2 * Copyright (c) 1990, 1991, 1993, 1994, 1995, 1996
3 * The Regents of the University of California. All rights reserved.
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that: (1) source code distributions
7 * retain the above copyright notice and this paragraph in its entirety, (2)
8 * distributions including binary code include the above copyright notice and
9 * this paragraph in its entirety in the documentation or other materials
10 * provided with the distribution, and (3) all advertising materials mentioning
11 * features or use of this software display the following acknowledgement:
12 * ``This product includes software developed by the University of California,
13 * Lawrence Berkeley Laboratory and its contributors.'' Neither the name of
14 * the University nor the names of its contributors may be used to endorse
15 * or promote products derived from this software without specific prior
17 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED
18 * WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF
19 * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
22 /* \summary: Frame Relay printer */
28 #include "netdissect-stdinc.h"
33 #include "netdissect.h"
34 #include "addrtoname.h"
35 #include "ethertype.h"
40 static void frf15_print(netdissect_options
*ndo
, const u_char
*, u_int
);
43 * the frame relay header has a variable length
45 * the EA bit determines if there is another byte
48 * minimum header length is 2 bytes
49 * maximum header length is 4 bytes
52 * +----+----+----+----+----+----+----+----+
53 * | DLCI (6 bits) | CR | EA |
54 * +----+----+----+----+----+----+----+----+
55 * | DLCI (4 bits) |FECN|BECN| DE | EA |
56 * +----+----+----+----+----+----+----+----+
57 * | DLCI (7 bits) | EA |
58 * +----+----+----+----+----+----+----+----+
59 * | DLCI (6 bits) |SDLC| EA |
60 * +----+----+----+----+----+----+----+----+
63 #define FR_EA_BIT 0x01
65 #define FR_CR_BIT 0x02000000
66 #define FR_DE_BIT 0x00020000
67 #define FR_BECN_BIT 0x00040000
68 #define FR_FECN_BIT 0x00080000
69 #define FR_SDLC_BIT 0x00000002
72 static const struct tok fr_header_flag_values
[] = {
75 { FR_BECN_BIT
, "BECN" },
76 { FR_FECN_BIT
, "FECN" },
77 { FR_SDLC_BIT
, "sdlcore" },
82 #define MFR_B_BIT 0x80
83 #define MFR_E_BIT 0x40
84 #define MFR_C_BIT 0x20
85 #define MFR_BEC_MASK (MFR_B_BIT | MFR_E_BIT | MFR_C_BIT)
86 #define MFR_CTRL_FRAME (MFR_B_BIT | MFR_E_BIT | MFR_C_BIT)
87 #define MFR_FRAG_FRAME (MFR_B_BIT | MFR_E_BIT )
89 static const struct tok frf_flag_values
[] = {
90 { MFR_B_BIT
, "Begin" },
92 { MFR_C_BIT
, "Control" },
96 /* Finds out Q.922 address length, DLCI and flags. Returns 1 on success,
97 * 0 on invalid address, -1 on truncated packet
98 * save the flags dep. on address length
100 static int parse_q922_header(netdissect_options
*ndo
,
101 const u_char
*p
, u_int
*dlci
,
102 u_int
*addr_len
, uint32_t *flags
, u_int length
)
104 if (!ND_TTEST_1(p
) || length
< 1)
106 if ((GET_U_1(p
) & FR_EA_BIT
))
109 if (!ND_TTEST_1(p
+ 1) || length
< 2)
112 *dlci
= ((GET_U_1(p
) & 0xFC) << 2) | ((GET_U_1(p
+ 1) & 0xF0) >> 4);
114 *flags
= ((GET_U_1(p
) & 0x02) << 24) | /* CR flag */
115 ((GET_U_1(p
+ 1) & 0x0e) << 16); /* FECN,BECN,DE flags */
117 if (GET_U_1(p
+ 1) & FR_EA_BIT
)
118 return 1; /* 2-byte Q.922 address */
122 if (!ND_TTEST_1(p
) || length
< 1)
124 (*addr_len
)++; /* 3- or 4-byte Q.922 address */
125 if ((GET_U_1(p
) & FR_EA_BIT
) == 0) {
126 *dlci
= (*dlci
<< 7) | (GET_U_1(p
) >> 1);
127 (*addr_len
)++; /* 4-byte Q.922 address */
132 if (!ND_TTEST_1(p
) || length
< 1)
134 if ((GET_U_1(p
) & FR_EA_BIT
) == 0)
135 return 0; /* more than 4 bytes of Q.922 address? */
137 *flags
= *flags
| (GET_U_1(p
) & 0x02); /* SDLC flag */
139 *dlci
= (*dlci
<< 6) | (GET_U_1(p
) >> 2);
145 q922_string(netdissect_options
*ndo
, const u_char
*p
, u_int length
)
148 static u_int dlci
, addr_len
;
149 static uint32_t flags
;
150 static char buffer
[sizeof("DLCI xxxxxxxxxx")];
151 memset(buffer
, 0, sizeof(buffer
));
153 if (parse_q922_header(ndo
, p
, &dlci
, &addr_len
, &flags
, length
) == 1){
154 snprintf(buffer
, sizeof(buffer
), "DLCI %u", dlci
);
161 /* Frame Relay packet structure, with flags and CRC removed
163 +---------------------------+
167 +---------------------------+
168 | Control (UI = 0x03) |
169 +---------------------------+
170 | Optional Pad (0x00) |
171 +---------------------------+
173 +---------------------------+
180 +---------------------------+
182 * Q.922 addresses, as presently defined, are two octets and
183 contain a 10-bit DLCI. In some networks Q.922 addresses
184 may optionally be increased to three or four octets.
