2 * Copyright (c) 1990, 1991, 1993, 1994, 1995, 1996
3 * The Regents of the University of California. All rights reserved.
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that: (1) source code distributions
7 * retain the above copyright notice and this paragraph in its entirety, (2)
8 * distributions including binary code include the above copyright notice and
9 * this paragraph in its entirety in the documentation or other materials
10 * provided with the distribution, and (3) all advertising materials mentioning
11 * features or use of this software display the following acknowledgement:
12 * ``This product includes software developed by the University of California,
13 * Lawrence Berkeley Laboratory and its contributors.'' Neither the name of
14 * the University nor the names of its contributors may be used to endorse
15 * or promote products derived from this software without specific prior
17 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED
18 * WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF
19 * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
22 #define NETDISSECT_REWORKED
27 #include <tcpdump-stdinc.h>
32 #include "interface.h"
33 #include "addrtoname.h"
34 #include "ethertype.h"
40 static void frf15_print(netdissect_options
*ndo
, const u_char
*, u_int
);
43 * the frame relay header has a variable length
45 * the EA bit determines if there is another byte
48 * minimum header length is 2 bytes
49 * maximum header length is 4 bytes
52 * +----+----+----+----+----+----+----+----+
53 * | DLCI (6 bits) | CR | EA |
54 * +----+----+----+----+----+----+----+----+
55 * | DLCI (4 bits) |FECN|BECN| DE | EA |
56 * +----+----+----+----+----+----+----+----+
57 * | DLCI (7 bits) | EA |
58 * +----+----+----+----+----+----+----+----+
59 * | DLCI (6 bits) |SDLC| EA |
60 * +----+----+----+----+----+----+----+----+
63 #define FR_EA_BIT 0x01
65 #define FR_CR_BIT 0x02000000
66 #define FR_DE_BIT 0x00020000
67 #define FR_BECN_BIT 0x00040000
68 #define FR_FECN_BIT 0x00080000
69 #define FR_SDLC_BIT 0x00000002
72 static const struct tok fr_header_flag_values
[] = {
75 { FR_BECN_BIT
, "BECN" },
76 { FR_FECN_BIT
, "FECN" },
77 { FR_SDLC_BIT
, "sdlcore" },
82 #define MFR_B_BIT 0x80
83 #define MFR_E_BIT 0x40
84 #define MFR_C_BIT 0x20
85 #define MFR_BEC_MASK (MFR_B_BIT | MFR_E_BIT | MFR_C_BIT)
86 #define MFR_CTRL_FRAME (MFR_B_BIT | MFR_E_BIT | MFR_C_BIT)
87 #define MFR_FRAG_FRAME (MFR_B_BIT | MFR_E_BIT )
89 static const struct tok frf_flag_values
[] = {
90 { MFR_B_BIT
, "Begin" },
92 { MFR_C_BIT
, "Control" },
96 /* Finds out Q.922 address length, DLCI and flags. Returns 1 on success,
97 * 0 on invalid address, -1 on truncated packet
98 * save the flags dep. on address length
100 static int parse_q922_addr(netdissect_options
*ndo
,
101 const u_char
*p
, u_int
*dlci
,
102 u_int
*addr_len
, uint8_t *flags
, u_int length
)
104 if (!ND_TTEST(p
[0]) || length
< 1)
106 if ((p
[0] & FR_EA_BIT
))
109 if (!ND_TTEST(p
[1]) || length
< 2)
112 *dlci
= ((p
[0] & 0xFC) << 2) | ((p
[1] & 0xF0) >> 4);
114 flags
[0] = p
[0] & 0x02; /* populate the first flag fields */
115 flags
[1] = p
[1] & 0x0c;
116 flags
[2] = 0; /* clear the rest of the flags */
119 if (p
[1] & FR_EA_BIT
)
120 return 1; /* 2-byte Q.922 address */
124 if (!ND_TTEST(p
[0]) || length
< 1)
126 (*addr_len
)++; /* 3- or 4-byte Q.922 address */
127 if ((p
[0] & FR_EA_BIT
) == 0) {
