diff options
author | Luca Deri <deri@ntop.org> | 2016-02-15 09:57:26 +0100 |
---|---|---|
committer | Luca Deri <deri@ntop.org> | 2016-02-15 09:57:26 +0100 |
commit | 16a5c6995c99a7191e3d4749b1a6c9467f8c3cee (patch) | |
tree | 6b00e4149e60f31e32f47671b881827c1e4dd942 /example/ndpiReader.c | |
parent | c7334e7c5660d036cb8e1d1e842b392166985936 (diff) |
Added ability to extract BitTorrent hash (and eventually peerId)
Diffstat (limited to 'example/ndpiReader.c')
-rw-r--r-- | example/ndpiReader.c | 17 |
1 files changed, 15 insertions, 2 deletions
diff --git a/example/ndpiReader.c b/example/ndpiReader.c index b75672192..3cea58938 100644 --- a/example/ndpiReader.c +++ b/example/ndpiReader.c @@ -197,7 +197,8 @@ typedef struct ndpi_flow { // result only, not used for flow identification ndpi_protocol detected_protocol; - char host_server_name[256]; + char host_server_name[192]; + char bittorent_hash[41]; struct { char client_certificate[48], server_certificate[48]; @@ -528,6 +529,7 @@ static void printFlow(u_int16_t thread_id, struct ndpi_flow *flow) { if(flow->host_server_name[0] != '\0') fprintf(out, "[Host: %s]", flow->host_server_name); if(flow->ssl.client_certificate[0] != '\0') fprintf(out, "[SSL client: %s]", flow->ssl.client_certificate); if(flow->ssl.server_certificate[0] != '\0') fprintf(out, "[SSL server: %s]", flow->ssl.server_certificate); + if(flow->bittorent_hash[0] != '\0') fprintf(out, "[BT Hash: %s]", flow->bittorent_hash); fprintf(out, "\n"); } else { @@ -1066,11 +1068,22 @@ static unsigned int packet_processing(u_int16_t thread_id, snprintf(flow->host_server_name, sizeof(flow->host_server_name), "%s", flow->ndpi_flow->host_server_name); + if(flow->detected_protocol.protocol == NDPI_PROTOCOL_BITTORRENT) { + int i, j, n = 0; + + for(i=0, j = 0; i<20; i++) { + sprintf(&flow->bittorent_hash[j], "%02x", flow->ndpi_flow->bittorent_hash[i]); + j += 2, n += flow->ndpi_flow->bittorent_hash[i]; + } + + if(n == 0) flow->bittorent_hash[0] = '\0'; + } + if((proto == IPPROTO_TCP) && (flow->detected_protocol.protocol != NDPI_PROTOCOL_DNS)) { snprintf(flow->ssl.client_certificate, sizeof(flow->ssl.client_certificate), "%s", flow->ndpi_flow->protos.ssl.client_certificate); snprintf(flow->ssl.server_certificate, sizeof(flow->ssl.server_certificate), "%s", flow->ndpi_flow->protos.ssl.server_certificate); } - + free_ndpi_flow(flow); if(verbose > 1) { |