]> The Tcpdump Group git mirrors - tcpdump/blob - print-decnet.c
Use 'u_char *' type for input buffer pointer like in most similar cases
[tcpdump] / print-decnet.c
1 /*
2 * Copyright (c) 1992, 1993, 1994, 1995, 1996, 1997
3 * The Regents of the University of California. All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that: (1) source code distributions
7 * retain the above copyright notice and this paragraph in its entirety, (2)
8 * distributions including binary code include the above copyright notice and
9 * this paragraph in its entirety in the documentation or other materials
10 * provided with the distribution, and (3) all advertising materials mentioning
11 * features or use of this software display the following acknowledgement:
12 * ``This product includes software developed by the University of California,
13 * Lawrence Berkeley Laboratory and its contributors.'' Neither the name of
14 * the University nor the names of its contributors may be used to endorse
15 * or promote products derived from this software without specific prior
16 * written permission.
17 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED
18 * WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF
19 * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
20 */
21
22 /* \summary: DECnet printer */
23
24 #ifdef HAVE_CONFIG_H
25 #include "config.h"
26 #endif
27
28 #include <netdissect-stdinc.h>
29
30 #include <stdio.h>
31 #include <stdlib.h>
32 #include <string.h>
33
34 struct mbuf;
35 struct rtentry;
36
37 #ifdef HAVE_DNET_HTOA
38 #ifdef HAVE_NETDNET_DN_H
39 #include <netdnet/dn.h>
40 #endif
41 #ifndef HAVE_STRUCT_DN_NADDR
42 #define DN_MAXADDL 20 /* max size of DECnet address */
43 struct dn_naddr {
44 unsigned short a_len; /* length of address */
45 unsigned char a_addr[DN_MAXADDL]; /* address as bytes */
46 };
47 #endif /* HAVE_STRUCT_DN_NADDR */
48 #ifdef HAVE_NETDNET_DNETDB_H
49 #include <netdnet/dnetdb.h>
50 #endif
51 #ifndef NETDNET_DNETDB_H_DECLARES_DNET_HTOA
52 extern char *dnet_htoa(struct dn_naddr *);
53 #endif
54 #endif
55
56 #include "netdissect.h"
57 #include "extract.h"
58 #include "addrtoname.h"
59
60 static const char tstr[] = "[|decnet]";
61
62 #ifndef _WIN32
63 typedef nd_uint8_t byte; /* single byte field */
64 #else
65 /*
66 * the keyword 'byte' generates conflicts in Windows
67 */
68 typedef nd_uint8_t Byte; /* single byte field */
69 #define byte Byte
70 #endif /* _WIN32 */
71 typedef nd_uint16_t word; /* 2 byte field */
72 typedef nd_uint32_t longword; /* 4 bytes field */
73
74 /*
75 * Definitions for DECNET Phase IV protocol headers
76 */
77 typedef union {
78 nd_byte dne_addr[6]; /* full ethernet address */
79 struct {
80 nd_byte dne_hiord[4]; /* DECnet HIORD prefix */
81 nd_byte dne_nodeaddr[2]; /* DECnet node address */
82 } dne_remote;
83 } etheraddr; /* Ethernet address */
84
85 #define HIORD 0x000400aa /* high 32-bits of address (swapped) */
86
87 #define AREAMASK 0176000 /* mask for area field */
88 #define AREASHIFT 10 /* bit-offset for area field */
89 #define NODEMASK 01777 /* mask for node address field */
90
91 /*
92 * Define long and short header formats.
93 */
94 struct shorthdr
95 {
96 byte sh_flags; /* route flags */
97 word sh_dst; /* destination node address */
98 word sh_src; /* source node address */
99 byte sh_visits; /* visit count */
100 };
101
102 struct longhdr
103 {
104 byte lg_flags; /* route flags */
105 byte lg_darea; /* destination area (reserved) */
106 byte lg_dsarea; /* destination subarea (reserved) */
107 etheraddr lg_dst; /* destination id */
108 byte lg_sarea; /* source area (reserved) */
109 byte lg_ssarea; /* source subarea (reserved) */
110 etheraddr lg_src; /* source id */
111 byte lg_nextl2; /* next level 2 router (reserved) */
112 byte lg_visits; /* visit count */
113 byte lg_service; /* service class (reserved) */
114 byte lg_pt; /* protocol type (reserved) */
115 };
116
117 union routehdr
118 {
119 struct shorthdr rh_short; /* short route header */
120 struct longhdr rh_long; /* long route header */
121 };
122
123 /*
124 * Define the values of various fields in the protocol messages.
125 *
126 * 1. Data packet formats.
127 */
128 #define RMF_MASK 7 /* mask for message type */
129 #define RMF_SHORT 2 /* short message format */
130 #define RMF_LONG 6 /* long message format */
131 #ifndef RMF_RQR
132 #define RMF_RQR 010 /* request return to sender */
133 #define RMF_RTS 020 /* returning to sender */
134 #define RMF_IE 040 /* intra-ethernet packet */
135 #endif /* RMR_RQR */
136 #define RMF_FVER 0100 /* future version flag */
137 #define RMF_PAD 0200 /* pad field */
138 #define RMF_PADMASK 0177 /* pad field mask */
139
140 #define VIS_MASK 077 /* visit field mask */
141
142 /*
143 * 2. Control packet formats.
144 */
145 #define RMF_CTLMASK 017 /* mask for message type */
146 #define RMF_CTLMSG 01 /* control message indicator */
147 #define RMF_INIT 01 /* initialization message */
148 #define RMF_VER 03 /* verification message */
149 #define RMF_TEST 05 /* hello and test message */
150 #define RMF_L1ROUT 07 /* level 1 routing message */
151 #define RMF_L2ROUT 011 /* level 2 routing message */
152 #define RMF_RHELLO 013 /* router hello message */
153 #define RMF_EHELLO 015 /* endnode hello message */
154
155 #define TI_L2ROUT 01 /* level 2 router */
156 #define TI_L1ROUT 02 /* level 1 router */
157 #define TI_ENDNODE 03 /* endnode */
158 #define TI_VERIF 04 /* verification required */
159 #define TI_BLOCK 010 /* blocking requested */
160
161 #define VE_VERS 2 /* version number (2) */
162 #define VE_ECO 0 /* ECO number */
163 #define VE_UECO 0 /* user ECO number (0) */
164
165 #define P3_VERS 1 /* phase III version number (1) */
166 #define P3_ECO 3 /* ECO number (3) */
167 #define P3_UECO 0 /* user ECO number (0) */
168
169 #define II_L2ROUT 01 /* level 2 router */
170 #define II_L1ROUT 02 /* level 1 router */
171 #define II_ENDNODE 03 /* endnode */
172 #define II_VERIF 04 /* verification required */
173 #define II_NOMCAST 040 /* no multicast traffic accepted */
174 #define II_BLOCK 0100 /* blocking requested */
175 #define II_TYPEMASK 03 /* mask for node type */
176
177 #define TESTDATA 0252 /* test data bytes */
178 #define TESTLEN 1 /* length of transmitted test data */
179
180 /*
181 * Define control message formats.
