]> The Tcpdump Group git mirrors - tcpdump/blob - util-print.c
Rename the fn_printX() functions to nd_printX()
[tcpdump] / util-print.c
1 /*
2 * Copyright (c) 1990, 1991, 1993, 1994, 1995, 1996, 1997
3 * The Regents of the University of California. All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that: (1) source code distributions
7 * retain the above copyright notice and this paragraph in its entirety, (2)
8 * distributions including binary code include the above copyright notice and
9 * this paragraph in its entirety in the documentation or other materials
10 * provided with the distribution, and (3) all advertising materials mentioning
11 * features or use of this software display the following acknowledgement:
12 * ``This product includes software developed by the University of California,
13 * Lawrence Berkeley Laboratory and its contributors.'' Neither the name of
14 * the University nor the names of its contributors may be used to endorse
15 * or promote products derived from this software without specific prior
16 * written permission.
17 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED
18 * WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF
19 * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
20 */
21
22 /*
23 * txtproto_print() derived from original code by Hannes Gredler
24 * (hannes@gredler.at):
25 *
26 * Redistribution and use in source and binary forms, with or without
27 * modification, are permitted provided that: (1) source code
28 * distributions retain the above copyright notice and this paragraph
29 * in its entirety, and (2) distributions including binary code include
30 * the above copyright notice and this paragraph in its entirety in
31 * the documentation or other materials provided with the distribution.
32 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND
33 * WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, WITHOUT
34 * LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
35 * FOR A PARTICULAR PURPOSE.
36 */
37
38 #ifdef HAVE_CONFIG_H
39 #include <config.h>
40 #endif
41
42 #include "netdissect-stdinc.h"
43
44 #include <sys/stat.h>
45
46 #ifdef HAVE_FCNTL_H
47 #include <fcntl.h>
48 #endif
49 #include <ctype.h>
50 #include <stdio.h>
51 #include <stdarg.h>
52 #include <stdlib.h>
53 #include <string.h>
54
55 #include "netdissect.h"
56 #include "extract.h"
57 #include "ascii_strcasecmp.h"
58 #include "timeval-operations.h"
59
60 int32_t thiszone; /* seconds offset from gmt to local time */
61 /* invalid string to print '(invalid)' for malformed or corrupted packets */
62 const char istr[] = " (invalid)";
63
64 /*
65 * timestamp display buffer size, the biggest size of both formats is needed
66 * sizeof("0000000000.000000000") > sizeof("00:00:00.000000000")
67 */
68 #define TS_BUF_SIZE sizeof("0000000000.000000000")
69
70 #define TOKBUFSIZE 128
71
72 /*
73 * Print out a character, filtering out the non-printable ones
74 */
75 void
76 fn_print_char(netdissect_options *ndo, u_char c)
77 {
78 if (!ND_ISASCII(c)) {
79 c = ND_TOASCII(c);
80 ND_PRINT("M-");
81 }
82 if (!ND_ISPRINT(c)) {
83 c ^= 0x40; /* DEL to ?, others to alpha */
84 ND_PRINT("^");
85 }
86 ND_PRINT("%c", c);
87 }
88
89 /*
90 * Print out a null-terminated filename (or other ASCII string), part of
91 * the packet buffer.
92 * If ep is NULL, assume no truncation check is needed.
93 * Return true if truncated.
94 * Stop at ep (if given) or before the null char, whichever is first.
95 */
96 int
97 nd_print(netdissect_options *ndo,
98 const u_char *s, const u_char *ep)
99 {
100 int ret;
101 u_char c;
102
103 ret = 1; /* assume truncated */
104 while (ep == NULL || s < ep) {
105 c = EXTRACT_U_1(s);
106 s++;
107 if (c == '\0') {
108 ret = 0;
109 break;
110 }
111 fn_print_char(ndo, c);
112 }
113 return(ret);
114 }
115
116 /*
117 * Print out a null-terminated filename (or other ASCII string) from
118 * a fixed-length buffer, part of the packet buffer.
