]> The Tcpdump Group git mirrors - tcpdump/blob - util-print.c
Add the nd_print_trunc() function
[tcpdump] / util-print.c
1 /*
2 * Copyright (c) 1990, 1991, 1993, 1994, 1995, 1996, 1997
3 * The Regents of the University of California. All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that: (1) source code distributions
7 * retain the above copyright notice and this paragraph in its entirety, (2)
8 * distributions including binary code include the above copyright notice and
9 * this paragraph in its entirety in the documentation or other materials
10 * provided with the distribution, and (3) all advertising materials mentioning
11 * features or use of this software display the following acknowledgement:
12 * ``This product includes software developed by the University of California,
13 * Lawrence Berkeley Laboratory and its contributors.'' Neither the name of
14 * the University nor the names of its contributors may be used to endorse
15 * or promote products derived from this software without specific prior
16 * written permission.
17 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED
18 * WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF
19 * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
20 */
21
22 /*
23 * txtproto_print() derived from original code by Hannes Gredler
24 * (hannes@gredler.at):
25 *
26 * Redistribution and use in source and binary forms, with or without
27 * modification, are permitted provided that: (1) source code
28 * distributions retain the above copyright notice and this paragraph
29 * in its entirety, and (2) distributions including binary code include
30 * the above copyright notice and this paragraph in its entirety in
31 * the documentation or other materials provided with the distribution.
32 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND
33 * WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, WITHOUT
34 * LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
35 * FOR A PARTICULAR PURPOSE.
36 */
37
38 #ifdef HAVE_CONFIG_H
39 #include <config.h>
40 #endif
41
42 #include "netdissect-stdinc.h"
43
44 #include <sys/stat.h>
45
46 #ifdef HAVE_FCNTL_H
47 #include <fcntl.h>
48 #endif
49 #include <ctype.h>
50 #include <stdio.h>
51 #include <stdarg.h>
52 #include <stdlib.h>
53 #include <string.h>
54
55 #include "netdissect.h"
56 #include "extract.h"
57 #include "ascii_strcasecmp.h"
58 #include "timeval-operations.h"
59
60 int32_t thiszone; /* seconds offset from gmt to local time */
61 /* invalid string to print '(invalid)' for malformed or corrupted packets */
62 const char istr[] = " (invalid)";
63
64 /*
65 * timestamp display buffer size, the biggest size of both formats is needed
66 * sizeof("0000000000.000000000") > sizeof("00:00:00.000000000")
67 */
68 #define TS_BUF_SIZE sizeof("0000000000.000000000")
69
70 #define TOKBUFSIZE 128
71
72 /*
73 * Print out a character, filtering out the non-printable ones
74 */
75 void
76 fn_print_char(netdissect_options *ndo, u_char c)
77 {
78 if (!ND_ISASCII(c)) {
79 c = ND_TOASCII(c);
80 ND_PRINT("M-");
81 }
82 if (!ND_ISPRINT(c)) {
83 c ^= 0x40; /* DEL to ?, others to alpha */
84 ND_PRINT("^");
85 }
86 ND_PRINT("%c", c);
87 }
88
89 /*
90 * Print out a null-terminated filename (or other ASCII string), part of
91 * the packet buffer.
92 * If ep is NULL, assume no truncation check is needed.
93 * Return true if truncated.
94 * Stop at ep (if given) or before the null char, whichever is first.
95 */
96 int
97 nd_print(netdissect_options *ndo,
98 const u_char *s, const u_char *ep)
99 {
100 int ret;
101 u_char c;
102
103 ret = 1; /* assume truncated */
104 while (ep == NULL || s < ep) {
105 c = EXTRACT_U_1(s);
106 s++;
107 if (c == '\0') {
108 ret = 0;
109 break;
110 }
111 fn_print_char(ndo, c);
112 }
113 return(ret);
114 }
115
116 /*
117 * Print out a null-terminated filename (or other ASCII string) from
118 * a fixed-length buffer, part of the packet buffer.
