1 /* Copyright (c) 2001 NETLAB, Temple University
2 * Copyright (c) 2001 Protocol Engineering Lab, University of Delaware
4 * Jerry Heinz <gheinz@astro.temple.edu>
5 * John Fiore <jfiore@joda.cis.temple.edu>
6 * Armando L. Caro Jr. <acaro@cis.udel.edu>
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions
12 * 1. Redistributions of source code must retain the above copyright
13 * notice, this list of conditions and the following disclaimer.
15 * 2. Redistributions in binary form must reproduce the above copyright
16 * notice, this list of conditions and the following disclaimer in the
17 * documentation and/or other materials provided with the distribution.
19 * 3. Neither the name of the University nor of the Laboratory may be used
20 * to endorse or promote products derived from this software without
21 * specific prior written permission.
23 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
24 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
25 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
26 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
27 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
28 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
29 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
30 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
31 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
32 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
36 /* \summary: Stream Control Transmission Protocol (SCTP) printer */
42 #include "netdissect-stdinc.h"
44 #include "netdissect.h"
45 #include "addrtoname.h"
52 * SCTP reference Implementation Copyright (C) 1999 Cisco And Motorola
54 * Redistribution and use in source and binary forms, with or without
55 * modification, are permitted provided that the following conditions
58 * 1. Redistributions of source code must retain the above copyright
59 * notice, this list of conditions and the following disclaimer.
61 * 2. Redistributions in binary form must reproduce the above copyright
62 * notice, this list of conditions and the following disclaimer in the
63 * documentation and/or other materials provided with the distribution.
65 * 3. Neither the name of Cisco nor of Motorola may be used
66 * to endorse or promote products derived from this software without
67 * specific prior written permission.
69 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
70 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
71 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
72 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
73 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
74 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
75 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
76 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
77 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
78 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
81 * This file is part of the SCTP reference Implementation
84 * Please send any bug reports or fixes you make to one of the following email
87 * rstewar1@email.mot.com
91 * Any bugs reported given to us we will try to fix... any fixes shared will
92 * be incorperated into the next SCTP release.
95 /* The valid defines for all message
96 * types know to SCTP. 0 is reserved
98 #define SCTP_DATA 0x00
99 #define SCTP_INITIATION 0x01
100 #define SCTP_INITIATION_ACK 0x02
101 #define SCTP_SELECTIVE_ACK 0x03
102 #define SCTP_HEARTBEAT_REQUEST 0x04
103 #define SCTP_HEARTBEAT_ACK 0x05
104 #define SCTP_ABORT_ASSOCIATION 0x06
105 #define SCTP_SHUTDOWN 0x07
106 #define SCTP_SHUTDOWN_ACK 0x08
107 #define SCTP_OPERATION_ERR 0x09
108 #define SCTP_COOKIE_ECHO 0x0a
