]>
The Tcpdump Group git mirrors - tcpdump/blob - print-sl.c
2 * Copyright (c) 1989, 1990, 1991, 1993, 1994, 1995, 1996, 1997
3 * The Regents of the University of California. All rights reserved.
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that: (1) source code distributions
7 * retain the above copyright notice and this paragraph in its entirety, (2)
8 * distributions including binary code include the above copyright notice and
9 * this paragraph in its entirety in the documentation or other materials
10 * provided with the distribution, and (3) all advertising materials mentioning
11 * features or use of this software display the following acknowledgement:
12 * ``This product includes software developed by the University of California,
13 * Lawrence Berkeley Laboratory and its contributors.'' Neither the name of
14 * the University nor the names of its contributors may be used to endorse
15 * or promote products derived from this software without specific prior
17 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED
18 * WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF
19 * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
22 /* \summary: Compressed Serial Line Internet Protocol printer */
28 #include "netdissect-stdinc.h"
30 #include "netdissect.h"
35 #include "slcompress.h"
38 * definitions of the pseudo- link-level header attached to slip
39 * packets grabbed by the packet filter (bpf) traffic monitor.
41 #define SLIP_HDRLEN 16
50 static const char tstr
[] = "[|slip]";
52 static u_int lastlen
[2][256];
53 static u_int lastconn
= 255;
55 static void sliplink_print(netdissect_options
*, const u_char
*, const struct ip
*, u_int
);
56 static void compressed_sl_print(netdissect_options
*, const u_char
*, const struct ip
*, u_int
, int);
59 sl_if_print(netdissect_options
*ndo
,
60 const struct pcap_pkthdr
*h
, const u_char
*p
)
62 u_int caplen
= h
->caplen
;
63 u_int length
= h
->len
;
66 ndo
->ndo_protocol
= "sl_if";
67 if (caplen
< SLIP_HDRLEN
|| length
< SLIP_HDRLEN
) {
72 caplen
-= SLIP_HDRLEN
;
73 length
-= SLIP_HDRLEN
;
75 ip
= (const struct ip
*)(p
+ SLIP_HDRLEN
);
78 sliplink_print(ndo
, p
, ip
, length
);
80 if (caplen
< 1 || length
< 1) {
82 return (caplen
+ SLIP_HDRLEN
);
87 ip_print(ndo
, (const u_char
*)ip
, length
);
90 ip6_print(ndo
, (const u_char
*)ip
, length
);
93 ND_PRINT("ip v%u", IP_V(ip
));
100 sl_bsdos_if_print(netdissect_options
*ndo
,
101 const struct pcap_pkthdr
*h
, const u_char
*p
)
103 u_int caplen
= h
->caplen
;
104 u_int length
= h
->len
;
107 ndo
->ndo_protocol
= "sl_bsdos_if";
108 if (caplen
< SLIP_HDRLEN
) {
109 ND_PRINT("%s", tstr
);
113 length
-= SLIP_HDRLEN
;
115 ip
= (const struct ip
*)(p
+ SLIP_HDRLEN
);
119 sliplink_print(ndo
, p
, ip
, length
);
122 ip_print(ndo
, (const u_char
*)ip
, length
);
124 return (SLIP_HDRLEN
);
128 sliplink_print(netdissect_options
*ndo
,
129 const u_char
*p
, const struct ip
*ip
,
135 dir
= EXTRACT_U_1(p
+ SLX_DIR
);
147 ND_PRINT("Invalid direction %d ", dir
);
151 if (ndo
->ndo_nflag
) {
152 /* XXX just dump the header */
155 for (i
= SLX_CHDR
; i
< SLX_CHDR
+ CHDR_LEN
- 1; ++i
)
156 ND_PRINT("%02x.", EXTRACT_U_1(p
+ i
));
157 ND_PRINT("%02x: ", EXTRACT_U_1(p
+ SLX_CHDR
+ CHDR_LEN
- 1));
160 switch (EXTRACT_U_1(p
+ SLX_CHDR
) & 0xf0) {
163 ND_PRINT("ip %u: ", length
+ SLIP_HDRLEN
);
166 case TYPE_UNCOMPRESSED_TCP
:
168 * The connection id is stored in the IP protocol field.
169 * Get it from the link layer since sl_uncompress_tcp()
170 * has restored the IP header copy to IPPROTO_TCP.
172 lastconn
= EXTRACT_U_1(((const struct ip
*)(p
+ SLX_CHDR
))->ip_p
);
173 ND_PRINT("utcp %u: ", lastconn
);
175 /* Direction is bogus, don't use it */
179 hlen
+= TH_OFF((const struct tcphdr
*)&((const int *)ip
)[hlen
]);
180 lastlen
[dir
][lastconn
] = length
- (hlen
<< 2);
185 /* Direction is bogus, don't use it */
188 if (EXTRACT_U_1(p
+ SLX_CHDR
) & TYPE_COMPRESSED_TCP
) {
189 compressed_sl_print(ndo
, p
+ SLX_CHDR
, ip
,
193 ND_PRINT("slip-%u!: ", EXTRACT_U_1(p
+ SLX_CHDR
));
197 static const u_char
*
198 print_sl_change(netdissect_options
*ndo
,
199 const char *str
, const u_char
*cp
)
203 if ((i
= EXTRACT_U_1(cp
)) == 0) {
205 i
= EXTRACT_BE_U_2(cp
);
208 ND_PRINT(" %s%u", str
, i
);
212 static const u_char
*
213 print_sl_winchange(netdissect_options
*ndo
,
218 if ((i
= EXTRACT_U_1(cp
)) == 0) {
220 i
= EXTRACT_BE_S_2(cp
);
224 ND_PRINT(" W+%d", i
);
231 compressed_sl_print(netdissect_options
*ndo
,
232 const u_char
*chdr
, const struct ip
*ip
,
233 u_int length
, int dir
)
235 const u_char
*cp
= chdr
;
238 flags
= EXTRACT_U_1(cp
);
241 lastconn
= EXTRACT_U_1(cp
);
243 ND_PRINT("ctcp %u", lastconn
);
247 /* skip tcp checksum */
250 switch (flags
& SPECIALS_MASK
) {
252 ND_PRINT(" *SA+%u", lastlen
[dir
][lastconn
]);
256 ND_PRINT(" *S+%u", lastlen
[dir
][lastconn
]);
261 cp
= print_sl_change(ndo
, "U=", cp
);
263 cp
= print_sl_winchange(ndo
, cp
);
265 cp
= print_sl_change(ndo
, "A+", cp
);
267 cp
= print_sl_change(ndo
, "S+", cp
);
271 cp
= print_sl_change(ndo
, "I+", cp
);
274 * 'hlen' is the length of the uncompressed TCP/IP header (in words).
275 * 'cp - chdr' is the length of the compressed header.
276 * 'length - hlen' is the amount of data in the packet.
279 hlen
+= TH_OFF((const struct tcphdr
*)&((const int32_t *)ip
)[hlen
]);
280 lastlen
[dir
][lastconn
] = length
- (hlen
<< 2);
281 ND_PRINT(" %u (%ld)", lastlen
[dir
][lastconn
], (long)(cp
- chdr
));