Improve markup.
[dragonfly.git] / contrib / tcpdump-3.9 / print-pgm.c
blobedaf93333e744303288ceb8b17d0dda4c245baa4
1 /*
2 * Redistribution and use in source and binary forms, with or without
3 * modification, are permitted provided that: (1) source code
4 * distributions retain the above copyright notice and this paragraph
5 * in its entirety, and (2) distributions including binary code include
6 * the above copyright notice and this paragraph in its entirety in
7 * the documentation or other materials provided with the distribution.
8 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND
9 * WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, WITHOUT
10 * LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
11 * FOR A PARTICULAR PURPOSE.
13 * Original code by Andy Heffernan (ahh@juniper.net)
16 #ifndef lint
17 static const char rcsid[] _U_ =
18 "@(#) $Header: /tcpdump/master/tcpdump/print-pgm.c,v 1.1.2.5 2005/06/07 22:06:16 guy Exp $";
19 #endif
21 #ifdef HAVE_CONFIG_H
22 #include "config.h"
23 #endif
25 #include <tcpdump-stdinc.h>
27 #include <stdio.h>
28 #include <stdlib.h>
29 #include <string.h>
31 #include "interface.h"
32 #include "extract.h"
33 #include "addrtoname.h"
35 #include "ip.h"
36 #ifdef INET6
37 #include "ip6.h"
38 #endif
39 #include "ipproto.h"
42 * PGM header (RFC 3208)
44 struct pgm_header {
45 u_int16_t pgm_sport;
46 u_int16_t pgm_dport;
47 u_int8_t pgm_type;
48 u_int8_t pgm_options;
49 u_int16_t pgm_sum;
50 u_int8_t pgm_gsid[6];
51 u_int16_t pgm_length;
54 struct pgm_spm {
55 u_int32_t pgms_seq;
56 u_int32_t pgms_trailseq;
57 u_int32_t pgms_leadseq;
58 u_int16_t pgms_nla_afi;
59 u_int16_t pgms_reserved;
60 /* ... u_int8_t pgms_nla[0]; */
61 /* ... options */
64 struct pgm_nak {
65 u_int32_t pgmn_seq;
66 u_int16_t pgmn_source_afi;
67 u_int16_t pgmn_reserved;
68 /* ... u_int8_t pgmn_source[0]; */
69 /* ... u_int16_t pgmn_group_afi */
70 /* ... u_int16_t pgmn_reserved2; */
71 /* ... u_int8_t pgmn_group[0]; */
72 /* ... options */
75 struct pgm_poll {
76 u_int32_t pgmp_seq;
77 u_int16_t pgmp_round;
78 u_int16_t pgmp_reserved;
79 /* ... options */
82 struct pgm_polr {
83 u_int32_t pgmp_seq;
84 u_int16_t pgmp_round;
85 u_int16_t pgmp_subtype;
86 u_int16_t pgmp_nla_afi;
87 u_int16_t pgmp_reserved;
88 /* ... u_int8_t pgmp_nla[0]; */
89 /* ... options */
92 struct pgm_data {
93 u_int32_t pgmd_seq;
94 u_int32_t pgmd_trailseq;
95 /* ... options */
98 typedef enum _pgm_type {
99 PGM_SPM = 0, /* source path message */
100 PGM_POLL = 1, /* POLL Request */
101 PGM_POLR = 2, /* POLL Response */
102 PGM_ODATA = 4, /* original data */
103 PGM_RDATA = 5, /* repair data */
104 PGM_NAK = 8, /* NAK */
105 PGM_NULLNAK = 9, /* Null NAK */
106 PGM_NCF = 10, /* NAK Confirmation */
107 PGM_ACK = 11, /* ACK for congestion control */
108 PGM_SPMR = 12, /* SPM request */
109 PGM_MAX = 255
110 } pgm_type;
112 #define PGM_OPT_BIT_PRESENT 0x01
113 #define PGM_OPT_BIT_NETWORK 0x02
114 #define PGM_OPT_BIT_VAR_PKTLEN 0x40
115 #define PGM_OPT_BIT_PARITY 0x80
117 #define PGM_OPT_LENGTH 0x00
