Request to %s\n",inet_ntop(ip_type, (void*)&dest_addr.ipv4->sin_addr, pbuf, 1000));
360 dbgprintf(1, "Sending DCCP Request to %s\n",inet_ntop(ip_type, (void*)&dest_addr.ipv6->sin6_addr, pbuf, 1000));
363 /*Use select to wait on packets or until interval has passed*/
364 add.tv_sec=interval/1000;
365 add.tv_usec=(interval%1000)*1000;
366 gettimeofday(&t,NULL);
367 timeradd(&t,&add,&delay);
368 while(timercmp(&t,&delay,<)){
369 /*Prepare for select*/
374 timersub(&delay,&t,&timeout);
377 if(select(MAX(ds+1,MAX(is4+1,is6+1)),&sel, NULL,NULL,&timeout)<0){
379 dbgprintf(0,"Select() error (%s)\n",strerror(errno));
382 if(count==0){done=1;break;}
384 if(FD_ISSET(ds,&sel)){
385 /*Data on the DCCP socket*/
386 handleDCCPpacket(ds,rs);
389 if(FD_ISSET(is4,&sel) && ip_type==AF_INET){
390 /*Data on the ICMPv4 socket*/
391 handleICMP4packet(is4);
393 if(FD_ISSET(is6,&sel) && ip_type==AF_INET6){
394 /*Data on the ICMPv6 socket*/
395 handleICMP6packet(is6);
397 gettimeofday(&t,NULL);
405 updateRequestPacket(sbuffer,&slen, seq);
414 void handleDCCPpacket(int rcv_socket, int send_socket){
416 unsigned char rbuffer[rlen];
417 ipaddr_ptr_t rcv_addr;
418 socklen_t rcv_addr_len;
419 struct dccp_hdr *dhdr;
420 struct dccp_hdr_reset *dhdr_re;
421 struct dccp_hdr_response *dhdr_rp;
422 struct dccp_hdr_ack_bits *dhdr_sync;
426 /*Memory for socket address*/
427 rcv_addr_len=sizeof(struct sockaddr_storage);
428 rcv_addr.gen=malloc(rcv_addr_len);
429 if(rcv_addr.gen==NULL){
430 dbgprintf(0,"Error: Can't Allocate Memory!\n");
435 rcv_addr_len=sizeof(struct sockaddr_storage);
436 if((rlen=recvfrom(rcv_socket, &rbuffer, 1000,0,rcv_addr.gen,&rcv_addr_len))<0){
438 dbgprintf(0, "Error on receive from DCCP socket (%s)\n",strerror(errno));
445 if(rcv_addr.gen->sa_family!=ip_type){ //confirm IP type
446 dbgprintf(1, "DCCP packet on %s. Tossing.\n", (ip_type==AF_INET) ? "IPv4" : "IPv6");
451 if(rcv_addr.gen->sa_family==AF_INET){
453 if(memcmp(&rcv_addr.ipv4->sin_addr,&dest_addr.ipv4->sin_addr,
454 sizeof(dest_addr.ipv4->sin_addr))!=0){ //not from destination
455 dbgprintf(1,"DCCP packet from 3rd host\n");
459 if(rlen < sizeof(struct dccp_hdr)+sizeof(struct iphdr)){ //check packet size
461 dbgprintf(1, "Packet smaller than possible DCCP packet received on DCCP socket\n");
465 iph=(struct iphdr*)rbuffer;
466 ptr=rbuffer+iph->ihl*4;
469 if(memcmp(&rcv_addr.ipv6->sin6_addr, &dest_addr.ipv6->sin6_addr,
470 sizeof(dest_addr.ipv6->sin6_addr))!=0){ //not from destination
471 dbgprintf(1,"DCCP packet from 3rd host\n");
475 if(rlen < sizeof(struct dccp_hdr)){ //check packet size
477 dbgprintf(1, "Packet smaller than possible DCCP packet received on DCCP socket\n");
485 dhdr=(struct dccp_hdr*)ptr;
