]> The Tcpdump Group git mirrors - tcpdump/blob - print-ldp.c
afd943d0a5e593fe53697dfc52cc818f086ed5a2
[tcpdump] / print-ldp.c
1 /*
2 * Redistribution and use in source and binary forms, with or without
3 * modification, are permitted provided that: (1) source code
4 * distributions retain the above copyright notice and this paragraph
5 * in its entirety, and (2) distributions including binary code include
6 * the above copyright notice and this paragraph in its entirety in
7 * the documentation or other materials provided with the distribution.
8 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND
9 * WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, WITHOUT
10 * LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
11 * FOR A PARTICULAR PURPOSE.
12 *
13 * Original code by Hannes Gredler (hannes@gredler.at)
14 * and Steinar Haug (sthaug@nethelp.no)
15 */
16
17 /* \summary: Label Distribution Protocol (LDP) printer */
18
19 #ifdef HAVE_CONFIG_H
20 #include "config.h"
21 #endif
22
23 #include <netdissect-stdinc.h>
24
25 #include "netdissect.h"
26 #include "extract.h"
27 #include "addrtoname.h"
28
29 #include "l2vpn.h"
30 #include "af.h"
31
32 static const char tstr[] = " [|LDP]";
33
34 /*
35 * ldp common header
36 *
37 * 0 1 2 3
38 * 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
39 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
40 * | Version | PDU Length |
41 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
42 * | LDP Identifier |
43 * + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
44 * | |
45 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
46 *
47 */
48
49 struct ldp_common_header {
50 uint8_t version[2];
51 uint8_t pdu_length[2];
52 uint8_t lsr_id[4];
53 uint8_t label_space[2];
54 };
55
56 #define LDP_VERSION 1
57
58 /*
59 * ldp message header
60 *
61 * 0 1 2 3
62 * 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
63 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
64 * |U| Message Type | Message Length |
65 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
66 * | Message ID |
67 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
68 * | |
69 * + +
70 * | Mandatory Parameters |
71 * + +
72 * | |
73 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
74 * | |
75 * + +
76 * | Optional Parameters |
77 * + +
78 * | |
79 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
80 */
81
82 struct ldp_msg_header {
83 uint8_t type[2];
84 uint8_t length[2];
85 uint8_t id[4];
86 };
87
88 #define LDP_MASK_MSG_TYPE(x) ((x)&0x7fff)
89 #define LDP_MASK_U_BIT(x) ((x)&0x8000)
90
91 #define LDP_MSG_NOTIF 0x0001
92 #define LDP_MSG_HELLO 0x0100
93 #define LDP_MSG_INIT 0x0200
94 #define LDP_MSG_KEEPALIVE 0x0201
95 #define LDP_MSG_ADDRESS 0x0300
