nexmon – Blame information for rev 1
?pathlinks?
Rev | Author | Line No. | Line |
---|---|---|---|
1 | office | 1 | /* |
2 | * Copyright (c) 1990, 1991, 1993, 1994, 1995, 1996 |
||
3 | * The Regents of the University of California. All rights reserved. |
||
4 | * |
||
5 | * Redistribution and use in source and binary forms, with or without |
||
6 | * modification, are permitted provided that: (1) source code distributions |
||
7 | * retain the above copyright notice and this paragraph in its entirety, (2) |
||
8 | * distributions including binary code include the above copyright notice and |
||
9 | * this paragraph in its entirety in the documentation or other materials |
||
10 | * provided with the distribution, and (3) all advertising materials mentioning |
||
11 | * features or use of this software display the following acknowledgement: |
||
12 | * ``This product includes software developed by the University of California, |
||
13 | * Lawrence Berkeley Laboratory and its contributors.'' Neither the name of |
||
14 | * the University nor the names of its contributors may be used to endorse |
||
15 | * or promote products derived from this software without specific prior |
||
16 | * written permission. |
||
17 | * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED |
||
18 | * WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF |
||
19 | * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. |
||
20 | */ |
||
21 | |||
22 | #define NETDISSECT_REWORKED |
||
23 | #ifdef HAVE_CONFIG_H |
||
24 | #include "config.h" |
||
25 | #endif |
||
26 | |||
27 | #include <tcpdump-stdinc.h> |
||
28 | |||
29 | #include <stdio.h> |
||
30 | #include <string.h> |
||
31 | |||
32 | #include "interface.h" |
||
33 | #include "addrtoname.h" |
||
34 | #include "ethertype.h" |
||
35 | #include "llc.h" |
||
36 | #include "nlpid.h" |
||
37 | #include "extract.h" |
||
38 | #include "oui.h" |
||
39 | |||
40 | static void frf15_print(netdissect_options *ndo, const u_char *, u_int); |
||
41 | |||
42 | /* |
||
43 | * the frame relay header has a variable length |
||
44 | * |
||
45 | * the EA bit determines if there is another byte |
||
46 | * in the header |
||
47 | * |
||
48 | * minimum header length is 2 bytes |
||
49 | * maximum header length is 4 bytes |
||
50 | * |
||
51 | * 7 6 5 4 3 2 1 0 |
||
52 | * +----+----+----+----+----+----+----+----+ |
||
53 | * | DLCI (6 bits) | CR | EA | |
||
54 | * +----+----+----+----+----+----+----+----+ |
||
55 | * | DLCI (4 bits) |FECN|BECN| DE | EA | |
||
56 | * +----+----+----+----+----+----+----+----+ |
||
57 | * | DLCI (7 bits) | EA | |
||
58 | * +----+----+----+----+----+----+----+----+ |
||
59 | * | DLCI (6 bits) |SDLC| EA | |
||
60 | * +----+----+----+----+----+----+----+----+ |
||
61 | */ |
||
62 | |||
63 | #define FR_EA_BIT 0x01 |
||
64 | |||
65 | #define FR_CR_BIT 0x02000000 |
||
66 | #define FR_DE_BIT 0x00020000 |
||
67 | #define FR_BECN_BIT 0x00040000 |
||
68 | #define FR_FECN_BIT 0x00080000 |
||
69 | #define FR_SDLC_BIT 0x00000002 |
||
70 | |||
71 | |||
72 | static const struct tok fr_header_flag_values[] = { |
||
73 | { FR_CR_BIT, "C!" }, |
||
74 | { FR_DE_BIT, "DE" }, |
||
75 | { FR_BECN_BIT, "BECN" }, |
||
76 | { FR_FECN_BIT, "FECN" }, |
||
77 | { FR_SDLC_BIT, "sdlcore" }, |
||
78 | { 0, NULL } |
||
79 | }; |
||
80 | |||
81 | /* FRF.15 / FRF.16 */ |
||
82 | #define MFR_B_BIT 0x80 |
||
83 | #define MFR_E_BIT 0x40 |
||
84 | #define MFR_C_BIT 0x20 |
||
85 | #define MFR_BEC_MASK (MFR_B_BIT | MFR_E_BIT | MFR_C_BIT) |
||
86 | #define MFR_CTRL_FRAME (MFR_B_BIT | MFR_E_BIT | MFR_C_BIT) |
||
87 | #define MFR_FRAG_FRAME (MFR_B_BIT | MFR_E_BIT ) |
||
88 | |||
89 | static const struct tok frf_flag_values[] = { |
||
90 | { MFR_B_BIT, "Begin" }, |
||
91 | { MFR_E_BIT, "End" }, |
||
92 | { MFR_C_BIT, "Control" }, |
||
93 | { 0, NULL } |
||
94 | }; |
||
95 | |||
96 | /* Finds out Q.922 address length, DLCI and flags. Returns 1 on success, |
||
97 | * 0 on invalid address, -1 on truncated packet |
||
98 | * save the flags dep. on address length |
||
99 | */ |