128 *dlci
= (*dlci
<< 7) | (p
[0] >> 1);
129 (*addr_len
)++; /* 4-byte Q.922 address */
134 if (!ND_TTEST(p
[0]) || length
< 1)
136 if ((p
[0] & FR_EA_BIT
) == 0)
137 return 0; /* more than 4 bytes of Q.922 address? */
139 flags
[3] = p
[0] & 0x02;
141 *dlci
= (*dlci
<< 6) | (p
[0] >> 2);
147 q922_string(netdissect_options
*ndo
, const u_char
*p
, u_int length
)
150 static u_int dlci
, addr_len
;
151 static uint8_t flags
[4];
152 static char buffer
[sizeof("DLCI xxxxxxxxxx")];
153 memset(buffer
, 0, sizeof(buffer
));
155 if (parse_q922_addr(ndo
, p
, &dlci
, &addr_len
, flags
, length
) == 1){
156 snprintf(buffer
, sizeof(buffer
), "DLCI %u", dlci
);
163 /* Frame Relay packet structure, with flags and CRC removed
165 +---------------------------+
169 +---------------------------+
170 | Control (UI = 0x03) |
171 +---------------------------+
172 | Optional Pad (0x00) |
173 +---------------------------+
175 +---------------------------+
182 +---------------------------+
184 * Q.922 addresses, as presently defined, are two octets and
185 contain a 10-bit DLCI. In some networks Q.922 addresses
186 may optionally be increased to three or four octets.
190 fr_hdr_print(netdissect_options
*ndo
,
191 int length
, u_int addr_len
, u_int dlci
, uint8_t *flags
, uint16_t nlpid
)
193 if (ndo
->ndo_qflag
) {
194 ND_PRINT((ndo
, "Q.922, DLCI %u, length %u: ",
198 if (nlpid
<= 0xff) /* if its smaller than 256 then its a NLPID */
199 ND_PRINT((ndo
, "Q.922, hdr-len %u, DLCI %u, Flags [%s], NLPID %s (0x%02x), length %u: ",
202 bittok2str(fr_header_flag_values
, "none", EXTRACT_32BITS(flags
)),
203 tok2str(nlpid_values
,"unknown", nlpid
),
206 else /* must be an ethertype */
207 ND_PRINT((ndo
, "Q.922, hdr-len %u, DLCI %u, Flags [%s], cisco-ethertype %s (0x%04x), length %u: ",
210 bittok2str(fr_header_flag_values
, "none", EXTRACT_32BITS(flags
)),
211 tok2str(ethertype_values
, "unknown", nlpid
),
218 fr_if_print(netdissect_options
*ndo
,
219 const struct pcap_pkthdr
*h
, register const u_char
*p
)
221 register u_int length
= h
->len
;
222 register u_int caplen
= h
->caplen
;
224 ND_TCHECK2(*p
, 4); /* minimum frame header length */
226 if ((length
= fr_print(ndo
, p
, length
)) == 0)
231 ND_PRINT((ndo
, "[|fr]"));
236 fr_print(netdissect_options
*ndo
,
237 register const u_char
*p
, u_int length
)
240 uint16_t extracted_ethertype
;
247 ret
= parse_q922_addr(ndo
, p
, &dlci
, &addr_len
, flags
, length
);
251 ND_PRINT((ndo
, "Q.922, invalid address"));
255 ND_TCHECK(p
[addr_len
]);
256 if (length
< addr_len
+ 1)
259 if (p
[addr_len
] != LLC_UI
&& dlci
!= 0) {
261 * Let's figure out if we have Cisco-style encapsulation,
262 * with an Ethernet type (Cisco HDLC type?) following the
265 if (!ND_TTEST2(p
[addr_len
], 2) || length
< addr_len
+ 2) {
267 ND_PRINT((ndo
, "UI %02x! ", p
[addr_len
]));
269 extracted_ethertype
= EXTRACT_16BITS(p
+addr_len
);
272 fr_hdr_print(ndo
, length
, addr_len
, dlci
,
273 flags
, extracted_ethertype
);
275 if (ethertype_print(ndo
, extracted_ethertype
,
276 p
+addr_len
+ETHERTYPE_LEN
,
277 length
-addr_len
-ETHERTYPE_LEN
,
278 length
-addr_len
-ETHERTYPE_LEN
) == 0)
279 /* ether_type not known, probably it wasn't one */
280 ND_PRINT((ndo
, "UI %02x! ", p
[addr_len
]));
286 ND_TCHECK(p
[addr_len
+1]);
287 if (length
< addr_len
+ 2)
290 if (p
[addr_len
+ 1] == 0) {
292 * Assume a pad byte after the control (UI) byte.