96 #define LDP_MSG_ADDRESS_WITHDRAW 0x0301
97 #define LDP_MSG_LABEL_MAPPING 0x0400
98 #define LDP_MSG_LABEL_REQUEST 0x0401
99 #define LDP_MSG_LABEL_WITHDRAW 0x0402
100 #define LDP_MSG_LABEL_RELEASE 0x0403
101 #define LDP_MSG_LABEL_ABORT_REQUEST 0x0404
102
103 #define LDP_VENDOR_PRIVATE_MIN 0x3e00
104 #define LDP_VENDOR_PRIVATE_MAX 0x3eff
105 #define LDP_EXPERIMENTAL_MIN 0x3f00
106 #define LDP_EXPERIMENTAL_MAX 0x3fff
107
108 static const struct tok ldp_msg_values[] = {
109 { LDP_MSG_NOTIF, "Notification" },
110 { LDP_MSG_HELLO, "Hello" },
111 { LDP_MSG_INIT, "Initialization" },
112 { LDP_MSG_KEEPALIVE, "Keepalive" },
113 { LDP_MSG_ADDRESS, "Address" },
114 { LDP_MSG_ADDRESS_WITHDRAW, "Address Withdraw" },
115 { LDP_MSG_LABEL_MAPPING, "Label Mapping" },
116 { LDP_MSG_LABEL_REQUEST, "Label Request" },
117 { LDP_MSG_LABEL_WITHDRAW, "Label Withdraw" },
118 { LDP_MSG_LABEL_RELEASE, "Label Release" },
119 { LDP_MSG_LABEL_ABORT_REQUEST, "Label Abort Request" },
120 { 0, NULL}
121 };
122
123 #define LDP_MASK_TLV_TYPE(x) ((x)&0x3fff)
124 #define LDP_MASK_F_BIT(x) ((x)&0x4000)
125
126 #define LDP_TLV_FEC 0x0100
127 #define LDP_TLV_ADDRESS_LIST 0x0101
128 #define LDP_TLV_ADDRESS_LIST_AFNUM_LEN 2
129 #define LDP_TLV_HOP_COUNT 0x0103
130 #define LDP_TLV_PATH_VECTOR 0x0104
131 #define LDP_TLV_GENERIC_LABEL 0x0200
132 #define LDP_TLV_ATM_LABEL 0x0201
133 #define LDP_TLV_FR_LABEL 0x0202
134 #define LDP_TLV_STATUS 0x0300
135 #define LDP_TLV_EXTD_STATUS 0x0301
136 #define LDP_TLV_RETURNED_PDU 0x0302
137 #define LDP_TLV_RETURNED_MSG 0x0303
138 #define LDP_TLV_COMMON_HELLO 0x0400
139 #define LDP_TLV_IPV4_TRANSPORT_ADDR 0x0401
140 #define LDP_TLV_CONFIG_SEQ_NUMBER 0x0402
141 #define LDP_TLV_IPV6_TRANSPORT_ADDR 0x0403
142 #define LDP_TLV_COMMON_SESSION 0x0500
143 #define LDP_TLV_ATM_SESSION_PARM 0x0501
144 #define LDP_TLV_FR_SESSION_PARM 0x0502
145 #define LDP_TLV_FT_SESSION 0x0503
146 #define LDP_TLV_LABEL_REQUEST_MSG_ID 0x0600
147 #define LDP_TLV_MTU 0x0601 /* rfc 3988 */
148
149 static const struct tok ldp_tlv_values[] = {
150 { LDP_TLV_FEC, "FEC" },
151 { LDP_TLV_ADDRESS_LIST, "Address List" },
152 { LDP_TLV_HOP_COUNT, "Hop Count" },
153 { LDP_TLV_PATH_VECTOR, "Path Vector" },
154 { LDP_TLV_GENERIC_LABEL, "Generic Label" },
155 { LDP_TLV_ATM_LABEL, "ATM Label" },
156 { LDP_TLV_FR_LABEL, "Frame-Relay Label" },
157 { LDP_TLV_STATUS, "Status" },
158 { LDP_TLV_EXTD_STATUS, "Extended Status" },
159 { LDP_TLV_RETURNED_PDU, "Returned PDU" },
160 { LDP_TLV_RETURNED_MSG, "Returned Message" },
161 { LDP_TLV_COMMON_HELLO, "Common Hello Parameters" },
162 { LDP_TLV_IPV4_TRANSPORT_ADDR, "IPv4 Transport Address" },
163 { LDP_TLV_CONFIG_SEQ_NUMBER, "Configuration Sequence Number" },
