X-Git-Url: https://git.tcpdump.org/tcpdump/blobdiff_plain/8d35bf0e1cf45929761c0b20480a91fc4be9f0a5..1a04b92e365f5ed01ca38619b41bcc4fc9cbd63c:/print-token.c diff --git a/print-token.c b/print-token.c index 3f1f44ba..ff2a3841 100644 --- a/print-token.c +++ b/print-token.c @@ -23,74 +23,116 @@ * Further tweaked to more closely resemble print-fddi.c * Guy Harris */ -#ifndef lint -static const char rcsid[] = - "@(#) $Header: /tcpdump/master/tcpdump/print-token.c,v 1.11 2000-12-23 20:48:13 guy Exp $"; -#endif + +/* \summary: Token Ring printer */ #ifdef HAVE_CONFIG_H #include "config.h" #endif -#include -#include -#include +#include -#include - -#include -#include #include -#include "interface.h" +#include "netdissect.h" +#include "extract.h" #include "addrtoname.h" -#include "ethertype.h" -#include "ether.h" -#include "token.h" +/* + * Copyright (c) 1998, Larry Lile + * All rights reserved. + * + * Redistribution and use in source and binary forms, with or without + * modification, are permitted provided that the following conditions + * are met: + * 1. Redistributions of source code must retain the above copyright + * notice unmodified, this list of conditions, and the following + * disclaimer. + * 2. Redistributions in binary form must reproduce the above copyright + * notice, this list of conditions and the following disclaimer in the + * documentation and/or other materials provided with the distribution. + * + * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND + * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE + * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE + * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE + * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL + * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS + * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) + * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT + * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY + * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF + * SUCH DAMAGE. + * + */ + +#define TOKEN_HDRLEN 14 +#define ROUTING_SEGMENT_MAX 16 +#define IS_SOURCE_ROUTED(trp) ((trp)->token_shost[0] & 0x80) +#define FRAME_TYPE(trp) ((EXTRACT_U_1((trp)->token_fc) & 0xC0) >> 6) +#define TOKEN_FC_LLC 1 + +#define BROADCAST(trp) ((EXTRACT_BE_U_2((trp)->token_rcf) & 0xE000) >> 13) +#define RIF_LENGTH(trp) ((EXTRACT_BE_U_2((trp)->token_rcf) & 0x1f00) >> 8) +#define DIRECTION(trp) ((EXTRACT_BE_U_2((trp)->token_rcf) & 0x0080) >> 7) +#define LARGEST_FRAME(trp) ((EXTRACT_BE_U_2((trp)->token_rcf) & 0x0070) >> 4) +#define RING_NUMBER(trp, x) ((EXTRACT_BE_U_2((trp)->token_rseg[x]) & 0xfff0) >> 4) +#define BRIDGE_NUMBER(trp, x) ((EXTRACT_BE_U_2((trp)->token_rseg[x]) & 0x000f)) +#define SEGMENT_COUNT(trp) ((int)((RIF_LENGTH(trp) - 2) / 2)) + +struct token_header { + nd_uint8_t token_ac; + nd_uint8_t token_fc; + nd_mac_addr token_dhost; + nd_mac_addr token_shost; + nd_uint16_t token_rcf; + nd_uint16_t token_rseg[ROUTING_SEGMENT_MAX]; +}; + +static const char tstr[] = "[|token-ring]"; /* Extract src, dst addresses */ static inline void extract_token_addrs(const struct token_header *trp, char *fsrc, char *fdst) { - memcpy(fdst, (char *)trp->token_dhost, 6); - memcpy(fsrc, (char *)trp->token_shost, 6); + memcpy(fdst, (const char *)trp->token_dhost, 6); + memcpy(fsrc, (const char *)trp->token_shost, 