tcpdump/print-802_11.c

1010 lines
24 KiB
C
Raw Normal View History

/*
2001-06-15 15:39:43 +08:00
* Copyright (c) 2001
* Fortress Technologies, Inc. All rights reserved.
* Charlie Lenahan (clenahan@fortresstech.com)
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that: (1) source code distributions
* retain the above copyright notice and this paragraph in its entirety, (2)
* distributions including binary code include the above copyright notice and
* this paragraph in its entirety in the documentation or other materials
* provided with the distribution, and (3) all advertising materials mentioning
* features or use of this software display the following acknowledgement:
* ``This product includes software developed by the University of California,
* Lawrence Berkeley Laboratory and its contributors.'' Neither the name of
* the University nor the names of its contributors may be used to endorse
* or promote products derived from this software without specific prior
* written permission.
* THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED
* WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF
* MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
*/
#ifndef lint
static const char rcsid[] =
"@(#) $Header: /tcpdump/master/tcpdump/print-802_11.c,v 1.20 2003-02-04 05:53:22 guy Exp $ (LBL)";
#endif
#ifdef HAVE_CONFIG_H
#include "config.h"
#endif
#include <tcpdump-stdinc.h>
#include <stdio.h>
#include <pcap.h>
#include <string.h>
#include "interface.h"
#include "addrtoname.h"
#include "ethertype.h"
#include "extract.h"
#include "ieee802_11.h"
#define PRINT_RATES(p) \
2001-06-15 15:39:43 +08:00
do { \
int z; \
Add a few more GCC warnings on GCC >= 2 for ".devel" builds. From Neil T. Spring: fixes for many of those warnings: addrtoname.c, configure.in: Linux needs netinet/ether.h for ether_ntohost print-*.c: change char *foo = "bar" to const char *foo = "bar" to appease -Wwrite-strings; should affect no run-time behavior. print-*.c: make some variables unsigned. print-bgp.c: plen ('prefix len') is unsigned, no reason to validate by comparing to zero. print-cnfp.c, print-rx.c: use intoa, provided by addrtoname, instead of inet_ntoa. print-domain.c: unsigned int l; (l=foo()) < 0 is guaranteed to be false, so check for (u_int)-1, which represents failure, explicitly. print-isakmp.c: complete initialization of attrmap objects. print-lwres.c: "if(x); print foo;" seemed much more likely to be intended to be "if(x) { print foo; }". print-smb.c: complete initialization of some structures. In addition, add some fixes for the signed vs. unsigned comparison warnings: extract.h: cast the result of the byte-extraction-and-combining, as, at least for the 16-bit version, C's integral promotions will turn "u_int16_t" into "int" if there are other "int"s nearby. print-*.c: make some more variables unsigned, or add casts to an unsigned type of signed values known not to be negative, or add casts to "int" of unsigned values known to fit in an "int", and make other changes needed to handle the aforementioned variables now being unsigned. print-isakmp.c: clean up the handling of error/status indicators in notify messages. print-ppp.c: get rid of a check that an unsigned quantity is >= 0. print-radius.c: clean up some of the bounds checking. print-smb.c: extract the word count into a "u_int" to avoid the aforementioned problems with C's integral promotions. print-snmp.c: change a check that an unsigned variable is >= 0 to a check that it's != 0. Also, fix some formats to use "%u" rather than "%d" for unsigned quantities.
