
For now, printing of Sun RPC requests is disabled because we do not yet have the RPC header files. This should affect basically noone, as we do not have any RPC-based programs yet, for the same reason. Change-Id: Ie7818faaaacdc104d8b2c37a68866b4ce18247d6
278 lines
9.2 KiB
C
278 lines
9.2 KiB
C
/*
|
|
* Copyright (c) 1989, 1990, 1991, 1993, 1994, 1996
|
|
* The Regents of the University of California. All rights reserved.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that: (1) source code distributions
|
|
* retain the above copyright notice and this paragraph in its entirety, (2)
|
|
* distributions including binary code include the above copyright notice and
|
|
* this paragraph in its entirety in the documentation or other materials
|
|
* provided with the distribution, and (3) all advertising materials mentioning
|
|
* features or use of this software display the following acknowledgement:
|
|
* ``This product includes software developed by the University of California,
|
|
* Lawrence Berkeley Laboratory and its contributors.'' Neither the name of
|
|
* the University nor the names of its contributors may be used to endorse
|
|
* or promote products derived from this software without specific prior
|
|
* written permission.
|
|
* THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED
|
|
* WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF
|
|
* MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
|
|
*/
|
|
|
|
#include <sys/cdefs.h>
|
|
#ifndef lint
|
|
__RCSID("$NetBSD: print-rip.c,v 1.5 2014/11/20 03:05:03 christos Exp $");
|
|
#endif
|
|
|
|
#define NETDISSECT_REWORKED
|
|
#ifdef HAVE_CONFIG_H
|
|
#include "config.h"
|
|
#endif
|
|
|
|
#include <tcpdump-stdinc.h>
|
|
|
|
#include <stdio.h>
|
|
|
|
#include "interface.h"
|
|
#include "addrtoname.h"
|
|
#include "extract.h" /* must come after interface.h */
|
|
|
|
#include "af.h"
|
|
|
|
static const char tstr[] = "[|rip]";
|
|
|
|
struct rip {
|
|
uint8_t rip_cmd; /* request/response */
|
|
uint8_t rip_vers; /* protocol version # */
|
|
uint8_t unused[2]; /* unused */
|
|
};
|
|
|
|
#define RIPCMD_REQUEST 1 /* want info */
|
|
#define RIPCMD_RESPONSE 2 /* responding to request */
|
|
#define RIPCMD_TRACEON 3 /* turn tracing on */
|
|
#define RIPCMD_TRACEOFF 4 /* turn it off */
|
|
#define RIPCMD_POLL 5 /* want info from everybody */
|
|
#define RIPCMD_POLLENTRY 6 /* poll for entry */
|
|
|
|
static const struct tok rip_cmd_values[] = {
|
|
{ RIPCMD_REQUEST, "Request" },
|
|
{ RIPCMD_RESPONSE, "Response" },
|
|
{ RIPCMD_TRACEON, "Trace on" },
|
|
{ RIPCMD_TRACEOFF, "Trace off" },
|
|
{ RIPCMD_POLL, "Poll" },
|
|
{ RIPCMD_POLLENTRY, "Poll Entry" },
|
|
{ 0, NULL}
|
|
};
|
|
|
|
#define RIP_AUTHLEN 16
|
|
#define RIP_ROUTELEN 20
|
|
|
|
/*
|
|
* rfc 1723
|
|
*
|
|
* 0 1 2 3 3
|
|
* 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
|
|
* +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
* | Command (1) | Version (1) | unused |
|
|
* +---------------+---------------+-------------------------------+
|
|
* | Address Family Identifier (2) | Route Tag (2) |