119 * If ep is NULL, assume no truncation check is needed.
120 * Return the number of bytes of string processed, including the
121 * terminating null, if not truncated. Return 0 if truncated.
122 */
123 u_int
124 nd_printztn(netdissect_options *ndo,
125 const u_char *s, u_int n, const u_char *ep)
126 {
127 u_int bytes;
128 u_char c;
129
130 bytes = 0;
131 for (;;) {
132 if (n == 0 || (ep != NULL && s >= ep)) {
133 /*
134 * Truncated. This includes "no null before we
135 * got to the end of the fixed-length buffer".
136 *
137 * XXX - BOOTP says "null-terminated", which
138 * means the maximum length of the string, in
139 * bytes, is 1 less than the size of the buffer,
140 * as there must always be a terminating null.
141 */
142 bytes = 0;
143 break;
144 }
145
146 c = EXTRACT_U_1(s);
147 s++;
148 bytes++;
149 n--;
150 if (c == '\0') {
151 /* End of string */
152 break;
153 }
154 fn_print_char(ndo, c);
155 }
156 return(bytes);
157 }
158
159 /*
160 * Print out a counted filename (or other ASCII string), part of
161 * the packet buffer.
162 * If ep is NULL, assume no truncation check is needed.
163 * Return true if truncated.
164 * Stop at ep (if given) or after n bytes, whichever is first.
165 */
166 int
167 nd_printn(netdissect_options *ndo,
168 const u_char *s, u_int n, const u_char *ep)
169 {
170 u_char c;
171
172 while (n > 0 && (ep == NULL || s < ep)) {
173 n--;
174 c = EXTRACT_U_1(s);
175 s++;
176 fn_print_char(ndo, c);
177 }
178 return (n == 0) ? 0 : 1;
179 }
180
181 /*
182 * Print out a null-padded filename (or other ASCII string), part of
183 * the packet buffer.
184 * If ep is NULL, assume no truncation check is needed.
185 * Return true if truncated.
186 * Stop at ep (if given) or after n bytes or before the null char,
187 * whichever is first.
188 */
189 int
190 nd_printzp(netdissect_options *ndo,
191 const u_char *s, u_int n,
192 const u_char *ep)
193 {
194 int ret;
195 u_char c;
196
197 ret = 1; /* assume truncated */
198 while (n > 0 && (ep == NULL || s < ep)) {
199 n--;
200 c = EXTRACT_U_1(s);
201 s++;
202 if (c == '\0') {
203 ret = 0;
204 break;
205 }
206 fn_print_char(ndo, c);
207 }
208 return (n == 0) ? 0 : ret;
209 }
210
211 /*
212 * Format the timestamp
213 */
214 static char *
215 ts_format(netdissect_options *ndo
216 #ifndef HAVE_PCAP_SET_TSTAMP_PRECISION
217 _U_
218 #endif
219 , int sec, int usec, char *buf)
220 {
221 const char *format;
222
223 #ifdef HAVE_PCAP_SET_TSTAMP_PRECISION
224 switch (ndo->ndo_tstamp_precision) {
225
226 case PCAP_TSTAMP_PRECISION_MICRO:
227 format = "%02d:%02d:%02d.%06u";
228 break;
229
230 case PCAP_TSTAMP_PRECISION_NANO:
231 format = "%02d:%02d:%02d.%09u";
232 break;
233
234 default:
235 format = "%02d:%02d:%02d.{unknown}";
236 break;
237 }
238 #else
239 format = "%02d:%02d:%02d.%06u";
240 #endif
241
242 nd_snprintf(buf, TS_BUF_SIZE, format,
243 sec / 3600, (sec % 3600) / 60, sec % 60, usec);
244
245 return buf;
246 }