2002-09-05 08:00:07 +08:00
const char *sep = " ["; \
for (z = 0; z < p.rates.length ; z++) { \
printf("%s%2.1f", sep, (.5 * (p.rates.rate[z] & 0x7f))); \
if (p.rates.rate[z] & 0x80) printf("*"); \
sep = " "; \
} \
if (p.rates.length != 0) \
printf(" Mbit]"); \
2001-06-15 15:39:43 +08:00
} while (0)
static const char *auth_alg_text[]={"Open System","Shared Key","EAP"};
static const char *subtype_text[]={
"Assoc Request",
"Assoc Response",
"ReAssoc Request",
"ReAssoc Response",
"Probe Request",
"Probe Response",
"RESERVED",
"RESERVED",
"Beacon",
"ATIM",
"Disassociation",
"Authentication",
"DeAuthentication",
"RESERVED",
"RESERVED"
};
2001-06-15 15:39:43 +08:00
static const char *status_text[] = {
"Succesful", /* 0 */
"Unspecified failure", /* 1 */
"Reserved", /* 2 */
"Reserved", /* 3 */
"Reserved", /* 4 */
"Reserved", /* 5 */
"Reserved", /* 6 */
"Reserved", /* 7 */
"Reserved", /* 8 */
"Reserved", /* 9 */
"Cannot Support all requested capabilities in the Capability Information field", /* 10 */
"Reassociation denied due to inability to confirm that association exists", /* 11 */
"Association denied due to reason outside the scope of the standard", /* 12 */
"Responding station does not support the specified authentication algorithm ", /* 13 */
"Received an Authentication frame with authentication transaction " \
"sequence number out of expected sequence", /* 14 */
"Authentication rejected because of challenge failure", /* 15 */
"Authentication rejected due to timeout waiting for next frame in sequence", /* 16 */
"Association denied because AP is unable to handle additional associated stations", /* 17 */
"Association denied due to requesting station not supporting all of the " \
"data rates in BSSBasicRateSet parameter", /* 18 */
NULL
};
static const char *reason_text[] = {
"Reserved", /* 0 */
"Unspecified reason", /* 1 */
"Previous authentication no longer valid", /* 2 */
"Deauthenticated because sending station is leaving (or has left) IBSS or ESS", /* 3 */
"Disassociated due to inactivity", /* 4 */
"Disassociated because AP is unable to handle all currently associated stations", /* 5 */
"Class 2 frame receivedfrom nonauthenticated station", /* 6 */
"Class 3 frame received from nonassociated station", /* 7 */
"Disassociated because sending station is leaving (or has left) BSS", /* 8 */
"Station requesting (re)association is not authenticated with responding station", /* 9 */
NULL
};
static int wep_print(const u_char *p)
{
u_int32_t iv;
if (!TTEST2(*p, 4))
return 0;
iv = EXTRACT_LE_32BITS(p);
printf("Data IV:%3x Pad %x KeyID %x", IV_IV(iv), IV_PAD(iv),
IV_KEYID(iv));
return 1;
}
static int parse_elements(struct mgmt_body_t *pbody,const u_char *p,int offset)
2001-06-15 15:39:43 +08:00
{
for (;;) {
2001-06-15 15:39:43 +08:00
if (!TTEST2(*(p + offset), 1))
return 1;
2001-06-15 15:39:43 +08:00
switch (*(p + offset)) {
case E_SSID:
if (!TTEST2(*(p+offset), 2))
return 0;
memcpy(&(pbody->ssid),p+offset,2); offset += 2;
if (pbody->ssid.length > 0)
{
if (!TTEST2(*(p+offset), pbody->ssid.length))
return 0;
2001-06-15 15:39:43 +08:00
memcpy(&(pbody->ssid.ssid),p+offset,pbody->ssid.length); offset += pbody->ssid.length;
pbody->ssid.ssid[pbody->ssid.length]='\0';
}
break;
case E_CHALLENGE:
if (!TTEST2(*(p+offset), 2))
return 0;
memcpy(&(pbody->challenge),p+offset,2); offset += 2;
if (pbody->challenge.length > 0)
{
if (!TTEST2(*(p+offset), pbody->challenge.length))
return 0;