109 #define SCTP_COOKIE_ACK 0x0b
110 #define SCTP_ECN_ECHO 0x0c
111 #define SCTP_ECN_CWR 0x0d
112 #define SCTP_SHUTDOWN_COMPLETE 0x0e
113 #define SCTP_FORWARD_CUM_TSN 0xc0
114 #define SCTP_RELIABLE_CNTL 0xc1
115 #define SCTP_RELIABLE_CNTL_ACK 0xc2
117 static const struct tok sctp_chunkid_str
[] = {
118 { SCTP_DATA
, "DATA" },
119 { SCTP_INITIATION
, "INIT" },
120 { SCTP_INITIATION_ACK
, "INIT ACK" },
121 { SCTP_SELECTIVE_ACK
, "SACK" },
122 { SCTP_HEARTBEAT_REQUEST
, "HB REQ" },
123 { SCTP_HEARTBEAT_ACK
, "HB ACK" },
124 { SCTP_ABORT_ASSOCIATION
, "ABORT" },
125 { SCTP_SHUTDOWN
, "SHUTDOWN" },
126 { SCTP_SHUTDOWN_ACK
, "SHUTDOWN ACK" },
127 { SCTP_OPERATION_ERR
, "OP ERR" },
128 { SCTP_COOKIE_ECHO
, "COOKIE ECHO" },
129 { SCTP_COOKIE_ACK
, "COOKIE ACK" },
130 { SCTP_ECN_ECHO
, "ECN ECHO" },
131 { SCTP_ECN_CWR
, "ECN CWR" },
132 { SCTP_SHUTDOWN_COMPLETE
, "SHUTDOWN COMPLETE" },
133 { SCTP_FORWARD_CUM_TSN
, "FOR CUM TSN" },
134 { SCTP_RELIABLE_CNTL
, "REL CTRL" },
135 { SCTP_RELIABLE_CNTL_ACK
, "REL CTRL ACK" },
139 /* Data Chuck Specific Flags */
140 #define SCTP_DATA_FRAG_MASK 0x03
141 #define SCTP_DATA_MIDDLE_FRAG 0x00
142 #define SCTP_DATA_LAST_FRAG 0x01
143 #define SCTP_DATA_FIRST_FRAG 0x02
144 #define SCTP_DATA_NOT_FRAG 0x03
145 #define SCTP_DATA_UNORDERED 0x04
147 #define SCTP_ADDRMAX 60
153 /* the sctp common header */
157 nd_uint16_t destination
;
158 nd_uint32_t verificationTag
;
162 /* various descriptor parsers */
164 struct sctpChunkDesc
{
167 nd_uint16_t chunkLength
;
170 struct sctpParamDesc
{
171 nd_uint16_t paramType
;
172 nd_uint16_t paramLength
;
176 struct sctpRelChunkDesc
{
177 struct sctpChunkDesc chk
;
178 nd_uint32_t serialNumber
;
181 struct sctpVendorSpecificParam
{
182 struct sctpParamDesc p
; /* type must be 0xfffe */
183 nd_uint32_t vendorId
; /* vendor ID from RFC 1700 */
184 nd_uint16_t vendorSpecificType
;
185 nd_uint16_t vendorSpecificLen
;
189 /* Structures for the control parts */
193 /* Sctp association init request/ack */
195 /* this is used for init ack, too */
196 struct sctpInitiation
{
197 nd_uint32_t initTag
; /* tag of mine */
198 nd_uint32_t rcvWindowCredit
; /* rwnd */
199 nd_uint16_t NumPreopenStreams
; /* OS */
200 nd_uint16_t MaxInboundStreams
; /* MIS */
201 nd_uint32_t initialTSN
;
202 /* optional param's follow in sctpParamDesc form */
205 struct sctpV4IpAddress
{
206 struct sctpParamDesc p
; /* type is set to SCTP_IPV4_PARAM_TYPE, len=10 */
211 struct sctpV6IpAddress
{
212 struct sctpParamDesc p
; /* type is set to SCTP_IPV6_PARAM_TYPE, len=22 */
217 struct sctpParamDesc param
;
222 struct sctpCookiePreserve
{
223 struct sctpParamDesc p
; /* type is set to SCTP_COOKIE_PRESERVE, len=8 */
224 nd_uint32_t extraTime
;
228 struct sctpTimeStamp
{
234 /* this guy is for use when
235 * I have a initiate message gloming the
239 struct sctpUnifiedInit
{
240 struct sctpChunkDesc uh
;
241 struct sctpInitiation initm
;
244 struct sctpSendableInit
{
245 struct sctpHeader mh
;
246 struct sctpUnifiedInit msg
;
250 /* Selective Acknowledgement
251 * has the following structure with
252 * a optional ammount of trailing int's
253 * on the last part (based on the numberOfDesc
257 struct sctpSelectiveAck
{
258 nd_uint32_t highestConseqTSN
;
259 nd_uint32_t updatedRwnd
;
260 nd_uint16_t numberOfdesc
;
261 nd_uint16_t numDupTsns
;
264 struct sctpSelectiveFrag
{
265 nd_uint16_t fragmentStart
;
266 nd_uint16_t fragmentEnd
;
270 struct sctpUnifiedSack
{
271 struct sctpChunkDesc uh
;
272 struct sctpSelectiveAck sack
;
275 /* for the abort and shutdown ACK
276 * we must carry the init tag in the common header. Just the
277 * common header is all that is needed with a chunk descriptor.