119 * If ep is NULL, assume no truncation check is needed.
120 * Return the number of bytes of string processed, including the
121 * terminating null, if not truncated. Return 0 if truncated.
122 */
123 u_int
124 nd_printztn(netdissect_options *ndo,
125 const u_char *s, u_int n, const u_char *ep)
126 {
127 u_int bytes;
128 u_char c;
129
130 bytes = 0;
131 for (;;) {
132 if (n == 0 || (ep != NULL && s >= ep)) {
133 /*
134 * Truncated. This includes "no null before we
135 * got to the end of the fixed-length buffer".
136 *
137 * XXX - BOOTP says "null-terminated", which
138 * means the maximum length of the string, in
139 * bytes, is 1 less than the size of the buffer,
140 * as there must always be a terminating null.
141 */
142 bytes = 0;
143 break;
144 }
145
146 c = EXTRACT_U_1(s);
147 s++;
148 bytes++;
149 n--;
150 if (c == '\0') {
151 /* End of string */
152 break;
153 }
154 fn_print_char(ndo, c);
155 }
156 return(bytes);
157 }
158
159 /*
160 * Print out a counted filename (or other ASCII string), part of
161 * the packet buffer.
162 * If ep is NULL, assume no truncation check is needed.
163 * Return true if truncated.
164 * Stop at ep (if given) or after n bytes, whichever is first.
165 */
166 int
167 nd_printn(netdissect_options *ndo,
168 const u_char *s, u_int n, const u_char *ep)
169 {
170 u_char c;
171
172 while (n > 0 && (ep == NULL || s < ep)) {
173 n--;
174 c = EXTRACT_U_1(s);
175 s++;
176 fn_print_char(ndo, c);
177 }
178 return (n == 0) ? 0 : 1;
179 }
180
181 /*
182 * Print out a null-padded filename (or other ASCII string), part of
183 * the packet buffer.
184 * If ep is NULL, assume no truncation check is needed.
185 * Return true if truncated.
186 * Stop at ep (if given) or after n bytes or before the null char,
187 * whichever is first.
188 */
189 int
190 nd_printzp(netdissect_options *ndo,
191 const u_char *s, u_int n,
192 const u_char *ep)
193 {
194 int ret;
195 u_char c;
196
197 ret = 1; /* assume truncated */
198 while (n > 0 && (ep == NULL || s < ep)) {
199 n--;
200 c = EXTRACT_U_1(s);
201 s++;
202 if (c == '\0') {
203 ret = 0;
204 break;
205 }
206 fn_print_char(ndo, c);
207 }
208 return (n == 0) ? 0 : ret;
209 }
210
211 /*
212 * Format the timestamp
213 */
214 static char *
215 ts_format(netdissect_options *ndo
216 #ifndef HAVE_PCAP_SET_TSTAMP_PRECISION
217 _U_
218 #endif
219 , int sec, int usec, char *buf)
220 {
221 const char *format;
222
223 #ifdef HAVE_PCAP_SET_TSTAMP_PRECISION
224 switch (ndo->ndo_tstamp_precision) {
225
226 case PCAP_TSTAMP_PRECISION_MICRO:
227 format = "%02d:%02d:%02d.%06u";
228 break;
229
230 case PCAP_TSTAMP_PRECISION_NANO:
231 format = "%02d:%02d:%02d.%09u";
232 break;
233
234 default:
235 format = "%02d:%02d:%02d.{unknown}";
236 break;
237 }
238 #else
239 format = "%02d:%02d:%02d.%06u";
240 #endif
241
242 nd_snprintf(buf, TS_BUF_SIZE, format,
243 sec / 3600, (sec % 3600) / 60, sec % 60, usec);
244
245 return buf;
246 }
