]> The Tcpdump Group git mirrors - tcpdump/blob - util-print.c
d0f014fdf77d7379391541255a1982f881c3d4f1
[tcpdump] / util-print.c
1 /*
2 * Copyright (c) 1990, 1991, 1993, 1994, 1995, 1996, 1997
3 * The Regents of the University of California. All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that: (1) source code distributions
7 * retain the above copyright notice and this paragraph in its entirety, (2)
8 * distributions including binary code include the above copyright notice and
9 * this paragraph in its entirety in the documentation or other materials
10 * provided with the distribution, and (3) all advertising materials mentioning
11 * features or use of this software display the following acknowledgement:
12 * ``This product includes software developed by the University of California,
13 * Lawrence Berkeley Laboratory and its contributors.'' Neither the name of
14 * the University nor the names of its contributors may be used to endorse
15 * or promote products derived from this software without specific prior
16 * written permission.
17 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED
18 * WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF
19 * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
20 */
21
22 /*
23 * txtproto_print() derived from original code by Hannes Gredler
24 * (hannes@juniper.net):
25 *
26 * Redistribution and use in source and binary forms, with or without
27 * modification, are permitted provided that: (1) source code
28 * distributions retain the above copyright notice and this paragraph
29 * in its entirety, and (2) distributions including binary code include
30 * the above copyright notice and this paragraph in its entirety in
31 * the documentation or other materials provided with the distribution.
32 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND
33 * WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, WITHOUT
34 * LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
35 * FOR A PARTICULAR PURPOSE.
36 */
37
38 #ifdef HAVE_CONFIG_H
39 #include "config.h"
40 #endif
41
42 #include <netdissect-stdinc.h>
43
44 #include <sys/stat.h>
45
46 #ifdef HAVE_FCNTL_H
47 #include <fcntl.h>
48 #endif
49 #include <ctype.h>
50 #include <stdio.h>
51 #include <stdarg.h>
52 #include <stdlib.h>
53 #include <string.h>
54
55 #include "netdissect.h"
56 #include "ascii_strcasecmp.h"
57 #include "timeval-operations.h"
58
59 int32_t thiszone; /* seconds offset from gmt to local time */
60 /* invalid string to print '(invalid)' for malformed or corrupted packets */
61 const char istr[] = " (invalid)";
62
63 /*
64 * timestamp display buffer size, the biggest size of both formats is needed
65 * sizeof("0000000000.000000000") > sizeof("00:00:00.000000000")
66 */
67 #define TS_BUF_SIZE sizeof("0000000000.000000000")
68
69 #define TOKBUFSIZE 128
70
71 /*
72 * Print out a character, filtering out the non-printable ones
73 */
74 void
75 fn_print_char(netdissect_options *ndo, u_char c)
76 {
77 if (!ND_ISASCII(c)) {
78 c = ND_TOASCII(c);
79 ND_PRINT((ndo, "M-"));
80 }
81 if (!ND_ISPRINT(c)) {
82 c ^= 0x40; /* DEL to ?, others to alpha */
83 ND_PRINT((ndo, "^"));
84 }
85 ND_PRINT((ndo, "%c", c));
86 }
87
88 /*
89 * Print out a null-terminated filename (or other ascii string).
90 * If ep is NULL, assume no truncation check is needed.
91 * Return true if truncated.
92 * Stop at ep (if given) or before the null char, whichever is first.
93 */
94 int
95 fn_print(netdissect_options *ndo,
96 register const u_char *s, register const u_char *ep)
97 {
98 register int ret;
99 register u_char c;
100
101 ret = 1; /* assume truncated */
102 while (ep == NULL || s < ep) {
103 c = *s++;
104 if (c == '\0') {
105 ret = 0;
106 break;
107 }
108 if (!ND_ISASCII(c)) {
109 c = ND_TOASCII(c);
110 ND_PRINT((ndo, "M-"));
111 }
112 if (!ND_ISPRINT(c)) {
113 c ^= 0x40; /* DEL to ?, others to alpha */
114 ND_PRINT((ndo, "^"));
115 }
116 ND_PRINT((ndo, "%c", c));
117 }
118 return(ret);
119 }
120
121 /*
122 * Print out a null-terminated filename (or other ascii string) from
123 * a fixed-length buffer.
