]> The Tcpdump Group git mirrors - tcpdump/blob - print-decnet.c
STP: Replace ND_TCHECK call(s) by ND_TCHECK_SIZE call(s)
[tcpdump] / print-decnet.c
1 /*
2 * Copyright (c) 1992, 1993, 1994, 1995, 1996, 1997
3 * The Regents of the University of California. All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that: (1) source code distributions
7 * retain the above copyright notice and this paragraph in its entirety, (2)
8 * distributions including binary code include the above copyright notice and
9 * this paragraph in its entirety in the documentation or other materials
10 * provided with the distribution, and (3) all advertising materials mentioning
11 * features or use of this software display the following acknowledgement:
12 * ``This product includes software developed by the University of California,
13 * Lawrence Berkeley Laboratory and its contributors.'' Neither the name of
14 * the University nor the names of its contributors may be used to endorse
15 * or promote products derived from this software without specific prior
16 * written permission.
17 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED
18 * WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF
19 * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
20 */
21
22 /* \summary: DECnet printer */
23
24 #ifdef HAVE_CONFIG_H
25 #include <config.h>
26 #endif
27
28 #include "netdissect-stdinc.h"
29
30 #include <stdio.h>
31 #include <stdlib.h>
32 #include <string.h>
33
34 struct mbuf;
35 struct rtentry;
36
37 #ifdef HAVE_DNET_HTOA
38 #ifdef HAVE_NETDNET_DN_H
39 #include <netdnet/dn.h>
40 #endif
41 #ifndef HAVE_STRUCT_DN_NADDR
42 #define DN_MAXADDL 20 /* max size of DECnet address */
43 struct dn_naddr {
44 unsigned short a_len; /* length of address */
45 unsigned char a_addr[DN_MAXADDL]; /* address as bytes */
46 };
47 #endif /* HAVE_STRUCT_DN_NADDR */
48 #ifdef HAVE_NETDNET_DNETDB_H
49 #include <netdnet/dnetdb.h>
50 #endif
51 #ifndef NETDNET_DNETDB_H_DECLARES_DNET_HTOA
52 extern char *dnet_htoa(struct dn_naddr *);
53 #endif
54 #endif
55
56 #include "netdissect.h"
57 #include "extract.h"
58 #include "addrtoname.h"
59
60 static const char tstr[] = "[|decnet]";
61
62 #ifndef _WIN32
63 typedef nd_uint8_t byte; /* single byte field */
64 #else
65 /*
66 * the keyword 'byte' generates conflicts in Windows
67 */
68 typedef nd_uint8_t Byte; /* single byte field */
69 #define byte Byte
70 #endif /* _WIN32 */
71 typedef nd_uint16_t word; /* 2 byte field */
72 typedef nd_uint32_t longword; /* 4 bytes field */
73
74 /*
75 * Definitions for DECNET Phase IV protocol headers
76 */
77 typedef union {
78 nd_byte dne_addr[6]; /* full ethernet address */
79 struct {
80 nd_byte dne_hiord[4]; /* DECnet HIORD prefix */
81 nd_byte dne_nodeaddr[2]; /* DECnet node address */
82 } dne_remote;
83 } etheraddr; /* Ethernet address */
84
85 #define HIORD 0x000400aa /* high 32-bits of address (swapped) */
86
87 #define AREAMASK 0176000 /* mask for area field */
88 #define AREASHIFT 10 /* bit-offset for area field */
89 #define NODEMASK 01777 /* mask for node address field */
90
91 /*
92 * Define long and short header formats.
93 */
94 struct shorthdr
95 {
96 byte sh_flags; /* route flags */
97 word sh_dst; /* destination node address */
98 word sh_src; /* source node address */
99 byte sh_visits; /* visit count */
100 };
101
102 struct longhdr
103 {
104 byte lg_flags; /* route flags */
105 byte lg_darea; /* destination area (reserved) */
106 byte lg_dsarea; /* destination subarea (reserved) */
107 etheraddr lg_dst; /* destination id */
108 byte lg_sarea; /* source area (reserved) */
109 byte lg_ssarea; /* source subarea (reserved) */
110 etheraddr lg_src; /* source id */
111 byte lg_nextl2; /* next level 2 router (reserved) */
112 byte lg_visits; /* visit count */
113 byte lg_service; /* service class (reserved) */
114 byte lg_pt; /* protocol type (reserved) */
115 };
116
117 union routehdr
118 {
119 struct shorthdr rh_short; /* short route header */
120 struct longhdr rh_long; /* long route header */
121 };
122
123 /*
124 * Define the values of various fields in the protocol messages.
125 *
126 * 1. Data packet formats.
127 */
128 #define RMF_MASK 7 /* mask for message type */
129 #define RMF_SHORT 2 /* short message format */
130 #define RMF_LONG 6 /* long message format */
131 #ifndef RMF_RQR
132 #define RMF_RQR 010 /* request return to sender */
133 #define RMF_RTS 020 /* returning to sender */
134 #define RMF_IE 040 /* intra-ethernet packet */
135 #endif /* RMR_RQR */
136 #define RMF_FVER 0100 /* future version flag */
137 #define RMF_PAD 0200 /* pad field */
138 #define RMF_PADMASK 0177 /* pad field mask */
139
140 #define VIS_MASK 077 /* visit field mask */
141
142 /*
143 * 2. Control packet formats.
144 */
145 #define RMF_CTLMASK 017 /* mask for message type */
146 #define RMF_CTLMSG 01 /* control message indicator */
147 #define RMF_INIT 01 /* initialization message */
148 #define RMF_VER 03 /* verification message */
149 #define RMF_TEST 05 /* hello and test message */
150 #define RMF_L1ROUT 07 /* level 1 routing message */
151 #define RMF_L2ROUT 011 /* level 2 routing message */
152 #define RMF_RHELLO 013 /* router hello message */
153 #define RMF_EHELLO 015 /* endnode hello message */
154
155 #define TI_L2ROUT 01 /* level 2 router */
156 #define TI_L1ROUT 02 /* level 1 router */
157 #define TI_ENDNODE 03 /* endnode */
158 #define TI_VERIF 04 /* verification required */
159 #define TI_BLOCK 010 /* blocking requested */
160
161 #define VE_VERS 2 /* version number (2) */
162 #define VE_ECO 0 /* ECO number */
163 #define VE_UECO 0 /* user ECO number (0) */
164
165 #define P3_VERS 1 /* phase III version number (1) */
166 #define P3_ECO 3 /* ECO number (3) */
167 #define P3_UECO 0 /* user ECO number (0) */
168
169 #define II_L2ROUT 01 /* level 2 router */
170 #define II_L1ROUT 02 /* level 1 router */
171 #define II_ENDNODE 03 /* endnode */
172 #define II_VERIF 04 /* verification required */
173 #define II_NOMCAST 040 /* no multicast traffic accepted */
174 #define II_BLOCK 0100 /* blocking requested */
175 #define II_TYPEMASK 03 /* mask for node type */
176
177 #define TESTDATA 0252 /* test data bytes */
178 #define TESTLEN 1 /* length of transmitted test data */
179
180 /*
181 * Define control message formats.
