]> The Tcpdump Group git mirrors - tcpdump/blob - print-babel.c
Fix a bound check
[tcpdump] / print-babel.c
1 /*
2 * Copyright (c) 2007-2011 Grégoire Henry, Juliusz Chroboczek
3 *
4 * Redistribution and use in source and binary forms, with or without
5 * modification, are permitted provided that the following conditions
6 * are met:
7 * 1. Redistributions of source code must retain the above copyright
8 * notice, this list of conditions and the following disclaimer.
9 * 2. Redistributions in binary form must reproduce the above copyright
10 * notice, this list of conditions and the following disclaimer in the
11 * documentation and/or other materials provided with the distribution.
12 * 3. Neither the name of the project nor the names of its contributors
13 * may be used to endorse or promote products derived from this software
14 * without specific prior written permission.
15 *
16 * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
17 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
18 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
19 * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
20 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
21 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
22 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
23 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
24 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
25 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
26 * SUCH DAMAGE.
27 */
28
29 /* \summary: Babel Routing Protocol printer */
30
31 #ifdef HAVE_CONFIG_H
32 #include "config.h"
33 #endif
34
35 #include <netdissect-stdinc.h>
36
37 #include <stdio.h>
38 #include <string.h>
39
40 #include "netdissect.h"
41 #include "addrtoname.h"
42 #include "extract.h"
43
44 static const char tstr[] = "[|babel]";
45
46 static void babel_print_v2(netdissect_options *, const u_char *cp, u_int length);
47
48 void
49 babel_print(netdissect_options *ndo,
50 const u_char *cp, u_int length)
51 {
52 ND_PRINT((ndo, "babel"));
53
54 ND_TCHECK2(*cp, 4);
55
56 if(cp[0] != 42) {
57 ND_PRINT((ndo, " invalid header"));
58 return;
59 } else {
60 ND_PRINT((ndo, " %d", cp[1]));
61 }
62
63 switch(cp[1]) {
64 case 2:
65 babel_print_v2(ndo, cp, length);
66 break;
67 default:
68 ND_PRINT((ndo, " unknown version"));
69 break;
70 }
71
72 return;
73
74 trunc:
75 ND_PRINT((ndo, " %s", tstr));
76 return;
77 }
78
79 /* TLVs */
80 #define MESSAGE_PAD1 0
81 #define MESSAGE_PADN 1
82 #define MESSAGE_ACK_REQ 2
83 #define MESSAGE_ACK 3
84 #define MESSAGE_HELLO 4
85 #define MESSAGE_IHU 5
86 #define MESSAGE_ROUTER_ID 6
87 #define MESSAGE_NH 7
88 #define MESSAGE_UPDATE 8
89 #define MESSAGE_REQUEST 9
90 #define MESSAGE_MH_REQUEST 10
91 #define MESSAGE_TSPC 11
92 #define MESSAGE_HMAC 12
93 #define MESSAGE_UPDATE_SRC_SPECIFIC 13
94 #define MESSAGE_REQUEST_SRC_SPECIFIC 14
95 #define MESSAGE_MH_REQUEST_SRC_SPECIFIC 15
96
97 /* sub-TLVs */
98 #define MESSAGE_SUB_PAD1 0
99 #define MESSAGE_SUB_PADN 1
100 #define MESSAGE_SUB_DIVERSITY 2
101 #define MESSAGE_SUB_TIMESTAMP 3
102
103 /* Diversity sub-TLV channel codes */
104 static const struct tok diversity_str[] = {
105 { 0, "reserved" },
106 { 255, "all" },
107 { 0, NULL }
108 };
109
110 static const char *
111 format_id(const u_char *id)
112 {
113 static char buf[25];
114 snprintf(buf, 25, "%02x:%02x:%02x:%02x:%02x:%02x:%02x:%02x",
115 id[0], id[1], id[2], id[3], id[4], id[5], id[6], id[7]);
