X-Git-Url: https://git.tcpdump.org/tcpdump/blobdiff_plain/f867bc9f40b4ce00e08fa6377bbb7d74719b9313..a63600a1fc28dbc7ae7ce9f996829c49a25fb33c:/util-print.c diff --git a/util-print.c b/util-print.c index 925cf8d6..f20139f2 100644 --- a/util-print.c +++ b/util-print.c @@ -247,7 +247,8 @@ ts_date_hmsfrac_print(netdissect_options *ndo, long sec, long usec, { time_t Time = sec; struct tm *tm; - char timestr[32]; + char timebuf[32]; + const char *timestr; if ((unsigned)sec & 0x80000000) { ND_PRINT("[Error converting time]"); @@ -259,14 +260,13 @@ ts_date_hmsfrac_print(netdissect_options *ndo, long sec, long usec, else tm = gmtime(&Time); - if (!tm) { - ND_PRINT("[Error converting time]"); - return; + if (date_flag == WITH_DATE) { + timestr = nd_format_time(timebuf, sizeof(timebuf), + "%Y-%m-%d %H:%M:%S", tm); + } else { + timestr = nd_format_time(timebuf, sizeof(timebuf), + "%H:%M:%S", tm); } - if (date_flag == WITH_DATE) - strftime(timestr, sizeof(timestr), "%Y-%m-%d %H:%M:%S", tm); - else - strftime(timestr, sizeof(timestr), "%H:%M:%S", tm); ND_PRINT("%s", timestr); ts_frac_print(ndo, usec); @@ -422,6 +422,26 @@ signed_relts_print(netdissect_options *ndo, unsigned_relts_print(ndo, secs); } +/* + * Format a struct tm with strftime(). + * If the pointer to the struct tm is null, that means that the + * routine to convert a time_t to a struct tm failed; the localtime() + * and gmtime() in the Microsoft Visual Studio C library will fail, + * returning null, if the value is before the UNIX Epoch. + */ +const char * +nd_format_time(char *buf, size_t bufsize, const char *format, + const struct tm *timeptr) +{ + if (timeptr != NULL) { + if (strftime(buf, bufsize, format, timeptr) != 0) + return (buf); + else + return ("[nd_format_time() buffer is too small]"); + } else + return ("[localtime() or gmtime() couldn't convert the date and time]"); +} + /* Print the truncated string */ void nd_print_trunc(netdissect_options *ndo) { @@ -456,28 +476,23 @@ void nd_print_invalid(netdissect_options *ndo) int print_unknown_data(netdissect_options *ndo, const u_char *cp, - const char *ident, u_int len) + const char *indent, u_int len) { - u_int len_to_print; - - len_to_print = len; if (!ND_TTEST_LEN(cp, 0)) { - ND_PRINT("%sDissector error: print_unknown_data called with pointer past end of packet", - ident); + ND_PRINT("%sDissector error: %s() called with pointer past end of packet", + indent, __func__); return(0); } - if (ND_BYTES_AVAILABLE_AFTER(cp) < len_to_print) - len_to_print = ND_BYTES_AVAILABLE_AFTER(cp); - hex_print(ndo, ident, cp, len_to_print); + hex_print(ndo, indent, cp, ND_MIN(len, ND_BYTES_AVAILABLE_AFTER(cp))); return(1); /* everything is ok */ } /* * Convert a token value to a string; use "fmt" if not found. */ -const char * +static const char * tok2strbuf(const struct tok *lp, const char *fmt, - u_int v, char *buf, size_t bufsize) + const u_int v, char *buf, const size_t bufsize) { if (lp != NULL) { while (lp->s != NULL) { @@ -499,8 +514,7 @@ tok2strbuf(const struct tok *lp, const char *fmt, * in round-robin fashion. */ const char * -tok2str(const struct tok *lp, const char *fmt, - u_int v) +tok2str(const struct tok *lp, const char *fmt, const u_int v) { static char buf[4][TOKBUFSIZE]; static int idx = 0; @@ -521,7 +535,7 @@ tok2str(const struct tok *lp, const char *fmt, */ static char * bittok2str_internal(const struct tok *lp, const char *fmt, - u_int v, const char *sep) + const u_int v, const char *sep) { static char buf[1024+1]; /* our string buffer */ char *bufp = buf; @@ -561,8 +575,7 @@ bittok2str_internal(const struct tok *lp, const char *fmt, * this is useful for parsing bitfields, the output strings are not separated. */ char * -bittok2str_nosep(const struct tok *lp, const char *fmt, - u_int v) +bittok2str_nosep(const struct tok *lp, const char *fmt, const u_int v) { return (bittok2str_internal(lp, fmt, v, "")); } @@ -572,8 +585,7 @@ bittok2str_nosep(const struct tok *lp, const char *fmt, * this is useful for parsing bitfields, the output strings are comma separated. */ char * -bittok2str(const struct tok *lp, const char *fmt, - u_int v) +bittok2str(const struct tok *lp, const char *fmt, const u_int v) { return (bittok2str_internal(lp, fmt, v, ", ")); } @@ -585,8 +597,7 @@ bittok2str(const struct tok *lp, const char *fmt, * correct for bounds-checking. */ const char * -tok2strary_internal(const char **lp, int n, const char *fmt, - int v) +tok2strary_internal(const char **lp, int n, const char *fmt, const int v) { static char buf[TOKBUFSIZE]; @@ -619,9 +630,9 @@ uint2tokary_internal(const struct uint_tokary dict[], const size_t size, */ int -mask2plen(uint32_t mask) +mask2plen(const uint32_t mask) { - uint32_t bitmasks[33] = { + const uint32_t bitmasks[33] = { 0x00000000, 0x80000000, 0xc0000000, 0xe0000000, 0xf0000000, 0xf8000000, 0xfc000000, 0xfe000000, 0xff000000, @@ -687,7 +698,7 @@ mask62plen(const u_char *mask) */ static int fetch_token(netdissect_options *ndo, const u_char *pptr, u_int idx, u_int len, - u_char *tbuf, size_t tbuflen) + u_char *tbuf, size_t tbuflen) { size_t toklen = 0; u_char c; @@ -934,7 +945,7 @@ txtproto_print(netdissect_options *ndo, const u_char *pptr, u_int len, (defined(__s390__) || defined(__s390x__) || defined(__zarch__)) || \ defined(__vax__) /* - * The procesor natively handles unaligned loads, so just use memcpy() + * The processor natively handles unaligned loads, so just use memcpy() * and memcmp(), to enable those optimizations. * * XXX - are those all the x86 tests we need?