3 * Fortress Technologies, Inc. All rights reserved.
4 * Charlie Lenahan (clenahan@fortresstech.com)
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that: (1) source code distributions
8 * retain the above copyright notice and this paragraph in its entirety, (2)
9 * distributions including binary code include the above copyright notice and
10 * this paragraph in its entirety in the documentation or other materials
11 * provided with the distribution, and (3) all advertising materials mentioning
12 * features or use of this software display the following acknowledgement:
13 * ``This product includes software developed by the University of California,
14 * Lawrence Berkeley Laboratory and its contributors.'' Neither the name of
15 * the University nor the names of its contributors may be used to endorse
16 * or promote products derived from this software without specific prior
18 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED
19 * WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF
20 * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
24 static const char rcsid
[] _U_
=
25 "@(#) $Header: /tcpdump/master/tcpdump/print-802_11.c,v 1.24 2003-11-16 09:36:11 guy Exp $ (LBL)";
32 #include <tcpdump-stdinc.h>
38 #include "interface.h"
39 #include "addrtoname.h"
40 #include "ethertype.h"
44 #include "ieee802_11.h"
46 #define PRINT_RATES(p) \
49 const char *sep = " ["; \
50 for (z = 0; z < p.rates.length ; z++) { \
51 printf("%s%2.1f", sep, (.5 * (p.rates.rate[z] & 0x7f))); \
52 if (p.rates.rate[z] & 0x80) printf("*"); \
55 if (p.rates.length != 0) \
59 static const char *auth_alg_text
[]={"Open System","Shared Key","EAP"};
60 static const char *subtype_text
[]={
78 static const char *status_text
[] = {
80 "Unspecified failure", /* 1 */
89 "Cannot Support all requested capabilities in the Capability Information field", /* 10 */
90 "Reassociation denied due to inability to confirm that association exists", /* 11 */
91 "Association denied due to reason outside the scope of the standard", /* 12 */
92 "Responding station does not support the specified authentication algorithm ", /* 13 */
93 "Received an Authentication frame with authentication transaction " \
94 "sequence number out of expected sequence", /* 14 */
95 "Authentication rejected because of challenge failure", /* 15 */
96 "Authentication rejected due to timeout waiting for next frame in sequence", /* 16 */
97 "Association denied because AP is unable to handle additional associated stations", /* 17 */
98 "Association denied due to requesting station not supporting all of the " \
99 "data rates in BSSBasicRateSet parameter", /* 18 */
103 static const char *reason_text
[] = {
105 "Unspecified reason", /* 1 */
106 "Previous authentication no longer valid", /* 2 */
107 "Deauthenticated because sending station is leaving (or has left) IBSS or ESS", /* 3 */
108 "Disassociated due to inactivity", /* 4 */
109 "Disassociated because AP is unable to handle all currently associated stations", /* 5 */