116 buf[24] = '\0';
117 return buf;
118 }
119
120 static const unsigned char v4prefix[16] =
121 {0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0xFF, 0xFF, 0, 0, 0, 0 };
122
123 static const char *
124 format_prefix(netdissect_options *ndo, const u_char *prefix, unsigned char plen)
125 {
126 static char buf[50];
127 if(plen >= 96 && memcmp(prefix, v4prefix, 12) == 0)
128 snprintf(buf, 50, "%s/%u", ipaddr_string(ndo, prefix + 12), plen - 96);
129 else
130 snprintf(buf, 50, "%s/%u", ip6addr_string(ndo, prefix), plen);
131 buf[49] = '\0';
132 return buf;
133 }
134
135 static const char *
136 format_address(netdissect_options *ndo, const u_char *prefix)
137 {
138 if(memcmp(prefix, v4prefix, 12) == 0)
139 return ipaddr_string(ndo, prefix + 12);
140 else
141 return ip6addr_string(ndo, prefix);
142 }
143
144 static const char *
145 format_interval(const uint16_t i)
146 {
147 static char buf[sizeof("000.00s")];
148
149 if (i == 0)
150 return "0.0s (bogus)";
151 snprintf(buf, sizeof(buf), "%u.%02us", i / 100, i % 100);
152 return buf;
153 }
154
155 static const char *
156 format_interval_update(const uint16_t i)
157 {
158 return i == 0xFFFF ? "infinity" : format_interval(i);
159 }
160
161 static const char *
162 format_timestamp(const uint32_t i)
163 {
164 static char buf[sizeof("0000.000000s")];
165 snprintf(buf, sizeof(buf), "%u.%06us", i / 1000000, i % 1000000);
166 return buf;
167 }
168
169 /* Return number of octets consumed from the input buffer (not the prefix length
170 * in bytes), or -1 for encoding error. */
171 static int
172 network_prefix(int ae, int plen, unsigned int omitted,
173 const unsigned char *p, const unsigned char *dp,
174 unsigned int len, unsigned char *p_r)
175 {
176 unsigned pb;
177 unsigned char prefix[16];
178 int consumed = 0;
179
180 if(plen >= 0)
181 pb = (plen + 7) / 8;
182 else if(ae == 1)
183 pb = 4;
184 else
185 pb = 16;
186
187 if(pb > 16)
188 return -1;
189
190 memset(prefix, 0, 16);
191
192 switch(ae) {
193 case 0: break;
194 case 1:
195 if(omitted > 4 || pb > 4 || (pb > omitted && len < pb - omitted))
196 return -1;
197 memcpy(prefix, v4prefix, 12);
198 if(omitted) {
199 if (dp == NULL) return -1;
200 memcpy(prefix, dp, 12 + omitted);
201 }
202 if(pb > omitted) {
203 memcpy(prefix + 12 + omitted, p, pb - omitted);
204 consumed = pb - omitted;
205 }
206 break;
207 case 2:
208 if(omitted > 16 || (pb > omitted && len < pb - omitted))
209 return -1;
210 if(omitted) {
211 if (dp == NULL) return -1;
212 memcpy(prefix, dp, omitted);
213 }
214 if(pb > omitted) {
215 memcpy(prefix + omitted, p, pb - omitted);
216 consumed = pb - omitted;
217 }
218 break;
219 case 3:
220 if(pb > 8 && len < pb - 8) return -1;
221 prefix[0] = 0xfe;
222 prefix[1] = 0x80;
223 if(pb > 8) {
224 memcpy(prefix + 8, p, pb - 8);
225 consumed = pb - 8;
226 }
227 break;
228 default:
229 return -1;
230 }
231
232 memcpy(p_r, prefix, 16);
233 return consumed;
234 }
235
236 static int
237 network_address(int ae, const unsigned char *a, unsigned int len,
238 unsigned char *a_r)
239 {
240 return network_prefix(ae, -1, 0, a, NULL, len, a_r);
241 }
242
243 /*
244 * Sub-TLVs consume the "extra data" of Babel TLVs (see Section 4.3 of RFC6126),
245 * their encoding is similar to the encoding of TLVs, but the type namespace is
246 * different:
247 *
248 * o Type 0 stands for Pad1 sub-TLV with the same encoding as the Pad1 TLV.