486 if(dhdr->dccph_sport!=htons(dest_port)){
487 dbgprintf(1,"DCCP packet with wrong Source Port (%i)\n", ntohs(dhdr->dccph_sport));
491 if(dhdr->dccph_dport!=htons(dest_port)){
492 dbgprintf(1,"DCCP packet with wrong Destination Port\n");
498 if(dhdr->dccph_type==DCCP_PKT_RESET){
499 if(rlen < (ptr-rbuffer)+sizeof(struct dccp_hdr)+sizeof(struct dccp_hdr_ext)+sizeof(struct dccp_hdr_reset)){
500 dbgprintf(1, "Error: Reset packet too small!");
503 dhdr_re=(struct dccp_hdr_reset*)(ptr+sizeof(struct dccp_hdr)+sizeof(struct dccp_hdr_ext));
504 logResponse(&rcv_addr, ntohl(dhdr_re->dccph_reset_ack.dccph_ack_nr_low), RESET);
505 /*Nothing else to do*/
507 if(dhdr->dccph_type==DCCP_PKT_RESPONSE){
508 if(rlen < (ptr-rbuffer)+sizeof(struct dccp_hdr)+sizeof(struct dccp_hdr_ext)+sizeof(struct dccp_hdr_response)){
509 dbgprintf(1, "Error: Response packet too small!");
512 dhdr_rp=(struct dccp_hdr_response*)(ptr+sizeof(struct dccp_hdr)+sizeof(struct dccp_hdr_ext));
513 logResponse(&rcv_addr,ntohl(dhdr_rp->dccph_resp_ack.dccph_ack_nr_low),RESPONSE);
514 /*TODO:Send Close back*/
516 if(dhdr->dccph_type==DCCP_PKT_SYNC || dhdr->dccph_type==DCCP_PKT_SYNCACK){
517 if(rlen < (ptr-rbuffer)+sizeof(struct dccp_hdr)+sizeof(struct dccp_hdr_ext)+sizeof(struct dccp_hdr_ack_bits)){
518 dbgprintf(1, "Error: Response packet too small!");
521 dhdr_sync=(struct dccp_hdr_ack_bits*)(ptr+sizeof(struct dccp_hdr)+sizeof(struct dccp_hdr_ext));
522 logResponse(&rcv_addr,ntohl(dhdr_sync->dccph_ack_nr_low),SYNC);
529 void handleICMP4packet(int rcv_socket){
531 unsigned char rbuffer[rlen];
532 ipaddr_ptr_t rcv_addr;
533 socklen_t rcv_addr_len;
534 struct icmphdr *icmp4;
535 struct dccp_hdr *dhdr;
536 struct dccp_hdr_ext *dhdre;
537 struct iphdr* ip4hdr;
540 /*Memory for socket address*/
541 rcv_addr_len=sizeof(struct sockaddr_storage);
542 rcv_addr.gen=malloc(rcv_addr_len);
543 if(rcv_addr.gen==NULL){
544 dbgprintf(0,"Error: Can't Allocate Memory!\n");
549 if((rlen=recvfrom(rcv_socket, &rbuffer, 1000,0,rcv_addr.gen,&rcv_addr_len))<0){
551 dbgprintf(0, "Error on receive from ICMPv4 socket (%s)\n",strerror(errno));
558 if(rlen < sizeof(struct icmphdr)){ //check packet size
559 dbgprintf(1, "Packet smaller than possible ICMPv4 packet!\n");
564 icmp4=(struct icmphdr*)rbuffer;
565 if(icmp4->type!=ICMP_DEST_UNREACH && icmp4->type!=ICMP_TIME_EXCEEDED){ //check icmp types
566 dbgprintf(1, "Tossing ICMPv4 packet of type %i\n", icmp4->type);
571 /*Check packet size again*/
572 if(rlen<sizeof(struct icmphdr)+sizeof(struct iphdr)+sizeof(struct dccp_hdr)+sizeof(struct dccp_hdr_ext)){
573 dbgprintf(1, "Tossing ICMPv4 packet that's too small to contain DCCP header!\n");
578 /*Decode IPv4 header*/