||
100 | static int parse_q922_addr(netdissect_options *ndo, |
||
101 | const u_char *p, u_int *dlci, |
||
102 | u_int *addr_len, uint8_t *flags, u_int length) |
||
103 | { |
||
104 | if (!ND_TTEST(p[0]) || length < 1) |
||
105 | return -1; |
||
106 | if ((p[0] & FR_EA_BIT)) |
||
107 | return 0; |
||
108 | |||
109 | if (!ND_TTEST(p[1]) || length < 2) |
||
110 | return -1; |
||
111 | *addr_len = 2; |
||
112 | *dlci = ((p[0] & 0xFC) << 2) | ((p[1] & 0xF0) >> 4); |
||
113 | |||
114 | flags[0] = p[0] & 0x02; /* populate the first flag fields */ |
||
115 | flags[1] = p[1] & 0x0c; |
||
116 | flags[2] = 0; /* clear the rest of the flags */ |
||
117 | flags[3] = 0; |
||
118 | |||
119 | if (p[1] & FR_EA_BIT) |
||
120 | return 1; /* 2-byte Q.922 address */ |
||
121 | |||
122 | p += 2; |
||
123 | length -= 2; |
||
124 | if (!ND_TTEST(p[0]) || length < 1) |
||
125 | return -1; |
||
126 | (*addr_len)++; /* 3- or 4-byte Q.922 address */ |
||
127 | if ((p[0] & FR_EA_BIT) == 0) { |
||
128 | *dlci = (*dlci << 7) | (p[0] >> 1); |
||
129 | (*addr_len)++; /* 4-byte Q.922 address */ |
||
130 | p++; |
||
131 | length--; |
||
132 | } |
||
133 | |||
134 | if (!ND_TTEST(p[0]) || length < 1) |
||
135 | return -1; |
||
136 | if ((p[0] & FR_EA_BIT) == 0) |
||
137 | return 0; /* more than 4 bytes of Q.922 address? */ |
||
138 | |||
139 | flags[3] = p[0] & 0x02; |
||
140 | |||
141 | *dlci = (*dlci << 6) | (p[0] >> 2); |
||
142 | |||
143 | return 1; |
||
144 | } |
||
145 | |||
146 | char * |
||
147 | q922_string(netdissect_options *ndo, const u_char *p, u_int length) |
||
148 | { |
||
149 | |||
150 | static u_int dlci, addr_len; |
||
151 | static uint8_t flags[4]; |
||
152 | static char buffer[sizeof("DLCI xxxxxxxxxx")]; |
||
153 | memset(buffer, 0, sizeof(buffer)); |
||
154 | |||
155 | if (parse_q922_addr(ndo, p, &dlci, &addr_len, flags, length) == 1){ |
||
156 | snprintf(buffer, sizeof(buffer), "DLCI %u", dlci); |
||
157 | } |
||
158 | |||
159 | return buffer; |
||
160 | } |
||
161 | |||
162 | |||
163 | /* Frame Relay packet structure, with flags and CRC removed |
||
164 | |||
165 | +---------------------------+ |
||
166 | | Q.922 Address* | |
||
167 | +-- --+ |
||
168 | | | |
||
169 | +---------------------------+ |
||
170 | | Control (UI = 0x03) | |
||
171 | +---------------------------+ |
||
172 | | Optional Pad (0x00) | |
||
173 | +---------------------------+ |
||
174 | | NLPID | |
||
175 | +---------------------------+ |
||
176 | | . | |
||
177 | | . | |
||
178 | | . | |
||
179 | | Data | |
||
180 | | . | |
||
181 | | . | |
||
182 | +---------------------------+ |
||
183 | |||
184 | * Q.922 addresses, as presently defined, are two octets and |
||
185 | contain a 10-bit DLCI. In some networks Q.922 addresses |
||
186 | may optionally be increased to three or four octets. |
||
187 | */ |
||
188 | |||
189 | static void |
||
190 | fr_hdr_print(netdissect_options *ndo, |
||
191 | int length, u_int addr_len, u_int dlci, uint8_t *flags, uint16_t nlpid) |
||
192 | { |
||
193 | if (ndo->ndo_qflag) { |
||
194 | ND_PRINT((ndo, "Q.922, DLCI %u, length %u: ", |
||
195 | dlci, |
||
196 | length)); |
||
197 | } else { |
||
198 | if (nlpid <= 0xff) /* if its smaller than 256 then its a NLPID */ |
||
199 | ND_PRINT((ndo, "Q.922, hdr-len %u, DLCI %u, Flags [%s], NLPID %s (0x%02x), length %u: ", |
||
200 | addr_len, |
||
201 | dlci, |
||
202 | bittok2str(fr_header_flag_values, "none", EXTRACT_32BITS(flags)), |
||
203 | tok2str(nlpid_values,"unknown", nlpid), |
||
204 | nlpid, |
||
205 | length)); |
||
206 | else /* must be an ethertype */ |
||
207 | ND_PRINT((ndo, "Q.922, hdr-len %u, DLCI %u, Flags [%s], cisco-ethertype %s (0x%04x), length %u: ", |
||
208 | addr_len, |
||
209 | dlci, |
||
210 | bittok2str(fr_header_flag_values, "none", EXTRACT_32BITS(flags)), |
||
211 | tok2str(ethertype_values, "unknown", nlpid), |
||
212 | nlpid, |
||
213 | length)); |
||
214 | } |
||
215 | } |
||
216 | |||
217 | u_int |
||
218 | fr_if_print(netdissect_options *ndo, |
||
219 | const struct pcap_pkthdr *h, register const u_char *p) |
