]> The Tcpdump Group git mirrors - tcpdump/blob - print-arcnet.c
42a97ba3b8daae0dc4dbf9fa1ce8ffb913f2d1e8
[tcpdump] / print-arcnet.c
1 /*
2 * Copyright (c) 1988, 1989, 1990, 1991, 1992, 1993, 1994, 1995, 1996, 1997
3 * The Regents of the University of California. All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that: (1) source code distributions
7 * retain the above copyright notice and this paragraph in its entirety, (2)
8 * distributions including binary code include the above copyright notice and
9 * this paragraph in its entirety in the documentation or other materials
10 * provided with the distribution, and (3) all advertising materials mentioning
11 * features or use of this software display the following acknowledgement:
12 * ``This product includes software developed by the University of California,
13 * Lawrence Berkeley Laboratory and its contributors.'' Neither the name of
14 * the University nor the names of its contributors may be used to endorse
15 * or promote products derived from this software without specific prior
16 * written permission.
17 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED
18 * WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF
19 * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
20 *
21 * From: NetBSD: print-arcnet.c,v 1.2 2000/04/24 13:02:28 itojun Exp
22 */
23
24 /* \summary: Attached Resource Computer NETwork (ARCNET) printer */
25
26 #ifdef HAVE_CONFIG_H
27 #include "config.h"
28 #endif
29
30 #include <netdissect-stdinc.h>
31
32 #include "netdissect.h"
33 #include "extract.h"
34
35 /*
36 * from: NetBSD: if_arc.h,v 1.13 1999/11/19 20:41:19 thorpej Exp
37 */
38
39 /*
40 * Structure of a 2.5MB/s Arcnet header on the BSDs,
41 * as given to interface code.
42 */
43 struct arc_header {
44 nd_uint8_t arc_shost;
45 nd_uint8_t arc_dhost;
46 nd_uint8_t arc_type;
47 /*
48 * only present for newstyle encoding with LL fragmentation.
49 * Don't use sizeof(anything), use ARC_HDR{,NEW}LEN instead.
50 */
51 nd_uint8_t arc_flag;
52 nd_uint16_t arc_seqid;
53
54 /*
55 * only present in exception packets (arc_flag == 0xff)
56 */
57 nd_uint8_t arc_type2; /* same as arc_type */
58 nd_uint8_t arc_flag2; /* real flag value */
59 nd_uint16_t arc_seqid2; /* real seqid value */
60 };
61
62 #define ARC_HDRLEN 3
63 #define ARC_HDRNEWLEN 6
64 #define ARC_HDRNEWLEN_EXC 10
65
66 /* RFC 1051 */
67 #define ARCTYPE_IP_OLD 240 /* IP protocol */
68 #define ARCTYPE_ARP_OLD 241 /* address resolution protocol */
69
70 /* RFC 1201 */
71 #define ARCTYPE_IP 212 /* IP protocol */
72 #define ARCTYPE_ARP 213 /* address resolution protocol */
73 #define ARCTYPE_REVARP 214 /* reverse addr resolution protocol */
74
75 #define ARCTYPE_ATALK 221 /* Appletalk */
76 #define ARCTYPE_BANIAN 247 /* Banyan Vines */
77 #define ARCTYPE_IPX 250 /* Novell IPX */
78
79 #define ARCTYPE_INET6 0xc4 /* IPng */
80 #define ARCTYPE_DIAGNOSE 0x80 /* as per ANSI/ATA 878.1 */
81
82 /*
83 * Structure of a 2.5MB/s Arcnet header on Linux. Linux has
84 * an extra "offset" field when given to interface code, and
85 * never presents packets that look like exception frames.
86 */
87 struct arc_linux_header {
88 nd_uint8_t arc_shost;
89 nd_uint8_t arc_dhost;
90 nd_uint16_t arc_offset;
91 nd_uint8_t arc_type;
92 /*
93 * only present for newstyle encoding with LL fragmentation.
94 * Don't use sizeof(anything), use ARC_LINUX_HDR{,NEW}LEN
95 * instead.
