2 * Copyright (c) 1990, 1991, 1993, 1994, 1995, 1996
3 * The Regents of the University of California. All rights reserved.
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that: (1) source code distributions
7 * retain the above copyright notice and this paragraph in its entirety, (2)
8 * distributions including binary code include the above copyright notice and
9 * this paragraph in its entirety in the documentation or other materials
10 * provided with the distribution, and (3) all advertising materials mentioning
11 * features or use of this software display the following acknowledgement:
12 * ``This product includes software developed by the University of California,
13 * Lawrence Berkeley Laboratory and its contributors.'' Neither the name of
14 * the University nor the names of its contributors may be used to endorse
15 * or promote products derived from this software without specific prior
17 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED
18 * WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF
19 * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
22 #include <sys/cdefs.h>
24 __RCSID("$NetBSD: print-fr.c,v 1.6 2015/03/31 21:59:35 christos Exp $");
27 #define NETDISSECT_REWORKED
32 #include <tcpdump-stdinc.h>
37 #include "interface.h"
38 #include "addrtoname.h"
39 #include "ethertype.h"
45 static void frf15_print(netdissect_options
*ndo
, const u_char
*, u_int
);
48 * the frame relay header has a variable length
50 * the EA bit determines if there is another byte
53 * minimum header length is 2 bytes
54 * maximum header length is 4 bytes
57 * +----+----+----+----+----+----+----+----+
58 * | DLCI (6 bits) | CR | EA |
59 * +----+----+----+----+----+----+----+----+
60 * | DLCI (4 bits) |FECN|BECN| DE | EA |
61 * +----+----+----+----+----+----+----+----+
62 * | DLCI (7 bits) | EA |
63 * +----+----+----+----+----+----+----+----+
64 * | DLCI (6 bits) |SDLC| EA |
65 * +----+----+----+----+----+----+----+----+
68 #define FR_EA_BIT 0x01
70 #define FR_CR_BIT 0x02000000
71 #define FR_DE_BIT 0x00020000
72 #define FR_BECN_BIT 0x00040000
73 #define FR_FECN_BIT 0x00080000
74 #define FR_SDLC_BIT 0x00000002
77 static const struct tok fr_header_flag_values
[] = {
80 { FR_BECN_BIT
, "BECN" },
81 { FR_FECN_BIT
, "FECN" },
82 { FR_SDLC_BIT
, "sdlcore" },
87 #define MFR_B_BIT 0x80
88 #define MFR_E_BIT 0x40
89 #define MFR_C_BIT 0x20
90 #define MFR_BEC_MASK (MFR_B_BIT | MFR_E_BIT | MFR_C_BIT)
91 #define MFR_CTRL_FRAME (MFR_B_BIT | MFR_E_BIT | MFR_C_BIT)
92 #define MFR_FRAG_FRAME (MFR_B_BIT | MFR_E_BIT )
94 static const struct tok frf_flag_values
[] = {
95 { MFR_B_BIT
, "Begin" },
97 { MFR_C_BIT
, "Control" },
101 /* Finds out Q.922 address length, DLCI and flags. Returns 1 on success,
102 * 0 on invalid address, -1 on truncated packet
103 * save the flags dep. on address length
105 static int parse_q922_addr(netdissect_options
*ndo
,
106 const u_char
*p
, u_int
*dlci
,
107 u_int
*addr_len
, uint8_t *flags
, u_int length
)
109 if (!ND_TTEST(p
[0]) || length
< 1)
111 if ((p
[0] & FR_EA_BIT
))
114 if (!ND_TTEST(p
[1]) || length
< 2)
117 *dlci
= ((p
[0] & 0xFC) << 2) | ((p
[1] & 0xF0) >> 4);
119 flags
[0] = p
[0] & 0x02; /* populate the first flag fields */
120 flags
[1] = p
[1] & 0x0c;
121 flags
[2] = 0; /* clear the rest of the flags */
124 if (p
[1] & FR_EA_BIT
)
125 return 1; /* 2-byte Q.922 address */
129 if (!ND_TTEST(p
[0]) || length
< 1)
131 (*addr_len
)++; /* 3- or 4-byte Q.922 address */