182 */
183 struct initmsgIII /* phase III initialization message */
184 {
185 byte inIII_flags; /* route flags */
186 word inIII_src; /* source node address */
187 byte inIII_info; /* routing layer information */
188 word inIII_blksize; /* maximum data link block size */
189 byte inIII_vers; /* version number */
190 byte inIII_eco; /* ECO number */
191 byte inIII_ueco; /* user ECO number */
192 byte inIII_rsvd; /* reserved image field */
193 };
194
195 struct initmsg /* initialization message */
196 {
197 byte in_flags; /* route flags */
198 word in_src; /* source node address */
199 byte in_info; /* routing layer information */
200 word in_blksize; /* maximum data link block size */
201 byte in_vers; /* version number */
202 byte in_eco; /* ECO number */
203 byte in_ueco; /* user ECO number */
204 word in_hello; /* hello timer */
205 byte in_rsvd; /* reserved image field */
206 };
207
208 struct verifmsg /* verification message */
209 {
210 byte ve_flags; /* route flags */
211 word ve_src; /* source node address */
212 byte ve_fcnval; /* function value image field */
213 };
214
215 struct testmsg /* hello and test message */
216 {
217 byte te_flags; /* route flags */
218 word te_src; /* source node address */
219 byte te_data; /* test data image field */
220 };
221
222 struct l1rout /* level 1 routing message */
223 {
224 byte r1_flags; /* route flags */
225 word r1_src; /* source node address */
226 byte r1_rsvd; /* reserved field */
227 };
228
229 struct l2rout /* level 2 routing message */
230 {
231 byte r2_flags; /* route flags */
232 word r2_src; /* source node address */
233 byte r2_rsvd; /* reserved field */
234 };
235
236 struct rhellomsg /* router hello message */
237 {
238 byte rh_flags; /* route flags */
239 byte rh_vers; /* version number */
240 byte rh_eco; /* ECO number */
241 byte rh_ueco; /* user ECO number */
242 etheraddr rh_src; /* source id */
243 byte rh_info; /* routing layer information */
244 word rh_blksize; /* maximum data link block size */
245 byte rh_priority; /* router's priority */
246 byte rh_area; /* reserved */
247 word rh_hello; /* hello timer */
248 byte rh_mpd; /* reserved */
249 };
250
251 struct ehellomsg /* endnode hello message */
252 {
253 byte eh_flags; /* route flags */
254 byte eh_vers; /* version number */
255 byte eh_eco; /* ECO number */
256 byte eh_ueco; /* user ECO number */
257 etheraddr eh_src; /* source id */
258 byte eh_info; /* routing layer information */
259 word eh_blksize; /* maximum data link block size */
260 byte eh_area; /* area (reserved) */
261 byte eh_seed[8]; /* verification seed */
262 etheraddr eh_router; /* designated router */
263 word eh_hello; /* hello timer */
264 byte eh_mpd; /* (reserved) */
265 byte eh_data; /* test data image field */
266 };
267
268 union controlmsg
269 {
270 struct initmsg cm_init; /* initialization message */
271 struct verifmsg cm_ver; /* verification message */
272 struct testmsg cm_test; /* hello and test message */
273 struct l1rout cm_l1rou; /* level 1 routing message */
274 struct l2rout cm_l2rout; /* level 2 routing message */
275 struct rhellomsg cm_rhello; /* router hello message */
276 struct ehellomsg cm_ehello; /* endnode hello message */
277 };
278
279 /* Macros for decoding routing-info fields */
280 #define RI_COST(x) ((x)&0777)
281 #define RI_HOPS(x) (((x)>>10)&037)
282
283 /*
284 * NSP protocol fields and values.
285 */
286
287 #define NSP_TYPEMASK 014 /* mask to isolate type code */
288 #define NSP_SUBMASK 0160 /* mask to isolate subtype code */
289 #define NSP_SUBSHFT 4 /* shift to move subtype code */
290
291 #define MFT_DATA 0 /* data message */
292 #define MFT_ACK 04 /* acknowledgement message */
293 #define MFT_CTL 010 /* control message */
294
295 #define MFS_ILS 020 /* data or I/LS indicator */
296 #define MFS_BOM 040 /* beginning of message (data) */
297 #define MFS_MOM 0 /* middle of message (data) */
298 #define MFS_EOM 0100 /* end of message (data) */
299 #define MFS_INT 040 /* interrupt message */
300
301 #define MFS_DACK 0 /* data acknowledgement */
302 #define MFS_IACK 020 /* I/LS acknowledgement */
303 #define MFS_CACK 040 /* connect acknowledgement */
304
305 #define MFS_NOP 0 /* no operation */
306 #define MFS_CI 020 /* connect initiate */
307 #define MFS_CC 040 /* connect confirm */
308 #define MFS_DI 060 /* disconnect initiate */
309 #define MFS_DC 0100 /* disconnect confirm */
310 #define MFS_RCI 0140 /* retransmitted connect initiate */
311
312 #define SGQ_ACK 0100000 /* ack */
313 #define SGQ_NAK 0110000 /* negative ack */
314 #define SGQ_OACK 0120000 /* other channel ack */
315 #define SGQ_ONAK 0130000 /* other channel negative ack */
316 #define SGQ_MASK 07777 /* mask to isolate seq # */
317 #define SGQ_OTHER 020000 /* other channel qualifier */
318 #define SGQ_DELAY 010000 /* ack delay flag */
319
320 #define SGQ_EOM 0100000 /* pseudo flag for end-of-message */
