2 * Copyright (c) 1990, 1991, 1993, 1994, 1995, 1996
3 * The Regents of the University of California. All rights reserved.
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that: (1) source code distributions
7 * retain the above copyright notice and this paragraph in its entirety, (2)
8 * distributions including binary code include the above copyright notice and
9 * this paragraph in its entirety in the documentation or other materials
10 * provided with the distribution, and (3) all advertising materials mentioning
11 * features or use of this software display the following acknowledgement:
12 * ``This product includes software developed by the University of California,
13 * Lawrence Berkeley Laboratory and its contributors.'' Neither the name of
14 * the University nor the names of its contributors may be used to endorse
15 * or promote products derived from this software without specific prior
17 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED
18 * WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF
19 * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
24 #define NETDISSECT_REWORKED
29 #include <tcpdump-stdinc.h>
34 #include "interface.h"
35 #include "addrtoname.h"
36 #include "ethertype.h"
41 static void frf15_print(netdissect_options *ndo, const u_char *, u_int);
44 * the frame relay header has a variable length
46 * the EA bit determines if there is another byte
49 * minimum header length is 2 bytes
50 * maximum header length is 4 bytes
53 * +----+----+----+----+----+----+----+----+
54 * | DLCI (6 bits) | CR | EA |
55 * +----+----+----+----+----+----+----+----+
56 * | DLCI (4 bits) |FECN|BECN| DE | EA |
57 * +----+----+----+----+----+----+----+----+
58 * | DLCI (7 bits) | EA |
59 * +----+----+----+----+----+----+----+----+
60 * | DLCI (6 bits) |SDLC| EA |
61 * +----+----+----+----+----+----+----+----+
64 #define FR_EA_BIT 0x01
66 #define FR_CR_BIT 0x02000000
67 #define FR_DE_BIT 0x00020000
68 #define FR_BECN_BIT 0x00040000
69 #define FR_FECN_BIT 0x00080000
70 #define FR_SDLC_BIT 0x00000002
73 static const struct tok fr_header_flag_values[] = {
76 { FR_BECN_BIT, "BECN" },
77 { FR_FECN_BIT, "FECN" },
78 { FR_SDLC_BIT, "sdlcore" },
83 #define MFR_B_BIT 0x80
84 #define MFR_E_BIT 0x40
85 #define MFR_C_BIT 0x20
86 #define MFR_BEC_MASK (MFR_B_BIT | MFR_E_BIT | MFR_C_BIT)
87 #define MFR_CTRL_FRAME (MFR_B_BIT | MFR_E_BIT | MFR_C_BIT)
88 #define MFR_FRAG_FRAME (MFR_B_BIT | MFR_E_BIT )
90 static const struct tok frf_flag_values[] = {
91 { MFR_B_BIT, "Begin" },
93 { MFR_C_BIT, "Control" },
97 /* Finds out Q.922 address length, DLCI and flags. Returns 0 on success
98 * save the flags dep. on address length
100 static int parse_q922_addr(const u_char *p, u_int *dlci,
101 u_int *addr_len, uint8_t *flags)
103 if ((p[0] & FR_EA_BIT))
107 *dlci = ((p[0] & 0xFC) << 2) | ((p[1] & 0xF0) >> 4);
109 flags[0] = p[0] & 0x02; /* populate the first flag fields */
110 flags[1] = p[1] & 0x0c;
111 flags[2] = 0; /* clear the rest of the flags */
114 if (p[1] & FR_EA_BIT)
115 return 0; /* 2-byte Q.922 address */
118 (*addr_len)++; /* 3- or 4-byte Q.922 address */
119 if ((p[0] & FR_EA_BIT) == 0) {
120 *dlci = (*dlci << 7) | (p[0] >> 1);
121 (*addr_len)++; /* 4-byte Q.922 address */
125 if ((p[0] & FR_EA_BIT) == 0)
126 return -1; /* more than 4 bytes of Q.922 address? */
128 flags[3] = p[0] & 0x02;
130 *dlci = (*dlci << 6) | (p[0] >> 2);
135 char *q922_string(const u_char *p) {
137 static u_int dlci, addr_len;
138 static uint8_t flags[4];
139 static char buffer[sizeof("DLCI xxxxxxxxxx")];
140 memset(buffer, 0, sizeof(buffer));
142 if (parse_q922_addr(p, &dlci, &addr_len, flags) == 0){
143 snprintf(buffer, sizeof(buffer), "DLCI %u", dlci);
150 /* Frame Relay packet structure, with flags and CRC removed
152 +---------------------------+
156 +---------------------------+
157 | Control (UI = 0x03) |
158 +---------------------------+
159 | Optional Pad (0x00) |
160 +---------------------------+
162 +---------------------------+
169 +---------------------------+
171 * Q.922 addresses, as presently defined, are two octets and
172 contain a 10-bit DLCI. In some networks Q.922 addresses
173 may optionally be increased to three or four octets.
