]> The Tcpdump Group git mirrors - tcpdump/blob - print-ldp.c
1e8f87d3429afdd57f68f99c53baabbc02087240
[tcpdump] / print-ldp.c
1 /*
2 * Redistribution and use in source and binary forms, with or without
3 * modification, are permitted provided that: (1) source code
4 * distributions retain the above copyright notice and this paragraph
5 * in its entirety, and (2) distributions including binary code include
6 * the above copyright notice and this paragraph in its entirety in
7 * the documentation or other materials provided with the distribution.
8 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND
9 * WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, WITHOUT
10 * LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
11 * FOR A PARTICULAR PURPOSE.
12 *
13 * Original code by Hannes Gredler (hannes@gredler.at)
14 * and Steinar Haug (sthaug@nethelp.no)
15 */
16
17 /* \summary: Label Distribution Protocol (LDP) printer */
18
19 #ifdef HAVE_CONFIG_H
20 #include <config.h>
21 #endif
22
23 #include "netdissect-stdinc.h"
24
25 #include "netdissect.h"
26 #include "extract.h"
27 #include "addrtoname.h"
28
29 #include "l2vpn.h"
30 #include "af.h"
31
32
33 /*
34 * ldp common header
35 *
36 * 0 1 2 3
37 * 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
38 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
39 * | Version | PDU Length |
40 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
41 * | LDP Identifier |
42 * + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
43 * | |
44 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
45 *
46 */
47
48 struct ldp_common_header {
49 nd_uint16_t version;
50 nd_uint16_t pdu_length;
51 nd_ipv4 lsr_id;
52 nd_uint16_t label_space;
53 };
54
55 #define LDP_VERSION 1
56
57 /*
58 * ldp message header
59 *
60 * 0 1 2 3
61 * 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
62 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
63 * |U| Message Type | Message Length |
64 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
65 * | Message ID |
66 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
67 * | |
68 * + +
69 * | Mandatory Parameters |
70 * + +
71 * | |
72 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
73 * | |
74 * + +
75 * | Optional Parameters |
76 * + +
77 * | |
78 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
79 */
80
81 struct ldp_msg_header {
82 nd_uint16_t type;
83 nd_uint16_t length;
84 nd_uint32_t id;
85 };
86
87 #define LDP_MASK_MSG_TYPE(x) ((x)&0x7fff)
88 #define LDP_MASK_U_BIT(x) ((x)&0x8000)
89
90 #define LDP_MSG_NOTIF 0x0001
91 #define LDP_MSG_HELLO 0x0100
