File:  [ELWIX - Embedded LightWeight unIX -] / embedaddon / hping2 / waitpacket.c
Revision 1.1.1.1 (vendor branch): download - view: text, annotated - select for diffs - revision graph
Tue Feb 21 22:11:37 2012 UTC (12 years, 3 months ago) by misho
Branches: hping2, MAIN
CVS tags: v2_0_0rc3p7, v2_0_0rc3p5, v2_0_0rc3p4, v2_0_0rc3p0, v2_0_0rc3, HEAD
hping2

    1: /* waitpacket.c -- handle and print the incoming packet
    2:  * Copyright(C) 1999-2001 Salvatore Sanfilippo
    3:  * Under GPL, see the COPYING file for more information about
    4:  * the license. */
    5: 
    6: #include <stdio.h>
    7: #include <stdlib.h>
    8: #include <string.h>
    9: #include <sys/types.h>
   10: #include <sys/socket.h>
   11: #include <netinet/in.h>
   12: #include <arpa/inet.h>
   13: #include <errno.h>
   14: #include <time.h>
   15: #include <ctype.h>
   16: #include <unistd.h>
   17: 
   18: #include "hping2.h"
   19: #include "globals.h"
   20: 
   21: static int icmp_unreach_rtt(void *quoted_ip, int size,
   22: 			    int *seqp, float *ms_delay);
   23: static void print_tcp_timestamp(void *tcp, int tcpsize);
   24: static int recv_icmp(void *packet, size_t size);
   25: static int recv_udp(void *packet, size_t size);
   26: static int recv_tcp(void *packet, size_t size);
   27: static void hex_dump(void *packet, int size);
   28: static void human_dump(void *packet, int size);
   29: static void handle_hcmp(char *packet, int size);
   30: 
   31: static struct myiphdr ip;
   32: static int ip_size;
   33: static struct in_addr src, dst;
   34: 
   35: void wait_packet(void)
   36: {
   37: 	int match = 0;
   38: 	int size, iphdr_size, enc_size;
   39: 	char packet [IP_MAX_SIZE+linkhdr_size];
   40: 	char *ip_packet, *enc_packet;
   41: 
   42: 	size = read_packet(packet, IP_MAX_SIZE+linkhdr_size);
   43: 	switch(size) {
   44: 	case 0:
   45: 		return;
   46: 	case -1:
   47: 		exit(1);
   48: 	}
   49: 
   50: 	/* Check if the packet is shorter than the link header size */
   51: 	if (size < linkhdr_size) {
   52: 		if (opt_debug)
   53: 			printf("DEBUG: WARNING: packet size < linkhdr_size\n");
   54: 		return;
   55: 	}
   56: 
   57: 	/* IP packet pointer and len */
   58: 	ip_packet = packet + linkhdr_size;
   59: 	ip_size = size - linkhdr_size;
   60: 
   61: 	/* Truncated IP header? */
   62: 	if (ip_size < IPHDR_SIZE) {
   63: 		if (opt_debug)
   64: 			printf("[|ip fix]\n");
   65: 		return;
   66: 	}
   67: 
   68: 	memcpy(&ip, packet+linkhdr_size, sizeof(ip));
   69: 	iphdr_size = ip.ihl * 4;
   70: 
   71: 	/* Bad IP header len? */
   72: 	if (iphdr_size > ip_size) {
   73: 		if (opt_debug)
   74: 			printf("[|iphdr size]\n");
   75: 		return;
   76: 	}
   77: 
   78: 	/* Handle the HCMP for almost safe file transfer with hping */
   79: 	if (opt_sign)
   80: 		handle_hcmp(ip_packet, ip_size);
   81: 
   82: 	/* Check if the dest IP address is the one of our interface */
