]> The Tcpdump Group git mirrors - tcpdump/blob - print-ppp.c
refactored ip_print() so that chained header parser (ESP/AH) can
[tcpdump] / print-ppp.c
1 /*
2 * Copyright (c) 1990, 1991, 1993, 1994, 1995, 1996, 1997
3 * The Regents of the University of California. All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that: (1) source code distributions
7 * retain the above copyright notice and this paragraph in its entirety, (2)
8 * distributions including binary code include the above copyright notice and
9 * this paragraph in its entirety in the documentation or other materials
10 * provided with the distribution, and (3) all advertising materials mentioning
11 * features or use of this software display the following acknowledgement:
12 * ``This product includes software developed by the University of California,
13 * Lawrence Berkeley Laboratory and its contributors.'' Neither the name of
14 * the University nor the names of its contributors may be used to endorse
15 * or promote products derived from this software without specific prior
16 * written permission.
17 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED
18 * WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF
19 * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
20 *
21 * Extensively modified by Motonori Shindo (mshindo@mshindo.net) for more
22 * complete PPP support.
23 */
24
25 /*
26 * TODO:
27 * o resolve XXX as much as possible
28 * o MP support
29 * o BAP support
30 */
31
32 #ifndef lint
33 static const char rcsid[] _U_ =
34 "@(#) $Header: /tcpdump/master/tcpdump/print-ppp.c,v 1.108 2005-04-06 21:32:42 mcr Exp $ (LBL)";
35 #endif
36
37 #ifdef HAVE_CONFIG_H
38 #include "config.h"
39 #endif
40
41 #include <tcpdump-stdinc.h>
42
43 #ifdef __bsdi__
44 #include <net/slcompress.h>
45 #include <net/if_ppp.h>
46 #endif
47
48 #include <pcap.h>
49 #include <stdio.h>
50 #include <stdlib.h>
51
52 #include "interface.h"
53 #include "extract.h"
54 #include "addrtoname.h"
55 #include "ppp.h"
56 #include "chdlc.h"
57 #include "ethertype.h"
58 #include "oui.h"
59
60 /*
61 * The following constatns are defined by IANA. Please refer to
62 * http://www.isi.edu/in-notes/iana/assignments/ppp-numbers
63 * for the up-to-date information.
64 */
65
66 /* Protocol Codes defined in ppp.h */
67
68 struct tok ppptype2str[] = {
69 { PPP_IP, "IP" },
70 { PPP_OSI, "OSI" },
71 { PPP_NS, "NS" },
72 { PPP_DECNET, "DECNET" },
73 { PPP_APPLE, "APPLE" },
74 { PPP_IPX, "IPX" },
75 { PPP_VJC, "VJC IP" },
76 { PPP_VJNC, "VJNC IP" },
77 { PPP_BRPDU, "BRPDU" },
78 { PPP_STII, "STII" },
79 { PPP_VINES, "VINES" },
80 { PPP_MPLS_UCAST, "MPLS" },
81 { PPP_MPLS_MCAST, "MPLS" },
82 { PPP_COMP, "Compressed"},
83 { PPP_ML, "MLPPP"},
84 { PPP_IPV6, "IP6"},
85
86 { PPP_HELLO, "HELLO" },
87 { PPP_LUXCOM, "LUXCOM" },
88 { PPP_SNS, "SNS" },
89 { PPP_IPCP, "IPCP" },
90 { PPP_OSICP, "OSICP" },
91 { PPP_NSCP, "NSCP" },
92 { PPP_DECNETCP, "DECNETCP" },
93 { PPP_APPLECP, "APPLECP" },
94 { PPP_IPXCP, "IPXCP" },
95 { PPP_STIICP, "STIICP" },
96 { PPP_VINESCP, "VINESCP" },
97 { PPP_IPV6CP, "IP6CP" },
98 { PPP_MPLSCP, "MPLSCP" },
99
100 { PPP_LCP, "LCP" },
101 { PPP_PAP, "PAP" },
102 { PPP_LQM, "LQM" },
103 { PPP_CHAP, "CHAP" },
104 { PPP_EAP, "EAP" },
105 { PPP_SPAP, "SPAP" },
106 { PPP_SPAP_OLD, "Old-SPAP" },
107 { PPP_BACP, "BACP" },
108 { PPP_BAP, "BAP" },
109 { PPP_MPCP, "MLPPP-CP" },
110 { 0, NULL }
111 };
112
113 /* Control Protocols (LCP/IPCP/CCP etc.) Codes defined in RFC 1661 */
114
115 #define CPCODES_VEXT 0 /* Vendor-Specific (RFC2153) */
116 #define CPCODES_CONF_REQ 1 /* Configure-Request */
117 #define CPCODES_CONF_ACK 2 /* Configure-Ack */
118 #define CPCODES_CONF_NAK 3 /* Configure-Nak */
119 #define CPCODES_CONF_REJ 4 /* Configure-Reject */
120 #define CPCODES_TERM_REQ 5 /* Terminate-Request */
121 #define CPCODES_TERM_ACK 6 /* Terminate-Ack */
122 #define CPCODES_CODE_REJ 7 /* Code-Reject */
123 #define CPCODES_PROT_REJ 8 /* Protocol-Reject (LCP only) */
124 #define CPCODES_ECHO_REQ 9 /* Echo-Request (LCP only) */
125 #define CPCODES_ECHO_RPL 10 /* Echo-Reply (LCP only) */
126 #define CPCODES_DISC_REQ 11 /* Discard-Request (LCP only) */
127 #define CPCODES_ID 12 /* Identification (LCP only) RFC1570 */
128 #define CPCODES_TIME_REM 13 /* Time-Remaining (LCP only) RFC1570 */
129 #define CPCODES_RESET_REQ 14 /* Reset-Request (CCP only) RFC1962 */
130 #define CPCODES_RESET_REP 15 /* Reset-Reply (CCP only) */
131
132 struct tok cpcodes[] = {
133 {CPCODES_VEXT, "Vendor-Extension"}, /* RFC2153 */
134 {CPCODES_CONF_REQ, "Conf-Request"},
135 {CPCODES_CONF_ACK, "Conf-Ack"},
136 {CPCODES_CONF_NAK, "Conf-Nack"},
137 {CPCODES_CONF_REJ, "Conf-Reject"},
138 {CPCODES_TERM_REQ, "Term-Request"},
139 {CPCODES_TERM_ACK, "Term-Ack"},
140 {CPCODES_CODE_REJ, "Code-Reject"},
141 {CPCODES_PROT_REJ, "Prot-Reject"},
142 {CPCODES_ECHO_REQ, "Echo-Request"},
143 {CPCODES_ECHO_RPL, "Echo-Reply"},
