2 * Copyright (c) 1990, 1991, 1993, 1994, 1995, 1996, 1997
3 * The Regents of the University of California. All rights reserved.
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that: (1) source code distributions
7 * retain the above copyright notice and this paragraph in its entirety, (2)
8 * distributions including binary code include the above copyright notice and
9 * this paragraph in its entirety in the documentation or other materials
10 * provided with the distribution, and (3) all advertising materials mentioning
11 * features or use of this software display the following acknowledgement:
12 * ``This product includes software developed by the University of California,
13 * Lawrence Berkeley Laboratory and its contributors.'' Neither the name of
14 * the University nor the names of its contributors may be used to endorse
15 * or promote products derived from this software without specific prior
17 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED
18 * WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF
19 * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
21 * Extensively modified by Motonori Shindo (mshindo@mshindo.net) for more
22 * complete PPP support.
29 * o resolve XXX as much as possible
35 static const char rcsid[] _U_ =
36 "@(#) $Header: /tcpdump/master/tcpdump/print-ppp.c,v 1.108.2.4 2005/06/18 23:56:40 guy Exp $ (LBL)";
43 #include <tcpdump-stdinc.h>
46 #include <net/slcompress.h>
47 #include <net/if_ppp.h>
54 #include "interface.h"
56 #include "addrtoname.h"
59 #include "ethertype.h"
63 * The following constatns are defined by IANA. Please refer to
64 * http://www.isi.edu/in-notes/iana/assignments/ppp-numbers
65 * for the up-to-date information.
68 /* Protocol Codes defined in ppp.h */
70 struct tok ppptype2str[] = {
74 { PPP_DECNET, "DECNET" },
75 { PPP_APPLE, "APPLE" },
77 { PPP_VJC, "VJC IP" },
78 { PPP_VJNC, "VJNC IP" },
79 { PPP_BRPDU, "BRPDU" },
81 { PPP_VINES, "VINES" },
82 { PPP_MPLS_UCAST, "MPLS" },
83 { PPP_MPLS_MCAST, "MPLS" },
84 { PPP_COMP, "Compressed"},
88 { PPP_HELLO, "HELLO" },
89 { PPP_LUXCOM, "LUXCOM" },
92 { PPP_OSICP, "OSICP" },
94 { PPP_DECNETCP, "DECNETCP" },
95 { PPP_APPLECP, "APPLECP" },
96 { PPP_IPXCP, "IPXCP" },
97 { PPP_STIICP, "STIICP" },
98 { PPP_VINESCP, "VINESCP" },
99 { PPP_IPV6CP, "IP6CP" },
100 { PPP_MPLSCP, "MPLSCP" },
105 { PPP_CHAP, "CHAP" },
107 { PPP_SPAP, "SPAP" },
108 { PPP_SPAP_OLD, "Old-SPAP" },
109 { PPP_BACP, "BACP" },
111 { PPP_MPCP, "MLPPP-CP" },
115 /* Control Protocols (LCP/IPCP/CCP etc.) Codes defined in RFC 1661 */
117 #define CPCODES_VEXT 0 /* Vendor-Specific (RFC2153) */
118 #define CPCODES_CONF_REQ 1 /* Configure-Request */
119 #define CPCODES_CONF_ACK 2 /* Configure-Ack */
120 #define CPCODES_CONF_NAK 3 /* Configure-Nak */
121 #define CPCODES_CONF_REJ 4 /* Configure-Reject */
122 #define CPCODES_TERM_REQ 5 /* Terminate-Request */
123 #define CPCODES_TERM_ACK 6 /* Terminate-Ack */
124 #define CPCODES_CODE_REJ 7 /* Code-Reject */
125 #define CPCODES_PROT_REJ 8 /* Protocol-Reject (LCP only) */
126 #define CPCODES_ECHO_REQ 9 /* Echo-Request (LCP only) */
127 #define CPCODES_ECHO_RPL 10 /* Echo-Reply (LCP only) */
128 #define CPCODES_DISC_REQ 11 /* Discard-Request (LCP only) */
