1*05b00f60SXin Li /*
2*05b00f60SXin Li * Copyright (c) 2014 The TCPDUMP project
3*05b00f60SXin Li * All rights reserved.
4*05b00f60SXin Li *
5*05b00f60SXin Li * Redistribution and use in source and binary forms, with or without
6*05b00f60SXin Li * modification, are permitted provided that the following conditions
7*05b00f60SXin Li * are met:
8*05b00f60SXin Li * 1. Redistributions of source code must retain the above copyright
9*05b00f60SXin Li * notice, this list of conditions and the following disclaimer.
10*05b00f60SXin Li * 2. Redistributions in binary form must reproduce the above copyright
11*05b00f60SXin Li * notice, this list of conditions and the following disclaimer in the
12*05b00f60SXin Li * documentation and/or other materials provided with the distribution.
13*05b00f60SXin Li *
14*05b00f60SXin Li * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
15*05b00f60SXin Li * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
16*05b00f60SXin Li * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
17*05b00f60SXin Li * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
18*05b00f60SXin Li * COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
19*05b00f60SXin Li * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
20*05b00f60SXin Li * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
21*05b00f60SXin Li * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
22*05b00f60SXin Li * CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
23*05b00f60SXin Li * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN
24*05b00f60SXin Li * ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
25*05b00f60SXin Li * POSSIBILITY OF SUCH DAMAGE.
26*05b00f60SXin Li */
27*05b00f60SXin Li
28*05b00f60SXin Li /* \summary: Loopback Protocol printer */
29*05b00f60SXin Li
30*05b00f60SXin Li /*
31*05b00f60SXin Li * originally defined as the Ethernet Configuration Testing Protocol.
32*05b00f60SXin Li * specification: https://www.mit.edu/people/jhawk/ctp.pdf
33*05b00f60SXin Li */
34*05b00f60SXin Li
35*05b00f60SXin Li #ifdef HAVE_CONFIG_H
36*05b00f60SXin Li #include <config.h>
37*05b00f60SXin Li #endif
38*05b00f60SXin Li
39*05b00f60SXin Li #include "netdissect-stdinc.h"
40*05b00f60SXin Li
41*05b00f60SXin Li #define ND_LONGJMP_FROM_TCHECK
42*05b00f60SXin Li #include "netdissect.h"
43*05b00f60SXin Li #include "extract.h"
44*05b00f60SXin Li #include "addrtoname.h"
45*05b00f60SXin Li
46*05b00f60SXin Li
47*05b00f60SXin Li #define LOOPBACK_REPLY 1
48*05b00f60SXin Li #define LOOPBACK_FWDDATA 2
49*05b00f60SXin Li
50*05b00f60SXin Li static const struct tok fcode_str[] = {
51*05b00f60SXin Li { LOOPBACK_REPLY, "Reply" },
52*05b00f60SXin Li { LOOPBACK_FWDDATA, "Forward Data" },
53*05b00f60SXin Li { 0, NULL }
54*05b00f60SXin Li };
55*05b00f60SXin Li
56*05b00f60SXin Li static void
loopback_message_print(netdissect_options * ndo,const u_char * cp,u_int len)57*05b00f60SXin Li loopback_message_print(netdissect_options *ndo,
58*05b00f60SXin Li const u_char *cp, u_int len)
59*05b00f60SXin Li {
60*05b00f60SXin Li uint16_t function;
61*05b00f60SXin Li
62*05b00f60SXin Li if (len < 2)
63*05b00f60SXin Li goto invalid;
64*05b00f60SXin Li /* function */
65*05b00f60SXin Li function = GET_LE_U_2(cp);
66*05b00f60SXin Li cp += 2;
67*05b00f60SXin Li len -= 2;
68*05b00f60SXin Li ND_PRINT(", %s", tok2str(fcode_str, " invalid (%u)", function));
69*05b00f60SXin Li
70*05b00f60SXin Li switch (function) {
71*05b00f60SXin Li case LOOPBACK_REPLY:
72*05b00f60SXin Li if (len < 2)
73*05b00f60SXin Li goto invalid;
74*05b00f60SXin Li /* receipt number */
75*05b00f60SXin Li ND_PRINT(", receipt number %u", GET_LE_U_2(cp));
76*05b00f60SXin Li cp += 2;
77*05b00f60SXin Li len -= 2;
78*05b00f60SXin Li /* data */
79*05b00f60SXin Li ND_PRINT(", data (%u octets)", len);
80*05b00f60SXin Li ND_TCHECK_LEN(cp, len);
81*05b00f60SXin Li break;
82*05b00f60SXin Li case LOOPBACK_FWDDATA:
83*05b00f60SXin Li if (len < MAC_ADDR_LEN)
84*05b00f60SXin Li goto invalid;
85*05b00f60SXin Li /* forwarding address */
86*05b00f60SXin Li ND_PRINT(", forwarding address %s", GET_ETHERADDR_STRING(cp));
87*05b00f60SXin Li cp += MAC_ADDR_LEN;
88*05b00f60SXin Li len -= MAC_ADDR_LEN;
89*05b00f60SXin Li /* data */
90*05b00f60SXin Li ND_PRINT(", data (%u octets)", len);
91*05b00f60SXin Li ND_TCHECK_LEN(cp, len);
92*05b00f60SXin Li break;
93*05b00f60SXin Li default:
94*05b00f60SXin Li ND_TCHECK_LEN(cp, len);
95*05b00f60SXin Li break;
96*05b00f60SXin Li }
97*05b00f60SXin Li return;
98*05b00f60SXin Li
99*05b00f60SXin Li invalid:
100*05b00f60SXin Li nd_print_invalid(ndo);
101*05b00f60SXin Li ND_TCHECK_LEN(cp, len);
102*05b00f60SXin Li }
103*05b00f60SXin Li
104*05b00f60SXin Li void
loopback_print(netdissect_options * ndo,const u_char * cp,u_int len)105*05b00f60SXin Li loopback_print(netdissect_options *ndo,
106*05b00f60SXin Li const u_char *cp, u_int len)
107*05b00f60SXin Li {
108*05b00f60SXin Li uint16_t skipCount;
109*05b00f60SXin Li
110*05b00f60SXin Li ndo->ndo_protocol = "loopback";
111*05b00f60SXin Li ND_PRINT("Loopback");
112*05b00f60SXin Li if (len < 2)
113*05b00f60SXin Li goto invalid;
114*05b00f60SXin Li /* skipCount */
115*05b00f60SXin Li skipCount = GET_LE_U_2(cp);
116*05b00f60SXin Li cp += 2;
117*05b00f60SXin Li len -= 2;
118*05b00f60SXin Li ND_PRINT(", skipCount %u", skipCount);
119*05b00f60SXin Li if (skipCount % 8)
120*05b00f60SXin Li ND_PRINT(" (bogus)");
121*05b00f60SXin Li if (skipCount > len)
122*05b00f60SXin Li goto invalid;
123*05b00f60SXin Li /* the octets to skip */
124*05b00f60SXin Li ND_TCHECK_LEN(cp, skipCount);
125*05b00f60SXin Li cp += skipCount;
126*05b00f60SXin Li len -= skipCount;
127*05b00f60SXin Li /* the first message to decode */
128*05b00f60SXin Li loopback_message_print(ndo, cp, len);
129*05b00f60SXin Li return;
130*05b00f60SXin Li
131*05b00f60SXin Li invalid:
132*05b00f60SXin Li nd_print_invalid(ndo);
133*05b00f60SXin Li ND_TCHECK_LEN(cp, len);
134*05b00f60SXin Li }
135*05b00f60SXin Li
136