X-Git-Url: https://git.tcpdump.org/tcpdump/blobdiff_plain/b258556bb81a53e61ad3a2ce642b50959e0ddc06..4a390644ce4ae3ca88a511d28b418efe60bb71dc:/print-ether.c diff --git a/print-ether.c b/print-ether.c index 6202a699..16b0fb7f 100644 --- a/print-ether.c +++ b/print-ether.c @@ -57,6 +57,7 @@ const struct tok ethertype_values[] = { { ETHERTYPE_8021Q9100, "802.1Q-9100" }, { ETHERTYPE_8021QinQ, "802.1Q-QinQ" }, { ETHERTYPE_8021Q9200, "802.1Q-9200" }, + { ETHERTYPE_MACSEC, "802.1AE MACsec" }, { ETHERTYPE_VMAN, "VMAN" }, { ETHERTYPE_PUP, "PUP" }, { ETHERTYPE_ARP, "ARP"}, @@ -100,6 +101,8 @@ const struct tok ethertype_values[] = { { ETHERTYPE_GEONET, "GeoNet"}, { ETHERTYPE_CALM_FAST, "CALM FAST"}, { ETHERTYPE_AOE, "AoE" }, + { ETHERTYPE_PTP, "PTP" }, + { ETHERTYPE_ARISTA, "Arista Vendor Specific Protocol" }, { 0, NULL} }; @@ -108,7 +111,7 @@ ether_addresses_print(netdissect_options *ndo, const u_char *src, const u_char *dst) { ND_PRINT("%s > %s, ", - etheraddr_string(ndo, src), etheraddr_string(ndo, dst)); + GET_ETHERADDR_STRING(src), GET_ETHERADDR_STRING(dst)); } static void @@ -130,13 +133,13 @@ ether_type_print(netdissect_options *ndo, uint16_t type) * switch chips, and extra encapsulation header information before * printing Ethernet header information (such as a LANE ID for ATM LANE). */ -static u_int -ether_print_common(netdissect_options *ndo, const u_char *p, u_int length, +static void +ether_common_print(netdissect_options *ndo, const u_char *p, u_int length, u_int caplen, void (*print_switch_tag)(netdissect_options *ndo, const u_char *), u_int switch_tag_len, void (*print_encap_header)(netdissect_options *ndo, const u_char *), - const u_char *encap_header_arg) + const u_char *encap_header_arg, u_int do_incr_ll_hdr_len) { const struct ether_header *ehp; u_int orig_length; @@ -148,11 +151,15 @@ ether_print_common(netdissect_options *ndo, const u_char *p, u_int length, if (caplen < ETHER_HDRLEN + switch_tag_len) { nd_print_trunc(ndo); - return (caplen); + if (do_incr_ll_hdr_len) + ndo->ndo_ll_hdr_len += caplen; + return; } if (length < ETHER_HDRLEN + switch_tag_len) { nd_print_trunc(ndo); - return (length); + if (do_incr_ll_hdr_len) + ndo->ndo_ll_hdr_len += length; + return; } if (print_encap_header != NULL) @@ -193,17 +200,60 @@ ether_print_common(netdissect_options *ndo, const u_char *p, u_int length, * Get the length/type field, skip past it, and print it * if we're printing the link-layer header. */ +recurse: length_type = GET_BE_U_2(p); length -= 2; - caplen += 2; + caplen -= 2; p += 2; hdrlen += 2; /* - * Process VLAN tag types. + * Process 802.1AE MACsec headers. */ printed_length = 0; + if (length_type == ETHERTYPE_MACSEC) { + /* + * MACsec, aka IEEE 802.1AE-2006 + * Print the header, and try to print the payload if it's not encrypted + */ + if (ndo->ndo_eflag) { + ether_type_print(ndo, length_type); + ND_PRINT(", length %u: ", orig_length); + printed_length = 1; + } + + int ret = macsec_print(ndo, &p, &length, &caplen, &hdrlen, + &src, &dst); + + if (ret == 0) { + /* Payload is encrypted; print it as raw data. */ + if (!ndo->ndo_suppress_default_print) + ND_DEFAULTPRINT(p, caplen); + if (do_incr_ll_hdr_len) + ndo->ndo_ll_hdr_len += hdrlen; + return; + } else if (ret > 