1 /* 2 * Copyright (c) 1998-2004 Hannes Gredler <hannes@tcpdump.org> 3 * The TCPDUMP project 4 * 5 * Redistribution and use in source and binary forms, with or without 6 * modification, are permitted provided that: (1) source code 7 * distributions retain the above copyright notice and this paragraph 8 * in its entirety, and (2) distributions including binary code include 9 * the above copyright notice and this paragraph in its entirety in 10 * the documentation or other materials provided with the distribution. 11 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND 12 * WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, WITHOUT 13 * LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS 14 * FOR A PARTICULAR PURPOSE. 15 */ 16 17 #include <sys/cdefs.h> 18 #ifndef lint 19 __RCSID("$NetBSD: print-syslog.c,v 1.5 2014/11/20 03:05:03 christos Exp $"); 20 #endif 21 22 #define NETDISSECT_REWORKED 23 #ifdef HAVE_CONFIG_H 24 #include "config.h" 25 #endif 26 27 #include <tcpdump-stdinc.h> 28 29 #include "interface.h" 30 #include "extract.h" 31 32 static const char tstr[] = "[|syslog]"; 33 34 /* 35 * tokenlists and #defines taken from Ethereal - Network traffic analyzer 36 * by Gerald Combs <gerald@ethereal.com> 37 */ 38 39 #define SYSLOG_SEVERITY_MASK 0x0007 /* 0000 0000 0000 0111 */ 40 #define SYSLOG_FACILITY_MASK 0x03f8 /* 0000 0011 1111 1000 */ 41 #define SYSLOG_MAX_DIGITS 3 /* The maximum number if priority digits to read in. */ 42 43 static const struct tok syslog_severity_values[] = { 44 { 0, "emergency" }, 45 { 1, "alert" }, 46 { 2, "critical" }, 47 { 3, "error" }, 48 { 4, "warning" }, 49 { 5, "notice" }, 50 { 6, "info" }, 51 { 7, "debug" }, 52 { 0, NULL }, 53 }; 54 55 static const struct tok syslog_facility_values[] = { 56 { 0, "kernel" }, 57 { 1, "user" }, 58 { 2, "mail" }, 59 { 3, "daemon" }, 60 { 4, "auth" }, 61 { 5, "syslog" }, 62 { 6, "lpr" }, 63 { 7, "news" }, 64 { 8, "uucp" }, 65 { 9, "cron" }, 66 { 10, "authpriv" }, 67 { 11, "ftp" }, 68 { 12, "ntp" }, 69 { 13, "security" }, 70 { 14, "console" }, 71 { 15, "cron" }, 72 { 16, "local0" }, 73 { 17, "local1" }, 74 { 18, "local2" }, 75 { 19, "local3" }, 76 { 20, "local4" }, 77 { 21, "local5" }, 78 { 22, "local6" }, 79 { 23, "local7" }, 80 { 0, NULL }, 81 }; 82 83 void 84 syslog_print(netdissect_options *ndo, 85 register const u_char *pptr, register u_int len) 86 { 87 uint16_t msg_off = 0; 88 uint16_t pri = 0; 89 uint16_t facility,severity; 90 91 /* extract decimal figures that are 92 * encapsulated within < > tags 93 * based on this decimal figure extract the 94 * severity and facility values 95 */ 96 97 ND_TCHECK2(*pptr, 1); 98 if (*(pptr+msg_off) == '<') { 99 msg_off++; 100 ND_TCHECK2(*(pptr + msg_off), 1); 101 while ( *(pptr+msg_off) >= '0' && 102 *(pptr+msg_off) <= '9' && 103 msg_off <= SYSLOG_MAX_DIGITS) { 104 pri = pri * 10 + (*(pptr+msg_off) - '0'); 105 msg_off++; 106 ND_TCHECK2(*(pptr + msg_off), 1); 107 } 108 if (*(pptr+msg_off) != '>') { 109 ND_PRINT((ndo, "%s", tstr)); 110 return; 111 } 112 msg_off++; 113 } else { 114 ND_PRINT((ndo, "%s", tstr)); 115 return; 116 } 117 118 facility = (pri & SYSLOG_FACILITY_MASK) >> 3; 119 severity = pri & SYSLOG_SEVERITY_MASK; 120 121 if (ndo->ndo_vflag < 1 ) 122 { 123 ND_PRINT((ndo, "SYSLOG %s.%s, length: %u", 124 tok2str(syslog_facility_values, "unknown (%u)", facility), 125 tok2str(syslog_severity_values, "unknown (%u)", severity), 126 len)); 127 return; 128 } 129 130 ND_PRINT((ndo, "SYSLOG, length: %u\n\tFacility %s (%u), Severity %s (%u)\n\tMsg: ", 131 len, 132 tok2str(syslog_facility_values, "unknown (%u)", facility), 133 facility, 134 tok2str(syslog_severity_values, "unknown (%u)", severity), 135 severity)); 136 137 /* print the syslog text in verbose mode */ 138 for (; msg_off < len; msg_off++) { 139 ND_TCHECK2(*(pptr + msg_off), 1); 140 safeputchar(ndo, *(pptr + msg_off)); 141 } 142 143 if (ndo->ndo_vflag > 1) 144 print_unknown_data(ndo, pptr, "\n\t", len); 145 146 return; 147 148 trunc: 149 ND_PRINT((ndo, "%s", tstr)); 150 } 151