188 fr_hdr_print(netdissect_options
*ndo
, int length
, u_int addr_len
,
189 u_int dlci
, uint32_t flags
, uint16_t nlpid
)
191 if (ndo
->ndo_qflag
) {
192 ND_PRINT("Q.922, DLCI %u, length %u: ",
196 if (nlpid
<= 0xff) /* if its smaller than 256 then its a NLPID */
197 ND_PRINT("Q.922, hdr-len %u, DLCI %u, Flags [%s], NLPID %s (0x%02x), length %u: ",
200 bittok2str(fr_header_flag_values
, "none", flags
),
201 tok2str(nlpid_values
,"unknown", nlpid
),
204 else /* must be an ethertype */
205 ND_PRINT("Q.922, hdr-len %u, DLCI %u, Flags [%s], cisco-ethertype %s (0x%04x), length %u: ",
208 bittok2str(fr_header_flag_values
, "none", flags
),
209 tok2str(ethertype_values
, "unknown", nlpid
),
216 fr_if_print(netdissect_options
*ndo
,
217 const struct pcap_pkthdr
*h
, const u_char
*p
)
219 u_int length
= h
->len
;
220 u_int caplen
= h
->caplen
;
222 ndo
->ndo_protocol
= "fr_if";
223 ND_TCHECK_4(p
); /* minimum frame header length */
225 if ((length
= fr_print(ndo
, p
, length
)) == 0)
235 fr_print(netdissect_options
*ndo
,
236 const u_char
*p
, u_int length
)
239 uint16_t extracted_ethertype
;
246 ndo
->ndo_protocol
= "fr";
247 ret
= parse_q922_header(ndo
, p
, &dlci
, &addr_len
, &flags
, length
);
251 ND_PRINT("Q.922, invalid address");
255 ND_TCHECK_1(p
+ addr_len
);
256 if (length
< addr_len
+ 1)
259 if (GET_U_1(p
+ addr_len
) != LLC_UI
&& dlci
!= 0) {
261 * Let's figure out if we have Cisco-style encapsulation,
262 * with an Ethernet type (Cisco HDLC type?) following the
265 if (!ND_TTEST_2(p
+ addr_len
) || length
< addr_len
+ 2) {
267 ND_PRINT("UI %02x! ", GET_U_1(p
+ addr_len
));
269 extracted_ethertype
= GET_BE_U_2(p
+ addr_len
);
272 fr_hdr_print(ndo
, length
, addr_len
, dlci
,
273 flags
, extracted_ethertype
);
275 if (ethertype_print(ndo
, extracted_ethertype
,
276 p
+addr_len
+ETHERTYPE_LEN
,
277 length
-addr_len
-ETHERTYPE_LEN
,
278 ND_BYTES_AVAILABLE_AFTER(p
)-addr_len
-ETHERTYPE_LEN
,
280 /* ether_type not known, probably it wasn't one */
281 ND_PRINT("UI %02x! ", GET_U_1(p
+ addr_len
));
287 ND_TCHECK_1(p
+ addr_len
+ 1);
288 if (length
< addr_len
+ 2)
291 if (GET_U_1(p
+ addr_len
+ 1) == 0) {
293 * Assume a pad byte after the control (UI) byte.
