The Sniffer-reading code now checks to make sure that it is trying
[obnox/wireshark/wip.git] / packet-ipx.c
1 /* packet-ipx.c
2  * Routines for NetWare's IPX
3  * Gilbert Ramirez <gram@verdict.uthscsa.edu>
4  *
5  * $Id: packet-ipx.c,v 1.13 1998/11/17 04:28:55 gerald Exp $
6  *
7  * Ethereal - Network traffic analyzer
8  * By Gerald Combs <gerald@unicom.net>
9  * Copyright 1998 Gerald Combs
10  *
11  * 
12  * This program is free software; you can redistribute it and/or
13  * modify it under the terms of the GNU General Public License
14  * as published by the Free Software Foundation; either version 2
15  * of the License, or (at your option) any later version.
16  * 
17  * This program is distributed in the hope that it will be useful,
18  * but WITHOUT ANY WARRANTY; without even the implied warranty of
19  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
20  * GNU General Public License for more details.
21  * 
22  * You should have received a copy of the GNU General Public License
23  * along with this program; if not, write to the Free Software
24  * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA  02111-1307, USA.
25  */
26
27 #ifdef HAVE_CONFIG_H
28 # include "config.h"
29 #endif
30
31 #include <gtk/gtk.h>
32
33 #include <stdio.h>
34
35 #ifdef HAVE_SYS_TYPES_H
36 # include <sys/types.h>
37 #endif
38
39 #include "ethereal.h"
40 #include "packet.h"
41 #include "packet-ipx.h"
42
43 /* The information in this module (IPX, SPX, NCP) comes from:
44         NetWare LAN Analysis, Second Edition
45         Laura A. Chappell and Dan E. Hakes
46         (c) 1994 Novell, Inc.
47         Novell Press, San Jose.
48         ISBN: 0-7821-1362-1
49
50   And from the ncpfs source code by Volker Lendecke
51
52 */
53
54 static void
55 dissect_spx(const u_char *pd, int offset, frame_data *fd, GtkTree *tree);
56
57 static void
58 dissect_ipxrip(const u_char *pd, int offset, frame_data *fd, GtkTree *tree);
59
60 static void
61 dissect_sap(const u_char *pd, int offset, frame_data *fd, GtkTree *tree);
62
63 struct port_info {
64         guint16 port;
65         void    (*func) (const u_char *, int, frame_data *, GtkTree *);
66         char    *text;
67 };
68
69 struct conn_info {
70         guint8  ctrl;
71         char    *text;
72 };
73
74 struct server_info {
75         guint16 type;
76         char    *text;
77 };
78
79 /* ================================================================= */
80 /* IPX                                                               */
81 /* ================================================================= */
82 static struct port_info ports[] = {
83         { 0x0451, dissect_ncp,          "NCP" },
84         { 0x0452, dissect_sap,          "SAP" },
85         { 0x0453, dissect_ipxrip,       "RIP" },
86         { 0x0455, NULL,                         "NetBIOS" },
87         { 0x0456, NULL,                         "Diagnostic" },
88         { 0x0457, NULL,                         "Serialization" },
89         { 0x0551, NULL,                         "NWLink SMB Name Query" },
90         { 0x0553, dissect_nwlink_dg,"NWLink SMB Datagram" },
91         { 0x055d, NULL,                         "Attachmate Gateway" },
92         { 0x4001, NULL,                         "IPX Message" },
93         { 0x0000, NULL,                         NULL }
94 };
95
96 static char*
97 port_text(guint16 port) {
98         int i=0;
99
100         while (ports[i].text != NULL) {
101                 if (ports[i].port == port) {
102                         return ports[i].text;
103                 }
104                 i++;
105         }
106         return "Unknown";
107 }
108
109 static void*
110 port_func(guint16 port) {
111         int i=0;
112
113         while (ports[i].text != NULL) {
114                 if (ports[i].port == port) {
115                         return ports[i].func;
116                 }
117                 i++;
118         }
119         return dissect_data;
120 }
121
122 char *
123 ipx_packet_type(u_char val)
124 {
125         if (val == 0) {
126                 return "IPX";
127         }
128         else if (val == 5) {
129                 return "SPX";
130         }
131         else if (val == 17) {
132                 return "NCP";
133         }
134         else if (val == 20) {
135                 return "NetBIOS Broadcast";
136         }
