]>
The Tcpdump Group git mirrors - tcpdump/blob - print-resp.c
2 * Copyright (c) 2015 The TCPDUMP project
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
14 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
15 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
16 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
17 * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
18 * COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
19 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
20 * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
21 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
22 * CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
23 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN
24 * ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
25 * POSSIBILITY OF SUCH DAMAGE.
27 * Initial contribution by Andrew Darqui (andrew.darqui@gmail.com).
30 /* \summary: REdis Serialization Protocol (RESP) printer */
36 #include "netdissect-stdinc.h"
37 #include "netdissect.h"
47 * For information regarding RESP, see: https://redis.io/topics/protocol
50 #define RESP_SIMPLE_STRING '+'
51 #define RESP_ERROR '-'
52 #define RESP_INTEGER ':'
53 #define RESP_BULK_STRING '$'
54 #define RESP_ARRAY '*'
56 #define resp_print_empty(ndo) ND_PRINT(" empty")
57 #define resp_print_null(ndo) ND_PRINT(" null")
58 #define resp_print_length_too_large(ndo) ND_PRINT(" length too large")
59 #define resp_print_length_negative(ndo) ND_PRINT(" length negative and not -1")
60 #define resp_print_invalid(ndo) ND_PRINT(" invalid")
62 void resp_print(netdissect_options
*, const u_char
*, u_int
);
63 static int resp_parse(netdissect_options
*, const u_char
*, int);
64 static int resp_print_string_error_integer(netdissect_options
*, const u_char
*, int);
65 static int resp_print_simple_string(netdissect_options
*, const u_char
*, int);
66 static int resp_print_integer(netdissect_options
*, const u_char
*, int);
67 static int resp_print_error(netdissect_options
*, const u_char
*, int);
68 static int resp_print_bulk_string(netdissect_options
*, const u_char
*, int);
69 static int resp_print_bulk_array(netdissect_options
*, const u_char
*, int);
70 static int resp_print_inline(netdissect_options
*, const u_char
*, int);
71 static int resp_get_length(netdissect_options
*, const u_char
*, int, const u_char
**);
73 #define LCHECK2(_tot_len, _len) \
75 if (_tot_len < _len) \
79 #define LCHECK(_tot_len) LCHECK2(_tot_len, 1)
83 * Attempts to move our 'ptr' forward until a \r\n is found,
84 * while also making sure we don't exceed the buffer '_len'
85 * or go past the end of the captured data.
86 * If we exceed or go past the end of the captured data,
89 #define FIND_CRLF(_ptr, _len) \
93 if (GET_U_1(_ptr) == '\r' && \
94 GET_U_1(_ptr+1) == '\n') \
102 * Consume a CRLF that we've just found.
104 #define CONSUME_CRLF(_ptr, _len) \
110 * Attempts to move our '_ptr' forward until a \r or \n is found,
111 * while also making sure we don't exceed the buffer '_len'
112 * or go past the end of the captured data.
113 * If we exceed or go past the end of the captured data,
116 #define FIND_CR_OR_LF(_ptr, _len) \
119 if (GET_U_1(_ptr) == '\r' || \
120 GET_U_1(_ptr) == '\n') \
128 * Consume all consecutive \r and \n bytes.
129 * If we exceed '_len' or go past the end of the captured data,
132 #define CONSUME_CR_OR_LF(_ptr, _len) \
134 int _found_cr_or_lf = 0; \
137 * Have we hit the end of data? \
139 if (_len == 0 || !ND_TTEST_1(_ptr)) {\
141 * Yes. Have we seen a \r \
144 if (_found_cr_or_lf) { \
151 * No. We ran out of packet. \
155 if (GET_U_1(_ptr) != '\r' && \
156 GET_U_1(_ptr) != '\n') \
158 _found_cr_or_lf = 1; \
166 * Skip over the opcode character.
167 * The opcode has already been fetched, so we know it's there, and don't
168 * need to do any checks.
170 #define SKIP_OPCODE(_ptr, _tot_len) \
176 * Get a bulk string or array length.
178 #define GET_LENGTH(_ndo, _tot_len, _ptr, _len) \
180 const u_char *_endp; \
181 _len = resp_get_length(_ndo, _ptr, _tot_len, &_endp); \
182 _tot_len -= (_endp - _ptr); \
188 * If ret_len is < 0, jump to the trunc tag which returns (-1)
189 * and 'bubbles up' to printing tstr. Otherwise, return ret_len.