92 #define LDP_MSG_INIT 0x0200
93 #define LDP_MSG_KEEPALIVE 0x0201
94 #define LDP_MSG_ADDRESS 0x0300
95 #define LDP_MSG_ADDRESS_WITHDRAW 0x0301
96 #define LDP_MSG_LABEL_MAPPING 0x0400
97 #define LDP_MSG_LABEL_REQUEST 0x0401
98 #define LDP_MSG_LABEL_WITHDRAW 0x0402
99 #define LDP_MSG_LABEL_RELEASE 0x0403
100 #define LDP_MSG_LABEL_ABORT_REQUEST 0x0404
101
102 #define LDP_VENDOR_PRIVATE_MIN 0x3e00
103 #define LDP_VENDOR_PRIVATE_MAX 0x3eff
104 #define LDP_EXPERIMENTAL_MIN 0x3f00
105 #define LDP_EXPERIMENTAL_MAX 0x3fff
106
107 static const struct tok ldp_msg_values[] = {
108 { LDP_MSG_NOTIF, "Notification" },
109 { LDP_MSG_HELLO, "Hello" },
110 { LDP_MSG_INIT, "Initialization" },
111 { LDP_MSG_KEEPALIVE, "Keepalive" },
112 { LDP_MSG_ADDRESS, "Address" },
113 { LDP_MSG_ADDRESS_WITHDRAW, "Address Withdraw" },
114 { LDP_MSG_LABEL_MAPPING, "Label Mapping" },
115 { LDP_MSG_LABEL_REQUEST, "Label Request" },
116 { LDP_MSG_LABEL_WITHDRAW, "Label Withdraw" },
117 { LDP_MSG_LABEL_RELEASE, "Label Release" },
118 { LDP_MSG_LABEL_ABORT_REQUEST, "Label Abort Request" },
119 { 0, NULL}
120 };
121
122 #define LDP_MASK_TLV_TYPE(x) ((x)&0x3fff)
123 #define LDP_MASK_F_BIT(x) ((x)&0x4000)
124
125 #define LDP_TLV_FEC 0x0100
126 #define LDP_TLV_ADDRESS_LIST 0x0101
127 #define LDP_TLV_ADDRESS_LIST_AFNUM_LEN 2
128 #define LDP_TLV_HOP_COUNT 0x0103
129 #define LDP_TLV_PATH_VECTOR 0x0104
130 #define LDP_TLV_GENERIC_LABEL 0x0200
131 #define LDP_TLV_ATM_LABEL 0x0201
132 #define LDP_TLV_FR_LABEL 0x0202
133 #define LDP_TLV_STATUS 0x0300
134 #define LDP_TLV_EXTD_STATUS 0x0301
135 #define LDP_TLV_RETURNED_PDU 0x0302
136 #define LDP_TLV_RETURNED_MSG 0x0303
137 #define LDP_TLV_COMMON_HELLO 0x0400
138 #define LDP_TLV_IPV4_TRANSPORT_ADDR 0x0401
139 #define LDP_TLV_CONFIG_SEQ_NUMBER 0x0402
140 #define LDP_TLV_IPV6_TRANSPORT_ADDR 0x0403
141 #define LDP_TLV_COMMON_SESSION 0x0500
142 #define LDP_TLV_ATM_SESSION_PARM 0x0501
143 #define LDP_TLV_FR_SESSION_PARM 0x0502
144 #define LDP_TLV_FT_SESSION 0x0503
145 #define LDP_TLV_LABEL_REQUEST_MSG_ID 0x0600
146 #define LDP_TLV_MTU 0x0601 /* rfc 3988 */
147 #define LDP_TLV_DUAL_STACK_CAP 0x0701 /* rfc 7552 */
148
149 static const struct tok ldp_tlv_values[] = {
150 { LDP_TLV_FEC, "FEC" },
151 { LDP_TLV_ADDRESS_LIST, "Address List" },
152 { LDP_TLV_HOP_COUNT, "Hop Count" },
153 { LDP_TLV_PATH_VECTOR, "Path Vector" },
154 { LDP_TLV_GENERIC_LABEL, "Generic Label" },
155 { LDP_TLV_ATM_LABEL, "ATM Label" },
156 { LDP_TLV_FR_LABEL, "Frame-Relay Label" },
157 { LDP_TLV_STATUS, "Status" },
158 { LDP_TLV_EXTD_STATUS, "Extended Status" },
