/* * ndpi_api.h * * Copyright (C) 2011-24 - ntop.org * * This file is part of nDPI, an open source deep packet inspection * library based on the OpenDPI and PACE technology by ipoque GmbH * * nDPI is free software: you can redistribute it and/or modify * it under the terms of the GNU Lesser General Public License as published by * the Free Software Foundation, either version 3 of the License, or * (at your option) any later version. * * nDPI is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU Lesser General Public License for more details. * * You should have received a copy of the GNU Lesser General Public License * along with nDPI. If not, see . * */ #ifndef __NDPI_API_H__ #define __NDPI_API_H__ #include "ndpi_main.h" #ifdef __cplusplus extern "C" { #endif #define SIZEOF_FLOW_STRUCT ( sizeof(struct ndpi_flow_struct) ) #define NDPI_DETECTION_ONLY_IPV4 ( 1 << 0 ) #define NDPI_DETECTION_ONLY_IPV6 ( 1 << 1 ) #define ADD_TO_DETECTION_BITMASK 1 #define NO_ADD_TO_DETECTION_BITMASK 0 #define SAVE_DETECTION_BITMASK_AS_UNKNOWN 1 #define NO_SAVE_DETECTION_BITMASK_AS_UNKNOWN 0 /* In case a custom DGA function is used, the fucntion below must be overwritten, */ extern ndpi_custom_dga_predict_fctn ndpi_dga_function; /** * Check if a string is encoded with punycode * ( https://tools.ietf.org/html/rfc3492 ) * * @par buff = pointer to the string to ckeck * @par len = len of the string * @return 1 if the string is punycoded; * else 0 * */ int ndpi_check_punycode_string(char *buff, int len); /** * Get the size of the flow struct * * @return the size of the flow struct * */ u_int32_t ndpi_detection_get_sizeof_ndpi_flow_struct(void); /** * Get the size of the flow tcp struct * * @return the size of the flow tcp struct * */ u_int32_t ndpi_detection_get_sizeof_ndpi_flow_tcp_struct(void); /** * Get the size of the flow udp struct * * @return the size of the flow udp struct * */ u_int32_t ndpi_detection_get_sizeof_ndpi_flow_udp_struct(void); /* Same as the API call above but used for matching raw id's added via ndpi_add_string_value_to_automa() */ int ndpi_match_string_value(void *_automa, char *string_to_match, u_int match_len, u_int32_t *num); /** * Return the protocol error code of a given flow * * @par flow = the flow to analyze * @return the error code or 0 otherwise * */ u_int32_t ndpi_get_flow_error_code(struct ndpi_flow_struct *flow); /** * nDPI personal allocation and free functions **/ void * ndpi_malloc(size_t size); void * ndpi_calloc(unsigned long count, size_t size); void * ndpi_realloc(void *ptr, size_t old_size, size_t new_size); char * ndpi_strdup(const char *s); char * ndpi_strndup(const char *s, size_t size); void ndpi_free(void *ptr); void * ndpi_flow_malloc(size_t size); void ndpi_flow_free(void *ptr); u_int32_t ndpi_get_tot_allocated_memory(void); char *ndpi_strip_leading_trailing_spaces(char *ptr, int *ptr_len) ; /** * Finds the first occurrence of the substring 'needle' in the string 'haystack'. * * This function is similar to the standard `strstr()` function, but it has an additional parameter `len` that * specifies the maximum length of the search. * * @param haystack The string to search in. * @param needle The substring to search for. * @param len The maximum length of the search. * @return Pointer to the first occurrence of 'needle' in 'haystack', or NULL if no match is found. */ char *ndpi_strnstr(const char *haystack, const char *needle, size_t len); /** * Same as ndpi_strnstr but case insensitive * * @par s = string to parse * @par find = string to match with -s- * @par slen = max length to match between -s- and -find- * @return a pointer to the beginning of the located substring; * NULL if the substring is not found * */ const char* ndpi_strncasestr(const char *s, const char *find, size_t slen); /** * Returns the nDPI protocol id for IP-based protocol detection * * @par ndpi_struct = the struct created for the protocol detection * @par pin = IP host address (MUST BE in network byte order): * See man(7) ip for details * @return the nDPI protocol ID * */ u_int16_t ndpi_network_ptree_match(struct ndpi_detection_module_struct *ndpi_struct, struct in_addr *pin); /** * Returns the nDPI protocol id for IP+port-based protocol detection * * @par ndpi_struct = the struct created for the protocol detection * @par pin = IP host address (MUST BE in network byte order): * See man(7) ip for details * @par port = The port (MUST BE in network byte order) or * 0 if ignored * @return the nDPI protocol ID * */ u_int16_t ndpi_network_port_ptree_match(struct ndpi_detection_module_struct *ndpi_struct, struct in_addr *pin /* network byte order */, u_int16_t port /* network byte order */); u_int16_t ndpi_network_port_ptree6_match(struct ndpi_detection_module_struct *ndpi_struct, struct in6_addr *pin, u_int16_t port /* network byte order */); /** * Creates a protocol match that does not contain any hostnames. * * @par hostname_list = the desired hostname list form which the first entry is used to create the match * @par empty_app_protocol = the resulting protocol match that does contain all information except the hostname * * @return 0 on success, 1 otherwise */ int ndpi_init_empty_app_protocol(ndpi_protocol_match const * const hostname_list, ndpi_protocol_match * const empty_app_protocol); /** * Init single protocol match. * * @par ndpi_mod = the struct created for the protocol detection * @par match = the struct passed to match the protocol * * @return 0 on success, 1 otherwise */ int ndpi_init_app_protocol(struct ndpi_detection_module_struct *ndpi_str, ndpi_protocol_match const * const match); /** * Init single protocol match and adds it to the Aho-Corasick automata. * * @par ndpi_mod = the struct created for the protocol detection * @par match = the struct passed to match the protocol * */ void ndpi_init_protocol_match(struct ndpi_detection_module_struct *ndpi_mod, ndpi_protocol_match const * const match); /** * Returns a new initialized global context. * * @return the initialized global context * */ struct ndpi_global_context *ndpi_global_init(void); /** * Deinit a properly initialized global context. * * @par g_ctx = global context to free/deinit * */ void ndpi_global_deinit(struct ndpi_global_context *g_ctx); /** * Returns a new initialized detection module * Note that before you can use it you can still load * hosts and do other things. As soon as you are ready to use * it do not forget to call first ndpi_finalize_initialization() * * You can call this function multiple times, (i.e. to create multiple * indipendent detection contexts) but all these calls MUST NOT run * in parallel * * @g_ctx = global context associated to the new detection module; NULL if no global context is needed * @return the initialized detection module * */ struct ndpi_detection_module_struct *ndpi_init_detection_module(struct ndpi_global_context *g_ctx); /** * Completes the initialization (2nd step) * * @par ndpi_str = the struct created for the protocol detection * * @return 0 on success * */ int ndpi_finalize_initialization(struct ndpi_detection_module_struct *ndpi_str); /** * Frees the dynamic memory allocated members in the specified flow * * @par flow = the flow struct which dynamic allocated members should be deallocated * */ void ndpi_free_flow_data(struct ndpi_flow_struct *flow); /** * Frees the dynamic memory allocated members in the specified flow and the flow struct itself * * @par flow = the flow struct and its dynamic allocated members that should be deallocated * */ void ndpi_free_flow(struct ndpi_flow_struct *flow); /** * Destroys the detection module * * @par ndpi_struct = the struct to clearing for the detection module * */ void ndpi_exit_detection_module(struct ndpi_detection_module_struct *ndpi_struct); /** * Sets a single protocol bitmask * This function does not increment the index of the callback_buffer * * @par label = string for the protocol name * @par ndpi_struct = the detection module * @par idx = the index of the callback_buffer * @par func = function pointer of the protocol search * @par ndpi_selection_bitmask = the protocol selected bitmask * @par b_save_bitmask_unknow = if set as "true" save the detection bitmask as unknow * @par b_add_detection_bitmask = if set as "true" add the protocol bitmask to the detection bitmask * */ void ndpi_set_bitmask_protocol_detection(char *label, struct ndpi_detection_module_struct *ndpi_struct, const u_int32_t idx, u_int16_t ndpi_protocol_id, void (*func) (struct ndpi_detection_module_struct *, struct ndpi_flow_struct *flow), const NDPI_SELECTION_BITMASK_PROTOCOL_SIZE