||
220 | { |
||
221 | register u_int length = h->len; |
||
222 | register u_int caplen = h->caplen; |
||
223 | |||
224 | ND_TCHECK2(*p, 4); /* minimum frame header length */ |
||
225 | |||
226 | if ((length = fr_print(ndo, p, length)) == 0) |
||
227 | return (0); |
||
228 | else |
||
229 | return length; |
||
230 | trunc: |
||
231 | ND_PRINT((ndo, "[|fr]")); |
||
232 | return caplen; |
||
233 | } |
||
234 | |||
235 | u_int |
||
236 | fr_print(netdissect_options *ndo, |
||
237 | register const u_char *p, u_int length) |
||
238 | { |
||
239 | int ret; |
||
240 | uint16_t extracted_ethertype; |
||
241 | u_int dlci; |
||
242 | u_int addr_len; |
||
243 | uint16_t nlpid; |
||
244 | u_int hdr_len; |
||
245 | uint8_t flags[4]; |
||
246 | |||
247 | ret = parse_q922_addr(ndo, p, &dlci, &addr_len, flags, length); |
||
248 | if (ret == -1) |
||
249 | goto trunc; |
||
250 | if (ret == 0) { |
||
251 | ND_PRINT((ndo, "Q.922, invalid address")); |
||
252 | return 0; |
||
253 | } |
||
254 | |||
255 | ND_TCHECK(p[addr_len]); |
||
256 | if (length < addr_len + 1) |
||
257 | goto trunc; |
||
258 | |||
259 | if (p[addr_len] != LLC_UI && dlci != 0) { |
||
260 | /* |
||
261 | * Let's figure out if we have Cisco-style encapsulation, |
||
262 | * with an Ethernet type (Cisco HDLC type?) following the |
||
263 | * address. |
||
264 | */ |
||
265 | if (!ND_TTEST2(p[addr_len], 2) || length < addr_len + 2) { |
||
266 | /* no Ethertype */ |
||
267 | ND_PRINT((ndo, "UI %02x! ", p[addr_len])); |
||
268 | } else { |
||
269 | extracted_ethertype = EXTRACT_16BITS(p+addr_len); |
||
270 | |||
271 | if (ndo->ndo_eflag) |
||
272 | fr_hdr_print(ndo, length, addr_len, dlci, |
||
273 | flags, extracted_ethertype); |
||
274 | |||
275 | if (ethertype_print(ndo, extracted_ethertype, |
||
276 | p+addr_len+ETHERTYPE_LEN, |
||
277 | length-addr_len-ETHERTYPE_LEN, |
||
278 | length-addr_len-ETHERTYPE_LEN) == 0) |
||
279 | /* ether_type not known, probably it wasn't one */ |
||
280 | ND_PRINT((ndo, "UI %02x! ", p[addr_len])); |
||
281 | else |
||
282 | return addr_len + 2; |
||
283 | } |
||
284 | } |
||
285 | |||
286 | ND_TCHECK(p[addr_len+1]); |
||
287 | if (length < addr_len + 2) |
||
288 | goto trunc; |
||
289 | |||
290 | if (p[addr_len + 1] == 0) { |
||
291 | /* |
||
292 | * Assume a pad byte after the control (UI) byte. |
||
293 | * A pad byte should only be used with 3-byte Q.922. |
||
294 | */ |
||
295 | if (addr_len != 3) |
||
296 | ND_PRINT((ndo, "Pad! ")); |
||
297 | hdr_len = addr_len + 1 /* UI */ + 1 /* pad */ + 1 /* NLPID */; |
||
298 | } else { |
||
299 | /* |
||
300 | * Not a pad byte. |
||
301 | * A pad byte should be used with 3-byte Q.922. |
||
302 | */ |
||
303 | if (addr_len == 3) |
||
304 | ND_PRINT((ndo, "No pad! ")); |
||
305 | hdr_len = addr_len + 1 /* UI */ + 1 /* NLPID */; |
||
306 | } |
||
307 | |||
308 | ND_TCHECK(p[hdr_len - 1]); |
||
309 | if (length < hdr_len) |
||
310 | goto trunc; |
||
311 | nlpid = p[hdr_len - 1]; |
||
312 | |||
313 | if (ndo->ndo_eflag) |
||
314 | fr_hdr_print(ndo, length, addr_len, dlci, flags, nlpid); |
||
315 | p += hdr_len; |
||
316 | length -= hdr_len; |
||
317 | |||
318 | switch (nlpid) { |
||
319 | case NLPID_IP: |
||
320 | ip_print(ndo, p, length); |
||
321 | break; |
||
322 | |||
323 | case NLPID_IP6: |
||
324 | ip6_print(ndo, p, length); |
||
325 | break; |
||
326 | |||
327 | case NLPID_CLNP: |
||
328 | case NLPID_ESIS: |
||
329 | case NLPID_ISIS: |
||
330 | isoclns_print(ndo, p - 1, length + 1, length + 1); /* OSI printers need the NLPID field */ |
||
331 | break; |
||
332 | |||
333 | case NLPID_SNAP: |
||
334 | if (snap_print(ndo, p, length, length, 0) == 0) { |
||
335 | /* ether_type not known, print raw packet */ |
||
336 | if (!ndo->ndo_eflag) |
||
337 | fr_hdr_print(ndo, length + hdr_len, hdr_len, |
||
338 | dlci, flags, nlpid); |
||
339 | if (!ndo->ndo_suppress_default_print) |
||
340 | ND_DEFAULTPRINT(p - hdr_len, length + hdr_len); |
||
341 | } |
||
342 | break; |
||
343 | |||
344 | case NLPID_Q933: |
||
345 | q933_print(ndo, p, length); |
||