129 #define CPCODES_ID 12 /* Identification (LCP only) RFC1570 */
130 #define CPCODES_TIME_REM 13 /* Time-Remaining (LCP only) RFC1570 */
131 #define CPCODES_RESET_REQ 14 /* Reset-Request (CCP only) RFC1962 */
132 #define CPCODES_RESET_REP 15 /* Reset-Reply (CCP only) */
134 struct tok cpcodes[] = {
135 {CPCODES_VEXT, "Vendor-Extension"}, /* RFC2153 */
136 {CPCODES_CONF_REQ, "Conf-Request"},
137 {CPCODES_CONF_ACK, "Conf-Ack"},
138 {CPCODES_CONF_NAK, "Conf-Nack"},
139 {CPCODES_CONF_REJ, "Conf-Reject"},
140 {CPCODES_TERM_REQ, "Term-Request"},
141 {CPCODES_TERM_ACK, "Term-Ack"},
142 {CPCODES_CODE_REJ, "Code-Reject"},
143 {CPCODES_PROT_REJ, "Prot-Reject"},
144 {CPCODES_ECHO_REQ, "Echo-Request"},
145 {CPCODES_ECHO_RPL, "Echo-Reply"},
146 {CPCODES_DISC_REQ, "Disc-Req"},
147 {CPCODES_ID, "Ident"}, /* RFC1570 */
148 {CPCODES_TIME_REM, "Time-Rem"}, /* RFC1570 */
149 {CPCODES_RESET_REQ, "Reset-Req"}, /* RFC1962 */
150 {CPCODES_RESET_REP, "Reset-Ack"}, /* RFC1962 */
154 /* LCP Config Options */
156 #define LCPOPT_VEXT 0
158 #define LCPOPT_ACCM 2
162 #define LCPOPT_DEP6 6
164 #define LCPOPT_ACFC 8
165 #define LCPOPT_FCSALT 9
166 #define LCPOPT_SDP 10
167 #define LCPOPT_NUMMODE 11
168 #define LCPOPT_DEP12 12
169 #define LCPOPT_CBACK 13
170 #define LCPOPT_DEP14 14
171 #define LCPOPT_DEP15 15
172 #define LCPOPT_DEP16 16
173 #define LCPOPT_MLMRRU 17
174 #define LCPOPT_MLSSNHF 18
175 #define LCPOPT_MLED 19
176 #define LCPOPT_PROP 20
177 #define LCPOPT_DCEID 21
178 #define LCPOPT_MPP 22
180 #define LCPOPT_LCPAOPT 24
181 #define LCPOPT_COBS 25
183 #define LCPOPT_MLHF 27
184 #define LCPOPT_I18N 28
185 #define LCPOPT_SDLOS 29
186 #define LCPOPT_PPPMUX 30
188 #define LCPOPT_MIN LCPOPT_VEXT
189 #define LCPOPT_MAX LCPOPT_PPPMUX
191 static const char *lcpconfopts[] = {
192 "Vend-Ext", /* (0) */
195 "Auth-Prot", /* (3) */
196 "Qual-Prot", /* (4) */
197 "Magic-Num", /* (5) */
198 "deprecated(6)", /* used to be a Quality Protocol */
203 "Num-Mode", /* (11) */
204 "deprecated(12)", /* used to be a Multi-Link-Procedure*/
205 "Call-Back", /* (13) */
206 "deprecated(14)", /* used to be a Connect-Time */
207 "deprecated(15)", /* used to be a Compund-Frames */
208 "deprecated(16)", /* used to be a Nominal-Data-Encap */
210 "12-Bit seq #", /* (18) */
211 "End-Disc", /* (19) */
212 "Proprietary", /* (20) */
215 "Link-Disc", /* (23) */
216 "LCP-Auth-Opt", /* (24) */
218 "Prefix-elision", /* (26) */
219 "Multilink-header-Form",/* (27) */
221 "SDL-over-SONET/SDH", /* (29) */
222 "PPP-Muxing", /* (30) */
225 /* ECP - to be supported */
227 /* CCP Config Options */
229 #define CCPOPT_OUI 0 /* RFC1962 */
230 #define CCPOPT_PRED1 1 /* RFC1962 */
231 #define CCPOPT_PRED2 2 /* RFC1962 */
232 #define CCPOPT_PJUMP 3 /* RFC1962 */
233 /* 4-15 unassigned */
234 #define CCPOPT_HPPPC 16 /* RFC1962 */
235 #define CCPOPT_STACLZS 17 /* RFC1974 */
236 #define CCPOPT_MPPC 18 /* RFC2118 */
237 #define CCPOPT_GFZA 19 /* RFC1962 */
238 #define CCPOPT_V42BIS 20 /* RFC1962 */
239 #define CCPOPT_BSDCOMP 21 /* RFC1977 */
241 #define CCPOPT_LZSDCP 23 /* RFC1967 */
242 #define CCPOPT_MVRCA 24 /* RFC1975 */
243 #define CCPOPT_DEC 25 /* RFC1976 */
244 #define CCPOPT_DEFLATE 26 /* RFC1979 */
245 /* 27-254 unassigned */
246 #define CCPOPT_RESV 255 /* RFC1962 */