247
248 /*
249 * Format the timestamp - Unix timeval style
250 */
251 static char *
252 ts_unix_format(netdissect_options *ndo
253 #ifndef HAVE_PCAP_SET_TSTAMP_PRECISION
254 _U_
255 #endif
256 , int sec, int usec, char *buf)
257 {
258 const char *format;
259
260 #ifdef HAVE_PCAP_SET_TSTAMP_PRECISION
261 switch (ndo->ndo_tstamp_precision) {
262
263 case PCAP_TSTAMP_PRECISION_MICRO:
264 format = "%u.%06u";
265 break;
266
267 case PCAP_TSTAMP_PRECISION_NANO:
268 format = "%u.%09u";
269 break;
270
271 default:
272 format = "%u.{unknown}";
273 break;
274 }
275 #else
276 format = "%u.%06u";
277 #endif
278
279 nd_snprintf(buf, TS_BUF_SIZE, format,
280 (unsigned)sec, (unsigned)usec);
281
282 return buf;
283 }
284
285 /*
286 * Print the timestamp
287 */
288 void
289 ts_print(netdissect_options *ndo,
290 const struct timeval *tvp)
291 {
292 int s;
293 struct tm *tm;
294 time_t Time;
295 char buf[TS_BUF_SIZE];
296 static struct timeval tv_ref;
297 struct timeval tv_result;
298 int negative_offset;
299 int nano_prec;
300
301 switch (ndo->ndo_tflag) {
302
303 case 0: /* Default */
304 s = (tvp->tv_sec + thiszone) % 86400;
305 ND_PRINT("%s ", ts_format(ndo, s, tvp->tv_usec, buf));
306 break;
307
308 case 1: /* No time stamp */
309 break;
310
311 case 2: /* Unix timeval style */
312 ND_PRINT("%s ", ts_unix_format(ndo,
313 tvp->tv_sec, tvp->tv_usec, buf));
314 break;
315
316 case 3: /* Microseconds/nanoseconds since previous packet */
317 case 5: /* Microseconds/nanoseconds since first packet */
318 #ifdef HAVE_PCAP_SET_TSTAMP_PRECISION
319 switch (ndo->ndo_tstamp_precision) {
320 case PCAP_TSTAMP_PRECISION_MICRO:
321 nano_prec = 0;
322 break;
323 case PCAP_TSTAMP_PRECISION_NANO:
324 nano_prec = 1;
325 break;
326 default:
327 nano_prec = 0;
328 break;
329 }
330 #else
331 nano_prec = 0;
332 #endif
333 if (!(netdissect_timevalisset(&tv_ref)))
334 tv_ref = *tvp; /* set timestamp for first packet */
335
336 negative_offset = netdissect_timevalcmp(tvp, &tv_ref, <);
337 if (negative_offset)
338 netdissect_timevalsub(&tv_ref, tvp, &tv_result, nano_prec);
339 else
340 netdissect_timevalsub(tvp, &tv_ref, &tv_result, nano_prec);
341
342 ND_PRINT((negative_offset ? "-" : " "));
343
344 ND_PRINT("%s ", ts_format(ndo,
345 tv_result.tv_sec, tv_result.tv_usec, buf));
346
347 if (ndo->ndo_tflag == 3)
348 tv_ref = *tvp; /* set timestamp for previous packet */
349 break;
350
351 case 4: /* Default + Date */
352 s = (tvp->tv_sec + thiszone) % 86400;
353 Time = (tvp->tv_sec + thiszone) - s;
354 tm = gmtime (&Time);
355 if (!tm)
356 ND_PRINT("Date fail ");
357 else
358 ND_PRINT("%04d-%02d-%02d %s ",
359 tm->tm_year+1900, tm->tm_mon+1, tm->tm_mday,
360 ts_format(ndo, s, tvp->tv_usec, buf));
361 break;
362 }
363 }
364
365 /*
366 * Print an unsigned relative number of seconds (e.g. hold time, prune timer)
367 * in the form 5m1s. This does no truncation, so 32230861 seconds
368 * is represented as 1y1w1d1h1m1s.
