Leaked source code of windows server 2003
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

311 lines
10 KiB

//
// rawsend.c - Example showing use of raw sockets.
//
// This is a part of the Microsoft Source Code Samples.
// Copyright 1996 - 2000 Microsoft Corporation.
// All rights reserved.
// This source code is only intended as a supplement to
// Microsoft Development Tools and/or WinHelp documentation.
// See these sources for detailed information regarding the
// Microsoft samples programs.
//
#define WIN32_LEAN_AND_MEAN
#include <winsock2.h>
#include <ws2tcpip.h>
#include <tpipv6.h> // Needed for IPv6 Tech Preview.
#include <ip6.h> // For IPv6Header strucuture.
#include <stdlib.h>
#include <stdio.h>
#include <string.h>
//
// It's too much trouble to include icmp6.h
//
typedef struct ICMPv6Header {
unsigned char Type;
unsigned char Code;
unsigned short Checksum;
} ICMPv6Header;
#define DEFAULT_SERVER NULL // Will use the loopback interface
#define DEFAULT_PROTOCOL 254 // Arbitrary unassigned protocol
#define BUFFER_SIZE 65536
#define DATA_SIZE 64
void Usage(char *ProgName) {
fprintf(stderr, "\nRaw socket send program.\n");
fprintf(stderr, "\n%s [-s server] [-p protocol] [-n number]\n\n",
ProgName);
fprintf(stderr, " server\tServer name or IP address. (default: %s)\n",
(DEFAULT_SERVER == NULL) ? "loopback address" : DEFAULT_SERVER);
fprintf(stderr, " protocol\tNextHeader field value. (default: %u)\n",
DEFAULT_PROTOCOL);
fprintf(stderr, " number\tNumber of sends to perform. (default: 1)\n");
fprintf(stderr, " (-n by itself makes client run in an infinite loop,");
fprintf(stderr, " Hit Ctrl-C to terminate)\n");
WSACleanup();
exit(1);
}
LPSTR DecodeError(int ErrorCode)
{
static char Message[1024];
// If this program was multi-threaded, we'd want to use
// FORMAT_MESSAGE_ALLOCATE_BUFFER instead of a static buffer here.
// (And of course, free the buffer when we were done with it)
FormatMessage(FORMAT_MESSAGE_FROM_SYSTEM | FORMAT_MESSAGE_IGNORE_INSERTS |
FORMAT_MESSAGE_MAX_WIDTH_MASK,
NULL, ErrorCode, MAKELANGID(LANG_NEUTRAL, SUBLANG_DEFAULT),
(LPSTR)Message, 1024, NULL);
return Message;
}
int main(int argc, char **argv) {
char Buffer[BUFFER_SIZE], AddrName[NI_MAXHOST];
char *Server = DEFAULT_SERVER;
int i, RetVal;
unsigned int Iteration, MaxIterations = 1;
unsigned int AmountToSend;
unsigned short PayloadLength;
BOOL RunForever = FALSE;
BOOL True = TRUE;
WSADATA wsaData;
ADDRINFO Hints, *AddrInfo, *AI;
SOCKET Sock;
SOCKADDR_IN6 OurAddr, PeerAddr;
unsigned char Protocol = DEFAULT_PROTOCOL;
IPv6Header *IP = (IPv6Header *)Buffer;
ICMPv6Header *ICMP;
if (argc > 1) {
for (i = 1;i < argc; i++) {
if (((argv[i][0] == '-') || (argv[i][0] == '/')) &&
(argv[i][1] != 0) && (argv[i][2] == 0)) {
switch(tolower(argv[i][1])) {
case 's':
if (argv[i+1]) {
if (argv[i+1][0] != '-') {
Server = argv[++i];
break;
}
}
Usage(argv[0]);
break;
case 'n':
if (argv[i+1]) {
if (argv[i+1][0] != '-') {
MaxIterations = atoi(argv[++i]);
break;
}
}
RunForever = TRUE;
break;
case 'p':
if (argv[i+1]) {
if (argv[i+1][0] != '-') {
Protocol = atoi(argv[++i]);
break;
}
}
Usage(argv[0]);
break;
default:
Usage(argv[0]);
break;
}
}
else
Usage(argv[0]);
}
}
// Ask for Winsock version 2.2.
if ((RetVal = WSAStartup(MAKEWORD(2, 2), &wsaData)) != 0) {
fprintf(stderr, "WSAStartup failed with error %d: %s\n",
RetVal, DecodeError(RetVal));
WSACleanup();
return -1;
}
//
// By not setting the AI_PASSIVE flag in the hints to getaddrinfo, we're
// indicating that we intend to use the resulting address(es) to connect
// to a service. This means that when the Server parameter is NULL,
// getaddrinfo will return one entry per allowed protocol family
// containing the loopback address for that family.
//
memset(&Hints, 0, sizeof(Hints));
Hints.ai_family = PF_INET6;
Hints.ai_socktype = SOCK_DGRAM; // Lie until getaddrinfo is fixed.