2001-06-15 15:39:43 +08:00
memcpy(&(pbody->challenge.text),p+offset,pbody->challenge.length); offset += pbody->challenge.length;
pbody->challenge.text[pbody->challenge.length]='\0';
}
break;
case E_RATES:
if (!TTEST2(*(p+offset), 2))
return 0;
memcpy(&(pbody->rates),p+offset,2); offset += 2;
if (pbody->rates.length > 0) {
if (!TTEST2(*(p+offset), pbody->rates.length))
return 0;
2001-06-15 15:39:43 +08:00
memcpy(&(pbody->rates.rate),p+offset,pbody->rates.length); offset += pbody->rates.length;
}
break;
case E_DS:
if (!TTEST2(*(p+offset), 3))
return 0;
memcpy(&(pbody->ds),p+offset,3); offset +=3;
break;
case E_CF:
if (!TTEST2(*(p+offset), 8))
return 0;
memcpy(&(pbody->cf),p+offset,8); offset +=8;
break;
case E_TIM:
if (!TTEST2(*(p+offset), 2))
return 0;
memcpy(&(pbody->tim),p+offset,2); offset +=2;
if (!TTEST2(*(p+offset), 3))
return 0;
memcpy(&(pbody->tim.count),p+offset,3); offset +=3;
if ((pbody->tim.length -3) > 0)
{
if (!TTEST2(*(p+offset), pbody->tim.length -3))
return 0;
2001-06-15 15:39:43 +08:00
memcpy((pbody->tim.bitmap),p+(pbody->tim.length -3),(pbody->tim.length -3));
offset += pbody->tim.length -3;
}
break;
default:
#if 0
2001-06-15 15:39:43 +08:00
printf("(1) unhandled element_id (%d) ", *(p+offset) );
#endif
2001-06-15 15:39:43 +08:00
offset+= *(p+offset+1) + 2;
break;
}
}
return 1;
}
/*********************************************************************************
* Print Handle functions for the management frame types
*********************************************************************************/
static int handle_beacon(u_int16_t fc, const u_char *p)
{
struct mgmt_body_t pbody;
2001-06-15 15:39:43 +08:00
int offset = 0;
2001-06-15 15:39:43 +08:00
memset(&pbody, 0, sizeof(pbody));
if (!TTEST2(*p, 12))
return 0;
2001-06-15 15:39:43 +08:00
memcpy(&pbody.timestamp, p, 8);
offset += 8;
pbody.beacon_interval = EXTRACT_LE_16BITS(p+offset);
offset += 2;
pbody.capability_info = EXTRACT_LE_16BITS(p+offset);
offset += 2;
if (!parse_elements(&pbody,p,offset))
return 0;
printf("%s (", subtype_text[FC_SUBTYPE(fc)]);
fn_print(pbody.ssid.ssid, NULL);
printf(")");
PRINT_RATES(pbody);
2002-12-11 12:56:44 +08:00
printf(" %s CH: %u%s",
2001-06-15 15:39:43 +08:00
CAPABILITY_ESS(pbody.capability_info) ? "ESS" : "IBSS",
pbody.ds.channel,
CAPABILITY_PRIVACY(pbody.capability_info) ? ", PRIVACY" : "" );
return 1;
}
static int handle_assoc_request(u_int16_t fc, const u_char *p)
{
struct mgmt_body_t pbody;
2001-06-15 15:39:43 +08:00
int offset = 0;
2001-06-15 15:39:43 +08:00
memset(&pbody, 0, sizeof(pbody));
if (!TTEST2(*p, 4))
return 0;
pbody.capability_info = EXTRACT_LE_16BITS(p);
offset += 2;
pbody.listen_interval = EXTRACT_LE_16BITS(p+offset);
offset += 2;
2001-06-15 15:39:43 +08:00
if (!parse_elements(&pbody,p,offset))
return 0;
printf("%s (", subtype_text[FC_SUBTYPE(fc)]);
fn_print(pbody.ssid.ssid, NULL);
printf(")");
PRINT_RATES(pbody);
return 1;
}
static int handle_assoc_response(u_int16_t fc, const u_char *p)
{
struct mgmt_body_t pbody;
2001-06-15 15:39:43 +08:00
int offset = 0;
2001-06-15 15:39:43 +08:00
memset(&pbody, 0, sizeof(pbody));
if (!TTEST2(*p, 6))
return 0;
pbody.capability_info = EXTRACT_LE_16BITS(p);
offset += 2;
pbody.status_code = EXTRACT_LE_16BITS(p+offset);
offset += 2;
pbody.aid = EXTRACT_LE_16BITS(p+offset);
offset += 2;
if (!parse_elements(&pbody,p,offset))
return 0;
printf("%s AID(%x) :%s: %s", subtype_text[FC_SUBTYPE(fc)],