124 * If ep is NULL, assume no truncation check is needed.
125 * Return the number of bytes of string processed, including the
126 * terminating null, if not truncated. Return 0 if truncated.
127 */
128 u_int
129 fn_printztn(netdissect_options *ndo,
130 register const u_char *s, register u_int n, register const u_char *ep)
131 {
132 register u_int bytes;
133 register u_char c;
134
135 bytes = 0;
136 for (;;) {
137 if (n == 0 || (ep != NULL && s >= ep)) {
138 /*
139 * Truncated. This includes "no null before we
140 * got to the end of the fixed-length buffer".
141 *
142 * XXX - BOOTP says "null-terminated", which
143 * means the maximum length of the string, in
144 * bytes, is 1 less than the size of the buffer,
145 * as there must always be a terminating null.
146 */
147 bytes = 0;
148 break;
149 }
150
151 c = *s++;
152 bytes++;
153 n--;
154 if (c == '\0') {
155 /* End of string */
156 break;
157 }
158 if (!ND_ISASCII(c)) {
159 c = ND_TOASCII(c);
160 ND_PRINT((ndo, "M-"));
161 }
162 if (!ND_ISPRINT(c)) {
163 c ^= 0x40; /* DEL to ?, others to alpha */
164 ND_PRINT((ndo, "^"));
165 }
166 ND_PRINT((ndo, "%c", c));
167 }
168 return(bytes);
169 }
170
171 /*
172 * Print out a counted filename (or other ascii string).
173 * If ep is NULL, assume no truncation check is needed.
174 * Return true if truncated.
175 * Stop at ep (if given) or after n bytes, whichever is first.
176 */
177 int
178 fn_printn(netdissect_options *ndo,
179 register const u_char *s, register u_int n, register const u_char *ep)
180 {
181 register u_char c;
182
183 while (n > 0 && (ep == NULL || s < ep)) {
184 n--;
185 c = *s++;
186 if (!ND_ISASCII(c)) {
187 c = ND_TOASCII(c);
188 ND_PRINT((ndo, "M-"));
189 }
190 if (!ND_ISPRINT(c)) {
191 c ^= 0x40; /* DEL to ?, others to alpha */
192 ND_PRINT((ndo, "^"));
193 }
194 ND_PRINT((ndo, "%c", c));
195 }
196 return (n == 0) ? 0 : 1;
197 }
198
199 /*
200 * Print out a null-padded filename (or other ascii string).
201 * If ep is NULL, assume no truncation check is needed.
202 * Return true if truncated.
203 * Stop at ep (if given) or after n bytes or before the null char,
204 * whichever is first.
205 */
206 int
207 fn_printzp(netdissect_options *ndo,
208 register const u_char *s, register u_int n,
209 register const u_char *ep)
210 {
211 register int ret;
212 register u_char c;
213
214 ret = 1; /* assume truncated */
215 while (n > 0 && (ep == NULL || s < ep)) {
216 n--;
217 c = *s++;
218 if (c == '\0') {
219 ret = 0;
220 break;
221 }
222 if (!ND_ISASCII(c)) {
223 c = ND_TOASCII(c);
224 ND_PRINT((ndo, "M-"));
225 }
226 if (!ND_ISPRINT(c)) {
227 c ^= 0x40; /* DEL to ?, others to alpha */
228 ND_PRINT((ndo, "^"));
229 }
230 ND_PRINT((ndo, "%c", c));
231 }
232 return (n == 0) ? 0 : ret;
233 }
234
235 /*
236 * Format the timestamp
237 */
238 static char *
239 ts_format(netdissect_options *ndo
240 #ifndef HAVE_PCAP_SET_TSTAMP_PRECISION
241 _U_
242 #endif
243 , int sec, int usec, char *buf)
244 {
245 const char *format;
246
247 #ifdef HAVE_PCAP_SET_TSTAMP_PRECISION
248 switch (ndo->ndo_tstamp_precision) {
249
250 case PCAP_TSTAMP_PRECISION_MICRO:
251 format = "%02d:%02d:%02d.%06u";
252 break;
253
254 case PCAP_TSTAMP_PRECISION_NANO:
255 format = "%02d:%02d:%02d.%09u";
256 break;