321
322 #define LSM_MASK 03 /* mask for modifier field */
323 #define LSM_NOCHANGE 0 /* no change */
324 #define LSM_DONOTSEND 1 /* do not send data */
325 #define LSM_SEND 2 /* send data */
326
327 #define LSI_MASK 014 /* mask for interpretation field */
328 #define LSI_DATA 0 /* data segment or message count */
329 #define LSI_INTR 4 /* interrupt request count */
330 #define LSI_INTM 0377 /* funny marker for int. message */
331
332 #define COS_MASK 014 /* mask for flow control field */
333 #define COS_NONE 0 /* no flow control */
334 #define COS_SEGMENT 04 /* segment flow control */
335 #define COS_MESSAGE 010 /* message flow control */
336 #define COS_DEFAULT 1 /* default value for field */
337
338 #define COI_MASK 3 /* mask for version field */
339 #define COI_32 0 /* version 3.2 */
340 #define COI_31 1 /* version 3.1 */
341 #define COI_40 2 /* version 4.0 */
342 #define COI_41 3 /* version 4.1 */
343
344 #define MNU_MASK 140 /* mask for session control version */
345 #define MNU_10 000 /* session V1.0 */
346 #define MNU_20 040 /* session V2.0 */
347 #define MNU_ACCESS 1 /* access control present */
348 #define MNU_USRDATA 2 /* user data field present */
349 #define MNU_INVKPROXY 4 /* invoke proxy field present */
350 #define MNU_UICPROXY 8 /* use uic-based proxy */
351
352 #define DC_NORESOURCES 1 /* no resource reason code */
353 #define DC_NOLINK 41 /* no link terminate reason code */
354 #define DC_COMPLETE 42 /* disconnect complete reason code */
355
356 #define DI_NOERROR 0 /* user disconnect */
357 #define DI_SHUT 3 /* node is shutting down */
358 #define DI_NOUSER 4 /* destination end user does not exist */
359 #define DI_INVDEST 5 /* invalid end user destination */
360 #define DI_REMRESRC 6 /* insufficient remote resources */
361 #define DI_TPA 8 /* third party abort */
362 #define DI_PROTOCOL 7 /* protocol error discovered */
363 #define DI_ABORT 9 /* user abort */
364 #define DI_LOCALRESRC 32 /* insufficient local resources */
365 #define DI_REMUSERRESRC 33 /* insufficient remote user resources */
366 #define DI_BADACCESS 34 /* bad access control information */
367 #define DI_BADACCNT 36 /* bad ACCOUNT information */
368 #define DI_CONNECTABORT 38 /* connect request cancelled */
369 #define DI_TIMEDOUT 38 /* remote node or user crashed */
370 #define DI_UNREACHABLE 39 /* local timers expired due to ... */
371 #define DI_BADIMAGE 43 /* bad image data in connect */
372 #define DI_SERVMISMATCH 54 /* cryptographic service mismatch */
373
374 #define UC_OBJREJECT 0 /* object rejected connect */
375 #define UC_USERDISCONNECT 0 /* user disconnect */
376 #define UC_RESOURCES 1 /* insufficient resources (local or remote) */
377 #define UC_NOSUCHNODE 2 /* unrecognized node name */
378 #define UC_REMOTESHUT 3 /* remote node shutting down */
379 #define UC_NOSUCHOBJ 4 /* unrecognized object */
380 #define UC_INVOBJFORMAT 5 /* invalid object name format */
381 #define UC_OBJTOOBUSY 6 /* object too busy */
382 #define UC_NETWORKABORT 8 /* network abort */
383 #define UC_USERABORT 9 /* user abort */
384 #define UC_INVNODEFORMAT 10 /* invalid node name format */
385 #define UC_LOCALSHUT 11 /* local node shutting down */
386 #define UC_ACCESSREJECT 34 /* invalid access control information */
387 #define UC_NORESPONSE 38 /* no response from object */
388 #define UC_UNREACHABLE 39 /* node unreachable */
389
390 /*
391 * NSP message formats.
392 */
393 struct nsphdr /* general nsp header */
394 {
395 byte nh_flags; /* message flags */
396 word nh_dst; /* destination link address */
397 word nh_src; /* source link address */
398 };
399
400 struct seghdr /* data segment header */
401 {
402 byte sh_flags; /* message flags */
403 word sh_dst; /* destination link address */
404 word sh_src; /* source link address */
405 word sh_seq[3]; /* sequence numbers */
406 };
407
408 struct minseghdr /* minimum data segment header */
409 {
410 byte ms_flags; /* message flags */
411 word ms_dst; /* destination link address */
412 word ms_src; /* source link address */
413 word ms_seq; /* sequence number */
414 };
415
416 struct lsmsg /* link service message (after hdr) */
417 {
418 byte ls_lsflags; /* link service flags */
419 byte ls_fcval; /* flow control value */
420 };
421
422 struct ackmsg /* acknowledgement message */
423 {
424 byte ak_flags; /* message flags */
425 word ak_dst; /* destination link address */
426 word ak_src; /* source link address */
427 word ak_acknum[2]; /* acknowledgement numbers */
428 };
429
430 struct minackmsg /* minimum acknowledgement message */
431 {
432 byte mk_flags; /* message flags */
433 word mk_dst; /* destination link address */
434 word mk_src; /* source link address */
435 word mk_acknum; /* acknowledgement number */
436 };
437
438 struct ciackmsg /* connect acknowledgement message */
439 {
440 byte ck_flags; /* message flags */
441 word ck_dst; /* destination link address */
442 };