|
|
* +-------------------------------+-------------------------------+
|
|
* | IP Address (4) |
|
|
* +---------------------------------------------------------------+
|
|
* | Subnet Mask (4) |
|
|
* +---------------------------------------------------------------+
|
|
* | Next Hop (4) |
|
|
* +---------------------------------------------------------------+
|
|
* | Metric (4) |
|
|
* +---------------------------------------------------------------+
|
|
*
|
|
*/
|
|
|
|
struct rip_netinfo {
|
|
uint16_t rip_family;
|
|
uint16_t rip_tag;
|
|
uint32_t rip_dest;
|
|
uint32_t rip_dest_mask;
|
|
uint32_t rip_router;
|
|
uint32_t rip_metric; /* cost of route */
|
|
};
|
|
|
|
static void
|
|
rip_entry_print_v1(netdissect_options *ndo,
|
|
register const struct rip_netinfo *ni)
|
|
{
|
|
register u_short family;
|
|
|
|
/* RFC 1058 */
|
|
family = EXTRACT_16BITS(&ni->rip_family);
|
|
if (family != BSD_AFNUM_INET && family != 0) {
|
|
ND_PRINT((ndo, "\n\t AFI %s, ", tok2str(bsd_af_values, "Unknown (%u)", family)));
|
|
print_unknown_data(ndo, (uint8_t *)&ni->rip_family, "\n\t ", RIP_ROUTELEN);
|
|
return;
|
|
}
|
|
if (EXTRACT_16BITS(&ni->rip_tag) ||
|
|
EXTRACT_32BITS(&ni->rip_dest_mask) ||
|
|
EXTRACT_32BITS(&ni->rip_router)) {
|
|
/* MBZ fields not zero */
|
|
print_unknown_data(ndo, (uint8_t *)&ni->rip_family, "\n\t ", RIP_ROUTELEN);
|
|
return;
|
|
}
|
|
if (family == 0) {
|
|
ND_PRINT((ndo, "\n\t AFI 0, %s, metric: %u",
|
|
ipaddr_string(ndo, &ni->rip_dest),
|
|
EXTRACT_32BITS(&ni->rip_metric)));
|
|
return;
|
|
} /* BSD_AFNUM_INET */
|
|
ND_PRINT((ndo, "\n\t %s, metric: %u",
|
|
ipaddr_string(ndo, &ni->rip_dest),
|
|
EXTRACT_32BITS(&ni->rip_metric)));
|
|
}
|
|
|
|
static unsigned
|
|
rip_entry_print_v2(netdissect_options *ndo,
|
|
register const struct rip_netinfo *ni, const unsigned remaining)
|
|
{
|
|
register u_short family;
|
|
|
|
family = EXTRACT_16BITS(&ni->rip_family);
|
|
if (family == 0xFFFF) { /* variable-sized authentication structures */
|
|
uint16_t auth_type = EXTRACT_16BITS(&ni->rip_tag);
|
|
if (auth_type == 2) {
|
|
register u_char *p = (u_char *)&ni->rip_dest;
|
|
u_int i = 0;
|
|
ND_PRINT((ndo, "\n\t Simple Text Authentication data: "));
|
|
for (; i < RIP_AUTHLEN; p++, i++)
|
|
ND_PRINT((ndo, "%c", ND_ISPRINT(*p) ? *p : '.'));
|
|
} else if (auth_type == 3) {
|
|
ND_PRINT((ndo, "\n\t Auth header:"));
|
|
ND_PRINT((ndo, " Packet Len %u,", EXTRACT_16BITS((uint8_t *)ni + 4)));
|
|
ND_PRINT((ndo, " Key-ID %u,", *((uint8_t *)ni + 6)));
|
|
ND_PRINT((ndo, " Auth Data Len %u,", *((uint8_t *)ni + 7)));
|
|
ND_PRINT((ndo, " SeqNo %u,", EXTRACT_32BITS(&ni->rip_dest_mask)));
|
|
ND_PRINT((ndo, " MBZ %u,", EXTRACT_32BITS(&ni->rip_router)));
|
|
ND_PRINT((ndo, " MBZ %u", EXTRACT_32BITS(&ni->rip_metric)));
|
|
} else if (auth_type == 1) {
|
|
ND_PRINT((ndo, "\n\t Auth trailer:"));
|
|
print_unknown_data(ndo, (uint8_t *)&ni->rip_dest, "\n\t ", remaining);
|
|
return remaining; /* AT spans till the packet end */
|
|
} else {
|
|
ND_PRINT((ndo, "\n\t Unknown (%u) Authentication data:",
|
|