257
258 default:
259 format = "%02d:%02d:%02d.{unknown}";
260 break;
261 }
262 #else
263 format = "%02d:%02d:%02d.%06u";
264 #endif
265
266 snprintf(buf, TS_BUF_SIZE, format,
267 sec / 3600, (sec % 3600) / 60, sec % 60, usec);
268
269 return buf;
270 }
271
272 /*
273 * Format the timestamp - Unix timeval style
274 */
275 static char *
276 ts_unix_format(netdissect_options *ndo
277 #ifndef HAVE_PCAP_SET_TSTAMP_PRECISION
278 _U_
279 #endif
280 , int sec, int usec, char *buf)
281 {
282 const char *format;
283
284 #ifdef HAVE_PCAP_SET_TSTAMP_PRECISION
285 switch (ndo->ndo_tstamp_precision) {
286
287 case PCAP_TSTAMP_PRECISION_MICRO:
288 format = "%u.%06u";
289 break;
290
291 case PCAP_TSTAMP_PRECISION_NANO:
292 format = "%u.%09u";
293 break;
294
295 default:
296 format = "%u.{unknown}";
297 break;
298 }
299 #else
300 format = "%u.%06u";
301 #endif
302
303 snprintf(buf, TS_BUF_SIZE, format,
304 (unsigned)sec, (unsigned)usec);
305
306 return buf;
307 }
308
309 /*
310 * Print the timestamp
311 */
312 void
313 ts_print(netdissect_options *ndo,
314 register const struct timeval *tvp)
315 {
316 register int s;
317 struct tm *tm;
318 time_t Time;
319 char buf[TS_BUF_SIZE];
320 static struct timeval tv_ref;
321 struct timeval tv_result;
322 int negative_offset;
323 int nano_prec;
324
325 switch (ndo->ndo_tflag) {
326
327 case 0: /* Default */
328 s = (tvp->tv_sec + thiszone) % 86400;
329 ND_PRINT((ndo, "%s ", ts_format(ndo, s, tvp->tv_usec, buf)));
330 break;
331
332 case 1: /* No time stamp */
333 break;
334
335 case 2: /* Unix timeval style */
336 ND_PRINT((ndo, "%s ", ts_unix_format(ndo,
337 tvp->tv_sec, tvp->tv_usec, buf)));
338 break;
339
340 case 3: /* Microseconds/nanoseconds since previous packet */
341 case 5: /* Microseconds/nanoseconds since first packet */
342 #ifdef HAVE_PCAP_SET_TSTAMP_PRECISION
343 switch (ndo->ndo_tstamp_precision) {
344 case PCAP_TSTAMP_PRECISION_MICRO:
345 nano_prec = 0;
346 break;
347 case PCAP_TSTAMP_PRECISION_NANO:
348 nano_prec = 1;
349 break;
350 default:
351 nano_prec = 0;
352 break;
353 }
354 #else
355 nano_prec = 0;
356 #endif
357 if (!(netdissect_timevalisset(&tv_ref)))
358 tv_ref = *tvp; /* set timestamp for first packet */
359
360 negative_offset = netdissect_timevalcmp(tvp, &tv_ref, <);
361 if (negative_offset)
362 netdissect_timevalsub(&tv_ref, tvp, &tv_result, nano_prec);
363 else
364 netdissect_timevalsub(tvp, &tv_ref, &tv_result, nano_prec);
365
366 ND_PRINT((ndo, (negative_offset ? "-" : " ")));
367
368 ND_PRINT((ndo, "%s ", ts_format(ndo,
369 tv_result.tv_sec, tv_result.tv_usec, buf)));
370
371 if (ndo->ndo_tflag == 3)
372 tv_ref = *tvp; /* set timestamp for previous packet */
373 break;
374
375 case 4: /* Default + Date */
376 s = (tvp->tv_sec + thiszone) % 86400;
377 Time = (tvp->tv_sec + thiszone) - s;
378 tm = gmtime (&Time);
379 if (!tm)
380 ND_PRINT((ndo, "Date fail "));
381 else
382 ND_PRINT((ndo, "%04d-%02d-%02d %s ",
383 tm->tm_year+1900, tm->tm_mon+1, tm->tm_mday,
384 ts_format(ndo, s, tvp->tv_usec, buf)));
385 break;
386 }
387 }
388
389 /*
390 * Print an unsigned relative number of seconds (e.g. hold time, prune timer)
391 * in the form 5m1s. This does no truncation, so 32230861 seconds
392 * is represented as 1y1w1d1h1m1s.