6); } /* * Print the TR MAC header */ static inline void -token_print(register const struct token_header *trp, register u_int length, - register const u_char *fsrc, register const u_char *fdst) +token_hdr_print(netdissect_options *ndo, + const struct token_header *trp, u_int length, + const u_char *fsrc, const u_char *fdst) { - char *srcname, *dstname; - - srcname = etheraddr_string(fsrc); - dstname = etheraddr_string(fdst); - - if (vflag) - (void) printf("%02x %02x %s %s %d: ", - trp->token_ac, - trp->token_fc, - srcname, dstname, - length); - else - printf("%s %s %d: ", srcname, dstname, length); + const char *srcname, *dstname; + + srcname = etheraddr_string(ndo, fsrc); + dstname = etheraddr_string(ndo, fdst); + + if (!ndo->ndo_qflag) + ND_PRINT((ndo, "%02x %02x ", + EXTRACT_U_1(trp->token_ac), + EXTRACT_U_1(trp->token_fc))); + ND_PRINT((ndo, "%s > %s, length %u: ", + srcname, dstname, + length)); } -static char *broadcast_indicator[] = { +static const char *broadcast_indicator[] = { "Non-Broadcast", "Non-Broadcast", "Non-Broadcast", "Non-Broadcast", "All-routes", "All-routes", "Single-route", "Single-route" }; -static char *direction[] = { +static const char *direction[] = { "Forward", "Backward" }; -static char *largest_frame[] = { +static const char *largest_frame[] = { "516", "1500", "2052", @@ -101,110 +143,106 @@ static char *largest_frame[] = { "??" }; -/* - * This is the top level routine of the printer. 'p' is the points - * to the TR header of the packet, 'tvp' is the timestamp, - * 'length' is the length of the packet off the wire, and 'caplen' - * is the number of bytes actually captured. - */ -void -token_if_print(u_char *user, const struct pcap_pkthdr *h, const u_char *p) +u_int +token_print(netdissect_options *ndo, const u_char *p, u_int length, u_int caplen) { - u_int caplen = h->caplen; - u_int length = h->len; - struct token_header *trp; - u_short extracted_ethertype; - struct ether_header ehdr; - u_int route_len = 0, seg; - - trp = (struct token_header *)p; + const struct token_header *trp; + int llc_hdrlen; + nd_mac_addr srcmac, dstmac; + struct lladdr_info src, dst; + u_int route_len = 0, hdr_len = TOKEN_HDRLEN; + int seg; - ts_print(&h->ts); + trp = (const struct token_header *)p; if (caplen < TOKEN_HDRLEN) { - printf("[|token-ring]"); - goto out; + ND_PRINT((ndo, "%s", tstr)); + return hdr_len; } + /* * Get the TR addresses into a canonical form */ - extract_token_addrs(trp, (char*)ESRC(&ehdr), (char*)EDST(&ehdr)); - /* - * Some printers want to get back at the ethernet addresses, - * and/or check that they're not walking off the end of the packet. - * Rather than pass them all the way down, we set these globals. - */ - snapend = p + caplen; - /* - * Actually, the only printers that use packetp are print-arp.c - * and print-bootp.c, and they assume that packetp points to an - * Ethernet header. The right thing to do is to fix them to know - * which link type is in use when they excavate. XXX - */ - packetp = (u_char *)&ehdr; + extract_token_addrs(trp, (char*)srcmac, (char*)dstmac); /* Adjust for source routing information in the MAC header */ if (IS_SOURCE_ROUTED(trp)) { /* Clear source-routed bit */ - *ESRC(&ehdr) &= 0x7f; + srcmac[0] &= 0x7f; - if (eflag) - token_print(trp, length, ESRC(&ehdr), EDST(&ehdr)); + if (ndo->ndo_eflag) + token_hdr_print(ndo, trp, length, srcmac, dstmac); + if (caplen < TOKEN_HDRLEN + 2) { + ND_PRINT((ndo, "%s", tstr)); + return hdr_len; + } route_len = RIF_LENGTH(trp); - if (vflag) { - printf("%s ", broadcast_indicator[BROADCAST(trp)]); - printf("%s", direction[DIRECTION(trp)]); - + hdr_len += route_len; + if (caplen < hdr_len) { + ND_PRINT((ndo, "%s", tstr)); + return hdr_len; + } + if (ndo->ndo_vflag) { + ND_PRINT((ndo, "%s ", broadcast_indicator[BROADCAST(trp)])); + ND_PRINT((ndo, "%s", direction[DIRECTION(trp)])); + for (seg = 0; seg < SEGMENT_COUNT(trp); seg++) - printf(" [%d:%d]", RING_NUMBER(trp, seg), - BRIDGE_NUMBER(trp, seg)); + ND_PRINT((ndo, " [%d:%d]", RING_NUMBER(trp, seg), + BRIDGE_NUMBER(trp, seg))); } else { - printf("rt = %x", ntohs(trp->token_rcf)); - + ND_PRINT((ndo, "rt = %x", EXTRACT_BE_U_2(trp->token_rcf))); + for (seg = 0; seg < SEGMENT_COUNT(trp); seg++) - printf(":%x", ntohs(trp->token_rseg[seg])); + ND_PRINT((ndo, ":%x", EXTRACT_BE_U_2(trp->token_rseg[seg]))); } - printf(" (%s) ", largest_frame[LARGEST_FRAME(trp)]); + ND_PRINT((ndo, " (%s) ", largest_frame[LARGEST_FRAME(trp)])); } else { - if (eflag) - token_print(trp, length, ESRC(&ehdr), EDST(&ehdr)); + if (ndo->ndo_eflag) + token_hdr_print(ndo, trp, length, srcmac, dstmac); } + src.addr = srcmac; + src.addr_string = etheraddr_string; + dst.addr = dstmac; + dst.addr_string = etheraddr_string; + /* Skip over token ring MAC header and routing information */ - length -= TOKEN_HDRLEN + route_len; - p += TOKEN_HDRLEN + route_len; - caplen -= TOKEN_HDRLEN + route_len; + length -= hdr_len; + p += hdr_len; + caplen -= hdr_len; /* Frame Control field determines interpretation of packet */ - extracted_ethertype = 0; if (FRAME_TYPE(trp) == TOKEN_FC_LLC) { /* Try to print the LLC-layer header & higher layers */ - if (llc_print(p, length, caplen, ESRC(&ehdr), EDST(&ehdr), - &extracted_ethertype) == 0) { - /* ether_type not known, print raw packet */ - if (!eflag) - token_print(trp, - length + TOKEN_HDRLEN + route_len, - ESRC(&ehdr), EDST(&ehdr)); - if (extracted_ethertype) { - printf("(LLC %s) ", - etherproto_string(htons(extracted_ethertype))); - } - if (!xflag && !qflag) - default_print(p, caplen); + llc_hdrlen = llc_print(ndo, p, length, caplen, &src, &dst); + if (llc_hdrlen < 0) { + /* packet type not known, print raw packet */ + if (!ndo->ndo_suppress_default_print) + ND_DEFAULTPRINT(p, caplen); + llc_hdrlen = -llc_hdrlen; } + hdr_len += llc_hdrlen; } else { /* Some kinds of TR packet we cannot handle intelligently */ /* XXX - dissect MAC packets if frame type is 0 */ - if (!eflag) - token_print(trp, length + TOKEN_HDRLEN + route_len, - ESRC(&ehdr), EDST(&ehdr)); - if (!xflag && !qflag) - default_print(p, caplen); + if (!ndo->ndo_eflag) + token_hdr_print(ndo, trp, length + TOKEN_HDRLEN + route_len, + srcmac, dstmac); + if (!ndo->ndo_suppress_default_print) + ND_DEFAULTPRINT(p, caplen); } - if (xflag) - default_print(p, caplen); -out: - putchar('\n'); + return (hdr_len); +} + +/* + * This is the top level routine of the printer. 'p' points + * to the TR header of the packet, 'h->ts' is the timestamp, + * 'h->len' is the length of the packet off the wire, and 'h->caplen' + * is the number of bytes actually captured. + */ +u_int +token_if_print(netdissect_options *ndo, const struct pcap_pkthdr *h, const u_char *p) +{ + return (token_print(ndo, p, h->len, h->caplen)); }