293 * A pad byte should only be used with 3-byte Q.922.
296 ND_PRINT((ndo
, "Pad! "));
297 hdr_len
= addr_len
+ 1 /* UI */ + 1 /* pad */ + 1 /* NLPID */;
301 * A pad byte should be used with 3-byte Q.922.
304 ND_PRINT((ndo
, "No pad! "));
305 hdr_len
= addr_len
+ 1 /* UI */ + 1 /* NLPID */;
308 ND_TCHECK(p
[hdr_len
- 1]);
309 if (length
< hdr_len
)
311 nlpid
= p
[hdr_len
- 1];
314 fr_hdr_print(ndo
, length
, addr_len
, dlci
, flags
, nlpid
);
320 ip_print(ndo
, p
, length
);
324 ip6_print(ndo
, p
, length
);
330 isoclns_print(ndo
, p
- 1, length
+ 1, length
+ 1); /* OSI printers need the NLPID field */
334 if (snap_print(ndo
, p
, length
, length
, 0) == 0) {
335 /* ether_type not known, print raw packet */
337 fr_hdr_print(ndo
, length
+ hdr_len
, hdr_len
,
339 if (!ndo
->ndo_suppress_default_print
)
340 ND_DEFAULTPRINT(p
- hdr_len
, length
+ hdr_len
);
345 q933_print(ndo
, p
, length
);
349 frf15_print(ndo
, p
, length
);
353 ppp_print(ndo
, p
, length
);
358 fr_hdr_print(ndo
, length
+ hdr_len
, addr_len
,
361 ND_DEFAULTPRINT(p
, length
);
367 ND_PRINT((ndo
, "[|fr]"));
373 mfr_if_print(netdissect_options
*ndo
,
374 const struct pcap_pkthdr
*h
, register const u_char
*p
)
376 register u_int length
= h
->len
;
377 register u_int caplen
= h
->caplen
;
379 ND_TCHECK2(*p
, 2); /* minimum frame header length */
381 if ((length
= mfr_print(ndo
, p
, length
)) == 0)
386 ND_PRINT((ndo
, "[|mfr]"));
391 #define MFR_CTRL_MSG_ADD_LINK 1
392 #define MFR_CTRL_MSG_ADD_LINK_ACK 2
393 #define MFR_CTRL_MSG_ADD_LINK_REJ 3
394 #define MFR_CTRL_MSG_HELLO 4
395 #define MFR_CTRL_MSG_HELLO_ACK 5
396 #define MFR_CTRL_MSG_REMOVE_LINK 6
397 #define MFR_CTRL_MSG_REMOVE_LINK_ACK 7
399 static const struct tok mfr_ctrl_msg_values
[] = {
400 { MFR_CTRL_MSG_ADD_LINK
, "Add Link" },
401 { MFR_CTRL_MSG_ADD_LINK_ACK
, "Add Link ACK" },
402 { MFR_CTRL_MSG_ADD_LINK_REJ
, "Add Link Reject" },
403 { MFR_CTRL_MSG_HELLO
, "Hello" },
404 { MFR_CTRL_MSG_HELLO_ACK
, "Hello ACK" },
405 { MFR_CTRL_MSG_REMOVE_LINK
, "Remove Link" },
406 { MFR_CTRL_MSG_REMOVE_LINK_ACK
, "Remove Link ACK" },
410 #define MFR_CTRL_IE_BUNDLE_ID 1
411 #define MFR_CTRL_IE_LINK_ID 2
412 #define MFR_CTRL_IE_MAGIC_NUM 3
413 #define MFR_CTRL_IE_TIMESTAMP 5
414 #define MFR_CTRL_IE_VENDOR_EXT 6
415 #define MFR_CTRL_IE_CAUSE 7
417 static const struct tok mfr_ctrl_ie_values
[] = {
418 { MFR_CTRL_IE_BUNDLE_ID