279 struct sctpUnifiedAbort
{
280 struct sctpChunkDesc uh
;
283 struct sctpUnifiedAbortLight
{
284 struct sctpHeader mh
;
285 struct sctpChunkDesc uh
;
288 struct sctpUnifiedAbortHeavy
{
289 struct sctpHeader mh
;
290 struct sctpChunkDesc uh
;
291 nd_uint16_t causeCode
;
292 nd_uint16_t causeLen
;
295 /* For the graceful shutdown we must carry
296 * the tag (in common header) and the highest consequitive acking value
298 struct sctpShutdown
{
299 nd_uint32_t TSN_Seen
;
302 struct sctpUnifiedShutdown
{
303 struct sctpChunkDesc uh
;
304 struct sctpShutdown shut
;
307 /* in the unified message we add the trailing
308 * stream id since it is the only message
309 * that is defined as a operation error.
311 struct sctpOpErrorCause
{
313 nd_uint16_t causeLen
;
316 struct sctpUnifiedOpError
{
317 struct sctpChunkDesc uh
;
318 struct sctpOpErrorCause c
;
321 struct sctpUnifiedStreamError
{
322 struct sctpHeader mh
;
323 struct sctpChunkDesc uh
;
324 struct sctpOpErrorCause c
;
326 nd_uint16_t reserved
;
329 struct staleCookieMsg
{
330 struct sctpHeader mh
;
331 struct sctpChunkDesc uh
;
332 struct sctpOpErrorCause c
;
333 nd_uint32_t moretime
;
336 /* the following is used in all sends
337 * where nothing is needed except the
338 * chunk/type i.e. shutdownAck Abort */
340 struct sctpUnifiedSingleMsg
{
341 struct sctpHeader mh
;
342 struct sctpChunkDesc uh
;
347 nd_uint16_t streamId
;
348 nd_uint16_t sequence
;
349 nd_uint32_t payloadtype
;
352 struct sctpUnifiedDatagram
{
353 struct sctpChunkDesc uh
;
354 struct sctpDataPart dp
;
358 struct sctpChunkDesc uh
;
359 nd_uint32_t Lowest_TSN
;
364 struct sctpChunkDesc uh
;
365 nd_uint32_t TSN_reduced_at
;
368 static const struct tok ForCES_channels
[] = {
369 { CHAN_HP
, "ForCES HP" },
370 { CHAN_MP
, "ForCES MP" },
371 { CHAN_LP
, "ForCES LP" },
375 /* data chunk's payload protocol identifiers */
377 #define SCTP_PPID_IUA 1
378 #define SCTP_PPID_M2UA 2
379 #define SCTP_PPID_M3UA 3
380 #define SCTP_PPID_SUA 4
381 #define SCTP_PPID_M2PA 5
382 #define SCTP_PPID_V5UA 6
383 #define SCTP_PPID_H248 7
384 #define SCTP_PPID_BICC 8
385 #define SCTP_PPID_TALI 9
386 #define SCTP_PPID_DUA 10
387 #define SCTP_PPID_ASAP 11
388 #define SCTP_PPID_ENRP 12
389 #define SCTP_PPID_H323 13
390 #define SCTP_PPID_QIPC 14
391 #define SCTP_PPID_SIMCO 15
392 #define SCTP_PPID_DDPSC 16
393 #define SCTP_PPID_DDPSSC 17
394 #define SCTP_PPID_S1AP 18
395 #define SCTP_PPID_RUA 19
396 #define SCTP_PPID_HNBAP 20