443
444 struct cimsg /* connect initiate message */
445 {
446 byte ci_flags; /* message flags */
447 word ci_dst; /* destination link address (0) */
448 word ci_src; /* source link address */
449 byte ci_services; /* requested services */
450 byte ci_info; /* information */
451 word ci_segsize; /* maximum segment size */
452 };
453
454 struct ccmsg /* connect confirm message */
455 {
456 byte cc_flags; /* message flags */
457 word cc_dst; /* destination link address */
458 word cc_src; /* source link address */
459 byte cc_services; /* requested services */
460 byte cc_info; /* information */
461 word cc_segsize; /* maximum segment size */
462 byte cc_optlen; /* optional data length */
463 };
464
465 struct cnmsg /* generic connect message */
466 {
467 byte cn_flags; /* message flags */
468 word cn_dst; /* destination link address */
469 word cn_src; /* source link address */
470 byte cn_services; /* requested services */
471 byte cn_info; /* information */
472 word cn_segsize; /* maximum segment size */
473 };
474
475 struct dimsg /* disconnect initiate message */
476 {
477 byte di_flags; /* message flags */
478 word di_dst; /* destination link address */
479 word di_src; /* source link address */
480 word di_reason; /* reason code */
481 byte di_optlen; /* optional data length */
482 };
483
484 struct dcmsg /* disconnect confirm message */
485 {
486 byte dc_flags; /* message flags */
487 word dc_dst; /* destination link address */
488 word dc_src; /* source link address */
489 word dc_reason; /* reason code */
490 };
491
492 /* Forwards */
493 static int print_decnet_ctlmsg(netdissect_options *, const union routehdr *, u_int, u_int);
494 static void print_t_info(netdissect_options *, u_int);
495 static int print_l1_routes(netdissect_options *, const char *, u_int);
496 static int print_l2_routes(netdissect_options *, const char *, u_int);
497 static void print_i_info(netdissect_options *, u_int);
498 static int print_elist(const char *, u_int);
499 static int print_nsp(netdissect_options *, const u_char *, u_int);
500 static void print_reason(netdissect_options *, u_int);
501
502 void
503 decnet_print(netdissect_options *ndo,
504 const u_char *ap, u_int length,
505 u_int caplen)
506 {
507 const union routehdr *rhp;
508 u_int mflags;
509 u_int dst, src, hops;
510 u_int nsplen, pktlen;
511 const u_char *nspp;
512
513 if (length < sizeof(struct shorthdr)) {
514 ND_PRINT((ndo, "%s", tstr));
515 return;
516 }
517
518 ND_TCHECK_LEN(ap, sizeof(short));
519 pktlen = EXTRACT_LE_U_2(ap);
520 if (pktlen < sizeof(struct shorthdr)) {
521 ND_PRINT((ndo, "%s", tstr));
522 return;
523 }
524 if (pktlen > length) {
525 ND_PRINT((ndo, "%s", tstr));
526 return;
527 }
528 length = pktlen;
529
530 rhp = (const union routehdr *)(ap + sizeof(short));
531 ND_TCHECK(rhp->rh_short.sh_flags);
532 mflags = EXTRACT_U_1(rhp->rh_short.sh_flags);
533
534 if (mflags & RMF_PAD) {
535 /* pad bytes of some sort in front of message */
536 u_int padlen = mflags & RMF_PADMASK;
537 if (ndo->ndo_vflag)
538 ND_PRINT((ndo, "[pad:%u] ", padlen));
539 if (length < padlen + 2) {
540 ND_PRINT((ndo, "%s", tstr));
541 return;
542 }
543 ND_TCHECK_LEN(ap + sizeof(short), padlen);
544 ap += padlen;
545 length -= padlen;
546 caplen -= padlen;
547 rhp = (const union routehdr *)(ap + sizeof(short));
548 ND_TCHECK(rhp->rh_short.sh_flags);
549 mflags = EXTRACT_U_1(rhp->rh_short.sh_flags);
550 }
551
552 if (mflags & RMF_FVER) {
553 ND_PRINT((ndo, "future-version-decnet"));
554 ND_DEFAULTPRINT(ap, min(length, caplen));
555 return;
556 }
557
558 /* is it a control message? */
559 if (mflags & RMF_CTLMSG) {
560 if (!print_decnet_ctlmsg(ndo, rhp, length, caplen))
561 goto trunc;
562 return;
563 }
564
565 switch (mflags & RMF_MASK) {
566 case RMF_LONG:
567 if (length < sizeof(struct longhdr)) {
568 ND_PRINT((ndo, "%s", tstr));
569 return;
570 }
571 ND_TCHECK(rhp->rh_long);
572 dst =
573 EXTRACT_LE_U_2(rhp->rh_long.lg_dst.dne_remote.dne_nodeaddr);
574 src =
575 EXTRACT_LE_U_2(rhp->rh_long.lg_src.dne_remote.dne_nodeaddr);
576 hops = EXTRACT_U_1(rhp->rh_long.lg_visits);
577 nspp = ap + sizeof(short) + sizeof(struct longhdr);
578 nsplen = length - sizeof(struct longhdr);
579 break;
580 case RMF_SHORT:
581 ND_TCHECK(rhp->rh_short);
582 dst = EXTRACT_LE_U_2(rhp->rh_short.sh_dst);
583 src = EXTRACT_LE_U_2(rhp->rh_short.sh_src);
584 hops = (EXTRACT_U_1(rhp->rh_short.sh_visits) & VIS_MASK)+1;
585 nspp = ap + sizeof(short) + sizeof(struct shorthdr);
586 nsplen = length - sizeof(struct shorthdr);
587 break;
588 default:
589 ND_PRINT((ndo, "unknown message flags under mask"));
590 ND_DEFAULTPRINT((const u_char *)ap, min(length, caplen));
591 return;
592 }
593
594 ND_PRINT((ndo, "%s > %s %u ",
595 dnaddr_string(ndo, src), dnaddr_string(ndo, dst), pktlen));
596 if (ndo->ndo_vflag) {
597 if (mflags & RMF_RQR)
598 ND_PRINT((ndo, "RQR "));
599 if (mflags & RMF_RTS)