182 */
183 struct initmsgIII /* phase III initialization message */
184 {
185 byte inIII_flags; /* route flags */
186 word inIII_src; /* source node address */
187 byte inIII_info; /* routing layer information */
188 word inIII_blksize; /* maximum data link block size */
189 byte inIII_vers; /* version number */
190 byte inIII_eco; /* ECO number */
191 byte inIII_ueco; /* user ECO number */
192 byte inIII_rsvd; /* reserved image field */
193 };
194
195 struct initmsg /* initialization message */
196 {
197 byte in_flags; /* route flags */
198 word in_src; /* source node address */
199 byte in_info; /* routing layer information */
200 word in_blksize; /* maximum data link block size */
201 byte in_vers; /* version number */
202 byte in_eco; /* ECO number */
203 byte in_ueco; /* user ECO number */
204 word in_hello; /* hello timer */
205 byte in_rsvd; /* reserved image field */
206 };
207
208 struct verifmsg /* verification message */
209 {
210 byte ve_flags; /* route flags */
211 word ve_src; /* source node address */
212 byte ve_fcnval; /* function value image field */
213 };
214
215 struct testmsg /* hello and test message */
216 {
217 byte te_flags; /* route flags */
218 word te_src; /* source node address */
219 byte te_data; /* test data image field */
220 };
221
222 struct l1rout /* level 1 routing message */
223 {
224 byte r1_flags; /* route flags */
225 word r1_src; /* source node address */
226 byte r1_rsvd; /* reserved field */
227 };
228
229 struct l2rout /* level 2 routing message */
230 {
231 byte r2_flags; /* route flags */
232 word r2_src; /* source node address */
233 byte r2_rsvd; /* reserved field */
234 };
235
236 struct rhellomsg /* router hello message */
237 {
238 byte rh_flags; /* route flags */
239 byte rh_vers; /* version number */
240 byte rh_eco; /* ECO number */
241 byte rh_ueco; /* user ECO number */
242 etheraddr rh_src; /* source id */
243 byte rh_info; /* routing layer information */
244 word rh_blksize; /* maximum data link block size */
245 byte rh_priority; /* router's priority */
246 byte rh_area; /* reserved */
247 word rh_hello; /* hello timer */
248 byte rh_mpd; /* reserved */
249 };
250
251 struct ehellomsg /* endnode hello message */
252 {
253 byte eh_flags; /* route flags */
254 byte eh_vers; /* version number */
255 byte eh_eco; /* ECO number */
256 byte eh_ueco; /* user ECO number */
257 etheraddr eh_src; /* source id */
258 byte eh_info; /* routing layer information */
259 word eh_blksize; /* maximum data link block size */
260 byte eh_area; /* area (reserved) */
261 byte eh_seed[8]; /* verification seed */
262 etheraddr eh_router; /* designated router */
263 word eh_hello; /* hello timer */
264 byte eh_mpd; /* (reserved) */
265 byte eh_data; /* test data image field */
266 };
267
268 union controlmsg
269 {
270 struct initmsg cm_init; /* initialization message */
271 struct verifmsg cm_ver; /* verification message */
272 struct testmsg cm_test; /* hello and test message */
273 struct l1rout cm_l1rou; /* level 1 routing message */
274 struct l2rout cm_l2rout; /* level 2 routing message */
275 struct rhellomsg cm_rhello; /* router hello message */
276 struct ehellomsg cm_ehello; /* endnode hello message */
277 };
278
279 /* Macros for decoding routing-info fields */
280 #define RI_COST(x) ((x)&0777)
281 #define RI_HOPS(x) (((x)>>10)&037)
282
283 /*
284 * NSP protocol fields and values.
285 */
286
287 #define NSP_TYPEMASK 014 /* mask to isolate type code */
288 #define NSP_SUBMASK 0160 /* mask to isolate subtype code */
289 #define NSP_SUBSHFT 4 /* shift to move subtype code */
290
291 #define MFT_DATA 0 /* data message */
292 #define MFT_ACK 04 /* acknowledgement message */
293 #define MFT_CTL 010 /* control message */
294
295 #define MFS_ILS 020 /* data or I/LS indicator */
296 #define MFS_BOM 040 /* beginning of message (data) */
297 #define MFS_MOM 0 /* middle of message (data) */
298 #define MFS_EOM 0100 /* end of message (data) */
299 #define MFS_INT 040 /* interrupt message */
300
301 #define MFS_DACK 0 /* data acknowledgement */
302 #define MFS_IACK 020 /* I/LS acknowledgement */
303 #define MFS_CACK 040 /* connect acknowledgement */
304
305 #define MFS_NOP 0 /* no operation */
306 #define MFS_CI 020 /* connect initiate */
307 #define MFS_CC 040 /* connect confirm */
308 #define MFS_DI 060 /* disconnect initiate */
309 #define MFS_DC 0100 /* disconnect confirm */
310 #define MFS_RCI 0140 /* retransmitted connect initiate */
311
312 #define SGQ_ACK 0100000 /* ack */
313 #define SGQ_NAK 0110000 /* negative ack */
314 #define SGQ_OACK 0120000 /* other channel ack */
315 #define SGQ_ONAK 0130000 /* other channel negative ack */
316 #define SGQ_MASK 07777 /* mask to isolate seq # */
317 #define SGQ_OTHER 020000 /* other channel qualifier */