EXTRACT_16BITS(&ni->rip_tag)));
|
|
print_unknown_data(ndo, (uint8_t *)&ni->rip_dest, "\n\t ", remaining);
|
|
}
|
|
} else if (family != BSD_AFNUM_INET && family != 0) {
|
|
ND_PRINT((ndo, "\n\t AFI %s", tok2str(bsd_af_values, "Unknown (%u)", family)));
|
|
print_unknown_data(ndo, (uint8_t *)&ni->rip_tag, "\n\t ", RIP_ROUTELEN-2);
|
|
} else { /* BSD_AFNUM_INET or AFI 0 */
|
|
ND_PRINT((ndo, "\n\t AFI %s, %15s/%-2d, tag 0x%04x, metric: %u, next-hop: ",
|
|
tok2str(bsd_af_values, "%u", family),
|
|
ipaddr_string(ndo, &ni->rip_dest),
|
|
mask2plen(EXTRACT_32BITS(&ni->rip_dest_mask)),
|
|
EXTRACT_16BITS(&ni->rip_tag),
|
|
EXTRACT_32BITS(&ni->rip_metric)));
|
|
if (EXTRACT_32BITS(&ni->rip_router))
|
|
ND_PRINT((ndo, "%s", ipaddr_string(ndo, &ni->rip_router)));
|
|
else
|
|
ND_PRINT((ndo, "self"));
|
|
}
|
|
return sizeof (*ni);
|
|
}
|
|
|
|
void
|
|
rip_print(netdissect_options *ndo,
|
|
const u_char *dat, u_int length)
|
|
{
|
|
register const struct rip *rp;
|
|
register const struct rip_netinfo *ni;
|
|
register u_int i, j;
|
|
|
|
if (ndo->ndo_snapend < dat) {
|
|
ND_PRINT((ndo, " %s", tstr));
|
|
return;
|
|
}
|
|
i = ndo->ndo_snapend - dat;
|
|
if (i > length)
|
|
i = length;
|
|
if (i < sizeof(*rp)) {
|
|
ND_PRINT((ndo, " %s", tstr));
|
|
return;
|
|
}
|
|
i -= sizeof(*rp);
|
|
|
|
rp = (struct rip *)dat;
|
|
|
|
ND_PRINT((ndo, "%sRIPv%u",
|
|
(ndo->ndo_vflag >= 1) ? "\n\t" : "",
|
|
rp->rip_vers));
|
|
|
|
switch (rp->rip_vers) {
|
|
case 0:
|
|
/*
|
|
* RFC 1058.
|
|
*
|
|
* XXX - RFC 1058 says
|
|
*
|
|
* 0 Datagrams whose version number is zero are to be ignored.
|
|
* These are from a previous version of the protocol, whose
|
|
* packet format was machine-specific.
|
|
*
|
|
* so perhaps we should just dump the packet, in hex.
|
|
*/
|
|
print_unknown_data(ndo, (uint8_t *)&rp->rip_cmd, "\n\t", length);
|
|
break;
|
|
default:
|
|
/* dump version and lets see if we know the commands name*/
|
|
ND_PRINT((ndo, ", %s, length: %u",
|
|
tok2str(rip_cmd_values,
|
|
"unknown command (%u)",
|
|
rp->rip_cmd),
|
|
length));
|
|
|
|
if (ndo->ndo_vflag < 1)
|
|
return;
|
|
|
|
switch (rp->rip_cmd) {
|
|
case RIPCMD_REQUEST:
|
|
case RIPCMD_RESPONSE:
|
|
j = length / sizeof(*ni);
|
|
ND_PRINT((ndo, ", routes: %u%s", j, rp->rip_vers == 2 ? " or less" : ""));
|
|
ni = (struct rip_netinfo *)(rp + 1);
|
|
for (; i >= sizeof(*ni); ++ni) {
|
|
if (rp->rip_vers == 1)
|
|
{
|
|
rip_entry_print_v1(ndo, ni);
|
|
i -= sizeof(*ni);
|
|
}
|
|
else if (rp->rip_vers == 2)
|
|
i -= rip_entry_print_v2(ndo, ni, i);
|
|
else
|
|
break;
|
|
}
|
|
if (i)
|
|
ND_PRINT((ndo, "%s", tstr));
|
|
break;
|
|
|
|
case RIPCMD_TRACEOFF:
|
|
case RIPCMD_POLL:
|
|
case RIPCMD_POLLENTRY:
|
|
break;
|
|
|
|
case RIPCMD_TRACEON:
|
|
/* fall through */
|
|
default:
|
|
if (ndo->ndo_vflag <= 1) {
|
|
if(!print_unknown_data(ndo, (uint8_t *)rp, "\n\t", length))
|
|
return;
|
|
}
|
|
break;
|
|
}
|
|
/* do we want to see an additionally hexdump ? */
|
|
if (ndo->ndo_vflag> 1) {
|
|
if(!print_unknown_data(ndo, (uint8_t *)rp, "\n\t", length))
|
|
return;
|
|
}
|
|
}
|
|
}
|
|
|
|
|