]> The Tcpdump Group git mirrors - tcpdump/blob - util-print.c
Rename 'tcpdump-stdinc.h' to 'netdissect-stdinc.h'
[tcpdump] / util-print.c
1 /*
2 * Copyright (c) 1990, 1991, 1993, 1994, 1995, 1996, 1997
3 * The Regents of the University of California. All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that: (1) source code distributions
7 * retain the above copyright notice and this paragraph in its entirety, (2)
8 * distributions including binary code include the above copyright notice and
9 * this paragraph in its entirety in the documentation or other materials
10 * provided with the distribution, and (3) all advertising materials mentioning
11 * features or use of this software display the following acknowledgement:
12 * ``This product includes software developed by the University of California,
13 * Lawrence Berkeley Laboratory and its contributors.'' Neither the name of
14 * the University nor the names of its contributors may be used to endorse
15 * or promote products derived from this software without specific prior
16 * written permission.
17 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED
18 * WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF
19 * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
20 */
21
22 /*
23 * txtproto_print() derived from original code by Hannes Gredler
24 * (hannes@juniper.net):
25 *
26 * Redistribution and use in source and binary forms, with or without
27 * modification, are permitted provided that: (1) source code
28 * distributions retain the above copyright notice and this paragraph
29 * in its entirety, and (2) distributions including binary code include
30 * the above copyright notice and this paragraph in its entirety in
31 * the documentation or other materials provided with the distribution.
32 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND
33 * WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, WITHOUT
34 * LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
35 * FOR A PARTICULAR PURPOSE.
36 */
37
38 #ifdef HAVE_CONFIG_H
39 #include "config.h"
40 #endif
41
42 #include <netdissect-stdinc.h>
43
44 #include <sys/stat.h>
45
46 #ifdef HAVE_FCNTL_H
47 #include <fcntl.h>
48 #endif
49 #include <stdio.h>
50 #include <stdarg.h>
51 #include <stdlib.h>
52 #include <string.h>
53
54 #include "interface.h"
55 #include "ascii_strcasecmp.h"
56 #include "timeval-operations.h"
57
58 int32_t thiszone; /* seconds offset from gmt to local time */
59
60 /*
61 * timestamp display buffer size, the biggest size of both formats is needed
62 * sizeof("0000000000.000000000") > sizeof("00:00:00.000000000")
63 */
64 #define TS_BUF_SIZE sizeof("0000000000.000000000")
65
66 #define TOKBUFSIZE 128
67
68 /*
69 * Print out a null-terminated filename (or other ascii string).
70 * If ep is NULL, assume no truncation check is needed.
71 * Return true if truncated.
72 * Stop at ep (if given) or before the null char, whichever is first.
73 */
74 int
75 fn_print(netdissect_options *ndo,
76 register const u_char *s, register const u_char *ep)
77 {
78 register int ret;
79 register u_char c;
80
81 ret = 1; /* assume truncated */
82 while (ep == NULL || s < ep) {
83 c = *s++;
84 if (c == '\0') {
85 ret = 0;
86 break;
87 }
88 if (!ND_ISASCII(c)) {
89 c = ND_TOASCII(c);
90 ND_PRINT((ndo, "M-"));
91 }
92 if (!ND_ISPRINT(c)) {
93 c ^= 0x40; /* DEL to ?, others to alpha */
94 ND_PRINT((ndo, "^"));
95 }
96 ND_PRINT((ndo, "%c", c));
97 }
98 return(ret);
99 }
100
101 /*
102 * Print out a counted filename (or other ascii string).
103 * If ep is NULL, assume no truncation check is needed.
104 * Return true if truncated.
105 * Stop at ep (if given) or after n bytes, whichever is first.
106 */
107 int
108 fn_printn(netdissect_options *ndo,
109 register const u_char *s, register u_int n, register const u_char *ep)
110 {
111 register u_char c;
112
113 while (n > 0 && (ep == NULL || s < ep)) {
114 n--;
115 c = *s++;
116 if (!ND_ISASCII(c)) {
117 c = ND_TOASCII(c);
118 ND_PRINT((ndo, "M-"));
119 }
120 if (!ND_ISPRINT(c)) {
121 c ^= 0x40; /* DEL to ?, others to alpha */
122 ND_PRINT((ndo, "^"));
123 }
124 ND_PRINT((ndo, "%c", c));
125 }
126 return (n == 0) ? 0 : 1;
127 }
128
129 /*
130 * Print out a null-padded filename (or other ascii string).
