1 /*
2  * Copyright (c) 1990, 1991, 1993, 1994, 1995, 1996
3  *	The Regents of the University of California.  All rights reserved.
4  *
5  * Redistribution and use in source and binary forms, with or without
6  * modification, are permitted provided that: (1) source code distributions
7  * retain the above copyright notice and this paragraph in its entirety, (2)
8  * distributions including binary code include the above copyright notice and
9  * this paragraph in its entirety in the documentation or other materials
10  * provided with the distribution, and (3) all advertising materials mentioning
11  * features or use of this software display the following acknowledgement:
12  * ``This product includes software developed by the University of California,
13  * Lawrence Berkeley Laboratory and its contributors.'' Neither the name of
14  * the University nor the names of its contributors may be used to endorse
15  * or promote products derived from this software without specific prior
16  * written permission.
17  * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED
18  * WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF
19  * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
20  */
21 
22 #define NETDISSECT_REWORKED
23 #ifdef HAVE_CONFIG_H
24 #include "config.h"
25 #endif
26 
27 #include <tcpdump-stdinc.h>
28 
29 #include <stdio.h>
30 #include <string.h>
31 
32 #include "interface.h"
33 #include "addrtoname.h"
34 #include "ethertype.h"
35 #include "llc.h"
36 #include "nlpid.h"
37 #include "extract.h"
38 #include "oui.h"
39 
40 static void frf15_print(netdissect_options *ndo, const u_char *, u_int);
41 
42 /*
43  * the frame relay header has a variable length
44  *
45  * the EA bit determines if there is another byte
46  * in the header
47  *
48  * minimum header length is 2 bytes
49  * maximum header length is 4 bytes
50  *
51  *      7    6    5    4    3    2    1    0
52  *    +----+----+----+----+----+----+----+----+
53  *    |        DLCI (6 bits)        | CR | EA |
54  *    +----+----+----+----+----+----+----+----+
55  *    |   DLCI (4 bits)   |FECN|BECN| DE | EA |
56  *    +----+----+----+----+----+----+----+----+
57  *    |           DLCI (7 bits)          | EA |
58  *    +----+----+----+----+----+----+----+----+
59  *    |        DLCI (6 bits)        |SDLC| EA |
60  *    +----+----+----+----+----+----+----+----+
61  */
62 
63 #define FR_EA_BIT	0x01
64 
65 #define FR_CR_BIT       0x02000000
66 #define FR_DE_BIT	0x00020000
67 #define FR_BECN_BIT	0x00040000
68 #define FR_FECN_BIT	0x00080000
69 #define FR_SDLC_BIT	0x00000002
70 
71 
72 static const struct tok fr_header_flag_values[] = {
73     { FR_CR_BIT, "C!" },
74     { FR_DE_BIT, "DE" },
75     { FR_BECN_BIT, "BECN" },
76     { FR_FECN_BIT, "FECN" },
77     { FR_SDLC_BIT, "sdlcore" },
78     { 0, NULL }
79 };
80 
81 /* FRF.15 / FRF.16 */
82 #define MFR_B_BIT 0x80
83 #define MFR_E_BIT 0x40
84 #define MFR_C_BIT 0x20
85 #define MFR_BEC_MASK    (MFR_B_BIT | MFR_E_BIT | MFR_C_BIT)
86 #define MFR_CTRL_FRAME  (MFR_B_BIT | MFR_E_BIT | MFR_C_BIT)
87 #define MFR_FRAG_FRAME  (MFR_B_BIT | MFR_E_BIT )
88 
89 static const struct tok frf_flag_values[] = {
90     { MFR_B_BIT, "Begin" },
91     { MFR_E_BIT, "End" },
92     { MFR_C_BIT, "Control" },
93     { 0, NULL }
94 };
95 
96 /* Finds out Q.922 address length, DLCI and flags. Returns 1 on success,
97  * 0 on invalid address, -1 on truncated packet
98  * save the flags dep. on address length
99  */
parse_q922_addr(netdissect_options * ndo,const u_char * p,u_int * dlci,u_int * addr_len,uint8_t * flags,u_int length)100 static int parse_q922_addr(netdissect_options *ndo,
101                            const u_char *p, u_int *dlci,
102                            u_int *addr_len, uint8_t *flags, u_int length)
103 {
104 	if (!ND_TTEST(p[0]) || length < 1)
105 		return -1;
106 	if ((p[0] & FR_EA_BIT))
107 		return 0;
108 
109 	if (!ND_TTEST(p[1]) || length < 2)
110 		return -1;
111 	*addr_len = 2;
112 	*dlci = ((p[0] & 0xFC) << 2) | ((p[1] & 0xF0) >> 4);
113 
114         flags[0] = p[0] & 0x02; /* populate the first flag fields */
115         flags[1] = p[1] & 0x0c;
116         flags[2] = 0;           /* clear the rest of the flags */
117         flags[3] = 0;
118 
119 	if (p[1] & FR_EA_BIT)
120 		return 1;	/* 2-byte Q.922 address */
121 
122 	p += 2;
123 	length -= 2;
124 	if (!ND_TTEST(p[0]) || length < 1)
125 		return -1;
126 	(*addr_len)++;		/* 3- or 4-byte Q.922 address */
127 	if ((p[0] & FR_EA_BIT) == 0) {
128 		*dlci = (*dlci << 7) | (p[0] >> 1);
129 		(*addr_len)++;	/* 4-byte Q.922 address */
130 		p++;
131 		length--;
132 	}
133 
134 	if (!ND_TTEST(p[0]) || length < 1)
135 		return -1;
136 	if ((p[0] & FR_EA_BIT) == 0)
137 		return 0; /* more than 4 bytes of Q.922 address? */
138 
