diff options
Diffstat (limited to 'packet-chdlc.c')
-rw-r--r-- | packet-chdlc.c | 306 |
1 files changed, 306 insertions, 0 deletions
diff --git a/packet-chdlc.c b/packet-chdlc.c new file mode 100644 index 0000000000..7c5d6d64aa --- /dev/null +++ b/packet-chdlc.c @@ -0,0 +1,306 @@ +/* packet-chdlc.c + * Routines for Cisco HDLC packet disassembly + * + * $Id: packet-chdlc.c,v 1.1 2001/03/15 09:11:00 guy Exp $ + * + * Ethereal - Network traffic analyzer + * By Gerald Combs <gerald@zing.org> + * + * This program is free software; you can redistribute it and/or + * modify it under the terms of the GNU General Public License + * as published by the Free Software Foundation; either version 2 + * of the License, or (at your option) any later version. + * + * This program is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + * GNU General Public License for more details. + * + * You should have received a copy of the GNU General Public License + * along with this program; if not, write to the Free Software + * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. + */ + +#ifdef HAVE_CONFIG_H +# include "config.h" +#endif + +#ifdef HAVE_SYS_TYPES_H +# include <sys/types.h> +#endif + +#include <glib.h> +#include "packet.h" +#include "etypes.h" +#include "resolv.h" +#include "packet-chdlc.h" +#include "packet-ip.h" + +/* + * See section 4.3.1 of RFC 1547, and + * + * http://www.nethelp.no/net/cisco-hdlc.txt + */ + +static int proto_chdlc = -1; +static int hf_chdlc_addr = -1; +static int hf_chdlc_proto = -1; + +static gint ett_chdlc = -1; + +static int proto_slarp = -1; +static int hf_slarp_ptype = -1; +static int hf_slarp_address = -1; +static int hf_slarp_mysequence = -1; +static int hf_slarp_yoursequence = -1; + +static gint ett_slarp = -1; + +/* + * Protocol types for the Cisco HDLC format. + * + * As per the above, according to RFC 1547, these are "standard 16 bit + * Ethernet protocol type code[s]", but 0x8035 is Reverse ARP, and + * that is (at least according to the Linux ISDN code) not the + * same as Cisco SLARP. + * + * In addition, 0x2000 is apparently the Cisco Discovery Protocol, but + * on Ethernet those are encapsulated inside SNAP with an OUI of + * OUI_CISCO, not OUI_ENCAP_ETHER. + * + * Perhaps we should set up a protocol table for those protocols + * that differ between Ethernet and Cisco HDLC, and have the PPP + * code first try that table and, if it finds nothing in that + * table, call "ethertype()". (Unfortunately, that means that - + * assuming we had a Cisco SLARP dissector - said dissector were + * disabled, SLARP packets would be dissected as Reverse ARP + * packets, not as data.) + */ +#define CISCO_SLARP 0x8035 /* Cisco SLARP protocol */ + +static dissector_table_t subdissector_table; + +static const value_string chdlc_address_vals[] = { + {CHDLC_ADDR_UNICAST, "Unicast"}, + {CHDLC_ADDR_MULTICAST, "Multicast"}, + {0, NULL} +}; + +const value_string chdlc_vals[] = { + {0x2000, "Cisco Discovery