131 * If ep is NULL, assume no truncation check is needed.
132 * Return true if truncated.
133 * Stop at ep (if given) or after n bytes or before the null char,
134 * whichever is first.
135 */
136 int
137 fn_printzp(netdissect_options *ndo,
138 register const u_char *s, register u_int n,
139 register const u_char *ep)
140 {
141 register int ret;
142 register u_char c;
143
144 ret = 1; /* assume truncated */
145 while (n > 0 && (ep == NULL || s < ep)) {
146 n--;
147 c = *s++;
148 if (c == '\0') {
149 ret = 0;
150 break;
151 }
152 if (!ND_ISASCII(c)) {
153 c = ND_TOASCII(c);
154 ND_PRINT((ndo, "M-"));
155 }
156 if (!ND_ISPRINT(c)) {
157 c ^= 0x40; /* DEL to ?, others to alpha */
158 ND_PRINT((ndo, "^"));
159 }
160 ND_PRINT((ndo, "%c", c));
161 }
162 return (n == 0) ? 0 : ret;
163 }
164
165 /*
166 * Format the timestamp
167 */
168 static char *
169 ts_format(netdissect_options *ndo
170 #ifndef HAVE_PCAP_SET_TSTAMP_PRECISION
171 _U_
172 #endif
173 , int sec, int usec, char *buf)
174 {
175 const char *format;
176
177 #ifdef HAVE_PCAP_SET_TSTAMP_PRECISION
178 switch (ndo->ndo_tstamp_precision) {
179
180 case PCAP_TSTAMP_PRECISION_MICRO:
181 format = "%02d:%02d:%02d.%06u";
182 break;
183
184 case PCAP_TSTAMP_PRECISION_NANO:
185 format = "%02d:%02d:%02d.%09u";
186 break;
187
188 default:
189 format = "%02d:%02d:%02d.{unknown}";
190 break;
191 }
192 #else
193 format = "%02d:%02d:%02d.%06u";
194 #endif
195
196 snprintf(buf, TS_BUF_SIZE, format,
197 sec / 3600, (sec % 3600) / 60, sec % 60, usec);
198
199 return buf;
200 }
201
202 /*
203 * Format the timestamp - Unix timeval style
204 */
205 static char *
206 ts_unix_format(netdissect_options *ndo
207 #ifndef HAVE_PCAP_SET_TSTAMP_PRECISION
208 _U_
209 #endif
210 , int sec, int usec, char *buf)
211 {
212 const char *format;
213
214 #ifdef HAVE_PCAP_SET_TSTAMP_PRECISION
215 switch (ndo->ndo_tstamp_precision) {
216
217 case PCAP_TSTAMP_PRECISION_MICRO:
218 format = "%u.%06u";
219 break;
220
221 case PCAP_TSTAMP_PRECISION_NANO:
222 format = "%u.%09u";
223 break;
224
225 default:
226 format = "%u.{unknown}";
227 break;
228 }
229 #else
230 format = "%u.%06u";
231 #endif
232
233 snprintf(buf, TS_BUF_SIZE, format,
234 (unsigned)sec, (unsigned)usec);
235
236 return buf;
237 }
238
239 /*
240 * Print the timestamp
241 */
242 void
243 ts_print(netdissect_options *ndo,
244 register const struct timeval *tvp)
245 {
246 register int s;
247 struct tm *tm;
248 time_t Time;
249 char buf[TS_BUF_SIZE];
250 static struct timeval tv_ref;
251 struct timeval tv_result;
252 int negative_offset;
253 int nano_prec;
254
255 switch (ndo->ndo_tflag) {
256
257 case 0: /* Default */
258 s = (tvp->tv_sec + thiszone) % 86400;
259 ND_PRINT((ndo, "%s ", ts_format(ndo, s, tvp->tv_usec, buf)));
260 break;
261
262 case 1: /* No time stamp */
263 break;
264
265 case 2: /* Unix timeval style */
266 ND_PRINT((ndo, "%s ", ts_unix_format(ndo,
267 tvp->tv_sec, tvp->tv_usec, buf)));
268 break;
269
270 case 3: /* Microseconds/nanoseconds since previous packet */
271 case 5: /* Microseconds/nanoseconds since first packet */
272 #ifdef HAVE_PCAP_SET_TSTAMP_PRECISION
273 switch (ndo->ndo_tstamp_precision) {
274 case PCAP_TSTAMP_PRECISION_MICRO:
275 nano_prec = 0;
276 break;
277 case PCAP_TSTAMP_PRECISION_NANO:
278 nano_prec = 1;
279 break;
280 default:
281 nano_prec = 0;
282 break;
283 }
284 #else
285 nano_prec = 0;