144 {CPCODES_DISC_REQ, "Disc-Req"},
145 {CPCODES_ID, "Ident"}, /* RFC1570 */
146 {CPCODES_TIME_REM, "Time-Rem"}, /* RFC1570 */
147 {CPCODES_RESET_REQ, "Reset-Req"}, /* RFC1962 */
148 {CPCODES_RESET_REP, "Reset-Ack"}, /* RFC1962 */
149 {0, NULL}
150 };
151
152 /* LCP Config Options */
153
154 #define LCPOPT_VEXT 0
155 #define LCPOPT_MRU 1
156 #define LCPOPT_ACCM 2
157 #define LCPOPT_AP 3
158 #define LCPOPT_QP 4
159 #define LCPOPT_MN 5
160 #define LCPOPT_DEP6 6
161 #define LCPOPT_PFC 7
162 #define LCPOPT_ACFC 8
163 #define LCPOPT_FCSALT 9
164 #define LCPOPT_SDP 10
165 #define LCPOPT_NUMMODE 11
166 #define LCPOPT_DEP12 12
167 #define LCPOPT_CBACK 13
168 #define LCPOPT_DEP14 14
169 #define LCPOPT_DEP15 15
170 #define LCPOPT_DEP16 16
171 #define LCPOPT_MLMRRU 17
172 #define LCPOPT_MLSSNHF 18
173 #define LCPOPT_MLED 19
174 #define LCPOPT_PROP 20
175 #define LCPOPT_DCEID 21
176 #define LCPOPT_MPP 22
177 #define LCPOPT_LD 23
178 #define LCPOPT_LCPAOPT 24
179 #define LCPOPT_COBS 25
180 #define LCPOPT_PE 26
181 #define LCPOPT_MLHF 27
182 #define LCPOPT_I18N 28
183 #define LCPOPT_SDLOS 29
184 #define LCPOPT_PPPMUX 30
185
186 #define LCPOPT_MIN LCPOPT_VEXT
187 #define LCPOPT_MAX LCPOPT_PPPMUX
188
189 static const char *lcpconfopts[] = {
190 "Vend-Ext", /* (0) */
191 "MRU", /* (1) */
192 "ACCM", /* (2) */
193 "Auth-Prot", /* (3) */
194 "Qual-Prot", /* (4) */
195 "Magic-Num", /* (5) */
196 "deprecated(6)", /* used to be a Quality Protocol */
197 "PFC", /* (7) */
198 "ACFC", /* (8) */
199 "FCS-Alt", /* (9) */
200 "SDP", /* (10) */
201 "Num-Mode", /* (11) */
202 "deprecated(12)", /* used to be a Multi-Link-Procedure*/
203 "Call-Back", /* (13) */
204 "deprecated(14)", /* used to be a Connect-Time */
205 "deprecated(15)", /* used to be a Compund-Frames */
206 "deprecated(16)", /* used to be a Nominal-Data-Encap */
207 "MRRU", /* (17) */
208 "12-Bit seq #", /* (18) */
209 "End-Disc", /* (19) */
210 "Proprietary", /* (20) */
211 "DCE-Id", /* (21) */
212 "MP+", /* (22) */
213 "Link-Disc", /* (23) */
214 "LCP-Auth-Opt", /* (24) */
215 "COBS", /* (25) */
216 "Prefix-elision", /* (26) */
217 "Multilink-header-Form",/* (27) */
218 "I18N", /* (28) */
219 "SDL-over-SONET/SDH", /* (29) */
220 "PPP-Muxing", /* (30) */
221 };
222
223 /* ECP - to be supported */
224
225 /* CCP Config Options */
226
227 #define CCPOPT_OUI 0 /* RFC1962 */
228 #define CCPOPT_PRED1 1 /* RFC1962 */
229 #define CCPOPT_PRED2 2 /* RFC1962 */
230 #define CCPOPT_PJUMP 3 /* RFC1962 */
231 /* 4-15 unassigned */
232 #define CCPOPT_HPPPC 16 /* RFC1962 */
233 #define CCPOPT_STACLZS 17 /* RFC1974 */
234 #define CCPOPT_MPPC 18 /* RFC2118 */
235 #define CCPOPT_GFZA 19 /* RFC1962 */
236 #define CCPOPT_V42BIS 20 /* RFC1962 */
237 #define CCPOPT_BSDCOMP 21 /* RFC1977 */
238 /* 22 unassigned */
239 #define CCPOPT_LZSDCP 23 /* RFC1967 */
240 #define CCPOPT_MVRCA 24 /* RFC1975 */
241 #define CCPOPT_DEC 25 /* RFC1976 */
242 #define CCPOPT_DEFLATE 26 /* RFC1979 */
243 /* 27-254 unassigned */
244 #define CCPOPT_RESV 255 /* RFC1962 */
245
246 #define CCPOPT_MIN CCPOPT_OUI
247 #define CCPOPT_MAX CCPOPT_DEFLATE /* XXX: should be CCPOPT_RESV but... */
248
249 static const char *ccpconfopts[] = {
250 "OUI", /* (0) */
251 "Pred-1", /* (1) */
252 "Pred-2", /* (2) */
253 "Puddle", /* (3) */
254 "unassigned(4)", /* (4) */
255 "unassigned(5)", /* (5) */
256 "unassigned(6)", /* (6) */
257 "unassigned(7)", /* (7) */
258 "unassigned(8)", /* (8) */
259 "unassigned(9)", /* (9) */
260 "unassigned(10)", /* (10) */
261 "unassigned(11)", /* (11) */
262 "unassigned(12)", /* (12) */
263 "unassigned(13)", /* (13) */
264 "unassigned(14)", /* (14) */
265 "unassigned(15)", /* (15) */
266 "HP-PPC", /* (16) */
267 "Stac-LZS", /* (17) */
268 "MPPC", /* (18) */
269 "Gand-FZA", /* (19) */
270 "V.42bis", /* (20) */
271 "BSD-Comp", /* (21) */
272 "unassigned(22)", /* (22) */
273 "LZS-DCP", /* (23) */
274 "MVRCA", /* (24) */
275 "DEC", /* (25) */
276 "Deflate", /* (26) */
277 };
278
279 /* BACP Config Options */
280
281 #define BACPOPT_FPEER 1 /* RFC2125 */
282
283 /* SDCP - to be supported */
284
285 /* IPCP Config Options */
286 #define IPCPOPT_2ADDR 1 /* RFC1172, RFC1332 (deprecated) */
287 #define IPCPOPT_IPCOMP 2 /* RFC1332 */
288 #define IPCPOPT_ADDR 3 /* RFC1332 */
289 #define IPCPOPT_MOBILE4 4 /* RFC2290 */
290 #define IPCPOPT_PRIDNS 129 /* RFC1877 */
291 #define IPCPOPT_PRINBNS 130 /* RFC1877 */
292 #define IPCPOPT_SECDNS 131 /* RFC1877 */
293 #define IPCPOPT_SECNBNS 132 /* RFC1877 */
294
295 struct tok ipcpopt_values[] = {
296 { IPCPOPT_2ADDR, "IP-Addrs" },
297 { IPCPOPT_IPCOMP, "IP-Comp" },
298 { IPCPOPT_ADDR, "IP-Addr" },
299 { IPCPOPT_MOBILE4, "Home-Addr" },
300 { IPCPOPT_PRIDNS, "Pri-DNS" },
301 { IPCPOPT_PRINBNS, "Pri-NBNS" },
302 { IPCPOPT_SECDNS, "Sec-DNS" },
303 { IPCPOPT_SECNBNS, "Sec-NBNS" },
304 { 0, NULL }
305 };
306
307
308 /* IP6CP Config Options */
