windows下ping程式實現

來源:互聯網
上載者:User

windows下ping程式的實現:使用原始通訊端SOCK_RAW,基於IP協議上的ICMP協議來實現,發送的ICMP資料包type為8(請求回複),收到的回複的ICMP資料包type為0,為了判斷收到是資料包是本進程發送的。將ICMP包的id設定為本進程的ID。如果使用-r選項,會記錄中間經過的route。

參考代碼:

// Description://    This sample illustrates how an ICMP ping app can be written//    using the SOCK_RAW socket type and IPPROTO_ICMP protocol.//    By creating a raw socket, the underlying layer does not change//    the protocol header so that when we submit the ICMP header//    nothing is changed so that the receiving end will see an //    ICMP packet. Additionally, we use the record route IP option//    to get a round trip path to the endpoint. Note that the size//    of the IP option header that records the route is limited to//    nine IP addresses.//// Compile://     cl -o Ping Ping.c ws2_32.lib /Zp1//// Command Line Options/Parameters://     Ping [host] [packet-size]//     //     host         String name of host to ping//     packet-size  Integer size of packet to send //                      (smaller than 1024 bytes)////#pragma pack(1)#include "stdafx.h"#include <winsock2.h>#include <ws2tcpip.h>#include <stdio.h>#include <stdlib.h>#define WIN32_LEAN_AND_MEAN#pragma comment(lib,"ws2_32.lib")#define IP_RECORD_ROUTE  0x7// IP header structuretypedef struct _iphdr {    //Suppose the BYTE_ORDER is LITTLE_ENDIAN    unsigned int   h_len:4;        // Length of the header    unsigned int   version:4;      // Version of IP    unsigned char  tos;            // Type of service    unsigned short total_len;      // Total length of the packet    unsigned short id;             // Unique identification    unsigned short frag_offset;    // Fragment offset    unsigned char  ttl;            // Time to live    unsigned char  protocol;       // Protocol (TCP, UDP etc)    unsigned short checksum;       // IP checksum    unsigned int   sourceIP;       // Source IP    unsigned int   destIP;         // Destination IP} IpHeader;#define ICMP_ECHO        8#define ICMP_ECHOREPLY   0#define ICMP_MIN         8 // Minimum 8-byte ICMP packet (header)// ICMP header structure// This is not the standard header, but we reserve space for timetypedef struct _icmphdr {    BYTE   i_type;    BYTE   i_code;                 // Type sub code    USHORT i_cksum;    USHORT i_id;    USHORT i_seq;    ULONG  timestamp;} IcmpHeader;// IP option header - use with socket option IP_OPTIONStypedef struct _ipoptionhdr{    unsigned char code;        // Option type    unsigned char len;         // Length of option hdr    unsigned char ptr;         // Offset into options    unsigned long addr[9];     // List of IP addrs} IpOptionHeader;#define DEF_PACKET_SIZE  32        // Default packet size#define MAX_PACKET       1024      // Max ICMP packet size#define MAX_IP_HDR_SIZE  60        // Max IP header size w/optionsBOOL  bRecordRoute;int   datasize;char *lpdest;// Function: usage// Description://    Print usage informationvoid usage(char *progname){    printf("usage: ping -r <host> [data size] ");    printf("       -r           record route ");    printf("       host         remote machine to ping ");    printf("       datasize     can be up to 1KB ");    ExitProcess(-1);}// Function: FillICMPData// Description://    Helper function to fill in various fields for our ICMP requestvoid FillICMPData(char *icmp_data, int datasize){    IcmpHeader *icmp_hdr = NULL;    char *datapart = NULL;    icmp_hdr = (IcmpHeader*)icmp_data;    icmp_hdr->i_type = ICMP_ECHO; // Request an ICMP echo, type is 8    icmp_hdr->i_code = 0;    // code is 0    icmp_hdr->i_id = (USHORT)GetCurrentProcessId();    icmp_hdr->i_cksum = 0;    icmp_hdr->i_seq = 0;    datapart = icmp_data + sizeof(IcmpHeader);    // Place some junk in the buffer    memset(datapart, 'E' , datasize - sizeof(IcmpHeader));}// Function: checksum// Description://    This function calculates the 16-bit one's complement sum//    of the supplied buffer (ICMP) headerUSHORT checksum(USHORT *buffer, int size) {    unsigned long cksum=0;    