   83: 	if (memcmp(&ip.daddr, &local.sin_addr, sizeof(ip.daddr)))
   84: 		return;
   85: 	/* If the packet isn't an ICMP error it should come from
   86: 	 * our target IP addresss. We accepts packets from all the
   87: 	 * source if the random destination option is active */
   88: 	if (ip.protocol != IPPROTO_ICMP && !opt_rand_dest) {
   89: 		if (memcmp(&ip.saddr, &remote.sin_addr, sizeof(ip.saddr)))
   90: 			return;
   91: 	}
   92: 
   93: 	/* Get the encapsulated protocol offset and size */
   94: 	enc_packet = ip_packet + iphdr_size;
   95: 	enc_size = ip_size - iphdr_size;
   96: 
   97: 	/* Put the IP source and dest addresses in a struct in_addr */
   98: 	memcpy(&src, &(ip.saddr), sizeof(struct in_addr));
   99: 	memcpy(&dst, &(ip.daddr), sizeof(struct in_addr));
  100: 
  101: 	switch(ip.protocol) {
  102: 	case IPPROTO_ICMP:
  103: 		match = recv_icmp(enc_packet, enc_size);
  104: 		break;
  105: 	case IPPROTO_UDP:
  106: 		match = recv_udp(enc_packet, enc_size);
  107: 		break;
  108: 	case IPPROTO_TCP:
  109: 		match = recv_tcp(enc_packet, enc_size);
  110: 		break;
  111: 	default:
  112: 		return;
  113: 	}
  114: 
  115: 	if (match)
  116: 		recv_pkt++;
  117: 
  118: 	/* Dump the packet in hex */
  119: 	if (opt_hexdump && match && !opt_quiet)
  120: 		hex_dump(ip_packet, ip_size);
  121: 
  122: 	/* Dump printable characters inside the packet */
  123: 	if (opt_contdump && match && !opt_quiet)
  124: 		human_dump(ip_packet, ip_size);
  125: 
  126: 	/* Display IP options */
  127: 	if (match && opt_rroute && !opt_quiet)
  128: 		display_ipopt(ip_packet);
  129: 
  130: 	/* --stop-tr stops hping in traceroute mode when the
  131: 	 * first not ICMP time exceeded packet is received */
  132: 	if (opt_traceroute && opt_tr_stop && match) {
  133: 		struct myicmphdr icmp;
  134: 
  135: 		if (ip.protocol != IPPROTO_ICMP)
  136: 			print_statistics(0);
  137: 		if (enc_size >= ICMPHDR_SIZE) {
  138: 			memcpy(&icmp, enc_packet, sizeof(icmp));
  139: 			if (icmp.type != 11)
  140: 				print_statistics(0);
  141: 		}
  142: 	}
  143: 
  144: 	/* if the count was reached exit now */
  145: 	if (count != -1 && count == recv_pkt)
  146: 		print_statistics(0);
  147: }
  148: 
  149: void log_ip(int status, int sequence)
  150: {
  151: 	int rel_id, ip_id;
  152: 
  153: 	/* get ip->id */
  154: 	if (opt_winid_order)
  155: 		ip_id = ip.id;
  156: 	else
  157: 		ip_id = htons(ip.id);
  158: 
  159: 	if (status == S_RECV)
  160: 		printf("DUP! ");
  161: 
  162: 	if (opt_relid)
  163: 		rel_id = relativize_id(sequence, &ip_id);
  164: 	else
  165: 		rel_id = 0;
  166: 	printf("len=%d ip=%s ttl=%d %sid%s%d ", ip_size, inet_ntoa(src),
  167: 			ip.ttl,
  168: 			(ntohs(ip.frag_off) ? "DF " : ""),
  169: 			(rel_id ? "=+" : "="), ip_id);
  170: 	if (opt_verbose && !opt_quiet)
  171: 		printf("tos=%x iplen=%u\n", ip.tos, htons(ip.tot_len));