247
248 /*
249 * Format the timestamp - Unix timeval style
250 */
251 static char *
252 ts_unix_format(netdissect_options *ndo
253 #ifndef HAVE_PCAP_SET_TSTAMP_PRECISION
254 _U_
255 #endif
256 , int sec, int usec, char *buf)
257 {
258 const char *format;
259
260 #ifdef HAVE_PCAP_SET_TSTAMP_PRECISION
261 switch (ndo->ndo_tstamp_precision) {
262
263 case PCAP_TSTAMP_PRECISION_MICRO:
264 format = "%u.%06u";
265 break;
266
267 case PCAP_TSTAMP_PRECISION_NANO:
268 format = "%u.%09u";
269 break;
270
271 default:
272 format = "%u.{unknown}";
273 break;
274 }
275 #else
276 format = "%u.%06u";
277 #endif
278
279 nd_snprintf(buf, TS_BUF_SIZE, format,
280 (unsigned)sec, (unsigned)usec);
281
282 return buf;
283 }
284
285 /*
286 * Print the timestamp
287 */
288 void
289 ts_print(netdissect_options *ndo,
290 const struct timeval *tvp)
291 {
292 int s;
293 struct tm *tm;
294 time_t Time;
295 char buf[TS_BUF_SIZE];
296 static struct timeval tv_ref;
297 struct timeval tv_result;
298 int negative_offset;
299 int nano_prec;
300
301 switch (ndo->ndo_tflag) {
302
303 case 0: /* Default */
304 s = (tvp->tv_sec + thiszone) % 86400;
305 ND_PRINT("%s ", ts_format(ndo, s, tvp->tv_usec, buf));
306 break;
307
308 case 1: /* No time stamp */
309 break;
310
311 case 2: /* Unix timeval style */
312 ND_PRINT("%s ", ts_unix_format(ndo,
313 tvp->tv_sec, tvp->tv_usec, buf));
314 break;
315
316 case 3: /* Microseconds/nanoseconds since previous packet */
317 case 5: /* Microseconds/nanoseconds since first packet */
318 #ifdef HAVE_PCAP_SET_TSTAMP_PRECISION
319 switch (ndo->ndo_tstamp_precision) {
320 case PCAP_TSTAMP_PRECISION_MICRO:
321 nano_prec = 0;
322 break;
323 case PCAP_TSTAMP_PRECISION_NANO:
324 nano_prec = 1;
325 break;
326 default:
327 nano_prec = 0;
328 break;
329 }
330 #else
331 nano_prec = 0;
332 #endif
333 if (!(netdissect_timevalisset(&tv_ref)))
334 tv_ref = *tvp; /* set timestamp for first packet */
335
336 negative_offset = netdissect_timevalcmp(tvp, &tv_ref, <);
337 if (negative_offset)
338 netdissect_timevalsub(&tv_ref, tvp, &tv_result, nano_prec);
339 else
340 netdissect_timevalsub(tvp, &tv_ref, &tv_result, nano_prec);
341
342 ND_PRINT((negative_offset ? "-" : " "));
343
344 ND_PRINT("%s ", ts_format(ndo,
345 tv_result.tv_sec, tv_result.tv_usec, buf));
346
347 if (ndo->ndo_tflag == 3)
348 tv_ref = *tvp; /* set timestamp for previous packet */
349 break;
350
351 case 4: /* Default + Date */
352 s = (tvp->tv_sec + thiszone) % 86400;
353 Time = (tvp->tv_sec + thiszone) - s;
354 tm = gmtime (&Time);
355 if (!tm)
356 ND_PRINT("Date fail ");
357 else
358 ND_PRINT("%04d-%02d-%02d %s ",
359 tm->tm_year+1900, tm->tm_mon+1, tm->tm_mday,
360 ts_format(ndo, s, tvp->tv_usec, buf));
361 break;
362 }
363 }
364
365 /*
366 * Print an unsigned relative number of seconds (e.g. hold time, prune timer)
367 * in the form 5m1s. This does no truncation, so 32230861 seconds
368 * is represented as 1y1w1d1h1m1s.