while(size > 1)     {        cksum += *buffer++;        size -= sizeof(USHORT);    }    if(size)     {        cksum += *(UCHAR*)buffer;    }    cksum = (cksum >> 16) + (cksum & 0xffff);    cksum += (cksum >>16);    return (USHORT)(~cksum);}// Function: DecodeIPOptions// Description://    If the IP option header is present, find the IP options//    within the IP header and print the record route option valuesvoid DecodeIPOptions(char *buf, int bytes){    IpOptionHeader *ipopt = NULL;    IN_ADDR         inaddr;    int             i;    HOSTENT        *host = NULL;    ipopt = (IpOptionHeader *)(buf + 20);    printf("Record Route:   ");    for(i = 0; i < (ipopt->ptr / 4) - 1; i++)    {        inaddr.S_un.S_addr = ipopt->addr[i];        if (i != 0) printf("   ");        host = gethostbyaddr((char *)&inaddr.S_un.S_addr, sizeof(inaddr.S_un.S_addr), AF_INET);        if (host)            printf("(%-15s) %s ", inet_ntoa(inaddr), host->h_name);        else            printf("(%-15s) ", inet_ntoa(inaddr));    }    printf("\n");    return;}// Function: DecodeICMPHeader// Description://    The response is an IP packet. We must decode the IP header to//    locate the ICMP data.void DecodeICMPHeader(char *buf, int bytes, struct sockaddr_in *from){    IpHeader       *iphdr = NULL;    IcmpHeader     *icmphdr = NULL;    unsigned short  iphdrlen;    DWORD           tick;    static   int    icmpcount = 0;    iphdr = (IpHeader *)buf;    // Number of 32-bit words * 4 = bytes    iphdrlen = iphdr->h_len * 4;    tick = GetTickCount();    if((iphdrlen == MAX_IP_HDR_SIZE) && (!icmpcount))        DecodeIPOptions(buf, bytes);    if(bytes < iphdrlen + ICMP_MIN)     {        printf("Too few bytes from %s \n", inet_ntoa(from->sin_addr));    }    icmphdr = (IcmpHeader*)(buf + iphdrlen);    if(icmphdr->i_type != ICMP_ECHOREPLY) // echo type must be 0    {        printf("non-echo type %d recvd \n", icmphdr->i_type);        return;    }    // Make sure this is an ICMP reply to something we sent!    // In FillICMPData function we assign the i_id is GetCurrentProcessId()    if(icmphdr->i_id != (USHORT)GetCurrentProcessId())     {        printf("someone else's packet! \n");        return ;    }    printf("%d bytes from %s ", bytes, inet_ntoa(from->sin_addr));    printf("icmp_seq = %d. ", icmphdr->i_seq);    printf("time: %d ms", tick - icmphdr->timestamp);    printf("\n");    icmpcount++;    return;}// Function: ValidateArgs// Description://    Check the input arguments is valid or not.void ValidateArgs(int argc, char **argv){    bRecordRoute = FALSE;    lpdest = NULL;    datasize = DEF_PACKET_SIZE;        for(int i = 1; i < argc; i++)    {        if((argv[i][0] == '-') || (argv[i][0] == '/'))        {            switch (tolower(argv[i][1]))            {                case 'r':        // Record route option                    bRecordRoute = TRUE;                    break;                default:                    usage(argv[0]);                    break;            }        }        else if(isdigit(argv[i][0]))            datasize = atoi(argv[i]);        else            lpdest = argv[i];    }}        //// Function: main//// Description://    Setup the ICMP raw socket, and create the ICMP header. Add//    the appropriate IP option header, and start sending ICMP//    echo requests to the endpoint. For each send and receive,//    we set a timeout value so that we don t wait forever for a //    response in case the endpoint is not responding. When we//    receive a packet decode it.int main(int argc, char **argv){    WSADATA            wsaData;    SOCKET             sockRaw = INVALID_SOCKET;    struct sockaddr_in dest, from;    int                bread,                       fromlen = sizeof(from),                       timeout = 1000,                       ret;    char               icmp_data[MAX_PACKET],                       recvbuf[MAX_PACKET];    unsigned int       addr = 0;    USHORT             seq_no = 0;    struct hostent    *hp = NULL;    