249 * o Type 1 stands for PadN sub-TLV with the same encoding as the PadN TLV.
250 * o Type 2 stands for Diversity sub-TLV, which propagates diversity routing
251 * data. Its body is a variable-length sequence of 8-bit unsigned integers,
252 * each representing per-hop number of interferring radio channel for the
253 * prefix. Channel 0 is invalid and must not be used in the sub-TLV, channel
254 * 255 interferes with any other channel.
255 * o Type 3 stands for Timestamp sub-TLV, used to compute RTT between
256 * neighbours. In the case of a Hello TLV, the body stores a 32-bits
257 * timestamp, while in the case of a IHU TLV, two 32-bits timestamps are
258 * stored.
259 *
260 * Sub-TLV types 0 and 1 are valid for any TLV type, whether sub-TLV type 2 is
261 * only valid for TLV type 8 (Update). Note that within an Update TLV a missing
262 * Diversity sub-TLV is not the same as a Diversity sub-TLV with an empty body.
263 * The former would mean a lack of any claims about the interference, and the
264 * latter would state that interference is definitely absent.
265 * A type 3 sub-TLV is valid both for Hello and IHU TLVs, though the exact
266 * semantic of the sub-TLV is different in each case.
267 */
268 static void
269 subtlvs_print(netdissect_options *ndo,
270 const u_char *cp, const u_char *ep, const uint8_t tlv_type)
271 {
272 uint8_t subtype, sublen;
273 const char *sep;
274 uint32_t t1, t2;
275
276 while (cp < ep) {
277 subtype = *cp++;
278 if(subtype == MESSAGE_SUB_PAD1) {
279 ND_PRINT((ndo, " sub-pad1"));
280 continue;
281 }
282 if(cp == ep)
283 goto invalid;
284 sublen = *cp++;
285 if(cp + sublen > ep)
286 goto invalid;
287
288 switch(subtype) {
289 case MESSAGE_SUB_PADN:
290 ND_PRINT((ndo, " sub-padn"));
291 cp += sublen;
292 break;
293 case MESSAGE_SUB_DIVERSITY:
294 ND_PRINT((ndo, " sub-diversity"));
295 if (sublen == 0) {
296 ND_PRINT((ndo, " empty"));
297 break;
298 }
299 sep = " ";
300 while(sublen--) {
301 ND_PRINT((ndo, "%s%s", sep, tok2str(diversity_str, "%u", EXTRACT_8BITS(cp))));
302 cp++;
303 sep = "-";
304 }
305 if(tlv_type != MESSAGE_UPDATE &&
306 tlv_type != MESSAGE_UPDATE_SRC_SPECIFIC)
307 ND_PRINT((ndo, " (bogus)"));
308 break;
309 case MESSAGE_SUB_TIMESTAMP:
310 ND_PRINT((ndo, " sub-timestamp"));
311 if(tlv_type == MESSAGE_HELLO) {
312 if(sublen < 4)
313 goto invalid;
314 t1 = EXTRACT_BE_32BITS(cp);
315 ND_PRINT((ndo, " %s", format_timestamp(t1)));
316 } else if(tlv_type == MESSAGE_IHU) {
317 if(sublen < 8)
318 goto invalid;
319 t1 = EXTRACT_BE_32BITS(cp);
320 ND_PRINT((ndo, " %s", format_timestamp(t1)));
321 t2 = EXTRACT_BE_32BITS(cp + 4);
322 ND_PRINT((ndo, "|%s", format_timestamp(t2)));
323 } else
324 ND_PRINT((ndo, " (bogus)"));