  172: }
  173: 
  174: void log_icmp_ts(void *ts)
  175: {
  176: 	struct icmp_tstamp_data icmp_tstamp;
  177: 
  178: 	memcpy(&icmp_tstamp, ts, sizeof(icmp_tstamp));
  179: 	printf("ICMP timestamp: Originate=%u Receive=%u Transmit=%u\n",
  180: 		(unsigned int) ntohl(icmp_tstamp.orig),
  181: 		(unsigned int) ntohl(icmp_tstamp.recv),
  182: 		(unsigned int) ntohl(icmp_tstamp.tran));
  183: 	printf("ICMP timestamp RTT tsrtt=%lu\n\n",
  184: 		(long unsigned int) (get_midnight_ut_ms() 
  185:                                      - ntohl(icmp_tstamp.orig)));
  186: }
  187: 
  188: void log_icmp_addr(void *addrptr)
  189: {
  190: 	unsigned char *addr = addrptr;
  191: 	printf("ICMP address mask: icmpam=%u.%u.%u.%u\n\n",
  192:        		addr[0], addr[1], addr[2], addr[3]);
  193: }
  194: 
  195: void log_traceroute(void *packet, int size, int icmp_code)
  196: {
  197: 	static unsigned char old_src_addr[4] = { 0, 0, 0, 0 };
  198: 	int sequence = 0, retval;
  199: 	float rtt;
  200: 
  201: 	if (!opt_tr_keep_ttl && !memcmp(&ip.saddr, old_src_addr, 4))
  202: 		return;
  203: 
  204: 	retval = icmp_unreach_rtt(packet+ICMPHDR_SIZE, size-ICMPHDR_SIZE,
  205: 					&sequence, &rtt);
  206: 	memcpy(old_src_addr, &ip.saddr, sizeof(ip.saddr));
  207: 	printf("hop=%d ", src_ttl);
  208: 	fflush(stdout);
  209: 	log_icmp_timeexc(inet_ntoa(src), icmp_code);
  210: 	if (retval != -1)
  211: 		printf("hop=%d hoprtt=%.1f ms\n",
  212: 				src_ttl, rtt);
  213: 	if (!opt_tr_keep_ttl)
  214: 		src_ttl++;
  215: }
  216: 
  217: int recv_icmp(void *packet, size_t size)
  218: {
  219: 	struct myicmphdr icmp;
  220: 	struct myiphdr quoted_ip;
  221: 
  222: 	/* Check if the packet can contain the ICMP header */
  223: 	if (size < ICMPHDR_SIZE) {
  224: 		printf("[|icmp]\n");
  225: 		return 0;
  226: 	}
  227: 	memcpy(&icmp, packet, sizeof(icmp));
  228: 
  229: 	/* --------------------------- *
  230: 	 * ICMP ECHO/TIMESTAMP/ADDRESS *
  231: 	 * --------------------------- */
  232: 	if ((icmp.type == ICMP_ECHOREPLY  ||
  233: 	     icmp.type == ICMP_TIMESTAMPREPLY ||
  234: 	     icmp.type == ICMP_ADDRESSREPLY) &&
  235: 		icmp.un.echo.id == (getpid() & 0xffff))
  236: 	{
  237: 		int icmp_seq = icmp.un.echo.sequence;
  238: 		int status;
  239: 		float ms_delay;
  240: 
  241: 		/* obtain round trip time */
  242: 		status = rtt(&icmp_seq, 0, &ms_delay);
  243: 		log_ip(status, icmp_seq);
  244: 
  245: 		printf("icmp_seq=%d rtt=%.1f ms\n", icmp_seq, ms_delay);
  246: 		if (icmp.type == ICMP_TIMESTAMPREPLY) {
  247: 			if ((size - ICMPHDR_SIZE) >= 12)
  248: 				log_icmp_ts(packet+ICMPHDR_SIZE);
  249: 			else
  250: 				printf("[|icmp timestamp]\n");
  251: 		} else if (icmp.type == ICMP_ADDRESSREPLY) {
  252: 			if ((size - ICMPHDR_SIZE) >= 4)
  253: 				log_icmp_addr(packet+ICMPHDR_SIZE);
  254: 			else
  255: 				printf("[|icmp subnet address]\n");