397 #define SCTP_PPID_FORCES_HP 21
398 #define SCTP_PPID_FORCES_MP 22
399 #define SCTP_PPID_FORCES_LP 23
400 #define SCTP_PPID_SBC_AP 24
401 #define SCTP_PPID_NBAP 25
403 #define SCTP_PPID_X2AP 27
405 static const struct tok PayloadProto_idents
[] = {
406 { SCTP_PPID_IUA
, "ISDN Q.921" },
407 { SCTP_PPID_M2UA
, "M2UA" },
408 { SCTP_PPID_M3UA
, "M3UA" },
409 { SCTP_PPID_SUA
, "SUA" },
410 { SCTP_PPID_M2PA
, "M2PA" },
411 { SCTP_PPID_V5UA
, "V5.2" },
412 { SCTP_PPID_H248
, "H.248" },
413 { SCTP_PPID_BICC
, "BICC" },
414 { SCTP_PPID_TALI
, "TALI" },
415 { SCTP_PPID_DUA
, "DUA" },
416 { SCTP_PPID_ASAP
, "ASAP" },
417 { SCTP_PPID_ENRP
, "ENRP" },
418 { SCTP_PPID_H323
, "H.323" },
419 { SCTP_PPID_QIPC
, "Q.IPC" },
420 { SCTP_PPID_SIMCO
, "SIMCO" },
421 { SCTP_PPID_DDPSC
, "DDPSC" },
422 { SCTP_PPID_DDPSSC
, "DDPSSC" },
423 { SCTP_PPID_S1AP
, "S1AP" },
424 { SCTP_PPID_RUA
, "RUA" },
425 { SCTP_PPID_HNBAP
, "HNBAP" },
426 { SCTP_PPID_FORCES_HP
, "ForCES HP" },
427 { SCTP_PPID_FORCES_MP
, "ForCES MP" },
428 { SCTP_PPID_FORCES_LP
, "ForCES LP" },
429 { SCTP_PPID_SBC_AP
, "SBc-AP" },
430 { SCTP_PPID_NBAP
, "NBAP" },
432 { SCTP_PPID_X2AP
, "X2AP" },
438 isForCES_port(u_short Port
)
451 sctp_print(netdissect_options
*ndo
,
452 const u_char
*bp
, /* beginning of sctp packet */
453 const u_char
*bp2
, /* beginning of enclosing */
454 u_int sctpPacketLength
) /* ip packet */
456 u_int sctpPacketLengthRemaining
;
457 const struct sctpHeader
*sctpPktHdr
;
459 const struct ip6_hdr
*ip6
;
461 u_short sourcePort
, destPort
;
463 const struct sctpChunkDesc
*chunkDescPtr
;
467 ndo
->ndo_protocol
= "sctp";
468 if (sctpPacketLength
< sizeof(struct sctpHeader
))
470 ND_PRINT("truncated-sctp - %ld bytes missing!",
471 (long)(sizeof(struct sctpHeader
) - sctpPacketLength
));
474 sctpPktHdr
= (const struct sctpHeader
*) bp
;
475 ND_TCHECK_SIZE(sctpPktHdr
);
476 sctpPacketLengthRemaining
= sctpPacketLength
;
478 sourcePort
= EXTRACT_BE_U_2(sctpPktHdr
->source
);
479 destPort
= EXTRACT_BE_U_2(sctpPktHdr
->destination
);
481 ip
= (const struct ip
*)bp2
;
483 ip6
= (const struct ip6_hdr
*)bp2
;
488 ND_PRINT("%s.%u > %s.%u: sctp",
489 ip6addr_string(ndo
, ip6
->ip6_src
),
491 ip6addr_string(ndo
, ip6
->ip6_dst
),
495 ND_PRINT("%s.%u > %s.%u: sctp",
496 ipaddr_string(ndo
, ip
->ip_src
),
498 ipaddr_string(ndo
, ip
->ip_dst
),
502 if (isForCES_port(sourcePort
)) {
503 ND_PRINT("[%s]", tok2str(ForCES_channels
, NULL
, sourcePort
));