IpOptionHeader     ipopt;    if(WSAStartup(MAKEWORD(2, 2), &wsaData) != 0)    {        printf("WSAStartup() failed: %d \n", GetLastError());        return -1;    }    // Check the input arguments    ValidateArgs(argc, argv);    // Create a raw socket with IPPROTO_ICMP protocol    sockRaw = socket(AF_INET, SOCK_RAW, IPPROTO_ICMP);    if(sockRaw == INVALID_SOCKET)     {        printf("WSASocket() failed: %d \n", WSAGetLastError());        return -1;    }    if(bRecordRoute)    {        // Setup the IP option header to go out on every ICMP packet        memset(&ipopt,0,sizeof(ipopt));        ipopt.code = IP_RECORD_ROUTE; // Record route option        ipopt.ptr  = 4;               // Point to the first addr offset        ipopt.len  = 39;              // Length of option header          ret = setsockopt(sockRaw, IPPROTO_IP, IP_OPTIONS, (char *)&ipopt, sizeof(ipopt));        if (ret == SOCKET_ERROR)        {            printf("setsockopt(IP_OPTIONS) failed: %d \n", WSAGetLastError());            return -1;        }    }    // Set the send/recv timeout values    timeout = 1000;    bread = setsockopt(sockRaw, SOL_SOCKET, SO_RCVTIMEO, (char*)&timeout, sizeof(timeout));    if(bread == SOCKET_ERROR)     {        printf("setsockopt(SO_RCVTIMEO) failed: %d \n", WSAGetLastError());        return -1;    }    timeout = 1000;    bread = setsockopt(sockRaw, SOL_SOCKET, SO_SNDTIMEO, (char*)&timeout, sizeof(timeout));    if(bread == SOCKET_ERROR)     {        printf("setsockopt(SO_SNDTIMEO) failed: %d \n", WSAGetLastError());        return -1;    }        // Resolve the endpoint's name if necessary    memset(&dest, 0, sizeof(dest));    dest.sin_family = AF_INET;    if((dest.sin_addr.s_addr = inet_addr(lpdest)) == INADDR_NONE)    {        if((hp = gethostbyname(lpdest)) != NULL)        {            memcpy(&(dest.sin_addr), hp->h_addr, hp->h_length);            dest.sin_family = hp->h_addrtype;            printf("dest.sin_addr = %s \n", inet_ntoa(dest.sin_addr));        }        else        {            printf("gethostbyname() failed: %d \n", WSAGetLastError());            return -1;        }    }    // Create the ICMP packet    datasize += sizeof(IcmpHeader);    memset(icmp_data,0,MAX_PACKET);    // Fill the ICMP packet    FillICMPData(icmp_data,datasize);    // Start sending/receiving ICMP packets    while(1)     {        static int nCount = 0;        int bwrote;                        if(nCount++ == 10) break;                        ((IcmpHeader*)icmp_data)->i_cksum = 0;        ((IcmpHeader*)icmp_data)->timestamp = GetTickCount();        ((IcmpHeader*)icmp_data)->i_seq = seq_no++;        ((IcmpHeader*)icmp_data)->i_cksum = checksum((USHORT*)icmp_data, datasize);        bwrote = sendto(sockRaw, icmp_data, datasize, 0, (struct sockaddr*)&dest, sizeof(dest));        if(bwrote == SOCKET_ERROR)        {            if(WSAGetLastError() == WSAETIMEDOUT)             {                printf("timed out \n");                continue;            }            printf("sendto() failed: %d \n", WSAGetLastError());            return -1;        }        if(bwrote < datasize)         {            printf("Wrote %d bytes \n", bwrote);        }        bread = recvfrom(sockRaw, recvbuf, MAX_PACKET, 0, (struct sockaddr*)&from, &fromlen);        if(bread == SOCKET_ERROR)        {            if(WSAGetLastError() == WSAETIMEDOUT)             {                printf("timed out \n");                continue;            }            printf("recvfrom() failed: %d \n", WSAGetLastError());            return -1;        }        DecodeICMPHeader(recvbuf, bread, &from);        Sleep(1000);    }    // Cleanup    if (sockRaw != INVALID_SOCKET)         closesocket(sockRaw);    WSACleanup();    return 0;}

 

相關文章

聯繫我們

該頁面正文內容均來源於網絡整理,並不代表阿里雲官方的觀點,該頁面所提到的產品和服務也與阿里云無關,如果該頁面內容對您造成了困擾,歡迎寫郵件給我們,收到郵件我們將在5個工作日內處理。

如果您發現本社區中有涉嫌抄襲的內容,歡迎發送郵件至: info-contact@alibabacloud.com 進行舉報並提供相關證據,工作人員會在 5 個工作天內聯絡您,一經查實,本站將立刻刪除涉嫌侵權內容。

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.