309 #define IP6CP_IFID 1
310
311 struct tok ip6cpopt_values[] = {
312 { IP6CP_IFID, "Interface-ID" },
313 { 0, NULL }
314 };
315
316 /* ATCP - to be supported */
317 /* OSINLCP - to be supported */
318 /* BVCP - to be supported */
319 /* BCP - to be supported */
320 /* IPXCP - to be supported */
321 /* MPLSCP - to be supported */
322
323 /* Auth Algorithms */
324
325 /* 0-4 Reserved (RFC1994) */
326 #define AUTHALG_CHAPMD5 5 /* RFC1994 */
327 #define AUTHALG_MSCHAP1 128 /* RFC2433 */
328 #define AUTHALG_MSCHAP2 129 /* RFC2795 */
329
330 struct tok authalg_values[] = {
331 { AUTHALG_CHAPMD5, "MD5" },
332 { AUTHALG_MSCHAP1, "MS-CHAPv1" },
333 { AUTHALG_MSCHAP2, "MS-CHAPv2" },
334 { 0, NULL }
335 };
336
337 /* FCS Alternatives - to be supported */
338
339 /* Multilink Endpoint Discriminator (RFC1717) */
340 #define MEDCLASS_NULL 0 /* Null Class */
341 #define MEDCLASS_LOCAL 1 /* Locally Assigned */
342 #define MEDCLASS_IPV4 2 /* Internet Protocol (IPv4) */
343 #define MEDCLASS_MAC 3 /* IEEE 802.1 global MAC address */
344 #define MEDCLASS_MNB 4 /* PPP Magic Number Block */
345 #define MEDCLASS_PSNDN 5 /* Public Switched Network Director Number */
346
347 /* PPP LCP Callback */
348 #define CALLBACK_AUTH 0 /* Location determined by user auth */
349 #define CALLBACK_DSTR 1 /* Dialing string */
350 #define CALLBACK_LID 2 /* Location identifier */
351 #define CALLBACK_E164 3 /* E.164 number */
352 #define CALLBACK_X500 4 /* X.500 distinguished name */
353 #define CALLBACK_CBCP 6 /* Location is determined during CBCP nego */
354
355 /* CHAP */
356
357 #define CHAP_CHAL 1
358 #define CHAP_RESP 2
359 #define CHAP_SUCC 3
360 #define CHAP_FAIL 4
361
362 struct tok chapcode_values[] = {
363 { CHAP_CHAL, "Challenge" },
364 { CHAP_RESP, "Response" },
365 { CHAP_SUCC, "Success" },
366 { CHAP_FAIL, "Fail" },
367 { 0, NULL}
368 };
369
370 /* PAP */
371
372 #define PAP_AREQ 1
373 #define PAP_AACK 2
374 #define PAP_ANAK 3
375
376 struct tok papcode_values[] = {
377 { PAP_AREQ, "Auth-Req" },
378 { PAP_AACK, "Auth-ACK" },
379 { PAP_ANAK, "Auth-NACK" },
380 { 0, NULL }
381 };
382
383 /* BAP */
384 #define BAP_CALLREQ 1
385 #define BAP_CALLRES 2
386 #define BAP_CBREQ 3
387 #define BAP_CBRES 4
388 #define BAP_LDQREQ 5
389 #define BAP_LDQRES 6
390 #define BAP_CSIND 7
391 #define BAP_CSRES 8
392
393 static void handle_ctrl_proto (u_int proto,const u_char *p, int length);
394 static void handle_chap (const u_char *p, int length);
395 static void handle_pap (const u_char *p, int length);
396 static void handle_bap (const u_char *p, int length);
397 static void handle_mlppp(const u_char *p, int length);
398 static int print_lcp_config_options (const u_char *p, int);
399 static int print_ipcp_config_options (const u_char *p, int);
400 static int print_ip6cp_config_options (const u_char *p, int);
401 static int print_ccp_config_options (const u_char *p, int);
402 static int print_bacp_config_options (const u_char *p, int);
403 static void handle_ppp (u_int proto, const u_char *p, int length);
404 static void ppp_hdlc(const u_char *p, int length);
405
406 /* generic Control Protocol (e.g. LCP, IPCP, CCP, etc.) handler */
407 static void
408 handle_ctrl_proto(u_int proto, const u_char *pptr, int length)
409 {
410 const char *typestr;
411 u_int code, len;
412 int (*pfunc)(const u_char *, int);
413 int x, j;
414 const u_char *tptr;
415
416 tptr=pptr;
417
418 typestr = tok2str(ppptype2str, "unknown ctrl-proto (0x%04x)", proto);
419 printf("%s, ",typestr);
420
421 if (length < 4) /* FIXME weak boundary checking */
422 goto trunc;
423 TCHECK2(*tptr, 2);
424
425 code = *tptr++;
426
427 printf("%s (0x%02x), id %u",
428 tok2str(cpcodes, "Unknown Opcode",code),
429 code,
430 *tptr++); /* ID */
431
432 TCHECK2(*tptr, 2);
433 len = EXTRACT_16BITS(tptr);
434 tptr += 2;
435
436 if (length <= 4)
437 goto print_len_and_return; /* there may be a NULL confreq etc. */
438
439 switch (code) {
440 case CPCODES_VEXT:
441 if (length < 11)
442 break;
443 TCHECK2(*tptr, 4);
444 printf(", Magic-Num 0x%08x", EXTRACT_32BITS(tptr));
445 tptr += 4;
446 TCHECK2(*tptr, 3);
447 printf(" Vendor: %s (%u)",
448 tok2str(oui_values,"Unknown",EXTRACT_24BITS(tptr)),
449 EXTRACT_24BITS(tptr));
450 /* XXX: need to decode Kind and Value(s)? */
451 break;
452 case CPCODES_CONF_REQ:
453 case CPCODES_CONF_ACK:
454 case CPCODES_CONF_NAK:
455 case CPCODES_CONF_REJ:
456 x = len - 4; /* Code(1), Identifier(1) and Length(2) */
457 do {
458 switch (proto) {
459 case PPP_LCP:
460 pfunc = print_lcp_config_options;
461 break;
462 case PPP_IPCP:
463 pfunc = print_ipcp_config_options;
464 break;
465 case PPP_IPV6CP:
466 pfunc = print_ip6cp_config_options;
467 break;
468 case PPP_CCP:
469 pfunc = print_ccp_config_options;
470 break;
471 case PPP_BACP:
472 pfunc = print_bacp_config_options;
473 break;
474 default:
475 /*
476 * No print routine for the options for
477 * this protocol.