318 #define SGQ_DELAY 010000 /* ack delay flag */
319
320 #define SGQ_EOM 0100000 /* pseudo flag for end-of-message */
321
322 #define LSM_MASK 03 /* mask for modifier field */
323 #define LSM_NOCHANGE 0 /* no change */
324 #define LSM_DONOTSEND 1 /* do not send data */
325 #define LSM_SEND 2 /* send data */
326
327 #define LSI_MASK 014 /* mask for interpretation field */
328 #define LSI_DATA 0 /* data segment or message count */
329 #define LSI_INTR 4 /* interrupt request count */
330 #define LSI_INTM 0377 /* funny marker for int. message */
331
332 #define COS_MASK 014 /* mask for flow control field */
333 #define COS_NONE 0 /* no flow control */
334 #define COS_SEGMENT 04 /* segment flow control */
335 #define COS_MESSAGE 010 /* message flow control */
336 #define COS_DEFAULT 1 /* default value for field */
337
338 #define COI_MASK 3 /* mask for version field */
339 #define COI_32 0 /* version 3.2 */
340 #define COI_31 1 /* version 3.1 */
341 #define COI_40 2 /* version 4.0 */
342 #define COI_41 3 /* version 4.1 */
343
344 #define MNU_MASK 140 /* mask for session control version */
345 #define MNU_10 000 /* session V1.0 */
346 #define MNU_20 040 /* session V2.0 */
347 #define MNU_ACCESS 1 /* access control present */
348 #define MNU_USRDATA 2 /* user data field present */
349 #define MNU_INVKPROXY 4 /* invoke proxy field present */
350 #define MNU_UICPROXY 8 /* use uic-based proxy */
351
352 #define DC_NORESOURCES 1 /* no resource reason code */
353 #define DC_NOLINK 41 /* no link terminate reason code */
354 #define DC_COMPLETE 42 /* disconnect complete reason code */
355
356 #define DI_NOERROR 0 /* user disconnect */
357 #define DI_SHUT 3 /* node is shutting down */
358 #define DI_NOUSER 4 /* destination end user does not exist */
359 #define DI_INVDEST 5 /* invalid end user destination */
360 #define DI_REMRESRC 6 /* insufficient remote resources */
361 #define DI_TPA 8 /* third party abort */
362 #define DI_PROTOCOL 7 /* protocol error discovered */
363 #define DI_ABORT 9 /* user abort */
364 #define DI_LOCALRESRC 32 /* insufficient local resources */
365 #define DI_REMUSERRESRC 33 /* insufficient remote user resources */
366 #define DI_BADACCESS 34 /* bad access control information */
367 #define DI_BADACCNT 36 /* bad ACCOUNT information */
368 #define DI_CONNECTABORT 38 /* connect request cancelled */
369 #define DI_TIMEDOUT 38 /* remote node or user crashed */
370 #define DI_UNREACHABLE 39 /* local timers expired due to ... */
371 #define DI_BADIMAGE 43 /* bad image data in connect */
372 #define DI_SERVMISMATCH 54 /* cryptographic service mismatch */
373
374 #define UC_OBJREJECT 0 /* object rejected connect */
375 #define UC_USERDISCONNECT 0 /* user disconnect */
376 #define UC_RESOURCES 1 /* insufficient resources (local or remote) */
377 #define UC_NOSUCHNODE 2 /* unrecognized node name */
378 #define UC_REMOTESHUT 3 /* remote node shutting down */
379 #define UC_NOSUCHOBJ 4 /* unrecognized object */
380 #define UC_INVOBJFORMAT 5 /* invalid object name format */
381 #define UC_OBJTOOBUSY 6 /* object too busy */
382 #define UC_NETWORKABORT 8 /* network abort */
383 #define UC_USERABORT 9 /* user abort */
384 #define UC_INVNODEFORMAT 10 /* invalid node name format */
385 #define UC_LOCALSHUT 11 /* local node shutting down */
386 #define UC_ACCESSREJECT 34 /* invalid access control information */
387 #define UC_NORESPONSE 38 /* no response from object */
388 #define UC_UNREACHABLE 39 /* node unreachable */
389
390 /*
391 * NSP message formats.
392 */
393 struct nsphdr /* general nsp header */
394 {
395 byte nh_flags; /* message flags */
396 word nh_dst; /* destination link address */
397 word nh_src; /* source link address */
398 };
399
400 struct seghdr /* data segment header */
401 {
402 byte sh_flags; /* message flags */
403 word sh_dst; /* destination link address */
404 word sh_src; /* source link address */
405 word sh_seq[3]; /* sequence numbers */
406 };
407
408 struct minseghdr /* minimum data segment header */
409 {
410 byte ms_flags; /* message flags */
411 word ms_dst; /* destination link address */
412 word ms_src; /* source link address */
413 word ms_seq; /* sequence number */
414 };
415
416 struct lsmsg /* link service message (after hdr) */
417 {
418 byte ls_lsflags; /* link service flags */
419 byte ls_fcval; /* flow control value */
420 };
421
422 struct ackmsg /* acknowledgement message */
423 {
424 byte ak_flags; /* message flags */
425 word ak_dst; /* destination link address */
426 word ak_src; /* source link address */
427 word ak_acknum[2]; /* acknowledgement numbers */
428 };
429
430 struct minackmsg /* minimum acknowledgement message */
431 {
432 byte mk_flags; /* message flags */
433 word mk_dst; /* destination link address */
434 word mk_src; /* source link address */