110 "Class 2 frame receivedfrom nonauthenticated station", /* 6 */
111 "Class 3 frame received from nonassociated station", /* 7 */
112 "Disassociated because sending station is leaving (or has left) BSS", /* 8 */
113 "Station requesting (re)association is not authenticated with responding station", /* 9 */
118 wep_print(const u_char
*p
)
122 if (!TTEST2(*p
, IEEE802_11_IV_LEN
+ IEEE802_11_KID_LEN
))
124 iv
= EXTRACT_LE_32BITS(p
);
126 printf("Data IV:%3x Pad %x KeyID %x", IV_IV(iv
), IV_PAD(iv
),
133 parse_elements(struct mgmt_body_t
*pbody
, const u_char
*p
, int offset
)
136 if (!TTEST2(*(p
+ offset
), 1))
138 switch (*(p
+ offset
)) {
140 if (!TTEST2(*(p
+ offset
), 2))
142 memcpy(&pbody
->ssid
, p
+ offset
, 2);
144 if (pbody
->ssid
.length
<= 0)
146 if (!TTEST2(*(p
+ offset
), pbody
->ssid
.length
))
148 memcpy(&pbody
->ssid
.ssid
, p
+ offset
,
150 offset
+= pbody
->ssid
.length
;
151 pbody
->ssid
.ssid
[pbody
->ssid
.length
] = '\0';
154 if (!TTEST2(*(p
+ offset
), 2))
156 memcpy(&pbody
->challenge
, p
+ offset
, 2);
158 if (pbody
->challenge
.length
<= 0)
160 if (!TTEST2(*(p
+ offset
), pbody
->challenge
.length
))
162 memcpy(&pbody
->challenge
.text
, p
+ offset
,
163 pbody
->challenge
.length
);
164 offset
+= pbody
->challenge
.length
;
165 pbody
->challenge
.text
[pbody
->challenge
.length
] = '\0';
168 if (!TTEST2(*(p
+ offset
), 2))
170 memcpy(&(pbody
->rates
), p
+ offset
, 2);
172 if (pbody
->rates
.length
<= 0)
174 if (!TTEST2(*(p
+ offset
), pbody
->rates
.length
))
176 memcpy(&pbody
->rates
.rate
, p
+ offset
,
177 pbody
->rates
.length
);
178 offset
+= pbody
->rates
.length
;
181 if (!TTEST2(*(p
+ offset
), 3))
183 memcpy(&pbody
->ds
, p
+ offset
, 3);
187 if (!TTEST2(*(p
+ offset
), 8))
189 memcpy(&pbody
->cf
, p
+ offset
, 8);
193 if (!TTEST2(*(p
+ offset
), 2))
195 memcpy(&pbody
->tim
, p
+ offset
, 2);
197 if (!TTEST2(*(p
+ offset
), 3))
199 memcpy(&pbody
->tim
.count
, p
+ offset
, 3);
202 if (pbody
->tim
.length
<= 3)
204 if (!TTEST2(*(p
+ offset
), pbody
->tim
.length
- 3))
206 memcpy(pbody
->tim
.bitmap
, p
+ (pbody
->tim
.length
- 3),
207 (pbody
->tim
.length
- 3));
208 offset
+= pbody
->tim
.length
- 3;
212 printf("(1) unhandled element_id (%d) ",
215 offset
+= *(p
+ offset
+ 1) + 2;
222 /*********************************************************************************
223 * Print Handle functions for the management frame types
224 *********************************************************************************/
227 handle_beacon(u_int16_t fc
, const u_char
*p
)
229 struct mgmt_body_t pbody
;
232 memset(&pbody
, 0, sizeof(pbody
));
234 if (!TTEST2(*p
, IEEE802_11_TSTAMP_LEN
+ IEEE802_11_BCNINT_LEN
+
235 IEEE802_11_CAPINFO_LEN
))
237 memcpy(&pbody
.timestamp
, p
, 8);
238 offset
+= IEEE802_11_TSTAMP_LEN
;
239 pbody
.beacon_interval
= EXTRACT_LE_16BITS(p
+offset
);
240 offset
+= IEEE802_11_BCNINT_LEN
;
241 pbody
.capability_info
= EXTRACT_LE_16BITS(p