579 ip4hdr=(struct iphdr*)(rbuffer+sizeof(struct icmphdr));
580 if(memcmp(&src_addr.ipv4->sin_addr,&ip4hdr->saddr,sizeof(src_addr.ipv4->sin_addr))!=0){
581 /*Source address doesn't match*/
585 if(memcmp(&dest_addr.ipv4->sin_addr,&ip4hdr->daddr,sizeof(dest_addr.ipv4->sin_addr))!=0){
586 /*Destination address doesn't match*/
590 if(ip4hdr->protocol!=IPPROTO_DCCP){
596 /*Decode DCCP header*/
597 dhdr=(struct dccp_hdr*)(rbuffer+sizeof(struct icmphdr)+ip4hdr->ihl*4);
598 if(dhdr->dccph_dport!=htons(dest_port)){
599 /*DCCP Destination Ports don't match*/
603 if(dhdr->dccph_sport!=htons(dest_port)){
604 /*DCCP Source Ports don't match*/
608 dhdre=(struct dccp_hdr_ext*)(rbuffer+sizeof(struct icmphdr)+ip4hdr->ihl*4+sizeof(struct dccp_hdr));
611 if(icmp4->type==ICMP_DEST_UNREACH){
612 type=DEST_UNREACHABLE;
614 if(icmp4->type==ICMP_TIME_EXCEEDED){
617 logResponse(&rcv_addr,ntohl(dhdre->dccph_seq_low),type);
622 void handleICMP6packet(int rcv_socket){
624 unsigned char rbuffer[rlen];
625 ipaddr_ptr_t rcv_addr;
626 socklen_t rcv_addr_len;
627 struct icmp6_hdr *icmp6;
628 struct ip6_hdr* ip6hdr;
629 struct dccp_hdr *dhdr;
630 struct dccp_hdr_ext *dhdre;
633 /*Memory for socket address*/
634 rcv_addr_len=sizeof(struct sockaddr_storage);
635 rcv_addr.gen=malloc(rcv_addr_len);
636 if(rcv_addr.gen==NULL){
637 dbgprintf(0,"Error: Can't Allocate Memory!\n");
642 if((rlen=recvfrom(rcv_socket, &rbuffer, 1000,0,rcv_addr.gen,&rcv_addr_len))<0){
643 dbgprintf(0, "Error on receive from ICMPv6 socket (%s)\n",strerror(errno));
646 if(rlen < sizeof(struct icmp6_hdr)){ //check packet size
647 dbgprintf(1, "Packet smaller than possible ICMPv6 packet!\n");
652 icmp6=(struct icmp6_hdr*)rbuffer;
653 if(icmp6->icmp6_type!=ICMP6_DST_UNREACH && icmp6->icmp6_type!=ICMP6_PACKET_TOO_BIG
654 && icmp6->icmp6_type!=ICMP6_TIME_EXCEEDED && icmp6->icmp6_type!=ICMP6_PARAM_PROB){ //check icmp types
655 dbgprintf(1, "Tossing ICMPv6 packet of type %i\n", icmp6->icmp6_type);
660 /*Check packet size again*/
661 if(rlen<sizeof(struct icmp6_hdr)+sizeof(struct ip6_hdr)+sizeof(struct dccp_hdr)+sizeof(struct dccp_hdr_ext)){
662 dbgprintf(1, "Tossing ICMPv6 packet that's too small to contain DCCP header!\n");
667 /*Decode IPv6 header*/
668 ip6hdr=(struct ip6_hdr*)(rbuffer+sizeof(struct icmp6_hdr));
669 if(memcmp(&src_addr.ipv6->sin6_addr,&ip6hdr->ip6_src,sizeof(src_addr.ipv6->sin6_addr))!=0){
670 /*Source address doesn't match*/
674 if(memcmp(&dest_addr.ipv6->sin6_addr,&ip6hdr->ip6_dst,sizeof(dest_addr.ipv6->sin6_addr))!=0){
675 /*Destination address doesn't match*/
679 if(ip6hdr->ip6_ctlun.ip6_un1.ip6_un1_nxt!=IPPROTO_DCCP){
685 /*Decode DCCP header*/