393 */
394 void
395 unsigned_relts_print(netdissect_options *ndo,
396 uint32_t secs)
397 {
398 static const char *lengths[] = {"y", "w", "d", "h", "m", "s"};
399 static const u_int seconds[] = {31536000, 604800, 86400, 3600, 60, 1};
400 const char **l = lengths;
401 const u_int *s = seconds;
402
403 if (secs == 0) {
404 ND_PRINT((ndo, "0s"));
405 return;
406 }
407 while (secs > 0) {
408 if (secs >= *s) {
409 ND_PRINT((ndo, "%d%s", secs / *s, *l));
410 secs -= (secs / *s) * *s;
411 }
412 s++;
413 l++;
414 }
415 }
416
417 /*
418 * Print a signed relative number of seconds (e.g. hold time, prune timer)
419 * in the form 5m1s. This does no truncation, so 32230861 seconds
420 * is represented as 1y1w1d1h1m1s.
421 */
422 void
423 signed_relts_print(netdissect_options *ndo,
424 int32_t secs)
425 {
426 if (secs == -2147483648) {
427 /*
428 * -2^31; you can't fit its absolute value into a 32-bit
429 * signed integer.
430 *
431 * We calculate the right string by hand.
432 */
433 ND_PRINT((ndo, "-68y5w3h14m8s"));
434 return;
435 }
436 if (secs < 0) {
437 /*
438 * We now know -secs will fit into secs.
439 */
440 ND_PRINT((ndo, "-"));
441 secs = -secs;
442 }
443 unsigned_relts_print(ndo, secs);
444 }
445
446 /*
447 * this is a generic routine for printing unknown data;
448 * we pass on the linefeed plus indentation string to
449 * get a proper output - returns 0 on error
450 */
451
452 int
453 print_unknown_data(netdissect_options *ndo, const u_char *cp,const char *ident,int len)
454 {
455 if (len < 0) {
456 ND_PRINT((ndo,"%sDissector error: print_unknown_data called with negative length",
457 ident));
458 return(0);
459 }
460 if (ndo->ndo_snapend - cp < len)
461 len = ndo->ndo_snapend - cp;
462 if (len < 0) {
463 ND_PRINT((ndo,"%sDissector error: print_unknown_data called with pointer past end of packet",
464 ident));
465 return(0);
466 }
467 hex_print(ndo, ident,cp,len);
468 return(1); /* everything is ok */
469 }
470
471 /*
472 * Convert a token value to a string; use "fmt" if not found.
473 */
474 const char *
475 tok2strbuf(register const struct tok *lp, register const char *fmt,
476 register u_int v, char *buf, size_t bufsize)
477 {
478 if (lp != NULL) {
479 while (lp->s != NULL) {
480 if (lp->v == v)
481 return (lp->s);
482 ++lp;
483 }
484 }
485 if (fmt == NULL)
486 fmt = "#%d";
487
488 (void)snprintf(buf, bufsize, fmt, v);
489 return (const char *)buf;
490 }
491
492 /*
493 * Convert a token value to a string; use "fmt" if not found.
494 */
495 const char *
496 tok2str(register const struct tok *lp, register const char *fmt,
497 register u_int v)
498 {
499 static char buf[4][TOKBUFSIZE];
500 static int idx = 0;
501 char *ret;
502
503 ret = buf[idx];
504 idx = (idx+1) & 3;
505 return tok2strbuf(lp, fmt, v, ret, sizeof(buf[0]));
506 }
507
508 /*
509 * Convert a bit token value to a string; use "fmt" if not found.
510 * this is useful for parsing bitfields, the output strings are seperated
511 * if the s field is positive.
