1999-10-08 07:47:09 +08:00
|
|
|
/*
|
|
|
|
* Copyright (c) 1991, 1993, 1994, 1995, 1996, 1997
|
|
|
|
* The Regents of the University of California. All rights reserved.
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that: (1) source code distributions
|
|
|
|
* retain the above copyright notice and this paragraph in its entirety, (2)
|
|
|
|
* distributions including binary code include the above copyright notice and
|
|
|
|
* this paragraph in its entirety in the documentation or other materials
|
|
|
|
* provided with the distribution, and (3) all advertising materials mentioning
|
|
|
|
* features or use of this software display the following acknowledgement:
|
|
|
|
* ``This product includes software developed by the University of California,
|
|
|
|
* Lawrence Berkeley Laboratory and its contributors.'' Neither the name of
|
|
|
|
* the University nor the names of its contributors may be used to endorse
|
|
|
|
* or promote products derived from this software without specific prior
|
|
|
|
* written permission.
|
|
|
|
* THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED
|
|
|
|
* WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF
|
|
|
|
* MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
|
|
|
|
*/
|
|
|
|
|
2003-11-16 17:36:07 +08:00
|
|
|
#ifndef lint
|
|
|
|
static const char rcsid[] _U_ =
|
|
|
|
"@(#) $Header: /tcpdump/master/tcpdump/print-null.c,v 1.51 2003-11-16 09:36:30 guy Exp $ (LBL)";
|
|
|
|
#endif
|
1999-11-21 17:36:43 +08:00
|
|
|
|
|
|
|
#ifdef HAVE_CONFIG_H
|
|
|
|
#include "config.h"
|
1999-10-08 07:47:09 +08:00
|
|
|
#endif
|
|
|
|
|
2002-08-01 16:52:55 +08:00
|
|
|
#include <tcpdump-stdinc.h>
|
1999-10-08 07:47:09 +08:00
|
|
|
|
|
|
|
#include <pcap.h>
|
|
|
|
#include <stdio.h>
|
|
|
|
#include <string.h>
|
|
|
|
|
|
|
|
#include "interface.h"
|
|
|
|
#include "addrtoname.h"
|
|
|
|
|
2000-09-23 16:54:24 +08:00
|
|
|
#include "ip.h"
|
2000-10-07 13:53:09 +08:00
|
|
|
#ifdef INET6
|
|
|
|
#include "ip6.h"
|
|
|
|
#endif
|
2000-09-23 16:54:24 +08:00
|
|
|
|
1999-10-08 07:47:09 +08:00
|
|
|
/*
|
Handle DLT_NULL correctly - the AF_ value is in host byte order, which
may not be *our* byte order if we're reading a capture file from another
machine; we currently handle that by checking whether it looks like an
integer < 65536 or not and, if it's not, byte-swap it.
This also lets us handle OpenBSD DLT_LOOP as well - it's like DLT_NULL
except that the AF_ value is in *network* byte order.
(Old-style Linux loopback captures were also DLT_NULL, but the header
had an Ethernet type in it; there have also been captures where the
header was a PPP header. For now, we just continue to assume that all
DLT_NULL packets are IP, and check the IP version field to decide
whether it's IPv4, IPv6, or something else.
We may want to consider adopting Ethereal's heuristics, which would at
least mean we wouldn't be reporting bogus packet types for old-style
Linux loopback captures and those weird PPP - ISDN4BSD? - captures,
although the version of libpcap that goes with this version of tcpdump
doesn't produce bogus DLT_NULL captures for Linux loopback devices.)