294 * A pad byte should only be used with 3-byte Q.922.
298 hdr_len
= addr_len
+ 1 /* UI */ + 1 /* pad */ + 1 /* NLPID */;
302 * A pad byte should be used with 3-byte Q.922.
305 ND_PRINT("No pad! ");
306 hdr_len
= addr_len
+ 1 /* UI */ + 1 /* NLPID */;
309 ND_TCHECK_1(p
+ hdr_len
- 1);
310 if (length
< hdr_len
)
312 nlpid
= GET_U_1(p
+ hdr_len
- 1);
315 fr_hdr_print(ndo
, length
, addr_len
, dlci
, flags
, nlpid
);
321 ip_print(ndo
, p
, length
);
325 ip6_print(ndo
, p
, length
);
331 isoclns_print(ndo
, p
- 1, length
+ 1); /* OSI printers need the NLPID field */
335 if (snap_print(ndo
, p
, length
, ND_BYTES_AVAILABLE_AFTER(p
), NULL
, NULL
, 0) == 0) {
336 /* ether_type not known, print raw packet */
338 fr_hdr_print(ndo
, length
+ hdr_len
, hdr_len
,
340 if (!ndo
->ndo_suppress_default_print
)
341 ND_DEFAULTPRINT(p
- hdr_len
, length
+ hdr_len
);
346 q933_print(ndo
, p
, length
);
350 frf15_print(ndo
, p
, length
);
354 ppp_print(ndo
, p
, length
);
359 fr_hdr_print(ndo
, length
+ hdr_len
, addr_len
,
362 ND_DEFAULTPRINT(p
, length
);
374 mfr_if_print(netdissect_options
*ndo
,
375 const struct pcap_pkthdr
*h
, const u_char
*p
)
377 u_int length
= h
->len
;
378 u_int caplen
= h
->caplen
;
380 ndo
->ndo_protocol
= "mfr_if";
381 ND_TCHECK_2(p
); /* minimum frame header length */
383 if ((length
= mfr_print(ndo
, p
, length
)) == 0)
393 #define MFR_CTRL_MSG_ADD_LINK 1
394 #define MFR_CTRL_MSG_ADD_LINK_ACK 2
395 #define MFR_CTRL_MSG_ADD_LINK_REJ 3
396 #define MFR_CTRL_MSG_HELLO 4
397 #define MFR_CTRL_MSG_HELLO_ACK 5
398 #define MFR_CTRL_MSG_REMOVE_LINK 6
399 #define MFR_CTRL_MSG_REMOVE_LINK_ACK 7
401 static const struct tok mfr_ctrl_msg_values
[] = {
402 { MFR_CTRL_MSG_ADD_LINK
, "Add Link" },
403 { MFR_CTRL_MSG_ADD_LINK_ACK
, "Add Link ACK" },
404 { MFR_CTRL_MSG_ADD_LINK_REJ
, "Add Link Reject" },
405 { MFR_CTRL_MSG_HELLO
, "Hello" },
406 { MFR_CTRL_MSG_HELLO_ACK
, "Hello ACK" },
407 { MFR_CTRL_MSG_REMOVE_LINK
, "Remove Link" },
408 { MFR_CTRL_MSG_REMOVE_LINK_ACK
, "Remove Link ACK" },
412 #define MFR_CTRL_IE_BUNDLE_ID 1
413 #define MFR_CTRL_IE_LINK_ID 2
414 #define MFR_CTRL_IE_MAGIC_NUM 3
415 #define MFR_CTRL_IE_TIMESTAMP 5
416 #define MFR_CTRL_IE_VENDOR_EXT 6
417 #define MFR_CTRL_IE_CAUSE 7
419 static const struct tok mfr_ctrl_ie_values
[] = {
420 { MFR_CTRL_IE_BUNDLE_ID
, "Bundle ID"},
421 { MFR_CTRL_IE_LINK_ID
, "Link ID"},
422 { MFR_CTRL_IE_MAGIC_NUM
, "Magic Number"},
423 { MFR_CTRL_IE_TIMESTAMP
, "Timestamp"},
424 { MFR_CTRL_IE_VENDOR_EXT
, "Vendor Extension"},
425 { MFR_CTRL_IE_CAUSE
, "Cause"},
429 #define MFR_ID_STRING_MAXLEN 50
431 struct ie_tlv_header_t
{
437 mfr_print(netdissect_options