159 { LDP_TLV_RETURNED_PDU, "Returned PDU" },
160 { LDP_TLV_RETURNED_MSG, "Returned Message" },
161 { LDP_TLV_COMMON_HELLO, "Common Hello Parameters" },
162 { LDP_TLV_IPV4_TRANSPORT_ADDR, "IPv4 Transport Address" },
163 { LDP_TLV_CONFIG_SEQ_NUMBER, "Configuration Sequence Number" },
164 { LDP_TLV_IPV6_TRANSPORT_ADDR, "IPv6 Transport Address" },
165 { LDP_TLV_COMMON_SESSION, "Common Session Parameters" },
166 { LDP_TLV_ATM_SESSION_PARM, "ATM Session Parameters" },
167 { LDP_TLV_FR_SESSION_PARM, "Frame-Relay Session Parameters" },
168 { LDP_TLV_FT_SESSION, "Fault-Tolerant Session Parameters" },
169 { LDP_TLV_LABEL_REQUEST_MSG_ID, "Label Request Message ID" },
170 { LDP_TLV_MTU, "MTU" },
171 { LDP_TLV_DUAL_STACK_CAP, "Dual-Stack Capability" },
172 { 0, NULL}
173 };
174
175 #define LDP_FEC_WILDCARD 0x01
176 #define LDP_FEC_PREFIX 0x02
177 #define LDP_FEC_HOSTADDRESS 0x03
178 /* From RFC 4906; should probably be updated to RFC 4447 (e.g., VC -> PW) */
179 #define LDP_FEC_MARTINI_VC 0x80
180
181 static const struct tok ldp_fec_values[] = {
182 { LDP_FEC_WILDCARD, "Wildcard" },
183 { LDP_FEC_PREFIX, "Prefix" },
184 { LDP_FEC_HOSTADDRESS, "Host address" },
185 { LDP_FEC_MARTINI_VC, "Martini VC" },
186 { 0, NULL}
187 };
188
189 #define LDP_FEC_MARTINI_IFPARM_MTU 0x01
190 #define LDP_FEC_MARTINI_IFPARM_DESC 0x03
191 #define LDP_FEC_MARTINI_IFPARM_VCCV 0x0c
192
193 static const struct tok ldp_fec_martini_ifparm_values[] = {
194 { LDP_FEC_MARTINI_IFPARM_MTU, "MTU" },
195 { LDP_FEC_MARTINI_IFPARM_DESC, "Description" },
196 { LDP_FEC_MARTINI_IFPARM_VCCV, "VCCV" },
197 { 0, NULL}
198 };
199
200 /* draft-ietf-pwe3-vccv-04.txt */
201 static const struct tok ldp_fec_martini_ifparm_vccv_cc_values[] = {
202 { 0x01, "PWE3 control word" },
203 { 0x02, "MPLS Router Alert Label" },
204 { 0x04, "MPLS inner label TTL = 1" },
205 { 0, NULL}
206 };
207
208 /* draft-ietf-pwe3-vccv-04.txt */
209 static const struct tok ldp_fec_martini_ifparm_vccv_cv_values[] = {
210 { 0x01, "ICMP Ping" },
211 { 0x02, "LSP Ping" },
212 { 0x04, "BFD" },
213 { 0, NULL}
214 };
215
216 /* rfc 7552 */
217 #define LDP_DUAL_STACK_TRANSPORT_PREF_IPV4 0x40
218 #define LDP_DUAL_STACK_TRANSPORT_PREF_IPV6 0x60
219
220 static const struct tok ldp_dual_stack_transport_pref_values[] = {
221 { LDP_DUAL_STACK_TRANSPORT_PREF_IPV4, "IPv4" },
222 { LDP_DUAL_STACK_TRANSPORT_PREF_IPV6, "IPv6" },
223 { 0, NULL}
224 };
225
226 static u_int ldp_pdu_print(netdissect_options *, const u_char *);
227
228 /*
229 * ldp tlv header
230 *
231 * 0 1 2 3
232 * 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