248 const struct tok ccpconfopts_values[] = {
249 { CCPOPT_OUI, "OUI" },
250 { CCPOPT_PRED1, "Pred-1" },
251 { CCPOPT_PRED2, "Pred-2" },
252 { CCPOPT_PJUMP, "Puddle" },
253 { CCPOPT_HPPPC, "HP-PPC" },
254 { CCPOPT_STACLZS, "Stac-LZS" },
255 { CCPOPT_MPPC, "MPPC" },
256 { CCPOPT_GFZA, "Gand-FZA" },
257 { CCPOPT_V42BIS, "V.42bis" },
258 { CCPOPT_BSDCOMP, "BSD-Comp" },
259 { CCPOPT_LZSDCP, "LZS-DCP" },
260 { CCPOPT_MVRCA, "MVRCA" },
261 { CCPOPT_DEC, "DEC" },
262 { CCPOPT_DEFLATE, "Deflate" },
263 { CCPOPT_RESV, "Reserved"},
267 /* BACP Config Options */
269 #define BACPOPT_FPEER 1 /* RFC2125 */
271 const struct tok bacconfopts_values[] = {
272 { BACPOPT_FPEER, "Favored-Peer" },
277 /* SDCP - to be supported */
279 /* IPCP Config Options */
280 #define IPCPOPT_2ADDR 1 /* RFC1172, RFC1332 (deprecated) */
281 #define IPCPOPT_IPCOMP 2 /* RFC1332 */
282 #define IPCPOPT_ADDR 3 /* RFC1332 */
283 #define IPCPOPT_MOBILE4 4 /* RFC2290 */
284 #define IPCPOPT_PRIDNS 129 /* RFC1877 */
285 #define IPCPOPT_PRINBNS 130 /* RFC1877 */
286 #define IPCPOPT_SECDNS 131 /* RFC1877 */
287 #define IPCPOPT_SECNBNS 132 /* RFC1877 */
289 struct tok ipcpopt_values[] = {
290 { IPCPOPT_2ADDR, "IP-Addrs" },
291 { IPCPOPT_IPCOMP, "IP-Comp" },
292 { IPCPOPT_ADDR, "IP-Addr" },
293 { IPCPOPT_MOBILE4, "Home-Addr" },
294 { IPCPOPT_PRIDNS, "Pri-DNS" },
295 { IPCPOPT_PRINBNS, "Pri-NBNS" },
296 { IPCPOPT_SECDNS, "Sec-DNS" },
297 { IPCPOPT_SECNBNS, "Sec-NBNS" },
302 /* IP6CP Config Options */
305 struct tok ip6cpopt_values[] = {
306 { IP6CP_IFID, "Interface-ID" },
310 /* ATCP - to be supported */
311 /* OSINLCP - to be supported */
312 /* BVCP - to be supported */
313 /* BCP - to be supported */
314 /* IPXCP - to be supported */
315 /* MPLSCP - to be supported */
317 /* Auth Algorithms */
319 /* 0-4 Reserved (RFC1994) */
320 #define AUTHALG_CHAPMD5 5 /* RFC1994 */
321 #define AUTHALG_MSCHAP1 128 /* RFC2433 */
322 #define AUTHALG_MSCHAP2 129 /* RFC2795 */
324 struct tok authalg_values[] = {
325 { AUTHALG_CHAPMD5, "MD5" },
326 { AUTHALG_MSCHAP1, "MS-CHAPv1" },
327 { AUTHALG_MSCHAP2, "MS-CHAPv2" },
331 /* FCS Alternatives - to be supported */
333 /* Multilink Endpoint Discriminator (RFC1717) */
334 #define MEDCLASS_NULL 0 /* Null Class */
335 #define MEDCLASS_LOCAL 1 /* Locally Assigned */
336 #define MEDCLASS_IPV4 2 /* Internet Protocol (IPv4) */
337 #define MEDCLASS_MAC 3 /* IEEE 802.1 global MAC address */
338 #define MEDCLASS_MNB 4 /* PPP Magic Number Block */
339 #define MEDCLASS_PSNDN 5 /* Public Switched Network Director Number */
341 /* PPP LCP Callback */
342 #define CALLBACK_AUTH 0 /* Location determined by user auth */
343 #define CALLBACK_DSTR 1 /* Dialing string */
344 #define CALLBACK_LID 2 /* Location identifier */
345 #define CALLBACK_E164 3 /* E.164 number */
346 #define CALLBACK_X500 4 /* X.500 distinguished name */
347 #define CALLBACK_CBCP 6 /* Location is determined during CBCP nego */
349 struct tok ppp_callback_values[] = {
350 { CALLBACK_AUTH, "UserAuth" },
351 { CALLBACK_DSTR, "DialString" },
352 { CALLBACK_LID, "LocalID" },
353 { CALLBACK_E164, "E.164" },
354 { CALLBACK_X500, "X.500" },
355 { CALLBACK_CBCP, "CBCP" },
366 struct tok chapcode_values[] = {
367 { CHAP_CHAL, "Challenge" },
368 { CHAP_RESP, "Response" },