2000-12-17 06:00:50 +08:00
|
|
|
* The DLT_NULL packet header is 4 bytes long. It contains a host-byte-order
|
|
|
|
* 32-bit integer that specifies the family, e.g. AF_INET.
|
|
|
|
*
|
|
|
|
* Note here that "host" refers to the host on which the packets were
|
|
|
|
* captured; that isn't necessarily *this* host.
|
|
|
|
*
|
|
|
|
* The OpenBSD DLT_LOOP packet header is the same, except that the integer
|
|
|
|
* is in network byte order.
|
1999-10-08 07:47:09 +08:00
|
|
|
*/
|
|
|
|
#define NULL_HDRLEN 4
|
|
|
|
|
2003-02-05 10:28:45 +08:00
|
|
|
/*
|
|
|
|
* BSD AF_ values.
|
|
|
|
*
|
|
|
|
* Unfortunately, the BSDs don't all use the same value for AF_INET6,
|
|
|
|
* so, because we want to be able to read captures from all of the BSDs,
|
|
|
|
* we check for all of them.
|
|
|
|
*/
|
|
|
|
#define BSD_AF_INET 2
|
|
|
|
#define BSD_AF_NS 6 /* XEROX NS protocols */
|
|
|
|
#define BSD_AF_ISO 7
|
|
|
|
#define BSD_AF_APPLETALK 16
|
|
|
|
#define BSD_AF_IPX 23
|
|
|
|
#define BSD_AF_INET6_BSD 24 /* OpenBSD (and probably NetBSD), BSD/OS */
|
|
|
|
#define BSD_AF_INET6_FREEBSD 28
|
|
|
|
#define BSD_AF_INET6_DARWIN 30
|
|
|
|
|
1999-10-08 07:47:09 +08:00
|
|
|
static void
|
Handle DLT_NULL correctly - the AF_ value is in host byte order, which
may not be *our* byte order if we're reading a capture file from another
machine; we currently handle that by checking whether it looks like an
integer < 65536 or not and, if it's not, byte-swap it.
This also lets us handle OpenBSD DLT_LOOP as well - it's like DLT_NULL
except that the AF_ value is in *network* byte order.
(Old-style Linux loopback captures were also DLT_NULL, but the header
had an Ethernet type in it; there have also been captures where the
header was a PPP header. For now, we just continue to assume that all
DLT_NULL packets are IP, and check the IP version field to decide
whether it's IPv4, IPv6, or something else.
We may want to consider adopting Ethereal's heuristics, which would at
least mean we wouldn't be reporting bogus packet types for old-style
Linux loopback captures and those weird PPP - ISDN4BSD? - captures,
although the version of libpcap that goes with this version of tcpdump
doesn't produce bogus DLT_NULL captures for Linux loopback devices.)
2000-12-17 06:00:50 +08:00
|
|
|
null_print(u_int family, u_int length)
|
1999-10-08 07:47:09 +08:00
|
|
|
{
|
2000-12-04 14:47:17 +08:00
|
|
|
if (nflag)
|
Handle DLT_NULL correctly - the AF_ value is in host byte order, which
may not be *our* byte order if we're reading a capture file from another
machine; we currently handle that by checking whether it looks like an
integer < 65536 or not and, if it's not, byte-swap it.
This also lets us handle OpenBSD DLT_LOOP as well - it's like DLT_NULL
except that the AF_ value is in *network* byte order.
(Old-style Linux loopback captures were also DLT_NULL, but the header
had an Ethernet type in it; there have also been captures where the
header was a PPP header. For now, we just continue to assume that all
DLT_NULL packets are IP, and check the IP version field to decide
whether it's IPv4, IPv6, or something else.
We may want to consider adopting Ethereal's heuristics, which would at
least mean we wouldn't be reporting bogus packet types for old-style
Linux loopback captures and those weird PPP - ISDN4BSD? - captures,
although the version of libpcap that goes with this version of tcpdump
doesn't produce bogus DLT_NULL captures for Linux loopback devices.)