233 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
234 * |U|F| Type | Length |
235 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
236 * | |
237 * | Value |
238 * ~ ~
239 * | |
240 * | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
241 * | |
242 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
243 */
244
245 #define TLV_TCHECK(minlen) \
246 if (tlv_tlen < minlen) { \
247 ND_PRINT(" [tlv length %u < %u]", tlv_tlen, minlen); \
248 nd_print_invalid(ndo); \
249 goto invalid; \
250 }
251
252 static u_int
253 ldp_tlv_print(netdissect_options *ndo,
254 const u_char *tptr,
255 u_int msg_tlen)
256 {
257 struct ldp_tlv_header {
258 nd_uint16_t type;
259 nd_uint16_t length;
260 };
261
262 const struct ldp_tlv_header *ldp_tlv_header;
263 u_short tlv_type,tlv_len,tlv_tlen,af,ft_flags;
264 u_char fec_type, transport_pref;
265 u_int ui,vc_info_len, vc_info_tlv_type, vc_info_tlv_len,idx;
266 char buf[100];
267 int i;
268
269 ldp_tlv_header = (const struct ldp_tlv_header *)tptr;
270 ND_TCHECK_SIZE(ldp_tlv_header);
271 tlv_len=GET_BE_U_2(ldp_tlv_header->length);
272 if (tlv_len + 4U > msg_tlen) {
273 ND_PRINT("\n\t\t TLV contents go past end of message");
274 return 0;
275 }
276 tlv_tlen=tlv_len;
277 tlv_type=LDP_MASK_TLV_TYPE(GET_BE_U_2(ldp_tlv_header->type));
278
279 /* FIXME vendor private / experimental check */
280 ND_PRINT("\n\t %s TLV (0x%04x), length: %u, Flags: [%s and %s forward if unknown]",
281 tok2str(ldp_tlv_values,
282 "Unknown",
283 tlv_type),
284 tlv_type,
285 tlv_len,
286 LDP_MASK_U_BIT(GET_BE_U_2(ldp_tlv_header->type)) ? "continue processing" : "ignore",
287 LDP_MASK_F_BIT(GET_BE_U_2(ldp_tlv_header->type)) ? "do" : "don't");
288
289 tptr+=sizeof(struct ldp_tlv_header);
290
291 switch(tlv_type) {
292
293 case LDP_TLV_COMMON_HELLO:
294 TLV_TCHECK(4);
295 ND_PRINT("\n\t Hold Time: %us, Flags: [%s Hello%s]",
296 GET_BE_U_2(tptr),
297 (GET_BE_U_2(tptr + 2)&0x8000) ? "Targeted" : "Link",
298 (GET_BE_U_2(tptr + 2)&0x4000) ? ", Request for targeted Hellos" : "");
299 break;
300
301 case LDP_TLV_IPV4_TRANSPORT_ADDR:
302 TLV_TCHECK(4);
303 ND_PRINT("\n\t IPv4 Transport Address: %s", GET_IPADDR_STRING(tptr));
304 break;
305 case LDP_TLV_IPV6_TRANSPORT_ADDR:
306 TLV_TCHECK(16);
307 ND_PRINT("\n\t IPv6 Transport Address: %s", GET_IP6ADDR_STRING(tptr));
308 break;
309 case LDP_TLV_CONFIG_SEQ_NUMBER:
310 TLV_TCHECK(4);
311 ND_PRINT("\n\t Sequence Number: %u", GET_BE_U_4(tptr));
312 break;
313
314 case LDP_TLV_ADDRESS_LIST:
315 TLV_TCHECK(LDP_TLV_ADDRESS_LIST_AFNUM_LEN);
316 af = GET_BE_U_2(tptr);
317 tptr+=LDP_TLV_ADDRESS_LIST_AFNUM_LEN;