506 if (isForCES_port(destPort
)) {
507 ND_PRINT("[%s]", tok2str(ForCES_channels
, NULL
, destPort
));
511 bp
+= sizeof(struct sctpHeader
);
512 sctpPacketLengthRemaining
-= sizeof(struct sctpHeader
);
514 if (ndo
->ndo_vflag
>= 2)
518 /* cycle through all chunks, printing information on each one */
519 for (chunkCount
= 0, chunkDescPtr
= (const struct sctpChunkDesc
*)bp
;
520 sctpPacketLengthRemaining
!= 0;
523 uint16_t chunkLength
, chunkLengthRemaining
;
526 chunkDescPtr
= (const struct sctpChunkDesc
*)bp
;
527 if (sctpPacketLengthRemaining
< sizeof(*chunkDescPtr
)) {
528 ND_PRINT("%s%u) [chunk descriptor cut off at end of packet]", sep
, chunkCount
+1);
531 ND_TCHECK_SIZE(chunkDescPtr
);
532 chunkLength
= EXTRACT_BE_U_2(chunkDescPtr
->chunkLength
);
533 if (chunkLength
< sizeof(*chunkDescPtr
)) {
534 ND_PRINT("%s%u) [Bad chunk length %u, < size of chunk descriptor]", sep
, chunkCount
+1, chunkLength
);
537 chunkLengthRemaining
= chunkLength
;
539 align
= chunkLength
% 4;
543 if (sctpPacketLengthRemaining
< align
) {
544 ND_PRINT("%s%u) [Bad chunk length %u, > remaining data in packet]", sep
, chunkCount
+1, chunkLength
);
548 ND_TCHECK_LEN(bp
, chunkLength
);
550 bp
+= sizeof(*chunkDescPtr
);
551 sctpPacketLengthRemaining
-= sizeof(*chunkDescPtr
);
552 chunkLengthRemaining
-= sizeof(*chunkDescPtr
);
554 ND_PRINT("%s%u) ", sep
, chunkCount
+1);
555 chunkID
= EXTRACT_U_1(chunkDescPtr
->chunkID
);
556 ND_PRINT("[%s] ", tok2str(sctp_chunkid_str
, "Unknown chunk type: 0x%x",
562 const struct sctpDataPart
*dataHdrPtr
;
567 chunkFlg
= EXTRACT_U_1(chunkDescPtr
->chunkFlg
);
568 if ((chunkFlg
& SCTP_DATA_UNORDERED
) == SCTP_DATA_UNORDERED
)
571 if ((chunkFlg
& SCTP_DATA_FIRST_FRAG
) == SCTP_DATA_FIRST_FRAG
)
574 if ((chunkFlg
& SCTP_DATA_LAST_FRAG
) == SCTP_DATA_LAST_FRAG
)
577 if( ((chunkFlg
& SCTP_DATA_UNORDERED
) == SCTP_DATA_UNORDERED
) ||
578 ((chunkFlg
& SCTP_DATA_FIRST_FRAG
) == SCTP_DATA_FIRST_FRAG
) ||
579 ((chunkFlg
& SCTP_DATA_LAST_FRAG
) == SCTP_DATA_LAST_FRAG
) )
582 if (chunkLengthRemaining
< sizeof(*dataHdrPtr
)) {
583 ND_PRINT("bogus chunk length %u]", chunkLength
);
586 dataHdrPtr
=(const struct sctpDataPart
*)bp
;
588 ppid
= EXTRACT_BE_U_4(dataHdrPtr
->payloadtype
);
589 ND_PRINT("[TSN: %u] ", EXTRACT_BE_U_4(dataHdrPtr
->TSN
));
590 ND_PRINT("[SID: %u] ", EXTRACT_BE_U_2(dataHdrPtr
->streamId
));
591 ND_PRINT("[SSEQ %u] ", EXTRACT_BE_U_2(dataHdrPtr
->sequence
));
592 ND_PRINT("[PPID %s] ",