369 */
370 void
371 unsigned_relts_print(netdissect_options *ndo,
372 uint32_t secs)
373 {
374 static const char *lengths[] = {"y", "w", "d", "h", "m", "s"};
375 static const u_int seconds[] = {31536000, 604800, 86400, 3600, 60, 1};
376 const char **l = lengths;
377 const u_int *s = seconds;
378
379 if (secs == 0) {
380 ND_PRINT("0s");
381 return;
382 }
383 while (secs > 0) {
384 if (secs >= *s) {
385 ND_PRINT("%u%s", secs / *s, *l);
386 secs -= (secs / *s) * *s;
387 }
388 s++;
389 l++;
390 }
391 }
392
393 /*
394 * Print a signed relative number of seconds (e.g. hold time, prune timer)
395 * in the form 5m1s. This does no truncation, so 32230861 seconds
396 * is represented as 1y1w1d1h1m1s.
397 */
398 void
399 signed_relts_print(netdissect_options *ndo,
400 int32_t secs)
401 {
402 if (secs < 0) {
403 ND_PRINT("-");
404 if (secs == INT32_MIN) {
405 /*
406 * -2^31; you can't fit its absolute value into
407 * a 32-bit signed integer.
408 *
409 * Just directly pass said absolute value to
410 * unsigned_relts_print() directly.
411 *
412 * (XXX - does ISO C guarantee that -(-2^n),
413 * when calculated and cast to an n-bit unsigned
414 * integer type, will have the value 2^n?)
415 */
416 unsigned_relts_print(ndo, 2147483648U);
417 } else {
418 /*
419 * We now know -secs will fit into an int32_t;
420 * negate it and pass that to unsigned_relts_print().
421 */
422 unsigned_relts_print(ndo, -secs);
423 }
424 return;
425 }
426 unsigned_relts_print(ndo, secs);
427 }
428
429 /* Print the truncated string */
430 void nd_print_trunc(netdissect_options *ndo)
431 {
432 ND_PRINT(" [|%s]", ndo->ndo_protocol);
433 }
434
435 /*
436 * this is a generic routine for printing unknown data;
437 * we pass on the linefeed plus indentation string to
438 * get a proper output - returns 0 on error
439 */
440
441 int
442 print_unknown_data(netdissect_options *ndo, const u_char *cp,const char *ident,int len)
443 {
444 if (len < 0) {
445 ND_PRINT("%sDissector error: print_unknown_data called with negative length",
446 ident);
447 return(0);
448 }
449 if (ndo->ndo_snapend - cp < len)
450 len = ndo->ndo_snapend - cp;
451 if (len < 0) {
452 ND_PRINT("%sDissector error: print_unknown_data called with pointer past end of packet",
453 ident);
454 return(0);
455 }
456 hex_print(ndo, ident,cp,len);
457 return(1); /* everything is ok */
458 }
459
460 /*
461 * Convert a token value to a string; use "fmt" if not found.
462 */
463 const char *
464 tok2strbuf(const struct tok *lp, const char *fmt,
465 u_int v, char *buf, size_t bufsize)
466 {
467 if (lp != NULL) {
468 while (lp->s != NULL) {
469 if (lp->v == v)
470 return (lp->s);
471 ++lp;
472 }
473 }
474 if (fmt == NULL)
475 fmt = "#%d";
476
477 (void)nd_snprintf(buf, bufsize, fmt, v);
478 return (const char *)buf;
479 }
480
481 /*
482 * Convert a token value to a string; use "fmt" if not found.
483 * Uses tok2strbuf() on one of four local static buffers of size TOKBUFSIZE
484 * in round-robin fashion.
