2 * Copyright (c) 1991, 1993, 1994, 1995, 1996, 1997
3 * The Regents of the University of California. All rights reserved.
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that: (1) source code distributions
7 * retain the above copyright notice and this paragraph in its entirety, (2)
8 * distributions including binary code include the above copyright notice and
9 * this paragraph in its entirety in the documentation or other materials
10 * provided with the distribution, and (3) all advertising materials mentioning
11 * features or use of this software display the following acknowledgement:
12 * ``This product includes software developed by the University of California,
13 * Lawrence Berkeley Laboratory and its contributors.'' Neither the name of
14 * the University nor the names of its contributors may be used to endorse
15 * or promote products derived from this software without specific prior
17 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED
18 * WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF
19 * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
22 /* \summary: BSD loopback device printer */
28 #include "netdissect-stdinc.h"
32 #include "netdissect.h"
36 static const char tstr
[] = " [|null]";
39 * The DLT_NULL packet header is 4 bytes long. It contains a host-byte-order
40 * 32-bit integer that specifies the family, e.g. AF_INET.
42 * Note here that "host" refers to the host on which the packets were
43 * captured; that isn't necessarily *this* host.
45 * The OpenBSD DLT_LOOP packet header is the same, except that the integer
46 * is in network byte order.
51 * Byte-swap a 32-bit number.
52 * ("htonl()" or "ntohl()" won't work - we want to byte-swap even on
53 * big-endian platforms.)
56 ((((y)&0xff)<<24) | (((y)&0xff00)<<8) | (((y)&0xff0000)>>8) | (((y)>>24)&0xff))
59 null_hdr_print(netdissect_options
*ndo
, u_int family
, u_int length
)
61 if (!ndo
->ndo_qflag
) {
62 ND_PRINT("AF %s (%u)",
63 tok2str(bsd_af_values
,"Unknown",family
),family
);
66 tok2str(bsd_af_values
,"Unknown AF %u",family
));
69 ND_PRINT(", length %u: ", length
);
73 * This is the top level routine of the printer. 'p' points
74 * to the ether header of the packet, 'h->ts' is the timestamp,
75 * 'h->len' is the length of the packet off the wire, and 'h->caplen'
76 * is the number of bytes actually captured.
79 null_if_print(netdissect_options
*ndo
, const struct pcap_pkthdr
*h
, const u_char
*p
)
81 u_int length
= h
->len
;
82 u_int caplen
= h
->caplen
;
85 if (caplen
< NULL_HDRLEN
)
89 memcpy((char *)&family
, (const char *)p
, sizeof(family
));
92 * This isn't necessarily in our host byte order; if this is
93 * a DLT_LOOP capture, it's in network byte order, and if
94 * this is a DLT_NULL capture from a machine with the opposite
95 * byte-order, it's in the opposite byte order from ours.
97 * If the upper 16 bits aren't all zero, assume it's byte-swapped.
99 if ((family
& 0xFFFF0000) != 0)
100 family
= SWAPLONG(family
);
103 null_hdr_print(ndo
, family
, length
);
105 length
-= NULL_HDRLEN
;
106 caplen
-= NULL_HDRLEN
;
112 ip_print(ndo
, p
, length
);
115 case BSD_AFNUM_INET6_BSD
:
116 case BSD_AFNUM_INET6_FREEBSD
:
117 case BSD_AFNUM_INET6_DARWIN
:
118 ip6_print(ndo
, p
, length
);
122 isoclns_print(ndo
, p
, length
);
125 case BSD_AFNUM_APPLETALK
:
126 atalk_print(ndo
, p
, length
);
130 ipx_print(ndo
, p
, length
);
134 /* unknown AF_ value */
136 null_hdr_print(ndo
, family
, length
+ NULL_HDRLEN
);
137 if (!ndo
->ndo_suppress_default_print
)
138 ND_DEFAULTPRINT(p
, caplen
);
141 return (NULL_HDRLEN
);
143 ND_PRINT("%s", tstr
);
144 return (NULL_HDRLEN
);
149 * c-style: whitesmith