137         else if (val >= 16 && val <= 31) {
138                 return "Experimental Protocol";
139         }
140         else {
141                 return "Unknown";
142         }
143 }
144
145 gchar*
146 ipxnet_to_string(const guint8 *ad)
147 {
148         static gchar    str[3][12];
149         static gchar    *cur;
150
151         if (cur == &str[0][0]) {
152                 cur = &str[1][0];
153         } else if (cur == &str[1][0]) {
154                 cur = &str[2][0];
155         } else {
156                 cur = &str[0][0];
157         }
158
159         sprintf(cur, "%02X %02X %02X %02X", ad[0], ad[1], ad[2], ad[3]);
160         return cur;
161 }
162
163 void
164 dissect_ipx(const u_char *pd, int offset, frame_data *fd, GtkTree *tree) {
165
166         GtkWidget       *ipx_tree, *ti;
167         u_char          ipx_type;
168
169         char            *dnet, *snet;
170         guint16         dsocket, ssocket;
171         void            (*dissect) (const u_char *, int, frame_data *, GtkTree *);
172
173         /* Calculate here for use in pinfo and in tree */
174         dnet = ipxnet_to_string((guint8*)&pd[offset+6]);
175         snet = ipxnet_to_string((guint8*)&pd[offset+18]);
176         dsocket = pntohs(&pd[offset+16]);
177
178         if (check_col(fd, COL_PROTOCOL))
179                 col_add_str(fd, COL_PROTOCOL, "IPX");
180         if (check_col(fd, COL_INFO))
181                 col_add_fstr(fd, COL_INFO, "%s (0x%04X)", port_text(dsocket), dsocket);
182
183         ipx_type = pd[offset+5];
184
185         if (tree) {
186                 ti = add_item_to_tree(GTK_WIDGET(tree), offset, 30,
187                         "Internetwork Packet Exchange");
188                 ipx_tree = gtk_tree_new();
189                 add_subtree(ti, ipx_tree, ETT_IPX);
190                 add_item_to_tree(ipx_tree, offset,      2, "Checksum: 0x%04X",
191                         (pd[offset] << 8) | pd[offset+1]);
192                 add_item_to_tree(ipx_tree, offset+2,    2, "Length: %d bytes",
193                         (pd[offset+2] << 8) | pd[offset+3]);
194                 add_item_to_tree(ipx_tree, offset+4,    1, "Transport Control: %d hops",
195                         pd[offset+4]);
196                 add_item_to_tree(ipx_tree, offset+5,    1, "Packet Type: %s",
197                         ipx_packet_type(ipx_type));
198                 add_item_to_tree(ipx_tree, offset+6,    4, "Destination Network: %s",
199                         dnet);
200                 add_item_to_tree(ipx_tree, offset+10,   6, "Destination Node: %s",
201                         ether_to_str((guint8*)&pd[offset+10]));
202                 /*dsocket = ntohs(*((guint16*)&pd[offset+16]));*/
203                 add_item_to_tree(ipx_tree, offset+16,   2,
204                         "Destination Socket: %s (0x%04X)", port_text(dsocket), dsocket);
205                 add_item_to_tree(ipx_tree, offset+18,   4, "Source Network: %s",
206                         snet);
207                 add_item_to_tree(ipx_tree, offset+22,   6, "Source Node: %s",
208                         ether_to_str((guint8*)&pd[offset+22]));
209                 ssocket = pntohs(&pd[offset+28]);
210                 add_item_to_tree(ipx_tree, offset+28,   2,
211                         "Source Socket: %s (0x%04X)", port_text(ssocket), ssocket);
212         }
213         offset += 30;
214
215         switch (ipx_type) {
216                 case 5: /* SPX */
217                         dissect_spx(pd, offset, fd, tree);
218                         break;
219
220                 case 17: /* NCP */
221                         dissect_ncp(pd, offset, fd, tree);
222                         break;
223
224                 case 20: /* NetBIOS */
225                         if (dsocket == 0x0455) {
226                                 dissect_nbipx_ns(pd, offset, fd, tree);
227                                 break;
228                         }
229                         /* else fall through */
230
231                 case 0: /* IPX, fall through to default */
232                 default:
233                         dissect = port_func(dsocket);
234                         if (dissect) {
235                                 dissect(pd, offset, fd, tree);
236                         }
237                         else {