132 if ((p
[0] & FR_EA_BIT
) == 0) {
133 *dlci
= (*dlci
<< 7) | (p
[0] >> 1);
134 (*addr_len
)++; /* 4-byte Q.922 address */
139 if (!ND_TTEST(p
[0]) || length
< 1)
141 if ((p
[0] & FR_EA_BIT
) == 0)
142 return 0; /* more than 4 bytes of Q.922 address? */
144 flags
[3] = p
[0] & 0x02;
146 *dlci
= (*dlci
<< 6) | (p
[0] >> 2);
152 q922_string(netdissect_options
*ndo
, const u_char
*p
, u_int length
)
155 static u_int dlci
, addr_len
;
156 static uint8_t flags
[4];
157 static char buffer
[sizeof("DLCI xxxxxxxxxx")];
158 memset(buffer
, 0, sizeof(buffer
));
160 if (parse_q922_addr(ndo
, p
, &dlci
, &addr_len
, flags
, length
) == 1){
161 snprintf(buffer
, sizeof(buffer
), "DLCI %u", dlci
);
168 /* Frame Relay packet structure, with flags and CRC removed
170 +---------------------------+
174 +---------------------------+
175 | Control (UI = 0x03) |
176 +---------------------------+
177 | Optional Pad (0x00) |
178 +---------------------------+
180 +---------------------------+
187 +---------------------------+
189 * Q.922 addresses, as presently defined, are two octets and
190 contain a 10-bit DLCI. In some networks Q.922 addresses
191 may optionally be increased to three or four octets.
195 fr_hdr_print(netdissect_options
*ndo
,
196 int length
, u_int addr_len
, u_int dlci
, uint8_t *flags
, uint16_t nlpid
)
198 if (ndo
->ndo_qflag
) {
199 ND_PRINT((ndo
, "Q.922, DLCI %u, length %u: ",
203 if (nlpid
<= 0xff) /* if its smaller than 256 then its a NLPID */
204 ND_PRINT((ndo
, "Q.922, hdr-len %u, DLCI %u, Flags [%s], NLPID %s (0x%02x), length %u: ",
207 bittok2str(fr_header_flag_values
, "none", EXTRACT_32BITS(flags
)),
208 tok2str(nlpid_values
,"unknown", nlpid
),
211 else /* must be an ethertype */
212 ND_PRINT((ndo
, "Q.922, hdr-len %u, DLCI %u, Flags [%s], cisco-ethertype %s (0x%04x), length %u: ",
215 bittok2str(fr_header_flag_values
, "none", EXTRACT_32BITS(flags
)),
216 tok2str(ethertype_values
, "unknown", nlpid
),
223 fr_if_print(netdissect_options
*ndo
,
224 const struct pcap_pkthdr
*h
, register const u_char
*p
)
226 register u_int length
= h
->len
;
227 register u_int caplen
= h
->caplen
;
229 ND_TCHECK2(*p
, 4); /* minimum frame header length */
231 if ((length
= fr_print(ndo
, p
, length
)) == 0)
236 ND_PRINT((ndo
, "[|fr]"));
241 fr_print(netdissect_options
*ndo
,
242 register const u_char
*p
, u_int length
)
245 uint16_t extracted_ethertype
;
252 ret
= parse_q922_addr(ndo
, p
, &dlci
, &addr_len
, flags
, length
);
256 ND_PRINT((ndo
, "Q.922, invalid address"));
260 ND_TCHECK(p
[addr_len
]);
261 if (length
< addr_len
+ 1)
264 if (p
[addr_len
] != LLC_UI
&& dlci
!= 0) {
266 * Let's figure out if we have Cisco-style encapsulation,
267 * with an Ethernet type (Cisco HDLC type?) following the
270 if (!ND_TTEST2(p
[addr_len
], 2) || length
< addr_len
+ 2) {
272 ND_PRINT((ndo
, "UI %02x! ", p
[addr_len
]));
274 extracted_ethertype
= EXTRACT_16BITS(p
+addr_len
);
277 fr_hdr_print(ndo
, length
, addr_len
, dlci
,
278 flags
, extracted_ethertype
);
280 if (ethertype_print(ndo
, extracted_ethertype
,
281 p
+addr_len
+ETHERTYPE_LEN
,
282 length
-addr_len
-ETHERTYPE_LEN
,
283 length
-addr_len
-ETHERTYPE_LEN
) == 0)
284 /* ether_type not known, probably it wasn't one */
285 ND_PRINT((ndo
, "UI %02x! ", p
[addr_len
]));
291 ND_TCHECK(p
[addr_len
+1]);
292 if (length
< addr_len
+ 2)
295 if (p
[addr_len
+ 1] == 0) {
297 * Assume a pad byte after the control (UI) byte.