164 { LDP_TLV_IPV6_TRANSPORT_ADDR, "IPv6 Transport Address" },
165 { LDP_TLV_COMMON_SESSION, "Common Session Parameters" },
166 { LDP_TLV_ATM_SESSION_PARM, "ATM Session Parameters" },
167 { LDP_TLV_FR_SESSION_PARM, "Frame-Relay Session Parameters" },
168 { LDP_TLV_FT_SESSION, "Fault-Tolerant Session Parameters" },
169 { LDP_TLV_LABEL_REQUEST_MSG_ID, "Label Request Message ID" },
170 { LDP_TLV_MTU, "MTU" },
171 { 0, NULL}
172 };
173
174 #define LDP_FEC_WILDCARD 0x01
175 #define LDP_FEC_PREFIX 0x02
176 #define LDP_FEC_HOSTADDRESS 0x03
177 /* From RFC 4906; should probably be updated to RFC 4447 (e.g., VC -> PW) */
178 #define LDP_FEC_MARTINI_VC 0x80
179
180 static const struct tok ldp_fec_values[] = {
181 { LDP_FEC_WILDCARD, "Wildcard" },
182 { LDP_FEC_PREFIX, "Prefix" },
183 { LDP_FEC_HOSTADDRESS, "Host address" },
184 { LDP_FEC_MARTINI_VC, "Martini VC" },
185 { 0, NULL}
186 };
187
188 #define LDP_FEC_MARTINI_IFPARM_MTU 0x01
189 #define LDP_FEC_MARTINI_IFPARM_DESC 0x03
190 #define LDP_FEC_MARTINI_IFPARM_VCCV 0x0c
191
192 static const struct tok ldp_fec_martini_ifparm_values[] = {
193 { LDP_FEC_MARTINI_IFPARM_MTU, "MTU" },
194 { LDP_FEC_MARTINI_IFPARM_DESC, "Description" },
195 { LDP_FEC_MARTINI_IFPARM_VCCV, "VCCV" },
196 { 0, NULL}
197 };
198
199 /* draft-ietf-pwe3-vccv-04.txt */
200 static const struct tok ldp_fec_martini_ifparm_vccv_cc_values[] = {
201 { 0x01, "PWE3 control word" },
202 { 0x02, "MPLS Router Alert Label" },
203 { 0x04, "MPLS inner label TTL = 1" },
204 { 0, NULL}
205 };
206
207 /* draft-ietf-pwe3-vccv-04.txt */
208 static const struct tok ldp_fec_martini_ifparm_vccv_cv_values[] = {
209 { 0x01, "ICMP Ping" },
210 { 0x02, "LSP Ping" },
211 { 0x04, "BFD" },
212 { 0, NULL}
213 };
214
215 static u_int ldp_pdu_print(netdissect_options *, register const u_char *);
216
217 /*
218 * ldp tlv header
219 *
220 * 0 1 2 3
221 * 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
222 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
223 * |U|F| Type | Length |
224 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
225 * | |
226 * | Value |
227 * ~ ~
228 * | |
229 * | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
230 * | |
231 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
232 */
233
234 #define TLV_TCHECK(minlen) \
235 ND_TCHECK2(*tptr, minlen); if (tlv_tlen < minlen) goto badtlv;
236
237 static int
238 ldp_tlv_print(netdissect_options *ndo,
239 register const u_char *tptr,
240 u_short msg_tlen)
241 {
242 struct ldp_tlv_header {
243 uint8_t type[2];
244 uint8_t length[2];
245 };
246
247 const struct ldp_tlv_header *ldp_tlv_header;
248 u_short tlv_type,tlv_len,tlv_tlen,af,ft_flags;
249 u_char fec_type;
250 u_int ui,vc_info_len, vc_info_tlv_type, vc_info_tlv_len,idx;