177 fr_hdrlen(const u_char *p, u_int addr_len)
179 if (!p[addr_len + 1] /* pad exist */)
180 return addr_len + 1 /* UI */ + 1 /* pad */ + 1 /* NLPID */;
182 return addr_len + 1 /* UI */ + 1 /* NLPID */;
186 fr_hdr_print(netdissect_options *ndo,
187 int length, u_int addr_len, u_int dlci, uint8_t *flags, uint16_t nlpid)
189 if (ndo->ndo_qflag) {
190 ND_PRINT((ndo, "Q.922, DLCI %u, length %u: ",
194 if (nlpid <= 0xff) /* if its smaller than 256 then its a NLPID */
195 ND_PRINT((ndo, "Q.922, hdr-len %u, DLCI %u, Flags [%s], NLPID %s (0x%02x), length %u: ",
198 bittok2str(fr_header_flag_values, "none", EXTRACT_32BITS(flags)),
199 tok2str(nlpid_values,"unknown", nlpid),
202 else /* must be an ethertype */
203 ND_PRINT((ndo, "Q.922, hdr-len %u, DLCI %u, Flags [%s], cisco-ethertype %s (0x%04x), length %u: ",
206 bittok2str(fr_header_flag_values, "none", EXTRACT_32BITS(flags)),
207 tok2str(ethertype_values, "unknown", nlpid),
214 fr_if_print(netdissect_options *ndo,
215 const struct pcap_pkthdr *h, register const u_char *p)
217 register u_int length = h->len;
218 register u_int caplen = h->caplen;
220 ND_TCHECK2(*p, 4); /* minimum frame header length */
222 if ((length = fr_print(ndo, p, length)) == 0)
227 ND_PRINT((ndo, "[|fr]"));
232 fr_print(netdissect_options *ndo,
233 register const u_char *p, u_int length)
235 uint16_t extracted_ethertype;
242 if (parse_q922_addr(p, &dlci, &addr_len, flags)) {
243 ND_PRINT((ndo, "Q.922, invalid address"));
247 ND_TCHECK2(*p, addr_len+1+1);
248 hdr_len = fr_hdrlen(p, addr_len);
249 ND_TCHECK2(*p, hdr_len);
251 if (p[addr_len] != 0x03 && dlci != 0) {
253 /* lets figure out if we have cisco style encapsulation: */
254 extracted_ethertype = EXTRACT_16BITS(p+addr_len);
257 fr_hdr_print(ndo, length, addr_len, dlci, flags, extracted_ethertype);
259 if (ethertype_print(ndo, extracted_ethertype,
260 p+addr_len+ETHERTYPE_LEN,
261 length-addr_len-ETHERTYPE_LEN,
262 length-addr_len-ETHERTYPE_LEN) == 0)
263 /* ether_type not known, probably it wasn't one */
264 ND_PRINT((ndo, "UI %02x! ", p[addr_len]));
269 if (!p[addr_len + 1]) { /* pad byte should be used with 3-byte Q.922 */
271 ND_PRINT((ndo, "Pad! "));
272 } else if (addr_len == 3)
273 ND_PRINT((ndo, "No pad! "));
275 nlpid = p[hdr_len - 1];
278 fr_hdr_print(ndo, length, addr_len, dlci, flags, nlpid);
284 ip_print(ndo, p, length);
289 ip6_print(ndo, p, length);
295 isoclns_print(ndo, p - 1, length + 1, length + 1); /* OSI printers need the NLPID field */
299 if (snap_print(ndo, p, length, length, 0) == 0) {
300 /* ether_type not known, print raw packet */
302 fr_hdr_print(ndo, length + hdr_len, hdr_len,
304 if (!ndo->ndo_suppress_default_print)
305 ND_DEFAULTPRINT(p - hdr_len, length + hdr_len);
310 q933_print(ndo, p, length);
314 frf15_print(ndo, p, length);
318 ppp_print(ndo, p, length);
323 fr_hdr_print(ndo, length + hdr_len, addr_len,
326 ND_DEFAULTPRINT(p, length);
332 ND_PRINT((ndo, "[|fr]"));
338 mfr_if_print(netdissect_options *ndo,