2001-06-15 15:39:43 +08:00
((u_int16_t)(pbody.aid << 2 )) >> 2 ,
CAPABILITY_PRIVACY(pbody.capability_info) ? " PRIVACY " : "",
(pbody.status_code < 19 ? status_text[pbody.status_code] : "n/a"));
return 1;
}
static int handle_reassoc_request(u_int16_t fc, const u_char *p)
{
struct mgmt_body_t pbody;
2001-06-15 15:39:43 +08:00
int offset = 0;
2001-06-15 15:39:43 +08:00
memset(&pbody, 0, sizeof(pbody));
if (!TTEST2(*p, 10))
return 0;
pbody.capability_info = EXTRACT_LE_16BITS(p);
offset += 2;
pbody.listen_interval = EXTRACT_LE_16BITS(p+offset);
offset += 2;
memcpy(&pbody.ap,p+offset,6);
offset += 6;
if (!parse_elements(&pbody,p,offset))
return 0;
printf("%s (", subtype_text[FC_SUBTYPE(fc)]);
fn_print(pbody.ssid.ssid, NULL);
printf(") AP : %s", etheraddr_string( pbody.ap ));
2001-06-15 15:39:43 +08:00
return 1;
}
static int handle_reassoc_response(u_int16_t fc, const u_char *p)
{
/* Same as a Association Reponse */
return handle_assoc_response(fc, p);
}
static int handle_probe_request(u_int16_t fc, const u_char *p)
{
struct mgmt_body_t pbody;
2001-06-15 15:39:43 +08:00
int offset = 0;
2001-06-15 15:39:43 +08:00
memset(&pbody, 0, sizeof(pbody));
2001-06-15 15:39:43 +08:00
if (!parse_elements(&pbody, p, offset))
return 0;
printf("%s (", subtype_text[FC_SUBTYPE(fc)]);
fn_print(pbody.ssid.ssid, NULL);
printf(")");
PRINT_RATES(pbody);
return 1;
}
static int handle_probe_response(u_int16_t fc, const u_char *p)
{
struct mgmt_body_t pbody;
2001-06-15 15:39:43 +08:00
int offset = 0;
2001-06-15 15:39:43 +08:00
memset(&pbody, 0, sizeof(pbody));
if (!TTEST2(*p, 12))
return 0;
memcpy(&pbody.timestamp,p,8);
offset += 8;
pbody.beacon_interval = EXTRACT_LE_16BITS(p+offset);
offset += 2;
pbody.capability_info = EXTRACT_LE_16BITS(p+offset);
offset += 2;
2001-06-15 15:39:43 +08:00
if (!parse_elements(&pbody, p, offset))
return 0;
printf("%s (", subtype_text[FC_SUBTYPE(fc)]);
fn_print(pbody.ssid.ssid, NULL);
printf(") ");
PRINT_RATES(pbody);
printf(" CH: %u%s", pbody.ds.channel,
CAPABILITY_PRIVACY(pbody.capability_info) ? ", PRIVACY" : "" );
return 1;
}
static int handle_atim(void)
{
/* the frame body for ATIM is null. */
printf("ATIM");
return 1;
}
static int handle_disassoc(u_int16_t fc, const u_char *p)
{
struct mgmt_body_t pbody;
2001-06-15 15:39:43 +08:00
int offset = 0;
2001-06-15 15:39:43 +08:00
memset(&pbody, 0, sizeof(pbody));
if (!TTEST2(*p, 2))
return 0;
pbody.reason_code = EXTRACT_LE_16BITS(p);
offset += 2;
printf("%s: %s", subtype_text[FC_SUBTYPE(fc)],
pbody.reason_code < 10 ? reason_text[pbody.reason_code] : "Reserved" );
return 1;
}
static int handle_auth(u_int16_t fc, const u_char *p)
{
struct mgmt_body_t pbody;
2001-06-15 15:39:43 +08:00
int offset = 0;
2001-06-15 15:39:43 +08:00
memset(&pbody, 0, sizeof(pbody));
if (!TTEST2(*p, 6))
return 0;
pbody.auth_alg = EXTRACT_LE_16BITS(p);
offset += 2;
2001-06-15 15:39:43 +08:00
pbody.auth_trans_seq_num = EXTRACT_LE_16BITS(p + offset);
offset += 2;
2001-06-15 15:39:43 +08:00
pbody.status_code = EXTRACT_LE_16BITS(p + offset);
offset += 2;
if (!parse_elements(&pbody,p,offset))
return 0;
2001-06-15 15:39:43 +08:00
if ((pbody.auth_alg == 1) &&
((pbody.auth_trans_seq_num == 2) || (pbody.auth_trans_seq_num == 3))) {
printf("%s (%s)-%x [Challenge Text] %s",
subtype_text[FC_SUBTYPE(fc)],
pbody.auth_alg < 4 ? auth_alg_text[pbody.auth_alg] : "Reserved" ,
pbody.auth_trans_seq_num,
2001-06-15 15:39:43 +08:00
((pbody.auth_trans_seq_num % 2) ?