686 dhdr=(struct dccp_hdr*)(rbuffer+sizeof(struct icmp6_hdr)+sizeof(struct ip6_hdr));
687 if(dhdr->dccph_dport!=htons(dest_port)){
688 /*DCCP Destination Ports don't match*/
692 if(dhdr->dccph_sport!=htons(dest_port)){
693 /*DCCP Source Ports don't match*/
697 dhdre=(struct dccp_hdr_ext*)(rbuffer+sizeof(struct icmp6_hdr)+sizeof(struct ip6_hdr)+sizeof(struct dccp_hdr));
702 if(icmp6->icmp6_type==ICMP6_DST_UNREACH){
703 type=DEST_UNREACHABLE;
705 if(icmp6->icmp6_type==ICMP6_PACKET_TOO_BIG){
708 if(icmp6->icmp6_type==ICMP6_TIME_EXCEEDED){
711 if(icmp6->icmp6_type==ICMP6_PARAM_PROB){
712 type=PARAMETER_PROBLEM;
714 logResponse(&rcv_addr,ntohl(dhdre->dccph_seq_low),type);
719 void buildRequestPacket(unsigned char* buffer, int *len, int seq){
720 struct dccp_hdr *dhdr;
721 struct dccp_hdr_ext *dhdre;
722 struct dccp_hdr_request *dhdrr;
723 struct iphdr* ip4hdr;
724 struct ip6_hdr* ip6hdr;
727 int dccp_hdr_len=sizeof(struct dccp_hdr)+sizeof(struct dccp_hdr_ext)+sizeof(struct dccp_hdr_request);
729 if(*len < dccp_hdr_len+sizeof(struct ip6_hdr)){
730 dbgprintf(0, "Error: Insufficient buffer space\n");
734 memset(buffer, 0, *len);
738 if(ip_type==AF_INET){
739 ip_hdr_len=sizeof(struct iphdr);
740 ip4hdr=(struct iphdr*)buffer;
741 ip4hdr->check=htons(0);
742 memcpy(&ip4hdr->daddr, &dest_addr.ipv4->sin_addr, sizeof(dest_addr.ipv4->sin_addr));
743 ip4hdr->frag_off=htons(0);
744 ip4hdr->id=htons(1);//first
746 ip4hdr->protocol=IPPROTO_DCCP;
747 memcpy(&ip4hdr->saddr, &src_addr.ipv4->sin_addr, sizeof(src_addr.ipv4->sin_addr));
749 ip4hdr->tot_len=htons(ip_hdr_len+dccp_hdr_len);
753 ip_hdr_len=sizeof(struct ip6_hdr);
754 ip6hdr=(struct ip6_hdr*)buffer;
755 memcpy(&ip6hdr->ip6_dst, &dest_addr.ipv6->sin6_addr, sizeof(dest_addr.ipv6->sin6_addr));
756 memcpy(&ip6hdr->ip6_src, &src_addr.ipv6->sin6_addr, sizeof(src_addr.ipv6->sin6_addr));
757 ip6hdr->ip6_ctlun.ip6_un1.ip6_un1_flow=htonl(6<<28); //version, traffic class, flow label
758 ip6hdr->ip6_ctlun.ip6_un1.ip6_un1_hlim=ttl;
759 ip6hdr->ip6_ctlun.ip6_un1.ip6_un1_nxt=IPPROTO_DCCP;
760 ip6hdr->ip6_ctlun.ip6_un1.ip6_un1_plen=htons(dccp_hdr_len);
764 dhdr=(struct dccp_hdr*)(buffer+ip_hdr_len);
765 dhdre=(struct dccp_hdr_ext*)(buffer+ip_hdr_len+sizeof(struct dccp_hdr));
766 dhdrr=(struct dccp_hdr_request*)(buffer+ip_hdr_len+sizeof(struct dccp_hdr)+sizeof(struct dccp_hdr_ext));
768 dhdr->dccph_checksum=0;
770 dhdr->dccph_doff=dccp_hdr_len/4;
771 dhdr->dccph_dport=htons(dest_port);
772 dhdr->dccph_reserved=0;
773 dhdr->dccph_sport=htons(dest_port);
775 dhdr->dccph_type=DCCP_PKT_REQUEST;
776 dhdr->dccph_seq2=htonl(0); //Reserved if using 48 bit sequence numbers
777 dhdr->dccph_seq=htonl(0); //High 16bits of sequence number. Always make 0 for simplicity.
