X-Git-Url: https://git.tcpdump.org/tcpdump/blobdiff_plain/3824a6c0417a551961d1a1bf4f94f10eff736afc..a63600a1fc28dbc7ae7ce9f996829c49a25fb33c:/print-chdlc.c diff --git a/print-chdlc.c b/print-chdlc.c index 786aec36..7450f357 100644 --- a/print-chdlc.c +++ b/print-chdlc.c @@ -19,163 +19,179 @@ * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. */ +/* \summary: Cisco HDLC printer */ #ifdef HAVE_CONFIG_H -#include "config.h" +#include #endif -#include +#include "netdissect-stdinc.h" -#include -#include - -#include "interface.h" +#define ND_LONGJMP_FROM_TCHECK +#include "netdissect.h" #include "addrtoname.h" #include "ethertype.h" #include "extract.h" -#include "ppp.h" #include "chdlc.h" +#include "nlpid.h" + +static void chdlc_slarp_print(netdissect_options *, const u_char *, u_int); + +static const struct tok chdlc_cast_values[] = { + { CHDLC_UNICAST, "unicast" }, + { CHDLC_BCAST, "bcast" }, + { 0, NULL} +}; -#ifndef lint -static const char rcsid[] _U_ = - "@(#) $Header: /tcpdump/master/tcpdump/print-chdlc.c,v 1.29 2003-11-15 00:39:18 guy Exp $ (LBL)"; -#endif -static void chdlc_slarp_print(const u_char *, u_int); /* Standard CHDLC printer */ -u_int -chdlc_if_print(const struct pcap_pkthdr *h, register const u_char *p) +void +chdlc_if_print(netdissect_options *ndo, const struct pcap_pkthdr *h, const u_char *p) { - register u_int length = h->len; - register u_int caplen = h->caplen; - const struct ip *ip; - u_int proto; + ndo->ndo_protocol = "chdlc"; + ND_TCHECK_LEN(p, CHDLC_HDRLEN); + ndo->ndo_ll_hdr_len += CHDLC_HDRLEN; + chdlc_print(ndo, p, h->len); +} - if (caplen < CHDLC_HDRLEN) { - printf("[|chdlc]"); - return (caplen); - } +void +chdlc_print(netdissect_options *ndo, const u_char *p, u_int length) +{ + u_int proto; - proto = EXTRACT_16BITS(&p[2]); - if (eflag) { - switch (p[0]) { - case CHDLC_UNICAST: - printf("unicast "); - break; - case CHDLC_BCAST: - printf("bcast "); - break; - default: - printf("0x%02x ", p[0]); - break; - } - printf("%d %04x: ", length, proto); + ndo->ndo_protocol = "chdlc"; + ND_ICHECK_U(length, <, CHDLC_HDRLEN); + proto = GET_BE_U_2(p + 2); + if (ndo->ndo_eflag) { + ND_PRINT("%s, ethertype %s (0x%04x), length %u: ", + tok2str(chdlc_cast_values, "0x%02x", GET_U_1(p)), + tok2str(ethertype_values, "Unknown", proto), + proto, + length); } length -= CHDLC_HDRLEN; - ip = (const struct ip *)(p + CHDLC_HDRLEN); + p += CHDLC_HDRLEN; + switch (proto) { case ETHERTYPE_IP: - ip_print((const u_char *)ip, length); + ip_print(ndo, p, length); break; -#ifdef INET6 case ETHERTYPE_IPV6: - ip6_print((const u_char *)ip, length); + ip6_print(ndo, p, length); break; -#endif case CHDLC_TYPE_SLARP: - chdlc_slarp_print((const u_char *)ip, length); - break; -#if 0 - case CHDLC_TYPE_CDP: - chdlc_cdp_print((const u_char *)ip, length); + chdlc_slarp_print(ndo, p, length); break; -#endif case ETHERTYPE_MPLS: case ETHERTYPE_MPLS_MULTI: - mpls_print((const u_char *)(ip), length); + mpls_print(ndo, p, length); break; case ETHERTYPE_ISO: /* is the fudge byte set ? lets verify by spotting ISO headers */ - if (*(p+CHDLC_HDRLEN+1) == 0x81 || - *(p+CHDLC_HDRLEN+1) == 0x82 || - *(p+CHDLC_HDRLEN+1) == 0x83) - isoclns_print(p+CHDLC_HDRLEN+1, length-1, length-1); + ND_ICHECK_U(length, <, 2); + if (GET_U_1(p + 1) == NLPID_CLNP || + GET_U_1(p + 1) == NLPID_ESIS || + GET_U_1(p + 1) == NLPID_ISIS) + isoclns_print(ndo, p + 1, length - 1); else - isoclns_print(p+CHDLC_HDRLEN, length, length); + isoclns_print(ndo, p, length); break; default: - printf("unknown CHDLC protocol (0x%04x)", proto); + if (!ndo->ndo_eflag) + ND_PRINT("unknown CHDLC protocol (0x%04x)", proto); break; } - return (CHDLC_HDRLEN); + return; + +invalid: + nd_print_invalid(ndo); } +/* + * The fixed-length portion of a SLARP packet. + */ struct cisco_slarp { - u_int32_t code; + nd_uint32_t code; #define SLARP_REQUEST 0 #define SLARP_REPLY 1 #define SLARP_KEEPALIVE 2 union { struct { - struct in_addr addr; - struct in_addr mask; - u_int16_t unused[3]; + uint8_t addr[4]; + uint8_t mask[4]; } addr; struct { - u_int32_t myseq; - u_int32_t yourseq; - u_int16_t rel; - u_int16_t t1; - u_int16_t t2; + nd_uint32_t myseq; + nd_uint32_t yourseq; + nd_uint16_t rel; } keep; } un; }; -#define SLARP_LEN 18 +#define SLARP_MIN_LEN 14 +#define SLARP_MAX_LEN 18 static void -chdlc_slarp_print(const u_char *cp, u_int length) +chdlc_slarp_print(netdissect_options *ndo, const u_char *cp, u_int length) { const struct cisco_slarp *slarp; + u_int sec,min,hrs,days; - if (length < SLARP_LEN) { - printf("[|slarp]"); - return; - } + ndo->ndo_protocol = "chdlc_slarp"; + ND_PRINT("SLARP"); + ND_ICHECK_U(length, <, SLARP_MIN_LEN); + ND_PRINT(" (length: %u), ",length); slarp = (const struct cisco_slarp *)cp; - printf("SLARP (length: %u), ",length); - switch (EXTRACT_32BITS(&slarp->code)) { + ND_TCHECK_LEN(slarp, SLARP_MIN_LEN); + switch (GET_BE_U_4(slarp->code)) { case SLARP_REQUEST: - printf("request"); - /* ok we do not know it - but lets at least dump it */ - print_unknown_data(cp+4,"\n\t",length-4); + ND_PRINT("request"); + /* + * At least according to William "Chops" Westfield's + * message in + * + * https://web.archive.org/web/20190725151313/www.nethelp.no/net/cisco-hdlc.txt + * + * the address and mask aren't used in requests - + * they're just zero. + */ break; case SLARP_REPLY: - printf("reply %s/%s", - ipaddr_string(&slarp->un.addr.addr), - ipaddr_string(&slarp->un.addr.mask)); + ND_PRINT("reply %s/%s", + GET_IPADDR_STRING(slarp->un.addr.addr), + GET_IPADDR_STRING(slarp->un.addr.mask)); break; case SLARP_KEEPALIVE: - printf("keepalive: mineseen=0x%08x, yourseen=0x%08x", - EXTRACT_32BITS(&slarp->un.keep.myseq), - EXTRACT_32BITS(&slarp->un.keep.yourseq)); - printf(", reliability=0x%04x, t1=%d.%d", - EXTRACT_16BITS(&slarp->un.keep.rel), - EXTRACT_16BITS(&slarp->un.keep.t1), - EXTRACT_16BITS(&slarp->un.keep.t2)); + ND_PRINT("keepalive: mineseen=0x%08x, yourseen=0x%08x, reliability=0x%04x", + GET_BE_U_4(slarp->un.keep.myseq), + GET_BE_U_4(slarp->un.keep.yourseq), + GET_BE_U_2(slarp->un.keep.rel)); + + if (length >= SLARP_MAX_LEN) { /* uptime-stamp is optional */ + cp += SLARP_MIN_LEN; + sec = GET_BE_U_4(cp) / 1000; + min = sec / 60; sec -= min * 60; + hrs = min / 60; min -= hrs * 60; + days = hrs / 24; hrs -= days * 24; + ND_PRINT(", link uptime=%ud%uh%um%us",days,hrs,min,sec); + } break; default: - printf("0x%02x unknown", EXTRACT_32BITS(&slarp->code)); - if (vflag <= 1) - print_unknown_data(cp+4,"\n\t",length-4); + ND_PRINT("0x%02x unknown", GET_BE_U_4(slarp->code)); + if (ndo->ndo_vflag <= 1) + print_unknown_data(ndo,cp+4,"\n\t",length-4); break; } - if (SLARP_LEN < length && vflag) - printf(", (trailing junk: %d bytes)", length - SLARP_LEN); - if (vflag > 1) - print_unknown_data(cp+4,"\n\t",length-4); + if (SLARP_MAX_LEN < length && ndo->ndo_vflag) + ND_PRINT(", (trailing junk: %u bytes)", length - SLARP_MAX_LEN); + if (ndo->ndo_vflag > 1) + print_unknown_data(ndo,cp+4,"\n\t",length-4); + return; + +invalid: + nd_print_invalid(ndo); }