369 */
370 void
371 unsigned_relts_print(netdissect_options *ndo,
372 uint32_t secs)
373 {
374 static const char *lengths[] = {"y", "w", "d", "h", "m", "s"};
375 static const u_int seconds[] = {31536000, 604800, 86400, 3600, 60, 1};
376 const char **l = lengths;
377 const u_int *s = seconds;
378
379 if (secs == 0) {
380 ND_PRINT("0s");
381 return;
382 }
383 while (secs > 0) {
384 if (secs >= *s) {
385 ND_PRINT("%u%s", secs / *s, *l);
386 secs -= (secs / *s) * *s;
387 }
388 s++;
389 l++;
390 }
391 }
392
393 /*
394 * Print a signed relative number of seconds (e.g. hold time, prune timer)
395 * in the form 5m1s. This does no truncation, so 32230861 seconds
396 * is represented as 1y1w1d1h1m1s.
397 */
398 void
399 signed_relts_print(netdissect_options *ndo,
400 int32_t secs)
401 {
402 if (secs < 0) {
403 ND_PRINT("-");
404 if (secs == INT32_MIN) {
405 /*
406 * -2^31; you can't fit its absolute value into
407 * a 32-bit signed integer.
408 *
409 * Just directly pass said absolute value to
410 * unsigned_relts_print() directly.
411 *
412 * (XXX - does ISO C guarantee that -(-2^n),
413 * when calculated and cast to an n-bit unsigned
414 * integer type, will have the value 2^n?)
415 */
416 unsigned_relts_print(ndo, 2147483648U);
417 } else {
418 /*
419 * We now know -secs will fit into an int32_t;
420 * negate it and pass that to unsigned_relts_print().
421 */
422 unsigned_relts_print(ndo, -secs);
423 }
424 return;
425 }
426 unsigned_relts_print(ndo, secs);
427 }
428
429 /*
430 * this is a generic routine for printing unknown data;
431 * we pass on the linefeed plus indentation string to
432 * get a proper output - returns 0 on error
433 */
434
435 int
436 print_unknown_data(netdissect_options *ndo, const u_char *cp,const char *ident,int len)
437 {
438 if (len < 0) {
439 ND_PRINT("%sDissector error: print_unknown_data called with negative length",
440 ident);
441 return(0);
442 }
443 if (ndo->ndo_snapend - cp < len)
444 len = ndo->ndo_snapend - cp;
445 if (len < 0) {
446 ND_PRINT("%sDissector error: print_unknown_data called with pointer past end of packet",
447 ident);
448 return(0);
449 }
450 hex_print(ndo, ident,cp,len);
451 return(1); /* everything is ok */
452 }
453
454 /*
455 * Convert a token value to a string; use "fmt" if not found.
456 */
457 const char *
458 tok2strbuf(const struct tok *lp, const char *fmt,
459 u_int v, char *buf, size_t bufsize)
460 {
461 if (lp != NULL) {
462 while (lp->s != NULL) {
463 if (lp->v == v)
464 return (lp->s);
465 ++lp;
466 }
467 }
468 if (fmt == NULL)
469 fmt = "#%d";
470
471 (void)nd_snprintf(buf, bufsize, fmt, v);
472 return (const char *)buf;
473 }
474
475 /*
476 * Convert a token value to a string; use "fmt" if not found.
477 * Uses tok2strbuf() on one of four local static buffers of size TOKBUFSIZE
478 * in round-robin fashion.
479 */
480 const char *
481 tok2str(const struct tok *lp, const char *fmt,
482 u_int v)
483 {
484 static char buf[4][TOKBUFSIZE];
485 static int idx = 0;
486 char *ret;
487
488 ret = buf[idx];
489 idx = (idx+1) & 3;
490 return tok2strbuf(lp, fmt, v, ret, sizeof(buf[0]));
491 }
492
493 /*
494 * Convert a bit token value to a string; use "fmt" if not found.