139         flags[3] = p[0] & 0x02;
140 
141         *dlci = (*dlci << 6) | (p[0] >> 2);
142 
143 	return 1;
144 }
145 
146 char *
q922_string(netdissect_options * ndo,const u_char * p,u_int length)147 q922_string(netdissect_options *ndo, const u_char *p, u_int length)
148 {
149 
150     static u_int dlci, addr_len;
151     static uint8_t flags[4];
152     static char buffer[sizeof("DLCI xxxxxxxxxx")];
153     memset(buffer, 0, sizeof(buffer));
154 
155     if (parse_q922_addr(ndo, p, &dlci, &addr_len, flags, length) == 1){
156         snprintf(buffer, sizeof(buffer), "DLCI %u", dlci);
157     }
158 
159     return buffer;
160 }
161 
162 
163 /* Frame Relay packet structure, with flags and CRC removed
164 
165                   +---------------------------+
166                   |       Q.922 Address*      |
167                   +--                       --+
168                   |                           |
169                   +---------------------------+
170                   | Control (UI = 0x03)       |
171                   +---------------------------+
172                   | Optional Pad      (0x00)  |
173                   +---------------------------+
174                   | NLPID                     |
175                   +---------------------------+
176                   |             .             |
177                   |             .             |
178                   |             .             |
179                   |           Data            |
180                   |             .             |
181                   |             .             |
182                   +---------------------------+
183 
184            * Q.922 addresses, as presently defined, are two octets and
185              contain a 10-bit DLCI.  In some networks Q.922 addresses
186              may optionally be increased to three or four octets.
187 */
188 
189 static void
fr_hdr_print(netdissect_options * ndo,int length,u_int addr_len,u_int dlci,uint8_t * flags,uint16_t nlpid)190 fr_hdr_print(netdissect_options *ndo,
191              int length, u_int addr_len, u_int dlci, uint8_t *flags, uint16_t nlpid)
192 {
193     if (ndo->ndo_qflag) {
194         ND_PRINT((ndo, "Q.922, DLCI %u, length %u: ",
195                      dlci,
196                      length));
197     } else {
198         if (nlpid <= 0xff) /* if its smaller than 256 then its a NLPID */
199             ND_PRINT((ndo, "Q.922, hdr-len %u, DLCI %u, Flags [%s], NLPID %s (0x%02x), length %u: ",
200                          addr_len,
201                          dlci,
202                          bittok2str(fr_header_flag_values, "none", EXTRACT_32BITS(flags)),
203                          tok2str(nlpid_values,"unknown", nlpid),
204                          nlpid,
205                          length));
206         else /* must be an ethertype */
207             ND_PRINT((ndo, "Q.922, hdr-len %u, DLCI %u, Flags [%s], cisco-ethertype %s (0x%04x), length %u: ",
208                          addr_len,
209                          dlci,
210                          bittok2str(fr_header_flag_values, "none", EXTRACT_32BITS(flags)),
211                          tok2str(ethertype_values, "unknown", nlpid),
212                          nlpid,
213                          length));
214     }
215 }
216 
217 u_int
fr_if_print(netdissect_options * ndo,const struct pcap_pkthdr * h,register const u_char * p)218 fr_if_print(netdissect_options *ndo,
219             const struct pcap_pkthdr *h, register const u_char *p)
220 {
221 	register u_int length = h->len;
222 	register u_int caplen = h->caplen;
223 
224         ND_TCHECK2(*p, 4); /* minimum frame header length */
225 
226         if ((length = fr_print(ndo, p, length)) == 0)
227             return (0);
228         else
229             return length;
230  trunc:
231         ND_PRINT((ndo, "[|fr]"));
232         return caplen;
233 }
234 
235 u_int
fr_print(netdissect_options * ndo,register const u_char * p,u_int length)236 fr_print(netdissect_options *ndo,
237          register const u_char *p, u_int length)
238 {
239 	int ret;
240 	uint16_t extracted_ethertype;
241 	u_int dlci;
242 	u_int addr_len;
243 	uint16_t nlpid;
244 	u_int hdr_len;
245 	uint8_t flags[4];
246 
247 	ret = parse_q922_addr(ndo, p, &dlci, &addr_len, flags, length);
248 	if (ret == -1)
249 		goto trunc;
250 	if (ret == 0) {
251 		ND_PRINT((ndo, "Q.922, invalid address"));
252 		return 0;
253 	}
254 
255 	ND_TCHECK(p[addr_len]);
256 	if (length < addr_len + 1)
257 		goto trunc;
258 
259 	if (p[addr_len] != LLC_UI && dlci != 0) {
260                 /*
261                  * Let's figure out if we have Cisco-style encapsulation,
262                  * with an Ethernet type (Cisco HDLC type?) following the
263                  * address.