600 ND_PRINT((ndo, "RTS "));
601 if (mflags & RMF_IE)
602 ND_PRINT((ndo, "IE "));
603 ND_PRINT((ndo, "%u hops ", hops));
604 }
605
606 if (!print_nsp(ndo, nspp, nsplen))
607 goto trunc;
608 return;
609
610 trunc:
611 ND_PRINT((ndo, "%s", tstr));
612 return;
613 }
614
615 static int
616 print_decnet_ctlmsg(netdissect_options *ndo,
617 const union routehdr *rhp, u_int length,
618 u_int caplen)
619 {
620 /* Our caller has already checked for mflags */
621 u_int mflags = EXTRACT_U_1(rhp->rh_short.sh_flags);
622 const union controlmsg *cmp = (const union controlmsg *)rhp;
623 u_int src, dst, info, blksize, eco, ueco, hello, other, vers;
624 etheraddr srcea, rtea;
625 u_int priority;
626 const char *rhpx = (const char *)rhp;
627 int ret;
628
629 switch (mflags & RMF_CTLMASK) {
630 case RMF_INIT:
631 ND_PRINT((ndo, "init "));
632 if (length < sizeof(struct initmsg))
633 goto trunc;
634 ND_TCHECK(cmp->cm_init);
635 src = EXTRACT_LE_U_2(cmp->cm_init.in_src);
636 info = EXTRACT_U_1(cmp->cm_init.in_info);
637 blksize = EXTRACT_LE_U_2(cmp->cm_init.in_blksize);
638 vers = EXTRACT_U_1(cmp->cm_init.in_vers);
639 eco = EXTRACT_U_1(cmp->cm_init.in_eco);
640 ueco = EXTRACT_U_1(cmp->cm_init.in_ueco);
641 hello = EXTRACT_LE_U_2(cmp->cm_init.in_hello);
642 print_t_info(ndo, info);
643 ND_PRINT((ndo,
644 "src %sblksize %u vers %u eco %u ueco %u hello %u",
645 dnaddr_string(ndo, src), blksize, vers, eco, ueco,
646 hello));
647 ret = 1;
648 break;
649 case RMF_VER:
650 ND_PRINT((ndo, "verification "));
651 if (length < sizeof(struct verifmsg))
652 goto trunc;
653 ND_TCHECK(cmp->cm_ver);
654 src = EXTRACT_LE_U_2(cmp->cm_ver.ve_src);
655 other = EXTRACT_U_1(cmp->cm_ver.ve_fcnval);
656 ND_PRINT((ndo, "src %s fcnval %o", dnaddr_string(ndo, src), other));
657 ret = 1;
658 break;
659 case RMF_TEST:
660 ND_PRINT((ndo, "test "));
661 if (length < sizeof(struct testmsg))
662 goto trunc;
663 ND_TCHECK(cmp->cm_test);
664 src = EXTRACT_LE_U_2(cmp->cm_test.te_src);
665 other = EXTRACT_U_1(cmp->cm_test.te_data);
666 ND_PRINT((ndo, "src %s data %o", dnaddr_string(ndo, src), other));
667 ret = 1;
668 break;
669 case RMF_L1ROUT:
670 ND_PRINT((ndo, "lev-1-routing "));
671 if (length < sizeof(struct l1rout))
672 goto trunc;
673 ND_TCHECK(cmp->cm_l1rou);
674 src = EXTRACT_LE_U_2(cmp->cm_l1rou.r1_src);
675 ND_PRINT((ndo, "src %s ", dnaddr_string(ndo, src)));
676 ret = print_l1_routes(ndo, &(rhpx[sizeof(struct l1rout)]),
677 length - sizeof(struct l1rout));
678 break;
679 case RMF_L2ROUT:
680 ND_PRINT((ndo, "lev-2-routing "));
681 if (length < sizeof(struct l2rout))
682 goto trunc;
683 ND_TCHECK(cmp->cm_l2rout);
684 src = EXTRACT_LE_U_2(cmp->cm_l2rout.r2_src);
685 ND_PRINT((ndo, "src %s ", dnaddr_string(ndo, src)));
686 ret = print_l2_routes(ndo, &(rhpx[sizeof(struct l2rout)]),
687 length - sizeof(struct l2rout));
688 break;
689 case RMF_RHELLO:
690 ND_PRINT((ndo, "router-hello "));
691 if (length < sizeof(struct rhellomsg))
692 goto trunc;
693 ND_TCHECK(cmp->cm_rhello);
694 vers = EXTRACT_U_1(cmp->cm_rhello.rh_vers);
695 eco = EXTRACT_U_1(cmp->cm_rhello.rh_eco);
696 ueco = EXTRACT_U_1(cmp->cm_rhello.rh_ueco);
697 memcpy((char *)&srcea, (const char *)&(cmp->cm_rhello.rh_src),
698 sizeof(srcea));
699 src = EXTRACT_LE_U_2(srcea.dne_remote.dne_nodeaddr);
700 info = EXTRACT_U_1(cmp->cm_rhello.rh_info);
701 blksize = EXTRACT_LE_U_2(cmp->cm_rhello.rh_blksize);
702 priority = EXTRACT_U_1(cmp->cm_rhello.rh_priority);
703 hello = EXTRACT_LE_U_2(cmp->cm_rhello.rh_hello);
704 print_i_info(ndo, info);
705 ND_PRINT((ndo,
706 "vers %u eco %u ueco %u src %s blksize %u pri %u hello %u",
707 vers, eco, ueco, dnaddr_string(ndo, src),
708 blksize, priority, hello));
709 ret = print_elist(&(rhpx[sizeof(struct rhellomsg)]),
710 length - sizeof(struct rhellomsg));
711 break;
712 case RMF_EHELLO:
713 ND_PRINT((ndo, "endnode-hello "));
714 if (length < sizeof(struct ehellomsg))
715 goto trunc;
716 ND_TCHECK(cmp->cm_ehello);
717 vers = EXTRACT_U_1(cmp->cm_ehello.eh_vers);
718 eco = EXTRACT_U_1(cmp->cm_ehello.eh_eco);
719 ueco = EXTRACT_U_1(cmp->cm_ehello.eh_ueco);
720 memcpy((char *)&srcea, (const char *)&(cmp->cm_ehello.eh_src),
721 sizeof(srcea));
722 src = EXTRACT_LE_U_2(srcea.dne_remote.dne_nodeaddr);
723 info = EXTRACT_U_1(cmp->cm_ehello.eh_info);
724 blksize = EXTRACT_LE_U_2(cmp->cm_ehello.eh_blksize);
725 /*seed*/
726 memcpy((char *)&rtea, (const char *)&(cmp->cm_ehello.eh_router),
727 sizeof(rtea));
728 dst = EXTRACT_LE_U_2(rtea.dne_remote.dne_nodeaddr);
729 hello = EXTRACT_LE_U_2(cmp->cm_ehello.eh_hello);
730 other = EXTRACT_U_1(cmp->cm_ehello.eh_data);
731 print_i_info(ndo, info);
732 ND_PRINT((ndo,
733 "vers %u eco %u ueco %u src %s blksize %u rtr %s hello %u data %o",
734 vers, eco, ueco, dnaddr_string(ndo, src),
735 blksize, dnaddr_string(ndo, dst), hello, other));
736 ret = 1;
737 break;
738
739 default:
740 ND_PRINT((ndo, "unknown control message"));