435 word mk_acknum; /* acknowledgement number */
436 };
437
438 struct ciackmsg /* connect acknowledgement message */
439 {
440 byte ck_flags; /* message flags */
441 word ck_dst; /* destination link address */
442 };
443
444 struct cimsg /* connect initiate message */
445 {
446 byte ci_flags; /* message flags */
447 word ci_dst; /* destination link address (0) */
448 word ci_src; /* source link address */
449 byte ci_services; /* requested services */
450 byte ci_info; /* information */
451 word ci_segsize; /* maximum segment size */
452 };
453
454 struct ccmsg /* connect confirm message */
455 {
456 byte cc_flags; /* message flags */
457 word cc_dst; /* destination link address */
458 word cc_src; /* source link address */
459 byte cc_services; /* requested services */
460 byte cc_info; /* information */
461 word cc_segsize; /* maximum segment size */
462 byte cc_optlen; /* optional data length */
463 };
464
465 struct cnmsg /* generic connect message */
466 {
467 byte cn_flags; /* message flags */
468 word cn_dst; /* destination link address */
469 word cn_src; /* source link address */
470 byte cn_services; /* requested services */
471 byte cn_info; /* information */
472 word cn_segsize; /* maximum segment size */
473 };
474
475 struct dimsg /* disconnect initiate message */
476 {
477 byte di_flags; /* message flags */
478 word di_dst; /* destination link address */
479 word di_src; /* source link address */
480 word di_reason; /* reason code */
481 byte di_optlen; /* optional data length */
482 };
483
484 struct dcmsg /* disconnect confirm message */
485 {
486 byte dc_flags; /* message flags */
487 word dc_dst; /* destination link address */
488 word dc_src; /* source link address */
489 word dc_reason; /* reason code */
490 };
491
492 /* Forwards */
493 static int print_decnet_ctlmsg(netdissect_options *, const union routehdr *, u_int, u_int);
494 static void print_t_info(netdissect_options *, u_int);
495 static int print_l1_routes(netdissect_options *, const char *, u_int);
496 static int print_l2_routes(netdissect_options *, const char *, u_int);
497 static void print_i_info(netdissect_options *, u_int);
498 static int print_elist(const char *, u_int);
499 static int print_nsp(netdissect_options *, const u_char *, u_int);
500 static void print_reason(netdissect_options *, u_int);
501
502 void
503 decnet_print(netdissect_options *ndo,
504 const u_char *ap, u_int length,
505 u_int caplen)
506 {
507 const union routehdr *rhp;
508 u_int mflags;
509 u_int dst, src, hops;
510 u_int nsplen, pktlen;
511 const u_char *nspp;
512
513 if (length < sizeof(struct shorthdr)) {
514 ND_PRINT("%s", tstr);
515 return;
516 }
517
518 ND_TCHECK_LEN(ap, sizeof(short));
519 pktlen = EXTRACT_LE_U_2(ap);
520 if (pktlen < sizeof(struct shorthdr)) {
521 ND_PRINT("%s", tstr);
522 return;
523 }
524 if (pktlen > length) {
525 ND_PRINT("%s", tstr);
526 return;
527 }
528 length = pktlen;
529
530 rhp = (const union routehdr *)(ap + sizeof(short));
531 ND_TCHECK(rhp->rh_short.sh_flags);
532 mflags = EXTRACT_U_1(rhp->rh_short.sh_flags);
533
534 if (mflags & RMF_PAD) {
535 /* pad bytes of some sort in front of message */
536 u_int padlen = mflags & RMF_PADMASK;
537 if (ndo->ndo_vflag)
538 ND_PRINT("[pad:%u] ", padlen);
539 if (length < padlen + 2) {
540 ND_PRINT("%s", tstr);
541 return;
542 }
543 ND_TCHECK_LEN(ap + sizeof(short), padlen);
544 ap += padlen;
545 length -= padlen;
546 caplen -= padlen;
547 rhp = (const union routehdr *)(ap + sizeof(short));
548 ND_TCHECK(rhp->rh_short.sh_flags);
549 mflags = EXTRACT_U_1(rhp->rh_short.sh_flags);
550 }
551
552 if (mflags & RMF_FVER) {
553 ND_PRINT("future-version-decnet");
554 ND_DEFAULTPRINT(ap, min(length, caplen));
555 return;
556 }
557
558 /* is it a control message? */
559 if (mflags & RMF_CTLMSG) {
560 if (!print_decnet_ctlmsg(ndo, rhp, length, caplen))
561 goto trunc;
562 return;
563 }
564
565 switch (mflags & RMF_MASK) {
566 case RMF_LONG:
567 if (length < sizeof(struct longhdr)) {
568 ND_PRINT("%s", tstr);
569 return;
570 }
571 ND_TCHECK(rhp->rh_long);
572 dst =
573 EXTRACT_LE_U_2(rhp->rh_long.lg_dst.dne_remote.dne_nodeaddr);
574 src =
575 EXTRACT_LE_U_2(rhp->rh_long.lg_src.dne_remote.dne_nodeaddr);
576 hops = EXTRACT_U_1(rhp->rh_long.lg_visits);
577 nspp = ap + sizeof(short) + sizeof(struct longhdr);
578 nsplen = length - sizeof(struct longhdr);
579 break;
580 case RMF_SHORT:
581 ND_TCHECK(rhp->rh_short);
582 dst = EXTRACT_LE_U_2(rhp->rh_short.sh_dst);
583 src = EXTRACT_LE_U_2(rhp->rh_short.sh_src);
584 hops = (EXTRACT_U_1(rhp->rh_short.sh_visits) & VIS_MASK)+1;
585 nspp = ap + sizeof(short) + sizeof(struct shorthdr);
586 nsplen = length - sizeof(struct shorthdr);
587 break;
588 default:
589 ND_PRINT("unknown message flags under mask");
590 ND_DEFAULTPRINT((const u_char *)ap, min(length, caplen));