191 #define TEST_RET_LEN(rl) \
192 if (rl < 0) { goto trunc; } else { return rl; }
195 * TEST_RET_LEN_NORETURN
196 * If ret_len is < 0, jump to the trunc tag which returns (-1)
197 * and 'bubbles up' to printing tstr. Otherwise, continue onward.
199 #define TEST_RET_LEN_NORETURN(rl) \
200 if (rl < 0) { goto trunc; }
204 * Prints a segment in the form of: ' "<stuff>"\n"
205 * Assumes the data has already been verified as present.
207 #define RESP_PRINT_SEGMENT(_ndo, _bp, _len) \
209 if (nd_printn(_ndo, _bp, _len, _ndo->ndo_snapend)) \
211 fn_print_char(_ndo, '"');
214 resp_print(netdissect_options
*ndo
, const u_char
*bp
, u_int length
)
216 int ret_len
= 0, length_cur
= length
;
218 ndo
->ndo_protocol
= "resp";
219 if(!bp
|| length
<= 0)
223 while (length_cur
> 0) {
225 * This block supports redis pipelining.
226 * For example, multiple operations can be pipelined within the same string:
227 * "*2\r\n\$4\r\nINCR\r\n\$1\r\nz\r\n*2\r\n\$4\r\nINCR\r\n\$1\r\nz\r\n*2\r\n\$4\r\nINCR\r\n\$1\r\nz\r\n"
229 * "PING\r\nPING\r\nPING\r\n"
230 * In order to handle this case, we must try and parse 'bp' until
231 * 'length' bytes have been processed or we reach a trunc condition.
233 ret_len
= resp_parse(ndo
, bp
, length_cur
);
234 TEST_RET_LEN_NORETURN(ret_len
);
236 length_cur
-= ret_len
;
246 resp_parse(netdissect_options
*ndo
, const u_char
*bp
, int length
)
254 /* bp now points to the op, so these routines must skip it */
256 case RESP_SIMPLE_STRING
: ret_len
= resp_print_simple_string(ndo
, bp
, length
); break;
257 case RESP_INTEGER
: ret_len
= resp_print_integer(ndo
, bp
, length
); break;
258 case RESP_ERROR
: ret_len
= resp_print_error(ndo
, bp
, length
); break;
259 case RESP_BULK_STRING
: ret_len
= resp_print_bulk_string(ndo
, bp
, length
); break;
260 case RESP_ARRAY
: ret_len
= resp_print_bulk_array(ndo
, bp
, length
); break;
261 default: ret_len
= resp_print_inline(ndo
, bp
, length
); break;
265 * This gives up with a "truncated" indicator for all errors,
266 * including invalid packet errors; that's what we want, as
267 * we have to give up on further parsing in that case.
269 TEST_RET_LEN(ret_len
);
276 resp_print_simple_string(netdissect_options
*ndo
, const u_char
*bp
, int length
) {
277 return resp_print_string_error_integer(ndo
, bp
, length
);
281 resp_print_integer(netdissect_options
*ndo
, const u_char
*bp
, int length
) {
282 return resp_print_string_error_integer(ndo
, bp
, length
);
286 resp_print_error(netdissect_options
*ndo
, const u_char
*bp
, int length
) {
287 return resp_print_string_error_integer(ndo
, bp
, length
);
291 resp_print_string_error_integer(netdissect_options
*ndo
, const u_char
*bp
, int length
) {
292 int length_cur
= length
, len
, ret_len
;
293 const u_char
*bp_ptr
;
295 /* bp points to the op; skip it */
296 SKIP_OPCODE(bp
, length_cur
);
300 * bp now prints past the (+-;) opcode, so it's pointing to the first
301 * character of the string (which could be numeric).
306 * Find the \r\n with FIND_CRLF().