118 #define PGM_OPT_FRAGMENT 0x01
119 #define PGM_OPT_NAK_LIST 0x02
120 #define PGM_OPT_JOIN 0x03
121 #define PGM_OPT_NAK_BO_IVL 0x04
122 #define PGM_OPT_NAK_BO_RNG 0x05
124 #define PGM_OPT_REDIRECT 0x07
125 #define PGM_OPT_PARITY_PRM 0x08
126 #define PGM_OPT_PARITY_GRP 0x09
127 #define PGM_OPT_CURR_TGSIZE 0x0A
128 #define PGM_OPT_NBR_UNREACH 0x0B
129 #define PGM_OPT_PATH_NLA 0x0C
131 #define PGM_OPT_SYN 0x0D
132 #define PGM_OPT_FIN 0x0E
133 #define PGM_OPT_RST 0x0F
134 #define PGM_OPT_CR 0x10
135 #define PGM_OPT_CRQST 0x11
137 #define PGM_OPT_MASK 0x7f
139 #define PGM_OPT_END 0x80 /* end of options marker */
141 #define PGM_MIN_OPT_LEN 4
143 #ifndef AFI_IP
144 #define AFI_IP 1
145 #define AFI_IP6 2
146 #endif
148 void
149 pgm_print(register const u_char *bp, register u_int length,
150 register const u_char *bp2)
152 register const struct pgm_header *pgm;
153 register const struct ip *ip;
154 register char ch;
155 u_int16_t sport, dport;
156 int addr_size;
157 const void *nla;
158 int nla_af;
159 #ifdef INET6
160 char nla_buf[INET6_ADDRSTRLEN];
161 register const struct ip6_hdr *ip6;
162 #else
163 char nla_buf[INET_ADDRSTRLEN];
164 #endif
165 u_int8_t opt_type, opt_len, flags1, flags2;
166 u_int32_t seq, opts_len, len, offset;
168 pgm = (struct pgm_header *)bp;
169 ip = (struct ip *)bp2;
170 #ifdef INET6
171 if (IP_V(ip) == 6)
172 ip6 = (struct ip6_hdr *)bp2;
173 else
174 ip6 = NULL;
175 #else /* INET6 */
176 if (IP_V(ip) == 6) {
177 (void)printf("Can't handle IPv6");
178 return;
180 #endif /* INET6 */
181 ch = '\0';
182 if (!TTEST(pgm->pgm_dport)) {
183 #ifdef INET6
184 if (ip6) {
185 (void)printf("%s > %s: [|pgm]",
186 ip6addr_string(&ip6->ip6_src),
187 ip6addr_string(&ip6->ip6_dst));
188 return;
189 } else
190 #endif /* INET6 */
192 (void)printf("%s > %s: [|pgm]",
193 ipaddr_string(&ip->ip_src),
194 ipaddr_string(&ip->ip_dst));
195 return;
199 sport = EXTRACT_16BITS(&pgm->pgm_sport);
200 dport = EXTRACT_16BITS(&pgm->pgm_dport);
202 #ifdef INET6
203 if (ip6) {
204 if (ip6->ip6_nxt == IPPROTO_PGM) {
205 (void)printf("%s.%s > %s.%s: ",
206 ip6addr_string(&ip6->ip6_src),
207 tcpport_string(sport),
208 ip6addr_string(&ip6->ip6_dst),
209 tcpport_string(dport));
210 } else {
211 (void)printf("%s > %s: ",
212 tcpport_string(sport), tcpport_string(dport));
214 } else
215 #endif /*INET6*/
217 if (ip->ip_p == IPPROTO_PGM) {
218 (void)printf("%s.%s > %s.%s: ",
219 ipaddr_string(&ip->ip_src),
220 tcpport_string(sport),
221 ipaddr_string(&ip->ip_dst),
222 tcpport_string(dport));
223 } else {
224 (void)printf("%s > %s: ",
225 tcpport_string(sport), tcpport_string(dport));
229 TCHECK(*pgm);
231 (void)printf("PGM, length %u", pgm->pgm_length);
233 if (!vflag)
234 return;
236 if (length > pgm->pgm_length)
237 length = pgm->pgm_length;
239 (void)printf(" 0x%02x%02x%02x%02x%02x%02x ",
240 pgm->pgm_gsid[0],
241 pgm->pgm_gsid[1],
242 pgm->pgm_gsid[2],
243 pgm->pgm_gsid[3],
244 pgm->pgm_gsid[4],
245 pgm->pgm_gsid[5]);
246 switch (pgm->pgm_type) {
247 case PGM_SPM: {
248 struct pgm_spm *spm;
250 spm = (struct pgm_spm *)(pgm + 1);
