]> The Tcpdump Group git mirrors - tcpdump/blob - print-sl.c
Print packets for unsupported link-layer protocols in hexadecimal/ASCII
[tcpdump] / print-sl.c
1 /*
2 * Copyright (c) 1989, 1990, 1991, 1993, 1994, 1995, 1996, 1997
3 * The Regents of the University of California. All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that: (1) source code distributions
7 * retain the above copyright notice and this paragraph in its entirety, (2)
8 * distributions including binary code include the above copyright notice and
9 * this paragraph in its entirety in the documentation or other materials
10 * provided with the distribution, and (3) all advertising materials mentioning
11 * features or use of this software display the following acknowledgement:
12 * ``This product includes software developed by the University of California,
13 * Lawrence Berkeley Laboratory and its contributors.'' Neither the name of
14 * the University nor the names of its contributors may be used to endorse
15 * or promote products derived from this software without specific prior
16 * written permission.
17 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED
18 * WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF
19 * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
20 */
21
22 /* \summary: Compressed Serial Line Internet Protocol printer */
23
24 #ifdef HAVE_CONFIG_H
25 #include <config.h>
26 #endif
27
28 #include "netdissect-stdinc.h"
29
30 #include "netdissect.h"
31 #include "extract.h"
32
33 #include "ip.h"
34 #include "tcp.h"
35 #include "slcompress.h"
36
37 /*
38 * definitions of the pseudo- link-level header attached to slip
39 * packets grabbed by the packet filter (bpf) traffic monitor.
40 */
41 #define SLIP_HDRLEN 16
42
43 #define SLX_DIR 0
44 #define SLX_CHDR 1
45 #define CHDR_LEN 15
46
47 #define SLIPDIR_IN 0
48 #define SLIPDIR_OUT 1
49
50
51 static u_int lastlen[2][256];
52 static u_int lastconn = 255;
53
54 static int sliplink_print(netdissect_options *, const u_char *, const struct ip *, u_int);
55 static int compressed_sl_print(netdissect_options *, const u_char *, const struct ip *, u_int, int);
56
57 void
58 sl_if_print(netdissect_options *ndo,
59 const struct pcap_pkthdr *h, const u_char *p)
60 {
61 u_int caplen = h->caplen;
62 u_int length = h->len;
63 const struct ip *ip;
64
65 ndo->ndo_protocol = "slip";
66 if (caplen < SLIP_HDRLEN) {
67 nd_print_trunc(ndo);
68 ndo->ndo_ll_header_length += caplen;
69 return;
70 }
71 ndo->ndo_ll_header_length += SLIP_HDRLEN;
72
73 caplen -= SLIP_HDRLEN;
74 length -= SLIP_HDRLEN;
75
76 ip = (const struct ip *)(p + SLIP_HDRLEN);
77
78 if (ndo->ndo_eflag)
79 if (sliplink_print(ndo, p, ip, length) == -1) {
80 nd_print_trunc(ndo);
81 return;
82 }
83
84 switch (IP_V(ip)) {
85 case 4:
86 ip_print(ndo, (const u_char *)ip, length);
87 break;
88 case 6:
89 ip6_print(ndo, (const u_char *)ip, length);
90 break;
91 default:
92 ND_PRINT("ip v%u", IP_V(ip));
93 }
94
95 return;
96 }
97
98 void
99 sl_bsdos_if_print(netdissect_options *ndo,
100 const struct pcap_pkthdr *h, const u_char *p)
101 {
102 u_int caplen = h->caplen;
103 u_int length = h->len;
104 const struct ip *ip;
105
106 ndo->ndo_protocol = "slip_bsdos";
107 if (caplen < SLIP_HDRLEN) {
108 nd_print_trunc(ndo);
109 ndo->ndo_ll_header_length += caplen;
110 return;
111 }
112 ndo->ndo_ll_header_length += SLIP_HDRLEN;
113
114 length -= SLIP_HDRLEN;
115
116 ip = (const struct ip *)(p + SLIP_HDRLEN);
117
118 #ifdef notdef
119 if (ndo->ndo_eflag)
120 sliplink_print(ndo, p, ip, length);
121 #endif
122
123 ip_print(ndo, (const u_char *)ip, length);
124
125 return;
126 }
127
128 static int
129 sliplink_print(netdissect_options *ndo,
130 const u_char *p, const struct ip *ip,
131 u_int length)
132 {
133 int dir;
134 u_int hlen;
135
136 dir = GET_U_1(p + SLX_DIR);
137 switch (dir) {
138
139 case SLIPDIR_IN:
140 ND_PRINT("I ");
141 break;
142
143 case SLIPDIR_OUT:
144 ND_PRINT("O ");
145 break;
146
147 default:
148 ND_PRINT("Invalid direction %d ", dir);
149 dir = -1;
150 break;
151 }
152 switch (GET_U_1(p + SLX_CHDR) & 0xf0) {
153
154 case TYPE_IP:
155 ND_PRINT("ip %u: ", length + SLIP_HDRLEN);
156 break;
157
158 case TYPE_UNCOMPRESSED_TCP:
159 /*
160 * The connection id is stored in the IP protocol field.
