/* dpa400.c * * Unigraf DisplayPort AUX channel monitor output parser * Copyright 2018, Dirk Eibach, Guntermann & Drunck GmbH * * SPDX-License-Identifier: GPL-2.0-or-later */ #include "config.h" #include #include "wtap-int.h" #include "file_wrappers.h" #include "dpa400.h" enum { DPA400_DATA = 0x00, DPA400_DATA_END = 0x01, DPA400_EVENT = 0x02, DPA400_START = 0x03, DPA400_STOP = 0x04, DPA400_TS_OVERFLOW = 0x84, }; struct dpa400_header { guint8 t0; guint8 sb0; guint8 t1; guint8 sb1; guint8 t2; guint8 sb2; }; static gboolean dpa400_read_header(FILE_T fh, struct dpa400_header *hdr, int *err, gchar **err_info) { if (!wtap_read_bytes_or_eof(fh, hdr, sizeof(struct dpa400_header), err, err_info)) return FALSE; if (hdr->sb0 || hdr->sb1 || hdr->sb2) { *err = WTAP_ERR_BAD_FILE; *err_info = g_strdup("dpa400: malformed packet header"); return FALSE; } return TRUE; } static void get_ts(struct dpa400_header *hdr, nstime_t *ts) { guint32 val; val = (hdr->t0 | (hdr->t1 << 8) | ((hdr->t2 & 0x7f) << 16)) << 5; ts->secs = val / 1000000; ts->nsecs = (val % 1000000) * 1000; } static void get_ts_overflow(nstime_t *ts) { guint32 val = 0x7fffff << 5; ts->secs = val / 1000000; ts->nsecs = (val % 1000000) * 1000; } static guint8 get_from(struct dpa400_header *hdr) { return hdr->t2 & 0x80; } static gboolean dpa400_read_packet(wtap *wth, FILE_T fh, wtap_rec *rec, Buffer *buf, int *err, gchar **err_info) { guint8 chunk[2]; guint32 ctr = 0; if (!wth || !rec || !buf) return FALSE; if (!wtap_read_bytes_or_eof(fh, chunk, sizeof(chunk), err, err_info)) return FALSE; if (chunk[1] != 1) { *err = WTAP_ERR_BAD_FILE; *err_info = g_strdup("dpa400: malformed packet framing"); return FALSE; } ws_buffer_clean(buf); ws_buffer_append(buf, &chunk[0], 1); ctr++; switch (chunk[0]) { case DPA400_STOP: { struct dpa400_header hdr; if (!dpa400_read_header(fh, &hdr, err, err_info)) return FALSE; get_ts(&hdr, &rec->ts); rec->rec_type = REC_TYPE_PACKET; rec->presence_flags = WTAP_HAS_TS; rec->rec_header.packet_header.caplen = rec->rec_header.packet_header.len = 0; break; } case DPA400_START: case DPA400_EVENT: { struct dpa400_header hdr; if (!dpa400_read_header(fh, &hdr, err, err_info)) return FALSE; get_ts(&hdr, &rec->ts); if (!wtap_read_bytes_or_eof(fh, chunk, sizeof(chunk), err, err_info)) return FALSE; if (chunk[1]) { *err = WTAP_ERR_BAD_FILE; *err_info = g_strdup("dpa400: malformed packet"); return FALSE; } ws_buffer_append(buf, &chunk[0], 1); ctr++; rec->rec_type = REC_TYPE_PACKET; rec->presence_flags = WTAP_HAS_TS; rec->rec_header.packet_header.caplen = rec->rec_header.packet_header.len = ctr; break; } case DPA400_DATA: { struct dpa400_header hdr; guint8 from_source; if (!dpa400_read_header(fh, &hdr, err, err_info)) return FALSE; get_ts(&hdr, &rec->ts); from_source = !get_from(&hdr); ws_buffer_append(buf, &from_source, 1); ctr++; while (1) { if (!wtap_read_bytes_or_eof(fh, chunk, sizeof(chunk), err, err_info)) return FALSE; if (chunk[1]) break; if (++ctr > WTAP_MAX_PACKET_SIZE_STANDARD) { *err = WTAP_ERR_BAD_FILE; *err_info = g_strdup_printf("dpa400: File has data record bigger than maximum of %u", WTAP_MAX_PACKET_SIZE_STANDARD); return FALSE; } ws_buffer_append(buf, &chunk[0], 1); } rec->rec_type = REC_TYPE_PACKET; rec->presence_flags = WTAP_HAS_TS; rec->rec_header.packet_header.caplen = rec->rec_header.packet_header.len = ctr; break; } case DPA400_TS_OVERFLOW: { get_ts_overflow(&rec->ts); rec->rec_type = REC_TYPE_PACKET; rec->presence_flags = WTAP_HAS_TS; rec->rec_header.packet_header.caplen = rec->rec_header.packet_header.len = ctr; break; } default: *err = WTAP_ERR_BAD_FILE; *err_info = g_strdup_printf("dpa400: unknown packet type %02x", chunk[0]); return FALSE; } return TRUE; } static gboolean dpa400_seek_read(wtap *wth,gint64 seek_off, wtap_rec *rec, Buffer *buf, int *err, gchar **err_info) { if (file_seek(wth->random_fh, seek_off, SEEK_SET, err) == -1) return FALSE; return dpa400_read_packet(wth, wth->random_fh, rec, buf, err, err_info); } static gboolean dpa400_read(wtap *wth, wtap_rec *rec, Buffer *buf, int *err, gchar **err_info, gint64 *data_offset) { *data_offset = file_tell(wth->fh); return dpa400_read_packet(wth, wth->fh, rec, buf, err, err_info); } wtap_open_return_val dpa400_open(wtap *wth, int *err, gchar **err_info) { char magic[4]; const char dpa_magic[] = { 'D', 'B', 'F', 'R' }; /* Read in the number that should be at the start of a "dpa-400" file */ if (!wtap_read_bytes(wth->fh, &magic, sizeof magic, err, err_info)) { if (*err != WTAP_ERR_SHORT_READ) return WTAP_OPEN_ERROR; return WTAP_OPEN_NOT_MINE; } if (memcmp(magic, dpa_magic, sizeof(dpa_magic))) return WTAP_OPEN_NOT_MINE; wth->file_type_subtype = WTAP_FILE_TYPE_SUBTYPE_DPA400; wth->file_encap = WTAP_ENCAP_DPAUXMON; wth->file_tsprec = WTAP_TSPREC_USEC; wth->subtype_read = dpa400_read; wth->subtype_seek_read = dpa400_seek_read; wth->snapshot_length = 0; return WTAP_OPEN_MINE; }