264                  */
265 		if (!ND_TTEST2(p[addr_len], 2) || length < addr_len + 2) {
266                         /* no Ethertype */
267                         ND_PRINT((ndo, "UI %02x! ", p[addr_len]));
268                 } else {
269                         extracted_ethertype = EXTRACT_16BITS(p+addr_len);
270 
271                         if (ndo->ndo_eflag)
272                                 fr_hdr_print(ndo, length, addr_len, dlci,
273                                     flags, extracted_ethertype);
274 
275                         if (ethertype_print(ndo, extracted_ethertype,
276                                             p+addr_len+ETHERTYPE_LEN,
277                                             length-addr_len-ETHERTYPE_LEN,
278                                             length-addr_len-ETHERTYPE_LEN) == 0)
279                                 /* ether_type not known, probably it wasn't one */
280                                 ND_PRINT((ndo, "UI %02x! ", p[addr_len]));
281                         else
282                                 return addr_len + 2;
283                 }
284         }
285 
286 	ND_TCHECK(p[addr_len+1]);
287 	if (length < addr_len + 2)
288 		goto trunc;
289 
290 	if (p[addr_len + 1] == 0) {
291 		/*
292 		 * Assume a pad byte after the control (UI) byte.
293 		 * A pad byte should only be used with 3-byte Q.922.
294 		 */
295 		if (addr_len != 3)
296 			ND_PRINT((ndo, "Pad! "));
297 		hdr_len = addr_len + 1 /* UI */ + 1 /* pad */ + 1 /* NLPID */;
298 	} else {
299 		/*
300 		 * Not a pad byte.
301 		 * A pad byte should be used with 3-byte Q.922.
302 		 */
303 		if (addr_len == 3)
304 			ND_PRINT((ndo, "No pad! "));
305 		hdr_len = addr_len + 1 /* UI */ + 1 /* NLPID */;
306 	}
307 
308         ND_TCHECK(p[hdr_len - 1]);
309 	if (length < hdr_len)
310 		goto trunc;
311 	nlpid = p[hdr_len - 1];
312 
313 	if (ndo->ndo_eflag)
314 		fr_hdr_print(ndo, length, addr_len, dlci, flags, nlpid);
315 	p += hdr_len;
316 	length -= hdr_len;
317 
318 	switch (nlpid) {
319 	case NLPID_IP:
320 	        ip_print(ndo, p, length);
321 		break;
322 
323 	case NLPID_IP6:
324 		ip6_print(ndo, p, length);
325 		break;
326 
327 	case NLPID_CLNP:
328 	case NLPID_ESIS:
329 	case NLPID_ISIS:
330 		isoclns_print(ndo, p - 1, length + 1, length + 1); /* OSI printers need the NLPID field */
331 		break;
332 
333 	case NLPID_SNAP:
334 		if (snap_print(ndo, p, length, length, 0) == 0) {
335 			/* ether_type not known, print raw packet */
336                         if (!ndo->ndo_eflag)
337                             fr_hdr_print(ndo, length + hdr_len, hdr_len,
338                                          dlci, flags, nlpid);
339 			if (!ndo->ndo_suppress_default_print)
340 				ND_DEFAULTPRINT(p - hdr_len, length + hdr_len);
341 		}
342 		break;
343 
344         case NLPID_Q933:
345 		q933_print(ndo, p, length);
346 		break;
347 
348         case NLPID_MFR:
349                 frf15_print(ndo, p, length);
350                 break;
351 
352         case NLPID_PPP:
353                 ppp_print(ndo, p, length);
354                 break;
355 
356 	default:
357 		if (!ndo->ndo_eflag)
358                     fr_hdr_print(ndo, length + hdr_len, addr_len,
359 				     dlci, flags, nlpid);
360 		if (!ndo->ndo_xflag)
361 			ND_DEFAULTPRINT(p, length);
362 	}
363 
364 	return hdr_len;
365 
366  trunc:
367         ND_PRINT((ndo, "[|fr]"));
368         return 0;
369 
370 }
371 
372 u_int
mfr_if_print(netdissect_options * ndo,const struct pcap_pkthdr * h,register const u_char * p)373 mfr_if_print(netdissect_options *ndo,
374              const struct pcap_pkthdr *h, register const u_char *p)
375 {
376 	register u_int length = h->len;
377 	register u_int caplen = h->caplen;
378 
379         ND_TCHECK2(*p, 2); /* minimum frame header length */
380 
381         if ((length = mfr_print(ndo, p, length)) == 0)
382             return (0);
383         else
384             return length;
385  trunc:
386         ND_PRINT((ndo, "[|mfr]"));
387         return caplen;
388 }
389 
390 
391 #define MFR_CTRL_MSG_ADD_LINK        1
392 #define MFR_CTRL_MSG_ADD_LINK_ACK    2
393 #define MFR_CTRL_MSG_ADD_LINK_REJ    3