593 tok2str(PayloadProto_idents
, "0x%x", ppid
));
596 isforces
= (ppid
== SCTP_PPID_FORCES_HP
) ||
597 (ppid
== SCTP_PPID_FORCES_MP
) ||
598 (ppid
== SCTP_PPID_FORCES_LP
);
601 bp
+= sizeof(*dataHdrPtr
);
602 sctpPacketLengthRemaining
-= sizeof(*dataHdrPtr
);
603 chunkLengthRemaining
-= sizeof(*dataHdrPtr
);
604 payload_size
= chunkLengthRemaining
;
605 if (payload_size
== 0) {
606 ND_PRINT("bogus chunk length %u]", chunkLength
);
611 forces_print(ndo
, bp
, payload_size
);
612 } else if (ndo
->ndo_vflag
>= 2) { /* if verbose output is specified */
613 /* at the command line */
615 case SCTP_PPID_M3UA
:
616 m3ua_print(ndo
, bp
, payload_size
);
619 ND_PRINT("[Payload");
620 if (!ndo
->ndo_suppress_default_print
) {
622 ND_DEFAULTPRINT(bp
, payload_size
);
629 sctpPacketLengthRemaining
-= payload_size
;
630 chunkLengthRemaining
-= payload_size
;
633 case SCTP_INITIATION
:
635 const struct sctpInitiation
*init
;
637 if (chunkLengthRemaining
< sizeof(*init
)) {
638 ND_PRINT("bogus chunk length %u]", chunkLength
);
641 init
=(const struct sctpInitiation
*)bp
;
642 ND_PRINT("[init tag: %u] ", EXTRACT_BE_U_4(init
->initTag
));
643 ND_PRINT("[rwnd: %u] ", EXTRACT_BE_U_4(init
->rcvWindowCredit
));
644 ND_PRINT("[OS: %u] ", EXTRACT_BE_U_2(init
->NumPreopenStreams
));
645 ND_PRINT("[MIS: %u] ", EXTRACT_BE_U_2(init
->MaxInboundStreams
));
646 ND_PRINT("[init TSN: %u] ", EXTRACT_BE_U_4(init
->initialTSN
));
648 sctpPacketLengthRemaining
-= sizeof(*init
);
649 chunkLengthRemaining
-= sizeof(*init
);
651 #if 0 /* ALC you can add code for optional params here */
652 if( chunkLengthRemaining
!= 0 )
653 ND_PRINT(" @@@@@ UNFINISHED @@@@@@%s\n",
654 "Optional params present, but not printed.");
656 bp
+= chunkLengthRemaining
;
657 sctpPacketLengthRemaining
-= chunkLengthRemaining
;
658 chunkLengthRemaining
= 0;
661 case SCTP_INITIATION_ACK
:
663 const struct sctpInitiation
*init
;
665 if (chunkLengthRemaining
< sizeof(*init
)) {
666 ND_PRINT("bogus chunk length %u]", chunkLength
);
669 init
=(const struct sctpInitiation
*)bp
;
670 ND_PRINT("[init tag: %u] ", EXTRACT_BE_U_4(init
->initTag
));
671 ND_PRINT("[rwnd: %u] ", EXTRACT_BE_U_4(init
->rcvWindowCredit
));
672 ND_PRINT("[OS: %u] ", EXTRACT_BE_U_2(init
->NumPreopenStreams
));
673 ND_PRINT("[MIS: %u] ", EXTRACT_BE_U_2(init
->MaxInboundStreams
));
674 ND_PRINT("[init TSN: %u] ", EXTRACT_BE_U_4(init
->initialTSN
));
676 sctpPacketLengthRemaining
-= sizeof(*init
);