298 * A pad byte should only be used with 3-byte Q.922.
301 ND_PRINT((ndo
, "Pad! "));
302 hdr_len
= addr_len
+ 1 /* UI */ + 1 /* pad */ + 1 /* NLPID */;
306 * A pad byte should be used with 3-byte Q.922.
309 ND_PRINT((ndo
, "No pad! "));
310 hdr_len
= addr_len
+ 1 /* UI */ + 1 /* NLPID */;
313 ND_TCHECK(p
[hdr_len
- 1]);
314 if (length
< hdr_len
)
316 nlpid
= p
[hdr_len
- 1];
319 fr_hdr_print(ndo
, length
, addr_len
, dlci
, flags
, nlpid
);
325 ip_print(ndo
, p
, length
);
329 ip6_print(ndo
, p
, length
);
335 isoclns_print(ndo
, p
- 1, length
+ 1, length
+ 1); /* OSI printers need the NLPID field */
339 if (snap_print(ndo
, p
, length
, length
, 0) == 0) {
340 /* ether_type not known, print raw packet */
342 fr_hdr_print(ndo
, length
+ hdr_len
, hdr_len
,
344 if (!ndo
->ndo_suppress_default_print
)
345 ND_DEFAULTPRINT(p
- hdr_len
, length
+ hdr_len
);
350 q933_print(ndo
, p
, length
);
354 frf15_print(ndo
, p
, length
);
358 ppp_print(ndo
, p
, length
);
363 fr_hdr_print(ndo
, length
+ hdr_len
, addr_len
,
366 ND_DEFAULTPRINT(p
, length
);
372 ND_PRINT((ndo
, "[|fr]"));
378 mfr_if_print(netdissect_options
*ndo
,
379 const struct pcap_pkthdr
*h
, register const u_char
*p
)
381 register u_int length
= h
->len
;
382 register u_int caplen
= h
->caplen
;
384 ND_TCHECK2(*p
, 2); /* minimum frame header length */
386 if ((length
= mfr_print(ndo
, p
, length
)) == 0)
391 ND_PRINT((ndo
, "[|mfr]"));
396 #define MFR_CTRL_MSG_ADD_LINK 1
397 #define MFR_CTRL_MSG_ADD_LINK_ACK 2
398 #define MFR_CTRL_MSG_ADD_LINK_REJ 3
399 #define MFR_CTRL_MSG_HELLO 4
400 #define MFR_CTRL_MSG_HELLO_ACK 5
401 #define MFR_CTRL_MSG_REMOVE_LINK 6
402 #define MFR_CTRL_MSG_REMOVE_LINK_ACK 7
404 static const struct tok mfr_ctrl_msg_values
[] = {
405 { MFR_CTRL_MSG_ADD_LINK
, "Add Link" },
406 { MFR_CTRL_MSG_ADD_LINK_ACK
, "Add Link ACK" },
407 { MFR_CTRL_MSG_ADD_LINK_REJ
, "Add Link Reject" },
408 { MFR_CTRL_MSG_HELLO
, "Hello" },
409 { MFR_CTRL_MSG_HELLO_ACK
, "Hello ACK" },
410 { MFR_CTRL_MSG_REMOVE_LINK
, "Remove Link" },
411 { MFR_CTRL_MSG_REMOVE_LINK_ACK
, "Remove Link ACK" },
415 #define MFR_CTRL_IE_BUNDLE_ID 1
416 #define MFR_CTRL_IE_LINK_ID 2
417 #define MFR_CTRL_IE_MAGIC_NUM 3
418 #define MFR_CTRL_IE_TIMESTAMP 5
419 #define MFR_CTRL_IE_VENDOR_EXT 6
420 #define MFR_CTRL_IE_CAUSE 7
422 static const struct tok mfr_ctrl_ie_values
[] = {
423 { MFR_CTRL_IE_BUNDLE_ID
