summaryrefslogtreecommitdiffstats
path: root/contrib/tcpdump/print-sip.c
blob: 540cbf424267b0d16ab57aeb6a60706ca165a2c6 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
/*
 * Redistribution and use in source and binary forms, with or without
 * modification, are permitted provided that: (1) source code
 * distributions retain the above copyright notice and this paragraph
 * in its entirety, and (2) distributions including binary code include
 * the above copyright notice and this paragraph in its entirety in
 * the documentation or other materials provided with the distribution.
 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND
 * WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, WITHOUT
 * LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
 * FOR A PARTICULAR PURPOSE.
 *
 * Original code by Hannes Gredler (hannes@juniper.net)
 */

#define NETDISSECT_REWORKED
#ifdef HAVE_CONFIG_H
#include "config.h"
#endif

#include <tcpdump-stdinc.h>

#include "interface.h"
#include "extract.h"

void
sip_print(netdissect_options *ndo,
          register const u_char *pptr, register u_int len)
{
    u_int idx;

    ND_PRINT((ndo, "SIP, length: %u%s", len, ndo->ndo_vflag ? "\n\t" : ""));

    /* in non-verbose mode just lets print the protocol and length */
    if (ndo->ndo_vflag < 1)
        return;

    for (idx = 0; idx < len; idx++) {
        ND_TCHECK2(*(pptr+idx), 2);
        if (EXTRACT_16BITS(pptr+idx) != 0x0d0a) { /* linefeed ? */
            safeputchar(ndo, *(pptr + idx));
        } else {
            ND_PRINT((ndo, "\n\t"));
            idx+=1;
        }
    }

    /* do we want to see an additionally hexdump ? */
    if (ndo->ndo_vflag > 1)
        print_unknown_data(ndo, pptr, "\n\t", len);

    return;

trunc:
    ND_PRINT((ndo, "[|sip]"));
}
OpenPOWER on IntegriCloud