394 #define MFR_CTRL_MSG_HELLO           4
395 #define MFR_CTRL_MSG_HELLO_ACK       5
396 #define MFR_CTRL_MSG_REMOVE_LINK     6
397 #define MFR_CTRL_MSG_REMOVE_LINK_ACK 7
398 
399 static const struct tok mfr_ctrl_msg_values[] = {
400     { MFR_CTRL_MSG_ADD_LINK, "Add Link" },
401     { MFR_CTRL_MSG_ADD_LINK_ACK, "Add Link ACK" },
402     { MFR_CTRL_MSG_ADD_LINK_REJ, "Add Link Reject" },
403     { MFR_CTRL_MSG_HELLO, "Hello" },
404     { MFR_CTRL_MSG_HELLO_ACK, "Hello ACK" },
405     { MFR_CTRL_MSG_REMOVE_LINK, "Remove Link" },
406     { MFR_CTRL_MSG_REMOVE_LINK_ACK, "Remove Link ACK" },
407     { 0, NULL }
408 };
409 
410 #define MFR_CTRL_IE_BUNDLE_ID  1
411 #define MFR_CTRL_IE_LINK_ID    2
412 #define MFR_CTRL_IE_MAGIC_NUM  3
413 #define MFR_CTRL_IE_TIMESTAMP  5
414 #define MFR_CTRL_IE_VENDOR_EXT 6
415 #define MFR_CTRL_IE_CAUSE      7
416 
417 static const struct tok mfr_ctrl_ie_values[] = {
418     { MFR_CTRL_IE_BUNDLE_ID, "Bundle ID"},
419     { MFR_CTRL_IE_LINK_ID, "Link ID"},
420     { MFR_CTRL_IE_MAGIC_NUM, "Magic Number"},
421     { MFR_CTRL_IE_TIMESTAMP, "Timestamp"},
422     { MFR_CTRL_IE_VENDOR_EXT, "Vendor Extension"},
423     { MFR_CTRL_IE_CAUSE, "Cause"},
424     { 0, NULL }
425 };
426 
427 #define MFR_ID_STRING_MAXLEN 50
428 
429 struct ie_tlv_header_t {
430     uint8_t ie_type;
431     uint8_t ie_len;
432 };
433 
434 u_int
mfr_print(netdissect_options * ndo,register const u_char * p,u_int length)435 mfr_print(netdissect_options *ndo,
436           register const u_char *p, u_int length)
437 {
438     u_int tlen,idx,hdr_len = 0;
439     uint16_t sequence_num;
440     uint8_t ie_type,ie_len;
441     const uint8_t *tptr;
442 
443 
444 /*
445  * FRF.16 Link Integrity Control Frame
446  *
447  *      7    6    5    4    3    2    1    0
448  *    +----+----+----+----+----+----+----+----+
449  *    | B  | E  | C=1| 0    0    0    0  | EA |
450  *    +----+----+----+----+----+----+----+----+
451  *    | 0    0    0    0    0    0    0    0  |
452  *    +----+----+----+----+----+----+----+----+
453  *    |              message type             |
454  *    +----+----+----+----+----+----+----+----+
455  */
456 
457     ND_TCHECK2(*p, 4); /* minimum frame header length */
458 
459     if ((p[0] & MFR_BEC_MASK) == MFR_CTRL_FRAME && p[1] == 0) {
460         ND_PRINT((ndo, "FRF.16 Control, Flags [%s], %s, length %u",
461                bittok2str(frf_flag_values,"none",(p[0] & MFR_BEC_MASK)),
462                tok2str(mfr_ctrl_msg_values,"Unknown Message (0x%02x)",p[2]),
463                length));
464         tptr = p + 3;
465         tlen = length -3;
466         hdr_len = 3;
467 
468         if (!ndo->ndo_vflag)
469             return hdr_len;
470 
471         while (tlen>sizeof(struct ie_tlv_header_t)) {
472             ND_TCHECK2(*tptr, sizeof(struct ie_tlv_header_t));
473             ie_type=tptr[0];
474             ie_len=tptr[1];
475 
476             ND_PRINT((ndo, "\n\tIE %s (%u), length %u: ",
477                    tok2str(mfr_ctrl_ie_values,"Unknown",ie_type),
478                    ie_type,
479                    ie_len));
480 
481             /* infinite loop check */
482             if (ie_type == 0 || ie_len <= sizeof(struct ie_tlv_header_t))
483                 return hdr_len;
484 
485             ND_TCHECK2(*tptr, ie_len);
486             tptr+=sizeof(struct ie_tlv_header_t);
487             /* tlv len includes header */
488             ie_len-=sizeof(struct ie_tlv_header_t);
489             tlen-=sizeof(struct ie_tlv_header_t);
490 
491             switch (ie_type) {
492 
493             case MFR_CTRL_IE_MAGIC_NUM:
494                 ND_PRINT((ndo, "0x%08x", EXTRACT_32BITS(tptr)));
495                 break;
496 
497             case MFR_CTRL_IE_BUNDLE_ID: /* same message format */
498             case MFR_CTRL_IE_LINK_ID:
499                 for (idx = 0; idx < ie_len && idx < MFR_ID_STRING_MAXLEN; idx++) {
500                     if (*(tptr+idx) != 0) /* don't print null termination */
501                         safeputchar(ndo, *(tptr + idx));
502                     else
503                         break;
504                 }
505                 break;
506 