369 { CHAP_SUCC, "Success" },
370 { CHAP_FAIL, "Fail" },
380 struct tok papcode_values[] = {
381 { PAP_AREQ, "Auth-Req" },
382 { PAP_AACK, "Auth-ACK" },
383 { PAP_ANAK, "Auth-NACK" },
388 #define BAP_CALLREQ 1
389 #define BAP_CALLRES 2
397 static void handle_ctrl_proto (u_int proto,const u_char *p, int length);
398 static void handle_chap (const u_char *p, int length);
399 static void handle_pap (const u_char *p, int length);
400 static void handle_bap (const u_char *p, int length);
401 static void handle_mlppp(const u_char *p, int length);
402 static int print_lcp_config_options (const u_char *p, int);
403 static int print_ipcp_config_options (const u_char *p, int);
404 static int print_ip6cp_config_options (const u_char *p, int);
405 static int print_ccp_config_options (const u_char *p, int);
406 static int print_bacp_config_options (const u_char *p, int);
407 static void handle_ppp (u_int proto, const u_char *p, int length);
408 static void ppp_hdlc(const u_char *p, int length);
410 /* generic Control Protocol (e.g. LCP, IPCP, CCP, etc.) handler */
412 handle_ctrl_proto(u_int proto, const u_char *pptr, int length)
416 int (*pfunc)(const u_char *, int);
422 typestr = tok2str(ppptype2str, "unknown ctrl-proto (0x%04x)", proto);
423 printf("%s, ",typestr);
425 if (length < 4) /* FIXME weak boundary checking */
431 printf("%s (0x%02x), id %u, length %u",
432 tok2str(cpcodes, "Unknown Opcode",code),
441 return; /* there may be a NULL confreq etc. */
444 len = EXTRACT_16BITS(tptr);
447 printf("\n\tencoded length %u (=Option(s) length %u)",len,len-4);
450 print_unknown_data(pptr-2,"\n\t",6);
458 printf("\n\t Magic-Num 0x%08x", EXTRACT_32BITS(tptr));
461 printf(" Vendor: %s (%u)",
462 tok2str(oui_values,"Unknown",EXTRACT_24BITS(tptr)),
463 EXTRACT_24BITS(tptr));
464 /* XXX: need to decode Kind and Value(s)? */
466 case CPCODES_CONF_REQ:
467 case CPCODES_CONF_ACK:
468 case CPCODES_CONF_NAK:
469 case CPCODES_CONF_REJ:
470 x = len - 4; /* Code(1), Identifier(1) and Length(2) */
474 pfunc = print_lcp_config_options;
477 pfunc = print_ipcp_config_options;
480 pfunc = print_ip6cp_config_options;
483 pfunc = print_ccp_config_options;
486 pfunc = print_bacp_config_options;
490 * No print routine for the options for
497 if (pfunc == NULL) /* catch the above null pointer if unknown CP */
500 if ((j = (*pfunc)(tptr, len)) == 0)
507 case CPCODES_TERM_REQ:
508 case CPCODES_TERM_ACK:
509 /* XXX: need to decode Data? */
511 case CPCODES_CODE_REJ:
512 /* XXX: need to decode Rejected-Packet? */
514 case CPCODES_PROT_REJ:
518 printf("\n\t Rejected %s Protocol (0x%04x)",
519 tok2str(ppptype2str,"unknown", EXTRACT_16BITS(tptr)),
520 EXTRACT_16BITS(tptr));
521 /* XXX: need to decode Rejected-Information? - hexdump for now */
523 printf("\n\t Rejected Packet");
524 print_unknown_data(tptr+2,"\n\t ",len-2);
527 case CPCODES_ECHO_REQ:
528 case CPCODES_ECHO_RPL:
529 case CPCODES_DISC_REQ:
533 printf("\n\t Magic-Num 0x%08x", EXTRACT_32BITS(tptr));
534 /* XXX: need to decode Data? - hexdump for now */
537 print_unknown_data(tptr+4,"\n\t ",len-4);
544 printf("\n\t Magic-Num 0x%08x", EXTRACT_32BITS(tptr));
545 /* RFC 1661 says this is intended to be human readable */
547 printf("\n\t Message\n\t ");
548 fn_printn(tptr+4,len-4,snapend);