778 dhdre->dccph_seq_low=htonl(seq);
779 dhdrr->dccph_req_service= htonl(0x50455246);
782 if(ip_type==AF_INET){
783 dhdr->dccph_checksum=ipv4_pseudohdr_chksum((buffer+ip_hdr_len), dccp_hdr_len,
784 (unsigned char*) &dest_addr.ipv4->sin_addr,
785 (unsigned char*)&src_addr.ipv4->sin_addr, IPPROTO_DCCP);
786 ip4hdr->check=ipv4_chksum(buffer,ip_hdr_len);
788 dhdr->dccph_checksum=ipv6_pseudohdr_chksum((buffer+ip_hdr_len), dccp_hdr_len,
789 (unsigned char*) &dest_addr.ipv6->sin6_addr,
790 (unsigned char*)&src_addr.ipv6->sin6_addr, IPPROTO_DCCP);
792 *len=ip_hdr_len+dccp_hdr_len;
796 void updateRequestPacket(unsigned char* buffer, int *len, int seq){
797 struct dccp_hdr *dhdr;
798 struct dccp_hdr_ext *dhdre;
799 struct iphdr* ip4hdr;
802 int dccp_hdr_len=sizeof(struct dccp_hdr)+sizeof(struct dccp_hdr_ext)+sizeof(struct dccp_hdr_request);
806 if(ip_type==AF_INET){
807 ip_hdr_len=sizeof(struct iphdr);
808 ip4hdr=(struct iphdr*)buffer;
809 ip4hdr->check=htons(0);
810 ip4hdr->id=htons(seq);
812 ip_hdr_len=sizeof(struct ip6_hdr);
816 dhdr=(struct dccp_hdr*)(buffer+ip_hdr_len);
817 dhdre=(struct dccp_hdr_ext*)(buffer+ip_hdr_len+sizeof(struct dccp_hdr));
818 dhdr->dccph_checksum=0;
819 dhdre->dccph_seq_low=htonl(seq);
822 if(ip_type==AF_INET){
823 dhdr->dccph_checksum=ipv4_pseudohdr_chksum((buffer+ip_hdr_len), dccp_hdr_len,
824 (unsigned char*) &dest_addr.ipv4->sin_addr,
825 (unsigned char*)&src_addr.ipv4->sin_addr, IPPROTO_DCCP);
826 ip4hdr->check=ipv4_chksum(buffer,ip_hdr_len);
828 dhdr->dccph_checksum=ipv6_pseudohdr_chksum((buffer+ip_hdr_len), dccp_hdr_len,
829 (unsigned char*) &dest_addr.ipv6->sin6_addr,
830 (unsigned char*)&src_addr.ipv6->sin6_addr, IPPROTO_DCCP);
832 *len=ip_hdr_len+dccp_hdr_len;
836 int logPacket(int seq){
839 /*Add new request to queue*/
840 tmp=malloc(sizeof(struct request));
842 dbgprintf(0,"Error: Can't allocate Memory!\n");
850 tmp->reply_type=UNKNOWN;
851 gettimeofday(&tmp->sent,NULL);
853 if(queue.head==NULL){
854 queue.head=queue.tail=tmp;
856 queue.head->prev=tmp;
857 tmp->next=queue.head;
861 /*Update Statistics*/
862 if(ping_stats.requests_sent==0){
863 gettimeofday(&ping_stats.start,NULL);
865 ping_stats.requests_sent++;
869 int logResponse(ipaddr_ptr_t *src, int seq, int type){
874 if(queue.tail==NULL){
875 dbgprintf(1,"Response received but no requests sent!\n");
883 gettimeofday(&cur->reply,NULL);
884 if(cur->num_replies>0){
885 dbgprintf(0,"Duplicate packet detected! (%i)\n", seq);
887 if(type<DEST_UNREACHABLE && type!=UNKNOWN){
892 cur->reply_type=type;
899 dbgprintf(1,"Response received but no requests sent with sequence number %i!\n", seq);