507             case MFR_CTRL_IE_TIMESTAMP:
508                 if (ie_len == sizeof(struct timeval)) {
509                     ts_print(ndo, (const struct timeval *)tptr);
510                     break;
511                 }
512                 /* fall through and hexdump if no unix timestamp */
513 
514                 /*
515                  * FIXME those are the defined IEs that lack a decoder
516                  * you are welcome to contribute code ;-)
517                  */
518 
519             case MFR_CTRL_IE_VENDOR_EXT:
520             case MFR_CTRL_IE_CAUSE:
521 
522             default:
523                 if (ndo->ndo_vflag <= 1)
524                     print_unknown_data(ndo, tptr, "\n\t  ", ie_len);
525                 break;
526             }
527 
528             /* do we want to see a hexdump of the IE ? */
529             if (ndo->ndo_vflag > 1 )
530                 print_unknown_data(ndo, tptr, "\n\t  ", ie_len);
531 
532             tlen-=ie_len;
533             tptr+=ie_len;
534         }
535         return hdr_len;
536     }
537 /*
538  * FRF.16 Fragmentation Frame
539  *
540  *      7    6    5    4    3    2    1    0
541  *    +----+----+----+----+----+----+----+----+
542  *    | B  | E  | C=0|seq. (high 4 bits) | EA  |
543  *    +----+----+----+----+----+----+----+----+
544  *    |        sequence  (low 8 bits)         |
545  *    +----+----+----+----+----+----+----+----+
546  *    |        DLCI (6 bits)        | CR | EA  |
547  *    +----+----+----+----+----+----+----+----+
548  *    |   DLCI (4 bits)   |FECN|BECN| DE | EA |
549  *    +----+----+----+----+----+----+----+----+
550  */
551 
552     sequence_num = (p[0]&0x1e)<<7 | p[1];
553     /* whole packet or first fragment ? */
554     if ((p[0] & MFR_BEC_MASK) == MFR_FRAG_FRAME ||
555         (p[0] & MFR_BEC_MASK) == MFR_B_BIT) {
556         ND_PRINT((ndo, "FRF.16 Frag, seq %u, Flags [%s], ",
557                sequence_num,
558                bittok2str(frf_flag_values,"none",(p[0] & MFR_BEC_MASK))));
559         hdr_len = 2;
560         fr_print(ndo, p+hdr_len,length-hdr_len);
561         return hdr_len;
562     }
563 
564     /* must be a middle or the last fragment */
565     ND_PRINT((ndo, "FRF.16 Frag, seq %u, Flags [%s]",
566            sequence_num,
567            bittok2str(frf_flag_values,"none",(p[0] & MFR_BEC_MASK))));
568     print_unknown_data(ndo, p, "\n\t", length);
569 
570     return hdr_len;
571 
572  trunc:
573     ND_PRINT((ndo, "[|mfr]"));
574     return length;
575 }
576 
577 /* an NLPID of 0xb1 indicates a 2-byte
578  * FRF.15 header
579  *
580  *      7    6    5    4    3    2    1    0
581  *    +----+----+----+----+----+----+----+----+
582  *    ~              Q.922 header             ~
583  *    +----+----+----+----+----+----+----+----+
584  *    |             NLPID (8 bits)            | NLPID=0xb1
585  *    +----+----+----+----+----+----+----+----+
586  *    | B  | E  | C  |seq. (high 4 bits) | R  |
587  *    +----+----+----+----+----+----+----+----+
588  *    |        sequence  (low 8 bits)         |
589  *    +----+----+----+----+----+----+----+----+
590  */
591 
592 #define FR_FRF15_FRAGTYPE 0x01
593 
594 static void
frf15_print(netdissect_options * ndo,const u_char * p,u_int length)595 frf15_print(netdissect_options *ndo,
596             const u_char *p, u_int length)
597 {
598     uint16_t sequence_num, flags;
599 
600     flags = p[0]&MFR_BEC_MASK;
601     sequence_num = (p[0]&0x1e)<<7 | p[1];
602 
603     ND_PRINT((ndo, "FRF.15, seq 0x%03x, Flags [%s],%s Fragmentation, length %u",
604            sequence_num,
605            bittok2str(frf_flag_values,"none",flags),
606            p[0]&FR_FRF15_FRAGTYPE ? "Interface" : "End-to-End",
607            length));
608 
609 /* TODO:
610  * depending on all permutations of the B, E and C bit
611  * dig as deep as we can - e.g. on the first (B) fragment
612  * there is enough payload to print the IP header
613  * on non (B) fragments it depends if the fragmentation
614  * model is end-to-end or interface based wether we want to print
615  * another Q.922 header
616  */
617 
618 }
619 
620 /*
621  * Q.933 decoding portion for framerelay specific.