, "Bundle ID"},
424 { MFR_CTRL_IE_LINK_ID
, "Link ID"},
425 { MFR_CTRL_IE_MAGIC_NUM
, "Magic Number"},
426 { MFR_CTRL_IE_TIMESTAMP
, "Timestamp"},
427 { MFR_CTRL_IE_VENDOR_EXT
, "Vendor Extension"},
428 { MFR_CTRL_IE_CAUSE
, "Cause"},
432 #define MFR_ID_STRING_MAXLEN 50
434 struct ie_tlv_header_t
{
440 mfr_print(netdissect_options
*ndo
,
441 register const u_char
*p
, u_int length
)
443 u_int tlen
,idx
,hdr_len
= 0;
444 uint16_t sequence_num
;
445 uint8_t ie_type
,ie_len
;
450 * FRF.16 Link Integrity Control Frame
453 * +----+----+----+----+----+----+----+----+
454 * | B | E | C=1| 0 0 0 0 | EA |
455 * +----+----+----+----+----+----+----+----+
456 * | 0 0 0 0 0 0 0 0 |
457 * +----+----+----+----+----+----+----+----+
459 * +----+----+----+----+----+----+----+----+
462 ND_TCHECK2(*p
, 4); /* minimum frame header length */
464 if ((p
[0] & MFR_BEC_MASK
) == MFR_CTRL_FRAME
&& p
[1] == 0) {
465 ND_PRINT((ndo
, "FRF.16 Control, Flags [%s], %s, length %u",
466 bittok2str(frf_flag_values
,"none",(p
[0] & MFR_BEC_MASK
)),
467 tok2str(mfr_ctrl_msg_values
,"Unknown Message (0x%02x)",p
[2]),
476 while (tlen
>sizeof(struct ie_tlv_header_t
)) {
477 ND_TCHECK2(*tptr
, sizeof(struct ie_tlv_header_t
));
481 ND_PRINT((ndo
, "\n\tIE %s (%u), length %u: ",
482 tok2str(mfr_ctrl_ie_values
,"Unknown",ie_type
),
486 /* infinite loop check */
487 if (ie_type
== 0 || ie_len
<= sizeof(struct ie_tlv_header_t
))
490 ND_TCHECK2(*tptr
, ie_len
);
491 tptr
+=sizeof(struct ie_tlv_header_t
);
492 /* tlv len includes header */
493 ie_len
-=sizeof(struct ie_tlv_header_t
);
494 tlen
-=sizeof(struct ie_tlv_header_t
);
498 case MFR_CTRL_IE_MAGIC_NUM
:
499 ND_PRINT((ndo
, "0x%08x", EXTRACT_32BITS(tptr
)));
502 case MFR_CTRL_IE_BUNDLE_ID
: /* same message format */
503 case MFR_CTRL_IE_LINK_ID
:
504 for (idx
= 0; idx
< ie_len
&& idx
< MFR_ID_STRING_MAXLEN
; idx
++) {
505 if (*(tptr
+idx
) != 0) /* don't print null termination */
506 safeputchar(ndo
, *(tptr
+ idx
));
512 case MFR_CTRL_IE_TIMESTAMP
:
513 if (ie_len
== sizeof(struct timeval
)) {
514 ts_print(ndo
, (const struct timeval
*)tptr
);
517 /* fall through and hexdump if no unix timestamp */
520 * FIXME those are the defined IEs that lack a decoder
521 * you are welcome to contribute code ;-)
524 case MFR_CTRL_IE_VENDOR_EXT
:
525 case MFR_CTRL_IE_CAUSE
:
528 if (ndo
->ndo_vflag
<= 1)
529 print_unknown_data(ndo
, tptr