251 TCHECK(*spm);
253 switch (EXTRACT_16BITS(&spm->pgms_nla_afi)) {
254 case AFI_IP:
255 addr_size = sizeof(struct in_addr);
256 nla_af = AF_INET;
257 break;
258 #ifdef INET6
259 case AFI_IP6:
260 addr_size = sizeof(struct in6_addr);
261 nla_af = AF_INET6;
262 break;
263 #endif
264 default:
265 goto trunc;
266 break;
268 bp = (u_char *) (spm + 1);
269 TCHECK2(*bp, addr_size);
270 nla = bp;
271 bp += addr_size;
273 inet_ntop(nla_af, nla, nla_buf, sizeof(nla_buf));
274 (void)printf("SPM seq %u trail %u lead %u nla %s",
275 EXTRACT_32BITS(&spm->pgms_seq),
276 EXTRACT_32BITS(&spm->pgms_trailseq),
277 EXTRACT_32BITS(&spm->pgms_leadseq),
278 nla_buf);
279 break;
282 case PGM_POLL: {
283 struct pgm_poll *poll;
285 poll = (struct pgm_poll *)(pgm + 1);
286 TCHECK(*poll);
287 (void)printf("POLL seq %u round %u",
288 EXTRACT_32BITS(&poll->pgmp_seq),
289 EXTRACT_16BITS(&poll->pgmp_round));
290 bp = (u_char *) (poll + 1);
291 break;
293 case PGM_POLR: {
294 struct pgm_polr *polr;
295 u_int32_t ivl, rnd, mask;
297 polr = (struct pgm_polr *)(pgm + 1);
298 TCHECK(*polr);
300 switch (EXTRACT_16BITS(&polr->pgmp_nla_afi)) {
301 case AFI_IP:
302 addr_size = sizeof(struct in_addr);
303 nla_af = AF_INET;
304 break;
305 #ifdef INET6
306 case AFI_IP6:
307 addr_size = sizeof(struct in6_addr);
308 nla_af = AF_INET6;
309 break;
310 #endif
311 default:
312 goto trunc;
313 break;
315 bp = (u_char *) (polr + 1);
316 TCHECK2(*bp, addr_size);
317 nla = bp;
318 bp += addr_size;
320 inet_ntop(nla_af, nla, nla_buf, sizeof(nla_buf));
322 TCHECK2(*bp, sizeof(u_int32_t));
323 ivl = EXTRACT_32BITS(bp);
324 bp += sizeof(u_int32_t);
326 TCHECK2(*bp, sizeof(u_int32_t));
327 rnd = EXTRACT_32BITS(bp);
328 bp += sizeof(u_int32_t);
330 TCHECK2(*bp, sizeof(u_int32_t));
331 mask = EXTRACT_32BITS(bp);
332 bp += sizeof(u_int32_t);
334 (void)printf("POLR seq %u round %u nla %s ivl %u rnd 0x%08x "
335 "mask 0x%08x", EXTRACT_32BITS(&polr->pgmp_seq),
336 EXTRACT_16BITS(&polr->pgmp_round), nla_buf, ivl, rnd, mask);
337 break;
339 case PGM_ODATA: {
340 struct pgm_data *odata;
342 odata = (struct pgm_data *)(pgm + 1);
343 TCHECK(*odata);
344 (void)printf("ODATA trail %u seq %u",
345 EXTRACT_32BITS(&odata->pgmd_trailseq),
346 EXTRACT_32BITS(&odata->pgmd_seq));
347 bp = (u_char *) (odata + 1);
348 break;
351 case PGM_RDATA: {
352 struct pgm_data *rdata;
354 rdata = (struct pgm_data *)(pgm + 1);
355 TCHECK(*rdata);
356 (void)printf("RDATA trail %u seq %u",
357 EXTRACT_32BITS(&rdata->pgmd_trailseq),
358 EXTRACT_32BITS(&rdata->pgmd_seq));
359 bp = (u_char *) (rdata + 1);
360 break;
363 case PGM_NAK:
364 case PGM_NULLNAK:
365 case PGM_NCF: {
366 struct pgm_nak *nak;
367 const void *source, *group;
368 int source_af, group_af;
369 #ifdef INET6
370 char source_buf[INET6_ADDRSTRLEN], group_buf[INET6_ADDRSTRLEN];
371 #else
372 char source_buf[INET_ADDRSTRLEN], group_buf[INET_ADDRSTRLEN];
373 #endif
375 nak = (struct pgm_nak *)(pgm + 1);
376 TCHECK(*nak);
379 * Skip past the source, saving info along the way
380 * and stopping if we don't have enough.
