]> The Tcpdump Group git mirrors - tcpdump/blob - print-msdp.c
Merge branch 'master' into fix_udp_frag_badlen
[tcpdump] / print-msdp.c
1 /*
2 * Copyright (c) 2001 William C. Fenner.
3 * All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that: (1) source code
7 * distributions retain the above copyright notice and this paragraph
8 * in its entirety, and (2) distributions including binary code include
9 * the above copyright notice and this paragraph in its entirety in
10 * the documentation or other materials provided with the distribution.
11 * The name of William C. Fenner may not be used to endorse or
12 * promote products derived from this software without specific prior
13 * written permission. THIS SOFTWARE IS PROVIDED ``AS IS'' AND
14 * WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, WITHOUT
15 * LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
16 * FOR A PARTICULAR PURPOSE.
17 */
18
19 /* \summary: Multicast Source Discovery Protocol (MSDP) printer */
20
21 #ifdef HAVE_CONFIG_H
22 #include <config.h>
23 #endif
24
25 #include "netdissect-stdinc.h"
26
27 #include "netdissect.h"
28 #include "addrtoname.h"
29 #include "extract.h"
30
31 #define MSDP_TYPE_MAX 7
32
33 void
34 msdp_print(netdissect_options *ndo, const u_char *sp, u_int length)
35 {
36 unsigned int type, len;
37
38 ndo->ndo_protocol = "msdp";
39 ND_TCHECK_3(sp);
40 /* See if we think we're at the beginning of a compound packet */
41 type = GET_U_1(sp);
42 len = GET_BE_U_2(sp + 1);
43 if (len > 1500 || len < 3 || type == 0 || type > MSDP_TYPE_MAX)
44 goto trunc; /* not really truncated, but still not decodable */
45 ND_PRINT(" msdp:");
46 while (length != 0) {
47 ND_TCHECK_3(sp);
48 type = GET_U_1(sp);
49 len = GET_BE_U_2(sp + 1);
50 if (len > 1400 || ndo->ndo_vflag)
51 ND_PRINT(" [len %u]", len);
52 if (len < 3)
53 goto trunc;
54 if (length < len)
55 goto trunc;
56 sp += 3;
57 length -= 3;
58 switch (type) {
59 case 1: /* IPv4 Source-Active */
60 case 3: /* IPv4 Source-Active Response */
61 if (type == 1)
62 ND_PRINT(" SA");
63 else
64 ND_PRINT(" SA-Response");
65 ND_TCHECK_1(sp);
66 ND_PRINT(" %u entries", GET_U_1(sp));
67 if ((u_int)((GET_U_1(sp) * 12) + 8) < len) {
68 ND_PRINT(" [w/data]");
69 if (ndo->ndo_vflag > 1) {
70 ND_PRINT(" ");
71 ip_print(ndo, sp +
72 GET_U_1(sp) * 12 + 8 - 3,
73 len - (GET_U_1(sp) * 12 + 8));
74 }
75 }
76 break;
77 case 2:
78 ND_PRINT(" SA-Request");
79 ND_TCHECK_5(sp);
80 ND_PRINT(" for %s", GET_IPADDR_STRING(sp + 1));
81 break;
82 case 4:
83 ND_PRINT(" Keepalive");
84 if (len != 3)
85 ND_PRINT("[len=%u] ", len);
86 break;
87 case 5:
88 ND_PRINT(" Notification");
89 break;
90 default:
91 ND_PRINT(" [type=%u len=%u]", type, len);
92 break;
93 }
94 sp += (len - 3);
95 length -= (len - 3);
96 }
97 return;
98 trunc:
99 nd_print_trunc(ndo);
100 }