318 tlv_tlen -= LDP_TLV_ADDRESS_LIST_AFNUM_LEN;
319 ND_PRINT("\n\t Address Family: %s, addresses",
320 tok2str(af_values, "Unknown (%u)", af));
321 switch (af) {
322 case AFNUM_IP:
323 while(tlv_tlen >= sizeof(nd_ipv4)) {
324 ND_PRINT(" %s", GET_IPADDR_STRING(tptr));
325 tlv_tlen-=sizeof(nd_ipv4);
326 tptr+=sizeof(nd_ipv4);
327 }
328 break;
329 case AFNUM_IP6:
330 while(tlv_tlen >= sizeof(nd_ipv6)) {
331 ND_PRINT(" %s", GET_IP6ADDR_STRING(tptr));
332 tlv_tlen-=sizeof(nd_ipv6);
333 tptr+=sizeof(nd_ipv6);
334 }
335 break;
336 default:
337 /* unknown AF */
338 break;
339 }
340 break;
341
342 case LDP_TLV_COMMON_SESSION:
343 TLV_TCHECK(14);
344 ND_PRINT("\n\t Version: %u, Keepalive: %us, Flags: [Downstream %s, Loop Detection %s]",
345 GET_BE_U_2(tptr), GET_BE_U_2(tptr + 2),
346 (GET_BE_U_2(tptr + 4)&0x8000) ? "On Demand" : "Unsolicited",
347 (GET_BE_U_2(tptr + 4)&0x4000) ? "Enabled" : "Disabled"
348 );
349 ND_PRINT("\n\t Path Vector Limit %u, Max-PDU length: %u, Receiver Label-Space-ID %s:%u",
350 GET_U_1(tptr+5),
351 GET_BE_U_2(tptr+6),
352 GET_IPADDR_STRING(tptr+8),
353 GET_BE_U_2(tptr+12)
354 );
355 break;
356
357 case LDP_TLV_FEC:
358 TLV_TCHECK(1);
359 fec_type = GET_U_1(tptr);
360 ND_PRINT("\n\t %s FEC (0x%02x)",
361 tok2str(ldp_fec_values, "Unknown", fec_type),
362 fec_type);
363
364 tptr+=1;
365 tlv_tlen-=1;
366 switch(fec_type) {
367
368 case LDP_FEC_WILDCARD:
369 break;
370 case LDP_FEC_PREFIX:
371 TLV_TCHECK(2);
372 af = GET_BE_U_2(tptr);
373 tptr+=2;
374 tlv_tlen-=2;
375 if (af == AFNUM_IP) {
376 i=decode_prefix4(ndo, tptr, tlv_tlen, buf, sizeof(buf));
377 if (i == -2)
378 goto trunc;
379 if (i == -3)
380 ND_PRINT(": IPv4 prefix (goes past end of TLV)");
381 else if (i == -1)
382 ND_PRINT(": IPv4 prefix (invalid length)");
383 else
384 ND_PRINT(": IPv4 prefix %s", buf);
385 } else if (af == AFNUM_IP6) {
386 i=decode_prefix6(ndo, tptr, tlv_tlen, buf, sizeof(buf));
387 if (i == -2)
388 goto trunc;
389 if (i == -3)
390 ND_PRINT(": IPv4 prefix (goes past end of TLV)");
391 else if (i == -1)
392 ND_PRINT(": IPv6 prefix (invalid length)");
393 else
394 ND_PRINT(": IPv6 prefix %s", buf);
395 } else
396 ND_PRINT(": Address family %u prefix", af);
397 break;
398 case LDP_FEC_HOSTADDRESS:
399 break;
400 case LDP_FEC_MARTINI_VC:
401 /*
402 * We assume the type was supposed to be one of the MPLS
403 * Pseudowire Types.
404 */
405 TLV_TCHECK(7);
406 vc_info_len = GET_U_1(tptr + 2);
407
408 /*
409 * According to RFC 4908, the VC info Length field can be zero,
410 * in which case not only are there no interface parameters,
411 * there's no VC ID.