478 */
479 pfunc = NULL;
480 break;
481 }
482
483 if (pfunc == NULL) /* catch the above null pointer if unknown CP */
484 break;
485
486 if ((j = (*pfunc)(tptr, len)) == 0)
487 break;
488 x -= j;
489 tptr += j;
490 } while (x > 0);
491 break;
492
493 case CPCODES_TERM_REQ:
494 case CPCODES_TERM_ACK:
495 /* XXX: need to decode Data? */
496 break;
497 case CPCODES_CODE_REJ:
498 /* XXX: need to decode Rejected-Packet? */
499 break;
500 case CPCODES_PROT_REJ:
501 if (length < 6)
502 break;
503 TCHECK2(*tptr, 2);
504 printf(", Rejected %s Protocol (0x%04x)",
505 tok2str(ppptype2str,"unknown", EXTRACT_16BITS(tptr)),
506 EXTRACT_16BITS(tptr));
507 /* XXX: need to decode Rejected-Information? */
508 break;
509 case CPCODES_ECHO_REQ:
510 case CPCODES_ECHO_RPL:
511 case CPCODES_DISC_REQ:
512 case CPCODES_ID:
513 if (length < 8)
514 break;
515 TCHECK2(*tptr, 4);
516 printf(", Magic-Num 0x%08x", EXTRACT_32BITS(tptr));
517 /* XXX: need to decode Data? */
518 break;
519 case CPCODES_TIME_REM:
520 if (length < 12)
521 break;
522 TCHECK2(*tptr, 4);
523 printf(", Magic-Num 0x%08x", EXTRACT_32BITS(tptr));
524 TCHECK2(*(tptr + 4), 4);
525 printf(", Seconds-Remaining %us", EXTRACT_32BITS(tptr + 4));
526 /* XXX: need to decode Message? */
527 break;
528 default:
529 /* XXX this is dirty but we do not get the
530 * original pointer passed to the begin
531 * the PPP packet */
532 if (vflag <= 1)
533 print_unknown_data(pptr-2,"\n\t",length+2);
534 break;
535 }
536
537 print_len_and_return:
538 printf(", length %u", length);
539
540 if (vflag >1)
541 print_unknown_data(pptr-2,"\n\t",length+2);
542 return;
543
544 trunc:
545 printf("[|%s]", typestr);
546 }
547
548 /* LCP config options */
549 static int
550 print_lcp_config_options(const u_char *p, int length)
551 {
552 int len, opt;
553
554 if (length < 2)
555 return 0;
556 TCHECK2(*p, 2);
557 len = p[1];
558 opt = p[0];
559 if (length < len)
560 return 0;
561 if ((opt >= LCPOPT_MIN) && (opt <= LCPOPT_MAX))
562 printf(", %s (%u)", lcpconfopts[opt],opt);
563 else {
564 printf(", unknown LCP option 0x%02x", opt);
565 return len;
566 }
567
568 switch (opt) {
569 case LCPOPT_VEXT:
570 if (len >= 6) {
571 TCHECK2(*(p + 2), 3);
572 printf(" Vendor: %s (%u)",
573 tok2str(oui_values,"Unknown",EXTRACT_24BITS(p+2)),
574 EXTRACT_24BITS(p+2));
575 #if 0
576 TCHECK(p[5]);
577 printf(", kind: 0x%02x", p[5]);
578 printf(", Value: 0x")
579 for (i = 0; i < len - 6; i++) {
580 TCHECK(p[6 + i]);
581 printf("%02x", p[6 + i]);
582 }
583 #endif
584 }
585 break;
586 case LCPOPT_MRU:
587 if (len == 4) {
588 TCHECK2(*(p + 2), 2);
589 printf(" %u", EXTRACT_16BITS(p + 2));
590 }
591 break;
592 case LCPOPT_ACCM:
593 if (len == 6) {
594 TCHECK2(*(p + 2), 4);
595 printf(" 0x%08x", EXTRACT_32BITS(p + 2));
596 }
597 break;
598 case LCPOPT_AP:
599 if (len >= 4) {
600 TCHECK2(*(p + 2), 2);
601 printf(" %s", tok2str(ppptype2str,"Unknown Auth Proto (0x04x)",EXTRACT_16BITS(p+2)));
602
603 switch (EXTRACT_16BITS(p+2)) {
604 case PPP_CHAP:
605 TCHECK(p[4]);
606 printf(", %s",tok2str(authalg_values,"Unknown Auth Alg %u",p[4]));
607 break;
608 case PPP_PAP: /* fall through */
609 case PPP_EAP:
610 case PPP_SPAP:
611 case PPP_SPAP_OLD:
612 break;
613 default:
614 print_unknown_data(p,"\n\t",len);
615 }
616 }
617 break;
618 case LCPOPT_QP:
619 if (len >= 4) {
620 TCHECK2(*(p + 2), 2);
621 if (EXTRACT_16BITS(p+2) == PPP_LQM)
622 printf(" LQR");
623 else
624 printf(" unknown");
625 }
626 break;
627 case LCPOPT_MN:
628 if (len == 6) {
629 TCHECK2(*(p + 2), 4);
630 printf(" 0x%08x", EXTRACT_32BITS(p + 2));
631 }
632 break;
633 case LCPOPT_PFC:
634 break;
635 case LCPOPT_ACFC:
636 break;
637 case LCPOPT_LD:
638 if (len == 4) {
639 TCHECK2(*(p + 2), 2);
640 printf(" 0x%04x", EXTRACT_16BITS(p + 2));
641 }
642 break;
643 case LCPOPT_CBACK:
644 if (len < 3)
645 break;
646 TCHECK(p[2]);
647 switch (p[2]) { /* Operation */
648 case CALLBACK_AUTH:
649 printf(" UserAuth");
650 break;
651 case CALLBACK_DSTR:
652 printf(" DialString");
653 break;
654 case CALLBACK_LID:
655 printf(" LocalID");
656 break;
657 case CALLBACK_E164:
658 printf(" E.164");
659 break;
660 case CALLBACK_X500:
661 printf(" X.500");
662 break;
663 case CALLBACK_CBCP:
664 printf(" CBCP");
665 break;
666 default:
667 printf(" unknown-operation=%u", p[2]);
668 break;
669 }
670 break;
671 case LCPOPT_MLMRRU:
672 if (len == 4) {
673 TCHECK2(*(p + 2), 2);
674 printf(" %u", EXTRACT_16BITS(p + 2));
675 }
676 break;
677 case LCPOPT_MLED:
678 if (len < 3)
679 break;
680 TCHECK(p[2]);
681 switch (p[2]) { /* class */
682 case MEDCLASS_NULL:
683 printf(" Null");
684 break;
685 case MEDCLASS_LOCAL:
686 printf(" Local"); /* XXX */
687 break;
688 case MEDCLASS_IPV4:
689 if (len != 7)
690 break;
691 TCHECK2(*(p + 3), 4);
692 printf(" IPv4 %s", ipaddr_string(p + 3));
693 break;
694 case MEDCLASS_MAC:
695 if (len != 9)
696 break;
697 TCHECK(p[8]);
698 printf(" MAC %02x:%02x:%02x:%02x:%02x:%02x",
699 p[3], p[4], p[5], p[6], p[7], p[8]);
700 break;
701 case MEDCLASS_MNB:
702 printf(" Magic-Num-Block"); /* XXX */
703 break;
704 case MEDCLASS_PSNDN:
705 printf(" PSNDN"); /* XXX */
706 break;
707 }
708 break;
709
710 /* XXX: to be supported */
711 #if 0
712 case LCPOPT_DEP6:
713 case LCPOPT_FCSALT:
714 case LCPOPT_SDP:
715 case LCPOPT_NUMMODE:
716 case LCPOPT_DEP12:
717 case LCPOPT_DEP14:
718 case LCPOPT_DEP15:
719 case LCPOPT_DEP16:
720 case LCPOPT_MLSSNHF:
721 case LCPOPT_PROP:
722 case LCPOPT_DCEID:
723 case LCPOPT_MPP:
724 case LCPOPT_LCPAOPT:
725 case LCPOPT_COBS:
726 case LCPOPT_PE:
727 case LCPOPT_MLHF:
728 case LCPOPT_I18N:
729 case LCPOPT_SDLOS:
730 case LCPOPT_PPPMUX:
731 break;
732 #endif
733 }
734 return len;
735
736 trunc:
737 printf("[|lcp]");
738 return 0;
739 }
740
741 /* ML-PPP*/
742 struct tok ppp_ml_flag_values[] = {
743 { 0x80, "begin" },
744 { 0x40, "end" },
745 { 0, NULL }
746 };
747
748 static void
749 handle_mlppp(const u_char *p, int length) {
750
751 if (!eflag)
752 printf("MLPPP, ");
753
754 printf("seq 0x%03x, Flags [%s], length %u",
755 (EXTRACT_16BITS(p))&0x0fff, /* only support 12-Bit sequence space for now */
756 bittok2str(ppp_ml_flag_values, "none", *p & 0xc0),
757 length);
758
759 return;
760 }
761
762 /* CHAP */
763 static void
764 handle_chap(const u_char *p, int length)
765 {
766 u_int code, len;
767 int val_size, name_size, msg_size;
768 const u_char *p0;
769 int i;
770
771 p0 = p;
772 if (length < 1) {
773 printf("[|chap]");
774 return;
775 } else if (length < 4) {
776 TCHECK(*p);
777 printf("[|chap 0x%02x]", *p);
778 return;
779 }
780
781 TCHECK(*p);
782 code = *p;
783 printf("CHAP, %s (0x%02x)",
784 tok2str(chapcode_values,"unknown",code),
785 code);
786 p++;
787
788 TCHECK(*p);
789 printf(", id %u", *p); /* ID */
790 p++;
791
792 TCHECK2(*p, 2);
793 len = EXTRACT_16BITS(p);
794 p += 2;
795
796 /*
797 * Note that this is a generic CHAP decoding routine. Since we
798 * don't know which flavor of CHAP (i.e. CHAP-MD5, MS-CHAPv1,
799 * MS-CHAPv2) is used at this point, we can't decode packet
800 * specifically to each algorithms. Instead, we simply decode
801 * the GCD (Gratest Common Denominator) for all algorithms.
802 */
803 switch (code) {
804 case CHAP_CHAL:
805 case CHAP_RESP:
806 if (length - (p - p0) < 1)
807 return;
808 TCHECK(*p);
809 val_size = *p; /* value size */
810 p++;
811 if (length - (p - p0) < val_size)
812 return;
813 printf(", Value ");
814 for (i = 0; i < val_size; i++) {
815 TCHECK(*p);
816 printf("%02x", *p++);
817 }
818 name_size = len - (p - p0);
819 printf(", Name ");
820 for (i = 0; i < name_size; i++) {
821 TCHECK(*p);
822 safeputchar(*p++);
823 }
824 break;
825 case CHAP_SUCC:
826 case CHAP_FAIL:
827 msg_size = len - (p - p0);
828 printf(", Msg ");
829 for (i = 0; i< msg_size; i++) {
830 TCHECK(*p);
831 safeputchar(*p++);
832 }
833 break;
834 }
835 return;
836
837 trunc:
838 printf("[|chap]");
839 }
840
841 /* PAP (see RFC 1334) */
842 static void
843 handle_pap(const u_char *p, int length)
844 {
845 u_int code, len;
846 int peerid_len, passwd_len, msg_len;
847 const u_char *p0;
848 int i;
849
850 p0 = p;
851 if (length < 1) {
852 printf("[|pap]");
853 return;
854 } else if (length < 4) {
855 TCHECK(*p);
856 printf("[|pap 0x%02x]", *p);
857 return;
858 }
859
860 TCHECK(*p);
861 code = *p;
862 printf("PAP, %s (0x%02x)",
863 tok2str(papcode_values,"unknown",code),
864 code);
865 p++;
866
867 TCHECK(*p);
868 printf(", id %u", *p); /* ID */
869 p++;
870
871 TCHECK2(*p, 2);
872 len = EXTRACT_16BITS(p);
873 p += 2;
874
875 switch (code) {
876 case PAP_AREQ:
877 if (length - (p - p0) < 1)
878 return;
879 TCHECK(*p);
880 peerid_len = *p; /* Peer-ID Length */
881 p++;
882 if (length - (p - p0) < peerid_len)
883 return;
884 printf(", Peer ");
885 for (i = 0; i < peerid_len; i++) {
886 TCHECK(*p);
887 safeputchar(*p++);
888 }
889
890 if (length - (p - p0) < 1)
891 return;
892 TCHECK(*p);
893 passwd_len = *p; /* Password Length */
894 p++;
895 if (length - (p - p0) < passwd_len)
896 return;
897 printf(", Name ");
898 for (i = 0; i < passwd_len; i++) {
899 TCHECK(*p);
900 safeputchar(*p++);
901 }
902 break;
903 case PAP_AACK:
904 case PAP_ANAK:
905 if (length - (p - p0) < 1)