325 cp += sublen;
326 break;
327 default:
328 ND_PRINT((ndo, " sub-unknown-0x%02x", subtype));
329 cp += sublen;
330 } /* switch */
331 } /* while */
332 return;
333
334 invalid:
335 ND_PRINT((ndo, "%s", istr));
336 }
337
338 #define ICHECK(i, l) \
339 if ((i) + (l) > bodylen || (i) + (l) > length) goto invalid;
340
341 static void
342 babel_print_v2(netdissect_options *ndo,
343 const u_char *cp, u_int length)
344 {
345 u_int i;
346 u_short bodylen;
347 u_char v4_prefix[16] =
348 {0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0xFF, 0xFF, 0, 0, 0, 0 };
349 u_char v6_prefix[16] = {0};
350
351 ND_TCHECK2(*cp, 4);
352 if (length < 4)
353 goto invalid;
354 bodylen = EXTRACT_BE_16BITS(cp + 2);
355 ND_PRINT((ndo, " (%u)", bodylen));
356
357 /* Process the TLVs in the body */
358 i = 0;
359 while(i < bodylen) {
360 const u_char *message;
361 u_int type, len;
362
363 message = cp + 4 + i;
364
365 ND_TCHECK2(*message, 1);
366 if((type = message[0]) == MESSAGE_PAD1) {
367 ND_PRINT((ndo, ndo->ndo_vflag ? "\n\tPad 1" : " pad1"));
368 i += 1;
369 continue;
370 }
371
372 ND_TCHECK2(*message, 2);
373 ICHECK(i, 2);
374 len = message[1];
375
376 ND_TCHECK2(*message, 2 + len);
377 ICHECK(i, 2 + len);
378
379 switch(type) {
380 case MESSAGE_PADN: {
381 if (!ndo->ndo_vflag)
382 ND_PRINT((ndo, " padN"));
383 else
384 ND_PRINT((ndo, "\n\tPad %d", len + 2));
385 }
386 break;
387
388 case MESSAGE_ACK_REQ: {
389 u_short nonce, interval;
390 if (!ndo->ndo_vflag)
391 ND_PRINT((ndo, " ack-req"));
392 else {
393 ND_PRINT((ndo, "\n\tAcknowledgment Request "));
394 if(len < 6) goto invalid;
395 nonce = EXTRACT_BE_16BITS(message + 4);
396 interval = EXTRACT_BE_16BITS(message + 6);
397 ND_PRINT((ndo, "%04x %s", nonce, format_interval(interval)));
398 }
399 }
400 break;
401
402 case MESSAGE_ACK: {
403 u_short nonce;
404 if (!ndo->ndo_vflag)
405 ND_PRINT((ndo, " ack"));
406 else {
407 ND_PRINT((ndo, "\n\tAcknowledgment "));
408 if(len < 2) goto invalid;
409 nonce = EXTRACT_BE_16BITS(message + 2);
410 ND_PRINT((ndo, "%04x", nonce));
411 }
412 }
413 break;
414
415 case MESSAGE_HELLO: {
416 u_short seqno, interval;
417 if (!ndo->ndo_vflag)
418 ND_PRINT((ndo, " hello"));
419 else {
420 ND_PRINT((ndo, "\n\tHello "));
421 if(len < 6) goto invalid;
422 seqno = EXTRACT_BE_16BITS(message + 4);
423 interval = EXTRACT_BE_16BITS(message + 6);
424 ND_PRINT((ndo, "seqno %u interval %s", seqno, format_interval(interval)));
425 /* Extra data. */
426 if(len > 6)
427 subtlvs_print(ndo, message + 8, message + 2 + len, type);
428 }
429 }
430 break;
431
432 case MESSAGE_IHU: {
433 unsigned short txcost, interval;
434 if (!ndo->ndo_vflag)
435 ND_PRINT((ndo, " ihu"));
436 else {