339 const struct pcap_pkthdr *h, register const u_char *p)
341 register u_int length = h->len;
342 register u_int caplen = h->caplen;
344 ND_TCHECK2(*p, 2); /* minimum frame header length */
346 if ((length = mfr_print(ndo, p, length)) == 0)
351 ND_PRINT((ndo, "[|mfr]"));
356 #define MFR_CTRL_MSG_ADD_LINK 1
357 #define MFR_CTRL_MSG_ADD_LINK_ACK 2
358 #define MFR_CTRL_MSG_ADD_LINK_REJ 3
359 #define MFR_CTRL_MSG_HELLO 4
360 #define MFR_CTRL_MSG_HELLO_ACK 5
361 #define MFR_CTRL_MSG_REMOVE_LINK 6
362 #define MFR_CTRL_MSG_REMOVE_LINK_ACK 7
364 static const struct tok mfr_ctrl_msg_values[] = {
365 { MFR_CTRL_MSG_ADD_LINK, "Add Link" },
366 { MFR_CTRL_MSG_ADD_LINK_ACK, "Add Link ACK" },
367 { MFR_CTRL_MSG_ADD_LINK_REJ, "Add Link Reject" },
368 { MFR_CTRL_MSG_HELLO, "Hello" },
369 { MFR_CTRL_MSG_HELLO_ACK, "Hello ACK" },
370 { MFR_CTRL_MSG_REMOVE_LINK, "Remove Link" },
371 { MFR_CTRL_MSG_REMOVE_LINK_ACK, "Remove Link ACK" },
375 #define MFR_CTRL_IE_BUNDLE_ID 1
376 #define MFR_CTRL_IE_LINK_ID 2
377 #define MFR_CTRL_IE_MAGIC_NUM 3
378 #define MFR_CTRL_IE_TIMESTAMP 5
379 #define MFR_CTRL_IE_VENDOR_EXT 6
380 #define MFR_CTRL_IE_CAUSE 7
382 static const struct tok mfr_ctrl_ie_values[] = {
383 { MFR_CTRL_IE_BUNDLE_ID, "Bundle ID"},
384 { MFR_CTRL_IE_LINK_ID, "Link ID"},
385 { MFR_CTRL_IE_MAGIC_NUM, "Magic Number"},
386 { MFR_CTRL_IE_TIMESTAMP, "Timestamp"},
387 { MFR_CTRL_IE_VENDOR_EXT, "Vendor Extension"},
388 { MFR_CTRL_IE_CAUSE, "Cause"},
392 #define MFR_ID_STRING_MAXLEN 50
394 struct ie_tlv_header_t {
400 mfr_print(netdissect_options *ndo,
401 register const u_char *p, u_int length)
403 u_int tlen,idx,hdr_len = 0;
404 uint16_t sequence_num;
405 uint8_t ie_type,ie_len;
410 * FRF.16 Link Integrity Control Frame
413 * +----+----+----+----+----+----+----+----+
414 * | B | E | C=1| 0 0 0 0 | EA |
415 * +----+----+----+----+----+----+----+----+
416 * | 0 0 0 0 0 0 0 0 |
417 * +----+----+----+----+----+----+----+----+
419 * +----+----+----+----+----+----+----+----+
422 ND_TCHECK2(*p, 4); /* minimum frame header length */
424 if ((p[0] & MFR_BEC_MASK) == MFR_CTRL_FRAME && p[1] == 0) {
425 ND_PRINT((ndo, "FRF.16 Control, Flags [%s], %s, length %u",
426 bittok2str(frf_flag_values,"none",(p[0] & MFR_BEC_MASK)),
427 tok2str(mfr_ctrl_msg_values,"Unknown Message (0x%02x)",p[2]),
436 while (tlen>sizeof(struct ie_tlv_header_t)) {
437 ND_TCHECK2(*tptr, sizeof(struct ie_tlv_header_t));
441 ND_PRINT((ndo, "\n\tIE %s (%u), length %u: ",
442 tok2str(mfr_ctrl_ie_values,"Unknown",ie_type),
446 /* infinite loop check */
447 if (ie_type == 0 || ie_len <= sizeof(struct ie_tlv_header_t))
450 ND_TCHECK2(*tptr, ie_len);
451 tptr+=sizeof(struct ie_tlv_header_t);
452 /* tlv len includes header */
453 ie_len-=sizeof(struct ie_tlv_header_t);
454 tlen-=sizeof(struct ie_tlv_header_t);
458 case MFR_CTRL_IE_MAGIC_NUM:
459 ND_PRINT((ndo, "0x%08x", EXTRACT_32BITS(tptr)));
462 case MFR_CTRL_IE_BUNDLE_ID: /* same message format */