, "Bundle ID"},
419 { MFR_CTRL_IE_LINK_ID
, "Link ID"},
420 { MFR_CTRL_IE_MAGIC_NUM
, "Magic Number"},
421 { MFR_CTRL_IE_TIMESTAMP
, "Timestamp"},
422 { MFR_CTRL_IE_VENDOR_EXT
, "Vendor Extension"},
423 { MFR_CTRL_IE_CAUSE
, "Cause"},
427 #define MFR_ID_STRING_MAXLEN 50
429 struct ie_tlv_header_t
{
435 mfr_print(netdissect_options
*ndo
,
436 register const u_char
*p
, u_int length
)
438 u_int tlen
,idx
,hdr_len
= 0;
439 uint16_t sequence_num
;
440 uint8_t ie_type
,ie_len
;
445 * FRF.16 Link Integrity Control Frame
448 * +----+----+----+----+----+----+----+----+
449 * | B | E | C=1| 0 0 0 0 | EA |
450 * +----+----+----+----+----+----+----+----+
451 * | 0 0 0 0 0 0 0 0 |
452 * +----+----+----+----+----+----+----+----+
454 * +----+----+----+----+----+----+----+----+
457 ND_TCHECK2(*p
, 4); /* minimum frame header length */
459 if ((p
[0] & MFR_BEC_MASK
) == MFR_CTRL_FRAME
&& p
[1] == 0) {
460 ND_PRINT((ndo
, "FRF.16 Control, Flags [%s], %s, length %u",
461 bittok2str(frf_flag_values
,"none",(p
[0] & MFR_BEC_MASK
)),
462 tok2str(mfr_ctrl_msg_values
,"Unknown Message (0x%02x)",p
[2]),
471 while (tlen
>sizeof(struct ie_tlv_header_t
)) {
472 ND_TCHECK2(*tptr
, sizeof(struct ie_tlv_header_t
));
476 ND_PRINT((ndo
, "\n\tIE %s (%u), length %u: ",
477 tok2str(mfr_ctrl_ie_values
,"Unknown",ie_type
),
481 /* infinite loop check */
482 if (ie_type
== 0 || ie_len
<= sizeof(struct ie_tlv_header_t
))
485 ND_TCHECK2(*tptr
, ie_len
);
486 tptr
+=sizeof(struct ie_tlv_header_t
);
487 /* tlv len includes header */
488 ie_len
-=sizeof(struct ie_tlv_header_t
);
489 tlen
-=sizeof(struct ie_tlv_header_t
);
493 case MFR_CTRL_IE_MAGIC_NUM
:
494 ND_PRINT((ndo
, "0x%08x", EXTRACT_32BITS(tptr
)));
497 case MFR_CTRL_IE_BUNDLE_ID
: /* same message format */
498 case MFR_CTRL_IE_LINK_ID
:
499 for (idx
= 0; idx
< ie_len
&& idx
< MFR_ID_STRING_MAXLEN
; idx
++) {
500 if (*(tptr
+idx
) != 0) /* don't print null termination */
501 safeputchar(ndo
, *(tptr
+ idx
));
507 case MFR_CTRL_IE_TIMESTAMP
:
508 if (ie_len
== sizeof(struct timeval
)) {
509 ts_print(ndo
, (const struct timeval
*)tptr
);
512 /* fall through and hexdump if no unix timestamp */
515 * FIXME those are the defined IEs that lack a decoder
516 * you are welcome to contribute code ;-)
519 case MFR_CTRL_IE_VENDOR_EXT
:
520 case MFR_CTRL_IE_CAUSE
:
523 if (ndo
->ndo_vflag
<= 1)
524 print_unknown_data(ndo
, tptr
