#include "extract.h"
#include "addrtoname.h"
-static const char control_tstr[] = " [|lwapp_control]";
-static const char data_tstr[] = " [|lwapp_data]";
/*
* LWAPP transport (common) header
u_int tlen;
u_int msg_type, msg_tlen;
+ ndo->ndo_protocol = "lwapp_control";
tptr=pptr;
if (has_ap_ident) {
lwapp_trans_header = (const struct lwapp_transport_header *)pptr;
}
ND_TCHECK_SIZE(lwapp_trans_header);
- version = EXTRACT_U_1(lwapp_trans_header->version);
+ version = GET_U_1(lwapp_trans_header->version);
/*
* Sanity checking of the header.
}
/* ok they seem to want to know everything - lets fully decode it */
- tlen=EXTRACT_BE_U_2(lwapp_trans_header->length);
+ tlen=GET_BE_U_2(lwapp_trans_header->length);
ND_PRINT("LWAPPv%u, %s frame, Radio-id %u, Flags [%s], Frag-id %u, length %u",
LWAPP_EXTRACT_VERSION(version),
LWAPP_EXTRACT_CONTROL_BIT(version) ? "Control" : "Data",
LWAPP_EXTRACT_RID(version),
bittok2str(lwapp_header_bits_values,"none",version&0x07),
- EXTRACT_U_1(lwapp_trans_header->frag_id),
+ GET_U_1(lwapp_trans_header->frag_id),
tlen);
if (has_ap_ident) {
- ND_PRINT("\n\tAP identity: %s", etheraddr_string(ndo, tptr));
+ ND_PRINT("\n\tAP identity: %s", GET_ETHERADDR_STRING(tptr));
tptr+=sizeof(struct lwapp_transport_header)+6;
} else {
tptr+=sizeof(struct lwapp_transport_header);
}
lwapp_control_header = (const struct lwapp_control_header *)tptr;
- msg_tlen = EXTRACT_BE_U_2(lwapp_control_header->len);
+ msg_tlen = GET_BE_U_2(lwapp_control_header->len);
if (tlen < sizeof(struct lwapp_control_header) + msg_tlen) {
ND_PRINT("\n\t Msg goes past end of PDU");
break;
}
/* print message header */
- msg_type = EXTRACT_U_1(lwapp_control_header->msg_type);
+ msg_type = GET_U_1(lwapp_control_header->msg_type);
ND_PRINT("\n\t Msg type: %s (%u), Seqnum: %u, Msg len: %u, Session: 0x%08x",
tok2str(lwapp_msg_type_values,"Unknown",msg_type),
msg_type,
- EXTRACT_U_1(lwapp_control_header->seq_num),
+ GET_U_1(lwapp_control_header->seq_num),
msg_tlen,
- EXTRACT_BE_U_4(lwapp_control_header->session_id));
+ GET_BE_U_4(lwapp_control_header->session_id));
/* did we capture enough for fully decoding the message */
ND_TCHECK_LEN(tptr, msg_tlen);
return;
trunc:
- ND_PRINT("%s", control_tstr);
+ nd_print_trunc(ndo);
}
void
u_int tlen;
u_int version;
+ ndo->ndo_protocol = "lwapp_data";
tptr=pptr;
/* check if enough bytes for AP identity */
ND_TCHECK_6(tptr);
lwapp_trans_header = (const struct lwapp_transport_header *)pptr;
ND_TCHECK_SIZE(lwapp_trans_header);
- version = EXTRACT_U_1(lwapp_trans_header->version);
+ version = GET_U_1(lwapp_trans_header->version);
/*
* Sanity checking of the header.
}
/* ok they seem to want to know everything - lets fully decode it */
- tlen=EXTRACT_BE_U_2(lwapp_trans_header->length);
+ tlen=GET_BE_U_2(lwapp_trans_header->length);
if (tlen < sizeof(struct lwapp_transport_header)) {
ND_PRINT("LWAPPv%u, %s frame, Radio-id %u, Flags [%s], length %u < transport header length",
LWAPP_EXTRACT_VERSION(version),
LWAPP_EXTRACT_CONTROL_BIT(version) ? "Control" : "Data",
LWAPP_EXTRACT_RID(version),
bittok2str(lwapp_header_bits_values,"none",version&0x07),
- EXTRACT_U_1(lwapp_trans_header->frag_id),
+ GET_U_1(lwapp_trans_header->frag_id),
tlen);
tptr+=sizeof(struct lwapp_transport_header);
return;
trunc:
- ND_PRINT("%s", data_tstr);
+ nd_print_trunc(ndo);
}
-
-/*
- * Local Variables:
- * c-style: whitesmith
- * c-basic-offset: 8
- * End:
- */