437 u_char address[16];
438 int rc;
439 ND_PRINT((ndo, "\n\tIHU "));
440 if(len < 6) goto invalid;
441 txcost = EXTRACT_BE_16BITS(message + 4);
442 interval = EXTRACT_BE_16BITS(message + 6);
443 rc = network_address(message[2], message + 8, len - 6, address);
444 if(rc < 0) { ND_PRINT((ndo, "%s", tstr)); break; }
445 ND_PRINT((ndo, "%s txcost %u interval %s",
446 format_address(ndo, address), txcost, format_interval(interval)));
447 /* Extra data. */
448 if((u_int)rc < len - 6)
449 subtlvs_print(ndo, message + 8 + rc, message + 2 + len,
450 type);
451 }
452 }
453 break;
454
455 case MESSAGE_ROUTER_ID: {
456 if (!ndo->ndo_vflag)
457 ND_PRINT((ndo, " router-id"));
458 else {
459 ND_PRINT((ndo, "\n\tRouter Id"));
460 if(len < 10) goto invalid;
461 ND_PRINT((ndo, " %s", format_id(message + 4)));
462 }
463 }
464 break;
465
466 case MESSAGE_NH: {
467 if (!ndo->ndo_vflag)
468 ND_PRINT((ndo, " nh"));
469 else {
470 int rc;
471 u_char nh[16];
472 ND_PRINT((ndo, "\n\tNext Hop"));
473 if(len < 2) goto invalid;
474 rc = network_address(message[2], message + 4, len - 2, nh);
475 if(rc < 0) goto invalid;
476 ND_PRINT((ndo, " %s", format_address(ndo, nh)));
477 }
478 }
479 break;
480
481 case MESSAGE_UPDATE: {
482 if (!ndo->ndo_vflag) {
483 ND_PRINT((ndo, " update"));
484 if(len < 1)
485 ND_PRINT((ndo, "/truncated"));
486 else
487 ND_PRINT((ndo, "%s%s%s",
488 (message[3] & 0x80) ? "/prefix": "",
489 (message[3] & 0x40) ? "/id" : "",
490 (message[3] & 0x3f) ? "/unknown" : ""));
491 } else {
492 u_short interval, seqno, metric;
493 u_char plen;
494 int rc;
495 u_char prefix[16];
496 ND_PRINT((ndo, "\n\tUpdate"));
497 if(len < 10) goto invalid;
498 plen = message[4] + (message[2] == 1 ? 96 : 0);
499 rc = network_prefix(message[2], message[4], message[5],
500 message + 12,
501 message[2] == 1 ? v4_prefix : v6_prefix,
502 len - 10, prefix);
503 if(rc < 0) goto invalid;
504 interval = EXTRACT_BE_16BITS(message + 6);
505 seqno = EXTRACT_BE_16BITS(message + 8);
506 metric = EXTRACT_BE_16BITS(message + 10);
507 ND_PRINT((ndo, "%s%s%s %s metric %u seqno %u interval %s",
508 (message[3] & 0x80) ? "/prefix": "",
509 (message[3] & 0x40) ? "/id" : "",
510 (message[3] & 0x3f) ? "/unknown" : "",
511 format_prefix(ndo, prefix, plen),
512 metric, seqno, format_interval_update(interval)));
513 if(message[3] & 0x80) {
514 if(message[2] == 1)
515 memcpy(v4_prefix, prefix, 16);
516 else
517 memcpy(v6_prefix, prefix, 16);
518 }
519 /* extra data? */
520 if((u_int)rc < len - 10)
521 subtlvs_print(ndo, message + 12 + rc, message + 2 + len, type);
522 }
523 }
524 break;
525
526 case MESSAGE_REQUEST: {
527 if (!ndo->ndo_vflag)
528 ND_PRINT((ndo, " request"));
529 else {
530 int rc;
531 u_char prefix[16], plen;