  256: 		}
  257: 		return 1;
  258: 	}
  259: 	/* ------------------------------------ *
  260: 	 * ICMP DEST UNREACHABLE, TIME EXCEEDED *
  261: 	 * ------------------------------------ */
  262: 	else if (icmp.type == 3 || icmp.type == 11) {
  263: 		if ((size - ICMPHDR_SIZE) < sizeof(struct myiphdr)) {
  264: 			printf("[|icmp quoted ip]\n");
  265: 			return 0;
  266: 		}
  267: 		memcpy(&quoted_ip, packet+ICMPHDR_SIZE, sizeof(quoted_ip));
  268: 		if (memcmp(&quoted_ip.daddr, &remote.sin_addr,
  269: 			sizeof(quoted_ip.daddr)) ||
  270: 		    memcmp(&ip.daddr, &local.sin_addr, sizeof(ip.daddr)))
  271: 			return 0; /* addresses don't match */
  272: 		/* Now we can handle the specific type */
  273: 		switch(icmp.type) {
  274: 		case 3:
  275: 			if (!opt_quiet)
  276: 				log_icmp_unreach(inet_ntoa(src), icmp.code);
  277: 			return 1;
  278: 		case 11:
  279: 			if (opt_traceroute)
  280: 				log_traceroute(packet, size, icmp.code);
  281: 			else
  282: 				log_icmp_timeexc(inet_ntoa(src), icmp.code);
  283: 			return 1;
  284: 		}
  285: 	}
  286: 
  287: 	return 0; /* don't match */
  288: }
  289: 
  290: int recv_udp(void *packet, size_t size)
  291: {
  292: 	struct myudphdr udp;
  293: 	int sequence = 0, status;
  294: 	float ms_delay;
  295: 
  296: 	if (size < UDPHDR_SIZE) {
  297: 		printf("[|udp]\n");
  298: 		return 0;
  299: 	}
  300: 	memcpy(&udp, packet, sizeof(udp));
  301: 
  302: 	/* check if the packet matches */
  303: 	if ((ntohs(udp.uh_sport) == dst_port) ||
  304: 	    (opt_force_incdport &&
  305: 	     (ntohs(udp.uh_sport) >= base_dst_port &&
  306: 	      ntohs(udp.uh_sport) <= dst_port)))
  307: 	{
  308: 		status = rtt(&sequence, ntohs(udp.uh_dport), &ms_delay);
  309: 		if (!opt_quiet) {
  310: 			log_ip(status, sequence);
  311: 			printf("seq=%d rtt=%.1f ms\n", sequence, ms_delay);
  312: 		}
  313: 		if (opt_incdport && !opt_force_incdport)
  314: 			dst_port++;
  315: 		return 1;
  316: 	}
  317: 	return 0;
  318: }
  319: 
  320: int recv_tcp(void *packet, size_t size)
  321: {
  322: 	struct mytcphdr tcp;
  323: 	int sequence = 0, status;
  324: 	float ms_delay;
  325: 	char flags[16];
  326: 
  327: 	if (size < TCPHDR_SIZE) {
  328: 		printf("[|tcp]\n");
  329: 		return 0;
  330: 	}
  331: 	memcpy(&tcp, packet, sizeof(tcp));
  332: 
  333: 	/* check if the packet matches */
  334: 	if ((ntohs(tcp.th_sport) == dst_port) ||
  335: 	    (opt_force_incdport &&
  336: 	     (ntohs(tcp.th_sport) >= base_dst_port &&
  337: 	      ntohs(tcp.th_sport) <= dst_port)))
  338: 	{
  339: 		tcp_exitcode = tcp.th_flags;
  340: 
  341: 		status = rtt(&sequence, ntohs(tcp.th_dport), &ms_delay);
  342: 
  343: 		if (opt_seqnum) {
  344: 			static __u32 old_th_seq = 0;
  345: 			__u32 seq_diff, tmp;
  346: 
  347: 			tmp = ntohl(tcp.th_seq);
  348: 			if (tmp >= old_th_seq)
  349: 				seq_diff = tmp - old_th_seq;
  350: 			else