308 FIND_CRLF(bp_ptr
, length_cur
);
311 * bp_ptr points to the \r\n, so bp_ptr - bp is the length of text
312 * preceding the \r\n. That includes the opcode, so don't print
315 len
= ND_BYTES_BETWEEN(bp_ptr
, bp
);
316 RESP_PRINT_SEGMENT(ndo
, bp
, len
);
317 ret_len
= 1 /*<opcode>*/ + len
/*<string>*/ + 2 /*<CRLF>*/;
319 TEST_RET_LEN(ret_len
);
326 resp_print_bulk_string(netdissect_options
*ndo
, const u_char
*bp
, int length
) {
327 int length_cur
= length
, string_len
;
329 /* bp points to the op; skip it */
330 SKIP_OPCODE(bp
, length_cur
);
333 GET_LENGTH(ndo
, length_cur
, bp
, string_len
);
335 if (string_len
>= 0) {
336 /* Byte string of length string_len, starting at bp */
338 resp_print_empty(ndo
);
340 LCHECK2(length_cur
, string_len
);
341 ND_TCHECK_LEN(bp
, string_len
);
342 RESP_PRINT_SEGMENT(ndo
, bp
, string_len
);
344 length_cur
-= string_len
;
348 * Find the \r\n at the end of the string and skip past it.
349 * XXX - report an error if the \r\n isn't immediately after
352 FIND_CRLF(bp
, length_cur
);
353 CONSUME_CRLF(bp
, length_cur
);
355 /* null, truncated, or invalid for some reason */
357 case (-1): resp_print_null(ndo
); break;
358 case (-2): goto trunc
;
359 case (-3): resp_print_length_too_large(ndo
); break;
360 case (-4): resp_print_length_negative(ndo
); break;
361 default: resp_print_invalid(ndo
); break;
365 return (length
- length_cur
);
372 resp_print_bulk_array(netdissect_options
*ndo
, const u_char
*bp
, int length
) {
373 u_int length_cur
= length
;
374 int array_len
, i
, ret_len
;
376 /* bp points to the op; skip it */
377 SKIP_OPCODE(bp
, length_cur
);
379 /* <array_length>\r\n */
380 GET_LENGTH(ndo
, length_cur
, bp
, array_len
);
383 /* non empty array */
384 for (i
= 0; i
< array_len
; i
++) {
385 ret_len
= resp_parse(ndo
, bp
, length_cur
);
387 TEST_RET_LEN_NORETURN(ret_len
);
390 length_cur
-= ret_len
;
393 /* empty, null, truncated, or invalid */
395 case 0: resp_print_empty(ndo
); break;
396 case (-1): resp_print_null(ndo
); break;
397 case (-2): goto trunc
;
398 case (-3): resp_print_length_too_large(ndo
); break;
399 case (-4): resp_print_length_negative(ndo
); break;
400 default: resp_print_invalid(ndo
); break;
404 return (length
- length_cur
);
411 resp_print_inline(netdissect_options
*ndo
, const u_char
*bp
, int length
) {
412 int length_cur
= length
;
414 const u_char
*bp_ptr
;
417 * Inline commands are simply 'strings' followed by \r or \n or both.
418 * Redis will do its best to split/parse these strings.
419 * This feature of redis is implemented to support the ability of
420 * command parsing from telnet/nc sessions etc.
422 * <string><\r||\n||\r\n...>
426 * Skip forward past any leading \r, \n, or \r\n.
428 CONSUME_CR_OR_LF(bp
, length_cur
);
432 * Scan forward looking for \r or \n.
434 FIND_CR_OR_LF(bp_ptr
, length_cur
);
437 * Found it; bp_ptr points to the \r or \n, so bp_ptr - bp is the
438 * Length of the line text that precedes it. Print it.
440 len
= ND_BYTES_BETWEEN(bp_ptr
, bp
);
441 RESP_PRINT_SEGMENT(ndo
, bp
, len
);
444 * Skip forward past the \r, \n, or \r\n.
446 CONSUME_CR_OR_LF(bp_ptr
, length_cur
);
449 * Return the number of bytes we processed.
451 return (length
- length_cur
);
458 resp_get_length(netdissect_options
*ndo
, const u_char
*bp
, int len
, const u_char
**endp
)
470 if (GET_U_1(bp
) == '-') {
482 if (!(c
>= '0' && c
<= '9')) {
490 if (result
> (INT_MAX
/ 10)) {
491 /* This will overflow an int when we multiply it by 10. */
495 if (result
== ((INT_MAX
/ 10) * 10) && c
> (INT_MAX
% 10)) {
496 /* This will overflow an int when we add c */
507 * OK, we found a non-digit character. It should be a \r, followed
510 if (GET_U_1(bp
) != '\r') {
518 if (GET_U_1(bp
) != '\n') {
526 /* -1 means "null", anything else is invalid */
527 if (too_large
|| result
!= 1)
531 return (too_large
? -3 : result
);