2000-12-17 06:00:50 +08:00
|
|
|
printf("AF %u ", family);
|
2000-12-04 14:47:17 +08:00
|
|
|
else {
|
|
|
|
switch (family) {
|
1999-10-08 07:47:09 +08:00
|
|
|
|
2003-02-05 10:28:45 +08:00
|
|
|
case BSD_AF_INET:
|
2000-12-04 14:47:17 +08:00
|
|
|
printf("ip ");
|
|
|
|
break;
|
1999-10-08 07:47:09 +08:00
|
|
|
|
1999-10-30 13:11:06 +08:00
|
|
|
#ifdef INET6
|
2003-02-05 10:28:45 +08:00
|
|
|
case BSD_AF_INET6_BSD:
|
|
|
|
case BSD_AF_INET6_FREEBSD:
|
|
|
|
case BSD_AF_INET6_DARWIN:
|
2000-12-04 14:47:17 +08:00
|
|
|
printf("ip6 ");
|
|
|
|
break;
|
1999-10-30 13:11:06 +08:00
|
|
|
#endif
|
|
|
|
|
2003-02-05 10:28:45 +08:00
|
|
|
case BSD_AF_NS:
|
2000-12-04 14:47:17 +08:00
|
|
|
printf("ns ");
|
|
|
|
break;
|
1999-10-08 07:47:09 +08:00
|
|
|
|
2003-02-05 10:28:45 +08:00
|
|
|
case BSD_AF_ISO:
|
|
|
|
printf("osi ");
|
|
|
|
break;
|
|
|
|
|
|
|
|
case BSD_AF_APPLETALK:
|
|
|
|
printf("atalk ");
|
|
|
|
break;
|
|
|
|
|
|
|
|
case BSD_AF_IPX:
|
|
|
|
printf("ipx ");
|
|
|
|
break;
|
|
|
|
|
2000-12-04 14:47:17 +08:00
|
|
|
default:
|
Handle DLT_NULL correctly - the AF_ value is in host byte order, which
may not be *our* byte order if we're reading a capture file from another
machine; we currently handle that by checking whether it looks like an
integer < 65536 or not and, if it's not, byte-swap it.
This also lets us handle OpenBSD DLT_LOOP as well - it's like DLT_NULL
except that the AF_ value is in *network* byte order.
(Old-style Linux loopback captures were also DLT_NULL, but the header
had an Ethernet type in it; there have also been captures where the
header was a PPP header. For now, we just continue to assume that all
DLT_NULL packets are IP, and check the IP version field to decide
whether it's IPv4, IPv6, or something else.
We may want to consider adopting Ethereal's heuristics, which would at
least mean we wouldn't be reporting bogus packet types for old-style
Linux loopback captures and those weird PPP - ISDN4BSD? - captures,
although the version of libpcap that goes with this version of tcpdump
doesn't produce bogus DLT_NULL captures for Linux loopback devices.)
2000-12-17 06:00:50 +08:00
|
|
|
printf("AF %u ", family);
|
2000-12-04 14:47:17 +08:00
|
|
|
break;
|
|
|
|
}
|
1999-10-08 07:47:09 +08:00
|
|
|
}
|
2000-12-04 14:47:17 +08:00
|
|
|
printf("%d: ", length);
|
1999-10-08 07:47:09 +08:00
|
|
|
}
|
|
|
|
|
Handle DLT_NULL correctly - the AF_ value is in host byte order, which
may not be *our* byte order if we're reading a capture file from another
machine; we currently handle that by checking whether it looks like an
integer < 65536 or not and, if it's not, byte-swap it.
This also lets us handle OpenBSD DLT_LOOP as well - it's like DLT_NULL
except that the AF_ value is in *network* byte order.
(Old-style Linux loopback captures were also DLT_NULL, but the header
had an Ethernet type in it; there have also been captures where the
header was a PPP header. For now, we just continue to assume that all
DLT_NULL packets are IP, and check the IP version field to decide
whether it's IPv4, IPv6, or something else.
We may want to consider adopting Ethereal's heuristics, which would at
least mean we wouldn't be reporting bogus packet types for old-style
Linux loopback captures and those weird PPP - ISDN4BSD? - captures,
although the version of libpcap that goes with this version of tcpdump
doesn't produce bogus DLT_NULL captures for Linux loopback devices.)