  351: 				seq_diff = (4294967295U - old_th_seq)
  352: 					+ tmp;
  353: 			old_th_seq = tmp;
  354: 			printf("%10lu +%lu\n",
  355: 				(unsigned long) tmp,
  356: 				(unsigned long) seq_diff);
  357: 			goto out;
  358: 		}
  359: 
  360: 		if (opt_quiet)
  361: 			goto out;
  362: 
  363: 		flags[0] = '\0';
  364: 		if (tcp.th_flags & TH_RST)  strcat(flags, "R");
  365: 		if (tcp.th_flags & TH_SYN)  strcat(flags, "S");
  366: 		if (tcp.th_flags & TH_ACK)  strcat(flags, "A");
  367: 		if (tcp.th_flags & TH_FIN)  strcat(flags, "F");
  368: 		if (tcp.th_flags & TH_PUSH) strcat(flags, "P");
  369: 		if (tcp.th_flags & TH_URG)  strcat(flags, "U");
  370: 		if (tcp.th_flags & TH_X)    strcat(flags, "X");
  371: 		if (tcp.th_flags & TH_Y)    strcat(flags, "Y");
  372: 		if (flags[0] == '\0')    strcat(flags, "none");
  373: 
  374: 		log_ip(status, sequence);
  375: 		printf("sport=%d flags=%s seq=%d win=%d rtt=%.1f ms\n",
  376: 			ntohs(tcp.th_sport), flags, sequence,
  377: 			ntohs(tcp.th_win), ms_delay);
  378: 
  379: 		if (opt_verbose) {
  380: 			printf("seq=%lu ack=%lu sum=%x urp=%u\n\n",
  381: 					(unsigned long) ntohl(tcp.th_seq),
  382: 					(unsigned long) ntohl(tcp.th_ack),
  383: 					tcp.th_sum, ntohs(tcp.th_urp));
  384: 		}
  385: 
  386: 		/* Get and log the TCP timestamp */
  387: 		if (opt_tcp_timestamp)
  388: 			print_tcp_timestamp(packet, size);
  389: out:
  390: 		if (opt_incdport && !opt_force_incdport)
  391: 			dst_port++;
  392: 		return 1;
  393: 	}
  394: 	return 0;
  395: }
  396: 
  397: /* Try to extract information about the original packet from the
  398:  * ICMP error to obtain the round time trip
  399:  *
  400:  * Note that size is the the packet size starting from the
  401:  * IP packet quoted in the ICMP error, it may be negative
  402:  * if the ICMP is broken */
  403: int icmp_unreach_rtt(void *quoted_ip, int size, int *seqp, float *ms_delay)
  404: {
  405: 	int src_port;
  406: 	int sequence = 0;
  407: 	int quoted_iphdr_size;
  408: 	struct myudphdr udp;
  409: 	struct myicmphdr icmp;
  410: 	struct myiphdr qip;
  411: 
  412: 	/* The user specified --no-rtt */
  413: 	if (opt_tr_no_rtt)
  414: 		return -1;
  415: 
  416: 	if (size < sizeof(struct myiphdr))
  417: 		return -1;
  418: 	memcpy(&qip, quoted_ip, sizeof(struct myiphdr));
  419: 	quoted_iphdr_size = qip.ihl << 2;
  420: 	/* Ok, enough room, try to get the rtt,
  421: 	 * but check if the original packet was an UDP/TCP one */
  422: 	if (qip.protocol == IPPROTO_TCP ||
  423: 	    qip.protocol == IPPROTO_UDP) {
  424: 		/* We need at least 2 bytes of the quoted UDP/TCP header
  425: 		 * for the source port */
  426: 		if ((size - quoted_iphdr_size) < 2)
  427: 			return -1;
  428: 
  429: 		/* Use the UDP header for both UDP and TCP, they are
  430: 		* the same in the 4 first bytes (source and dest port) */
  431: 		memcpy(&udp, quoted_ip+quoted_iphdr_size, sizeof(udp));