512 */
513 static char *
514 bittok2str_internal(register const struct tok *lp, register const char *fmt,
515 register u_int v, const char *sep)
516 {
517 static char buf[256]; /* our stringbuffer */
518 int buflen=0;
519 register u_int rotbit; /* this is the bit we rotate through all bitpositions */
520 register u_int tokval;
521 const char * sepstr = "";
522
523 while (lp != NULL && lp->s != NULL) {
524 tokval=lp->v; /* load our first value */
525 rotbit=1;
526 while (rotbit != 0) {
527 /*
528 * lets AND the rotating bit with our token value
529 * and see if we have got a match
530 */
531 if (tokval == (v&rotbit)) {
532 /* ok we have found something */
533 buflen+=snprintf(buf+buflen, sizeof(buf)-buflen, "%s%s",
534 sepstr, lp->s);
535 sepstr = sep;
536 break;
537 }
538 rotbit=rotbit<<1; /* no match - lets shift and try again */
539 }
540 lp++;
541 }
542
543 if (buflen == 0)
544 /* bummer - lets print the "unknown" message as advised in the fmt string if we got one */
545 (void)snprintf(buf, sizeof(buf), fmt == NULL ? "#%08x" : fmt, v);
546 return (buf);
547 }
548
549 /*
550 * Convert a bit token value to a string; use "fmt" if not found.
551 * this is useful for parsing bitfields, the output strings are not seperated.
552 */
553 char *
554 bittok2str_nosep(register const struct tok *lp, register const char *fmt,
555 register u_int v)
556 {
557 return (bittok2str_internal(lp, fmt, v, ""));
558 }
559
560 /*
561 * Convert a bit token value to a string; use "fmt" if not found.
562 * this is useful for parsing bitfields, the output strings are comma seperated.
563 */
564 char *
565 bittok2str(register const struct tok *lp, register const char *fmt,
566 register u_int v)
567 {
568 return (bittok2str_internal(lp, fmt, v, ", "));
569 }
570
571 /*
572 * Convert a value to a string using an array; the macro
573 * tok2strary() in <netdissect.h> is the public interface to
574 * this function and ensures that the second argument is
575 * correct for bounds-checking.
576 */
577 const char *
578 tok2strary_internal(register const char **lp, int n, register const char *fmt,
579 register int v)
580 {
581 static char buf[TOKBUFSIZE];
582
583 if (v >= 0 && v < n && lp[v] != NULL)
584 return lp[v];
585 if (fmt == NULL)
586 fmt = "#%d";
587 (void)snprintf(buf, sizeof(buf), fmt, v);
588 return (buf);
589 }
590
591 /*
592 * Convert a 32-bit netmask to prefixlen if possible
593 * the function returns the prefix-len; if plen == -1
594 * then conversion was not possible;
595 */
596
597 int
598 mask2plen(uint32_t mask)
599 {
600 uint32_t bitmasks[33] = {
601 0x00000000,
602 0x80000000, 0xc0000000, 0xe0000000, 0xf0000000,
603 0xf8000000, 0xfc000000, 0xfe000000, 0xff000000,
604 0xff800000, 0xffc00000, 0xffe00000, 0xfff00000,
605 0xfff80000, 0xfffc0000, 0xfffe0000, 0xffff0000,
606 0xffff8000, 0xffffc000, 0xffffe000, 0xfffff000,
607 0xfffff800, 0xfffffc00, 0xfffffe00, 0xffffff00,
608 0xffffff80, 0xffffffc0, 0xffffffe0, 0xfffffff0,
609 0xfffffff8, 0xfffffffc, 0xfffffffe, 0xffffffff
610 };
611 int prefix_len = 32;
612
613 /* let's see if we can transform the mask into a prefixlen */
614 while (prefix_len >= 0) {
615 if (bitmasks[prefix_len] == mask)
616 break;
617 prefix_len--;
618 }
619 return (prefix_len);
620 }
621
622 int
623 mask62plen(const u_char *mask)
624 {
625 u_char bitmasks[9] = {
626 0x00,
627 0x80, 0xc0, 0xe0, 0xf0,
628 0xf8, 0xfc, 0xfe, 0xff
629 };
630 int byte;
631 int cidr_len = 0;
632
633 for (byte = 0; byte < 16; byte++) {
634 u_int bits;
635
636 for (bits = 0; bits < (sizeof (bitmasks) / sizeof (bitmasks[0])); bits++) {
637 if (mask[byte] == bitmasks[bits]) {
638 cidr_len += bits;
639 break;
640 }
641 }
642
643 if (mask[byte] != 0xff)
644 break;
645 }
646 return (cidr_len);
647 }
648
649 /*
650 * Routine to print out information for text-based protocols such as FTP,
651 * HTTP, SMTP, RTSP, SIP, ....