251 char buf[100];
252 int i;
253
254 ldp_tlv_header = (const struct ldp_tlv_header *)tptr;
255 ND_TCHECK(*ldp_tlv_header);
256 tlv_len=EXTRACT_16BITS(ldp_tlv_header->length);
257 if (tlv_len + 4 > msg_tlen) {
258 ND_PRINT((ndo, "\n\t\t TLV contents go past end of message"));
259 return 0;
260 }
261 tlv_tlen=tlv_len;
262 tlv_type=LDP_MASK_TLV_TYPE(EXTRACT_16BITS(ldp_tlv_header->type));
263
264 /* FIXME vendor private / experimental check */
265 ND_PRINT((ndo, "\n\t %s TLV (0x%04x), length: %u, Flags: [%s and %s forward if unknown]",
266 tok2str(ldp_tlv_values,
267 "Unknown",
268 tlv_type),
269 tlv_type,
270 tlv_len,
271 LDP_MASK_U_BIT(EXTRACT_16BITS(&ldp_tlv_header->type)) ? "continue processing" : "ignore",
272 LDP_MASK_F_BIT(EXTRACT_16BITS(&ldp_tlv_header->type)) ? "do" : "don't"));
273
274 tptr+=sizeof(struct ldp_tlv_header);
275
276 switch(tlv_type) {
277
278 case LDP_TLV_COMMON_HELLO:
279 TLV_TCHECK(4);
280 ND_PRINT((ndo, "\n\t Hold Time: %us, Flags: [%s Hello%s]",
281 EXTRACT_16BITS(tptr),
282 (EXTRACT_16BITS(tptr+2)&0x8000) ? "Targeted" : "Link",
283 (EXTRACT_16BITS(tptr+2)&0x4000) ? ", Request for targeted Hellos" : ""));
284 break;
285
286 case LDP_TLV_IPV4_TRANSPORT_ADDR:
287 TLV_TCHECK(4);
288 ND_PRINT((ndo, "\n\t IPv4 Transport Address: %s", ipaddr_string(ndo, tptr)));
289 break;
290 case LDP_TLV_IPV6_TRANSPORT_ADDR:
291 TLV_TCHECK(16);
292 ND_PRINT((ndo, "\n\t IPv6 Transport Address: %s", ip6addr_string(ndo, tptr)));
293 break;
294 case LDP_TLV_CONFIG_SEQ_NUMBER:
295 TLV_TCHECK(4);
296 ND_PRINT((ndo, "\n\t Sequence Number: %u", EXTRACT_32BITS(tptr)));
297 break;
298
299 case LDP_TLV_ADDRESS_LIST:
300 TLV_TCHECK(LDP_TLV_ADDRESS_LIST_AFNUM_LEN);
301 af = EXTRACT_16BITS(tptr);
302 tptr+=LDP_TLV_ADDRESS_LIST_AFNUM_LEN;
303 tlv_tlen -= LDP_TLV_ADDRESS_LIST_AFNUM_LEN;
304 ND_PRINT((ndo, "\n\t Address Family: %s, addresses",
305 tok2str(af_values, "Unknown (%u)", af)));
306 switch (af) {
307 case AFNUM_INET:
308 while(tlv_tlen >= sizeof(struct in_addr)) {
309 ND_TCHECK2(*tptr, sizeof(struct in_addr));
310 ND_PRINT((ndo, " %s", ipaddr_string(ndo, tptr)));
311 tlv_tlen-=sizeof(struct in_addr);
312 tptr+=sizeof(struct in_addr);
313 }
314 break;
315 case AFNUM_INET6:
316 while(tlv_tlen >= sizeof(struct in6_addr)) {
317 ND_TCHECK2(*tptr, sizeof(struct in6_addr));
318 ND_PRINT((ndo, " %s", ip6addr_string(ndo, tptr)));
319 tlv_tlen-=sizeof(struct in6_addr);
320 tptr+=sizeof(struct in6_addr);
321 }
322 break;
323 default:
324 /* unknown AF */
325 break;
326 }
327 break;
328
329 case LDP_TLV_COMMON_SESSION:
330 TLV_TCHECK(8);
331 ND_PRINT((ndo, "\n\t Version: %u, Keepalive: %us, Flags: [Downstream %s, Loop Detection %s]",
332 EXTRACT_16BITS(tptr), EXTRACT_16BITS(tptr+2),