*ndo
,
438 const u_char
*p
, u_int length
)
440 u_int tlen
,idx
,hdr_len
= 0;
441 uint16_t sequence_num
;
442 uint8_t ie_type
,ie_len
;
447 * FRF.16 Link Integrity Control Frame
450 * +----+----+----+----+----+----+----+----+
451 * | B | E | C=1| 0 0 0 0 | EA |
452 * +----+----+----+----+----+----+----+----+
453 * | 0 0 0 0 0 0 0 0 |
454 * +----+----+----+----+----+----+----+----+
456 * +----+----+----+----+----+----+----+----+
459 ndo
->ndo_protocol
= "mfr";
461 if (length
< 4) { /* minimum frame header length */
462 ND_PRINT("[length %u < 4]", length
);
463 nd_print_invalid(ndo
);
468 if ((GET_U_1(p
) & MFR_BEC_MASK
) == MFR_CTRL_FRAME
&& GET_U_1(p
+ 1) == 0) {
469 ND_PRINT("FRF.16 Control, Flags [%s], %s, length %u",
470 bittok2str(frf_flag_values
,"none",(GET_U_1(p
) & MFR_BEC_MASK
)),
471 tok2str(mfr_ctrl_msg_values
,"Unknown Message (0x%02x)",GET_U_1(p
+ 2)),
480 while (tlen
>sizeof(struct ie_tlv_header_t
)) {
481 ND_TCHECK_LEN(tptr
, sizeof(struct ie_tlv_header_t
));
482 ie_type
=GET_U_1(tptr
);
483 ie_len
=GET_U_1(tptr
+ 1);
485 ND_PRINT("\n\tIE %s (%u), length %u: ",
486 tok2str(mfr_ctrl_ie_values
,"Unknown",ie_type
),
490 /* infinite loop check */
491 if (ie_type
== 0 || ie_len
<= sizeof(struct ie_tlv_header_t
))
494 ND_TCHECK_LEN(tptr
, ie_len
);
495 tptr
+=sizeof(struct ie_tlv_header_t
);
496 /* tlv len includes header */
497 ie_len
-=sizeof(struct ie_tlv_header_t
);
498 tlen
-=sizeof(struct ie_tlv_header_t
);
502 case MFR_CTRL_IE_MAGIC_NUM
:
503 /* FRF.16.1 Section 3.4.3 Magic Number Information Element */
505 ND_PRINT("[IE data length %d != 4]", ie_len
);
506 nd_print_invalid(ndo
);
509 ND_PRINT("0x%08x", GET_BE_U_4(tptr
));
512 case MFR_CTRL_IE_BUNDLE_ID
: /* same message format */
513 case MFR_CTRL_IE_LINK_ID
:
514 for (idx
= 0; idx
< ie_len
&& idx
< MFR_ID_STRING_MAXLEN
; idx
++) {
515 if (GET_U_1(tptr
+ idx
) != 0) /* don't print null termination */
516 fn_print_char(ndo
, GET_U_1(tptr
+ idx
));
522 case MFR_CTRL_IE_TIMESTAMP
:
523 if (ie_len
== sizeof(struct timeval
)) {
524 ts_print(ndo
, (const struct timeval
*)tptr
);
527 /* fall through and hexdump if no unix timestamp */
531 * FIXME those are the defined IEs that lack a decoder
532 * you are welcome to contribute code ;-)
535 case MFR_CTRL_IE_VENDOR_EXT
:
536 case MFR_CTRL_IE_CAUSE
:
539 if (ndo
->ndo_vflag
<= 1)
540 print_unknown_data(ndo
, tptr
, "\n\t ", ie_len
);
544 /* do we want to see a hexdump of the IE ? */
545 if (ndo
->ndo_vflag
> 1 )
546 print_unknown_data(ndo
, tptr
, "\n\t ", ie_len
);
554 * FRF.16 Fragmentation Frame
557 * +----+----+----+----+----+----+----+----+
558 * | B | E | C=0|seq. (high 4 bits) | EA |