238                                 dissect_data(pd, offset, fd, tree);
239                         }
240                         break;
241         }
242 }
243
244
245 /* ================================================================= */
246 /* SPX                                                               */
247 /* ================================================================= */
248 static char*
249 spx_conn_ctrl(u_char ctrl)
250 {
251         int i=0;
252
253         static struct conn_info conns[] = {
254                 { 0x10, "End-of-Message" },
255                 { 0x20, "Attention" },
256                 { 0x40, "Acknowledgment Required"},
257                 { 0x80, "System Packet"}
258         };
259
260         while (conns[i].text != NULL) {
261                 if (conns[i].ctrl == ctrl) {
262                         return conns[i].text;
263                 }
264                 i++;
265         }
266         return "Unknown";
267 }
268
269 static char*
270 datastream(u_char type)
271 {
272         switch (type) {
273                 case 0xfe:
274                         return "End-of-Connection";
275                 case 0xff:
276                         return "End-of-Connection Acknowledgment";
277                 default:
278                         return "Client-Defined";
279         }
280 }
281
282 static void
283 dissect_spx(const u_char *pd, int offset, frame_data *fd, GtkTree *tree) {
284
285         GtkWidget       *spx_tree, *ti;
286
287         if (check_col(fd, COL_PROTOCOL))
288                 col_add_str(fd, COL_PROTOCOL, "SPX");
289         if (check_col(fd, COL_INFO))
290                 col_add_str(fd, COL_INFO, "SPX");
291
292         if (tree) {
293                 ti = add_item_to_tree(GTK_WIDGET(tree), offset, 12,
294                         "Sequenced Packet Exchange");
295                 spx_tree = gtk_tree_new();
296                 add_subtree(ti, spx_tree, ETT_SPX);
297
298                 add_item_to_tree(spx_tree, offset,      1,
299                         "Connection Control: %s (0x%02X)",
300                         spx_conn_ctrl(pd[offset]), pd[offset]);
301
302                 add_item_to_tree(spx_tree, offset+1,     1,
303                         "Datastream Type: %s (0x%02X)",
304                         datastream(pd[offset+1]), pd[offset+1]);
305
306                 add_item_to_tree(spx_tree, offset+2,     2,
307                         "Source Connection ID: %d", pntohs( &pd[offset+2] ) );
308
309                 add_item_to_tree(spx_tree, offset+4,     2,
310                         "Destination Connection ID: %d", pntohs( &pd[offset+4] ) );
311
312                 add_item_to_tree(spx_tree, offset+6,     2,
313                         "Sequence Number: %d", pntohs( &pd[offset+6] ) );
314
315                 add_item_to_tree(spx_tree, offset+8,     2,
316                         "Acknowledgment Number: %d", pntohs( &pd[offset+8] ) );
317
318                 add_item_to_tree(spx_tree, offset+10,     2,
319                         "Allocation Number: %d", pntohs( &pd[offset+10] ) );
320
321                 offset += 12;
322                 dissect_data(pd, offset, fd, tree);
323         }
324 }
325
326 /* ================================================================= */
327 /* IPX RIP                                                           */
328 /* ================================================================= */
329 static void
330 dissect_ipxrip(const u_char *pd, int offset, frame_data *fd, GtkTree *tree) {
331
332         GtkWidget       *rip_tree, *ti;
333         guint16         operation;
334         struct ipx_rt_def route;
335         int                     cursor;
336
337         char            *rip_type[2] = { "Request", "Response" };
338
339         operation = pntohs(&pd[offset]) - 1;
340
341         if (check_col(fd, COL_PROTOCOL))
342          col_add_str(fd, COL_PROTOCOL, "IPX RIP");
343         if (check_col(fd, COL_PROTOCOL)) {
344          if (operation < 2) {
345                  col_add_str(fd, COL_INFO, rip_type[operation]);
346          }
347          else {
348                  col_add_str(fd, COL_INFO, "Unknown Packet Type");
349          }
350         }
351
352         if (tree) {
353                 ti = add_item_to_tree(GTK_WIDGET(tree), offset, END_OF_FRAME,