(pbody.status_code < 19 ? status_text[pbody.status_code] : "n/a") : "" ));
} else {
printf("%s (%s)-%x: %s",
2001-06-15 15:39:43 +08:00
subtype_text[FC_SUBTYPE(fc)],
pbody.auth_alg < 4 ? auth_alg_text[pbody.auth_alg] : "Reserved" ,
pbody.auth_trans_seq_num,
((pbody.auth_trans_seq_num % 2) ? (pbody.status_code < 19 ? status_text[pbody.status_code] : "n/a") : ""));
}
return 1;
}
static int handle_deauth(u_int16_t fc, const struct mgmt_header_t *pmh,
const u_char *p)
{
struct mgmt_body_t pbody;
2001-06-15 15:39:43 +08:00
int offset = 0;
2001-06-15 15:39:43 +08:00
memset(&pbody, 0, sizeof(pbody));
if (!TTEST2(*p, 2))
return 0;
pbody.reason_code = EXTRACT_LE_16BITS(p);
offset += 2;
2001-06-15 15:39:43 +08:00
if (eflag) {
printf("%s: %s",
2001-06-15 15:39:43 +08:00
subtype_text[FC_SUBTYPE(fc)],
pbody.reason_code < 10 ? reason_text[pbody.reason_code] : "Reserved" );
} else {
printf("%s (%s): %s",
2001-06-15 15:39:43 +08:00
subtype_text[FC_SUBTYPE(fc)], etheraddr_string(pmh->sa),
pbody.reason_code < 10 ? reason_text[pbody.reason_code] : "Reserved" );
}
2001-06-15 15:39:43 +08:00
return 1;
}
/*********************************************************************************
* Print Body funcs
*********************************************************************************/
static int mgmt_body_print(u_int16_t fc, const struct mgmt_header_t *pmh,
const u_char *p)
{
2001-06-15 15:39:43 +08:00
switch (FC_SUBTYPE(fc)) {
case ST_ASSOC_REQUEST:
return (handle_assoc_request(fc, p));
2001-06-15 15:39:43 +08:00
case ST_ASSOC_RESPONSE:
return (handle_assoc_response(fc, p));
2001-06-15 15:39:43 +08:00
case ST_REASSOC_REQUEST:
return (handle_reassoc_request(fc, p));
2001-06-15 15:39:43 +08:00
case ST_REASSOC_RESPONSE:
return (handle_reassoc_response(fc, p));
2001-06-15 15:39:43 +08:00
case ST_PROBE_REQUEST:
return (handle_probe_request(fc, p));
2001-06-15 15:39:43 +08:00
case ST_PROBE_RESPONSE:
return (handle_probe_response(fc, p));
2001-06-15 15:39:43 +08:00
case ST_BEACON:
return (handle_beacon(fc, p));
2001-06-15 15:39:43 +08:00
case ST_ATIM:
return (handle_atim());
2001-06-15 15:39:43 +08:00
case ST_DISASSOC:
return (handle_disassoc(fc, p));
2001-06-15 15:39:43 +08:00
case ST_AUTH:
if (!TTEST2(*p, 3))
return 0;
if ((p[0] == 0 ) && (p[1] == 0) && (p[2] == 0)) {
printf("Authentication (Shared-Key)-3 ");
return (wep_print(p));
2001-06-15 15:39:43 +08:00
}
else
return (handle_auth(fc, p));
2001-06-15 15:39:43 +08:00
case ST_DEAUTH:
return (handle_deauth(fc, pmh, p));
break;
default:
printf("Unhandled Managment subtype(%x)",
FC_SUBTYPE(fc));
return 1;
}
}
/*********************************************************************************
* Handles printing all the control frame types
*********************************************************************************/
static int ctrl_body_print(u_int16_t fc, const u_char *p)
{
2001-06-15 15:39:43 +08:00
switch (FC_SUBTYPE(fc)) {
case CTRL_PS_POLL:
if (!TTEST2(*p, CTRL_PS_POLL_LEN))
return 0;
printf("Power Save-Poll AID(%x)",
EXTRACT_LE_16BITS(&(((const struct ctrl_ps_poll_t *)p)->aid)));
2001-06-15 15:39:43 +08:00
break;
case CTRL_RTS:
if (!TTEST2(*p, CTRL_RTS_LEN))
return 0;
if (eflag)
printf("Request-To-Send");
else
printf("Request-To-Send TA:%s ",
etheraddr_string(((const struct ctrl_rts_t *)p)->ta));
2001-06-15 15:39:43 +08:00
break;
case CTRL_CTS:
if (!TTEST2(*p, CTRL_CTS_LEN))
return 0;
if (eflag)
printf("Clear-To-Send");
else