495 * this is useful for parsing bitfields, the output strings are seperated
496 * if the s field is positive.
497 */
498 static char *
499 bittok2str_internal(const struct tok *lp, const char *fmt,
500 u_int v, const char *sep)
501 {
502 static char buf[1024+1]; /* our string buffer */
503 char *bufp = buf;
504 size_t space_left = sizeof(buf), string_size;
505 u_int rotbit; /* this is the bit we rotate through all bitpositions */
506 u_int tokval;
507 const char * sepstr = "";
508
509 while (lp != NULL && lp->s != NULL) {
510 tokval=lp->v; /* load our first value */
511 rotbit=1;
512 while (rotbit != 0) {
513 /*
514 * lets AND the rotating bit with our token value
515 * and see if we have got a match
516 */
517 if (tokval == (v&rotbit)) {
518 /* ok we have found something */
519 if (space_left <= 1)
520 return (buf); /* only enough room left for NUL, if that */
521 string_size = strlcpy(bufp, sepstr, space_left);
522 if (string_size >= space_left)
523 return (buf); /* we ran out of room */
524 bufp += string_size;
525 space_left -= string_size;
526 if (space_left <= 1)
527 return (buf); /* only enough room left for NUL, if that */
528 string_size = strlcpy(bufp, lp->s, space_left);
529 if (string_size >= space_left)
530 return (buf); /* we ran out of room */
531 bufp += string_size;
532 space_left -= string_size;
533 sepstr = sep;
534 break;
535 }
536 rotbit=rotbit<<1; /* no match - lets shift and try again */
537 }
538 lp++;
539 }
540
541 if (bufp == buf)
542 /* bummer - lets print the "unknown" message as advised in the fmt string if we got one */
543 (void)nd_snprintf(buf, sizeof(buf), fmt == NULL ? "#%08x" : fmt, v);
544 return (buf);
545 }
546
547 /*
548 * Convert a bit token value to a string; use "fmt" if not found.
549 * this is useful for parsing bitfields, the output strings are not seperated.
550 */
551 char *
552 bittok2str_nosep(const struct tok *lp, const char *fmt,
553 u_int v)
554 {
555 return (bittok2str_internal(lp, fmt, v, ""));
556 }
557
558 /*
559 * Convert a bit token value to a string; use "fmt" if not found.
560 * this is useful for parsing bitfields, the output strings are comma seperated.
561 */
562 char *
563 bittok2str(const struct tok *lp, const char *fmt,
564 u_int v)
565 {
566 return (bittok2str_internal(lp, fmt, v, ", "));
567 }
568
569 /*
570 * Convert a value to a string using an array; the macro
571 * tok2strary() in <netdissect.h> is the public interface to
572 * this function and ensures that the second argument is
573 * correct for bounds-checking.
574 */
575 const char *
576 tok2strary_internal(const char **lp, int n, const char *fmt,
577 int v)
578 {
579 static char buf[TOKBUFSIZE];
580
581 if (v >= 0 && v < n && lp[v] != NULL)
582 return lp[v];
583 if (fmt == NULL)
584 fmt = "#%d";
585 (void)nd_snprintf(buf, sizeof(buf), fmt, v);
586 return (buf);
587 }
588
589 /*
590 * Convert a 32-bit netmask to prefixlen if possible
591 * the function returns the prefix-len; if plen == -1
592 * then conversion was not possible;
593 */
594
595 int
596 mask2plen(uint32_t mask)
597 {
598 uint32_t bitmasks[33] = {
599 0x00000000,
600 0x80000000, 0xc0000000, 0xe0000000, 0xf0000000,
601 0xf8000000, 0xfc000000, 0xfe000000, 0xff000000,