Protocol"}, + {ETHERTYPE_IP, "IP"}, + {CISCO_SLARP, "SLARP"}, + {ETHERTYPE_DEC_LB, "DEC LanBridge"}, + {ETHERTYPE_ATALK, "Appletalk"}, + {ETHERTYPE_AARP, "AARP"}, + {ETHERTYPE_IPX, "Netware IPX/SPX"}, + {0, NULL} +}; + +void +capture_chdlc( const u_char *pd, int offset, packet_counts *ld ) { + switch (pntohs(&pd[offset + 2])) { + case ETHERTYPE_IP: + capture_ip(pd, offset + 4, ld); + break; + default: + ld->other++; + break; + } +} + +void +chdlctype(guint16 chdlctype, tvbuff_t *tvb, int offset_after_chdlctype, + packet_info *pinfo, proto_tree *tree, proto_tree *fh_tree, + int chdlctype_id) +{ + tvbuff_t *next_tvb; + + if (tree) { + proto_tree_add_uint(fh_tree, chdlctype_id, tvb, + offset_after_chdlctype - 2, 2, chdlctype); + } + + next_tvb = tvb_new_subset(tvb, offset_after_chdlctype, -1, -1); + + /* do lookup with the subdissector table */ + if (!dissector_try_port(subdissector_table, chdlctype, next_tvb, pinfo, tree)) { + if (check_col(pinfo->fd, COL_PROTOCOL)) + col_add_fstr(pinfo->fd, COL_PROTOCOL, "0x%04x", chdlctype); + dissect_data(next_tvb, 0, pinfo, tree); + } +} + +static void +dissect_chdlc(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree) +{ + proto_item *ti; + proto_tree *fh_tree = NULL; + guint8 addr; + guint16 proto; + + if (check_col(pinfo->fd, COL_RES_DL_SRC)) + col_set_str(pinfo->fd, COL_RES_DL_SRC, "N/A"); + if (check_col(pinfo->fd, COL_RES_DL_DST)) + col_set_str(pinfo->fd, COL_RES_DL_DST, "N/A"); + if (check_col(pinfo->fd, COL_PROTOCOL)) + col_set_str(pinfo->fd, COL_PROTOCOL, "CHDLC"); + if (check_col(pinfo->fd, COL_INFO)) + col_clear(pinfo->fd, COL_INFO); + + addr = tvb_get_guint8(tvb, 0); + proto = tvb_get_ntohs(tvb, 2); + + if (tree) { + ti = proto_tree_add_item(tree, proto_chdlc, tvb, 0, 4, FALSE); + fh_tree = proto_item_add_subtree(ti, ett_chdlc); + + proto_tree_add_uint(fh_tree, hf_chdlc_addr, tvb, 0, 1, addr); + } + + chdlctype(proto, tvb, 4, pinfo, tree, fh_tree, hf_chdlc_proto); +} + +void +proto_register_chdlc(void) +{ + static hf_register_info hf[] = { + { &hf_chdlc_addr, + { "Address", "chdlc.address", FT_UINT8, BASE_HEX, + VALS(chdlc_address_vals), 0x0, "" }}, + { &hf_chdlc_proto, + { "Protocol", "chdlc.protocol", FT_UINT16, BASE_HEX, + VALS(chdlc_vals), 0x0, "" }}, + }; + static gint *ett[] = { + &ett_chdlc, + }; + + proto_chdlc = proto_register_protocol("Cisco HDLC", "CHDLC", "chdlc"); + proto_register_field_array(proto_chdlc, hf, array_length(hf)); + proto_register_subtree_array(ett, array_length(ett)); + +/* subdissector code */ + subdissector_table = register_dissector_table("chdlctype"); + + register_dissector("chdlc", dissect_chdlc, proto_chdlc); +} + +void +proto_reg_handoff_chdlc(void) +{ + dissector_add("wtap_encap", WTAP_ENCAP_CHDLC, dissect_chdlc, proto_chdlc); +} + +#define SLARP_REQUEST 0 +#define SLARP_REPLY 1 +#define SLARP_LINECHECK 2 + +static const value_string slarp_ptype_vals[] = { + {SLARP_REQUEST, "Request"}, + {SLARP_REPLY, "Reply"}, + {SLARP_LINECHECK, "Line