354                         "IPX Routing Information Protocol");
355                 rip_tree = gtk_tree_new();
356                 add_subtree(ti, rip_tree, ETT_IPXRIP);
357
358                 if (operation < 2) {
359                         add_item_to_tree(rip_tree, offset, 2,
360                         "RIP packet type: %s", rip_type[operation]);
361                 }
362                 else {
363                         add_item_to_tree(rip_tree, offset, 2, "Unknown RIP packet type");
364                 }
365
366                 for (cursor = offset + 2; cursor < fd->cap_len; cursor += 8) {
367                         memcpy(&route.network, &pd[cursor], 4);
368                         route.hops = pntohs(&pd[cursor+4]);
369                         route.ticks = pntohs(&pd[cursor+6]);
370
371                         if (operation == IPX_RIP_REQUEST - 1) {
372                                 add_item_to_tree(rip_tree, cursor,      8,
373                                         "Route Vector: %s, %d hop%s, %d tick%s",
374                                         ipxnet_to_string((guint8*)&route.network),
375                                         route.hops,  route.hops  == 1 ? "" : "s",
376                                         route.ticks, route.ticks == 1 ? "" : "s");
377                         }
378                         else {
379                                 add_item_to_tree(rip_tree, cursor,      8,
380                                         "Route Vector: %s, %d hop%s, %d tick%s (%d ms)",
381                                         ipxnet_to_string((guint8*)&route.network),
382                                         route.hops,  route.hops  == 1 ? "" : "s",
383                                         route.ticks, route.ticks == 1 ? "" : "s",
384                                         route.ticks * 1000 / 18);
385                         }
386                 }
387         }
388 }
389
390
391
392 /* ================================================================= */
393 /* SAP                                                                                                                           */
394 /* ================================================================= */
395 static char*
396 server_type(guint16 type)
397 {
398         int i=0;
399
400         /* some of these are from ncpfs, others are from the book */
401         static struct server_info       servers[] = {
402                 { 0x0001,       "User" },
403                 { 0x0002,       "User Group" },
404                 { 0x0003,       "Print Queue" },
405                 { 0x0004,       "File server" },
406                 { 0x0005,       "Job server" },
407                 { 0x0007,       "Print server" },
408                 { 0x0008,       "Archive server" },
409                 { 0x0009,       "Archive server" },
410                 { 0x000a,       "Job queue" },
411                 { 0x000b,       "Administration" },
412                 { 0x0021,       "NAS SNA gateway" },
413                 { 0x0024,       "Remote bridge" },
414                 { 0x0026,       "Bridge server" },
415                 { 0x0027,       "TCP/IP gateway" },
416                 { 0x002d,       "Time Synchronization VAP" },
417                 { 0x002e,       "Archive Server Dynamic SAP" },
418                 { 0x0047,       "Advertising print server" },
419                 { 0x004b,       "Btrieve VAP 5.0" },
420                 { 0x004c,       "SQL VAP" },
421                 { 0x0050,       "Btrieve VAP" },
422                 { 0x0053,       "Print Queue VAP" },
423                 { 0x007a,       "TES NetWare for VMS" },
424                 { 0x0098,       "NetWare access server" },
425                 { 0x009a,       "Named Pipes server" },
426                 { 0x009e,       "Portable NetWare Unix" },
427                 { 0x0107,       "NetWare 386" },
428                 { 0x0111,       "Test server" },
429                 { 0x0133,       "NetWare Name Service" },
430                 { 0x0166,       "NetWare management" },
431                 { 0x026a,       "NetWare management" },
432                 { 0x026b,       "Time synchronization" },
433                 { 0x0278,       "NetWare Directory server" },
434                 { 0x055d,       "Attachmate SNA gateway" },
435                 { 0x0000,       NULL }