ndpi_selection_bitmask, u_int8_t b_save_bitmask_unknow, u_int8_t b_add_detection_bitmask); /** * Sets the protocol bitmask2 * * @par ndpi_struct = the detection module * @par detection_bitmask = the protocol bitmask to set * @return 0 if ok, -1 if error * */ int ndpi_set_protocol_detection_bitmask2(struct ndpi_detection_module_struct *ndpi_struct, const NDPI_PROTOCOL_BITMASK * detection_bitmask); /** * Function to be called before we give up with detection for a given flow. * This function reduces the NDPI_UNKNOWN_PROTOCOL detection * * @par ndpi_struct = the detection module * @par flow = the flow given for the detection module * @par protocol_was_guessed = 1 if the protocol was guesses (requires enable_guess = 1), 0 otherwise * @return the detected protocol even if the flow is not completed; * */ ndpi_protocol ndpi_detection_giveup(struct ndpi_detection_module_struct *ndpi_struct, struct ndpi_flow_struct *flow, u_int8_t *protocol_was_guessed); /** * Processes an extra packet in order to get more information for a given protocol * (like SSL getting both client and server certificate even if we already know after * seeing the client certificate what the protocol is) * * @par ndpi_struct = the detection module * @par flow = pointer to the connection state machine * @par packet = unsigned char pointer to the Layer 3 (IP header) * @par packetlen = the length of the packet * @par packet_time_ms = the current timestamp for the packet (expressed in msec) * @par input_info = (optional) flow information provided by the (external) flow manager * @return void * */ void ndpi_process_extra_packet(struct ndpi_detection_module_struct *ndpi_struct, struct ndpi_flow_struct *flow, const unsigned char *packet, const unsigned short packetlen, const u_int64_t packet_time_ms, struct ndpi_flow_input_info *input_info); /** * Processes one packet and returns the ID of the detected protocol. * This is the MAIN PACKET PROCESSING FUNCTION. * * @par ndpi_struct = the detection module * @par flow = pointer to the connection state machine * @par packet = unsigned char pointer to the Layer 3 (IP header) * @par packetlen = the length of the packet * @par packet_time_ms = the current timestamp for the packet (expressed in msec) * @par input_info = (optional) flow information provided by the (external) flow manager * @return the detected ID of the protocol * */ ndpi_protocol ndpi_detection_process_packet(struct ndpi_detection_module_struct *ndpi_struct, struct ndpi_flow_struct *flow, const unsigned char *packet, const unsigned short packetlen, const u_int64_t packet_time_ms, struct ndpi_flow_input_info *input_info); /** * Get the main protocol of the passed flows for the detected module * * * @par flow = the flow given for the detection module * @return the ID of the master protocol detected * */ u_int16_t ndpi_get_flow_masterprotocol(struct ndpi_flow_struct *flow); /** * Get the app protocol of the passed flows for the detected module * * * @par flow = the flow given for the detection module * @return the ID of the app protocol detected * */ u_int16_t ndpi_get_flow_appprotocol(struct ndpi_flow_struct *flow); /** * Get the category of the passed flows for the detected module * * * @par flow = the flow given for the detection module * @return the ID of the category * */ ndpi_protocol_category_t ndpi_get_flow_category(struct ndpi_flow_struct *flow); /** * Get the ndpi protocol data of the passed flows for the detected module * * * @par flow = the flow given for the detection module * @par ndpi_proto = the output struct where to store the requested information * */ void ndpi_get_flow_ndpi_proto(struct ndpi_flow_struct *flow, struct ndpi_proto * ndpi_proto); /** * Query the pointer to the layer 4 packet * * @par l3 = pointer to the layer 3 data * @par l3_len = length of the layer 3 data * @par l4_return = address to the pointer of the layer 4 data if return value == 0, else undefined * @par l4_len_return = length of the layer 4 data if return value == 0, else undefined * @par l4_protocol_return = protocol of the layer 4 data if return value == 0, undefined otherwise * @par flags = limit operation on ipv4 or ipv6 packets. Possible values: NDPI_DETECTION_ONLY_IPV4 - NDPI_DETECTION_ONLY_IPV6 - 0 (any) * @return 0 if layer 4 data could be found correctly; else != 0 * */ u_int8_t ndpi_detection_get_l4(const u_int8_t *l3, u_int16_t l3_len, const u_int8_t **l4_return, u_int16_t *l4_len_return, u_int8_t *l4_protocol_return, u_int32_t flags); /** * Search and return the protocol based on matched ports * * @par ndpi_struct = the detection module * @par shost = source address in host byte order * @par sport = source port number * @par dhost = destination address in host byte order * @par dport = destination port number * @return the struct ndpi_protocol that match the port base protocol * */ ndpi_protocol ndpi_find_port_based_protocol(struct ndpi_detection_module_struct *ndpi_struct/* , u_int8_t proto */, u_int32_t shost, u_int16_t sport, u_int32_t dhost, u_int16_t dport); /** * Search and return the protocol guessed that is undetected * * @par ndpi_struct = the detection module * @par flow = the flow we're trying to guess, NULL if not available * @par proto = the l4 protocol number * @return the struct ndpi_protocol that match the port base protocol * */ ndpi_protocol ndpi_guess_undetected_protocol(struct ndpi_detection_module_struct *ndpi_struct, struct ndpi_flow_struct *flow, u_int8_t proto); /** * Superset of ndpi_guess_undetected_protocol with additional IPv4 guess based on host/port * * @par ndpi_struct = the detection module * @par flow = the flow we're trying to guess, NULL if not available * @par proto = the l4 protocol number * @par shost = source address in host byte order * @par sport = source port number * @par dhost = destination address in host byte order * @par dport = destination port number * @return the struct ndpi_protocol that match the port base protocol * */ ndpi_protocol ndpi_guess_undetected_protocol_v4(struct ndpi_detection_module_struct *ndpi_struct, struct ndpi_flow_struct *flow, u_int8_t proto, u_int32_t shost, u_int16_t sport, u_int32_t dhost, u_int16_t dport); /** * Check if the string passed match with a protocol * * @par ndpi_struct = the detection module * @par string_to_match = the string to match * @par string_to_match_len = the length of the string * @par ret_match = completed returned match information * @return the ID of the matched subprotocol; * -1 if automa is not finalized; * -2 if automa==NULL or string_to_match==NULL or empty string_to_match * */ int ndpi_match_string_subprotocol(struct ndpi_detection_module_struct *ndpi_struct, char *string_to_match, u_int string_to_match_len, ndpi_protocol_match_result *ret_match); /** * Check if the host passed match with a protocol * * @par ndpi_struct = the detection module * @par flow = the flow where match the host * @par string_to_match = the string to match * @par string_to_match_len = the length of the string * @par ret_match = completed returned match information * @par master_protocol_id = value of the ID associated to the master protocol detected * @return the ID of the matched subprotocol * */ u_int16_t ndpi_match_host_subprotocol(struct ndpi_detection_module_struct *ndpi_struct, struct ndpi_flow_struct *flow, char *string_to_match, u_int string_to_match_len, ndpi_protocol_match_result *ret_match, u_int16_t master_protocol_id); /** * Check if the string content passed match with a protocol * * @par ndpi_struct = the detection module * @par flow = the flow where match the host * @par subprotocol_id = subprotocol id */ void ndpi_check_subprotocol_risk(struct ndpi_detection_module_struct *ndpi_str, struct ndpi_flow_struct *flow, u_int16_t subprotocol_id); /** * Exclude protocol from search * * @par ndpi_struct = the detection module * @par flow = the flow where match the host * @par master_protocol_id = value of the ID associated to the master protocol detected * */ void ndpi_exclude_protocol(struct ndpi_detection_module_struct *ndpi_struct, struct ndpi_flow_struct *flow, u_int16_t master_protocol_id, const char *_file, const char *_func,int _line); /** * Check if the string -bigram_to_match- match with a bigram of -automa- * * @par ndpi_mod = the detection module * @par automa = the struct ndpi_automa for the bigram * @par bigram_to_match = the bigram string to match * @return 0 * */ int ndpi_match_bigram(const char *bigram_to_match); /** * Write the protocol name in the buffer -buf- as master_protocol.protocol * * @par ndpi_mod = the detection module * @par proto = the struct ndpi_protocol