File: icmp_dummy.c

package info (click to toggle)
bing 1.3.5-5
  • links: PTS
  • area: main
  • in suites: bookworm, sid
  • size: 456 kB
  • sloc: ansic: 3,774; makefile: 51
file content (60 lines) | stat: -rw-r--r-- 2,706 bytes parent folder | download | duplicates (3)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
/* $Id: icmp_dummy.c,v 1.2 1999/10/11 05:25:19 fgouget Exp $ */

/* was in */
int do_probe(handle, target, size, ttl, probe)
{
#ifdef FAKE_NET
    if ((SOCKADDR_IN(target)->sin_addr.S_un.S_un_b.s_b1==192) &&
        (SOCKADDR_IN(target)->sin_addr.S_un.S_un_b.s_b2==168)) {
        struct sockaddr_in* itarget=SOCKADDR_IN(target);
        int retcode;
        /* Fake the probe results according to the target address */
        if (ttl==0) {
            /* Fake information concerning the local host */
            probe->rtt=10*size/100;
            SOCKADDR_IN(&probe->src_addr)->sin_addr.S_un.S_addr=inet_addr("127.0.0.1");
            probe->type=ICMP_TIMXCEED;
            probe->subtype=ICMP_TIMXCEED_INTRANS;
            retcode=BP_RES_TTL_EXCEEDED;
        } else if (ttl>=itarget->sin_addr.S_un.S_un_b.s_b4) {
            /* Fake information concerning the target host */
            probe->rtt=((double)itarget->sin_addr.S_un.S_un_b.s_b3)*itarget->sin_addr.S_un.S_un_b.s_b4*size/100;
            SOCKADDR_IN(&probe->src_addr)->sin_addr.S_un.S_addr=itarget->sin_addr.S_un.S_addr;
            probe->type=ICMP_ECHOREPLY;
            probe->subtype=0;
            retcode=BP_RES_HIT;
        } else {
            /* Do as if the ttl expired in transit */
            probe->rtt=((double)itarget->sin_addr.S_un.S_un_b.s_b3)*ttl*size/100;
            SOCKADDR_IN(&probe->src_addr)->sin_addr.S_un.S_addr=itarget->sin_addr.S_un.S_addr;
            SOCKADDR_IN(&probe->src_addr)->sin_addr.S_un.S_un_b.s_b4=ttl;
            probe->type=ICMP_TIMXCEED;
            probe->subtype=ICMP_TIMXCEED_INTRANS;
            retcode=BP_RES_TTL_EXCEEDED;
        }
        probe->src_addr.sa_family=AF_INET;
        probe->size=0;
        probe->contents=NULL;
        return retcode;
    } else if ((SOCKADDR_IN(target)->sin_addr.S_un.S_un_b.s_b1==208) && 
               (SOCKADDR_IN(target)->sin_addr.S_un.S_un_b.s_b2==199) && 
               (SOCKADDR_IN(target)->sin_addr.S_un.S_un_b.s_b3==87) && 
               (SOCKADDR_IN(target)->sin_addr.S_un.S_un_b.s_b4==55)) {
            /* Fake information concerning the local host */
            probe->rtt=size/1000;
            SOCKADDR_IN(&probe->src_addr)->sin_addr.S_un.S_addr=inet_addr("127.0.0.1");
            probe->type=ICMP_ECHOREPLY;
            probe->subtype=0;
            return BP_RES_HIT;
    } else {
        probe->rtt=50;
        probe->src_addr.sa_family=AF_INET;
        SOCKADDR_IN(&probe->src_addr)->sin_addr.S_un.S_addr=inet_addr("127.0.0.1");
        probe->type=ICMP_UNREACH;
        probe->subtype=ICMP_UNREACH_NET_UNKNOWN;
        probe->size=0;
        probe->contents=NULL;
        return BP_RES_UNKNOWN;
    }
#endif /* FAKE_NET */
}