0) { + /* Problem printing the header; just quit. */ + if (do_incr_ll_hdr_len) + ndo->ndo_ll_hdr_len += ret; + return; + } else { + /* + * Keep processing type/length fields. + */ + length_type = GET_BE_U_2(p); + + length -= 2; + caplen -= 2; + p += 2; + hdrlen += 2; + } + } + + /* + * Process VLAN tag types. + */ while (length_type == ETHERTYPE_8021Q || length_type == ETHERTYPE_8021Q9100 || length_type == ETHERTYPE_8021Q9200 || @@ -216,12 +266,16 @@ ether_print_common(netdissect_options *ndo, const u_char *p, u_int length, if (caplen < 4) { ndo->ndo_protocol = "vlan"; nd_print_trunc(ndo); - return (hdrlen + caplen); + if (do_incr_ll_hdr_len) + ndo->ndo_ll_hdr_len += hdrlen + caplen; + return; } if (length < 4) { ndo->ndo_protocol = "vlan"; nd_print_trunc(ndo); - return (hdrlen + length); + if (do_incr_ll_hdr_len) + ndo->ndo_ll_hdr_len += hdrlen + length; + return; } if (ndo->ndo_eflag) { uint16_t tag = GET_BE_U_2(p); @@ -287,7 +341,7 @@ ether_print_common(netdissect_options *ndo, const u_char *p, u_int length, * It's a type field, with the type for Alteon jumbo frames. * See * - * http://tools.ietf.org/html/draft-ietf-isis-ext-eth-01 + * https://tools.ietf.org/html/draft-ietf-isis-ext-eth-01 * * which indicates that, following the type field, * there's an LLC header and payload. @@ -301,6 +355,38 @@ ether_print_common(netdissect_options *ndo, const u_char *p, u_int length, llc_hdrlen = -llc_hdrlen; } hdrlen += llc_hdrlen; + } else if (length_type == ETHERTYPE_ARISTA) { + if (caplen < 2) { + ND_PRINT("[|arista]"); + if (do_incr_ll_hdr_len) + ndo->ndo_ll_hdr_len += hdrlen + caplen; + return; + } + if (length < 2) { + ND_PRINT("[|arista]"); + if (do_incr_ll_hdr_len) + ndo->ndo_ll_hdr_len += hdrlen + length; + return; + } + ether_type_print(ndo, length_type); + ND_PRINT(", length %u: ", orig_length); + int bytesConsumed = arista_ethertype_print(ndo, p, length); + if (bytesConsumed > 0) { + p += bytesConsumed; + length -= bytesConsumed; + caplen -= bytesConsumed; + hdrlen += bytesConsumed; + goto recurse; + } else { + /* subtype/version not known, print raw packet */ + if (!ndo->ndo_eflag && length_type > MAX_ETHERNET_LENGTH_VAL) { + ether_addresses_print(ndo, src.addr, dst.addr); + ether_type_print(ndo, length_type); + ND_PRINT(", length %u: ", orig_length); + } + if (!ndo->ndo_suppress_default_print) + ND_DEFAULTPRINT(p, caplen); + } } else { /* * It's a type field with some other value. @@ -331,7 +417,9 @@ ether_print_common(netdissect_options *ndo, const u_char *p, u_int length, ND_DEFAULTPRINT(p, caplen); } } - return (hdrlen); + if (do_incr_ll_hdr_len) + ndo->ndo_ll_hdr_len += hdrlen; + return; } /* @@ -343,14 +431,14 @@ ether_print_common(netdissect_options *ndo, const u_char *p, u_int length, * * FIXME: caplen can and should be derived from ndo->ndo_snapend and p. */ -u_int -ether_print_switch_tag(netdissect_options *ndo, const u_char *p, u_int length, +void +ether_switch_tag_print(netdissect_options *ndo, const u_char *p, u_int length, u_int caplen, void (*print_switch_tag)(netdissect_options *, const u_char *), - u_int switch_tag_len) + u_int switch_tag_len, u_int do_incr_ll_hdr_len) { - return (ether_print_common(ndo, p, length, caplen, print_switch_tag, - switch_tag_len, NULL, NULL)); + ether_common_print(ndo, p, length, caplen, print_switch_tag, + switch_tag_len, NULL, NULL, do_incr_ll_hdr_len); } /* @@ -361,15 +449,15 @@ ether_print_switch_tag(netdissect_options *ndo, const u_char *p, u_int length, * * FIXME: caplen can and should be derived from ndo->ndo_snapend and p. */ -u_int +void ether_print(netdissect_options *ndo, const u_char *p, u_int length, u_int caplen, void (*print_encap_header)(netdissect_options *ndo, const u_char *), - const u_char *encap_header_arg) + const u_char *encap_header_arg, u_int do_incr_ll_hdr_len) { ndo->ndo_protocol = "ether"; - return (ether_print_common(ndo, p, length, caplen, NULL, 0, - print_encap_header, encap_header_arg)); + ether_common_print(ndo, p, length, caplen, NULL, 0, + print_encap_header, encap_header_arg, do_incr_ll_hdr_len); } /* @@ -378,12 +466,14 @@ ether_print(netdissect_options *ndo, * of the packet off the wire, and 'h->caplen' is the number * of bytes actually captured. */ -u_int +void ether_if_print(netdissect_options *ndo, const struct pcap_pkthdr *h, const u_char *p) { - ndo->ndo_protocol = "ether_if"; - return (ether_print(ndo, p, h->len, h->caplen, NULL, NULL)); + ndo->ndo_protocol = "ether"; + ndo->ndo_ll_hdr_len += 0; + + ether_print(ndo, p, h->len, h->caplen, NULL, NULL, TRUE); } /* @@ -395,21 +485,23 @@ ether_if_print(netdissect_options *ndo, const struct pcap_pkthdr *h, * This is for DLT_NETANALYZER, which has a 4-byte pseudo-header * before the Ethernet header. */ -u_int +void netanalyzer_if_print(netdissect_options *ndo, const struct pcap_pkthdr *h, const u_char *p) { /* * Fail if we don't have enough data for the Hilscher pseudo-header. */ - ndo->ndo_protocol = "netanalyzer_if"; + ndo->ndo_protocol = "netanalyzer"; if (h->caplen < 4) { + ndo->ndo_ll_hdr_len += h->caplen; nd_print_trunc(ndo); - return (h->caplen); + return; } + ndo->ndo_ll_hdr_len += 4; /* Skip the pseudo-header. */ - return (4 + ether_print(ndo, p + 4, h->len - 4, h->caplen - 4, NULL, NULL)); + ether_print(ndo, p + 4, h->len - 4, h->caplen - 4, NULL, NULL, TRUE); } /* @@ -422,7 +514,7 @@ netanalyzer_if_print(netdissect_options *ndo, const struct pcap_pkthdr *h, * pseudo-header, a 7-byte Ethernet preamble, and a 1-byte Ethernet SOF * before the Ethernet header. */ -u_int +void netanalyzer_transparent_if_print(netdissect_options *ndo, const struct pcap_pkthdr *h, const u_char *p) @@ -431,14 +523,16 @@ netanalyzer_transparent_if_print(netdissect_options *ndo, * Fail if we don't have enough data for the Hilscher pseudo-header, * preamble, and SOF. */ - ndo->ndo_protocol = "netanalyzer_transparent_if"; + ndo->ndo_protocol = "netanalyzer_transparent"; if (h->caplen < 12) { + ndo->ndo_ll_hdr_len += h->caplen; nd_print_trunc(ndo); - return (h->caplen); + return; } + ndo->ndo_ll_hdr_len += 12; /* Skip the pseudo-header, preamble, and SOF. */ - return (12 + ether_print(ndo, p + 12, h->len - 12, h->caplen - 12, NULL, NULL)); + ether_print(ndo, p + 12, h->len - 12, h->caplen - 12, NULL, NULL, TRUE); } /* @@ -570,6 +664,10 @@ ethertype_print(netdissect_options *ndo, aoe_print(ndo, p, length); return (1); + case ETHERTYPE_PTP: + ptp_print(ndo, p, length); + return (1); + case ETHERTYPE_LAT: case ETHERTYPE_SCA: case ETHERTYPE_MOPRC: