1
0
mirror of https://git.FreeBSD.org/src.git synced 2024-12-14 10:09:48 +00:00
freebsd/print-fr.c

893 lines
27 KiB
C
Raw Normal View History

/*
* Copyright (c) 1990, 1991, 1993, 1994, 1995, 1996
* The Regents of the University of California. All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that: (1) source code distributions
* retain the above copyright notice and this paragraph in its entirety, (2)
* distributions including binary code include the above copyright notice and
* this paragraph in its entirety in the documentation or other materials
* provided with the distribution, and (3) all advertising materials mentioning
* features or use of this software display the following acknowledgement:
* ``This product includes software developed by the University of California,
* Lawrence Berkeley Laboratory and its contributors.'' Neither the name of
* the University nor the names of its contributors may be used to endorse
* or promote products derived from this software without specific prior
* written permission.
* THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED
* WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF
* MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
*/
2015-01-06 19:03:11 +00:00
#define NETDISSECT_REWORKED
#ifdef HAVE_CONFIG_H
#include "config.h"
#endif
#include <tcpdump-stdinc.h>
#include <stdio.h>
#include <string.h>
#include "interface.h"
2015-01-06 19:03:11 +00:00
#include "addrtoname.h"
#include "ethertype.h"
#include "nlpid.h"
#include "extract.h"
#include "oui.h"
2015-01-06 19:03:11 +00:00
static void frf15_print(netdissect_options *ndo, const u_char *, u_int);
/*
* the frame relay header has a variable length
*
* the EA bit determines if there is another byte
* in the header
*
* minimum header length is 2 bytes
* maximum header length is 4 bytes
*
* 7 6 5 4 3 2 1 0
* +----+----+----+----+----+----+----+----+
* | DLCI (6 bits) | CR | EA |
* +----+----+----+----+----+----+----+----+
* | DLCI (4 bits) |FECN|BECN| DE | EA |
* +----+----+----+----+----+----+----+----+
* | DLCI (7 bits) | EA |
* +----+----+----+----+----+----+----+----+
* | DLCI (6 bits) |SDLC| EA |
* +----+----+----+----+----+----+----+----+
*/
#define FR_EA_BIT 0x01
#define FR_CR_BIT 0x02000000
#define FR_DE_BIT 0x00020000
#define FR_BECN_BIT 0x00040000
#define FR_FECN_BIT 0x00080000
#define FR_SDLC_BIT 0x00000002
2015-01-06 19:03:11 +00:00
static const struct tok fr_header_flag_values[] = {
{ FR_CR_BIT, "C!" },
{ FR_DE_BIT, "DE" },
{ FR_BECN_BIT, "BECN" },
{ FR_FECN_BIT, "FECN" },
{ FR_SDLC_BIT, "sdlcore" },
{ 0, NULL }
};
2006-09-04 20:04:42 +00:00
/* FRF.15 / FRF.16 */
#define MFR_B_BIT 0x80
#define MFR_E_BIT 0x40
#define MFR_C_BIT 0x20
#define MFR_BEC_MASK (MFR_B_BIT | MFR_E_BIT | MFR_C_BIT)
#define MFR_CTRL_FRAME (MFR_B_BIT | MFR_E_BIT | MFR_C_BIT)
#define MFR_FRAG_FRAME (MFR_B_BIT | MFR_E_BIT )
2015-01-06 19:03:11 +00:00
static const struct tok frf_flag_values[] = {
2006-09-04 20:04:42 +00:00
{ MFR_B_BIT, "Begin" },
{ MFR_E_BIT, "End" },
{ MFR_C_BIT, "Control" },
{ 0, NULL }
};
/* Finds out Q.922 address length, DLCI and flags. Returns 0 on success
* save the flags dep. on address length
*/
2009-03-21 16:23:46 +00:00
static int parse_q922_addr(const u_char *p, u_int *dlci,
2015-01-06 19:03:11 +00:00
u_int *addr_len, uint8_t *flags)
{
if ((p[0] & FR_EA_BIT))
return -1;
*addr_len = 2;
*dlci = ((p[0] & 0xFC) << 2) | ((p[1] & 0xF0) >> 4);
flags[0] = p[0] & 0x02; /* populate the first flag fields */
flags[1] = p[1] & 0x0c;
2007-10-16 02:20:42 +00:00
flags[2] = 0; /* clear the rest of the flags */
flags[3] = 0;
if (p[1] & FR_EA_BIT)
return 0; /* 2-byte Q.922 address */
p += 2;
(*addr_len)++; /* 3- or 4-byte Q.922 address */
if ((p[0] & FR_EA_BIT) == 0) {
*dlci = (*dlci << 7) | (p[0] >> 1);
(*addr_len)++; /* 4-byte Q.922 address */
p++;
}
if ((p[0] & FR_EA_BIT) == 0)
return -1; /* more than 4 bytes of Q.922 address? */
flags[3] = p[0] & 0x02;
2009-03-21 16:23:46 +00:00
*dlci = (*dlci << 6) | (p[0] >> 2);
return 0;
}
2009-03-21 16:23:46 +00:00
char *q922_string(const u_char *p) {
static u_int dlci, addr_len;
2015-01-06 19:03:11 +00:00
static uint8_t flags[4];
2009-03-21 16:23:46 +00:00
static char buffer[sizeof("DLCI xxxxxxxxxx")];
memset(buffer, 0, sizeof(buffer));
if (parse_q922_addr(p, &dlci, &addr_len, flags) == 0){
snprintf(buffer, sizeof(buffer), "DLCI %u", dlci);
}
return buffer;
}
/* Frame Relay packet structure, with flags and CRC removed
+---------------------------+
| Q.922 Address* |
+-- --+
| |
+---------------------------+
| Control (UI = 0x03) |
+---------------------------+
| Optional Pad (0x00) |
+---------------------------+
| NLPID |
+---------------------------+
| . |
| . |
| . |
| Data |
| . |
| . |
+---------------------------+
* Q.922 addresses, as presently defined, are two octets and
contain a 10-bit DLCI. In some networks Q.922 addresses
may optionally be increased to three or four octets.
*/
static u_int
fr_hdrlen(const u_char *p, u_int addr_len)
{
if (!p[addr_len + 1] /* pad exist */)
return addr_len + 1 /* UI */ + 1 /* pad */ + 1 /* NLPID */;
2015-01-06 19:03:11 +00:00
else
return addr_len + 1 /* UI */ + 1 /* NLPID */;
}
static void
2015-01-06 19:03:11 +00:00
fr_hdr_print(netdissect_options *ndo,
int length, u_int addr_len, u_int dlci, uint8_t *flags, uint16_t nlpid)
{
2015-01-06 19:03:11 +00:00
if (ndo->ndo_qflag) {
ND_PRINT((ndo, "Q.922, DLCI %u, length %u: ",
dlci,
2015-01-06 19:03:11 +00:00
length));
} else {
if (nlpid <= 0xff) /* if its smaller than 256 then its a NLPID */
2015-01-06 19:03:11 +00:00
ND_PRINT((ndo, "Q.922, hdr-len %u, DLCI %u, Flags [%s], NLPID %s (0x%02x), length %u: ",
addr_len,
dlci,
bittok2str(fr_header_flag_values, "none", EXTRACT_32BITS(flags)),
tok2str(nlpid_values,"unknown", nlpid),
nlpid,
2015-01-06 19:03:11 +00:00
length));
else /* must be an ethertype */
2015-01-06 19:03:11 +00:00
ND_PRINT((ndo, "Q.922, hdr-len %u, DLCI %u, Flags [%s], cisco-ethertype %s (0x%04x), length %u: ",
addr_len,
dlci,
bittok2str(fr_header_flag_values, "none", EXTRACT_32BITS(flags)),
tok2str(ethertype_values, "unknown", nlpid),
nlpid,
2015-01-06 19:03:11 +00:00
length));
}
}
u_int
2015-01-06 19:03:11 +00:00
fr_if_print(netdissect_options *ndo,
const struct pcap_pkthdr *h, register const u_char *p)
{
register u_int length = h->len;
register u_int caplen = h->caplen;
2015-01-06 19:03:11 +00:00
ND_TCHECK2(*p, 4); /* minimum frame header length */
2015-01-06 19:03:11 +00:00
if ((length = fr_print(ndo, p, length)) == 0)
return (0);
else
return length;
trunc:
2015-01-06 19:03:11 +00:00
ND_PRINT((ndo, "[|fr]"));
return caplen;
}
u_int
2015-01-06 19:03:11 +00:00
fr_print(netdissect_options *ndo,
register const u_char *p, u_int length)
{
2015-01-06 19:03:11 +00:00
uint16_t extracted_ethertype;
u_int dlci;
u_int addr_len;
2015-01-06 19:03:11 +00:00
uint16_t nlpid;
u_int hdr_len;
2015-01-06 19:03:11 +00:00
uint8_t flags[4];
2009-03-21 16:23:46 +00:00
if (parse_q922_addr(p, &dlci, &addr_len, flags)) {
2015-01-06 19:03:11 +00:00
ND_PRINT((ndo, "Q.922, invalid address"));
return 0;
}
2015-01-06 19:03:11 +00:00
ND_TCHECK2(*p, addr_len+1+1);
hdr_len = fr_hdrlen(p, addr_len);
2015-01-06 19:03:11 +00:00
ND_TCHECK2(*p, hdr_len);
if (p[addr_len] != 0x03 && dlci != 0) {
/* lets figure out if we have cisco style encapsulation: */
extracted_ethertype = EXTRACT_16BITS(p+addr_len);
2015-01-06 19:03:11 +00:00
if (ndo->ndo_eflag)
fr_hdr_print(ndo, length, addr_len, dlci, flags, extracted_ethertype);
2015-01-06 19:03:11 +00:00
if (ethertype_print(ndo, extracted_ethertype,
p+addr_len+ETHERTYPE_LEN,
length-addr_len-ETHERTYPE_LEN,
Update tcpdump to 4.1.1. Changes: Thu. April 1, 2010. guy@alum.mit.edu. Summary for 4.1.1 tcpdump release Fix build on systems with PF, such as FreeBSD and OpenBSD. Don't blow up if a zero-length link-layer address is passed to linkaddr_string(). Thu. March 11, 2010. ken@netfunctional.ca/guy@alum.mit.edu. Summary for 4.1.0 tcpdump release Fix printing of MAC addresses for VLAN frames with a length field Add some additional bounds checks and use the EXTRACT_ macros more Add a -b flag to print the AS number in BGP packets in ASDOT notation rather than ASPLAIN notation Add ICMPv6 RFC 5006 support Decode the access flags in NFS access requests Handle the new DLT_ for memory-mapped USB captures on Linux Make the default snapshot (-s) the maximum Print name of device (when -L is used) Support for OpenSolaris (and SXCE build 125 and later) Print new TCP flags Add support for RPL DIO Add support for TCP User Timeout (UTO) Add support for non-standard Ethertypes used by 3com PPPoE gear Add support for 802.11n and 802.11s Add support for Transparent Ethernet Bridge ethertype in GRE Add 4 byte AS support for BGP printer Add support for the MDT SAFI 66 BG printer Add basic IPv6 support to print-olsr Add USB printer Add printer for ForCES Handle frames with an FCS Handle 802.11n Control Wrapper, Block Acq Req and Block Ack frames Fix TCP sequence number printing Report 802.2 packets as 802.2 instead of 802.3 Don't include -L/usr/lib in LDFLAGS On x86_64 Linux, look in lib64 directory too Lots of code clean ups Autoconf clean ups Update testcases to make output changes Fix compiling with/out smi (--with{,out}-smi) Fix compiling without IPv6 support (--disable-ipv6)
2010-10-28 16:23:25 +00:00
length-addr_len-ETHERTYPE_LEN) == 0)
/* ether_type not known, probably it wasn't one */
2015-01-06 19:03:11 +00:00
ND_PRINT((ndo, "UI %02x! ", p[addr_len]));
else
return hdr_len;
}
if (!p[addr_len + 1]) { /* pad byte should be used with 3-byte Q.922 */
if (addr_len != 3)
2015-01-06 19:03:11 +00:00
ND_PRINT((ndo, "Pad! "));
} else if (addr_len == 3)
2015-01-06 19:03:11 +00:00
ND_PRINT((ndo, "No pad! "));
nlpid = p[hdr_len - 1];
2015-01-06 19:03:11 +00:00
if (ndo->ndo_eflag)
fr_hdr_print(ndo, length, addr_len, dlci, flags, nlpid);
p += hdr_len;
length -= hdr_len;
switch (nlpid) {
case NLPID_IP:
2015-01-06 19:03:11 +00:00
ip_print(ndo, p, length);
break;
#ifdef INET6
case NLPID_IP6:
2015-01-06 19:03:11 +00:00
ip6_print(ndo, p, length);
break;
#endif
case NLPID_CLNP:
case NLPID_ESIS:
case NLPID_ISIS:
2015-01-06 19:03:11 +00:00
isoclns_print(ndo, p - 1, length + 1, length + 1); /* OSI printers need the NLPID field */
break;
case NLPID_SNAP:
2015-01-06 19:03:11 +00:00
if (snap_print(ndo, p, length, length, 0) == 0) {
/* ether_type not known, print raw packet */
2015-01-06 19:03:11 +00:00
if (!ndo->ndo_eflag)
fr_hdr_print(ndo, length + hdr_len, hdr_len,
dlci, flags, nlpid);
2015-01-06 19:03:11 +00:00
if (!ndo->ndo_suppress_default_print)
ND_DEFAULTPRINT(p - hdr_len, length + hdr_len);
}
break;
case NLPID_Q933:
2015-01-06 19:03:11 +00:00
q933_print(ndo, p, length);
break;
case NLPID_MFR:
2015-01-06 19:03:11 +00:00
frf15_print(ndo, p, length);
break;
2007-10-16 02:20:42 +00:00
case NLPID_PPP:
2015-01-06 19:03:11 +00:00
ppp_print(ndo, p, length);
2007-10-16 02:20:42 +00:00
break;
default:
2015-01-06 19:03:11 +00:00
if (!ndo->ndo_eflag)
fr_hdr_print(ndo, length + hdr_len, addr_len,
dlci, flags, nlpid);
2015-01-06 19:03:11 +00:00
if (!ndo->ndo_xflag)
ND_DEFAULTPRINT(p, length);
}
return hdr_len;
trunc:
2015-01-06 19:03:11 +00:00
ND_PRINT((ndo, "[|fr]"));
return 0;
}
2007-10-16 02:20:42 +00:00
u_int
2015-01-06 19:03:11 +00:00
mfr_if_print(netdissect_options *ndo,
const struct pcap_pkthdr *h, register const u_char *p)
2007-10-16 02:20:42 +00:00
{
register u_int length = h->len;
register u_int caplen = h->caplen;
2015-01-06 19:03:11 +00:00
ND_TCHECK2(*p, 2); /* minimum frame header length */
2007-10-16 02:20:42 +00:00
2015-01-06 19:03:11 +00:00
if ((length = mfr_print(ndo, p, length)) == 0)
2007-10-16 02:20:42 +00:00
return (0);
else
return length;
trunc:
2015-01-06 19:03:11 +00:00
ND_PRINT((ndo, "[|mfr]"));
2007-10-16 02:20:42 +00:00
return caplen;
}
2006-09-04 20:04:42 +00:00
#define MFR_CTRL_MSG_ADD_LINK 1
#define MFR_CTRL_MSG_ADD_LINK_ACK 2
#define MFR_CTRL_MSG_ADD_LINK_REJ 3
#define MFR_CTRL_MSG_HELLO 4
#define MFR_CTRL_MSG_HELLO_ACK 5
#define MFR_CTRL_MSG_REMOVE_LINK 6
#define MFR_CTRL_MSG_REMOVE_LINK_ACK 7
2015-01-06 19:03:11 +00:00
static const struct tok mfr_ctrl_msg_values[] = {
2006-09-04 20:04:42 +00:00
{ MFR_CTRL_MSG_ADD_LINK, "Add Link" },
{ MFR_CTRL_MSG_ADD_LINK_ACK, "Add Link ACK" },
{ MFR_CTRL_MSG_ADD_LINK_REJ, "Add Link Reject" },
{ MFR_CTRL_MSG_HELLO, "Hello" },
{ MFR_CTRL_MSG_HELLO_ACK, "Hello ACK" },
{ MFR_CTRL_MSG_REMOVE_LINK, "Remove Link" },
{ MFR_CTRL_MSG_REMOVE_LINK_ACK, "Remove Link ACK" },
{ 0, NULL }
};
#define MFR_CTRL_IE_BUNDLE_ID 1
#define MFR_CTRL_IE_LINK_ID 2
#define MFR_CTRL_IE_MAGIC_NUM 3
#define MFR_CTRL_IE_TIMESTAMP 5
#define MFR_CTRL_IE_VENDOR_EXT 6
#define MFR_CTRL_IE_CAUSE 7
2015-01-06 19:03:11 +00:00
static const struct tok mfr_ctrl_ie_values[] = {
2006-09-04 20:04:42 +00:00
{ MFR_CTRL_IE_BUNDLE_ID, "Bundle ID"},
{ MFR_CTRL_IE_LINK_ID, "Link ID"},
{ MFR_CTRL_IE_MAGIC_NUM, "Magic Number"},
{ MFR_CTRL_IE_TIMESTAMP, "Timestamp"},
{ MFR_CTRL_IE_VENDOR_EXT, "Vendor Extension"},
{ MFR_CTRL_IE_CAUSE, "Cause"},
{ 0, NULL }
};
#define MFR_ID_STRING_MAXLEN 50
struct ie_tlv_header_t {
2015-01-06 19:03:11 +00:00
uint8_t ie_type;
uint8_t ie_len;
2006-09-04 20:04:42 +00:00
};
u_int
2015-01-06 19:03:11 +00:00
mfr_print(netdissect_options *ndo,
register const u_char *p, u_int length)
2006-09-04 20:04:42 +00:00
{
u_int tlen,idx,hdr_len = 0;
2015-01-06 19:03:11 +00:00
uint16_t sequence_num;
uint8_t ie_type,ie_len;
const uint8_t *tptr;
2006-09-04 20:04:42 +00:00
/*
* FRF.16 Link Integrity Control Frame
2015-01-06 19:03:11 +00:00
*
2006-09-04 20:04:42 +00:00
* 7 6 5 4 3 2 1 0
* +----+----+----+----+----+----+----+----+
* | B | E | C=1| 0 0 0 0 | EA |
* +----+----+----+----+----+----+----+----+
* | 0 0 0 0 0 0 0 0 |
* +----+----+----+----+----+----+----+----+
* | message type |
* +----+----+----+----+----+----+----+----+
*/
2015-01-06 19:03:11 +00:00
ND_TCHECK2(*p, 4); /* minimum frame header length */
2006-09-04 20:04:42 +00:00
if ((p[0] & MFR_BEC_MASK) == MFR_CTRL_FRAME && p[1] == 0) {
2015-01-06 19:03:11 +00:00
ND_PRINT((ndo, "FRF.16 Control, Flags [%s], %s, length %u",
2006-09-04 20:04:42 +00:00
bittok2str(frf_flag_values,"none",(p[0] & MFR_BEC_MASK)),
tok2str(mfr_ctrl_msg_values,"Unknown Message (0x%02x)",p[2]),
2015-01-06 19:03:11 +00:00
length));
2006-09-04 20:04:42 +00:00
tptr = p + 3;
tlen = length -3;
hdr_len = 3;
2015-01-06 19:03:11 +00:00
if (!ndo->ndo_vflag)
2006-09-04 20:04:42 +00:00
return hdr_len;
while (tlen>sizeof(struct ie_tlv_header_t)) {
2015-01-06 19:03:11 +00:00
ND_TCHECK2(*tptr, sizeof(struct ie_tlv_header_t));
2006-09-04 20:04:42 +00:00
ie_type=tptr[0];
ie_len=tptr[1];
2015-01-06 19:03:11 +00:00
ND_PRINT((ndo, "\n\tIE %s (%u), length %u: ",
2006-09-04 20:04:42 +00:00
tok2str(mfr_ctrl_ie_values,"Unknown",ie_type),
ie_type,
2015-01-06 19:03:11 +00:00
ie_len));
2006-09-04 20:04:42 +00:00
/* infinite loop check */
if (ie_type == 0 || ie_len <= sizeof(struct ie_tlv_header_t))
return hdr_len;
2015-01-06 19:03:11 +00:00
ND_TCHECK2(*tptr, ie_len);
2006-09-04 20:04:42 +00:00
tptr+=sizeof(struct ie_tlv_header_t);
/* tlv len includes header */
ie_len-=sizeof(struct ie_tlv_header_t);
tlen-=sizeof(struct ie_tlv_header_t);
switch (ie_type) {
case MFR_CTRL_IE_MAGIC_NUM:
2015-01-06 19:03:11 +00:00
ND_PRINT((ndo, "0x%08x", EXTRACT_32BITS(tptr)));
2006-09-04 20:04:42 +00:00
break;
case MFR_CTRL_IE_BUNDLE_ID: /* same message format */
case MFR_CTRL_IE_LINK_ID:
for (idx = 0; idx < ie_len && idx < MFR_ID_STRING_MAXLEN; idx++) {
if (*(tptr+idx) != 0) /* don't print null termination */
2015-01-06 19:03:11 +00:00
safeputchar(ndo, *(tptr + idx));
2006-09-04 20:04:42 +00:00
else
break;
}
break;
case MFR_CTRL_IE_TIMESTAMP:
if (ie_len == sizeof(struct timeval)) {
2015-01-06 19:03:11 +00:00
ts_print(ndo, (const struct timeval *)tptr);
2006-09-04 20:04:42 +00:00
break;
}
/* fall through and hexdump if no unix timestamp */
/*
* FIXME those are the defined IEs that lack a decoder
* you are welcome to contribute code ;-)
*/
case MFR_CTRL_IE_VENDOR_EXT:
case MFR_CTRL_IE_CAUSE:
default:
2015-01-06 19:03:11 +00:00
if (ndo->ndo_vflag <= 1)
print_unknown_data(ndo, tptr, "\n\t ", ie_len);
2006-09-04 20:04:42 +00:00
break;
}
/* do we want to see a hexdump of the IE ? */
2015-01-06 19:03:11 +00:00
if (ndo->ndo_vflag > 1 )
print_unknown_data(ndo, tptr, "\n\t ", ie_len);
2006-09-04 20:04:42 +00:00
tlen-=ie_len;
tptr+=ie_len;
}
return hdr_len;
}
/*
* FRF.16 Fragmentation Frame
2015-01-06 19:03:11 +00:00
*
2006-09-04 20:04:42 +00:00
* 7 6 5 4 3 2 1 0
* +----+----+----+----+----+----+----+----+
* | B | E | C=0|seq. (high 4 bits) | EA |
* +----+----+----+----+----+----+----+----+
* | sequence (low 8 bits) |
* +----+----+----+----+----+----+----+----+
* | DLCI (6 bits) | CR | EA |
* +----+----+----+----+----+----+----+----+
* | DLCI (4 bits) |FECN|BECN| DE | EA |
* +----+----+----+----+----+----+----+----+
*/
sequence_num = (p[0]&0x1e)<<7 | p[1];
/* whole packet or first fragment ? */
if ((p[0] & MFR_BEC_MASK) == MFR_FRAG_FRAME ||
(p[0] & MFR_BEC_MASK) == MFR_B_BIT) {
2015-01-06 19:03:11 +00:00
ND_PRINT((ndo, "FRF.16 Frag, seq %u, Flags [%s], ",
2006-09-04 20:04:42 +00:00
sequence_num,
2015-01-06 19:03:11 +00:00
bittok2str(frf_flag_values,"none",(p[0] & MFR_BEC_MASK))));
2006-09-04 20:04:42 +00:00
hdr_len = 2;
2015-01-06 19:03:11 +00:00
fr_print(ndo, p+hdr_len,length-hdr_len);
2006-09-04 20:04:42 +00:00
return hdr_len;
}
/* must be a middle or the last fragment */
2015-01-06 19:03:11 +00:00
ND_PRINT((ndo, "FRF.16 Frag, seq %u, Flags [%s]",
2006-09-04 20:04:42 +00:00
sequence_num,
2015-01-06 19:03:11 +00:00
bittok2str(frf_flag_values,"none",(p[0] & MFR_BEC_MASK))));
print_unknown_data(ndo, p, "\n\t", length);
2006-09-04 20:04:42 +00:00
return hdr_len;
trunc:
2015-01-06 19:03:11 +00:00
ND_PRINT((ndo, "[|mfr]"));
2006-09-04 20:04:42 +00:00
return length;
}
/* an NLPID of 0xb1 indicates a 2-byte
* FRF.15 header
2015-01-06 19:03:11 +00:00
*
* 7 6 5 4 3 2 1 0
* +----+----+----+----+----+----+----+----+
* ~ Q.922 header ~
* +----+----+----+----+----+----+----+----+
* | NLPID (8 bits) | NLPID=0xb1
* +----+----+----+----+----+----+----+----+
* | B | E | C |seq. (high 4 bits) | R |
* +----+----+----+----+----+----+----+----+
* | sequence (low 8 bits) |
* +----+----+----+----+----+----+----+----+
*/
#define FR_FRF15_FRAGTYPE 0x01
static void
2015-01-06 19:03:11 +00:00
frf15_print(netdissect_options *ndo,
const u_char *p, u_int length) {
uint16_t sequence_num, flags;
2006-09-04 20:04:42 +00:00
flags = p[0]&MFR_BEC_MASK;
sequence_num = (p[0]&0x1e)<<7 | p[1];
2015-01-06 19:03:11 +00:00
ND_PRINT((ndo, "FRF.15, seq 0x%03x, Flags [%s],%s Fragmentation, length %u",
sequence_num,
2006-09-04 20:04:42 +00:00
bittok2str(frf_flag_values,"none",flags),
p[0]&FR_FRF15_FRAGTYPE ? "Interface" : "End-to-End",
2015-01-06 19:03:11 +00:00
length));
/* TODO:
* depending on all permutations of the B, E and C bit
* dig as deep as we can - e.g. on the first (B) fragment
* there is enough payload to print the IP header
* on non (B) fragments it depends if the fragmentation
* model is end-to-end or interface based wether we want to print
* another Q.922 header
*/
}
/*
* Q.933 decoding portion for framerelay specific.
*/
/* Q.933 packet format
2015-01-06 19:03:11 +00:00
Format of Other Protocols
using Q.933 NLPID
2015-01-06 19:03:11 +00:00
+-------------------------------+
| Q.922 Address |
+---------------+---------------+
|Control 0x03 | NLPID 0x08 |
+---------------+---------------+
| L2 Protocol ID |
| octet 1 | octet 2 |
+-------------------------------+
| L3 Protocol ID |
| octet 2 | octet 2 |
+-------------------------------+
| Protocol Data |
+-------------------------------+
| FCS |
+-------------------------------+
*/
/* L2 (Octet 1)- Call Reference Usually is 0x0 */
/*
* L2 (Octet 2)- Message Types definition 1 byte long.
*/
/* Call Establish */
#define MSG_TYPE_ESC_TO_NATIONAL 0x00
#define MSG_TYPE_ALERT 0x01
#define MSG_TYPE_CALL_PROCEEDING 0x02
#define MSG_TYPE_CONNECT 0x07
#define MSG_TYPE_CONNECT_ACK 0x0F
#define MSG_TYPE_PROGRESS 0x03
#define MSG_TYPE_SETUP 0x05
/* Call Clear */
#define MSG_TYPE_DISCONNECT 0x45
#define MSG_TYPE_RELEASE 0x4D
#define MSG_TYPE_RELEASE_COMPLETE 0x5A
#define MSG_TYPE_RESTART 0x46
#define MSG_TYPE_RESTART_ACK 0x4E
/* Status */
#define MSG_TYPE_STATUS 0x7D
#define MSG_TYPE_STATUS_ENQ 0x75
2015-01-06 19:03:11 +00:00
static const struct tok fr_q933_msg_values[] = {
{ MSG_TYPE_ESC_TO_NATIONAL, "ESC to National" },
{ MSG_TYPE_ALERT, "Alert" },
{ MSG_TYPE_CALL_PROCEEDING, "Call proceeding" },
{ MSG_TYPE_CONNECT, "Connect" },
{ MSG_TYPE_CONNECT_ACK, "Connect ACK" },
{ MSG_TYPE_PROGRESS, "Progress" },
{ MSG_TYPE_SETUP, "Setup" },
{ MSG_TYPE_DISCONNECT, "Disconnect" },
{ MSG_TYPE_RELEASE, "Release" },
{ MSG_TYPE_RELEASE_COMPLETE, "Release Complete" },
{ MSG_TYPE_RESTART, "Restart" },
{ MSG_TYPE_RESTART_ACK, "Restart ACK" },
{ MSG_TYPE_STATUS, "Status Reply" },
{ MSG_TYPE_STATUS_ENQ, "Status Enquiry" },
{ 0, NULL }
};
#define MSG_ANSI_LOCKING_SHIFT 0x95
#define FR_LMI_ANSI_REPORT_TYPE_IE 0x01
#define FR_LMI_ANSI_LINK_VERIFY_IE_91 0x19 /* details? */
#define FR_LMI_ANSI_LINK_VERIFY_IE 0x03
#define FR_LMI_ANSI_PVC_STATUS_IE 0x07
#define FR_LMI_CCITT_REPORT_TYPE_IE 0x51
#define FR_LMI_CCITT_LINK_VERIFY_IE 0x53
#define FR_LMI_CCITT_PVC_STATUS_IE 0x57
2015-01-06 19:03:11 +00:00
static const struct tok fr_q933_ie_values_codeset5[] = {
{ FR_LMI_ANSI_REPORT_TYPE_IE, "ANSI Report Type" },
{ FR_LMI_ANSI_LINK_VERIFY_IE_91, "ANSI Link Verify" },
{ FR_LMI_ANSI_LINK_VERIFY_IE, "ANSI Link Verify" },
{ FR_LMI_ANSI_PVC_STATUS_IE, "ANSI PVC Status" },
{ FR_LMI_CCITT_REPORT_TYPE_IE, "CCITT Report Type" },
{ FR_LMI_CCITT_LINK_VERIFY_IE, "CCITT Link Verify" },
{ FR_LMI_CCITT_PVC_STATUS_IE, "CCITT PVC Status" },
{ 0, NULL }
};
#define FR_LMI_REPORT_TYPE_IE_FULL_STATUS 0
#define FR_LMI_REPORT_TYPE_IE_LINK_VERIFY 1
#define FR_LMI_REPORT_TYPE_IE_ASYNC_PVC 2
2015-01-06 19:03:11 +00:00
static const struct tok fr_lmi_report_type_ie_values[] = {
{ FR_LMI_REPORT_TYPE_IE_FULL_STATUS, "Full Status" },
{ FR_LMI_REPORT_TYPE_IE_LINK_VERIFY, "Link verify" },
{ FR_LMI_REPORT_TYPE_IE_ASYNC_PVC, "Async PVC Status" },
{ 0, NULL }
};
2006-09-04 20:04:42 +00:00
/* array of 16 codepages - currently we only support codepage 1,5 */
2015-01-06 19:03:11 +00:00
static const struct tok *fr_q933_ie_codesets[] = {
NULL,
2006-09-04 20:04:42 +00:00
fr_q933_ie_values_codeset5,
NULL,
NULL,
NULL,
fr_q933_ie_values_codeset5,
NULL,
NULL,
NULL,
NULL,
NULL,
NULL,
NULL,
NULL,
NULL,
NULL
};
2015-01-06 19:03:11 +00:00
static int fr_q933_print_ie_codeset5(netdissect_options *ndo,
const struct ie_tlv_header_t *ie_p, const u_char *p);
2015-01-06 19:03:11 +00:00
typedef int (*codeset_pr_func_t)(netdissect_options *,
const struct ie_tlv_header_t *ie_p, const u_char *p);
2006-09-04 20:04:42 +00:00
/* array of 16 codepages - currently we only support codepage 1,5 */
2015-01-06 19:03:11 +00:00
static const codeset_pr_func_t fr_q933_print_ie_codeset[] = {
NULL,
2006-09-04 20:04:42 +00:00
fr_q933_print_ie_codeset5,
NULL,
NULL,
NULL,
fr_q933_print_ie_codeset5,
NULL,
NULL,
NULL,
NULL,
NULL,
NULL,
NULL,
NULL,
NULL,
NULL
};
void
2015-01-06 19:03:11 +00:00
q933_print(netdissect_options *ndo,
const u_char *p, u_int length)
{
const u_char *ptemp = p;
2006-09-04 20:04:42 +00:00
struct ie_tlv_header_t *ie_p;
int olen;
int is_ansi = 0;
u_int codeset;
2006-09-04 20:04:42 +00:00
u_int ie_is_known = 0;
if (length < 9) { /* shortest: Q.933a LINK VERIFY */
2015-01-06 19:03:11 +00:00
ND_PRINT((ndo, "[|q.933]"));
return;
}
codeset = p[2]&0x0f; /* extract the codeset */
2009-03-21 16:23:46 +00:00
if (p[2] == MSG_ANSI_LOCKING_SHIFT) {
is_ansi = 1;
}
2015-01-06 19:03:11 +00:00
ND_PRINT((ndo, "%s", ndo->ndo_eflag ? "" : "Q.933, "));
/* printing out header part */
2015-01-06 19:03:11 +00:00
ND_PRINT((ndo, "%s, codeset %u", is_ansi ? "ANSI" : "CCITT", codeset));
2009-03-21 16:23:46 +00:00
if (p[0]) {
2015-01-06 19:03:11 +00:00
ND_PRINT((ndo, ", Call Ref: 0x%02x", p[0]));
2009-03-21 16:23:46 +00:00
}
2015-01-06 19:03:11 +00:00
if (ndo->ndo_vflag) {
ND_PRINT((ndo, ", %s (0x%02x), length %u",
2009-03-21 16:23:46 +00:00
tok2str(fr_q933_msg_values,
"unknown message", p[1]),
p[1],
2015-01-06 19:03:11 +00:00
length));
2009-03-21 16:23:46 +00:00
} else {
2015-01-06 19:03:11 +00:00
ND_PRINT((ndo, ", %s",
2009-03-21 16:23:46 +00:00
tok2str(fr_q933_msg_values,
2015-01-06 19:03:11 +00:00
"unknown message 0x%02x", p[1])));
2009-03-21 16:23:46 +00:00
}
olen = length; /* preserve the original length for non verbose mode */
if (length < (u_int)(2 - is_ansi)) {
2015-01-06 19:03:11 +00:00
ND_PRINT((ndo, "[|q.933]"));
return;
}
2009-03-21 16:23:46 +00:00
length -= 2 + is_ansi;
ptemp += 2 + is_ansi;
2015-01-06 19:03:11 +00:00
/* Loop through the rest of IE */
2009-03-21 16:23:46 +00:00
while (length > sizeof(struct ie_tlv_header_t)) {
2006-09-04 20:04:42 +00:00
ie_p = (struct ie_tlv_header_t *)ptemp;
2009-03-21 16:23:46 +00:00
if (length < sizeof(struct ie_tlv_header_t) ||
length < sizeof(struct ie_tlv_header_t) + ie_p->ie_len) {
2015-01-06 19:03:11 +00:00
if (ndo->ndo_vflag) { /* not bark if there is just a trailer */
ND_PRINT((ndo, "\n[|q.933]"));
2009-03-21 16:23:46 +00:00
} else {
2015-01-06 19:03:11 +00:00
ND_PRINT((ndo, ", length %u", olen));
2009-03-21 16:23:46 +00:00
}
return;
}
/* lets do the full IE parsing only in verbose mode
* however some IEs (DLCI Status, Link Verify)
2009-03-21 16:23:46 +00:00
* are also interestting in non-verbose mode */
2015-01-06 19:03:11 +00:00
if (ndo->ndo_vflag) {
ND_PRINT((ndo, "\n\t%s IE (0x%02x), length %u: ",
2009-03-21 16:23:46 +00:00
tok2str(fr_q933_ie_codesets[codeset],
"unknown", ie_p->ie_type),
2006-09-04 20:04:42 +00:00
ie_p->ie_type,
2015-01-06 19:03:11 +00:00
ie_p->ie_len));
2009-03-21 16:23:46 +00:00
}
2006-09-04 20:04:42 +00:00
/* sanity check */
2009-03-21 16:23:46 +00:00
if (ie_p->ie_type == 0 || ie_p->ie_len == 0) {
2006-09-04 20:04:42 +00:00
return;
2009-03-21 16:23:46 +00:00
}
2006-09-04 20:04:42 +00:00
2009-03-21 16:23:46 +00:00
if (fr_q933_print_ie_codeset[codeset] != NULL) {
2015-01-06 19:03:11 +00:00
ie_is_known = fr_q933_print_ie_codeset[codeset](ndo, ie_p, ptemp);
}
2009-03-21 16:23:46 +00:00
2015-01-06 19:03:11 +00:00
if (ndo->ndo_vflag >= 1 && !ie_is_known) {
print_unknown_data(ndo, ptemp+2, "\n\t", ie_p->ie_len);
2009-03-21 16:23:46 +00:00
}
/* do we want to see a hexdump of the IE ? */
2015-01-06 19:03:11 +00:00
if (ndo->ndo_vflag> 1 && ie_is_known) {
print_unknown_data(ndo, ptemp+2, "\n\t ", ie_p->ie_len);
2009-03-21 16:23:46 +00:00
}
length = length - ie_p->ie_len - 2;
ptemp = ptemp + ie_p->ie_len + 2;
}
2015-01-06 19:03:11 +00:00
if (!ndo->ndo_vflag) {
ND_PRINT((ndo, ", length %u", olen));
2009-03-21 16:23:46 +00:00
}
}
static int
2015-01-06 19:03:11 +00:00
fr_q933_print_ie_codeset5(netdissect_options *ndo,
const struct ie_tlv_header_t *ie_p, const u_char *p)
{
u_int dlci;
2006-09-04 20:04:42 +00:00
switch (ie_p->ie_type) {
case FR_LMI_ANSI_REPORT_TYPE_IE: /* fall through */
case FR_LMI_CCITT_REPORT_TYPE_IE:
2015-01-06 19:03:11 +00:00
if (ndo->ndo_vflag) {
ND_PRINT((ndo, "%s (%u)",
tok2str(fr_lmi_report_type_ie_values,"unknown",p[2]),
2015-01-06 19:03:11 +00:00
p[2]));
2009-03-21 16:23:46 +00:00
}
return 1;
case FR_LMI_ANSI_LINK_VERIFY_IE: /* fall through */
case FR_LMI_CCITT_LINK_VERIFY_IE:
case FR_LMI_ANSI_LINK_VERIFY_IE_91:
2015-01-06 19:03:11 +00:00
if (!ndo->ndo_vflag) {
ND_PRINT((ndo, ", "));
2009-03-21 16:23:46 +00:00
}
2015-01-06 19:03:11 +00:00
ND_PRINT((ndo, "TX Seq: %3d, RX Seq: %3d", p[2], p[3]));
return 1;
case FR_LMI_ANSI_PVC_STATUS_IE: /* fall through */
case FR_LMI_CCITT_PVC_STATUS_IE:
2015-01-06 19:03:11 +00:00
if (!ndo->ndo_vflag) {
ND_PRINT((ndo, ", "));
2009-03-21 16:23:46 +00:00
}
2015-01-06 19:03:11 +00:00
/* now parse the DLCI information element. */
if ((ie_p->ie_len < 3) ||
(p[2] & 0x80) ||
((ie_p->ie_len == 3) && !(p[3] & 0x80)) ||
((ie_p->ie_len == 4) && ((p[3] & 0x80) || !(p[4] & 0x80))) ||
((ie_p->ie_len == 5) && ((p[3] & 0x80) || (p[4] & 0x80) ||
!(p[5] & 0x80))) ||
(ie_p->ie_len > 5) ||
2009-03-21 16:23:46 +00:00
!(p[ie_p->ie_len + 1] & 0x80)) {
2015-01-06 19:03:11 +00:00
ND_PRINT((ndo, "Invalid DLCI IE"));
2009-03-21 16:23:46 +00:00
}
2015-01-06 19:03:11 +00:00
dlci = ((p[2] & 0x3F) << 4) | ((p[3] & 0x78) >> 3);
2009-03-21 16:23:46 +00:00
if (ie_p->ie_len == 4) {
dlci = (dlci << 6) | ((p[4] & 0x7E) >> 1);
2009-03-21 16:23:46 +00:00
}
else if (ie_p->ie_len == 5) {
dlci = (dlci << 13) | (p[4] & 0x7F) | ((p[5] & 0x7E) >> 1);
2009-03-21 16:23:46 +00:00
}
2015-01-06 19:03:11 +00:00
ND_PRINT((ndo, "DLCI %u: status %s%s", dlci,
p[ie_p->ie_len + 1] & 0x8 ? "New, " : "",
2015-01-06 19:03:11 +00:00
p[ie_p->ie_len + 1] & 0x2 ? "Active" : "Inactive"));
return 1;
}
return 0;
}
2015-01-06 19:03:11 +00:00
/*
* Local Variables:
* c-style: whitesmith
* c-basic-offset: 8
* End:
*/