382 switch (EXTRACT_16BITS(&nak->pgmn_source_afi)) {
383 case AFI_IP:
384 addr_size = sizeof(struct in_addr);
385 source_af = AF_INET;
386 break;
387 #ifdef INET6
388 case AFI_IP6:
389 addr_size = sizeof(struct in6_addr);
390 source_af = AF_INET6;
391 break;
392 #endif
393 default:
394 goto trunc;
395 break;
397 bp = (u_char *) (nak + 1);
398 TCHECK2(*bp, addr_size);
399 source = bp;
400 bp += addr_size;
403 * Skip past the group, saving info along the way
404 * and stopping if we don't have enough.
406 switch (EXTRACT_16BITS(bp)) {
407 case AFI_IP:
408 addr_size = sizeof(struct in_addr);
409 group_af = AF_INET;
410 break;
411 #ifdef INET6
412 case AFI_IP6:
413 addr_size = sizeof(struct in6_addr);
414 group_af = AF_INET6;
415 break;
416 #endif
417 default:
418 goto trunc;
419 break;
421 bp += (2 * sizeof(u_int16_t));
422 TCHECK2(*bp, addr_size);
423 group = bp;
424 bp += addr_size;
427 * Options decoding can go here.
429 inet_ntop(source_af, source, source_buf, sizeof(source_buf));
430 inet_ntop(group_af, group, group_buf, sizeof(group_buf));
431 switch (pgm->pgm_type) {
432 case PGM_NAK:
433 (void)printf("NAK ");
434 break;
435 case PGM_NULLNAK:
436 (void)printf("NNAK ");
437 break;
438 case PGM_NCF:
439 (void)printf("NCF ");
440 break;
441 default:
442 break;
444 (void)printf("(%s -> %s), seq %u",
445 source_buf, group_buf, EXTRACT_32BITS(&nak->pgmn_seq));
446 break;
449 case PGM_SPMR:
450 (void)printf("SPMR");
451 break;
453 default:
454 (void)printf("UNKNOWN type %0x02x", pgm->pgm_type);
455 break;
458 if (pgm->pgm_options & PGM_OPT_BIT_PRESENT) {
461 * make sure there's enough for the first option header
463 if (!TTEST2(*bp, PGM_MIN_OPT_LEN)) {
464 (void)printf("[|OPT]");
465 return;
469 * That option header MUST be an OPT_LENGTH option
470 * (see the first paragraph of section 9.1 in RFC 3208).