333 (EXTRACT_16BITS(tptr+6)&0x8000) ? "On Demand" : "Unsolicited",
334 (EXTRACT_16BITS(tptr+6)&0x4000) ? "Enabled" : "Disabled"
335 ));
336 break;
337
338 case LDP_TLV_FEC:
339 TLV_TCHECK(1);
340 fec_type = *tptr;
341 ND_PRINT((ndo, "\n\t %s FEC (0x%02x)",
342 tok2str(ldp_fec_values, "Unknown", fec_type),
343 fec_type));
344
345 tptr+=1;
346 tlv_tlen-=1;
347 switch(fec_type) {
348
349 case LDP_FEC_WILDCARD:
350 break;
351 case LDP_FEC_PREFIX:
352 TLV_TCHECK(2);
353 af = EXTRACT_16BITS(tptr);
354 tptr+=LDP_TLV_ADDRESS_LIST_AFNUM_LEN;
355 tlv_tlen-=LDP_TLV_ADDRESS_LIST_AFNUM_LEN;
356 if (af == AFNUM_INET) {
357 i=decode_prefix4(ndo, tptr, tlv_tlen, buf, sizeof(buf));
358 if (i == -2)
359 goto trunc;
360 if (i == -3)
361 ND_PRINT((ndo, ": IPv4 prefix (goes past end of TLV)"));
362 else if (i == -1)
363 ND_PRINT((ndo, ": IPv4 prefix (invalid length)"));
364 else
365 ND_PRINT((ndo, ": IPv4 prefix %s", buf));
366 }
367 else if (af == AFNUM_INET6) {
368 i=decode_prefix6(ndo, tptr, tlv_tlen, buf, sizeof(buf));
369 if (i == -2)
370 goto trunc;
371 if (i == -3)
372 ND_PRINT((ndo, ": IPv4 prefix (goes past end of TLV)"));
373 else if (i == -1)
374 ND_PRINT((ndo, ": IPv6 prefix (invalid length)"));
375 else
376 ND_PRINT((ndo, ": IPv6 prefix %s", buf));
377 }
378 else
379 ND_PRINT((ndo, ": Address family %u prefix", af));
380 break;
381 case LDP_FEC_HOSTADDRESS:
382 break;
383 case LDP_FEC_MARTINI_VC:
384 /*
385 * We assume the type was supposed to be one of the MPLS
386 * Pseudowire Types.
387 */
388 TLV_TCHECK(7);
389 vc_info_len = *(tptr+2);
390
391 /*
392 * According to RFC 4908, the VC info Length field can be zero,
393 * in which case not only are there no interface parameters,
394 * there's no VC ID.
395 */
396 if (vc_info_len == 0) {
397 ND_PRINT((ndo, ": %s, %scontrol word, group-ID %u, VC-info-length: %u",
398 tok2str(mpls_pw_types_values, "Unknown", EXTRACT_16BITS(tptr)&0x7fff),
399 EXTRACT_16BITS(tptr)&0x8000 ? "" : "no ",
400 EXTRACT_32BITS(tptr+3),
401 vc_info_len));
402 break;
403 }
404
405 /* Make sure we have the VC ID as well */
406 TLV_TCHECK(11);
407 ND_PRINT((ndo, ": %s, %scontrol word, group-ID %u, VC-ID %u, VC-info-length: %u",
408 tok2str(mpls_pw_types_values, "Unknown", EXTRACT_16BITS(tptr)&0x7fff),
409 EXTRACT_16BITS(tptr)&0x8000 ? "" : "no ",
410 EXTRACT_32BITS(tptr+3),
411 EXTRACT_32BITS(tptr+7),
412 vc_info_len));
413 if (vc_info_len < 4) {
414 /* minimum 4, for the VC ID */
415 ND_PRINT((ndo, " (invalid, < 4"));
416 return(tlv_len+4); /* Type & Length fields not included */
417 }
418 vc_info_len -= 4; /* subtract out the VC ID, giving the length of the interface parameters */
419
420 /* Skip past the fixed information and the VC ID */
421 tptr+=11;
422 tlv_tlen-=11;
