2 * Copyright (c) 1988-1997
3 * The Regents of the University of California. All rights reserved.
5 * Copyright (c) 1998-2012 Michael Richardson <mcr@tcpdump.org>
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that: (1) source code distributions
10 * retain the above copyright notice and this paragraph in its entirety, (2)
11 * distributions including binary code include the above copyright notice and
12 * this paragraph in its entirety in the documentation or other materials
13 * provided with the distribution, and (3) all advertising materials mentioning
14 * features or use of this software display the following acknowledgement:
15 * ``This product includes software developed by the University of California,
16 * Lawrence Berkeley Laboratory and its contributors.'' Neither the name of
17 * the University nor the names of its contributors may be used to endorse
18 * or promote products derived from this software without specific prior
20 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED
21 * WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF
22 * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
27 #include "netdissect-stdinc.h"
28 #include "netdissect.h"
38 #include "diag-control.h"
42 * Initialize anything that must be initialized before dissecting
45 * This should be called at the beginning of the program; it does
46 * not need to be called, and should not be called, for every
47 * netdissect_options structure.
50 nd_init(char *errbuf
, size_t errbuf_size
)
53 WORD wVersionRequested
;
58 * Request Winsock 2.2; we expect Winsock 2.
60 wVersionRequested
= MAKEWORD(2, 2);
61 err
= WSAStartup(wVersionRequested
, &wsaData
);
63 strlcpy(errbuf
, "Attempting to initialize Winsock failed",
71 * XXX - should we just fail if this fails? Some of the
72 * libsmi calls may fail.
78 * Clears the error buffer, and uses it so we don't get
79 * "unused argument" warnings at compile time.
81 strlcpy(errbuf
, "", errbuf_size
);
86 * Clean up anything that nd_init() did.
93 * This appears, in libsmi 0.4.8, to do nothing if smiInit()
94 * wasn't done or failed, so we call it unconditionally.
101 * Undo the WSAStartup() call above.
108 nd_have_smi_support(void)
118 * Indicates whether an SMI module has been loaded, so that we can use
119 * libsmi to translate OIDs.
121 int nd_smi_module_loaded
;
124 nd_load_smi_module(const char *module
, char *errbuf
, size_t errbuf_size
)
127 if (smiLoadModule(module
) == 0) {
128 snprintf(errbuf
, errbuf_size
, "could not load MIB module %s",
132 nd_smi_module_loaded
= 1;
135 snprintf(errbuf
, errbuf_size
, "MIB module %s not loaded: no libsmi support",
142 nd_smi_version_string(void)
145 return (smi_version_string
);
153 nd_push_buffer(netdissect_options
*ndo
, u_char
*new_buffer
,
154 const u_char
*new_packetp
, const u_int newlen
)
156 struct netdissect_saved_packet_info
*ndspi
;
158 ndspi
= (struct netdissect_saved_packet_info
*)malloc(sizeof(struct netdissect_saved_packet_info
));
160 return (0); /* fail */
161 ndspi
->ndspi_buffer
= new_buffer
;
162 ndspi
->ndspi_packetp
= ndo
->ndo_packetp
;
163 ndspi
->ndspi_snapend
= ndo
->ndo_snapend
;
164 ndspi
->ndspi_prev
= ndo
->ndo_packet_info_stack
;
166 ndo
->ndo_packetp
= new_packetp
;
167 ndo
->ndo_snapend
= new_packetp
+ newlen
;
168 ndo
->ndo_packet_info_stack
= ndspi
;
170 return (1); /* success */
175 * In a given netdissect_options structure:
177 * push the current packet information onto the packet information
180 * given a pointer into the packet and a length past that point in
181 * the packet, calculate a new snapshot end that's at the lower
182 * of the current snapshot end and that point in the packet;
184 * set the snapshot end to that new value.