472 opt_type = *bp++;
473 if ((opt_type & PGM_OPT_MASK) != PGM_OPT_LENGTH) {
474 (void)printf("[First option bad, should be PGM_OPT_LENGTH, is %u]", opt_type & PGM_OPT_MASK);
475 return;
477 opt_len = *bp++;
478 if (opt_len != 4) {
479 (void)printf("[Bad OPT_LENGTH option, length %u != 4]", opt_len);
480 return;
482 opts_len = EXTRACT_16BITS(bp);
483 if (opts_len < 4) {
484 (void)printf("[Bad total option length %u < 4]", opts_len);
485 return;
487 bp += sizeof(u_int16_t);
488 (void)printf(" OPTS LEN %d", opts_len);
489 opts_len -= 4;
491 while (opts_len) {
492 if (opts_len < PGM_MIN_OPT_LEN) {
493 (void)printf("[Total option length leaves no room for final option]");
494 return;
496 opt_type = *bp++;
497 opt_len = *bp++;
498 if (opt_len < PGM_MIN_OPT_LEN) {
499 (void)printf("[Bad option, length %u < %u]", opt_len,
500 PGM_MIN_OPT_LEN);
501 break;
503 if (opts_len < opt_len) {
504 (void)printf("[Total option length leaves no room for final option]");
505 return;
507 if (!TTEST2(*bp, opt_len - 2)) {
508 (void)printf(" [|OPT]");
509 return;
512 switch (opt_type & PGM_OPT_MASK) {
513 case PGM_OPT_LENGTH:
514 if (opt_len != 4) {
515 (void)printf("[Bad OPT_LENGTH option, length %u != 4]", opt_len);
516 return;
518 (void)printf(" OPTS LEN (extra?) %d", EXTRACT_16BITS(bp));
519 bp += sizeof(u_int16_t);
520 opts_len -= 4;
521 break;
523 case PGM_OPT_FRAGMENT:
524 if (opt_len != 16) {
525 (void)printf("[Bad OPT_FRAGMENT option, length %u != 16]", opt_len);
526 return;
528 flags1 = *bp++;
529 flags2 = *bp++;
530 seq = EXTRACT_32BITS(bp);
531 bp += sizeof(u_int32_t);
532 offset = EXTRACT_32BITS(bp);
533 bp += sizeof(u_int32_t);
534 len = EXTRACT_32BITS(bp);
535 bp += sizeof(u_int32_t);
536 (void)printf(" FRAG seq %u off %u len %u", seq, offset, len);
537 opts_len -= 16;
538 break;
540 case PGM_OPT_NAK_LIST:
541 flags1 = *bp++;
542 flags2 = *bp++;
543 opt_len -= sizeof(u_int32_t); /* option header */
544 (void)printf(" NAK LIST");
545 while (opt_len) {
546 if (opt_len < sizeof(u_int32_t)) {
547 (void)printf("[Option length not a multiple of 4]");
548 return;
550 TCHECK2(*bp, sizeof(u_int32_t));
551 (void)printf(" %u", EXTRACT_32BITS(bp));
552 bp += sizeof(u_int32_t);
553 opt_len -= sizeof(u_int32_t);
554 opts_len -= sizeof(u_int32_t);
556 break;
558 case PGM_OPT_JOIN:
559 if (opt_len != 8) {
560 (void)printf("[Bad OPT_JOIN option, length %u != 8]", opt_len);
561 return;
563 flags1 = *bp++;
564 flags2 = *bp++;
565 seq = EXTRACT_32BITS(bp);
566 bp += sizeof(u_int32_t);
567 (void)printf(" JOIN %u", seq);
568 opts_len -= 8;
569 break;
571 case PGM_OPT_NAK_BO_IVL:
572 if (opt_len != 12) {
573 (void)printf("[Bad OPT_NAK_BO_IVL option, length %u != 12]", opt_len);
574 return;
576 flags1 = *bp++;
577 flags2 = *bp++;
578 offset = EXTRACT_32BITS(bp);
579 bp += sizeof(u_int32_t);
580 seq = EXTRACT_32BITS(bp);
581 bp += sizeof(u_int32_t);
582 (void)printf(" BACKOFF ivl %u ivlseq %u", offset, seq);
583 opts_len -= 12;
584 break;
586 case PGM_OPT_NAK_BO_RNG:
587 if (opt_len != 12) {
588 (void)printf("[Bad OPT_NAK_BO_RNG option, length %u != 12]", opt_len);
589 return;
591 flags1 = *bp++;
592 flags2 = *bp++;
593 offset = EXTRACT_32BITS(bp);
594 bp += sizeof(u_int32_t);
595 seq = EXTRACT_32BITS(bp);
596 bp += sizeof(u_int32_t);
597 (void)printf(" BACKOFF max %u min %u", offset, seq);
598 opts_len -= 12;
599 break;