423 TLV_TCHECK(vc_info_len);
424
425 while (vc_info_len > 2) {
426 vc_info_tlv_type = *tptr;
427 vc_info_tlv_len = *(tptr+1);
428 if (vc_info_tlv_len < 2)
429 break;
430 if (vc_info_len < vc_info_tlv_len)
431 break;
432
433 ND_PRINT((ndo, "\n\t\tInterface Parameter: %s (0x%02x), len %u",
434 tok2str(ldp_fec_martini_ifparm_values,"Unknown",vc_info_tlv_type),
435 vc_info_tlv_type,
436 vc_info_tlv_len));
437
438 switch(vc_info_tlv_type) {
439 case LDP_FEC_MARTINI_IFPARM_MTU:
440 ND_PRINT((ndo, ": %u", EXTRACT_16BITS(tptr+2)));
441 break;
442
443 case LDP_FEC_MARTINI_IFPARM_DESC:
444 ND_PRINT((ndo, ": "));
445 for (idx = 2; idx < vc_info_tlv_len; idx++)
446 safeputchar(ndo, *(tptr + idx));
447 break;
448
449 case LDP_FEC_MARTINI_IFPARM_VCCV:
450 ND_PRINT((ndo, "\n\t\t Control Channels (0x%02x) = [%s]",
451 *(tptr+2),
452 bittok2str(ldp_fec_martini_ifparm_vccv_cc_values, "none", *(tptr+2))));
453 ND_PRINT((ndo, "\n\t\t CV Types (0x%02x) = [%s]",
454 *(tptr+3),
455 bittok2str(ldp_fec_martini_ifparm_vccv_cv_values, "none", *(tptr+3))));
456 break;
457
458 default:
459 print_unknown_data(ndo, tptr+2, "\n\t\t ", vc_info_tlv_len-2);
460 break;
461 }
462
463 vc_info_len -= vc_info_tlv_len;
464 tptr += vc_info_tlv_len;
465 }
466 break;
467 }
468
469 break;
470
471 case LDP_TLV_GENERIC_LABEL:
472 TLV_TCHECK(4);
473 ND_PRINT((ndo, "\n\t Label: %u", EXTRACT_32BITS(tptr) & 0xfffff));
474 break;
475
476 case LDP_TLV_STATUS:
477 TLV_TCHECK(8);
478 ui = EXTRACT_32BITS(tptr);
479 tptr+=4;
480 ND_PRINT((ndo, "\n\t Status: 0x%02x, Flags: [%s and %s forward]",
481 ui&0x3fffffff,
482 ui&0x80000000 ? "Fatal error" : "Advisory Notification",
483 ui&0x40000000 ? "do" : "don't"));
484 ui = EXTRACT_32BITS(tptr);
485 tptr+=4;
486 if (ui)
487 ND_PRINT((ndo, ", causing Message ID: 0x%08x", ui));
488 break;
489
490 case LDP_TLV_FT_SESSION:
491 TLV_TCHECK(12);
492 ft_flags = EXTRACT_16BITS(tptr);
493 ND_PRINT((ndo, "\n\t Flags: [%sReconnect, %sSave State, %sAll-Label Protection, %s Checkpoint, %sRe-Learn State]",
494 ft_flags&0x8000 ? "" : "No ",
495 ft_flags&0x8 ? "" : "Don't ",
496 ft_flags&0x4 ? "" : "No ",
497 ft_flags&0x2 ? "Sequence Numbered Label" : "All Labels",
498 ft_flags&0x1 ? "" : "Don't "));
499 /* 16 bits (FT Flags) + 16 bits (Reserved) */
500 tptr+=4;
501 ui = EXTRACT_32BITS(tptr);
502 if (ui)
503 ND_PRINT((ndo, ", Reconnect Timeout: %ums", ui));
504 tptr+=4;
505 ui = EXTRACT_32BITS(tptr);
506 if (ui)
507 ND_PRINT((ndo, ", Recovery Time: %ums", ui));
508 break;
509
510 case LDP_TLV_MTU:
511 TLV_TCHECK(2);
512 ND_PRINT((ndo, "\n\t MTU: %u", EXTRACT_16BITS(tptr)));
513 break;
514
515
516 /*
517 * FIXME those are the defined TLVs that lack a decoder
518 * you are welcome to contribute code ;-)