contain the protocols name * @par buf = the buffer to write the name of the protocols * @par buf_len = the length of the buffer * @return the buffer contains the master_protocol and protocol name * */ char* ndpi_protocol2name(struct ndpi_detection_module_struct *ndpi_mod, ndpi_protocol proto, char *buf, u_int buf_len); /** * Same as ndpi_protocol2name() with the difference that the numeric protocol * name is returned * * @par proto = the struct ndpi_protocol contain the protocols name * @par buf = the buffer to write the name of the protocols * @par buf_len = the length of the buffer * @return the buffer contains the master_protocol and protocol name * */ char* ndpi_protocol2id(ndpi_protocol proto, char *buf, u_int buf_len); /** * Find out if a given category is custom/user-defined * * @par category = the category associated to the protocol * @return 1 if this is a custom user category, 0 otherwise * */ int ndpi_is_custom_category(ndpi_protocol_category_t category); /** * Overwrite a protocol category defined by nDPI with the custom category * * @par ndpi_mod = the detection module * @par protoId = the protocol identifier to overwrite * @par breed = the breed to be associated to the protocol * */ void ndpi_set_proto_breed(struct ndpi_detection_module_struct *ndpi_mod, u_int16_t protoId, ndpi_protocol_breed_t breed); /** * Overwrite a protocol category defined by nDPI with the custom category * * @par ndpi_mod = the detection module * @par protoId = the protocol identifier to overwrite * @par category = the category associated to the protocol * */ void ndpi_set_proto_category(struct ndpi_detection_module_struct *ndpi_mod, u_int16_t protoId, ndpi_protocol_category_t protoCategory); /** * Check if subprotocols of the specified master protocol are just * informative (and not real) * * @par protoId = the (master) protocol identifier to query * @return 1 = the subprotocol is informative, 0 otherwise. * */ u_int8_t ndpi_is_subprotocol_informative(u_int16_t protoId); /** * Set hostname-based protocol * * @par ndpi_mod = the detection module * @par flow = the flow to which this communication belongs to * @par master_protocol = the master protocol for this flow * @par name = the host name * @par name_len = length of the host name * */ int ndpi_match_hostname_protocol(struct ndpi_detection_module_struct *ndpi_mod, struct ndpi_flow_struct *flow, u_int16_t master_protocol, char *name, u_int name_len); /** * Get protocol category as string * * @par mod = the detection module * @par category = the category associated to the protocol * @return the string name of the category * */ const char* ndpi_category_get_name(struct ndpi_detection_module_struct *ndpi_mod, ndpi_protocol_category_t category); /** * Get classification confidence as string * * @par confidence = the confidence value * @return the string name of the confidence result * */ const char* ndpi_confidence_get_name(ndpi_confidence_t confidence); /** * Get FPC confidence as string * * @par confidence = the confidence value * @return the string name of the confidence result * */ const char* ndpi_fpc_confidence_get_name(ndpi_fpc_confidence_t fpc_confidence); /** * Set protocol category string * * @par mod = the detection module * @par category = the category associated to the protocol * @paw name = the string name of the category * */ void ndpi_category_set_name(struct ndpi_detection_module_struct *ndpi_mod, ndpi_protocol_category_t category, char *name); /** * Get protocol category * * @par ndpi_mod = the detection module * @par proto = the struct ndpi_protocol contain the protocols name * @return the protocol category */ ndpi_protocol_category_t ndpi_get_proto_category(struct ndpi_detection_module_struct *ndpi_mod, ndpi_protocol proto); /** * Get the protocol name associated to the ID * * @par mod = the detection module * @par proto_id = the ID of the protocol * @return the buffer contains the master_protocol and protocol name * */ char* ndpi_get_proto_name(struct ndpi_detection_module_struct *mod, u_int16_t proto_id); /** * Return the protocol breed ID associated to the protocol * * @par ndpi_struct = the detection module * @par proto = the ID of the protocol * @return the breed ID associated to the protocol * */ ndpi_protocol_breed_t ndpi_get_proto_breed(struct