161 * Get it from the link layer since sl_uncompress_tcp()
162 * has restored the IP header copy to IPPROTO_TCP.
163 */
164 lastconn = GET_U_1(((const struct ip *)(p + SLX_CHDR))->ip_p);
165 ND_PRINT("utcp %u: ", lastconn);
166 if (dir == -1) {
167 /* Direction is bogus, don't use it */
168 return 0;
169 }
170 ND_TCHECK_SIZE(ip);
171 hlen = IP_HL(ip);
172 ND_TCHECK_SIZE((const struct tcphdr *)&((const int *)ip)[hlen]);
173 hlen += TH_OFF((const struct tcphdr *)&((const int *)ip)[hlen]);
174 lastlen[dir][lastconn] = length - (hlen << 2);
175 break;
176
177 default:
178 if (dir == -1) {
179 /* Direction is bogus, don't use it */
180 return 0;
181 }
182 if (GET_U_1(p + SLX_CHDR) & TYPE_COMPRESSED_TCP) {
183 if (compressed_sl_print(ndo, p + SLX_CHDR, ip,
184 length, dir) == -1)
185 goto trunc;
186 ND_PRINT(": ");
187 } else
188 ND_PRINT("slip-%u!: ", GET_U_1(p + SLX_CHDR));
189 }
190 return 0;
191 trunc:
192 return -1;
193 }
194
195 static const u_char *
196 print_sl_change(netdissect_options *ndo,
197 const char *str, const u_char *cp)
198 {
199 u_int i;
200
201 if ((i = GET_U_1(cp)) == 0) {
202 cp++;
203 i = GET_BE_U_2(cp);
204 cp += 2;
205 }
206 ND_PRINT(" %s%u", str, i);
207 return (cp);
208 }
209
210 static const u_char *
211 print_sl_winchange(netdissect_options *ndo,
212 const u_char *cp)
213 {
214 int16_t i;
215
216 if ((i = GET_U_1(cp)) == 0) {
217 cp++;
218 i = GET_BE_S_2(cp);
219 cp += 2;
220 }
221 if (i >= 0)
222 ND_PRINT(" W+%d", i);
223 else
224 ND_PRINT(" W%d", i);
225 return (cp);
226 }
227
228 static int
229 compressed_sl_print(netdissect_options *ndo,
230 const u_char *chdr, const struct ip *ip,
231 u_int length, int dir)
232 {
233 const u_char *cp = chdr;
234 u_int flags, hlen;
235
236 flags = GET_U_1(cp);
237 cp++;
238 if (flags & NEW_C) {
239 lastconn = GET_U_1(cp);
240 cp++;
241 ND_PRINT("ctcp %u", lastconn);
242 } else
243 ND_PRINT("ctcp *");
244
245 /* skip tcp checksum */
246 cp += 2;
247
248 switch (flags & SPECIALS_MASK) {
249 case SPECIAL_I:
250 ND_PRINT(" *SA+%u", lastlen[dir][lastconn]);
251 break;
252
253 case SPECIAL_D:
254 ND_PRINT(" *S+%u", lastlen[dir][lastconn]);
255 break;
256
257 default:
258 if (flags & NEW_U)
259 cp = print_sl_change(ndo, "U=", cp);
260 if (flags & NEW_W)
261 cp = print_sl_winchange(ndo, cp);
262 if (flags & NEW_A)
263 cp = print_sl_change(ndo, "A+", cp);
264 if (flags & NEW_S)
265 cp = print_sl_change(ndo, "S+", cp);
266 break;
267 }
268 if (flags & NEW_I)
269 cp = print_sl_change(ndo, "I+", cp);
270
271 /*
272 * 'hlen' is the length of the uncompressed TCP/IP header (in words).
273 * 'cp - chdr' is the length of the compressed header.
274 * 'length - hlen' is the amount of data in the packet.
275 */
276 ND_TCHECK_SIZE(ip);
277 hlen = IP_HL(ip);
278 ND_TCHECK_SIZE((const struct tcphdr *)&((const int32_t *)ip)[hlen]);
279 hlen += TH_OFF((const struct tcphdr *)&((const int32_t *)ip)[hlen]);
280 lastlen[dir][lastconn] = length - (hlen << 2);
281 ND_PRINT(" %u (%ld)", lastlen[dir][lastconn], (long)(cp - chdr));
282 return 0;
283 trunc:
284 return -1;
285 }