, "\n\t ", ie_len
);
533 /* do we want to see a hexdump of the IE ? */
534 if (ndo
->ndo_vflag
> 1 )
535 print_unknown_data(ndo
, tptr
, "\n\t ", ie_len
);
543 * FRF.16 Fragmentation Frame
546 * +----+----+----+----+----+----+----+----+
547 * | B | E | C=0|seq. (high 4 bits) | EA |
548 * +----+----+----+----+----+----+----+----+
549 * | sequence (low 8 bits) |
550 * +----+----+----+----+----+----+----+----+
551 * | DLCI (6 bits) | CR | EA |
552 * +----+----+----+----+----+----+----+----+
553 * | DLCI (4 bits) |FECN|BECN| DE | EA |
554 * +----+----+----+----+----+----+----+----+
557 sequence_num
= (p
[0]&0x1e)<<7 | p
[1];
558 /* whole packet or first fragment ? */
559 if ((p
[0] & MFR_BEC_MASK
) == MFR_FRAG_FRAME
||
560 (p
[0] & MFR_BEC_MASK
) == MFR_B_BIT
) {
561 ND_PRINT((ndo
, "FRF.16 Frag, seq %u, Flags [%s], ",
563 bittok2str(frf_flag_values
,"none",(p
[0] & MFR_BEC_MASK
))));
565 fr_print(ndo
, p
+hdr_len
,length
-hdr_len
);
569 /* must be a middle or the last fragment */
570 ND_PRINT((ndo
, "FRF.16 Frag, seq %u, Flags [%s]",
572 bittok2str(frf_flag_values
,"none",(p
[0] & MFR_BEC_MASK
))));
573 print_unknown_data(ndo
, p
, "\n\t", length
);
578 ND_PRINT((ndo
, "[|mfr]"));
582 /* an NLPID of 0xb1 indicates a 2-byte
586 * +----+----+----+----+----+----+----+----+
588 * +----+----+----+----+----+----+----+----+
589 * | NLPID (8 bits) | NLPID=0xb1
590 * +----+----+----+----+----+----+----+----+
591 * | B | E | C |seq. (high 4 bits) | R |
592 * +----+----+----+----+----+----+----+----+
593 * | sequence (low 8 bits) |
594 * +----+----+----+----+----+----+----+----+
597 #define FR_FRF15_FRAGTYPE 0x01
600 frf15_print(netdissect_options
*ndo
,
601 const u_char
*p
, u_int length
)
603 uint16_t sequence_num
, flags
;
605 flags
= p
[0]&MFR_BEC_MASK
;
606 sequence_num
= (p
[0]&0x1e)<<7 | p
[1];
608 ND_PRINT((ndo
, "FRF.15, seq 0x%03x, Flags [%s],%s Fragmentation, length %u",
610 bittok2str(frf_flag_values
,"none",flags
),
611 p
[0]&FR_FRF15_FRAGTYPE
? "Interface" : "End-to-End",
615 * depending on all permutations of the B, E and C bit
616 * dig as deep as we can - e.g. on the first (B) fragment
617 * there is enough payload to print the IP header
618 * on non (B) fragments it depends if the fragmentation
619 * model is end-to-end or interface based wether we want to print
620 * another Q.922 header
626 * Q.933 decoding portion for framerelay specific.