485 */
486 const char *
487 tok2str(const struct tok *lp, const char *fmt,
488 u_int v)
489 {
490 static char buf[4][TOKBUFSIZE];
491 static int idx = 0;
492 char *ret;
493
494 ret = buf[idx];
495 idx = (idx+1) & 3;
496 return tok2strbuf(lp, fmt, v, ret, sizeof(buf[0]));
497 }
498
499 /*
500 * Convert a bit token value to a string; use "fmt" if not found.
501 * this is useful for parsing bitfields, the output strings are seperated
502 * if the s field is positive.
503 */
504 static char *
505 bittok2str_internal(const struct tok *lp, const char *fmt,
506 u_int v, const char *sep)
507 {
508 static char buf[1024+1]; /* our string buffer */
509 char *bufp = buf;
510 size_t space_left = sizeof(buf), string_size;
511 u_int rotbit; /* this is the bit we rotate through all bitpositions */
512 u_int tokval;
513 const char * sepstr = "";
514
515 while (lp != NULL && lp->s != NULL) {
516 tokval=lp->v; /* load our first value */
517 rotbit=1;
518 while (rotbit != 0) {
519 /*
520 * lets AND the rotating bit with our token value
521 * and see if we have got a match
522 */
523 if (tokval == (v&rotbit)) {
524 /* ok we have found something */
525 if (space_left <= 1)
526 return (buf); /* only enough room left for NUL, if that */
527 string_size = strlcpy(bufp, sepstr, space_left);
528 if (string_size >= space_left)
529 return (buf); /* we ran out of room */
530 bufp += string_size;
531 space_left -= string_size;
532 if (space_left <= 1)
533 return (buf); /* only enough room left for NUL, if that */
534 string_size = strlcpy(bufp, lp->s, space_left);
535 if (string_size >= space_left)
536 return (buf); /* we ran out of room */
537 bufp += string_size;
538 space_left -= string_size;
539 sepstr = sep;
540 break;
541 }
542 rotbit=rotbit<<1; /* no match - lets shift and try again */
543 }
544 lp++;
545 }
546
547 if (bufp == buf)
548 /* bummer - lets print the "unknown" message as advised in the fmt string if we got one */
549 (void)nd_snprintf(buf, sizeof(buf), fmt == NULL ? "#%08x" : fmt, v);
550 return (buf);
551 }
552
553 /*
554 * Convert a bit token value to a string; use "fmt" if not found.
555 * this is useful for parsing bitfields, the output strings are not seperated.
556 */
557 char *
558 bittok2str_nosep(const struct tok *lp, const char *fmt,
559 u_int v)
560 {
561 return (bittok2str_internal(lp, fmt, v, ""));
562 }
563
564 /*
565 * Convert a bit token value to a string; use "fmt" if not found.
566 * this is useful for parsing bitfields, the output strings are comma seperated.
567 */
568 char *
569 bittok2str(const struct tok *lp, const char *fmt,
570 u_int v)
571 {
572 return (bittok2str_internal(lp, fmt, v, ", "));
573 }
574
575 /*
576 * Convert a value to a string using an array; the macro
577 * tok2strary() in <netdissect.h> is the public interface to
578 * this function and ensures that the second argument is
579 * correct for bounds-checking.