412 */
413 if (vc_info_len == 0) {
414 ND_PRINT(": %s, %scontrol word, group-ID %u, VC-info-length: %u",
415 tok2str(mpls_pw_types_values, "Unknown", GET_BE_U_2(tptr)&0x7fff),
416 GET_BE_U_2(tptr)&0x8000 ? "" : "no ",
417 GET_BE_U_4(tptr + 3),
418 vc_info_len);
419 break;
420 }
421
422 /* Make sure we have the VC ID as well */
423 TLV_TCHECK(11);
424 ND_PRINT(": %s, %scontrol word, group-ID %u, VC-ID %u, VC-info-length: %u",
425 tok2str(mpls_pw_types_values, "Unknown", GET_BE_U_2(tptr)&0x7fff),
426 GET_BE_U_2(tptr)&0x8000 ? "" : "no ",
427 GET_BE_U_4(tptr + 3),
428 GET_BE_U_4(tptr + 7),
429 vc_info_len);
430 if (vc_info_len < 4) {
431 /* minimum 4, for the VC ID */
432 ND_PRINT(" (invalid, < 4");
433 return(tlv_len+4); /* Type & Length fields not included */
434 }
435 vc_info_len -= 4; /* subtract out the VC ID, giving the length of the interface parameters */
436
437 /* Skip past the fixed information and the VC ID */
438 tptr+=11;
439 tlv_tlen-=11;
440 TLV_TCHECK(vc_info_len);
441
442 while (vc_info_len > 2) {
443 vc_info_tlv_type = GET_U_1(tptr);
444 vc_info_tlv_len = GET_U_1(tptr + 1);
445 if (vc_info_tlv_len < 2)
446 break;
447 if (vc_info_len < vc_info_tlv_len)
448 break;
449
450 ND_PRINT("\n\t\tInterface Parameter: %s (0x%02x), len %u",
451 tok2str(ldp_fec_martini_ifparm_values,"Unknown",vc_info_tlv_type),
452 vc_info_tlv_type,
453 vc_info_tlv_len);
454
455 switch(vc_info_tlv_type) {
456 case LDP_FEC_MARTINI_IFPARM_MTU:
457 ND_PRINT(": %u", GET_BE_U_2(tptr + 2));
458 break;
459
460 case LDP_FEC_MARTINI_IFPARM_DESC:
461 ND_PRINT(": ");
462 for (idx = 2; idx < vc_info_tlv_len; idx++)
463 fn_print_char(ndo, GET_U_1(tptr + idx));
464 break;
465
466 case LDP_FEC_MARTINI_IFPARM_VCCV:
467 ND_PRINT("\n\t\t Control Channels (0x%02x) = [%s]",
468 GET_U_1((tptr + 2)),
469 bittok2str(ldp_fec_martini_ifparm_vccv_cc_values, "none", GET_U_1((tptr + 2))));
470 ND_PRINT("\n\t\t CV Types (0x%02x) = [%s]",
471 GET_U_1((tptr + 3)),
472 bittok2str(ldp_fec_martini_ifparm_vccv_cv_values, "none", GET_U_1((tptr + 3))));
473 break;
474
475 default:
476 print_unknown_data(ndo, tptr+2, "\n\t\t ", vc_info_tlv_len-2);
477 break;
478 }
479
480 vc_info_len -= vc_info_tlv_len;
481 tptr += vc_info_tlv_len;
482 }
483 break;
484 }
485
486 break;
487
488 case LDP_TLV_GENERIC_LABEL:
489 TLV_TCHECK(4);
490 ND_PRINT("\n\t Label: %u", GET_BE_U_4(tptr) & 0xfffff);
491 break;
492
493 case LDP_TLV_STATUS:
494 TLV_TCHECK(8);
495 ui = GET_BE_U_4(tptr);
496 tptr+=4;
497 ND_PRINT("\n\t Status: 0x%02x, Flags: [%s and %s forward]",
498 ui&0x3fffffff,
499 ui&0x80000000 ? "Fatal error" : "Advisory Notification",
500 ui&0x40000000 ? "do" : "don't");
501 ui = GET_BE_U_4(tptr);
502 tptr+=4;
503 if (ui)
504 ND_PRINT(", causing Message ID: 0x%08x", ui);