622  */
623 
624 /* Q.933 packet format
625                       Format of Other Protocols
626                           using Q.933 NLPID
627                   +-------------------------------+
628                   |        Q.922 Address          |
629                   +---------------+---------------+
630                   |Control  0x03  | NLPID   0x08  |
631                   +---------------+---------------+
632                   |          L2 Protocol ID       |
633                   | octet 1       |  octet 2      |
634                   +-------------------------------+
635                   |          L3 Protocol ID       |
636                   | octet 2       |  octet 2      |
637                   +-------------------------------+
638                   |         Protocol Data         |
639                   +-------------------------------+
640                   | FCS                           |
641                   +-------------------------------+
642  */
643 
644 /* L2 (Octet 1)- Call Reference Usually is 0x0 */
645 
646 /*
647  * L2 (Octet 2)- Message Types definition 1 byte long.
648  */
649 /* Call Establish */
650 #define MSG_TYPE_ESC_TO_NATIONAL  0x00
651 #define MSG_TYPE_ALERT            0x01
652 #define MSG_TYPE_CALL_PROCEEDING  0x02
653 #define MSG_TYPE_CONNECT          0x07
654 #define MSG_TYPE_CONNECT_ACK      0x0F
655 #define MSG_TYPE_PROGRESS         0x03
656 #define MSG_TYPE_SETUP            0x05
657 /* Call Clear */
658 #define MSG_TYPE_DISCONNECT       0x45
659 #define MSG_TYPE_RELEASE          0x4D
660 #define MSG_TYPE_RELEASE_COMPLETE 0x5A
661 #define MSG_TYPE_RESTART          0x46
662 #define MSG_TYPE_RESTART_ACK      0x4E
663 /* Status */
664 #define MSG_TYPE_STATUS           0x7D
665 #define MSG_TYPE_STATUS_ENQ       0x75
666 
667 static const struct tok fr_q933_msg_values[] = {
668     { MSG_TYPE_ESC_TO_NATIONAL, "ESC to National" },
669     { MSG_TYPE_ALERT, "Alert" },
670     { MSG_TYPE_CALL_PROCEEDING, "Call proceeding" },
671     { MSG_TYPE_CONNECT, "Connect" },
672     { MSG_TYPE_CONNECT_ACK, "Connect ACK" },
673     { MSG_TYPE_PROGRESS, "Progress" },
674     { MSG_TYPE_SETUP, "Setup" },
675     { MSG_TYPE_DISCONNECT, "Disconnect" },
676     { MSG_TYPE_RELEASE, "Release" },
677     { MSG_TYPE_RELEASE_COMPLETE, "Release Complete" },
678     { MSG_TYPE_RESTART, "Restart" },
679     { MSG_TYPE_RESTART_ACK, "Restart ACK" },
680     { MSG_TYPE_STATUS, "Status Reply" },
681     { MSG_TYPE_STATUS_ENQ, "Status Enquiry" },
682     { 0, NULL }
683 };
684 
685 #define MSG_ANSI_LOCKING_SHIFT	0x95
686 
687 #define FR_LMI_ANSI_REPORT_TYPE_IE	0x01
688 #define FR_LMI_ANSI_LINK_VERIFY_IE_91	0x19 /* details? */
689 #define FR_LMI_ANSI_LINK_VERIFY_IE	0x03
690 #define FR_LMI_ANSI_PVC_STATUS_IE	0x07
691 
692 #define FR_LMI_CCITT_REPORT_TYPE_IE	0x51
693 #define FR_LMI_CCITT_LINK_VERIFY_IE	0x53
694 #define FR_LMI_CCITT_PVC_STATUS_IE	0x57
695 
696 static const struct tok fr_q933_ie_values_codeset5[] = {
697     { FR_LMI_ANSI_REPORT_TYPE_IE, "ANSI Report Type" },
698     { FR_LMI_ANSI_LINK_VERIFY_IE_91, "ANSI Link Verify" },
699     { FR_LMI_ANSI_LINK_VERIFY_IE, "ANSI Link Verify" },
700     { FR_LMI_ANSI_PVC_STATUS_IE, "ANSI PVC Status" },
701     { FR_LMI_CCITT_REPORT_TYPE_IE, "CCITT Report Type" },
702     { FR_LMI_CCITT_LINK_VERIFY_IE, "CCITT Link Verify" },
703     { FR_LMI_CCITT_PVC_STATUS_IE, "CCITT PVC Status" },
704     { 0, NULL }
705 };
706 
707 #define FR_LMI_REPORT_TYPE_IE_FULL_STATUS 0
708 #define FR_LMI_REPORT_TYPE_IE_LINK_VERIFY 1
709 #define FR_LMI_REPORT_TYPE_IE_ASYNC_PVC   2
710 
711 static const struct tok fr_lmi_report_type_ie_values[] = {