463 case MFR_CTRL_IE_LINK_ID:
464 for (idx = 0; idx < ie_len && idx < MFR_ID_STRING_MAXLEN; idx++) {
465 if (*(tptr+idx) != 0) /* don't print null termination */
466 safeputchar(ndo, *(tptr + idx));
472 case MFR_CTRL_IE_TIMESTAMP:
473 if (ie_len == sizeof(struct timeval)) {
474 ts_print(ndo, (const struct timeval *)tptr);
477 /* fall through and hexdump if no unix timestamp */
480 * FIXME those are the defined IEs that lack a decoder
481 * you are welcome to contribute code ;-)
484 case MFR_CTRL_IE_VENDOR_EXT:
485 case MFR_CTRL_IE_CAUSE:
488 if (ndo->ndo_vflag <= 1)
489 print_unknown_data(ndo, tptr, "\n\t ", ie_len);
493 /* do we want to see a hexdump of the IE ? */
494 if (ndo->ndo_vflag > 1 )
495 print_unknown_data(ndo, tptr, "\n\t ", ie_len);
503 * FRF.16 Fragmentation Frame
506 * +----+----+----+----+----+----+----+----+
507 * | B | E | C=0|seq. (high 4 bits) | EA |
508 * +----+----+----+----+----+----+----+----+
509 * | sequence (low 8 bits) |
510 * +----+----+----+----+----+----+----+----+
511 * | DLCI (6 bits) | CR | EA |
512 * +----+----+----+----+----+----+----+----+
513 * | DLCI (4 bits) |FECN|BECN| DE | EA |
514 * +----+----+----+----+----+----+----+----+
517 sequence_num = (p[0]&0x1e)<<7 | p[1];
518 /* whole packet or first fragment ? */
519 if ((p[0] & MFR_BEC_MASK) == MFR_FRAG_FRAME ||
520 (p[0] & MFR_BEC_MASK) == MFR_B_BIT) {
521 ND_PRINT((ndo, "FRF.16 Frag, seq %u, Flags [%s], ",
523 bittok2str(frf_flag_values,"none",(p[0] & MFR_BEC_MASK))));
525 fr_print(ndo, p+hdr_len,length-hdr_len);
529 /* must be a middle or the last fragment */
530 ND_PRINT((ndo, "FRF.16 Frag, seq %u, Flags [%s]",
532 bittok2str(frf_flag_values,"none",(p[0] & MFR_BEC_MASK))));
533 print_unknown_data(ndo, p, "\n\t", length);
538 ND_PRINT((ndo, "[|mfr]"));
542 /* an NLPID of 0xb1 indicates a 2-byte
546 * +----+----+----+----+----+----+----+----+
548 * +----+----+----+----+----+----+----+----+
549 * | NLPID (8 bits) | NLPID=0xb1
550 * +----+----+----+----+----+----+----+----+
551 * | B | E | C |seq. (high 4 bits) | R |
552 * +----+----+----+----+----+----+----+----+
553 * | sequence (low 8 bits) |
554 * +----+----+----+----+----+----+----+----+
557 #define FR_FRF15_FRAGTYPE 0x01
560 frf15_print(netdissect_options *ndo,
561 const u_char *p, u_int length) {
563 uint16_t sequence_num, flags;
565 flags = p[0]&MFR_BEC_MASK;
566 sequence_num = (p[0]&0x1e)<<7 | p[1];
568 ND_PRINT((ndo, "FRF.15, seq 0x%03x, Flags [%s],%s Fragmentation, length %u",
570 bittok2str(frf_flag_values,"none",flags),
571 p[0]&FR_FRF15_FRAGTYPE ? "Interface" : "End-to-End",
575 * depending on all permutations of the B, E and C bit
576 * dig as deep as we can - e.g. on the first (B) fragment
577 * there is enough payload to print the IP header
578 * on non (B) fragments it depends if the fragmentation
579 * model is end-to-end or interface based wether we want to print
580 * another Q.922 header
586 * Q.933 decoding portion for framerelay specific.