505 break;
506
507 case LDP_TLV_FT_SESSION:
508 TLV_TCHECK(12);
509 ft_flags = GET_BE_U_2(tptr);
510 ND_PRINT("\n\t Flags: [%sReconnect, %sSave State, %sAll-Label Protection, %s Checkpoint, %sRe-Learn State]",
511 ft_flags&0x8000 ? "" : "No ",
512 ft_flags&0x8 ? "" : "Don't ",
513 ft_flags&0x4 ? "" : "No ",
514 ft_flags&0x2 ? "Sequence Numbered Label" : "All Labels",
515 ft_flags&0x1 ? "" : "Don't ");
516 /* 16 bits (FT Flags) + 16 bits (Reserved) */
517 tptr+=4;
518 ui = GET_BE_U_4(tptr);
519 if (ui)
520 ND_PRINT(", Reconnect Timeout: %ums", ui);
521 tptr+=4;
522 ui = GET_BE_U_4(tptr);
523 if (ui)
524 ND_PRINT(", Recovery Time: %ums", ui);
525 break;
526
527 case LDP_TLV_MTU:
528 TLV_TCHECK(2);
529 ND_PRINT("\n\t MTU: %u", GET_BE_U_2(tptr));
530 break;
531
532 case LDP_TLV_DUAL_STACK_CAP:
533 TLV_TCHECK(4);
534 transport_pref = GET_U_1(tptr);
535 ND_PRINT("\n\t Transport Connection Preference: %s",
536 tok2str(ldp_dual_stack_transport_pref_values,
537 "Unknown",
538 transport_pref));
539 break;
540
541
542 /*
543 * FIXME those are the defined TLVs that lack a decoder
544 * you are welcome to contribute code ;-)
545 */
546
547 case LDP_TLV_HOP_COUNT:
548 case LDP_TLV_PATH_VECTOR:
549 case LDP_TLV_ATM_LABEL:
550 case LDP_TLV_FR_LABEL:
551 case LDP_TLV_EXTD_STATUS:
552 case LDP_TLV_RETURNED_PDU:
553 case LDP_TLV_RETURNED_MSG:
554 case LDP_TLV_ATM_SESSION_PARM:
555 case LDP_TLV_FR_SESSION_PARM:
556 case LDP_TLV_LABEL_REQUEST_MSG_ID:
557
558 default:
559 if (ndo->ndo_vflag <= 1)
560 print_unknown_data(ndo, tptr, "\n\t ", tlv_tlen);
561 break;
562 }
563 return(tlv_len+4); /* Type & Length fields not included */
564
565 trunc:
566 nd_trunc_longjmp(ndo);
567
568 invalid:
569 return(tlv_len+4); /* Type & Length fields not included */
570 }
571
572 void
573 ldp_print(netdissect_options *ndo,
574 const u_char *pptr, u_int len)
575 {
576 u_int processed;
577
578 ndo->ndo_protocol = "ldp";
579 while (len > (sizeof(struct ldp_common_header) + sizeof(struct ldp_msg_header))) {
580 processed = ldp_pdu_print(ndo, pptr);
581 if (processed == 0)
582 return;
583 if (len < processed) {
584 ND_PRINT(" [remaining length %u < %u]", len, processed);
585 nd_print_invalid(ndo);
586 break;
587 }
588 len -= processed;
589 pptr += processed;
590 }
591 }
592
593 static u_int
594 ldp_pdu_print(netdissect_options *ndo,
595 const u_char *pptr)
596 {
597 const struct ldp_common_header *ldp_com_header;
598 const struct ldp_msg_header *ldp_msg_header;
599 const u_char *tptr,*msg_tptr;
600 u_short tlen;
601 u_short pdu_len,msg_len,msg_type;
602 u_int msg_tlen;
603 int hexdump,processed;
604
605 ldp_com_header = (const struct ldp_common_header *)pptr;
606 ND_TCHECK_SIZE(ldp_com_header);
607
608 /*
609 * Sanity checking of the header.