printf("Clear-To-Send RA:%s ",
etheraddr_string(((const struct ctrl_cts_t *)p)->ra));
2001-06-15 15:39:43 +08:00
break;
case CTRL_ACK:
if (!TTEST2(*p, CTRL_ACK_LEN))
return 0;
if (eflag)
printf("Acknowledgment");
else
printf("Acknowledgment RA:%s ",
etheraddr_string(((const struct ctrl_ack_t *)p)->ra));
2001-06-15 15:39:43 +08:00
break;
case CTRL_CF_END:
if (!TTEST2(*p, CTRL_END_LEN))
return 0;
if (eflag)
printf("CF-End");
else
printf("CF-End RA:%s ",
etheraddr_string(((const struct ctrl_end_t *)p)->ra));
2001-06-15 15:39:43 +08:00
break;
case CTRL_END_ACK:
if (!TTEST2(*p, CTRL_END_ACK_LEN))
return 0;
if (eflag)
printf("CF-End+CF-Ack");
else
printf("CF-End+CF-Ack RA:%s ",
etheraddr_string(((const struct ctrl_end_ack_t *)p)->ra));
2001-06-15 15:39:43 +08:00
break;
default:
printf("(B) Unknown Ctrl Subtype");
}
return 1;
}
2001-06-15 15:39:43 +08:00
/*
* Print Header funcs
2001-06-15 15:39:43 +08:00
*/
2001-06-15 15:39:43 +08:00
/*
* Data Frame - Address field contents
*
* To Ds | From DS | Addr 1 | Addr 2 | Addr 3 | Addr 4
* 0 | 0 | DA | SA | BSSID | n/a
* 0 | 1 | DA | BSSID | SA | n/a
* 1 | 0 | BSSID | SA | DA | n/a
* 1 | 1 | RA | TA | DA | SA
2001-06-15 15:39:43 +08:00
*/
static void
data_header_print(u_int16_t fc, const u_char *p, const u_int8_t **srcp,
const u_int8_t **dstp)
{
switch (FC_SUBTYPE(fc)) {
case DATA_DATA:
case DATA_NODATA:
break;
case DATA_DATA_CF_ACK:
case DATA_NODATA_CF_ACK:
printf("CF Ack ");
break;
case DATA_DATA_CF_POLL:
case DATA_NODATA_CF_POLL:
printf("CF Poll ");
break;
case DATA_DATA_CF_ACK_POLL:
case DATA_NODATA_CF_ACK_POLL:
printf("CF Ack/Poll ");
break;
}
2001-06-15 15:39:43 +08:00
#define ADDR1 (p + 4)
#define ADDR2 (p + 10)
#define ADDR3 (p + 16)
#define ADDR4 (p + 24)
if (!FC_TO_DS(fc)) {
if (!FC_FROM_DS(fc)) {
if (srcp != NULL)
*srcp = ADDR2;
if (dstp != NULL)
*dstp = ADDR1;
if (!eflag)
return;
2001-06-15 15:39:43 +08:00
printf("DA:%s SA:%s BSSID:%s ",
etheraddr_string(ADDR1), etheraddr_string(ADDR2),
etheraddr_string(ADDR3));
} else {
if (srcp != NULL)
*srcp = ADDR3;
if (dstp != NULL)
*dstp = ADDR1;
if (!eflag)
return;
2001-06-15 15:39:43 +08:00
printf("DA:%s BSSID:%s SA:%s ",
etheraddr_string(ADDR1), etheraddr_string(ADDR2),
etheraddr_string(ADDR3));
}
2001-06-15 15:39:43 +08:00
} else {
if (!FC_FROM_DS(fc)) {
if (srcp != NULL)
*srcp = ADDR2;
if (dstp != NULL)
*dstp = ADDR3;
if (!eflag)
return;
2001-06-15 15:39:43 +08:00
printf("BSSID:%s SA:%s DA:%s ",
etheraddr_string(ADDR1), etheraddr_string(ADDR2),
etheraddr_string(ADDR3));
} else {
if (srcp != NULL)
*srcp = ADDR4;
if (dstp != NULL)
*dstp = ADDR3;
if (!eflag)
return;
2001-06-15 15:39:43 +08:00
printf("RA:%s TA:%s DA:%s SA:%s ",
etheraddr_string(ADDR1), etheraddr_string(ADDR2),
etheraddr_string(ADDR3), etheraddr_string(ADDR4));
}
}
2001-06-15 15:39:43 +08:00
#undef ADDR1
#undef ADDR2
#undef ADDR3
#undef ADDR4
}
static void
mgmt_header_print(const u_char *p, const u_int8_t **srcp,
const u_int8_t **dstp)
{
2001-06-15 15:39:43 +08:00
const struct mgmt_header_t *hp = (const struct mgmt_header_t *) p;
if (srcp != NULL)
*srcp = hp->sa;
if (dstp != NULL)
*dstp = hp->da;
if (!eflag)
return;
2001-06-15 15:39:43 +08:00
printf("BSSID:%s DA:%s SA:%s ",
etheraddr_string((hp)->bssid), etheraddr_string((hp)->da),
etheraddr_string((hp)->sa));
}
static void
ctrl_header_print(u_int16_t fc, const u_char *p, const u_int8_t **srcp,
const u_int8_t **dstp)
{
if (srcp != NULL)
*srcp = NULL;
if (dstp != NULL)