580 */
581 const char *
582 tok2strary_internal(const char **lp, int n, const char *fmt,
583 int v)
584 {
585 static char buf[TOKBUFSIZE];
586
587 if (v >= 0 && v < n && lp[v] != NULL)
588 return lp[v];
589 if (fmt == NULL)
590 fmt = "#%d";
591 (void)nd_snprintf(buf, sizeof(buf), fmt, v);
592 return (buf);
593 }
594
595 /*
596 * Convert a 32-bit netmask to prefixlen if possible
597 * the function returns the prefix-len; if plen == -1
598 * then conversion was not possible;
599 */
600
601 int
602 mask2plen(uint32_t mask)
603 {
604 uint32_t bitmasks[33] = {
605 0x00000000,
606 0x80000000, 0xc0000000, 0xe0000000, 0xf0000000,
607 0xf8000000, 0xfc000000, 0xfe000000, 0xff000000,
608 0xff800000, 0xffc00000, 0xffe00000, 0xfff00000,
609 0xfff80000, 0xfffc0000, 0xfffe0000, 0xffff0000,
610 0xffff8000, 0xffffc000, 0xffffe000, 0xfffff000,
611 0xfffff800, 0xfffffc00, 0xfffffe00, 0xffffff00,
612 0xffffff80, 0xffffffc0, 0xffffffe0, 0xfffffff0,
613 0xfffffff8, 0xfffffffc, 0xfffffffe, 0xffffffff
614 };
615 int prefix_len = 32;
616
617 /* let's see if we can transform the mask into a prefixlen */
618 while (prefix_len >= 0) {
619 if (bitmasks[prefix_len] == mask)
620 break;
621 prefix_len--;
622 }
623 return (prefix_len);
624 }
625
626 int
627 mask62plen(const u_char *mask)
628 {
629 u_char bitmasks[9] = {
630 0x00,
631 0x80, 0xc0, 0xe0, 0xf0,
632 0xf8, 0xfc, 0xfe, 0xff
633 };
634 int byte;
635 int cidr_len = 0;
636
637 for (byte = 0; byte < 16; byte++) {
638 u_int bits;
639
640 for (bits = 0; bits < (sizeof (bitmasks) / sizeof (bitmasks[0])); bits++) {
641 if (mask[byte] == bitmasks[bits]) {
642 cidr_len += bits;
643 break;
644 }
645 }
646
647 if (mask[byte] != 0xff)
648 break;
649 }
650 return (cidr_len);
651 }
652
653 /*
654 * Routine to print out information for text-based protocols such as FTP,
655 * HTTP, SMTP, RTSP, SIP, ....
656 */
657 #define MAX_TOKEN 128
658
659 /*
660 * Fetch a token from a packet, starting at the specified index,
661 * and return the length of the token.
662 *
663 * Returns 0 on error; yes, this is indistinguishable from an empty
664 * token, but an "empty token" isn't a valid token - it just means
665 * either a space character at the beginning of the line (this
666 * includes a blank line) or no more tokens remaining on the line.
667 */
668 static int
669 fetch_token(netdissect_options *ndo, const u_char *pptr, u_int idx, u_int len,
670 u_char *tbuf, size_t tbuflen)
671 {
672 size_t toklen = 0;
673
674 for (; idx < len; idx++) {
675 if (!ND_TTEST_1(pptr + idx)) {
676 /* ran past end of captured data */
677 return (0);
678 }
679 if (!isascii(*(pptr + idx))) {
680 /* not an ASCII character */
681 return (0);
682 }
683 if (isspace(*(pptr + idx))) {
684 /* end of token */
685 break;
686 }
687 if (!isprint(*(pptr + idx))) {
688 /* not part of a command token or response code */
689 return (0);
690 }
691 if (toklen + 2 > tbuflen) {
692 /* no room for this character and terminating '\0' */
693 return (0);
694 }
695 tbuf[toklen] = *(pptr + idx);
696 toklen++;
697 }
698 if (toklen == 0) {
699 /* no token */
700 return (0);
701 }
702 tbuf[toklen] = '\0';
703
704 /*
705 * Skip past any white space after the token, until we see
706 * an end-of-line (CR or LF).
707 */
708 for (; idx < len; idx++) {
709 if (!ND_TTEST_1(pptr + idx)) {
710 /* ran past end of captured data */
711 break;
712 }
713 if (*(pptr + idx) == '\r' || *(pptr + idx) == '\n') {
714 /* end of line */
715 break;
716 }
717 if (!isascii(*(pptr + idx)) || !isprint(*(pptr + idx))) {
718 /* not a printable ASCII character */
719 break;
720 }
721 if (!isspace(*(pptr + idx))) {
722 /* beginning of next token */
723 break;
724 }
725 }
726 return (idx);
727 }
728
729 /*
730 * Scan a buffer looking for a line ending - LF or CR-LF.