589 /* Q.933 packet format
590 Format of Other Protocols
592 +-------------------------------+
594 +---------------+---------------+
595 |Control 0x03 | NLPID 0x08 |
596 +---------------+---------------+
598 | octet 1 | octet 2 |
599 +-------------------------------+
601 | octet 2 | octet 2 |
602 +-------------------------------+
604 +-------------------------------+
606 +-------------------------------+
609 /* L2 (Octet 1)- Call Reference Usually is 0x0 */
612 * L2 (Octet 2)- Message Types definition 1 byte long.
615 #define MSG_TYPE_ESC_TO_NATIONAL 0x00
616 #define MSG_TYPE_ALERT 0x01
617 #define MSG_TYPE_CALL_PROCEEDING 0x02
618 #define MSG_TYPE_CONNECT 0x07
619 #define MSG_TYPE_CONNECT_ACK 0x0F
620 #define MSG_TYPE_PROGRESS 0x03
621 #define MSG_TYPE_SETUP 0x05
623 #define MSG_TYPE_DISCONNECT 0x45
624 #define MSG_TYPE_RELEASE 0x4D
625 #define MSG_TYPE_RELEASE_COMPLETE 0x5A
626 #define MSG_TYPE_RESTART 0x46
627 #define MSG_TYPE_RESTART_ACK 0x4E
629 #define MSG_TYPE_STATUS 0x7D
630 #define MSG_TYPE_STATUS_ENQ 0x75
632 static const struct tok fr_q933_msg_values[] = {
633 { MSG_TYPE_ESC_TO_NATIONAL, "ESC to National" },
634 { MSG_TYPE_ALERT, "Alert" },
635 { MSG_TYPE_CALL_PROCEEDING, "Call proceeding" },
636 { MSG_TYPE_CONNECT, "Connect" },
637 { MSG_TYPE_CONNECT_ACK, "Connect ACK" },
638 { MSG_TYPE_PROGRESS, "Progress" },
639 { MSG_TYPE_SETUP, "Setup" },
640 { MSG_TYPE_DISCONNECT, "Disconnect" },
641 { MSG_TYPE_RELEASE, "Release" },
642 { MSG_TYPE_RELEASE_COMPLETE, "Release Complete" },
643 { MSG_TYPE_RESTART, "Restart" },
644 { MSG_TYPE_RESTART_ACK, "Restart ACK" },
645 { MSG_TYPE_STATUS, "Status Reply" },
646 { MSG_TYPE_STATUS_ENQ, "Status Enquiry" },
650 #define MSG_ANSI_LOCKING_SHIFT 0x95
652 #define FR_LMI_ANSI_REPORT_TYPE_IE 0x01
653 #define FR_LMI_ANSI_LINK_VERIFY_IE_91 0x19 /* details? */
654 #define FR_LMI_ANSI_LINK_VERIFY_IE 0x03
655 #define FR_LMI_ANSI_PVC_STATUS_IE 0x07
657 #define FR_LMI_CCITT_REPORT_TYPE_IE 0x51
658 #define FR_LMI_CCITT_LINK_VERIFY_IE 0x53
659 #define FR_LMI_CCITT_PVC_STATUS_IE 0x57
661 static const struct tok fr_q933_ie_values_codeset5[] = {
662 { FR_LMI_ANSI_REPORT_TYPE_IE, "ANSI Report Type" },
663 { FR_LMI_ANSI_LINK_VERIFY_IE_91, "ANSI Link Verify" },
664 { FR_LMI_ANSI_LINK_VERIFY_IE, "ANSI Link Verify" },
665 { FR_LMI_ANSI_PVC_STATUS_IE, "ANSI PVC Status" },
666 { FR_LMI_CCITT_REPORT_TYPE_IE, "CCITT Report Type" },
667 { FR_LMI_CCITT_LINK_VERIFY_IE, "CCITT Link Verify" },