519 */
520
521 case LDP_TLV_HOP_COUNT:
522 case LDP_TLV_PATH_VECTOR:
523 case LDP_TLV_ATM_LABEL:
524 case LDP_TLV_FR_LABEL:
525 case LDP_TLV_EXTD_STATUS:
526 case LDP_TLV_RETURNED_PDU:
527 case LDP_TLV_RETURNED_MSG:
528 case LDP_TLV_ATM_SESSION_PARM:
529 case LDP_TLV_FR_SESSION_PARM:
530 case LDP_TLV_LABEL_REQUEST_MSG_ID:
531
532 default:
533 if (ndo->ndo_vflag <= 1)
534 print_unknown_data(ndo, tptr, "\n\t ", tlv_tlen);
535 break;
536 }
537 return(tlv_len+4); /* Type & Length fields not included */
538
539 trunc:
540 ND_PRINT((ndo, "%s", tstr));
541 return 0;
542
543 badtlv:
544 ND_PRINT((ndo, "\n\t\t TLV contents go past end of TLV"));
545 return(tlv_len+4); /* Type & Length fields not included */
546 }
547
548 void
549 ldp_print(netdissect_options *ndo,
550 register const u_char *pptr, register u_int len)
551 {
552 u_int processed;
553 while (len > (sizeof(struct ldp_common_header) + sizeof(struct ldp_msg_header))) {
554 processed = ldp_pdu_print(ndo, pptr);
555 if (processed == 0)
556 return;
557 if (len < processed) {
558 ND_PRINT((ndo, " [remaining length %u < %u]", len, processed));
559 ND_PRINT((ndo, "%s", istr));
560 break;
561
562 }
563 len -= processed;
564 pptr += processed;
565 }
566 }
567
568 static u_int
569 ldp_pdu_print(netdissect_options *ndo,
570 register const u_char *pptr)
571 {
572 const struct ldp_common_header *ldp_com_header;
573 const struct ldp_msg_header *ldp_msg_header;
574 const u_char *tptr,*msg_tptr;
575 u_short tlen;
576 u_short pdu_len,msg_len,msg_type,msg_tlen;
577 int hexdump,processed;
578
579 ldp_com_header = (const struct ldp_common_header *)pptr;
580 ND_TCHECK(*ldp_com_header);
581
582 /*
583 * Sanity checking of the header.
584 */
585 if (EXTRACT_16BITS(&ldp_com_header->version) != LDP_VERSION) {
586 ND_PRINT((ndo, "%sLDP version %u packet not supported",
587 (ndo->ndo_vflag < 1) ? "" : "\n\t",
588 EXTRACT_16BITS(&ldp_com_header->version)));
589 return 0;
590 }
591
592 pdu_len = EXTRACT_16BITS(&ldp_com_header->pdu_length);
593 if (pdu_len < sizeof(const struct ldp_common_header)-4) {
594 /* length too short */
595 ND_PRINT((ndo, "%sLDP, pdu-length: %u (too short, < %u)",
596 (ndo->ndo_vflag < 1) ? "" : "\n\t",
597 pdu_len,
598 (u_int)(sizeof(const struct ldp_common_header)-4)));
599 return 0;
600 }
601
602 /* print the LSR-ID, label-space & length */
603 ND_PRINT((ndo, "%sLDP, Label-Space-ID: %s:%u, pdu-length: %u",
604 (ndo->ndo_vflag < 1) ? "" : "\n\t",
605 ipaddr_string(ndo, &ldp_com_header->lsr_id),
606 EXTRACT_16BITS(&ldp_com_header->label_space),
607 pdu_len));
608
609 /* bail out if non-verbose */
610 if (ndo->ndo_vflag < 1)
611 return 0;
612
613 /* ok they seem to want to know everything - lets fully decode it */