906 return;
907 TCHECK(*p);
908 msg_len = *p; /* Msg-Length */
909 p++;
910 if (length - (p - p0) < msg_len)
911 return;
912 printf(", Msg ");
913 for (i = 0; i< msg_len; i++) {
914 TCHECK(*p);
915 safeputchar(*p++);
916 }
917 break;
918 }
919 return;
920
921 trunc:
922 printf("[|pap]");
923 }
924
925 /* BAP */
926 static void
927 handle_bap(const u_char *p _U_, int length _U_)
928 {
929 /* XXX: to be supported!! */
930 }
931
932
933 /* IPCP config options */
934 static int
935 print_ipcp_config_options(const u_char *p, int length)
936 {
937 int len, opt;
938
939 if (length < 2)
940 return 0;
941 TCHECK2(*p, 2);
942 len = p[1];
943 opt = p[0];
944 if (length < len)
945 return 0;
946
947 printf(", %s (0x%02x) ",
948 tok2str(ipcpopt_values,"unknown",opt),
949 opt);
950
951 switch (opt) {
952 case IPCPOPT_2ADDR: /* deprecated */
953 if (len != 10)
954 goto invlen;
955 TCHECK2(*(p + 6), 4);
956 printf("src %s, dst %s",
957 ipaddr_string(p + 2),
958 ipaddr_string(p + 6));
959 break;
960 case IPCPOPT_IPCOMP:
961 if (len < 4)
962 goto invlen;
963 TCHECK2(*(p + 2), 2);
964 if (EXTRACT_16BITS(p + 2) == PPP_VJC) {
965 printf("VJ-Comp");
966 /* XXX: VJ-Comp parameters should be decoded */
967 } else
968 printf("unknown-comp-proto %04x", EXTRACT_16BITS(p + 2));
969 break;
970
971 case IPCPOPT_ADDR: /* those options share the same format - fall through */
972 case IPCPOPT_MOBILE4:
973 case IPCPOPT_PRIDNS:
974 case IPCPOPT_PRINBNS:
975 case IPCPOPT_SECDNS:
976 case IPCPOPT_SECNBNS:
977 if (len != 6)
978 goto invlen;
979 TCHECK2(*(p + 2), 4);
980 printf("%s", ipaddr_string(p + 2));
981 break;
982 default:
983 printf(", unknown-%d", opt);
984 break;
985 }
986 return len;
987
988 invlen:
989 printf(", invalid-length-%d", opt);
990 return 0;
991
992 trunc:
993 printf("[|ipcp]");
994 return 0;
995 }
996
997 /* IP6CP config options */
998 static int
999 print_ip6cp_config_options(const u_char *p, int length)
1000 {
1001 int len, opt;
1002
1003 if (length < 2)
1004 return 0;
1005 TCHECK2(*p, 2);
1006 len = p[1];
1007 opt = p[0];
1008 if (length < len)
1009 return 0;
1010
1011 printf(", %s (0x%02x) ",
1012 tok2str(ip6cpopt_values,"unknown",opt),
1013 opt);
1014
1015 switch (opt) {
1016 case IP6CP_IFID:
1017 if (len != 10)
1018 goto invlen;
1019 TCHECK2(*(p + 2), 8);
1020 printf("%04x:%04x:%04x:%04x",
1021 EXTRACT_16BITS(p + 2),
1022 EXTRACT_16BITS(p + 4),
1023 EXTRACT_16BITS(p + 6),
1024 EXTRACT_16BITS(p + 8));
1025 break;
1026 default:
1027 printf(", unknown-%d", opt);
1028 break;
1029 }
1030 return len;
1031
1032 invlen:
1033 printf(", invalid-length-%d", opt);
1034 return 0;
1035
1036 trunc:
1037 printf("[|ip6cp]");
1038 return 0;
1039 }
1040
1041
1042 /* CCP config options */
1043 static int
1044 print_ccp_config_options(const u_char *p, int length)
1045 {
1046 int len, opt;
1047
1048 if (length < 2)
1049 return 0;
1050 TCHECK2(*p, 2);
1051 len = p[1];
1052 opt = p[0];
1053 if (length < len)
1054 return 0;
1055 if ((opt >= CCPOPT_MIN) && (opt <= CCPOPT_MAX))
1056 printf(", %s", ccpconfopts[opt]);
1057 #if 0 /* XXX */
1058 switch (opt) {
1059 case CCPOPT_OUI:
1060 case CCPOPT_PRED1:
1061 case CCPOPT_PRED2:
1062 case CCPOPT_PJUMP:
1063 case CCPOPT_HPPPC:
1064 case CCPOPT_STACLZS:
1065 case CCPOPT_MPPC:
1066 case CCPOPT_GFZA:
1067 case CCPOPT_V42BIS:
1068 case CCPOPT_BSDCOMP:
1069 case CCPOPT_LZSDCP:
1070 case CCPOPT_MVRCA:
1071 case CCPOPT_DEC:
1072 case CCPOPT_DEFLATE:
1073 case CCPOPT_RESV:
1074 break;
1075
1076 default:
1077 printf(", unknown-%d", opt);
1078 break;
1079 }
1080 #endif
1081 return len;
1082
1083 trunc:
1084 printf("[|ccp]");
1085 return 0;
1086 }
1087
1088 /* BACP config options */
1089 static int
1090 print_bacp_config_options(const u_char *p, int length)
1091 {
1092 int len, opt;
1093
1094 if (length < 2)
1095 return 0;
1096 TCHECK2(*p, 2);
1097 len = p[1];
1098 opt = p[0];
1099 if (length < len)
1100 return 0;
1101 if (opt == BACPOPT_FPEER) {
1102 TCHECK2(*(p + 2), 4);
1103 printf(", Favored-Peer");
1104 printf(", Magic-Num 0x%08x", EXTRACT_32BITS(p + 2));
1105 } else {
1106 printf(", unknown-option-%d", opt);
1107 }
1108 return len;
1109
1110 trunc:
1111 printf("[|bacp]");
1112 return 0;
1113 }
1114
1115
1116 static void
1117 ppp_hdlc(const u_char *p, int length)
1118 {
1119 u_char *b, *s, *t, c;
1120 int i, proto;
1121 const void *se;
1122
1123 b = (u_int8_t *)malloc(length);
1124 if (b == NULL)
1125 return;
1126
1127 /*
1128 * Unescape all the data into a temporary, private, buffer.
1129 * Do this so that we dont overwrite the original packet
1130 * contents.