2000-12-17 06:00:50 +08:00
|
|
|
/*
|
|
|
|
* Byte-swap a 32-bit number.
|
|
|
|
* ("htonl()" or "ntohl()" won't work - we want to byte-swap even on
|
|
|
|
* big-endian platforms.)
|
|
|
|
*/
|
|
|
|
#define SWAPLONG(y) \
|
|
|
|
((((y)&0xff)<<24) | (((y)&0xff00)<<8) | (((y)&0xff0000)>>8) | (((y)>>24)&0xff))
|
|
|
|
|
2003-02-05 10:28:45 +08:00
|
|
|
/*
|
|
|
|
* This is the top level routine of the printer. 'p' points
|
|
|
|
* to the ether header of the packet, 'h->ts' is the timestamp,
|
|
|
|
* 'h->length' is the length of the packet off the wire, and 'h->caplen'
|
|
|
|
* is the number of bytes actually captured.
|
|
|
|
*/
|
2002-12-19 17:39:10 +08:00
|
|
|
u_int
|
|
|
|
null_if_print(const struct pcap_pkthdr *h, const u_char *p)
|
1999-10-08 07:47:09 +08:00
|
|
|
{
|
|
|
|
u_int length = h->len;
|
2003-02-05 10:28:45 +08:00
|
|
|
u_int caplen = h->caplen;
|
Handle DLT_NULL correctly - the AF_ value is in host byte order, which
may not be *our* byte order if we're reading a capture file from another
machine; we currently handle that by checking whether it looks like an
integer < 65536 or not and, if it's not, byte-swap it.
This also lets us handle OpenBSD DLT_LOOP as well - it's like DLT_NULL
except that the AF_ value is in *network* byte order.
(Old-style Linux loopback captures were also DLT_NULL, but the header
had an Ethernet type in it; there have also been captures where the
header was a PPP header. For now, we just continue to assume that all
DLT_NULL packets are IP, and check the IP version field to decide
whether it's IPv4, IPv6, or something else.
We may want to consider adopting Ethereal's heuristics, which would at
least mean we wouldn't be reporting bogus packet types for old-style
Linux loopback captures and those weird PPP - ISDN4BSD? - captures,
although the version of libpcap that goes with this version of tcpdump
doesn't produce bogus DLT_NULL captures for Linux loopback devices.)
2000-12-17 06:00:50 +08:00
|
|
|
u_int family;
|
1999-10-08 07:47:09 +08:00
|
|
|
|
2003-02-05 10:28:45 +08:00
|
|
|
if (caplen < NULL_HDRLEN) {
|
|
|
|
printf("[|null]");
|
|
|
|
return (NULL_HDRLEN);
|
|
|
|
}
|
|
|
|
|
Handle DLT_NULL correctly - the AF_ value is in host byte order, which
may not be *our* byte order if we're reading a capture file from another
machine; we currently handle that by checking whether it looks like an
integer < 65536 or not and, if it's not, byte-swap it.
This also lets us handle OpenBSD DLT_LOOP as well - it's like DLT_NULL
except that the AF_ value is in *network* byte order.
(Old-style Linux loopback captures were also DLT_NULL, but the header
had an Ethernet type in it; there have also been captures where the
header was a PPP header. For now, we just continue to assume that all
DLT_NULL packets are IP, and check the IP version field to decide
whether it's IPv4, IPv6, or something else.
We may want to consider adopting Ethereal's heuristics, which would at
least mean we wouldn't be reporting bogus packet types for old-style
Linux loopback captures and those weird PPP - ISDN4BSD? - captures,
although the version of libpcap that goes with this version of tcpdump
doesn't produce bogus DLT_NULL captures for Linux loopback devices.)