+offset
);
242 offset
+= IEEE802_11_CAPINFO_LEN
;
244 if (!parse_elements(&pbody
, p
, offset
))
247 printf("%s (", subtype_text
[FC_SUBTYPE(fc
)]);
248 fn_print(pbody
.ssid
.ssid
, NULL
);
251 printf(" %s CH: %u%s",
252 CAPABILITY_ESS(pbody
.capability_info
) ? "ESS" : "IBSS",
254 CAPABILITY_PRIVACY(pbody
.capability_info
) ? ", PRIVACY" : "" );
260 handle_assoc_request(u_int16_t fc
, const u_char
*p
)
262 struct mgmt_body_t pbody
;
265 memset(&pbody
, 0, sizeof(pbody
));
267 if (!TTEST2(*p
, IEEE802_11_CAPINFO_LEN
+ IEEE802_11_LISTENINT_LEN
))
269 pbody
.capability_info
= EXTRACT_LE_16BITS(p
);
270 offset
+= IEEE802_11_CAPINFO_LEN
;
271 pbody
.listen_interval
= EXTRACT_LE_16BITS(p
+offset
);
272 offset
+= IEEE802_11_LISTENINT_LEN
;
274 if (!parse_elements(&pbody
, p
, offset
))
277 printf("%s (", subtype_text
[FC_SUBTYPE(fc
)]);
278 fn_print(pbody
.ssid
.ssid
, NULL
);
285 handle_assoc_response(u_int16_t fc
, const u_char
*p
)
287 struct mgmt_body_t pbody
;
290 memset(&pbody
, 0, sizeof(pbody
));
292 if (!TTEST2(*p
, IEEE802_11_CAPINFO_LEN
+ IEEE802_11_STATUS_LEN
+
295 pbody
.capability_info
= EXTRACT_LE_16BITS(p
);
296 offset
+= IEEE802_11_CAPINFO_LEN
;
297 pbody
.status_code
= EXTRACT_LE_16BITS(p
+offset
);
298 offset
+= IEEE802_11_STATUS_LEN
;
299 pbody
.aid
= EXTRACT_LE_16BITS(p
+offset
);
300 offset
+= IEEE802_11_AID_LEN
;
302 if (!parse_elements(&pbody
, p
, offset
))
305 printf("%s AID(%x) :%s: %s", subtype_text
[FC_SUBTYPE(fc
)],
306 ((u_int16_t
)(pbody
.aid
<< 2 )) >> 2 ,
307 CAPABILITY_PRIVACY(pbody
.capability_info
) ? " PRIVACY " : "",
308 (pbody
.status_code
< 19 ? status_text
[pbody
.status_code
] : "n/a"));
314 handle_reassoc_request(u_int16_t fc
, const u_char
*p
)
316 struct mgmt_body_t pbody
;
319 memset(&pbody
, 0, sizeof(pbody
));
321 if (!TTEST2(*p
, IEEE802_11_CAPINFO_LEN
+ IEEE802_11_LISTENINT_LEN
+
324 pbody
.capability_info
= EXTRACT_LE_16BITS(p
);
325 offset
+= IEEE802_11_CAPINFO_LEN
;
326 pbody
.listen_interval
= EXTRACT_LE_16BITS(p
+offset
);
327 offset
+= IEEE802_11_LISTENINT_LEN
;
328 memcpy(&pbody
.ap
, p
+offset
, IEEE802_11_AP_LEN
);
329 offset
+= IEEE802_11_AP_LEN
;
331 if (!parse_elements(&pbody
, p
, offset
))
334 printf("%s (", subtype_text
[FC_SUBTYPE(fc
)]);
335 fn_print(pbody
.ssid
.ssid
, NULL
);
336 printf(") AP : %s", etheraddr_string( pbody
.ap
));
342 handle_reassoc_response(u_int16_t fc
, const u_char
*p
)
344 /* Same as a Association Reponse */
345 return handle_assoc_response(fc
, p
);
349 handle_probe_request(u_int16_t fc
, const u_char
*p
)
351 struct mgmt_body_t pbody
;
354 memset(&pbody
, 0, sizeof(pbody
));
356 if (!parse_elements(&pbody
, p
, offset
))
359 printf("%s (", subtype_text
[FC_SUBTYPE(fc
)]);
360 fn_print(pbody
.ssid
.ssid
, NULL
);
368 handle_probe_response(u_int16_t fc
, const u_char
*p
)
370 struct mgmt_body_t pbody
;
373 memset(&pbody
, 0, sizeof(pbody
));
375 if (!TTEST2(*p
, IEEE802_11_TSTAMP_LEN
+ IEEE802_11_BCNINT_LEN
+