601 case PGM_OPT_REDIRECT:
602 flags1 = *bp++;
603 flags2 = *bp++;
604 switch (EXTRACT_16BITS(bp)) {
605 case AFI_IP:
606 addr_size = sizeof(struct in_addr);
607 nla_af = AF_INET;
608 break;
609 #ifdef INET6
610 case AFI_IP6:
611 addr_size = sizeof(struct in6_addr);
612 nla_af = AF_INET6;
613 break;
614 #endif
615 default:
616 goto trunc;
617 break;
619 bp += (2 * sizeof(u_int16_t));
620 if (opt_len != 4 + addr_size) {
621 (void)printf("[Bad OPT_REDIRECT option, length %u != 4 + address size]", opt_len);
622 return;
624 TCHECK2(*bp, addr_size);
625 nla = bp;
626 bp += addr_size;
628 inet_ntop(nla_af, nla, nla_buf, sizeof(nla_buf));
629 (void)printf(" REDIRECT %s", (char *)nla);
630 opts_len -= 4 + addr_size;
631 break;
633 case PGM_OPT_PARITY_PRM:
634 if (opt_len != 8) {
635 (void)printf("[Bad OPT_PARITY_PRM option, length %u != 8]", opt_len);
636 return;
638 flags1 = *bp++;
639 flags2 = *bp++;
640 len = EXTRACT_32BITS(bp);
641 bp += sizeof(u_int32_t);
642 (void)printf(" PARITY MAXTGS %u", len);
643 opts_len -= 8;
644 break;
646 case PGM_OPT_PARITY_GRP:
647 if (opt_len != 8) {
648 (void)printf("[Bad OPT_PARITY_GRP option, length %u != 8]", opt_len);
649 return;
651 flags1 = *bp++;
652 flags2 = *bp++;
653 seq = EXTRACT_32BITS(bp);
654 bp += sizeof(u_int32_t);
655 (void)printf(" PARITY GROUP %u", seq);
656 opts_len -= 8;
657 break;
659 case PGM_OPT_CURR_TGSIZE:
660 if (opt_len != 8) {
661 (void)printf("[Bad OPT_CURR_TGSIZE option, length %u != 8]", opt_len);
662 return;
664 flags1 = *bp++;
665 flags2 = *bp++;
666 len = EXTRACT_32BITS(bp);
667 bp += sizeof(u_int32_t);
668 (void)printf(" PARITY ATGS %u", len);
669 opts_len -= 8;
670 break;
672 case PGM_OPT_NBR_UNREACH:
673 if (opt_len != 4) {
674 (void)printf("[Bad OPT_NBR_UNREACH option, length %u != 4]", opt_len);
675 return;
677 flags1 = *bp++;
678 flags2 = *bp++;
679 (void)printf(" NBR_UNREACH");
680 opts_len -= 4;
681 break;
683 case PGM_OPT_PATH_NLA:
684 (void)printf(" PATH_NLA [%d]", opt_len);
685 bp += opt_len;
686 opts_len -= opt_len;
687 break;
689 case PGM_OPT_SYN:
690 if (opt_len != 4) {
691 (void)printf("[Bad OPT_SYN option, length %u != 4]", opt_len);
692 return;
694 flags1 = *bp++;
695 flags2 = *bp++;
696 (void)printf(" SYN");
697 opts_len -= 4;
698 break;
700 case PGM_OPT_FIN:
701 if (opt_len != 4) {
702 (void)printf("[Bad OPT_FIN option, length %u != 4]", opt_len);
703 return;
705 flags1 = *bp++;
706 flags2 = *bp++;
707 (void)printf(" FIN");
708 opts_len -= 4;
709 break;
711 case PGM_OPT_RST:
712 if (opt_len != 4) {
713 (void)printf("[Bad OPT_RST option, length %u != 4]", opt_len);
714 return;
716 flags1 = *bp++;
717 flags2 = *bp++;
718 (void)printf(" RST");
719 opts_len -= 4;
720 break;
722 case PGM_OPT_CR:
723 (void)printf(" CR");
724 bp += opt_len;
725 opts_len -= opt_len;
726 break;
728 case PGM_OPT_CRQST:
729 if (opt_len != 4) {
730 (void)printf("[Bad OPT_CRQST option, length %u != 4]", opt_len);
731 return;
733 flags1 = *bp++;
734 flags2 = *bp++;
735 (void)printf(" CRQST");
736 opts_len -= 4;
737 break;
739 default:
740 (void)printf(" OPT_%02X [%d] ", opt_type, opt_len);
741 bp += opt_len;
742 opts_len -= opt_len;
743 break;
746 if (opt_type & PGM_OPT_END)
747 break;
751 (void)printf(" [%u]", EXTRACT_16BITS(&pgm->pgm_length));
753 return;
755 trunc:
756 fputs("[|pgm]", stdout);
757 if (ch != '\0')
758 putchar('>');