532 ND_PRINT((ndo, "\n\tRequest "));
533 if(len < 2) goto invalid;
534 plen = message[3] + (message[2] == 1 ? 96 : 0);
535 rc = network_prefix(message[2], message[3], 0,
536 message + 4, NULL, len - 2, prefix);
537 if(rc < 0) goto invalid;
538 ND_PRINT((ndo, "for %s",
539 message[2] == 0 ? "any" : format_prefix(ndo, prefix, plen)));
540 }
541 }
542 break;
543
544 case MESSAGE_MH_REQUEST : {
545 if (!ndo->ndo_vflag)
546 ND_PRINT((ndo, " mh-request"));
547 else {
548 int rc;
549 u_short seqno;
550 u_char prefix[16], plen;
551 ND_PRINT((ndo, "\n\tMH-Request "));
552 if(len < 14) goto invalid;
553 seqno = EXTRACT_BE_16BITS(message + 4);
554 rc = network_prefix(message[2], message[3], 0,
555 message + 16, NULL, len - 14, prefix);
556 if(rc < 0) goto invalid;
557 plen = message[3] + (message[2] == 1 ? 96 : 0);
558 ND_PRINT((ndo, "(%u hops) for %s seqno %u id %s",
559 message[6], format_prefix(ndo, prefix, plen),
560 seqno, format_id(message + 8)));
561 }
562 }
563 break;
564 case MESSAGE_TSPC :
565 if (!ndo->ndo_vflag)
566 ND_PRINT((ndo, " tspc"));
567 else {
568 ND_PRINT((ndo, "\n\tTS/PC "));
569 if(len < 6) goto invalid;
570 ND_PRINT((ndo, "timestamp %u packetcounter %u", EXTRACT_BE_32BITS(message + 4),
571 EXTRACT_BE_16BITS(message + 2)));
572 }
573 break;
574 case MESSAGE_HMAC : {
575 if (!ndo->ndo_vflag)
576 ND_PRINT((ndo, " hmac"));
577 else {
578 unsigned j;
579 ND_PRINT((ndo, "\n\tHMAC "));
580 if(len < 18) goto invalid;
581 ND_PRINT((ndo, "key-id %u digest-%u ", EXTRACT_BE_16BITS(message + 2), len - 2));
582 for (j = 0; j < len - 2; j++)
583 ND_PRINT((ndo, "%02X", message[4 + j]));
584 }
585 }
586 break;
587
588 case MESSAGE_UPDATE_SRC_SPECIFIC : {
589 if(!ndo->ndo_vflag) {
590 ND_PRINT((ndo, " ss-update"));
591 } else {
592 u_char prefix[16], src_prefix[16];
593 u_short interval, seqno, metric;
594 u_char ae, plen, src_plen, omitted;
595 int rc;
596 int parsed_len = 10;
597 ND_PRINT((ndo, "\n\tSS-Update"));
598 if(len < 10) goto invalid;
599 ae = message[2];
600 src_plen = message[3];
601 plen = message[4];
602 omitted = message[5];
603 interval = EXTRACT_BE_16BITS(message + 6);
604 seqno = EXTRACT_BE_16BITS(message + 8);
605 metric = EXTRACT_BE_16BITS(message + 10);
606 rc = network_prefix(ae, plen, omitted, message + 2 + parsed_len,
607 ae == 1 ? v4_prefix : v6_prefix,
608 len - parsed_len, prefix);
609 if(rc < 0) goto invalid;
610 if(ae == 1)
611 plen += 96;
612 parsed_len += rc;
613 rc = network_prefix(ae, src_plen, 0, message + 2 + parsed_len,
614 NULL, len - parsed_len, src_prefix);
615 if(rc < 0) goto invalid;
616 if(ae == 1)
617 src_plen += 96;
618 parsed_len += rc;
619
620 ND_PRINT((ndo, " %s from", format_prefix(ndo, prefix, plen)));