602 0xff800000, 0xffc00000, 0xffe00000, 0xfff00000,
603 0xfff80000, 0xfffc0000, 0xfffe0000, 0xffff0000,
604 0xffff8000, 0xffffc000, 0xffffe000, 0xfffff000,
605 0xfffff800, 0xfffffc00, 0xfffffe00, 0xffffff00,
606 0xffffff80, 0xffffffc0, 0xffffffe0, 0xfffffff0,
607 0xfffffff8, 0xfffffffc, 0xfffffffe, 0xffffffff
608 };
609 int prefix_len = 32;
610
611 /* let's see if we can transform the mask into a prefixlen */
612 while (prefix_len >= 0) {
613 if (bitmasks[prefix_len] == mask)
614 break;
615 prefix_len--;
616 }
617 return (prefix_len);
618 }
619
620 int
621 mask62plen(const u_char *mask)
622 {
623 u_char bitmasks[9] = {
624 0x00,
625 0x80, 0xc0, 0xe0, 0xf0,
626 0xf8, 0xfc, 0xfe, 0xff
627 };
628 int byte;
629 int cidr_len = 0;
630
631 for (byte = 0; byte < 16; byte++) {
632 u_int bits;
633
634 for (bits = 0; bits < (sizeof (bitmasks) / sizeof (bitmasks[0])); bits++) {
635 if (mask[byte] == bitmasks[bits]) {
636 cidr_len += bits;
637 break;
638 }
639 }
640
641 if (mask[byte] != 0xff)
642 break;
643 }
644 return (cidr_len);
645 }
646
647 /*
648 * Routine to print out information for text-based protocols such as FTP,
649 * HTTP, SMTP, RTSP, SIP, ....
650 */
651 #define MAX_TOKEN 128
652
653 /*
654 * Fetch a token from a packet, starting at the specified index,
655 * and return the length of the token.
656 *
657 * Returns 0 on error; yes, this is indistinguishable from an empty
658 * token, but an "empty token" isn't a valid token - it just means
659 * either a space character at the beginning of the line (this
660 * includes a blank line) or no more tokens remaining on the line.
661 */
662 static int
663 fetch_token(netdissect_options *ndo, const u_char *pptr, u_int idx, u_int len,
664 u_char *tbuf, size_t tbuflen)
665 {
666 size_t toklen = 0;
667
668 for (; idx < len; idx++) {
669 if (!ND_TTEST_1(pptr + idx)) {
670 /* ran past end of captured data */
671 return (0);
672 }
673 if (!isascii(*(pptr + idx))) {
674 /* not an ASCII character */
675 return (0);
676 }
677 if (isspace(*(pptr + idx))) {
678 /* end of token */
679 break;
680 }
681 if (!isprint(*(pptr + idx))) {
682 /* not part of a command token or response code */
683 return (0);
684 }
685 if (toklen + 2 > tbuflen) {
686 /* no room for this character and terminating '\0' */
687 return (0);
688 }
689 tbuf[toklen] = *(pptr + idx);
690 toklen++;
691 }
692 if (toklen == 0) {
693 /* no token */
694 return (0);
695 }
696 tbuf[toklen] = '\0';
697
698 /*
699 * Skip past any white space after the token, until we see
700 * an end-of-line (CR or LF).
701 */
702 for (; idx < len; idx++) {
703 if (!ND_TTEST_1(pptr + idx)) {
704 /* ran past end of captured data */
705 break;
706 }
707 if (*(pptr + idx) == '\r' || *(pptr + idx) == '\n') {
708 /* end of line */
709 break;
710 }
711 if (!isascii(*(pptr + idx)) || !isprint(*(pptr + idx))) {
712 /* not a printable ASCII character */
713 break;
714 }
715 if (!isspace(*(pptr + idx))) {
716 /* beginning of next token */
717 break;
718 }
719 }
720 return (idx);
721 }
722
723 /*
724 * Scan a buffer looking for a line ending - LF or CR-LF.
725 * Return the index of the character after the line ending or 0 if
726 * we encounter a non-ASCII or non-printable character or don't find
727 * the line ending.