551 case CPCODES_TIME_REM:
555 printf("\n\t Magic-Num 0x%08x", EXTRACT_32BITS(tptr));
556 TCHECK2(*(tptr + 4), 4);
557 printf(", Seconds-Remaining %us", EXTRACT_32BITS(tptr + 4));
558 /* XXX: need to decode Message? */
561 /* XXX this is dirty but we do not get the
562 * original pointer passed to the begin
565 print_unknown_data(pptr-2,"\n\t ",length+2);
571 printf("[|%s]", typestr);
574 /* LCP config options */
576 print_lcp_config_options(const u_char *p, int length)
588 if ((opt >= LCPOPT_MIN) && (opt <= LCPOPT_MAX))
589 printf("\n\t %s Option (0x%02x), length %u (bogus, should be >= 2)", lcpconfopts[opt],opt,len);
591 printf("\n\tunknown LCP option 0x%02x", opt);
594 if ((opt >= LCPOPT_MIN) && (opt <= LCPOPT_MAX))
595 printf("\n\t %s Option (0x%02x), length %u: ", lcpconfopts[opt],opt,len);
597 printf("\n\tunknown LCP option 0x%02x", opt);
604 TCHECK2(*(p + 2), 3);
605 printf("Vendor: %s (%u)",
606 tok2str(oui_values,"Unknown",EXTRACT_24BITS(p+2)),
607 EXTRACT_24BITS(p+2));
610 printf(", kind: 0x%02x", p[5]);
611 printf(", Value: 0x")
612 for (i = 0; i < len - 6; i++) {
614 printf("%02x", p[6 + i]);
621 TCHECK2(*(p + 2), 2);
622 printf("%u", EXTRACT_16BITS(p + 2));
627 TCHECK2(*(p + 2), 4);
628 printf("0x%08x", EXTRACT_32BITS(p + 2));
633 TCHECK2(*(p + 2), 2);
634 printf("%s", tok2str(ppptype2str,"Unknown Auth Proto (0x04x)",EXTRACT_16BITS(p+2)));
636 switch (EXTRACT_16BITS(p+2)) {
639 printf(", %s",tok2str(authalg_values,"Unknown Auth Alg %u",p[4]));
641 case PPP_PAP: /* fall through */
647 print_unknown_data(p,"\n\t",len);
653 TCHECK2(*(p + 2), 2);
654 if (EXTRACT_16BITS(p+2) == PPP_LQM)
662 TCHECK2(*(p + 2), 4);
663 printf("0x%08x", EXTRACT_32BITS(p + 2));
672 TCHECK2(*(p + 2), 2);
673 printf("0x%04x", EXTRACT_16BITS(p + 2));
680 printf("Callback Operation %s (%u)",
681 tok2str(ppp_callback_values,"Unknown",p[2]),
686 TCHECK2(*(p + 2), 2);
687 printf("%u", EXTRACT_16BITS(p + 2));
694 switch (p[2]) { /* class */
699 printf("Local"); /* XXX */
704 TCHECK2(*(p + 3), 4);
705 printf("IPv4 %s", ipaddr_string(p + 3));
711 printf("MAC %02x:%02x:%02x:%02x:%02x:%02x",
712 p[3], p[4], p[5], p[6], p[7], p[8]);
715 printf("Magic-Num-Block"); /* XXX */
718 printf("PSNDN"); /* XXX */
723 /* XXX: to be supported */
748 print_unknown_data(&p[2],"\n\t ",len-2);
753 print_unknown_data(&p[2],"\n\t ",len-2); /* exclude TLV header */
763 struct tok ppp_ml_flag_values[] = {
770 handle_mlppp(const u_char *p, int length) {
775 printf("seq 0x%03x, Flags [%s], length %u",
776 (EXTRACT_16BITS(p))&0x0fff, /* only support 12-Bit sequence space for now */
777 bittok2str(ppp_ml_flag_values, "none", *p & 0xc0),
785 handle_chap(const u_char *p, int length)
788 int val_size, name_size, msg_size;
796 } else if (length < 4) {
798 printf("[|chap 0x%02x]", *p);
804 printf("CHAP, %s (0x%02x)",
805 tok2str(chapcode_values,"unknown",code),
810 printf(", id %u", *p); /* ID */
814 len = EXTRACT_16BITS(p);
818 * Note that this is a generic CHAP decoding routine. Since we
819 * don't know which flavor of CHAP (i.e. CHAP-MD5, MS-CHAPv1,
820 * MS-CHAPv2) is used at this point, we can't decode packet
821 * specifically to each algorithms. Instead, we simply decode
822 * the GCD (Gratest Common Denominator) for all algorithms.