346 | break; |
||
347 | |||
348 | case NLPID_MFR: |
||
349 | frf15_print(ndo, p, length); |
||
350 | break; |
||
351 | |||
352 | case NLPID_PPP: |
||
353 | ppp_print(ndo, p, length); |
||
354 | break; |
||
355 | |||
356 | default: |
||
357 | if (!ndo->ndo_eflag) |
||
358 | fr_hdr_print(ndo, length + hdr_len, addr_len, |
||
359 | dlci, flags, nlpid); |
||
360 | if (!ndo->ndo_xflag) |
||
361 | ND_DEFAULTPRINT(p, length); |
||
362 | } |
||
363 | |||
364 | return hdr_len; |
||
365 | |||
366 | trunc: |
||
367 | ND_PRINT((ndo, "[|fr]")); |
||
368 | return 0; |
||
369 | |||
370 | } |
||
371 | |||
372 | u_int |
||
373 | mfr_if_print(netdissect_options *ndo, |
||
374 | const struct pcap_pkthdr *h, register const u_char *p) |
||
375 | { |
||
376 | register u_int length = h->len; |
||
377 | register u_int caplen = h->caplen; |
||
378 | |||
379 | ND_TCHECK2(*p, 2); /* minimum frame header length */ |
||
380 | |||
381 | if ((length = mfr_print(ndo, p, length)) == 0) |
||
382 | return (0); |
||
383 | else |
||
384 | return length; |
||
385 | trunc: |
||
386 | ND_PRINT((ndo, "[|mfr]")); |
||
387 | return caplen; |
||
388 | } |
||
389 | |||
390 | |||
391 | #define MFR_CTRL_MSG_ADD_LINK 1 |
||
392 | #define MFR_CTRL_MSG_ADD_LINK_ACK 2 |
||
393 | #define MFR_CTRL_MSG_ADD_LINK_REJ 3 |
||
394 | #define MFR_CTRL_MSG_HELLO 4 |
||
395 | #define MFR_CTRL_MSG_HELLO_ACK 5 |
||
396 | #define MFR_CTRL_MSG_REMOVE_LINK 6 |
||
397 | #define MFR_CTRL_MSG_REMOVE_LINK_ACK 7 |
||
398 | |||
399 | static const struct tok mfr_ctrl_msg_values[] = { |
||
400 | { MFR_CTRL_MSG_ADD_LINK, "Add Link" }, |
||
401 | { MFR_CTRL_MSG_ADD_LINK_ACK, "Add Link ACK" }, |
||
402 | { MFR_CTRL_MSG_ADD_LINK_REJ, "Add Link Reject" }, |
||
403 | { MFR_CTRL_MSG_HELLO, "Hello" }, |
||
404 | { MFR_CTRL_MSG_HELLO_ACK, "Hello ACK" }, |
||
405 | { MFR_CTRL_MSG_REMOVE_LINK, "Remove Link" }, |
||
406 | { MFR_CTRL_MSG_REMOVE_LINK_ACK, "Remove Link ACK" }, |
||
407 | { 0, NULL } |
||
408 | }; |
||
409 | |||
410 | #define MFR_CTRL_IE_BUNDLE_ID 1 |
||
411 | #define MFR_CTRL_IE_LINK_ID 2 |
||
412 | #define MFR_CTRL_IE_MAGIC_NUM 3 |
||
413 | #define MFR_CTRL_IE_TIMESTAMP 5 |
||
414 | #define MFR_CTRL_IE_VENDOR_EXT 6 |
||
415 | #define MFR_CTRL_IE_CAUSE 7 |
||
416 | |||
417 | static const struct tok mfr_ctrl_ie_values[] = { |
||
418 | { MFR_CTRL_IE_BUNDLE_ID, "Bundle ID"}, |
||
419 | { MFR_CTRL_IE_LINK_ID, "Link ID"}, |
||
420 | { MFR_CTRL_IE_MAGIC_NUM, "Magic Number"}, |
||
421 | { MFR_CTRL_IE_TIMESTAMP, "Timestamp"}, |
||
422 | { MFR_CTRL_IE_VENDOR_EXT, "Vendor Extension"}, |
||
423 | { MFR_CTRL_IE_CAUSE, "Cause"}, |
||
424 | { 0, NULL } |
||
425 | }; |
||
426 | |||
427 | #define MFR_ID_STRING_MAXLEN 50 |
||
428 | |||
429 | struct ie_tlv_header_t { |
||
430 | uint8_t ie_type; |
||
431 | uint8_t ie_len; |
||
432 | }; |
||
433 | |||
434 | u_int |
||
435 | mfr_print(netdissect_options *ndo, |
||
436 | register const u_char *p, u_int length) |
||
437 | { |
||
438 | u_int tlen,idx,hdr_len = 0; |
||
439 | uint16_t sequence_num; |
||
440 | uint8_t ie_type,ie_len; |
||
441 | const uint8_t *tptr; |
||
442 | |||
443 | |||
444 | /* |
||
445 | * FRF.16 Link Integrity Control Frame |
||
446 | * |
||
447 | * 7 6 5 4 3 2 1 0 |
||
448 | * +----+----+----+----+----+----+----+----+ |
||
449 | * | B | E | C=1| 0 0 0 0 | EA | |
||
450 | * +----+----+----+----+----+----+----+----+ |
||
451 | * | 0 0 0 0 0 0 0 0 | |
||
452 | * +----+----+----+----+----+----+----+----+ |
||
453 | * | message type | |
||
454 | * +----+----+----+----+----+----+----+----+ |
||
455 | */ |
||
456 | |||
457 | ND_TCHECK2(*p, 4); /* minimum frame header length */ |
||
458 | |||
459 | if ((p[0] & MFR_BEC_MASK) == MFR_CTRL_FRAME && p[1] == 0) { |
||
460 | ND_PRINT((ndo, "FRF.16 Control, Flags [%s], %s, length %u", |
||
461 | bittok2str(frf_flag_values,"none",(p[0] & MFR_BEC_MASK)), |
||
462 | tok2str(mfr_ctrl_msg_values,"Unknown Message (0x%02x)",p[2]), |
||
463 | length)); |
||
464 | tptr = p + 3; |
||
465 | tlen = length -3; |
||
466 | hdr_len = 3; |
||
467 | |||
468 | if (!ndo->ndo_vflag) |