652 */
653 #define MAX_TOKEN 128
654
655 /*
656 * Fetch a token from a packet, starting at the specified index,
657 * and return the length of the token.
658 *
659 * Returns 0 on error; yes, this is indistinguishable from an empty
660 * token, but an "empty token" isn't a valid token - it just means
661 * either a space character at the beginning of the line (this
662 * includes a blank line) or no more tokens remaining on the line.
663 */
664 static int
665 fetch_token(netdissect_options *ndo, const u_char *pptr, u_int idx, u_int len,
666 u_char *tbuf, size_t tbuflen)
667 {
668 size_t toklen = 0;
669
670 for (; idx < len; idx++) {
671 if (!ND_TTEST(*(pptr + idx))) {
672 /* ran past end of captured data */
673 return (0);
674 }
675 if (!isascii(*(pptr + idx))) {
676 /* not an ASCII character */
677 return (0);
678 }
679 if (isspace(*(pptr + idx))) {
680 /* end of token */
681 break;
682 }
683 if (!isprint(*(pptr + idx))) {
684 /* not part of a command token or response code */
685 return (0);
686 }
687 if (toklen + 2 > tbuflen) {
688 /* no room for this character and terminating '\0' */
689 return (0);
690 }
691 tbuf[toklen] = *(pptr + idx);
692 toklen++;
693 }
694 if (toklen == 0) {
695 /* no token */
696 return (0);
697 }
698 tbuf[toklen] = '\0';
699
700 /*
701 * Skip past any white space after the token, until we see
702 * an end-of-line (CR or LF).
703 */
704 for (; idx < len; idx++) {
705 if (!ND_TTEST(*(pptr + idx))) {
706 /* ran past end of captured data */
707 break;
708 }
709 if (*(pptr + idx) == '\r' || *(pptr + idx) == '\n') {
710 /* end of line */
711 break;
712 }
713 if (!isascii(*(pptr + idx)) || !isprint(*(pptr + idx))) {
714 /* not a printable ASCII character */
715 break;
716 }
717 if (!isspace(*(pptr + idx))) {
718 /* beginning of next token */
719 break;
720 }
721 }
722 return (idx);
723 }
724
725 /*
726 * Scan a buffer looking for a line ending - LF or CR-LF.
727 * Return the index of the character after the line ending or 0 if
728 * we encounter a non-ASCII or non-printable character or don't find
729 * the line ending.
730 */
731 static u_int
732 print_txt_line(netdissect_options *ndo, const char *protoname,
733 const char *prefix, const u_char *pptr, u_int idx, u_int len)
734 {
735 u_int startidx;
736 u_int linelen;
737
738 startidx = idx;
739 while (idx < len) {
740 ND_TCHECK(*(pptr+idx));
741 if (*(pptr+idx) == '\n') {
742 /*
743 * LF without CR; end of line.
744 * Skip the LF and print the line, with the
745 * exception of the LF.
746 */
747 linelen = idx - startidx;
748 idx++;
749 goto print;
750 } else if (*(pptr+idx) == '\r') {
751 /* CR - any LF? */
752 if ((idx+1) >= len) {
753 /* not in this packet */
754 return (0);
755 }
756 ND_TCHECK(*(pptr+idx+1));
757 if (*(pptr+idx+1) == '\n') {
758 /*
759 * CR-LF; end of line.
760 * Skip the CR-LF and print the line, with
761 * the exception of the CR-LF.
762 */
763 linelen = idx - startidx;
764 idx += 2;
765 goto print;
766 }
767
768 /*
769 * CR followed by something else; treat this
770 * as if it were binary data, and don't print
771 * it.
772 */
773 return (0);
774 } else if (!isascii(*(pptr+idx)) ||
775 (!isprint(*(pptr+idx)) && *(pptr+idx) != '\t')) {
776 /*
777 * Not a printable ASCII character and not a tab;
778 * treat this as if it were binary data, and
779 * don't print it.
780 */
781 return (0);
782 }
783 idx++;
784 }
785
786 /*
787 * All printable ASCII, but no line ending after that point
788 * in the buffer; treat this as if it were truncated.