827 if (length - (p - p0) < 1)
830 val_size = *p; /* value size */
832 if (length - (p - p0) < val_size)
835 for (i = 0; i < val_size; i++) {
837 printf("%02x", *p++);
839 name_size = len - (p - p0);
841 for (i = 0; i < name_size; i++) {
848 msg_size = len - (p - p0);
850 for (i = 0; i< msg_size; i++) {
862 /* PAP (see RFC 1334) */
864 handle_pap(const u_char *p, int length)
867 int peerid_len, passwd_len, msg_len;
875 } else if (length < 4) {
877 printf("[|pap 0x%02x]", *p);
883 printf("PAP, %s (0x%02x)",
884 tok2str(papcode_values,"unknown",code),
889 printf(", id %u", *p); /* ID */
893 len = EXTRACT_16BITS(p);
896 if ((int)len > length) {
897 printf(", length %u > packet size", len);
901 if (length < (p - p0)) {
902 printf(", length %u < PAP header length", length);
908 if (length - (p - p0) < 1)
911 peerid_len = *p; /* Peer-ID Length */
913 if (length - (p - p0) < peerid_len)
916 for (i = 0; i < peerid_len; i++) {
921 if (length - (p - p0) < 1)
924 passwd_len = *p; /* Password Length */
926 if (length - (p - p0) < passwd_len)
929 for (i = 0; i < passwd_len; i++) {
936 if (length - (p - p0) < 1)
939 msg_len = *p; /* Msg-Length */
941 if (length - (p - p0) < msg_len)
944 for (i = 0; i< msg_len; i++) {
958 handle_bap(const u_char *p _U_, int length _U_)
960 /* XXX: to be supported!! */
964 /* IPCP config options */
966 print_ipcp_config_options(const u_char *p, int length)
978 printf("\n\t %s Option (0x%02x), length %u (bogus, should be >= 2)",
979 tok2str(ipcpopt_values,"unknown",opt),
985 printf("\n\t %s Option (0x%02x), length %u: ",
986 tok2str(ipcpopt_values,"unknown",opt),
991 case IPCPOPT_2ADDR: /* deprecated */
994 TCHECK2(*(p + 6), 4);
995 printf("src %s, dst %s",
996 ipaddr_string(p + 2),
997 ipaddr_string(p + 6));
1002 TCHECK2(*(p + 2), 2);
1003 if (EXTRACT_16BITS(p + 2) == PPP_VJC) {
1005 /* XXX: VJ-Comp parameters should be decoded */
1007 printf("unknown-comp-proto %04x", EXTRACT_16BITS(p + 2));
1010 case IPCPOPT_ADDR: /* those options share the same format - fall through */
1011 case IPCPOPT_MOBILE4:
1012 case IPCPOPT_PRIDNS:
1013 case IPCPOPT_PRINBNS:
1014 case IPCPOPT_SECDNS:
1015 case IPCPOPT_SECNBNS:
1018 TCHECK2(*(p + 2), 4);
1019 printf("%s", ipaddr_string(p + 2));
1023 print_unknown_data(&p[2],"\n\t ",len-2);
1027 print_unknown_data(&p[2],"\n\t ",len-2); /* exclude TLV header */
1031 printf(", invalid-length-%d", opt);
1039 /* IP6CP config options */
1041 print_ip6cp_config_options(const u_char *p, int length)
1053 printf("\n\t %s Option (0x%02x), length %u (bogus, should be >= 2)",
1054 tok2str(ip6cpopt_values,"unknown",opt),
1060 printf("\n\t %s Option (0x%02x), length %u: ",
1061 tok2str(ip6cpopt_values,"unknown",opt),
1069 TCHECK2(*(p + 2), 8);
1070 printf("%04x:%04x:%04x:%04x",
1071 EXTRACT_16BITS(p + 2),
1072 EXTRACT_16BITS(p + 4),
1073 EXTRACT_16BITS(p + 6),
1074 EXTRACT_16BITS(p + 8));
1078 print_unknown_data(&p[2],"\n\t ",len-2);
1082 print_unknown_data(&p[2],"\n\t ",len-2); /* exclude TLV header */
1087 printf(", invalid-length-%d", opt);
1096 /* CCP config options */
1098 print_ccp_config_options(const u_char *p, int length)
1110 printf("\n\t %s Option (0x%02x), length %u (bogus, should be >= 2)",
1111 tok2str(ccpconfopts_values, "Unknown", opt),
1117 printf("\n\t %s Option (0x%02x), length %u:",
1118 tok2str(ccpconfopts_values, "Unknown", opt),
1123 /* fall through --> default: nothing supported yet */
1129 case CCPOPT_STACLZS:
1133 case CCPOPT_BSDCOMP:
1137 case CCPOPT_DEFLATE:
1141 print_unknown_data(&p[2],"\n\t ",len-2);
1145 print_unknown_data(&p[2],"\n\t ",len-2); /* exclude TLV header */
1154 /* BACP config options */
1156 print_bacp_config_options(const u_char *p, int length)
1168 printf("\n\t %s Option (0x%02x), length %u (bogus, should be >= 2)",
1169 tok2str(bacconfopts_values, "Unknown", opt),
1175 printf("\n\t %s Option (0x%02x), length %u:",
1176 tok2str(bacconfopts_values, "Unknown", opt),
1182 TCHECK2(*(p + 2), 4);
1183 printf(", Magic-Num 0x%08x", EXTRACT_32BITS(p + 2));
1187 print_unknown_data(&p[2],"\n\t ",len-2);
1191 print_unknown_data(&p[2],"\n\t ",len-2); /* exclude TLV header */
1202 ppp_hdlc(const u_char *p, int length)
1204 u_char *b, *s, *t, c;
1208 b = (u_int8_t *)malloc(length);
1213 * Unescape all the data into a temporary, private, buffer.