||
469 | return hdr_len; |
||
470 | |||
471 | while (tlen>sizeof(struct ie_tlv_header_t)) { |
||
472 | ND_TCHECK2(*tptr, sizeof(struct ie_tlv_header_t)); |
||
473 | ie_type=tptr[0]; |
||
474 | ie_len=tptr[1]; |
||
475 | |||
476 | ND_PRINT((ndo, "\n\tIE %s (%u), length %u: ", |
||
477 | tok2str(mfr_ctrl_ie_values,"Unknown",ie_type), |
||
478 | ie_type, |
||
479 | ie_len)); |
||
480 | |||
481 | /* infinite loop check */ |
||
482 | if (ie_type == 0 || ie_len <= sizeof(struct ie_tlv_header_t)) |
||
483 | return hdr_len; |
||
484 | |||
485 | ND_TCHECK2(*tptr, ie_len); |
||
486 | tptr+=sizeof(struct ie_tlv_header_t); |
||
487 | /* tlv len includes header */ |
||
488 | ie_len-=sizeof(struct ie_tlv_header_t); |
||
489 | tlen-=sizeof(struct ie_tlv_header_t); |
||
490 | |||
491 | switch (ie_type) { |
||
492 | |||
493 | case MFR_CTRL_IE_MAGIC_NUM: |
||
494 | ND_PRINT((ndo, "0x%08x", EXTRACT_32BITS(tptr))); |
||
495 | break; |
||
496 | |||
497 | case MFR_CTRL_IE_BUNDLE_ID: /* same message format */ |
||
498 | case MFR_CTRL_IE_LINK_ID: |
||
499 | for (idx = 0; idx < ie_len && idx < MFR_ID_STRING_MAXLEN; idx++) { |
||
500 | if (*(tptr+idx) != 0) /* don't print null termination */ |
||
501 | safeputchar(ndo, *(tptr + idx)); |
||
502 | else |
||
503 | break; |
||
504 | } |
||
505 | break; |
||
506 | |||
507 | case MFR_CTRL_IE_TIMESTAMP: |
||
508 | if (ie_len == sizeof(struct timeval)) { |
||
509 | ts_print(ndo, (const struct timeval *)tptr); |
||
510 | break; |
||
511 | } |
||
512 | /* fall through and hexdump if no unix timestamp */ |
||
513 | |||
514 | /* |
||
515 | * FIXME those are the defined IEs that lack a decoder |
||
516 | * you are welcome to contribute code ;-) |
||
517 | */ |
||
518 | |||
519 | case MFR_CTRL_IE_VENDOR_EXT: |
||
520 | case MFR_CTRL_IE_CAUSE: |
||
521 | |||
522 | default: |
||
523 | if (ndo->ndo_vflag <= 1) |
||
524 | print_unknown_data(ndo, tptr, "\n\t ", ie_len); |
||
525 | break; |
||
526 | } |
||
527 | |||
528 | /* do we want to see a hexdump of the IE ? */ |
||
529 | if (ndo->ndo_vflag > 1 ) |
||
530 | print_unknown_data(ndo, tptr, "\n\t ", ie_len); |
||
531 | |||
532 | tlen-=ie_len; |
||
533 | tptr+=ie_len; |
||
534 | } |
||
535 | return hdr_len; |
||
536 | } |
||
537 | /* |
||
538 | * FRF.16 Fragmentation Frame |
||
539 | * |
||
540 | * 7 6 5 4 3 2 1 0 |
||
541 | * +----+----+----+----+----+----+----+----+ |
||
542 | * | B | E | C=0|seq. (high 4 bits) | EA | |
||
543 | * +----+----+----+----+----+----+----+----+ |
||
544 | * | sequence (low 8 bits) | |
||
545 | * +----+----+----+----+----+----+----+----+ |
||
546 | * | DLCI (6 bits) | CR | EA | |
||
547 | * +----+----+----+----+----+----+----+----+ |
||
548 | * | DLCI (4 bits) |FECN|BECN| DE | EA | |
||
549 | * +----+----+----+----+----+----+----+----+ |
||
550 | */ |
||
551 | |||
552 | sequence_num = (p[0]&0x1e)<<7 | p[1]; |
||
553 | /* whole packet or first fragment ? */ |
||
554 | if ((p[0] & MFR_BEC_MASK) == MFR_FRAG_FRAME || |
||
555 | (p[0] & MFR_BEC_MASK) == MFR_B_BIT) { |
||
556 | ND_PRINT((ndo, "FRF.16 Frag, seq %u, Flags [%s], ", |
||
557 | sequence_num, |
||
558 | bittok2str(frf_flag_values,"none",(p[0] & MFR_BEC_MASK)))); |
||
559 | hdr_len = 2; |
||
560 | fr_print(ndo, p+hdr_len,length-hdr_len); |
||
561 | return hdr_len; |
||
562 | } |
||
563 | |||
564 | /* must be a middle or the last fragment */ |
||
565 | ND_PRINT((ndo, "FRF.16 Frag, seq %u, Flags [%s]", |
||
566 | sequence_num, |
||
567 | bittok2str(frf_flag_values,"none",(p[0] & MFR_BEC_MASK)))); |
||
568 | print_unknown_data(ndo, p, "\n\t", length); |
||
569 | |||
570 | return hdr_len; |
||
571 | |||
572 | trunc: |
||
573 | ND_PRINT((ndo, "[|mfr]")); |
||
574 | return length; |
||
575 | } |
||
576 | |||
577 | /* an NLPID of 0xb1 indicates a 2-byte |
||
578 | * FRF.15 header |
||
579 | * |
||
580 | * 7 6 5 4 3 2 1 0 |
||
581 | * +----+----+----+----+----+----+----+----+ |
||
582 | * ~ Q.922 header ~ |
||
583 | * +----+----+----+----+----+----+----+----+ |
||
584 | * | NLPID (8 bits) | NLPID=0xb1 |
||
585 | * +----+----+----+----+----+----+----+----+ |