903 diff=(cur->reply.tv_usec + 1000000*cur->reply.tv_sec) - (cur->sent.tv_usec + 1000000*cur->sent.tv_sec);
907 if(type<DEST_UNREACHABLE && type!=UNKNOWN){
908 if(ip_type==AF_INET){
909 dbgprintf(0, "Response from %s : seq=%i time=%.1fms status=%s\n",
910 inet_ntop(ip_type, (void*)&src->ipv4->sin_addr, pbuf, 1000),
911 seq, diff,response_label[type]);
913 dbgprintf(0, "Response from %s : seq=%i time=%.1fms status=%s\n",
914 inet_ntop(ip_type, (void*)&src->ipv6->sin6_addr, pbuf, 1000),
915 seq, diff,response_label[type]);
918 if(ip_type==AF_INET){
919 dbgprintf(0, "%s from %s : seq=%i\n",response_label[type],
920 inet_ntop(ip_type, (void*)&src->ipv4->sin_addr, pbuf, 1000),
923 dbgprintf(0, "%s from %s : seq=%i\n",response_label[type],
924 inet_ntop(ip_type, (void*)&src->ipv6->sin6_addr, pbuf, 1000),
929 /*Update statistics*/
930 if(type<DEST_UNREACHABLE && type!=UNKNOWN){
932 if(cur->num_replies==1){
933 ping_stats.rtt_avg=((ping_stats.replies_received*ping_stats.rtt_avg)+(diff))/(ping_stats.replies_received+1);
934 ping_stats.replies_received++;
938 if(diff < ping_stats.rtt_min || ping_stats.rtt_min==0){
939 ping_stats.rtt_min=diff;
941 if(diff > ping_stats.rtt_max){
942 ping_stats.rtt_max=diff;
948 gettimeofday(&ping_stats.stop,NULL);
973 if(ip_type==AF_INET){
974 dbgprintf(0,"-----------%s PING STATISTICS-----------\n",
975 inet_ntop(ip_type, (void*)&dest_addr.ipv4->sin_addr, pbuf, 1000));
976 }else if(ip_type==AF_INET6){
977 dbgprintf(0,"-----------%s PING STATISTICS-----------\n",
978 inet_ntop(ip_type, (void*)&dest_addr.ipv6->sin6_addr, pbuf, 1000));
980 diff=(ping_stats.stop.tv_usec + 1000000*ping_stats.stop.tv_sec) -
981 (ping_stats.start.tv_usec + 1000000*ping_stats.start.tv_sec);
983 ploss=(1.0*(ping_stats.requests_sent-ping_stats.replies_received)/ping_stats.requests_sent*1.0)*100;
984 dbgprintf(0,"%i packets transmitted, %i received, %i errors, %.2f%% loss, time %ims\n",
985 ping_stats.requests_sent,ping_stats.replies_received,ping_stats.errors,
987 dbgprintf(0,"rtt min/avg/max = %.1f/%.1f/%.1f ms\n",
988 ping_stats.rtt_min,ping_stats.rtt_avg,ping_stats.rtt_max);
995 /*Usage information for program*/
998 dbgprintf(0, "dccpping: [-d] [-6|-4] [-c count] [-p port] [-i interval] [-t ttl] [-S srcaddress] remote_host\n");
1002 /*Program will probably be run setuid, so be extra careful*/
1003 void sanitize_environment()
1005 #if defined(_SVID_SOURCE) || defined(_XOPEN_SOURCE)
1008 extern char **environ;
1014 void dbgprintf(int level, const char *fmt, ...)
1018 va_start(args, fmt);
1019 vfprintf(stderr, fmt, args);