]>
The Tcpdump Group git mirrors - tcpdump/blob - print-arcnet.c
2 * Copyright (c) 1988, 1989, 1990, 1991, 1992, 1993, 1994, 1995, 1996, 1997
3 * The Regents of the University of California. All rights reserved.
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that: (1) source code distributions
7 * retain the above copyright notice and this paragraph in its entirety, (2)
8 * distributions including binary code include the above copyright notice and
9 * this paragraph in its entirety in the documentation or other materials
10 * provided with the distribution, and (3) all advertising materials mentioning
11 * features or use of this software display the following acknowledgement:
12 * ``This product includes software developed by the University of California,
13 * Lawrence Berkeley Laboratory and its contributors.'' Neither the name of
14 * the University nor the names of its contributors may be used to endorse
15 * or promote products derived from this software without specific prior
17 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED
18 * WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF
19 * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
21 * From: NetBSD: print-arcnet.c,v 1.2 2000/04/24 13:02:28 itojun Exp
24 /* \summary: Attached Resource Computer NETwork (ARCNET) printer */
30 #include "netdissect-stdinc.h"
32 #include "netdissect.h"
36 * from: NetBSD: if_arc.h,v 1.13 1999/11/19 20:41:19 thorpej Exp
40 * Structure of a 2.5MB/s Arcnet header on the BSDs,
41 * as given to interface code.
48 * only present for newstyle encoding with LL fragmentation.
49 * Don't use sizeof(anything), use ARC_HDR{,NEW}LEN instead.
52 nd_uint16_t arc_seqid
;
55 * only present in exception packets (arc_flag == 0xff)
57 nd_uint8_t arc_type2
; /* same as arc_type */
58 nd_uint8_t arc_flag2
; /* real flag value */
59 nd_uint16_t arc_seqid2
; /* real seqid value */
63 #define ARC_HDRNEWLEN 6
64 #define ARC_HDRNEWLEN_EXC 10
67 #define ARCTYPE_IP_OLD 240 /* IP protocol */
68 #define ARCTYPE_ARP_OLD 241 /* address resolution protocol */
71 #define ARCTYPE_IP 212 /* IP protocol */
72 #define ARCTYPE_ARP 213 /* address resolution protocol */
73 #define ARCTYPE_REVARP 214 /* reverse addr resolution protocol */
75 #define ARCTYPE_ATALK 221 /* Appletalk */
76 #define ARCTYPE_BANIAN 247 /* Banyan Vines */
77 #define ARCTYPE_IPX 250 /* Novell IPX */
79 #define ARCTYPE_INET6 0xc4 /* IPng */
80 #define ARCTYPE_DIAGNOSE 0x80 /* as per ANSI/ATA 878.1 */
83 * Structure of a 2.5MB/s Arcnet header on Linux. Linux has
84 * an extra "offset" field when given to interface code, and
85 * never presents packets that look like exception frames.
87 struct arc_linux_header
{
90 nd_uint16_t arc_offset
;
93 * only present for newstyle encoding with LL fragmentation.
94 * Don't use sizeof(anything), use ARC_LINUX_HDR{,NEW}LEN
98 nd_uint16_t arc_seqid
;
101 #define ARC_LINUX_HDRLEN 5
102 #define ARC_LINUX_HDRNEWLEN 8
104 static int arcnet_encap_print(netdissect_options
*, u_char arctype
, const u_char
*p
,
105 u_int length
, u_int caplen
);
107 static const struct tok arctypemap
[] = {
108 { ARCTYPE_IP_OLD
, "oldip" },
109 { ARCTYPE_ARP_OLD
, "oldarp" },
110 { ARCTYPE_IP
, "ip" },
111 { ARCTYPE_ARP
, "arp" },
112 { ARCTYPE_REVARP
, "rarp" },
113 { ARCTYPE_ATALK
, "atalk" },
114 { ARCTYPE_BANIAN
, "banyan" },
115 { ARCTYPE_IPX
, "ipx" },
116 { ARCTYPE_INET6
, "ipv6" },
117 { ARCTYPE_DIAGNOSE
, "diag" },
122 arcnet_print(netdissect_options
*ndo
, const u_char
*bp
, u_int length
, int phds
,
123 u_int flag
, u_int seqid
)
125 const struct arc_header
*ap
;
126 const char *arctypename
;
128 ndo
->ndo_protocol
= "arcnet";
129 ap
= (const struct arc_header
*)bp
;
131 if (ndo
->ndo_qflag
) {
132 ND_PRINT("%02x %02x %u: ",
133 EXTRACT_U_1(ap
->arc_shost
),
134 EXTRACT_U_1(ap
->arc_dhost
),
139 arctypename
= tok2str(arctypemap
, "%02x", EXTRACT_U_1(ap
->arc_type
));
142 ND_PRINT("%02x %02x %s %u: ",
143 EXTRACT_U_1(ap
->arc_shost
),
144 EXTRACT_U_1(ap
->arc_dhost
),
151 ND_PRINT("%02x %02x %s seqid %04x %u: ",
152 EXTRACT_U_1(ap
->arc_shost
),
153 EXTRACT_U_1(ap
->arc_dhost
),
160 ND_PRINT("%02x %02x %s seqid %04x "
161 "(first of %u fragments) %u: ",
162 EXTRACT_U_1(ap
->arc_shost
),
163 EXTRACT_U_1(ap
->arc_dhost
),
165 (flag
+ 3) / 2, length
);
167 ND_PRINT("%02x %02x %s seqid %04x "
168 "(fragment %u) %u: ",
169 EXTRACT_U_1(ap
->arc_shost
),
170 EXTRACT_U_1(ap
->arc_dhost
),
176 * This is the top level routine of the printer. 'p' points
177 * to the ARCNET header of the packet, 'h->ts' is the timestamp,
178 * 'h->len' is the length of the packet off the wire, and 'h->caplen'
179 * is the number of bytes actually captured.