741 ND_DEFAULTPRINT((const u_char *)rhp, min(length, caplen));
742 ret = 1;
743 break;
744 }
745 return (ret);
746
747 trunc:
748 return (0);
749 }
750
751 static void
752 print_t_info(netdissect_options *ndo,
753 u_int info)
754 {
755 u_int ntype = info & 3;
756 switch (ntype) {
757 case 0: ND_PRINT((ndo, "reserved-ntype? ")); break;
758 case TI_L2ROUT: ND_PRINT((ndo, "l2rout ")); break;
759 case TI_L1ROUT: ND_PRINT((ndo, "l1rout ")); break;
760 case TI_ENDNODE: ND_PRINT((ndo, "endnode ")); break;
761 }
762 if (info & TI_VERIF)
763 ND_PRINT((ndo, "verif "));
764 if (info & TI_BLOCK)
765 ND_PRINT((ndo, "blo "));
766 }
767
768 static int
769 print_l1_routes(netdissect_options *ndo,
770 const char *rp, u_int len)
771 {
772 u_int count;
773 u_int id;
774 u_int info;
775
776 /* The last short is a checksum */
777 while (len > (3 * sizeof(short))) {
778 ND_TCHECK_LEN(rp, 3 * sizeof(short));
779 count = EXTRACT_LE_U_2(rp);
780 if (count > 1024)
781 return (1); /* seems to be bogus from here on */
782 rp += sizeof(short);
783 len -= sizeof(short);
784 id = EXTRACT_LE_U_2(rp);
785 rp += sizeof(short);
786 len -= sizeof(short);
787 info = EXTRACT_LE_U_2(rp);
788 rp += sizeof(short);
789 len -= sizeof(short);
790 ND_PRINT((ndo, "{ids %u-%u cost %u hops %u} ", id, id + count,
791 RI_COST(info), RI_HOPS(info)));
792 }
793 return (1);
794
795 trunc:
796 return (0);
797 }
798
799 static int
800 print_l2_routes(netdissect_options *ndo,
801 const char *rp, u_int len)
802 {
803 u_int count;
804 u_int area;
805 u_int info;
806
807 /* The last short is a checksum */
808 while (len > (3 * sizeof(short))) {
809 ND_TCHECK_LEN(rp, 3 * sizeof(short));
810 count = EXTRACT_LE_U_2(rp);
811 if (count > 1024)
812 return (1); /* seems to be bogus from here on */
813 rp += sizeof(short);
814 len -= sizeof(short);
815 area = EXTRACT_LE_U_2(rp);
816 rp += sizeof(short);
817 len -= sizeof(short);
818 info = EXTRACT_LE_U_2(rp);
819 rp += sizeof(short);
820 len -= sizeof(short);
821 ND_PRINT((ndo, "{areas %u-%u cost %u hops %u} ", area, area + count,
822 RI_COST(info), RI_HOPS(info)));
823 }
824 return (1);
825
826 trunc:
827 return (0);
828 }
829
830 static void
831 print_i_info(netdissect_options *ndo,
832 u_int info)
833 {
834 u_int ntype = info & II_TYPEMASK;
835 switch (ntype) {
836 case 0: ND_PRINT((ndo, "reserved-ntype? ")); break;
837 case II_L2ROUT: ND_PRINT((ndo, "l2rout ")); break;
838 case II_L1ROUT: ND_PRINT((ndo, "l1rout ")); break;
839 case II_ENDNODE: ND_PRINT((ndo, "endnode ")); break;
840 }
841 if (info & II_VERIF)
842 ND_PRINT((ndo, "verif "));
843 if (info & II_NOMCAST)
844 ND_PRINT((ndo, "nomcast "));
845 if (info & II_BLOCK)
846 ND_PRINT((ndo, "blo "));
847 }
848
849 static int
850 print_elist(const char *elp _U_, u_int len _U_)
851 {
852 /* Not enough examples available for me to debug this */
853 return (1);
854 }
855
856 static int
857 print_nsp(netdissect_options *ndo,
858 const u_char *nspp, u_int nsplen)
859 {
860 const struct nsphdr *nsphp = (const struct nsphdr *)nspp;
861 u_int dst, src, flags;
862
863 if (nsplen < sizeof(struct nsphdr))
864 goto trunc;
865 ND_TCHECK(*nsphp);
866 flags = EXTRACT_U_1(nsphp->nh_flags);
867 dst = EXTRACT_LE_U_2(nsphp->nh_dst);
868 src = EXTRACT_LE_U_2(nsphp->nh_src);
869
870 switch (flags & NSP_TYPEMASK) {
871 case MFT_DATA:
872 switch (flags & NSP_SUBMASK) {
873 case MFS_BOM:
874 case MFS_MOM:
875 case MFS_EOM:
876 case MFS_BOM+MFS_EOM:
877 ND_PRINT((ndo, "data %u>%u ", src, dst));
878 {
879 const struct seghdr *shp = (const struct seghdr *)nspp;
880 u_int ack;
881 u_int data_off = sizeof(struct minseghdr);
882
883 if (nsplen < data_off)
884 goto trunc;
885 ND_TCHECK(shp->sh_seq[0]);
886 ack = EXTRACT_LE_U_2(shp->sh_seq[0]);
887 if (ack & SGQ_ACK) { /* acknum field */
888 if ((ack & SGQ_NAK) == SGQ_NAK)
889 ND_PRINT((ndo, "nak %u ", ack & SGQ_MASK));
890 else
891 ND_PRINT((ndo, "ack %u ", ack & SGQ_MASK));
892 data_off += sizeof(short);
893 if (nsplen < data_off)
894 goto trunc;
895 ND_TCHECK(shp->sh_seq[1]);
896 ack = EXTRACT_LE_U_2(shp->sh_seq[1]);
897 if (ack & SGQ_OACK) { /* ackoth field */
898 if ((ack & SGQ_ONAK) == SGQ_ONAK)
899 ND_PRINT((ndo, "onak %u ", ack & SGQ_MASK));
900 else
901 ND_PRINT((ndo, "oack %u ", ack & SGQ_MASK));
902 data_off += sizeof(short);
903 if (nsplen < data_off)
904 goto trunc;
905 ND_TCHECK(shp->sh_seq[2]);
906 ack = EXTRACT_LE_U_2(shp->sh_seq[2]);
907 }
908 }
909 ND_PRINT((ndo, "seg %u ", ack & SGQ_MASK));
910 }
911 break;
912 case MFS_ILS+MFS_INT:
913 ND_PRINT((ndo, "intr "));
914 {
915 const struct seghdr *shp = (const struct seghdr *)nspp;
916 u_int ack;
917 u_int data_off = sizeof(struct minseghdr);
918
919 if (nsplen < data_off)
920 goto trunc;
921 ND_TCHECK(shp->sh_seq[0]);
922 ack = EXTRACT_LE_U_2(shp->sh_seq[0]);
923 if (ack & SGQ_ACK) { /* acknum field */
924 if ((ack & SGQ_NAK) == SGQ_NAK)
925 ND_PRINT((ndo, "nak %u ", ack & SGQ_MASK));
926 else