ndpi_detection_module_struct *ndpi_struct, u_int16_t proto); /** * Return the string name of the protocol breed * * @par ndpi_struct = the detection module * @par breed_id = the breed ID associated to the protocol * @return the string name of the breed ID * */ char* ndpi_get_proto_breed_name(ndpi_protocol_breed_t breed_id); /** * Return the name of the protocol given its ID. * * @par ndpi_mod = the detection module * @par name = the protocol name. You can specify TLS or YouYube but not TLS.YouTube (se ndpi_get_protocol_by_name in this case) * @return the ID of the protocol * */ extern u_int16_t ndpi_get_proto_by_name(struct ndpi_detection_module_struct *ndpi_mod, const char *name); /** * Return the name of the protocol given its ID * * @par ndpi_mod = the detection module * @par id = the protocol id * @return the name of the protocol * */ extern char* ndpi_get_proto_by_id(struct ndpi_detection_module_struct *ndpi_mod, u_int id); /** * Return the name of the protocol given its ID. You can specify TLS.YouTube or just TLS * * @par ndpi_mod = the detection module * @par id = the protocol id * @return the name of the protocol * */ extern ndpi_master_app_protocol ndpi_get_protocol_by_name(struct ndpi_detection_module_struct *ndpi_str, const char *name); /** * Return the ID of the category * * @par ndpi_mod = the detection module * @par proto = the category name * @return the ID of the category * */ int ndpi_get_category_id(struct ndpi_detection_module_struct *ndpi_mod, char *cat); /** * Write the list of the supported protocols * * @par ndpi_mod = the detection module */ void ndpi_dump_protocols(struct ndpi_detection_module_struct *mod, FILE *dump_out); /** * Generate Options list used in OPNsense firewall plugin * * @par opt = The Option list to generate * @par dump_out = Output stream for generated options */ void ndpi_generate_options(u_int opt, FILE *dump_out); /** * Write the list of the scores and their associated risks * * @par dump_out = Output stream for dumped risk scores */ void ndpi_dump_risks_score(FILE *dump_out); /** * Read a file and load the protocols * * Format: :,:,.....@ * * Example: * tcp:80,tcp:3128@HTTP * udp:139@NETBIOS * * @par ndpi_mod = the detection module * @par path = the path of the file * @return 0 if the file is loaded correctly; * -1 generic error * -2 memory allocation error * */ int ndpi_load_protocols_file(struct ndpi_detection_module_struct *ndpi_mod, const char* path); /** * Add an IP-address based risk mask * * @par ndpi_mod = the detection module * @par ip = the IP address for which you wanna set the mask * @par mask = the IP risk mask * @return 0 if the rule is loaded correctly; * -1 else */ int ndpi_add_ip_risk_mask(struct ndpi_detection_module_struct *ndpi_mod, char *ip, ndpi_risk mask); /** * Add a host-address based risk mask * * @par ndpi_mod = the detection module * @par host = the hostname/domain for which you wanna set the mask * @par mask = the host risk mask * @return 0 if the rule is loaded correctly; * -1 else */ int ndpi_add_host_risk_mask(struct ndpi_detection_module_struct *ndpi_mod, char *host, ndpi_risk mask); /** * Add a trusted certificate issuer DN * * @par ndpi_mod = the detection module * @par dn = the issuer DN as it appears in the certificate (example "CN=813845657003339838, O=Code42, OU=TEST, ST=MN, C=US") * @return 0 if the rule is loaded correctly; < 0 in case an error is detected */ int ndpi_add_trusted_issuer_dn(struct ndpi_detection_module_struct *ndpi_mod, char *dn); /** * Read a file and load the categories * * @par ndpi_mod = the detection module * @par path = the path of the file * @par user_data = pointer to some user data value * @return 0 if the file is loaded correctly; * -1 else */ int ndpi_load_categories_file(struct ndpi_detection_module_struct *ndpi_str, const char* path, void *user_data); /** * Loads a file (separated by ) of domain names associated with the specified category * * @par ndpi_mod = the detection module * @par path = the path of the file * @par category_id = Id of the category to which domains will be associated * @return 0 if the file is loaded correctly; * -1 else */ int ndpi_load_category_file(struct ndpi_detection_module_struct *ndpi_str, char* path, ndpi_protocol_category_t category_id); /** * Load files (whose name is _