591 return;
592 }
593
594 ND_PRINT("%s > %s %u ",
595 dnaddr_string(ndo, src), dnaddr_string(ndo, dst), pktlen);
596 if (ndo->ndo_vflag) {
597 if (mflags & RMF_RQR)
598 ND_PRINT("RQR ");
599 if (mflags & RMF_RTS)
600 ND_PRINT("RTS ");
601 if (mflags & RMF_IE)
602 ND_PRINT("IE ");
603 ND_PRINT("%u hops ", hops);
604 }
605
606 if (!print_nsp(ndo, nspp, nsplen))
607 goto trunc;
608 return;
609
610 trunc:
611 ND_PRINT("%s", tstr);
612 return;
613 }
614
615 static int
616 print_decnet_ctlmsg(netdissect_options *ndo,
617 const union routehdr *rhp, u_int length,
618 u_int caplen)
619 {
620 /* Our caller has already checked for mflags */
621 u_int mflags = EXTRACT_U_1(rhp->rh_short.sh_flags);
622 const union controlmsg *cmp = (const union controlmsg *)rhp;
623 u_int src, dst, info, blksize, eco, ueco, hello, other, vers;
624 etheraddr srcea, rtea;
625 u_int priority;
626 const char *rhpx = (const char *)rhp;
627 int ret;
628
629 switch (mflags & RMF_CTLMASK) {
630 case RMF_INIT:
631 ND_PRINT("init ");
632 if (length < sizeof(struct initmsg))
633 goto trunc;
634 ND_TCHECK(cmp->cm_init);
635 src = EXTRACT_LE_U_2(cmp->cm_init.in_src);
636 info = EXTRACT_U_1(cmp->cm_init.in_info);
637 blksize = EXTRACT_LE_U_2(cmp->cm_init.in_blksize);
638 vers = EXTRACT_U_1(cmp->cm_init.in_vers);
639 eco = EXTRACT_U_1(cmp->cm_init.in_eco);
640 ueco = EXTRACT_U_1(cmp->cm_init.in_ueco);
641 hello = EXTRACT_LE_U_2(cmp->cm_init.in_hello);
642 print_t_info(ndo, info);
643 ND_PRINT("src %sblksize %u vers %u eco %u ueco %u hello %u",
644 dnaddr_string(ndo, src), blksize, vers, eco, ueco,
645 hello);
646 ret = 1;
647 break;
648 case RMF_VER:
649 ND_PRINT("verification ");
650 if (length < sizeof(struct verifmsg))
651 goto trunc;
652 ND_TCHECK(cmp->cm_ver);
653 src = EXTRACT_LE_U_2(cmp->cm_ver.ve_src);
654 other = EXTRACT_U_1(cmp->cm_ver.ve_fcnval);
655 ND_PRINT("src %s fcnval %o", dnaddr_string(ndo, src), other);
656 ret = 1;
657 break;
658 case RMF_TEST:
659 ND_PRINT("test ");
660 if (length < sizeof(struct testmsg))
661 goto trunc;
662 ND_TCHECK(cmp->cm_test);
663 src = EXTRACT_LE_U_2(cmp->cm_test.te_src);
664 other = EXTRACT_U_1(cmp->cm_test.te_data);
665 ND_PRINT("src %s data %o", dnaddr_string(ndo, src), other);
666 ret = 1;
667 break;
668 case RMF_L1ROUT:
669 ND_PRINT("lev-1-routing ");
670 if (length < sizeof(struct l1rout))
671 goto trunc;
672 ND_TCHECK(cmp->cm_l1rou);
673 src = EXTRACT_LE_U_2(cmp->cm_l1rou.r1_src);
674 ND_PRINT("src %s ", dnaddr_string(ndo, src));
675 ret = print_l1_routes(ndo, &(rhpx[sizeof(struct l1rout)]),
676 length - sizeof(struct l1rout));
677 break;
678 case RMF_L2ROUT:
679 ND_PRINT("lev-2-routing ");
680 if (length < sizeof(struct l2rout))
681 goto trunc;
682 ND_TCHECK(cmp->cm_l2rout);
683 src = EXTRACT_LE_U_2(cmp->cm_l2rout.r2_src);
684 ND_PRINT("src %s ", dnaddr_string(ndo, src));
685 ret = print_l2_routes(ndo, &(rhpx[sizeof(struct l2rout)]),
686 length - sizeof(struct l2rout));
687 break;
688 case RMF_RHELLO:
689 ND_PRINT("router-hello ");
690 if (length < sizeof(struct rhellomsg))
691 goto trunc;
692 ND_TCHECK(cmp->cm_rhello);
693 vers = EXTRACT_U_1(cmp->cm_rhello.rh_vers);
694 eco = EXTRACT_U_1(cmp->cm_rhello.rh_eco);
695 ueco = EXTRACT_U_1(cmp->cm_rhello.rh_ueco);
696 memcpy((char *)&srcea, (const char *)&(cmp->cm_rhello.rh_src),
697 sizeof(srcea));
698 src = EXTRACT_LE_U_2(srcea.dne_remote.dne_nodeaddr);
699 info = EXTRACT_U_1(cmp->cm_rhello.rh_info);
700 blksize = EXTRACT_LE_U_2(cmp->cm_rhello.rh_blksize);
701 priority = EXTRACT_U_1(cmp->cm_rhello.rh_priority);
702 hello = EXTRACT_LE_U_2(cmp->cm_rhello.rh_hello);
703 print_i_info(ndo, info);
704 ND_PRINT("vers %u eco %u ueco %u src %s blksize %u pri %u hello %u",
705 vers, eco, ueco, dnaddr_string(ndo, src),
706 blksize, priority, hello);
707 ret = print_elist(&(rhpx[sizeof(struct rhellomsg)]),
708 length - sizeof(struct rhellomsg));
709 break;
710 case RMF_EHELLO:
711 ND_PRINT("endnode-hello ");
712 if (length < sizeof(struct ehellomsg))
713 goto trunc;
714 ND_TCHECK(cmp->cm_ehello);
715 vers = EXTRACT_U_1(cmp->cm_ehello.eh_vers);
716 eco = EXTRACT_U_1(cmp->cm_ehello.eh_eco);
717 ueco = EXTRACT_U_1(cmp->cm_ehello.eh_ueco);
718 memcpy((char *)&srcea, (const char *)&(cmp->cm_ehello.eh_src),
719 sizeof(srcea));
720 src = EXTRACT_LE_U_2(srcea.dne_remote.dne_nodeaddr);
721 info = EXTRACT_U_1(cmp->cm_ehello.eh_info);
722 blksize = EXTRACT_LE_U_2(cmp->cm_ehello.eh_blksize);
723 /*seed*/
724 memcpy((char *)&rtea, (const char *)&(cmp->cm_ehello.eh_router),
725 sizeof(rtea));
726 dst = EXTRACT_LE_U_2(rtea.dne_remote.dne_nodeaddr);
727 hello = EXTRACT_LE_U_2(cmp->cm_ehello.eh_hello);
728 other = EXTRACT_U_1(cmp->cm_ehello.eh_data);
729 print_i_info(ndo, info);
730 ND_PRINT("vers %u eco %u ueco %u src %s blksize %u rtr %s hello %u data %o",