96 */
97 nd_uint8_t arc_flag;
98 nd_uint16_t arc_seqid;
99 };
100
101 #define ARC_LINUX_HDRLEN 5
102 #define ARC_LINUX_HDRNEWLEN 8
103
104 static int arcnet_encap_print(netdissect_options *, u_char arctype, const u_char *p,
105 u_int length, u_int caplen);
106
107 static const struct tok arctypemap[] = {
108 { ARCTYPE_IP_OLD, "oldip" },
109 { ARCTYPE_ARP_OLD, "oldarp" },
110 { ARCTYPE_IP, "ip" },
111 { ARCTYPE_ARP, "arp" },
112 { ARCTYPE_REVARP, "rarp" },
113 { ARCTYPE_ATALK, "atalk" },
114 { ARCTYPE_BANIAN, "banyan" },
115 { ARCTYPE_IPX, "ipx" },
116 { ARCTYPE_INET6, "ipv6" },
117 { ARCTYPE_DIAGNOSE, "diag" },
118 { 0, 0 }
119 };
120
121 static inline void
122 arcnet_print(netdissect_options *ndo, const u_char *bp, u_int length, int phds,
123 u_int flag, u_int seqid)
124 {
125 const struct arc_header *ap;
126 const char *arctypename;
127
128
129 ap = (const struct arc_header *)bp;
130
131
132 if (ndo->ndo_qflag) {
133 ND_PRINT("%02x %02x %u: ",
134 EXTRACT_U_1(ap->arc_shost),
135 EXTRACT_U_1(ap->arc_dhost),
136 length);
137 return;
138 }
139
140 arctypename = tok2str(arctypemap, "%02x", EXTRACT_U_1(ap->arc_type));
141
142 if (!phds) {
143 ND_PRINT("%02x %02x %s %u: ",
144 EXTRACT_U_1(ap->arc_shost),
145 EXTRACT_U_1(ap->arc_dhost),
146 arctypename,
147 length);
148 return;
149 }
150
151 if (flag == 0) {
152 ND_PRINT("%02x %02x %s seqid %04x %u: ",
153 EXTRACT_U_1(ap->arc_shost),
154 EXTRACT_U_1(ap->arc_dhost),
155 arctypename, seqid,
156 length);
157 return;
158 }
159
160 if (flag & 1)
161 ND_PRINT("%02x %02x %s seqid %04x "
162 "(first of %u fragments) %u: ",
163 EXTRACT_U_1(ap->arc_shost),
164 EXTRACT_U_1(ap->arc_dhost),
165 arctypename, seqid,
166 (flag + 3) / 2, length);
167 else
168 ND_PRINT("%02x %02x %s seqid %04x "
169 "(fragment %u) %u: ",
170 EXTRACT_U_1(ap->arc_shost),
171 EXTRACT_U_1(ap->arc_dhost),
172 arctypename, seqid,
173 flag/2 + 1, length);
174 }
175
176 /*
177 * This is the top level routine of the printer. 'p' points
178 * to the ARCNET header of the packet, 'h->ts' is the timestamp,
179 * 'h->len' is the length of the packet off the wire, and 'h->caplen'
180 * is the number of bytes actually captured.
181 */
182 u_int
183 arcnet_if_print(netdissect_options *ndo, const struct pcap_pkthdr *h, const u_char *p)
184 {
185 u_int caplen = h->caplen;
186 u_int length = h->len;
187 const struct arc_header *ap;
188
189 int phds;
190 u_int flag = 0, archdrlen = 0;
191 u_int seqid = 0;
192 u_char arc_type;
193
194 if (caplen < ARC_HDRLEN || length < ARC_HDRLEN) {
195 ND_PRINT("[|arcnet]");
196 return (caplen);
197 }
198
199 ap = (const struct arc_header *)p;
200 arc_type = EXTRACT_U_1(ap->arc_type);
201
202 switch (arc_type) {
203 default:
204 phds = 1;
205 break;
206 case ARCTYPE_IP_OLD:
207 case ARCTYPE_ARP_OLD:
208 case ARCTYPE_DIAGNOSE:
209 phds = 0;
210 archdrlen = ARC_HDRLEN;
211 break;
212 }
213
214 if (phds) {
215 if (caplen < ARC_HDRNEWLEN || length < ARC_HDRNEWLEN) {
216 arcnet_print(ndo, p, length, 0, 0, 0);
217 ND_PRINT("[|phds]");
218 return (caplen);
219 }
220
221 flag = EXTRACT_U_1(ap->arc_flag);
222 if (flag == 0xff) {
223 if (caplen < ARC_HDRNEWLEN_EXC || length < ARC_HDRNEWLEN_EXC) {
224 arcnet_print(ndo, p, length, 0, 0, 0);
225 ND_PRINT("[|phds extended]");
226 return (caplen);
227 }
228 flag = EXTRACT_U_1(ap->arc_flag2);
229 seqid = EXTRACT_BE_U_2(ap->arc_seqid2);
230 archdrlen = ARC_HDRNEWLEN_EXC;
231 } else {
232 seqid = EXTRACT_BE_U_2(ap->arc_seqid);
233 archdrlen = ARC_HDRNEWLEN;
234 }
235 }
236
237
238 if (ndo->ndo_eflag)
239 arcnet_print(ndo, p, length, phds, flag, seqid);
240
241 /*
242 * Go past the ARCNET header.