376 IEEE802_11_CAPINFO_LEN
))
379 memcpy(&pbody
.timestamp
, p
, IEEE802_11_TSTAMP_LEN
);
380 offset
+= IEEE802_11_TSTAMP_LEN
;
381 pbody
.beacon_interval
= EXTRACT_LE_16BITS(p
+offset
);
382 offset
+= IEEE802_11_BCNINT_LEN
;
383 pbody
.capability_info
= EXTRACT_LE_16BITS(p
+offset
);
384 offset
+= IEEE802_11_CAPINFO_LEN
;
386 if (!parse_elements(&pbody
, p
, offset
))
389 printf("%s (", subtype_text
[FC_SUBTYPE(fc
)]);
390 fn_print(pbody
.ssid
.ssid
, NULL
);
393 printf(" CH: %u%s", pbody
.ds
.channel
,
394 CAPABILITY_PRIVACY(pbody
.capability_info
) ? ", PRIVACY" : "" );
402 /* the frame body for ATIM is null. */
408 handle_disassoc(u_int16_t fc
, const u_char
*p
)
410 struct mgmt_body_t pbody
;
412 memset(&pbody
, 0, sizeof(pbody
));
414 if (!TTEST2(*p
, IEEE802_11_REASON_LEN
))
416 pbody
.reason_code
= EXTRACT_LE_16BITS(p
);
418 printf("%s: %s", subtype_text
[FC_SUBTYPE(fc
)],
419 (pbody
.reason_code
< 10) ? reason_text
[pbody
.reason_code
]
426 handle_auth(u_int16_t fc
, const u_char
*p
)
428 struct mgmt_body_t pbody
;
431 memset(&pbody
, 0, sizeof(pbody
));
435 pbody
.auth_alg
= EXTRACT_LE_16BITS(p
);
437 pbody
.auth_trans_seq_num
= EXTRACT_LE_16BITS(p
+ offset
);
439 pbody
.status_code
= EXTRACT_LE_16BITS(p
+ offset
);
442 if (!parse_elements(&pbody
, p
, offset
))
445 if ((pbody
.auth_alg
== 1) &&
446 ((pbody
.auth_trans_seq_num
== 2) ||
447 (pbody
.auth_trans_seq_num
== 3))) {
448 printf("%s (%s)-%x [Challenge Text] %s",
449 subtype_text
[FC_SUBTYPE(fc
)],
450 (pbody
.auth_alg
< 4) ? auth_alg_text
[pbody
.auth_alg
]
452 pbody
.auth_trans_seq_num
,
453 ((pbody
.auth_trans_seq_num
% 2)
454 ? ((pbody
.status_code
< 19)
455 ? status_text
[pbody
.status_code
]
459 printf("%s (%s)-%x: %s",
460 subtype_text
[FC_SUBTYPE(fc
)],
461 (pbody
.auth_alg
< 4) ? auth_alg_text
[pbody
.auth_alg
] : "Reserved",
462 pbody
.auth_trans_seq_num
,
463 (pbody
.auth_trans_seq_num
% 2)
464 ? ((pbody
.status_code
< 19) ? status_text
[pbody
.status_code
]
472 handle_deauth(u_int16_t fc
, const struct mgmt_header_t
*pmh
,
475 struct mgmt_body_t pbody
;
477 const char *reason
= NULL
;
479 memset(&pbody
, 0, sizeof(pbody
));
481 if (!TTEST2(*p
, IEEE802_11_REASON_LEN
))
483 pbody
.reason_code
= EXTRACT_LE_16BITS(p
);
484 offset
+= IEEE802_11_REASON_LEN
;
486 reason
= (pbody
.reason_code
< 10) ? reason_text
[pbody
.reason_code
]
490 printf("%s: %s", subtype_text
[FC_SUBTYPE(fc
)], reason
);
492 printf("%s (%s): %s",
493 subtype_text
[FC_SUBTYPE(fc
)], etheraddr_string(pmh
->sa
),
500 /*********************************************************************************
502 *********************************************************************************/
506 mgmt_body_print(u_int16_t fc
, const struct mgmt_header_t
*pmh
,
509 switch (FC_SUBTYPE(fc
)) {
510 case ST_ASSOC_REQUEST
:
511 return handle_assoc_request(fc
, p
);
512 case ST_ASSOC_RESPONSE
:
513 return handle_assoc_response(fc
, p
);
514 case ST_REASSOC_REQUEST
:
515 return handle_reassoc_request(fc
