mirror of
https://git.FreeBSD.org/ports.git
synced 2024-11-15 23:50:44 +00:00
de02b4585c
proto 94 (IPIP). I've been using this patch for a few weeks now for tracking down various "things" involving some IP tunnels between some Cisco 1720/2610 routers and several FreeBSD machines. Submitted by: Mike Nowlin <mike@argos.org>
167 lines
5.0 KiB
Plaintext
167 lines
5.0 KiB
Plaintext
--- tcpshow.c.orig Tue Mar 21 17:25:25 2000
|
|
+++ tcpshow.c Tue Mar 21 17:28:04 2000
|
|
@@ -367,7 +367,7 @@
|
|
#endif
|
|
|
|
|
|
-void main(int, char **);
|
|
+int main(int, char **);
|
|
|
|
|
|
static boolean noBflag = FALSE;
|
|
@@ -1125,7 +1125,9 @@
|
|
static char *icmpType (uint1 type) {
|
|
|
|
char *descr;
|
|
+ static char unknowntype[80];
|
|
|
|
+ snprintf(unknowntype, 80, "%s (%d)", unknown, type);
|
|
|
|
switch (type) {
|
|
case ECHO_REPLY: descr = "echo-reply"; break;
|
|
@@ -1143,7 +1145,7 @@
|
|
case INFO_REPLY: descr = "information-reply"; break;
|
|
case MASK_REQ: descr = "address-mask-request"; break;
|
|
case MASK_REPLY: descr = "address-mask-reply"; break;
|
|
- default: descr = unknown; break;
|
|
+ default: descr = unknowntype; break;
|
|
}
|
|
|
|
return descr;
|
|
@@ -1248,7 +1250,7 @@
|
|
/* */
|
|
/****==========------------------------------------------------==========****/
|
|
|
|
-void main (int argc, char **argv) {
|
|
+int main (int argc, char **argv) {
|
|
|
|
/* Command line options. */
|
|
while (--argc > 0 && **++argv == '-')
|
|
@@ -1290,6 +1292,7 @@
|
|
for ( ; ; ) if (!setjmp(jmpBuf)) showPkt(pkt);
|
|
|
|
exit(0);
|
|
+ return 0;
|
|
|
|
}
|
|
|
|
@@ -1336,7 +1339,7 @@
|
|
name = number;
|
|
}
|
|
/* The crappy manpage doesn't say the port must be in net byte order. */
|
|
- elif (service = getservbyport((int)htons(port), proto))
|
|
+ elif ( (service = getservbyport((int)htons(port), proto)) )
|
|
name = service->s_name;
|
|
elif (!wantNumber)
|
|
name = unknown;
|
|
@@ -1580,13 +1583,14 @@
|
|
if (ppFlag) {
|
|
(void)sscanf(p, "%s", time);
|
|
etherType = ETHER_PROTO_IP; /* tcpdump doesn't supply link type */
|
|
- if (!noLinkFlag)
|
|
+ if (!noLinkFlag) {
|
|
if (terseFlag)
|
|
printf("TIME:\t%s%s\n", time, deltaTime(&prevTime, time));
|
|
else
|
|
printf(
|
|
"\tTimestamp:\t\t\t%s%s\n", time, deltaTime(&prevTime, time)
|
|
);
|
|
+ }
|
|
return getPkt();
|
|
}
|
|
|
|
@@ -1598,7 +1602,7 @@
|
|
(void)strcpy(eTo, etherAddr(eTo, 0));
|
|
(void)strcpy(eToName, etherName(eTo, TRUE));
|
|
|
|
- if (!noLinkFlag)
|
|
+ if (!noLinkFlag) {
|
|
if (terseFlag) {
|
|
printf("TIME:\t%s%s\n", time, deltaTime(&prevTime, time));
|
|
printf(
|
|
@@ -1614,6 +1618,7 @@
|
|
