]>
The Tcpdump Group git mirrors - tcpdump/blob - print-sl.c
2 * Copyright (c) 1989, 1990, 1991, 1993, 1994, 1995, 1996, 1997
3 * The Regents of the University of California. All rights reserved.
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that: (1) source code distributions
7 * retain the above copyright notice and this paragraph in its entirety, (2)
8 * distributions including binary code include the above copyright notice and
9 * this paragraph in its entirety in the documentation or other materials
10 * provided with the distribution, and (3) all advertising materials mentioning
11 * features or use of this software display the following acknowledgement:
12 * ``This product includes software developed by the University of California,
13 * Lawrence Berkeley Laboratory and its contributors.'' Neither the name of
14 * the University nor the names of its contributors may be used to endorse
15 * or promote products derived from this software without specific prior
17 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED
18 * WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF
19 * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
22 /* \summary: Compressed Serial Line Internet Protocol printer */
28 #include "netdissect-stdinc.h"
30 #include "netdissect.h"
35 #include "slcompress.h"
38 * definitions of the pseudo- link-level header attached to slip
39 * packets grabbed by the packet filter (bpf) traffic monitor.
41 #define SLIP_HDRLEN 16
51 static u_int lastlen
[2][256];
52 static u_int lastconn
= 255;
54 static void sliplink_print(netdissect_options
*, const u_char
*, const struct ip
*, u_int
);
55 static void compressed_sl_print(netdissect_options
*, const u_char
*, const struct ip
*, u_int
, int);
58 sl_if_print(netdissect_options
*ndo
,
59 const struct pcap_pkthdr
*h
, const u_char
*p
)
61 u_int caplen
= h
->caplen
;
62 u_int length
= h
->len
;
65 ndo
->ndo_protocol
= "sl_if";
66 if (caplen
< SLIP_HDRLEN
|| length
< SLIP_HDRLEN
) {
71 caplen
-= SLIP_HDRLEN
;
72 length
-= SLIP_HDRLEN
;
74 ip
= (const struct ip
*)(p
+ SLIP_HDRLEN
);
77 sliplink_print(ndo
, p
, ip
, length
);
79 if (caplen
< 1 || length
< 1) {
81 return (caplen
+ SLIP_HDRLEN
);
86 ip_print(ndo
, (const u_char
*)ip
, length
);
89 ip6_print(ndo
, (const u_char
*)ip
, length
);
92 ND_PRINT("ip v%u", IP_V(ip
));
99 sl_bsdos_if_print(netdissect_options
*ndo
,
100 const struct pcap_pkthdr
*h
, const u_char
*p
)
102 u_int caplen
= h
->caplen
;
103 u_int length
= h
->len
;
106 ndo
->ndo_protocol
= "sl_bsdos_if";
107 if (caplen
< SLIP_HDRLEN
) {
112 length
-= SLIP_HDRLEN
;
114 ip
= (const struct ip
*)(p
+ SLIP_HDRLEN
);
118 sliplink_print(ndo
, p
, ip
, length
);
121 ip_print(ndo
, (const u_char
*)ip
, length
);
123 return (SLIP_HDRLEN
);
127 sliplink_print(netdissect_options
*ndo
,
128 const u_char
*p
, const struct ip
*ip
,
134 dir
= EXTRACT_U_1(p
+ SLX_DIR
);
146 ND_PRINT("Invalid direction %d ", dir
);
150 if (ndo
->ndo_nflag
) {
151 /* XXX just dump the header */
154 for (i
= SLX_CHDR
; i
< SLX_CHDR
+ CHDR_LEN
- 1; ++i
)
155 ND_PRINT("%02x.", EXTRACT_U_1(p
+ i
));
156 ND_PRINT("%02x: ", EXTRACT_U_1(p
+ SLX_CHDR
+ CHDR_LEN
- 1));
159 switch (EXTRACT_U_1(p
+ SLX_CHDR
) & 0xf0) {
162 ND_PRINT("ip %u: ", length
+ SLIP_HDRLEN
);
165 case TYPE_UNCOMPRESSED_TCP
:
167 * The connection id is stored in the IP protocol field.
168 * Get it from the link layer since sl_uncompress_tcp()
169 * has restored the IP header copy to IPPROTO_TCP.
171 lastconn
= EXTRACT_U_1(((const struct ip
*)(p
+ SLX_CHDR
))->ip_p
);
172 ND_PRINT("utcp %u: ", lastconn
);
174 /* Direction is bogus, don't use it */
178 hlen
+= TH_OFF((const struct tcphdr
*)&((const int *)ip
)[hlen
]);
179 lastlen
[dir
][lastconn
] = length
- (hlen
<< 2);
184 /* Direction is bogus, don't use it */
187 if (EXTRACT_U_1(p
+ SLX_CHDR
) & TYPE_COMPRESSED_TCP
) {
188 compressed_sl_print(ndo
, p
+ SLX_CHDR
, ip
,
192 ND_PRINT("slip-%u!: ", EXTRACT_U_1(p
+ SLX_CHDR
));
196 static const u_char
*
197 print_sl_change(netdissect_options
*ndo
,
198 const char *str
, const u_char
*cp
)
202 if ((i
= EXTRACT_U_1(cp
)) == 0) {
204 i
= EXTRACT_BE_U_2(cp
);
207 ND_PRINT(" %s%u", str
, i
);
211 static const u_char
*
212 print_sl_winchange(netdissect_options
*ndo
,
217 if ((i
= EXTRACT_U_1(cp
)) == 0) {
219 i
= EXTRACT_BE_S_2(cp
);
223 ND_PRINT(" W+%d", i
);
230 compressed_sl_print(netdissect_options
*ndo
,
231 const u_char
*chdr
, const struct ip
*ip
,
232 u_int length
, int dir
)
234 const u_char
*cp
= chdr
;
237 flags
= EXTRACT_U_1(cp
);
240 lastconn
= EXTRACT_U_1(cp
);
242 ND_PRINT("ctcp %u", lastconn
);
246 /* skip tcp checksum */
249 switch (flags
& SPECIALS_MASK
) {
251 ND_PRINT(" *SA+%u", lastlen
[dir
][lastconn
]);
255 ND_PRINT(" *S+%u", lastlen
[dir
][lastconn
]);
260 cp
= print_sl_change(ndo
, "U=", cp
);
262 cp
= print_sl_winchange(ndo
, cp
);
264 cp
= print_sl_change(ndo
, "A+", cp
);
266 cp
= print_sl_change(ndo
, "S+", cp
);
270 cp
= print_sl_change(ndo
, "I+", cp
);
273 * 'hlen' is the length of the uncompressed TCP/IP header (in words).
274 * 'cp - chdr' is the length of the compressed header.
275 * 'length - hlen' is the amount of data in the packet.
278 hlen
+= TH_OFF((const struct tcphdr
*)&((const int32_t *)ip
)[hlen
]);
279 lastlen
[dir
][lastconn
] = length
- (hlen
<< 2);
280 ND_PRINT(" %u (%ld)", lastlen
[dir
][lastconn
], (long)(cp
- chdr
));