, p
);
516 case ST_REASSOC_RESPONSE
:
517 return handle_reassoc_response(fc
, p
);
518 case ST_PROBE_REQUEST
:
519 return handle_probe_request(fc
, p
);
520 case ST_PROBE_RESPONSE
:
521 return handle_probe_response(fc
, p
);
523 return handle_beacon(fc
, p
);
525 return handle_atim();
527 return handle_disassoc(fc
, p
);
531 if ((p
[0] == 0 ) && (p
[1] == 0) && (p
[2] == 0)) {
532 printf("Authentication (Shared-Key)-3 ");
535 return handle_auth(fc
, p
);
537 return handle_deauth(fc
, pmh
, p
);
540 printf("Unhandled Managment subtype(%x)",
547 /*********************************************************************************
548 * Handles printing all the control frame types
549 *********************************************************************************/
552 ctrl_body_print(u_int16_t fc
, const u_char
*p
)
554 switch (FC_SUBTYPE(fc
)) {
556 printf("Power Save-Poll");
557 if (!TTEST2(*p
, CTRL_PS_POLL_HDRLEN
))
560 EXTRACT_LE_16BITS(&(((const struct ctrl_ps_poll_t
*)p
)->aid
)));
563 printf("Request-To-Send");
564 if (!TTEST2(*p
, CTRL_RTS_HDRLEN
))
568 etheraddr_string(((const struct ctrl_rts_t
*)p
)->ta
));
571 printf("Clear-To-Send");
572 if (!TTEST2(*p
, CTRL_CTS_HDRLEN
))
576 etheraddr_string(((const struct ctrl_cts_t
*)p
)->ra
));
579 printf("Acknowledgment");
580 if (!TTEST2(*p
, CTRL_ACK_HDRLEN
))
584 etheraddr_string(((const struct ctrl_ack_t
*)p
)->ra
));
588 if (!TTEST2(*p
, CTRL_END_HDRLEN
))
592 etheraddr_string(((const struct ctrl_end_t
*)p
)->ra
));
595 printf("CF-End+CF-Ack");
596 if (!TTEST2(*p
, CTRL_END_ACK_HDRLEN
))
600 etheraddr_string(((const struct ctrl_end_ack_t
*)p
)->ra
));
603 printf("Unknown Ctrl Subtype");
613 * Data Frame - Address field contents
615 * To Ds | From DS | Addr 1 | Addr 2 | Addr 3 | Addr 4
616 * 0 | 0 | DA | SA | BSSID | n/a
617 * 0 | 1 | DA | BSSID | SA | n/a
618 * 1 | 0 | BSSID | SA | DA | n/a
619 * 1 | 1 | RA | TA | DA | SA
623 data_header_print(u_int16_t fc
, const u_char
*p
, const u_int8_t
**srcp
,
624 const u_int8_t
**dstp
)
626 switch (FC_SUBTYPE(fc
)) {
630 case DATA_DATA_CF_ACK
:
631 case DATA_NODATA_CF_ACK
:
634 case DATA_DATA_CF_POLL
:
635 case DATA_NODATA_CF_POLL
:
638 case DATA_DATA_CF_ACK_POLL
:
639 case DATA_NODATA_CF_ACK_POLL
:
640 printf("CF Ack/Poll ");
644 #define ADDR1 (p + 4)
645 #define ADDR2 (p + 10)
646 #define ADDR3 (p + 16)
647 #define ADDR4 (p + 24)
649 if (!FC_TO_DS(fc
) && !FC_FROM_DS(fc
)) {
656 printf("DA:%s SA:%s BSSID:%s ",
657 etheraddr_string(ADDR1
), etheraddr_string(ADDR2
),
658 etheraddr_string(ADDR3
));
659 } else if (!FC_TO_DS(fc
) && FC_FROM_DS(fc
)) {
666 printf("DA:%s BSSID:%s SA:%s ",
667 etheraddr_string(ADDR1
), etheraddr_string(ADDR2
),
668 etheraddr_string(ADDR3
));
669 } else if (FC_TO_DS(fc
) && !FC_FROM_DS(fc
)) {
676 printf("BSSID:%s SA:%s DA:%s ",
677 etheraddr_string(ADDR1
), etheraddr_string(ADDR2
),
678 etheraddr_string(ADDR3
));
679 } else if (FC_TO_DS(fc
) && FC_FROM_DS(fc
)) {
686 printf("RA:%s TA:%s DA:%s SA:%s ",