||
586 | * | B | E | C |seq. (high 4 bits) | R | |
||
587 | * +----+----+----+----+----+----+----+----+ |
||
588 | * | sequence (low 8 bits) | |
||
589 | * +----+----+----+----+----+----+----+----+ |
||
590 | */ |
||
591 | |||
592 | #define FR_FRF15_FRAGTYPE 0x01 |
||
593 | |||
594 | static void |
||
595 | frf15_print(netdissect_options *ndo, |
||
596 | const u_char *p, u_int length) |
||
597 | { |
||
598 | uint16_t sequence_num, flags; |
||
599 | |||
600 | flags = p[0]&MFR_BEC_MASK; |
||
601 | sequence_num = (p[0]&0x1e)<<7 | p[1]; |
||
602 | |||
603 | ND_PRINT((ndo, "FRF.15, seq 0x%03x, Flags [%s],%s Fragmentation, length %u", |
||
604 | sequence_num, |
||
605 | bittok2str(frf_flag_values,"none",flags), |
||
606 | p[0]&FR_FRF15_FRAGTYPE ? "Interface" : "End-to-End", |
||
607 | length)); |
||
608 | |||
609 | /* TODO: |
||
610 | * depending on all permutations of the B, E and C bit |
||
611 | * dig as deep as we can - e.g. on the first (B) fragment |
||
612 | * there is enough payload to print the IP header |
||
613 | * on non (B) fragments it depends if the fragmentation |
||
614 | * model is end-to-end or interface based wether we want to print |
||
615 | * another Q.922 header |
||
616 | */ |
||
617 | |||
618 | } |
||
619 | |||
620 | /* |
||
621 | * Q.933 decoding portion for framerelay specific. |
||
622 | */ |
||
623 | |||
624 | /* Q.933 packet format |
||
625 | Format of Other Protocols |
||
626 | using Q.933 NLPID |
||
627 | +-------------------------------+ |
||
628 | | Q.922 Address | |
||
629 | +---------------+---------------+ |
||
630 | |Control 0x03 | NLPID 0x08 | |
||
631 | +---------------+---------------+ |
||
632 | | L2 Protocol ID | |
||
633 | | octet 1 | octet 2 | |
||
634 | +-------------------------------+ |
||
635 | | L3 Protocol ID | |
||
636 | | octet 2 | octet 2 | |
||
637 | +-------------------------------+ |
||
638 | | Protocol Data | |
||
639 | +-------------------------------+ |
||
640 | | FCS | |
||
641 | +-------------------------------+ |
||
642 | */ |
||
643 | |||
644 | /* L2 (Octet 1)- Call Reference Usually is 0x0 */ |
||
645 | |||
646 | /* |
||
647 | * L2 (Octet 2)- Message Types definition 1 byte long. |
||
648 | */ |
||
649 | /* Call Establish */ |
||
650 | #define MSG_TYPE_ESC_TO_NATIONAL 0x00 |
||
651 | #define MSG_TYPE_ALERT 0x01 |
||
652 | #define MSG_TYPE_CALL_PROCEEDING 0x02 |
||
653 | #define MSG_TYPE_CONNECT 0x07 |
||
654 | #define MSG_TYPE_CONNECT_ACK 0x0F |
||
655 | #define MSG_TYPE_PROGRESS 0x03 |
||
656 | #define MSG_TYPE_SETUP 0x05 |
||
657 | /* Call Clear */ |
||
658 | #define MSG_TYPE_DISCONNECT 0x45 |
||
659 | #define MSG_TYPE_RELEASE 0x4D |
||
660 | #define MSG_TYPE_RELEASE_COMPLETE 0x5A |
||
661 | #define MSG_TYPE_RESTART 0x46 |
||
662 | #define MSG_TYPE_RESTART_ACK 0x4E |
||
663 | /* Status */ |
||
664 | #define MSG_TYPE_STATUS 0x7D |
||
665 | #define MSG_TYPE_STATUS_ENQ 0x75 |
||
666 | |||
667 | static const struct tok fr_q933_msg_values[] = { |
||
668 | { MSG_TYPE_ESC_TO_NATIONAL, "ESC to National" }, |
||
669 | { MSG_TYPE_ALERT, "Alert" }, |
||
670 | { MSG_TYPE_CALL_PROCEEDING, "Call proceeding" }, |
||
671 | { MSG_TYPE_CONNECT, "Connect" }, |
||
672 | { MSG_TYPE_CONNECT_ACK, "Connect ACK" }, |
||
673 | { MSG_TYPE_PROGRESS, "Progress" }, |
||
674 | { MSG_TYPE_SETUP, "Setup" }, |
||
675 | { MSG_TYPE_DISCONNECT, "Disconnect" }, |
||
676 | { MSG_TYPE_RELEASE, "Release" }, |
||
677 | { MSG_TYPE_RELEASE_COMPLETE, "Release Complete" }, |
||
678 | { MSG_TYPE_RESTART, "Restart" }, |
||
679 | { MSG_TYPE_RESTART_ACK, "Restart ACK" }, |
||
680 | { MSG_TYPE_STATUS, "Status Reply" }, |
||
681 | { MSG_TYPE_STATUS_ENQ, "Status Enquiry" }, |
||
682 | { 0, NULL } |
||
683 | }; |
||
684 | |||
685 | #define MSG_ANSI_LOCKING_SHIFT 0x95 |
||
686 | |||
687 | #define FR_LMI_ANSI_REPORT_TYPE_IE 0x01 |
||
688 | #define FR_LMI_ANSI_LINK_VERIFY_IE_91 0x19 /* details? */ |
||
689 | #define FR_LMI_ANSI_LINK_VERIFY_IE 0x03 |
||
690 | #define FR_LMI_ANSI_PVC_STATUS_IE 0x07 |
||
691 | |||
692 | #define FR_LMI_CCITT_REPORT_TYPE_IE 0x51 |