*dstp = NULL;
if (!eflag)
return;
2001-06-15 15:39:43 +08:00
switch (FC_SUBTYPE(fc)) {
case CTRL_PS_POLL:
printf("BSSID:%s TA:%s ",
etheraddr_string(((const struct ctrl_ps_poll_t *)p)->bssid),
etheraddr_string(((const struct ctrl_ps_poll_t *)p)->ta));
2001-06-15 15:39:43 +08:00
break;
case CTRL_RTS:
printf("RA:%s TA:%s ",
etheraddr_string(((const struct ctrl_rts_t *)p)->ra),
etheraddr_string(((const struct ctrl_rts_t *)p)->ta));
2001-06-15 15:39:43 +08:00
break;
case CTRL_CTS:
printf("RA:%s ",
etheraddr_string(((const struct ctrl_cts_t *)p)->ra));
2001-06-15 15:39:43 +08:00
break;
case CTRL_ACK:
printf("RA:%s ",
etheraddr_string(((const struct ctrl_ack_t *)p)->ra));
2001-06-15 15:39:43 +08:00
break;
case CTRL_CF_END:
printf("RA:%s BSSID:%s ",
etheraddr_string(((const struct ctrl_end_t *)p)->ra),
etheraddr_string(((const struct ctrl_end_t *)p)->bssid));
2001-06-15 15:39:43 +08:00
break;
case CTRL_END_ACK:
printf("RA:%s BSSID:%s ",
etheraddr_string(((const struct ctrl_end_ack_t *)p)->ra),
etheraddr_string(((const struct ctrl_end_ack_t *)p)->bssid));
2001-06-15 15:39:43 +08:00
break;
default:
printf("(H) Unknown Ctrl Subtype");
break;
2001-06-15 15:39:43 +08:00
}
}
static int GetHeaderLength(u_int16_t fc)
{
int iLength=0;
switch (FC_TYPE(fc)) {
case T_MGMT:
iLength = MGMT_HEADER_LEN;
break;
case T_CTRL:
switch (FC_SUBTYPE(fc)) {
case CTRL_PS_POLL:
2001-06-15 15:39:43 +08:00
iLength = CTRL_PS_POLL_LEN;
break;
case CTRL_RTS:
2001-06-15 15:39:43 +08:00
iLength = CTRL_RTS_LEN;
break;
case CTRL_CTS:
2001-06-15 15:39:43 +08:00
iLength = CTRL_CTS_LEN;
break;
case CTRL_ACK:
2001-06-15 15:39:43 +08:00
iLength = CTRL_ACK_LEN;
break;
case CTRL_CF_END:
2001-06-15 15:39:43 +08:00
iLength = CTRL_END_LEN;
break;
case CTRL_END_ACK:
2001-06-15 15:39:43 +08:00
iLength = CTRL_END_ACK_LEN;
break;
default:
2001-06-15 15:39:43 +08:00
iLength = 0;
break;
2001-06-15 15:39:43 +08:00
}
break;
case T_DATA:
if (FC_TO_DS(fc) && FC_FROM_DS(fc))
iLength = 30;
else
iLength = 24;
break;
default:
printf("unknown IEEE802.11 frame type (%d)",
FC_TYPE(fc));
break;
}
return iLength;
}
/*
* Print the 802.11 MAC header if eflag is set, and set "*srcp" and "*dstp"
* to point to the source and destination MAC addresses in any case if
* "srcp" and "dstp" aren't null.
*/
static inline void
ieee_802_11_hdr_print(u_int16_t fc, const u_char *p, const u_int8_t **srcp,
const u_int8_t **dstp)
{
if (vflag) {
if (FC_MORE_DATA(fc))
printf("More Data ");
if (FC_MORE_FLAG(fc))
printf("More Fragments ");
if (FC_POWER_MGMT(fc))
printf("Pwr Mgmt ");
if (FC_RETRY(fc))
printf("Retry ");
if (FC_ORDER(fc))
printf("Strictly Ordered ");
if (FC_WEP(fc))
printf("WEP Encrypted ");
}
switch (FC_TYPE(fc)) {
case T_MGMT:
mgmt_header_print(p, srcp, dstp);
break;
case T_CTRL:
ctrl_header_print(fc, p, srcp, dstp);
break;
case T_DATA:
data_header_print(fc, p, srcp, dstp);
break;
default:
printf("(header) unknown IEEE802.11 frame type (%d)",
FC_TYPE(fc));
*srcp = NULL;
*dstp = NULL;
break;
}
}
static u_int
ieee802_11_print(const u_char *p, u_int length, u_int caplen)
{
u_int16_t fc;
u_int HEADER_LENGTH;
const u_int8_t *src, *dst;
u_short extracted_ethertype;
if (caplen < IEEE802_11_FC_LEN) {
printf("[|802.11]");
return caplen;
}
fc = EXTRACT_LE_16BITS(p);
HEADER_LENGTH = GetHeaderLength(fc);
if (caplen < HEADER_LENGTH) {
printf("[|802.11]");
return HEADER_LENGTH;
}
ieee_802_11_hdr_print(fc, p, &src, &dst);
/*
* Go past the 802.11 header.