629 /* Q.933 packet format
630 Format of Other Protocols
632 +-------------------------------+
634 +---------------+---------------+
635 |Control 0x03 | NLPID 0x08 |
636 +---------------+---------------+
638 | octet 1 | octet 2 |
639 +-------------------------------+
641 | octet 2 | octet 2 |
642 +-------------------------------+
644 +-------------------------------+
646 +-------------------------------+
649 /* L2 (Octet 1)- Call Reference Usually is 0x0 */
652 * L2 (Octet 2)- Message Types definition 1 byte long.
655 #define MSG_TYPE_ESC_TO_NATIONAL 0x00
656 #define MSG_TYPE_ALERT 0x01
657 #define MSG_TYPE_CALL_PROCEEDING 0x02
658 #define MSG_TYPE_CONNECT 0x07
659 #define MSG_TYPE_CONNECT_ACK 0x0F
660 #define MSG_TYPE_PROGRESS 0x03
661 #define MSG_TYPE_SETUP 0x05
663 #define MSG_TYPE_DISCONNECT 0x45
664 #define MSG_TYPE_RELEASE 0x4D
665 #define MSG_TYPE_RELEASE_COMPLETE 0x5A
666 #define MSG_TYPE_RESTART 0x46
667 #define MSG_TYPE_RESTART_ACK 0x4E
669 #define MSG_TYPE_STATUS 0x7D
670 #define MSG_TYPE_STATUS_ENQ 0x75
672 static const struct tok fr_q933_msg_values
[] = {
673 { MSG_TYPE_ESC_TO_NATIONAL
, "ESC to National" },
674 { MSG_TYPE_ALERT
, "Alert" },
675 { MSG_TYPE_CALL_PROCEEDING
, "Call proceeding" },
676 { MSG_TYPE_CONNECT
, "Connect" },
677 { MSG_TYPE_CONNECT_ACK
, "Connect ACK" },
678 { MSG_TYPE_PROGRESS
, "Progress" },
679 { MSG_TYPE_SETUP
, "Setup" },
680 { MSG_TYPE_DISCONNECT
, "Disconnect" },
681 { MSG_TYPE_RELEASE
, "Release" },
682 { MSG_TYPE_RELEASE_COMPLETE
, "Release Complete" },
683 { MSG_TYPE_RESTART
, "Restart" },
684 { MSG_TYPE_RESTART_ACK
, "Restart ACK" },
685 { MSG_TYPE_STATUS
, "Status Reply" },
686 { MSG_TYPE_STATUS_ENQ
, "Status Enquiry" },
690 #define MSG_ANSI_LOCKING_SHIFT 0x95
692 #define FR_LMI_ANSI_REPORT_TYPE_IE 0x01
693 #define FR_LMI_ANSI_LINK_VERIFY_IE_91 0x19 /* details? */
694 #define FR_LMI_ANSI_LINK_VERIFY_IE 0x03
695 #define FR_LMI_ANSI_PVC_STATUS_IE 0x07
697 #define FR_LMI_CCITT_REPORT_TYPE_IE 0x51
698 #define FR_LMI_CCITT_LINK_VERIFY_IE 0x53
699 #define FR_LMI_CCITT_PVC_STATUS_IE 0x57
701 static const struct tok fr_q933_ie_values_codeset5
[] = {
702 { FR_LMI_ANSI_REPORT_TYPE_IE
, "ANSI Report Type" },
703 { FR_LMI_ANSI_LINK_VERIFY_IE_91
, "ANSI Link Verify" },
704 { FR_LMI_ANSI_LINK_VERIFY_IE
, "ANSI Link Verify" },
705 { FR_LMI_ANSI_PVC_STATUS_IE
, "ANSI PVC Status" },
706 { FR_LMI_CCITT_REPORT_TYPE_IE
, "CCITT Report Type" },
707 { FR_LMI_CCITT_LINK_VERIFY_IE
, "CCITT Link Verify" },
708 { FR_LMI_CCITT_PVC_STATUS_IE