286 #endif
287 if (!(netdissect_timevalisset(&tv_ref)))
288 tv_ref = *tvp; /* set timestamp for first packet */
289
290 negative_offset = netdissect_timevalcmp(tvp, &tv_ref, <);
291 if (negative_offset)
292 netdissect_timevalsub(&tv_ref, tvp, &tv_result, nano_prec);
293 else
294 netdissect_timevalsub(tvp, &tv_ref, &tv_result, nano_prec);
295
296 ND_PRINT((ndo, (negative_offset ? "-" : " ")));
297
298 ND_PRINT((ndo, "%s ", ts_format(ndo,
299 tv_result.tv_sec, tv_result.tv_usec, buf)));
300
301 if (ndo->ndo_tflag == 3)
302 tv_ref = *tvp; /* set timestamp for previous packet */
303 break;
304
305 case 4: /* Default + Date */
306 s = (tvp->tv_sec + thiszone) % 86400;
307 Time = (tvp->tv_sec + thiszone) - s;
308 tm = gmtime (&Time);
309 if (!tm)
310 ND_PRINT((ndo, "Date fail "));
311 else
312 ND_PRINT((ndo, "%04d-%02d-%02d %s ",
313 tm->tm_year+1900, tm->tm_mon+1, tm->tm_mday,
314 ts_format(ndo, s, tvp->tv_usec, buf)));
315 break;
316 }
317 }
318
319 /*
320 * Print a relative number of seconds (e.g. hold time, prune timer)
321 * in the form 5m1s. This does no truncation, so 32230861 seconds
322 * is represented as 1y1w1d1h1m1s.
323 */
324 void
325 relts_print(netdissect_options *ndo,
326 int secs)
327 {
328 static const char *lengths[] = {"y", "w", "d", "h", "m", "s"};
329 static const int seconds[] = {31536000, 604800, 86400, 3600, 60, 1};
330 const char **l = lengths;
331 const int *s = seconds;
332
333 if (secs == 0) {
334 ND_PRINT((ndo, "0s"));
335 return;
336 }
337 if (secs < 0) {
338 ND_PRINT((ndo, "-"));
339 secs = -secs;
340 }
341 while (secs > 0) {
342 if (secs >= *s) {
343 ND_PRINT((ndo, "%d%s", secs / *s, *l));
344 secs -= (secs / *s) * *s;
345 }
346 s++;
347 l++;
348 }
349 }
350
351 /*
352 * this is a generic routine for printing unknown data;
353 * we pass on the linefeed plus indentation string to
354 * get a proper output - returns 0 on error
355 */
356
357 int
358 print_unknown_data(netdissect_options *ndo, const u_char *cp,const char *ident,int len)
359 {
360 if (len < 0) {
361 ND_PRINT((ndo,"%sDissector error: print_unknown_data called with negative length",
362 ident));
363 return(0);
364 }
365 if (ndo->ndo_snapend - cp < len)
366 len = ndo->ndo_snapend - cp;
367 if (len < 0) {
368 ND_PRINT((ndo,"%sDissector error: print_unknown_data called with pointer past end of packet",
369 ident));
370 return(0);
371 }
372 hex_print(ndo, ident,cp,len);
373 return(1); /* everything is ok */
374 }
375
376 /*
377 * Convert a token value to a string; use "fmt" if not found.
378 */
379 const char *
380 tok2strbuf(register const struct tok *lp, register const char *fmt,
381 register u_int v, char *buf, size_t bufsize)
382 {
383 if (lp != NULL) {
384 while (lp->s != NULL) {
385 if (lp->v == v)
386 return (lp->s);
387 ++lp;
388 }
389 }
390 if (fmt == NULL)
391 fmt = "#%d";
392
393 (void)snprintf(buf, bufsize, fmt, v);
394 return (const char *)buf;
395 }
396
397 /*
398 * Convert a token value to a string; use "fmt" if not found.
399 */
400 const char *
401 tok2str(register const struct tok *lp, register const char *fmt,
402 register u_int v)
403 {
404 static char buf[4][TOKBUFSIZE];
405 static int idx = 0;
406 char *ret;
407
408 ret = buf[idx];
409 idx = (idx+1) & 3;
410 return tok2strbuf(lp, fmt, v, ret, sizeof(buf[0]));
411 }
412
413 /*
414 * Convert a bit token value to a string; use "fmt" if not found.