668 { FR_LMI_CCITT_PVC_STATUS_IE, "CCITT PVC Status" },
672 #define FR_LMI_REPORT_TYPE_IE_FULL_STATUS 0
673 #define FR_LMI_REPORT_TYPE_IE_LINK_VERIFY 1
674 #define FR_LMI_REPORT_TYPE_IE_ASYNC_PVC 2
676 static const struct tok fr_lmi_report_type_ie_values[] = {
677 { FR_LMI_REPORT_TYPE_IE_FULL_STATUS, "Full Status" },
678 { FR_LMI_REPORT_TYPE_IE_LINK_VERIFY, "Link verify" },
679 { FR_LMI_REPORT_TYPE_IE_ASYNC_PVC, "Async PVC Status" },
683 /* array of 16 codepages - currently we only support codepage 1,5 */
684 static const struct tok *fr_q933_ie_codesets[] = {
686 fr_q933_ie_values_codeset5,
690 fr_q933_ie_values_codeset5,
703 static int fr_q933_print_ie_codeset5(netdissect_options *ndo,
704 const struct ie_tlv_header_t *ie_p, const u_char *p);
706 typedef int (*codeset_pr_func_t)(netdissect_options *,
707 const struct ie_tlv_header_t *ie_p, const u_char *p);
709 /* array of 16 codepages - currently we only support codepage 1,5 */
710 static const codeset_pr_func_t fr_q933_print_ie_codeset[] = {
712 fr_q933_print_ie_codeset5,
716 fr_q933_print_ie_codeset5,
730 q933_print(netdissect_options *ndo,
731 const u_char *p, u_int length)
733 const u_char *ptemp = p;
734 struct ie_tlv_header_t *ie_p;
738 u_int ie_is_known = 0;
740 if (length < 9) { /* shortest: Q.933a LINK VERIFY */
741 ND_PRINT((ndo, "[|q.933]"));
745 codeset = p[2]&0x0f; /* extract the codeset */
747 if (p[2] == MSG_ANSI_LOCKING_SHIFT) {
751 ND_PRINT((ndo, "%s", ndo->ndo_eflag ? "" : "Q.933, "));
753 /* printing out header part */
754 ND_PRINT((ndo, "%s, codeset %u", is_ansi ? "ANSI" : "CCITT", codeset));
757 ND_PRINT((ndo, ", Call Ref: 0x%02x", p[0]));
759 if (ndo->ndo_vflag) {
760 ND_PRINT((ndo, ", %s (0x%02x), length %u",
761 tok2str(fr_q933_msg_values,
762 "unknown message", p[1]),
766 ND_PRINT((ndo, ", %s",
767 tok2str(fr_q933_msg_values,
768 "unknown message 0x%02x", p[1])));
771 olen = length; /* preserve the original length for non verbose mode */
773 if (length < (u_int)(2 - is_ansi)) {
774 ND_PRINT((ndo, "[|q.933]"));
777 length -= 2 + is_ansi;
778 ptemp += 2 + is_ansi;
780 /* Loop through the rest of IE */
781 while (length > sizeof(struct ie_tlv_header_t)) {
782 ie_p = (struct ie_tlv_header_t *)ptemp;
783 if (length < sizeof(struct ie_tlv_header_t) ||
784 length < sizeof(struct ie_tlv_header_t) + ie_p->ie_len) {
785 if (ndo->ndo_vflag) { /* not bark if there is just a trailer */
786 ND_PRINT((ndo, "\n[|q.933]"));