559 * +----+----+----+----+----+----+----+----+
560 * | sequence (low 8 bits) |
561 * +----+----+----+----+----+----+----+----+
562 * | DLCI (6 bits) | CR | EA |
563 * +----+----+----+----+----+----+----+----+
564 * | DLCI (4 bits) |FECN|BECN| DE | EA |
565 * +----+----+----+----+----+----+----+----+
568 sequence_num
= (GET_U_1(p
)&0x1e)<<7 | GET_U_1(p
+ 1);
569 /* whole packet or first fragment ? */
570 if ((GET_U_1(p
) & MFR_BEC_MASK
) == MFR_FRAG_FRAME
||
571 (GET_U_1(p
) & MFR_BEC_MASK
) == MFR_B_BIT
) {
572 ND_PRINT("FRF.16 Frag, seq %u, Flags [%s], ",
574 bittok2str(frf_flag_values
,"none",(GET_U_1(p
) & MFR_BEC_MASK
)));
576 fr_print(ndo
, p
+hdr_len
,length
-hdr_len
);
580 /* must be a middle or the last fragment */
581 ND_PRINT("FRF.16 Frag, seq %u, Flags [%s]",
583 bittok2str(frf_flag_values
,"none",(GET_U_1(p
) & MFR_BEC_MASK
)));
584 print_unknown_data(ndo
, p
, "\n\t", length
);
593 /* an NLPID of 0xb1 indicates a 2-byte
597 * +----+----+----+----+----+----+----+----+
599 * +----+----+----+----+----+----+----+----+
600 * | NLPID (8 bits) | NLPID=0xb1
601 * +----+----+----+----+----+----+----+----+
602 * | B | E | C |seq. (high 4 bits) | R |
603 * +----+----+----+----+----+----+----+----+
604 * | sequence (low 8 bits) |
605 * +----+----+----+----+----+----+----+----+
608 #define FR_FRF15_FRAGTYPE 0x01
611 frf15_print(netdissect_options
*ndo
,
612 const u_char
*p
, u_int length
)
614 uint16_t sequence_num
, flags
;
620 flags
= GET_U_1(p
)&MFR_BEC_MASK
;
621 sequence_num
= (GET_U_1(p
)&0x1e)<<7 | GET_U_1(p
+ 1);
623 ND_PRINT("FRF.15, seq 0x%03x, Flags [%s],%s Fragmentation, length %u",
625 bittok2str(frf_flag_values
,"none",flags
),
626 GET_U_1(p
)&FR_FRF15_FRAGTYPE
? "Interface" : "End-to-End",
630 * depending on all permutations of the B, E and C bit
631 * dig as deep as we can - e.g. on the first (B) fragment
632 * there is enough payload to print the IP header
633 * on non (B) fragments it depends if the fragmentation
634 * model is end-to-end or interface based wether we want to print
635 * another Q.922 header
644 * Q.933 decoding portion for framerelay specific.
647 /* Q.933 packet format
648 Format of Other Protocols
650 +-------------------------------+
652 +---------------+---------------+
653 |Control 0x03 | NLPID 0x08 |
654 +---------------+---------------+
656 | octet 1 | octet 2 |
657 +-------------------------------+
659 | octet 2 | octet 2 |
660 +-------------------------------+
662 +-------------------------------+
664 +-------------------------------+
667 /* L2 (Octet 1)- Call Reference Usually is 0x0 */
670 * L2 (Octet 2)- Message Types definition 1 byte long.