677 chunkLengthRemaining
-= sizeof(*init
);
679 #if 0 /* ALC you can add code for optional params here */
680 if( chunkLengthRemaining
!= 0 )
681 ND_PRINT(" @@@@@ UNFINISHED @@@@@@%s\n",
682 "Optional params present, but not printed.");
684 bp
+= chunkLengthRemaining
;
685 sctpPacketLengthRemaining
-= chunkLengthRemaining
;
686 chunkLengthRemaining
= 0;
689 case SCTP_SELECTIVE_ACK
:
691 const struct sctpSelectiveAck
*sack
;
692 const struct sctpSelectiveFrag
*frag
;
694 const u_char
*dupTSN
;
696 if (chunkLengthRemaining
< sizeof(*sack
)) {
697 ND_PRINT("bogus chunk length %u]", chunkLength
);
700 sack
=(const struct sctpSelectiveAck
*)bp
;
701 ND_PRINT("[cum ack %u] ", EXTRACT_BE_U_4(sack
->highestConseqTSN
));
702 ND_PRINT("[a_rwnd %u] ", EXTRACT_BE_U_4(sack
->updatedRwnd
));
703 ND_PRINT("[#gap acks %u] ", EXTRACT_BE_U_2(sack
->numberOfdesc
));
704 ND_PRINT("[#dup tsns %u] ", EXTRACT_BE_U_2(sack
->numDupTsns
));
706 sctpPacketLengthRemaining
-= sizeof(*sack
);
707 chunkLengthRemaining
-= sizeof(*sack
);
712 chunkLengthRemaining
!= 0 && fragNo
< EXTRACT_BE_U_2(sack
->numberOfdesc
);
713 bp
+= sizeof(*frag
), sctpPacketLengthRemaining
-= sizeof(*frag
), chunkLengthRemaining
-= sizeof(*frag
), fragNo
++) {
714 if (chunkLengthRemaining
< sizeof(*frag
)) {
715 ND_PRINT("bogus chunk length %u]", chunkLength
);
718 frag
= (const struct sctpSelectiveFrag
*)bp
;
719 ND_PRINT("\n\t\t[gap ack block #%u: start = %u, end = %u] ",
721 EXTRACT_BE_U_4(sack
->highestConseqTSN
) + EXTRACT_BE_U_2(frag
->fragmentStart
),
722 EXTRACT_BE_U_4(sack
->highestConseqTSN
) + EXTRACT_BE_U_2(frag
->fragmentEnd
));
725 /* print duplicate TSNs */
727 chunkLengthRemaining
!= 0 && tsnNo
<EXTRACT_BE_U_2(sack
->numDupTsns
);
728 bp
+= 4, sctpPacketLengthRemaining
-= 4, chunkLengthRemaining
-= 4, tsnNo
++) {
729 if (chunkLengthRemaining
< 4) {
730 ND_PRINT("bogus chunk length %u]", chunkLength
);
733 dupTSN
= (const u_char
*)bp
;
734 ND_PRINT("\n\t\t[dup TSN #%u: %u] ", tsnNo
+1,
735 EXTRACT_BE_U_4(dupTSN
));
741 bp
+= chunkLengthRemaining
;
742 sctpPacketLengthRemaining
-= chunkLengthRemaining
;
743 chunkLengthRemaining
= 0;
749 * Any extra stuff at the end of the chunk?
752 bp
+= chunkLengthRemaining
;
753 sctpPacketLengthRemaining
-= chunkLengthRemaining
;
755 if (ndo
->ndo_vflag
< 2)
760 * Fail if the alignment padding isn't in the captured data.
761 * Otherwise, skip it.
763 ND_TCHECK_LEN(bp
, align
);
765 sctpPacketLengthRemaining
-= align
;