788 ND_PRINT((ndo, ", length %u", olen));
793 /* lets do the full IE parsing only in verbose mode
794 * however some IEs (DLCI Status, Link Verify)
795 * are also interestting in non-verbose mode */
796 if (ndo->ndo_vflag) {
797 ND_PRINT((ndo, "\n\t%s IE (0x%02x), length %u: ",
798 tok2str(fr_q933_ie_codesets[codeset],
799 "unknown", ie_p->ie_type),
805 if (ie_p->ie_type == 0 || ie_p->ie_len == 0) {
809 if (fr_q933_print_ie_codeset[codeset] != NULL) {
810 ie_is_known = fr_q933_print_ie_codeset[codeset](ndo, ie_p, ptemp);
813 if (ndo->ndo_vflag >= 1 && !ie_is_known) {
814 print_unknown_data(ndo, ptemp+2, "\n\t", ie_p->ie_len);
817 /* do we want to see a hexdump of the IE ? */
818 if (ndo->ndo_vflag> 1 && ie_is_known) {
819 print_unknown_data(ndo, ptemp+2, "\n\t ", ie_p->ie_len);
822 length = length - ie_p->ie_len - 2;
823 ptemp = ptemp + ie_p->ie_len + 2;
825 if (!ndo->ndo_vflag) {
826 ND_PRINT((ndo, ", length %u", olen));
831 fr_q933_print_ie_codeset5(netdissect_options *ndo,
832 const struct ie_tlv_header_t *ie_p, const u_char *p)
836 switch (ie_p->ie_type) {
838 case FR_LMI_ANSI_REPORT_TYPE_IE: /* fall through */
839 case FR_LMI_CCITT_REPORT_TYPE_IE:
840 if (ndo->ndo_vflag) {
841 ND_PRINT((ndo, "%s (%u)",
842 tok2str(fr_lmi_report_type_ie_values,"unknown",p[2]),
847 case FR_LMI_ANSI_LINK_VERIFY_IE: /* fall through */
848 case FR_LMI_CCITT_LINK_VERIFY_IE:
849 case FR_LMI_ANSI_LINK_VERIFY_IE_91:
850 if (!ndo->ndo_vflag) {
851 ND_PRINT((ndo, ", "));
853 ND_PRINT((ndo, "TX Seq: %3d, RX Seq: %3d", p[2], p[3]));
856 case FR_LMI_ANSI_PVC_STATUS_IE: /* fall through */
857 case FR_LMI_CCITT_PVC_STATUS_IE:
858 if (!ndo->ndo_vflag) {
859 ND_PRINT((ndo, ", "));
861 /* now parse the DLCI information element. */
862 if ((ie_p->ie_len < 3) ||
864 ((ie_p->ie_len == 3) && !(p[3] & 0x80)) ||
865 ((ie_p->ie_len == 4) && ((p[3] & 0x80) || !(p[4] & 0x80))) ||
866 ((ie_p->ie_len == 5) && ((p[3] & 0x80) || (p[4] & 0x80) ||
868 (ie_p->ie_len > 5) ||
869 !(p[ie_p->ie_len + 1] & 0x80)) {
870 ND_PRINT((ndo, "Invalid DLCI IE"));
873 dlci = ((p[2] & 0x3F) << 4) | ((p[3] & 0x78) >> 3);
874 if (ie_p->ie_len == 4) {
875 dlci = (dlci << 6) | ((p[4] & 0x7E) >> 1);
877 else if (ie_p->ie_len == 5) {
878 dlci = (dlci << 13) | (p[4] & 0x7F) | ((p[5] & 0x7E) >> 1);
881 ND_PRINT((ndo, "DLCI %u: status %s%s", dlci,
882 p[ie_p->ie_len + 1] & 0x8 ? "New, " : "",
883 p[ie_p->ie_len + 1] & 0x2 ? "Active" : "Inactive"));
891 * c-style: whitesmith