673 #define MSG_TYPE_ESC_TO_NATIONAL 0x00
674 #define MSG_TYPE_ALERT 0x01
675 #define MSG_TYPE_CALL_PROCEEDING 0x02
676 #define MSG_TYPE_CONNECT 0x07
677 #define MSG_TYPE_CONNECT_ACK 0x0F
678 #define MSG_TYPE_PROGRESS 0x03
679 #define MSG_TYPE_SETUP 0x05
681 #define MSG_TYPE_DISCONNECT 0x45
682 #define MSG_TYPE_RELEASE 0x4D
683 #define MSG_TYPE_RELEASE_COMPLETE 0x5A
684 #define MSG_TYPE_RESTART 0x46
685 #define MSG_TYPE_RESTART_ACK 0x4E
687 #define MSG_TYPE_STATUS 0x7D
688 #define MSG_TYPE_STATUS_ENQ 0x75
690 static const struct tok fr_q933_msg_values
[] = {
691 { MSG_TYPE_ESC_TO_NATIONAL
, "ESC to National" },
692 { MSG_TYPE_ALERT
, "Alert" },
693 { MSG_TYPE_CALL_PROCEEDING
, "Call proceeding" },
694 { MSG_TYPE_CONNECT
, "Connect" },
695 { MSG_TYPE_CONNECT_ACK
, "Connect ACK" },
696 { MSG_TYPE_PROGRESS
, "Progress" },
697 { MSG_TYPE_SETUP
, "Setup" },
698 { MSG_TYPE_DISCONNECT
, "Disconnect" },
699 { MSG_TYPE_RELEASE
, "Release" },
700 { MSG_TYPE_RELEASE_COMPLETE
, "Release Complete" },
701 { MSG_TYPE_RESTART
, "Restart" },
702 { MSG_TYPE_RESTART_ACK
, "Restart ACK" },
703 { MSG_TYPE_STATUS
, "Status Reply" },
704 { MSG_TYPE_STATUS_ENQ
, "Status Enquiry" },
708 #define IE_IS_SINGLE_OCTET(iecode) ((iecode) & 0x80)
709 #define IE_IS_SHIFT(iecode) (((iecode) & 0xF0) == 0x90)
710 #define IE_SHIFT_IS_NON_LOCKING(iecode) ((iecode) & 0x08)
711 #define IE_SHIFT_IS_LOCKING(iecode) (!(IE_SHIFT_IS_NON_LOCKING(iecode)))
712 #define IE_SHIFT_CODESET(iecode) ((iecode) & 0x07)
714 #define FR_LMI_ANSI_REPORT_TYPE_IE 0x01
715 #define FR_LMI_ANSI_LINK_VERIFY_IE_91 0x19 /* details? */
716 #define FR_LMI_ANSI_LINK_VERIFY_IE 0x03
717 #define FR_LMI_ANSI_PVC_STATUS_IE 0x07
719 #define FR_LMI_CCITT_REPORT_TYPE_IE 0x51
720 #define FR_LMI_CCITT_LINK_VERIFY_IE 0x53
721 #define FR_LMI_CCITT_PVC_STATUS_IE 0x57
723 static const struct tok fr_q933_ie_values_codeset_0_5
[] = {
724 { FR_LMI_ANSI_REPORT_TYPE_IE
, "ANSI Report Type" },
725 { FR_LMI_ANSI_LINK_VERIFY_IE_91
, "ANSI Link Verify" },
726 { FR_LMI_ANSI_LINK_VERIFY_IE
, "ANSI Link Verify" },
727 { FR_LMI_ANSI_PVC_STATUS_IE
, "ANSI PVC Status" },
728 { FR_LMI_CCITT_REPORT_TYPE_IE
, "CCITT Report Type" },
729 { FR_LMI_CCITT_LINK_VERIFY_IE
, "CCITT Link Verify" },
730 { FR_LMI_CCITT_PVC_STATUS_IE
, "CCITT PVC Status" },
734 #define FR_LMI_REPORT_TYPE_IE_FULL_STATUS 0
735 #define FR_LMI_REPORT_TYPE_IE_LINK_VERIFY 1
736 #define FR_LMI_REPORT_TYPE_IE_ASYNC_PVC 2
738 static const struct tok fr_lmi_report_type_ie_values
[] = {
739 { FR_LMI_REPORT_TYPE_IE_FULL_STATUS
, "Full Status" },
740 { FR_LMI_REPORT_TYPE_IE_LINK_VERIFY
, "Link verify" },
741 { FR_LMI_REPORT_TYPE_IE_ASYNC_PVC
, "Async PVC Status" },
745 /* array of 16 codesets - currently we only support codepage 0 and 5 */
746 static const struct tok
*fr_q933_ie_codesets
[] = {
747 fr_q933_ie_values_codeset_0_5
,
752 fr_q933_ie_values_codeset_0_5
,
765 static int fr_q933_print_ie_codeset_0_5(netdissect_options
*ndo
, u_int iecode
,
766 u_int ielength
, const u_char
*p
);
768 typedef int (*codeset_pr_func_t
)(netdissect_options
*, u_int iecode
,
769 u_int ielength
, const u_char
*p
);
771 /* array of 16 codesets - currently we only support codepage 0 and 5 */
772 static const codeset_pr_func_t fr_q933_print_ie_codeset
[] = {
773 fr_q933_print_ie_codeset_0_5
,
778 fr_q933_print_ie_codeset_0_5
,
794 * p points to octet 2, the octet containing the length of the
795 * call reference value, so p[n] is octet n+2 ("octet X" is as
796 * used in Q.931/Q.933).