, "CCITT PVC Status" },
712 #define FR_LMI_REPORT_TYPE_IE_FULL_STATUS 0
713 #define FR_LMI_REPORT_TYPE_IE_LINK_VERIFY 1
714 #define FR_LMI_REPORT_TYPE_IE_ASYNC_PVC 2
716 static const struct tok fr_lmi_report_type_ie_values
[] = {
717 { FR_LMI_REPORT_TYPE_IE_FULL_STATUS
, "Full Status" },
718 { FR_LMI_REPORT_TYPE_IE_LINK_VERIFY
, "Link verify" },
719 { FR_LMI_REPORT_TYPE_IE_ASYNC_PVC
, "Async PVC Status" },
723 /* array of 16 codepages - currently we only support codepage 1,5 */
724 static const struct tok
*fr_q933_ie_codesets
[] = {
726 fr_q933_ie_values_codeset5
,
730 fr_q933_ie_values_codeset5
,
743 static int fr_q933_print_ie_codeset5(netdissect_options
*ndo
,
744 const struct ie_tlv_header_t
*ie_p
, const u_char
*p
);
746 typedef int (*codeset_pr_func_t
)(netdissect_options
*,
747 const struct ie_tlv_header_t
*ie_p
, const u_char
*p
);
749 /* array of 16 codepages - currently we only support codepage 1,5 */
750 static const codeset_pr_func_t fr_q933_print_ie_codeset
[] = {
752 fr_q933_print_ie_codeset5
,
756 fr_q933_print_ie_codeset5
,
770 q933_print(netdissect_options
*ndo
,
771 const u_char
*p
, u_int length
)
773 const u_char
*ptemp
= p
;
774 struct ie_tlv_header_t
*ie_p
;
778 u_int ie_is_known
= 0;
780 if (length
< 9) { /* shortest: Q.933a LINK VERIFY */
781 ND_PRINT((ndo
, "[|q.933]"));
785 codeset
= p
[2]&0x0f; /* extract the codeset */
787 if (p
[2] == MSG_ANSI_LOCKING_SHIFT
) {
791 ND_PRINT((ndo
, "%s", ndo
->ndo_eflag
? "" : "Q.933, "));
793 /* printing out header part */
794 ND_PRINT((ndo
, "%s, codeset %u", is_ansi
? "ANSI" : "CCITT", codeset
));
797 ND_PRINT((ndo
, ", Call Ref: 0x%02x", p
[0]));
799 if (ndo
->ndo_vflag
) {
800 ND_PRINT((ndo
, ", %s (0x%02x), length %u",
801 tok2str(fr_q933_msg_values
,
802 "unknown message", p
[1]),
806 ND_PRINT((ndo
, ", %s",
807 tok2str(fr_q933_msg_values
,
808 "unknown message 0x%02x", p
[1])));
811 olen
= length
; /* preserve the original length for non verbose mode */
813 if (length
< (u_int
)(2 - is_ansi
)) {
814 ND_PRINT((ndo
, "[|q.933]"));
817 length
-= 2 + is_ansi
;
818 ptemp
+= 2 + is_ansi
;
820 /* Loop through the rest of IE */
821 while (length
> sizeof(struct ie_tlv_header_t
)) {
822 ie_p
= (struct ie_tlv_header_t
*)ptemp
;
823 if (length
< sizeof(struct ie_tlv_header_t
) ||
824 length
< sizeof(struct ie_tlv_header_t
) + ie_p
->ie_len
) {
825 if (ndo
->ndo_vflag
) { /* not bark if there is just a trailer */
826 ND_PRINT((ndo
, "\n[|q.933]"));
828 ND_PRINT((ndo
, ", length %u", olen
