X-Git-Url: https://git.tcpdump.org/tcpdump/blobdiff_plain/052094d865be2d613f1e0ec7c220f9e4d38a0b22..refs/pull/482/head:/print-ipnet.c diff --git a/print-ipnet.c b/print-ipnet.c index d60d981b..7fb2e77a 100644 --- a/print-ipnet.c +++ b/print-ipnet.c @@ -2,27 +2,34 @@ #include "config.h" #endif -#include - -#include -#include +#include #include "netdissect.h" -#include "addrtoname.h" -#include "ipnet.h" -#ifdef DLT_IPNET +typedef struct ipnet_hdr { + uint8_t iph_version; + uint8_t iph_family; + uint16_t iph_htype; + uint32_t iph_pktlen; + uint32_t iph_ifindex; + uint32_t iph_grifindex; + uint32_t iph_zsrc; + uint32_t iph_zdst; +} ipnet_hdr_t; -int ipnet_encap_print(netdissect_options *,u_short, const u_char *, u_int, u_int); +#define IPH_AF_INET 2 /* Matches Solaris's AF_INET */ +#define IPH_AF_INET6 26 /* Matches Solaris's AF_INET6 */ + +#ifdef DLT_IPNET -const struct tok ipnet_values[] = { +static const struct tok ipnet_values[] = { { IPH_AF_INET, "IPv4" }, { IPH_AF_INET6, "IPv6" }, { 0, NULL } }; static inline void -ipnet_hdr_print(struct netdissect_options *ndo, const u_char *bp, u_int length) +ipnet_hdr_print(netdissect_options *ndo, const u_char *bp, u_int length) { const ipnet_hdr_t *hdr; hdr = (const ipnet_hdr_t *)bp; @@ -44,10 +51,10 @@ ipnet_hdr_print(struct netdissect_options *ndo, const u_char *bp, u_int length) ND_PRINT((ndo, ", length %u: ", length)); } -void -ipnet_print(struct netdissect_options *ndo, const u_char *p, u_int length, u_int caplen) +static void +ipnet_print(netdissect_options *ndo, const u_char *p, u_int length, u_int caplen) { - ipnet_hdr_t *hdr; + const ipnet_hdr_t *hdr; if (caplen < sizeof(ipnet_hdr_t)) { ND_PRINT((ndo, "[|ipnet]")); @@ -59,17 +66,28 @@ ipnet_print(struct netdissect_options *ndo, const u_char *p, u_int length, u_int length -= sizeof(ipnet_hdr_t); caplen -= sizeof(ipnet_hdr_t); - hdr = (ipnet_hdr_t *)p; + hdr = (const ipnet_hdr_t *)p; p += sizeof(ipnet_hdr_t); - if (ipnet_encap_print(ndo, hdr->iph_family, p, length, caplen) == 0) { + switch (hdr->iph_family) { + + case IPH_AF_INET: + ip_print(ndo, p, length); + break; + + case IPH_AF_INET6: + ip6_print(ndo, p, length); + break; + + default: if (!ndo->ndo_eflag) - ipnet_hdr_print(ndo, (u_char *)hdr, + ipnet_hdr_print(ndo, (const u_char *)hdr, length + sizeof(ipnet_hdr_t)); if (!ndo->ndo_suppress_default_print) - ndo->ndo_default_print(ndo, p, caplen); - } + ND_DEFAULTPRINT(p, caplen); + break; + } } /* @@ -79,49 +97,14 @@ ipnet_print(struct netdissect_options *ndo, const u_char *p, u_int length, u_int * is the number of bytes actually captured. */ u_int -ipnet_if_print(struct netdissect_options *ndo, const struct pcap_pkthdr *h, const u_char *p) +ipnet_if_print(netdissect_options *ndo, + const struct pcap_pkthdr *h, const u_char *p) { ipnet_print(ndo, p, h->len, h->caplen); return (sizeof(ipnet_hdr_t)); } -/* - * Prints the packet encapsulated in an Ethernet data segment - * (or an equivalent encapsulation), given the Ethernet type code. - * - * Returns non-zero if it can do so, zero if the ethertype is unknown. - * - * The Ethernet type code is passed through a pointer; if it was - * ETHERTYPE_8021Q, it gets updated to be the Ethernet type of - * the 802.1Q payload, for the benefit of lower layers that might - * want to know what it is. - */ - -int -ipnet_encap_print(struct netdissect_options *ndo, u_short family, const u_char *p, - u_int length, u_int caplen) -{ - recurse: - - switch (family) { - - case IPH_AF_INET: - ip_print(ndo, p, length); - return (1); - -#ifdef INET6 - case IPH_AF_INET6: - ip6_print(p, length); - return (1); -#endif /*INET6*/ - - default: - return(0); - } -} - - /* * Local Variables: * c-style: whitesmith