  432: 		src_port = htons(udp.uh_sport);
  433: 		return rtt(&sequence, src_port, ms_delay);
  434: 	} else if (qip.protocol == IPPROTO_ICMP) {
  435: 		int s;
  436: 
  437: 		/* We need the whole 8 byte ICMP header to get
  438: 		 * the sequence field, also the type must be
  439: 		 * ICMP_ECHO */
  440: 		memcpy(&icmp, quoted_ip+quoted_iphdr_size, sizeof(icmp));
  441: 		if ((size - quoted_iphdr_size) < 8 ||
  442: 		    icmp.type != ICMP_ECHO)
  443: 			return -1;
  444: 
  445: 		s = icmp.un.echo.sequence;
  446: 		return rtt(&s, 0, ms_delay);
  447: 	}
  448: 	return -1; /* no way */
  449: }
  450: 
  451: void print_tcp_timestamp(void *tcp, int tcpsize)
  452: {
  453: 	int optlen;
  454: 	unsigned char *opt;
  455: 	__u32 tstamp, echo;
  456: 	static __u32 last_tstamp = 0;
  457: 	struct mytcphdr tmptcphdr;
  458: 	unsigned int tcphdrlen;
  459: 
  460: 	if (tcpsize < TCPHDR_SIZE)
  461: 		return;
  462: 	memcpy(&tmptcphdr, tcp, sizeof(struct mytcphdr));
  463: 	tcphdrlen = tmptcphdr.th_off * 4;
  464: 
  465: 	/* bad len or no options in the TCP header */
  466: 	if (tcphdrlen <= 20 || tcphdrlen < tcpsize)
  467: 		return;
  468: 	optlen = tcphdrlen - TCPHDR_SIZE; 
  469: 	opt = (unsigned char*)tcp + TCPHDR_SIZE; /* skips the TCP fix header */
  470: 	while(optlen) {
  471: 		switch(*opt) {
  472: 		case 0: /* end of option */
  473: 			return;
  474: 		case 1: /* noop */
  475: 			opt++;
  476: 			optlen--;
  477: 			continue;
  478: 		default:
  479: 			if (optlen < 2)
  480: 				return;
  481: 			if (opt[1] > optlen)
  482: 				return;
  483: 			if (opt[0] != 8) { /* not timestamp */
  484: 				optlen -= opt[1];
  485: 				opt += opt[1];
  486: 				continue;
  487: 			}
  488: 			/* timestamp found */
  489: 			if (opt[1] != 10) /* bad len */
  490: 				return;
  491: 			memcpy(&tstamp, opt+2, 4);
  492: 			memcpy(&echo, opt+6, 4);
  493: 			tstamp = ntohl(tstamp);
  494: 			echo = ntohl(echo);
  495: 			goto found;
  496: 		}
  497: 	}
  498: found:
  499: 	printf("  TCP timestamp: tcpts=%u\n", tstamp);
  500: 	if (last_tstamp && !opt_waitinusec) {
  501: 		int tsdiff = (tstamp - last_tstamp) / sending_wait;
  502: 		int hz_set[] = { 2, 10, 100, 1000, 0 };
  503: 		int hzdiff = -1;
  504: 		int hz = 0, sec;
  505: 		int days, hours, minutes;
  506: 		if (tsdiff > 0) {
  507: 			int i = 0;
  508: 			while(hz_set[i]) {
  509: 				if (hzdiff == -1) {
  510: 					hzdiff = ABS(tsdiff-hz_set[i]);
  511: 					hz = hz_set[i];
  512: 				} else if (hzdiff > ABS(tsdiff-hz_set[i])) {
  513: 					hzdiff = ABS(tsdiff-hz_set[i]);
  514: 					hz = hz_set[i];
  515: 				}
  516: 				i++;
  517: 			}
  518: 			printf("  HZ seems hz=%d\n", hz);
  519: 			sec = tstamp/hz; /* Get the uptime in seconds */
  520: 			days = sec / (3600*24);
  521: 			sec %= 3600*24;
  522: 			hours = sec / 3600;
  523: 			sec %= 3600;
  524: 			minutes = sec / 60;