731 * Return the index of the character after the line ending or 0 if
732 * we encounter a non-ASCII or non-printable character or don't find
733 * the line ending.
734 */
735 static u_int
736 print_txt_line(netdissect_options *ndo, const char *protoname,
737 const char *prefix, const u_char *pptr, u_int idx, u_int len)
738 {
739 u_int startidx;
740 u_int linelen;
741
742 startidx = idx;
743 while (idx < len) {
744 ND_TCHECK_1(pptr + idx);
745 if (*(pptr+idx) == '\n') {
746 /*
747 * LF without CR; end of line.
748 * Skip the LF and print the line, with the
749 * exception of the LF.
750 */
751 linelen = idx - startidx;
752 idx++;
753 goto print;
754 } else if (*(pptr+idx) == '\r') {
755 /* CR - any LF? */
756 if ((idx+1) >= len) {
757 /* not in this packet */
758 return (0);
759 }
760 ND_TCHECK_1(pptr + idx + 1);
761 if (*(pptr+idx+1) == '\n') {
762 /*
763 * CR-LF; end of line.
764 * Skip the CR-LF and print the line, with
765 * the exception of the CR-LF.
766 */
767 linelen = idx - startidx;
768 idx += 2;
769 goto print;
770 }
771
772 /*
773 * CR followed by something else; treat this
774 * as if it were binary data, and don't print
775 * it.
776 */
777 return (0);
778 } else if (!isascii(*(pptr+idx)) ||
779 (!isprint(*(pptr+idx)) && *(pptr+idx) != '\t')) {
780 /*
781 * Not a printable ASCII character and not a tab;
782 * treat this as if it were binary data, and
783 * don't print it.
784 */
785 return (0);
786 }
787 idx++;
788 }
789
790 /*
791 * All printable ASCII, but no line ending after that point
792 * in the buffer; treat this as if it were truncated.
793 */
794 trunc:
795 linelen = idx - startidx;
796 ND_PRINT("%s%.*s[!%s]", prefix, (int)linelen, pptr + startidx,
797 protoname);
798 return (0);
799
800 print:
801 ND_PRINT("%s%.*s", prefix, (int)linelen, pptr + startidx);
802 return (idx);
803 }
804
805 void
806 txtproto_print(netdissect_options *ndo, const u_char *pptr, u_int len,
807 const char *protoname, const char **cmds, u_int flags)
808 {
809 u_int idx, eol;
810 u_char token[MAX_TOKEN+1];
811 const char *cmd;
812 int print_this = 0;
813 const char *pnp;
814
815 if (cmds != NULL) {
816 /*
817 * This protocol has more than just request and
818 * response lines; see whether this looks like a
819 * request or response and, if so, print it and,
820 * in verbose mode, print everything after it.
821 *
822 * This is for HTTP-like protocols, where we
823 * want to print requests and responses, but
824 * don't want to print continuations of request
825 * or response bodies in packets that don't
826 * contain the request or response line.
827 */
828 idx = fetch_token(ndo, pptr, 0, len, token, sizeof(token));
829 if (idx != 0) {
830 /* Is this a valid request name? */
831 while ((cmd = *cmds++) != NULL) {
832 if (ascii_strcasecmp((const char *)token, cmd) == 0) {
833 /* Yes. */
834 print_this = 1;
835 break;
836 }
837 }
838
839 /*
840 * No - is this a valid response code (3 digits)?
841 *
842 * Is this token the response code, or is the next
843 * token the response code?
844 */
845 if (flags & RESP_CODE_SECOND_TOKEN) {
846 /*
847 * Next token - get it.