187 nd_push_snaplen(netdissect_options
*ndo
, const u_char
*bp
, const u_int newlen
)
189 struct netdissect_saved_packet_info
*ndspi
;
190 u_int snaplen_remaining
;
192 ndspi
= (struct netdissect_saved_packet_info
*)malloc(sizeof(struct netdissect_saved_packet_info
));
194 return (0); /* fail */
195 ndspi
->ndspi_buffer
= NULL
; /* no new buffer */
196 ndspi
->ndspi_packetp
= ndo
->ndo_packetp
;
197 ndspi
->ndspi_snapend
= ndo
->ndo_snapend
;
198 ndspi
->ndspi_prev
= ndo
->ndo_packet_info_stack
;
201 * Push the saved previous data onto the stack.
203 ndo
->ndo_packet_info_stack
= ndspi
;
206 * Find out how many bytes remain after the current snapend.
208 * We're restricted to packets with at most UINT_MAX bytes;
209 * cast the result to u_int, so that we don't get truncation
210 * warnings on LP64 and LLP64 platforms. (ptrdiff_t is
211 * signed and we want an unsigned difference; the pointer
212 * should at most be equal to snapend, and must *never*
215 snaplen_remaining
= (u_int
)(ndo
->ndo_snapend
- bp
);
218 * If the new snapend is smaller than the one calculated
219 * above, set the snapend to that value, otherwise leave
222 if (newlen
<= snaplen_remaining
) {
223 /* Snapend isn't past the previous snapend */
224 ndo
->ndo_snapend
= bp
+ newlen
;
227 return (1); /* success */
231 * In a given netdissect_options structure:
233 * given a pointer into the packet and a length past that point in
234 * the packet, calculate a new snapshot end that's at the lower
235 * of the previous snapshot end - or, if there is no previous
236 * snapshot end, the current snapshot end - and that point in the
239 * set the snapshot end to that new value.
241 * This is to change the current snapshot end. This may increase the
242 * snapshot end, as it may be used, for example, for a Jumbo Payload
243 * option in IPv6. It must not increase it past the snapshot length
244 * atop which the current one was pushed, however.
247 nd_change_snaplen(netdissect_options
*ndo
, const u_char
*bp
, const u_int newlen
)
249 struct netdissect_saved_packet_info
*ndspi
;
250 const u_char
*previous_snapend
;
251 u_int snaplen_remaining
;
253 ndspi
= ndo
->ndo_packet_info_stack
;
254 if (ndspi
->ndspi_prev
!= NULL
)
255 previous_snapend
= ndspi
->ndspi_prev
->ndspi_snapend
;
257 previous_snapend
= ndo
->ndo_snapend
;
260 * Find out how many bytes remain after the previous
261 * snapend - or, if there is no previous snapend, after
262 * the current snapend.
264 * We're restricted to packets with at most UINT_MAX bytes;
265 * cast the result to u_int, so that we don't get truncation
266 * warnings on LP64 and LLP64 platforms. (ptrdiff_t is
267 * signed and we want an unsigned difference; the pointer
268 * should at most be equal to snapend, and must *never*
271 snaplen_remaining
= (u_int
)(previous_snapend
- bp
);
274 * If the new snapend is smaller than the one calculated
275 * above, set the snapend to that value, otherwise leave
278 if (newlen
<= snaplen_remaining
) {
279 /* Snapend isn't past the previous snapend */
280 ndo
->ndo_snapend
= bp
+ newlen
;
285 nd_pop_packet_info(netdissect_options
*ndo
)
287 struct netdissect_saved_packet_info
*ndspi
;
289 ndspi
= ndo
->ndo_packet_info_stack
;
290 ndo
->ndo_packetp
= ndspi
->ndspi_packetp
;
291 ndo
->ndo_snapend
= ndspi
->ndspi_snapend
;
292 ndo
->ndo_packet_info_stack
= ndspi
->ndspi_prev
;
294 free(ndspi
->ndspi_buffer
);
299 nd_pop_all_packet_info(netdissect_options
*ndo
)
301 while (ndo
->ndo_packet_info_stack
!= NULL
)
302 nd_pop_packet_info(ndo
);
306 nd_trunc_longjmp(netdissect_options
*ndo
)
308 longjmp(ndo
->ndo_early_end
, ND_TRUNCATED
);
311 * In AIX <setjmp.h> decorates longjmp() with "#pragma leaves", which tells
312 * XL C that the function is noreturn, but GCC remains unaware of that and
313 * yields a "'noreturn' function does return" warning.