728 */
729 static u_int
730 print_txt_line(netdissect_options *ndo, const char *protoname,
731 const char *prefix, const u_char *pptr, u_int idx, u_int len)
732 {
733 u_int startidx;
734 u_int linelen;
735
736 startidx = idx;
737 while (idx < len) {
738 ND_TCHECK_1(pptr + idx);
739 if (*(pptr+idx) == '\n') {
740 /*
741 * LF without CR; end of line.
742 * Skip the LF and print the line, with the
743 * exception of the LF.
744 */
745 linelen = idx - startidx;
746 idx++;
747 goto print;
748 } else if (*(pptr+idx) == '\r') {
749 /* CR - any LF? */
750 if ((idx+1) >= len) {
751 /* not in this packet */
752 return (0);
753 }
754 ND_TCHECK_1(pptr + idx + 1);
755 if (*(pptr+idx+1) == '\n') {
756 /*
757 * CR-LF; end of line.
758 * Skip the CR-LF and print the line, with
759 * the exception of the CR-LF.
760 */
761 linelen = idx - startidx;
762 idx += 2;
763 goto print;
764 }
765
766 /*
767 * CR followed by something else; treat this
768 * as if it were binary data, and don't print
769 * it.
770 */
771 return (0);
772 } else if (!isascii(*(pptr+idx)) ||
773 (!isprint(*(pptr+idx)) && *(pptr+idx) != '\t')) {
774 /*
775 * Not a printable ASCII character and not a tab;
776 * treat this as if it were binary data, and
777 * don't print it.
778 */
779 return (0);
780 }
781 idx++;
782 }
783
784 /*
785 * All printable ASCII, but no line ending after that point
786 * in the buffer; treat this as if it were truncated.
787 */
788 trunc:
789 linelen = idx - startidx;
790 ND_PRINT("%s%.*s[!%s]", prefix, (int)linelen, pptr + startidx,
791 protoname);
792 return (0);
793
794 print:
795 ND_PRINT("%s%.*s", prefix, (int)linelen, pptr + startidx);
796 return (idx);
797 }
798
799 void
800 txtproto_print(netdissect_options *ndo, const u_char *pptr, u_int len,
801 const char *protoname, const char **cmds, u_int flags)
802 {
803 u_int idx, eol;
804 u_char token[MAX_TOKEN+1];
805 const char *cmd;
806 int print_this = 0;
807 const char *pnp;
808
809 if (cmds != NULL) {
810 /*
811 * This protocol has more than just request and
812 * response lines; see whether this looks like a
813 * request or response and, if so, print it and,
814 * in verbose mode, print everything after it.
815 *
816 * This is for HTTP-like protocols, where we
817 * want to print requests and responses, but
818 * don't want to print continuations of request
819 * or response bodies in packets that don't
820 * contain the request or response line.
821 */
822 idx = fetch_token(ndo, pptr, 0, len, token, sizeof(token));
823 if (idx != 0) {
824 /* Is this a valid request name? */
825 while ((cmd = *cmds++) != NULL) {
826 if (ascii_strcasecmp((const char *)token, cmd) == 0) {
827 /* Yes. */
828 print_this = 1;
829 break;
830 }
831 }
832
833 /*
834 * No - is this a valid response code (3 digits)?
835 *
836 * Is this token the response code, or is the next
837 * token the response code?
838 */
839 if (flags & RESP_CODE_SECOND_TOKEN) {
840 /*
841 * Next token - get it.
842 */
843 idx = fetch_token(ndo, pptr, idx, len, token,
844 sizeof(token));
845 }
846 if (idx != 0) {
847 if (isdigit(token[0]) && isdigit(token[1]) &&
848 isdigit(token[2]) && token[3] == '\0') {
849 /* Yes. */
850 print_this = 1;
851 }
852 }
853 }
854 } else {
855 /*
856 * Either:
857 *
858 * 1) This protocol has only request and response lines
859 * (e.g., FTP, where all the data goes over a different
860 * connection); assume the payload is a request or
861 * response.