848 */
849 idx = fetch_token(ndo, pptr, idx, len, token,
850 sizeof(token));
851 }
852 if (idx != 0) {
853 if (isdigit(token[0]) && isdigit(token[1]) &&
854 isdigit(token[2]) && token[3] == '\0') {
855 /* Yes. */
856 print_this = 1;
857 }
858 }
859 }
860 } else {
861 /*
862 * Either:
863 *
864 * 1) This protocol has only request and response lines
865 * (e.g., FTP, where all the data goes over a different
866 * connection); assume the payload is a request or
867 * response.
868 *
869 * or
870 *
871 * 2) This protocol is just text, so that we should
872 * always, at minimum, print the first line and,
873 * in verbose mode, print all lines.
874 */
875 print_this = 1;
876 }
877
878 /* Capitalize the protocol name */
879 for (pnp = protoname; *pnp != '\0'; pnp++)
880 ND_PRINT("%c", toupper((u_char)*pnp));
881
882 if (print_this) {
883 /*
884 * In non-verbose mode, just print the protocol, followed
885 * by the first line.
886 *
887 * In verbose mode, print lines as text until we run out
888 * of characters or see something that's not a
889 * printable-ASCII line.
890 */
891 if (ndo->ndo_vflag) {
892 /*
893 * We're going to print all the text lines in the
894 * request or response; just print the length
895 * on the first line of the output.
896 */
897 ND_PRINT(", length: %u", len);
898 for (idx = 0;
899 idx < len && (eol = print_txt_line(ndo, protoname, "\n\t", pptr, idx, len)) != 0;
900 idx = eol)
901 ;
902 } else {
903 /*
904 * Just print the first text line.
905 */
906 print_txt_line(ndo, protoname, ": ", pptr, 0, len);
907 }
908 }
909 }
910
911 #if (defined(__i386__) || defined(_M_IX86) || defined(__X86__) || defined(__x86_64__) || defined(_M_X64)) || \
912 (defined(__arm__) || defined(_M_ARM) || defined(__aarch64__)) || \
913 (defined(__m68k__) && (!defined(__mc68000__) && !defined(__mc68010__))) || \
914 (defined(__ppc__) || defined(__ppc64__) || defined(_M_PPC) || defined(_ARCH_PPC) || defined(_ARCH_PPC64)) || \
915 (defined(__s390__) || defined(__s390x__) || defined(__zarch__)) || \
916 defined(__vax__)
917 /*
918 * The procesor natively handles unaligned loads, so just use memcpy()
919 * and memcmp(), to enable those optimizations.
920 *
921 * XXX - are those all the x86 tests we need?
922 * XXX - do we need to worry about ARMv1 through ARMv5, which didn't
923 * support unaligned loads, and, if so, do we need to worry about all
924 * of them, or just some of them, e.g. ARMv5?
925 * XXX - are those the only 68k tests we need not to generated
926 * unaligned accesses if the target is the 68000 or 68010?
927 * XXX - are there any tests we don't need, because some definitions are for
928 * compilers that also predefine the GCC symbols?
929 * XXX - do we need to test for both 32-bit and 64-bit versions of those
930 * architectures in all cases?
931 */
932 #else
933 /*
934 * The processor doesn't natively handle unaligned loads,
935 * and the compiler might "helpfully" optimize memcpy()
936 * and memcmp(), when handed pointers that would normally
937 * be properly aligned, into sequences that assume proper
938 * alignment.
939 *
940 * Do copies and compares of possibly-unaligned data by
941 * calling routines that wrap memcpy() and memcmp(), to
942 * prevent that optimization.
943 */
944 void
945 unaligned_memcpy(void *p, const void *q, size_t l)
946 {
947 memcpy(p, q, l);
948 }
949
950 /* As with memcpy(), so with memcmp(). */
951 int
952 unaligned_memcmp(const void *p, const void *q, size_t l)
953 {
954 return (memcmp(p, q, l));
955 }
956 #endif
957