  525: 			sec %= 60;
  526: 			printf("  System uptime seems: %d days, %d hours, "
  527: 			       "%d minutes, %d seconds\n",
  528: 			       		days, hours, minutes, sec);
  529: 		}
  530: 	}
  531: 	printf("\n");
  532: 	last_tstamp = tstamp;
  533: }
  534: 
  535: /* This function is exported to listen.c also */
  536: int read_packet(void *packet, int size)
  537: {
  538: #if (!defined OSTYPE_LINUX) || (defined FORCE_LIBPCAP)
  539: 	size = pcap_recv(packet, size);
  540: 	if (size == -1)
  541: 		perror("[wait_packet] pcap_recv()");
  542: #else
  543: 	size = recv(sockpacket, packet, size, 0);
  544: 	if (size == -1) {
  545: 		if (errno != EINTR)
  546: 			perror("[wait_packet] recv");
  547: 		else
  548: 			return 0;
  549: 	}
  550: #endif
  551: 	return size;
  552: }
  553: 
  554: void hex_dump(void *packet, int size)
  555: {
  556: 	unsigned char *byte = packet;
  557: 	int count = 0;
  558: 
  559: 	printf("\t\t");
  560: 	for (; byte < (unsigned char*) (packet+size); byte++) {
  561: 		count++;
  562: 		printf("%02x", *byte);
  563: 		if (count % 2 == 0) printf(" ");
  564: 		if (count % 16 == 0) printf("\n\t\t");
  565: 	}
  566: 	printf("\n\n");
  567: }
  568: 
  569: void human_dump(void *packet, int size)
  570: {
  571: 	unsigned char *byte = packet;
  572: 	int count = 0;
  573: 
  574: 	printf("\t\t");
  575: 	for (; byte < (unsigned char*) (packet+size); byte++) {
  576: 		count ++;
  577: 		if (isprint(*byte))
  578: 			printf("%c", *byte);
  579: 		else
  580: 			printf(".");
  581: 		if (count % 32 == 0) printf("\n\t\t");
  582: 	}
  583: 	printf("\n\n");
  584: }
  585: 
  586: void handle_hcmp(char *packet, int size)
  587: {
  588: 	char *p;
  589: 	struct hcmphdr hcmph;
  590: 	unsigned int seq;
  591: 
  592: 	/* Search for the reverse signature inside the packet */
  593: 	if ((p = memstr(packet, rsign, size)) == NULL)
  594: 		return;
  595: 
  596: 	if (opt_debug)
  597: 		fprintf(stderr, "DEBUG: HCMP received\n");
  598: 
  599: 	p+=strlen(rsign);
  600: 	if ((size-(packet-p)) < sizeof(struct hcmphdr)) {
  601: 		if (opt_verbose || opt_debug)
  602: 			fprintf(stderr, "bad HCMP len received\n");
  603: 		return;
  604: 	}
  605: 
  606: 	memcpy(&hcmph, p, sizeof(hcmph));
  607: 
  608: 	switch(hcmph.type) {
  609: 	case HCMP_RESTART:
  610: 		seq = ntohs(hcmph.typedep.seqnum);
  611: 		src_id = seq; /* set the id */
  612: 		datafiller(NULL, seq); /* data seek */
  613: 		if (opt_debug)
  614: 			printf("DEBUG: HCMP restart from %d\n",
  615: 					seq);
  616: 		return;
  617: 	case HCMP_SOURCE_QUENCH:
  618: 	case HCMP_SOURCE_STIRUP:
  619: 		printf("HCMP source quench/stirup received\n");
  620: 		return;
  621: 	default:
  622: 		if (opt_verbose || opt_debug)
  623: 			fprintf(stderr, "bad HCMP type received\n");
  624: 		return;
  625: 	}
  626: }

FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>