243 */
244 length -= archdrlen;
245 caplen -= archdrlen;
246 p += archdrlen;
247
248 if (phds && flag && (flag & 1) == 0) {
249 /*
250 * This is a middle fragment.
251 */
252 return (archdrlen);
253 }
254
255 if (!arcnet_encap_print(ndo, arc_type, p, length, caplen))
256 ND_DEFAULTPRINT(p, caplen);
257
258 return (archdrlen);
259 }
260
261 /*
262 * This is the top level routine of the printer. 'p' points
263 * to the ARCNET header of the packet, 'h->ts' is the timestamp,
264 * 'h->len' is the length of the packet off the wire, and 'h->caplen'
265 * is the number of bytes actually captured. It is quite similar
266 * to the non-Linux style printer except that Linux doesn't ever
267 * supply packets that look like exception frames, it always supplies
268 * reassembled packets rather than raw frames, and headers have an
269 * extra "offset" field between the src/dest and packet type.
270 */
271 u_int
272 arcnet_linux_if_print(netdissect_options *ndo, const struct pcap_pkthdr *h, const u_char *p)
273 {
274 u_int caplen = h->caplen;
275 u_int length = h->len;
276 const struct arc_linux_header *ap;
277
278 int archdrlen = 0;
279 u_char arc_type;
280
281 if (caplen < ARC_LINUX_HDRLEN || length < ARC_LINUX_HDRLEN) {
282 ND_PRINT("[|arcnet]");
283 return (caplen);
284 }
285
286 ap = (const struct arc_linux_header *)p;
287 arc_type = EXTRACT_U_1(ap->arc_type);
288
289 switch (arc_type) {
290 default:
291 archdrlen = ARC_LINUX_HDRNEWLEN;
292 if (caplen < ARC_LINUX_HDRNEWLEN || length < ARC_LINUX_HDRNEWLEN) {
293 ND_PRINT("[|arcnet]");
294 return (caplen);
295 }
296 break;
297 case ARCTYPE_IP_OLD:
298 case ARCTYPE_ARP_OLD:
299 case ARCTYPE_DIAGNOSE:
300 archdrlen = ARC_LINUX_HDRLEN;
301 break;
302 }
303
304 if (ndo->ndo_eflag)
305 arcnet_print(ndo, p, length, 0, 0, 0);
306
307 /*
308 * Go past the ARCNET header.
309 */
310 length -= archdrlen;
311 caplen -= archdrlen;
312 p += archdrlen;
313
314 if (!arcnet_encap_print(ndo, arc_type, p, length, caplen))
315 ND_DEFAULTPRINT(p, caplen);
316
317 return (archdrlen);
318 }
319
320 /*
321 * Prints the packet encapsulated in an ARCnet data field,
322 * given the ARCnet system code.
323 *
324 * Returns non-zero if it can do so, zero if the system code is unknown.
325 */
326
327
328 static int
329 arcnet_encap_print(netdissect_options *ndo, u_char arctype, const u_char *p,
330 u_int length, u_int caplen)
331 {
332 switch (arctype) {
333
334 case ARCTYPE_IP_OLD:
335 case ARCTYPE_IP:
336 ip_print(ndo, p, length);
337 return (1);
338
339 case ARCTYPE_INET6:
340 ip6_print(ndo, p, length);
341 return (1);
342
343 case ARCTYPE_ARP_OLD:
344 case ARCTYPE_ARP:
345 case ARCTYPE_REVARP:
346 arp_print(ndo, p, length, caplen);
347 return (1);
348
349 case ARCTYPE_ATALK: /* XXX was this ever used? */
350 if (ndo->ndo_vflag)
351 ND_PRINT("et1 ");
352 atalk_print(ndo, p, length);
353 return (1);
354
355 case ARCTYPE_IPX:
356 ipx_print(ndo, p, length);
357 return (1);
358
359 default:
360 return (0);
361 }
362 }
363
364 /*
365 * Local Variables:
366 * c-style: bsd
367 * End:
368 */
369