687 etheraddr_string(ADDR1
), etheraddr_string(ADDR2
),
688 etheraddr_string(ADDR3
), etheraddr_string(ADDR4
));
698 mgmt_header_print(const u_char
*p
, const u_int8_t
**srcp
,
699 const u_int8_t
**dstp
)
701 const struct mgmt_header_t
*hp
= (const struct mgmt_header_t
*) p
;
710 printf("BSSID:%s DA:%s SA:%s ",
711 etheraddr_string((hp
)->bssid
), etheraddr_string((hp
)->da
),
712 etheraddr_string((hp
)->sa
));
716 ctrl_header_print(u_int16_t fc
, const u_char
*p
, const u_int8_t
**srcp
,
717 const u_int8_t
**dstp
)
726 switch (FC_SUBTYPE(fc
)) {
728 printf("BSSID:%s TA:%s ",
729 etheraddr_string(((const struct ctrl_ps_poll_t
*)p
)->bssid
),
730 etheraddr_string(((const struct ctrl_ps_poll_t
*)p
)->ta
));
733 printf("RA:%s TA:%s ",
734 etheraddr_string(((const struct ctrl_rts_t
*)p
)->ra
),
735 etheraddr_string(((const struct ctrl_rts_t
*)p
)->ta
));
739 etheraddr_string(((const struct ctrl_cts_t
*)p
)->ra
));
743 etheraddr_string(((const struct ctrl_ack_t
*)p
)->ra
));
746 printf("RA:%s BSSID:%s ",
747 etheraddr_string(((const struct ctrl_end_t
*)p
)->ra
),
748 etheraddr_string(((const struct ctrl_end_t
*)p
)->bssid
));
751 printf("RA:%s BSSID:%s ",
752 etheraddr_string(((const struct ctrl_end_ack_t
*)p
)->ra
),
753 etheraddr_string(((const struct ctrl_end_ack_t
*)p
)->bssid
));
756 printf("(H) Unknown Ctrl Subtype");
762 extract_header_length(u_int16_t fc
)
764 switch (FC_TYPE(fc
)) {
768 switch (FC_SUBTYPE(fc
)) {
770 return CTRL_PS_POLL_HDRLEN
;
772 return CTRL_RTS_HDRLEN
;
774 return CTRL_CTS_HDRLEN
;
776 return CTRL_ACK_HDRLEN
;
778 return CTRL_END_HDRLEN
;
780 return CTRL_END_ACK_HDRLEN
;
785 return (FC_TO_DS(fc
) && FC_FROM_DS(fc
)) ? 30 : 24;
787 printf("unknown IEEE802.11 frame type (%d)", FC_TYPE(fc
));
793 * Print the 802.11 MAC header if eflag is set, and set "*srcp" and "*dstp"
794 * to point to the source and destination MAC addresses in any case if
795 * "srcp" and "dstp" aren't null.
798 ieee_802_11_hdr_print(u_int16_t fc
, const u_char
*p
, const u_int8_t
**srcp
,
799 const u_int8_t
**dstp
)
802 if (FC_MORE_DATA(fc
))
803 printf("More Data ");
804 if (FC_MORE_FLAG(fc
))
805 printf("More Fragments ");
806 if (FC_POWER_MGMT(fc
))
811 printf("Strictly Ordered ");
813 printf("WEP Encrypted ");
814 if (FC_TYPE(fc
) != T_CTRL
|| FC_SUBTYPE(fc
) != CTRL_PS_POLL
)
817 &((const struct mgmt_header_t
*)p
)->duration
));
820 switch (FC_TYPE(fc
)) {
822 mgmt_header_print(p
, srcp
, dstp
);
825 ctrl_header_print(fc
, p
, srcp
, dstp
);
828 data_header_print(fc
, p
, srcp
, dstp
);
831 printf("(header) unknown IEEE802.11 frame type (%d)",
840 ieee802_11_print(const u_char
*p
, u_int length
, u_int caplen
)
844 const u_int8_t
*src
, *dst
;
845 u_short extracted_ethertype
;
847 if (caplen
< IEEE802_11_FC_LEN
) {
852 fc
= EXTRACT_LE_16BITS(p
);
853 hdrlen
= extract_header_length(fc
);
855 if (caplen
< hdrlen
) {
860 ieee_802_11_hdr_print(fc
, p
, &src
, &dst
);
863 * Go past the 802.11 header.