927 ND_PRINT((ndo, "ack %u ", ack & SGQ_MASK));
928 data_off += sizeof(short);
929 if (nsplen < data_off)
930 goto trunc;
931 ND_TCHECK(shp->sh_seq[1]);
932 ack = EXTRACT_LE_U_2(shp->sh_seq[1]);
933 if (ack & SGQ_OACK) { /* ackdat field */
934 if ((ack & SGQ_ONAK) == SGQ_ONAK)
935 ND_PRINT((ndo, "nakdat %u ", ack & SGQ_MASK));
936 else
937 ND_PRINT((ndo, "ackdat %u ", ack & SGQ_MASK));
938 data_off += sizeof(short);
939 if (nsplen < data_off)
940 goto trunc;
941 ND_TCHECK(shp->sh_seq[2]);
942 ack = EXTRACT_LE_U_2(shp->sh_seq[2]);
943 }
944 }
945 ND_PRINT((ndo, "seg %u ", ack & SGQ_MASK));
946 }
947 break;
948 case MFS_ILS:
949 ND_PRINT((ndo, "link-service %u>%u ", src, dst));
950 {
951 const struct seghdr *shp = (const struct seghdr *)nspp;
952 const struct lsmsg *lsmp =
953 (const struct lsmsg *)(nspp + sizeof(struct seghdr));
954 u_int ack;
955 u_int lsflags, fcval;
956
957 if (nsplen < sizeof(struct seghdr) + sizeof(struct lsmsg))
958 goto trunc;
959 ND_TCHECK(shp->sh_seq[0]);
960 ack = EXTRACT_LE_U_2(shp->sh_seq[0]);
961 if (ack & SGQ_ACK) { /* acknum field */
962 if ((ack & SGQ_NAK) == SGQ_NAK)
963 ND_PRINT((ndo, "nak %u ", ack & SGQ_MASK));
964 else
965 ND_PRINT((ndo, "ack %u ", ack & SGQ_MASK));
966 ND_TCHECK(shp->sh_seq[1]);
967 ack = EXTRACT_LE_U_2(shp->sh_seq[1]);
968 if (ack & SGQ_OACK) { /* ackdat field */
969 if ((ack & SGQ_ONAK) == SGQ_ONAK)
970 ND_PRINT((ndo, "nakdat %u ", ack & SGQ_MASK));
971 else
972 ND_PRINT((ndo, "ackdat %u ", ack & SGQ_MASK));
973 ND_TCHECK(shp->sh_seq[2]);
974 ack = EXTRACT_LE_U_2(shp->sh_seq[2]);
975 }
976 }
977 ND_PRINT((ndo, "seg %u ", ack & SGQ_MASK));
978 ND_TCHECK(*lsmp);
979 lsflags = EXTRACT_U_1(lsmp->ls_lsflags);
980 fcval = EXTRACT_U_1(lsmp->ls_fcval);
981 switch (lsflags & LSI_MASK) {
982 case LSI_DATA:
983 ND_PRINT((ndo, "dat seg count %u ", fcval));
984 switch (lsflags & LSM_MASK) {
985 case LSM_NOCHANGE:
986 break;
987 case LSM_DONOTSEND:
988 ND_PRINT((ndo, "donotsend-data "));
989 break;
990 case LSM_SEND:
991 ND_PRINT((ndo, "send-data "));
992 break;
993 default:
994 ND_PRINT((ndo, "reserved-fcmod? %x", lsflags));
995 break;
996 }
997 break;
998 case LSI_INTR:
999 ND_PRINT((ndo, "intr req count %u ", fcval));
1000 break;
1001 default:
1002 ND_PRINT((ndo, "reserved-fcval-int? %x", lsflags));
1003 break;
1004 }
1005 }
1006 break;
1007 default:
1008 ND_PRINT((ndo, "reserved-subtype? %x %u > %u", flags, src, dst));
1009 break;
1010 }
1011 break;
1012 case MFT_ACK:
1013 switch (flags & NSP_SUBMASK) {
1014 case MFS_DACK:
1015 ND_PRINT((ndo, "data-ack %u>%u ", src, dst));
1016 {
1017 const struct ackmsg *amp = (const struct ackmsg *)nspp;
1018 u_int ack;
1019
1020 if (nsplen < sizeof(struct ackmsg))
1021 goto trunc;
1022 ND_TCHECK(*amp);
1023 ack = EXTRACT_LE_U_2(amp->ak_acknum[0]);
1024 if (ack & SGQ_ACK) { /* acknum field */
1025 if ((ack & SGQ_NAK) == SGQ_NAK)
1026 ND_PRINT((ndo, "nak %u ", ack & SGQ_MASK));
1027 else
1028 ND_PRINT((ndo, "ack %u ", ack & SGQ_MASK));
1029 ack = EXTRACT_LE_U_2(amp->ak_acknum[1]);
1030 if (ack & SGQ_OACK) { /* ackoth field */
1031 if ((ack & SGQ_ONAK) == SGQ_ONAK)
1032 ND_PRINT((ndo, "onak %u ", ack & SGQ_MASK));
1033 else
1034 ND_PRINT((ndo, "oack %u ", ack & SGQ_MASK));
1035 }
1036 }
1037 }
1038 break;
1039 case MFS_IACK:
1040 ND_PRINT((ndo, "ils-ack %u>%u ", src, dst));
1041 {
1042 const struct ackmsg *amp = (const struct ackmsg *)nspp;
1043 u_int ack;
1044
1045 if (nsplen < sizeof(struct ackmsg))
1046 goto trunc;
1047 ND_TCHECK(*amp);
1048 ack = EXTRACT_LE_U_2(amp->ak_acknum[0]);
1049 if (ack & SGQ_ACK) { /* acknum field */
1050 if ((ack & SGQ_NAK) == SGQ_NAK)
1051 ND_PRINT((ndo, "nak %u ", ack & SGQ_MASK));
1052 else
1053 ND_PRINT((ndo, "ack %u ", ack & SGQ_MASK));
1054 ND_TCHECK(amp->ak_acknum[1]);
1055 ack = EXTRACT_LE_U_2(amp->ak_acknum[1]);
1056 if (ack & SGQ_OACK) { /* ackdat field */
1057 if ((ack & SGQ_ONAK) == SGQ_ONAK)
1058 ND_PRINT((ndo, "nakdat %u ", ack & SGQ_MASK));
1059 else
1060 ND_PRINT((ndo, "ackdat %u ", ack & SGQ_MASK));
1061 }
1062 }
1063 }
1064 break;
1065 case MFS_CACK:
1066 ND_PRINT((ndo, "conn-ack %u", dst));
1067 break;
1068 default:
1069 ND_PRINT((ndo, "reserved-acktype? %x %u > %u", flags, src, dst));
1070 break;
1071 }
1072 break;
1073 case MFT_CTL:
1074 switch (flags & NSP_SUBMASK) {
1075 case MFS_CI:
1076 case MFS_RCI:
1077 if ((flags & NSP_SUBMASK) == MFS_CI)
1078 ND_PRINT((ndo, "conn-initiate "));
1079 else
1080 ND_PRINT((ndo, "retrans-conn-initiate "));
1081 ND_PRINT((ndo, "%u>%u ", src, dst));
1082 {
1083 const struct cimsg *cimp = (const struct cimsg *)nspp;
1084 u_int services, info, segsize;
1085
1086 if (nsplen < sizeof(struct cimsg))
1087 goto trunc;
1088 ND_TCHECK(*cimp);
1089 services = EXTRACT_U_1(cimp->ci_services);
1090 info = EXTRACT_U_1(cimp->ci_info);
1091 segsize = EXTRACT_LE_U_2(cimp->ci_segsize);
1092
1093 switch (services & COS_MASK) {
1094 case COS_NONE:
1095 break;