731 vers, eco, ueco, dnaddr_string(ndo, src),
732 blksize, dnaddr_string(ndo, dst), hello, other);
733 ret = 1;
734 break;
735
736 default:
737 ND_PRINT("unknown control message");
738 ND_DEFAULTPRINT((const u_char *)rhp, min(length, caplen));
739 ret = 1;
740 break;
741 }
742 return (ret);
743
744 trunc:
745 return (0);
746 }
747
748 static void
749 print_t_info(netdissect_options *ndo,
750 u_int info)
751 {
752 u_int ntype = info & 3;
753 switch (ntype) {
754 case 0: ND_PRINT("reserved-ntype? "); break;
755 case TI_L2ROUT: ND_PRINT("l2rout "); break;
756 case TI_L1ROUT: ND_PRINT("l1rout "); break;
757 case TI_ENDNODE: ND_PRINT("endnode "); break;
758 }
759 if (info & TI_VERIF)
760 ND_PRINT("verif ");
761 if (info & TI_BLOCK)
762 ND_PRINT("blo ");
763 }
764
765 static int
766 print_l1_routes(netdissect_options *ndo,
767 const char *rp, u_int len)
768 {
769 u_int count;
770 u_int id;
771 u_int info;
772
773 /* The last short is a checksum */
774 while (len > (3 * sizeof(short))) {
775 ND_TCHECK_LEN(rp, 3 * sizeof(short));
776 count = EXTRACT_LE_U_2(rp);
777 if (count > 1024)
778 return (1); /* seems to be bogus from here on */
779 rp += sizeof(short);
780 len -= sizeof(short);
781 id = EXTRACT_LE_U_2(rp);
782 rp += sizeof(short);
783 len -= sizeof(short);
784 info = EXTRACT_LE_U_2(rp);
785 rp += sizeof(short);
786 len -= sizeof(short);
787 ND_PRINT("{ids %u-%u cost %u hops %u} ", id, id + count,
788 RI_COST(info), RI_HOPS(info));
789 }
790 return (1);
791
792 trunc:
793 return (0);
794 }
795
796 static int
797 print_l2_routes(netdissect_options *ndo,
798 const char *rp, u_int len)
799 {
800 u_int count;
801 u_int area;
802 u_int info;
803
804 /* The last short is a checksum */
805 while (len > (3 * sizeof(short))) {
806 ND_TCHECK_LEN(rp, 3 * sizeof(short));
807 count = EXTRACT_LE_U_2(rp);
808 if (count > 1024)
809 return (1); /* seems to be bogus from here on */
810 rp += sizeof(short);
811 len -= sizeof(short);
812 area = EXTRACT_LE_U_2(rp);
813 rp += sizeof(short);
814 len -= sizeof(short);
815 info = EXTRACT_LE_U_2(rp);
816 rp += sizeof(short);
817 len -= sizeof(short);
818 ND_PRINT("{areas %u-%u cost %u hops %u} ", area, area + count,
819 RI_COST(info), RI_HOPS(info));
820 }
821 return (1);
822
823 trunc:
824 return (0);
825 }
826
827 static void
828 print_i_info(netdissect_options *ndo,
829 u_int info)
830 {
831 u_int ntype = info & II_TYPEMASK;
832 switch (ntype) {
833 case 0: ND_PRINT("reserved-ntype? "); break;
834 case II_L2ROUT: ND_PRINT("l2rout "); break;
835 case II_L1ROUT: ND_PRINT("l1rout "); break;
836 case II_ENDNODE: ND_PRINT("endnode "); break;
837 }
838 if (info & II_VERIF)
839 ND_PRINT("verif ");
840 if (info & II_NOMCAST)
841 ND_PRINT("nomcast ");
842 if (info & II_BLOCK)
843 ND_PRINT("blo ");
844 }
845
846 static int
847 print_elist(const char *elp _U_, u_int len _U_)
848 {
849 /* Not enough examples available for me to debug this */
850 return (1);
851 }
852
853 static int
854 print_nsp(netdissect_options *ndo,
855 const u_char *nspp, u_int nsplen)
856 {
857 const struct nsphdr *nsphp = (const struct nsphdr *)nspp;
858 u_int dst, src, flags;
859
860 if (nsplen < sizeof(struct nsphdr))
861 goto trunc;
862 ND_TCHECK_SIZE(nsphp);
863 flags = EXTRACT_U_1(nsphp->nh_flags);
864 dst = EXTRACT_LE_U_2(nsphp->nh_dst);
865 src = EXTRACT_LE_U_2(nsphp->nh_src);
866
867 switch (flags & NSP_TYPEMASK) {
868 case MFT_DATA:
869 switch (flags & NSP_SUBMASK) {
870 case MFS_BOM:
871 case MFS_MOM:
872 case MFS_EOM:
873 case MFS_BOM+MFS_EOM:
874 ND_PRINT("data %u>%u ", src, dst);
875 {
876 const struct seghdr *shp = (const struct seghdr *)nspp;
877 u_int ack;
878 u_int data_off = sizeof(struct minseghdr);
879
880 if (nsplen < data_off)
881 goto trunc;
882 ND_TCHECK(shp->sh_seq[0]);
883 ack = EXTRACT_LE_U_2(shp->sh_seq[0]);
884 if (ack & SGQ_ACK) { /* acknum field */
885 if ((ack & SGQ_NAK) == SGQ_NAK)
886 ND_PRINT("nak %u ", ack & SGQ_MASK);
887 else
888 ND_PRINT("ack %u ", ack & SGQ_MASK);
889 data_off += sizeof(short);
890 if (nsplen < data_off)
891 goto trunc;
892 ND_TCHECK(shp->sh_seq[1]);
893 ack = EXTRACT_LE_U_2(shp->sh_seq[1]);
894 if (ack & SGQ_OACK) { /* ackoth field */
895 if ((ack & SGQ_ONAK) == SGQ_ONAK)
896 ND_PRINT("onak %u ", ack & SGQ_MASK);
897 else
898 ND_PRINT("oack %u ", ack & SGQ_MASK);
899 data_off += sizeof(short);
900 if (nsplen < data_off)
901 goto trunc;
902 ND_TCHECK(shp->sh_seq[2]);
903 ack = EXTRACT_LE_U_2(shp->sh_seq[2]);
904 }
905 }
906 ND_PRINT("seg %u ", ack & SGQ_MASK);
907 }
908 break;
909 case MFS_ILS+MFS_INT:
910 ND_PRINT("intr ");
911 {
912 const struct seghdr *shp = (const struct seghdr *)nspp;
913 u_int ack;
914 u_int data_off = sizeof(struct minseghdr);
915
916 if (nsplen < data_off)
917 goto trunc;
918 ND_TCHECK(shp->sh_seq[0]);
919 ack = EXTRACT_LE_U_2(shp->sh_seq[0]);