*/
length -= HEADER_LENGTH;
caplen -= HEADER_LENGTH;
p += HEADER_LENGTH;
switch (FC_TYPE(fc)) {
case T_MGMT:
if (!mgmt_body_print(fc,
(const struct mgmt_header_t *)(p - HEADER_LENGTH), p)) {
printf("[|802.11]");
return HEADER_LENGTH;
}
break;
case T_CTRL:
if (!ctrl_body_print(fc, p - HEADER_LENGTH)) {
printf("[|802.11]");
return HEADER_LENGTH;
}
break;
case T_DATA:
/* There may be a problem w/ AP not having this bit set */
2002-06-12 01:08:37 +08:00
if (FC_WEP(fc)) {
if (!wep_print(p)) {
printf("[|802.11]");
return HEADER_LENGTH;
}
} else {
if (llc_print(p, length, caplen, dst, src,
&extracted_ethertype) == 0) {
/*
* Some kinds of LLC packet we cannot
* handle intelligently
*/
if (!eflag)
ieee_802_11_hdr_print(fc, p - HEADER_LENGTH,
NULL, NULL);
if (extracted_ethertype) {
printf("(LLC %s) ",
2001-06-15 15:39:43 +08:00
etherproto_string(htons(extracted_ethertype)));
}
if (!xflag && !qflag)
default_print(p, caplen);
}
}
break;
default:
printf("(body) unhandled IEEE802.11 frame type (%d)",
FC_TYPE(fc));
break;
}
return HEADER_LENGTH;
}
/*
* This is the top level routine of the printer. 'p' points
* to the 802.11 header of the packet, 'h->ts' is the timestamp,
* 'h->length' is the length of the packet off the wire, and 'h->caplen'
* is the number of bytes actually captured.
*/
u_int
ieee802_11_if_print(const struct pcap_pkthdr *h, const u_char *p)
{
return ieee802_11_print(p, h->len, h->caplen);
}
static u_int
ieee802_11_radio_print(const u_char *p, u_int length, u_int caplen)
{
u_int32_t caphdr_len;
caphdr_len = EXTRACT_32BITS(p + 4);
if (caphdr_len < 8) {
/*
* Yow! The capture header length is claimed not
* to be large enough to include even the version
* cookie or capture header length!
*/
printf("[|802.11]");
return caplen;
}
if (caplen < caphdr_len) {
printf("[|802.11]");
return caplen;
}
return caphdr_len + ieee802_11_print(p + caphdr_len,
length - caphdr_len, caplen - caphdr_len);
}
#define PRISM_HDR_LEN 144
#define WLANCAP_MAGIC_COOKIE_V1 0x80211001
/*
* For DLT_PRISM_HEADER; like DLT_IEEE802_11, but with an extra header,
* containing information such as radio information, which we
* currently ignore.
*
* If, however, the packet begins with WLANCAP_MAGIC_COOKIE_V1, it's
* really DLT_IEEE802_11_RADIO (currently, on Linux, there's no
* ARPHRD_ type for DLT_IEEE802_11_RADIO, as there is a
* ARPHRD_IEEE80211_PRISM for DLT_PRISM_HEADER, so
* ARPHRD_IEEE80211_PRISM is used for DLT_IEEE802_11_RADIO, and
* the first 4 bytes of the header are used to indicate which it is).
*/
u_int
prism_if_print(const struct pcap_pkthdr *h, const u_char *p)
{
u_int caplen = h->caplen;
u_int length = h->len;
u_int32_t msgcode;
if (caplen < 4) {
printf("[|802.11]");
return caplen;
}
msgcode = EXTRACT_32BITS(p);
if (msgcode == WLANCAP_MAGIC_COOKIE_V1)
return ieee802_11_radio_print(p, length, caplen);
else {
if (caplen < PRISM_HDR_LEN) {
printf("[|802.11]");
return caplen;
}
return PRISM_HDR_LEN + ieee802_11_print(p + PRISM_HDR_LEN,
length - PRISM_HDR_LEN, caplen - PRISM_HDR_LEN);
}
}
/*
* For DLT_IEEE802_11_RADIO; like DLT_IEEE802_11, but with an extra
* header, containing information such as radio information, which we
* currently ignore.
*/
u_int
ieee802_11_radio_if_print(const struct pcap_pkthdr *h, const u_char *p)
{
u_int caplen = h->caplen;
u_int length = h->len;
if (caplen < 8) {
printf("[|802.11]");
return caplen;
}
return ieee802_11_radio_print(p, length, caplen);
}