614 tptr = pptr + sizeof(const struct ldp_common_header);
615 tlen = pdu_len - (sizeof(const struct ldp_common_header)-4); /* Type & Length fields not included */
616
617 while(tlen>0) {
618 /* did we capture enough for fully decoding the msg header ? */
619 ND_TCHECK2(*tptr, sizeof(struct ldp_msg_header));
620
621 ldp_msg_header = (const struct ldp_msg_header *)tptr;
622 msg_len=EXTRACT_16BITS(ldp_msg_header->length);
623 msg_type=LDP_MASK_MSG_TYPE(EXTRACT_16BITS(ldp_msg_header->type));
624
625 if (msg_len < sizeof(struct ldp_msg_header)-4) {
626 /* length too short */
627 /* FIXME vendor private / experimental check */
628 ND_PRINT((ndo, "\n\t %s Message (0x%04x), length: %u (too short, < %u)",
629 tok2str(ldp_msg_values,
630 "Unknown",
631 msg_type),
632 msg_type,
633 msg_len,
634 (u_int)(sizeof(struct ldp_msg_header)-4)));
635 return 0;
636 }
637
638 /* FIXME vendor private / experimental check */
639 ND_PRINT((ndo, "\n\t %s Message (0x%04x), length: %u, Message ID: 0x%08x, Flags: [%s if unknown]",
640 tok2str(ldp_msg_values,
641 "Unknown",
642 msg_type),
643 msg_type,
644 msg_len,
645 EXTRACT_32BITS(&ldp_msg_header->id),
646 LDP_MASK_U_BIT(EXTRACT_16BITS(&ldp_msg_header->type)) ? "continue processing" : "ignore"));
647
648 msg_tptr=tptr+sizeof(struct ldp_msg_header);
649 msg_tlen=msg_len-(sizeof(struct ldp_msg_header)-4); /* Type & Length fields not included */
650
651 /* did we capture enough for fully decoding the message ? */
652 ND_TCHECK2(*tptr, msg_len);
653 hexdump=FALSE;
654
655 switch(msg_type) {
656
657 case LDP_MSG_NOTIF:
658 case LDP_MSG_HELLO:
659 case LDP_MSG_INIT:
660 case LDP_MSG_KEEPALIVE:
661 case LDP_MSG_ADDRESS:
662 case LDP_MSG_LABEL_MAPPING:
663 case LDP_MSG_ADDRESS_WITHDRAW:
664 case LDP_MSG_LABEL_WITHDRAW:
665 while(msg_tlen >= 4) {
666 processed = ldp_tlv_print(ndo, msg_tptr, msg_tlen);
667 if (processed == 0)
668 break;
669 msg_tlen-=processed;
670 msg_tptr+=processed;
671 }
672 break;
673
674 /*
675 * FIXME those are the defined messages that lack a decoder
676 * you are welcome to contribute code ;-)
677 */
678
679 case LDP_MSG_LABEL_REQUEST:
680 case LDP_MSG_LABEL_RELEASE:
681 case LDP_MSG_LABEL_ABORT_REQUEST:
682
683 default:
684 if (ndo->ndo_vflag <= 1)
685 print_unknown_data(ndo, msg_tptr, "\n\t ", msg_tlen);
686 break;
687 }
688 /* do we want to see an additionally hexdump ? */
689 if (ndo->ndo_vflag > 1 || hexdump==TRUE)
690 print_unknown_data(ndo, tptr+sizeof(struct ldp_msg_header), "\n\t ",
691 msg_len);
692
693 tptr += msg_len+4;
694 tlen -= msg_len+4;
695 }
696 return pdu_len+4;
697 trunc:
698 ND_PRINT((ndo, "%s", tstr));
699 return 0;
700 }
701
702 /*
703 * Local Variables:
704 * c-style: whitesmith
705 * c-basic-offset: 8
706 * End:
707 */