920 if (ack & SGQ_ACK) { /* acknum field */
921 if ((ack & SGQ_NAK) == SGQ_NAK)
922 ND_PRINT("nak %u ", ack & SGQ_MASK);
923 else
924 ND_PRINT("ack %u ", ack & SGQ_MASK);
925 data_off += sizeof(short);
926 if (nsplen < data_off)
927 goto trunc;
928 ND_TCHECK(shp->sh_seq[1]);
929 ack = EXTRACT_LE_U_2(shp->sh_seq[1]);
930 if (ack & SGQ_OACK) { /* ackdat field */
931 if ((ack & SGQ_ONAK) == SGQ_ONAK)
932 ND_PRINT("nakdat %u ", ack & SGQ_MASK);
933 else
934 ND_PRINT("ackdat %u ", ack & SGQ_MASK);
935 data_off += sizeof(short);
936 if (nsplen < data_off)
937 goto trunc;
938 ND_TCHECK(shp->sh_seq[2]);
939 ack = EXTRACT_LE_U_2(shp->sh_seq[2]);
940 }
941 }
942 ND_PRINT("seg %u ", ack & SGQ_MASK);
943 }
944 break;
945 case MFS_ILS:
946 ND_PRINT("link-service %u>%u ", src, dst);
947 {
948 const struct seghdr *shp = (const struct seghdr *)nspp;
949 const struct lsmsg *lsmp =
950 (const struct lsmsg *)(nspp + sizeof(struct seghdr));
951 u_int ack;
952 u_int lsflags, fcval;
953
954 if (nsplen < sizeof(struct seghdr) + sizeof(struct lsmsg))
955 goto trunc;
956 ND_TCHECK(shp->sh_seq[0]);
957 ack = EXTRACT_LE_U_2(shp->sh_seq[0]);
958 if (ack & SGQ_ACK) { /* acknum field */
959 if ((ack & SGQ_NAK) == SGQ_NAK)
960 ND_PRINT("nak %u ", ack & SGQ_MASK);
961 else
962 ND_PRINT("ack %u ", ack & SGQ_MASK);
963 ND_TCHECK(shp->sh_seq[1]);
964 ack = EXTRACT_LE_U_2(shp->sh_seq[1]);
965 if (ack & SGQ_OACK) { /* ackdat field */
966 if ((ack & SGQ_ONAK) == SGQ_ONAK)
967 ND_PRINT("nakdat %u ", ack & SGQ_MASK);
968 else
969 ND_PRINT("ackdat %u ", ack & SGQ_MASK);
970 ND_TCHECK(shp->sh_seq[2]);
971 ack = EXTRACT_LE_U_2(shp->sh_seq[2]);
972 }
973 }
974 ND_PRINT("seg %u ", ack & SGQ_MASK);
975 ND_TCHECK_SIZE(lsmp);
976 lsflags = EXTRACT_U_1(lsmp->ls_lsflags);
977 fcval = EXTRACT_U_1(lsmp->ls_fcval);
978 switch (lsflags & LSI_MASK) {
979 case LSI_DATA:
980 ND_PRINT("dat seg count %u ", fcval);
981 switch (lsflags & LSM_MASK) {
982 case LSM_NOCHANGE:
983 break;
984 case LSM_DONOTSEND:
985 ND_PRINT("donotsend-data ");
986 break;
987 case LSM_SEND:
988 ND_PRINT("send-data ");
989 break;
990 default:
991 ND_PRINT("reserved-fcmod? %x", lsflags);
992 break;
993 }
994 break;
995 case LSI_INTR:
996 ND_PRINT("intr req count %u ", fcval);
997 break;
998 default:
999 ND_PRINT("reserved-fcval-int? %x", lsflags);
1000 break;
1001 }
1002 }
1003 break;
1004 default:
1005 ND_PRINT("reserved-subtype? %x %u > %u", flags, src, dst);
1006 break;
1007 }
1008 break;
1009 case MFT_ACK:
1010 switch (flags & NSP_SUBMASK) {
1011 case MFS_DACK:
1012 ND_PRINT("data-ack %u>%u ", src, dst);
1013 {
1014 const struct ackmsg *amp = (const struct ackmsg *)nspp;
1015 u_int ack;
1016
1017 if (nsplen < sizeof(struct ackmsg))
1018 goto trunc;
1019 ND_TCHECK_SIZE(amp);
1020 ack = EXTRACT_LE_U_2(amp->ak_acknum[0]);
1021 if (ack & SGQ_ACK) { /* acknum field */
1022 if ((ack & SGQ_NAK) == SGQ_NAK)
1023 ND_PRINT("nak %u ", ack & SGQ_MASK);
1024 else
1025 ND_PRINT("ack %u ", ack & SGQ_MASK);
1026 ack = EXTRACT_LE_U_2(amp->ak_acknum[1]);
1027 if (ack & SGQ_OACK) { /* ackoth field */
1028 if ((ack & SGQ_ONAK) == SGQ_ONAK)
1029 ND_PRINT("onak %u ", ack & SGQ_MASK);
1030 else
1031 ND_PRINT("oack %u ", ack & SGQ_MASK);
1032 }
1033 }
1034 }
1035 break;
1036 case MFS_IACK:
1037 ND_PRINT("ils-ack %u>%u ", src, dst);
1038 {
1039 const struct ackmsg *amp = (const struct ackmsg *)nspp;
1040 u_int ack;
1041
1042 if (nsplen < sizeof(struct ackmsg))
1043 goto trunc;
1044 ND_TCHECK_SIZE(amp);
1045 ack = EXTRACT_LE_U_2(amp->ak_acknum[0]);
1046 if (ack & SGQ_ACK) { /* acknum field */
1047 if ((ack & SGQ_NAK) == SGQ_NAK)
1048 ND_PRINT("nak %u ", ack & SGQ_MASK);
1049 else
1050 ND_PRINT("ack %u ", ack & SGQ_MASK);
1051 ND_TCHECK(amp->ak_acknum[1]);
1052 ack = EXTRACT_LE_U_2(amp->ak_acknum[1]);
1053 if (ack & SGQ_OACK) { /* ackdat field */
1054 if ((ack & SGQ_ONAK) == SGQ_ONAK)
1055 ND_PRINT("nakdat %u ", ack & SGQ_MASK);
1056 else
1057 ND_PRINT("ackdat %u ", ack & SGQ_MASK);
1058 }
1059 }
1060 }
1061 break;
1062 case MFS_CACK:
1063 ND_PRINT("conn-ack %u", dst);
1064 break;
1065 default:
1066 ND_PRINT("reserved-acktype? %x %u > %u", flags, src, dst);
1067 break;
1068 }
1069 break;
1070 case MFT_CTL:
1071 switch (flags & NSP_SUBMASK) {
1072 case MFS_CI:
1073 case MFS_RCI:
1074 if ((flags & NSP_SUBMASK) == MFS_CI)
1075 ND_PRINT("conn-initiate ");
1076 else
1077 ND_PRINT("retrans-conn-initiate ");
1078 ND_PRINT("%u>%u ", src, dst);
1079 {
1080 const struct cimsg *cimp = (const struct cimsg *)nspp;
1081 u_int services, info, segsize;
1082
1083 if (nsplen < sizeof(struct cimsg))
1084 goto trunc;
1085 ND_TCHECK_SIZE(cimp);
1086 services = EXTRACT_U_1(cimp->ci_services);
1087 info = EXTRACT_U_1(cimp->ci_info);
1088 segsize = EXTRACT_LE_U_2(cimp->ci_segsize);
1089
1090 switch (services & COS_MASK) {