862 *
863 * or
864 *
865 * 2) This protocol is just text, so that we should
866 * always, at minimum, print the first line and,
867 * in verbose mode, print all lines.
868 */
869 print_this = 1;
870 }
871
872 /* Capitalize the protocol name */
873 for (pnp = protoname; *pnp != '\0'; pnp++)
874 ND_PRINT("%c", toupper((u_char)*pnp));
875
876 if (print_this) {
877 /*
878 * In non-verbose mode, just print the protocol, followed
879 * by the first line.
880 *
881 * In verbose mode, print lines as text until we run out
882 * of characters or see something that's not a
883 * printable-ASCII line.
884 */
885 if (ndo->ndo_vflag) {
886 /*
887 * We're going to print all the text lines in the
888 * request or response; just print the length
889 * on the first line of the output.
890 */
891 ND_PRINT(", length: %u", len);
892 for (idx = 0;
893 idx < len && (eol = print_txt_line(ndo, protoname, "\n\t", pptr, idx, len)) != 0;
894 idx = eol)
895 ;
896 } else {
897 /*
898 * Just print the first text line.
899 */
900 print_txt_line(ndo, protoname, ": ", pptr, 0, len);
901 }
902 }
903 }
904
905 void
906 safeputs(netdissect_options *ndo,
907 const u_char *s, const u_int maxlen)
908 {
909 u_int idx = 0;
910
911 while (idx < maxlen && EXTRACT_U_1(s)) {
912 safeputchar(ndo, EXTRACT_U_1(s));
913 idx++;
914 s++;
915 }
916 }
917
918 void
919 safeputchar(netdissect_options *ndo,
920 const u_char c)
921 {
922 ND_PRINT((c < 0x80 && ND_ISPRINT(c)) ? "%c" : "\\0x%02x", c);
923 }
924
925 #if (defined(__i386__) || defined(_M_IX86) || defined(__X86__) || defined(__x86_64__) || defined(_M_X64)) || \
926 (defined(__arm__) || defined(_M_ARM) || defined(__aarch64__)) || \
927 (defined(__m68k__) && (!defined(__mc68000__) && !defined(__mc68010__))) || \
928 (defined(__ppc__) || defined(__ppc64__) || defined(_M_PPC) || defined(_ARCH_PPC) || defined(_ARCH_PPC64)) || \
929 (defined(__s390__) || defined(__s390x__) || defined(__zarch__)) || \
930 defined(__vax__)
931 /*
932 * The procesor natively handles unaligned loads, so just use memcpy()
933 * and memcmp(), to enable those optimizations.
934 *
935 * XXX - are those all the x86 tests we need?
936 * XXX - do we need to worry about ARMv1 through ARMv5, which didn't
937 * support unaligned loads, and, if so, do we need to worry about all
938 * of them, or just some of them, e.g. ARMv5?
939 * XXX - are those the only 68k tests we need not to generated
940 * unaligned accesses if the target is the 68000 or 68010?
941 * XXX - are there any tests we don't need, because some definitions are for
942 * compilers that also predefine the GCC symbols?
943 * XXX - do we need to test for both 32-bit and 64-bit versions of those
944 * architectures in all cases?
945 */
946 #else
947 /*
948 * The processor doesn't natively handle unaligned loads,
949 * and the compiler might "helpfully" optimize memcpy()
950 * and memcmp(), when handed pointers that would normally
951 * be properly aligned, into sequences that assume proper
952 * alignment.
953 *
954 * Do copies and compares of possibly-unaligned data by
955 * calling routines that wrap memcpy() and memcmp(), to
956 * prevent that optimization.
957 */
958 void
959 unaligned_memcpy(void *p, const void *q, size_t l)
960 {
961 memcpy(p, q, l);
962 }
963
964 /* As with memcpy(), so with memcmp(). */
965 int
966 unaligned_memcmp(const void *p, const void *q, size_t l)
967 {
968 return (memcmp(p, q, l));
969 }
970 #endif
971