869 switch (FC_TYPE(fc
)) {
871 if (!mgmt_body_print(fc
,
872 (const struct mgmt_header_t
*)(p
- hdrlen
), p
)) {
878 if (!ctrl_body_print(fc
, p
- hdrlen
)) {
884 /* There may be a problem w/ AP not having this bit set */
890 } else if (llc_print(p
, length
, caplen
, dst
, src
,
891 &extracted_ethertype
) == 0) {
893 * Some kinds of LLC packet we cannot
894 * handle intelligently
897 ieee_802_11_hdr_print(fc
, p
- hdrlen
, NULL
,
899 if (extracted_ethertype
)
902 htons(extracted_ethertype
)));
903 if (!xflag
&& !qflag
)
904 default_print(p
, caplen
);
908 printf("unknown 802.11 frame type (%d)", FC_TYPE(fc
));
916 * This is the top level routine of the printer. 'p' points
917 * to the 802.11 header of the packet, 'h->ts' is the timestamp,
918 * 'h->length' is the length of the packet off the wire, and 'h->caplen'
919 * is the number of bytes actually captured.
922 ieee802_11_if_print(const struct pcap_pkthdr
*h
, const u_char
*p
)
924 return ieee802_11_print(p
, h
->len
, h
->caplen
);
928 ieee802_11_radio_print(const u_char
*p
, u_int length
, u_int caplen
)
930 u_int32_t caphdr_len
;
932 caphdr_len
= EXTRACT_32BITS(p
+ 4);
933 if (caphdr_len
< 8) {
935 * Yow! The capture header length is claimed not
936 * to be large enough to include even the version
937 * cookie or capture header length!
943 if (caplen
< caphdr_len
) {
948 return caphdr_len
+ ieee802_11_print(p
+ caphdr_len
,
949 length
- caphdr_len
, caplen
- caphdr_len
);
952 #define PRISM_HDR_LEN 144
954 #define WLANCAP_MAGIC_COOKIE_V1 0x80211001
957 * For DLT_PRISM_HEADER; like DLT_IEEE802_11, but with an extra header,
958 * containing information such as radio information, which we
961 * If, however, the packet begins with WLANCAP_MAGIC_COOKIE_V1, it's
962 * really DLT_IEEE802_11_RADIO (currently, on Linux, there's no
963 * ARPHRD_ type for DLT_IEEE802_11_RADIO, as there is a
964 * ARPHRD_IEEE80211_PRISM for DLT_PRISM_HEADER, so
965 * ARPHRD_IEEE80211_PRISM is used for DLT_IEEE802_11_RADIO, and
966 * the first 4 bytes of the header are used to indicate which it is).
969 prism_if_print(const struct pcap_pkthdr
*h
, const u_char
*p
)
971 u_int caplen
= h
->caplen
;
972 u_int length
= h
->len
;
979 if (EXTRACT_32BITS(p
) == WLANCAP_MAGIC_COOKIE_V1
)
980 return ieee802_11_radio_print(p
, length
, caplen
);
982 if (caplen
< PRISM_HDR_LEN
) {
987 return PRISM_HDR_LEN
+ ieee802_11_print(p
+ PRISM_HDR_LEN
,
988 length
- PRISM_HDR_LEN
, caplen
- PRISM_HDR_LEN
);
992 * For DLT_IEEE802_11_RADIO; like DLT_IEEE802_11, but with an extra
993 * header, containing information such as radio information, which we
997 ieee802_11_radio_if_print(const struct pcap_pkthdr
*h
, const u_char
*p
)
999 u_int caplen
= h
->caplen
;
1000 u_int length
= h
->len
;
1003 printf("[|802.11]");
1007 return ieee802_11_radio_print(p
, length
, caplen
);