, "\n\t ", ie_len
);
528 /* do we want to see a hexdump of the IE ? */
529 if (ndo
->ndo_vflag
> 1 )
530 print_unknown_data(ndo
, tptr
, "\n\t ", ie_len
);
538 * FRF.16 Fragmentation Frame
541 * +----+----+----+----+----+----+----+----+
542 * | B | E | C=0|seq. (high 4 bits) | EA |
543 * +----+----+----+----+----+----+----+----+
544 * | sequence (low 8 bits) |
545 * +----+----+----+----+----+----+----+----+
546 * | DLCI (6 bits) | CR | EA |
547 * +----+----+----+----+----+----+----+----+
548 * | DLCI (4 bits) |FECN|BECN| DE | EA |
549 * +----+----+----+----+----+----+----+----+
552 sequence_num
= (p
[0]&0x1e)<<7 | p
[1];
553 /* whole packet or first fragment ? */
554 if ((p
[0] & MFR_BEC_MASK
) == MFR_FRAG_FRAME
||
555 (p
[0] & MFR_BEC_MASK
) == MFR_B_BIT
) {
556 ND_PRINT((ndo
, "FRF.16 Frag, seq %u, Flags [%s], ",
558 bittok2str(frf_flag_values
,"none",(p
[0] & MFR_BEC_MASK
))));
560 fr_print(ndo
, p
+hdr_len
,length
-hdr_len
);
564 /* must be a middle or the last fragment */
565 ND_PRINT((ndo
, "FRF.16 Frag, seq %u, Flags [%s]",
567 bittok2str(frf_flag_values
,"none",(p
[0] & MFR_BEC_MASK
))));
568 print_unknown_data(ndo
, p
, "\n\t", length
);
573 ND_PRINT((ndo
, "[|mfr]"));
577 /* an NLPID of 0xb1 indicates a 2-byte
581 * +----+----+----+----+----+----+----+----+
583 * +----+----+----+----+----+----+----+----+
584 * | NLPID (8 bits) | NLPID=0xb1
585 * +----+----+----+----+----+----+----+----+
586 * | B | E | C |seq. (high 4 bits) | R |
587 * +----+----+----+----+----+----+----+----+
588 * | sequence (low 8 bits) |
589 * +----+----+----+----+----+----+----+----+
592 #define FR_FRF15_FRAGTYPE 0x01
595 frf15_print(netdissect_options
*ndo
,
596 const u_char
*p
, u_int length
)
598 uint16_t sequence_num
, flags
;
600 flags
= p
[0]&MFR_BEC_MASK
;
601 sequence_num
= (p
[0]&0x1e)<<7 | p
[1];
603 ND_PRINT((ndo
, "FRF.15, seq 0x%03x, Flags [%s],%s Fragmentation, length %u",
605 bittok2str(frf_flag_values
,"none",flags
),
606 p
[0]&FR_FRF15_FRAGTYPE
? "Interface" : "End-to-End",
610 * depending on all permutations of the B, E and C bit
611 * dig as deep as we can - e.g. on the first (B) fragment
612 * there is enough payload to print the IP header
613 * on non (B) fragments it depends if the fragmentation
614 * model is end-to-end or interface based wether we want to print
615 * another Q.922 header
621 * Q.933 decoding portion for framerelay specific.