182 arcnet_if_print(netdissect_options
*ndo
, const struct pcap_pkthdr
*h
, const u_char
*p
)
184 u_int caplen
= h
->caplen
;
185 u_int length
= h
->len
;
186 const struct arc_header
*ap
;
189 u_int flag
= 0, archdrlen
= 0;
193 ndo
->ndo_protocol
= "arcnet_if";
194 if (caplen
< ARC_HDRLEN
|| length
< ARC_HDRLEN
) {
195 ND_PRINT("[|arcnet]");
199 ap
= (const struct arc_header
*)p
;
200 arc_type
= EXTRACT_U_1(ap
->arc_type
);
207 case ARCTYPE_ARP_OLD
:
208 case ARCTYPE_DIAGNOSE
:
210 archdrlen
= ARC_HDRLEN
;
215 if (caplen
< ARC_HDRNEWLEN
|| length
< ARC_HDRNEWLEN
) {
216 arcnet_print(ndo
, p
, length
, 0, 0, 0);
221 flag
= EXTRACT_U_1(ap
->arc_flag
);
223 if (caplen
< ARC_HDRNEWLEN_EXC
|| length
< ARC_HDRNEWLEN_EXC
) {
224 arcnet_print(ndo
, p
, length
, 0, 0, 0);
225 ND_PRINT("[|phds extended]");
228 flag
= EXTRACT_U_1(ap
->arc_flag2
);
229 seqid
= EXTRACT_BE_U_2(ap
->arc_seqid2
);
230 archdrlen
= ARC_HDRNEWLEN_EXC
;
232 seqid
= EXTRACT_BE_U_2(ap
->arc_seqid
);
233 archdrlen
= ARC_HDRNEWLEN
;
239 arcnet_print(ndo
, p
, length
, phds
, flag
, seqid
);
242 * Go past the ARCNET header.
248 if (phds
&& flag
&& (flag
& 1) == 0) {
250 * This is a middle fragment.
255 if (!arcnet_encap_print(ndo
, arc_type
, p
, length
, caplen
))
256 ND_DEFAULTPRINT(p
, caplen
);
262 * This is the top level routine of the printer. 'p' points
263 * to the ARCNET header of the packet, 'h->ts' is the timestamp,
264 * 'h->len' is the length of the packet off the wire, and 'h->caplen'
265 * is the number of bytes actually captured. It is quite similar
266 * to the non-Linux style printer except that Linux doesn't ever
267 * supply packets that look like exception frames, it always supplies
268 * reassembled packets rather than raw frames, and headers have an
269 * extra "offset" field between the src/dest and packet type.
272 arcnet_linux_if_print(netdissect_options
*ndo
, const struct pcap_pkthdr
*h
, const u_char
*p
)
274 u_int caplen
= h
->caplen
;
275 u_int length
= h
->len
;
276 const struct arc_linux_header
*ap
;
281 ndo
->ndo_protocol
= "arcnet_linux_if";
282 if (caplen
< ARC_LINUX_HDRLEN
|| length
< ARC_LINUX_HDRLEN
) {
283 ND_PRINT("[|arcnet]");
287 ap
= (const struct arc_linux_header
*)p
;
288 arc_type
= EXTRACT_U_1(ap
->arc_type
);
292 archdrlen
= ARC_LINUX_HDRNEWLEN
;
293 if (caplen
< ARC_LINUX_HDRNEWLEN
|| length
< ARC_LINUX_HDRNEWLEN
) {
294 ND_PRINT("[|arcnet]");
299 case ARCTYPE_ARP_OLD
:
300 case ARCTYPE_DIAGNOSE
:
301 archdrlen
= ARC_LINUX_HDRLEN
;
306 arcnet_print(ndo
, p
, length
, 0, 0, 0);
309 * Go past the ARCNET header.
315 if (!arcnet_encap_print(ndo
, arc_type
, p
, length
, caplen
))
316 ND_DEFAULTPRINT(p
, caplen
);
322 * Prints the packet encapsulated in an ARCnet data field,
323 * given the ARCnet system code.
325 * Returns non-zero if it can do so, zero if the system code is unknown.
330 arcnet_encap_print(netdissect_options
*ndo
, u_char arctype
, const u_char
*p
,
331 u_int length
, u_int caplen
)
337 ip_print(ndo
, p
, length
);
341 ip6_print(ndo
, p
, length
);
344 case ARCTYPE_ARP_OLD
:
347 arp_print(ndo
, p
, length
, caplen
);
350 case ARCTYPE_ATALK
: /* XXX was this ever used? */
353 atalk_print(ndo
, p
, length
);
357 ipx_print(ndo
, p
, length
);