||
693 | #define FR_LMI_CCITT_LINK_VERIFY_IE 0x53 |
||
694 | #define FR_LMI_CCITT_PVC_STATUS_IE 0x57 |
||
695 | |||
696 | static const struct tok fr_q933_ie_values_codeset5[] = { |
||
697 | { FR_LMI_ANSI_REPORT_TYPE_IE, "ANSI Report Type" }, |
||
698 | { FR_LMI_ANSI_LINK_VERIFY_IE_91, "ANSI Link Verify" }, |
||
699 | { FR_LMI_ANSI_LINK_VERIFY_IE, "ANSI Link Verify" }, |
||
700 | { FR_LMI_ANSI_PVC_STATUS_IE, "ANSI PVC Status" }, |
||
701 | { FR_LMI_CCITT_REPORT_TYPE_IE, "CCITT Report Type" }, |
||
702 | { FR_LMI_CCITT_LINK_VERIFY_IE, "CCITT Link Verify" }, |
||
703 | { FR_LMI_CCITT_PVC_STATUS_IE, "CCITT PVC Status" }, |
||
704 | { 0, NULL } |
||
705 | }; |
||
706 | |||
707 | #define FR_LMI_REPORT_TYPE_IE_FULL_STATUS 0 |
||
708 | #define FR_LMI_REPORT_TYPE_IE_LINK_VERIFY 1 |
||
709 | #define FR_LMI_REPORT_TYPE_IE_ASYNC_PVC 2 |
||
710 | |||
711 | static const struct tok fr_lmi_report_type_ie_values[] = { |
||
712 | { FR_LMI_REPORT_TYPE_IE_FULL_STATUS, "Full Status" }, |
||
713 | { FR_LMI_REPORT_TYPE_IE_LINK_VERIFY, "Link verify" }, |
||
714 | { FR_LMI_REPORT_TYPE_IE_ASYNC_PVC, "Async PVC Status" }, |
||
715 | { 0, NULL } |
||
716 | }; |
||
717 | |||
718 | /* array of 16 codepages - currently we only support codepage 1,5 */ |
||
719 | static const struct tok *fr_q933_ie_codesets[] = { |
||
720 | NULL, |
||
721 | fr_q933_ie_values_codeset5, |
||
722 | NULL, |
||
723 | NULL, |
||
724 | NULL, |
||
725 | fr_q933_ie_values_codeset5, |
||
726 | NULL, |
||
727 | NULL, |
||
728 | NULL, |
||
729 | NULL, |
||
730 | NULL, |
||
731 | NULL, |
||
732 | NULL, |
||
733 | NULL, |
||
734 | NULL, |
||
735 | NULL |
||
736 | }; |
||
737 | |||
738 | static int fr_q933_print_ie_codeset5(netdissect_options *ndo, |
||
739 | const struct ie_tlv_header_t *ie_p, const u_char *p); |
||
740 | |||
741 | typedef int (*codeset_pr_func_t)(netdissect_options *, |
||
742 | const struct ie_tlv_header_t *ie_p, const u_char *p); |
||
743 | |||
744 | /* array of 16 codepages - currently we only support codepage 1,5 */ |
||
745 | static const codeset_pr_func_t fr_q933_print_ie_codeset[] = { |
||
746 | NULL, |
||
747 | fr_q933_print_ie_codeset5, |
||
748 | NULL, |
||
749 | NULL, |
||
750 | NULL, |
||
751 | fr_q933_print_ie_codeset5, |
||
752 | NULL, |
||
753 | NULL, |
||
754 | NULL, |
||
755 | NULL, |
||
756 | NULL, |
||
757 | NULL, |
||
758 | NULL, |
||
759 | NULL, |
||
760 | NULL, |
||
761 | NULL |
||
762 | }; |
||
763 | |||
764 | void |
||
765 | q933_print(netdissect_options *ndo, |
||
766 | const u_char *p, u_int length) |
||
767 | { |
||
768 | const u_char *ptemp = p; |
||
769 | struct ie_tlv_header_t *ie_p; |
||
770 | int olen; |
||
771 | int is_ansi = 0; |
||
772 | u_int codeset; |
||
773 | u_int ie_is_known = 0; |
||
774 | |||
775 | if (length < 9) { /* shortest: Q.933a LINK VERIFY */ |
||
776 | ND_PRINT((ndo, "[|q.933]")); |
||
777 | return; |
||
778 | } |
||
779 | |||
780 | codeset = p[2]&0x0f; /* extract the codeset */ |
||
781 | |||
782 | if (p[2] == MSG_ANSI_LOCKING_SHIFT) { |
||
783 | is_ansi = 1; |
||
784 | } |
||
785 | |||
786 | ND_PRINT((ndo, "%s", ndo->ndo_eflag ? "" : "Q.933, ")); |
||
787 | |||
788 | /* printing out header part */ |
||
789 | ND_PRINT((ndo, "%s, codeset %u", is_ansi ? "ANSI" : "CCITT", codeset)); |
||
790 | |||
791 | if (p[0]) { |
||
792 | ND_PRINT((ndo, ", Call Ref: 0x%02x", p[0])); |
||
793 | } |
||
794 | if (ndo->ndo_vflag) { |
||
795 | ND_PRINT((ndo, ", %s (0x%02x), length %u", |
||
796 | tok2str(fr_q933_msg_values, |
||
797 | "unknown message", p[1]), |
||
798 | p[1], |
||
799 | length)); |
||
800 | } else { |
||
801 | ND_PRINT((ndo, ", %s", |
||
802 | tok2str(fr_q933_msg_values, |
||
803 | "unknown message 0x%02x", p[1]))); |
||
804 | } |
||
805 | |||
806 | olen = length; /* preserve the original length for non verbose mode */ |
||
807 | |||
808 | if (length < (u_int)(2 - is_ansi)) { |
||
809 | ND_PRINT((ndo, "[|q.933]")); |
||
810 | return; |
||
811 | } |
||
812 | length -= 2 + is_ansi; |
||
813 | ptemp += 2 + is_ansi; |
||
814 | |||
815 | /* Loop through the rest of IE */ |