798 * XXX - actually used both for Q.931 and Q.933.
801 q933_print(netdissect_options
*ndo
,
802 const u_char
*p
, u_int length
)
805 u_int call_ref_length
, i
;
806 uint8_t call_ref
[15]; /* maximum length - length field is 4 bits */
813 u_int non_locking_shift
;
814 u_int unshift_codeset
;
816 ndo
->ndo_protocol
= "q.933";
817 ND_PRINT("%s", ndo
->ndo_eflag
? "" : "Q.933");
819 if (length
== 0 || !ND_TTEST_1(p
)) {
822 ND_PRINT("length %u", length
);
827 * Get the length of the call reference value.
829 olen
= length
; /* preserve the original length for display */
830 call_ref_length
= GET_U_1(p
) & 0x0f;
835 * Get the call reference value.
837 for (i
= 0; i
< call_ref_length
; i
++) {
838 if (length
== 0 || !ND_TTEST_1(p
)) {
841 ND_PRINT("length %u", olen
);
844 call_ref
[i
] = GET_U_1(p
);
850 * Get the message type.
852 if (length
== 0 || !ND_TTEST_1(p
)) {
855 ND_PRINT("length %u", olen
);
858 msgtype
= GET_U_1(p
);
863 * Peek ahead to see if we start with a shift.
865 non_locking_shift
= 0;
866 unshift_codeset
= codeset
;
868 if (!ND_TTEST_1(p
)) {
871 ND_PRINT("length %u", olen
);
875 if (IE_IS_SHIFT(iecode
)) {
877 * It's a shift. Skip over it.
885 codeset
= IE_SHIFT_CODESET(iecode
);
888 * If it's a locking shift to codeset 5,
889 * mark this as ANSI. (XXX - 5 is actually
890 * for national variants in general, not
891 * the US variant in particular, but maybe
892 * this is more American exceptionalism. :-))
894 if (IE_SHIFT_IS_LOCKING(iecode
)) {
896 * It's a locking shift.
900 * It's a locking shift to
901 * codeset 5, so this is
908 * It's a non-locking shift.
909 * Remember the current codeset, so we
910 * can revert to it after the next IE.
912 non_locking_shift
= 1;
918 /* printing out header part */
921 ND_PRINT("%s, codeset %u", is_ansi
? "ANSI" : "CCITT", codeset
);
923 if (call_ref_length
!= 0) {
925 if (call_ref_length
> 1 || GET_U_1(p
) != 0) {
927 * Not a dummy call reference.
929 ND_PRINT(", Call Ref: 0x");
930 for (i
= 0; i
< call_ref_length
; i
++)
931 ND_PRINT("%02x", call_ref
[i
]);
934 if (ndo
->ndo_vflag
) {
935 ND_PRINT(", %s (0x%02x), length %u",
936 tok2str(fr_q933_msg_values
,
937 "unknown message", msgtype
),
942 tok2str(fr_q933_msg_values
,
943 "unknown message 0x%02x", msgtype
));
946 /* Loop through the rest of the IEs */
947 while (length
!= 0) {
949 * What's the state of any non-locking shifts?
951 if (non_locking_shift
== 1) {
953 * There's a non-locking shift in effect for
954 * this IE. Count it, so we reset the codeset
955 * before the next IE.
957 non_locking_shift
= 2;
958 } else if (non_locking_shift
== 2) {
962 codeset
= unshift_codeset
;
963 non_locking_shift
= 0;
967 * Get the first octet of the IE.
969 if (!ND_TTEST_1(p
)) {
970 if (!ndo
->ndo_vflag
) {
971 ND_PRINT(", length %u", olen
);
979 /* Single-octet IE? */
980 if (IE_IS_SINGLE_OCTET(iecode
)) {
982 * Yes. Is it a shift?
984 if (IE_IS_SHIFT(iecode
)) {
986 * Yes. Is it locking?
988 if (IE_SHIFT_IS_LOCKING(iecode
)) {
992 non_locking_shift
= 0;
995 * No. Remember the current
996 * codeset, so we can revert
997 * to it after the next IE.
999 non_locking_shift
= 1;
1000 unshift_codeset
= codeset
;
1006 codeset
= IE_SHIFT_CODESET(iecode
);
1010 * No. Get the IE length.