1131 */
1132 for (s = (u_char *)p, t = b, i = length; i > 0; i--) {
1133 c = *s++;
1134 if (c == 0x7d) {
1135 if (i > 1) {
1136 i--;
1137 c = *s++ ^ 0x20;
1138 } else
1139 continue;
1140 }
1141 *t++ = c;
1142 }
1143
1144 se = snapend;
1145 snapend = t;
1146
1147 /* now lets guess about the payload codepoint format */
1148 proto = *b; /* start with a one-octet codepoint guess */
1149
1150 switch (proto) {
1151 case PPP_IP:
1152 ip_print(gndo, b+1, t - b - 1);
1153 goto cleanup;
1154 #ifdef INET6
1155 case PPP_IPV6:
1156 ip6_print(b+1, t - b - 1);
1157 goto cleanup;
1158 #endif
1159 default: /* no luck - try next guess */
1160 break;
1161 }
1162
1163 proto = EXTRACT_16BITS(b); /* next guess - load two octets */
1164
1165 switch (proto) {
1166 case (PPP_ADDRESS << 8 | PPP_CONTROL): /* looks like a PPP frame */
1167 proto = EXTRACT_16BITS(b+2); /* load the PPP proto-id */
1168 handle_ppp(proto, b+4, t - b - 4);
1169 break;
1170 default: /* last guess - proto must be a PPP proto-id */
1171 handle_ppp(proto, b+2, t - b - 2);
1172 break;
1173 }
1174
1175 cleanup:
1176 snapend = se;
1177 free(b);
1178 return;
1179 }
1180
1181
1182 /* PPP */
1183 static void
1184 handle_ppp(u_int proto, const u_char *p, int length)
1185 {
1186 if ((proto & 0xff00) == 0x7e00) {/* is this an escape code ? */
1187 ppp_hdlc(p-1, length);
1188 return;
1189 }
1190
1191 switch (proto) {
1192 case PPP_LCP: /* fall through */
1193 case PPP_IPCP:
1194 case PPP_OSICP:
1195 case PPP_MPLSCP:
1196 case PPP_IPV6CP:
1197 case PPP_CCP:
1198 case PPP_BACP:
1199 handle_ctrl_proto(proto, p, length);
1200 break;
1201 case PPP_ML:
1202 handle_mlppp(p, length);
1203 break;
1204 case PPP_CHAP:
1205 handle_chap(p, length);
1206 break;
1207 case PPP_PAP:
1208 handle_pap(p, length);
1209 break;
1210 case PPP_BAP: /* XXX: not yet completed */
1211 handle_bap(p, length);
1212 break;
1213 case ETHERTYPE_IP: /*XXX*/
1214 case PPP_VJNC:
1215 case PPP_IP:
1216 ip_print(gndo, p, length);
1217 break;
1218 #ifdef INET6
1219 case ETHERTYPE_IPV6: /*XXX*/
1220 case PPP_IPV6:
1221 ip6_print(p, length);
1222 break;
1223 #endif
1224 case ETHERTYPE_IPX: /*XXX*/
1225 case PPP_IPX:
1226 ipx_print(p, length);
1227 break;
1228 case PPP_OSI:
1229 isoclns_print(p, length, length);
1230 break;
1231 case PPP_MPLS_UCAST:
1232 case PPP_MPLS_MCAST:
1233 mpls_print(p, length);
1234 break;
1235 case PPP_COMP:
1236 printf("compressed PPP data");
1237 break;
1238 default:
1239 printf("%s ", tok2str(ppptype2str, "unknown PPP protocol (0x%04x)", proto));
1240 print_unknown_data(p,"\n\t",length);
1241 break;
1242 }
1243 }
1244
1245 /* Standard PPP printer */
1246 u_int
1247 ppp_print(register const u_char *p, u_int length)
1248 {
1249 u_int proto,ppp_header;
1250 u_int olen = length; /* _o_riginal length */
1251 u_int hdr_len = 0;
1252
1253 /*
1254 * Here, we assume that p points to the Address and Control
1255 * field (if they present).
1256 */
1257 if (length < 2)
1258 goto trunc;
1259 TCHECK2(*p, 2);
1260 ppp_header = EXTRACT_16BITS(p);
1261
1262 switch(ppp_header) {
1263 case (PPP_WITHDIRECTION_IN << 8 | PPP_CONTROL):
1264 if (eflag) printf("In ");
1265 p += 2;
1266 length -= 2;
1267 hdr_len += 2;
1268 break;
1269 case (PPP_WITHDIRECTION_OUT << 8 | PPP_CONTROL):
1270 if (eflag) printf("Out ");
1271 p += 2;
1272 length -= 2;
1273 hdr_len += 2;
1274 break;
1275 case (PPP_ADDRESS << 8 | PPP_CONTROL):
1276 p += 2; /* ACFC not used */
1277 length -= 2;
1278 hdr_len += 2;
1279 break;
1280
1281 default:
1282 break;
1283 }
1284
1285 if (length < 2)
1286 goto trunc;
1287 TCHECK(*p);
1288 if (*p % 2) {
1289 proto = *p; /* PFC is used */
1290 p++;
1291 length--;
1292 hdr_len++;
1293 } else {
1294 TCHECK2(*p, 2);
1295 proto = EXTRACT_16BITS(p);
1296 p += 2;
1297 length -= 2;
1298 hdr_len += 2;
1299 }
1300
1301 if (eflag)
1302 printf("%s (0x%04x), length %u: ",
1303 tok2str(ppptype2str, "unknown", proto),
1304 proto,
1305 olen);
1306
1307 handle_ppp(proto, p, length);
1308 return (hdr_len);
1309 trunc:
1310 printf("[|ppp]");
1311 return (0);
1312 }
1313
1314
1315 /* PPP I/F printer */
1316 u_int
1317 ppp_if_print(const struct pcap_pkthdr *h, register const u_char *p)
1318 {
1319 register u_int length = h->len;
1320 register u_int caplen = h->caplen;
1321
1322 if (caplen < PPP_HDRLEN) {
1323 printf("[|ppp]");
1324 return (caplen);
1325 }
1326
1327 #if 0
1328 /*
1329 * XXX: seems to assume that there are 2 octets prepended to an
1330 * actual PPP frame. The 1st octet looks like Input/Output flag
1331 * while 2nd octet is unknown, at least to me
1332 * (mshindo@mshindo.net).
1333 *
1334 * That was what the original tcpdump code did.
1335 *
1336 * FreeBSD's "if_ppp.c" *does* set the first octet to 1 for outbound
1337 * packets and 0 for inbound packets - but only if the
1338 * protocol field has the 0x8000 bit set (i.e., it's a network
1339 * control protocol); it does so before running the packet through
1340 * "bpf_filter" to see if it should be discarded, and to see
1341 * if we should update the time we sent the most recent packet...
1342 *
1343 * ...but it puts the original address field back after doing
1344 * so.
1345 *
1346 * NetBSD's "if_ppp.c" doesn't set the first octet in that fashion.
1347 *
1348 * I don't know if any PPP implementation handed up to a BPF
1349 * device packets with the first octet being 1 for outbound and
1350 * 0 for inbound packets, so I (guy@alum.mit.edu) don't know
1351 * whether that ever needs to be checked or not.
1352 *
1353 * Note that NetBSD has a DLT_PPP_SERIAL, which it uses for PPP,
1354 * and its tcpdump appears to assume that the frame always
1355 * begins with an address field and a control field, and that
1356 * the address field might be 0x0f or 0x8f, for Cisco
1357 * point-to-point with HDLC framing as per section 4.3.1 of RFC
1358 * 1547, as well as 0xff, for PPP in HDLC-like framing as per
1359 * RFC 1662.
1360 *
1361 * (Is the Cisco framing in question what DLT_C_HDLC, in
1362 * BSD/OS, is?)
1363 */
1364 if (eflag)
1365 printf("%c %4d %02x ", p[0] ? 'O' : 'I', length, p[1]);
1366 #endif
1367
1368 ppp_print(p, length);
1369
1370 return (0);
1371 }
1372
1373 /*
1374 * PPP I/F printer to use if we know that RFC 1662-style PPP in HDLC-like
1375 * framing, or Cisco PPP with HDLC framing as per section 4.3.1 of RFC 1547,
1376 * is being used (i.e., we don't check for PPP_ADDRESS and PPP_CONTROL,
1377 * discard them *if* those are the first two octets, and parse the remaining
1378 * packet as a PPP packet, as "ppp_print()" does).
1379 *
1380 * This handles, for example, DLT_PPP_SERIAL in NetBSD.