415 * this is useful for parsing bitfields, the output strings are seperated
416 * if the s field is positive.
417 */
418 static char *
419 bittok2str_internal(register const struct tok *lp, register const char *fmt,
420 register u_int v, const char *sep)
421 {
422 static char buf[256]; /* our stringbuffer */
423 int buflen=0;
424 register u_int rotbit; /* this is the bit we rotate through all bitpositions */
425 register u_int tokval;
426 const char * sepstr = "";
427
428 while (lp != NULL && lp->s != NULL) {
429 tokval=lp->v; /* load our first value */
430 rotbit=1;
431 while (rotbit != 0) {
432 /*
433 * lets AND the rotating bit with our token value
434 * and see if we have got a match
435 */
436 if (tokval == (v&rotbit)) {
437 /* ok we have found something */
438 buflen+=snprintf(buf+buflen, sizeof(buf)-buflen, "%s%s",
439 sepstr, lp->s);
440 sepstr = sep;
441 break;
442 }
443 rotbit=rotbit<<1; /* no match - lets shift and try again */
444 }
445 lp++;
446 }
447
448 if (buflen == 0)
449 /* bummer - lets print the "unknown" message as advised in the fmt string if we got one */
450 (void)snprintf(buf, sizeof(buf), fmt == NULL ? "#%08x" : fmt, v);
451 return (buf);
452 }
453
454 /*
455 * Convert a bit token value to a string; use "fmt" if not found.
456 * this is useful for parsing bitfields, the output strings are not seperated.
457 */
458 char *
459 bittok2str_nosep(register const struct tok *lp, register const char *fmt,
460 register u_int v)
461 {
462 return (bittok2str_internal(lp, fmt, v, ""));
463 }
464
465 /*
466 * Convert a bit token value to a string; use "fmt" if not found.
467 * this is useful for parsing bitfields, the output strings are comma seperated.
468 */
469 char *
470 bittok2str(register const struct tok *lp, register const char *fmt,
471 register u_int v)
472 {
473 return (bittok2str_internal(lp, fmt, v, ", "));
474 }
475
476 /*
477 * Convert a value to a string using an array; the macro
478 * tok2strary() in <interface.h> is the public interface to
479 * this function and ensures that the second argument is
480 * correct for bounds-checking.
481 */
482 const char *
483 tok2strary_internal(register const char **lp, int n, register const char *fmt,
484 register int v)
485 {
486 static char buf[TOKBUFSIZE];
487
488 if (v >= 0 && v < n && lp[v] != NULL)
489 return lp[v];
490 if (fmt == NULL)
491 fmt = "#%d";
492 (void)snprintf(buf, sizeof(buf), fmt, v);
493 return (buf);
494 }
495
496 /*
497 * Convert a 32-bit netmask to prefixlen if possible
498 * the function returns the prefix-len; if plen == -1
499 * then conversion was not possible;
500 */
501
502 int
503 mask2plen(uint32_t mask)
504 {
505 uint32_t bitmasks[33] = {
506 0x00000000,
507 0x80000000, 0xc0000000, 0xe0000000, 0xf0000000,
508 0xf8000000, 0xfc000000, 0xfe000000, 0xff000000,
509 0xff800000, 0xffc00000, 0xffe00000, 0xfff00000,
510 0xfff80000, 0xfffc0000, 0xfffe0000, 0xffff0000,
511 0xffff8000, 0xffffc000, 0xffffe000, 0xfffff000,
512 0xfffff800, 0xfffffc00, 0xfffffe00, 0xffffff00,
513 0xffffff80, 0xffffffc0, 0xffffffe0, 0xfffffff0,
514 0xfffffff8, 0xfffffffc, 0xfffffffe, 0xffffffff
515 };
516 int prefix_len = 32;
517
518 /* let's see if we can transform the mask into a prefixlen */
519 while (prefix_len >= 0) {
520 if (bitmasks[prefix_len] == mask)
521 break;
522 prefix_len--;
523 }
524 return (prefix_len);
525 }
526
527 #ifdef INET6
528 int
529 mask62plen(const u_char *mask)
530 {
531 u_char bitmasks[9] = {
532 0x00,
533 0x80, 0xc0, 0xe0, 0xf0,
534 0xf8, 0xfc, 0xfe, 0xff
535 };
536 int byte;
537 int cidr_len = 0;
538
539 for (byte = 0; byte < 16; byte++) {
540 u_int bits;
541
542 for (bits = 0; bits < (sizeof (bitmasks) / sizeof (bitmasks[0])); bits++) {
543 if (mask[byte] == bitmasks[bits]) {
544 cidr_len += bits;
545 break;
546 }
547 }
548
549 if (mask[byte] != 0xff)
550 break;
551 }
552 return (cidr_len);
553 }
554 #endif /* INET6 */
555
556 /*
557 * Routine to print out information for text-based protocols such as FTP,
558 * HTTP, SMTP, RTSP, SIP, ....