1091 case COS_NONE:
1092 break;
1093 case COS_SEGMENT:
1094 ND_PRINT("seg ");
1095 break;
1096 case COS_MESSAGE:
1097 ND_PRINT("msg ");
1098 break;
1099 }
1100 switch (info & COI_MASK) {
1101 case COI_32:
1102 ND_PRINT("ver 3.2 ");
1103 break;
1104 case COI_31:
1105 ND_PRINT("ver 3.1 ");
1106 break;
1107 case COI_40:
1108 ND_PRINT("ver 4.0 ");
1109 break;
1110 case COI_41:
1111 ND_PRINT("ver 4.1 ");
1112 break;
1113 }
1114 ND_PRINT("segsize %u ", segsize);
1115 }
1116 break;
1117 case MFS_CC:
1118 ND_PRINT("conn-confirm %u>%u ", src, dst);
1119 {
1120 const struct ccmsg *ccmp = (const struct ccmsg *)nspp;
1121 u_int services, info;
1122 u_int segsize, optlen;
1123
1124 if (nsplen < sizeof(struct ccmsg))
1125 goto trunc;
1126 ND_TCHECK_SIZE(ccmp);
1127 services = EXTRACT_U_1(ccmp->cc_services);
1128 info = EXTRACT_U_1(ccmp->cc_info);
1129 segsize = EXTRACT_LE_U_2(ccmp->cc_segsize);
1130 optlen = EXTRACT_U_1(ccmp->cc_optlen);
1131
1132 switch (services & COS_MASK) {
1133 case COS_NONE:
1134 break;
1135 case COS_SEGMENT:
1136 ND_PRINT("seg ");
1137 break;
1138 case COS_MESSAGE:
1139 ND_PRINT("msg ");
1140 break;
1141 }
1142 switch (info & COI_MASK) {
1143 case COI_32:
1144 ND_PRINT("ver 3.2 ");
1145 break;
1146 case COI_31:
1147 ND_PRINT("ver 3.1 ");
1148 break;
1149 case COI_40:
1150 ND_PRINT("ver 4.0 ");
1151 break;
1152 case COI_41:
1153 ND_PRINT("ver 4.1 ");
1154 break;
1155 }
1156 ND_PRINT("segsize %u ", segsize);
1157 if (optlen) {
1158 ND_PRINT("optlen %u ", optlen);
1159 }
1160 }
1161 break;
1162 case MFS_DI:
1163 ND_PRINT("disconn-initiate %u>%u ", src, dst);
1164 {
1165 const struct dimsg *dimp = (const struct dimsg *)nspp;
1166 u_int reason;
1167 u_int optlen;
1168
1169 if (nsplen < sizeof(struct dimsg))
1170 goto trunc;
1171 ND_TCHECK_SIZE(dimp);
1172 reason = EXTRACT_LE_U_2(dimp->di_reason);
1173 optlen = EXTRACT_U_1(dimp->di_optlen);
1174
1175 print_reason(ndo, reason);
1176 if (optlen) {
1177 ND_PRINT("optlen %u ", optlen);
1178 }
1179 }
1180 break;
1181 case MFS_DC:
1182 ND_PRINT("disconn-confirm %u>%u ", src, dst);
1183 {
1184 const struct dcmsg *dcmp = (const struct dcmsg *)nspp;
1185 u_int reason;
1186
1187 ND_TCHECK_SIZE(dcmp);
1188 reason = EXTRACT_LE_U_2(dcmp->dc_reason);
1189
1190 print_reason(ndo, reason);
1191 }
1192 break;
1193 default:
1194 ND_PRINT("reserved-ctltype? %x %u > %u", flags, src, dst);
1195 break;
1196 }
1197 break;
1198 default:
1199 ND_PRINT("reserved-type? %x %u > %u", flags, src, dst);
1200 break;
1201 }
1202 return (1);
1203
1204 trunc:
1205 return (0);
1206 }
1207
1208 static const struct tok reason2str[] = {
1209 { UC_OBJREJECT, "object rejected connect" },
1210 { UC_RESOURCES, "insufficient resources" },
1211 { UC_NOSUCHNODE, "unrecognized node name" },
1212 { DI_SHUT, "node is shutting down" },
1213 { UC_NOSUCHOBJ, "unrecognized object" },
1214 { UC_INVOBJFORMAT, "invalid object name format" },
1215 { UC_OBJTOOBUSY, "object too busy" },
1216 { DI_PROTOCOL, "protocol error discovered" },
1217 { DI_TPA, "third party abort" },
1218 { UC_USERABORT, "user abort" },
1219 { UC_INVNODEFORMAT, "invalid node name format" },
1220 { UC_LOCALSHUT, "local node shutting down" },
1221 { DI_LOCALRESRC, "insufficient local resources" },
1222 { DI_REMUSERRESRC, "insufficient remote user resources" },
1223 { UC_ACCESSREJECT, "invalid access control information" },
1224 { DI_BADACCNT, "bad ACCOUNT information" },
1225 { UC_NORESPONSE, "no response from object" },
1226 { UC_UNREACHABLE, "node unreachable" },
1227 { DC_NOLINK, "no link terminate" },
1228 { DC_COMPLETE, "disconnect complete" },
1229 { DI_BADIMAGE, "bad image data in connect" },
1230 { DI_SERVMISMATCH, "cryptographic service mismatch" },
1231 { 0, NULL }
1232 };
1233
1234 static void
1235 print_reason(netdissect_options *ndo,
1236 u_int reason)
1237 {
1238 ND_PRINT("%s ", tok2str(reason2str, "reason-%u", reason));
1239 }
1240
1241 const char *
1242 dnnum_string(netdissect_options *ndo, u_short dnaddr)
1243 {
1244 char *str;
1245 size_t siz;
1246 u_int area = (u_short)(dnaddr & AREAMASK) >> AREASHIFT;
1247 u_int node = dnaddr & NODEMASK;
1248
1249 str = (char *)malloc(siz = sizeof("00.0000"));
1250 if (str == NULL)
1251 (*ndo->ndo_error)(ndo, "dnnum_string: malloc");
1252 snprintf(str, siz, "%u.%u", area, node);
1253 return(str);
1254 }
1255
1256 const char *
1257 dnname_string(netdissect_options *ndo, u_short dnaddr)
1258 {
1259 #ifdef HAVE_DNET_HTOA
1260 struct dn_naddr dna;
1261 char *dnname;
1262
1263 dna.a_len = sizeof(short);
1264 memcpy((char *)dna.a_addr, (char *)&dnaddr, sizeof(short));
1265 dnname = dnet_htoa(&dna);
1266 if(dnname != NULL)
1267 return (strdup(dnname));
1268 else
1269 return(dnnum_string(ndo, dnaddr));
1270 #else
1271 return(dnnum_string(ndo, dnaddr)); /* punt */
1272 #endif
1273 }