1381 */
1382 u_int
1383 ppp_hdlc_if_print(const struct pcap_pkthdr *h, register const u_char *p)
1384 {
1385 register u_int length = h->len;
1386 register u_int caplen = h->caplen;
1387 u_int proto;
1388 u_int hdrlen = 0;
1389
1390 if (caplen < 2) {
1391 printf("[|ppp]");
1392 return (caplen);
1393 }
1394
1395 switch (p[0]) {
1396
1397 case PPP_ADDRESS:
1398 if (caplen < 4) {
1399 printf("[|ppp]");
1400 return (caplen);
1401 }
1402
1403 if (eflag)
1404 printf("%02x %02x %d ", p[0], p[1], length);
1405 p += 2;
1406 length -= 2;
1407 hdrlen += 2;
1408
1409 proto = EXTRACT_16BITS(p);
1410 p += 2;
1411 length -= 2;
1412 hdrlen += 2;
1413 printf("%s: ", tok2str(ppptype2str, "unknown PPP protocol (0x%04x)", proto));
1414
1415 handle_ppp(proto, p, length);
1416 break;
1417
1418 case CHDLC_UNICAST:
1419 case CHDLC_BCAST:
1420 return (chdlc_if_print(h, p));
1421
1422 default:
1423 if (eflag)
1424 printf("%02x %02x %d ", p[0], p[1], length);
1425 p += 2;
1426 length -= 2;
1427 hdrlen += 2;
1428
1429 /*
1430 * XXX - NetBSD's "ppp_netbsd_serial_if_print()" treats
1431 * the next two octets as an Ethernet type; does that
1432 * ever happen?
1433 */
1434 printf("unknown addr %02x; ctrl %02x", p[0], p[1]);
1435 break;
1436 }
1437
1438 return (hdrlen);
1439 }
1440
1441 #define PPP_BSDI_HDRLEN 24
1442
1443 /* BSD/OS specific PPP printer */
1444 u_int
1445 ppp_bsdos_if_print(const struct pcap_pkthdr *h _U_, register const u_char *p _U_)
1446 {
1447 register int hdrlength;
1448 #ifdef __bsdi__
1449 register u_int length = h->len;
1450 register u_int caplen = h->caplen;
1451 u_int16_t ptype;
1452 const u_char *q;
1453 int i;
1454
1455 if (caplen < PPP_BSDI_HDRLEN) {
1456 printf("[|ppp]");
1457 return (caplen)
1458 }
1459
1460 hdrlength = 0;
1461
1462 #if 0
1463 if (p[0] == PPP_ADDRESS && p[1] == PPP_CONTROL) {
1464 if (eflag)
1465 printf("%02x %02x ", p[0], p[1]);
1466 p += 2;
1467 hdrlength = 2;
1468 }
1469
1470 if (eflag)
1471 printf("%d ", length);
1472 /* Retrieve the protocol type */
1473 if (*p & 01) {
1474 /* Compressed protocol field */
1475 ptype = *p;
1476 if (eflag)
1477 printf("%02x ", ptype);
1478 p++;
1479 hdrlength += 1;
1480 } else {
1481 /* Un-compressed protocol field */
1482 ptype = ntohs(*(u_int16_t *)p);
1483 if (eflag)
1484 printf("%04x ", ptype);
1485 p += 2;
1486 hdrlength += 2;
1487 }
1488 #else
1489 ptype = 0; /*XXX*/
1490 if (eflag)
1491 printf("%c ", p[SLC_DIR] ? 'O' : 'I');
1492 if (p[SLC_LLHL]) {
1493 /* link level header */
1494 struct ppp_header *ph;
1495
1496 q = p + SLC_BPFHDRLEN;
1497 ph = (struct ppp_header *)q;
1498 if (ph->phdr_addr == PPP_ADDRESS
1499 && ph->phdr_ctl == PPP_CONTROL) {
1500 if (eflag)
1501 printf("%02x %02x ", q[0], q[1]);
1502 ptype = ntohs(ph->phdr_type);
1503 if (eflag && (ptype == PPP_VJC || ptype == PPP_VJNC)) {
1504 printf("%s ", tok2str(ppptype2str,
1505 "proto-#%d", ptype));
1506 }
1507 } else {
1508 if (eflag) {
1509 printf("LLH=[");
1510 for (i = 0; i < p[SLC_LLHL]; i++)
1511 printf("%02x", q[i]);
1512 printf("] ");
1513 }
1514 }
1515 }
1516 if (eflag)
1517 printf("%d ", length);
1518 if (p[SLC_CHL]) {
1519 q = p + SLC_BPFHDRLEN + p[SLC_LLHL];
1520
1521 switch (ptype) {
1522 case PPP_VJC:
1523 ptype = vjc_print(q, ptype);
1524 hdrlength = PPP_BSDI_HDRLEN;
1525 p += hdrlength;
1526 switch (ptype) {
1527 case PPP_IP:
1528 ip_print(p, length);
1529 break;
1530 #ifdef INET6
1531 case PPP_IPV6:
1532 ip6_print(p, length);
1533 break;
1534 #endif
1535 case PPP_MPLS_UCAST:
1536 case PPP_MPLS_MCAST:
1537 mpls_print(p, length);
1538 break;
1539 }
1540 goto printx;
1541 case PPP_VJNC:
1542 ptype = vjc_print(q, ptype);
1543 hdrlength = PPP_BSDI_HDRLEN;
1544 p += hdrlength;
1545 switch (ptype) {
1546 case PPP_IP:
1547 ip_print(p, length);
1548 break;
1549 #ifdef INET6
1550 case PPP_IPV6:
1551 ip6_print(p, length);
1552 break;
1553 #endif
1554 case PPP_MPLS_UCAST:
1555 case PPP_MPLS_MCAST:
1556 mpls_print(p, length);
1557 break;
1558 }
1559 goto printx;
1560 default:
1561 if (eflag) {
1562 printf("CH=[");
1563 for (i = 0; i < p[SLC_LLHL]; i++)
1564 printf("%02x", q[i]);
1565 printf("] ");
1566 }
1567 break;
1568 }
1569 }
1570
1571 hdrlength = PPP_BSDI_HDRLEN;
1572 #endif
1573
1574 length -= hdrlength;
1575 p += hdrlength;
1576
1577 switch (ptype) {
1578 case PPP_IP:
1579 ip_print(p, length);
1580 break;
1581 #ifdef INET6
1582 case PPP_IPV6:
1583 ip6_print(p, length);
1584 break;
1585 #endif
1586 case PPP_MPLS_UCAST:
1587 case PPP_MPLS_MCAST:
1588 mpls_print(p, length);
1589 break;
1590 default:
1591 printf("%s ", tok2str(ppptype2str, "unknown PPP protocol (0x%04x)", ptype));
1592 }
1593
1594 printx:
1595 #else /* __bsdi */
1596 hdrlength = 0;
1597 #endif /* __bsdi__ */
1598 return (hdrlength);
1599 }
1600
1601
1602 /*
1603 * Local Variables:
1604 * c-style: whitesmith
1605 * c-basic-offset: 8
1606 * End:
1607 */