559 */
560 #define MAX_TOKEN 128
561
562 /*
563 * Fetch a token from a packet, starting at the specified index,
564 * and return the length of the token.
565 *
566 * Returns 0 on error; yes, this is indistinguishable from an empty
567 * token, but an "empty token" isn't a valid token - it just means
568 * either a space character at the beginning of the line (this
569 * includes a blank line) or no more tokens remaining on the line.
570 */
571 static int
572 fetch_token(netdissect_options *ndo, const u_char *pptr, u_int idx, u_int len,
573 u_char *tbuf, size_t tbuflen)
574 {
575 size_t toklen = 0;
576
577 for (; idx < len; idx++) {
578 if (!ND_TTEST(*(pptr + idx))) {
579 /* ran past end of captured data */
580 return (0);
581 }
582 if (!isascii(*(pptr + idx))) {
583 /* not an ASCII character */
584 return (0);
585 }
586 if (isspace(*(pptr + idx))) {
587 /* end of token */
588 break;
589 }
590 if (!isprint(*(pptr + idx))) {
591 /* not part of a command token or response code */
592 return (0);
593 }
594 if (toklen + 2 > tbuflen) {
595 /* no room for this character and terminating '\0' */
596 return (0);
597 }
598 tbuf[toklen] = *(pptr + idx);
599 toklen++;
600 }
601 if (toklen == 0) {
602 /* no token */
603 return (0);
604 }
605 tbuf[toklen] = '\0';
606
607 /*
608 * Skip past any white space after the token, until we see
609 * an end-of-line (CR or LF).
610 */
611 for (; idx < len; idx++) {
612 if (!ND_TTEST(*(pptr + idx))) {
613 /* ran past end of captured data */
614 break;
615 }
616 if (*(pptr + idx) == '\r' || *(pptr + idx) == '\n') {
617 /* end of line */
618 break;
619 }
620 if (!isascii(*(pptr + idx)) || !isprint(*(pptr + idx))) {
621 /* not a printable ASCII character */
622 break;
623 }
624 if (!isspace(*(pptr + idx))) {
625 /* beginning of next token */
626 break;
627 }
628 }
629 return (idx);
630 }
631
632 /*
633 * Scan a buffer looking for a line ending - LF or CR-LF.
634 * Return the index of the character after the line ending or 0 if
635 * we encounter a non-ASCII or non-printable character or don't find
636 * the line ending.
637 */
638 static u_int
639 print_txt_line(netdissect_options *ndo, const char *protoname,
640 const char *prefix, const u_char *pptr, u_int idx, u_int len)
641 {
642 u_int startidx;
643 u_int linelen;
644
645 startidx = idx;
646 while (idx < len) {
647 ND_TCHECK(*(pptr+idx));
648 if (*(pptr+idx) == '\n') {
649 /*
650 * LF without CR; end of line.
651 * Skip the LF and print the line, with the
652 * exception of the LF.
653 */
654 linelen = idx - startidx;
655 idx++;
656 goto print;
657 } else if (*(pptr+idx) == '\r') {
658 /* CR - any LF? */
659 if ((idx+1) >= len) {
660 /* not in this packet */
661 return (0);
662 }
663 ND_TCHECK(*(pptr+idx+1));
664 if (*(pptr+idx+1) == '\n') {
665 /*
666 * CR-LF; end of line.
667 * Skip the CR-LF and print the line, with
668 * the exception of the CR-LF.
669 */
670 linelen = idx - startidx;
671 idx += 2;
672 goto print;
673 }
674
675 /*
676 * CR followed by something else; treat this
677 * as if it were binary data, and don't print
678 * it.
679 */
680 return (0);
681 } else if (!isascii(*(pptr+idx)) ||
682 (!isprint(*(pptr+idx)) && *(pptr+idx) != '\t')) {
683 /*
684 * Not a printable ASCII character and not a tab;
685 * treat this as if it were binary data, and
686 * don't print it.