1214 * Do this so that we dont overwrite the original packet
1217 for (s = (u_char *)p, t = b, i = length; i > 0; i--) {
1232 /* now lets guess about the payload codepoint format */
1233 proto = *b; /* start with a one-octet codepoint guess */
1237 ip_print(gndo, b+1, t - b - 1);
1241 ip6_print(b+1, t - b - 1);
1244 default: /* no luck - try next guess */
1248 proto = EXTRACT_16BITS(b); /* next guess - load two octets */
1251 case (PPP_ADDRESS << 8 | PPP_CONTROL): /* looks like a PPP frame */
1252 proto = EXTRACT_16BITS(b+2); /* load the PPP proto-id */
1253 handle_ppp(proto, b+4, t - b - 4);
1255 default: /* last guess - proto must be a PPP proto-id */
1256 handle_ppp(proto, b+2, t - b - 2);
1269 handle_ppp(u_int proto, const u_char *p, int length)
1271 if ((proto & 0xff00) == 0x7e00) {/* is this an escape code ? */
1272 ppp_hdlc(p-1, length);
1277 case PPP_LCP: /* fall through */
1284 handle_ctrl_proto(proto, p, length);
1287 handle_mlppp(p, length);
1290 handle_chap(p, length);
1293 handle_pap(p, length);
1295 case PPP_BAP: /* XXX: not yet completed */
1296 handle_bap(p, length);
1298 case ETHERTYPE_IP: /*XXX*/
1301 ip_print(gndo, p, length);
1304 case ETHERTYPE_IPV6: /*XXX*/
1306 ip6_print(p, length);
1309 case ETHERTYPE_IPX: /*XXX*/
1311 ipx_print(p, length);
1314 isoclns_print(p, length, length);
1316 case PPP_MPLS_UCAST:
1317 case PPP_MPLS_MCAST:
1318 mpls_print(p, length);
1321 printf("compressed PPP data");
1324 printf("%s ", tok2str(ppptype2str, "unknown PPP protocol (0x%04x)", proto));
1325 print_unknown_data(p,"\n\t",length);
1330 /* Standard PPP printer */
1332 ppp_print(register const u_char *p, u_int length)
1334 u_int proto,ppp_header;
1335 u_int olen = length; /* _o_riginal length */
1339 * Here, we assume that p points to the Address and Control
1340 * field (if they present).
1345 ppp_header = EXTRACT_16BITS(p);
1347 switch(ppp_header) {
1348 case (PPP_WITHDIRECTION_IN << 8 | PPP_CONTROL):
1349 if (eflag) printf("In ");
1354 case (PPP_WITHDIRECTION_OUT << 8 | PPP_CONTROL):
1355 if (eflag) printf("Out ");
1360 case (PPP_ADDRESS << 8 | PPP_CONTROL):
1361 p += 2; /* ACFC not used */
1374 proto = *p; /* PFC is used */
1380 proto = EXTRACT_16BITS(p);
1387 printf("%s (0x%04x), length %u: ",
1388 tok2str(ppptype2str, "unknown", proto),
1392 handle_ppp(proto, p, length);
1400 /* PPP I/F printer */
1402 ppp_if_print(const struct pcap_pkthdr *h, register const u_char *p)
1404 register u_int length = h->len;
1405 register u_int caplen = h->caplen;
1407 if (caplen < PPP_HDRLEN) {
1414 * XXX: seems to assume that there are 2 octets prepended to an
1415 * actual PPP frame. The 1st octet looks like Input/Output flag
1416 * while 2nd octet is unknown, at least to me
1417 * (mshindo@mshindo.net).
1419 * That was what the original tcpdump code did.
1421 * FreeBSD's "if_ppp.c" *does* set the first octet to 1 for outbound
1422 * packets and 0 for inbound packets - but only if the
1423 * protocol field has the 0x8000 bit set (i.e., it's a network
1424 * control protocol); it does so before running the packet through
1425 * "bpf_filter" to see if it should be discarded, and to see
1426 * if we should update the time we sent the most recent packet...
1428 * ...but it puts the original address field back after doing
1431 * NetBSD's "if_ppp.c" doesn't set the first octet in that fashion.
1433 * I don't know if any PPP implementation handed up to a BPF
1434 * device packets with the first octet being 1 for outbound and
1435 * 0 for inbound packets, so I (guy@alum.mit.edu) don't know
1436 * whether that ever needs to be checked or not.