1096 case COS_SEGMENT:
1097 ND_PRINT((ndo, "seg "));
1098 break;
1099 case COS_MESSAGE:
1100 ND_PRINT((ndo, "msg "));
1101 break;
1102 }
1103 switch (info & COI_MASK) {
1104 case COI_32:
1105 ND_PRINT((ndo, "ver 3.2 "));
1106 break;
1107 case COI_31:
1108 ND_PRINT((ndo, "ver 3.1 "));
1109 break;
1110 case COI_40:
1111 ND_PRINT((ndo, "ver 4.0 "));
1112 break;
1113 case COI_41:
1114 ND_PRINT((ndo, "ver 4.1 "));
1115 break;
1116 }
1117 ND_PRINT((ndo, "segsize %u ", segsize));
1118 }
1119 break;
1120 case MFS_CC:
1121 ND_PRINT((ndo, "conn-confirm %u>%u ", src, dst));
1122 {
1123 const struct ccmsg *ccmp = (const struct ccmsg *)nspp;
1124 u_int services, info;
1125 u_int segsize, optlen;
1126
1127 if (nsplen < sizeof(struct ccmsg))
1128 goto trunc;
1129 ND_TCHECK(*ccmp);
1130 services = EXTRACT_U_1(ccmp->cc_services);
1131 info = EXTRACT_U_1(ccmp->cc_info);
1132 segsize = EXTRACT_LE_U_2(ccmp->cc_segsize);
1133 optlen = EXTRACT_U_1(ccmp->cc_optlen);
1134
1135 switch (services & COS_MASK) {
1136 case COS_NONE:
1137 break;
1138 case COS_SEGMENT:
1139 ND_PRINT((ndo, "seg "));
1140 break;
1141 case COS_MESSAGE:
1142 ND_PRINT((ndo, "msg "));
1143 break;
1144 }
1145 switch (info & COI_MASK) {
1146 case COI_32:
1147 ND_PRINT((ndo, "ver 3.2 "));
1148 break;
1149 case COI_31:
1150 ND_PRINT((ndo, "ver 3.1 "));
1151 break;
1152 case COI_40:
1153 ND_PRINT((ndo, "ver 4.0 "));
1154 break;
1155 case COI_41:
1156 ND_PRINT((ndo, "ver 4.1 "));
1157 break;
1158 }
1159 ND_PRINT((ndo, "segsize %u ", segsize));
1160 if (optlen) {
1161 ND_PRINT((ndo, "optlen %u ", optlen));
1162 }
1163 }
1164 break;
1165 case MFS_DI:
1166 ND_PRINT((ndo, "disconn-initiate %u>%u ", src, dst));
1167 {
1168 const struct dimsg *dimp = (const struct dimsg *)nspp;
1169 u_int reason;
1170 u_int optlen;
1171
1172 if (nsplen < sizeof(struct dimsg))
1173 goto trunc;
1174 ND_TCHECK(*dimp);
1175 reason = EXTRACT_LE_U_2(dimp->di_reason);
1176 optlen = EXTRACT_U_1(dimp->di_optlen);
1177
1178 print_reason(ndo, reason);
1179 if (optlen) {
1180 ND_PRINT((ndo, "optlen %u ", optlen));
1181 }
1182 }
1183 break;
1184 case MFS_DC:
1185 ND_PRINT((ndo, "disconn-confirm %u>%u ", src, dst));
1186 {
1187 const struct dcmsg *dcmp = (const struct dcmsg *)nspp;
1188 u_int reason;
1189
1190 ND_TCHECK(*dcmp);
1191 reason = EXTRACT_LE_U_2(dcmp->dc_reason);
1192
1193 print_reason(ndo, reason);
1194 }
1195 break;
1196 default:
1197 ND_PRINT((ndo, "reserved-ctltype? %x %u > %u", flags, src, dst));
1198 break;
1199 }
1200 break;
1201 default:
1202 ND_PRINT((ndo, "reserved-type? %x %u > %u", flags, src, dst));
1203 break;
1204 }
1205 return (1);
1206
1207 trunc:
1208 return (0);
1209 }
1210
1211 static const struct tok reason2str[] = {
1212 { UC_OBJREJECT, "object rejected connect" },
1213 { UC_RESOURCES, "insufficient resources" },
1214 { UC_NOSUCHNODE, "unrecognized node name" },
1215 { DI_SHUT, "node is shutting down" },
1216 { UC_NOSUCHOBJ, "unrecognized object" },
1217 { UC_INVOBJFORMAT, "invalid object name format" },
1218 { UC_OBJTOOBUSY, "object too busy" },
1219 { DI_PROTOCOL, "protocol error discovered" },
1220 { DI_TPA, "third party abort" },
1221 { UC_USERABORT, "user abort" },
1222 { UC_INVNODEFORMAT, "invalid node name format" },
1223 { UC_LOCALSHUT, "local node shutting down" },
1224 { DI_LOCALRESRC, "insufficient local resources" },
1225 { DI_REMUSERRESRC, "insufficient remote user resources" },
1226 { UC_ACCESSREJECT, "invalid access control information" },
1227 { DI_BADACCNT, "bad ACCOUNT information" },
1228 { UC_NORESPONSE, "no response from object" },
1229 { UC_UNREACHABLE, "node unreachable" },
1230 { DC_NOLINK, "no link terminate" },
1231 { DC_COMPLETE, "disconnect complete" },
1232 { DI_BADIMAGE, "bad image data in connect" },
1233 { DI_SERVMISMATCH, "cryptographic service mismatch" },
1234 { 0, NULL }
1235 };
1236
1237 static void
1238 print_reason(netdissect_options *ndo,
1239 u_int reason)
1240 {
1241 ND_PRINT((ndo, "%s ", tok2str(reason2str, "reason-%u", reason)));
1242 }
1243
1244 const char *
1245 dnnum_string(netdissect_options *ndo, u_short dnaddr)
1246 {
1247 char *str;
1248 size_t siz;
1249 u_int area = (u_short)(dnaddr & AREAMASK) >> AREASHIFT;
1250 u_int node = dnaddr & NODEMASK;
1251
1252 str = (char *)malloc(siz = sizeof("00.0000"));
1253 if (str == NULL)
1254 (*ndo->ndo_error)(ndo, "dnnum_string: malloc");
1255 snprintf(str, siz, "%u.%u", area, node);
1256 return(str);
1257 }
1258
1259 const char *
1260 dnname_string(netdissect_options *ndo, u_short dnaddr)
1261 {
1262 #ifdef HAVE_DNET_HTOA
1263 struct dn_naddr dna;
1264 char *dnname;
1265
1266 dna.a_len = sizeof(short);
1267 memcpy((char *)dna.a_addr, (char *)&dnaddr, sizeof(short));
1268 dnname = dnet_htoa(&dna);
1269 if(dnname != NULL)
1270 return (strdup(dnname));
1271 else
1272 return(dnnum_string(ndo, dnaddr));
1273 #else
1274 return(dnnum_string(ndo, dnaddr)); /* punt */
1275 #endif
1276 }