687 */
688 return (0);
689 }
690 idx++;
691 }
692
693 /*
694 * All printable ASCII, but no line ending after that point
695 * in the buffer; treat this as if it were truncated.
696 */
697 trunc:
698 linelen = idx - startidx;
699 ND_PRINT((ndo, "%s%.*s[!%s]", prefix, (int)linelen, pptr + startidx,
700 protoname));
701 return (0);
702
703 print:
704 ND_PRINT((ndo, "%s%.*s", prefix, (int)linelen, pptr + startidx));
705 return (idx);
706 }
707
708 void
709 txtproto_print(netdissect_options *ndo, const u_char *pptr, u_int len,
710 const char *protoname, const char **cmds, u_int flags)
711 {
712 u_int idx, eol;
713 u_char token[MAX_TOKEN+1];
714 const char *cmd;
715 int is_reqresp = 0;
716 const char *pnp;
717
718 if (cmds != NULL) {
719 /*
720 * This protocol has more than just request and
721 * response lines; see whether this looks like a
722 * request or response.
723 */
724 idx = fetch_token(ndo, pptr, 0, len, token, sizeof(token));
725 if (idx != 0) {
726 /* Is this a valid request name? */
727 while ((cmd = *cmds++) != NULL) {
728 if (ascii_strcasecmp((const char *)token, cmd) == 0) {
729 /* Yes. */
730 is_reqresp = 1;
731 break;
732 }
733 }
734
735 /*
736 * No - is this a valid response code (3 digits)?
737 *
738 * Is this token the response code, or is the next
739 * token the response code?
740 */
741 if (flags & RESP_CODE_SECOND_TOKEN) {
742 /*
743 * Next token - get it.
744 */
745 idx = fetch_token(ndo, pptr, idx, len, token,
746 sizeof(token));
747 }
748 if (idx != 0) {
749 if (isdigit(token[0]) && isdigit(token[1]) &&
750 isdigit(token[2]) && token[3] == '\0') {
751 /* Yes. */
752 is_reqresp = 1;
753 }
754 }
755 }
756 } else {
757 /*
758 * This protocol has only request and response lines
759 * (e.g., FTP, where all the data goes over a
760 * different connection); assume the payload is
761 * a request or response.
762 */
763 is_reqresp = 1;
764 }
765
766 /* Capitalize the protocol name */
767 for (pnp = protoname; *pnp != '\0'; pnp++)
768 ND_PRINT((ndo, "%c", toupper(*pnp)));
769
770 if (is_reqresp) {
771 /*
772 * In non-verbose mode, just print the protocol, followed
773 * by the first line as the request or response info.
774 *
775 * In verbose mode, print lines as text until we run out
776 * of characters or see something that's not a
777 * printable-ASCII line.
778 */
779 if (ndo->ndo_vflag) {
780 /*
781 * We're going to print all the text lines in the
782 * request or response; just print the length
783 * on the first line of the output.
784 */
785 ND_PRINT((ndo, ", length: %u", len));
786 for (idx = 0;
787 idx < len && (eol = print_txt_line(ndo, protoname, "\n\t", pptr, idx, len)) != 0;
788 idx = eol)
789 ;
790 } else {
791 /*
792 * Just print the first text line.
793 */
794 print_txt_line(ndo, protoname, ": ", pptr, 0, len);
795 }
796 }
797 }
798
799 void
800 safeputs(netdissect_options *ndo,
801 const u_char *s, const u_int maxlen)
802 {
803 u_int idx = 0;
804
805 while (*s && idx < maxlen) {
806 safeputchar(ndo, *s);
807 idx++;
808 s++;
809 }
810 }
811
812 void
813 safeputchar(netdissect_options *ndo,
814 const u_char c)
815 {
816 ND_PRINT((ndo, (c < 0x80 && ND_ISPRINT(c)) ? "%c" : "\\0x%02x", c));
817 }
818
819 #ifdef LBL_ALIGN
820 /*
821 * Some compilers try to optimize memcpy(), using the alignment constraint
822 * on the argument pointer type. by using this function, we try to avoid the
823 * optimization.
824 */
825 void
826 unaligned_memcpy(void *p, const void *q, size_t l)
827 {
828 memcpy(p, q, l);
829 }
830
831 /* As with memcpy(), so with memcmp(). */
832 int
833 unaligned_memcmp(const void *p, const void *q, size_t l)
834 {
835 return (memcmp(p, q, l));
836 }
837 #endif
838