keepalive"}, + {0, NULL} +}; + +static void +dissect_slarp(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree) +{ + proto_item *ti; + proto_tree *slarp_tree = NULL; + guint32 code; + guint32 mysequence; + guint32 yoursequence; + + if (check_col(pinfo->fd, COL_PROTOCOL)) + col_set_str(pinfo->fd, COL_PROTOCOL, "SLARP"); + if (check_col(pinfo->fd, COL_INFO)) + col_clear(pinfo->fd, COL_INFO); + + code = tvb_get_ntohl(tvb, 0); + + if (tree) { + ti = proto_tree_add_item(tree, proto_slarp, tvb, 0, 14, FALSE); + slarp_tree = proto_item_add_subtree(ti, ett_slarp); + } + + switch (code) { + + case SLARP_REQUEST: + case SLARP_REPLY: + if (check_col(pinfo->fd, COL_INFO)) { + col_add_fstr(pinfo->fd, COL_INFO, "%s, from %s, mask %s", + match_strval(code, slarp_ptype_vals), + get_hostname(tvb_get_ntohl(tvb, 4)), + ip_to_str(tvb_get_ptr(tvb, 8, 4))); + } + if (tree) { + proto_tree_add_uint(slarp_tree, hf_slarp_ptype, tvb, 0, 4, code); + proto_tree_add_item(slarp_tree, hf_slarp_address, tvb, 4, 4, FALSE); + proto_tree_add_text(slarp_tree, tvb, 8, 4, + "Netmask: %s", ip_to_str(tvb_get_ptr(tvb, 8, 4))); + } + break; + + case SLARP_LINECHECK: + mysequence = tvb_get_ntohl(tvb, 4); + yoursequence = tvb_get_ntohl(tvb, 8); + if (check_col(pinfo->fd, COL_INFO)) { + col_add_fstr(pinfo->fd, COL_INFO, + "%s, outgoing sequence %u, returned sequence %u", + match_strval(code, slarp_ptype_vals), + mysequence, yoursequence); + } + if (tree) { + proto_tree_add_uint(slarp_tree, hf_slarp_ptype, tvb, 0, 4, code); + proto_tree_add_uint(slarp_tree, hf_slarp_mysequence, tvb, 4, 4, + mysequence); + proto_tree_add_uint(slarp_tree, hf_slarp_mysequence, tvb, 8, 4, + yoursequence); + } + break; + + default: + if (check_col(pinfo->fd, COL_INFO)) + col_add_fstr(pinfo->fd, COL_INFO, "Unknown packet type 0x%08X", code); + if (tree) { + proto_tree_add_uint(slarp_tree, hf_slarp_ptype, tvb, 0, 4, code); + dissect_data(tvb, 4, pinfo, slarp_tree); + } + break; + } +} + +void +proto_register_slarp(void) +{ + static hf_register_info hf[] = { + { &hf_slarp_ptype, + { "Packet type", "slarp.ptype", FT_UINT32, BASE_DEC, + VALS(slarp_ptype_vals), 0x0, "" }}, + { &hf_slarp_address, + { "Address", "slarp.address", FT_IPv4, BASE_NONE, + NULL, 0x0, "" }}, + /* XXX - need an FT_ for netmasks, which is like FT_IPV4 but doesn't + get translated to a host name. */ + { &hf_slarp_mysequence, + { "Outgoing sequence number", "slarp.mysequence", FT_UINT32, BASE_DEC, + NULL, 0x0, "" }}, + { &hf_slarp_yoursequence, + { "Returned sequence number", "slarp.yoursequence", FT_UINT32, BASE_DEC, + NULL, 0x0, "" }}, + }; + static gint *ett[] = { + &ett_chdlc, + }; + + proto_slarp = proto_register_protocol("Cisco SLARP", "SLARP", "slarp"); + proto_register_field_array(proto_slarp, hf, array_length(hf)); + proto_register_subtree_array(ett, array_length(ett)); +} + +void +proto_reg_handoff_slarp(void) +{ + dissector_add("chdlctype", CISCO_SLARP, dissect_slarp, proto_slarp); +} |