diff options
author | Guy Harris <guy@alum.mit.edu> | 2003-09-02 22:47:59 +0000 |
---|---|---|
committer | Guy Harris <guy@alum.mit.edu> | 2003-09-02 22:47:59 +0000 |
commit | 75ae0e30c7ff9e539a80562a431e1cd2719e78a1 (patch) | |
tree | e4f81d2c0758513eab172c7bbe79d2c773832295 /tap-httpstat.c | |
parent | 71034c5a3faef6c2305e8e1f9253d544f559a532 (diff) |
From Jean-Michel Fayard: BOOTP/DHCP, HTTP, and WSP statistics taps.
svn path=/trunk/; revision=8345
Diffstat (limited to 'tap-httpstat.c')
-rw-r--r-- | tap-httpstat.c | 329 |
1 files changed, 329 insertions, 0 deletions
diff --git a/tap-httpstat.c b/tap-httpstat.c new file mode 100644 index 0000000000..e03101c590 --- /dev/null +++ b/tap-httpstat.c @@ -0,0 +1,329 @@ +/* tap-httpstat.c + * tap-httpstat 2003 Jean-Michel FAYARD + * + * $Id: tap-httpstat.c,v 1.1 2003/09/02 22:47:58 guy Exp $ + * + * Ethereal - Network traffic analyzer + * By Gerald Combs <gerald@ethereal.com> + * Copyright 1998 Gerald Combs + * + * This program is free software; you can redistribute it and/or + * modify it under the terms of the GNU General Public License + * as published by the Free Software Foundation; either version 2 + * of the License, or (at your option) any later version. + * + * This program is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + * GNU General Public License for more details. + * + * You should have received a copy of the GNU General Public License + * along with this program; if not, write to the Free Software + * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. + */ + +#ifdef HAVE_CONFIG_H +# include "config.h" +#endif + +#include <stdio.h> + +#include "epan/packet_info.h" +#include "epan/value_string.h" +#include "tap.h" +#include "register.h" +#include "packet-http.h" +#include <string.h> + + +/* used to keep track of the statictics for an entire program interface */ +typedef struct _http_stats_t { + char *filter; + GHashTable *hash_responses; + GHashTable *hash_requests; +} httpstat_t; + +/* used to keep track of the stats for a specific response code + * for example it can be { 3, 404, "Not Found" ,...} + * which means we captured 3 reply http/1.1 404 Not Found */ +typedef struct _http_response_methode_t { + guint32 packets; /* 3 */ + guint response_method; /* 404 */ + gchar *name; /* Not Found */ + httpstat_t *sp; +} http_response_methode_t; +/* used to keep track of the stats for a specific request string */ +typedef struct _http_request_methode_t { + gchar *response; /* eg. : GET */ + guint32 packets; + httpstat_t *sp; +} http_request_methode_t; + + +static const value_string vals_status_code[] = { + { 100, "Continue" }, + { 101, "Switching Protocols" }, + { 199, "Informational - Others" }, + + { 200, "OK"}, + { 201, "Created"}, + { 202, "Accepted"}, + { 203, "Non-authoritative Information"}, + { 204, "No Content"}, + { 205, "Reset Content"}, + { 206, "Partial Content"}, + { 299, "Success - Others"}, /* used to keep track of others Success packets */ + + { 300, "Multiple Choices"}, + { 301, "Moved Permanently"}, + { 302, "Moved Temporarily"}, + { 303, "See Other"}, + { 304, "Not Modified"}, + { 305, "Use Proxy"}, + { 399, "Redirection - Others"}, + + { 400, "Bad Request"}, + { 401, "Unauthorized"}, + { 402, "Payment Required"}, + { 403, "Forbidden"}, + { 404, "Not Found"}, + { 405, "Method Not Allowed"}, + { 406, "Not Acceptable"}, + { 407, "Proxy Authentication Required"}, + { 408, "Request Time-out"}, + { 409, "Conflict"}, + { 410, "Gone"}, + { 411, "Length Required"}, + { 412, "Precondition Failed"}, + { 413, "Request Entity Too Large"}, + { 414, "Request-URI Too Large"}, + { 415, "Unsupported Media Type"}, + { 499, "Client Error - Others"}, + + { 500, "Internal Server Error"}, + { 501, "Not Implemented"}, + { 502, "Bad Gateway"}, + { 503, "Service Unavailable"}, + { 504, "Gateway Time-out"}, + { 505, "HTTP Version not supported"}, + { 599, "Server Error - Others"}, + + { 0, NULL} +} ; + +/* insert some entries */ +static void +http_init_hash( httpstat_t *sp) +{ + int i; + + sp->hash_responses = g_hash_table_new( g_int_hash, g_int_equal); + + for (i=0 ; vals_status_code[i].strptr ; i++ ) + { + gint *key = g_malloc (sizeof(gint)); + http_response_methode_t *sc = g_malloc (sizeof(http_response_methode_t)); + *key = vals_status_code[i].value; + sc->packets=0; + sc->response_method = *key; + sc->name=vals_status_code[i].strptr; + sc->sp = sp; + g_hash_table_insert( sc->sp->hash_responses, key, sc); + } + sp->hash_requests = g_hash_table_new( g_str_hash, g_str_equal); +} +static void +http_draw_hash_requests( gchar *key _U_ , http_request_methode_t *data, gchar * format) +{ + if (data->packets==0) + return; + printf( format, data->response, data->packets); +} + +static void +http_draw_hash_responses( gint * key _U_ , http_response_methode_t *data, char * format) +{ + if (data==NULL){ + g_warning("C'est quoi ce borderl key=%d\n", *key); + exit(EXIT_FAILURE); + } + if (data->packets==0) + return; + /* " HTTP %3d %-35s %9d packets", */ + printf(format, data->response_method, data->name, data->packets ); +} + + + +/* NOT USED at this moment */ +/* +static void +http_free_hash( gpointer key, gpointer value, gpointer user_data _U_ ) +{ + g_free(key); + g_free(value); +} +*/ +static void +http_reset_hash_responses(gchar *key _U_ , http_response_methode_t *data, gpointer ptr _U_ ) +{ + data->packets = 0; +} +static void +http_reset_hash_requests(gchar *key _U_ , http_request_methode_t *data, gpointer ptr _U_ ) +{ + data->packets = 0; +} + +static void +httpstat_reset(void *psp ) +{ + httpstat_t *sp=psp; + if (!sp) { + g_hash_table_foreach( sp->hash_responses, (GHFunc)http_reset_hash_responses, NULL); + g_hash_table_foreach( sp->hash_responses, (GHFunc)http_reset_hash_requests, NULL); + } +} + +static int +httpstat_packet(void *psp , packet_info *pinfo _U_, epan_dissect_t *edt _U_, void *pri) +{ + http_info_value_t *value=pri; + httpstat_t *sp=(httpstat_t *) psp; + + /* We are only interested in reply packets with a status code */ + /* Request or reply packets ? */ + if (value->response_method!=0) { + guint *key=g_malloc( sizeof(guint) ); + http_response_methode_t *sc; + + *key=value->response_method ; + sc = g_hash_table_lookup( + sp->hash_responses, + key); + if (sc==NULL){ + /* non standard status code ; we classify it as others + * in the relevant category (Informational,Success,Redirection,Client Error,Server Error) + */ + int i = value->response_method; + if ((i<100) || (i>=600)) { + return 0; + } + else if (i<200){ + *key=199; /* Hopefully, this status code will never be used */ + } + else if (i<300){ + *key=299; + } + else if (i<400){ + *key=399; + } + else if (i<500){ + *key=499; + } + else{ + *key=599; + } + sc = g_hash_table_lookup( + sp->hash_responses, + key); + if (sc==NULL) + return 0; + } + sc->packets++; + } + else if (value->request_method){ + http_request_methode_t *sc; + + sc = g_hash_table_lookup( + sp->hash_requests, + value->request_method); + if (sc==NULL){ + sc=g_malloc( sizeof(http_request_methode_t) ); + sc->response=g_strdup( value->request_method ); + sc->packets=1; + sc->sp = sp; + g_hash_table_insert( sp->hash_requests, sc->response, sc); + } else { + sc->packets++; + } + } else { + return 0; + } + return 1; +} + + + +static void +httpstat_draw(void *psp ) +{ + httpstat_t *sp=psp; + printf("\n"); + printf("===================================================================\n"); + if (! sp->filter[0]) + printf("HTTP Statistics\n"); + else + printf("HTTP Statistics with filter %s\n", sp->filter); + + printf( "* HTTP Status Codes in reply packets\n"); + g_hash_table_foreach( sp->hash_responses, (GHFunc)http_draw_hash_responses, + " HTTP %3d %s\n"); + printf("* List of HTTP Request methods\n"); + g_hash_table_foreach( sp->hash_requests, (GHFunc)http_draw_hash_requests, + " %9s %d \n"); + printf("===================================================================\n"); +} + + + +/* When called, this function will create a new instance of gtk_httpstat. + */ +static void +gtk_httpstat_init(char *optarg) +{ + httpstat_t *sp; + char *filter=NULL; + GString *error_string; + + if (!strncmp (optarg, "http,stat,", 10)){ + filter=optarg+10; + } else { + filter=NULL; + } + + sp = g_malloc( sizeof(httpstat_t) ); + if(filter){ + sp->filter=g_malloc(strlen(filter)+1); + strcpy(sp->filter,filter); + } else { + sp->filter=NULL; + } + /*g_hash_table_foreach( http_status, (GHFunc)http_reset_hash_responses, NULL);*/ + + + error_string = register_tap_listener( + "http", + sp, + filter, + httpstat_reset, + httpstat_packet, + httpstat_draw); + if (error_string){ + /* error, we failed to attach to the tap. clean up */ + g_free(sp->filter); + g_free(sp); + fprintf (stderr, "tethereal: Coulnd't register http,stat tap: %s\n", + error_string->str); + g_string_free(error_string, TRUE); + exit(1); + } + + http_init_hash(sp); +} + +void +register_tap_listener_gtkhttpstat(void) +{ + register_ethereal_tap("http,stat,", gtk_httpstat_init); +} |