||
816 | while (length > sizeof(struct ie_tlv_header_t)) { |
||
817 | ie_p = (struct ie_tlv_header_t *)ptemp; |
||
818 | if (length < sizeof(struct ie_tlv_header_t) || |
||
819 | length < sizeof(struct ie_tlv_header_t) + ie_p->ie_len) { |
||
820 | if (ndo->ndo_vflag) { /* not bark if there is just a trailer */ |
||
821 | ND_PRINT((ndo, "\n[|q.933]")); |
||
822 | } else { |
||
823 | ND_PRINT((ndo, ", length %u", olen)); |
||
824 | } |
||
825 | return; |
||
826 | } |
||
827 | |||
828 | /* lets do the full IE parsing only in verbose mode |
||
829 | * however some IEs (DLCI Status, Link Verify) |
||
830 | * are also interestting in non-verbose mode */ |
||
831 | if (ndo->ndo_vflag) { |
||
832 | ND_PRINT((ndo, "\n\t%s IE (0x%02x), length %u: ", |
||
833 | tok2str(fr_q933_ie_codesets[codeset], |
||
834 | "unknown", ie_p->ie_type), |
||
835 | ie_p->ie_type, |
||
836 | ie_p->ie_len)); |
||
837 | } |
||
838 | |||
839 | /* sanity check */ |
||
840 | if (ie_p->ie_type == 0 || ie_p->ie_len == 0) { |
||
841 | return; |
||
842 | } |
||
843 | |||
844 | if (fr_q933_print_ie_codeset[codeset] != NULL) { |
||
845 | ie_is_known = fr_q933_print_ie_codeset[codeset](ndo, ie_p, ptemp); |
||
846 | } |
||
847 | |||
848 | if (ndo->ndo_vflag >= 1 && !ie_is_known) { |
||
849 | print_unknown_data(ndo, ptemp+2, "\n\t", ie_p->ie_len); |
||
850 | } |
||
851 | |||
852 | /* do we want to see a hexdump of the IE ? */ |
||
853 | if (ndo->ndo_vflag> 1 && ie_is_known) { |
||
854 | print_unknown_data(ndo, ptemp+2, "\n\t ", ie_p->ie_len); |
||
855 | } |
||
856 | |||
857 | length = length - ie_p->ie_len - 2; |
||
858 | ptemp = ptemp + ie_p->ie_len + 2; |
||
859 | } |
||
860 | if (!ndo->ndo_vflag) { |
||
861 | ND_PRINT((ndo, ", length %u", olen)); |
||
862 | } |
||
863 | } |
||
864 | |||
865 | static int |
||
866 | fr_q933_print_ie_codeset5(netdissect_options *ndo, |
||
867 | const struct ie_tlv_header_t *ie_p, const u_char *p) |
||
868 | { |
||
869 | u_int dlci; |
||
870 | |||
871 | switch (ie_p->ie_type) { |
||
872 | |||
873 | case FR_LMI_ANSI_REPORT_TYPE_IE: /* fall through */ |
||
874 | case FR_LMI_CCITT_REPORT_TYPE_IE: |
||
875 | if (ndo->ndo_vflag) { |
||
876 | ND_PRINT((ndo, "%s (%u)", |
||
877 | tok2str(fr_lmi_report_type_ie_values,"unknown",p[2]), |
||
878 | p[2])); |
||
879 | } |
||
880 | return 1; |
||
881 | |||
882 | case FR_LMI_ANSI_LINK_VERIFY_IE: /* fall through */ |
||
883 | case FR_LMI_CCITT_LINK_VERIFY_IE: |
||
884 | case FR_LMI_ANSI_LINK_VERIFY_IE_91: |
||
885 | if (!ndo->ndo_vflag) { |
||
886 | ND_PRINT((ndo, ", ")); |
||
887 | } |
||
888 | ND_PRINT((ndo, "TX Seq: %3d, RX Seq: %3d", p[2], p[3])); |
||
889 | return 1; |
||
890 | |||
891 | case FR_LMI_ANSI_PVC_STATUS_IE: /* fall through */ |
||
892 | case FR_LMI_CCITT_PVC_STATUS_IE: |
||
893 | if (!ndo->ndo_vflag) { |
||
894 | ND_PRINT((ndo, ", ")); |
||
895 | } |
||
896 | /* now parse the DLCI information element. */ |
||
897 | if ((ie_p->ie_len < 3) || |
||
898 | (p[2] & 0x80) || |
||
899 | ((ie_p->ie_len == 3) && !(p[3] & 0x80)) || |
||
900 | ((ie_p->ie_len == 4) && ((p[3] & 0x80) || !(p[4] & 0x80))) || |
||
901 | ((ie_p->ie_len == 5) && ((p[3] & 0x80) || (p[4] & 0x80) || |
||
902 | !(p[5] & 0x80))) || |
||
903 | (ie_p->ie_len > 5) || |
||
904 | !(p[ie_p->ie_len + 1] & 0x80)) { |
||
905 | ND_PRINT((ndo, "Invalid DLCI IE")); |
||
906 | } |
||
907 | |||
908 | dlci = ((p[2] & 0x3F) << 4) | ((p[3] & 0x78) >> 3); |
||
909 | if (ie_p->ie_len == 4) { |
||
910 | dlci = (dlci << 6) | ((p[4] & 0x7E) >> 1); |
||
911 | } |
||
912 | else if (ie_p->ie_len == 5) { |
||
913 | dlci = (dlci << 13) | (p[4] & 0x7F) | ((p[5] & 0x7E) >> 1); |
||
914 | } |
||
915 | |||
916 | ND_PRINT((ndo, "DLCI %u: status %s%s", dlci, |
||
917 | p[ie_p->ie_len + 1] & 0x8 ? "New, " : "", |
||
918 | p[ie_p->ie_len + 1] & 0x2 ? "Active" : "Inactive")); |
||
919 | return 1; |
||
920 | } |
||
921 | |||
922 | return 0; |
||
923 | } |
||
924 | /* |
||
925 | * Local Variables: |
||
926 | * c-style: whitesmith |
||
927 | * c-basic-offset: 8 |
||
928 | * End: |
||
929 | */ |