624 /* Q.933 packet format
625 Format of Other Protocols
627 +-------------------------------+
629 +---------------+---------------+
630 |Control 0x03 | NLPID 0x08 |
631 +---------------+---------------+
633 | octet 1 | octet 2 |
634 +-------------------------------+
636 | octet 2 | octet 2 |
637 +-------------------------------+
639 +-------------------------------+
641 +-------------------------------+
644 /* L2 (Octet 1)- Call Reference Usually is 0x0 */
647 * L2 (Octet 2)- Message Types definition 1 byte long.
650 #define MSG_TYPE_ESC_TO_NATIONAL 0x00
651 #define MSG_TYPE_ALERT 0x01
652 #define MSG_TYPE_CALL_PROCEEDING 0x02
653 #define MSG_TYPE_CONNECT 0x07
654 #define MSG_TYPE_CONNECT_ACK 0x0F
655 #define MSG_TYPE_PROGRESS 0x03
656 #define MSG_TYPE_SETUP 0x05
658 #define MSG_TYPE_DISCONNECT 0x45
659 #define MSG_TYPE_RELEASE 0x4D
660 #define MSG_TYPE_RELEASE_COMPLETE 0x5A
661 #define MSG_TYPE_RESTART 0x46
662 #define MSG_TYPE_RESTART_ACK 0x4E
664 #define MSG_TYPE_STATUS 0x7D
665 #define MSG_TYPE_STATUS_ENQ 0x75
667 static const struct tok fr_q933_msg_values
[] = {
668 { MSG_TYPE_ESC_TO_NATIONAL
, "ESC to National" },
669 { MSG_TYPE_ALERT
, "Alert" },
670 { MSG_TYPE_CALL_PROCEEDING
, "Call proceeding" },
671 { MSG_TYPE_CONNECT
, "Connect" },
672 { MSG_TYPE_CONNECT_ACK
, "Connect ACK" },
673 { MSG_TYPE_PROGRESS
, "Progress" },
674 { MSG_TYPE_SETUP
, "Setup" },
675 { MSG_TYPE_DISCONNECT
, "Disconnect" },
676 { MSG_TYPE_RELEASE
, "Release" },
677 { MSG_TYPE_RELEASE_COMPLETE
, "Release Complete" },
678 { MSG_TYPE_RESTART
, "Restart" },
679 { MSG_TYPE_RESTART_ACK
, "Restart ACK" },
680 { MSG_TYPE_STATUS
, "Status Reply" },
681 { MSG_TYPE_STATUS_ENQ
, "Status Enquiry" },
685 #define MSG_ANSI_LOCKING_SHIFT 0x95
687 #define FR_LMI_ANSI_REPORT_TYPE_IE 0x01
688 #define FR_LMI_ANSI_LINK_VERIFY_IE_91 0x19 /* details? */
689 #define FR_LMI_ANSI_LINK_VERIFY_IE 0x03
690 #define FR_LMI_ANSI_PVC_STATUS_IE 0x07
692 #define FR_LMI_CCITT_REPORT_TYPE_IE 0x51
693 #define FR_LMI_CCITT_LINK_VERIFY_IE 0x53
694 #define FR_LMI_CCITT_PVC_STATUS_IE 0x57
696 static const struct tok fr_q933_ie_values_codeset5
[] = {
697 { FR_LMI_ANSI_REPORT_TYPE_IE
, "ANSI Report Type" },
698 { FR_LMI_ANSI_LINK_VERIFY_IE_91
, "ANSI Link Verify" },
699 { FR_LMI_ANSI_LINK_VERIFY_IE
, "ANSI Link Verify" },
700 { FR_LMI_ANSI_PVC_STATUS_IE
, "ANSI PVC Status" },
701 { FR_LMI_CCITT_REPORT_TYPE_IE
, "CCITT Report Type" },
702 { FR_LMI_CCITT_LINK_VERIFY_IE
, "CCITT Link Verify" },
703 { FR_LMI_CCITT_PVC_STATUS_IE
