mirror of
https://github.com/the-tcpdump-group/tcpdump.git
synced 2024-11-27 12:03:44 +08:00
ee68aa3646
The exceptions are currently: Some EXTRACT_ in print-juniper.c, not used on packet buffer pointer. An EXTRACT_BE_U_3 in addrtoname.c, not always used on packet buffer pointer.
147 lines
3.9 KiB
C
147 lines
3.9 KiB
C
/*
|
|
* Copyright (c) 1998-2004 Hannes Gredler <hannes@gredler.at>
|
|
* The TCPDUMP project
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that: (1) source code
|
|
* distributions retain the above copyright notice and this paragraph
|
|
* in its entirety, and (2) distributions including binary code include
|
|
* the above copyright notice and this paragraph in its entirety in
|
|
* the documentation or other materials provided with the distribution.
|
|
* THIS SOFTWARE IS PROVIDED ``AS IS'' AND
|
|
* WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, WITHOUT
|
|
* LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
|
|
* FOR A PARTICULAR PURPOSE.
|
|
*/
|
|
|
|
/* \summary: Syslog protocol printer */
|
|
|
|
#ifdef HAVE_CONFIG_H
|
|
#include <config.h>
|
|
#endif
|
|
|
|
#include "netdissect-stdinc.h"
|
|
|
|
#include "netdissect.h"
|
|
#include "extract.h"
|
|
|
|
|
|
/*
|
|
* tokenlists and #defines taken from Ethereal - Network traffic analyzer
|
|
* by Gerald Combs <gerald@ethereal.com>
|
|
*/
|
|
|
|
#define SYSLOG_SEVERITY_MASK 0x0007 /* 0000 0000 0000 0111 */
|
|
#define SYSLOG_FACILITY_MASK 0x03f8 /* 0000 0011 1111 1000 */
|
|
#define SYSLOG_MAX_DIGITS 3 /* The maximum number of priority digits to read in. */
|
|
|
|
static const struct tok syslog_severity_values[] = {
|
|
{ 0, "emergency" },
|
|
{ 1, "alert" },
|
|
{ 2, "critical" },
|
|
{ 3, "error" },
|
|
{ 4, "warning" },
|
|
{ 5, "notice" },
|
|
{ 6, "info" },
|
|
{ 7, "debug" },
|
|
{ 0, NULL },
|
|
};
|
|
|
|
static const struct tok syslog_facility_values[] = {
|
|
{ 0, "kernel" },
|
|
{ 1, "user" },
|
|
{ 2, "mail" },
|
|
{ 3, "daemon" },
|
|
{ 4, "auth" },
|
|
{ 5, "syslog" },
|
|
{ 6, "lpr" },
|
|
{ 7, "news" },
|
|
{ 8, "uucp" },
|
|
{ 9, "cron" },
|
|
{ 10, "authpriv" },
|
|
{ 11, "ftp" },
|
|
{ 12, "ntp" },
|
|
{ 13, "security" },
|
|
{ 14, "console" },
|
|
{ 15, "cron" },
|
|
{ 16, "local0" },
|
|
{ 17, "local1" },
|
|
{ 18, "local2" },
|
|
{ 19, "local3" },
|
|
{ 20, "local4" },
|
|
{ 21, "local5" },
|
|
{ 22, "local6" },
|
|
{ 23, "local7" },
|
|
{ 0, NULL },
|
|
};
|
|
|
|
void
|
|
syslog_print(netdissect_options *ndo,
|
|
const u_char *pptr, u_int len)
|
|
{
|
|
uint16_t msg_off = 0;
|
|
uint16_t pri = 0;
|
|
uint16_t facility,severity;
|
|
|
|
ndo->ndo_protocol = "syslog";
|
|
/* extract decimal figures that are
|
|
* encapsulated within < > tags
|
|
* based on this decimal figure extract the
|
|
* severity and facility values
|
|
*/
|
|
|
|
ND_TCHECK_1(pptr);
|
|
if (GET_U_1(pptr + msg_off) == '<') {
|
|
msg_off++;
|
|
ND_TCHECK_1(pptr + msg_off);
|
|
while (msg_off <= SYSLOG_MAX_DIGITS &&
|
|
GET_U_1(pptr + msg_off) >= '0' &&
|
|
GET_U_1(pptr + msg_off) <= '9') {
|
|
pri = pri * 10 + (GET_U_1(pptr + msg_off) - '0');
|
|
msg_off++;
|
|
ND_TCHECK_1(pptr + msg_off);
|
|
}
|
|
if (GET_U_1(pptr + msg_off) != '>') {
|
|
nd_print_trunc(ndo);
|
|
return;
|
|
}
|
|
msg_off++;
|
|
} else {
|
|
nd_print_trunc(ndo);
|
|
return;
|
|
}
|
|
|
|
facility = (pri & SYSLOG_FACILITY_MASK) >> 3;
|
|
severity = pri & SYSLOG_SEVERITY_MASK;
|
|
|
|
if (ndo->ndo_vflag < 1 )
|
|
{
|
|
ND_PRINT("SYSLOG %s.%s, length: %u",
|
|
tok2str(syslog_facility_values, "unknown (%u)", facility),
|
|
tok2str(syslog_severity_values, "unknown (%u)", severity),
|
|
len);
|
|
return;
|
|
}
|
|
|
|
ND_PRINT("SYSLOG, length: %u\n\tFacility %s (%u), Severity %s (%u)\n\tMsg: ",
|
|
len,
|
|
tok2str(syslog_facility_values, "unknown (%u)", facility),
|
|
facility,
|
|
tok2str(syslog_severity_values, "unknown (%u)", severity),
|
|
severity);
|
|
|
|
/* print the syslog text in verbose mode */
|
|
for (; msg_off < len; msg_off++) {
|
|
ND_TCHECK_1(pptr + msg_off);
|
|
fn_print_char(ndo, GET_U_1(pptr + msg_off));
|
|
}
|
|
|
|
if (ndo->ndo_vflag > 1)
|
|
print_unknown_data(ndo, pptr, "\n\t", len);
|
|
|
|
return;
|
|
|
|
trunc:
|
|
nd_print_trunc(ndo);
|
|
}
|