712     { FR_LMI_REPORT_TYPE_IE_FULL_STATUS, "Full Status" },
713     { FR_LMI_REPORT_TYPE_IE_LINK_VERIFY, "Link verify" },
714     { FR_LMI_REPORT_TYPE_IE_ASYNC_PVC, "Async PVC Status" },
715     { 0, NULL }
716 };
717 
718 /* array of 16 codepages - currently we only support codepage 1,5 */
719 static const struct tok *fr_q933_ie_codesets[] = {
720     NULL,
721     fr_q933_ie_values_codeset5,
722     NULL,
723     NULL,
724     NULL,
725     fr_q933_ie_values_codeset5,
726     NULL,
727     NULL,
728     NULL,
729     NULL,
730     NULL,
731     NULL,
732     NULL,
733     NULL,
734     NULL,
735     NULL
736 };
737 
738 static int fr_q933_print_ie_codeset5(netdissect_options *ndo,
739     const struct ie_tlv_header_t  *ie_p, const u_char *p);
740 
741 typedef int (*codeset_pr_func_t)(netdissect_options *,
742     const struct ie_tlv_header_t  *ie_p, const u_char *p);
743 
744 /* array of 16 codepages - currently we only support codepage 1,5 */
745 static const codeset_pr_func_t fr_q933_print_ie_codeset[] = {
746     NULL,
747     fr_q933_print_ie_codeset5,
748     NULL,
749     NULL,
750     NULL,
751     fr_q933_print_ie_codeset5,
752     NULL,
753     NULL,
754     NULL,
755     NULL,
756     NULL,
757     NULL,
758     NULL,
759     NULL,
760     NULL,
761     NULL
762 };
763 
764 void
q933_print(netdissect_options * ndo,const u_char * p,u_int length)765 q933_print(netdissect_options *ndo,
766            const u_char *p, u_int length)
767 {
768 	const u_char *ptemp = p;
769 	struct ie_tlv_header_t  *ie_p;
770         int olen;
771 	int is_ansi = 0;
772         u_int codeset;
773         u_int ie_is_known = 0;
774 
775 	if (length < 9) {	/* shortest: Q.933a LINK VERIFY */
776 		ND_PRINT((ndo, "[|q.933]"));
777 		return;
778 	}
779 
780         codeset = p[2]&0x0f;   /* extract the codeset */
781 
782 	if (p[2] == MSG_ANSI_LOCKING_SHIFT) {
783 	        is_ansi = 1;
784 	}
785 
786         ND_PRINT((ndo, "%s", ndo->ndo_eflag ? "" : "Q.933, "));
787 
788 	/* printing out header part */
789 	ND_PRINT((ndo, "%s, codeset %u", is_ansi ? "ANSI" : "CCITT", codeset));
790 
791 	if (p[0]) {
792 	        ND_PRINT((ndo, ", Call Ref: 0x%02x", p[0]));
793 	}
794         if (ndo->ndo_vflag) {
795                 ND_PRINT((ndo, ", %s (0x%02x), length %u",
796 		       tok2str(fr_q933_msg_values,
797 			       "unknown message", p[1]),
798 		       p[1],
799 		       length));
800         } else {
801                 ND_PRINT((ndo, ", %s",
802 		       tok2str(fr_q933_msg_values,
803 			       "unknown message 0x%02x", p[1])));
804 	}
805 
806         olen = length; /* preserve the original length for non verbose mode */
807 
808 	if (length < (u_int)(2 - is_ansi)) {
809 		ND_PRINT((ndo, "[|q.933]"));
810 		return;
811 	}
812 	length -= 2 + is_ansi;
813 	ptemp += 2 + is_ansi;
814 
815 	/* Loop through the rest of IE */
816 	while (length > sizeof(struct ie_tlv_header_t)) {
817 		ie_p = (struct ie_tlv_header_t  *)ptemp;
818 		if (length < sizeof(struct ie_tlv_header_t) ||
819 		    length < sizeof(struct ie_tlv_header_t) + ie_p->ie_len) {
820                     if (ndo->ndo_vflag) { /* not bark if there is just a trailer */
821                         ND_PRINT((ndo, "\n[|q.933]"));
822                     } else {
823                         ND_PRINT((ndo, ", length %u", olen));
824 		    }
825                     return;
826 		}
827 
828                 /* lets do the full IE parsing only in verbose mode
829                  * however some IEs (DLCI Status, Link Verify)
830                  * are also interestting in non-verbose mode */
831                 if (ndo->ndo_vflag) {
832                     ND_PRINT((ndo, "\n\t%s IE (0x%02x), length %u: ",