, "CCITT PVC Status" },
707 #define FR_LMI_REPORT_TYPE_IE_FULL_STATUS 0
708 #define FR_LMI_REPORT_TYPE_IE_LINK_VERIFY 1
709 #define FR_LMI_REPORT_TYPE_IE_ASYNC_PVC 2
711 static const struct tok fr_lmi_report_type_ie_values
[] = {
712 { FR_LMI_REPORT_TYPE_IE_FULL_STATUS
, "Full Status" },
713 { FR_LMI_REPORT_TYPE_IE_LINK_VERIFY
, "Link verify" },
714 { FR_LMI_REPORT_TYPE_IE_ASYNC_PVC
, "Async PVC Status" },
718 /* array of 16 codepages - currently we only support codepage 1,5 */
719 static const struct tok
*fr_q933_ie_codesets
[] = {
721 fr_q933_ie_values_codeset5
,
725 fr_q933_ie_values_codeset5
,
738 static int fr_q933_print_ie_codeset5(netdissect_options
*ndo
,
739 const struct ie_tlv_header_t
*ie_p
, const u_char
*p
);
741 typedef int (*codeset_pr_func_t
)(netdissect_options
*,
742 const struct ie_tlv_header_t
*ie_p
, const u_char
*p
);
744 /* array of 16 codepages - currently we only support codepage 1,5 */
745 static const codeset_pr_func_t fr_q933_print_ie_codeset
[] = {
747 fr_q933_print_ie_codeset5
,
751 fr_q933_print_ie_codeset5
,
765 q933_print(netdissect_options
*ndo
,
766 const u_char
*p
, u_int length
)
768 const u_char
*ptemp
= p
;
769 struct ie_tlv_header_t
*ie_p
;
773 u_int ie_is_known
= 0;
775 if (length
< 9) { /* shortest: Q.933a LINK VERIFY */
776 ND_PRINT((ndo
, "[|q.933]"));
780 codeset
= p
[2]&0x0f; /* extract the codeset */
782 if (p
[2] == MSG_ANSI_LOCKING_SHIFT
) {
786 ND_PRINT((ndo
, "%s", ndo
->ndo_eflag
? "" : "Q.933, "));
788 /* printing out header part */
789 ND_PRINT((ndo
, "%s, codeset %u", is_ansi
? "ANSI" : "CCITT", codeset
));
792 ND_PRINT((ndo
, ", Call Ref: 0x%02x", p
[0]));
794 if (ndo
->ndo_vflag
) {
795 ND_PRINT((ndo
, ", %s (0x%02x), length %u",
796 tok2str(fr_q933_msg_values
,
797 "unknown message", p
[1]),
801 ND_PRINT((ndo
, ", %s",
802 tok2str(fr_q933_msg_values
,
803 "unknown message 0x%02x", p
[1])));
806 olen
= length
; /* preserve the original length for non verbose mode */
808 if (length
< (u_int
)(2 - is_ansi
)) {
809 ND_PRINT((ndo
, "[|q.933]"));
812 length
-= 2 + is_ansi
;
813 ptemp
+= 2 + is_ansi
;
815 /* Loop through the rest of IE */
816 while (length
> sizeof(struct ie_tlv_header_t
)) {
817 ie_p
= (struct ie_tlv_header_t
*)ptemp
;
818 if (length
< sizeof(struct ie_tlv_header_t
) ||
819 length
< sizeof(struct ie_tlv_header_t
) + ie_p
->ie_len
) {
820 if (ndo
->ndo_vflag
) { /* not bark if there is just a trailer */
821 ND_PRINT((ndo
, "\n[|q.933]"));
823 ND_PRINT((ndo
, ", length %u", olen