if (!noEtherNames) printf(" (%s)", etherName(eTo, FALSE));
|
|
printf("\n\tEncapsulated Protocol:\t\t%s\n", etherProto(eType, 0));
|
|
}
|
|
+ }
|
|
|
|
return getPkt();
|
|
|
|
@@ -1778,7 +1783,7 @@
|
|
static void showPkt (reg char *p) {
|
|
|
|
char *warnMsg = "<*** No decode support for encapsulated protocol ***>";
|
|
-
|
|
+ char *warnMsg2 = "<*** No decode support for encap protocol in IPIP packet ***>";
|
|
|
|
prSep();
|
|
printf("Packet %d\n", ++nPktsShown);
|
|
@@ -1807,6 +1812,31 @@
|
|
p = showIcmp(p);
|
|
p = showData(p);
|
|
break;
|
|
+
|
|
+ // IPIP decode support by M. Nowlin (mike@argos.org) 20000321
|
|
+ case IPIP:
|
|
+ p = showIp(p);
|
|
+ switch(proto) {
|
|
+ case TCP:
|
|
+ p = showTcp(p);
|
|
+ p = showData(p);
|
|
+ break;
|
|
+ case UDP:
|
|
+ p = showUdp(p);
|
|
+ p = showData(p);
|
|
+ break;
|
|
+ case ICMP:
|
|
+ p = showIcmp(p);
|
|
+ p = showData(p);
|
|
+ break;
|
|
+ default:
|
|
+ printf("\t%s\n", warnMsg2);
|
|
+ nextPkt();
|
|
+ break;
|
|
+ }
|
|
+
|
|
+ break;
|
|
+
|
|
default:
|
|
printf("\t%s\n", warnMsg);
|
|
nextPkt(); /* Doesn't return */
|
|
@@ -1826,7 +1856,7 @@
|
|
}
|
|
/* Note that if getPkt() returns here, then the line read isn't the */
|
|
/* start of a new packet, i.e. there's spurious data. */
|
|
- if (p = getPkt()) {
|
|
+ if ( (p = getPkt()) ) {
|
|
if (sFlag) printf("\t<*** Spurious data at end: \"%s\" ***>\n", p);
|
|
nextPkt();
|
|
}
|
|
@@ -1996,10 +2026,10 @@
|
|
|
|
if (terseFlag) {
|
|
printf(
|
|
- " TCP:\tport %s -> %s seq=%010lu", sPortName, dPortName, seq
|
|
+ " TCP:\tport %s -> %s seq=%010lu", sPortName, dPortName, (u_long)seq
|
|
);
|
|
- if (trackFlag) printf(" (expect=%010lu)", expect);
|
|
- printf(" ack=%010lu\n", ack);
|
|
+ if (trackFlag) printf(" (expect=%010lu)", (u_long)expect);
|
|
+ printf(" ack=%010lu\n", (u_long)ack);
|
|
printf(
|
|
"\thlen=%d (data=%u) UAPRSF=%s%s%s%s%s%s",
|
|
hLen, dataLen,
|
|
@@ -2016,9 +2046,9 @@
|
|
if (!noPortNames) printf(" (%s)", portName(sPort, "tcp", FALSE));
|
|
printf("\n\tDestination Port:\t\t%d", dPort);
|
|
if (!noPortNames) printf(" (%s)", portName(dPort, "tcp", FALSE));
|
|
- printf("\n\tSequence Number:\t\t%010lu\n", seq);
|
|
- if (trackFlag) printf("\tExpect peer ACK:\t\t%010lu\n", expect);
|
|
- printf("\tAcknowledgement Number:\t\t%010lu\n", ack);
|
|
+ printf("\n\tSequence Number:\t\t%010lu\n", (u_long)seq);
|
|
+ if (trackFlag) printf("\tExpect peer ACK:\t\t%010lu\n", (u_long)expect);
|
|
+ printf("\tAcknowledgement Number:\t\t%010lu\n", (u_long)ack);
|
|
printf("\tHeader Length:\t\t\t%d bytes (data=%u)\n", hLen, dataLen);
|
|
printf(
|
|
"\tFlags:%s%s%s%s%s%s\n%s%s%s%s%s%s\n",
|