1438 * Note that NetBSD has a DLT_PPP_SERIAL, which it uses for PPP,
1439 * and its tcpdump appears to assume that the frame always
1440 * begins with an address field and a control field, and that
1441 * the address field might be 0x0f or 0x8f, for Cisco
1442 * point-to-point with HDLC framing as per section 4.3.1 of RFC
1443 * 1547, as well as 0xff, for PPP in HDLC-like framing as per
1446 * (Is the Cisco framing in question what DLT_C_HDLC, in
1450 printf("%c %4d %02x ", p[0] ? 'O' : 'I', length, p[1]);
1453 ppp_print(p, length);
1459 * PPP I/F printer to use if we know that RFC 1662-style PPP in HDLC-like
1460 * framing, or Cisco PPP with HDLC framing as per section 4.3.1 of RFC 1547,
1461 * is being used (i.e., we don't check for PPP_ADDRESS and PPP_CONTROL,
1462 * discard them *if* those are the first two octets, and parse the remaining
1463 * packet as a PPP packet, as "ppp_print()" does).
1465 * This handles, for example, DLT_PPP_SERIAL in NetBSD.
1468 ppp_hdlc_if_print(const struct pcap_pkthdr *h, register const u_char *p)
1470 register u_int length = h->len;
1471 register u_int caplen = h->caplen;
1489 printf("%02x %02x %d ", p[0], p[1], length);
1494 proto = EXTRACT_16BITS(p);
1498 printf("%s: ", tok2str(ppptype2str, "unknown PPP protocol (0x%04x)", proto));
1500 handle_ppp(proto, p, length);
1505 return (chdlc_if_print(h, p));
1509 printf("%02x %02x %d ", p[0], p[1], length);
1515 * XXX - NetBSD's "ppp_netbsd_serial_if_print()" treats
1516 * the next two octets as an Ethernet type; does that
1519 printf("unknown addr %02x; ctrl %02x", p[0], p[1]);
1526 #define PPP_BSDI_HDRLEN 24
1528 /* BSD/OS specific PPP printer */
1530 ppp_bsdos_if_print(const struct pcap_pkthdr *h _U_, register const u_char *p _U_)
1532 register int hdrlength;
1534 register u_int length = h->len;
1535 register u_int caplen = h->caplen;
1540 if (caplen < PPP_BSDI_HDRLEN) {
1548 if (p[0] == PPP_ADDRESS && p[1] == PPP_CONTROL) {
1550 printf("%02x %02x ", p[0], p[1]);
1556 printf("%d ", length);
1557 /* Retrieve the protocol type */
1559 /* Compressed protocol field */
1562 printf("%02x ", ptype);
1566 /* Un-compressed protocol field */
1567 ptype = ntohs(*(u_int16_t *)p);
1569 printf("%04x ", ptype);
1576 printf("%c ", p[SLC_DIR] ? 'O' : 'I');
1578 /* link level header */
1579 struct ppp_header *ph;
1581 q = p + SLC_BPFHDRLEN;
1582 ph = (struct ppp_header *)q;
1583 if (ph->phdr_addr == PPP_ADDRESS
1584 && ph->phdr_ctl == PPP_CONTROL) {
1586 printf("%02x %02x ", q[0], q[1]);
1587 ptype = ntohs(ph->phdr_type);
1588 if (eflag && (ptype == PPP_VJC || ptype == PPP_VJNC)) {
1589 printf("%s ", tok2str(ppptype2str,
1590 "proto-#%d", ptype));
1595 for (i = 0; i < p[SLC_LLHL]; i++)
1596 printf("%02x", q[i]);
1602 printf("%d ", length);
1604 q = p + SLC_BPFHDRLEN + p[SLC_LLHL];
1608 ptype = vjc_print(q, ptype);
1609 hdrlength = PPP_BSDI_HDRLEN;
1613 ip_print(p, length);
1617 ip6_print(p, length);
1620 case PPP_MPLS_UCAST:
1621 case PPP_MPLS_MCAST:
1622 mpls_print(p, length);
1627 ptype = vjc_print(q, ptype);
1628 hdrlength = PPP_BSDI_HDRLEN;
1632 ip_print(p, length);
1636 ip6_print(p, length);
1639 case PPP_MPLS_UCAST:
1640 case PPP_MPLS_MCAST:
1641 mpls_print(p, length);
1648 for (i = 0; i < p[SLC_LLHL]; i++)
1649 printf("%02x", q[i]);
1656 hdrlength = PPP_BSDI_HDRLEN;
1659 length -= hdrlength;
1664 ip_print(p, length);
1668 ip6_print(p, length);
1671 case PPP_MPLS_UCAST:
1672 case PPP_MPLS_MCAST:
1673 mpls_print(p, length);
1676 printf("%s ", tok2str(ppptype2str, "unknown PPP protocol (0x%04x)", ptype));
1682 #endif /* __bsdi__ */
1689 * c-style: whitesmith