tcpdump/print-msdp.c
Francois-Xavier Le Bail 02bdfdc471 MSDP: Modernize packet parsing
Use ND_ICHECK_U() in length/type tests and add an 'invalid' label.
Remove the 'trunc' label.
Move '#define ND_LONGJMP_FROM_TCHECK' just before '#include "netdissect.h"'
as for all other uses.
2024-09-10 06:40:36 +00:00

124 lines
3.1 KiB
C

/*
* Copyright (c) 2001 William C. Fenner.
* All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that: (1) source code
* distributions retain the above copyright notice and this paragraph
* in its entirety, and (2) distributions including binary code include
* the above copyright notice and this paragraph in its entirety in
* the documentation or other materials provided with the distribution.
* The name of William C. Fenner may not be used to endorse or
* promote products derived from this software without specific prior
* written permission. THIS SOFTWARE IS PROVIDED ``AS IS'' AND
* WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, WITHOUT
* LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
* FOR A PARTICULAR PURPOSE.
*/
/* \summary: Multicast Source Discovery Protocol (MSDP) printer */
#include <config.h>
#include "netdissect-stdinc.h"
#define ND_LONGJMP_FROM_TCHECK
#include "netdissect.h"
#include "addrtoname.h"
#include "extract.h"
#define MSDP_TYPE_MAX 7
void
msdp_print(netdissect_options *ndo, const u_char *sp, u_int length)
{
unsigned int type, len;
ndo->ndo_protocol = "msdp";
ND_PRINT(": ");
nd_print_protocol(ndo);
/* See if we think we're at the beginning of a compound packet */
type = GET_U_1(sp);
len = GET_BE_U_2(sp + 1);
ND_ICHECK_U(len, >, 1500);
ND_ICHECK_U(len, <, 3);
ND_ICHECK_U(type, ==, 0);
ND_ICHECK_U(type, >, MSDP_TYPE_MAX);
while (length != 0) {
unsigned int entry_count;
ND_ICHECK_U(length, <, 3);
type = GET_U_1(sp);
len = GET_BE_U_2(sp + 1);
if (len > 1400 || ndo->ndo_vflag)
ND_PRINT(" [len %u]", len);
ND_ICHECK_U(len, <, 3);
ND_ICHECK_U(length, <, len);
switch (type) {
case 1: /* IPv4 Source-Active */
case 3: /* IPv4 Source-Active Response */
if (type == 1)
ND_PRINT(" SA");
else
ND_PRINT(" SA-Response");
/* Entry Count */
ND_ICHECK_U(len, <, 4);
entry_count = GET_U_1(sp + 3);
ND_PRINT(" %u entries", entry_count);
/* RP Address */
ND_ICHECK_U(len, <, 8);
/* XXX -print this based on ndo_vflag? */
ND_TCHECK_LEN(sp + 4, 4);
/* Entries */
ND_TCHECK_LEN(sp + 8, entry_count*12);
if (len > (8 + entry_count*12)) {
/* Encapsulated IP packet */
ND_PRINT(" [w/data]");
if (ndo->ndo_vflag > 1) {
ND_PRINT(" ");
ip_print(ndo, sp + (8 + entry_count*12),
len - (8 + entry_count*12));
}
}
break;
case 2:
/* draft-ietf-msdp-spec-13 */
ND_PRINT(" SA-Request");
/* Reserved */
ND_ICHECK_U(len, <, 4);
ND_TCHECK_1(sp + 3);
/* Group Address */
ND_ICHECK_U(len, <, 8);
if (len != 8)
ND_PRINT("[len=%u] ", len);
ND_PRINT(" for %s", GET_IPADDR_STRING(sp + 4));
break;
case 4:
ND_PRINT(" Keepalive");
if (len != 3)
ND_PRINT("[len=%u] ", len);
break;
case 5:
ND_PRINT(" Notification");
break;
default:
ND_PRINT(" [type=%u len=%u]", type, len);
break;
}
ND_TCHECK_LEN(sp, len);
sp += len;
length -= len;
}
return;
invalid:
nd_print_invalid(ndo);
}