436         };
437
438         while (servers[i].text != NULL) {
439                 if (servers[i].type == type) {
440                         return servers[i].text;
441                 }
442                 i++;
443         }
444         return "Unknown";
445 }
446
447 static void
448 dissect_sap(const u_char *pd, int offset, frame_data *fd, GtkTree *tree) {
449
450         GtkWidget       *sap_tree, *s_tree, *ti;
451         int                     cursor;
452         struct sap_query query;
453         struct sap_server_ident server;
454
455         char            *sap_type[4] = { "General Query", "General Response",
456                 "Nearest Query", "Nearest Response" };
457
458         query.query_type = pntohs(&pd[offset]);
459         query.server_type = pntohs(&pd[offset+2]);
460
461         if (check_col(fd, COL_PROTOCOL))
462                 col_add_str(fd, COL_PROTOCOL, "SAP");
463         if (check_col(fd, COL_INFO)) {
464                 if (query.query_type < 4) {
465                         col_add_str(fd, COL_INFO, sap_type[query.query_type - 1]);
466                 }
467                 else {
468                         col_add_str(fd, COL_INFO, "Unknown Packet Type");
469                 }
470         }
471
472         if (tree) {
473                 ti = add_item_to_tree(GTK_WIDGET(tree), offset, END_OF_FRAME,
474                         "Service Advertising Protocol");
475                 sap_tree = gtk_tree_new();
476                 add_subtree(ti, sap_tree, ETT_IPXSAP);
477
478                 if (query.query_type < 4) {
479                         add_item_to_tree(sap_tree, offset, 2, sap_type[query.query_type - 1]);
480                 }
481                 else {
482                         add_item_to_tree(sap_tree, offset, 2,
483                                         "Unknown SAP Packet Type %d", query.query_type);
484                 }
485
486                 if (query.query_type == IPX_SAP_GENERAL_RESPONSE ||
487                                 query.query_type == IPX_SAP_NEAREST_RESPONSE) { /* responses */
488
489                         for (cursor = offset + 2; cursor < fd->cap_len; cursor += 64) {
490                                 server.server_type = pntohs(&pd[cursor]);
491                                 memcpy(server.server_name, &pd[cursor+2], 48);
492                                 memcpy(&server.server_network, &pd[cursor+50], 4);
493                                 memcpy(&server.server_node, &pd[cursor+54], 6);
494                                 server.server_port = pntohs(&pd[cursor+60]);
495                                 server.intermediate_network = pntohs(&pd[cursor+62]);
496
497                                 ti = add_item_to_tree(GTK_WIDGET(sap_tree), cursor+2, 48,
498                                         "Server Name: %s", server.server_name);
499                                 s_tree = gtk_tree_new();
500                                 add_subtree(ti, s_tree, ETT_IPXSAP_SERVER);
501
502                                 add_item_to_tree(s_tree, cursor, 2, "Server Type: %s (0x%04X)",
503                                                 server_type(server.server_type), server.server_type);
504                                 add_item_to_tree(s_tree, cursor+50, 4, "Network: %s",
505                                                 ipxnet_to_string((guint8*)&pd[cursor+50]));
506                                 add_item_to_tree(s_tree, cursor+54, 6, "Node: %s",
507                                                 ether_to_str((guint8*)&pd[cursor+54]));
508                                 add_item_to_tree(s_tree, cursor+60, 2, "Socket: %s (0x%04X)",
509                                                 port_text(server.server_port), server.server_port);
510                                 add_item_to_tree(s_tree, cursor+62, 2,
511                                                 "Intermediate Networks: %d",
512                                                 server.intermediate_network);
513                         }
514                 }
515                 else {  /* queries */
516                         add_item_to_tree(sap_tree, offset+2, 2, "Server Type: %s (0x%04X)",
517                                         server_type(query.server_type), query.server_type);
518                 }
519         }
520 }
521