610 */
611 if (GET_BE_U_2(ldp_com_header->version) != LDP_VERSION) {
612 ND_PRINT("%sLDP version %u packet not supported",
613 (ndo->ndo_vflag < 1) ? "" : "\n\t",
614 GET_BE_U_2(ldp_com_header->version));
615 return 0;
616 }
617
618 pdu_len = GET_BE_U_2(ldp_com_header->pdu_length);
619 if (pdu_len < sizeof(struct ldp_common_header)-4) {
620 /* length too short */
621 ND_PRINT("%sLDP, pdu-length: %u (too short, < %zu)",
622 (ndo->ndo_vflag < 1) ? "" : "\n\t",
623 pdu_len,
624 sizeof(struct ldp_common_header)-4);
625 return 0;
626 }
627
628 /* print the LSR-ID, label-space & length */
629 ND_PRINT("%sLDP, Label-Space-ID: %s:%u, pdu-length: %u",
630 (ndo->ndo_vflag < 1) ? "" : "\n\t",
631 GET_IPADDR_STRING(ldp_com_header->lsr_id),
632 GET_BE_U_2(ldp_com_header->label_space),
633 pdu_len);
634
635 /* bail out if non-verbose */
636 if (ndo->ndo_vflag < 1)
637 return 0;
638
639 /* ok they seem to want to know everything - lets fully decode it */
640 tptr = pptr + sizeof(struct ldp_common_header);
641 tlen = pdu_len - (sizeof(struct ldp_common_header)-4); /* Type & Length fields not included */
642
643 while(tlen>0) {
644 /* did we capture enough for fully decoding the msg header ? */
645 ND_TCHECK_LEN(tptr, sizeof(struct ldp_msg_header));
646
647 ldp_msg_header = (const struct ldp_msg_header *)tptr;
648 msg_len=GET_BE_U_2(ldp_msg_header->length);
649 msg_type=LDP_MASK_MSG_TYPE(GET_BE_U_2(ldp_msg_header->type));
650
651 if (msg_len < sizeof(struct ldp_msg_header)-4) {
652 /* length too short */
653 /* FIXME vendor private / experimental check */
654 ND_PRINT("\n\t %s Message (0x%04x), length: %u (too short, < %zu)",
655 tok2str(ldp_msg_values,
656 "Unknown",
657 msg_type),
658 msg_type,
659 msg_len,
660 sizeof(struct ldp_msg_header)-4);
661 return 0;
662 }
663
664 /* FIXME vendor private / experimental check */
665 ND_PRINT("\n\t %s Message (0x%04x), length: %u, Message ID: 0x%08x, Flags: [%s if unknown]",
666 tok2str(ldp_msg_values,
667 "Unknown",
668 msg_type),
669 msg_type,
670 msg_len,
671 GET_BE_U_4(ldp_msg_header->id),
672 LDP_MASK_U_BIT(GET_BE_U_2(ldp_msg_header->type)) ? "continue processing" : "ignore");
673
674 msg_tptr=tptr+sizeof(struct ldp_msg_header);
675 msg_tlen=msg_len-(sizeof(struct ldp_msg_header)-4); /* Type & Length fields not included */
676
677 /* did we capture enough for fully decoding the message ? */
678 ND_TCHECK_LEN(tptr, msg_len);
679 hexdump=FALSE;
680
681 switch(msg_type) {
682
683 case LDP_MSG_NOTIF:
684 case LDP_MSG_HELLO:
685 case LDP_MSG_INIT:
686 case LDP_MSG_KEEPALIVE:
687 case LDP_MSG_ADDRESS:
688 case LDP_MSG_LABEL_MAPPING:
689 case LDP_MSG_ADDRESS_WITHDRAW:
690 case LDP_MSG_LABEL_WITHDRAW:
691 case LDP_MSG_LABEL_REQUEST:
692 case LDP_MSG_LABEL_RELEASE:
693 case LDP_MSG_LABEL_ABORT_REQUEST:
694 while(msg_tlen >= 4) {
695 processed = ldp_tlv_print(ndo, msg_tptr, msg_tlen);
696 if (processed == 0)
697 break;
698 msg_tlen-=processed;
699 msg_tptr+=processed;
700 }
701 break;
702
703 default:
704 if (ndo->ndo_vflag <= 1)
705 print_unknown_data(ndo, msg_tptr, "\n\t ", msg_tlen);
706 break;
707 }
708 /* do we want to see an additionally hexdump ? */
709 if (ndo->ndo_vflag > 1 || hexdump==TRUE)
710 print_unknown_data(ndo, tptr+sizeof(struct ldp_msg_header), "\n\t ",
711 msg_len);
712
713 tptr += msg_len+4;
714 tlen -= msg_len+4;
715 }
716 return pdu_len+4;
717 trunc:
718 nd_trunc_longjmp(ndo);
719 }