789 */
790 trunc:
791 linelen = idx - startidx;
792 ND_PRINT((ndo, "%s%.*s[!%s]", prefix, (int)linelen, pptr + startidx,
793 protoname));
794 return (0);
795
796 print:
797 ND_PRINT((ndo, "%s%.*s", prefix, (int)linelen, pptr + startidx));
798 return (idx);
799 }
800
801 void
802 txtproto_print(netdissect_options *ndo, const u_char *pptr, u_int len,
803 const char *protoname, const char **cmds, u_int flags)
804 {
805 u_int idx, eol;
806 u_char token[MAX_TOKEN+1];
807 const char *cmd;
808 int is_reqresp = 0;
809 const char *pnp;
810
811 if (cmds != NULL) {
812 /*
813 * This protocol has more than just request and
814 * response lines; see whether this looks like a
815 * request or response.
816 */
817 idx = fetch_token(ndo, pptr, 0, len, token, sizeof(token));
818 if (idx != 0) {
819 /* Is this a valid request name? */
820 while ((cmd = *cmds++) != NULL) {
821 if (ascii_strcasecmp((const char *)token, cmd) == 0) {
822 /* Yes. */
823 is_reqresp = 1;
824 break;
825 }
826 }
827
828 /*
829 * No - is this a valid response code (3 digits)?
830 *
831 * Is this token the response code, or is the next
832 * token the response code?
833 */
834 if (flags & RESP_CODE_SECOND_TOKEN) {
835 /*
836 * Next token - get it.
837 */
838 idx = fetch_token(ndo, pptr, idx, len, token,
839 sizeof(token));
840 }
841 if (idx != 0) {
842 if (isdigit(token[0]) && isdigit(token[1]) &&
843 isdigit(token[2]) && token[3] == '\0') {
844 /* Yes. */
845 is_reqresp = 1;
846 }
847 }
848 }
849 } else {
850 /*
851 * This protocol has only request and response lines
852 * (e.g., FTP, where all the data goes over a
853 * different connection); assume the payload is
854 * a request or response.
855 */
856 is_reqresp = 1;
857 }
858
859 /* Capitalize the protocol name */
860 for (pnp = protoname; *pnp != '\0'; pnp++)
861 ND_PRINT((ndo, "%c", toupper((u_char)*pnp)));
862
863 if (is_reqresp) {
864 /*
865 * In non-verbose mode, just print the protocol, followed
866 * by the first line as the request or response info.
867 *
868 * In verbose mode, print lines as text until we run out
869 * of characters or see something that's not a
870 * printable-ASCII line.
871 */
872 if (ndo->ndo_vflag) {
873 /*
874 * We're going to print all the text lines in the
875 * request or response; just print the length
876 * on the first line of the output.
877 */
878 ND_PRINT((ndo, ", length: %u", len));
879 for (idx = 0;
880 idx < len && (eol = print_txt_line(ndo, protoname, "\n\t", pptr, idx, len)) != 0;
881 idx = eol)
882 ;
883 } else {
884 /*
885 * Just print the first text line.
886 */
887 print_txt_line(ndo, protoname, ": ", pptr, 0, len);
888 }
889 }
890 }
891
892 void
893 safeputs(netdissect_options *ndo,
894 const u_char *s, const u_int maxlen)
895 {
896 u_int idx = 0;
897
898 while (*s && idx < maxlen) {
899 safeputchar(ndo, *s);
900 idx++;
901 s++;
902 }
903 }
904
905 void
906 safeputchar(netdissect_options *ndo,
907 const u_char c)
908 {
909 ND_PRINT((ndo, (c < 0x80 && ND_ISPRINT(c)) ? "%c" : "\\0x%02x", c));
910 }
911
912 #ifdef LBL_ALIGN
913 /*
914 * Some compilers try to optimize memcpy(), using the alignment constraint
915 * on the argument pointer type. by using this function, we try to avoid the
916 * optimization.
917 */
918 void
919 unaligned_memcpy(void *p, const void *q, size_t l)
920 {
921 memcpy(p, q, l);
922 }
923
924 /* As with memcpy(), so with memcmp(). */
925 int
926 unaligned_memcmp(const void *p, const void *q, size_t l)
927 {
928 return (memcmp(p, q, l));
929 }
930 #endif
931