621 ND_PRINT((ndo, " %s metric %u seqno %u interval %s",
622 format_prefix(ndo, src_prefix, src_plen),
623 metric, seqno, format_interval_update(interval)));
624 /* extra data? */
625 if((u_int)parsed_len < len)
626 subtlvs_print(ndo, message + 2 + parsed_len,
627 message + 2 + len, type);
628 }
629 }
630 break;
631
632 case MESSAGE_REQUEST_SRC_SPECIFIC : {
633 if(!ndo->ndo_vflag)
634 ND_PRINT((ndo, " ss-request"));
635 else {
636 int rc, parsed_len = 3;
637 u_char ae, plen, src_plen, prefix[16], src_prefix[16];
638 ND_PRINT((ndo, "\n\tSS-Request "));
639 if(len < 3) goto invalid;
640 ae = message[2];
641 plen = message[3];
642 src_plen = message[4];
643 rc = network_prefix(ae, plen, 0, message + 2 + parsed_len,
644 NULL, len - parsed_len, prefix);
645 if(rc < 0) goto invalid;
646 if(ae == 1)
647 plen += 96;
648 parsed_len += rc;
649 rc = network_prefix(ae, src_plen, 0, message + 2 + parsed_len,
650 NULL, len - parsed_len, src_prefix);
651 if(rc < 0) goto invalid;
652 if(ae == 1)
653 src_plen += 96;
654 parsed_len += rc;
655 if(ae == 0) {
656 ND_PRINT((ndo, "for any"));
657 } else {
658 ND_PRINT((ndo, "for (%s, ", format_prefix(ndo, prefix, plen)));
659 ND_PRINT((ndo, "%s)", format_prefix(ndo, src_prefix, src_plen)));
660 }
661 }
662 }
663 break;
664
665 case MESSAGE_MH_REQUEST_SRC_SPECIFIC : {
666 if(!ndo->ndo_vflag)
667 ND_PRINT((ndo, " ss-mh-request"));
668 else {
669 int rc, parsed_len = 14;
670 u_short seqno;
671 u_char ae, plen, src_plen, prefix[16], src_prefix[16], hopc;
672 const u_char *router_id = NULL;
673 ND_PRINT((ndo, "\n\tSS-MH-Request "));
674 if(len < 14) goto invalid;
675 ae = message[2];
676 plen = message[3];
677 seqno = EXTRACT_BE_16BITS(message + 4);
678 hopc = message[6];
679 src_plen = message[7];
680 router_id = message + 8;
681 rc = network_prefix(ae, plen, 0, message + 2 + parsed_len,
682 NULL, len - parsed_len, prefix);
683 if(rc < 0) goto invalid;
684 if(ae == 1)
685 plen += 96;
686 parsed_len += rc;
687 rc = network_prefix(ae, src_plen, 0, message + 2 + parsed_len,
688 NULL, len - parsed_len, src_prefix);
689 if(rc < 0) goto invalid;
690 if(ae == 1)
691 src_plen += 96;
692 ND_PRINT((ndo, "(%u hops) for (%s, ",
693 hopc, format_prefix(ndo, prefix, plen)));
694 ND_PRINT((ndo, "%s) seqno %u id %s",
695 format_prefix(ndo, src_prefix, src_plen),
696 seqno, format_id(router_id)));
697 }
698 }
699 break;
700
701 default:
702 if (!ndo->ndo_vflag)
703 ND_PRINT((ndo, " unknown"));
704 else
705 ND_PRINT((ndo, "\n\tUnknown message type %d", type));
706 }
707 i += len + 2;
708 }
709 return;
710
711 trunc:
712 ND_PRINT((ndo, " %s", tstr));
713 return;
714
715 invalid:
716 ND_PRINT((ndo, "%s", istr));
717 return;
718 }