Hints.ai_protocol = Protocol;
RetVal = getaddrinfo(Server, "1" /* Dummy */, &Hints, &AddrInfo);
if (RetVal != 0) {
fprintf(stderr, "Cannot resolve address [%s], error %d: %s\n",
Server, RetVal, gai_strerror(RetVal));
WSACleanup();
return -1;
}
//
// Try each address getaddrinfo returned, until we find one to which
// we can sucessfully connect.
//
for (AI = AddrInfo; AI != NULL; AI = AI->ai_next) {
Sock = socket(AI->ai_family, SOCK_RAW, AI->ai_protocol);
if (Sock == INVALID_SOCKET) {
fprintf(stderr,"Error Opening socket, error %d: %s\n",
WSAGetLastError(), DecodeError(WSAGetLastError()));
continue;
}
if (getnameinfo((LPSOCKADDR)AI->ai_addr, AI->ai_addrlen, AddrName,
sizeof(AddrName), NULL, 0, NI_NUMERICHOST) != 0)
strcpy(AddrName, "<unknown>");
printf("Attempting to connect to: %s (%s)\n",
Server ? Server : "localhost", AddrName);
if (connect(Sock, AI->ai_addr, AI->ai_addrlen) != SOCKET_ERROR)
break;
i = WSAGetLastError();
fprintf(stderr, "connect() failed with error %d: %s\n",
i, DecodeError(i));
}
if (AI == NULL) {
fprintf(stderr, "Fatal error: unable to connect to the server.\n");
closesocket(Sock);
WSACleanup();
return -1;
}
PeerAddr = *(SOCKADDR_IN6 *)(AI->ai_addr);
// We are done with the address info chain, so we can free it.
freeaddrinfo(AddrInfo);
//
// Make up a source address to use.
// Use the unspecified address for now.
//
memset(&OurAddr, 0, sizeof(OurAddr));
//
// Let the stack know that we'll be contributing the IPv6 header.
//
if (setsockopt(Sock, IPPROTO_IPV6, IPV6_HDRINCL, (char *)&True,
sizeof(True)) == SOCKET_ERROR) {
fprintf(stderr, "setsockopt() failed with error %d: %s\n",
WSAGetLastError(), DecodeError(WSAGetLastError()));
}
//
// Compose a message to send.
// Start with IPv6 packet header.
//
IP->VersClassFlow = htonl(6 << 28);
PayloadLength = 0;
IP->NextHeader = Protocol;
IP->HopLimit = 32;
IP->Source = OurAddr.sin6_addr;
IP->Dest = PeerAddr.sin6_addr;
AmountToSend = sizeof(*IP);
if (Protocol == IP_PROTOCOL_ICMPv6) {
//
// Put an ICMPv6 header on next.
//
ICMP = (ICMPv6Header *)(IP + 1);
if (MaxIterations == 1)
ICMP->Type = 255; // Unassigned informational message.
else
ICMP->Type = 127; // Unassigned error message.
ICMP->Code = 42;
ICMP->Checksum = 0; // Calculated below.
PayloadLength += sizeof(*ICMP);
AmountToSend += sizeof(*ICMP);
}
//
// Add some meaningless data.
//
for (i = 0; i < DATA_SIZE; i++) {
Buffer[AmountToSend++] = (char)(i + 0x40);
}
PayloadLength += DATA_SIZE;
if (Protocol == IP_PROTOCOL_ICMPv6) {
unsigned short *Data;
unsigned int Checksum = 0;
//
// Calculate the ICMPv6 checksum. It covers the entire ICMPv6 message
// starting with the ICMPv6 header, plus the IPv6 pseudo-header.
//
// Pseudo-header.
Data = (unsigned short *)&IP->Source;
for (i = 0; i < 16; i++)
Checksum += *Data++;
Checksum += htons(PayloadLength);
Checksum += (IP_PROTOCOL_ICMPv6 << 8);
// Packet data.
Data = (unsigned short *)ICMP;
for (i = 0; i < (PayloadLength / 2); i++)
Checksum += *Data++;
// Wrap in carries.
Checksum = (Checksum >> 16) + (Checksum & 0xffff);
Checksum += (Checksum >> 16);
// Take ones-complement and replace 0 with 0xffff.
Checksum = (unsigned short) ~Checksum;
if (Checksum == 0)
Checksum = 0xffff;
ICMP->Checksum = (unsigned short)Checksum;
}
IP->PayloadLength = htons(PayloadLength);
//
// Send and receive in a loop for the requested number of iterations.
//
for (Iteration = 0; RunForever || Iteration < MaxIterations; Iteration++) {
//
// Send the message. Since we are using a blocking socket, this
// call shouldn't return until it's able to send the entire amount.
//
RetVal = send(Sock, Buffer, AmountToSend, 0);
if (RetVal == SOCKET_ERROR) {
fprintf(stderr, "send() failed with error %d: %s\n",
WSAGetLastError(), DecodeError(WSAGetLastError()));
WSACleanup();
return -1;
}
printf("Sent %d bytes (out of %d bytes) of data: [%.*s]\n",
RetVal, AmountToSend, AmountToSend, Buffer);
}
// Tell system we're done sending.
printf("Done sending\n");
shutdown(Sock, SD_SEND);
closesocket(Sock);
WSACleanup();
return 0;
}