833                            tok2str(fr_q933_ie_codesets[codeset],
834 				   "unknown", ie_p->ie_type),
835                            ie_p->ie_type,
836                            ie_p->ie_len));
837 		}
838 
839                 /* sanity check */
840                 if (ie_p->ie_type == 0 || ie_p->ie_len == 0) {
841                     return;
842 		}
843 
844                 if (fr_q933_print_ie_codeset[codeset] != NULL) {
845                     ie_is_known = fr_q933_print_ie_codeset[codeset](ndo, ie_p, ptemp);
846 		}
847 
848                 if (ndo->ndo_vflag >= 1 && !ie_is_known) {
849                     print_unknown_data(ndo, ptemp+2, "\n\t", ie_p->ie_len);
850 		}
851 
852                 /* do we want to see a hexdump of the IE ? */
853                 if (ndo->ndo_vflag> 1 && ie_is_known) {
854                     print_unknown_data(ndo, ptemp+2, "\n\t  ", ie_p->ie_len);
855 		}
856 
857 		length = length - ie_p->ie_len - 2;
858 		ptemp = ptemp + ie_p->ie_len + 2;
859 	}
860         if (!ndo->ndo_vflag) {
861             ND_PRINT((ndo, ", length %u", olen));
862 	}
863 }
864 
865 static int
fr_q933_print_ie_codeset5(netdissect_options * ndo,const struct ie_tlv_header_t * ie_p,const u_char * p)866 fr_q933_print_ie_codeset5(netdissect_options *ndo,
867                           const struct ie_tlv_header_t  *ie_p, const u_char *p)
868 {
869         u_int dlci;
870 
871         switch (ie_p->ie_type) {
872 
873         case FR_LMI_ANSI_REPORT_TYPE_IE: /* fall through */
874         case FR_LMI_CCITT_REPORT_TYPE_IE:
875             if (ndo->ndo_vflag) {
876                 ND_PRINT((ndo, "%s (%u)",
877                        tok2str(fr_lmi_report_type_ie_values,"unknown",p[2]),
878                        p[2]));
879 	    }
880             return 1;
881 
882         case FR_LMI_ANSI_LINK_VERIFY_IE: /* fall through */
883         case FR_LMI_CCITT_LINK_VERIFY_IE:
884         case FR_LMI_ANSI_LINK_VERIFY_IE_91:
885             if (!ndo->ndo_vflag) {
886                 ND_PRINT((ndo, ", "));
887 	    }
888             ND_PRINT((ndo, "TX Seq: %3d, RX Seq: %3d", p[2], p[3]));
889             return 1;
890 
891         case FR_LMI_ANSI_PVC_STATUS_IE: /* fall through */
892         case FR_LMI_CCITT_PVC_STATUS_IE:
893             if (!ndo->ndo_vflag) {
894                 ND_PRINT((ndo, ", "));
895 	    }
896             /* now parse the DLCI information element. */
897             if ((ie_p->ie_len < 3) ||
898                 (p[2] & 0x80) ||
899                 ((ie_p->ie_len == 3) && !(p[3] & 0x80)) ||
900                 ((ie_p->ie_len == 4) && ((p[3] & 0x80) || !(p[4] & 0x80))) ||
901                 ((ie_p->ie_len == 5) && ((p[3] & 0x80) || (p[4] & 0x80) ||
902                                    !(p[5] & 0x80))) ||
903                 (ie_p->ie_len > 5) ||
904                 !(p[ie_p->ie_len + 1] & 0x80)) {
905                 ND_PRINT((ndo, "Invalid DLCI IE"));
906 	    }
907 
908             dlci = ((p[2] & 0x3F) << 4) | ((p[3] & 0x78) >> 3);
909             if (ie_p->ie_len == 4) {
910                 dlci = (dlci << 6) | ((p[4] & 0x7E) >> 1);
911 	    }
912             else if (ie_p->ie_len == 5) {
913                 dlci = (dlci << 13) | (p[4] & 0x7F) | ((p[5] & 0x7E) >> 1);
914 	    }
915 
916             ND_PRINT((ndo, "DLCI %u: status %s%s", dlci,
917                     p[ie_p->ie_len + 1] & 0x8 ? "New, " : "",
918                     p[ie_p->ie_len + 1] & 0x2 ? "Active" : "Inactive"));
919             return 1;
920 	}
921 
922         return 0;
923 }
924 /*
925  * Local Variables:
926  * c-style: whitesmith
927  * c-basic-offset: 8
928  * End:
929  */
930