]> The Tcpdump Group git mirrors - tcpdump/blobdiff - print-null.c
CI: Add warning exemptions for Sun C (suncc-5.14) on Solaris 10
[tcpdump] / print-null.c
index 13035720b1316f06ff6a103df7ec9d882c0c05c7..725d583939afbae752c0866cd96c6eed17e7460b 100644 (file)
  * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
  */
 
-#ifndef lint
-static const char rcsid[] =
-    "@(#) $Header: /tcpdump/master/tcpdump/print-null.c,v 1.25 1999-10-17 21:37:14 mcr Exp $ (LBL)";
-#endif
-
-#include <sys/param.h>
-#include <sys/time.h>
-#include <sys/socket.h>
-#include <sys/file.h>
-#include <sys/ioctl.h>
-
-#if __STDC__
-struct mbuf;
-struct rtentry;
-#endif
-#include <net/if.h>
-
-#include <netinet/in.h>
-#include <netinet/in_systm.h>
-#include <netinet/ip.h>
-#include <netinet/if_ether.h>
-#include <netinet/udp.h>
-#include <netinet/tcp.h>
-
-#include <pcap.h>
-#include <stdio.h>
-#include <string.h>
-
-#include "interface.h"
-#include "addrtoname.h"
-
-#ifndef AF_NS
-#define AF_NS          6               /* XEROX NS protocols */
-#endif
+/* \summary: BSD loopback device printer */
+
+#include <config.h>
+
+#include "netdissect-stdinc.h"
+
+#define ND_LONGJMP_FROM_TCHECK
+#include "netdissect.h"
+#include "extract.h"
+#include "af.h"
+
 
 /*
- * The DLT_NULL packet header is 4 bytes long. It contains a network
- * order 32 bit integer that specifies the family, e.g. AF_INET
+ * The DLT_NULL packet header is 4 bytes long. It contains a host-byte-order
+ * 32-bit integer that specifies the family, e.g. AF_INET.
+ *
+ * Note here that "host" refers to the host on which the packets were
+ * captured; that isn't necessarily *this* host.
+ *
+ * The OpenBSD DLT_LOOP packet header is the same, except that the integer
+ * is in network byte order.
  */
 #define        NULL_HDRLEN 4
 
+/*
+ * Byte-swap a 32-bit number.
+ * ("htonl()" or "ntohl()" won't work - we want to byte-swap even on
+ * big-endian platforms.)
+ */
+#define        SWAPLONG(y) \
+((((y)&0xff)<<24) | (((y)&0xff00)<<8) | (((y)&0xff0000)>>8) | (((y)>>24)&0xff))
+
 static void
-null_print(const u_char *p, const struct ip *ip, u_int length)
+null_hdr_print(netdissect_options *ndo, uint32_t family, u_int length)
 {
-       u_int family;
-
-       memcpy((char *)&family, (char *)p, sizeof(family));
-
-       if (nflag) {
-               /* XXX just dump the header */
-               return;
+       if (!ndo->ndo_qflag) {
+               ND_PRINT("AF %s (%u)",
+                       tok2str(bsd_af_values,"Unknown",family),family);
+       } else {
+               ND_PRINT("%s",
+                       tok2str(bsd_af_values,"Unknown AF %u",family));
        }
-       switch (family) {
-
-       case AF_INET:
-               printf("ip: ");
-               break;
 
-       case AF_NS:
-               printf("ns: ");
-               break;
-
-       default:
-               printf("AF %d: ", family);
-               break;
-       }
+       ND_PRINT(", length %u: ", length);
 }
 
+/*
+ * This is the top level routine of the printer.  'p' points
+ * to the ether header of the packet, 'h->ts' is the timestamp,
+ * 'h->len' is the length of the packet off the wire, and 'h->caplen'
+ * is the number of bytes actually captured.
+ */
 void
-null_if_print(u_char *user, const struct pcap_pkthdr *h, const u_char *p)
+null_if_print(netdissect_options *ndo, const struct pcap_pkthdr *h, const u_char *p)
 {
        u_int length = h->len;
        u_int caplen = h->caplen;
-       const struct ip *ip;
+       uint32_t family;
 
-       ts_print(&h->ts);
+       ndo->ndo_protocol = "null";
+       ND_TCHECK_LEN(p, NULL_HDRLEN);
+       ndo->ndo_ll_hdr_len += NULL_HDRLEN;
+
+       family = GET_HE_U_4(p);
 
        /*
-        * Some printers want to get back at the link level addresses,
-        * and/or check that they're not walking off the end of the packet.
-        * Rather than pass them all the way down, we set these globals.
+        * This isn't necessarily in our host byte order; if this is
+        * a DLT_LOOP capture, it's in network byte order, and if
+        * this is a DLT_NULL capture from a machine with the opposite
+        * byte-order, it's in the opposite byte order from ours.
+        *
+        * If the upper 16 bits aren't all zero, assume it's byte-swapped.
         */
-       packetp = p;
-       snapend = p + caplen;
+       if ((family & 0xFFFF0000) != 0)
+               family = SWAPLONG(family);
+
+       if (ndo->ndo_eflag)
+               null_hdr_print(ndo, family, length);
 
        length -= NULL_HDRLEN;
+       caplen -= NULL_HDRLEN;
+       p += NULL_HDRLEN;
 
-       ip = (struct ip *)(p + NULL_HDRLEN);
+       switch (family) {
 
-       if (eflag)
-               null_print(p, ip, length);
+       case BSD_AF_INET:
+               ip_print(ndo, p, length);
+               break;
 
-       ip_print((const u_char *)ip, length);
+       case BSD_AF_INET6_BSD:
+       case BSD_AF_INET6_FREEBSD:
+       case BSD_AF_INET6_DARWIN:
+               ip6_print(ndo, p, length);
+               break;
 
-       if (xflag)
-               default_print((const u_char *)ip, caplen - NULL_HDRLEN);
-       putchar('\n');
-}
+       case BSD_AF_ISO:
+               isoclns_print(ndo, p, length);
+               break;
+
+       case BSD_AF_APPLETALK:
+               atalk_print(ndo, p, length);
+               break;
+
+       case BSD_AF_IPX:
+               ipx_print(ndo, p, length);
+               break;
 
+       default:
+               /* unknown AF_ value */
+               if (!ndo->ndo_eflag)
+                       null_hdr_print(ndo, family, length + NULL_HDRLEN);
+               if (!ndo->ndo_suppress_default_print)
+                       ND_DEFAULTPRINT(p, caplen);
+       }
+}