));
833 /* lets do the full IE parsing only in verbose mode
834 * however some IEs (DLCI Status, Link Verify)
835 * are also interestting in non-verbose mode */
836 if (ndo
->ndo_vflag
) {
837 ND_PRINT((ndo
, "\n\t%s IE (0x%02x), length %u: ",
838 tok2str(fr_q933_ie_codesets
[codeset
],
839 "unknown", ie_p
->ie_type
),
845 if (ie_p
->ie_type
== 0 || ie_p
->ie_len
== 0) {
849 if (fr_q933_print_ie_codeset
[codeset
] != NULL
) {
850 ie_is_known
= fr_q933_print_ie_codeset
[codeset
](ndo
, ie_p
, ptemp
);
853 if (ndo
->ndo_vflag
>= 1 && !ie_is_known
) {
854 print_unknown_data(ndo
, ptemp
+2, "\n\t", ie_p
->ie_len
);
857 /* do we want to see a hexdump of the IE ? */
858 if (ndo
->ndo_vflag
> 1 && ie_is_known
) {
859 print_unknown_data(ndo
, ptemp
+2, "\n\t ", ie_p
->ie_len
);
862 length
= length
- ie_p
->ie_len
- 2;
863 ptemp
= ptemp
+ ie_p
->ie_len
+ 2;
865 if (!ndo
->ndo_vflag
) {
866 ND_PRINT((ndo
, ", length %u", olen
));
871 fr_q933_print_ie_codeset5(netdissect_options
*ndo
,
872 const struct ie_tlv_header_t
*ie_p
, const u_char
*p
)
876 switch (ie_p
->ie_type
) {
878 case FR_LMI_ANSI_REPORT_TYPE_IE
: /* fall through */
879 case FR_LMI_CCITT_REPORT_TYPE_IE
:
880 if (ndo
->ndo_vflag
) {
881 ND_PRINT((ndo
, "%s (%u)",
882 tok2str(fr_lmi_report_type_ie_values
,"unknown",p
[2]),
887 case FR_LMI_ANSI_LINK_VERIFY_IE
: /* fall through */
888 case FR_LMI_CCITT_LINK_VERIFY_IE
:
889 case FR_LMI_ANSI_LINK_VERIFY_IE_91
:
890 if (!ndo
->ndo_vflag
) {
891 ND_PRINT((ndo
, ", "));
893 ND_PRINT((ndo
, "TX Seq: %3d, RX Seq: %3d", p
[2], p
[3]));
896 case FR_LMI_ANSI_PVC_STATUS_IE
: /* fall through */
897 case FR_LMI_CCITT_PVC_STATUS_IE
:
898 if (!ndo
->ndo_vflag
) {
899 ND_PRINT((ndo
, ", "));
901 /* now parse the DLCI information element. */
902 if ((ie_p
->ie_len
< 3) ||
904 ((ie_p
->ie_len
== 3) && !(p
[3] & 0x80)) ||
905 ((ie_p
->ie_len
== 4) && ((p
[3] & 0x80) || !(p
[4] & 0x80))) ||
906 ((ie_p
->ie_len
== 5) && ((p
[3] & 0x80) || (p
[4] & 0x80) ||
908 (ie_p
->ie_len
> 5) ||
909 !(p
[ie_p
->ie_len
+ 1] & 0x80)) {
910 ND_PRINT((ndo
, "Invalid DLCI IE"));
913 dlci
= ((p
[2] & 0x3F) << 4) | ((p
[3] & 0x78) >> 3);
914 if (ie_p
->ie_len
== 4) {
915 dlci
= (dlci
<< 6) | ((p
[4] & 0x7E) >> 1);
917 else if (ie_p
->ie_len
== 5) {
918 dlci
= (dlci
<< 13) | (p
[4] & 0x7F) | ((p
[5] & 0x7E) >> 1);
921 ND_PRINT((ndo
, "DLCI %u: status %s%s", dlci
,
922 p
[ie_p
->ie_len
+ 1] & 0x8 ? "New, " : "",
923 p
[ie_p
->ie_len
+ 1] & 0x2 ? "Active" : "Inactive"));
931 * c-style: whitesmith