));
828 /* lets do the full IE parsing only in verbose mode
829 * however some IEs (DLCI Status, Link Verify)
830 * are also interestting in non-verbose mode */
831 if (ndo
->ndo_vflag
) {
832 ND_PRINT((ndo
, "\n\t%s IE (0x%02x), length %u: ",
833 tok2str(fr_q933_ie_codesets
[codeset
],
834 "unknown", ie_p
->ie_type
),
840 if (ie_p
->ie_type
== 0 || ie_p
->ie_len
== 0) {
844 if (fr_q933_print_ie_codeset
[codeset
] != NULL
) {
845 ie_is_known
= fr_q933_print_ie_codeset
[codeset
](ndo
, ie_p
, ptemp
);
848 if (ndo
->ndo_vflag
>= 1 && !ie_is_known
) {
849 print_unknown_data(ndo
, ptemp
+2, "\n\t", ie_p
->ie_len
);
852 /* do we want to see a hexdump of the IE ? */
853 if (ndo
->ndo_vflag
> 1 && ie_is_known
) {
854 print_unknown_data(ndo
, ptemp
+2, "\n\t ", ie_p
->ie_len
);
857 length
= length
- ie_p
->ie_len
- 2;
858 ptemp
= ptemp
+ ie_p
->ie_len
+ 2;
860 if (!ndo
->ndo_vflag
) {
861 ND_PRINT((ndo
, ", length %u", olen
));
866 fr_q933_print_ie_codeset5(netdissect_options
*ndo
,
867 const struct ie_tlv_header_t
*ie_p
, const u_char
*p
)
871 switch (ie_p
->ie_type
) {
873 case FR_LMI_ANSI_REPORT_TYPE_IE
: /* fall through */
874 case FR_LMI_CCITT_REPORT_TYPE_IE
:
875 if (ndo
->ndo_vflag
) {
876 ND_PRINT((ndo
, "%s (%u)",
877 tok2str(fr_lmi_report_type_ie_values
,"unknown",p
[2]),
882 case FR_LMI_ANSI_LINK_VERIFY_IE
: /* fall through */
883 case FR_LMI_CCITT_LINK_VERIFY_IE
:
884 case FR_LMI_ANSI_LINK_VERIFY_IE_91
:
885 if (!ndo
->ndo_vflag
) {
886 ND_PRINT((ndo
, ", "));
888 ND_PRINT((ndo
, "TX Seq: %3d, RX Seq: %3d", p
[2], p
[3]));
891 case FR_LMI_ANSI_PVC_STATUS_IE
: /* fall through */
892 case FR_LMI_CCITT_PVC_STATUS_IE
:
893 if (!ndo
->ndo_vflag
) {
894 ND_PRINT((ndo
, ", "));
896 /* now parse the DLCI information element. */
897 if ((ie_p
->ie_len
< 3) ||
899 ((ie_p
->ie_len
== 3) && !(p
[3] & 0x80)) ||
900 ((ie_p
->ie_len
== 4) && ((p
[3] & 0x80) || !(p
[4] & 0x80))) ||
901 ((ie_p
->ie_len
== 5) && ((p
[3] & 0x80) || (p
[4] & 0x80) ||
903 (ie_p
->ie_len
> 5) ||
904 !(p
[ie_p
->ie_len
+ 1] & 0x80)) {
905 ND_PRINT((ndo
, "Invalid DLCI IE"));
908 dlci
= ((p
[2] & 0x3F) << 4) | ((p
[3] & 0x78) >> 3);
909 if (ie_p
->ie_len
== 4) {
910 dlci
= (dlci
<< 6) | ((p
[4] & 0x7E) >> 1);
912 else if (ie_p
->ie_len
== 5) {
913 dlci
= (dlci
<< 13) | (p
[4] & 0x7F) | ((p
[5] & 0x7E) >> 1);
916 ND_PRINT((ndo
, "DLCI %u: status %s%s", dlci
,
917 p
[ie_p
->ie_len
+ 1] & 0x8 ? "New, " : "",
918 p
[ie_p
->ie_len
+ 1] & 0x2 ? "Active" : "Inactive"));
926 * c-style: whitesmith