2000-12-17 06:00:50 +08:00
|
|
|
memcpy((char *)&family, (char *)p, sizeof(family));
|
|
|
|
|
|
|
|
/*
|
|
|
|
* This isn't necessarily in our host byte order; if this is
|
|
|
|
* a DLT_LOOP capture, it's in network byte order, and if
|
|
|
|
* this is a DLT_NULL capture from a machine with the opposite
|
|
|
|
* byte-order, it's in the opposite byte order from ours.
|
|
|
|
*
|
|
|
|
* If the upper 16 bits aren't all zero, assume it's byte-swapped.
|
|
|
|
*/
|
|
|
|
if ((family & 0xFFFF0000) != 0)
|
|
|
|
family = SWAPLONG(family);
|
|
|
|
|
1999-10-08 07:47:09 +08:00
|
|
|
length -= NULL_HDRLEN;
|
2003-02-05 10:28:45 +08:00
|
|
|
caplen -= NULL_HDRLEN;
|
|
|
|
p += NULL_HDRLEN;
|
1999-10-08 07:47:09 +08:00
|
|
|
|
|
|
|
if (eflag)
|
Handle DLT_NULL correctly - the AF_ value is in host byte order, which
may not be *our* byte order if we're reading a capture file from another
machine; we currently handle that by checking whether it looks like an
integer < 65536 or not and, if it's not, byte-swap it.
This also lets us handle OpenBSD DLT_LOOP as well - it's like DLT_NULL
except that the AF_ value is in *network* byte order.
(Old-style Linux loopback captures were also DLT_NULL, but the header
had an Ethernet type in it; there have also been captures where the
header was a PPP header. For now, we just continue to assume that all
DLT_NULL packets are IP, and check the IP version field to decide
whether it's IPv4, IPv6, or something else.
We may want to consider adopting Ethereal's heuristics, which would at
least mean we wouldn't be reporting bogus packet types for old-style
Linux loopback captures and those weird PPP - ISDN4BSD? - captures,
although the version of libpcap that goes with this version of tcpdump
doesn't produce bogus DLT_NULL captures for Linux loopback devices.)
2000-12-17 06:00:50 +08:00
|
|
|
null_print(family, length);
|
1999-10-08 07:47:09 +08:00
|
|
|
|
2003-02-05 10:28:45 +08:00
|
|
|
switch (family) {
|
|
|
|
|
|
|
|
case BSD_AF_INET:
|
|
|
|
ip_print(p, length);
|
1999-11-21 11:48:05 +08:00
|
|
|
break;
|
2003-02-05 10:28:45 +08:00
|
|
|
|
1999-11-21 11:48:05 +08:00
|
|
|
#ifdef INET6
|
2003-02-05 10:28:45 +08:00
|
|
|
case BSD_AF_INET6_BSD:
|
|
|
|
case BSD_AF_INET6_FREEBSD:
|
|
|
|
case BSD_AF_INET6_DARWIN:
|
|
|
|
ip6_print(p, length);
|
1999-11-21 11:48:05 +08:00
|
|
|
break;
|
2003-02-05 10:28:45 +08:00
|
|
|
#endif
|
|
|
|
|
|
|
|
case BSD_AF_ISO:
|
2003-05-23 00:52:36 +08:00
|
|
|
isoclns_print(p, length, caplen);
|
2003-02-05 10:28:45 +08:00
|
|
|
break;
|
|
|
|
|
|
|
|
case BSD_AF_APPLETALK:
|
|
|
|
atalk_print(p, length);
|
1999-11-21 11:48:05 +08:00
|
|
|
break;
|
2003-02-05 10:28:45 +08:00
|
|
|
|
|
|
|
case BSD_AF_IPX:
|
|
|
|
ipx_print(p, length);
|
|
|
|
break;
|
|
|
|
|
|
|
|
default:
|
|
|
|
/* unknown AF_ value */
|
|
|
|
if (!eflag)
|
|
|
|
null_print(family, length + NULL_HDRLEN);
|
|
|
|
if (!xflag && !qflag)
|
|
|
|
default_print(p, caplen);
|
1999-11-21 11:48:05 +08:00
|
|
|
}
|
1999-10-08 07:47:09 +08:00
|
|
|
|
2002-12-19 17:39:10 +08:00
|
|
|
return (NULL_HDRLEN);
|
1999-10-08 07:47:09 +08:00
|
|
|
}
|
|
|
|
|