1012 if (length
== 0 || !ND_TTEST_1(p
)) {
1013 if (!ndo
->ndo_vflag
) {
1014 ND_PRINT(", length %u", olen
);
1018 ielength
= GET_U_1(p
);
1022 /* lets do the full IE parsing only in verbose mode
1023 * however some IEs (DLCI Status, Link Verify)
1024 * are also interesting in non-verbose mode */
1025 if (ndo
->ndo_vflag
) {
1026 ND_PRINT("\n\t%s IE (0x%02x), length %u: ",
1027 tok2str(fr_q933_ie_codesets
[codeset
],
1034 if (iecode
== 0 || ielength
== 0) {
1037 if (length
< ielength
|| !ND_TTEST_LEN(p
, ielength
)) {
1038 if (!ndo
->ndo_vflag
) {
1039 ND_PRINT(", length %u", olen
);
1045 if (fr_q933_print_ie_codeset
[codeset
] != NULL
) {
1046 ie_is_known
= fr_q933_print_ie_codeset
[codeset
](ndo
, iecode
, ielength
, p
);
1051 * Known IE; do we want to see a hexdump
1054 if (ndo
->ndo_vflag
> 1) {
1056 print_unknown_data(ndo
, p
, "\n\t ", ielength
);
1060 * Unknown IE; if we're printing verbosely,
1061 * print its content in hex.
1063 if (ndo
->ndo_vflag
>= 1) {
1064 print_unknown_data(ndo
, p
, "\n\t", ielength
);
1072 if (!ndo
->ndo_vflag
) {
1073 ND_PRINT(", length %u", olen
);
1078 nd_print_trunc(ndo
);
1082 fr_q933_print_ie_codeset_0_5(netdissect_options
*ndo
, u_int iecode
,
1083 u_int ielength
, const u_char
*p
)
1089 case FR_LMI_ANSI_REPORT_TYPE_IE
: /* fall through */
1090 case FR_LMI_CCITT_REPORT_TYPE_IE
:
1092 if (!ndo
->ndo_vflag
) {
1095 ND_PRINT("Invalid REPORT TYPE IE");
1098 if (ndo
->ndo_vflag
) {
1100 tok2str(fr_lmi_report_type_ie_values
,"unknown",GET_U_1(p
)),
1105 case FR_LMI_ANSI_LINK_VERIFY_IE
: /* fall through */
1106 case FR_LMI_CCITT_LINK_VERIFY_IE
:
1107 case FR_LMI_ANSI_LINK_VERIFY_IE_91
:
1108 if (!ndo
->ndo_vflag
) {
1112 ND_PRINT("Invalid LINK VERIFY IE");
1115 ND_PRINT("TX Seq: %3d, RX Seq: %3d", GET_U_1(p
), GET_U_1(p
+ 1));
1118 case FR_LMI_ANSI_PVC_STATUS_IE
: /* fall through */
1119 case FR_LMI_CCITT_PVC_STATUS_IE
:
1120 if (!ndo
->ndo_vflag
) {
1123 /* now parse the DLCI information element. */
1124 if ((ielength
< 3) ||
1125 (GET_U_1(p
) & 0x80) ||
1126 ((ielength
== 3) && !(GET_U_1(p
+ 1) & 0x80)) ||
1128 ((GET_U_1(p
+ 1) & 0x80) || !(GET_U_1(p
+ 2) & 0x80))) ||
1130 ((GET_U_1(p
+ 1) & 0x80) || (GET_U_1(p
+ 2) & 0x80) ||
1131 !(GET_U_1(p
+ 3) & 0x80))) ||
1133 !(GET_U_1(p
+ ielength
- 1) & 0x80)) {
1134 ND_PRINT("Invalid DLCI in PVC STATUS IE");
1138 dlci
= ((GET_U_1(p
) & 0x3F) << 4) | ((GET_U_1(p
+ 1) & 0x78) >> 3);
1139 if (ielength
== 4) {
1140 dlci
= (dlci
<< 6) | ((GET_U_1(p
+ 2) & 0x7E) >> 1);
1142 else if (ielength
== 5) {
1143 dlci
= (dlci
<< 13) | (GET_U_1(p
+ 2) & 0x7F) | ((GET_U_1(p
+ 3) & 0x7E) >> 1);
1146 ND_PRINT("DLCI %u: status %s%s", dlci
,
1147 GET_U_1(p
+ ielength
- 1) & 0x8 ? "New, " : "",
1148 GET_U_1(p
+ ielength
- 1) & 0x2 ? "Active" : "Inactive");